caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
101.2s |
107.4s |
101.8s |
102.4s |
58.2s |
57.3s |
57.5s |
58.2s |
58.4s |
57.0s |
57.6s |
58.1s |
test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.5s |
1.8s |
1.8s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.7s |
test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
4.5s |
4.5s |
4.5s |
4.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.6s |
2.5s |
2.4s |
2.4s |
2.8s |
3.0s |
3.0s |
2.9s |
3.0s |
2.7s |
2.9s |
3.2s |
test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
4.3s |
4.6s |
4.4s |
4.6s |
4.6s |
4.5s |
4.5s |
4.5s |
4.4s |
4.5s |
4.4s |
4.7s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.4s |
3.6s |
3.9s |
3.4s |
3.9s |
3.7s |
3.6s |
3.7s |
3.9s |
3.7s |
3.6s |
4.3s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.5s |
0.6s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.4s |
0.5s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.4s |
1.5s |
1.7s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.6s |
1.3s |
1.4s |
1.5s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.8s |
test_rtalias::test_fht_info |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.8s |
1.7s |
1.6s |
1.7s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.3s |
2.3s |
2.4s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
test_dice_derivations::test_cold_reset_no_rng |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
0.8s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
test_dice_derivations::test_cold_reset_status_reporting |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.6s |
1.3s |
1.5s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
test_fake_rom::test_fake_rom_fw_load |
0.3s |
0.3s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.6s |
0.8s |
0.5s |
0.7s |
0.5s |
0.4s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.4s |
test_fake_rom::test_fake_rom_production_enabled |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
test_fake_rom::test_fake_rom_production_error |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
test_fake_rom::test_fake_rom_update_reset |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
1.1s |
1.0s |
1.1s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
test_fake_rom::test_image_verify |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
test_fips_hooks::test_fips_hook_exit |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.4s |
1.2s |
1.1s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.3s |
1.3s |
1.4s |
1.6s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.5s |
1.0s |
0.9s |
test_fmcalias_derivation::test_fht_info |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.2s |
1.5s |
1.3s |
1.3s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.9s |
0.9s |
0.8s |
0.6s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.4s |
1.4s |
1.5s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.4s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_fmcalias_derivation::test_pcr_log |
1.6s |
1.6s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.4s |
1.5s |
1.4s |
1.4s |
1.2s |
1.4s |
1.2s |
1.2s |
1.2s |
1.5s |
1.2s |
1.2s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
2.2s |
2.1s |
2.1s |
2.0s |
1.7s |
2.1s |
1.7s |
1.6s |
1.7s |
1.9s |
1.7s |
1.6s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.6s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.1s |
1.0s |
1.1s |
1.3s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.6s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.6s |
1.9s |
1.6s |
1.6s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.3s |
1.6s |
1.1s |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.8s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
test_fmcalias_derivation::test_upload_no_measurement |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.2s |
1.4s |
1.1s |
1.1s |
1.0s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
test_fmcalias_derivation::test_upload_single_measurement |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.1s |
1.2s |
1.2s |
1.2s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_zero_firmware_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_idevid_derivation::test_generate_csr |
2.0s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.5s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
1965.2s |
1940.2s |
1961.4s |
1937.2s |
1536.3s |
1536.2s |
1511.9s |
1536.4s |
1511.4s |
932.0s |
893.8s |
908.0s |
874.0s |
888.7s |
858.0s |
885.8s |
871.6s |
892.8s |
865.8s |
897.3s |
855.5s |
test_idevid_derivation::test_idev_subj_key_id_algo |
7.2s |
7.2s |
7.2s |
7.2s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
6.0s |
5.4s |
5.2s |
6.0s |
5.6s |
4.7s |
5.7s |
4.8s |
5.3s |
4.7s |
5.4s |
4.7s |
test_image_validation::cert_test |
2.2s |
1.5s |
2.0s |
1.7s |
1.3s |
1.4s |
1.9s |
2.0s |
1.7s |
1.5s |
1.2s |
1.6s |
1.3s |
1.3s |
1.2s |
1.2s |
1.1s |
1.3s |
1.1s |
1.2s |
1.2s |
test_image_validation::cert_test_with_custom_dates |
3.5s |
2.5s |
2.3s |
2.2s |
2.0s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.4s |
1.3s |
1.1s |
1.4s |
1.1s |
1.4s |
1.1s |
1.4s |
1.1s |
test_image_validation::cert_test_with_ueid |
1.4s |
1.3s |
1.4s |
1.4s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.5s |
1.2s |
1.1s |
1.4s |
1.3s |
1.0s |
1.3s |
1.0s |
1.2s |
1.0s |
1.3s |
1.0s |
test_image_validation::test_fmc_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.9s |
0.6s |
test_image_validation::test_fmc_entry_point_unaligned |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
1.0s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.1s |
test_image_validation::test_fmc_svn_greater_than_32 |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.4s |
0.6s |
0.5s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.7s |
2.3s |
1.9s |
1.9s |
2.0s |
2.2s |
2.0s |
2.0s |
2.1s |
2.2s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
2.3s |
2.3s |
2.4s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
2.0s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.8s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
1.2s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
1.1s |
0.9s |
0.9s |
1.1s |
1.3s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.8s |
0.6s |
0.6s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.7s |
1.2s |
1.1s |
1.2s |
1.3s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.0s |
2.2s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
2.0s |
2.0s |
2.0s |
2.0s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.2s |
1.4s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.1s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.2s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_max_fw_image |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.3s |
1.1s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
3.4s |
3.3s |
3.4s |
3.4s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.9s |
2.7s |
2.7s |
2.6s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
39.0s |
38.6s |
39.2s |
38.8s |
29.9s |
29.9s |
29.5s |
30.2s |
29.7s |
33.2s |
32.6s |
32.6s |
31.7s |
30.8s |
29.7s |
31.0s |
29.9s |
30.7s |
29.7s |
30.9s |
29.7s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
23.4s |
23.1s |
23.7s |
23.4s |
17.4s |
17.4s |
17.0s |
17.7s |
17.3s |
19.2s |
18.0s |
19.1s |
17.5s |
17.4s |
16.5s |
17.7s |
16.6s |
17.6s |
16.5s |
17.7s |
16.7s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.9s |
2.8s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.8s |
2.0s |
1.8s |
1.9s |
1.8s |
test_image_validation::test_toc_fmc_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_reserved_pauser |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox_errors::test_unknown_command_is_fatal |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_rom_integrity::test_rom_integrity_failure |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.5s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_max_fw_image |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_success |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.5s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_update_reset::test_update_reset_verify_image_failure |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_version::test_version |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.6s |
1.6s |
2.4s |
2.4s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.6s |
0.6s |
1.4s |
1.4s |
0.5s |
0.5s |
0.5s |
1.3s |
1.3s |
0.7s |
0.6s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
1.1s |
1.1s |
1.4s |
1.4s |
0.8s |
0.8s |
0.8s |
1.3s |
1.3s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
2.4s |
2.4s |
2.8s |
2.8s |
1.9s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
tests_get_idev_csr::test_get_csr |
1.0s |
0.9s |
1.0s |
0.9s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.2s |
2.2s |
2.3s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.6s |
3.7s |
3.6s |
3.6s |
3.0s |
3.0s |
3.1s |
3.0s |
3.0s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.5s |
2.4s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.1s |
2.7s |
2.2s |
2.1s |
2.4s |
2.2s |
2.1s |
2.1s |
2.7s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.6s |
2.7s |
2.6s |
2.7s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.2s |
1.9s |
1.8s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.2s |
1.3s |
1.4s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.4s |
1.2s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.5s |
1.2s |
1.2s |
1.6s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.2s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.2s |
1.3s |
1.7s |
1.2s |
1.3s |
1.5s |
1.3s |
1.2s |
1.2s |
1.6s |
1.3s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
2.5s |
2.4s |
2.6s |
2.5s |
2.4s |
3.1s |
2.7s |
2.6s |
2.7s |
2.7s |
2.6s |
2.6s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.4s |
2.2s |
2.3s |
2.3s |
2.3s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.4s |
1.4s |
1.2s |
1.3s |
1.4s |
1.3s |
1.2s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.4s |
1.6s |
1.4s |
1.5s |
1.4s |
1.8s |
1.6s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.6s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
1.0s |
test_boot::test_boot_tci_data |
1.8s |
1.8s |
1.7s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
0.9s |
1.2s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.1s |
0.9s |
1.1s |
1.1s |
test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.3s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.6s |
1.0s |
1.2s |
1.2s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.4s |
1.3s |
1.4s |
1.1s |
1.7s |
1.3s |
test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
0.8s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
1.1s |
1.0s |
test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.1s |
1.4s |
1.0s |
1.2s |
1.2s |
test_boot::test_stress_update |
400.3s |
406.9s |
394.5s |
403.1s |
326.9s |
333.8s |
340.4s |
336.0s |
336.0s |
335.1s |
329.5s |
333.3s |
324.5s |
314.4s |
309.9s |
331.7s |
311.4s |
314.5s |
305.9s |
333.3s |
312.3s |
test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.5s |
2.0s |
2.0s |
1.9s |
1.8s |
2.2s |
2.2s |
2.0s |
1.9s |
2.2s |
2.3s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.5s |
1.3s |
1.2s |
1.5s |
1.3s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
4.8s |
5.7s |
5.7s |
4.4s |
4.0s |
4.0s |
3.8s |
3.9s |
3.6s |
3.8s |
3.8s |
3.8s |
3.7s |
3.9s |
3.7s |
test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.3s |
3.3s |
3.3s |
2.7s |
2.7s |
2.7s |
2.7s |
2.7s |
2.3s |
2.1s |
2.2s |
2.2s |
2.6s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.4s |
4.4s |
4.4s |
4.5s |
4.6s |
4.4s |
4.6s |
4.6s |
4.5s |
4.4s |
4.5s |
4.4s |
test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_ecdsa::test_ecdsa_verify_cmd |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_fw_info |
4.4s |
4.4s |
4.3s |
4.4s |
3.6s |
3.6s |
3.7s |
3.6s |
3.7s |
3.8s |
3.7s |
3.8s |
3.7s |
3.6s |
3.5s |
3.7s |
3.5s |
3.7s |
3.5s |
3.7s |
3.6s |
test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.7s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
test_lms::test_lms_verify_failure |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_pcr_quote |
1.8s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.8s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.4s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.7s |
1.6s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.7s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
2.0s |
2.0s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.6s |
1.6s |
1.3s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.5s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.5s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.2s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.2s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.5s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.7s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.2s |
4.3s |
3.5s |
3.5s |
3.6s |
3.5s |
3.5s |
3.7s |
3.7s |
3.6s |
3.6s |
3.4s |
3.3s |
3.5s |
3.4s |
3.5s |
3.4s |
3.5s |
3.4s |
test_stash_measurement::test_stash_measurement |
2.6s |
2.7s |
2.6s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.7s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_context_has_tag_validation |
2.6s |
2.7s |
2.6s |
2.6s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
2.0s |
1.9s |
1.8s |
1.7s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.8s |
test_update_reset::test_context_tags_validation |
2.6s |
2.7s |
2.6s |
2.6s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
1.9s |
1.8s |
1.8s |
1.7s |
1.9s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
2.0s |
2.0s |
1.8s |
2.0s |
1.9s |
test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
2.0s |
1.9s |
test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.8s |
2.8s |
2.9s |
2.7s |
2.6s |
2.5s |
2.7s |
2.6s |
2.7s |
2.6s |
2.6s |
2.7s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.6s |
2.7s |
2.6s |
2.6s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_tags_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.8s |
2.8s |
2.7s |
2.6s |
2.5s |
2.7s |
2.7s |
2.6s |
2.6s |
2.7s |
2.7s |
test_warm_reset::test_mbox_busy_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.8s |
1.8s |
1.8s |
2.6s |
2.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
2.6s |
2.6s |
2.9s |
2.9s |
2.0s |
2.0s |
2.0s |
2.7s |
2.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.7s |
test_warm_reset::test_rt_journey_pcr_validation |
2.6s |
2.6s |
2.9s |
2.9s |
2.0s |
2.0s |
2.0s |
2.7s |
2.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.4s |
0.3s |
0.3s |
0.4s |
0.3s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
jtag_test::gdb_test |
7.0s |
7.0s |
7.0s |
7.0s |
6.5s |
6.5s |
6.5s |
6.5s |
6.5s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
3.3s |
3.2s |
3.2s |
3.2s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.9s |
3.2s |
2.7s |
2.8s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.3s |
2.6s |
2.3s |
2.7s |
2.2s |
2.3s |
2.3s |
2.2s |
2.5s |
2.2s |
2.3s |
2.2s |
test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.2s |
7.2s |
8.0s |
7.3s |
8.0s |
7.3s |
7.4s |
7.1s |
8.1s |
6.7s |
7.5s |
7.5s |
warm_reset::warm_reset_basic |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
1.9s |
2.6s |
2.6s |
1.8s |
1.7s |
1.9s |
1.9s |
1.9s |
1.7s |
1.5s |
1.5s |
1.9s |
1.5s |
1.5s |
1.7s |
warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
0.5s |
1.3s |
1.3s |
0.8s |
0.6s |
0.8s |
0.7s |
0.7s |
0.6s |
0.6s |
0.5s |
0.7s |
0.5s |
0.6s |
0.7s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
1.3s |
0.9s |
1.2s |
1.2s |
1.0s |
0.9s |
0.9s |
1.0s |
0.9s |
0.8s |
0.9s |
1.0s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
1.1s |
0.7s |
0.6s |
0.7s |
0.8s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.9s |
0.7s |
0.6s |
0.7s |
0.9s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
fw_load::fw_load_error_fmc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.8s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.4s |
fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.9s |
1.6s |
1.8s |
1.8s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
2.0s |
1.7s |
1.7s |
1.9s |
1.8s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.9s |
1.7s |
1.7s |
2.0s |
1.8s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
2.0s |
1.6s |
1.8s |
2.1s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.0s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.0s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.0s |
1.8s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
1.7s |
1.6s |
1.8s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.9s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.6s |
1.7s |
1.7s |
1.8s |
1.9s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.6s |
1.7s |
1.7s |
1.9s |
1.8s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_header_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.6s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.8s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.8s |
1.9s |
1.5s |
1.8s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.9s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
1.7s |
2.0s |
2.0s |
2.2s |
2.3s |
2.0s |
2.1s |
1.6s |
1.6s |
1.7s |
1.6s |
2.2s |
1.7s |
1.7s |
1.7s |
fw_load::fw_load_error_owner_lms_verify_failure |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.7s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
1.9s |
1.9s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
1.9s |
2.2s |
2.0s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
1.9s |
2.4s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
2.0s |
1.9s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
2.0s |
1.9s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
2.0s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
1.9s |
1.7s |
1.8s |
1.7s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
1.9s |
1.8s |
1.8s |
1.8s |
fw_load::fw_load_error_toc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
2.2s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.7s |
2.7s |
2.8s |
2.8s |
2.8s |
2.8s |
2.9s |
2.8s |
2.6s |
2.5s |
2.7s |
3.0s |
2.8s |
2.6s |
2.6s |
2.6s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.5s |
2.5s |
2.7s |
2.7s |
2.7s |
2.7s |
2.8s |
2.7s |
2.5s |
2.4s |
2.5s |
2.8s |
2.6s |
2.5s |
2.5s |
2.4s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.5s |
2.6s |
2.6s |
2.8s |
2.8s |
2.8s |
2.7s |
3.1s |
2.8s |
2.7s |
2.5s |
2.5s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.4s |
3.4s |
3.4s |
3.3s |
2.6s |
2.6s |
2.6s |
2.8s |
2.8s |
3.8s |
3.5s |
4.2s |
3.9s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
2.8s |
2.7s |
2.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
2.0s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
2.1s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.8s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.9s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
1.8s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.8s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
1.6s |
1.6s |
1.5s |
1.5s |
1.7s |
1.5s |
1.7s |
1.6s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
1.4s |
1.4s |
1.4s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.7s |
2.6s |
2.6s |
2.8s |
2.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
security_parameters::attempt_ssp_access_fw_load |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.2s |
2.0s |
2.0s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.3s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.4s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.2s |
2.1s |
2.1s |
2.1s |
self_tests::kat_halt_check_no_output |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
8.5s |
9.2s |
9.7s |
9.6s |
9.4s |
9.3s |
8.8s |
8.7s |
8.9s |
8.8s |
9.5s |
9.3s |
self_tests::kat_hmac384_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
self_tests::kat_hmac384_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.1s |
2.3s |
2.2s |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.7s |
2.1s |
self_tests::kat_lms_digest_mismatch_rom |
1.4s |
1.4s |
1.9s |
1.9s |
1.0s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
1.9s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.9s |
2.1s |
1.9s |
2.1s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha256_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
1.9s |
2.1s |
1.9s |
2.0s |
2.1s |
2.0s |
2.0s |
self_tests::kat_sha256_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.9s |
2.1s |
1.9s |
2.0s |
2.1s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
1.9s |
2.1s |
1.9s |
2.1s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
1.1s |
1.1s |
1.1s |
1.2s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.9s |
2.2s |
1.9s |
2.0s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
1.9s |
2.1s |
1.9s |
2.0s |
2.0s |
2.2s |
2.0s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
1.9s |
2.1s |
1.9s |
2.0s |
2.0s |
2.1s |
2.0s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
1.9s |
2.1s |
1.9s |
2.1s |
2.0s |
2.1s |
2.1s |
services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.6s |
2.6s |
2.5s |
2.5s |
2.2s |
2.4s |
2.4s |
2.3s |
2.3s |
2.1s |
2.3s |
2.1s |
2.2s |
2.2s |
2.3s |
2.2s |
services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.7s |
services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.1s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.8s |
0.6s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.44s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.44s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 101.19s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 107.40s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 101.83s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 102.35s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.16s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.30s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.52s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.15s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.44s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.00s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.61s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.14s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
19,989 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,013 UART: csrng::test_entropy_src_seed...[ok]
439,241 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
19,852 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,929 UART: csrng::test_entropy_src_seed...[ok]
439,211 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
19,885 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,764 UART: csrng::test_entropy_src_seed...[ok]
438,977 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
20,114 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,042 UART: csrng::test_entropy_src_seed...[ok]
439,279 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
16,818 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,624 writing to cptra_bootfsm_go
19,212 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
16,707 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
16,677 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
15,922 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
15,788 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
15,915 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
15,949 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
15,795 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
15,666 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
15,971 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
15,893 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
15,902 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
15,694 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
15,880 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
16,352 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,151 writing to cptra_bootfsm_go
16,869 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
15,798 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
15,916 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
15,922 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,810 writing to cptra_bootfsm_go
16,547 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
15,706 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
16,051 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
16,064 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
15,734 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
15,771 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
15,803 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
16,013 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
16,116 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
15,854 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
15,883 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
16,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,976 writing to cptra_bootfsm_go
16,701 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
15,875 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
15,902 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
15,900 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
15,842 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
16,067 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
15,951 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
16,067 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
16,318 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
15,883 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
15,838 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
16,001 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
15,960 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
16,184 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
15,911 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
16,054 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
15,992 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
15,952 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
15,792 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
15,780 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
16,091 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
15,926 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
15,952 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
15,689 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
15,772 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
15,987 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
15,927 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
15,920 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
15,937 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
15,950 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
15,859 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
15,971 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
21,905 UART: doe::test_decrypt...[ok]
13,265,171 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
21,744 UART: doe::test_decrypt...[ok]
13,248,921 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
21,963 UART: doe::test_decrypt...[ok]
13,456,542 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
21,865 UART: doe::test_decrypt...[ok]
13,457,822 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
21,662 UART: doe::test_decrypt...[ok]
9,942,675 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
21,724 UART: doe::test_decrypt...[ok]
9,940,520 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
21,785 UART: doe::test_decrypt...[ok]
9,943,842 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
21,864 UART: doe::test_decrypt...[ok]
10,192,400 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
22,071 UART: doe::test_decrypt...[ok]
10,192,963 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,687 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,467 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,427 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,853 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,951 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,641 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,207 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,999 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,867 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,153 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,841 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,743 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
22,054 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
22,340 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
22,606 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
22,547 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
22,344 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
22,174 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,826 writing to cptra_bootfsm_go
22,023 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
22,567 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
22,537 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
29,582 UART: ecc384::test_kat...[ok]
3,323,450 UART: ecc384::test_gen_key_pair...[ok]
6,615,170 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,898,210 UART: ecc384::test_sign...[ok]
12,194,568 UART: ecc384::test_verify...[ok]
15,789,383 UART: ecc384::test_verify_r...[ok]
19,370,693 UART: ecc384::test_verify_failure...[ok]
22,956,308 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,826,323 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,981,102 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
29,700 UART: ecc384::test_kat...[ok]
3,329,519 UART: ecc384::test_gen_key_pair...[ok]
6,615,076 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,894,091 UART: ecc384::test_sign...[ok]
12,194,472 UART: ecc384::test_verify...[ok]
15,792,297 UART: ecc384::test_verify_r...[ok]
19,372,388 UART: ecc384::test_verify_failure...[ok]
22,955,145 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,824,483 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,981,191 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
7,535 writing to cptra_bootfsm_go
34,324 UART: ecc384::test_kat...[ok]
3,701,299 UART: ecc384::test_gen_key_pair...[ok]
6,961,322 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,218,983 UART: ecc384::test_sign...[ok]
12,507,408 UART: ecc384::test_verify...[ok]
16,085,171 UART: ecc384::test_verify_r...[ok]
23,832,660 UART: ecc384::test_verify_failure...[ok]
27,412,755 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,244,502 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,327,866 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
30,057 UART: ecc384::test_kat...[ok]
3,696,616 UART: ecc384::test_gen_key_pair...[ok]
6,954,846 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,209,057 UART: ecc384::test_sign...[ok]
12,497,886 UART: ecc384::test_verify...[ok]
16,075,993 UART: ecc384::test_verify_r...[ok]
23,829,740 UART: ecc384::test_verify_failure...[ok]
27,406,626 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,240,484 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,325,453 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
29,593 UART: ecc384::test_kat...[ok]
2,497,312 UART: ecc384::test_gen_key_pair...[ok]
4,954,401 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,405,036 UART: ecc384::test_sign...[ok]
9,127,897 UART: ecc384::test_verify...[ok]
11,822,815 UART: ecc384::test_verify_r...[ok]
14,505,098 UART: ecc384::test_verify_failure...[ok]
17,194,693 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,338,616 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,927,964 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
29,591 UART: ecc384::test_kat...[ok]
2,496,457 UART: ecc384::test_gen_key_pair...[ok]
4,951,483 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,401,731 UART: ecc384::test_sign...[ok]
9,125,764 UART: ecc384::test_verify...[ok]
11,815,810 UART: ecc384::test_verify_r...[ok]
14,504,582 UART: ecc384::test_verify_failure...[ok]
17,192,776 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,335,035 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,929,506 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
29,592 UART: ecc384::test_kat...[ok]
2,496,508 UART: ecc384::test_gen_key_pair...[ok]
4,952,134 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,141 UART: ecc384::test_sign...[ok]
9,124,337 UART: ecc384::test_verify...[ok]
11,817,588 UART: ecc384::test_verify_r...[ok]
14,503,589 UART: ecc384::test_verify_failure...[ok]
17,192,736 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,336,761 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,927,864 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
29,906 UART: ecc384::test_kat...[ok]
2,881,674 UART: ecc384::test_gen_key_pair...[ok]
5,327,573 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,767,787 UART: ecc384::test_sign...[ok]
9,484,151 UART: ecc384::test_verify...[ok]
12,165,194 UART: ecc384::test_verify_r...[ok]
14,843,260 UART: ecc384::test_verify_failure...[ok]
22,932,491 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,046,063 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,601,422 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
29,832 UART: ecc384::test_kat...[ok]
2,879,607 UART: ecc384::test_gen_key_pair...[ok]
5,324,003 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,765,288 UART: ecc384::test_sign...[ok]
9,478,719 UART: ecc384::test_verify...[ok]
12,160,936 UART: ecc384::test_verify_r...[ok]
14,837,581 UART: ecc384::test_verify_failure...[ok]
22,936,519 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,050,370 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,610,207 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,765 UART: ecc384::test_gen_key_pair...[ok]
25,647 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,385 UART: ecc384::test_sign...[ok]
42,877 UART: ecc384::test_verify...[ok]
51,999 UART: ecc384::test_verify_r...[ok]
60,340 UART: ecc384::test_verify_failure...[ok]
69,464 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,262 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,775 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,219 UART: ecc384::test_gen_key_pair...[ok]
25,107 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,799 UART: ecc384::test_sign...[ok]
42,715 UART: ecc384::test_verify...[ok]
51,725 UART: ecc384::test_verify_r...[ok]
60,218 UART: ecc384::test_verify_failure...[ok]
69,260 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,954 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,775 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,593 UART: ecc384::test_gen_key_pair...[ok]
25,667 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,857 UART: ecc384::test_sign...[ok]
43,061 UART: ecc384::test_verify...[ok]
52,503 UART: ecc384::test_verify_r...[ok]
61,258 UART: ecc384::test_verify_failure...[ok]
69,962 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,812 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,339 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,003 UART: ecc384::test_gen_key_pair...[ok]
26,523 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,959 UART: ecc384::test_sign...[ok]
43,693 UART: ecc384::test_verify...[ok]
53,283 UART: ecc384::test_verify_r...[ok]
62,072 UART: ecc384::test_verify_failure...[ok]
71,098 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
90,052 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
118,575 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,191 UART: ecc384::test_gen_key_pair...[ok]
25,243 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,877 UART: ecc384::test_sign...[ok]
42,541 UART: ecc384::test_verify...[ok]
51,835 UART: ecc384::test_verify_r...[ok]
60,698 UART: ecc384::test_verify_failure...[ok]
69,288 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,762 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,875 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,325 UART: ecc384::test_gen_key_pair...[ok]
25,395 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,801 UART: ecc384::test_sign...[ok]
42,547 UART: ecc384::test_verify...[ok]
51,523 UART: ecc384::test_verify_r...[ok]
60,106 UART: ecc384::test_verify_failure...[ok]
68,976 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,018 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,909 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,019 UART: ecc384::test_gen_key_pair...[ok]
26,355 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,039 UART: ecc384::test_sign...[ok]
43,979 UART: ecc384::test_verify...[ok]
52,913 UART: ecc384::test_verify_r...[ok]
61,534 UART: ecc384::test_verify_failure...[ok]
70,432 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,318 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,717 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,859 UART: ecc384::test_gen_key_pair...[ok]
26,325 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,789 UART: ecc384::test_sign...[ok]
43,633 UART: ecc384::test_verify...[ok]
53,019 UART: ecc384::test_verify_r...[ok]
61,808 UART: ecc384::test_verify_failure...[ok]
70,554 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,240 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,881 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,589 UART: ecc384::test_gen_key_pair...[ok]
25,177 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,595 UART: ecc384::test_sign...[ok]
42,317 UART: ecc384::test_verify...[ok]
51,835 UART: ecc384::test_verify_r...[ok]
60,242 UART: ecc384::test_verify_failure...[ok]
68,934 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,306 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,835 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,579 UART: ecc384::test_gen_key_pair...[ok]
25,675 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,171 UART: ecc384::test_sign...[ok]
43,079 UART: ecc384::test_verify...[ok]
52,315 UART: ecc384::test_verify_r...[ok]
60,824 UART: ecc384::test_verify_failure...[ok]
69,980 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,326 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,623 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,045 UART: ecc384::test_gen_key_pair...[ok]
26,355 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,499 UART: ecc384::test_sign...[ok]
43,311 UART: ecc384::test_verify...[ok]
52,513 UART: ecc384::test_verify_r...[ok]
61,132 UART: ecc384::test_verify_failure...[ok]
70,394 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,750 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,643 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,055 UART: ecc384::test_gen_key_pair...[ok]
26,147 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,593 UART: ecc384::test_sign...[ok]
43,487 UART: ecc384::test_verify...[ok]
52,569 UART: ecc384::test_verify_r...[ok]
61,184 UART: ecc384::test_verify_failure...[ok]
70,146 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,418 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,115 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
19,416 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
19,407 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
19,499 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
19,583 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
19,300 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
19,611 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
19,365 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
19,665 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
19,676 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
13,745 UART: error_reporter::test_report_fw_error...[ok]
16,746 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
13,649 UART: error_reporter::test_report_fw_error...[ok]
16,631 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
14,030 UART: error_reporter::test_report_fw_error...[ok]
17,038 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
14,045 UART: error_reporter::test_report_fw_error...[ok]
17,083 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
13,775 UART: error_reporter::test_report_fw_error...[ok]
16,785 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
13,682 UART: error_reporter::test_report_fw_error...[ok]
16,708 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
13,738 UART: error_reporter::test_report_fw_error...[ok]
16,659 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
14,009 UART: error_reporter::test_report_fw_error...[ok]
16,983 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
13,864 UART: error_reporter::test_report_fw_error...[ok]
16,872 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
30,971 UART: hmac384::test_kat...[ok]
69,977 UART: hmac384::test_hmac0...[ok]
87,294 UART: hmac384::test_hmac1...[ok]
109,033 UART: hmac384::test_hmac2...[ok]
6,698,155 UART: hmac384::test_hmac3...[ok]
13,265,814 UART: hmac384::test_hmac4...[ok]
19,856,901 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,448,280 UART: hmac384::test_hmac5...[ok]
29,822,124 UART: hmac384::test_kdf0...[ok]
33,148,604 UART: hmac384::test_kdf1...[ok]
36,473,086 UART: hmac384::test_kdf2...[ok]
36,503,332 UART: hmac384::test_hmac_multi_block...[ok]
36,522,287 UART: hmac384::test_hmac_exact_single_block...[ok]
36,543,461 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
31,007 UART: hmac384::test_kat...[ok]
70,213 UART: hmac384::test_hmac0...[ok]
88,005 UART: hmac384::test_hmac1...[ok]
108,345 UART: hmac384::test_hmac2...[ok]
6,675,280 UART: hmac384::test_hmac3...[ok]
13,244,226 UART: hmac384::test_hmac4...[ok]
19,838,184 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,428,047 UART: hmac384::test_hmac5...[ok]
29,798,301 UART: hmac384::test_kdf0...[ok]
33,123,951 UART: hmac384::test_kdf1...[ok]
36,449,984 UART: hmac384::test_kdf2...[ok]
36,478,431 UART: hmac384::test_hmac_multi_block...[ok]
36,497,434 UART: hmac384::test_hmac_exact_single_block...[ok]
36,519,875 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
30,995 UART: hmac384::test_kat...[ok]
454,587 UART: hmac384::test_hmac0...[ok]
653,494 UART: hmac384::test_hmac1...[ok]
859,661 UART: hmac384::test_hmac2...[ok]
7,560,556 UART: hmac384::test_hmac3...[ok]
14,068,812 UART: hmac384::test_hmac4...[ok]
20,581,784 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,097,207 UART: hmac384::test_hmac5...[ok]
30,374,907 UART: hmac384::test_kdf0...[ok]
33,646,783 UART: hmac384::test_kdf1...[ok]
36,915,495 UART: hmac384::test_kdf2...[ok]
36,929,013 UART: hmac384::test_hmac_multi_block...[ok]
40,330,677 UART: hmac384::test_hmac_exact_single_block...[ok]
40,534,671 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
31,104 UART: hmac384::test_kat...[ok]
456,064 UART: hmac384::test_hmac0...[ok]
653,228 UART: hmac384::test_hmac1...[ok]
858,065 UART: hmac384::test_hmac2...[ok]
7,564,761 UART: hmac384::test_hmac3...[ok]
14,071,478 UART: hmac384::test_hmac4...[ok]
20,584,844 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,098,534 UART: hmac384::test_hmac5...[ok]
30,374,821 UART: hmac384::test_kdf0...[ok]
33,647,537 UART: hmac384::test_kdf1...[ok]
36,916,187 UART: hmac384::test_kdf2...[ok]
36,932,268 UART: hmac384::test_hmac_multi_block...[ok]
40,329,414 UART: hmac384::test_hmac_exact_single_block...[ok]
40,535,237 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
30,692 UART: hmac384::test_kat...[ok]
70,241 UART: hmac384::test_hmac0...[ok]
87,903 UART: hmac384::test_hmac1...[ok]
109,106 UART: hmac384::test_hmac2...[ok]
5,036,228 UART: hmac384::test_hmac3...[ok]
9,961,036 UART: hmac384::test_hmac4...[ok]
14,888,140 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,812,183 UART: hmac384::test_hmac5...[ok]
22,351,541 UART: hmac384::test_kdf0...[ok]
24,846,071 UART: hmac384::test_kdf1...[ok]
27,343,837 UART: hmac384::test_kdf2...[ok]
27,370,501 UART: hmac384::test_hmac_multi_block...[ok]
27,388,074 UART: hmac384::test_hmac_exact_single_block...[ok]
27,410,311 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
30,641 UART: hmac384::test_kat...[ok]
70,610 UART: hmac384::test_hmac0...[ok]
87,627 UART: hmac384::test_hmac1...[ok]
109,826 UART: hmac384::test_hmac2...[ok]
5,035,124 UART: hmac384::test_hmac3...[ok]
9,962,901 UART: hmac384::test_hmac4...[ok]
14,888,435 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,784 UART: hmac384::test_hmac5...[ok]
22,355,734 UART: hmac384::test_kdf0...[ok]
24,852,932 UART: hmac384::test_kdf1...[ok]
27,347,293 UART: hmac384::test_kdf2...[ok]
27,373,215 UART: hmac384::test_hmac_multi_block...[ok]
27,391,767 UART: hmac384::test_hmac_exact_single_block...[ok]
27,413,440 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
30,621 UART: hmac384::test_kat...[ok]
71,346 UART: hmac384::test_hmac0...[ok]
88,567 UART: hmac384::test_hmac1...[ok]
110,754 UART: hmac384::test_hmac2...[ok]
5,035,472 UART: hmac384::test_hmac3...[ok]
9,963,229 UART: hmac384::test_hmac4...[ok]
14,890,320 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,042 UART: hmac384::test_hmac5...[ok]
22,356,233 UART: hmac384::test_kdf0...[ok]
24,853,267 UART: hmac384::test_kdf1...[ok]
27,348,461 UART: hmac384::test_kdf2...[ok]
27,375,734 UART: hmac384::test_hmac_multi_block...[ok]
27,394,303 UART: hmac384::test_hmac_exact_single_block...[ok]
27,415,689 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
31,070 UART: hmac384::test_kat...[ok]
454,718 UART: hmac384::test_hmac0...[ok]
652,943 UART: hmac384::test_hmac1...[ok]
858,686 UART: hmac384::test_hmac2...[ok]
5,930,230 UART: hmac384::test_hmac3...[ok]
10,812,536 UART: hmac384::test_hmac4...[ok]
15,691,721 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,575,099 UART: hmac384::test_hmac5...[ok]
23,035,468 UART: hmac384::test_kdf0...[ok]
25,490,503 UART: hmac384::test_kdf1...[ok]
27,940,278 UART: hmac384::test_kdf2...[ok]
27,954,512 UART: hmac384::test_hmac_multi_block...[ok]
27,967,474 UART: hmac384::test_hmac_exact_single_block...[ok]
27,980,354 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
31,412 UART: hmac384::test_kat...[ok]
455,291 UART: hmac384::test_hmac0...[ok]
652,906 UART: hmac384::test_hmac1...[ok]
858,013 UART: hmac384::test_hmac2...[ok]
5,929,291 UART: hmac384::test_hmac3...[ok]
10,804,830 UART: hmac384::test_hmac4...[ok]
15,681,697 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,559,684 UART: hmac384::test_hmac5...[ok]
23,017,736 UART: hmac384::test_kdf0...[ok]
25,471,880 UART: hmac384::test_kdf1...[ok]
27,925,406 UART: hmac384::test_kdf2...[ok]
27,940,604 UART: hmac384::test_hmac_multi_block...[ok]
27,953,352 UART: hmac384::test_hmac_exact_single_block...[ok]
27,966,102 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,704 UART: hmac384::test_hmac0...[ok]
13,921 UART: hmac384::test_hmac1...[ok]
17,858 UART: hmac384::test_hmac2...[ok]
37,865 UART: hmac384::test_hmac3...[ok]
57,697 UART: hmac384::test_hmac4...[ok]
77,260 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,971 UART: hmac384::test_hmac5...[ok]
120,559 UART: hmac384::test_kdf0...[ok]
137,031 UART: hmac384::test_kdf1...[ok]
152,633 UART: hmac384::test_kdf2...[ok]
158,186 UART: hmac384::test_hmac_multi_block...[ok]
164,035 UART: hmac384::test_hmac_exact_single_block...[ok]
169,855 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,874 UART: hmac384::test_hmac0...[ok]
13,805 UART: hmac384::test_hmac1...[ok]
17,800 UART: hmac384::test_hmac2...[ok]
37,961 UART: hmac384::test_hmac3...[ok]
58,565 UART: hmac384::test_hmac4...[ok]
77,938 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,833 UART: hmac384::test_hmac5...[ok]
121,473 UART: hmac384::test_kdf0...[ok]
137,725 UART: hmac384::test_kdf1...[ok]
153,927 UART: hmac384::test_kdf2...[ok]
159,524 UART: hmac384::test_hmac_multi_block...[ok]
165,381 UART: hmac384::test_hmac_exact_single_block...[ok]
171,435 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,898 UART: hmac384::test_hmac0...[ok]
14,009 UART: hmac384::test_hmac1...[ok]
18,184 UART: hmac384::test_hmac2...[ok]
37,813 UART: hmac384::test_hmac3...[ok]
57,597 UART: hmac384::test_hmac4...[ok]
77,438 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,413 UART: hmac384::test_hmac5...[ok]
121,551 UART: hmac384::test_kdf0...[ok]
138,075 UART: hmac384::test_kdf1...[ok]
153,503 UART: hmac384::test_kdf2...[ok]
159,152 UART: hmac384::test_hmac_multi_block...[ok]
164,891 UART: hmac384::test_hmac_exact_single_block...[ok]
170,901 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,996 UART: hmac384::test_hmac0...[ok]
14,217 UART: hmac384::test_hmac1...[ok]
18,276 UART: hmac384::test_hmac2...[ok]
38,403 UART: hmac384::test_hmac3...[ok]
58,057 UART: hmac384::test_hmac4...[ok]
77,878 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,563 UART: hmac384::test_hmac5...[ok]
122,783 UART: hmac384::test_kdf0...[ok]
139,591 UART: hmac384::test_kdf1...[ok]
156,067 UART: hmac384::test_kdf2...[ok]
161,764 UART: hmac384::test_hmac_multi_block...[ok]
167,757 UART: hmac384::test_hmac_exact_single_block...[ok]
173,927 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,716 UART: hmac384::test_hmac0...[ok]
13,697 UART: hmac384::test_hmac1...[ok]
17,672 UART: hmac384::test_hmac2...[ok]
36,935 UART: hmac384::test_hmac3...[ok]
56,491 UART: hmac384::test_hmac4...[ok]
75,998 UART: hmac384::test_hmac_kv_multiblock...[ok]
99,599 UART: hmac384::test_hmac5...[ok]
119,239 UART: hmac384::test_kdf0...[ok]
136,039 UART: hmac384::test_kdf1...[ok]
150,861 UART: hmac384::test_kdf2...[ok]
156,600 UART: hmac384::test_hmac_multi_block...[ok]
162,407 UART: hmac384::test_hmac_exact_single_block...[ok]
168,359 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,734 UART: hmac384::test_hmac0...[ok]
13,817 UART: hmac384::test_hmac1...[ok]
17,980 UART: hmac384::test_hmac2...[ok]
37,823 UART: hmac384::test_hmac3...[ok]
57,833 UART: hmac384::test_hmac4...[ok]
78,140 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,081 UART: hmac384::test_hmac5...[ok]
121,635 UART: hmac384::test_kdf0...[ok]
138,061 UART: hmac384::test_kdf1...[ok]
153,497 UART: hmac384::test_kdf2...[ok]
159,088 UART: hmac384::test_hmac_multi_block...[ok]
164,929 UART: hmac384::test_hmac_exact_single_block...[ok]
170,827 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,754 UART: hmac384::test_hmac0...[ok]
13,869 UART: hmac384::test_hmac1...[ok]
17,888 UART: hmac384::test_hmac2...[ok]
37,807 UART: hmac384::test_hmac3...[ok]
58,169 UART: hmac384::test_hmac4...[ok]
78,236 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,499 UART: hmac384::test_hmac5...[ok]
122,801 UART: hmac384::test_kdf0...[ok]
139,715 UART: hmac384::test_kdf1...[ok]
155,257 UART: hmac384::test_kdf2...[ok]
160,934 UART: hmac384::test_hmac_multi_block...[ok]
166,955 UART: hmac384::test_hmac_exact_single_block...[ok]
173,079 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,900 UART: hmac384::test_hmac0...[ok]
14,015 UART: hmac384::test_hmac1...[ok]
18,086 UART: hmac384::test_hmac2...[ok]
38,379 UART: hmac384::test_hmac3...[ok]
58,693 UART: hmac384::test_hmac4...[ok]
78,812 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,709 UART: hmac384::test_hmac5...[ok]
122,801 UART: hmac384::test_kdf0...[ok]
139,833 UART: hmac384::test_kdf1...[ok]
155,917 UART: hmac384::test_kdf2...[ok]
161,438 UART: hmac384::test_hmac_multi_block...[ok]
167,341 UART: hmac384::test_hmac_exact_single_block...[ok]
173,409 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,652 UART: hmac384::test_hmac0...[ok]
13,749 UART: hmac384::test_hmac1...[ok]
17,950 UART: hmac384::test_hmac2...[ok]
37,729 UART: hmac384::test_hmac3...[ok]
57,987 UART: hmac384::test_hmac4...[ok]
77,878 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,245 UART: hmac384::test_hmac5...[ok]
120,931 UART: hmac384::test_kdf0...[ok]
137,423 UART: hmac384::test_kdf1...[ok]
152,983 UART: hmac384::test_kdf2...[ok]
158,558 UART: hmac384::test_hmac_multi_block...[ok]
164,405 UART: hmac384::test_hmac_exact_single_block...[ok]
170,389 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,578 UART: hmac384::test_hmac0...[ok]
13,603 UART: hmac384::test_hmac1...[ok]
17,666 UART: hmac384::test_hmac2...[ok]
37,425 UART: hmac384::test_hmac3...[ok]
57,113 UART: hmac384::test_hmac4...[ok]
76,754 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,909 UART: hmac384::test_hmac5...[ok]
121,175 UART: hmac384::test_kdf0...[ok]
137,547 UART: hmac384::test_kdf1...[ok]
153,339 UART: hmac384::test_kdf2...[ok]
158,802 UART: hmac384::test_hmac_multi_block...[ok]
164,859 UART: hmac384::test_hmac_exact_single_block...[ok]
170,925 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,686 UART: hmac384::test_hmac0...[ok]
13,873 UART: hmac384::test_hmac1...[ok]
18,198 UART: hmac384::test_hmac2...[ok]
38,181 UART: hmac384::test_hmac3...[ok]
58,443 UART: hmac384::test_hmac4...[ok]
78,934 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,201 UART: hmac384::test_hmac5...[ok]
122,939 UART: hmac384::test_kdf0...[ok]
139,757 UART: hmac384::test_kdf1...[ok]
155,239 UART: hmac384::test_kdf2...[ok]
160,892 UART: hmac384::test_hmac_multi_block...[ok]
166,923 UART: hmac384::test_hmac_exact_single_block...[ok]
172,995 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,978 UART: hmac384::test_hmac0...[ok]
14,285 UART: hmac384::test_hmac1...[ok]
18,524 UART: hmac384::test_hmac2...[ok]
38,749 UART: hmac384::test_hmac3...[ok]
58,949 UART: hmac384::test_hmac4...[ok]
79,346 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,683 UART: hmac384::test_hmac5...[ok]
123,769 UART: hmac384::test_kdf0...[ok]
140,247 UART: hmac384::test_kdf1...[ok]
156,213 UART: hmac384::test_kdf2...[ok]
162,070 UART: hmac384::test_hmac_multi_block...[ok]
168,141 UART: hmac384::test_hmac_exact_single_block...[ok]
174,195 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,817 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
23,393 UART: test_lms_24::test_coefficient...[ok]
26,072 UART: test_lms_24::test_get_lms_parameters...[ok]
29,049 UART: test_lms_24::test_hash_message_24...[ok]
41,801 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
23,584 UART: test_lms_24::test_coefficient...[ok]
26,372 UART: test_lms_24::test_get_lms_parameters...[ok]
29,348 UART: test_lms_24::test_hash_message_24...[ok]
42,065 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
23,881 UART: test_lms_24::test_coefficient...[ok]
26,596 UART: test_lms_24::test_get_lms_parameters...[ok]
29,545 UART: test_lms_24::test_hash_message_24...[ok]
42,316 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
24,529 UART: test_lms_24::test_coefficient...[ok]
26,723 UART: test_lms_24::test_get_lms_parameters...[ok]
29,684 UART: test_lms_24::test_hash_message_24...[ok]
42,451 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
23,951 UART: test_lms_24::test_coefficient...[ok]
27,074 UART: test_lms_24::test_get_lms_parameters...[ok]
30,500 UART: test_lms_24::test_hash_message_24...[ok]
43,946 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
23,678 UART: test_lms_24::test_coefficient...[ok]
26,807 UART: test_lms_24::test_get_lms_parameters...[ok]
31,523 UART: test_lms_24::test_hash_message_24...[ok]
43,656 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
23,793 UART: test_lms_24::test_coefficient...[ok]
26,865 UART: test_lms_24::test_get_lms_parameters...[ok]
30,394 UART: test_lms_24::test_hash_message_24...[ok]
43,778 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
24,067 UART: test_lms_24::test_coefficient...[ok]
27,193 UART: test_lms_24::test_get_lms_parameters...[ok]
30,670 UART: test_lms_24::test_hash_message_24...[ok]
44,046 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
23,972 UART: test_lms_24::test_coefficient...[ok]
27,098 UART: test_lms_24::test_get_lms_parameters...[ok]
30,623 UART: test_lms_24::test_hash_message_24...[ok]
43,987 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
22,892 UART: test_lms_32::test_hash_message_32...[ok]
42,036 UART: test_lms_32::test_ots_32...[ok]
21,831,131 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,181 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
22,662 UART: test_lms_32::test_hash_message_32...[ok]
41,871 UART: test_lms_32::test_ots_32...[ok]
21,830,932 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,009 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
23,092 UART: test_lms_32::test_hash_message_32...[ok]
42,267 UART: test_lms_32::test_ots_32...[ok]
21,831,385 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,413 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
22,826 UART: test_lms_32::test_hash_message_32...[ok]
42,015 UART: test_lms_32::test_ots_32...[ok]
21,831,190 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,285 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
22,857 UART: test_lms_32::test_hash_message_32...[ok]
42,165 UART: test_lms_32::test_ots_32...[ok]
653,189 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,072 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
23,040 UART: test_lms_32::test_hash_message_32...[ok]
42,276 UART: test_lms_32::test_ots_32...[ok]
653,360 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,222 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
22,795 UART: test_lms_32::test_hash_message_32...[ok]
42,082 UART: test_lms_32::test_ots_32...[ok]
653,101 UART: test_lms_32::test_lms_lower_32...[ok]
1,969,956 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
23,419 UART: test_lms_32::test_hash_message_32...[ok]
42,660 UART: test_lms_32::test_ots_32...[ok]
653,722 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,607 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
23,265 UART: test_lms_32::test_hash_message_32...[ok]
42,487 UART: test_lms_32::test_ots_32...[ok]
653,573 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,425 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,249 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,395 UART: cmd: 0x50000000
19,246 UART: dlen: 8
20,256 >>> mbox cmd response: success
20,745 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,634 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,340 UART: cmd: 0x50000000
29,231 UART: dlen: 7
30,286 >>> mbox cmd response: success
30,766 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,784 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,490 UART: cmd: 0x50000000
39,378 UART: dlen: 0
40,383 >>> mbox cmd response: success
40,829 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,125 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,827 UART: cmd: 0x50000001
49,715 UART: dlen: 5
50,765 >>> mbox cmd response: success
51,238 UART: buf: [01, 23, 45, 67, 89]
55,882 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,579 UART: cmd: 0x50000001
58,459 UART: dlen: 6
59,505 >>> mbox cmd response: success
59,983 UART: buf: [01, 23, 45, 67, 89]
64,630 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,331 UART: cmd: 0x50000001
67,213 UART: dlen: 9
68,257 >>> mbox cmd response: success
68,727 UART: buf: [01, 23, 45, 67, 89]
73,381 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,091 UART: cmd: 0x60000000
75,974 UART: dlen: 16
77,502 UART: buf: [67452301, efcdab89]
81,049 UART: buf: [33221100, 77665544]
84,151 >>> mbox cmd response: success
84,416 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,113 UART: cmd: 0x60000000
86,998 UART: dlen: 13
88,527 UART: buf: [67452301, efcdab89]
92,017 UART: buf: [33221100, 00000044]
95,394 >>> mbox cmd response: success
95,657 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,352 UART: cmd: 0x60000000
98,233 UART: dlen: 12
99,715 UART: buf: [67452301, efcdab89]
103,230 UART: buf: [33221100, 00000000]
106,614 >>> mbox cmd response: success
106,875 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,547 UART: cmd: 0x60000000
109,427 UART: dlen: 0
110,473 >>> mbox cmd response: success
110,734 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,414 UART: cmd: 0x70000000
113,014 >>> mbox cmd response: success
113,278 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,962 UART: cmd: 0x60000000
116,344 UART: dlen: 5
117,332 UART: buf: [04050607, 00000003]
120,837 >>> mbox cmd response: success
121,105 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,791 UART: cmd: 0x80000000
123,405 >>> mbox cmd response: failed
123,717 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,402 UART: cmd: 0x60000000
126,283 UART: dlen: 5
127,774 UART: buf: [04050607, 00000003]
131,255 >>> mbox cmd response: success
131,515 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,216 UART: cmd: 0x90000000
134,096 UART: dlen: 8
135,537 UART: buf: [08070605]
137,622 >>> mbox cmd response: success
137,884 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,556 UART: cmd: 0xa0000000
140,113 >>> mbox cmd response data (4 bytes)
140,518 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,210 UART: cmd: 0xb0000000
143,113 UART: dlen: 6
144,596 UART: buf: [0c0d0e0f, 00000a0b]
148,158 >>> mbox cmd response data (2 bytes)
148,531 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,214 UART: cmd: 0xc0000000
150,883 >>> mbox cmd response data (9 bytes)
151,276 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,956 UART: cmd: 0xd0000000
153,519 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,410 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,594 UART: cmd: 0x50000000
19,403 UART: dlen: 8
20,412 >>> mbox cmd response: success
20,899 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,765 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,466 UART: cmd: 0x50000000
29,352 UART: dlen: 7
30,402 >>> mbox cmd response: success
30,876 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,843 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,554 UART: cmd: 0x50000000
39,449 UART: dlen: 0
40,447 >>> mbox cmd response: success
40,872 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,152 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,613 UART: cmd: 0x50000001
49,742 UART: dlen: 5
50,807 >>> mbox cmd response: success
51,285 UART: buf: [01, 23, 45, 67, 89]
55,881 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,579 UART: cmd: 0x50000001
58,460 UART: dlen: 6
59,506 >>> mbox cmd response: success
59,982 UART: buf: [01, 23, 45, 67, 89]
64,621 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,325 UART: cmd: 0x50000001
67,225 UART: dlen: 9
68,276 >>> mbox cmd response: success
68,749 UART: buf: [01, 23, 45, 67, 89]
73,334 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,046 UART: cmd: 0x60000000
75,933 UART: dlen: 16
77,413 UART: buf: [67452301, efcdab89]
80,964 UART: buf: [33221100, 77665544]
84,120 >>> mbox cmd response: success
84,384 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,085 UART: cmd: 0x60000000
86,971 UART: dlen: 13
88,450 UART: buf: [67452301, efcdab89]
91,999 UART: buf: [33221100, 00000044]
95,378 >>> mbox cmd response: success
95,643 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,358 UART: cmd: 0x60000000
98,246 UART: dlen: 12
99,724 UART: buf: [67452301, efcdab89]
103,221 UART: buf: [33221100, 00000000]
106,587 >>> mbox cmd response: success
106,851 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,545 UART: cmd: 0x60000000
109,424 UART: dlen: 0
110,471 >>> mbox cmd response: success
110,732 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,416 UART: cmd: 0x70000000
113,010 >>> mbox cmd response: success
113,270 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,956 UART: cmd: 0x60000000
115,837 UART: dlen: 5
117,326 UART: buf: [04050607, 00000003]
120,838 >>> mbox cmd response: success
121,102 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,780 UART: cmd: 0x80000000
123,373 >>> mbox cmd response: failed
123,676 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,359 UART: cmd: 0x60000000
126,238 UART: dlen: 5
127,933 UART: buf: [04050607, 00000003]
131,186 >>> mbox cmd response: success
131,443 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,130 UART: cmd: 0x90000000
134,016 UART: dlen: 8
135,462 UART: buf: [08070605]
137,547 >>> mbox cmd response: success
137,811 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,487 UART: cmd: 0xa0000000
140,074 >>> mbox cmd response data (4 bytes)
140,484 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,179 UART: cmd: 0xb0000000
143,064 UART: dlen: 6
144,551 UART: buf: [0c0d0e0f, 00000a0b]
148,110 >>> mbox cmd response data (2 bytes)
148,484 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,167 UART: cmd: 0xc0000000
150,836 >>> mbox cmd response data (9 bytes)
151,227 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,907 UART: cmd: 0xd0000000
153,467 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,902 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
18,037 UART: cmd: 0x50000000
19,880 UART: dlen: 8
20,926 >>> mbox cmd response: success
21,388 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,338 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,055 UART: cmd: 0x50000000
29,931 UART: dlen: 7
31,014 >>> mbox cmd response: success
31,456 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,479 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,187 UART: cmd: 0x50000000
40,070 UART: dlen: 0
41,051 >>> mbox cmd response: success
41,496 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,828 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,537 UART: cmd: 0x50000001
50,428 UART: dlen: 5
51,477 >>> mbox cmd response: success
51,955 UART: buf: [01, 23, 45, 67, 89]
56,615 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,351 UART: cmd: 0x50000001
59,244 UART: dlen: 6
60,298 >>> mbox cmd response: success
60,773 UART: buf: [01, 23, 45, 67, 89]
65,374 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,085 UART: cmd: 0x50000001
67,968 UART: dlen: 9
69,019 >>> mbox cmd response: success
69,498 UART: buf: [01, 23, 45, 67, 89]
74,086 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,800 UART: cmd: 0x60000000
76,684 UART: dlen: 16
78,166 UART: buf: [67452301, efcdab89]
81,719 UART: buf: [33221100, 77665544]
84,886 >>> mbox cmd response: success
85,157 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,877 UART: cmd: 0x60000000
87,769 UART: dlen: 13
89,257 UART: buf: [67452301, efcdab89]
92,758 UART: buf: [33221100, 00000044]
96,140 >>> mbox cmd response: success
96,406 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,100 UART: cmd: 0x60000000
98,982 UART: dlen: 12
100,464 UART: buf: [67452301, efcdab89]
103,957 UART: buf: [33221100, 00000000]
107,341 >>> mbox cmd response: success
107,606 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,286 UART: cmd: 0x60000000
110,166 UART: dlen: 0
111,218 >>> mbox cmd response: success
111,483 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,188 UART: cmd: 0x70000000
113,781 >>> mbox cmd response: success
114,042 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,738 UART: cmd: 0x60000000
116,620 UART: dlen: 5
118,105 UART: buf: [04050607, 00000003]
121,590 >>> mbox cmd response: success
121,853 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,536 UART: cmd: 0x80000000
124,127 >>> mbox cmd response: failed
124,436 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,125 UART: cmd: 0x60000000
127,011 UART: dlen: 5
128,453 UART: buf: [04050607, 00000003]
131,942 >>> mbox cmd response: success
132,200 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,906 UART: cmd: 0x90000000
134,789 UART: dlen: 8
136,262 UART: buf: [08070605]
138,307 >>> mbox cmd response: success
138,575 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,257 UART: cmd: 0xa0000000
140,817 >>> mbox cmd response data (4 bytes)
141,220 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,918 UART: cmd: 0xb0000000
143,805 UART: dlen: 6
145,291 UART: buf: [0c0d0e0f, 00000a0b]
148,873 >>> mbox cmd response data (2 bytes)
149,259 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,950 UART: cmd: 0xc0000000
151,633 >>> mbox cmd response data (9 bytes)
152,031 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,747 UART: cmd: 0xd0000000
154,366 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,549 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,704 UART: cmd: 0x50000000
19,539 UART: dlen: 8
20,599 >>> mbox cmd response: success
21,053 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,997 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,725 UART: cmd: 0x50000000
29,587 UART: dlen: 7
30,697 >>> mbox cmd response: success
31,136 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,218 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,980 UART: cmd: 0x50000000
39,814 UART: dlen: 0
40,851 >>> mbox cmd response: success
41,246 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,582 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,287 UART: cmd: 0x50000001
50,172 UART: dlen: 5
51,219 >>> mbox cmd response: success
51,698 UART: buf: [01, 23, 45, 67, 89]
56,348 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,056 UART: cmd: 0x50000001
58,945 UART: dlen: 6
59,959 >>> mbox cmd response: success
60,490 UART: buf: [01, 23, 45, 67, 89]
65,078 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,792 UART: cmd: 0x50000001
67,675 UART: dlen: 9
68,728 >>> mbox cmd response: success
69,207 UART: buf: [01, 23, 45, 67, 89]
73,802 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,518 UART: cmd: 0x60000000
76,410 UART: dlen: 16
77,892 UART: buf: [67452301, efcdab89]
81,445 UART: buf: [33221100, 77665544]
84,592 >>> mbox cmd response: success
84,859 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,561 UART: cmd: 0x60000000
87,482 UART: dlen: 13
88,944 UART: buf: [67452301, efcdab89]
92,457 UART: buf: [33221100, 00000044]
95,834 >>> mbox cmd response: success
96,101 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,798 UART: cmd: 0x60000000
98,687 UART: dlen: 12
100,169 UART: buf: [67452301, efcdab89]
103,668 UART: buf: [33221100, 00000000]
107,057 >>> mbox cmd response: success
107,324 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,006 UART: cmd: 0x60000000
109,895 UART: dlen: 0
110,943 >>> mbox cmd response: success
111,209 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,946 UART: cmd: 0x70000000
113,540 >>> mbox cmd response: success
113,820 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,514 UART: cmd: 0x60000000
116,397 UART: dlen: 5
117,885 UART: buf: [04050607, 00000003]
121,381 >>> mbox cmd response: success
121,648 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,332 UART: cmd: 0x80000000
123,927 >>> mbox cmd response: failed
124,234 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,924 UART: cmd: 0x60000000
126,808 UART: dlen: 5
128,248 UART: buf: [04050607, 00000003]
131,738 >>> mbox cmd response: success
131,996 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,686 UART: cmd: 0x90000000
134,571 UART: dlen: 8
136,029 UART: buf: [08070605]
138,072 >>> mbox cmd response: success
138,336 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,015 UART: cmd: 0xa0000000
140,584 >>> mbox cmd response data (4 bytes)
140,989 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,687 UART: cmd: 0xb0000000
143,569 UART: dlen: 6
145,053 UART: buf: [0c0d0e0f, 00000a0b]
148,620 >>> mbox cmd response data (2 bytes)
149,002 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,694 UART: cmd: 0xc0000000
151,369 >>> mbox cmd response data (9 bytes)
151,762 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,445 UART: cmd: 0xd0000000
154,014 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,363 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,557 UART: cmd: 0x50000000
19,333 UART: dlen: 8
20,391 >>> mbox cmd response: success
20,829 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,717 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,420 UART: cmd: 0x50000000
29,303 UART: dlen: 7
30,355 >>> mbox cmd response: success
30,827 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,842 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,532 UART: cmd: 0x50000000
39,425 UART: dlen: 0
40,439 >>> mbox cmd response: success
40,859 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,140 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,836 UART: cmd: 0x50000001
49,718 UART: dlen: 5
50,766 >>> mbox cmd response: success
51,241 UART: buf: [01, 23, 45, 67, 89]
55,893 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,600 UART: cmd: 0x50000001
58,487 UART: dlen: 6
59,539 >>> mbox cmd response: success
60,012 UART: buf: [01, 23, 45, 67, 89]
64,599 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,300 UART: cmd: 0x50000001
67,186 UART: dlen: 9
68,232 >>> mbox cmd response: success
68,723 UART: buf: [01, 23, 45, 67, 89]
73,302 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,006 UART: cmd: 0x60000000
75,891 UART: dlen: 16
77,422 UART: buf: [67452301, efcdab89]
80,970 UART: buf: [33221100, 77665544]
84,063 >>> mbox cmd response: success
84,326 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,019 UART: cmd: 0x60000000
86,954 UART: dlen: 13
88,381 UART: buf: [67452301, efcdab89]
91,932 UART: buf: [33221100, 00000044]
95,300 >>> mbox cmd response: success
95,560 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,247 UART: cmd: 0x60000000
98,122 UART: dlen: 12
99,619 UART: buf: [67452301, efcdab89]
103,117 UART: buf: [33221100, 00000000]
106,488 >>> mbox cmd response: success
106,743 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,413 UART: cmd: 0x60000000
109,303 UART: dlen: 0
110,349 >>> mbox cmd response: success
110,609 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,284 UART: cmd: 0x70000000
112,871 >>> mbox cmd response: success
113,127 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,807 UART: cmd: 0x60000000
115,679 UART: dlen: 5
117,215 UART: buf: [04050607, 00000003]
120,701 >>> mbox cmd response: success
120,956 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,653 UART: cmd: 0x80000000
123,245 >>> mbox cmd response: failed
123,547 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,227 UART: cmd: 0x60000000
126,097 UART: dlen: 5
127,592 UART: buf: [04050607, 00000003]
131,080 >>> mbox cmd response: success
131,337 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,016 UART: cmd: 0x90000000
134,148 UART: dlen: 8
135,378 UART: buf: [08070605]
137,429 >>> mbox cmd response: success
137,695 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,369 UART: cmd: 0xa0000000
139,929 >>> mbox cmd response data (4 bytes)
140,331 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,041 UART: cmd: 0xb0000000
142,924 UART: dlen: 6
144,405 UART: buf: [0c0d0e0f, 00000a0b]
148,009 >>> mbox cmd response data (2 bytes)
148,387 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,066 UART: cmd: 0xc0000000
150,739 >>> mbox cmd response data (9 bytes)
151,128 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,802 UART: cmd: 0xd0000000
153,360 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
3,246 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,434 UART: cmd: 0x50000000
19,549 UART: dlen: 8
20,271 >>> mbox cmd response: success
20,756 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,606 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,312 UART: cmd: 0x50000000
29,203 UART: dlen: 7
30,253 >>> mbox cmd response: success
30,725 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,690 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,378 UART: cmd: 0x50000000
39,278 UART: dlen: 0
40,273 >>> mbox cmd response: success
40,692 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,978 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,676 UART: cmd: 0x50000001
49,559 UART: dlen: 5
50,653 >>> mbox cmd response: success
51,126 UART: buf: [01, 23, 45, 67, 89]
55,708 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,404 UART: cmd: 0x50000001
58,283 UART: dlen: 6
59,326 >>> mbox cmd response: success
59,805 UART: buf: [01, 23, 45, 67, 89]
64,441 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,142 UART: cmd: 0x50000001
67,022 UART: dlen: 9
68,094 >>> mbox cmd response: success
68,572 UART: buf: [01, 23, 45, 67, 89]
73,161 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,870 UART: cmd: 0x60000000
75,757 UART: dlen: 16
77,233 UART: buf: [67452301, efcdab89]
80,784 UART: buf: [33221100, 77665544]
83,938 >>> mbox cmd response: success
84,199 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,893 UART: cmd: 0x60000000
86,827 UART: dlen: 13
88,301 UART: buf: [67452301, efcdab89]
91,793 UART: buf: [33221100, 00000044]
95,174 >>> mbox cmd response: success
95,437 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,129 UART: cmd: 0x60000000
98,026 UART: dlen: 12
99,511 UART: buf: [67452301, efcdab89]
103,013 UART: buf: [33221100, 00000000]
106,393 >>> mbox cmd response: success
106,654 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,327 UART: cmd: 0x60000000
109,200 UART: dlen: 0
110,246 >>> mbox cmd response: success
110,502 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,180 UART: cmd: 0x70000000
112,765 >>> mbox cmd response: success
113,016 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,704 UART: cmd: 0x60000000
115,591 UART: dlen: 5
117,072 UART: buf: [04050607, 00000003]
120,562 >>> mbox cmd response: success
120,840 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,517 UART: cmd: 0x80000000
123,108 >>> mbox cmd response: failed
123,412 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,088 UART: cmd: 0x60000000
125,974 UART: dlen: 5
127,460 UART: buf: [04050607, 00000003]
130,942 >>> mbox cmd response: success
131,200 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,881 UART: cmd: 0x90000000
133,757 UART: dlen: 8
135,195 UART: buf: [08070605]
137,278 >>> mbox cmd response: success
137,534 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,239 UART: cmd: 0xa0000000
139,793 >>> mbox cmd response data (4 bytes)
140,208 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,898 UART: cmd: 0xb0000000
142,775 UART: dlen: 6
144,255 UART: buf: [0c0d0e0f, 00000a0b]
147,863 >>> mbox cmd response data (2 bytes)
148,235 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,909 UART: cmd: 0xc0000000
150,574 >>> mbox cmd response data (9 bytes)
150,962 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,638 UART: cmd: 0xd0000000
153,199 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
3,232 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,433 UART: cmd: 0x50000000
19,235 UART: dlen: 8
20,242 >>> mbox cmd response: success
20,730 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,684 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,415 UART: cmd: 0x50000000
29,259 UART: dlen: 7
30,370 >>> mbox cmd response: success
30,845 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,812 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,501 UART: cmd: 0x50000000
39,390 UART: dlen: 0
40,384 >>> mbox cmd response: success
40,809 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,095 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,805 UART: cmd: 0x50000001
49,704 UART: dlen: 5
50,753 >>> mbox cmd response: success
51,226 UART: buf: [01, 23, 45, 67, 89]
55,827 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,525 UART: cmd: 0x50000001
58,403 UART: dlen: 6
59,458 >>> mbox cmd response: success
59,932 UART: buf: [01, 23, 45, 67, 89]
64,568 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,270 UART: cmd: 0x50000001
67,145 UART: dlen: 9
68,194 >>> mbox cmd response: success
68,666 UART: buf: [01, 23, 45, 67, 89]
73,301 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,011 UART: cmd: 0x60000000
75,895 UART: dlen: 16
77,393 UART: buf: [67452301, efcdab89]
80,939 UART: buf: [33221100, 77665544]
84,088 >>> mbox cmd response: success
84,354 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,075 UART: cmd: 0x60000000
87,010 UART: dlen: 13
88,487 UART: buf: [67452301, efcdab89]
91,978 UART: buf: [33221100, 00000044]
95,348 >>> mbox cmd response: success
95,609 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,296 UART: cmd: 0x60000000
98,172 UART: dlen: 12
99,695 UART: buf: [67452301, efcdab89]
103,199 UART: buf: [33221100, 00000000]
106,535 >>> mbox cmd response: success
106,802 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,495 UART: cmd: 0x60000000
109,374 UART: dlen: 0
110,420 >>> mbox cmd response: success
110,683 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,359 UART: cmd: 0x70000000
112,949 >>> mbox cmd response: success
113,202 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,885 UART: cmd: 0x60000000
115,758 UART: dlen: 5
117,246 UART: buf: [04050607, 00000003]
120,731 >>> mbox cmd response: success
120,992 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,688 UART: cmd: 0x80000000
123,278 >>> mbox cmd response: failed
123,581 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,262 UART: cmd: 0x60000000
126,156 UART: dlen: 5
127,591 UART: buf: [04050607, 00000003]
131,128 >>> mbox cmd response: success
131,383 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,082 UART: cmd: 0x90000000
133,959 UART: dlen: 8
135,392 UART: buf: [08070605]
137,475 >>> mbox cmd response: success
137,735 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,404 UART: cmd: 0xa0000000
139,958 >>> mbox cmd response data (4 bytes)
140,359 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,051 UART: cmd: 0xb0000000
142,934 UART: dlen: 6
144,416 UART: buf: [0c0d0e0f, 00000a0b]
147,967 >>> mbox cmd response data (2 bytes)
148,354 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,034 UART: cmd: 0xc0000000
150,704 >>> mbox cmd response data (9 bytes)
151,095 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,779 UART: cmd: 0xd0000000
153,332 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,550 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,717 UART: cmd: 0x50000000
19,522 UART: dlen: 8
20,565 >>> mbox cmd response: success
21,017 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,485 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,213 UART: cmd: 0x50000000
30,066 UART: dlen: 7
31,176 >>> mbox cmd response: success
31,654 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,665 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,363 UART: cmd: 0x50000000
40,273 UART: dlen: 0
41,252 >>> mbox cmd response: success
41,715 UART: buf: [00000000, 00000000, 00000000, 00000000]
48,008 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,711 UART: cmd: 0x50000001
50,594 UART: dlen: 5
51,642 >>> mbox cmd response: success
52,113 UART: buf: [01, 23, 45, 67, 89]
56,745 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,440 UART: cmd: 0x50000001
59,318 UART: dlen: 6
60,362 >>> mbox cmd response: success
60,829 UART: buf: [01, 23, 45, 67, 89]
65,464 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,162 UART: cmd: 0x50000001
68,037 UART: dlen: 9
69,081 >>> mbox cmd response: success
69,554 UART: buf: [01, 23, 45, 67, 89]
74,183 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,904 UART: cmd: 0x60000000
76,785 UART: dlen: 16
78,314 UART: buf: [67452301, efcdab89]
81,853 UART: buf: [33221100, 77665544]
84,997 >>> mbox cmd response: success
85,254 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,947 UART: cmd: 0x60000000
87,872 UART: dlen: 13
89,345 UART: buf: [67452301, efcdab89]
92,834 UART: buf: [33221100, 00000044]
96,202 >>> mbox cmd response: success
96,461 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,153 UART: cmd: 0x60000000
99,029 UART: dlen: 12
100,508 UART: buf: [67452301, efcdab89]
104,004 UART: buf: [33221100, 00000000]
108,124 >>> mbox cmd response: success
108,403 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
109,079 UART: cmd: 0x60000000
110,969 UART: dlen: 0
112,016 >>> mbox cmd response: success
112,277 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,961 UART: cmd: 0x70000000
114,548 >>> mbox cmd response: success
114,801 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,484 UART: cmd: 0x60000000
117,357 UART: dlen: 5
118,890 UART: buf: [04050607, 00000003]
122,367 >>> mbox cmd response: success
122,620 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,291 UART: cmd: 0x80000000
124,894 >>> mbox cmd response: failed
125,219 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,901 UART: cmd: 0x60000000
127,778 UART: dlen: 5
129,262 UART: buf: [04050607, 00000003]
132,739 >>> mbox cmd response: success
132,990 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,670 UART: cmd: 0x90000000
135,547 UART: dlen: 8
136,987 UART: buf: [08070605]
139,069 >>> mbox cmd response: success
139,336 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
140,049 UART: cmd: 0xa0000000
141,607 >>> mbox cmd response data (4 bytes)
142,016 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,712 UART: cmd: 0xb0000000
144,594 UART: dlen: 6
146,087 UART: buf: [0c0d0e0f, 00000a0b]
149,637 >>> mbox cmd response data (2 bytes)
150,001 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,683 UART: cmd: 0xc0000000
152,347 >>> mbox cmd response data (9 bytes)
152,729 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,404 UART: cmd: 0xd0000000
154,962 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,453 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,630 UART: cmd: 0x50000000
19,447 UART: dlen: 8
20,684 >>> mbox cmd response: success
20,924 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,877 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,605 UART: cmd: 0x50000000
29,459 UART: dlen: 7
30,629 >>> mbox cmd response: success
31,022 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,042 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,770 UART: cmd: 0x50000000
39,652 UART: dlen: 0
40,681 >>> mbox cmd response: success
41,118 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,389 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,086 UART: cmd: 0x50000001
49,969 UART: dlen: 5
51,020 >>> mbox cmd response: success
51,491 UART: buf: [01, 23, 45, 67, 89]
56,133 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,832 UART: cmd: 0x50000001
58,708 UART: dlen: 6
59,753 >>> mbox cmd response: success
60,275 UART: buf: [01, 23, 45, 67, 89]
64,851 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,550 UART: cmd: 0x50000001
67,450 UART: dlen: 9
68,491 >>> mbox cmd response: success
68,963 UART: buf: [01, 23, 45, 67, 89]
73,543 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,249 UART: cmd: 0x60000000
76,177 UART: dlen: 16
77,649 UART: buf: [67452301, efcdab89]
81,190 UART: buf: [33221100, 77665544]
84,337 >>> mbox cmd response: success
84,590 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,281 UART: cmd: 0x60000000
87,219 UART: dlen: 13
88,696 UART: buf: [67452301, efcdab89]
92,187 UART: buf: [33221100, 00000044]
95,602 >>> mbox cmd response: success
95,878 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,589 UART: cmd: 0x60000000
98,477 UART: dlen: 12
99,958 UART: buf: [67452301, efcdab89]
103,459 UART: buf: [33221100, 00000000]
106,836 >>> mbox cmd response: success
107,097 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,801 UART: cmd: 0x60000000
109,680 UART: dlen: 0
110,725 >>> mbox cmd response: success
110,982 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,660 UART: cmd: 0x70000000
113,249 >>> mbox cmd response: success
113,500 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,198 UART: cmd: 0x60000000
116,072 UART: dlen: 5
117,614 UART: buf: [04050607, 00000003]
121,118 >>> mbox cmd response: success
121,376 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,053 UART: cmd: 0x80000000
123,646 >>> mbox cmd response: failed
123,944 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,624 UART: cmd: 0x60000000
126,504 UART: dlen: 5
127,989 UART: buf: [04050607, 00000003]
131,471 >>> mbox cmd response: success
131,726 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,405 UART: cmd: 0x90000000
134,281 UART: dlen: 8
135,770 UART: buf: [08070605]
137,798 >>> mbox cmd response: success
138,057 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,733 UART: cmd: 0xa0000000
140,305 >>> mbox cmd response data (4 bytes)
140,704 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,393 UART: cmd: 0xb0000000
143,274 UART: dlen: 6
144,757 UART: buf: [0c0d0e0f, 00000a0b]
148,366 >>> mbox cmd response data (2 bytes)
148,732 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,409 UART: cmd: 0xc0000000
151,074 >>> mbox cmd response data (9 bytes)
151,465 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,139 UART: cmd: 0xd0000000
153,697 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,807 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,083 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
22,020 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
22,233 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
22,330 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
22,198 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
22,318 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
22,309 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
23,000 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
22,736 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
22,623 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
11,593 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,890 UART: pcrbank::test_erase_all_pcrs...[ok]
21,040 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
11,698 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,058 UART: pcrbank::test_erase_all_pcrs...[ok]
21,196 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
11,820 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,131 UART: pcrbank::test_erase_all_pcrs...[ok]
21,307 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
11,941 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,263 UART: pcrbank::test_erase_all_pcrs...[ok]
21,399 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
11,668 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,011 UART: pcrbank::test_erase_all_pcrs...[ok]
21,144 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
11,552 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,872 UART: pcrbank::test_erase_all_pcrs...[ok]
21,023 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
11,662 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,948 UART: pcrbank::test_erase_all_pcrs...[ok]
21,116 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
11,967 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,300 UART: pcrbank::test_erase_all_pcrs...[ok]
21,475 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
11,956 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,293 UART: pcrbank::test_erase_all_pcrs...[ok]
21,411 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
11,612 UART: persistent::test_persistent_data_layout...[ok]
15,192 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
11,520 UART: persistent::test_persistent_data_layout...[ok]
15,160 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
11,870 UART: persistent::test_persistent_data_layout...[ok]
15,432 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
11,999 UART: persistent::test_persistent_data_layout...[ok]
15,561 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
11,460 UART: persistent::test_persistent_data_layout...[ok]
15,051 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
11,416 UART: persistent::test_persistent_data_layout...[ok]
14,944 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
11,428 UART: persistent::test_persistent_data_layout...[ok]
14,954 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
11,845 UART: persistent::test_persistent_data_layout...[ok]
15,426 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
11,644 UART: persistent::test_persistent_data_layout...[ok]
15,240 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
22,278 UART: sha1::test_kat...[ok]
36,215 UART: sha1::test_digest0...[ok]
49,703 UART: sha1::test_digest1...[ok]
63,256 UART: sha1::test_digest2...[ok]
86,517 UART: sha1::test_digest3...[ok]
108,407 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
22,264 UART: sha1::test_kat...[ok]
34,730 UART: sha1::test_digest0...[ok]
47,698 UART: sha1::test_digest1...[ok]
62,114 UART: sha1::test_digest2...[ok]
85,054 UART: sha1::test_digest3...[ok]
108,249 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,577 writing to cptra_bootfsm_go
22,907 UART: sha1::test_kat...[ok]
36,802 UART: sha1::test_digest0...[ok]
50,464 UART: sha1::test_digest1...[ok]
63,715 UART: sha1::test_digest2...[ok]
85,760 UART: sha1::test_digest3...[ok]
108,802 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
22,699 UART: sha1::test_kat...[ok]
35,601 UART: sha1::test_digest0...[ok]
48,409 UART: sha1::test_digest1...[ok]
62,216 UART: sha1::test_digest2...[ok]
83,945 UART: sha1::test_digest3...[ok]
105,568 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
22,342 UART: sha1::test_kat...[ok]
35,911 UART: sha1::test_digest0...[ok]
48,609 UART: sha1::test_digest1...[ok]
62,823 UART: sha1::test_digest2...[ok]
84,792 UART: sha1::test_digest3...[ok]
107,573 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
22,320 UART: sha1::test_kat...[ok]
35,027 UART: sha1::test_digest0...[ok]
49,037 UART: sha1::test_digest1...[ok]
62,431 UART: sha1::test_digest2...[ok]
83,904 UART: sha1::test_digest3...[ok]
106,537 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,604 writing to cptra_bootfsm_go
25,088 UART: sha1::test_kat...[ok]
38,661 UART: sha1::test_digest0...[ok]
52,262 UART: sha1::test_digest1...[ok]
66,265 UART: sha1::test_digest2...[ok]
87,592 UART: sha1::test_digest3...[ok]
110,184 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
22,713 UART: sha1::test_kat...[ok]
35,573 UART: sha1::test_digest0...[ok]
50,328 UART: sha1::test_digest1...[ok]
63,772 UART: sha1::test_digest2...[ok]
86,891 UART: sha1::test_digest3...[ok]
109,476 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
22,548 UART: sha1::test_kat...[ok]
37,398 UART: sha1::test_digest0...[ok]
49,681 UART: sha1::test_digest1...[ok]
62,734 UART: sha1::test_digest2...[ok]
84,077 UART: sha1::test_digest3...[ok]
107,229 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
22,200 UART: sha256::test_kat...[ok]
26,697 UART: sha256::test_digest0...[ok]
31,212 UART: sha256::test_digest1...[ok]
35,712 UART: sha256::test_digest2...[ok]
41,266 UART: sha256::test_digest3...[ok]
46,703 UART: sha256::test_op0...[ok]
51,329 UART: sha256::test_op1...[ok]
55,983 UART: sha256::test_op2...[ok]
61,201 UART: sha256::test_op3...[ok]
70,109 UART: sha256::test_op4...[ok]
81,969 UART: sha256::test_op5...[ok]
65,235,343 UART: sha256::test_op6...[ok]
65,257,936 UART: sha256::test_op7...[ok]
65,274,050 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
22,014 UART: sha256::test_kat...[ok]
26,453 UART: sha256::test_digest0...[ok]
30,979 UART: sha256::test_digest1...[ok]
35,483 UART: sha256::test_digest2...[ok]
41,017 UART: sha256::test_digest3...[ok]
46,497 UART: sha256::test_op0...[ok]
51,188 UART: sha256::test_op1...[ok]
55,793 UART: sha256::test_op2...[ok]
61,014 UART: sha256::test_op3...[ok]
69,913 UART: sha256::test_op4...[ok]
81,762 UART: sha256::test_op5...[ok]
65,235,095 UART: sha256::test_op6...[ok]
65,257,728 UART: sha256::test_op7...[ok]
65,273,894 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
22,408 UART: sha256::test_kat...[ok]
26,874 UART: sha256::test_digest0...[ok]
31,357 UART: sha256::test_digest1...[ok]
35,902 UART: sha256::test_digest2...[ok]
41,400 UART: sha256::test_digest3...[ok]
46,932 UART: sha256::test_op0...[ok]
51,559 UART: sha256::test_op1...[ok]
56,162 UART: sha256::test_op2...[ok]
61,407 UART: sha256::test_op3...[ok]
70,311 UART: sha256::test_op4...[ok]
82,168 UART: sha256::test_op5...[ok]
65,235,461 UART: sha256::test_op6...[ok]
65,258,165 UART: sha256::test_op7...[ok]
65,274,250 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
22,388 UART: sha256::test_kat...[ok]
26,895 UART: sha256::test_digest0...[ok]
31,385 UART: sha256::test_digest1...[ok]
35,868 UART: sha256::test_digest2...[ok]
41,441 UART: sha256::test_digest3...[ok]
46,954 UART: sha256::test_op0...[ok]
51,572 UART: sha256::test_op1...[ok]
56,170 UART: sha256::test_op2...[ok]
61,416 UART: sha256::test_op3...[ok]
70,286 UART: sha256::test_op4...[ok]
82,155 UART: sha256::test_op5...[ok]
65,235,593 UART: sha256::test_op6...[ok]
65,258,117 UART: sha256::test_op7...[ok]
65,274,284 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
21,993 UART: sha256::test_kat...[ok]
26,352 UART: sha256::test_digest0...[ok]
30,831 UART: sha256::test_digest1...[ok]
35,258 UART: sha256::test_digest2...[ok]
40,730 UART: sha256::test_digest3...[ok]
46,145 UART: sha256::test_op0...[ok]
50,693 UART: sha256::test_op1...[ok]
55,250 UART: sha256::test_op2...[ok]
60,424 UART: sha256::test_op3...[ok]
69,280 UART: sha256::test_op4...[ok]
81,074 UART: sha256::test_op5...[ok]
64,968,764 UART: sha256::test_op6...[ok]
64,991,234 UART: sha256::test_op7...[ok]
65,007,242 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
22,188 UART: sha256::test_kat...[ok]
26,605 UART: sha256::test_digest0...[ok]
31,037 UART: sha256::test_digest1...[ok]
35,494 UART: sha256::test_digest2...[ok]
40,953 UART: sha256::test_digest3...[ok]
46,373 UART: sha256::test_op0...[ok]
50,923 UART: sha256::test_op1...[ok]
55,483 UART: sha256::test_op2...[ok]
60,664 UART: sha256::test_op3...[ok]
69,508 UART: sha256::test_op4...[ok]
81,317 UART: sha256::test_op5...[ok]
64,968,982 UART: sha256::test_op6...[ok]
64,991,446 UART: sha256::test_op7...[ok]
65,007,461 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
21,789 UART: sha256::test_kat...[ok]
26,230 UART: sha256::test_digest0...[ok]
30,662 UART: sha256::test_digest1...[ok]
36,497 UART: sha256::test_digest2...[ok]
40,551 UART: sha256::test_digest3...[ok]
45,972 UART: sha256::test_op0...[ok]
50,527 UART: sha256::test_op1...[ok]
55,078 UART: sha256::test_op2...[ok]
60,251 UART: sha256::test_op3...[ok]
69,100 UART: sha256::test_op4...[ok]
80,901 UART: sha256::test_op5...[ok]
64,968,642 UART: sha256::test_op6...[ok]
64,991,071 UART: sha256::test_op7...[ok]
65,007,033 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
22,183 UART: sha256::test_kat...[ok]
26,590 UART: sha256::test_digest0...[ok]
31,072 UART: sha256::test_digest1...[ok]
35,483 UART: sha256::test_digest2...[ok]
41,017 UART: sha256::test_digest3...[ok]
46,370 UART: sha256::test_op0...[ok]
50,936 UART: sha256::test_op1...[ok]
55,483 UART: sha256::test_op2...[ok]
60,688 UART: sha256::test_op3...[ok]
69,526 UART: sha256::test_op4...[ok]
81,331 UART: sha256::test_op5...[ok]
64,969,064 UART: sha256::test_op6...[ok]
64,991,443 UART: sha256::test_op7...[ok]
65,007,472 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
22,362 UART: sha256::test_kat...[ok]
26,733 UART: sha256::test_digest0...[ok]
31,210 UART: sha256::test_digest1...[ok]
35,677 UART: sha256::test_digest2...[ok]
41,125 UART: sha256::test_digest3...[ok]
46,528 UART: sha256::test_op0...[ok]
51,099 UART: sha256::test_op1...[ok]
55,648 UART: sha256::test_op2...[ok]
60,824 UART: sha256::test_op3...[ok]
69,650 UART: sha256::test_op4...[ok]
81,459 UART: sha256::test_op5...[ok]
64,969,093 UART: sha256::test_op6...[ok]
64,991,609 UART: sha256::test_op7...[ok]
65,007,565 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
21,522 UART: sha2_512_384acc::test_kat...[ok]
26,276 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,395 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,213 UART: sha2_512_384acc::test_digest0...[ok]
1,071,483 UART: sha2_512_384acc::test_digest1...[ok]
1,079,436 UART: sha2_512_384acc::test_digest2...[ok]
1,087,478 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
21,321 UART: sha2_512_384acc::test_kat...[ok]
26,057 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,194 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,013 UART: sha2_512_384acc::test_digest0...[ok]
1,071,281 UART: sha2_512_384acc::test_digest1...[ok]
1,079,240 UART: sha2_512_384acc::test_digest2...[ok]
1,087,258 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
22,862 UART: sha2_512_384acc::test_kat...[ok]
27,585 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,057,726 UART: sha2_512_384acc::test_digest_offset...[ok]
1,065,534 UART: sha2_512_384acc::test_digest0...[ok]
1,072,805 UART: sha2_512_384acc::test_digest1...[ok]
1,080,786 UART: sha2_512_384acc::test_digest2...[ok]
1,088,761 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
21,676 UART: sha2_512_384acc::test_kat...[ok]
26,444 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,578 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,366 UART: sha2_512_384acc::test_digest0...[ok]
1,071,669 UART: sha2_512_384acc::test_digest1...[ok]
1,079,589 UART: sha2_512_384acc::test_digest2...[ok]
1,087,646 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
21,382 UART: sha2_512_384acc::test_kat...[ok]
26,137 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,263 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,092 UART: sha2_512_384acc::test_digest0...[ok]
1,071,365 UART: sha2_512_384acc::test_digest1...[ok]
1,079,329 UART: sha2_512_384acc::test_digest2...[ok]
1,087,319 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
22,321 UART: sha2_512_384acc::test_kat...[ok]
27,048 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,057,187 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,995 UART: sha2_512_384acc::test_digest0...[ok]
1,072,284 UART: sha2_512_384acc::test_digest1...[ok]
1,080,193 UART: sha2_512_384acc::test_digest2...[ok]
1,088,238 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
21,633 UART: sha2_512_384acc::test_kat...[ok]
26,340 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,505 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,276 UART: sha2_512_384acc::test_digest0...[ok]
1,071,577 UART: sha2_512_384acc::test_digest1...[ok]
1,079,528 UART: sha2_512_384acc::test_digest2...[ok]
1,087,578 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
21,743 UART: sha2_512_384acc::test_kat...[ok]
26,527 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,655 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,455 UART: sha2_512_384acc::test_digest0...[ok]
1,071,727 UART: sha2_512_384acc::test_digest1...[ok]
1,079,684 UART: sha2_512_384acc::test_digest2...[ok]
1,087,725 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
21,848 UART: sha2_512_384acc::test_kat...[ok]
26,577 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,701 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,515 UART: sha2_512_384acc::test_digest0...[ok]
1,071,782 UART: sha2_512_384acc::test_digest1...[ok]
1,079,735 UART: sha2_512_384acc::test_digest2...[ok]
1,087,775 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
24,506 UART: sha384::test_kat...[ok]
33,385 UART: sha384::test_digest0...[ok]
42,175 UART: sha384::test_digest1...[ok]
51,572 UART: sha384::test_digest2...[ok]
60,569 UART: sha384::test_digest3...[ok]
72,232 UART: sha384::test_op0...[ok]
79,128 UART: sha384::test_op1...[ok]
86,024 UART: sha384::test_op2...[ok]
93,824 UART: sha384::test_op3...[ok]
104,672 UART: sha384::test_op4...[ok]
120,667 UART: sha384::test_op5...[ok]
69,348,296 UART: sha384::test_op6...[ok]
69,379,210 UART: sha384::test_op7...[ok]
69,409,832 UART: sha384::test_op8...[ok]
69,439,226 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,559 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,239 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,886 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
24,381 UART: sha384::test_kat...[ok]
31,574 UART: sha384::test_digest0...[ok]
40,655 UART: sha384::test_digest1...[ok]
49,006 UART: sha384::test_digest2...[ok]
58,340 UART: sha384::test_digest3...[ok]
69,930 UART: sha384::test_op0...[ok]
76,831 UART: sha384::test_op1...[ok]
83,728 UART: sha384::test_op2...[ok]
91,519 UART: sha384::test_op3...[ok]
102,351 UART: sha384::test_op4...[ok]
118,356 UART: sha384::test_op5...[ok]
69,346,013 UART: sha384::test_op6...[ok]
69,376,903 UART: sha384::test_op7...[ok]
69,407,533 UART: sha384::test_op8...[ok]
69,436,950 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,302 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,918 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,617 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
24,888 UART: sha384::test_kat...[ok]
31,866 UART: sha384::test_digest0...[ok]
40,913 UART: sha384::test_digest1...[ok]
49,583 UART: sha384::test_digest2...[ok]
58,211 UART: sha384::test_digest3...[ok]
69,744 UART: sha384::test_op0...[ok]
76,614 UART: sha384::test_op1...[ok]
83,510 UART: sha384::test_op2...[ok]
91,304 UART: sha384::test_op3...[ok]
102,109 UART: sha384::test_op4...[ok]
118,165 UART: sha384::test_op5...[ok]
69,345,846 UART: sha384::test_op6...[ok]
69,376,652 UART: sha384::test_op7...[ok]
69,407,318 UART: sha384::test_op8...[ok]
69,436,719 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,050 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,714 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,365 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
24,903 UART: sha384::test_kat...[ok]
33,703 UART: sha384::test_digest0...[ok]
42,453 UART: sha384::test_digest1...[ok]
52,017 UART: sha384::test_digest2...[ok]
61,023 UART: sha384::test_digest3...[ok]
72,631 UART: sha384::test_op0...[ok]
79,542 UART: sha384::test_op1...[ok]
86,465 UART: sha384::test_op2...[ok]
94,262 UART: sha384::test_op3...[ok]
105,069 UART: sha384::test_op4...[ok]
121,086 UART: sha384::test_op5...[ok]
69,348,775 UART: sha384::test_op6...[ok]
69,379,597 UART: sha384::test_op7...[ok]
69,410,203 UART: sha384::test_op8...[ok]
69,439,700 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,975 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,619 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,292 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
24,507 UART: sha384::test_kat...[ok]
32,633 UART: sha384::test_digest0...[ok]
41,623 UART: sha384::test_digest1...[ok]
49,828 UART: sha384::test_digest2...[ok]
57,852 UART: sha384::test_digest3...[ok]
67,796 UART: sha384::test_op0...[ok]
74,707 UART: sha384::test_op1...[ok]
81,628 UART: sha384::test_op2...[ok]
89,398 UART: sha384::test_op3...[ok]
100,221 UART: sha384::test_op4...[ok]
116,290 UART: sha384::test_op5...[ok]
69,343,826 UART: sha384::test_op6...[ok]
69,374,753 UART: sha384::test_op7...[ok]
69,405,412 UART: sha384::test_op8...[ok]
69,434,871 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,138 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,468,815 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,484,471 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
24,432 UART: sha384::test_kat...[ok]
32,092 UART: sha384::test_digest0...[ok]
41,320 UART: sha384::test_digest1...[ok]
50,875 UART: sha384::test_digest2...[ok]
60,425 UART: sha384::test_digest3...[ok]
72,024 UART: sha384::test_op0...[ok]
78,990 UART: sha384::test_op1...[ok]
85,830 UART: sha384::test_op2...[ok]
93,622 UART: sha384::test_op3...[ok]
104,444 UART: sha384::test_op4...[ok]
120,515 UART: sha384::test_op5...[ok]
69,348,105 UART: sha384::test_op6...[ok]
69,378,998 UART: sha384::test_op7...[ok]
69,409,647 UART: sha384::test_op8...[ok]
69,439,034 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,371 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,002 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,682 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
24,400 UART: sha384::test_kat...[ok]
33,746 UART: sha384::test_digest0...[ok]
42,181 UART: sha384::test_digest1...[ok]
51,276 UART: sha384::test_digest2...[ok]
60,753 UART: sha384::test_digest3...[ok]
72,239 UART: sha384::test_op0...[ok]
79,198 UART: sha384::test_op1...[ok]
86,050 UART: sha384::test_op2...[ok]
93,857 UART: sha384::test_op3...[ok]
104,669 UART: sha384::test_op4...[ok]
120,691 UART: sha384::test_op5...[ok]
69,348,383 UART: sha384::test_op6...[ok]
69,379,185 UART: sha384::test_op7...[ok]
69,409,825 UART: sha384::test_op8...[ok]
69,439,300 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,630 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,281 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,898 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
24,906 UART: sha384::test_kat...[ok]
32,480 UART: sha384::test_digest0...[ok]
41,427 UART: sha384::test_digest1...[ok]
50,518 UART: sha384::test_digest2...[ok]
60,657 UART: sha384::test_digest3...[ok]
72,753 UART: sha384::test_op0...[ok]
79,621 UART: sha384::test_op1...[ok]
86,509 UART: sha384::test_op2...[ok]
94,295 UART: sha384::test_op3...[ok]
105,161 UART: sha384::test_op4...[ok]
121,158 UART: sha384::test_op5...[ok]
69,348,832 UART: sha384::test_op6...[ok]
69,379,695 UART: sha384::test_op7...[ok]
69,410,269 UART: sha384::test_op8...[ok]
69,439,719 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,458,090 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,673 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,400 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
24,916 UART: sha384::test_kat...[ok]
33,729 UART: sha384::test_digest0...[ok]
41,665 UART: sha384::test_digest1...[ok]
48,889 UART: sha384::test_digest2...[ok]
58,937 UART: sha384::test_digest3...[ok]
69,038 UART: sha384::test_op0...[ok]
75,998 UART: sha384::test_op1...[ok]
82,840 UART: sha384::test_op2...[ok]
90,630 UART: sha384::test_op3...[ok]
101,453 UART: sha384::test_op4...[ok]
117,482 UART: sha384::test_op5...[ok]
69,344,958 UART: sha384::test_op6...[ok]
69,375,976 UART: sha384::test_op7...[ok]
69,406,636 UART: sha384::test_op8...[ok]
69,436,102 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,421 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,065 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,707 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
13,876 UART: status_reporter::test_report_boot_status...[ok]
17,654 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,700 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
13,947 UART: status_reporter::test_report_boot_status...[ok]
17,819 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,853 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
14,237 UART: status_reporter::test_report_boot_status...[ok]
18,047 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,131 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
14,055 UART: status_reporter::test_report_boot_status...[ok]
17,841 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,925 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
13,785 UART: status_reporter::test_report_boot_status...[ok]
17,549 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,672 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
13,893 UART: status_reporter::test_report_boot_status...[ok]
17,744 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,785 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
13,727 UART: status_reporter::test_report_boot_status...[ok]
17,596 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,632 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
14,071 UART: status_reporter::test_report_boot_status...[ok]
17,899 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,962 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
13,935 UART: status_reporter::test_report_boot_status...[ok]
17,733 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,858 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,371 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,189 >>> mbox cmd response data (48 bytes)
17,874 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,537 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,334 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,158 >>> mbox cmd response data (48 bytes)
17,827 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,546 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,816 writing to cptra_bootfsm_go
3,228 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,792 >>> mbox cmd response data (48 bytes)
18,505 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,224 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,348 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,502 >>> mbox cmd response data (48 bytes)
18,160 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,928 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,131 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,662 >>> mbox cmd response data (48 bytes)
18,334 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,046 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,607 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,049 >>> mbox cmd response data (48 bytes)
424,808 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,983 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,713 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,221 >>> mbox cmd response data (48 bytes)
424,955 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,132 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,651 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,809 >>> mbox cmd response data (48 bytes)
424,559 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,734 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,438 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,842 >>> mbox cmd response data (48 bytes)
424,606 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,780 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,796 writing to cptra_bootfsm_go
3,353 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,485 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,773 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,575 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,522 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,489 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,777 writing to cptra_bootfsm_go
3,425 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,569 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,551 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f38b8000ed0`,
right: `0x7f38b8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7ff138000ed0`,
right: `0x7ff138000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f3f3c000ed0`,
right: `0x7f3f3c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f0464000ed0`,
right: `0x7f0464000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f0210000ed0`,
right: `0x7f0210000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fc198000ed0`,
right: `0x7fc198000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f5b44000ed0`,
right: `0x7f5b44000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7890000ed0`,
right: `0x7f7890000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7ff080000ed0`,
right: `0x7ff080000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f79d8000ed0`,
right: `0x7f79d8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7f08000ed0`,
right: `0x7f7f08000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7facd4000ed0`,
right: `0x7facd4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.09s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.09s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.43s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.40s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.50s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.55s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.41s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.45s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.39s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.53s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.51s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.34s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.24s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.23s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.21s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.18s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,059 UART:
192,428 UART: Running Caliptra ROM ...
193,577 UART:
193,722 UART: [state] CFI Enabled
260,942 UART: [state] LifecycleState = Unprovisioned
262,916 UART: [state] DebugLocked = No
264,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,030 UART: [kat] SHA2-256
438,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,288 UART: [kat] ++
449,815 UART: [kat] sha1
461,072 UART: [kat] SHA2-256
463,760 UART: [kat] SHA2-384
469,111 UART: [kat] SHA2-512-ACC
471,482 UART: [kat] ECC-384
2,768,444 UART: [kat] HMAC-384Kdf
2,799,873 UART: [kat] LMS
3,990,185 UART: [kat] --
3,995,800 UART: [cold-reset] ++
3,998,172 UART: [fht] Storing FHT @ 0x50003400
4,009,740 UART: [idev] ++
4,010,310 UART: [idev] CDI.KEYID = 6
4,011,235 UART: [idev] SUBJECT.KEYID = 7
4,012,479 UART: [idev] UDS.KEYID = 0
4,013,562 ready_for_fw is high
4,013,769 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,053,906 UART: [idev] Erasing UDS.KEYID = 0
7,349,561 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,499 UART: [idev] --
7,375,008 UART: [ldev] ++
7,375,580 UART: [ldev] CDI.KEYID = 6
7,376,544 UART: [ldev] SUBJECT.KEYID = 5
7,377,749 UART: [ldev] AUTHORITY.KEYID = 7
7,379,029 UART: [ldev] FE.KEYID = 1
7,424,016 UART: [ldev] Erasing FE.KEYID = 1
10,755,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,027 UART: [ldev] --
13,115,378 UART: [fwproc] Waiting for Commands...
13,118,504 UART: [fwproc] Received command 0x46574c44
13,120,737 UART: [fwproc] Received Image of size 31676 bytes
16,164,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,247,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,316,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,345,741 >>> mbox cmd response: success
16,350,610 UART: [afmc] ++
16,351,221 UART: [afmc] CDI.KEYID = 6
16,352,156 UART: [afmc] SUBJECT.KEYID = 7
16,353,426 UART: [afmc] AUTHORITY.KEYID = 5
19,725,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,025,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,028,151 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,042,562 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,057,418 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,071,909 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,092,546 UART: [afmc] --
22,096,479 UART: [cold-reset] --
22,100,642 UART: [state] Locking Datavault
22,104,890 UART: [state] Locking PCR0, PCR1 and PCR31
22,106,635 UART: [state] Locking ICCM
22,109,413 UART: [exit] Launching FMC @ 0x40000130
22,117,837 UART:
22,118,082 UART: Running Caliptra FMC ...
22,119,213 UART:
22,119,371 UART: [state] CFI Enabled
22,186,137 UART: [fht] FMC Alias Private Key: 7
24,523,811 UART: [art] Extend RT PCRs Done
24,525,070 UART: [art] Lock RT PCRs Done
24,526,609 UART: [art] Populate DV Done
24,531,844 UART: [fht] FMC Alias Private Key: 7
24,533,564 UART: [art] Derive CDI
24,534,326 UART: [art] Store in in slot 0x4
24,593,760 UART: [art] Derive Key Pair
24,594,828 UART: [art] Store priv key in slot 0x5
27,887,935 UART: [art] Derive Key Pair - Done
27,900,808 UART: [art] Signing Cert with AUTHO
27,902,184 UART: RITY.KEYID = 7
30,190,042 UART: [art] Erasing AUTHORITY.KEYID = 7
30,191,611 UART: [art] PUB.X = 43687FC17CBFA2A8B3A09AD20BBB09B5B7F78BD07AEAF2E07A34E2CA1B7C4011F4E3C75619FBBF949F95A2ADA4D492AC
30,198,831 UART: [art] PUB.Y = 0A4D5A3C795107DBBF07CF74087C6A8E30051DFB921C5EAE9F9C883E942ACCA78BBA1E82722C436F729C8634B39C66F7
30,206,054 UART: [art] SIG.R = 1FE2AD675AC413FC9749F14BE0DDED3FFA8FE8536AE4E95355F51089FC4C9A49BD064DD6FCCEBD0983C48757E89604FE
30,213,471 UART: [art] SIG.S = DF8A273D1B8342F6616E87527A8BA86CEECBF127A3221E3C7A1EE947F9A3956E61EEEF0C5BF960A1C6274C2B3BF2A79D
31,517,919 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,804,073 ready_for_fw is high
3,804,459 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,214,937 >>> mbox cmd response: success
21,901,862 UART:
21,902,342 UART: Running Caliptra FMC ...
21,903,455 UART:
21,903,611 UART: [state] CFI Enabled
21,971,980 UART: [fht] FMC Alias Private Key: 7
24,310,671 UART: [art] Extend RT PCRs Done
24,311,931 UART: [art] Lock RT PCRs Done
24,313,460 UART: [art] Populate DV Done
24,319,185 UART: [fht] FMC Alias Private Key: 7
24,320,635 UART: [art] Derive CDI
24,321,422 UART: [art] Store in in slot 0x4
24,380,915 UART: [art] Derive Key Pair
24,381,949 UART: [art] Store priv key in slot 0x5
27,674,731 UART: [art] Derive Key Pair - Done
27,687,739 UART: [art] Signing Cert with AUTHO
27,689,114 UART: RITY.KEYID = 7
29,977,261 UART: [art] Erasing AUTHORITY.KEYID = 7
29,978,856 UART: [art] PUB.X = B4C4C57F9C4F6A45D3DD69778FDF680AD428A015399211500B86C3C1C0BBF0F437124F1E5B424321E3CE228E6C97E81F
29,985,994 UART: [art] PUB.Y = 62A18EF9F8100A5FAA6F09EEB60FE4D1D28B7A69E2F95977602B9987A7EF3E600E6950A08B2195424C891D8E7489697B
29,993,255 UART: [art] SIG.R = C75CBC04B6C8ADA94343BA89859DE32F13EECAF66F8CE7A70ED7EEE42B2995CB6FBDC291257F0306AF16A3F1E1990BB7
30,000,674 UART: [art] SIG.S = 55FE09F214C81BBF20869C576A0F26F40BA3FC77E3750A89E73E0389FF6C315EE1890AA256588B9B1C86686EA20D39A4
31,304,667 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,502 UART:
192,860 UART: Running Caliptra ROM ...
193,971 UART:
603,521 UART: [state] CFI Enabled
617,872 UART: [state] LifecycleState = Unprovisioned
619,764 UART: [state] DebugLocked = No
622,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,882 UART: [kat] SHA2-256
796,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,223 UART: [kat] ++
807,752 UART: [kat] sha1
818,350 UART: [kat] SHA2-256
821,073 UART: [kat] SHA2-384
826,354 UART: [kat] SHA2-512-ACC
828,720 UART: [kat] ECC-384
3,115,464 UART: [kat] HMAC-384Kdf
3,128,292 UART: [kat] LMS
4,318,364 UART: [kat] --
4,321,343 UART: [cold-reset] ++
4,322,785 UART: [fht] Storing FHT @ 0x50003400
4,336,060 UART: [idev] ++
4,336,624 UART: [idev] CDI.KEYID = 6
4,337,505 UART: [idev] SUBJECT.KEYID = 7
4,338,813 UART: [idev] UDS.KEYID = 0
4,339,857 ready_for_fw is high
4,340,078 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,380,274 UART: [idev] Erasing UDS.KEYID = 0
7,623,261 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,987 UART: [idev] --
7,648,143 UART: [ldev] ++
7,648,708 UART: [ldev] CDI.KEYID = 6
7,649,640 UART: [ldev] SUBJECT.KEYID = 5
7,650,846 UART: [ldev] AUTHORITY.KEYID = 7
7,652,172 UART: [ldev] FE.KEYID = 1
7,661,875 UART: [ldev] Erasing FE.KEYID = 1
10,954,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,116 UART: [ldev] --
13,316,728 UART: [fwproc] Waiting for Commands...
13,320,003 UART: [fwproc] Received command 0x46574c44
13,322,188 UART: [fwproc] Received Image of size 31676 bytes
16,359,930 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,430,974 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,499,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,528,507 >>> mbox cmd response: success
16,532,082 UART: [afmc] ++
16,532,723 UART: [afmc] CDI.KEYID = 6
16,533,640 UART: [afmc] SUBJECT.KEYID = 7
16,534,924 UART: [afmc] AUTHORITY.KEYID = 5
19,848,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,141,895 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,144,189 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,158,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,173,356 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,187,816 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,210,001 UART: [afmc] --
22,214,721 UART: [cold-reset] --
22,219,123 UART: [state] Locking Datavault
22,225,881 UART: [state] Locking PCR0, PCR1 and PCR31
22,227,645 UART: [state] Locking ICCM
22,229,633 UART: [exit] Launching FMC @ 0x40000130
22,238,087 UART:
22,238,335 UART: Running Caliptra FMC ...
22,239,464 UART:
22,239,622 UART: [state] CFI Enabled
22,247,654 UART: [fht] FMC Alias Private Key: 7
24,578,422 UART: [art] Extend RT PCRs Done
24,579,682 UART: [art] Lock RT PCRs Done
24,581,447 UART: [art] Populate DV Done
24,586,756 UART: [fht] FMC Alias Private Key: 7
24,588,341 UART: [art] Derive CDI
24,589,108 UART: [art] Store in in slot 0x4
24,631,626 UART: [art] Derive Key Pair
24,632,699 UART: [art] Store priv key in slot 0x5
27,875,013 UART: [art] Derive Key Pair - Done
27,888,161 UART: [art] Signing Cert with AUTHO
27,889,505 UART: RITY.KEYID = 7
30,168,783 UART: [art] Erasing AUTHORITY.KEYID = 7
30,170,351 UART: [art] PUB.X = C60918ABC30DBB17D0D0F246CCB11D724C0C4F3F10F9115D0CFD6EDB6690F98A28D853D783D3A157509B3BCD598D7573
30,177,576 UART: [art] PUB.Y = CA730A7912B1701139FFD60F71C1AE095F65CE0FFA4F849707D464E5D0DC6FB08D9B9028DDFF4DF5EA63CE07F39B4B27
30,184,801 UART: [art] SIG.R = EFA6C509DB977CF809FA0DE3079CFCC0CEF33E6EEE989C2810B22879034551F316C182B6330DFD4131EF81C868F0CAF2
30,192,226 UART: [art] SIG.S = 0815A1AC186B16B8E6C5C00C0CA5D963B1796F7EB8CBA102CDA81686CF0BBD3DE102B62655CEA060BB3608D8B1C16832
31,496,560 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,129,770 ready_for_fw is high
4,130,265 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,389,640 >>> mbox cmd response: success
22,030,260 UART:
22,030,665 UART: Running Caliptra FMC ...
22,031,820 UART:
22,031,990 UART: [state] CFI Enabled
22,040,318 UART: [fht] FMC Alias Private Key: 7
24,370,617 UART: [art] Extend RT PCRs Done
24,371,928 UART: [art] Lock RT PCRs Done
24,373,666 UART: [art] Populate DV Done
24,379,119 UART: [fht] FMC Alias Private Key: 7
24,380,731 UART: [art] Derive CDI
24,381,499 UART: [art] Store in in slot 0x4
24,424,228 UART: [art] Derive Key Pair
24,425,325 UART: [art] Store priv key in slot 0x5
27,667,456 UART: [art] Derive Key Pair - Done
27,680,545 UART: [art] Signing Cert with AUTHO
27,681,911 UART: RITY.KEYID = 7
29,961,233 UART: [art] Erasing AUTHORITY.KEYID = 7
29,963,429 UART: [art] PUB.X = 22D50CCFAA059786173DA3F80C919F247EB8B075139F50DC1401AB681168A55D3E61EDB6A5469ADECA3BF5C68B4E4C08
29,970,073 UART: [art] PUB.Y = AFA95DCDF3824DD86EBB0CA97D5498B6F770F410A774BFDFA87AF51F0A30CD5026857254F9C5E659A44089851D7CF8BA
29,977,324 UART: [art] SIG.R = D1FECF98C38677C86CA95E587EAB7016A7BA4518F2C23D542EA19D30224C868FD5C2C481557D160F74F9E3DF3FC4F4F4
29,984,656 UART: [art] SIG.S = 45B3CBEAF653638D5899C036A0901723930107822E4E11CD6E98499AFAA6B8B13B521529634E24D516CB3508921C942E
31,289,488 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,177 UART:
192,529 UART: Running Caliptra ROM ...
193,708 UART:
193,858 UART: [state] CFI Enabled
262,820 UART: [state] LifecycleState = Unprovisioned
264,719 UART: [state] DebugLocked = No
266,183 UART: [state] WD Timer not started. Device not locked for debugging
269,515 UART: [kat] SHA2-256
448,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,240 UART: [kat] ++
460,770 UART: [kat] sha1
472,072 UART: [kat] SHA2-256
475,085 UART: [kat] SHA2-384
481,295 UART: [kat] SHA2-512-ACC
484,229 UART: [kat] ECC-384
2,946,814 UART: [kat] HMAC-384Kdf
2,971,606 UART: [kat] LMS
3,501,083 UART: [kat] --
3,505,075 UART: [cold-reset] ++
3,506,862 UART: [fht] FHT @ 0x50003400
3,517,053 UART: [idev] ++
3,517,617 UART: [idev] CDI.KEYID = 6
3,518,674 UART: [idev] SUBJECT.KEYID = 7
3,519,726 UART: [idev] UDS.KEYID = 0
3,520,614 ready_for_fw is high
3,520,824 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,561,034 UART: [idev] Erasing UDS.KEYID = 0
6,021,192 UART: [idev] Sha1 KeyId Algorithm
6,043,139 UART: [idev] --
6,046,753 UART: [ldev] ++
6,047,526 UART: [ldev] CDI.KEYID = 6
6,048,436 UART: [ldev] SUBJECT.KEYID = 5
6,049,486 UART: [ldev] AUTHORITY.KEYID = 7
6,050,663 UART: [ldev] FE.KEYID = 1
6,099,517 UART: [ldev] Erasing FE.KEYID = 1
8,602,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,614 UART: [ldev] --
10,408,849 UART: [fwproc] Wait for Commands...
10,410,774 UART: [fwproc] Recv command 0x46574c44
10,412,863 UART: [fwproc] Recv'd Img size: 31656 bytes
12,806,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,882,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,951,067 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,979,373 >>> mbox cmd response: success
12,982,984 UART: [afmc] ++
12,983,600 UART: [afmc] CDI.KEYID = 6
12,984,537 UART: [afmc] SUBJECT.KEYID = 7
12,985,684 UART: [afmc] AUTHORITY.KEYID = 5
15,529,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,253,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,255,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,271,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,287,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,303,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,325,876 UART: [afmc] --
17,328,818 UART: [cold-reset] --
17,333,360 UART: [state] Locking Datavault
17,338,401 UART: [state] Locking PCR0, PCR1 and PCR31
17,340,076 UART: [state] Locking ICCM
17,342,681 UART: [exit] Launching FMC @ 0x40000130
17,351,133 UART:
17,351,379 UART: Running Caliptra FMC ...
17,352,506 UART:
17,352,661 UART: [state] CFI Enabled
17,412,743 UART: [fht] FMC Alias Private Key: 7
19,176,401 UART: [art] Extend RT PCRs Done
19,177,655 UART: [art] Lock RT PCRs Done
19,179,217 UART: [art] Populate DV Done
19,184,526 UART: [fht] FMC Alias Private Key: 7
19,186,046 UART: [art] Derive CDI
19,186,833 UART: [art] Store in in slot 0x4
19,245,533 UART: [art] Derive Key Pair
19,246,562 UART: [art] Store priv key in slot 0x5
21,709,728 UART: [art] Derive Key Pair - Done
21,722,963 UART: [art] Signing Cert with AUTHO
21,724,329 UART: RITY.KEYID = 7
23,435,901 UART: [art] Erasing AUTHORITY.KEYID = 7
23,437,457 UART: [art] PUB.X = A73A8937BAD5DF529B8DB82BAF2A7DBA9A4C25D47754E5A0D9F402FC22EFC34733091220D740D43B25BA48F2B7E69F26
23,444,678 UART: [art] PUB.Y = 7B6E5BC7FCE611FC5127459220C1FD094F39CC223571E9645CBD1ADF6EE5606FF78F4965D946DFB14E41BDD37E28CCAE
23,451,992 UART: [art] SIG.R = FA9F58AD33F12015499D3D9CD179CF4EFEEA6A762915210609DB0A44947582B5223FB3CEC5706677B0185DA853BF3BA4
23,459,334 UART: [art] SIG.S = 903E4A63B9FFD301699D42E7A59E217D2B3D0292F010A977F0C661F5FEF2CBEFC332C4F2244667482AAA7B9BFB75B315
24,437,597 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,608 UART:
193,471 UART: Running Caliptra ROM ...
194,649 UART:
194,799 UART: [state] CFI Enabled
264,695 UART: [state] LifecycleState = Unprovisioned
267,394 UART: [state] DebugLocked = No
269,526 UART: [state] WD Timer not started. Device not locked for debugging
273,886 UART: [kat] SHA2-256
463,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,540 UART: [kat] ++
475,004 UART: [kat] sha1
485,396 UART: [kat] SHA2-256
488,404 UART: [kat] SHA2-384
493,682 UART: [kat] SHA2-512-ACC
496,266 UART: [kat] ECC-384
2,951,372 UART: [kat] HMAC-384Kdf
2,973,149 UART: [kat] LMS
3,504,858 UART: [kat] --
3,510,109 UART: [cold-reset] ++
3,512,467 UART: [fht] FHT @ 0x50003400
3,523,100 UART: [idev] ++
3,523,768 UART: [idev] CDI.KEYID = 6
3,524,722 UART: [idev] SUBJECT.KEYID = 7
3,525,896 UART: [idev] UDS.KEYID = 0
3,526,790 ready_for_fw is high
3,527,004 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,567,187 UART: [idev] Erasing UDS.KEYID = 0
6,032,501 UART: [idev] Sha1 KeyId Algorithm
6,055,413 UART: [idev] --
6,060,867 UART: [ldev] ++
6,061,551 UART: [ldev] CDI.KEYID = 6
6,062,483 UART: [ldev] SUBJECT.KEYID = 5
6,063,655 UART: [ldev] AUTHORITY.KEYID = 7
6,064,824 UART: [ldev] FE.KEYID = 1
6,101,945 UART: [ldev] Erasing FE.KEYID = 1
8,609,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,876 UART: [ldev] --
10,417,404 UART: [fwproc] Wait for Commands...
10,419,392 UART: [fwproc] Recv command 0x46574c44
10,421,642 UART: [fwproc] Recv'd Img size: 31656 bytes
12,852,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,937,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,053,521 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,100,718 >>> mbox cmd response: success
13,104,818 UART: [afmc] ++
13,105,571 UART: [afmc] CDI.KEYID = 6
13,106,598 UART: [afmc] SUBJECT.KEYID = 7
13,108,188 UART: [afmc] AUTHORITY.KEYID = 5
15,639,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,365,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,367,203 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,382,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,397,493 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,412,553 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,436,405 UART: [afmc] --
17,439,541 UART: [cold-reset] --
17,444,168 UART: [state] Locking Datavault
17,449,520 UART: [state] Locking PCR0, PCR1 and PCR31
17,451,720 UART: [state] Locking ICCM
17,453,600 UART: [exit] Launching FMC @ 0x40000130
17,462,241 UART:
17,462,482 UART: Running Caliptra FMC ...
17,463,608 UART:
17,463,768 UART: [state] CFI Enabled
17,521,723 UART: [fht] FMC Alias Private Key: 7
19,285,866 UART: [art] Extend RT PCRs Done
19,287,128 UART: [art] Lock RT PCRs Done
19,288,821 UART: [art] Populate DV Done
19,294,333 UART: [fht] FMC Alias Private Key: 7
19,295,981 UART: [art] Derive CDI
19,296,826 UART: [art] Store in in slot 0x4
19,354,453 UART: [art] Derive Key Pair
19,355,524 UART: [art] Store priv key in slot 0x5
21,818,624 UART: [art] Derive Key Pair - Done
21,831,775 UART: [art] Signing Cert with AUTHO
21,833,150 UART: RITY.KEYID = 7
23,544,273 UART: [art] Erasing AUTHORITY.KEYID = 7
23,545,835 UART: [art] PUB.X = 5C962223A75DB12431F937CFEE7415C3F6E02512902D1C6BC252F5977B4ABE892228EC0F21855C346B032DD208C0FC62
23,553,057 UART: [art] PUB.Y = B6C4DA332BB4CCFE41E6A4DA8BD7BCE67032F59E3FDB2569A3C3F560F6655C6AF14DD643779FD7BBB8B981D23C99858C
23,560,375 UART: [art] SIG.R = 2A7E99D21860B04BD014E8370BCD6D08D77F7CFE0DECE75A93784BB15CA22C46BA29562F8A0766399EF4586AA9F9757B
23,567,732 UART: [art] SIG.S = 36D13F6B5A2D01663E1A5E49B3755342D7AE6B2B6AD3012EE20C969C67ADB26C669C52672BB640F9D79FAB064A57077B
24,546,377 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,442,368 ready_for_fw is high
3,442,760 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,967,246 >>> mbox cmd response: success
17,257,086 UART:
17,257,468 UART: Running Caliptra FMC ...
17,258,579 UART:
17,258,733 UART: [state] CFI Enabled
17,327,482 UART: [fht] FMC Alias Private Key: 7
19,091,141 UART: [art] Extend RT PCRs Done
19,092,383 UART: [art] Lock RT PCRs Done
19,094,258 UART: [art] Populate DV Done
19,099,849 UART: [fht] FMC Alias Private Key: 7
19,101,449 UART: [art] Derive CDI
19,102,304 UART: [art] Store in in slot 0x4
19,159,748 UART: [art] Derive Key Pair
19,160,790 UART: [art] Store priv key in slot 0x5
21,624,014 UART: [art] Derive Key Pair - Done
21,636,740 UART: [art] Signing Cert with AUTHO
21,638,093 UART: RITY.KEYID = 7
23,349,759 UART: [art] Erasing AUTHORITY.KEYID = 7
23,351,329 UART: [art] PUB.X = FE30DBC0E45A456DCF079B79E538DAD1D267A4E795E074DA3A9DFBCC77FF98D34A4A0FCE850D7050A4C51C5254E4C008
23,358,618 UART: [art] PUB.Y = B9BE7C3780EB86DBFC068B0AE9B76BDCEAD839EB81A682E20C5CD76343E7B19C935563BE28D4027ED5A02A762852853B
23,365,849 UART: [art] SIG.R = 9701966B24A57C6B893FEAB7C75AE82E57CE2D213E2782ACE7A169E41D8B8BEFD66D7ABFEACBB3EFE6532D1F51EA7622
23,373,252 UART: [art] SIG.S = EB7C35D95C744576C65BFADE43467778879C91CF4DEF9C215850A3B47E4A729838815BEF707A1DAE6A8FFB50D41B25EC
24,351,517 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,422 UART:
192,814 UART: Running Caliptra ROM ...
193,941 UART:
603,788 UART: [state] CFI Enabled
615,143 UART: [state] LifecycleState = Unprovisioned
617,150 UART: [state] DebugLocked = No
620,164 UART: [state] WD Timer not started. Device not locked for debugging
624,694 UART: [kat] SHA2-256
814,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,374 UART: [kat] ++
825,980 UART: [kat] sha1
837,994 UART: [kat] SHA2-256
840,996 UART: [kat] SHA2-384
846,126 UART: [kat] SHA2-512-ACC
848,703 UART: [kat] ECC-384
3,290,718 UART: [kat] HMAC-384Kdf
3,304,724 UART: [kat] LMS
3,836,608 UART: [kat] --
3,842,154 UART: [cold-reset] ++
3,843,867 UART: [fht] FHT @ 0x50003400
3,855,615 UART: [idev] ++
3,856,246 UART: [idev] CDI.KEYID = 6
3,857,217 UART: [idev] SUBJECT.KEYID = 7
3,858,455 UART: [idev] UDS.KEYID = 0
3,859,861 ready_for_fw is high
3,860,073 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,899,989 UART: [idev] Erasing UDS.KEYID = 0
6,336,164 UART: [idev] Sha1 KeyId Algorithm
6,357,254 UART: [idev] --
6,363,390 UART: [ldev] ++
6,364,079 UART: [ldev] CDI.KEYID = 6
6,364,988 UART: [ldev] SUBJECT.KEYID = 5
6,366,196 UART: [ldev] AUTHORITY.KEYID = 7
6,367,387 UART: [ldev] FE.KEYID = 1
6,376,244 UART: [ldev] Erasing FE.KEYID = 1
8,853,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,251 UART: [ldev] --
10,645,265 UART: [fwproc] Wait for Commands...
10,647,729 UART: [fwproc] Recv command 0x46574c44
10,650,028 UART: [fwproc] Recv'd Img size: 31656 bytes
13,080,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,159,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,275,278 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,321,420 >>> mbox cmd response: success
13,326,286 UART: [afmc] ++
13,327,026 UART: [afmc] CDI.KEYID = 6
13,328,148 UART: [afmc] SUBJECT.KEYID = 7
13,329,646 UART: [afmc] AUTHORITY.KEYID = 5
15,830,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,554,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,555,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,571,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,586,270 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,601,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,623,724 UART: [afmc] --
17,626,460 UART: [cold-reset] --
17,630,044 UART: [state] Locking Datavault
17,634,857 UART: [state] Locking PCR0, PCR1 and PCR31
17,637,049 UART: [state] Locking ICCM
17,638,516 UART: [exit] Launching FMC @ 0x40000130
17,647,157 UART:
17,647,418 UART: Running Caliptra FMC ...
17,648,548 UART:
17,648,702 UART: [state] CFI Enabled
17,656,393 UART: [fht] FMC Alias Private Key: 7
19,413,252 UART: [art] Extend RT PCRs Done
19,414,499 UART: [art] Lock RT PCRs Done
19,416,424 UART: [art] Populate DV Done
19,422,075 UART: [fht] FMC Alias Private Key: 7
19,423,649 UART: [art] Derive CDI
19,424,421 UART: [art] Store in in slot 0x4
19,466,660 UART: [art] Derive Key Pair
19,467,732 UART: [art] Store priv key in slot 0x5
21,893,983 UART: [art] Derive Key Pair - Done
21,907,033 UART: [art] Signing Cert with AUTHO
21,908,364 UART: RITY.KEYID = 7
23,613,997 UART: [art] Erasing AUTHORITY.KEYID = 7
23,615,568 UART: [art] PUB.X = E830DBA0A4BCB6B67998CF15CE6A91372B32E472CC5910FB30882F1EF26CD0EF3BDDA62555F78BB7817C2F489855D2BB
23,622,883 UART: [art] PUB.Y = C11A7C55D931CD9D0B64604C9CC750AA2928F3D270E535BB19A8E4D5495D1DDBEA5480AC593DD7E1DD2AFD21129E75CD
23,630,116 UART: [art] SIG.R = 2C1BA82FFFDDDF658C550C4EE2E114C5B045922E1AE59A44AEFD79E7085B1B64BA401E3FC08A929AB24629665CB16CDB
23,637,546 UART: [art] SIG.S = 9E79B450C14399528AE864DAA8279E86FB3BD1A09BB72D6A3A415CCBF0A2636AB7126FAAAC1EBCEBAF4017491E680962
24,615,663 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,754,924 ready_for_fw is high
3,755,316 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,184,007 >>> mbox cmd response: success
17,433,383 UART:
17,433,771 UART: Running Caliptra FMC ...
17,434,926 UART:
17,435,088 UART: [state] CFI Enabled
17,443,078 UART: [fht] FMC Alias Private Key: 7
19,200,052 UART: [art] Extend RT PCRs Done
19,201,313 UART: [art] Lock RT PCRs Done
19,203,117 UART: [art] Populate DV Done
19,208,358 UART: [fht] FMC Alias Private Key: 7
19,210,083 UART: [art] Derive CDI
19,210,932 UART: [art] Store in in slot 0x4
19,253,677 UART: [art] Derive Key Pair
19,254,715 UART: [art] Store priv key in slot 0x5
21,680,768 UART: [art] Derive Key Pair - Done
21,693,560 UART: [art] Signing Cert with AUTHO
21,694,901 UART: RITY.KEYID = 7
23,400,741 UART: [art] Erasing AUTHORITY.KEYID = 7
23,402,304 UART: [art] PUB.X = D2273B227EFCD46216640D5670531C8F0FCAF93CCD9C062B40C7C2F2EB23B369EB0344F35B7D336240ED5E5DDC7CDF14
23,409,594 UART: [art] PUB.Y = 0D9C47702BAE33B24142F124FAA4F57D9E4F737E98947EA3BCF03CBB98CF3C30FB8BB0F91B39AB1242566C3DB842F642
23,416,816 UART: [art] SIG.R = F1ABCA697B0BC09AA769CDCAD37B856ADB1C2AD9F7A3D80BEE658F8AD1FF16CF9B81F27FB1C051EE03E8BBD61F3D228D
23,424,259 UART: [art] SIG.S = BA7821FA3CB44595AAB6950BF3C7B26052157D947BB514FE72A6169E983D372CF3168C2610CBE001F2FA58B41398C4F0
24,402,498 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,656 UART: [kat] LMS
1,475,852 UART: [kat] --
1,476,673 UART: [cold-reset] ++
1,477,033 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,586 UART: [idev] Erasing UDS.KEYID = 0
1,505,664 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,478 UART: [idev] --
1,515,713 UART: [ldev] ++
1,515,881 UART: [ldev] CDI.KEYID = 6
1,516,244 UART: [ldev] SUBJECT.KEYID = 5
1,516,670 UART: [ldev] AUTHORITY.KEYID = 7
1,517,133 UART: [ldev] FE.KEYID = 1
1,522,285 UART: [ldev] Erasing FE.KEYID = 1
1,547,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,468 UART: [ldev] --
1,586,807 UART: [fwproc] Waiting for Commands...
1,587,566 UART: [fwproc] Received command 0x46574c44
1,588,357 UART: [fwproc] Received Image of size 31656 bytes
1,939,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,412 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,669 >>> mbox cmd response: success
2,008,929 UART: [afmc] ++
2,009,097 UART: [afmc] CDI.KEYID = 6
2,009,459 UART: [afmc] SUBJECT.KEYID = 7
2,009,884 UART: [afmc] AUTHORITY.KEYID = 5
2,044,793 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,235 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,628 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,318 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,285 UART: [afmc] --
2,088,187 UART: [cold-reset] --
2,088,963 UART: [state] Locking Datavault
2,090,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,972 UART: [state] Locking ICCM
2,091,476 UART: [exit] Launching FMC @ 0x40000130
2,096,805 UART:
2,096,821 UART: Running Caliptra FMC ...
2,097,229 UART:
2,097,283 UART: [state] CFI Enabled
2,108,054 UART: [fht] FMC Alias Private Key: 7
2,215,711 UART: [art] Extend RT PCRs Done
2,216,139 UART: [art] Lock RT PCRs Done
2,217,681 UART: [art] Populate DV Done
2,225,878 UART: [fht] FMC Alias Private Key: 7
2,226,898 UART: [art] Derive CDI
2,227,178 UART: [art] Store in in slot 0x4
2,312,655 UART: [art] Derive Key Pair
2,313,015 UART: [art] Store priv key in slot 0x5
2,326,119 UART: [art] Derive Key Pair - Done
2,340,738 UART: [art] Signing Cert with AUTHO
2,341,218 UART: RITY.KEYID = 7
2,356,538 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,303 UART: [art] PUB.X = 84D67DFE040020BA21702083050E4CA630031F575E789E6C919A64916386502C5151DCAE700888BA235B83CFD4642DEE
2,364,030 UART: [art] PUB.Y = 35B7CB3F5C68D97B79F63C4440CA5D6C75AA2D9E402798135D8ED54AA81ADB78F78B40278F53BE9B319058BB453CB58E
2,370,990 UART: [art] SIG.R = 4911FCE7C36B1E159B2B9B44E7717857E22B9DAADCBFE19F4BB8DE47B2DEEC3287F5922D26904920300D133A1E2E15D1
2,377,769 UART: [art] SIG.S = AAABC7980DF225058E781712E48CB8E39C5FAB32CBCA6608944949DC5CD3E8BFEA75B66A40D6C85665DF18F2DAEA788C
2,401,450 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 ready_for_fw is high
1,362,367 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,411 >>> mbox cmd response: success
1,918,171 UART:
1,918,187 UART: Running Caliptra FMC ...
1,918,595 UART:
1,918,649 UART: [state] CFI Enabled
1,929,466 UART: [fht] FMC Alias Private Key: 7
2,037,543 UART: [art] Extend RT PCRs Done
2,037,971 UART: [art] Lock RT PCRs Done
2,039,307 UART: [art] Populate DV Done
2,047,634 UART: [fht] FMC Alias Private Key: 7
2,048,634 UART: [art] Derive CDI
2,048,914 UART: [art] Store in in slot 0x4
2,134,471 UART: [art] Derive Key Pair
2,134,831 UART: [art] Store priv key in slot 0x5
2,147,645 UART: [art] Derive Key Pair - Done
2,162,166 UART: [art] Signing Cert with AUTHO
2,162,646 UART: RITY.KEYID = 7
2,178,024 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,789 UART: [art] PUB.X = 9C1458B55BDB09B5579CF93FB8058566F7AFFFE9DD95428ED7B8B4CEBE39C78D9F15D4436D78F7CCD92B7F9B118882CD
2,185,571 UART: [art] PUB.Y = 3BE587CFE9EA8E731879A31D2BA181A5E23F7F3C7A73221B854A180A95A160A31D1D72B4B3DB15E6963E0D2AD1D2EC11
2,192,527 UART: [art] SIG.R = 5A1C7132D2698BE96B21B84CB614640CB22DEE0209F2ABF157093E449C9F49F637DF86864630DD83E2B9D72418F3BF15
2,199,287 UART: [art] SIG.S = 0A6AA85BEFA603AEFA6FA23B23F4C72077CBFA2A9C5F02BA02E86EAB3457823EC8820000E5D110B85CDDAF823A514DE3
2,222,511 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,486 UART: [kat] SHA2-256
882,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,532 UART: [kat] ++
886,684 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,699 UART: [kat] LMS
1,475,895 UART: [kat] --
1,476,578 UART: [cold-reset] ++
1,477,066 UART: [fht] Storing FHT @ 0x50003400
1,479,827 UART: [idev] ++
1,479,995 UART: [idev] CDI.KEYID = 6
1,480,355 UART: [idev] SUBJECT.KEYID = 7
1,480,779 UART: [idev] UDS.KEYID = 0
1,481,124 ready_for_fw is high
1,481,124 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,596 UART: [ldev] ++
1,515,764 UART: [ldev] CDI.KEYID = 6
1,516,127 UART: [ldev] SUBJECT.KEYID = 5
1,516,553 UART: [ldev] AUTHORITY.KEYID = 7
1,517,016 UART: [ldev] FE.KEYID = 1
1,522,590 UART: [ldev] Erasing FE.KEYID = 1
1,548,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,967 UART: [ldev] --
1,588,234 UART: [fwproc] Waiting for Commands...
1,589,075 UART: [fwproc] Received command 0x46574c44
1,589,866 UART: [fwproc] Received Image of size 31656 bytes
1,940,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,714 >>> mbox cmd response: success
2,009,930 UART: [afmc] ++
2,010,098 UART: [afmc] CDI.KEYID = 6
2,010,460 UART: [afmc] SUBJECT.KEYID = 7
2,010,885 UART: [afmc] AUTHORITY.KEYID = 5
2,046,378 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,757 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,447 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,556 UART: [afmc] --
2,089,570 UART: [cold-reset] --
2,090,556 UART: [state] Locking Datavault
2,091,631 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,235 UART: [state] Locking ICCM
2,092,697 UART: [exit] Launching FMC @ 0x40000130
2,098,026 UART:
2,098,042 UART: Running Caliptra FMC ...
2,098,450 UART:
2,098,593 UART: [state] CFI Enabled
2,109,250 UART: [fht] FMC Alias Private Key: 7
2,217,347 UART: [art] Extend RT PCRs Done
2,217,775 UART: [art] Lock RT PCRs Done
2,219,435 UART: [art] Populate DV Done
2,227,764 UART: [fht] FMC Alias Private Key: 7
2,228,718 UART: [art] Derive CDI
2,228,998 UART: [art] Store in in slot 0x4
2,314,397 UART: [art] Derive Key Pair
2,314,757 UART: [art] Store priv key in slot 0x5
2,328,155 UART: [art] Derive Key Pair - Done
2,342,993 UART: [art] Signing Cert with AUTHO
2,343,473 UART: RITY.KEYID = 7
2,358,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,530 UART: [art] PUB.X = 4938D6977F42A45B42F3EDE5C68F3EA8304E78F2A4E9AF9B07AC842861A3A0D79C2580F7BFAE959D52DC67E54AC87686
2,366,307 UART: [art] PUB.Y = C325CBD6C22F3B800CC8474DEFF7563C9937713ADE18CEE955AC85338DCB7DD8FADAB06D0B1EA66B0EE0CB58C97C8DF5
2,373,276 UART: [art] SIG.R = 727B7182A39A5C58375EAB8AF4A30ED88E9D83AF33C20779D9E1AB16289D12E273FE701F3C33A4EE9E8345F996CD328D
2,380,048 UART: [art] SIG.S = 61E1487108B933E6C98331D02793CDD35F0812CF1F2A4DBEC8369C652FF424C35A10D81957A8F30246BABDACC23DDCD8
2,404,209 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,610 ready_for_fw is high
1,362,610 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,764 >>> mbox cmd response: success
1,919,372 UART:
1,919,388 UART: Running Caliptra FMC ...
1,919,796 UART:
1,919,939 UART: [state] CFI Enabled
1,930,544 UART: [fht] FMC Alias Private Key: 7
2,038,963 UART: [art] Extend RT PCRs Done
2,039,391 UART: [art] Lock RT PCRs Done
2,040,853 UART: [art] Populate DV Done
2,049,212 UART: [fht] FMC Alias Private Key: 7
2,050,340 UART: [art] Derive CDI
2,050,620 UART: [art] Store in in slot 0x4
2,135,785 UART: [art] Derive Key Pair
2,136,145 UART: [art] Store priv key in slot 0x5
2,149,223 UART: [art] Derive Key Pair - Done
2,164,002 UART: [art] Signing Cert with AUTHO
2,164,482 UART: RITY.KEYID = 7
2,179,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,567 UART: [art] PUB.X = A726F0E9A7AC7AE4FBB336A57A680C019EC8E561978D08430079B9242482F4948B1265583C0B491FD3A63DDA52BB511D
2,187,305 UART: [art] PUB.Y = 1C4AFB277FCDEFE2D94BCA2399A787F7301A944E4572E581A44E7EA139720748B596E10DC885406FAED365DB62CC29F5
2,194,259 UART: [art] SIG.R = 1E1ADFD2CB4F71771102D8639B516E9BC3BA9092D0C41487FDAA05A87E28032259FA3713AF40C772290366FC13FE783D
2,201,021 UART: [art] SIG.S = F9E23097AEDCEDD3C2E695F2FE91B58A4E342A571F30051FDB61B02CF11465EA0AFA3F830E9FA354599443637CE17B21
2,224,922 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
892,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,045 UART: [kat] ++
897,197 UART: [kat] sha1
901,203 UART: [kat] SHA2-256
903,143 UART: [kat] SHA2-384
905,834 UART: [kat] SHA2-512-ACC
907,735 UART: [kat] ECC-384
917,258 UART: [kat] HMAC-384Kdf
921,880 UART: [kat] LMS
1,170,208 UART: [kat] --
1,171,241 UART: [cold-reset] ++
1,171,603 UART: [fht] FHT @ 0x50003400
1,174,110 UART: [idev] ++
1,174,278 UART: [idev] CDI.KEYID = 6
1,174,638 UART: [idev] SUBJECT.KEYID = 7
1,175,062 UART: [idev] UDS.KEYID = 0
1,175,407 ready_for_fw is high
1,175,407 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,492 UART: [idev] Erasing UDS.KEYID = 0
1,200,765 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,152 UART: [ldev] SUBJECT.KEYID = 5
1,211,578 UART: [ldev] AUTHORITY.KEYID = 7
1,212,041 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,275 UART: [ldev] --
1,282,570 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,651 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,504 >>> mbox cmd response: success
1,703,558 UART: [afmc] ++
1,703,726 UART: [afmc] CDI.KEYID = 6
1,704,088 UART: [afmc] SUBJECT.KEYID = 7
1,704,513 UART: [afmc] AUTHORITY.KEYID = 5
1,740,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,692 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,411 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,415 UART: [afmc] --
1,783,383 UART: [cold-reset] --
1,784,235 UART: [state] Locking Datavault
1,785,414 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,018 UART: [state] Locking ICCM
1,786,452 UART: [exit] Launching FMC @ 0x40000130
1,791,781 UART:
1,791,797 UART: Running Caliptra FMC ...
1,792,205 UART:
1,792,259 UART: [state] CFI Enabled
1,802,926 UART: [fht] FMC Alias Private Key: 7
1,911,129 UART: [art] Extend RT PCRs Done
1,911,557 UART: [art] Lock RT PCRs Done
1,912,883 UART: [art] Populate DV Done
1,921,062 UART: [fht] FMC Alias Private Key: 7
1,922,130 UART: [art] Derive CDI
1,922,410 UART: [art] Store in in slot 0x4
2,008,317 UART: [art] Derive Key Pair
2,008,677 UART: [art] Store priv key in slot 0x5
2,022,043 UART: [art] Derive Key Pair - Done
2,037,171 UART: [art] Signing Cert with AUTHO
2,037,651 UART: RITY.KEYID = 7
2,052,605 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,370 UART: [art] PUB.X = 3F42A6F00406C31E1145864624E47222928DE7DC060452593D3AA8B86BDD7AA213FF926D5ABB729FE9EC9FC4DDA0F6F8
2,060,138 UART: [art] PUB.Y = CD4A4068D2FDC58C2ECA52988939AF573B57C565ABC2F6E150303E5A10545B5AEA4AD788E2854C2F43EC00F9993999BA
2,067,076 UART: [art] SIG.R = 0CB8A19B189F7D7158D5BCFCBF5409FEACA9093CDDEC72347ADCB00799B3D359399FF4B2DEB42E88A75E7112E50BE216
2,073,851 UART: [art] SIG.S = F937618922B87C5EA26D6B7FD2A9D00570E2458806409C2F4F4B9BA908384D0A3C72381BF6693C17BE8F37550E8A3A68
2,097,304 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,697 ready_for_fw is high
1,059,697 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,053 >>> mbox cmd response: success
1,616,039 UART:
1,616,055 UART: Running Caliptra FMC ...
1,616,463 UART:
1,616,517 UART: [state] CFI Enabled
1,627,426 UART: [fht] FMC Alias Private Key: 7
1,734,917 UART: [art] Extend RT PCRs Done
1,735,345 UART: [art] Lock RT PCRs Done
1,736,621 UART: [art] Populate DV Done
1,745,112 UART: [fht] FMC Alias Private Key: 7
1,746,084 UART: [art] Derive CDI
1,746,364 UART: [art] Store in in slot 0x4
1,831,909 UART: [art] Derive Key Pair
1,832,269 UART: [art] Store priv key in slot 0x5
1,845,379 UART: [art] Derive Key Pair - Done
1,859,795 UART: [art] Signing Cert with AUTHO
1,860,275 UART: RITY.KEYID = 7
1,875,649 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,414 UART: [art] PUB.X = FF32538C5EECEF36F5FC6C5B4AF1B295B5BDEF3976BE4834BD4898281515101E7F8234B79BE5D51BFEF54C6472C8FEDC
1,883,204 UART: [art] PUB.Y = 9638780F418B6DE8398B59950649BB7A6CA69A575B9A2DDA3F5D5A2843FE492A9F75915C58B6DEE725777AA7BF867C57
1,890,152 UART: [art] SIG.R = 6BF2B1851CE98F237CF9DCCC52BEE326C11E88B0E3D6B58A68B3FBD091037B3464BE1A03B92FB32A35D458C1342FECD9
1,896,934 UART: [art] SIG.S = EBAB444AFE98787F3C9D73135DF1A5F831C356E8302088A652F02ABE56DC2FEAF7ED1323CAB5257FE77FB7382B422C5A
1,919,878 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
893,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,256 UART: [kat] ++
897,408 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,221 UART: [kat] SHA2-512-ACC
908,122 UART: [kat] ECC-384
917,687 UART: [kat] HMAC-384Kdf
922,299 UART: [kat] LMS
1,170,627 UART: [kat] --
1,171,500 UART: [cold-reset] ++
1,171,838 UART: [fht] FHT @ 0x50003400
1,174,481 UART: [idev] ++
1,174,649 UART: [idev] CDI.KEYID = 6
1,175,009 UART: [idev] SUBJECT.KEYID = 7
1,175,433 UART: [idev] UDS.KEYID = 0
1,175,778 ready_for_fw is high
1,175,778 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,645 UART: [idev] Erasing UDS.KEYID = 0
1,201,518 UART: [idev] Sha1 KeyId Algorithm
1,210,162 UART: [idev] --
1,211,320 UART: [ldev] ++
1,211,488 UART: [ldev] CDI.KEYID = 6
1,211,851 UART: [ldev] SUBJECT.KEYID = 5
1,212,277 UART: [ldev] AUTHORITY.KEYID = 7
1,212,740 UART: [ldev] FE.KEYID = 1
1,217,916 UART: [ldev] Erasing FE.KEYID = 1
1,244,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,228 UART: [ldev] --
1,283,689 UART: [fwproc] Wait for Commands...
1,284,367 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,464 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,323 >>> mbox cmd response: success
1,705,455 UART: [afmc] ++
1,705,623 UART: [afmc] CDI.KEYID = 6
1,705,985 UART: [afmc] SUBJECT.KEYID = 7
1,706,410 UART: [afmc] AUTHORITY.KEYID = 5
1,741,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,379 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,886 UART: [afmc] --
1,784,978 UART: [cold-reset] --
1,785,768 UART: [state] Locking Datavault
1,787,133 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,737 UART: [state] Locking ICCM
1,788,219 UART: [exit] Launching FMC @ 0x40000130
1,793,548 UART:
1,793,564 UART: Running Caliptra FMC ...
1,793,972 UART:
1,794,115 UART: [state] CFI Enabled
1,804,440 UART: [fht] FMC Alias Private Key: 7
1,912,821 UART: [art] Extend RT PCRs Done
1,913,249 UART: [art] Lock RT PCRs Done
1,914,785 UART: [art] Populate DV Done
1,923,058 UART: [fht] FMC Alias Private Key: 7
1,924,124 UART: [art] Derive CDI
1,924,404 UART: [art] Store in in slot 0x4
2,010,015 UART: [art] Derive Key Pair
2,010,375 UART: [art] Store priv key in slot 0x5
2,023,693 UART: [art] Derive Key Pair - Done
2,038,825 UART: [art] Signing Cert with AUTHO
2,039,305 UART: RITY.KEYID = 7
2,054,619 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,384 UART: [art] PUB.X = CD7517962CA136355FBDC8F2895A8FD579134A5590DB4156519AEE3EC8F0FC0FB6D2A82A7EC40B0EC3A61F08BD5E710F
2,062,155 UART: [art] PUB.Y = E40B2A2B2BFFA18F84A6324C274B31A10C880D3C027DCC5A44436F12C3B6FA515DBDF328B9315A02A6DF8C77A7EC472A
2,069,106 UART: [art] SIG.R = 1D6A350568E06BAD1A51EDA8805E470255198539806B86CC23A9F41F3CA7B6083C641D1EFB80FCD118BED587E5B1F369
2,075,873 UART: [art] SIG.S = F4D01AFB8BB15874D29C969EFBF5D18049ADA7DD14F900449230C54946C1F30B7BBEC7DB24CBD8BC29598420DCDBD409
2,099,287 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,588 ready_for_fw is high
1,060,588 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,082 >>> mbox cmd response: success
1,617,098 UART:
1,617,114 UART: Running Caliptra FMC ...
1,617,522 UART:
1,617,665 UART: [state] CFI Enabled
1,628,346 UART: [fht] FMC Alias Private Key: 7
1,736,231 UART: [art] Extend RT PCRs Done
1,736,659 UART: [art] Lock RT PCRs Done
1,738,129 UART: [art] Populate DV Done
1,746,556 UART: [fht] FMC Alias Private Key: 7
1,747,492 UART: [art] Derive CDI
1,747,772 UART: [art] Store in in slot 0x4
1,833,357 UART: [art] Derive Key Pair
1,833,717 UART: [art] Store priv key in slot 0x5
1,847,221 UART: [art] Derive Key Pair - Done
1,861,976 UART: [art] Signing Cert with AUTHO
1,862,456 UART: RITY.KEYID = 7
1,877,866 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,631 UART: [art] PUB.X = 9D21A7D7881B0C2D91C4576F1D31FFBC257ED12ED6DA562629B188AEBF243DD4FB7A7B2111B15F07CE3FFE9AD03FA381
1,885,415 UART: [art] PUB.Y = 9CBF15A9F94876A5230EE652A33D51450E1CCB442D2E822CF5886EE6D8DA642589F85A864A876649FDDEC3B9F8672D2E
1,892,367 UART: [art] SIG.R = F06EBCA012EB57D281B53B239AD47674A72E7AF082C5798A9654655C312F58CBE8A86998B0A8EC82B7B8CB93469EC01F
1,899,145 UART: [art] SIG.S = 0DCB1C8740AC43C2C99F4272E1D534DE80D18922A7F6BD9314E6DA48CE92F4D8B5AD707D452729CE6A757B7738045675
1,922,403 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,771 UART: [idev] ++
1,172,939 UART: [idev] CDI.KEYID = 6
1,173,300 UART: [idev] SUBJECT.KEYID = 7
1,173,725 UART: [idev] UDS.KEYID = 0
1,174,071 ready_for_fw is high
1,174,071 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,969 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,396 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,160 UART: [ldev] --
1,280,662 UART: [fwproc] Wait for Commands...
1,281,401 UART: [fwproc] Recv command 0x46574c44
1,282,134 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,698 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,566 >>> mbox cmd response: success
1,702,663 UART: [afmc] ++
1,702,831 UART: [afmc] CDI.KEYID = 6
1,703,194 UART: [afmc] SUBJECT.KEYID = 7
1,703,620 UART: [afmc] AUTHORITY.KEYID = 5
1,738,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,126 UART: [afmc] --
1,782,046 UART: [cold-reset] --
1,782,780 UART: [state] Locking Datavault
1,783,907 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,511 UART: [state] Locking ICCM
1,785,031 UART: [exit] Launching FMC @ 0x40000130
1,790,360 UART:
1,790,376 UART: Running Caliptra FMC ...
1,790,784 UART:
1,790,838 UART: [state] CFI Enabled
1,801,409 UART: [fht] FMC Alias Private Key: 7
1,909,282 UART: [art] Extend RT PCRs Done
1,909,710 UART: [art] Lock RT PCRs Done
1,911,238 UART: [art] Populate DV Done
1,919,337 UART: [fht] FMC Alias Private Key: 7
1,920,305 UART: [art] Derive CDI
1,920,585 UART: [art] Store in in slot 0x4
2,006,188 UART: [art] Derive Key Pair
2,006,548 UART: [art] Store priv key in slot 0x5
2,019,062 UART: [art] Derive Key Pair - Done
2,033,568 UART: [art] Signing Cert with AUTHO
2,034,048 UART: RITY.KEYID = 7
2,049,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,139 UART: [art] PUB.X = 6890F526169482AAA8613863DD847CD7FD5C24E6DE6777AAA16B79EABAE6191C8D4648ED5FB950859073C13F6F9BCB5E
2,056,919 UART: [art] PUB.Y = 6C734F1C2EA1EEF17993C0EBD2C31424B25158BCAFAF99EF3ECBEC79DC3B56E870B98F742848A8E32AD322D20461A0ED
2,063,886 UART: [art] SIG.R = 2DB7954DB80A55974C99996F9832F9A6DAF9E140361CA386C40ECEF5FBC810CC49E9A1E58EEBCC706E3CF6EA3D3E1265
2,070,668 UART: [art] SIG.S = 75B9FC5A616EB9D1399DBA5B2375F547BEC11DD87BB4A04123C71DF5492947464B7E5CED285EB2DB8652318BFA09287F
2,094,379 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,262 ready_for_fw is high
1,056,262 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,515 >>> mbox cmd response: success
1,613,775 UART:
1,613,791 UART: Running Caliptra FMC ...
1,614,199 UART:
1,614,253 UART: [state] CFI Enabled
1,624,978 UART: [fht] FMC Alias Private Key: 7
1,733,527 UART: [art] Extend RT PCRs Done
1,733,955 UART: [art] Lock RT PCRs Done
1,735,435 UART: [art] Populate DV Done
1,743,618 UART: [fht] FMC Alias Private Key: 7
1,744,666 UART: [art] Derive CDI
1,744,946 UART: [art] Store in in slot 0x4
1,831,081 UART: [art] Derive Key Pair
1,831,441 UART: [art] Store priv key in slot 0x5
1,844,429 UART: [art] Derive Key Pair - Done
1,859,266 UART: [art] Signing Cert with AUTHO
1,859,746 UART: RITY.KEYID = 7
1,875,398 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,163 UART: [art] PUB.X = 5F5BF26359131943EEF1CB085456A5B02257E23825822EEE8D351B95F7CD539BD4F5C452B5ABC7CD0E7134194B1B2580
1,882,929 UART: [art] PUB.Y = A553A193BC686FDF9B8E61BDAE8BD85F3F0CFCC953E6033D02DFCDC0961CC01C2A728F83BD1B2924FA2DAD7A11417AB1
1,889,896 UART: [art] SIG.R = 1D23E379E70C827204AA0880A210BD8C6F44BA5F3DAA89EBFBA07758133C87212453362319C98884F8B3F23467EEE196
1,896,655 UART: [art] SIG.S = 75DA790BFF06263E10C4EB8AAE18D5265A4F3EEDABB4FFB52016650B73FD8778F49D7FF8C3147540C3C705E64A6DAEF6
1,920,329 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,174,998 ready_for_fw is high
1,174,998 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,536 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,241,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,579 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,423 >>> mbox cmd response: success
1,701,666 UART: [afmc] ++
1,701,834 UART: [afmc] CDI.KEYID = 6
1,702,197 UART: [afmc] SUBJECT.KEYID = 7
1,702,623 UART: [afmc] AUTHORITY.KEYID = 5
1,737,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,491 UART: [afmc] --
1,781,613 UART: [cold-reset] --
1,782,727 UART: [state] Locking Datavault
1,783,876 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,480 UART: [state] Locking ICCM
1,785,136 UART: [exit] Launching FMC @ 0x40000130
1,790,465 UART:
1,790,481 UART: Running Caliptra FMC ...
1,790,889 UART:
1,791,032 UART: [state] CFI Enabled
1,801,911 UART: [fht] FMC Alias Private Key: 7
1,909,264 UART: [art] Extend RT PCRs Done
1,909,692 UART: [art] Lock RT PCRs Done
1,911,324 UART: [art] Populate DV Done
1,919,625 UART: [fht] FMC Alias Private Key: 7
1,920,805 UART: [art] Derive CDI
1,921,085 UART: [art] Store in in slot 0x4
2,007,036 UART: [art] Derive Key Pair
2,007,396 UART: [art] Store priv key in slot 0x5
2,020,716 UART: [art] Derive Key Pair - Done
2,035,221 UART: [art] Signing Cert with AUTHO
2,035,701 UART: RITY.KEYID = 7
2,051,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,094 UART: [art] PUB.X = F4B0696D89B7C31B3AE191EA5B198E4997BE8DBB6277B47C4DA0FB9E4CA1F2A9B9DB1454E864648E8F02F40E02B23B78
2,058,869 UART: [art] PUB.Y = 4B465F2061DE2C26575A30E202E840B607BF709A69FD0605BAC58145C1638E5D1DBF950DE81B4D3BF6AF83750EE2C21F
2,065,809 UART: [art] SIG.R = 3049C46ED835B324F38B9F7646DC79B15367D697F55163C69FBF4FCC6FEF3B3D7238693827A30EEC29E30851C2BE2A7A
2,072,579 UART: [art] SIG.S = 127641C42142EEBF2A5A675CA227BD32B1DAEBBD920961BD737D19AE9479B0F99E93E75C0FA8EDFC32EC12EEF1E90A38
2,096,790 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 ready_for_fw is high
1,056,511 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,903 >>> mbox cmd response: success
1,615,071 UART:
1,615,087 UART: Running Caliptra FMC ...
1,615,495 UART:
1,615,638 UART: [state] CFI Enabled
1,625,935 UART: [fht] FMC Alias Private Key: 7
1,734,020 UART: [art] Extend RT PCRs Done
1,734,448 UART: [art] Lock RT PCRs Done
1,736,248 UART: [art] Populate DV Done
1,744,565 UART: [fht] FMC Alias Private Key: 7
1,745,537 UART: [art] Derive CDI
1,745,817 UART: [art] Store in in slot 0x4
1,831,066 UART: [art] Derive Key Pair
1,831,426 UART: [art] Store priv key in slot 0x5
1,844,856 UART: [art] Derive Key Pair - Done
1,859,591 UART: [art] Signing Cert with AUTHO
1,860,071 UART: RITY.KEYID = 7
1,875,447 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,212 UART: [art] PUB.X = 65817E815A1AAEEA9F4FA2E66CDA3812102979D52A1416635F8E5CB9786606E139C426D26124205F27B4633C2F8CC1B9
1,882,977 UART: [art] PUB.Y = 5E0A1935779C36B1D6F3814E933E13DC5BA13EB7259B63FA6D26473AE065210E23EA5637B2F29F7A29BF6CA6B722CD24
1,889,927 UART: [art] SIG.R = EA3A828541E5440498CBA95DE6D21F8146D85549C01377C426648A55E5E0D80B184495B59D68D2A8CF3DBCF46FFEB370
1,896,695 UART: [art] SIG.S = 5D65EFF884878429604CFCA89133623396CB89234C19B37480EDA072EE697F9FCD0BBC1BC7032AD245A673FD97DFC2AC
1,920,319 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,079 UART:
192,444 UART: Running Caliptra ROM ...
193,520 UART:
193,659 UART: [state] CFI Enabled
268,386 UART: [state] LifecycleState = Unprovisioned
270,337 UART: [state] DebugLocked = No
271,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,204 UART: [kat] SHA2-256
446,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,446 UART: [kat] ++
457,884 UART: [kat] sha1
467,824 UART: [kat] SHA2-256
470,529 UART: [kat] SHA2-384
477,303 UART: [kat] SHA2-512-ACC
479,660 UART: [kat] ECC-384
2,769,440 UART: [kat] HMAC-384Kdf
2,797,860 UART: [kat] LMS
3,988,169 UART: [kat] --
3,991,931 UART: [cold-reset] ++
3,993,359 UART: [fht] Storing FHT @ 0x50003400
4,005,328 UART: [idev] ++
4,005,965 UART: [idev] CDI.KEYID = 6
4,006,873 UART: [idev] SUBJECT.KEYID = 7
4,008,116 UART: [idev] UDS.KEYID = 0
4,009,159 ready_for_fw is high
4,009,354 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,049,419 UART: [idev] Erasing UDS.KEYID = 0
7,345,419 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,603 UART: [idev] --
7,372,602 UART: [ldev] ++
7,373,186 UART: [ldev] CDI.KEYID = 6
7,374,151 UART: [ldev] SUBJECT.KEYID = 5
7,375,378 UART: [ldev] AUTHORITY.KEYID = 7
7,376,608 UART: [ldev] FE.KEYID = 1
7,421,873 UART: [ldev] Erasing FE.KEYID = 1
10,752,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,990 UART: [ldev] --
13,116,578 UART: [fwproc] Waiting for Commands...
13,119,281 UART: [fwproc] Received command 0x46574c44
13,121,460 UART: [fwproc] Received Image of size 31676 bytes
16,171,156 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,251,804 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,320,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,350,205 >>> mbox cmd response: success
16,354,270 UART: [afmc] ++
16,354,848 UART: [afmc] CDI.KEYID = 6
16,355,806 UART: [afmc] SUBJECT.KEYID = 7
16,357,012 UART: [afmc] AUTHORITY.KEYID = 5
19,731,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,024,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,026,657 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,041,071 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,055,906 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,070,338 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,090,176 UART: [afmc] --
22,094,254 UART: [cold-reset] --
22,098,275 UART: [state] Locking Datavault
22,102,222 UART: [state] Locking PCR0, PCR1 and PCR31
22,103,970 UART: [state] Locking ICCM
22,105,767 UART: [exit] Launching FMC @ 0x40000130
22,114,181 UART:
22,114,422 UART: Running Caliptra FMC ...
22,115,443 UART:
22,115,583 UART: [state] CFI Enabled
22,184,623 UART: [fht] FMC Alias Private Key: 7
24,522,706 UART: [art] Extend RT PCRs Done
24,523,921 UART: [art] Lock RT PCRs Done
24,525,623 UART: [art] Populate DV Done
24,531,123 UART: [fht] FMC Alias Private Key: 7
24,532,818 UART: [art] Derive CDI
24,533,628 UART: [art] Store in in slot 0x4
24,593,192 UART: [art] Derive Key Pair
24,594,223 UART: [art] Store priv key in slot 0x5
27,886,768 UART: [art] Derive Key Pair - Done
27,899,842 UART: [art] Signing Cert with AUTHO
27,901,154 UART: RITY.KEYID = 7
30,189,291 UART: [art] Erasing AUTHORITY.KEYID = 7
30,190,799 UART: [art] PUB.X = C429415AF4A8B18016986F956CC0ABDF4936F401696C42B3971B014C26991289F981FC20DE35A6B276B5D81D07488B8D
30,198,024 UART: [art] PUB.Y = 1179DC661ADAE9C410AB27C87A3E4F46B68A44FDD70322EEE126803B5F567FDFBD11656CA89A25C3B93CCCC703D0191E
30,205,277 UART: [art] SIG.R = 17E72786ED2FFA89AF158824843AE6B735C8B0AC931D4B4F356F6B21E98392E05AA6A1DCF4DB03EFA66F16E5EA092D82
30,212,636 UART: [art] SIG.S = ED30E9A6E82E83017D3B12FB20D788A4709B2B13EDBDE82ACD57C62E963A6A50020BBA42BA97BA16B57311A6494AB565
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,787,031 ready_for_fw is high
3,787,682 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,193,580 >>> mbox cmd response: success
21,882,236 UART:
21,882,618 UART: Running Caliptra FMC ...
21,883,721 UART:
21,883,867 UART: [state] CFI Enabled
21,952,799 UART: [fht] FMC Alias Private Key: 7
24,291,112 UART: [art] Extend RT PCRs Done
24,292,339 UART: [art] Lock RT PCRs Done
24,294,093 UART: [art] Populate DV Done
24,299,329 UART: [fht] FMC Alias Private Key: 7
24,300,919 UART: [art] Derive CDI
24,301,664 UART: [art] Store in in slot 0x4
24,361,989 UART: [art] Derive Key Pair
24,363,028 UART: [art] Store priv key in slot 0x5
27,655,591 UART: [art] Derive Key Pair - Done
27,668,596 UART: [art] Signing Cert with AUTHO
27,669,904 UART: RITY.KEYID = 7
29,958,217 UART: [art] Erasing AUTHORITY.KEYID = 7
29,959,722 UART: [art] PUB.X = 5B2E31FA6CB33C4161ADF3EF4935BF0F87B2F127D8FB1B98C0125EE77CEE09A1C721B9F65C3D85200804F02AEEFFEC45
29,967,029 UART: [art] PUB.Y = 74F7451C6423FA7695631ECEF6DDE4DBF81096A24121A35B92DE763963CFD8868880257024496C3F85D91ECD7B1883D4
29,974,237 UART: [art] SIG.R = FCFE733D936124E84C295B5ECE019156BF24A25A5411AA6E45D5AC252B0E077AFAA1A76AEC11AD88FD3766BADE3A7C6F
29,981,629 UART: [art] SIG.S = F2A508089AC564C3CC67548F106A292638B2219A5A918D6D226B3100F88157DB27868AD113C7E4A49D45A2567CB70DD3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,447 UART:
192,793 UART: Running Caliptra ROM ...
193,965 UART:
603,568 UART: [state] CFI Enabled
617,956 UART: [state] LifecycleState = Unprovisioned
619,915 UART: [state] DebugLocked = No
622,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,454 UART: [kat] SHA2-256
797,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,731 UART: [kat] ++
808,203 UART: [kat] sha1
820,421 UART: [kat] SHA2-256
823,143 UART: [kat] SHA2-384
828,349 UART: [kat] SHA2-512-ACC
830,731 UART: [kat] ECC-384
3,114,487 UART: [kat] HMAC-384Kdf
3,127,075 UART: [kat] LMS
4,317,184 UART: [kat] --
4,320,069 UART: [cold-reset] ++
4,321,226 UART: [fht] Storing FHT @ 0x50003400
4,332,559 UART: [idev] ++
4,333,188 UART: [idev] CDI.KEYID = 6
4,334,093 UART: [idev] SUBJECT.KEYID = 7
4,335,336 UART: [idev] UDS.KEYID = 0
4,336,322 ready_for_fw is high
4,336,513 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,376,433 UART: [idev] Erasing UDS.KEYID = 0
7,621,070 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,682 UART: [idev] --
7,645,246 UART: [ldev] ++
7,645,889 UART: [ldev] CDI.KEYID = 6
7,646,796 UART: [ldev] SUBJECT.KEYID = 5
7,648,005 UART: [ldev] AUTHORITY.KEYID = 7
7,649,290 UART: [ldev] FE.KEYID = 1
7,658,701 UART: [ldev] Erasing FE.KEYID = 1
10,949,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,485 UART: [ldev] --
13,311,262 UART: [fwproc] Waiting for Commands...
13,312,929 UART: [fwproc] Received command 0x46574c44
13,315,117 UART: [fwproc] Received Image of size 31676 bytes
16,355,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,431,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,500,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,528,678 >>> mbox cmd response: success
16,533,245 UART: [afmc] ++
16,533,826 UART: [afmc] CDI.KEYID = 6
16,534,840 UART: [afmc] SUBJECT.KEYID = 7
16,535,996 UART: [afmc] AUTHORITY.KEYID = 5
19,848,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,143,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,145,536 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,159,930 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,174,751 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,189,194 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,211,848 UART: [afmc] --
22,216,033 UART: [cold-reset] --
22,220,230 UART: [state] Locking Datavault
22,225,613 UART: [state] Locking PCR0, PCR1 and PCR31
22,227,437 UART: [state] Locking ICCM
22,228,459 UART: [exit] Launching FMC @ 0x40000130
22,236,855 UART:
22,237,088 UART: Running Caliptra FMC ...
22,238,193 UART:
22,238,352 UART: [state] CFI Enabled
22,246,423 UART: [fht] FMC Alias Private Key: 7
24,577,427 UART: [art] Extend RT PCRs Done
24,578,645 UART: [art] Lock RT PCRs Done
24,580,208 UART: [art] Populate DV Done
24,585,667 UART: [fht] FMC Alias Private Key: 7
24,587,414 UART: [art] Derive CDI
24,588,228 UART: [art] Store in in slot 0x4
24,630,784 UART: [art] Derive Key Pair
24,631,821 UART: [art] Store priv key in slot 0x5
27,873,792 UART: [art] Derive Key Pair - Done
27,886,875 UART: [art] Signing Cert with AUTHO
27,888,191 UART: RITY.KEYID = 7
30,167,816 UART: [art] Erasing AUTHORITY.KEYID = 7
30,169,322 UART: [art] PUB.X = 2C7EB62FAD238ECA6C742700372F6A33D27612C93DAD166F671D5B9CB087AE74D995622DBF960F8F2D30764C6AF3AF09
30,176,555 UART: [art] PUB.Y = AF2DB28B534C7C9B8715F117C2CE68B1121D1FA13385416369822807A4C7D606BCB2131F7E0842592D7E50EBD0C15C0A
30,183,819 UART: [art] SIG.R = 5BE4CAD7FFBE2D4B64B2D56E1F5AE4854E199A94BB70FFCEBE03A0C4FC997B813545B620BA52898AFDB6C2F7D2C52D89
30,191,233 UART: [art] SIG.S = 4AC316E868ABE27E700C5A80D5045DEFCF9B6824CC3A2FD4D082F295F00CADD3F82B131057B5089813AEC20E473CA047
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,127,069 ready_for_fw is high
4,127,500 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,402,984 >>> mbox cmd response: success
22,045,710 UART:
22,046,115 UART: Running Caliptra FMC ...
22,047,322 UART:
22,047,495 UART: [state] CFI Enabled
22,055,178 UART: [fht] FMC Alias Private Key: 7
24,385,615 UART: [art] Extend RT PCRs Done
24,386,869 UART: [art] Lock RT PCRs Done
24,388,607 UART: [art] Populate DV Done
24,393,849 UART: [fht] FMC Alias Private Key: 7
24,395,398 UART: [art] Derive CDI
24,396,218 UART: [art] Store in in slot 0x4
24,438,585 UART: [art] Derive Key Pair
24,439,626 UART: [art] Store priv key in slot 0x5
27,681,651 UART: [art] Derive Key Pair - Done
27,694,651 UART: [art] Signing Cert with AUTHO
27,695,955 UART: RITY.KEYID = 7
29,974,810 UART: [art] Erasing AUTHORITY.KEYID = 7
29,976,319 UART: [art] PUB.X = 7232F85C3C89DF79F9D40A3F5828084414533A5C78AC09552C2E9B0B7353F2B19850370347A9F68CF5B0A378CBB45AC5
29,983,567 UART: [art] PUB.Y = C64428CF4E1BE46087ABAC0A9D8C0D994E332F53B1D4B73DEED296761B0E9DC9BC0FE971CD99D6D3525A4616AFAE5BE2
29,990,833 UART: [art] SIG.R = 2C46808C378165615F660D0892D49F539057157E621353B00FF69E7BB7BD4C3476C1A8B8C2F7CFE8BB2272557F1E2EBA
29,998,230 UART: [art] SIG.S = 88BC61C81360F10049CBBB2C49494510EA1AA335A4664A62320D78748DAFE21596626DC2822CCC0FC2EF6F85A0EA74EA
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,113 UART:
192,480 UART: Running Caliptra ROM ...
193,657 UART:
193,821 UART: [state] CFI Enabled
264,339 UART: [state] LifecycleState = Unprovisioned
266,234 UART: [state] DebugLocked = No
268,550 UART: [state] WD Timer not started. Device not locked for debugging
272,094 UART: [kat] SHA2-256
451,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,799 UART: [kat] ++
463,330 UART: [kat] sha1
473,921 UART: [kat] SHA2-256
476,922 UART: [kat] SHA2-384
483,470 UART: [kat] SHA2-512-ACC
486,408 UART: [kat] ECC-384
2,952,369 UART: [kat] HMAC-384Kdf
2,971,706 UART: [kat] LMS
3,501,125 UART: [kat] --
3,505,448 UART: [cold-reset] ++
3,506,906 UART: [fht] FHT @ 0x50003400
3,517,820 UART: [idev] ++
3,518,383 UART: [idev] CDI.KEYID = 6
3,519,371 UART: [idev] SUBJECT.KEYID = 7
3,520,548 UART: [idev] UDS.KEYID = 0
3,521,472 ready_for_fw is high
3,521,700 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,561,846 UART: [idev] Erasing UDS.KEYID = 0
6,026,311 UART: [idev] Sha1 KeyId Algorithm
6,048,754 UART: [idev] --
6,053,198 UART: [ldev] ++
6,053,806 UART: [ldev] CDI.KEYID = 6
6,054,733 UART: [ldev] SUBJECT.KEYID = 5
6,055,843 UART: [ldev] AUTHORITY.KEYID = 7
6,057,129 UART: [ldev] FE.KEYID = 1
6,104,013 UART: [ldev] Erasing FE.KEYID = 1
8,606,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,395 UART: [ldev] --
10,417,438 UART: [fwproc] Wait for Commands...
10,420,608 UART: [fwproc] Recv command 0x46574c44
10,422,695 UART: [fwproc] Recv'd Img size: 31656 bytes
12,814,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,888,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,957,449 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,985,623 >>> mbox cmd response: success
12,990,644 UART: [afmc] ++
12,991,221 UART: [afmc] CDI.KEYID = 6
12,992,125 UART: [afmc] SUBJECT.KEYID = 7
12,993,358 UART: [afmc] AUTHORITY.KEYID = 5
15,523,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,247,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,249,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,265,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,281,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,297,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,320,137 UART: [afmc] --
17,324,323 UART: [cold-reset] --
17,327,917 UART: [state] Locking Datavault
17,334,791 UART: [state] Locking PCR0, PCR1 and PCR31
17,336,530 UART: [state] Locking ICCM
17,337,821 UART: [exit] Launching FMC @ 0x40000130
17,346,219 UART:
17,346,466 UART: Running Caliptra FMC ...
17,347,569 UART:
17,347,750 UART: [state] CFI Enabled
17,403,355 UART: [fht] FMC Alias Private Key: 7
19,167,316 UART: [art] Extend RT PCRs Done
19,168,535 UART: [art] Lock RT PCRs Done
19,170,099 UART: [art] Populate DV Done
19,175,423 UART: [fht] FMC Alias Private Key: 7
19,177,105 UART: [art] Derive CDI
19,177,927 UART: [art] Store in in slot 0x4
19,235,395 UART: [art] Derive Key Pair
19,236,395 UART: [art] Store priv key in slot 0x5
21,699,040 UART: [art] Derive Key Pair - Done
21,711,987 UART: [art] Signing Cert with AUTHO
21,713,293 UART: RITY.KEYID = 7
23,424,209 UART: [art] Erasing AUTHORITY.KEYID = 7
23,425,710 UART: [art] PUB.X = BDEEEEA76CFC99A000246D07BA3BE588C538E579AD574367337DD24FFC382F4D56A41BB01414337068DDB1AE6AA30F49
23,432,989 UART: [art] PUB.Y = DC6656E5B0F1C8C50AA5D76DA181DA52A7F6561F0CDCFB1724D3EC36C0089183E4EF87810BD509956DC67149D4047E1D
23,440,229 UART: [art] SIG.R = A8E7DAB6A4D3B339511809A4EA5463AF6A470D452A749861031036E8F2E04E9888D09386740F811BD85EA99BEB12F7C6
23,447,586 UART: [art] SIG.S = E16B797F6D78CD53E59E31C984E5D71B22BFA8A73F24425A31E861A5783DEC2F23DD8ACB6B0072D91029B5A5FC0F6B65
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,182 UART:
192,534 UART: Running Caliptra ROM ...
193,697 UART:
193,843 UART: [state] CFI Enabled
265,306 UART: [state] LifecycleState = Unprovisioned
267,702 UART: [state] DebugLocked = No
269,597 UART: [state] WD Timer not started. Device not locked for debugging
273,837 UART: [kat] SHA2-256
463,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,478 UART: [kat] ++
474,959 UART: [kat] sha1
486,601 UART: [kat] SHA2-256
489,622 UART: [kat] SHA2-384
495,185 UART: [kat] SHA2-512-ACC
497,787 UART: [kat] ECC-384
2,949,745 UART: [kat] HMAC-384Kdf
2,975,150 UART: [kat] LMS
3,506,928 UART: [kat] --
3,510,569 UART: [cold-reset] ++
3,512,069 UART: [fht] FHT @ 0x50003400
3,524,063 UART: [idev] ++
3,524,740 UART: [idev] CDI.KEYID = 6
3,525,656 UART: [idev] SUBJECT.KEYID = 7
3,526,898 UART: [idev] UDS.KEYID = 0
3,527,827 ready_for_fw is high
3,528,029 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,568,156 UART: [idev] Erasing UDS.KEYID = 0
6,033,669 UART: [idev] Sha1 KeyId Algorithm
6,056,407 UART: [idev] --
6,061,378 UART: [ldev] ++
6,062,080 UART: [ldev] CDI.KEYID = 6
6,062,999 UART: [ldev] SUBJECT.KEYID = 5
6,064,163 UART: [ldev] AUTHORITY.KEYID = 7
6,065,393 UART: [ldev] FE.KEYID = 1
6,104,391 UART: [ldev] Erasing FE.KEYID = 1
8,611,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,685 UART: [ldev] --
10,416,312 UART: [fwproc] Wait for Commands...
10,418,029 UART: [fwproc] Recv command 0x46574c44
10,420,342 UART: [fwproc] Recv'd Img size: 31656 bytes
12,851,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,927,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,043,702 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,090,408 >>> mbox cmd response: success
13,095,010 UART: [afmc] ++
13,095,599 UART: [afmc] CDI.KEYID = 6
13,096,845 UART: [afmc] SUBJECT.KEYID = 7
13,098,324 UART: [afmc] AUTHORITY.KEYID = 5
15,638,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,364,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,366,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,381,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,397,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,412,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,436,496 UART: [afmc] --
17,440,072 UART: [cold-reset] --
17,444,599 UART: [state] Locking Datavault
17,450,116 UART: [state] Locking PCR0, PCR1 and PCR31
17,452,320 UART: [state] Locking ICCM
17,453,744 UART: [exit] Launching FMC @ 0x40000130
17,462,410 UART:
17,462,650 UART: Running Caliptra FMC ...
17,463,747 UART:
17,463,899 UART: [state] CFI Enabled
17,520,635 UART: [fht] FMC Alias Private Key: 7
19,284,486 UART: [art] Extend RT PCRs Done
19,285,687 UART: [art] Lock RT PCRs Done
19,287,113 UART: [art] Populate DV Done
19,292,618 UART: [fht] FMC Alias Private Key: 7
19,294,316 UART: [art] Derive CDI
19,295,128 UART: [art] Store in in slot 0x4
19,353,713 UART: [art] Derive Key Pair
19,354,714 UART: [art] Store priv key in slot 0x5
21,817,739 UART: [art] Derive Key Pair - Done
21,830,604 UART: [art] Signing Cert with AUTHO
21,831,916 UART: RITY.KEYID = 7
23,543,858 UART: [art] Erasing AUTHORITY.KEYID = 7
23,545,352 UART: [art] PUB.X = EA0A030DD7DE0259EFE104265555F878011D3CB3E7A9378A4F9F67D8FAF7D76EF323733159208A2185BDB72E08CD8C4C
23,552,590 UART: [art] PUB.Y = DC132B0C6B8E20DDB3D14F7CF25674A9B64B8E393D24BD4168297A877F242055AF2257A5A942089D00DF060599AB4975
23,559,866 UART: [art] SIG.R = 152A2F3B5C02E5341522628573F7A478CDF8C756321EF0E1CA66B079F1F7EB4AB72FE7F0C85D306424BEE7DEBC98BB94
23,567,253 UART: [art] SIG.S = 531C4D543E6D9910F111190C6FC943BBF69F18352EED1D21253604828FC89FD957FD9EBB8D92733FC5DB379B1CEB6ED6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,439,563 ready_for_fw is high
3,440,178 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,957,215 >>> mbox cmd response: success
17,253,469 UART:
17,253,851 UART: Running Caliptra FMC ...
17,255,059 UART:
17,255,227 UART: [state] CFI Enabled
17,323,113 UART: [fht] FMC Alias Private Key: 7
19,086,936 UART: [art] Extend RT PCRs Done
19,088,161 UART: [art] Lock RT PCRs Done
19,089,840 UART: [art] Populate DV Done
19,095,195 UART: [fht] FMC Alias Private Key: 7
19,096,789 UART: [art] Derive CDI
19,097,606 UART: [art] Store in in slot 0x4
19,155,516 UART: [art] Derive Key Pair
19,156,554 UART: [art] Store priv key in slot 0x5
21,619,297 UART: [art] Derive Key Pair - Done
21,632,575 UART: [art] Signing Cert with AUTHO
21,633,890 UART: RITY.KEYID = 7
23,344,710 UART: [art] Erasing AUTHORITY.KEYID = 7
23,346,222 UART: [art] PUB.X = 3CF9E05DB0F451CBF768D269D50E1B13D00F4F0F20C9AB890F350AD4E11C2C8ED77C51FB1EBDCAFE3EAAF089525E34A3
23,353,555 UART: [art] PUB.Y = E47D4B669843F354CE4B49D103359CC6B5F1C8FFB32AE2E4CECA33CDEF2B8343EB1BB90FB1BE9A561315443D9932256D
23,360,807 UART: [art] SIG.R = 0D674E34770B315425C6E68043B9E4CA91BDCE6181C435B3ECD81D799025AEBCD4E0CC1F267433FC652B0281D82F2219
23,368,182 UART: [art] SIG.S = 167F31FF64FB594980A61A69F7C4604DD71FC38B8A41134E81E9F03F450CEC1AEC9B760BBCE156AD8079C97B9C3BE181
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,399 UART:
192,770 UART: Running Caliptra ROM ...
193,876 UART:
603,537 UART: [state] CFI Enabled
616,713 UART: [state] LifecycleState = Unprovisioned
619,065 UART: [state] DebugLocked = No
621,150 UART: [state] WD Timer not started. Device not locked for debugging
625,669 UART: [kat] SHA2-256
815,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,276 UART: [kat] ++
826,792 UART: [kat] sha1
838,392 UART: [kat] SHA2-256
841,365 UART: [kat] SHA2-384
847,002 UART: [kat] SHA2-512-ACC
849,597 UART: [kat] ECC-384
3,292,213 UART: [kat] HMAC-384Kdf
3,305,672 UART: [kat] LMS
3,837,461 UART: [kat] --
3,842,478 UART: [cold-reset] ++
3,844,625 UART: [fht] FHT @ 0x50003400
3,856,908 UART: [idev] ++
3,857,617 UART: [idev] CDI.KEYID = 6
3,858,525 UART: [idev] SUBJECT.KEYID = 7
3,859,764 UART: [idev] UDS.KEYID = 0
3,860,682 ready_for_fw is high
3,860,882 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,901,051 UART: [idev] Erasing UDS.KEYID = 0
6,335,106 UART: [idev] Sha1 KeyId Algorithm
6,357,408 UART: [idev] --
6,362,071 UART: [ldev] ++
6,362,763 UART: [ldev] CDI.KEYID = 6
6,363,640 UART: [ldev] SUBJECT.KEYID = 5
6,364,790 UART: [ldev] AUTHORITY.KEYID = 7
6,366,074 UART: [ldev] FE.KEYID = 1
6,376,739 UART: [ldev] Erasing FE.KEYID = 1
8,854,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,316 UART: [ldev] --
10,646,876 UART: [fwproc] Wait for Commands...
10,649,504 UART: [fwproc] Recv command 0x46574c44
10,651,807 UART: [fwproc] Recv'd Img size: 31656 bytes
13,078,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,158,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,274,591 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,320,966 >>> mbox cmd response: success
13,324,937 UART: [afmc] ++
13,325,582 UART: [afmc] CDI.KEYID = 6
13,326,686 UART: [afmc] SUBJECT.KEYID = 7
13,328,216 UART: [afmc] AUTHORITY.KEYID = 5
15,830,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,551,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,553,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,568,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,583,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,598,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,622,416 UART: [afmc] --
17,625,366 UART: [cold-reset] --
17,630,421 UART: [state] Locking Datavault
17,636,630 UART: [state] Locking PCR0, PCR1 and PCR31
17,638,827 UART: [state] Locking ICCM
17,640,603 UART: [exit] Launching FMC @ 0x40000130
17,649,263 UART:
17,649,497 UART: Running Caliptra FMC ...
17,650,593 UART:
17,650,743 UART: [state] CFI Enabled
17,658,833 UART: [fht] FMC Alias Private Key: 7
19,415,999 UART: [art] Extend RT PCRs Done
19,417,208 UART: [art] Lock RT PCRs Done
19,418,934 UART: [art] Populate DV Done
19,424,431 UART: [fht] FMC Alias Private Key: 7
19,425,964 UART: [art] Derive CDI
19,426,723 UART: [art] Store in in slot 0x4
19,469,745 UART: [art] Derive Key Pair
19,470,783 UART: [art] Store priv key in slot 0x5
21,897,510 UART: [art] Derive Key Pair - Done
21,910,395 UART: [art] Signing Cert with AUTHO
21,911,698 UART: RITY.KEYID = 7
23,617,091 UART: [art] Erasing AUTHORITY.KEYID = 7
23,618,611 UART: [art] PUB.X = BD46D5F73AAA44B76C8E630772FF6482928A43C584611907A5306FEFFFD63A7142E766020CB3729316A98C41CCFB7968
23,625,874 UART: [art] PUB.Y = 088D209C0A0E2F8884EC8D13E16ADE568C6C97B71D2B2389BACFC9CC9EEEA51301714D01F1761724DA10CFE2B53083A2
23,633,118 UART: [art] SIG.R = 351DBD28BC5E2D35EC11FB8AE49BB75414D3EBC2ACA1F8606A18B48BC0C1A5BCCD0E8F818E21AA83FB6E0A69A61123DC
23,640,599 UART: [art] SIG.S = 964A10D48FC06F6D5B14B438C0B40E3A27DF77AD74B17CEE0E030A5F23B9DFFBC1F2DA651BE99D7492ABD09906147915
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,752,841 ready_for_fw is high
3,753,268 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,187,521 >>> mbox cmd response: success
17,446,674 UART:
17,447,056 UART: Running Caliptra FMC ...
17,448,199 UART:
17,448,376 UART: [state] CFI Enabled
17,456,188 UART: [fht] FMC Alias Private Key: 7
19,212,984 UART: [art] Extend RT PCRs Done
19,214,216 UART: [art] Lock RT PCRs Done
19,215,809 UART: [art] Populate DV Done
19,221,369 UART: [fht] FMC Alias Private Key: 7
19,222,811 UART: [art] Derive CDI
19,223,541 UART: [art] Store in in slot 0x4
19,266,605 UART: [art] Derive Key Pair
19,267,650 UART: [art] Store priv key in slot 0x5
21,694,610 UART: [art] Derive Key Pair - Done
21,707,613 UART: [art] Signing Cert with AUTHO
21,708,913 UART: RITY.KEYID = 7
23,414,524 UART: [art] Erasing AUTHORITY.KEYID = 7
23,416,026 UART: [art] PUB.X = 4B39DAED8A3FFD2304C1F9AA6A20D0A03CDE5A8A5BC05512EF0E715E9BA2A596A2C239B5E3B2216466F91FF346AAEDAD
23,423,314 UART: [art] PUB.Y = 6C125D022591DDE0252A78BCFB91B5E018EB88ABE64C1E06377FC1719FA423CF06E15849443A77ECBD79E2ACBFB9E663
23,430,573 UART: [art] SIG.R = D132D49C8587FA6AD211927E6747281F1C6B42BD98E65DF2C6E4F25C69A416CDD2071281B8612E8C218F2431924AD2C7
23,438,029 UART: [art] SIG.S = 714C2847DD32E4DE4D6AD751704664675A4E01ACA92F316AAEADA725C2B16C3433E4015D86DA81073E6533DF43736799
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,645 UART: [kat] SHA2-256
881,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,691 UART: [kat] ++
885,843 UART: [kat] sha1
890,109 UART: [kat] SHA2-256
892,047 UART: [kat] SHA2-384
894,788 UART: [kat] SHA2-512-ACC
896,689 UART: [kat] ECC-384
902,244 UART: [kat] HMAC-384Kdf
906,968 UART: [kat] LMS
1,475,164 UART: [kat] --
1,476,105 UART: [cold-reset] ++
1,476,627 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 ready_for_fw is high
1,480,609 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,076 UART: [idev] Erasing UDS.KEYID = 0
1,504,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,256 UART: [idev] --
1,514,329 UART: [ldev] ++
1,514,497 UART: [ldev] CDI.KEYID = 6
1,514,860 UART: [ldev] SUBJECT.KEYID = 5
1,515,286 UART: [ldev] AUTHORITY.KEYID = 7
1,515,749 UART: [ldev] FE.KEYID = 1
1,521,079 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,576 UART: [ldev] --
1,585,915 UART: [fwproc] Waiting for Commands...
1,586,664 UART: [fwproc] Received command 0x46574c44
1,587,455 UART: [fwproc] Received Image of size 31656 bytes
1,938,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,586 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,865 >>> mbox cmd response: success
2,007,999 UART: [afmc] ++
2,008,167 UART: [afmc] CDI.KEYID = 6
2,008,529 UART: [afmc] SUBJECT.KEYID = 7
2,008,954 UART: [afmc] AUTHORITY.KEYID = 5
2,043,649 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,015 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,408 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,098 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,107 UART: [afmc] --
2,087,107 UART: [cold-reset] --
2,088,109 UART: [state] Locking Datavault
2,089,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,746 UART: [state] Locking ICCM
2,090,322 UART: [exit] Launching FMC @ 0x40000130
2,095,651 UART:
2,095,667 UART: Running Caliptra FMC ...
2,096,075 UART:
2,096,129 UART: [state] CFI Enabled
2,106,736 UART: [fht] FMC Alias Private Key: 7
2,213,953 UART: [art] Extend RT PCRs Done
2,214,381 UART: [art] Lock RT PCRs Done
2,215,709 UART: [art] Populate DV Done
2,223,990 UART: [fht] FMC Alias Private Key: 7
2,224,986 UART: [art] Derive CDI
2,225,266 UART: [art] Store in in slot 0x4
2,310,453 UART: [art] Derive Key Pair
2,310,813 UART: [art] Store priv key in slot 0x5
2,323,361 UART: [art] Derive Key Pair - Done
2,338,065 UART: [art] Signing Cert with AUTHO
2,338,545 UART: RITY.KEYID = 7
2,353,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,354,432 UART: [art] PUB.X = 78CE543CBB6204711C8E91E382AAABD5BA1F64305DD0A96D99BB9BBB27BF5938081E42A3E782E7B4B2B035C9CE45762B
2,361,210 UART: [art] PUB.Y = F9D5F9D95AC3B5096C154CD238DEEDA0132099B6776B9AAD63A3A8D4B6CEFDC20521D660D5C2779F679D0E64BA5BB35E
2,368,169 UART: [art] SIG.R = 79467C8A56F95799C8414C06774B1B9168FCEDD6FF325FEBA721DC7C45AFF8112E78FE446F6046EFBC7EA8916E1DE644
2,374,948 UART: [art] SIG.S = 443F1EFBD3B5339BE15A98FE2F8AC259305378E32B4D5AD15240EBCEC480764A96BEEC5E7C43165CC767F15D465A149B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,865 ready_for_fw is high
1,362,865 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,855,593 >>> mbox cmd response: success
1,917,321 UART:
1,917,337 UART: Running Caliptra FMC ...
1,917,745 UART:
1,917,799 UART: [state] CFI Enabled
1,928,124 UART: [fht] FMC Alias Private Key: 7
2,036,267 UART: [art] Extend RT PCRs Done
2,036,695 UART: [art] Lock RT PCRs Done
2,038,203 UART: [art] Populate DV Done
2,046,160 UART: [fht] FMC Alias Private Key: 7
2,047,090 UART: [art] Derive CDI
2,047,370 UART: [art] Store in in slot 0x4
2,133,087 UART: [art] Derive Key Pair
2,133,447 UART: [art] Store priv key in slot 0x5
2,147,429 UART: [art] Derive Key Pair - Done
2,162,067 UART: [art] Signing Cert with AUTHO
2,162,547 UART: RITY.KEYID = 7
2,177,747 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,512 UART: [art] PUB.X = 240B6415CCAA57B122C86B7880465FAEF9B04D7FD482AD09EB5AFB2D7CA04CB5C029E57E6BB2E50DDD342E3FF9C4FB57
2,185,297 UART: [art] PUB.Y = CB8F65680639F6B7E56BB546165321DFCC00A6F30CA27B5028F543D6C3D6B93939B6E06947BAC2C14AA08F9C7351D748
2,192,223 UART: [art] SIG.R = 5CCD50C25CB7FD483F52372503CBC8C3D0C705CD5BF7ACE9D206691C826703BAF2AD9027E7E62053317C50ADDB0C71C3
2,198,992 UART: [art] SIG.S = 053528ABB47233FD5F4AE6C4908D27191B07E717A2B9B1ED9AAFEAB0F3519A631AF83E252568E7B3AD2FB3AFA2BE7D4B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,166 UART: [kat] SHA2-256
882,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,212 UART: [kat] ++
886,364 UART: [kat] sha1
890,730 UART: [kat] SHA2-256
892,668 UART: [kat] SHA2-384
895,425 UART: [kat] SHA2-512-ACC
897,326 UART: [kat] ECC-384
902,687 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,660 UART: [cold-reset] ++
1,477,046 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 ready_for_fw is high
1,481,178 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,107 UART: [idev] Erasing UDS.KEYID = 0
1,506,075 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,588 UART: [ldev] ++
1,515,756 UART: [ldev] CDI.KEYID = 6
1,516,119 UART: [ldev] SUBJECT.KEYID = 5
1,516,545 UART: [ldev] AUTHORITY.KEYID = 7
1,517,008 UART: [ldev] FE.KEYID = 1
1,522,546 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,693 UART: [ldev] --
1,587,182 UART: [fwproc] Waiting for Commands...
1,587,803 UART: [fwproc] Received command 0x46574c44
1,588,594 UART: [fwproc] Received Image of size 31656 bytes
1,939,397 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,997,325 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,009,090 >>> mbox cmd response: success
2,010,222 UART: [afmc] ++
2,010,390 UART: [afmc] CDI.KEYID = 6
2,010,752 UART: [afmc] SUBJECT.KEYID = 7
2,011,177 UART: [afmc] AUTHORITY.KEYID = 5
2,046,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,237 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,927 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,684 UART: [afmc] --
2,089,688 UART: [cold-reset] --
2,090,522 UART: [state] Locking Datavault
2,091,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,285 UART: [state] Locking ICCM
2,092,841 UART: [exit] Launching FMC @ 0x40000130
2,098,170 UART:
2,098,186 UART: Running Caliptra FMC ...
2,098,594 UART:
2,098,737 UART: [state] CFI Enabled
2,109,280 UART: [fht] FMC Alias Private Key: 7
2,217,143 UART: [art] Extend RT PCRs Done
2,217,571 UART: [art] Lock RT PCRs Done
2,219,309 UART: [art] Populate DV Done
2,227,424 UART: [fht] FMC Alias Private Key: 7
2,228,472 UART: [art] Derive CDI
2,228,752 UART: [art] Store in in slot 0x4
2,314,509 UART: [art] Derive Key Pair
2,314,869 UART: [art] Store priv key in slot 0x5
2,327,733 UART: [art] Derive Key Pair - Done
2,342,549 UART: [art] Signing Cert with AUTHO
2,343,029 UART: RITY.KEYID = 7
2,358,345 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,110 UART: [art] PUB.X = 42E038EA4CD34DD6E8F698CF4BA7DC7101F2F74A81FBDB3CD80029ADCED8A70EACA421A40D22C9CA5535F17EB7A16875
2,365,873 UART: [art] PUB.Y = 1D0B7AEFCB554D6C16A625DC7F1FBD421815732B8457499569F6362DBEDA61DADBA5C0D23494EEBC87773F81B41E9067
2,372,832 UART: [art] SIG.R = 88F72CD278E638EDABD1DD213B3912E838733D25EAFE42E01763F34DA81535C86FA3BB043FAFFA4AAADFC0C7936999B6
2,379,617 UART: [art] SIG.S = C2955EA4ACABA798F795BD03F1F760B6A2984DA10ADBADA12636238A83FDE77A000C57C8E787596BFAC42AA3EF69325D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 ready_for_fw is high
1,362,912 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,590 >>> mbox cmd response: success
1,918,138 UART:
1,918,154 UART: Running Caliptra FMC ...
1,918,562 UART:
1,918,705 UART: [state] CFI Enabled
1,929,262 UART: [fht] FMC Alias Private Key: 7
2,037,787 UART: [art] Extend RT PCRs Done
2,038,215 UART: [art] Lock RT PCRs Done
2,039,753 UART: [art] Populate DV Done
2,048,242 UART: [fht] FMC Alias Private Key: 7
2,049,242 UART: [art] Derive CDI
2,049,522 UART: [art] Store in in slot 0x4
2,135,005 UART: [art] Derive Key Pair
2,135,365 UART: [art] Store priv key in slot 0x5
2,148,463 UART: [art] Derive Key Pair - Done
2,162,909 UART: [art] Signing Cert with AUTHO
2,163,389 UART: RITY.KEYID = 7
2,178,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,398 UART: [art] PUB.X = EF47B436481E40BA62BE831CF669D6726C5F08623F1E80AB904D4CBD5E1089A9015830B557E2E262935F494FEA6A0DF2
2,186,163 UART: [art] PUB.Y = BE575235868EA1E321B8A108C0D3B8CB3EE2F94486DB3D673CBC83CAD2C9B1D5D576540FB3512D19C9C5A9CAB47F3C6B
2,193,125 UART: [art] SIG.R = D9908C17D23FFF81924210C02ED2232F8BCA6ABB402D6C3D2CC4BCCAF13B0BA4896A7C1409DEC8BED09B8E68DA450D1A
2,199,910 UART: [art] SIG.S = 5F71E0CF3CAFA9F199A62BAC01B46C8C6D510A4E1314688E53958339FF500C5C6C85E106A28EE3F598B1F8E21471B104
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,547 UART: [kat] SHA2-256
903,487 UART: [kat] SHA2-384
906,344 UART: [kat] SHA2-512-ACC
908,245 UART: [kat] ECC-384
917,884 UART: [kat] HMAC-384Kdf
922,370 UART: [kat] LMS
1,170,698 UART: [kat] --
1,171,473 UART: [cold-reset] ++
1,172,009 UART: [fht] FHT @ 0x50003400
1,174,844 UART: [idev] ++
1,175,012 UART: [idev] CDI.KEYID = 6
1,175,372 UART: [idev] SUBJECT.KEYID = 7
1,175,796 UART: [idev] UDS.KEYID = 0
1,176,141 ready_for_fw is high
1,176,141 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,088 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,593 UART: [idev] --
1,210,733 UART: [ldev] ++
1,210,901 UART: [ldev] CDI.KEYID = 6
1,211,264 UART: [ldev] SUBJECT.KEYID = 5
1,211,690 UART: [ldev] AUTHORITY.KEYID = 7
1,212,153 UART: [ldev] FE.KEYID = 1
1,217,291 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,311 UART: [ldev] --
1,282,630 UART: [fwproc] Wait for Commands...
1,283,434 UART: [fwproc] Recv command 0x46574c44
1,284,162 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,769 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,558 >>> mbox cmd response: success
1,703,782 UART: [afmc] ++
1,703,950 UART: [afmc] CDI.KEYID = 6
1,704,312 UART: [afmc] SUBJECT.KEYID = 7
1,704,737 UART: [afmc] AUTHORITY.KEYID = 5
1,739,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,949 UART: [afmc] --
1,783,003 UART: [cold-reset] --
1,783,783 UART: [state] Locking Datavault
1,785,092 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,696 UART: [state] Locking ICCM
1,786,366 UART: [exit] Launching FMC @ 0x40000130
1,791,695 UART:
1,791,711 UART: Running Caliptra FMC ...
1,792,119 UART:
1,792,173 UART: [state] CFI Enabled
1,802,610 UART: [fht] FMC Alias Private Key: 7
1,910,221 UART: [art] Extend RT PCRs Done
1,910,649 UART: [art] Lock RT PCRs Done
1,912,067 UART: [art] Populate DV Done
1,920,290 UART: [fht] FMC Alias Private Key: 7
1,921,386 UART: [art] Derive CDI
1,921,666 UART: [art] Store in in slot 0x4
2,007,295 UART: [art] Derive Key Pair
2,007,655 UART: [art] Store priv key in slot 0x5
2,021,437 UART: [art] Derive Key Pair - Done
2,035,958 UART: [art] Signing Cert with AUTHO
2,036,438 UART: RITY.KEYID = 7
2,051,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,551 UART: [art] PUB.X = EB09F0C518662F6941F561634DEE78308359A28E60A6B7046A19278B60491264B6CEBCBC9A3DF781591B51B83FB655EF
2,059,315 UART: [art] PUB.Y = 63C38EA53A731C73C45E8D0E39A8566EECC073437764203AE21E7F3EDE0F05A0F0876DB2F6A38403125EDC1D9ADE0C63
2,066,260 UART: [art] SIG.R = BCDCAC3787B64231B93F3B2A6950401C014680DB059D77321BCB22C805A75175918EC7EDD97A84A886ABBF8BF5633C80
2,073,027 UART: [art] SIG.S = 1067DFA15E164DCC784A236448B5C1C12C5B60E4D566F632636BFD87DBDFC19D1CF07A06718F36FA624472D68B33DC9F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,857 ready_for_fw is high
1,060,857 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,879 >>> mbox cmd response: success
1,618,513 UART:
1,618,529 UART: Running Caliptra FMC ...
1,618,937 UART:
1,618,991 UART: [state] CFI Enabled
1,629,432 UART: [fht] FMC Alias Private Key: 7
1,737,969 UART: [art] Extend RT PCRs Done
1,738,397 UART: [art] Lock RT PCRs Done
1,740,055 UART: [art] Populate DV Done
1,748,110 UART: [fht] FMC Alias Private Key: 7
1,749,062 UART: [art] Derive CDI
1,749,342 UART: [art] Store in in slot 0x4
1,835,247 UART: [art] Derive Key Pair
1,835,607 UART: [art] Store priv key in slot 0x5
1,848,057 UART: [art] Derive Key Pair - Done
1,862,734 UART: [art] Signing Cert with AUTHO
1,863,214 UART: RITY.KEYID = 7
1,878,372 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,137 UART: [art] PUB.X = 5394D80690513FEA6E4AA2BAFC452A910BE0EA8C36B3D28FF5AA52954CFC1ADB51C68BDBF720F413A1E6F8AF479B39ED
1,885,925 UART: [art] PUB.Y = 3E293515C292D588089833B22DAAAD4D95C29E46653E5B3C81EF380BD38B4ED23A811C1CA37D351346033FFE6A273ADA
1,892,872 UART: [art] SIG.R = 27FC232501C3389B06D6269D2409F954299C25DB8E266D0DA06610B1F048E38620AD2FB868652FFD167A7338AABBE839
1,899,628 UART: [art] SIG.S = 17D635A9CED64440E30F4F4BF64ED010A8FCE6E9A49DE9D26E8673ACC6B94C3FF6F4EEA986CE9C70B5EACEB3B0949FE5
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
893,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,064 UART: [kat] ++
898,216 UART: [kat] sha1
902,412 UART: [kat] SHA2-256
904,352 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,269 UART: [kat] HMAC-384Kdf
923,067 UART: [kat] LMS
1,171,395 UART: [kat] --
1,172,442 UART: [cold-reset] ++
1,172,866 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,477 UART: [idev] Erasing UDS.KEYID = 0
1,201,742 UART: [idev] Sha1 KeyId Algorithm
1,210,212 UART: [idev] --
1,211,266 UART: [ldev] ++
1,211,434 UART: [ldev] CDI.KEYID = 6
1,211,797 UART: [ldev] SUBJECT.KEYID = 5
1,212,223 UART: [ldev] AUTHORITY.KEYID = 7
1,212,686 UART: [ldev] FE.KEYID = 1
1,217,966 UART: [ldev] Erasing FE.KEYID = 1
1,243,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,840 UART: [ldev] --
1,283,261 UART: [fwproc] Wait for Commands...
1,284,039 UART: [fwproc] Recv command 0x46574c44
1,284,767 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,972 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,763 >>> mbox cmd response: success
1,704,859 UART: [afmc] ++
1,705,027 UART: [afmc] CDI.KEYID = 6
1,705,389 UART: [afmc] SUBJECT.KEYID = 7
1,705,814 UART: [afmc] AUTHORITY.KEYID = 5
1,741,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,862 UART: [afmc] --
1,784,810 UART: [cold-reset] --
1,785,614 UART: [state] Locking Datavault
1,786,747 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,351 UART: [state] Locking ICCM
1,787,949 UART: [exit] Launching FMC @ 0x40000130
1,793,278 UART:
1,793,294 UART: Running Caliptra FMC ...
1,793,702 UART:
1,793,845 UART: [state] CFI Enabled
1,804,646 UART: [fht] FMC Alias Private Key: 7
1,912,493 UART: [art] Extend RT PCRs Done
1,912,921 UART: [art] Lock RT PCRs Done
1,914,511 UART: [art] Populate DV Done
1,922,904 UART: [fht] FMC Alias Private Key: 7
1,923,986 UART: [art] Derive CDI
1,924,266 UART: [art] Store in in slot 0x4
2,009,679 UART: [art] Derive Key Pair
2,010,039 UART: [art] Store priv key in slot 0x5
2,023,223 UART: [art] Derive Key Pair - Done
2,037,635 UART: [art] Signing Cert with AUTHO
2,038,115 UART: RITY.KEYID = 7
2,053,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,776 UART: [art] PUB.X = 3293FA92712CE1BC2AE156FCB9D40BAF5C974E32C5FEBE8B789B8B1207BC58FF7B4CED2F852384B3F2E23C93BF60AABC
2,060,566 UART: [art] PUB.Y = AD15432262F2B2A385CBDE3CEA4D6EFD4B940ED5514E7561AE19E35C499EDE522FBEC08A12DFB8C7E575D72E634803C9
2,067,528 UART: [art] SIG.R = 260E0F1E96135ADF502B86A30ED6D55FD95FF32EBC053391C99BDA6A13047E29AA8EBF784F254C5132623106C9A9758E
2,074,286 UART: [art] SIG.S = 23BB2195B9D12D068095F21E4A15B505455C4D6C39D4AC545A00DB0D1E30FD7443918F3E8B5947BDBA51D7AB831EC3EB
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,828 ready_for_fw is high
1,059,828 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,274 >>> mbox cmd response: success
1,616,026 UART:
1,616,042 UART: Running Caliptra FMC ...
1,616,450 UART:
1,616,593 UART: [state] CFI Enabled
1,627,244 UART: [fht] FMC Alias Private Key: 7
1,735,289 UART: [art] Extend RT PCRs Done
1,735,717 UART: [art] Lock RT PCRs Done
1,737,185 UART: [art] Populate DV Done
1,745,394 UART: [fht] FMC Alias Private Key: 7
1,746,532 UART: [art] Derive CDI
1,746,812 UART: [art] Store in in slot 0x4
1,832,663 UART: [art] Derive Key Pair
1,833,023 UART: [art] Store priv key in slot 0x5
1,846,405 UART: [art] Derive Key Pair - Done
1,861,681 UART: [art] Signing Cert with AUTHO
1,862,161 UART: RITY.KEYID = 7
1,877,399 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,164 UART: [art] PUB.X = ECA1A6055E55D217E9DE5974E3E174757D1465857135E5FE037C64B79546F78DFEDA4ACE0D176780BC07B6CB123F517B
1,884,928 UART: [art] PUB.Y = 04F1817B2466ED616F8474AD3B08AA0A64F7CB33A3F16999903C27C054FF01BD65A98C2BC283CD7FCF080749646705A4
1,891,859 UART: [art] SIG.R = C0669A5237C98401DA82733CF52FF610EAD6F140A9E3A83F466E136CAC079A233F08B16F9C6E021C7B43BCC501ED1796
1,898,620 UART: [art] SIG.S = DBB35D0BC8AAF3D9CD7D7AD5B21AA365EC43FB76817E8E7093C4C1B09615A8B77B40A5E0CFF2E29EE60F0A328F6526E7
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,755 UART: [idev] ++
1,172,923 UART: [idev] CDI.KEYID = 6
1,173,284 UART: [idev] SUBJECT.KEYID = 7
1,173,709 UART: [idev] UDS.KEYID = 0
1,174,055 ready_for_fw is high
1,174,055 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,679 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,604 UART: [ldev] --
1,281,922 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x46574c44
1,283,292 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,690 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,392 >>> mbox cmd response: success
1,703,513 UART: [afmc] ++
1,703,681 UART: [afmc] CDI.KEYID = 6
1,704,044 UART: [afmc] SUBJECT.KEYID = 7
1,704,470 UART: [afmc] AUTHORITY.KEYID = 5
1,739,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,374 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,030 UART: [afmc] --
1,783,140 UART: [cold-reset] --
1,784,236 UART: [state] Locking Datavault
1,785,279 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,883 UART: [state] Locking ICCM
1,786,543 UART: [exit] Launching FMC @ 0x40000130
1,791,872 UART:
1,791,888 UART: Running Caliptra FMC ...
1,792,296 UART:
1,792,350 UART: [state] CFI Enabled
1,803,091 UART: [fht] FMC Alias Private Key: 7
1,910,948 UART: [art] Extend RT PCRs Done
1,911,376 UART: [art] Lock RT PCRs Done
1,913,296 UART: [art] Populate DV Done
1,921,569 UART: [fht] FMC Alias Private Key: 7
1,922,717 UART: [art] Derive CDI
1,922,997 UART: [art] Store in in slot 0x4
2,009,238 UART: [art] Derive Key Pair
2,009,598 UART: [art] Store priv key in slot 0x5
2,022,004 UART: [art] Derive Key Pair - Done
2,036,598 UART: [art] Signing Cert with AUTHO
2,037,078 UART: RITY.KEYID = 7
2,052,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,335 UART: [art] PUB.X = 0097120F829D446F1EFCEE1E3145570D610B151602919D0146195B0EFF87B420D35A5EAFB69C711A12CCDEE1F6D26062
2,060,067 UART: [art] PUB.Y = E57E088C67C86FEB27966786EDF65EB996184F219ED5ABCC3E39EF16CB09DF896B7CA9085BB4B0833477934D8E1FEA0F
2,067,019 UART: [art] SIG.R = 63AF1B4BA0223FBEF7666482F92AA740B7ECEE7941A09B1F021957437ED04E58CE85A8FFB46110FEFD69AE5636471DA1
2,073,798 UART: [art] SIG.S = AE17DE908079D1EEDE6C186AA04A8A5091CEC505E74F503C37C805315557181A9BE9DB315BD206D232F3666C66ED5E48
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,890 ready_for_fw is high
1,055,890 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,568 >>> mbox cmd response: success
1,612,610 UART:
1,612,626 UART: Running Caliptra FMC ...
1,613,034 UART:
1,613,088 UART: [state] CFI Enabled
1,623,925 UART: [fht] FMC Alias Private Key: 7
1,731,868 UART: [art] Extend RT PCRs Done
1,732,296 UART: [art] Lock RT PCRs Done
1,733,562 UART: [art] Populate DV Done
1,741,889 UART: [fht] FMC Alias Private Key: 7
1,742,867 UART: [art] Derive CDI
1,743,147 UART: [art] Store in in slot 0x4
1,828,920 UART: [art] Derive Key Pair
1,829,280 UART: [art] Store priv key in slot 0x5
1,842,846 UART: [art] Derive Key Pair - Done
1,857,827 UART: [art] Signing Cert with AUTHO
1,858,307 UART: RITY.KEYID = 7
1,873,705 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,470 UART: [art] PUB.X = F178C0A77ED0C78187256712EB112AB1FDF572E41CC293E1A6D4070CC8ACB663A137085BED8876B45206AC99511EBEEC
1,881,238 UART: [art] PUB.Y = 5E35F483CF4801676BD99DAC5DACBDD7D1138BD7F37DF219165676BBE68FA0B996C7F5378A381C8F8C8706CB78EEEB1A
1,888,200 UART: [art] SIG.R = 5FC7D2CB64E977857AF7F2FD464C73620760BF58909103E0F42238E4C91D83B0AB3E5D71A9078B6A4A76AA87B2B4B69B
1,894,967 UART: [art] SIG.S = 00B7A4966CF7FA5C207B34591B7D85DAFC04C6EA7F9A0992D7C9BA283418C0D22D8F19998A5B27BB96BF531B76AF7D24
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 ready_for_fw is high
1,174,844 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,608 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,457 UART: [ldev] ++
1,209,625 UART: [ldev] CDI.KEYID = 6
1,209,989 UART: [ldev] SUBJECT.KEYID = 5
1,210,416 UART: [ldev] AUTHORITY.KEYID = 7
1,210,879 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,295 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,771 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,075 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,909 >>> mbox cmd response: success
1,702,960 UART: [afmc] ++
1,703,128 UART: [afmc] CDI.KEYID = 6
1,703,491 UART: [afmc] SUBJECT.KEYID = 7
1,703,917 UART: [afmc] AUTHORITY.KEYID = 5
1,739,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,599 UART: [afmc] --
1,782,729 UART: [cold-reset] --
1,783,583 UART: [state] Locking Datavault
1,784,552 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,156 UART: [state] Locking ICCM
1,785,798 UART: [exit] Launching FMC @ 0x40000130
1,791,127 UART:
1,791,143 UART: Running Caliptra FMC ...
1,791,551 UART:
1,791,694 UART: [state] CFI Enabled
1,802,215 UART: [fht] FMC Alias Private Key: 7
1,910,402 UART: [art] Extend RT PCRs Done
1,910,830 UART: [art] Lock RT PCRs Done
1,912,424 UART: [art] Populate DV Done
1,920,401 UART: [fht] FMC Alias Private Key: 7
1,921,393 UART: [art] Derive CDI
1,921,673 UART: [art] Store in in slot 0x4
2,007,060 UART: [art] Derive Key Pair
2,007,420 UART: [art] Store priv key in slot 0x5
2,020,304 UART: [art] Derive Key Pair - Done
2,034,831 UART: [art] Signing Cert with AUTHO
2,035,311 UART: RITY.KEYID = 7
2,050,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,086 UART: [art] PUB.X = 090D9BF79AA7FAE7B2A743CA2B3504F85D5FA5B32668AAA90E0FC9A99A93A59FE522CB30247FAE9C98A45D7C0F5E78D1
2,057,858 UART: [art] PUB.Y = 90F16B637F93978A82EFDDCC08757FB588A84A430792D142367E0FA5E135D9ABAD8E72BE801FF84E6E39CD33112A65D7
2,064,807 UART: [art] SIG.R = 7E0913162D7C2DCCBE3AE49F5E85EC1D276B201D83A4652A9B68A8652E6FBBE57DEF8F94BF5E5B5EA8A4A189CAAF1BA1
2,071,600 UART: [art] SIG.S = 49276AA50E39278D6064F473192B72ACD63B09A4B72E3CDDB6BD92C0891FB85DD27431801E664D62524CCC9DAF5BF8E3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,869 ready_for_fw is high
1,056,869 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,345 >>> mbox cmd response: success
1,614,815 UART:
1,614,831 UART: Running Caliptra FMC ...
1,615,239 UART:
1,615,382 UART: [state] CFI Enabled
1,625,881 UART: [fht] FMC Alias Private Key: 7
1,733,396 UART: [art] Extend RT PCRs Done
1,733,824 UART: [art] Lock RT PCRs Done
1,735,422 UART: [art] Populate DV Done
1,743,535 UART: [fht] FMC Alias Private Key: 7
1,744,539 UART: [art] Derive CDI
1,744,819 UART: [art] Store in in slot 0x4
1,830,656 UART: [art] Derive Key Pair
1,831,016 UART: [art] Store priv key in slot 0x5
1,844,246 UART: [art] Derive Key Pair - Done
1,858,750 UART: [art] Signing Cert with AUTHO
1,859,230 UART: RITY.KEYID = 7
1,874,212 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,977 UART: [art] PUB.X = 882C69D31F407B117DF2E3F5019947F6467BF4E47FF58E4F9782E6DB4DC472536DB456A14809D6E61B90AE30FEA9DCBD
1,881,751 UART: [art] PUB.Y = 6F2868A33B8493F0EB3B7A603443285A88F981B40E404B74DE472875ECA3DF0297407B514491E86475B8DEE85A819B94
1,888,689 UART: [art] SIG.R = EC4A38BB9135FDB155AB5E17578904D620487DF07B6AA72B8C1660D7A55BDC9EEF8B22EC34ECD1022E4D807EA829DC32
1,895,469 UART: [art] SIG.S = 37BB4886F54B45905199A46E53DD5A0C98B0EAF1A0F6DC3D246ECC53587F2730ED0C57E4B5AA48AE28AB26D004637FC1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,013 UART:
192,384 UART: Running Caliptra ROM ...
193,484 UART:
193,620 UART: [state] CFI Enabled
263,511 UART: [state] LifecycleState = Unprovisioned
265,493 UART: [state] DebugLocked = No
266,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,445 UART: [kat] SHA2-256
442,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,838 UART: [kat] ++
453,344 UART: [kat] sha1
464,953 UART: [kat] SHA2-256
467,681 UART: [kat] SHA2-384
472,884 UART: [kat] SHA2-512-ACC
475,257 UART: [kat] ECC-384
2,766,981 UART: [kat] HMAC-384Kdf
2,798,489 UART: [kat] LMS
3,988,799 UART: [kat] --
3,993,737 UART: [cold-reset] ++
3,996,375 UART: [fht] Storing FHT @ 0x50003400
4,009,413 UART: [idev] ++
4,009,977 UART: [idev] CDI.KEYID = 6
4,010,856 UART: [idev] SUBJECT.KEYID = 7
4,012,218 UART: [idev] UDS.KEYID = 0
4,013,312 ready_for_fw is high
4,013,507 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,108,523 UART: [idev] Erasing UDS.KEYID = 0
7,344,827 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,026 UART: [idev] --
7,370,915 UART: [ldev] ++
7,371,539 UART: [ldev] CDI.KEYID = 6
7,372,420 UART: [ldev] SUBJECT.KEYID = 5
7,373,678 UART: [ldev] AUTHORITY.KEYID = 7
7,374,961 UART: [ldev] FE.KEYID = 1
7,421,274 UART: [ldev] Erasing FE.KEYID = 1
10,752,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,292 UART: [ldev] --
13,116,159 UART: [fwproc] Waiting for Commands...
13,117,829 UART: [fwproc] Received command 0x46574c44
13,120,028 UART: [fwproc] Received Image of size 75428 bytes
16,694,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,770,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,839,184 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,021,165 >>> mbox cmd response: success
17,021,568 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,025,579 UART: [afmc] ++
17,026,156 UART: [afmc] CDI.KEYID = 6
17,027,089 UART: [afmc] SUBJECT.KEYID = 7
17,028,357 UART: [afmc] AUTHORITY.KEYID = 5
20,389,958 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,690,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,693,233 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,707,653 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,722,466 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,736,923 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,758,794 UART: [afmc] --
22,763,520 UART: [cold-reset] --
22,766,942 UART: [state] Locking Datavault
22,773,262 UART: [state] Locking PCR0, PCR1 and PCR31
22,775,049 UART: [state] Locking ICCM
22,777,261 UART: [exit] Launching FMC @ 0x40000130
22,785,654 UART:
22,785,893 UART: Running Caliptra FMC ...
22,786,993 UART:
22,787,145 UART: [state] CFI Enabled
22,849,465 UART: [fht] FMC Alias Private Key: 7
25,187,439 UART: [art] Extend RT PCRs Done
25,188,654 UART: [art] Lock RT PCRs Done
25,190,114 UART: [art] Populate DV Done
25,195,629 UART: [fht] FMC Alias Private Key: 7
25,197,275 UART: [art] Derive CDI
25,198,103 UART: [art] Store in in slot 0x4
25,257,767 UART: [art] Derive Key Pair
25,258,797 UART: [art] Store priv key in slot 0x5
28,551,807 UART: [art] Derive Key Pair - Done
28,564,969 UART: [art] Signing Cert with AUTHO
28,566,269 UART: RITY.KEYID = 7
30,852,625 UART: [art] Erasing AUTHORITY.KEYID = 7
30,854,121 UART: [art] PUB.X = 221EE5E329966F815AF841D4AF56A4BEA74CBB5A7E18657D698C2C48A7D0C02CD9C428B776738B051579081C59799BE3
30,861,408 UART: [art] PUB.Y = E80F24B2464E51FB17E81FF8C5ED0CDC347572450A762B5A9B662CB95C40CCA6F119D67A60136AB368878642E02957C5
30,868,626 UART: [art] SIG.R = F8D58D32A0872DEA4AB67EDCC1E70D23F42A0015D1DFF8752228F64B4916F6E87C13E69669C09930238207D943D27DA4
30,875,968 UART: [art] SIG.S = 5D8DF2F0D021C8C2A36FF009B609E326FE3EEEAB9600492C9A3A5DFCBDE1D69128D01CA681B15084E483362C3D153E22
32,181,101 UART: mock_rt_interact::rt_entry...FMC Tester
32,298,694 UART: [rt] Runtime listening for mailbox commands...
32,302,933 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,805,401 ready_for_fw is high
3,805,853 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,109,553 >>> mbox cmd response: success
17,110,433 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,804,088 UART:
22,804,577 UART: Running Caliptra FMC ...
22,805,768 UART:
22,805,935 UART: [state] CFI Enabled
22,875,197 UART: [fht] FMC Alias Private Key: 7
25,213,657 UART: [art] Extend RT PCRs Done
25,215,032 UART: [art] Lock RT PCRs Done
25,216,662 UART: [art] Populate DV Done
25,222,032 UART: [fht] FMC Alias Private Key: 7
25,223,734 UART: [art] Derive CDI
25,224,546 UART: [art] Store in in slot 0x4
25,283,883 UART: [art] Derive Key Pair
25,284,876 UART: [art] Store priv key in slot 0x5
28,578,153 UART: [art] Derive Key Pair - Done
28,591,095 UART: [art] Signing Cert with AUTHO
28,592,395 UART: RITY.KEYID = 7
30,880,272 UART: [art] Erasing AUTHORITY.KEYID = 7
30,882,261 UART: [art] PUB.X = F7F8F45C42A37A01C9F958691F5810D3B08E400F3CA86F4F05053AAC08027E82D16E237EC25358F8E8BF42AC05B125D0
30,889,010 UART: [art] PUB.Y = 02E37D3F881CD9F20C775881AF00E6EDAA7F4CDFF6DE0F5AE45DC389244407799A3AB6A39826EAC40038AC943BCB3989
30,896,287 UART: [art] SIG.R = F2F79DE1A72219240546F61D82CACCEC33A43624B41CD8311CCC6776E7ED3CE055B1070EB2575AC9CAD5F382834D2B55
30,903,695 UART: [art] SIG.S = 6AE5F14B18B77B42B8E5BA4CD5A6A5610711B648FE000E8BDE5724B44111A4F7C848EEAB0627CE69612170B54903A3DD
32,208,558 UART: mock_rt_interact::rt_entry...FMC Tester
32,326,050 UART: [rt] Runtime listening for mailbox commands...
32,330,286 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,391 UART:
192,758 UART: Running Caliptra ROM ...
193,934 UART:
603,456 UART: [state] CFI Enabled
615,131 UART: [state] LifecycleState = Unprovisioned
617,072 UART: [state] DebugLocked = No
619,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,396 UART: [kat] SHA2-256
793,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,691 UART: [kat] ++
804,134 UART: [kat] sha1
815,088 UART: [kat] SHA2-256
817,814 UART: [kat] SHA2-384
824,937 UART: [kat] SHA2-512-ACC
827,297 UART: [kat] ECC-384
3,109,649 UART: [kat] HMAC-384Kdf
3,121,896 UART: [kat] LMS
4,312,017 UART: [kat] --
4,316,597 UART: [cold-reset] ++
4,317,756 UART: [fht] Storing FHT @ 0x50003400
4,327,888 UART: [idev] ++
4,328,450 UART: [idev] CDI.KEYID = 6
4,329,478 UART: [idev] SUBJECT.KEYID = 7
4,330,700 UART: [idev] UDS.KEYID = 0
4,331,754 ready_for_fw is high
4,331,964 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,426,829 UART: [idev] Erasing UDS.KEYID = 0
7,620,898 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,995 UART: [idev] --
7,646,993 UART: [ldev] ++
7,647,568 UART: [ldev] CDI.KEYID = 6
7,648,549 UART: [ldev] SUBJECT.KEYID = 5
7,649,730 UART: [ldev] AUTHORITY.KEYID = 7
7,650,962 UART: [ldev] FE.KEYID = 1
7,660,148 UART: [ldev] Erasing FE.KEYID = 1
10,948,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,083 UART: [ldev] --
13,309,132 UART: [fwproc] Waiting for Commands...
13,311,284 UART: [fwproc] Received command 0x46574c44
13,313,518 UART: [fwproc] Received Image of size 75428 bytes
16,896,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,976,175 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,045,084 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,227,421 >>> mbox cmd response: success
17,227,849 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,230,778 UART: [afmc] ++
17,231,366 UART: [afmc] CDI.KEYID = 6
17,232,329 UART: [afmc] SUBJECT.KEYID = 7
17,233,547 UART: [afmc] AUTHORITY.KEYID = 5
20,551,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,847,259 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,849,516 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,863,923 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,878,730 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,893,150 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,914,421 UART: [afmc] --
22,918,990 UART: [cold-reset] --
22,922,358 UART: [state] Locking Datavault
22,929,058 UART: [state] Locking PCR0, PCR1 and PCR31
22,930,810 UART: [state] Locking ICCM
22,932,597 UART: [exit] Launching FMC @ 0x40000130
22,941,013 UART:
22,941,312 UART: Running Caliptra FMC ...
22,942,423 UART:
22,942,578 UART: [state] CFI Enabled
22,950,514 UART: [fht] FMC Alias Private Key: 7
25,280,804 UART: [art] Extend RT PCRs Done
25,282,032 UART: [art] Lock RT PCRs Done
25,283,750 UART: [art] Populate DV Done
25,289,004 UART: [fht] FMC Alias Private Key: 7
25,290,658 UART: [art] Derive CDI
25,291,471 UART: [art] Store in in slot 0x4
25,333,736 UART: [art] Derive Key Pair
25,334,735 UART: [art] Store priv key in slot 0x5
28,576,346 UART: [art] Derive Key Pair - Done
28,589,395 UART: [art] Signing Cert with AUTHO
28,590,710 UART: RITY.KEYID = 7
30,869,846 UART: [art] Erasing AUTHORITY.KEYID = 7
30,871,355 UART: [art] PUB.X = CE653D9B78D087E496EEFCB8AE70B3B45D3A10356C3F779DBC0B7AC1B95CA8D8187C1B66B971D41A6AA17342889C4BB9
30,878,601 UART: [art] PUB.Y = 85D2BE1F15F2A15898988D587AAFEE659E09E4325FD97CDC4D6EE3124B6D34DBDEEF31B2EE0F861ABA83387B12866087
30,885,875 UART: [art] SIG.R = 712503340E3F5CD314CDE1980DA2F6B39E1B0A033B0143077048486FCEB82C2A23BE627A43C01B836B9C004802345A0A
30,893,214 UART: [art] SIG.S = A543ABB72598D01D16E2FDF8BCB0E4796D3146361D361E6089E97160A3863A097D864E4639F79CD627874C10BD9100AD
32,197,655 UART: mock_rt_interact::rt_entry...FMC Tester
32,314,925 UART: [rt] Runtime listening for mailbox commands...
32,319,157 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
4,127,336 ready_for_fw is high
4,127,927 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,286,570 >>> mbox cmd response: success
17,287,174 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,926,472 UART:
22,926,878 UART: Running Caliptra FMC ...
22,928,091 UART:
22,928,259 UART: [state] CFI Enabled
22,936,005 UART: [fht] FMC Alias Private Key: 7
25,266,725 UART: [art] Extend RT PCRs Done
25,267,944 UART: [art] Lock RT PCRs Done
25,269,568 UART: [art] Populate DV Done
25,274,988 UART: [fht] FMC Alias Private Key: 7
25,276,589 UART: [art] Derive CDI
25,277,402 UART: [art] Store in in slot 0x4
25,319,506 UART: [art] Derive Key Pair
25,320,502 UART: [art] Store priv key in slot 0x5
28,562,618 UART: [art] Derive Key Pair - Done
28,575,614 UART: [art] Signing Cert with AUTHO
28,576,921 UART: RITY.KEYID = 7
30,856,148 UART: [art] Erasing AUTHORITY.KEYID = 7
30,857,661 UART: [art] PUB.X = E6B924C7F6FAE3ADE836EFB0FA18F6E77A58DC46885B387C1B439BFBF1DD6DEB57CCA2FACD247ED0A5DCA0D306EB2530
30,864,947 UART: [art] PUB.Y = A386EF2EA3B80540EA9697D788F180E97C9B1BDC6A38EAC5CD6339B4C4181F44CBAC2D584F46E1288E54CD1635C91541
30,872,173 UART: [art] SIG.R = F7C04B97D034716348D6BCFC9050D606BF93523FE7FF9F676A833C003DBD97BC688C9902DE7B4324ECCCF2B228F8DA82
30,879,557 UART: [art] SIG.S = 7C43566D1914759A500961050FDAC5AC30FABD33CBD0F73738B0997C40EB87609CAB2BAC424F661CB54FF1F500C41782
32,183,611 UART: mock_rt_interact::rt_entry...FMC Tester
32,301,590 UART: [rt] Runtime listening for mailbox commands...
32,305,847 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
192,033 UART:
192,391 UART: Running Caliptra ROM ...
193,508 UART:
193,651 UART: [state] CFI Enabled
266,978 UART: [state] LifecycleState = Unprovisioned
268,820 UART: [state] DebugLocked = No
271,277 UART: [state] WD Timer not started. Device not locked for debugging
275,745 UART: [kat] SHA2-256
454,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,398 UART: [kat] ++
466,845 UART: [kat] sha1
477,445 UART: [kat] SHA2-256
480,448 UART: [kat] SHA2-384
487,780 UART: [kat] SHA2-512-ACC
490,709 UART: [kat] ECC-384
2,948,464 UART: [kat] HMAC-384Kdf
2,970,785 UART: [kat] LMS
3,500,258 UART: [kat] --
3,504,668 UART: [cold-reset] ++
3,505,736 UART: [fht] FHT @ 0x50003400
3,517,915 UART: [idev] ++
3,518,473 UART: [idev] CDI.KEYID = 6
3,519,448 UART: [idev] SUBJECT.KEYID = 7
3,520,615 UART: [idev] UDS.KEYID = 0
3,521,535 ready_for_fw is high
3,521,721 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,616,667 UART: [idev] Erasing UDS.KEYID = 0
6,025,382 UART: [idev] Sha1 KeyId Algorithm
6,047,359 UART: [idev] --
6,051,111 UART: [ldev] ++
6,051,688 UART: [ldev] CDI.KEYID = 6
6,052,597 UART: [ldev] SUBJECT.KEYID = 5
6,053,762 UART: [ldev] AUTHORITY.KEYID = 7
6,054,993 UART: [ldev] FE.KEYID = 1
6,100,992 UART: [ldev] Erasing FE.KEYID = 1
8,602,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,903 UART: [ldev] --
10,396,111 UART: [fwproc] Wait for Commands...
10,398,576 UART: [fwproc] Recv command 0x46574c44
10,400,687 UART: [fwproc] Recv'd Img size: 75384 bytes
13,328,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,402,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,470,933 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,652,645 >>> mbox cmd response: success
13,653,074 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,656,104 UART: [afmc] ++
13,656,681 UART: [afmc] CDI.KEYID = 6
13,657,591 UART: [afmc] SUBJECT.KEYID = 7
13,658,747 UART: [afmc] AUTHORITY.KEYID = 5
16,191,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,913,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,915,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,931,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,947,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,963,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,985,382 UART: [afmc] --
17,990,057 UART: [cold-reset] --
17,993,803 UART: [state] Locking Datavault
18,000,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,001,848 UART: [state] Locking ICCM
18,003,069 UART: [exit] Launching FMC @ 0x40000130
18,011,478 UART:
18,011,712 UART: Running Caliptra FMC ...
18,012,814 UART:
18,012,975 UART: [state] CFI Enabled
18,072,951 UART: [fht] FMC Alias Private Key: 7
19,837,085 UART: [art] Extend RT PCRs Done
19,838,314 UART: [art] Lock RT PCRs Done
19,839,881 UART: [art] Populate DV Done
19,845,187 UART: [fht] FMC Alias Private Key: 7
19,846,667 UART: [art] Derive CDI
19,847,442 UART: [art] Store in in slot 0x4
19,905,860 UART: [art] Derive Key Pair
19,906,900 UART: [art] Store priv key in slot 0x5
22,369,645 UART: [art] Derive Key Pair - Done
22,382,420 UART: [art] Signing Cert with AUTHO
22,383,724 UART: RITY.KEYID = 7
24,095,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,096,795 UART: [art] PUB.X = 687C107EA304EE70F900E650F251DC047BECDC064523E5AD217C8F89EA31678AEF5B466328F5933D06A805D597B029EE
24,104,053 UART: [art] PUB.Y = B895044299AD79E9BED40B95E8AE2B506DE43703FC47AE0D2E7F703B6CA3B1BF0844D95AF47B4EA98F78498127ECD975
24,111,339 UART: [art] SIG.R = C35CEEFC1F270090F99A7E9104FBE886AC37CBD425F131F19A2747CB83F9BDE476CC2A4A053A345316412079FC019459
24,118,712 UART: [art] SIG.S = AF21DE1D5AF74D2A783046B344CA5D99A3B442C8975AB028427A713C2979C6E17E88C8F68D3E09C19C53DCDF2233D37D
25,097,589 UART: mock_rt_interact::rt_entry...FMC Tester
25,214,302 UART: [rt] Runtime listening for mailbox commands...
25,218,586 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,166 UART:
192,523 UART: Running Caliptra ROM ...
193,704 UART:
193,854 UART: [state] CFI Enabled
263,734 UART: [state] LifecycleState = Unprovisioned
266,153 UART: [state] DebugLocked = No
268,614 UART: [state] WD Timer not started. Device not locked for debugging
273,421 UART: [kat] SHA2-256
463,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,060 UART: [kat] ++
474,556 UART: [kat] sha1
484,714 UART: [kat] SHA2-256
487,742 UART: [kat] SHA2-384
493,804 UART: [kat] SHA2-512-ACC
496,390 UART: [kat] ECC-384
2,945,906 UART: [kat] HMAC-384Kdf
2,970,423 UART: [kat] LMS
3,502,202 UART: [kat] --
3,507,070 UART: [cold-reset] ++
3,509,645 UART: [fht] FHT @ 0x50003400
3,521,405 UART: [idev] ++
3,522,114 UART: [idev] CDI.KEYID = 6
3,523,090 UART: [idev] SUBJECT.KEYID = 7
3,524,266 UART: [idev] UDS.KEYID = 0
3,525,349 ready_for_fw is high
3,525,536 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,620,483 UART: [idev] Erasing UDS.KEYID = 0
6,029,704 UART: [idev] Sha1 KeyId Algorithm
6,051,895 UART: [idev] --
6,056,166 UART: [ldev] ++
6,056,845 UART: [ldev] CDI.KEYID = 6
6,057,929 UART: [ldev] SUBJECT.KEYID = 5
6,059,050 UART: [ldev] AUTHORITY.KEYID = 7
6,060,321 UART: [ldev] FE.KEYID = 1
6,087,723 UART: [ldev] Erasing FE.KEYID = 1
8,594,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,223 UART: [ldev] --
10,401,670 UART: [fwproc] Wait for Commands...
10,403,984 UART: [fwproc] Recv command 0x46574c44
10,406,234 UART: [fwproc] Recv'd Img size: 75384 bytes
13,381,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,456,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,572,604 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,880,714 >>> mbox cmd response: success
13,881,163 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,885,218 UART: [afmc] ++
13,885,909 UART: [afmc] CDI.KEYID = 6
13,887,149 UART: [afmc] SUBJECT.KEYID = 7
13,888,583 UART: [afmc] AUTHORITY.KEYID = 5
16,435,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,159,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,161,368 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,176,568 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,191,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,206,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,230,052 UART: [afmc] --
18,233,516 UART: [cold-reset] --
18,236,517 UART: [state] Locking Datavault
18,239,777 UART: [state] Locking PCR0, PCR1 and PCR31
18,241,970 UART: [state] Locking ICCM
18,244,553 UART: [exit] Launching FMC @ 0x40000130
18,253,174 UART:
18,253,404 UART: Running Caliptra FMC ...
18,254,439 UART:
18,254,584 UART: [state] CFI Enabled
18,316,573 UART: [fht] FMC Alias Private Key: 7
20,080,177 UART: [art] Extend RT PCRs Done
20,081,402 UART: [art] Lock RT PCRs Done
20,082,999 UART: [art] Populate DV Done
20,088,198 UART: [fht] FMC Alias Private Key: 7
20,089,842 UART: [art] Derive CDI
20,090,574 UART: [art] Store in in slot 0x4
20,148,799 UART: [art] Derive Key Pair
20,149,841 UART: [art] Store priv key in slot 0x5
22,612,902 UART: [art] Derive Key Pair - Done
22,625,927 UART: [art] Signing Cert with AUTHO
22,627,267 UART: RITY.KEYID = 7
24,339,352 UART: [art] Erasing AUTHORITY.KEYID = 7
24,340,858 UART: [art] PUB.X = 20EAEA03DFEACC1D5ECF4878E330B65FC15749D1DDF1D20BAC9E9313019F4015D4C0E531D7DFB7FEC05E1D1C90DAAC5E
24,348,168 UART: [art] PUB.Y = 44EE553EB02BD4340EC384154772BD2DDE6D128865434B591EE5870E64170A024CF9EB5F7602A841229BA45E97D131AE
24,355,451 UART: [art] SIG.R = 271137D8982BDF53DBE6321CFDE7D0A8D7216834419D5F509958CBA0572A18CBC421671838C9444072470EC6AF5234D9
24,362,809 UART: [art] SIG.S = DA1D3D57F586A311AFAD57CF72E03676945046E86F988FAEC92F5D9056AAD3A0CB029AFD92FFCD3D47CD0C19A24F659F
25,341,197 UART: mock_rt_interact::rt_entry...FMC Tester
25,457,386 UART: [rt] Runtime listening for mailbox commands...
25,461,671 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,440,483 ready_for_fw is high
3,440,909 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,901,785 >>> mbox cmd response: success
13,902,593 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,196,910 UART:
18,197,296 UART: Running Caliptra FMC ...
18,198,576 UART:
18,198,740 UART: [state] CFI Enabled
18,264,999 UART: [fht] FMC Alias Private Key: 7
20,028,908 UART: [art] Extend RT PCRs Done
20,030,127 UART: [art] Lock RT PCRs Done
20,031,653 UART: [art] Populate DV Done
20,037,004 UART: [fht] FMC Alias Private Key: 7
20,038,549 UART: [art] Derive CDI
20,039,681 UART: [art] Store in in slot 0x4
20,098,014 UART: [art] Derive Key Pair
20,099,019 UART: [art] Store priv key in slot 0x5
22,562,349 UART: [art] Derive Key Pair - Done
22,575,726 UART: [art] Signing Cert with AUTHO
22,577,027 UART: RITY.KEYID = 7
24,288,274 UART: [art] Erasing AUTHORITY.KEYID = 7
24,289,779 UART: [art] PUB.X = CB0F12A5FA4D85A557657669289B3EB594CEBD7CB792D3992658116B1E265E523FE6CDA574A1D89025E02D9C7144B399
24,297,044 UART: [art] PUB.Y = 5450422C08B9AAB9A215D638AEC64C19741783FAD9D29C3741A4ED0A2624B875BA6761431881AD571DD704A0CE934E7C
24,304,298 UART: [art] SIG.R = 6E56DFA56EC5FC314C05D8B7690404BE4FDE0B7AD3335673E0E645CBBE982B8FFF8203547A3A1BB2D11DAFFDAB58B038
24,311,708 UART: [art] SIG.S = 3050662C787C08A84DF3236E3BE585AA6D3F4D99CCF90A8F6912DAD5DE9D3B96186F679FEC6448C327A0AD433B0958DA
25,290,148 UART: mock_rt_interact::rt_entry...FMC Tester
25,407,107 UART: [rt] Runtime listening for mailbox commands...
25,411,393 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,354 UART:
192,724 UART: Running Caliptra ROM ...
193,803 UART:
603,496 UART: [state] CFI Enabled
617,427 UART: [state] LifecycleState = Unprovisioned
619,784 UART: [state] DebugLocked = No
622,233 UART: [state] WD Timer not started. Device not locked for debugging
626,837 UART: [kat] SHA2-256
816,683 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,495 UART: [kat] ++
828,039 UART: [kat] sha1
839,697 UART: [kat] SHA2-256
842,701 UART: [kat] SHA2-384
848,754 UART: [kat] SHA2-512-ACC
851,328 UART: [kat] ECC-384
3,294,691 UART: [kat] HMAC-384Kdf
3,307,287 UART: [kat] LMS
3,839,123 UART: [kat] --
3,843,467 UART: [cold-reset] ++
3,845,892 UART: [fht] FHT @ 0x50003400
3,857,308 UART: [idev] ++
3,858,102 UART: [idev] CDI.KEYID = 6
3,858,996 UART: [idev] SUBJECT.KEYID = 7
3,860,172 UART: [idev] UDS.KEYID = 0
3,861,110 ready_for_fw is high
3,861,296 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,956,061 UART: [idev] Erasing UDS.KEYID = 0
6,341,413 UART: [idev] Sha1 KeyId Algorithm
6,364,472 UART: [idev] --
6,369,383 UART: [ldev] ++
6,370,067 UART: [ldev] CDI.KEYID = 6
6,370,951 UART: [ldev] SUBJECT.KEYID = 5
6,372,160 UART: [ldev] AUTHORITY.KEYID = 7
6,373,333 UART: [ldev] FE.KEYID = 1
6,383,676 UART: [ldev] Erasing FE.KEYID = 1
8,861,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,396 UART: [ldev] --
10,652,339 UART: [fwproc] Wait for Commands...
10,654,589 UART: [fwproc] Recv command 0x46574c44
10,656,936 UART: [fwproc] Recv'd Img size: 75384 bytes
13,625,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,704,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,820,820 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
14,129,962 >>> mbox cmd response: success
14,130,397 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,133,717 UART: [afmc] ++
14,134,404 UART: [afmc] CDI.KEYID = 6
14,135,634 UART: [afmc] SUBJECT.KEYID = 7
14,137,068 UART: [afmc] AUTHORITY.KEYID = 5
16,636,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,356,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,358,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,373,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,388,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,403,387 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,426,071 UART: [afmc] --
18,429,891 UART: [cold-reset] --
18,435,704 UART: [state] Locking Datavault
18,440,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,442,369 UART: [state] Locking ICCM
18,445,326 UART: [exit] Launching FMC @ 0x40000130
18,453,992 UART:
18,454,233 UART: Running Caliptra FMC ...
18,455,334 UART:
18,455,490 UART: [state] CFI Enabled
18,463,288 UART: [fht] FMC Alias Private Key: 7
20,219,939 UART: [art] Extend RT PCRs Done
20,221,160 UART: [art] Lock RT PCRs Done
20,222,717 UART: [art] Populate DV Done
20,228,182 UART: [fht] FMC Alias Private Key: 7
20,229,825 UART: [art] Derive CDI
20,230,633 UART: [art] Store in in slot 0x4
20,273,279 UART: [art] Derive Key Pair
20,274,313 UART: [art] Store priv key in slot 0x5
22,701,194 UART: [art] Derive Key Pair - Done
22,713,806 UART: [art] Signing Cert with AUTHO
22,715,113 UART: RITY.KEYID = 7
24,420,488 UART: [art] Erasing AUTHORITY.KEYID = 7
24,421,991 UART: [art] PUB.X = 332CE90C9C26314252CC54A833A13EB12D2D15470A4A2B6941184044F07BCCEE3C08ECA6E9A3B91CA25CB79C3BC0F594
24,429,229 UART: [art] PUB.Y = D164040B751A556FECBB96438D929C4D07E69551395DCC54BA45CBBE32E05B7471250BD4456C92CE0919838067169B1F
24,436,480 UART: [art] SIG.R = CA47AA948F8B6F5FF264BABFAD4631CD8717E9E59B3C9193C4278665AED8AA3848D1EBECFEBE93F07CEA50AEECA916FE
24,443,910 UART: [art] SIG.S = 036BED4B74FA309D47B13EB3E4E34E6B6AD81DD612D3F2406467A765046C8240AA32805B46440B8279641001FD19881A
25,422,156 UART: mock_rt_interact::rt_entry...FMC Tester
25,538,589 UART: [rt] Runtime listening for mailbox commands...
25,542,838 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,753,800 ready_for_fw is high
3,754,332 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
14,113,752 >>> mbox cmd response: success
14,114,331 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,367,804 UART:
18,368,185 UART: Running Caliptra FMC ...
18,369,361 UART:
18,369,511 UART: [state] CFI Enabled
18,377,288 UART: [fht] FMC Alias Private Key: 7
20,134,535 UART: [art] Extend RT PCRs Done
20,135,759 UART: [art] Lock RT PCRs Done
20,137,400 UART: [art] Populate DV Done
20,142,766 UART: [fht] FMC Alias Private Key: 7
20,144,287 UART: [art] Derive CDI
20,145,054 UART: [art] Store in in slot 0x4
20,187,218 UART: [art] Derive Key Pair
20,188,218 UART: [art] Store priv key in slot 0x5
22,614,724 UART: [art] Derive Key Pair - Done
22,627,775 UART: [art] Signing Cert with AUTHO
22,629,106 UART: RITY.KEYID = 7
24,334,632 UART: [art] Erasing AUTHORITY.KEYID = 7
24,336,134 UART: [art] PUB.X = 0268D6E6CC216F8A19037EB3B6684B4D9C4C56051FAE6482F3A1D8E27509790363E6BB1CD1B6A11E741E8A769F464C4D
24,343,435 UART: [art] PUB.Y = 57AF2B9C729F592046BEB03C60769AA3183EFE2D7C23EDC868C0A4983C33F94FC48017C7281CCFB2F231E55BD1C279D5
24,350,676 UART: [art] SIG.R = 7D2B74AFFED53A4C0992A8C68A4B405B1F19B979B0852D9D193DF5A7281DCBE36505022FF17DF6F28CB6C8CC248EC5D5
24,358,071 UART: [art] SIG.S = 112B8821F48D15599789F21F5553F3F399C417ECDE1AF4A1F70A8CB28D6C3DD63B9E454BC804D32E56D8E63005E1226E
25,336,432 UART: mock_rt_interact::rt_entry...FMC Tester
25,452,886 UART: [rt] Runtime listening for mailbox commands...
25,457,121 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,057 UART: [kat] SHA2-256
881,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,103 UART: [kat] ++
886,255 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,264 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,475,945 UART: [cold-reset] ++
1,476,371 UART: [fht] Storing FHT @ 0x50003400
1,479,316 UART: [idev] ++
1,479,484 UART: [idev] CDI.KEYID = 6
1,479,844 UART: [idev] SUBJECT.KEYID = 7
1,480,268 UART: [idev] UDS.KEYID = 0
1,480,613 ready_for_fw is high
1,480,613 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,292 UART: [idev] Erasing UDS.KEYID = 0
1,504,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,208 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,521,167 UART: [ldev] Erasing FE.KEYID = 1
1,546,220 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,144 UART: [ldev] --
1,585,541 UART: [fwproc] Waiting for Commands...
1,586,348 UART: [fwproc] Received command 0x46574c44
1,587,139 UART: [fwproc] Received Image of size 75384 bytes
2,440,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,429 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,497,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,575,214 >>> mbox cmd response: success
2,575,214 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,368 UART: [afmc] ++
2,576,536 UART: [afmc] CDI.KEYID = 6
2,576,898 UART: [afmc] SUBJECT.KEYID = 7
2,577,323 UART: [afmc] AUTHORITY.KEYID = 5
2,611,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,628,198 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,628,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,634,706 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,640,591 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,646,281 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,654,306 UART: [afmc] --
2,655,274 UART: [cold-reset] --
2,656,388 UART: [state] Locking Datavault
2,657,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,658,039 UART: [state] Locking ICCM
2,658,491 UART: [exit] Launching FMC @ 0x40000130
2,663,820 UART:
2,663,836 UART: Running Caliptra FMC ...
2,664,244 UART:
2,664,298 UART: [state] CFI Enabled
2,674,845 UART: [fht] FMC Alias Private Key: 7
2,783,416 UART: [art] Extend RT PCRs Done
2,783,844 UART: [art] Lock RT PCRs Done
2,785,690 UART: [art] Populate DV Done
2,793,757 UART: [fht] FMC Alias Private Key: 7
2,794,799 UART: [art] Derive CDI
2,795,079 UART: [art] Store in in slot 0x4
2,880,904 UART: [art] Derive Key Pair
2,881,264 UART: [art] Store priv key in slot 0x5
2,894,438 UART: [art] Derive Key Pair - Done
2,909,430 UART: [art] Signing Cert with AUTHO
2,909,910 UART: RITY.KEYID = 7
2,925,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,926,181 UART: [art] PUB.X = 792477C25B0BD6441845FE5A2AEE265ADA27872C75A3796CF7DF4BE9A188EBE2AE2F96497229ED6B3237D487B137462E
2,932,954 UART: [art] PUB.Y = ED3BA01603DEC5279FADC5842399638E672B18CB2E1E51A52E715D637A0710E37884A3D302F3F6A86DA5EDABED615EA5
2,939,907 UART: [art] SIG.R = D04BADB21829E9EF18DD1FB423EDEC24982A27F28D665EADCCFDD763EE985B0929401FDDAE32564EFC5AF9D445D9B2B9
2,946,700 UART: [art] SIG.S = 9F1B278F2BF4B2E6429F28B86203A7F790545094B76D1F4C3C6D1CE72EE15BAFD689ABD271802C584E747E5E6E4F1FCA
2,970,568 UART: mock_rt_interact::rt_entry...FMC Tester
3,077,597 UART: [rt] Runtime listening for mailbox commands...
3,080,987 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 ready_for_fw is high
1,362,859 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,425,680 >>> mbox cmd response: success
2,425,680 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,486,704 UART:
2,486,720 UART: Running Caliptra FMC ...
2,487,128 UART:
2,487,182 UART: [state] CFI Enabled
2,497,367 UART: [fht] FMC Alias Private Key: 7
2,604,458 UART: [art] Extend RT PCRs Done
2,604,886 UART: [art] Lock RT PCRs Done
2,606,552 UART: [art] Populate DV Done
2,615,027 UART: [fht] FMC Alias Private Key: 7
2,616,155 UART: [art] Derive CDI
2,616,435 UART: [art] Store in in slot 0x4
2,702,096 UART: [art] Derive Key Pair
2,702,456 UART: [art] Store priv key in slot 0x5
2,716,374 UART: [art] Derive Key Pair - Done
2,731,198 UART: [art] Signing Cert with AUTHO
2,731,678 UART: RITY.KEYID = 7
2,746,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,747,651 UART: [art] PUB.X = 87A62D52DD768D095DB773EFBF8CC6FD50F9C7B3C620EE06E5AB79D6965651BE1977DEFF20C14D7492565453BCA5353E
2,754,427 UART: [art] PUB.Y = 19BE0119B4E43ABC725FF05E5FAF912E66B28375CAF235FF735D6105066D6250AFF76C06A74D68200FDF65A498FFC037
2,761,370 UART: [art] SIG.R = 222AFC815125226687DE2EB4B2CE90A6CCB04E404D487D745B3E06773EEF66F6A113E722FC2FF27228F4365C8AB80211
2,768,138 UART: [art] SIG.S = 107A486B4B6FE30355BBBBBF282F12FA3D18C206A14EF3A1EF8393C7248CD35D9C81B5E57567AB83B4BFC313C1701880
2,792,001 UART: mock_rt_interact::rt_entry...FMC Tester
2,899,908 UART: [rt] Runtime listening for mailbox commands...
2,903,298 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,162 UART: [kat] SHA2-256
882,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,208 UART: [kat] ++
886,360 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,215 UART: [kat] SHA2-512-ACC
897,116 UART: [kat] ECC-384
902,691 UART: [kat] HMAC-384Kdf
907,169 UART: [kat] LMS
1,475,365 UART: [kat] --
1,476,272 UART: [cold-reset] ++
1,476,696 UART: [fht] Storing FHT @ 0x50003400
1,479,505 UART: [idev] ++
1,479,673 UART: [idev] CDI.KEYID = 6
1,480,033 UART: [idev] SUBJECT.KEYID = 7
1,480,457 UART: [idev] UDS.KEYID = 0
1,480,802 ready_for_fw is high
1,480,802 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,971 UART: [idev] Erasing UDS.KEYID = 0
1,505,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,220 UART: [ldev] ++
1,515,388 UART: [ldev] CDI.KEYID = 6
1,515,751 UART: [ldev] SUBJECT.KEYID = 5
1,516,177 UART: [ldev] AUTHORITY.KEYID = 7
1,516,640 UART: [ldev] FE.KEYID = 1
1,522,190 UART: [ldev] Erasing FE.KEYID = 1
1,547,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,720 UART: [fwproc] Waiting for Commands...
1,587,375 UART: [fwproc] Received command 0x46574c44
1,588,166 UART: [fwproc] Received Image of size 75384 bytes
2,440,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,468,106 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,497,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,574,965 >>> mbox cmd response: success
2,574,965 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,576,115 UART: [afmc] ++
2,576,283 UART: [afmc] CDI.KEYID = 6
2,576,645 UART: [afmc] SUBJECT.KEYID = 7
2,577,070 UART: [afmc] AUTHORITY.KEYID = 5
2,612,647 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,628,961 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,629,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,635,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,641,354 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,647,044 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,654,887 UART: [afmc] --
2,655,849 UART: [cold-reset] --
2,656,641 UART: [state] Locking Datavault
2,657,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,658,526 UART: [state] Locking ICCM
2,658,986 UART: [exit] Launching FMC @ 0x40000130
2,664,315 UART:
2,664,331 UART: Running Caliptra FMC ...
2,664,739 UART:
2,664,882 UART: [state] CFI Enabled
2,675,425 UART: [fht] FMC Alias Private Key: 7
2,783,282 UART: [art] Extend RT PCRs Done
2,783,710 UART: [art] Lock RT PCRs Done
2,785,146 UART: [art] Populate DV Done
2,793,187 UART: [fht] FMC Alias Private Key: 7
2,794,259 UART: [art] Derive CDI
2,794,539 UART: [art] Store in in slot 0x4
2,880,594 UART: [art] Derive Key Pair
2,880,954 UART: [art] Store priv key in slot 0x5
2,894,602 UART: [art] Derive Key Pair - Done
2,909,574 UART: [art] Signing Cert with AUTHO
2,910,054 UART: RITY.KEYID = 7
2,926,058 UART: [art] Erasing AUTHORITY.KEYID = 7
2,926,823 UART: [art] PUB.X = D944D40777632855B61C071EB81E8F9B06A1091BB507994D524A609E3BD004E49B047FBF734E199A3AC18E5891EFB343
2,933,570 UART: [art] PUB.Y = 35FD2A1B19C685A6E8FEECFAEDF1A353BBB45D35E6F2C97977ECC2C376EE01F60BB54E3C3E841566A1CDCA6BA49BD42E
2,940,544 UART: [art] SIG.R = 46A51D223582B4D323C9EB2126F6DF6384CF3C762F056604F358A94FD04864F40FD738F6C6536D18A6C7A6050B7C775E
2,947,297 UART: [art] SIG.S = 631042455CE022D5AEEE7431DA91B41C392F7FE13E2C7BA642E87F51DD29B0EF7F5348F29E16E841CF76934A4116C26A
2,970,984 UART: mock_rt_interact::rt_entry...FMC Tester
3,078,835 UART: [rt] Runtime listening for mailbox commands...
3,082,225 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,794 ready_for_fw is high
1,362,794 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,423,577 >>> mbox cmd response: success
2,423,577 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,485,539 UART:
2,485,555 UART: Running Caliptra FMC ...
2,485,963 UART:
2,486,106 UART: [state] CFI Enabled
2,496,303 UART: [fht] FMC Alias Private Key: 7
2,604,090 UART: [art] Extend RT PCRs Done
2,604,518 UART: [art] Lock RT PCRs Done
2,605,756 UART: [art] Populate DV Done
2,613,919 UART: [fht] FMC Alias Private Key: 7
2,614,875 UART: [art] Derive CDI
2,615,155 UART: [art] Store in in slot 0x4
2,700,914 UART: [art] Derive Key Pair
2,701,274 UART: [art] Store priv key in slot 0x5
2,714,270 UART: [art] Derive Key Pair - Done
2,728,927 UART: [art] Signing Cert with AUTHO
2,729,407 UART: RITY.KEYID = 7
2,744,507 UART: [art] Erasing AUTHORITY.KEYID = 7
2,745,272 UART: [art] PUB.X = 19830CE0FE0EF2835016E0B81598B1C5AA68332570F7FE0A6CBA9796F6458F18C77914268C3B211FE9581CE83D6E2720
2,752,031 UART: [art] PUB.Y = 84FAC80DA9ECC3C582A2B2FB73789DF24441EB8D8F3086612639E94812CAEF6E11D989B5494DBBB218523A274F6CD579
2,758,986 UART: [art] SIG.R = 6CBA82321B4F760E037F96FE28C51A41EB4254BBCE5E03F37DE37DE58EA1E59FAEB703329A77C37F4CA09991D8799E54
2,765,756 UART: [art] SIG.S = 2066CF002B21A2B1058969CE510E347EDA634E706DA5410E968021284EAF1E3B511F42E2E6D24BF0FE5A560C67B45E61
2,788,983 UART: mock_rt_interact::rt_entry...FMC Tester
2,896,980 UART: [rt] Runtime listening for mailbox commands...
2,900,370 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,041 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
892,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,049 UART: [kat] ++
897,201 UART: [kat] sha1
901,389 UART: [kat] SHA2-256
903,329 UART: [kat] SHA2-384
906,104 UART: [kat] SHA2-512-ACC
908,005 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,310 UART: [kat] LMS
1,170,638 UART: [kat] --
1,171,639 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,698 UART: [idev] ++
1,174,866 UART: [idev] CDI.KEYID = 6
1,175,226 UART: [idev] SUBJECT.KEYID = 7
1,175,650 UART: [idev] UDS.KEYID = 0
1,175,995 ready_for_fw is high
1,175,995 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,795 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,371 UART: [ldev] --
1,282,772 UART: [fwproc] Wait for Commands...
1,283,430 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 75384 bytes
2,135,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,772 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,269,263 >>> mbox cmd response: success
2,269,263 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,270,449 UART: [afmc] ++
2,270,617 UART: [afmc] CDI.KEYID = 6
2,270,979 UART: [afmc] SUBJECT.KEYID = 7
2,271,404 UART: [afmc] AUTHORITY.KEYID = 5
2,306,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,225 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,870 UART: [afmc] --
2,349,920 UART: [cold-reset] --
2,350,804 UART: [state] Locking Datavault
2,352,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,689 UART: [state] Locking ICCM
2,353,167 UART: [exit] Launching FMC @ 0x40000130
2,358,496 UART:
2,358,512 UART: Running Caliptra FMC ...
2,358,920 UART:
2,358,974 UART: [state] CFI Enabled
2,369,441 UART: [fht] FMC Alias Private Key: 7
2,476,854 UART: [art] Extend RT PCRs Done
2,477,282 UART: [art] Lock RT PCRs Done
2,478,836 UART: [art] Populate DV Done
2,486,845 UART: [fht] FMC Alias Private Key: 7
2,487,901 UART: [art] Derive CDI
2,488,181 UART: [art] Store in in slot 0x4
2,573,680 UART: [art] Derive Key Pair
2,574,040 UART: [art] Store priv key in slot 0x5
2,586,596 UART: [art] Derive Key Pair - Done
2,601,390 UART: [art] Signing Cert with AUTHO
2,601,870 UART: RITY.KEYID = 7
2,617,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,909 UART: [art] PUB.X = F984052F5104C40436FD545B77F92B3B5A4EDD132297B4FD324853AE558C4002F3BCE9BC2AD88F11238F9234A2053748
2,624,662 UART: [art] PUB.Y = A5BEEF7E05EFD4A2C10466D5306204E09855F3FCF4A357CD9531DF6A18D31882967DC49AF6C25303197CEBE5A6997193
2,631,606 UART: [art] SIG.R = 76835B9FC39224635AC349A3E1B24566F577F870C9F67BC282B780B44A397050EA01A3814AE338F56D3A13D2E44711FE
2,638,369 UART: [art] SIG.S = 81807224C82857951606E1C2367AD473DFBD245D6F90D1172C2DB3D3F4F215865ED767390A29049BE6692EC59CDB396A
2,661,905 UART: mock_rt_interact::rt_entry...FMC Tester
2,768,351 UART: [rt] Runtime listening for mailbox commands...
2,771,741 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,027 ready_for_fw is high
1,060,027 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,121,180 >>> mbox cmd response: success
2,121,180 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,183,082 UART:
2,183,098 UART: Running Caliptra FMC ...
2,183,506 UART:
2,183,560 UART: [state] CFI Enabled
2,193,983 UART: [fht] FMC Alias Private Key: 7
2,301,122 UART: [art] Extend RT PCRs Done
2,301,550 UART: [art] Lock RT PCRs Done
2,302,826 UART: [art] Populate DV Done
2,310,909 UART: [fht] FMC Alias Private Key: 7
2,311,993 UART: [art] Derive CDI
2,312,273 UART: [art] Store in in slot 0x4
2,397,926 UART: [art] Derive Key Pair
2,398,286 UART: [art] Store priv key in slot 0x5
2,411,528 UART: [art] Derive Key Pair - Done
2,426,469 UART: [art] Signing Cert with AUTHO
2,426,949 UART: RITY.KEYID = 7
2,441,947 UART: [art] Erasing AUTHORITY.KEYID = 7
2,442,712 UART: [art] PUB.X = 42BB4DD5B320AE5327E967EF4333176E62363FFF4D40DE3CFA54E8EBEFE984D733E795DE7F2727561A7FB47AA543B77F
2,449,496 UART: [art] PUB.Y = E693AB6303D8FF3F45CF5D41937C7F72B862DF0BEFD42E432B24B2FD539A764713FF362699778B1C0BF3143E7FB9F0D0
2,456,447 UART: [art] SIG.R = D608E6661125F96296A676C538536602CD23AE3CFCD1EBD8FFECC6350F2266A16A097C2371DD756F9A88016A1EDB034A
2,463,205 UART: [art] SIG.S = AB96551A124B7996EED8595E8112BCBE01A65B1182FC000D5A12F8760A7ADBD3C6B1DFB05C61B1876A99484468875743
2,487,709 UART: mock_rt_interact::rt_entry...FMC Tester
2,594,274 UART: [rt] Runtime listening for mailbox commands...
2,597,664 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,595 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,673 UART: [idev] ++
1,175,841 UART: [idev] CDI.KEYID = 6
1,176,201 UART: [idev] SUBJECT.KEYID = 7
1,176,625 UART: [idev] UDS.KEYID = 0
1,176,970 ready_for_fw is high
1,176,970 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,443 UART: [idev] Erasing UDS.KEYID = 0
1,202,014 UART: [idev] Sha1 KeyId Algorithm
1,210,532 UART: [idev] --
1,211,736 UART: [ldev] ++
1,211,904 UART: [ldev] CDI.KEYID = 6
1,212,267 UART: [ldev] SUBJECT.KEYID = 5
1,212,693 UART: [ldev] AUTHORITY.KEYID = 7
1,213,156 UART: [ldev] FE.KEYID = 1
1,218,316 UART: [ldev] Erasing FE.KEYID = 1
1,244,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,826 UART: [ldev] --
1,284,225 UART: [fwproc] Wait for Commands...
1,285,049 UART: [fwproc] Recv command 0x46574c44
1,285,777 UART: [fwproc] Recv'd Img size: 75384 bytes
2,138,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,165,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,194,421 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,776 >>> mbox cmd response: success
2,271,776 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,934 UART: [afmc] ++
2,273,102 UART: [afmc] CDI.KEYID = 6
2,273,464 UART: [afmc] SUBJECT.KEYID = 7
2,273,889 UART: [afmc] AUTHORITY.KEYID = 5
2,309,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,326,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,332,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,338,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,344,311 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,352,125 UART: [afmc] --
2,353,203 UART: [cold-reset] --
2,353,885 UART: [state] Locking Datavault
2,355,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,355,658 UART: [state] Locking ICCM
2,356,318 UART: [exit] Launching FMC @ 0x40000130
2,361,647 UART:
2,361,663 UART: Running Caliptra FMC ...
2,362,071 UART:
2,362,214 UART: [state] CFI Enabled
2,372,699 UART: [fht] FMC Alias Private Key: 7
2,481,324 UART: [art] Extend RT PCRs Done
2,481,752 UART: [art] Lock RT PCRs Done
2,483,344 UART: [art] Populate DV Done
2,491,437 UART: [fht] FMC Alias Private Key: 7
2,492,603 UART: [art] Derive CDI
2,492,883 UART: [art] Store in in slot 0x4
2,578,698 UART: [art] Derive Key Pair
2,579,058 UART: [art] Store priv key in slot 0x5
2,592,730 UART: [art] Derive Key Pair - Done
2,607,607 UART: [art] Signing Cert with AUTHO
2,608,087 UART: RITY.KEYID = 7
2,623,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,623,778 UART: [art] PUB.X = 46D1D2D0B8735F9CA479DE68B9E22C3854FDFC91274ABF7FB2826518503FC684E8639096737CC2A23585E846278B40F7
2,630,546 UART: [art] PUB.Y = 6AE5BEBDF0682204E5787EF295307039D8B9041352D20ACD042FA2EA43A56CE6E794BBFB4C63E88FB6896383A61B3231
2,637,490 UART: [art] SIG.R = C0315E37A61910E31D0A561B57C359BE736FE308D8DF3717470AD06D820B059E9B1A400748B7B51EBD04E7926290592F
2,644,235 UART: [art] SIG.S = FF83A97DD1A1432E4C0ECDEC9B5B6701CC26CD4B5ADDAA5E726EE1226E81B67AD866A2464EE8BB82478C3C147A8CBB9C
2,668,154 UART: mock_rt_interact::rt_entry...FMC Tester
2,775,335 UART: [rt] Runtime listening for mailbox commands...
2,778,725 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,158 ready_for_fw is high
1,060,158 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,121,669 >>> mbox cmd response: success
2,121,669 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,183,717 UART:
2,183,733 UART: Running Caliptra FMC ...
2,184,141 UART:
2,184,284 UART: [state] CFI Enabled
2,195,111 UART: [fht] FMC Alias Private Key: 7
2,303,410 UART: [art] Extend RT PCRs Done
2,303,838 UART: [art] Lock RT PCRs Done
2,305,178 UART: [art] Populate DV Done
2,313,373 UART: [fht] FMC Alias Private Key: 7
2,314,399 UART: [art] Derive CDI
2,314,679 UART: [art] Store in in slot 0x4
2,400,116 UART: [art] Derive Key Pair
2,400,476 UART: [art] Store priv key in slot 0x5
2,413,920 UART: [art] Derive Key Pair - Done
2,428,609 UART: [art] Signing Cert with AUTHO
2,429,089 UART: RITY.KEYID = 7
2,444,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,280 UART: [art] PUB.X = 1A9B7DD86FC00D0FB76A625AFC75C2FFC707D0BAFA50BAC1F6550711D64697095F39B23E8982F99B72AFABBB4E73BF80
2,452,055 UART: [art] PUB.Y = 05B32D1D60AF6F253A4E653254A7A78E9EB7FDEE3C21F14A335F7A621EC79D7648492C92A6A040E44C67AAED60A86BEB
2,459,016 UART: [art] SIG.R = 05C523E14FD13C4F916234CBB80110C54C1FF90809731C92604A3BCA5B9F499CD76BB2F5D64C229080CA6E94DE82406A
2,465,778 UART: [art] SIG.S = 50E37568B4FCC1725A502424CB3D4D06B53FD3500851F4840B868EABA5C97C16900B80621AE6C1471EF1E7FC34386398
2,489,519 UART: mock_rt_interact::rt_entry...FMC Tester
2,596,839 UART: [rt] Runtime listening for mailbox commands...
2,600,229 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,165 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,754 UART: [kat] SHA2-512-ACC
906,655 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,643 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,458 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 75384 bytes
2,134,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,177 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,483 >>> mbox cmd response: success
2,268,483 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,498 UART: [afmc] ++
2,269,666 UART: [afmc] CDI.KEYID = 6
2,270,029 UART: [afmc] SUBJECT.KEYID = 7
2,270,455 UART: [afmc] AUTHORITY.KEYID = 5
2,306,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,885 UART: [afmc] --
2,349,817 UART: [cold-reset] --
2,350,545 UART: [state] Locking Datavault
2,351,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,144 UART: [state] Locking ICCM
2,352,614 UART: [exit] Launching FMC @ 0x40000130
2,357,943 UART:
2,357,959 UART: Running Caliptra FMC ...
2,358,367 UART:
2,358,421 UART: [state] CFI Enabled
2,368,940 UART: [fht] FMC Alias Private Key: 7
2,476,315 UART: [art] Extend RT PCRs Done
2,476,743 UART: [art] Lock RT PCRs Done
2,478,327 UART: [art] Populate DV Done
2,486,610 UART: [fht] FMC Alias Private Key: 7
2,487,758 UART: [art] Derive CDI
2,488,038 UART: [art] Store in in slot 0x4
2,573,325 UART: [art] Derive Key Pair
2,573,685 UART: [art] Store priv key in slot 0x5
2,586,589 UART: [art] Derive Key Pair - Done
2,601,303 UART: [art] Signing Cert with AUTHO
2,601,783 UART: RITY.KEYID = 7
2,617,083 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,848 UART: [art] PUB.X = 1BD0C19CD437E991F5C6D71FD6364BAE4362C3ED5A752B4FA6E0D982239C55637CDA21B888A1CA3C3B4266AB86E02D10
2,624,630 UART: [art] PUB.Y = 7CD3DA1C6E2C9E6E3FC921D79666AFD05CDEEFBE8E5E48872F6EA439A0B169E102BC509963DA1E59967299BE891B4DC5
2,631,595 UART: [art] SIG.R = 17C02D9773A27871DA1AB943FA4655B1DC21010ED9979DE416138DB6BC7F179962ED18BA25ED6FFB3F512099A056F3F1
2,638,365 UART: [art] SIG.S = 77FCBA54D6504974C9A979C6155BE42E71BAA70999819DE0C9F702E475F645047050A9B1A7BA5E02E5B5029529B163A7
2,662,021 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,087 UART: [rt] Runtime listening for mailbox commands...
2,772,477 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,680 ready_for_fw is high
1,055,680 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,116,511 >>> mbox cmd response: success
2,116,511 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,717 UART:
2,178,733 UART: Running Caliptra FMC ...
2,179,141 UART:
2,179,195 UART: [state] CFI Enabled
2,189,446 UART: [fht] FMC Alias Private Key: 7
2,297,353 UART: [art] Extend RT PCRs Done
2,297,781 UART: [art] Lock RT PCRs Done
2,299,259 UART: [art] Populate DV Done
2,307,600 UART: [fht] FMC Alias Private Key: 7
2,308,668 UART: [art] Derive CDI
2,308,948 UART: [art] Store in in slot 0x4
2,394,519 UART: [art] Derive Key Pair
2,394,879 UART: [art] Store priv key in slot 0x5
2,408,103 UART: [art] Derive Key Pair - Done
2,422,975 UART: [art] Signing Cert with AUTHO
2,423,455 UART: RITY.KEYID = 7
2,438,555 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,320 UART: [art] PUB.X = 2CD783D5F486219300A7C1D5C5DC105074E8B5D4906126DB68B4E669E18D2441551A628AD310BA4CB86102E0C8974C95
2,446,061 UART: [art] PUB.Y = 72CFDD4B35B58419383ED78B895AE9E1ACF7D16B8DCE99AFF7E194D1CCE865B2DBA30D6CB0897F2F02F428A2734AA1E3
2,453,027 UART: [art] SIG.R = 1EA596D8B38D9DB731331C88920BE1E17FD7A4F7668F38EB9DACC475D2369A38821AED346CA0DE9F86F0EA5A14ED800A
2,459,807 UART: [art] SIG.S = 93F9648B40429B2C4EF25133531281DC32695A78FF0D801F7B91F7057BD41CD2869ED3410E8BFCB9E757458CAA5CA4A0
2,483,785 UART: mock_rt_interact::rt_entry...FMC Tester
2,590,703 UART: [rt] Runtime listening for mailbox commands...
2,594,093 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,787 UART: [state] LifecycleState = Unprovisioned
85,442 UART: [state] DebugLocked = No
85,964 UART: [state] WD Timer not started. Device not locked for debugging
87,279 UART: [kat] SHA2-256
890,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,958 UART: [kat] ++
895,110 UART: [kat] sha1
899,314 UART: [kat] SHA2-256
901,254 UART: [kat] SHA2-384
904,169 UART: [kat] SHA2-512-ACC
906,070 UART: [kat] ECC-384
915,751 UART: [kat] HMAC-384Kdf
920,293 UART: [kat] LMS
1,168,605 UART: [kat] --
1,169,552 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,198,876 UART: [idev] Sha1 KeyId Algorithm
1,207,866 UART: [idev] --
1,208,995 UART: [ldev] ++
1,209,163 UART: [ldev] CDI.KEYID = 6
1,209,527 UART: [ldev] SUBJECT.KEYID = 5
1,209,954 UART: [ldev] AUTHORITY.KEYID = 7
1,210,417 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,729 UART: [ldev] --
1,281,175 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 75384 bytes
2,134,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,264 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,728 >>> mbox cmd response: success
2,268,728 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,835 UART: [afmc] ++
2,270,003 UART: [afmc] CDI.KEYID = 6
2,270,366 UART: [afmc] SUBJECT.KEYID = 7
2,270,792 UART: [afmc] AUTHORITY.KEYID = 5
2,306,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,051 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,510 UART: [afmc] --
2,349,616 UART: [cold-reset] --
2,350,376 UART: [state] Locking Datavault
2,351,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,131 UART: [state] Locking ICCM
2,352,573 UART: [exit] Launching FMC @ 0x40000130
2,357,902 UART:
2,357,918 UART: Running Caliptra FMC ...
2,358,326 UART:
2,358,469 UART: [state] CFI Enabled
2,368,940 UART: [fht] FMC Alias Private Key: 7
2,477,219 UART: [art] Extend RT PCRs Done
2,477,647 UART: [art] Lock RT PCRs Done
2,479,039 UART: [art] Populate DV Done
2,487,292 UART: [fht] FMC Alias Private Key: 7
2,488,264 UART: [art] Derive CDI
2,488,544 UART: [art] Store in in slot 0x4
2,574,101 UART: [art] Derive Key Pair
2,574,461 UART: [art] Store priv key in slot 0x5
2,587,987 UART: [art] Derive Key Pair - Done
2,602,748 UART: [art] Signing Cert with AUTHO
2,603,228 UART: RITY.KEYID = 7
2,618,134 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,899 UART: [art] PUB.X = 77C96D3152BA9AD2BAD7DB462D07799C0433AF04CD114FBCD1F7EC7A817FFCBA8EDBD6C8C0E2A74A231C50D1D0000A8C
2,625,661 UART: [art] PUB.Y = 3897B005FEE68A3E88D5365F8E3967CEF76D7DB2EF4647EE224723E3B76C55CF6355225EE383A5B76644A7213F1DFABE
2,632,616 UART: [art] SIG.R = 25D348C17F417C8AFB942BAF44B5CB2EA3A003C811EDF06D35AB08CDE8096A372B0C3BE433F9B60116475618171487B1
2,639,377 UART: [art] SIG.S = D912A1410A51AD952C13950726D97D677AAC1562487D6BE3800188354619C185E75B0FDE829F21F4991A676E93CFD0F2
2,663,074 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,446 UART: [rt] Runtime listening for mailbox commands...
2,774,836 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,363 ready_for_fw is high
1,056,363 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,060 >>> mbox cmd response: success
2,118,060 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,686 UART:
2,181,702 UART: Running Caliptra FMC ...
2,182,110 UART:
2,182,253 UART: [state] CFI Enabled
2,193,086 UART: [fht] FMC Alias Private Key: 7
2,301,743 UART: [art] Extend RT PCRs Done
2,302,171 UART: [art] Lock RT PCRs Done
2,303,521 UART: [art] Populate DV Done
2,311,558 UART: [fht] FMC Alias Private Key: 7
2,312,504 UART: [art] Derive CDI
2,312,784 UART: [art] Store in in slot 0x4
2,398,231 UART: [art] Derive Key Pair
2,398,591 UART: [art] Store priv key in slot 0x5
2,412,485 UART: [art] Derive Key Pair - Done
2,427,392 UART: [art] Signing Cert with AUTHO
2,427,872 UART: RITY.KEYID = 7
2,443,170 UART: [art] Erasing AUTHORITY.KEYID = 7
2,443,935 UART: [art] PUB.X = D7341E61E685A74A275D2F1E5EEDF671E4DAADB112026A1130C8B54333EC044DB2C7420A96E7EEC99BC3241B9D766A2D
2,450,708 UART: [art] PUB.Y = A2E6F17A1FBDC435CB773614D112914066F84E1904F14B663F74061BDE2E151BD2FE3175704E63D4C00E153BF2521BFF
2,457,653 UART: [art] SIG.R = 7EA6FE4D211160A6EBE1ADEB0F15EF62034A85648435A21AE7DFB1DDE1EAD5D409F2ABACD8B66D660F47AE0FFB6B89CB
2,464,440 UART: [art] SIG.S = 3A827C4D3D43066FD01E4A8177F3C90229DE33E71880409EC284482F7411987846118368A723AEE0FFC55FA6EE72F09C
2,488,309 UART: mock_rt_interact::rt_entry...FMC Tester
2,595,189 UART: [rt] Runtime listening for mailbox commands...
2,598,579 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
191,986 UART:
192,337 UART: Running Caliptra ROM ...
194,029 UART:
194,214 UART: [state] CFI Enabled
266,415 UART: [state] LifecycleState = Unprovisioned
268,347 UART: [state] DebugLocked = No
269,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,439 UART: [kat] SHA2-256
444,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,646 UART: [kat] ++
455,124 UART: [kat] sha1
466,357 UART: [kat] SHA2-256
469,078 UART: [kat] SHA2-384
474,854 UART: [kat] SHA2-512-ACC
477,216 UART: [kat] ECC-384
2,768,039 UART: [kat] HMAC-384Kdf
2,798,892 UART: [kat] LMS
3,989,217 UART: [kat] --
3,996,051 UART: [cold-reset] ++
3,997,069 UART: [fht] Storing FHT @ 0x50003400
4,007,411 UART: [idev] ++
4,007,979 UART: [idev] CDI.KEYID = 6
4,009,014 UART: [idev] SUBJECT.KEYID = 7
4,010,191 UART: [idev] UDS.KEYID = 0
4,011,192 ready_for_fw is high
4,011,382 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,106,411 UART: [idev] Erasing UDS.KEYID = 0
7,347,051 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,678 UART: [idev] --
7,373,231 UART: [ldev] ++
7,373,793 UART: [ldev] CDI.KEYID = 6
7,374,728 UART: [ldev] SUBJECT.KEYID = 5
7,375,990 UART: [ldev] AUTHORITY.KEYID = 7
7,377,217 UART: [ldev] FE.KEYID = 1
7,422,324 UART: [ldev] Erasing FE.KEYID = 1
10,755,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,581 UART: [ldev] --
13,116,875 UART: [fwproc] Waiting for Commands...
13,119,287 UART: [fwproc] Received command 0x46574c44
13,121,517 UART: [fwproc] Received Image of size 75428 bytes
16,697,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,774,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,843,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,024,625 >>> mbox cmd response: success
17,025,062 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,028,857 UART: [afmc] ++
17,029,436 UART: [afmc] CDI.KEYID = 6
17,030,331 UART: [afmc] SUBJECT.KEYID = 7
17,031,606 UART: [afmc] AUTHORITY.KEYID = 5
20,393,535 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,690,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,693,014 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,707,397 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,722,244 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,736,662 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,758,872 UART: [afmc] --
22,761,856 UART: [cold-reset] --
22,765,615 UART: [state] Locking Datavault
22,770,316 UART: [state] Locking PCR0, PCR1 and PCR31
22,772,065 UART: [state] Locking ICCM
22,774,052 UART: [exit] Launching FMC @ 0x40000130
22,782,447 UART:
22,782,685 UART: Running Caliptra FMC ...
22,783,800 UART:
22,783,956 UART: [state] CFI Enabled
22,852,763 UART: [fht] FMC Alias Private Key: 7
25,190,089 UART: [art] Extend RT PCRs Done
25,191,311 UART: [art] Lock RT PCRs Done
25,192,584 UART: [art] Populate DV Done
25,198,098 UART: [fht] FMC Alias Private Key: 7
25,199,684 UART: [art] Derive CDI
25,200,424 UART: [art] Store in in slot 0x4
25,260,945 UART: [art] Derive Key Pair
25,261,978 UART: [art] Store priv key in slot 0x5
28,554,468 UART: [art] Derive Key Pair - Done
28,567,511 UART: [art] Signing Cert with AUTHO
28,568,812 UART: RITY.KEYID = 7
30,855,998 UART: [art] Erasing AUTHORITY.KEYID = 7
30,857,530 UART: [art] PUB.X = 07EDDCF5F9BAC6804136A01BF11F2598D50E8F850E8E58C700D5E58EA1B6DE47009F244CDAD5D8C3F6E5F1B8D307C569
30,864,735 UART: [art] PUB.Y = 2FF6DDA5C74A78A074B2E54932FAE0C4329E3252C6C904043E6C7F930665271FDA7F289409F29E6CCBF1F0F683AC26E0
30,871,961 UART: [art] SIG.R = 2C48981BCC7070E00825931E219484A46E70A35609230714EE74497B4DFE8851BA01F248E7BE207FEBB9B30427E22CE3
30,879,357 UART: [art] SIG.S = 47720CF05A88A85FA825437A45EFD7EB99DA30E6D5313C2E6D44A85F5E1CC3068611BB79FB44E06C4AA692434A581C77
32,183,713 UART: mock_rt_interact::rt_entry...FMC Tester
32,301,363 UART: [rt] Runtime listening for mailbox commands...
32,305,616 >>> mbox cmd response data (2048 bytes)
32,315,374 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,317,057 >>> mbox cmd response data (336 bytes)
32,320,979 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,336,788 >>> mbox cmd response data (1536 bytes)
34,394,029 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
34,489,791 UART:
34,490,172 UART: Running Caliptra ROM ...
34,491,305 UART:
34,491,467 UART: [state] CFI Enabled
34,565,315 UART: [state] LifecycleState = Unprovisioned
34,567,251 UART: [state] DebugLocked = No
34,569,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,574,052 UART: [kat] SHA2-256
34,743,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,754,219 UART: [kat] ++
34,754,936 UART: [kat] sha1
34,765,016 UART: [kat] SHA2-256
34,767,707 UART: [kat] SHA2-384
34,772,986 UART: [kat] SHA2-512-ACC
34,775,389 UART: [kat] ECC-384
37,068,885 UART: [kat] HMAC-384Kdf
37,082,651 UART: [kat] LMS
38,273,000 UART: [kat] --
38,276,453 UART: [update-reset] ++
41,938,393 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,942,722 UART: [update-reset] Loading Runtime at address 0x40005000 len 50724
42,189,525 >>> mbox cmd response: success
42,191,502 UART: [update-reset] Copying MAN_2 To MAN_1
42,213,899 UART: [update-reset Success] --
42,219,120 UART: [state] Locking Datavault
42,223,515 UART: [state] Locking PCR0, PCR1 and PCR31
42,225,265 UART: [state] Locking ICCM
42,227,794 UART: [exit] Launching FMC @ 0x40000130
42,236,184 UART:
42,236,415 UART: Running Caliptra FMC ...
42,237,515 UART:
42,237,677 UART: [state] CFI Enabled
42,340,450 UART: [art] Extend RT PCRs Done
42,341,645 UART: [art] Lock RT PCRs Done
42,343,148 UART: [art] Populate DV Done
42,348,499 UART: [fht] FMC Alias Private Key: 7
42,350,090 UART: [art] Derive CDI
42,351,436 UART: [art] Store in in slot 0x4
42,410,274 UART: [art] Derive Key Pair
42,411,319 UART: [art] Store priv key in slot 0x5
45,704,304 UART: [art] Derive Key Pair - Done
45,717,075 UART: [art] Signing Cert with AUTHO
45,718,406 UART: RITY.KEYID = 7
48,006,014 UART: [art] Erasing AUTHORITY.KEYID = 7
48,007,519 UART: [art] PUB.X = 09E7FEEBD6E46A3BEA97CE3227FEFC1EBEB3C50013F417EC6BFA92E70169B4D7C43197DCC4A3278F7A702EB2CB88E50F
48,014,796 UART: [art] PUB.Y = 7B40C30A6BDDB95E99EAA15D2DB04C4B668B154B5131E5C2A8F18655B008906B1DA97CA5C68E65BAB533C90F565FE7B0
48,022,065 UART: [art] SIG.R = FF9776C977C2ADAA76713E196DE237B79EC11FF6F352043EFC7003E081205DBCE7B9794765EE98B3F84394EA8C9AB901
48,029,435 UART: [art] SIG.S = 5A3FE7FC33492FBDE7771D2BBC8421AAF84265F4384928D985B83DE727ABEBF297D89C14219FB9B4776956F0AAF79A9B
49,333,264 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,334,318 UART: mock_rt_interact::rt_entry...FMC Tester
49,621,720 UART: [rt] Runtime listening for mailbox commands...
49,624,650 >>> mbox cmd response data (336 bytes)
49,628,543 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,644,360 >>> mbox cmd response data (1536 bytes)
49,651,712 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,652,116 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,804,769 ready_for_fw is high
3,805,369 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,075,511 >>> mbox cmd response: success
17,076,250 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,775,611 UART:
22,776,473 UART: Running Caliptra FMC ...
22,777,673 UART:
22,777,820 UART: [state] CFI Enabled
22,844,208 UART: [fht] FMC Alias Private Key: 7
25,182,574 UART: [art] Extend RT PCRs Done
25,183,803 UART: [art] Lock RT PCRs Done
25,185,717 UART: [art] Populate DV Done
25,191,119 UART: [fht] FMC Alias Private Key: 7
25,192,707 UART: [art] Derive CDI
25,193,517 UART: [art] Store in in slot 0x4
25,254,204 UART: [art] Derive Key Pair
25,255,245 UART: [art] Store priv key in slot 0x5
28,548,239 UART: [art] Derive Key Pair - Done
28,561,288 UART: [art] Signing Cert with AUTHO
28,562,594 UART: RITY.KEYID = 7
30,850,337 UART: [art] Erasing AUTHORITY.KEYID = 7
30,851,835 UART: [art] PUB.X = E6825DADE40ED94FA195409360A28BF6D52CFBB899B6496475B7085F58A2152C060314F51006650CE5530EFA90DACB2B
30,859,080 UART: [art] PUB.Y = 69E5A534A944537E3CF71520FF0633C0BFEBB2DA7DF67C72EA90C208C08DF07ED6B875D24931930E8C32790B1E358725
30,866,336 UART: [art] SIG.R = 829A9499D2F936996E2267DA1F0A70FCF12F9E008D45000C1308D2749929122FCE5B97F81811ABDA314DEFAA55AB8213
30,873,671 UART: [art] SIG.S = A20FCA8792C2347595A755D151F2B2BC0314F0570708C4D84AA918AFECDAD821D47D3F71C4367B57EEAA1F4CC865F777
32,178,531 UART: mock_rt_interact::rt_entry...FMC Tester
32,295,408 UART: [rt] Runtime listening for mailbox commands...
32,299,691 >>> mbox cmd response data (2048 bytes)
32,309,401 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,311,079 >>> mbox cmd response data (336 bytes)
32,314,974 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,330,783 >>> mbox cmd response data (1536 bytes)
34,407,030 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
42,302,279 >>> mbox cmd response: success
42,339,124 UART:
42,339,415 UART: Running Caliptra FMC ...
42,340,832 UART:
42,341,007 UART: [state] CFI Enabled
42,442,488 UART: [art] Extend RT PCRs Done
42,443,678 UART: [art] Lock RT PCRs Done
42,445,124 UART: [art] Populate DV Done
42,450,478 UART: [fht] FMC Alias Private Key: 7
42,452,008 UART: [art] Derive CDI
42,452,824 UART: [art] Store in in slot 0x4
42,511,645 UART: [art] Derive Key Pair
42,512,681 UART: [art] Store priv key in slot 0x5
45,805,247 UART: [art] Derive Key Pair - Done
45,818,191 UART: [art] Signing Cert with AUTHO
45,819,515 UART: RITY.KEYID = 7
48,106,626 UART: [art] Erasing AUTHORITY.KEYID = 7
48,108,143 UART: [art] PUB.X = 1FB6DC0BD919E56F35A1E05069E3B8D3F20EE9A0B996CB1074ACFC563C2CB776A66F8C14ABACDDA7D7266DD949168C8F
48,115,366 UART: [art] PUB.Y = B0B090F9F9C91A692297E3201D8B1239A943C7DF4D27591F129834EF9C25708C9483989CDEA0FCEC2C237992589406E1
48,122,621 UART: [art] SIG.R = 61C2D16BFE30919C588ED6DB6E3EFC4585BCC8A5339062ACFF04BE260C6690C6A558D375C5978CD7B639AE60DD616CF0
48,129,979 UART: [art] SIG.S = 9445E48C476F3C0B78B76FCFE86AA93A39A4D8C8E6961C454335CF62539068D722165F2592B30CD00F49D6C18D21B9E2
49,432,884 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,434,117 UART: mock_rt_interact::rt_entry...FMC Tester
49,721,098 UART: [rt] Runtime listening for mailbox commands...
49,724,026 >>> mbox cmd response data (336 bytes)
49,727,832 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,743,638 >>> mbox cmd response data (1536 bytes)
49,751,223 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,751,640 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,320 UART:
192,691 UART: Running Caliptra ROM ...
193,782 UART:
603,642 UART: [state] CFI Enabled
619,992 UART: [state] LifecycleState = Unprovisioned
621,871 UART: [state] DebugLocked = No
624,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,555 UART: [kat] SHA2-256
799,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,810 UART: [kat] ++
810,283 UART: [kat] sha1
820,942 UART: [kat] SHA2-256
823,688 UART: [kat] SHA2-384
829,291 UART: [kat] SHA2-512-ACC
831,669 UART: [kat] ECC-384
3,115,284 UART: [kat] HMAC-384Kdf
3,126,950 UART: [kat] LMS
4,317,034 UART: [kat] --
4,323,257 UART: [cold-reset] ++
4,324,925 UART: [fht] Storing FHT @ 0x50003400
4,336,403 UART: [idev] ++
4,337,035 UART: [idev] CDI.KEYID = 6
4,337,942 UART: [idev] SUBJECT.KEYID = 7
4,339,186 UART: [idev] UDS.KEYID = 0
4,340,248 ready_for_fw is high
4,340,452 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
4,435,431 UART: [idev] Erasing UDS.KEYID = 0
7,628,130 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,969 UART: [idev] --
7,654,743 UART: [ldev] ++
7,655,318 UART: [ldev] CDI.KEYID = 6
7,656,281 UART: [ldev] SUBJECT.KEYID = 5
7,657,499 UART: [ldev] AUTHORITY.KEYID = 7
7,658,738 UART: [ldev] FE.KEYID = 1
7,669,596 UART: [ldev] Erasing FE.KEYID = 1
10,953,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,915 UART: [ldev] --
13,312,888 UART: [fwproc] Waiting for Commands...
13,316,224 UART: [fwproc] Received command 0x46574c44
13,318,400 UART: [fwproc] Received Image of size 75428 bytes
16,895,133 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,972,052 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,040,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 50724
17,222,590 >>> mbox cmd response: success
17,222,976 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,226,609 UART: [afmc] ++
17,227,217 UART: [afmc] CDI.KEYID = 6
17,228,312 UART: [afmc] SUBJECT.KEYID = 7
17,229,416 UART: [afmc] AUTHORITY.KEYID = 5
20,546,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,841,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,843,463 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,857,836 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,872,676 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,887,136 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,909,650 UART: [afmc] --
22,913,282 UART: [cold-reset] --
22,917,959 UART: [state] Locking Datavault
22,924,067 UART: [state] Locking PCR0, PCR1 and PCR31
22,925,766 UART: [state] Locking ICCM
22,928,506 UART: [exit] Launching FMC @ 0x40000130
22,936,899 UART:
22,937,130 UART: Running Caliptra FMC ...
22,938,250 UART:
22,938,406 UART: [state] CFI Enabled
22,946,233 UART: [fht] FMC Alias Private Key: 7
25,277,011 UART: [art] Extend RT PCRs Done
25,278,238 UART: [art] Lock RT PCRs Done
25,280,070 UART: [art] Populate DV Done
25,285,483 UART: [fht] FMC Alias Private Key: 7
25,287,067 UART: [art] Derive CDI
25,287,887 UART: [art] Store in in slot 0x4
25,330,316 UART: [art] Derive Key Pair
25,331,358 UART: [art] Store priv key in slot 0x5
28,573,333 UART: [art] Derive Key Pair - Done
28,586,384 UART: [art] Signing Cert with AUTHO
28,587,716 UART: RITY.KEYID = 7
30,867,563 UART: [art] Erasing AUTHORITY.KEYID = 7
30,869,086 UART: [art] PUB.X = A521CC620E8B53989FD6EE1BC46F8856A19A3ED28A4444FC6B67A56FE95C028CBFC80230FA5278EBE4C877539F6F3031
30,876,309 UART: [art] PUB.Y = 19AC1F1F82C5485815125779905BB30EFC3E7993F1648BA7DD3148D0010EFB9EDEC8485E11E86588CFB244C48B9C932A
30,883,554 UART: [art] SIG.R = E2200C756BD2C6FA9761D6762C9205C03515DE2A8782552106E2D0A477C382A4C3AEDA82F7434CB8402539BBC50C2EB2
30,890,954 UART: [art] SIG.S = F0DEA04A8135BF37EFBA61272F1F63E2296BEB63D4FC75B96E4BB39C27BE1279385D0889A5DB6691800793BFA4CAD2D5
32,195,455 UART: mock_rt_interact::rt_entry...FMC Tester
32,312,988 UART: [rt] Runtime listening for mailbox commands...
32,317,216 >>> mbox cmd response data (2048 bytes)
32,327,023 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,328,707 >>> mbox cmd response data (336 bytes)
32,332,614 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,348,405 >>> mbox cmd response data (1536 bytes)
34,403,110 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
34,498,837 UART:
34,499,212 UART: Running Caliptra ROM ...
34,500,298 UART:
34,500,465 UART: [state] CFI Enabled
34,513,084 UART: [state] LifecycleState = Unprovisioned
34,515,017 UART: [state] DebugLocked = No
34,516,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,522,314 UART: [kat] SHA2-256
34,692,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,702,538 UART: [kat] ++
34,703,016 UART: [kat] sha1
34,713,528 UART: [kat] SHA2-256
34,716,233 UART: [kat] SHA2-384
34,721,252 UART: [kat] SHA2-512-ACC
34,723,603 UART: [kat] ECC-384
37,009,745 UART: [kat] HMAC-384Kdf
37,023,019 UART: [kat] LMS
38,213,081 UART: [kat] --
38,217,737 UART: [update-reset] ++
41,883,320 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,886,433 UART: [update-reset] Loading Runtime at address 0x40005000 len 50724
42,133,269 >>> mbox cmd response: success
42,135,147 UART: [update-reset] Copying MAN_2 To MAN_1
42,157,586 UART: [update-reset Success] --
42,163,441 UART: [state] Locking Datavault
42,166,099 UART: [state] Locking PCR0, PCR1 and PCR31
42,167,862 UART: [state] Locking ICCM
42,170,137 UART: [exit] Launching FMC @ 0x40000130
42,178,541 UART:
42,178,782 UART: Running Caliptra FMC ...
42,179,881 UART:
42,180,062 UART: [state] CFI Enabled
42,224,249 UART: [art] Extend RT PCRs Done
42,225,454 UART: [art] Lock RT PCRs Done
42,226,533 UART: [art] Populate DV Done
42,232,211 UART: [fht] FMC Alias Private Key: 7
42,233,692 UART: [art] Derive CDI
42,235,250 UART: [art] Store in in slot 0x4
42,277,067 UART: [art] Derive Key Pair
42,278,109 UART: [art] Store priv key in slot 0x5
45,521,111 UART: [art] Derive Key Pair - Done
45,534,141 UART: [art] Signing Cert with AUTHO
45,535,452 UART: RITY.KEYID = 7
47,814,797 UART: [art] Erasing AUTHORITY.KEYID = 7
47,816,314 UART: [art] PUB.X = 75579FBE71717E518A33F581950F21B00895323B92BA56804E32EEA9B0AD9352F262312D605D73353DC0D789B0564ACB
47,823,552 UART: [art] PUB.Y = ABB6B513EBFCE170951836E4B187A3548D06C34AA5252A017DE0D759C2485593433978804F27F52DF9B94B0313BFE25A
47,830,752 UART: [art] SIG.R = 86FF6B8AFE17C16EB6D705301B6D5C6940C0D94060EAAFD05A1B632BB3D104520E4B7DE9E899FC73BDAC21B311B10674
47,838,180 UART: [art] SIG.S = EB12141FAA4CF23C7073C86878B8FC342D3197F82558A040EED3182F113108D56DC054728E9E2341DF4A0697CCBBCDF5
49,141,241 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,142,644 UART: mock_rt_interact::rt_entry...FMC Tester
49,430,730 UART: [rt] Runtime listening for mailbox commands...
49,433,657 >>> mbox cmd response data (336 bytes)
49,437,762 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,453,572 >>> mbox cmd response data (1536 bytes)
49,460,896 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,461,295 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,127,655 ready_for_fw is high
4,128,093 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
17,287,312 >>> mbox cmd response: success
17,288,065 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,927,880 UART:
22,928,295 UART: Running Caliptra FMC ...
22,929,517 UART:
22,929,679 UART: [state] CFI Enabled
22,937,559 UART: [fht] FMC Alias Private Key: 7
25,268,428 UART: [art] Extend RT PCRs Done
25,269,658 UART: [art] Lock RT PCRs Done
25,271,281 UART: [art] Populate DV Done
25,276,700 UART: [fht] FMC Alias Private Key: 7
25,278,346 UART: [art] Derive CDI
25,279,156 UART: [art] Store in in slot 0x4
25,321,766 UART: [art] Derive Key Pair
25,322,799 UART: [art] Store priv key in slot 0x5
28,563,954 UART: [art] Derive Key Pair - Done
28,577,396 UART: [art] Signing Cert with AUTHO
28,578,704 UART: RITY.KEYID = 7
30,858,191 UART: [art] Erasing AUTHORITY.KEYID = 7
30,859,696 UART: [art] PUB.X = 5697EA5F304E849E249FF26CC3F4C4DE8744C289E6892227AF9DBBEE2297660944922628E51140F1696A136E48E0007B
30,866,901 UART: [art] PUB.Y = D1FEF8F0DF3EAF945665A24C6CF08FC72221C25835C3200A9EA3403F472ED7FEC79CBE18BB820D21AB7FD396947515C8
30,874,209 UART: [art] SIG.R = 603134BE65A1812995DBAD1915C3B19A95CC364D5F1BEB6438F0348A09624337D20B093B748282A91AF97AB9F258BDCD
30,881,561 UART: [art] SIG.S = 1F9C46C8049845768A470314DC329C19E8C65B343221693D39042648E4125F97B3FFE0ACE5A101D4A3137027FC0E9E9E
32,186,140 UART: mock_rt_interact::rt_entry...FMC Tester
32,303,448 UART: [rt] Runtime listening for mailbox commands...
32,307,722 >>> mbox cmd response data (2048 bytes)
32,317,414 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,319,078 >>> mbox cmd response data (336 bytes)
32,322,877 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,338,686 >>> mbox cmd response data (1536 bytes)
34,394,599 <<< Executing mbox cmd 0x46574c44 (75428 bytes) from SoC
42,215,149 >>> mbox cmd response: success
42,249,509 UART:
42,249,807 UART: Running Caliptra FMC ...
42,250,882 UART:
42,251,040 UART: [state] CFI Enabled
42,295,582 UART: [art] Extend RT PCRs Done
42,296,776 UART: [art] Lock RT PCRs Done
42,298,398 UART: [art] Populate DV Done
42,303,658 UART: [fht] FMC Alias Private Key: 7
42,305,149 UART: [art] Derive CDI
42,305,906 UART: [art] Store in in slot 0x4
42,348,556 UART: [art] Derive Key Pair
42,349,579 UART: [art] Store priv key in slot 0x5
45,591,935 UART: [art] Derive Key Pair - Done
45,604,722 UART: [art] Signing Cert with AUTHO
45,606,031 UART: RITY.KEYID = 7
47,885,473 UART: [art] Erasing AUTHORITY.KEYID = 7
47,886,987 UART: [art] PUB.X = 09A6DA60417CB2074447BDC65057EF14B60A4133FC972B4AB4D2AF89815DE9B4CCBD8331B7F1FBC29FC960DA91EF11F5
47,894,246 UART: [art] PUB.Y = 456A874CA063F54FE08124D4CF7D7575825394A000EE0F3CE406EC2DE2FBFAA434CCACF86C10377006F8F32A0E3EE03D
47,901,478 UART: [art] SIG.R = 50EEC24F96C90523A5EEE02867673231F4ACB7253DF32FD9091DEAE71F025AD52065BF855B8AF51E2A1D228C6C109587
47,908,873 UART: [art] SIG.S = FB59C66ABB7D756A3229030679262DCAD8B3F57501C455E93ACB6930E735CF8CE3AEF62BA71A08BED249A8A4088F8653
49,212,114 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,213,131 UART: mock_rt_interact::rt_entry...FMC Tester
49,502,968 UART: [rt] Runtime listening for mailbox commands...
49,505,907 >>> mbox cmd response data (336 bytes)
49,509,553 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,525,354 >>> mbox cmd response data (1536 bytes)
49,532,905 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,533,348 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,006 UART:
192,381 UART: Running Caliptra ROM ...
193,503 UART:
193,647 UART: [state] CFI Enabled
264,275 UART: [state] LifecycleState = Unprovisioned
266,069 UART: [state] DebugLocked = No
268,327 UART: [state] WD Timer not started. Device not locked for debugging
271,742 UART: [kat] SHA2-256
450,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,266 UART: [kat] ++
462,793 UART: [kat] sha1
475,018 UART: [kat] SHA2-256
478,024 UART: [kat] SHA2-384
485,218 UART: [kat] SHA2-512-ACC
488,147 UART: [kat] ECC-384
2,950,457 UART: [kat] HMAC-384Kdf
2,972,639 UART: [kat] LMS
3,502,088 UART: [kat] --
3,506,927 UART: [cold-reset] ++
3,509,288 UART: [fht] FHT @ 0x50003400
3,521,680 UART: [idev] ++
3,522,240 UART: [idev] CDI.KEYID = 6
3,523,230 UART: [idev] SUBJECT.KEYID = 7
3,524,402 UART: [idev] UDS.KEYID = 0
3,525,295 ready_for_fw is high
3,525,477 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,620,425 UART: [idev] Erasing UDS.KEYID = 0
6,026,726 UART: [idev] Sha1 KeyId Algorithm
6,048,655 UART: [idev] --
6,053,059 UART: [ldev] ++
6,053,637 UART: [ldev] CDI.KEYID = 6
6,054,516 UART: [ldev] SUBJECT.KEYID = 5
6,055,724 UART: [ldev] AUTHORITY.KEYID = 7
6,056,956 UART: [ldev] FE.KEYID = 1
6,102,410 UART: [ldev] Erasing FE.KEYID = 1
8,606,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,329 UART: [ldev] --
10,417,805 UART: [fwproc] Wait for Commands...
10,420,865 UART: [fwproc] Recv command 0x46574c44
10,422,951 UART: [fwproc] Recv'd Img size: 75384 bytes
13,351,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,429,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,498,324 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,679,550 >>> mbox cmd response: success
13,679,997 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,683,193 UART: [afmc] ++
13,683,769 UART: [afmc] CDI.KEYID = 6
13,684,682 UART: [afmc] SUBJECT.KEYID = 7
13,685,840 UART: [afmc] AUTHORITY.KEYID = 5
16,211,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,935,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,937,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,953,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,969,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,985,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,009,363 UART: [afmc] --
18,012,316 UART: [cold-reset] --
18,016,823 UART: [state] Locking Datavault
18,022,338 UART: [state] Locking PCR0, PCR1 and PCR31
18,023,978 UART: [state] Locking ICCM
18,025,257 UART: [exit] Launching FMC @ 0x40000130
18,033,716 UART:
18,033,985 UART: Running Caliptra FMC ...
18,035,096 UART:
18,035,259 UART: [state] CFI Enabled
18,093,442 UART: [fht] FMC Alias Private Key: 7
19,857,046 UART: [art] Extend RT PCRs Done
19,858,265 UART: [art] Lock RT PCRs Done
19,860,103 UART: [art] Populate DV Done
19,865,511 UART: [fht] FMC Alias Private Key: 7
19,867,164 UART: [art] Derive CDI
19,867,982 UART: [art] Store in in slot 0x4
19,925,763 UART: [art] Derive Key Pair
19,926,804 UART: [art] Store priv key in slot 0x5
22,389,264 UART: [art] Derive Key Pair - Done
22,402,259 UART: [art] Signing Cert with AUTHO
22,403,567 UART: RITY.KEYID = 7
24,115,976 UART: [art] Erasing AUTHORITY.KEYID = 7
24,117,484 UART: [art] PUB.X = 070016B8A053FDD599182618ED02BFBAF20F831EFA385B27BC6740BC7C569911627C92D3B3FDA7EEDCA61BA2AE20684D
24,124,732 UART: [art] PUB.Y = D4A0696DCB8DE7D670DA2AB3ADB517038C4F678F2D74ADC6DDD0C684D964BB575DC0E648148D64ABED5DB984EEA604CB
24,132,040 UART: [art] SIG.R = E86557DC4C4A9F5C820D539FE52F375921030ED4CF34D9814951D863E4C065F2C673A7A1A02E76A2B4E6DE36C4ED92E2
24,139,423 UART: [art] SIG.S = 7B2A5F1C5643825351DD3B61562B2B83982B076E06DC129C1F182B6FC3E26D673E569310E307E39DCA12DB7C2868D00E
25,118,139 UART: mock_rt_interact::rt_entry...FMC Tester
25,235,289 UART: [rt] Runtime listening for mailbox commands...
25,239,522 >>> mbox cmd response data (2048 bytes)
25,249,248 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,250,910 >>> mbox cmd response data (336 bytes)
25,254,804 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,270,610 >>> mbox cmd response data (1536 bytes)
27,326,830 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,422,649 UART:
27,423,014 UART: Running Caliptra ROM ...
27,424,157 UART:
27,424,319 UART: [state] CFI Enabled
27,483,626 UART: [state] LifecycleState = Unprovisioned
27,485,504 UART: [state] DebugLocked = No
27,487,594 UART: [state] WD Timer not started. Device not locked for debugging
27,491,426 UART: [kat] SHA2-256
27,670,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,682,105 UART: [kat] ++
27,682,646 UART: [kat] sha1
27,693,207 UART: [kat] SHA2-256
27,696,222 UART: [kat] SHA2-384
27,701,935 UART: [kat] SHA2-512-ACC
27,704,872 UART: [kat] ECC-384
30,166,222 UART: [kat] HMAC-384Kdf
30,190,770 UART: [kat] LMS
30,720,225 UART: [kat] --
30,725,173 UART: [update-reset] ++
33,683,154 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,686,758 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
33,933,325 >>> mbox cmd response: success
33,934,384 UART: [update-reset] Copying MAN_2 To MAN_1
33,956,177 UART: [update-reset Success] --
33,960,342 UART: [state] Locking Datavault
33,963,515 UART: [state] Locking PCR0, PCR1 and PCR31
33,965,219 UART: [state] Locking ICCM
33,966,406 UART: [exit] Launching FMC @ 0x40000130
33,974,807 UART:
33,975,044 UART: Running Caliptra FMC ...
33,976,144 UART:
33,976,301 UART: [state] CFI Enabled
34,064,184 UART: [art] Extend RT PCRs Done
34,065,550 UART: [art] Lock RT PCRs Done
34,067,131 UART: [art] Populate DV Done
34,072,702 UART: [fht] FMC Alias Private Key: 7
34,074,257 UART: [art] Derive CDI
34,075,072 UART: [art] Store in in slot 0x4
34,133,652 UART: [art] Derive Key Pair
34,134,691 UART: [art] Store priv key in slot 0x5
36,598,125 UART: [art] Derive Key Pair - Done
36,611,020 UART: [art] Signing Cert with AUTHO
36,612,322 UART: RITY.KEYID = 7
38,323,581 UART: [art] Erasing AUTHORITY.KEYID = 7
38,325,090 UART: [art] PUB.X = 337D1C0B52E14F511CB4F33431FE89533F67AAF595C3D2FDF47ACCACE4D584330EB3B84F280F95AB7E6D1CB79D684318
38,332,369 UART: [art] PUB.Y = 83EC9C0293F31F2173DF894F15DB9FA8A279B1ADF2ECF07212CA8DFA4ACEF111A68396D9510DA7A1AFF0716F8F4ACA04
38,339,647 UART: [art] SIG.R = 5BD003250E81BC1B3C56AFAB78511C9013593B0681D6DAE8C89DCA1B2CE47EDC6040846B34871FC1669569D0EDD96100
38,347,011 UART: [art] SIG.S = 38E7031473260186A24C2080D55A06A7A472A02EB855AD62A2389C9F41783E467537C6E1F751737B6667056EF2657EFD
39,324,518 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,325,558 UART: mock_rt_interact::rt_entry...FMC Tester
39,611,694 UART: [rt] Runtime listening for mailbox commands...
39,614,620 >>> mbox cmd response data (336 bytes)
39,618,727 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,634,509 >>> mbox cmd response data (1536 bytes)
39,641,860 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,642,275 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
191,960 UART:
192,327 UART: Running Caliptra ROM ...
193,415 UART:
193,558 UART: [state] CFI Enabled
267,393 UART: [state] LifecycleState = Unprovisioned
269,809 UART: [state] DebugLocked = No
271,908 UART: [state] WD Timer not started. Device not locked for debugging
277,291 UART: [kat] SHA2-256
467,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,921 UART: [kat] ++
478,454 UART: [kat] sha1
491,195 UART: [kat] SHA2-256
494,242 UART: [kat] SHA2-384
500,589 UART: [kat] SHA2-512-ACC
503,169 UART: [kat] ECC-384
2,950,795 UART: [kat] HMAC-384Kdf
2,973,430 UART: [kat] LMS
3,505,189 UART: [kat] --
3,508,993 UART: [cold-reset] ++
3,511,283 UART: [fht] FHT @ 0x50003400
3,522,914 UART: [idev] ++
3,523,615 UART: [idev] CDI.KEYID = 6
3,524,562 UART: [idev] SUBJECT.KEYID = 7
3,525,798 UART: [idev] UDS.KEYID = 0
3,526,692 ready_for_fw is high
3,526,879 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,622,002 UART: [idev] Erasing UDS.KEYID = 0
6,029,731 UART: [idev] Sha1 KeyId Algorithm
6,052,259 UART: [idev] --
6,057,010 UART: [ldev] ++
6,057,689 UART: [ldev] CDI.KEYID = 6
6,058,571 UART: [ldev] SUBJECT.KEYID = 5
6,059,784 UART: [ldev] AUTHORITY.KEYID = 7
6,060,957 UART: [ldev] FE.KEYID = 1
6,100,301 UART: [ldev] Erasing FE.KEYID = 1
8,608,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,528 UART: [ldev] --
10,415,395 UART: [fwproc] Wait for Commands...
10,418,518 UART: [fwproc] Recv command 0x46574c44
10,420,825 UART: [fwproc] Recv'd Img size: 75384 bytes
13,392,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,472,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,588,276 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
13,897,279 >>> mbox cmd response: success
13,897,732 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,901,629 UART: [afmc] ++
13,902,374 UART: [afmc] CDI.KEYID = 6
13,903,475 UART: [afmc] SUBJECT.KEYID = 7
13,905,037 UART: [afmc] AUTHORITY.KEYID = 5
16,447,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,169,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,171,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,186,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,201,339 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,216,348 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,240,930 UART: [afmc] --
18,244,897 UART: [cold-reset] --
18,247,943 UART: [state] Locking Datavault
18,254,850 UART: [state] Locking PCR0, PCR1 and PCR31
18,257,058 UART: [state] Locking ICCM
18,258,295 UART: [exit] Launching FMC @ 0x40000130
18,266,636 UART:
18,266,871 UART: Running Caliptra FMC ...
18,267,968 UART:
18,268,137 UART: [state] CFI Enabled
18,326,952 UART: [fht] FMC Alias Private Key: 7
20,090,834 UART: [art] Extend RT PCRs Done
20,092,056 UART: [art] Lock RT PCRs Done
20,093,495 UART: [art] Populate DV Done
20,098,958 UART: [fht] FMC Alias Private Key: 7
20,100,601 UART: [art] Derive CDI
20,101,331 UART: [art] Store in in slot 0x4
20,160,011 UART: [art] Derive Key Pair
20,161,007 UART: [art] Store priv key in slot 0x5
22,623,766 UART: [art] Derive Key Pair - Done
22,636,507 UART: [art] Signing Cert with AUTHO
22,637,820 UART: RITY.KEYID = 7
24,358,266 UART: [art] Erasing AUTHORITY.KEYID = 7
24,360,235 UART: [art] PUB.X = 797A7CB2CEE5BB587BF6E865E00F36A49B1F7C15D1AEEAC38A2DBB29D07717AD9CD51F2C371A7EC73A7DF375D2286D73
24,367,098 UART: [art] PUB.Y = 0CA78F58F79507005F1B4F7EF0FA0585A52EC026712C3C4AEC19C86841327188FD7BA76D3DDBA0F115B9C836E4F4AF36
24,374,350 UART: [art] SIG.R = 34B1A6D64F6E2B58995D7D2C2D92D309C53546AC5C47F7FB839C61337F86E139F86FB2805158E175AC12702C371923DA
24,381,739 UART: [art] SIG.S = 8B0D7E1BAD0247750817AF71A8A2E050D943C471ED796E88E6D89670F5B2078E5837F398A5828AB8713AD24962F7E86D
25,360,896 UART: mock_rt_interact::rt_entry...FMC Tester
25,477,247 UART: [rt] Runtime listening for mailbox commands...
25,481,541 >>> mbox cmd response data (2048 bytes)
25,491,344 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,493,074 >>> mbox cmd response data (336 bytes)
25,497,053 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,512,906 >>> mbox cmd response data (1536 bytes)
27,577,473 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,673,312 UART:
27,673,670 UART: Running Caliptra ROM ...
27,674,832 UART:
27,675,000 UART: [state] CFI Enabled
27,732,231 UART: [state] LifecycleState = Unprovisioned
27,734,414 UART: [state] DebugLocked = No
27,737,184 UART: [state] WD Timer not started. Device not locked for debugging
27,742,005 UART: [kat] SHA2-256
27,931,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,942,655 UART: [kat] ++
27,943,107 UART: [kat] sha1
27,954,742 UART: [kat] SHA2-256
27,957,752 UART: [kat] SHA2-384
27,963,954 UART: [kat] SHA2-512-ACC
27,966,571 UART: [kat] ECC-384
30,419,066 UART: [kat] HMAC-384Kdf
30,442,209 UART: [kat] LMS
30,973,812 UART: [kat] --
30,978,400 UART: [update-reset] ++
33,960,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,964,204 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
34,338,076 >>> mbox cmd response: success
34,338,899 UART: [update-reset] Copying MAN_2 To MAN_1
34,376,470 UART: [update-reset Success] --
34,380,596 UART: [state] Locking Datavault
34,385,311 UART: [state] Locking PCR0, PCR1 and PCR31
34,387,502 UART: [state] Locking ICCM
34,388,733 UART: [exit] Launching FMC @ 0x40000130
34,397,405 UART:
34,397,647 UART: Running Caliptra FMC ...
34,398,746 UART:
34,398,897 UART: [state] CFI Enabled
34,485,178 UART: [art] Extend RT PCRs Done
34,486,389 UART: [art] Lock RT PCRs Done
34,487,487 UART: [art] Populate DV Done
34,493,074 UART: [fht] FMC Alias Private Key: 7
34,494,596 UART: [art] Derive CDI
34,495,357 UART: [art] Store in in slot 0x4
34,554,396 UART: [art] Derive Key Pair
34,555,390 UART: [art] Store priv key in slot 0x5
37,018,209 UART: [art] Derive Key Pair - Done
37,031,023 UART: [art] Signing Cert with AUTHO
37,032,337 UART: RITY.KEYID = 7
38,744,298 UART: [art] Erasing AUTHORITY.KEYID = 7
38,745,814 UART: [art] PUB.X = 5BB95FCE68EC5E8CB7CBC5A669DF4C8DDC5A919562CEE5F0C3072DDB03B27CB1DC31F0A61EAF4D027E925461C760420A
38,753,051 UART: [art] PUB.Y = AD04079C91E3C111F0CB0029B399E5474A8936FC7814E439CA6166D57407FB986B327941316B8933D41D78B9262BE9C8
38,760,280 UART: [art] SIG.R = 5059823629080E9BE5C4C850D0DAF55B89717DBB613A10130F348EACABAE85E7728DA9AE4F888F7B19B97620DAC5F234
38,767,656 UART: [art] SIG.S = 15A246A757508C1C41D1E2887EAC48A587D7282DA73F4124AA0BB31ADB0165B816933D1F9B0B5F6BAFBC2B019F61DF70
39,744,992 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,745,942 UART: mock_rt_interact::rt_entry...FMC Tester
40,032,933 UART: [rt] Runtime listening for mailbox commands...
40,035,869 >>> mbox cmd response data (336 bytes)
40,039,733 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,055,541 >>> mbox cmd response data (1536 bytes)
40,062,844 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,063,239 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
3,436,429 ready_for_fw is high
3,436,844 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
13,896,131 >>> mbox cmd response: success
13,896,818 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,184,661 UART:
18,185,388 UART: Running Caliptra FMC ...
18,186,590 UART:
18,186,832 UART: [state] CFI Enabled
18,254,954 UART: [fht] FMC Alias Private Key: 7
20,019,106 UART: [art] Extend RT PCRs Done
20,020,343 UART: [art] Lock RT PCRs Done
20,022,133 UART: [art] Populate DV Done
20,027,656 UART: [fht] FMC Alias Private Key: 7
20,029,263 UART: [art] Derive CDI
20,030,087 UART: [art] Store in in slot 0x4
20,087,706 UART: [art] Derive Key Pair
20,088,752 UART: [art] Store priv key in slot 0x5
22,551,499 UART: [art] Derive Key Pair - Done
22,564,277 UART: [art] Signing Cert with AUTHO
22,565,605 UART: RITY.KEYID = 7
24,277,286 UART: [art] Erasing AUTHORITY.KEYID = 7
24,278,797 UART: [art] PUB.X = 7322B4722AA8141E67DF717712DFD2C5EA5D447F5470B1D48DC29B035FC55723BCF927B4CF55050DB1A0C352F8BFFEDD
24,286,105 UART: [art] PUB.Y = 7BFDB24D425E31E0199FFB0E25283E12FD53A3901B7FD6E4AC951A1C61DAC33FC1AB02262CE26727B872D5725B6AB439
24,293,315 UART: [art] SIG.R = 973D678FA80ED5CECED97E130D466FB30E67C538896F3DCBFDCF328E820E77301F4313463D1A7F50E74AD6E6FEDF456F
24,300,781 UART: [art] SIG.S = B953B4AE842542A147C351FEF354126ADD4FF9BC1D9BBE09BDC90B8D9333D2BF085CA7B673CA1EBC0473391533E0EC54
25,279,209 UART: mock_rt_interact::rt_entry...FMC Tester
25,396,306 UART: [rt] Runtime listening for mailbox commands...
25,400,588 >>> mbox cmd response data (2048 bytes)
25,410,473 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,412,187 >>> mbox cmd response data (336 bytes)
25,416,070 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,431,889 >>> mbox cmd response data (1536 bytes)
27,491,844 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
34,415,399 >>> mbox cmd response: success
34,450,615 UART:
34,450,944 UART: Running Caliptra FMC ...
34,452,017 UART:
34,452,177 UART: [state] CFI Enabled
34,544,886 UART: [art] Extend RT PCRs Done
34,546,150 UART: [art] Lock RT PCRs Done
34,547,536 UART: [art] Populate DV Done
34,553,096 UART: [fht] FMC Alias Private Key: 7
34,554,699 UART: [art] Derive CDI
34,555,459 UART: [art] Store in in slot 0x4
34,614,143 UART: [art] Derive Key Pair
34,615,177 UART: [art] Store priv key in slot 0x5
37,078,127 UART: [art] Derive Key Pair - Done
37,091,143 UART: [art] Signing Cert with AUTHO
37,092,479 UART: RITY.KEYID = 7
38,804,165 UART: [art] Erasing AUTHORITY.KEYID = 7
38,805,670 UART: [art] PUB.X = F35814AED0320374AD5BC4F3331B86849CC5D0B9E8D7AF5BB76477978CFAFCDF65F5F604BB1C4FFF7CB343C612D08368
38,812,996 UART: [art] PUB.Y = C03A6DB88713A51847049CA7F4FE770A9C79770BB6A8EBEC7AF0CD48C3DC9E5B82857040D242DC04B2D1639C3EAF1B4E
38,820,271 UART: [art] SIG.R = 55B3C13BFE5B696080D7C6BDAE04EF31B874E6D524A6FEF736142F18F5DEA1E493B27C7E5B0DD514B5DF7FCAAE81C500
38,827,644 UART: [art] SIG.S = CDBF38ED11AF06E35D44F315163B5809AA8742E853597FFA8B938E61519468029A9D223D8772BC46BA8A528876168CEB
39,805,810 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,807,140 UART: mock_rt_interact::rt_entry...FMC Tester
40,096,586 UART: [rt] Runtime listening for mailbox commands...
40,099,516 >>> mbox cmd response data (336 bytes)
40,103,266 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,119,064 >>> mbox cmd response data (1536 bytes)
40,126,828 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,127,278 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,391 UART:
192,758 UART: Running Caliptra ROM ...
193,875 UART:
603,695 UART: [state] CFI Enabled
617,647 UART: [state] LifecycleState = Unprovisioned
619,951 UART: [state] DebugLocked = No
622,328 UART: [state] WD Timer not started. Device not locked for debugging
627,484 UART: [kat] SHA2-256
817,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,160 UART: [kat] ++
828,761 UART: [kat] sha1
840,793 UART: [kat] SHA2-256
843,767 UART: [kat] SHA2-384
850,897 UART: [kat] SHA2-512-ACC
853,486 UART: [kat] ECC-384
3,295,528 UART: [kat] HMAC-384Kdf
3,308,609 UART: [kat] LMS
3,840,432 UART: [kat] --
3,845,296 UART: [cold-reset] ++
3,847,438 UART: [fht] FHT @ 0x50003400
3,859,212 UART: [idev] ++
3,859,915 UART: [idev] CDI.KEYID = 6
3,860,859 UART: [idev] SUBJECT.KEYID = 7
3,862,095 UART: [idev] UDS.KEYID = 0
3,862,993 ready_for_fw is high
3,863,183 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,958,082 UART: [idev] Erasing UDS.KEYID = 0
6,340,246 UART: [idev] Sha1 KeyId Algorithm
6,361,846 UART: [idev] --
6,365,753 UART: [ldev] ++
6,366,429 UART: [ldev] CDI.KEYID = 6
6,367,384 UART: [ldev] SUBJECT.KEYID = 5
6,368,537 UART: [ldev] AUTHORITY.KEYID = 7
6,369,762 UART: [ldev] FE.KEYID = 1
6,381,797 UART: [ldev] Erasing FE.KEYID = 1
8,859,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,925 UART: [ldev] --
10,652,837 UART: [fwproc] Wait for Commands...
10,655,140 UART: [fwproc] Recv command 0x46574c44
10,657,446 UART: [fwproc] Recv'd Img size: 75384 bytes
13,621,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,696,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,813,019 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
14,121,882 >>> mbox cmd response: success
14,122,307 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,125,507 UART: [afmc] ++
14,126,250 UART: [afmc] CDI.KEYID = 6
14,127,345 UART: [afmc] SUBJECT.KEYID = 7
14,128,894 UART: [afmc] AUTHORITY.KEYID = 5
16,633,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,355,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,357,264 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,372,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,387,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,402,609 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,426,062 UART: [afmc] --
18,429,492 UART: [cold-reset] --
18,433,462 UART: [state] Locking Datavault
18,438,313 UART: [state] Locking PCR0, PCR1 and PCR31
18,440,504 UART: [state] Locking ICCM
18,442,759 UART: [exit] Launching FMC @ 0x40000130
18,451,430 UART:
18,451,673 UART: Running Caliptra FMC ...
18,452,693 UART:
18,452,855 UART: [state] CFI Enabled
18,460,870 UART: [fht] FMC Alias Private Key: 7
20,218,091 UART: [art] Extend RT PCRs Done
20,219,325 UART: [art] Lock RT PCRs Done
20,220,916 UART: [art] Populate DV Done
20,226,273 UART: [fht] FMC Alias Private Key: 7
20,227,861 UART: [art] Derive CDI
20,228,675 UART: [art] Store in in slot 0x4
20,271,378 UART: [art] Derive Key Pair
20,272,585 UART: [art] Store priv key in slot 0x5
22,699,227 UART: [art] Derive Key Pair - Done
22,712,315 UART: [art] Signing Cert with AUTHO
22,713,611 UART: RITY.KEYID = 7
24,418,756 UART: [art] Erasing AUTHORITY.KEYID = 7
24,420,257 UART: [art] PUB.X = 11D9B4B10303D59455C5023314090AB8EFA2ACEF35AF962E6F0BC4511B2708A9ECDFB8EE7186187CDCF43014CD126E2A
24,427,540 UART: [art] PUB.Y = 8F952713859A34EC98EDD450B0DD52FD36FE7968A0AFE1E6AB20FEF6A3AD64F34E5368014F9676C58F5902D89002D784
24,434,805 UART: [art] SIG.R = C2751DD6824B126D34502537AC45DDA17E7B95061CFC9EDF87664CBCA812C1D155AC44F3850E71253868A43885AE8779
24,442,183 UART: [art] SIG.S = 3846E948639C2035459F37682E10DB469B7E9C2FCB747762540C3AD73FB88BEAEA97228025F24FE102CFAC5D9B7C54A3
25,420,436 UART: mock_rt_interact::rt_entry...FMC Tester
25,538,634 UART: [rt] Runtime listening for mailbox commands...
25,542,858 >>> mbox cmd response data (2048 bytes)
25,552,747 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,554,435 >>> mbox cmd response data (336 bytes)
25,558,258 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,574,071 >>> mbox cmd response data (1536 bytes)
27,636,422 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
27,732,172 UART:
27,732,761 UART: Running Caliptra ROM ...
27,734,057 UART:
27,734,236 UART: [state] CFI Enabled
27,747,766 UART: [state] LifecycleState = Unprovisioned
27,749,663 UART: [state] DebugLocked = No
27,752,013 UART: [state] WD Timer not started. Device not locked for debugging
27,755,753 UART: [kat] SHA2-256
27,945,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,956,403 UART: [kat] ++
27,957,001 UART: [kat] sha1
27,968,868 UART: [kat] SHA2-256
27,971,888 UART: [kat] SHA2-384
27,978,469 UART: [kat] SHA2-512-ACC
27,981,080 UART: [kat] ECC-384
30,422,842 UART: [kat] HMAC-384Kdf
30,436,852 UART: [kat] LMS
30,968,430 UART: [kat] --
30,972,151 UART: [update-reset] ++
33,957,986 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,960,969 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
34,334,846 >>> mbox cmd response: success
34,336,328 UART: [update-reset] Copying MAN_2 To MAN_1
34,373,896 UART: [update-reset Success] --
34,380,051 UART: [state] Locking Datavault
34,383,473 UART: [state] Locking PCR0, PCR1 and PCR31
34,385,616 UART: [state] Locking ICCM
34,387,066 UART: [exit] Launching FMC @ 0x40000130
34,395,728 UART:
34,395,962 UART: Running Caliptra FMC ...
34,397,061 UART:
34,397,214 UART: [state] CFI Enabled
34,441,494 UART: [art] Extend RT PCRs Done
34,442,672 UART: [art] Lock RT PCRs Done
34,444,088 UART: [art] Populate DV Done
34,449,501 UART: [fht] FMC Alias Private Key: 7
34,451,095 UART: [art] Derive CDI
34,451,913 UART: [art] Store in in slot 0x4
34,494,339 UART: [art] Derive Key Pair
34,495,335 UART: [art] Store priv key in slot 0x5
36,922,462 UART: [art] Derive Key Pair - Done
36,935,344 UART: [art] Signing Cert with AUTHO
36,936,650 UART: RITY.KEYID = 7
38,642,187 UART: [art] Erasing AUTHORITY.KEYID = 7
38,643,692 UART: [art] PUB.X = F1B822C5726602A873077F159EDFE6D441CA1B16FBCFFB7C05E48CD736CAB90E4C995E434740ACB5A4DAF4613B6C43E7
38,650,942 UART: [art] PUB.Y = DB70E1D2508EE3424C9329983F2F8E46BD9049F58AB3943F742ED07B03FE288979308F226F0378B161EB9CC2EB8833DA
38,658,232 UART: [art] SIG.R = 7DA4E71A958D67A0F11F5A13407D9182A5B59120968B72E6EAB86747610B3E7014DA7E5100654EA88D64A2D890B6B35A
38,665,577 UART: [art] SIG.S = 73CF52366BEA1E8C64B652C3937774A3EC93FEDC86685EC07815C5AE8265D767EDBCF1DC5E4EA3AFA5DBDBB697A12744
39,642,676 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,643,953 UART: mock_rt_interact::rt_entry...FMC Tester
39,933,185 UART: [rt] Runtime listening for mailbox commands...
39,936,114 >>> mbox cmd response data (336 bytes)
39,939,735 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,955,499 >>> mbox cmd response data (1536 bytes)
39,962,849 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,963,248 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,755,534 ready_for_fw is high
3,755,951 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
14,125,362 >>> mbox cmd response: success
14,126,149 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,379,645 UART:
18,380,023 UART: Running Caliptra FMC ...
18,381,248 UART:
18,381,399 UART: [state] CFI Enabled
18,389,224 UART: [fht] FMC Alias Private Key: 7
20,146,924 UART: [art] Extend RT PCRs Done
20,148,148 UART: [art] Lock RT PCRs Done
20,149,766 UART: [art] Populate DV Done
20,155,445 UART: [fht] FMC Alias Private Key: 7
20,157,193 UART: [art] Derive CDI
20,157,921 UART: [art] Store in in slot 0x4
20,200,625 UART: [art] Derive Key Pair
20,201,664 UART: [art] Store priv key in slot 0x5
22,629,166 UART: [art] Derive Key Pair - Done
22,642,157 UART: [art] Signing Cert with AUTHO
22,643,461 UART: RITY.KEYID = 7
24,348,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,350,255 UART: [art] PUB.X = D3AA393BE4A1FB3086B90291544C048AA9C7F9367272ED029172CF8357EE20E2669C0E721EF9B86F72E3C7EE38AE1836
24,357,511 UART: [art] PUB.Y = 3F92CED89D7641D4F2A97FE0F9194D9A01A4C58239466F6D8D7F1E5C8C9A93B4E0FA57EAE8EFEF83AC72148DAB09AC9D
24,364,822 UART: [art] SIG.R = 4F374621085A70EE65628D0B1C360B03331A757BD946F80210564627842F082373ED911AADE6F6BE8FBEDD6335D81C7F
24,372,162 UART: [art] SIG.S = E418892F3BC15D782D84A1972C6FFD9E5E8EDB7C5A7E1D2DAACA6A59CDFC21C9ADB607E4BC615D6E661A8A2299EE36AB
25,351,332 UART: mock_rt_interact::rt_entry...FMC Tester
25,468,434 UART: [rt] Runtime listening for mailbox commands...
25,472,712 >>> mbox cmd response data (2048 bytes)
25,482,412 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,484,073 >>> mbox cmd response data (336 bytes)
25,487,934 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,503,736 >>> mbox cmd response data (1536 bytes)
27,561,702 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
34,408,821 >>> mbox cmd response: success
34,443,587 UART:
34,443,883 UART: Running Caliptra FMC ...
34,444,921 UART:
34,445,069 UART: [state] CFI Enabled
34,489,163 UART: [art] Extend RT PCRs Done
34,490,358 UART: [art] Lock RT PCRs Done
34,491,707 UART: [art] Populate DV Done
34,497,186 UART: [fht] FMC Alias Private Key: 7
34,498,884 UART: [art] Derive CDI
34,499,614 UART: [art] Store in in slot 0x4
34,542,314 UART: [art] Derive Key Pair
34,543,314 UART: [art] Store priv key in slot 0x5
36,969,894 UART: [art] Derive Key Pair - Done
36,982,943 UART: [art] Signing Cert with AUTHO
36,984,271 UART: RITY.KEYID = 7
38,689,539 UART: [art] Erasing AUTHORITY.KEYID = 7
38,691,033 UART: [art] PUB.X = B23EB2860804E289C201F9CD2F8629410627631E5A1A69449309289F97A8C7F4992E7C98C8687CEBD241F0D326C60E55
38,698,329 UART: [art] PUB.Y = 974C005AF46E4DE35525CD1912E182C19C74360B37928D8249D10B1E5B391F8867ADD013B2ABA50FE30DB1A160E140CD
38,705,586 UART: [art] SIG.R = 9566AD66911B3C3E1D143CA7BD8AB62FB4893000A3F4C18852D35CA6878FBB4E0BA4612B1F0FC90E146023B66387FE52
38,712,953 UART: [art] SIG.S = BF9A09285281FD19C9CA38B7D83B2252ADD94403564EA38495ED7CA2A86F248C6B1385A7CE2E49A8C9BF3C33AB848847
39,690,289 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,691,325 UART: mock_rt_interact::rt_entry...FMC Tester
39,982,110 UART: [rt] Runtime listening for mailbox commands...
39,985,067 >>> mbox cmd response data (336 bytes)
39,989,173 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,004,978 >>> mbox cmd response data (1536 bytes)
40,013,035 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,013,490 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,248 UART: [kat] LMS
1,475,444 UART: [kat] --
1,476,361 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,548 UART: [idev] ++
1,479,716 UART: [idev] CDI.KEYID = 6
1,480,076 UART: [idev] SUBJECT.KEYID = 7
1,480,500 UART: [idev] UDS.KEYID = 0
1,480,845 ready_for_fw is high
1,480,845 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,674 UART: [idev] Erasing UDS.KEYID = 0
1,505,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,626 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,521,089 UART: [ldev] Erasing FE.KEYID = 1
1,546,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,344 UART: [ldev] --
1,585,641 UART: [fwproc] Waiting for Commands...
1,586,278 UART: [fwproc] Received command 0x46574c44
1,587,069 UART: [fwproc] Received Image of size 75384 bytes
2,439,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,466,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,495,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,573,024 >>> mbox cmd response: success
2,573,024 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,574,216 UART: [afmc] ++
2,574,384 UART: [afmc] CDI.KEYID = 6
2,574,746 UART: [afmc] SUBJECT.KEYID = 7
2,575,171 UART: [afmc] AUTHORITY.KEYID = 5
2,610,304 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,626,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,627,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,632,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,638,757 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,644,447 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,652,344 UART: [afmc] --
2,653,470 UART: [cold-reset] --
2,654,404 UART: [state] Locking Datavault
2,655,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,656,227 UART: [state] Locking ICCM
2,656,689 UART: [exit] Launching FMC @ 0x40000130
2,662,018 UART:
2,662,034 UART: Running Caliptra FMC ...
2,662,442 UART:
2,662,496 UART: [state] CFI Enabled
2,672,993 UART: [fht] FMC Alias Private Key: 7
2,780,886 UART: [art] Extend RT PCRs Done
2,781,314 UART: [art] Lock RT PCRs Done
2,783,160 UART: [art] Populate DV Done
2,791,421 UART: [fht] FMC Alias Private Key: 7
2,792,525 UART: [art] Derive CDI
2,792,805 UART: [art] Store in in slot 0x4
2,878,964 UART: [art] Derive Key Pair
2,879,324 UART: [art] Store priv key in slot 0x5
2,891,680 UART: [art] Derive Key Pair - Done
2,906,492 UART: [art] Signing Cert with AUTHO
2,906,972 UART: RITY.KEYID = 7
2,922,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,923,179 UART: [art] PUB.X = A294098771FC9B7009816405F681435428C542860E734E1AC8E8F07CECEE23EEBCDEA97E825FDB9300A69D0F22A2DE4A
2,929,920 UART: [art] PUB.Y = 91563AC4D476965461EAFF3F2D30DB46A18378143D9D6D8268A0AFA5959927A043E9BC2CACB08BFDE65DC53BDA6BD482
2,936,884 UART: [art] SIG.R = A9246AC41BB299F4DDA077A75516920643EEFCCB2FA9D860704299E589AF84CCF87AAE9D8A0586B76B3C52DA72BD8E55
2,943,662 UART: [art] SIG.S = 28640B1C2BCD37083ED43AF126F88CE01B11BB611C6937752DC6E167FE011AD4725C7640BC03E166E3DA47A663173468
2,967,061 UART: mock_rt_interact::rt_entry...FMC Tester
3,073,885 UART: [rt] Runtime listening for mailbox commands...
3,077,275 >>> mbox cmd response data (2048 bytes)
3,077,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,078,508 >>> mbox cmd response data (336 bytes)
3,078,509 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,091,100 >>> mbox cmd response data (1536 bytes)
3,091,101 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,091,207 UART:
3,091,223 UART: Running Caliptra ROM ...
3,091,631 UART:
3,091,685 UART: [state] CFI Enabled
3,094,687 UART: [state] LifecycleState = Unprovisioned
3,095,342 UART: [state] DebugLocked = No
3,095,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,097,429 UART: [kat] SHA2-256
3,891,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,895,475 UART: [kat] ++
3,895,627 UART: [kat] sha1
3,899,695 UART: [kat] SHA2-256
3,901,633 UART: [kat] SHA2-384
3,904,366 UART: [kat] SHA2-512-ACC
3,906,266 UART: [kat] ECC-384
3,911,835 UART: [kat] HMAC-384Kdf
3,916,495 UART: [kat] LMS
4,484,691 UART: [kat] --
4,485,810 UART: [update-reset] ++
5,375,920 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,377,130 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,468,584 >>> mbox cmd response: success
5,468,915 UART: [update-reset] Copying MAN_2 To MAN_1
5,476,929 UART: [update-reset Success] --
5,477,718 UART: [state] Locking Datavault
5,478,514 UART: [state] Locking PCR0, PCR1 and PCR31
5,479,118 UART: [state] Locking ICCM
5,479,542 UART: [exit] Launching FMC @ 0x40000130
5,484,871 UART:
5,484,887 UART: Running Caliptra FMC ...
5,485,295 UART:
5,485,349 UART: [state] CFI Enabled
5,574,938 UART: [art] Extend RT PCRs Done
5,575,366 UART: [art] Lock RT PCRs Done
5,576,579 UART: [art] Populate DV Done
5,584,782 UART: [fht] FMC Alias Private Key: 7
5,585,856 UART: [art] Derive CDI
5,586,136 UART: [art] Store in in slot 0x4
5,671,983 UART: [art] Derive Key Pair
5,672,343 UART: [art] Store priv key in slot 0x5
5,686,097 UART: [art] Derive Key Pair - Done
5,700,719 UART: [art] Signing Cert with AUTHO
5,701,199 UART: RITY.KEYID = 7
5,716,171 UART: [art] Erasing AUTHORITY.KEYID = 7
5,716,936 UART: [art] PUB.X = AA4EA5E41EEAC64D7150EB8A60467202F9CD29E056C97A0291A25B9BD8F7EFF92F55A6628E6FA68878044A3530AFFC5C
5,723,711 UART: [art] PUB.Y = CF3A79D3C8B7E101C936B098FACE117181BC66B3DADFB16CEECF56AE2F1445F8D8210C5CC4F5363C5EB7376872369CD9
5,730,673 UART: [art] SIG.R = 69D46B0C9440848DA31476682E5E89E1001C38B0F8531056A53183D29140816F3D95EFA6807E44F6E3BA854B4A3C6E48
5,737,410 UART: [art] SIG.S = 99E7B4EA847E87B34B3352E77E3AB02A41C52B7EFD9B0D38DC19671F5A703CC5B51E2F6C251ACA85BD4F28FCD02C822A
5,760,503 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,761,514 UART: mock_rt_interact::rt_entry...FMC Tester
6,043,230 UART: [rt] Runtime listening for mailbox commands...
6,045,265 >>> mbox cmd response data (336 bytes)
6,045,266 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,057,857 >>> mbox cmd response data (1536 bytes)
6,057,858 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,057,875 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,193 ready_for_fw is high
1,362,193 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,422,712 >>> mbox cmd response: success
2,422,712 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,483,472 UART:
2,483,488 UART: Running Caliptra FMC ...
2,483,896 UART:
2,483,950 UART: [state] CFI Enabled
2,494,593 UART: [fht] FMC Alias Private Key: 7
2,602,150 UART: [art] Extend RT PCRs Done
2,602,578 UART: [art] Lock RT PCRs Done
2,603,892 UART: [art] Populate DV Done
2,612,211 UART: [fht] FMC Alias Private Key: 7
2,613,245 UART: [art] Derive CDI
2,613,525 UART: [art] Store in in slot 0x4
2,699,330 UART: [art] Derive Key Pair
2,699,690 UART: [art] Store priv key in slot 0x5
2,713,216 UART: [art] Derive Key Pair - Done
2,727,893 UART: [art] Signing Cert with AUTHO
2,728,373 UART: RITY.KEYID = 7
2,743,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,744,140 UART: [art] PUB.X = 0227941F4927D1C709ECF523CA7E51CD5A07D4135B20A324B932E286905980492D216C9C927B3AF0C3B0785868D82E69
2,750,893 UART: [art] PUB.Y = 4F647A283FFDB4A50C2E1426535D77B7E9DFA19FF075EC564167284BD6E3AC2785A98F23638102F67F6C97420C2BEC3E
2,757,840 UART: [art] SIG.R = 458F8E3AB06FC8C3B5F6C27449A9292CD8EBF29ECCA52DBE83546620A1F06AB864534F4F03EC120E160B9B554DB473DE
2,764,615 UART: [art] SIG.S = 37775A9FFDECE342434CAF137ED46358EF08AE464851A112CFDBC96B353AB179E63BE3E521AA58055E72692F4BFD570D
2,788,025 UART: mock_rt_interact::rt_entry...FMC Tester
2,895,560 UART: [rt] Runtime listening for mailbox commands...
2,898,950 >>> mbox cmd response data (2048 bytes)
2,898,951 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,900,183 >>> mbox cmd response data (336 bytes)
2,900,184 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,912,775 >>> mbox cmd response data (1536 bytes)
2,912,776 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,168,881 >>> mbox cmd response: success
5,182,074 UART:
5,182,090 UART: Running Caliptra FMC ...
5,182,498 UART:
5,182,552 UART: [state] CFI Enabled
5,271,853 UART: [art] Extend RT PCRs Done
5,272,281 UART: [art] Lock RT PCRs Done
5,273,384 UART: [art] Populate DV Done
5,281,591 UART: [fht] FMC Alias Private Key: 7
5,282,577 UART: [art] Derive CDI
5,282,857 UART: [art] Store in in slot 0x4
5,368,338 UART: [art] Derive Key Pair
5,368,698 UART: [art] Store priv key in slot 0x5
5,382,222 UART: [art] Derive Key Pair - Done
5,396,870 UART: [art] Signing Cert with AUTHO
5,397,350 UART: RITY.KEYID = 7
5,412,612 UART: [art] Erasing AUTHORITY.KEYID = 7
5,413,377 UART: [art] PUB.X = 4EEB14DC4564F24EC742D1A20E3BF26B97CA392F0D9B9C632A6761227592EFBA0B41DED5B9C1CE19574369DB66BB36F0
5,420,152 UART: [art] PUB.Y = 6EB251F1F9358DD1889CF66F262641614E9C8A697B9E3712FD2117C34FF953FE507D27FF57420F273945B04AD8FB38B3
5,427,099 UART: [art] SIG.R = 42040ECEB0AAFB3330229892799B383FBA83493DBA1A9DA06851D4A3A207F1E44772A067E43F63ABC4A2EF0574A0AE62
5,433,865 UART: [art] SIG.S = 8A971219FC94EFEA99453904A0F9316FF34A0E36FF662298872CFBE29A404CC6973CF882655945839AE1171A07A176C5
5,456,696 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,457,775 UART: mock_rt_interact::rt_entry...FMC Tester
5,741,349 UART: [rt] Runtime listening for mailbox commands...
5,743,384 >>> mbox cmd response data (336 bytes)
5,743,385 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,755,976 >>> mbox cmd response data (1536 bytes)
5,755,977 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,755,994 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,355 UART: [kat] SHA2-512-ACC
897,256 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,662 UART: [cold-reset] ++
1,477,134 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 ready_for_fw is high
1,481,134 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,505,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,955 UART: [idev] --
1,514,862 UART: [ldev] ++
1,515,030 UART: [ldev] CDI.KEYID = 6
1,515,393 UART: [ldev] SUBJECT.KEYID = 5
1,515,819 UART: [ldev] AUTHORITY.KEYID = 7
1,516,282 UART: [ldev] FE.KEYID = 1
1,521,654 UART: [ldev] Erasing FE.KEYID = 1
1,547,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,637 UART: [ldev] --
1,587,106 UART: [fwproc] Waiting for Commands...
1,587,739 UART: [fwproc] Received command 0x46574c44
1,588,530 UART: [fwproc] Received Image of size 75384 bytes
2,439,990 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,467,846 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,497,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 50700
2,574,749 >>> mbox cmd response: success
2,574,749 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,575,837 UART: [afmc] ++
2,576,005 UART: [afmc] CDI.KEYID = 6
2,576,367 UART: [afmc] SUBJECT.KEYID = 7
2,576,792 UART: [afmc] AUTHORITY.KEYID = 5
2,611,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,628,139 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,628,919 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,634,647 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,640,532 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,646,222 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,654,263 UART: [afmc] --
2,655,233 UART: [cold-reset] --
2,655,981 UART: [state] Locking Datavault
2,657,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,657,908 UART: [state] Locking ICCM
2,658,496 UART: [exit] Launching FMC @ 0x40000130
2,663,825 UART:
2,663,841 UART: Running Caliptra FMC ...
2,664,249 UART:
2,664,392 UART: [state] CFI Enabled
2,674,963 UART: [fht] FMC Alias Private Key: 7
2,782,392 UART: [art] Extend RT PCRs Done
2,782,820 UART: [art] Lock RT PCRs Done
2,784,288 UART: [art] Populate DV Done
2,792,443 UART: [fht] FMC Alias Private Key: 7
2,793,537 UART: [art] Derive CDI
2,793,817 UART: [art] Store in in slot 0x4
2,879,452 UART: [art] Derive Key Pair
2,879,812 UART: [art] Store priv key in slot 0x5
2,893,088 UART: [art] Derive Key Pair - Done
2,907,878 UART: [art] Signing Cert with AUTHO
2,908,358 UART: RITY.KEYID = 7
2,923,758 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,523 UART: [art] PUB.X = C4B00B9A12BC1AE59B7122457BFAEAD684CE018A01652A04A0BB69D5D69C0C3210DD003D8435E1BA55ADF578B46F8B86
2,931,270 UART: [art] PUB.Y = 7A3D3B36E9E58845E1E2D597FE2ED4F399C46CD3A11AB30E22911A6B461F5F178B3F2B6E02BFE39AFB7FA7932912D489
2,938,226 UART: [art] SIG.R = 8341A9978EE7611691DFA6FCD0C763415AD02EF52AA5E8972A94DAA2328A3E928A9FB27700E45890939F487201E5C845
2,944,969 UART: [art] SIG.S = F41984FE688FC23DE7EF4A8506587B41E4876EE699BC4BFF80D0641340C35CA46FC18B9F287AADE72780F7E50080E0C5
2,968,993 UART: mock_rt_interact::rt_entry...FMC Tester
3,077,078 UART: [rt] Runtime listening for mailbox commands...
3,080,468 >>> mbox cmd response data (2048 bytes)
3,080,469 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,081,701 >>> mbox cmd response data (336 bytes)
3,081,702 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,094,293 >>> mbox cmd response data (1536 bytes)
3,094,294 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
3,094,400 UART:
3,094,416 UART: Running Caliptra ROM ...
3,094,824 UART:
3,094,965 UART: [state] CFI Enabled
3,097,771 UART: [state] LifecycleState = Unprovisioned
3,098,426 UART: [state] DebugLocked = No
3,099,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,100,739 UART: [kat] SHA2-256
3,894,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,898,785 UART: [kat] ++
3,898,937 UART: [kat] sha1
3,903,331 UART: [kat] SHA2-256
3,905,269 UART: [kat] SHA2-384
3,907,968 UART: [kat] SHA2-512-ACC
3,909,868 UART: [kat] ECC-384
3,915,749 UART: [kat] HMAC-384Kdf
3,920,485 UART: [kat] LMS
4,488,681 UART: [kat] --
4,489,678 UART: [update-reset] ++
5,378,366 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,379,438 UART: [update-reset] Loading Runtime at address 0x40005000 len 50700
5,470,892 >>> mbox cmd response: success
5,471,065 UART: [update-reset] Copying MAN_2 To MAN_1
5,479,079 UART: [update-reset Success] --
5,480,130 UART: [state] Locking Datavault
5,480,988 UART: [state] Locking PCR0, PCR1 and PCR31
5,481,592 UART: [state] Locking ICCM
5,482,064 UART: [exit] Launching FMC @ 0x40000130
5,487,393 UART:
5,487,409 UART: Running Caliptra FMC ...
5,487,817 UART:
5,487,960 UART: [state] CFI Enabled
5,576,843 UART: [art] Extend RT PCRs Done
5,577,271 UART: [art] Lock RT PCRs Done
5,578,452 UART: [art] Populate DV Done
5,586,599 UART: [fht] FMC Alias Private Key: 7
5,587,581 UART: [art] Derive CDI
5,587,861 UART: [art] Store in in slot 0x4
5,673,038 UART: [art] Derive Key Pair
5,673,398 UART: [art] Store priv key in slot 0x5
5,687,052 UART: [art] Derive Key Pair - Done
5,701,964 UART: [art] Signing Cert with AUTHO
5,702,444 UART: RITY.KEYID = 7
5,717,866 UART: [art] Erasing AUTHORITY.KEYID = 7
5,718,631 UART: [art] PUB.X = 81D38F9E9B97D7595F7161A077765B368EA137FD212A1C40D23C2A9791C5F89176DC785AC17E83A4E2CFFC104E9AC157
5,725,405 UART: [art] PUB.Y = 540C4654D0FFEE7FB6ACF7416704A1863E9BC68AF5B2218E072CFD4DCB58CEA58B222BA07391E19E2A1B0CBC3E01AF68
5,732,360 UART: [art] SIG.R = CA0795320E7F0641CB1E0063377BC0BF40A9060FAA3728D87E06D491A38D22D0F901CDEB88C938DAD8518C892D71EF00
5,739,071 UART: [art] SIG.S = 53C36707CFF84DF6ACB3F178BCFA7CDD6F8EF89477F3A33EDD011767974F85D973253054A08B8FB832F1B634FF1BD1A5
5,762,149 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,763,328 UART: mock_rt_interact::rt_entry...FMC Tester
6,050,412 UART: [rt] Runtime listening for mailbox commands...
6,052,447 >>> mbox cmd response data (336 bytes)
6,052,448 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,065,039 >>> mbox cmd response data (1536 bytes)
6,065,040 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,065,057 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,416 ready_for_fw is high
1,362,416 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,422,527 >>> mbox cmd response: success
2,422,527 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,483,963 UART:
2,483,979 UART: Running Caliptra FMC ...
2,484,387 UART:
2,484,530 UART: [state] CFI Enabled
2,495,559 UART: [fht] FMC Alias Private Key: 7
2,603,506 UART: [art] Extend RT PCRs Done
2,603,934 UART: [art] Lock RT PCRs Done
2,605,744 UART: [art] Populate DV Done
2,613,995 UART: [fht] FMC Alias Private Key: 7
2,615,115 UART: [art] Derive CDI
2,615,395 UART: [art] Store in in slot 0x4
2,701,080 UART: [art] Derive Key Pair
2,701,440 UART: [art] Store priv key in slot 0x5
2,714,400 UART: [art] Derive Key Pair - Done
2,729,284 UART: [art] Signing Cert with AUTHO
2,729,764 UART: RITY.KEYID = 7
2,745,322 UART: [art] Erasing AUTHORITY.KEYID = 7
2,746,087 UART: [art] PUB.X = 2EF9E9A7B65417734055D7611BA225B535C402586733F7749C402392EDD16CD3C443380516C7FD9F9737034DD33077F4
2,752,836 UART: [art] PUB.Y = 624902597928DD6F6CA8E64942B16A023C03A9A35A1AADDAD20E687E5A2C2E9DD17632D1411464F56017513D885A9ACE
2,759,776 UART: [art] SIG.R = 21CF17B4A803AF601CD706AA3561C103F24EC4CE2A02CEA36930923E6C80994C5C5FFA7601FF1AF94677D300B197F53A
2,766,517 UART: [art] SIG.S = 3173FA77FCDC45DF9C12B4C0FBA4F6E67FDD786A513D04F2519B6D065712F1F6BC9B712012947E201711DE430B55E1A5
2,790,261 UART: mock_rt_interact::rt_entry...FMC Tester
2,897,720 UART: [rt] Runtime listening for mailbox commands...
2,901,110 >>> mbox cmd response data (2048 bytes)
2,901,111 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,902,343 >>> mbox cmd response data (336 bytes)
2,902,344 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,914,935 >>> mbox cmd response data (1536 bytes)
2,914,936 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
5,172,324 >>> mbox cmd response: success
5,185,957 UART:
5,185,973 UART: Running Caliptra FMC ...
5,186,381 UART:
5,186,524 UART: [state] CFI Enabled
5,276,165 UART: [art] Extend RT PCRs Done
5,276,593 UART: [art] Lock RT PCRs Done
5,277,766 UART: [art] Populate DV Done
5,285,935 UART: [fht] FMC Alias Private Key: 7
5,287,051 UART: [art] Derive CDI
5,287,331 UART: [art] Store in in slot 0x4
5,372,882 UART: [art] Derive Key Pair
5,373,242 UART: [art] Store priv key in slot 0x5
5,387,178 UART: [art] Derive Key Pair - Done
5,402,042 UART: [art] Signing Cert with AUTHO
5,402,522 UART: RITY.KEYID = 7
5,417,992 UART: [art] Erasing AUTHORITY.KEYID = 7
5,418,757 UART: [art] PUB.X = 2A62C1E5E56BBB9D2977FF1125DA28357877FDCA806E8A3773DF74D49707D8FAA65F4D81C42E070144FC50085C8BD9BE
5,425,525 UART: [art] PUB.Y = CE3E107D9F6B69DDFDACF589BBFBA30CDDC04EDF7EAA4878832C9704B5D8E23DBD1670EE53F39708A21AC736CFC2C24C
5,432,496 UART: [art] SIG.R = E1AA792CFDEB41B5E627DD338A39E5A1C13DA5B919E0BAF1AA5493763D657C69D14691DDA6C1676BDB7A59C904C5CC62
5,439,281 UART: [art] SIG.S = 878F73F0186C2E1088C23C14506184B96A45C9714EA4C8874BCEFFDC966E278969BD481E9163D1814254DB642A495BC0
5,461,651 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,462,726 UART: mock_rt_interact::rt_entry...FMC Tester
5,744,279 UART: [rt] Runtime listening for mailbox commands...
5,746,314 >>> mbox cmd response data (336 bytes)
5,746,315 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,758,906 >>> mbox cmd response data (1536 bytes)
5,758,907 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,758,924 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
893,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,365 UART: [kat] ++
897,517 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
918,318 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,172,349 UART: [cold-reset] ++
1,172,869 UART: [fht] FHT @ 0x50003400
1,175,604 UART: [idev] ++
1,175,772 UART: [idev] CDI.KEYID = 6
1,176,132 UART: [idev] SUBJECT.KEYID = 7
1,176,556 UART: [idev] UDS.KEYID = 0
1,176,901 ready_for_fw is high
1,176,901 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,208 UART: [idev] Erasing UDS.KEYID = 0
1,200,959 UART: [idev] Sha1 KeyId Algorithm
1,209,481 UART: [idev] --
1,210,655 UART: [ldev] ++
1,210,823 UART: [ldev] CDI.KEYID = 6
1,211,186 UART: [ldev] SUBJECT.KEYID = 5
1,211,612 UART: [ldev] AUTHORITY.KEYID = 7
1,212,075 UART: [ldev] FE.KEYID = 1
1,217,393 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,651 UART: [ldev] --
1,283,100 UART: [fwproc] Wait for Commands...
1,283,834 UART: [fwproc] Recv command 0x46574c44
1,284,562 UART: [fwproc] Recv'd Img size: 75384 bytes
2,136,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,164,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,193,670 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,271,009 >>> mbox cmd response: success
2,271,009 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,272,081 UART: [afmc] ++
2,272,249 UART: [afmc] CDI.KEYID = 6
2,272,611 UART: [afmc] SUBJECT.KEYID = 7
2,273,036 UART: [afmc] AUTHORITY.KEYID = 5
2,309,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,325,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,326,200 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,331,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,337,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,343,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,351,334 UART: [afmc] --
2,352,250 UART: [cold-reset] --
2,352,988 UART: [state] Locking Datavault
2,354,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,741 UART: [state] Locking ICCM
2,355,233 UART: [exit] Launching FMC @ 0x40000130
2,360,562 UART:
2,360,578 UART: Running Caliptra FMC ...
2,360,986 UART:
2,361,040 UART: [state] CFI Enabled
2,371,361 UART: [fht] FMC Alias Private Key: 7
2,478,664 UART: [art] Extend RT PCRs Done
2,479,092 UART: [art] Lock RT PCRs Done
2,480,672 UART: [art] Populate DV Done
2,488,715 UART: [fht] FMC Alias Private Key: 7
2,489,717 UART: [art] Derive CDI
2,489,997 UART: [art] Store in in slot 0x4
2,575,280 UART: [art] Derive Key Pair
2,575,640 UART: [art] Store priv key in slot 0x5
2,588,700 UART: [art] Derive Key Pair - Done
2,603,768 UART: [art] Signing Cert with AUTHO
2,604,248 UART: RITY.KEYID = 7
2,619,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,619,849 UART: [art] PUB.X = 03DF6388081C7CB858AA7C80125F5DD5E0CCC2FEBB8D1FB0D8F987974CB2D02FFF2D9F1673003EC2D3D190CE0154BE9D
2,626,608 UART: [art] PUB.Y = B7FB14583F4DF719C19642CA495DCC7515ECEAFDC24B109A27BD1C880E042E97F3B52DBA1EAF71A21550EDBC50CF3C89
2,633,574 UART: [art] SIG.R = 1B4410D0FA4FD68A6A5F12A6EB22B6B69FFAA58E9E45423EADD48FC293E83E25D80E208FCD3F5C8A01C8122808C8CF8D
2,640,355 UART: [art] SIG.S = 8B1BC2681712E85710AF422658E202B7E64E10582F41F03ADDFED77302DB27EC5DCD69EAC2BB7FC23D103DD429C2C0E4
2,664,162 UART: mock_rt_interact::rt_entry...FMC Tester
2,772,288 UART: [rt] Runtime listening for mailbox commands...
2,775,678 >>> mbox cmd response data (2048 bytes)
2,775,679 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,776,911 >>> mbox cmd response data (336 bytes)
2,776,912 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,789,503 >>> mbox cmd response data (1536 bytes)
2,789,504 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,789,607 UART:
2,789,623 UART: Running Caliptra ROM ...
2,790,031 UART:
2,790,086 UART: [state] CFI Enabled
2,792,628 UART: [state] LifecycleState = Unprovisioned
2,793,283 UART: [state] DebugLocked = No
2,793,809 UART: [state] WD Timer not started. Device not locked for debugging
2,795,123 UART: [kat] SHA2-256
3,600,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,604,898 UART: [kat] ++
3,605,050 UART: [kat] sha1
3,609,386 UART: [kat] SHA2-256
3,611,326 UART: [kat] SHA2-384
3,614,265 UART: [kat] SHA2-512-ACC
3,616,165 UART: [kat] ECC-384
3,625,804 UART: [kat] HMAC-384Kdf
3,630,482 UART: [kat] LMS
3,878,810 UART: [kat] --
3,879,600 UART: [update-reset] ++
4,746,006 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,747,057 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,838,459 >>> mbox cmd response: success
4,838,602 UART: [update-reset] Copying MAN_2 To MAN_1
4,846,616 UART: [update-reset Success] --
4,847,825 UART: [state] Locking Datavault
4,848,829 UART: [state] Locking PCR0, PCR1 and PCR31
4,849,433 UART: [state] Locking ICCM
4,849,869 UART: [exit] Launching FMC @ 0x40000130
4,855,198 UART:
4,855,214 UART: Running Caliptra FMC ...
4,855,622 UART:
4,855,676 UART: [state] CFI Enabled
4,944,761 UART: [art] Extend RT PCRs Done
4,945,189 UART: [art] Lock RT PCRs Done
4,946,850 UART: [art] Populate DV Done
4,954,987 UART: [fht] FMC Alias Private Key: 7
4,955,967 UART: [art] Derive CDI
4,956,247 UART: [art] Store in in slot 0x4
5,041,984 UART: [art] Derive Key Pair
5,042,344 UART: [art] Store priv key in slot 0x5
5,055,058 UART: [art] Derive Key Pair - Done
5,070,210 UART: [art] Signing Cert with AUTHO
5,070,690 UART: RITY.KEYID = 7
5,086,056 UART: [art] Erasing AUTHORITY.KEYID = 7
5,086,821 UART: [art] PUB.X = E63D3CBCB3472CFF642D86BB9025CAEC6653E1C294253A700F602C8E2CF93ACF1D4F35150BC87AC7BAE9C510278ED8F7
5,093,603 UART: [art] PUB.Y = 441D25BF9B69C277DB582513A830DAC4DD476346BFF96A3C0105B1224CBAE1DAFDF81F947D0B116C845C076E313EA244
5,100,551 UART: [art] SIG.R = 93935F0179AFD76CA1FC2EC50537DEE53B44C56F91ED0FCF7C9C4ACB507996E7B9EE55C6D4F31D6C16E821BD8961A6A5
5,107,330 UART: [art] SIG.S = D6D011984C6AB36D073EDACD4FC804E08180912AE86D9F4CAE31EA2D1C3C1913F22FE476C635C0B57F89B726C4AA3B21
5,130,440 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,131,473 UART: mock_rt_interact::rt_entry...FMC Tester
5,420,326 UART: [rt] Runtime listening for mailbox commands...
5,422,361 >>> mbox cmd response data (336 bytes)
5,422,362 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,434,953 >>> mbox cmd response data (1536 bytes)
5,434,954 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,434,971 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,313 ready_for_fw is high
1,059,313 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,122,026 >>> mbox cmd response: success
2,122,026 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,184,744 UART:
2,184,760 UART: Running Caliptra FMC ...
2,185,168 UART:
2,185,222 UART: [state] CFI Enabled
2,195,837 UART: [fht] FMC Alias Private Key: 7
2,303,788 UART: [art] Extend RT PCRs Done
2,304,216 UART: [art] Lock RT PCRs Done
2,306,030 UART: [art] Populate DV Done
2,314,261 UART: [fht] FMC Alias Private Key: 7
2,315,213 UART: [art] Derive CDI
2,315,493 UART: [art] Store in in slot 0x4
2,401,148 UART: [art] Derive Key Pair
2,401,508 UART: [art] Store priv key in slot 0x5
2,414,448 UART: [art] Derive Key Pair - Done
2,429,524 UART: [art] Signing Cert with AUTHO
2,430,004 UART: RITY.KEYID = 7
2,444,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,659 UART: [art] PUB.X = 55863B88CC6902175041C2E830CF344E230294062F1BCE8F320ADDE988378F20EC4C26553559512A6FA2431917CE519F
2,452,409 UART: [art] PUB.Y = CB7CB9233668F0D52D761EE2CFE32EF875EE529F3A9E03C289C8C044881E36F58337D293CDE55BEB6709CB8D8C90BCFE
2,459,369 UART: [art] SIG.R = 2C67873F5416A2490406A5A2BFC10DA2F306748A51700680114A8C83483F1E3D37A5945B0C7C361C357F998E8FA1AC6D
2,466,117 UART: [art] SIG.S = 51EED694C50D255AA51DB7B0400D7F79E99373868FF41415649EC90396CDE54AE1FC6ACD3B395BCCC61162B16E354727
2,489,911 UART: mock_rt_interact::rt_entry...FMC Tester
2,597,589 UART: [rt] Runtime listening for mailbox commands...
2,600,979 >>> mbox cmd response data (2048 bytes)
2,600,980 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,602,212 >>> mbox cmd response data (336 bytes)
2,602,213 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,614,804 >>> mbox cmd response data (1536 bytes)
2,614,805 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,548,539 >>> mbox cmd response: success
4,561,947 UART:
4,561,963 UART: Running Caliptra FMC ...
4,562,371 UART:
4,562,425 UART: [state] CFI Enabled
4,651,634 UART: [art] Extend RT PCRs Done
4,652,062 UART: [art] Lock RT PCRs Done
4,653,535 UART: [art] Populate DV Done
4,661,662 UART: [fht] FMC Alias Private Key: 7
4,662,738 UART: [art] Derive CDI
4,663,018 UART: [art] Store in in slot 0x4
4,748,259 UART: [art] Derive Key Pair
4,748,619 UART: [art] Store priv key in slot 0x5
4,761,489 UART: [art] Derive Key Pair - Done
4,776,426 UART: [art] Signing Cert with AUTHO
4,776,906 UART: RITY.KEYID = 7
4,792,286 UART: [art] Erasing AUTHORITY.KEYID = 7
4,793,051 UART: [art] PUB.X = 6940A0CDAE8DBF8AEB4ACEEB67852FA45A8DCAA1CBB1783BA512BBC1A1F5B10B697F05DAAF0939C8AD350AA22EB21A14
4,799,843 UART: [art] PUB.Y = 8FFEFF10C7F3B8A38659A5B2D119F5145169AE083138C3DBA2D6032A04259F6836782EBB01744A6820506F3B883D3488
4,806,777 UART: [art] SIG.R = B720F96484403CC893210B938F439AC2242700C246554C5746498A1C40D17B47430E9DF293902EE288D733F5AD22E790
4,813,505 UART: [art] SIG.S = 22589A06EAF6FFF03360B19679F53D340F2604223F3CFD4DC7686475AE58D607368A255226A0791F33ED88A75C6C7C04
4,836,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,837,421 UART: mock_rt_interact::rt_entry...FMC Tester
5,115,795 UART: [rt] Runtime listening for mailbox commands...
5,117,830 >>> mbox cmd response data (336 bytes)
5,117,831 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,130,422 >>> mbox cmd response data (1536 bytes)
5,130,423 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,130,440 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,659 UART: [kat] HMAC-384Kdf
923,377 UART: [kat] LMS
1,171,705 UART: [kat] --
1,172,790 UART: [cold-reset] ++
1,173,252 UART: [fht] FHT @ 0x50003400
1,175,829 UART: [idev] ++
1,175,997 UART: [idev] CDI.KEYID = 6
1,176,357 UART: [idev] SUBJECT.KEYID = 7
1,176,781 UART: [idev] UDS.KEYID = 0
1,177,126 ready_for_fw is high
1,177,126 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,184,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,760 UART: [idev] Sha1 KeyId Algorithm
1,210,236 UART: [idev] --
1,211,170 UART: [ldev] ++
1,211,338 UART: [ldev] CDI.KEYID = 6
1,211,701 UART: [ldev] SUBJECT.KEYID = 5
1,212,127 UART: [ldev] AUTHORITY.KEYID = 7
1,212,590 UART: [ldev] FE.KEYID = 1
1,217,900 UART: [ldev] Erasing FE.KEYID = 1
1,245,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,764 UART: [ldev] --
1,284,037 UART: [fwproc] Wait for Commands...
1,284,745 UART: [fwproc] Recv command 0x46574c44
1,285,473 UART: [fwproc] Recv'd Img size: 75384 bytes
2,136,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,657 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,269,996 >>> mbox cmd response: success
2,269,996 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,271,162 UART: [afmc] ++
2,271,330 UART: [afmc] CDI.KEYID = 6
2,271,692 UART: [afmc] SUBJECT.KEYID = 7
2,272,117 UART: [afmc] AUTHORITY.KEYID = 5
2,307,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,324,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,330,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,336,318 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,342,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,861 UART: [afmc] --
2,350,747 UART: [cold-reset] --
2,351,865 UART: [state] Locking Datavault
2,352,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,540 UART: [state] Locking ICCM
2,354,170 UART: [exit] Launching FMC @ 0x40000130
2,359,499 UART:
2,359,515 UART: Running Caliptra FMC ...
2,359,923 UART:
2,360,066 UART: [state] CFI Enabled
2,370,855 UART: [fht] FMC Alias Private Key: 7
2,478,686 UART: [art] Extend RT PCRs Done
2,479,114 UART: [art] Lock RT PCRs Done
2,480,794 UART: [art] Populate DV Done
2,489,101 UART: [fht] FMC Alias Private Key: 7
2,490,035 UART: [art] Derive CDI
2,490,315 UART: [art] Store in in slot 0x4
2,576,094 UART: [art] Derive Key Pair
2,576,454 UART: [art] Store priv key in slot 0x5
2,590,242 UART: [art] Derive Key Pair - Done
2,605,209 UART: [art] Signing Cert with AUTHO
2,605,689 UART: RITY.KEYID = 7
2,620,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,621,658 UART: [art] PUB.X = A3B57804730CCACDD08ED2E1AF98582A1140263A3E767797E37EB569D87B315A455BEEDB5AD17F860FB54E24A83AB229
2,628,429 UART: [art] PUB.Y = BA468AD1CD0FE13D465C1033A8A4F713F68997D3F7FD0B05AA5DB68DC8E11F712A96C5CB131FCF610817F66F69D26178
2,635,379 UART: [art] SIG.R = B421901D046CAC67D7D2C2719D339E26031BBABFC37FF0F3B85F1C9E0D85F13FE2539CFACABDF17B93DEC3B0A02C66F6
2,642,164 UART: [art] SIG.S = 1F19FF2E65E158AF9A4F62F27277451C63BB7EF44AC5AD187855092F6D61FC4853CD55F61FC5A1FCD4FA41A294678D11
2,665,280 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,332 UART: [rt] Runtime listening for mailbox commands...
2,776,722 >>> mbox cmd response data (2048 bytes)
2,776,723 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,777,955 >>> mbox cmd response data (336 bytes)
2,777,956 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,547 >>> mbox cmd response data (1536 bytes)
2,790,548 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,790,651 UART:
2,790,667 UART: Running Caliptra ROM ...
2,791,075 UART:
2,791,217 UART: [state] CFI Enabled
2,793,973 UART: [state] LifecycleState = Unprovisioned
2,794,628 UART: [state] DebugLocked = No
2,795,334 UART: [state] WD Timer not started. Device not locked for debugging
2,796,628 UART: [kat] SHA2-256
3,602,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,606,403 UART: [kat] ++
3,606,555 UART: [kat] sha1
3,610,729 UART: [kat] SHA2-256
3,612,669 UART: [kat] SHA2-384
3,615,238 UART: [kat] SHA2-512-ACC
3,617,138 UART: [kat] ECC-384
3,626,871 UART: [kat] HMAC-384Kdf
3,631,597 UART: [kat] LMS
3,879,925 UART: [kat] --
3,880,781 UART: [update-reset] ++
4,748,399 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,749,496 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,840,898 >>> mbox cmd response: success
4,841,219 UART: [update-reset] Copying MAN_2 To MAN_1
4,849,233 UART: [update-reset Success] --
4,850,200 UART: [state] Locking Datavault
4,850,844 UART: [state] Locking PCR0, PCR1 and PCR31
4,851,448 UART: [state] Locking ICCM
4,852,082 UART: [exit] Launching FMC @ 0x40000130
4,857,411 UART:
4,857,427 UART: Running Caliptra FMC ...
4,857,835 UART:
4,857,978 UART: [state] CFI Enabled
4,947,459 UART: [art] Extend RT PCRs Done
4,947,887 UART: [art] Lock RT PCRs Done
4,949,276 UART: [art] Populate DV Done
4,957,357 UART: [fht] FMC Alias Private Key: 7
4,958,299 UART: [art] Derive CDI
4,958,579 UART: [art] Store in in slot 0x4
5,044,546 UART: [art] Derive Key Pair
5,044,906 UART: [art] Store priv key in slot 0x5
5,057,902 UART: [art] Derive Key Pair - Done
5,072,489 UART: [art] Signing Cert with AUTHO
5,072,969 UART: RITY.KEYID = 7
5,087,575 UART: [art] Erasing AUTHORITY.KEYID = 7
5,088,340 UART: [art] PUB.X = 1C10DD5B9B36AAAF011805B5F609BEE00F74C2191F5D77C005280D4B5057148E3B5C5A87E6E5C285D7ABB834C76C6292
5,095,098 UART: [art] PUB.Y = 928F2175F77E0B589DFC1559C70E53AD87D9333A7C6A54CA68C992504EDD90FA201FF780415B0C7F05C382814A9DCBCE
5,102,044 UART: [art] SIG.R = B4592EE81F8077E48CFBD775C06274B41D2811B8EB0D221A3258B8E7485F53AFB0C828E285C0B554C5F9D9CD877FDE3E
5,108,821 UART: [art] SIG.S = 77959EE1CCA7260AE57826EC62AAF6AC30A51B29646E98614DCD349CF24496D56881A7D1B9C16F37966FFC27285DC36B
5,131,886 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,132,903 UART: mock_rt_interact::rt_entry...FMC Tester
5,413,865 UART: [rt] Runtime listening for mailbox commands...
5,415,900 >>> mbox cmd response data (336 bytes)
5,415,901 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,428,492 >>> mbox cmd response data (1536 bytes)
5,428,493 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,428,510 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 ready_for_fw is high
1,060,938 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,123,789 >>> mbox cmd response: success
2,123,789 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,186,357 UART:
2,186,373 UART: Running Caliptra FMC ...
2,186,781 UART:
2,186,924 UART: [state] CFI Enabled
2,197,705 UART: [fht] FMC Alias Private Key: 7
2,305,366 UART: [art] Extend RT PCRs Done
2,305,794 UART: [art] Lock RT PCRs Done
2,306,960 UART: [art] Populate DV Done
2,314,925 UART: [fht] FMC Alias Private Key: 7
2,316,077 UART: [art] Derive CDI
2,316,357 UART: [art] Store in in slot 0x4
2,402,484 UART: [art] Derive Key Pair
2,402,844 UART: [art] Store priv key in slot 0x5
2,415,728 UART: [art] Derive Key Pair - Done
2,430,494 UART: [art] Signing Cert with AUTHO
2,430,974 UART: RITY.KEYID = 7
2,446,130 UART: [art] Erasing AUTHORITY.KEYID = 7
2,446,895 UART: [art] PUB.X = D19B233E71576DCF2E563E9D871A800803BE18ACE34675CD9756F1E00EB09EBE261BE0F70A5038A3787BDBED9522A07C
2,453,663 UART: [art] PUB.Y = 05FC93C6705A48C1B400AC0F77F732173DA29B2E66F9C8E8C3745E7242F40ECB15516F66A772F1158083BD437B10CD3C
2,460,584 UART: [art] SIG.R = ED857277B9829B1A799B5F5960B87CDDA352DB66F4BEED3A12B6805F0C09354EFCF3D2C25CCF9C6F83930E371265158B
2,467,355 UART: [art] SIG.S = A8233A47B1AB81B0055ABAB9A1AD95DAF1671C5AB2510B22B700A211EC2FEC62D269398D76C250AF142E3FE88627CF37
2,491,148 UART: mock_rt_interact::rt_entry...FMC Tester
2,599,123 UART: [rt] Runtime listening for mailbox commands...
2,602,513 >>> mbox cmd response data (2048 bytes)
2,602,514 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,603,746 >>> mbox cmd response data (336 bytes)
2,603,747 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,616,338 >>> mbox cmd response data (1536 bytes)
2,616,339 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,548,442 >>> mbox cmd response: success
4,562,082 UART:
4,562,098 UART: Running Caliptra FMC ...
4,562,506 UART:
4,562,649 UART: [state] CFI Enabled
4,651,606 UART: [art] Extend RT PCRs Done
4,652,034 UART: [art] Lock RT PCRs Done
4,653,095 UART: [art] Populate DV Done
4,661,338 UART: [fht] FMC Alias Private Key: 7
4,662,484 UART: [art] Derive CDI
4,662,764 UART: [art] Store in in slot 0x4
4,747,961 UART: [art] Derive Key Pair
4,748,321 UART: [art] Store priv key in slot 0x5
4,761,519 UART: [art] Derive Key Pair - Done
4,776,115 UART: [art] Signing Cert with AUTHO
4,776,595 UART: RITY.KEYID = 7
4,792,055 UART: [art] Erasing AUTHORITY.KEYID = 7
4,792,820 UART: [art] PUB.X = D73967996E9AF7C38E82798B6C3AFF4E4561A7DF95D12885DCAF8038EBD40A7EDE932114D8D3F1CDACD86BCFC1AC4D64
4,799,609 UART: [art] PUB.Y = 0E996E306DEB64E1369BFE0EEED96F52D33D7E2433694FC6CBC0FC5C27C8A7D732741CE71A7FF5FAAD7A24DD1248CEDA
4,806,579 UART: [art] SIG.R = B8762DBDDC59697183ADDC6C14F4EA545992D8AC0C49AA2B0B637622BA0B26A3D17CC6DD34441953683F2FA2B04526D4
4,813,350 UART: [art] SIG.S = F5090C14502DD32035C8E6E716C3B74B5519E5880578C9C26CBFB4EEC699FFE6076D09D93BBB96A7768F294074453E88
4,835,943 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,837,052 UART: mock_rt_interact::rt_entry...FMC Tester
5,119,375 UART: [rt] Runtime listening for mailbox commands...
5,121,410 >>> mbox cmd response data (336 bytes)
5,121,411 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,134,002 >>> mbox cmd response data (1536 bytes)
5,134,003 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,134,020 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,174,579 ready_for_fw is high
1,174,579 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,152 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,216 UART: [fwproc] Wait for Commands...
1,280,895 UART: [fwproc] Recv command 0x46574c44
1,281,628 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,753 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,267,219 >>> mbox cmd response: success
2,267,219 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,396 UART: [afmc] ++
2,268,564 UART: [afmc] CDI.KEYID = 6
2,268,927 UART: [afmc] SUBJECT.KEYID = 7
2,269,353 UART: [afmc] AUTHORITY.KEYID = 5
2,304,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,321,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,473 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,192 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,975 UART: [afmc] --
2,348,067 UART: [cold-reset] --
2,349,159 UART: [state] Locking Datavault
2,350,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,954 UART: [state] Locking ICCM
2,351,550 UART: [exit] Launching FMC @ 0x40000130
2,356,879 UART:
2,356,895 UART: Running Caliptra FMC ...
2,357,303 UART:
2,357,357 UART: [state] CFI Enabled
2,368,052 UART: [fht] FMC Alias Private Key: 7
2,475,709 UART: [art] Extend RT PCRs Done
2,476,137 UART: [art] Lock RT PCRs Done
2,477,899 UART: [art] Populate DV Done
2,486,158 UART: [fht] FMC Alias Private Key: 7
2,487,160 UART: [art] Derive CDI
2,487,440 UART: [art] Store in in slot 0x4
2,573,041 UART: [art] Derive Key Pair
2,573,401 UART: [art] Store priv key in slot 0x5
2,586,545 UART: [art] Derive Key Pair - Done
2,601,085 UART: [art] Signing Cert with AUTHO
2,601,565 UART: RITY.KEYID = 7
2,617,193 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,958 UART: [art] PUB.X = 5D2E751DE4BB7A4C6F10A43CD39C9E0F4D5182D0671B46E483517EE5D2495A962D6E1CF75A4797C05D4E321221D8C2AD
2,624,733 UART: [art] PUB.Y = EBA062DFD91DB6730BA9FD76EA2794D00CDB7884C699A99F6A83712DED225A62BCAAEB7339E7B7B9EE677105C557D470
2,631,690 UART: [art] SIG.R = 3377B2EAE5015E556125CDF84A3D7FF5844DB5BF806A2A80807478690DE51E913E5ECF856F54C4FF577368EA876B5071
2,638,456 UART: [art] SIG.S = DEBC50D8737D61F1895DC5316A99E024DDC0C5ADEC28FBA620BFC1AB3357994FCDC26C9116236A893DBA515E7BDB471B
2,662,275 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,989 UART: [rt] Runtime listening for mailbox commands...
2,773,379 >>> mbox cmd response data (2048 bytes)
2,773,380 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,774,612 >>> mbox cmd response data (336 bytes)
2,774,613 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,787,204 >>> mbox cmd response data (1536 bytes)
2,787,205 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,787,308 UART:
2,787,324 UART: Running Caliptra ROM ...
2,787,732 UART:
2,787,787 UART: [state] CFI Enabled
2,790,385 UART: [state] LifecycleState = Unprovisioned
2,791,040 UART: [state] DebugLocked = No
2,791,564 UART: [state] WD Timer not started. Device not locked for debugging
2,792,856 UART: [kat] SHA2-256
3,596,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,600,535 UART: [kat] ++
3,600,687 UART: [kat] sha1
3,604,921 UART: [kat] SHA2-256
3,606,861 UART: [kat] SHA2-384
3,609,628 UART: [kat] SHA2-512-ACC
3,611,528 UART: [kat] ECC-384
3,621,311 UART: [kat] HMAC-384Kdf
3,626,067 UART: [kat] LMS
3,874,379 UART: [kat] --
3,875,147 UART: [update-reset] ++
4,741,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,742,383 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,833,785 >>> mbox cmd response: success
4,833,892 UART: [update-reset] Copying MAN_2 To MAN_1
4,841,906 UART: [update-reset Success] --
4,843,031 UART: [state] Locking Datavault
4,843,789 UART: [state] Locking PCR0, PCR1 and PCR31
4,844,393 UART: [state] Locking ICCM
4,844,873 UART: [exit] Launching FMC @ 0x40000130
4,850,202 UART:
4,850,218 UART: Running Caliptra FMC ...
4,850,626 UART:
4,850,680 UART: [state] CFI Enabled
4,939,529 UART: [art] Extend RT PCRs Done
4,939,957 UART: [art] Lock RT PCRs Done
4,941,264 UART: [art] Populate DV Done
4,949,523 UART: [fht] FMC Alias Private Key: 7
4,950,481 UART: [art] Derive CDI
4,950,761 UART: [art] Store in in slot 0x4
5,036,714 UART: [art] Derive Key Pair
5,037,074 UART: [art] Store priv key in slot 0x5
5,049,898 UART: [art] Derive Key Pair - Done
5,064,896 UART: [art] Signing Cert with AUTHO
5,065,376 UART: RITY.KEYID = 7
5,080,240 UART: [art] Erasing AUTHORITY.KEYID = 7
5,081,005 UART: [art] PUB.X = F51039708945C8184AB89E1414F45D95310088403FAB552EF3885E3FFD26D3FA91BE41AC7BDFA5AF2B87D21F1397AA32
5,087,759 UART: [art] PUB.Y = BE6B986C93018E132C04AA52E97FD590A30E523B7578A056548072917A32ABADC6C14B48FFF79C72F57008842AA35935
5,094,695 UART: [art] SIG.R = 98FE0CFCACDD06AE03E08CE9A9A9A05E0BD8A64A20297D9169BACEAF0E3DF1F5953250310E4DEC4568500A2FC312346B
5,101,464 UART: [art] SIG.S = 0B19634CE42496C6AFFF6804E40A48D59418F1220D03B84BDA0F3549B0BC92080CF553F7E804409B1CFCA0415D1A7871
5,123,799 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,124,868 UART: mock_rt_interact::rt_entry...FMC Tester
5,408,068 UART: [rt] Runtime listening for mailbox commands...
5,410,103 >>> mbox cmd response data (336 bytes)
5,410,104 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,422,695 >>> mbox cmd response data (1536 bytes)
5,422,696 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,422,713 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,492 ready_for_fw is high
1,056,492 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,118,569 >>> mbox cmd response: success
2,118,569 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,180,299 UART:
2,180,315 UART: Running Caliptra FMC ...
2,180,723 UART:
2,180,777 UART: [state] CFI Enabled
2,191,208 UART: [fht] FMC Alias Private Key: 7
2,299,401 UART: [art] Extend RT PCRs Done
2,299,829 UART: [art] Lock RT PCRs Done
2,301,259 UART: [art] Populate DV Done
2,309,622 UART: [fht] FMC Alias Private Key: 7
2,310,604 UART: [art] Derive CDI
2,310,884 UART: [art] Store in in slot 0x4
2,396,617 UART: [art] Derive Key Pair
2,396,977 UART: [art] Store priv key in slot 0x5
2,409,741 UART: [art] Derive Key Pair - Done
2,424,726 UART: [art] Signing Cert with AUTHO
2,425,206 UART: RITY.KEYID = 7
2,440,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,440,967 UART: [art] PUB.X = 63843A9E485203F83F1087CDF33963799CA0508D5477B5F2B03F53F5E3C6A21443F5C41748CB7EAE0907E60D87B77473
2,447,719 UART: [art] PUB.Y = 70D0E89E6B711FBE2D4946C13EB02387556409890EA1DE2F6C1EC2CBF9C43AF8EA158D1F3D040EF3894585402B7A98D0
2,454,665 UART: [art] SIG.R = E0523ABC2A338A55C130C2754841705457995D70A2ADF832ACC6FD6991A9666CA2BFC2D715070B42578CE01C241998DA
2,461,429 UART: [art] SIG.S = 2F4CBE2A7D837A456207B6C65A8DAA8D5E8292F630381DB16FB8D57E6FCD9BD9766D61B71FC0E55058134F90F522D3B3
2,485,245 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,975 UART: [rt] Runtime listening for mailbox commands...
2,595,365 >>> mbox cmd response data (2048 bytes)
2,595,366 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,596,598 >>> mbox cmd response data (336 bytes)
2,596,599 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,609,190 >>> mbox cmd response data (1536 bytes)
2,609,191 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,537,352 >>> mbox cmd response: success
4,550,794 UART:
4,550,810 UART: Running Caliptra FMC ...
4,551,218 UART:
4,551,272 UART: [state] CFI Enabled
4,640,577 UART: [art] Extend RT PCRs Done
4,641,005 UART: [art] Lock RT PCRs Done
4,642,350 UART: [art] Populate DV Done
4,650,745 UART: [fht] FMC Alias Private Key: 7
4,651,865 UART: [art] Derive CDI
4,652,145 UART: [art] Store in in slot 0x4
4,737,336 UART: [art] Derive Key Pair
4,737,696 UART: [art] Store priv key in slot 0x5
4,750,922 UART: [art] Derive Key Pair - Done
4,765,817 UART: [art] Signing Cert with AUTHO
4,766,297 UART: RITY.KEYID = 7
4,781,537 UART: [art] Erasing AUTHORITY.KEYID = 7
4,782,302 UART: [art] PUB.X = BFD9F65054B973ACF517D30293575F0BF601541DCB176867E918C050D7689919188800CE8F61F1295BE224DF27A6DEC2
4,789,039 UART: [art] PUB.Y = 13EF582ED6BDFD6093E9C4A87A1F9ACED38B5AB5FBC469E80941799235CC57BC42422CEF4323DB4DDD3F7590DBA200DB
4,795,986 UART: [art] SIG.R = B9211338929C6E4ED4DC806607870CAE8A982172D5856F304FFE2B89B47ACDE6FCBA237CBDF31389654991DF433FDB55
4,802,758 UART: [art] SIG.S = D2DC4D61D381300DCCAE2BA0DE13AA7DBD88D416446EBA39B121333EB9B48BC400CEE1AB68EC1DAD43D69C15C1359B59
4,825,823 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,826,748 UART: mock_rt_interact::rt_entry...FMC Tester
5,104,211 UART: [rt] Runtime listening for mailbox commands...
5,106,246 >>> mbox cmd response data (336 bytes)
5,106,247 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,118,838 >>> mbox cmd response data (1536 bytes)
5,118,839 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,118,856 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,174,394 ready_for_fw is high
1,174,394 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,099 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 75384 bytes
2,133,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,180 UART: [fwproc] Load Runtime at address 0x40005000 len 50700
2,268,650 >>> mbox cmd response: success
2,268,650 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,763 UART: [afmc] ++
2,269,931 UART: [afmc] CDI.KEYID = 6
2,270,294 UART: [afmc] SUBJECT.KEYID = 7
2,270,720 UART: [afmc] AUTHORITY.KEYID = 5
2,306,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,936 UART: [afmc] --
2,350,004 UART: [cold-reset] --
2,350,780 UART: [state] Locking Datavault
2,351,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,463 UART: [state] Locking ICCM
2,353,065 UART: [exit] Launching FMC @ 0x40000130
2,358,394 UART:
2,358,410 UART: Running Caliptra FMC ...
2,358,818 UART:
2,358,961 UART: [state] CFI Enabled
2,369,622 UART: [fht] FMC Alias Private Key: 7
2,477,965 UART: [art] Extend RT PCRs Done
2,478,393 UART: [art] Lock RT PCRs Done
2,479,941 UART: [art] Populate DV Done
2,488,354 UART: [fht] FMC Alias Private Key: 7
2,489,486 UART: [art] Derive CDI
2,489,766 UART: [art] Store in in slot 0x4
2,575,917 UART: [art] Derive Key Pair
2,576,277 UART: [art] Store priv key in slot 0x5
2,589,421 UART: [art] Derive Key Pair - Done
2,604,135 UART: [art] Signing Cert with AUTHO
2,604,615 UART: RITY.KEYID = 7
2,619,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,610 UART: [art] PUB.X = C59AB11D5232DFC2C9A1BCC2EF35CFA6EB0B009D1D7BDECD81C078BF07676DB7AC5137BAFB2E9A44F4F0B016D93F2817
2,627,380 UART: [art] PUB.Y = B630469FCDD64355DD512081C6B0FDEEA82BF74620155CE29E1DCB0243341BDD8DAA97ABCEAD56F04811A68A72724536
2,634,339 UART: [art] SIG.R = 212614A308DB2FFC69527DE60AC4C5343E0373D0952CF774E7E05146F8D0E261C12441056D1BD8EB71AF0E23A268E0E0
2,641,096 UART: [art] SIG.S = 0F3A99EB21B69CB97B79BAE3E09BA2EDFCEA9E443A04397774E336F3021760842F5B8A784831CDFEC6013E52AA7EBF61
2,664,705 UART: mock_rt_interact::rt_entry...FMC Tester
2,772,273 UART: [rt] Runtime listening for mailbox commands...
2,775,663 >>> mbox cmd response data (2048 bytes)
2,775,664 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,776,896 >>> mbox cmd response data (336 bytes)
2,776,897 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,789,488 >>> mbox cmd response data (1536 bytes)
2,789,489 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,789,592 UART:
2,789,608 UART: Running Caliptra ROM ...
2,790,016 UART:
2,790,158 UART: [state] CFI Enabled
2,792,090 UART: [state] LifecycleState = Unprovisioned
2,792,745 UART: [state] DebugLocked = No
2,793,241 UART: [state] WD Timer not started. Device not locked for debugging
2,794,601 UART: [kat] SHA2-256
3,598,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,602,280 UART: [kat] ++
3,602,432 UART: [kat] sha1
3,606,780 UART: [kat] SHA2-256
3,608,720 UART: [kat] SHA2-384
3,611,389 UART: [kat] SHA2-512-ACC
3,613,289 UART: [kat] ECC-384
3,622,944 UART: [kat] HMAC-384Kdf
3,627,472 UART: [kat] LMS
3,875,784 UART: [kat] --
3,876,788 UART: [update-reset] ++
4,743,247 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,744,384 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50700
4,835,786 >>> mbox cmd response: success
4,836,039 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,053 UART: [update-reset Success] --
4,844,940 UART: [state] Locking Datavault
4,845,640 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,244 UART: [state] Locking ICCM
4,846,900 UART: [exit] Launching FMC @ 0x40000130
4,852,229 UART:
4,852,245 UART: Running Caliptra FMC ...
4,852,653 UART:
4,852,796 UART: [state] CFI Enabled
4,941,641 UART: [art] Extend RT PCRs Done
4,942,069 UART: [art] Lock RT PCRs Done
4,943,298 UART: [art] Populate DV Done
4,951,409 UART: [fht] FMC Alias Private Key: 7
4,952,537 UART: [art] Derive CDI
4,952,817 UART: [art] Store in in slot 0x4
5,038,492 UART: [art] Derive Key Pair
5,038,852 UART: [art] Store priv key in slot 0x5
5,051,880 UART: [art] Derive Key Pair - Done
5,066,653 UART: [art] Signing Cert with AUTHO
5,067,133 UART: RITY.KEYID = 7
5,081,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,082,764 UART: [art] PUB.X = E9161A60BBB10EE69AE40491C13CED57C2F874722DD1FE0D7BC40FF88B4A89FD3521209C7B69B985AFA5FA7515ED5449
5,089,536 UART: [art] PUB.Y = 1D83399C14CD83A535CF154EE00C5B8DD1D6D151FE2F9437624E24CF04C388C72D486F28FD6EDF68424757604E954BA8
5,096,484 UART: [art] SIG.R = 70C10DA9871D6B44B6DEB5D2E2F569FCB74252D905F9C3E4C69CBC802C4667A04A7DD9D192969EF3B12970DB4FFED760
5,103,262 UART: [art] SIG.S = EC8E56EF8666E166F348E0A3F821793BF89F64FB440526D785554C67ABB36B431BDCAA2D21C4406569E04716575A5275
5,126,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,402 UART: mock_rt_interact::rt_entry...FMC Tester
5,413,602 UART: [rt] Runtime listening for mailbox commands...
5,415,637 >>> mbox cmd response data (336 bytes)
5,415,638 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,428,229 >>> mbox cmd response data (1536 bytes)
5,428,230 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,428,247 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,839 ready_for_fw is high
1,054,839 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
2,116,256 >>> mbox cmd response: success
2,116,256 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,178,616 UART:
2,178,632 UART: Running Caliptra FMC ...
2,179,040 UART:
2,179,183 UART: [state] CFI Enabled
2,189,804 UART: [fht] FMC Alias Private Key: 7
2,297,743 UART: [art] Extend RT PCRs Done
2,298,171 UART: [art] Lock RT PCRs Done
2,299,613 UART: [art] Populate DV Done
2,307,864 UART: [fht] FMC Alias Private Key: 7
2,308,956 UART: [art] Derive CDI
2,309,236 UART: [art] Store in in slot 0x4
2,394,859 UART: [art] Derive Key Pair
2,395,219 UART: [art] Store priv key in slot 0x5
2,408,519 UART: [art] Derive Key Pair - Done
2,423,110 UART: [art] Signing Cert with AUTHO
2,423,590 UART: RITY.KEYID = 7
2,438,856 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,621 UART: [art] PUB.X = FC320B22410A259C2106BBCDABDCEC599B9F771AA04BABD539198DA1B224C88DF719D0FE4970FAA8DE1B23F10ECC862D
2,446,403 UART: [art] PUB.Y = F2524CB616E4EE49288DE5D295E089CCA961B2B23F6A6C2E2BFA96E21C2777EE076339648BDD42C5A192EAEF38F97674
2,453,360 UART: [art] SIG.R = 907B9F8FA4CF6797B55971B6B2B58A3AC6329C3B0313D2E5759C3ED68678202FA66D57922566CDD27B6C793FB9BC8A2E
2,460,133 UART: [art] SIG.S = CB9776854E1DBA0F74012D313F6B8E609F598E4A35A6F768A96F39FD06EE2F37A61F57ABA47FBCB13B018FD6AFA2B0D1
2,483,904 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,725 UART: [rt] Runtime listening for mailbox commands...
2,595,115 >>> mbox cmd response data (2048 bytes)
2,595,116 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,596,348 >>> mbox cmd response data (336 bytes)
2,596,349 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,608,940 >>> mbox cmd response data (1536 bytes)
2,608,941 <<< Executing mbox cmd 0x46574c44 (75384 bytes) from SoC
4,538,025 >>> mbox cmd response: success
4,551,523 UART:
4,551,539 UART: Running Caliptra FMC ...
4,551,947 UART:
4,552,090 UART: [state] CFI Enabled
4,641,389 UART: [art] Extend RT PCRs Done
4,641,817 UART: [art] Lock RT PCRs Done
4,642,912 UART: [art] Populate DV Done
4,651,335 UART: [fht] FMC Alias Private Key: 7
4,652,429 UART: [art] Derive CDI
4,652,709 UART: [art] Store in in slot 0x4
4,738,520 UART: [art] Derive Key Pair
4,738,880 UART: [art] Store priv key in slot 0x5
4,751,978 UART: [art] Derive Key Pair - Done
4,767,066 UART: [art] Signing Cert with AUTHO
4,767,546 UART: RITY.KEYID = 7
4,782,430 UART: [art] Erasing AUTHORITY.KEYID = 7
4,783,195 UART: [art] PUB.X = 823C925565C05ACC6831A3294193F4FECF493940A9E28B8674739E6A828EEE94BCF6102C53A85C5BB80FCFE12C4ABF0F
4,789,969 UART: [art] PUB.Y = AF3CFF4F964E4D8C077F90FA915244376B8C70873796C0BA052A2CC6CC27225B17AFC37921909D1B4EAE77F5E078C888
4,796,919 UART: [art] SIG.R = 50D073A16D7C6EECB76DD06CF0E60513C8AF3925C0C0A48A5BBEBF7773111F38873AC8EBEDBD4011BC61AB814FB538DF
4,803,708 UART: [art] SIG.S = 3F9A1CCEB2CFFEDD7C8EDE9830D39F544491CCEB1695DB8A4D9BB03B96A790242612C12DD6842792CE0D69D6ABF17570
4,826,367 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,827,596 UART: mock_rt_interact::rt_entry...FMC Tester
5,108,264 UART: [rt] Runtime listening for mailbox commands...
5,110,299 >>> mbox cmd response data (336 bytes)
5,110,300 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,122,891 >>> mbox cmd response data (1536 bytes)
5,122,892 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,122,909 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,819 writing to cptra_bootfsm_go
3,142 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
3,254 UART: hii* TESTCASE PASSED
Initializing fuses
874 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,799 writing to cptra_bootfsm_go
3,108 UART: hii* TESTCASE PASSED
Initializing fuses
877 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,814 writing to cptra_bootfsm_go
3,117 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
3,115 UART: hii* TESTCASE PASSED
Initializing fuses
865 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,156 UART: hii* TESTCASE PASSED
Initializing fuses
898 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,162 UART: hii* TESTCASE PASSED
Initializing fuses
868 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
3,172 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
3,216 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,135 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
3,134 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
3,161 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
4,311 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,803 writing to cptra_bootfsm_go
3,099 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,738 writing to cptra_bootfsm_go
4,043 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,103 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
3,123 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
3,221 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,324 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,186 >>> mbox cmd response data (14 bytes)
35,799 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,462 >>> mbox cmd response data (12 bytes)
36,778 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,346 >>> mbox cmd response data (7 bytes)
37,653 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,954 >>> mbox cmd response data (7 bytes)
38,269 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,617 >>> mbox cmd response data (0 bytes)
38,853 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,170 >>> mbox cmd response: success
39,351 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,707 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,412 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,270 >>> mbox cmd response data (14 bytes)
35,764 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,415 >>> mbox cmd response data (12 bytes)
36,793 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,146 >>> mbox cmd response data (7 bytes)
37,435 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,728 >>> mbox cmd response data (7 bytes)
38,012 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,357 >>> mbox cmd response data (0 bytes)
38,592 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,853 >>> mbox cmd response: success
39,034 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,374 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,523 writing to cptra_bootfsm_go
3,974 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,809 >>> mbox cmd response data (14 bytes)
36,362 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
37,026 >>> mbox cmd response data (12 bytes)
37,345 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,707 >>> mbox cmd response data (7 bytes)
38,003 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,345 >>> mbox cmd response data (7 bytes)
38,644 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,015 >>> mbox cmd response data (0 bytes)
39,264 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,535 >>> mbox cmd response: success
39,729 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,081 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,576 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,403 >>> mbox cmd response data (14 bytes)
35,976 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,644 >>> mbox cmd response data (12 bytes)
36,971 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,285 >>> mbox cmd response data (7 bytes)
37,582 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,958 >>> mbox cmd response data (7 bytes)
38,254 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,615 >>> mbox cmd response data (0 bytes)
38,862 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,138 >>> mbox cmd response: success
39,337 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,701 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,228 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,088 >>> mbox cmd response data (14 bytes)
35,593 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,242 >>> mbox cmd response data (12 bytes)
36,547 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,894 >>> mbox cmd response data (7 bytes)
37,176 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,471 >>> mbox cmd response data (7 bytes)
37,748 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,087 >>> mbox cmd response data (0 bytes)
38,320 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,604 >>> mbox cmd response: success
38,803 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,085 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,247 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,106 >>> mbox cmd response data (14 bytes)
35,611 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,282 >>> mbox cmd response data (12 bytes)
36,590 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,940 >>> mbox cmd response data (7 bytes)
37,227 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,575 >>> mbox cmd response data (7 bytes)
37,857 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,225 >>> mbox cmd response data (0 bytes)
38,463 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,736 >>> mbox cmd response: success
38,919 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,253 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,340 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,198 >>> mbox cmd response data (14 bytes)
35,735 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,391 >>> mbox cmd response data (12 bytes)
36,751 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,111 >>> mbox cmd response data (7 bytes)
37,502 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,816 >>> mbox cmd response data (7 bytes)
38,105 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,445 >>> mbox cmd response data (0 bytes)
38,682 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,949 >>> mbox cmd response: success
39,326 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,674 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,559 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,376 >>> mbox cmd response data (14 bytes)
36,015 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,684 >>> mbox cmd response data (12 bytes)
37,008 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,420 >>> mbox cmd response data (7 bytes)
37,740 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
39,409 >>> mbox cmd response data (7 bytes)
39,753 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
40,123 >>> mbox cmd response data (0 bytes)
40,391 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,668 >>> mbox cmd response: success
40,930 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
41,284 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,400 >>> mbox cmd response data (14 bytes)
36,067 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,794 >>> mbox cmd response data (12 bytes)
37,126 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,486 >>> mbox cmd response data (7 bytes)
37,788 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,122 >>> mbox cmd response data (7 bytes)
38,468 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,817 >>> mbox cmd response data (0 bytes)
39,061 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,341 >>> mbox cmd response: success
39,532 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,882 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,185 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,688 >>> mbox cmd response: success
35,239 UART: |dcfeffff48692121| 37,116 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,634 >>> mbox cmd response: success
|dcfeffff48692121| 39,831 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,282 >>> mbox cmd response: success
|dcfeffff48692121| 43,645 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,178 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,370 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,888 >>> mbox cmd response: success
35,356 UART: |dcfeffff48692121| 37,292 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,837 >>> mbox cmd response: success
|dcfeffff48692121| 40,030 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,477 >>> mbox cmd response: success
|dcfeffff48692121| 42,701 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,134 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,624 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,167 >>> mbox cmd response: success
35,753 UART: |dcfeffff48692121| 37,710 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,314 >>> mbox cmd response: success
|dcfeffff48692121| 40,590 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,104 >>> mbox cmd response: success
|dcfeffff48692121| 43,332 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,854 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,672 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,211 >>> mbox cmd response: success
35,821 UART: |dcfeffff48692121| 37,753 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,346 >>> mbox cmd response: success
|dcfeffff48692121| 40,580 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,138 >>> mbox cmd response: success
|dcfeffff48692121| 43,391 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,908 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,397 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,920 >>> mbox cmd response: success
35,463 UART: |dcfeffff48692121| 37,358 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,878 >>> mbox cmd response: success
|dcfeffff48692121| 40,073 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,578 >>> mbox cmd response: success
|dcfeffff48692121| 42,807 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,302 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,346 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,867 >>> mbox cmd response: success
35,333 UART: |dcfeffff48692121| 37,271 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,782 >>> mbox cmd response: success
|dcfeffff48692121| 39,975 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,473 >>> mbox cmd response: success
|dcfeffff48692121| 42,702 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,190 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
3,132 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,658 >>> mbox cmd response: success
35,142 UART: |dcfeffff48692121| 37,920 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,490 >>> mbox cmd response: success
|dcfeffff48692121| 40,698 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,151 >>> mbox cmd response: success
|dcfeffff48692121| 43,382 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,826 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,539 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,753 >>> mbox cmd response: success
37,439 UART: |dcfeffff48692121| 39,450 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
40,043 >>> mbox cmd response: success
|dcfeffff48692121| 42,324 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,871 >>> mbox cmd response: success
|dcfeffff48692121| 45,110 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,611 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,588 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,092 >>> mbox cmd response: success
35,636 UART: |dcfeffff48692121| 37,627 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,207 >>> mbox cmd response: success
|dcfeffff48692121| 40,435 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,978 >>> mbox cmd response: success
|dcfeffff48692121| 43,240 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,746 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,030 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,788 writing to cptra_bootfsm_go
3,088 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,795 writing to cptra_bootfsm_go
3,098 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,804 writing to cptra_bootfsm_go
3,105 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,144 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,160 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
3,251 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,140 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,325 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,705 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,278 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,625 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,642 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,001 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,599 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,962 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,293 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,653 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,232 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,614 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,456 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,846 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,539 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,901 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,636 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,002 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,210 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,714 >>> mbox cmd response: success
35,191 UART: |dcfeffff48692121| 37,121 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,634 >>> mbox cmd response: success
|dcfeffff48692121| 39,857 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,344 >>> mbox cmd response: success
|dcfeffff48692121| 43,794 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,260 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,292 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,796 >>> mbox cmd response: success
35,328 UART: |dcfeffff48692121| 37,202 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,716 >>> mbox cmd response: success
|dcfeffff48692121| 39,907 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,373 >>> mbox cmd response: success
|dcfeffff48692121| 42,604 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,039 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,633 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,145 >>> mbox cmd response: success
35,750 UART: |dcfeffff48692121| 37,716 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,339 >>> mbox cmd response: success
|dcfeffff48692121| 40,605 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,118 >>> mbox cmd response: success
|dcfeffff48692121| 43,345 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,839 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,563 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,104 >>> mbox cmd response: success
35,717 UART: |dcfeffff48692121| 37,718 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,318 >>> mbox cmd response: success
|dcfeffff48692121| 40,549 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,077 >>> mbox cmd response: success
|dcfeffff48692121| 43,334 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,841 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,310 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,822 >>> mbox cmd response: success
35,311 UART: |dcfeffff48692121| 37,226 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,736 >>> mbox cmd response: success
|dcfeffff48692121| 39,931 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,379 >>> mbox cmd response: success
|dcfeffff48692121| 42,605 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,106 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,253 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,786 >>> mbox cmd response: success
35,267 UART: |dcfeffff48692121| 37,205 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,723 >>> mbox cmd response: success
|dcfeffff48692121| 39,923 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,426 >>> mbox cmd response: success
|dcfeffff48692121| 42,659 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,097 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,156 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,678 >>> mbox cmd response: success
35,177 UART: |dcfeffff48692121| 37,113 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,633 >>> mbox cmd response: success
|dcfeffff48692121| 39,881 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,327 >>> mbox cmd response: success
|dcfeffff48692121| 42,556 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,006 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,789 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,323 >>> mbox cmd response: success
35,868 UART: |dcfeffff48692121| 37,914 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,506 >>> mbox cmd response: success
|dcfeffff48692121| 40,735 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,282 >>> mbox cmd response: success
|dcfeffff48692121| 43,497 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,943 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,595 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,104 >>> mbox cmd response: success
35,800 UART: |dcfeffff48692121| 37,785 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,390 >>> mbox cmd response: success
|dcfeffff48692121| 40,633 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,230 >>> mbox cmd response: success
|dcfeffff48692121| 43,478 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,050 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,782 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,403 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
1,302,007 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
1,302,108 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
1,302,552 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
1,302,455 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
1,302,285 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
1,302,361 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
1,302,212 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
1,302,397 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
1,302,685 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "528a60939fccb6a73d4f0604baf4d1d5893512452ef8c4725b5383caa05973eacfde3dff1af246232cacc6ea1418be5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
4,099 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,291 UART:
192,640 UART: Running Caliptra ROM ...
193,830 UART:
194,005 UART: [state] CFI Enabled
266,061 UART: [state] LifecycleState = Unprovisioned
268,463 UART: [state] DebugLocked = No
269,731 UART: [state] WD Timer not started. Device not locked for debugging
273,853 UART: [kat] SHA2-256
455,781 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,351 UART: [kat] ++
467,840 UART: [kat] sha1
478,345 UART: [kat] SHA2-256
481,354 UART: [kat] SHA2-384
487,161 UART: [kat] SHA2-512-ACC
489,769 UART: [kat] ECC-384
3,778,606 UART: [kat] HMAC-384Kdf
3,803,702 UART: [kat] LMS
4,876,877 UART: [kat] --
4,881,316 UART: [cold-reset] ++
4,883,145 UART: [fht] FHT @ 0x50003400
4,894,454 UART: [idev] ++
4,895,134 UART: [idev] CDI.KEYID = 6
4,896,317 UART: [idev] SUBJECT.KEYID = 7
4,897,481 UART: [idev] UDS.KEYID = 0
4,930,930 UART: [idev] Erasing UDS.KEYID = 0
8,242,945 UART: [idev] Sha1 KeyId Algorithm
8,264,546 UART: [idev] --
8,266,923 UART: [ldev] ++
8,267,491 UART: [ldev] CDI.KEYID = 6
8,268,728 UART: [ldev] SUBJECT.KEYID = 5
8,269,888 UART: [ldev] AUTHORITY.KEYID = 7
8,271,117 UART: [ldev] FE.KEYID = 1
8,296,972 UART: [ldev] Erasing FE.KEYID = 1
11,628,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,923,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,939,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,955,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,971,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,990,785 UART: [ldev] --
13,996,058 UART: [fwproc] Wait for Commands...
13,997,995 UART: [fwproc] Recv command 0x43415053
14,001,041 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,023 writing to cptra_bootfsm_go
5,062 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,849,621 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,966 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,160 UART:
192,522 UART: Running Caliptra ROM ...
193,672 UART:
603,186 UART: [state] CFI Enabled
618,110 UART: [state] LifecycleState = Unprovisioned
620,472 UART: [state] DebugLocked = No
623,041 UART: [state] WD Timer not started. Device not locked for debugging
628,184 UART: [kat] SHA2-256
810,122 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,684 UART: [kat] ++
822,206 UART: [kat] sha1
833,566 UART: [kat] SHA2-256
836,580 UART: [kat] SHA2-384
842,497 UART: [kat] SHA2-512-ACC
845,104 UART: [kat] ECC-384
4,102,211 UART: [kat] HMAC-384Kdf
4,114,321 UART: [kat] LMS
5,187,480 UART: [kat] --
5,192,186 UART: [cold-reset] ++
5,193,583 UART: [fht] FHT @ 0x50003400
5,205,103 UART: [idev] ++
5,205,771 UART: [idev] CDI.KEYID = 6
5,206,928 UART: [idev] SUBJECT.KEYID = 7
5,208,413 UART: [idev] UDS.KEYID = 0
5,224,580 UART: [idev] Erasing UDS.KEYID = 0
8,499,834 UART: [idev] Sha1 KeyId Algorithm
8,521,986 UART: [idev] --
8,526,891 UART: [ldev] ++
8,527,512 UART: [ldev] CDI.KEYID = 6
8,528,688 UART: [ldev] SUBJECT.KEYID = 5
8,530,625 UART: [ldev] AUTHORITY.KEYID = 7
8,531,735 UART: [ldev] FE.KEYID = 1
8,543,415 UART: [ldev] Erasing FE.KEYID = 1
11,832,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,971 UART: [ldev] --
14,198,692 UART: [fwproc] Wait for Commands...
14,201,866 UART: [fwproc] Recv command 0x43415053
14,204,945 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
4,205 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,018,526 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
4,311 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,475 UART:
193,387 UART: Running Caliptra ROM ...
194,560 UART:
194,709 UART: [state] CFI Enabled
266,043 UART: [state] LifecycleState = Unprovisioned
268,377 UART: [state] DebugLocked = No
270,778 UART: [state] WD Timer not started. Device not locked for debugging
275,311 UART: [kat] SHA2-256
454,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,011 UART: [kat] ++
466,503 UART: [kat] sha1
477,374 UART: [kat] SHA2-256
480,408 UART: [kat] SHA2-384
487,379 UART: [kat] SHA2-512-ACC
490,324 UART: [kat] ECC-384
2,955,557 UART: [kat] HMAC-384Kdf
2,977,170 UART: [kat] LMS
3,506,586 UART: [kat] --
3,510,613 UART: [cold-reset] ++
3,512,879 UART: [fht] FHT @ 0x50003400
3,524,787 UART: [idev] ++
3,525,365 UART: [idev] CDI.KEYID = 6
3,526,282 UART: [idev] SUBJECT.KEYID = 7
3,527,502 UART: [idev] UDS.KEYID = 0
3,549,319 UART: [idev] Erasing UDS.KEYID = 0
6,032,011 UART: [idev] Sha1 KeyId Algorithm
6,056,196 UART: [idev] --
6,059,553 UART: [ldev] ++
6,060,135 UART: [ldev] CDI.KEYID = 6
6,061,027 UART: [ldev] SUBJECT.KEYID = 5
6,062,132 UART: [ldev] AUTHORITY.KEYID = 7
6,063,481 UART: [ldev] FE.KEYID = 1
6,107,114 UART: [ldev] Erasing FE.KEYID = 1
8,610,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,866 UART: [ldev] --
10,398,093 UART: [fwproc] Wait for Commands...
10,399,773 UART: [fwproc] Recv command 0x43415053
10,402,532 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,806 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,116 UART:
192,474 UART: Running Caliptra ROM ...
193,598 UART:
193,742 UART: [state] CFI Enabled
264,328 UART: [state] LifecycleState = Unprovisioned
266,186 UART: [state] DebugLocked = No
267,464 UART: [state] WD Timer not started. Device not locked for debugging
270,815 UART: [kat] SHA2-256
449,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,518 UART: [kat] ++
462,048 UART: [kat] sha1
473,150 UART: [kat] SHA2-256
476,208 UART: [kat] SHA2-384
481,047 UART: [kat] SHA2-512-ACC
484,036 UART: [kat] ECC-384
2,929,087 UART: [kat] HMAC-384Kdf
2,944,648 UART: [kat] LMS
3,474,108 UART: [kat] --
3,477,884 UART: [cold-reset] ++
3,479,089 UART: [fht] FHT @ 0x50003400
3,490,512 UART: [idev] ++
3,491,080 UART: [idev] CDI.KEYID = 6
3,491,998 UART: [idev] SUBJECT.KEYID = 7
3,493,214 UART: [idev] UDS.KEYID = 0
3,516,935 UART: [idev] Erasing UDS.KEYID = 0
6,001,653 UART: [idev] Sha1 KeyId Algorithm
6,025,400 UART: [idev] --
6,029,833 UART: [ldev] ++
6,030,408 UART: [ldev] CDI.KEYID = 6
6,031,324 UART: [ldev] SUBJECT.KEYID = 5
6,032,490 UART: [ldev] AUTHORITY.KEYID = 7
6,033,730 UART: [ldev] FE.KEYID = 1
6,085,928 UART: [ldev] Erasing FE.KEYID = 1
8,589,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,137 UART: [ldev] --
10,401,185 UART: [fwproc] Wait for Commands...
10,403,734 UART: [fwproc] Recv command 0x43415053
10,406,497 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,758 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,225,162 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,186 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,400 UART:
192,770 UART: Running Caliptra ROM ...
193,848 UART:
603,444 UART: [state] CFI Enabled
617,388 UART: [state] LifecycleState = Unprovisioned
619,262 UART: [state] DebugLocked = No
621,226 UART: [state] WD Timer not started. Device not locked for debugging
625,808 UART: [kat] SHA2-256
804,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,439 UART: [kat] ++
816,992 UART: [kat] sha1
828,148 UART: [kat] SHA2-256
831,147 UART: [kat] SHA2-384
836,579 UART: [kat] SHA2-512-ACC
839,515 UART: [kat] ECC-384
3,281,344 UART: [kat] HMAC-384Kdf
3,295,012 UART: [kat] LMS
3,824,566 UART: [kat] --
3,830,101 UART: [cold-reset] ++
3,831,336 UART: [fht] FHT @ 0x50003400
3,843,531 UART: [idev] ++
3,844,087 UART: [idev] CDI.KEYID = 6
3,845,105 UART: [idev] SUBJECT.KEYID = 7
3,846,203 UART: [idev] UDS.KEYID = 0
3,863,525 UART: [idev] Erasing UDS.KEYID = 0
6,320,285 UART: [idev] Sha1 KeyId Algorithm
6,342,833 UART: [idev] --
6,345,611 UART: [ldev] ++
6,346,184 UART: [ldev] CDI.KEYID = 6
6,347,096 UART: [ldev] SUBJECT.KEYID = 5
6,348,256 UART: [ldev] AUTHORITY.KEYID = 7
6,349,548 UART: [ldev] FE.KEYID = 1
6,361,921 UART: [ldev] Erasing FE.KEYID = 1
8,840,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,976 UART: [ldev] --
10,632,501 UART: [fwproc] Wait for Commands...
10,634,698 UART: [fwproc] Recv command 0x43415053
10,637,493 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,255 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,406,989 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,173,267 UART: [idev] ++
1,173,435 UART: [idev] CDI.KEYID = 6
1,173,796 UART: [idev] SUBJECT.KEYID = 7
1,174,221 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,265 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,610 UART: [ldev] Erasing FE.KEYID = 1
1,242,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,648 UART: [ldev] --
1,281,038 UART: [fwproc] Wait for Commands...
1,281,857 UART: [fwproc] Recv command 0x43415053
1,282,852 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,763 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,182,060 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,208,967 UART: [ldev] ++
1,209,135 UART: [ldev] CDI.KEYID = 6
1,209,499 UART: [ldev] SUBJECT.KEYID = 5
1,209,926 UART: [ldev] AUTHORITY.KEYID = 7
1,210,389 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,246 UART: [fwproc] Recv command 0x43415053
1,283,241 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,316 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
85,881 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
890,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,825 UART: [kat] ++
894,977 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,658 UART: [ldev] ++
1,208,826 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,617 UART: [ldev] AUTHORITY.KEYID = 7
1,210,080 UART: [ldev] FE.KEYID = 1
1,215,008 UART: [ldev] Erasing FE.KEYID = 1
1,241,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,892 UART: [ldev] --
1,280,236 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x43415053
1,281,850 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,799 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,686 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,198,730 UART: [idev] Sha1 KeyId Algorithm
1,207,590 UART: [idev] --
1,208,605 UART: [ldev] ++
1,208,773 UART: [ldev] CDI.KEYID = 6
1,209,137 UART: [ldev] SUBJECT.KEYID = 5
1,209,564 UART: [ldev] AUTHORITY.KEYID = 7
1,210,027 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x43415053
1,283,631 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,432 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,193 UART: [kat] SHA2-256
902,133 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,182,767 UART: [idev] Erasing UDS.KEYID = 0
1,199,729 UART: [idev] Sha1 KeyId Algorithm
1,208,769 UART: [idev] --
1,209,936 UART: [ldev] ++
1,210,104 UART: [ldev] CDI.KEYID = 6
1,210,468 UART: [ldev] SUBJECT.KEYID = 5
1,210,895 UART: [ldev] AUTHORITY.KEYID = 7
1,211,358 UART: [ldev] FE.KEYID = 1
1,216,666 UART: [ldev] Erasing FE.KEYID = 1
1,242,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,916 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,282,023 UART: [fwproc] Recv command 0x43415053
1,283,018 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,209 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,797 UART: [fwproc] Wait for Commands...
1,282,428 UART: [fwproc] Recv command 0x43415053
1,283,423 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,634 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,265 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,996 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,399 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,108 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
192,113 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,605 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,168 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,640 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,517 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,033 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ea5b8ae87a9962b37befc8d8800c7c06d4c2aafd81e5e3929192ba01c1cdb630076bfcd8fb5231a3e9d5a8ae5cb42f17",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "5e86b236cbb570b37bdf6bf1dfcdf199fead3441918f3bdd1b9254cf20f738525b1dbb43b60dcd76991138d98d6c2a84",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ea5b8ae87a9962b37befc8d8800c7c06d4c2aafd81e5e3929192ba01c1cdb630076bfcd8fb5231a3e9d5a8ae5cb42f17",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "5e86b236cbb570b37bdf6bf1dfcdf199fead3441918f3bdd1b9254cf20f738525b1dbb43b60dcd76991138d98d6c2a84",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ea5b8ae87a9962b37befc8d8800c7c06d4c2aafd81e5e3929192ba01c1cdb630076bfcd8fb5231a3e9d5a8ae5cb42f17",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "5e86b236cbb570b37bdf6bf1dfcdf199fead3441918f3bdd1b9254cf20f738525b1dbb43b60dcd76991138d98d6c2a84",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ea5b8ae87a9962b37befc8d8800c7c06d4c2aafd81e5e3929192ba01c1cdb630076bfcd8fb5231a3e9d5a8ae5cb42f17",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "5e86b236cbb570b37bdf6bf1dfcdf199fead3441918f3bdd1b9254cf20f738525b1dbb43b60dcd76991138d98d6c2a84",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ea5b8ae87a9962b37befc8d8800c7c06d4c2aafd81e5e3929192ba01c1cdb630076bfcd8fb5231a3e9d5a8ae5cb42f17",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "5e86b236cbb570b37bdf6bf1dfcdf199fead3441918f3bdd1b9254cf20f738525b1dbb43b60dcd76991138d98d6c2a84",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ea5b8ae87a9962b37befc8d8800c7c06d4c2aafd81e5e3929192ba01c1cdb630076bfcd8fb5231a3e9d5a8ae5cb42f17",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "5e86b236cbb570b37bdf6bf1dfcdf199fead3441918f3bdd1b9254cf20f738525b1dbb43b60dcd76991138d98d6c2a84",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
191,991 UART:
192,369 UART: Running Caliptra ROM ...
193,505 UART:
193,654 UART: [state] CFI Enabled
208,658 UART: [state] LifecycleState = Unprovisioned
211,067 UART: [state] DebugLocked = No
213,049 UART: [state] WD Timer not started. Device not locked for debugging
218,511 UART: [kat] SHA2-256
400,461 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,008 UART: [kat] ++
412,497 UART: [kat] sha1
422,947 UART: [kat] SHA2-256
425,954 UART: [kat] SHA2-384
432,589 UART: [kat] SHA2-512-ACC
435,239 UART: [kat] ECC-384
3,690,358 UART: [kat] HMAC-384Kdf
3,701,941 UART: [kat] LMS
4,775,142 UART: [kat] --
4,780,970 UART: [cold-reset] ++
4,782,621 UART: [fht] FHT @ 0x50003400
4,793,526 UART: [idev] ++
4,794,238 UART: [idev] CDI.KEYID = 6
4,795,498 UART: [idev] SUBJECT.KEYID = 7
4,796,887 UART: [idev] UDS.KEYID = 0
4,798,144 ready_for_fw is high
4,798,347 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
4,932,216 UART: [idev] Erasing UDS.KEYID = 0
8,088,108 UART: [idev] Sha1 KeyId Algorithm
8,110,065 UART: [idev] --
8,113,737 UART: [ldev] ++
8,114,307 UART: [ldev] CDI.KEYID = 6
8,115,538 UART: [ldev] SUBJECT.KEYID = 5
8,116,701 UART: [ldev] AUTHORITY.KEYID = 7
8,117,926 UART: [ldev] FE.KEYID = 1
8,130,455 UART: [ldev] Erasing FE.KEYID = 1
11,422,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,784,878 UART: [ldev] --
13,789,444 UART: [fwproc] Wait for Commands...
13,792,234 UART: [fwproc] Recv command 0x46574c44
13,794,484 UART: [fwproc] Recv'd Img size: 106532 bytes
17,773,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,854,435 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,896,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,214,018 >>> mbox cmd response: success
18,217,265 UART: [afmc] ++
18,217,870 UART: [afmc] CDI.KEYID = 6
18,218,985 UART: [afmc] SUBJECT.KEYID = 7
18,220,203 UART: [afmc] AUTHORITY.KEYID = 5
21,537,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,833,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,835,596 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,851,590 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,867,663 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,883,784 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,906,179 UART: [afmc] --
23,909,156 UART: [cold-reset] --
23,913,834 UART: [state] Locking Datavault
23,919,962 UART: [state] Locking PCR0, PCR1 and PCR31
23,921,670 UART: [state] Locking ICCM
23,923,714 UART: [exit] Launching FMC @ 0x40000000
23,932,384 UART:
23,932,627 UART: Running Caliptra FMC ...
23,933,766 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
4,693,552 ready_for_fw is high
4,693,948 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,018,358 >>> mbox cmd response: success
23,657,180 UART:
23,657,651 UART: Running Caliptra FMC ...
23,658,844 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,359 UART:
192,738 UART: Running Caliptra ROM ...
193,949 UART:
194,098 UART: [state] CFI Enabled
209,027 UART: [state] LifecycleState = Unprovisioned
211,373 UART: [state] DebugLocked = No
213,460 UART: [state] WD Timer not started. Device not locked for debugging
218,875 UART: [kat] SHA2-256
400,878 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,392 UART: [kat] ++
412,837 UART: [kat] sha1
423,350 UART: [kat] SHA2-256
426,362 UART: [kat] SHA2-384
432,991 UART: [kat] SHA2-512-ACC
435,635 UART: [kat] ECC-384
3,690,718 UART: [kat] HMAC-384Kdf
3,702,310 UART: [kat] LMS
4,775,505 UART: [kat] --
4,781,296 UART: [cold-reset] ++
4,783,026 UART: [fht] FHT @ 0x50003400
4,793,947 UART: [idev] ++
4,794,653 UART: [idev] CDI.KEYID = 6
4,795,818 UART: [idev] SUBJECT.KEYID = 7
4,797,267 UART: [idev] UDS.KEYID = 0
4,798,518 ready_for_fw is high
4,798,717 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
4,932,455 UART: [idev] Erasing UDS.KEYID = 0
8,088,478 UART: [idev] Sha1 KeyId Algorithm
8,110,474 UART: [idev] --
8,114,092 UART: [ldev] ++
8,114,710 UART: [ldev] CDI.KEYID = 6
8,115,882 UART: [ldev] SUBJECT.KEYID = 5
8,117,035 UART: [ldev] AUTHORITY.KEYID = 7
8,118,270 UART: [ldev] FE.KEYID = 1
8,130,834 UART: [ldev] Erasing FE.KEYID = 1
11,422,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,785,255 UART: [ldev] --
13,789,864 UART: [fwproc] Wait for Commands...
13,792,598 UART: [fwproc] Recv command 0x46574c44
13,794,900 UART: [fwproc] Recv'd Img size: 106532 bytes
17,774,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,854,850 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,897,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,214,370 >>> mbox cmd response: success
18,217,636 UART: [afmc] ++
18,218,246 UART: [afmc] CDI.KEYID = 6
18,219,449 UART: [afmc] SUBJECT.KEYID = 7
18,220,546 UART: [afmc] AUTHORITY.KEYID = 5
21,537,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,833,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,835,959 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,851,983 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,868,062 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,884,130 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,906,572 UART: [afmc] --
23,909,592 UART: [cold-reset] --
23,914,207 UART: [state] Locking Datavault
23,920,337 UART: [state] Locking PCR0, PCR1 and PCR31
23,922,053 UART: [state] Locking ICCM
23,924,166 UART: [exit] Launching FMC @ 0x40000000
23,932,745 UART:
23,932,994 UART: Running Caliptra FMC ...
23,934,197 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,693,804 ready_for_fw is high
4,694,728 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,018,598 >>> mbox cmd response: success
23,657,412 UART:
23,657,837 UART: Running Caliptra FMC ...
23,659,313 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,086 UART:
192,442 UART: Running Caliptra ROM ...
193,633 UART:
193,782 UART: [state] CFI Enabled
208,587 UART: [state] LifecycleState = Unprovisioned
210,460 UART: [state] DebugLocked = No
212,479 UART: [state] WD Timer not started. Device not locked for debugging
217,065 UART: [kat] SHA2-256
396,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,763 UART: [kat] ++
408,310 UART: [kat] sha1
419,260 UART: [kat] SHA2-256
422,272 UART: [kat] SHA2-384
429,259 UART: [kat] SHA2-512-ACC
432,194 UART: [kat] ECC-384
2,873,685 UART: [kat] HMAC-384Kdf
2,885,847 UART: [kat] LMS
3,415,270 UART: [kat] --
3,420,969 UART: [cold-reset] ++
3,422,473 UART: [fht] FHT @ 0x50003400
3,432,989 UART: [idev] ++
3,433,597 UART: [idev] CDI.KEYID = 6
3,434,483 UART: [idev] SUBJECT.KEYID = 7
3,435,729 UART: [idev] UDS.KEYID = 0
3,436,806 ready_for_fw is high
3,436,994 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,571,100 UART: [idev] Erasing UDS.KEYID = 0
5,909,964 UART: [idev] Sha1 KeyId Algorithm
5,932,941 UART: [idev] --
5,936,513 UART: [ldev] ++
5,937,084 UART: [ldev] CDI.KEYID = 6
5,937,999 UART: [ldev] SUBJECT.KEYID = 5
5,939,154 UART: [ldev] AUTHORITY.KEYID = 7
5,940,441 UART: [ldev] FE.KEYID = 1
5,952,706 UART: [ldev] Erasing FE.KEYID = 1
8,426,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,479 UART: [ldev] --
10,219,044 UART: [fwproc] Wait for Commands...
10,221,789 UART: [fwproc] Recv command 0x46574c44
10,223,883 UART: [fwproc] Recv'd Img size: 106876 bytes
13,533,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,612,178 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,654,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
13,973,101 >>> mbox cmd response: success
13,976,507 UART: [afmc] ++
13,977,114 UART: [afmc] CDI.KEYID = 6
13,978,024 UART: [afmc] SUBJECT.KEYID = 7
13,979,187 UART: [afmc] AUTHORITY.KEYID = 5
16,478,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,200,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,202,614 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,218,638 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,234,513 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,250,464 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,272,938 UART: [afmc] --
18,276,080 UART: [cold-reset] --
18,280,518 UART: [state] Locking Datavault
18,286,183 UART: [state] Locking PCR0, PCR1 and PCR31
18,287,872 UART: [state] Locking ICCM
18,289,710 UART: [exit] Launching FMC @ 0x40000000
18,298,102 UART:
18,298,349 UART: Running Caliptra FMC ...
18,299,406 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,112 UART:
192,483 UART: Running Caliptra ROM ...
193,657 UART:
193,808 UART: [state] CFI Enabled
208,595 UART: [state] LifecycleState = Unprovisioned
210,456 UART: [state] DebugLocked = No
212,481 UART: [state] WD Timer not started. Device not locked for debugging
217,092 UART: [kat] SHA2-256
396,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,807 UART: [kat] ++
408,340 UART: [kat] sha1
419,294 UART: [kat] SHA2-256
422,300 UART: [kat] SHA2-384
429,237 UART: [kat] SHA2-512-ACC
432,222 UART: [kat] ECC-384
2,873,676 UART: [kat] HMAC-384Kdf
2,885,844 UART: [kat] LMS
3,415,329 UART: [kat] --
3,420,974 UART: [cold-reset] ++
3,422,483 UART: [fht] FHT @ 0x50003400
3,433,038 UART: [idev] ++
3,433,606 UART: [idev] CDI.KEYID = 6
3,434,522 UART: [idev] SUBJECT.KEYID = 7
3,435,792 UART: [idev] UDS.KEYID = 0
3,436,717 ready_for_fw is high
3,436,898 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,571,173 UART: [idev] Erasing UDS.KEYID = 0
5,909,989 UART: [idev] Sha1 KeyId Algorithm
5,932,951 UART: [idev] --
5,936,563 UART: [ldev] ++
5,937,132 UART: [ldev] CDI.KEYID = 6
5,938,043 UART: [ldev] SUBJECT.KEYID = 5
5,939,207 UART: [ldev] AUTHORITY.KEYID = 7
5,940,437 UART: [ldev] FE.KEYID = 1
5,952,708 UART: [ldev] Erasing FE.KEYID = 1
8,426,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,470 UART: [ldev] --
10,219,091 UART: [fwproc] Wait for Commands...
10,221,843 UART: [fwproc] Recv command 0x46574c44
10,223,938 UART: [fwproc] Recv'd Img size: 106876 bytes
13,533,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,612,170 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,654,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
13,973,069 >>> mbox cmd response: success
13,976,492 UART: [afmc] ++
13,977,101 UART: [afmc] CDI.KEYID = 6
13,978,026 UART: [afmc] SUBJECT.KEYID = 7
13,979,192 UART: [afmc] AUTHORITY.KEYID = 5
16,478,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,200,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,202,651 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,218,606 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,234,533 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,250,495 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,272,935 UART: [afmc] --
18,276,078 UART: [cold-reset] --
18,280,532 UART: [state] Locking Datavault
18,286,219 UART: [state] Locking PCR0, PCR1 and PCR31
18,287,909 UART: [state] Locking ICCM
18,289,701 UART: [exit] Launching FMC @ 0x40000000
18,298,114 UART:
18,298,374 UART: Running Caliptra FMC ...
18,299,522 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,288,370 ready_for_fw is high
3,289,323 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,753,272 >>> mbox cmd response: success
18,003,250 UART:
18,003,919 UART: Running Caliptra FMC ...
18,005,100 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,306 writing to cptra_bootfsm_go
193,574 UART:
193,933 UART: Running Caliptra ROM ...
195,111 UART:
195,262 UART: [state] CFI Enabled
210,119 UART: [state] LifecycleState = Unprovisioned
211,910 UART: [state] DebugLocked = No
214,000 UART: [state] WD Timer not started. Device not locked for debugging
218,527 UART: [kat] SHA2-256
397,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
409,261 UART: [kat] ++
409,800 UART: [kat] sha1
420,751 UART: [kat] SHA2-256
423,824 UART: [kat] SHA2-384
430,728 UART: [kat] SHA2-512-ACC
433,735 UART: [kat] ECC-384
2,875,177 UART: [kat] HMAC-384Kdf
2,887,358 UART: [kat] LMS
3,416,766 UART: [kat] --
3,422,466 UART: [cold-reset] ++
3,423,969 UART: [fht] FHT @ 0x50003400
3,434,513 UART: [idev] ++
3,435,077 UART: [idev] CDI.KEYID = 6
3,436,104 UART: [idev] SUBJECT.KEYID = 7
3,437,203 UART: [idev] UDS.KEYID = 0
3,438,265 ready_for_fw is high
3,438,454 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,572,737 UART: [idev] Erasing UDS.KEYID = 0
5,911,496 UART: [idev] Sha1 KeyId Algorithm
5,934,433 UART: [idev] --
5,938,026 UART: [ldev] ++
5,938,599 UART: [ldev] CDI.KEYID = 6
5,939,479 UART: [ldev] SUBJECT.KEYID = 5
5,940,687 UART: [ldev] AUTHORITY.KEYID = 7
5,941,917 UART: [ldev] FE.KEYID = 1
5,954,217 UART: [ldev] Erasing FE.KEYID = 1
8,428,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,147,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,164,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,179,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,195,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,215,988 UART: [ldev] --
10,220,543 UART: [fwproc] Wait for Commands...
10,223,332 UART: [fwproc] Recv command 0x46574c44
10,225,365 UART: [fwproc] Recv'd Img size: 106876 bytes
13,535,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,613,689 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,656,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
13,974,586 >>> mbox cmd response: success
13,978,048 UART: [afmc] ++
13,978,674 UART: [afmc] CDI.KEYID = 6
13,979,559 UART: [afmc] SUBJECT.KEYID = 7
13,980,723 UART: [afmc] AUTHORITY.KEYID = 5
16,480,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,202,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,204,130 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,220,138 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,236,043 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,252,035 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,274,402 UART: [afmc] --
18,277,597 UART: [cold-reset] --
18,282,027 UART: [state] Locking Datavault
18,287,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,289,378 UART: [state] Locking ICCM
18,291,209 UART: [exit] Launching FMC @ 0x40000000
18,299,586 UART:
18,299,839 UART: Running Caliptra FMC ...
18,300,976 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,288,798 ready_for_fw is high
3,289,238 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,753,682 >>> mbox cmd response: success
18,003,702 UART:
18,004,122 UART: Running Caliptra FMC ...
18,005,401 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,696 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,677,685 >>> mbox cmd response: success
2,678,706 UART: [afmc] ++
2,678,874 UART: [afmc] CDI.KEYID = 6
2,679,237 UART: [afmc] SUBJECT.KEYID = 7
2,679,663 UART: [afmc] AUTHORITY.KEYID = 5
2,715,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,845 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,565 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,151 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,954 UART: [afmc] --
2,758,866 UART: [cold-reset] --
2,759,804 UART: [state] Locking Datavault
2,761,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,649 UART: [state] Locking ICCM
2,762,189 UART: [exit] Launching FMC @ 0x40000000
2,767,486 UART:
2,767,502 UART: Running Caliptra FMC ...
2,767,910 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,551 >>> mbox cmd response: success
2,590,019 UART:
2,590,035 UART: Running Caliptra FMC ...
2,590,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,696 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,677,685 >>> mbox cmd response: success
2,678,706 UART: [afmc] ++
2,678,874 UART: [afmc] CDI.KEYID = 6
2,679,237 UART: [afmc] SUBJECT.KEYID = 7
2,679,663 UART: [afmc] AUTHORITY.KEYID = 5
2,715,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,845 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,565 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,151 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,954 UART: [afmc] --
2,758,866 UART: [cold-reset] --
2,759,804 UART: [state] Locking Datavault
2,761,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,649 UART: [state] Locking ICCM
2,762,189 UART: [exit] Launching FMC @ 0x40000000
2,767,486 UART:
2,767,502 UART: Running Caliptra FMC ...
2,767,910 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,551 >>> mbox cmd response: success
2,590,019 UART:
2,590,035 UART: Running Caliptra FMC ...
2,590,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,696 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,677,685 >>> mbox cmd response: success
2,678,706 UART: [afmc] ++
2,678,874 UART: [afmc] CDI.KEYID = 6
2,679,237 UART: [afmc] SUBJECT.KEYID = 7
2,679,663 UART: [afmc] AUTHORITY.KEYID = 5
2,715,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,845 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,565 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,151 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,954 UART: [afmc] --
2,758,866 UART: [cold-reset] --
2,759,804 UART: [state] Locking Datavault
2,761,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,649 UART: [state] Locking ICCM
2,762,189 UART: [exit] Launching FMC @ 0x40000000
2,767,486 UART:
2,767,502 UART: Running Caliptra FMC ...
2,767,910 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,551 >>> mbox cmd response: success
2,590,019 UART:
2,590,035 UART: Running Caliptra FMC ...
2,590,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,696 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,677,685 >>> mbox cmd response: success
2,678,706 UART: [afmc] ++
2,678,874 UART: [afmc] CDI.KEYID = 6
2,679,237 UART: [afmc] SUBJECT.KEYID = 7
2,679,663 UART: [afmc] AUTHORITY.KEYID = 5
2,715,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,845 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,565 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,151 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,954 UART: [afmc] --
2,758,866 UART: [cold-reset] --
2,759,804 UART: [state] Locking Datavault
2,761,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,649 UART: [state] Locking ICCM
2,762,189 UART: [exit] Launching FMC @ 0x40000000
2,767,486 UART:
2,767,502 UART: Running Caliptra FMC ...
2,767,910 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,551 >>> mbox cmd response: success
2,590,019 UART:
2,590,035 UART: Running Caliptra FMC ...
2,590,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,696 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,677,685 >>> mbox cmd response: success
2,678,706 UART: [afmc] ++
2,678,874 UART: [afmc] CDI.KEYID = 6
2,679,237 UART: [afmc] SUBJECT.KEYID = 7
2,679,663 UART: [afmc] AUTHORITY.KEYID = 5
2,715,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,845 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,565 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,151 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,954 UART: [afmc] --
2,758,866 UART: [cold-reset] --
2,759,804 UART: [state] Locking Datavault
2,761,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,649 UART: [state] Locking ICCM
2,762,189 UART: [exit] Launching FMC @ 0x40000000
2,767,486 UART:
2,767,502 UART: Running Caliptra FMC ...
2,767,910 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,551 >>> mbox cmd response: success
2,590,019 UART:
2,590,035 UART: Running Caliptra FMC ...
2,590,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,523,696 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,541,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,677,685 >>> mbox cmd response: success
2,678,706 UART: [afmc] ++
2,678,874 UART: [afmc] CDI.KEYID = 6
2,679,237 UART: [afmc] SUBJECT.KEYID = 7
2,679,663 UART: [afmc] AUTHORITY.KEYID = 5
2,715,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,732,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,845 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,565 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,750,151 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,954 UART: [afmc] --
2,758,866 UART: [cold-reset] --
2,759,804 UART: [state] Locking Datavault
2,761,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,649 UART: [state] Locking ICCM
2,762,189 UART: [exit] Launching FMC @ 0x40000000
2,767,486 UART:
2,767,502 UART: Running Caliptra FMC ...
2,767,910 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,551 >>> mbox cmd response: success
2,590,019 UART:
2,590,035 UART: Running Caliptra FMC ...
2,590,443 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
191,979 UART:
192,370 UART: Running Caliptra ROM ...
193,547 UART:
193,693 UART: [state] CFI Enabled
264,440 UART: [state] LifecycleState = Unprovisioned
266,840 UART: [state] DebugLocked = No
268,271 UART: [state] WD Timer not started. Device not locked for debugging
272,902 UART: [kat] SHA2-256
454,800 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,351 UART: [kat] ++
466,882 UART: [kat] sha1
476,359 UART: [kat] SHA2-256
479,421 UART: [kat] SHA2-384
484,900 UART: [kat] SHA2-512-ACC
487,525 UART: [kat] ECC-384
3,776,176 UART: [kat] HMAC-384Kdf
3,791,136 UART: [kat] LMS
4,864,255 UART: [kat] --
4,868,189 UART: [cold-reset] ++
4,869,758 UART: [fht] FHT @ 0x50003400
4,881,443 UART: [idev] ++
4,882,120 UART: [idev] CDI.KEYID = 6
4,883,299 UART: [idev] SUBJECT.KEYID = 7
4,884,453 UART: [idev] UDS.KEYID = 0
4,901,420 UART: [idev] Erasing UDS.KEYID = 0
8,205,515 UART: [idev] Sha1 KeyId Algorithm
8,227,196 UART: [idev] --
8,231,400 UART: [ldev] ++
8,231,974 UART: [ldev] CDI.KEYID = 6
8,233,158 UART: [ldev] SUBJECT.KEYID = 5
8,234,315 UART: [ldev] AUTHORITY.KEYID = 7
8,235,540 UART: [ldev] FE.KEYID = 1
8,281,114 UART: [ldev] Erasing FE.KEYID = 1
11,616,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,926,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,943,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,959,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,975,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,995,413 UART: [ldev] --
14,141,589 UART: [fwproc] Wait for Commands...
14,142,993 UART: [fwproc] Recv command 0x46574c44
14,144,462 UART: [fwproc] Recv'd Img size: 114036 bytes
18,213,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,287,736 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,356,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,675,938 UART: [afmc] ++
18,676,663 UART: [afmc] CDI.KEYID = 6
18,677,781 UART: [afmc] SUBJECT.KEYID = 7
18,678,943 UART: [afmc] AUTHORITY.KEYID = 5
22,036,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,333,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,335,942 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,352,123 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,368,143 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,384,196 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,407,846 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,101 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,411 UART:
192,787 UART: Running Caliptra ROM ...
194,004 UART:
603,653 UART: [state] CFI Enabled
616,506 UART: [state] LifecycleState = Unprovisioned
618,908 UART: [state] DebugLocked = No
621,058 UART: [state] WD Timer not started. Device not locked for debugging
624,970 UART: [kat] SHA2-256
806,905 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,495 UART: [kat] ++
818,989 UART: [kat] sha1
829,914 UART: [kat] SHA2-256
832,921 UART: [kat] SHA2-384
839,292 UART: [kat] SHA2-512-ACC
841,927 UART: [kat] ECC-384
4,098,608 UART: [kat] HMAC-384Kdf
4,111,297 UART: [kat] LMS
5,184,482 UART: [kat] --
5,189,070 UART: [cold-reset] ++
5,191,590 UART: [fht] FHT @ 0x50003400
5,203,114 UART: [idev] ++
5,203,793 UART: [idev] CDI.KEYID = 6
5,204,974 UART: [idev] SUBJECT.KEYID = 7
5,206,463 UART: [idev] UDS.KEYID = 0
5,222,280 UART: [idev] Erasing UDS.KEYID = 0
8,494,671 UART: [idev] Sha1 KeyId Algorithm
8,515,736 UART: [idev] --
8,519,979 UART: [ldev] ++
8,520,693 UART: [ldev] CDI.KEYID = 6
8,521,781 UART: [ldev] SUBJECT.KEYID = 5
8,523,239 UART: [ldev] AUTHORITY.KEYID = 7
8,524,735 UART: [ldev] FE.KEYID = 1
8,536,029 UART: [ldev] Erasing FE.KEYID = 1
11,829,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,839 UART: [ldev] --
14,336,833 UART: [fwproc] Wait for Commands...
14,338,230 UART: [fwproc] Recv command 0x46574c44
14,340,244 UART: [fwproc] Recv'd Img size: 114036 bytes
18,408,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,478,242 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,547,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,867,392 UART: [afmc] ++
18,868,004 UART: [afmc] CDI.KEYID = 6
18,869,199 UART: [afmc] SUBJECT.KEYID = 7
18,870,297 UART: [afmc] AUTHORITY.KEYID = 5
22,189,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,485,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,487,559 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,503,684 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,519,798 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,535,807 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,559,245 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,158 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,191 UART:
192,574 UART: Running Caliptra ROM ...
193,695 UART:
193,836 UART: [state] CFI Enabled
267,774 UART: [state] LifecycleState = Unprovisioned
269,639 UART: [state] DebugLocked = No
271,730 UART: [state] WD Timer not started. Device not locked for debugging
276,261 UART: [kat] SHA2-256
455,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,922 UART: [kat] ++
467,467 UART: [kat] sha1
478,131 UART: [kat] SHA2-256
481,138 UART: [kat] SHA2-384
486,845 UART: [kat] SHA2-512-ACC
489,776 UART: [kat] ECC-384
2,949,465 UART: [kat] HMAC-384Kdf
2,973,371 UART: [kat] LMS
3,502,830 UART: [kat] --
3,506,054 UART: [cold-reset] ++
3,508,514 UART: [fht] FHT @ 0x50003400
3,518,863 UART: [idev] ++
3,519,439 UART: [idev] CDI.KEYID = 6
3,520,350 UART: [idev] SUBJECT.KEYID = 7
3,521,508 UART: [idev] UDS.KEYID = 0
3,545,990 UART: [idev] Erasing UDS.KEYID = 0
6,026,691 UART: [idev] Sha1 KeyId Algorithm
6,048,657 UART: [idev] --
6,052,206 UART: [ldev] ++
6,052,786 UART: [ldev] CDI.KEYID = 6
6,053,696 UART: [ldev] SUBJECT.KEYID = 5
6,054,861 UART: [ldev] AUTHORITY.KEYID = 7
6,056,151 UART: [ldev] FE.KEYID = 1
6,100,744 UART: [ldev] Erasing FE.KEYID = 1
8,602,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,407 UART: [ldev] --
10,536,552 UART: [fwproc] Wait for Commands...
10,537,947 UART: [fwproc] Recv command 0x46574c44
10,539,748 UART: [fwproc] Recv'd Img size: 114360 bytes
13,943,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,084,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,407,176 UART: [afmc] ++
14,407,797 UART: [afmc] CDI.KEYID = 6
14,408,682 UART: [afmc] SUBJECT.KEYID = 7
14,409,785 UART: [afmc] AUTHORITY.KEYID = 5
16,938,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,660,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,662,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,677,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,693,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,709,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,732,419 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,069 UART:
192,485 UART: Running Caliptra ROM ...
193,613 UART:
193,759 UART: [state] CFI Enabled
266,584 UART: [state] LifecycleState = Unprovisioned
268,444 UART: [state] DebugLocked = No
271,237 UART: [state] WD Timer not started. Device not locked for debugging
274,202 UART: [kat] SHA2-256
453,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,905 UART: [kat] ++
465,437 UART: [kat] sha1
476,379 UART: [kat] SHA2-256
479,396 UART: [kat] SHA2-384
485,323 UART: [kat] SHA2-512-ACC
488,309 UART: [kat] ECC-384
2,950,173 UART: [kat] HMAC-384Kdf
2,973,723 UART: [kat] LMS
3,503,197 UART: [kat] --
3,506,035 UART: [cold-reset] ++
3,507,630 UART: [fht] FHT @ 0x50003400
3,519,273 UART: [idev] ++
3,519,841 UART: [idev] CDI.KEYID = 6
3,520,751 UART: [idev] SUBJECT.KEYID = 7
3,521,965 UART: [idev] UDS.KEYID = 0
3,544,042 UART: [idev] Erasing UDS.KEYID = 0
6,028,890 UART: [idev] Sha1 KeyId Algorithm
6,051,367 UART: [idev] --
6,056,365 UART: [ldev] ++
6,056,948 UART: [ldev] CDI.KEYID = 6
6,057,864 UART: [ldev] SUBJECT.KEYID = 5
6,059,032 UART: [ldev] AUTHORITY.KEYID = 7
6,060,329 UART: [ldev] FE.KEYID = 1
6,101,038 UART: [ldev] Erasing FE.KEYID = 1
8,605,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,422 UART: [ldev] --
10,559,828 UART: [fwproc] Wait for Commands...
10,561,229 UART: [fwproc] Recv command 0x46574c44
10,562,639 UART: [fwproc] Recv'd Img size: 114360 bytes
13,968,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,043,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,112,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,435,525 UART: [afmc] ++
14,436,141 UART: [afmc] CDI.KEYID = 6
14,437,586 UART: [afmc] SUBJECT.KEYID = 7
14,438,627 UART: [afmc] AUTHORITY.KEYID = 5
16,976,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,927 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,461 UART:
192,849 UART: Running Caliptra ROM ...
193,927 UART:
603,457 UART: [state] CFI Enabled
616,113 UART: [state] LifecycleState = Unprovisioned
618,012 UART: [state] DebugLocked = No
620,820 UART: [state] WD Timer not started. Device not locked for debugging
624,819 UART: [kat] SHA2-256
803,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,512 UART: [kat] ++
815,957 UART: [kat] sha1
826,706 UART: [kat] SHA2-256
829,745 UART: [kat] SHA2-384
836,101 UART: [kat] SHA2-512-ACC
839,028 UART: [kat] ECC-384
3,280,790 UART: [kat] HMAC-384Kdf
3,293,410 UART: [kat] LMS
3,822,900 UART: [kat] --
3,825,957 UART: [cold-reset] ++
3,827,976 UART: [fht] FHT @ 0x50003400
3,839,226 UART: [idev] ++
3,839,812 UART: [idev] CDI.KEYID = 6
3,840,718 UART: [idev] SUBJECT.KEYID = 7
3,841,928 UART: [idev] UDS.KEYID = 0
3,856,017 UART: [idev] Erasing UDS.KEYID = 0
6,310,351 UART: [idev] Sha1 KeyId Algorithm
6,332,760 UART: [idev] --
6,336,740 UART: [ldev] ++
6,337,343 UART: [ldev] CDI.KEYID = 6
6,338,256 UART: [ldev] SUBJECT.KEYID = 5
6,339,359 UART: [ldev] AUTHORITY.KEYID = 7
6,340,643 UART: [ldev] FE.KEYID = 1
6,351,070 UART: [ldev] Erasing FE.KEYID = 1
8,823,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,379 UART: [ldev] --
10,759,764 UART: [fwproc] Wait for Commands...
10,761,170 UART: [fwproc] Recv command 0x46574c44
10,762,502 UART: [fwproc] Recv'd Img size: 114360 bytes
14,164,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,312,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,633,931 UART: [afmc] ++
14,634,572 UART: [afmc] CDI.KEYID = 6
14,635,465 UART: [afmc] SUBJECT.KEYID = 7
14,636,634 UART: [afmc] AUTHORITY.KEYID = 5
17,139,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,860,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,861,982 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,877,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,893,799 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,909,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,932,299 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,294 UART: [state] LifecycleState = Unprovisioned
84,949 UART: [state] DebugLocked = No
85,557 UART: [state] WD Timer not started. Device not locked for debugging
86,782 UART: [kat] SHA2-256
890,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,461 UART: [kat] ++
894,613 UART: [kat] sha1
898,993 UART: [kat] SHA2-256
900,933 UART: [kat] SHA2-384
903,680 UART: [kat] SHA2-512-ACC
905,581 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,969 UART: [idev] Sha1 KeyId Algorithm
1,207,931 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,852 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,349 UART: [afmc] ++
2,774,517 UART: [afmc] CDI.KEYID = 6
2,774,880 UART: [afmc] SUBJECT.KEYID = 7
2,775,306 UART: [afmc] AUTHORITY.KEYID = 5
2,810,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,592 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,204 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,714 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,462 UART: [kat] SHA2-256
902,402 UART: [kat] SHA2-384
905,301 UART: [kat] SHA2-512-ACC
907,202 UART: [kat] ECC-384
916,877 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,142 UART: [fht] FHT @ 0x50003400
1,173,890 UART: [idev] ++
1,174,058 UART: [idev] CDI.KEYID = 6
1,174,419 UART: [idev] SUBJECT.KEYID = 7
1,174,844 UART: [idev] UDS.KEYID = 0
1,182,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,842 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,243,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,899 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,518 UART: [afmc] ++
2,774,686 UART: [afmc] CDI.KEYID = 6
2,775,049 UART: [afmc] SUBJECT.KEYID = 7
2,775,475 UART: [afmc] AUTHORITY.KEYID = 5
2,811,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,706 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,308 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,917 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,245 UART: [kat] SHA2-256
901,185 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,093 UART: [idev] Sha1 KeyId Algorithm
1,206,839 UART: [idev] --
1,207,966 UART: [ldev] ++
1,208,134 UART: [ldev] CDI.KEYID = 6
1,208,498 UART: [ldev] SUBJECT.KEYID = 5
1,208,925 UART: [ldev] AUTHORITY.KEYID = 7
1,209,388 UART: [ldev] FE.KEYID = 1
1,214,304 UART: [ldev] Erasing FE.KEYID = 1
1,240,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,756 UART: [ldev] --
1,280,088 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,483 UART: [afmc] ++
2,772,651 UART: [afmc] CDI.KEYID = 6
2,773,014 UART: [afmc] SUBJECT.KEYID = 7
2,773,440 UART: [afmc] AUTHORITY.KEYID = 5
2,808,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,077 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,122 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,335 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,756 UART: [afmc] ++
2,774,924 UART: [afmc] CDI.KEYID = 6
2,775,287 UART: [afmc] SUBJECT.KEYID = 7
2,775,713 UART: [afmc] AUTHORITY.KEYID = 5
2,811,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,204 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,835 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,355 UART: [kat] SHA2-256
901,295 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,298 UART: [kat] HMAC-384Kdf
919,930 UART: [kat] LMS
1,168,242 UART: [kat] --
1,168,955 UART: [cold-reset] ++
1,169,317 UART: [fht] FHT @ 0x50003400
1,172,155 UART: [idev] ++
1,172,323 UART: [idev] CDI.KEYID = 6
1,172,684 UART: [idev] SUBJECT.KEYID = 7
1,173,109 UART: [idev] UDS.KEYID = 0
1,181,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,326 UART: [ldev] ++
1,208,494 UART: [ldev] CDI.KEYID = 6
1,208,858 UART: [ldev] SUBJECT.KEYID = 5
1,209,285 UART: [ldev] AUTHORITY.KEYID = 7
1,209,748 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,606 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,483 UART: [fwproc] Recv command 0x46574c44
1,282,216 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,045 UART: [afmc] ++
2,775,213 UART: [afmc] CDI.KEYID = 6
2,775,576 UART: [afmc] SUBJECT.KEYID = 7
2,776,002 UART: [afmc] AUTHORITY.KEYID = 5
2,811,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,950 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,645 UART: [ldev] ++
1,208,813 UART: [ldev] CDI.KEYID = 6
1,209,177 UART: [ldev] SUBJECT.KEYID = 5
1,209,604 UART: [ldev] AUTHORITY.KEYID = 7
1,210,067 UART: [ldev] FE.KEYID = 1
1,215,533 UART: [ldev] Erasing FE.KEYID = 1
1,241,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,219 UART: [ldev] --
1,280,663 UART: [fwproc] Wait for Commands...
1,281,372 UART: [fwproc] Recv command 0x46574c44
1,282,105 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,174 UART: [afmc] ++
2,774,342 UART: [afmc] CDI.KEYID = 6
2,774,705 UART: [afmc] SUBJECT.KEYID = 7
2,775,131 UART: [afmc] AUTHORITY.KEYID = 5
2,810,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,739 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,030 UART:
192,411 UART: Running Caliptra ROM ...
193,543 UART:
193,692 UART: [state] CFI Enabled
262,174 UART: [state] LifecycleState = Unprovisioned
264,542 UART: [state] DebugLocked = No
267,074 UART: [state] WD Timer not started. Device not locked for debugging
272,038 UART: [kat] SHA2-256
453,946 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,464 UART: [kat] ++
466,067 UART: [kat] sha1
476,455 UART: [kat] SHA2-256
479,524 UART: [kat] SHA2-384
484,370 UART: [kat] SHA2-512-ACC
487,025 UART: [kat] ECC-384
3,778,454 UART: [kat] HMAC-384Kdf
3,800,494 UART: [kat] LMS
4,873,628 UART: [kat] --
4,878,635 UART: [cold-reset] ++
4,880,498 UART: [fht] FHT @ 0x50003400
4,893,187 UART: [idev] ++
4,893,861 UART: [idev] CDI.KEYID = 6
4,895,041 UART: [idev] SUBJECT.KEYID = 7
4,896,176 UART: [idev] UDS.KEYID = 0
4,897,073 ready_for_fw is high
4,897,282 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,031,372 UART: [idev] Erasing UDS.KEYID = 0
8,242,304 UART: [idev] Sha1 KeyId Algorithm
8,263,527 UART: [idev] --
8,268,188 UART: [ldev] ++
8,268,758 UART: [ldev] CDI.KEYID = 6
8,269,938 UART: [ldev] SUBJECT.KEYID = 5
8,271,156 UART: [ldev] AUTHORITY.KEYID = 7
8,272,308 UART: [ldev] FE.KEYID = 1
8,316,957 UART: [ldev] Erasing FE.KEYID = 1
11,653,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,641 UART: [ldev] --
14,035,953 UART: [fwproc] Wait for Commands...
14,038,859 UART: [fwproc] Recv command 0x46574c44
14,041,112 UART: [fwproc] Recv'd Img size: 106532 bytes
18,028,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,103,972 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,146,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,463,590 >>> mbox cmd response: success
18,467,820 UART: [afmc] ++
18,468,436 UART: [afmc] CDI.KEYID = 6
18,469,626 UART: [afmc] SUBJECT.KEYID = 7
18,470,785 UART: [afmc] AUTHORITY.KEYID = 5
21,836,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,134,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,137,020 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,153,020 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,169,105 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,185,221 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,208,263 UART: [afmc] --
24,212,051 UART: [cold-reset] --
24,216,182 UART: [state] Locking Datavault
24,221,895 UART: [state] Locking PCR0, PCR1 and PCR31
24,223,533 UART: [state] Locking ICCM
24,225,016 UART: [exit] Launching FMC @ 0x40000000
24,233,595 UART:
24,233,839 UART: Running Caliptra FMC ...
24,234,985 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
4,803,622 ready_for_fw is high
4,804,045 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,226,023 >>> mbox cmd response: success
23,931,614 UART:
23,932,018 UART: Running Caliptra FMC ...
23,933,295 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,358 UART:
192,898 UART: Running Caliptra ROM ...
194,064 UART:
603,312 UART: [state] CFI Enabled
614,626 UART: [state] LifecycleState = Unprovisioned
616,941 UART: [state] DebugLocked = No
619,041 UART: [state] WD Timer not started. Device not locked for debugging
624,067 UART: [kat] SHA2-256
806,073 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,576 UART: [kat] ++
818,176 UART: [kat] sha1
828,416 UART: [kat] SHA2-256
831,487 UART: [kat] SHA2-384
837,330 UART: [kat] SHA2-512-ACC
839,973 UART: [kat] ECC-384
4,093,351 UART: [kat] HMAC-384Kdf
4,105,164 UART: [kat] LMS
5,178,367 UART: [kat] --
5,183,786 UART: [cold-reset] ++
5,186,285 UART: [fht] FHT @ 0x50003400
5,196,617 UART: [idev] ++
5,197,315 UART: [idev] CDI.KEYID = 6
5,198,556 UART: [idev] SUBJECT.KEYID = 7
5,200,011 UART: [idev] UDS.KEYID = 0
5,201,119 ready_for_fw is high
5,201,311 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,335,206 UART: [idev] Erasing UDS.KEYID = 0
8,487,585 UART: [idev] Sha1 KeyId Algorithm
8,510,291 UART: [idev] --
8,513,992 UART: [ldev] ++
8,514,565 UART: [ldev] CDI.KEYID = 6
8,515,796 UART: [ldev] SUBJECT.KEYID = 5
8,517,280 UART: [ldev] AUTHORITY.KEYID = 7
8,518,810 UART: [ldev] FE.KEYID = 1
8,530,531 UART: [ldev] Erasing FE.KEYID = 1
11,818,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,157,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,272 UART: [ldev] --
14,184,651 UART: [fwproc] Wait for Commands...
14,186,852 UART: [fwproc] Recv command 0x46574c44
14,189,155 UART: [fwproc] Recv'd Img size: 106532 bytes
18,173,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,247,281 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,289,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,606,396 >>> mbox cmd response: success
18,611,242 UART: [afmc] ++
18,611,873 UART: [afmc] CDI.KEYID = 6
18,612,928 UART: [afmc] SUBJECT.KEYID = 7
18,614,148 UART: [afmc] AUTHORITY.KEYID = 5
21,928,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,222,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,225,291 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,241,321 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,257,363 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,273,472 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,296,733 UART: [afmc] --
24,300,755 UART: [cold-reset] --
24,306,201 UART: [state] Locking Datavault
24,311,637 UART: [state] Locking PCR0, PCR1 and PCR31
24,313,369 UART: [state] Locking ICCM
24,314,927 UART: [exit] Launching FMC @ 0x40000000
24,323,536 UART:
24,323,801 UART: Running Caliptra FMC ...
24,324,943 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
5,100,194 ready_for_fw is high
5,100,638 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,417,506 >>> mbox cmd response: success
24,058,015 UART:
24,058,432 UART: Running Caliptra FMC ...
24,059,707 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,142 UART:
192,508 UART: Running Caliptra ROM ...
193,696 UART:
193,847 UART: [state] CFI Enabled
264,297 UART: [state] LifecycleState = Unprovisioned
266,206 UART: [state] DebugLocked = No
269,091 UART: [state] WD Timer not started. Device not locked for debugging
272,635 UART: [kat] SHA2-256
451,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,322 UART: [kat] ++
463,852 UART: [kat] sha1
475,517 UART: [kat] SHA2-256
478,572 UART: [kat] SHA2-384
485,217 UART: [kat] SHA2-512-ACC
488,157 UART: [kat] ECC-384
2,952,304 UART: [kat] HMAC-384Kdf
2,974,991 UART: [kat] LMS
3,504,433 UART: [kat] --
3,507,797 UART: [cold-reset] ++
3,509,234 UART: [fht] FHT @ 0x50003400
3,521,088 UART: [idev] ++
3,521,703 UART: [idev] CDI.KEYID = 6
3,522,624 UART: [idev] SUBJECT.KEYID = 7
3,523,799 UART: [idev] UDS.KEYID = 0
3,524,722 ready_for_fw is high
3,524,905 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,659,219 UART: [idev] Erasing UDS.KEYID = 0
6,031,483 UART: [idev] Sha1 KeyId Algorithm
6,053,462 UART: [idev] --
6,058,112 UART: [ldev] ++
6,058,691 UART: [ldev] CDI.KEYID = 6
6,059,604 UART: [ldev] SUBJECT.KEYID = 5
6,060,710 UART: [ldev] AUTHORITY.KEYID = 7
6,062,003 UART: [ldev] FE.KEYID = 1
6,106,351 UART: [ldev] Erasing FE.KEYID = 1
8,612,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,731 UART: [ldev] --
10,416,076 UART: [fwproc] Wait for Commands...
10,418,608 UART: [fwproc] Recv command 0x46574c44
10,420,730 UART: [fwproc] Recv'd Img size: 106876 bytes
13,727,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,799,713 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,842,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,160,348 >>> mbox cmd response: success
14,165,359 UART: [afmc] ++
14,165,975 UART: [afmc] CDI.KEYID = 6
14,166,889 UART: [afmc] SUBJECT.KEYID = 7
14,167,993 UART: [afmc] AUTHORITY.KEYID = 5
16,709,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,431,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,433,079 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,449,058 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,464,967 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,480,968 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,504,766 UART: [afmc] --
18,508,145 UART: [cold-reset] --
18,511,268 UART: [state] Locking Datavault
18,517,281 UART: [state] Locking PCR0, PCR1 and PCR31
18,518,974 UART: [state] Locking ICCM
18,520,219 UART: [exit] Launching FMC @ 0x40000000
18,528,618 UART:
18,528,867 UART: Running Caliptra FMC ...
18,530,008 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,087 UART:
192,469 UART: Running Caliptra ROM ...
193,589 UART:
193,739 UART: [state] CFI Enabled
261,571 UART: [state] LifecycleState = Unprovisioned
263,488 UART: [state] DebugLocked = No
266,165 UART: [state] WD Timer not started. Device not locked for debugging
269,624 UART: [kat] SHA2-256
448,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,353 UART: [kat] ++
460,896 UART: [kat] sha1
471,210 UART: [kat] SHA2-256
474,213 UART: [kat] SHA2-384
480,350 UART: [kat] SHA2-512-ACC
483,306 UART: [kat] ECC-384
2,945,863 UART: [kat] HMAC-384Kdf
2,969,680 UART: [kat] LMS
3,499,151 UART: [kat] --
3,503,496 UART: [cold-reset] ++
3,505,284 UART: [fht] FHT @ 0x50003400
3,516,617 UART: [idev] ++
3,517,184 UART: [idev] CDI.KEYID = 6
3,518,136 UART: [idev] SUBJECT.KEYID = 7
3,519,309 UART: [idev] UDS.KEYID = 0
3,520,277 ready_for_fw is high
3,520,460 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,654,913 UART: [idev] Erasing UDS.KEYID = 0
6,023,732 UART: [idev] Sha1 KeyId Algorithm
6,046,320 UART: [idev] --
6,050,102 UART: [ldev] ++
6,050,741 UART: [ldev] CDI.KEYID = 6
6,051,642 UART: [ldev] SUBJECT.KEYID = 5
6,052,755 UART: [ldev] AUTHORITY.KEYID = 7
6,053,995 UART: [ldev] FE.KEYID = 1
6,097,645 UART: [ldev] Erasing FE.KEYID = 1
8,599,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,316 UART: [ldev] --
10,391,079 UART: [fwproc] Wait for Commands...
10,393,397 UART: [fwproc] Recv command 0x46574c44
10,395,437 UART: [fwproc] Recv'd Img size: 106876 bytes
13,710,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,787,694 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,830,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,147,911 >>> mbox cmd response: success
14,152,052 UART: [afmc] ++
14,152,672 UART: [afmc] CDI.KEYID = 6
14,153,591 UART: [afmc] SUBJECT.KEYID = 7
14,154,698 UART: [afmc] AUTHORITY.KEYID = 5
16,697,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,419,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,421,667 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,437,667 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,453,572 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,469,562 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,491,691 UART: [afmc] --
18,495,141 UART: [cold-reset] --
18,500,424 UART: [state] Locking Datavault
18,505,414 UART: [state] Locking PCR0, PCR1 and PCR31
18,507,123 UART: [state] Locking ICCM
18,508,785 UART: [exit] Launching FMC @ 0x40000000
18,517,110 UART:
18,517,362 UART: Running Caliptra FMC ...
18,518,511 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,359,093 ready_for_fw is high
3,359,727 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,939,138 >>> mbox cmd response: success
18,216,637 UART:
18,217,059 UART: Running Caliptra FMC ...
18,218,340 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,454 UART:
192,823 UART: Running Caliptra ROM ...
193,914 UART:
603,739 UART: [state] CFI Enabled
614,902 UART: [state] LifecycleState = Unprovisioned
616,780 UART: [state] DebugLocked = No
619,443 UART: [state] WD Timer not started. Device not locked for debugging
623,112 UART: [kat] SHA2-256
802,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,802 UART: [kat] ++
814,344 UART: [kat] sha1
825,293 UART: [kat] SHA2-256
828,323 UART: [kat] SHA2-384
834,844 UART: [kat] SHA2-512-ACC
837,782 UART: [kat] ECC-384
3,280,883 UART: [kat] HMAC-384Kdf
3,292,657 UART: [kat] LMS
3,822,157 UART: [kat] --
3,825,885 UART: [cold-reset] ++
3,827,739 UART: [fht] FHT @ 0x50003400
3,839,421 UART: [idev] ++
3,839,975 UART: [idev] CDI.KEYID = 6
3,840,851 UART: [idev] SUBJECT.KEYID = 7
3,842,091 UART: [idev] UDS.KEYID = 0
3,842,991 ready_for_fw is high
3,843,217 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,977,553 UART: [idev] Erasing UDS.KEYID = 0
6,316,060 UART: [idev] Sha1 KeyId Algorithm
6,339,735 UART: [idev] --
6,343,297 UART: [ldev] ++
6,343,862 UART: [ldev] CDI.KEYID = 6
6,344,738 UART: [ldev] SUBJECT.KEYID = 5
6,345,942 UART: [ldev] AUTHORITY.KEYID = 7
6,347,308 UART: [ldev] FE.KEYID = 1
6,355,893 UART: [ldev] Erasing FE.KEYID = 1
8,828,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,127 UART: [ldev] --
10,619,437 UART: [fwproc] Wait for Commands...
10,622,447 UART: [fwproc] Recv command 0x46574c44
10,624,532 UART: [fwproc] Recv'd Img size: 106876 bytes
13,934,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,590 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,052,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,369,535 >>> mbox cmd response: success
14,372,979 UART: [afmc] ++
14,373,601 UART: [afmc] CDI.KEYID = 6
14,374,488 UART: [afmc] SUBJECT.KEYID = 7
14,375,646 UART: [afmc] AUTHORITY.KEYID = 5
16,878,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,601,707 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,617,700 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,633,633 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,649,576 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,673,803 UART: [afmc] --
18,677,316 UART: [cold-reset] --
18,682,369 UART: [state] Locking Datavault
18,688,244 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,926 UART: [state] Locking ICCM
18,691,901 UART: [exit] Launching FMC @ 0x40000000
18,700,269 UART:
18,700,508 UART: Running Caliptra FMC ...
18,701,568 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,698,510 ready_for_fw is high
3,699,109 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,153,180 >>> mbox cmd response: success
18,400,977 UART:
18,401,368 UART: Running Caliptra FMC ...
18,402,571 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: [kat] ++
895,185 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
915,392 UART: [kat] HMAC-384Kdf
919,978 UART: [kat] LMS
1,168,290 UART: [kat] --
1,169,003 UART: [cold-reset] ++
1,169,389 UART: [fht] FHT @ 0x50003400
1,172,055 UART: [idev] ++
1,172,223 UART: [idev] CDI.KEYID = 6
1,172,584 UART: [idev] SUBJECT.KEYID = 7
1,173,009 UART: [idev] UDS.KEYID = 0
1,173,355 ready_for_fw is high
1,173,355 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,069 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,056 UART: [ldev] ++
1,208,224 UART: [ldev] CDI.KEYID = 6
1,208,588 UART: [ldev] SUBJECT.KEYID = 5
1,209,015 UART: [ldev] AUTHORITY.KEYID = 7
1,209,478 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,241,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 106876 bytes
2,491,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,840 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,672,793 >>> mbox cmd response: success
2,673,952 UART: [afmc] ++
2,674,120 UART: [afmc] CDI.KEYID = 6
2,674,483 UART: [afmc] SUBJECT.KEYID = 7
2,674,909 UART: [afmc] AUTHORITY.KEYID = 5
2,710,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,024 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,744 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,637 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,330 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,099 UART: [afmc] --
2,753,031 UART: [cold-reset] --
2,754,001 UART: [state] Locking Datavault
2,755,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,660 UART: [state] Locking ICCM
2,756,258 UART: [exit] Launching FMC @ 0x40000000
2,761,555 UART:
2,761,571 UART: Running Caliptra FMC ...
2,761,979 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,312 ready_for_fw is high
1,056,312 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,033 >>> mbox cmd response: success
2,586,572 UART:
2,586,588 UART: Running Caliptra FMC ...
2,586,996 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,872 UART: [kat] ++
896,024 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 ready_for_fw is high
1,174,434 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,199,346 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,554 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,935 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,018 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,908 >>> mbox cmd response: success
2,677,051 UART: [afmc] ++
2,677,219 UART: [afmc] CDI.KEYID = 6
2,677,582 UART: [afmc] SUBJECT.KEYID = 7
2,678,008 UART: [afmc] AUTHORITY.KEYID = 5
2,713,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,515 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,235 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,128 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,821 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,836 UART: [afmc] --
2,756,738 UART: [cold-reset] --
2,757,694 UART: [state] Locking Datavault
2,759,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,657 UART: [state] Locking ICCM
2,760,091 UART: [exit] Launching FMC @ 0x40000000
2,765,388 UART:
2,765,404 UART: Running Caliptra FMC ...
2,765,812 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,235 ready_for_fw is high
1,055,235 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,522,876 >>> mbox cmd response: success
2,584,349 UART:
2,584,365 UART: Running Caliptra FMC ...
2,584,773 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,534 UART: [state] LifecycleState = Unprovisioned
85,189 UART: [state] DebugLocked = No
85,671 UART: [state] WD Timer not started. Device not locked for debugging
86,842 UART: [kat] SHA2-256
890,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,521 UART: [kat] ++
894,673 UART: [kat] sha1
898,897 UART: [kat] SHA2-256
900,837 UART: [kat] SHA2-384
903,628 UART: [kat] SHA2-512-ACC
905,529 UART: [kat] ECC-384
915,246 UART: [kat] HMAC-384Kdf
919,846 UART: [kat] LMS
1,168,158 UART: [kat] --
1,168,975 UART: [cold-reset] ++
1,169,449 UART: [fht] FHT @ 0x50003400
1,172,157 UART: [idev] ++
1,172,325 UART: [idev] CDI.KEYID = 6
1,172,686 UART: [idev] SUBJECT.KEYID = 7
1,173,111 UART: [idev] UDS.KEYID = 0
1,173,457 ready_for_fw is high
1,173,457 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,180,865 UART: [idev] Erasing UDS.KEYID = 0
1,197,723 UART: [idev] Sha1 KeyId Algorithm
1,206,623 UART: [idev] --
1,207,640 UART: [ldev] ++
1,207,808 UART: [ldev] CDI.KEYID = 6
1,208,172 UART: [ldev] SUBJECT.KEYID = 5
1,208,599 UART: [ldev] AUTHORITY.KEYID = 7
1,209,062 UART: [ldev] FE.KEYID = 1
1,214,252 UART: [ldev] Erasing FE.KEYID = 1
1,240,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,330 UART: [ldev] --
1,279,738 UART: [fwproc] Wait for Commands...
1,280,363 UART: [fwproc] Recv command 0x46574c44
1,281,096 UART: [fwproc] Recv'd Img size: 106876 bytes
2,491,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,864 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,671,751 >>> mbox cmd response: success
2,672,958 UART: [afmc] ++
2,673,126 UART: [afmc] CDI.KEYID = 6
2,673,489 UART: [afmc] SUBJECT.KEYID = 7
2,673,915 UART: [afmc] AUTHORITY.KEYID = 5
2,709,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,788 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,508 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,401 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,094 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,745 UART: [afmc] --
2,752,829 UART: [cold-reset] --
2,753,547 UART: [state] Locking Datavault
2,754,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,300 UART: [state] Locking ICCM
2,755,942 UART: [exit] Launching FMC @ 0x40000000
2,761,239 UART:
2,761,255 UART: Running Caliptra FMC ...
2,761,663 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,166 ready_for_fw is high
1,056,166 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,713 >>> mbox cmd response: success
2,586,972 UART:
2,586,988 UART: Running Caliptra FMC ...
2,587,396 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,991 UART: [state] LifecycleState = Unprovisioned
86,646 UART: [state] DebugLocked = No
87,304 UART: [state] WD Timer not started. Device not locked for debugging
88,477 UART: [kat] SHA2-256
892,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,156 UART: [kat] ++
896,308 UART: [kat] sha1
900,422 UART: [kat] SHA2-256
902,362 UART: [kat] SHA2-384
905,111 UART: [kat] SHA2-512-ACC
907,012 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,174,664 ready_for_fw is high
1,174,664 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,418 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,591 UART: [ldev] --
1,282,081 UART: [fwproc] Wait for Commands...
1,282,690 UART: [fwproc] Recv command 0x46574c44
1,283,423 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,039 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,088 >>> mbox cmd response: success
2,676,255 UART: [afmc] ++
2,676,423 UART: [afmc] CDI.KEYID = 6
2,676,786 UART: [afmc] SUBJECT.KEYID = 7
2,677,212 UART: [afmc] AUTHORITY.KEYID = 5
2,713,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,313 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,033 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,926 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,619 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,264 UART: [afmc] --
2,756,202 UART: [cold-reset] --
2,756,910 UART: [state] Locking Datavault
2,757,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,479 UART: [state] Locking ICCM
2,759,007 UART: [exit] Launching FMC @ 0x40000000
2,764,304 UART:
2,764,320 UART: Running Caliptra FMC ...
2,764,728 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,855 ready_for_fw is high
1,056,855 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,527,024 >>> mbox cmd response: success
2,589,607 UART:
2,589,623 UART: Running Caliptra FMC ...
2,590,031 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,127 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,174,483 ready_for_fw is high
1,174,483 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,937 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,056 UART: [ldev] Erasing FE.KEYID = 1
1,240,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,320 UART: [ldev] --
1,279,660 UART: [fwproc] Wait for Commands...
1,280,379 UART: [fwproc] Recv command 0x46574c44
1,281,112 UART: [fwproc] Recv'd Img size: 106876 bytes
2,491,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,222 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,207 >>> mbox cmd response: success
2,674,228 UART: [afmc] ++
2,674,396 UART: [afmc] CDI.KEYID = 6
2,674,759 UART: [afmc] SUBJECT.KEYID = 7
2,675,185 UART: [afmc] AUTHORITY.KEYID = 5
2,711,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,334 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,054 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,947 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,640 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,489 UART: [afmc] --
2,754,579 UART: [cold-reset] --
2,755,511 UART: [state] Locking Datavault
2,756,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,592 UART: [state] Locking ICCM
2,758,108 UART: [exit] Launching FMC @ 0x40000000
2,763,405 UART:
2,763,421 UART: Running Caliptra FMC ...
2,763,829 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,764 ready_for_fw is high
1,056,764 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,937 >>> mbox cmd response: success
2,587,016 UART:
2,587,032 UART: Running Caliptra FMC ...
2,587,440 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,174,620 ready_for_fw is high
1,174,620 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,215,849 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,317 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,579 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,640 >>> mbox cmd response: success
2,674,791 UART: [afmc] ++
2,674,959 UART: [afmc] CDI.KEYID = 6
2,675,322 UART: [afmc] SUBJECT.KEYID = 7
2,675,748 UART: [afmc] AUTHORITY.KEYID = 5
2,711,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,839 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,559 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,452 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,145 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,140 UART: [afmc] --
2,755,180 UART: [cold-reset] --
2,755,934 UART: [state] Locking Datavault
2,757,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,637 UART: [state] Locking ICCM
2,758,113 UART: [exit] Launching FMC @ 0x40000000
2,763,410 UART:
2,763,426 UART: Running Caliptra FMC ...
2,763,834 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 ready_for_fw is high
1,056,163 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,468 >>> mbox cmd response: success
2,588,253 UART:
2,588,269 UART: Running Caliptra FMC ...
2,588,677 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,214,694 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,356,238 UART:
2,356,700 UART: Running Caliptra ROM ...
2,357,780 UART:
2,357,946 UART: [state] CFI Enabled
2,358,906 UART: [state] LifecycleState = Unprovisioned
2,360,561 UART: [state] DebugLocked = No
2,361,666 UART: [state] WD Timer not started. Device not locked for debugging
2,364,151 UART: [fake-rom-cold-reset] ++
2,365,255 UART: [fht] FHT @ 0x50003400
2,366,281 UART: [fwproc] Wait for Commands...
2,367,558 UART: [fwproc] Recv command 0x46574c44
2,368,982 UART: [fwproc] Recv'd Img size: 111600 bytes
3,778,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,857,325 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,967,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,551,974 >>> mbox cmd response: success
4,558,016 UART: [fake-rom-cold-reset] --
4,561,247 UART: [state] Locking Datavault
4,568,504 UART: [state] Locking PCR0, PCR1 and PCR31
4,570,697 UART: [state] Locking ICCM
4,572,648 UART: [exit] Launching FMC @ 0x40000000
4,581,433 UART:
4,581,682 UART: Running Caliptra FMC ...
4,582,818 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,215,838 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,357,158 UART:
2,357,732 UART: Running Caliptra ROM ...
2,359,076 UART:
2,359,250 UART: [state] CFI Enabled
2,360,147 UART: [state] LifecycleState = Unprovisioned
2,361,837 UART: [state] DebugLocked = No
2,362,947 UART: [state] WD Timer not started. Device not locked for debugging
2,365,446 UART: [fake-rom-cold-reset] ++
2,366,553 UART: [fht] FHT @ 0x50003400
2,367,584 UART: [fwproc] Wait for Commands...
2,368,863 UART: [fwproc] Recv command 0x46574c44
2,370,294 UART: [fwproc] Recv'd Img size: 111600 bytes
3,782,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,858,035 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,968,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,554,212 >>> mbox cmd response: success
4,560,269 UART: [fake-rom-cold-reset] --
4,565,382 UART: [state] Locking Datavault
4,570,419 UART: [state] Locking PCR0, PCR1 and PCR31
4,572,604 UART: [state] Locking ICCM
4,575,444 UART: [exit] Launching FMC @ 0x40000000
4,584,235 UART:
4,584,482 UART: Running Caliptra FMC ...
4,585,631 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,224,330 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,366,003 UART:
2,366,452 UART: Running Caliptra ROM ...
2,367,535 UART:
2,367,683 UART: [state] CFI Enabled
2,368,580 UART: [state] LifecycleState = Unprovisioned
2,370,233 UART: [state] DebugLocked = No
2,371,253 UART: [state] WD Timer not started. Device not locked for debugging
2,373,718 UART: [fake-rom-cold-reset] ++
2,374,737 UART: [fht] FHT @ 0x50003400
2,375,675 UART: [fwproc] Wait for Commands...
2,376,948 UART: [fwproc] Recv command 0x46574c44
2,378,286 UART: [fwproc] Recv'd Img size: 111600 bytes
3,788,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,868,333 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,978,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,563,915 >>> mbox cmd response: success
4,569,984 UART: [fake-rom-cold-reset] --
4,574,830 UART: [state] Locking Datavault
4,579,041 UART: [state] Locking PCR0, PCR1 and PCR31
4,581,241 UART: [state] Locking ICCM
4,582,720 UART: [exit] Launching FMC @ 0x40000000
4,591,458 UART:
4,591,706 UART: Running Caliptra FMC ...
4,592,843 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,230,829 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,372,069 UART:
2,372,501 UART: Running Caliptra ROM ...
2,373,672 UART:
2,373,835 UART: [state] CFI Enabled
2,374,800 UART: [state] LifecycleState = Unprovisioned
2,376,456 UART: [state] DebugLocked = No
2,377,556 UART: [state] WD Timer not started. Device not locked for debugging
2,380,020 UART: [fake-rom-cold-reset] ++
2,381,153 UART: [fht] FHT @ 0x50003400
2,382,187 UART: [fwproc] Wait for Commands...
2,383,466 UART: [fwproc] Recv command 0x46574c44
2,384,891 UART: [fwproc] Recv'd Img size: 111600 bytes
3,798,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,877,572 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,987,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,573,169 >>> mbox cmd response: success
4,579,201 UART: [fake-rom-cold-reset] --
4,583,213 UART: [state] Locking Datavault
4,588,417 UART: [state] Locking PCR0, PCR1 and PCR31
4,590,615 UART: [state] Locking ICCM
4,593,395 UART: [exit] Launching FMC @ 0x40000000
4,602,152 UART:
4,602,396 UART: Running Caliptra FMC ...
4,603,530 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,217,851 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,359,496 UART:
2,359,931 UART: Running Caliptra ROM ...
2,361,107 UART:
2,361,284 UART: [state] CFI Enabled
2,362,260 UART: [state] LifecycleState = Unprovisioned
2,363,911 UART: [state] DebugLocked = No
2,365,019 UART: [state] WD Timer not started. Device not locked for debugging
2,367,493 UART: [fake-rom-cold-reset] ++
2,368,602 UART: [fht] FHT @ 0x50003400
2,369,637 UART: [fwproc] Wait for Commands...
2,370,926 UART: [fwproc] Recv command 0x46574c44
2,372,353 UART: [fwproc] Recv'd Img size: 111944 bytes
3,814,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,015 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,947,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,264,919 >>> mbox cmd response: success
4,270,785 UART: [fake-rom-cold-reset] --
4,273,046 UART: [state] Locking Datavault
4,278,112 UART: [state] Locking PCR0, PCR1 and PCR31
4,279,721 UART: [state] Locking ICCM
4,282,290 UART: [exit] Launching FMC @ 0x40000000
4,290,502 UART:
4,290,756 UART: Running Caliptra FMC ...
4,291,892 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,225,618 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,367,010 UART:
2,367,405 UART: Running Caliptra ROM ...
2,368,574 UART:
2,368,748 UART: [state] CFI Enabled
2,369,743 UART: [state] LifecycleState = Unprovisioned
2,371,394 UART: [state] DebugLocked = No
2,372,527 UART: [state] WD Timer not started. Device not locked for debugging
2,375,009 UART: [fake-rom-cold-reset] ++
2,376,128 UART: [fht] FHT @ 0x50003400
2,377,162 UART: [fwproc] Wait for Commands...
2,378,824 UART: [fwproc] Recv command 0x46574c44
2,380,193 UART: [fwproc] Recv'd Img size: 111944 bytes
3,828,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,899,810 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,959,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,277,208 >>> mbox cmd response: success
4,283,008 UART: [fake-rom-cold-reset] --
4,285,199 UART: [state] Locking Datavault
4,290,788 UART: [state] Locking PCR0, PCR1 and PCR31
4,292,393 UART: [state] Locking ICCM
4,294,066 UART: [exit] Launching FMC @ 0x40000000
4,302,299 UART:
4,302,625 UART: Running Caliptra FMC ...
4,303,722 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,227,703 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,369,379 UART:
2,369,815 UART: Running Caliptra ROM ...
2,370,900 UART:
2,371,052 UART: [state] CFI Enabled
2,372,035 UART: [state] LifecycleState = Unprovisioned
2,373,690 UART: [state] DebugLocked = No
2,374,714 UART: [state] WD Timer not started. Device not locked for debugging
2,377,184 UART: [fake-rom-cold-reset] ++
2,378,235 UART: [fht] FHT @ 0x50003400
2,379,214 UART: [fwproc] Wait for Commands...
2,380,504 UART: [fwproc] Recv command 0x46574c44
2,381,851 UART: [fwproc] Recv'd Img size: 111944 bytes
3,822,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,895,820 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,955,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,273,735 >>> mbox cmd response: success
4,279,552 UART: [fake-rom-cold-reset] --
4,283,652 UART: [state] Locking Datavault
4,290,329 UART: [state] Locking PCR0, PCR1 and PCR31
4,291,938 UART: [state] Locking ICCM
4,293,055 UART: [exit] Launching FMC @ 0x40000000
4,301,272 UART:
4,301,524 UART: Running Caliptra FMC ...
4,302,574 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,222,211 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,363,732 UART:
2,364,141 UART: Running Caliptra ROM ...
2,365,310 UART:
2,365,481 UART: [state] CFI Enabled
2,366,375 UART: [state] LifecycleState = Unprovisioned
2,368,011 UART: [state] DebugLocked = No
2,369,036 UART: [state] WD Timer not started. Device not locked for debugging
2,371,523 UART: [fake-rom-cold-reset] ++
2,372,546 UART: [fht] FHT @ 0x50003400
2,373,522 UART: [fwproc] Wait for Commands...
2,374,807 UART: [fwproc] Recv command 0x46574c44
2,376,150 UART: [fwproc] Recv'd Img size: 111944 bytes
3,821,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,890,872 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,269,049 >>> mbox cmd response: success
4,274,888 UART: [fake-rom-cold-reset] --
4,278,295 UART: [state] Locking Datavault
4,282,334 UART: [state] Locking PCR0, PCR1 and PCR31
4,283,933 UART: [state] Locking ICCM
4,284,925 UART: [exit] Launching FMC @ 0x40000000
4,293,079 UART:
4,293,341 UART: Running Caliptra FMC ...
4,294,417 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
2,223,088 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,365,119 UART:
2,365,559 UART: Running Caliptra ROM ...
2,366,640 UART:
2,366,796 UART: [state] CFI Enabled
2,367,783 UART: [state] LifecycleState = Unprovisioned
2,369,441 UART: [state] DebugLocked = No
2,370,546 UART: [state] WD Timer not started. Device not locked for debugging
2,373,030 UART: [fake-rom-cold-reset] ++
2,374,137 UART: [fht] FHT @ 0x50003400
2,375,168 UART: [fwproc] Wait for Commands...
2,376,464 UART: [fwproc] Recv command 0x46574c44
2,377,892 UART: [fwproc] Recv'd Img size: 111944 bytes
3,821,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,893,989 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,271,249 >>> mbox cmd response: success
4,277,110 UART: [fake-rom-cold-reset] --
4,280,392 UART: [state] Locking Datavault
4,285,622 UART: [state] Locking PCR0, PCR1 and PCR31
4,287,225 UART: [state] Locking ICCM
4,289,109 UART: [exit] Launching FMC @ 0x40000000
4,297,334 UART:
4,297,581 UART: Running Caliptra FMC ...
4,298,712 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [fake-rom-cold-reset] ++
88,776 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,062 UART: [fht] FHT @ 0x50003400
92,279 UART: [fwproc] Wait for Commands...
92,952 UART: [fwproc] Recv command 0x46574c44
93,680 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,880 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,534 >>> mbox cmd response: success
1,547,692 UART: [fake-rom-cold-reset] --
1,548,690 UART: [state] Locking Datavault
1,549,743 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,347 UART: [state] Locking ICCM
1,550,939 UART: [exit] Launching FMC @ 0x40000000
1,556,236 UART:
1,556,252 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [fake-rom-cold-reset] ++
88,618 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,934 UART: [fht] FHT @ 0x50003400
92,173 UART: [fwproc] Wait for Commands...
92,988 UART: [fwproc] Recv command 0x46574c44
93,716 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,886 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,368 >>> mbox cmd response: success
1,549,526 UART: [fake-rom-cold-reset] --
1,550,320 UART: [state] Locking Datavault
1,551,243 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,847 UART: [state] Locking ICCM
1,552,289 UART: [exit] Launching FMC @ 0x40000000
1,557,586 UART:
1,557,602 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,929 UART: [state] WD Timer not started. Device not locked for debugging
88,459 UART: [fake-rom-cold-reset] ++
89,387 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,559 UART: [fht] FHT @ 0x50003400
92,814 UART: [fwproc] Wait for Commands...
93,561 UART: [fwproc] Recv command 0x46574c44
94,289 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,389 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,413,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,919 >>> mbox cmd response: success
1,550,077 UART: [fake-rom-cold-reset] --
1,550,973 UART: [state] Locking Datavault
1,551,978 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,582 UART: [state] Locking ICCM
1,553,122 UART: [exit] Launching FMC @ 0x40000000
1,558,419 UART:
1,558,435 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,045 UART: [state] WD Timer not started. Device not locked for debugging
88,409 UART: [fake-rom-cold-reset] ++
89,337 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,565 UART: [fht] FHT @ 0x50003400
92,990 UART: [fwproc] Wait for Commands...
93,681 UART: [fwproc] Recv command 0x46574c44
94,409 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,785 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,319 >>> mbox cmd response: success
1,549,477 UART: [fake-rom-cold-reset] --
1,550,267 UART: [state] Locking Datavault
1,551,364 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,968 UART: [state] Locking ICCM
1,552,618 UART: [exit] Launching FMC @ 0x40000000
1,557,915 UART:
1,557,931 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [fake-rom-cold-reset] ++
88,766 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,876 UART: [fht] FHT @ 0x50003400
92,277 UART: [fwproc] Wait for Commands...
93,020 UART: [fwproc] Recv command 0x46574c44
93,748 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,014 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,576 >>> mbox cmd response: success
1,547,734 UART: [fake-rom-cold-reset] --
1,548,488 UART: [state] Locking Datavault
1,549,449 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,053 UART: [state] Locking ICCM
1,550,607 UART: [exit] Launching FMC @ 0x40000000
1,555,904 UART:
1,555,920 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [fake-rom-cold-reset] ++
88,736 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,998 UART: [fht] FHT @ 0x50003400
92,227 UART: [fwproc] Wait for Commands...
93,052 UART: [fwproc] Recv command 0x46574c44
93,780 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,540 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,138 >>> mbox cmd response: success
1,547,296 UART: [fake-rom-cold-reset] --
1,547,926 UART: [state] Locking Datavault
1,548,789 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,393 UART: [state] Locking ICCM
1,549,839 UART: [exit] Launching FMC @ 0x40000000
1,555,136 UART:
1,555,152 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [fake-rom-cold-reset] ++
89,135 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,253 UART: [fht] FHT @ 0x50003400
92,552 UART: [fwproc] Wait for Commands...
93,377 UART: [fwproc] Recv command 0x46574c44
94,105 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,133 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,797 >>> mbox cmd response: success
1,547,955 UART: [fake-rom-cold-reset] --
1,548,785 UART: [state] Locking Datavault
1,549,870 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,474 UART: [state] Locking ICCM
1,551,126 UART: [exit] Launching FMC @ 0x40000000
1,556,423 UART:
1,556,439 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [fake-rom-cold-reset] ++
89,105 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,357 UART: [fht] FHT @ 0x50003400
92,642 UART: [fwproc] Wait for Commands...
93,257 UART: [fwproc] Recv command 0x46574c44
93,985 UART: [fwproc] Recv'd Img size: 111944 bytes
1,357,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,771 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,281 >>> mbox cmd response: success
1,547,439 UART: [fake-rom-cold-reset] --
1,548,319 UART: [state] Locking Datavault
1,549,746 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,350 UART: [state] Locking ICCM
1,550,774 UART: [exit] Launching FMC @ 0x40000000
1,556,071 UART:
1,556,087 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [fake-rom-cold-reset] ++
88,684 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,938 UART: [fht] FHT @ 0x50003400
92,315 UART: [fwproc] Wait for Commands...
92,970 UART: [fwproc] Recv command 0x46574c44
93,698 UART: [fwproc] Recv'd Img size: 111944 bytes
1,357,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,850 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,506 >>> mbox cmd response: success
1,547,664 UART: [fake-rom-cold-reset] --
1,548,602 UART: [state] Locking Datavault
1,549,801 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,405 UART: [state] Locking ICCM
1,550,977 UART: [exit] Launching FMC @ 0x40000000
1,556,274 UART:
1,556,290 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [fake-rom-cold-reset] ++
88,900 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,996 UART: [fht] FHT @ 0x50003400
92,261 UART: [fwproc] Wait for Commands...
93,102 UART: [fwproc] Recv command 0x46574c44
93,830 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,578 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,194 >>> mbox cmd response: success
1,549,352 UART: [fake-rom-cold-reset] --
1,550,240 UART: [state] Locking Datavault
1,551,355 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,959 UART: [state] Locking ICCM
1,552,613 UART: [exit] Launching FMC @ 0x40000000
1,557,910 UART:
1,557,926 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [fake-rom-cold-reset] ++
88,705 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,879 UART: [fht] FHT @ 0x50003400
92,158 UART: [fwproc] Wait for Commands...
92,801 UART: [fwproc] Recv command 0x46574c44
93,529 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,847 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,401 >>> mbox cmd response: success
1,548,559 UART: [fake-rom-cold-reset] --
1,549,189 UART: [state] Locking Datavault
1,550,280 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,884 UART: [state] Locking ICCM
1,551,522 UART: [exit] Launching FMC @ 0x40000000
1,556,819 UART:
1,556,835 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [fake-rom-cold-reset] ++
88,895 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,125 UART: [fht] FHT @ 0x50003400
92,556 UART: [fwproc] Wait for Commands...
93,331 UART: [fwproc] Recv command 0x46574c44
94,059 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,491 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,149 >>> mbox cmd response: success
1,549,307 UART: [fake-rom-cold-reset] --
1,549,921 UART: [state] Locking Datavault
1,551,126 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,730 UART: [state] Locking ICCM
1,552,322 UART: [exit] Launching FMC @ 0x40000000
1,557,619 UART:
1,557,635 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,372 UART:
192,732 UART: Running Caliptra ROM ...
193,958 UART:
194,107 UART: [state] CFI Enabled
265,000 UART: [state] LifecycleState = Production
267,211 UART: [state] DebugLocked = No
269,892 UART: [state] WD Timer not started. Device not locked for debugging
275,761 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,025 UART:
192,431 UART: Running Caliptra ROM ...
193,638 UART:
193,791 UART: [state] CFI Enabled
262,505 UART: [state] LifecycleState = Production
264,733 UART: [state] DebugLocked = No
267,950 UART: [state] WD Timer not started. Device not locked for debugging
274,195 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,539 UART:
192,918 UART: Running Caliptra ROM ...
194,052 UART:
604,212 UART: [state] CFI Enabled
620,576 UART: [state] LifecycleState = Production
622,809 UART: [state] DebugLocked = No
625,380 UART: [state] WD Timer not started. Device not locked for debugging
629,956 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
11,177 writing to cptra_bootfsm_go
200,635 UART:
201,080 UART: Running Caliptra ROM ...
202,278 UART:
612,143 UART: [state] CFI Enabled
626,516 UART: [state] LifecycleState = Production
628,761 UART: [state] DebugLocked = No
630,897 UART: [state] WD Timer not started. Device not locked for debugging
637,164 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,140 UART:
192,524 UART: Running Caliptra ROM ...
193,705 UART:
193,857 UART: [state] CFI Enabled
259,941 UART: [state] LifecycleState = Production
261,554 UART: [state] DebugLocked = No
264,230 UART: [state] WD Timer not started. Device not locked for debugging
267,887 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,371 UART:
192,760 UART: Running Caliptra ROM ...
193,959 UART:
194,110 UART: [state] CFI Enabled
264,378 UART: [state] LifecycleState = Production
265,997 UART: [state] DebugLocked = No
268,670 UART: [state] WD Timer not started. Device not locked for debugging
273,819 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,289 UART:
192,669 UART: Running Caliptra ROM ...
193,865 UART:
194,022 UART: [state] CFI Enabled
263,070 UART: [state] LifecycleState = Production
264,756 UART: [state] DebugLocked = No
266,026 UART: [state] WD Timer not started. Device not locked for debugging
270,798 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,554 UART:
192,917 UART: Running Caliptra ROM ...
194,096 UART:
603,582 UART: [state] CFI Enabled
619,702 UART: [state] LifecycleState = Production
621,333 UART: [state] DebugLocked = No
622,595 UART: [state] WD Timer not started. Device not locked for debugging
627,796 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,434 UART:
192,812 UART: Running Caliptra ROM ...
193,992 UART:
603,648 UART: [state] CFI Enabled
618,206 UART: [state] LifecycleState = Production
619,959 UART: [state] DebugLocked = No
622,632 UART: [state] WD Timer not started. Device not locked for debugging
626,428 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Production
85,775 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Production
85,729 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Production
85,960 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
88,210 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Production
86,190 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,438 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Production
86,013 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Production
85,911 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Production
85,818 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Production
86,392 UART: [state] DebugLocked = No
86,927 UART: [state] WD Timer not started. Device not locked for debugging
88,418 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Production
85,525 UART: [state] DebugLocked = No
86,176 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,652 UART: [state] LifecycleState = Production
85,267 UART: [state] DebugLocked = No
85,978 UART: [state] WD Timer not started. Device not locked for debugging
87,391 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Production
85,764 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Production
86,406 UART: [state] DebugLocked = No
87,091 UART: [state] WD Timer not started. Device not locked for debugging
88,452 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,245 UART:
192,605 UART: Running Caliptra ROM ...
193,844 UART:
193,996 UART: [state] CFI Enabled
262,302 UART: [state] LifecycleState = Production
264,522 UART: Fake ROM in Prod lifecycle disabled
266,574 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,227 UART:
192,607 UART: Running Caliptra ROM ...
193,843 UART:
193,996 UART: [state] CFI Enabled
263,396 UART: [state] LifecycleState = Production
265,613 UART: Fake ROM in Prod lifecycle disabled
267,662 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,457 UART:
192,849 UART: Running Caliptra ROM ...
194,029 UART:
603,965 UART: [state] CFI Enabled
622,119 UART: [state] LifecycleState = Production
624,312 UART: Fake ROM in Prod lifecycle disabled
626,301 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,355 UART:
192,761 UART: Running Caliptra ROM ...
193,963 UART:
604,023 UART: [state] CFI Enabled
615,415 UART: [state] LifecycleState = Production
617,604 UART: Fake ROM in Prod lifecycle disabled
619,650 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,011 UART:
192,421 UART: Running Caliptra ROM ...
193,610 UART:
193,763 UART: [state] CFI Enabled
264,899 UART: [state] LifecycleState = Production
266,507 UART: Fake ROM in Prod lifecycle disabled
268,001 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,202 UART:
192,563 UART: Running Caliptra ROM ...
193,746 UART:
193,914 UART: [state] CFI Enabled
261,759 UART: [state] LifecycleState = Production
263,423 UART: Fake ROM in Prod lifecycle disabled
264,931 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,307 UART:
192,672 UART: Running Caliptra ROM ...
193,866 UART:
194,020 UART: [state] CFI Enabled
263,543 UART: [state] LifecycleState = Production
265,230 UART: Fake ROM in Prod lifecycle disabled
266,729 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,571 UART:
192,950 UART: Running Caliptra ROM ...
194,150 UART:
603,461 UART: [state] CFI Enabled
616,179 UART: [state] LifecycleState = Production
617,795 UART: Fake ROM in Prod lifecycle disabled
619,297 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,278 UART:
192,676 UART: Running Caliptra ROM ...
193,806 UART:
603,189 UART: [state] CFI Enabled
615,665 UART: [state] LifecycleState = Production
617,301 UART: Fake ROM in Prod lifecycle disabled
618,717 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Production
85,744 UART: Fake ROM in Prod lifecycle disabled
86,338 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Production
86,048 UART: Fake ROM in Prod lifecycle disabled
86,642 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Production
85,893 UART: Fake ROM in Prod lifecycle disabled
86,487 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Production
85,903 UART: Fake ROM in Prod lifecycle disabled
86,497 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Production
85,692 UART: Fake ROM in Prod lifecycle disabled
86,286 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Production
85,714 UART: Fake ROM in Prod lifecycle disabled
86,308 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Production
86,297 UART: Fake ROM in Prod lifecycle disabled
86,891 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Production
86,365 UART: Fake ROM in Prod lifecycle disabled
86,959 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Production
85,678 UART: Fake ROM in Prod lifecycle disabled
86,272 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Production
85,414 UART: Fake ROM in Prod lifecycle disabled
86,008 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Production
85,913 UART: Fake ROM in Prod lifecycle disabled
86,507 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Production
85,629 UART: Fake ROM in Prod lifecycle disabled
86,223 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,217,064 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,358,218 UART:
2,358,636 UART: Running Caliptra ROM ...
2,359,804 UART:
2,359,971 UART: [state] CFI Enabled
2,360,937 UART: [state] LifecycleState = Unprovisioned
2,362,592 UART: [state] DebugLocked = No
2,363,702 UART: [state] WD Timer not started. Device not locked for debugging
2,366,189 UART: [fake-rom-cold-reset] ++
2,367,299 UART: [fht] FHT @ 0x50003400
2,368,290 UART: [fwproc] Wait for Commands...
2,369,573 UART: [fwproc] Recv command 0x46574c44
2,370,997 UART: [fwproc] Recv'd Img size: 111600 bytes
3,779,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,855,148 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,965,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,550,313 >>> mbox cmd response: success
4,556,348 UART: [fake-rom-cold-reset] --
4,558,882 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
4,699,129 UART: [state] Locking Datavault
4,700,386 UART: [state] Locking PCR0, PCR1 and PCR31
4,701,858 UART: [state] Locking ICCM
4,702,733 UART: [exit] Launching FMC @ 0x40000000
4,704,159 UART:
4,704,316 UART: Running Caliptra FMC ...
4,705,334 UART:
4,705,482 UART: [fmc] Received command: 0x46574C44
4,706,946 UART:
4,707,102 UART: Running Caliptra ROM ...
4,708,117 UART:
4,708,271 UART: [state] CFI Enabled
4,766,445 UART: [state] LifecycleState = Unprovisioned
4,768,820 UART: [state] DebugLocked = No
4,771,239 UART: [state] WD Timer not started. Device not locked for debugging
4,778,561 UART: [update-reset] ++
6,227,841 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,232,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
6,875,816 UART: [update-reset] Copying MAN_2 To MAN_1
6,898,744 UART: [update-reset Success] --
6,900,391 >>> mbox cmd response: success
6,900,607 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,902,491 UART: [state] Locking Datavault
6,905,576 UART: [state] Locking PCR0, PCR1 and PCR31
6,907,762 UART: [state] Locking ICCM
6,909,761 UART: [exit] Launching FMC @ 0x40000000
6,918,552 UART:
6,918,798 UART: Running Caliptra FMC ...
6,919,921 UART:
6,920,078 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,921,724 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,216,548 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,357,776 UART:
2,358,213 UART: Running Caliptra ROM ...
2,359,385 UART:
2,359,558 UART: [state] CFI Enabled
2,360,517 UART: [state] LifecycleState = Unprovisioned
2,362,173 UART: [state] DebugLocked = No
2,363,233 UART: [state] WD Timer not started. Device not locked for debugging
2,365,717 UART: [fake-rom-cold-reset] ++
2,366,746 UART: [fht] FHT @ 0x50003400
2,367,735 UART: [fwproc] Wait for Commands...
2,369,024 UART: [fwproc] Recv command 0x46574c44
2,370,372 UART: [fwproc] Recv'd Img size: 111600 bytes
3,784,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,862,353 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,972,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,557,348 >>> mbox cmd response: success
4,563,431 UART: [fake-rom-cold-reset] --
4,565,910 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
4,706,087 UART: [state] Locking Datavault
4,707,350 UART: [state] Locking PCR0, PCR1 and PCR31
4,708,825 UART: [state] Locking ICCM
4,709,704 UART: [exit] Launching FMC @ 0x40000000
4,711,131 UART:
4,711,301 UART: Running Caliptra FMC ...
4,712,402 UART:
4,712,560 UART: [fmc] Received command: 0x46574C44
4,714,023 UART:
4,714,181 UART: Running Caliptra ROM ...
4,715,277 UART:
4,715,435 UART: [state] CFI Enabled
4,785,169 UART: [state] LifecycleState = Unprovisioned
4,787,596 UART: [state] DebugLocked = No
4,790,845 UART: [state] WD Timer not started. Device not locked for debugging
4,797,676 UART: [update-reset] ++
6,255,784 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,260,302 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
6,902,582 UART: [update-reset] Copying MAN_2 To MAN_1
6,925,503 UART: [update-reset Success] --
6,927,180 >>> mbox cmd response: success
6,927,415 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,930,878 UART: [state] Locking Datavault
6,934,795 UART: [state] Locking PCR0, PCR1 and PCR31
6,937,002 UART: [state] Locking ICCM
6,939,864 UART: [exit] Launching FMC @ 0x40000000
6,948,644 UART:
6,948,877 UART: Running Caliptra FMC ...
6,949,977 UART:
6,950,131 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,951,789 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,228,232 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,369,460 UART:
2,369,910 UART: Running Caliptra ROM ...
2,370,995 UART:
2,371,145 UART: [state] CFI Enabled
2,372,005 UART: [state] LifecycleState = Unprovisioned
2,373,664 UART: [state] DebugLocked = No
2,374,720 UART: [state] WD Timer not started. Device not locked for debugging
2,377,191 UART: [fake-rom-cold-reset] ++
2,378,289 UART: [fht] FHT @ 0x50003400
2,379,313 UART: [fwproc] Wait for Commands...
2,380,611 UART: [fwproc] Recv command 0x46574c44
2,382,034 UART: [fwproc] Recv'd Img size: 111600 bytes
3,786,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,859,742 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,969,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,555,216 >>> mbox cmd response: success
4,561,250 UART: [fake-rom-cold-reset] --
4,563,797 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
4,704,328 UART: [state] Locking Datavault
4,705,601 UART: [state] Locking PCR0, PCR1 and PCR31
4,707,064 UART: [state] Locking ICCM
4,707,934 UART: [exit] Launching FMC @ 0x40000000
4,709,357 UART:
4,709,519 UART: Running Caliptra FMC ...
4,710,616 UART:
4,710,767 UART: [fmc] Received command: 0x46574C44
4,712,249 UART:
4,712,403 UART: Running Caliptra ROM ...
4,713,497 UART:
4,713,647 UART: [state] CFI Enabled
4,723,528 UART: [state] LifecycleState = Unprovisioned
4,725,895 UART: [state] DebugLocked = No
4,728,731 UART: [state] WD Timer not started. Device not locked for debugging
4,734,257 UART: [update-reset] ++
6,173,521 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,177,593 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
6,820,181 UART: [update-reset] Copying MAN_2 To MAN_1
6,843,126 UART: [update-reset Success] --
6,844,768 >>> mbox cmd response: success
6,844,981 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,848,963 UART: [state] Locking Datavault
6,852,119 UART: [state] Locking PCR0, PCR1 and PCR31
6,854,282 UART: [state] Locking ICCM
6,856,544 UART: [exit] Launching FMC @ 0x40000000
6,865,322 UART:
6,865,550 UART: Running Caliptra FMC ...
6,866,649 UART:
6,866,798 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,868,422 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,187 writing to cptra_bootfsm_go
2,228,477 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,369,882 UART:
2,370,322 UART: Running Caliptra ROM ...
2,371,408 UART:
2,371,570 UART: [state] CFI Enabled
2,372,533 UART: [state] LifecycleState = Unprovisioned
2,374,189 UART: [state] DebugLocked = No
2,375,290 UART: [state] WD Timer not started. Device not locked for debugging
2,377,758 UART: [fake-rom-cold-reset] ++
2,378,856 UART: [fht] FHT @ 0x50003400
2,379,877 UART: [fwproc] Wait for Commands...
2,381,153 UART: [fwproc] Recv command 0x46574c44
2,382,605 UART: [fwproc] Recv'd Img size: 111600 bytes
3,783,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,859,709 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,969,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
4,555,071 >>> mbox cmd response: success
4,561,150 UART: [fake-rom-cold-reset] --
4,563,715 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
4,703,737 UART: [state] Locking Datavault
4,704,993 UART: [state] Locking PCR0, PCR1 and PCR31
4,706,467 UART: [state] Locking ICCM
4,707,430 UART: [exit] Launching FMC @ 0x40000000
4,708,861 UART:
4,709,019 UART: Running Caliptra FMC ...
4,710,120 UART:
4,710,268 UART: [fmc] Received command: 0x46574C44
4,711,718 UART:
4,711,889 UART: Running Caliptra ROM ...
4,712,983 UART:
4,713,145 UART: [state] CFI Enabled
4,722,345 UART: [state] LifecycleState = Unprovisioned
4,724,718 UART: [state] DebugLocked = No
4,727,516 UART: [state] WD Timer not started. Device not locked for debugging
4,735,325 UART: [update-reset] ++
6,187,687 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,191,526 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
6,833,978 UART: [update-reset] Copying MAN_2 To MAN_1
6,856,929 UART: [update-reset Success] --
6,858,576 >>> mbox cmd response: success
6,858,788 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,861,527 UART: [state] Locking Datavault
6,865,057 UART: [state] Locking PCR0, PCR1 and PCR31
6,867,264 UART: [state] Locking ICCM
6,869,109 UART: [exit] Launching FMC @ 0x40000000
6,877,898 UART:
6,878,127 UART: Running Caliptra FMC ...
6,879,223 UART:
6,879,372 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,881,234 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
2,217,369 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,358,682 UART:
2,359,085 UART: Running Caliptra ROM ...
2,360,261 UART:
2,360,436 UART: [state] CFI Enabled
2,361,418 UART: [state] LifecycleState = Unprovisioned
2,363,065 UART: [state] DebugLocked = No
2,364,182 UART: [state] WD Timer not started. Device not locked for debugging
2,367,024 UART: [fake-rom-cold-reset] ++
2,368,176 UART: [fht] FHT @ 0x50003400
2,369,167 UART: [fwproc] Wait for Commands...
2,370,454 UART: [fwproc] Recv command 0x46574c44
2,371,888 UART: [fwproc] Recv'd Img size: 111944 bytes
3,812,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,882,895 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,942,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,260,779 >>> mbox cmd response: success
4,266,611 UART: [fake-rom-cold-reset] --
4,268,728 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
4,409,435 UART: [state] Locking Datavault
4,410,709 UART: [state] Locking PCR0, PCR1 and PCR31
4,412,267 UART: [state] Locking ICCM
4,413,179 UART: [exit] Launching FMC @ 0x40000000
4,414,609 UART:
4,414,772 UART: Running Caliptra FMC ...
4,415,895 UART:
4,416,054 UART: [fmc] Received command: 0x46574C44
4,417,523 UART:
4,417,681 UART: Running Caliptra ROM ...
4,418,781 UART:
4,418,939 UART: [state] CFI Enabled
4,489,019 UART: [state] LifecycleState = Unprovisioned
4,490,794 UART: [state] DebugLocked = No
4,493,424 UART: [state] WD Timer not started. Device not locked for debugging
4,499,277 UART: [update-reset] ++
5,977,833 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,163 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,356,021 UART: [update-reset] Copying MAN_2 To MAN_1
6,378,228 UART: [update-reset Success] --
6,379,527 >>> mbox cmd response: success
6,379,743 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,381,426 UART: [state] Locking Datavault
6,385,170 UART: [state] Locking PCR0, PCR1 and PCR31
6,386,778 UART: [state] Locking ICCM
6,387,796 UART: [exit] Launching FMC @ 0x40000000
6,396,029 UART:
6,396,271 UART: Running Caliptra FMC ...
6,397,381 UART:
6,397,539 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,399,180 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,221,107 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,363,052 UART:
2,363,543 UART: Running Caliptra ROM ...
2,364,628 UART:
2,364,793 UART: [state] CFI Enabled
2,365,681 UART: [state] LifecycleState = Unprovisioned
2,367,336 UART: [state] DebugLocked = No
2,368,363 UART: [state] WD Timer not started. Device not locked for debugging
2,370,835 UART: [fake-rom-cold-reset] ++
2,371,857 UART: [fht] FHT @ 0x50003400
2,372,803 UART: [fwproc] Wait for Commands...
2,374,092 UART: [fwproc] Recv command 0x46574c44
2,375,440 UART: [fwproc] Recv'd Img size: 111944 bytes
3,820,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,888,612 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,948,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,265,632 >>> mbox cmd response: success
4,271,488 UART: [fake-rom-cold-reset] --
4,273,627 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
4,414,236 UART: [state] Locking Datavault
4,415,491 UART: [state] Locking PCR0, PCR1 and PCR31
4,416,962 UART: [state] Locking ICCM
4,417,836 UART: [exit] Launching FMC @ 0x40000000
4,419,266 UART:
4,419,420 UART: Running Caliptra FMC ...
4,420,432 UART:
4,420,574 UART: [fmc] Received command: 0x46574C44
4,422,034 UART:
4,422,193 UART: Running Caliptra ROM ...
4,423,234 UART:
4,423,389 UART: [state] CFI Enabled
4,479,632 UART: [state] LifecycleState = Unprovisioned
4,481,364 UART: [state] DebugLocked = No
4,482,554 UART: [state] WD Timer not started. Device not locked for debugging
4,487,310 UART: [update-reset] ++
5,961,739 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,965,853 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,341,417 UART: [update-reset] Copying MAN_2 To MAN_1
6,363,698 UART: [update-reset Success] --
6,364,990 >>> mbox cmd response: success
6,365,208 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,367,140 UART: [state] Locking Datavault
6,371,099 UART: [state] Locking PCR0, PCR1 and PCR31
6,372,698 UART: [state] Locking ICCM
6,375,036 UART: [exit] Launching FMC @ 0x40000000
6,383,235 UART:
6,383,474 UART: Running Caliptra FMC ...
6,384,500 UART:
6,384,646 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,386,281 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,218,073 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,359,726 UART:
2,360,152 UART: Running Caliptra ROM ...
2,361,322 UART:
2,361,499 UART: [state] CFI Enabled
2,362,482 UART: [state] LifecycleState = Unprovisioned
2,364,126 UART: [state] DebugLocked = No
2,365,235 UART: [state] WD Timer not started. Device not locked for debugging
2,367,714 UART: [fake-rom-cold-reset] ++
2,368,821 UART: [fht] FHT @ 0x50003400
2,369,855 UART: [fwproc] Wait for Commands...
2,371,139 UART: [fwproc] Recv command 0x46574c44
2,372,566 UART: [fwproc] Recv'd Img size: 111944 bytes
3,821,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,896,850 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,956,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,274,470 >>> mbox cmd response: success
4,280,353 UART: [fake-rom-cold-reset] --
4,282,424 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
4,422,947 UART: [state] Locking Datavault
4,424,203 UART: [state] Locking PCR0, PCR1 and PCR31
4,425,757 UART: [state] Locking ICCM
4,426,674 UART: [exit] Launching FMC @ 0x40000000
4,428,098 UART:
4,428,260 UART: Running Caliptra FMC ...
4,429,584 UART:
4,429,752 UART: [fmc] Received command: 0x46574C44
4,431,215 UART:
4,431,371 UART: Running Caliptra ROM ...
4,432,468 UART:
4,432,624 UART: [state] CFI Enabled
4,490,102 UART: [state] LifecycleState = Unprovisioned
4,491,825 UART: [state] DebugLocked = No
4,493,224 UART: [state] WD Timer not started. Device not locked for debugging
4,498,042 UART: [update-reset] ++
5,978,008 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,337 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,357,578 UART: [update-reset] Copying MAN_2 To MAN_1
6,379,801 UART: [update-reset Success] --
6,381,086 >>> mbox cmd response: success
6,381,309 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,384,700 UART: [state] Locking Datavault
6,386,549 UART: [state] Locking PCR0, PCR1 and PCR31
6,388,085 UART: [state] Locking ICCM
6,390,138 UART: [exit] Launching FMC @ 0x40000000
6,398,371 UART:
6,398,610 UART: Running Caliptra FMC ...
6,399,660 UART:
6,399,808 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,401,462 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,222,600 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,364,246 UART:
2,364,666 UART: Running Caliptra ROM ...
2,365,741 UART:
2,365,894 UART: [state] CFI Enabled
2,366,815 UART: [state] LifecycleState = Unprovisioned
2,368,466 UART: [state] DebugLocked = No
2,369,489 UART: [state] WD Timer not started. Device not locked for debugging
2,371,977 UART: [fake-rom-cold-reset] ++
2,372,999 UART: [fht] FHT @ 0x50003400
2,373,946 UART: [fwproc] Wait for Commands...
2,375,226 UART: [fwproc] Recv command 0x46574c44
2,376,566 UART: [fwproc] Recv'd Img size: 111944 bytes
3,819,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,038 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,947,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,264,167 >>> mbox cmd response: success
4,269,991 UART: [fake-rom-cold-reset] --
4,272,138 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
4,412,826 UART: [state] Locking Datavault
4,414,084 UART: [state] Locking PCR0, PCR1 and PCR31
4,415,557 UART: [state] Locking ICCM
4,416,434 UART: [exit] Launching FMC @ 0x40000000
4,417,861 UART:
4,418,037 UART: Running Caliptra FMC ...
4,419,058 UART:
4,419,203 UART: [fmc] Received command: 0x46574C44
4,420,662 UART:
4,420,812 UART: Running Caliptra ROM ...
4,421,828 UART:
4,421,970 UART: [state] CFI Enabled
4,430,312 UART: [state] LifecycleState = Unprovisioned
4,432,029 UART: [state] DebugLocked = No
4,434,149 UART: [state] WD Timer not started. Device not locked for debugging
4,440,859 UART: [update-reset] ++
5,914,096 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,916,552 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,291,843 UART: [update-reset] Copying MAN_2 To MAN_1
6,314,046 UART: [update-reset Success] --
6,315,319 >>> mbox cmd response: success
6,315,551 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,318,947 UART: [state] Locking Datavault
6,322,099 UART: [state] Locking PCR0, PCR1 and PCR31
6,323,640 UART: [state] Locking ICCM
6,325,849 UART: [exit] Launching FMC @ 0x40000000
6,334,078 UART:
6,334,323 UART: Running Caliptra FMC ...
6,335,425 UART:
6,335,576 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,337,208 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
2,224,174 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,365,886 UART:
2,366,282 UART: Running Caliptra ROM ...
2,367,452 UART:
2,367,624 UART: [state] CFI Enabled
2,368,599 UART: [state] LifecycleState = Unprovisioned
2,370,241 UART: [state] DebugLocked = No
2,371,344 UART: [state] WD Timer not started. Device not locked for debugging
2,373,819 UART: [fake-rom-cold-reset] ++
2,374,919 UART: [fht] FHT @ 0x50003400
2,375,974 UART: [fwproc] Wait for Commands...
2,377,255 UART: [fwproc] Recv command 0x46574c44
2,378,682 UART: [fwproc] Recv'd Img size: 111944 bytes
3,817,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,890,441 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
4,268,165 >>> mbox cmd response: success
4,273,983 UART: [fake-rom-cold-reset] --
4,275,994 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
4,416,669 UART: [state] Locking Datavault
4,417,929 UART: [state] Locking PCR0, PCR1 and PCR31
4,419,481 UART: [state] Locking ICCM
4,420,365 UART: [exit] Launching FMC @ 0x40000000
4,421,738 UART:
4,421,896 UART: Running Caliptra FMC ...
4,422,992 UART:
4,423,168 UART: [fmc] Received command: 0x46574C44
4,424,629 UART:
4,424,785 UART: Running Caliptra ROM ...
4,425,884 UART:
4,426,040 UART: [state] CFI Enabled
4,430,211 UART: [state] LifecycleState = Unprovisioned
4,431,933 UART: [state] DebugLocked = No
4,434,419 UART: [state] WD Timer not started. Device not locked for debugging
4,440,309 UART: [update-reset] ++
5,914,724 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,918,114 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,293,812 UART: [update-reset] Copying MAN_2 To MAN_1
6,316,015 UART: [update-reset Success] --
6,317,331 >>> mbox cmd response: success
6,317,565 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,319,783 UART: [state] Locking Datavault
6,323,598 UART: [state] Locking PCR0, PCR1 and PCR31
6,325,139 UART: [state] Locking ICCM
6,327,412 UART: [exit] Launching FMC @ 0x40000000
6,335,646 UART:
6,335,884 UART: Running Caliptra FMC ...
6,336,984 UART:
6,337,136 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,338,771 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,231 UART: [state] DebugLocked = No
85,904 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [fake-rom-cold-reset] ++
88,080 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,160 UART: [fht] FHT @ 0x50003400
91,499 UART: [fwproc] Wait for Commands...
92,108 UART: [fwproc] Recv command 0x46574c44
92,836 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,977 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,625 >>> mbox cmd response: success
1,547,783 UART: [fake-rom-cold-reset] --
1,548,178 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,548,691 UART: [state] Locking Datavault
1,549,660 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,264 UART: [state] Locking ICCM
1,550,802 UART: [exit] Launching FMC @ 0x40000000
1,556,099 UART:
1,556,115 UART: Running Caliptra FMC ...
1,556,523 UART:
1,556,664 UART: [fmc] Received command: 0x46574C44
1,557,488 UART:
1,557,504 UART: Running Caliptra ROM ...
1,557,912 UART:
1,557,967 UART: [state] CFI Enabled
1,561,029 UART: [state] LifecycleState = Unprovisioned
1,561,688 UART: [state] DebugLocked = No
1,562,187 UART: [state] WD Timer not started. Device not locked for debugging
1,563,915 UART: [update-reset] ++
2,844,373 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,445 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,993,810 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,824 UART: [update-reset Success] --
3,002,233 >>> mbox cmd response: success
3,002,233 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,556 UART: [state] Locking Datavault
3,003,322 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,926 UART: [state] Locking ICCM
3,004,504 UART: [exit] Launching FMC @ 0x40000000
3,009,801 UART:
3,009,817 UART: Running Caliptra FMC ...
3,010,225 UART:
3,010,366 UART: [fmc] Received command: 0x1000000C
3,011,101 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [fake-rom-cold-reset] ++
88,504 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,686 UART: [fht] FHT @ 0x50003400
91,909 UART: [fwproc] Wait for Commands...
92,644 UART: [fwproc] Recv command 0x46574c44
93,372 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,786 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,216 >>> mbox cmd response: success
1,548,374 UART: [fake-rom-cold-reset] --
1,548,769 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,549,100 UART: [state] Locking Datavault
1,550,381 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,985 UART: [state] Locking ICCM
1,551,469 UART: [exit] Launching FMC @ 0x40000000
1,556,766 UART:
1,556,782 UART: Running Caliptra FMC ...
1,557,190 UART:
1,557,331 UART: [fmc] Received command: 0x46574C44
1,558,155 UART:
1,558,171 UART: Running Caliptra ROM ...
1,558,579 UART:
1,558,634 UART: [state] CFI Enabled
1,561,374 UART: [state] LifecycleState = Unprovisioned
1,562,033 UART: [state] DebugLocked = No
1,562,634 UART: [state] WD Timer not started. Device not locked for debugging
1,564,288 UART: [update-reset] ++
2,841,721 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,811 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,991,042 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,056 UART: [update-reset Success] --
2,999,465 >>> mbox cmd response: success
2,999,465 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,999,986 UART: [state] Locking Datavault
3,000,758 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,362 UART: [state] Locking ICCM
3,001,926 UART: [exit] Launching FMC @ 0x40000000
3,007,223 UART:
3,007,239 UART: Running Caliptra FMC ...
3,007,647 UART:
3,007,788 UART: [fmc] Received command: 0x1000000C
3,008,523 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [fake-rom-cold-reset] ++
89,333 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,499 UART: [fht] FHT @ 0x50003400
92,786 UART: [fwproc] Wait for Commands...
93,405 UART: [fwproc] Recv command 0x46574c44
94,133 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,897 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,315 >>> mbox cmd response: success
1,548,473 UART: [fake-rom-cold-reset] --
1,548,868 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,549,205 UART: [state] Locking Datavault
1,550,298 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,902 UART: [state] Locking ICCM
1,551,346 UART: [exit] Launching FMC @ 0x40000000
1,556,643 UART:
1,556,659 UART: Running Caliptra FMC ...
1,557,067 UART:
1,557,208 UART: [fmc] Received command: 0x46574C44
1,558,032 UART:
1,558,048 UART: Running Caliptra ROM ...
1,558,456 UART:
1,558,598 UART: [state] CFI Enabled
1,561,560 UART: [state] LifecycleState = Unprovisioned
1,562,219 UART: [state] DebugLocked = No
1,562,810 UART: [state] WD Timer not started. Device not locked for debugging
1,564,370 UART: [update-reset] ++
2,843,431 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,565 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,992,824 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,838 UART: [update-reset Success] --
3,001,247 >>> mbox cmd response: success
3,001,247 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,984 UART: [state] Locking Datavault
3,002,704 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,308 UART: [state] Locking ICCM
3,003,894 UART: [exit] Launching FMC @ 0x40000000
3,009,191 UART:
3,009,207 UART: Running Caliptra FMC ...
3,009,615 UART:
3,009,756 UART: [fmc] Received command: 0x1000000C
3,010,491 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,871 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [fake-rom-cold-reset] ++
89,167 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,407 UART: [fht] FHT @ 0x50003400
92,870 UART: [fwproc] Wait for Commands...
93,697 UART: [fwproc] Recv command 0x46574c44
94,425 UART: [fwproc] Recv'd Img size: 111944 bytes
1,360,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,387,101 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,603 >>> mbox cmd response: success
1,549,761 UART: [fake-rom-cold-reset] --
1,550,156 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,550,565 UART: [state] Locking Datavault
1,551,542 UART: [state] Locking PCR0, PCR1 and PCR31
1,552,146 UART: [state] Locking ICCM
1,552,606 UART: [exit] Launching FMC @ 0x40000000
1,557,903 UART:
1,557,919 UART: Running Caliptra FMC ...
1,558,327 UART:
1,558,468 UART: [fmc] Received command: 0x46574C44
1,559,292 UART:
1,559,308 UART: Running Caliptra ROM ...
1,559,716 UART:
1,559,858 UART: [state] CFI Enabled
1,562,580 UART: [state] LifecycleState = Unprovisioned
1,563,239 UART: [state] DebugLocked = No
1,563,722 UART: [state] WD Timer not started. Device not locked for debugging
1,565,140 UART: [update-reset] ++
2,843,499 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,507 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,992,782 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,796 UART: [update-reset Success] --
3,001,205 >>> mbox cmd response: success
3,001,205 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,816 UART: [state] Locking Datavault
3,002,684 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,288 UART: [state] Locking ICCM
3,003,778 UART: [exit] Launching FMC @ 0x40000000
3,009,075 UART:
3,009,091 UART: Running Caliptra FMC ...
3,009,499 UART:
3,009,640 UART: [fmc] Received command: 0x1000000C
3,010,375 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [fake-rom-cold-reset] ++
88,984 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,172 UART: [fht] FHT @ 0x50003400
92,483 UART: [fwproc] Wait for Commands...
93,260 UART: [fwproc] Recv command 0x46574c44
93,988 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,448 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,412,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,548,016 >>> mbox cmd response: success
1,549,174 UART: [fake-rom-cold-reset] --
1,549,569 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,550,118 UART: [state] Locking Datavault
1,551,385 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,989 UART: [state] Locking ICCM
1,552,545 UART: [exit] Launching FMC @ 0x40000000
1,557,842 UART:
1,557,858 UART: Running Caliptra FMC ...
1,558,266 UART:
1,558,407 UART: [fmc] Received command: 0x46574C44
1,559,231 UART:
1,559,247 UART: Running Caliptra ROM ...
1,559,655 UART:
1,559,710 UART: [state] CFI Enabled
1,562,844 UART: [state] LifecycleState = Unprovisioned
1,563,503 UART: [state] DebugLocked = No
1,564,050 UART: [state] WD Timer not started. Device not locked for debugging
1,565,762 UART: [update-reset] ++
2,843,871 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,995 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,993,386 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,400 UART: [update-reset Success] --
3,001,809 >>> mbox cmd response: success
3,001,809 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,632 UART: [state] Locking Datavault
3,003,376 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,980 UART: [state] Locking ICCM
3,004,414 UART: [exit] Launching FMC @ 0x40000000
3,009,711 UART:
3,009,727 UART: Running Caliptra FMC ...
3,010,135 UART:
3,010,276 UART: [fmc] Received command: 0x1000000C
3,011,011 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [fake-rom-cold-reset] ++
88,556 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,862 UART: [fht] FHT @ 0x50003400
92,321 UART: [fwproc] Wait for Commands...
93,036 UART: [fwproc] Recv command 0x46574c44
93,764 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,144 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,760 >>> mbox cmd response: success
1,548,918 UART: [fake-rom-cold-reset] --
1,549,313 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,549,636 UART: [state] Locking Datavault
1,550,659 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,263 UART: [state] Locking ICCM
1,551,891 UART: [exit] Launching FMC @ 0x40000000
1,557,188 UART:
1,557,204 UART: Running Caliptra FMC ...
1,557,612 UART:
1,557,753 UART: [fmc] Received command: 0x46574C44
1,558,577 UART:
1,558,593 UART: Running Caliptra ROM ...
1,559,001 UART:
1,559,056 UART: [state] CFI Enabled
1,561,480 UART: [state] LifecycleState = Unprovisioned
1,562,139 UART: [state] DebugLocked = No
1,562,788 UART: [state] WD Timer not started. Device not locked for debugging
1,564,274 UART: [update-reset] ++
2,842,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,969 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,992,282 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,296 UART: [update-reset Success] --
3,000,705 >>> mbox cmd response: success
3,000,705 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,264 UART: [state] Locking Datavault
3,002,022 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,626 UART: [state] Locking ICCM
3,003,160 UART: [exit] Launching FMC @ 0x40000000
3,008,457 UART:
3,008,473 UART: Running Caliptra FMC ...
3,008,881 UART:
3,009,022 UART: [fmc] Received command: 0x1000000C
3,009,757 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [fake-rom-cold-reset] ++
88,947 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,135 UART: [fht] FHT @ 0x50003400
92,538 UART: [fwproc] Wait for Commands...
93,303 UART: [fwproc] Recv command 0x46574c44
94,031 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,233 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,883 >>> mbox cmd response: success
1,549,041 UART: [fake-rom-cold-reset] --
1,549,436 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,549,735 UART: [state] Locking Datavault
1,551,192 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,796 UART: [state] Locking ICCM
1,552,256 UART: [exit] Launching FMC @ 0x40000000
1,557,553 UART:
1,557,569 UART: Running Caliptra FMC ...
1,557,977 UART:
1,558,118 UART: [fmc] Received command: 0x46574C44
1,558,942 UART:
1,558,958 UART: Running Caliptra ROM ...
1,559,366 UART:
1,559,508 UART: [state] CFI Enabled
1,562,480 UART: [state] LifecycleState = Unprovisioned
1,563,139 UART: [state] DebugLocked = No
1,563,810 UART: [state] WD Timer not started. Device not locked for debugging
1,565,548 UART: [update-reset] ++
2,845,225 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,846,385 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,994,726 UART: [update-reset] Copying MAN_2 To MAN_1
3,002,740 UART: [update-reset Success] --
3,003,149 >>> mbox cmd response: success
3,003,149 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,003,754 UART: [state] Locking Datavault
3,004,598 UART: [state] Locking PCR0, PCR1 and PCR31
3,005,202 UART: [state] Locking ICCM
3,005,828 UART: [exit] Launching FMC @ 0x40000000
3,011,125 UART:
3,011,141 UART: Running Caliptra FMC ...
3,011,549 UART:
3,011,690 UART: [fmc] Received command: 0x1000000C
3,012,425 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [fake-rom-cold-reset] ++
88,711 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,991 UART: [fht] FHT @ 0x50003400
92,300 UART: [fwproc] Wait for Commands...
92,931 UART: [fwproc] Recv command 0x46574c44
93,659 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,033 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,639 >>> mbox cmd response: success
1,547,797 UART: [fake-rom-cold-reset] --
1,548,192 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,548,655 UART: [state] Locking Datavault
1,549,606 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,210 UART: [state] Locking ICCM
1,550,666 UART: [exit] Launching FMC @ 0x40000000
1,555,963 UART:
1,555,979 UART: Running Caliptra FMC ...
1,556,387 UART:
1,556,528 UART: [fmc] Received command: 0x46574C44
1,557,352 UART:
1,557,368 UART: Running Caliptra ROM ...
1,557,776 UART:
1,557,918 UART: [state] CFI Enabled
1,560,536 UART: [state] LifecycleState = Unprovisioned
1,561,195 UART: [state] DebugLocked = No
1,561,912 UART: [state] WD Timer not started. Device not locked for debugging
1,563,342 UART: [update-reset] ++
2,844,065 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,071 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,993,400 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,414 UART: [update-reset Success] --
3,001,823 >>> mbox cmd response: success
3,001,823 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,344 UART: [state] Locking Datavault
3,003,076 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,680 UART: [state] Locking ICCM
3,004,148 UART: [exit] Launching FMC @ 0x40000000
3,009,445 UART:
3,009,461 UART: Running Caliptra FMC ...
3,009,869 UART:
3,010,010 UART: [fmc] Received command: 0x1000000C
3,010,745 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,104 UART: [fake-rom-cold-reset] ++
89,032 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,190 UART: [fht] FHT @ 0x50003400
92,551 UART: [fwproc] Wait for Commands...
93,208 UART: [fwproc] Recv command 0x46574c44
93,936 UART: [fwproc] Recv'd Img size: 111944 bytes
1,359,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,048 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,490 >>> mbox cmd response: success
1,548,648 UART: [fake-rom-cold-reset] --
1,549,043 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,549,520 UART: [state] Locking Datavault
1,550,705 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,309 UART: [state] Locking ICCM
1,551,843 UART: [exit] Launching FMC @ 0x40000000
1,557,140 UART:
1,557,156 UART: Running Caliptra FMC ...
1,557,564 UART:
1,557,705 UART: [fmc] Received command: 0x46574C44
1,558,529 UART:
1,558,545 UART: Running Caliptra ROM ...
1,558,953 UART:
1,559,008 UART: [state] CFI Enabled
1,561,676 UART: [state] LifecycleState = Unprovisioned
1,562,335 UART: [state] DebugLocked = No
1,562,974 UART: [state] WD Timer not started. Device not locked for debugging
1,564,616 UART: [update-reset] ++
2,843,313 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,405 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,992,776 UART: [update-reset] Copying MAN_2 To MAN_1
3,000,790 UART: [update-reset Success] --
3,001,199 >>> mbox cmd response: success
3,001,199 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,001,914 UART: [state] Locking Datavault
3,002,616 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,220 UART: [state] Locking ICCM
3,003,796 UART: [exit] Launching FMC @ 0x40000000
3,009,093 UART:
3,009,109 UART: Running Caliptra FMC ...
3,009,517 UART:
3,009,658 UART: [fmc] Received command: 0x1000000C
3,010,393 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [fake-rom-cold-reset] ++
88,702 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
88,900 UART: [fht] FHT @ 0x50003400
92,193 UART: [fwproc] Wait for Commands...
92,850 UART: [fwproc] Recv command 0x46574c44
93,578 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,386,096 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,547,578 >>> mbox cmd response: success
1,548,736 UART: [fake-rom-cold-reset] --
1,549,131 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,549,498 UART: [state] Locking Datavault
1,550,591 UART: [state] Locking PCR0, PCR1 and PCR31
1,551,195 UART: [state] Locking ICCM
1,551,785 UART: [exit] Launching FMC @ 0x40000000
1,557,082 UART:
1,557,098 UART: Running Caliptra FMC ...
1,557,506 UART:
1,557,647 UART: [fmc] Received command: 0x46574C44
1,558,471 UART:
1,558,487 UART: Running Caliptra ROM ...
1,558,895 UART:
1,558,950 UART: [state] CFI Enabled
1,561,356 UART: [state] LifecycleState = Unprovisioned
1,562,015 UART: [state] DebugLocked = No
1,562,504 UART: [state] WD Timer not started. Device not locked for debugging
1,564,022 UART: [update-reset] ++
2,843,697 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,844,721 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,993,024 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,038 UART: [update-reset Success] --
3,001,447 >>> mbox cmd response: success
3,001,447 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,144 UART: [state] Locking Datavault
3,003,134 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,738 UART: [state] Locking ICCM
3,004,188 UART: [exit] Launching FMC @ 0x40000000
3,009,485 UART:
3,009,501 UART: Running Caliptra FMC ...
3,009,909 UART:
3,010,050 UART: [fmc] Received command: 0x1000000C
3,010,785 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,889 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [fake-rom-cold-reset] ++
89,333 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,547 UART: [fht] FHT @ 0x50003400
92,930 UART: [fwproc] Wait for Commands...
93,629 UART: [fwproc] Recv command 0x46574c44
94,357 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,887 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,407 >>> mbox cmd response: success
1,547,565 UART: [fake-rom-cold-reset] --
1,547,960 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,548,381 UART: [state] Locking Datavault
1,549,710 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,314 UART: [state] Locking ICCM
1,550,826 UART: [exit] Launching FMC @ 0x40000000
1,556,123 UART:
1,556,139 UART: Running Caliptra FMC ...
1,556,547 UART:
1,556,688 UART: [fmc] Received command: 0x46574C44
1,557,512 UART:
1,557,528 UART: Running Caliptra ROM ...
1,557,936 UART:
1,558,078 UART: [state] CFI Enabled
1,560,586 UART: [state] LifecycleState = Unprovisioned
1,561,245 UART: [state] DebugLocked = No
1,561,756 UART: [state] WD Timer not started. Device not locked for debugging
1,563,088 UART: [update-reset] ++
2,841,789 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,963 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,991,130 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,144 UART: [update-reset Success] --
2,999,553 >>> mbox cmd response: success
2,999,553 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,084 UART: [state] Locking Datavault
3,000,800 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,404 UART: [state] Locking ICCM
3,002,030 UART: [exit] Launching FMC @ 0x40000000
3,007,327 UART:
3,007,343 UART: Running Caliptra FMC ...
3,007,751 UART:
3,007,892 UART: [fmc] Received command: 0x1000000C
3,008,627 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [fake-rom-cold-reset] ++
88,947 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
89,253 UART: [fht] FHT @ 0x50003400
92,494 UART: [fwproc] Wait for Commands...
93,117 UART: [fwproc] Recv command 0x46574c44
93,845 UART: [fwproc] Recv'd Img size: 111944 bytes
1,358,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,251 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,546,783 >>> mbox cmd response: success
1,547,941 UART: [fake-rom-cold-reset] --
1,548,336 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,548,889 UART: [state] Locking Datavault
1,550,212 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,816 UART: [state] Locking ICCM
1,551,322 UART: [exit] Launching FMC @ 0x40000000
1,556,619 UART:
1,556,635 UART: Running Caliptra FMC ...
1,557,043 UART:
1,557,184 UART: [fmc] Received command: 0x46574C44
1,558,008 UART:
1,558,024 UART: Running Caliptra ROM ...
1,558,432 UART:
1,558,574 UART: [state] CFI Enabled
1,561,364 UART: [state] LifecycleState = Unprovisioned
1,562,023 UART: [state] DebugLocked = No
1,562,620 UART: [state] WD Timer not started. Device not locked for debugging
1,564,068 UART: [update-reset] ++
2,844,165 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,845,205 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,993,502 UART: [update-reset] Copying MAN_2 To MAN_1
3,001,516 UART: [update-reset Success] --
3,001,925 >>> mbox cmd response: success
3,001,925 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,002,362 UART: [state] Locking Datavault
3,003,018 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,622 UART: [state] Locking ICCM
3,004,270 UART: [exit] Launching FMC @ 0x40000000
3,009,567 UART:
3,009,583 UART: Running Caliptra FMC ...
3,009,991 UART:
3,010,132 UART: [fmc] Received command: 0x1000000C
3,010,867 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,024 UART:
192,412 UART: Running Caliptra ROM ...
193,585 UART:
193,732 UART: [state] CFI Enabled
261,324 UART: [state] LifecycleState = Unprovisioned
263,665 UART: [state] DebugLocked = No
265,648 UART: [state] WD Timer not started. Device not locked for debugging
270,041 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,390 UART:
192,772 UART: Running Caliptra ROM ...
193,981 UART:
194,135 UART: [state] CFI Enabled
264,395 UART: [state] LifecycleState = Unprovisioned
266,782 UART: [state] DebugLocked = No
268,653 UART: [state] WD Timer not started. Device not locked for debugging
274,413 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,366 UART:
192,741 UART: Running Caliptra ROM ...
193,994 UART:
603,732 UART: [state] CFI Enabled
614,742 UART: [state] LifecycleState = Unprovisioned
617,140 UART: [state] DebugLocked = No
620,451 UART: [state] WD Timer not started. Device not locked for debugging
625,260 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,482 UART:
192,890 UART: Running Caliptra ROM ...
194,081 UART:
603,817 UART: [state] CFI Enabled
617,686 UART: [state] LifecycleState = Unprovisioned
620,078 UART: [state] DebugLocked = No
622,180 UART: [state] WD Timer not started. Device not locked for debugging
627,418 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,082 UART:
192,461 UART: Running Caliptra ROM ...
193,588 UART:
193,736 UART: [state] CFI Enabled
264,160 UART: [state] LifecycleState = Unprovisioned
265,914 UART: [state] DebugLocked = No
267,084 UART: [state] WD Timer not started. Device not locked for debugging
273,262 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,940 writing to cptra_bootfsm_go
193,047 UART:
193,431 UART: Running Caliptra ROM ...
194,616 UART:
194,767 UART: [state] CFI Enabled
265,796 UART: [state] LifecycleState = Unprovisioned
267,579 UART: [state] DebugLocked = No
268,956 UART: [state] WD Timer not started. Device not locked for debugging
274,214 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,130 UART:
192,513 UART: Running Caliptra ROM ...
193,697 UART:
193,848 UART: [state] CFI Enabled
263,936 UART: [state] LifecycleState = Unprovisioned
265,676 UART: [state] DebugLocked = No
267,925 UART: [state] WD Timer not started. Device not locked for debugging
273,252 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,507 UART:
192,870 UART: Running Caliptra ROM ...
194,052 UART:
603,587 UART: [state] CFI Enabled
619,889 UART: [state] LifecycleState = Unprovisioned
621,804 UART: [state] DebugLocked = No
623,080 UART: [state] WD Timer not started. Device not locked for debugging
627,596 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,530 UART:
192,897 UART: Running Caliptra ROM ...
194,091 UART:
603,747 UART: [state] CFI Enabled
616,107 UART: [state] LifecycleState = Unprovisioned
617,844 UART: [state] DebugLocked = No
620,409 UART: [state] WD Timer not started. Device not locked for debugging
624,997 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,196 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,871 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,068 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,718 UART: [state] LifecycleState = Unprovisioned
86,377 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,572 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,743 UART: [state] LifecycleState = Unprovisioned
85,402 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,212,167 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,353,086 UART:
2,353,485 UART: Running Caliptra ROM ...
2,354,644 UART:
2,354,815 UART: [state] CFI Enabled
2,355,770 UART: [state] LifecycleState = Unprovisioned
2,357,421 UART: [state] DebugLocked = No
2,358,527 UART: [state] WD Timer not started. Device not locked for debugging
2,361,017 UART: [fake-rom-cold-reset] ++
2,362,126 UART: [fht] FHT @ 0x50003400
2,363,512 UART: [fwproc] Wait for Commands...
2,364,817 UART: [fwproc] Recv command 0x46574c44
2,366,256 UART: [fwproc] Recv'd Img size: 111600 bytes
3,758,133 UART: ROM Fatal Error: 0x000B000C
3,761,937 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,210,950 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,352,143 UART:
2,352,582 UART: Running Caliptra ROM ...
2,353,757 UART:
2,353,931 UART: [state] CFI Enabled
2,354,895 UART: [state] LifecycleState = Unprovisioned
2,356,552 UART: [state] DebugLocked = No
2,357,580 UART: [state] WD Timer not started. Device not locked for debugging
2,360,043 UART: [fake-rom-cold-reset] ++
2,361,152 UART: [fht] FHT @ 0x50003400
2,362,181 UART: [fwproc] Wait for Commands...
2,363,465 UART: [fwproc] Recv command 0x46574c44
2,364,896 UART: [fwproc] Recv'd Img size: 111600 bytes
3,765,730 UART: ROM Fatal Error: 0x000B000C
3,769,585 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
2,218,489 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,359,444 UART:
2,359,851 UART: Running Caliptra ROM ...
2,361,020 UART:
2,361,187 UART: [state] CFI Enabled
2,362,524 UART: [state] LifecycleState = Unprovisioned
2,364,198 UART: [state] DebugLocked = No
2,365,304 UART: [state] WD Timer not started. Device not locked for debugging
2,367,771 UART: [fake-rom-cold-reset] ++
2,368,904 UART: [fht] FHT @ 0x50003400
2,369,885 UART: [fwproc] Wait for Commands...
2,371,161 UART: [fwproc] Recv command 0x46574c44
2,372,585 UART: [fwproc] Recv'd Img size: 111600 bytes
3,768,181 UART: ROM Fatal Error: 0x000B000C
3,772,016 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,220,341 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,361,538 UART:
2,361,970 UART: Running Caliptra ROM ...
2,363,163 UART:
2,363,335 UART: [state] CFI Enabled
2,364,287 UART: [state] LifecycleState = Unprovisioned
2,365,938 UART: [state] DebugLocked = No
2,367,034 UART: [state] WD Timer not started. Device not locked for debugging
2,369,504 UART: [fake-rom-cold-reset] ++
2,370,603 UART: [fht] FHT @ 0x50003400
2,371,626 UART: [fwproc] Wait for Commands...
2,372,909 UART: [fwproc] Recv command 0x46574c44
2,374,336 UART: [fwproc] Recv'd Img size: 111600 bytes
3,770,317 UART: ROM Fatal Error: 0x000B000C
3,774,109 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,214,900 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,356,542 UART:
2,356,955 UART: Running Caliptra ROM ...
2,358,123 UART:
2,358,292 UART: [state] CFI Enabled
2,359,276 UART: [state] LifecycleState = Unprovisioned
2,360,923 UART: [state] DebugLocked = No
2,362,033 UART: [state] WD Timer not started. Device not locked for debugging
2,364,526 UART: [fake-rom-cold-reset] ++
2,365,575 UART: [fht] FHT @ 0x50003400
2,366,693 UART: [fwproc] Wait for Commands...
2,367,983 UART: [fwproc] Recv command 0x46574c44
2,369,414 UART: [fwproc] Recv'd Img size: 111944 bytes
3,419,174 UART: ROM Fatal Error: 0x000B000C
3,422,147 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,227,164 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,368,737 UART:
2,369,147 UART: Running Caliptra ROM ...
2,370,357 UART:
2,370,535 UART: [state] CFI Enabled
2,371,526 UART: [state] LifecycleState = Unprovisioned
2,373,176 UART: [state] DebugLocked = No
2,374,285 UART: [state] WD Timer not started. Device not locked for debugging
2,376,763 UART: [fake-rom-cold-reset] ++
2,377,870 UART: [fht] FHT @ 0x50003400
2,378,906 UART: [fwproc] Wait for Commands...
2,380,192 UART: [fwproc] Recv command 0x46574c44
2,381,623 UART: [fwproc] Recv'd Img size: 111944 bytes
3,430,928 UART: ROM Fatal Error: 0x000B000C
3,433,913 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,700 writing to cptra_bootfsm_go
2,215,278 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,356,813 UART:
2,357,211 UART: Running Caliptra ROM ...
2,358,393 UART:
2,358,581 UART: [state] CFI Enabled
2,359,561 UART: [state] LifecycleState = Unprovisioned
2,361,210 UART: [state] DebugLocked = No
2,362,318 UART: [state] WD Timer not started. Device not locked for debugging
2,364,794 UART: [fake-rom-cold-reset] ++
2,365,900 UART: [fht] FHT @ 0x50003400
2,366,945 UART: [fwproc] Wait for Commands...
2,368,229 UART: [fwproc] Recv command 0x46574c44
2,369,659 UART: [fwproc] Recv'd Img size: 111944 bytes
3,427,723 UART: ROM Fatal Error: 0x000B000C
3,430,722 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,485 writing to cptra_bootfsm_go
2,224,283 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,365,885 UART:
2,366,309 UART: Running Caliptra ROM ...
2,367,390 UART:
2,367,546 UART: [state] CFI Enabled
2,368,522 UART: [state] LifecycleState = Unprovisioned
2,370,166 UART: [state] DebugLocked = No
2,371,187 UART: [state] WD Timer not started. Device not locked for debugging
2,373,652 UART: [fake-rom-cold-reset] ++
2,374,692 UART: [fht] FHT @ 0x50003400
2,375,641 UART: [fwproc] Wait for Commands...
2,376,919 UART: [fwproc] Recv command 0x46574c44
2,378,261 UART: [fwproc] Recv'd Img size: 111944 bytes
3,429,893 UART: ROM Fatal Error: 0x000B000C
3,432,862 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,220,521 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,361,830 UART:
2,362,241 UART: Running Caliptra ROM ...
2,363,640 UART:
2,363,809 UART: [state] CFI Enabled
2,364,809 UART: [state] LifecycleState = Unprovisioned
2,366,486 UART: [state] DebugLocked = No
2,367,604 UART: [state] WD Timer not started. Device not locked for debugging
2,370,082 UART: [fake-rom-cold-reset] ++
2,371,189 UART: [fht] FHT @ 0x50003400
2,372,215 UART: [fwproc] Wait for Commands...
2,373,493 UART: [fwproc] Recv command 0x46574c44
2,374,920 UART: [fwproc] Recv'd Img size: 111944 bytes
3,423,403 UART: ROM Fatal Error: 0x000B000C
3,426,408 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,270 UART: [fake-rom-cold-reset] ++
89,336 UART: [fht] FHT @ 0x50003400
92,681 UART: [fwproc] Wait for Commands...
93,396 UART: [fwproc] Recv command 0x46574c44
94,124 UART: [fwproc] Recv'd Img size: 111944 bytes
130,913 UART: ROM Fatal Error: 0x000B000C
132,082 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [fake-rom-cold-reset] ++
89,240 UART: [fht] FHT @ 0x50003400
92,585 UART: [fwproc] Wait for Commands...
93,370 UART: [fwproc] Recv command 0x46574c44
94,098 UART: [fwproc] Recv'd Img size: 111944 bytes
131,717 UART: ROM Fatal Error: 0x000B000C
132,886 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,975 UART: [state] LifecycleState = Unprovisioned
86,634 UART: [state] DebugLocked = No
87,317 UART: [state] WD Timer not started. Device not locked for debugging
88,835 UART: [fake-rom-cold-reset] ++
89,965 UART: [fht] FHT @ 0x50003400
93,406 UART: [fwproc] Wait for Commands...
94,189 UART: [fwproc] Recv command 0x46574c44
94,917 UART: [fwproc] Recv'd Img size: 111944 bytes
132,140 UART: ROM Fatal Error: 0x000B000C
133,309 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [fake-rom-cold-reset] ++
89,075 UART: [fht] FHT @ 0x50003400
92,436 UART: [fwproc] Wait for Commands...
93,235 UART: [fwproc] Recv command 0x46574c44
93,963 UART: [fwproc] Recv'd Img size: 111944 bytes
130,912 UART: ROM Fatal Error: 0x000B000C
132,081 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,260 UART: [fake-rom-cold-reset] ++
89,398 UART: [fht] FHT @ 0x50003400
92,691 UART: [fwproc] Wait for Commands...
93,316 UART: [fwproc] Recv command 0x46574c44
94,044 UART: [fwproc] Recv'd Img size: 111944 bytes
130,371 UART: ROM Fatal Error: 0x000B000C
131,540 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [fake-rom-cold-reset] ++
88,878 UART: [fht] FHT @ 0x50003400
92,329 UART: [fwproc] Wait for Commands...
93,100 UART: [fwproc] Recv command 0x46574c44
93,828 UART: [fwproc] Recv'd Img size: 111944 bytes
131,787 UART: ROM Fatal Error: 0x000B000C
132,956 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [fake-rom-cold-reset] ++
89,279 UART: [fht] FHT @ 0x50003400
92,492 UART: [fwproc] Wait for Commands...
93,213 UART: [fwproc] Recv command 0x46574c44
93,941 UART: [fwproc] Recv'd Img size: 111944 bytes
130,402 UART: ROM Fatal Error: 0x000B000C
131,571 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [fake-rom-cold-reset] ++
89,173 UART: [fht] FHT @ 0x50003400
92,592 UART: [fwproc] Wait for Commands...
93,241 UART: [fwproc] Recv command 0x46574c44
93,969 UART: [fwproc] Recv'd Img size: 111944 bytes
131,600 UART: ROM Fatal Error: 0x000B000C
132,769 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [fake-rom-cold-reset] ++
88,946 UART: [fht] FHT @ 0x50003400
92,313 UART: [fwproc] Wait for Commands...
92,944 UART: [fwproc] Recv command 0x46574c44
93,672 UART: [fwproc] Recv'd Img size: 111944 bytes
130,555 UART: ROM Fatal Error: 0x000B000C
131,724 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [fake-rom-cold-reset] ++
88,956 UART: [fht] FHT @ 0x50003400
92,271 UART: [fwproc] Wait for Commands...
93,018 UART: [fwproc] Recv command 0x46574c44
93,746 UART: [fwproc] Recv'd Img size: 111944 bytes
131,081 UART: ROM Fatal Error: 0x000B000C
132,250 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [fake-rom-cold-reset] ++
89,429 UART: [fht] FHT @ 0x50003400
92,756 UART: [fwproc] Wait for Commands...
93,557 UART: [fwproc] Recv command 0x46574c44
94,285 UART: [fwproc] Recv'd Img size: 111944 bytes
132,194 UART: ROM Fatal Error: 0x000B000C
133,363 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [fake-rom-cold-reset] ++
88,807 UART: [fht] FHT @ 0x50003400
92,092 UART: [fwproc] Wait for Commands...
92,867 UART: [fwproc] Recv command 0x46574c44
93,595 UART: [fwproc] Recv'd Img size: 111944 bytes
130,734 UART: ROM Fatal Error: 0x000B000C
131,903 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,141 UART:
192,510 UART: Running Caliptra ROM ...
193,691 UART:
193,840 UART: [state] CFI Enabled
265,897 UART: [state] LifecycleState = Unprovisioned
268,311 UART: [state] DebugLocked = No
271,049 UART: [state] WD Timer not started. Device not locked for debugging
276,708 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,012 UART:
192,400 UART: Running Caliptra ROM ...
193,582 UART:
193,734 UART: [state] CFI Enabled
262,187 UART: [state] LifecycleState = Unprovisioned
264,627 UART: [state] DebugLocked = No
267,409 UART: [state] WD Timer not started. Device not locked for debugging
273,133 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,573 UART:
192,962 UART: Running Caliptra ROM ...
194,195 UART:
604,062 UART: [state] CFI Enabled
620,051 UART: [state] LifecycleState = Unprovisioned
622,409 UART: [state] DebugLocked = No
624,165 UART: [state] WD Timer not started. Device not locked for debugging
630,787 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,305 UART:
192,685 UART: Running Caliptra ROM ...
193,872 UART:
603,759 UART: [state] CFI Enabled
620,677 UART: [state] LifecycleState = Unprovisioned
623,092 UART: [state] DebugLocked = No
625,178 UART: [state] WD Timer not started. Device not locked for debugging
630,375 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,334 UART:
192,713 UART: Running Caliptra ROM ...
193,899 UART:
194,057 UART: [state] CFI Enabled
261,496 UART: [state] LifecycleState = Unprovisioned
263,274 UART: [state] DebugLocked = No
266,004 UART: [state] WD Timer not started. Device not locked for debugging
271,604 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,223 UART:
192,616 UART: Running Caliptra ROM ...
193,809 UART:
193,968 UART: [state] CFI Enabled
264,825 UART: [state] LifecycleState = Unprovisioned
266,607 UART: [state] DebugLocked = No
269,121 UART: [state] WD Timer not started. Device not locked for debugging
274,220 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,254 UART:
192,629 UART: Running Caliptra ROM ...
193,827 UART:
193,981 UART: [state] CFI Enabled
262,775 UART: [state] LifecycleState = Unprovisioned
264,503 UART: [state] DebugLocked = No
267,018 UART: [state] WD Timer not started. Device not locked for debugging
272,064 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,400 UART:
192,790 UART: Running Caliptra ROM ...
193,974 UART:
603,373 UART: [state] CFI Enabled
616,906 UART: [state] LifecycleState = Unprovisioned
618,650 UART: [state] DebugLocked = No
620,769 UART: [state] WD Timer not started. Device not locked for debugging
625,264 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,468 UART:
192,832 UART: Running Caliptra ROM ...
193,966 UART:
603,541 UART: [state] CFI Enabled
617,447 UART: [state] LifecycleState = Unprovisioned
619,189 UART: [state] DebugLocked = No
621,593 UART: [state] WD Timer not started. Device not locked for debugging
627,225 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
88,302 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,879 UART: [state] LifecycleState = Unprovisioned
85,538 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,708 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,354 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,072 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
4,872,377 ready_for_fw is high
4,872,770 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,438,482 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
4,866,415 ready_for_fw is high
4,867,039 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,437,626 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
5,186,556 ready_for_fw is high
5,187,203 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,623,210 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
5,181,899 ready_for_fw is high
5,182,614 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,608,273 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,478,775 ready_for_fw is high
3,479,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,303,297 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,460,715 ready_for_fw is high
3,461,114 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,265,009 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,485,185 ready_for_fw is high
3,485,671 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,313,275 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,787,706 ready_for_fw is high
3,788,366 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,512,612 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,785,022 ready_for_fw is high
3,785,610 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,528,347 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,739 ready_for_fw is high
1,077,739 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,418 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,999 ready_for_fw is high
1,077,999 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,652 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,434 ready_for_fw is high
1,078,434 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,539 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,816 ready_for_fw is high
1,077,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,155 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,785 ready_for_fw is high
1,076,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,064 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,273 ready_for_fw is high
1,078,273 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,552 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,038 ready_for_fw is high
1,078,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,053 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,610 ready_for_fw is high
1,078,610 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,951 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,039 ready_for_fw is high
1,078,039 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,864 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,155 ready_for_fw is high
1,078,155 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,368 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,460 ready_for_fw is high
1,078,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,123 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,696 ready_for_fw is high
1,077,696 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,795 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,215,272 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,350,821 UART:
2,351,254 UART: Running Caliptra ROM ...
2,352,431 UART:
2,352,603 UART: [state] CFI Enabled
2,353,585 UART: [state] LifecycleState = Unprovisioned
2,355,232 UART: [state] DebugLocked = No
2,356,338 UART: [state] WD Timer not started. Device not locked for debugging
2,358,811 UART: [kat] SHA2-256
2,359,483 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,362,495 UART: [kat] ++
2,362,946 UART: [kat] sha1
2,363,458 UART: [kat] SHA2-256
2,364,159 UART: [kat] SHA2-384
2,364,819 UART: [kat] SHA2-512-ACC
2,365,621 UART: [kat] ECC-384
3,774,699 UART: [kat] HMAC-384Kdf
3,799,763 UART: [kat] LMS
4,872,930 UART: [kat] --
4,875,759 UART: [cold-reset] ++
4,877,595 UART: [fht] FHT @ 0x50003400
4,888,200 UART: [idev] ++
4,888,880 UART: [idev] CDI.KEYID = 6
4,890,110 UART: [idev] SUBJECT.KEYID = 7
4,891,210 UART: [idev] UDS.KEYID = 0
4,926,811 UART: [idev] Erasing UDS.KEYID = 0
8,237,281 UART: [idev] Sha1 KeyId Algorithm
8,260,459 UART: [idev] --
8,264,669 UART: [ldev] ++
8,265,234 UART: [ldev] CDI.KEYID = 6
8,266,415 UART: [ldev] SUBJECT.KEYID = 5
8,267,572 UART: [ldev] AUTHORITY.KEYID = 7
8,268,798 UART: [ldev] FE.KEYID = 1
8,315,123 UART: [ldev] Erasing FE.KEYID = 1
11,651,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,124 UART: [ldev] --
14,034,040 UART: [fwproc] Wait for Commands...
14,035,759 UART: [fwproc] Recv command 0x46574c44
14,038,083 UART: [fwproc] Recv'd Img size: 106532 bytes
18,020,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,092,287 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,134,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,451,159 >>> mbox cmd response: success
18,455,233 UART: [afmc] ++
18,455,823 UART: [afmc] CDI.KEYID = 6
18,457,028 UART: [afmc] SUBJECT.KEYID = 7
18,458,135 UART: [afmc] AUTHORITY.KEYID = 5
21,838,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,152,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,154,934 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,170,965 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,187,053 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,203,129 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,225,569 UART: [afmc] --
24,228,236 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,228,608 UART: [cold-reset] --
24,232,616 UART: [state] Locking Datavault
24,238,137 UART: [state] Locking PCR0, PCR1 and PCR31
24,239,786 UART: [state] Locking ICCM
24,241,455 UART: [exit] Launching FMC @ 0x40000000
24,250,071 UART:
24,250,324 UART: Running Caliptra FMC ...
24,251,423 UART:
24,251,582 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,253,154 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,211,357 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,211,065 >>> mbox cmd response: success
23,898,436 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,912,863 UART:
23,913,202 UART: Running Caliptra FMC ...
23,914,379 UART:
23,914,542 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,916,321 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,547 writing to cptra_bootfsm_go
2,220,326 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,355,230 UART:
2,355,639 UART: Running Caliptra ROM ...
2,356,712 UART:
2,356,864 UART: [state] CFI Enabled
2,357,844 UART: [state] LifecycleState = Unprovisioned
2,359,490 UART: [state] DebugLocked = No
2,360,510 UART: [state] WD Timer not started. Device not locked for debugging
2,362,969 UART: [kat] SHA2-256
2,363,624 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,366,627 UART: [kat] ++
2,367,065 UART: [kat] sha1
2,367,568 UART: [kat] SHA2-256
2,368,216 UART: [kat] SHA2-384
2,368,864 UART: [kat] SHA2-512-ACC
2,369,689 UART: [kat] ECC-384
4,099,034 UART: [kat] HMAC-384Kdf
4,111,397 UART: [kat] LMS
5,184,553 UART: [kat] --
5,188,187 UART: [cold-reset] ++
5,189,852 UART: [fht] FHT @ 0x50003400
5,200,737 UART: [idev] ++
5,201,474 UART: [idev] CDI.KEYID = 6
5,202,571 UART: [idev] SUBJECT.KEYID = 7
5,204,101 UART: [idev] UDS.KEYID = 0
5,221,723 UART: [idev] Erasing UDS.KEYID = 0
8,495,868 UART: [idev] Sha1 KeyId Algorithm
8,518,456 UART: [idev] --
8,522,501 UART: [ldev] ++
8,523,121 UART: [ldev] CDI.KEYID = 6
8,524,297 UART: [ldev] SUBJECT.KEYID = 5
8,525,800 UART: [ldev] AUTHORITY.KEYID = 7
8,527,354 UART: [ldev] FE.KEYID = 1
8,538,918 UART: [ldev] Erasing FE.KEYID = 1
11,831,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,392 UART: [ldev] --
14,199,432 UART: [fwproc] Wait for Commands...
14,202,488 UART: [fwproc] Recv command 0x46574c44
14,204,799 UART: [fwproc] Recv'd Img size: 106532 bytes
18,184,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,257,903 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,300,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,616,332 >>> mbox cmd response: success
18,621,125 UART: [afmc] ++
18,621,707 UART: [afmc] CDI.KEYID = 6
18,622,940 UART: [afmc] SUBJECT.KEYID = 7
18,624,091 UART: [afmc] AUTHORITY.KEYID = 5
21,942,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,235,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,237,789 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,253,828 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,269,871 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,285,953 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,308,958 UART: [afmc] --
24,312,840 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,313,252 UART: [cold-reset] --
24,317,635 UART: [state] Locking Datavault
24,323,535 UART: [state] Locking PCR0, PCR1 and PCR31
24,325,228 UART: [state] Locking ICCM
24,327,448 UART: [exit] Launching FMC @ 0x40000000
24,336,063 UART:
24,336,303 UART: Running Caliptra FMC ...
24,337,398 UART:
24,337,553 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,339,193 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,215,057 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,413,979 >>> mbox cmd response: success
24,037,957 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,051,903 UART:
24,052,250 UART: Running Caliptra FMC ...
24,053,433 UART:
24,053,598 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,055,359 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,215,080 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,350,584 UART:
2,351,001 UART: Running Caliptra ROM ...
2,352,179 UART:
2,352,352 UART: [state] CFI Enabled
2,353,316 UART: [state] LifecycleState = Unprovisioned
2,354,997 UART: [state] DebugLocked = No
2,356,110 UART: [state] WD Timer not started. Device not locked for debugging
2,358,584 UART: [kat] SHA2-256
2,359,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,263 UART: [kat] ++
2,362,715 UART: [kat] sha1
2,363,227 UART: [kat] SHA2-256
2,363,970 UART: [kat] SHA2-384
2,364,727 UART: [kat] SHA2-512-ACC
2,365,530 UART: [kat] ECC-384
2,948,364 UART: [kat] HMAC-384Kdf
2,971,174 UART: [kat] LMS
3,500,642 UART: [kat] --
3,505,206 UART: [cold-reset] ++
3,506,445 UART: [fht] FHT @ 0x50003400
3,516,780 UART: [idev] ++
3,517,369 UART: [idev] CDI.KEYID = 6
3,518,286 UART: [idev] SUBJECT.KEYID = 7
3,519,450 UART: [idev] UDS.KEYID = 0
3,543,098 UART: [idev] Erasing UDS.KEYID = 0
6,022,518 UART: [idev] Sha1 KeyId Algorithm
6,046,282 UART: [idev] --
6,049,715 UART: [ldev] ++
6,050,297 UART: [ldev] CDI.KEYID = 6
6,051,180 UART: [ldev] SUBJECT.KEYID = 5
6,052,397 UART: [ldev] AUTHORITY.KEYID = 7
6,053,637 UART: [ldev] FE.KEYID = 1
6,098,072 UART: [ldev] Erasing FE.KEYID = 1
8,602,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,585 UART: [ldev] --
10,411,690 UART: [fwproc] Wait for Commands...
10,413,838 UART: [fwproc] Recv command 0x46574c44
10,415,938 UART: [fwproc] Recv'd Img size: 106876 bytes
13,725,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,791,230 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,833,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,151,215 >>> mbox cmd response: success
14,155,176 UART: [afmc] ++
14,155,769 UART: [afmc] CDI.KEYID = 6
14,156,682 UART: [afmc] SUBJECT.KEYID = 7
14,157,844 UART: [afmc] AUTHORITY.KEYID = 5
16,701,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,425,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,427,771 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,443,781 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,459,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,475,611 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,498,726 UART: [afmc] --
18,502,547 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,502,913 UART: [cold-reset] --
18,505,342 UART: [state] Locking Datavault
18,508,791 UART: [state] Locking PCR0, PCR1 and PCR31
18,510,451 UART: [state] Locking ICCM
18,513,175 UART: [exit] Launching FMC @ 0x40000000
18,521,579 UART:
18,521,825 UART: Running Caliptra FMC ...
18,522,932 UART:
18,523,089 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,524,661 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,217,884 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,353,045 UART:
2,353,472 UART: Running Caliptra ROM ...
2,354,581 UART:
2,354,744 UART: [state] CFI Enabled
2,355,715 UART: [state] LifecycleState = Unprovisioned
2,357,381 UART: [state] DebugLocked = No
2,358,491 UART: [state] WD Timer not started. Device not locked for debugging
2,360,961 UART: [kat] SHA2-256
2,361,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,364,635 UART: [kat] ++
2,365,081 UART: [kat] sha1
2,365,596 UART: [kat] SHA2-256
2,366,249 UART: [kat] SHA2-384
2,366,993 UART: [kat] SHA2-512-ACC
2,367,828 UART: [kat] ECC-384
2,948,925 UART: [kat] HMAC-384Kdf
2,974,012 UART: [kat] LMS
3,503,445 UART: [kat] --
3,507,601 UART: [cold-reset] ++
3,508,504 UART: [fht] FHT @ 0x50003400
3,520,830 UART: [idev] ++
3,521,396 UART: [idev] CDI.KEYID = 6
3,522,300 UART: [idev] SUBJECT.KEYID = 7
3,523,516 UART: [idev] UDS.KEYID = 0
3,545,970 UART: [idev] Erasing UDS.KEYID = 0
6,029,025 UART: [idev] Sha1 KeyId Algorithm
6,051,389 UART: [idev] --
6,054,556 UART: [ldev] ++
6,055,131 UART: [ldev] CDI.KEYID = 6
6,056,018 UART: [ldev] SUBJECT.KEYID = 5
6,057,242 UART: [ldev] AUTHORITY.KEYID = 7
6,058,447 UART: [ldev] FE.KEYID = 1
6,102,577 UART: [ldev] Erasing FE.KEYID = 1
8,608,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,309 UART: [ldev] --
10,416,817 UART: [fwproc] Wait for Commands...
10,418,318 UART: [fwproc] Recv command 0x46574c44
10,420,416 UART: [fwproc] Recv'd Img size: 106876 bytes
13,733,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,805,530 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,848,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,166,458 >>> mbox cmd response: success
14,170,625 UART: [afmc] ++
14,171,232 UART: [afmc] CDI.KEYID = 6
14,172,115 UART: [afmc] SUBJECT.KEYID = 7
14,173,274 UART: [afmc] AUTHORITY.KEYID = 5
16,703,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,429,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,431,341 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,447,322 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,463,217 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,479,201 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,500,404 UART: [afmc] --
18,503,305 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,503,678 UART: [cold-reset] --
18,507,296 UART: [state] Locking Datavault
18,510,218 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,916 UART: [state] Locking ICCM
18,513,494 UART: [exit] Launching FMC @ 0x40000000
18,521,911 UART:
18,522,149 UART: Running Caliptra FMC ...
18,523,175 UART:
18,523,319 UART: [fmc] Received command: 0x10000005
18,524,753 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,214,720 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,916,674 >>> mbox cmd response: success
18,191,177 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,207,489 UART:
18,207,838 UART: Running Caliptra FMC ...
18,208,936 UART:
18,209,107 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,210,874 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,220,332 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,355,607 UART:
2,356,047 UART: Running Caliptra ROM ...
2,357,213 UART:
2,357,385 UART: [state] CFI Enabled
2,358,346 UART: [state] LifecycleState = Unprovisioned
2,360,000 UART: [state] DebugLocked = No
2,361,121 UART: [state] WD Timer not started. Device not locked for debugging
2,363,513 UART: [kat] SHA2-256
2,364,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,175 UART: [kat] ++
2,367,621 UART: [kat] sha1
2,368,130 UART: [kat] SHA2-256
2,368,786 UART: [kat] SHA2-384
2,369,440 UART: [kat] SHA2-512-ACC
2,370,270 UART: [kat] ECC-384
3,280,662 UART: [kat] HMAC-384Kdf
3,293,774 UART: [kat] LMS
3,823,244 UART: [kat] --
3,829,663 UART: [cold-reset] ++
3,830,997 UART: [fht] FHT @ 0x50003400
3,842,028 UART: [idev] ++
3,842,590 UART: [idev] CDI.KEYID = 6
3,843,527 UART: [idev] SUBJECT.KEYID = 7
3,844,732 UART: [idev] UDS.KEYID = 0
3,860,896 UART: [idev] Erasing UDS.KEYID = 0
6,315,367 UART: [idev] Sha1 KeyId Algorithm
6,338,985 UART: [idev] --
6,343,083 UART: [ldev] ++
6,343,648 UART: [ldev] CDI.KEYID = 6
6,344,734 UART: [ldev] SUBJECT.KEYID = 5
6,345,851 UART: [ldev] AUTHORITY.KEYID = 7
6,347,029 UART: [ldev] FE.KEYID = 1
6,356,220 UART: [ldev] Erasing FE.KEYID = 1
8,825,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,100 UART: [ldev] --
10,618,285 UART: [fwproc] Wait for Commands...
10,620,220 UART: [fwproc] Recv command 0x46574c44
10,622,257 UART: [fwproc] Recv'd Img size: 106876 bytes
13,927,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,539 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,044,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,362,250 >>> mbox cmd response: success
14,366,995 UART: [afmc] ++
14,367,583 UART: [afmc] CDI.KEYID = 6
14,368,471 UART: [afmc] SUBJECT.KEYID = 7
14,369,705 UART: [afmc] AUTHORITY.KEYID = 5
16,867,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,591,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,593,235 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,609,177 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,625,104 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,641,079 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,663,583 UART: [afmc] --
18,667,384 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,667,777 UART: [cold-reset] --
18,670,701 UART: [state] Locking Datavault
18,674,760 UART: [state] Locking PCR0, PCR1 and PCR31
18,676,401 UART: [state] Locking ICCM
18,678,384 UART: [exit] Launching FMC @ 0x40000000
18,686,775 UART:
18,687,006 UART: Running Caliptra FMC ...
18,688,126 UART:
18,688,282 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,689,927 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,217,893 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,151,319 >>> mbox cmd response: success
18,384,108 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,398,681 UART:
18,399,036 UART: Running Caliptra FMC ...
18,400,243 UART:
18,400,420 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,402,181 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,678 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,517 UART: [cold-reset] ++
1,170,965 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,355 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,176 UART: [ldev] ++
1,209,344 UART: [ldev] CDI.KEYID = 6
1,209,708 UART: [ldev] SUBJECT.KEYID = 5
1,210,135 UART: [ldev] AUTHORITY.KEYID = 7
1,210,598 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,538 UART: [fwproc] Wait for Commands...
1,281,149 UART: [fwproc] Recv command 0x46574c44
1,281,882 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,650 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,641 >>> mbox cmd response: success
2,675,874 UART: [afmc] ++
2,676,042 UART: [afmc] CDI.KEYID = 6
2,676,405 UART: [afmc] SUBJECT.KEYID = 7
2,676,831 UART: [afmc] AUTHORITY.KEYID = 5
2,713,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,014 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,734 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,627 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,320 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,167 UART: [afmc] --
2,757,113 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,135 UART: [cold-reset] --
2,758,125 UART: [state] Locking Datavault
2,759,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,014 UART: [state] Locking ICCM
2,760,646 UART: [exit] Launching FMC @ 0x40000000
2,765,943 UART:
2,765,959 UART: Running Caliptra FMC ...
2,766,367 UART:
2,766,505 UART: [fmc] Received command: 0x10000005
2,767,606 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,481 >>> mbox cmd response: success
2,581,993 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,322 UART:
2,588,338 UART: Running Caliptra FMC ...
2,588,746 UART:
2,588,884 UART: [fmc] Received command: 0x10000005
2,589,985 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,198,430 UART: [idev] Sha1 KeyId Algorithm
1,207,310 UART: [idev] --
1,208,223 UART: [ldev] ++
1,208,391 UART: [ldev] CDI.KEYID = 6
1,208,755 UART: [ldev] SUBJECT.KEYID = 5
1,209,182 UART: [ldev] AUTHORITY.KEYID = 7
1,209,645 UART: [ldev] FE.KEYID = 1
1,214,881 UART: [ldev] Erasing FE.KEYID = 1
1,241,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,689 UART: [ldev] --
1,281,027 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,511 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,857 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,706 >>> mbox cmd response: success
2,675,729 UART: [afmc] ++
2,675,897 UART: [afmc] CDI.KEYID = 6
2,676,260 UART: [afmc] SUBJECT.KEYID = 7
2,676,686 UART: [afmc] AUTHORITY.KEYID = 5
2,712,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,367 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,087 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,980 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,673 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,556 UART: [afmc] --
2,755,494 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,516 UART: [cold-reset] --
2,756,402 UART: [state] Locking Datavault
2,757,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,197 UART: [state] Locking ICCM
2,758,641 UART: [exit] Launching FMC @ 0x40000000
2,763,938 UART:
2,763,954 UART: Running Caliptra FMC ...
2,764,362 UART:
2,764,500 UART: [fmc] Received command: 0x10000005
2,765,601 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,526,052 >>> mbox cmd response: success
2,581,794 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,795 UART:
2,587,811 UART: Running Caliptra FMC ...
2,588,219 UART:
2,588,357 UART: [fmc] Received command: 0x10000005
2,589,458 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,821 UART: [idev] ++
1,172,989 UART: [idev] CDI.KEYID = 6
1,173,350 UART: [idev] SUBJECT.KEYID = 7
1,173,775 UART: [idev] UDS.KEYID = 0
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,732 UART: [ldev] ++
1,208,900 UART: [ldev] CDI.KEYID = 6
1,209,264 UART: [ldev] SUBJECT.KEYID = 5
1,209,691 UART: [ldev] AUTHORITY.KEYID = 7
1,210,154 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,384 UART: [fwproc] Wait for Commands...
1,281,035 UART: [fwproc] Recv command 0x46574c44
1,281,768 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,370 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,227 >>> mbox cmd response: success
2,675,462 UART: [afmc] ++
2,675,630 UART: [afmc] CDI.KEYID = 6
2,675,993 UART: [afmc] SUBJECT.KEYID = 7
2,676,419 UART: [afmc] AUTHORITY.KEYID = 5
2,712,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,330 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,050 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,943 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,636 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,347 UART: [afmc] --
2,755,279 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,301 UART: [cold-reset] --
2,755,967 UART: [state] Locking Datavault
2,757,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,654 UART: [state] Locking ICCM
2,758,078 UART: [exit] Launching FMC @ 0x40000000
2,763,375 UART:
2,763,391 UART: Running Caliptra FMC ...
2,763,799 UART:
2,763,937 UART: [fmc] Received command: 0x10000005
2,765,038 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,526,362 >>> mbox cmd response: success
2,582,078 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,309 UART:
2,588,325 UART: Running Caliptra FMC ...
2,588,733 UART:
2,588,871 UART: [fmc] Received command: 0x10000005
2,589,972 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,969 UART: [state] LifecycleState = Unprovisioned
86,624 UART: [state] DebugLocked = No
87,266 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
892,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,188 UART: [kat] ++
896,340 UART: [kat] sha1
900,704 UART: [kat] SHA2-256
902,644 UART: [kat] SHA2-384
905,385 UART: [kat] SHA2-512-ACC
907,286 UART: [kat] ECC-384
917,763 UART: [kat] HMAC-384Kdf
922,345 UART: [kat] LMS
1,170,657 UART: [kat] --
1,171,256 UART: [cold-reset] ++
1,171,748 UART: [fht] FHT @ 0x50003400
1,174,374 UART: [idev] ++
1,174,542 UART: [idev] CDI.KEYID = 6
1,174,903 UART: [idev] SUBJECT.KEYID = 7
1,175,328 UART: [idev] UDS.KEYID = 0
1,183,268 UART: [idev] Erasing UDS.KEYID = 0
1,200,050 UART: [idev] Sha1 KeyId Algorithm
1,208,906 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,269 UART: [ldev] --
1,282,625 UART: [fwproc] Wait for Commands...
1,283,374 UART: [fwproc] Recv command 0x46574c44
1,284,107 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,111 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,164 >>> mbox cmd response: success
2,677,427 UART: [afmc] ++
2,677,595 UART: [afmc] CDI.KEYID = 6
2,677,958 UART: [afmc] SUBJECT.KEYID = 7
2,678,384 UART: [afmc] AUTHORITY.KEYID = 5
2,713,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,117 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,837 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,730 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,423 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,328 UART: [afmc] --
2,757,384 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,406 UART: [cold-reset] --
2,758,336 UART: [state] Locking Datavault
2,759,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,931 UART: [state] Locking ICCM
2,760,557 UART: [exit] Launching FMC @ 0x40000000
2,765,854 UART:
2,765,870 UART: Running Caliptra FMC ...
2,766,278 UART:
2,766,416 UART: [fmc] Received command: 0x10000005
2,767,517 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,140 >>> mbox cmd response: success
2,580,972 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,077 UART:
2,587,093 UART: Running Caliptra FMC ...
2,587,501 UART:
2,587,639 UART: [fmc] Received command: 0x10000005
2,588,740 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,892 UART: [state] LifecycleState = Unprovisioned
86,547 UART: [state] DebugLocked = No
87,269 UART: [state] WD Timer not started. Device not locked for debugging
88,484 UART: [kat] SHA2-256
892,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,163 UART: [kat] ++
896,315 UART: [kat] sha1
900,723 UART: [kat] SHA2-256
902,663 UART: [kat] SHA2-384
905,430 UART: [kat] SHA2-512-ACC
907,331 UART: [kat] ECC-384
917,070 UART: [kat] HMAC-384Kdf
921,662 UART: [kat] LMS
1,169,974 UART: [kat] --
1,170,825 UART: [cold-reset] ++
1,171,157 UART: [fht] FHT @ 0x50003400
1,173,821 UART: [idev] ++
1,173,989 UART: [idev] CDI.KEYID = 6
1,174,350 UART: [idev] SUBJECT.KEYID = 7
1,174,775 UART: [idev] UDS.KEYID = 0
1,182,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,681 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,048 UART: [ldev] --
1,280,392 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,018 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,913 >>> mbox cmd response: success
2,674,984 UART: [afmc] ++
2,675,152 UART: [afmc] CDI.KEYID = 6
2,675,515 UART: [afmc] SUBJECT.KEYID = 7
2,675,941 UART: [afmc] AUTHORITY.KEYID = 5
2,711,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,270 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,990 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,883 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,576 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,339 UART: [afmc] --
2,754,221 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,243 UART: [cold-reset] --
2,755,141 UART: [state] Locking Datavault
2,756,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,790 UART: [state] Locking ICCM
2,757,250 UART: [exit] Launching FMC @ 0x40000000
2,762,547 UART:
2,762,563 UART: Running Caliptra FMC ...
2,762,971 UART:
2,763,109 UART: [fmc] Received command: 0x10000005
2,764,210 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,471 >>> mbox cmd response: success
2,580,421 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,188 UART:
2,586,204 UART: Running Caliptra FMC ...
2,586,612 UART:
2,586,750 UART: [fmc] Received command: 0x10000005
2,587,851 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
915,959 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,382 UART: [cold-reset] ++
1,169,884 UART: [fht] FHT @ 0x50003400
1,172,372 UART: [idev] ++
1,172,540 UART: [idev] CDI.KEYID = 6
1,172,901 UART: [idev] SUBJECT.KEYID = 7
1,173,326 UART: [idev] UDS.KEYID = 0
1,181,300 UART: [idev] Erasing UDS.KEYID = 0
1,198,380 UART: [idev] Sha1 KeyId Algorithm
1,207,212 UART: [idev] --
1,208,375 UART: [ldev] ++
1,208,543 UART: [ldev] CDI.KEYID = 6
1,208,907 UART: [ldev] SUBJECT.KEYID = 5
1,209,334 UART: [ldev] AUTHORITY.KEYID = 7
1,209,797 UART: [ldev] FE.KEYID = 1
1,215,031 UART: [ldev] Erasing FE.KEYID = 1
1,241,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,289 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,047 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,871 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,734 >>> mbox cmd response: success
2,675,927 UART: [afmc] ++
2,676,095 UART: [afmc] CDI.KEYID = 6
2,676,458 UART: [afmc] SUBJECT.KEYID = 7
2,676,884 UART: [afmc] AUTHORITY.KEYID = 5
2,712,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,105 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,825 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,718 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,411 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,176 UART: [afmc] --
2,756,172 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,194 UART: [cold-reset] --
2,757,024 UART: [state] Locking Datavault
2,758,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,841 UART: [state] Locking ICCM
2,759,391 UART: [exit] Launching FMC @ 0x40000000
2,764,688 UART:
2,764,704 UART: Running Caliptra FMC ...
2,765,112 UART:
2,765,250 UART: [fmc] Received command: 0x10000005
2,766,351 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,350 >>> mbox cmd response: success
2,580,522 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,849 UART:
2,586,865 UART: Running Caliptra FMC ...
2,587,273 UART:
2,587,411 UART: [fmc] Received command: 0x10000005
2,588,512 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,213,626 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,348,693 UART:
2,349,113 UART: Running Caliptra ROM ...
2,350,284 UART:
2,350,473 UART: [state] CFI Enabled
2,351,450 UART: [state] LifecycleState = Unprovisioned
2,353,095 UART: [state] DebugLocked = No
2,354,206 UART: [state] WD Timer not started. Device not locked for debugging
2,356,682 UART: [kat] SHA2-256
2,357,349 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,370 UART: [kat] ++
2,360,820 UART: [kat] sha1
2,361,332 UART: [kat] SHA2-256
2,362,025 UART: [kat] SHA2-384
2,362,690 UART: [kat] SHA2-512-ACC
2,363,529 UART: [kat] ECC-384
3,776,019 UART: [kat] HMAC-384Kdf
3,803,583 UART: [kat] LMS
4,876,759 UART: [kat] --
4,881,709 UART: [cold-reset] ++
4,883,724 UART: [fht] FHT @ 0x50003400
4,895,623 UART: [idev] ++
4,896,295 UART: [idev] CDI.KEYID = 6
4,897,527 UART: [idev] SUBJECT.KEYID = 7
4,898,631 UART: [idev] UDS.KEYID = 0
4,930,115 UART: [idev] Erasing UDS.KEYID = 0
8,244,339 UART: [idev] Sha1 KeyId Algorithm
8,266,218 UART: [idev] --
8,268,671 UART: [ldev] ++
8,269,252 UART: [ldev] CDI.KEYID = 6
8,270,361 UART: [ldev] SUBJECT.KEYID = 5
8,271,489 UART: [ldev] AUTHORITY.KEYID = 7
8,272,772 UART: [ldev] FE.KEYID = 1
8,317,777 UART: [ldev] Erasing FE.KEYID = 1
11,653,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,131 UART: [ldev] --
14,037,975 UART: [fwproc] Wait for Commands...
14,040,401 UART: [fwproc] Recv command 0x46574c44
14,042,660 UART: [fwproc] Recv'd Img size: 106532 bytes
18,023,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,094,946 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,137,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,453,804 >>> mbox cmd response: success
18,458,565 UART: [afmc] ++
18,459,152 UART: [afmc] CDI.KEYID = 6
18,460,338 UART: [afmc] SUBJECT.KEYID = 7
18,461,504 UART: [afmc] AUTHORITY.KEYID = 5
21,823,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,138,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,140,269 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,156,308 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,172,388 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,188,472 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,210,681 UART: [afmc] --
24,213,959 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,214,340 UART: [cold-reset] --
24,220,016 UART: [state] Locking Datavault
24,224,134 UART: [state] Locking PCR0, PCR1 and PCR31
24,225,834 UART: [state] Locking ICCM
24,227,175 UART: [exit] Launching FMC @ 0x40000000
24,235,793 UART:
24,236,025 UART: Running Caliptra FMC ...
24,237,127 UART:
24,237,289 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,238,883 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,211,183 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,239,718 >>> mbox cmd response: success
23,928,663 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,944,294 UART:
23,944,632 UART: Running Caliptra FMC ...
23,945,788 UART:
23,945,949 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,947,721 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,218,982 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,353,826 UART:
2,354,251 UART: Running Caliptra ROM ...
2,355,336 UART:
2,355,483 UART: [state] CFI Enabled
2,356,400 UART: [state] LifecycleState = Unprovisioned
2,358,042 UART: [state] DebugLocked = No
2,359,064 UART: [state] WD Timer not started. Device not locked for debugging
2,361,530 UART: [kat] SHA2-256
2,362,189 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,216 UART: [kat] ++
2,365,660 UART: [kat] sha1
2,366,163 UART: [kat] SHA2-256
2,366,813 UART: [kat] SHA2-384
2,367,463 UART: [kat] SHA2-512-ACC
2,368,254 UART: [kat] ECC-384
4,095,587 UART: [kat] HMAC-384Kdf
4,108,284 UART: [kat] LMS
5,181,449 UART: [kat] --
5,186,748 UART: [cold-reset] ++
5,187,998 UART: [fht] FHT @ 0x50003400
5,200,685 UART: [idev] ++
5,201,353 UART: [idev] CDI.KEYID = 6
5,202,514 UART: [idev] SUBJECT.KEYID = 7
5,204,046 UART: [idev] UDS.KEYID = 0
5,217,672 UART: [idev] Erasing UDS.KEYID = 0
8,493,019 UART: [idev] Sha1 KeyId Algorithm
8,515,637 UART: [idev] --
8,519,442 UART: [ldev] ++
8,520,024 UART: [ldev] CDI.KEYID = 6
8,521,211 UART: [ldev] SUBJECT.KEYID = 5
8,522,641 UART: [ldev] AUTHORITY.KEYID = 7
8,524,252 UART: [ldev] FE.KEYID = 1
8,538,186 UART: [ldev] Erasing FE.KEYID = 1
11,827,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,876 UART: [ldev] --
14,194,783 UART: [fwproc] Wait for Commands...
14,197,420 UART: [fwproc] Recv command 0x46574c44
14,199,753 UART: [fwproc] Recv'd Img size: 106532 bytes
18,179,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,250,296 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,293,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,609,911 >>> mbox cmd response: success
18,614,683 UART: [afmc] ++
18,615,270 UART: [afmc] CDI.KEYID = 6
18,616,175 UART: [afmc] SUBJECT.KEYID = 7
18,617,327 UART: [afmc] AUTHORITY.KEYID = 5
21,931,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,224,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,226,802 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,242,794 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,258,835 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,274,989 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,297,780 UART: [afmc] --
24,300,534 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,300,902 UART: [cold-reset] --
24,304,949 UART: [state] Locking Datavault
24,310,733 UART: [state] Locking PCR0, PCR1 and PCR31
24,312,374 UART: [state] Locking ICCM
24,314,683 UART: [exit] Launching FMC @ 0x40000000
24,323,293 UART:
24,323,520 UART: Running Caliptra FMC ...
24,324,615 UART:
24,324,770 UART: [fmc] Received command: 0x10000005
24,326,195 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,216,884 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,412,467 >>> mbox cmd response: success
24,032,332 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,047,072 UART:
24,047,427 UART: Running Caliptra FMC ...
24,048,609 UART:
24,048,772 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,050,530 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,215,544 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,351,008 UART:
2,351,445 UART: Running Caliptra ROM ...
2,352,616 UART:
2,352,787 UART: [state] CFI Enabled
2,353,688 UART: [state] LifecycleState = Unprovisioned
2,355,347 UART: [state] DebugLocked = No
2,356,454 UART: [state] WD Timer not started. Device not locked for debugging
2,358,924 UART: [kat] SHA2-256
2,359,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,605 UART: [kat] ++
2,363,055 UART: [kat] sha1
2,363,573 UART: [kat] SHA2-256
2,364,223 UART: [kat] SHA2-384
2,364,878 UART: [kat] SHA2-512-ACC
2,365,676 UART: [kat] ECC-384
2,946,996 UART: [kat] HMAC-384Kdf
2,970,525 UART: [kat] LMS
3,499,956 UART: [kat] --
3,504,331 UART: [cold-reset] ++
3,505,777 UART: [fht] FHT @ 0x50003400
3,516,977 UART: [idev] ++
3,517,538 UART: [idev] CDI.KEYID = 6
3,518,445 UART: [idev] SUBJECT.KEYID = 7
3,519,655 UART: [idev] UDS.KEYID = 0
3,543,727 UART: [idev] Erasing UDS.KEYID = 0
6,025,577 UART: [idev] Sha1 KeyId Algorithm
6,046,967 UART: [idev] --
6,050,726 UART: [ldev] ++
6,051,308 UART: [ldev] CDI.KEYID = 6
6,052,218 UART: [ldev] SUBJECT.KEYID = 5
6,053,319 UART: [ldev] AUTHORITY.KEYID = 7
6,054,665 UART: [ldev] FE.KEYID = 1
6,098,775 UART: [ldev] Erasing FE.KEYID = 1
8,601,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,872 UART: [ldev] --
10,412,191 UART: [fwproc] Wait for Commands...
10,413,748 UART: [fwproc] Recv command 0x46574c44
10,415,846 UART: [fwproc] Recv'd Img size: 106876 bytes
13,717,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,794,708 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,837,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,155,400 >>> mbox cmd response: success
14,159,431 UART: [afmc] ++
14,160,018 UART: [afmc] CDI.KEYID = 6
14,160,935 UART: [afmc] SUBJECT.KEYID = 7
14,162,115 UART: [afmc] AUTHORITY.KEYID = 5
16,699,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,425,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,427,224 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,443,081 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,958 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,474,934 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,334 UART: [afmc] --
18,500,402 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,500,773 UART: [cold-reset] --
18,504,125 UART: [state] Locking Datavault
18,507,717 UART: [state] Locking PCR0, PCR1 and PCR31
18,509,400 UART: [state] Locking ICCM
18,511,179 UART: [exit] Launching FMC @ 0x40000000
18,519,524 UART:
18,519,769 UART: Running Caliptra FMC ...
18,520,889 UART:
18,521,054 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,522,622 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,214,594 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,350,043 UART:
2,350,462 UART: Running Caliptra ROM ...
2,351,635 UART:
2,351,813 UART: [state] CFI Enabled
2,352,789 UART: [state] LifecycleState = Unprovisioned
2,354,453 UART: [state] DebugLocked = No
2,355,565 UART: [state] WD Timer not started. Device not locked for debugging
2,358,039 UART: [kat] SHA2-256
2,358,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,717 UART: [kat] ++
2,362,168 UART: [kat] sha1
2,362,679 UART: [kat] SHA2-256
2,363,438 UART: [kat] SHA2-384
2,364,107 UART: [kat] SHA2-512-ACC
2,364,989 UART: [kat] ECC-384
2,946,489 UART: [kat] HMAC-384Kdf
2,970,376 UART: [kat] LMS
3,499,869 UART: [kat] --
3,506,470 UART: [cold-reset] ++
3,507,390 UART: [fht] FHT @ 0x50003400
3,519,555 UART: [idev] ++
3,520,118 UART: [idev] CDI.KEYID = 6
3,521,028 UART: [idev] SUBJECT.KEYID = 7
3,522,245 UART: [idev] UDS.KEYID = 0
3,543,084 UART: [idev] Erasing UDS.KEYID = 0
6,028,356 UART: [idev] Sha1 KeyId Algorithm
6,050,451 UART: [idev] --
6,054,985 UART: [ldev] ++
6,055,578 UART: [ldev] CDI.KEYID = 6
6,056,672 UART: [ldev] SUBJECT.KEYID = 5
6,057,728 UART: [ldev] AUTHORITY.KEYID = 7
6,058,918 UART: [ldev] FE.KEYID = 1
6,098,949 UART: [ldev] Erasing FE.KEYID = 1
8,604,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,245 UART: [ldev] --
10,416,533 UART: [fwproc] Wait for Commands...
10,418,626 UART: [fwproc] Recv command 0x46574c44
10,420,667 UART: [fwproc] Recv'd Img size: 106876 bytes
13,741,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,815,488 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,858,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,175,499 >>> mbox cmd response: success
14,180,624 UART: [afmc] ++
14,181,223 UART: [afmc] CDI.KEYID = 6
14,182,135 UART: [afmc] SUBJECT.KEYID = 7
14,183,350 UART: [afmc] AUTHORITY.KEYID = 5
16,720,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,446,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,447,928 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,463,933 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,479,809 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,495,782 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,518,715 UART: [afmc] --
18,522,968 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,523,347 UART: [cold-reset] --
18,526,159 UART: [state] Locking Datavault
18,533,528 UART: [state] Locking PCR0, PCR1 and PCR31
18,535,231 UART: [state] Locking ICCM
18,537,392 UART: [exit] Launching FMC @ 0x40000000
18,545,781 UART:
18,546,033 UART: Running Caliptra FMC ...
18,547,142 UART:
18,547,302 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,548,869 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,210,638 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,950,399 >>> mbox cmd response: success
18,225,243 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,240,729 UART:
18,241,064 UART: Running Caliptra FMC ...
18,242,161 UART:
18,242,312 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,244,079 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,219,320 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,354,642 UART:
2,355,074 UART: Running Caliptra ROM ...
2,356,255 UART:
2,356,430 UART: [state] CFI Enabled
2,357,386 UART: [state] LifecycleState = Unprovisioned
2,359,039 UART: [state] DebugLocked = No
2,360,148 UART: [state] WD Timer not started. Device not locked for debugging
2,362,617 UART: [kat] SHA2-256
2,363,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,292 UART: [kat] ++
2,366,742 UART: [kat] sha1
2,367,311 UART: [kat] SHA2-256
2,367,985 UART: [kat] SHA2-384
2,368,641 UART: [kat] SHA2-512-ACC
2,369,436 UART: [kat] ECC-384
3,279,898 UART: [kat] HMAC-384Kdf
3,291,302 UART: [kat] LMS
3,820,758 UART: [kat] --
3,825,964 UART: [cold-reset] ++
3,828,327 UART: [fht] FHT @ 0x50003400
3,838,653 UART: [idev] ++
3,839,212 UART: [idev] CDI.KEYID = 6
3,840,225 UART: [idev] SUBJECT.KEYID = 7
3,841,324 UART: [idev] UDS.KEYID = 0
3,856,376 UART: [idev] Erasing UDS.KEYID = 0
6,314,190 UART: [idev] Sha1 KeyId Algorithm
6,338,314 UART: [idev] --
6,342,640 UART: [ldev] ++
6,343,204 UART: [ldev] CDI.KEYID = 6
6,344,169 UART: [ldev] SUBJECT.KEYID = 5
6,345,325 UART: [ldev] AUTHORITY.KEYID = 7
6,346,554 UART: [ldev] FE.KEYID = 1
6,357,716 UART: [ldev] Erasing FE.KEYID = 1
8,829,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,716 UART: [ldev] --
10,621,499 UART: [fwproc] Wait for Commands...
10,624,240 UART: [fwproc] Recv command 0x46574c44
10,626,276 UART: [fwproc] Recv'd Img size: 106876 bytes
13,944,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,017,225 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,059,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,378,201 >>> mbox cmd response: success
14,382,409 UART: [afmc] ++
14,382,999 UART: [afmc] CDI.KEYID = 6
14,383,910 UART: [afmc] SUBJECT.KEYID = 7
14,385,068 UART: [afmc] AUTHORITY.KEYID = 5
16,889,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,611,923 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,627,912 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,643,791 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,659,764 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,683,612 UART: [afmc] --
18,688,139 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,688,514 UART: [cold-reset] --
18,691,616 UART: [state] Locking Datavault
18,696,697 UART: [state] Locking PCR0, PCR1 and PCR31
18,698,334 UART: [state] Locking ICCM
18,700,995 UART: [exit] Launching FMC @ 0x40000000
18,709,381 UART:
18,709,620 UART: Running Caliptra FMC ...
18,710,716 UART:
18,710,875 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,712,437 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,217,374 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,147,486 >>> mbox cmd response: success
18,380,110 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,394,530 UART:
18,394,877 UART: Running Caliptra FMC ...
18,395,961 UART:
18,396,108 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,397,864 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,458 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,475 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,569 UART: [idev] ++
1,172,737 UART: [idev] CDI.KEYID = 6
1,173,098 UART: [idev] SUBJECT.KEYID = 7
1,173,523 UART: [idev] UDS.KEYID = 0
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,468 UART: [ldev] --
1,280,900 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,118 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,029 >>> mbox cmd response: success
2,675,196 UART: [afmc] ++
2,675,364 UART: [afmc] CDI.KEYID = 6
2,675,727 UART: [afmc] SUBJECT.KEYID = 7
2,676,153 UART: [afmc] AUTHORITY.KEYID = 5
2,712,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,238 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,958 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,851 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,544 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,529 UART: [afmc] --
2,755,425 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,447 UART: [cold-reset] --
2,756,427 UART: [state] Locking Datavault
2,757,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,242 UART: [state] Locking ICCM
2,758,720 UART: [exit] Launching FMC @ 0x40000000
2,764,017 UART:
2,764,033 UART: Running Caliptra FMC ...
2,764,441 UART:
2,764,579 UART: [fmc] Received command: 0x10000005
2,765,680 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,133 >>> mbox cmd response: success
2,581,373 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,502 UART:
2,587,518 UART: Running Caliptra FMC ...
2,587,926 UART:
2,588,064 UART: [fmc] Received command: 0x10000005
2,589,165 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,812 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,181,870 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Sha1 KeyId Algorithm
1,207,554 UART: [idev] --
1,208,731 UART: [ldev] ++
1,208,899 UART: [ldev] CDI.KEYID = 6
1,209,263 UART: [ldev] SUBJECT.KEYID = 5
1,209,690 UART: [ldev] AUTHORITY.KEYID = 7
1,210,153 UART: [ldev] FE.KEYID = 1
1,215,645 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,251 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,429 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,502 >>> mbox cmd response: success
2,675,675 UART: [afmc] ++
2,675,843 UART: [afmc] CDI.KEYID = 6
2,676,206 UART: [afmc] SUBJECT.KEYID = 7
2,676,632 UART: [afmc] AUTHORITY.KEYID = 5
2,711,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,737 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,457 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,350 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,043 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,942 UART: [afmc] --
2,754,986 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,008 UART: [cold-reset] --
2,755,722 UART: [state] Locking Datavault
2,756,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,585 UART: [state] Locking ICCM
2,758,233 UART: [exit] Launching FMC @ 0x40000000
2,763,530 UART:
2,763,546 UART: Running Caliptra FMC ...
2,763,954 UART:
2,764,092 UART: [fmc] Received command: 0x10000005
2,765,193 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,526,274 >>> mbox cmd response: success
2,582,378 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,588,307 UART:
2,588,323 UART: Running Caliptra FMC ...
2,588,731 UART:
2,588,869 UART: [fmc] Received command: 0x10000005
2,589,970 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,711 UART: [idev] ++
1,172,879 UART: [idev] CDI.KEYID = 6
1,173,240 UART: [idev] SUBJECT.KEYID = 7
1,173,665 UART: [idev] UDS.KEYID = 0
1,181,933 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,452 UART: [ldev] --
1,280,748 UART: [fwproc] Wait for Commands...
1,281,365 UART: [fwproc] Recv command 0x46574c44
1,282,098 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,029 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,950 >>> mbox cmd response: success
2,675,101 UART: [afmc] ++
2,675,269 UART: [afmc] CDI.KEYID = 6
2,675,632 UART: [afmc] SUBJECT.KEYID = 7
2,676,058 UART: [afmc] AUTHORITY.KEYID = 5
2,711,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,115 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,835 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,728 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,421 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,340 UART: [afmc] --
2,755,220 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,242 UART: [cold-reset] --
2,756,138 UART: [state] Locking Datavault
2,757,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,843 UART: [state] Locking ICCM
2,758,377 UART: [exit] Launching FMC @ 0x40000000
2,763,674 UART:
2,763,690 UART: Running Caliptra FMC ...
2,764,098 UART:
2,764,236 UART: [fmc] Received command: 0x10000005
2,765,337 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,520,721 >>> mbox cmd response: success
2,576,249 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,582,428 UART:
2,582,444 UART: Running Caliptra FMC ...
2,582,852 UART:
2,582,990 UART: [fmc] Received command: 0x10000005
2,584,091 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,162 UART: [idev] ++
1,173,330 UART: [idev] CDI.KEYID = 6
1,173,691 UART: [idev] SUBJECT.KEYID = 7
1,174,116 UART: [idev] UDS.KEYID = 0
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,365 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,727 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,685 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,540 >>> mbox cmd response: success
2,677,573 UART: [afmc] ++
2,677,741 UART: [afmc] CDI.KEYID = 6
2,678,104 UART: [afmc] SUBJECT.KEYID = 7
2,678,530 UART: [afmc] AUTHORITY.KEYID = 5
2,713,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,029 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,749 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,642 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,335 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,132 UART: [afmc] --
2,757,112 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,757,134 UART: [cold-reset] --
2,758,124 UART: [state] Locking Datavault
2,759,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,903 UART: [state] Locking ICCM
2,760,431 UART: [exit] Launching FMC @ 0x40000000
2,765,728 UART:
2,765,744 UART: Running Caliptra FMC ...
2,766,152 UART:
2,766,290 UART: [fmc] Received command: 0x10000005
2,767,391 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,668 >>> mbox cmd response: success
2,580,198 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,495 UART:
2,586,511 UART: Running Caliptra FMC ...
2,586,919 UART:
2,587,057 UART: [fmc] Received command: 0x10000005
2,588,158 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,770 UART: [kat] LMS
1,169,082 UART: [kat] --
1,170,033 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,472 UART: [fwproc] Wait for Commands...
1,281,061 UART: [fwproc] Recv command 0x46574c44
1,281,794 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,778 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,691 >>> mbox cmd response: success
2,674,828 UART: [afmc] ++
2,674,996 UART: [afmc] CDI.KEYID = 6
2,675,359 UART: [afmc] SUBJECT.KEYID = 7
2,675,785 UART: [afmc] AUTHORITY.KEYID = 5
2,710,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,188 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,908 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,801 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,494 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,353 UART: [afmc] --
2,754,293 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,315 UART: [cold-reset] --
2,755,291 UART: [state] Locking Datavault
2,756,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,238 UART: [state] Locking ICCM
2,757,672 UART: [exit] Launching FMC @ 0x40000000
2,762,969 UART:
2,762,985 UART: Running Caliptra FMC ...
2,763,393 UART:
2,763,531 UART: [fmc] Received command: 0x10000005
2,764,632 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,905 >>> mbox cmd response: success
2,579,145 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,234 UART:
2,585,250 UART: Running Caliptra FMC ...
2,585,658 UART:
2,585,796 UART: [fmc] Received command: 0x10000005
2,586,897 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,662 UART: [kat] SHA2-256
902,602 UART: [kat] SHA2-384
905,507 UART: [kat] SHA2-512-ACC
907,408 UART: [kat] ECC-384
916,931 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,556 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,200,046 UART: [idev] Sha1 KeyId Algorithm
1,208,858 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,287 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,224 >>> mbox cmd response: success
2,676,349 UART: [afmc] ++
2,676,517 UART: [afmc] CDI.KEYID = 6
2,676,880 UART: [afmc] SUBJECT.KEYID = 7
2,677,306 UART: [afmc] AUTHORITY.KEYID = 5
2,712,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,351 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,071 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,964 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,657 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,572 UART: [afmc] --
2,756,610 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,632 UART: [cold-reset] --
2,757,556 UART: [state] Locking Datavault
2,758,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,359 UART: [state] Locking ICCM
2,759,899 UART: [exit] Launching FMC @ 0x40000000
2,765,196 UART:
2,765,212 UART: Running Caliptra FMC ...
2,765,620 UART:
2,765,758 UART: [fmc] Received command: 0x10000005
2,766,859 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,640 >>> mbox cmd response: success
2,581,606 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,883 UART:
2,587,899 UART: Running Caliptra FMC ...
2,588,307 UART:
2,588,445 UART: [fmc] Received command: 0x10000005
2,589,546 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,214,453 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,349,146 UART:
2,349,548 UART: Running Caliptra ROM ...
2,350,631 UART:
2,350,787 UART: [state] CFI Enabled
2,351,774 UART: [state] LifecycleState = Unprovisioned
2,353,421 UART: [state] DebugLocked = No
2,354,447 UART: [state] WD Timer not started. Device not locked for debugging
2,356,916 UART: [kat] SHA2-256
2,357,583 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,598 UART: [kat] ++
2,361,047 UART: [kat] sha1
2,361,560 UART: [kat] SHA2-256
2,362,239 UART: [kat] SHA2-384
2,362,896 UART: [kat] SHA2-512-ACC
2,363,740 UART: [kat] ECC-384
3,775,071 UART: [kat] HMAC-384Kdf
3,803,039 UART: [kat] LMS
4,876,182 UART: [kat] --
4,880,015 UART: [cold-reset] ++
4,881,439 UART: [fht] FHT @ 0x50003400
4,892,480 UART: [idev] ++
4,893,153 UART: [idev] CDI.KEYID = 6
4,894,394 UART: [idev] SUBJECT.KEYID = 7
4,895,555 UART: [idev] UDS.KEYID = 0
4,930,300 UART: [idev] Erasing UDS.KEYID = 0
8,244,409 UART: [idev] Sha1 KeyId Algorithm
8,267,209 UART: [idev] --
8,272,174 UART: [ldev] ++
8,272,754 UART: [ldev] CDI.KEYID = 6
8,273,988 UART: [ldev] SUBJECT.KEYID = 5
8,275,143 UART: [ldev] AUTHORITY.KEYID = 7
8,276,372 UART: [ldev] FE.KEYID = 1
8,317,379 UART: [ldev] Erasing FE.KEYID = 1
11,651,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,524 UART: [ldev] --
14,038,246 UART: [fwproc] Wait for Commands...
14,041,477 UART: [fwproc] Recv command 0x46574c44
14,043,802 UART: [fwproc] Recv'd Img size: 106532 bytes
18,032,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,103,033 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,145,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,462,944 >>> mbox cmd response: success
18,466,468 UART: [afmc] ++
18,467,060 UART: [afmc] CDI.KEYID = 6
18,468,252 UART: [afmc] SUBJECT.KEYID = 7
18,469,355 UART: [afmc] AUTHORITY.KEYID = 5
21,838,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,137,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,139,721 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,155,768 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,171,829 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,187,918 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,210,690 UART: [afmc] --
24,214,670 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,215,086 UART: [cold-reset] --
24,218,066 UART: [state] Locking Datavault
24,224,906 UART: [state] Locking PCR0, PCR1 and PCR31
24,226,652 UART: [state] Locking ICCM
24,229,381 UART: [exit] Launching FMC @ 0x40000000
24,238,009 UART:
24,238,328 UART: Running Caliptra FMC ...
24,239,392 UART:
24,239,547 UART: [fmc] Received command: 0x10000003
24,249,067 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,211,697 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,230,172 >>> mbox cmd response: success
23,913,006 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,927,310 UART:
23,927,644 UART: Running Caliptra FMC ...
23,928,745 UART:
23,928,893 UART: [fmc] Received command: 0x10000003
23,938,409 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,218,084 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,353,484 UART:
2,353,929 UART: Running Caliptra ROM ...
2,355,099 UART:
2,355,288 UART: [state] CFI Enabled
2,356,267 UART: [state] LifecycleState = Unprovisioned
2,357,935 UART: [state] DebugLocked = No
2,359,043 UART: [state] WD Timer not started. Device not locked for debugging
2,361,509 UART: [kat] SHA2-256
2,362,174 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,185 UART: [kat] ++
2,365,628 UART: [kat] sha1
2,366,131 UART: [kat] SHA2-256
2,366,866 UART: [kat] SHA2-384
2,367,526 UART: [kat] SHA2-512-ACC
2,368,404 UART: [kat] ECC-384
4,099,967 UART: [kat] HMAC-384Kdf
4,111,277 UART: [kat] LMS
5,184,425 UART: [kat] --
5,189,799 UART: [cold-reset] ++
5,191,376 UART: [fht] FHT @ 0x50003400
5,202,399 UART: [idev] ++
5,203,106 UART: [idev] CDI.KEYID = 6
5,204,340 UART: [idev] SUBJECT.KEYID = 7
5,205,770 UART: [idev] UDS.KEYID = 0
5,224,061 UART: [idev] Erasing UDS.KEYID = 0
8,499,248 UART: [idev] Sha1 KeyId Algorithm
8,522,015 UART: [idev] --
8,525,853 UART: [ldev] ++
8,526,412 UART: [ldev] CDI.KEYID = 6
8,527,568 UART: [ldev] SUBJECT.KEYID = 5
8,529,098 UART: [ldev] AUTHORITY.KEYID = 7
8,530,574 UART: [ldev] FE.KEYID = 1
8,541,759 UART: [ldev] Erasing FE.KEYID = 1
11,833,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,191 UART: [ldev] --
14,198,210 UART: [fwproc] Wait for Commands...
14,199,932 UART: [fwproc] Recv command 0x46574c44
14,202,248 UART: [fwproc] Recv'd Img size: 106532 bytes
18,177,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,246,284 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,288,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,606,172 >>> mbox cmd response: success
18,609,821 UART: [afmc] ++
18,610,513 UART: [afmc] CDI.KEYID = 6
18,611,699 UART: [afmc] SUBJECT.KEYID = 7
18,612,850 UART: [afmc] AUTHORITY.KEYID = 5
21,933,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,231,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,233,839 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,249,889 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,265,906 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,282,019 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,304,815 UART: [afmc] --
24,308,628 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,308,994 UART: [cold-reset] --
24,312,727 UART: [state] Locking Datavault
24,318,400 UART: [state] Locking PCR0, PCR1 and PCR31
24,320,044 UART: [state] Locking ICCM
24,321,762 UART: [exit] Launching FMC @ 0x40000000
24,330,373 UART:
24,330,600 UART: Running Caliptra FMC ...
24,331,687 UART:
24,331,839 UART: [fmc] Received command: 0x10000003
24,341,450 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,215,329 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,420,082 >>> mbox cmd response: success
24,043,198 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,060,074 UART:
24,060,431 UART: Running Caliptra FMC ...
24,061,628 UART:
24,061,793 UART: [fmc] Received command: 0x10000003
24,071,197 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,213,535 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,348,589 UART:
2,349,011 UART: Running Caliptra ROM ...
2,350,185 UART:
2,350,354 UART: [state] CFI Enabled
2,351,318 UART: [state] LifecycleState = Unprovisioned
2,352,982 UART: [state] DebugLocked = No
2,354,450 UART: [state] WD Timer not started. Device not locked for debugging
2,356,947 UART: [kat] SHA2-256
2,357,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,360,626 UART: [kat] ++
2,361,099 UART: [kat] sha1
2,361,705 UART: [kat] SHA2-256
2,362,371 UART: [kat] SHA2-384
2,363,024 UART: [kat] SHA2-512-ACC
2,363,908 UART: [kat] ECC-384
2,946,115 UART: [kat] HMAC-384Kdf
2,971,428 UART: [kat] LMS
3,500,851 UART: [kat] --
3,505,655 UART: [cold-reset] ++
3,506,672 UART: [fht] FHT @ 0x50003400
3,516,521 UART: [idev] ++
3,517,088 UART: [idev] CDI.KEYID = 6
3,518,004 UART: [idev] SUBJECT.KEYID = 7
3,519,175 UART: [idev] UDS.KEYID = 0
3,543,905 UART: [idev] Erasing UDS.KEYID = 0
6,026,176 UART: [idev] Sha1 KeyId Algorithm
6,048,341 UART: [idev] --
6,052,103 UART: [ldev] ++
6,052,687 UART: [ldev] CDI.KEYID = 6
6,053,599 UART: [ldev] SUBJECT.KEYID = 5
6,054,742 UART: [ldev] AUTHORITY.KEYID = 7
6,056,040 UART: [ldev] FE.KEYID = 1
6,099,479 UART: [ldev] Erasing FE.KEYID = 1
8,603,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,280 UART: [ldev] --
10,412,904 UART: [fwproc] Wait for Commands...
10,414,679 UART: [fwproc] Recv command 0x46574c44
10,416,720 UART: [fwproc] Recv'd Img size: 106876 bytes
13,726,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,803,364 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,845,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,164,525 >>> mbox cmd response: success
14,169,027 UART: [afmc] ++
14,169,619 UART: [afmc] CDI.KEYID = 6
14,170,530 UART: [afmc] SUBJECT.KEYID = 7
14,171,690 UART: [afmc] AUTHORITY.KEYID = 5
16,704,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,426,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,428,754 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,444,766 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,460,699 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,476,617 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,499,644 UART: [afmc] --
18,504,221 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,504,610 UART: [cold-reset] --
18,507,209 UART: [state] Locking Datavault
18,511,968 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,671 UART: [state] Locking ICCM
18,515,461 UART: [exit] Launching FMC @ 0x40000000
18,523,824 UART:
18,524,078 UART: Running Caliptra FMC ...
18,525,191 UART:
18,525,354 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,535,137 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,223,184 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,358,401 UART:
2,358,813 UART: Running Caliptra ROM ...
2,359,922 UART:
2,360,084 UART: [state] CFI Enabled
2,361,053 UART: [state] LifecycleState = Unprovisioned
2,362,724 UART: [state] DebugLocked = No
2,364,019 UART: [state] WD Timer not started. Device not locked for debugging
2,366,544 UART: [kat] SHA2-256
2,367,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,237 UART: [kat] ++
2,370,689 UART: [kat] sha1
2,371,278 UART: [kat] SHA2-256
2,371,963 UART: [kat] SHA2-384
2,372,626 UART: [kat] SHA2-512-ACC
2,373,514 UART: [kat] ECC-384
2,947,781 UART: [kat] HMAC-384Kdf
2,972,538 UART: [kat] LMS
3,501,971 UART: [kat] --
3,507,582 UART: [cold-reset] ++
3,508,539 UART: [fht] FHT @ 0x50003400
3,518,599 UART: [idev] ++
3,519,161 UART: [idev] CDI.KEYID = 6
3,520,121 UART: [idev] SUBJECT.KEYID = 7
3,521,282 UART: [idev] UDS.KEYID = 0
3,544,277 UART: [idev] Erasing UDS.KEYID = 0
6,023,657 UART: [idev] Sha1 KeyId Algorithm
6,046,892 UART: [idev] --
6,051,680 UART: [ldev] ++
6,052,284 UART: [ldev] CDI.KEYID = 6
6,053,199 UART: [ldev] SUBJECT.KEYID = 5
6,054,367 UART: [ldev] AUTHORITY.KEYID = 7
6,055,608 UART: [ldev] FE.KEYID = 1
6,099,257 UART: [ldev] Erasing FE.KEYID = 1
8,601,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,065 UART: [ldev] --
10,393,582 UART: [fwproc] Wait for Commands...
10,395,469 UART: [fwproc] Recv command 0x46574c44
10,397,512 UART: [fwproc] Recv'd Img size: 106876 bytes
13,708,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,775,029 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,817,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,136,288 >>> mbox cmd response: success
14,141,287 UART: [afmc] ++
14,141,883 UART: [afmc] CDI.KEYID = 6
14,142,800 UART: [afmc] SUBJECT.KEYID = 7
14,143,960 UART: [afmc] AUTHORITY.KEYID = 5
16,683,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,404,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,406,311 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,422,304 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,438,228 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,454,248 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,476,488 UART: [afmc] --
18,480,576 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,480,939 UART: [cold-reset] --
18,486,399 UART: [state] Locking Datavault
18,490,861 UART: [state] Locking PCR0, PCR1 and PCR31
18,492,514 UART: [state] Locking ICCM
18,494,830 UART: [exit] Launching FMC @ 0x40000000
18,503,227 UART:
18,503,462 UART: Running Caliptra FMC ...
18,504,559 UART:
18,504,714 UART: [fmc] Received command: 0x10000003
18,514,286 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,210,840 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,966,043 >>> mbox cmd response: success
18,244,754 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,258,282 UART:
18,258,642 UART: Running Caliptra FMC ...
18,259,834 UART:
18,260,002 UART: [fmc] Received command: 0x10000003
18,269,460 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,220,719 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,356,038 UART:
2,356,454 UART: Running Caliptra ROM ...
2,357,627 UART:
2,357,799 UART: [state] CFI Enabled
2,358,761 UART: [state] LifecycleState = Unprovisioned
2,360,416 UART: [state] DebugLocked = No
2,361,521 UART: [state] WD Timer not started. Device not locked for debugging
2,363,990 UART: [kat] SHA2-256
2,364,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,667 UART: [kat] ++
2,368,174 UART: [kat] sha1
2,368,708 UART: [kat] SHA2-256
2,369,371 UART: [kat] SHA2-384
2,370,028 UART: [kat] SHA2-512-ACC
2,370,831 UART: [kat] ECC-384
3,284,819 UART: [kat] HMAC-384Kdf
3,298,377 UART: [kat] LMS
3,827,865 UART: [kat] --
3,832,884 UART: [cold-reset] ++
3,834,270 UART: [fht] FHT @ 0x50003400
3,845,683 UART: [idev] ++
3,846,245 UART: [idev] CDI.KEYID = 6
3,847,119 UART: [idev] SUBJECT.KEYID = 7
3,848,327 UART: [idev] UDS.KEYID = 0
3,865,385 UART: [idev] Erasing UDS.KEYID = 0
6,321,296 UART: [idev] Sha1 KeyId Algorithm
6,344,310 UART: [idev] --
6,347,499 UART: [ldev] ++
6,348,077 UART: [ldev] CDI.KEYID = 6
6,348,994 UART: [ldev] SUBJECT.KEYID = 5
6,350,153 UART: [ldev] AUTHORITY.KEYID = 7
6,351,436 UART: [ldev] FE.KEYID = 1
6,360,758 UART: [ldev] Erasing FE.KEYID = 1
8,832,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,925 UART: [ldev] --
10,622,647 UART: [fwproc] Wait for Commands...
10,625,662 UART: [fwproc] Recv command 0x46574c44
10,627,753 UART: [fwproc] Recv'd Img size: 106876 bytes
13,936,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,294 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,051,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,369,682 >>> mbox cmd response: success
14,373,660 UART: [afmc] ++
14,374,244 UART: [afmc] CDI.KEYID = 6
14,375,153 UART: [afmc] SUBJECT.KEYID = 7
14,376,316 UART: [afmc] AUTHORITY.KEYID = 5
16,873,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,020 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,612,023 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,627,948 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,643,871 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,667,630 UART: [afmc] --
18,671,839 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,672,218 UART: [cold-reset] --
18,675,809 UART: [state] Locking Datavault
18,680,578 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,222 UART: [state] Locking ICCM
18,684,211 UART: [exit] Launching FMC @ 0x40000000
18,692,605 UART:
18,692,840 UART: Running Caliptra FMC ...
18,693,936 UART:
18,694,091 UART: [fmc] Received command: 0x10000003
18,703,661 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,215,573 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,151,867 >>> mbox cmd response: success
18,385,727 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,398,200 UART:
18,398,530 UART: Running Caliptra FMC ...
18,399,619 UART:
18,399,772 UART: [fmc] Received command: 0x10000003
18,409,385 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,261 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,452 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,459 >>> mbox cmd response: success
2,675,692 UART: [afmc] ++
2,675,860 UART: [afmc] CDI.KEYID = 6
2,676,223 UART: [afmc] SUBJECT.KEYID = 7
2,676,649 UART: [afmc] AUTHORITY.KEYID = 5
2,711,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,432 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,152 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,045 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,738 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,707 UART: [afmc] --
2,754,743 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,765 UART: [cold-reset] --
2,755,793 UART: [state] Locking Datavault
2,756,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,526 UART: [state] Locking ICCM
2,758,024 UART: [exit] Launching FMC @ 0x40000000
2,763,321 UART:
2,763,337 UART: Running Caliptra FMC ...
2,763,745 UART:
2,763,883 UART: [fmc] Received command: 0x10000003
2,773,359 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,743 >>> mbox cmd response: success
2,581,985 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,022 UART:
2,588,038 UART: Running Caliptra FMC ...
2,588,446 UART:
2,588,584 UART: [fmc] Received command: 0x10000003
2,598,060 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,018 UART: [kat] ++
896,170 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
905,065 UART: [kat] SHA2-512-ACC
906,966 UART: [kat] ECC-384
916,525 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,171,118 UART: [fht] FHT @ 0x50003400
1,173,918 UART: [idev] ++
1,174,086 UART: [idev] CDI.KEYID = 6
1,174,447 UART: [idev] SUBJECT.KEYID = 7
1,174,872 UART: [idev] UDS.KEYID = 0
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,506 UART: [idev] Sha1 KeyId Algorithm
1,208,526 UART: [idev] --
1,209,569 UART: [ldev] ++
1,209,737 UART: [ldev] CDI.KEYID = 6
1,210,101 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,216,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,465 UART: [fwproc] Wait for Commands...
1,283,094 UART: [fwproc] Recv command 0x46574c44
1,283,827 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,595 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,484 >>> mbox cmd response: success
2,676,595 UART: [afmc] ++
2,676,763 UART: [afmc] CDI.KEYID = 6
2,677,126 UART: [afmc] SUBJECT.KEYID = 7
2,677,552 UART: [afmc] AUTHORITY.KEYID = 5
2,713,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,335 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,055 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,948 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,641 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,604 UART: [afmc] --
2,757,660 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,682 UART: [cold-reset] --
2,758,500 UART: [state] Locking Datavault
2,759,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,247 UART: [state] Locking ICCM
2,760,901 UART: [exit] Launching FMC @ 0x40000000
2,766,198 UART:
2,766,214 UART: Running Caliptra FMC ...
2,766,622 UART:
2,766,760 UART: [fmc] Received command: 0x10000003
2,776,236 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,160 >>> mbox cmd response: success
2,581,826 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,167 UART:
2,588,183 UART: Running Caliptra FMC ...
2,588,591 UART:
2,588,729 UART: [fmc] Received command: 0x10000003
2,598,205 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,521 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,214,520 UART: [ldev] Erasing FE.KEYID = 1
1,240,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,404 UART: [ldev] --
1,279,838 UART: [fwproc] Wait for Commands...
1,280,547 UART: [fwproc] Recv command 0x46574c44
1,281,280 UART: [fwproc] Recv'd Img size: 106876 bytes
2,491,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,062 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,672,115 >>> mbox cmd response: success
2,673,242 UART: [afmc] ++
2,673,410 UART: [afmc] CDI.KEYID = 6
2,673,773 UART: [afmc] SUBJECT.KEYID = 7
2,674,199 UART: [afmc] AUTHORITY.KEYID = 5
2,709,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,826 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,546 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,439 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,132 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,097 UART: [afmc] --
2,753,187 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,753,209 UART: [cold-reset] --
2,753,979 UART: [state] Locking Datavault
2,754,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,498 UART: [state] Locking ICCM
2,755,970 UART: [exit] Launching FMC @ 0x40000000
2,761,267 UART:
2,761,283 UART: Running Caliptra FMC ...
2,761,691 UART:
2,761,829 UART: [fmc] Received command: 0x10000003
2,771,305 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,153 >>> mbox cmd response: success
2,580,485 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,544 UART:
2,586,560 UART: Running Caliptra FMC ...
2,586,968 UART:
2,587,106 UART: [fmc] Received command: 0x10000003
2,596,582 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
891,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,038 UART: [kat] ++
896,190 UART: [kat] sha1
900,444 UART: [kat] SHA2-256
902,384 UART: [kat] SHA2-384
905,347 UART: [kat] SHA2-512-ACC
907,248 UART: [kat] ECC-384
917,279 UART: [kat] HMAC-384Kdf
921,843 UART: [kat] LMS
1,170,155 UART: [kat] --
1,171,008 UART: [cold-reset] ++
1,171,520 UART: [fht] FHT @ 0x50003400
1,173,964 UART: [idev] ++
1,174,132 UART: [idev] CDI.KEYID = 6
1,174,493 UART: [idev] SUBJECT.KEYID = 7
1,174,918 UART: [idev] UDS.KEYID = 0
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,209,016 UART: [idev] --
1,210,173 UART: [ldev] ++
1,210,341 UART: [ldev] CDI.KEYID = 6
1,210,705 UART: [ldev] SUBJECT.KEYID = 5
1,211,132 UART: [ldev] AUTHORITY.KEYID = 7
1,211,595 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,647 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,447 UART: [fwproc] Recv'd Img size: 106876 bytes
2,496,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,863 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,816 >>> mbox cmd response: success
2,677,989 UART: [afmc] ++
2,678,157 UART: [afmc] CDI.KEYID = 6
2,678,520 UART: [afmc] SUBJECT.KEYID = 7
2,678,946 UART: [afmc] AUTHORITY.KEYID = 5
2,714,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,667 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,387 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,280 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,973 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,038 UART: [afmc] --
2,757,932 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,954 UART: [cold-reset] --
2,758,900 UART: [state] Locking Datavault
2,759,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,503 UART: [state] Locking ICCM
2,761,081 UART: [exit] Launching FMC @ 0x40000000
2,766,378 UART:
2,766,394 UART: Running Caliptra FMC ...
2,766,802 UART:
2,766,940 UART: [fmc] Received command: 0x10000003
2,776,416 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,526,058 >>> mbox cmd response: success
2,582,804 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,588,919 UART:
2,588,935 UART: Running Caliptra FMC ...
2,589,343 UART:
2,589,481 UART: [fmc] Received command: 0x10000003
2,598,957 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,311 UART: [idev] ++
1,173,479 UART: [idev] CDI.KEYID = 6
1,173,840 UART: [idev] SUBJECT.KEYID = 7
1,174,265 UART: [idev] UDS.KEYID = 0
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,668 UART: [ldev] ++
1,208,836 UART: [ldev] CDI.KEYID = 6
1,209,200 UART: [ldev] SUBJECT.KEYID = 5
1,209,627 UART: [ldev] AUTHORITY.KEYID = 7
1,210,090 UART: [ldev] FE.KEYID = 1
1,214,958 UART: [ldev] Erasing FE.KEYID = 1
1,241,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,412 UART: [fwproc] Wait for Commands...
1,281,231 UART: [fwproc] Recv command 0x46574c44
1,281,964 UART: [fwproc] Recv'd Img size: 106876 bytes
2,491,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,242 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,672,303 >>> mbox cmd response: success
2,673,438 UART: [afmc] ++
2,673,606 UART: [afmc] CDI.KEYID = 6
2,673,969 UART: [afmc] SUBJECT.KEYID = 7
2,674,395 UART: [afmc] AUTHORITY.KEYID = 5
2,709,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,304 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,024 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,917 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,610 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,487 UART: [afmc] --
2,752,385 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,752,407 UART: [cold-reset] --
2,753,255 UART: [state] Locking Datavault
2,754,278 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,882 UART: [state] Locking ICCM
2,755,530 UART: [exit] Launching FMC @ 0x40000000
2,760,827 UART:
2,760,843 UART: Running Caliptra FMC ...
2,761,251 UART:
2,761,389 UART: [fmc] Received command: 0x10000003
2,770,865 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,011 >>> mbox cmd response: success
2,581,025 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,002 UART:
2,587,018 UART: Running Caliptra FMC ...
2,587,426 UART:
2,587,564 UART: [fmc] Received command: 0x10000003
2,597,040 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,735 UART: [kat] HMAC-384Kdf
921,335 UART: [kat] LMS
1,169,647 UART: [kat] --
1,170,590 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,182,870 UART: [idev] Erasing UDS.KEYID = 0
1,199,568 UART: [idev] Sha1 KeyId Algorithm
1,208,450 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,243,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,137 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x46574c44
1,284,195 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,531 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,420 >>> mbox cmd response: success
2,677,521 UART: [afmc] ++
2,677,689 UART: [afmc] CDI.KEYID = 6
2,678,052 UART: [afmc] SUBJECT.KEYID = 7
2,678,478 UART: [afmc] AUTHORITY.KEYID = 5
2,714,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,189 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,909 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,802 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,495 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,352 UART: [afmc] --
2,757,398 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,757,420 UART: [cold-reset] --
2,757,992 UART: [state] Locking Datavault
2,759,159 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,763 UART: [state] Locking ICCM
2,760,229 UART: [exit] Launching FMC @ 0x40000000
2,765,526 UART:
2,765,542 UART: Running Caliptra FMC ...
2,765,950 UART:
2,766,088 UART: [fmc] Received command: 0x10000003
2,775,564 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,682 >>> mbox cmd response: success
2,581,294 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,623 UART:
2,587,639 UART: Running Caliptra FMC ...
2,588,047 UART:
2,588,185 UART: [fmc] Received command: 0x10000003
2,597,661 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,133 UART:
192,504 UART: Running Caliptra ROM ...
193,710 UART:
193,885 UART: [state] CFI Enabled
264,252 UART: [state] LifecycleState = Unprovisioned
266,621 UART: [state] DebugLocked = No
268,110 UART: [state] WD Timer not started. Device not locked for debugging
272,522 UART: [kat] SHA2-256
454,447 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,991 UART: [kat] ++
466,528 UART: [kat] sha1
475,905 UART: [kat] SHA2-256
478,974 UART: [kat] SHA2-384
484,890 UART: [kat] SHA2-512-ACC
487,504 UART: [kat] ECC-384
3,776,064 UART: [kat] HMAC-384Kdf
3,804,116 UART: [kat] LMS
4,877,244 UART: [kat] --
4,881,061 UART: [cold-reset] ++
4,882,332 UART: [fht] FHT @ 0x50003400
4,894,565 UART: [idev] ++
4,895,238 UART: [idev] CDI.KEYID = 6
4,896,480 UART: [idev] SUBJECT.KEYID = 7
4,897,506 UART: [idev] UDS.KEYID = 0
4,931,741 UART: [idev] Erasing UDS.KEYID = 0
8,242,848 UART: [idev] Sha1 KeyId Algorithm
8,264,624 UART: [idev] --
8,269,755 UART: [ldev] ++
8,270,380 UART: [ldev] CDI.KEYID = 6
8,271,565 UART: [ldev] SUBJECT.KEYID = 5
8,272,720 UART: [ldev] AUTHORITY.KEYID = 7
8,273,943 UART: [ldev] FE.KEYID = 1
8,320,093 UART: [ldev] Erasing FE.KEYID = 1
11,654,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,949,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,965,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,981,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,997,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,016,777 UART: [ldev] --
14,021,234 UART: [fwproc] Wait for Commands...
14,023,499 UART: [fwproc] Recv command 0x46574c44
14,025,842 UART: Invalid Img size: 131073 bytes
14,030,742 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,332 UART:
192,718 UART: Running Caliptra ROM ...
193,832 UART:
603,340 UART: [state] CFI Enabled
616,022 UART: [state] LifecycleState = Unprovisioned
618,358 UART: [state] DebugLocked = No
620,053 UART: [state] WD Timer not started. Device not locked for debugging
625,488 UART: [kat] SHA2-256
807,428 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,996 UART: [kat] ++
819,579 UART: [kat] sha1
830,513 UART: [kat] SHA2-256
833,532 UART: [kat] SHA2-384
838,261 UART: [kat] SHA2-512-ACC
840,864 UART: [kat] ECC-384
4,096,644 UART: [kat] HMAC-384Kdf
4,109,449 UART: [kat] LMS
5,182,615 UART: [kat] --
5,185,549 UART: [cold-reset] ++
5,187,981 UART: [fht] FHT @ 0x50003400
5,198,750 UART: [idev] ++
5,199,430 UART: [idev] CDI.KEYID = 6
5,200,615 UART: [idev] SUBJECT.KEYID = 7
5,202,055 UART: [idev] UDS.KEYID = 0
5,220,683 UART: [idev] Erasing UDS.KEYID = 0
8,494,328 UART: [idev] Sha1 KeyId Algorithm
8,516,262 UART: [idev] --
8,520,740 UART: [ldev] ++
8,521,360 UART: [ldev] CDI.KEYID = 6
8,522,419 UART: [ldev] SUBJECT.KEYID = 5
8,523,968 UART: [ldev] AUTHORITY.KEYID = 7
8,525,457 UART: [ldev] FE.KEYID = 1
8,536,116 UART: [ldev] Erasing FE.KEYID = 1
11,823,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,697 UART: [ldev] --
14,191,928 UART: [fwproc] Wait for Commands...
14,193,482 UART: [fwproc] Recv command 0x46574c44
14,195,810 UART: Invalid Img size: 131073 bytes
14,198,918 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,185 UART:
192,565 UART: Running Caliptra ROM ...
193,689 UART:
193,834 UART: [state] CFI Enabled
263,009 UART: [state] LifecycleState = Unprovisioned
264,926 UART: [state] DebugLocked = No
266,256 UART: [state] WD Timer not started. Device not locked for debugging
269,126 UART: [kat] SHA2-256
448,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,819 UART: [kat] ++
460,272 UART: [kat] sha1
471,412 UART: [kat] SHA2-256
474,468 UART: [kat] SHA2-384
480,275 UART: [kat] SHA2-512-ACC
483,258 UART: [kat] ECC-384
2,929,583 UART: [kat] HMAC-384Kdf
2,951,645 UART: [kat] LMS
3,481,050 UART: [kat] --
3,484,346 UART: [cold-reset] ++
3,486,975 UART: [fht] FHT @ 0x50003400
3,498,978 UART: [idev] ++
3,499,579 UART: [idev] CDI.KEYID = 6
3,500,489 UART: [idev] SUBJECT.KEYID = 7
3,501,706 UART: [idev] UDS.KEYID = 0
3,522,838 UART: [idev] Erasing UDS.KEYID = 0
6,006,631 UART: [idev] Sha1 KeyId Algorithm
6,028,511 UART: [idev] --
6,033,267 UART: [ldev] ++
6,033,836 UART: [ldev] CDI.KEYID = 6
6,034,718 UART: [ldev] SUBJECT.KEYID = 5
6,035,934 UART: [ldev] AUTHORITY.KEYID = 7
6,037,167 UART: [ldev] FE.KEYID = 1
6,079,386 UART: [ldev] Erasing FE.KEYID = 1
8,583,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,481 UART: [ldev] --
10,391,922 UART: [fwproc] Wait for Commands...
10,393,776 UART: [fwproc] Recv command 0x46574c44
10,395,876 UART: Invalid Img size: 131073 bytes
10,399,314 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,270 UART:
192,660 UART: Running Caliptra ROM ...
193,833 UART:
193,989 UART: [state] CFI Enabled
263,143 UART: [state] LifecycleState = Unprovisioned
264,995 UART: [state] DebugLocked = No
266,858 UART: [state] WD Timer not started. Device not locked for debugging
269,893 UART: [kat] SHA2-256
448,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,555 UART: [kat] ++
461,144 UART: [kat] sha1
472,246 UART: [kat] SHA2-256
475,263 UART: [kat] SHA2-384
481,237 UART: [kat] SHA2-512-ACC
484,966 UART: [kat] ECC-384
2,948,217 UART: [kat] HMAC-384Kdf
2,972,668 UART: [kat] LMS
3,502,134 UART: [kat] --
3,505,471 UART: [cold-reset] ++
3,507,184 UART: [fht] FHT @ 0x50003400
3,518,003 UART: [idev] ++
3,518,578 UART: [idev] CDI.KEYID = 6
3,519,483 UART: [idev] SUBJECT.KEYID = 7
3,520,697 UART: [idev] UDS.KEYID = 0
3,543,927 UART: [idev] Erasing UDS.KEYID = 0
6,026,721 UART: [idev] Sha1 KeyId Algorithm
6,050,336 UART: [idev] --
6,053,852 UART: [ldev] ++
6,054,423 UART: [ldev] CDI.KEYID = 6
6,055,310 UART: [ldev] SUBJECT.KEYID = 5
6,056,527 UART: [ldev] AUTHORITY.KEYID = 7
6,057,684 UART: [ldev] FE.KEYID = 1
6,099,849 UART: [ldev] Erasing FE.KEYID = 1
8,606,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,708 UART: [ldev] --
10,416,614 UART: [fwproc] Wait for Commands...
10,419,498 UART: [fwproc] Recv command 0x46574c44
10,421,602 UART: Invalid Img size: 131073 bytes
10,426,283 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,471 UART:
192,868 UART: Running Caliptra ROM ...
194,034 UART:
603,707 UART: [state] CFI Enabled
615,120 UART: [state] LifecycleState = Unprovisioned
616,988 UART: [state] DebugLocked = No
618,868 UART: [state] WD Timer not started. Device not locked for debugging
621,855 UART: [kat] SHA2-256
800,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,550 UART: [kat] ++
813,003 UART: [kat] sha1
824,477 UART: [kat] SHA2-256
827,480 UART: [kat] SHA2-384
832,760 UART: [kat] SHA2-512-ACC
835,688 UART: [kat] ECC-384
3,276,169 UART: [kat] HMAC-384Kdf
3,288,063 UART: [kat] LMS
3,817,578 UART: [kat] --
3,822,448 UART: [cold-reset] ++
3,824,699 UART: [fht] FHT @ 0x50003400
3,835,616 UART: [idev] ++
3,836,176 UART: [idev] CDI.KEYID = 6
3,837,055 UART: [idev] SUBJECT.KEYID = 7
3,838,285 UART: [idev] UDS.KEYID = 0
3,855,950 UART: [idev] Erasing UDS.KEYID = 0
6,310,688 UART: [idev] Sha1 KeyId Algorithm
6,334,189 UART: [idev] --
6,339,092 UART: [ldev] ++
6,339,658 UART: [ldev] CDI.KEYID = 6
6,340,563 UART: [ldev] SUBJECT.KEYID = 5
6,341,721 UART: [ldev] AUTHORITY.KEYID = 7
6,343,011 UART: [ldev] FE.KEYID = 1
6,354,148 UART: [ldev] Erasing FE.KEYID = 1
8,828,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,482 UART: [ldev] --
10,619,843 UART: [fwproc] Wait for Commands...
10,622,593 UART: [fwproc] Recv command 0x46574c44
10,624,685 UART: Invalid Img size: 131073 bytes
10,627,841 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,182,613 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,775 UART: [idev] --
1,209,914 UART: [ldev] ++
1,210,082 UART: [ldev] CDI.KEYID = 6
1,210,446 UART: [ldev] SUBJECT.KEYID = 5
1,210,873 UART: [ldev] AUTHORITY.KEYID = 7
1,211,336 UART: [ldev] FE.KEYID = 1
1,216,346 UART: [ldev] Erasing FE.KEYID = 1
1,242,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,785 UART: Invalid Img size: 131073 bytes
1,283,713 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,215,849 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,089 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: Invalid Img size: 131073 bytes
1,284,432 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,312 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,198,961 UART: [idev] Sha1 KeyId Algorithm
1,207,777 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,402 UART: [ldev] --
1,280,862 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,267 UART: Invalid Img size: 131073 bytes
1,283,527 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,501 UART: [kat] LMS
1,169,813 UART: [kat] --
1,170,606 UART: [cold-reset] ++
1,171,058 UART: [fht] FHT @ 0x50003400
1,173,894 UART: [idev] ++
1,174,062 UART: [idev] CDI.KEYID = 6
1,174,423 UART: [idev] SUBJECT.KEYID = 7
1,174,848 UART: [idev] UDS.KEYID = 0
1,182,864 UART: [idev] Erasing UDS.KEYID = 0
1,200,812 UART: [idev] Sha1 KeyId Algorithm
1,209,618 UART: [idev] --
1,210,627 UART: [ldev] ++
1,210,795 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,586 UART: [ldev] AUTHORITY.KEYID = 7
1,212,049 UART: [ldev] FE.KEYID = 1
1,217,569 UART: [ldev] Erasing FE.KEYID = 1
1,243,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,015 UART: [ldev] --
1,283,395 UART: [fwproc] Wait for Commands...
1,284,098 UART: [fwproc] Recv command 0x46574c44
1,284,832 UART: Invalid Img size: 131073 bytes
1,285,944 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,093 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,331 UART: [idev] Sha1 KeyId Algorithm
1,207,375 UART: [idev] --
1,208,398 UART: [ldev] ++
1,208,566 UART: [ldev] CDI.KEYID = 6
1,208,930 UART: [ldev] SUBJECT.KEYID = 5
1,209,357 UART: [ldev] AUTHORITY.KEYID = 7
1,209,820 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,448 UART: [ldev] --
1,280,872 UART: [fwproc] Wait for Commands...
1,281,587 UART: [fwproc] Recv command 0x46574c44
1,282,321 UART: Invalid Img size: 131073 bytes
1,283,305 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
915,629 UART: [kat] HMAC-384Kdf
920,143 UART: [kat] LMS
1,168,455 UART: [kat] --
1,169,386 UART: [cold-reset] ++
1,169,842 UART: [fht] FHT @ 0x50003400
1,172,406 UART: [idev] ++
1,172,574 UART: [idev] CDI.KEYID = 6
1,172,935 UART: [idev] SUBJECT.KEYID = 7
1,173,360 UART: [idev] UDS.KEYID = 0
1,181,408 UART: [idev] Erasing UDS.KEYID = 0
1,198,556 UART: [idev] Sha1 KeyId Algorithm
1,207,412 UART: [idev] --
1,208,499 UART: [ldev] ++
1,208,667 UART: [ldev] CDI.KEYID = 6
1,209,031 UART: [ldev] SUBJECT.KEYID = 5
1,209,458 UART: [ldev] AUTHORITY.KEYID = 7
1,209,921 UART: [ldev] FE.KEYID = 1
1,215,147 UART: [ldev] Erasing FE.KEYID = 1
1,241,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,965 UART: [ldev] --
1,280,257 UART: [fwproc] Wait for Commands...
1,280,934 UART: [fwproc] Recv command 0x46574c44
1,281,668 UART: Invalid Img size: 131073 bytes
1,282,850 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,214,748 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,349,854 UART:
2,350,284 UART: Running Caliptra ROM ...
2,351,461 UART:
2,351,636 UART: [state] CFI Enabled
2,352,617 UART: [state] LifecycleState = Unprovisioned
2,354,267 UART: [state] DebugLocked = No
2,355,379 UART: [state] WD Timer not started. Device not locked for debugging
2,357,861 UART: [kat] SHA2-256
2,358,532 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,361,555 UART: [kat] ++
2,362,027 UART: [kat] sha1
2,362,548 UART: [kat] SHA2-256
2,363,208 UART: [kat] SHA2-384
2,363,865 UART: [kat] SHA2-512-ACC
2,364,757 UART: [kat] ECC-384
3,772,759 UART: [kat] HMAC-384Kdf
3,800,174 UART: [kat] LMS
4,873,353 UART: [kat] --
4,878,230 UART: [cold-reset] ++
4,879,390 UART: [fht] FHT @ 0x50003400
4,891,922 UART: [idev] ++
4,892,592 UART: [idev] CDI.KEYID = 6
4,893,749 UART: [idev] SUBJECT.KEYID = 7
4,894,963 UART: [idev] UDS.KEYID = 0
4,927,436 UART: [idev] Erasing UDS.KEYID = 0
8,241,781 UART: [idev] Sha1 KeyId Algorithm
8,264,601 UART: [idev] --
8,268,108 UART: [ldev] ++
8,268,671 UART: [ldev] CDI.KEYID = 6
8,269,905 UART: [ldev] SUBJECT.KEYID = 5
8,271,017 UART: [ldev] AUTHORITY.KEYID = 7
8,272,250 UART: [ldev] FE.KEYID = 1
8,314,828 UART: [ldev] Erasing FE.KEYID = 1
11,648,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,027,898 UART: [ldev] --
14,033,168 UART: [fwproc] Wait for Commands...
14,035,533 UART: [fwproc] Recv command 0x46574c44
14,037,851 UART: [fwproc] Recv'd Img size: 106532 bytes
22,142,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,224,416 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,266,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
22,584,224 >>> mbox cmd response: success
22,588,056 UART: [afmc] ++
22,588,756 UART: [afmc] CDI.KEYID = 6
22,589,945 UART: [afmc] SUBJECT.KEYID = 7
22,591,105 UART: [afmc] AUTHORITY.KEYID = 5
25,951,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,270,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,272,027 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,288,048 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,304,071 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,320,129 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,342,039 UART: [afmc] --
28,346,137 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,346,543 UART: [cold-reset] --
28,349,958 UART: [state] Locking Datavault
28,357,206 UART: [state] Locking PCR0, PCR1 and PCR31
28,358,904 UART: [state] Locking ICCM
28,361,055 UART: [exit] Launching FMC @ 0x40000000
28,369,687 UART:
28,369,918 UART: Running Caliptra FMC ...
28,371,017 UART:
28,371,177 UART: [fmc] Received command: 0x10000002
28,373,040 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,209,590 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
21,962,335 >>> mbox cmd response: success
27,650,349 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
27,663,675 UART:
27,664,011 UART: Running Caliptra FMC ...
27,665,115 UART:
27,665,288 UART: [fmc] Received command: 0x10000002
27,667,030 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,221,588 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
2,357,012 UART:
2,357,426 UART: Running Caliptra ROM ...
2,358,591 UART:
2,358,762 UART: [state] CFI Enabled
2,359,742 UART: [state] LifecycleState = Unprovisioned
2,361,385 UART: [state] DebugLocked = No
2,362,484 UART: [state] WD Timer not started. Device not locked for debugging
2,364,952 UART: [kat] SHA2-256
2,365,617 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,368,663 UART: [kat] ++
2,369,109 UART: [kat] sha1
2,369,612 UART: [kat] SHA2-256
2,370,297 UART: [kat] SHA2-384
2,370,949 UART: [kat] SHA2-512-ACC
2,372,152 UART: [kat] ECC-384
4,096,088 UART: [kat] HMAC-384Kdf
4,107,389 UART: [kat] LMS
5,180,544 UART: [kat] --
5,187,483 UART: [cold-reset] ++
5,189,591 UART: [fht] FHT @ 0x50003400
5,200,035 UART: [idev] ++
5,200,708 UART: [idev] CDI.KEYID = 6
5,201,941 UART: [idev] SUBJECT.KEYID = 7
5,203,374 UART: [idev] UDS.KEYID = 0
5,219,753 UART: [idev] Erasing UDS.KEYID = 0
8,496,050 UART: [idev] Sha1 KeyId Algorithm
8,517,862 UART: [idev] --
8,521,380 UART: [ldev] ++
8,521,944 UART: [ldev] CDI.KEYID = 6
8,523,177 UART: [ldev] SUBJECT.KEYID = 5
8,524,613 UART: [ldev] AUTHORITY.KEYID = 7
8,526,187 UART: [ldev] FE.KEYID = 1
8,537,407 UART: [ldev] Erasing FE.KEYID = 1
11,833,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,605 UART: [ldev] --
14,201,213 UART: [fwproc] Wait for Commands...
14,203,031 UART: [fwproc] Recv command 0x46574c44
14,205,342 UART: [fwproc] Recv'd Img size: 106532 bytes
22,597,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,677,400 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,719,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
23,036,863 >>> mbox cmd response: success
23,041,053 UART: [afmc] ++
23,041,772 UART: [afmc] CDI.KEYID = 6
23,043,019 UART: [afmc] SUBJECT.KEYID = 7
23,044,125 UART: [afmc] AUTHORITY.KEYID = 5
26,358,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,656,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,658,021 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,674,006 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,690,085 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,706,112 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,730,234 UART: [afmc] --
28,734,479 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,734,856 UART: [cold-reset] --
28,740,631 UART: [state] Locking Datavault
28,746,911 UART: [state] Locking PCR0, PCR1 and PCR31
28,748,546 UART: [state] Locking ICCM
28,749,902 UART: [exit] Launching FMC @ 0x40000000
28,758,526 UART:
28,758,753 UART: Running Caliptra FMC ...
28,759,766 UART:
28,759,904 UART: [fmc] Received command: 0x10000002
28,761,924 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,227,276 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
22,503,562 >>> mbox cmd response: success
28,124,625 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,139,408 UART:
28,139,748 UART: Running Caliptra FMC ...
28,140,916 UART:
28,141,073 UART: [fmc] Received command: 0x10000002
28,142,813 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,214,526 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,350,327 UART:
2,350,741 UART: Running Caliptra ROM ...
2,351,904 UART:
2,352,076 UART: [state] CFI Enabled
2,353,043 UART: [state] LifecycleState = Unprovisioned
2,354,700 UART: [state] DebugLocked = No
2,355,804 UART: [state] WD Timer not started. Device not locked for debugging
2,358,276 UART: [kat] SHA2-256
2,358,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,956 UART: [kat] ++
2,362,405 UART: [kat] sha1
2,362,948 UART: [kat] SHA2-256
2,363,608 UART: [kat] SHA2-384
2,364,263 UART: [kat] SHA2-512-ACC
2,365,083 UART: [kat] ECC-384
2,945,908 UART: [kat] HMAC-384Kdf
2,971,580 UART: [kat] LMS
3,501,046 UART: [kat] --
3,507,090 UART: [cold-reset] ++
3,508,264 UART: [fht] FHT @ 0x50003400
3,519,030 UART: [idev] ++
3,519,594 UART: [idev] CDI.KEYID = 6
3,520,506 UART: [idev] SUBJECT.KEYID = 7
3,521,721 UART: [idev] UDS.KEYID = 0
3,542,073 UART: [idev] Erasing UDS.KEYID = 0
6,023,218 UART: [idev] Sha1 KeyId Algorithm
6,047,242 UART: [idev] --
6,051,280 UART: [ldev] ++
6,051,861 UART: [ldev] CDI.KEYID = 6
6,052,769 UART: [ldev] SUBJECT.KEYID = 5
6,053,986 UART: [ldev] AUTHORITY.KEYID = 7
6,055,239 UART: [ldev] FE.KEYID = 1
6,099,270 UART: [ldev] Erasing FE.KEYID = 1
8,603,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,551 UART: [ldev] --
10,412,600 UART: [fwproc] Wait for Commands...
10,415,237 UART: [fwproc] Recv command 0x46574c44
10,417,334 UART: [fwproc] Recv'd Img size: 106876 bytes
14,897,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,979,221 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,021,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,340,359 >>> mbox cmd response: success
15,343,757 UART: [afmc] ++
15,344,364 UART: [afmc] CDI.KEYID = 6
15,345,275 UART: [afmc] SUBJECT.KEYID = 7
15,346,488 UART: [afmc] AUTHORITY.KEYID = 5
17,870,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,596,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,598,466 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,614,473 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,630,429 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,646,316 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,670,152 UART: [afmc] --
19,673,597 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,673,976 UART: [cold-reset] --
19,679,109 UART: [state] Locking Datavault
19,685,487 UART: [state] Locking PCR0, PCR1 and PCR31
19,687,185 UART: [state] Locking ICCM
19,688,740 UART: [exit] Launching FMC @ 0x40000000
19,697,107 UART:
19,697,346 UART: Running Caliptra FMC ...
19,698,446 UART:
19,698,608 UART: [fmc] Received command: 0x10000002
19,700,501 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,215,378 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,350,992 UART:
2,351,422 UART: Running Caliptra ROM ...
2,352,537 UART:
2,352,703 UART: [state] CFI Enabled
2,353,671 UART: [state] LifecycleState = Unprovisioned
2,355,337 UART: [state] DebugLocked = No
2,356,448 UART: [state] WD Timer not started. Device not locked for debugging
2,358,926 UART: [kat] SHA2-256
2,359,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,600 UART: [kat] ++
2,363,049 UART: [kat] sha1
2,363,564 UART: [kat] SHA2-256
2,364,219 UART: [kat] SHA2-384
2,364,903 UART: [kat] SHA2-512-ACC
2,365,789 UART: [kat] ECC-384
2,948,510 UART: [kat] HMAC-384Kdf
2,970,888 UART: [kat] LMS
3,500,325 UART: [kat] --
3,504,570 UART: [cold-reset] ++
3,506,507 UART: [fht] FHT @ 0x50003400
3,518,300 UART: [idev] ++
3,518,868 UART: [idev] CDI.KEYID = 6
3,519,886 UART: [idev] SUBJECT.KEYID = 7
3,520,989 UART: [idev] UDS.KEYID = 0
3,543,882 UART: [idev] Erasing UDS.KEYID = 0
6,023,371 UART: [idev] Sha1 KeyId Algorithm
6,046,531 UART: [idev] --
6,050,429 UART: [ldev] ++
6,051,003 UART: [ldev] CDI.KEYID = 6
6,051,934 UART: [ldev] SUBJECT.KEYID = 5
6,053,095 UART: [ldev] AUTHORITY.KEYID = 7
6,054,334 UART: [ldev] FE.KEYID = 1
6,098,576 UART: [ldev] Erasing FE.KEYID = 1
8,600,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,584 UART: [ldev] --
10,389,936 UART: [fwproc] Wait for Commands...
10,392,358 UART: [fwproc] Recv command 0x46574c44
10,394,451 UART: [fwproc] Recv'd Img size: 106876 bytes
14,874,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,950,351 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,992,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,310,665 >>> mbox cmd response: success
15,314,782 UART: [afmc] ++
15,315,376 UART: [afmc] CDI.KEYID = 6
15,316,444 UART: [afmc] SUBJECT.KEYID = 7
15,317,568 UART: [afmc] AUTHORITY.KEYID = 5
17,861,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,588,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,589,954 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,605,893 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,621,852 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,637,725 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,660,100 UART: [afmc] --
19,663,164 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,663,533 UART: [cold-reset] --
19,666,399 UART: [state] Locking Datavault
19,671,429 UART: [state] Locking PCR0, PCR1 and PCR31
19,673,129 UART: [state] Locking ICCM
19,674,958 UART: [exit] Launching FMC @ 0x40000000
19,683,352 UART:
19,683,584 UART: Running Caliptra FMC ...
19,684,705 UART:
19,684,873 UART: [fmc] Received command: 0x10000002
19,686,723 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,213,302 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,907,443 >>> mbox cmd response: success
19,173,096 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,188,954 UART:
19,189,290 UART: Running Caliptra FMC ...
19,190,406 UART:
19,190,567 UART: [fmc] Received command: 0x10000002
19,192,414 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
2,221,200 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,357,591 UART:
2,358,220 UART: Running Caliptra ROM ...
2,359,319 UART:
2,359,472 UART: [state] CFI Enabled
2,360,359 UART: [state] LifecycleState = Unprovisioned
2,362,031 UART: [state] DebugLocked = No
2,363,145 UART: [state] WD Timer not started. Device not locked for debugging
2,365,623 UART: [kat] SHA2-256
2,366,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,329 UART: [kat] ++
2,369,778 UART: [kat] sha1
2,370,289 UART: [kat] SHA2-256
2,371,024 UART: [kat] SHA2-384
2,371,689 UART: [kat] SHA2-512-ACC
2,372,525 UART: [kat] ECC-384
3,286,602 UART: [kat] HMAC-384Kdf
3,298,513 UART: [kat] LMS
3,828,023 UART: [kat] --
3,833,307 UART: [cold-reset] ++
3,835,585 UART: [fht] FHT @ 0x50003400
3,845,212 UART: [idev] ++
3,845,773 UART: [idev] CDI.KEYID = 6
3,846,706 UART: [idev] SUBJECT.KEYID = 7
3,847,914 UART: [idev] UDS.KEYID = 0
3,863,881 UART: [idev] Erasing UDS.KEYID = 0
6,319,491 UART: [idev] Sha1 KeyId Algorithm
6,342,281 UART: [idev] --
6,346,646 UART: [ldev] ++
6,347,210 UART: [ldev] CDI.KEYID = 6
6,348,087 UART: [ldev] SUBJECT.KEYID = 5
6,349,300 UART: [ldev] AUTHORITY.KEYID = 7
6,350,531 UART: [ldev] FE.KEYID = 1
6,360,823 UART: [ldev] Erasing FE.KEYID = 1
8,834,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,323 UART: [ldev] --
10,626,426 UART: [fwproc] Wait for Commands...
10,628,265 UART: [fwproc] Recv command 0x46574c44
10,630,306 UART: [fwproc] Recv'd Img size: 106876 bytes
15,113,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,187,466 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,230,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,548,557 >>> mbox cmd response: success
15,553,180 UART: [afmc] ++
15,553,773 UART: [afmc] CDI.KEYID = 6
15,554,682 UART: [afmc] SUBJECT.KEYID = 7
15,555,897 UART: [afmc] AUTHORITY.KEYID = 5
18,052,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,773,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,775,112 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,791,056 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,807,030 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,822,900 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,846,054 UART: [afmc] --
19,849,067 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,849,433 UART: [cold-reset] --
19,853,972 UART: [state] Locking Datavault
19,857,915 UART: [state] Locking PCR0, PCR1 and PCR31
19,859,610 UART: [state] Locking ICCM
19,861,242 UART: [exit] Launching FMC @ 0x40000000
19,869,630 UART:
19,869,869 UART: Running Caliptra FMC ...
19,870,891 UART:
19,871,035 UART: [fmc] Received command: 0x10000002
19,873,014 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
2,217,138 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
15,134,775 >>> mbox cmd response: success
19,366,053 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,380,951 UART:
19,381,300 UART: Running Caliptra FMC ...
19,382,487 UART:
19,382,654 UART: [fmc] Received command: 0x10000002
19,384,442 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,436 UART: [ldev] ++
1,208,604 UART: [ldev] CDI.KEYID = 6
1,208,968 UART: [ldev] SUBJECT.KEYID = 5
1,209,395 UART: [ldev] AUTHORITY.KEYID = 7
1,209,858 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,444 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 106876 bytes
3,034,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,062,882 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,080,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,216,917 >>> mbox cmd response: success
3,218,088 UART: [afmc] ++
3,218,256 UART: [afmc] CDI.KEYID = 6
3,218,619 UART: [afmc] SUBJECT.KEYID = 7
3,219,045 UART: [afmc] AUTHORITY.KEYID = 5
3,254,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,270,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,271,544 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,277,221 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,283,114 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,288,824 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,296,766 UART: [afmc] --
3,297,780 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,297,802 UART: [cold-reset] --
3,298,718 UART: [state] Locking Datavault
3,299,973 UART: [state] Locking PCR0, PCR1 and PCR31
3,300,577 UART: [state] Locking ICCM
3,301,113 UART: [exit] Launching FMC @ 0x40000000
3,306,410 UART:
3,306,426 UART: Running Caliptra FMC ...
3,306,834 UART:
3,306,972 UART: [fmc] Received command: 0x10000002
3,308,716 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,070,622 >>> mbox cmd response: success
3,126,246 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,132,451 UART:
3,132,467 UART: Running Caliptra FMC ...
3,132,875 UART:
3,133,013 UART: [fmc] Received command: 0x10000002
3,134,757 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,993 UART: [state] LifecycleState = Unprovisioned
86,648 UART: [state] DebugLocked = No
87,262 UART: [state] WD Timer not started. Device not locked for debugging
88,457 UART: [kat] SHA2-256
892,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,136 UART: [kat] ++
896,288 UART: [kat] sha1
900,464 UART: [kat] SHA2-256
902,404 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,026 UART: [idev] Sha1 KeyId Algorithm
1,207,756 UART: [idev] --
1,208,653 UART: [ldev] ++
1,208,821 UART: [ldev] CDI.KEYID = 6
1,209,185 UART: [ldev] SUBJECT.KEYID = 5
1,209,612 UART: [ldev] AUTHORITY.KEYID = 7
1,210,075 UART: [ldev] FE.KEYID = 1
1,215,053 UART: [ldev] Erasing FE.KEYID = 1
1,241,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,127 UART: [ldev] --
1,280,565 UART: [fwproc] Wait for Commands...
1,281,262 UART: [fwproc] Recv command 0x46574c44
1,281,995 UART: [fwproc] Recv'd Img size: 106876 bytes
3,039,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,066,405 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,084,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,220,230 >>> mbox cmd response: success
3,221,461 UART: [afmc] ++
3,221,629 UART: [afmc] CDI.KEYID = 6
3,221,992 UART: [afmc] SUBJECT.KEYID = 7
3,222,418 UART: [afmc] AUTHORITY.KEYID = 5
3,257,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,274,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,275,039 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,280,716 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,286,609 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,292,319 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,300,019 UART: [afmc] --
3,301,011 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,301,033 UART: [cold-reset] --
3,301,863 UART: [state] Locking Datavault
3,302,888 UART: [state] Locking PCR0, PCR1 and PCR31
3,303,492 UART: [state] Locking ICCM
3,303,962 UART: [exit] Launching FMC @ 0x40000000
3,309,259 UART:
3,309,275 UART: Running Caliptra FMC ...
3,309,683 UART:
3,309,821 UART: [fmc] Received command: 0x10000002
3,311,565 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,064,815 >>> mbox cmd response: success
3,120,735 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,126,848 UART:
3,126,864 UART: Running Caliptra FMC ...
3,127,272 UART:
3,127,410 UART: [fmc] Received command: 0x10000002
3,129,154 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,003 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,217 UART: [kat] SHA2-256
901,157 UART: [kat] SHA2-384
903,996 UART: [kat] SHA2-512-ACC
905,897 UART: [kat] ECC-384
915,708 UART: [kat] HMAC-384Kdf
920,398 UART: [kat] LMS
1,168,710 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,181,321 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,820 UART: [ldev] Erasing FE.KEYID = 1
1,240,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,902 UART: [ldev] --
1,280,320 UART: [fwproc] Wait for Commands...
1,281,019 UART: [fwproc] Recv command 0x46574c44
1,281,752 UART: [fwproc] Recv'd Img size: 106876 bytes
3,041,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,070,361 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,088,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,224,290 >>> mbox cmd response: success
3,225,413 UART: [afmc] ++
3,225,581 UART: [afmc] CDI.KEYID = 6
3,225,944 UART: [afmc] SUBJECT.KEYID = 7
3,226,370 UART: [afmc] AUTHORITY.KEYID = 5
3,261,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,277,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,278,073 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,283,750 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,289,643 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,295,353 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,303,269 UART: [afmc] --
3,304,299 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,304,321 UART: [cold-reset] --
3,305,297 UART: [state] Locking Datavault
3,306,398 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,002 UART: [state] Locking ICCM
3,307,544 UART: [exit] Launching FMC @ 0x40000000
3,312,841 UART:
3,312,857 UART: Running Caliptra FMC ...
3,313,265 UART:
3,313,403 UART: [fmc] Received command: 0x10000002
3,315,147 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,063,120 >>> mbox cmd response: success
3,119,014 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,125,151 UART:
3,125,167 UART: Running Caliptra FMC ...
3,125,575 UART:
3,125,713 UART: [fmc] Received command: 0x10000002
3,127,457 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,837 UART: [kat] SHA2-512-ACC
906,738 UART: [kat] ECC-384
916,931 UART: [kat] HMAC-384Kdf
921,537 UART: [kat] LMS
1,169,849 UART: [kat] --
1,170,948 UART: [cold-reset] ++
1,171,484 UART: [fht] FHT @ 0x50003400
1,174,124 UART: [idev] ++
1,174,292 UART: [idev] CDI.KEYID = 6
1,174,653 UART: [idev] SUBJECT.KEYID = 7
1,175,078 UART: [idev] UDS.KEYID = 0
1,183,132 UART: [idev] Erasing UDS.KEYID = 0
1,199,846 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,697 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 106876 bytes
3,043,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,071,888 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,089,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,225,709 >>> mbox cmd response: success
3,226,874 UART: [afmc] ++
3,227,042 UART: [afmc] CDI.KEYID = 6
3,227,405 UART: [afmc] SUBJECT.KEYID = 7
3,227,831 UART: [afmc] AUTHORITY.KEYID = 5
3,263,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,280,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,281,062 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,286,739 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,292,632 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,298,342 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,306,320 UART: [afmc] --
3,307,192 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,307,214 UART: [cold-reset] --
3,308,022 UART: [state] Locking Datavault
3,309,017 UART: [state] Locking PCR0, PCR1 and PCR31
3,309,621 UART: [state] Locking ICCM
3,310,061 UART: [exit] Launching FMC @ 0x40000000
3,315,358 UART:
3,315,374 UART: Running Caliptra FMC ...
3,315,782 UART:
3,315,920 UART: [fmc] Received command: 0x10000002
3,317,664 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,078,222 >>> mbox cmd response: success
3,134,638 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,140,505 UART:
3,140,521 UART: Running Caliptra FMC ...
3,140,929 UART:
3,141,067 UART: [fmc] Received command: 0x10000002
3,142,811 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,491 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,605 UART: [idev] ++
1,172,773 UART: [idev] CDI.KEYID = 6
1,173,134 UART: [idev] SUBJECT.KEYID = 7
1,173,559 UART: [idev] UDS.KEYID = 0
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,234 UART: [ldev] --
1,280,634 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 106876 bytes
3,039,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,068,290 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,086,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,222,303 >>> mbox cmd response: success
3,223,428 UART: [afmc] ++
3,223,596 UART: [afmc] CDI.KEYID = 6
3,223,959 UART: [afmc] SUBJECT.KEYID = 7
3,224,385 UART: [afmc] AUTHORITY.KEYID = 5
3,260,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,276,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,276,912 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,282,589 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,288,482 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,294,192 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,301,952 UART: [afmc] --
3,302,956 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,302,978 UART: [cold-reset] --
3,303,798 UART: [state] Locking Datavault
3,304,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,305,457 UART: [state] Locking ICCM
3,306,005 UART: [exit] Launching FMC @ 0x40000000
3,311,302 UART:
3,311,318 UART: Running Caliptra FMC ...
3,311,726 UART:
3,311,864 UART: [fmc] Received command: 0x10000002
3,313,608 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,060,596 >>> mbox cmd response: success
3,116,338 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,122,481 UART:
3,122,497 UART: Running Caliptra FMC ...
3,122,905 UART:
3,123,043 UART: [fmc] Received command: 0x10000002
3,124,787 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,369 UART: [kat] SHA2-256
890,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,332 UART: [kat] SHA2-256
901,272 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,739 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,495 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,825 UART: [fwproc] Recv'd Img size: 106876 bytes
3,040,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,067,945 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,086,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,221,798 >>> mbox cmd response: success
3,223,005 UART: [afmc] ++
3,223,173 UART: [afmc] CDI.KEYID = 6
3,223,536 UART: [afmc] SUBJECT.KEYID = 7
3,223,962 UART: [afmc] AUTHORITY.KEYID = 5
3,259,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,276,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,276,983 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,282,660 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,288,553 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,294,263 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,302,037 UART: [afmc] --
3,302,963 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,302,985 UART: [cold-reset] --
3,303,837 UART: [state] Locking Datavault
3,304,964 UART: [state] Locking PCR0, PCR1 and PCR31
3,305,568 UART: [state] Locking ICCM
3,306,232 UART: [exit] Launching FMC @ 0x40000000
3,311,529 UART:
3,311,545 UART: Running Caliptra FMC ...
3,311,953 UART:
3,312,091 UART: [fmc] Received command: 0x10000002
3,313,835 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,074,657 >>> mbox cmd response: success
3,130,973 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,137,096 UART:
3,137,112 UART: Running Caliptra FMC ...
3,137,520 UART:
3,137,658 UART: [fmc] Received command: 0x10000002
3,139,402 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,058,575 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,199,870 UART:
2,200,270 UART: Running Caliptra ROM ...
2,201,435 UART:
2,201,616 UART: [state] CFI Enabled
2,202,590 UART: [state] LifecycleState = Unprovisioned
2,204,232 UART: [state] DebugLocked = No
2,205,337 UART: [state] WD Timer not started. Device not locked for debugging
2,207,808 UART: [kat] SHA2-256
2,208,495 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,507 UART: [kat] ++
2,211,959 UART: [kat] sha1
2,212,515 UART: [kat] SHA2-256
2,213,171 UART: [kat] SHA2-384
2,213,909 UART: [kat] SHA2-512-ACC
2,214,718 UART: [kat] ECC-384
3,774,903 UART: [kat] HMAC-384Kdf
3,802,857 UART: [kat] LMS
4,876,011 UART: [kat] --
4,880,938 UART: [cold-reset] ++
4,883,094 UART: [fht] FHT @ 0x50003400
4,893,698 UART: [idev] ++
4,894,369 UART: [idev] CDI.KEYID = 6
4,895,603 UART: [idev] SUBJECT.KEYID = 7
4,896,756 UART: [idev] UDS.KEYID = 0
4,930,652 UART: [idev] Erasing UDS.KEYID = 0
8,243,182 UART: [idev] Sha1 KeyId Algorithm
8,264,697 UART: [idev] --
8,267,314 UART: [ldev] ++
8,267,890 UART: [ldev] CDI.KEYID = 6
8,269,128 UART: [ldev] SUBJECT.KEYID = 5
8,270,228 UART: [ldev] AUTHORITY.KEYID = 7
8,271,510 UART: [ldev] FE.KEYID = 1
8,318,098 UART: [ldev] Erasing FE.KEYID = 1
11,654,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,076 UART: [ldev] --
14,040,193 UART: [fwproc] Wait for Commands...
14,041,988 UART: [fwproc] Recv command 0x46574c44
14,044,315 UART: [fwproc] Recv'd Img size: 111600 bytes
22,636,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,712,932 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,773,147 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
23,091,260 >>> mbox cmd response: success
23,094,700 UART: [afmc] ++
23,095,401 UART: [afmc] CDI.KEYID = 6
23,096,568 UART: [afmc] SUBJECT.KEYID = 7
23,097,787 UART: [afmc] AUTHORITY.KEYID = 5
26,468,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,767,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,769,157 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,785,267 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,801,268 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,817,201 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,840,721 UART: [afmc] --
28,844,171 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,844,548 UART: [cold-reset] --
28,847,363 UART: [state] Locking Datavault
28,851,263 UART: [state] Locking PCR0, PCR1 and PCR31
28,853,463 UART: [state] Locking ICCM
28,856,207 UART: [exit] Launching FMC @ 0x40000000
28,864,873 UART:
28,865,102 UART: Running Caliptra FMC ...
28,866,198 UART:
28,866,350 UART: [fmc] Received command: 0x10000000
28,868,779 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,060,744 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
22,649,817 >>> mbox cmd response: success
28,340,422 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,355,083 UART:
28,355,440 UART: Running Caliptra FMC ...
28,356,622 UART:
28,356,784 UART: [fmc] Received command: 0x10000000
28,359,049 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,150 writing to cptra_bootfsm_go
2,070,043 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,211,276 UART:
2,211,711 UART: Running Caliptra ROM ...
2,212,810 UART:
2,212,959 UART: [state] CFI Enabled
2,213,940 UART: [state] LifecycleState = Unprovisioned
2,215,584 UART: [state] DebugLocked = No
2,216,691 UART: [state] WD Timer not started. Device not locked for debugging
2,219,162 UART: [kat] SHA2-256
2,219,824 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,222,826 UART: [kat] ++
2,223,270 UART: [kat] sha1
2,223,776 UART: [kat] SHA2-256
2,224,424 UART: [kat] SHA2-384
2,225,073 UART: [kat] SHA2-512-ACC
2,225,869 UART: [kat] ECC-384
4,099,069 UART: [kat] HMAC-384Kdf
4,111,583 UART: [kat] LMS
5,184,696 UART: [kat] --
5,189,254 UART: [cold-reset] ++
5,190,104 UART: [fht] FHT @ 0x50003400
5,201,780 UART: [idev] ++
5,202,682 UART: [idev] CDI.KEYID = 6
5,203,629 UART: [idev] SUBJECT.KEYID = 7
5,205,170 UART: [idev] UDS.KEYID = 0
5,224,793 UART: [idev] Erasing UDS.KEYID = 0
8,497,521 UART: [idev] Sha1 KeyId Algorithm
8,519,305 UART: [idev] --
8,523,624 UART: [ldev] ++
8,524,219 UART: [ldev] CDI.KEYID = 6
8,525,409 UART: [ldev] SUBJECT.KEYID = 5
8,526,900 UART: [ldev] AUTHORITY.KEYID = 7
8,528,459 UART: [ldev] FE.KEYID = 1
8,540,941 UART: [ldev] Erasing FE.KEYID = 1
11,832,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,686 UART: [ldev] --
14,198,433 UART: [fwproc] Wait for Commands...
14,200,688 UART: [fwproc] Recv command 0x46574c44
14,202,948 UART: [fwproc] Recv'd Img size: 111600 bytes
22,729,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,812,211 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,872,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
23,189,153 >>> mbox cmd response: success
23,192,818 UART: [afmc] ++
23,193,570 UART: [afmc] CDI.KEYID = 6
23,194,679 UART: [afmc] SUBJECT.KEYID = 7
23,195,934 UART: [afmc] AUTHORITY.KEYID = 5
26,515,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,811,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,813,255 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,829,405 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,845,345 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,861,308 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,883,991 UART: [afmc] --
28,886,876 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,887,255 UART: [cold-reset] --
28,890,711 UART: [state] Locking Datavault
28,897,370 UART: [state] Locking PCR0, PCR1 and PCR31
28,899,070 UART: [state] Locking ICCM
28,901,924 UART: [exit] Launching FMC @ 0x40000000
28,910,544 UART:
28,910,769 UART: Running Caliptra FMC ...
28,911,861 UART:
28,912,047 UART: [fmc] Received command: 0x10000000
28,914,491 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,066,892 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
22,580,819 >>> mbox cmd response: success
28,201,619 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,218,267 UART:
28,218,606 UART: Running Caliptra FMC ...
28,219,788 UART:
28,219,952 UART: [fmc] Received command: 0x10000000
28,222,198 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
2,063,788 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,205,521 UART:
2,205,980 UART: Running Caliptra ROM ...
2,207,110 UART:
2,207,278 UART: [state] CFI Enabled
2,208,375 UART: [state] LifecycleState = Unprovisioned
2,210,020 UART: [state] DebugLocked = No
2,211,131 UART: [state] WD Timer not started. Device not locked for debugging
2,213,610 UART: [kat] SHA2-256
2,214,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,296 UART: [kat] ++
2,217,749 UART: [kat] sha1
2,218,264 UART: [kat] SHA2-256
2,218,947 UART: [kat] SHA2-384
2,219,642 UART: [kat] SHA2-512-ACC
2,220,533 UART: [kat] ECC-384
2,949,826 UART: [kat] HMAC-384Kdf
2,972,101 UART: [kat] LMS
3,501,541 UART: [kat] --
3,506,400 UART: [cold-reset] ++
3,508,872 UART: [fht] FHT @ 0x50003400
3,518,930 UART: [idev] ++
3,519,499 UART: [idev] CDI.KEYID = 6
3,520,434 UART: [idev] SUBJECT.KEYID = 7
3,521,585 UART: [idev] UDS.KEYID = 0
3,543,520 UART: [idev] Erasing UDS.KEYID = 0
6,027,047 UART: [idev] Sha1 KeyId Algorithm
6,051,295 UART: [idev] --
6,055,884 UART: [ldev] ++
6,056,453 UART: [ldev] CDI.KEYID = 6
6,057,362 UART: [ldev] SUBJECT.KEYID = 5
6,058,524 UART: [ldev] AUTHORITY.KEYID = 7
6,059,813 UART: [ldev] FE.KEYID = 1
6,099,197 UART: [ldev] Erasing FE.KEYID = 1
8,602,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,489 UART: [ldev] --
10,410,092 UART: [fwproc] Wait for Commands...
10,412,093 UART: [fwproc] Recv command 0x46574c44
10,414,204 UART: [fwproc] Recv'd Img size: 111944 bytes
14,956,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,033,094 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,093,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,410,636 >>> mbox cmd response: success
15,415,689 UART: [afmc] ++
15,416,277 UART: [afmc] CDI.KEYID = 6
15,417,158 UART: [afmc] SUBJECT.KEYID = 7
15,418,394 UART: [afmc] AUTHORITY.KEYID = 5
17,956,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,679,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,680,878 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,696,906 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,712,730 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,728,543 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,750,768 UART: [afmc] --
19,755,282 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,755,648 UART: [cold-reset] --
19,759,484 UART: [state] Locking Datavault
19,765,634 UART: [state] Locking PCR0, PCR1 and PCR31
19,767,321 UART: [state] Locking ICCM
19,768,908 UART: [exit] Launching FMC @ 0x40000000
19,777,306 UART:
19,777,540 UART: Running Caliptra FMC ...
19,778,607 UART:
19,778,755 UART: [fmc] Received command: 0x10000000
19,781,216 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,062,334 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,204,029 UART:
2,204,485 UART: Running Caliptra ROM ...
2,205,576 UART:
2,205,731 UART: [state] CFI Enabled
2,206,712 UART: [state] LifecycleState = Unprovisioned
2,208,377 UART: [state] DebugLocked = No
2,209,431 UART: [state] WD Timer not started. Device not locked for debugging
2,211,908 UART: [kat] SHA2-256
2,212,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,584 UART: [kat] ++
2,216,033 UART: [kat] sha1
2,216,546 UART: [kat] SHA2-256
2,217,289 UART: [kat] SHA2-384
2,217,957 UART: [kat] SHA2-512-ACC
2,218,841 UART: [kat] ECC-384
2,949,310 UART: [kat] HMAC-384Kdf
2,972,973 UART: [kat] LMS
3,502,428 UART: [kat] --
3,508,123 UART: [cold-reset] ++
3,510,491 UART: [fht] FHT @ 0x50003400
3,520,878 UART: [idev] ++
3,521,442 UART: [idev] CDI.KEYID = 6
3,522,357 UART: [idev] SUBJECT.KEYID = 7
3,523,616 UART: [idev] UDS.KEYID = 0
3,545,137 UART: [idev] Erasing UDS.KEYID = 0
6,024,420 UART: [idev] Sha1 KeyId Algorithm
6,046,969 UART: [idev] --
6,052,319 UART: [ldev] ++
6,052,891 UART: [ldev] CDI.KEYID = 6
6,053,776 UART: [ldev] SUBJECT.KEYID = 5
6,055,034 UART: [ldev] AUTHORITY.KEYID = 7
6,056,141 UART: [ldev] FE.KEYID = 1
6,100,658 UART: [ldev] Erasing FE.KEYID = 1
8,600,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,908 UART: [ldev] --
10,415,079 UART: [fwproc] Wait for Commands...
10,416,800 UART: [fwproc] Recv command 0x46574c44
10,418,896 UART: [fwproc] Recv'd Img size: 111944 bytes
14,941,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,021,158 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,081,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,399,367 >>> mbox cmd response: success
15,402,926 UART: [afmc] ++
15,403,514 UART: [afmc] CDI.KEYID = 6
15,404,397 UART: [afmc] SUBJECT.KEYID = 7
15,405,628 UART: [afmc] AUTHORITY.KEYID = 5
17,935,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,660,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,662,712 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,678,708 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,694,598 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,710,418 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,733,089 UART: [afmc] --
19,737,181 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,737,555 UART: [cold-reset] --
19,743,443 UART: [state] Locking Datavault
19,747,777 UART: [state] Locking PCR0, PCR1 and PCR31
19,749,479 UART: [state] Locking ICCM
19,750,928 UART: [exit] Launching FMC @ 0x40000000
19,759,328 UART:
19,759,563 UART: Running Caliptra FMC ...
19,760,683 UART:
19,760,838 UART: [fmc] Received command: 0x10000000
19,763,271 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,062,361 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,979,207 >>> mbox cmd response: success
19,250,483 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,267,121 UART:
19,267,484 UART: Running Caliptra FMC ...
19,268,672 UART:
19,268,841 UART: [fmc] Received command: 0x10000000
19,271,132 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
2,066,911 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,208,672 UART:
2,209,108 UART: Running Caliptra ROM ...
2,210,295 UART:
2,210,468 UART: [state] CFI Enabled
2,211,443 UART: [state] LifecycleState = Unprovisioned
2,213,089 UART: [state] DebugLocked = No
2,214,197 UART: [state] WD Timer not started. Device not locked for debugging
2,216,666 UART: [kat] SHA2-256
2,217,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,220,339 UART: [kat] ++
2,220,791 UART: [kat] sha1
2,221,341 UART: [kat] SHA2-256
2,222,000 UART: [kat] SHA2-384
2,222,661 UART: [kat] SHA2-512-ACC
2,223,460 UART: [kat] ECC-384
3,279,212 UART: [kat] HMAC-384Kdf
3,290,196 UART: [kat] LMS
3,819,685 UART: [kat] --
3,824,528 UART: [cold-reset] ++
3,826,728 UART: [fht] FHT @ 0x50003400
3,836,997 UART: [idev] ++
3,837,558 UART: [idev] CDI.KEYID = 6
3,838,463 UART: [idev] SUBJECT.KEYID = 7
3,839,670 UART: [idev] UDS.KEYID = 0
3,858,396 UART: [idev] Erasing UDS.KEYID = 0
6,312,460 UART: [idev] Sha1 KeyId Algorithm
6,335,197 UART: [idev] --
6,339,834 UART: [ldev] ++
6,340,397 UART: [ldev] CDI.KEYID = 6
6,341,410 UART: [ldev] SUBJECT.KEYID = 5
6,342,507 UART: [ldev] AUTHORITY.KEYID = 7
6,343,790 UART: [ldev] FE.KEYID = 1
6,353,841 UART: [ldev] Erasing FE.KEYID = 1
8,826,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,514 UART: [ldev] --
10,614,478 UART: [fwproc] Wait for Commands...
10,616,566 UART: [fwproc] Recv command 0x46574c44
10,618,653 UART: [fwproc] Recv'd Img size: 111944 bytes
15,160,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,239,849 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,300,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,618,607 >>> mbox cmd response: success
15,622,328 UART: [afmc] ++
15,622,913 UART: [afmc] CDI.KEYID = 6
15,623,818 UART: [afmc] SUBJECT.KEYID = 7
15,625,032 UART: [afmc] AUTHORITY.KEYID = 5
18,123,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,844,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,846,665 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,862,654 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,878,564 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,894,344 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,918,083 UART: [afmc] --
19,921,845 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,922,223 UART: [cold-reset] --
19,924,824 UART: [state] Locking Datavault
19,930,443 UART: [state] Locking PCR0, PCR1 and PCR31
19,932,147 UART: [state] Locking ICCM
19,933,995 UART: [exit] Launching FMC @ 0x40000000
19,942,379 UART:
19,942,605 UART: Running Caliptra FMC ...
19,943,639 UART:
19,943,804 UART: [fmc] Received command: 0x10000000
19,946,296 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
2,070,244 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
15,196,542 >>> mbox cmd response: success
19,429,944 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,444,981 UART:
19,445,324 UART: Running Caliptra FMC ...
19,446,442 UART:
19,446,600 UART: [fmc] Received command: 0x10000000
19,449,004 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,169,921 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,537 UART: [fwproc] Recv command 0x46574c44
1,282,270 UART: [fwproc] Recv'd Img size: 111944 bytes
3,097,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,124,686 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,150,371 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,286,275 >>> mbox cmd response: success
3,287,390 UART: [afmc] ++
3,287,558 UART: [afmc] CDI.KEYID = 6
3,287,921 UART: [afmc] SUBJECT.KEYID = 7
3,288,347 UART: [afmc] AUTHORITY.KEYID = 5
3,323,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,340,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,340,893 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,346,587 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,352,487 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,358,196 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,366,032 UART: [afmc] --
3,366,988 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,367,010 UART: [cold-reset] --
3,367,846 UART: [state] Locking Datavault
3,368,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,369,479 UART: [state] Locking ICCM
3,370,041 UART: [exit] Launching FMC @ 0x40000000
3,375,338 UART:
3,375,354 UART: Running Caliptra FMC ...
3,375,762 UART:
3,375,992 UART: [fmc] Received command: 0x10000000
3,378,161 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,131,624 >>> mbox cmd response: success
3,187,745 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,744 UART:
3,193,760 UART: Running Caliptra FMC ...
3,194,168 UART:
3,194,398 UART: [fmc] Received command: 0x10000000
3,196,567 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,307 UART: [kat] SHA2-256
890,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,986 UART: [kat] ++
895,138 UART: [kat] sha1
899,226 UART: [kat] SHA2-256
901,166 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,501 UART: [kat] LMS
1,168,813 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,181,618 UART: [idev] Erasing UDS.KEYID = 0
1,198,356 UART: [idev] Sha1 KeyId Algorithm
1,207,194 UART: [idev] --
1,208,153 UART: [ldev] ++
1,208,321 UART: [ldev] CDI.KEYID = 6
1,208,685 UART: [ldev] SUBJECT.KEYID = 5
1,209,112 UART: [ldev] AUTHORITY.KEYID = 7
1,209,575 UART: [ldev] FE.KEYID = 1
1,215,017 UART: [ldev] Erasing FE.KEYID = 1
1,240,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,331 UART: [ldev] --
1,280,731 UART: [fwproc] Wait for Commands...
1,281,554 UART: [fwproc] Recv command 0x46574c44
1,282,287 UART: [fwproc] Recv'd Img size: 111944 bytes
3,091,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,118,440 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,279,921 >>> mbox cmd response: success
3,280,966 UART: [afmc] ++
3,281,134 UART: [afmc] CDI.KEYID = 6
3,281,497 UART: [afmc] SUBJECT.KEYID = 7
3,281,923 UART: [afmc] AUTHORITY.KEYID = 5
3,318,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,791 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,485 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,385 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,353,094 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,360,842 UART: [afmc] --
3,361,900 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,922 UART: [cold-reset] --
3,362,660 UART: [state] Locking Datavault
3,363,911 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,515 UART: [state] Locking ICCM
3,364,939 UART: [exit] Launching FMC @ 0x40000000
3,370,236 UART:
3,370,252 UART: Running Caliptra FMC ...
3,370,660 UART:
3,370,890 UART: [fmc] Received command: 0x10000000
3,373,059 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,140,173 >>> mbox cmd response: success
3,196,262 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,202,239 UART:
3,202,255 UART: Running Caliptra FMC ...
3,202,663 UART:
3,202,893 UART: [fmc] Received command: 0x10000000
3,205,062 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,526 UART: [state] LifecycleState = Unprovisioned
85,181 UART: [state] DebugLocked = No
85,891 UART: [state] WD Timer not started. Device not locked for debugging
87,060 UART: [kat] SHA2-256
890,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,739 UART: [kat] ++
894,891 UART: [kat] sha1
899,303 UART: [kat] SHA2-256
901,243 UART: [kat] SHA2-384
904,028 UART: [kat] SHA2-512-ACC
905,929 UART: [kat] ECC-384
915,758 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,057 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,208,110 UART: [ldev] ++
1,208,278 UART: [ldev] CDI.KEYID = 6
1,208,642 UART: [ldev] SUBJECT.KEYID = 5
1,209,069 UART: [ldev] AUTHORITY.KEYID = 7
1,209,532 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,240,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,860 UART: [ldev] --
1,280,302 UART: [fwproc] Wait for Commands...
1,281,011 UART: [fwproc] Recv command 0x46574c44
1,281,744 UART: [fwproc] Recv'd Img size: 111944 bytes
3,098,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,027 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,288,684 >>> mbox cmd response: success
3,289,813 UART: [afmc] ++
3,289,981 UART: [afmc] CDI.KEYID = 6
3,290,344 UART: [afmc] SUBJECT.KEYID = 7
3,290,770 UART: [afmc] AUTHORITY.KEYID = 5
3,326,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,342,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,338 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,349,032 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,354,932 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,360,641 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,368,461 UART: [afmc] --
3,369,555 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,369,577 UART: [cold-reset] --
3,370,519 UART: [state] Locking Datavault
3,371,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,436 UART: [state] Locking ICCM
3,373,110 UART: [exit] Launching FMC @ 0x40000000
3,378,407 UART:
3,378,423 UART: Running Caliptra FMC ...
3,378,831 UART:
3,379,061 UART: [fmc] Received command: 0x10000000
3,381,230 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,134,298 >>> mbox cmd response: success
3,189,709 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,816 UART:
3,195,832 UART: Running Caliptra FMC ...
3,196,240 UART:
3,196,470 UART: [fmc] Received command: 0x10000000
3,198,639 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,432 UART: [kat] SHA2-256
902,372 UART: [kat] SHA2-384
905,137 UART: [kat] SHA2-512-ACC
907,038 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,562 UART: [idev] ++
1,173,730 UART: [idev] CDI.KEYID = 6
1,174,091 UART: [idev] SUBJECT.KEYID = 7
1,174,516 UART: [idev] UDS.KEYID = 0
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,648 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,357 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,819 UART: [fwproc] Recv'd Img size: 111944 bytes
3,094,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,123,105 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,284,666 >>> mbox cmd response: success
3,285,881 UART: [afmc] ++
3,286,049 UART: [afmc] CDI.KEYID = 6
3,286,412 UART: [afmc] SUBJECT.KEYID = 7
3,286,838 UART: [afmc] AUTHORITY.KEYID = 5
3,322,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,476 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,345,170 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,351,070 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,356,779 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,364,537 UART: [afmc] --
3,365,539 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,365,561 UART: [cold-reset] --
3,366,387 UART: [state] Locking Datavault
3,367,532 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,136 UART: [state] Locking ICCM
3,368,712 UART: [exit] Launching FMC @ 0x40000000
3,374,009 UART:
3,374,025 UART: Running Caliptra FMC ...
3,374,433 UART:
3,374,663 UART: [fmc] Received command: 0x10000000
3,376,832 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,132,259 >>> mbox cmd response: success
3,187,592 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,815 UART:
3,193,831 UART: Running Caliptra FMC ...
3,194,239 UART:
3,194,469 UART: [fmc] Received command: 0x10000000
3,196,638 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,932 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,469 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,240,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,436 UART: [ldev] --
1,279,782 UART: [fwproc] Wait for Commands...
1,280,441 UART: [fwproc] Recv command 0x46574c44
1,281,174 UART: [fwproc] Recv'd Img size: 111944 bytes
3,089,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,117,501 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,279,066 >>> mbox cmd response: success
3,280,095 UART: [afmc] ++
3,280,263 UART: [afmc] CDI.KEYID = 6
3,280,626 UART: [afmc] SUBJECT.KEYID = 7
3,281,052 UART: [afmc] AUTHORITY.KEYID = 5
3,316,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,930 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,339,624 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,345,524 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,351,233 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,358,933 UART: [afmc] --
3,359,895 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,359,917 UART: [cold-reset] --
3,360,773 UART: [state] Locking Datavault
3,361,934 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,538 UART: [state] Locking ICCM
3,363,016 UART: [exit] Launching FMC @ 0x40000000
3,368,313 UART:
3,368,329 UART: Running Caliptra FMC ...
3,368,737 UART:
3,368,967 UART: [fmc] Received command: 0x10000000
3,371,136 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,135,890 >>> mbox cmd response: success
3,191,021 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,197,186 UART:
3,197,202 UART: Running Caliptra FMC ...
3,197,610 UART:
3,197,840 UART: [fmc] Received command: 0x10000000
3,200,009 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,418 UART: [idev] ++
1,173,586 UART: [idev] CDI.KEYID = 6
1,173,947 UART: [idev] SUBJECT.KEYID = 7
1,174,372 UART: [idev] UDS.KEYID = 0
1,182,530 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,356 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,211 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46574c44
1,282,867 UART: [fwproc] Recv'd Img size: 111944 bytes
3,091,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,118,790 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,280,347 >>> mbox cmd response: success
3,281,570 UART: [afmc] ++
3,281,738 UART: [afmc] CDI.KEYID = 6
3,282,101 UART: [afmc] SUBJECT.KEYID = 7
3,282,527 UART: [afmc] AUTHORITY.KEYID = 5
3,318,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,407 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,101 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,001 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,352,710 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,360,470 UART: [afmc] --
3,361,354 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,376 UART: [cold-reset] --
3,362,158 UART: [state] Locking Datavault
3,363,231 UART: [state] Locking PCR0, PCR1 and PCR31
3,363,835 UART: [state] Locking ICCM
3,364,379 UART: [exit] Launching FMC @ 0x40000000
3,369,676 UART:
3,369,692 UART: Running Caliptra FMC ...
3,370,100 UART:
3,370,330 UART: [fmc] Received command: 0x10000000
3,372,499 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,133,764 >>> mbox cmd response: success
3,189,793 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,195,850 UART:
3,195,866 UART: Running Caliptra FMC ...
3,196,274 UART:
3,196,504 UART: [fmc] Received command: 0x10000000
3,198,673 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,052,744 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,193,839 UART:
2,194,246 UART: Running Caliptra ROM ...
2,195,344 UART:
2,195,501 UART: [state] CFI Enabled
2,196,484 UART: [state] LifecycleState = Unprovisioned
2,198,150 UART: [state] DebugLocked = No
2,199,465 UART: [state] WD Timer not started. Device not locked for debugging
2,201,972 UART: [kat] SHA2-256
2,202,638 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,653 UART: [kat] ++
2,206,102 UART: [kat] sha1
2,206,611 UART: [kat] SHA2-256
2,207,269 UART: [kat] SHA2-384
2,207,926 UART: [kat] SHA2-512-ACC
2,208,922 UART: [kat] ECC-384
3,776,176 UART: [kat] HMAC-384Kdf
3,803,699 UART: [kat] LMS
4,876,861 UART: [kat] --
4,881,302 UART: [cold-reset] ++
4,884,102 UART: [fht] FHT @ 0x50003400
4,894,649 UART: [idev] ++
4,895,380 UART: [idev] CDI.KEYID = 6
4,896,487 UART: [idev] SUBJECT.KEYID = 7
4,897,699 UART: [idev] UDS.KEYID = 0
4,931,131 UART: [idev] Erasing UDS.KEYID = 0
8,239,344 UART: [idev] Sha1 KeyId Algorithm
8,261,228 UART: [idev] --
8,265,111 UART: [ldev] ++
8,265,677 UART: [ldev] CDI.KEYID = 6
8,266,911 UART: [ldev] SUBJECT.KEYID = 5
8,268,067 UART: [ldev] AUTHORITY.KEYID = 7
8,269,297 UART: [ldev] FE.KEYID = 1
8,297,316 UART: [ldev] Erasing FE.KEYID = 1
11,632,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,922,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,939,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,955,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,970,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,992,221 UART: [ldev] --
13,997,268 UART: [fwproc] Wait for Commands...
14,000,286 UART: [fwproc] Recv command 0x46574c44
14,002,553 UART: [fwproc] Recv'd Img size: 111600 bytes
18,040,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,116,252 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,176,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,493,083 >>> mbox cmd response: success
18,498,081 UART: [afmc] ++
18,498,675 UART: [afmc] CDI.KEYID = 6
18,499,858 UART: [afmc] SUBJECT.KEYID = 7
18,501,014 UART: [afmc] AUTHORITY.KEYID = 5
21,861,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,163,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,165,408 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,181,450 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,197,479 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,213,572 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,236,708 UART: [afmc] --
24,239,547 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,239,915 UART: [cold-reset] --
24,243,159 UART: [state] Locking Datavault
24,249,921 UART: [state] Locking PCR0, PCR1 and PCR31
24,251,566 UART: [state] Locking ICCM
24,254,527 UART: [exit] Launching FMC @ 0x40000000
24,263,141 UART:
24,263,373 UART: Running Caliptra FMC ...
24,264,470 UART:
24,264,647 UART: [fmc] Received command: 0x10000000
24,267,132 >>> mbox cmd response data (224 bytes)
24,268,599 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,269,012 UART: [fmc] Received command: 0x10000006
24,290,270 >>> mbox cmd response data (1536 bytes)
24,300,878 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,441,690 UART: [fmc] Received command: 0x46574C44
24,443,247 UART:
24,443,420 UART: Running Caliptra ROM ...
24,444,529 UART:
24,444,685 UART: [state] CFI Enabled
24,519,769 UART: [state] LifecycleState = Unprovisioned
24,521,644 UART: [state] DebugLocked = No
24,523,344 UART: [state] WD Timer not started. Device not locked for debugging
24,527,595 UART: [kat] SHA2-256
24,709,542 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,721,049 UART: [kat] ++
24,721,640 UART: [kat] sha1
24,733,234 UART: [kat] SHA2-256
24,736,254 UART: [kat] SHA2-384
24,741,475 UART: [kat] SHA2-512-ACC
24,744,095 UART: [kat] ECC-384
28,033,249 UART: [kat] HMAC-384Kdf
28,060,453 UART: [kat] LMS
29,133,615 UART: [kat] --
29,138,544 UART: [update-reset] ++
33,205,863 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,209,414 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,582,749 >>> mbox cmd response: success
33,583,632 UART: [update-reset] Copying MAN_2 To MAN_1
33,606,532 UART: [update-reset Success] --
33,608,186 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,612,179 UART: [state] Locking Datavault
33,614,582 UART: [state] Locking PCR0, PCR1 and PCR31
33,616,283 UART: [state] Locking ICCM
33,618,709 UART: [exit] Launching FMC @ 0x40000000
33,627,378 UART:
33,627,618 UART: Running Caliptra FMC ...
33,628,657 UART:
33,628,804 UART: [fmc] Received command: 0x10000000
33,631,290 >>> mbox cmd response data (224 bytes)
33,632,691 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,633,106 UART: [fmc] Received command: 0x10000006
33,654,382 >>> mbox cmd response data (1536 bytes)
33,663,000 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,663,467 UART: [fmc] Received command: 0x10000007
33,664,928 >>> mbox cmd response data (4 bytes)
33,665,231 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,665,568 UART: [fmc] Received command: 0x10000006
33,686,765 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,052,307 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,278,159 >>> mbox cmd response: success
23,960,191 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,975,535 UART:
23,975,872 UART: Running Caliptra FMC ...
23,976,970 UART:
23,977,119 UART: [fmc] Received command: 0x10000000
23,979,497 >>> mbox cmd response data (224 bytes)
23,980,897 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
23,981,321 UART: [fmc] Received command: 0x10000006
24,002,565 >>> mbox cmd response data (1536 bytes)
24,012,800 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,153,181 UART: [fmc] Received command: 0x46574C44
33,160,475 >>> mbox cmd response: success
33,181,986 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,195,184 UART:
33,195,474 UART: Running Caliptra FMC ...
33,196,536 UART:
33,196,691 UART: [fmc] Received command: 0x10000000
33,199,134 >>> mbox cmd response data (224 bytes)
33,200,551 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,200,959 UART: [fmc] Received command: 0x10000006
33,222,200 >>> mbox cmd response data (1536 bytes)
33,230,374 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,230,831 UART: [fmc] Received command: 0x10000007
33,232,420 >>> mbox cmd response data (4 bytes)
33,232,761 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,233,078 UART: [fmc] Received command: 0x10000006
33,254,273 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,060,288 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,201,425 UART:
2,201,858 UART: Running Caliptra ROM ...
2,203,030 UART:
2,203,202 UART: [state] CFI Enabled
2,204,175 UART: [state] LifecycleState = Unprovisioned
2,205,834 UART: [state] DebugLocked = No
2,206,940 UART: [state] WD Timer not started. Device not locked for debugging
2,209,409 UART: [kat] SHA2-256
2,210,069 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,312 UART: [kat] ++
2,213,773 UART: [kat] sha1
2,214,280 UART: [kat] SHA2-256
2,215,019 UART: [kat] SHA2-384
2,215,682 UART: [kat] SHA2-512-ACC
2,216,561 UART: [kat] ECC-384
4,096,625 UART: [kat] HMAC-384Kdf
4,109,150 UART: [kat] LMS
5,182,275 UART: [kat] --
5,187,235 UART: [cold-reset] ++
5,188,699 UART: [fht] FHT @ 0x50003400
5,199,685 UART: [idev] ++
5,200,374 UART: [idev] CDI.KEYID = 6
5,201,535 UART: [idev] SUBJECT.KEYID = 7
5,203,012 UART: [idev] UDS.KEYID = 0
5,220,852 UART: [idev] Erasing UDS.KEYID = 0
8,495,672 UART: [idev] Sha1 KeyId Algorithm
8,518,038 UART: [idev] --
8,523,378 UART: [ldev] ++
8,523,950 UART: [ldev] CDI.KEYID = 6
8,525,133 UART: [ldev] SUBJECT.KEYID = 5
8,526,621 UART: [ldev] AUTHORITY.KEYID = 7
8,528,179 UART: [ldev] FE.KEYID = 1
8,541,257 UART: [ldev] Erasing FE.KEYID = 1
11,836,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,130,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,198,830 UART: [ldev] --
14,203,495 UART: [fwproc] Wait for Commands...
14,206,349 UART: [fwproc] Recv command 0x46574c44
14,208,607 UART: [fwproc] Recv'd Img size: 111600 bytes
18,245,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,321,206 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,381,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,698,902 >>> mbox cmd response: success
18,702,813 UART: [afmc] ++
18,703,398 UART: [afmc] CDI.KEYID = 6
18,704,589 UART: [afmc] SUBJECT.KEYID = 7
18,705,755 UART: [afmc] AUTHORITY.KEYID = 5
22,021,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,316,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,318,464 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,334,502 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,350,494 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,366,589 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,389,398 UART: [afmc] --
24,392,096 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,392,470 UART: [cold-reset] --
24,396,035 UART: [state] Locking Datavault
24,400,364 UART: [state] Locking PCR0, PCR1 and PCR31
24,402,010 UART: [state] Locking ICCM
24,403,727 UART: [exit] Launching FMC @ 0x40000000
24,412,345 UART:
24,412,574 UART: Running Caliptra FMC ...
24,413,666 UART:
24,413,817 UART: [fmc] Received command: 0x10000000
24,416,325 >>> mbox cmd response data (224 bytes)
24,417,791 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,418,215 UART: [fmc] Received command: 0x10000006
24,439,466 >>> mbox cmd response data (1536 bytes)
24,450,152 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,590,527 UART: [fmc] Received command: 0x46574C44
24,592,084 UART:
24,592,250 UART: Running Caliptra ROM ...
24,593,260 UART:
24,593,668 UART: [state] CFI Enabled
24,609,009 UART: [state] LifecycleState = Unprovisioned
24,610,900 UART: [state] DebugLocked = No
24,613,509 UART: [state] WD Timer not started. Device not locked for debugging
24,618,599 UART: [kat] SHA2-256
24,800,514 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,812,110 UART: [kat] ++
24,812,572 UART: [kat] sha1
24,823,507 UART: [kat] SHA2-256
24,826,543 UART: [kat] SHA2-384
24,833,174 UART: [kat] SHA2-512-ACC
24,835,789 UART: [kat] ECC-384
28,089,960 UART: [kat] HMAC-384Kdf
28,103,184 UART: [kat] LMS
29,176,298 UART: [kat] --
29,179,964 UART: [update-reset] ++
33,245,543 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,249,138 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,622,432 >>> mbox cmd response: success
33,623,364 UART: [update-reset] Copying MAN_2 To MAN_1
33,646,248 UART: [update-reset Success] --
33,647,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,649,997 UART: [state] Locking Datavault
33,653,421 UART: [state] Locking PCR0, PCR1 and PCR31
33,655,111 UART: [state] Locking ICCM
33,656,745 UART: [exit] Launching FMC @ 0x40000000
33,665,363 UART:
33,665,604 UART: Running Caliptra FMC ...
33,666,703 UART:
33,666,852 UART: [fmc] Received command: 0x10000000
33,669,332 >>> mbox cmd response data (224 bytes)
33,670,742 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,671,146 UART: [fmc] Received command: 0x10000006
33,692,381 >>> mbox cmd response data (1536 bytes)
33,700,579 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,701,030 UART: [fmc] Received command: 0x10000007
33,702,570 >>> mbox cmd response data (4 bytes)
33,702,864 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,703,168 UART: [fmc] Received command: 0x10000006
33,724,406 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,060,295 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,499,466 >>> mbox cmd response: success
24,121,934 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,135,299 UART:
24,135,655 UART: Running Caliptra FMC ...
24,136,847 UART:
24,137,011 UART: [fmc] Received command: 0x10000000
24,139,282 >>> mbox cmd response data (224 bytes)
24,140,707 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,141,116 UART: [fmc] Received command: 0x10000006
24,162,353 >>> mbox cmd response data (1536 bytes)
24,172,514 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,312,885 UART: [fmc] Received command: 0x46574C44
33,236,525 >>> mbox cmd response: success
33,259,249 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,270,974 UART:
33,271,260 UART: Running Caliptra FMC ...
33,272,292 UART:
33,272,435 UART: [fmc] Received command: 0x10000000
33,274,927 >>> mbox cmd response data (224 bytes)
33,276,339 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,276,749 UART: [fmc] Received command: 0x10000006
33,298,018 >>> mbox cmd response data (1536 bytes)
33,306,631 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,307,087 UART: [fmc] Received command: 0x10000007
33,308,627 >>> mbox cmd response data (4 bytes)
33,308,930 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,309,253 UART: [fmc] Received command: 0x10000006
33,330,454 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,056,220 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,197,771 UART:
2,198,178 UART: Running Caliptra ROM ...
2,199,341 UART:
2,199,514 UART: [state] CFI Enabled
2,200,498 UART: [state] LifecycleState = Unprovisioned
2,202,310 UART: [state] DebugLocked = No
2,203,441 UART: [state] WD Timer not started. Device not locked for debugging
2,205,923 UART: [kat] SHA2-256
2,206,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,603 UART: [kat] ++
2,210,074 UART: [kat] sha1
2,210,677 UART: [kat] SHA2-256
2,211,344 UART: [kat] SHA2-384
2,212,024 UART: [kat] SHA2-512-ACC
2,212,848 UART: [kat] ECC-384
2,948,431 UART: [kat] HMAC-384Kdf
2,971,924 UART: [kat] LMS
3,501,385 UART: [kat] --
3,506,077 UART: [cold-reset] ++
3,508,168 UART: [fht] FHT @ 0x50003400
3,520,391 UART: [idev] ++
3,520,954 UART: [idev] CDI.KEYID = 6
3,521,886 UART: [idev] SUBJECT.KEYID = 7
3,523,097 UART: [idev] UDS.KEYID = 0
3,542,943 UART: [idev] Erasing UDS.KEYID = 0
6,027,188 UART: [idev] Sha1 KeyId Algorithm
6,050,602 UART: [idev] --
6,054,633 UART: [ldev] ++
6,055,213 UART: [ldev] CDI.KEYID = 6
6,056,098 UART: [ldev] SUBJECT.KEYID = 5
6,057,268 UART: [ldev] AUTHORITY.KEYID = 7
6,058,635 UART: [ldev] FE.KEYID = 1
6,098,927 UART: [ldev] Erasing FE.KEYID = 1
8,604,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,445 UART: [ldev] --
10,413,248 UART: [fwproc] Wait for Commands...
10,414,806 UART: [fwproc] Recv command 0x46574c44
10,416,903 UART: [fwproc] Recv'd Img size: 111944 bytes
13,786,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,858,638 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,918,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,236,493 >>> mbox cmd response: success
14,240,924 UART: [afmc] ++
14,241,512 UART: [afmc] CDI.KEYID = 6
14,242,424 UART: [afmc] SUBJECT.KEYID = 7
14,243,579 UART: [afmc] AUTHORITY.KEYID = 5
16,770,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,495,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,497,274 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,513,207 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,529,113 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,545,083 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,567,433 UART: [afmc] --
18,571,086 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,571,488 UART: [cold-reset] --
18,575,119 UART: [state] Locking Datavault
18,581,020 UART: [state] Locking PCR0, PCR1 and PCR31
18,582,669 UART: [state] Locking ICCM
18,584,925 UART: [exit] Launching FMC @ 0x40000000
18,593,317 UART:
18,593,560 UART: Running Caliptra FMC ...
18,594,661 UART:
18,594,816 UART: [fmc] Received command: 0x10000000
18,597,254 >>> mbox cmd response data (224 bytes)
18,598,755 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,599,158 UART: [fmc] Received command: 0x10000006
18,620,409 >>> mbox cmd response data (1536 bytes)
18,631,572 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,772,749 UART: [fmc] Received command: 0x46574C44
18,774,314 UART:
18,774,507 UART: Running Caliptra ROM ...
18,775,621 UART:
18,775,776 UART: [state] CFI Enabled
18,851,240 UART: [state] LifecycleState = Unprovisioned
18,853,125 UART: [state] DebugLocked = No
18,855,112 UART: [state] WD Timer not started. Device not locked for debugging
18,857,989 UART: [kat] SHA2-256
19,037,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,048,722 UART: [kat] ++
19,049,262 UART: [kat] sha1
19,060,210 UART: [kat] SHA2-256
19,063,226 UART: [kat] SHA2-384
19,069,804 UART: [kat] SHA2-512-ACC
19,072,744 UART: [kat] ECC-384
21,535,515 UART: [kat] HMAC-384Kdf
21,557,799 UART: [kat] LMS
22,087,243 UART: [kat] --
22,093,615 UART: [update-reset] ++
25,491,702 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,495,243 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,869,749 >>> mbox cmd response: success
25,871,534 UART: [update-reset] Copying MAN_2 To MAN_1
25,893,870 UART: [update-reset Success] --
25,895,172 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,898,365 UART: [state] Locking Datavault
25,903,026 UART: [state] Locking PCR0, PCR1 and PCR31
25,904,736 UART: [state] Locking ICCM
25,906,915 UART: [exit] Launching FMC @ 0x40000000
25,915,364 UART:
25,915,601 UART: Running Caliptra FMC ...
25,916,702 UART:
25,916,856 UART: [fmc] Received command: 0x10000000
25,919,260 >>> mbox cmd response data (224 bytes)
25,920,675 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,921,084 UART: [fmc] Received command: 0x10000006
25,942,328 >>> mbox cmd response data (1536 bytes)
25,950,512 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,950,965 UART: [fmc] Received command: 0x10000007
25,952,502 >>> mbox cmd response data (4 bytes)
25,952,820 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,953,128 UART: [fmc] Received command: 0x10000006
25,974,342 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,063,275 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,204,986 UART:
2,205,416 UART: Running Caliptra ROM ...
2,206,599 UART:
2,206,768 UART: [state] CFI Enabled
2,207,750 UART: [state] LifecycleState = Unprovisioned
2,209,404 UART: [state] DebugLocked = No
2,210,515 UART: [state] WD Timer not started. Device not locked for debugging
2,213,003 UART: [kat] SHA2-256
2,213,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,691 UART: [kat] ++
2,217,142 UART: [kat] sha1
2,217,742 UART: [kat] SHA2-256
2,218,597 UART: [kat] SHA2-384
2,219,263 UART: [kat] SHA2-512-ACC
2,220,148 UART: [kat] ECC-384
2,946,741 UART: [kat] HMAC-384Kdf
2,972,263 UART: [kat] LMS
3,501,668 UART: [kat] --
3,504,689 UART: [cold-reset] ++
3,506,408 UART: [fht] FHT @ 0x50003400
3,516,430 UART: [idev] ++
3,517,042 UART: [idev] CDI.KEYID = 6
3,517,966 UART: [idev] SUBJECT.KEYID = 7
3,519,135 UART: [idev] UDS.KEYID = 0
3,543,328 UART: [idev] Erasing UDS.KEYID = 0
6,028,380 UART: [idev] Sha1 KeyId Algorithm
6,052,001 UART: [idev] --
6,057,249 UART: [ldev] ++
6,057,824 UART: [ldev] CDI.KEYID = 6
6,058,735 UART: [ldev] SUBJECT.KEYID = 5
6,059,899 UART: [ldev] AUTHORITY.KEYID = 7
6,061,189 UART: [ldev] FE.KEYID = 1
6,098,598 UART: [ldev] Erasing FE.KEYID = 1
8,602,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,897 UART: [ldev] --
10,413,423 UART: [fwproc] Wait for Commands...
10,416,237 UART: [fwproc] Recv command 0x46574c44
10,418,339 UART: [fwproc] Recv'd Img size: 111944 bytes
13,790,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,857,626 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,917,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,235,858 >>> mbox cmd response: success
14,239,382 UART: [afmc] ++
14,239,975 UART: [afmc] CDI.KEYID = 6
14,240,906 UART: [afmc] SUBJECT.KEYID = 7
14,242,018 UART: [afmc] AUTHORITY.KEYID = 5
16,766,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,489,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,930 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,506,810 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,522,726 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,538,702 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,562,311 UART: [afmc] --
18,565,595 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,565,964 UART: [cold-reset] --
18,569,315 UART: [state] Locking Datavault
18,573,269 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,971 UART: [state] Locking ICCM
18,577,498 UART: [exit] Launching FMC @ 0x40000000
18,585,898 UART:
18,586,153 UART: Running Caliptra FMC ...
18,587,256 UART:
18,587,416 UART: [fmc] Received command: 0x10000000
18,589,824 >>> mbox cmd response data (224 bytes)
18,591,313 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,591,719 UART: [fmc] Received command: 0x10000006
18,613,014 >>> mbox cmd response data (1536 bytes)
18,623,237 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,764,029 UART: [fmc] Received command: 0x46574C44
18,765,592 UART:
18,765,765 UART: Running Caliptra ROM ...
18,766,881 UART:
18,767,038 UART: [state] CFI Enabled
18,824,298 UART: [state] LifecycleState = Unprovisioned
18,826,169 UART: [state] DebugLocked = No
18,828,907 UART: [state] WD Timer not started. Device not locked for debugging
18,833,102 UART: [kat] SHA2-256
19,012,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,023,803 UART: [kat] ++
19,024,351 UART: [kat] sha1
19,034,166 UART: [kat] SHA2-256
19,037,182 UART: [kat] SHA2-384
19,044,098 UART: [kat] SHA2-512-ACC
19,047,046 UART: [kat] ECC-384
21,507,549 UART: [kat] HMAC-384Kdf
21,531,977 UART: [kat] LMS
22,061,441 UART: [kat] --
22,066,297 UART: [update-reset] ++
25,468,749 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,472,354 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,846,940 >>> mbox cmd response: success
25,847,340 UART: [update-reset] Copying MAN_2 To MAN_1
25,869,559 UART: [update-reset Success] --
25,870,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,873,708 UART: [state] Locking Datavault
25,875,725 UART: [state] Locking PCR0, PCR1 and PCR31
25,877,427 UART: [state] Locking ICCM
25,878,985 UART: [exit] Launching FMC @ 0x40000000
25,887,382 UART:
25,887,618 UART: Running Caliptra FMC ...
25,888,665 UART:
25,888,816 UART: [fmc] Received command: 0x10000000
25,891,310 >>> mbox cmd response data (224 bytes)
25,892,711 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,893,114 UART: [fmc] Received command: 0x10000006
25,914,378 >>> mbox cmd response data (1536 bytes)
25,922,620 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,923,073 UART: [fmc] Received command: 0x10000007
25,924,634 >>> mbox cmd response data (4 bytes)
25,924,952 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,925,262 UART: [fmc] Received command: 0x10000006
25,946,455 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,058,201 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,011,857 >>> mbox cmd response: success
18,287,300 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,302,563 UART:
18,302,897 UART: Running Caliptra FMC ...
18,304,076 UART:
18,304,249 UART: [fmc] Received command: 0x10000000
18,306,580 >>> mbox cmd response data (224 bytes)
18,308,061 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,308,474 UART: [fmc] Received command: 0x10000006
18,329,727 >>> mbox cmd response data (1536 bytes)
18,340,032 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,480,827 UART: [fmc] Received command: 0x46574C44
25,411,444 >>> mbox cmd response: success
25,433,544 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,445,729 UART:
25,445,989 UART: Running Caliptra FMC ...
25,447,103 UART:
25,447,267 UART: [fmc] Received command: 0x10000000
25,449,713 >>> mbox cmd response data (224 bytes)
25,451,037 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,451,448 UART: [fmc] Received command: 0x10000006
25,472,711 >>> mbox cmd response data (1536 bytes)
25,480,878 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,481,323 UART: [fmc] Received command: 0x10000007
25,482,821 >>> mbox cmd response data (4 bytes)
25,483,126 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,483,453 UART: [fmc] Received command: 0x10000006
25,504,658 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,058,805 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,200,483 UART:
2,200,920 UART: Running Caliptra ROM ...
2,202,094 UART:
2,202,267 UART: [state] CFI Enabled
2,203,250 UART: [state] LifecycleState = Unprovisioned
2,204,915 UART: [state] DebugLocked = No
2,206,022 UART: [state] WD Timer not started. Device not locked for debugging
2,208,492 UART: [kat] SHA2-256
2,209,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,167 UART: [kat] ++
2,212,618 UART: [kat] sha1
2,213,133 UART: [kat] SHA2-256
2,213,869 UART: [kat] SHA2-384
2,214,530 UART: [kat] SHA2-512-ACC
2,215,373 UART: [kat] ECC-384
3,283,697 UART: [kat] HMAC-384Kdf
3,297,704 UART: [kat] LMS
3,827,182 UART: [kat] --
3,833,842 UART: [cold-reset] ++
3,836,464 UART: [fht] FHT @ 0x50003400
3,848,101 UART: [idev] ++
3,848,682 UART: [idev] CDI.KEYID = 6
3,849,588 UART: [idev] SUBJECT.KEYID = 7
3,850,802 UART: [idev] UDS.KEYID = 0
3,866,503 UART: [idev] Erasing UDS.KEYID = 0
6,324,838 UART: [idev] Sha1 KeyId Algorithm
6,348,817 UART: [idev] --
6,352,269 UART: [ldev] ++
6,352,836 UART: [ldev] CDI.KEYID = 6
6,353,743 UART: [ldev] SUBJECT.KEYID = 5
6,354,955 UART: [ldev] AUTHORITY.KEYID = 7
6,356,180 UART: [ldev] FE.KEYID = 1
6,365,854 UART: [ldev] Erasing FE.KEYID = 1
8,838,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,098 UART: [ldev] --
10,631,040 UART: [fwproc] Wait for Commands...
10,632,811 UART: [fwproc] Recv command 0x46574c44
10,634,952 UART: [fwproc] Recv'd Img size: 111944 bytes
14,006,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,083,236 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,143,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,461,115 >>> mbox cmd response: success
14,465,881 UART: [afmc] ++
14,466,470 UART: [afmc] CDI.KEYID = 6
14,467,379 UART: [afmc] SUBJECT.KEYID = 7
14,468,538 UART: [afmc] AUTHORITY.KEYID = 5
16,965,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,688,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,689,938 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,705,901 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,721,772 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,737,728 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,760,366 UART: [afmc] --
18,763,582 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,763,949 UART: [cold-reset] --
18,767,033 UART: [state] Locking Datavault
18,773,950 UART: [state] Locking PCR0, PCR1 and PCR31
18,775,600 UART: [state] Locking ICCM
18,777,638 UART: [exit] Launching FMC @ 0x40000000
18,786,032 UART:
18,786,266 UART: Running Caliptra FMC ...
18,787,368 UART:
18,787,531 UART: [fmc] Received command: 0x10000000
18,789,936 >>> mbox cmd response data (224 bytes)
18,791,351 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,791,722 UART: [fmc] Received command: 0x10000006
18,812,986 >>> mbox cmd response data (1536 bytes)
18,823,542 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,964,333 UART: [fmc] Received command: 0x46574C44
18,965,888 UART:
18,966,055 UART: Running Caliptra ROM ...
18,967,080 UART:
18,967,448 UART: [state] CFI Enabled
18,981,569 UART: [state] LifecycleState = Unprovisioned
18,983,406 UART: [state] DebugLocked = No
18,985,621 UART: [state] WD Timer not started. Device not locked for debugging
18,989,941 UART: [kat] SHA2-256
19,169,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,180,683 UART: [kat] ++
19,181,140 UART: [kat] sha1
19,192,723 UART: [kat] SHA2-256
19,195,768 UART: [kat] SHA2-384
19,201,519 UART: [kat] SHA2-512-ACC
19,204,463 UART: [kat] ECC-384
21,644,023 UART: [kat] HMAC-384Kdf
21,656,740 UART: [kat] LMS
22,186,237 UART: [kat] --
22,192,008 UART: [update-reset] ++
25,594,538 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,598,350 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,972,925 >>> mbox cmd response: success
25,973,981 UART: [update-reset] Copying MAN_2 To MAN_1
25,996,318 UART: [update-reset Success] --
25,997,620 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
26,000,982 UART: [state] Locking Datavault
26,005,106 UART: [state] Locking PCR0, PCR1 and PCR31
26,006,775 UART: [state] Locking ICCM
26,008,439 UART: [exit] Launching FMC @ 0x40000000
26,016,838 UART:
26,017,073 UART: Running Caliptra FMC ...
26,018,175 UART:
26,018,332 UART: [fmc] Received command: 0x10000000
26,020,816 >>> mbox cmd response data (224 bytes)
26,022,256 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,022,662 UART: [fmc] Received command: 0x10000006
26,043,901 >>> mbox cmd response data (1536 bytes)
26,052,230 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,052,695 UART: [fmc] Received command: 0x10000007
26,054,235 >>> mbox cmd response data (4 bytes)
26,054,557 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,054,879 UART: [fmc] Received command: 0x10000006
26,076,088 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,059,928 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,231,290 >>> mbox cmd response: success
18,462,575 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,477,824 UART:
18,478,160 UART: Running Caliptra FMC ...
18,479,269 UART:
18,479,416 UART: [fmc] Received command: 0x10000000
18,481,842 >>> mbox cmd response data (224 bytes)
18,483,244 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,483,658 UART: [fmc] Received command: 0x10000006
18,504,921 >>> mbox cmd response data (1536 bytes)
18,515,453 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,656,246 UART: [fmc] Received command: 0x46574C44
25,520,408 >>> mbox cmd response: success
25,542,172 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,555,131 UART:
25,555,375 UART: Running Caliptra FMC ...
25,556,409 UART:
25,556,555 UART: [fmc] Received command: 0x10000000
25,559,071 >>> mbox cmd response data (224 bytes)
25,560,412 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,560,833 UART: [fmc] Received command: 0x10000006
25,582,081 >>> mbox cmd response data (1536 bytes)
25,590,383 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,590,842 UART: [fmc] Received command: 0x10000007
25,592,432 >>> mbox cmd response data (4 bytes)
25,592,751 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,593,070 UART: [fmc] Received command: 0x10000006
25,614,263 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,811 UART: [fht] FHT @ 0x50003400
1,173,557 UART: [idev] ++
1,173,725 UART: [idev] CDI.KEYID = 6
1,174,086 UART: [idev] SUBJECT.KEYID = 7
1,174,511 UART: [idev] UDS.KEYID = 0
1,182,443 UART: [idev] Erasing UDS.KEYID = 0
1,199,889 UART: [idev] Sha1 KeyId Algorithm
1,208,889 UART: [idev] --
1,210,064 UART: [ldev] ++
1,210,232 UART: [ldev] CDI.KEYID = 6
1,210,596 UART: [ldev] SUBJECT.KEYID = 5
1,211,023 UART: [ldev] AUTHORITY.KEYID = 7
1,211,486 UART: [ldev] FE.KEYID = 1
1,216,554 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,332 UART: [fwproc] Wait for Commands...
1,282,141 UART: [fwproc] Recv command 0x46574c44
1,282,874 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,738,660 >>> mbox cmd response: success
2,739,883 UART: [afmc] ++
2,740,051 UART: [afmc] CDI.KEYID = 6
2,740,414 UART: [afmc] SUBJECT.KEYID = 7
2,740,840 UART: [afmc] AUTHORITY.KEYID = 5
2,776,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,557 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,277 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,169 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,810,863 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,818,800 UART: [afmc] --
2,819,660 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,682 UART: [cold-reset] --
2,820,414 UART: [state] Locking Datavault
2,821,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,113 UART: [state] Locking ICCM
2,822,633 UART: [exit] Launching FMC @ 0x40000000
2,827,930 UART:
2,827,946 UART: Running Caliptra FMC ...
2,828,354 UART:
2,828,584 UART: [fmc] Received command: 0x10000000
2,830,753 >>> mbox cmd response data (224 bytes)
2,830,754 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,830,783 UART: [fmc] Received command: 0x10000006
2,848,800 >>> mbox cmd response data (1536 bytes)
2,848,801 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,848,829 UART: [fmc] Received command: 0x46574C44
2,849,655 UART:
2,849,671 UART: Running Caliptra ROM ...
2,850,079 UART:
2,850,134 UART: [state] CFI Enabled
2,852,618 UART: [state] LifecycleState = Unprovisioned
2,853,273 UART: [state] DebugLocked = No
2,853,995 UART: [state] WD Timer not started. Device not locked for debugging
2,855,271 UART: [kat] SHA2-256
3,658,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,950 UART: [kat] ++
3,663,102 UART: [kat] sha1
3,667,336 UART: [kat] SHA2-256
3,669,276 UART: [kat] SHA2-384
3,672,151 UART: [kat] SHA2-512-ACC
3,674,051 UART: [kat] ECC-384
3,683,476 UART: [kat] HMAC-384Kdf
3,688,128 UART: [kat] LMS
3,936,440 UART: [kat] --
3,937,074 UART: [update-reset] ++
5,221,858 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,222,919 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,370,973 >>> mbox cmd response: success
5,371,320 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,334 UART: [update-reset Success] --
5,379,743 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,380,431 UART: [state] Locking Datavault
5,381,187 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,791 UART: [state] Locking ICCM
5,382,359 UART: [exit] Launching FMC @ 0x40000000
5,387,656 UART:
5,387,672 UART: Running Caliptra FMC ...
5,388,080 UART:
5,388,302 UART: [fmc] Received command: 0x10000000
5,390,471 >>> mbox cmd response data (224 bytes)
5,390,472 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,390,501 UART: [fmc] Received command: 0x10000006
5,408,518 >>> mbox cmd response data (1536 bytes)
5,408,519 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,408,547 UART: [fmc] Received command: 0x10000007
5,409,339 >>> mbox cmd response data (4 bytes)
5,409,340 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,368 UART: [fmc] Received command: 0x10000006
5,427,385 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,751 >>> mbox cmd response: success
2,646,989 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,934 UART:
2,652,950 UART: Running Caliptra FMC ...
2,653,358 UART:
2,653,588 UART: [fmc] Received command: 0x10000000
2,655,757 >>> mbox cmd response data (224 bytes)
2,655,758 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,787 UART: [fmc] Received command: 0x10000006
2,673,804 >>> mbox cmd response data (1536 bytes)
2,673,805 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,673,833 UART: [fmc] Received command: 0x46574C44
5,076,645 >>> mbox cmd response: success
5,084,285 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,090,115 UART:
5,090,131 UART: Running Caliptra FMC ...
5,090,539 UART:
5,090,761 UART: [fmc] Received command: 0x10000000
5,092,930 >>> mbox cmd response data (224 bytes)
5,092,931 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,960 UART: [fmc] Received command: 0x10000006
5,110,977 >>> mbox cmd response data (1536 bytes)
5,110,978 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,111,006 UART: [fmc] Received command: 0x10000007
5,111,798 >>> mbox cmd response data (4 bytes)
5,111,799 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,111,827 UART: [fmc] Received command: 0x10000006
5,129,844 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,181,734 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,254 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,707 UART: [ldev] --
1,282,165 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,707 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,687 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,282 >>> mbox cmd response: success
2,743,363 UART: [afmc] ++
2,743,531 UART: [afmc] CDI.KEYID = 6
2,743,894 UART: [afmc] SUBJECT.KEYID = 7
2,744,320 UART: [afmc] AUTHORITY.KEYID = 5
2,780,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,883 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,803,603 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,809,495 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,815,189 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,823,024 UART: [afmc] --
2,824,008 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,824,030 UART: [cold-reset] --
2,824,934 UART: [state] Locking Datavault
2,825,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,573 UART: [state] Locking ICCM
2,827,011 UART: [exit] Launching FMC @ 0x40000000
2,832,308 UART:
2,832,324 UART: Running Caliptra FMC ...
2,832,732 UART:
2,832,962 UART: [fmc] Received command: 0x10000000
2,835,131 >>> mbox cmd response data (224 bytes)
2,835,132 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,835,161 UART: [fmc] Received command: 0x10000006
2,853,178 >>> mbox cmd response data (1536 bytes)
2,853,179 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,853,207 UART: [fmc] Received command: 0x46574C44
2,854,033 UART:
2,854,049 UART: Running Caliptra ROM ...
2,854,457 UART:
2,854,599 UART: [state] CFI Enabled
2,857,449 UART: [state] LifecycleState = Unprovisioned
2,858,104 UART: [state] DebugLocked = No
2,858,622 UART: [state] WD Timer not started. Device not locked for debugging
2,859,960 UART: [kat] SHA2-256
3,663,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,639 UART: [kat] ++
3,667,791 UART: [kat] sha1
3,672,107 UART: [kat] SHA2-256
3,674,047 UART: [kat] SHA2-384
3,676,796 UART: [kat] SHA2-512-ACC
3,678,696 UART: [kat] ECC-384
3,688,435 UART: [kat] HMAC-384Kdf
3,693,113 UART: [kat] LMS
3,941,425 UART: [kat] --
3,942,319 UART: [update-reset] ++
5,225,222 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,226,341 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,374,395 >>> mbox cmd response: success
5,374,726 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,740 UART: [update-reset Success] --
5,383,149 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,383,657 UART: [state] Locking Datavault
5,384,507 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,111 UART: [state] Locking ICCM
5,385,745 UART: [exit] Launching FMC @ 0x40000000
5,391,042 UART:
5,391,058 UART: Running Caliptra FMC ...
5,391,466 UART:
5,391,688 UART: [fmc] Received command: 0x10000000
5,393,857 >>> mbox cmd response data (224 bytes)
5,393,858 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,393,887 UART: [fmc] Received command: 0x10000006
5,411,904 >>> mbox cmd response data (1536 bytes)
5,411,905 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,411,933 UART: [fmc] Received command: 0x10000007
5,412,725 >>> mbox cmd response data (4 bytes)
5,412,726 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,412,754 UART: [fmc] Received command: 0x10000006
5,430,771 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,358 >>> mbox cmd response: success
2,646,272 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,275 UART:
2,652,291 UART: Running Caliptra FMC ...
2,652,699 UART:
2,652,929 UART: [fmc] Received command: 0x10000000
2,655,098 >>> mbox cmd response data (224 bytes)
2,655,099 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,128 UART: [fmc] Received command: 0x10000006
2,673,145 >>> mbox cmd response data (1536 bytes)
2,673,146 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,673,174 UART: [fmc] Received command: 0x46574C44
5,076,191 >>> mbox cmd response: success
5,083,765 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,167 UART:
5,089,183 UART: Running Caliptra FMC ...
5,089,591 UART:
5,089,813 UART: [fmc] Received command: 0x10000000
5,091,982 >>> mbox cmd response data (224 bytes)
5,091,983 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,012 UART: [fmc] Received command: 0x10000006
5,110,029 >>> mbox cmd response data (1536 bytes)
5,110,030 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,058 UART: [fmc] Received command: 0x10000007
5,110,850 >>> mbox cmd response data (4 bytes)
5,110,851 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,110,879 UART: [fmc] Received command: 0x10000006
5,128,896 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,170,277 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,209,016 UART: [ldev] ++
1,209,184 UART: [ldev] CDI.KEYID = 6
1,209,548 UART: [ldev] SUBJECT.KEYID = 5
1,209,975 UART: [ldev] AUTHORITY.KEYID = 7
1,210,438 UART: [ldev] FE.KEYID = 1
1,215,828 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,394 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,387 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,580,006 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,591 >>> mbox cmd response: success
2,742,654 UART: [afmc] ++
2,742,822 UART: [afmc] CDI.KEYID = 6
2,743,185 UART: [afmc] SUBJECT.KEYID = 7
2,743,611 UART: [afmc] AUTHORITY.KEYID = 5
2,779,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,206 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,801,926 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,807,818 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,813,512 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,821,217 UART: [afmc] --
2,822,253 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,275 UART: [cold-reset] --
2,822,915 UART: [state] Locking Datavault
2,824,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,782 UART: [state] Locking ICCM
2,825,392 UART: [exit] Launching FMC @ 0x40000000
2,830,689 UART:
2,830,705 UART: Running Caliptra FMC ...
2,831,113 UART:
2,831,343 UART: [fmc] Received command: 0x10000000
2,833,512 >>> mbox cmd response data (224 bytes)
2,833,513 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,833,542 UART: [fmc] Received command: 0x10000006
2,851,559 >>> mbox cmd response data (1536 bytes)
2,851,560 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,851,588 UART: [fmc] Received command: 0x46574C44
2,852,414 UART:
2,852,430 UART: Running Caliptra ROM ...
2,852,838 UART:
2,852,893 UART: [state] CFI Enabled
2,855,569 UART: [state] LifecycleState = Unprovisioned
2,856,224 UART: [state] DebugLocked = No
2,856,744 UART: [state] WD Timer not started. Device not locked for debugging
2,857,874 UART: [kat] SHA2-256
3,661,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,553 UART: [kat] ++
3,665,705 UART: [kat] sha1
3,670,133 UART: [kat] SHA2-256
3,672,073 UART: [kat] SHA2-384
3,674,828 UART: [kat] SHA2-512-ACC
3,676,728 UART: [kat] ECC-384
3,686,169 UART: [kat] HMAC-384Kdf
3,690,817 UART: [kat] LMS
3,939,129 UART: [kat] --
3,940,049 UART: [update-reset] ++
5,223,366 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,224,469 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,372,523 >>> mbox cmd response: success
5,372,756 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,770 UART: [update-reset Success] --
5,381,179 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,381,727 UART: [state] Locking Datavault
5,382,701 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,305 UART: [state] Locking ICCM
5,383,827 UART: [exit] Launching FMC @ 0x40000000
5,389,124 UART:
5,389,140 UART: Running Caliptra FMC ...
5,389,548 UART:
5,389,770 UART: [fmc] Received command: 0x10000000
5,391,939 >>> mbox cmd response data (224 bytes)
5,391,940 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,391,969 UART: [fmc] Received command: 0x10000006
5,409,986 >>> mbox cmd response data (1536 bytes)
5,409,987 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,410,015 UART: [fmc] Received command: 0x10000007
5,410,807 >>> mbox cmd response data (4 bytes)
5,410,808 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,410,836 UART: [fmc] Received command: 0x10000006
5,428,853 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,735 >>> mbox cmd response: success
2,646,309 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,588 UART:
2,652,604 UART: Running Caliptra FMC ...
2,653,012 UART:
2,653,242 UART: [fmc] Received command: 0x10000000
2,655,411 >>> mbox cmd response data (224 bytes)
2,655,412 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,441 UART: [fmc] Received command: 0x10000006
2,673,458 >>> mbox cmd response data (1536 bytes)
2,673,459 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,673,487 UART: [fmc] Received command: 0x46574C44
5,077,115 >>> mbox cmd response: success
5,084,729 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,090,265 UART:
5,090,281 UART: Running Caliptra FMC ...
5,090,689 UART:
5,090,911 UART: [fmc] Received command: 0x10000000
5,093,080 >>> mbox cmd response data (224 bytes)
5,093,081 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,093,110 UART: [fmc] Received command: 0x10000006
5,111,127 >>> mbox cmd response data (1536 bytes)
5,111,128 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,111,156 UART: [fmc] Received command: 0x10000007
5,111,948 >>> mbox cmd response data (4 bytes)
5,111,949 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,111,977 UART: [fmc] Received command: 0x10000006
5,129,994 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,241,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,559 UART: [ldev] --
1,280,917 UART: [fwproc] Wait for Commands...
1,281,596 UART: [fwproc] Recv command 0x46574c44
1,282,329 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,265 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,892 >>> mbox cmd response: success
2,741,105 UART: [afmc] ++
2,741,273 UART: [afmc] CDI.KEYID = 6
2,741,636 UART: [afmc] SUBJECT.KEYID = 7
2,742,062 UART: [afmc] AUTHORITY.KEYID = 5
2,778,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,121 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,841 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,806,733 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,427 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,820,062 UART: [afmc] --
2,820,976 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,998 UART: [cold-reset] --
2,821,772 UART: [state] Locking Datavault
2,822,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,489 UART: [state] Locking ICCM
2,823,947 UART: [exit] Launching FMC @ 0x40000000
2,829,244 UART:
2,829,260 UART: Running Caliptra FMC ...
2,829,668 UART:
2,829,898 UART: [fmc] Received command: 0x10000000
2,832,067 >>> mbox cmd response data (224 bytes)
2,832,068 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,832,097 UART: [fmc] Received command: 0x10000006
2,850,114 >>> mbox cmd response data (1536 bytes)
2,850,115 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,850,143 UART: [fmc] Received command: 0x46574C44
2,850,969 UART:
2,850,985 UART: Running Caliptra ROM ...
2,851,393 UART:
2,851,535 UART: [state] CFI Enabled
2,854,507 UART: [state] LifecycleState = Unprovisioned
2,855,162 UART: [state] DebugLocked = No
2,855,742 UART: [state] WD Timer not started. Device not locked for debugging
2,856,994 UART: [kat] SHA2-256
3,660,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,673 UART: [kat] ++
3,664,825 UART: [kat] sha1
3,668,959 UART: [kat] SHA2-256
3,670,899 UART: [kat] SHA2-384
3,673,438 UART: [kat] SHA2-512-ACC
3,675,338 UART: [kat] ECC-384
3,684,825 UART: [kat] HMAC-384Kdf
3,689,429 UART: [kat] LMS
3,937,741 UART: [kat] --
3,938,613 UART: [update-reset] ++
5,222,488 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,223,577 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,371,631 >>> mbox cmd response: success
5,371,932 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,946 UART: [update-reset Success] --
5,380,355 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,381,017 UART: [state] Locking Datavault
5,381,745 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,349 UART: [state] Locking ICCM
5,382,959 UART: [exit] Launching FMC @ 0x40000000
5,388,256 UART:
5,388,272 UART: Running Caliptra FMC ...
5,388,680 UART:
5,388,902 UART: [fmc] Received command: 0x10000000
5,391,071 >>> mbox cmd response data (224 bytes)
5,391,072 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,391,101 UART: [fmc] Received command: 0x10000006
5,409,118 >>> mbox cmd response data (1536 bytes)
5,409,119 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,409,147 UART: [fmc] Received command: 0x10000007
5,409,939 >>> mbox cmd response data (4 bytes)
5,409,940 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,968 UART: [fmc] Received command: 0x10000006
5,427,985 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,512 >>> mbox cmd response: success
2,647,680 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,893 UART:
2,653,909 UART: Running Caliptra FMC ...
2,654,317 UART:
2,654,547 UART: [fmc] Received command: 0x10000000
2,656,716 >>> mbox cmd response data (224 bytes)
2,656,717 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,656,746 UART: [fmc] Received command: 0x10000006
2,674,763 >>> mbox cmd response data (1536 bytes)
2,674,764 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,674,792 UART: [fmc] Received command: 0x46574C44
5,077,067 >>> mbox cmd response: success
5,084,619 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,090,451 UART:
5,090,467 UART: Running Caliptra FMC ...
5,090,875 UART:
5,091,097 UART: [fmc] Received command: 0x10000000
5,093,266 >>> mbox cmd response data (224 bytes)
5,093,267 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,093,296 UART: [fmc] Received command: 0x10000006
5,111,313 >>> mbox cmd response data (1536 bytes)
5,111,314 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,111,342 UART: [fmc] Received command: 0x10000007
5,112,134 >>> mbox cmd response data (4 bytes)
5,112,135 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,112,163 UART: [fmc] Received command: 0x10000006
5,130,180 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,321 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,787 UART: [idev] Sha1 KeyId Algorithm
1,207,535 UART: [idev] --
1,208,464 UART: [ldev] ++
1,208,632 UART: [ldev] CDI.KEYID = 6
1,208,996 UART: [ldev] SUBJECT.KEYID = 5
1,209,423 UART: [ldev] AUTHORITY.KEYID = 7
1,209,886 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,346 UART: [ldev] --
1,280,776 UART: [fwproc] Wait for Commands...
1,281,477 UART: [fwproc] Recv command 0x46574c44
1,282,210 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,296 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,901 >>> mbox cmd response: success
2,741,076 UART: [afmc] ++
2,741,244 UART: [afmc] CDI.KEYID = 6
2,741,607 UART: [afmc] SUBJECT.KEYID = 7
2,742,033 UART: [afmc] AUTHORITY.KEYID = 5
2,777,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,692 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,412 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,806,304 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,998 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,995 UART: [afmc] --
2,821,055 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,077 UART: [cold-reset] --
2,821,797 UART: [state] Locking Datavault
2,822,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,432 UART: [state] Locking ICCM
2,823,992 UART: [exit] Launching FMC @ 0x40000000
2,829,289 UART:
2,829,305 UART: Running Caliptra FMC ...
2,829,713 UART:
2,829,943 UART: [fmc] Received command: 0x10000000
2,832,112 >>> mbox cmd response data (224 bytes)
2,832,113 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,832,142 UART: [fmc] Received command: 0x10000006
2,850,159 >>> mbox cmd response data (1536 bytes)
2,850,160 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,850,188 UART: [fmc] Received command: 0x46574C44
2,851,014 UART:
2,851,030 UART: Running Caliptra ROM ...
2,851,438 UART:
2,851,493 UART: [state] CFI Enabled
2,854,229 UART: [state] LifecycleState = Unprovisioned
2,854,884 UART: [state] DebugLocked = No
2,855,582 UART: [state] WD Timer not started. Device not locked for debugging
2,856,832 UART: [kat] SHA2-256
3,660,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,511 UART: [kat] ++
3,664,663 UART: [kat] sha1
3,668,955 UART: [kat] SHA2-256
3,670,895 UART: [kat] SHA2-384
3,673,736 UART: [kat] SHA2-512-ACC
3,675,636 UART: [kat] ECC-384
3,685,219 UART: [kat] HMAC-384Kdf
3,689,683 UART: [kat] LMS
3,937,995 UART: [kat] --
3,938,723 UART: [update-reset] ++
5,222,348 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,223,535 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,371,589 >>> mbox cmd response: success
5,371,744 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,758 UART: [update-reset Success] --
5,380,167 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,380,587 UART: [state] Locking Datavault
5,381,511 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,115 UART: [state] Locking ICCM
5,382,687 UART: [exit] Launching FMC @ 0x40000000
5,387,984 UART:
5,388,000 UART: Running Caliptra FMC ...
5,388,408 UART:
5,388,630 UART: [fmc] Received command: 0x10000000
5,390,799 >>> mbox cmd response data (224 bytes)
5,390,800 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,390,829 UART: [fmc] Received command: 0x10000006
5,408,846 >>> mbox cmd response data (1536 bytes)
5,408,847 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,408,875 UART: [fmc] Received command: 0x10000007
5,409,667 >>> mbox cmd response data (4 bytes)
5,409,668 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,409,696 UART: [fmc] Received command: 0x10000006
5,427,713 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,163 >>> mbox cmd response: success
2,648,031 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,654,208 UART:
2,654,224 UART: Running Caliptra FMC ...
2,654,632 UART:
2,654,862 UART: [fmc] Received command: 0x10000000
2,657,031 >>> mbox cmd response data (224 bytes)
2,657,032 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,657,061 UART: [fmc] Received command: 0x10000006
2,675,078 >>> mbox cmd response data (1536 bytes)
2,675,079 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,675,107 UART: [fmc] Received command: 0x46574C44
5,077,951 >>> mbox cmd response: success
5,085,531 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,091,405 UART:
5,091,421 UART: Running Caliptra FMC ...
5,091,829 UART:
5,092,051 UART: [fmc] Received command: 0x10000000
5,094,220 >>> mbox cmd response data (224 bytes)
5,094,221 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,094,250 UART: [fmc] Received command: 0x10000006
5,112,267 >>> mbox cmd response data (1536 bytes)
5,112,268 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,112,296 UART: [fmc] Received command: 0x10000007
5,113,088 >>> mbox cmd response data (4 bytes)
5,113,089 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,113,117 UART: [fmc] Received command: 0x10000006
5,131,134 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,198,254 UART: [idev] Sha1 KeyId Algorithm
1,207,234 UART: [idev] --
1,208,137 UART: [ldev] ++
1,208,305 UART: [ldev] CDI.KEYID = 6
1,208,669 UART: [ldev] SUBJECT.KEYID = 5
1,209,096 UART: [ldev] AUTHORITY.KEYID = 7
1,209,559 UART: [ldev] FE.KEYID = 1
1,214,649 UART: [ldev] Erasing FE.KEYID = 1
1,239,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,885 UART: [ldev] --
1,279,177 UART: [fwproc] Wait for Commands...
1,279,776 UART: [fwproc] Recv command 0x46574c44
1,280,509 UART: [fwproc] Recv'd Img size: 111944 bytes
2,550,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,027 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,738,664 >>> mbox cmd response: success
2,739,827 UART: [afmc] ++
2,739,995 UART: [afmc] CDI.KEYID = 6
2,740,358 UART: [afmc] SUBJECT.KEYID = 7
2,740,784 UART: [afmc] AUTHORITY.KEYID = 5
2,776,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,231 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,798,951 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,804,843 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,810,537 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,818,412 UART: [afmc] --
2,819,504 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,526 UART: [cold-reset] --
2,820,546 UART: [state] Locking Datavault
2,821,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,917 UART: [state] Locking ICCM
2,822,419 UART: [exit] Launching FMC @ 0x40000000
2,827,716 UART:
2,827,732 UART: Running Caliptra FMC ...
2,828,140 UART:
2,828,370 UART: [fmc] Received command: 0x10000000
2,830,539 >>> mbox cmd response data (224 bytes)
2,830,540 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,830,569 UART: [fmc] Received command: 0x10000006
2,848,586 >>> mbox cmd response data (1536 bytes)
2,848,587 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,848,615 UART: [fmc] Received command: 0x46574C44
2,849,441 UART:
2,849,457 UART: Running Caliptra ROM ...
2,849,865 UART:
2,850,007 UART: [state] CFI Enabled
2,852,511 UART: [state] LifecycleState = Unprovisioned
2,853,166 UART: [state] DebugLocked = No
2,853,658 UART: [state] WD Timer not started. Device not locked for debugging
2,854,776 UART: [kat] SHA2-256
3,658,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,455 UART: [kat] ++
3,662,607 UART: [kat] sha1
3,666,859 UART: [kat] SHA2-256
3,668,799 UART: [kat] SHA2-384
3,671,368 UART: [kat] SHA2-512-ACC
3,673,268 UART: [kat] ECC-384
3,683,093 UART: [kat] HMAC-384Kdf
3,687,679 UART: [kat] LMS
3,935,991 UART: [kat] --
3,936,959 UART: [update-reset] ++
5,219,794 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,220,945 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,368,999 >>> mbox cmd response: success
5,369,244 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,258 UART: [update-reset Success] --
5,377,667 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,378,277 UART: [state] Locking Datavault
5,379,087 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,691 UART: [state] Locking ICCM
5,380,215 UART: [exit] Launching FMC @ 0x40000000
5,385,512 UART:
5,385,528 UART: Running Caliptra FMC ...
5,385,936 UART:
5,386,158 UART: [fmc] Received command: 0x10000000
5,388,327 >>> mbox cmd response data (224 bytes)
5,388,328 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,388,357 UART: [fmc] Received command: 0x10000006
5,406,374 >>> mbox cmd response data (1536 bytes)
5,406,375 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,406,403 UART: [fmc] Received command: 0x10000007
5,407,195 >>> mbox cmd response data (4 bytes)
5,407,196 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,407,224 UART: [fmc] Received command: 0x10000006
5,425,241 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,910 >>> mbox cmd response: success
2,647,976 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,987 UART:
2,654,003 UART: Running Caliptra FMC ...
2,654,411 UART:
2,654,641 UART: [fmc] Received command: 0x10000000
2,656,810 >>> mbox cmd response data (224 bytes)
2,656,811 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,656,840 UART: [fmc] Received command: 0x10000006
2,674,857 >>> mbox cmd response data (1536 bytes)
2,674,858 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,674,886 UART: [fmc] Received command: 0x46574C44
5,077,437 >>> mbox cmd response: success
5,085,077 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,090,797 UART:
5,090,813 UART: Running Caliptra FMC ...
5,091,221 UART:
5,091,443 UART: [fmc] Received command: 0x10000000
5,093,612 >>> mbox cmd response data (224 bytes)
5,093,613 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,093,642 UART: [fmc] Received command: 0x10000006
5,111,659 >>> mbox cmd response data (1536 bytes)
5,111,660 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,111,688 UART: [fmc] Received command: 0x10000007
5,112,480 >>> mbox cmd response data (4 bytes)
5,112,481 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,112,509 UART: [fmc] Received command: 0x10000006
5,130,526 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,055,573 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,196,858 UART:
2,197,255 UART: Running Caliptra ROM ...
2,198,339 UART:
2,198,497 UART: [state] CFI Enabled
2,199,489 UART: [state] LifecycleState = Unprovisioned
2,201,139 UART: [state] DebugLocked = No
2,202,248 UART: [state] WD Timer not started. Device not locked for debugging
2,204,723 UART: [kat] SHA2-256
2,205,408 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,439 UART: [kat] ++
2,208,893 UART: [kat] sha1
2,209,449 UART: [kat] SHA2-256
2,210,107 UART: [kat] SHA2-384
2,210,765 UART: [kat] SHA2-512-ACC
2,211,609 UART: [kat] ECC-384
3,775,670 UART: [kat] HMAC-384Kdf
3,802,228 UART: [kat] LMS
4,875,390 UART: [kat] --
4,880,083 UART: [cold-reset] ++
4,882,291 UART: [fht] FHT @ 0x50003400
4,893,919 UART: [idev] ++
4,894,595 UART: [idev] CDI.KEYID = 6
4,895,750 UART: [idev] SUBJECT.KEYID = 7
4,896,963 UART: [idev] UDS.KEYID = 0
4,929,778 UART: [idev] Erasing UDS.KEYID = 0
8,241,992 UART: [idev] Sha1 KeyId Algorithm
8,263,995 UART: [idev] --
8,269,398 UART: [ldev] ++
8,269,971 UART: [ldev] CDI.KEYID = 6
8,271,154 UART: [ldev] SUBJECT.KEYID = 5
8,272,479 UART: [ldev] AUTHORITY.KEYID = 7
8,273,668 UART: [ldev] FE.KEYID = 1
8,316,669 UART: [ldev] Erasing FE.KEYID = 1
11,650,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,976 UART: [ldev] --
14,035,412 UART: [fwproc] Wait for Commands...
14,038,230 UART: [fwproc] Recv command 0x46574c44
14,040,513 UART: [fwproc] Recv'd Img size: 111600 bytes
18,082,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,155,174 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,215,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,531,974 >>> mbox cmd response: success
18,535,809 UART: [afmc] ++
18,536,401 UART: [afmc] CDI.KEYID = 6
18,537,586 UART: [afmc] SUBJECT.KEYID = 7
18,538,742 UART: [afmc] AUTHORITY.KEYID = 5
21,904,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,203,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,205,335 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,221,424 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,237,504 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,253,422 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,276,907 UART: [afmc] --
24,281,247 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,281,629 UART: [cold-reset] --
24,285,093 UART: [state] Locking Datavault
24,291,102 UART: [state] Locking PCR0, PCR1 and PCR31
24,292,751 UART: [state] Locking ICCM
24,294,362 UART: [exit] Launching FMC @ 0x40000000
24,302,978 UART:
24,303,209 UART: Running Caliptra FMC ...
24,304,306 UART:
24,304,475 UART: [fmc] Received command: 0x10000000
24,306,914 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,059,567 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,299,365 >>> mbox cmd response: success
23,977,592 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,994,424 UART:
23,994,753 UART: Running Caliptra FMC ...
23,995,919 UART:
23,996,088 UART: [fmc] Received command: 0x10000000
23,998,383 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
2,061,249 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,202,527 UART:
2,202,953 UART: Running Caliptra ROM ...
2,204,123 UART:
2,204,285 UART: [state] CFI Enabled
2,205,260 UART: [state] LifecycleState = Unprovisioned
2,206,899 UART: [state] DebugLocked = No
2,208,011 UART: [state] WD Timer not started. Device not locked for debugging
2,210,484 UART: [kat] SHA2-256
2,211,145 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,150 UART: [kat] ++
2,214,596 UART: [kat] sha1
2,215,205 UART: [kat] SHA2-256
2,215,865 UART: [kat] SHA2-384
2,216,515 UART: [kat] SHA2-512-ACC
2,217,387 UART: [kat] ECC-384
4,100,227 UART: [kat] HMAC-384Kdf
4,112,258 UART: [kat] LMS
5,185,366 UART: [kat] --
5,190,526 UART: [cold-reset] ++
5,191,738 UART: [fht] FHT @ 0x50003400
5,202,643 UART: [idev] ++
5,203,199 UART: [idev] CDI.KEYID = 6
5,204,363 UART: [idev] SUBJECT.KEYID = 7
5,205,836 UART: [idev] UDS.KEYID = 0
5,223,999 UART: [idev] Erasing UDS.KEYID = 0
8,499,025 UART: [idev] Sha1 KeyId Algorithm
8,519,796 UART: [idev] --
8,523,756 UART: [ldev] ++
8,524,382 UART: [ldev] CDI.KEYID = 6
8,525,560 UART: [ldev] SUBJECT.KEYID = 5
8,527,040 UART: [ldev] AUTHORITY.KEYID = 7
8,528,601 UART: [ldev] FE.KEYID = 1
8,539,189 UART: [ldev] Erasing FE.KEYID = 1
11,831,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,516 UART: [ldev] --
14,198,838 UART: [fwproc] Wait for Commands...
14,201,848 UART: [fwproc] Recv command 0x46574c44
14,204,166 UART: [fwproc] Recv'd Img size: 111600 bytes
18,244,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,316,106 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,376,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,693,755 >>> mbox cmd response: success
18,697,225 UART: [afmc] ++
18,697,812 UART: [afmc] CDI.KEYID = 6
18,698,994 UART: [afmc] SUBJECT.KEYID = 7
18,700,154 UART: [afmc] AUTHORITY.KEYID = 5
22,020,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,312,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,314,605 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,330,698 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,346,746 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,362,634 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,386,832 UART: [afmc] --
24,389,506 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,389,919 UART: [cold-reset] --
24,392,919 UART: [state] Locking Datavault
24,400,164 UART: [state] Locking PCR0, PCR1 and PCR31
24,401,806 UART: [state] Locking ICCM
24,404,604 UART: [exit] Launching FMC @ 0x40000000
24,413,217 UART:
24,413,444 UART: Running Caliptra FMC ...
24,414,537 UART:
24,414,701 UART: [fmc] Received command: 0x10000000
24,417,179 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,066,513 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,497,682 >>> mbox cmd response: success
24,117,463 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,134,409 UART:
24,134,742 UART: Running Caliptra FMC ...
24,135,908 UART:
24,136,087 UART: [fmc] Received command: 0x10000000
24,138,338 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
2,056,149 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,197,704 UART:
2,198,120 UART: Running Caliptra ROM ...
2,199,216 UART:
2,199,373 UART: [state] CFI Enabled
2,200,363 UART: [state] LifecycleState = Unprovisioned
2,202,006 UART: [state] DebugLocked = No
2,203,043 UART: [state] WD Timer not started. Device not locked for debugging
2,205,512 UART: [kat] SHA2-256
2,206,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,221 UART: [kat] ++
2,209,668 UART: [kat] sha1
2,210,182 UART: [kat] SHA2-256
2,210,839 UART: [kat] SHA2-384
2,211,494 UART: [kat] SHA2-512-ACC
2,212,566 UART: [kat] ECC-384
2,949,512 UART: [kat] HMAC-384Kdf
2,972,748 UART: [kat] LMS
3,502,210 UART: [kat] --
3,506,247 UART: [cold-reset] ++
3,508,826 UART: [fht] FHT @ 0x50003400
3,520,134 UART: [idev] ++
3,520,698 UART: [idev] CDI.KEYID = 6
3,521,607 UART: [idev] SUBJECT.KEYID = 7
3,522,824 UART: [idev] UDS.KEYID = 0
3,546,000 UART: [idev] Erasing UDS.KEYID = 0
6,026,241 UART: [idev] Sha1 KeyId Algorithm
6,049,718 UART: [idev] --
6,053,771 UART: [ldev] ++
6,054,380 UART: [ldev] CDI.KEYID = 6
6,055,270 UART: [ldev] SUBJECT.KEYID = 5
6,056,378 UART: [ldev] AUTHORITY.KEYID = 7
6,057,683 UART: [ldev] FE.KEYID = 1
6,102,283 UART: [ldev] Erasing FE.KEYID = 1
8,607,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,144 UART: [ldev] --
10,417,599 UART: [fwproc] Wait for Commands...
10,419,067 UART: [fwproc] Recv command 0x46574c44
10,421,122 UART: [fwproc] Recv'd Img size: 111944 bytes
13,788,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,859,823 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,920,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,237,769 >>> mbox cmd response: success
14,242,417 UART: [afmc] ++
14,243,019 UART: [afmc] CDI.KEYID = 6
14,243,934 UART: [afmc] SUBJECT.KEYID = 7
14,245,095 UART: [afmc] AUTHORITY.KEYID = 5
16,769,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,493,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,495,117 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,511,099 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,527,075 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,542,845 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,566,196 UART: [afmc] --
18,570,670 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,571,042 UART: [cold-reset] --
18,573,910 UART: [state] Locking Datavault
18,577,864 UART: [state] Locking PCR0, PCR1 and PCR31
18,579,506 UART: [state] Locking ICCM
18,580,812 UART: [exit] Launching FMC @ 0x40000000
18,589,212 UART:
18,589,455 UART: Running Caliptra FMC ...
18,590,482 UART:
18,590,627 UART: [fmc] Received command: 0x10000000
18,593,142 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,069,274 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,211,148 UART:
2,211,573 UART: Running Caliptra ROM ...
2,212,762 UART:
2,212,938 UART: [state] CFI Enabled
2,213,938 UART: [state] LifecycleState = Unprovisioned
2,215,590 UART: [state] DebugLocked = No
2,216,700 UART: [state] WD Timer not started. Device not locked for debugging
2,219,182 UART: [kat] SHA2-256
2,219,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,222,864 UART: [kat] ++
2,223,315 UART: [kat] sha1
2,223,873 UART: [kat] SHA2-256
2,224,575 UART: [kat] SHA2-384
2,225,232 UART: [kat] SHA2-512-ACC
2,226,030 UART: [kat] ECC-384
2,939,028 UART: [kat] HMAC-384Kdf
2,963,249 UART: [kat] LMS
3,492,675 UART: [kat] --
3,496,560 UART: [cold-reset] ++
3,498,918 UART: [fht] FHT @ 0x50003400
3,510,776 UART: [idev] ++
3,511,344 UART: [idev] CDI.KEYID = 6
3,512,227 UART: [idev] SUBJECT.KEYID = 7
3,513,438 UART: [idev] UDS.KEYID = 0
3,536,279 UART: [idev] Erasing UDS.KEYID = 0
6,015,453 UART: [idev] Sha1 KeyId Algorithm
6,038,663 UART: [idev] --
6,042,991 UART: [ldev] ++
6,043,568 UART: [ldev] CDI.KEYID = 6
6,044,481 UART: [ldev] SUBJECT.KEYID = 5
6,045,645 UART: [ldev] AUTHORITY.KEYID = 7
6,046,947 UART: [ldev] FE.KEYID = 1
6,092,707 UART: [ldev] Erasing FE.KEYID = 1
8,596,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,162 UART: [ldev] --
10,404,078 UART: [fwproc] Wait for Commands...
10,406,393 UART: [fwproc] Recv command 0x46574c44
10,408,491 UART: [fwproc] Recv'd Img size: 111944 bytes
13,786,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,858,516 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,918,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,236,320 >>> mbox cmd response: success
14,240,164 UART: [afmc] ++
14,240,756 UART: [afmc] CDI.KEYID = 6
14,241,665 UART: [afmc] SUBJECT.KEYID = 7
14,242,881 UART: [afmc] AUTHORITY.KEYID = 5
16,777,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,499,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,501,492 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,517,486 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,533,420 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,549,175 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,570,952 UART: [afmc] --
18,574,937 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,575,360 UART: [cold-reset] --
18,579,959 UART: [state] Locking Datavault
18,585,210 UART: [state] Locking PCR0, PCR1 and PCR31
18,586,862 UART: [state] Locking ICCM
18,589,610 UART: [exit] Launching FMC @ 0x40000000
18,598,004 UART:
18,598,242 UART: Running Caliptra FMC ...
18,599,338 UART:
18,599,500 UART: [fmc] Received command: 0x10000000
18,601,906 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
2,055,949 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,011,257 >>> mbox cmd response: success
18,287,053 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,300,109 UART:
18,300,461 UART: Running Caliptra FMC ...
18,301,636 UART:
18,301,801 UART: [fmc] Received command: 0x10000000
18,304,079 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
2,061,144 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,202,791 UART:
2,203,223 UART: Running Caliptra ROM ...
2,204,418 UART:
2,204,588 UART: [state] CFI Enabled
2,205,567 UART: [state] LifecycleState = Unprovisioned
2,207,212 UART: [state] DebugLocked = No
2,208,315 UART: [state] WD Timer not started. Device not locked for debugging
2,210,783 UART: [kat] SHA2-256
2,211,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,457 UART: [kat] ++
2,214,910 UART: [kat] sha1
2,215,422 UART: [kat] SHA2-256
2,216,159 UART: [kat] SHA2-384
2,216,825 UART: [kat] SHA2-512-ACC
2,217,675 UART: [kat] ECC-384
3,284,568 UART: [kat] HMAC-384Kdf
3,296,194 UART: [kat] LMS
3,825,727 UART: [kat] --
3,829,669 UART: [cold-reset] ++
3,830,769 UART: [fht] FHT @ 0x50003400
3,841,748 UART: [idev] ++
3,842,312 UART: [idev] CDI.KEYID = 6
3,843,219 UART: [idev] SUBJECT.KEYID = 7
3,844,429 UART: [idev] UDS.KEYID = 0
3,862,295 UART: [idev] Erasing UDS.KEYID = 0
6,314,398 UART: [idev] Sha1 KeyId Algorithm
6,338,587 UART: [idev] --
6,343,709 UART: [ldev] ++
6,344,277 UART: [ldev] CDI.KEYID = 6
6,345,184 UART: [ldev] SUBJECT.KEYID = 5
6,346,342 UART: [ldev] AUTHORITY.KEYID = 7
6,347,628 UART: [ldev] FE.KEYID = 1
6,358,596 UART: [ldev] Erasing FE.KEYID = 1
8,835,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,932 UART: [ldev] --
10,623,684 UART: [fwproc] Wait for Commands...
10,625,183 UART: [fwproc] Recv command 0x46574c44
10,627,286 UART: [fwproc] Recv'd Img size: 111944 bytes
13,987,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,061,616 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,121,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,439,630 >>> mbox cmd response: success
14,443,089 UART: [afmc] ++
14,443,679 UART: [afmc] CDI.KEYID = 6
14,444,589 UART: [afmc] SUBJECT.KEYID = 7
14,445,804 UART: [afmc] AUTHORITY.KEYID = 5
16,941,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,661,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,663,604 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,679,593 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,695,530 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,711,301 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,735,476 UART: [afmc] --
18,738,434 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,738,801 UART: [cold-reset] --
18,741,830 UART: [state] Locking Datavault
18,746,258 UART: [state] Locking PCR0, PCR1 and PCR31
18,747,896 UART: [state] Locking ICCM
18,748,966 UART: [exit] Launching FMC @ 0x40000000
18,757,357 UART:
18,757,595 UART: Running Caliptra FMC ...
18,758,695 UART:
18,758,874 UART: [fmc] Received command: 0x10000000
18,761,306 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
2,065,273 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,231,683 >>> mbox cmd response: success
18,468,475 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,483,610 UART:
18,483,955 UART: Running Caliptra FMC ...
18,485,059 UART:
18,485,211 UART: [fmc] Received command: 0x10000000
18,487,624 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,031 UART: [kat] ++
895,183 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,031 UART: [fht] FHT @ 0x50003400
1,172,629 UART: [idev] ++
1,172,797 UART: [idev] CDI.KEYID = 6
1,173,158 UART: [idev] SUBJECT.KEYID = 7
1,173,583 UART: [idev] UDS.KEYID = 0
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,505 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,215,272 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,982 UART: [ldev] --
1,280,368 UART: [fwproc] Wait for Commands...
1,281,033 UART: [fwproc] Recv command 0x46574c44
1,281,766 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,398 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,065 >>> mbox cmd response: success
2,741,310 UART: [afmc] ++
2,741,478 UART: [afmc] CDI.KEYID = 6
2,741,841 UART: [afmc] SUBJECT.KEYID = 7
2,742,267 UART: [afmc] AUTHORITY.KEYID = 5
2,778,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,489 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,195 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,082 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,801 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,587 UART: [afmc] --
2,821,615 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,637 UART: [cold-reset] --
2,822,487 UART: [state] Locking Datavault
2,823,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,282 UART: [state] Locking ICCM
2,824,780 UART: [exit] Launching FMC @ 0x40000000
2,830,077 UART:
2,830,093 UART: Running Caliptra FMC ...
2,830,501 UART:
2,830,731 UART: [fmc] Received command: 0x10000000
2,832,900 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,667 >>> mbox cmd response: success
2,648,104 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,999 UART:
2,654,015 UART: Running Caliptra FMC ...
2,654,423 UART:
2,654,653 UART: [fmc] Received command: 0x10000000
2,656,822 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,702 UART: [cold-reset] ++
1,170,066 UART: [fht] FHT @ 0x50003400
1,172,664 UART: [idev] ++
1,172,832 UART: [idev] CDI.KEYID = 6
1,173,193 UART: [idev] SUBJECT.KEYID = 7
1,173,618 UART: [idev] UDS.KEYID = 0
1,181,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,096 UART: [idev] --
1,209,255 UART: [ldev] ++
1,209,423 UART: [ldev] CDI.KEYID = 6
1,209,787 UART: [ldev] SUBJECT.KEYID = 5
1,210,214 UART: [ldev] AUTHORITY.KEYID = 7
1,210,677 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,627 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,284,001 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,949 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,494 >>> mbox cmd response: success
2,741,655 UART: [afmc] ++
2,741,823 UART: [afmc] CDI.KEYID = 6
2,742,186 UART: [afmc] SUBJECT.KEYID = 7
2,742,612 UART: [afmc] AUTHORITY.KEYID = 5
2,778,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,146 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,852 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,739 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,813,458 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,158 UART: [afmc] --
2,822,142 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,164 UART: [cold-reset] --
2,822,916 UART: [state] Locking Datavault
2,823,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,409 UART: [state] Locking ICCM
2,825,011 UART: [exit] Launching FMC @ 0x40000000
2,830,308 UART:
2,830,324 UART: Running Caliptra FMC ...
2,830,732 UART:
2,830,962 UART: [fmc] Received command: 0x10000000
2,833,131 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,170 >>> mbox cmd response: success
2,647,929 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,890 UART:
2,653,906 UART: Running Caliptra FMC ...
2,654,314 UART:
2,654,544 UART: [fmc] Received command: 0x10000000
2,656,713 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,350 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,199,421 UART: [idev] Sha1 KeyId Algorithm
1,208,219 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,216,110 UART: [ldev] Erasing FE.KEYID = 1
1,242,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,884 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,283,057 UART: [fwproc] Recv command 0x46574c44
1,283,790 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,304 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,789 >>> mbox cmd response: success
2,741,864 UART: [afmc] ++
2,742,032 UART: [afmc] CDI.KEYID = 6
2,742,395 UART: [afmc] SUBJECT.KEYID = 7
2,742,821 UART: [afmc] AUTHORITY.KEYID = 5
2,778,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,277 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,983 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,870 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,589 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,565 UART: [afmc] --
2,821,507 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,529 UART: [cold-reset] --
2,822,205 UART: [state] Locking Datavault
2,823,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,180 UART: [state] Locking ICCM
2,824,662 UART: [exit] Launching FMC @ 0x40000000
2,829,959 UART:
2,829,975 UART: Running Caliptra FMC ...
2,830,383 UART:
2,830,613 UART: [fmc] Received command: 0x10000000
2,832,782 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,281 >>> mbox cmd response: success
2,646,924 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,507 UART:
2,653,523 UART: Running Caliptra FMC ...
2,653,931 UART:
2,654,161 UART: [fmc] Received command: 0x10000000
2,656,330 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,126 UART: [state] WD Timer not started. Device not locked for debugging
87,371 UART: [kat] SHA2-256
890,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,050 UART: [kat] ++
895,202 UART: [kat] sha1
899,614 UART: [kat] SHA2-256
901,554 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,358 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,241,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,617 UART: [ldev] --
1,280,939 UART: [fwproc] Wait for Commands...
1,281,558 UART: [fwproc] Recv command 0x46574c44
1,282,291 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,451 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,912 >>> mbox cmd response: success
2,742,055 UART: [afmc] ++
2,742,223 UART: [afmc] CDI.KEYID = 6
2,742,586 UART: [afmc] SUBJECT.KEYID = 7
2,743,012 UART: [afmc] AUTHORITY.KEYID = 5
2,778,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,660 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,366 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,253 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,972 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,936 UART: [afmc] --
2,821,984 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,006 UART: [cold-reset] --
2,822,710 UART: [state] Locking Datavault
2,824,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,727 UART: [state] Locking ICCM
2,825,377 UART: [exit] Launching FMC @ 0x40000000
2,830,674 UART:
2,830,690 UART: Running Caliptra FMC ...
2,831,098 UART:
2,831,328 UART: [fmc] Received command: 0x10000000
2,833,497 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,850 >>> mbox cmd response: success
2,646,369 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,750 UART:
2,652,766 UART: Running Caliptra FMC ...
2,653,174 UART:
2,653,404 UART: [fmc] Received command: 0x10000000
2,655,573 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,355 UART: [kat] SHA2-256
901,295 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,416 UART: [kat] HMAC-384Kdf
920,054 UART: [kat] LMS
1,168,366 UART: [kat] --
1,169,221 UART: [cold-reset] ++
1,169,613 UART: [fht] FHT @ 0x50003400
1,172,235 UART: [idev] ++
1,172,403 UART: [idev] CDI.KEYID = 6
1,172,764 UART: [idev] SUBJECT.KEYID = 7
1,173,189 UART: [idev] UDS.KEYID = 0
1,181,135 UART: [idev] Erasing UDS.KEYID = 0
1,198,237 UART: [idev] Sha1 KeyId Algorithm
1,207,115 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,718 UART: [ldev] Erasing FE.KEYID = 1
1,240,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,546 UART: [ldev] --
1,280,064 UART: [fwproc] Wait for Commands...
1,280,665 UART: [fwproc] Recv command 0x46574c44
1,281,398 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,364 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,939 >>> mbox cmd response: success
2,741,182 UART: [afmc] ++
2,741,350 UART: [afmc] CDI.KEYID = 6
2,741,713 UART: [afmc] SUBJECT.KEYID = 7
2,742,139 UART: [afmc] AUTHORITY.KEYID = 5
2,777,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,417 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,123 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,010 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,811,729 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,635 UART: [afmc] --
2,820,737 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,759 UART: [cold-reset] --
2,821,415 UART: [state] Locking Datavault
2,822,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,186 UART: [state] Locking ICCM
2,823,750 UART: [exit] Launching FMC @ 0x40000000
2,829,047 UART:
2,829,063 UART: Running Caliptra FMC ...
2,829,471 UART:
2,829,701 UART: [fmc] Received command: 0x10000000
2,831,870 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,588,825 >>> mbox cmd response: success
2,644,304 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,651 UART:
2,650,667 UART: Running Caliptra FMC ...
2,651,075 UART:
2,651,305 UART: [fmc] Received command: 0x10000000
2,653,474 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,545 UART: [kat] LMS
1,169,857 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,330 UART: [fht] FHT @ 0x50003400
1,174,214 UART: [idev] ++
1,174,382 UART: [idev] CDI.KEYID = 6
1,174,743 UART: [idev] SUBJECT.KEYID = 7
1,175,168 UART: [idev] UDS.KEYID = 0
1,182,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,858 UART: [idev] Sha1 KeyId Algorithm
1,208,882 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,275 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,316 UART: [fwproc] Recv command 0x46574c44
1,284,049 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,579,175 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,628 >>> mbox cmd response: success
2,741,851 UART: [afmc] ++
2,742,019 UART: [afmc] CDI.KEYID = 6
2,742,382 UART: [afmc] SUBJECT.KEYID = 7
2,742,808 UART: [afmc] AUTHORITY.KEYID = 5
2,778,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,128 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,801,834 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,807,721 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,813,440 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,821,228 UART: [afmc] --
2,822,262 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,822,284 UART: [cold-reset] --
2,823,234 UART: [state] Locking Datavault
2,824,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,091 UART: [state] Locking ICCM
2,825,511 UART: [exit] Launching FMC @ 0x40000000
2,830,808 UART:
2,830,824 UART: Running Caliptra FMC ...
2,831,232 UART:
2,831,462 UART: [fmc] Received command: 0x10000000
2,833,631 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,362 >>> mbox cmd response: success
2,647,491 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,653,892 UART:
2,653,908 UART: Running Caliptra FMC ...
2,654,316 UART:
2,654,546 UART: [fmc] Received command: 0x10000000
2,656,715 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,055,723 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,196,984 UART:
2,197,395 UART: Running Caliptra ROM ...
2,198,676 UART:
2,198,854 UART: [state] CFI Enabled
2,199,839 UART: [state] LifecycleState = Unprovisioned
2,201,496 UART: [state] DebugLocked = No
2,202,523 UART: [state] WD Timer not started. Device not locked for debugging
2,205,008 UART: [kat] SHA2-256
2,205,677 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,687 UART: [kat] ++
2,209,136 UART: [kat] sha1
2,209,650 UART: [kat] SHA2-256
2,210,311 UART: [kat] SHA2-384
2,210,968 UART: [kat] SHA2-512-ACC
2,211,800 UART: [kat] ECC-384
3,775,438 UART: [kat] HMAC-384Kdf
3,803,043 UART: [kat] LMS
4,876,177 UART: [kat] --
4,879,628 UART: [cold-reset] ++
4,881,942 UART: [fht] FHT @ 0x50003400
4,893,731 UART: [idev] ++
4,894,402 UART: [idev] CDI.KEYID = 6
4,895,563 UART: [idev] SUBJECT.KEYID = 7
4,896,797 UART: [idev] UDS.KEYID = 0
4,930,970 UART: [idev] Erasing UDS.KEYID = 0
8,245,786 UART: [idev] Sha1 KeyId Algorithm
8,267,776 UART: [idev] --
8,272,307 UART: [ldev] ++
8,272,870 UART: [ldev] CDI.KEYID = 6
8,274,057 UART: [ldev] SUBJECT.KEYID = 5
8,275,238 UART: [ldev] AUTHORITY.KEYID = 7
8,276,389 UART: [ldev] FE.KEYID = 1
8,318,655 UART: [ldev] Erasing FE.KEYID = 1
11,653,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,215 UART: [ldev] --
14,040,161 UART: [fwproc] Wait for Commands...
14,042,815 UART: [fwproc] Recv command 0x46574c44
14,045,136 UART: [fwproc] Recv'd Img size: 111600 bytes
22,422,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,501,839 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,562,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
22,878,983 >>> mbox cmd response: success
22,883,214 UART: [afmc] ++
22,883,911 UART: [afmc] CDI.KEYID = 6
22,885,068 UART: [afmc] SUBJECT.KEYID = 7
22,886,288 UART: [afmc] AUTHORITY.KEYID = 5
26,253,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,549,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,551,576 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,567,728 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,583,856 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,599,816 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,623,334 UART: [afmc] --
28,626,293 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,626,673 UART: [cold-reset] --
28,630,457 UART: [state] Locking Datavault
28,635,058 UART: [state] Locking PCR0, PCR1 and PCR31
28,636,704 UART: [state] Locking ICCM
28,638,043 UART: [exit] Launching FMC @ 0x40000000
28,646,660 UART:
28,646,899 UART: Running Caliptra FMC ...
28,647,999 UART:
28,648,151 UART: [fmc] Received command: 0x10000000
28,650,582 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,056,258 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
22,398,663 >>> mbox cmd response: success
28,073,919 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,088,822 UART:
28,089,157 UART: Running Caliptra FMC ...
28,090,251 UART:
28,090,403 UART: [fmc] Received command: 0x10000000
28,092,738 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
2,062,178 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,203,458 UART:
2,203,878 UART: Running Caliptra ROM ...
2,205,051 UART:
2,205,216 UART: [state] CFI Enabled
2,206,194 UART: [state] LifecycleState = Unprovisioned
2,207,859 UART: [state] DebugLocked = No
2,208,967 UART: [state] WD Timer not started. Device not locked for debugging
2,211,436 UART: [kat] SHA2-256
2,212,100 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,103 UART: [kat] ++
2,215,550 UART: [kat] sha1
2,216,057 UART: [kat] SHA2-256
2,216,723 UART: [kat] SHA2-384
2,217,376 UART: [kat] SHA2-512-ACC
2,218,172 UART: [kat] ECC-384
4,098,431 UART: [kat] HMAC-384Kdf
4,109,982 UART: [kat] LMS
5,183,132 UART: [kat] --
5,187,098 UART: [cold-reset] ++
5,188,829 UART: [fht] FHT @ 0x50003400
5,199,324 UART: [idev] ++
5,200,026 UART: [idev] CDI.KEYID = 6
5,201,133 UART: [idev] SUBJECT.KEYID = 7
5,202,667 UART: [idev] UDS.KEYID = 0
5,218,101 UART: [idev] Erasing UDS.KEYID = 0
8,488,148 UART: [idev] Sha1 KeyId Algorithm
8,509,489 UART: [idev] --
8,513,378 UART: [ldev] ++
8,513,948 UART: [ldev] CDI.KEYID = 6
8,515,178 UART: [ldev] SUBJECT.KEYID = 5
8,516,616 UART: [ldev] AUTHORITY.KEYID = 7
8,518,182 UART: [ldev] FE.KEYID = 1
8,529,517 UART: [ldev] Erasing FE.KEYID = 1
11,816,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,124,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,140,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,156,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,177,659 UART: [ldev] --
14,182,649 UART: [fwproc] Wait for Commands...
14,185,173 UART: [fwproc] Recv command 0x46574c44
14,187,434 UART: [fwproc] Recv'd Img size: 111600 bytes
22,720,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,796,917 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,857,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
23,173,764 >>> mbox cmd response: success
23,177,512 UART: [afmc] ++
23,178,207 UART: [afmc] CDI.KEYID = 6
23,179,446 UART: [afmc] SUBJECT.KEYID = 7
23,180,603 UART: [afmc] AUTHORITY.KEYID = 5
26,498,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,792,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,794,648 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,810,883 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,826,938 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,842,970 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,864,386 UART: [afmc] --
28,867,708 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,868,067 UART: [cold-reset] --
28,872,011 UART: [state] Locking Datavault
28,878,460 UART: [state] Locking PCR0, PCR1 and PCR31
28,880,102 UART: [state] Locking ICCM
28,881,439 UART: [exit] Launching FMC @ 0x40000000
28,890,054 UART:
28,890,284 UART: Running Caliptra FMC ...
28,891,377 UART:
28,891,530 UART: [fmc] Received command: 0x10000000
28,893,985 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
2,061,726 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
22,372,374 >>> mbox cmd response: success
27,993,196 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,009,672 UART:
28,010,016 UART: Running Caliptra FMC ...
28,011,208 UART:
28,011,375 UART: [fmc] Received command: 0x10000000
28,013,598 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
2,057,561 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,199,299 UART:
2,199,721 UART: Running Caliptra ROM ...
2,200,886 UART:
2,201,079 UART: [state] CFI Enabled
2,202,084 UART: [state] LifecycleState = Unprovisioned
2,203,742 UART: [state] DebugLocked = No
2,204,820 UART: [state] WD Timer not started. Device not locked for debugging
2,207,292 UART: [kat] SHA2-256
2,207,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,967 UART: [kat] ++
2,211,476 UART: [kat] sha1
2,212,020 UART: [kat] SHA2-256
2,212,681 UART: [kat] SHA2-384
2,213,340 UART: [kat] SHA2-512-ACC
2,214,158 UART: [kat] ECC-384
2,948,726 UART: [kat] HMAC-384Kdf
2,973,458 UART: [kat] LMS
3,502,935 UART: [kat] --
3,506,592 UART: [cold-reset] ++
3,508,628 UART: [fht] FHT @ 0x50003400
3,519,250 UART: [idev] ++
3,519,819 UART: [idev] CDI.KEYID = 6
3,520,730 UART: [idev] SUBJECT.KEYID = 7
3,522,575 UART: [idev] UDS.KEYID = 0
3,545,272 UART: [idev] Erasing UDS.KEYID = 0
6,027,704 UART: [idev] Sha1 KeyId Algorithm
6,052,142 UART: [idev] --
6,056,467 UART: [ldev] ++
6,057,040 UART: [ldev] CDI.KEYID = 6
6,057,950 UART: [ldev] SUBJECT.KEYID = 5
6,059,114 UART: [ldev] AUTHORITY.KEYID = 7
6,060,350 UART: [ldev] FE.KEYID = 1
6,101,554 UART: [ldev] Erasing FE.KEYID = 1
8,606,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,834 UART: [ldev] --
10,414,325 UART: [fwproc] Wait for Commands...
10,416,422 UART: [fwproc] Recv command 0x46574c44
10,418,467 UART: [fwproc] Recv'd Img size: 111944 bytes
14,944,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,019,748 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,080,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,397,472 >>> mbox cmd response: success
15,401,092 UART: [afmc] ++
15,401,682 UART: [afmc] CDI.KEYID = 6
15,402,566 UART: [afmc] SUBJECT.KEYID = 7
15,403,786 UART: [afmc] AUTHORITY.KEYID = 5
17,942,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,666,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,668,032 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,684,153 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,700,084 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,715,846 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,739,287 UART: [afmc] --
19,742,249 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,742,620 UART: [cold-reset] --
19,746,570 UART: [state] Locking Datavault
19,752,521 UART: [state] Locking PCR0, PCR1 and PCR31
19,754,164 UART: [state] Locking ICCM
19,756,285 UART: [exit] Launching FMC @ 0x40000000
19,764,638 UART:
19,764,916 UART: Running Caliptra FMC ...
19,765,943 UART:
19,766,087 UART: [fmc] Received command: 0x10000000
19,768,602 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,057,181 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,198,693 UART:
2,199,111 UART: Running Caliptra ROM ...
2,200,290 UART:
2,200,462 UART: [state] CFI Enabled
2,201,441 UART: [state] LifecycleState = Unprovisioned
2,203,089 UART: [state] DebugLocked = No
2,204,157 UART: [state] WD Timer not started. Device not locked for debugging
2,206,847 UART: [kat] SHA2-256
2,207,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,544 UART: [kat] ++
2,210,998 UART: [kat] sha1
2,211,556 UART: [kat] SHA2-256
2,212,215 UART: [kat] SHA2-384
2,212,871 UART: [kat] SHA2-512-ACC
2,213,694 UART: [kat] ECC-384
2,951,162 UART: [kat] HMAC-384Kdf
2,974,448 UART: [kat] LMS
3,503,914 UART: [kat] --
3,509,627 UART: [cold-reset] ++
3,512,044 UART: [fht] FHT @ 0x50003400
3,523,890 UART: [idev] ++
3,524,456 UART: [idev] CDI.KEYID = 6
3,525,416 UART: [idev] SUBJECT.KEYID = 7
3,526,572 UART: [idev] UDS.KEYID = 0
3,546,544 UART: [idev] Erasing UDS.KEYID = 0
6,030,586 UART: [idev] Sha1 KeyId Algorithm
6,053,725 UART: [idev] --
6,057,209 UART: [ldev] ++
6,057,792 UART: [ldev] CDI.KEYID = 6
6,058,699 UART: [ldev] SUBJECT.KEYID = 5
6,059,868 UART: [ldev] AUTHORITY.KEYID = 7
6,061,103 UART: [ldev] FE.KEYID = 1
6,102,969 UART: [ldev] Erasing FE.KEYID = 1
8,605,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,558 UART: [ldev] --
10,395,122 UART: [fwproc] Wait for Commands...
10,397,114 UART: [fwproc] Recv command 0x46574c44
10,399,209 UART: [fwproc] Recv'd Img size: 111944 bytes
14,949,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,027,043 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,087,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,405,940 >>> mbox cmd response: success
15,409,387 UART: [afmc] ++
15,409,987 UART: [afmc] CDI.KEYID = 6
15,410,903 UART: [afmc] SUBJECT.KEYID = 7
15,412,084 UART: [afmc] AUTHORITY.KEYID = 5
17,942,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,666,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,668,379 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,684,471 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,700,389 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,716,190 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,738,400 UART: [afmc] --
19,742,767 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,743,134 UART: [cold-reset] --
19,745,948 UART: [state] Locking Datavault
19,751,087 UART: [state] Locking PCR0, PCR1 and PCR31
19,752,799 UART: [state] Locking ICCM
19,755,387 UART: [exit] Launching FMC @ 0x40000000
19,763,786 UART:
19,764,022 UART: Running Caliptra FMC ...
19,765,147 UART:
19,765,310 UART: [fmc] Received command: 0x10000000
19,767,748 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
2,061,741 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,992,516 >>> mbox cmd response: success
19,264,151 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,278,663 UART:
19,278,995 UART: Running Caliptra FMC ...
19,280,081 UART:
19,280,234 UART: [fmc] Received command: 0x10000000
19,282,657 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,060,858 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,202,561 UART:
2,202,971 UART: Running Caliptra ROM ...
2,204,136 UART:
2,204,328 UART: [state] CFI Enabled
2,205,300 UART: [state] LifecycleState = Unprovisioned
2,206,936 UART: [state] DebugLocked = No
2,208,036 UART: [state] WD Timer not started. Device not locked for debugging
2,210,511 UART: [kat] SHA2-256
2,211,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,182 UART: [kat] ++
2,214,653 UART: [kat] sha1
2,215,167 UART: [kat] SHA2-256
2,215,900 UART: [kat] SHA2-384
2,216,563 UART: [kat] SHA2-512-ACC
2,217,402 UART: [kat] ECC-384
3,284,310 UART: [kat] HMAC-384Kdf
3,297,191 UART: [kat] LMS
3,826,686 UART: [kat] --
3,831,054 UART: [cold-reset] ++
3,832,064 UART: [fht] FHT @ 0x50003400
3,843,904 UART: [idev] ++
3,844,462 UART: [idev] CDI.KEYID = 6
3,845,362 UART: [idev] SUBJECT.KEYID = 7
3,846,571 UART: [idev] UDS.KEYID = 0
3,864,429 UART: [idev] Erasing UDS.KEYID = 0
6,321,504 UART: [idev] Sha1 KeyId Algorithm
6,345,493 UART: [idev] --
6,348,712 UART: [ldev] ++
6,349,285 UART: [ldev] CDI.KEYID = 6
6,350,189 UART: [ldev] SUBJECT.KEYID = 5
6,351,347 UART: [ldev] AUTHORITY.KEYID = 7
6,352,629 UART: [ldev] FE.KEYID = 1
6,362,408 UART: [ldev] Erasing FE.KEYID = 1
8,837,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,496 UART: [ldev] --
10,629,671 UART: [fwproc] Wait for Commands...
10,631,162 UART: [fwproc] Recv command 0x46574c44
10,633,248 UART: [fwproc] Recv'd Img size: 111944 bytes
15,165,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,243,207 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,303,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,621,266 >>> mbox cmd response: success
15,625,587 UART: [afmc] ++
15,626,173 UART: [afmc] CDI.KEYID = 6
15,627,084 UART: [afmc] SUBJECT.KEYID = 7
15,628,270 UART: [afmc] AUTHORITY.KEYID = 5
18,125,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,843,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,845,460 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,861,496 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,877,451 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,893,209 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,915,512 UART: [afmc] --
19,918,674 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,919,097 UART: [cold-reset] --
19,922,055 UART: [state] Locking Datavault
19,927,245 UART: [state] Locking PCR0, PCR1 and PCR31
19,928,888 UART: [state] Locking ICCM
19,930,331 UART: [exit] Launching FMC @ 0x40000000
19,938,772 UART:
19,939,038 UART: Running Caliptra FMC ...
19,940,144 UART:
19,940,304 UART: [fmc] Received command: 0x10000000
19,942,680 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,061,764 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
15,229,858 >>> mbox cmd response: success
19,464,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,480,851 UART:
19,481,172 UART: Running Caliptra FMC ...
19,482,328 UART:
19,482,496 UART: [fmc] Received command: 0x10000000
19,484,894 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,214 UART: [ldev] ++
1,208,382 UART: [ldev] CDI.KEYID = 6
1,208,746 UART: [ldev] SUBJECT.KEYID = 5
1,209,173 UART: [ldev] AUTHORITY.KEYID = 7
1,209,636 UART: [ldev] FE.KEYID = 1
1,214,814 UART: [ldev] Erasing FE.KEYID = 1
1,240,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,768 UART: [ldev] --
1,280,114 UART: [fwproc] Wait for Commands...
1,280,725 UART: [fwproc] Recv command 0x46574c44
1,281,458 UART: [fwproc] Recv'd Img size: 111944 bytes
3,091,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,119,905 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,145,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,281,394 >>> mbox cmd response: success
3,282,525 UART: [afmc] ++
3,282,693 UART: [afmc] CDI.KEYID = 6
3,283,056 UART: [afmc] SUBJECT.KEYID = 7
3,283,482 UART: [afmc] AUTHORITY.KEYID = 5
3,318,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,238 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,341,941 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,347,823 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,353,529 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,361,273 UART: [afmc] --
3,362,213 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,235 UART: [cold-reset] --
3,363,193 UART: [state] Locking Datavault
3,364,254 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,858 UART: [state] Locking ICCM
3,365,388 UART: [exit] Launching FMC @ 0x40000000
3,370,685 UART:
3,370,701 UART: Running Caliptra FMC ...
3,371,109 UART:
3,371,339 UART: [fmc] Received command: 0x10000000
3,373,508 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,138,748 >>> mbox cmd response: success
3,195,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,201,302 UART:
3,201,318 UART: Running Caliptra FMC ...
3,201,726 UART:
3,201,956 UART: [fmc] Received command: 0x10000000
3,204,125 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,803 UART: [kat] LMS
1,169,115 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,198,724 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,711 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,802 UART: [fwproc] Recv command 0x46574c44
1,282,535 UART: [fwproc] Recv'd Img size: 111944 bytes
3,105,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,133,580 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,159,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,295,187 >>> mbox cmd response: success
3,296,316 UART: [afmc] ++
3,296,484 UART: [afmc] CDI.KEYID = 6
3,296,847 UART: [afmc] SUBJECT.KEYID = 7
3,297,273 UART: [afmc] AUTHORITY.KEYID = 5
3,333,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,349,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,350,291 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,355,994 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,361,876 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,367,582 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,375,480 UART: [afmc] --
3,376,400 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,376,422 UART: [cold-reset] --
3,377,330 UART: [state] Locking Datavault
3,378,349 UART: [state] Locking PCR0, PCR1 and PCR31
3,378,953 UART: [state] Locking ICCM
3,379,393 UART: [exit] Launching FMC @ 0x40000000
3,384,690 UART:
3,384,706 UART: Running Caliptra FMC ...
3,385,114 UART:
3,385,344 UART: [fmc] Received command: 0x10000000
3,387,513 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,131,272 >>> mbox cmd response: success
3,187,693 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,193,916 UART:
3,193,932 UART: Running Caliptra FMC ...
3,194,340 UART:
3,194,570 UART: [fmc] Received command: 0x10000000
3,196,739 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,170 UART: [ldev] Erasing FE.KEYID = 1
1,241,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,940 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 111944 bytes
3,092,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,251 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,282,838 >>> mbox cmd response: success
3,284,047 UART: [afmc] ++
3,284,215 UART: [afmc] CDI.KEYID = 6
3,284,578 UART: [afmc] SUBJECT.KEYID = 7
3,285,004 UART: [afmc] AUTHORITY.KEYID = 5
3,320,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,337,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,337,888 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,343,591 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,349,473 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,355,179 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,362,983 UART: [afmc] --
3,364,085 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,364,107 UART: [cold-reset] --
3,365,017 UART: [state] Locking Datavault
3,366,348 UART: [state] Locking PCR0, PCR1 and PCR31
3,366,952 UART: [state] Locking ICCM
3,367,454 UART: [exit] Launching FMC @ 0x40000000
3,372,751 UART:
3,372,767 UART: Running Caliptra FMC ...
3,373,175 UART:
3,373,405 UART: [fmc] Received command: 0x10000000
3,375,574 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,132,085 >>> mbox cmd response: success
3,188,036 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,194,207 UART:
3,194,223 UART: Running Caliptra FMC ...
3,194,631 UART:
3,194,861 UART: [fmc] Received command: 0x10000000
3,197,030 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
915,749 UART: [kat] HMAC-384Kdf
920,553 UART: [kat] LMS
1,168,865 UART: [kat] --
1,169,502 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,534 UART: [idev] ++
1,172,702 UART: [idev] CDI.KEYID = 6
1,173,063 UART: [idev] SUBJECT.KEYID = 7
1,173,488 UART: [idev] UDS.KEYID = 0
1,181,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,124 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,417 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,436 UART: [fwproc] Recv command 0x46574c44
1,283,169 UART: [fwproc] Recv'd Img size: 111944 bytes
3,096,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,124,639 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,150,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,286,110 >>> mbox cmd response: success
3,287,257 UART: [afmc] ++
3,287,425 UART: [afmc] CDI.KEYID = 6
3,287,788 UART: [afmc] SUBJECT.KEYID = 7
3,288,214 UART: [afmc] AUTHORITY.KEYID = 5
3,323,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,340,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,341,266 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,346,969 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,352,851 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,358,557 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,366,503 UART: [afmc] --
3,367,557 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,367,579 UART: [cold-reset] --
3,368,469 UART: [state] Locking Datavault
3,369,636 UART: [state] Locking PCR0, PCR1 and PCR31
3,370,240 UART: [state] Locking ICCM
3,370,896 UART: [exit] Launching FMC @ 0x40000000
3,376,193 UART:
3,376,209 UART: Running Caliptra FMC ...
3,376,617 UART:
3,376,847 UART: [fmc] Received command: 0x10000000
3,379,016 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,137,773 >>> mbox cmd response: success
3,193,768 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,161 UART:
3,200,177 UART: Running Caliptra FMC ...
3,200,585 UART:
3,200,815 UART: [fmc] Received command: 0x10000000
3,202,984 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,335 UART: [kat] SHA2-256
901,275 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,618 UART: [kat] HMAC-384Kdf
920,120 UART: [kat] LMS
1,168,432 UART: [kat] --
1,169,145 UART: [cold-reset] ++
1,169,677 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,952 UART: [ldev] --
1,280,364 UART: [fwproc] Wait for Commands...
1,281,123 UART: [fwproc] Recv command 0x46574c44
1,281,856 UART: [fwproc] Recv'd Img size: 111944 bytes
3,100,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,128,538 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,154,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,290,111 >>> mbox cmd response: success
3,291,344 UART: [afmc] ++
3,291,512 UART: [afmc] CDI.KEYID = 6
3,291,875 UART: [afmc] SUBJECT.KEYID = 7
3,292,301 UART: [afmc] AUTHORITY.KEYID = 5
3,327,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,344,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,795 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,350,498 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,356,380 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,362,086 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,369,914 UART: [afmc] --
3,370,786 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,370,808 UART: [cold-reset] --
3,371,574 UART: [state] Locking Datavault
3,372,841 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,445 UART: [state] Locking ICCM
3,374,065 UART: [exit] Launching FMC @ 0x40000000
3,379,362 UART:
3,379,378 UART: Running Caliptra FMC ...
3,379,786 UART:
3,380,016 UART: [fmc] Received command: 0x10000000
3,382,185 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,136,466 >>> mbox cmd response: success
3,192,623 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,198,652 UART:
3,198,668 UART: Running Caliptra FMC ...
3,199,076 UART:
3,199,306 UART: [fmc] Received command: 0x10000000
3,201,475 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,151 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,919 UART: [ldev] --
1,281,415 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 111944 bytes
3,092,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,264 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,282,693 >>> mbox cmd response: success
3,283,836 UART: [afmc] ++
3,284,004 UART: [afmc] CDI.KEYID = 6
3,284,367 UART: [afmc] SUBJECT.KEYID = 7
3,284,793 UART: [afmc] AUTHORITY.KEYID = 5
3,321,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,337,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,338,541 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,344,244 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,350,126 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,355,832 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,363,638 UART: [afmc] --
3,364,570 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,364,592 UART: [cold-reset] --
3,365,490 UART: [state] Locking Datavault
3,366,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,367,193 UART: [state] Locking ICCM
3,367,787 UART: [exit] Launching FMC @ 0x40000000
3,373,084 UART:
3,373,100 UART: Running Caliptra FMC ...
3,373,508 UART:
3,373,738 UART: [fmc] Received command: 0x10000000
3,375,907 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,138,693 >>> mbox cmd response: success
3,194,032 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,015 UART:
3,200,031 UART: Running Caliptra FMC ...
3,200,439 UART:
3,200,669 UART: [fmc] Received command: 0x10000000
3,202,838 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,219,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,243 UART:
2,221,517 UART: Running Caliptra ROM ...
2,222,592 UART:
2,222,745 UART: [state] CFI Enabled
2,223,610 UART: [state] LifecycleState = Unprovisioned
2,225,293 UART: [state] DebugLocked = No
2,226,356 UART: [state] WD Timer not started. Device not locked for debugging
2,228,835 UART: [kat] SHA2-256
2,229,522 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,232,533 UART: [kat] ++
2,233,033 UART: [kat] sha1
2,233,938 UART: [kat] SHA2-256
2,234,610 UART: [kat] SHA2-384
2,235,265 UART: [kat] SHA2-512-ACC
2,236,179 UART: [kat] ECC-384
3,774,623 UART: [kat] HMAC-384Kdf
3,799,936 UART: [kat] LMS
4,873,165 UART: [kat] --
4,876,536 UART: [cold-reset] ++
4,877,885 UART: [fht] FHT @ 0x50003400
4,888,386 UART: [idev] ++
4,889,056 UART: [idev] CDI.KEYID = 6
4,890,296 UART: [idev] SUBJECT.KEYID = 7
4,891,410 UART: [idev] UDS.KEYID = 0
4,928,061 UART: [idev] Erasing UDS.KEYID = 0
8,241,715 UART: [idev] Sha1 KeyId Algorithm
8,263,226 UART: [idev] --
8,266,455 UART: [ldev] ++
8,267,025 UART: [ldev] CDI.KEYID = 6
8,268,184 UART: [ldev] SUBJECT.KEYID = 5
8,269,399 UART: [ldev] AUTHORITY.KEYID = 7
8,270,551 UART: [ldev] FE.KEYID = 1
8,315,475 UART: [ldev] Erasing FE.KEYID = 1
11,649,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,439 UART: [ldev] --
14,038,761 UART: [fwproc] Wait for Commands...
14,041,311 UART: [fwproc] Recv command 0x4d454153
14,050,334 >>> mbox cmd response data (12 bytes)
14,050,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,052,293 UART: [fwproc] Recv command 0x4d454153
14,061,232 >>> mbox cmd response data (12 bytes)
14,061,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,062,501 UART: [fwproc] Recv command 0x4d454153
14,071,422 >>> mbox cmd response data (12 bytes)
14,071,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,072,789 UART: [fwproc] Recv command 0x4d454153
14,081,726 >>> mbox cmd response data (12 bytes)
14,082,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,083,112 UART: [fwproc] Recv command 0x4d454153
14,091,982 >>> mbox cmd response data (12 bytes)
14,092,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,093,890 UART: [fwproc] Recv command 0x4d454153
14,102,777 >>> mbox cmd response data (12 bytes)
14,103,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,104,417 UART: [fwproc] Recv command 0x4d454153
14,113,277 >>> mbox cmd response data (12 bytes)
14,113,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,115,450 UART: [fwproc] Recv command 0x4d454153
14,124,375 >>> mbox cmd response data (12 bytes)
14,126,060 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
14,267,207 UART: [fwproc] Recv command 0x46574c44
14,269,607 UART: [fwproc] Recv'd Img size: 111600 bytes
18,310,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,389,075 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,449,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,766,910 >>> mbox cmd response: success
18,771,007 UART: [afmc] ++
18,771,601 UART: [afmc] CDI.KEYID = 6
18,772,802 UART: [afmc] SUBJECT.KEYID = 7
18,773,961 UART: [afmc] AUTHORITY.KEYID = 5
22,130,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,427,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,430,094 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,446,302 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,462,422 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,478,273 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,501,102 UART: [afmc] --
24,505,032 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,505,389 UART: [cold-reset] --
24,507,178 UART: [state] Locking Datavault
24,512,540 UART: [state] Locking PCR0, PCR1 and PCR31
24,514,185 UART: [state] Locking ICCM
24,515,414 UART: [exit] Launching FMC @ 0x40000000
24,524,045 UART:
24,524,307 UART: Running Caliptra FMC ...
24,525,330 UART:
24,525,478 UART: [fmc] Received command: 0x1000000A
24,532,062 >>> mbox cmd response data (928 bytes)
24,537,278 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,537,711 UART: [fmc] Received command: 0x10000009
24,539,493 >>> mbox cmd response data (48 bytes)
24,541,619 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,542,079 UART: [fmc] Received command: 0x10000003
24,552,003 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,212,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,863,666 >>> mbox cmd response data (12 bytes)
13,864,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,872,475 >>> mbox cmd response data (12 bytes)
13,872,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,880,427 >>> mbox cmd response data (12 bytes)
13,880,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,888,555 >>> mbox cmd response data (12 bytes)
13,888,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,896,109 >>> mbox cmd response data (12 bytes)
13,896,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,904,604 >>> mbox cmd response data (12 bytes)
13,905,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,912,973 >>> mbox cmd response data (12 bytes)
13,913,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,920,676 >>> mbox cmd response data (12 bytes)
13,922,432 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,547,710 >>> mbox cmd response: success
24,221,990 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,237,557 UART:
24,237,893 UART: Running Caliptra FMC ...
24,239,051 UART:
24,239,219 UART: [fmc] Received command: 0x1000000A
24,245,578 >>> mbox cmd response data (928 bytes)
24,250,798 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,251,246 UART: [fmc] Received command: 0x10000009
24,253,039 >>> mbox cmd response data (48 bytes)
24,255,193 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,255,679 UART: [fmc] Received command: 0x10000003
24,265,648 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,220,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,595 UART:
2,221,855 UART: Running Caliptra ROM ...
2,222,940 UART:
2,223,084 UART: [state] CFI Enabled
2,223,949 UART: [state] LifecycleState = Unprovisioned
2,225,622 UART: [state] DebugLocked = No
2,226,736 UART: [state] WD Timer not started. Device not locked for debugging
2,229,213 UART: [kat] SHA2-256
2,230,118 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,233,154 UART: [kat] ++
2,233,600 UART: [kat] sha1
2,234,105 UART: [kat] SHA2-256
2,234,772 UART: [kat] SHA2-384
2,235,518 UART: [kat] SHA2-512-ACC
2,236,323 UART: [kat] ECC-384
4,098,528 UART: [kat] HMAC-384Kdf
4,111,314 UART: [kat] LMS
5,184,492 UART: [kat] --
5,189,634 UART: [cold-reset] ++
5,192,187 UART: [fht] FHT @ 0x50003400
5,203,773 UART: [idev] ++
5,204,509 UART: [idev] CDI.KEYID = 6
5,205,638 UART: [idev] SUBJECT.KEYID = 7
5,207,124 UART: [idev] UDS.KEYID = 0
5,224,799 UART: [idev] Erasing UDS.KEYID = 0
8,498,556 UART: [idev] Sha1 KeyId Algorithm
8,519,198 UART: [idev] --
8,523,193 UART: [ldev] ++
8,523,775 UART: [ldev] CDI.KEYID = 6
8,525,014 UART: [ldev] SUBJECT.KEYID = 5
8,526,443 UART: [ldev] AUTHORITY.KEYID = 7
8,527,999 UART: [ldev] FE.KEYID = 1
8,538,266 UART: [ldev] Erasing FE.KEYID = 1
11,830,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,093 UART: [ldev] --
14,192,814 UART: [fwproc] Wait for Commands...
14,195,719 UART: [fwproc] Recv command 0x4d454153
14,204,738 >>> mbox cmd response data (12 bytes)
14,205,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,206,544 UART: [fwproc] Recv command 0x4d454153
14,215,534 >>> mbox cmd response data (12 bytes)
14,215,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,217,826 UART: [fwproc] Recv command 0x4d454153
14,226,755 >>> mbox cmd response data (12 bytes)
14,227,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,228,916 UART: [fwproc] Recv command 0x4d454153
14,237,821 >>> mbox cmd response data (12 bytes)
14,238,266 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,240,071 UART: [fwproc] Recv command 0x4d454153
14,248,954 >>> mbox cmd response data (12 bytes)
14,249,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,250,149 UART: [fwproc] Recv command 0x4d454153
14,259,071 >>> mbox cmd response data (12 bytes)
14,259,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,260,185 UART: [fwproc] Recv command 0x4d454153
14,269,051 >>> mbox cmd response data (12 bytes)
14,269,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,270,211 UART: [fwproc] Recv command 0x4d454153
14,279,126 >>> mbox cmd response data (12 bytes)
14,280,791 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
14,421,242 UART: [fwproc] Recv command 0x46574c44
14,423,644 UART: [fwproc] Recv'd Img size: 111600 bytes
18,470,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,541,244 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,601,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,919,016 >>> mbox cmd response: success
18,923,958 UART: [afmc] ++
18,924,540 UART: [afmc] CDI.KEYID = 6
18,925,771 UART: [afmc] SUBJECT.KEYID = 7
18,926,869 UART: [afmc] AUTHORITY.KEYID = 5
22,244,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,541,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,543,973 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,560,161 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,576,256 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,592,059 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,613,723 UART: [afmc] --
24,617,588 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,617,929 UART: [cold-reset] --
24,622,462 UART: [state] Locking Datavault
24,630,647 UART: [state] Locking PCR0, PCR1 and PCR31
24,632,362 UART: [state] Locking ICCM
24,634,907 UART: [exit] Launching FMC @ 0x40000000
24,643,529 UART:
24,643,775 UART: Running Caliptra FMC ...
24,644,876 UART:
24,645,032 UART: [fmc] Received command: 0x1000000A
24,651,569 >>> mbox cmd response data (928 bytes)
24,656,835 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,657,280 UART: [fmc] Received command: 0x10000009
24,659,078 >>> mbox cmd response data (48 bytes)
24,661,204 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,661,667 UART: [fmc] Received command: 0x10000003
24,671,595 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
2,215,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,022,365 >>> mbox cmd response data (12 bytes)
14,023,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,031,914 >>> mbox cmd response data (12 bytes)
14,032,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,040,606 >>> mbox cmd response data (12 bytes)
14,041,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,048,738 >>> mbox cmd response data (12 bytes)
14,049,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,056,928 >>> mbox cmd response data (12 bytes)
14,057,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,064,553 >>> mbox cmd response data (12 bytes)
14,064,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,072,179 >>> mbox cmd response data (12 bytes)
14,072,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,080,442 >>> mbox cmd response data (12 bytes)
14,082,212 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,721,225 >>> mbox cmd response: success
24,345,851 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,363,519 UART:
24,363,853 UART: Running Caliptra FMC ...
24,365,007 UART:
24,365,167 UART: [fmc] Received command: 0x1000000A
24,371,561 >>> mbox cmd response data (928 bytes)
24,376,975 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,377,436 UART: [fmc] Received command: 0x10000009
24,379,238 >>> mbox cmd response data (48 bytes)
24,381,394 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,381,849 UART: [fmc] Received command: 0x10000003
24,391,819 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,216,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,588 UART:
2,217,854 UART: Running Caliptra ROM ...
2,218,924 UART:
2,219,077 UART: [state] CFI Enabled
2,219,943 UART: [state] LifecycleState = Unprovisioned
2,221,611 UART: [state] DebugLocked = No
2,222,729 UART: [state] WD Timer not started. Device not locked for debugging
2,225,231 UART: [kat] SHA2-256
2,225,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,228,914 UART: [kat] ++
2,229,366 UART: [kat] sha1
2,229,877 UART: [kat] SHA2-256
2,230,561 UART: [kat] SHA2-384
2,231,218 UART: [kat] SHA2-512-ACC
2,232,040 UART: [kat] ECC-384
2,951,130 UART: [kat] HMAC-384Kdf
2,971,860 UART: [kat] LMS
3,501,326 UART: [kat] --
3,506,882 UART: [cold-reset] ++
3,508,435 UART: [fht] FHT @ 0x50003400
3,519,308 UART: [idev] ++
3,519,875 UART: [idev] CDI.KEYID = 6
3,520,786 UART: [idev] SUBJECT.KEYID = 7
3,522,024 UART: [idev] UDS.KEYID = 0
3,543,896 UART: [idev] Erasing UDS.KEYID = 0
6,024,987 UART: [idev] Sha1 KeyId Algorithm
6,047,688 UART: [idev] --
6,052,049 UART: [ldev] ++
6,052,635 UART: [ldev] CDI.KEYID = 6
6,053,546 UART: [ldev] SUBJECT.KEYID = 5
6,054,768 UART: [ldev] AUTHORITY.KEYID = 7
6,056,004 UART: [ldev] FE.KEYID = 1
6,099,984 UART: [ldev] Erasing FE.KEYID = 1
8,605,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,620 UART: [ldev] --
10,415,534 UART: [fwproc] Wait for Commands...
10,417,208 UART: [fwproc] Recv command 0x4d454153
10,425,746 >>> mbox cmd response data (12 bytes)
10,426,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,427,355 UART: [fwproc] Recv command 0x4d454153
10,435,863 >>> mbox cmd response data (12 bytes)
10,436,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,437,234 UART: [fwproc] Recv command 0x4d454153
10,445,726 >>> mbox cmd response data (12 bytes)
10,446,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,447,031 UART: [fwproc] Recv command 0x4d454153
10,455,469 >>> mbox cmd response data (12 bytes)
10,455,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,457,913 UART: [fwproc] Recv command 0x4d454153
10,466,401 >>> mbox cmd response data (12 bytes)
10,466,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,468,850 UART: [fwproc] Recv command 0x4d454153
10,477,279 >>> mbox cmd response data (12 bytes)
10,477,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,479,286 UART: [fwproc] Recv command 0x4d454153
10,487,772 >>> mbox cmd response data (12 bytes)
10,488,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,488,741 UART: [fwproc] Recv command 0x4d454153
10,497,172 >>> mbox cmd response data (12 bytes)
10,498,878 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
10,640,132 UART: [fwproc] Recv command 0x46574c44
10,642,262 UART: [fwproc] Recv'd Img size: 111944 bytes
14,015,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,562 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,153,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,472,308 >>> mbox cmd response: success
14,477,145 UART: [afmc] ++
14,477,760 UART: [afmc] CDI.KEYID = 6
14,478,673 UART: [afmc] SUBJECT.KEYID = 7
14,479,832 UART: [afmc] AUTHORITY.KEYID = 5
17,020,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,747,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,748,963 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,765,020 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,781,047 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,796,745 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,820,120 UART: [afmc] --
18,823,450 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,823,807 UART: [cold-reset] --
18,826,942 UART: [state] Locking Datavault
18,834,110 UART: [state] Locking PCR0, PCR1 and PCR31
18,835,788 UART: [state] Locking ICCM
18,837,997 UART: [exit] Launching FMC @ 0x40000000
18,846,420 UART:
18,846,665 UART: Running Caliptra FMC ...
18,847,770 UART:
18,847,929 UART: [fmc] Received command: 0x1000000A
18,854,417 >>> mbox cmd response data (928 bytes)
18,859,615 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,860,047 UART: [fmc] Received command: 0x10000009
18,861,857 >>> mbox cmd response data (48 bytes)
18,864,040 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,864,512 UART: [fmc] Received command: 0x10000003
18,874,433 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,221,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,222,758 UART:
2,223,019 UART: Running Caliptra ROM ...
2,224,112 UART:
2,224,259 UART: [state] CFI Enabled
2,225,125 UART: [state] LifecycleState = Unprovisioned
2,226,802 UART: [state] DebugLocked = No
2,227,868 UART: [state] WD Timer not started. Device not locked for debugging
2,230,344 UART: [kat] SHA2-256
2,231,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,234,023 UART: [kat] ++
2,234,475 UART: [kat] sha1
2,235,011 UART: [kat] SHA2-256
2,235,674 UART: [kat] SHA2-384
2,236,332 UART: [kat] SHA2-512-ACC
2,237,131 UART: [kat] ECC-384
2,945,577 UART: [kat] HMAC-384Kdf
2,971,218 UART: [kat] LMS
3,500,698 UART: [kat] --
3,506,255 UART: [cold-reset] ++
3,508,397 UART: [fht] FHT @ 0x50003400
3,519,216 UART: [idev] ++
3,519,779 UART: [idev] CDI.KEYID = 6
3,520,685 UART: [idev] SUBJECT.KEYID = 7
3,521,910 UART: [idev] UDS.KEYID = 0
3,541,888 UART: [idev] Erasing UDS.KEYID = 0
6,024,701 UART: [idev] Sha1 KeyId Algorithm
6,047,413 UART: [idev] --
6,052,733 UART: [ldev] ++
6,053,311 UART: [ldev] CDI.KEYID = 6
6,054,223 UART: [ldev] SUBJECT.KEYID = 5
6,055,388 UART: [ldev] AUTHORITY.KEYID = 7
6,056,626 UART: [ldev] FE.KEYID = 1
6,098,498 UART: [ldev] Erasing FE.KEYID = 1
8,601,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,688 UART: [ldev] --
10,410,545 UART: [fwproc] Wait for Commands...
10,412,589 UART: [fwproc] Recv command 0x4d454153
10,421,111 >>> mbox cmd response data (12 bytes)
10,421,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,423,909 UART: [fwproc] Recv command 0x4d454153
10,432,423 >>> mbox cmd response data (12 bytes)
10,432,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,434,288 UART: [fwproc] Recv command 0x4d454153
10,442,779 >>> mbox cmd response data (12 bytes)
10,443,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,444,042 UART: [fwproc] Recv command 0x4d454153
10,452,535 >>> mbox cmd response data (12 bytes)
10,452,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,110 UART: [fwproc] Recv command 0x4d454153
10,462,538 >>> mbox cmd response data (12 bytes)
10,462,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,462 UART: [fwproc] Recv command 0x4d454153
10,471,941 >>> mbox cmd response data (12 bytes)
10,472,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,473,462 UART: [fwproc] Recv command 0x4d454153
10,481,911 >>> mbox cmd response data (12 bytes)
10,482,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,483,482 UART: [fwproc] Recv command 0x4d454153
10,491,919 >>> mbox cmd response data (12 bytes)
10,493,550 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
10,634,864 UART: [fwproc] Recv command 0x46574c44
10,636,982 UART: [fwproc] Recv'd Img size: 111944 bytes
14,002,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,077,582 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,137,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,456,322 >>> mbox cmd response: success
14,460,801 UART: [afmc] ++
14,461,397 UART: [afmc] CDI.KEYID = 6
14,462,309 UART: [afmc] SUBJECT.KEYID = 7
14,463,473 UART: [afmc] AUTHORITY.KEYID = 5
16,998,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,628 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,741,701 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,757,720 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,773,435 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,796,971 UART: [afmc] --
18,800,896 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,801,240 UART: [cold-reset] --
18,803,025 UART: [state] Locking Datavault
18,810,652 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,305 UART: [state] Locking ICCM
18,813,432 UART: [exit] Launching FMC @ 0x40000000
18,821,778 UART:
18,822,025 UART: Running Caliptra FMC ...
18,823,057 UART:
18,823,205 UART: [fmc] Received command: 0x1000000A
18,829,817 >>> mbox cmd response data (928 bytes)
18,834,856 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,835,291 UART: [fmc] Received command: 0x10000009
18,837,073 >>> mbox cmd response data (48 bytes)
18,839,168 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,839,632 UART: [fmc] Received command: 0x10000003
18,849,572 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,218,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,187,584 >>> mbox cmd response data (12 bytes)
10,188,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,195,784 >>> mbox cmd response data (12 bytes)
10,196,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,204,165 >>> mbox cmd response data (12 bytes)
10,204,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,212,387 >>> mbox cmd response data (12 bytes)
10,212,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,220,496 >>> mbox cmd response data (12 bytes)
10,220,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,227,963 >>> mbox cmd response data (12 bytes)
10,228,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,235,805 >>> mbox cmd response data (12 bytes)
10,236,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,243,969 >>> mbox cmd response data (12 bytes)
10,245,680 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,213,820 >>> mbox cmd response: success
18,479,650 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,495,106 UART:
18,495,432 UART: Running Caliptra FMC ...
18,496,588 UART:
18,496,749 UART: [fmc] Received command: 0x1000000A
18,503,233 >>> mbox cmd response data (928 bytes)
18,508,363 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,508,792 UART: [fmc] Received command: 0x10000009
18,510,591 >>> mbox cmd response data (48 bytes)
18,512,778 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,513,247 UART: [fmc] Received command: 0x10000003
18,523,188 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,226,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,228,169 UART:
2,228,435 UART: Running Caliptra ROM ...
2,229,526 UART:
2,229,676 UART: [state] CFI Enabled
2,230,541 UART: [state] LifecycleState = Unprovisioned
2,232,104 UART: [state] DebugLocked = No
2,233,339 UART: [state] WD Timer not started. Device not locked for debugging
2,235,836 UART: [kat] SHA2-256
2,236,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,239,514 UART: [kat] ++
2,239,978 UART: [kat] sha1
2,240,491 UART: [kat] SHA2-256
2,241,230 UART: [kat] SHA2-384
2,241,919 UART: [kat] SHA2-512-ACC
2,242,799 UART: [kat] ECC-384
3,276,828 UART: [kat] HMAC-384Kdf
3,290,305 UART: [kat] LMS
3,819,758 UART: [kat] --
3,824,448 UART: [cold-reset] ++
3,826,584 UART: [fht] FHT @ 0x50003400
3,837,230 UART: [idev] ++
3,837,794 UART: [idev] CDI.KEYID = 6
3,838,725 UART: [idev] SUBJECT.KEYID = 7
3,839,930 UART: [idev] UDS.KEYID = 0
3,857,984 UART: [idev] Erasing UDS.KEYID = 0
6,313,854 UART: [idev] Sha1 KeyId Algorithm
6,337,247 UART: [idev] --
6,341,186 UART: [ldev] ++
6,341,749 UART: [ldev] CDI.KEYID = 6
6,342,653 UART: [ldev] SUBJECT.KEYID = 5
6,343,860 UART: [ldev] AUTHORITY.KEYID = 7
6,345,088 UART: [ldev] FE.KEYID = 1
6,355,605 UART: [ldev] Erasing FE.KEYID = 1
8,831,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,049 UART: [ldev] --
10,622,785 UART: [fwproc] Wait for Commands...
10,626,017 UART: [fwproc] Recv command 0x4d454153
10,634,544 >>> mbox cmd response data (12 bytes)
10,635,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,637,149 UART: [fwproc] Recv command 0x4d454153
10,645,633 >>> mbox cmd response data (12 bytes)
10,646,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,647,195 UART: [fwproc] Recv command 0x4d454153
10,655,677 >>> mbox cmd response data (12 bytes)
10,656,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,657,971 UART: [fwproc] Recv command 0x4d454153
10,666,393 >>> mbox cmd response data (12 bytes)
10,666,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,667,382 UART: [fwproc] Recv command 0x4d454153
10,675,803 >>> mbox cmd response data (12 bytes)
10,676,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,677,142 UART: [fwproc] Recv command 0x4d454153
10,685,586 >>> mbox cmd response data (12 bytes)
10,686,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,687,273 UART: [fwproc] Recv command 0x4d454153
10,695,706 >>> mbox cmd response data (12 bytes)
10,696,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,698,175 UART: [fwproc] Recv command 0x4d454153
10,706,599 >>> mbox cmd response data (12 bytes)
10,708,284 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
10,850,102 UART: [fwproc] Recv command 0x46574c44
10,852,218 UART: [fwproc] Recv'd Img size: 111944 bytes
14,223,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,296,033 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,356,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,674,994 >>> mbox cmd response: success
14,678,823 UART: [afmc] ++
14,679,416 UART: [afmc] CDI.KEYID = 6
14,680,344 UART: [afmc] SUBJECT.KEYID = 7
14,681,509 UART: [afmc] AUTHORITY.KEYID = 5
17,180,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,899,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,901,893 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,917,974 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,933,986 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,949,656 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,972,446 UART: [afmc] --
18,976,632 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,976,986 UART: [cold-reset] --
18,980,016 UART: [state] Locking Datavault
18,984,990 UART: [state] Locking PCR0, PCR1 and PCR31
18,986,684 UART: [state] Locking ICCM
18,989,316 UART: [exit] Launching FMC @ 0x40000000
18,997,711 UART:
18,997,939 UART: Running Caliptra FMC ...
18,999,037 UART:
18,999,194 UART: [fmc] Received command: 0x1000000A
19,005,740 >>> mbox cmd response data (928 bytes)
19,010,893 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,011,361 UART: [fmc] Received command: 0x10000009
19,013,170 >>> mbox cmd response data (48 bytes)
19,015,332 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,015,797 UART: [fmc] Received command: 0x10000003
19,025,766 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,215,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,398,603 >>> mbox cmd response data (12 bytes)
10,399,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,407,769 >>> mbox cmd response data (12 bytes)
10,408,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,416,250 >>> mbox cmd response data (12 bytes)
10,416,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,137 >>> mbox cmd response data (12 bytes)
10,424,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,116 >>> mbox cmd response data (12 bytes)
10,433,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,440,809 >>> mbox cmd response data (12 bytes)
10,441,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,449,190 >>> mbox cmd response data (12 bytes)
10,449,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,457,461 >>> mbox cmd response data (12 bytes)
10,459,204 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,430,673 >>> mbox cmd response: success
18,669,107 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,684,803 UART:
18,685,137 UART: Running Caliptra FMC ...
18,686,211 UART:
18,686,359 UART: [fmc] Received command: 0x1000000A
18,692,947 >>> mbox cmd response data (928 bytes)
18,698,146 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,698,585 UART: [fmc] Received command: 0x10000009
18,700,347 >>> mbox cmd response data (48 bytes)
18,702,451 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,702,913 UART: [fmc] Received command: 0x10000003
18,712,882 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,016 UART: [kat] LMS
1,169,328 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,182,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,281 UART: [idev] --
1,209,306 UART: [ldev] ++
1,209,474 UART: [ldev] CDI.KEYID = 6
1,209,838 UART: [ldev] SUBJECT.KEYID = 5
1,210,265 UART: [ldev] AUTHORITY.KEYID = 7
1,210,728 UART: [ldev] FE.KEYID = 1
1,216,062 UART: [ldev] Erasing FE.KEYID = 1
1,242,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,250 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x4d454153
1,286,586 >>> mbox cmd response data (12 bytes)
1,286,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,674 UART: [fwproc] Recv command 0x4d454153
1,290,701 >>> mbox cmd response data (12 bytes)
1,290,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,965 UART: [fwproc] Recv command 0x4d454153
1,294,992 >>> mbox cmd response data (12 bytes)
1,294,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,154 UART: [fwproc] Recv command 0x4d454153
1,299,181 >>> mbox cmd response data (12 bytes)
1,299,182 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,313 UART: [fwproc] Recv command 0x4d454153
1,303,340 >>> mbox cmd response data (12 bytes)
1,303,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,416 UART: [fwproc] Recv command 0x4d454153
1,307,443 >>> mbox cmd response data (12 bytes)
1,307,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,737 UART: [fwproc] Recv command 0x4d454153
1,311,764 >>> mbox cmd response data (12 bytes)
1,311,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,912 UART: [fwproc] Recv command 0x4d454153
1,315,939 >>> mbox cmd response data (12 bytes)
1,315,940 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,316,223 UART: [fwproc] Recv command 0x46574c44
1,316,956 UART: [fwproc] Recv'd Img size: 111944 bytes
2,586,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,729 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,284 >>> mbox cmd response: success
2,776,375 UART: [afmc] ++
2,776,543 UART: [afmc] CDI.KEYID = 6
2,776,906 UART: [afmc] SUBJECT.KEYID = 7
2,777,332 UART: [afmc] AUTHORITY.KEYID = 5
2,812,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,716 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,835,412 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,311 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,004 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,854,852 UART: [afmc] --
2,855,724 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,855,746 UART: [cold-reset] --
2,856,518 UART: [state] Locking Datavault
2,857,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,105 UART: [state] Locking ICCM
2,858,771 UART: [exit] Launching FMC @ 0x40000000
2,864,068 UART:
2,864,084 UART: Running Caliptra FMC ...
2,864,492 UART:
2,864,722 UART: [fmc] Received command: 0x1000000A
2,870,953 >>> mbox cmd response data (928 bytes)
2,870,954 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,983 UART: [fmc] Received command: 0x10000009
2,872,181 >>> mbox cmd response data (48 bytes)
2,872,182 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,211 UART: [fmc] Received command: 0x10000003
2,881,667 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,764 >>> mbox cmd response data (12 bytes)
1,138,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,166 >>> mbox cmd response data (12 bytes)
1,142,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,692 >>> mbox cmd response data (12 bytes)
1,145,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,246 >>> mbox cmd response data (12 bytes)
1,149,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,742 >>> mbox cmd response data (12 bytes)
1,152,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,122 >>> mbox cmd response data (12 bytes)
1,156,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,716 >>> mbox cmd response data (12 bytes)
1,159,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,260 >>> mbox cmd response data (12 bytes)
1,163,261 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,617,604 >>> mbox cmd response: success
2,673,841 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,070 UART:
2,680,086 UART: Running Caliptra FMC ...
2,680,494 UART:
2,680,724 UART: [fmc] Received command: 0x1000000A
2,686,955 >>> mbox cmd response data (928 bytes)
2,686,956 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,686,985 UART: [fmc] Received command: 0x10000009
2,688,183 >>> mbox cmd response data (48 bytes)
2,688,184 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,213 UART: [fmc] Received command: 0x10000003
2,697,669 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,681 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,718 UART: [cold-reset] ++
1,171,126 UART: [fht] FHT @ 0x50003400
1,173,916 UART: [idev] ++
1,174,084 UART: [idev] CDI.KEYID = 6
1,174,445 UART: [idev] SUBJECT.KEYID = 7
1,174,870 UART: [idev] UDS.KEYID = 0
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,200,260 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,209,953 UART: [ldev] ++
1,210,121 UART: [ldev] CDI.KEYID = 6
1,210,485 UART: [ldev] SUBJECT.KEYID = 5
1,210,912 UART: [ldev] AUTHORITY.KEYID = 7
1,211,375 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,747 UART: [ldev] --
1,283,151 UART: [fwproc] Wait for Commands...
1,283,834 UART: [fwproc] Recv command 0x4d454153
1,287,861 >>> mbox cmd response data (12 bytes)
1,287,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,025 UART: [fwproc] Recv command 0x4d454153
1,292,052 >>> mbox cmd response data (12 bytes)
1,292,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,220 UART: [fwproc] Recv command 0x4d454153
1,296,247 >>> mbox cmd response data (12 bytes)
1,296,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,497 UART: [fwproc] Recv command 0x4d454153
1,300,524 >>> mbox cmd response data (12 bytes)
1,300,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,638 UART: [fwproc] Recv command 0x4d454153
1,304,665 >>> mbox cmd response data (12 bytes)
1,304,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,855 UART: [fwproc] Recv command 0x4d454153
1,308,882 >>> mbox cmd response data (12 bytes)
1,308,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,176 UART: [fwproc] Recv command 0x4d454153
1,313,203 >>> mbox cmd response data (12 bytes)
1,313,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,415 UART: [fwproc] Recv command 0x4d454153
1,317,442 >>> mbox cmd response data (12 bytes)
1,317,443 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,317,752 UART: [fwproc] Recv command 0x46574c44
1,318,485 UART: [fwproc] Recv'd Img size: 111944 bytes
2,588,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,376 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,837 >>> mbox cmd response: success
2,777,920 UART: [afmc] ++
2,778,088 UART: [afmc] CDI.KEYID = 6
2,778,451 UART: [afmc] SUBJECT.KEYID = 7
2,778,877 UART: [afmc] AUTHORITY.KEYID = 5
2,813,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,825 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,521 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,420 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,113 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,871 UART: [afmc] --
2,856,891 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,856,913 UART: [cold-reset] --
2,857,713 UART: [state] Locking Datavault
2,858,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,422 UART: [state] Locking ICCM
2,859,896 UART: [exit] Launching FMC @ 0x40000000
2,865,193 UART:
2,865,209 UART: Running Caliptra FMC ...
2,865,617 UART:
2,865,847 UART: [fmc] Received command: 0x1000000A
2,872,078 >>> mbox cmd response data (928 bytes)
2,872,079 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,108 UART: [fmc] Received command: 0x10000009
2,873,306 >>> mbox cmd response data (48 bytes)
2,873,307 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,873,336 UART: [fmc] Received command: 0x10000003
2,882,792 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,191 >>> mbox cmd response data (12 bytes)
1,140,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,757 >>> mbox cmd response data (12 bytes)
1,143,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,343 >>> mbox cmd response data (12 bytes)
1,147,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,769 >>> mbox cmd response data (12 bytes)
1,150,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,269 >>> mbox cmd response data (12 bytes)
1,154,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,843 >>> mbox cmd response data (12 bytes)
1,157,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,385 >>> mbox cmd response data (12 bytes)
1,161,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,971 >>> mbox cmd response data (12 bytes)
1,164,972 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,620,373 >>> mbox cmd response: success
2,675,840 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,681,799 UART:
2,681,815 UART: Running Caliptra FMC ...
2,682,223 UART:
2,682,453 UART: [fmc] Received command: 0x1000000A
2,688,684 >>> mbox cmd response data (928 bytes)
2,688,685 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,688,714 UART: [fmc] Received command: 0x10000009
2,689,912 >>> mbox cmd response data (48 bytes)
2,689,913 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,689,942 UART: [fmc] Received command: 0x10000003
2,699,398 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,602 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,776 UART: [ldev] --
1,280,168 UART: [fwproc] Wait for Commands...
1,280,767 UART: [fwproc] Recv command 0x4d454153
1,284,794 >>> mbox cmd response data (12 bytes)
1,284,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,950 UART: [fwproc] Recv command 0x4d454153
1,288,977 >>> mbox cmd response data (12 bytes)
1,288,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,107 UART: [fwproc] Recv command 0x4d454153
1,293,134 >>> mbox cmd response data (12 bytes)
1,293,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,244 UART: [fwproc] Recv command 0x4d454153
1,297,271 >>> mbox cmd response data (12 bytes)
1,297,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,481 UART: [fwproc] Recv command 0x4d454153
1,301,508 >>> mbox cmd response data (12 bytes)
1,301,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,684 UART: [fwproc] Recv command 0x4d454153
1,305,711 >>> mbox cmd response data (12 bytes)
1,305,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,839 UART: [fwproc] Recv command 0x4d454153
1,309,866 >>> mbox cmd response data (12 bytes)
1,309,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,934 UART: [fwproc] Recv command 0x4d454153
1,313,961 >>> mbox cmd response data (12 bytes)
1,313,962 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,314,215 UART: [fwproc] Recv command 0x46574c44
1,314,948 UART: [fwproc] Recv'd Img size: 111944 bytes
2,583,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,099 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,635,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,772 >>> mbox cmd response: success
2,772,983 UART: [afmc] ++
2,773,151 UART: [afmc] CDI.KEYID = 6
2,773,514 UART: [afmc] SUBJECT.KEYID = 7
2,773,940 UART: [afmc] AUTHORITY.KEYID = 5
2,808,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,426 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,832,122 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,838,021 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,843,714 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,851,400 UART: [afmc] --
2,852,314 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,852,336 UART: [cold-reset] --
2,853,192 UART: [state] Locking Datavault
2,854,531 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,135 UART: [state] Locking ICCM
2,855,727 UART: [exit] Launching FMC @ 0x40000000
2,861,024 UART:
2,861,040 UART: Running Caliptra FMC ...
2,861,448 UART:
2,861,678 UART: [fmc] Received command: 0x1000000A
2,867,909 >>> mbox cmd response data (928 bytes)
2,867,910 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,867,939 UART: [fmc] Received command: 0x10000009
2,869,137 >>> mbox cmd response data (48 bytes)
2,869,138 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,167 UART: [fmc] Received command: 0x10000003
2,878,623 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,068 >>> mbox cmd response data (12 bytes)
1,138,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,506 >>> mbox cmd response data (12 bytes)
1,141,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,114 >>> mbox cmd response data (12 bytes)
1,145,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,576 >>> mbox cmd response data (12 bytes)
1,148,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,050 >>> mbox cmd response data (12 bytes)
1,152,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,616 >>> mbox cmd response data (12 bytes)
1,155,617 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,142 >>> mbox cmd response data (12 bytes)
1,159,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,620 >>> mbox cmd response data (12 bytes)
1,162,621 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,618,056 >>> mbox cmd response: success
2,673,451 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,679,612 UART:
2,679,628 UART: Running Caliptra FMC ...
2,680,036 UART:
2,680,266 UART: [fmc] Received command: 0x1000000A
2,686,497 >>> mbox cmd response data (928 bytes)
2,686,498 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,686,527 UART: [fmc] Received command: 0x10000009
2,687,725 >>> mbox cmd response data (48 bytes)
2,687,726 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,755 UART: [fmc] Received command: 0x10000003
2,697,211 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,482 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,678 UART: [fwproc] Recv command 0x4d454153
1,286,705 >>> mbox cmd response data (12 bytes)
1,286,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,871 UART: [fwproc] Recv command 0x4d454153
1,290,898 >>> mbox cmd response data (12 bytes)
1,290,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,100 UART: [fwproc] Recv command 0x4d454153
1,295,127 >>> mbox cmd response data (12 bytes)
1,295,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,351 UART: [fwproc] Recv command 0x4d454153
1,299,378 >>> mbox cmd response data (12 bytes)
1,299,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,606 UART: [fwproc] Recv command 0x4d454153
1,303,633 >>> mbox cmd response data (12 bytes)
1,303,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,855 UART: [fwproc] Recv command 0x4d454153
1,307,882 >>> mbox cmd response data (12 bytes)
1,307,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,970 UART: [fwproc] Recv command 0x4d454153
1,311,997 >>> mbox cmd response data (12 bytes)
1,311,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,087 UART: [fwproc] Recv command 0x4d454153
1,316,114 >>> mbox cmd response data (12 bytes)
1,316,115 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,316,276 UART: [fwproc] Recv command 0x46574c44
1,317,009 UART: [fwproc] Recv'd Img size: 111944 bytes
2,586,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,296 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,759 >>> mbox cmd response: success
2,776,928 UART: [afmc] ++
2,777,096 UART: [afmc] CDI.KEYID = 6
2,777,459 UART: [afmc] SUBJECT.KEYID = 7
2,777,885 UART: [afmc] AUTHORITY.KEYID = 5
2,813,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,087 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,783 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,682 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,375 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,419 UART: [afmc] --
2,857,465 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,857,487 UART: [cold-reset] --
2,858,525 UART: [state] Locking Datavault
2,859,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,340 UART: [state] Locking ICCM
2,860,948 UART: [exit] Launching FMC @ 0x40000000
2,866,245 UART:
2,866,261 UART: Running Caliptra FMC ...
2,866,669 UART:
2,866,899 UART: [fmc] Received command: 0x1000000A
2,873,130 >>> mbox cmd response data (928 bytes)
2,873,131 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,873,160 UART: [fmc] Received command: 0x10000009
2,874,358 >>> mbox cmd response data (48 bytes)
2,874,359 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,388 UART: [fmc] Received command: 0x10000003
2,883,844 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,859 >>> mbox cmd response data (12 bytes)
1,139,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,357 >>> mbox cmd response data (12 bytes)
1,143,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,941 >>> mbox cmd response data (12 bytes)
1,146,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,455 >>> mbox cmd response data (12 bytes)
1,150,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,935 >>> mbox cmd response data (12 bytes)
1,153,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,505 >>> mbox cmd response data (12 bytes)
1,157,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,041 >>> mbox cmd response data (12 bytes)
1,161,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,619 >>> mbox cmd response data (12 bytes)
1,164,620 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,619,385 >>> mbox cmd response: success
2,675,792 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,049 UART:
2,682,065 UART: Running Caliptra FMC ...
2,682,473 UART:
2,682,703 UART: [fmc] Received command: 0x1000000A
2,688,934 >>> mbox cmd response data (928 bytes)
2,688,935 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,688,964 UART: [fmc] Received command: 0x10000009
2,690,162 >>> mbox cmd response data (48 bytes)
2,690,163 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,192 UART: [fmc] Received command: 0x10000003
2,699,648 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,182,079 UART: [idev] Erasing UDS.KEYID = 0
1,199,081 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,242,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,988 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x4d454153
1,286,030 >>> mbox cmd response data (12 bytes)
1,286,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,278 UART: [fwproc] Recv command 0x4d454153
1,290,305 >>> mbox cmd response data (12 bytes)
1,290,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,537 UART: [fwproc] Recv command 0x4d454153
1,294,564 >>> mbox cmd response data (12 bytes)
1,294,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,840 UART: [fwproc] Recv command 0x4d454153
1,298,867 >>> mbox cmd response data (12 bytes)
1,298,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,109 UART: [fwproc] Recv command 0x4d454153
1,303,136 >>> mbox cmd response data (12 bytes)
1,303,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,350 UART: [fwproc] Recv command 0x4d454153
1,307,377 >>> mbox cmd response data (12 bytes)
1,307,378 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,585 UART: [fwproc] Recv command 0x4d454153
1,311,612 >>> mbox cmd response data (12 bytes)
1,311,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,730 UART: [fwproc] Recv command 0x4d454153
1,315,757 >>> mbox cmd response data (12 bytes)
1,315,758 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,315,949 UART: [fwproc] Recv command 0x46574c44
1,316,682 UART: [fwproc] Recv'd Img size: 111944 bytes
2,586,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,533 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,056 >>> mbox cmd response: success
2,776,313 UART: [afmc] ++
2,776,481 UART: [afmc] CDI.KEYID = 6
2,776,844 UART: [afmc] SUBJECT.KEYID = 7
2,777,270 UART: [afmc] AUTHORITY.KEYID = 5
2,813,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,166 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,835,862 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,761 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,454 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,334 UART: [afmc] --
2,856,268 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,856,290 UART: [cold-reset] --
2,857,016 UART: [state] Locking Datavault
2,858,173 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,777 UART: [state] Locking ICCM
2,859,231 UART: [exit] Launching FMC @ 0x40000000
2,864,528 UART:
2,864,544 UART: Running Caliptra FMC ...
2,864,952 UART:
2,865,182 UART: [fmc] Received command: 0x1000000A
2,871,413 >>> mbox cmd response data (928 bytes)
2,871,414 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,871,443 UART: [fmc] Received command: 0x10000009
2,872,641 >>> mbox cmd response data (48 bytes)
2,872,642 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,671 UART: [fmc] Received command: 0x10000003
2,882,127 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,718 >>> mbox cmd response data (12 bytes)
1,140,719 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,234 >>> mbox cmd response data (12 bytes)
1,144,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,744 >>> mbox cmd response data (12 bytes)
1,147,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,270 >>> mbox cmd response data (12 bytes)
1,151,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,710 >>> mbox cmd response data (12 bytes)
1,154,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,288 >>> mbox cmd response data (12 bytes)
1,158,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,848 >>> mbox cmd response data (12 bytes)
1,161,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,262 >>> mbox cmd response data (12 bytes)
1,165,263 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,620,306 >>> mbox cmd response: success
2,676,161 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,682,148 UART:
2,682,164 UART: Running Caliptra FMC ...
2,682,572 UART:
2,682,802 UART: [fmc] Received command: 0x1000000A
2,689,033 >>> mbox cmd response data (928 bytes)
2,689,034 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,689,063 UART: [fmc] Received command: 0x10000009
2,690,261 >>> mbox cmd response data (48 bytes)
2,690,262 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,291 UART: [fmc] Received command: 0x10000003
2,699,747 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,198,818 UART: [idev] Sha1 KeyId Algorithm
1,207,652 UART: [idev] --
1,208,695 UART: [ldev] ++
1,208,863 UART: [ldev] CDI.KEYID = 6
1,209,227 UART: [ldev] SUBJECT.KEYID = 5
1,209,654 UART: [ldev] AUTHORITY.KEYID = 7
1,210,117 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,685 UART: [fwproc] Wait for Commands...
1,282,292 UART: [fwproc] Recv command 0x4d454153
1,286,319 >>> mbox cmd response data (12 bytes)
1,286,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,567 UART: [fwproc] Recv command 0x4d454153
1,290,594 >>> mbox cmd response data (12 bytes)
1,290,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,686 UART: [fwproc] Recv command 0x4d454153
1,294,713 >>> mbox cmd response data (12 bytes)
1,294,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,779 UART: [fwproc] Recv command 0x4d454153
1,298,806 >>> mbox cmd response data (12 bytes)
1,298,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,068 UART: [fwproc] Recv command 0x4d454153
1,303,095 >>> mbox cmd response data (12 bytes)
1,303,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,335 UART: [fwproc] Recv command 0x4d454153
1,307,362 >>> mbox cmd response data (12 bytes)
1,307,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,536 UART: [fwproc] Recv command 0x4d454153
1,311,563 >>> mbox cmd response data (12 bytes)
1,311,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,737 UART: [fwproc] Recv command 0x4d454153
1,315,764 >>> mbox cmd response data (12 bytes)
1,315,765 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,316,028 UART: [fwproc] Recv command 0x46574c44
1,316,761 UART: [fwproc] Recv'd Img size: 111944 bytes
2,586,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,748 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,313 >>> mbox cmd response: success
2,776,550 UART: [afmc] ++
2,776,718 UART: [afmc] CDI.KEYID = 6
2,777,081 UART: [afmc] SUBJECT.KEYID = 7
2,777,507 UART: [afmc] AUTHORITY.KEYID = 5
2,813,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,357 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,836,053 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,952 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,847,645 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,855,415 UART: [afmc] --
2,856,445 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,856,467 UART: [cold-reset] --
2,857,453 UART: [state] Locking Datavault
2,858,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,246 UART: [state] Locking ICCM
2,859,674 UART: [exit] Launching FMC @ 0x40000000
2,864,971 UART:
2,864,987 UART: Running Caliptra FMC ...
2,865,395 UART:
2,865,625 UART: [fmc] Received command: 0x1000000A
2,871,856 >>> mbox cmd response data (928 bytes)
2,871,857 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,871,886 UART: [fmc] Received command: 0x10000009
2,873,084 >>> mbox cmd response data (48 bytes)
2,873,085 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,873,114 UART: [fmc] Received command: 0x10000003
2,882,570 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,699 >>> mbox cmd response data (12 bytes)
1,139,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,121 >>> mbox cmd response data (12 bytes)
1,143,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,495 >>> mbox cmd response data (12 bytes)
1,146,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,025 >>> mbox cmd response data (12 bytes)
1,150,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,439 >>> mbox cmd response data (12 bytes)
1,153,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,879 >>> mbox cmd response data (12 bytes)
1,156,880 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,353 >>> mbox cmd response data (12 bytes)
1,160,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,879 >>> mbox cmd response data (12 bytes)
1,163,880 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,619,351 >>> mbox cmd response: success
2,675,558 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,681,975 UART:
2,681,991 UART: Running Caliptra FMC ...
2,682,399 UART:
2,682,629 UART: [fmc] Received command: 0x1000000A
2,688,860 >>> mbox cmd response data (928 bytes)
2,688,861 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,688,890 UART: [fmc] Received command: 0x10000009
2,690,088 >>> mbox cmd response data (48 bytes)
2,690,089 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,690,118 UART: [fmc] Received command: 0x10000003
2,699,574 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,019 UART:
192,381 UART: Running Caliptra ROM ...
193,560 UART:
193,712 UART: [state] CFI Enabled
265,342 UART: [state] LifecycleState = Unprovisioned
267,676 UART: [state] DebugLocked = No
269,313 UART: [state] WD Timer not started. Device not locked for debugging
273,904 UART: [kat] SHA2-256
455,813 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,347 UART: [kat] ++
467,827 UART: [kat] sha1
479,028 UART: [kat] SHA2-256
482,040 UART: [kat] SHA2-384
487,645 UART: [kat] SHA2-512-ACC
490,273 UART: [kat] ECC-384
3,776,154 UART: [kat] HMAC-384Kdf
3,805,631 UART: [kat] LMS
4,878,808 UART: [kat] --
4,882,795 UART: [cold-reset] ++
4,884,686 UART: [fht] FHT @ 0x50003400
4,896,703 UART: [idev] ++
4,897,378 UART: [idev] CDI.KEYID = 6
4,898,483 UART: [idev] SUBJECT.KEYID = 7
4,899,693 UART: [idev] UDS.KEYID = 0
4,933,259 UART: [idev] Erasing UDS.KEYID = 0
8,246,154 UART: [idev] Sha1 KeyId Algorithm
8,267,699 UART: [idev] --
8,272,013 UART: [ldev] ++
8,272,620 UART: [ldev] CDI.KEYID = 6
8,273,813 UART: [ldev] SUBJECT.KEYID = 5
8,274,939 UART: [ldev] AUTHORITY.KEYID = 7
8,276,170 UART: [ldev] FE.KEYID = 1
8,322,250 UART: [ldev] Erasing FE.KEYID = 1
11,656,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,460 UART: [ldev] --
14,041,579 UART: [fwproc] Wait for Commands...
14,043,466 UART: [fwproc] Recv command 0x4d454153
14,052,486 >>> mbox cmd response data (12 bytes)
14,053,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,053,762 UART: [fwproc] Recv command 0x4d454153
14,062,744 >>> mbox cmd response data (12 bytes)
14,063,166 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,065,326 UART: [fwproc] Recv command 0x4d454153
14,074,242 >>> mbox cmd response data (12 bytes)
14,074,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,076,049 UART: [fwproc] Recv command 0x4d454153
14,084,916 >>> mbox cmd response data (12 bytes)
14,085,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,086,602 UART: [fwproc] Recv command 0x4d454153
14,095,526 >>> mbox cmd response data (12 bytes)
14,095,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,097,439 UART: [fwproc] Recv command 0x4d454153
14,106,359 >>> mbox cmd response data (12 bytes)
14,106,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,107,332 UART: [fwproc] Recv command 0x4d454153
14,116,217 >>> mbox cmd response data (12 bytes)
14,116,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,117,802 UART: [fwproc] Recv command 0x4d454153
14,126,696 >>> mbox cmd response data (12 bytes)
14,127,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,127,625 UART: [fwproc] Recv command 0x4d454153
14,129,952 UART: [fwproc] Max # of measurements received. 14,131,591 >>> mbox cmd response: failed
14,134,889 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,831,558 >>> mbox cmd response data (12 bytes)
13,832,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,840,260 >>> mbox cmd response data (12 bytes)
13,840,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,848,609 >>> mbox cmd response data (12 bytes)
13,849,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,857,491 >>> mbox cmd response data (12 bytes)
13,857,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,866,365 >>> mbox cmd response data (12 bytes)
13,866,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,874,323 >>> mbox cmd response data (12 bytes)
13,874,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,882,435 >>> mbox cmd response data (12 bytes)
13,882,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,890,119 >>> mbox cmd response data (12 bytes)
13,890,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,892,395 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,253 UART:
192,624 UART: Running Caliptra ROM ...
193,803 UART:
603,561 UART: [state] CFI Enabled
618,302 UART: [state] LifecycleState = Unprovisioned
620,658 UART: [state] DebugLocked = No
622,245 UART: [state] WD Timer not started. Device not locked for debugging
627,246 UART: [kat] SHA2-256
809,221 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,783 UART: [kat] ++
821,372 UART: [kat] sha1
831,341 UART: [kat] SHA2-256
834,408 UART: [kat] SHA2-384
841,835 UART: [kat] SHA2-512-ACC
844,440 UART: [kat] ECC-384
4,098,432 UART: [kat] HMAC-384Kdf
4,109,620 UART: [kat] LMS
5,182,799 UART: [kat] --
5,186,376 UART: [cold-reset] ++
5,188,960 UART: [fht] FHT @ 0x50003400
5,199,452 UART: [idev] ++
5,200,165 UART: [idev] CDI.KEYID = 6
5,201,272 UART: [idev] SUBJECT.KEYID = 7
5,202,808 UART: [idev] UDS.KEYID = 0
5,220,051 UART: [idev] Erasing UDS.KEYID = 0
8,488,027 UART: [idev] Sha1 KeyId Algorithm
8,511,461 UART: [idev] --
8,515,675 UART: [ldev] ++
8,516,241 UART: [ldev] CDI.KEYID = 6
8,517,476 UART: [ldev] SUBJECT.KEYID = 5
8,518,905 UART: [ldev] AUTHORITY.KEYID = 7
8,520,461 UART: [ldev] FE.KEYID = 1
8,531,449 UART: [ldev] Erasing FE.KEYID = 1
11,822,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,183 UART: [ldev] --
14,189,526 UART: [fwproc] Wait for Commands...
14,191,464 UART: [fwproc] Recv command 0x4d454153
14,200,484 >>> mbox cmd response data (12 bytes)
14,201,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,202,290 UART: [fwproc] Recv command 0x4d454153
14,211,264 >>> mbox cmd response data (12 bytes)
14,211,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,212,301 UART: [fwproc] Recv command 0x4d454153
14,221,218 >>> mbox cmd response data (12 bytes)
14,221,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,223,123 UART: [fwproc] Recv command 0x4d454153
14,232,042 >>> mbox cmd response data (12 bytes)
14,232,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,233,289 UART: [fwproc] Recv command 0x4d454153
14,242,173 >>> mbox cmd response data (12 bytes)
14,242,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,243,786 UART: [fwproc] Recv command 0x4d454153
14,252,708 >>> mbox cmd response data (12 bytes)
14,253,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,254,277 UART: [fwproc] Recv command 0x4d454153
14,263,191 >>> mbox cmd response data (12 bytes)
14,263,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,264,110 UART: [fwproc] Recv command 0x4d454153
14,273,024 >>> mbox cmd response data (12 bytes)
14,273,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,274,622 UART: [fwproc] Recv command 0x4d454153
14,276,944 UART: [fwproc] Max # of measurements received.
14,278,825 >>> mbox cmd response: failed
14,281,303 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,025,975 >>> mbox cmd response data (12 bytes)
14,026,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,034,981 >>> mbox cmd response data (12 bytes)
14,035,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,043,323 >>> mbox cmd response data (12 bytes)
14,043,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,051,717 >>> mbox cmd response data (12 bytes)
14,052,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,059,865 >>> mbox cmd response data (12 bytes)
14,060,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,067,772 >>> mbox cmd response data (12 bytes)
14,068,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,075,380 >>> mbox cmd response data (12 bytes)
14,075,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,083,325 >>> mbox cmd response data (12 bytes)
14,083,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,085,052 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,141 UART:
192,504 UART: Running Caliptra ROM ...
193,692 UART:
193,847 UART: [state] CFI Enabled
262,784 UART: [state] LifecycleState = Unprovisioned
264,677 UART: [state] DebugLocked = No
266,891 UART: [state] WD Timer not started. Device not locked for debugging
270,043 UART: [kat] SHA2-256
449,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,783 UART: [kat] ++
461,339 UART: [kat] sha1
471,683 UART: [kat] SHA2-256
474,752 UART: [kat] SHA2-384
480,732 UART: [kat] SHA2-512-ACC
483,712 UART: [kat] ECC-384
2,948,823 UART: [kat] HMAC-384Kdf
2,970,086 UART: [kat] LMS
3,499,547 UART: [kat] --
3,502,993 UART: [cold-reset] ++
3,504,230 UART: [fht] FHT @ 0x50003400
3,514,567 UART: [idev] ++
3,515,142 UART: [idev] CDI.KEYID = 6
3,516,052 UART: [idev] SUBJECT.KEYID = 7
3,517,272 UART: [idev] UDS.KEYID = 0
3,543,455 UART: [idev] Erasing UDS.KEYID = 0
6,026,836 UART: [idev] Sha1 KeyId Algorithm
6,050,092 UART: [idev] --
6,052,474 UART: [ldev] ++
6,053,055 UART: [ldev] CDI.KEYID = 6
6,053,942 UART: [ldev] SUBJECT.KEYID = 5
6,055,020 UART: [ldev] AUTHORITY.KEYID = 7
6,056,362 UART: [ldev] FE.KEYID = 1
6,098,481 UART: [ldev] Erasing FE.KEYID = 1
8,601,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,905 UART: [ldev] --
10,411,480 UART: [fwproc] Wait for Commands...
10,414,071 UART: [fwproc] Recv command 0x4d454153
10,422,611 >>> mbox cmd response data (12 bytes)
10,423,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,523 UART: [fwproc] Recv command 0x4d454153
10,433,009 >>> mbox cmd response data (12 bytes)
10,433,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,434,376 UART: [fwproc] Recv command 0x4d454153
10,442,854 >>> mbox cmd response data (12 bytes)
10,443,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,880 UART: [fwproc] Recv command 0x4d454153
10,452,366 >>> mbox cmd response data (12 bytes)
10,452,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,092 UART: [fwproc] Recv command 0x4d454153
10,462,523 >>> mbox cmd response data (12 bytes)
10,462,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,464,246 UART: [fwproc] Recv command 0x4d454153
10,472,672 >>> mbox cmd response data (12 bytes)
10,473,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,473,658 UART: [fwproc] Recv command 0x4d454153
10,482,109 >>> mbox cmd response data (12 bytes)
10,482,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,483,677 UART: [fwproc] Recv command 0x4d454153
10,492,109 >>> mbox cmd response data (12 bytes)
10,492,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,493,864 UART: [fwproc] Recv command 0x4d454153
10,495,984 UART: [fwproc] Max # of measurements received.
10,497,763 >>> mbox cmd response: failed
10,499,273 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,992 writing to cptra_bootfsm_go
4,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
193,258 UART:
193,628 UART: Running Caliptra ROM ...
194,807 UART:
194,962 UART: [state] CFI Enabled
265,513 UART: [state] LifecycleState = Unprovisioned
267,403 UART: [state] DebugLocked = No
269,920 UART: [state] WD Timer not started. Device not locked for debugging
273,425 UART: [kat] SHA2-256
452,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,148 UART: [kat] ++
464,680 UART: [kat] sha1
474,804 UART: [kat] SHA2-256
477,803 UART: [kat] SHA2-384
482,751 UART: [kat] SHA2-512-ACC
485,740 UART: [kat] ECC-384
2,949,583 UART: [kat] HMAC-384Kdf
2,971,130 UART: [kat] LMS
3,500,604 UART: [kat] --
3,503,678 UART: [cold-reset] ++
3,505,021 UART: [fht] FHT @ 0x50003400
3,516,756 UART: [idev] ++
3,517,321 UART: [idev] CDI.KEYID = 6
3,518,294 UART: [idev] SUBJECT.KEYID = 7
3,519,477 UART: [idev] UDS.KEYID = 0
3,543,506 UART: [idev] Erasing UDS.KEYID = 0
6,026,131 UART: [idev] Sha1 KeyId Algorithm
6,047,926 UART: [idev] --
6,052,034 UART: [ldev] ++
6,052,608 UART: [ldev] CDI.KEYID = 6
6,053,517 UART: [ldev] SUBJECT.KEYID = 5
6,054,595 UART: [ldev] AUTHORITY.KEYID = 7
6,055,938 UART: [ldev] FE.KEYID = 1
6,100,380 UART: [ldev] Erasing FE.KEYID = 1
8,607,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,407 UART: [ldev] --
10,416,865 UART: [fwproc] Wait for Commands...
10,419,455 UART: [fwproc] Recv command 0x4d454153
10,427,993 >>> mbox cmd response data (12 bytes)
10,428,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,429,565 UART: [fwproc] Recv command 0x4d454153
10,438,048 >>> mbox cmd response data (12 bytes)
10,438,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,439,892 UART: [fwproc] Recv command 0x4d454153
10,448,374 >>> mbox cmd response data (12 bytes)
10,448,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,449,731 UART: [fwproc] Recv command 0x4d454153
10,458,212 >>> mbox cmd response data (12 bytes)
10,458,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,459,717 UART: [fwproc] Recv command 0x4d454153
10,468,195 >>> mbox cmd response data (12 bytes)
10,468,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,469,351 UART: [fwproc] Recv command 0x4d454153
10,477,832 >>> mbox cmd response data (12 bytes)
10,478,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,478,959 UART: [fwproc] Recv command 0x4d454153
10,487,399 >>> mbox cmd response data (12 bytes)
10,487,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,488,872 UART: [fwproc] Recv command 0x4d454153
10,497,298 >>> mbox cmd response data (12 bytes)
10,497,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,499,253 UART: [fwproc] Recv command 0x4d454153
10,501,304 UART: [fwproc] Max # of measurements received. 10,502,941 >>> mbox cmd response: failed
10,505,970 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,211,343 >>> mbox cmd response data (12 bytes)
10,212,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,219,472 >>> mbox cmd response data (12 bytes)
10,219,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,226,905 >>> mbox cmd response data (12 bytes)
10,227,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,234,253 >>> mbox cmd response data (12 bytes)
10,234,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,242,584 >>> mbox cmd response data (12 bytes)
10,242,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,249,979 >>> mbox cmd response data (12 bytes)
10,251,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,258,588 >>> mbox cmd response data (12 bytes)
10,259,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,266,081 >>> mbox cmd response data (12 bytes)
10,266,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,268,684 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,307 UART:
192,698 UART: Running Caliptra ROM ...
193,825 UART:
603,526 UART: [state] CFI Enabled
618,968 UART: [state] LifecycleState = Unprovisioned
620,816 UART: [state] DebugLocked = No
622,041 UART: [state] WD Timer not started. Device not locked for debugging
626,232 UART: [kat] SHA2-256
805,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,923 UART: [kat] ++
817,456 UART: [kat] sha1
827,440 UART: [kat] SHA2-256
830,429 UART: [kat] SHA2-384
836,030 UART: [kat] SHA2-512-ACC
838,973 UART: [kat] ECC-384
3,278,617 UART: [kat] HMAC-384Kdf
3,291,341 UART: [kat] LMS
3,820,824 UART: [kat] --
3,826,078 UART: [cold-reset] ++
3,827,905 UART: [fht] FHT @ 0x50003400
3,839,205 UART: [idev] ++
3,839,775 UART: [idev] CDI.KEYID = 6
3,840,702 UART: [idev] SUBJECT.KEYID = 7
3,841,919 UART: [idev] UDS.KEYID = 0
3,856,163 UART: [idev] Erasing UDS.KEYID = 0
6,314,521 UART: [idev] Sha1 KeyId Algorithm
6,337,173 UART: [idev] --
6,340,956 UART: [ldev] ++
6,341,563 UART: [ldev] CDI.KEYID = 6
6,342,476 UART: [ldev] SUBJECT.KEYID = 5
6,343,634 UART: [ldev] AUTHORITY.KEYID = 7
6,344,864 UART: [ldev] FE.KEYID = 1
6,356,456 UART: [ldev] Erasing FE.KEYID = 1
8,829,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,129 UART: [ldev] --
10,621,335 UART: [fwproc] Wait for Commands...
10,624,179 UART: [fwproc] Recv command 0x4d454153
10,632,701 >>> mbox cmd response data (12 bytes)
10,633,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,634,686 UART: [fwproc] Recv command 0x4d454153
10,643,217 >>> mbox cmd response data (12 bytes)
10,643,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,645,497 UART: [fwproc] Recv command 0x4d454153
10,653,973 >>> mbox cmd response data (12 bytes)
10,654,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,655,175 UART: [fwproc] Recv command 0x4d454153
10,663,615 >>> mbox cmd response data (12 bytes)
10,664,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,664,648 UART: [fwproc] Recv command 0x4d454153
10,673,134 >>> mbox cmd response data (12 bytes)
10,673,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,675,035 UART: [fwproc] Recv command 0x4d454153
10,683,470 >>> mbox cmd response data (12 bytes)
10,683,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,684,881 UART: [fwproc] Recv command 0x4d454153
10,693,302 >>> mbox cmd response data (12 bytes)
10,693,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,694,944 UART: [fwproc] Recv command 0x4d454153
10,703,366 >>> mbox cmd response data (12 bytes)
10,703,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,704,887 UART: [fwproc] Recv command 0x4d454153
10,706,987 UART: [fwproc] Max # of measurements received.
10,708,812 >>> mbox cmd response: failed
10,710,216 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,407,713 >>> mbox cmd response data (12 bytes)
10,408,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,415,893 >>> mbox cmd response data (12 bytes)
10,416,342 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,423,889 >>> mbox cmd response data (12 bytes)
10,424,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,431,896 >>> mbox cmd response data (12 bytes)
10,432,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,440,121 >>> mbox cmd response data (12 bytes)
10,440,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,449,143 >>> mbox cmd response data (12 bytes)
10,449,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,457,249 >>> mbox cmd response data (12 bytes)
10,457,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,465,148 >>> mbox cmd response data (12 bytes)
10,465,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,466,650 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,555 UART: [kat] SHA2-256
901,495 UART: [kat] SHA2-384
904,092 UART: [kat] SHA2-512-ACC
905,993 UART: [kat] ECC-384
915,532 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,421 UART: [cold-reset] ++
1,169,865 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,221 UART: [idev] --
1,209,336 UART: [ldev] ++
1,209,504 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,295 UART: [ldev] AUTHORITY.KEYID = 7
1,210,758 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,092 UART: [ldev] --
1,281,434 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x4d454153
1,286,136 >>> mbox cmd response data (12 bytes)
1,286,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,314 UART: [fwproc] Recv command 0x4d454153
1,290,341 >>> mbox cmd response data (12 bytes)
1,290,342 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,617 UART: [fwproc] Recv command 0x4d454153
1,294,644 >>> mbox cmd response data (12 bytes)
1,294,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,862 UART: [fwproc] Recv command 0x4d454153
1,298,889 >>> mbox cmd response data (12 bytes)
1,298,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,085 UART: [fwproc] Recv command 0x4d454153
1,303,112 >>> mbox cmd response data (12 bytes)
1,303,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,232 UART: [fwproc] Recv command 0x4d454153
1,307,259 >>> mbox cmd response data (12 bytes)
1,307,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,475 UART: [fwproc] Recv command 0x4d454153
1,311,502 >>> mbox cmd response data (12 bytes)
1,311,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,674 UART: [fwproc] Recv command 0x4d454153
1,315,701 >>> mbox cmd response data (12 bytes)
1,315,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,899 UART: [fwproc] Recv command 0x4d454153
1,316,642 UART: [fwproc] Max # of measurements received.
1,317,287 >>> mbox cmd response: failed
1,317,791 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,088 >>> mbox cmd response data (12 bytes)
1,141,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,538 >>> mbox cmd response data (12 bytes)
1,144,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,990 >>> mbox cmd response data (12 bytes)
1,147,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,570 >>> mbox cmd response data (12 bytes)
1,151,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,192 >>> mbox cmd response data (12 bytes)
1,155,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,730 >>> mbox cmd response data (12 bytes)
1,158,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,256 >>> mbox cmd response data (12 bytes)
1,162,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,696 >>> mbox cmd response data (12 bytes)
1,165,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,906 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,648 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,148 UART: [fwproc] Recv command 0x4d454153
1,287,175 >>> mbox cmd response data (12 bytes)
1,287,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,237 UART: [fwproc] Recv command 0x4d454153
1,291,264 >>> mbox cmd response data (12 bytes)
1,291,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,472 UART: [fwproc] Recv command 0x4d454153
1,295,499 >>> mbox cmd response data (12 bytes)
1,295,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,769 UART: [fwproc] Recv command 0x4d454153
1,299,796 >>> mbox cmd response data (12 bytes)
1,299,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,094 UART: [fwproc] Recv command 0x4d454153
1,304,121 >>> mbox cmd response data (12 bytes)
1,304,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,403 UART: [fwproc] Recv command 0x4d454153
1,308,430 >>> mbox cmd response data (12 bytes)
1,308,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,528 UART: [fwproc] Recv command 0x4d454153
1,312,555 >>> mbox cmd response data (12 bytes)
1,312,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,749 UART: [fwproc] Recv command 0x4d454153
1,316,776 >>> mbox cmd response data (12 bytes)
1,316,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,012 UART: [fwproc] Recv command 0x4d454153
1,317,755 UART: [fwproc] Max # of measurements received.
1,318,400 >>> mbox cmd response: failed
1,318,678 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,699 >>> mbox cmd response data (12 bytes)
1,139,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,103 >>> mbox cmd response data (12 bytes)
1,143,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,617 >>> mbox cmd response data (12 bytes)
1,146,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,057 >>> mbox cmd response data (12 bytes)
1,150,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,515 >>> mbox cmd response data (12 bytes)
1,153,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,039 >>> mbox cmd response data (12 bytes)
1,157,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,481 >>> mbox cmd response data (12 bytes)
1,160,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,095 >>> mbox cmd response data (12 bytes)
1,164,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,301 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,484 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,239 UART: [cold-reset] ++
1,169,787 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,816 UART: [ldev] ++
1,208,984 UART: [ldev] CDI.KEYID = 6
1,209,348 UART: [ldev] SUBJECT.KEYID = 5
1,209,775 UART: [ldev] AUTHORITY.KEYID = 7
1,210,238 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,422 UART: [fwproc] Wait for Commands...
1,282,243 UART: [fwproc] Recv command 0x4d454153
1,286,270 >>> mbox cmd response data (12 bytes)
1,286,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,536 UART: [fwproc] Recv command 0x4d454153
1,290,563 >>> mbox cmd response data (12 bytes)
1,290,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,727 UART: [fwproc] Recv command 0x4d454153
1,294,754 >>> mbox cmd response data (12 bytes)
1,294,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,942 UART: [fwproc] Recv command 0x4d454153
1,298,969 >>> mbox cmd response data (12 bytes)
1,298,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,147 UART: [fwproc] Recv command 0x4d454153
1,303,174 >>> mbox cmd response data (12 bytes)
1,303,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,442 UART: [fwproc] Recv command 0x4d454153
1,307,469 >>> mbox cmd response data (12 bytes)
1,307,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,765 UART: [fwproc] Recv command 0x4d454153
1,311,792 >>> mbox cmd response data (12 bytes)
1,311,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,902 UART: [fwproc] Recv command 0x4d454153
1,315,929 >>> mbox cmd response data (12 bytes)
1,315,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,111 UART: [fwproc] Recv command 0x4d454153
1,316,854 UART: [fwproc] Max # of measurements received.
1,317,499 >>> mbox cmd response: failed
1,317,901 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,498 >>> mbox cmd response data (12 bytes)
1,138,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,024 >>> mbox cmd response data (12 bytes)
1,142,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,452 >>> mbox cmd response data (12 bytes)
1,145,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,980 >>> mbox cmd response data (12 bytes)
1,148,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,448 >>> mbox cmd response data (12 bytes)
1,152,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,048 >>> mbox cmd response data (12 bytes)
1,156,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,444 >>> mbox cmd response data (12 bytes)
1,159,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,032 >>> mbox cmd response data (12 bytes)
1,163,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,310 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,182,864 UART: [idev] Erasing UDS.KEYID = 0
1,200,770 UART: [idev] Sha1 KeyId Algorithm
1,209,680 UART: [idev] --
1,210,679 UART: [ldev] ++
1,210,847 UART: [ldev] CDI.KEYID = 6
1,211,211 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,455 UART: [ldev] Erasing FE.KEYID = 1
1,243,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,305 UART: [ldev] --
1,282,571 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x4d454153
1,287,405 >>> mbox cmd response data (12 bytes)
1,287,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,593 UART: [fwproc] Recv command 0x4d454153
1,291,620 >>> mbox cmd response data (12 bytes)
1,291,621 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,928 UART: [fwproc] Recv command 0x4d454153
1,295,955 >>> mbox cmd response data (12 bytes)
1,295,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,267 UART: [fwproc] Recv command 0x4d454153
1,300,294 >>> mbox cmd response data (12 bytes)
1,300,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,450 UART: [fwproc] Recv command 0x4d454153
1,304,477 >>> mbox cmd response data (12 bytes)
1,304,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,543 UART: [fwproc] Recv command 0x4d454153
1,308,570 >>> mbox cmd response data (12 bytes)
1,308,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,670 UART: [fwproc] Recv command 0x4d454153
1,312,697 >>> mbox cmd response data (12 bytes)
1,312,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,005 UART: [fwproc] Recv command 0x4d454153
1,317,032 >>> mbox cmd response data (12 bytes)
1,317,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,332 UART: [fwproc] Recv command 0x4d454153
1,318,075 UART: [fwproc] Max # of measurements received.
1,318,720 >>> mbox cmd response: failed
1,318,968 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,489 >>> mbox cmd response data (12 bytes)
1,141,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,063 >>> mbox cmd response data (12 bytes)
1,145,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,619 >>> mbox cmd response data (12 bytes)
1,148,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,233 >>> mbox cmd response data (12 bytes)
1,152,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,737 >>> mbox cmd response data (12 bytes)
1,155,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,139 >>> mbox cmd response data (12 bytes)
1,159,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,713 >>> mbox cmd response data (12 bytes)
1,162,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,189 >>> mbox cmd response data (12 bytes)
1,166,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,321 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,315 UART: [cold-reset] ++
1,170,757 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,789 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,668 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x4d454153
1,285,822 >>> mbox cmd response data (12 bytes)
1,285,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,050 UART: [fwproc] Recv command 0x4d454153
1,290,077 >>> mbox cmd response data (12 bytes)
1,290,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,161 UART: [fwproc] Recv command 0x4d454153
1,294,188 >>> mbox cmd response data (12 bytes)
1,294,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,402 UART: [fwproc] Recv command 0x4d454153
1,298,429 >>> mbox cmd response data (12 bytes)
1,298,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,725 UART: [fwproc] Recv command 0x4d454153
1,302,752 >>> mbox cmd response data (12 bytes)
1,302,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,952 UART: [fwproc] Recv command 0x4d454153
1,306,979 >>> mbox cmd response data (12 bytes)
1,306,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,067 UART: [fwproc] Recv command 0x4d454153
1,311,094 >>> mbox cmd response data (12 bytes)
1,311,095 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,196 UART: [fwproc] Recv command 0x4d454153
1,315,223 >>> mbox cmd response data (12 bytes)
1,315,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,465 UART: [fwproc] Recv command 0x4d454153
1,316,208 UART: [fwproc] Max # of measurements received.
1,316,853 >>> mbox cmd response: failed
1,317,161 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,530 >>> mbox cmd response data (12 bytes)
1,139,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,088 >>> mbox cmd response data (12 bytes)
1,143,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,472 >>> mbox cmd response data (12 bytes)
1,146,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,886 >>> mbox cmd response data (12 bytes)
1,149,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,488 >>> mbox cmd response data (12 bytes)
1,153,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,024 >>> mbox cmd response data (12 bytes)
1,157,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,492 >>> mbox cmd response data (12 bytes)
1,160,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,888 >>> mbox cmd response data (12 bytes)
1,163,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,992 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,408 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,061 UART: [ldev] ++
1,209,229 UART: [ldev] CDI.KEYID = 6
1,209,593 UART: [ldev] SUBJECT.KEYID = 5
1,210,020 UART: [ldev] AUTHORITY.KEYID = 7
1,210,483 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x4d454153
1,286,287 >>> mbox cmd response data (12 bytes)
1,286,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,361 UART: [fwproc] Recv command 0x4d454153
1,290,388 >>> mbox cmd response data (12 bytes)
1,290,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,696 UART: [fwproc] Recv command 0x4d454153
1,294,723 >>> mbox cmd response data (12 bytes)
1,294,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,839 UART: [fwproc] Recv command 0x4d454153
1,298,866 >>> mbox cmd response data (12 bytes)
1,298,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,978 UART: [fwproc] Recv command 0x4d454153
1,303,005 >>> mbox cmd response data (12 bytes)
1,303,006 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,191 UART: [fwproc] Recv command 0x4d454153
1,307,218 >>> mbox cmd response data (12 bytes)
1,307,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,496 UART: [fwproc] Recv command 0x4d454153
1,311,523 >>> mbox cmd response data (12 bytes)
1,311,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,615 UART: [fwproc] Recv command 0x4d454153
1,315,642 >>> mbox cmd response data (12 bytes)
1,315,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,860 UART: [fwproc] Recv command 0x4d454153
1,316,603 UART: [fwproc] Max # of measurements received.
1,317,248 >>> mbox cmd response: failed
1,317,820 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,123 >>> mbox cmd response data (12 bytes)
1,141,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,497 >>> mbox cmd response data (12 bytes)
1,144,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,907 >>> mbox cmd response data (12 bytes)
1,147,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,431 >>> mbox cmd response data (12 bytes)
1,151,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,845 >>> mbox cmd response data (12 bytes)
1,154,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,373 >>> mbox cmd response data (12 bytes)
1,158,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,815 >>> mbox cmd response data (12 bytes)
1,161,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,229 >>> mbox cmd response data (12 bytes)
1,165,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,543 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,212,704 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,353,945 UART:
2,354,373 UART: Running Caliptra ROM ...
2,355,542 UART:
2,355,725 UART: [state] CFI Enabled
2,356,712 UART: [state] LifecycleState = Unprovisioned
2,358,380 UART: [state] DebugLocked = No
2,359,488 UART: [state] WD Timer not started. Device not locked for debugging
2,361,967 UART: [kat] SHA2-256
2,362,634 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,644 UART: [kat] ++
2,366,094 UART: [kat] sha1
2,366,610 UART: [kat] SHA2-256
2,367,352 UART: [kat] SHA2-384
2,368,018 UART: [kat] SHA2-512-ACC
2,368,899 UART: [kat] ECC-384
3,776,315 UART: [kat] HMAC-384Kdf
3,804,165 UART: [kat] LMS
4,877,304 UART: [kat] --
4,880,680 UART: [cold-reset] ++
4,882,078 UART: [fht] FHT @ 0x50003400
4,892,664 UART: [idev] ++
4,893,341 UART: [idev] CDI.KEYID = 6
4,894,499 UART: [idev] SUBJECT.KEYID = 7
4,895,714 UART: [idev] UDS.KEYID = 0
4,910,211 UART: [idev] Erasing UDS.KEYID = 0
8,224,294 UART: [idev] Sha1 KeyId Algorithm
8,247,256 UART: [idev] --
8,251,738 UART: [ldev] ++
8,252,306 UART: [ldev] CDI.KEYID = 6
8,253,469 UART: [ldev] SUBJECT.KEYID = 5
8,254,682 UART: [ldev] AUTHORITY.KEYID = 7
8,255,834 UART: [ldev] FE.KEYID = 1
8,299,840 UART: [ldev] Erasing FE.KEYID = 1
11,628,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,922,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,938,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,954,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,970,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,991,684 UART: [ldev] --
13,996,082 UART: [fwproc] Wait for Commands...
13,997,918 UART: [fwproc] Recv command 0x46574c44
14,000,177 UART: [fwproc] Recv'd Img size: 111600 bytes
18,045,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,115,445 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,175,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,492,437 >>> mbox cmd response: success
18,497,194 UART: [afmc] ++
18,497,774 UART: [afmc] CDI.KEYID = 6
18,498,956 UART: [afmc] SUBJECT.KEYID = 7
18,500,114 UART: [afmc] AUTHORITY.KEYID = 5
21,863,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,179,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,181,914 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,198,137 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,214,234 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,230,034 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,253,492 UART: [afmc] --
24,257,103 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,257,479 UART: [cold-reset] --
24,262,658 UART: [state] Locking Datavault
24,266,061 UART: [state] Locking PCR0, PCR1 and PCR31
24,267,720 UART: [state] Locking ICCM
24,269,009 UART: [exit] Launching FMC @ 0x40000000
24,277,642 UART:
24,277,877 UART: Running Caliptra FMC ...
24,278,980 UART:
24,279,137 UART: [fmc] Received command: 0x10000009
24,280,652 >>> mbox cmd response data (48 bytes)
24,281,271 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,281,600 UART: [fmc] Received command: 0x1000000A
24,283,130 >>> mbox cmd response data (0 bytes)
24,283,398 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,283,709 UART: [fmc] Received command: 0x10000003
24,293,660 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,217,389 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,282,031 >>> mbox cmd response: success
23,962,309 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
23,980,161 UART:
23,980,495 UART: Running Caliptra FMC ...
23,981,670 UART:
23,981,836 UART: [fmc] Received command: 0x10000009
23,983,486 >>> mbox cmd response data (48 bytes)
23,984,075 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
23,984,406 UART: [fmc] Received command: 0x1000000A
23,985,987 >>> mbox cmd response data (0 bytes)
23,986,258 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,986,574 UART: [fmc] Received command: 0x10000003
23,996,527 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,220,703 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
2,361,842 UART:
2,362,248 UART: Running Caliptra ROM ...
2,363,412 UART:
2,363,577 UART: [state] CFI Enabled
2,364,533 UART: [state] LifecycleState = Unprovisioned
2,366,188 UART: [state] DebugLocked = No
2,367,294 UART: [state] WD Timer not started. Device not locked for debugging
2,369,842 UART: [kat] SHA2-256
2,370,509 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,373,517 UART: [kat] ++
2,373,967 UART: [kat] sha1
2,374,475 UART: [kat] SHA2-256
2,375,211 UART: [kat] SHA2-384
2,375,872 UART: [kat] SHA2-512-ACC
2,376,725 UART: [kat] ECC-384
4,100,289 UART: [kat] HMAC-384Kdf
4,112,035 UART: [kat] LMS
5,185,166 UART: [kat] --
5,187,494 UART: [cold-reset] ++
5,189,430 UART: [fht] FHT @ 0x50003400
5,202,293 UART: [idev] ++
5,203,029 UART: [idev] CDI.KEYID = 6
5,204,211 UART: [idev] SUBJECT.KEYID = 7
5,205,641 UART: [idev] UDS.KEYID = 0
5,222,162 UART: [idev] Erasing UDS.KEYID = 0
8,496,704 UART: [idev] Sha1 KeyId Algorithm
8,519,082 UART: [idev] --
8,522,727 UART: [ldev] ++
8,523,296 UART: [ldev] CDI.KEYID = 6
8,524,527 UART: [ldev] SUBJECT.KEYID = 5
8,525,974 UART: [ldev] AUTHORITY.KEYID = 7
8,527,531 UART: [ldev] FE.KEYID = 1
8,540,172 UART: [ldev] Erasing FE.KEYID = 1
11,829,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,054 UART: [ldev] --
14,194,936 UART: [fwproc] Wait for Commands...
14,197,413 UART: [fwproc] Recv command 0x46574c44
14,199,728 UART: [fwproc] Recv'd Img size: 111600 bytes
18,236,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,311,466 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,371,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,688,359 >>> mbox cmd response: success
18,691,571 UART: [afmc] ++
18,692,269 UART: [afmc] CDI.KEYID = 6
18,693,342 UART: [afmc] SUBJECT.KEYID = 7
18,694,445 UART: [afmc] AUTHORITY.KEYID = 5
22,012,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,304,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,307,166 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,323,310 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,339,664 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,355,314 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,379,398 UART: [afmc] --
24,383,269 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,383,636 UART: [cold-reset] --
24,386,931 UART: [state] Locking Datavault
24,392,391 UART: [state] Locking PCR0, PCR1 and PCR31
24,394,083 UART: [state] Locking ICCM
24,395,355 UART: [exit] Launching FMC @ 0x40000000
24,403,965 UART:
24,404,203 UART: Running Caliptra FMC ...
24,405,299 UART:
24,405,450 UART: [fmc] Received command: 0x10000009
24,407,013 >>> mbox cmd response data (48 bytes)
24,407,576 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,407,915 UART: [fmc] Received command: 0x1000000A
24,409,441 >>> mbox cmd response data (0 bytes)
24,409,703 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,410,006 UART: [fmc] Received command: 0x10000003
24,419,928 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,218,944 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,508,862 >>> mbox cmd response: success
24,128,394 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,143,946 UART:
24,144,289 UART: Running Caliptra FMC ...
24,145,484 UART:
24,145,651 UART: [fmc] Received command: 0x10000009
24,147,280 >>> mbox cmd response data (48 bytes)
24,147,873 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,148,182 UART: [fmc] Received command: 0x1000000A
24,149,764 >>> mbox cmd response data (0 bytes)
24,150,025 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,150,329 UART: [fmc] Received command: 0x10000003
24,160,281 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,215,398 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,356,769 UART:
2,357,188 UART: Running Caliptra ROM ...
2,358,733 UART:
2,358,923 UART: [state] CFI Enabled
2,359,807 UART: [state] LifecycleState = Unprovisioned
2,361,370 UART: [state] DebugLocked = No
2,362,480 UART: [state] WD Timer not started. Device not locked for debugging
2,364,974 UART: [kat] SHA2-256
2,365,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,368,656 UART: [kat] ++
2,369,107 UART: [kat] sha1
2,369,617 UART: [kat] SHA2-256
2,370,275 UART: [kat] SHA2-384
2,370,929 UART: [kat] SHA2-512-ACC
2,371,759 UART: [kat] ECC-384
2,951,210 UART: [kat] HMAC-384Kdf
2,973,106 UART: [kat] LMS
3,502,584 UART: [kat] --
3,505,646 UART: [cold-reset] ++
3,507,912 UART: [fht] FHT @ 0x50003400
3,518,458 UART: [idev] ++
3,519,036 UART: [idev] CDI.KEYID = 6
3,519,947 UART: [idev] SUBJECT.KEYID = 7
3,521,109 UART: [idev] UDS.KEYID = 0
3,543,940 UART: [idev] Erasing UDS.KEYID = 0
6,028,905 UART: [idev] Sha1 KeyId Algorithm
6,051,652 UART: [idev] --
6,055,733 UART: [ldev] ++
6,056,320 UART: [ldev] CDI.KEYID = 6
6,057,233 UART: [ldev] SUBJECT.KEYID = 5
6,058,395 UART: [ldev] AUTHORITY.KEYID = 7
6,059,686 UART: [ldev] FE.KEYID = 1
6,100,099 UART: [ldev] Erasing FE.KEYID = 1
8,606,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,860 UART: [ldev] --
10,413,229 UART: [fwproc] Wait for Commands...
10,415,591 UART: [fwproc] Recv command 0x46574c44
10,417,639 UART: [fwproc] Recv'd Img size: 111944 bytes
13,784,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,857,065 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,917,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,236,228 >>> mbox cmd response: success
14,241,356 UART: [afmc] ++
14,241,945 UART: [afmc] CDI.KEYID = 6
14,242,831 UART: [afmc] SUBJECT.KEYID = 7
14,244,045 UART: [afmc] AUTHORITY.KEYID = 5
16,784,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,683 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,803 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,791 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,493 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,582,160 UART: [afmc] --
18,585,707 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,586,080 UART: [cold-reset] --
18,588,247 UART: [state] Locking Datavault
18,593,119 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,817 UART: [state] Locking ICCM
18,597,294 UART: [exit] Launching FMC @ 0x40000000
18,605,639 UART:
18,605,888 UART: Running Caliptra FMC ...
18,606,994 UART:
18,607,176 UART: [fmc] Received command: 0x10000009
18,608,699 >>> mbox cmd response data (48 bytes)
18,609,300 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,609,644 UART: [fmc] Received command: 0x1000000A
18,611,170 >>> mbox cmd response data (0 bytes)
18,611,429 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,611,733 UART: [fmc] Received command: 0x10000003
18,621,683 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,234,781 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,376,302 UART:
2,376,743 UART: Running Caliptra ROM ...
2,377,827 UART:
2,377,993 UART: [state] CFI Enabled
2,378,971 UART: [state] LifecycleState = Unprovisioned
2,380,650 UART: [state] DebugLocked = No
2,381,682 UART: [state] WD Timer not started. Device not locked for debugging
2,384,161 UART: [kat] SHA2-256
2,384,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,387,842 UART: [kat] ++
2,388,290 UART: [kat] sha1
2,388,800 UART: [kat] SHA2-256
2,389,458 UART: [kat] SHA2-384
2,390,113 UART: [kat] SHA2-512-ACC
2,390,909 UART: [kat] ECC-384
2,949,217 UART: [kat] HMAC-384Kdf
2,972,842 UART: [kat] LMS
3,502,284 UART: [kat] --
3,507,305 UART: [cold-reset] ++
3,508,539 UART: [fht] FHT @ 0x50003400
3,519,741 UART: [idev] ++
3,520,304 UART: [idev] CDI.KEYID = 6
3,521,184 UART: [idev] SUBJECT.KEYID = 7
3,522,397 UART: [idev] UDS.KEYID = 0
3,545,400 UART: [idev] Erasing UDS.KEYID = 0
6,028,231 UART: [idev] Sha1 KeyId Algorithm
6,051,208 UART: [idev] --
6,054,974 UART: [ldev] ++
6,055,557 UART: [ldev] CDI.KEYID = 6
6,056,442 UART: [ldev] SUBJECT.KEYID = 5
6,057,663 UART: [ldev] AUTHORITY.KEYID = 7
6,058,903 UART: [ldev] FE.KEYID = 1
6,100,330 UART: [ldev] Erasing FE.KEYID = 1
8,602,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,988 UART: [ldev] --
10,392,282 UART: [fwproc] Wait for Commands...
10,395,461 UART: [fwproc] Recv command 0x46574c44
10,397,559 UART: [fwproc] Recv'd Img size: 111944 bytes
13,775,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,849,576 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,909,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,227,898 >>> mbox cmd response: success
14,232,935 UART: [afmc] ++
14,233,532 UART: [afmc] CDI.KEYID = 6
14,234,465 UART: [afmc] SUBJECT.KEYID = 7
14,235,633 UART: [afmc] AUTHORITY.KEYID = 5
16,763,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,163 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,508,214 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,524,282 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,539,940 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,562,601 UART: [afmc] --
18,565,883 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,566,242 UART: [cold-reset] --
18,569,160 UART: [state] Locking Datavault
18,574,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,576,426 UART: [state] Locking ICCM
18,578,381 UART: [exit] Launching FMC @ 0x40000000
18,586,772 UART:
18,587,030 UART: Running Caliptra FMC ...
18,588,058 UART:
18,588,206 UART: [fmc] Received command: 0x10000009
18,589,772 >>> mbox cmd response data (48 bytes)
18,590,347 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,590,657 UART: [fmc] Received command: 0x1000000A
18,592,123 >>> mbox cmd response data (0 bytes)
18,592,378 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,592,682 UART: [fmc] Received command: 0x10000003
18,602,601 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,213,798 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,028,790 >>> mbox cmd response: success
18,305,366 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,321,013 UART:
18,321,350 UART: Running Caliptra FMC ...
18,322,524 UART:
18,322,692 UART: [fmc] Received command: 0x10000009
18,324,262 >>> mbox cmd response data (48 bytes)
18,324,848 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,325,161 UART: [fmc] Received command: 0x1000000A
18,326,768 >>> mbox cmd response data (0 bytes)
18,327,038 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,327,350 UART: [fmc] Received command: 0x10000003
18,337,298 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,219,354 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,360,974 UART:
2,361,403 UART: Running Caliptra ROM ...
2,362,480 UART:
2,362,633 UART: [state] CFI Enabled
2,363,544 UART: [state] LifecycleState = Unprovisioned
2,365,208 UART: [state] DebugLocked = No
2,366,230 UART: [state] WD Timer not started. Device not locked for debugging
2,368,700 UART: [kat] SHA2-256
2,369,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,372,373 UART: [kat] ++
2,372,817 UART: [kat] sha1
2,373,326 UART: [kat] SHA2-256
2,373,979 UART: [kat] SHA2-384
2,374,632 UART: [kat] SHA2-512-ACC
2,375,457 UART: [kat] ECC-384
3,282,502 UART: [kat] HMAC-384Kdf
3,294,216 UART: [kat] LMS
3,823,689 UART: [kat] --
3,830,537 UART: [cold-reset] ++
3,833,013 UART: [fht] FHT @ 0x50003400
3,845,183 UART: [idev] ++
3,845,756 UART: [idev] CDI.KEYID = 6
3,846,770 UART: [idev] SUBJECT.KEYID = 7
3,847,868 UART: [idev] UDS.KEYID = 0
3,863,421 UART: [idev] Erasing UDS.KEYID = 0
6,320,274 UART: [idev] Sha1 KeyId Algorithm
6,344,120 UART: [idev] --
6,348,913 UART: [ldev] ++
6,349,484 UART: [ldev] CDI.KEYID = 6
6,350,410 UART: [ldev] SUBJECT.KEYID = 5
6,351,574 UART: [ldev] AUTHORITY.KEYID = 7
6,352,821 UART: [ldev] FE.KEYID = 1
6,364,218 UART: [ldev] Erasing FE.KEYID = 1
8,836,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,257 UART: [ldev] --
10,625,030 UART: [fwproc] Wait for Commands...
10,626,858 UART: [fwproc] Recv command 0x46574c44
10,628,948 UART: [fwproc] Recv'd Img size: 111944 bytes
13,996,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,066,706 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,127,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,445,533 >>> mbox cmd response: success
14,450,016 UART: [afmc] ++
14,450,626 UART: [afmc] CDI.KEYID = 6
14,451,507 UART: [afmc] SUBJECT.KEYID = 7
14,452,720 UART: [afmc] AUTHORITY.KEYID = 5
16,947,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,667,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,669,239 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,685,291 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,701,313 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,716,973 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,739,580 UART: [afmc] --
18,742,708 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,743,081 UART: [cold-reset] --
18,746,496 UART: [state] Locking Datavault
18,751,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,752,906 UART: [state] Locking ICCM
18,754,298 UART: [exit] Launching FMC @ 0x40000000
18,762,659 UART:
18,762,895 UART: Running Caliptra FMC ...
18,763,942 UART:
18,764,098 UART: [fmc] Received command: 0x10000009
18,765,701 >>> mbox cmd response data (48 bytes)
18,766,292 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,766,617 UART: [fmc] Received command: 0x1000000A
18,768,148 >>> mbox cmd response data (0 bytes)
18,768,417 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,768,723 UART: [fmc] Received command: 0x10000003
18,778,690 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
2,218,277 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,219,427 >>> mbox cmd response: success
18,446,271 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,461,330 UART:
18,461,688 UART: Running Caliptra FMC ...
18,463,101 UART:
18,463,286 UART: [fmc] Received command: 0x10000009
18,464,868 >>> mbox cmd response data (48 bytes)
18,465,472 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,465,790 UART: [fmc] Received command: 0x1000000A
18,467,389 >>> mbox cmd response data (0 bytes)
18,467,662 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,467,970 UART: [fmc] Received command: 0x10000003
18,477,921 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,927 UART: [idev] ++
1,173,095 UART: [idev] CDI.KEYID = 6
1,173,456 UART: [idev] SUBJECT.KEYID = 7
1,173,881 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,264 UART: [ldev] ++
1,208,432 UART: [ldev] CDI.KEYID = 6
1,208,796 UART: [ldev] SUBJECT.KEYID = 5
1,209,223 UART: [ldev] AUTHORITY.KEYID = 7
1,209,686 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,548 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x46574c44
1,282,036 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,437 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,014 >>> mbox cmd response: success
2,743,161 UART: [afmc] ++
2,743,329 UART: [afmc] CDI.KEYID = 6
2,743,692 UART: [afmc] SUBJECT.KEYID = 7
2,744,118 UART: [afmc] AUTHORITY.KEYID = 5
2,779,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,734 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,430 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,329 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,022 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,752 UART: [afmc] --
2,822,610 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,632 UART: [cold-reset] --
2,823,610 UART: [state] Locking Datavault
2,824,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,203 UART: [state] Locking ICCM
2,825,631 UART: [exit] Launching FMC @ 0x40000000
2,830,928 UART:
2,830,944 UART: Running Caliptra FMC ...
2,831,352 UART:
2,831,582 UART: [fmc] Received command: 0x10000009
2,832,780 >>> mbox cmd response data (48 bytes)
2,832,781 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,832,810 UART: [fmc] Received command: 0x1000000A
2,833,550 >>> mbox cmd response data (0 bytes)
2,833,551 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,580 UART: [fmc] Received command: 0x10000003
2,843,036 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,164 >>> mbox cmd response: success
2,647,491 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,448 UART:
2,653,464 UART: Running Caliptra FMC ...
2,653,872 UART:
2,654,102 UART: [fmc] Received command: 0x10000009
2,655,300 >>> mbox cmd response data (48 bytes)
2,655,301 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,330 UART: [fmc] Received command: 0x1000000A
2,656,070 >>> mbox cmd response data (0 bytes)
2,656,071 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,100 UART: [fmc] Received command: 0x10000003
2,665,556 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,818 UART: [kat] ++
895,970 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,875 UART: [kat] LMS
1,169,187 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,408 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,346 UART: [fwproc] Recv command 0x46574c44
1,283,079 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,998 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,643 >>> mbox cmd response: success
2,742,898 UART: [afmc] ++
2,743,066 UART: [afmc] CDI.KEYID = 6
2,743,429 UART: [afmc] SUBJECT.KEYID = 7
2,743,855 UART: [afmc] AUTHORITY.KEYID = 5
2,780,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,451 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,147 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,046 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,739 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,665 UART: [afmc] --
2,823,651 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,823,673 UART: [cold-reset] --
2,824,441 UART: [state] Locking Datavault
2,825,486 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,090 UART: [state] Locking ICCM
2,826,606 UART: [exit] Launching FMC @ 0x40000000
2,831,903 UART:
2,831,919 UART: Running Caliptra FMC ...
2,832,327 UART:
2,832,557 UART: [fmc] Received command: 0x10000009
2,833,755 >>> mbox cmd response data (48 bytes)
2,833,756 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,785 UART: [fmc] Received command: 0x1000000A
2,834,525 >>> mbox cmd response data (0 bytes)
2,834,526 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,555 UART: [fmc] Received command: 0x10000003
2,844,011 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,360 >>> mbox cmd response: success
2,648,315 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,314 UART:
2,654,330 UART: Running Caliptra FMC ...
2,654,738 UART:
2,654,968 UART: [fmc] Received command: 0x10000009
2,656,166 >>> mbox cmd response data (48 bytes)
2,656,167 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,196 UART: [fmc] Received command: 0x1000000A
2,656,936 >>> mbox cmd response data (0 bytes)
2,656,937 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,966 UART: [fmc] Received command: 0x10000003
2,666,422 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,257 UART: [kat] SHA2-256
901,197 UART: [kat] SHA2-384
904,014 UART: [kat] SHA2-512-ACC
905,915 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
920,160 UART: [kat] LMS
1,168,472 UART: [kat] --
1,169,213 UART: [cold-reset] ++
1,169,791 UART: [fht] FHT @ 0x50003400
1,172,607 UART: [idev] ++
1,172,775 UART: [idev] CDI.KEYID = 6
1,173,136 UART: [idev] SUBJECT.KEYID = 7
1,173,561 UART: [idev] UDS.KEYID = 0
1,181,521 UART: [idev] Erasing UDS.KEYID = 0
1,198,521 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,342 UART: [ldev] --
1,281,848 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,703 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,286 >>> mbox cmd response: success
2,743,527 UART: [afmc] ++
2,743,695 UART: [afmc] CDI.KEYID = 6
2,744,058 UART: [afmc] SUBJECT.KEYID = 7
2,744,484 UART: [afmc] AUTHORITY.KEYID = 5
2,779,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,652 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,348 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,247 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,940 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,838 UART: [afmc] --
2,822,714 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,736 UART: [cold-reset] --
2,823,534 UART: [state] Locking Datavault
2,824,627 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,231 UART: [state] Locking ICCM
2,825,873 UART: [exit] Launching FMC @ 0x40000000
2,831,170 UART:
2,831,186 UART: Running Caliptra FMC ...
2,831,594 UART:
2,831,824 UART: [fmc] Received command: 0x10000009
2,833,022 >>> mbox cmd response data (48 bytes)
2,833,023 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,833,052 UART: [fmc] Received command: 0x1000000A
2,833,792 >>> mbox cmd response data (0 bytes)
2,833,793 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,822 UART: [fmc] Received command: 0x10000003
2,843,278 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,168 >>> mbox cmd response: success
2,647,261 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,348 UART:
2,653,364 UART: Running Caliptra FMC ...
2,653,772 UART:
2,654,002 UART: [fmc] Received command: 0x10000009
2,655,200 >>> mbox cmd response data (48 bytes)
2,655,201 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,230 UART: [fmc] Received command: 0x1000000A
2,655,970 >>> mbox cmd response data (0 bytes)
2,655,971 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,000 UART: [fmc] Received command: 0x10000003
2,665,456 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,446 UART: [kat] SHA2-256
901,386 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,574 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,767 UART: [fwproc] Wait for Commands...
1,283,454 UART: [fwproc] Recv command 0x46574c44
1,284,187 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,358 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,847 >>> mbox cmd response: success
2,743,952 UART: [afmc] ++
2,744,120 UART: [afmc] CDI.KEYID = 6
2,744,483 UART: [afmc] SUBJECT.KEYID = 7
2,744,909 UART: [afmc] AUTHORITY.KEYID = 5
2,780,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,833 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,529 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,428 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,121 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,073 UART: [afmc] --
2,824,129 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,824,151 UART: [cold-reset] --
2,824,715 UART: [state] Locking Datavault
2,825,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,548 UART: [state] Locking ICCM
2,827,036 UART: [exit] Launching FMC @ 0x40000000
2,832,333 UART:
2,832,349 UART: Running Caliptra FMC ...
2,832,757 UART:
2,832,987 UART: [fmc] Received command: 0x10000009
2,834,185 >>> mbox cmd response data (48 bytes)
2,834,186 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,215 UART: [fmc] Received command: 0x1000000A
2,834,955 >>> mbox cmd response data (0 bytes)
2,834,956 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,834,985 UART: [fmc] Received command: 0x10000003
2,844,441 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,685 >>> mbox cmd response: success
2,648,862 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,655,149 UART:
2,655,165 UART: Running Caliptra FMC ...
2,655,573 UART:
2,655,803 UART: [fmc] Received command: 0x10000009
2,657,001 >>> mbox cmd response data (48 bytes)
2,657,002 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,031 UART: [fmc] Received command: 0x1000000A
2,657,771 >>> mbox cmd response data (0 bytes)
2,657,772 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,801 UART: [fmc] Received command: 0x10000003
2,667,257 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
920,012 UART: [kat] LMS
1,168,324 UART: [kat] --
1,169,085 UART: [cold-reset] ++
1,169,423 UART: [fht] FHT @ 0x50003400
1,172,087 UART: [idev] ++
1,172,255 UART: [idev] CDI.KEYID = 6
1,172,616 UART: [idev] SUBJECT.KEYID = 7
1,173,041 UART: [idev] UDS.KEYID = 0
1,180,867 UART: [idev] Erasing UDS.KEYID = 0
1,197,803 UART: [idev] Sha1 KeyId Algorithm
1,206,763 UART: [idev] --
1,207,998 UART: [ldev] ++
1,208,166 UART: [ldev] CDI.KEYID = 6
1,208,530 UART: [ldev] SUBJECT.KEYID = 5
1,208,957 UART: [ldev] AUTHORITY.KEYID = 7
1,209,420 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,240,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,842 UART: [ldev] --
1,280,334 UART: [fwproc] Wait for Commands...
1,281,043 UART: [fwproc] Recv command 0x46574c44
1,281,776 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,079 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,548 >>> mbox cmd response: success
2,740,779 UART: [afmc] ++
2,740,947 UART: [afmc] CDI.KEYID = 6
2,741,310 UART: [afmc] SUBJECT.KEYID = 7
2,741,736 UART: [afmc] AUTHORITY.KEYID = 5
2,776,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,852 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,548 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,447 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,140 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,918 UART: [afmc] --
2,819,798 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,819,820 UART: [cold-reset] --
2,820,866 UART: [state] Locking Datavault
2,821,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,595 UART: [state] Locking ICCM
2,823,015 UART: [exit] Launching FMC @ 0x40000000
2,828,312 UART:
2,828,328 UART: Running Caliptra FMC ...
2,828,736 UART:
2,828,966 UART: [fmc] Received command: 0x10000009
2,830,164 >>> mbox cmd response data (48 bytes)
2,830,165 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,194 UART: [fmc] Received command: 0x1000000A
2,830,934 >>> mbox cmd response data (0 bytes)
2,830,935 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,830,964 UART: [fmc] Received command: 0x10000003
2,840,420 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,908 >>> mbox cmd response: success
2,646,391 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,652,498 UART:
2,652,514 UART: Running Caliptra FMC ...
2,652,922 UART:
2,653,152 UART: [fmc] Received command: 0x10000009
2,654,350 >>> mbox cmd response data (48 bytes)
2,654,351 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,380 UART: [fmc] Received command: 0x1000000A
2,655,120 >>> mbox cmd response data (0 bytes)
2,655,121 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,655,150 UART: [fmc] Received command: 0x10000003
2,664,606 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,691 UART: [ldev] SUBJECT.KEYID = 5
1,210,118 UART: [ldev] AUTHORITY.KEYID = 7
1,210,581 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,743 UART: [ldev] --
1,281,057 UART: [fwproc] Wait for Commands...
1,281,658 UART: [fwproc] Recv command 0x46574c44
1,282,391 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,622 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,223 >>> mbox cmd response: success
2,742,400 UART: [afmc] ++
2,742,568 UART: [afmc] CDI.KEYID = 6
2,742,931 UART: [afmc] SUBJECT.KEYID = 7
2,743,357 UART: [afmc] AUTHORITY.KEYID = 5
2,779,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,589 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,285 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,184 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,877 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,859 UART: [afmc] --
2,822,787 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,822,809 UART: [cold-reset] --
2,823,667 UART: [state] Locking Datavault
2,824,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,264 UART: [state] Locking ICCM
2,825,704 UART: [exit] Launching FMC @ 0x40000000
2,831,001 UART:
2,831,017 UART: Running Caliptra FMC ...
2,831,425 UART:
2,831,655 UART: [fmc] Received command: 0x10000009
2,832,853 >>> mbox cmd response data (48 bytes)
2,832,854 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,832,883 UART: [fmc] Received command: 0x1000000A
2,833,623 >>> mbox cmd response data (0 bytes)
2,833,624 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,653 UART: [fmc] Received command: 0x10000003
2,843,109 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,031 >>> mbox cmd response: success
2,646,368 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,652,533 UART:
2,652,549 UART: Running Caliptra FMC ...
2,652,957 UART:
2,653,187 UART: [fmc] Received command: 0x10000009
2,654,385 >>> mbox cmd response data (48 bytes)
2,654,386 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,415 UART: [fmc] Received command: 0x1000000A
2,655,155 >>> mbox cmd response data (0 bytes)
2,655,156 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,655,185 UART: [fmc] Received command: 0x10000003
2,664,641 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,217,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,218,733 UART:
2,218,982 UART: Running Caliptra ROM ...
2,220,065 UART:
2,220,221 UART: [state] CFI Enabled
2,221,089 UART: [state] LifecycleState = Unprovisioned
2,222,668 UART: [state] DebugLocked = No
2,223,690 UART: [state] WD Timer not started. Device not locked for debugging
2,226,182 UART: [kat] SHA2-256
2,226,876 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,229,908 UART: [kat] ++
2,230,367 UART: [kat] sha1
2,230,879 UART: [kat] SHA2-256
2,231,615 UART: [kat] SHA2-384
2,232,279 UART: [kat] SHA2-512-ACC
2,233,110 UART: [kat] ECC-384
3,764,788 UART: [kat] HMAC-384Kdf
3,790,358 UART: [kat] LMS
4,863,504 UART: [kat] --
4,868,016 UART: [cold-reset] ++
4,869,363 UART: [fht] FHT @ 0x50003400
4,880,991 UART: [idev] ++
4,881,665 UART: [idev] CDI.KEYID = 6
4,882,897 UART: [idev] SUBJECT.KEYID = 7
4,884,052 UART: [idev] UDS.KEYID = 0
4,917,348 UART: [idev] Erasing UDS.KEYID = 0
8,224,400 UART: [idev] Sha1 KeyId Algorithm
8,246,279 UART: [idev] --
8,250,591 UART: [ldev] ++
8,251,154 UART: [ldev] CDI.KEYID = 6
8,252,313 UART: [ldev] SUBJECT.KEYID = 5
8,253,524 UART: [ldev] AUTHORITY.KEYID = 7
8,254,673 UART: [ldev] FE.KEYID = 1
8,282,868 UART: [ldev] Erasing FE.KEYID = 1
11,616,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,930,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,946,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,962,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,978,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,000,577 UART: [ldev] --
14,005,300 UART: [fwproc] Wait for Commands...
14,007,092 UART: [fwproc] Recv command 0x4d454153
14,016,071 >>> mbox cmd response data (12 bytes)
14,017,990 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
14,158,675 UART: [fwproc] Recv command 0x46574c44
14,161,057 UART: [fwproc] Recv'd Img size: 111600 bytes
18,199,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,273,902 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,334,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,651,569 >>> mbox cmd response: success
18,655,705 UART: [afmc] ++
18,656,321 UART: [afmc] CDI.KEYID = 6
18,657,325 UART: [afmc] SUBJECT.KEYID = 7
18,658,546 UART: [afmc] AUTHORITY.KEYID = 5
22,019,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,313,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,315,580 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,331,737 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,347,894 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,363,711 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,386,642 UART: [afmc] --
24,389,324 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,389,699 UART: [cold-reset] --
24,394,266 UART: [state] Locking Datavault
24,399,784 UART: [state] Locking PCR0, PCR1 and PCR31
24,401,427 UART: [state] Locking ICCM
24,402,959 UART: [exit] Launching FMC @ 0x40000000
24,411,575 UART:
24,411,807 UART: Running Caliptra FMC ...
24,412,913 UART:
24,413,071 UART: [fmc] Received command: 0x1000000A
24,414,747 >>> mbox cmd response data (116 bytes)
24,416,462 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,416,953 UART: [fmc] Received command: 0x10000009
24,418,764 >>> mbox cmd response data (48 bytes)
24,420,349 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,420,811 UART: [fmc] Received command: 0x10000003
24,430,728 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,216,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,827,491 >>> mbox cmd response data (12 bytes)
13,829,761 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,452,538 >>> mbox cmd response: success
24,127,029 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,143,309 UART:
24,143,638 UART: Running Caliptra FMC ...
24,144,719 UART:
24,144,865 UART: [fmc] Received command: 0x1000000A
24,146,455 >>> mbox cmd response data (116 bytes)
24,147,859 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,148,205 UART: [fmc] Received command: 0x10000009
24,150,408 >>> mbox cmd response data (48 bytes)
24,151,810 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,152,215 UART: [fmc] Received command: 0x10000003
24,162,141 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,235,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,236,830 UART:
2,237,084 UART: Running Caliptra ROM ...
2,238,153 UART:
2,238,304 UART: [state] CFI Enabled
2,239,168 UART: [state] LifecycleState = Unprovisioned
2,240,838 UART: [state] DebugLocked = No
2,241,861 UART: [state] WD Timer not started. Device not locked for debugging
2,244,349 UART: [kat] SHA2-256
2,245,007 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,248,012 UART: [kat] ++
2,248,455 UART: [kat] sha1
2,248,954 UART: [kat] SHA2-256
2,249,603 UART: [kat] SHA2-384
2,250,251 UART: [kat] SHA2-512-ACC
2,251,081 UART: [kat] ECC-384
4,096,972 UART: [kat] HMAC-384Kdf
4,109,134 UART: [kat] LMS
5,182,298 UART: [kat] --
5,186,575 UART: [cold-reset] ++
5,189,324 UART: [fht] FHT @ 0x50003400
5,202,146 UART: [idev] ++
5,202,819 UART: [idev] CDI.KEYID = 6
5,204,049 UART: [idev] SUBJECT.KEYID = 7
5,205,497 UART: [idev] UDS.KEYID = 0
5,222,934 UART: [idev] Erasing UDS.KEYID = 0
8,495,508 UART: [idev] Sha1 KeyId Algorithm
8,518,479 UART: [idev] --
8,522,736 UART: [ldev] ++
8,523,498 UART: [ldev] CDI.KEYID = 6
8,524,918 UART: [ldev] SUBJECT.KEYID = 5
8,525,950 UART: [ldev] AUTHORITY.KEYID = 7
8,527,579 UART: [ldev] FE.KEYID = 1
8,536,860 UART: [ldev] Erasing FE.KEYID = 1
11,831,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,733 UART: [ldev] --
14,199,203 UART: [fwproc] Wait for Commands...
14,201,831 UART: [fwproc] Recv command 0x4d454153
14,210,842 >>> mbox cmd response data (12 bytes)
14,212,752 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
14,353,992 UART: [fwproc] Recv command 0x46574c44
14,356,371 UART: [fwproc] Recv'd Img size: 111600 bytes
18,400,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,477,910 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,538,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,854,226 >>> mbox cmd response: success
18,857,870 UART: [afmc] ++
18,858,454 UART: [afmc] CDI.KEYID = 6
18,859,610 UART: [afmc] SUBJECT.KEYID = 7
18,860,817 UART: [afmc] AUTHORITY.KEYID = 5
22,176,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,471,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,473,774 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,489,938 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,506,058 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,521,858 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,545,268 UART: [afmc] --
24,549,262 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,549,658 UART: [cold-reset] --
24,553,820 UART: [state] Locking Datavault
24,560,360 UART: [state] Locking PCR0, PCR1 and PCR31
24,561,990 UART: [state] Locking ICCM
24,564,642 UART: [exit] Launching FMC @ 0x40000000
24,573,298 UART:
24,573,526 UART: Running Caliptra FMC ...
24,574,540 UART:
24,574,678 UART: [fmc] Received command: 0x1000000A
24,576,453 >>> mbox cmd response data (116 bytes)
24,578,049 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,578,390 UART: [fmc] Received command: 0x10000009
24,580,192 >>> mbox cmd response data (48 bytes)
24,581,729 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,582,097 UART: [fmc] Received command: 0x10000003
24,592,023 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,227,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,023,680 >>> mbox cmd response data (12 bytes)
14,025,779 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,652,123 >>> mbox cmd response: success
24,277,201 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,292,025 UART:
24,292,361 UART: Running Caliptra FMC ...
24,293,465 UART:
24,293,615 UART: [fmc] Received command: 0x1000000A
24,295,302 >>> mbox cmd response data (116 bytes)
24,296,653 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,296,993 UART: [fmc] Received command: 0x10000009
24,298,807 >>> mbox cmd response data (48 bytes)
24,300,228 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,300,683 UART: [fmc] Received command: 0x10000003
24,310,606 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,223,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,224,414 UART:
2,224,677 UART: Running Caliptra ROM ...
2,225,743 UART:
2,225,901 UART: [state] CFI Enabled
2,226,767 UART: [state] LifecycleState = Unprovisioned
2,228,443 UART: [state] DebugLocked = No
2,229,523 UART: [state] WD Timer not started. Device not locked for debugging
2,232,006 UART: [kat] SHA2-256
2,232,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,235,689 UART: [kat] ++
2,236,141 UART: [kat] sha1
2,236,653 UART: [kat] SHA2-256
2,237,392 UART: [kat] SHA2-384
2,238,056 UART: [kat] SHA2-512-ACC
2,239,048 UART: [kat] ECC-384
2,945,109 UART: [kat] HMAC-384Kdf
2,970,564 UART: [kat] LMS
3,499,981 UART: [kat] --
3,506,377 UART: [cold-reset] ++
3,508,107 UART: [fht] FHT @ 0x50003400
3,518,709 UART: [idev] ++
3,519,274 UART: [idev] CDI.KEYID = 6
3,520,211 UART: [idev] SUBJECT.KEYID = 7
3,521,374 UART: [idev] UDS.KEYID = 0
3,542,421 UART: [idev] Erasing UDS.KEYID = 0
6,024,926 UART: [idev] Sha1 KeyId Algorithm
6,048,168 UART: [idev] --
6,051,091 UART: [ldev] ++
6,051,671 UART: [ldev] CDI.KEYID = 6
6,052,582 UART: [ldev] SUBJECT.KEYID = 5
6,053,747 UART: [ldev] AUTHORITY.KEYID = 7
6,054,981 UART: [ldev] FE.KEYID = 1
6,097,439 UART: [ldev] Erasing FE.KEYID = 1
8,599,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,524 UART: [ldev] --
10,411,873 UART: [fwproc] Wait for Commands...
10,414,079 UART: [fwproc] Recv command 0x4d454153
10,422,622 >>> mbox cmd response data (12 bytes)
10,424,493 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
10,565,265 UART: [fwproc] Recv command 0x46574c44
10,567,381 UART: [fwproc] Recv'd Img size: 111944 bytes
13,943,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,018,473 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,078,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,397,415 >>> mbox cmd response: success
14,401,654 UART: [afmc] ++
14,402,245 UART: [afmc] CDI.KEYID = 6
14,403,152 UART: [afmc] SUBJECT.KEYID = 7
14,404,311 UART: [afmc] AUTHORITY.KEYID = 5
16,932,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,656,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,658,810 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,674,851 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,690,888 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,706,537 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,730,559 UART: [afmc] --
18,734,713 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,735,091 UART: [cold-reset] --
18,739,868 UART: [state] Locking Datavault
18,745,537 UART: [state] Locking PCR0, PCR1 and PCR31
18,747,200 UART: [state] Locking ICCM
18,748,465 UART: [exit] Launching FMC @ 0x40000000
18,756,856 UART:
18,757,111 UART: Running Caliptra FMC ...
18,758,219 UART:
18,758,384 UART: [fmc] Received command: 0x1000000A
18,760,011 >>> mbox cmd response data (116 bytes)
18,761,611 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,762,046 UART: [fmc] Received command: 0x10000009
18,763,849 >>> mbox cmd response data (48 bytes)
18,765,399 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,765,850 UART: [fmc] Received command: 0x10000003
18,775,817 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,227,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,228,883 UART:
2,229,152 UART: Running Caliptra ROM ...
2,230,253 UART:
2,230,411 UART: [state] CFI Enabled
2,231,283 UART: [state] LifecycleState = Unprovisioned
2,232,979 UART: [state] DebugLocked = No
2,234,058 UART: [state] WD Timer not started. Device not locked for debugging
2,236,550 UART: [kat] SHA2-256
2,237,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,240,235 UART: [kat] ++
2,240,684 UART: [kat] sha1
2,241,239 UART: [kat] SHA2-256
2,241,901 UART: [kat] SHA2-384
2,242,555 UART: [kat] SHA2-512-ACC
2,243,558 UART: [kat] ECC-384
2,945,916 UART: [kat] HMAC-384Kdf
2,970,622 UART: [kat] LMS
3,500,037 UART: [kat] --
3,503,156 UART: [cold-reset] ++
3,504,557 UART: [fht] FHT @ 0x50003400
3,516,185 UART: [idev] ++
3,516,752 UART: [idev] CDI.KEYID = 6
3,517,714 UART: [idev] SUBJECT.KEYID = 7
3,518,872 UART: [idev] UDS.KEYID = 0
3,542,627 UART: [idev] Erasing UDS.KEYID = 0
6,021,645 UART: [idev] Sha1 KeyId Algorithm
6,044,655 UART: [idev] --
6,047,220 UART: [ldev] ++
6,047,802 UART: [ldev] CDI.KEYID = 6
6,048,712 UART: [ldev] SUBJECT.KEYID = 5
6,049,933 UART: [ldev] AUTHORITY.KEYID = 7
6,051,167 UART: [ldev] FE.KEYID = 1
6,076,934 UART: [ldev] Erasing FE.KEYID = 1
8,581,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,530 UART: [ldev] --
10,392,912 UART: [fwproc] Wait for Commands...
10,394,858 UART: [fwproc] Recv command 0x4d454153
10,403,391 >>> mbox cmd response data (12 bytes)
10,405,173 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
10,546,218 UART: [fwproc] Recv command 0x46574c44
10,548,397 UART: [fwproc] Recv'd Img size: 111944 bytes
13,919,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,026 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,049,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,367,517 >>> mbox cmd response: success
14,371,500 UART: [afmc] ++
14,372,109 UART: [afmc] CDI.KEYID = 6
14,372,996 UART: [afmc] SUBJECT.KEYID = 7
14,374,224 UART: [afmc] AUTHORITY.KEYID = 5
16,915,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,078 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,657,143 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,673,233 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,688,911 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,711,538 UART: [afmc] --
18,715,146 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,715,509 UART: [cold-reset] --
18,719,245 UART: [state] Locking Datavault
18,724,116 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,814 UART: [state] Locking ICCM
18,727,127 UART: [exit] Launching FMC @ 0x40000000
18,735,490 UART:
18,735,725 UART: Running Caliptra FMC ...
18,736,825 UART:
18,736,981 UART: [fmc] Received command: 0x1000000A
18,738,658 >>> mbox cmd response data (116 bytes)
18,739,911 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,740,344 UART: [fmc] Received command: 0x10000009
18,742,149 >>> mbox cmd response data (48 bytes)
18,743,625 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,744,079 UART: [fmc] Received command: 0x10000003
18,753,999 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
2,217,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,228,485 >>> mbox cmd response data (12 bytes)
10,230,920 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,188,538 >>> mbox cmd response: success
18,457,056 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,473,358 UART:
18,473,686 UART: Running Caliptra FMC ...
18,474,858 UART:
18,475,024 UART: [fmc] Received command: 0x1000000A
18,476,601 >>> mbox cmd response data (116 bytes)
18,478,215 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,478,671 UART: [fmc] Received command: 0x10000009
18,480,449 >>> mbox cmd response data (48 bytes)
18,481,954 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,482,423 UART: [fmc] Received command: 0x10000003
18,492,381 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,223,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,224,401 UART:
2,224,657 UART: Running Caliptra ROM ...
2,226,072 UART:
2,226,248 UART: [state] CFI Enabled
2,227,125 UART: [state] LifecycleState = Unprovisioned
2,228,803 UART: [state] DebugLocked = No
2,229,866 UART: [state] WD Timer not started. Device not locked for debugging
2,232,337 UART: [kat] SHA2-256
2,232,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,236,005 UART: [kat] ++
2,236,459 UART: [kat] sha1
2,236,967 UART: [kat] SHA2-256
2,237,642 UART: [kat] SHA2-384
2,238,299 UART: [kat] SHA2-512-ACC
2,239,124 UART: [kat] ECC-384
3,282,818 UART: [kat] HMAC-384Kdf
3,294,522 UART: [kat] LMS
3,824,025 UART: [kat] --
3,828,296 UART: [cold-reset] ++
3,830,525 UART: [fht] FHT @ 0x50003400
3,842,261 UART: [idev] ++
3,842,821 UART: [idev] CDI.KEYID = 6
3,843,832 UART: [idev] SUBJECT.KEYID = 7
3,844,991 UART: [idev] UDS.KEYID = 0
3,858,799 UART: [idev] Erasing UDS.KEYID = 0
6,314,502 UART: [idev] Sha1 KeyId Algorithm
6,338,091 UART: [idev] --
6,341,750 UART: [ldev] ++
6,342,341 UART: [ldev] CDI.KEYID = 6
6,343,246 UART: [ldev] SUBJECT.KEYID = 5
6,344,460 UART: [ldev] AUTHORITY.KEYID = 7
6,345,689 UART: [ldev] FE.KEYID = 1
6,354,929 UART: [ldev] Erasing FE.KEYID = 1
8,827,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,644 UART: [ldev] --
10,617,690 UART: [fwproc] Wait for Commands...
10,619,349 UART: [fwproc] Recv command 0x4d454153
10,627,841 >>> mbox cmd response data (12 bytes)
10,629,754 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
10,771,279 UART: [fwproc] Recv command 0x46574c44
10,773,409 UART: [fwproc] Recv'd Img size: 111944 bytes
14,148,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,530 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,286,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,372 >>> mbox cmd response: success
14,609,993 UART: [afmc] ++
14,610,578 UART: [afmc] CDI.KEYID = 6
14,611,492 UART: [afmc] SUBJECT.KEYID = 7
14,612,704 UART: [afmc] AUTHORITY.KEYID = 5
17,113,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,833,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,835,183 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,851,263 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,867,294 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,882,963 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,905,575 UART: [afmc] --
18,909,097 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,909,502 UART: [cold-reset] --
18,913,609 UART: [state] Locking Datavault
18,919,291 UART: [state] Locking PCR0, PCR1 and PCR31
18,920,985 UART: [state] Locking ICCM
18,922,408 UART: [exit] Launching FMC @ 0x40000000
18,930,807 UART:
18,931,039 UART: Running Caliptra FMC ...
18,932,138 UART:
18,932,297 UART: [fmc] Received command: 0x1000000A
18,933,971 >>> mbox cmd response data (116 bytes)
18,935,475 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,935,916 UART: [fmc] Received command: 0x10000009
18,937,721 >>> mbox cmd response data (48 bytes)
18,939,282 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,939,742 UART: [fmc] Received command: 0x10000003
18,949,706 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
2,222,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,403,987 >>> mbox cmd response data (12 bytes)
10,406,230 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,373,579 >>> mbox cmd response: success
18,611,927 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,627,166 UART:
18,627,482 UART: Running Caliptra FMC ...
18,628,556 UART:
18,628,705 UART: [fmc] Received command: 0x1000000A
18,630,422 >>> mbox cmd response data (116 bytes)
18,631,765 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,632,112 UART: [fmc] Received command: 0x10000009
18,633,929 >>> mbox cmd response data (48 bytes)
18,635,296 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,635,650 UART: [fmc] Received command: 0x10000003
18,645,615 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,392 UART: [ldev] ++
1,209,560 UART: [ldev] CDI.KEYID = 6
1,209,924 UART: [ldev] SUBJECT.KEYID = 5
1,210,351 UART: [ldev] AUTHORITY.KEYID = 7
1,210,814 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,510 UART: [ldev] --
1,281,864 UART: [fwproc] Wait for Commands...
1,282,635 UART: [fwproc] Recv command 0x4d454153
1,286,662 >>> mbox cmd response data (12 bytes)
1,286,663 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,286,954 UART: [fwproc] Recv command 0x46574c44
1,287,687 UART: [fwproc] Recv'd Img size: 111944 bytes
2,557,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,654 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,746,129 >>> mbox cmd response: success
2,747,324 UART: [afmc] ++
2,747,492 UART: [afmc] CDI.KEYID = 6
2,747,855 UART: [afmc] SUBJECT.KEYID = 7
2,748,281 UART: [afmc] AUTHORITY.KEYID = 5
2,783,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,157 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,853 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,752 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,445 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,107 UART: [afmc] --
2,826,009 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,031 UART: [cold-reset] --
2,826,855 UART: [state] Locking Datavault
2,827,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,476 UART: [state] Locking ICCM
2,829,140 UART: [exit] Launching FMC @ 0x40000000
2,834,437 UART:
2,834,453 UART: Running Caliptra FMC ...
2,834,861 UART:
2,835,091 UART: [fmc] Received command: 0x1000000A
2,836,520 >>> mbox cmd response data (116 bytes)
2,836,521 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,550 UART: [fmc] Received command: 0x10000009
2,837,748 >>> mbox cmd response data (48 bytes)
2,837,749 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,837,778 UART: [fmc] Received command: 0x10000003
2,847,234 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,402 >>> mbox cmd response data (12 bytes)
1,140,403 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,594,052 >>> mbox cmd response: success
2,650,761 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,010 UART:
2,657,026 UART: Running Caliptra FMC ...
2,657,434 UART:
2,657,664 UART: [fmc] Received command: 0x1000000A
2,659,093 >>> mbox cmd response data (116 bytes)
2,659,094 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,123 UART: [fmc] Received command: 0x10000009
2,660,321 >>> mbox cmd response data (48 bytes)
2,660,322 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,351 UART: [fmc] Received command: 0x10000003
2,669,807 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,182,848 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x4d454153
1,287,197 >>> mbox cmd response data (12 bytes)
1,287,198 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,287,379 UART: [fwproc] Recv command 0x46574c44
1,288,112 UART: [fwproc] Recv'd Img size: 111944 bytes
2,557,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,495 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,745,956 >>> mbox cmd response: success
2,746,977 UART: [afmc] ++
2,747,145 UART: [afmc] CDI.KEYID = 6
2,747,508 UART: [afmc] SUBJECT.KEYID = 7
2,747,934 UART: [afmc] AUTHORITY.KEYID = 5
2,783,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,800,346 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,042 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,941 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,634 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,825,698 UART: [afmc] --
2,826,674 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,696 UART: [cold-reset] --
2,827,636 UART: [state] Locking Datavault
2,828,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,331 UART: [state] Locking ICCM
2,829,823 UART: [exit] Launching FMC @ 0x40000000
2,835,120 UART:
2,835,136 UART: Running Caliptra FMC ...
2,835,544 UART:
2,835,774 UART: [fmc] Received command: 0x1000000A
2,837,203 >>> mbox cmd response data (116 bytes)
2,837,204 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,233 UART: [fmc] Received command: 0x10000009
2,838,431 >>> mbox cmd response data (48 bytes)
2,838,432 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,838,461 UART: [fmc] Received command: 0x10000003
2,847,917 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,085 >>> mbox cmd response data (12 bytes)
1,140,086 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,595,831 >>> mbox cmd response: success
2,651,874 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,658,171 UART:
2,658,187 UART: Running Caliptra FMC ...
2,658,595 UART:
2,658,825 UART: [fmc] Received command: 0x1000000A
2,660,254 >>> mbox cmd response data (116 bytes)
2,660,255 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,660,284 UART: [fmc] Received command: 0x10000009
2,661,482 >>> mbox cmd response data (48 bytes)
2,661,483 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,661,512 UART: [fmc] Received command: 0x10000003
2,670,968 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,193 UART: [kat] ++
895,345 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,270 UART: [kat] LMS
1,168,582 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,415 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,452 UART: [ldev] ++
1,208,620 UART: [ldev] CDI.KEYID = 6
1,208,984 UART: [ldev] SUBJECT.KEYID = 5
1,209,411 UART: [ldev] AUTHORITY.KEYID = 7
1,209,874 UART: [ldev] FE.KEYID = 1
1,214,862 UART: [ldev] Erasing FE.KEYID = 1
1,241,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,480 UART: [ldev] --
1,279,912 UART: [fwproc] Wait for Commands...
1,280,701 UART: [fwproc] Recv command 0x4d454153
1,284,728 >>> mbox cmd response data (12 bytes)
1,284,729 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,284,820 UART: [fwproc] Recv command 0x46574c44
1,285,553 UART: [fwproc] Recv'd Img size: 111944 bytes
2,555,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,104 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,743,685 >>> mbox cmd response: success
2,744,898 UART: [afmc] ++
2,745,066 UART: [afmc] CDI.KEYID = 6
2,745,429 UART: [afmc] SUBJECT.KEYID = 7
2,745,855 UART: [afmc] AUTHORITY.KEYID = 5
2,780,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,901 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,597 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,496 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,189 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,977 UART: [afmc] --
2,823,999 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,021 UART: [cold-reset] --
2,824,835 UART: [state] Locking Datavault
2,826,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,612 UART: [state] Locking ICCM
2,827,176 UART: [exit] Launching FMC @ 0x40000000
2,832,473 UART:
2,832,489 UART: Running Caliptra FMC ...
2,832,897 UART:
2,833,127 UART: [fmc] Received command: 0x1000000A
2,834,556 >>> mbox cmd response data (116 bytes)
2,834,557 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,586 UART: [fmc] Received command: 0x10000009
2,835,784 >>> mbox cmd response data (48 bytes)
2,835,785 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,814 UART: [fmc] Received command: 0x10000003
2,845,270 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,364 >>> mbox cmd response data (12 bytes)
1,139,365 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,594,150 >>> mbox cmd response: success
2,649,037 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,248 UART:
2,655,264 UART: Running Caliptra FMC ...
2,655,672 UART:
2,655,902 UART: [fmc] Received command: 0x1000000A
2,657,331 >>> mbox cmd response data (116 bytes)
2,657,332 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,361 UART: [fmc] Received command: 0x10000009
2,658,559 >>> mbox cmd response data (48 bytes)
2,658,560 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,589 UART: [fmc] Received command: 0x10000003
2,668,045 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,596 UART: [kat] SHA2-256
901,536 UART: [kat] SHA2-384
904,173 UART: [kat] SHA2-512-ACC
906,074 UART: [kat] ECC-384
915,861 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,726 UART: [idev] ++
1,172,894 UART: [idev] CDI.KEYID = 6
1,173,255 UART: [idev] SUBJECT.KEYID = 7
1,173,680 UART: [idev] UDS.KEYID = 0
1,181,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,707 UART: [ldev] SUBJECT.KEYID = 5
1,210,134 UART: [ldev] AUTHORITY.KEYID = 7
1,210,597 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,356 UART: [fwproc] Recv command 0x4d454153
1,286,383 >>> mbox cmd response data (12 bytes)
1,286,384 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,286,681 UART: [fwproc] Recv command 0x46574c44
1,287,414 UART: [fwproc] Recv'd Img size: 111944 bytes
2,557,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,591 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,746,064 >>> mbox cmd response: success
2,747,273 UART: [afmc] ++
2,747,441 UART: [afmc] CDI.KEYID = 6
2,747,804 UART: [afmc] SUBJECT.KEYID = 7
2,748,230 UART: [afmc] AUTHORITY.KEYID = 5
2,784,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,212 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,908 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,807 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,500 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,410 UART: [afmc] --
2,827,368 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,390 UART: [cold-reset] --
2,827,950 UART: [state] Locking Datavault
2,829,187 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,791 UART: [state] Locking ICCM
2,830,409 UART: [exit] Launching FMC @ 0x40000000
2,835,706 UART:
2,835,722 UART: Running Caliptra FMC ...
2,836,130 UART:
2,836,360 UART: [fmc] Received command: 0x1000000A
2,837,789 >>> mbox cmd response data (116 bytes)
2,837,790 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,819 UART: [fmc] Received command: 0x10000009
2,839,017 >>> mbox cmd response data (48 bytes)
2,839,018 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,047 UART: [fmc] Received command: 0x10000003
2,848,503 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,123 >>> mbox cmd response data (12 bytes)
1,140,124 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,593,620 >>> mbox cmd response: success
2,649,909 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,980 UART:
2,655,996 UART: Running Caliptra FMC ...
2,656,404 UART:
2,656,634 UART: [fmc] Received command: 0x1000000A
2,658,063 >>> mbox cmd response data (116 bytes)
2,658,064 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,093 UART: [fmc] Received command: 0x10000009
2,659,291 >>> mbox cmd response data (48 bytes)
2,659,292 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,659,321 UART: [fmc] Received command: 0x10000003
2,668,777 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
890,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,913 UART: [kat] ++
895,065 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,170,103 UART: [cold-reset] ++
1,170,647 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,198 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,096 UART: [fwproc] Wait for Commands...
1,280,669 UART: [fwproc] Recv command 0x4d454153
1,284,696 >>> mbox cmd response data (12 bytes)
1,284,697 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,284,762 UART: [fwproc] Recv command 0x46574c44
1,285,495 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,608 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,743,075 >>> mbox cmd response: success
2,744,092 UART: [afmc] ++
2,744,260 UART: [afmc] CDI.KEYID = 6
2,744,623 UART: [afmc] SUBJECT.KEYID = 7
2,745,049 UART: [afmc] AUTHORITY.KEYID = 5
2,780,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,807 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,503 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,402 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,095 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,717 UART: [afmc] --
2,823,727 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,823,749 UART: [cold-reset] --
2,824,499 UART: [state] Locking Datavault
2,825,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,312 UART: [state] Locking ICCM
2,826,772 UART: [exit] Launching FMC @ 0x40000000
2,832,069 UART:
2,832,085 UART: Running Caliptra FMC ...
2,832,493 UART:
2,832,723 UART: [fmc] Received command: 0x1000000A
2,834,152 >>> mbox cmd response data (116 bytes)
2,834,153 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,182 UART: [fmc] Received command: 0x10000009
2,835,380 >>> mbox cmd response data (48 bytes)
2,835,381 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,410 UART: [fmc] Received command: 0x10000003
2,844,866 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,580 >>> mbox cmd response data (12 bytes)
1,138,581 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,594,692 >>> mbox cmd response: success
2,650,857 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,657,336 UART:
2,657,352 UART: Running Caliptra FMC ...
2,657,760 UART:
2,657,990 UART: [fmc] Received command: 0x1000000A
2,659,419 >>> mbox cmd response data (116 bytes)
2,659,420 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,659,449 UART: [fmc] Received command: 0x10000009
2,660,647 >>> mbox cmd response data (48 bytes)
2,660,648 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,677 UART: [fmc] Received command: 0x10000003
2,670,133 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x4d454153
1,286,709 >>> mbox cmd response data (12 bytes)
1,286,710 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,287,001 UART: [fwproc] Recv command 0x46574c44
1,287,734 UART: [fwproc] Recv'd Img size: 111944 bytes
2,557,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,584,809 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,610,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,746,340 >>> mbox cmd response: success
2,747,487 UART: [afmc] ++
2,747,655 UART: [afmc] CDI.KEYID = 6
2,748,018 UART: [afmc] SUBJECT.KEYID = 7
2,748,444 UART: [afmc] AUTHORITY.KEYID = 5
2,783,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,800,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,801,194 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,806,890 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,812,789 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,818,482 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,826,446 UART: [afmc] --
2,827,482 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,827,504 UART: [cold-reset] --
2,828,416 UART: [state] Locking Datavault
2,829,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,829,959 UART: [state] Locking ICCM
2,830,469 UART: [exit] Launching FMC @ 0x40000000
2,835,766 UART:
2,835,782 UART: Running Caliptra FMC ...
2,836,190 UART:
2,836,420 UART: [fmc] Received command: 0x1000000A
2,837,849 >>> mbox cmd response data (116 bytes)
2,837,850 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,837,879 UART: [fmc] Received command: 0x10000009
2,839,077 >>> mbox cmd response data (48 bytes)
2,839,078 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,839,107 UART: [fmc] Received command: 0x10000003
2,848,563 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,643 >>> mbox cmd response data (12 bytes)
1,139,644 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,715 >>> mbox cmd response: success
2,649,230 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,191 UART:
2,655,207 UART: Running Caliptra FMC ...
2,655,615 UART:
2,655,845 UART: [fmc] Received command: 0x1000000A
2,657,274 >>> mbox cmd response data (116 bytes)
2,657,275 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,304 UART: [fmc] Received command: 0x10000009
2,658,502 >>> mbox cmd response data (48 bytes)
2,658,503 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,532 UART: [fmc] Received command: 0x10000003
2,667,988 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,990 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,226 UART:
192,591 UART: Running Caliptra ROM ...
193,798 UART:
193,953 UART: [state] CFI Enabled
262,791 UART: [state] LifecycleState = Unprovisioned
265,172 UART: [state] DebugLocked = No
266,824 UART: [state] WD Timer not started. Device not locked for debugging
271,562 UART: [kat] SHA2-256
453,471 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,983 UART: [kat] ++
465,573 UART: [kat] sha1
477,107 UART: [kat] SHA2-256
480,114 UART: [kat] SHA2-384
486,357 UART: [kat] SHA2-512-ACC
488,982 UART: [kat] ECC-384
3,775,964 UART: [kat] HMAC-384Kdf
3,795,741 UART: [kat] LMS
4,868,936 UART: [kat] --
4,873,221 UART: [cold-reset] ++
4,874,785 UART: [fht] FHT @ 0x50003400
4,886,473 UART: [idev] ++
4,887,145 UART: [idev] CDI.KEYID = 6
4,888,387 UART: [idev] SUBJECT.KEYID = 7
4,889,499 UART: [idev] UDS.KEYID = 0
4,915,195 UART: [idev] Erasing UDS.KEYID = 0
8,227,142 UART: [idev] Sha1 KeyId Algorithm
8,248,779 UART: [idev] --
8,252,510 UART: [ldev] ++
8,253,135 UART: [ldev] CDI.KEYID = 6
8,254,319 UART: [ldev] SUBJECT.KEYID = 5
8,255,488 UART: [ldev] AUTHORITY.KEYID = 7
8,256,722 UART: [ldev] FE.KEYID = 1
8,303,131 UART: [ldev] Erasing FE.KEYID = 1
11,639,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,950,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,967,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,983,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,999,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,018,270 UART: [ldev] --
14,022,136 UART: [fwproc] Wait for Commands...
14,024,472 UART: [fwproc] Recv command 0x46574c44
14,026,803 UART: Invalid Img size: 0 bytes
14,030,593 UART: ROM Fatal Error: 0x01020002
14,033,924 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,048 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,810,291 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,139 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,376 UART:
192,751 UART: Running Caliptra ROM ...
193,876 UART:
603,367 UART: [state] CFI Enabled
616,414 UART: [state] LifecycleState = Unprovisioned
618,759 UART: [state] DebugLocked = No
621,209 UART: [state] WD Timer not started. Device not locked for debugging
625,092 UART: [kat] SHA2-256
807,065 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,610 UART: [kat] ++
819,191 UART: [kat] sha1
829,313 UART: [kat] SHA2-256
832,371 UART: [kat] SHA2-384
837,588 UART: [kat] SHA2-512-ACC
840,204 UART: [kat] ECC-384
4,097,051 UART: [kat] HMAC-384Kdf
4,109,831 UART: [kat] LMS
5,183,016 UART: [kat] --
5,186,878 UART: [cold-reset] ++
5,188,655 UART: [fht] FHT @ 0x50003400
5,199,691 UART: [idev] ++
5,200,368 UART: [idev] CDI.KEYID = 6
5,201,527 UART: [idev] SUBJECT.KEYID = 7
5,203,006 UART: [idev] UDS.KEYID = 0
5,218,111 UART: [idev] Erasing UDS.KEYID = 0
8,492,103 UART: [idev] Sha1 KeyId Algorithm
8,515,436 UART: [idev] --
8,519,313 UART: [ldev] ++
8,519,875 UART: [ldev] CDI.KEYID = 6
8,521,107 UART: [ldev] SUBJECT.KEYID = 5
8,522,540 UART: [ldev] AUTHORITY.KEYID = 7
8,524,120 UART: [ldev] FE.KEYID = 1
8,536,338 UART: [ldev] Erasing FE.KEYID = 1
11,831,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,235 UART: [ldev] --
14,193,361 UART: [fwproc] Wait for Commands...
14,196,098 UART: [fwproc] Recv command 0x46574c44
14,198,361 UART: Invalid Img size: 0 bytes
14,202,181 UART: ROM Fatal Error: 0x01020002
14,205,489 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,163 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,011,216 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,794 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,093 UART:
192,491 UART: Running Caliptra ROM ...
193,568 UART:
193,713 UART: [state] CFI Enabled
265,577 UART: [state] LifecycleState = Unprovisioned
267,398 UART: [state] DebugLocked = No
268,747 UART: [state] WD Timer not started. Device not locked for debugging
271,556 UART: [kat] SHA2-256
450,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,284 UART: [kat] ++
462,843 UART: [kat] sha1
472,542 UART: [kat] SHA2-256
475,568 UART: [kat] SHA2-384
481,462 UART: [kat] SHA2-512-ACC
484,407 UART: [kat] ECC-384
2,929,639 UART: [kat] HMAC-384Kdf
2,953,908 UART: [kat] LMS
3,483,331 UART: [kat] --
3,488,836 UART: [cold-reset] ++
3,490,713 UART: [fht] FHT @ 0x50003400
3,501,691 UART: [idev] ++
3,502,258 UART: [idev] CDI.KEYID = 6
3,503,179 UART: [idev] SUBJECT.KEYID = 7
3,504,396 UART: [idev] UDS.KEYID = 0
3,525,881 UART: [idev] Erasing UDS.KEYID = 0
6,009,697 UART: [idev] Sha1 KeyId Algorithm
6,031,721 UART: [idev] --
6,035,101 UART: [ldev] ++
6,035,684 UART: [ldev] CDI.KEYID = 6
6,036,575 UART: [ldev] SUBJECT.KEYID = 5
6,037,797 UART: [ldev] AUTHORITY.KEYID = 7
6,039,032 UART: [ldev] FE.KEYID = 1
6,081,384 UART: [ldev] Erasing FE.KEYID = 1
8,587,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,094 UART: [ldev] --
10,397,931 UART: [fwproc] Wait for Commands...
10,400,521 UART: [fwproc] Recv command 0x46574c44
10,402,617 UART: Invalid Img size: 0 bytes
10,406,411 UART: ROM Fatal Error: 0x01020002
10,409,517 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,892 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,204 UART:
192,590 UART: Running Caliptra ROM ...
193,764 UART:
193,925 UART: [state] CFI Enabled
264,126 UART: [state] LifecycleState = Unprovisioned
266,064 UART: [state] DebugLocked = No
268,239 UART: [state] WD Timer not started. Device not locked for debugging
271,300 UART: [kat] SHA2-256
450,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,976 UART: [kat] ++
462,518 UART: [kat] sha1
475,074 UART: [kat] SHA2-256
478,080 UART: [kat] SHA2-384
483,512 UART: [kat] SHA2-512-ACC
486,456 UART: [kat] ECC-384
2,966,018 UART: [kat] HMAC-384Kdf
2,985,031 UART: [kat] LMS
3,514,500 UART: [kat] --
3,518,767 UART: [cold-reset] ++
3,521,237 UART: [fht] FHT @ 0x50003400
3,532,554 UART: [idev] ++
3,533,166 UART: [idev] CDI.KEYID = 6
3,534,054 UART: [idev] SUBJECT.KEYID = 7
3,535,162 UART: [idev] UDS.KEYID = 0
3,558,477 UART: [idev] Erasing UDS.KEYID = 0
6,040,059 UART: [idev] Sha1 KeyId Algorithm
6,063,245 UART: [idev] --
6,068,537 UART: [ldev] ++
6,069,110 UART: [ldev] CDI.KEYID = 6
6,070,019 UART: [ldev] SUBJECT.KEYID = 5
6,071,185 UART: [ldev] AUTHORITY.KEYID = 7
6,072,419 UART: [ldev] FE.KEYID = 1
6,114,127 UART: [ldev] Erasing FE.KEYID = 1
8,616,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,666 UART: [ldev] --
10,428,054 UART: [fwproc] Wait for Commands...
10,430,109 UART: [fwproc] Recv command 0x46574c44
10,432,156 UART: Invalid Img size: 0 bytes
10,435,300 UART: ROM Fatal Error: 0x01020002
10,438,397 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,993 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,206,588 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
4,440 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,567 UART:
192,939 UART: Running Caliptra ROM ...
194,107 UART:
603,650 UART: [state] CFI Enabled
617,722 UART: [state] LifecycleState = Unprovisioned
619,605 UART: [state] DebugLocked = No
621,251 UART: [state] WD Timer not started. Device not locked for debugging
625,051 UART: [kat] SHA2-256
804,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,741 UART: [kat] ++
816,325 UART: [kat] sha1
828,413 UART: [kat] SHA2-256
831,429 UART: [kat] SHA2-384
838,046 UART: [kat] SHA2-512-ACC
840,979 UART: [kat] ECC-384
3,282,293 UART: [kat] HMAC-384Kdf
3,295,654 UART: [kat] LMS
3,825,146 UART: [kat] --
3,830,319 UART: [cold-reset] ++
3,831,489 UART: [fht] FHT @ 0x50003400
3,842,029 UART: [idev] ++
3,842,593 UART: [idev] CDI.KEYID = 6
3,843,555 UART: [idev] SUBJECT.KEYID = 7
3,844,716 UART: [idev] UDS.KEYID = 0
3,862,202 UART: [idev] Erasing UDS.KEYID = 0
6,318,789 UART: [idev] Sha1 KeyId Algorithm
6,341,330 UART: [idev] --
6,345,123 UART: [ldev] ++
6,345,690 UART: [ldev] CDI.KEYID = 6
6,346,572 UART: [ldev] SUBJECT.KEYID = 5
6,347,732 UART: [ldev] AUTHORITY.KEYID = 7
6,349,071 UART: [ldev] FE.KEYID = 1
6,357,203 UART: [ldev] Erasing FE.KEYID = 1
8,832,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,516 UART: [ldev] --
10,622,816 UART: [fwproc] Wait for Commands...
10,624,525 UART: [fwproc] Recv command 0x46574c44
10,626,581 UART: Invalid Img size: 0 bytes
10,630,040 UART: ROM Fatal Error: 0x01020002
10,633,157 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
5,038 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,408,887 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,287 UART: [idev] ++
1,173,455 UART: [idev] CDI.KEYID = 6
1,173,816 UART: [idev] SUBJECT.KEYID = 7
1,174,241 UART: [idev] UDS.KEYID = 0
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,779 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,500 UART: [ldev] Erasing FE.KEYID = 1
1,242,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,176 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: Invalid Img size: 0 bytes
1,283,886 UART: ROM Fatal Error: 0x01020002
1,285,045 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,035 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,982 UART: [kat] ++
896,134 UART: [kat] sha1
900,528 UART: [kat] SHA2-256
902,468 UART: [kat] SHA2-384
905,075 UART: [kat] SHA2-512-ACC
906,976 UART: [kat] ECC-384
916,735 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,930 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,182,544 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,883 UART: [ldev] --
1,282,189 UART: [fwproc] Wait for Commands...
1,282,792 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: Invalid Img size: 0 bytes
1,284,311 UART: ROM Fatal Error: 0x01020002
1,285,470 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,996 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,252 UART: [kat] LMS
1,168,564 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,601 UART: [idev] ++
1,172,769 UART: [idev] CDI.KEYID = 6
1,173,130 UART: [idev] SUBJECT.KEYID = 7
1,173,555 UART: [idev] UDS.KEYID = 0
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,668 UART: [fwproc] Wait for Commands...
1,281,343 UART: [fwproc] Recv command 0x46574c44
1,282,072 UART: Invalid Img size: 0 bytes
1,282,816 UART: ROM Fatal Error: 0x01020002
1,283,975 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,641 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,979 UART: [ldev] ++
1,210,147 UART: [ldev] CDI.KEYID = 6
1,210,511 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,651 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: Invalid Img size: 0 bytes
1,285,147 UART: ROM Fatal Error: 0x01020002
1,286,306 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,184 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,150 UART: [kat] SHA2-512-ACC
906,051 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,339 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,619 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,732 UART: [fwproc] Wait for Commands...
1,281,365 UART: [fwproc] Recv command 0x46574c44
1,282,094 UART: Invalid Img size: 0 bytes
1,283,046 UART: ROM Fatal Error: 0x01020002
1,284,205 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,347 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,450 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,485 UART: [fwproc] Wait for Commands...
1,282,292 UART: [fwproc] Recv command 0x46574c44
1,283,021 UART: Invalid Img size: 0 bytes
1,283,703 UART: ROM Fatal Error: 0x01020002
1,284,862 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,796 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,122 UART:
192,509 UART: Running Caliptra ROM ...
193,739 UART:
193,895 UART: [state] CFI Enabled
263,386 UART: [state] LifecycleState = Unprovisioned
265,785 UART: [state] DebugLocked = No
267,033 UART: [state] WD Timer not started. Device not locked for debugging
271,414 UART: [kat] SHA2-256
453,339 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,858 UART: [kat] ++
465,398 UART: [kat] sha1
475,367 UART: [kat] SHA2-256
478,424 UART: [kat] SHA2-384
484,664 UART: [kat] SHA2-512-ACC
487,281 UART: [kat] ECC-384
3,778,025 UART: [kat] HMAC-384Kdf
3,804,858 UART: [kat] LMS
4,877,972 UART: [kat] --
4,882,903 UART: [cold-reset] ++
4,885,162 UART: [fht] FHT @ 0x50003400
4,896,189 UART: [idev] ++
4,896,864 UART: [idev] CDI.KEYID = 6
4,898,120 UART: [idev] SUBJECT.KEYID = 7
4,899,229 UART: [idev] UDS.KEYID = 0
4,931,523 UART: [idev] Erasing UDS.KEYID = 0
8,245,645 UART: [idev] Sha1 KeyId Algorithm
8,265,776 UART: [idev] CSR upload begun
8,271,276 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,575,891 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,592,207 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,608,319 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,624,303 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,648,887 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,794,826 UART: [idev] CSR uploaded
10,811,910 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,955,983 UART: [idev] --
10,956,635 UART: [ldev] ++
10,957,135 UART: [ldev] CDI.KEYID = 6
10,958,033 UART: [ldev] SUBJECT.KEYID = 5
10,959,119 UART: [ldev] AUTHORITY.KEYID = 7
10,960,421 UART: [ldev] FE.KEYID = 1
10,961,298 UART: [ldev] Erasing FE.KEYID = 1
14,193,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,506,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,522,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,538,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,554,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,575,141 UART: [ldev] --
16,579,537 UART: [fwproc] Wait for Commands...
16,581,359 UART: [fwproc] Recv command 0x46574c44
16,583,717 UART: [fwproc] Recv'd Img size: 114036 bytes
20,665,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,736,914 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,805,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,121,788 >>> mbox cmd response: success
21,126,240 UART: [afmc] ++
21,126,826 UART: [afmc] CDI.KEYID = 6
21,128,008 UART: [afmc] SUBJECT.KEYID = 7
21,129,171 UART: [afmc] AUTHORITY.KEYID = 5
24,491,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,788,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,790,954 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,807,158 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,823,444 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,839,151 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,862,308 UART: [afmc] --
26,865,576 UART: [cold-reset] --
26,869,824 UART: [state] Locking Datavault
26,876,100 UART: [state] Locking PCR0, PCR1 and PCR31
26,877,739 UART: [state] Locking ICCM
26,880,339 UART: [exit] Launching FMC @ 0x40000130
26,889,011 UART:
26,889,253 UART: Running Caliptra FMC ...
26,890,350 UART:
26,890,512 UART: [state] CFI Enabled
26,947,260 UART: [fht] FMC Alias Private Key: 7
29,285,482 UART: [art] Extend RT PCRs Done
29,286,705 UART: [art] Lock RT PCRs Done
29,288,151 UART: [art] Populate DV Done
29,293,396 UART: [fht] FMC Alias Private Key: 7
29,295,039 UART: [art] Derive CDI
29,295,854 UART: [art] Store in in slot 0x4
29,355,707 UART: [art] Derive Key Pair
29,356,743 UART: [art] Store priv key in slot 0x5
32,650,535 UART: [art] Derive Key Pair - Done
32,663,960 UART: [art] Signing Cert with AUTHO
32,665,321 UART: RITY.KEYID = 7
34,951,993 UART: [art] Erasing AUTHORITY.KEYID = 7
34,953,508 UART: [art] PUB.X = 01425F2BCA400B6CD57F9E066F5D7F817851F1899B033B529F2C02069E08958529A6585F94EC095F0929A1A6A8D79C6E
34,960,744 UART: [art] PUB.Y = 9B680B145941F29561FC8C6611A2B9BD8B5F67DBB803E7C69FADDBD35043AFD0CAA45ECEF15FEABD67F558FF5A9E5224
34,968,023 UART: [art] SIG.R = 616639166FFFEFC8B8B90ED55F6B5ACA61008BCE0C882FCEB59589A293E8D56C846935E31FC4D74063E5846C9CCC008A
34,975,355 UART: [art] SIG.S = DD605FD90BE871DF2A7912CB23E470A1699B200071B22557DED3F1CF6640463E2B15DEB97ABC4D6E6C029A69C881D50F
36,280,799 UART: Caliptra RT
36,281,511 UART: [state] CFI Enabled
36,443,251 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
10,479,800 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,693,001 >>> mbox cmd response: success
26,380,797 UART:
26,381,203 UART: Running Caliptra FMC ...
26,382,328 UART:
26,382,481 UART: [state] CFI Enabled
26,450,021 UART: [fht] FMC Alias Private Key: 7
28,787,576 UART: [art] Extend RT PCRs Done
28,788,804 UART: [art] Lock RT PCRs Done
28,790,624 UART: [art] Populate DV Done
28,796,082 UART: [fht] FMC Alias Private Key: 7
28,797,676 UART: [art] Derive CDI
28,798,410 UART: [art] Store in in slot 0x4
28,858,332 UART: [art] Derive Key Pair
28,859,397 UART: [art] Store priv key in slot 0x5
32,151,921 UART: [art] Derive Key Pair - Done
32,165,033 UART: [art] Signing Cert with AUTHO
32,166,342 UART: RITY.KEYID = 7
34,453,364 UART: [art] Erasing AUTHORITY.KEYID = 7
34,454,886 UART: [art] PUB.X = 00BE58AA2FB2E4B27E5E11CD2D0B34C26AE2FE6E46C6329CC14E9DEDEE4F6050BB03FD7C99E9C8711D25210B32CADB7F
34,462,128 UART: [art] PUB.Y = 3F29384CB8F8840D623280158BCD4998FF7E712875E4F1CAC41CE5199B0A0E9A63E8E022505C287B6B021778491A513B
34,469,390 UART: [art] SIG.R = 7DDECD358DF3EB5E4E2F398C4052824346393087648D5009FEE179AAD56500ABE62AB13A9219302DDAE914E879520091
34,476,722 UART: [art] SIG.S = 5E517D1E637BA5895CA58357FEFC36CBC192EDBA84A4853465E6F3F9A193A1A912F6287AC82A81BFC62386E7D096840A
35,781,960 UART: Caliptra RT
35,782,671 UART: [state] CFI Enabled
35,942,754 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,334 UART:
192,886 UART: Running Caliptra ROM ...
194,108 UART:
603,607 UART: [state] CFI Enabled
614,829 UART: [state] LifecycleState = Unprovisioned
617,199 UART: [state] DebugLocked = No
619,187 UART: [state] WD Timer not started. Device not locked for debugging
623,059 UART: [kat] SHA2-256
805,035 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,610 UART: [kat] ++
817,107 UART: [kat] sha1
827,542 UART: [kat] SHA2-256
830,597 UART: [kat] SHA2-384
835,735 UART: [kat] SHA2-512-ACC
838,334 UART: [kat] ECC-384
4,092,538 UART: [kat] HMAC-384Kdf
4,104,160 UART: [kat] LMS
5,177,326 UART: [kat] --
5,181,495 UART: [cold-reset] ++
5,183,108 UART: [fht] FHT @ 0x50003400
5,194,518 UART: [idev] ++
5,195,182 UART: [idev] CDI.KEYID = 6
5,196,339 UART: [idev] SUBJECT.KEYID = 7
5,197,870 UART: [idev] UDS.KEYID = 0
5,213,793 UART: [idev] Erasing UDS.KEYID = 0
8,488,589 UART: [idev] Sha1 KeyId Algorithm
8,507,457 UART: [idev] CSR upload begun
8,512,949 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,802,442 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,818,835 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,834,913 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,850,938 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,875,468 UART: [idev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
11,021,538 UART: [idev] CSR uploaded
11,038,752 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
11,182,122 UART: [idev] --
11,182,766 UART: [ldev] ++
11,183,255 UART: [ldev] CDI.KEYID = 6
11,184,122 UART: [ldev] SUBJECT.KEYID = 5
11,185,278 UART: [ldev] AUTHORITY.KEYID = 7
11,186,448 UART: [ldev] FE.KEYID = 1
11,187,322 UART: [ldev] Erasing FE.KEYID = 1
14,343,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,636,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,652,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,668,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,684,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,704,279 UART: [ldev] --
16,708,571 UART: [fwproc] Wait for Commands...
16,711,797 UART: [fwproc] Recv command 0x46574c44
16,714,105 UART: [fwproc] Recv'd Img size: 114036 bytes
20,789,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,859,766 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,928,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,245,285 >>> mbox cmd response: success
21,249,191 UART: [afmc] ++
21,249,766 UART: [afmc] CDI.KEYID = 6
21,250,867 UART: [afmc] SUBJECT.KEYID = 7
21,252,075 UART: [afmc] AUTHORITY.KEYID = 5
24,569,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,863,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,865,850 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,882,041 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,898,077 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,914,117 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,935,660 UART: [afmc] --
26,938,329 UART: [cold-reset] --
26,943,756 UART: [state] Locking Datavault
26,948,462 UART: [state] Locking PCR0, PCR1 and PCR31
26,950,107 UART: [state] Locking ICCM
26,952,092 UART: [exit] Launching FMC @ 0x40000130
26,960,761 UART:
26,960,985 UART: Running Caliptra FMC ...
26,962,078 UART:
26,962,232 UART: [state] CFI Enabled
26,970,483 UART: [fht] FMC Alias Private Key: 7
29,301,199 UART: [art] Extend RT PCRs Done
29,302,419 UART: [art] Lock RT PCRs Done
29,303,607 UART: [art] Populate DV Done
29,309,032 UART: [fht] FMC Alias Private Key: 7
29,310,673 UART: [art] Derive CDI
29,311,480 UART: [art] Store in in slot 0x4
29,354,334 UART: [art] Derive Key Pair
29,355,370 UART: [art] Store priv key in slot 0x5
32,597,013 UART: [art] Derive Key Pair - Done
32,610,076 UART: [art] Signing Cert with AUTHO
32,611,379 UART: RITY.KEYID = 7
34,890,716 UART: [art] Erasing AUTHORITY.KEYID = 7
34,892,252 UART: [art] PUB.X = B0DFFC059B0C5DA81266C4B786A1CD485FA33445B9EC802C24CDB71D48D978B5CB82DA520A6E00EDB5167D9820B2C7C4
34,899,496 UART: [art] PUB.Y = 311786C8B1879FFBCC7D920BCB8B80624DC93B16586F26E2A8E3BDB53B1E6A6E334EBFF1A2F97AC994C6E571481E1A95
34,906,720 UART: [art] SIG.R = F115A878095CA64737ACDEB706AD2823B30A64F68597130D00C2F38D3A0B985832F53A41990E8D8E012266D50134EBFF
34,914,096 UART: [art] SIG.S = 0CC213FA1252A40E30C6D12D2141F89E72980E4B35A049121ABC5DF254FB570D02F7AC6CE2C42F1C14D4E7F485DBA37E
36,219,689 UART: Caliptra RT
36,220,409 UART: [state] CFI Enabled
36,337,738 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
10,735,988 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,864,143 >>> mbox cmd response: success
26,508,624 UART:
26,509,039 UART: Running Caliptra FMC ...
26,510,200 UART:
26,510,348 UART: [state] CFI Enabled
26,518,549 UART: [fht] FMC Alias Private Key: 7
28,848,991 UART: [art] Extend RT PCRs Done
28,850,385 UART: [art] Lock RT PCRs Done
28,851,403 UART: [art] Populate DV Done
28,856,776 UART: [fht] FMC Alias Private Key: 7
28,858,431 UART: [art] Derive CDI
28,859,241 UART: [art] Store in in slot 0x4
28,901,396 UART: [art] Derive Key Pair
28,902,388 UART: [art] Store priv key in slot 0x5
32,143,793 UART: [art] Derive Key Pair - Done
32,156,434 UART: [art] Signing Cert with AUTHO
32,157,743 UART: RITY.KEYID = 7
34,437,091 UART: [art] Erasing AUTHORITY.KEYID = 7
34,438,608 UART: [art] PUB.X = 6A63E395C974D849F2F502C456A51B3701FB8DB41B2CB0DD51A941C311D23A1CF9FFDF3D73AF047943C2E3AB2793F6D1
34,445,820 UART: [art] PUB.Y = F6973CE4FDD55ADCEE45E41C11CEF861870541FD79513BDD8B56012AF3E310D26B4CD161DA29EE7E9AD3453918400784
34,453,085 UART: [art] SIG.R = D581BED559CEB9D57D6C1D02996E0E2B0DC743547579857EAF495D4C302B9AE97BE7F53E4FC36512B99B65DB8F5D763E
34,460,471 UART: [art] SIG.S = A7DF2BB65C63E505740DE8DC1ED5DEC07563B3D02F60F350296556D96C67C392498991ED05B461571F6062696272F2E0
35,766,218 UART: Caliptra RT
35,766,917 UART: [state] CFI Enabled
35,884,200 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,140 UART:
192,520 UART: Running Caliptra ROM ...
193,689 UART:
193,842 UART: [state] CFI Enabled
262,310 UART: [state] LifecycleState = Unprovisioned
264,179 UART: [state] DebugLocked = No
266,700 UART: [state] WD Timer not started. Device not locked for debugging
269,512 UART: [kat] SHA2-256
448,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,216 UART: [kat] ++
460,722 UART: [kat] sha1
472,300 UART: [kat] SHA2-256
475,309 UART: [kat] SHA2-384
480,534 UART: [kat] SHA2-512-ACC
483,467 UART: [kat] ECC-384
2,928,454 UART: [kat] HMAC-384Kdf
2,951,396 UART: [kat] LMS
3,480,841 UART: [kat] --
3,486,319 UART: [cold-reset] ++
3,487,826 UART: [fht] FHT @ 0x50003400
3,497,854 UART: [idev] ++
3,498,424 UART: [idev] CDI.KEYID = 6
3,499,362 UART: [idev] SUBJECT.KEYID = 7
3,500,573 UART: [idev] UDS.KEYID = 0
3,523,821 UART: [idev] Erasing UDS.KEYID = 0
6,004,522 UART: [idev] Sha1 KeyId Algorithm
6,024,456 UART: [idev] CSR upload begun
6,029,158 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,761,715 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,777,787 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,793,734 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,809,603 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,833,417 UART: [idev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
7,978,429 UART: [idev] CSR uploaded
7,996,524 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,140,595 UART: [idev] --
8,141,262 UART: [ldev] ++
8,141,760 UART: [ldev] CDI.KEYID = 6
8,142,637 UART: [ldev] SUBJECT.KEYID = 5
8,143,721 UART: [ldev] AUTHORITY.KEYID = 7
8,144,817 UART: [ldev] FE.KEYID = 1
8,145,652 UART: [ldev] Erasing FE.KEYID = 1
10,545,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,283,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,300,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,315,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,331,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,352,354 UART: [ldev] --
12,356,324 UART: [fwproc] Wait for Commands...
12,359,284 UART: [fwproc] Recv command 0x46574c44
12,361,382 UART: [fwproc] Recv'd Img size: 114360 bytes
15,760,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,835,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,904,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,223,582 >>> mbox cmd response: success
16,227,188 UART: [afmc] ++
16,227,771 UART: [afmc] CDI.KEYID = 6
16,228,663 UART: [afmc] SUBJECT.KEYID = 7
16,229,796 UART: [afmc] AUTHORITY.KEYID = 5
18,773,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,497,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,499,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,515,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,531,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,547,580 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,570,785 UART: [afmc] --
20,573,929 UART: [cold-reset] --
20,578,339 UART: [state] Locking Datavault
20,580,858 UART: [state] Locking PCR0, PCR1 and PCR31
20,582,506 UART: [state] Locking ICCM
20,585,062 UART: [exit] Launching FMC @ 0x40000130
20,593,511 UART:
20,593,746 UART: Running Caliptra FMC ...
20,594,770 UART:
20,594,916 UART: [state] CFI Enabled
20,654,515 UART: [fht] FMC Alias Private Key: 7
22,418,748 UART: [art] Extend RT PCRs Done
22,419,969 UART: [art] Lock RT PCRs Done
22,421,444 UART: [art] Populate DV Done
22,426,856 UART: [fht] FMC Alias Private Key: 7
22,428,567 UART: [art] Derive CDI
22,429,382 UART: [art] Store in in slot 0x4
22,486,853 UART: [art] Derive Key Pair
22,488,169 UART: [art] Store priv key in slot 0x5
24,950,644 UART: [art] Derive Key Pair - Done
24,963,473 UART: [art] Signing Cert with AUTHO
24,964,783 UART: RITY.KEYID = 7
26,675,957 UART: [art] Erasing AUTHORITY.KEYID = 7
26,677,462 UART: [art] PUB.X = 3D41D6C3188A7EA59C388F50359F5281572BE4458A34EDDBFE44930D6368D3FAFFF46C8356DDA6B238736BBFA452E307
26,684,747 UART: [art] PUB.Y = FB807EAD39AE98C0B674846123BEB52C70022CED5FDF663805FC5F3A74F97E443E0C0BAE0BBE4E001DEE6A2AA5655FB0
26,691,983 UART: [art] SIG.R = 95817A6A7E334F662DF0EC0D936074882F9292211FBF469B760D1B13644D9E24604C2F8ED46A766D4BDB303737989F13
26,699,378 UART: [art] SIG.S = A53B32824BFA8078020779F031ADAAAEBA35C91AC2CEE8DDD10FE4336178A9431E7474B370F95644AC798211700AAD66
27,678,297 UART: Caliptra RT
27,678,997 UART: [state] CFI Enabled
27,844,551 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,181 UART:
192,580 UART: Running Caliptra ROM ...
193,767 UART:
193,920 UART: [state] CFI Enabled
262,841 UART: [state] LifecycleState = Unprovisioned
264,716 UART: [state] DebugLocked = No
265,890 UART: [state] WD Timer not started. Device not locked for debugging
268,814 UART: [kat] SHA2-256
447,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,517 UART: [kat] ++
460,059 UART: [kat] sha1
471,327 UART: [kat] SHA2-256
474,347 UART: [kat] SHA2-384
481,028 UART: [kat] SHA2-512-ACC
483,960 UART: [kat] ECC-384
2,950,419 UART: [kat] HMAC-384Kdf
2,970,328 UART: [kat] LMS
3,499,784 UART: [kat] --
3,504,797 UART: [cold-reset] ++
3,507,108 UART: [fht] FHT @ 0x50003400
3,518,841 UART: [idev] ++
3,519,409 UART: [idev] CDI.KEYID = 6
3,520,316 UART: [idev] SUBJECT.KEYID = 7
3,521,532 UART: [idev] UDS.KEYID = 0
3,542,963 UART: [idev] Erasing UDS.KEYID = 0
6,026,217 UART: [idev] Sha1 KeyId Algorithm
6,047,399 UART: [idev] CSR upload begun
6,052,138 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,826 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,895 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,814 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,829,692 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,479 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,998,652 UART: [idev] CSR uploaded
8,016,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,160,793 UART: [idev] --
8,161,440 UART: [ldev] ++
8,161,940 UART: [ldev] CDI.KEYID = 6
8,162,849 UART: [ldev] SUBJECT.KEYID = 5
8,163,907 UART: [ldev] AUTHORITY.KEYID = 7
8,165,107 UART: [ldev] FE.KEYID = 1
8,165,955 UART: [ldev] Erasing FE.KEYID = 1
10,565,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,319,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,351,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,371,726 UART: [ldev] --
12,375,690 UART: [fwproc] Wait for Commands...
12,378,444 UART: [fwproc] Recv command 0x46574c44
12,380,542 UART: [fwproc] Recv'd Img size: 114360 bytes
15,787,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,860,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,928,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,247,694 >>> mbox cmd response: success
16,251,804 UART: [afmc] ++
16,252,388 UART: [afmc] CDI.KEYID = 6
16,253,297 UART: [afmc] SUBJECT.KEYID = 7
16,254,510 UART: [afmc] AUTHORITY.KEYID = 5
18,793,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,514,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,516,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,532,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,548,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,564,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,586,795 UART: [afmc] --
20,589,970 UART: [cold-reset] --
20,594,049 UART: [state] Locking Datavault
20,601,401 UART: [state] Locking PCR0, PCR1 and PCR31
20,603,043 UART: [state] Locking ICCM
20,604,171 UART: [exit] Launching FMC @ 0x40000130
20,612,599 UART:
20,612,879 UART: Running Caliptra FMC ...
20,613,991 UART:
20,614,157 UART: [state] CFI Enabled
20,676,357 UART: [fht] FMC Alias Private Key: 7
22,440,444 UART: [art] Extend RT PCRs Done
22,441,648 UART: [art] Lock RT PCRs Done
22,443,272 UART: [art] Populate DV Done
22,448,507 UART: [fht] FMC Alias Private Key: 7
22,450,138 UART: [art] Derive CDI
22,450,968 UART: [art] Store in in slot 0x4
22,509,416 UART: [art] Derive Key Pair
22,510,408 UART: [art] Store priv key in slot 0x5
24,973,560 UART: [art] Derive Key Pair - Done
24,986,449 UART: [art] Signing Cert with AUTHO
24,987,751 UART: RITY.KEYID = 7
26,699,696 UART: [art] Erasing AUTHORITY.KEYID = 7
26,701,197 UART: [art] PUB.X = EC1A370D5EB61921350B69FE73E5172D1E4EAAD39D9BD84F223C7B6319AD5C7BF067514C05A98106B06A3877C5FBAAD3
26,708,469 UART: [art] PUB.Y = D99FA7A4031D4B2C67A5CCB5C108C6A4BC41B672E40A5A5D4A9B1F2A1D1472EEB332541EE916CF568CA755D8281D07A2
26,715,757 UART: [art] SIG.R = BDCF01D55091C85DB02440185F2D47F41568CA04B885B400BC0C7D4E9C9A09B3533DA0A3CF82079BDABD78405CF714DA
26,723,094 UART: [art] SIG.S = 0BCA8321994A7689AACB1FF936FCB80AAD295379D3F6C991FD3AFB923EB9953C30DFF77A19599F9092E623CE4FEC0AC0
27,702,858 UART: Caliptra RT
27,703,563 UART: [state] CFI Enabled
27,867,372 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
7,667,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,813,414 >>> mbox cmd response: success
20,109,906 UART:
20,110,288 UART: Running Caliptra FMC ...
20,111,486 UART:
20,111,660 UART: [state] CFI Enabled
20,179,502 UART: [fht] FMC Alias Private Key: 7
21,943,826 UART: [art] Extend RT PCRs Done
21,945,043 UART: [art] Lock RT PCRs Done
21,946,852 UART: [art] Populate DV Done
21,952,326 UART: [fht] FMC Alias Private Key: 7
21,953,883 UART: [art] Derive CDI
21,954,703 UART: [art] Store in in slot 0x4
22,012,181 UART: [art] Derive Key Pair
22,013,232 UART: [art] Store priv key in slot 0x5
24,476,140 UART: [art] Derive Key Pair - Done
24,488,922 UART: [art] Signing Cert with AUTHO
24,490,233 UART: RITY.KEYID = 7
26,201,651 UART: [art] Erasing AUTHORITY.KEYID = 7
26,203,175 UART: [art] PUB.X = A624FCC7DB6A20991E6E422A18C808BFA27ACFA972C3A67E55F3F70AACAE6512D8FF5FBE73BE9892973200B9CA756AD8
26,210,425 UART: [art] PUB.Y = F9798DBA3C2C6B1B23D4DAAD704C6F73626D46D900BCD17C6A3FA0B56286489781748EDBAD2526CD473095A7A1703D0C
26,217,691 UART: [art] SIG.R = ED666B0A4DC0965C5CBE156B57852024DCAEFFF02C28DDBCEEE3CB6C698FB63C511FBF2D839DBE60B2B5845221FFB165
26,225,084 UART: [art] SIG.S = 2428DC4D0F605B4934EAABCEF96C4847C1046D73D521BE149962C72F485F50D58ADEB95B4A3DB07BD0678E0F8DB76064
27,203,703 UART: Caliptra RT
27,204,399 UART: [state] CFI Enabled
27,369,498 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,592 UART:
192,985 UART: Running Caliptra ROM ...
194,158 UART:
603,843 UART: [state] CFI Enabled
617,247 UART: [state] LifecycleState = Unprovisioned
619,110 UART: [state] DebugLocked = No
621,372 UART: [state] WD Timer not started. Device not locked for debugging
625,357 UART: [kat] SHA2-256
804,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,036 UART: [kat] ++
816,485 UART: [kat] sha1
826,597 UART: [kat] SHA2-256
829,651 UART: [kat] SHA2-384
836,915 UART: [kat] SHA2-512-ACC
839,897 UART: [kat] ECC-384
3,283,166 UART: [kat] HMAC-384Kdf
3,296,874 UART: [kat] LMS
3,826,402 UART: [kat] --
3,832,060 UART: [cold-reset] ++
3,834,652 UART: [fht] FHT @ 0x50003400
3,846,423 UART: [idev] ++
3,846,994 UART: [idev] CDI.KEYID = 6
3,847,911 UART: [idev] SUBJECT.KEYID = 7
3,849,126 UART: [idev] UDS.KEYID = 0
3,866,235 UART: [idev] Erasing UDS.KEYID = 0
6,322,392 UART: [idev] Sha1 KeyId Algorithm
6,343,395 UART: [idev] CSR upload begun
6,348,112 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,064,046 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,080,128 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,096,094 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,111,932 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,135,779 UART: [idev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
8,280,828 UART: [idev] CSR uploaded
8,299,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,442,864 UART: [idev] --
8,443,507 UART: [ldev] ++
8,444,004 UART: [ldev] CDI.KEYID = 6
8,444,887 UART: [ldev] SUBJECT.KEYID = 5
8,446,034 UART: [ldev] AUTHORITY.KEYID = 7
8,447,217 UART: [ldev] FE.KEYID = 1
8,448,094 UART: [ldev] Erasing FE.KEYID = 1
10,790,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,508,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,525,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,540,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,556,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,576,559 UART: [ldev] --
12,581,071 UART: [fwproc] Wait for Commands...
12,584,104 UART: [fwproc] Recv command 0x46574c44
12,586,144 UART: [fwproc] Recv'd Img size: 114360 bytes
15,988,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,064,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,133,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,450,742 >>> mbox cmd response: success
16,455,674 UART: [afmc] ++
16,456,266 UART: [afmc] CDI.KEYID = 6
16,457,176 UART: [afmc] SUBJECT.KEYID = 7
16,458,333 UART: [afmc] AUTHORITY.KEYID = 5
18,958,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,677,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,679,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,695,507 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,711,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,727,404 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,750,452 UART: [afmc] --
20,753,826 UART: [cold-reset] --
20,755,745 UART: [state] Locking Datavault
20,761,374 UART: [state] Locking PCR0, PCR1 and PCR31
20,763,014 UART: [state] Locking ICCM
20,765,648 UART: [exit] Launching FMC @ 0x40000130
20,774,094 UART:
20,774,331 UART: Running Caliptra FMC ...
20,775,430 UART:
20,775,587 UART: [state] CFI Enabled
20,783,686 UART: [fht] FMC Alias Private Key: 7
22,540,443 UART: [art] Extend RT PCRs Done
22,541,672 UART: [art] Lock RT PCRs Done
22,543,641 UART: [art] Populate DV Done
22,549,097 UART: [fht] FMC Alias Private Key: 7
22,550,628 UART: [art] Derive CDI
22,551,378 UART: [art] Store in in slot 0x4
22,593,754 UART: [art] Derive Key Pair
22,594,794 UART: [art] Store priv key in slot 0x5
25,021,547 UART: [art] Derive Key Pair - Done
25,034,864 UART: [art] Signing Cert with AUTHO
25,036,206 UART: RITY.KEYID = 7
26,741,283 UART: [art] Erasing AUTHORITY.KEYID = 7
26,742,784 UART: [art] PUB.X = 5C2E5B1C1F267490FF84B4F521B463E07B57D9A958BA67DF9121AC9BCD26270B5C5AD45985C410B50B22211AFAE13A47
26,750,078 UART: [art] PUB.Y = BAC511EEA974D5FBF731F43AC22D3518EC44DCBF9532D2A8CB85BBCBC54A7D0E565803DD74DFC131A5A9B2DB45D32815
26,757,375 UART: [art] SIG.R = ED2EFD1EB56DCEF8B0E17D3481A8DEDB1007D21E68AE64C75E75A4ED6ACA91FD30A53F4B63ABCE6BC588CF760222F7C0
26,764,773 UART: [art] SIG.S = 1A1C6A705389E5DECFD16028B60C8A6C9E58EDC65DF37388BD1527C26C418C1E80E8DF87DF524448E1690A96D27C47E9
27,743,538 UART: Caliptra RT
27,744,241 UART: [state] CFI Enabled
27,860,773 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
7,945,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,030,960 >>> mbox cmd response: success
20,277,045 UART:
20,277,456 UART: Running Caliptra FMC ...
20,278,580 UART:
20,278,748 UART: [state] CFI Enabled
20,286,570 UART: [fht] FMC Alias Private Key: 7
22,042,958 UART: [art] Extend RT PCRs Done
22,044,311 UART: [art] Lock RT PCRs Done
22,045,936 UART: [art] Populate DV Done
22,051,515 UART: [fht] FMC Alias Private Key: 7
22,053,121 UART: [art] Derive CDI
22,053,910 UART: [art] Store in in slot 0x4
22,096,297 UART: [art] Derive Key Pair
22,097,295 UART: [art] Store priv key in slot 0x5
24,523,726 UART: [art] Derive Key Pair - Done
24,536,676 UART: [art] Signing Cert with AUTHO
24,537,984 UART: RITY.KEYID = 7
26,243,430 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,982 UART: [art] PUB.X = 297789D4CCE8D487B95AF28214EDCEB88354BA75C18C3A3DF6C7E4577289CAF320D87409050783B993CFE2C1BC32295E
26,252,243 UART: [art] PUB.Y = 367B9A228B27E27A1A113F925BEB78A00B682825F1CC80FF642CB8AAC8C4CEE7DBA16C3FF2D6B0F8C2F54F617E7EF86E
26,259,516 UART: [art] SIG.R = 2D49661658F256BEF4A6A177972FD38A9191C41568007864709E6713A36754CA5149BB86F041A15E03C3C44D30AAC80F
26,266,857 UART: [art] SIG.S = 809B202A8073FC31AC0B5F16441651F4B63686A0F9649E1735CB8B654B6EEA6DF06750DCFDB8FC661CF3556A01BBA9F9
27,246,009 UART: Caliptra RT
27,246,701 UART: [state] CFI Enabled
27,364,517 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,163 UART: [idev] Erasing UDS.KEYID = 0
1,197,913 UART: [idev] Sha1 KeyId Algorithm
1,206,223 UART: [idev] CSR upload begun
1,208,002 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,863 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,571 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,456 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,162 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,591 UART: [idev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
1,296,088 UART: [idev] CSR uploaded
1,299,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,299,302 UART: [idev] --
1,300,311 UART: [ldev] ++
1,300,479 UART: [ldev] CDI.KEYID = 6
1,300,843 UART: [ldev] SUBJECT.KEYID = 5
1,301,270 UART: [ldev] AUTHORITY.KEYID = 7
1,301,733 UART: [ldev] FE.KEYID = 1
1,306,913 UART: [ldev] Erasing FE.KEYID = 1
1,333,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,667 UART: [ldev] --
1,373,033 UART: [fwproc] Wait for Commands...
1,373,674 UART: [fwproc] Recv command 0x46574c44
1,374,407 UART: [fwproc] Recv'd Img size: 114360 bytes
2,671,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,957 >>> mbox cmd response: success
2,866,088 UART: [afmc] ++
2,866,256 UART: [afmc] CDI.KEYID = 6
2,866,619 UART: [afmc] SUBJECT.KEYID = 7
2,867,045 UART: [afmc] AUTHORITY.KEYID = 5
2,901,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,723 UART: [afmc] --
2,945,631 UART: [cold-reset] --
2,946,243 UART: [state] Locking Datavault
2,947,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,206 UART: [state] Locking ICCM
2,948,822 UART: [exit] Launching FMC @ 0x40000130
2,954,151 UART:
2,954,167 UART: Running Caliptra FMC ...
2,954,575 UART:
2,954,629 UART: [state] CFI Enabled
2,964,922 UART: [fht] FMC Alias Private Key: 7
3,073,021 UART: [art] Extend RT PCRs Done
3,073,449 UART: [art] Lock RT PCRs Done
3,074,771 UART: [art] Populate DV Done
3,083,144 UART: [fht] FMC Alias Private Key: 7
3,084,202 UART: [art] Derive CDI
3,084,482 UART: [art] Store in in slot 0x4
3,169,895 UART: [art] Derive Key Pair
3,170,255 UART: [art] Store priv key in slot 0x5
3,183,353 UART: [art] Derive Key Pair - Done
3,198,395 UART: [art] Signing Cert with AUTHO
3,198,875 UART: RITY.KEYID = 7
3,214,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,826 UART: [art] PUB.X = EF1824FC49BB9839A376880A658702C64D367BC2E18797ACB80C8221A4AA67A21771579E3E0A6752AD1E1FE90148CEE3
3,221,583 UART: [art] PUB.Y = D26C245AF87F6E5B2530EA9D269D05FB1E2B2FFB91587353B671A390B5435F32A01F5E2E8E53063A7A4B388748EDAF85
3,228,533 UART: [art] SIG.R = FE493C6CA1C4C0E83351876E7379A45182DB7A872325B24B0A78977A39F46AD25758743A5435C24184BD541BCD4A5EBE
3,235,300 UART: [art] SIG.S = 1F3E03CD5237CCD7A1AC4DBC7D23B5D0E8FA9D9097FA3892B310E2653E73E898786B6B0729B94D101806BD45E1BA53DA
3,259,182 UART: Caliptra RT
3,259,436 UART: [state] CFI Enabled
3,366,674 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,642,046 >>> mbox cmd response: success
2,704,154 UART:
2,704,170 UART: Running Caliptra FMC ...
2,704,578 UART:
2,704,632 UART: [state] CFI Enabled
2,715,359 UART: [fht] FMC Alias Private Key: 7
2,823,232 UART: [art] Extend RT PCRs Done
2,823,660 UART: [art] Lock RT PCRs Done
2,825,454 UART: [art] Populate DV Done
2,833,463 UART: [fht] FMC Alias Private Key: 7
2,834,473 UART: [art] Derive CDI
2,834,753 UART: [art] Store in in slot 0x4
2,920,554 UART: [art] Derive Key Pair
2,920,914 UART: [art] Store priv key in slot 0x5
2,934,512 UART: [art] Derive Key Pair - Done
2,949,316 UART: [art] Signing Cert with AUTHO
2,949,796 UART: RITY.KEYID = 7
2,965,268 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,033 UART: [art] PUB.X = B89E96F7C1FAF864C16C708325394F65A83F666F52743F5E2ECE3E07F18EFA4EF7E48326EDBBD059FEFD085B31594B47
2,972,809 UART: [art] PUB.Y = 05DC885EDB0AEEFCF82365963A162CD29BAD88FA99F1136224243AFCA47E1777E26BA51364ED899A74BA9E8946259154
2,979,759 UART: [art] SIG.R = ED3ECE4AC10DE44AF9B9C8EC513C74FF8B3692973D4E8708C295864F91F0361CB5D0B6043F056D6127B698F036D2F6DB
2,986,527 UART: [art] SIG.S = 9F024CF2496C38A6933EB979D651C6EB1831A47E3331C05E073E81681F86AE68F0A4E2C32796FDBBE8A805AECCE0E65C
3,009,959 UART: Caliptra RT
3,010,213 UART: [state] CFI Enabled
3,117,322 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,895 UART: [kat] SHA2-512-ACC
906,796 UART: [kat] ECC-384
916,767 UART: [kat] HMAC-384Kdf
921,389 UART: [kat] LMS
1,169,701 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] CSR upload begun
1,209,733 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,652 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,360 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,245 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,951 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,380 UART: [idev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
1,297,877 UART: [idev] CSR uploaded
1,300,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,301,091 UART: [idev] --
1,302,080 UART: [ldev] ++
1,302,248 UART: [ldev] CDI.KEYID = 6
1,302,612 UART: [ldev] SUBJECT.KEYID = 5
1,303,039 UART: [ldev] AUTHORITY.KEYID = 7
1,303,502 UART: [ldev] FE.KEYID = 1
1,308,700 UART: [ldev] Erasing FE.KEYID = 1
1,335,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,642 UART: [ldev] --
1,375,008 UART: [fwproc] Wait for Commands...
1,375,767 UART: [fwproc] Recv command 0x46574c44
1,376,500 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,956 >>> mbox cmd response: success
2,866,993 UART: [afmc] ++
2,867,161 UART: [afmc] CDI.KEYID = 6
2,867,524 UART: [afmc] SUBJECT.KEYID = 7
2,867,950 UART: [afmc] AUTHORITY.KEYID = 5
2,903,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,712 UART: [afmc] --
2,947,770 UART: [cold-reset] --
2,948,742 UART: [state] Locking Datavault
2,949,849 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,453 UART: [state] Locking ICCM
2,950,907 UART: [exit] Launching FMC @ 0x40000130
2,956,236 UART:
2,956,252 UART: Running Caliptra FMC ...
2,956,660 UART:
2,956,803 UART: [state] CFI Enabled
2,967,310 UART: [fht] FMC Alias Private Key: 7
3,075,765 UART: [art] Extend RT PCRs Done
3,076,193 UART: [art] Lock RT PCRs Done
3,077,947 UART: [art] Populate DV Done
3,085,990 UART: [fht] FMC Alias Private Key: 7
3,087,088 UART: [art] Derive CDI
3,087,368 UART: [art] Store in in slot 0x4
3,173,091 UART: [art] Derive Key Pair
3,173,451 UART: [art] Store priv key in slot 0x5
3,186,863 UART: [art] Derive Key Pair - Done
3,201,895 UART: [art] Signing Cert with AUTHO
3,202,375 UART: RITY.KEYID = 7
3,217,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,206 UART: [art] PUB.X = 970136490F031E5C3CC3BA12C7E2B6DF8C7935989BD693ED25E0F418E4E9A78825079C7CF2E9751969D888522F49EE47
3,224,962 UART: [art] PUB.Y = 905846BA03C2E80A18B075D5AB5FBC4C014987727731A64333C77827A987E70FA97CA28FEDF210E5C94C4B27EC2ECDD1
3,231,908 UART: [art] SIG.R = 066D40E9D359E1FA51B6AA0BE8EB193370E2E936F0D7F6FD3DF22568EB28A22C8EEEDBD11B8B02F80FB83F09C2A3412C
3,238,683 UART: [art] SIG.S = C1052688662DBC8496EC39CB3F41448A6C712F97FD2E69288B205A0F31BB89C6D6329B892A70751FF5C135128BE7F690
3,261,924 UART: Caliptra RT
3,262,270 UART: [state] CFI Enabled
3,371,106 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,642,903 >>> mbox cmd response: success
2,705,327 UART:
2,705,343 UART: Running Caliptra FMC ...
2,705,751 UART:
2,705,894 UART: [state] CFI Enabled
2,716,403 UART: [fht] FMC Alias Private Key: 7
2,824,124 UART: [art] Extend RT PCRs Done
2,824,552 UART: [art] Lock RT PCRs Done
2,825,898 UART: [art] Populate DV Done
2,834,289 UART: [fht] FMC Alias Private Key: 7
2,835,451 UART: [art] Derive CDI
2,835,731 UART: [art] Store in in slot 0x4
2,921,058 UART: [art] Derive Key Pair
2,921,418 UART: [art] Store priv key in slot 0x5
2,934,728 UART: [art] Derive Key Pair - Done
2,949,527 UART: [art] Signing Cert with AUTHO
2,950,007 UART: RITY.KEYID = 7
2,965,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,084 UART: [art] PUB.X = 43841B412B217CE6D7769815CA8231BAB8CBE7D05231873D910C3770DDF97C2EA57CE8B0A2EC81207DC58D9970B3ED11
2,972,857 UART: [art] PUB.Y = F763B8E15CFE114DA5B29B21E1D2D3719A376CB3C69E6C1E67256B9C8E267700AD42961E7AB83F8EA50A18F4CCFCE4A2
2,979,798 UART: [art] SIG.R = 96E1629DEF739FBF872E8EE73C5E95AA99A777EDDEF6BA9517882551372BBB1B8AF2D0F712ED431341D7394ECB6859B2
2,986,580 UART: [art] SIG.S = 90C4385E006024B0E992EC009C126E04F4488DC5317AEC5E19AFE6E932FEC834D67FE1245010D11F2574E5D74A833B2D
3,009,916 UART: Caliptra RT
3,010,262 UART: [state] CFI Enabled
3,117,803 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,173,129 UART: [idev] ++
1,173,297 UART: [idev] CDI.KEYID = 6
1,173,658 UART: [idev] SUBJECT.KEYID = 7
1,174,083 UART: [idev] UDS.KEYID = 0
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] CSR upload begun
1,209,044 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,091 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,799 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,684 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,390 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,819 UART: [idev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
1,297,316 UART: [idev] CSR uploaded
1,300,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,530 UART: [idev] --
1,301,619 UART: [ldev] ++
1,301,787 UART: [ldev] CDI.KEYID = 6
1,302,151 UART: [ldev] SUBJECT.KEYID = 5
1,302,578 UART: [ldev] AUTHORITY.KEYID = 7
1,303,041 UART: [ldev] FE.KEYID = 1
1,308,119 UART: [ldev] Erasing FE.KEYID = 1
1,334,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,681 UART: [ldev] --
1,374,053 UART: [fwproc] Wait for Commands...
1,374,652 UART: [fwproc] Recv command 0x46574c44
1,375,385 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,981 >>> mbox cmd response: success
2,867,190 UART: [afmc] ++
2,867,358 UART: [afmc] CDI.KEYID = 6
2,867,721 UART: [afmc] SUBJECT.KEYID = 7
2,868,147 UART: [afmc] AUTHORITY.KEYID = 5
2,903,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,293 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,022 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,905 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,675 UART: [afmc] --
2,946,743 UART: [cold-reset] --
2,947,317 UART: [state] Locking Datavault
2,948,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,970 UART: [state] Locking ICCM
2,949,444 UART: [exit] Launching FMC @ 0x40000130
2,954,773 UART:
2,954,789 UART: Running Caliptra FMC ...
2,955,197 UART:
2,955,251 UART: [state] CFI Enabled
2,965,832 UART: [fht] FMC Alias Private Key: 7
3,073,647 UART: [art] Extend RT PCRs Done
3,074,075 UART: [art] Lock RT PCRs Done
3,075,521 UART: [art] Populate DV Done
3,083,710 UART: [fht] FMC Alias Private Key: 7
3,084,656 UART: [art] Derive CDI
3,084,936 UART: [art] Store in in slot 0x4
3,170,425 UART: [art] Derive Key Pair
3,170,785 UART: [art] Store priv key in slot 0x5
3,184,303 UART: [art] Derive Key Pair - Done
3,198,699 UART: [art] Signing Cert with AUTHO
3,199,179 UART: RITY.KEYID = 7
3,214,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,134 UART: [art] PUB.X = 051FCF76775B0B0ADF2EF994FE43ED80D93C9CFD5D192F8155CFAA5DD4A85037E2C59A7BEE0992508FAF495F00578E00
3,221,864 UART: [art] PUB.Y = 0DF57EEF1BE5439F04EA1E39F71FCB4A00FA7DFB6160EB625FD7E4BE94EC6A7E479CAE74DB13E732503CA37DF036EE42
3,228,812 UART: [art] SIG.R = 3B3B57FF05B1D3202AC00763634CF4156936674BC83347C568901F409A83879603C6CDDA13081B17DED75AAA5167837C
3,235,564 UART: [art] SIG.S = 7BF11C4B21EDC976BEFA5DF286730748933ACD034562E1828F6A07275499081E5B582CA1DBD3E9344224A57FFA34DDC8
3,259,373 UART: Caliptra RT
3,259,627 UART: [state] CFI Enabled
3,367,153 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,320 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,642,042 >>> mbox cmd response: success
2,704,460 UART:
2,704,476 UART: Running Caliptra FMC ...
2,704,884 UART:
2,704,938 UART: [state] CFI Enabled
2,715,469 UART: [fht] FMC Alias Private Key: 7
2,822,808 UART: [art] Extend RT PCRs Done
2,823,236 UART: [art] Lock RT PCRs Done
2,824,566 UART: [art] Populate DV Done
2,832,835 UART: [fht] FMC Alias Private Key: 7
2,833,887 UART: [art] Derive CDI
2,834,167 UART: [art] Store in in slot 0x4
2,919,780 UART: [art] Derive Key Pair
2,920,140 UART: [art] Store priv key in slot 0x5
2,933,112 UART: [art] Derive Key Pair - Done
2,947,962 UART: [art] Signing Cert with AUTHO
2,948,442 UART: RITY.KEYID = 7
2,963,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,535 UART: [art] PUB.X = 94E77FC69D7DA7073DFB5803E7F6EF9CD0A9A46325FE1F3EC75A0D04C95E1CA24B8400E99C3093B00F159F2104DBBB3A
2,971,281 UART: [art] PUB.Y = E7782DE1F6FEDFAAFE8C9B83E3B1686FD7BAA1683F7B2F471252D459252C2D83E05B0AF42F37607BD182176D1E8E05F8
2,978,239 UART: [art] SIG.R = E39239CA418140B76210F57F874B6CE3CB469F600D5B67E87003DE37BCAE5B36E8CD3D07A1ECCAF5B1B15E094FC1D597
2,985,011 UART: [art] SIG.S = 05FAFD2DDDC35992690261EED1C36E53192111BA3D1AD472FF89C7B303EB21C403705744805F2A5C57D3EEE6064FE632
3,009,521 UART: Caliptra RT
3,009,775 UART: [state] CFI Enabled
3,117,609 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,199,306 UART: [idev] Sha1 KeyId Algorithm
1,207,668 UART: [idev] CSR upload begun
1,209,447 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,122 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,830 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,715 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,421 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,850 UART: [idev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
1,297,347 UART: [idev] CSR uploaded
1,300,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,561 UART: [idev] --
1,301,510 UART: [ldev] ++
1,301,678 UART: [ldev] CDI.KEYID = 6
1,302,042 UART: [ldev] SUBJECT.KEYID = 5
1,302,469 UART: [ldev] AUTHORITY.KEYID = 7
1,302,932 UART: [ldev] FE.KEYID = 1
1,308,390 UART: [ldev] Erasing FE.KEYID = 1
1,334,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,866 UART: [ldev] --
1,374,256 UART: [fwproc] Wait for Commands...
1,375,077 UART: [fwproc] Recv command 0x46574c44
1,375,810 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,866,346 >>> mbox cmd response: success
2,867,521 UART: [afmc] ++
2,867,689 UART: [afmc] CDI.KEYID = 6
2,868,052 UART: [afmc] SUBJECT.KEYID = 7
2,868,478 UART: [afmc] AUTHORITY.KEYID = 5
2,904,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,720 UART: [afmc] --
2,947,784 UART: [cold-reset] --
2,948,412 UART: [state] Locking Datavault
2,949,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,063 UART: [state] Locking ICCM
2,950,505 UART: [exit] Launching FMC @ 0x40000130
2,955,834 UART:
2,955,850 UART: Running Caliptra FMC ...
2,956,258 UART:
2,956,401 UART: [state] CFI Enabled
2,967,080 UART: [fht] FMC Alias Private Key: 7
3,075,063 UART: [art] Extend RT PCRs Done
3,075,491 UART: [art] Lock RT PCRs Done
3,077,159 UART: [art] Populate DV Done
3,085,322 UART: [fht] FMC Alias Private Key: 7
3,086,262 UART: [art] Derive CDI
3,086,542 UART: [art] Store in in slot 0x4
3,172,355 UART: [art] Derive Key Pair
3,172,715 UART: [art] Store priv key in slot 0x5
3,185,981 UART: [art] Derive Key Pair - Done
3,201,268 UART: [art] Signing Cert with AUTHO
3,201,748 UART: RITY.KEYID = 7
3,217,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,933 UART: [art] PUB.X = AE02ACB59935B641428BE4BDF53B8A696084FE2F95B0EA89B474D76CA7E48220770D90095403AC30516036C23DAF3364
3,224,691 UART: [art] PUB.Y = 5EE477140E5CDDC1A4EA68D57DE96D4C1F96D692156533EC3E7FB41FF59570A6F97A7849F44DA333F8D8982BD26D71BA
3,231,650 UART: [art] SIG.R = 1312624D147B612C973476F8CE5FCA348472E76882180E1E2E42853083201E4F34697D5E8C32F89259D9DCAF2BD598F8
3,238,409 UART: [art] SIG.S = 45BC758A8A1168D9F728EB3FB0E0482AC66F607142D342C54FF880C0B49D8B924C4F590C310E3FE446A09DABE48BDD57
3,262,602 UART: Caliptra RT
3,262,948 UART: [state] CFI Enabled
3,371,198 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,640,677 >>> mbox cmd response: success
2,703,931 UART:
2,703,947 UART: Running Caliptra FMC ...
2,704,355 UART:
2,704,498 UART: [state] CFI Enabled
2,715,131 UART: [fht] FMC Alias Private Key: 7
2,822,830 UART: [art] Extend RT PCRs Done
2,823,258 UART: [art] Lock RT PCRs Done
2,824,870 UART: [art] Populate DV Done
2,833,123 UART: [fht] FMC Alias Private Key: 7
2,834,221 UART: [art] Derive CDI
2,834,501 UART: [art] Store in in slot 0x4
2,920,578 UART: [art] Derive Key Pair
2,920,938 UART: [art] Store priv key in slot 0x5
2,933,874 UART: [art] Derive Key Pair - Done
2,948,583 UART: [art] Signing Cert with AUTHO
2,949,063 UART: RITY.KEYID = 7
2,963,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,738 UART: [art] PUB.X = D2F082215D9BA93EF83606B47B16B8217E7341496923F97C2C0D96F39A1F75A62576D6D2F516EA857E5A1F287431B445
2,971,496 UART: [art] PUB.Y = E26539096F1659367602ED8260F61789923BC1466407494EE0B41450341EDBB514A647C878EDB0691FB884CE71282542
2,978,421 UART: [art] SIG.R = D3EEDEF14F1D78FEDE97431871021300918AEF92151A1CD380737FB8DB53E94811E401D3865B6ED3FB349097DF723743
2,985,165 UART: [art] SIG.S = D6E7E737077A12E3A7E0EB8323B709800E3BC7578C41E00F038B3771A63B3D8E003B50085BC5BB8F73BB2C3241B611CB
3,007,756 UART: Caliptra RT
3,008,102 UART: [state] CFI Enabled
3,115,869 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,182,421 UART: [idev] Erasing UDS.KEYID = 0
1,199,833 UART: [idev] Sha1 KeyId Algorithm
1,208,109 UART: [idev] CSR upload begun
1,209,888 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,369 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,077 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,962 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,668 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,097 UART: [idev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
1,297,594 UART: [idev] CSR uploaded
1,300,639 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,808 UART: [idev] --
1,301,877 UART: [ldev] ++
1,302,045 UART: [ldev] CDI.KEYID = 6
1,302,409 UART: [ldev] SUBJECT.KEYID = 5
1,302,836 UART: [ldev] AUTHORITY.KEYID = 7
1,303,299 UART: [ldev] FE.KEYID = 1
1,308,115 UART: [ldev] Erasing FE.KEYID = 1
1,334,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,457 UART: [ldev] --
1,373,969 UART: [fwproc] Wait for Commands...
1,374,740 UART: [fwproc] Recv command 0x46574c44
1,375,473 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,749 >>> mbox cmd response: success
2,867,018 UART: [afmc] ++
2,867,186 UART: [afmc] CDI.KEYID = 6
2,867,549 UART: [afmc] SUBJECT.KEYID = 7
2,867,975 UART: [afmc] AUTHORITY.KEYID = 5
2,903,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,045 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,764 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,643 UART: [afmc] --
2,946,545 UART: [cold-reset] --
2,947,639 UART: [state] Locking Datavault
2,948,878 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,482 UART: [state] Locking ICCM
2,950,090 UART: [exit] Launching FMC @ 0x40000130
2,955,419 UART:
2,955,435 UART: Running Caliptra FMC ...
2,955,843 UART:
2,955,897 UART: [state] CFI Enabled
2,966,318 UART: [fht] FMC Alias Private Key: 7
3,073,933 UART: [art] Extend RT PCRs Done
3,074,361 UART: [art] Lock RT PCRs Done
3,075,979 UART: [art] Populate DV Done
3,083,940 UART: [fht] FMC Alias Private Key: 7
3,085,006 UART: [art] Derive CDI
3,085,286 UART: [art] Store in in slot 0x4
3,170,949 UART: [art] Derive Key Pair
3,171,309 UART: [art] Store priv key in slot 0x5
3,184,443 UART: [art] Derive Key Pair - Done
3,199,433 UART: [art] Signing Cert with AUTHO
3,199,913 UART: RITY.KEYID = 7
3,215,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,896 UART: [art] PUB.X = 8533100F359C69C8C2726EA31BD20C027932248768269C6D6A3CA38F3C940C6E3FDD5BCC70F2D3C9E8CE15A83764EF9B
3,222,660 UART: [art] PUB.Y = 5F4B9BD5A03D5579BC0859EBA677106B797401AE45FB307A90FB0B330FB84DF36DF36480470B8AE4018F0DEDCA63AED0
3,229,603 UART: [art] SIG.R = 18F763565BDE012AD261C2818F3DD68383BA8EDF603965C296525A88CE92D674BA0009539A8CBD0DCC35A775A975BC14
3,236,346 UART: [art] SIG.S = 8FB328F004BC5FEC18C6D06156CB7A51606D0C42AD9898DADC0F66FCB6CE52114446D0B7D5635D909B73E8C931D7BDE4
3,260,448 UART: Caliptra RT
3,260,702 UART: [state] CFI Enabled
3,368,608 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,374 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,502 >>> mbox cmd response: success
2,702,904 UART:
2,702,920 UART: Running Caliptra FMC ...
2,703,328 UART:
2,703,382 UART: [state] CFI Enabled
2,713,879 UART: [fht] FMC Alias Private Key: 7
2,822,306 UART: [art] Extend RT PCRs Done
2,822,734 UART: [art] Lock RT PCRs Done
2,824,460 UART: [art] Populate DV Done
2,832,741 UART: [fht] FMC Alias Private Key: 7
2,833,893 UART: [art] Derive CDI
2,834,173 UART: [art] Store in in slot 0x4
2,919,822 UART: [art] Derive Key Pair
2,920,182 UART: [art] Store priv key in slot 0x5
2,933,090 UART: [art] Derive Key Pair - Done
2,947,790 UART: [art] Signing Cert with AUTHO
2,948,270 UART: RITY.KEYID = 7
2,963,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,835 UART: [art] PUB.X = 15BFCECF1D5983D1795027CAEF2E2EED471696C70663D7736929FD1BFA6271E4A12B3863E87F6C29208B1830997CB312
2,970,604 UART: [art] PUB.Y = 4CC49114954996531FADA9A6C2582B7CEC9B00D6A7A5205789E1CA1D967DBB5703EE1607FF537E746070FAAC769684E2
2,977,530 UART: [art] SIG.R = 852113A0E1D4C9A36D5ACDC8D57AD762AB0E1E88BF5A5584584BF8223169E3C31550A3D6AE2AE49EE76F8C77764A17AE
2,984,309 UART: [art] SIG.S = 38D0D4682073C22BE3F852E8614F9AF004B563CDF16B23323C3506260AC830A3D432FABADDD41CD3BE1E6D38A5F58180
3,008,137 UART: Caliptra RT
3,008,391 UART: [state] CFI Enabled
3,116,523 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,789 UART: [kat] HMAC-384Kdf
921,545 UART: [kat] LMS
1,169,857 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,182,274 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,207,788 UART: [idev] CSR upload begun
1,209,567 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,998 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,706 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,591 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,297 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,726 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,223 UART: [idev] CSR uploaded
1,300,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,437 UART: [idev] --
1,301,568 UART: [ldev] ++
1,301,736 UART: [ldev] CDI.KEYID = 6
1,302,100 UART: [ldev] SUBJECT.KEYID = 5
1,302,527 UART: [ldev] AUTHORITY.KEYID = 7
1,302,990 UART: [ldev] FE.KEYID = 1
1,308,096 UART: [ldev] Erasing FE.KEYID = 1
1,334,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,926 UART: [ldev] --
1,374,408 UART: [fwproc] Wait for Commands...
1,375,197 UART: [fwproc] Recv command 0x46574c44
1,375,930 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,722 >>> mbox cmd response: success
2,866,811 UART: [afmc] ++
2,866,979 UART: [afmc] CDI.KEYID = 6
2,867,342 UART: [afmc] SUBJECT.KEYID = 7
2,867,768 UART: [afmc] AUTHORITY.KEYID = 5
2,903,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,196 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,844 UART: [afmc] --
2,946,814 UART: [cold-reset] --
2,947,802 UART: [state] Locking Datavault
2,948,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,489 UART: [state] Locking ICCM
2,950,147 UART: [exit] Launching FMC @ 0x40000130
2,955,476 UART:
2,955,492 UART: Running Caliptra FMC ...
2,955,900 UART:
2,956,043 UART: [state] CFI Enabled
2,966,592 UART: [fht] FMC Alias Private Key: 7
3,074,783 UART: [art] Extend RT PCRs Done
3,075,211 UART: [art] Lock RT PCRs Done
3,076,767 UART: [art] Populate DV Done
3,084,712 UART: [fht] FMC Alias Private Key: 7
3,085,742 UART: [art] Derive CDI
3,086,022 UART: [art] Store in in slot 0x4
3,171,851 UART: [art] Derive Key Pair
3,172,211 UART: [art] Store priv key in slot 0x5
3,185,443 UART: [art] Derive Key Pair - Done
3,200,132 UART: [art] Signing Cert with AUTHO
3,200,612 UART: RITY.KEYID = 7
3,216,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,809 UART: [art] PUB.X = AF5C649B0713DD9BC4CE90D48DB9137B4F50269F977FC584861624708B603A3B4E95EE258C2FEEE6056EEC18AFCECDEF
3,223,591 UART: [art] PUB.Y = 541FA34B640C83CB36502672CD1175EF3D307ADBF434007A33503EA26E2F7BBBFC89E400AD9ED21094B290EF4A60105E
3,230,502 UART: [art] SIG.R = 700A0C1876B69A2BA760679212115A125BC18A8A5A97C55FA7C1333BF88239BBA88F451A191263A4DFD97F2D0BE196AB
3,237,267 UART: [art] SIG.S = FBF8ABF084211EAAAB4E86949F6E3802E4C41FEA4F0E3220AEABFD6C1C9B8B4A0530F92894CE10186E3608103941C3BE
3,260,970 UART: Caliptra RT
3,261,316 UART: [state] CFI Enabled
3,368,992 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,640,681 >>> mbox cmd response: success
2,703,147 UART:
2,703,163 UART: Running Caliptra FMC ...
2,703,571 UART:
2,703,714 UART: [state] CFI Enabled
2,714,369 UART: [fht] FMC Alias Private Key: 7
2,822,584 UART: [art] Extend RT PCRs Done
2,823,012 UART: [art] Lock RT PCRs Done
2,824,608 UART: [art] Populate DV Done
2,832,881 UART: [fht] FMC Alias Private Key: 7
2,833,833 UART: [art] Derive CDI
2,834,113 UART: [art] Store in in slot 0x4
2,919,646 UART: [art] Derive Key Pair
2,920,006 UART: [art] Store priv key in slot 0x5
2,933,456 UART: [art] Derive Key Pair - Done
2,948,408 UART: [art] Signing Cert with AUTHO
2,948,888 UART: RITY.KEYID = 7
2,963,672 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,437 UART: [art] PUB.X = 541F1CD0BDE1D04CDD80B56AEFE8DCA391975B0415A7B03F6C38E3F6122B3DC7473505C6C727B9985ACB34AA42D7D659
2,971,215 UART: [art] PUB.Y = 3F1A74D02107D85B342EC1ACA939E9995DB8DC266D21EEF581E77E6B45D5D315FDA098D5015D71A4781FEB796BFC7D27
2,978,171 UART: [art] SIG.R = 9756A32A16197485AD2AC5081E9B6CDAD1685C9AC7BBBC869DA02ACF1842B416C3D34463E8AAE8619227D5742B1E2F8D
2,984,948 UART: [art] SIG.S = 12CD6A8039ACB58F5AE7A70E1954EDB07BC78433A2BA2879D6FF82734E6DA386244ABCE8BFBD4FA4973BB3380334DAD1
3,008,647 UART: Caliptra RT
3,008,993 UART: [state] CFI Enabled
3,116,193 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
Truncated 7343978 bytes from beginning
4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,791,641 UART: [idev] CSR uploaded
10,808,019 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,951,513 UART: [idev] --
10,952,145 UART: [ldev] ++
10,952,635 UART: [ldev] CDI.KEYID = 6
10,953,508 UART: [ldev] SUBJECT.KEYID = 5
10,954,678 UART: [ldev] AUTHORITY.KEYID = 7
10,955,777 UART: [ldev] FE.KEYID = 1
10,956,663 UART: [ldev] Erasing FE.KEYID = 1
14,191,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,504,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,520,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,536,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,552,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,573,899 UART: [ldev] --
16,579,388 UART: [fwproc] Wait for Commands...
16,581,329 UART: [fwproc] Recv command 0x46574c44
16,583,641 UART: [fwproc] Recv'd Img size: 114036 bytes
20,666,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,743,699 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,812,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,128,974 >>> mbox cmd response: success
21,132,450 UART: [afmc] ++
21,133,036 UART: [afmc] CDI.KEYID = 6
21,134,221 UART: [afmc] SUBJECT.KEYID = 7
21,135,378 UART: [afmc] AUTHORITY.KEYID = 5
24,504,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,801,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,804,213 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,820,423 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,836,448 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,852,406 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,875,863 UART: [afmc] --
26,879,399 UART: [cold-reset] --
26,884,406 UART: [state] Locking Datavault
26,889,530 UART: [state] Locking PCR0, PCR1 and PCR31
26,891,197 UART: [state] Locking ICCM
26,893,817 UART: [exit] Launching FMC @ 0x40000130
26,902,496 UART:
26,902,728 UART: Running Caliptra FMC ...
26,903,746 UART:
26,903,890 UART: [state] CFI Enabled
26,962,511 UART: [fht] FMC Alias Private Key: 7
29,300,204 UART: [art] Extend RT PCRs Done
29,301,424 UART: [art] Lock RT PCRs Done
29,303,074 UART: [art] Populate DV Done
29,308,537 UART: [fht] FMC Alias Private Key: 7
29,310,180 UART: [art] Derive CDI
29,310,990 UART: [art] Store in in slot 0x4
29,371,327 UART: [art] Derive Key Pair
29,372,381 UART: [art] Store priv key in slot 0x5
32,664,938 UART: [art] Derive Key Pair - Done
32,677,830 UART: [art] Signing Cert with AUTHO
32,679,130 UART: RITY.KEYID = 7
34,967,170 UART: [art] Erasing AUTHORITY.KEYID = 7
34,968,681 UART: [art] PUB.X = 51F3E97F295981032F89B0094E2418AAD50A8B68776B9C4DAACF61E23D40EB2F8B7685DDB75F85018CE3DC4B68437649
34,975,926 UART: [art] PUB.Y = 06D52645FC8E3B1AC81E3B750C56F834A7E291830E090B87AA2D93CEB06E06D17D4A726FDC1BE4CEBCC533D789C9E26D
34,983,151 UART: [art] SIG.R = 6F569684D39E2B8CD8FE7E5468C53F6064DCE5CFBEB26CA75D57ECE3C16E2598AF690018D4B181B5FFCE5A01342B62BB
34,990,599 UART: [art] SIG.S = 5F839A7BC5B2C927472D1535228EC5054F1E4B8618BF95CAB0ACA90D7EC2AFFEBD2BD7CC0BBDA63B2D172F869D7D7933
36,295,609 UART: Caliptra RT
36,296,310 UART: [state] CFI Enabled
36,456,282 UART: [rt] RT listening for mailbox commands...
36,607,091 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,637,084 UART: [rt]cmd =0x4c444556, len=4
36,648,182 >>> mbox cmd response data (687 bytes)
36,792,878 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,822,906 UART: [rt]cmd =0x43455246, len=4
36,835,559 >>> mbox cmd response data (886 bytes)
36,979,524 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
37,009,555 UART: [rt]cmd =0x43455252, len=4
37,021,029 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
191,993 UART:
192,372 UART: Running Caliptra ROM ...
193,557 UART:
193,715 UART: [state] CFI Enabled
265,723 UART: [state] LifecycleState = Unprovisioned
268,133 UART: [state] DebugLocked = No
271,080 UART: [state] WD Timer not started. Device not locked for debugging
276,104 UART: [kat] SHA2-256
458,055 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,541 UART: [kat] ++
470,131 UART: [kat] sha1
479,664 UART: [kat] SHA2-256
482,726 UART: [kat] SHA2-384
488,212 UART: [kat] SHA2-512-ACC
490,816 UART: [kat] ECC-384
3,778,727 UART: [kat] HMAC-384Kdf
3,801,444 UART: [kat] LMS
4,874,625 UART: [kat] --
4,879,317 UART: [cold-reset] ++
4,881,088 UART: [fht] FHT @ 0x50003400
4,892,989 UART: [idev] ++
4,893,661 UART: [idev] CDI.KEYID = 6
4,894,895 UART: [idev] SUBJECT.KEYID = 7
4,896,057 UART: [idev] UDS.KEYID = 0
4,928,974 UART: [idev] Erasing UDS.KEYID = 0
8,240,243 UART: [idev] Sha1 KeyId Algorithm
8,261,013 UART: [idev] CSR upload begun
8,266,444 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,569,569 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,585,839 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,601,949 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,617,979 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,642,536 UART: [idev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
10,787,918 UART: [idev] CSR uploaded
10,804,276 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,947,884 UART: [idev] --
10,948,521 UART: [ldev] ++
10,949,012 UART: [ldev] CDI.KEYID = 6
10,949,935 UART: [ldev] SUBJECT.KEYID = 5
10,951,021 UART: [ldev] AUTHORITY.KEYID = 7
10,952,211 UART: [ldev] FE.KEYID = 1
10,953,104 UART: [ldev] Erasing FE.KEYID = 1
14,191,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,500,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,516,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,532,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,548,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,568,394 UART: [ldev] --
16,573,436 UART: [fwproc] Wait for Commands...
16,575,901 UART: [fwproc] Recv command 0x46574c44
16,578,217 UART: [fwproc] Recv'd Img size: 114036 bytes
20,648,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,728,053 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,796,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,113,970 >>> mbox cmd response: success
21,117,979 UART: [afmc] ++
21,118,561 UART: [afmc] CDI.KEYID = 6
21,119,741 UART: [afmc] SUBJECT.KEYID = 7
21,120,902 UART: [afmc] AUTHORITY.KEYID = 5
24,483,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,779,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,782,018 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,798,198 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,814,248 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,830,235 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,853,741 UART: [afmc] --
26,856,568 UART: [cold-reset] --
26,860,277 UART: [state] Locking Datavault
26,865,204 UART: [state] Locking PCR0, PCR1 and PCR31
26,866,897 UART: [state] Locking ICCM
26,869,636 UART: [exit] Launching FMC @ 0x40000130
26,878,301 UART:
26,878,539 UART: Running Caliptra FMC ...
26,879,657 UART:
26,879,817 UART: [state] CFI Enabled
26,940,166 UART: [fht] FMC Alias Private Key: 7
29,277,490 UART: [art] Extend RT PCRs Done
29,278,716 UART: [art] Lock RT PCRs Done
29,280,581 UART: [art] Populate DV Done
29,285,660 UART: [fht] FMC Alias Private Key: 7
29,287,308 UART: [art] Derive CDI
29,288,038 UART: [art] Store in in slot 0x4
29,348,491 UART: [art] Derive Key Pair
29,349,529 UART: [art] Store priv key in slot 0x5
32,642,228 UART: [art] Derive Key Pair - Done
32,654,894 UART: [art] Signing Cert with AUTHO
32,656,193 UART: RITY.KEYID = 7
34,944,337 UART: [art] Erasing AUTHORITY.KEYID = 7
34,945,841 UART: [art] PUB.X = 58496995746A00C014C80AF81A45038CAD7525FB1BC312EDDFB42225EF75F6864108A56E6575021D7EF2512484964866
34,953,094 UART: [art] PUB.Y = 80A94360D5955C4CE62DBA8C361677E306D8C039018F8DCDFDC8DBE01E58EEDA354D47E41F2BF9342D3C906110994168
34,960,332 UART: [art] SIG.R = F1DD3BEE8E7FE928730320F92CD3A174A7BC2545CF03827F24B165A2A6616277573B4391146AC9825B695C00873DB605
34,967,670 UART: [art] SIG.S = 67053D4C33424596A482C045E2C05A28E630AD5DDB116B3FC54CD9DDFF4183902B8D68152557CB1B7C6D563C04542568
36,272,957 UART: Caliptra RT
36,273,657 UART: [state] CFI Enabled
36,432,167 UART: [rt] RT listening for mailbox commands...
36,583,045 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,613,153 UART: [rt]cmd =0x4c444556, len=4
36,624,189 >>> mbox cmd response data (687 bytes)
36,769,537 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,799,412 UART: [rt]cmd =0x43455246, len=4
36,812,195 >>> mbox cmd response data (886 bytes)
36,955,842 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,986,059 UART: [rt]cmd =0x43455252, len=4
36,997,290 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1965.15s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
10,477,565 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,705,892 >>> mbox cmd response: success
26,409,933 UART:
26,410,327 UART: Running Caliptra FMC ...
26,411,525 UART:
26,411,697 UART: [state] CFI Enabled
26,476,887 UART: [fht] FMC Alias Private Key: 7
28,814,991 UART: [art] Extend RT PCRs Done
28,816,210 UART: [art] Lock RT PCRs Done
28,818,105 UART: [art] Populate DV Done
28,823,367 UART: [fht] FMC Alias Private Key: 7
28,824,875 UART: [art] Derive CDI
28,825,633 UART: [art] Store in in slot 0x4
28,885,159 UART: [art] Derive Key Pair
28,886,200 UART: [art] Store priv key in slot 0x5
32,179,668 UART: [art] Derive Key Pair - Done
32,192,656 UART: [art] Signing Cert with AUTHO
32,193,965 UART: RITY.KEYID = 7
34,481,486 UART: [art] Erasing AUTHORITY.KEYID = 7
34,482,991 UART: [art] PUB.X = B3F82F9EF9A9DB06D5E4DEF89146DF61F035FBB2908A7379AF4D090F9122D071EDC04FAF299535ACBA15C56D81CE8833
34,490,246 UART: [art] PUB.Y = FB0930406ACAA059462A0E39CB95E17E49D1BC734AEFA96189724FCEC52071C899627F3CF6F73C1D885FD23851EB9022
34,497,535 UART: [art] SIG.R = 4A08BAA5E91105AE5BEF6F37DCA74B0A237956AA2DD501B244CF228703B4D2EB2EC7BAD97D368432E3B8B41DF176B3A7
34,504,923 UART: [art] SIG.S = 7EF868559C23A7AD6D2B3B6439F1C9794641A80E9CA76C3817A72F98937C6DAD769733EF0C7CC6EE39881AB9CD868D8C
35,809,694 UART: Caliptra RT
35,810,406 UART: [state] CFI Enabled
35,972,277 UART: [rt] RT listening for mailbox commands...
36,121,992 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,151,923 UART: [rt]cmd =0x4c444556, len=4
36,163,014 >>> mbox cmd response data (687 bytes)
36,308,677 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,338,616 UART: [rt]cmd =0x43455246, len=4
36,351,178 >>> mbox cmd response data (886 bytes)
36,494,101 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,524,187 UART: [rt]cmd =0x43455252, len=4
36,535,510 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
10,478,351 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,679,151 >>> mbox cmd response: success
26,382,606 UART:
26,382,984 UART: Running Caliptra FMC ...
26,384,092 UART:
26,384,245 UART: [state] CFI Enabled
26,451,124 UART: [fht] FMC Alias Private Key: 7
28,788,999 UART: [art] Extend RT PCRs Done
28,790,224 UART: [art] Lock RT PCRs Done
28,791,769 UART: [art] Populate DV Done
28,797,139 UART: [fht] FMC Alias Private Key: 7
28,798,727 UART: [art] Derive CDI
28,799,463 UART: [art] Store in in slot 0x4
28,859,910 UART: [art] Derive Key Pair
28,860,944 UART: [art] Store priv key in slot 0x5
32,153,300 UART: [art] Derive Key Pair - Done
32,166,238 UART: [art] Signing Cert with AUTHO
32,167,530 UART: RITY.KEYID = 7
34,455,703 UART: [art] Erasing AUTHORITY.KEYID = 7
34,457,209 UART: [art] PUB.X = 0BD33BF81E0D83C8F456D04021785E763B4ABF95970C8FAA380B5FF1B1152105E7D703CE2912B8411649197AAE725CE6
34,464,459 UART: [art] PUB.Y = 3B462985B63F728D16A91E942B3F8A2F51127480E1C9FDC6233C9AE560A0A55730BE0FA44A56432C6BA9D314070D2784
34,471,686 UART: [art] SIG.R = 81B8951A3862FE2C37CC45786F0DC2076DD7B924F9C0F3524ACD58B0C2BFD88C089EB6D38D8DE8901DD5632F5F2ACFAA
34,479,100 UART: [art] SIG.S = 1825C323CE5BCDB9305F88A29BE7C4A2123FA36952DA7A185969ED95D1B8A04E1982B47BACBED1610EDCECEB8BB57603
35,784,232 UART: Caliptra RT
35,784,928 UART: [state] CFI Enabled
35,946,519 UART: [rt] RT listening for mailbox commands...
36,096,871 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,126,898 UART: [rt]cmd =0x4c444556, len=4
36,137,987 >>> mbox cmd response data (687 bytes)
36,283,964 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,313,943 UART: [rt]cmd =0x43455246, len=4
36,326,663 >>> mbox cmd response data (886 bytes)
36,470,246 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,500,173 UART: [rt]cmd =0x43455252, len=4
36,511,505 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
10,499,312 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,690,881 >>> mbox cmd response: success
26,389,514 UART:
26,389,946 UART: Running Caliptra FMC ...
26,391,250 UART:
26,391,425 UART: [state] CFI Enabled
26,454,449 UART: [fht] FMC Alias Private Key: 7
28,792,192 UART: [art] Extend RT PCRs Done
28,793,413 UART: [art] Lock RT PCRs Done
28,795,153 UART: [art] Populate DV Done
28,800,321 UART: [fht] FMC Alias Private Key: 7
28,801,967 UART: [art] Derive CDI
28,802,781 UART: [art] Store in in slot 0x4
28,862,633 UART: [art] Derive Key Pair
28,863,668 UART: [art] Store priv key in slot 0x5
32,156,776 UART: [art] Derive Key Pair - Done
32,169,713 UART: [art] Signing Cert with AUTHO
32,171,034 UART: RITY.KEYID = 7
34,458,230 UART: [art] Erasing AUTHORITY.KEYID = 7
34,459,741 UART: [art] PUB.X = 1030F133AD1AFC1EF5019380E51667036103AD7C2A9BFA11E3173B39820DE0FBD5DAD7E921D1F82A1A65B8B8788544B0
34,466,979 UART: [art] PUB.Y = 4BFF7C9FBCB2CC9FD1941382DE9503FD07130491936EAFC7C7757E6F76012BB3110926E22847E16C6C4C055CEC113608
34,474,225 UART: [art] SIG.R = 2586FFBE41BB995058648EC1EE2571286FFF53163ED3EEE00D8AB222A67545D2E9C6F2116237699A8097B7248393F1D5
34,481,615 UART: [art] SIG.S = 9AD03B660158CF79F7F57C9B1E7D2FE759CF4173456529D3AD58EE16166D063B98D3396337B3A8EC9CD381BD127D4CD8
35,786,834 UART: Caliptra RT
35,787,545 UART: [state] CFI Enabled
35,946,346 UART: [rt] RT listening for mailbox commands...
36,095,648 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,125,792 UART: [rt]cmd =0x4c444556, len=4
36,136,834 >>> mbox cmd response data (687 bytes)
36,281,997 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,311,927 UART: [rt]cmd =0x43455246, len=4
36,324,561 >>> mbox cmd response data (886 bytes)
36,467,647 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,497,736 UART: [rt]cmd =0x43455252, len=4
36,509,104 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
10,500,409 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,691,909 >>> mbox cmd response: success
26,384,863 UART:
26,385,247 UART: Running Caliptra FMC ...
26,386,442 UART:
26,386,611 UART: [state] CFI Enabled
26,454,010 UART: [fht] FMC Alias Private Key: 7
28,791,987 UART: [art] Extend RT PCRs Done
28,793,219 UART: [art] Lock RT PCRs Done
28,794,604 UART: [art] Populate DV Done
28,800,097 UART: [fht] FMC Alias Private Key: 7
28,801,694 UART: [art] Derive CDI
28,802,526 UART: [art] Store in in slot 0x4
28,863,359 UART: [art] Derive Key Pair
28,864,401 UART: [art] Store priv key in slot 0x5
32,157,010 UART: [art] Derive Key Pair - Done
32,170,496 UART: [art] Signing Cert with AUTHO
32,171,792 UART: RITY.KEYID = 7
34,459,042 UART: [art] Erasing AUTHORITY.KEYID = 7
34,460,554 UART: [art] PUB.X = E4CE7C5999CEEEF3DECE555478F7867308BCD91C4FC94DEDC931E729FDC01AFA7D60B750ECAE25EE814EC85E588AA91D
34,467,797 UART: [art] PUB.Y = 60D39AE53A579DAE79674E67E6E1A09EE1744B7AC9CE15E349B1F75D6A655CEB2B52FEF32ED849A2516E88AD0BEA8174
34,475,066 UART: [art] SIG.R = 530C0568F668A3366960CDA7491EB2DF99783750834EF4C4B77536ED90DEBD495A9EF8810D4A5252E39F2FC6085D61FE
34,482,472 UART: [art] SIG.S = 60E296E17F69498CE1AB8F36D02D9C4C8DE1355E00F7198B0A64AB0689AFE2A1ECB138FA75DF1B0FC07A95BB32FA42A2
35,787,507 UART: Caliptra RT
35,788,225 UART: [state] CFI Enabled
35,948,910 UART: [rt] RT listening for mailbox commands...
36,098,437 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,128,620 UART: [rt]cmd =0x4c444556, len=4
36,139,712 >>> mbox cmd response data (687 bytes)
36,285,256 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,315,037 UART: [rt]cmd =0x43455246, len=4
36,327,819 >>> mbox cmd response data (886 bytes)
36,471,492 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,501,340 UART: [rt]cmd =0x43455252, len=4
36,512,690 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
10,479,385 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,679,636 >>> mbox cmd response: success
26,383,531 UART:
26,383,902 UART: Running Caliptra FMC ...
26,385,032 UART:
26,385,198 UART: [state] CFI Enabled
26,452,647 UART: [fht] FMC Alias Private Key: 7
28,790,352 UART: [art] Extend RT PCRs Done
28,791,587 UART: [art] Lock RT PCRs Done
28,793,297 UART: [art] Populate DV Done
28,798,616 UART: [fht] FMC Alias Private Key: 7
28,800,316 UART: [art] Derive CDI
28,801,052 UART: [art] Store in in slot 0x4
28,861,898 UART: [art] Derive Key Pair
28,862,938 UART: [art] Store priv key in slot 0x5
32,154,639 UART: [art] Derive Key Pair - Done
32,167,094 UART: [art] Signing Cert with AUTHO
32,168,404 UART: RITY.KEYID = 7
34,469,335 UART: [art] Erasing AUTHORITY.KEYID = 7
34,470,844 UART: [art] PUB.X = 917E000EC30EB094D434629B7D5B49F2A761EED385E899698D6ED2A0BCE931956D6F66B81025FB32B40627CA5A330B9D
34,478,091 UART: [art] PUB.Y = FCB76677233F00B2BAFB35A8414AE1FD07DA7CB5873C9958C72B862540846E4948899667BA280A1367B191EAEFF9B350
34,485,323 UART: [art] SIG.R = 67972A9953A2D24A8CB4904F9E5BA45AC1D9844517FA6755F7411EC5E21E6003C314B7154E29915D762F7A22CA7277DE
34,492,667 UART: [art] SIG.S = 8BD4B611EF0232CCF4E84421D060491FC335A121EAB754459A2D36FA00A7DE4F5BE38244A1C90D36A34FE509EB439320
35,797,883 UART: Caliptra RT
35,798,581 UART: [state] CFI Enabled
35,959,143 UART: [rt] RT listening for mailbox commands...
36,108,967 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,138,854 UART: [rt]cmd =0x4c444556, len=4
36,150,130 >>> mbox cmd response data (687 bytes)
36,295,459 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,325,331 UART: [rt]cmd =0x43455246, len=4
36,338,240 >>> mbox cmd response data (886 bytes)
36,481,726 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,511,796 UART: [rt]cmd =0x43455252, len=4
36,523,308 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1940.22s
Truncated 7343978 bytes from beginning
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
11,029,444 UART: [idev] CSR uploaded
11,045,817 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
11,189,153 UART: [idev] --
11,189,784 UART: [ldev] ++
11,190,276 UART: [ldev] CDI.KEYID = 6
11,191,144 UART: [ldev] SUBJECT.KEYID = 5
11,192,232 UART: [ldev] AUTHORITY.KEYID = 7
11,193,413 UART: [ldev] FE.KEYID = 1
11,194,278 UART: [ldev] Erasing FE.KEYID = 1
14,361,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,653,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,670,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,686,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,702,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,721,436 UART: [ldev] --
16,726,593 UART: [fwproc] Wait for Commands...
16,729,308 UART: [fwproc] Recv command 0x46574c44
16,731,627 UART: [fwproc] Recv'd Img size: 114036 bytes
20,808,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,884,333 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,953,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,269,491 >>> mbox cmd response: success
21,274,028 UART: [afmc] ++
21,274,619 UART: [afmc] CDI.KEYID = 6
21,275,804 UART: [afmc] SUBJECT.KEYID = 7
21,276,956 UART: [afmc] AUTHORITY.KEYID = 5
24,595,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,890,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,893,137 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,909,345 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,925,372 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,941,378 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,963,589 UART: [afmc] --
26,966,593 UART: [cold-reset] --
26,970,510 UART: [state] Locking Datavault
26,976,138 UART: [state] Locking PCR0, PCR1 and PCR31
26,977,775 UART: [state] Locking ICCM
26,979,543 UART: [exit] Launching FMC @ 0x40000130
26,988,215 UART:
26,988,441 UART: Running Caliptra FMC ...
26,989,535 UART:
26,989,688 UART: [state] CFI Enabled
26,997,785 UART: [fht] FMC Alias Private Key: 7
29,328,415 UART: [art] Extend RT PCRs Done
29,329,632 UART: [art] Lock RT PCRs Done
29,331,382 UART: [art] Populate DV Done
29,336,951 UART: [fht] FMC Alias Private Key: 7
29,338,526 UART: [art] Derive CDI
29,339,281 UART: [art] Store in in slot 0x4
29,381,925 UART: [art] Derive Key Pair
29,382,923 UART: [art] Store priv key in slot 0x5
32,624,197 UART: [art] Derive Key Pair - Done
32,636,816 UART: [art] Signing Cert with AUTHO
32,638,113 UART: RITY.KEYID = 7
34,917,802 UART: [art] Erasing AUTHORITY.KEYID = 7
34,919,310 UART: [art] PUB.X = 109AEDBA1E33CFC1137E1B70E43635AA4EBECF3422426797DC3425A22C3388178AD77645311D574B4260CD99657EDFAD
34,926,543 UART: [art] PUB.Y = 524B8F843044F25285EAFD1778683777A8F2CAE875E0C02548DF0EF50DDD9F9C40773D8DA80171AF1D86DBA368918577
34,933,777 UART: [art] SIG.R = 6610A08F53FE1F6591EB6970979520394D66C79379C84A512B0EF2E9B9CB8CB055EEEB75780715D583E1326782FA8133
34,941,155 UART: [art] SIG.S = 6673BA0022F62EBAD1E194E04FB88FD6C31EEE421D83DDFAA3E35C8A5F84E63A8D06BEC9FD1735D9C59986C316B0D204
36,246,409 UART: Caliptra RT
36,247,122 UART: [state] CFI Enabled
36,364,698 UART: [rt] RT listening for mailbox commands...
36,516,193 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,546,495 UART: [rt]cmd =0x4c444556, len=4
36,557,538 >>> mbox cmd response data (687 bytes)
36,702,979 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,732,862 UART: [rt]cmd =0x43455246, len=4
36,745,527 >>> mbox cmd response data (886 bytes)
36,888,642 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,918,407 UART: [rt]cmd =0x43455252, len=4
36,929,839 >>> mbox cmd response data (782 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,474 UART:
192,860 UART: Running Caliptra ROM ...
194,028 UART:
603,790 UART: [state] CFI Enabled
618,279 UART: [state] LifecycleState = Unprovisioned
620,651 UART: [state] DebugLocked = No
622,782 UART: [state] WD Timer not started. Device not locked for debugging
628,145 UART: [kat] SHA2-256
810,141 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,679 UART: [kat] ++
822,262 UART: [kat] sha1
832,383 UART: [kat] SHA2-256
835,446 UART: [kat] SHA2-384
840,337 UART: [kat] SHA2-512-ACC
842,942 UART: [kat] ECC-384
4,098,990 UART: [kat] HMAC-384Kdf
4,110,427 UART: [kat] LMS
5,183,625 UART: [kat] --
5,188,647 UART: [cold-reset] ++
5,190,530 UART: [fht] FHT @ 0x50003400
5,201,185 UART: [idev] ++
5,201,852 UART: [idev] CDI.KEYID = 6
5,203,002 UART: [idev] SUBJECT.KEYID = 7
5,204,551 UART: [idev] UDS.KEYID = 0
5,220,773 UART: [idev] Erasing UDS.KEYID = 0
8,496,193 UART: [idev] Sha1 KeyId Algorithm
8,516,025 UART: [idev] CSR upload begun
8,521,502 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,810,911 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,827,238 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,843,351 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,859,332 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,883,932 UART: [idev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
11,029,313 UART: [idev] CSR uploaded
11,045,662 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
11,189,668 UART: [idev] --
11,190,326 UART: [ldev] ++
11,190,862 UART: [ldev] CDI.KEYID = 6
11,191,729 UART: [ldev] SUBJECT.KEYID = 5
11,192,828 UART: [ldev] AUTHORITY.KEYID = 7
11,194,016 UART: [ldev] FE.KEYID = 1
11,195,042 UART: [ldev] Erasing FE.KEYID = 1
14,360,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,652,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,668,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,684,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,700,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,720,927 UART: [ldev] --
16,725,381 UART: [fwproc] Wait for Commands...
16,727,094 UART: [fwproc] Recv command 0x46574c44
16,729,408 UART: [fwproc] Recv'd Img size: 114036 bytes
20,799,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,878,044 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,946,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,262,971 >>> mbox cmd response: success
21,266,599 UART: [afmc] ++
21,267,183 UART: [afmc] CDI.KEYID = 6
21,268,285 UART: [afmc] SUBJECT.KEYID = 7
21,269,494 UART: [afmc] AUTHORITY.KEYID = 5
24,585,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,880,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,882,880 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,899,108 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,915,140 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,931,105 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,954,141 UART: [afmc] --
26,958,103 UART: [cold-reset] --
26,961,907 UART: [state] Locking Datavault
26,967,584 UART: [state] Locking PCR0, PCR1 and PCR31
26,969,221 UART: [state] Locking ICCM
26,971,259 UART: [exit] Launching FMC @ 0x40000130
26,979,936 UART:
26,980,196 UART: Running Caliptra FMC ...
26,981,295 UART:
26,981,443 UART: [state] CFI Enabled
26,989,266 UART: [fht] FMC Alias Private Key: 7
29,320,087 UART: [art] Extend RT PCRs Done
29,321,309 UART: [art] Lock RT PCRs Done
29,322,878 UART: [art] Populate DV Done
29,328,555 UART: [fht] FMC Alias Private Key: 7
29,330,096 UART: [art] Derive CDI
29,330,914 UART: [art] Store in in slot 0x4
29,373,878 UART: [art] Derive Key Pair
29,374,920 UART: [art] Store priv key in slot 0x5
32,617,338 UART: [art] Derive Key Pair - Done
32,630,009 UART: [art] Signing Cert with AUTHO
32,631,312 UART: RITY.KEYID = 7
34,910,945 UART: [art] Erasing AUTHORITY.KEYID = 7
34,912,450 UART: [art] PUB.X = 4FF3D9685F31A8282BBBD9205B376E29DD6E5854BDCA225D3FB50F529045B5FC21FBF8AA029967EC3EDB6916519543B1
34,919,733 UART: [art] PUB.Y = B25091FD71121DDEBAD9E5360D3A817986A8012974E67DE216595D3404A9355CEF12591B3D99D2263D1816FF93E1136E
34,926,916 UART: [art] SIG.R = 67C76C324812E05D87197A0E6B3A1F72FEBD0445C32D2ECAD3572792F7AC25EF008CBA89BD1C4312857AEA5984E2F6A2
34,934,303 UART: [art] SIG.S = 8101F5A133AAB19C09845AD7FD0137CC0A8D2B568860322B656597F762BD1D430CD3E9F50FC2094D29EBD6E7BC7208D3
36,239,643 UART: Caliptra RT
36,240,359 UART: [state] CFI Enabled
36,357,433 UART: [rt] RT listening for mailbox commands...
36,507,842 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,537,936 UART: [rt]cmd =0x4c444556, len=4
36,549,051 >>> mbox cmd response data (687 bytes)
36,694,494 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,724,431 UART: [rt]cmd =0x43455246, len=4
36,737,074 >>> mbox cmd response data (886 bytes)
36,880,030 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,910,041 UART: [rt]cmd =0x43455252, len=4
36,921,393 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1961.36s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
10,741,820 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,858,334 >>> mbox cmd response: success
26,498,371 UART:
26,498,779 UART: Running Caliptra FMC ...
26,499,918 UART:
26,500,073 UART: [state] CFI Enabled
26,508,114 UART: [fht] FMC Alias Private Key: 7
28,838,821 UART: [art] Extend RT PCRs Done
28,840,055 UART: [art] Lock RT PCRs Done
28,841,441 UART: [art] Populate DV Done
28,847,022 UART: [fht] FMC Alias Private Key: 7
28,848,777 UART: [art] Derive CDI
28,849,504 UART: [art] Store in in slot 0x4
28,892,131 UART: [art] Derive Key Pair
28,893,168 UART: [art] Store priv key in slot 0x5
32,135,650 UART: [art] Derive Key Pair - Done
32,148,757 UART: [art] Signing Cert with AUTHO
32,150,056 UART: RITY.KEYID = 7
34,429,895 UART: [art] Erasing AUTHORITY.KEYID = 7
34,431,408 UART: [art] PUB.X = D2240AE9453D83CCC6295CBF18190D0B5306893A3C7F8AA9344BCE810B04D47CD4C05309E678E0818333111C4E4BF661
34,438,626 UART: [art] PUB.Y = 43E6423285AA39EE44DFE79C60217B32BBCB10AC355933BCCF7A27AC760FB79DAD6F4B5D75511B633A5C22BE6613B85D
34,445,862 UART: [art] SIG.R = 4C3D09CC11BADD7AB6E806FE3220E6F256E3AE5659C80A51D9493AD49BD9FA3C15871ECE1634FB6A04019F8AE48E0BBD
34,453,280 UART: [art] SIG.S = 416E8CC97C8CBFD8BA596E6CDD9A11429D1D757DA3D0A0DFF32BBC7A2BC80A510EBC7F03749F579213B315AB0831F5FC
35,758,312 UART: Caliptra RT
35,759,027 UART: [state] CFI Enabled
35,875,774 UART: [rt] RT listening for mailbox commands...
36,025,651 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,055,667 UART: [rt]cmd =0x4c444556, len=4
36,066,709 >>> mbox cmd response data (687 bytes)
36,212,067 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,241,979 UART: [rt]cmd =0x43455246, len=4
36,254,725 >>> mbox cmd response data (886 bytes)
36,398,314 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,428,291 UART: [rt]cmd =0x43455252, len=4
36,439,672 >>> mbox cmd response data (782 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
10,733,758 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,857,069 >>> mbox cmd response: success
26,498,205 UART:
26,498,585 UART: Running Caliptra FMC ...
26,499,691 UART:
26,499,837 UART: [state] CFI Enabled
26,507,732 UART: [fht] FMC Alias Private Key: 7
28,838,551 UART: [art] Extend RT PCRs Done
28,839,801 UART: [art] Lock RT PCRs Done
28,841,238 UART: [art] Populate DV Done
28,846,806 UART: [fht] FMC Alias Private Key: 7
28,848,297 UART: [art] Derive CDI
28,849,029 UART: [art] Store in in slot 0x4
28,891,575 UART: [art] Derive Key Pair
28,892,614 UART: [art] Store priv key in slot 0x5
32,134,550 UART: [art] Derive Key Pair - Done
32,147,500 UART: [art] Signing Cert with AUTHO
32,148,804 UART: RITY.KEYID = 7
34,428,418 UART: [art] Erasing AUTHORITY.KEYID = 7
34,429,926 UART: [art] PUB.X = 98ACB40EC81EC19AEDA430BD13249C9AFF3B95E086AD0A26077AE6523932D4BD895374E016ECCBB1AD89C56DAF02B501
34,437,140 UART: [art] PUB.Y = EF17BAA5650E127522B990B0E9AEE5118EE65CF7F6F6CE0CB657D9A3573C3F7BB1C3F7483D225D847531CCD2F6336AD5
34,444,440 UART: [art] SIG.R = 5967597F327BEEA9ACA1E856E2166893EA4A6955E06DC3E80A519C87949A3A31DE70A73E9F0614B2467954BFC7040CDB
34,451,832 UART: [art] SIG.S = 91C494361FAB1498F90DC2F552312D50FA431F19814B60189306391B869FA82AFB2FD571D02F6241E93C64C8BF9AA4F3
35,756,577 UART: Caliptra RT
35,757,282 UART: [state] CFI Enabled
35,873,372 UART: [rt] RT listening for mailbox commands...
36,023,069 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,053,110 UART: [rt]cmd =0x4c444556, len=4
36,064,159 >>> mbox cmd response data (687 bytes)
36,209,332 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,239,340 UART: [rt]cmd =0x43455246, len=4
36,251,933 >>> mbox cmd response data (886 bytes)
36,395,234 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,425,104 UART: [rt]cmd =0x43455252, len=4
36,436,432 >>> mbox cmd response data (783 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
10,730,632 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,858,105 >>> mbox cmd response: success
26,500,686 UART:
26,501,097 UART: Running Caliptra FMC ...
26,502,207 UART:
26,502,355 UART: [state] CFI Enabled
26,510,306 UART: [fht] FMC Alias Private Key: 7
28,841,512 UART: [art] Extend RT PCRs Done
28,842,731 UART: [art] Lock RT PCRs Done
28,844,377 UART: [art] Populate DV Done
28,850,048 UART: [fht] FMC Alias Private Key: 7
28,851,584 UART: [art] Derive CDI
28,852,314 UART: [art] Store in in slot 0x4
28,895,057 UART: [art] Derive Key Pair
28,896,053 UART: [art] Store priv key in slot 0x5
32,137,831 UART: [art] Derive Key Pair - Done
32,150,536 UART: [art] Signing Cert with AUTHO
32,151,838 UART: RITY.KEYID = 7
34,430,909 UART: [art] Erasing AUTHORITY.KEYID = 7
34,432,571 UART: [art] PUB.X = 68EE33BCC4EFABD8D07B51D320CFA20BE5C0CDDCD1B2F8AB463716007DAF0655081D2606D09285020B4B27C18A3BEEBB
34,439,670 UART: [art] PUB.Y = A8CEC24139663BE8FB2A64D674960B7BEA2B762B9E72C1DAF46AA60CEB65EEAD9EE45C3CC25BF9942E49AB427F042BEA
34,446,989 UART: [art] SIG.R = 70F82FCD6B1BB08BBFBBE474494C8E4B39E1AD08C3E065E22F94231B8DAE267668BF5125A2BA79F9D744628F216EAF1A
34,454,398 UART: [art] SIG.S = DF2FBDE7A7CB87D1E988DA22AC24A76C11DD76867A20F0BD5B36A3DA4608FB7F381FD880781F5F25FF67E3A2A37AE9E8
35,760,082 UART: Caliptra RT
35,760,810 UART: [state] CFI Enabled
35,877,362 UART: [rt] RT listening for mailbox commands...
36,026,873 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,056,903 UART: [rt]cmd =0x4c444556, len=4
36,068,169 >>> mbox cmd response data (687 bytes)
36,213,722 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,243,604 UART: [rt]cmd =0x43455246, len=4
36,256,215 >>> mbox cmd response data (886 bytes)
36,399,239 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,429,223 UART: [rt]cmd =0x43455252, len=4
36,440,592 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,338 writing to cptra_bootfsm_go
10,740,039 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,876,259 >>> mbox cmd response: success
26,515,389 UART:
26,515,786 UART: Running Caliptra FMC ...
26,516,984 UART:
26,517,150 UART: [state] CFI Enabled
26,525,252 UART: [fht] FMC Alias Private Key: 7
28,855,139 UART: [art] Extend RT PCRs Done
28,856,365 UART: [art] Lock RT PCRs Done
28,857,831 UART: [art] Populate DV Done
28,863,177 UART: [fht] FMC Alias Private Key: 7
28,864,868 UART: [art] Derive CDI
28,865,674 UART: [art] Store in in slot 0x4
28,908,489 UART: [art] Derive Key Pair
28,909,543 UART: [art] Store priv key in slot 0x5
32,151,294 UART: [art] Derive Key Pair - Done
32,164,074 UART: [art] Signing Cert with AUTHO
32,165,425 UART: RITY.KEYID = 7
34,444,639 UART: [art] Erasing AUTHORITY.KEYID = 7
34,446,143 UART: [art] PUB.X = 2ED189C8F9C83402DCBE933FAC518FD3612DC379C1871E4C78661F7140DE38DD783210C801DBC493DE13BB59E2F7D5AF
34,453,413 UART: [art] PUB.Y = 4A205A374A2A89DFEBD38FB9FD1FD5CC5415CEF35E5D0666224CE1F48D12C0A161021017FB4760B9C67346931BB76E92
34,460,660 UART: [art] SIG.R = 926312A81A4D95DC26DAA0EE8AEF010E7498FCE2C80B9C47C5978FCD79B916DC29DF257BB04202DF45F09578D5861DF5
34,468,019 UART: [art] SIG.S = AEF8CF7D96FC5AAAE31C569ED5275AA6DA38A8A61779ACA2C3F4AE7197A3347A8C0EE046900C1560597B43080021E759
35,772,819 UART: Caliptra RT
35,773,534 UART: [state] CFI Enabled
35,890,389 UART: [rt] RT listening for mailbox commands...
36,040,444 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,070,289 UART: [rt]cmd =0x4c444556, len=4
36,081,412 >>> mbox cmd response data (687 bytes)
36,226,799 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,256,987 UART: [rt]cmd =0x43455246, len=4
36,269,578 >>> mbox cmd response data (886 bytes)
36,413,328 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,443,251 UART: [rt]cmd =0x43455252, len=4
36,454,575 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,782 writing to cptra_bootfsm_go
10,736,284 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,863,118 >>> mbox cmd response: success
26,503,533 UART:
26,503,925 UART: Running Caliptra FMC ...
26,505,071 UART:
26,505,228 UART: [state] CFI Enabled
26,512,952 UART: [fht] FMC Alias Private Key: 7
28,843,947 UART: [art] Extend RT PCRs Done
28,845,169 UART: [art] Lock RT PCRs Done
28,846,433 UART: [art] Populate DV Done
28,851,900 UART: [fht] FMC Alias Private Key: 7
28,853,546 UART: [art] Derive CDI
28,854,356 UART: [art] Store in in slot 0x4
28,897,009 UART: [art] Derive Key Pair
28,898,052 UART: [art] Store priv key in slot 0x5
32,139,930 UART: [art] Derive Key Pair - Done
32,152,773 UART: [art] Signing Cert with AUTHO
32,154,083 UART: RITY.KEYID = 7
34,433,974 UART: [art] Erasing AUTHORITY.KEYID = 7
34,435,478 UART: [art] PUB.X = 2A54FF6760AB04AF0B50C410715270606D24D8AAAE348D0295982749621B9E2A93C8B7961359894AD23002317DE13B77
34,442,699 UART: [art] PUB.Y = C28772A9333C87F2F6F33E9B5FEDB68800797EE97CCA55B052760DF80EED58604DCE6F6BDDF2DD33A2BD3D5C086478D1
34,449,984 UART: [art] SIG.R = 635B08ED6B7AFC804D9E94F8A159D2C73E51C027D3919B20FD2843C59B8DCE425C4DF7D4B4B63FC64E0FB0B3C68AA1E7
34,457,388 UART: [art] SIG.S = D5037ACA7DD7026FC6C85121AB00174C969BCE202961DE09DB0E10A105063CD20A700C12AEEE5546AF9FB932F5FC3140
35,762,697 UART: Caliptra RT
35,763,386 UART: [state] CFI Enabled
35,880,779 UART: [rt] RT listening for mailbox commands...
36,030,546 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,060,522 UART: [rt]cmd =0x4c444556, len=4
36,071,748 >>> mbox cmd response data (687 bytes)
36,217,456 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,247,507 UART: [rt]cmd =0x43455246, len=4
36,260,119 >>> mbox cmd response data (886 bytes)
36,403,598 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,433,367 UART: [rt]cmd =0x43455252, len=4
36,445,014 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1937.18s
Truncated 7343978 bytes from beginning
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
7,988,166 UART: [idev] CSR uploaded
8,005,446 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,149,489 UART: [idev] --
8,150,129 UART: [ldev] ++
8,150,628 UART: [ldev] CDI.KEYID = 6
8,151,504 UART: [ldev] SUBJECT.KEYID = 5
8,152,691 UART: [ldev] AUTHORITY.KEYID = 7
8,153,872 UART: [ldev] FE.KEYID = 1
8,154,746 UART: [ldev] Erasing FE.KEYID = 1
10,557,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,294,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,310,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,326,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,342,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,363,098 UART: [ldev] --
12,368,310 UART: [fwproc] Wait for Commands...
12,370,846 UART: [fwproc] Recv command 0x46574c44
12,372,943 UART: [fwproc] Recv'd Img size: 114360 bytes
15,777,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,849,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,918,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,236,054 >>> mbox cmd response: success
16,239,498 UART: [afmc] ++
16,240,094 UART: [afmc] CDI.KEYID = 6
16,240,985 UART: [afmc] SUBJECT.KEYID = 7
16,242,154 UART: [afmc] AUTHORITY.KEYID = 5
18,786,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,507,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,509,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,525,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,541,712 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,557,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,580,136 UART: [afmc] --
20,583,349 UART: [cold-reset] --
20,586,796 UART: [state] Locking Datavault
20,591,775 UART: [state] Locking PCR0, PCR1 and PCR31
20,593,475 UART: [state] Locking ICCM
20,594,812 UART: [exit] Launching FMC @ 0x40000130
20,603,206 UART:
20,603,441 UART: Running Caliptra FMC ...
20,604,547 UART:
20,604,713 UART: [state] CFI Enabled
20,665,404 UART: [fht] FMC Alias Private Key: 7
22,429,529 UART: [art] Extend RT PCRs Done
22,430,745 UART: [art] Lock RT PCRs Done
22,432,746 UART: [art] Populate DV Done
22,438,329 UART: [fht] FMC Alias Private Key: 7
22,439,872 UART: [art] Derive CDI
22,440,688 UART: [art] Store in in slot 0x4
22,498,481 UART: [art] Derive Key Pair
22,499,594 UART: [art] Store priv key in slot 0x5
24,962,675 UART: [art] Derive Key Pair - Done
24,975,619 UART: [art] Signing Cert with AUTHO
24,976,928 UART: RITY.KEYID = 7
26,689,102 UART: [art] Erasing AUTHORITY.KEYID = 7
26,690,607 UART: [art] PUB.X = E5827406A42FE61DEAE42AD53CDE6D67489093C58289E8CDE8433F062A03EF0E3A81BD64906B5F0A09FCCE2346B74EED
26,697,871 UART: [art] PUB.Y = D36CA7D55FB4F2F8C2A7D6950B45A96AC615E29EFFC0B42EA4165BB7364FCCF12960FD1924612E4FB6081EA0318469B8
26,705,138 UART: [art] SIG.R = 64BFD0A24982BE5BB777344172458723BFB695ECC657BB551917E9567CE80ABEB00E5E5A26BD03BA031F3F301EA9C961
26,712,548 UART: [art] SIG.S = 5C8E12B18E82E006C512150AFEA1DA1FEABC8553F7F2430FE6840EB3F0A9864D4E49659ABED3C23843D7FAD0F6E5E8FC
27,691,613 UART: Caliptra RT
27,692,328 UART: [state] CFI Enabled
27,857,558 UART: [rt] RT listening for mailbox commands...
28,008,923 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,038,980 UART: [rt]cmd =0x4c444556, len=4
28,050,125 >>> mbox cmd response data (687 bytes)
28,195,598 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,225,784 UART: [rt]cmd =0x43455246, len=4
28,238,477 >>> mbox cmd response data (887 bytes)
28,381,326 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,411,337 UART: [rt]cmd =0x43455252, len=4
28,422,591 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,320 UART:
192,697 UART: Running Caliptra ROM ...
193,880 UART:
194,031 UART: [state] CFI Enabled
264,290 UART: [state] LifecycleState = Unprovisioned
266,217 UART: [state] DebugLocked = No
268,140 UART: [state] WD Timer not started. Device not locked for debugging
272,622 UART: [kat] SHA2-256
451,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,307 UART: [kat] ++
463,763 UART: [kat] sha1
474,151 UART: [kat] SHA2-256
477,166 UART: [kat] SHA2-384
483,629 UART: [kat] SHA2-512-ACC
486,566 UART: [kat] ECC-384
2,948,539 UART: [kat] HMAC-384Kdf
2,972,332 UART: [kat] LMS
3,501,796 UART: [kat] --
3,503,868 UART: [cold-reset] ++
3,505,765 UART: [fht] FHT @ 0x50003400
3,516,914 UART: [idev] ++
3,517,477 UART: [idev] CDI.KEYID = 6
3,518,494 UART: [idev] SUBJECT.KEYID = 7
3,519,601 UART: [idev] UDS.KEYID = 0
3,544,377 UART: [idev] Erasing UDS.KEYID = 0
6,028,369 UART: [idev] Sha1 KeyId Algorithm
6,049,875 UART: [idev] CSR upload begun
6,054,576 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,780,509 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,796,603 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,812,564 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,828,387 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,213 UART: [idev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
7,996,760 UART: [idev] CSR uploaded
8,014,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,158,091 UART: [idev] --
8,158,726 UART: [ldev] ++
8,159,223 UART: [ldev] CDI.KEYID = 6
8,160,129 UART: [ldev] SUBJECT.KEYID = 5
8,161,223 UART: [ldev] AUTHORITY.KEYID = 7
8,162,413 UART: [ldev] FE.KEYID = 1
8,163,308 UART: [ldev] Erasing FE.KEYID = 1
10,567,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,319,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,350,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,371,564 UART: [ldev] --
12,376,543 UART: [fwproc] Wait for Commands...
12,379,523 UART: [fwproc] Recv command 0x46574c44
12,381,572 UART: [fwproc] Recv'd Img size: 114360 bytes
15,785,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,859,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,928,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,246,759 >>> mbox cmd response: success
16,251,785 UART: [afmc] ++
16,252,370 UART: [afmc] CDI.KEYID = 6
16,253,279 UART: [afmc] SUBJECT.KEYID = 7
16,254,441 UART: [afmc] AUTHORITY.KEYID = 5
18,791,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,516,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,517,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,533,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,549,816 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,565,668 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,589,359 UART: [afmc] --
20,593,057 UART: [cold-reset] --
20,596,923 UART: [state] Locking Datavault
20,602,982 UART: [state] Locking PCR0, PCR1 and PCR31
20,604,683 UART: [state] Locking ICCM
20,606,830 UART: [exit] Launching FMC @ 0x40000130
20,615,261 UART:
20,615,509 UART: Running Caliptra FMC ...
20,616,636 UART:
20,616,794 UART: [state] CFI Enabled
20,673,149 UART: [fht] FMC Alias Private Key: 7
22,437,127 UART: [art] Extend RT PCRs Done
22,438,346 UART: [art] Lock RT PCRs Done
22,439,935 UART: [art] Populate DV Done
22,445,565 UART: [fht] FMC Alias Private Key: 7
22,447,260 UART: [art] Derive CDI
22,448,026 UART: [art] Store in in slot 0x4
22,506,273 UART: [art] Derive Key Pair
22,507,280 UART: [art] Store priv key in slot 0x5
24,970,537 UART: [art] Derive Key Pair - Done
24,983,093 UART: [art] Signing Cert with AUTHO
24,984,412 UART: RITY.KEYID = 7
26,695,272 UART: [art] Erasing AUTHORITY.KEYID = 7
26,696,775 UART: [art] PUB.X = 19707684E6ADF87CE739CBEDCB350D39CDD29576A2924215E332578683F9DAD9B4FB9CCA747556046421AD1D2DFD7404
26,704,055 UART: [art] PUB.Y = 6FBC1C3360C295ED9ECB0A07F512373EB4571C8917F26771B26E9BEF1A308D0CD8FB749B36DA4C4E87074FB5CF5F4314
26,711,293 UART: [art] SIG.R = 784F913A17C580138D84B3F955FE1561CE5D700C85923F32AA7561288B384737D156A3598AE6AB61761619D08733D380
26,718,686 UART: [art] SIG.S = 1C2541C98DD08C264E12682267E5F360BE2F34FB06D50C5D29D2C153F15DD58B1A3F38DFE95243ED8C5291B6A68E7950
27,697,177 UART: Caliptra RT
27,697,869 UART: [state] CFI Enabled
27,864,005 UART: [rt] RT listening for mailbox commands...
28,014,998 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,044,934 UART: [rt]cmd =0x4c444556, len=4
28,056,098 >>> mbox cmd response data (687 bytes)
28,201,813 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,231,738 UART: [rt]cmd =0x43455246, len=4
28,244,378 >>> mbox cmd response data (887 bytes)
28,387,595 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,417,386 UART: [rt]cmd =0x43455252, len=4
28,428,823 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.24s
Truncated 7343978 bytes from beginning
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
7,998,200 UART: [idev] CSR uploaded
8,015,574 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,159,466 UART: [idev] --
8,160,095 UART: [ldev] ++
8,160,596 UART: [ldev] CDI.KEYID = 6
8,161,470 UART: [ldev] SUBJECT.KEYID = 5
8,162,652 UART: [ldev] AUTHORITY.KEYID = 7
8,163,840 UART: [ldev] FE.KEYID = 1
8,164,688 UART: [ldev] Erasing FE.KEYID = 1
10,563,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,283,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,299,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,315,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,331,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,352,352 UART: [ldev] --
12,357,364 UART: [fwproc] Wait for Commands...
12,360,175 UART: [fwproc] Recv command 0x46574c44
12,362,296 UART: [fwproc] Recv'd Img size: 114360 bytes
15,765,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,836,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,905,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,222,971 >>> mbox cmd response: success
16,227,269 UART: [afmc] ++
16,227,860 UART: [afmc] CDI.KEYID = 6
16,228,775 UART: [afmc] SUBJECT.KEYID = 7
16,229,993 UART: [afmc] AUTHORITY.KEYID = 5
18,767,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,492,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,494,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,510,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,526,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,542,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,565,129 UART: [afmc] --
20,568,744 UART: [cold-reset] --
20,572,076 UART: [state] Locking Datavault
20,577,857 UART: [state] Locking PCR0, PCR1 and PCR31
20,579,520 UART: [state] Locking ICCM
20,581,624 UART: [exit] Launching FMC @ 0x40000130
20,590,022 UART:
20,590,261 UART: Running Caliptra FMC ...
20,591,364 UART:
20,591,523 UART: [state] CFI Enabled
20,651,929 UART: [fht] FMC Alias Private Key: 7
22,415,457 UART: [art] Extend RT PCRs Done
22,416,680 UART: [art] Lock RT PCRs Done
22,418,442 UART: [art] Populate DV Done
22,423,689 UART: [fht] FMC Alias Private Key: 7
22,425,397 UART: [art] Derive CDI
22,426,140 UART: [art] Store in in slot 0x4
22,484,172 UART: [art] Derive Key Pair
22,485,176 UART: [art] Store priv key in slot 0x5
24,947,814 UART: [art] Derive Key Pair - Done
24,960,867 UART: [art] Signing Cert with AUTHO
24,962,173 UART: RITY.KEYID = 7
26,673,053 UART: [art] Erasing AUTHORITY.KEYID = 7
26,674,564 UART: [art] PUB.X = 9DCFA8E09D7BEEB95668CD83832E14B43C7BD56405521C0D4C40B15DD6306036257EF412577822A591153E4DE5C2650F
26,681,791 UART: [art] PUB.Y = 245753302C4905F615E9869B47F672BD29D1667E7D8333553150F81BF7CC285BD73250758FE1556817D080440C560280
26,689,025 UART: [art] SIG.R = CC4EEB7C310E468FA145DCE2A8A5BC71000BDA7D1C388B92CB581B19F17A08160362689576E1121B75A5172005747EA3
26,696,370 UART: [art] SIG.S = 40E4BFA4C7C44A99F9879D992133FCE471DD5827ACAFDD7C219391D4B5932A215CF9EB39483D5CAB559B90F50F7D94FF
27,675,419 UART: Caliptra RT
27,676,144 UART: [state] CFI Enabled
27,840,460 UART: [rt] RT listening for mailbox commands...
27,991,458 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,021,338 UART: [rt]cmd =0x4c444556, len=4
28,032,580 >>> mbox cmd response data (687 bytes)
28,177,948 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,207,936 UART: [rt]cmd =0x43455246, len=4
28,220,658 >>> mbox cmd response data (887 bytes)
28,363,498 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,393,212 UART: [rt]cmd =0x43455252, len=4
28,404,591 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,121 UART:
192,520 UART: Running Caliptra ROM ...
193,707 UART:
193,861 UART: [state] CFI Enabled
264,049 UART: [state] LifecycleState = Unprovisioned
265,925 UART: [state] DebugLocked = No
268,012 UART: [state] WD Timer not started. Device not locked for debugging
272,384 UART: [kat] SHA2-256
451,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,061 UART: [kat] ++
463,603 UART: [kat] sha1
474,324 UART: [kat] SHA2-256
477,336 UART: [kat] SHA2-384
483,632 UART: [kat] SHA2-512-ACC
486,617 UART: [kat] ECC-384
2,945,816 UART: [kat] HMAC-384Kdf
2,970,359 UART: [kat] LMS
3,499,841 UART: [kat] --
3,504,385 UART: [cold-reset] ++
3,505,237 UART: [fht] FHT @ 0x50003400
3,517,165 UART: [idev] ++
3,517,727 UART: [idev] CDI.KEYID = 6
3,518,609 UART: [idev] SUBJECT.KEYID = 7
3,519,830 UART: [idev] UDS.KEYID = 0
3,542,487 UART: [idev] Erasing UDS.KEYID = 0
6,027,239 UART: [idev] Sha1 KeyId Algorithm
6,047,776 UART: [idev] CSR upload begun
6,052,501 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,751 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,846 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,794 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,826,611 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,850,434 UART: [idev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
7,995,013 UART: [idev] CSR uploaded
8,012,320 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,156,212 UART: [idev] --
8,156,848 UART: [ldev] ++
8,157,344 UART: [ldev] CDI.KEYID = 6
8,158,256 UART: [ldev] SUBJECT.KEYID = 5
8,159,350 UART: [ldev] AUTHORITY.KEYID = 7
8,160,563 UART: [ldev] FE.KEYID = 1
8,161,411 UART: [ldev] Erasing FE.KEYID = 1
10,562,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,279,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,295,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,311,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,326,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,345,869 UART: [ldev] --
12,351,249 UART: [fwproc] Wait for Commands...
12,353,399 UART: [fwproc] Recv command 0x46574c44
12,355,441 UART: [fwproc] Recv'd Img size: 114360 bytes
15,757,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,829,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,898,147 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,215,636 >>> mbox cmd response: success
16,219,622 UART: [afmc] ++
16,220,234 UART: [afmc] CDI.KEYID = 6
16,221,124 UART: [afmc] SUBJECT.KEYID = 7
16,222,342 UART: [afmc] AUTHORITY.KEYID = 5
18,746,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,468,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,470,257 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,486,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,502,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,518,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,541,239 UART: [afmc] --
20,545,528 UART: [cold-reset] --
20,549,222 UART: [state] Locking Datavault
20,552,953 UART: [state] Locking PCR0, PCR1 and PCR31
20,554,595 UART: [state] Locking ICCM
20,557,310 UART: [exit] Launching FMC @ 0x40000130
20,565,702 UART:
20,565,954 UART: Running Caliptra FMC ...
20,566,980 UART:
20,567,123 UART: [state] CFI Enabled
20,629,162 UART: [fht] FMC Alias Private Key: 7
22,392,500 UART: [art] Extend RT PCRs Done
22,393,718 UART: [art] Lock RT PCRs Done
22,395,209 UART: [art] Populate DV Done
22,400,726 UART: [fht] FMC Alias Private Key: 7
22,402,273 UART: [art] Derive CDI
22,403,006 UART: [art] Store in in slot 0x4
22,461,829 UART: [art] Derive Key Pair
22,462,865 UART: [art] Store priv key in slot 0x5
24,925,708 UART: [art] Derive Key Pair - Done
24,938,695 UART: [art] Signing Cert with AUTHO
24,940,004 UART: RITY.KEYID = 7
26,651,027 UART: [art] Erasing AUTHORITY.KEYID = 7
26,652,555 UART: [art] PUB.X = 5AC0CB421B6DB718C6A9EA65DC63E509A395AA603FE738F98964B7B697DBB2C66CCDDC6040651370D344262FB6F4536D
26,659,807 UART: [art] PUB.Y = 00AB4B74F8990AD55A59F19B55A89A31C801CCFE140E88814A2542D602BF9C2CE56EC738F98CBA57699BDB9158C3E4F0
26,667,042 UART: [art] SIG.R = 77E6799E7A924E95EB9AE51B063A11DE7812CF5AC4642ED85905535ED742EC3F84C37B3AA75F4B521D9055F365ABF854
26,674,437 UART: [art] SIG.S = A03B8429055839A89CA302FA132D24307E44D5426AE9D78A9C4DB8A0C7E8B20AD8AA369E67B42E02A29CE1B4DBF51AB5
27,652,720 UART: Caliptra RT
27,653,414 UART: [state] CFI Enabled
27,817,983 UART: [rt] RT listening for mailbox commands...
27,968,780 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,998,776 UART: [rt]cmd =0x4c444556, len=4
28,009,720 >>> mbox cmd response data (687 bytes)
28,154,867 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,184,887 UART: [rt]cmd =0x43455246, len=4
28,197,571 >>> mbox cmd response data (887 bytes)
28,341,334 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,371,466 UART: [rt]cmd =0x43455252, len=4
28,382,788 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.23s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
7,666,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,823,691 >>> mbox cmd response: success
20,115,891 UART:
20,116,272 UART: Running Caliptra FMC ...
20,117,416 UART:
20,117,578 UART: [state] CFI Enabled
20,182,349 UART: [fht] FMC Alias Private Key: 7
21,946,091 UART: [art] Extend RT PCRs Done
21,947,328 UART: [art] Lock RT PCRs Done
21,948,654 UART: [art] Populate DV Done
21,954,092 UART: [fht] FMC Alias Private Key: 7
21,955,643 UART: [art] Derive CDI
21,956,374 UART: [art] Store in in slot 0x4
22,014,774 UART: [art] Derive Key Pair
22,015,821 UART: [art] Store priv key in slot 0x5
24,478,797 UART: [art] Derive Key Pair - Done
24,491,585 UART: [art] Signing Cert with AUTHO
24,492,889 UART: RITY.KEYID = 7
26,204,098 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,763 UART: [art] PUB.X = 7EC964590B6158DC173EC02A5972A6EEEAEE538E3A4D7C0980D454274CB0F517F8D6CA18ADFDF485284C2CBBC5A3D715
26,212,865 UART: [art] PUB.Y = 5A6EDC6A62DAA15B554124077D193F89D587E513999CF9180EBDAC1C558F7AB10798AE715984BF83D273FBD71B0C1EE7
26,220,150 UART: [art] SIG.R = 43720655CE9CE4038519F7C900154C16D23BD68AFECB0B352B184EF68DFB8A03450DE0E21429888323D6FF934B406C0B
26,227,513 UART: [art] SIG.S = 2B351E0DCE772A306AFC587067274419A5374F3F445599459BC1B8094CC51C08471488E7F85795A3EC88C32F6AB7FFA2
27,206,304 UART: Caliptra RT
27,207,007 UART: [state] CFI Enabled
27,372,807 UART: [rt] RT listening for mailbox commands...
27,523,051 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,552,957 UART: [rt]cmd =0x4c444556, len=4
27,564,032 >>> mbox cmd response data (687 bytes)
27,709,845 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,739,767 UART: [rt]cmd =0x43455246, len=4
27,752,466 >>> mbox cmd response data (887 bytes)
27,895,321 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,925,249 UART: [rt]cmd =0x43455252, len=4
27,936,688 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
7,687,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,850,265 >>> mbox cmd response: success
20,135,099 UART:
20,135,502 UART: Running Caliptra FMC ...
20,136,635 UART:
20,136,789 UART: [state] CFI Enabled
20,204,459 UART: [fht] FMC Alias Private Key: 7
21,968,620 UART: [art] Extend RT PCRs Done
21,969,833 UART: [art] Lock RT PCRs Done
21,971,536 UART: [art] Populate DV Done
21,977,011 UART: [fht] FMC Alias Private Key: 7
21,978,589 UART: [art] Derive CDI
21,979,329 UART: [art] Store in in slot 0x4
22,037,236 UART: [art] Derive Key Pair
22,038,242 UART: [art] Store priv key in slot 0x5
24,501,351 UART: [art] Derive Key Pair - Done
24,513,976 UART: [art] Signing Cert with AUTHO
24,515,302 UART: RITY.KEYID = 7
26,226,558 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,052 UART: [art] PUB.X = B7D7ED60DC646E0738FA39841A6D2C3FE6E0977F6A303BD997518F7AE419694BD326D1EA8DB1915853007D2A353CE603
26,235,307 UART: [art] PUB.Y = 06FA833F096F9453362C912C1CD42ECBB2F77E7C8603ED842EFB543EFB01D223F8CE1FA61C6C3BBF44546D1C5CDC33FB
26,242,581 UART: [art] SIG.R = 9E2E13C353B2E7A2C8682F8F1894E6378F932B001E485A2232C9315E94ABF445D4178E98A5CCBE4C85BE1A7F6226964C
26,249,994 UART: [art] SIG.S = 63AB1DF3CD9ECFBE36C3884EF3A1C3319A9C297542FDFC4238E8F20D21B5B9FCC1A97AE54D0358458381E7E25DB85CCF
27,229,682 UART: Caliptra RT
27,230,408 UART: [state] CFI Enabled
27,393,582 UART: [rt] RT listening for mailbox commands...
27,542,923 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,573,195 UART: [rt]cmd =0x4c444556, len=4
27,584,401 >>> mbox cmd response data (687 bytes)
27,729,002 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,758,860 UART: [rt]cmd =0x43455246, len=4
27,771,519 >>> mbox cmd response data (887 bytes)
27,914,072 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,944,116 UART: [rt]cmd =0x43455252, len=4
27,955,509 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
7,667,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,813,568 >>> mbox cmd response: success
20,108,538 UART:
20,108,925 UART: Running Caliptra FMC ...
20,110,029 UART:
20,110,184 UART: [state] CFI Enabled
20,160,278 UART: [fht] FMC Alias Private Key: 7
21,923,996 UART: [art] Extend RT PCRs Done
21,925,229 UART: [art] Lock RT PCRs Done
21,926,883 UART: [art] Populate DV Done
21,932,296 UART: [fht] FMC Alias Private Key: 7
21,934,002 UART: [art] Derive CDI
21,934,766 UART: [art] Store in in slot 0x4
21,993,330 UART: [art] Derive Key Pair
21,994,375 UART: [art] Store priv key in slot 0x5
24,457,168 UART: [art] Derive Key Pair - Done
24,470,119 UART: [art] Signing Cert with AUTHO
24,471,421 UART: RITY.KEYID = 7
26,183,272 UART: [art] Erasing AUTHORITY.KEYID = 7
26,184,919 UART: [art] PUB.X = 1B58E0980482F32E9E8D6E6E567647578F0C484E4F92B79A2F8783EE593A9E285FE1B9E1DCA1FAC903BC7151315B7511
26,192,002 UART: [art] PUB.Y = 32FAFB27E2B8D9C2DD4C411FDEBC565347A09E6A5D1DDF7427B4A26BE620A18BD306027ABDEC9D485A8F95E8FE4C0274
26,199,304 UART: [art] SIG.R = 50C0F49DB5DE26F98EB33BCA0ABC8D6307A760571550E4D83072F8589DFAE403A594DA66E49A80C8FB3089FFA9803961
26,206,702 UART: [art] SIG.S = DC1DE023207C21E39968DE2A2EA9F9543C1DE7362F607C2B69CC729F0397373D569BFB54215F075152EC0DC414EFD180
27,185,311 UART: Caliptra RT
27,186,007 UART: [state] CFI Enabled
27,351,730 UART: [rt] RT listening for mailbox commands...
27,501,602 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,531,889 UART: [rt]cmd =0x4c444556, len=4
27,543,168 >>> mbox cmd response data (687 bytes)
27,688,728 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,718,911 UART: [rt]cmd =0x43455246, len=4
27,731,500 >>> mbox cmd response data (887 bytes)
27,874,246 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,904,179 UART: [rt]cmd =0x43455252, len=4
27,915,378 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
7,686,060 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,834,563 >>> mbox cmd response: success
20,114,575 UART:
20,114,979 UART: Running Caliptra FMC ...
20,116,117 UART:
20,116,275 UART: [state] CFI Enabled
20,180,927 UART: [fht] FMC Alias Private Key: 7
21,944,699 UART: [art] Extend RT PCRs Done
21,945,918 UART: [art] Lock RT PCRs Done
21,947,922 UART: [art] Populate DV Done
21,953,350 UART: [fht] FMC Alias Private Key: 7
21,955,003 UART: [art] Derive CDI
21,955,828 UART: [art] Store in in slot 0x4
22,013,735 UART: [art] Derive Key Pair
22,014,809 UART: [art] Store priv key in slot 0x5
24,477,284 UART: [art] Derive Key Pair - Done
24,490,190 UART: [art] Signing Cert with AUTHO
24,491,494 UART: RITY.KEYID = 7
26,203,670 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,182 UART: [art] PUB.X = 1FE3E956E6CEDC2D3967C17D95420E58A6A224CF5D524B9F95E490998FBC5274AC36166ABDF911625D783C5A5E723C14
26,212,439 UART: [art] PUB.Y = 360B7C79D74D28EC697E66CBBEC5D54AB2685E9693E5D8FC6D3D46235B39F1C152004B7E8A47C49969D130BE4A98CA71
26,219,716 UART: [art] SIG.R = 8D620746CD991AA5D49C9F55A612DF74146F4FCA38E5B99BA9BC88D5DA2E5E92C0686F4943D4809C3111BF6266E43BA3
26,227,114 UART: [art] SIG.S = 6DA926607A90DD3006DE7501CE1818C11457C7AF466551E2F9CC1F4285F352C6EC72E6104E0BB19738A18EAC57E882E6
27,205,921 UART: Caliptra RT
27,206,617 UART: [state] CFI Enabled
27,373,288 UART: [rt] RT listening for mailbox commands...
27,522,627 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,552,571 UART: [rt]cmd =0x4c444556, len=4
27,563,659 >>> mbox cmd response data (687 bytes)
27,709,099 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,739,032 UART: [rt]cmd =0x43455246, len=4
27,751,842 >>> mbox cmd response data (887 bytes)
27,894,786 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,924,715 UART: [rt]cmd =0x43455252, len=4
27,936,045 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
7,664,296 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,812,461 >>> mbox cmd response: success
20,091,333 UART:
20,091,737 UART: Running Caliptra FMC ...
20,092,857 UART:
20,093,014 UART: [state] CFI Enabled
20,159,299 UART: [fht] FMC Alias Private Key: 7
21,923,691 UART: [art] Extend RT PCRs Done
21,924,911 UART: [art] Lock RT PCRs Done
21,926,453 UART: [art] Populate DV Done
21,931,584 UART: [fht] FMC Alias Private Key: 7
21,933,233 UART: [art] Derive CDI
21,933,966 UART: [art] Store in in slot 0x4
21,992,300 UART: [art] Derive Key Pair
21,993,342 UART: [art] Store priv key in slot 0x5
24,455,857 UART: [art] Derive Key Pair - Done
24,468,693 UART: [art] Signing Cert with AUTHO
24,469,994 UART: RITY.KEYID = 7
26,182,135 UART: [art] Erasing AUTHORITY.KEYID = 7
26,183,648 UART: [art] PUB.X = C12518E940507B32639BDBD4B56F892A9C71959ED1A6B7A1A517096F068F5BBEA2C87153E498DDD8DD2500B3052A6E5D
26,190,846 UART: [art] PUB.Y = C28299B3FB3E125D0A427E83755BF8512F2EC2287548B1ED2DD878501BEB41C16AEF6BFB483B97B43A1A04F2CF730DB5
26,198,149 UART: [art] SIG.R = 4C62FA2BE7D2E33280DFCF1DDDD8D8ECC3F6E1CEB1C10A4450AFA7BF6319760D653CB7DDC728B1A37769773BC90F6C04
26,205,691 UART: [art] SIG.S = 23F7EEC946501D0E5E0B0744FD17304768142E1FE4E59A0C045F2C211FABF385EE423C87B9D75B2C260CEB7E656C0706
27,184,135 UART: Caliptra RT
27,184,853 UART: [state] CFI Enabled
27,351,925 UART: [rt] RT listening for mailbox commands...
27,501,926 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,531,644 UART: [rt]cmd =0x4c444556, len=4
27,542,710 >>> mbox cmd response data (687 bytes)
27,688,355 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,718,449 UART: [rt]cmd =0x43455246, len=4
27,731,042 >>> mbox cmd response data (887 bytes)
27,873,676 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,903,483 UART: [rt]cmd =0x43455252, len=4
27,914,840 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.87s
Truncated 7343978 bytes from beginning
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
8,265,659 UART: [idev] CSR uploaded
8,282,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,426,723 UART: [idev] --
8,427,379 UART: [ldev] ++
8,427,879 UART: [ldev] CDI.KEYID = 6
8,428,754 UART: [ldev] SUBJECT.KEYID = 5
8,429,930 UART: [ldev] AUTHORITY.KEYID = 7
8,431,108 UART: [ldev] FE.KEYID = 1
8,431,978 UART: [ldev] Erasing FE.KEYID = 1
10,775,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,493,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,510,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,525,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,541,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,561,472 UART: [ldev] --
12,565,489 UART: [fwproc] Wait for Commands...
12,568,506 UART: [fwproc] Recv command 0x46574c44
12,570,605 UART: [fwproc] Recv'd Img size: 114360 bytes
15,971,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,042,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,430,030 >>> mbox cmd response: success
16,435,134 UART: [afmc] ++
16,435,718 UART: [afmc] CDI.KEYID = 6
16,436,628 UART: [afmc] SUBJECT.KEYID = 7
16,437,840 UART: [afmc] AUTHORITY.KEYID = 5
18,935,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,659,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,661,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,677,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,693,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,709,469 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,733,151 UART: [afmc] --
20,737,342 UART: [cold-reset] --
20,742,168 UART: [state] Locking Datavault
20,746,723 UART: [state] Locking PCR0, PCR1 and PCR31
20,748,359 UART: [state] Locking ICCM
20,750,505 UART: [exit] Launching FMC @ 0x40000130
20,758,956 UART:
20,759,191 UART: Running Caliptra FMC ...
20,760,287 UART:
20,760,446 UART: [state] CFI Enabled
20,768,758 UART: [fht] FMC Alias Private Key: 7
22,525,946 UART: [art] Extend RT PCRs Done
22,527,138 UART: [art] Lock RT PCRs Done
22,528,858 UART: [art] Populate DV Done
22,533,991 UART: [fht] FMC Alias Private Key: 7
22,535,532 UART: [art] Derive CDI
22,536,343 UART: [art] Store in in slot 0x4
22,578,709 UART: [art] Derive Key Pair
22,579,743 UART: [art] Store priv key in slot 0x5
25,006,401 UART: [art] Derive Key Pair - Done
25,019,184 UART: [art] Signing Cert with AUTHO
25,020,515 UART: RITY.KEYID = 7
26,726,057 UART: [art] Erasing AUTHORITY.KEYID = 7
26,727,561 UART: [art] PUB.X = B5F9AF16CD3FAB4F98FDCA92B0959C52DFD87E9D654DC56C936BCEB44C36F70080236B8BBCB8343FBEB2F6C73CAE6D4C
26,734,855 UART: [art] PUB.Y = C8AD7511E20001D15D133AC675C39433EE6B6C2DD5514106067227EFC8B541A08D68AA235FBC467163968E9208B804BC
26,742,091 UART: [art] SIG.R = E465F6564C4A5C528051140ED9DC4C22C24929967FB17338D3A66D6F6CAD000DE473751A985463FC8117528A6FAA98DB
26,749,435 UART: [art] SIG.S = 3FAD4EA032952ED7B854167E37AA4F2A9AFE9C34645BB8A7733CC85C44F9F35DB1CA628126086DC420596D6EAB62941E
27,728,417 UART: Caliptra RT
27,729,127 UART: [state] CFI Enabled
27,847,223 UART: [rt] RT listening for mailbox commands...
27,998,278 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,028,301 UART: [rt]cmd =0x4c444556, len=4
28,039,449 >>> mbox cmd response data (687 bytes)
28,185,346 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,215,289 UART: [rt]cmd =0x43455246, len=4
28,228,101 >>> mbox cmd response data (887 bytes)
28,372,001 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,401,803 UART: [rt]cmd =0x43455252, len=4
28,413,170 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,572 UART:
192,934 UART: Running Caliptra ROM ...
194,122 UART:
603,733 UART: [state] CFI Enabled
616,295 UART: [state] LifecycleState = Unprovisioned
618,127 UART: [state] DebugLocked = No
620,110 UART: [state] WD Timer not started. Device not locked for debugging
623,387 UART: [kat] SHA2-256
802,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,094 UART: [kat] ++
814,647 UART: [kat] sha1
825,746 UART: [kat] SHA2-256
828,808 UART: [kat] SHA2-384
834,887 UART: [kat] SHA2-512-ACC
837,823 UART: [kat] ECC-384
3,277,347 UART: [kat] HMAC-384Kdf
3,290,376 UART: [kat] LMS
3,819,833 UART: [kat] --
3,823,276 UART: [cold-reset] ++
3,825,793 UART: [fht] FHT @ 0x50003400
3,838,171 UART: [idev] ++
3,838,739 UART: [idev] CDI.KEYID = 6
3,839,649 UART: [idev] SUBJECT.KEYID = 7
3,840,856 UART: [idev] UDS.KEYID = 0
3,857,581 UART: [idev] Erasing UDS.KEYID = 0
6,311,029 UART: [idev] Sha1 KeyId Algorithm
6,332,879 UART: [idev] CSR upload begun
6,337,595 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,054,159 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,070,247 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,086,203 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,102,028 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,125,869 UART: [idev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
8,270,374 UART: [idev] CSR uploaded
8,287,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,431,435 UART: [idev] --
8,432,073 UART: [ldev] ++
8,432,570 UART: [ldev] CDI.KEYID = 6
8,433,443 UART: [ldev] SUBJECT.KEYID = 5
8,434,616 UART: [ldev] AUTHORITY.KEYID = 7
8,435,798 UART: [ldev] FE.KEYID = 1
8,436,668 UART: [ldev] Erasing FE.KEYID = 1
10,779,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,497,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,513,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,528,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,544,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,565,424 UART: [ldev] --
12,570,848 UART: [fwproc] Wait for Commands...
12,573,206 UART: [fwproc] Recv command 0x46574c44
12,575,292 UART: [fwproc] Recv'd Img size: 114360 bytes
15,986,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,125,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,442,532 >>> mbox cmd response: success
16,447,233 UART: [afmc] ++
16,447,819 UART: [afmc] CDI.KEYID = 6
16,448,727 UART: [afmc] SUBJECT.KEYID = 7
16,449,961 UART: [afmc] AUTHORITY.KEYID = 5
18,948,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,669,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,671,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,687,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,703,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,719,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,741,629 UART: [afmc] --
20,744,994 UART: [cold-reset] --
20,749,604 UART: [state] Locking Datavault
20,753,494 UART: [state] Locking PCR0, PCR1 and PCR31
20,755,186 UART: [state] Locking ICCM
20,756,788 UART: [exit] Launching FMC @ 0x40000130
20,765,178 UART:
20,765,408 UART: Running Caliptra FMC ...
20,766,504 UART:
20,766,682 UART: [state] CFI Enabled
20,774,836 UART: [fht] FMC Alias Private Key: 7
22,531,425 UART: [art] Extend RT PCRs Done
22,532,651 UART: [art] Lock RT PCRs Done
22,534,324 UART: [art] Populate DV Done
22,539,679 UART: [fht] FMC Alias Private Key: 7
22,541,206 UART: [art] Derive CDI
22,541,976 UART: [art] Store in in slot 0x4
22,584,575 UART: [art] Derive Key Pair
22,585,570 UART: [art] Store priv key in slot 0x5
25,012,241 UART: [art] Derive Key Pair - Done
25,025,019 UART: [art] Signing Cert with AUTHO
25,026,355 UART: RITY.KEYID = 7
26,731,717 UART: [art] Erasing AUTHORITY.KEYID = 7
26,733,217 UART: [art] PUB.X = D572965392866E8794B5932244374676075FE91147E1C764D2C3BD7834799B4D656D4E6CA39E763C877A6DD7EACE1C00
26,740,418 UART: [art] PUB.Y = 4105B879FB9E3742C92F831BFB25780BF3021534AF028B04984FD04DC4753886B250289ED0435C9B8F9EA2BC1BB577B1
26,747,671 UART: [art] SIG.R = B4CD7EE23E8310BD91926F41609F1342F4A35E8632C537C2DACB8068BA57D3279CBE01DF810ECE374092872216E4EC83
26,755,072 UART: [art] SIG.S = A47B461DF2CAD87301E3366C5D9B99267A8CFB78FE2FE989FC442D2DF1629E571A29C62423EADBF508B20C76FC330398
27,734,445 UART: Caliptra RT
27,735,158 UART: [state] CFI Enabled
27,852,181 UART: [rt] RT listening for mailbox commands...
28,003,489 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,033,720 UART: [rt]cmd =0x4c444556, len=4
28,045,015 >>> mbox cmd response data (687 bytes)
28,190,708 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,220,742 UART: [rt]cmd =0x43455246, len=4
28,233,282 >>> mbox cmd response data (887 bytes)
28,377,032 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,406,923 UART: [rt]cmd =0x43455252, len=4
28,418,346 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.35s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
7,940,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,032,214 >>> mbox cmd response: success
20,279,305 UART:
20,279,721 UART: Running Caliptra FMC ...
20,280,934 UART:
20,281,124 UART: [state] CFI Enabled
20,289,131 UART: [fht] FMC Alias Private Key: 7
22,045,936 UART: [art] Extend RT PCRs Done
22,047,162 UART: [art] Lock RT PCRs Done
22,048,908 UART: [art] Populate DV Done
22,054,376 UART: [fht] FMC Alias Private Key: 7
22,055,863 UART: [art] Derive CDI
22,056,625 UART: [art] Store in in slot 0x4
22,099,557 UART: [art] Derive Key Pair
22,100,606 UART: [art] Store priv key in slot 0x5
24,527,455 UART: [art] Derive Key Pair - Done
24,540,541 UART: [art] Signing Cert with AUTHO
24,541,843 UART: RITY.KEYID = 7
26,247,591 UART: [art] Erasing AUTHORITY.KEYID = 7
26,249,098 UART: [art] PUB.X = 897C766A8EBC7A2F36D8D8190850DD20562965FEDDC96852B5D9938CDB236921BF533B7CEB1EB7AEC444E07D0473B1B8
26,256,345 UART: [art] PUB.Y = 6ABE9A514E996C1E11CFC46082E6DFA63CA09FC7CB40C35138F42C90A5B9934601A474363323713C91AE6F5FAE789E3A
26,263,603 UART: [art] SIG.R = 88DAF1106591BD8F4EFBC3382A058108286FAC1E4EB8775DD198E01ACFA67384632318534DFDC0779ED29A932DD8F624
26,270,998 UART: [art] SIG.S = 20B7242E6DDB35D7DDA701766D69CA7FC0289BBC277E050F535E96C5B3671FF99106E2AB1839C9F5CA749459EB9FFB99
27,249,492 UART: Caliptra RT
27,250,220 UART: [state] CFI Enabled
27,366,205 UART: [rt] RT listening for mailbox commands...
27,516,130 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,546,347 UART: [rt]cmd =0x4c444556, len=4
27,557,495 >>> mbox cmd response data (687 bytes)
27,702,908 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,732,898 UART: [rt]cmd =0x43455246, len=4
27,745,458 >>> mbox cmd response data (887 bytes)
27,888,930 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,919,030 UART: [rt]cmd =0x43455252, len=4
27,930,195 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
7,941,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,014,391 >>> mbox cmd response: success
20,261,524 UART:
20,261,901 UART: Running Caliptra FMC ...
20,263,115 UART:
20,263,285 UART: [state] CFI Enabled
20,271,121 UART: [fht] FMC Alias Private Key: 7
22,027,724 UART: [art] Extend RT PCRs Done
22,028,998 UART: [art] Lock RT PCRs Done
22,030,547 UART: [art] Populate DV Done
22,035,875 UART: [fht] FMC Alias Private Key: 7
22,037,473 UART: [art] Derive CDI
22,038,291 UART: [art] Store in in slot 0x4
22,080,946 UART: [art] Derive Key Pair
22,081,950 UART: [art] Store priv key in slot 0x5
24,508,950 UART: [art] Derive Key Pair - Done
24,522,109 UART: [art] Signing Cert with AUTHO
24,523,409 UART: RITY.KEYID = 7
26,228,721 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,223 UART: [art] PUB.X = BF6821CCA8CCE6849AF13E4E3BA531ACF096A77E33BFCFB2DF82DCFE5CF06F084D74680895F59DBE87103517CA48BC38
26,237,534 UART: [art] PUB.Y = 0EAABC6D2EA7B27E210EF1325B5BCD4900C5E8BD717D8D14E3E0AA9F3C838AB7E479966B8D43F892B899976B70035396
26,244,772 UART: [art] SIG.R = 3AA8C8E5D8F4EB6B9E15610300624F872643A17845D66BA5E17DD059A5D733528151BDC827871A479FFF008483AB7960
26,252,109 UART: [art] SIG.S = 2395AAFD1D1806CF0DE1F0443DD534F659A453513FD9DEBB995ADF3F58A61EED5134A7B24C1045D031999CFAE4B87ECC
27,231,021 UART: Caliptra RT
27,231,745 UART: [state] CFI Enabled
27,349,518 UART: [rt] RT listening for mailbox commands...
27,499,129 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,528,943 UART: [rt]cmd =0x4c444556, len=4
27,540,070 >>> mbox cmd response data (687 bytes)
27,685,841 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,715,983 UART: [rt]cmd =0x43455246, len=4
27,728,680 >>> mbox cmd response data (887 bytes)
27,872,663 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,902,646 UART: [rt]cmd =0x43455252, len=4
27,914,162 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
7,947,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,035,117 >>> mbox cmd response: success
20,285,264 UART:
20,285,654 UART: Running Caliptra FMC ...
20,286,771 UART:
20,286,953 UART: [state] CFI Enabled
20,294,956 UART: [fht] FMC Alias Private Key: 7
22,052,534 UART: [art] Extend RT PCRs Done
22,053,769 UART: [art] Lock RT PCRs Done
22,055,291 UART: [art] Populate DV Done
22,060,495 UART: [fht] FMC Alias Private Key: 7
22,061,986 UART: [art] Derive CDI
22,062,751 UART: [art] Store in in slot 0x4
22,105,561 UART: [art] Derive Key Pair
22,106,567 UART: [art] Store priv key in slot 0x5
24,533,375 UART: [art] Derive Key Pair - Done
24,546,375 UART: [art] Signing Cert with AUTHO
24,547,674 UART: RITY.KEYID = 7
26,252,960 UART: [art] Erasing AUTHORITY.KEYID = 7
26,254,470 UART: [art] PUB.X = ED6990C2B3F3802ACCC9AA02B3E0BC2F1BBB5D6621BF06CE07D4AF1627B4B45F8CC9655F2E7979D864683EEF687C145B
26,261,768 UART: [art] PUB.Y = 675A8F872E28A634A9072132D5F6455112186A39E57A54C695CEE6F8EE41CB4898199755B374250881096A9CFAA50D3A
26,269,034 UART: [art] SIG.R = 78A59F3DD395643DE9549761D38BB77C0A1F474ABD86F7BC257422A82E96EDA2C058C1053845FA4FF4504E8CBC414708
26,276,417 UART: [art] SIG.S = B1E04F5D8BEAD2F86F047BC90776D676F84E5B5EA269CDFBB8839B199F217EDEBA1CFF50A23B6BB9C439806683AD4FB3
27,254,882 UART: Caliptra RT
27,255,573 UART: [state] CFI Enabled
27,373,142 UART: [rt] RT listening for mailbox commands...
27,522,999 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,552,938 UART: [rt]cmd =0x4c444556, len=4
27,563,920 >>> mbox cmd response data (687 bytes)
27,708,650 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,738,564 UART: [rt]cmd =0x43455246, len=4
27,751,415 >>> mbox cmd response data (887 bytes)
27,894,889 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,924,882 UART: [rt]cmd =0x43455252, len=4
27,936,423 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
7,939,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,023,184 >>> mbox cmd response: success
20,270,838 UART:
20,271,241 UART: Running Caliptra FMC ...
20,272,385 UART:
20,272,552 UART: [state] CFI Enabled
20,280,492 UART: [fht] FMC Alias Private Key: 7
22,037,609 UART: [art] Extend RT PCRs Done
22,038,835 UART: [art] Lock RT PCRs Done
22,040,188 UART: [art] Populate DV Done
22,045,667 UART: [fht] FMC Alias Private Key: 7
22,047,208 UART: [art] Derive CDI
22,047,972 UART: [art] Store in in slot 0x4
22,091,054 UART: [art] Derive Key Pair
22,092,057 UART: [art] Store priv key in slot 0x5
24,518,714 UART: [art] Derive Key Pair - Done
24,531,794 UART: [art] Signing Cert with AUTHO
24,533,104 UART: RITY.KEYID = 7
26,238,378 UART: [art] Erasing AUTHORITY.KEYID = 7
26,239,888 UART: [art] PUB.X = 63C5810DB4905491BEF539358A67EE0C887B862AA95BEFA5F7FC1457E15E1279197223C249CF799C1C2596506976EAB1
26,247,136 UART: [art] PUB.Y = CCF7E76B56D74C265D8D820329824ADC8568820F1D3493260C15BB4BBE05716AF39827CCE786EA85DAD75F0A6DB85EEE
26,254,436 UART: [art] SIG.R = D2CD9B520C20B1BE1006A8DA2141ABE78DED4B57B91B851D970DC9202F3BC4828FB9EB31B10F2706A14854940D7D88F4
26,261,825 UART: [art] SIG.S = 8C057DBBE4697F2918F212E5FB9B357B4C9B4B98D48EA52FB4BE744BFF0B55D1435A3EE882E1E597E719220F5C57089B
27,240,900 UART: Caliptra RT
27,241,610 UART: [state] CFI Enabled
27,359,333 UART: [rt] RT listening for mailbox commands...
27,509,137 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,539,012 UART: [rt]cmd =0x4c444556, len=4
27,550,059 >>> mbox cmd response data (687 bytes)
27,694,874 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,724,758 UART: [rt]cmd =0x43455246, len=4
27,737,451 >>> mbox cmd response data (887 bytes)
27,881,221 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,911,259 UART: [rt]cmd =0x43455252, len=4
27,922,511 >>> mbox cmd response data (784 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,773 writing to cptra_bootfsm_go
7,938,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,018,047 >>> mbox cmd response: success
20,261,103 UART:
20,261,489 UART: Running Caliptra FMC ...
20,262,677 UART:
20,262,847 UART: [state] CFI Enabled
20,270,682 UART: [fht] FMC Alias Private Key: 7
22,027,799 UART: [art] Extend RT PCRs Done
22,029,028 UART: [art] Lock RT PCRs Done
22,030,934 UART: [art] Populate DV Done
22,036,300 UART: [fht] FMC Alias Private Key: 7
22,037,974 UART: [art] Derive CDI
22,038,796 UART: [art] Store in in slot 0x4
22,081,453 UART: [art] Derive Key Pair
22,082,498 UART: [art] Store priv key in slot 0x5
24,509,472 UART: [art] Derive Key Pair - Done
24,522,200 UART: [art] Signing Cert with AUTHO
24,523,496 UART: RITY.KEYID = 7
26,228,932 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,445 UART: [art] PUB.X = C79B482D76FE907466125B470AFE5EABC355AAE78E2DD6F784E2FB13C5D53E6B8E4E75D23E87326F632399D53AEE8971
26,237,691 UART: [art] PUB.Y = 8692FEAA0E2A6BA4C6CDE353DF7DB41BC39973A3455DA0030B2C093437C7D4D4B9293CAD520125E591E1D8B5CC12301B
26,244,976 UART: [art] SIG.R = 9187713D858113BF93D846F0C46066A17A2F65FF0E4C0179E68E7765A5F18E0F38C872BFD8AB7300B31532A8BEDC95D3
26,252,370 UART: [art] SIG.S = 3257F8112AC4DCA20D073D857D845F617B3705B4F017CFCA5B94212C3C58EE0F38C12F12E23460B5D6CA2995F8BCBE95
27,231,056 UART: Caliptra RT
27,231,754 UART: [state] CFI Enabled
27,349,303 UART: [rt] RT listening for mailbox commands...
27,499,453 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,529,556 UART: [rt]cmd =0x4c444556, len=4
27,540,735 >>> mbox cmd response data (687 bytes)
27,686,749 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,716,640 UART: [rt]cmd =0x43455246, len=4
27,729,443 >>> mbox cmd response data (887 bytes)
27,872,724 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,902,796 UART: [rt]cmd =0x43455252, len=4
27,914,209 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.38s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,870 UART: [idev] CSR uploaded
1,299,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,084 UART: [idev] --
1,301,195 UART: [ldev] ++
1,301,363 UART: [ldev] CDI.KEYID = 6
1,301,727 UART: [ldev] SUBJECT.KEYID = 5
1,302,154 UART: [ldev] AUTHORITY.KEYID = 7
1,302,617 UART: [ldev] FE.KEYID = 1
1,307,585 UART: [ldev] Erasing FE.KEYID = 1
1,334,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,415 UART: [ldev] --
1,373,793 UART: [fwproc] Wait for Commands...
1,374,612 UART: [fwproc] Recv command 0x46574c44
1,375,345 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,153 >>> mbox cmd response: success
2,865,214 UART: [afmc] ++
2,865,382 UART: [afmc] CDI.KEYID = 6
2,865,745 UART: [afmc] SUBJECT.KEYID = 7
2,866,171 UART: [afmc] AUTHORITY.KEYID = 5
2,901,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,027 UART: [afmc] --
2,945,015 UART: [cold-reset] --
2,945,917 UART: [state] Locking Datavault
2,947,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,726 UART: [state] Locking ICCM
2,948,236 UART: [exit] Launching FMC @ 0x40000130
2,953,565 UART:
2,953,581 UART: Running Caliptra FMC ...
2,953,989 UART:
2,954,043 UART: [state] CFI Enabled
2,964,574 UART: [fht] FMC Alias Private Key: 7
3,072,825 UART: [art] Extend RT PCRs Done
3,073,253 UART: [art] Lock RT PCRs Done
3,074,863 UART: [art] Populate DV Done
3,083,036 UART: [fht] FMC Alias Private Key: 7
3,083,982 UART: [art] Derive CDI
3,084,262 UART: [art] Store in in slot 0x4
3,170,101 UART: [art] Derive Key Pair
3,170,461 UART: [art] Store priv key in slot 0x5
3,184,155 UART: [art] Derive Key Pair - Done
3,198,922 UART: [art] Signing Cert with AUTHO
3,199,402 UART: RITY.KEYID = 7
3,214,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,287 UART: [art] PUB.X = A87804C208E6228C69F3633083AD66CAA5CE9FD5B83A574E25C3E328ADF0033AAA51958EAFBB7255A82992A29801183C
3,222,049 UART: [art] PUB.Y = A43E2BA91082765A5289B6AF742CC2D7170B5DD5296184F826E28D54923A3ADFAA5828A57CA2F8F7DA2349BEDD591CD1
3,229,006 UART: [art] SIG.R = 9E8150B37029525CA4F08559620C4CEEC95399CEA983FB08A476B73358FBACCEF86FBE407D20321FEE7317D7CAA1E49B
3,235,782 UART: [art] SIG.S = 42AD38291B0516624316697E35E42E48D8F37B6DAFDAF708AC7FEBA5C8CED575ABA8CC6462CC8BA6CAC44C0F6BC8E2E0
3,259,672 UART: Caliptra RT
3,259,926 UART: [state] CFI Enabled
3,368,364 UART: [rt] RT listening for mailbox commands...
3,369,034 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,497 UART: [rt]cmd =0x4c444556, len=4
3,409,026 >>> mbox cmd response data (687 bytes)
3,409,027 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,492 UART: [rt]cmd =0x43455246, len=4
3,450,603 >>> mbox cmd response data (887 bytes)
3,450,604 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,991 UART: [rt]cmd =0x43455252, len=4
3,490,793 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,196 UART: [kat] SHA2-256
890,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,875 UART: [kat] ++
895,027 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
904,040 UART: [kat] SHA2-512-ACC
905,941 UART: [kat] ECC-384
915,520 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,219 UART: [cold-reset] ++
1,169,685 UART: [fht] FHT @ 0x50003400
1,172,207 UART: [idev] ++
1,172,375 UART: [idev] CDI.KEYID = 6
1,172,736 UART: [idev] SUBJECT.KEYID = 7
1,173,161 UART: [idev] UDS.KEYID = 0
1,180,607 UART: [idev] Erasing UDS.KEYID = 0
1,197,871 UART: [idev] Sha1 KeyId Algorithm
1,206,257 UART: [idev] CSR upload begun
1,208,036 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,427 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,135 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,020 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,726 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,155 UART: [idev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
1,295,652 UART: [idev] CSR uploaded
1,298,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,298,866 UART: [idev] --
1,299,937 UART: [ldev] ++
1,300,105 UART: [ldev] CDI.KEYID = 6
1,300,469 UART: [ldev] SUBJECT.KEYID = 5
1,300,896 UART: [ldev] AUTHORITY.KEYID = 7
1,301,359 UART: [ldev] FE.KEYID = 1
1,306,493 UART: [ldev] Erasing FE.KEYID = 1
1,332,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,345 UART: [ldev] --
1,371,673 UART: [fwproc] Wait for Commands...
1,372,408 UART: [fwproc] Recv command 0x46574c44
1,373,141 UART: [fwproc] Recv'd Img size: 114360 bytes
2,670,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,862,595 >>> mbox cmd response: success
2,863,702 UART: [afmc] ++
2,863,870 UART: [afmc] CDI.KEYID = 6
2,864,233 UART: [afmc] SUBJECT.KEYID = 7
2,864,659 UART: [afmc] AUTHORITY.KEYID = 5
2,900,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,289 UART: [afmc] --
2,943,231 UART: [cold-reset] --
2,943,975 UART: [state] Locking Datavault
2,945,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,786 UART: [state] Locking ICCM
2,946,302 UART: [exit] Launching FMC @ 0x40000130
2,951,631 UART:
2,951,647 UART: Running Caliptra FMC ...
2,952,055 UART:
2,952,109 UART: [state] CFI Enabled
2,962,536 UART: [fht] FMC Alias Private Key: 7
3,070,443 UART: [art] Extend RT PCRs Done
3,070,871 UART: [art] Lock RT PCRs Done
3,072,247 UART: [art] Populate DV Done
3,080,552 UART: [fht] FMC Alias Private Key: 7
3,081,698 UART: [art] Derive CDI
3,081,978 UART: [art] Store in in slot 0x4
3,167,525 UART: [art] Derive Key Pair
3,167,885 UART: [art] Store priv key in slot 0x5
3,180,525 UART: [art] Derive Key Pair - Done
3,195,095 UART: [art] Signing Cert with AUTHO
3,195,575 UART: RITY.KEYID = 7
3,211,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,778 UART: [art] PUB.X = 5C94DFF456C6CA8D6EF6D5F04F74113D388360228098D610AE04094A27ACF878222D2E8517B1C722293D167A06B6A1F6
3,218,537 UART: [art] PUB.Y = DFAA15C7CA792933931BBAA1D4A7759DA4B2B8F724490F8298DFFB29FD8D13B9E27AC327AC54BC2A3861C22A8C715B7B
3,225,502 UART: [art] SIG.R = 6A7BDE62E6C8604FB8466F1553376C94EE942B92122F793BDB6EAD10C4BA98D80102DE7C6BBE1DB74B64C5CB6007D863
3,232,275 UART: [art] SIG.S = 37FBDC89026E278BEE4152493A39ABA27E742F45B5C810C45813238A7236F4C0E81D0076C193E8A0FFBB98A0FCBA29C5
3,256,283 UART: Caliptra RT
3,256,537 UART: [state] CFI Enabled
3,364,323 UART: [rt] RT listening for mailbox commands...
3,364,993 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,408 UART: [rt]cmd =0x4c444556, len=4
3,404,985 >>> mbox cmd response data (687 bytes)
3,404,986 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,589 UART: [rt]cmd =0x43455246, len=4
3,446,448 >>> mbox cmd response data (887 bytes)
3,446,449 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,656 UART: [rt]cmd =0x43455252, len=4
3,486,492 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 932.02s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,830 UART: [art] Lock RT PCRs Done
2,824,204 UART: [art] Populate DV Done
2,832,417 UART: [fht] FMC Alias Private Key: 7
2,833,439 UART: [art] Derive CDI
2,833,719 UART: [art] Store in in slot 0x4
2,919,400 UART: [art] Derive Key Pair
2,919,760 UART: [art] Store priv key in slot 0x5
2,933,208 UART: [art] Derive Key Pair - Done
2,948,336 UART: [art] Signing Cert with AUTHO
2,948,816 UART: RITY.KEYID = 7
2,963,958 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,723 UART: [art] PUB.X = 2144C38328269D97BB3C1F3A6B0DB99AE948D87FB923F7D7F09A999FA5CB411A13E220703B83DEE91FA5A1F3F111816D
2,971,498 UART: [art] PUB.Y = A4CF25273BA7252A7B915CFEA6B37392AFD39EE13E5A696AED1C13246DD0BBDCFC611A3E1FB7D7288E01D398119725C5
2,978,461 UART: [art] SIG.R = 44A5BB9E709319F16863575330EE68E00C59964F60A834D473B930251C3FB719290926691E9CF690AAF6E22CE3249FCD
2,985,219 UART: [art] SIG.S = 92E7A2AF7104A20760A19E2EAC2931862D042EBE1DC2334C7F11C7DAA924ABCA0E8F4CDCED39439857EF09525C29CA4F
3,009,221 UART: Caliptra RT
3,009,475 UART: [state] CFI Enabled
3,116,535 UART: [rt] RT listening for mailbox commands...
3,117,205 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,404 UART: [rt]cmd =0x4c444556, len=4
3,157,065 >>> mbox cmd response data (687 bytes)
3,157,066 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,567 UART: [rt]cmd =0x43455246, len=4
3,198,600 >>> mbox cmd response data (887 bytes)
3,198,601 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,888 UART: [rt]cmd =0x43455252, len=4
3,238,872 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,215 >>> mbox cmd response: success
2,703,307 UART:
2,703,323 UART: Running Caliptra FMC ...
2,703,731 UART:
2,703,785 UART: [state] CFI Enabled
2,714,270 UART: [fht] FMC Alias Private Key: 7
2,822,201 UART: [art] Extend RT PCRs Done
2,822,629 UART: [art] Lock RT PCRs Done
2,824,415 UART: [art] Populate DV Done
2,832,430 UART: [fht] FMC Alias Private Key: 7
2,833,398 UART: [art] Derive CDI
2,833,678 UART: [art] Store in in slot 0x4
2,918,945 UART: [art] Derive Key Pair
2,919,305 UART: [art] Store priv key in slot 0x5
2,932,919 UART: [art] Derive Key Pair - Done
2,947,808 UART: [art] Signing Cert with AUTHO
2,948,288 UART: RITY.KEYID = 7
2,963,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,167 UART: [art] PUB.X = 4DC0A3B77691437D2311BBCE63E8E460DC1EFDFB885268255F960ACD51EF5E12FE456185F963E3BFECF093398920B2BB
2,970,946 UART: [art] PUB.Y = BDEB8920ABEFC494E8569534B99EBC82CFEC4C07FEF52395D7417DF7B324502804A530912CFEC12C31923E118412C174
2,977,896 UART: [art] SIG.R = 99799AACF0D18B8DCBEB5E350076A652C0BD93296566F21853BC6EF0EC0DAE23F5F7CF3F48C098CF5BAC408EFC86EE48
2,984,663 UART: [art] SIG.S = B6C1053D474FBE831F95F9AC32F46A5A4231FD7916A400D2FA0A4177F63867401E9F61655CAD3D45E367B5D47FE5923B
3,008,460 UART: Caliptra RT
3,008,714 UART: [state] CFI Enabled
3,116,031 UART: [rt] RT listening for mailbox commands...
3,116,701 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,272 UART: [rt]cmd =0x4c444556, len=4
3,156,781 >>> mbox cmd response data (687 bytes)
3,156,782 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,973 UART: [rt]cmd =0x43455246, len=4
3,197,890 >>> mbox cmd response data (887 bytes)
3,197,891 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,312 UART: [rt]cmd =0x43455252, len=4
3,237,957 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,498 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,643,488 >>> mbox cmd response: success
2,705,598 UART:
2,705,614 UART: Running Caliptra FMC ...
2,706,022 UART:
2,706,076 UART: [state] CFI Enabled
2,716,479 UART: [fht] FMC Alias Private Key: 7
2,824,078 UART: [art] Extend RT PCRs Done
2,824,506 UART: [art] Lock RT PCRs Done
2,826,016 UART: [art] Populate DV Done
2,834,633 UART: [fht] FMC Alias Private Key: 7
2,835,795 UART: [art] Derive CDI
2,836,075 UART: [art] Store in in slot 0x4
2,921,810 UART: [art] Derive Key Pair
2,922,170 UART: [art] Store priv key in slot 0x5
2,935,004 UART: [art] Derive Key Pair - Done
2,949,670 UART: [art] Signing Cert with AUTHO
2,950,150 UART: RITY.KEYID = 7
2,965,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,051 UART: [art] PUB.X = 21AB2B77803F128CE5DA04169AAF12C0D262C95E45538C81641D0FB97F3B9E8FDECF7AE32C58AF1CBE846CEC53139BCC
2,972,835 UART: [art] PUB.Y = 213D47A68DFC960344501882CF5B01CF576A060DF204915D0986FAB3DF1B63A1F0F2CEAFBE80675B5B4DA7303B8A2F15
2,979,777 UART: [art] SIG.R = 2972938EC0887470CAAE1C245F7EC6A9D05147BA33B4CF56AAC3C53C463B8F753F6C7416C9476CE7D5D84AE2E6F82629
2,986,555 UART: [art] SIG.S = EC0ED018889649ACEEA4F50DE506EFDB916C7B5496C47E0AA29628F6283651C86E7DEC0CE26C5D1710747F8F268997F4
3,010,043 UART: Caliptra RT
3,010,297 UART: [state] CFI Enabled
3,117,583 UART: [rt] RT listening for mailbox commands...
3,118,253 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,880 UART: [rt]cmd =0x4c444556, len=4
3,158,303 >>> mbox cmd response data (687 bytes)
3,158,304 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,769 UART: [rt]cmd =0x43455246, len=4
3,199,846 >>> mbox cmd response data (887 bytes)
3,199,847 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,186 UART: [rt]cmd =0x43455252, len=4
3,240,250 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,639,116 >>> mbox cmd response: success
2,701,716 UART:
2,701,732 UART: Running Caliptra FMC ...
2,702,140 UART:
2,702,194 UART: [state] CFI Enabled
2,712,911 UART: [fht] FMC Alias Private Key: 7
2,820,770 UART: [art] Extend RT PCRs Done
2,821,198 UART: [art] Lock RT PCRs Done
2,822,780 UART: [art] Populate DV Done
2,830,909 UART: [fht] FMC Alias Private Key: 7
2,832,087 UART: [art] Derive CDI
2,832,367 UART: [art] Store in in slot 0x4
2,918,030 UART: [art] Derive Key Pair
2,918,390 UART: [art] Store priv key in slot 0x5
2,931,842 UART: [art] Derive Key Pair - Done
2,946,627 UART: [art] Signing Cert with AUTHO
2,947,107 UART: RITY.KEYID = 7
2,962,279 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,044 UART: [art] PUB.X = 750C23882FDD17BA71492DA8706CC536DB176A4658C6E426C8D1B1D9E57FD73E8EDE1C0D7488492A9280E7026B84F0F4
2,969,809 UART: [art] PUB.Y = 26D99D4D13C090BD4699FA82C86BE5C421966CA1BC4B391EE0B86AF5138E93EEDA0093D716D3EBADE6BE217495B434A1
2,976,751 UART: [art] SIG.R = 87CBDC32BAE3709388DBC6105E455B53D7815FA9E4DF6FF623B2FA753123483813F92B2E496F90793FECEA3526C07E52
2,983,527 UART: [art] SIG.S = 81CF340D1B0A94C5E5F7E4B83B944E8C6660254943D04885483643C43B811C4EFBF3A9F73C3BE7D35C82C212726AED20
3,007,458 UART: Caliptra RT
3,007,712 UART: [state] CFI Enabled
3,115,757 UART: [rt] RT listening for mailbox commands...
3,116,427 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,924 UART: [rt]cmd =0x4c444556, len=4
3,156,551 >>> mbox cmd response data (687 bytes)
3,156,552 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,079 UART: [rt]cmd =0x43455246, len=4
3,198,310 >>> mbox cmd response data (887 bytes)
3,198,311 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,600 UART: [rt]cmd =0x43455252, len=4
3,238,261 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,640,842 >>> mbox cmd response: success
2,702,118 UART:
2,702,134 UART: Running Caliptra FMC ...
2,702,542 UART:
2,702,596 UART: [state] CFI Enabled
2,712,911 UART: [fht] FMC Alias Private Key: 7
2,821,096 UART: [art] Extend RT PCRs Done
2,821,524 UART: [art] Lock RT PCRs Done
2,822,878 UART: [art] Populate DV Done
2,830,953 UART: [fht] FMC Alias Private Key: 7
2,832,061 UART: [art] Derive CDI
2,832,341 UART: [art] Store in in slot 0x4
2,917,692 UART: [art] Derive Key Pair
2,918,052 UART: [art] Store priv key in slot 0x5
2,930,896 UART: [art] Derive Key Pair - Done
2,945,607 UART: [art] Signing Cert with AUTHO
2,946,087 UART: RITY.KEYID = 7
2,961,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,132 UART: [art] PUB.X = A1AF0C5A457321D2E785B47F597DFD4BCD4089B35989FAC47A2F3BACA893C197E3D3BF14EC9178AE1A82F4A3EAD6A947
2,968,919 UART: [art] PUB.Y = 8DCADFA29F5F404FC635430E12DC91849D63476C74414BC7CBFBDB631FE0B8CB31C0073DAC7A8AF398D506532D687057
2,975,872 UART: [art] SIG.R = 7805459BD31C9C4F8AF2A7204219F70EB8A482E2E27DD1B87F36D4B29F807BF577FAC8E0E8CABBF8F90442C52921177D
2,982,643 UART: [art] SIG.S = CDB51B3551CD92316AA5F36838F180BA071235A24138A8A03166EA0B5EC64D277B1D7793C995C7CFEDD30C9F1BBE880C
3,006,956 UART: Caliptra RT
3,007,210 UART: [state] CFI Enabled
3,114,644 UART: [rt] RT listening for mailbox commands...
3,115,314 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,841 UART: [rt]cmd =0x4c444556, len=4
3,155,464 >>> mbox cmd response data (687 bytes)
3,155,465 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,924 UART: [rt]cmd =0x43455246, len=4
3,197,105 >>> mbox cmd response data (887 bytes)
3,197,106 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,319 UART: [rt]cmd =0x43455252, len=4
3,237,311 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 893.75s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,681 UART: [idev] CSR uploaded
1,299,726 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,299,895 UART: [idev] --
1,300,768 UART: [ldev] ++
1,300,936 UART: [ldev] CDI.KEYID = 6
1,301,300 UART: [ldev] SUBJECT.KEYID = 5
1,301,727 UART: [ldev] AUTHORITY.KEYID = 7
1,302,190 UART: [ldev] FE.KEYID = 1
1,307,422 UART: [ldev] Erasing FE.KEYID = 1
1,334,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,024 UART: [ldev] --
1,373,434 UART: [fwproc] Wait for Commands...
1,374,053 UART: [fwproc] Recv command 0x46574c44
1,374,786 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,800 >>> mbox cmd response: success
2,866,005 UART: [afmc] ++
2,866,173 UART: [afmc] CDI.KEYID = 6
2,866,536 UART: [afmc] SUBJECT.KEYID = 7
2,866,962 UART: [afmc] AUTHORITY.KEYID = 5
2,902,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,820 UART: [afmc] --
2,945,744 UART: [cold-reset] --
2,946,706 UART: [state] Locking Datavault
2,947,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,593 UART: [state] Locking ICCM
2,949,151 UART: [exit] Launching FMC @ 0x40000130
2,954,480 UART:
2,954,496 UART: Running Caliptra FMC ...
2,954,904 UART:
2,955,047 UART: [state] CFI Enabled
2,965,640 UART: [fht] FMC Alias Private Key: 7
3,074,379 UART: [art] Extend RT PCRs Done
3,074,807 UART: [art] Lock RT PCRs Done
3,076,285 UART: [art] Populate DV Done
3,084,350 UART: [fht] FMC Alias Private Key: 7
3,085,530 UART: [art] Derive CDI
3,085,810 UART: [art] Store in in slot 0x4
3,171,165 UART: [art] Derive Key Pair
3,171,525 UART: [art] Store priv key in slot 0x5
3,184,889 UART: [art] Derive Key Pair - Done
3,199,515 UART: [art] Signing Cert with AUTHO
3,199,995 UART: RITY.KEYID = 7
3,215,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,966 UART: [art] PUB.X = 58BFEBEF5A801BAD6704E31A7366E194B41D178A391D84961D4E6F99EC5C837BCA1EB49499C69D542E062E7848EAB242
3,222,738 UART: [art] PUB.Y = 55BCE4EB6EC036129ED9DA1F38DEA7BAD64C490012BECF3F39F526F945121846C7EC9957BDBD855FA1052387A06ED951
3,229,677 UART: [art] SIG.R = 079DB4A913B03304D02BF18358238090321CE55209054487596DFC7C6547797103A1AAAFEA94AEE3B1FFAF0A168A74FC
3,236,431 UART: [art] SIG.S = 963BF4F9F2A64D2EB3B3D770010E220C82D2313D0752B927340F57FB844D250687C726A719F70981D08BB22253036226
3,259,912 UART: Caliptra RT
3,260,258 UART: [state] CFI Enabled
3,367,884 UART: [rt] RT listening for mailbox commands...
3,368,554 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,001 UART: [rt]cmd =0x4c444556, len=4
3,408,348 >>> mbox cmd response data (687 bytes)
3,408,349 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,554 UART: [rt]cmd =0x43455246, len=4
3,449,641 >>> mbox cmd response data (887 bytes)
3,449,642 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,901 UART: [rt]cmd =0x43455252, len=4
3,489,795 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,200,618 UART: [idev] Sha1 KeyId Algorithm
1,208,758 UART: [idev] CSR upload begun
1,210,537 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,290 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,998 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,883 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,589 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,018 UART: [idev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
1,298,515 UART: [idev] CSR uploaded
1,301,560 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,301,729 UART: [idev] --
1,302,896 UART: [ldev] ++
1,303,064 UART: [ldev] CDI.KEYID = 6
1,303,428 UART: [ldev] SUBJECT.KEYID = 5
1,303,855 UART: [ldev] AUTHORITY.KEYID = 7
1,304,318 UART: [ldev] FE.KEYID = 1
1,309,342 UART: [ldev] Erasing FE.KEYID = 1
1,335,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,724 UART: [ldev] --
1,375,170 UART: [fwproc] Wait for Commands...
1,375,811 UART: [fwproc] Recv command 0x46574c44
1,376,544 UART: [fwproc] Recv'd Img size: 114360 bytes
2,674,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,867,130 >>> mbox cmd response: success
2,868,183 UART: [afmc] ++
2,868,351 UART: [afmc] CDI.KEYID = 6
2,868,714 UART: [afmc] SUBJECT.KEYID = 7
2,869,140 UART: [afmc] AUTHORITY.KEYID = 5
2,904,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,880 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,492 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,211 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,947,266 UART: [afmc] --
2,948,188 UART: [cold-reset] --
2,948,996 UART: [state] Locking Datavault
2,950,197 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,801 UART: [state] Locking ICCM
2,951,323 UART: [exit] Launching FMC @ 0x40000130
2,956,652 UART:
2,956,668 UART: Running Caliptra FMC ...
2,957,076 UART:
2,957,219 UART: [state] CFI Enabled
2,967,696 UART: [fht] FMC Alias Private Key: 7
3,075,301 UART: [art] Extend RT PCRs Done
3,075,729 UART: [art] Lock RT PCRs Done
3,077,287 UART: [art] Populate DV Done
3,085,548 UART: [fht] FMC Alias Private Key: 7
3,086,610 UART: [art] Derive CDI
3,086,890 UART: [art] Store in in slot 0x4
3,172,389 UART: [art] Derive Key Pair
3,172,749 UART: [art] Store priv key in slot 0x5
3,185,739 UART: [art] Derive Key Pair - Done
3,200,839 UART: [art] Signing Cert with AUTHO
3,201,319 UART: RITY.KEYID = 7
3,217,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,884 UART: [art] PUB.X = 26499382B319DB3C30CD847AAE828AFB491A7155D5852BDACA6B386A8C048AF293271AB52136573CD350D6DEF69983EE
3,224,657 UART: [art] PUB.Y = A4134F87473F635FA45E298E82345A5B506AC52C9B7B6F613BC004EE2E07FACDBF64EA28D2EAD142A25785F195D43602
3,231,606 UART: [art] SIG.R = 2426983DBCFFFE576910EFE0BC64CAC72825773424E4FF4BF88F8B1ECE81CA7AFBB7E9414FB6B3EE8A14F7F9E1D14C73
3,238,400 UART: [art] SIG.S = 2434FD945C718C9CCDF3080203CDF8EAE7A64DDF64913956FC50413F120511B24E99D4E6C1EF13930D2E420E4907CFF5
3,262,804 UART: Caliptra RT
3,263,150 UART: [state] CFI Enabled
3,370,986 UART: [rt] RT listening for mailbox commands...
3,371,656 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,095 UART: [rt]cmd =0x4c444556, len=4
3,411,480 >>> mbox cmd response data (687 bytes)
3,411,481 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,882 UART: [rt]cmd =0x43455246, len=4
3,452,849 >>> mbox cmd response data (887 bytes)
3,452,850 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,997 UART: [rt]cmd =0x43455252, len=4
3,493,049 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 907.96s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,252 UART: [art] Lock RT PCRs Done
2,823,826 UART: [art] Populate DV Done
2,832,019 UART: [fht] FMC Alias Private Key: 7
2,832,969 UART: [art] Derive CDI
2,833,249 UART: [art] Store in in slot 0x4
2,919,228 UART: [art] Derive Key Pair
2,919,588 UART: [art] Store priv key in slot 0x5
2,933,376 UART: [art] Derive Key Pair - Done
2,947,719 UART: [art] Signing Cert with AUTHO
2,948,199 UART: RITY.KEYID = 7
2,963,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,888 UART: [art] PUB.X = 0F7A723B42EC82FBA0A02DFA2B1ACC966EB2DEFD352D292612618291EF9C13C35296A6768A98463F2D19608173967E54
2,970,657 UART: [art] PUB.Y = CA9023004DC1F16858D6D9F1C3B2AF9F6198DF4EE7F1CF970AF723E26C17FABF039EF79041A8892F2864F65C0AEB926F
2,977,590 UART: [art] SIG.R = 80BF68A0020578C8E16CC5565B7E2FD9FA13E744F3C8601D8F94D0199BA8FBF0DB04169A90ADFE6E9097D7CE7B11CEE5
2,984,367 UART: [art] SIG.S = 295C406E08914B30857325AEF6D7A04A2869590AD071C2FC01FBBDC99E54DC8AB5704485D5C7099EF929BB607B2161B9
3,008,098 UART: Caliptra RT
3,008,444 UART: [state] CFI Enabled
3,116,052 UART: [rt] RT listening for mailbox commands...
3,116,722 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,141 UART: [rt]cmd =0x4c444556, len=4
3,156,660 >>> mbox cmd response data (687 bytes)
3,156,661 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,838 UART: [rt]cmd =0x43455246, len=4
3,197,917 >>> mbox cmd response data (887 bytes)
3,197,918 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,413 UART: [rt]cmd =0x43455252, len=4
3,238,323 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,481 >>> mbox cmd response: success
2,703,613 UART:
2,703,629 UART: Running Caliptra FMC ...
2,704,037 UART:
2,704,180 UART: [state] CFI Enabled
2,714,865 UART: [fht] FMC Alias Private Key: 7
2,823,602 UART: [art] Extend RT PCRs Done
2,824,030 UART: [art] Lock RT PCRs Done
2,825,664 UART: [art] Populate DV Done
2,833,859 UART: [fht] FMC Alias Private Key: 7
2,834,829 UART: [art] Derive CDI
2,835,109 UART: [art] Store in in slot 0x4
2,920,682 UART: [art] Derive Key Pair
2,921,042 UART: [art] Store priv key in slot 0x5
2,934,030 UART: [art] Derive Key Pair - Done
2,948,965 UART: [art] Signing Cert with AUTHO
2,949,445 UART: RITY.KEYID = 7
2,964,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,580 UART: [art] PUB.X = F5697CA14728B97748EEEBB54F043CF5F6503D167DAA6ADFA8D075E10F62BD817CF1FA6F8939CFDD055AEA766AE23CB8
2,972,363 UART: [art] PUB.Y = E72C6CEE722FFEEA9FEC199AB58B5252BE5CA0C0C0F4A0C6C992A084FD096DB7D2B7DBE062D1DE47DEDB6E87B4725F70
2,979,340 UART: [art] SIG.R = 243ACE10EB012FD91AECA7AFFA296CC7F6AE78B62CBB8B19529F945628F37AF6AC9A47AE7C08E1CF166C5336B18CA4DE
2,986,130 UART: [art] SIG.S = 354C367F98EAE080B20858A4F2A0B86FC19BD04210024D3ABDC82F9AEDFDAC8D6E7C286FBDA3331184FB79837BF99918
3,010,039 UART: Caliptra RT
3,010,385 UART: [state] CFI Enabled
3,117,541 UART: [rt] RT listening for mailbox commands...
3,118,211 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,784 UART: [rt]cmd =0x4c444556, len=4
3,158,159 >>> mbox cmd response data (687 bytes)
3,158,160 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,507 UART: [rt]cmd =0x43455246, len=4
3,199,532 >>> mbox cmd response data (887 bytes)
3,199,533 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,798 UART: [rt]cmd =0x43455252, len=4
3,239,854 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,309 >>> mbox cmd response: success
2,705,871 UART:
2,705,887 UART: Running Caliptra FMC ...
2,706,295 UART:
2,706,438 UART: [state] CFI Enabled
2,717,131 UART: [fht] FMC Alias Private Key: 7
2,824,744 UART: [art] Extend RT PCRs Done
2,825,172 UART: [art] Lock RT PCRs Done
2,826,844 UART: [art] Populate DV Done
2,835,529 UART: [fht] FMC Alias Private Key: 7
2,836,681 UART: [art] Derive CDI
2,836,961 UART: [art] Store in in slot 0x4
2,922,788 UART: [art] Derive Key Pair
2,923,148 UART: [art] Store priv key in slot 0x5
2,936,028 UART: [art] Derive Key Pair - Done
2,950,760 UART: [art] Signing Cert with AUTHO
2,951,240 UART: RITY.KEYID = 7
2,966,672 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,437 UART: [art] PUB.X = FE0AA53B8B024F47B5CA9029B2C71DF2FCBC4FB363569565D9C9A1353A1860AD4E54F3B97F871E25B1DE4E32D21215D7
2,974,213 UART: [art] PUB.Y = 06BD4D7264127458C1576668670545BDB05D3FBFAB7A2A9C0FAE4C4D8B47A6282E99B308E9637F5F00C6C9CE67F4A474
2,981,135 UART: [art] SIG.R = 0F5EB7096EF5EA2683C5117C27E2FAC5E1C1B67745E67F878563C32D49CE63F2DBBB379C214E16CACCB050224ADB4C15
2,987,913 UART: [art] SIG.S = 76A2FC50D73D722805C21AD130830D4E15371762203DDF4B13AE88C75B351EA1B291D7F1295CD1318C777DDC2101287A
3,011,667 UART: Caliptra RT
3,012,013 UART: [state] CFI Enabled
3,120,819 UART: [rt] RT listening for mailbox commands...
3,121,489 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,226 UART: [rt]cmd =0x4c444556, len=4
3,161,777 >>> mbox cmd response data (687 bytes)
3,161,778 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,161 UART: [rt]cmd =0x43455246, len=4
3,203,272 >>> mbox cmd response data (887 bytes)
3,203,273 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,588 UART: [rt]cmd =0x43455252, len=4
3,243,500 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,847 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,911 >>> mbox cmd response: success
2,705,073 UART:
2,705,089 UART: Running Caliptra FMC ...
2,705,497 UART:
2,705,640 UART: [state] CFI Enabled
2,715,891 UART: [fht] FMC Alias Private Key: 7
2,823,508 UART: [art] Extend RT PCRs Done
2,823,936 UART: [art] Lock RT PCRs Done
2,825,378 UART: [art] Populate DV Done
2,833,489 UART: [fht] FMC Alias Private Key: 7
2,834,457 UART: [art] Derive CDI
2,834,737 UART: [art] Store in in slot 0x4
2,920,550 UART: [art] Derive Key Pair
2,920,910 UART: [art] Store priv key in slot 0x5
2,934,374 UART: [art] Derive Key Pair - Done
2,949,144 UART: [art] Signing Cert with AUTHO
2,949,624 UART: RITY.KEYID = 7
2,965,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,967 UART: [art] PUB.X = 29DF8F1A943021BE1288C147FFD953518BF20E50725E5B5CCDB158A6DC4DC182BF607B672AEA08E4582687D36A3A0C50
2,972,736 UART: [art] PUB.Y = 5206C75F92A51FB4026E996DFFC7E4C798955ACB8F19274E0B7621DFB441B14F863374CE0625104C206D3C975B2E89A2
2,979,674 UART: [art] SIG.R = ED9B295C3696AB547899AAA1A1EC64E0F73C68EA387B6D2B2EE5A52C2A30A6FAE94B3C37D75963F99371406A9FCCE505
2,986,455 UART: [art] SIG.S = CB87E8CF15164ED9AEC982674932939D328B47C99CFFA846A4AB51D9390BBAACC9B0287C02CA614AE4FACC13819419F3
3,010,950 UART: Caliptra RT
3,011,296 UART: [state] CFI Enabled
3,119,431 UART: [rt] RT listening for mailbox commands...
3,120,101 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,676 UART: [rt]cmd =0x4c444556, len=4
3,160,075 >>> mbox cmd response data (687 bytes)
3,160,076 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,419 UART: [rt]cmd =0x43455246, len=4
3,201,598 >>> mbox cmd response data (887 bytes)
3,201,599 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,938 UART: [rt]cmd =0x43455252, len=4
3,241,759 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,643,093 >>> mbox cmd response: success
2,705,651 UART:
2,705,667 UART: Running Caliptra FMC ...
2,706,075 UART:
2,706,218 UART: [state] CFI Enabled
2,716,771 UART: [fht] FMC Alias Private Key: 7
2,825,096 UART: [art] Extend RT PCRs Done
2,825,524 UART: [art] Lock RT PCRs Done
2,827,052 UART: [art] Populate DV Done
2,835,267 UART: [fht] FMC Alias Private Key: 7
2,836,387 UART: [art] Derive CDI
2,836,667 UART: [art] Store in in slot 0x4
2,922,338 UART: [art] Derive Key Pair
2,922,698 UART: [art] Store priv key in slot 0x5
2,936,238 UART: [art] Derive Key Pair - Done
2,950,944 UART: [art] Signing Cert with AUTHO
2,951,424 UART: RITY.KEYID = 7
2,966,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,555 UART: [art] PUB.X = 57B7E9430253A533A1E8FE4ACC1AA8F9D3832C5DE39002E7B0D1C4ED43F56CF08845D499DF2C29453F917638A53DD1D2
2,974,327 UART: [art] PUB.Y = AD62294D3797915D6498F323D947041F60665F140BBCD70462AD3F8227D7E6599E638E3901D1A3F4D25ABF1BAC716B5E
2,981,265 UART: [art] SIG.R = FD1AB223DCA6D2BF9E463CA3217B08DA3E5881FDA2CC68902B382CD98E9DB35DE157756B17D2BAE005D4917C4306A3B9
2,988,042 UART: [art] SIG.S = CB2C67FC709DAC760BBC9705A25DAD2D149734DB74F4E18EFCC3589B0BC33F612B64F6403D019BAA47F02BB21E1AA734
3,011,839 UART: Caliptra RT
3,012,185 UART: [state] CFI Enabled
3,118,912 UART: [rt] RT listening for mailbox commands...
3,119,582 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,175 UART: [rt]cmd =0x4c444556, len=4
3,159,710 >>> mbox cmd response data (687 bytes)
3,159,711 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,230 UART: [rt]cmd =0x43455246, len=4
3,201,445 >>> mbox cmd response data (887 bytes)
3,201,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,975 UART: [rt]cmd =0x43455252, len=4
3,241,736 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 873.95s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,758 UART: [idev] CSR uploaded
1,299,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,299,972 UART: [idev] --
1,301,013 UART: [ldev] ++
1,301,181 UART: [ldev] CDI.KEYID = 6
1,301,545 UART: [ldev] SUBJECT.KEYID = 5
1,301,972 UART: [ldev] AUTHORITY.KEYID = 7
1,302,435 UART: [ldev] FE.KEYID = 1
1,307,681 UART: [ldev] Erasing FE.KEYID = 1
1,334,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,927 UART: [ldev] --
1,373,317 UART: [fwproc] Wait for Commands...
1,373,990 UART: [fwproc] Recv command 0x46574c44
1,374,723 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,529 >>> mbox cmd response: success
2,865,768 UART: [afmc] ++
2,865,936 UART: [afmc] CDI.KEYID = 6
2,866,299 UART: [afmc] SUBJECT.KEYID = 7
2,866,725 UART: [afmc] AUTHORITY.KEYID = 5
2,901,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,651 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,297 UART: [afmc] --
2,945,355 UART: [cold-reset] --
2,946,215 UART: [state] Locking Datavault
2,947,552 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,156 UART: [state] Locking ICCM
2,948,796 UART: [exit] Launching FMC @ 0x40000130
2,954,125 UART:
2,954,141 UART: Running Caliptra FMC ...
2,954,549 UART:
2,954,603 UART: [state] CFI Enabled
2,964,794 UART: [fht] FMC Alias Private Key: 7
3,073,523 UART: [art] Extend RT PCRs Done
3,073,951 UART: [art] Lock RT PCRs Done
3,075,417 UART: [art] Populate DV Done
3,083,784 UART: [fht] FMC Alias Private Key: 7
3,084,716 UART: [art] Derive CDI
3,084,996 UART: [art] Store in in slot 0x4
3,170,625 UART: [art] Derive Key Pair
3,170,985 UART: [art] Store priv key in slot 0x5
3,184,091 UART: [art] Derive Key Pair - Done
3,198,980 UART: [art] Signing Cert with AUTHO
3,199,460 UART: RITY.KEYID = 7
3,214,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,507 UART: [art] PUB.X = F62F4D449F42F61B3EFB32F1AE45FC778CED032338C5014D2597CB34A3B2322C7EBBB53A4A3ECF07EC573BB02F85C3BF
3,222,288 UART: [art] PUB.Y = F32DAE7ECBAE399EDAADEF14B18234297D2460E51CC61842AC0DBF921349BDF09B839FA1240213B5F6F420536F182669
3,229,242 UART: [art] SIG.R = 79D5B26F5E05E755C6355A11A94B4DB3C3B074176B1EC4AF7A23C6A5E9A6DA07D184FEB24E81D0DC7005DA92C108A3C0
3,236,014 UART: [art] SIG.S = 988FEC4377020912DB218E0D7E22F9A4D5C02F973CF35B79C5638F130D8BC5CAB1F4039FBA9DA88865C4BFD53F23C808
3,260,127 UART: Caliptra RT
3,260,381 UART: [state] CFI Enabled
3,368,421 UART: [rt] RT listening for mailbox commands...
3,369,091 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,468 UART: [rt]cmd =0x4c444556, len=4
3,409,131 >>> mbox cmd response data (687 bytes)
3,409,132 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,617 UART: [rt]cmd =0x43455246, len=4
3,450,668 >>> mbox cmd response data (887 bytes)
3,450,669 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,960 UART: [rt]cmd =0x43455252, len=4
3,490,712 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,133 UART: [kat] SHA2-256
902,073 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,169,869 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,299 UART: [idev] CSR upload begun
1,209,078 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,855 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,563 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,448 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,154 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,583 UART: [idev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
1,297,080 UART: [idev] CSR uploaded
1,300,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,294 UART: [idev] --
1,301,291 UART: [ldev] ++
1,301,459 UART: [ldev] CDI.KEYID = 6
1,301,823 UART: [ldev] SUBJECT.KEYID = 5
1,302,250 UART: [ldev] AUTHORITY.KEYID = 7
1,302,713 UART: [ldev] FE.KEYID = 1
1,307,753 UART: [ldev] Erasing FE.KEYID = 1
1,333,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,097 UART: [ldev] --
1,372,465 UART: [fwproc] Wait for Commands...
1,373,038 UART: [fwproc] Recv command 0x46574c44
1,373,771 UART: [fwproc] Recv'd Img size: 114360 bytes
2,671,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,637 >>> mbox cmd response: success
2,865,896 UART: [afmc] ++
2,866,064 UART: [afmc] CDI.KEYID = 6
2,866,427 UART: [afmc] SUBJECT.KEYID = 7
2,866,853 UART: [afmc] AUTHORITY.KEYID = 5
2,902,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,725 UART: [afmc] --
2,945,727 UART: [cold-reset] --
2,946,771 UART: [state] Locking Datavault
2,947,886 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,490 UART: [state] Locking ICCM
2,948,976 UART: [exit] Launching FMC @ 0x40000130
2,954,305 UART:
2,954,321 UART: Running Caliptra FMC ...
2,954,729 UART:
2,954,783 UART: [state] CFI Enabled
2,965,548 UART: [fht] FMC Alias Private Key: 7
3,073,537 UART: [art] Extend RT PCRs Done
3,073,965 UART: [art] Lock RT PCRs Done
3,075,627 UART: [art] Populate DV Done
3,083,852 UART: [fht] FMC Alias Private Key: 7
3,084,844 UART: [art] Derive CDI
3,085,124 UART: [art] Store in in slot 0x4
3,170,787 UART: [art] Derive Key Pair
3,171,147 UART: [art] Store priv key in slot 0x5
3,184,575 UART: [art] Derive Key Pair - Done
3,199,143 UART: [art] Signing Cert with AUTHO
3,199,623 UART: RITY.KEYID = 7
3,214,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,682 UART: [art] PUB.X = 7FF7FC16B68796F5973EB934A9A409410BB9FEA5F3C2797802A11297F94E7E684842A081F0BA75D2D8BB5D15C0249CF1
3,222,447 UART: [art] PUB.Y = B5CF44F71F6D4D8E39DA38D3279F0DE7E74041E4E714D4EC67B3B26B24731F1779F43146997782F0D05371C3D25182EA
3,229,394 UART: [art] SIG.R = 49EA4319B54EAB452757825068F24C91B9DA263B2F188281F060FABCDBBFE48787AFD06ED558ADDFDE832FCF82523EDA
3,236,182 UART: [art] SIG.S = E036520C0CE511840B01955C7F220A32C15EC685E3B2C52782B228BD4ECD97345EBF4B85E5C98C7F545150FD50CE3C95
3,259,490 UART: Caliptra RT
3,259,744 UART: [state] CFI Enabled
3,367,830 UART: [rt] RT listening for mailbox commands...
3,368,500 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,983 UART: [rt]cmd =0x4c444556, len=4
3,408,524 >>> mbox cmd response data (687 bytes)
3,408,525 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,842 UART: [rt]cmd =0x43455246, len=4
3,450,063 >>> mbox cmd response data (887 bytes)
3,450,064 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,431 UART: [rt]cmd =0x43455252, len=4
3,490,407 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 888.68s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,823,782 UART: [art] Lock RT PCRs Done
2,825,434 UART: [art] Populate DV Done
2,833,801 UART: [fht] FMC Alias Private Key: 7
2,834,817 UART: [art] Derive CDI
2,835,097 UART: [art] Store in in slot 0x4
2,920,970 UART: [art] Derive Key Pair
2,921,330 UART: [art] Store priv key in slot 0x5
2,934,558 UART: [art] Derive Key Pair - Done
2,949,425 UART: [art] Signing Cert with AUTHO
2,949,905 UART: RITY.KEYID = 7
2,964,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,734 UART: [art] PUB.X = 70C3E9342F28FC922BE962DCE744C9BB93E41C3353F3C3B1BAF29DD884663F8E9924E7C84DA1BFB3656C181460CD3E72
2,972,514 UART: [art] PUB.Y = 232AC56626209642D033EB854A9C7F69C230B43835BA9B109C635CEADE55CDE83D9861AD0AFE7DFA8B36E93B5A0BBCCB
2,979,476 UART: [art] SIG.R = 4F5656A9AB1D5393F52A1A2A80F7F1AC620782134EF7B47C97B86E37FB8EF96455358E8C4F4EB5FB0EB282330E7859C0
2,986,243 UART: [art] SIG.S = BB8F1FB379854A995F2661D798B867F0CCCE9B3F6580EC4FD78A9817B244DCEC3A54102E7842FF5C5D6768927330C11D
3,010,268 UART: Caliptra RT
3,010,522 UART: [state] CFI Enabled
3,118,124 UART: [rt] RT listening for mailbox commands...
3,118,794 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,307 UART: [rt]cmd =0x4c444556, len=4
3,158,802 >>> mbox cmd response data (687 bytes)
3,158,803 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,114 UART: [rt]cmd =0x43455246, len=4
3,200,195 >>> mbox cmd response data (887 bytes)
3,200,196 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,665 UART: [rt]cmd =0x43455252, len=4
3,240,741 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,639,484 >>> mbox cmd response: success
2,701,494 UART:
2,701,510 UART: Running Caliptra FMC ...
2,701,918 UART:
2,701,972 UART: [state] CFI Enabled
2,712,531 UART: [fht] FMC Alias Private Key: 7
2,820,792 UART: [art] Extend RT PCRs Done
2,821,220 UART: [art] Lock RT PCRs Done
2,822,972 UART: [art] Populate DV Done
2,831,015 UART: [fht] FMC Alias Private Key: 7
2,831,959 UART: [art] Derive CDI
2,832,239 UART: [art] Store in in slot 0x4
2,917,740 UART: [art] Derive Key Pair
2,918,100 UART: [art] Store priv key in slot 0x5
2,930,708 UART: [art] Derive Key Pair - Done
2,945,491 UART: [art] Signing Cert with AUTHO
2,945,971 UART: RITY.KEYID = 7
2,961,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,072 UART: [art] PUB.X = 7C9F5E5FF0B049D86E35914A01FCEC9C2275A5C0214107AEDAF1429F62E01A448C35816B6C79DCC39F3A9A80F32D8E11
2,968,846 UART: [art] PUB.Y = A5B41E3FC69F97A0D668D653ED9971CBEF9ED64587410ADA4D96501F11CB0B254046309F09A14B961B91054A0AFFC4D7
2,975,789 UART: [art] SIG.R = B3AB54E376A7F3FAE1AB0A0DCF4B84B1F9F32E4A8F2032AE96EA31415466336A891644DCE788AE1B801A43949F3137CE
2,982,565 UART: [art] SIG.S = 85BF0C20A22BC728796581605FA2F459DD9C3C0FA3855C3E60351A279DB58BFAD835E634B14153B578EA1E181B3AE755
3,006,518 UART: Caliptra RT
3,006,772 UART: [state] CFI Enabled
3,114,813 UART: [rt] RT listening for mailbox commands...
3,115,483 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,814 UART: [rt]cmd =0x4c444556, len=4
3,155,287 >>> mbox cmd response data (687 bytes)
3,155,288 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,487 UART: [rt]cmd =0x43455246, len=4
3,196,516 >>> mbox cmd response data (887 bytes)
3,196,517 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,792 UART: [rt]cmd =0x43455252, len=4
3,236,425 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,639,308 >>> mbox cmd response: success
2,700,890 UART:
2,700,906 UART: Running Caliptra FMC ...
2,701,314 UART:
2,701,368 UART: [state] CFI Enabled
2,711,897 UART: [fht] FMC Alias Private Key: 7
2,819,694 UART: [art] Extend RT PCRs Done
2,820,122 UART: [art] Lock RT PCRs Done
2,821,812 UART: [art] Populate DV Done
2,830,353 UART: [fht] FMC Alias Private Key: 7
2,831,327 UART: [art] Derive CDI
2,831,607 UART: [art] Store in in slot 0x4
2,917,184 UART: [art] Derive Key Pair
2,917,544 UART: [art] Store priv key in slot 0x5
2,930,618 UART: [art] Derive Key Pair - Done
2,945,538 UART: [art] Signing Cert with AUTHO
2,946,018 UART: RITY.KEYID = 7
2,961,190 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,955 UART: [art] PUB.X = 47AC91F348674DBD18B4D807D05A83C5B64543F83B369C62A20D00177CAF72AF19284B55B837918002C5D7597EC0EABC
2,968,696 UART: [art] PUB.Y = 0C51574E44BF814CA2D472305A2D0219D0B9FA8E010C1DDEC0B45B591E7A69C47DE00FC1E44F7F875D0CED4B88A53EA4
2,975,644 UART: [art] SIG.R = 921BB6D2B3716C3B5C101FEEC2BF6254EFF74C4916C93610979C55E00D2EE765085A27148C125E34690F830071EAE3E7
2,982,383 UART: [art] SIG.S = 02B53D9DDC73B0F1B1611A8D97D7F53477BE37AB50C8F28E6488E2372EBF19085DF9C61F3B5030B468E3E62C91EE4C5F
3,006,092 UART: Caliptra RT
3,006,346 UART: [state] CFI Enabled
3,114,006 UART: [rt] RT listening for mailbox commands...
3,114,676 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,031 UART: [rt]cmd =0x4c444556, len=4
3,154,642 >>> mbox cmd response data (687 bytes)
3,154,643 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,940 UART: [rt]cmd =0x43455246, len=4
3,195,997 >>> mbox cmd response data (887 bytes)
3,195,998 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,459 UART: [rt]cmd =0x43455252, len=4
3,236,203 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,878 >>> mbox cmd response: success
2,704,906 UART:
2,704,922 UART: Running Caliptra FMC ...
2,705,330 UART:
2,705,384 UART: [state] CFI Enabled
2,715,931 UART: [fht] FMC Alias Private Key: 7
2,824,104 UART: [art] Extend RT PCRs Done
2,824,532 UART: [art] Lock RT PCRs Done
2,826,348 UART: [art] Populate DV Done
2,834,385 UART: [fht] FMC Alias Private Key: 7
2,835,373 UART: [art] Derive CDI
2,835,653 UART: [art] Store in in slot 0x4
2,921,620 UART: [art] Derive Key Pair
2,921,980 UART: [art] Store priv key in slot 0x5
2,935,258 UART: [art] Derive Key Pair - Done
2,950,191 UART: [art] Signing Cert with AUTHO
2,950,671 UART: RITY.KEYID = 7
2,965,839 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,604 UART: [art] PUB.X = 1A065BAE998423F2C66BB188EBC8B51EE153D16718FD59717F6EC5AA1EA69EB8FBE269331178C5441FBEA18367E87252
2,973,379 UART: [art] PUB.Y = 2416863602BF1E3FFFF912658DE098DBF4E9B7537A5275B31492E572F2FF4AFC8806E549910A3DA18A8CF1C5F9290461
2,980,319 UART: [art] SIG.R = 1078882C393FC61E9AB8748B56991F74FA80D5901AF3D0AD94C8ABFFA0075F7A9E4350E04F1522CCABC70CAE94A57EB3
2,987,097 UART: [art] SIG.S = 9A2F54C509B9C299615F3997D719EA0724BBA9DC3716BC905DA5E72F1C59ED86EE7ECF628F7AAEFAFEAE4404537CCAE7
3,010,663 UART: Caliptra RT
3,010,917 UART: [state] CFI Enabled
3,118,869 UART: [rt] RT listening for mailbox commands...
3,119,539 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,920 UART: [rt]cmd =0x4c444556, len=4
3,159,511 >>> mbox cmd response data (687 bytes)
3,159,512 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,709 UART: [rt]cmd =0x43455246, len=4
3,200,802 >>> mbox cmd response data (887 bytes)
3,200,803 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,134 UART: [rt]cmd =0x43455252, len=4
3,241,022 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,642,362 >>> mbox cmd response: success
2,704,664 UART:
2,704,680 UART: Running Caliptra FMC ...
2,705,088 UART:
2,705,142 UART: [state] CFI Enabled
2,715,569 UART: [fht] FMC Alias Private Key: 7
2,823,390 UART: [art] Extend RT PCRs Done
2,823,818 UART: [art] Lock RT PCRs Done
2,825,182 UART: [art] Populate DV Done
2,833,391 UART: [fht] FMC Alias Private Key: 7
2,834,561 UART: [art] Derive CDI
2,834,841 UART: [art] Store in in slot 0x4
2,920,576 UART: [art] Derive Key Pair
2,920,936 UART: [art] Store priv key in slot 0x5
2,933,848 UART: [art] Derive Key Pair - Done
2,948,576 UART: [art] Signing Cert with AUTHO
2,949,056 UART: RITY.KEYID = 7
2,964,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,283 UART: [art] PUB.X = FCAAABAA36999C4BFBFF3157761F780E937BCBB6943D455898F68C510B941DCEF688A3B81640728454772163624EFDBE
2,972,055 UART: [art] PUB.Y = 09CD9AA2BCA244FD5755FE5DABDF295D91AC4BFD6F1A6661AB6223542A6590B1B536DB4689707DF213EC57752FFDDE28
2,979,020 UART: [art] SIG.R = 3EDF0E05D6B119DE59EE59C25861DC12DF2A7D00E38E397207FEF5976A52D3F4EB6FB65161FCDC4DB7FAB531A756CE2A
2,985,781 UART: [art] SIG.S = ED2464DADBA664008941C66FE3914054980DF5F1A9A6C5D36BC5D5E9B87F3EE9E3D9C3D806D90C4773CB83F0520230F4
3,009,674 UART: Caliptra RT
3,009,928 UART: [state] CFI Enabled
3,118,762 UART: [rt] RT listening for mailbox commands...
3,119,432 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,845 UART: [rt]cmd =0x4c444556, len=4
3,159,170 >>> mbox cmd response data (687 bytes)
3,159,171 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,616 UART: [rt]cmd =0x43455246, len=4
3,200,499 >>> mbox cmd response data (887 bytes)
3,200,500 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,937 UART: [rt]cmd =0x43455252, len=4
3,240,901 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 857.97s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,949 UART: [idev] CSR uploaded
1,299,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,163 UART: [idev] --
1,301,392 UART: [ldev] ++
1,301,560 UART: [ldev] CDI.KEYID = 6
1,301,924 UART: [ldev] SUBJECT.KEYID = 5
1,302,351 UART: [ldev] AUTHORITY.KEYID = 7
1,302,814 UART: [ldev] FE.KEYID = 1
1,307,848 UART: [ldev] Erasing FE.KEYID = 1
1,334,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,564 UART: [ldev] --
1,374,060 UART: [fwproc] Wait for Commands...
1,374,691 UART: [fwproc] Recv command 0x46574c44
1,375,424 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,866,518 >>> mbox cmd response: success
2,867,729 UART: [afmc] ++
2,867,897 UART: [afmc] CDI.KEYID = 6
2,868,260 UART: [afmc] SUBJECT.KEYID = 7
2,868,686 UART: [afmc] AUTHORITY.KEYID = 5
2,904,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,799 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,484 UART: [afmc] --
2,947,416 UART: [cold-reset] --
2,948,356 UART: [state] Locking Datavault
2,949,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,039 UART: [state] Locking ICCM
2,950,703 UART: [exit] Launching FMC @ 0x40000130
2,956,032 UART:
2,956,048 UART: Running Caliptra FMC ...
2,956,456 UART:
2,956,599 UART: [state] CFI Enabled
2,967,132 UART: [fht] FMC Alias Private Key: 7
3,074,893 UART: [art] Extend RT PCRs Done
3,075,321 UART: [art] Lock RT PCRs Done
3,076,765 UART: [art] Populate DV Done
3,085,056 UART: [fht] FMC Alias Private Key: 7
3,086,144 UART: [art] Derive CDI
3,086,424 UART: [art] Store in in slot 0x4
3,171,915 UART: [art] Derive Key Pair
3,172,275 UART: [art] Store priv key in slot 0x5
3,185,179 UART: [art] Derive Key Pair - Done
3,200,169 UART: [art] Signing Cert with AUTHO
3,200,649 UART: RITY.KEYID = 7
3,216,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,142 UART: [art] PUB.X = 0401769879DF0D352A7A0B2CE4A0ED7BA28A1462D4A61E384436FCDB3A1406D130D92E9A40C2167F635BC92DB4D14A3E
3,223,905 UART: [art] PUB.Y = 7AEB5E2951FA4A08F132031B660C7F76CE86949E69BD156EB88AE5F437E63868E129286BCA831DE857933B051FE080A3
3,230,845 UART: [art] SIG.R = DEB663E4F4E61A7F80F3D8B17A986C80340F6FA5F9FF627490A4F3A911509DE799CDE8635A030AB14C3E83DA622FEC4F
3,237,620 UART: [art] SIG.S = BC32755361955421DF9F946613C94DEB04C5D21E0F871F8B94AC4D773BC2CCF2F975772965862F0F387A807752C0655E
3,261,498 UART: Caliptra RT
3,261,844 UART: [state] CFI Enabled
3,369,567 UART: [rt] RT listening for mailbox commands...
3,370,237 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,840 UART: [rt]cmd =0x4c444556, len=4
3,410,243 >>> mbox cmd response data (687 bytes)
3,410,244 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,539 UART: [rt]cmd =0x43455246, len=4
3,451,604 >>> mbox cmd response data (887 bytes)
3,451,605 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,076 UART: [rt]cmd =0x43455252, len=4
3,491,945 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,803 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,173,794 UART: [idev] ++
1,173,962 UART: [idev] CDI.KEYID = 6
1,174,323 UART: [idev] SUBJECT.KEYID = 7
1,174,748 UART: [idev] UDS.KEYID = 0
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,644 UART: [idev] Sha1 KeyId Algorithm
1,207,836 UART: [idev] CSR upload begun
1,209,615 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,194 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,902 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,787 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,493 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,922 UART: [idev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
1,297,419 UART: [idev] CSR uploaded
1,300,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,633 UART: [idev] --
1,301,570 UART: [ldev] ++
1,301,738 UART: [ldev] CDI.KEYID = 6
1,302,102 UART: [ldev] SUBJECT.KEYID = 5
1,302,529 UART: [ldev] AUTHORITY.KEYID = 7
1,302,992 UART: [ldev] FE.KEYID = 1
1,308,338 UART: [ldev] Erasing FE.KEYID = 1
1,334,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,408 UART: [ldev] --
1,373,736 UART: [fwproc] Wait for Commands...
1,374,511 UART: [fwproc] Recv command 0x46574c44
1,375,244 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,766 >>> mbox cmd response: success
2,865,993 UART: [afmc] ++
2,866,161 UART: [afmc] CDI.KEYID = 6
2,866,524 UART: [afmc] SUBJECT.KEYID = 7
2,866,950 UART: [afmc] AUTHORITY.KEYID = 5
2,903,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,384 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,715 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,428 UART: [afmc] --
2,946,340 UART: [cold-reset] --
2,947,284 UART: [state] Locking Datavault
2,948,399 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,003 UART: [state] Locking ICCM
2,949,539 UART: [exit] Launching FMC @ 0x40000130
2,954,868 UART:
2,954,884 UART: Running Caliptra FMC ...
2,955,292 UART:
2,955,435 UART: [state] CFI Enabled
2,966,156 UART: [fht] FMC Alias Private Key: 7
3,073,883 UART: [art] Extend RT PCRs Done
3,074,311 UART: [art] Lock RT PCRs Done
3,075,753 UART: [art] Populate DV Done
3,083,946 UART: [fht] FMC Alias Private Key: 7
3,085,124 UART: [art] Derive CDI
3,085,404 UART: [art] Store in in slot 0x4
3,170,835 UART: [art] Derive Key Pair
3,171,195 UART: [art] Store priv key in slot 0x5
3,184,571 UART: [art] Derive Key Pair - Done
3,199,597 UART: [art] Signing Cert with AUTHO
3,200,077 UART: RITY.KEYID = 7
3,215,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,124 UART: [art] PUB.X = E4BDF599EA8A2A4FD1D239774BA970D2CC1345A0EAFDCCCC148C529B3E6F796E4A9F3CFAA758FF12369D5AA3604799BF
3,222,918 UART: [art] PUB.Y = B9F31A56228B7BD625FD1F88CC5060EFE1C5AFAAD1C0C71F73B6306DFA37030A8E8BC0AB83A58D184A7F65A3DF0BDB10
3,229,883 UART: [art] SIG.R = B5DD2C8729E5D1BA9E4700E63862BFE891D1AC1C30903FBDC977F81B6D19AFAFAB28CED7E604CC524829607D9A190DCB
3,236,645 UART: [art] SIG.S = 52E758DCF1CA4E2655E3A24314C386F6E2E53EC20C05DE719D8E16E01B0FE6ABE73FB1422862050345D7DDA8A7546763
3,260,265 UART: Caliptra RT
3,260,611 UART: [state] CFI Enabled
3,368,025 UART: [rt] RT listening for mailbox commands...
3,368,695 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,958 UART: [rt]cmd =0x4c444556, len=4
3,408,293 >>> mbox cmd response data (687 bytes)
3,408,294 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,475 UART: [rt]cmd =0x43455246, len=4
3,449,500 >>> mbox cmd response data (887 bytes)
3,449,501 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,848 UART: [rt]cmd =0x43455252, len=4
3,489,826 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 885.82s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,825,478 UART: [art] Lock RT PCRs Done
2,826,868 UART: [art] Populate DV Done
2,835,397 UART: [fht] FMC Alias Private Key: 7
2,836,561 UART: [art] Derive CDI
2,836,841 UART: [art] Store in in slot 0x4
2,922,888 UART: [art] Derive Key Pair
2,923,248 UART: [art] Store priv key in slot 0x5
2,936,086 UART: [art] Derive Key Pair - Done
2,950,925 UART: [art] Signing Cert with AUTHO
2,951,405 UART: RITY.KEYID = 7
2,966,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,378 UART: [art] PUB.X = E43152B7414E97E853D40941F0128F7B827CD23E733BB59E10A43A81C98105CB40847BCDB0A884A10FAA2305588D1AF4
2,974,136 UART: [art] PUB.Y = 1174A7AE1754EA518B3765E61214751DF016606CD910C40A7A3A63989E237CED410F2085D65D91FDC5EDF49CB99441A3
2,981,080 UART: [art] SIG.R = 8179C25EAF31D931A40979386DEFDABD74D16B8056E2BB6F80E92E19C7A85AAC1E8863946586B97B84C180133DFE0F5D
2,987,852 UART: [art] SIG.S = B8839B059FB7FA8F33B0521A896C44D75922D41B137BA37CA06F5A76C4AB9F37A2FD49D60CB1A200DBDC1B197774A545
3,011,847 UART: Caliptra RT
3,012,193 UART: [state] CFI Enabled
3,118,238 UART: [rt] RT listening for mailbox commands...
3,118,908 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,347 UART: [rt]cmd =0x4c444556, len=4
3,158,684 >>> mbox cmd response data (687 bytes)
3,158,685 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,946 UART: [rt]cmd =0x43455246, len=4
3,199,927 >>> mbox cmd response data (887 bytes)
3,199,928 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,385 UART: [rt]cmd =0x43455252, len=4
3,240,244 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,197 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,640,883 >>> mbox cmd response: success
2,703,375 UART:
2,703,391 UART: Running Caliptra FMC ...
2,703,799 UART:
2,703,942 UART: [state] CFI Enabled
2,714,643 UART: [fht] FMC Alias Private Key: 7
2,822,288 UART: [art] Extend RT PCRs Done
2,822,716 UART: [art] Lock RT PCRs Done
2,824,112 UART: [art] Populate DV Done
2,832,099 UART: [fht] FMC Alias Private Key: 7
2,833,277 UART: [art] Derive CDI
2,833,557 UART: [art] Store in in slot 0x4
2,919,820 UART: [art] Derive Key Pair
2,920,180 UART: [art] Store priv key in slot 0x5
2,933,136 UART: [art] Derive Key Pair - Done
2,947,819 UART: [art] Signing Cert with AUTHO
2,948,299 UART: RITY.KEYID = 7
2,963,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,202 UART: [art] PUB.X = C18B87BAFEBB63CAB2E8B26B5AF0F37898960D38275E74C9620904E5196F2F38D3B841E7844247453681DE866A50657F
2,970,961 UART: [art] PUB.Y = 9615D63EE02CF1CA165911A0D29E0E468B1B09BE0D3DD9477B9E32A1A3CA8A3FD8425FF18AB84D81F6629A5C0D33E3C8
2,977,913 UART: [art] SIG.R = 95520F088F9A24AEAD2F39065E6E1597CCF5A1FD99DECBC0E438F6BF8A7F156AA8D37C58FC09002750900CFA6477AACD
2,984,664 UART: [art] SIG.S = F8EA08FEAC547C507D5C4004E36036B9A9E798337BEA0E8AEA89A13D46217F2A99757A3DAAA46D2701DB5A940D8254CC
3,008,076 UART: Caliptra RT
3,008,422 UART: [state] CFI Enabled
3,115,077 UART: [rt] RT listening for mailbox commands...
3,115,747 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,270 UART: [rt]cmd =0x4c444556, len=4
3,155,613 >>> mbox cmd response data (687 bytes)
3,155,614 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,143 UART: [rt]cmd =0x43455246, len=4
3,197,308 >>> mbox cmd response data (887 bytes)
3,197,309 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,736 UART: [rt]cmd =0x43455252, len=4
3,237,537 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,525 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,639,875 >>> mbox cmd response: success
2,703,079 UART:
2,703,095 UART: Running Caliptra FMC ...
2,703,503 UART:
2,703,646 UART: [state] CFI Enabled
2,714,255 UART: [fht] FMC Alias Private Key: 7
2,822,132 UART: [art] Extend RT PCRs Done
2,822,560 UART: [art] Lock RT PCRs Done
2,824,044 UART: [art] Populate DV Done
2,832,161 UART: [fht] FMC Alias Private Key: 7
2,833,267 UART: [art] Derive CDI
2,833,547 UART: [art] Store in in slot 0x4
2,919,154 UART: [art] Derive Key Pair
2,919,514 UART: [art] Store priv key in slot 0x5
2,933,220 UART: [art] Derive Key Pair - Done
2,948,008 UART: [art] Signing Cert with AUTHO
2,948,488 UART: RITY.KEYID = 7
2,964,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,903 UART: [art] PUB.X = 16D4BA75931A62104A5171FBE20CCA6E7680165E8E45F638A234D48A77F2A054D11C33E3DCF85980C05E4067D6FD06B3
2,971,669 UART: [art] PUB.Y = 44B01C629D4A71327CDEE34E398E24B47A013F9390DDD0014EE58E65682B234FF4319ACBADDF66BF6A60DF5BBCFE9D9F
2,978,633 UART: [art] SIG.R = 38FCA5EACE847B6278E2FFAA0302298F8489BAC21724A9E74AE565B1CDD525CD7A7617729AC1DF9775E48910ED44B16E
2,985,409 UART: [art] SIG.S = 8092293F2358A8411421E91C9849BF03F9C074A3B800B0D40BA2DED5CD357A5A0407FE94C1FD67EB85F2CA48F47A8D34
3,009,664 UART: Caliptra RT
3,010,010 UART: [state] CFI Enabled
3,117,918 UART: [rt] RT listening for mailbox commands...
3,118,588 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,907 UART: [rt]cmd =0x4c444556, len=4
3,158,516 >>> mbox cmd response data (687 bytes)
3,158,517 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,894 UART: [rt]cmd =0x43455246, len=4
3,199,835 >>> mbox cmd response data (887 bytes)
3,199,836 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,161 UART: [rt]cmd =0x43455252, len=4
3,240,083 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,183 >>> mbox cmd response: success
2,703,275 UART:
2,703,291 UART: Running Caliptra FMC ...
2,703,699 UART:
2,703,842 UART: [state] CFI Enabled
2,714,321 UART: [fht] FMC Alias Private Key: 7
2,822,684 UART: [art] Extend RT PCRs Done
2,823,112 UART: [art] Lock RT PCRs Done
2,824,568 UART: [art] Populate DV Done
2,833,035 UART: [fht] FMC Alias Private Key: 7
2,834,043 UART: [art] Derive CDI
2,834,323 UART: [art] Store in in slot 0x4
2,919,984 UART: [art] Derive Key Pair
2,920,344 UART: [art] Store priv key in slot 0x5
2,933,484 UART: [art] Derive Key Pair - Done
2,948,397 UART: [art] Signing Cert with AUTHO
2,948,877 UART: RITY.KEYID = 7
2,964,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,034 UART: [art] PUB.X = 8223597AB5AFE7B3EF6FBD4BC72AF6AF14B4CBB4CD714D2D36A9780C98A52A362B4FD3EF202B076840521B0968FC2C6B
2,971,813 UART: [art] PUB.Y = 80AF413686BAAF4CB971677343A63F1D3A2B2CBE1FFB7A6B662A37BEF93345DC23388C6A5BBBF008385F61E110E71A6E
2,978,774 UART: [art] SIG.R = 8BA79FAD74AA397441348D3E8F766B812CE4B46B96E5852D39EB83D27DA073A7F20D1CE30EA92202264542FFFBCEB7BB
2,985,549 UART: [art] SIG.S = BBB76AC7A3BF4DE2B829A527152A691248E2525D68D2F4545A82A39951B1F7DEC88613CB98B83529D7C043A0DA0C2D1B
3,009,529 UART: Caliptra RT
3,009,875 UART: [state] CFI Enabled
3,118,316 UART: [rt] RT listening for mailbox commands...
3,118,986 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,579 UART: [rt]cmd =0x4c444556, len=4
3,158,986 >>> mbox cmd response data (687 bytes)
3,158,987 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,502 UART: [rt]cmd =0x43455246, len=4
3,200,443 >>> mbox cmd response data (887 bytes)
3,200,444 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,945 UART: [rt]cmd =0x43455252, len=4
3,240,758 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,405 >>> mbox cmd response: success
2,704,625 UART:
2,704,641 UART: Running Caliptra FMC ...
2,705,049 UART:
2,705,192 UART: [state] CFI Enabled
2,715,835 UART: [fht] FMC Alias Private Key: 7
2,823,960 UART: [art] Extend RT PCRs Done
2,824,388 UART: [art] Lock RT PCRs Done
2,826,180 UART: [art] Populate DV Done
2,834,317 UART: [fht] FMC Alias Private Key: 7
2,835,489 UART: [art] Derive CDI
2,835,769 UART: [art] Store in in slot 0x4
2,921,110 UART: [art] Derive Key Pair
2,921,470 UART: [art] Store priv key in slot 0x5
2,934,930 UART: [art] Derive Key Pair - Done
2,949,735 UART: [art] Signing Cert with AUTHO
2,950,215 UART: RITY.KEYID = 7
2,965,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,562 UART: [art] PUB.X = B91C1B8A02A560AA194A7636CF413B9B32FDFDEF58DCC69FBD097E284DDA08B01FABAA4FB3D1EAD11311F54E24CB2406
2,973,346 UART: [art] PUB.Y = 8FB2CBA7ED557B3625950B607F7CE984531C204737C2501A0F26ABAE88D01D17CD16998CFD4AA5B962D4BA239CCF2E5D
2,980,304 UART: [art] SIG.R = CCAD092CE20C576FAB3AFB23623C8CA1182A0066554819F05B6D6F824921E8DB42F00DDAE930A5F338D1185ACAFE1A4B
2,987,059 UART: [art] SIG.S = 24D9B4C38EBAC1CDCB314165FC6E1C84D7CDF6B1FD7F47EBAD306C036DEF7AF0DFB8C9BB983842157BCDE26AFEC84606
3,011,434 UART: Caliptra RT
3,011,780 UART: [state] CFI Enabled
3,119,306 UART: [rt] RT listening for mailbox commands...
3,119,976 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,497 UART: [rt]cmd =0x4c444556, len=4
3,159,914 >>> mbox cmd response data (687 bytes)
3,159,915 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,426 UART: [rt]cmd =0x43455246, len=4
3,201,687 >>> mbox cmd response data (887 bytes)
3,201,688 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,971 UART: [rt]cmd =0x43455252, len=4
3,241,697 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 871.63s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,258 UART: [idev] CSR uploaded
1,300,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,472 UART: [idev] --
1,301,523 UART: [ldev] ++
1,301,691 UART: [ldev] CDI.KEYID = 6
1,302,055 UART: [ldev] SUBJECT.KEYID = 5
1,302,482 UART: [ldev] AUTHORITY.KEYID = 7
1,302,945 UART: [ldev] FE.KEYID = 1
1,308,235 UART: [ldev] Erasing FE.KEYID = 1
1,334,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,077 UART: [ldev] --
1,374,473 UART: [fwproc] Wait for Commands...
1,375,192 UART: [fwproc] Recv command 0x46574c44
1,375,925 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,730,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,866,087 >>> mbox cmd response: success
2,867,134 UART: [afmc] ++
2,867,302 UART: [afmc] CDI.KEYID = 6
2,867,665 UART: [afmc] SUBJECT.KEYID = 7
2,868,091 UART: [afmc] AUTHORITY.KEYID = 5
2,903,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,523 UART: [afmc] --
2,946,467 UART: [cold-reset] --
2,947,633 UART: [state] Locking Datavault
2,948,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,212 UART: [state] Locking ICCM
2,949,798 UART: [exit] Launching FMC @ 0x40000130
2,955,127 UART:
2,955,143 UART: Running Caliptra FMC ...
2,955,551 UART:
2,955,605 UART: [state] CFI Enabled
2,965,838 UART: [fht] FMC Alias Private Key: 7
3,073,537 UART: [art] Extend RT PCRs Done
3,073,965 UART: [art] Lock RT PCRs Done
3,075,577 UART: [art] Populate DV Done
3,084,014 UART: [fht] FMC Alias Private Key: 7
3,085,042 UART: [art] Derive CDI
3,085,322 UART: [art] Store in in slot 0x4
3,170,735 UART: [art] Derive Key Pair
3,171,095 UART: [art] Store priv key in slot 0x5
3,184,171 UART: [art] Derive Key Pair - Done
3,198,977 UART: [art] Signing Cert with AUTHO
3,199,457 UART: RITY.KEYID = 7
3,214,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,458 UART: [art] PUB.X = 93D8F14EAFA52117354077E40E83A31F6380A7A72E17A2AF71D4E1C1BA117921CE7A5F9EE50883C7AEDE43D08C389C3F
3,222,232 UART: [art] PUB.Y = F4C24039D29ED119FB53A1CAC54CC091A18ABF0B4606122966EB90902D7D1BFB8D13C519F00D8674E0D26FE072A8BE58
3,229,183 UART: [art] SIG.R = 123B98FAE753A8A8FD7EB254FAF1E3D0EC26BC0616FB472A026A460A7F79CA2B8597E8F316DBF74E60AC467ADB401530
3,235,960 UART: [art] SIG.S = 63270A22EAD8FB43300562183E81F15841AFB205EA81C7B87CFFED5D2E61A698F4C434DFAB2C0F57C09E976DAB200ADA
3,259,754 UART: Caliptra RT
3,260,008 UART: [state] CFI Enabled
3,367,754 UART: [rt] RT listening for mailbox commands...
3,368,424 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,127 UART: [rt]cmd =0x4c444556, len=4
3,408,416 >>> mbox cmd response data (687 bytes)
3,408,417 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,650 UART: [rt]cmd =0x43455246, len=4
3,449,635 >>> mbox cmd response data (887 bytes)
3,449,636 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,091 UART: [rt]cmd =0x43455252, len=4
3,490,119 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] CSR upload begun
1,208,940 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,503 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,211 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,096 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,802 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,231 UART: [idev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
1,296,728 UART: [idev] CSR uploaded
1,299,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,299,942 UART: [idev] --
1,300,939 UART: [ldev] ++
1,301,107 UART: [ldev] CDI.KEYID = 6
1,301,471 UART: [ldev] SUBJECT.KEYID = 5
1,301,898 UART: [ldev] AUTHORITY.KEYID = 7
1,302,361 UART: [ldev] FE.KEYID = 1
1,307,309 UART: [ldev] Erasing FE.KEYID = 1
1,333,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,977 UART: [ldev] --
1,372,251 UART: [fwproc] Wait for Commands...
1,372,966 UART: [fwproc] Recv command 0x46574c44
1,373,699 UART: [fwproc] Recv'd Img size: 114360 bytes
2,670,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,863,166 >>> mbox cmd response: success
2,864,261 UART: [afmc] ++
2,864,429 UART: [afmc] CDI.KEYID = 6
2,864,792 UART: [afmc] SUBJECT.KEYID = 7
2,865,218 UART: [afmc] AUTHORITY.KEYID = 5
2,901,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,987 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,414 UART: [afmc] --
2,944,508 UART: [cold-reset] --
2,945,420 UART: [state] Locking Datavault
2,946,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,187 UART: [state] Locking ICCM
2,947,827 UART: [exit] Launching FMC @ 0x40000130
2,953,156 UART:
2,953,172 UART: Running Caliptra FMC ...
2,953,580 UART:
2,953,634 UART: [state] CFI Enabled
2,963,679 UART: [fht] FMC Alias Private Key: 7
3,072,542 UART: [art] Extend RT PCRs Done
3,072,970 UART: [art] Lock RT PCRs Done
3,074,554 UART: [art] Populate DV Done
3,082,755 UART: [fht] FMC Alias Private Key: 7
3,083,799 UART: [art] Derive CDI
3,084,079 UART: [art] Store in in slot 0x4
3,169,934 UART: [art] Derive Key Pair
3,170,294 UART: [art] Store priv key in slot 0x5
3,183,518 UART: [art] Derive Key Pair - Done
3,197,893 UART: [art] Signing Cert with AUTHO
3,198,373 UART: RITY.KEYID = 7
3,213,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,580 UART: [art] PUB.X = 2C7C17F802234D979FB859322E06CEF5B96DDCE5648F671DDB73426A57C0B6BA67FF918E809D982F66C6C188C68FAF68
3,221,352 UART: [art] PUB.Y = 248E0C148C6620EA01501E3B8A90FC3452E236D8236C63E5E46A0A501C25EFE4BE2740C74608242DE3FA320128498B12
3,228,283 UART: [art] SIG.R = 39A64AC81DAD0CB1FC0F1A66A83540AAB3DE9E093FB3542CFF92BA21EA3814BDE415F4A7462590DFE6BC45E970437B56
3,235,062 UART: [art] SIG.S = AC8BFDF73E949309147F25A0BB9CC86EE30AEF0C0556DD0B8D41ABBC69C04F8E9A3787DDB2211EF11885F7FC7F796E16
3,259,172 UART: Caliptra RT
3,259,426 UART: [state] CFI Enabled
3,367,342 UART: [rt] RT listening for mailbox commands...
3,368,012 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,667 UART: [rt]cmd =0x4c444556, len=4
3,408,210 >>> mbox cmd response data (687 bytes)
3,408,211 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,726 UART: [rt]cmd =0x43455246, len=4
3,449,695 >>> mbox cmd response data (887 bytes)
3,449,696 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,881 UART: [rt]cmd =0x43455252, len=4
3,489,987 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 892.81s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,862 UART: [art] Lock RT PCRs Done
2,824,468 UART: [art] Populate DV Done
2,832,657 UART: [fht] FMC Alias Private Key: 7
2,833,619 UART: [art] Derive CDI
2,833,899 UART: [art] Store in in slot 0x4
2,919,382 UART: [art] Derive Key Pair
2,919,742 UART: [art] Store priv key in slot 0x5
2,932,816 UART: [art] Derive Key Pair - Done
2,947,493 UART: [art] Signing Cert with AUTHO
2,947,973 UART: RITY.KEYID = 7
2,962,947 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,712 UART: [art] PUB.X = 159DF121782EAC308DEA56814ADF1E9D9D2D86B5398BD1578DBDED46A60E29FD47F5976F9AD4783A2E5F51CA6A3CD2FA
2,970,499 UART: [art] PUB.Y = 3F1B6BFC80BA4D4CA874C9CF114144E1BF7EC9A3702B889CAB5479B86643A5016B55C60ED8974D3B3958A8530EA7A158
2,977,448 UART: [art] SIG.R = D90D14DFD01118C0E970FCCB0DC91526F891A99F93D3337AFD2F4751000F368B49B91BA817A4629EA9C547402A5E09C7
2,984,188 UART: [art] SIG.S = 652EC7864A08D700291E0ECFECE48FC49DD79C7B21E1022BDB6478222B98DC2FB6DD2F23BFA6B44E1B0C8EFD25C37EF3
3,008,165 UART: Caliptra RT
3,008,419 UART: [state] CFI Enabled
3,115,787 UART: [rt] RT listening for mailbox commands...
3,116,457 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,042 UART: [rt]cmd =0x4c444556, len=4
3,156,449 >>> mbox cmd response data (687 bytes)
3,156,450 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,839 UART: [rt]cmd =0x43455246, len=4
3,197,890 >>> mbox cmd response data (887 bytes)
3,197,891 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,422 UART: [rt]cmd =0x43455252, len=4
3,238,350 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,806 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,639,198 >>> mbox cmd response: success
2,701,484 UART:
2,701,500 UART: Running Caliptra FMC ...
2,701,908 UART:
2,701,962 UART: [state] CFI Enabled
2,712,399 UART: [fht] FMC Alias Private Key: 7
2,820,532 UART: [art] Extend RT PCRs Done
2,820,960 UART: [art] Lock RT PCRs Done
2,822,390 UART: [art] Populate DV Done
2,830,521 UART: [fht] FMC Alias Private Key: 7
2,831,481 UART: [art] Derive CDI
2,831,761 UART: [art] Store in in slot 0x4
2,916,988 UART: [art] Derive Key Pair
2,917,348 UART: [art] Store priv key in slot 0x5
2,930,002 UART: [art] Derive Key Pair - Done
2,944,586 UART: [art] Signing Cert with AUTHO
2,945,066 UART: RITY.KEYID = 7
2,960,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,241 UART: [art] PUB.X = 89DF13711DD7FC5F1CCBF7E2378B1952D4CCA75346163CE2772A6864E82870C12C1D9BC7C0D6BDC6B5E76216A6355BE9
2,968,021 UART: [art] PUB.Y = CFDF233E5288FD812E9D48330BCE37EF73A023A945F51130F0BE77E44E73F4422B22E4B7F7020A85C09A930984CA0DE7
2,974,962 UART: [art] SIG.R = B3E6C7446635D9884DD16F11C40342A33D1A1E218223FFABC1C3E6FC5904443F53B6DFBE7FC6973E444C2079B098707B
2,981,730 UART: [art] SIG.S = 9B9A53E2726CA0273534B6F2B55A1C2D7EDD1DA8F620E17402F2F475876182E791E44A3160E1A3B7EA1B71F287E9D240
3,005,512 UART: Caliptra RT
3,005,766 UART: [state] CFI Enabled
3,113,953 UART: [rt] RT listening for mailbox commands...
3,114,623 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,326 UART: [rt]cmd =0x4c444556, len=4
3,154,905 >>> mbox cmd response data (687 bytes)
3,154,906 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,183 UART: [rt]cmd =0x43455246, len=4
3,196,350 >>> mbox cmd response data (887 bytes)
3,196,351 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,888 UART: [rt]cmd =0x43455252, len=4
3,236,477 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,639,832 >>> mbox cmd response: success
2,702,270 UART:
2,702,286 UART: Running Caliptra FMC ...
2,702,694 UART:
2,702,748 UART: [state] CFI Enabled
2,712,947 UART: [fht] FMC Alias Private Key: 7
2,820,946 UART: [art] Extend RT PCRs Done
2,821,374 UART: [art] Lock RT PCRs Done
2,822,732 UART: [art] Populate DV Done
2,831,071 UART: [fht] FMC Alias Private Key: 7
2,832,187 UART: [art] Derive CDI
2,832,467 UART: [art] Store in in slot 0x4
2,918,552 UART: [art] Derive Key Pair
2,918,912 UART: [art] Store priv key in slot 0x5
2,932,552 UART: [art] Derive Key Pair - Done
2,947,098 UART: [art] Signing Cert with AUTHO
2,947,578 UART: RITY.KEYID = 7
2,963,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,081 UART: [art] PUB.X = DF50F56A8E0D5B73195B7785147FC20DEC98349C6F4A0BAF204C151D3A4E26832CA3FA909C0412E0448B8B22D711F75E
2,970,845 UART: [art] PUB.Y = B65591152F0FACDEE4A4A991C881A18871790A47F47DBC1C1444058624711C48649286EE1ED79DC8AC104DAAA17A7ADE
2,977,794 UART: [art] SIG.R = EB1B5BAF748B8A7DF492515F0D571D9395BFB28D7A31696CDE4E52753E262F5D74C34E2F5152A342CF7657C69E3B5B82
2,984,569 UART: [art] SIG.S = E88C1997D81CDE170B7D79E7A9E06E10E3BFAC40784B45D029FB48D58FBE012BDC122BF88D604393EF66AA9AD1DF6048
3,008,092 UART: Caliptra RT
3,008,346 UART: [state] CFI Enabled
3,115,723 UART: [rt] RT listening for mailbox commands...
3,116,393 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,094 UART: [rt]cmd =0x4c444556, len=4
3,156,387 >>> mbox cmd response data (687 bytes)
3,156,388 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,625 UART: [rt]cmd =0x43455246, len=4
3,197,674 >>> mbox cmd response data (887 bytes)
3,197,675 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,896 UART: [rt]cmd =0x43455252, len=4
3,237,617 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,022 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,610 >>> mbox cmd response: success
2,703,580 UART:
2,703,596 UART: Running Caliptra FMC ...
2,704,004 UART:
2,704,058 UART: [state] CFI Enabled
2,714,589 UART: [fht] FMC Alias Private Key: 7
2,822,520 UART: [art] Extend RT PCRs Done
2,822,948 UART: [art] Lock RT PCRs Done
2,824,378 UART: [art] Populate DV Done
2,832,513 UART: [fht] FMC Alias Private Key: 7
2,833,653 UART: [art] Derive CDI
2,833,933 UART: [art] Store in in slot 0x4
2,919,642 UART: [art] Derive Key Pair
2,920,002 UART: [art] Store priv key in slot 0x5
2,933,264 UART: [art] Derive Key Pair - Done
2,948,124 UART: [art] Signing Cert with AUTHO
2,948,604 UART: RITY.KEYID = 7
2,963,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,595 UART: [art] PUB.X = C22A4E28197F8FE92936059F461F6C54A52105C2F0F5B038EE34AF42C21C12267A6BAA9F25A20B8D1009485E2EB5FA95
2,971,357 UART: [art] PUB.Y = 5507F19C71A61F0E3096676CADF9F5B92EC6C63BC1704B032F756495969243B503DB1EEDB8E39D92788FABFC0F81E939
2,978,298 UART: [art] SIG.R = 270E6470D7794498E5AE2F7483BB37E887A342D7A5390EB2C499F4F2BB16A65071985ABB971831D815046A77B06F4D68
2,985,053 UART: [art] SIG.S = F125113311406B9A49B12D0BF36E6ECF30064224A30A5EE8DF8D3ADF496201461F9EC2D5D169939354A42C0673F2FCFE
3,008,289 UART: Caliptra RT
3,008,543 UART: [state] CFI Enabled
3,116,805 UART: [rt] RT listening for mailbox commands...
3,117,475 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,174 UART: [rt]cmd =0x4c444556, len=4
3,157,477 >>> mbox cmd response data (687 bytes)
3,157,478 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,763 UART: [rt]cmd =0x43455246, len=4
3,198,782 >>> mbox cmd response data (887 bytes)
3,198,783 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,032 UART: [rt]cmd =0x43455252, len=4
3,238,816 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,362 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,640,094 >>> mbox cmd response: success
2,703,068 UART:
2,703,084 UART: Running Caliptra FMC ...
2,703,492 UART:
2,703,546 UART: [state] CFI Enabled
2,714,253 UART: [fht] FMC Alias Private Key: 7
2,821,904 UART: [art] Extend RT PCRs Done
2,822,332 UART: [art] Lock RT PCRs Done
2,823,656 UART: [art] Populate DV Done
2,831,933 UART: [fht] FMC Alias Private Key: 7
2,833,071 UART: [art] Derive CDI
2,833,351 UART: [art] Store in in slot 0x4
2,919,192 UART: [art] Derive Key Pair
2,919,552 UART: [art] Store priv key in slot 0x5
2,932,680 UART: [art] Derive Key Pair - Done
2,947,420 UART: [art] Signing Cert with AUTHO
2,947,900 UART: RITY.KEYID = 7
2,963,122 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,887 UART: [art] PUB.X = 0753441B45ADA9C1213B815CDEE1B08B410E2399BAF3692FE80702F09CB2311E78283E289A45E10447F19D34C04299DF
2,970,640 UART: [art] PUB.Y = E7D4FEF7FAC2F54EF716DE18023823D3AD7C0DDA2C3E763F9ECE2B938A375C6C943B2960BC12CB5AEA812E7573BB9407
2,977,601 UART: [art] SIG.R = 06341B08B42937F376222F414DBA8446700270976CF435E421A4EA1775E6B9A8B32E525657A7E8761E53E8AD14CE0103
2,984,346 UART: [art] SIG.S = 55F461C992E78C2925AF2A5BF199BD46D45602996DFCC06F61EBA1011071DB8F013F5578E62FB8169F46F8590143BBC0
3,007,833 UART: Caliptra RT
3,008,087 UART: [state] CFI Enabled
3,115,725 UART: [rt] RT listening for mailbox commands...
3,116,395 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,056 UART: [rt]cmd =0x4c444556, len=4
3,156,387 >>> mbox cmd response data (687 bytes)
3,156,388 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,009 UART: [rt]cmd =0x43455246, len=4
3,198,106 >>> mbox cmd response data (887 bytes)
3,198,107 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,586 UART: [rt]cmd =0x43455252, len=4
3,238,446 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 865.80s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,807 UART: [idev] CSR uploaded
1,300,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,301,021 UART: [idev] --
1,302,046 UART: [ldev] ++
1,302,214 UART: [ldev] CDI.KEYID = 6
1,302,578 UART: [ldev] SUBJECT.KEYID = 5
1,303,005 UART: [ldev] AUTHORITY.KEYID = 7
1,303,468 UART: [ldev] FE.KEYID = 1
1,308,676 UART: [ldev] Erasing FE.KEYID = 1
1,335,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,678 UART: [ldev] --
1,374,184 UART: [fwproc] Wait for Commands...
1,374,809 UART: [fwproc] Recv command 0x46574c44
1,375,542 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,224 >>> mbox cmd response: success
2,866,463 UART: [afmc] ++
2,866,631 UART: [afmc] CDI.KEYID = 6
2,866,994 UART: [afmc] SUBJECT.KEYID = 7
2,867,420 UART: [afmc] AUTHORITY.KEYID = 5
2,902,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,854 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,466 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,080 UART: [afmc] --
2,946,000 UART: [cold-reset] --
2,946,750 UART: [state] Locking Datavault
2,947,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,539 UART: [state] Locking ICCM
2,949,153 UART: [exit] Launching FMC @ 0x40000130
2,954,482 UART:
2,954,498 UART: Running Caliptra FMC ...
2,954,906 UART:
2,955,049 UART: [state] CFI Enabled
2,965,718 UART: [fht] FMC Alias Private Key: 7
3,074,069 UART: [art] Extend RT PCRs Done
3,074,497 UART: [art] Lock RT PCRs Done
3,076,107 UART: [art] Populate DV Done
3,084,482 UART: [fht] FMC Alias Private Key: 7
3,085,644 UART: [art] Derive CDI
3,085,924 UART: [art] Store in in slot 0x4
3,171,837 UART: [art] Derive Key Pair
3,172,197 UART: [art] Store priv key in slot 0x5
3,185,823 UART: [art] Derive Key Pair - Done
3,200,545 UART: [art] Signing Cert with AUTHO
3,201,025 UART: RITY.KEYID = 7
3,215,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,714 UART: [art] PUB.X = 3A0A0A1F1A051BAFC28CA6EA4BF8660926E3A661B2F981A78F545F963CF7F7CC465747275DA7132215BFA08525D85482
3,223,476 UART: [art] PUB.Y = E014546C65E4BC307EDE3E69DDC4AABB174D6F5EB689EC58B419BB90B140FF6A82D16C3A6E616B3B2D350CA58C106743
3,230,439 UART: [art] SIG.R = DF666FA6DB29B0AED73E440C107FDA2425DFBCADBF00A1AA6AAB5BD16F107DF2E2D8AEC1DFA977213E140320B70C4166
3,237,206 UART: [art] SIG.S = 75B8107A6E52A927CB64072E76234E1B2B7D599265EB01FCE1DE5DD760CD4435367AFF44CC3097D3D8FB3C02F3568F19
3,260,962 UART: Caliptra RT
3,261,308 UART: [state] CFI Enabled
3,369,414 UART: [rt] RT listening for mailbox commands...
3,370,084 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,513 UART: [rt]cmd =0x4c444556, len=4
3,409,992 >>> mbox cmd response data (687 bytes)
3,409,993 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,204 UART: [rt]cmd =0x43455246, len=4
3,451,085 >>> mbox cmd response data (887 bytes)
3,451,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,567 UART: [rt]cmd =0x43455252, len=4
3,491,413 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,013 UART: [state] LifecycleState = Unprovisioned
85,668 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,669 UART: [kat] LMS
1,168,981 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,742 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,702 UART: [idev] Sha1 KeyId Algorithm
1,209,070 UART: [idev] CSR upload begun
1,210,849 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,260 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,968 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,853 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,559 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,988 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,485 UART: [idev] CSR uploaded
1,301,530 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,301,699 UART: [idev] --
1,302,726 UART: [ldev] ++
1,302,894 UART: [ldev] CDI.KEYID = 6
1,303,258 UART: [ldev] SUBJECT.KEYID = 5
1,303,685 UART: [ldev] AUTHORITY.KEYID = 7
1,304,148 UART: [ldev] FE.KEYID = 1
1,309,302 UART: [ldev] Erasing FE.KEYID = 1
1,335,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,914 UART: [ldev] --
1,375,358 UART: [fwproc] Wait for Commands...
1,376,183 UART: [fwproc] Recv command 0x46574c44
1,376,916 UART: [fwproc] Recv'd Img size: 114360 bytes
2,675,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,702,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,867,758 >>> mbox cmd response: success
2,868,811 UART: [afmc] ++
2,868,979 UART: [afmc] CDI.KEYID = 6
2,869,342 UART: [afmc] SUBJECT.KEYID = 7
2,869,768 UART: [afmc] AUTHORITY.KEYID = 5
2,905,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,922,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,923,130 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,928,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,934,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,940,461 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,948,348 UART: [afmc] --
2,949,342 UART: [cold-reset] --
2,950,364 UART: [state] Locking Datavault
2,951,525 UART: [state] Locking PCR0, PCR1 and PCR31
2,952,129 UART: [state] Locking ICCM
2,952,767 UART: [exit] Launching FMC @ 0x40000130
2,958,096 UART:
2,958,112 UART: Running Caliptra FMC ...
2,958,520 UART:
2,958,663 UART: [state] CFI Enabled
2,969,200 UART: [fht] FMC Alias Private Key: 7
3,076,131 UART: [art] Extend RT PCRs Done
3,076,559 UART: [art] Lock RT PCRs Done
3,078,237 UART: [art] Populate DV Done
3,086,186 UART: [fht] FMC Alias Private Key: 7
3,087,182 UART: [art] Derive CDI
3,087,462 UART: [art] Store in in slot 0x4
3,173,071 UART: [art] Derive Key Pair
3,173,431 UART: [art] Store priv key in slot 0x5
3,186,967 UART: [art] Derive Key Pair - Done
3,202,011 UART: [art] Signing Cert with AUTHO
3,202,491 UART: RITY.KEYID = 7
3,217,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,426 UART: [art] PUB.X = D13A4F3144D3C3BCFA133B0EF3B64B9834EEE41BC563EC7B7D164FFDF70FA2BDE24F51A0F8CDA2FEA30AB009C9376254
3,225,210 UART: [art] PUB.Y = 232359BAC1D39A8952279710C082F1EF1FE4E9B44A8198569E8D28A7E2B7D3F21681FE8EF3BAA315E6828012BBEA81ED
3,232,168 UART: [art] SIG.R = 5FC62A2FD3F7FD7EE4937AF0C695457F714DB75D58A020D970E04CFD7A0486096B3E4395012241166AB2A613DED2FB4D
3,238,937 UART: [art] SIG.S = 7046E120665415EC1F701A7FC6DB3D70B4D7D2ECFF3D2AD68CBFDB8DB78AD607C73DD468DA04CB68FDE42CC43125929F
3,262,342 UART: Caliptra RT
3,262,688 UART: [state] CFI Enabled
3,370,208 UART: [rt] RT listening for mailbox commands...
3,370,878 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,447 UART: [rt]cmd =0x4c444556, len=4
3,410,764 >>> mbox cmd response data (687 bytes)
3,410,765 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,338 UART: [rt]cmd =0x43455246, len=4
3,452,501 >>> mbox cmd response data (887 bytes)
3,452,502 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,767 UART: [rt]cmd =0x43455252, len=4
3,492,457 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 897.34s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,826,180 UART: [art] Lock RT PCRs Done
2,827,580 UART: [art] Populate DV Done
2,835,979 UART: [fht] FMC Alias Private Key: 7
2,837,019 UART: [art] Derive CDI
2,837,299 UART: [art] Store in in slot 0x4
2,922,782 UART: [art] Derive Key Pair
2,923,142 UART: [art] Store priv key in slot 0x5
2,936,668 UART: [art] Derive Key Pair - Done
2,951,131 UART: [art] Signing Cert with AUTHO
2,951,611 UART: RITY.KEYID = 7
2,966,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,564 UART: [art] PUB.X = 3809953914E76868E71E7BAC6BB1311BD66A0BED28527C95E066CAFF3DBA572F06F1FD3001A9AF6ACF74FC4450B09EB7
2,974,336 UART: [art] PUB.Y = B7140460CB900E9EC9A6F418469D9F075383DB856849134B25A458E9E530669D063950269231BF5C36480A9F844AFE5F
2,981,261 UART: [art] SIG.R = 325B2130F91966B33D4EDB92730647E8E7EDA14F3C6A3DFF4475D4B370687412D35DE2FF403650B0C8DEC015BE4CE28A
2,988,036 UART: [art] SIG.S = 033F80D7A166FCD8F3034BF9359E5C992F48A8E98691826B32E369FF701BFD52E02BF010BBD41558F7872849B61F29C3
3,011,735 UART: Caliptra RT
3,012,081 UART: [state] CFI Enabled
3,120,677 UART: [rt] RT listening for mailbox commands...
3,121,347 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,150,508 UART: [rt]cmd =0x4c444556, len=4
3,161,171 >>> mbox cmd response data (687 bytes)
3,161,172 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,505 UART: [rt]cmd =0x43455246, len=4
3,202,552 >>> mbox cmd response data (887 bytes)
3,202,553 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,852 UART: [rt]cmd =0x43455252, len=4
3,242,728 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,521 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,643,971 >>> mbox cmd response: success
2,706,739 UART:
2,706,755 UART: Running Caliptra FMC ...
2,707,163 UART:
2,707,306 UART: [state] CFI Enabled
2,718,011 UART: [fht] FMC Alias Private Key: 7
2,826,380 UART: [art] Extend RT PCRs Done
2,826,808 UART: [art] Lock RT PCRs Done
2,828,508 UART: [art] Populate DV Done
2,837,037 UART: [fht] FMC Alias Private Key: 7
2,838,171 UART: [art] Derive CDI
2,838,451 UART: [art] Store in in slot 0x4
2,923,738 UART: [art] Derive Key Pair
2,924,098 UART: [art] Store priv key in slot 0x5
2,937,034 UART: [art] Derive Key Pair - Done
2,951,642 UART: [art] Signing Cert with AUTHO
2,952,122 UART: RITY.KEYID = 7
2,967,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,105 UART: [art] PUB.X = E527100D75DDEE1222D515B2DAE7513B25E55BA0C912C94FC4A31F90E2FB385A5B7C2D57B42392D0879008C8AE6ACE91
2,974,879 UART: [art] PUB.Y = 5A2B7345A4B6328802B3D5206D880825FC8F854FB759BEEB45916D378FE1FF37CE40C3524E0DFD0FED9763714A381D4B
2,981,823 UART: [art] SIG.R = A87EEA4089981AA9C23462A2807A45C25AED86F5EEDFA544A132C62B263C7F27D20F7666342515C735DEAA3D007A1E00
2,988,552 UART: [art] SIG.S = 4AE694EC4C7D84B33599B78E9165DE8BD0601A878B65F1EF044971172B49425FE107B3F08310F902C1F43460C51C404D
3,012,822 UART: Caliptra RT
3,013,168 UART: [state] CFI Enabled
3,121,330 UART: [rt] RT listening for mailbox commands...
3,122,000 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,689 UART: [rt]cmd =0x4c444556, len=4
3,162,074 >>> mbox cmd response data (687 bytes)
3,162,075 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,326 UART: [rt]cmd =0x43455246, len=4
3,203,191 >>> mbox cmd response data (887 bytes)
3,203,192 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,373 UART: [rt]cmd =0x43455252, len=4
3,243,169 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,733 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,123 >>> mbox cmd response: success
2,704,657 UART:
2,704,673 UART: Running Caliptra FMC ...
2,705,081 UART:
2,705,224 UART: [state] CFI Enabled
2,715,705 UART: [fht] FMC Alias Private Key: 7
2,824,242 UART: [art] Extend RT PCRs Done
2,824,670 UART: [art] Lock RT PCRs Done
2,826,234 UART: [art] Populate DV Done
2,834,105 UART: [fht] FMC Alias Private Key: 7
2,835,237 UART: [art] Derive CDI
2,835,517 UART: [art] Store in in slot 0x4
2,920,882 UART: [art] Derive Key Pair
2,921,242 UART: [art] Store priv key in slot 0x5
2,934,860 UART: [art] Derive Key Pair - Done
2,949,566 UART: [art] Signing Cert with AUTHO
2,950,046 UART: RITY.KEYID = 7
2,965,384 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,149 UART: [art] PUB.X = 263CED2DD49757522F8CBB24EEB5A2C0A218585EB19A3CCF58D0E7D41E702CC81033BEADC0E68A6ADA62313344B19505
2,972,930 UART: [art] PUB.Y = 59D688C61594E0B364A74098933FA19952C864F152CFFED87D09755C1DCC0416A63D219AC063D91F8AEF7878F8D04C9F
2,979,876 UART: [art] SIG.R = 5148DC9B7203D84CB7E0F92381CDCBFB4B12923E51B8C67D1B8E5DB29E5E3975CB02286E30D6B09DD356E72126CE1C19
2,986,650 UART: [art] SIG.S = 50A0BD19A85E2C14B840FC5A4E001BE9F8F669D771123774209DE08174C86FA2C2B61179FFF29761BE5F4569B86589E7
3,010,345 UART: Caliptra RT
3,010,691 UART: [state] CFI Enabled
3,118,191 UART: [rt] RT listening for mailbox commands...
3,118,861 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,054 UART: [rt]cmd =0x4c444556, len=4
3,158,519 >>> mbox cmd response data (687 bytes)
3,158,520 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,863 UART: [rt]cmd =0x43455246, len=4
3,199,798 >>> mbox cmd response data (887 bytes)
3,199,799 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,176 UART: [rt]cmd =0x43455252, len=4
3,240,204 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,741 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,641,519 >>> mbox cmd response: success
2,703,051 UART:
2,703,067 UART: Running Caliptra FMC ...
2,703,475 UART:
2,703,618 UART: [state] CFI Enabled
2,714,209 UART: [fht] FMC Alias Private Key: 7
2,822,658 UART: [art] Extend RT PCRs Done
2,823,086 UART: [art] Lock RT PCRs Done
2,824,952 UART: [art] Populate DV Done
2,833,363 UART: [fht] FMC Alias Private Key: 7
2,834,351 UART: [art] Derive CDI
2,834,631 UART: [art] Store in in slot 0x4
2,920,530 UART: [art] Derive Key Pair
2,920,890 UART: [art] Store priv key in slot 0x5
2,934,804 UART: [art] Derive Key Pair - Done
2,949,967 UART: [art] Signing Cert with AUTHO
2,950,447 UART: RITY.KEYID = 7
2,965,831 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,596 UART: [art] PUB.X = DF29204EE788BC2141C2FA56F6F62DB5CC73CC97950CD78482024042A01DDE74542DEB03CC35B33372B2C1B0361D406E
2,973,363 UART: [art] PUB.Y = F0F1E0C89B5AA997010E9548DD81389C62EE6767E499A0CCDAD4C99683299A92BF25DA6D6CCAB806E18BD7D2315D560C
2,980,313 UART: [art] SIG.R = 05E89D77D319B6DE5D4FF67270109F1C99F07644263781264E3F5D95074A72BC75E3A954DD149F83A4F1892ABEC877C2
2,987,075 UART: [art] SIG.S = CA12F737568E89F54130301872E6E763A7EC68A4CBB72BB314C1345C75672CFD5C04F932BEF5765B1D2257410B9406E9
3,011,139 UART: Caliptra RT
3,011,485 UART: [state] CFI Enabled
3,119,303 UART: [rt] RT listening for mailbox commands...
3,119,973 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,670 UART: [rt]cmd =0x4c444556, len=4
3,159,875 >>> mbox cmd response data (687 bytes)
3,159,876 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,995 UART: [rt]cmd =0x43455246, len=4
3,201,074 >>> mbox cmd response data (887 bytes)
3,201,075 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,474 UART: [rt]cmd =0x43455252, len=4
3,241,280 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,855 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,642,991 >>> mbox cmd response: success
2,705,851 UART:
2,705,867 UART: Running Caliptra FMC ...
2,706,275 UART:
2,706,418 UART: [state] CFI Enabled
2,717,109 UART: [fht] FMC Alias Private Key: 7
2,825,332 UART: [art] Extend RT PCRs Done
2,825,760 UART: [art] Lock RT PCRs Done
2,827,452 UART: [art] Populate DV Done
2,835,893 UART: [fht] FMC Alias Private Key: 7
2,837,055 UART: [art] Derive CDI
2,837,335 UART: [art] Store in in slot 0x4
2,922,564 UART: [art] Derive Key Pair
2,922,924 UART: [art] Store priv key in slot 0x5
2,936,576 UART: [art] Derive Key Pair - Done
2,951,595 UART: [art] Signing Cert with AUTHO
2,952,075 UART: RITY.KEYID = 7
2,967,455 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,220 UART: [art] PUB.X = CD6EB60DCF9F6D56033D15C3535637E925B2892E9D27ADE9FF047DE734BEA0004010FA85E87938512A4C4D99FFCAAF01
2,974,968 UART: [art] PUB.Y = B4B8CD6B908D39D95FFC57974FF482F66059BEDB031793AFE3DC5F53DAB54FD42CAFF480C4E7482E42E61A54DBF5AAD8
2,981,939 UART: [art] SIG.R = EA71709A98A73EE84231FF04E0620BC574060DF73063251FCBEA1ADAB493414EDBA41DAE9DF21751B9391C67F4D20466
2,988,702 UART: [art] SIG.S = 5D5EAEA36B26F447B1183C2BA6FE8AF76BACBE20B12F8AAF1B1810FD862047DF2386D0A6BB66D3117144BB50FEA12917
3,013,029 UART: Caliptra RT
3,013,375 UART: [state] CFI Enabled
3,121,203 UART: [rt] RT listening for mailbox commands...
3,121,873 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,214 UART: [rt]cmd =0x4c444556, len=4
3,161,751 >>> mbox cmd response data (687 bytes)
3,161,752 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,949 UART: [rt]cmd =0x43455246, len=4
3,203,038 >>> mbox cmd response data (887 bytes)
3,203,039 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,438 UART: [rt]cmd =0x43455252, len=4
3,243,176 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 855.48s
Truncated 9072 bytes from beginning
24,304,601 UART: [state] Locking Datavault
24,309,583 UART: [state] Locking PCR0, PCR1 and PCR31
24,311,277 UART: [state] Locking ICCM
24,313,782 UART: [exit] Launching FMC @ 0x40000130
24,322,447 UART:
24,322,673 UART: Running Caliptra FMC ...
24,323,697 UART:
24,323,844 UART: [state] CFI Enabled
24,383,016 UART: [fht] FMC Alias Private Key: 7
26,721,354 UART: [art] Extend RT PCRs Done
26,722,581 UART: [art] Lock RT PCRs Done
26,724,440 UART: [art] Populate DV Done
26,729,957 UART: [fht] FMC Alias Private Key: 7
26,731,542 UART: [art] Derive CDI
26,732,273 UART: [art] Store in in slot 0x4
26,790,605 UART: [art] Derive Key Pair
26,791,675 UART: [art] Store priv key in slot 0x5
30,084,726 UART: [art] Derive Key Pair - Done
30,097,770 UART: [art] Signing Cert with AUTHO
30,099,069 UART: RITY.KEYID = 7
32,385,980 UART: [art] Erasing AUTHORITY.KEYID = 7
32,387,493 UART: [art] PUB.X = 1101AD0A38D9DE3F8217195696FCAC70BEC0D4C60E5979D06C0BD11F2266751541981569A5EE155C583DC62D81CF61D5
32,394,734 UART: [art] PUB.Y = A9CFBC55B40BFC216B4D7462518E9C6F143CDCC026A5472F49EDCC8156C014FA7FBABD60491BE8ADC695D34F08707416
32,402,013 UART: [art] SIG.R = 9285EE2F2C9F75EF7C21DD8427DD34E0864B38BE3F0E0A722E589C1EDD051727BE3F1438AB753B0E5597299B616E2113
32,409,407 UART: [art] SIG.S = 0CF7F28C162DC372B134A993EC848C01D20D6DC36B296309A323933521399E9F49884F8520AF7D28BE2AFA2F2ECC5233
33,714,347 UART: Caliptra RT
33,715,061 UART: [state] CFI Enabled
33,876,242 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
4,680 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,126 UART:
192,500 UART: Running Caliptra ROM ...
193,890 UART:
194,056 UART: [state] CFI Enabled
265,336 UART: [state] LifecycleState = Unprovisioned
267,708 UART: [state] DebugLocked = No
268,995 UART: [state] WD Timer not started. Device not locked for debugging
273,725 UART: [kat] SHA2-256
455,658 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,159 UART: [kat] ++
467,659 UART: [kat] sha1
476,705 UART: [kat] SHA2-256
479,720 UART: [kat] SHA2-384
485,367 UART: [kat] SHA2-512-ACC
487,974 UART: [kat] ECC-384
3,777,802 UART: [kat] HMAC-384Kdf
3,802,946 UART: [kat] LMS
4,876,141 UART: [kat] --
4,881,734 UART: [cold-reset] ++
4,882,986 UART: [fht] FHT @ 0x50003400
4,894,382 UART: [idev] ++
4,895,061 UART: [idev] CDI.KEYID = 6
4,896,267 UART: [idev] SUBJECT.KEYID = 7
4,897,432 UART: [idev] UDS.KEYID = 0
4,930,228 UART: [idev] Erasing UDS.KEYID = 0
8,243,856 UART: [idev] Sha384 KeyId Algorithm
8,254,660 UART: [idev] --
8,256,982 UART: [ldev] ++
8,257,552 UART: [ldev] CDI.KEYID = 6
8,258,788 UART: [ldev] SUBJECT.KEYID = 5
8,259,947 UART: [ldev] AUTHORITY.KEYID = 7
8,261,173 UART: [ldev] FE.KEYID = 1
8,298,231 UART: [ldev] Erasing FE.KEYID = 1
11,632,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,398 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
13,990,402 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,010,814 UART: [ldev] --
14,015,814 UART: [fwproc] Wait for Commands...
14,017,858 UART: [fwproc] Recv command 0x46574c44
14,020,177 UART: [fwproc] Recv'd Img size: 114036 bytes
18,093,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,170,373 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,239,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,556,060 >>> mbox cmd response: success
18,559,705 UART: [afmc] ++
18,560,292 UART: [afmc] CDI.KEYID = 6
18,561,533 UART: [afmc] SUBJECT.KEYID = 7
18,562,632 UART: [afmc] AUTHORITY.KEYID = 5
21,924,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,224,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,226,770 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,242,927 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,259,019 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,275,027 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,297,126 UART: [afmc] --
24,299,914 UART: [cold-reset] --
24,302,381 UART: [state] Locking Datavault
24,307,685 UART: [state] Locking PCR0, PCR1 and PCR31
24,309,327 UART: [state] Locking ICCM
24,311,907 UART: [exit] Launching FMC @ 0x40000130
24,320,630 UART:
24,320,860 UART: Running Caliptra FMC ...
24,321,968 UART:
24,322,127 UART: [state] CFI Enabled
24,384,381 UART: [fht] FMC Alias Private Key: 7
26,721,682 UART: [art] Extend RT PCRs Done
26,722,909 UART: [art] Lock RT PCRs Done
26,724,479 UART: [art] Populate DV Done
26,729,799 UART: [fht] FMC Alias Private Key: 7
26,731,336 UART: [art] Derive CDI
26,732,147 UART: [art] Store in in slot 0x4
26,792,491 UART: [art] Derive Key Pair
26,793,531 UART: [art] Store priv key in slot 0x5
30,085,638 UART: [art] Derive Key Pair - Done
30,098,583 UART: [art] Signing Cert with AUTHO
30,099,888 UART: RITY.KEYID = 7
32,388,015 UART: [art] Erasing AUTHORITY.KEYID = 7
32,389,528 UART: [art] PUB.X = E25C6B5A8F35C42087977C2832127E1715E363CEB3110F3818BFE5BAB9CE77C91493CB249BFDF52E5B637E39F8B0FE94
32,396,780 UART: [art] PUB.Y = 1CF210CF8AD13EA56F0EA52CABD982E60990631AB4DB0075F53B5240262C252CCA766B30586AEF2E648203E93D988A81
32,404,008 UART: [art] SIG.R = 4B561DF94E34FBA4394B681A91F3B50CCB699EC75FFE9488480DDF614E3D71B699BB48EAA2959E39C174C39E1C2E54D3
32,411,403 UART: [art] SIG.S = 681BBACC3A8F7963241D6BE9A2FCF87D2A0C190366BC8202092F645CC2A3BEA7E12D2B04196749B08E259F51D8BA62C8
33,716,819 UART: Caliptra RT
33,717,513 UART: [state] CFI Enabled
33,878,902 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
4,705 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,035 UART:
192,428 UART: Running Caliptra ROM ...
193,532 UART:
193,677 UART: [state] CFI Enabled
266,491 UART: [state] LifecycleState = Unprovisioned
268,843 UART: [state] DebugLocked = No
271,358 UART: [state] WD Timer not started. Device not locked for debugging
276,304 UART: [kat] SHA2-256
458,256 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,781 UART: [kat] ++
470,254 UART: [kat] sha1
479,944 UART: [kat] SHA2-256
482,957 UART: [kat] SHA2-384
489,255 UART: [kat] SHA2-512-ACC
491,864 UART: [kat] ECC-384
3,775,261 UART: [kat] HMAC-384Kdf
3,802,194 UART: [kat] LMS
4,875,343 UART: [kat] --
4,879,322 UART: [cold-reset] ++
4,880,831 UART: [fht] FHT @ 0x50003400
4,893,924 UART: [idev] ++
4,894,646 UART: [idev] CDI.KEYID = 6
4,895,844 UART: [idev] SUBJECT.KEYID = 7
4,896,955 UART: [idev] UDS.KEYID = 0
4,929,428 UART: [idev] Erasing UDS.KEYID = 0
8,244,157 UART: [idev] Fuse KeyId
8,248,397 UART: [idev] --
8,252,390 UART: [ldev] ++
8,252,995 UART: [ldev] CDI.KEYID = 6
8,254,100 UART: [ldev] SUBJECT.KEYID = 5
8,255,368 UART: [ldev] AUTHORITY.KEYID = 7
8,256,466 UART: [ldev] FE.KEYID = 1
8,296,034 UART: [ldev] Erasing FE.KEYID = 1
11,629,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,969 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
13,990,977 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,011,968 UART: [ldev] --
14,015,714 UART: [fwproc] Wait for Commands...
14,018,902 UART: [fwproc] Recv command 0x46574c44
14,020,895 UART: [fwproc] Recv'd Img size: 114036 bytes
18,089,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,164,588 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,233,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,550,846 >>> mbox cmd response: success
18,555,257 UART: [afmc] ++
18,555,844 UART: [afmc] CDI.KEYID = 6
18,556,947 UART: [afmc] SUBJECT.KEYID = 7
18,558,160 UART: [afmc] AUTHORITY.KEYID = 5
21,918,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,219,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,222,053 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,238,258 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,254,314 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,270,323 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,293,032 UART: [afmc] --
24,296,684 UART: [cold-reset] --
24,302,165 UART: [state] Locking Datavault
24,308,547 UART: [state] Locking PCR0, PCR1 and PCR31
24,310,188 UART: [state] Locking ICCM
24,311,798 UART: [exit] Launching FMC @ 0x40000130
24,320,461 UART:
24,320,688 UART: Running Caliptra FMC ...
24,321,783 UART:
24,321,936 UART: [state] CFI Enabled
24,380,371 UART: [fht] FMC Alias Private Key: 7
26,718,080 UART: [art] Extend RT PCRs Done
26,719,300 UART: [art] Lock RT PCRs Done
26,721,038 UART: [art] Populate DV Done
26,726,499 UART: [fht] FMC Alias Private Key: 7
26,727,977 UART: [art] Derive CDI
26,728,738 UART: [art] Store in in slot 0x4
26,788,647 UART: [art] Derive Key Pair
26,789,677 UART: [art] Store priv key in slot 0x5
30,082,378 UART: [art] Derive Key Pair - Done
30,095,262 UART: [art] Signing Cert with AUTHO
30,096,601 UART: RITY.KEYID = 7
32,383,357 UART: [art] Erasing AUTHORITY.KEYID = 7
32,384,859 UART: [art] PUB.X = 6D99FC23CDF8396898FCC5C64C203CB17E1552C7B1B47C199F4D2CCBFA549D23E7506EA261FB0E2C11123EC8EB2E6FBC
32,392,099 UART: [art] PUB.Y = 4F7FED6227EA8FDFC222396F4CB5DE67C257FB5010C6D491D99F4A2A5F9E77B65225BB4936B6C15972E4BDDC784DDE98
32,399,382 UART: [art] SIG.R = 7698529F39363AE3BCE853F05334DAC5BAA3EE6C9E50666B5988D788F60A77E6466D6A5C760980ACCB8AE70B3CA7389A
32,406,790 UART: [art] SIG.S = 9B856E6BB59032048ED8D14A6CD4A7EF58DCF02D139C455561EBC83A2F0AA097B8ACEEC73FA5B7DB7FB263FAD56109A3
33,711,421 UART: Caliptra RT
33,712,124 UART: [state] CFI Enabled
33,872,549 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
5,206 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,300,029 >>> mbox cmd response: success
24,004,335 UART:
24,004,745 UART: Running Caliptra FMC ...
24,005,896 UART:
24,006,059 UART: [state] CFI Enabled
24,071,300 UART: [fht] FMC Alias Private Key: 7
26,409,460 UART: [art] Extend RT PCRs Done
26,410,682 UART: [art] Lock RT PCRs Done
26,412,251 UART: [art] Populate DV Done
26,417,519 UART: [fht] FMC Alias Private Key: 7
26,419,004 UART: [art] Derive CDI
26,419,772 UART: [art] Store in in slot 0x4
26,479,350 UART: [art] Derive Key Pair
26,480,384 UART: [art] Store priv key in slot 0x5
29,773,092 UART: [art] Derive Key Pair - Done
29,786,330 UART: [art] Signing Cert with AUTHO
29,787,642 UART: RITY.KEYID = 7
32,073,834 UART: [art] Erasing AUTHORITY.KEYID = 7
32,075,342 UART: [art] PUB.X = 63327242AD90A57CAE4561D33AF1F4619BFDA12E3EC818E5AD1EC5229265DA0D29D98E86E531FDC07F5E65DE4C3DF1C7
32,082,641 UART: [art] PUB.Y = 874883216D3AB275E083AC916149ADA49ED296FB9D709D2DE28DD06822AD79FBF802E402338BA0D06C93F132B90F1534
32,089,847 UART: [art] SIG.R = 1DD108E7908F7F7867930CB8A1C58E4DDD538CF84FFB46A71EC725C607E4312B4AB21633D4E68DFC3B6E6051DA0386AA
32,097,237 UART: [art] SIG.S = 8BAB850B68AC9210C48871A93DF7A2012F4FA73543D861D9378C4C7E81C5C8778D25DCAF99C4618E8B716E26B46105CB
33,402,224 UART: Caliptra RT
33,402,926 UART: [state] CFI Enabled
33,564,200 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
5,068 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,319,459 >>> mbox cmd response: success
24,018,443 UART:
24,018,839 UART: Running Caliptra FMC ...
24,019,950 UART:
24,020,106 UART: [state] CFI Enabled
24,086,269 UART: [fht] FMC Alias Private Key: 7
26,424,035 UART: [art] Extend RT PCRs Done
26,425,257 UART: [art] Lock RT PCRs Done
26,426,910 UART: [art] Populate DV Done
26,432,210 UART: [fht] FMC Alias Private Key: 7
26,433,857 UART: [art] Derive CDI
26,434,670 UART: [art] Store in in slot 0x4
26,495,392 UART: [art] Derive Key Pair
26,496,443 UART: [art] Store priv key in slot 0x5
29,789,347 UART: [art] Derive Key Pair - Done
29,802,494 UART: [art] Signing Cert with AUTHO
29,803,844 UART: RITY.KEYID = 7
32,091,291 UART: [art] Erasing AUTHORITY.KEYID = 7
32,092,814 UART: [art] PUB.X = B6133239EACDB9A7E8AFFEBB9DBC36BE013EAB2453B72F42454DF4C6433953AA95FD99CBE3ED94E25C23643CD2D965FF
32,100,067 UART: [art] PUB.Y = F57C0B144B083110A1B10ACEFD5EC32FA8B21B934D89DD24063BE3EE798720E1B9C47E9F2F7931C30CC3B533C1D0D1B4
32,107,337 UART: [art] SIG.R = 4D99C7E4BABD60278562960ADD24251061189191050052A0620C3EE45045EC92FCB972C8577E422E784E6FFA1C09F51B
32,114,672 UART: [art] SIG.S = 69769779F832976F969A5CA78D0ECA98DB4252E822FBB7EC87C70ED5994F9FD02AD91C9AB73ECAD4AD58A719CECADFB8
33,419,514 UART: Caliptra RT
33,420,232 UART: [state] CFI Enabled
33,582,854 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
5,042 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,352,606 >>> mbox cmd response: success
24,055,241 UART:
24,055,659 UART: Running Caliptra FMC ...
24,056,816 UART:
24,056,982 UART: [state] CFI Enabled
24,124,420 UART: [fht] FMC Alias Private Key: 7
26,462,760 UART: [art] Extend RT PCRs Done
26,463,987 UART: [art] Lock RT PCRs Done
26,465,536 UART: [art] Populate DV Done
26,471,239 UART: [fht] FMC Alias Private Key: 7
26,472,787 UART: [art] Derive CDI
26,473,519 UART: [art] Store in in slot 0x4
26,532,273 UART: [art] Derive Key Pair
26,533,287 UART: [art] Store priv key in slot 0x5
29,825,860 UART: [art] Derive Key Pair - Done
29,838,680 UART: [art] Signing Cert with AUTHO
29,840,013 UART: RITY.KEYID = 7
32,127,053 UART: [art] Erasing AUTHORITY.KEYID = 7
32,128,556 UART: [art] PUB.X = B42728C873971278DCBE79ED3EFF2C5BBB20FEA6B45AC53AB72E3EBF6124587E78FA9CB6B865ECBD8D0A5783A6DF1775
32,135,806 UART: [art] PUB.Y = 2680D7251EB8383CC9139B274E189DC64F8DE81450F650E25FBA3ACA4AEB1F505CF28078A42DD9E6B5CEBD17742F72FC
32,143,080 UART: [art] SIG.R = 4E3F9BF4675478F4356828EE7E10C92FE73BCD0049500369ED0A9817C17DB14A8A663603E8F323CDBD0D9F1A85CFA9BA
32,150,470 UART: [art] SIG.S = DA1206A3DF0FA6739E3FD17A0B49C2308B8AD2D99131440D01A82C9AEC3DEBB57B7F4FC79F464C054F96E44CDD2E9071
33,455,568 UART: Caliptra RT
33,456,309 UART: [state] CFI Enabled
33,616,454 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
4,910 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,324,380 >>> mbox cmd response: success
24,013,866 UART:
24,014,277 UART: Running Caliptra FMC ...
24,015,442 UART:
24,015,611 UART: [state] CFI Enabled
24,083,602 UART: [fht] FMC Alias Private Key: 7
26,422,370 UART: [art] Extend RT PCRs Done
26,423,591 UART: [art] Lock RT PCRs Done
26,425,052 UART: [art] Populate DV Done
26,430,598 UART: [fht] FMC Alias Private Key: 7
26,432,189 UART: [art] Derive CDI
26,433,001 UART: [art] Store in in slot 0x4
26,491,566 UART: [art] Derive Key Pair
26,492,603 UART: [art] Store priv key in slot 0x5
29,785,623 UART: [art] Derive Key Pair - Done
29,798,730 UART: [art] Signing Cert with AUTHO
29,800,028 UART: RITY.KEYID = 7
32,095,619 UART: [art] Erasing AUTHORITY.KEYID = 7
32,097,128 UART: [art] PUB.X = 254624BA0A57C005FC7A409C1B5CFC281B8FAED709EEEBB62A8ED538CFA4B9AC8BCB1E133EBDBE500574B5D628CB2836
32,104,448 UART: [art] PUB.Y = 99E22C4AEB2ACD969600FC3BE35DCA98A32328F089A0A2C672899A70838AAF181AD645B49C57385E11E8FB7271FED3CD
32,111,668 UART: [art] SIG.R = C5DDE498E1F13F00A0AF62D79ED578823B9710B2B89EDE0FE227748537E0C936F1992A14796012573CD30C97303F2BD7
32,119,010 UART: [art] SIG.S = 454933E66D50D276552C6ECD56F94411024B6DEB6AD2D173A90BDF26320EC9161799ACE78ACC64578F1205638B937D66
33,424,379 UART: Caliptra RT
33,425,096 UART: [state] CFI Enabled
33,586,669 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.16s
Truncated 9072 bytes from beginning
24,410,693 UART: [state] Locking Datavault
24,415,777 UART: [state] Locking PCR0, PCR1 and PCR31
24,417,411 UART: [state] Locking ICCM
24,419,212 UART: [exit] Launching FMC @ 0x40000130
24,427,878 UART:
24,428,101 UART: Running Caliptra FMC ...
24,429,115 UART:
24,429,254 UART: [state] CFI Enabled
24,437,562 UART: [fht] FMC Alias Private Key: 7
26,768,107 UART: [art] Extend RT PCRs Done
26,769,345 UART: [art] Lock RT PCRs Done
26,771,078 UART: [art] Populate DV Done
26,776,281 UART: [fht] FMC Alias Private Key: 7
26,777,978 UART: [art] Derive CDI
26,778,707 UART: [art] Store in in slot 0x4
26,821,245 UART: [art] Derive Key Pair
26,822,317 UART: [art] Store priv key in slot 0x5
30,064,213 UART: [art] Derive Key Pair - Done
30,077,102 UART: [art] Signing Cert with AUTHO
30,078,438 UART: RITY.KEYID = 7
32,357,506 UART: [art] Erasing AUTHORITY.KEYID = 7
32,359,010 UART: [art] PUB.X = 9732AEA9C0C9EDF335B4EDB3DDAD087C53F20639BCF5ED0204118DDDC2460AB3C6B7752A9E170A3901AEA3250629CD57
32,366,256 UART: [art] PUB.Y = A550959D9188B7EAB89D42B23FD7307413CB6B296526C65BDEB98BCC9EE8ED144B791DC4574935D6AE6A1DE54006E49F
32,373,488 UART: [art] SIG.R = C36D11E31E04AAFCA15C01A567CF46112F647B46D2A30BB4DE05363E6F66586661C069FDBE2351D3969A68170DFA255A
32,380,875 UART: [art] SIG.S = D522D495A6321EEF50EC84FFB74D52E1E2F8ECBE460D87306D986CF2660CC7D479F23F3EC6E01A00DC0C360BD76FA678
33,686,039 UART: Caliptra RT
33,686,741 UART: [state] CFI Enabled
33,802,499 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
5,324 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,384 UART:
192,801 UART: Running Caliptra ROM ...
193,886 UART:
603,679 UART: [state] CFI Enabled
617,751 UART: [state] LifecycleState = Unprovisioned
620,111 UART: [state] DebugLocked = No
623,014 UART: [state] WD Timer not started. Device not locked for debugging
627,933 UART: [kat] SHA2-256
809,953 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,488 UART: [kat] ++
821,983 UART: [kat] sha1
831,451 UART: [kat] SHA2-256
834,492 UART: [kat] SHA2-384
840,516 UART: [kat] SHA2-512-ACC
843,133 UART: [kat] ECC-384
4,096,923 UART: [kat] HMAC-384Kdf
4,108,513 UART: [kat] LMS
5,181,632 UART: [kat] --
5,187,278 UART: [cold-reset] ++
5,189,866 UART: [fht] FHT @ 0x50003400
5,200,573 UART: [idev] ++
5,201,253 UART: [idev] CDI.KEYID = 6
5,202,433 UART: [idev] SUBJECT.KEYID = 7
5,203,914 UART: [idev] UDS.KEYID = 0
5,220,917 UART: [idev] Erasing UDS.KEYID = 0
8,493,244 UART: [idev] Sha384 KeyId Algorithm
8,503,258 UART: [idev] --
8,508,211 UART: [ldev] ++
8,508,770 UART: [ldev] CDI.KEYID = 6
8,509,923 UART: [ldev] SUBJECT.KEYID = 5
8,511,510 UART: [ldev] AUTHORITY.KEYID = 7
8,513,023 UART: [ldev] FE.KEYID = 1
8,527,237 UART: [ldev] Erasing FE.KEYID = 1
11,819,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,453 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
14,157,444 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,177,788 UART: [ldev] --
14,181,644 UART: [fwproc] Wait for Commands...
14,183,575 UART: [fwproc] Recv command 0x46574c44
14,185,884 UART: [fwproc] Recv'd Img size: 114036 bytes
18,263,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,341,304 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,410,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,726,380 >>> mbox cmd response: success
18,730,050 UART: [afmc] ++
18,730,642 UART: [afmc] CDI.KEYID = 6
18,731,879 UART: [afmc] SUBJECT.KEYID = 7
18,732,996 UART: [afmc] AUTHORITY.KEYID = 5
22,051,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,346,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,348,871 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,365,054 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,381,098 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,397,068 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,419,825 UART: [afmc] --
24,422,714 UART: [cold-reset] --
24,426,198 UART: [state] Locking Datavault
24,430,632 UART: [state] Locking PCR0, PCR1 and PCR31
24,432,369 UART: [state] Locking ICCM
24,433,750 UART: [exit] Launching FMC @ 0x40000130
24,442,410 UART:
24,442,638 UART: Running Caliptra FMC ...
24,443,735 UART:
24,443,904 UART: [state] CFI Enabled
24,452,051 UART: [fht] FMC Alias Private Key: 7
26,783,174 UART: [art] Extend RT PCRs Done
26,784,390 UART: [art] Lock RT PCRs Done
26,786,195 UART: [art] Populate DV Done
26,791,545 UART: [fht] FMC Alias Private Key: 7
26,793,129 UART: [art] Derive CDI
26,793,851 UART: [art] Store in in slot 0x4
26,836,599 UART: [art] Derive Key Pair
26,837,632 UART: [art] Store priv key in slot 0x5
30,079,411 UART: [art] Derive Key Pair - Done
30,092,412 UART: [art] Signing Cert with AUTHO
30,093,725 UART: RITY.KEYID = 7
32,372,922 UART: [art] Erasing AUTHORITY.KEYID = 7
32,374,432 UART: [art] PUB.X = 9704A6C38EF573B25BE3E52592C92C6A6D83FB9BDFBE493CC2E1928AA67075E44A7708FA3CEBA16C4DB9964E4F78358B
32,381,731 UART: [art] PUB.Y = 1997A7144D079040F15407A92C34C27358E11B5D6AB53DD8470AABC9085E74445037CD6E369742738F5707B0C7A58F4A
32,388,919 UART: [art] SIG.R = 49D27DBC915DB40EE54D896599A5B25AAF7BA51843D551DBD1D7215E2B43914A2CF150A0792AB9FE5A99A7CBEDB4586F
32,396,308 UART: [art] SIG.S = CD8EDC966929ABF1046E2A7252DDC8A6ACEF8C69D9C68EC003F4FD160CD779669A1CB0BAD833AC326C115073C9C1BC64
33,701,554 UART: Caliptra RT
33,702,272 UART: [state] CFI Enabled
33,819,462 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
5,838 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,598 UART:
192,969 UART: Running Caliptra ROM ...
194,044 UART:
603,770 UART: [state] CFI Enabled
617,516 UART: [state] LifecycleState = Unprovisioned
619,840 UART: [state] DebugLocked = No
621,649 UART: [state] WD Timer not started. Device not locked for debugging
625,603 UART: [kat] SHA2-256
807,609 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,133 UART: [kat] ++
819,710 UART: [kat] sha1
830,748 UART: [kat] SHA2-256
833,803 UART: [kat] SHA2-384
841,246 UART: [kat] SHA2-512-ACC
843,854 UART: [kat] ECC-384
4,097,800 UART: [kat] HMAC-384Kdf
4,109,185 UART: [kat] LMS
5,182,307 UART: [kat] --
5,186,804 UART: [cold-reset] ++
5,188,199 UART: [fht] FHT @ 0x50003400
5,199,510 UART: [idev] ++
5,200,221 UART: [idev] CDI.KEYID = 6
5,201,456 UART: [idev] SUBJECT.KEYID = 7
5,202,882 UART: [idev] UDS.KEYID = 0
5,219,608 UART: [idev] Erasing UDS.KEYID = 0
8,494,634 UART: [idev] Fuse KeyId
8,498,803 UART: [idev] --
8,503,121 UART: [ldev] ++
8,503,744 UART: [ldev] CDI.KEYID = 6
8,504,940 UART: [ldev] SUBJECT.KEYID = 5
8,506,370 UART: [ldev] AUTHORITY.KEYID = 7
8,507,929 UART: [ldev] FE.KEYID = 1
8,521,201 UART: [ldev] Erasing FE.KEYID = 1
11,813,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,105,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,121,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,137,675 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
14,153,670 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,173,755 UART: [ldev] --
14,177,774 UART: [fwproc] Wait for Commands...
14,180,782 UART: [fwproc] Recv command 0x46574c44
14,182,769 UART: [fwproc] Recv'd Img size: 114036 bytes
18,258,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,335,327 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,404,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,720,310 >>> mbox cmd response: success
18,725,197 UART: [afmc] ++
18,725,781 UART: [afmc] CDI.KEYID = 6
18,726,960 UART: [afmc] SUBJECT.KEYID = 7
18,728,115 UART: [afmc] AUTHORITY.KEYID = 5
22,046,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,340,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,342,388 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,358,543 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,374,610 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,390,564 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,413,537 UART: [afmc] --
24,417,741 UART: [cold-reset] --
24,422,642 UART: [state] Locking Datavault
24,428,858 UART: [state] Locking PCR0, PCR1 and PCR31
24,430,495 UART: [state] Locking ICCM
24,432,018 UART: [exit] Launching FMC @ 0x40000130
24,440,691 UART:
24,440,927 UART: Running Caliptra FMC ...
24,442,022 UART:
24,442,179 UART: [state] CFI Enabled
24,450,546 UART: [fht] FMC Alias Private Key: 7
26,780,746 UART: [art] Extend RT PCRs Done
26,781,965 UART: [art] Lock RT PCRs Done
26,783,958 UART: [art] Populate DV Done
26,789,256 UART: [fht] FMC Alias Private Key: 7
26,790,957 UART: [art] Derive CDI
26,791,768 UART: [art] Store in in slot 0x4
26,834,241 UART: [art] Derive Key Pair
26,835,268 UART: [art] Store priv key in slot 0x5
30,077,871 UART: [art] Derive Key Pair - Done
30,090,824 UART: [art] Signing Cert with AUTHO
30,092,143 UART: RITY.KEYID = 7
32,371,976 UART: [art] Erasing AUTHORITY.KEYID = 7
32,373,483 UART: [art] PUB.X = 096B461BB272605D85DE69576C6852337AE791AFA081F6B7BD96A569737E74381EDF06486BF0E67C459A03442121B2EC
32,380,670 UART: [art] PUB.Y = 634313482599004BCDB796318308E833DFABDF817BFBEE8E0464E7266564F4DA8A850CD95A694835F61C89A1291E2A2F
32,387,901 UART: [art] SIG.R = 3A1BD200EE093ECBCD44B76372E068942A152978F4346926301BA25B66B44BDB2B909B6AD434E6244F2E41D952A7D435
32,395,325 UART: [art] SIG.S = 1D647FC7BCF282AAF11729B9AB3048F44E462B4B43CAA53D94A22A9A2AA0BC8BA7333E6757037325DCB671100D0CD1DB
33,699,748 UART: Caliptra RT
33,700,450 UART: [state] CFI Enabled
33,818,378 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
5,903 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,545,288 >>> mbox cmd response: success
24,190,657 UART:
24,191,162 UART: Running Caliptra FMC ...
24,192,360 UART:
24,192,521 UART: [state] CFI Enabled
24,200,133 UART: [fht] FMC Alias Private Key: 7
26,531,054 UART: [art] Extend RT PCRs Done
26,532,282 UART: [art] Lock RT PCRs Done
26,533,907 UART: [art] Populate DV Done
26,539,534 UART: [fht] FMC Alias Private Key: 7
26,541,182 UART: [art] Derive CDI
26,541,992 UART: [art] Store in in slot 0x4
26,584,867 UART: [art] Derive Key Pair
26,585,902 UART: [art] Store priv key in slot 0x5
29,827,696 UART: [art] Derive Key Pair - Done
29,840,531 UART: [art] Signing Cert with AUTHO
29,841,838 UART: RITY.KEYID = 7
32,121,226 UART: [art] Erasing AUTHORITY.KEYID = 7
32,122,735 UART: [art] PUB.X = 9753E8E5B320E38F87076492153EA92197FF71452EA2FEA1853F27D8146892990D192CFC849AFFEF3DB877A21B4F18DF
32,129,969 UART: [art] PUB.Y = C5C527A9776BE409B91174BF615555235BDC4454050799D8D168899A33B119298281419296C9B7116F1A0474BEAD8D5F
32,137,195 UART: [art] SIG.R = 7DE77B2883B996E09758F0BC8CCE18CE613C35C23EFD91809BCC82AFFE7784FFAAB1288C25BA98B14620B7543DF72508
32,144,555 UART: [art] SIG.S = E7617030078CD150CBCFDCA4D02C77CD521C353CCDFF75DCAD735903B12AD7A412E2850273D580DCA91CF11503CF8792
33,450,138 UART: Caliptra RT
33,450,856 UART: [state] CFI Enabled
33,568,146 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
5,511 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,513,068 >>> mbox cmd response: success
24,152,303 UART:
24,152,715 UART: Running Caliptra FMC ...
24,153,849 UART:
24,153,993 UART: [state] CFI Enabled
24,161,911 UART: [fht] FMC Alias Private Key: 7
26,492,824 UART: [art] Extend RT PCRs Done
26,494,047 UART: [art] Lock RT PCRs Done
26,495,919 UART: [art] Populate DV Done
26,501,510 UART: [fht] FMC Alias Private Key: 7
26,503,275 UART: [art] Derive CDI
26,504,007 UART: [art] Store in in slot 0x4
26,546,348 UART: [art] Derive Key Pair
26,547,385 UART: [art] Store priv key in slot 0x5
29,789,167 UART: [art] Derive Key Pair - Done
29,802,335 UART: [art] Signing Cert with AUTHO
29,803,637 UART: RITY.KEYID = 7
32,083,083 UART: [art] Erasing AUTHORITY.KEYID = 7
32,084,596 UART: [art] PUB.X = 0062F8CDBBE2B99AD4AE53A7014216DD3C8CCD255309F3EC81B01DFE599E7EA4481779C560B6D831C9047846C6AEE5BD
32,091,871 UART: [art] PUB.Y = 0895CB3A096590084595926C9209C24C8FCB595B4EDD30D6495EFC438F9F2964265FC6F6E6B5C11DB3F008A72DB6CBB0
32,099,108 UART: [art] SIG.R = 85CB4726D6DC1F2939F08A6E229348983BEFEDB232DF8CB4F6CE27B14137A7936F38988C068BB4563F87370185DB7DBD
32,106,526 UART: [art] SIG.S = BBF9D5FF5E5009F080A7C10053EDB995783F9C163B5F6B2B800F7066EA837134CDFE602A7BD1E4257F5A5B11F09B3641
33,412,445 UART: Caliptra RT
33,413,138 UART: [state] CFI Enabled
33,532,103 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
5,397 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,518,513 >>> mbox cmd response: success
24,154,214 UART:
24,154,611 UART: Running Caliptra FMC ...
24,155,837 UART:
24,156,003 UART: [state] CFI Enabled
24,163,927 UART: [fht] FMC Alias Private Key: 7
26,494,149 UART: [art] Extend RT PCRs Done
26,495,384 UART: [art] Lock RT PCRs Done
26,497,061 UART: [art] Populate DV Done
26,502,476 UART: [fht] FMC Alias Private Key: 7
26,503,959 UART: [art] Derive CDI
26,504,716 UART: [art] Store in in slot 0x4
26,547,149 UART: [art] Derive Key Pair
26,548,189 UART: [art] Store priv key in slot 0x5
29,790,777 UART: [art] Derive Key Pair - Done
29,803,563 UART: [art] Signing Cert with AUTHO
29,804,862 UART: RITY.KEYID = 7
32,084,028 UART: [art] Erasing AUTHORITY.KEYID = 7
32,085,541 UART: [art] PUB.X = 9F5EBA4B06FC917F133C8BCC7D81F779DDA9F376A09AC411CA9EDAADD83ADA4E8C9D1B5E15033366370500E092DB6D83
32,092,831 UART: [art] PUB.Y = A0F66B747506FE98677AC6A0B4D3FC0B3CEF54EB751AEB8A7A361D5CFC8E63108935E7D159ABDDD0C5153D4E3C6DF84E
32,100,053 UART: [art] SIG.R = D76D3458C91D76E1028F1169382847FD4F13F4C862CCA7AAEEEF60FAA70A8B83029C987EF4E1DB922424DE8F14B1A9E6
32,107,477 UART: [art] SIG.S = 8A0E6AA482841D8864482938A2473FEEA227982F211EC0E547164EC5AC2FC1EF240D43DF365290B24BC0820604ABDC4D
33,412,495 UART: Caliptra RT
33,413,189 UART: [state] CFI Enabled
33,530,315 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
5,744 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,498,266 >>> mbox cmd response: success
24,135,933 UART:
24,136,350 UART: Running Caliptra FMC ...
24,137,580 UART:
24,137,748 UART: [state] CFI Enabled
24,145,811 UART: [fht] FMC Alias Private Key: 7
26,477,299 UART: [art] Extend RT PCRs Done
26,478,530 UART: [art] Lock RT PCRs Done
26,480,210 UART: [art] Populate DV Done
26,485,674 UART: [fht] FMC Alias Private Key: 7
26,487,265 UART: [art] Derive CDI
26,488,076 UART: [art] Store in in slot 0x4
26,530,532 UART: [art] Derive Key Pair
26,531,524 UART: [art] Store priv key in slot 0x5
29,773,675 UART: [art] Derive Key Pair - Done
29,786,674 UART: [art] Signing Cert with AUTHO
29,787,985 UART: RITY.KEYID = 7
32,067,383 UART: [art] Erasing AUTHORITY.KEYID = 7
32,068,901 UART: [art] PUB.X = 63C5D63356C16C421AFF4FAE8DBAC884A7A31637A639FED09684F6CB93B292C81345CFD2C6B9B608F348F68B4EAA17DB
32,076,167 UART: [art] PUB.Y = 43B65613289A64B7C95493363191A575902E6EDD0F7D8EF08BFB62803C8E053AFD89422975D5B741D2D71359F82624A8
32,083,354 UART: [art] SIG.R = 812BDA17583054D32B18856ABD4B8E6F354EDDECBADE5B74FEC3F1E0374D19649046276F4974F37E60FCA07A7EA1A610
32,090,771 UART: [art] SIG.S = 699755772E17B6EA82DC864FBA5FAD36412D89342269E1793A0DF6DCEED8288C4CAEEA391F0850451DED5A89B73B8AEA
33,395,470 UART: Caliptra RT
33,396,183 UART: [state] CFI Enabled
33,512,999 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.15s
Truncated 9072 bytes from beginning
18,594,176 UART: [state] Locking Datavault
18,600,285 UART: [state] Locking PCR0, PCR1 and PCR31
18,601,985 UART: [state] Locking ICCM
18,603,160 UART: [exit] Launching FMC @ 0x40000130
18,611,612 UART:
18,611,854 UART: Running Caliptra FMC ...
18,612,955 UART:
18,613,113 UART: [state] CFI Enabled
18,672,713 UART: [fht] FMC Alias Private Key: 7
20,437,370 UART: [art] Extend RT PCRs Done
20,438,931 UART: [art] Lock RT PCRs Done
20,440,059 UART: [art] Populate DV Done
20,445,495 UART: [fht] FMC Alias Private Key: 7
20,447,032 UART: [art] Derive CDI
20,447,799 UART: [art] Store in in slot 0x4
20,494,888 UART: [art] Derive Key Pair
20,495,928 UART: [art] Store priv key in slot 0x5
22,958,724 UART: [art] Derive Key Pair - Done
22,971,708 UART: [art] Signing Cert with AUTHO
22,973,052 UART: RITY.KEYID = 7
24,685,404 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,913 UART: [art] PUB.X = D7388314CB6BFE45708A834BAEAC29E8285579E88670E291B4E82ECE846FD17583857F1885825B65FCF27C22AA9FBA66
24,694,213 UART: [art] PUB.Y = C99B1ABC00E0C4819622ABA85E69D7467FD4E7A621D921D23FD1B6D460768CDDEEE064D15F6F46B4D23C89D3AE41CBD2
24,701,443 UART: [art] SIG.R = D65DF05D91465838CB7388A2972A5F9BD8C6332164C32733C28C4539481EF3579CEC97FC1A0D772F01C3B0876F809D80
24,708,831 UART: [art] SIG.S = 83407A941A02DF8A74FAFE2C127FBFD647D30E96B17FA1C05B32930AE22EFB500C29319CA9386DD531BCDEF847222E23
25,687,379 UART: Caliptra RT
25,688,093 UART: [state] CFI Enabled
25,852,594 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
4,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
191,967 UART:
192,383 UART: Running Caliptra ROM ...
193,529 UART:
193,680 UART: [state] CFI Enabled
266,457 UART: [state] LifecycleState = Unprovisioned
268,385 UART: [state] DebugLocked = No
271,297 UART: [state] WD Timer not started. Device not locked for debugging
274,376 UART: [kat] SHA2-256
453,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,058 UART: [kat] ++
465,512 UART: [kat] sha1
478,329 UART: [kat] SHA2-256
481,343 UART: [kat] SHA2-384
486,944 UART: [kat] SHA2-512-ACC
489,928 UART: [kat] ECC-384
2,946,600 UART: [kat] HMAC-384Kdf
2,970,893 UART: [kat] LMS
3,500,349 UART: [kat] --
3,506,132 UART: [cold-reset] ++
3,507,800 UART: [fht] FHT @ 0x50003400
3,519,699 UART: [idev] ++
3,520,262 UART: [idev] CDI.KEYID = 6
3,521,226 UART: [idev] SUBJECT.KEYID = 7
3,522,387 UART: [idev] UDS.KEYID = 0
3,542,691 UART: [idev] Erasing UDS.KEYID = 0
6,028,442 UART: [idev] Sha384 KeyId Algorithm
6,038,247 UART: [idev] --
6,042,614 UART: [ldev] ++
6,043,184 UART: [ldev] CDI.KEYID = 6
6,044,070 UART: [ldev] SUBJECT.KEYID = 5
6,045,204 UART: [ldev] AUTHORITY.KEYID = 7
6,046,545 UART: [ldev] FE.KEYID = 1
6,077,828 UART: [ldev] Erasing FE.KEYID = 1
8,577,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,544 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,343,204 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,363,401 UART: [ldev] --
10,367,965 UART: [fwproc] Wait for Commands...
10,370,282 UART: [fwproc] Recv command 0x46574c44
10,372,328 UART: [fwproc] Recv'd Img size: 114360 bytes
13,780,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,852,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,921,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,239,317 >>> mbox cmd response: success
14,243,905 UART: [afmc] ++
14,244,497 UART: [afmc] CDI.KEYID = 6
14,245,415 UART: [afmc] SUBJECT.KEYID = 7
14,246,597 UART: [afmc] AUTHORITY.KEYID = 5
16,778,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,540,958 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,578,462 UART: [afmc] --
18,581,364 UART: [cold-reset] --
18,584,844 UART: [state] Locking Datavault
18,590,084 UART: [state] Locking PCR0, PCR1 and PCR31
18,591,736 UART: [state] Locking ICCM
18,594,316 UART: [exit] Launching FMC @ 0x40000130
18,602,768 UART:
18,602,999 UART: Running Caliptra FMC ...
18,604,099 UART:
18,604,279 UART: [state] CFI Enabled
18,665,733 UART: [fht] FMC Alias Private Key: 7
20,429,689 UART: [art] Extend RT PCRs Done
20,430,903 UART: [art] Lock RT PCRs Done
20,432,791 UART: [art] Populate DV Done
20,438,153 UART: [fht] FMC Alias Private Key: 7
20,439,692 UART: [art] Derive CDI
20,440,504 UART: [art] Store in in slot 0x4
20,498,412 UART: [art] Derive Key Pair
20,499,452 UART: [art] Store priv key in slot 0x5
22,962,589 UART: [art] Derive Key Pair - Done
22,975,423 UART: [art] Signing Cert with AUTHO
22,976,759 UART: RITY.KEYID = 7
24,688,350 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,839 UART: [art] PUB.X = FEA0D30E91832D3F7ED3EDD8516564155BCEC073AD8A99610BBB34BFA2F3A7944BBAD03FA2121E618BFE7E0CFCFC178D
24,697,184 UART: [art] PUB.Y = 757B606164F7ED334E43DC24E4F414C68EEE9F83C5646FD1ACC85662E1BE5E810864BAAFE0A4DB1CB0AF5E2157D12F51
24,704,483 UART: [art] SIG.R = FA0ABAE9D70E06510A36C5B1A3F6DCE412F2EF49B03630EF7088002A27EA59C47C2D934A3CC35E27D8A42CB6F71A185D
24,711,876 UART: [art] SIG.S = 7B2920CD7BA8FD338F64B73850C188986EFB09190508B883F80552204107945A9CD556F042780253504D0C085EE88EEE
25,690,984 UART: Caliptra RT
25,691,705 UART: [state] CFI Enabled
25,856,228 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
5,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,400 UART:
192,779 UART: Running Caliptra ROM ...
193,936 UART:
194,087 UART: [state] CFI Enabled
264,154 UART: [state] LifecycleState = Unprovisioned
266,030 UART: [state] DebugLocked = No
268,122 UART: [state] WD Timer not started. Device not locked for debugging
272,718 UART: [kat] SHA2-256
451,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,429 UART: [kat] ++
463,964 UART: [kat] sha1
474,994 UART: [kat] SHA2-256
477,984 UART: [kat] SHA2-384
484,144 UART: [kat] SHA2-512-ACC
487,076 UART: [kat] ECC-384
2,949,783 UART: [kat] HMAC-384Kdf
2,971,475 UART: [kat] LMS
3,500,884 UART: [kat] --
3,506,785 UART: [cold-reset] ++
3,509,370 UART: [fht] FHT @ 0x50003400
3,520,944 UART: [idev] ++
3,521,544 UART: [idev] CDI.KEYID = 6
3,522,432 UART: [idev] SUBJECT.KEYID = 7
3,523,652 UART: [idev] UDS.KEYID = 0
3,544,359 UART: [idev] Erasing UDS.KEYID = 0
6,026,944 UART: [idev] Fuse KeyId
6,030,909 UART: [idev] --
6,035,064 UART: [ldev] ++
6,035,638 UART: [ldev] CDI.KEYID = 6
6,036,568 UART: [ldev] SUBJECT.KEYID = 5
6,037,734 UART: [ldev] AUTHORITY.KEYID = 7
6,038,969 UART: [ldev] FE.KEYID = 1
6,077,280 UART: [ldev] Erasing FE.KEYID = 1
8,580,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,581 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,364,416 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,384,491 UART: [ldev] --
10,389,648 UART: [fwproc] Wait for Commands...
10,392,130 UART: [fwproc] Recv command 0x46574c44
10,394,102 UART: [fwproc] Recv'd Img size: 114360 bytes
13,792,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,932,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,249,887 >>> mbox cmd response: success
14,253,655 UART: [afmc] ++
14,254,242 UART: [afmc] CDI.KEYID = 6
14,255,152 UART: [afmc] SUBJECT.KEYID = 7
14,256,366 UART: [afmc] AUTHORITY.KEYID = 5
16,783,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,540,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,578,554 UART: [afmc] --
18,582,478 UART: [cold-reset] --
18,584,235 UART: [state] Locking Datavault
18,589,373 UART: [state] Locking PCR0, PCR1 and PCR31
18,591,025 UART: [state] Locking ICCM
18,592,174 UART: [exit] Launching FMC @ 0x40000130
18,600,632 UART:
18,600,867 UART: Running Caliptra FMC ...
18,601,964 UART:
18,602,121 UART: [state] CFI Enabled
18,666,482 UART: [fht] FMC Alias Private Key: 7
20,431,094 UART: [art] Extend RT PCRs Done
20,432,321 UART: [art] Lock RT PCRs Done
20,433,971 UART: [art] Populate DV Done
20,439,273 UART: [fht] FMC Alias Private Key: 7
20,440,863 UART: [art] Derive CDI
20,441,675 UART: [art] Store in in slot 0x4
20,498,933 UART: [art] Derive Key Pair
20,499,971 UART: [art] Store priv key in slot 0x5
22,962,833 UART: [art] Derive Key Pair - Done
22,975,781 UART: [art] Signing Cert with AUTHO
22,977,111 UART: RITY.KEYID = 7
24,689,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,605 UART: [art] PUB.X = 300E28A43E5D4E960B8E4551CCE66287F6B6538AFDBFEF7A9C2570EC49EA80310649F0B1DA3E413E8C33E8D2DD06CE6D
24,697,901 UART: [art] PUB.Y = 9F169826108EF658F1512868E548A2425AB15975858C62595F01A3DD59A53C1E86D64124F769F1C101EAFBC19F42AAA2
24,705,189 UART: [art] SIG.R = E63E05C2395B1FDB051DAFA6271F20C2772387EFBD20F39B3D300E4CA95CCCB6FA5DDC9A464CEBD21D1CFCDF04EACBF3
24,712,608 UART: [art] SIG.S = 56BB4DE393505097D2BEF03E4A0AD919B9F36C7A929ECEA3A23D105FAB7D00EF4DDD78CC26C72500A5A223564C94F05D
25,691,706 UART: Caliptra RT
25,692,408 UART: [state] CFI Enabled
25,857,112 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
Truncated 9072 bytes from beginning
18,619,151 UART: [state] Locking Datavault
18,624,180 UART: [state] Locking PCR0, PCR1 and PCR31
18,625,865 UART: [state] Locking ICCM
18,627,835 UART: [exit] Launching FMC @ 0x40000130
18,636,232 UART:
18,636,464 UART: Running Caliptra FMC ...
18,637,565 UART:
18,637,726 UART: [state] CFI Enabled
18,696,960 UART: [fht] FMC Alias Private Key: 7
20,461,702 UART: [art] Extend RT PCRs Done
20,462,928 UART: [art] Lock RT PCRs Done
20,464,467 UART: [art] Populate DV Done
20,469,934 UART: [fht] FMC Alias Private Key: 7
20,471,419 UART: [art] Derive CDI
20,472,182 UART: [art] Store in in slot 0x4
20,529,771 UART: [art] Derive Key Pair
20,530,814 UART: [art] Store priv key in slot 0x5
22,994,313 UART: [art] Derive Key Pair - Done
23,007,047 UART: [art] Signing Cert with AUTHO
23,008,370 UART: RITY.KEYID = 7
24,719,645 UART: [art] Erasing AUTHORITY.KEYID = 7
24,721,314 UART: [art] PUB.X = 9DF157BC5AFE3870CFB2CC250DCB31FEAC7E2D6C7C2AB6989409A2EAE2485F1A8DB5AC9BAABABFEB4D5B1DAA3EAA57E2
24,728,493 UART: [art] PUB.Y = AEF033C081C6D5CEC947B992AFBC12FDB13459645A1AEAD9E56EF01DC35A0923DF8945CF239A3025E811ABC6532D9A63
24,735,734 UART: [art] SIG.R = 81C444C45762BFAFF2185373521779AE50E9FD0B8E73CF67A13D07D758C3491EB6DD3F7230558BB1A2662A8443C998D1
24,743,130 UART: [art] SIG.S = EA16EDC5B8D93BAC376A8B784CFD78277EB0E8B542F3D0769383642AFE513A936086618659A6327DD01D77CC741EAA5C
25,722,461 UART: Caliptra RT
25,723,192 UART: [state] CFI Enabled
25,887,307 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
4,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,023 UART:
192,431 UART: Running Caliptra ROM ...
193,643 UART:
193,802 UART: [state] CFI Enabled
263,471 UART: [state] LifecycleState = Unprovisioned
265,397 UART: [state] DebugLocked = No
266,889 UART: [state] WD Timer not started. Device not locked for debugging
271,052 UART: [kat] SHA2-256
450,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,726 UART: [kat] ++
462,169 UART: [kat] sha1
472,234 UART: [kat] SHA2-256
475,235 UART: [kat] SHA2-384
482,829 UART: [kat] SHA2-512-ACC
485,769 UART: [kat] ECC-384
2,950,665 UART: [kat] HMAC-384Kdf
2,973,034 UART: [kat] LMS
3,502,481 UART: [kat] --
3,505,803 UART: [cold-reset] ++
3,507,635 UART: [fht] FHT @ 0x50003400
3,520,289 UART: [idev] ++
3,520,856 UART: [idev] CDI.KEYID = 6
3,521,769 UART: [idev] SUBJECT.KEYID = 7
3,522,985 UART: [idev] UDS.KEYID = 0
3,545,169 UART: [idev] Erasing UDS.KEYID = 0
6,026,539 UART: [idev] Sha384 KeyId Algorithm
6,035,432 UART: [idev] --
6,039,311 UART: [ldev] ++
6,039,881 UART: [ldev] CDI.KEYID = 6
6,040,765 UART: [ldev] SUBJECT.KEYID = 5
6,041,981 UART: [ldev] AUTHORITY.KEYID = 7
6,043,216 UART: [ldev] FE.KEYID = 1
6,079,313 UART: [ldev] Erasing FE.KEYID = 1
8,584,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,455 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,367,278 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,388,884 UART: [ldev] --
10,393,503 UART: [fwproc] Wait for Commands...
10,395,822 UART: [fwproc] Recv command 0x46574c44
10,397,921 UART: [fwproc] Recv'd Img size: 114360 bytes
13,800,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,258,461 >>> mbox cmd response: success
14,262,536 UART: [afmc] ++
14,263,135 UART: [afmc] CDI.KEYID = 6
14,264,044 UART: [afmc] SUBJECT.KEYID = 7
14,265,210 UART: [afmc] AUTHORITY.KEYID = 5
16,791,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,513,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,515,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,531,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,547,582 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,563,496 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,584,695 UART: [afmc] --
18,588,348 UART: [cold-reset] --
18,590,965 UART: [state] Locking Datavault
18,595,562 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,207 UART: [state] Locking ICCM
18,599,191 UART: [exit] Launching FMC @ 0x40000130
18,607,596 UART:
18,607,874 UART: Running Caliptra FMC ...
18,608,988 UART:
18,609,156 UART: [state] CFI Enabled
18,670,995 UART: [fht] FMC Alias Private Key: 7
20,435,639 UART: [art] Extend RT PCRs Done
20,436,850 UART: [art] Lock RT PCRs Done
20,438,518 UART: [art] Populate DV Done
20,444,042 UART: [fht] FMC Alias Private Key: 7
20,445,559 UART: [art] Derive CDI
20,446,302 UART: [art] Store in in slot 0x4
20,504,100 UART: [art] Derive Key Pair
20,505,092 UART: [art] Store priv key in slot 0x5
22,968,211 UART: [art] Derive Key Pair - Done
22,981,097 UART: [art] Signing Cert with AUTHO
22,982,404 UART: RITY.KEYID = 7
24,694,186 UART: [art] Erasing AUTHORITY.KEYID = 7
24,695,702 UART: [art] PUB.X = 791B9B3DC1C8B39BC518B8C0F42D9D4A9E0863410DF550AAEE4F67E0600F1F828D6BCD3A7FFC2A7187A545774C3B8989
24,702,951 UART: [art] PUB.Y = A8BCA0A71B1193E8385CC06A5C2EB105EDB585FA6D3B1D8AE0B132152C82AFE912000931BEA42FC81801F72062C4AB0A
24,710,243 UART: [art] SIG.R = 6305A61798462C4ABD40F261FB107D6F1CABF46A9A7082282E500E00D61F73983F466EB4B81AF5AF704E4E9444A9F66F
24,717,596 UART: [art] SIG.S = 148F713940FACCE547A46008B2360813B705A7946660D3446DD37BB5B33A9A40055754F52E3765FC1F014CE8B601EDA7
25,696,511 UART: Caliptra RT
25,697,218 UART: [state] CFI Enabled
25,860,944 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
4,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
191,996 UART:
192,374 UART: Running Caliptra ROM ...
193,450 UART:
193,591 UART: [state] CFI Enabled
263,614 UART: [state] LifecycleState = Unprovisioned
265,508 UART: [state] DebugLocked = No
268,359 UART: [state] WD Timer not started. Device not locked for debugging
271,381 UART: [kat] SHA2-256
450,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,103 UART: [kat] ++
462,634 UART: [kat] sha1
474,812 UART: [kat] SHA2-256
477,820 UART: [kat] SHA2-384
484,931 UART: [kat] SHA2-512-ACC
487,882 UART: [kat] ECC-384
2,948,733 UART: [kat] HMAC-384Kdf
2,970,377 UART: [kat] LMS
3,499,848 UART: [kat] --
3,504,108 UART: [cold-reset] ++
3,506,198 UART: [fht] FHT @ 0x50003400
3,516,206 UART: [idev] ++
3,516,777 UART: [idev] CDI.KEYID = 6
3,517,658 UART: [idev] SUBJECT.KEYID = 7
3,518,875 UART: [idev] UDS.KEYID = 0
3,542,140 UART: [idev] Erasing UDS.KEYID = 0
6,021,939 UART: [idev] Fuse KeyId
6,025,909 UART: [idev] --
6,029,201 UART: [ldev] ++
6,029,777 UART: [ldev] CDI.KEYID = 6
6,030,663 UART: [ldev] SUBJECT.KEYID = 5
6,031,845 UART: [ldev] AUTHORITY.KEYID = 7
6,033,139 UART: [ldev] FE.KEYID = 1
6,076,893 UART: [ldev] Erasing FE.KEYID = 1
8,580,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,956 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,365,782 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,385,219 UART: [ldev] --
10,390,539 UART: [fwproc] Wait for Commands...
10,392,588 UART: [fwproc] Recv command 0x46574c44
10,394,689 UART: [fwproc] Recv'd Img size: 114360 bytes
13,801,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,873,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,942,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,260,886 >>> mbox cmd response: success
14,265,352 UART: [afmc] ++
14,265,947 UART: [afmc] CDI.KEYID = 6
14,266,829 UART: [afmc] SUBJECT.KEYID = 7
14,267,928 UART: [afmc] AUTHORITY.KEYID = 5
16,804,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,790 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,563 UART: [afmc] --
18,605,523 UART: [cold-reset] --
18,609,016 UART: [state] Locking Datavault
18,613,625 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,334 UART: [state] Locking ICCM
18,616,784 UART: [exit] Launching FMC @ 0x40000130
18,625,200 UART:
18,625,444 UART: Running Caliptra FMC ...
18,626,548 UART:
18,626,708 UART: [state] CFI Enabled
18,686,538 UART: [fht] FMC Alias Private Key: 7
20,450,433 UART: [art] Extend RT PCRs Done
20,451,642 UART: [art] Lock RT PCRs Done
20,453,127 UART: [art] Populate DV Done
20,458,533 UART: [fht] FMC Alias Private Key: 7
20,460,129 UART: [art] Derive CDI
20,460,864 UART: [art] Store in in slot 0x4
20,518,612 UART: [art] Derive Key Pair
20,519,679 UART: [art] Store priv key in slot 0x5
22,982,785 UART: [art] Derive Key Pair - Done
22,996,207 UART: [art] Signing Cert with AUTHO
22,997,542 UART: RITY.KEYID = 7
24,708,453 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,951 UART: [art] PUB.X = 93CE75D62D51E5D0E4C7928618E3795E1A65348A1B354EC93455F520FB7C65DFE6EBE0073AC4E144FC6C270F0F7EF7F1
24,717,265 UART: [art] PUB.Y = 326A3FA4F629F9EA2778027EC1C0BAAA7FC599A187D4099576956399873EA7435F61D020C57844015CD6937E3B193A1D
24,724,499 UART: [art] SIG.R = A12ADA98643D3527D96B6BE08A5A71E61642506219460E0F9F768DBA45C3CFFBA0038A57C9D9E3E71B69772D6FB9087C
24,731,888 UART: [art] SIG.S = 59CE34709E10E18020908F33B1DB30A703D2E814945019108A8C9B69770EEC8CC699DA25770AE9D3D2C1D4E5D798661C
25,711,008 UART: Caliptra RT
25,711,715 UART: [state] CFI Enabled
25,876,739 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
5,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,081,563 >>> mbox cmd response: success
18,379,753 UART:
18,380,261 UART: Running Caliptra FMC ...
18,381,369 UART:
18,381,525 UART: [state] CFI Enabled
18,445,455 UART: [fht] FMC Alias Private Key: 7
20,209,959 UART: [art] Extend RT PCRs Done
20,211,191 UART: [art] Lock RT PCRs Done
20,212,957 UART: [art] Populate DV Done
20,218,333 UART: [fht] FMC Alias Private Key: 7
20,219,871 UART: [art] Derive CDI
20,220,603 UART: [art] Store in in slot 0x4
20,278,233 UART: [art] Derive Key Pair
20,279,275 UART: [art] Store priv key in slot 0x5
22,742,502 UART: [art] Derive Key Pair - Done
22,755,070 UART: [art] Signing Cert with AUTHO
22,756,380 UART: RITY.KEYID = 7
24,468,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,470,355 UART: [art] PUB.X = 9DED0852BFEE47D531F69253B4757CDB80923C9BC63F99A7F633675622D10F348AC3EE8CCB0015DE997DDABCA8641863
24,477,608 UART: [art] PUB.Y = 1416BBAF1B371B75777A91909528DF490702884C4795B857AE78A49D06A73C299C31CE681E4F7E77A6C41A376D6ADDD6
24,484,873 UART: [art] SIG.R = 98ACBBB36227721C314F00E139EF4F5299936B264160E76642BDE155CD153C90D9334896949B652764E182BF64FB68F7
24,492,208 UART: [art] SIG.S = 3AC5D64DD3656BB8B8BA6E37B3F3734510A67A68270627D8DAEF33C58096DA6AE774098A1DE81B05FA8B3D3EFF58BCF1
25,470,828 UART: Caliptra RT
25,471,544 UART: [state] CFI Enabled
25,636,425 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
4,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,038,886 >>> mbox cmd response: success
18,322,291 UART:
18,322,707 UART: Running Caliptra FMC ...
18,323,848 UART:
18,324,014 UART: [state] CFI Enabled
18,388,214 UART: [fht] FMC Alias Private Key: 7
20,151,953 UART: [art] Extend RT PCRs Done
20,153,160 UART: [art] Lock RT PCRs Done
20,154,833 UART: [art] Populate DV Done
20,160,502 UART: [fht] FMC Alias Private Key: 7
20,162,170 UART: [art] Derive CDI
20,162,988 UART: [art] Store in in slot 0x4
20,220,579 UART: [art] Derive Key Pair
20,221,648 UART: [art] Store priv key in slot 0x5
22,684,719 UART: [art] Derive Key Pair - Done
22,697,767 UART: [art] Signing Cert with AUTHO
22,699,065 UART: RITY.KEYID = 7
24,410,371 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,873 UART: [art] PUB.X = 7EEEFFB1C3D898D15FD4E608ACF4A6B228B02ECE890300F2C113B5F5A294AD18406008C1CDBD03CE20744D7035677E81
24,419,176 UART: [art] PUB.Y = 7D3331DEE10D3F54747A6E176D1AE509E0255A3E06F8F3AB29B82F09B4C6CFF645ECE80D6C20497880FD315D30B111F3
24,426,395 UART: [art] SIG.R = 4665E5269137A03081373BD331DEA5FC2B0853D52BC8AE95A0D91655BF00958975252BDB2A427D8CF4A93BD01FB9CD47
24,433,786 UART: [art] SIG.S = F1372C40B6A54AC86EB407BEE4E8541D51A7E926F135E1500B4D20A0D4A40BB4B6A83F5A408E4F62283B6AF31BBE572C
25,412,557 UART: Caliptra RT
25,413,263 UART: [state] CFI Enabled
25,577,733 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,065 writing to cptra_bootfsm_go
6,321 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,067,589 >>> mbox cmd response: success
18,362,709 UART:
18,363,098 UART: Running Caliptra FMC ...
18,364,365 UART:
18,364,540 UART: [state] CFI Enabled
18,435,390 UART: [fht] FMC Alias Private Key: 7
20,198,472 UART: [art] Extend RT PCRs Done
20,199,701 UART: [art] Lock RT PCRs Done
20,201,381 UART: [art] Populate DV Done
20,206,957 UART: [fht] FMC Alias Private Key: 7
20,208,501 UART: [art] Derive CDI
20,209,260 UART: [art] Store in in slot 0x4
20,267,903 UART: [art] Derive Key Pair
20,268,941 UART: [art] Store priv key in slot 0x5
22,731,673 UART: [art] Derive Key Pair - Done
22,744,563 UART: [art] Signing Cert with AUTHO
22,745,869 UART: RITY.KEYID = 7
24,457,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,326 UART: [art] PUB.X = 6A64FB453F9CEB4367797A322ECC02659DC6D17C1C95D77FE8565D1BD4FEC46BF5EA13BE25034C8789411934341AC2D5
24,466,601 UART: [art] PUB.Y = 9904D0C17ED2D7AE5FD3A89D33EA658A1AC0CD4833A7EC71A9702FD401FA642EC5F0C5227425F14F90AA99ED2875BF0A
24,473,814 UART: [art] SIG.R = FF8CD1DD7A78FE8FBA626D1A52061B8D9271BF8820AB0AEBE2B2D1373ACCBFB6F69EC669B873D6FBC9EBF7AD3C0681E8
24,481,404 UART: [art] SIG.S = 7FE74B553C94FFCF0F2B8611223EFE3E182D28BB382AE890B6386F045D684009E036A02F0006EA6C8025D8B8ACB78AF5
25,460,694 UART: Caliptra RT
25,461,387 UART: [state] CFI Enabled
25,625,833 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,042,675 >>> mbox cmd response: success
18,339,805 UART:
18,340,214 UART: Running Caliptra FMC ...
18,341,374 UART:
18,341,534 UART: [state] CFI Enabled
18,406,460 UART: [fht] FMC Alias Private Key: 7
20,169,906 UART: [art] Extend RT PCRs Done
20,171,137 UART: [art] Lock RT PCRs Done
20,172,556 UART: [art] Populate DV Done
20,177,901 UART: [fht] FMC Alias Private Key: 7
20,179,499 UART: [art] Derive CDI
20,180,247 UART: [art] Store in in slot 0x4
20,238,537 UART: [art] Derive Key Pair
20,239,605 UART: [art] Store priv key in slot 0x5
22,702,756 UART: [art] Derive Key Pair - Done
22,715,756 UART: [art] Signing Cert with AUTHO
22,717,089 UART: RITY.KEYID = 7
24,428,780 UART: [art] Erasing AUTHORITY.KEYID = 7
24,430,287 UART: [art] PUB.X = A5D7EFDAF80CF256550720A22B0403B7F9D09B7AEDD2388800261BC9E91B83C9FF9BB6FC47F4FA8647FFF8FE9BBA9610
24,437,590 UART: [art] PUB.Y = 226556C267F2625E18939F22307D815EC4602A300E489A14D716875F0B818083D758B16AADA5AB4C7D7113C94BA477FE
24,444,860 UART: [art] SIG.R = 3DFF62D7EC2D187187337DA3950A39D777B77AF29166B3BB96692B6E1E554ABF4133BD71A79BBC70360E6A47C024C1B8
24,452,203 UART: [art] SIG.S = 57CEDFF72C750A1909FBD9C37C7C8CFA6803C1766ED751072E1DDF3436910B288ACA0F323DEA61F8D1E6F12D3B180386
25,431,362 UART: Caliptra RT
25,432,080 UART: [state] CFI Enabled
25,596,949 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,782,292 UART: [state] Locking Datavault
18,788,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,467 UART: [state] Locking ICCM
18,792,192 UART: [exit] Launching FMC @ 0x40000130
18,800,588 UART:
18,800,832 UART: Running Caliptra FMC ...
18,801,930 UART:
18,802,092 UART: [state] CFI Enabled
18,810,359 UART: [fht] FMC Alias Private Key: 7
20,567,552 UART: [art] Extend RT PCRs Done
20,568,770 UART: [art] Lock RT PCRs Done
20,570,389 UART: [art] Populate DV Done
20,575,686 UART: [fht] FMC Alias Private Key: 7
20,577,273 UART: [art] Derive CDI
20,578,086 UART: [art] Store in in slot 0x4
20,620,945 UART: [art] Derive Key Pair
20,621,941 UART: [art] Store priv key in slot 0x5
23,048,780 UART: [art] Derive Key Pair - Done
23,062,055 UART: [art] Signing Cert with AUTHO
23,063,414 UART: RITY.KEYID = 7
24,769,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,770,593 UART: [art] PUB.X = F8FB3037BAD2CE0992E4227B1DE751F8DCC045C2E9406CDC622794775BC231CD60CF103B94BF1527BC1282B8648F0B74
24,777,848 UART: [art] PUB.Y = D669F269CFBB4F6B7E359CE30C1BB9BFA5DF23845A34F3F7E3FED921B2B22D1754A491888988CE5D9BFDC77E44A20F9F
24,785,133 UART: [art] SIG.R = FA54AD4355C423A49B7343760FAEFFB6CDFF79464AC6611AD5C440737284E4769DF3F399CB40FEB3AAF3DE559ECC5630
24,792,549 UART: [art] SIG.S = 5FFC894DD15A998B2ECAF520D29F73764B1350494379747BCD910EF658736346A651447A43F9B0B2A487B83EC0A8E0BC
25,771,641 UART: Caliptra RT
25,772,374 UART: [state] CFI Enabled
25,889,430 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
5,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,302 UART:
192,705 UART: Running Caliptra ROM ...
193,819 UART:
603,369 UART: [state] CFI Enabled
615,847 UART: [state] LifecycleState = Unprovisioned
617,682 UART: [state] DebugLocked = No
619,480 UART: [state] WD Timer not started. Device not locked for debugging
622,380 UART: [kat] SHA2-256
801,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,058 UART: [kat] ++
813,604 UART: [kat] sha1
825,242 UART: [kat] SHA2-256
828,283 UART: [kat] SHA2-384
834,538 UART: [kat] SHA2-512-ACC
837,471 UART: [kat] ECC-384
3,277,208 UART: [kat] HMAC-384Kdf
3,289,777 UART: [kat] LMS
3,819,296 UART: [kat] --
3,823,787 UART: [cold-reset] ++
3,825,991 UART: [fht] FHT @ 0x50003400
3,836,586 UART: [idev] ++
3,837,145 UART: [idev] CDI.KEYID = 6
3,838,050 UART: [idev] SUBJECT.KEYID = 7
3,839,264 UART: [idev] UDS.KEYID = 0
3,856,152 UART: [idev] Erasing UDS.KEYID = 0
6,312,028 UART: [idev] Sha384 KeyId Algorithm
6,321,829 UART: [idev] --
6,326,627 UART: [ldev] ++
6,327,193 UART: [ldev] CDI.KEYID = 6
6,328,073 UART: [ldev] SUBJECT.KEYID = 5
6,329,285 UART: [ldev] AUTHORITY.KEYID = 7
6,330,510 UART: [ldev] FE.KEYID = 1
6,341,387 UART: [ldev] Erasing FE.KEYID = 1
8,811,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,530,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,546,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,562,113 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,577,926 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,598,368 UART: [ldev] --
10,603,376 UART: [fwproc] Wait for Commands...
10,605,901 UART: [fwproc] Recv command 0x46574c44
10,607,991 UART: [fwproc] Recv'd Img size: 114360 bytes
14,014,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,473,396 >>> mbox cmd response: success
14,477,181 UART: [afmc] ++
14,477,775 UART: [afmc] CDI.KEYID = 6
14,478,703 UART: [afmc] SUBJECT.KEYID = 7
14,479,864 UART: [afmc] AUTHORITY.KEYID = 5
16,978,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,700,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,718,581 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,734,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,773,704 UART: [afmc] --
18,777,300 UART: [cold-reset] --
18,781,758 UART: [state] Locking Datavault
18,787,533 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,226 UART: [state] Locking ICCM
18,791,694 UART: [exit] Launching FMC @ 0x40000130
18,800,139 UART:
18,800,380 UART: Running Caliptra FMC ...
18,801,495 UART:
18,801,656 UART: [state] CFI Enabled
18,809,704 UART: [fht] FMC Alias Private Key: 7
20,566,128 UART: [art] Extend RT PCRs Done
20,567,342 UART: [art] Lock RT PCRs Done
20,568,910 UART: [art] Populate DV Done
20,574,482 UART: [fht] FMC Alias Private Key: 7
20,576,014 UART: [art] Derive CDI
20,576,826 UART: [art] Store in in slot 0x4
20,619,205 UART: [art] Derive Key Pair
20,620,237 UART: [art] Store priv key in slot 0x5
23,046,902 UART: [art] Derive Key Pair - Done
23,060,280 UART: [art] Signing Cert with AUTHO
23,061,584 UART: RITY.KEYID = 7
24,766,938 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,441 UART: [art] PUB.X = 3CDB32F67215C51560B05BE3E46BCADECA1670FDC93606A2316EFC85B9B478EAA2CB84423B5AB78FF743AA7DE9D19FDE
24,775,767 UART: [art] PUB.Y = 84E22BD108E2B7DFAA736288B8A534C83D61F4A9317188A2F9DA44D2DF6CD9D19D1CB9E688167C5C893B1E34FB26776B
24,783,055 UART: [art] SIG.R = B9E0682EB685F37ED44C5F1331E269645E5C19B97CE737AD074BBFC6E548123B1DE113A3D59A0828793E2098A3A944EB
24,790,446 UART: [art] SIG.S = C9C708FBCA5CE57612B8EDCD3BC15886BAD0A23EE88A9B35182B6893C6CB1BE4888E1F959D32F4D720CBAE2F2179710F
25,769,198 UART: Caliptra RT
25,769,889 UART: [state] CFI Enabled
25,886,421 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
7,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,419 UART:
192,778 UART: Running Caliptra ROM ...
193,861 UART:
603,454 UART: [state] CFI Enabled
617,242 UART: [state] LifecycleState = Unprovisioned
619,148 UART: [state] DebugLocked = No
621,468 UART: [state] WD Timer not started. Device not locked for debugging
624,475 UART: [kat] SHA2-256
803,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,161 UART: [kat] ++
815,622 UART: [kat] sha1
826,552 UART: [kat] SHA2-256
829,611 UART: [kat] SHA2-384
835,815 UART: [kat] SHA2-512-ACC
838,794 UART: [kat] ECC-384
3,281,632 UART: [kat] HMAC-384Kdf
3,293,211 UART: [kat] LMS
3,822,721 UART: [kat] --
3,828,703 UART: [cold-reset] ++
3,829,821 UART: [fht] FHT @ 0x50003400
3,841,602 UART: [idev] ++
3,842,171 UART: [idev] CDI.KEYID = 6
3,843,078 UART: [idev] SUBJECT.KEYID = 7
3,844,291 UART: [idev] UDS.KEYID = 0
3,860,064 UART: [idev] Erasing UDS.KEYID = 0
6,316,530 UART: [idev] Fuse KeyId
6,320,545 UART: [idev] --
6,325,455 UART: [ldev] ++
6,326,058 UART: [ldev] CDI.KEYID = 6
6,326,965 UART: [ldev] SUBJECT.KEYID = 5
6,328,069 UART: [ldev] AUTHORITY.KEYID = 7
6,329,363 UART: [ldev] FE.KEYID = 1
6,341,980 UART: [ldev] Erasing FE.KEYID = 1
8,816,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,049 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,583,843 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,604,207 UART: [ldev] --
10,608,058 UART: [fwproc] Wait for Commands...
10,610,634 UART: [fwproc] Recv command 0x46574c44
10,612,727 UART: [fwproc] Recv'd Img size: 114360 bytes
14,013,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,089,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,475,830 >>> mbox cmd response: success
14,479,919 UART: [afmc] ++
14,480,501 UART: [afmc] CDI.KEYID = 6
14,481,413 UART: [afmc] SUBJECT.KEYID = 7
14,482,633 UART: [afmc] AUTHORITY.KEYID = 5
16,986,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,593 UART: [afmc] --
18,781,974 UART: [cold-reset] --
18,785,938 UART: [state] Locking Datavault
18,792,201 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,843 UART: [state] Locking ICCM
18,795,360 UART: [exit] Launching FMC @ 0x40000130
18,803,808 UART:
18,804,041 UART: Running Caliptra FMC ...
18,805,358 UART:
18,805,525 UART: [state] CFI Enabled
18,813,466 UART: [fht] FMC Alias Private Key: 7
20,570,595 UART: [art] Extend RT PCRs Done
20,571,803 UART: [art] Lock RT PCRs Done
20,573,367 UART: [art] Populate DV Done
20,579,040 UART: [fht] FMC Alias Private Key: 7
20,580,689 UART: [art] Derive CDI
20,581,499 UART: [art] Store in in slot 0x4
20,623,543 UART: [art] Derive Key Pair
20,624,537 UART: [art] Store priv key in slot 0x5
23,051,486 UART: [art] Derive Key Pair - Done
23,064,273 UART: [art] Signing Cert with AUTHO
23,065,593 UART: RITY.KEYID = 7
24,770,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,402 UART: [art] PUB.X = 96A5FC0CB6B3B7EB559D37663A493F759865B3F7DE40CFC51DFDF46ABE39CCE80A74E40E3571D6E608C7D9DA70F14D32
24,779,706 UART: [art] PUB.Y = 3655D3E4F24AFBC9AFCCECD56797E883F14A55B513A564B084495BD4F7C469DB61310F7D48A4565A200BB1DFFAF5E235
24,787,041 UART: [art] SIG.R = ECD62227F1B62D040959709A80B1CD18C74A97A0C60E312B704F749AE206908DDDD4B0C21D75021BA3D82F3163761AE2
24,794,384 UART: [art] SIG.S = 7CF691E909EEBB5CBB49417010513265B8C99AEC4DBB4B6D4CD7AA6CDA3C68EE13F48FA69AAA65B70853FFEEBCDB7487
25,773,044 UART: Caliptra RT
25,773,757 UART: [state] CFI Enabled
25,891,737 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
5,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,278,601 >>> mbox cmd response: success
18,527,105 UART:
18,527,515 UART: Running Caliptra FMC ...
18,528,730 UART:
18,528,908 UART: [state] CFI Enabled
18,536,835 UART: [fht] FMC Alias Private Key: 7
20,294,153 UART: [art] Extend RT PCRs Done
20,295,380 UART: [art] Lock RT PCRs Done
20,297,218 UART: [art] Populate DV Done
20,302,963 UART: [fht] FMC Alias Private Key: 7
20,304,500 UART: [art] Derive CDI
20,305,316 UART: [art] Store in in slot 0x4
20,347,753 UART: [art] Derive Key Pair
20,348,753 UART: [art] Store priv key in slot 0x5
22,775,724 UART: [art] Derive Key Pair - Done
22,788,726 UART: [art] Signing Cert with AUTHO
22,790,022 UART: RITY.KEYID = 7
24,495,265 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,772 UART: [art] PUB.X = 65147DD673582CA2E3A379EEA083722E13832C9E20AD2917BD50B4BA0B56553E54E592C77A0E8392AA72436F9B10B582
24,504,037 UART: [art] PUB.Y = 50587D8C3B1771F358674CA789CB26A82CD79ACB1A7B09EF870871CE1D92DB436BCFED25CE1A423E2736BAC2BD521F90
24,511,289 UART: [art] SIG.R = 2E1F68468BED23B23B136A839687D1ACDB197CD128EAA9B117BEEB173B4CE4106CF065DE318778B514563256DAB03A60
24,518,679 UART: [art] SIG.S = 1F1378D583BB7683E4FC44A19639B9CA378BD6EB2FCD1E7673DF97E92CD987194D6B965C7DB1DB57B98BC71AB1C94B3E
25,497,295 UART: Caliptra RT
25,497,997 UART: [state] CFI Enabled
25,614,897 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
5,297 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,260,856 >>> mbox cmd response: success
18,508,881 UART:
18,509,273 UART: Running Caliptra FMC ...
18,510,429 UART:
18,510,580 UART: [state] CFI Enabled
18,518,261 UART: [fht] FMC Alias Private Key: 7
20,275,588 UART: [art] Extend RT PCRs Done
20,276,827 UART: [art] Lock RT PCRs Done
20,278,643 UART: [art] Populate DV Done
20,283,967 UART: [fht] FMC Alias Private Key: 7
20,285,608 UART: [art] Derive CDI
20,286,452 UART: [art] Store in in slot 0x4
20,329,270 UART: [art] Derive Key Pair
20,330,273 UART: [art] Store priv key in slot 0x5
22,756,687 UART: [art] Derive Key Pair - Done
22,769,348 UART: [art] Signing Cert with AUTHO
22,770,688 UART: RITY.KEYID = 7
24,475,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,331 UART: [art] PUB.X = 473FB16EB90F557AC2B9AC0F5BD0D17720AD33B2D568ABE029FD89C990429FE9B6461C67ED43E0B4C0BC587723E60A5D
24,484,634 UART: [art] PUB.Y = B1BD7B795382F37CFA46584878A3B0831863BD89919CA0D4932EFAFBA294EE15FC6B61CE4835CD9D97DE79788EBC9F0B
24,491,877 UART: [art] SIG.R = 44829EC320F1CFDC81DDFE6CCDD9BBD36B246BCA6C6CF04B4AB8882EDD6627FE742964AD9E67BA872C2919D4FD385FF5
24,499,320 UART: [art] SIG.S = BF59B024ECB9FC1ECA44809B7DB9A93CB94F4A1DCCB94EA6BF608568D31DC6E31CCDD69B9F2D7FFD3C2DF508A414C64C
25,477,062 UART: Caliptra RT
25,477,757 UART: [state] CFI Enabled
25,594,616 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,620 writing to cptra_bootfsm_go
6,245 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,254,182 >>> mbox cmd response: success
18,497,618 UART:
18,498,010 UART: Running Caliptra FMC ...
18,499,243 UART:
18,499,434 UART: [state] CFI Enabled
18,507,262 UART: [fht] FMC Alias Private Key: 7
20,264,101 UART: [art] Extend RT PCRs Done
20,265,329 UART: [art] Lock RT PCRs Done
20,266,902 UART: [art] Populate DV Done
20,272,195 UART: [fht] FMC Alias Private Key: 7
20,273,739 UART: [art] Derive CDI
20,274,554 UART: [art] Store in in slot 0x4
20,316,828 UART: [art] Derive Key Pair
20,317,872 UART: [art] Store priv key in slot 0x5
22,744,921 UART: [art] Derive Key Pair - Done
22,757,919 UART: [art] Signing Cert with AUTHO
22,759,222 UART: RITY.KEYID = 7
24,464,572 UART: [art] Erasing AUTHORITY.KEYID = 7
24,466,081 UART: [art] PUB.X = E2844031D2224857698A850A9F90BA8F8539229EEEB74DFAFE71D32B4F94114CED707B9D3A4C31AF4635FC3823BC7E0E
24,473,324 UART: [art] PUB.Y = FDC86654C865B79C8A9F3ADF2B38E493FF76BCBF84ABA68DE80A2CC656B68CCCEE821713F3713D88D61BE85CDF310621
24,480,651 UART: [art] SIG.R = 2904C5C1B91AB2EB0ABAEB3ECC1A9542873FC9BE50D179E8CAAC397EF92CA3EBD599DC208D2833C3368AFDEA2491562B
24,488,044 UART: [art] SIG.S = D4B3B9F30B2D3ED0F81181208A42F76840312A9178793550828B8CD2996399844FA3DA414B4A1A5132065B81D4E221B5
25,466,659 UART: Caliptra RT
25,467,371 UART: [state] CFI Enabled
25,584,343 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
5,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,252,774 >>> mbox cmd response: success
18,507,167 UART:
18,507,562 UART: Running Caliptra FMC ...
18,508,699 UART:
18,508,858 UART: [state] CFI Enabled
18,517,063 UART: [fht] FMC Alias Private Key: 7
20,273,872 UART: [art] Extend RT PCRs Done
20,275,093 UART: [art] Lock RT PCRs Done
20,277,080 UART: [art] Populate DV Done
20,282,383 UART: [fht] FMC Alias Private Key: 7
20,283,917 UART: [art] Derive CDI
20,284,647 UART: [art] Store in in slot 0x4
20,327,126 UART: [art] Derive Key Pair
20,328,119 UART: [art] Store priv key in slot 0x5
22,754,651 UART: [art] Derive Key Pair - Done
22,767,533 UART: [art] Signing Cert with AUTHO
22,768,833 UART: RITY.KEYID = 7
24,474,623 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,137 UART: [art] PUB.X = E6A5E0316EE5B5779C384EDC5303F1820ADFB689A2117D8F8A4C6A84BE89008F25E18828FFE61D6D1DD0E79317D025AB
24,483,386 UART: [art] PUB.Y = BB1365F95A5E27955E38533211D3337D6066E46D6E89C15C0BF00CF7AD064369065F9273EC86700CFCB388A5C36762C6
24,490,647 UART: [art] SIG.R = D63EAD565EBFC1B94199D7985C18787F95B8FA8521EC92018549F160947B37FCBC0BF3AB611C11E3B4FC0994487F4667
24,498,079 UART: [art] SIG.S = A92C82482FD7496E88EF2D64BD7F50077BAAC10D61D05507184303F683C683A228672622FD399799376A09E77861B874
25,476,890 UART: Caliptra RT
25,477,579 UART: [state] CFI Enabled
25,595,202 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,322 UART: [afmc] --
2,847,312 UART: [cold-reset] --
2,848,042 UART: [state] Locking Datavault
2,849,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,729 UART: [state] Locking ICCM
2,850,241 UART: [exit] Launching FMC @ 0x40000130
2,855,570 UART:
2,855,586 UART: Running Caliptra FMC ...
2,855,994 UART:
2,856,048 UART: [state] CFI Enabled
2,866,489 UART: [fht] FMC Alias Private Key: 7
2,973,900 UART: [art] Extend RT PCRs Done
2,974,328 UART: [art] Lock RT PCRs Done
2,975,658 UART: [art] Populate DV Done
2,983,983 UART: [fht] FMC Alias Private Key: 7
2,985,083 UART: [art] Derive CDI
2,985,363 UART: [art] Store in in slot 0x4
3,071,224 UART: [art] Derive Key Pair
3,071,584 UART: [art] Store priv key in slot 0x5
3,084,650 UART: [art] Derive Key Pair - Done
3,099,363 UART: [art] Signing Cert with AUTHO
3,099,843 UART: RITY.KEYID = 7
3,115,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,926 UART: [art] PUB.X = 6865D16E899088FEB265CAF64618530A30AA98135DB34B7538E82F97685A72A940B5B8735A462E56EA7B26C73F032DB6
3,122,686 UART: [art] PUB.Y = BF1975DCD84A6E7DED71107359C30DEEF5CA74F018F2CABA6D425525787AC5B217F1FA42A5654191A4A83CA93849AA47
3,129,645 UART: [art] SIG.R = 3F7A4A9769A640954AF95FB02B18707BFBC0C423DDBDC58DE9BE41E3675894BD920B2A9F9044DE5324224153EBB6791D
3,136,420 UART: [art] SIG.S = 877A20EEDF3C0D908D46401B276650407FEA53CF7CF68735DE9923355490D9D6A969BBB352812662F87FBB4710C48A06
3,160,309 UART: Caliptra RT
3,160,563 UART: [state] CFI Enabled
3,268,212 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha384 KeyId Algorithm
1,203,401 UART: [idev] --
1,204,212 UART: [ldev] ++
1,204,380 UART: [ldev] CDI.KEYID = 6
1,204,744 UART: [ldev] SUBJECT.KEYID = 5
1,205,171 UART: [ldev] AUTHORITY.KEYID = 7
1,205,634 UART: [ldev] FE.KEYID = 1
1,210,614 UART: [ldev] Erasing FE.KEYID = 1
1,236,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,890 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,612 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,692 UART: [ldev] --
1,275,978 UART: [fwproc] Wait for Commands...
1,276,707 UART: [fwproc] Recv command 0x46574c44
1,277,440 UART: [fwproc] Recv'd Img size: 114360 bytes
2,575,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,768,136 >>> mbox cmd response: success
2,769,189 UART: [afmc] ++
2,769,357 UART: [afmc] CDI.KEYID = 6
2,769,720 UART: [afmc] SUBJECT.KEYID = 7
2,770,146 UART: [afmc] AUTHORITY.KEYID = 5
2,805,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,646 UART: [afmc] --
2,848,526 UART: [cold-reset] --
2,849,476 UART: [state] Locking Datavault
2,850,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,073 UART: [state] Locking ICCM
2,851,621 UART: [exit] Launching FMC @ 0x40000130
2,856,950 UART:
2,856,966 UART: Running Caliptra FMC ...
2,857,374 UART:
2,857,428 UART: [state] CFI Enabled
2,867,905 UART: [fht] FMC Alias Private Key: 7
2,975,330 UART: [art] Extend RT PCRs Done
2,975,758 UART: [art] Lock RT PCRs Done
2,977,302 UART: [art] Populate DV Done
2,985,579 UART: [fht] FMC Alias Private Key: 7
2,986,569 UART: [art] Derive CDI
2,986,849 UART: [art] Store in in slot 0x4
3,072,522 UART: [art] Derive Key Pair
3,072,882 UART: [art] Store priv key in slot 0x5
3,086,380 UART: [art] Derive Key Pair - Done
3,101,259 UART: [art] Signing Cert with AUTHO
3,101,739 UART: RITY.KEYID = 7
3,116,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,580 UART: [art] PUB.X = AE52DEFABDB1B17DCEC1518E134973B0C2786A2A0DE14A274044C4C51BB1655C6922C4661DA1A8E744BD87EFCA72A999
3,124,363 UART: [art] PUB.Y = 0181CCB4237802FE296BCABCE02D863A7D3C99DC8154051BDE109625212D25978CC584F1EAFB87976A37AC2C0BE39641
3,131,307 UART: [art] SIG.R = AAED8D195480B82B21B06AE8C7541B2184006EC39780048AEEB39480660B5622019405016505377D70062245FF622C3A
3,138,020 UART: [art] SIG.S = 9773E910809B68854018B62701DD68A19127269FE24BEECC3C5FF22B6C04A6F0D10405A69BB074DA76366FE9688E0108
3,162,113 UART: Caliptra RT
3,162,367 UART: [state] CFI Enabled
3,269,353 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,559 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Fuse KeyId
1,200,042 UART: [idev] --
1,201,203 UART: [ldev] ++
1,201,371 UART: [ldev] CDI.KEYID = 6
1,201,735 UART: [ldev] SUBJECT.KEYID = 5
1,202,162 UART: [ldev] AUTHORITY.KEYID = 7
1,202,625 UART: [ldev] FE.KEYID = 1
1,207,965 UART: [ldev] Erasing FE.KEYID = 1
1,233,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,877 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,559 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,610 UART: [ldev] --
1,272,878 UART: [fwproc] Wait for Commands...
1,273,489 UART: [fwproc] Recv command 0x46574c44
1,274,222 UART: [fwproc] Recv'd Img size: 114360 bytes
2,572,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,764,810 >>> mbox cmd response: success
2,765,949 UART: [afmc] ++
2,766,117 UART: [afmc] CDI.KEYID = 6
2,766,480 UART: [afmc] SUBJECT.KEYID = 7
2,766,906 UART: [afmc] AUTHORITY.KEYID = 5
2,802,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,629 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,568 UART: [afmc] --
2,846,594 UART: [cold-reset] --
2,847,464 UART: [state] Locking Datavault
2,848,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,305 UART: [state] Locking ICCM
2,849,833 UART: [exit] Launching FMC @ 0x40000130
2,855,162 UART:
2,855,178 UART: Running Caliptra FMC ...
2,855,586 UART:
2,855,640 UART: [state] CFI Enabled
2,865,997 UART: [fht] FMC Alias Private Key: 7
2,973,146 UART: [art] Extend RT PCRs Done
2,973,574 UART: [art] Lock RT PCRs Done
2,975,044 UART: [art] Populate DV Done
2,983,341 UART: [fht] FMC Alias Private Key: 7
2,984,461 UART: [art] Derive CDI
2,984,741 UART: [art] Store in in slot 0x4
3,070,150 UART: [art] Derive Key Pair
3,070,510 UART: [art] Store priv key in slot 0x5
3,083,704 UART: [art] Derive Key Pair - Done
3,098,817 UART: [art] Signing Cert with AUTHO
3,099,297 UART: RITY.KEYID = 7
3,114,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,134 UART: [art] PUB.X = C044C34A1DC99C88D858A0D75BEAFE77C8476B8AA7DD911D8EAD75F43C5D39991DDE5909814CB63CA812997640E3A503
3,121,908 UART: [art] PUB.Y = 73630C9814099799B87D63AC27DCF13919CC2994C4B7A6DD9A942E1898B35BB64E4A554341FDB684CA70D5C73179D020
3,128,850 UART: [art] SIG.R = D8A69206981B47053E985958A9F3FFAE7EDB90FDF4D3F131C0DFE4A9E1EB1E84DBCD24707444E67C92BD41A23C2B679A
3,135,630 UART: [art] SIG.S = 5AF4422F933B45BA2DFDBA479741495BD1897D080C3EBBD9DE7D2286AD64DBFB0650321C6F088C08553C412ACCC3998B
3,158,922 UART: Caliptra RT
3,159,176 UART: [state] CFI Enabled
3,267,314 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 6.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,116 >>> mbox cmd response: success
2,681,848 UART:
2,681,864 UART: Running Caliptra FMC ...
2,682,272 UART:
2,682,326 UART: [state] CFI Enabled
2,692,917 UART: [fht] FMC Alias Private Key: 7
2,801,372 UART: [art] Extend RT PCRs Done
2,801,800 UART: [art] Lock RT PCRs Done
2,803,282 UART: [art] Populate DV Done
2,811,643 UART: [fht] FMC Alias Private Key: 7
2,812,595 UART: [art] Derive CDI
2,812,875 UART: [art] Store in in slot 0x4
2,898,254 UART: [art] Derive Key Pair
2,898,614 UART: [art] Store priv key in slot 0x5
2,911,658 UART: [art] Derive Key Pair - Done
2,926,656 UART: [art] Signing Cert with AUTHO
2,927,136 UART: RITY.KEYID = 7
2,942,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,835 UART: [art] PUB.X = BE121239039D39081B3253173F2DF6C5D334E7A282C7E86923C514734BD74EB730710E4A4B12B2634DD43218D1C35033
2,949,586 UART: [art] PUB.Y = 3F2DD9EBB73066EB35377A0F7210259B0BFB8B807A522D1B4113056027AF5B5EB08806B3B342BCF04D7F2B132DE8918B
2,956,530 UART: [art] SIG.R = 14D5A9A275D97C353AB64508DB3DC37B903A4B04DE0683B4D781149F5884417688902F939ED246BB1387110969852058
2,963,274 UART: [art] SIG.S = A3C87A3085C96A269CBA4E5AF8DE7596D76B28EFB6CB830E626B41EFFCE756AFFB5524586F356867F09816883B1872E1
2,986,662 UART: Caliptra RT
2,986,916 UART: [state] CFI Enabled
3,095,008 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,618,838 >>> mbox cmd response: success
2,680,028 UART:
2,680,044 UART: Running Caliptra FMC ...
2,680,452 UART:
2,680,506 UART: [state] CFI Enabled
2,691,133 UART: [fht] FMC Alias Private Key: 7
2,798,996 UART: [art] Extend RT PCRs Done
2,799,424 UART: [art] Lock RT PCRs Done
2,801,052 UART: [art] Populate DV Done
2,809,119 UART: [fht] FMC Alias Private Key: 7
2,810,175 UART: [art] Derive CDI
2,810,455 UART: [art] Store in in slot 0x4
2,896,416 UART: [art] Derive Key Pair
2,896,776 UART: [art] Store priv key in slot 0x5
2,909,602 UART: [art] Derive Key Pair - Done
2,924,057 UART: [art] Signing Cert with AUTHO
2,924,537 UART: RITY.KEYID = 7
2,940,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,808 UART: [art] PUB.X = 707182C230C1B7317AA7BA4FA37BFC26726FF37324CB00E5BDF41F8DF69156D0E93DFA2C8922D04D37FF8241B0B906EA
2,947,565 UART: [art] PUB.Y = 4DD73BFAE134B03D2A827F63D2048364C92FCEF3501AABEBDCFF2E5001163035FA017B38D4C1B9057615F52DDF96B229
2,954,515 UART: [art] SIG.R = 9E1E58D721D4159D250C7260986D2990414C3E9F8AC721403A56724CA0329783202332478CF85739E4DB5ADB9573A216
2,961,268 UART: [art] SIG.S = 0031B967266578AEB888FCFC0260E73195F5FFEAF52B6D2BEC320CF3D10B4A176CF68078CFB3226BE2C57A22B8DD1FD3
2,985,936 UART: Caliptra RT
2,986,190 UART: [state] CFI Enabled
3,094,095 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,616,900 >>> mbox cmd response: success
2,678,942 UART:
2,678,958 UART: Running Caliptra FMC ...
2,679,366 UART:
2,679,420 UART: [state] CFI Enabled
2,690,059 UART: [fht] FMC Alias Private Key: 7
2,798,326 UART: [art] Extend RT PCRs Done
2,798,754 UART: [art] Lock RT PCRs Done
2,800,370 UART: [art] Populate DV Done
2,808,779 UART: [fht] FMC Alias Private Key: 7
2,809,939 UART: [art] Derive CDI
2,810,219 UART: [art] Store in in slot 0x4
2,895,904 UART: [art] Derive Key Pair
2,896,264 UART: [art] Store priv key in slot 0x5
2,909,194 UART: [art] Derive Key Pair - Done
2,924,128 UART: [art] Signing Cert with AUTHO
2,924,608 UART: RITY.KEYID = 7
2,939,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,595 UART: [art] PUB.X = AC09B9B8DEC4F25E46B08226581B0F70C6BF7EB3015EAE57F8A0D9AD088A06132BA86AD4BA0B93CB3D025ADC508223A8
2,947,362 UART: [art] PUB.Y = F856ACAE8FC1C3E67AEDED2192A758656349F354B6ECC27CDCA04D529A3BD7335AE69BEF11CDBB27427A6322A02A9B4A
2,954,334 UART: [art] SIG.R = 4DB040B747D7EE78C3669AEE95023296DBBD843EF201CE8990DFFBED96BC5CC93DCC4A10BB851F3280D2EF88A1C46267
2,961,116 UART: [art] SIG.S = F6AE2592089242757413A1207ED4D573DC04FEF61D51612A93A987C57870179E122D2C60CFC6518CCFF5B38FB463DBEA
2,985,261 UART: Caliptra RT
2,985,515 UART: [state] CFI Enabled
3,092,748 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,613,630 >>> mbox cmd response: success
2,676,126 UART:
2,676,142 UART: Running Caliptra FMC ...
2,676,550 UART:
2,676,604 UART: [state] CFI Enabled
2,686,865 UART: [fht] FMC Alias Private Key: 7
2,794,472 UART: [art] Extend RT PCRs Done
2,794,900 UART: [art] Lock RT PCRs Done
2,796,432 UART: [art] Populate DV Done
2,804,715 UART: [fht] FMC Alias Private Key: 7
2,805,843 UART: [art] Derive CDI
2,806,123 UART: [art] Store in in slot 0x4
2,892,040 UART: [art] Derive Key Pair
2,892,400 UART: [art] Store priv key in slot 0x5
2,905,990 UART: [art] Derive Key Pair - Done
2,921,022 UART: [art] Signing Cert with AUTHO
2,921,502 UART: RITY.KEYID = 7
2,936,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,493 UART: [art] PUB.X = 9FB63524C5CF954EC69B04A4FE20BCA82157661ED8674AAC0579B678CD926E8E6BD208BA6E1F99384F9456F429F51CD7
2,944,262 UART: [art] PUB.Y = 67A3B61D5FDD265D3DDD9FF8A91A25F9E9ED4FF748A985183ED16130E177E236F6F348C92631CE8A85B6EA55B835530C
2,951,219 UART: [art] SIG.R = 524AFEE131B4FD770F26CEACBF00E17D3523A63A93E177A4EA28F3E0B3B18423AB4ABAFE0195126611A728909E70AEC2
2,957,975 UART: [art] SIG.S = FD0C58ABF66026237D689E080EC4431B2FC5DFCDD6F72BCAE770893272D80E14E5B24332603B0605DE5BD08F402C6C08
2,981,651 UART: Caliptra RT
2,981,905 UART: [state] CFI Enabled
3,090,605 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.37s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,851 UART: [afmc] --
2,849,871 UART: [cold-reset] --
2,850,691 UART: [state] Locking Datavault
2,851,934 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,538 UART: [state] Locking ICCM
2,853,206 UART: [exit] Launching FMC @ 0x40000130
2,858,535 UART:
2,858,551 UART: Running Caliptra FMC ...
2,858,959 UART:
2,859,102 UART: [state] CFI Enabled
2,869,917 UART: [fht] FMC Alias Private Key: 7
2,978,638 UART: [art] Extend RT PCRs Done
2,979,066 UART: [art] Lock RT PCRs Done
2,980,682 UART: [art] Populate DV Done
2,989,035 UART: [fht] FMC Alias Private Key: 7
2,990,141 UART: [art] Derive CDI
2,990,421 UART: [art] Store in in slot 0x4
3,076,062 UART: [art] Derive Key Pair
3,076,422 UART: [art] Store priv key in slot 0x5
3,089,266 UART: [art] Derive Key Pair - Done
3,104,034 UART: [art] Signing Cert with AUTHO
3,104,514 UART: RITY.KEYID = 7
3,119,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,579 UART: [art] PUB.X = 6C0736A8B1469D5F641147E2BE2A32A24CCBECE45E90110DD3A0087160097CCE7618DC1D385688A6F8F4D52918946715
3,127,335 UART: [art] PUB.Y = 57B79AF546653BC83E50CE1D579D2D5792D263BF6600580610E0C6239AB2926802F7D2B9DD96C917158BBC01776241DD
3,134,250 UART: [art] SIG.R = BD0B81E5C29939EBE2C759FE5C8747239DDBDC52577B8843E47A7FAF4A07E72BF9C315954A1A3E0ADE4FB367CE463CF7
3,141,029 UART: [art] SIG.S = B60431D1B738EE01C94ACC7606CFAC0C597598B7336C7678A39FE8F677B1BD68FB7C7FB72E6D5F1F1064AD1E7D73FCCD
3,165,264 UART: Caliptra RT
3,165,610 UART: [state] CFI Enabled
3,273,216 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,954 UART: [fht] FHT @ 0x50003400
1,173,562 UART: [idev] ++
1,173,730 UART: [idev] CDI.KEYID = 6
1,174,091 UART: [idev] SUBJECT.KEYID = 7
1,174,516 UART: [idev] UDS.KEYID = 0
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,517 UART: [idev] Sha384 KeyId Algorithm
1,203,262 UART: [idev] --
1,204,415 UART: [ldev] ++
1,204,583 UART: [ldev] CDI.KEYID = 6
1,204,947 UART: [ldev] SUBJECT.KEYID = 5
1,205,374 UART: [ldev] AUTHORITY.KEYID = 7
1,205,837 UART: [ldev] FE.KEYID = 1
1,211,325 UART: [ldev] Erasing FE.KEYID = 1
1,237,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,187 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,909 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,033 UART: [ldev] --
1,277,495 UART: [fwproc] Wait for Commands...
1,278,292 UART: [fwproc] Recv command 0x46574c44
1,279,025 UART: [fwproc] Recv'd Img size: 114360 bytes
2,576,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,768,843 >>> mbox cmd response: success
2,770,054 UART: [afmc] ++
2,770,222 UART: [afmc] CDI.KEYID = 6
2,770,585 UART: [afmc] SUBJECT.KEYID = 7
2,771,011 UART: [afmc] AUTHORITY.KEYID = 5
2,806,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,239 UART: [afmc] --
2,850,251 UART: [cold-reset] --
2,851,245 UART: [state] Locking Datavault
2,852,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,776 UART: [state] Locking ICCM
2,853,318 UART: [exit] Launching FMC @ 0x40000130
2,858,647 UART:
2,858,663 UART: Running Caliptra FMC ...
2,859,071 UART:
2,859,214 UART: [state] CFI Enabled
2,870,097 UART: [fht] FMC Alias Private Key: 7
2,977,256 UART: [art] Extend RT PCRs Done
2,977,684 UART: [art] Lock RT PCRs Done
2,979,196 UART: [art] Populate DV Done
2,987,331 UART: [fht] FMC Alias Private Key: 7
2,988,331 UART: [art] Derive CDI
2,988,611 UART: [art] Store in in slot 0x4
3,074,092 UART: [art] Derive Key Pair
3,074,452 UART: [art] Store priv key in slot 0x5
3,088,002 UART: [art] Derive Key Pair - Done
3,102,790 UART: [art] Signing Cert with AUTHO
3,103,270 UART: RITY.KEYID = 7
3,118,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,685 UART: [art] PUB.X = A5B942406756C78614BCB5C25A879E31893C13BA224AEA33F6CAB74CF9063068B8AF5265FB615A0555798AEB24577ADF
3,126,453 UART: [art] PUB.Y = 4DE8DFA540B3D8A9C299EB7366163C25F7CF236D388E18B330BDCFEAC205453F8B829EC9C56050C6A25C16AC608E711A
3,133,412 UART: [art] SIG.R = 5F24A0430D9406032F58A292F737567C94E8F2162E74ACADBBBED6E6D5041090D7868816CCEFD6A4076B73E2ED1F41CA
3,140,175 UART: [art] SIG.S = 42A43C445E01432DC7EF4E7DAEC2EBDEF2D773FB993259ECCE87515B2CA69EA871E02AB78465F2115511410654D25479
3,164,276 UART: Caliptra RT
3,164,622 UART: [state] CFI Enabled
3,271,372 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,181,906 UART: [idev] Erasing UDS.KEYID = 0
1,199,245 UART: [idev] Fuse KeyId
1,200,467 UART: [idev] --
1,201,428 UART: [ldev] ++
1,201,596 UART: [ldev] CDI.KEYID = 6
1,201,960 UART: [ldev] SUBJECT.KEYID = 5
1,202,387 UART: [ldev] AUTHORITY.KEYID = 7
1,202,850 UART: [ldev] FE.KEYID = 1
1,208,124 UART: [ldev] Erasing FE.KEYID = 1
1,234,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,296 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,978 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,079 UART: [ldev] --
1,274,377 UART: [fwproc] Wait for Commands...
1,275,022 UART: [fwproc] Recv command 0x46574c44
1,275,755 UART: [fwproc] Recv'd Img size: 114360 bytes
2,572,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,765,697 >>> mbox cmd response: success
2,766,890 UART: [afmc] ++
2,767,058 UART: [afmc] CDI.KEYID = 6
2,767,421 UART: [afmc] SUBJECT.KEYID = 7
2,767,847 UART: [afmc] AUTHORITY.KEYID = 5
2,802,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,853 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,269 UART: [afmc] --
2,846,335 UART: [cold-reset] --
2,847,475 UART: [state] Locking Datavault
2,848,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,244 UART: [state] Locking ICCM
2,849,776 UART: [exit] Launching FMC @ 0x40000130
2,855,105 UART:
2,855,121 UART: Running Caliptra FMC ...
2,855,529 UART:
2,855,672 UART: [state] CFI Enabled
2,866,251 UART: [fht] FMC Alias Private Key: 7
2,973,954 UART: [art] Extend RT PCRs Done
2,974,382 UART: [art] Lock RT PCRs Done
2,975,848 UART: [art] Populate DV Done
2,983,819 UART: [fht] FMC Alias Private Key: 7
2,984,967 UART: [art] Derive CDI
2,985,247 UART: [art] Store in in slot 0x4
3,071,046 UART: [art] Derive Key Pair
3,071,406 UART: [art] Store priv key in slot 0x5
3,084,870 UART: [art] Derive Key Pair - Done
3,099,776 UART: [art] Signing Cert with AUTHO
3,100,256 UART: RITY.KEYID = 7
3,115,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,319 UART: [art] PUB.X = DE435D6C0857EE9B86B153C123E69064D3E2B94A07338D3872255C84CF72153A1CEA63F579C29091DCEA669EFB25240A
3,123,082 UART: [art] PUB.Y = D9A1CF174D7C016277ADBFEDF07015CDE89AD1FB0FEA1B3BA8C79657BAF3AC1D310267A1E00F879B42C6AEE510821176
3,130,040 UART: [art] SIG.R = 0938E8EC845E50A7DC6F81019C89D0ECB2CFF37E7D3E2017275F14838B474C8C31E7450298A9EFAC8D650E4F11DD0C23
3,136,803 UART: [art] SIG.S = 96CF0A8A6E4D4432F6A78945B4F5490885C441E0B7E4B27630E48BC2AC1892D76901AE821D98548FF6B00805E1B0F8BF
3,160,937 UART: Caliptra RT
3,161,283 UART: [state] CFI Enabled
3,268,735 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,589 >>> mbox cmd response: success
2,686,311 UART:
2,686,327 UART: Running Caliptra FMC ...
2,686,735 UART:
2,686,878 UART: [state] CFI Enabled
2,697,443 UART: [fht] FMC Alias Private Key: 7
2,804,530 UART: [art] Extend RT PCRs Done
2,804,958 UART: [art] Lock RT PCRs Done
2,806,332 UART: [art] Populate DV Done
2,814,467 UART: [fht] FMC Alias Private Key: 7
2,815,575 UART: [art] Derive CDI
2,815,855 UART: [art] Store in in slot 0x4
2,901,380 UART: [art] Derive Key Pair
2,901,740 UART: [art] Store priv key in slot 0x5
2,915,178 UART: [art] Derive Key Pair - Done
2,930,091 UART: [art] Signing Cert with AUTHO
2,930,571 UART: RITY.KEYID = 7
2,945,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,300 UART: [art] PUB.X = 1D920F57B917EC903DD4057196318AAC361130C15C5BC97F78BAC8558226151C442A3BBFFBF979D58A8F216988F33D63
2,953,064 UART: [art] PUB.Y = 9D9C02EF6276F17E070AD46268DFDA0F30FD2582BF50004EFFDEA761F6B4B2B42E4204882754313159EB8A557672678C
2,959,979 UART: [art] SIG.R = E6CA7A0B11576D976E346C4A04E55F6C2466BE2A09A47CF8910F42F5B7949AD46DC8A2A74741291682903D8CDC479C62
2,966,739 UART: [art] SIG.S = 9847989E3EE04AA0BEE53569F860E416DC27010C9AC4A539E742C70048EEF3B599647C2F24BCC5DDDAF07B9FCEFD1FDE
2,990,574 UART: Caliptra RT
2,990,920 UART: [state] CFI Enabled
3,098,489 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,073 >>> mbox cmd response: success
2,682,417 UART:
2,682,433 UART: Running Caliptra FMC ...
2,682,841 UART:
2,682,984 UART: [state] CFI Enabled
2,693,199 UART: [fht] FMC Alias Private Key: 7
2,800,818 UART: [art] Extend RT PCRs Done
2,801,246 UART: [art] Lock RT PCRs Done
2,802,664 UART: [art] Populate DV Done
2,810,807 UART: [fht] FMC Alias Private Key: 7
2,811,769 UART: [art] Derive CDI
2,812,049 UART: [art] Store in in slot 0x4
2,897,478 UART: [art] Derive Key Pair
2,897,838 UART: [art] Store priv key in slot 0x5
2,911,628 UART: [art] Derive Key Pair - Done
2,926,722 UART: [art] Signing Cert with AUTHO
2,927,202 UART: RITY.KEYID = 7
2,942,756 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,521 UART: [art] PUB.X = 6553F0D84735D751F978954EB6735F9270B7CEAE1800C3087F340304A09CBF1F389262D20B603B23186E29D42F543F10
2,950,247 UART: [art] PUB.Y = 82C271FFBA711CC41AD4C3F8CCAD19FC0357D448E4FBF91DF9C49009568ABCC35EB6B9B96BA4A6541E88D2135A4A472F
2,957,211 UART: [art] SIG.R = 4B80846B060E28E2E12AA631FA5E7F2B553E2BD9A9B20C92A7C2FA5544818644F1217DEF984CEDDCB8AC57875C00F320
2,963,960 UART: [art] SIG.S = 5AF8E10575357D2D38C21CB675F446DB51FEB028A8B56E44C7F619D6C08FBF30DBC063E69E9B6AAC109B82FBD0C7A5F6
2,987,366 UART: Caliptra RT
2,987,712 UART: [state] CFI Enabled
3,094,816 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,618,459 >>> mbox cmd response: success
2,680,269 UART:
2,680,285 UART: Running Caliptra FMC ...
2,680,693 UART:
2,680,836 UART: [state] CFI Enabled
2,691,419 UART: [fht] FMC Alias Private Key: 7
2,799,150 UART: [art] Extend RT PCRs Done
2,799,578 UART: [art] Lock RT PCRs Done
2,801,174 UART: [art] Populate DV Done
2,809,459 UART: [fht] FMC Alias Private Key: 7
2,810,589 UART: [art] Derive CDI
2,810,869 UART: [art] Store in in slot 0x4
2,896,736 UART: [art] Derive Key Pair
2,897,096 UART: [art] Store priv key in slot 0x5
2,910,644 UART: [art] Derive Key Pair - Done
2,925,237 UART: [art] Signing Cert with AUTHO
2,925,717 UART: RITY.KEYID = 7
2,940,903 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,668 UART: [art] PUB.X = 9A8A5B7D95B026AC156796C27C8D86E915E1A60A0FC176E5B6B69F6EE227C6500960F297385E136C33440FC82CF41A11
2,948,426 UART: [art] PUB.Y = 57A6A431B96F0FF1C8BDFEF35376EFF018395CF4D6E8D3B6A257C7A7AFC126953100AE3DB477B3082109D90D1DF6FEB9
2,955,358 UART: [art] SIG.R = ADD06A1BBB7F94A06C04FA612DC1B0A8C09AC109F01210004E1594560F2C0C9E5FEE592082CAAF1F2C432EC35E5504D9
2,962,105 UART: [art] SIG.S = BF5B109AC0519CCAB8DAB468FCBBE3DAB8DF4296BFEFAF50FC18FCABC821DF8D53B9A1F5F4896CFF8B6FFADB5F794860
2,986,006 UART: Caliptra RT
2,986,352 UART: [state] CFI Enabled
3,093,164 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,614,461 >>> mbox cmd response: success
2,676,735 UART:
2,676,751 UART: Running Caliptra FMC ...
2,677,159 UART:
2,677,302 UART: [state] CFI Enabled
2,687,775 UART: [fht] FMC Alias Private Key: 7
2,796,214 UART: [art] Extend RT PCRs Done
2,796,642 UART: [art] Lock RT PCRs Done
2,798,158 UART: [art] Populate DV Done
2,806,335 UART: [fht] FMC Alias Private Key: 7
2,807,273 UART: [art] Derive CDI
2,807,553 UART: [art] Store in in slot 0x4
2,893,168 UART: [art] Derive Key Pair
2,893,528 UART: [art] Store priv key in slot 0x5
2,907,244 UART: [art] Derive Key Pair - Done
2,922,293 UART: [art] Signing Cert with AUTHO
2,922,773 UART: RITY.KEYID = 7
2,938,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,898 UART: [art] PUB.X = 0EFC122756835993F1723989A1F9F2283CC7F8CE703DFE1EFC830A23BC75D322E511AD3BE31CED18841E29CEA97F98F0
2,945,672 UART: [art] PUB.Y = EEB4071EDAD54611D59F4148053F95B6196E0607D2FA4C2CE8F944ECB1E04586C90AED64707B04463D6CA19CB5D91201
2,952,607 UART: [art] SIG.R = 26ADD16DA34E87E37605DB92AA251BB69E5946616030F42004B19CF8C32411D35DF9288E911FF5B51D9C9F4291448981
2,959,367 UART: [art] SIG.S = 36DA2E291BF313E08A9997BA86DF38B4D0D01336F3B04112BAB0E7470857B25B3960DB4FD576D682F6F5AF3A3BBA7FE1
2,983,095 UART: Caliptra RT
2,983,441 UART: [state] CFI Enabled
3,091,519 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.96s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,340 UART: [afmc] --
2,851,230 UART: [cold-reset] --
2,851,994 UART: [state] Locking Datavault
2,853,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,643 UART: [state] Locking ICCM
2,854,177 UART: [exit] Launching FMC @ 0x40000130
2,859,506 UART:
2,859,522 UART: Running Caliptra FMC ...
2,859,930 UART:
2,859,984 UART: [state] CFI Enabled
2,870,357 UART: [fht] FMC Alias Private Key: 7
2,977,750 UART: [art] Extend RT PCRs Done
2,978,178 UART: [art] Lock RT PCRs Done
2,979,922 UART: [art] Populate DV Done
2,988,401 UART: [fht] FMC Alias Private Key: 7
2,989,523 UART: [art] Derive CDI
2,989,803 UART: [art] Store in in slot 0x4
3,075,702 UART: [art] Derive Key Pair
3,076,062 UART: [art] Store priv key in slot 0x5
3,088,404 UART: [art] Derive Key Pair - Done
3,102,958 UART: [art] Signing Cert with AUTHO
3,103,438 UART: RITY.KEYID = 7
3,118,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,821 UART: [art] PUB.X = E4483D6E4E1CCA214971B07BB5BA263C0C3FDD1917B0E7B970F23217B9D3A4ABB5CD47B62C61EA430DD3BFDF1E69475B
3,125,605 UART: [art] PUB.Y = DA6ED1742EA80EDA3A462C02C0CCFD4154245B3D9D03900B37BB5D87C9C62F955837DBBAF7536C1EEBFD2F443497FEBA
3,132,565 UART: [art] SIG.R = AB1E801E4CAF4EF38D9AC6A889DA587B95110BF3D43C998D74B5937920AFFCFECEE64EA075436F5E2BE5BEE2C5559844
3,139,352 UART: [art] SIG.S = 33E8C5E252B250A92B76FB15DE63C3C70047267C84C9092AD9541D3CE7AF38A8CA527B4304A1BFE64827F1C305F15B6F
3,163,348 UART: Caliptra RT
3,163,602 UART: [state] CFI Enabled
3,270,101 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,181,869 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha384 KeyId Algorithm
1,203,159 UART: [idev] --
1,204,132 UART: [ldev] ++
1,204,300 UART: [ldev] CDI.KEYID = 6
1,204,664 UART: [ldev] SUBJECT.KEYID = 5
1,205,091 UART: [ldev] AUTHORITY.KEYID = 7
1,205,554 UART: [ldev] FE.KEYID = 1
1,210,894 UART: [ldev] Erasing FE.KEYID = 1
1,236,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,504 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,226 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,364 UART: [ldev] --
1,276,828 UART: [fwproc] Wait for Commands...
1,277,549 UART: [fwproc] Recv command 0x46574c44
1,278,282 UART: [fwproc] Recv'd Img size: 114360 bytes
2,576,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,768,546 >>> mbox cmd response: success
2,769,763 UART: [afmc] ++
2,769,931 UART: [afmc] CDI.KEYID = 6
2,770,294 UART: [afmc] SUBJECT.KEYID = 7
2,770,720 UART: [afmc] AUTHORITY.KEYID = 5
2,806,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,647 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,526 UART: [afmc] --
2,849,496 UART: [cold-reset] --
2,850,272 UART: [state] Locking Datavault
2,851,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,315 UART: [state] Locking ICCM
2,852,955 UART: [exit] Launching FMC @ 0x40000130
2,858,284 UART:
2,858,300 UART: Running Caliptra FMC ...
2,858,708 UART:
2,858,762 UART: [state] CFI Enabled
2,869,125 UART: [fht] FMC Alias Private Key: 7
2,976,236 UART: [art] Extend RT PCRs Done
2,976,664 UART: [art] Lock RT PCRs Done
2,978,232 UART: [art] Populate DV Done
2,986,517 UART: [fht] FMC Alias Private Key: 7
2,987,545 UART: [art] Derive CDI
2,987,825 UART: [art] Store in in slot 0x4
3,073,376 UART: [art] Derive Key Pair
3,073,736 UART: [art] Store priv key in slot 0x5
3,086,860 UART: [art] Derive Key Pair - Done
3,101,819 UART: [art] Signing Cert with AUTHO
3,102,299 UART: RITY.KEYID = 7
3,117,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,672 UART: [art] PUB.X = AB666C8FB950CA514EBC5A07E0895B6075E5A60B12E87723689950E34352B477FDA33853B3F3C39A90B8B5E4AEDC64A2
3,125,442 UART: [art] PUB.Y = A1018E6B9EB178E228E40B5189F7B0892013CA24484C9A80371F34F514FE843BC96FD74BE218085C83A36CEA23C16E9E
3,132,385 UART: [art] SIG.R = 858AFBFEDBE2A21E9D827DC60AAB448B0899DE9504886F1AE87C9312EEDA83EE1BDC334C1EA99FEF0ABE343B492525BB
3,139,169 UART: [art] SIG.S = 6A4DBB942FF182C4A14C81CDBDD488A0B7CF0716D664C80BA43783BDCFA52DAA257BB7A2E71AF80AE9B773F25F8E928A
3,162,909 UART: Caliptra RT
3,163,163 UART: [state] CFI Enabled
3,270,760 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,357 UART: [kat] SHA2-256
902,297 UART: [kat] SHA2-384
905,222 UART: [kat] SHA2-512-ACC
907,123 UART: [kat] ECC-384
916,816 UART: [kat] HMAC-384Kdf
921,448 UART: [kat] LMS
1,169,760 UART: [kat] --
1,170,583 UART: [cold-reset] ++
1,171,105 UART: [fht] FHT @ 0x50003400
1,173,775 UART: [idev] ++
1,173,943 UART: [idev] CDI.KEYID = 6
1,174,304 UART: [idev] SUBJECT.KEYID = 7
1,174,729 UART: [idev] UDS.KEYID = 0
1,183,141 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Fuse KeyId
1,201,308 UART: [idev] --
1,202,345 UART: [ldev] ++
1,202,513 UART: [ldev] CDI.KEYID = 6
1,202,877 UART: [ldev] SUBJECT.KEYID = 5
1,203,304 UART: [ldev] AUTHORITY.KEYID = 7
1,203,767 UART: [ldev] FE.KEYID = 1
1,208,945 UART: [ldev] Erasing FE.KEYID = 1
1,235,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,289 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,971 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,228 UART: [ldev] --
1,274,600 UART: [fwproc] Wait for Commands...
1,275,239 UART: [fwproc] Recv command 0x46574c44
1,275,972 UART: [fwproc] Recv'd Img size: 114360 bytes
2,573,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,765,858 >>> mbox cmd response: success
2,767,077 UART: [afmc] ++
2,767,245 UART: [afmc] CDI.KEYID = 6
2,767,608 UART: [afmc] SUBJECT.KEYID = 7
2,768,034 UART: [afmc] AUTHORITY.KEYID = 5
2,803,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,422 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,886 UART: [afmc] --
2,846,994 UART: [cold-reset] --
2,847,652 UART: [state] Locking Datavault
2,848,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,311 UART: [state] Locking ICCM
2,849,969 UART: [exit] Launching FMC @ 0x40000130
2,855,298 UART:
2,855,314 UART: Running Caliptra FMC ...
2,855,722 UART:
2,855,776 UART: [state] CFI Enabled
2,866,129 UART: [fht] FMC Alias Private Key: 7
2,974,402 UART: [art] Extend RT PCRs Done
2,974,830 UART: [art] Lock RT PCRs Done
2,976,276 UART: [art] Populate DV Done
2,984,637 UART: [fht] FMC Alias Private Key: 7
2,985,813 UART: [art] Derive CDI
2,986,093 UART: [art] Store in in slot 0x4
3,071,926 UART: [art] Derive Key Pair
3,072,286 UART: [art] Store priv key in slot 0x5
3,085,570 UART: [art] Derive Key Pair - Done
3,100,285 UART: [art] Signing Cert with AUTHO
3,100,765 UART: RITY.KEYID = 7
3,115,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,638 UART: [art] PUB.X = 367B9AD73FC37C71B1E0C2CFE31A49C4B97A0495DFF90F4BDA0DD67A5A21CE628D08A70772C4E8F1415573FD156D22B1
3,123,407 UART: [art] PUB.Y = F4112D9A8ECCAFDB6C7937E96F313A4F678B7BDA076951C3FBDBA7089471DD810BCE1EA8ACF787C2DC3C0F73E8E86E83
3,130,369 UART: [art] SIG.R = 0295DA571C3542D5BFB959FA36E18EB4DA1697C6B17C65B99B1FAEED5E25428AC4D41834E4AE53764321235029422D5A
3,137,140 UART: [art] SIG.S = D2AA4D2F7E58B3A3ED68CF6126A5C94BFFA3C62AA385408D8067EAFAF8604118740E4FB95F7C1EE4C0C7C258EEE9E098
3,161,442 UART: Caliptra RT
3,161,696 UART: [state] CFI Enabled
3,270,484 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,670 >>> mbox cmd response: success
2,688,166 UART:
2,688,182 UART: Running Caliptra FMC ...
2,688,590 UART:
2,688,644 UART: [state] CFI Enabled
2,699,065 UART: [fht] FMC Alias Private Key: 7
2,806,426 UART: [art] Extend RT PCRs Done
2,806,854 UART: [art] Lock RT PCRs Done
2,808,326 UART: [art] Populate DV Done
2,816,859 UART: [fht] FMC Alias Private Key: 7
2,817,869 UART: [art] Derive CDI
2,818,149 UART: [art] Store in in slot 0x4
2,903,918 UART: [art] Derive Key Pair
2,904,278 UART: [art] Store priv key in slot 0x5
2,917,158 UART: [art] Derive Key Pair - Done
2,931,736 UART: [art] Signing Cert with AUTHO
2,932,216 UART: RITY.KEYID = 7
2,947,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,161 UART: [art] PUB.X = 1C0AC07B70E13507B605DA9C462489250B992B63FAE1C1E1CF73181DD3A13430089182EB87EEA13B6E6334C79E999DE8
2,954,918 UART: [art] PUB.Y = F288566F3B9DEB9037A470579EF364AA1B686EFAF404629D81A3D778B3FBBCE7C746D7669D521F024BDA512F318BE4B0
2,961,872 UART: [art] SIG.R = 06EAC0F567830064B96145A94DAEAD2DA7408FB7E5BBA99585840183210A42FD38379FD63B1D564F41B60C6C61ECB444
2,968,612 UART: [art] SIG.S = DF57C4E00677C0850EC2DF200DE851CC7EB21B81BBC05E6AF6232363ECBA84A28A7813A1423E616E873ED06C21B50140
2,992,079 UART: Caliptra RT
2,992,333 UART: [state] CFI Enabled
3,101,041 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,616,806 >>> mbox cmd response: success
2,678,666 UART:
2,678,682 UART: Running Caliptra FMC ...
2,679,090 UART:
2,679,144 UART: [state] CFI Enabled
2,689,457 UART: [fht] FMC Alias Private Key: 7
2,797,580 UART: [art] Extend RT PCRs Done
2,798,008 UART: [art] Lock RT PCRs Done
2,799,416 UART: [art] Populate DV Done
2,807,509 UART: [fht] FMC Alias Private Key: 7
2,808,579 UART: [art] Derive CDI
2,808,859 UART: [art] Store in in slot 0x4
2,894,454 UART: [art] Derive Key Pair
2,894,814 UART: [art] Store priv key in slot 0x5
2,908,108 UART: [art] Derive Key Pair - Done
2,922,641 UART: [art] Signing Cert with AUTHO
2,923,121 UART: RITY.KEYID = 7
2,937,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,724 UART: [art] PUB.X = 56C79399C88C4C986F0DD0F46DF8F4074128152ECB880D422F823CDAD9D39E71E38B0D3683A20F31C6C364150A90050E
2,945,470 UART: [art] PUB.Y = 4E64F84B0F00E356F9676336C2F95A2A0D25E38A5FFBE8537AC2DBFAE6986C7877504AAB1AF6D7A971F706364B9F1CBE
2,952,403 UART: [art] SIG.R = 8FB406A36757713834529CD443E2094C652FEB96131757B582E9E48EC14F151716D30DE473D5BA7B6478C5021A5AFF9B
2,959,157 UART: [art] SIG.S = D4346A7C6273F01D43E284E67C6ABF63F7527E29CDD1F26D3FF2C62E1FFCC894F880DB9B2F8C38B3A2E629FE891526DD
2,983,448 UART: Caliptra RT
2,983,702 UART: [state] CFI Enabled
3,092,342 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,613,926 >>> mbox cmd response: success
2,675,644 UART:
2,675,660 UART: Running Caliptra FMC ...
2,676,068 UART:
2,676,122 UART: [state] CFI Enabled
2,686,627 UART: [fht] FMC Alias Private Key: 7
2,794,664 UART: [art] Extend RT PCRs Done
2,795,092 UART: [art] Lock RT PCRs Done
2,796,498 UART: [art] Populate DV Done
2,804,641 UART: [fht] FMC Alias Private Key: 7
2,805,747 UART: [art] Derive CDI
2,806,027 UART: [art] Store in in slot 0x4
2,891,814 UART: [art] Derive Key Pair
2,892,174 UART: [art] Store priv key in slot 0x5
2,905,442 UART: [art] Derive Key Pair - Done
2,919,945 UART: [art] Signing Cert with AUTHO
2,920,425 UART: RITY.KEYID = 7
2,935,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,506 UART: [art] PUB.X = D3DD6CB6027B93878AC76B683238F78904E855C423D9EA74D37B927A50E96CCAA3899B2F4A3C7D4D30D64375C759F6B6
2,943,274 UART: [art] PUB.Y = B1955EFD42FAC3CDD55A67F6649AB42D66ABC7D61500E6722F8BFE9F9B18D9E8F9C7C1BC64C1202683094D6886D79874
2,950,209 UART: [art] SIG.R = 2E26C6B4E4A67421E6F2CF8711B332F34914280BD00FAE5BA164882BE0E5DBF8612F5D1B1349FF4F2B748E36DEDC3E7D
2,956,987 UART: [art] SIG.S = 599408E7D653035EB8BE002BE27825F302F03AAD1E79D3E85F486E13E28AD79C2A6C0D7A5BC417935E407EAC6D7BC3FB
2,980,358 UART: Caliptra RT
2,980,612 UART: [state] CFI Enabled
3,088,282 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,614,324 >>> mbox cmd response: success
2,676,988 UART:
2,677,004 UART: Running Caliptra FMC ...
2,677,412 UART:
2,677,466 UART: [state] CFI Enabled
2,687,585 UART: [fht] FMC Alias Private Key: 7
2,796,044 UART: [art] Extend RT PCRs Done
2,796,472 UART: [art] Lock RT PCRs Done
2,797,788 UART: [art] Populate DV Done
2,806,125 UART: [fht] FMC Alias Private Key: 7
2,807,277 UART: [art] Derive CDI
2,807,557 UART: [art] Store in in slot 0x4
2,893,346 UART: [art] Derive Key Pair
2,893,706 UART: [art] Store priv key in slot 0x5
2,906,454 UART: [art] Derive Key Pair - Done
2,921,471 UART: [art] Signing Cert with AUTHO
2,921,951 UART: RITY.KEYID = 7
2,937,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,404 UART: [art] PUB.X = 6B6B0F9D9A43DF789F0F38AB6FF28E5C9F6F1A2D0699F3CEEFFA8B3AD0EA5B60E68CBB3348D755B9712C76058D55075B
2,945,179 UART: [art] PUB.Y = E5F8FE13B8C0F4C2104F6F85BA10A574B8C19BBDB3A38D5B936E01E7ED6FB3035BF6F288DD398378DEEF8962D12608AF
2,952,138 UART: [art] SIG.R = 8DFD1F29E6520AECB2CD15EADD2135A8A951A5D0BF3D2C00F2B1AEC8286EBDA393D2A4FBB3D2FBB7B3A82CE38678425A
2,958,913 UART: [art] SIG.S = A970F413BF642C39B15DBD6EFB6608EA93C72B432645E64A9573C48083B75C11628665BECFD2D2C9FBCF99A4F9E45E67
2,982,495 UART: Caliptra RT
2,982,749 UART: [state] CFI Enabled
3,089,104 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.71s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,903 UART: [afmc] --
2,850,847 UART: [cold-reset] --
2,851,745 UART: [state] Locking Datavault
2,852,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,540 UART: [state] Locking ICCM
2,854,194 UART: [exit] Launching FMC @ 0x40000130
2,859,523 UART:
2,859,539 UART: Running Caliptra FMC ...
2,859,947 UART:
2,860,090 UART: [state] CFI Enabled
2,871,117 UART: [fht] FMC Alias Private Key: 7
2,979,238 UART: [art] Extend RT PCRs Done
2,979,666 UART: [art] Lock RT PCRs Done
2,981,306 UART: [art] Populate DV Done
2,989,597 UART: [fht] FMC Alias Private Key: 7
2,990,545 UART: [art] Derive CDI
2,990,825 UART: [art] Store in in slot 0x4
3,076,608 UART: [art] Derive Key Pair
3,076,968 UART: [art] Store priv key in slot 0x5
3,090,534 UART: [art] Derive Key Pair - Done
3,105,331 UART: [art] Signing Cert with AUTHO
3,105,811 UART: RITY.KEYID = 7
3,120,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,542 UART: [art] PUB.X = DA1F35EABC9195A2162885D309F1950796E299EF04A98D3F14E763CACFF316E41498374B8AB076749CD2D24412AE7F22
3,128,305 UART: [art] PUB.Y = 0146F06B3D1ADC06CF3078C180646B17A395B65E98772BBB3E5F67E80FFFB6EF1CAE21698D6C416C5B264A4852AF7963
3,135,254 UART: [art] SIG.R = 4CE753A049BCB765C071CA9FC72733B0F3D658EFBDCDC0B9EC3217162CE58C1940B792E68688CD38EE86EF668A65B926
3,142,036 UART: [art] SIG.S = B1F77C11371C777F8F4F6D2EE66A754FBCB3C2750BF2DFA2F2CA569C0D5EC1841CE8D5A0130EFCD899E8DB351379CE83
3,165,642 UART: Caliptra RT
3,165,988 UART: [state] CFI Enabled
3,272,957 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,865 UART: [idev] Sha384 KeyId Algorithm
1,203,640 UART: [idev] --
1,204,593 UART: [ldev] ++
1,204,761 UART: [ldev] CDI.KEYID = 6
1,205,125 UART: [ldev] SUBJECT.KEYID = 5
1,205,552 UART: [ldev] AUTHORITY.KEYID = 7
1,206,015 UART: [ldev] FE.KEYID = 1
1,211,379 UART: [ldev] Erasing FE.KEYID = 1
1,237,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,283 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,005 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,019 UART: [ldev] --
1,277,465 UART: [fwproc] Wait for Commands...
1,278,082 UART: [fwproc] Recv command 0x46574c44
1,278,815 UART: [fwproc] Recv'd Img size: 114360 bytes
2,575,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,766,683 >>> mbox cmd response: success
2,767,898 UART: [afmc] ++
2,768,066 UART: [afmc] CDI.KEYID = 6
2,768,429 UART: [afmc] SUBJECT.KEYID = 7
2,768,855 UART: [afmc] AUTHORITY.KEYID = 5
2,805,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,847 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,566 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,373 UART: [afmc] --
2,848,433 UART: [cold-reset] --
2,849,391 UART: [state] Locking Datavault
2,850,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,222 UART: [state] Locking ICCM
2,851,696 UART: [exit] Launching FMC @ 0x40000130
2,857,025 UART:
2,857,041 UART: Running Caliptra FMC ...
2,857,449 UART:
2,857,592 UART: [state] CFI Enabled
2,868,811 UART: [fht] FMC Alias Private Key: 7
2,976,888 UART: [art] Extend RT PCRs Done
2,977,316 UART: [art] Lock RT PCRs Done
2,978,878 UART: [art] Populate DV Done
2,987,037 UART: [fht] FMC Alias Private Key: 7
2,987,973 UART: [art] Derive CDI
2,988,253 UART: [art] Store in in slot 0x4
3,074,176 UART: [art] Derive Key Pair
3,074,536 UART: [art] Store priv key in slot 0x5
3,087,826 UART: [art] Derive Key Pair - Done
3,102,663 UART: [art] Signing Cert with AUTHO
3,103,143 UART: RITY.KEYID = 7
3,118,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,882 UART: [art] PUB.X = C45DF21A80B3145CC85A0BF8E927E6BE5E65765401049C3FEB741D774C3530B07BFDE967E36BDEAC0095DC68E79A3C32
3,125,633 UART: [art] PUB.Y = 1249B104D96D4253735F4BB986DD607CF562B27A164EE52EDEBF2F63C93EA375F46A529B22F182C8262745B772498988
3,132,576 UART: [art] SIG.R = B369FA6F3BB9896D53832A25A833FC1C36DF284A21B937D52F1A3839777288CE4451D84186867C865E0F633D99A12CE9
3,139,339 UART: [art] SIG.S = CFD159F759DF599AE4791A0B89E0D19EB25D0063D34FD5A195269ECA077DD00631D339BC02F3AACBBB1D62A166B5CA62
3,162,770 UART: Caliptra RT
3,163,116 UART: [state] CFI Enabled
3,270,444 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,342 UART: [kat] SHA2-256
902,282 UART: [kat] SHA2-384
905,099 UART: [kat] SHA2-512-ACC
907,000 UART: [kat] ECC-384
917,133 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,170,836 UART: [cold-reset] ++
1,171,334 UART: [fht] FHT @ 0x50003400
1,174,018 UART: [idev] ++
1,174,186 UART: [idev] CDI.KEYID = 6
1,174,547 UART: [idev] SUBJECT.KEYID = 7
1,174,972 UART: [idev] UDS.KEYID = 0
1,183,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,479 UART: [idev] Fuse KeyId
1,201,701 UART: [idev] --
1,202,746 UART: [ldev] ++
1,202,914 UART: [ldev] CDI.KEYID = 6
1,203,278 UART: [ldev] SUBJECT.KEYID = 5
1,203,705 UART: [ldev] AUTHORITY.KEYID = 7
1,204,168 UART: [ldev] FE.KEYID = 1
1,209,074 UART: [ldev] Erasing FE.KEYID = 1
1,235,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,166 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,848 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,065 UART: [ldev] --
1,274,421 UART: [fwproc] Wait for Commands...
1,275,000 UART: [fwproc] Recv command 0x46574c44
1,275,733 UART: [fwproc] Recv'd Img size: 114360 bytes
2,574,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,766,687 >>> mbox cmd response: success
2,767,840 UART: [afmc] ++
2,768,008 UART: [afmc] CDI.KEYID = 6
2,768,371 UART: [afmc] SUBJECT.KEYID = 7
2,768,797 UART: [afmc] AUTHORITY.KEYID = 5
2,804,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,081 UART: [afmc] --
2,848,061 UART: [cold-reset] --
2,848,847 UART: [state] Locking Datavault
2,850,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,694 UART: [state] Locking ICCM
2,851,350 UART: [exit] Launching FMC @ 0x40000130
2,856,679 UART:
2,856,695 UART: Running Caliptra FMC ...
2,857,103 UART:
2,857,246 UART: [state] CFI Enabled
2,868,151 UART: [fht] FMC Alias Private Key: 7
2,976,006 UART: [art] Extend RT PCRs Done
2,976,434 UART: [art] Lock RT PCRs Done
2,977,808 UART: [art] Populate DV Done
2,986,253 UART: [fht] FMC Alias Private Key: 7
2,987,237 UART: [art] Derive CDI
2,987,517 UART: [art] Store in in slot 0x4
3,073,272 UART: [art] Derive Key Pair
3,073,632 UART: [art] Store priv key in slot 0x5
3,086,706 UART: [art] Derive Key Pair - Done
3,101,541 UART: [art] Signing Cert with AUTHO
3,102,021 UART: RITY.KEYID = 7
3,117,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,036 UART: [art] PUB.X = 82EF9297A6E30420FC3407CAFB29189E74D5A00EE0B0FE2FE3BFF5F23723465BBB5390E77D5212D0791F550C3AF01DC0
3,124,804 UART: [art] PUB.Y = 4FF54C570432804B6923FA9E12DD38ED7942D879504A64FA60AC66065D08C1E7A56BFE2093BB4E67ACAB150A5FFCDAC8
3,131,756 UART: [art] SIG.R = 0C4A6A276BFE5E77746B8089E7AA393E52F746C9AD01E9606738C56FD7B8E2FA695E667023F950B9C9AB567075FC3B1C
3,138,526 UART: [art] SIG.S = B8C5C8DA886C376189E5F121EBB9B0DB95A54B0B3E16D26E2752290FE94B6F7EB0C1A53C00A10897196F767D77A9638F
3,162,168 UART: Caliptra RT
3,162,514 UART: [state] CFI Enabled
3,270,996 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,117 >>> mbox cmd response: success
2,684,881 UART:
2,684,897 UART: Running Caliptra FMC ...
2,685,305 UART:
2,685,448 UART: [state] CFI Enabled
2,695,869 UART: [fht] FMC Alias Private Key: 7
2,803,380 UART: [art] Extend RT PCRs Done
2,803,808 UART: [art] Lock RT PCRs Done
2,805,170 UART: [art] Populate DV Done
2,813,119 UART: [fht] FMC Alias Private Key: 7
2,814,107 UART: [art] Derive CDI
2,814,387 UART: [art] Store in in slot 0x4
2,900,298 UART: [art] Derive Key Pair
2,900,658 UART: [art] Store priv key in slot 0x5
2,913,930 UART: [art] Derive Key Pair - Done
2,928,639 UART: [art] Signing Cert with AUTHO
2,929,119 UART: RITY.KEYID = 7
2,944,233 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,998 UART: [art] PUB.X = 6C1CC4111E92301045CD16DC072D2EBE1D0A1091748FAC05B334BB9B3F338B2BF94E046A5BD18ABF4071DAFEDFF304D1
2,951,771 UART: [art] PUB.Y = 01D5051389A377B8F977749C279EC052ED58AB2EA422F4A9B0DF42FE43325CE0D2E886B968441AB4D517F31A39FC155D
2,958,719 UART: [art] SIG.R = F0EC257821D341D3BEA0B302387DC8B3F9989A9080596A798EC36D508509137C21776E668EC432C6A38D988BB6B83525
2,965,477 UART: [art] SIG.S = 3A96E7C078711902F61724BC9667C67A21F21596D560397651E9EB97C1E90953F8818E950E7FA693C47CF9F2131D7ABF
2,989,031 UART: Caliptra RT
2,989,377 UART: [state] CFI Enabled
3,097,297 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,618,593 >>> mbox cmd response: success
2,679,787 UART:
2,679,803 UART: Running Caliptra FMC ...
2,680,211 UART:
2,680,354 UART: [state] CFI Enabled
2,690,945 UART: [fht] FMC Alias Private Key: 7
2,799,874 UART: [art] Extend RT PCRs Done
2,800,302 UART: [art] Lock RT PCRs Done
2,801,644 UART: [art] Populate DV Done
2,810,073 UART: [fht] FMC Alias Private Key: 7
2,811,031 UART: [art] Derive CDI
2,811,311 UART: [art] Store in in slot 0x4
2,896,968 UART: [art] Derive Key Pair
2,897,328 UART: [art] Store priv key in slot 0x5
2,910,528 UART: [art] Derive Key Pair - Done
2,924,789 UART: [art] Signing Cert with AUTHO
2,925,269 UART: RITY.KEYID = 7
2,941,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,772 UART: [art] PUB.X = 7A08143158ADC2EB21EAF488779D5921DEB71FF1ABC122C28E3569BC0284B5C75DFFA66704231EBF4A876B06AC4A0F4F
2,948,541 UART: [art] PUB.Y = 79D7B4CAB0A320CE390072AABC92D0C9E660892D649E31C17FCF3AD06C5E8403AD1315DF323AE49C27EC10C643F59C63
2,955,478 UART: [art] SIG.R = 461280D7B3CC3754B1FAA834E778D18F7F6151A4AA83CD2979A76E243F6F2EFB9950279C6D41775C7C346FA0380A985E
2,962,247 UART: [art] SIG.S = 8AEA697204E33077B1C53FAE7E37E3C4F3DAA9A6BC59E3D85D1BEAF711EE7DF0C22DFAD24411D04EEC94713BA6B3BFEE
2,986,309 UART: Caliptra RT
2,986,655 UART: [state] CFI Enabled
3,094,382 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,761 >>> mbox cmd response: success
2,681,727 UART:
2,681,743 UART: Running Caliptra FMC ...
2,682,151 UART:
2,682,294 UART: [state] CFI Enabled
2,692,849 UART: [fht] FMC Alias Private Key: 7
2,800,796 UART: [art] Extend RT PCRs Done
2,801,224 UART: [art] Lock RT PCRs Done
2,802,866 UART: [art] Populate DV Done
2,811,191 UART: [fht] FMC Alias Private Key: 7
2,812,269 UART: [art] Derive CDI
2,812,549 UART: [art] Store in in slot 0x4
2,898,150 UART: [art] Derive Key Pair
2,898,510 UART: [art] Store priv key in slot 0x5
2,911,562 UART: [art] Derive Key Pair - Done
2,926,259 UART: [art] Signing Cert with AUTHO
2,926,739 UART: RITY.KEYID = 7
2,942,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,930 UART: [art] PUB.X = B37C0434CA1E1E246C4A21E7C167D7C2E56AE97B9F679345C21B8B06581EEED3F31ADD66ABF659B680F860F5B2CDDC78
2,949,710 UART: [art] PUB.Y = DB556ECE0651D22F2BBB23D8348B700098E1771E05718CB3B7C37DAF9BE1DC8FBA6AFD6ACFF8F57C62DCBB4FA5642C1E
2,956,660 UART: [art] SIG.R = E01E69F1A174211C0180223FF8F03EAA8CFED4625102996D8FDF6C2B372697A1585D792CE9CE69528358AF3ADBAAD8DB
2,963,436 UART: [art] SIG.S = C1FF673B2C5C728E8388EFEEEA903922220173216BCF5802C49B9178C1685D073A329C862300C46894380E23756CCFB6
2,987,211 UART: Caliptra RT
2,987,557 UART: [state] CFI Enabled
3,095,267 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,615,499 >>> mbox cmd response: success
2,677,635 UART:
2,677,651 UART: Running Caliptra FMC ...
2,678,059 UART:
2,678,202 UART: [state] CFI Enabled
2,688,871 UART: [fht] FMC Alias Private Key: 7
2,796,700 UART: [art] Extend RT PCRs Done
2,797,128 UART: [art] Lock RT PCRs Done
2,798,896 UART: [art] Populate DV Done
2,807,171 UART: [fht] FMC Alias Private Key: 7
2,808,281 UART: [art] Derive CDI
2,808,561 UART: [art] Store in in slot 0x4
2,894,356 UART: [art] Derive Key Pair
2,894,716 UART: [art] Store priv key in slot 0x5
2,908,072 UART: [art] Derive Key Pair - Done
2,922,724 UART: [art] Signing Cert with AUTHO
2,923,204 UART: RITY.KEYID = 7
2,938,314 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,079 UART: [art] PUB.X = 49E11161BB4C749BE963C409DAE420F24E523471C1D9AC8F4F19D6678B8C243D56BEF78F3DE91AA9B10B7BECAB480932
2,945,852 UART: [art] PUB.Y = 87658C0F86551756CB4EECB0D61B8EE09F5E9FDDB33972FFC660227A50458277F066F3A5155A22D4C0F17B00C861478C
2,952,779 UART: [art] SIG.R = B3902C8DBE89B5090F94A4AE1F596F77C8B488B752796647B282AA685AC9091251D569CEDB4F3EC6EBE80F0A1FC15A0C
2,959,543 UART: [art] SIG.S = 9B923169E1DDC2DAD6E311B3BC6413155CCF47EC5EEC2660CE75971213129DF5754C37C93B7C3B243BD760C086967161
2,982,604 UART: Caliptra RT
2,982,950 UART: [state] CFI Enabled
3,089,969 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.74s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,166 UART: [afmc] --
2,849,128 UART: [cold-reset] --
2,849,976 UART: [state] Locking Datavault
2,851,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,611 UART: [state] Locking ICCM
2,852,173 UART: [exit] Launching FMC @ 0x40000130
2,857,502 UART:
2,857,518 UART: Running Caliptra FMC ...
2,857,926 UART:
2,857,980 UART: [state] CFI Enabled
2,868,553 UART: [fht] FMC Alias Private Key: 7
2,976,486 UART: [art] Extend RT PCRs Done
2,976,914 UART: [art] Lock RT PCRs Done
2,978,478 UART: [art] Populate DV Done
2,986,843 UART: [fht] FMC Alias Private Key: 7
2,987,793 UART: [art] Derive CDI
2,988,073 UART: [art] Store in in slot 0x4
3,073,512 UART: [art] Derive Key Pair
3,073,872 UART: [art] Store priv key in slot 0x5
3,087,302 UART: [art] Derive Key Pair - Done
3,102,148 UART: [art] Signing Cert with AUTHO
3,102,628 UART: RITY.KEYID = 7
3,117,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,237 UART: [art] PUB.X = A09AFB27F36721D0F8FD64EA5CC292B9C7DE913B53CDB905FE2AB9CB766A7D89B1430D2A50FEC17F771F6F5D7BD5C350
3,125,023 UART: [art] PUB.Y = CD7D67347BE7AE5D7CF6B0B49615E6E4F8310DCB199A64E0E342693718CDFF9B780CF7941456C6EBF524D867C89FDFB0
3,131,981 UART: [art] SIG.R = B7B08802097ACE6D9FD1161D0A70F9F044C898C1178E787F73D9527A8999B01356EF1088B4731E86C1C4CF095F1C715E
3,138,737 UART: [art] SIG.S = 474E32312490F587DA50017708E4C14CAD9E87156023101593F7A11619AF80ADF24CEF60E585347177D90936CB0F04B6
3,162,663 UART: Caliptra RT
3,162,917 UART: [state] CFI Enabled
3,269,748 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha384 KeyId Algorithm
1,203,447 UART: [idev] --
1,204,348 UART: [ldev] ++
1,204,516 UART: [ldev] CDI.KEYID = 6
1,204,880 UART: [ldev] SUBJECT.KEYID = 5
1,205,307 UART: [ldev] AUTHORITY.KEYID = 7
1,205,770 UART: [ldev] FE.KEYID = 1
1,210,980 UART: [ldev] Erasing FE.KEYID = 1
1,237,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,898 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,620 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,532 UART: [ldev] --
1,277,020 UART: [fwproc] Wait for Commands...
1,277,793 UART: [fwproc] Recv command 0x46574c44
1,278,526 UART: [fwproc] Recv'd Img size: 114360 bytes
2,576,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,768,316 >>> mbox cmd response: success
2,769,475 UART: [afmc] ++
2,769,643 UART: [afmc] CDI.KEYID = 6
2,770,006 UART: [afmc] SUBJECT.KEYID = 7
2,770,432 UART: [afmc] AUTHORITY.KEYID = 5
2,806,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,336 UART: [afmc] --
2,849,454 UART: [cold-reset] --
2,850,082 UART: [state] Locking Datavault
2,851,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,041 UART: [state] Locking ICCM
2,852,671 UART: [exit] Launching FMC @ 0x40000130
2,858,000 UART:
2,858,016 UART: Running Caliptra FMC ...
2,858,424 UART:
2,858,478 UART: [state] CFI Enabled
2,868,901 UART: [fht] FMC Alias Private Key: 7
2,977,286 UART: [art] Extend RT PCRs Done
2,977,714 UART: [art] Lock RT PCRs Done
2,979,824 UART: [art] Populate DV Done
2,988,103 UART: [fht] FMC Alias Private Key: 7
2,989,155 UART: [art] Derive CDI
2,989,435 UART: [art] Store in in slot 0x4
3,074,972 UART: [art] Derive Key Pair
3,075,332 UART: [art] Store priv key in slot 0x5
3,088,272 UART: [art] Derive Key Pair - Done
3,102,899 UART: [art] Signing Cert with AUTHO
3,103,379 UART: RITY.KEYID = 7
3,118,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,280 UART: [art] PUB.X = 4CD5671BB821AF796BC557464DBD7C1F6BA43D37CE0B43274DE6480CBEDAA352E422A11EB7D325D4FDDB1FFC9DA45FA9
3,126,070 UART: [art] PUB.Y = EB4759B61789C24AD57CA611D292F9C072A2B13B0276C9336665E05305F50E2B28E9A96567B152697D2EE27DC0C340AA
3,133,009 UART: [art] SIG.R = A37C9117286754FC5AE8CF15C5DD28B43488A943104F85732C673EE31F0FB4704B5C071A4991D670ABE85F19D5222208
3,139,766 UART: [art] SIG.S = 88D20BE179EC5665D507A61D0FD6E3EA3D37AC29ECC0028510DD3174494ED2D0AF24AACCB57CA381BDC31E7876F708B6
3,163,666 UART: Caliptra RT
3,163,920 UART: [state] CFI Enabled
3,271,340 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,170,245 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,182,251 UART: [idev] Erasing UDS.KEYID = 0
1,199,050 UART: [idev] Fuse KeyId
1,200,272 UART: [idev] --
1,201,337 UART: [ldev] ++
1,201,505 UART: [ldev] CDI.KEYID = 6
1,201,869 UART: [ldev] SUBJECT.KEYID = 5
1,202,296 UART: [ldev] AUTHORITY.KEYID = 7
1,202,759 UART: [ldev] FE.KEYID = 1
1,208,141 UART: [ldev] Erasing FE.KEYID = 1
1,234,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,947 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,629 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,576 UART: [ldev] --
1,273,928 UART: [fwproc] Wait for Commands...
1,274,529 UART: [fwproc] Recv command 0x46574c44
1,275,262 UART: [fwproc] Recv'd Img size: 114360 bytes
2,571,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,764,228 >>> mbox cmd response: success
2,765,421 UART: [afmc] ++
2,765,589 UART: [afmc] CDI.KEYID = 6
2,765,952 UART: [afmc] SUBJECT.KEYID = 7
2,766,378 UART: [afmc] AUTHORITY.KEYID = 5
2,801,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,693 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,118 UART: [afmc] --
2,845,014 UART: [cold-reset] --
2,845,876 UART: [state] Locking Datavault
2,846,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,543 UART: [state] Locking ICCM
2,848,151 UART: [exit] Launching FMC @ 0x40000130
2,853,480 UART:
2,853,496 UART: Running Caliptra FMC ...
2,853,904 UART:
2,853,958 UART: [state] CFI Enabled
2,864,383 UART: [fht] FMC Alias Private Key: 7
2,972,158 UART: [art] Extend RT PCRs Done
2,972,586 UART: [art] Lock RT PCRs Done
2,974,084 UART: [art] Populate DV Done
2,982,205 UART: [fht] FMC Alias Private Key: 7
2,983,319 UART: [art] Derive CDI
2,983,599 UART: [art] Store in in slot 0x4
3,069,784 UART: [art] Derive Key Pair
3,070,144 UART: [art] Store priv key in slot 0x5
3,083,210 UART: [art] Derive Key Pair - Done
3,097,876 UART: [art] Signing Cert with AUTHO
3,098,356 UART: RITY.KEYID = 7
3,113,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,113,857 UART: [art] PUB.X = A26FEE4734F3F6ED8CC57BCCE80E803AC2F520A80BA2627FDF2F5B221E3E80F8129DA432B47A9503561C2DC352E9E287
3,120,632 UART: [art] PUB.Y = 70B374719B248740AC87C67AA1E94AEC5FE479A6A44A7FDDC71D26C54FB38E2D9BAF144FB84B4ECBC077735600490902
3,127,564 UART: [art] SIG.R = 34F972F0E1BDF29EFE9D7136CD1999C97D5F29E75DE8FEBF37E298FB5BD0E8EDB9EC5546A13FE5AB13853D06C23F35B2
3,134,353 UART: [art] SIG.S = 827CC9E8BFCE86611697E7BF65601C3E0BE9CB9DE49B3BDCD9FC00F0E5B2A50F1C6F12D24A8919FB3611E1ABD491F49C
3,158,764 UART: Caliptra RT
3,159,018 UART: [state] CFI Enabled
3,266,002 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,960 >>> mbox cmd response: success
2,686,662 UART:
2,686,678 UART: Running Caliptra FMC ...
2,687,086 UART:
2,687,140 UART: [state] CFI Enabled
2,697,481 UART: [fht] FMC Alias Private Key: 7
2,805,680 UART: [art] Extend RT PCRs Done
2,806,108 UART: [art] Lock RT PCRs Done
2,807,632 UART: [art] Populate DV Done
2,816,041 UART: [fht] FMC Alias Private Key: 7
2,817,061 UART: [art] Derive CDI
2,817,341 UART: [art] Store in in slot 0x4
2,902,610 UART: [art] Derive Key Pair
2,902,970 UART: [art] Store priv key in slot 0x5
2,916,344 UART: [art] Derive Key Pair - Done
2,930,912 UART: [art] Signing Cert with AUTHO
2,931,392 UART: RITY.KEYID = 7
2,946,478 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,243 UART: [art] PUB.X = DB0851E30E34A05C5DCEEDB894D714628E49834DEA6A98D2CD9CDAFCCE3A4930A959154EDD2860280EE02E0AB3B475D9
2,954,019 UART: [art] PUB.Y = 5F5A8B5480CEA8255255AE5425B5AD66F9C3DD2C1F129B66B2A6825EAEB4DC420B386CDE16B6CF1274B5CEA4C640F3F4
2,960,984 UART: [art] SIG.R = ADFACD8F2856E060BFACCEFF4A5FB04A0EFD9F47325BB193DFB936AF0689FD9078D8CDBCD2E6FB310531EF5A38E39EBE
2,967,781 UART: [art] SIG.S = AC89C0C0CD4071C7F06DE6646E02589F0D30D1498A99A14F9BD99CED41886C703E825D27F538E8636B208DDD620E2AC7
2,991,863 UART: Caliptra RT
2,992,117 UART: [state] CFI Enabled
3,100,724 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,617,984 >>> mbox cmd response: success
2,679,484 UART:
2,679,500 UART: Running Caliptra FMC ...
2,679,908 UART:
2,679,962 UART: [state] CFI Enabled
2,690,565 UART: [fht] FMC Alias Private Key: 7
2,797,866 UART: [art] Extend RT PCRs Done
2,798,294 UART: [art] Lock RT PCRs Done
2,799,758 UART: [art] Populate DV Done
2,807,965 UART: [fht] FMC Alias Private Key: 7
2,809,055 UART: [art] Derive CDI
2,809,335 UART: [art] Store in in slot 0x4
2,895,196 UART: [art] Derive Key Pair
2,895,556 UART: [art] Store priv key in slot 0x5
2,908,986 UART: [art] Derive Key Pair - Done
2,923,522 UART: [art] Signing Cert with AUTHO
2,924,002 UART: RITY.KEYID = 7
2,939,004 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,769 UART: [art] PUB.X = 11E6F52E2783CDBDE3DEBFD204C06E5D41200B8CE2A3DD1E4D85BF3AEA413131D2EAC499C6545E07EB788FAD97109193
2,946,548 UART: [art] PUB.Y = F2A58A7EF934F91665BE83707310E039DBB82FD74A00BC0B083FC488E6890885466F12F206E3878CD56CA2BA138089D2
2,953,464 UART: [art] SIG.R = 88F6A8C3405267108A8C987CD1155277B506C4CD6914945BF2832DBD61FD9AE6D0ACAEC9F275E05A02BCCE561CDF451F
2,960,240 UART: [art] SIG.S = C7C9582E68EDA406E0FD40542E60E359FFCAD1EBA7D3E08C85E67D1CF179B8021BD96BBB88DA5BC090723D1F67C3AD35
2,983,927 UART: Caliptra RT
2,984,181 UART: [state] CFI Enabled
3,092,097 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,616,112 >>> mbox cmd response: success
2,678,064 UART:
2,678,080 UART: Running Caliptra FMC ...
2,678,488 UART:
2,678,542 UART: [state] CFI Enabled
2,688,875 UART: [fht] FMC Alias Private Key: 7
2,797,866 UART: [art] Extend RT PCRs Done
2,798,294 UART: [art] Lock RT PCRs Done
2,799,720 UART: [art] Populate DV Done
2,807,785 UART: [fht] FMC Alias Private Key: 7
2,808,831 UART: [art] Derive CDI
2,809,111 UART: [art] Store in in slot 0x4
2,895,008 UART: [art] Derive Key Pair
2,895,368 UART: [art] Store priv key in slot 0x5
2,908,836 UART: [art] Derive Key Pair - Done
2,923,599 UART: [art] Signing Cert with AUTHO
2,924,079 UART: RITY.KEYID = 7
2,939,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,318 UART: [art] PUB.X = DDD445BE56653C7A942D5AC54D768E1C0C13B721540E2B7E5DFD0C285190B6168DF3B7E81D9B02AA32F37C509B296BC6
2,947,086 UART: [art] PUB.Y = 0E4349D9197A96A456DA9F1ED51C9C7B2BBF0CE6CE5AC0DD1BC195E04CDBB3DD1CF7782E1261ED75AE1B064B32B6410A
2,954,048 UART: [art] SIG.R = AD3E97A2C5E6B1A21AA1E826FA9D3C3FCBE0B2589BD080243481971C248390C0563DB7C985D07C1070F69CE5F7FAB49E
2,960,830 UART: [art] SIG.S = 80C28D10B075E6BB23219D102DCCFBCFB05DD78895FA260EE5C5333CC063F90C34B059F6A4F5AB0A0FEB1D2FBA3DFB46
2,984,773 UART: Caliptra RT
2,985,027 UART: [state] CFI Enabled
3,091,011 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,614,800 >>> mbox cmd response: success
2,676,550 UART:
2,676,566 UART: Running Caliptra FMC ...
2,676,974 UART:
2,677,028 UART: [state] CFI Enabled
2,687,463 UART: [fht] FMC Alias Private Key: 7
2,795,720 UART: [art] Extend RT PCRs Done
2,796,148 UART: [art] Lock RT PCRs Done
2,797,626 UART: [art] Populate DV Done
2,805,721 UART: [fht] FMC Alias Private Key: 7
2,806,789 UART: [art] Derive CDI
2,807,069 UART: [art] Store in in slot 0x4
2,892,958 UART: [art] Derive Key Pair
2,893,318 UART: [art] Store priv key in slot 0x5
2,906,262 UART: [art] Derive Key Pair - Done
2,920,974 UART: [art] Signing Cert with AUTHO
2,921,454 UART: RITY.KEYID = 7
2,936,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,297 UART: [art] PUB.X = 998AAC78662B5B8217C81EAF11A73291EC84EC21F173739F994C330BB9CB200B513D0D4CF727A7B1F0BB95D86D6AC7C6
2,944,068 UART: [art] PUB.Y = 7C9A913D481F554BE4D9C9755D73AEC7C6D9216774727A638D5667AC415B6F3FBD0BFEA9A1F28B79BD0FE39780763BA6
2,951,022 UART: [art] SIG.R = BC4AFC8C065B33A03A9B5EAF45AF76F68AFC9456C57DCFAAE8AF388FE4C86255D7F898289E4DD887955A247ABABA00F7
2,957,791 UART: [art] SIG.S = ED65AF3332B5C85DB9058CE517B018145BDCC2957B26BBC3D2D3637738FBD9381DFC59817E99574435BE7B7E86F09340
2,981,265 UART: Caliptra RT
2,981,519 UART: [state] CFI Enabled
3,089,082 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.67s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,833 UART: [afmc] --
2,849,817 UART: [cold-reset] --
2,850,689 UART: [state] Locking Datavault
2,851,932 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,536 UART: [state] Locking ICCM
2,853,074 UART: [exit] Launching FMC @ 0x40000130
2,858,403 UART:
2,858,419 UART: Running Caliptra FMC ...
2,858,827 UART:
2,858,970 UART: [state] CFI Enabled
2,869,317 UART: [fht] FMC Alias Private Key: 7
2,977,008 UART: [art] Extend RT PCRs Done
2,977,436 UART: [art] Lock RT PCRs Done
2,979,050 UART: [art] Populate DV Done
2,987,139 UART: [fht] FMC Alias Private Key: 7
2,988,281 UART: [art] Derive CDI
2,988,561 UART: [art] Store in in slot 0x4
3,073,968 UART: [art] Derive Key Pair
3,074,328 UART: [art] Store priv key in slot 0x5
3,087,454 UART: [art] Derive Key Pair - Done
3,102,168 UART: [art] Signing Cert with AUTHO
3,102,648 UART: RITY.KEYID = 7
3,117,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,597 UART: [art] PUB.X = A70FB1BDD57F2860965394BB8280FD2641316E2CD8EBB2A64FE52084B61582873AC62A5338A064D828CCA5210CA5979E
3,125,363 UART: [art] PUB.Y = 3560433A0457A3A28B52CCC66D2AD968590466582E7CEC2D9C8EA3DE620E9008C98A939B71A1CA3C3C11EA68C75919F3
3,132,305 UART: [art] SIG.R = 89A8D304773DFDB9C9B5C954C3344D89887FE3DC31C1EC0C2C8F629694E1D5A42B2593E191E1834F76C1C0A40FDC83F9
3,139,074 UART: [art] SIG.S = CC449E603B79CF633F3547BCC7615388C0A810AD523F5C60EF5EED1AAD1295E3D6F9462BA12C69EFBA303F94072B295D
3,163,204 UART: Caliptra RT
3,163,550 UART: [state] CFI Enabled
3,270,794 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,633 UART: [kat] HMAC-384Kdf
921,239 UART: [kat] LMS
1,169,551 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha384 KeyId Algorithm
1,203,196 UART: [idev] --
1,204,325 UART: [ldev] ++
1,204,493 UART: [ldev] CDI.KEYID = 6
1,204,857 UART: [ldev] SUBJECT.KEYID = 5
1,205,284 UART: [ldev] AUTHORITY.KEYID = 7
1,205,747 UART: [ldev] FE.KEYID = 1
1,211,229 UART: [ldev] Erasing FE.KEYID = 1
1,237,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,357 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,079 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,219 UART: [ldev] --
1,277,605 UART: [fwproc] Wait for Commands...
1,278,262 UART: [fwproc] Recv command 0x46574c44
1,278,995 UART: [fwproc] Recv'd Img size: 114360 bytes
2,576,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,769,033 >>> mbox cmd response: success
2,770,186 UART: [afmc] ++
2,770,354 UART: [afmc] CDI.KEYID = 6
2,770,717 UART: [afmc] SUBJECT.KEYID = 7
2,771,143 UART: [afmc] AUTHORITY.KEYID = 5
2,807,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,809 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,341 UART: [afmc] --
2,851,297 UART: [cold-reset] --
2,852,213 UART: [state] Locking Datavault
2,853,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,836 UART: [state] Locking ICCM
2,854,500 UART: [exit] Launching FMC @ 0x40000130
2,859,829 UART:
2,859,845 UART: Running Caliptra FMC ...
2,860,253 UART:
2,860,396 UART: [state] CFI Enabled
2,870,837 UART: [fht] FMC Alias Private Key: 7
2,978,910 UART: [art] Extend RT PCRs Done
2,979,338 UART: [art] Lock RT PCRs Done
2,980,722 UART: [art] Populate DV Done
2,988,781 UART: [fht] FMC Alias Private Key: 7
2,989,765 UART: [art] Derive CDI
2,990,045 UART: [art] Store in in slot 0x4
3,075,374 UART: [art] Derive Key Pair
3,075,734 UART: [art] Store priv key in slot 0x5
3,089,156 UART: [art] Derive Key Pair - Done
3,103,979 UART: [art] Signing Cert with AUTHO
3,104,459 UART: RITY.KEYID = 7
3,119,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,320 UART: [art] PUB.X = 81A2453A2565CBE427AD3BBF34D66D8B78862495C512A737A23D11E3478769292A986D18046DDF3E29B0C0297757A305
3,127,076 UART: [art] PUB.Y = CEDE9FA365DBBE17D48B8C1DF5EA709ED57E060287AD26F1E70B446C7497D946059D5653FD9F4C49D985310B3EE1A2CC
3,134,027 UART: [art] SIG.R = 54420AC44569F44846504255CB83ACAB4207DC3E921E72301774494881B5E525C23085A78664A765E797E999CC2A79C6
3,140,777 UART: [art] SIG.S = 42603470ACFE2B24837211E2838222C930DCCDE862C4A673834EB8C91D27F2EADCF8496242E8790F430B7F8A9E341C41
3,164,774 UART: Caliptra RT
3,165,120 UART: [state] CFI Enabled
3,272,706 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Fuse KeyId
1,200,475 UART: [idev] --
1,201,540 UART: [ldev] ++
1,201,708 UART: [ldev] CDI.KEYID = 6
1,202,072 UART: [ldev] SUBJECT.KEYID = 5
1,202,499 UART: [ldev] AUTHORITY.KEYID = 7
1,202,962 UART: [ldev] FE.KEYID = 1
1,208,398 UART: [ldev] Erasing FE.KEYID = 1
1,234,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,522 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,204 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,271 UART: [ldev] --
1,273,779 UART: [fwproc] Wait for Commands...
1,274,366 UART: [fwproc] Recv command 0x46574c44
1,275,099 UART: [fwproc] Recv'd Img size: 114360 bytes
2,573,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,765,877 >>> mbox cmd response: success
2,767,124 UART: [afmc] ++
2,767,292 UART: [afmc] CDI.KEYID = 6
2,767,655 UART: [afmc] SUBJECT.KEYID = 7
2,768,081 UART: [afmc] AUTHORITY.KEYID = 5
2,803,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,172 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,901 UART: [afmc] --
2,846,847 UART: [cold-reset] --
2,847,633 UART: [state] Locking Datavault
2,848,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,432 UART: [state] Locking ICCM
2,850,038 UART: [exit] Launching FMC @ 0x40000130
2,855,367 UART:
2,855,383 UART: Running Caliptra FMC ...
2,855,791 UART:
2,855,934 UART: [state] CFI Enabled
2,866,383 UART: [fht] FMC Alias Private Key: 7
2,973,834 UART: [art] Extend RT PCRs Done
2,974,262 UART: [art] Lock RT PCRs Done
2,975,832 UART: [art] Populate DV Done
2,984,245 UART: [fht] FMC Alias Private Key: 7
2,985,261 UART: [art] Derive CDI
2,985,541 UART: [art] Store in in slot 0x4
3,071,314 UART: [art] Derive Key Pair
3,071,674 UART: [art] Store priv key in slot 0x5
3,084,784 UART: [art] Derive Key Pair - Done
3,099,590 UART: [art] Signing Cert with AUTHO
3,100,070 UART: RITY.KEYID = 7
3,115,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,063 UART: [art] PUB.X = 85FFDDD4904C4709B90806712D87712066B234ED4CD91F43CA2BECF13B034B0D2B1B4F190C46626CB6EB0B330DF670CC
3,122,819 UART: [art] PUB.Y = FB62E09B652714A66234B38431438A41D9DF118D2F3910EEEE0D2E0346C03856C58807987A66FD7218C768224601756D
3,129,745 UART: [art] SIG.R = 56B41BAA7E0E52BF11A3B634E2B049A7231EA48DEA88D65B54C7BDEB7B71F19980A1CF0BD032B85A8FB406CB381C9E4F
3,136,526 UART: [art] SIG.S = C855513BA486A8AF213BAF4A3B7A827A6EA0D8367EFF5ACB1A9D36571F7A2286964343CE82561CE10D6509357A6F318E
3,160,411 UART: Caliptra RT
3,160,757 UART: [state] CFI Enabled
3,269,051 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,273 >>> mbox cmd response: success
2,687,263 UART:
2,687,279 UART: Running Caliptra FMC ...
2,687,687 UART:
2,687,830 UART: [state] CFI Enabled
2,698,351 UART: [fht] FMC Alias Private Key: 7
2,806,618 UART: [art] Extend RT PCRs Done
2,807,046 UART: [art] Lock RT PCRs Done
2,808,446 UART: [art] Populate DV Done
2,816,665 UART: [fht] FMC Alias Private Key: 7
2,817,785 UART: [art] Derive CDI
2,818,065 UART: [art] Store in in slot 0x4
2,903,960 UART: [art] Derive Key Pair
2,904,320 UART: [art] Store priv key in slot 0x5
2,918,026 UART: [art] Derive Key Pair - Done
2,932,677 UART: [art] Signing Cert with AUTHO
2,933,157 UART: RITY.KEYID = 7
2,948,703 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,468 UART: [art] PUB.X = 02575D26479F069AA2397DD0B8355B9EEF05B3994FAD37A8B28C8A0320BD1B74040ECEF01B75C43466998510296CD57F
2,956,220 UART: [art] PUB.Y = 376A19F9279028402393A2EEA04912B2A867889B1980E4E17A0455081782E01F62A378226324B8A990E43C4B7562108D
2,963,144 UART: [art] SIG.R = BA122378BBB1CBF4565E46A7B1B34B8D7053F8F6A89D3C22B1725C2153702638B3E6BE4313A6A65270E9CCF1AC89AC2E
2,969,924 UART: [art] SIG.S = 14FD02B1873222445E435E0CE0047AC50056A4E9C36294F40A87DB6D8BF0E48CF120B2EF29ACA96A1A96BCC6221F7BAF
2,994,399 UART: Caliptra RT
2,994,745 UART: [state] CFI Enabled
3,102,069 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,389 >>> mbox cmd response: success
2,681,983 UART:
2,681,999 UART: Running Caliptra FMC ...
2,682,407 UART:
2,682,550 UART: [state] CFI Enabled
2,693,029 UART: [fht] FMC Alias Private Key: 7
2,801,518 UART: [art] Extend RT PCRs Done
2,801,946 UART: [art] Lock RT PCRs Done
2,803,810 UART: [art] Populate DV Done
2,811,957 UART: [fht] FMC Alias Private Key: 7
2,813,011 UART: [art] Derive CDI
2,813,291 UART: [art] Store in in slot 0x4
2,899,258 UART: [art] Derive Key Pair
2,899,618 UART: [art] Store priv key in slot 0x5
2,912,466 UART: [art] Derive Key Pair - Done
2,927,579 UART: [art] Signing Cert with AUTHO
2,928,059 UART: RITY.KEYID = 7
2,943,381 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,146 UART: [art] PUB.X = 453EB93FD37F00D63D0E812CF0DBDF74336E9B7D69F391091CF99E46A291EEA4B303287AFE9C465F8D8F8A9503C9D530
2,950,892 UART: [art] PUB.Y = E7B530206CC3D0E6AC0E3DCF440AE4C223BA88964762A73B3D2786473A8DB079C8CDECEA0CC05100A815A2F0B12AD892
2,957,825 UART: [art] SIG.R = B95240F5A118F5E7BAB2A1A45410A4BD52FCCF79A029D2F9DAA36DB6485518671042D473849A8380D8771BD365DF979C
2,964,599 UART: [art] SIG.S = 733E9810F37819A0BB79FA09C6F00CE9C783716B3FFB0BD127427E4BC70296E68114E65388E1BFFB237E78794C299E83
2,988,078 UART: Caliptra RT
2,988,424 UART: [state] CFI Enabled
3,096,409 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,618,637 >>> mbox cmd response: success
2,681,021 UART:
2,681,037 UART: Running Caliptra FMC ...
2,681,445 UART:
2,681,588 UART: [state] CFI Enabled
2,692,255 UART: [fht] FMC Alias Private Key: 7
2,800,072 UART: [art] Extend RT PCRs Done
2,800,500 UART: [art] Lock RT PCRs Done
2,801,812 UART: [art] Populate DV Done
2,810,269 UART: [fht] FMC Alias Private Key: 7
2,811,209 UART: [art] Derive CDI
2,811,489 UART: [art] Store in in slot 0x4
2,897,336 UART: [art] Derive Key Pair
2,897,696 UART: [art] Store priv key in slot 0x5
2,910,732 UART: [art] Derive Key Pair - Done
2,925,479 UART: [art] Signing Cert with AUTHO
2,925,959 UART: RITY.KEYID = 7
2,941,041 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,806 UART: [art] PUB.X = 491D3E45F93EE99CF66BE45AA9BC13DB815B34D3BA728F20583D629F3CD07F81B11C184677FD4312A106595074A98ED9
2,948,577 UART: [art] PUB.Y = E888CD6CD965ED5FE42C1C16B2FC5A06427C338CEEDD152159B8AC4346C9E1CFCA63DBE9E1F68A7632956866A9322CC7
2,955,540 UART: [art] SIG.R = E4FA15297167FC504C37DF5787E8A29EFDF48FDB308243E9D41CB0601BA99387384F991A19E7C79D69E01D83AF7A84E5
2,962,316 UART: [art] SIG.S = C836BCEF19A35F25942CF60FCDC1EB912C5124AFBE15F6C682483EE72048A4CFFB5D0EA5F4D47EF0AF2C4082EFA6933F
2,986,311 UART: Caliptra RT
2,986,657 UART: [state] CFI Enabled
3,094,251 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,616,717 >>> mbox cmd response: success
2,679,151 UART:
2,679,167 UART: Running Caliptra FMC ...
2,679,575 UART:
2,679,718 UART: [state] CFI Enabled
2,690,481 UART: [fht] FMC Alias Private Key: 7
2,798,928 UART: [art] Extend RT PCRs Done
2,799,356 UART: [art] Lock RT PCRs Done
2,801,030 UART: [art] Populate DV Done
2,809,163 UART: [fht] FMC Alias Private Key: 7
2,810,147 UART: [art] Derive CDI
2,810,427 UART: [art] Store in in slot 0x4
2,895,938 UART: [art] Derive Key Pair
2,896,298 UART: [art] Store priv key in slot 0x5
2,908,758 UART: [art] Derive Key Pair - Done
2,923,648 UART: [art] Signing Cert with AUTHO
2,924,128 UART: RITY.KEYID = 7
2,939,342 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,107 UART: [art] PUB.X = AB80E366896D90FE8AF66570F6CF8589C8BD4330E38991E7B1E1344837AFE7DC18838D8FF98F813A9BAE32ABC4CB5412
2,946,887 UART: [art] PUB.Y = 7738F41368FC71A2A3718CFD996A17217D57D1D4BD6B83AF947A023FA4C0C0B402E8A6589B0891E2BF1CCEFD9325F28B
2,953,838 UART: [art] SIG.R = A5E0033EF2959FE727C8F9A3AEB88B5799163916CF967501B93C7627F085430D4A1756D07E976430F0C5E798C3ED0479
2,960,590 UART: [art] SIG.S = A8031C9415CB668450034BA9BA8174090430A20B4C7DE1A826F6EEEF6AAA42B19D607606F47159F894D227D143385B2C
2,984,477 UART: Caliptra RT
2,984,823 UART: [state] CFI Enabled
3,093,064 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.71s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
26,992,778 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 12:42:49 2025 GMT
Not After : May 12 12:42:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:4b:fe:5c:65:37:61:78:12:25:04:a8:7d:7c:
42:81:c5:d9:6a:bc:0c:28:c1:d4:1c:1a:e0:49:be:
6d:5e:b2:75:60:0f:09:1a:fd:88:9b:cc:68:88:96:
fb:66:2c:db:f1:2a:4a:c9:6c:b1:c6:e1:52:5b:7a:
7c:91:ee:2f:bc:47:b4:66:41:63:03:3e:53:66:cc:
ee:4b:52:7d:58:9f:51:e8:af:a3:f9:15:76:4c:eb:
35:94:fa:0b:a6:ed:0d:6e:59:19:b1:14:1a:00:5f:
5c:10:70:0f:2c:be:44:54:f7:dd:8e:38:1b:fe:f7:
33:0b:74:6e:ed:8f:4a:ec:50:5f:fb:e6:14:36:dd:
17:b7:f3:07:52:f6:e7:92:bd:e7:f8:b5:98:db:de:
50:87:45:6e:25:82:d9:ca:06:6c:fa:8f:12:1c:19:
ea:85:02:2a:e0:e8:35:21:79:a0:cf:1f:c8:c5:99:
25:05:0f:c7:5c:8e:ce:85:08:27:86:b7:20:97:b3:
c6:40:11:b8:29:db:b8:0a:95:8b:10:dd:01:c6:cb:
47:5a:05:79:1d:8f:a9:5c:43:3b:cc:ab:fd:ec:00:
3d:56:7e:cb:47:15:76:6a:87:42:29:6f:d4:f6:15:
7f:22:55:80:33:02:d6:48:23:91:6f:48:7e:eb:92:
b5:11
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4c:6b:7f:1b:80:3f:a2:50:97:71:30:a2:d7:dd:d1:50:8e:4c:
56:72:21:a6:31:e2:bb:6e:8a:8f:db:58:54:1d:f4:d1:08:cb:
2e:0e:64:3f:a7:74:c8:b0:b9:76:4e:95:10:54:de:79:a2:5e:
09:6b:d1:7a:88:e9:37:1f:cc:88:50:9a:e7:3f:80:f5:61:f2:
e7:41:c3:21:c6:e9:5b:10:79:85:25:75:a3:f1:38:6c:4a:ad:
8f:19:1c:a0:98:06:e5:c4:f6:b4:f4:51:24:33:d7:31:49:9a:
c1:28:2c:0e:a6:ba:1f:40:fa:0f:2c:a7:d2:d3:02:8d:7e:27:
60:ce:52:72:ba:5d:12:24:0b:cc:d1:0b:3c:33:c8:60:d5:ad:
cd:3a:50:11:e9:15:f0:1f:6b:aa:d5:84:3d:e1:53:8a:dd:95:
1c:fe:03:c3:77:24:57:f2:fe:b0:24:7a:55:1f:72:6c:6b:63:
ab:bb:a3:32:5a:3b:d3:c0:16:0a:f3:27:8b:0a:b3:84:5e:84:
4b:87:a3:65:fb:b6:ce:9a:7c:c7:3f:28:cc:e2:32:74:b4:c2:
74:31:6a:49:36:7b:20:c0:d6:85:f1:11:21:37:21:86:0a:be:
ff:25:9b:a5:57:84:fc:9f:53:1f:ab:18:c3:a1:82:24:f7:0c:
a5:05:42:86
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 12:42:50 2025 GMT
Not After : Apr 13 12:42:50 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3c:c1:d1:18:9f:9a:40:0c:a3:03:07:b3:6a:7f:40:12:ef:43:
cf:dc:5e:d7:70:57:7f:e1:f6:6d:78:c3:2e:6a:42:38:f4:97:
dd:e5:ff:93:2e:05:a1:b7:31:67:1d:cd:87:61:e0:fa:5d:da:
0e:ec:2b:4d:ae:ee:44:56:89:37:85:42:bb:25:98:5d:4c:6b:
b3:b8:5b:ec:00:c6:b4:e8:65:a9:4e:c2:45:16:a5:a9:24:a2:
d5:03:3d:af:ee:de:d4:1b:89:b4:39:b8:23:ed:0d:b5:43:4c:
ce:78:fe:30:14:7c:d2:18:ce:e8:28:09:2c:2a:f0:92:ce:e7:
8c:50:3f:cb:94:5d:af:90:d5:b7:77:96:b3:cd:d3:64:7b:6b:
02:21:b4:9f:92:67:fc:1f:bf:61:20:87:4c:0a:24:3e:58:f8:
2d:53:9b:fb:96:fd:97:cf:82:40:b9:4e:12:02:7f:2e:66:2c:
5f:85:a0:0a:90:35:83:d6:c4:d3:a0:be:dc:4b:2a:8c:db:b5:
e3:2e:d4:e7:a3:91:79:1c:58:71:3a:02:0f:4d:24:67:92:11:
4d:cc:76:7e:16:56:d6:41:9e:bd:24:f9:d7:f1:98:5c:72:aa:
8f:e9:f5:8b:0d:4e:05:81:30:ca:7f:71:04:01:d6:e7:12:02:
98:d9:3e:6f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.22s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
26,513,644 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 15:21:58 2025 GMT
Not After : May 12 15:21:58 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:93:5b:10:86:7c:5f:5f:52:a5:20:a6:29:f6:26:
0c:87:05:77:b6:40:8e:51:d2:bf:83:85:36:a5:a1:
82:d3:f8:71:54:5b:09:e3:a6:1b:68:77:09:c9:a1:
2e:e2:1a:43:f2:e3:7b:d1:88:90:f1:6e:e0:17:a7:
bf:ea:1a:15:76:66:64:68:9d:d3:f2:b3:5b:59:88:
72:29:22:0a:ce:97:87:85:27:53:6a:c1:f4:d0:7e:
72:e8:1b:60:2e:bf:a8:d3:a1:ad:1e:51:fd:b8:be:
60:62:fc:7c:eb:e4:c2:d2:43:c5:63:7c:88:21:93:
0a:e3:fc:64:b0:a5:de:60:25:76:39:35:a7:24:3f:
50:08:c8:e7:32:05:ed:f3:01:3e:a3:cf:98:6b:7a:
25:ba:26:f2:b2:05:6d:ca:57:46:c7:84:15:13:4c:
e2:f2:6f:d3:7e:16:8b:bc:51:9d:12:87:4e:53:71:
5b:86:e8:06:d4:2c:c2:97:15:9d:ba:ed:5e:b2:f8:
9d:1d:64:05:ed:32:c4:55:3d:d7:57:e3:48:1e:c7:
f0:5b:99:a4:a4:81:d3:a5:3f:64:90:2b:21:af:3f:
4f:93:57:ef:13:be:e0:95:51:36:d0:41:13:85:66:
81:7c:93:7f:37:0c:7c:5e:1e:a1:96:22:b7:1b:f3:
21:d1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:d8:f1:63:05:b1:ec:20:86:79:1a:9a:1a:e8:31:7b:b3:6d:
89:57:74:b7:49:f6:c5:de:26:1e:ed:3a:11:b5:e9:b4:01:c4:
c3:50:f0:a8:e7:23:e7:3f:8e:c7:21:7e:c2:88:e7:35:ae:e4:
f8:a5:f6:6f:5e:7a:a3:e0:98:92:f1:50:7b:9a:29:13:00:10:
f4:3a:12:70:96:30:a3:c3:84:71:94:53:cc:49:10:b8:9e:28:
66:2b:b6:bc:2c:af:d3:c5:f8:51:b0:41:87:76:9c:e0:f8:5e:
01:59:b0:74:2d:f5:3f:f5:8a:c8:0a:b1:29:11:11:23:51:61:
f5:28:4e:c8:4f:cc:56:6c:e8:80:45:7a:3a:69:b1:9c:5f:9e:
52:93:32:56:ab:dc:b4:de:16:ec:54:60:fc:b6:12:35:87:c3:
51:e7:cc:0c:23:f7:02:e1:61:cc:59:27:38:6a:df:a5:52:97:
ba:aa:d9:b5:c3:73:51:0d:77:a5:0c:21:74:36:a7:46:f2:1a:
cc:c1:c3:b6:a8:8b:bd:0b:1c:ba:71:02:f1:4e:3f:8d:57:21:
18:07:22:c0:dc:88:9c:3d:1e:6f:2d:34:dc:80:68:0b:0f:b6:
47:11:05:75:16:c2:f7:f7:70:b3:4b:3e:db:e8:eb:ed:20:50:
0b:01:e1:ab
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 15:21:58 2025 GMT
Not After : Apr 13 15:21:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
82:c0:7a:a7:8d:c2:5d:88:5e:03:88:97:4b:59:a2:84:15:39:
66:fa:ae:cf:46:c1:29:27:60:4f:ee:86:fc:88:d3:8b:fc:04:
2b:26:29:b2:aa:97:ea:b0:38:c4:ae:94:a0:d7:c5:9d:38:18:
cc:5f:c9:69:f4:5c:4b:bb:90:e3:e1:50:29:52:d8:4d:69:0f:
f7:d7:e6:ce:81:72:0d:78:3a:10:ad:29:63:1b:71:5c:cf:28:
61:f1:f9:37:c4:05:85:ff:4a:c0:80:ab:66:52:4c:5f:9d:61:
9d:2f:7e:47:c2:7b:9f:0c:36:f5:d5:d7:de:cc:27:ca:57:29:
0d:45:d4:42:64:d0:75:12:6a:3c:45:eb:cc:22:b7:dc:2a:b7:
90:63:62:2f:63:89:0c:18:36:5d:e1:4e:82:35:e5:66:32:1f:
db:cb:be:a9:9a:34:0f:c7:82:d2:f6:09:b4:a2:70:cb:ce:bd:
c4:24:bc:6c:bb:92:c7:fa:c5:c2:4e:94:f9:67:8b:62:ef:df:
ce:6b:c1:33:d3:97:c9:9b:dc:c7:37:6b:35:d4:e3:12:35:10:
87:eb:ec:f6:68:46:90:32:78:96:c7:2b:78:78:99:25:86:66:
b4:4a:7e:2e:d4:2c:e9:b2:15:03:6a:59:6c:71:fb:89:b2:7c:
4f:66:ed:2b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,117,900 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:59:12 2025 GMT
Not After : May 12 10:59:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:27:06:46:da:63:65:3a:8c:78:65:1e:9a:fc:
c1:82:6d:81:8a:4a:c2:27:df:d4:b4:f7:df:ec:fc:
79:e7:b2:23:98:e7:91:15:86:3f:1b:20:99:86:90:
9f:36:b0:3e:0f:11:a4:0e:f9:64:54:e1:1a:44:a8:
59:d4:88:e8:a2:5d:f1:45:ee:04:8a:f7:88:15:4c:
22:a2:eb:1c:3d:8b:c7:f7:92:39:35:04:6c:f0:0a:
37:53:ed:69:1b:40:cd:f2:53:b7:df:00:6d:6e:d7:
df:0f:6d:ec:4f:f7:ea:2b:83:7c:8e:1a:e8:72:28:
38:45:c4:d1:b8:68:cc:5b:3e:20:5c:0d:b8:0e:c6:
b1:74:3e:e7:cc:e3:f0:17:b2:2c:e5:a4:29:a7:c0:
52:37:05:00:fe:7c:73:0a:94:eb:6a:df:b4:cf:30:
10:83:84:36:b8:b2:7c:60:9d:e0:a3:f1:1b:82:3e:
7f:83:f6:d1:aa:16:bd:83:e8:a6:b8:8e:eb:19:07:
9b:46:9d:e0:82:cd:d4:24:ea:7a:c7:52:02:80:96:
1d:ba:dc:08:9d:cd:5b:cf:56:a1:0e:9b:99:34:3c:
f9:c9:93:ce:5f:db:2d:31:da:1b:f5:86:21:23:65:
b0:ff:d2:86:45:9e:c6:df:cb:57:da:4d:2f:80:9f:
55:69
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
40:f3:35:cf:9e:ae:29:d7:37:7c:90:0e:d1:01:31:d1:0c:99:
56:89:bb:28:c5:b7:fe:ca:92:3a:39:c1:e6:0c:b1:3f:16:1a:
90:e1:74:c2:b8:e6:28:11:ff:ca:90:00:d7:d0:4a:fe:f4:a1:
89:9d:1c:47:5d:32:4d:b9:8a:dd:54:2b:1b:f3:da:de:d5:90:
a1:76:dc:ed:39:3b:4f:57:29:c6:56:92:dd:4d:d1:34:4f:44:
ed:90:8d:49:77:05:1b:c8:84:38:5c:39:15:28:9a:4d:f8:7e:
30:2e:36:6a:f8:02:d3:67:9a:5e:74:67:ef:27:b9:f0:51:ba:
7a:c6:65:5f:5b:9d:08:f8:07:69:bd:34:cf:51:c5:30:4a:e3:
5e:69:4b:85:fb:a5:16:af:0e:1f:0d:32:28:73:46:78:d2:de:
94:e9:5c:d3:97:d9:55:5c:93:eb:b1:6a:62:fe:2e:ed:e2:1b:
43:30:c6:74:36:8a:cc:a9:be:0e:6e:d7:f8:b5:6b:db:6d:dc:
0f:fe:83:56:da:9f:51:69:6b:93:79:ed:27:65:6d:fe:75:a1:
81:0b:f2:95:a6:21:9b:8f:06:da:b4:f6:c3:3c:10:61:d2:b0:
8a:eb:8c:6a:8c:ac:ad:4c:70:a6:5a:39:82:5f:ed:48:7e:6b:
aa:d1:9e:be
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:59:13 2025 GMT
Not After : Apr 13 10:59:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6d:cd:4f:77:94:49:67:d9:47:a3:38:2f:f6:bf:e0:08:8a:10:
e1:a1:ab:71:cd:44:99:0d:f1:f5:27:8f:6f:66:52:63:78:6e:
a4:3d:90:8f:47:9f:5a:c0:c7:a1:c4:ae:e4:d2:dc:97:0b:de:
f4:4b:42:9d:76:ce:03:f2:f7:f8:d4:08:de:5a:15:a7:2a:84:
80:64:76:1b:22:20:31:98:49:46:0b:57:f6:d4:0d:b8:bc:03:
63:de:ec:3d:f9:e0:09:23:ab:99:98:e5:5a:9f:1d:c1:7a:b9:
fd:95:46:ac:d1:da:01:a0:f1:84:35:29:52:b2:33:4b:b5:f1:
d5:0e:85:a1:b0:dc:5e:3b:42:34:0f:ad:04:e0:79:b4:4f:af:
a2:93:7e:f9:10:5f:68:41:ad:cb:e3:63:f1:6b:3e:55:11:bf:
62:c9:2e:60:48:91:54:7e:a4:e3:cf:2c:a8:a2:16:3f:7c:7f:
e1:46:92:12:e2:31:99:9a:b6:fa:de:61:3c:9c:84:21:72:e8:
11:de:65:2e:61:a1:ff:bb:6b:05:4d:4b:22:40:9e:e7:62:38:
29:8b:10:54:70:c2:54:fc:c7:7d:b0:18:98:9c:08:89:0b:4c:
70:0d:3d:e2:31:2a:bf:24:3f:d7:b4:00:99:dd:81:69:56:14:
06:fa:f7:c5
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.98s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
26,627,861 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 14:25:02 2025 GMT
Not After : May 12 14:25:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:70:de:32:98:29:f4:c6:16:d7:93:6f:a4:f8:
05:33:19:fb:64:ae:fd:34:49:cd:02:d6:45:cb:2e:
5a:52:d5:e7:a3:01:cf:10:0b:76:81:75:ba:01:71:
19:04:27:d1:0d:d6:59:0e:62:77:02:4a:14:b9:4c:
af:7c:35:e6:ff:96:70:d5:ce:ff:2a:a5:89:94:6f:
bf:ec:4f:84:3b:c1:44:d4:ac:3b:0b:3a:b2:e9:73:
1c:55:d3:65:f3:e0:fd:be:b5:92:0e:5f:41:70:74:
61:84:ba:ce:ae:59:a4:e2:17:46:92:ba:aa:04:61:
a1:83:2e:d4:2d:19:38:d3:a8:ec:f5:f6:21:b3:c5:
9c:6e:ca:59:df:76:8a:50:67:a3:93:e7:92:71:a5:
b9:ca:36:04:71:bc:10:13:18:d0:e6:12:35:75:c8:
00:92:00:2f:40:5e:7e:0c:a0:37:40:35:b7:e7:84:
53:bb:da:59:4f:f4:a1:68:b9:eb:c5:1d:11:f3:74:
68:fa:36:ba:e8:30:21:d6:fd:19:63:0b:79:54:75:
df:ff:61:13:51:76:68:88:4e:72:84:0c:16:f0:00:
e9:c8:a1:14:5e:9b:b9:82:66:48:11:65:f1:89:83:
ec:1b:a5:60:d7:6e:c5:52:6d:bc:54:70:bc:c3:b7:
41:ff
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
98:a8:d9:90:e5:9b:39:c6:fd:f1:fa:a8:e1:e7:67:30:b3:e6:
34:a0:10:01:8d:4f:80:76:3a:25:9b:00:54:4a:03:05:65:b3:
3e:9d:f9:3e:1b:8d:65:19:c9:c2:58:a6:39:09:b1:64:0f:70:
3f:b3:5e:a6:34:0f:0c:6e:63:1f:38:6f:69:62:3c:8b:83:0c:
1c:df:4e:a0:d6:28:4f:c9:3a:05:fc:c9:8b:e2:55:50:7b:17:
da:7a:69:54:56:5a:57:b3:91:0f:65:62:85:2c:26:d7:24:29:
b7:29:8b:26:06:bb:ff:ec:12:c9:21:c3:bd:4b:60:1f:85:ed:
73:ea:71:2e:03:72:8d:87:fa:0d:3f:20:af:33:49:c9:38:7d:
fa:26:bf:7b:2a:fb:83:64:3e:73:11:cf:b5:9c:61:81:50:e7:
e3:3d:8e:f7:79:c5:2b:37:73:31:96:88:bd:0e:0f:db:5e:ff:
0e:63:bf:53:90:01:76:d8:72:99:01:97:89:48:83:41:74:1f:
26:48:48:20:03:ec:28:9c:6b:55:d3:c1:32:a5:fc:48:c8:9a:
14:ec:d3:ec:23:e0:bb:85:f5:a8:75:0f:00:21:82:54:b0:7a:
0f:0e:99:33:61:42:3e:96:da:c1:c3:25:a7:8d:83:16:0f:02:
3e:4c:28:8e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 14:25:02 2025 GMT
Not After : Apr 13 14:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a9:f3:54:58:2d:be:2b:76:ac:d5:dc:76:9a:20:5f:bc:e4:9d:
68:31:6d:93:6f:ee:fe:fd:e2:28:1b:ac:8e:96:ac:90:1c:f4:
41:33:23:9e:5d:be:39:46:27:c5:cf:1f:20:e1:b5:6a:6a:85:
9e:84:ca:9f:e2:22:4d:48:85:40:54:b7:ac:16:02:0c:77:be:
8d:11:01:2c:ef:43:17:a4:1d:cf:c0:d9:9b:9a:65:1d:19:fb:
d2:37:45:7e:3b:75:3e:4d:1e:63:47:86:8b:24:9e:cb:0c:44:
55:65:55:e7:f9:6b:20:9b:6d:ff:b3:df:0b:64:a4:24:16:8f:
f5:fe:32:9e:1d:9f:42:ac:93:72:e3:d5:b7:83:09:2b:e4:c4:
1e:6a:cf:30:72:cd:a3:46:5e:bf:3d:6f:e5:e8:4c:d2:5f:40:
54:14:0d:5a:1b:18:92:12:a0:a8:21:ba:b5:3e:35:54:40:ab:
01:4b:82:5a:4e:41:0f:c6:37:3f:1a:e7:6f:5d:1f:e5:64:f8:
39:6d:9d:d5:91:50:d0:4d:b2:d4:c4:fa:35:ff:31:d4:b6:81:
3f:01:dd:ad:39:15:79:c2:04:29:1a:0d:a6:0d:37:0c:0e:30:
71:0f:f9:ef:6b:25:3d:c3:ec:ea:51:ba:0f:04:e2:7a:e6:d6:
0d:59:39:10
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.67s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,746,868 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:58:35 2025 GMT
Not After : May 12 16:58:35 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:88:4d:18:bc:5e:2e:d0:b8:61:42:a1:58:f4:
53:8e:49:be:25:04:c4:9f:05:86:b2:72:74:30:14:
4f:d8:ea:ec:96:c0:4e:09:4b:ea:7c:ae:3c:b6:03:
8e:05:27:94:46:18:60:2e:49:ec:fc:f8:f9:f8:af:
19:2b:04:c7:5b:4c:3d:d6:cc:f1:f8:fd:ba:e4:83:
44:1c:de:c9:a6:1a:dc:2c:c0:fb:6d:26:b3:6f:e9:
31:fc:b0:c7:c6:a2:16:ea:16:4d:9e:59:9f:86:ba:
17:60:f4:f7:ea:96:62:82:04:70:39:52:0a:8a:fc:
11:36:59:1f:45:c7:87:a5:70:da:4a:1f:dc:d6:b7:
6f:b3:de:27:57:4e:5f:9f:6c:bb:30:8b:6c:22:98:
b2:26:c4:56:9a:8d:08:5b:5f:b0:77:14:00:12:3c:
3b:29:7c:8e:29:46:06:78:01:f8:05:6e:54:7d:29:
5d:b9:03:2b:83:51:43:09:8e:b7:df:de:4e:4f:18:
b7:ed:c4:88:bf:2b:7a:4a:18:67:d7:c4:3b:78:6b:
29:90:fa:51:61:4f:68:50:63:7a:3d:7d:ea:2a:6f:
f4:90:4b:fc:dd:fd:58:2a:bf:e6:44:df:3b:26:24:
e7:3a:ad:c3:3a:cb:39:f1:a0:3c:6b:46:d8:bf:42:
14:53
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2c:0d:ef:02:f9:5d:f1:a9:a4:c2:cd:dd:64:d1:57:c0:e4:77:
0d:60:7b:24:7a:f2:48:ea:fd:3c:44:77:4c:2f:f6:0a:f5:2f:
a6:89:6b:35:ae:f4:0b:57:b7:d7:7e:8d:b6:e1:c3:50:7d:0b:
90:4b:a4:93:00:d2:1f:7e:89:ed:d5:e1:9a:89:75:c7:4a:64:
b2:33:c5:6c:3c:89:f7:d7:0b:41:5b:cf:94:63:f8:ed:ad:25:
3f:ef:73:b1:d3:b9:b5:47:47:ff:e8:e0:b4:23:e8:c1:e9:fe:
1f:46:0a:6b:39:8b:dc:29:46:cd:fc:b3:2b:8e:a4:c0:c9:eb:
0f:b6:1d:c8:0c:0a:5e:f3:2d:4d:7f:3e:58:11:83:14:be:21:
a5:49:d0:7a:5c:51:7c:f9:46:2b:3d:99:ed:70:2f:4e:a0:d2:
10:d6:6e:af:42:14:83:7d:14:64:fd:9e:bf:7c:eb:b6:2e:33:
e9:7e:81:17:83:b7:45:e6:70:5b:67:1c:e7:b1:72:30:07:fe:
7e:54:e2:72:43:a1:e3:b9:54:d9:27:d3:c1:f4:00:55:00:b3:
61:49:fd:eb:ad:a5:eb:b4:c8:0c:e6:0e:29:e4:53:21:87:06:
61:5e:ec:dc:9f:fa:97:17:88:b0:51:70:d6:a8:22:a5:ba:5d:
d3:5b:f8:65
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:58:35 2025 GMT
Not After : Apr 13 16:58:35 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:49:91:2b:2a:91:b4:f3:f0:55:b4:9d:0e:79:72:f1:8b:b5:
2f:1c:8c:9d:53:d8:99:3d:49:53:e9:2b:1a:27:ab:01:9c:7d:
c4:fd:60:12:a9:f5:9f:8f:4e:6f:1a:9a:7c:2e:7e:20:d4:36:
6d:78:f0:a9:fe:ce:d2:1d:89:be:4f:45:84:b0:85:ae:9b:e6:
20:08:23:0d:20:8c:61:25:9b:d1:b0:49:71:82:d3:80:d6:ae:
fb:fc:ab:2c:37:7e:3e:c6:b7:7c:48:50:3c:3d:ca:49:74:b3:
af:b7:e6:4c:ae:36:a6:ae:fb:44:b0:38:6a:19:c8:de:cc:a3:
5e:52:2e:19:56:d9:30:b9:18:0f:09:70:63:0d:00:35:5a:c6:
04:84:eb:23:c1:5e:84:5b:05:58:a5:f6:49:d3:d9:89:e4:16:
4e:75:a1:75:44:44:76:2e:14:ba:e6:40:de:3f:d0:1a:ef:b3:
2a:3e:79:1e:2b:35:ce:14:7e:b7:59:3e:42:e4:56:fd:b2:c1:
9a:bb:3d:d5:3e:ac:c9:95:c2:f1:2e:81:f8:a1:08:dc:d9:3f:
ee:9c:ab:ef:7d:6b:d0:7e:4b:8f:c5:86:a2:b1:29:0f:78:a6:
bd:92:9b:81:65:9d:e2:f8:d8:3b:58:a9:12:15:0b:77:e1:76:
67:a6:5f:69
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
Truncated 8000 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,740,823 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 11:49:12 2025 GMT
Not After : May 12 11:49:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cf:bc:5c:a6:0f:9d:6c:4f:a3:a2:f3:28:9f:b6:
41:10:5b:3b:1f:1c:75:2a:38:31:d7:2b:82:02:71:
fb:01:c9:e6:38:d5:ae:12:86:29:c3:1b:2b:c2:a3:
a5:68:03:37:ea:5b:93:0d:7b:59:ed:ca:2c:64:ad:
c9:2c:d8:8c:ae:3d:5c:28:a6:73:3c:5e:d9:c2:91:
5b:2b:eb:ec:49:fb:9e:59:46:65:99:af:d8:2b:37:
bb:81:39:45:a9:b9:d6:1b:9c:15:4e:27:54:00:e6:
9b:07:a1:94:f4:2b:5f:76:8d:c2:1d:f5:6a:13:d7:
19:fc:9c:56:33:85:7f:83:5a:bb:f0:80:61:73:94:
1a:75:d6:2c:61:75:9d:cd:4a:b3:7f:f0:f2:5f:2f:
51:cf:41:27:8b:ed:6c:b0:83:62:09:65:1b:34:63:
88:25:f4:26:0d:63:23:59:8f:8b:2f:56:a1:e1:db:
12:a8:d1:03:30:90:cf:68:d1:b7:e2:e7:7e:11:4e:
1f:ff:89:5a:b1:ce:a4:ee:1b:3d:ad:92:bf:ae:66:
b2:32:0e:52:9a:12:db:ef:c2:b6:e8:24:cc:49:7d:
47:fe:60:7e:7e:59:bd:02:a9:f0:0a:04:ce:20:76:
05:8e:a7:f7:5e:9e:97:86:d9:fe:40:cd:19:6b:ba:
a1:41
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
81:79:27:d9:95:b9:af:25:ea:5f:9a:1b:98:24:a4:7c:42:4a:
7e:2c:3e:55:5a:63:d4:63:cc:c8:ba:5d:45:27:d2:e0:0b:33:
61:7c:e3:16:ae:e0:60:3d:23:d9:46:43:64:b9:39:24:ba:09:
e5:e0:9c:bf:0c:dd:15:a0:25:b5:92:8a:c2:7e:ee:6a:fe:47:
ea:e0:13:d8:b1:44:e3:4c:e8:d6:a4:4a:e8:09:14:e3:d2:18:
ad:34:5d:15:5c:0e:e5:59:ff:04:03:4f:56:2f:8e:7f:dc:38:
6a:cd:77:8c:ec:2b:31:fb:0e:0d:8f:29:41:1e:aa:d3:73:c1:
a7:a6:ae:1a:1d:27:f6:b3:ec:bc:d2:5b:ce:9f:1a:e8:d1:d5:
bd:35:e0:9d:e2:cc:e1:38:9c:52:9a:f4:31:87:a2:bf:ad:f2:
74:63:d9:fb:e6:e9:29:3f:a8:a5:54:91:21:78:24:74:2e:82:
2c:86:df:cb:5e:6b:e0:f8:16:27:96:33:f0:57:af:f8:1d:1e:
37:4f:80:78:6a:e8:db:c5:1d:0b:ba:22:d0:39:78:1c:2b:75:
d9:9d:83:4f:b6:57:b1:8c:6c:13:e2:96:81:36:ad:de:31:e0:
cc:a2:0a:46:de:0a:dc:76:db:9d:2b:87:19:26:d3:d1:5a:f7:
5c:9a:2d:84
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 11:49:12 2025 GMT
Not After : Apr 13 11:49:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2f:aa:7c:e5:63:ed:7c:56:f0:f4:e7:c6:f2:39:fe:5e:f6:03:
c5:f9:47:49:fc:78:fb:2f:40:1f:f1:19:f2:2b:35:f9:fa:2c:
7e:90:e9:c5:3c:eb:43:ab:c6:42:2f:84:94:29:a6:7f:9f:f4:
5c:7e:35:5d:66:8a:4d:c0:27:79:fe:2c:69:b1:08:52:f4:11:
d6:f7:f6:66:c4:c6:a4:7f:31:7d:91:f0:02:83:a7:e1:3e:d4:
f6:31:7a:5b:aa:b0:36:16:f4:d2:3d:f9:90:38:46:29:18:b3:
ad:ba:55:00:01:03:1d:f6:57:d8:a0:57:03:10:20:0e:4e:d1:
d2:44:e8:31:4e:92:2f:06:00:8b:19:39:1f:1a:cf:04:e9:b8:
43:56:b9:b8:66:3b:e9:a0:ba:cf:b7:0f:aa:94:ca:7a:4f:a4:
18:6a:be:5b:61:48:82:53:69:f6:e0:49:dc:74:e8:f6:ec:ad:
09:c5:7b:da:14:f3:11:21:33:6f:1d:43:01:1c:32:2f:9c:80:
c9:4e:64:4c:ec:85:c5:bd:8e:9c:e4:65:9d:e9:4e:a6:b5:1d:
75:31:32:7c:d8:89:20:43:ae:c0:43:91:87:a6:25:fc:9f:d4:
91:24:3e:90:a7:3e:cc:96:35:49:e4:5f:d2:df:0e:68:9d:66:
6c:85:0e:4f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,255,085 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 13:31:54 2025 GMT
Not After : May 12 13:31:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:73:b2:b5:e9:81:55:e0:1f:ad:b8:ca:26:98:
9c:fd:dd:d6:26:5a:f2:a9:fc:ba:48:38:94:d1:20:
26:5a:8a:5f:85:38:60:e2:f4:f1:41:25:af:7b:87:
94:51:e1:2d:67:06:50:52:b6:76:b6:5e:8c:5e:cf:
01:6e:cb:30:b7:1f:5a:93:f0:e9:c4:cb:54:5b:d4:
d1:bc:5f:da:c1:9d:e6:52:d2:e8:36:47:eb:96:6b:
9c:70:c6:0c:2a:6b:7f:14:03:04:5e:73:cd:90:0f:
08:63:d3:73:fb:3a:9a:19:21:67:94:3f:48:2d:82:
7f:ca:82:ba:d3:06:bd:1e:e4:27:fc:6b:d8:ec:44:
0c:9f:30:d0:f3:bc:e5:9b:b1:6d:9f:a8:6a:96:14:
f4:26:89:50:4c:fd:0f:2a:77:ae:c4:71:4b:6a:09:
c7:b5:70:2b:0f:e0:17:13:51:d1:3e:0e:9d:27:9f:
e3:aa:d3:4d:15:e6:a4:fd:e5:5b:05:7b:7e:43:72:
71:1e:d4:49:e9:b9:89:e4:29:b4:09:e2:a1:dc:87:
10:73:1b:1f:dc:a0:13:c4:22:55:cd:96:53:53:ae:
c7:1f:81:53:39:24:34:13:1c:48:43:5b:09:cf:8f:
ae:df:47:8d:fd:94:ec:b7:e7:c2:8d:0b:49:72:c5:
36:93
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
07:9b:e2:e0:77:50:a2:96:18:e6:07:b7:9b:de:51:93:f0:a3:
bf:15:b8:25:00:47:3d:9c:e9:d7:53:95:dd:9a:66:30:15:75:
78:8c:8f:61:c8:29:c8:f4:33:43:62:63:0b:b0:13:b8:60:ef:
af:36:88:8f:a1:1c:20:fb:0a:af:ab:1b:3c:3b:5d:79:77:03:
65:11:b8:81:c0:f1:a6:e8:65:cc:d1:bd:e7:79:d5:d2:f1:43:
29:9c:81:83:e0:5b:9b:ce:d1:d7:5e:06:b5:fb:25:69:d3:f4:
06:ef:e9:e2:cd:54:f3:ce:7d:cd:87:86:c3:e2:27:78:0e:3d:
f0:e6:01:50:16:99:f6:e2:3e:12:a2:e9:ef:21:59:85:c3:f4:
b6:91:b5:76:b5:ae:13:85:e7:19:83:91:22:e0:13:d9:1b:2c:
4e:3c:cb:22:01:c3:cd:85:92:a7:e8:d8:65:86:48:fe:04:26:
8b:f5:ef:60:a5:d4:d5:9e:29:b9:54:91:44:e7:15:64:e2:7a:
1d:82:58:eb:dc:9b:a5:35:59:af:f9:3a:0f:fa:af:b6:8c:2e:
f4:00:44:54:43:50:07:e3:2a:aa:b5:a5:15:51:44:23:dc:90:
e9:d8:40:a3:1d:17:a9:38:64:53:28:86:48:84:66:5b:61:27:
4d:3a:2b:fc
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 13:31:55 2025 GMT
Not After : Apr 13 13:31:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
88:9d:78:97:87:f8:2c:3c:0f:99:e8:b5:1f:9d:9a:50:8c:a7:
61:bf:38:c7:e5:4a:ca:ba:3d:5b:d3:a1:cc:3b:c6:88:25:46:
65:32:d9:47:57:4c:b2:a2:cd:86:f7:aa:95:b0:6c:2d:f4:ba:
1a:9a:b2:e7:d7:e5:78:84:24:0f:2c:b8:a0:74:38:58:07:6c:
5d:b2:42:73:31:14:eb:e7:3b:e0:36:0b:4c:4d:21:49:96:e4:
b1:9b:4d:22:39:bb:a8:e6:ff:ca:1c:19:67:df:f0:b3:a8:a6:
8e:02:e4:56:5b:18:47:f3:4f:36:9a:8f:5a:57:0c:0a:44:63:
29:26:11:74:41:5d:7a:88:75:a0:69:df:67:5d:32:b5:76:cf:
81:8e:10:40:93:c8:be:76:e7:12:f2:e7:1f:84:64:33:48:81:
c2:22:22:44:af:8e:1f:00:5f:bd:6e:2a:b6:81:4d:f9:9a:eb:
2b:87:33:e9:1c:10:b5:a9:cd:de:82:d8:5a:d8:92:a7:a0:97:
8c:5a:51:ea:13:96:ae:24:ac:96:35:8d:9e:fd:40:f9:79:9e:
62:1b:a1:45:3e:7b:da:83:d4:3a:12:8f:5b:cc:04:c7:c4:0a:
e9:1b:3f:ae:54:64:f5:5b:2a:5c:54:f5:6c:ec:3b:d3:7d:b9:
9f:ee:26:e1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,902,212 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:11:38 2025 GMT
Not After : May 12 16:11:38 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cc:7b:7b:99:d3:29:f9:cc:94:4e:d4:37:8d:ae:
24:22:33:da:f7:ea:a0:0b:3e:f9:9a:3d:a7:61:0c:
f3:69:27:12:48:0c:c0:b1:14:0d:4b:4d:9e:81:e1:
5e:9b:16:94:a6:81:a8:23:ab:e8:1b:50:91:d2:ea:
d6:6b:21:55:5e:51:65:64:99:a7:02:6c:98:c2:54:
5c:b5:59:a8:6b:d2:00:ad:50:51:ff:41:ad:3c:76:
71:e0:49:f3:3b:50:a9:1d:a7:79:c4:b6:af:17:73:
bd:be:64:3a:ed:c0:5b:db:9c:eb:78:87:4b:2b:f7:
68:b6:dd:76:eb:1a:de:fe:53:26:58:a1:3c:ea:a0:
7e:93:38:ba:53:9e:ea:50:97:f4:91:39:ff:0d:5a:
a3:c6:2a:f2:82:9a:5d:79:9d:ab:9e:2d:c7:a6:16:
e9:aa:f6:ec:ac:fc:9f:ab:bb:b0:f0:e7:15:1e:75:
ce:b9:4e:23:10:9e:09:d3:e1:45:38:3e:90:96:99:
9c:b9:fc:81:f8:c1:b9:5c:d1:d7:59:82:9e:bd:6a:
1a:d9:46:f8:94:d1:ca:2b:20:00:40:82:51:0d:43:
15:5d:13:1f:f6:9f:58:5e:ea:ed:d1:97:51:33:d3:
6c:1c:9b:f2:9b:4d:29:47:49:31:15:8a:f1:15:1c:
cc:d5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:e4:fb:dc:b5:53:86:a0:b2:18:3d:d2:3b:20:eb:a8:a4:9e:
03:8f:58:8f:ed:f0:7e:c7:bb:52:d5:5f:4f:71:8b:5b:ca:83:
b3:4c:8e:a9:2b:ed:34:0b:4f:81:90:0f:a6:c6:01:fb:f8:45:
4d:0e:ea:39:43:44:c1:5d:6f:8e:55:47:a8:f1:e9:fa:ab:ee:
ec:52:ac:82:09:89:6f:40:0e:85:1f:14:66:35:19:29:96:52:
8f:d2:71:d2:73:76:88:5b:62:75:e2:e4:f0:7f:b3:10:9e:d3:
09:99:f6:66:44:c7:eb:a3:81:5c:72:09:5a:c6:54:91:a5:bc:
9a:a4:54:91:e1:83:fa:64:06:72:2d:90:c8:3e:80:09:e9:c1:
81:d2:12:39:81:2a:b4:d4:03:83:eb:73:39:dd:f9:79:76:c9:
23:be:05:a9:5f:8a:e8:9b:47:34:13:10:14:2f:98:fd:bc:73:
77:13:9b:bc:43:44:a2:ad:67:a3:8f:04:34:d2:9f:fc:24:fc:
fa:6d:99:d6:9e:38:c4:f1:49:cc:7a:1b:96:87:fd:61:b3:69:
c8:d5:82:b0:fd:17:ee:a8:44:81:11:17:67:5c:39:b3:1c:f8:
0e:38:38:f0:25:24:f3:c7:da:f0:6e:dc:10:be:7e:da:c5:55:
8f:0d:79:06
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:11:39 2025 GMT
Not After : Apr 13 16:11:39 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b3:a5:30:78:65:c0:a4:6c:6e:e9:3c:9d:b3:23:bb:1f:f6:1a:
93:b7:59:b4:99:cd:d1:17:3c:58:61:63:37:b6:e3:02:76:38:
19:4f:6f:9a:b1:77:d4:4f:b8:de:c3:9b:6e:c2:19:5c:48:f1:
c2:f4:d6:9b:5f:6e:e9:83:30:90:18:33:ef:46:db:46:9d:db:
c3:00:49:d1:c6:fd:85:85:09:a5:74:18:30:ff:67:d0:66:59:
3c:1b:97:ba:40:78:9d:b6:fa:7a:34:91:98:69:33:76:59:cc:
ab:c9:45:3b:de:13:2c:26:28:89:b5:1a:d9:7c:5f:44:d2:11:
07:79:62:dc:1a:7a:7b:e3:83:df:f6:8a:18:a3:1f:e5:0a:45:
0b:6f:9e:30:68:74:6f:70:7c:77:a3:4d:35:4b:3b:75:ce:53:
be:81:26:ad:8e:52:54:fe:be:15:ae:6c:cf:32:8d:1c:fb:0a:
c2:d1:4f:16:de:8e:04:52:7d:e4:7a:51:3d:e1:4e:da:22:53:
03:42:a0:d8:4b:50:38:e2:5b:00:68:78:09:9d:33:fb:fc:e5:
cf:89:ca:b9:50:88:ed:b9:b9:a6:34:1f:4a:b6:21:1c:81:a8:
d2:1b:c2:e2:4e:07:a2:3e:e7:f2:53:90:84:f1:0c:0a:14:36:
59:46:8c:f8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.03s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,404,297 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 17:44:02 2025 GMT
Not After : May 12 17:44:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a6:25:1e:ef:f6:d3:c4:09:a9:73:06:74:2d:7e:
b1:f8:ed:30:2c:23:7f:83:97:41:79:94:7c:c4:5b:
e5:12:83:59:be:8e:7a:82:d1:e6:45:ba:1a:34:99:
a9:23:da:d9:09:6b:ec:11:0e:94:5d:7d:7c:40:1f:
83:27:13:ce:0c:55:44:2b:36:1d:8b:76:c0:93:90:
f4:96:3f:ca:d9:90:89:f7:b1:6d:97:a5:cd:10:f4:
88:50:15:b4:2d:54:9a:f4:01:51:f9:d7:0a:c4:69:
78:7f:f2:03:a1:14:7e:26:32:12:d2:e7:dd:24:e8:
a3:19:ef:d1:cd:ec:19:b1:ba:91:0c:ab:2c:17:2a:
fb:74:1c:64:ac:4e:22:88:35:ac:35:00:b1:cf:e6:
42:be:2f:06:46:f9:dc:00:d8:bb:82:6d:7c:a0:7e:
3c:4d:b9:ab:b2:b3:2e:c2:24:63:f2:1b:85:8c:38:
62:2e:2a:12:2f:82:cb:07:dc:42:4f:37:3b:9f:31:
67:3f:98:70:c7:19:52:b2:48:b4:a3:5a:05:56:38:
13:a4:7a:e6:cf:9b:91:5e:ea:49:9f:fb:c9:a0:b9:
8c:40:69:c7:c6:58:36:19:b2:9a:49:de:a0:da:d0:
fb:46:0a:61:60:83:2a:01:2d:93:0d:e9:fd:8b:96:
54:e5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
12:44:a1:e2:10:cd:17:f7:1c:98:11:d6:73:28:c6:6a:e4:db:
3d:fe:74:52:e8:04:84:a9:01:be:5b:39:a6:4c:b7:11:e5:48:
ad:64:b5:fe:6b:bf:32:3f:48:26:01:df:99:70:28:51:c1:15:
b9:99:2f:87:fc:d6:4f:49:90:6f:56:1c:17:39:af:11:79:58:
bc:75:05:b9:6e:20:7b:d6:8c:ff:f8:b3:de:d3:4e:27:3f:e9:
97:4b:06:5c:a8:d8:b2:09:06:6a:90:24:77:fe:38:b3:53:9c:
fd:81:3c:1f:52:58:da:08:bf:7f:c3:86:2b:d3:81:ca:52:65:
c9:cc:46:f1:14:b0:d3:22:b9:75:15:b7:e2:3f:b6:dd:59:fb:
14:c8:d8:5e:38:17:a9:2e:a2:b6:f4:d4:ad:8f:2a:ba:9d:56:
ff:49:93:eb:49:43:eb:d7:ef:1a:66:a1:05:a9:f0:e6:58:d0:
08:eb:33:a7:e9:cd:c4:b4:10:45:29:13:2e:74:2d:18:f5:d1:
d2:c6:e6:46:15:78:d1:52:ad:6d:30:e0:81:71:cb:4b:b2:96:
a6:a3:94:b7:51:b0:55:1d:1d:76:5e:9c:2f:b8:95:1b:89:bb:
62:4c:e9:d3:83:33:3b:2f:5d:b9:08:b6:67:4a:1a:f6:4d:9d:
3a:59:84:c6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 17:44:03 2025 GMT
Not After : Apr 13 17:44:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6f:9b:89:6d:da:de:97:42:26:aa:2d:81:2d:a5:51:ea:05:38:
c6:6b:24:ed:71:e3:28:67:b7:c7:34:96:f7:4b:44:f3:34:7d:
1f:9b:f4:d1:f8:23:2d:21:36:54:5b:d5:6c:2f:54:97:c2:e3:
61:31:a5:76:79:b7:ba:23:ba:df:67:0c:46:ea:80:b0:b8:9a:
af:65:e3:24:77:29:ac:c6:a5:01:f8:12:8a:d4:1a:e2:ce:1a:
d3:7b:da:ea:fd:54:79:da:14:e0:b1:35:c8:e1:c6:0d:73:5c:
0d:7a:a2:9f:95:32:be:4d:bc:68:f4:a4:ab:94:65:8e:19:30:
fb:5f:ab:cd:3d:86:fb:dd:b8:41:85:e7:00:87:ad:8c:6e:f0:
22:35:98:12:15:8c:51:33:a3:62:d4:30:3f:53:4c:ea:ea:61:
64:1b:cf:f2:a4:d0:2f:03:c3:1d:da:b4:a6:ed:b3:5c:b5:79:
8e:17:e4:10:06:26:7d:87:83:79:2f:f5:70:3e:dd:b3:f8:56:
ef:aa:a1:a0:f9:29:a4:0c:1c:92:9f:52:ce:a8:b6:01:20:6a:
11:83:80:de:9e:8d:ec:cf:0a:08:c1:02:ef:b7:fc:45:5c:b1:
2b:e3:64:f8:57:f2:34:17:eb:ff:f0:f1:2c:ef:3c:5c:99:48:
97:3d:35:71
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,105,782 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : May 12 10:24:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:6e:a3:b2:42:08:e3:53:f6:28:a1:de:b6:3f:
a6:07:44:cf:fd:79:91:2d:4d:41:85:e7:92:f4:8e:
95:d3:3b:33:ca:ea:d3:20:49:b5:e1:81:89:54:85:
d1:36:8b:8a:9b:70:8e:f6:c5:8a:6d:93:dc:6c:a3:
e5:82:51:e9:01:72:2e:a6:b1:7e:60:c8:be:b2:cb:
1e:b0:98:82:7b:12:c2:79:e8:f5:e6:75:04:8d:09:
e5:6f:78:2a:9a:61:f0:d4:f6:0a:43:54:81:e1:46:
b2:f4:76:5f:a0:3d:e3:71:19:f4:fc:15:f8:ee:3a:
ba:be:a2:a6:42:93:ba:b8:24:b1:d2:99:64:10:f7:
9f:e7:34:94:eb:e2:84:8b:f0:57:cc:dd:84:d7:2e:
12:52:a3:ee:6e:5a:45:56:c1:79:45:9b:22:d7:14:
90:79:e1:14:64:7d:eb:4e:fe:e7:71:d4:5d:f7:cf:
bc:44:3c:ef:3d:82:e6:73:cf:04:39:d3:22:57:3f:
7f:c1:b5:23:8e:9b:67:9f:23:6e:ac:92:0f:3a:28:
9d:06:57:32:4d:63:c0:70:bd:51:1a:ef:1a:6c:f4:
a7:e4:55:ed:64:5e:d5:6d:19:6c:1e:51:e6:64:05:
95:5a:13:ed:f8:af:61:23:2b:0c:0e:c5:7c:76:2f:
4d:21
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
51:89:0c:80:df:b8:f6:4c:23:04:14:1a:9c:72:65:69:f6:83:
af:7f:7a:52:cb:09:2d:7c:b2:2c:3c:ce:68:06:3d:22:ec:b6:
65:4d:5a:38:85:4d:1f:c5:54:dc:9b:be:87:56:59:bb:c3:40:
62:a4:47:c2:fa:33:b5:65:3f:6e:f8:0f:8f:9c:96:81:42:61:
df:31:69:dd:6f:3d:70:52:59:2f:5a:65:61:f5:10:f8:0d:7d:
e9:8d:5d:d4:9f:68:27:90:f8:ce:09:07:a5:9b:06:8e:06:92:
ce:97:a4:7b:5b:3a:4c:c6:2a:87:5a:df:0e:9c:ed:b3:a8:aa:
b4:44:79:dd:1d:93:00:54:88:58:34:e1:c8:e8:39:ef:bf:e3:
40:65:75:58:07:48:95:ac:dc:42:8f:f9:f2:17:0b:61:04:7a:
22:b9:89:d8:61:7f:ed:f3:08:d7:e6:e0:1c:15:0d:5d:04:b7:
3b:47:ac:2c:b0:58:7c:02:01:6a:e2:4e:a7:88:6a:74:4a:78:
1a:ab:07:11:7d:65:d8:80:d6:c4:88:ce:58:dd:b4:85:88:5f:
ac:c4:cf:a1:0c:e8:da:af:40:02:a7:24:d2:cf:bf:24:1f:26:
da:70:06:d2:bb:01:6d:3a:c0:6c:8d:ff:b3:01:51:e0:6e:51:
00:ba:a2:4b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : Apr 13 10:24:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0f:5c:b9:7c:08:49:d9:03:9a:11:66:ee:be:a6:20:d1:02:ba:
0b:d4:9f:29:9b:e6:40:0b:07:dd:cb:01:48:11:64:97:7e:e0:
7e:39:15:93:57:aa:68:b1:19:c4:1b:d8:b1:a8:1f:e1:2c:82:
d5:ec:96:5d:72:e7:88:f4:8e:43:f2:a4:14:5a:73:bd:7c:d5:
22:cf:68:57:58:ac:8b:c7:10:20:c1:60:bf:51:a7:9f:9a:06:
4d:d4:d6:e2:ef:c8:8c:bd:0b:df:98:b4:01:98:a0:b8:0d:88:
fd:b3:b3:3a:1c:6e:ca:1a:43:a5:8a:a0:a4:30:65:a3:23:cc:
50:ef:d0:8f:a9:db:27:95:74:b8:c0:e4:b6:1d:bb:ac:32:55:
f7:ac:7a:04:7a:83:13:87:af:6f:7c:98:9f:a5:da:e5:a8:a7:
23:9b:93:8a:7d:2a:a7:c1:4c:6f:68:8b:f9:61:d5:93:dc:53:
bf:2c:50:c2:1e:4b:f2:f7:1e:f6:65:2b:75:5e:e8:e0:5a:d4:
ec:6a:61:84:d6:33:60:39:38:23:96:cc:5e:bc:f1:32:b3:14:
e8:00:db:1d:3b:3f:69:54:37:85:df:7a:c6:df:6c:9f:20:19:
12:c8:33:f4:09:1c:c0:56:57:77:c5:99:ea:11:01:4b:37:e0:
db:26:3c:a1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.45s
Truncated 3059 bytes from beginning
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
2,852,922 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:32 2025 GMT
Not After : May 12 10:24:32 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c8:18:de:e2:19:7c:83:d4:77:a7:6b:0e:bd:46:
91:9e:97:96:49:85:5b:4f:e5:4e:8b:b0:ac:4f:1e:
9e:db:c5:18:2b:40:ff:86:48:ba:d3:fe:27:53:6e:
9a:35:3e:b7:d3:4f:f1:1a:a9:2c:bf:bc:63:2c:2a:
3c:dc:bb:56:b0:85:9f:8f:39:ff:be:6a:93:e2:eb:
f3:69:1b:c8:ec:5e:6f:21:99:fe:23:4e:04:79:13:
1e:62:ba:1a:39:34:da:7c:ac:b2:6a:aa:59:20:e3:
7e:0b:b7:b1:52:90:0f:9c:f8:40:ea:81:35:ef:3c:
d7:b6:cc:26:c0:f1:11:78:59:45:1c:9d:e2:5e:d0:
74:35:86:69:cb:fd:7f:19:bd:d7:09:e8:68:a2:20:
86:99:21:fa:1f:8e:67:f1:45:7e:f8:d4:af:3e:70:
9a:40:8d:4c:ec:45:4c:f7:d3:20:28:0c:38:22:8b:
49:da:f7:f6:c1:33:d8:6a:e2:09:90:a2:2c:fa:e3:
b1:bd:85:c9:13:de:84:71:e6:75:fb:b7:a3:8a:8c:
1f:a2:4c:4c:ff:a5:73:84:d9:92:cf:d6:30:9c:6a:
b6:89:74:de:9f:71:87:a2:1b:48:3e:fa:98:47:44:
fb:01:f1:dc:a2:ae:69:db:70:00:9e:a3:f0:a2:cb:
37:7d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0f:ea:6c:66:2a:6b:96:3f:c5:e8:d3:75:b2:28:2e:97:cb:8e:
ca:7d:6d:bd:f9:c5:d9:e4:a1:5c:1e:95:b7:e1:20:df:fd:0c:
a1:60:8e:4a:d1:37:40:e2:cb:42:db:1e:2b:20:0f:8e:9e:92:
e0:7c:91:d3:72:cc:c6:3a:39:8b:0b:14:7a:5b:b2:8b:aa:89:
58:70:6e:fe:29:7d:44:d4:3a:72:61:8b:32:70:05:05:c3:df:
b8:5b:c4:69:25:e1:7d:cc:18:08:36:19:bb:e7:43:92:12:28:
57:74:b9:3f:54:e3:dd:0b:d2:77:16:d7:2f:09:b1:1b:17:48:
fe:f7:20:4e:fe:80:4c:77:0f:b5:44:70:a2:38:37:43:44:aa:
d1:dd:5f:ee:c7:2c:33:f9:12:20:2c:3d:89:83:dc:e9:63:2e:
08:98:af:dd:9e:ef:51:e7:8a:1b:87:d0:b4:46:4a:63:f0:5a:
b5:99:a3:85:03:21:94:57:7e:a6:84:15:0b:a7:d8:37:05:7a:
f4:3a:3b:85:a5:cf:45:07:6c:0d:bc:2c:7c:55:ef:b0:4d:6d:
4b:ee:36:85:7c:02:29:b0:19:36:e6:ee:84:7c:bd:26:c8:20:
6d:bc:22:85:39:87:71:99:91:26:61:1b:fb:43:72:3a:9b:06:
61:21:7b:bb
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:32 2025 GMT
Not After : Apr 13 10:24:32 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
01:7a:92:ee:a4:74:cc:36:2f:c9:17:70:08:1f:4c:07:92:a6:
ce:af:68:17:30:d5:f5:16:eb:19:e5:4e:0a:9a:1a:ba:97:59:
42:2e:dd:45:a9:1c:99:1d:e9:21:79:7a:d2:9a:80:50:56:c8:
fe:30:39:10:1f:66:72:26:10:ce:71:c2:e2:b3:20:69:10:b3:
d8:fb:c6:10:75:bd:45:56:f4:de:8c:b1:d2:9b:2b:a7:e0:a2:
da:16:29:6e:bc:f3:ed:26:df:6c:70:4e:d0:9a:35:97:05:95:
38:12:01:46:cf:20:92:7f:ad:8a:91:9d:ed:df:c9:05:b9:b3:
10:2b:0f:02:4b:2a:35:27:1f:ef:fe:a9:21:aa:95:61:5a:0b:
b5:ce:f8:14:fd:98:67:d2:1f:11:1b:76:ec:e5:de:bb:09:6f:
6f:8c:c1:6f:95:a6:1e:35:c2:98:f9:e7:c2:88:ab:d7:cd:c0:
61:62:04:fe:d7:a8:c3:97:b0:76:c6:03:f1:80:19:12:89:3d:
b6:8f:82:d4:9f:32:93:fe:0d:a6:79:9d:ba:1c:53:17:6a:c1:
1c:6b:40:16:30:ea:18:0f:7c:30:df:35:a0:54:9c:c3:dc:44:
8b:ea:28:ee:f6:59:d4:5e:f1:d0:b0:e3:32:30:16:ac:e5:f4:
00:5c:d2:2e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 7935 bytes from beginning
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
3,108,055 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:24 2025 GMT
Not After : May 12 10:24:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:df:91:73:8d:d1:b5:9f:b3:7a:ce:59:c5:17:c2:
7f:00:f7:f0:f5:75:ff:8f:19:d3:32:c0:6b:5d:5c:
7c:f3:e0:c9:72:bb:ad:a5:46:c7:c4:2b:c7:7c:19:
0b:00:3c:6e:ff:85:73:c4:24:c4:3f:2e:e1:35:de:
49:59:21:43:25:0d:0a:c2:26:e0:a6:4b:d8:c7:eb:
95:24:71:7d:b3:7f:0d:f7:87:63:98:e1:aa:39:75:
cc:20:a1:61:a4:df:7f:ae:1e:64:9d:8b:a0:2d:e5:
4a:1f:38:26:8c:ac:61:38:d5:91:a3:75:40:78:34:
e6:a8:9c:5d:9a:7c:b4:1e:12:1d:fd:88:24:8f:f1:
e6:75:7c:9f:eb:6e:6b:7d:4c:23:01:cd:71:e5:79:
ae:f6:9d:7f:83:e3:32:64:42:b9:12:f1:65:43:7b:
e0:fb:d3:de:06:79:94:aa:4c:fa:9a:c0:00:3e:ac:
60:ec:15:66:4e:96:09:bc:af:82:22:f9:64:44:36:
4d:22:e9:85:2b:ec:94:7b:c0:98:06:46:0b:1c:a8:
ab:80:e5:3f:3f:00:c3:e2:e6:64:a6:22:fa:e9:b6:
b5:46:49:b6:24:b7:20:a5:b5:e9:32:63:31:7f:c2:
d2:74:29:fa:33:0e:28:4f:5f:ed:eb:14:55:c6:f3:
d3:13
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bc:e0:0f:47:f6:26:39:dd:9b:e2:8f:c5:49:b2:00:6e:f1:56:
71:e4:54:f5:0f:9f:c7:b2:96:74:f4:db:0c:39:6e:37:9f:7c:
f9:84:8e:2b:69:78:fd:d5:be:1f:d2:ae:cb:7d:79:32:19:6d:
9d:a8:d7:ef:22:08:a8:a8:66:d6:b3:c3:6e:c9:be:95:52:be:
22:da:2a:27:6f:c2:27:49:39:68:df:16:a0:11:12:2e:38:2f:
8f:e9:34:07:dd:41:ff:17:20:2d:eb:09:5c:e9:a4:4f:a6:d4:
4f:41:7a:5e:f8:d3:28:06:2a:bd:23:02:49:12:8a:28:fd:b4:
09:03:b0:a6:c7:d5:ac:80:f9:9e:cf:e5:91:c7:12:c7:e7:d2:
94:aa:44:48:45:51:4e:f1:c5:a7:f1:96:79:2b:f3:c3:23:28:
38:73:cd:5a:3f:e3:e2:69:99:2e:97:44:a9:f8:40:67:17:8d:
b6:49:ff:e8:32:38:66:04:3f:e1:f8:23:ae:58:0b:f6:68:53:
1d:71:c5:c0:0d:0d:c5:28:64:5d:eb:15:82:80:1f:48:1a:76:
9a:df:21:a6:e5:a4:c0:43:71:50:47:5c:06:f5:1d:07:ab:08:
a0:f1:3d:59:06:1e:dd:25:37:08:75:d6:1c:79:3a:f1:5b:f0:
3f:9a:d7:0b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:24 2025 GMT
Not After : Apr 13 10:24:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0e:bd:f6:d0:28:1a:00:52:22:81:f3:f1:59:43:35:9a:79:00:
bf:05:2e:88:5f:4f:f5:d0:53:8c:ca:f6:58:64:8f:00:03:de:
cf:a3:13:d0:55:a6:f6:c8:bc:89:8c:50:03:d5:a3:a6:d0:12:
b9:e9:67:f1:2a:0d:63:db:bc:85:65:8f:7f:7d:d3:22:bd:fb:
94:5d:7d:98:54:31:47:19:e9:59:3f:18:6d:07:fc:1f:b2:d5:
a1:55:ff:78:d6:11:10:fe:49:65:3a:02:82:8a:49:f3:05:1d:
f7:52:f2:df:9d:c5:60:1d:e4:31:2e:46:52:9b:f5:f2:1a:a2:
14:0a:5e:ab:c1:71:44:9f:f3:bd:fd:5e:9b:f9:88:d5:26:66:
d2:21:0a:e4:2e:23:d7:da:65:86:b1:72:75:c8:9e:a9:a8:0d:
21:90:5e:ce:0c:cb:99:78:55:a0:ee:eb:97:28:52:05:14:93:
a9:33:07:40:56:91:19:a2:d2:9f:18:0a:be:f6:d1:38:e3:f3:
46:06:13:0d:a8:d3:40:5e:37:65:30:bd:e8:cc:24:46:ef:c6:
32:60:c1:7c:ce:d7:c9:d5:cd:83:40:ed:8d:f3:b3:29:0f:5b:
9f:1c:a8:fa:3c:39:04:06:e0:d5:84:ec:9d:7a:80:11:9c:97:
7a:f2:71:b0
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
Truncated 3059 bytes from beginning
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
2,854,845 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:32 2025 GMT
Not After : May 12 10:24:32 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:e7:12:cb:6e:1f:f1:c7:68:36:71:53:5d:94:
db:ea:73:a4:ab:a3:94:45:1a:54:1e:a0:6c:00:6c:
ae:e2:c0:78:4f:3a:a0:0d:a3:ef:2f:e3:14:2e:d8:
4d:43:cc:e6:e1:13:fe:c0:6d:ee:a7:4e:7e:ba:33:
98:61:94:3b:5d:ac:ec:46:ba:74:7e:89:26:51:78:
b8:f4:72:56:a6:99:62:29:ef:43:97:ae:6d:52:68:
2e:4c:ec:a0:ac:90:b3:32:73:9c:55:c1:0b:73:40:
9f:c8:c0:a0:7c:d0:38:39:f6:63:30:b5:22:e7:91:
c7:4f:90:aa:63:c6:36:10:b2:79:17:14:ea:8d:07:
7f:5d:6a:91:18:42:36:24:4f:53:35:d7:fc:f2:01:
ad:50:32:be:fe:57:45:6f:6a:5d:a3:59:b3:d6:e1:
c6:32:31:5a:fe:88:cf:24:f1:e2:2f:1d:70:5f:5b:
d8:78:4a:de:b6:95:9b:bd:c9:db:37:28:fa:8c:a2:
d0:bc:64:f4:17:85:a0:7f:fa:40:ba:87:24:aa:28:
5e:56:02:fa:5e:d8:a3:69:e5:c9:2f:06:2b:1d:21:
41:11:bf:b4:24:65:30:5a:27:be:ef:97:fa:43:db:
ac:1b:81:4e:f0:0f:ec:fc:ea:f7:af:42:69:0e:f3:
0f:03
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:a8:77:98:b3:7f:e4:9d:74:4d:32:d5:89:34:c3:d0:a3:39:
49:ff:cd:7e:f2:03:ee:17:99:e1:41:f0:13:2d:e7:85:88:86:
b9:ff:11:d2:eb:d9:71:de:d2:69:30:01:36:fb:a0:75:92:42:
0d:a8:2e:28:b3:14:7a:35:92:73:61:12:06:df:c6:64:63:13:
1d:89:7d:52:d0:d5:ec:23:29:4d:9e:0f:b5:d6:22:7a:fb:02:
f6:dc:2d:53:ec:ce:3d:ee:99:36:76:28:ad:07:f1:76:a4:fd:
9b:79:81:fd:01:0e:9b:32:ed:d5:84:84:c4:d8:4b:ea:02:dc:
ba:61:c2:ad:69:85:16:ce:fc:64:7b:c6:f4:4d:09:c4:e1:de:
7b:eb:71:07:3e:6e:be:d0:52:de:4b:d7:61:dd:18:46:6c:47:
70:10:64:f4:9d:8f:c1:90:c1:ac:05:bc:86:f3:eb:fd:2d:da:
78:62:4f:d1:91:c3:5f:29:61:90:aa:d5:70:b7:34:e3:96:52:
5b:7c:a2:f4:8e:d7:86:aa:2b:0c:42:ea:9e:f9:0b:0d:5b:6a:
5a:de:19:12:cc:d8:7d:18:b0:d4:a7:b0:4b:b6:10:f4:0b:c4:
92:19:18:15:a9:2a:3e:bb:5d:c6:ea:b4:44:2a:21:84:5d:57:
5e:5f:d5:a9
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:32 2025 GMT
Not After : Apr 13 10:24:32 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
53:35:a4:11:17:cf:d1:0a:99:58:3c:11:68:a3:d8:02:46:97:
38:5a:40:5c:f7:5d:8c:a5:29:e5:9e:13:76:b7:fa:52:23:70:
8b:fb:01:8d:bf:15:b8:11:1a:9f:b6:95:92:b9:03:46:31:2b:
52:82:54:42:5d:02:cd:7b:af:21:44:e8:74:64:fa:c2:82:80:
55:51:dd:6c:14:75:28:34:06:13:19:92:b1:d1:95:90:6f:95:
28:1d:04:15:72:ef:91:78:03:40:df:bb:f7:6b:b5:25:82:3a:
86:20:ad:4f:b7:78:26:4f:bd:ab:38:3b:b8:f5:01:97:15:e7:
4b:0b:98:b3:d6:f7:16:c6:30:be:a3:7a:72:0c:2f:54:07:e8:
c9:6e:58:85:9e:df:bb:0d:f2:55:a7:10:f0:b4:01:cc:b1:28:
61:57:8d:3d:05:5f:05:6d:55:f4:b2:ad:6e:f3:cc:50:c1:f6:
c7:86:a2:d6:70:e2:26:05:c0:00:78:bb:a0:78:14:ae:b8:1a:
a3:c5:fc:68:ab:cf:57:a4:12:6e:61:0d:24:43:39:82:0e:a6:
47:26:65:b4:cf:0a:32:7d:b3:b0:3c:12:79:72:01:c7:f6:04:
57:cc:2e:b9:3a:17:80:d7:39:a0:21:6a:de:3c:85:4e:00:26:
71:a5:5c:45
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 7935 bytes from beginning
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
3,105,626 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:26 2025 GMT
Not After : May 12 10:24:26 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:cb:fb:1f:66:aa:c0:9d:2f:d8:b8:ef:cc:57:
a7:29:87:f4:99:15:4f:1e:73:52:2b:61:d8:b3:23:
26:da:95:fe:81:e1:48:5b:53:bd:1b:be:8b:48:56:
08:e8:31:80:03:54:65:78:41:78:84:49:88:64:3c:
ea:35:4a:91:30:d1:0c:0a:36:2d:26:38:3f:ba:d6:
cd:c1:a4:a9:7b:6d:32:12:61:d5:7d:4a:bd:58:5a:
c5:5e:a2:d3:ac:a9:df:61:1a:81:80:0a:05:17:c0:
f3:23:2e:68:8f:fd:c8:e5:6b:de:d2:c7:18:6c:83:
64:fd:49:48:c8:fd:89:af:07:67:9c:7c:fc:e7:8d:
9f:bb:29:b0:e6:2d:fa:59:31:8b:f2:26:c8:26:03:
22:66:07:db:b7:6f:63:f8:0b:0b:5b:5e:6b:18:a1:
5e:7a:74:8e:6d:c9:ba:b3:85:bc:f2:ef:91:37:c0:
66:e1:17:11:c5:82:ee:6e:0d:1a:f4:19:c7:64:86:
f7:a4:35:fd:30:bc:53:50:30:a6:d0:78:a3:f6:d0:
fe:5a:10:82:91:fc:af:2e:12:cb:8d:26:b6:99:e6:
ee:28:e0:97:c9:e5:b0:8e:73:b5:18:90:72:05:72:
8c:6d:c5:36:7d:c8:84:80:2d:73:a7:08:66:e9:b4:
06:77
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:31:15:c6:81:88:c4:a6:33:df:96:b1:5b:01:76:1d:a3:4d:
1a:cd:00:e8:74:d8:51:ff:c7:93:3e:14:61:63:b7:ad:64:f5:
79:df:17:ce:4b:8e:71:0c:53:24:a8:e8:68:16:53:4c:bf:95:
42:3d:65:f5:2b:9b:d8:26:8b:f3:08:a2:01:54:0b:fa:c7:fb:
6e:b4:7c:be:81:5d:0c:5d:69:41:b8:0d:3c:0e:36:75:dd:25:
49:f6:a2:ad:ad:58:9c:c2:ca:5c:1c:4f:84:52:19:5f:ab:9b:
97:de:b7:dc:5b:65:05:36:10:0f:09:3a:ce:12:dc:18:e7:1b:
45:e5:a2:d9:65:06:98:a7:d1:22:8c:8c:3f:01:bb:67:9b:41:
69:a4:7d:b3:d4:7f:39:6d:85:97:06:31:50:4c:f2:0f:1d:6d:
10:01:b3:27:6c:ac:a8:fd:8a:4b:1f:b8:c4:7f:8a:0f:64:fc:
85:54:9b:58:52:1e:1a:8a:18:29:68:46:a5:5f:9d:8c:fe:6e:
55:3b:22:29:df:ba:51:c2:fe:41:21:6d:72:54:34:49:82:1e:
4f:5d:71:9d:fe:af:02:81:21:48:41:b2:d5:4e:49:80:9f:b5:
5a:37:66:c0:7a:78:3b:80:d5:30:45:d3:1d:cd:f5:75:9f:11:
41:f2:fc:78
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:26 2025 GMT
Not After : Apr 13 10:24:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
98:c8:d6:3d:ac:a1:94:99:1b:ee:18:53:bc:92:af:8b:de:a7:
0c:b2:eb:b1:32:8d:5b:af:e9:cf:b6:8f:6a:61:d2:11:11:4a:
72:c5:81:26:cd:b9:fd:ea:88:55:44:df:f8:cb:15:e8:3a:a2:
a4:fb:ba:72:18:a9:67:12:b7:3e:25:b1:e4:54:76:4a:94:b4:
89:bd:f2:ab:96:79:26:b3:f8:7d:11:14:fe:7d:41:53:4d:75:
78:fd:35:ed:b4:55:21:2e:8f:d5:6b:b9:f9:34:11:04:28:df:
50:11:6b:7d:2d:57:14:84:a2:a3:a9:58:3a:8d:6b:be:44:be:
ad:a1:3d:99:9c:34:c1:0f:19:12:4f:4a:d9:77:c3:62:5a:2e:
84:79:2f:51:1d:f7:52:d9:3c:29:c8:29:bf:c0:15:c7:cc:3c:
3e:89:85:39:25:a1:ea:b5:aa:8e:73:30:66:06:ca:8a:0f:a8:
1a:c2:ba:0b:ed:c8:87:a8:fe:f1:91:22:4d:d7:03:bf:c2:c2:
f6:06:18:ec:02:19:3f:d4:1a:96:62:4f:fd:c1:b5:8a:ef:e1:
40:bc:b4:3a:87:25:8a:22:63:c3:1d:f1:69:b1:4d:10:52:98:
eb:11:72:00:ad:79:67:aa:ec:ac:3d:67:27:f9:16:86:b0:6f:
dc:1e:94:0b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
Truncated 3059 bytes from beginning
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
2,853,808 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:21 2025 GMT
Not After : May 12 10:24:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c2:4e:dc:c4:a0:02:81:ca:43:3d:5b:4c:20:6d:
05:39:f3:7d:ad:7b:42:4b:46:1c:c4:87:3c:cb:f9:
62:6e:2f:8c:a0:ac:ef:6b:a2:33:d3:7d:e8:60:96:
ea:ab:73:3b:5b:6a:ae:2f:d3:23:05:67:67:8f:0a:
e2:8a:eb:e3:19:97:2f:f4:a4:87:f2:03:57:23:69:
db:4f:fa:ff:59:d2:ff:03:20:94:0a:05:14:8b:f1:
61:93:68:6d:ca:e9:23:77:d2:58:18:45:d6:1f:d3:
55:5f:c1:a1:2e:8d:7d:44:60:4f:ce:89:96:90:51:
67:f5:2a:42:e9:90:3f:5b:a0:5d:bd:e4:db:e7:5a:
38:5b:09:0b:ac:d3:dd:fe:cd:62:fd:a2:34:2c:2a:
e0:b7:40:1c:90:96:78:1b:81:d6:1b:a3:34:24:8e:
7e:09:91:ec:c4:0b:ca:23:c0:b0:bc:98:46:09:3e:
74:98:a9:ce:86:0d:d5:68:41:3f:dc:89:a6:c6:ad:
23:d3:89:ce:6f:1d:20:c6:4a:5b:99:22:58:14:bc:
56:63:94:25:9e:eb:dd:c8:d6:e9:0c:54:54:c5:3a:
45:65:49:73:a4:58:0a:d2:4f:34:25:84:2d:bf:9c:
c7:f6:6d:70:99:5e:f2:c1:ae:7a:4a:67:60:54:05:
98:23
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ac:aa:3d:e8:48:b5:85:1b:90:cf:7c:a8:8d:29:dc:cd:4e:a8:
1b:81:10:f7:29:6f:c5:15:b2:30:54:00:5b:88:fb:8b:80:a5:
e8:ed:3e:9d:2f:e4:2e:82:96:2b:17:61:5e:7f:34:f9:1e:ad:
51:d2:d9:28:0e:36:29:d2:f1:ca:b7:22:f5:7c:b6:c7:7c:a1:
e7:64:7f:b5:14:da:74:23:a2:ed:51:e3:d3:87:41:56:51:1d:
a3:24:99:64:10:90:07:75:ec:5f:94:28:b1:1c:48:7c:20:ce:
72:a3:be:48:2b:c3:b2:0d:3d:8e:b1:bc:f1:da:c4:1e:e7:13:
75:68:61:c9:8a:3a:29:12:56:e4:44:7a:bf:f5:6a:1c:f9:eb:
6b:20:60:7f:d6:4e:db:a4:d5:fc:86:5d:6f:78:42:02:e8:98:
ff:9b:17:bf:48:29:13:28:69:1e:6e:0a:82:b6:4f:59:55:71:
e7:25:47:0d:8c:1e:76:82:de:6b:77:57:78:7d:e0:82:62:66:
54:42:82:43:b3:3e:92:bf:24:68:7f:84:af:6c:7e:af:3e:78:
b5:4b:07:a4:9f:30:1c:9d:7c:63:4c:ce:21:42:93:72:6a:10:
05:2b:c1:df:a4:3e:5d:e6:4c:64:b3:b2:43:71:b6:7b:27:76:
3c:b9:ad:06
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:21 2025 GMT
Not After : Apr 13 10:24:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
65:27:f8:9c:08:b9:61:d8:7c:cc:72:5f:f6:78:c5:00:ef:0b:
33:27:28:0f:50:93:68:3e:41:0b:6a:e2:c8:57:d9:36:38:38:
60:4c:dd:a1:5d:ef:fb:a6:eb:0f:3d:6b:94:b7:73:58:57:12:
e1:a7:67:44:3f:a1:d0:eb:8f:54:43:16:d8:40:c5:7a:bd:45:
08:8e:86:29:98:a6:16:77:4e:e2:b0:3b:93:7b:92:07:6b:0b:
6d:29:80:e9:77:a7:14:c5:19:50:1f:d8:89:ee:81:3a:5f:ce:
0e:20:0f:8c:47:ae:65:a4:16:e4:8d:4b:9f:2f:ea:aa:43:ce:
16:0d:ea:51:8f:32:0d:4e:0a:41:cf:41:15:9c:53:bf:59:ff:
ac:55:3e:b0:4f:c7:a3:4d:08:f6:fa:dc:92:22:df:2f:dc:0c:
0f:0b:45:25:80:eb:be:d0:db:a2:f8:c4:4a:0f:a1:b4:7c:12:
1c:6b:63:59:96:e2:a3:91:80:63:59:4d:07:85:a5:45:29:f7:
fa:8b:ca:af:22:7e:5c:63:ff:6f:84:40:54:f9:8d:a9:98:0a:
93:26:40:ac:df:54:05:18:c9:ce:51:7f:3b:a0:8c:95:cf:bf:
2a:95:62:02:1b:66:d2:a0:c6:5c:5c:9f:08:98:8e:5f:06:bc:
c8:c6:b6:e8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
Truncated 7935 bytes from beginning
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
3,105,787 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:27 2025 GMT
Not After : May 12 10:24:27 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:5b:79:fa:b3:92:a0:5f:6e:2e:85:62:84:8b:
47:57:0c:60:4b:ed:50:85:93:e2:b1:6e:87:46:d2:
93:70:77:d9:5b:9c:e6:93:45:26:c4:de:87:d1:58:
ef:4a:48:51:b1:df:c1:c0:57:20:37:70:7d:47:64:
63:ab:9a:6d:49:c8:e7:58:c4:dc:33:70:c4:46:e7:
3d:25:4f:a4:7a:1e:f3:b1:14:87:a0:db:ba:63:54:
14:45:e0:c7:75:48:1d:15:8d:ef:81:a0:78:28:e6:
96:ff:a4:b0:bf:10:8a:16:2a:e5:5a:57:e9:4c:5a:
36:b1:f6:58:78:f8:9a:a9:6a:3c:93:cd:9f:0f:47:
00:70:d8:32:2b:4d:18:2f:71:7e:95:08:2c:7c:f8:
5a:94:d5:b2:f9:60:f5:2a:7f:54:5e:3d:77:2d:73:
c2:ce:82:2f:5c:b5:ed:1f:26:93:37:e1:ba:76:68:
b9:d4:4e:fb:05:5a:56:ac:dd:43:d4:88:4b:95:34:
a1:b8:0e:68:2d:00:8c:7d:c9:ec:b1:7e:4e:a6:43:
d8:b6:0b:79:5c:12:22:b7:78:8f:54:a8:68:9c:34:
5e:3c:cc:26:ce:61:5b:e7:e0:2f:d5:2d:19:db:38:
22:47:1f:d0:b4:2c:b9:97:2a:17:84:86:ec:33:d3:
ec:0f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7a:02:f5:c5:b1:a4:b1:88:73:97:a9:b6:fe:9a:f7:4f:4c:62:
31:a5:a0:1c:41:0b:f5:c6:65:58:54:74:66:ba:0e:5e:df:10:
dd:a9:9d:71:2f:ac:89:e7:e3:9e:6c:2f:97:08:15:ae:d4:b7:
48:12:dc:31:6d:4f:0f:4d:4e:21:46:22:23:ce:e0:75:72:62:
3a:6d:93:70:3f:d1:27:04:11:5d:f5:4e:4c:2d:00:cc:86:4b:
56:ce:95:fe:8b:cc:f7:81:07:f4:71:9e:37:db:66:01:d4:ff:
a5:53:37:b1:4d:e6:f3:f4:75:ce:a8:50:b9:ec:6f:88:34:c6:
ed:67:07:d0:68:ff:41:cc:83:27:ec:dc:97:5a:b0:1d:55:d4:
7b:99:52:59:b7:bb:4a:28:9e:79:44:17:b3:fd:01:ad:d5:6c:
8b:56:fb:2c:94:af:f3:b9:fd:a2:2f:f9:ab:07:22:e3:02:38:
b1:00:67:56:d7:0f:93:2d:46:07:3d:10:a9:00:54:6e:d0:d7:
6c:fc:fa:d9:a9:bf:aa:bc:52:94:79:40:b0:51:4d:07:8b:7f:
db:9a:15:b0:70:16:b6:2e:83:70:f8:1d:2d:c6:1d:35:71:36:
22:25:f3:36:c7:d9:0c:76:1f:a6:d7:9c:93:5b:ec:6e:80:48:
35:e2:23:66
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:27 2025 GMT
Not After : Apr 13 10:24:27 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9e:36:b0:77:7f:31:3b:cc:5e:72:55:0e:29:16:32:74:31:26:
21:c8:59:3c:ec:65:26:03:4b:45:71:99:41:00:39:03:92:a7:
5d:99:7c:00:6a:5c:64:d1:93:e4:11:f0:22:57:94:f3:d5:cc:
ce:b9:0f:2c:23:97:92:02:fc:1c:16:db:9c:7f:a1:f9:9c:f3:
67:d7:a3:87:bc:0a:f1:e4:9e:6f:96:ea:e5:0d:cb:4c:00:08:
36:86:31:80:2a:21:6f:a5:1a:02:24:2b:ee:93:f5:ff:7f:01:
bb:c7:22:6c:58:90:85:c9:fe:96:9b:48:34:db:49:ab:95:20:
46:65:b6:ff:59:67:18:e2:14:9b:0d:4f:44:1f:34:f9:6c:f0:
f9:dd:53:2c:82:65:75:82:e6:5b:31:98:f8:1e:12:65:9e:43:
34:2b:d5:40:36:a3:bb:e8:4d:76:09:95:d1:c7:dc:03:3f:ee:
d9:99:4f:30:58:a7:bc:d1:9a:5a:ba:c2:eb:94:70:62:e8:5b:
f4:10:6b:eb:37:9a:9a:50:ef:52:a9:af:52:02:ea:02:4f:a8:
d3:b3:82:f0:6d:70:51:24:3d:36:4b:f9:de:24:a1:6a:12:57:
70:b6:e2:90:c2:e4:00:ad:12:33:53:ba:9f:bb:ef:b0:0f:82:
a9:84:0f:99
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 3059 bytes from beginning
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
2,854,159 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:23 2025 GMT
Not After : May 12 10:24:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c5:bd:23:ed:58:e7:30:7b:3e:cd:f3:74:29:01:
5a:dd:b1:d0:d9:da:ac:99:28:e8:96:f0:40:47:69:
71:ad:f8:ba:6a:f8:18:52:b1:0b:44:19:d3:0c:8a:
bb:f6:07:c4:1a:73:e0:79:76:ae:86:4a:a2:79:68:
f2:f4:74:43:24:c9:d4:73:64:55:ab:5c:cc:33:59:
f7:28:54:cc:83:ff:3a:63:2d:e2:2b:da:1b:0f:ac:
d0:6c:2c:c3:e7:60:d1:93:ae:c0:56:74:bd:6c:b9:
02:7a:59:f1:ef:c6:a3:ce:15:98:ce:5f:a4:40:8d:
47:e2:cf:d3:c0:8a:4d:e6:91:40:2c:e0:e6:37:85:
04:41:5e:9d:a8:60:38:68:7f:3e:73:8e:b6:f2:03:
9c:f4:f5:67:ba:68:b9:bf:c6:1b:c6:c8:ab:ce:80:
ac:bc:d4:74:2a:e2:c8:2d:fa:8b:23:c1:45:a8:9a:
ca:e3:fe:5e:18:d9:bd:a1:75:00:9c:d1:2b:84:b4:
8a:e9:63:fd:90:5d:6d:b1:e5:dd:35:2f:88:fd:3a:
d6:9c:7d:09:05:7e:d4:00:a6:a1:a7:3f:54:23:2f:
cf:81:cd:9a:2c:68:b8:ee:16:c8:06:95:a1:32:82:
f8:4d:a6:bd:2c:1e:a7:5c:2a:b0:15:21:be:2a:55:
db:37
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
39:9e:64:11:b6:bf:f7:92:d1:40:69:ce:f3:42:de:bb:f4:22:
f6:39:74:05:a0:d9:f2:6b:61:c6:74:a6:66:f9:e1:0e:7e:87:
ed:68:5f:61:25:e1:a0:aa:73:21:00:f7:e2:5b:4b:68:cc:ef:
29:77:86:8b:78:ca:a3:88:c4:52:d6:f5:86:6e:ee:c0:ce:c3:
9a:6c:4e:7f:b4:ac:82:4e:93:fa:98:07:9a:70:22:c1:42:6e:
4c:a8:16:bb:dd:1a:88:43:00:35:f1:78:fe:e1:5d:3a:d2:35:
68:ae:74:a8:00:64:d2:84:ca:7c:0f:cd:aa:db:fb:bc:56:87:
d2:e1:00:c8:76:2c:1e:67:02:13:48:01:11:5c:62:27:25:7c:
14:fc:9f:12:e0:06:19:45:9b:66:ff:73:83:75:a6:8c:02:aa:
46:ff:40:57:54:0c:7d:04:47:9f:72:9a:66:1a:95:97:d4:04:
76:d1:78:d7:8d:18:b0:e3:e3:ad:1a:22:4e:b1:5d:30:6e:fb:
ee:08:38:12:af:94:e6:22:3c:a5:88:26:30:70:b7:18:dc:15:
43:42:3e:2a:7b:7d:73:73:85:00:0a:d4:cf:58:4d:b6:2f:a5:
ec:be:50:6b:72:ed:0a:b9:a9:09:50:9c:33:32:a1:77:e3:2e:
b3:7c:fd:5d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:23 2025 GMT
Not After : Apr 13 10:24:23 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bb:4b:fc:d8:f0:f1:73:59:d8:18:f2:cb:b1:e7:f5:60:d0:01:
fd:62:5a:94:28:07:c0:82:d4:7f:08:31:48:5a:51:5b:a5:94:
23:f5:96:99:df:2e:3c:9d:2e:3f:91:e7:f9:e2:12:2c:1d:b7:
85:9b:4b:7a:93:80:1a:97:24:14:8c:75:1d:02:81:b9:a8:ca:
8b:48:63:56:82:84:a3:b2:10:8d:d5:56:b3:8c:a5:a4:ca:e6:
5a:a1:55:a4:3e:dd:66:ef:10:94:4d:f2:8d:e1:a3:95:fe:d8:
d4:7b:68:1f:27:1c:1d:2a:29:7c:e9:f3:d2:15:9d:63:01:e8:
00:db:30:b1:ad:75:24:ee:33:cd:e9:ea:28:1c:32:b2:ca:06:
1c:5f:dd:4d:cb:2c:1d:60:b4:a8:2c:d3:83:dc:0f:de:79:9f:
e3:94:79:3a:22:7a:45:f2:ae:99:cf:09:20:8b:65:bf:bc:8d:
73:a0:eb:ec:66:d2:e3:bc:82:4a:3b:f1:f8:2e:8c:36:9f:b2:
ab:21:c4:92:34:6d:cc:3d:46:f6:0b:b5:d8:6d:f9:29:97:73:
cf:b7:45:48:24:1d:e9:13:48:56:e4:00:f5:ca:87:5b:fe:f1:
ea:c8:15:69:29:a9:04:2b:86:8d:66:83:0d:b3:53:38:d8:68:
cf:3f:89:86
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,103,790 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:35 2025 GMT
Not After : May 12 10:24:35 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8d:bb:2c:06:d7:3d:5a:5f:4a:c0:04:97:90:22:
80:e0:3d:98:b6:b6:62:b6:27:df:55:ba:59:56:74:
43:31:05:45:38:e3:5f:c3:0f:01:1e:65:a3:95:b4:
6a:f9:3a:d2:b0:6e:1e:05:fb:6a:87:93:bb:a4:a5:
80:f1:c0:3c:27:ac:37:dd:f5:eb:0f:bb:89:f7:ec:
1f:c3:84:f0:21:38:4e:e1:51:26:8d:bd:82:2f:90:
94:d5:03:b5:19:13:10:6e:5f:04:e7:f3:a4:e1:ee:
3d:fd:84:f5:47:fd:71:b1:a9:8e:60:24:13:4a:4b:
dd:93:57:9d:ea:0a:0f:b7:82:0b:7c:2b:5b:12:7f:
7a:42:26:12:77:fa:9e:75:cc:42:86:08:d5:59:09:
2b:c7:32:b2:74:b2:a0:21:0c:fa:f5:26:82:51:3c:
a8:d0:1f:7c:74:f4:39:20:d7:74:eb:cf:f7:e9:27:
14:82:50:cf:20:d9:b8:1a:81:44:f8:bc:72:58:b6:
37:f1:34:b0:44:1a:b2:01:d8:08:51:bf:70:f7:2a:
3e:23:00:2f:2c:aa:da:e6:0d:a6:79:39:27:d0:c0:
8d:b3:88:10:e8:56:9e:a1:a1:2a:63:a7:20:70:ac:
73:1a:35:79:45:4a:c5:43:b7:74:92:2b:f6:da:c9:
0f:ed
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
07:c0:6b:c3:16:45:66:ff:86:cf:41:02:91:f1:8e:c6:66:99:
42:c9:c8:56:89:f4:aa:0d:55:64:eb:d3:e0:ef:f5:bd:07:d3:
1a:61:ea:ba:e4:b2:6a:7d:9b:03:d4:ae:23:e7:20:f0:06:48:
57:0b:f7:05:f8:bc:7a:ce:c9:bb:1b:03:25:08:29:d5:53:79:
d3:6c:d8:f5:de:98:92:50:fe:df:87:b1:bb:b5:4c:a7:7e:85:
42:de:c6:a0:85:93:a0:b2:5a:b3:b2:07:49:b2:7a:38:f6:bf:
67:1f:c8:99:c7:3b:5a:e5:f5:f6:72:37:5c:9b:b0:2b:05:ae:
97:26:48:f2:ab:52:c5:17:70:45:0e:63:d3:b8:ca:5c:72:15:
c8:8c:d9:92:cf:1c:41:ca:a0:85:fb:5a:a7:6e:a7:26:55:33:
79:d7:02:9e:47:d7:d5:ae:c3:c1:d6:05:06:ec:b8:1d:ea:29:
23:b8:ba:29:af:db:b6:6b:ef:db:94:11:c1:10:4c:30:af:2d:
9a:6a:b2:51:58:19:54:83:cd:18:88:7b:da:fa:c3:d3:7f:a8:
3c:0f:ab:22:3b:bb:91:14:dc:b6:4a:d0:be:f7:c4:c5:e8:a4:
d6:16:80:5f:50:db:a2:1c:5e:7d:4a:e3:2a:f2:77:6b:a7:ec:
15:b4:e7:43
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:35 2025 GMT
Not After : Apr 13 10:24:35 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
31:c4:ef:2e:a6:34:b8:ca:86:1e:c2:0b:db:14:1c:f2:10:e7:
81:20:d7:fb:fe:17:65:52:43:30:7b:a5:20:a6:9a:e8:56:b2:
89:77:35:6e:e3:14:9c:90:2d:86:4d:fe:d4:c5:e3:31:ff:9f:
d4:ef:81:c4:c8:e0:7d:b1:58:50:9a:dc:f0:61:e3:31:2c:fe:
4c:4b:ad:c8:fc:6d:08:2a:6c:5a:80:68:47:3c:0c:de:65:fd:
05:ef:90:6c:04:72:d7:62:ba:2c:97:6c:19:ff:02:c2:a1:9d:
b0:74:1e:43:02:c0:b9:aa:cf:d9:df:ec:80:97:03:54:7e:82:
a4:10:f9:d2:3f:52:97:93:c8:16:2a:f7:55:60:01:90:a2:83:
10:90:20:64:0c:48:c8:2a:a2:d0:d9:82:75:fb:05:3a:38:e0:
f2:1d:c0:bd:7a:22:10:07:45:2c:ee:91:60:2b:a9:2c:2a:21:
81:78:3d:a9:6b:1a:1f:68:1a:0f:9a:e6:22:49:3c:fe:e4:59:
60:da:3b:ae:d2:04:42:26:b6:a8:87:f0:0c:58:a8:fd:c5:b4:
69:8e:86:2f:f5:65:3f:78:a3:98:91:71:c4:7f:ad:d4:91:29:
9d:b0:f1:8c:d8:89:6b:3d:62:1a:1c:88:72:59:22:5b:d9:51:
ed:e8:f4:f2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 3059 bytes from beginning
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
2,852,322 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:21 2025 GMT
Not After : May 12 10:24:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c2:2e:79:39:41:00:51:52:b1:0b:cb:34:c0:14:
88:eb:69:3c:c2:d4:d2:c9:62:a0:ce:c0:d6:04:77:
64:6f:a0:f2:1c:9b:3e:4c:8c:e2:e6:7e:fa:ff:0e:
5b:86:82:36:3a:54:1a:1e:17:f0:95:79:7e:af:a6:
34:b1:ea:24:8b:0f:4e:fc:d3:ac:3d:3a:85:b1:05:
a3:92:e4:29:51:48:28:32:61:bf:06:76:fc:a0:d6:
9e:fe:d8:d3:66:e8:14:44:a6:74:c5:34:a2:4b:72:
eb:67:a5:b0:23:a6:91:61:25:b1:1f:fa:63:18:14:
ca:10:32:16:9f:61:28:ec:e8:aa:d1:99:cb:07:3e:
32:4c:bf:d2:c8:85:3d:31:8a:e1:bd:d5:ee:92:42:
da:0c:45:bd:94:bf:47:6f:46:1a:b2:77:4c:8e:94:
46:75:56:e3:e6:05:be:41:46:78:b4:e5:1d:a3:70:
68:6a:86:fc:6b:d7:40:92:fa:6f:60:8d:3c:01:a1:
ce:bc:00:81:60:2a:93:96:2c:ba:83:25:6c:92:5a:
4e:cd:02:05:b4:86:0d:e5:62:7d:42:57:50:64:c6:
ff:6d:bb:1b:43:55:c2:85:1b:04:48:e6:45:30:38:
63:ad:cb:df:d8:2a:2a:fc:cf:b6:99:35:6e:16:a9:
36:99
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
11:2b:72:0a:72:a7:68:7f:b2:d1:e8:90:92:52:c0:4b:09:0c:
a0:3b:b0:69:cf:fc:3a:99:1f:ff:4d:87:ff:1b:0a:c6:42:00:
ad:cc:35:43:c6:16:52:a1:75:f6:09:ef:ae:4a:f0:12:b4:4e:
76:c7:e5:70:80:ab:1e:95:7d:a2:7c:cf:01:1e:cc:78:c6:ad:
3e:bd:d1:54:e7:bb:df:0e:12:a7:8d:76:44:97:98:43:11:bf:
06:3a:9c:77:95:d8:a8:df:39:f1:db:0d:bb:41:f2:11:fc:27:
cc:d0:1f:0a:29:c6:c7:4c:2a:ee:11:88:89:b0:35:b5:1f:91:
7a:70:10:4a:43:b4:4c:e1:54:35:e8:50:e4:e9:0e:3c:06:da:
71:f3:29:f4:09:ae:52:ec:05:eb:5e:f7:47:8a:0a:09:a1:f6:
7d:a8:9e:9e:a9:7b:62:a5:34:78:e1:40:84:75:f4:bf:fa:20:
cd:22:06:e3:6b:73:d4:e0:e6:a0:7e:73:06:ef:f8:f4:2a:8f:
80:eb:bb:47:f9:73:e4:67:0f:87:d0:c9:94:73:21:79:5c:58:
3e:be:04:6b:b0:d4:b5:27:e7:35:97:ef:6e:a7:16:05:98:a0:
14:a7:2e:c2:1f:f7:38:01:f3:42:00:ad:42:ce:a8:ce:a3:76:
a8:51:cc:2d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:21 2025 GMT
Not After : Apr 13 10:24:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
35:10:91:6f:9c:5e:1d:25:f7:e4:7f:1d:d5:20:34:f5:9e:03:
72:63:11:71:ec:95:89:28:46:e9:85:91:30:61:19:05:c5:ea:
c2:ad:20:80:08:7e:e3:17:74:01:0b:79:98:d4:83:ef:cb:f6:
a8:c1:ac:16:db:b9:9e:f5:18:49:52:97:85:ff:95:0b:43:a6:
72:f6:dd:f5:f5:25:d6:b8:e7:04:00:15:a6:e4:b6:2f:04:a4:
41:0f:24:e0:95:b2:cf:ff:0b:e7:06:ed:2f:4e:2f:cd:4c:47:
f9:95:83:dc:97:d7:2c:ec:f2:87:2d:1e:94:cc:2d:16:62:c3:
e6:06:6e:65:d6:33:89:f9:60:9a:36:95:13:32:31:3b:d4:49:
df:16:0b:be:19:1e:33:8e:f2:2c:fa:28:da:e5:c6:fa:9c:1f:
37:61:e6:a4:e6:3a:cb:d6:f7:fc:3b:28:76:1a:a0:f0:70:b5:
c1:8b:f6:6e:d7:df:22:b8:58:d1:73:60:49:70:51:34:9d:10:
9a:0a:1d:f5:1a:e0:72:70:6e:d3:ad:e5:a7:48:19:58:f2:4b:
92:d8:6a:3d:c4:b9:bc:4d:5b:98:16:e3:cb:06:4c:5f:8e:99:
0c:f9:c2:92:3b:eb:0c:b3:e4:4f:82:f6:b0:29:2b:7a:12:2e:
f1:3b:57:e1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,106,101 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : May 12 10:24:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d0:67:ab:77:af:56:a0:48:34:f8:11:cc:12:21:
4e:81:32:9b:1c:34:d5:28:37:63:ae:78:19:19:6e:
e6:5b:cc:36:af:bd:d8:5d:75:52:15:c2:66:b4:0d:
32:59:1d:63:81:c0:24:63:e0:bf:d6:aa:f0:b2:c2:
71:cb:ba:45:0d:c0:27:46:5d:44:fd:2d:d0:a8:99:
d1:34:e0:a6:3f:96:84:82:67:2f:d0:80:23:c8:99:
0e:4c:01:d2:42:d5:5c:d2:9a:e1:85:3e:a6:d2:61:
c9:10:0b:23:ed:8e:b0:47:77:5c:2a:2a:5a:c1:1d:
12:d7:d3:7d:aa:d6:2d:f0:76:19:6a:99:7c:22:40:
be:dc:80:d4:1b:15:8f:20:2c:67:c2:48:a3:a1:56:
46:aa:a2:af:4f:00:30:ae:b0:dc:97:e6:bd:42:15:
f2:4b:10:aa:49:c3:fd:1c:69:c7:f4:a2:cd:3f:80:
3f:9d:70:0d:81:81:98:11:bf:fb:31:3e:01:15:7c:
bb:73:e4:28:2f:78:8a:42:e9:13:d3:dd:69:00:83:
b0:e3:49:f1:5d:55:dc:f3:4e:a3:c6:4c:d1:7e:82:
6f:ab:52:fc:4c:f3:0c:c2:6d:61:21:9e:48:e7:93:
6d:31:50:85:44:94:1f:9b:0f:d9:39:d9:cd:0d:58:
7b:cf
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c0:ca:f4:cc:ec:de:50:39:f9:57:b0:7c:f3:3f:f4:db:82:27:
95:e4:8d:35:11:65:5e:1b:f8:6c:3d:ed:10:a7:06:2a:81:c8:
37:ba:1e:8f:0f:d0:d3:64:e9:9d:ce:13:e3:03:7e:b4:c8:6f:
4a:d7:c3:e7:b1:50:68:55:5b:62:df:5c:26:a7:fd:32:39:cd:
78:4f:4c:3b:27:81:90:87:ad:07:ce:c2:53:30:63:f2:7e:5f:
32:ca:6b:83:a9:83:70:8d:13:3d:ad:ba:b6:80:e6:ef:85:20:
29:90:df:4b:f1:55:f6:a2:66:73:02:56:ac:69:7d:24:3d:3e:
e0:a6:82:8c:16:f0:c0:d4:0d:ae:d9:2c:7c:11:01:1a:21:7c:
2c:0e:ad:7c:ef:f3:45:71:9a:fe:73:2a:d4:1c:ef:e5:d2:f7:
2f:fa:94:a4:2a:48:2d:af:70:b6:50:07:1d:5c:ee:ba:b9:78:
73:76:32:00:0b:c2:29:92:0a:0c:ad:a9:2a:aa:ea:5f:31:88:
a7:18:a2:9f:2f:8b:67:42:21:18:2c:27:21:99:99:7d:8f:e5:
80:32:da:19:1b:98:71:b7:02:97:9d:e1:4d:43:6a:c5:83:89:
fe:42:fd:a0:c6:64:1e:4d:08:a4:6d:38:3b:07:26:c4:f6:e9:
21:17:90:8e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : Apr 13 10:24:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3b:b7:48:a3:e7:2f:fe:ee:86:e0:46:6e:31:ee:f4:b3:bb:22:
79:48:95:19:b5:36:1e:ec:fc:29:cd:11:a7:b0:71:76:c6:b0:
70:f0:f3:b7:e4:d4:7d:9f:03:b4:ad:b1:a6:06:58:93:85:53:
22:9a:ff:77:4c:aa:7f:ba:32:2e:7d:57:0a:fb:6f:12:de:eb:
a4:e8:6f:d4:1f:61:82:b0:07:94:3c:e7:70:a1:10:2a:96:32:
c9:2b:ec:38:9e:3f:ae:09:4e:56:c3:e4:fd:7c:21:7e:6b:30:
25:02:20:5c:7d:a5:61:7e:4f:54:66:68:99:b1:30:63:8a:7b:
60:0e:3d:ef:82:d4:b9:c7:a4:e4:2c:f1:af:bd:a2:22:db:ad:
0b:21:f0:86:31:e7:b0:8f:30:db:fc:f2:5e:a6:47:ae:49:34:
6e:bf:2a:39:fa:de:70:68:14:07:d1:32:c7:ba:6d:62:d1:47:
8a:03:23:ef:95:dd:95:25:47:ce:a4:79:c9:e4:a2:d5:38:90:
b5:52:5d:f0:78:2f:3e:3c:36:1f:94:92:35:72:e4:61:2e:ba:
97:3f:49:98:b8:c7:5e:df:a6:4f:18:2a:41:ec:f1:9b:c0:64:
2c:ae:b8:0f:cb:20:6c:72:18:49:f9:d6:22:1c:e2:8f:30:32:
e2:9a:91:57
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 3059 bytes from beginning
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
2,855,177 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:28 2025 GMT
Not After : May 12 10:24:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:18:40:55:cf:e9:1e:26:07:c0:be:4e:b5:85:
5c:b2:8c:53:22:0a:31:78:c2:57:79:e9:db:46:63:
a4:17:78:a9:be:db:20:ed:99:b1:70:ae:26:b8:1f:
3f:d6:bc:08:f9:57:65:79:fe:57:dd:58:b9:54:13:
56:ba:47:21:18:88:df:3b:73:45:a4:23:df:b0:b6:
b3:61:07:92:e3:8c:93:b9:2f:37:af:55:14:78:19:
bf:84:df:b7:5c:e4:06:4c:60:2b:3d:da:5b:2d:9d:
c0:00:f8:d8:84:88:01:26:4f:ad:1d:16:5e:fb:be:
4a:b1:ec:25:be:d4:99:9b:d0:51:ec:01:b3:72:0b:
4c:f1:52:51:76:f5:cd:22:56:07:c1:aa:7a:16:6f:
52:f0:c7:24:9f:12:47:cf:4b:b4:28:8b:b3:c3:75:
a0:90:89:e0:5c:a9:9e:af:fc:e2:db:35:53:20:1a:
70:1f:e4:d7:71:54:5a:7c:92:ec:6a:2d:fa:cf:11:
d2:aa:1e:7c:cc:0d:e0:ba:a5:3e:4c:76:de:c9:b4:
c9:21:ec:ba:05:30:34:6c:12:58:65:41:f1:cf:17:
43:93:83:d1:f0:c8:f4:82:2e:bd:38:45:a0:0f:87:
7d:58:15:03:50:4c:3c:75:61:41:f7:5f:bd:55:6c:
0f:d9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ab:7d:e0:ac:7e:7b:0c:cf:65:06:e6:04:a1:b0:db:62:e2:11:
c9:53:a6:16:a3:03:21:6a:6a:e8:b6:30:2e:b7:9b:50:81:6c:
bc:b0:d3:39:24:2d:f4:d1:ac:7d:a1:65:88:5b:40:3a:56:4b:
92:51:34:89:42:b6:75:dc:3b:12:22:f5:4a:58:2a:9d:f6:06:
7f:15:77:ce:0f:39:42:c3:1a:35:e4:fa:15:00:e5:e4:82:4f:
f3:4a:9f:3d:62:53:34:cc:07:39:01:c0:08:3a:0a:ee:60:27:
65:c6:3e:a1:6a:bf:15:a8:3f:37:f8:32:3e:d2:61:13:1a:16:
fa:83:89:49:12:04:c2:26:80:a5:ac:be:4d:f3:52:2b:7a:93:
b1:0b:e7:84:ce:62:91:af:15:a6:e6:66:7c:ee:be:96:03:3b:
6a:f3:e2:bb:b3:85:7d:77:92:f5:f9:30:bb:00:78:b6:e8:5a:
b6:f9:f4:8b:93:1e:65:99:02:5f:a5:cf:64:f0:54:c0:c3:3a:
12:b1:91:0f:03:da:a6:72:06:b3:a0:5f:94:0b:f4:a9:c5:92:
c4:90:da:21:45:a8:ac:38:08:13:6c:34:67:f3:47:36:3f:f9:
e5:1b:a8:7a:93:54:fc:3c:d4:da:8c:2e:c2:9e:37:dd:3a:87:
a3:eb:ca:8a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:28 2025 GMT
Not After : Apr 13 10:24:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2f:e7:91:83:69:28:92:76:e4:8d:e1:88:13:00:d8:6d:58:62:
36:c0:07:99:16:52:00:d7:e2:5a:b2:2e:ee:32:19:56:41:d5:
8b:35:5e:e9:5d:f8:60:ed:f5:36:6b:6f:02:52:be:c8:65:bc:
c7:a4:20:f5:b4:29:a6:2a:c2:8c:e9:ee:c1:a4:32:bf:3d:bd:
91:50:0c:52:6d:ba:98:cc:b1:fe:b2:65:0b:d7:0f:81:ed:05:
83:c7:e3:3a:22:4d:4f:f2:1b:17:7e:d9:a0:7d:e3:03:71:42:
e6:12:e0:b6:dc:95:c1:78:68:34:9c:ee:71:81:4b:10:1a:5d:
22:bd:31:c2:3c:b3:24:02:69:dc:36:02:72:f3:f1:90:bb:40:
78:9a:e1:e3:23:1b:49:95:72:ef:50:9f:48:49:4c:63:d9:2e:
27:52:25:46:aa:f4:b2:66:07:99:9a:4b:c4:2e:e2:fa:66:2b:
ec:c2:3d:0a:95:3e:65:49:34:b4:36:ee:f9:af:75:6d:e3:40:
b1:8f:a7:5e:87:d4:4b:15:0b:8b:bd:f7:22:04:ef:cc:2f:a8:
b6:e4:20:6a:7d:42:c6:e1:49:c2:41:96:71:0e:5a:5b:11:c8:
e6:a8:df:9b:c2:ed:e8:02:e0:73:64:15:4d:73:f0:2a:6b:a8:
dd:56:d9:6c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
27,015,405 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 12:42:52 2025 GMT
Not After : May 12 12:42:52 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:37:17:98:c2:f1:e0:16:1c:5c:5a:ad:8b:7c:
6a:89:e3:6c:39:c6:80:c3:52:67:58:15:16:04:72:
79:54:7c:4b:b6:b7:25:f6:a0:9f:f2:d8:51:77:11:
5d:e4:75:b6:8a:6a:04:a4:22:22:6c:dc:be:c1:c9:
88:4e:ea:80:00:9e:68:65:b0:cc:46:07:1d:0c:4b:
20:66:36:8a:84:c8:b5:89:b7:eb:1f:5d:6e:e2:e6:
bd:69:3e:9a:63:9d:44:f8:4f:5c:87:63:df:af:69:
d4:65:0d:95:ce:78:32:08:ce:0a:88:08:3d:80:d8:
8d:5b:6c:33:3b:ee:51:da:5e:6c:89:a0:71:11:75:
08:93:1e:05:68:98:6a:66:30:15:ba:10:98:42:3b:
84:6b:ed:da:10:ad:3a:09:a3:32:ee:b4:0c:8f:c7:
f5:04:a8:20:34:bd:a3:44:45:13:57:32:fa:47:03:
a0:0d:29:ce:dc:bf:03:90:79:fd:30:0a:c4:9c:68:
2d:8b:a9:b7:db:e5:49:2a:dd:62:02:f4:97:45:ab:
19:47:db:61:a9:d4:d3:da:d8:3c:63:58:3c:d9:55:
e3:0c:29:f8:94:9b:f1:6c:b6:89:16:57:49:10:97:
fb:c9:d5:b1:7a:6c:1e:ec:f6:7a:10:f7:d9:02:93:
25:55
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
82:18:d7:6d:9d:d2:17:66:56:51:68:93:5c:a7:25:7e:f3:f1:
59:9f:95:88:7f:cc:f3:12:2a:fe:68:48:e2:13:9f:51:4e:62:
6e:f8:ce:9d:0e:05:5e:5b:da:5e:46:27:ac:b7:20:11:90:20:
41:7c:cc:04:cb:b7:63:8b:89:b4:7d:44:98:97:d9:d7:0b:5b:
62:72:44:cb:6c:a9:82:2a:08:63:44:22:de:f8:0b:62:2d:aa:
3e:87:f0:d6:68:ea:f4:e8:28:2d:d0:ea:5f:ab:70:ce:d0:9c:
56:de:ff:3e:39:ed:40:0b:36:ed:36:37:96:f1:f2:40:15:dc:
68:ca:98:6b:3f:c5:33:ce:06:10:28:35:01:0c:d6:65:7c:99:
87:86:e1:67:1e:ec:64:73:47:2e:d5:e3:4b:e9:88:96:23:ff:
f7:99:d6:c3:f2:da:2c:ae:ee:4c:8c:e1:af:b9:61:22:e5:51:
c6:26:85:03:82:e0:d3:a3:8e:e7:d3:f4:bd:fd:89:f3:69:61:
f1:9e:ce:63:ec:04:66:3c:70:c7:00:26:b6:9a:1a:cc:b2:6b:
3f:9c:c7:15:d1:45:ff:25:7b:ff:91:bc:56:c4:e2:c9:7f:f3:
a6:70:c6:6d:57:4a:41:75:1f:d5:68:d9:1b:b2:20:3e:7e:0c:
5c:4c:79:7b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 12:42:54 2025 GMT
Not After : Apr 13 12:42:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9f:a6:56:6d:5e:d7:5d:90:5f:fb:f0:a5:3a:4b:b8:c0:95:2e:
a4:9b:e6:74:14:ac:18:93:e1:3b:40:14:20:38:aa:79:05:ab:
c9:68:83:17:1f:1d:27:fd:c6:0c:21:fa:bc:2a:f6:c1:c8:36:
49:ca:e0:01:70:53:ae:56:c3:94:fc:d8:54:5f:07:54:d0:01:
65:f4:d3:2b:f9:c0:99:1f:f4:b5:4e:47:94:1e:ef:66:05:68:
19:b7:c2:c4:81:d7:3b:aa:b6:fc:4a:4a:83:ee:91:b0:71:cf:
98:9a:54:0d:5b:9a:b8:9f:81:a2:ad:0b:8d:e5:fc:6f:90:0b:
71:46:b6:20:74:bb:f8:c9:93:f4:8e:8b:cb:a6:eb:96:b2:65:
cf:f9:af:48:65:a2:50:a5:16:b6:72:b4:2d:dc:a3:e6:19:60:
6d:4a:17:25:da:86:08:29:a0:b5:a8:4f:e3:5e:55:e0:26:55:
25:82:83:97:68:d7:aa:02:50:7c:1e:49:ca:4c:c0:0d:51:24:
17:c5:80:07:fe:a7:c8:9e:d0:0c:30:9b:0a:d3:42:82:7d:dd:
94:bb:7a:31:19:06:ff:86:4a:d2:97:60:07:6a:de:db:2a:5a:
bb:40:b5:ed:9e:3e:64:ea:cf:08:05:35:7f:dd:29:b9:39:27:
35:87:d0:e1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.44s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,551,309 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 15:22:00 2025 GMT
Not After : May 12 15:22:00 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:be:a1:06:00:f1:5c:8d:03:28:ba:f5:2d:3c:4a:
b2:9f:6d:c8:80:28:8f:cd:37:6b:33:19:dc:2c:6d:
ee:c9:a1:f1:69:ef:bf:6d:9c:16:1d:41:5d:6b:8d:
ff:3a:5a:77:94:22:9e:e5:f8:3c:b8:1b:b7:70:35:
a1:60:3e:7a:c0:08:b6:01:72:39:eb:96:31:54:17:
a3:5b:ac:a4:8e:02:5c:95:c9:52:a2:32:d8:83:69:
56:45:87:28:cf:e4:b7:bc:87:03:59:c5:4a:0a:16:
84:75:76:43:41:21:ef:89:37:00:70:cc:ec:45:49:
28:5b:88:bb:f8:62:c4:0c:16:81:89:7c:0b:5b:d0:
9f:17:ff:8d:aa:7c:13:f3:b2:0b:45:9e:03:a0:7e:
d8:94:07:3a:2a:55:84:6c:11:05:cb:a1:79:5e:bd:
a2:e9:b6:d7:b1:74:d0:f5:0b:27:6d:9b:11:74:4c:
a9:d5:9c:5e:5e:16:c3:49:2f:d5:00:c2:22:91:37:
c7:5a:e6:76:0d:9f:64:05:f8:02:39:1c:c6:65:73:
3d:e5:08:84:5a:a2:28:af:b3:51:08:39:19:94:42:
6c:a5:2e:14:fd:78:26:f8:47:22:21:c8:30:0f:5a:
ad:96:fb:1a:84:2f:d9:99:b9:0f:31:6b:3a:9d:b9:
e2:51
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
70:0a:8f:f3:6c:2f:0f:a6:59:9e:38:d3:dc:02:27:f2:e4:0a:
29:7d:0b:63:b4:b3:a4:a7:71:eb:42:74:2c:b4:e2:db:1c:c7:
5b:12:1f:67:ae:02:da:70:56:7e:20:58:eb:20:c9:86:64:d3:
f9:11:42:1c:bd:37:8e:7b:2a:b3:a8:55:83:47:73:c8:4a:53:
84:a0:a1:b5:05:f0:eb:16:a6:c3:43:ad:9f:52:5f:70:06:88:
d0:3b:9e:16:ea:49:cb:ce:33:80:25:fb:41:c3:6c:83:89:08:
8b:43:49:89:d1:b1:11:39:aa:14:57:60:df:87:5c:1e:18:9c:
2a:82:d6:40:d8:8a:47:15:7b:cf:95:e9:40:4e:00:87:b6:40:
36:c0:70:e9:15:3b:50:f1:74:23:fc:b4:3d:d3:0f:e8:67:3a:
e0:6a:a5:9a:6d:47:bb:d0:b8:45:6f:c0:66:17:c8:68:e4:55:
8c:f6:c5:4a:25:37:68:4a:a8:8f:f3:10:2c:e8:31:40:95:0b:
1b:f4:6e:d7:eb:9e:0a:07:cd:22:87:83:7c:40:52:90:0b:cd:
99:04:de:7c:40:db:e2:0d:40:a6:24:c8:51:8f:92:8f:0a:c0:
54:4e:35:88:3b:7a:dd:a3:9e:f5:9c:fe:5a:03:3a:af:02:d9:
4b:d2:7b:2d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 15:22:01 2025 GMT
Not After : Apr 13 15:22:01 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9d:cc:e4:d4:5f:20:8c:aa:82:75:93:fd:c4:d0:fb:65:30:9c:
27:c8:ca:9b:33:fd:ae:2f:9a:3a:76:f9:9c:71:8f:8a:55:91:
56:14:8e:0a:ff:4b:bb:01:b6:18:bd:4e:4c:73:94:05:76:ac:
f1:fa:be:3e:9b:fa:86:b1:33:65:e2:7a:59:a8:80:57:27:f2:
a5:bf:31:54:11:82:27:c6:df:63:66:58:c0:ff:13:54:80:db:
24:ba:9c:95:79:af:48:51:3e:c4:5b:c3:ea:35:92:10:9c:b4:
da:09:47:07:f8:ef:72:6d:2a:98:3e:ae:17:54:2f:06:fb:9a:
23:6f:81:15:9a:bd:9e:9a:f0:2d:51:86:57:86:a2:ea:60:1d:
b5:c3:0a:dd:97:6a:0a:30:37:30:59:9d:20:07:78:1a:a9:31:
78:92:20:5c:41:95:29:0d:92:f1:ee:32:d6:41:e8:0d:2c:1b:
1f:4a:6e:8b:4a:03:46:a5:6d:7b:21:b7:d6:3c:b4:56:3c:cf:
ae:fe:5c:c8:41:8a:11:64:6d:0b:0f:6b:bb:ca:d8:83:b5:b5:
b5:2a:fc:5a:a2:6c:50:4d:ec:3d:de:ff:bc:69:91:30:83:d1:
90:12:38:a0:74:42:ab:50:fb:bf:eb:1b:d4:3a:4d:a6:65:2e:
93:49:48:c0
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.50s
Truncated 8023 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
27,120,846 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:59:14 2025 GMT
Not After : May 12 10:59:14 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e9:c1:04:55:ac:68:82:ea:dd:81:70:79:a3:e3:
37:e0:85:7a:b7:22:c1:75:ed:5c:c2:8f:e9:61:be:
b0:ce:92:1c:25:61:de:df:b7:7c:61:89:07:0d:93:
c0:fa:bb:9c:cd:a7:88:f5:a8:fd:5f:9d:94:79:11:
52:49:e3:d1:6f:10:9f:bc:0c:88:e2:59:70:9d:8f:
91:e1:80:27:f6:00:e7:b8:d3:70:06:bd:9b:ff:af:
9d:35:00:92:df:5c:13:5d:85:19:a4:05:36:0a:30:
ba:d5:43:3d:a4:86:81:2a:bd:9b:0c:5d:91:a9:0c:
52:e3:33:f6:83:9f:2f:08:98:09:bd:63:a1:bd:b0:
f9:84:20:c1:a5:09:ca:0f:b8:d6:9b:8d:5b:53:1d:
9f:00:7b:a6:91:0c:34:da:65:c4:36:d7:46:98:5d:
28:3b:27:ad:17:9b:8b:db:98:70:52:72:26:c4:36:
5a:59:d2:72:05:b5:66:f5:f6:a0:53:ef:4d:ab:6a:
ac:2f:58:c9:a9:b9:81:0c:b1:7a:e8:17:9d:8e:87:
77:38:fb:d4:67:83:e7:e1:ac:4b:b1:ee:df:4d:aa:
79:8b:18:ee:22:9e:07:19:d3:62:7e:76:19:e8:5f:
08:74:28:f8:1d:19:db:d0:01:4d:e1:d2:93:bd:aa:
3a:4f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bd:14:86:58:0f:44:63:2b:40:5b:54:1c:b5:c2:88:19:1d:85:
38:c0:6e:df:d7:6b:5d:74:4d:5f:d0:8b:36:94:38:50:2e:ed:
16:81:c0:15:8f:db:fd:cb:e5:58:2e:62:84:4c:0d:13:7b:f1:
fc:4f:c4:ad:b3:d0:1d:41:10:06:18:80:28:d5:76:9f:2c:d5:
b0:25:fc:1f:ff:68:9d:3d:fa:e3:1a:86:cd:78:8f:62:b1:da:
7b:73:4c:b8:70:83:56:ce:dd:7c:e3:e6:b9:ce:b5:4f:99:90:
24:62:21:fe:62:f1:3f:d8:5f:b4:83:8f:a8:9d:d8:11:82:5a:
cb:35:92:15:e8:58:4f:27:63:36:f3:a0:f7:59:83:65:6b:c0:
6d:97:fc:41:63:44:f8:2b:a6:67:53:cf:89:46:66:63:82:81:
42:54:f9:50:34:53:22:99:28:89:f4:e2:37:5c:96:ad:a4:8f:
ab:10:ef:f5:be:f0:1e:e8:c2:a8:01:a5:b7:ff:e6:63:9a:f8:
bf:98:c3:5f:1b:9d:af:ee:84:fb:4c:51:1b:0c:ec:c4:ff:0d:
14:e8:42:d1:41:76:a3:07:78:73:26:a2:59:2f:8c:ca:f5:8f:
71:53:5e:25:02:54:be:5a:a0:18:02:1f:cd:d0:27:51:a5:e1:
a8:b5:68:d1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:59:15 2025 GMT
Not After : Apr 13 10:59:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
97:e5:ae:01:be:bb:10:e8:b8:b4:2a:86:15:9a:49:da:0f:1b:
80:4d:a8:7c:78:68:01:9e:c2:61:36:f9:6f:d8:ac:a0:38:cb:
51:24:44:9d:6f:57:19:46:39:63:07:fa:77:12:05:5d:96:18:
87:00:72:4b:b6:84:fc:9b:e8:b4:5f:1c:cd:0a:39:16:7c:5d:
2d:39:fb:4e:66:28:a3:1e:66:50:e4:39:13:bc:ef:63:81:77:
a8:be:f0:56:d1:ca:59:da:c2:01:d4:68:50:12:b7:52:0b:5e:
e5:a2:f0:a9:d9:f2:bb:6c:8e:7d:23:e1:51:71:05:2f:46:76:
f5:3d:dd:26:15:3d:b0:19:19:3b:22:ae:2f:49:62:5c:f1:e4:
57:c1:55:aa:16:d5:5b:89:aa:fc:64:d9:98:fd:26:d2:d2:40:
f0:dc:ac:11:1c:ba:8e:85:88:83:06:a7:64:66:30:a5:e3:aa:
87:60:03:ca:4d:dc:80:24:99:6c:4a:ec:c0:a8:4c:0d:7d:38:
93:84:2c:85:a0:b9:e2:93:e9:c9:fc:b2:8c:18:83:4d:ef:8c:
8b:f6:45:e3:ad:1e:4a:95:e0:ee:f7:69:74:dd:6a:c3:5f:38:
96:d9:b8:ac:88:07:eb:c8:85:39:80:91:67:e5:83:a4:10:2c:
a4:29:72:96
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.26s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,615,599 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 14:25:04 2025 GMT
Not After : May 12 14:25:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:7e:10:d7:b8:08:73:58:26:4f:fa:cd:bf:3e:
3b:1a:46:47:fa:7e:04:2f:1e:e6:c9:7c:e6:0d:71:
43:75:46:07:fc:a1:67:14:91:e0:21:a9:42:09:04:
31:2b:d5:aa:83:6b:2e:a5:9c:4f:6e:9e:69:79:11:
6d:a3:b5:17:a2:ed:9c:24:fe:31:8a:88:40:8c:d1:
52:fe:44:08:c9:b7:76:ce:02:77:d7:5f:76:5b:53:
1b:b3:f7:03:91:38:c2:a5:61:4f:e0:9e:7d:f6:a1:
4c:ef:a3:80:f8:2d:7a:da:37:a4:75:47:e2:56:31:
4d:10:02:1a:23:8f:2e:23:d8:1c:64:84:a5:57:26:
b2:0c:44:e2:1c:51:5c:66:2e:41:9a:c0:93:5a:97:
db:5e:3e:e4:c4:34:c5:65:33:59:ac:d4:11:77:b9:
26:a0:1f:03:bf:30:92:7e:38:39:46:00:ac:bc:28:
ec:6c:e4:97:cf:67:17:b8:30:2d:39:b4:c3:81:f6:
35:98:61:78:c8:27:74:f6:72:5f:d0:72:32:5a:b1:
0b:60:84:10:a7:4f:ab:dd:8c:1d:ec:9c:02:20:84:
f3:5a:f2:af:9f:b5:1c:59:64:98:96:b7:6b:bf:42:
47:84:b9:53:9a:44:46:83:66:9c:1d:82:3f:7a:8b:
52:07
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ad:57:22:b5:37:f1:bf:b2:80:fa:7d:3d:bf:95:95:9b:68:11:
5c:6e:58:f8:9c:a4:95:d0:dc:6b:c0:d9:84:15:4a:3e:e1:16:
15:ff:17:ea:7b:a7:7a:7f:7a:06:1a:f2:b1:aa:f6:b0:68:7a:
bd:2e:af:97:e4:88:74:cb:c9:4e:7b:cc:60:99:03:7c:c9:59:
e8:82:75:b4:4a:d6:ed:bf:86:93:1c:4f:4e:97:30:be:45:f0:
4e:9e:93:8a:e5:32:1d:24:b7:7c:31:59:91:fe:7a:24:1f:f8:
90:24:91:bf:a1:b2:d2:a0:ef:3c:c7:c8:8b:f2:50:3a:54:3c:
bc:cd:2b:31:c7:1d:42:ba:e9:5d:c2:ba:21:61:4f:50:f6:c5:
a4:07:c8:df:ac:0c:c1:36:89:f9:5b:d6:d5:97:ce:0c:06:56:
45:c0:8c:5a:c2:6c:2c:40:bb:83:dc:e0:5f:76:e6:8d:7c:0b:
e9:ce:51:dd:b8:bc:58:3d:26:59:37:85:4b:12:cc:ff:49:d4:
b1:9a:0d:9c:73:92:ab:7b:e9:ab:5b:46:8b:8e:0e:d6:5c:48:
d0:75:46:d5:f3:f7:2c:06:6b:c6:3a:23:c1:34:fc:eb:eb:98:
80:5e:b6:3c:f2:5a:06:93:15:29:42:b8:21:bd:3a:63:19:3c:
b9:bc:1f:3e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 14:25:05 2025 GMT
Not After : Apr 13 14:25:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3a:e5:31:70:65:c9:ae:e0:cb:7b:f1:4a:7a:0f:3e:cc:04:dc:
b5:4b:b2:0f:ad:53:9d:0c:ba:99:9e:4c:ed:fe:f9:9b:50:e2:
34:10:d8:89:d3:37:0a:8a:8a:d9:6e:c7:45:0a:9c:c0:c4:e4:
89:a0:d7:e3:fa:95:86:b8:3d:06:ff:0b:bf:50:5c:cc:cd:fe:
68:7f:ff:3d:52:7b:0e:55:9c:7c:26:4d:df:b4:8d:9a:4d:aa:
06:57:83:10:9a:b8:43:d9:7a:2f:e7:38:31:73:34:c3:b3:99:
28:b0:ae:15:a6:3d:34:b5:cb:7e:8b:63:36:74:16:82:b5:24:
8d:a6:43:46:66:88:0d:6a:d2:de:a7:fe:ac:58:de:30:ac:9c:
fd:d6:a2:ba:1c:e7:58:a5:12:ef:4a:a3:90:61:6d:21:91:09:
22:a5:84:01:c8:e2:77:09:7f:cc:3b:89:8a:1a:6b:b2:bf:07:
94:e5:bf:7b:7e:26:52:fb:50:58:d7:b9:bc:c3:4c:85:24:b9:
07:bc:d5:fb:11:46:5a:c9:cb:05:b5:2d:4c:61:7e:41:1a:e3:
f3:41:f4:3d:c4:3d:91:02:95:a0:0a:14:1a:b4:65:94:70:66:
57:a7:3c:74:d6:86:f7:43:31:72:9b:8f:f6:06:fe:d9:5f:50:
0d:8e:8d:74
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,719,666 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:58:36 2025 GMT
Not After : May 12 16:58:36 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cd:4f:be:08:91:88:aa:b9:9e:41:14:2e:d7:f2:
ce:74:49:49:30:28:04:42:95:38:c3:5e:0e:37:37:
11:f3:02:37:c8:08:33:85:cc:eb:34:c4:a9:1d:0e:
4b:01:3f:70:e1:9d:29:73:11:80:9d:fe:83:76:3b:
cf:4b:48:35:0f:b4:ec:7b:ea:35:fd:27:2b:60:26:
19:de:69:21:fc:6b:f9:1d:46:5f:cc:c0:b0:79:56:
85:97:8a:1c:ac:2b:99:ac:d1:08:66:54:ba:aa:1d:
fb:b6:04:2a:2f:2c:db:c2:9b:e4:74:02:b9:89:a0:
4f:18:1b:23:10:69:53:98:f2:bf:fd:55:8f:fd:c9:
1e:fc:f6:6b:fa:a4:c5:ca:51:42:d5:86:b0:85:4c:
90:43:75:55:d8:07:8c:97:11:8f:6a:16:45:90:38:
5b:b7:b3:dd:e2:a8:65:52:ca:13:f5:03:76:1a:c6:
12:54:35:2f:d4:48:08:49:71:9c:07:3a:9e:ed:65:
92:de:da:4c:e2:ca:72:60:a5:3a:19:86:a0:a7:20:
f0:90:51:c0:52:d1:ed:52:65:40:9d:68:78:b0:aa:
7d:7f:5f:57:d5:56:e3:a3:4c:14:4c:af:8b:04:81:
9b:1d:4c:39:32:43:71:87:5f:0d:50:6e:b6:70:0d:
15:13
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a8:1a:2f:00:aa:b0:ed:d9:cb:61:a6:f6:64:21:c7:f6:81:24:
16:e5:e6:86:6f:f4:ae:d0:fc:49:56:05:2a:b4:27:e7:17:e2:
11:d6:cc:44:3b:05:65:b7:b8:a6:10:1d:bd:9a:80:77:fd:f8:
41:fd:7d:5f:e9:89:c4:84:68:4d:16:e9:c9:be:f4:af:fe:9e:
ac:e8:1a:b2:eb:df:28:86:71:81:ea:1e:87:4a:51:29:25:1c:
2d:78:18:f6:d4:84:b1:1a:a1:cf:f8:e9:fd:57:e7:32:af:51:
94:39:55:f5:86:6a:e8:ed:f8:68:e5:d1:0d:86:f7:7f:8a:8c:
ed:a3:e5:68:35:1b:89:10:73:f4:16:24:ca:e1:0e:66:24:11:
1c:93:b7:1e:ff:b8:ae:6f:d9:9a:e7:c7:f6:bb:f1:33:b0:85:
64:e8:36:6a:af:b8:c3:97:6f:80:f5:7e:d0:49:59:1a:7a:0c:
ce:20:f6:a4:e7:59:6e:70:9c:1a:86:41:a4:8d:06:51:47:32:
ff:24:75:4d:df:c4:1d:4d:60:f8:38:f3:dc:aa:46:0c:66:11:
75:92:71:02:c0:2d:81:b8:17:12:14:b0:53:2f:5c:1e:0f:2f:
6f:bb:be:01:1b:ed:f8:0b:42:92:89:09:04:59:49:f0:77:3a:
4b:fe:22:4c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:58:37 2025 GMT
Not After : Apr 13 16:58:37 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
35:1a:ab:0a:c6:dc:df:df:02:70:89:d4:e7:48:f0:49:e9:64:
ea:6e:3b:21:5a:b9:15:66:2b:b9:ff:b4:e9:1c:6f:fd:0c:d6:
fa:78:69:ab:b0:f2:d9:91:64:69:88:6c:f3:ad:c1:34:a7:d1:
75:b6:7c:6e:45:c1:92:5d:2a:68:3f:0b:49:4a:48:4a:c3:04:
6a:9b:56:bb:86:63:35:1d:c2:95:45:8d:e6:58:3c:e6:27:0e:
fc:f5:b8:08:11:bb:7e:48:d1:8e:1f:4b:ea:53:c4:c9:ef:67:
9e:79:69:d6:25:a7:72:8a:de:38:e7:14:7e:dd:d2:c6:a4:05:
ee:ae:ec:94:86:24:5d:3d:70:71:4b:54:36:8c:14:87:09:df:
89:d2:b6:7e:25:b0:0a:03:10:cd:49:eb:60:69:42:1d:cf:b8:
e0:93:29:d7:c5:8a:8a:21:e3:de:09:0d:e7:e8:39:ba:09:b1:
af:d9:81:52:36:dc:e1:0f:7c:c8:7d:6d:e4:b8:53:f0:5c:eb:
8d:bd:0c:fb:04:d0:b8:ad:84:95:e2:03:29:7a:56:62:bb:3d:
7e:39:0c:c1:f7:a6:7e:a8:c7:c6:11:e1:52:a4:07:3e:92:49:
d5:e3:98:a3:f4:87:55:5a:95:58:da:9b:13:36:5b:a4:d9:38:
13:39:f8:a7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,718,730 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 11:49:13 2025 GMT
Not After : May 12 11:49:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:2d:50:4b:52:bd:b4:ba:c6:c5:1c:82:d7:a5:
f3:01:93:d8:dd:fe:5a:05:e9:9e:da:2d:b9:f2:cc:
b6:e8:ac:db:c5:b9:05:4d:b5:51:c9:78:13:63:e6:
94:a7:ea:47:43:5d:4b:39:3d:23:66:20:b0:6e:78:
7a:7c:49:25:bb:52:8e:82:be:0d:e9:04:18:2c:5b:
43:55:1f:76:77:de:10:72:ee:a1:dc:3f:6b:bc:ba:
7a:29:d8:11:97:3c:41:e0:5f:92:1d:bb:63:09:0f:
eb:71:9d:84:08:f3:e7:67:da:65:44:80:e0:eb:f8:
65:d8:29:a1:dc:1b:b0:f6:07:67:bf:c4:5d:e2:b5:
ca:45:6a:97:7b:36:b3:e5:da:3c:73:76:c4:e5:c9:
75:7a:76:40:6c:fa:6a:ea:54:74:96:5f:af:b0:5f:
09:27:36:ec:f1:c0:d2:a7:58:9a:95:dd:6b:76:21:
c1:0e:2e:87:45:a6:00:23:0f:11:7b:81:46:13:8e:
8b:76:63:93:b6:17:b3:79:b4:5f:32:71:3d:65:53:
26:d6:a7:75:5b:f0:45:7a:e8:a8:d9:c4:96:2e:90:
c8:d9:45:db:8b:b7:40:7b:ed:c8:ee:0d:28:3f:47:
fd:0f:40:9e:2e:28:1e:51:4d:fa:72:f2:ed:86:d7:
b1:df
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0f:ee:5d:63:e9:96:6c:de:72:42:9b:28:7a:d5:bd:63:90:af:
5a:a0:f7:54:3a:e6:74:51:32:4f:11:2d:a2:8a:82:ff:8f:a2:
51:79:f0:29:fc:3a:c2:b7:77:de:8d:c2:fa:02:8d:4d:39:3a:
d7:66:a5:db:fe:e5:62:7b:77:e2:94:c3:2d:03:6c:d2:35:a7:
ba:ab:b1:5d:5d:8a:18:f6:c9:b0:27:2e:df:ef:77:95:2a:49:
94:8e:bc:dc:c4:20:a1:85:22:5a:f3:94:f5:29:26:92:d1:32:
c5:4e:6c:92:5c:d7:e3:07:e2:42:df:f4:95:78:61:d1:e9:cc:
a2:9c:ae:18:65:41:02:9b:0c:21:7e:69:31:cc:28:d8:94:80:
0d:bc:68:f7:04:e6:4d:27:a7:f4:80:ae:18:3a:73:5a:68:fa:
c8:c9:a3:b1:6f:fe:3e:37:8a:4c:e5:51:44:69:3f:66:e1:eb:
08:05:fc:88:40:73:ba:bd:f7:47:21:4c:37:14:50:33:b0:13:
9f:e1:28:d3:ad:1e:02:b8:71:99:d4:1c:06:ec:a2:81:e7:55:
8f:69:7e:89:41:88:10:20:bd:07:f6:99:2d:d4:b1:a1:15:3c:
15:50:ac:0b:6f:a8:62:21:12:a7:52:fb:94:1f:77:77:41:c3:
05:4a:58:76
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 11:49:13 2025 GMT
Not After : Apr 13 11:49:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
53:4d:ea:ad:53:0c:74:16:f7:f2:5d:b9:04:0b:21:3d:78:dd:
ef:06:a0:f1:69:2f:e9:cb:02:11:86:3c:e7:4a:f4:28:2f:7d:
2b:a3:24:ac:b4:9b:ac:9d:45:b7:81:98:a3:0e:78:1f:13:93:
7b:98:e5:90:e4:1e:96:3a:b6:c5:e6:85:0a:eb:63:2e:61:12:
5e:91:3b:36:2d:2a:38:94:b5:ff:28:b8:3a:34:a0:73:f8:72:
8e:b1:0c:38:e7:fd:1e:07:4c:f0:43:27:50:4a:07:67:43:59:
a8:47:42:e4:be:05:62:dd:45:ee:91:e7:61:2c:3f:7e:b1:cb:
9d:1c:cd:36:e0:c0:05:b4:8c:6e:de:50:9e:04:13:30:9a:10:
e9:35:54:34:8e:7a:25:ec:36:58:8e:82:21:b4:5f:77:7d:5f:
54:af:91:09:81:c9:7c:5f:21:19:7d:36:f3:72:54:c1:bd:15:
d4:40:43:4c:ea:87:88:93:22:40:69:bd:98:38:7c:d4:5c:62:
24:f7:97:5a:5b:f0:96:a4:3e:76:39:85:e5:1a:50:ed:b0:63:
0a:e9:38:16:d5:c5:b8:c3:9a:b4:10:33:2c:d0:d9:01:57:2d:
d5:62:45:d1:c5:95:f3:45:39:57:0e:d6:56:95:40:3e:4d:51:
1c:47:c8:26
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,242,880 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 13:31:56 2025 GMT
Not After : May 12 13:31:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ce:22:79:eb:cc:17:a1:d5:5b:3c:8b:77:cf:95:
b6:b1:b5:75:f6:dd:5a:50:53:72:fc:97:68:c1:20:
54:34:12:eb:c5:bc:ca:5e:47:d4:3b:5b:f2:cd:2b:
30:6c:32:12:5d:06:f9:a0:bb:84:cd:47:76:4a:56:
d1:f0:b2:dd:47:3d:53:b8:3c:39:8d:f0:5b:10:c5:
be:67:4d:0c:ae:8b:5c:c3:86:06:3f:f8:65:bb:a6:
3e:c7:3f:aa:85:f7:f6:1c:0d:75:b2:9c:9e:61:b9:
38:a2:7c:e9:a1:13:b8:c9:04:8f:a6:02:d0:e1:bd:
3f:c0:3d:1c:03:99:57:e3:f5:ec:ef:97:0f:0a:5f:
1b:44:bd:2c:50:67:43:56:67:a9:e3:dd:f5:13:42:
8d:6f:0a:46:a9:bc:a7:1b:96:99:ae:32:d1:51:7b:
83:89:d4:44:87:e9:e1:1a:e0:80:9e:e1:9c:95:b6:
6e:f8:8d:c3:83:37:82:0e:c1:51:db:c7:3a:73:3e:
fc:7e:b2:88:92:a5:8c:98:a1:54:09:42:90:2e:25:
c4:f1:39:ac:57:39:40:0a:87:e0:5e:90:b9:e1:43:
79:26:2d:cd:c7:6c:3f:f1:74:5d:0e:bf:03:34:72:
f0:f4:47:b0:a1:b5:5b:9c:e6:00:c2:b0:a1:53:20:
44:f5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b0:b8:61:70:c7:8b:5f:40:fd:53:a1:9f:f7:8f:39:9b:aa:6e:
76:07:06:af:02:0c:90:98:a8:1a:ff:3c:2f:b9:ca:0d:01:07:
db:f0:a6:12:bc:b4:f2:45:cb:84:37:6f:5c:42:2b:c3:71:03:
43:12:1c:e1:3e:87:d7:d9:c3:a8:12:3f:ac:d5:18:c1:07:31:
cc:22:2d:64:a8:b7:01:41:9c:52:ea:54:28:7c:a5:54:4d:b7:
14:e9:aa:34:d1:87:6c:61:44:a5:f4:78:0f:ba:27:05:d9:72:
a9:91:f2:8d:22:16:f4:b9:31:4f:54:14:51:dc:59:c1:7d:46:
e0:63:d2:8b:43:2e:02:a8:f2:19:d6:b4:9f:4f:42:56:47:ee:
58:f7:86:bf:64:ea:37:77:6c:54:9b:5f:0f:00:d5:04:92:42:
29:58:05:eb:fb:79:c5:6b:97:fc:95:72:5b:2a:ba:7e:51:44:
e5:27:29:af:1e:5c:a7:9f:ef:0c:f5:0e:18:45:2e:e7:c7:e8:
cb:d4:34:b2:60:74:b4:a8:ab:ad:b0:a2:24:94:ee:0f:4b:51:
1f:8e:62:3f:c9:cf:e2:94:22:1d:23:00:61:5b:57:50:5f:81:
b1:8d:4c:ff:28:35:d7:b0:cf:ba:d9:a9:7b:cc:2d:d6:36:32:
93:11:97:01
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 13:31:56 2025 GMT
Not After : Apr 13 13:31:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:7e:8c:b9:e2:03:89:4f:c1:35:56:14:dd:db:61:65:1c:0f:
f2:e4:d4:a3:fa:80:e1:ca:6f:67:04:9f:f0:5c:85:82:8e:9e:
df:7e:fe:78:23:44:99:05:46:f2:00:df:82:fb:ef:f0:c4:90:
67:dd:7f:4f:9c:b8:02:1e:6c:2c:56:82:43:d4:68:09:16:68:
ed:55:f0:70:bd:85:e9:44:f1:73:aa:fa:34:27:f5:7f:d2:fe:
23:4d:ba:e5:e8:f1:40:68:0c:31:5c:25:ab:54:ff:db:ef:f9:
9e:9f:c9:d1:fb:5e:54:ad:6a:f0:5e:a0:62:d9:92:b3:bb:0f:
a4:df:9c:69:11:c0:84:df:1a:5a:70:d5:2e:2b:c5:91:39:8c:
ac:fc:c9:36:2c:bf:99:9f:98:6f:a4:12:0c:70:41:b6:05:30:
be:b1:a4:bd:a6:ae:de:2a:be:8a:80:64:e1:67:a7:3f:00:09:
82:6b:22:94:fa:2f:6c:56:2b:ee:0e:83:a6:8a:0c:93:2a:03:
f6:0a:84:fc:d9:bf:c6:49:62:b6:2d:14:0d:18:20:6a:a9:1d:
f3:0b:19:f1:95:73:dc:ef:87:21:b6:01:b2:df:92:cb:06:74:
9e:8c:0f:93:92:b8:75:dd:8e:b2:96:42:02:b1:77:c9:6f:66:
49:08:a3:04
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
Truncated 8023 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,916,387 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:11:40 2025 GMT
Not After : May 12 16:11:40 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:d5:1b:f7:5b:cb:66:e9:2a:c8:15:1d:25:15:
ed:ca:17:00:35:fd:c1:89:9a:9c:2d:be:a2:c1:c5:
ac:09:6c:8a:b1:9b:c2:e0:b8:fc:35:aa:bc:8c:b0:
5d:ba:03:05:48:28:29:6c:ac:95:2a:47:b8:67:d7:
d9:7e:ab:89:2d:f3:77:7c:56:d9:39:52:64:74:c8:
25:66:49:52:d3:db:20:f3:62:48:6f:1a:95:1d:eb:
63:8a:b1:d8:77:48:c9:14:01:34:78:35:43:0f:50:
69:4c:97:70:12:8c:2c:ae:18:84:61:3f:45:84:f9:
e7:3b:f2:56:53:ff:59:23:37:2f:6f:5d:b4:fc:b5:
46:1d:3b:c9:da:da:3d:f6:61:7b:1d:3d:5f:85:43:
5c:76:d4:4b:ee:8b:50:cf:d7:03:63:56:79:91:ea:
be:71:3e:93:90:2a:7b:e6:12:b9:68:16:bc:78:bc:
0f:4d:1a:5c:ce:60:2f:01:2d:a4:ed:1e:30:ac:66:
c7:e6:f7:52:dc:14:9d:97:cc:13:55:dc:70:58:4d:
41:a3:16:e1:60:a3:15:6c:fd:c3:8e:97:d4:23:35:
e8:c7:9d:96:d7:6f:83:ef:12:90:ab:68:56:21:18:
e4:c0:30:aa:9a:01:66:5c:b9:07:7d:6a:52:d7:5a:
87:59
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
51:d4:10:39:9e:fd:11:95:e0:cb:25:27:e9:fa:b4:ab:1e:47:
f0:bb:7e:eb:37:23:c4:eb:e0:d5:48:4e:9d:e8:7b:d2:ff:b4:
c4:d9:8e:8a:d3:4e:34:8d:4a:1f:f3:16:1c:42:f3:4c:04:0f:
bb:0d:62:12:97:5e:5e:e2:2f:f5:4e:20:b4:da:fd:b1:29:15:
af:b2:4f:b3:8f:2b:14:45:ad:1d:51:5d:7d:00:86:31:96:4d:
73:d2:7c:ae:2f:67:68:99:24:92:38:76:92:4e:41:c1:db:b9:
64:38:6f:e7:77:fd:e5:46:43:52:7f:28:6b:68:ed:ae:b8:c0:
58:d4:cb:43:88:83:15:3e:d0:a5:5f:35:d0:b3:1c:4a:cb:29:
a9:35:ee:dc:30:bc:16:90:15:9a:19:02:db:36:29:0e:ca:c7:
91:ef:c1:62:7a:b3:cd:de:ec:a7:62:1c:fa:cc:38:04:80:90:
cd:1c:08:72:8e:7d:72:0f:95:2a:c6:b8:25:78:ba:88:5f:0c:
7c:0a:38:1b:a9:36:fd:31:6b:17:a6:d1:6d:ae:95:5a:a1:bd:
bc:5c:3a:72:94:a2:0c:5c:47:a6:82:68:36:3f:a2:14:31:d4:
4c:aa:29:2d:d4:2c:f3:d2:23:bc:bc:bb:d8:a9:bd:ef:19:60:
5b:a5:c7:8e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 16:11:40 2025 GMT
Not After : Apr 13 16:11:40 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a0:25:28:b5:18:65:72:86:9c:58:d4:ab:be:a4:b1:ba:03:9f:
86:0e:16:47:05:b0:e8:01:08:39:1e:82:26:da:50:00:fd:5a:
cd:b8:36:32:7a:53:5f:1a:69:f6:d2:de:2a:2a:d6:26:7f:5b:
db:f6:a8:0e:67:53:c6:54:8e:4d:92:4f:c6:a6:cb:de:47:b2:
e7:d7:44:ba:e7:a3:f8:6e:fb:36:91:e3:e3:64:34:fa:da:58:
0f:7a:55:4b:11:59:82:fd:d4:7e:72:3d:e8:56:b7:06:fa:35:
e7:4c:78:bd:0d:bc:b3:ba:da:1c:58:05:21:26:19:c8:8c:22:
cf:d2:42:ec:3f:48:03:55:cd:cf:2b:86:c5:bf:72:99:89:2a:
e1:dc:01:ec:31:a7:07:6b:08:2c:6b:86:94:70:3f:13:6e:7b:
29:12:82:e6:49:e1:3a:d6:73:c6:42:db:d7:a7:4e:ce:26:c0:
bb:d1:35:e5:9e:00:42:ea:7d:90:3d:60:59:1b:b6:3d:27:96:
8a:24:1b:3d:76:7e:be:9b:d0:ca:d8:ed:10:fa:66:a5:7d:33:
a3:62:a4:49:6e:cc:e9:a1:13:75:f7:c3:b0:fa:5d:51:67:44:
e6:ed:5e:94:70:17:85:d9:79:e5:a1:96:fb:2e:f3:47:99:44:
45:9d:19:7b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,408,001 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 17:44:04 2025 GMT
Not After : May 12 17:44:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:3e:5a:e7:59:12:a8:13:3d:df:8a:02:10:5d:
66:5f:f8:c2:11:46:7f:ab:12:d8:fe:f7:f6:58:78:
15:1b:e7:73:57:d8:a7:26:94:82:9a:98:e9:2d:03:
04:31:22:11:c3:b0:4d:c2:0a:0a:0a:8b:64:98:e6:
32:63:a7:f9:3e:d8:f0:6b:9d:53:da:75:4e:cf:c0:
2e:77:55:97:b1:dc:73:40:07:d0:11:85:c0:97:7c:
1c:b8:9f:e2:82:5b:9b:96:42:21:e5:a6:69:d9:42:
c0:0d:a7:40:d3:08:83:8c:d3:86:02:ba:48:6f:6d:
ed:66:30:70:9b:59:c3:3d:6c:32:95:07:2a:2b:9a:
88:cd:4a:81:f7:e8:67:cd:42:fd:80:74:d3:39:f9:
27:23:89:9b:d4:96:e7:f7:29:e8:c8:6a:b1:e0:58:
a1:4f:98:3c:a6:20:7c:20:c1:1e:68:0f:f7:fe:41:
42:8e:f0:eb:39:51:5f:03:67:34:9d:79:78:e7:ff:
c5:05:9a:18:63:65:c3:74:36:ed:5f:2c:91:ab:8a:
01:78:da:0a:8e:c1:59:8a:63:85:5a:e7:7b:c7:6d:
21:fd:af:e2:9d:71:85:ff:8a:2c:5c:b3:2c:80:05:
af:9c:2b:ce:09:21:2b:ea:22:31:53:3f:68:d7:00:
0d:d1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1d:da:ff:59:e9:ea:c6:d4:4a:33:7c:3e:4e:5a:ae:ef:b4:29:
23:c0:d7:1e:af:49:3f:fa:40:05:af:9a:b5:2f:20:a4:12:cc:
c3:5c:34:dd:74:dd:80:3d:26:55:c5:98:e4:96:8c:6c:80:56:
28:c6:a3:8e:60:76:47:b9:be:51:b2:6c:6c:8f:8c:73:be:14:
b9:8f:78:b5:69:a3:90:ca:ab:dc:bd:c9:30:58:1e:4d:b6:94:
ea:68:9d:08:2a:53:70:0b:95:f8:e7:96:7f:e4:f0:c4:3b:c8:
6f:09:08:64:22:12:ed:69:fb:c2:a0:f5:b7:fc:d3:5a:f7:a2:
b9:8a:70:7a:17:49:3f:6d:59:f6:19:71:ee:b4:ab:0a:55:a7:
8e:97:27:36:bf:a2:a0:08:c1:2f:68:7a:30:27:13:b4:e3:a8:
76:8b:15:35:36:a7:a0:6f:ab:3a:3a:5b:c0:ec:bd:56:47:30:
d6:60:55:87:a9:c5:1c:2e:26:b3:01:c8:d3:97:b3:ee:e5:ac:
e9:84:a4:56:24:5c:5f:45:09:9d:97:b8:46:40:87:14:03:a4:
c9:7b:90:01:ff:4c:b4:66:2b:c6:07:9f:04:80:1e:9a:d2:54:
ec:aa:7d:73:57:00:96:5a:e0:a6:77:a4:98:62:88:d8:35:9a:
fc:b7:17:45
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 17:44:05 2025 GMT
Not After : Apr 13 17:44:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
34:48:40:f6:ef:ed:ba:be:35:39:f9:a3:66:09:32:34:92:32:
34:38:29:08:b2:81:ea:9f:ea:bf:67:84:a4:7b:0a:1c:d2:30:
c7:91:f2:d9:2f:b8:b2:78:3b:72:b9:18:9c:f1:fd:c5:1b:bc:
0d:d7:55:1c:b0:59:27:60:81:ae:db:ef:76:cc:49:4c:0d:23:
95:fe:d4:00:a5:bc:11:f2:c3:25:90:12:e0:b2:15:6f:2d:43:
50:db:54:f8:c1:0b:e8:fc:12:49:30:5d:52:3f:6e:0b:9d:77:
06:b0:05:2e:2f:0c:c2:60:57:7a:87:6e:89:8a:a5:cc:0f:56:
6f:20:ae:da:4b:83:ad:94:17:82:f2:e6:c9:b9:9e:21:a8:0a:
fa:49:e6:af:04:f9:21:b6:ad:81:9b:d1:ce:80:8b:26:d9:b6:
ee:be:ac:57:c5:3d:a7:f0:16:32:a1:3a:28:54:a8:1a:01:84:
f3:e5:4e:ea:7f:28:4a:cd:79:05:a7:0e:58:34:65:38:92:59:
75:29:aa:30:51:0b:cc:a4:44:1c:79:8a:95:dd:43:b3:ba:8e:
72:dc:f2:bd:d7:3e:45:3f:e1:e7:2c:17:1a:3c:e0:1a:fc:1d:
19:89:aa:ab:b0:05:ed:91:42:8f:91:d7:ed:98:23:dc:1d:ea:
3c:2d:02:b1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
Truncated 7958 bytes from beginning
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
3,106,182 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:23 2025 GMT
Not After : May 12 10:24:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c9:d5:2b:de:d8:42:60:38:89:66:e6:b9:c3:d1:
7c:6c:41:26:83:6b:6a:69:f0:6b:83:86:ee:dd:80:
03:59:e1:67:57:a8:79:b9:27:55:cc:4b:d6:23:70:
15:61:c7:e8:c5:07:43:03:83:dc:28:e9:ce:44:5e:
03:9e:89:ed:a9:f5:a3:50:7d:07:3e:e6:05:e7:ff:
1b:fa:8e:3e:18:27:07:5e:fc:f9:7a:17:c1:d1:18:
9e:bf:bf:0c:f4:4f:e1:26:2f:d9:fa:48:05:4b:06:
45:fd:67:02:62:ed:9d:d1:3a:ac:91:05:b6:88:75:
09:55:46:85:0a:79:ed:74:c3:8c:84:75:3e:9b:a9:
34:bc:f0:45:98:2c:b8:f8:ec:90:ae:56:16:77:48:
5f:cd:34:34:51:83:fa:34:18:cd:15:fb:eb:a1:68:
6d:7d:f5:d4:bd:ae:15:0d:b3:0d:c7:3d:0e:4c:fd:
f0:d6:55:21:e2:03:e9:8e:a6:fe:6f:f5:bd:32:9e:
89:8a:88:79:6a:79:40:13:19:ff:fc:ce:e4:71:e1:
14:f9:d7:56:c0:69:ea:f7:9c:c8:ff:3e:b6:09:00:
50:e3:9b:87:46:ba:e8:9d:fe:e4:7e:39:9d:62:95:
f4:b3:02:2d:99:b7:a1:e4:1e:48:f3:de:75:5a:1e:
ca:31
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bf:51:be:b0:45:5d:7d:55:20:e3:0e:f8:d1:0f:09:aa:54:07:
59:a3:5e:6d:1a:ce:9d:68:22:59:bd:7e:fe:6b:5e:fa:38:fa:
7a:5a:7c:25:8a:31:c9:72:bd:cb:58:03:61:cc:8a:80:be:17:
02:3c:2a:e7:39:5f:85:79:ba:6f:0d:2f:a4:7b:17:f4:47:47:
b4:f0:2c:87:68:50:7f:72:ca:1b:da:22:60:19:b9:d0:72:74:
5c:fa:e5:f7:ae:ca:25:75:ba:94:0d:8e:7a:ba:04:de:37:10:
42:50:f6:3b:ff:b0:a2:05:88:ad:ea:70:e2:e2:ac:85:63:c7:
3d:eb:cc:1c:b2:8e:76:77:c8:e8:7f:20:8f:06:f9:9e:91:af:
0f:1a:d9:1e:79:a6:96:dc:b6:fa:77:53:c4:3a:47:78:d5:17:
81:75:9c:04:03:3c:e0:ad:35:49:c1:fc:ef:6c:ae:f4:6c:43:
d3:c3:ec:96:45:d6:00:49:17:1d:f3:a1:dc:4a:ae:68:1b:e6:
af:88:9f:0c:de:2a:8b:86:29:01:32:f7:65:f9:0a:e8:e2:8f:
b9:2a:24:2e:db:4e:b7:60:cf:c5:7a:1c:f7:4f:4e:a8:ab:8f:
31:dc:ec:05:d0:66:3a:ec:ec:8a:67:0f:ec:47:92:00:18:86:
95:d2:5f:31
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:23 2025 GMT
Not After : Apr 13 10:24:23 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4e:44:19:b6:d7:f1:82:6b:80:cb:39:e9:3a:9f:c5:d6:43:7d:
47:11:2d:26:e6:c8:2a:ec:78:5d:10:46:d5:62:66:ab:1a:90:
85:24:9e:7c:1c:99:cf:5e:43:15:a4:0e:26:80:67:71:50:23:
47:36:09:8d:da:94:39:c0:8b:dc:24:06:ab:45:39:4c:99:65:
a0:f9:07:42:8d:d4:af:a6:3f:f7:c1:ef:21:7a:56:04:6f:b1:
34:18:a9:0e:01:7e:93:c8:30:18:f3:67:b2:bf:13:d1:b6:3e:
af:72:e4:a5:1f:c1:da:86:24:89:49:25:5a:4f:1e:c2:a6:01:
c5:ea:e3:ee:ea:22:48:ab:de:d3:c6:a9:63:46:57:70:a0:3f:
eb:41:b1:2a:89:09:33:75:89:c7:c8:01:ec:ac:77:8a:4f:f4:
a3:19:de:0e:db:63:0d:e0:ef:3c:a5:ed:ac:2d:7b:6c:9c:18:
e3:07:50:45:dd:51:26:1a:c6:57:98:6b:62:05:50:b6:eb:ca:
af:35:4e:f5:4a:61:ee:28:f3:16:f2:82:b8:42:c1:46:af:90:
ec:f0:6d:d4:ed:37:c7:1a:85:b7:f0:4b:ab:33:4e:b4:db:89:
c6:50:7d:2e:a1:9a:81:81:5d:05:04:f6:0f:26:8d:ca:a4:00:
5d:16:61:c3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
Truncated 3082 bytes from beginning
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
2,852,923 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:34 2025 GMT
Not After : May 12 10:24:34 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:f9:c7:90:62:0d:d5:fb:49:df:12:8a:70:9b:4c:
01:f4:32:73:6b:ed:8e:06:fe:f8:b3:a2:33:c9:6c:
f4:6e:84:73:4b:57:94:39:e6:81:34:08:30:8e:62:
67:7b:55:6d:b6:c1:5e:e7:fa:a3:9c:07:00:ff:32:
3a:79:31:9f:55:30:eb:4a:91:ab:3d:7c:8c:90:26:
9d:01:a5:5e:3c:c4:21:02:55:c9:9f:38:e1:a1:21:
9c:22:dd:02:2b:61:0b:ad:f6:2e:a3:9d:0a:b3:1e:
68:84:cc:77:49:8e:e1:d1:e4:07:88:15:ce:f3:f3:
d9:e7:4d:de:a2:c6:d5:8f:2e:fb:6c:00:ee:d7:75:
e6:9f:31:b5:7b:6c:e0:80:63:ee:f9:76:f3:b1:f0:
83:a2:11:41:6b:1d:fb:bc:0d:fd:be:c1:ef:c5:fb:
af:a9:a8:a6:26:31:ed:9d:3d:91:b3:44:80:83:8b:
97:9f:be:e0:8e:32:90:8f:50:df:89:fc:3a:b2:5a:
60:23:83:67:da:cb:ab:d3:37:f9:93:25:01:80:0e:
74:1c:f1:0a:cd:88:1a:05:86:0d:0e:91:2e:bb:44:
8e:d9:56:80:26:37:02:d8:95:f8:94:31:ba:56:83:
58:e7:8d:61:77:cf:a4:45:56:7b:ab:d0:d8:ae:4e:
a1:47
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
61:21:5d:22:cf:02:3b:be:e6:6d:0c:40:3b:5b:90:ca:e8:50:
9e:f5:88:d9:c4:85:2c:fa:26:8c:32:d0:61:2e:64:64:20:d5:
73:23:6f:df:7e:cb:8b:da:50:69:d2:de:26:e1:a2:4e:14:82:
68:84:80:94:62:a7:bd:7d:dc:17:2b:26:36:c1:05:f9:12:6e:
72:e6:42:ad:8a:d2:cd:d2:0b:1f:19:6d:08:38:72:55:aa:a1:
f2:33:7a:3e:17:97:24:a8:d6:c3:ed:5f:c3:7c:61:e4:5c:7a:
d9:50:49:b0:9c:0d:85:0a:85:df:b0:d8:17:28:db:94:b4:b1:
8b:9d:1c:7d:22:1c:e9:bf:be:20:d7:28:9e:b1:66:3e:af:7d:
4c:3f:bb:63:69:ac:74:26:60:8f:e9:e4:b8:4f:c4:ed:4b:a6:
c7:24:20:1a:f3:78:64:5d:8d:99:9c:92:29:08:a7:85:4f:f1:
6b:ff:6d:6c:e0:99:52:09:9f:b9:22:54:ff:62:0e:4c:c1:c4:
23:c5:b6:a0:ce:2e:fe:0e:b3:14:2e:22:18:b5:be:d2:24:e0:
7b:1d:c6:da:b1:b9:ab:ab:e1:9b:36:a5:cd:9b:9e:84:b3:54:
44:2b:0d:f0:4b:b0:71:92:63:7f:4d:ce:2f:ce:e4:b1:7e:d7:
28:5e:72:2c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:34 2025 GMT
Not After : Apr 13 10:24:34 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4c:2f:be:8c:b5:60:c1:f1:35:b4:49:87:50:67:0f:cc:1e:f9:
15:7e:92:9a:ba:13:80:bb:5f:14:74:45:10:f3:24:7f:87:fc:
2a:5f:12:2b:25:27:89:3a:24:22:9d:16:61:7b:d8:83:59:6a:
51:5c:40:ad:df:96:23:84:81:25:9f:70:ac:b3:d3:6d:a0:3a:
d9:fd:98:03:99:70:89:0c:92:21:89:39:eb:ed:3d:12:01:9e:
f1:e2:ce:be:36:01:31:54:cf:1d:89:aa:28:90:99:c4:8b:77:
81:b8:9f:1a:83:5f:df:b3:54:8e:66:4e:2b:39:b2:ef:52:7a:
9d:ed:b0:a1:15:90:bd:f6:29:f7:b0:db:47:88:dd:ad:11:d7:
a7:25:43:9a:f5:dd:3a:9b:43:60:21:9c:ed:8d:6a:39:3e:c6:
4c:78:49:f3:6e:f1:8c:a0:d3:f8:9e:b4:a3:99:71:c7:60:ba:
18:2a:fa:75:39:45:7b:96:81:a3:80:94:be:0b:f3:eb:ad:a1:
65:9f:b9:49:52:3a:9c:79:e6:51:f1:7f:48:22:40:55:7a:27:
d6:de:45:8e:fd:f9:2c:67:7b:2a:0e:4c:3f:bd:01:6d:32:b0:
5e:f8:f5:49:73:96:fb:ac:8f:bd:f0:be:c7:bd:ec:44:27:04:
80:80:d9:80
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
Truncated 7958 bytes from beginning
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
3,106,303 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:25 2025 GMT
Not After : May 12 10:24:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b8:58:29:14:7b:7d:f2:fb:88:f6:d3:c0:ce:a0:
10:1c:fe:77:7d:00:3e:2d:c1:b4:d4:a3:4a:56:47:
1f:73:e4:d5:63:77:13:8d:9d:ea:c1:69:40:dc:2b:
26:61:ce:4a:9b:69:0a:ff:fb:76:38:a7:e8:d5:92:
15:32:83:d0:f8:08:df:fc:c1:00:85:96:3f:44:5a:
81:2e:88:2e:52:74:ab:2a:f7:24:22:66:dd:27:53:
d2:4a:d9:47:0a:58:f8:e9:65:33:4e:1b:ea:02:04:
4b:cb:73:04:64:1d:fa:05:d9:5a:39:48:e4:58:1d:
b9:ce:7a:e1:4b:6e:9b:10:85:74:33:49:23:9d:1f:
20:22:d1:cb:cf:3b:30:14:47:c1:da:12:e8:fe:18:
33:0c:27:3e:d0:83:78:41:c1:4a:fc:71:53:ff:79:
cd:66:1b:7c:19:03:e3:88:12:27:39:c5:d9:cd:23:
8e:67:8d:6d:e4:fc:cf:08:2b:4d:6d:72:df:9b:b8:
ae:66:04:9c:5e:ed:85:4a:02:09:3d:43:29:76:1f:
63:bb:02:a6:90:42:59:35:e7:dc:75:c7:60:90:f8:
7f:71:de:9b:77:6c:65:15:2e:c7:70:02:2b:3a:70:
f9:6b:b5:7c:ba:d9:7f:a3:f9:3e:67:37:6b:4b:cd:
b0:7b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
51:42:0f:21:c8:57:f0:1d:59:23:eb:4a:a0:28:28:de:8d:17:
3e:be:53:48:e8:9c:7d:bb:c4:39:d5:5e:ae:76:29:12:50:72:
08:bf:95:da:0b:4c:cc:d2:00:a2:52:eb:64:15:15:07:ee:da:
c5:41:30:5f:49:4e:b5:26:79:90:da:c4:9b:da:5e:e8:bf:62:
43:11:00:aa:52:0c:2b:33:a9:83:e5:0a:0b:49:ea:91:6f:22:
18:d7:40:ad:39:50:0f:0b:ee:e1:be:55:e1:57:ce:bc:1f:ba:
c5:1a:4f:01:6b:9d:35:e7:3c:10:42:41:8e:da:86:85:90:50:
bc:75:a2:d2:31:13:dd:6e:8e:70:51:69:59:aa:0c:8f:23:6a:
f1:c8:11:73:35:60:37:02:fa:bf:69:e2:ae:84:fa:55:52:31:
8f:e9:95:5a:2b:a7:41:d0:e5:14:5b:ab:3b:2b:ac:46:f7:d6:
47:31:d8:06:1a:74:06:14:57:5f:e7:c4:ad:e9:fc:91:66:44:
37:69:1e:cb:f5:14:f6:94:ed:6a:37:f3:a0:14:b0:c4:76:e1:
1e:81:95:f9:67:30:41:d1:60:3a:f8:d9:9b:aa:96:4b:8b:a2:
fc:30:81:21:06:38:0b:36:b5:d8:5f:76:1b:80:f4:e1:06:4f:
7d:5a:1b:f2
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:25 2025 GMT
Not After : Apr 13 10:24:25 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
18:fd:91:d8:05:7d:c2:ff:78:db:71:95:fc:2b:7a:6e:39:53:
63:b2:79:ca:2d:9c:30:e5:34:be:41:06:81:5a:47:c7:9c:79:
18:b8:2d:e3:8c:a6:43:aa:10:62:a9:c3:b2:7d:8c:2b:29:37:
65:b3:05:cb:ab:ff:5e:88:03:a0:7d:e8:b7:1f:f5:76:80:c5:
de:8c:60:27:07:fc:9f:0a:d1:16:8c:4a:81:8c:f4:6f:e8:50:
d5:7f:89:71:1a:f6:e4:c0:27:6c:4d:bf:5e:0b:42:e1:67:72:
55:8e:91:a8:74:ed:3d:d7:47:eb:a8:c8:78:c3:45:9e:cf:94:
71:91:d2:34:66:c3:29:3a:80:2c:be:1d:1a:a9:bc:d6:a7:cb:
ea:11:9e:0a:07:ce:d3:61:70:20:fe:03:fb:5a:45:45:b0:96:
9d:93:10:4c:38:49:c2:7a:2d:d6:de:58:c7:51:2a:eb:63:68:
1f:45:6b:db:69:12:dc:70:42:3f:0d:57:9f:66:46:4a:51:d3:
7f:a9:d5:54:f6:a5:c2:55:e1:76:39:f7:03:1f:05:ff:2b:4d:
7d:5e:69:11:8f:cd:c3:27:8f:6d:48:32:53:c2:d8:f7:23:79:
5a:35:8b:78:40:fd:98:e5:1b:73:96:88:18:98:eb:6c:f5:87:
3f:0b:36:90
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
Truncated 3082 bytes from beginning
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
2,857,464 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:33 2025 GMT
Not After : May 12 10:24:33 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d0:7e:56:5c:ec:5c:98:9b:ef:a9:a4:28:24:69:
66:d4:2a:1e:fd:45:65:4e:9f:72:28:82:a3:f3:de:
be:e3:d1:a0:7f:c8:54:f9:44:cd:2e:ef:d4:e9:29:
bd:5e:8a:82:dd:57:ab:44:84:a7:8a:cb:42:5f:f1:
07:cb:c8:8b:1c:5d:30:d1:c6:85:ec:61:dc:b1:4d:
b4:41:7e:25:61:5b:ad:65:23:ba:d5:87:fa:d4:40:
6b:e9:55:2a:6b:6b:83:ab:d0:f5:1d:d5:4c:6c:34:
40:d6:c5:56:23:3e:2e:31:be:ee:77:a7:8a:d5:2c:
3b:05:c9:3c:b4:80:75:89:5b:98:63:35:ad:76:73:
8a:f1:19:c7:35:03:7f:39:82:bb:86:46:cf:df:bb:
48:d6:6a:12:23:f6:07:59:1a:03:1b:a0:46:3b:3c:
d4:b8:4a:d5:77:a9:ae:ab:87:4d:da:a0:2f:48:9b:
04:61:da:cd:f0:b3:b8:f9:40:cd:00:af:d4:63:07:
75:c2:53:22:6f:47:1c:5f:74:dd:63:cd:56:b1:36:
71:71:8c:6a:0a:64:dd:ae:87:04:5d:9b:87:52:01:
c3:bb:7e:be:0f:a0:18:36:a0:28:4a:8f:77:2c:3a:
6a:6a:f7:63:e9:a0:34:19:41:3d:fd:64:40:e3:b1:
cd:57
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
84:75:75:67:1f:bd:b3:af:93:98:02:5d:a1:98:53:fa:97:42:
54:36:42:51:d6:57:ec:6c:f0:a2:bc:8d:b7:16:31:a4:d5:ae:
26:04:6c:66:92:48:ed:18:4f:2c:3e:86:57:6a:17:77:19:50:
a0:22:da:d2:a8:5a:68:a5:14:17:3d:3c:24:52:61:cf:6d:5f:
c5:8e:ff:8e:4e:22:1e:73:01:5c:ff:8a:36:ad:41:e2:6a:46:
e3:72:2c:88:a9:bb:c1:78:cd:80:d8:11:96:c9:aa:ad:2a:ea:
3f:26:5c:83:d7:33:a6:c6:58:a8:02:75:c7:6f:40:ec:2e:cc:
e8:62:e6:13:dd:c7:ee:0b:72:c8:a7:dc:02:6a:9a:a0:cf:ac:
2c:b2:5c:0e:33:ec:b3:83:08:3c:8d:7d:9e:cb:56:e8:db:da:
a7:71:f2:22:08:28:41:17:d3:ee:5a:4f:b8:a2:51:44:5e:fe:
64:37:0a:c6:ae:e9:8f:72:7f:3d:a0:a3:95:d6:5a:dc:ca:8a:
45:1a:5e:cd:ca:07:ce:27:23:21:0f:de:bd:c9:47:c1:eb:00:
fd:9e:64:eb:09:35:e7:db:3e:5a:1d:25:d1:58:41:7b:98:54:
a6:5b:50:6e:b3:33:cf:8f:5f:4f:45:a2:32:12:b2:e8:cd:c2:
ff:1f:23:32
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:33 2025 GMT
Not After : Apr 13 10:24:33 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
96:f3:42:20:9d:af:1d:03:bc:ba:63:fe:f2:e0:44:dd:bb:b5:
6e:66:e1:a6:9d:46:ad:84:a0:ae:c2:e9:6c:8c:51:40:63:31:
e7:a1:1e:33:76:05:a0:0b:1c:7f:ac:6f:69:11:9f:78:81:59:
68:2c:12:a8:c9:36:3c:47:b7:b0:6d:e2:db:cc:a4:01:57:c3:
4f:b3:f5:75:be:aa:0d:4e:ce:8a:1c:1a:34:5e:4d:e3:5e:e3:
eb:02:34:ac:1c:6f:16:55:d6:45:84:81:45:d4:ae:cf:35:de:
21:d6:29:77:e6:d3:50:8a:13:31:3f:5c:8a:66:69:4f:17:0b:
15:d3:b9:95:19:23:95:55:5c:a6:0e:b1:fb:af:f4:26:e6:b7:
ba:c9:4f:54:4a:f5:33:e2:ed:08:36:47:6f:3a:55:b8:18:a3:
48:15:0a:76:bc:4d:f0:5f:fc:96:dc:5c:33:41:3d:1b:00:21:
58:8c:ad:9a:13:db:96:3b:4f:f3:d4:05:09:22:4c:2b:02:af:
33:ef:62:7a:eb:90:ab:29:aa:b5:8e:33:aa:b1:98:87:41:ef:
d5:83:d4:32:c8:46:83:d7:62:c2:fd:94:ce:cb:99:c7:93:21:
97:cb:6c:2f:14:75:e1:e0:03:de:4d:01:28:0f:ba:71:2d:68:
b4:bd:37:ce
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
Truncated 7958 bytes from beginning
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
3,106,710 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:28 2025 GMT
Not After : May 12 10:24:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:3f:ec:55:cb:b2:11:73:10:f6:73:d5:65:c5:
02:09:d6:ea:80:52:ec:e0:88:8a:8a:75:98:b8:d1:
b2:f4:c1:e7:1a:01:4b:d2:52:62:b3:01:cd:46:af:
bb:76:54:9b:9c:e2:2a:ce:a6:92:b0:47:7f:22:55:
5b:49:00:95:6f:84:8f:22:b3:69:a6:f7:21:3d:5f:
c0:50:fc:49:92:41:9f:c0:75:57:35:0e:34:9c:95:
9c:76:41:76:51:31:d7:fd:32:83:8e:98:71:36:6c:
ea:a5:30:55:00:9d:3c:a1:b0:60:aa:e5:7b:3c:22:
56:28:d9:e8:43:1c:74:f1:64:ae:ae:86:97:16:97:
4e:7d:8d:44:39:13:46:0d:26:8a:b8:59:d4:b2:1b:
94:81:9b:d7:c5:80:f7:88:e0:ec:71:46:ea:26:78:
23:66:fb:7f:9b:52:18:30:15:bc:1f:e5:69:1c:9e:
89:3c:d1:5f:79:5d:17:37:ae:c6:6d:0f:ed:33:ec:
f1:44:3c:84:8f:03:29:9f:c9:39:79:2e:72:e0:b9:
c4:0c:c0:eb:0b:f0:7b:b6:1e:43:ce:67:f4:a7:de:
63:01:f5:ec:0e:9d:c5:4a:28:1b:f3:1d:bf:85:98:
3d:c3:19:1f:29:53:0f:06:9f:a2:6e:88:52:b6:b5:
46:cf
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
06:10:14:aa:56:4a:27:ac:02:15:f2:c5:3d:c2:63:49:09:8e:
da:41:17:b0:10:4f:8d:d8:9f:f3:d9:6e:cf:ae:d8:8f:ba:ba:
7c:6c:d0:b5:54:75:df:13:d3:d9:e7:2f:9d:47:1c:e9:80:62:
79:34:92:c0:b8:fe:7b:c0:54:19:b1:33:81:f1:f8:5c:93:40:
f1:a3:c6:82:0c:e8:9c:96:81:b4:d4:1c:54:7a:28:c9:4b:71:
4e:ab:36:12:fd:f0:da:06:54:6e:62:f0:a7:37:89:dd:1f:57:
2a:cc:f9:11:cc:2e:e3:0f:1a:9e:17:be:91:dd:0c:5b:ae:ea:
11:9d:2c:cb:a3:2e:ec:53:bc:cc:73:7a:d8:1b:83:b2:0a:82:
a0:ea:35:0a:1d:d7:46:6e:66:f6:b3:c2:e7:d0:2a:a8:5d:25:
0e:7f:6b:08:f8:fd:c5:af:31:e5:f9:b6:65:27:e3:f9:0d:ef:
9e:e0:0e:14:0d:71:3a:9a:4d:41:a0:80:d3:37:8c:6e:1a:69:
0f:f5:6c:40:e9:a5:f6:96:36:cd:13:ba:fa:ab:d7:67:1a:ac:
c9:8a:73:dc:c1:f4:ea:07:91:c5:05:6c:95:f8:c2:ee:37:3e:
09:70:5c:13:e1:8c:c2:8a:9c:9e:1f:d5:d5:a0:5b:b1:c6:dc:
a2:b1:06:63
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:28 2025 GMT
Not After : Apr 13 10:24:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
06:40:fc:96:2a:27:69:50:fb:38:0a:17:d6:5e:2f:d9:97:1a:
b6:3c:9f:04:f2:b6:cd:f1:7d:08:b3:0f:3f:a5:a2:3a:a2:eb:
a3:1e:28:4c:0d:5e:70:96:3d:f8:1e:b1:89:44:0d:d5:ea:ed:
04:66:8a:d6:ca:3b:e7:df:b0:34:31:14:ea:2b:74:4e:ed:f0:
6b:65:41:35:d2:c2:20:07:6b:e5:50:8d:71:ac:8d:c9:f4:06:
a6:87:60:75:42:01:66:bc:ff:6b:5a:9f:a7:1e:e9:f6:1e:4f:
80:1f:0b:42:8b:cf:9c:44:76:c6:43:9e:e0:58:fc:51:97:f5:
2e:3c:64:9a:f3:39:07:a8:0a:99:50:bf:ba:d0:8e:19:e1:8e:
d0:f9:24:c9:cd:b3:27:d8:af:b4:56:75:5f:8c:8e:63:27:9b:
dd:52:da:b0:bf:42:5e:ee:74:c3:e7:4a:f8:dd:1f:65:a3:44:
87:37:9e:9e:73:e6:d6:06:b9:6d:c7:14:f4:38:20:7e:bd:d6:
0c:40:c2:97:60:70:12:63:c3:47:c2:64:4b:f6:eb:0c:36:47:
83:b4:fe:ef:2d:35:31:28:b1:10:e6:fe:50:52:10:fb:78:3f:
47:08:6b:93:aa:0a:13:e3:e3:f5:c0:e6:46:2c:18:de:a0:ac:
10:cb:f0:7e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
Truncated 3082 bytes from beginning
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
2,852,447 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : May 12 10:24:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cb:da:94:ea:31:75:ae:bf:20:8b:64:49:31:71:
17:d7:9e:2b:fb:02:7d:e2:90:47:f0:8d:1f:35:3e:
30:8a:14:0b:b9:12:48:b8:96:39:99:86:ef:05:87:
ff:b6:a4:0a:64:91:51:97:b6:2d:8e:f2:e9:26:9f:
d5:44:17:17:09:97:c7:35:a6:7e:6f:8a:f5:7b:91:
99:e7:bb:32:59:67:bf:fd:e7:6e:92:5b:da:90:1d:
49:28:f4:3d:72:53:ea:0e:7c:d1:d7:9e:64:3b:46:
5f:3f:5f:b4:d6:93:85:f0:e7:bc:4c:57:93:1f:be:
6a:35:bb:86:42:91:32:ed:56:c1:cd:e8:b7:fe:0b:
25:b5:ba:69:0d:71:5a:0f:c6:7a:75:6f:97:c4:b8:
5a:0f:f6:f0:3f:67:c4:2c:ea:f1:0c:d0:7e:37:a3:
f1:6c:64:0f:49:7e:17:60:0b:a3:47:0c:ef:f5:50:
e3:5f:a4:da:9c:04:bd:26:8e:9b:cf:da:7b:23:bb:
fe:a7:61:77:cd:f3:21:91:db:d4:f2:a3:b3:7d:66:
e1:73:79:12:18:b6:b1:84:7c:4c:64:61:81:e3:83:
f7:e1:72:4b:6c:cb:15:57:b5:c4:35:b5:98:7e:10:
a1:71:c1:3a:91:0a:bc:48:9e:b0:ea:81:ca:64:f0:
ce:ff
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:e8:6e:78:35:6b:90:7d:ae:0a:a3:a3:0f:4b:6c:90:81:1a:
41:ba:c1:45:47:07:40:15:35:c2:f1:72:63:5b:c3:e7:67:d3:
83:5b:89:01:8a:f0:71:de:0d:da:ee:4e:d5:d8:c5:2d:61:4d:
b2:38:c8:23:ad:48:81:19:dd:9f:21:3f:7d:0a:d7:2e:9d:63:
27:7d:dd:04:8d:f7:1b:92:ce:5c:16:12:5f:fa:d1:78:fd:e1:
af:5a:67:ff:54:6e:38:b1:d9:aa:62:67:67:1d:9a:a5:86:f1:
7d:d4:2c:04:d0:49:a6:3a:cf:6d:04:35:09:f4:4f:74:06:44:
7d:51:7a:49:d0:d1:20:39:79:47:ce:bc:fb:ed:5f:ef:ad:dd:
f6:58:f5:7a:d6:5b:09:ea:e0:6a:ab:90:65:8d:e7:36:bf:7d:
9e:5b:6b:3d:bc:91:e6:fc:41:b1:db:72:87:01:a1:65:4d:7f:
cc:75:7f:b7:4c:b5:1a:57:f1:d6:88:59:40:8d:ce:03:d9:c9:
74:dd:49:75:1c:f6:33:8e:3d:11:34:f0:a8:37:66:42:e2:53:
44:5f:5c:c6:1e:5d:82:7a:ed:9a:0c:af:98:42:6c:07:de:67:
3c:63:a3:38:74:52:ad:6a:8c:cf:52:33:de:1b:4e:c3:19:47:
12:8e:ac:17
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : Apr 13 10:24:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:b2:6d:db:ab:6c:69:a1:19:47:72:88:59:53:20:68:9c:c5:
ab:2d:80:de:73:d8:8e:fc:52:06:b6:77:bf:17:06:cf:3f:87:
65:49:70:67:5c:cb:78:56:69:54:41:2e:68:1e:d6:31:39:81:
ef:9b:8d:9f:fe:fd:84:97:77:19:09:59:1b:b7:43:97:ff:5b:
28:fa:eb:4f:a3:14:c8:c3:85:d2:2b:5e:f1:c7:8d:27:96:5b:
5f:15:44:12:a3:10:ef:27:87:15:d6:d2:47:57:62:12:7d:8c:
50:7b:02:65:1d:80:a4:87:a8:64:65:6a:4d:52:76:3c:74:a8:
87:73:c4:db:8c:7f:1c:e9:00:d8:cd:a7:bb:2d:65:78:5f:c9:
b1:7b:03:6b:98:89:1f:42:51:75:75:e1:ff:53:17:26:78:cf:
45:fa:a4:ea:cb:b1:e7:20:c6:bc:b3:86:2d:fe:e3:2e:09:47:
a2:54:9b:42:ac:dc:b4:eb:e0:19:1d:82:69:d6:e7:c5:3b:97:
ab:78:66:b4:b6:84:06:a6:ef:9b:f2:48:41:e7:0a:35:6e:66:
ab:63:6e:17:db:16:69:63:26:6d:41:cf:7f:d0:a5:16:0a:f4:
54:51:66:50:1b:b2:ca:6a:14:8c:23:7f:02:2e:a4:3c:34:71:
72:d2:75:b6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
Truncated 7958 bytes from beginning
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
3,106,313 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:28 2025 GMT
Not After : May 12 10:24:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c8:1f:6f:68:26:f3:6a:3b:22:04:eb:a2:b6:c4:
de:41:08:2a:85:cb:2c:ea:26:a1:9f:66:26:2c:88:
88:21:cf:b5:be:cf:1d:db:23:83:31:03:50:3d:a2:
00:fc:20:fe:48:15:52:1b:b1:6c:ce:89:6c:d7:8d:
ab:b1:c8:e7:0b:52:dd:0c:59:d8:6d:84:db:91:ad:
b5:e9:ed:5c:f0:0c:0c:a8:4b:69:4a:57:0d:65:b5:
0a:21:21:ce:50:33:7d:9b:0e:01:e1:45:aa:ee:53:
62:04:61:90:f0:75:57:bc:a5:24:2b:36:ca:f2:89:
e4:a9:76:28:5b:33:e2:4f:09:f0:4c:d0:87:8b:1d:
02:e5:71:c7:f6:f1:b6:21:46:19:57:50:af:7b:4d:
6c:a4:5a:f1:31:17:52:a7:40:7d:c9:98:a1:4e:d2:
84:fc:a5:d5:d7:0d:7e:f6:67:5d:d7:c5:1c:22:8e:
e7:fd:dc:75:6a:59:e3:9c:b2:67:99:5d:2b:c9:5c:
89:1f:8a:fa:d0:46:53:69:6d:57:76:6b:c5:7d:09:
84:b6:df:59:12:0a:a3:b8:a4:32:02:8a:83:6e:d9:
67:a1:58:75:ce:09:71:dc:7d:73:4d:4f:b8:a6:92:
24:d2:e8:e1:d6:a9:21:24:bf:3f:33:68:d0:85:dd:
72:4d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7d:c9:a5:1d:8d:4b:0a:fe:16:9a:af:7c:df:a4:a2:72:a4:c5:
a8:b3:8e:d0:b9:e2:a2:b6:24:db:04:c1:fc:01:91:75:b5:1e:
f9:6f:89:2f:8c:e3:b8:5a:9d:6f:1d:ac:72:5a:73:34:48:85:
22:43:ee:75:cf:e3:2d:02:40:d5:44:1d:50:9a:ab:70:32:06:
2d:7d:70:0a:9b:68:61:8c:f3:26:8f:ce:3f:a3:c9:2e:7e:31:
5e:9d:5a:b0:98:b7:d0:23:58:ed:54:3b:4f:55:98:75:0d:1d:
b8:f2:2c:1f:37:c8:6a:d4:b7:24:58:cf:5d:a8:ea:da:e9:6b:
45:05:c5:3b:3e:80:f5:cf:38:01:41:a8:19:91:83:95:79:fd:
04:33:cc:7c:19:dc:92:37:db:52:f8:e6:a3:d7:88:0f:9f:ac:
37:95:de:c0:58:85:3a:34:1c:bc:cb:cd:4d:7b:4e:4a:25:5a:
c2:e7:d0:56:18:92:c6:82:01:fb:78:1c:03:30:5c:ea:63:82:
ea:00:40:c4:e3:dc:2b:36:bb:1c:04:40:bb:d6:98:7d:97:87:
1b:f5:e9:3b:34:fe:b9:df:c3:2b:51:29:ce:b3:1a:b2:77:57:
02:e2:30:33:de:13:58:fb:0e:48:1a:c8:39:41:00:bd:dd:4a:
d2:6d:68:55
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:28 2025 GMT
Not After : Apr 13 10:24:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
39:97:9f:9b:86:72:06:e5:b2:e5:ed:d2:8a:9f:74:c9:23:9f:
e9:56:7c:48:83:9d:bd:20:61:94:bc:e0:81:de:df:6f:19:ca:
24:43:c2:44:0b:b3:b1:e1:39:a1:6d:0a:e9:0a:a2:64:5e:d4:
be:ff:12:30:d1:c0:5b:dd:62:74:29:8c:ad:a1:72:ac:94:72:
2b:ba:84:c1:bd:91:6c:86:35:1a:73:9e:81:f7:9d:91:4f:b3:
d3:08:92:e6:c6:ac:33:66:9b:5f:a7:a0:40:eb:0f:ad:65:2b:
73:76:10:ea:ff:06:b6:96:5a:d6:c2:dc:0c:cf:a5:f1:3b:4f:
c6:b0:80:53:2e:8c:37:8c:2f:d6:37:6f:9d:69:4e:be:10:1f:
b9:14:4a:9e:5f:4b:9f:ab:e8:33:42:ce:4f:1b:7c:fd:2d:f0:
f6:46:a2:88:55:c7:c2:65:a3:82:a9:d9:b4:a9:6b:63:f9:57:
e7:96:e4:e2:32:3f:fe:98:75:f5:18:be:c5:7d:19:89:ef:a7:
94:1b:4a:46:f7:b3:d8:a2:3b:eb:c2:37:4a:0b:02:cf:f1:35:
48:33:75:cb:f8:b2:d6:4d:90:b3:46:fd:8b:c1:48:be:d6:12:
c4:8f:7e:f9:1b:50:62:d2:4f:51:a0:11:6d:06:08:7a:bb:24:
fe:bc:ca:65
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
Truncated 3082 bytes from beginning
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
2,857,060 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:25 2025 GMT
Not After : May 12 10:24:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d3:39:28:8a:4c:64:95:8a:2e:11:7f:94:9f:5a:
f7:10:be:83:d8:b4:c7:67:d7:fa:4a:4f:0f:aa:a6:
4c:0f:f8:e3:af:4c:1a:26:d0:13:09:b2:b9:be:89:
f3:d5:e6:51:cf:32:d1:10:9a:ff:94:a7:d0:ad:f8:
68:c7:5d:02:56:28:f0:c3:ea:c8:5a:0c:17:35:b4:
e1:03:1d:3c:04:6f:70:37:ff:17:06:92:7d:b2:31:
c5:78:ff:b4:cf:6e:9b:db:4d:42:65:1c:f7:65:12:
79:21:e7:a6:ca:a8:b3:9f:e9:a7:87:4e:4c:ba:a4:
96:3d:e7:61:4b:08:fc:00:f0:2f:85:8d:e3:52:0b:
82:8d:55:c4:97:bf:cb:58:b1:57:ba:95:f5:a7:11:
bc:a9:68:23:6f:99:aa:77:f4:c3:f0:d7:81:74:f4:
41:48:7b:00:33:0e:ed:6a:f1:24:82:d3:28:d8:bb:
ac:0d:70:34:09:94:40:b8:40:eb:0b:43:e7:f6:7d:
94:64:ea:ff:91:05:bb:71:ab:ee:6b:e9:e9:f2:a4:
70:6a:9e:c0:6e:9d:42:9e:db:94:1c:0c:d5:ee:ba:
98:f3:c3:65:8a:fa:68:55:4d:5e:cd:b4:96:dd:27:
ce:cd:c8:42:40:d7:23:70:45:d0:e8:91:8a:d4:e0:
d8:03
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8f:91:35:de:db:af:24:0b:52:04:7b:76:f7:43:5e:e5:c7:71:
ac:ca:f0:29:2d:4a:12:35:56:37:50:ce:40:02:d6:44:05:ea:
6d:f3:0a:46:a1:a0:82:21:9f:13:fc:90:f7:d1:72:d3:a9:94:
2f:b1:9a:05:a5:da:35:79:7b:a5:bb:46:b6:70:64:71:b4:3f:
44:74:22:f6:9b:70:77:e3:9c:38:26:01:29:23:25:de:4f:98:
36:69:ae:cc:9f:88:4b:15:a4:33:01:f7:39:6f:e5:25:cf:67:
35:ba:07:a4:30:1b:72:c2:fa:a2:5d:2f:04:4e:f9:45:4e:90:
5d:19:52:29:7c:b2:b5:b9:82:59:3f:88:43:3f:9f:ea:64:be:
60:60:ed:93:b9:2e:05:e0:74:4e:3f:ed:94:75:0e:26:27:c5:
35:cc:2d:f7:f9:77:6e:58:15:00:5e:0f:ce:a6:a7:66:6a:c2:
55:aa:56:22:88:1d:27:18:16:72:de:17:5b:50:8c:9e:bd:b9:
4e:c6:b4:e1:8b:07:b6:87:b3:52:71:eb:a2:9b:b4:ae:94:8f:
3a:03:57:18:90:14:7e:ad:91:39:0c:7d:c1:3a:89:31:98:30:
e4:9e:f6:1b:c5:30:e0:d5:8a:5c:eb:19:9c:6d:37:f9:aa:53:
51:1d:e1:19
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:25 2025 GMT
Not After : Apr 13 10:24:25 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d1:5f:b0:7e:95:be:08:c6:a6:69:a1:d2:c5:cf:86:c8:e7:f8:
eb:8c:43:3b:6f:d7:3c:65:e2:9c:ce:f6:e8:ea:51:4f:34:61:
1b:af:e4:ef:9b:08:aa:0d:50:ba:ce:d1:c9:db:13:7c:79:77:
70:03:4e:27:0e:e6:c3:ab:9b:75:5b:e6:14:42:c2:f1:41:01:
9d:9d:64:87:58:32:ee:f6:0c:fa:1f:a0:f5:c1:af:49:64:41:
f9:34:13:e8:22:0f:3e:42:d5:d0:94:d4:3a:ce:43:62:65:fe:
f4:0b:02:70:d6:34:3c:92:08:ff:33:c0:1b:2e:b9:b8:6f:6c:
c4:bb:0d:08:47:20:12:1f:af:24:b2:aa:3c:e3:77:ce:85:54:
98:13:45:d1:08:99:3f:8e:fe:ef:d0:1c:80:e0:59:dd:0b:ae:
66:05:9a:90:4f:d2:e6:dc:d3:ae:85:56:8f:8f:54:12:e2:bc:
37:65:f1:75:64:c1:a0:7d:ac:89:32:79:67:cc:b4:15:39:2e:
77:2e:75:e1:c9:55:b2:af:da:b7:57:0b:39:40:bf:af:f0:d4:
7d:ed:9d:36:4a:fa:0b:ab:a2:e6:b2:44:b8:ba:66:a0:56:b7:
a1:ce:2c:15:83:d4:f2:4e:d5:67:5d:2e:f3:42:f1:e6:1b:39:
78:87:2b:87
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
Truncated 7958 bytes from beginning
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
3,106,592 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:37 2025 GMT
Not After : May 12 10:24:37 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:2e:8e:ba:3e:36:79:56:5f:f8:26:f6:a9:a5:
28:a5:1d:e6:e0:a2:c9:22:ab:4e:a2:d7:e5:b0:28:
07:fe:c1:3f:9d:ad:63:0f:10:c8:14:ea:9c:81:c6:
5a:45:e2:06:8a:8e:64:f7:12:b2:66:ca:68:48:1e:
ce:bd:9f:69:c9:81:a1:f5:18:b3:1e:46:2b:de:20:
98:fe:12:74:22:0d:59:60:3e:8f:29:2c:54:f8:3b:
db:05:a5:23:38:cb:33:51:59:a9:63:65:b2:03:1b:
e4:36:9a:39:58:38:fe:59:69:6c:d0:da:33:7f:5a:
5e:3e:06:35:5b:b8:c9:3e:5e:b6:51:da:a7:23:7e:
1d:42:ba:77:a9:ea:ef:4f:c3:43:bb:4e:80:c9:96:
b7:8c:e9:56:f8:ff:f5:e1:b4:31:e7:fa:39:a7:15:
98:c2:da:ed:ef:c8:af:6a:a6:3d:de:e1:d0:b6:1d:
64:5d:c5:bf:e8:f9:a5:57:2c:96:5f:0b:5e:9e:2c:
fb:3b:6d:5d:f6:5a:4b:b3:3c:d6:2f:d5:56:58:d9:
46:9e:6d:00:be:ba:83:be:e7:ca:d9:c4:23:6d:47:
e7:ac:bd:b2:c6:92:01:de:32:5a:17:b5:51:3f:d9:
d5:05:93:67:c1:18:50:f8:95:5e:8e:1a:1f:e9:ff:
f3:3f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b6:80:5a:3b:f6:b6:29:1b:81:f5:d8:47:a8:55:81:e7:b8:9a:
a3:0f:8a:5a:bc:03:b0:3d:bf:84:a7:38:28:7e:e2:32:8b:f1:
45:82:ca:50:f8:c6:f7:45:86:ca:d3:6b:51:29:cf:23:69:ff:
6e:28:0b:39:5b:d3:b4:0c:6d:45:cd:df:55:e3:b5:20:39:00:
f0:d3:cd:b1:e8:96:ee:b4:c8:11:f0:49:a0:5b:0b:64:65:15:
1b:49:45:a0:d9:ef:bd:6a:21:b3:a5:9e:64:63:4e:c0:b5:7e:
0a:2c:96:8b:65:37:cc:ed:2e:56:f5:2d:c1:45:1a:f3:c8:ef:
f4:58:48:37:d0:bb:2f:c6:22:1f:13:af:69:03:8c:c6:24:55:
c6:4a:c3:d0:b8:9a:71:30:7e:1a:40:9f:36:54:2a:8d:16:a9:
f1:45:09:06:2a:1a:b0:ca:ca:5b:77:db:7f:e5:6b:f2:e3:69:
bd:46:54:63:4f:66:56:76:7c:0e:90:51:c0:e4:ee:86:b4:a5:
4d:ce:1a:17:3f:bc:72:73:35:33:13:dc:d4:bc:13:5a:f1:64:
18:e8:c5:c5:5b:5c:06:ef:87:9a:8b:57:2f:21:be:d7:80:3d:
51:18:79:23:44:fa:6e:82:c8:47:1a:28:f8:ba:1b:8b:c8:b7:
5d:05:ec:3e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:37 2025 GMT
Not After : Apr 13 10:24:37 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7c:a9:82:8e:df:e4:b8:0d:a3:e7:08:17:14:64:8b:ff:33:61:
c1:c2:82:10:e1:e0:eb:4a:c4:86:a2:6e:a0:fe:92:a4:f6:e5:
f5:d3:bf:a5:20:e2:6f:b7:33:45:82:4e:c8:86:27:29:ef:d1:
40:d2:0a:d8:25:58:41:1f:65:3c:18:c0:65:7e:4b:57:92:f4:
81:eb:03:0c:4a:17:22:cc:33:54:19:6b:ab:a4:b9:94:4d:8a:
36:ed:d1:67:16:b1:e1:eb:58:05:42:d4:ba:ee:92:16:c1:ec:
32:b1:80:bf:c4:53:a7:06:08:8d:0b:98:56:ad:ad:35:5b:b3:
e8:48:76:dd:3b:11:8b:6b:f9:42:f8:fd:04:96:fd:b4:e4:27:
8c:f0:ad:9f:7f:89:b9:85:d5:b0:15:d3:69:f3:1e:92:38:4d:
57:52:cc:1b:ea:11:c4:86:18:eb:46:ca:62:3f:b3:44:b1:f4:
78:df:90:58:a8:2b:b9:ed:f4:57:18:a8:e6:a1:64:3d:f7:7c:
1c:1b:10:43:be:12:09:43:67:63:ef:6f:83:a6:ef:8c:84:f2:
41:bc:30:72:9a:e3:08:02:f3:73:19:6a:1e:58:22:4f:b2:c5:
e7:b0:a1:74:ee:94:16:d0:c4:0b:92:48:6f:70:dc:2a:3f:70:
e2:9f:a9:77
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
Truncated 3082 bytes from beginning
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
2,854,925 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : May 12 10:24:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bc:be:2e:7a:77:3a:e7:6c:80:62:0e:33:ab:8f:
f2:b4:cf:d4:4a:58:48:12:fb:5f:de:cd:da:8e:8c:
b9:5c:51:48:24:17:df:45:b0:4e:d3:e7:bf:6e:91:
33:f8:ca:20:ab:2a:39:ca:d1:5b:3b:18:45:35:bf:
0f:48:7c:08:bb:12:3d:17:9d:93:5b:91:6d:33:35:
6a:81:3e:07:5d:20:b8:cc:b7:9e:c3:ff:97:79:57:
f5:42:c0:72:53:0e:18:8c:f6:0e:31:af:8d:d7:10:
73:d2:4e:2c:61:b5:e6:d0:90:a0:d5:0c:53:07:ae:
9c:a4:3b:d1:59:d4:cb:14:59:5d:77:12:ba:7a:0b:
4f:aa:ab:25:f9:88:da:bc:d1:ae:c8:0e:e1:c3:6c:
33:5f:47:f2:ec:c8:ad:b7:f5:a9:77:15:58:fa:50:
7e:5a:8b:c0:b3:94:ef:1b:ac:ba:20:ba:42:ca:8a:
0c:0f:04:a1:01:c2:ad:95:a4:3f:a7:0f:79:b2:bd:
ef:92:c1:b9:df:8a:0d:5a:96:45:e6:e2:6a:a3:0e:
0d:f4:75:26:3a:a5:bf:96:e0:07:98:53:42:eb:8c:
28:28:16:49:bf:ae:04:2d:23:7f:1c:14:50:b0:c3:
3a:52:6e:c5:d4:a9:1b:27:94:29:8b:d8:53:9f:56:
39:c9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
99:0d:1b:72:a2:05:84:d7:12:c3:13:bf:b8:c1:62:29:03:7e:
a7:24:6a:9f:45:4d:e0:d3:83:7f:39:be:4e:ec:ab:c6:a7:ec:
02:1e:51:d2:6d:ff:60:cf:fc:fc:2d:45:8a:96:fd:eb:cc:e2:
68:21:94:a0:14:1c:e4:d5:a8:30:29:f3:31:af:03:b9:5d:e1:
7c:00:78:8f:5e:b4:22:80:f0:9d:28:e2:e4:0a:f8:3c:c1:ce:
c8:61:41:d7:97:3e:eb:34:45:1c:5b:1e:97:74:7f:fd:1e:28:
55:19:f4:25:1f:27:a0:7c:89:bd:a8:c6:b1:09:07:79:aa:ea:
b9:87:e0:91:57:35:ac:30:d7:56:29:dd:fe:82:03:a5:fe:da:
b5:78:db:9b:cc:bc:0a:f9:c6:50:f8:d7:4c:56:f0:e0:7c:b3:
61:a0:82:a5:04:f5:85:5b:11:9f:5d:64:d8:cd:c9:fe:d2:4e:
50:10:3a:ef:fd:cb:ac:63:ac:4b:45:54:53:2e:71:6e:d6:05:
a3:71:d5:4e:c0:86:5e:cf:46:e0:9e:04:e0:ed:5d:ea:1b:ed:
c6:49:a6:16:52:9c:3c:e6:b2:8c:ae:ec:dd:04:fc:fd:cf:bb:
0a:bd:33:89:bb:46:dc:3a:5c:10:8c:a2:9d:f2:9e:ba:a0:19:
13:53:30:d3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:22 2025 GMT
Not After : Apr 13 10:24:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
12:9e:72:bf:02:9c:b9:9b:3b:c5:bd:0b:b6:1d:a6:48:90:d2:
d4:cf:22:9c:65:db:54:0f:83:03:39:38:06:69:e6:e0:76:a3:
6d:1a:11:fb:7c:d6:75:51:92:92:0b:60:78:58:53:2b:fa:ca:
ee:4a:58:92:28:7e:3e:3e:01:d0:4e:10:c0:8e:89:7c:7a:1f:
0f:cb:9d:ca:9c:c2:98:cb:1f:74:1c:5d:2f:68:6b:18:9e:26:
a7:0a:90:64:52:76:a8:bf:64:c0:a8:1f:c7:29:7d:e0:e2:bd:
fe:95:7e:d8:f1:16:85:80:1b:4c:a1:82:ad:a1:74:23:86:03:
f1:5b:97:22:fe:a6:1b:f6:5a:bb:3d:2e:9c:45:33:03:43:0e:
5f:4e:d3:4f:9c:54:82:93:6e:93:2d:62:05:30:bd:25:7f:24:
4e:d4:7a:35:65:0b:33:2f:ad:14:ed:a7:c6:b2:54:9e:73:0e:
f9:0f:58:cb:f4:1e:d8:d5:08:45:9d:d4:c4:41:38:27:da:9d:
00:b8:23:1f:65:a5:24:06:44:8e:23:5d:64:42:fe:2a:dd:92:
4e:f3:fe:ad:d9:dd:97:fa:17:74:da:4f:2d:22:84:b8:e6:da:
d7:16:fe:f5:cc:ea:89:91:48:6e:a6:d9:a6:ff:18:8a:27:21:
8a:72:53:62
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
Truncated 7958 bytes from beginning
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
3,106,611 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:24 2025 GMT
Not After : May 12 10:24:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:7e:57:b3:79:dc:55:0c:5f:7e:b7:13:64:e9:
6e:5d:f9:81:35:df:20:2e:66:7c:b8:86:d3:be:22:
60:0e:9b:1e:eb:e5:7e:4c:0c:eb:ef:91:43:65:7b:
7a:6f:d3:f0:20:de:0e:9e:36:04:c5:4d:5e:3a:00:
34:88:e8:0e:ff:ac:fe:24:f5:30:ca:f4:a4:f6:09:
98:79:0a:61:3f:28:69:98:0a:a8:ec:17:47:80:bc:
21:fd:72:02:34:ab:27:14:ef:8e:2f:4a:b9:58:f5:
98:04:16:9e:ed:23:53:4b:15:26:18:5b:24:40:97:
a4:51:b8:34:06:9a:dd:78:1d:77:51:c6:ce:a1:b4:
de:04:a8:94:f9:b1:0b:e4:65:d2:08:96:c0:78:8b:
6b:55:11:52:13:0f:b3:2f:3e:eb:b7:07:f4:a0:68:
e2:1b:87:48:cd:5d:05:f4:1e:67:96:12:56:9a:fd:
92:7e:7c:a4:5a:62:29:59:4e:ae:2e:e6:e7:c4:28:
c4:4d:82:da:48:3c:d0:bb:39:07:20:9c:77:71:dd:
10:a3:47:b9:62:e2:52:97:da:49:19:56:6f:66:1b:
8e:d3:fa:bc:ab:c9:a2:0d:9b:23:65:69:3c:ba:6f:
74:49:8f:2d:b7:0e:56:13:29:b8:05:3b:05:75:77:
e8:31
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7a:af:24:d0:c3:0f:37:fb:1e:a5:79:1c:d6:a4:74:06:cf:b2:
88:3f:26:8d:2b:d4:88:3d:04:70:d0:25:40:c9:fd:06:3a:dd:
73:ed:f3:16:43:9a:46:4e:91:1d:85:e4:00:28:57:14:d8:78:
e7:6e:6d:41:14:63:45:fe:25:32:44:f6:90:bb:83:c1:fb:98:
03:2d:16:51:d5:05:82:f0:92:8f:58:07:ab:12:b2:fe:72:41:
a4:45:11:15:cd:1c:19:ce:7d:2a:52:ee:cd:54:f0:c9:7c:3f:
23:5b:e0:9f:55:7f:47:76:14:14:1c:bf:c9:61:1d:cd:7f:e7:
9f:17:ae:b2:6d:7d:1d:53:c9:39:19:34:88:77:de:34:3d:41:
d4:98:4c:aa:77:db:36:49:04:54:96:2c:63:46:e6:36:c3:d3:
41:4a:94:df:38:99:58:e4:c1:77:1e:55:40:34:c1:54:51:12:
1b:40:28:dc:d6:e5:a2:08:49:e8:b4:9b:9a:03:44:03:10:71:
e8:1c:c8:f1:5b:f3:69:0d:3a:68:b2:56:8b:12:c8:05:f9:30:
97:1b:28:dc:16:f6:bf:bc:8c:88:c2:d1:08:aa:2f:70:af:bc:
00:9a:cc:c8:90:11:b7:01:1f:9b:6c:a9:cb:e6:ec:fa:99:54:
c9:ab:ba:30
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:24 2025 GMT
Not After : Apr 13 10:24:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
16:82:0f:eb:06:41:5b:c7:f1:32:34:be:dd:fe:aa:fe:9d:f6:
03:77:86:1e:26:0e:31:fa:45:0f:f2:0a:33:db:61:8b:17:fe:
62:ee:80:ba:7b:41:9c:67:78:c0:bf:ef:58:e5:57:6e:2b:f8:
74:03:44:da:ad:77:6b:75:bf:a5:9c:8f:5e:90:8c:ce:e7:2b:
b2:7a:a4:14:df:8b:18:80:d0:c4:df:22:0c:3e:56:d8:38:29:
71:af:2a:b2:ba:c1:af:18:59:e8:50:8e:74:5b:a2:ea:03:ee:
7d:e6:87:f0:d9:cf:fd:80:c7:24:9d:1e:6f:5c:85:49:5b:d5:
b3:d1:03:3d:b4:86:be:a8:3d:9b:1b:71:f5:ec:cf:87:db:46:
eb:10:59:c2:4b:db:9a:2a:ec:4d:10:9c:5e:00:a3:6a:75:70:
18:f4:fa:43:e9:20:ce:7c:52:f2:b2:93:ca:68:65:87:6f:f9:
ab:5e:99:6c:b5:40:40:15:51:9b:52:5f:80:cb:ea:d6:04:ba:
96:bf:55:e6:e1:d6:66:bf:eb:9b:22:22:23:ff:1e:c2:28:5f:
79:96:3b:f3:ac:81:ad:e3:c4:bc:b6:a6:d7:55:c9:79:e0:74:
14:76:a4:5b:b2:1c:d6:92:47:c2:65:c2:7e:ae:eb:e5:97:51:
40:f5:04:41
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,855,200 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:29 2025 GMT
Not After : May 12 10:24:29 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d5:80:48:79:68:e2:a3:38:f2:38:47:2a:7e:07:
29:7b:c3:19:72:20:02:5b:0d:6f:50:f3:74:e2:7f:
0c:b1:ff:dc:e4:a5:fe:35:7a:0d:e3:0a:2c:19:53:
84:45:fb:e1:9b:68:ae:9d:fb:a2:8e:a8:06:3b:73:
08:33:5e:41:3c:5f:13:4a:ef:e3:7c:86:85:57:72:
fb:d9:7d:30:35:e8:c1:ca:f7:fa:1a:1a:fb:bf:82:
8e:19:ea:7d:ab:31:b7:e6:ce:2c:94:f3:45:c9:82:
4e:74:76:0c:48:36:9e:9f:f0:c9:72:ce:60:d9:37:
60:a2:82:09:d2:5d:8f:91:6f:e0:1a:7d:71:4d:b8:
11:0e:1d:8b:eb:41:cd:64:14:fe:f1:e3:74:77:dd:
ae:63:35:1d:1b:5a:2b:2d:3e:44:c9:6a:f1:72:51:
99:9a:6e:6e:c9:34:ac:ab:25:ca:99:c1:d1:1e:ea:
c7:92:22:f5:07:1f:a3:9b:6a:c3:98:49:26:df:da:
0c:05:ea:d6:ec:70:12:82:f7:53:aa:ae:a3:33:37:
5d:20:fe:82:c2:9a:68:5e:49:81:e3:80:b9:76:93:
45:b8:0d:cd:91:4d:43:0a:bd:70:5f:fe:da:c3:ca:
2a:86:1a:50:ba:29:a5:33:c6:98:04:b3:e8:2f:d3:
ba:43
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
03:c9:74:b4:86:c1:10:81:9a:c0:76:21:79:14:f5:e2:bb:aa:
31:42:d6:f8:6a:c2:1c:27:f1:c3:f2:ea:fa:c1:92:07:02:b2:
3d:5c:50:5b:72:d8:6a:ba:d7:76:14:5c:21:b5:6a:f1:e0:cf:
93:4a:7d:40:eb:18:ff:a9:14:c4:31:b4:90:47:fb:f5:da:e1:
66:4a:41:d0:ca:59:37:f9:50:6c:e4:81:68:6c:51:5f:f8:ca:
65:7f:02:1c:52:e3:22:0f:6e:af:d1:f2:76:0a:ea:0d:12:15:
94:4d:14:be:8a:f1:16:aa:63:73:e9:bd:30:6c:fd:ee:32:ce:
51:6f:85:b1:1a:6e:d8:0d:ab:4a:a5:cb:a5:ba:70:6c:75:23:
50:65:dc:06:fc:a3:fc:84:0c:af:58:ed:a1:9e:41:12:15:ee:
66:c9:60:5f:c7:f8:04:ab:3f:4f:c7:e5:98:f9:3e:34:35:0c:
31:58:77:8c:24:cf:d0:3c:84:1e:90:a9:01:d0:12:73:31:58:
28:87:26:55:ba:fe:e8:82:a3:bf:85:47:7a:d7:a3:f7:55:a9:
60:80:5b:11:45:1c:18:e8:98:88:82:52:77:f8:3c:cd:3b:5c:
02:3b:88:32:97:77:11:a2:21:82:c9:bd:d9:f3:ee:f4:e3:82:
e7:ed:85:43
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Apr 12 10:24:29 2025 GMT
Not After : Apr 13 10:24:29 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2f:2e:f7:cf:19:0b:9d:61:68:0c:b0:c3:6b:1f:08:a5:bc:75:
c7:cd:f2:6e:ed:f7:2a:eb:0a:54:65:09:a2:bd:67:c8:c9:04:
9e:1e:91:b9:4f:03:31:05:21:ed:d0:8b:09:89:ae:c7:0d:5c:
7c:c1:60:08:6b:05:e0:6b:2e:55:aa:6c:fc:11:23:cb:d2:d8:
f5:ed:b1:8c:95:55:3b:0a:3f:8a:72:14:74:17:8a:ca:a7:4b:
26:9a:33:a2:5f:c7:1c:42:b8:79:1e:5c:9f:ec:56:10:d0:ea:
cb:30:2e:cc:31:e0:36:fe:a1:b0:3e:5b:36:98:4e:51:79:7c:
63:e0:e0:ad:0c:ec:a9:63:b6:ad:9e:d7:57:78:0d:e1:72:f5:
67:ec:0a:32:35:55:2d:14:43:88:de:7b:40:67:79:00:21:e9:
7f:5d:f0:f0:01:73:e2:22:67:d9:1a:96:91:cd:21:4b:4c:21:
7e:28:31:5c:4a:fc:70:4c:45:b7:45:9e:5c:97:50:00:a3:5e:
67:27:ff:50:83:e0:c7:d7:19:29:8a:75:a2:61:e9:0c:1b:f0:
83:0e:5e:94:00:7b:9c:29:1d:0b:f8:71:a4:75:de:37:19:ab:
9d:94:73:4f:80:74:a1:0f:b5:ad:57:5c:ec:96:d6:1b:60:da:
b7:f1:7c:d7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,212,554 UART:
2,213,455 UART: Running Caliptra ROM ...
2,214,571 UART:
2,214,727 UART: [state] CFI Enabled
2,215,636 UART: [state] LifecycleState = Unprovisioned
2,217,291 UART: [state] DebugLocked = No
2,218,409 UART: [state] WD Timer not started. Device not locked for debugging
2,220,884 UART: [kat] SHA2-256
2,221,554 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,224,565 UART: [kat] ++
2,225,013 UART: [kat] sha1
2,225,527 UART: [kat] SHA2-256
2,226,184 UART: [kat] SHA2-384
2,226,837 UART: [kat] SHA2-512-ACC
2,227,634 UART: [kat] ECC-384
3,773,192 UART: [kat] HMAC-384Kdf
3,803,064 UART: [kat] LMS
4,876,230 UART: [kat] --
4,881,696 UART: [cold-reset] ++
4,884,439 UART: [fht] FHT @ 0x50003400
4,895,779 UART: [idev] ++
4,896,465 UART: [idev] CDI.KEYID = 6
4,897,697 UART: [idev] SUBJECT.KEYID = 7
4,898,798 UART: [idev] UDS.KEYID = 0
4,930,059 UART: [idev] Erasing UDS.KEYID = 0
8,242,400 UART: [idev] Sha1 KeyId Algorithm
8,262,713 UART: [idev] CSR upload begun
8,268,156 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,573,429 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,589,769 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,605,834 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,621,872 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,646,268 UART: [idev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
10,793,120 UART: [idev] CSR uploaded
10,809,776 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
10,943,903 UART: [idev] --
10,944,540 UART: [ldev] ++
10,945,037 UART: [ldev] CDI.KEYID = 6
10,945,932 UART: [ldev] SUBJECT.KEYID = 5
10,946,974 UART: [ldev] AUTHORITY.KEYID = 7
10,948,060 UART: [ldev] FE.KEYID = 1
10,948,924 UART: [ldev] Erasing FE.KEYID = 1
14,189,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,484,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,500,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,516,767 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,532,624 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,551,881 UART: [ldev] --
16,556,186 UART: [fwproc] Wait for Commands...
16,558,825 UART: [fwproc] Recv command 0x46574c44
16,561,140 UART: [fwproc] Recv'd Img size: 106532 bytes
20,538,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,611,802 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,654,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
20,970,655 >>> mbox cmd response: success
20,971,000 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,975,610 UART: [afmc] ++
20,976,187 UART: [afmc] CDI.KEYID = 6
20,977,418 UART: [afmc] SUBJECT.KEYID = 7
20,978,467 UART: [afmc] AUTHORITY.KEYID = 5
24,342,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,638,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,640,982 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,657,093 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,673,150 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,689,065 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,711,936 UART: [afmc] --
26,715,368 UART: [cold-reset] --
26,718,798 UART: [state] Locking Datavault
26,725,073 UART: [state] Locking PCR0, PCR1 and PCR31
26,726,865 UART: [state] Locking ICCM
26,728,932 UART: [exit] Launching FMC @ 0x40000000
26,737,504 UART:
26,737,735 UART: Running Caliptra FMC ...
26,738,834 UART:
26,738,993 UART: [fmc] Received command: 0x10000001
26,740,447 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,760,214 UART: [fmc] LDEVID cert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
26,853,004 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,873,702 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
26,994,717 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
10,499,115 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
20,597,848 >>> mbox cmd response: success
20,598,321 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,298,537 UART:
26,298,917 UART: Running Caliptra FMC ...
26,300,033 UART:
26,300,197 UART: [fmc] Received command: 0x10000001
26,301,740 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,321,131 UART: [fmc] LDEVID cert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
26,413,902 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,434,574 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,555,658 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,215,462 UART:
2,216,455 UART: Running Caliptra ROM ...
2,217,553 UART:
2,217,705 UART: [state] CFI Enabled
2,218,586 UART: [state] LifecycleState = Unprovisioned
2,220,245 UART: [state] DebugLocked = No
2,221,306 UART: [state] WD Timer not started. Device not locked for debugging
2,223,781 UART: [kat] SHA2-256
2,224,442 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,227,450 UART: [kat] ++
2,227,892 UART: [kat] sha1
2,228,424 UART: [kat] SHA2-256
2,229,079 UART: [kat] SHA2-384
2,229,736 UART: [kat] SHA2-512-ACC
2,230,616 UART: [kat] ECC-384
4,097,167 UART: [kat] HMAC-384Kdf
4,107,797 UART: [kat] LMS
5,180,956 UART: [kat] --
5,183,198 UART: [cold-reset] ++
5,185,136 UART: [fht] FHT @ 0x50003400
5,196,925 UART: [idev] ++
5,197,594 UART: [idev] CDI.KEYID = 6
5,198,817 UART: [idev] SUBJECT.KEYID = 7
5,200,297 UART: [idev] UDS.KEYID = 0
5,218,535 UART: [idev] Erasing UDS.KEYID = 0
8,489,805 UART: [idev] Sha1 KeyId Algorithm
8,509,473 UART: [idev] CSR upload begun
8,514,932 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,805,544 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,821,938 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,837,987 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,854,037 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,878,392 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
11,025,352 UART: [idev] CSR uploaded
11,042,099 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
11,176,116 UART: [idev] --
11,176,752 UART: [ldev] ++
11,177,251 UART: [ldev] CDI.KEYID = 6
11,178,120 UART: [ldev] SUBJECT.KEYID = 5
11,179,253 UART: [ldev] AUTHORITY.KEYID = 7
11,180,426 UART: [ldev] FE.KEYID = 1
11,181,298 UART: [ldev] Erasing FE.KEYID = 1
14,354,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,646,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,663,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,679,173 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,695,090 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,716,040 UART: [ldev] --
16,721,106 UART: [fwproc] Wait for Commands...
16,722,934 UART: [fwproc] Recv command 0x46574c44
16,725,255 UART: [fwproc] Recv'd Img size: 106532 bytes
20,703,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,777,483 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,819,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
21,137,621 >>> mbox cmd response: success
21,138,033 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,141,511 UART: [afmc] ++
21,142,091 UART: [afmc] CDI.KEYID = 6
21,143,281 UART: [afmc] SUBJECT.KEYID = 7
21,144,438 UART: [afmc] AUTHORITY.KEYID = 5
24,463,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,757,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,760,238 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,776,328 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,792,371 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,808,327 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,832,440 UART: [afmc] --
26,835,750 UART: [cold-reset] --
26,840,536 UART: [state] Locking Datavault
26,847,458 UART: [state] Locking PCR0, PCR1 and PCR31
26,849,149 UART: [state] Locking ICCM
26,852,030 UART: [exit] Launching FMC @ 0x40000000
26,860,638 UART:
26,860,865 UART: Running Caliptra FMC ...
26,861,955 UART:
26,862,113 UART: [fmc] Received command: 0x10000001
26,863,562 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,883,325 UART: [fmc] LDEVID cert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
26,976,074 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,996,807 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,117,825 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
10,727,953 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
20,738,915 >>> mbox cmd response: success
20,739,388 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,378,118 UART:
26,378,529 UART: Running Caliptra FMC ...
26,379,619 UART:
26,379,764 UART: [fmc] Received command: 0x10000001
26,381,310 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,400,738 UART: [fmc] LDEVID cert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
26,493,492 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,514,164 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,635,239 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,215,293 UART:
2,216,255 UART: Running Caliptra ROM ...
2,217,352 UART:
2,217,508 UART: [state] CFI Enabled
2,218,380 UART: [state] LifecycleState = Unprovisioned
2,220,058 UART: [state] DebugLocked = No
2,221,180 UART: [state] WD Timer not started. Device not locked for debugging
2,223,664 UART: [kat] SHA2-256
2,224,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,342 UART: [kat] ++
2,227,794 UART: [kat] sha1
2,228,306 UART: [kat] SHA2-256
2,229,045 UART: [kat] SHA2-384
2,229,708 UART: [kat] SHA2-512-ACC
2,230,535 UART: [kat] ECC-384
2,947,510 UART: [kat] HMAC-384Kdf
2,972,544 UART: [kat] LMS
3,502,034 UART: [kat] --
3,508,244 UART: [cold-reset] ++
3,510,773 UART: [fht] FHT @ 0x50003400
3,523,213 UART: [idev] ++
3,523,782 UART: [idev] CDI.KEYID = 6
3,524,661 UART: [idev] SUBJECT.KEYID = 7
3,525,873 UART: [idev] UDS.KEYID = 0
3,544,709 UART: [idev] Erasing UDS.KEYID = 0
6,027,270 UART: [idev] Sha1 KeyId Algorithm
6,048,446 UART: [idev] CSR upload begun
6,053,196 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,742 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,796 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,747 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,829,612 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,853,270 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,999,026 UART: [idev] CSR uploaded
8,016,789 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
8,151,489 UART: [idev] --
8,152,130 UART: [ldev] ++
8,152,629 UART: [ldev] CDI.KEYID = 6
8,153,506 UART: [ldev] SUBJECT.KEYID = 5
8,154,581 UART: [ldev] AUTHORITY.KEYID = 7
8,155,674 UART: [ldev] FE.KEYID = 1
8,156,508 UART: [ldev] Erasing FE.KEYID = 1
10,566,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,319,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,838 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,351,542 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,373,226 UART: [ldev] --
12,378,611 UART: [fwproc] Wait for Commands...
12,381,594 UART: [fwproc] Recv command 0x46574c44
12,383,693 UART: [fwproc] Recv'd Img size: 106876 bytes
15,700,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,776,245 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,818,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,136,123 >>> mbox cmd response: success
16,136,531 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,141,195 UART: [afmc] ++
16,141,773 UART: [afmc] CDI.KEYID = 6
16,142,655 UART: [afmc] SUBJECT.KEYID = 7
16,143,872 UART: [afmc] AUTHORITY.KEYID = 5
18,683,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,408,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,409,897 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,425,990 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,441,906 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,457,756 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,480,220 UART: [afmc] --
20,484,783 UART: [cold-reset] --
20,487,246 UART: [state] Locking Datavault
20,493,408 UART: [state] Locking PCR0, PCR1 and PCR31
20,495,051 UART: [state] Locking ICCM
20,496,151 UART: [exit] Launching FMC @ 0x40000000
20,504,549 UART:
20,504,792 UART: Running Caliptra FMC ...
20,505,897 UART:
20,506,050 UART: [fmc] Received command: 0x10000001
20,507,512 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,527,215 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,619,981 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,640,656 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,761,658 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
2,215,441 UART:
2,216,393 UART: Running Caliptra ROM ...
2,217,500 UART:
2,217,661 UART: [state] CFI Enabled
2,218,522 UART: [state] LifecycleState = Unprovisioned
2,220,339 UART: [state] DebugLocked = No
2,221,398 UART: [state] WD Timer not started. Device not locked for debugging
2,223,885 UART: [kat] SHA2-256
2,224,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,569 UART: [kat] ++
2,228,038 UART: [kat] sha1
2,228,648 UART: [kat] SHA2-256
2,229,314 UART: [kat] SHA2-384
2,229,970 UART: [kat] SHA2-512-ACC
2,230,854 UART: [kat] ECC-384
2,944,358 UART: [kat] HMAC-384Kdf
2,968,961 UART: [kat] LMS
3,498,389 UART: [kat] --
3,502,468 UART: [cold-reset] ++
3,503,443 UART: [fht] FHT @ 0x50003400
3,514,131 UART: [idev] ++
3,514,698 UART: [idev] CDI.KEYID = 6
3,515,635 UART: [idev] SUBJECT.KEYID = 7
3,516,847 UART: [idev] UDS.KEYID = 0
3,540,414 UART: [idev] Erasing UDS.KEYID = 0
6,022,877 UART: [idev] Sha1 KeyId Algorithm
6,043,065 UART: [idev] CSR upload begun
6,047,785 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,366 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,462 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,402 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,826,301 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,849,977 UART: [idev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
7,995,865 UART: [idev] CSR uploaded
8,013,635 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
8,148,352 UART: [idev] --
8,149,002 UART: [ldev] ++
8,149,500 UART: [ldev] CDI.KEYID = 6
8,150,377 UART: [ldev] SUBJECT.KEYID = 5
8,151,525 UART: [ldev] AUTHORITY.KEYID = 7
8,152,706 UART: [ldev] FE.KEYID = 1
8,153,589 UART: [ldev] Erasing FE.KEYID = 1
10,563,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,301,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,317,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,909 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,348,662 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,368,568 UART: [ldev] --
12,372,642 UART: [fwproc] Wait for Commands...
12,374,523 UART: [fwproc] Recv command 0x46574c44
12,376,564 UART: [fwproc] Recv'd Img size: 106876 bytes
15,677,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,754,162 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,796,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,114,141 >>> mbox cmd response: success
16,114,509 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,119,220 UART: [afmc] ++
16,119,802 UART: [afmc] CDI.KEYID = 6
16,120,731 UART: [afmc] SUBJECT.KEYID = 7
16,121,894 UART: [afmc] AUTHORITY.KEYID = 5
18,660,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,388,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,389,909 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,406,047 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,421,971 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,437,776 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,461,894 UART: [afmc] --
20,465,706 UART: [cold-reset] --
20,470,336 UART: [state] Locking Datavault
20,476,291 UART: [state] Locking PCR0, PCR1 and PCR31
20,477,946 UART: [state] Locking ICCM
20,480,152 UART: [exit] Launching FMC @ 0x40000000
20,488,554 UART:
20,488,786 UART: Running Caliptra FMC ...
20,489,905 UART:
20,490,060 UART: [fmc] Received command: 0x10000001
20,491,523 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,511,233 UART: [fmc] LDEVID cert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
20,603,986 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,624,686 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,745,694 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
7,687,778 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
15,718,674 >>> mbox cmd response: success
15,719,400 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,007,691 UART:
20,008,086 UART: Running Caliptra FMC ...
20,009,215 UART:
20,009,377 UART: [fmc] Received command: 0x10000001
20,010,934 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,030,383 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,123,227 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,143,953 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,265,247 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
2,215,991 UART:
2,216,972 UART: Running Caliptra ROM ...
2,218,081 UART:
2,218,240 UART: [state] CFI Enabled
2,219,106 UART: [state] LifecycleState = Unprovisioned
2,220,775 UART: [state] DebugLocked = No
2,221,894 UART: [state] WD Timer not started. Device not locked for debugging
2,224,373 UART: [kat] SHA2-256
2,225,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,228,050 UART: [kat] ++
2,228,505 UART: [kat] sha1
2,229,035 UART: [kat] SHA2-256
2,229,781 UART: [kat] SHA2-384
2,230,447 UART: [kat] SHA2-512-ACC
2,231,327 UART: [kat] ECC-384
3,279,007 UART: [kat] HMAC-384Kdf
3,291,665 UART: [kat] LMS
3,821,164 UART: [kat] --
3,825,583 UART: [cold-reset] ++
3,827,671 UART: [fht] FHT @ 0x50003400
3,837,991 UART: [idev] ++
3,838,557 UART: [idev] CDI.KEYID = 6
3,839,569 UART: [idev] SUBJECT.KEYID = 7
3,840,665 UART: [idev] UDS.KEYID = 0
3,855,931 UART: [idev] Erasing UDS.KEYID = 0
6,310,960 UART: [idev] Sha1 KeyId Algorithm
6,330,720 UART: [idev] CSR upload begun
6,335,404 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,053,058 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,069,130 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,085,083 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,100,976 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,124,636 UART: [idev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
8,270,616 UART: [idev] CSR uploaded
8,288,370 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
8,422,828 UART: [idev] --
8,423,482 UART: [ldev] ++
8,423,982 UART: [ldev] CDI.KEYID = 6
8,424,891 UART: [ldev] SUBJECT.KEYID = 5
8,425,964 UART: [ldev] AUTHORITY.KEYID = 7
8,427,147 UART: [ldev] FE.KEYID = 1
8,427,992 UART: [ldev] Erasing FE.KEYID = 1
10,779,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,495,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,511,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,527,308 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,543,118 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,562,256 UART: [ldev] --
12,567,638 UART: [fwproc] Wait for Commands...
12,569,897 UART: [fwproc] Recv command 0x46574c44
12,571,940 UART: [fwproc] Recv'd Img size: 106876 bytes
15,875,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,953,489 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,996,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,314,436 >>> mbox cmd response: success
16,314,798 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,318,823 UART: [afmc] ++
16,319,398 UART: [afmc] CDI.KEYID = 6
16,320,310 UART: [afmc] SUBJECT.KEYID = 7
16,321,545 UART: [afmc] AUTHORITY.KEYID = 5
18,818,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,542,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,544,739 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,560,791 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,576,728 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,592,551 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,616,212 UART: [afmc] --
20,620,609 UART: [cold-reset] --
20,625,178 UART: [state] Locking Datavault
20,632,259 UART: [state] Locking PCR0, PCR1 and PCR31
20,633,953 UART: [state] Locking ICCM
20,635,669 UART: [exit] Launching FMC @ 0x40000000
20,644,067 UART:
20,644,300 UART: Running Caliptra FMC ...
20,645,397 UART:
20,645,580 UART: [fmc] Received command: 0x10000001
20,647,037 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,666,699 UART: [fmc] LDEVID cert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
20,759,507 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,780,201 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,901,246 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
7,937,225 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
15,898,277 >>> mbox cmd response: success
15,898,742 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,144,213 UART:
20,144,602 UART: Running Caliptra FMC ...
20,145,766 UART:
20,145,931 UART: [fmc] Received command: 0x10000001
20,147,459 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,166,855 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,259,735 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,280,462 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,401,711 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,391 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,182,573 UART: [idev] Erasing UDS.KEYID = 0
1,199,541 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] CSR upload begun
1,209,662 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,297 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,005 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,890 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,606 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,071 UART: [idev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
1,297,861 UART: [idev] CSR uploaded
1,300,906 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,301,075 UART: [idev] --
1,302,108 UART: [ldev] ++
1,302,276 UART: [ldev] CDI.KEYID = 6
1,302,640 UART: [ldev] SUBJECT.KEYID = 5
1,303,067 UART: [ldev] AUTHORITY.KEYID = 7
1,303,530 UART: [ldev] FE.KEYID = 1
1,308,874 UART: [ldev] Erasing FE.KEYID = 1
1,335,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,696 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,420 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,335 UART: [ldev] --
1,374,693 UART: [fwproc] Wait for Commands...
1,375,504 UART: [fwproc] Recv command 0x46574c44
1,376,237 UART: [fwproc] Recv'd Img size: 106876 bytes
2,586,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,643 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,768,604 >>> mbox cmd response: success
2,768,604 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,769,767 UART: [afmc] ++
2,769,935 UART: [afmc] CDI.KEYID = 6
2,770,298 UART: [afmc] SUBJECT.KEYID = 7
2,770,724 UART: [afmc] AUTHORITY.KEYID = 5
2,806,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,921 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,829,641 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,835,534 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,841,239 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,848,978 UART: [afmc] --
2,849,890 UART: [cold-reset] --
2,850,826 UART: [state] Locking Datavault
2,851,925 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,529 UART: [state] Locking ICCM
2,852,973 UART: [exit] Launching FMC @ 0x40000000
2,858,270 UART:
2,858,286 UART: Running Caliptra FMC ...
2,858,694 UART:
2,858,832 UART: [fmc] Received command: 0x10000001
2,859,925 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,785 UART: [fmc] LDEVID cert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
2,969,762 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,353 UART: [fmc] FMCALIAS cert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
3,107,888 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,076 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,544,581 >>> mbox cmd response: success
2,544,581 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,488 UART:
2,605,504 UART: Running Caliptra FMC ...
2,605,912 UART:
2,606,050 UART: [fmc] Received command: 0x10000001
2,607,143 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,003 UART: [fmc] LDEVID cert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
2,716,980 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,571 UART: [fmc] FMCALIAS cert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
2,855,106 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,703 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,626 UART: [cold-reset] ++
1,171,062 UART: [fht] FHT @ 0x50003400
1,173,844 UART: [idev] ++
1,174,012 UART: [idev] CDI.KEYID = 6
1,174,373 UART: [idev] SUBJECT.KEYID = 7
1,174,798 UART: [idev] UDS.KEYID = 0
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,014 UART: [idev] Sha1 KeyId Algorithm
1,207,136 UART: [idev] CSR upload begun
1,208,915 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,558 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,266 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,151 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,867 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,332 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,297,122 UART: [idev] CSR uploaded
1,300,167 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,300,336 UART: [idev] --
1,301,447 UART: [ldev] ++
1,301,615 UART: [ldev] CDI.KEYID = 6
1,301,979 UART: [ldev] SUBJECT.KEYID = 5
1,302,406 UART: [ldev] AUTHORITY.KEYID = 7
1,302,869 UART: [ldev] FE.KEYID = 1
1,307,887 UART: [ldev] Erasing FE.KEYID = 1
1,334,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,451 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,175 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,336 UART: [ldev] --
1,373,784 UART: [fwproc] Wait for Commands...
1,374,549 UART: [fwproc] Recv command 0x46574c44
1,375,282 UART: [fwproc] Recv'd Img size: 106876 bytes
2,586,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,796 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,768,833 >>> mbox cmd response: success
2,768,833 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,770,028 UART: [afmc] ++
2,770,196 UART: [afmc] CDI.KEYID = 6
2,770,559 UART: [afmc] SUBJECT.KEYID = 7
2,770,985 UART: [afmc] AUTHORITY.KEYID = 5
2,806,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,810 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,829,530 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,835,423 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,841,128 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,849,049 UART: [afmc] --
2,849,945 UART: [cold-reset] --
2,850,849 UART: [state] Locking Datavault
2,851,714 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,318 UART: [state] Locking ICCM
2,852,972 UART: [exit] Launching FMC @ 0x40000000
2,858,269 UART:
2,858,285 UART: Running Caliptra FMC ...
2,858,693 UART:
2,858,831 UART: [fmc] Received command: 0x10000001
2,859,924 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,878,784 UART: [fmc] LDEVID cert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
2,969,761 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,352 UART: [fmc] FMCALIAS cert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
3,107,887 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,927 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,540,746 >>> mbox cmd response: success
2,540,746 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,603,155 UART:
2,603,171 UART: Running Caliptra FMC ...
2,603,579 UART:
2,603,717 UART: [fmc] Received command: 0x10000001
2,604,810 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,623,670 UART: [fmc] LDEVID cert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
2,714,647 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,238 UART: [fmc] FMCALIAS cert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
2,852,773 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,206,579 UART: [idev] CSR upload begun
1,208,358 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,871 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,579 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,464 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,180 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,645 UART: [idev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
1,296,435 UART: [idev] CSR uploaded
1,299,480 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,299,649 UART: [idev] --
1,300,640 UART: [ldev] ++
1,300,808 UART: [ldev] CDI.KEYID = 6
1,301,172 UART: [ldev] SUBJECT.KEYID = 5
1,301,599 UART: [ldev] AUTHORITY.KEYID = 7
1,302,062 UART: [ldev] FE.KEYID = 1
1,307,400 UART: [ldev] Erasing FE.KEYID = 1
1,333,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,638 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,362 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,517 UART: [ldev] --
1,372,865 UART: [fwproc] Wait for Commands...
1,373,566 UART: [fwproc] Recv command 0x46574c44
1,374,299 UART: [fwproc] Recv'd Img size: 106876 bytes
2,584,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,655 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,629,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,765,682 >>> mbox cmd response: success
2,765,682 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,766,817 UART: [afmc] ++
2,766,985 UART: [afmc] CDI.KEYID = 6
2,767,348 UART: [afmc] SUBJECT.KEYID = 7
2,767,774 UART: [afmc] AUTHORITY.KEYID = 5
2,802,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,863 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,825,583 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,831,476 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,837,181 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,844,972 UART: [afmc] --
2,845,854 UART: [cold-reset] --
2,846,640 UART: [state] Locking Datavault
2,847,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,563 UART: [state] Locking ICCM
2,849,223 UART: [exit] Launching FMC @ 0x40000000
2,854,520 UART:
2,854,536 UART: Running Caliptra FMC ...
2,854,944 UART:
2,855,082 UART: [fmc] Received command: 0x10000001
2,856,175 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,035 UART: [fmc] LDEVID cert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
2,966,012 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,985,603 UART: [fmc] FMCALIAS cert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
3,104,138 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,394 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,543,115 >>> mbox cmd response: success
2,543,115 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,006 UART:
2,605,022 UART: Running Caliptra FMC ...
2,605,430 UART:
2,605,568 UART: [fmc] Received command: 0x10000001
2,606,661 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,521 UART: [fmc] LDEVID cert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
2,716,498 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,089 UART: [fmc] FMCALIAS cert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
2,854,624 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,854 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,173,004 UART: [idev] ++
1,173,172 UART: [idev] CDI.KEYID = 6
1,173,533 UART: [idev] SUBJECT.KEYID = 7
1,173,958 UART: [idev] UDS.KEYID = 0
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,198,866 UART: [idev] Sha1 KeyId Algorithm
1,207,008 UART: [idev] CSR upload begun
1,208,787 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,324 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,032 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,917 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,633 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,098 UART: [idev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
1,296,888 UART: [idev] CSR uploaded
1,299,933 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,300,102 UART: [idev] --
1,301,057 UART: [ldev] ++
1,301,225 UART: [ldev] CDI.KEYID = 6
1,301,589 UART: [ldev] SUBJECT.KEYID = 5
1,302,016 UART: [ldev] AUTHORITY.KEYID = 7
1,302,479 UART: [ldev] FE.KEYID = 1
1,307,551 UART: [ldev] Erasing FE.KEYID = 1
1,333,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,029 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,753 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,824 UART: [ldev] --
1,373,102 UART: [fwproc] Wait for Commands...
1,373,735 UART: [fwproc] Recv command 0x46574c44
1,374,468 UART: [fwproc] Recv'd Img size: 106876 bytes
2,584,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,086 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,629,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,765,063 >>> mbox cmd response: success
2,765,063 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,766,332 UART: [afmc] ++
2,766,500 UART: [afmc] CDI.KEYID = 6
2,766,863 UART: [afmc] SUBJECT.KEYID = 7
2,767,289 UART: [afmc] AUTHORITY.KEYID = 5
2,802,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,510 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,826,230 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,832,123 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,837,828 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,845,895 UART: [afmc] --
2,846,891 UART: [cold-reset] --
2,847,537 UART: [state] Locking Datavault
2,848,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,416 UART: [state] Locking ICCM
2,849,858 UART: [exit] Launching FMC @ 0x40000000
2,855,155 UART:
2,855,171 UART: Running Caliptra FMC ...
2,855,579 UART:
2,855,717 UART: [fmc] Received command: 0x10000001
2,856,810 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,670 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,966,647 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,986,238 UART: [fmc] FMCALIAS cert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
3,104,773 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,065 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,544,582 >>> mbox cmd response: success
2,544,582 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,606,433 UART:
2,606,449 UART: Running Caliptra FMC ...
2,606,857 UART:
2,606,995 UART: [fmc] Received command: 0x10000001
2,608,088 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,948 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,717,925 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,516 UART: [fmc] FMCALIAS cert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
2,856,051 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,961 UART: [idev] Sha1 KeyId Algorithm
1,207,137 UART: [idev] CSR upload begun
1,208,916 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,857 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,565 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,450 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,166 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,631 UART: [idev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
1,297,421 UART: [idev] CSR uploaded
1,300,466 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,300,635 UART: [idev] --
1,301,798 UART: [ldev] ++
1,301,966 UART: [ldev] CDI.KEYID = 6
1,302,330 UART: [ldev] SUBJECT.KEYID = 5
1,302,757 UART: [ldev] AUTHORITY.KEYID = 7
1,303,220 UART: [ldev] FE.KEYID = 1
1,308,218 UART: [ldev] Erasing FE.KEYID = 1
1,334,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,708 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,432 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,413 UART: [ldev] --
1,373,711 UART: [fwproc] Wait for Commands...
1,374,440 UART: [fwproc] Recv command 0x46574c44
1,375,173 UART: [fwproc] Recv'd Img size: 106876 bytes
2,585,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,367 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,767,388 >>> mbox cmd response: success
2,767,388 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,657 UART: [afmc] ++
2,768,825 UART: [afmc] CDI.KEYID = 6
2,769,188 UART: [afmc] SUBJECT.KEYID = 7
2,769,614 UART: [afmc] AUTHORITY.KEYID = 5
2,804,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,795 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,515 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,408 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,113 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,092 UART: [afmc] --
2,848,102 UART: [cold-reset] --
2,848,964 UART: [state] Locking Datavault
2,849,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,435 UART: [state] Locking ICCM
2,850,865 UART: [exit] Launching FMC @ 0x40000000
2,856,162 UART:
2,856,178 UART: Running Caliptra FMC ...
2,856,586 UART:
2,856,724 UART: [fmc] Received command: 0x10000001
2,857,817 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,677 UART: [fmc] LDEVID cert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
2,967,654 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,245 UART: [fmc] FMCALIAS cert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
3,105,780 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,954 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,543,279 >>> mbox cmd response: success
2,543,279 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,166 UART:
2,605,182 UART: Running Caliptra FMC ...
2,605,590 UART:
2,605,728 UART: [fmc] Received command: 0x10000001
2,606,821 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,681 UART: [fmc] LDEVID cert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
2,716,658 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,249 UART: [fmc] FMCALIAS cert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
2,854,784 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,466 UART: [kat] SHA2-256
902,406 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
916,931 UART: [kat] HMAC-384Kdf
921,541 UART: [kat] LMS
1,169,853 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,171,190 UART: [fht] FHT @ 0x50003400
1,173,782 UART: [idev] ++
1,173,950 UART: [idev] CDI.KEYID = 6
1,174,311 UART: [idev] SUBJECT.KEYID = 7
1,174,736 UART: [idev] UDS.KEYID = 0
1,183,140 UART: [idev] Erasing UDS.KEYID = 0
1,200,172 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] CSR upload begun
1,210,091 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,986 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,694 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,579 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,238,295 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,760 UART: [idev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
1,298,550 UART: [idev] CSR uploaded
1,301,595 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,301,764 UART: [idev] --
1,302,751 UART: [ldev] ++
1,302,919 UART: [ldev] CDI.KEYID = 6
1,303,283 UART: [ldev] SUBJECT.KEYID = 5
1,303,710 UART: [ldev] AUTHORITY.KEYID = 7
1,304,173 UART: [ldev] FE.KEYID = 1
1,309,599 UART: [ldev] Erasing FE.KEYID = 1
1,335,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,457 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,181 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,436 UART: [ldev] --
1,374,836 UART: [fwproc] Wait for Commands...
1,375,605 UART: [fwproc] Recv command 0x46574c44
1,376,338 UART: [fwproc] Recv'd Img size: 106876 bytes
2,586,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,076 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,766,895 >>> mbox cmd response: success
2,766,895 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,910 UART: [afmc] ++
2,768,078 UART: [afmc] CDI.KEYID = 6
2,768,441 UART: [afmc] SUBJECT.KEYID = 7
2,768,867 UART: [afmc] AUTHORITY.KEYID = 5
2,805,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,418 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,828,138 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,834,031 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,736 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,587 UART: [afmc] --
2,848,593 UART: [cold-reset] --
2,849,419 UART: [state] Locking Datavault
2,850,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,146 UART: [state] Locking ICCM
2,851,728 UART: [exit] Launching FMC @ 0x40000000
2,857,025 UART:
2,857,041 UART: Running Caliptra FMC ...
2,857,449 UART:
2,857,587 UART: [fmc] Received command: 0x10000001
2,858,680 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,877,540 UART: [fmc] LDEVID cert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
2,968,517 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,988,108 UART: [fmc] FMCALIAS cert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
3,106,643 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,599 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,543,162 >>> mbox cmd response: success
2,543,162 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,525 UART:
2,605,541 UART: Running Caliptra FMC ...
2,605,949 UART:
2,606,087 UART: [fmc] Received command: 0x10000001
2,607,180 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,626,040 UART: [fmc] LDEVID cert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
2,717,017 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,608 UART: [fmc] FMCALIAS cert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
2,855,143 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
5,753 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,160 UART:
192,536 UART: Running Caliptra ROM ...
193,749 UART:
193,903 UART: [state] CFI Enabled
261,366 UART: [state] LifecycleState = Unprovisioned
263,797 UART: [state] DebugLocked = No
265,559 UART: [state] WD Timer not started. Device not locked for debugging
270,629 UART: [kat] SHA2-256
452,536 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,068 UART: [kat] ++
464,770 UART: [kat] sha1
474,898 UART: [kat] SHA2-256
477,911 UART: [kat] SHA2-384
484,149 UART: [kat] SHA2-512-ACC
486,764 UART: [kat] ECC-384
3,775,137 UART: [kat] HMAC-384Kdf
3,803,261 UART: [kat] LMS
4,876,442 UART: [kat] --
4,881,234 UART: [cold-reset] ++
4,883,504 UART: [fht] FHT @ 0x50003400
4,895,354 UART: [idev] ++
4,896,028 UART: [idev] CDI.KEYID = 6
4,897,270 UART: [idev] SUBJECT.KEYID = 7
4,898,375 UART: [idev] UDS.KEYID = 0
4,931,045 UART: [idev] Erasing UDS.KEYID = 0
8,236,643 UART: [idev] Sha1 KeyId Algorithm
8,259,450 UART: [idev] --
8,263,712 UART: [ldev] ++
8,264,277 UART: [ldev] CDI.KEYID = 6
8,265,518 UART: [ldev] SUBJECT.KEYID = 5
8,266,687 UART: [ldev] AUTHORITY.KEYID = 7
8,267,784 UART: [ldev] FE.KEYID = 1
8,298,562 UART: [ldev] Erasing FE.KEYID = 1
11,630,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,962,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,978,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,994,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,305 UART: [ldev] --
14,019,784 UART: [fwproc] Wait for Commands...
14,021,779 UART: [fwproc] Recv command 0x46574c44
14,024,049 UART: [fwproc] Recv'd Img size: 114036 bytes
16,970,570 UART: ROM Fatal Error: 0x000B0014
16,973,980 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
5,311 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,768,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
6,429 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,606 UART:
193,003 UART: Running Caliptra ROM ...
194,146 UART:
603,842 UART: [state] CFI Enabled
618,016 UART: [state] LifecycleState = Unprovisioned
620,081 UART: [state] DebugLocked = No
623,026 UART: [state] WD Timer not started. Device not locked for debugging
628,414 UART: [kat] SHA2-256
810,389 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,905 UART: [kat] ++
822,435 UART: [kat] sha1
832,789 UART: [kat] SHA2-256
835,798 UART: [kat] SHA2-384
840,804 UART: [kat] SHA2-512-ACC
843,430 UART: [kat] ECC-384
4,097,547 UART: [kat] HMAC-384Kdf
4,109,001 UART: [kat] LMS
5,182,115 UART: [kat] --
5,186,085 UART: [cold-reset] ++
5,187,163 UART: [fht] FHT @ 0x50003400
5,198,737 UART: [idev] ++
5,199,406 UART: [idev] CDI.KEYID = 6
5,200,639 UART: [idev] SUBJECT.KEYID = 7
5,202,067 UART: [idev] UDS.KEYID = 0
5,219,235 UART: [idev] Erasing UDS.KEYID = 0
8,492,018 UART: [idev] Sha1 KeyId Algorithm
8,514,546 UART: [idev] --
8,518,027 UART: [ldev] ++
8,518,609 UART: [ldev] CDI.KEYID = 6
8,519,843 UART: [ldev] SUBJECT.KEYID = 5
8,521,273 UART: [ldev] AUTHORITY.KEYID = 7
8,522,830 UART: [ldev] FE.KEYID = 1
8,534,016 UART: [ldev] Erasing FE.KEYID = 1
11,828,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,052 UART: [ldev] --
14,197,194 UART: [fwproc] Wait for Commands...
14,199,258 UART: [fwproc] Recv command 0x46574c44
14,201,587 UART: [fwproc] Recv'd Img size: 114036 bytes
17,145,568 UART: ROM Fatal Error: 0x000B0014
17,148,985 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
6,083 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,968,976 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
5,833 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,244 UART:
192,634 UART: Running Caliptra ROM ...
193,798 UART:
193,953 UART: [state] CFI Enabled
265,064 UART: [state] LifecycleState = Unprovisioned
266,995 UART: [state] DebugLocked = No
269,136 UART: [state] WD Timer not started. Device not locked for debugging
273,411 UART: [kat] SHA2-256
452,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,113 UART: [kat] ++
464,653 UART: [kat] sha1
474,414 UART: [kat] SHA2-256
477,428 UART: [kat] SHA2-384
483,578 UART: [kat] SHA2-512-ACC
486,513 UART: [kat] ECC-384
2,948,819 UART: [kat] HMAC-384Kdf
2,973,086 UART: [kat] LMS
3,502,566 UART: [kat] --
3,507,148 UART: [cold-reset] ++
3,509,079 UART: [fht] FHT @ 0x50003400
3,520,978 UART: [idev] ++
3,521,582 UART: [idev] CDI.KEYID = 6
3,522,499 UART: [idev] SUBJECT.KEYID = 7
3,523,659 UART: [idev] UDS.KEYID = 0
3,543,855 UART: [idev] Erasing UDS.KEYID = 0
6,025,953 UART: [idev] Sha1 KeyId Algorithm
6,048,586 UART: [idev] --
6,053,127 UART: [ldev] ++
6,053,719 UART: [ldev] CDI.KEYID = 6
6,054,635 UART: [ldev] SUBJECT.KEYID = 5
6,055,799 UART: [ldev] AUTHORITY.KEYID = 7
6,057,035 UART: [ldev] FE.KEYID = 1
6,100,371 UART: [ldev] Erasing FE.KEYID = 1
8,606,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,337 UART: [ldev] --
10,413,124 UART: [fwproc] Wait for Commands...
10,416,306 UART: [fwproc] Recv command 0x46574c44
10,418,403 UART: [fwproc] Recv'd Img size: 114360 bytes
12,709,370 UART: ROM Fatal Error: 0x000B0014
12,712,505 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
5,906 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,260 UART:
192,673 UART: Running Caliptra ROM ...
193,980 UART:
194,134 UART: [state] CFI Enabled
264,673 UART: [state] LifecycleState = Unprovisioned
266,562 UART: [state] DebugLocked = No
268,236 UART: [state] WD Timer not started. Device not locked for debugging
272,187 UART: [kat] SHA2-256
451,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,850 UART: [kat] ++
463,300 UART: [kat] sha1
473,633 UART: [kat] SHA2-256
476,651 UART: [kat] SHA2-384
483,332 UART: [kat] SHA2-512-ACC
486,264 UART: [kat] ECC-384
2,949,260 UART: [kat] HMAC-384Kdf
2,972,305 UART: [kat] LMS
3,501,759 UART: [kat] --
3,506,340 UART: [cold-reset] ++
3,507,789 UART: [fht] FHT @ 0x50003400
3,519,740 UART: [idev] ++
3,520,304 UART: [idev] CDI.KEYID = 6
3,521,241 UART: [idev] SUBJECT.KEYID = 7
3,522,454 UART: [idev] UDS.KEYID = 0
3,544,750 UART: [idev] Erasing UDS.KEYID = 0
6,026,590 UART: [idev] Sha1 KeyId Algorithm
6,049,227 UART: [idev] --
6,052,882 UART: [ldev] ++
6,053,464 UART: [ldev] CDI.KEYID = 6
6,054,376 UART: [ldev] SUBJECT.KEYID = 5
6,055,547 UART: [ldev] AUTHORITY.KEYID = 7
6,056,785 UART: [ldev] FE.KEYID = 1
6,100,060 UART: [ldev] Erasing FE.KEYID = 1
8,605,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,111 UART: [ldev] --
10,411,140 UART: [fwproc] Wait for Commands...
10,413,250 UART: [fwproc] Recv command 0x46574c44
10,415,362 UART: [fwproc] Recv'd Img size: 114360 bytes
12,709,066 UART: ROM Fatal Error: 0x000B0014
12,712,209 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
5,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,469,080 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
6,293 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,431 UART:
192,808 UART: Running Caliptra ROM ...
193,925 UART:
603,724 UART: [state] CFI Enabled
616,268 UART: [state] LifecycleState = Unprovisioned
618,087 UART: [state] DebugLocked = No
620,821 UART: [state] WD Timer not started. Device not locked for debugging
624,928 UART: [kat] SHA2-256
804,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,644 UART: [kat] ++
816,169 UART: [kat] sha1
826,936 UART: [kat] SHA2-256
829,980 UART: [kat] SHA2-384
835,740 UART: [kat] SHA2-512-ACC
838,720 UART: [kat] ECC-384
3,281,339 UART: [kat] HMAC-384Kdf
3,293,669 UART: [kat] LMS
3,823,143 UART: [kat] --
3,827,370 UART: [cold-reset] ++
3,828,496 UART: [fht] FHT @ 0x50003400
3,840,880 UART: [idev] ++
3,841,440 UART: [idev] CDI.KEYID = 6
3,842,354 UART: [idev] SUBJECT.KEYID = 7
3,843,566 UART: [idev] UDS.KEYID = 0
3,859,018 UART: [idev] Erasing UDS.KEYID = 0
6,317,797 UART: [idev] Sha1 KeyId Algorithm
6,340,115 UART: [idev] --
6,343,459 UART: [ldev] ++
6,344,022 UART: [ldev] CDI.KEYID = 6
6,345,248 UART: [ldev] SUBJECT.KEYID = 5
6,346,370 UART: [ldev] AUTHORITY.KEYID = 7
6,347,497 UART: [ldev] FE.KEYID = 1
6,358,438 UART: [ldev] Erasing FE.KEYID = 1
8,831,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,443 UART: [ldev] --
10,621,255 UART: [fwproc] Wait for Commands...
10,623,965 UART: [fwproc] Recv command 0x46574c44
10,626,057 UART: [fwproc] Recv'd Img size: 114360 bytes
12,914,598 UART: ROM Fatal Error: 0x000B0014
12,917,732 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
6,193 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,690,841 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,604 UART: [kat] HMAC-384Kdf
920,132 UART: [kat] LMS
1,168,444 UART: [kat] --
1,169,185 UART: [cold-reset] ++
1,169,567 UART: [fht] FHT @ 0x50003400
1,172,111 UART: [idev] ++
1,172,279 UART: [idev] CDI.KEYID = 6
1,172,640 UART: [idev] SUBJECT.KEYID = 7
1,173,065 UART: [idev] UDS.KEYID = 0
1,180,897 UART: [idev] Erasing UDS.KEYID = 0
1,197,835 UART: [idev] Sha1 KeyId Algorithm
1,206,771 UART: [idev] --
1,207,860 UART: [ldev] ++
1,208,028 UART: [ldev] CDI.KEYID = 6
1,208,392 UART: [ldev] SUBJECT.KEYID = 5
1,208,819 UART: [ldev] AUTHORITY.KEYID = 7
1,209,282 UART: [ldev] FE.KEYID = 1
1,214,740 UART: [ldev] Erasing FE.KEYID = 1
1,240,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,838 UART: [ldev] --
1,280,130 UART: [fwproc] Wait for Commands...
1,280,843 UART: [fwproc] Recv command 0x46574c44
1,281,576 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,773 UART: ROM Fatal Error: 0x000B0014
1,548,930 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,287 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,857 UART: [ldev] --
1,281,345 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,177 UART: ROM Fatal Error: 0x000B0014
1,549,334 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,400,136 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,841 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,241,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,042 UART: [ldev] --
1,280,392 UART: [fwproc] Wait for Commands...
1,281,207 UART: [fwproc] Recv command 0x46574c44
1,281,940 UART: [fwproc] Recv'd Img size: 114360 bytes
1,546,769 UART: ROM Fatal Error: 0x000B0014
1,547,926 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,125 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
905,037 UART: [kat] SHA2-512-ACC
906,938 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,678 UART: [cold-reset] ++
1,171,208 UART: [fht] FHT @ 0x50003400
1,173,850 UART: [idev] ++
1,174,018 UART: [idev] CDI.KEYID = 6
1,174,379 UART: [idev] SUBJECT.KEYID = 7
1,174,804 UART: [idev] UDS.KEYID = 0
1,182,812 UART: [idev] Erasing UDS.KEYID = 0
1,200,588 UART: [idev] Sha1 KeyId Algorithm
1,209,454 UART: [idev] --
1,210,649 UART: [ldev] ++
1,210,817 UART: [ldev] CDI.KEYID = 6
1,211,181 UART: [ldev] SUBJECT.KEYID = 5
1,211,608 UART: [ldev] AUTHORITY.KEYID = 7
1,212,071 UART: [ldev] FE.KEYID = 1
1,217,463 UART: [ldev] Erasing FE.KEYID = 1
1,243,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,807 UART: [ldev] --
1,283,233 UART: [fwproc] Wait for Commands...
1,284,036 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,750 UART: ROM Fatal Error: 0x000B0014
1,550,907 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,304 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,679 UART: [idev] ++
1,172,847 UART: [idev] CDI.KEYID = 6
1,173,208 UART: [idev] SUBJECT.KEYID = 7
1,173,633 UART: [idev] UDS.KEYID = 0
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,206,979 UART: [idev] --
1,208,002 UART: [ldev] ++
1,208,170 UART: [ldev] CDI.KEYID = 6
1,208,534 UART: [ldev] SUBJECT.KEYID = 5
1,208,961 UART: [ldev] AUTHORITY.KEYID = 7
1,209,424 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,510 UART: [ldev] --
1,279,934 UART: [fwproc] Wait for Commands...
1,280,567 UART: [fwproc] Recv command 0x46574c44
1,281,300 UART: [fwproc] Recv'd Img size: 114360 bytes
1,546,459 UART: ROM Fatal Error: 0x000B0014
1,547,616 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,399,714 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,198,822 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,697 UART: [ldev] ++
1,208,865 UART: [ldev] CDI.KEYID = 6
1,209,229 UART: [ldev] SUBJECT.KEYID = 5
1,209,656 UART: [ldev] AUTHORITY.KEYID = 7
1,210,119 UART: [ldev] FE.KEYID = 1
1,215,385 UART: [ldev] Erasing FE.KEYID = 1
1,241,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,621 UART: [ldev] --
1,280,887 UART: [fwproc] Wait for Commands...
1,281,462 UART: [fwproc] Recv command 0x46574c44
1,282,195 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,656 UART: ROM Fatal Error: 0x000B0014
1,548,813 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,430 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,322 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,103 UART:
192,530 UART: Running Caliptra ROM ...
193,738 UART:
193,894 UART: [state] CFI Enabled
263,766 UART: [state] LifecycleState = Unprovisioned
266,181 UART: [state] DebugLocked = No
267,451 UART: [state] WD Timer not started. Device not locked for debugging
271,614 UART: [kat] SHA2-256
453,544 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,081 UART: [kat] ++
465,616 UART: [kat] sha1
475,932 UART: [kat] SHA2-256
478,994 UART: [kat] SHA2-384
484,530 UART: [kat] SHA2-512-ACC
487,134 UART: [kat] ECC-384
3,778,220 UART: [kat] HMAC-384Kdf
3,804,341 UART: [kat] LMS
4,877,487 UART: [kat] --
4,880,370 UART: [cold-reset] ++
4,882,952 UART: [fht] FHT @ 0x50003400
4,893,660 UART: [idev] ++
4,894,380 UART: [idev] CDI.KEYID = 6
4,895,572 UART: [idev] SUBJECT.KEYID = 7
4,896,735 UART: [idev] UDS.KEYID = 0
4,930,477 UART: [idev] Erasing UDS.KEYID = 0
8,243,903 UART: [idev] Sha1 KeyId Algorithm
8,265,291 UART: [idev] --
8,270,427 UART: [ldev] ++
8,271,013 UART: [ldev] CDI.KEYID = 6
8,272,203 UART: [ldev] SUBJECT.KEYID = 5
8,273,401 UART: [ldev] AUTHORITY.KEYID = 7
8,274,532 UART: [ldev] FE.KEYID = 1
8,318,776 UART: [ldev] Erasing FE.KEYID = 1
11,650,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,305 UART: [ldev] --
14,016,176 UART: [fwproc] Wait for Commands...
14,019,319 UART: [fwproc] Recv command 0x46574c44
14,021,583 UART: [fwproc] Recv'd Img size: 114036 bytes
16,960,727 UART: ROM Fatal Error: 0x000B0024
16,964,203 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,556 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,740,530 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,802 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,498 UART:
192,872 UART: Running Caliptra ROM ...
194,088 UART:
603,514 UART: [state] CFI Enabled
619,174 UART: [state] LifecycleState = Unprovisioned
621,614 UART: [state] DebugLocked = No
622,784 UART: [state] WD Timer not started. Device not locked for debugging
625,916 UART: [kat] SHA2-256
807,936 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,470 UART: [kat] ++
820,055 UART: [kat] sha1
830,505 UART: [kat] SHA2-256
833,510 UART: [kat] SHA2-384
839,750 UART: [kat] SHA2-512-ACC
842,354 UART: [kat] ECC-384
4,100,086 UART: [kat] HMAC-384Kdf
4,110,865 UART: [kat] LMS
5,184,041 UART: [kat] --
5,186,548 UART: [cold-reset] ++
5,187,728 UART: [fht] FHT @ 0x50003400
5,199,947 UART: [idev] ++
5,200,643 UART: [idev] CDI.KEYID = 6
5,201,823 UART: [idev] SUBJECT.KEYID = 7
5,203,250 UART: [idev] UDS.KEYID = 0
5,216,197 UART: [idev] Erasing UDS.KEYID = 0
8,490,891 UART: [idev] Sha1 KeyId Algorithm
8,513,208 UART: [idev] --
8,517,466 UART: [ldev] ++
8,518,031 UART: [ldev] CDI.KEYID = 6
8,519,269 UART: [ldev] SUBJECT.KEYID = 5
8,520,704 UART: [ldev] AUTHORITY.KEYID = 7
8,522,185 UART: [ldev] FE.KEYID = 1
8,535,489 UART: [ldev] Erasing FE.KEYID = 1
11,829,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,559 UART: [ldev] --
14,196,170 UART: [fwproc] Wait for Commands...
14,197,885 UART: [fwproc] Recv command 0x46574c44
14,200,144 UART: [fwproc] Recv'd Img size: 114036 bytes
17,151,346 UART: ROM Fatal Error: 0x000B0024
17,154,751 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,595 writing to cptra_bootfsm_go
4,009 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,957,278 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,110 UART:
192,507 UART: Running Caliptra ROM ...
193,730 UART:
193,882 UART: [state] CFI Enabled
265,848 UART: [state] LifecycleState = Unprovisioned
267,727 UART: [state] DebugLocked = No
269,760 UART: [state] WD Timer not started. Device not locked for debugging
273,495 UART: [kat] SHA2-256
452,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,178 UART: [kat] ++
464,706 UART: [kat] sha1
475,052 UART: [kat] SHA2-256
478,126 UART: [kat] SHA2-384
484,205 UART: [kat] SHA2-512-ACC
487,137 UART: [kat] ECC-384
2,951,079 UART: [kat] HMAC-384Kdf
2,973,095 UART: [kat] LMS
3,502,570 UART: [kat] --
3,507,662 UART: [cold-reset] ++
3,508,568 UART: [fht] FHT @ 0x50003400
3,520,766 UART: [idev] ++
3,521,332 UART: [idev] CDI.KEYID = 6
3,522,268 UART: [idev] SUBJECT.KEYID = 7
3,523,475 UART: [idev] UDS.KEYID = 0
3,546,340 UART: [idev] Erasing UDS.KEYID = 0
6,028,186 UART: [idev] Sha1 KeyId Algorithm
6,051,087 UART: [idev] --
6,054,417 UART: [ldev] ++
6,054,997 UART: [ldev] CDI.KEYID = 6
6,055,916 UART: [ldev] SUBJECT.KEYID = 5
6,057,078 UART: [ldev] AUTHORITY.KEYID = 7
6,058,321 UART: [ldev] FE.KEYID = 1
6,103,541 UART: [ldev] Erasing FE.KEYID = 1
8,605,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,424 UART: [ldev] --
10,414,392 UART: [fwproc] Wait for Commands...
10,416,819 UART: [fwproc] Recv command 0x46574c44
10,418,915 UART: [fwproc] Recv'd Img size: 114360 bytes
12,713,397 UART: ROM Fatal Error: 0x000B0024
12,716,527 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,500 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,229 UART:
192,623 UART: Running Caliptra ROM ...
193,823 UART:
193,974 UART: [state] CFI Enabled
270,171 UART: [state] LifecycleState = Unprovisioned
272,056 UART: [state] DebugLocked = No
274,529 UART: [state] WD Timer not started. Device not locked for debugging
277,932 UART: [kat] SHA2-256
457,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,635 UART: [kat] ++
469,164 UART: [kat] sha1
479,724 UART: [kat] SHA2-256
482,731 UART: [kat] SHA2-384
489,406 UART: [kat] SHA2-512-ACC
492,395 UART: [kat] ECC-384
2,949,040 UART: [kat] HMAC-384Kdf
2,973,153 UART: [kat] LMS
3,502,616 UART: [kat] --
3,505,163 UART: [cold-reset] ++
3,506,611 UART: [fht] FHT @ 0x50003400
3,518,473 UART: [idev] ++
3,519,041 UART: [idev] CDI.KEYID = 6
3,519,972 UART: [idev] SUBJECT.KEYID = 7
3,521,132 UART: [idev] UDS.KEYID = 0
3,544,737 UART: [idev] Erasing UDS.KEYID = 0
6,027,870 UART: [idev] Sha1 KeyId Algorithm
6,051,003 UART: [idev] --
6,054,739 UART: [ldev] ++
6,055,318 UART: [ldev] CDI.KEYID = 6
6,056,205 UART: [ldev] SUBJECT.KEYID = 5
6,057,425 UART: [ldev] AUTHORITY.KEYID = 7
6,058,662 UART: [ldev] FE.KEYID = 1
6,102,229 UART: [ldev] Erasing FE.KEYID = 1
8,604,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,787 UART: [ldev] --
10,416,081 UART: [fwproc] Wait for Commands...
10,418,348 UART: [fwproc] Recv command 0x46574c44
10,420,434 UART: [fwproc] Recv'd Img size: 114360 bytes
12,708,870 UART: ROM Fatal Error: 0x000B0024
12,711,993 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,469,148 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
3,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,475 UART:
192,889 UART: Running Caliptra ROM ...
194,028 UART:
603,374 UART: [state] CFI Enabled
617,690 UART: [state] LifecycleState = Unprovisioned
619,572 UART: [state] DebugLocked = No
622,112 UART: [state] WD Timer not started. Device not locked for debugging
624,985 UART: [kat] SHA2-256
804,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,708 UART: [kat] ++
816,154 UART: [kat] sha1
826,863 UART: [kat] SHA2-256
829,925 UART: [kat] SHA2-384
836,167 UART: [kat] SHA2-512-ACC
839,092 UART: [kat] ECC-384
3,280,553 UART: [kat] HMAC-384Kdf
3,292,189 UART: [kat] LMS
3,821,687 UART: [kat] --
3,826,808 UART: [cold-reset] ++
3,828,467 UART: [fht] FHT @ 0x50003400
3,840,256 UART: [idev] ++
3,840,816 UART: [idev] CDI.KEYID = 6
3,841,822 UART: [idev] SUBJECT.KEYID = 7
3,842,973 UART: [idev] UDS.KEYID = 0
3,858,139 UART: [idev] Erasing UDS.KEYID = 0
6,311,086 UART: [idev] Sha1 KeyId Algorithm
6,334,518 UART: [idev] --
6,337,757 UART: [ldev] ++
6,338,328 UART: [ldev] CDI.KEYID = 6
6,339,233 UART: [ldev] SUBJECT.KEYID = 5
6,340,387 UART: [ldev] AUTHORITY.KEYID = 7
6,341,669 UART: [ldev] FE.KEYID = 1
6,351,262 UART: [ldev] Erasing FE.KEYID = 1
8,827,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,082 UART: [ldev] --
10,618,790 UART: [fwproc] Wait for Commands...
10,620,787 UART: [fwproc] Recv command 0x46574c44
10,622,898 UART: [fwproc] Recv'd Img size: 114360 bytes
12,910,401 UART: ROM Fatal Error: 0x000B0024
12,913,521 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,695,318 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
915,400 UART: [kat] HMAC-384Kdf
919,834 UART: [kat] LMS
1,168,146 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,523 UART: [fht] FHT @ 0x50003400
1,172,079 UART: [idev] ++
1,172,247 UART: [idev] CDI.KEYID = 6
1,172,608 UART: [idev] SUBJECT.KEYID = 7
1,173,033 UART: [idev] UDS.KEYID = 0
1,180,929 UART: [idev] Erasing UDS.KEYID = 0
1,198,393 UART: [idev] Sha1 KeyId Algorithm
1,207,085 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,024 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,281,157 UART: [fwproc] Recv command 0x46574c44
1,281,890 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,959 UART: ROM Fatal Error: 0x000B0024
1,549,116 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,155 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,954 UART: ROM Fatal Error: 0x000B0024
1,550,111 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,324 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,092 UART: [kat] SHA2-512-ACC
905,993 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,585 UART: [idev] ++
1,172,753 UART: [idev] CDI.KEYID = 6
1,173,114 UART: [idev] SUBJECT.KEYID = 7
1,173,539 UART: [idev] UDS.KEYID = 0
1,180,953 UART: [idev] Erasing UDS.KEYID = 0
1,198,089 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,214,412 UART: [ldev] Erasing FE.KEYID = 1
1,240,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,268 UART: [ldev] --
1,279,568 UART: [fwproc] Wait for Commands...
1,280,385 UART: [fwproc] Recv command 0x46574c44
1,281,118 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,661 UART: ROM Fatal Error: 0x000B0024
1,548,818 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,213 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,975 UART: [kat] SHA2-512-ACC
906,876 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,598 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,658 UART: [idev] ++
1,173,826 UART: [idev] CDI.KEYID = 6
1,174,187 UART: [idev] SUBJECT.KEYID = 7
1,174,612 UART: [idev] UDS.KEYID = 0
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,853 UART: [fwproc] Wait for Commands...
1,282,530 UART: [fwproc] Recv command 0x46574c44
1,283,263 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,758 UART: ROM Fatal Error: 0x000B0024
1,549,915 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,612 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,122 UART: [kat] SHA2-512-ACC
906,023 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,529 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,435 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,216,062 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,972 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,515 UART: ROM Fatal Error: 0x000B0024
1,550,672 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,835 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,419 UART: [kat] SHA2-256
891,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,098 UART: [kat] ++
896,250 UART: [kat] sha1
900,468 UART: [kat] SHA2-256
902,408 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,477 UART: [kat] LMS
1,169,789 UART: [kat] --
1,170,876 UART: [cold-reset] ++
1,171,238 UART: [fht] FHT @ 0x50003400
1,173,866 UART: [idev] ++
1,174,034 UART: [idev] CDI.KEYID = 6
1,174,395 UART: [idev] SUBJECT.KEYID = 7
1,174,820 UART: [idev] UDS.KEYID = 0
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,955 UART: [ldev] ++
1,210,123 UART: [ldev] CDI.KEYID = 6
1,210,487 UART: [ldev] SUBJECT.KEYID = 5
1,210,914 UART: [ldev] AUTHORITY.KEYID = 7
1,211,377 UART: [ldev] FE.KEYID = 1
1,216,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,978 UART: ROM Fatal Error: 0x000B0024
1,552,135 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,814 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,579 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,335 UART:
192,707 UART: Running Caliptra ROM ...
193,915 UART:
194,071 UART: [state] CFI Enabled
263,859 UART: [state] LifecycleState = Unprovisioned
266,264 UART: [state] DebugLocked = No
268,289 UART: [state] WD Timer not started. Device not locked for debugging
273,117 UART: [kat] SHA2-256
455,062 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,564 UART: [kat] ++
467,153 UART: [kat] sha1
478,469 UART: [kat] SHA2-256
481,478 UART: [kat] SHA2-384
487,018 UART: [kat] SHA2-512-ACC
489,632 UART: [kat] ECC-384
3,776,966 UART: [kat] HMAC-384Kdf
3,802,768 UART: [kat] LMS
4,875,933 UART: [kat] --
4,879,064 UART: [cold-reset] ++
4,880,838 UART: [fht] FHT @ 0x50003400
4,893,122 UART: [idev] ++
4,893,807 UART: [idev] CDI.KEYID = 6
4,895,042 UART: [idev] SUBJECT.KEYID = 7
4,896,176 UART: [idev] UDS.KEYID = 0
4,929,304 UART: [idev] Erasing UDS.KEYID = 0
8,240,833 UART: [idev] Sha1 KeyId Algorithm
8,262,874 UART: [idev] --
8,265,781 UART: [ldev] ++
8,266,404 UART: [ldev] CDI.KEYID = 6
8,267,632 UART: [ldev] SUBJECT.KEYID = 5
8,268,769 UART: [ldev] AUTHORITY.KEYID = 7
8,269,978 UART: [ldev] FE.KEYID = 1
8,318,066 UART: [ldev] Erasing FE.KEYID = 1
11,652,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,009 UART: [ldev] --
14,036,742 UART: [fwproc] Wait for Commands...
14,039,274 UART: [fwproc] Recv command 0x46574c44
14,041,592 UART: [fwproc] Recv'd Img size: 114036 bytes
16,984,524 UART: ROM Fatal Error: 0x000B0023
16,987,927 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,339 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,752,365 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
3,758 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,502 UART:
192,879 UART: Running Caliptra ROM ...
194,099 UART:
603,583 UART: [state] CFI Enabled
618,709 UART: [state] LifecycleState = Unprovisioned
621,084 UART: [state] DebugLocked = No
623,153 UART: [state] WD Timer not started. Device not locked for debugging
626,981 UART: [kat] SHA2-256
808,970 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,534 UART: [kat] ++
821,033 UART: [kat] sha1
832,179 UART: [kat] SHA2-256
835,188 UART: [kat] SHA2-384
841,759 UART: [kat] SHA2-512-ACC
844,419 UART: [kat] ECC-384
4,099,523 UART: [kat] HMAC-384Kdf
4,113,072 UART: [kat] LMS
5,186,206 UART: [kat] --
5,191,491 UART: [cold-reset] ++
5,193,290 UART: [fht] FHT @ 0x50003400
5,203,782 UART: [idev] ++
5,204,450 UART: [idev] CDI.KEYID = 6
5,205,625 UART: [idev] SUBJECT.KEYID = 7
5,207,160 UART: [idev] UDS.KEYID = 0
5,220,569 UART: [idev] Erasing UDS.KEYID = 0
8,496,699 UART: [idev] Sha1 KeyId Algorithm
8,519,146 UART: [idev] --
8,522,596 UART: [ldev] ++
8,523,156 UART: [ldev] CDI.KEYID = 6
8,524,390 UART: [ldev] SUBJECT.KEYID = 5
8,525,870 UART: [ldev] AUTHORITY.KEYID = 7
8,527,423 UART: [ldev] FE.KEYID = 1
8,539,684 UART: [ldev] Erasing FE.KEYID = 1
11,833,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,441 UART: [ldev] --
14,199,865 UART: [fwproc] Wait for Commands...
14,201,843 UART: [fwproc] Recv command 0x46574c44
14,204,158 UART: [fwproc] Recv'd Img size: 114036 bytes
17,144,568 UART: ROM Fatal Error: 0x000B0023
17,147,967 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,533 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,960,732 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,463 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,218 UART:
192,618 UART: Running Caliptra ROM ...
193,823 UART:
193,978 UART: [state] CFI Enabled
262,067 UART: [state] LifecycleState = Unprovisioned
264,064 UART: [state] DebugLocked = No
266,750 UART: [state] WD Timer not started. Device not locked for debugging
270,431 UART: [kat] SHA2-256
449,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,137 UART: [kat] ++
461,671 UART: [kat] sha1
473,685 UART: [kat] SHA2-256
476,691 UART: [kat] SHA2-384
482,885 UART: [kat] SHA2-512-ACC
485,871 UART: [kat] ECC-384
2,948,925 UART: [kat] HMAC-384Kdf
2,973,850 UART: [kat] LMS
3,503,298 UART: [kat] --
3,506,269 UART: [cold-reset] ++
3,508,146 UART: [fht] FHT @ 0x50003400
3,519,232 UART: [idev] ++
3,519,795 UART: [idev] CDI.KEYID = 6
3,520,772 UART: [idev] SUBJECT.KEYID = 7
3,521,932 UART: [idev] UDS.KEYID = 0
3,546,881 UART: [idev] Erasing UDS.KEYID = 0
6,028,592 UART: [idev] Sha1 KeyId Algorithm
6,050,369 UART: [idev] --
6,054,634 UART: [ldev] ++
6,055,208 UART: [ldev] CDI.KEYID = 6
6,056,116 UART: [ldev] SUBJECT.KEYID = 5
6,057,252 UART: [ldev] AUTHORITY.KEYID = 7
6,058,599 UART: [ldev] FE.KEYID = 1
6,102,173 UART: [ldev] Erasing FE.KEYID = 1
8,607,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,209 UART: [ldev] --
10,414,118 UART: [fwproc] Wait for Commands...
10,415,832 UART: [fwproc] Recv command 0x46574c44
10,417,878 UART: [fwproc] Recv'd Img size: 114360 bytes
12,709,116 UART: ROM Fatal Error: 0x000B0023
12,712,199 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,509 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,268 UART:
192,659 UART: Running Caliptra ROM ...
193,878 UART:
194,031 UART: [state] CFI Enabled
265,132 UART: [state] LifecycleState = Unprovisioned
267,069 UART: [state] DebugLocked = No
269,912 UART: [state] WD Timer not started. Device not locked for debugging
273,439 UART: [kat] SHA2-256
452,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,108 UART: [kat] ++
464,664 UART: [kat] sha1
474,749 UART: [kat] SHA2-256
477,747 UART: [kat] SHA2-384
483,951 UART: [kat] SHA2-512-ACC
486,890 UART: [kat] ECC-384
2,950,677 UART: [kat] HMAC-384Kdf
2,973,021 UART: [kat] LMS
3,502,455 UART: [kat] --
3,507,264 UART: [cold-reset] ++
3,508,654 UART: [fht] FHT @ 0x50003400
3,520,129 UART: [idev] ++
3,520,717 UART: [idev] CDI.KEYID = 6
3,521,626 UART: [idev] SUBJECT.KEYID = 7
3,522,846 UART: [idev] UDS.KEYID = 0
3,544,327 UART: [idev] Erasing UDS.KEYID = 0
6,029,683 UART: [idev] Sha1 KeyId Algorithm
6,051,805 UART: [idev] --
6,054,617 UART: [ldev] ++
6,055,192 UART: [ldev] CDI.KEYID = 6
6,056,101 UART: [ldev] SUBJECT.KEYID = 5
6,057,202 UART: [ldev] AUTHORITY.KEYID = 7
6,058,545 UART: [ldev] FE.KEYID = 1
6,101,068 UART: [ldev] Erasing FE.KEYID = 1
8,602,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,151 UART: [ldev] --
10,392,508 UART: [fwproc] Wait for Commands...
10,394,596 UART: [fwproc] Recv command 0x46574c44
10,396,704 UART: [fwproc] Recv'd Img size: 114360 bytes
12,685,242 UART: ROM Fatal Error: 0x000B0023
12,688,370 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,502,050 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,383 UART:
192,755 UART: Running Caliptra ROM ...
193,954 UART:
603,555 UART: [state] CFI Enabled
618,456 UART: [state] LifecycleState = Unprovisioned
620,344 UART: [state] DebugLocked = No
622,143 UART: [state] WD Timer not started. Device not locked for debugging
626,197 UART: [kat] SHA2-256
805,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,877 UART: [kat] ++
817,410 UART: [kat] sha1
828,559 UART: [kat] SHA2-256
831,560 UART: [kat] SHA2-384
837,423 UART: [kat] SHA2-512-ACC
840,354 UART: [kat] ECC-384
3,281,424 UART: [kat] HMAC-384Kdf
3,295,075 UART: [kat] LMS
3,824,530 UART: [kat] --
3,829,070 UART: [cold-reset] ++
3,830,982 UART: [fht] FHT @ 0x50003400
3,842,181 UART: [idev] ++
3,842,755 UART: [idev] CDI.KEYID = 6
3,843,721 UART: [idev] SUBJECT.KEYID = 7
3,844,875 UART: [idev] UDS.KEYID = 0
3,857,934 UART: [idev] Erasing UDS.KEYID = 0
6,314,375 UART: [idev] Sha1 KeyId Algorithm
6,337,970 UART: [idev] --
6,342,604 UART: [ldev] ++
6,343,171 UART: [ldev] CDI.KEYID = 6
6,344,054 UART: [ldev] SUBJECT.KEYID = 5
6,345,263 UART: [ldev] AUTHORITY.KEYID = 7
6,346,489 UART: [ldev] FE.KEYID = 1
6,356,557 UART: [ldev] Erasing FE.KEYID = 1
8,830,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,687 UART: [ldev] --
10,620,900 UART: [fwproc] Wait for Commands...
10,623,210 UART: [fwproc] Recv command 0x46574c44
10,625,299 UART: [fwproc] Recv'd Img size: 114360 bytes
12,914,525 UART: ROM Fatal Error: 0x000B0023
12,917,653 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,542 writing to cptra_bootfsm_go
4,046 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,692,214 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,967 UART: [kat] ++
895,119 UART: [kat] sha1
899,263 UART: [kat] SHA2-256
901,203 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,451 UART: [idev] ++
1,172,619 UART: [idev] CDI.KEYID = 6
1,172,980 UART: [idev] SUBJECT.KEYID = 7
1,173,405 UART: [idev] UDS.KEYID = 0
1,180,679 UART: [idev] Erasing UDS.KEYID = 0
1,197,637 UART: [idev] Sha1 KeyId Algorithm
1,206,679 UART: [idev] --
1,207,604 UART: [ldev] ++
1,207,772 UART: [ldev] CDI.KEYID = 6
1,208,136 UART: [ldev] SUBJECT.KEYID = 5
1,208,563 UART: [ldev] AUTHORITY.KEYID = 7
1,209,026 UART: [ldev] FE.KEYID = 1
1,213,946 UART: [ldev] Erasing FE.KEYID = 1
1,240,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,172 UART: [ldev] --
1,279,458 UART: [fwproc] Wait for Commands...
1,280,041 UART: [fwproc] Recv command 0x46574c44
1,280,774 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,082 UART: ROM Fatal Error: 0x000B0023
1,548,239 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,064 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,675 UART: [kat] HMAC-384Kdf
921,337 UART: [kat] LMS
1,169,649 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,183,118 UART: [idev] Erasing UDS.KEYID = 0
1,200,076 UART: [idev] Sha1 KeyId Algorithm
1,209,010 UART: [idev] --
1,209,953 UART: [ldev] ++
1,210,121 UART: [ldev] CDI.KEYID = 6
1,210,485 UART: [ldev] SUBJECT.KEYID = 5
1,210,912 UART: [ldev] AUTHORITY.KEYID = 7
1,211,375 UART: [ldev] FE.KEYID = 1
1,216,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,333 UART: [fwproc] Wait for Commands...
1,282,988 UART: [fwproc] Recv command 0x46574c44
1,283,721 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,411 UART: ROM Fatal Error: 0x000B0023
1,551,568 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,411 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,239 UART: [kat] SHA2-256
901,179 UART: [kat] SHA2-384
903,948 UART: [kat] SHA2-512-ACC
905,849 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,044 UART: [kat] LMS
1,168,356 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,717 UART: [fht] FHT @ 0x50003400
1,172,357 UART: [idev] ++
1,172,525 UART: [idev] CDI.KEYID = 6
1,172,886 UART: [idev] SUBJECT.KEYID = 7
1,173,311 UART: [idev] UDS.KEYID = 0
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,662 UART: [ldev] Erasing FE.KEYID = 1
1,240,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,376 UART: [ldev] --
1,279,650 UART: [fwproc] Wait for Commands...
1,280,271 UART: [fwproc] Recv command 0x46574c44
1,281,004 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,174 UART: ROM Fatal Error: 0x000B0023
1,548,331 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,402 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,977 UART: [state] LifecycleState = Unprovisioned
86,632 UART: [state] DebugLocked = No
87,274 UART: [state] WD Timer not started. Device not locked for debugging
88,545 UART: [kat] SHA2-256
892,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,224 UART: [kat] ++
896,376 UART: [kat] sha1
900,724 UART: [kat] SHA2-256
902,664 UART: [kat] SHA2-384
905,317 UART: [kat] SHA2-512-ACC
907,218 UART: [kat] ECC-384
917,299 UART: [kat] HMAC-384Kdf
921,929 UART: [kat] LMS
1,170,241 UART: [kat] --
1,171,034 UART: [cold-reset] ++
1,171,460 UART: [fht] FHT @ 0x50003400
1,174,144 UART: [idev] ++
1,174,312 UART: [idev] CDI.KEYID = 6
1,174,673 UART: [idev] SUBJECT.KEYID = 7
1,175,098 UART: [idev] UDS.KEYID = 0
1,183,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,960 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,873 UART: [ldev] ++
1,210,041 UART: [ldev] CDI.KEYID = 6
1,210,405 UART: [ldev] SUBJECT.KEYID = 5
1,210,832 UART: [ldev] AUTHORITY.KEYID = 7
1,211,295 UART: [ldev] FE.KEYID = 1
1,216,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,777 UART: [ldev] --
1,282,179 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,557 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,613 UART: ROM Fatal Error: 0x000B0023
1,550,770 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,199 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,474 UART: [kat] LMS
1,168,786 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,709 UART: [fht] FHT @ 0x50003400
1,172,393 UART: [idev] ++
1,172,561 UART: [idev] CDI.KEYID = 6
1,172,922 UART: [idev] SUBJECT.KEYID = 7
1,173,347 UART: [idev] UDS.KEYID = 0
1,181,095 UART: [idev] Erasing UDS.KEYID = 0
1,198,433 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,856 UART: [ldev] --
1,280,272 UART: [fwproc] Wait for Commands...
1,281,049 UART: [fwproc] Recv command 0x46574c44
1,281,782 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,054 UART: ROM Fatal Error: 0x000B0023
1,549,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,400,046 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
905,139 UART: [kat] SHA2-512-ACC
907,040 UART: [kat] ECC-384
916,873 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,173,996 UART: [idev] ++
1,174,164 UART: [idev] CDI.KEYID = 6
1,174,525 UART: [idev] SUBJECT.KEYID = 7
1,174,950 UART: [idev] UDS.KEYID = 0
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,201,198 UART: [idev] Sha1 KeyId Algorithm
1,209,938 UART: [idev] --
1,211,151 UART: [ldev] ++
1,211,319 UART: [ldev] CDI.KEYID = 6
1,211,683 UART: [ldev] SUBJECT.KEYID = 5
1,212,110 UART: [ldev] AUTHORITY.KEYID = 7
1,212,573 UART: [ldev] FE.KEYID = 1
1,217,691 UART: [ldev] Erasing FE.KEYID = 1
1,244,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,645 UART: [ldev] --
1,284,033 UART: [fwproc] Wait for Commands...
1,284,852 UART: [fwproc] Recv command 0x46574c44
1,285,585 UART: [fwproc] Recv'd Img size: 114360 bytes
1,552,737 UART: ROM Fatal Error: 0x000B0023
1,553,894 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,279 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
2,021,745 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,938 UART:
2,166,341 UART: Running Caliptra ROM ...
2,167,510 UART:
2,167,709 UART: [state] CFI Enabled
2,168,678 UART: [state] LifecycleState = Unprovisioned
2,170,322 UART: [state] DebugLocked = No
2,171,429 UART: [state] WD Timer not started. Device not locked for debugging
2,173,898 UART: [kat] SHA2-256
2,174,568 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,572 UART: [kat] ++
2,178,022 UART: [kat] sha1
2,178,540 UART: [kat] SHA2-256
2,179,199 UART: [kat] SHA2-384
2,179,856 UART: [kat] SHA2-512-ACC
2,180,656 UART: [kat] ECC-384
3,775,356 UART: [kat] HMAC-384Kdf
3,802,453 UART: [kat] LMS
4,875,569 UART: [kat] --
4,881,842 UART: [cold-reset] ++
4,884,177 UART: [fht] FHT @ 0x50003400
4,895,377 UART: [idev] ++
4,896,058 UART: [idev] CDI.KEYID = 6
4,897,298 UART: [idev] SUBJECT.KEYID = 7
4,898,399 UART: [idev] UDS.KEYID = 0
4,930,368 UART: [idev] Erasing UDS.KEYID = 0
8,240,650 UART: [idev] Sha1 KeyId Algorithm
8,262,800 UART: [idev] --
8,267,008 UART: [ldev] ++
8,267,645 UART: [ldev] CDI.KEYID = 6
8,268,831 UART: [ldev] SUBJECT.KEYID = 5
8,269,989 UART: [ldev] AUTHORITY.KEYID = 7
8,271,219 UART: [ldev] FE.KEYID = 1
8,316,333 UART: [ldev] Erasing FE.KEYID = 1
11,655,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,548 UART: [ldev] --
14,037,468 UART: [fwproc] Wait for Commands...
14,040,196 UART: [fwproc] Recv command 0x46574c44
14,042,533 UART: [fwproc] Recv'd Img size: 114036 bytes
16,979,236 UART: ROM Fatal Error: 0x000B0023
16,982,696 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,020,950 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,819,530 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
2,025,308 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,169,276 UART:
2,169,695 UART: Running Caliptra ROM ...
2,170,772 UART:
2,170,919 UART: [state] CFI Enabled
2,171,903 UART: [state] LifecycleState = Unprovisioned
2,173,560 UART: [state] DebugLocked = No
2,174,665 UART: [state] WD Timer not started. Device not locked for debugging
2,177,135 UART: [kat] SHA2-256
2,177,794 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,799 UART: [kat] ++
2,181,241 UART: [kat] sha1
2,181,746 UART: [kat] SHA2-256
2,182,477 UART: [kat] SHA2-384
2,183,160 UART: [kat] SHA2-512-ACC
2,184,046 UART: [kat] ECC-384
4,099,237 UART: [kat] HMAC-384Kdf
4,110,449 UART: [kat] LMS
5,183,591 UART: [kat] --
5,187,331 UART: [cold-reset] ++
5,188,507 UART: [fht] FHT @ 0x50003400
5,199,753 UART: [idev] ++
5,200,418 UART: [idev] CDI.KEYID = 6
5,201,646 UART: [idev] SUBJECT.KEYID = 7
5,203,070 UART: [idev] UDS.KEYID = 0
5,218,127 UART: [idev] Erasing UDS.KEYID = 0
8,491,221 UART: [idev] Sha1 KeyId Algorithm
8,514,732 UART: [idev] --
8,518,346 UART: [ldev] ++
8,518,969 UART: [ldev] CDI.KEYID = 6
8,520,102 UART: [ldev] SUBJECT.KEYID = 5
8,521,586 UART: [ldev] AUTHORITY.KEYID = 7
8,523,125 UART: [ldev] FE.KEYID = 1
8,535,459 UART: [ldev] Erasing FE.KEYID = 1
11,827,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,599 UART: [ldev] --
14,191,685 UART: [fwproc] Wait for Commands...
14,193,673 UART: [fwproc] Recv command 0x46574c44
14,195,986 UART: [fwproc] Recv'd Img size: 114036 bytes
17,145,948 UART: ROM Fatal Error: 0x000B0023
17,149,415 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,021,144 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,957,498 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,021,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,165,776 UART:
2,166,187 UART: Running Caliptra ROM ...
2,167,306 UART:
2,167,473 UART: [state] CFI Enabled
2,168,363 UART: [state] LifecycleState = Unprovisioned
2,170,010 UART: [state] DebugLocked = No
2,171,126 UART: [state] WD Timer not started. Device not locked for debugging
2,173,629 UART: [kat] SHA2-256
2,174,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,323 UART: [kat] ++
2,177,774 UART: [kat] sha1
2,178,289 UART: [kat] SHA2-256
2,178,974 UART: [kat] SHA2-384
2,179,633 UART: [kat] SHA2-512-ACC
2,180,433 UART: [kat] ECC-384
2,946,393 UART: [kat] HMAC-384Kdf
2,973,673 UART: [kat] LMS
3,503,128 UART: [kat] --
3,508,329 UART: [cold-reset] ++
3,510,637 UART: [fht] FHT @ 0x50003400
3,520,591 UART: [idev] ++
3,521,159 UART: [idev] CDI.KEYID = 6
3,522,120 UART: [idev] SUBJECT.KEYID = 7
3,523,306 UART: [idev] UDS.KEYID = 0
3,545,659 UART: [idev] Erasing UDS.KEYID = 0
6,027,714 UART: [idev] Sha1 KeyId Algorithm
6,049,214 UART: [idev] --
6,053,023 UART: [ldev] ++
6,053,603 UART: [ldev] CDI.KEYID = 6
6,054,491 UART: [ldev] SUBJECT.KEYID = 5
6,055,654 UART: [ldev] AUTHORITY.KEYID = 7
6,056,945 UART: [ldev] FE.KEYID = 1
6,101,812 UART: [ldev] Erasing FE.KEYID = 1
8,605,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,395 UART: [ldev] --
10,417,138 UART: [fwproc] Wait for Commands...
10,420,264 UART: [fwproc] Recv command 0x46574c44
10,422,361 UART: [fwproc] Recv'd Img size: 114360 bytes
12,712,468 UART: ROM Fatal Error: 0x000B0023
12,715,620 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
2,024,951 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,378 UART:
2,169,790 UART: Running Caliptra ROM ...
2,170,971 UART:
2,171,144 UART: [state] CFI Enabled
2,172,110 UART: [state] LifecycleState = Unprovisioned
2,173,756 UART: [state] DebugLocked = No
2,174,865 UART: [state] WD Timer not started. Device not locked for debugging
2,177,347 UART: [kat] SHA2-256
2,178,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,040 UART: [kat] ++
2,181,495 UART: [kat] sha1
2,182,094 UART: [kat] SHA2-256
2,182,763 UART: [kat] SHA2-384
2,183,418 UART: [kat] SHA2-512-ACC
2,184,304 UART: [kat] ECC-384
2,948,808 UART: [kat] HMAC-384Kdf
2,970,696 UART: [kat] LMS
3,500,152 UART: [kat] --
3,505,633 UART: [cold-reset] ++
3,507,143 UART: [fht] FHT @ 0x50003400
3,519,158 UART: [idev] ++
3,519,725 UART: [idev] CDI.KEYID = 6
3,520,689 UART: [idev] SUBJECT.KEYID = 7
3,521,854 UART: [idev] UDS.KEYID = 0
3,542,801 UART: [idev] Erasing UDS.KEYID = 0
6,026,436 UART: [idev] Sha1 KeyId Algorithm
6,049,673 UART: [idev] --
6,054,215 UART: [ldev] ++
6,054,796 UART: [ldev] CDI.KEYID = 6
6,055,709 UART: [ldev] SUBJECT.KEYID = 5
6,056,877 UART: [ldev] AUTHORITY.KEYID = 7
6,058,188 UART: [ldev] FE.KEYID = 1
6,100,070 UART: [ldev] Erasing FE.KEYID = 1
8,605,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,935 UART: [ldev] --
10,413,217 UART: [fwproc] Wait for Commands...
10,415,117 UART: [fwproc] Recv command 0x46574c44
10,417,225 UART: [fwproc] Recv'd Img size: 114360 bytes
12,709,720 UART: ROM Fatal Error: 0x000B0023
12,712,843 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
2,021,174 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,493,774 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
2,022,454 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,106 UART:
2,167,502 UART: Running Caliptra ROM ...
2,168,686 UART:
2,168,865 UART: [state] CFI Enabled
2,169,827 UART: [state] LifecycleState = Unprovisioned
2,171,467 UART: [state] DebugLocked = No
2,172,568 UART: [state] WD Timer not started. Device not locked for debugging
2,175,048 UART: [kat] SHA2-256
2,175,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,729 UART: [kat] ++
2,179,177 UART: [kat] sha1
2,179,737 UART: [kat] SHA2-256
2,180,392 UART: [kat] SHA2-384
2,181,047 UART: [kat] SHA2-512-ACC
2,181,888 UART: [kat] ECC-384
3,277,816 UART: [kat] HMAC-384Kdf
3,289,414 UART: [kat] LMS
3,818,938 UART: [kat] --
3,822,247 UART: [cold-reset] ++
3,823,264 UART: [fht] FHT @ 0x50003400
3,833,864 UART: [idev] ++
3,834,433 UART: [idev] CDI.KEYID = 6
3,835,445 UART: [idev] SUBJECT.KEYID = 7
3,836,543 UART: [idev] UDS.KEYID = 0
3,851,271 UART: [idev] Erasing UDS.KEYID = 0
6,305,999 UART: [idev] Sha1 KeyId Algorithm
6,330,148 UART: [idev] --
6,333,328 UART: [ldev] ++
6,333,887 UART: [ldev] CDI.KEYID = 6
6,334,793 UART: [ldev] SUBJECT.KEYID = 5
6,336,007 UART: [ldev] AUTHORITY.KEYID = 7
6,337,239 UART: [ldev] FE.KEYID = 1
6,348,754 UART: [ldev] Erasing FE.KEYID = 1
8,822,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,785 UART: [ldev] --
10,611,834 UART: [fwproc] Wait for Commands...
10,613,980 UART: [fwproc] Recv command 0x46574c44
10,616,010 UART: [fwproc] Recv'd Img size: 114360 bytes
12,900,533 UART: ROM Fatal Error: 0x000B0023
12,903,624 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
2,021,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,688,537 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,614 UART: [state] LifecycleState = Unprovisioned
85,269 UART: [state] DebugLocked = No
85,991 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
890,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,941 UART: [kat] ++
895,093 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,424 UART: [kat] HMAC-384Kdf
920,044 UART: [kat] LMS
1,168,356 UART: [kat] --
1,169,291 UART: [cold-reset] ++
1,169,621 UART: [fht] FHT @ 0x50003400
1,172,287 UART: [idev] ++
1,172,455 UART: [idev] CDI.KEYID = 6
1,172,816 UART: [idev] SUBJECT.KEYID = 7
1,173,241 UART: [idev] UDS.KEYID = 0
1,181,013 UART: [idev] Erasing UDS.KEYID = 0
1,198,439 UART: [idev] Sha1 KeyId Algorithm
1,207,181 UART: [idev] --
1,208,216 UART: [ldev] ++
1,208,384 UART: [ldev] CDI.KEYID = 6
1,208,748 UART: [ldev] SUBJECT.KEYID = 5
1,209,175 UART: [ldev] AUTHORITY.KEYID = 7
1,209,638 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,240,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,550 UART: [ldev] --
1,279,954 UART: [fwproc] Wait for Commands...
1,280,563 UART: [fwproc] Recv command 0x46574c44
1,281,296 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,664 UART: ROM Fatal Error: 0x000B0023
1,548,821 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,802 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
915,689 UART: [kat] HMAC-384Kdf
920,165 UART: [kat] LMS
1,168,477 UART: [kat] --
1,169,620 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,608 UART: [idev] ++
1,172,776 UART: [idev] CDI.KEYID = 6
1,173,137 UART: [idev] SUBJECT.KEYID = 7
1,173,562 UART: [idev] UDS.KEYID = 0
1,181,492 UART: [idev] Erasing UDS.KEYID = 0
1,198,066 UART: [idev] Sha1 KeyId Algorithm
1,206,992 UART: [idev] --
1,207,961 UART: [ldev] ++
1,208,129 UART: [ldev] CDI.KEYID = 6
1,208,493 UART: [ldev] SUBJECT.KEYID = 5
1,208,920 UART: [ldev] AUTHORITY.KEYID = 7
1,209,383 UART: [ldev] FE.KEYID = 1
1,214,461 UART: [ldev] Erasing FE.KEYID = 1
1,240,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,443 UART: [ldev] --
1,279,767 UART: [fwproc] Wait for Commands...
1,280,468 UART: [fwproc] Recv command 0x46574c44
1,281,201 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,311 UART: ROM Fatal Error: 0x000B0023
1,548,468 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,185 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,495 UART: [kat] SHA2-256
901,435 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,382 UART: [kat] HMAC-384Kdf
919,842 UART: [kat] LMS
1,168,154 UART: [kat] --
1,168,909 UART: [cold-reset] ++
1,169,283 UART: [fht] FHT @ 0x50003400
1,171,711 UART: [idev] ++
1,171,879 UART: [idev] CDI.KEYID = 6
1,172,240 UART: [idev] SUBJECT.KEYID = 7
1,172,665 UART: [idev] UDS.KEYID = 0
1,180,539 UART: [idev] Erasing UDS.KEYID = 0
1,197,447 UART: [idev] Sha1 KeyId Algorithm
1,206,425 UART: [idev] --
1,207,390 UART: [ldev] ++
1,207,558 UART: [ldev] CDI.KEYID = 6
1,207,922 UART: [ldev] SUBJECT.KEYID = 5
1,208,349 UART: [ldev] AUTHORITY.KEYID = 7
1,208,812 UART: [ldev] FE.KEYID = 1
1,214,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,530 UART: [ldev] --
1,279,938 UART: [fwproc] Wait for Commands...
1,280,593 UART: [fwproc] Recv command 0x46574c44
1,281,326 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,554 UART: ROM Fatal Error: 0x000B0023
1,548,711 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,400,892 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,908 UART: [kat] ++
896,060 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,182,368 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,721 UART: [ldev] --
1,281,039 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,511 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,033 UART: ROM Fatal Error: 0x000B0023
1,550,190 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,931 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
891,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,913 UART: [kat] ++
896,065 UART: [kat] sha1
900,367 UART: [kat] SHA2-256
902,307 UART: [kat] SHA2-384
905,050 UART: [kat] SHA2-512-ACC
906,951 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,252 UART: [ldev] ++
1,209,420 UART: [ldev] CDI.KEYID = 6
1,209,784 UART: [ldev] SUBJECT.KEYID = 5
1,210,211 UART: [ldev] AUTHORITY.KEYID = 7
1,210,674 UART: [ldev] FE.KEYID = 1
1,215,644 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,762 UART: [fwproc] Wait for Commands...
1,281,535 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,844 UART: ROM Fatal Error: 0x000B0023
1,550,001 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,218 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,694 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,231 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,783 UART: [ldev] --
1,281,063 UART: [fwproc] Wait for Commands...
1,281,706 UART: [fwproc] Recv command 0x46574c44
1,282,439 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,843 UART: ROM Fatal Error: 0x000B0023
1,549,000 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,310 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,032,246 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,176,903 UART:
2,177,308 UART: Running Caliptra ROM ...
2,178,474 UART:
2,178,646 UART: [state] CFI Enabled
2,179,623 UART: [state] LifecycleState = Unprovisioned
2,181,268 UART: [state] DebugLocked = No
2,182,376 UART: [state] WD Timer not started. Device not locked for debugging
2,184,854 UART: [kat] SHA2-256
2,185,521 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,188,534 UART: [kat] ++
2,188,985 UART: [kat] sha1
2,189,498 UART: [kat] SHA2-256
2,190,235 UART: [kat] SHA2-384
2,190,901 UART: [kat] SHA2-512-ACC
2,191,765 UART: [kat] ECC-384
3,776,591 UART: [kat] HMAC-384Kdf
3,803,854 UART: [kat] LMS
4,876,972 UART: [kat] --
4,881,313 UART: [cold-reset] ++
4,883,594 UART: [fht] FHT @ 0x50003400
4,895,767 UART: [idev] ++
4,896,486 UART: [idev] CDI.KEYID = 6
4,897,679 UART: [idev] SUBJECT.KEYID = 7
4,898,781 UART: [idev] UDS.KEYID = 0
4,931,335 UART: [idev] Erasing UDS.KEYID = 0
8,244,529 UART: [idev] Sha1 KeyId Algorithm
8,266,940 UART: [idev] --
8,270,417 UART: [ldev] ++
8,270,999 UART: [ldev] CDI.KEYID = 6
8,272,243 UART: [ldev] SUBJECT.KEYID = 5
8,273,321 UART: [ldev] AUTHORITY.KEYID = 7
8,274,611 UART: [ldev] FE.KEYID = 1
8,318,852 UART: [ldev] Erasing FE.KEYID = 1
11,656,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,772 UART: [ldev] --
14,040,197 UART: [fwproc] Wait for Commands...
14,043,164 UART: [fwproc] Recv command 0x46574c44
14,045,491 UART: [fwproc] Recv'd Img size: 114036 bytes
16,990,775 UART: ROM Fatal Error: 0x000B0021
16,994,174 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,020,778 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,751,835 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,021,708 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,510 UART:
2,165,910 UART: Running Caliptra ROM ...
2,167,071 UART:
2,167,243 UART: [state] CFI Enabled
2,168,214 UART: [state] LifecycleState = Unprovisioned
2,169,853 UART: [state] DebugLocked = No
2,170,954 UART: [state] WD Timer not started. Device not locked for debugging
2,173,661 UART: [kat] SHA2-256
2,174,335 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,345 UART: [kat] ++
2,177,790 UART: [kat] sha1
2,178,321 UART: [kat] SHA2-256
2,179,059 UART: [kat] SHA2-384
2,179,726 UART: [kat] SHA2-512-ACC
2,180,594 UART: [kat] ECC-384
4,099,599 UART: [kat] HMAC-384Kdf
4,112,764 UART: [kat] LMS
5,185,879 UART: [kat] --
5,191,133 UART: [cold-reset] ++
5,193,016 UART: [fht] FHT @ 0x50003400
5,205,123 UART: [idev] ++
5,205,858 UART: [idev] CDI.KEYID = 6
5,207,036 UART: [idev] SUBJECT.KEYID = 7
5,208,469 UART: [idev] UDS.KEYID = 0
5,223,484 UART: [idev] Erasing UDS.KEYID = 0
8,496,196 UART: [idev] Sha1 KeyId Algorithm
8,519,526 UART: [idev] --
8,522,630 UART: [ldev] ++
8,523,198 UART: [ldev] CDI.KEYID = 6
8,524,434 UART: [ldev] SUBJECT.KEYID = 5
8,525,868 UART: [ldev] AUTHORITY.KEYID = 7
8,527,429 UART: [ldev] FE.KEYID = 1
8,539,641 UART: [ldev] Erasing FE.KEYID = 1
11,831,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,868 UART: [ldev] --
14,195,895 UART: [fwproc] Wait for Commands...
14,198,045 UART: [fwproc] Recv command 0x46574c44
14,200,309 UART: [fwproc] Recv'd Img size: 114036 bytes
17,149,192 UART: ROM Fatal Error: 0x000B0021
17,152,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,028,182 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,965,146 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,022,838 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,698 UART:
2,168,110 UART: Running Caliptra ROM ...
2,169,303 UART:
2,169,479 UART: [state] CFI Enabled
2,170,444 UART: [state] LifecycleState = Unprovisioned
2,172,094 UART: [state] DebugLocked = No
2,173,207 UART: [state] WD Timer not started. Device not locked for debugging
2,175,686 UART: [kat] SHA2-256
2,176,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,372 UART: [kat] ++
2,179,824 UART: [kat] sha1
2,180,334 UART: [kat] SHA2-256
2,181,078 UART: [kat] SHA2-384
2,181,748 UART: [kat] SHA2-512-ACC
2,182,598 UART: [kat] ECC-384
2,949,397 UART: [kat] HMAC-384Kdf
2,974,063 UART: [kat] LMS
3,503,526 UART: [kat] --
3,507,866 UART: [cold-reset] ++
3,510,283 UART: [fht] FHT @ 0x50003400
3,520,786 UART: [idev] ++
3,521,353 UART: [idev] CDI.KEYID = 6
3,522,369 UART: [idev] SUBJECT.KEYID = 7
3,523,475 UART: [idev] UDS.KEYID = 0
3,545,347 UART: [idev] Erasing UDS.KEYID = 0
6,026,804 UART: [idev] Sha1 KeyId Algorithm
6,049,506 UART: [idev] --
6,053,321 UART: [ldev] ++
6,053,902 UART: [ldev] CDI.KEYID = 6
6,054,813 UART: [ldev] SUBJECT.KEYID = 5
6,055,980 UART: [ldev] AUTHORITY.KEYID = 7
6,057,218 UART: [ldev] FE.KEYID = 1
6,102,323 UART: [ldev] Erasing FE.KEYID = 1
8,601,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,043 UART: [ldev] --
10,392,918 UART: [fwproc] Wait for Commands...
10,394,640 UART: [fwproc] Recv command 0x46574c44
10,396,740 UART: [fwproc] Recv'd Img size: 114360 bytes
12,695,068 UART: ROM Fatal Error: 0x000B0021
12,698,208 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,022,723 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,266 UART:
2,167,675 UART: Running Caliptra ROM ...
2,168,849 UART:
2,169,020 UART: [state] CFI Enabled
2,170,005 UART: [state] LifecycleState = Unprovisioned
2,171,659 UART: [state] DebugLocked = No
2,172,770 UART: [state] WD Timer not started. Device not locked for debugging
2,175,248 UART: [kat] SHA2-256
2,175,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,920 UART: [kat] ++
2,179,368 UART: [kat] sha1
2,179,882 UART: [kat] SHA2-256
2,180,623 UART: [kat] SHA2-384
2,181,287 UART: [kat] SHA2-512-ACC
2,182,126 UART: [kat] ECC-384
2,948,092 UART: [kat] HMAC-384Kdf
2,970,602 UART: [kat] LMS
3,500,038 UART: [kat] --
3,505,437 UART: [cold-reset] ++
3,506,446 UART: [fht] FHT @ 0x50003400
3,518,068 UART: [idev] ++
3,518,674 UART: [idev] CDI.KEYID = 6
3,519,559 UART: [idev] SUBJECT.KEYID = 7
3,520,779 UART: [idev] UDS.KEYID = 0
3,542,158 UART: [idev] Erasing UDS.KEYID = 0
6,027,827 UART: [idev] Sha1 KeyId Algorithm
6,052,110 UART: [idev] --
6,054,974 UART: [ldev] ++
6,055,547 UART: [ldev] CDI.KEYID = 6
6,056,433 UART: [ldev] SUBJECT.KEYID = 5
6,057,567 UART: [ldev] AUTHORITY.KEYID = 7
6,058,907 UART: [ldev] FE.KEYID = 1
6,101,539 UART: [ldev] Erasing FE.KEYID = 1
8,603,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,795 UART: [ldev] --
10,416,071 UART: [fwproc] Wait for Commands...
10,418,394 UART: [fwproc] Recv command 0x46574c44
10,420,499 UART: [fwproc] Recv'd Img size: 114360 bytes
12,704,122 UART: ROM Fatal Error: 0x000B0021
12,707,267 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,021,726 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,489,028 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,021,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,029 UART:
2,166,428 UART: Running Caliptra ROM ...
2,167,596 UART:
2,167,775 UART: [state] CFI Enabled
2,168,742 UART: [state] LifecycleState = Unprovisioned
2,170,385 UART: [state] DebugLocked = No
2,171,491 UART: [state] WD Timer not started. Device not locked for debugging
2,173,967 UART: [kat] SHA2-256
2,174,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,642 UART: [kat] ++
2,178,094 UART: [kat] sha1
2,178,608 UART: [kat] SHA2-256
2,179,349 UART: [kat] SHA2-384
2,180,014 UART: [kat] SHA2-512-ACC
2,180,852 UART: [kat] ECC-384
3,280,606 UART: [kat] HMAC-384Kdf
3,293,901 UART: [kat] LMS
3,823,383 UART: [kat] --
3,829,952 UART: [cold-reset] ++
3,830,923 UART: [fht] FHT @ 0x50003400
3,842,648 UART: [idev] ++
3,843,258 UART: [idev] CDI.KEYID = 6
3,844,176 UART: [idev] SUBJECT.KEYID = 7
3,845,338 UART: [idev] UDS.KEYID = 0
3,862,824 UART: [idev] Erasing UDS.KEYID = 0
6,319,046 UART: [idev] Sha1 KeyId Algorithm
6,342,024 UART: [idev] --
6,344,560 UART: [ldev] ++
6,345,126 UART: [ldev] CDI.KEYID = 6
6,346,040 UART: [ldev] SUBJECT.KEYID = 5
6,347,206 UART: [ldev] AUTHORITY.KEYID = 7
6,348,514 UART: [ldev] FE.KEYID = 1
6,360,132 UART: [ldev] Erasing FE.KEYID = 1
8,836,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,465 UART: [ldev] --
10,628,723 UART: [fwproc] Wait for Commands...
10,631,569 UART: [fwproc] Recv command 0x46574c44
10,633,664 UART: [fwproc] Recv'd Img size: 114360 bytes
12,924,709 UART: ROM Fatal Error: 0x000B0021
12,927,843 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,023,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,696,297 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,963 UART: [idev] Sha1 KeyId Algorithm
1,208,917 UART: [idev] --
1,209,780 UART: [ldev] ++
1,209,948 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,739 UART: [ldev] AUTHORITY.KEYID = 7
1,211,202 UART: [ldev] FE.KEYID = 1
1,216,500 UART: [ldev] Erasing FE.KEYID = 1
1,242,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,026 UART: [ldev] --
1,282,468 UART: [fwproc] Wait for Commands...
1,283,065 UART: [fwproc] Recv command 0x46574c44
1,283,798 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,499 UART: ROM Fatal Error: 0x000B0021
1,551,656 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,404,089 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,230 UART: [kat] SHA2-256
902,170 UART: [kat] SHA2-384
904,919 UART: [kat] SHA2-512-ACC
906,820 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,704 UART: [idev] ++
1,173,872 UART: [idev] CDI.KEYID = 6
1,174,233 UART: [idev] SUBJECT.KEYID = 7
1,174,658 UART: [idev] UDS.KEYID = 0
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,616 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,797 UART: [ldev] --
1,282,225 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,672 UART: ROM Fatal Error: 0x000B0021
1,550,829 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,052 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,317 UART: [idev] Sha1 KeyId Algorithm
1,207,181 UART: [idev] --
1,208,184 UART: [ldev] ++
1,208,352 UART: [ldev] CDI.KEYID = 6
1,208,716 UART: [ldev] SUBJECT.KEYID = 5
1,209,143 UART: [ldev] AUTHORITY.KEYID = 7
1,209,606 UART: [ldev] FE.KEYID = 1
1,214,602 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,652 UART: [ldev] --
1,279,932 UART: [fwproc] Wait for Commands...
1,280,511 UART: [fwproc] Recv command 0x46574c44
1,281,244 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,893 UART: ROM Fatal Error: 0x000B0021
1,549,050 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,685 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,277 UART: [kat] SHA2-512-ACC
906,178 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,798 UART: [idev] --
1,208,835 UART: [ldev] ++
1,209,003 UART: [ldev] CDI.KEYID = 6
1,209,367 UART: [ldev] SUBJECT.KEYID = 5
1,209,794 UART: [ldev] AUTHORITY.KEYID = 7
1,210,257 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,562 UART: ROM Fatal Error: 0x000B0021
1,550,719 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,408 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
905,196 UART: [kat] SHA2-512-ACC
907,097 UART: [kat] ECC-384
916,668 UART: [kat] HMAC-384Kdf
921,280 UART: [kat] LMS
1,169,592 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,653 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,182,437 UART: [idev] Erasing UDS.KEYID = 0
1,199,829 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,454 UART: [ldev] ++
1,209,622 UART: [ldev] CDI.KEYID = 6
1,209,986 UART: [ldev] SUBJECT.KEYID = 5
1,210,413 UART: [ldev] AUTHORITY.KEYID = 7
1,210,876 UART: [ldev] FE.KEYID = 1
1,216,092 UART: [ldev] Erasing FE.KEYID = 1
1,242,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,742 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,743 UART: ROM Fatal Error: 0x000B0021
1,550,900 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,400,865 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,226 UART: [kat] SHA2-256
902,166 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,200,048 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,603 UART: [ldev] --
1,282,949 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46574c44
1,284,365 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,886 UART: ROM Fatal Error: 0x000B0021
1,552,043 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,832 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,020,351 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,505 UART:
2,164,909 UART: Running Caliptra ROM ...
2,165,997 UART:
2,166,155 UART: [state] CFI Enabled
2,167,133 UART: [state] LifecycleState = Unprovisioned
2,168,718 UART: [state] DebugLocked = No
2,169,840 UART: [state] WD Timer not started. Device not locked for debugging
2,172,319 UART: [kat] SHA2-256
2,172,983 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,988 UART: [kat] ++
2,176,433 UART: [kat] sha1
2,176,940 UART: [kat] SHA2-256
2,177,598 UART: [kat] SHA2-384
2,178,253 UART: [kat] SHA2-512-ACC
2,179,090 UART: [kat] ECC-384
3,776,379 UART: [kat] HMAC-384Kdf
3,801,467 UART: [kat] LMS
4,874,652 UART: [kat] --
4,879,096 UART: [cold-reset] ++
4,880,662 UART: [fht] FHT @ 0x50003400
4,891,860 UART: [idev] ++
4,892,554 UART: [idev] CDI.KEYID = 6
4,893,788 UART: [idev] SUBJECT.KEYID = 7
4,894,888 UART: [idev] UDS.KEYID = 0
4,927,931 UART: [idev] Erasing UDS.KEYID = 0
8,240,629 UART: [idev] Sha1 KeyId Algorithm
8,262,951 UART: [idev] --
8,267,163 UART: [ldev] ++
8,267,730 UART: [ldev] CDI.KEYID = 6
8,268,893 UART: [ldev] SUBJECT.KEYID = 5
8,270,109 UART: [ldev] AUTHORITY.KEYID = 7
8,271,260 UART: [ldev] FE.KEYID = 1
8,316,881 UART: [ldev] Erasing FE.KEYID = 1
11,654,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,792 UART: [ldev] --
14,036,317 UART: [fwproc] Wait for Commands...
14,039,123 UART: [fwproc] Recv command 0x46574c44
14,041,449 UART: [fwproc] Recv'd Img size: 114036 bytes
16,990,035 UART: ROM Fatal Error: 0x000B0021
16,993,443 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,018,758 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,799,238 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
2,022,459 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,362 UART:
2,166,752 UART: Running Caliptra ROM ...
2,167,912 UART:
2,168,077 UART: [state] CFI Enabled
2,169,050 UART: [state] LifecycleState = Unprovisioned
2,170,690 UART: [state] DebugLocked = No
2,171,822 UART: [state] WD Timer not started. Device not locked for debugging
2,174,286 UART: [kat] SHA2-256
2,174,946 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,947 UART: [kat] ++
2,178,423 UART: [kat] sha1
2,178,929 UART: [kat] SHA2-256
2,179,658 UART: [kat] SHA2-384
2,180,320 UART: [kat] SHA2-512-ACC
2,181,192 UART: [kat] ECC-384
4,098,127 UART: [kat] HMAC-384Kdf
4,109,840 UART: [kat] LMS
5,182,953 UART: [kat] --
5,187,303 UART: [cold-reset] ++
5,188,545 UART: [fht] FHT @ 0x50003400
5,198,957 UART: [idev] ++
5,199,619 UART: [idev] CDI.KEYID = 6
5,200,793 UART: [idev] SUBJECT.KEYID = 7
5,202,271 UART: [idev] UDS.KEYID = 0
5,220,331 UART: [idev] Erasing UDS.KEYID = 0
8,493,621 UART: [idev] Sha1 KeyId Algorithm
8,516,359 UART: [idev] --
8,520,680 UART: [ldev] ++
8,521,252 UART: [ldev] CDI.KEYID = 6
8,522,438 UART: [ldev] SUBJECT.KEYID = 5
8,523,933 UART: [ldev] AUTHORITY.KEYID = 7
8,525,420 UART: [ldev] FE.KEYID = 1
8,535,965 UART: [ldev] Erasing FE.KEYID = 1
11,828,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,531 UART: [ldev] --
14,194,499 UART: [fwproc] Wait for Commands...
14,197,455 UART: [fwproc] Recv command 0x46574c44
14,199,771 UART: [fwproc] Recv'd Img size: 114036 bytes
17,152,683 UART: ROM Fatal Error: 0x000B0021
17,156,112 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
2,020,925 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,959,425 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,021,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,490 UART:
2,166,895 UART: Running Caliptra ROM ...
2,168,067 UART:
2,168,239 UART: [state] CFI Enabled
2,169,198 UART: [state] LifecycleState = Unprovisioned
2,170,840 UART: [state] DebugLocked = No
2,171,953 UART: [state] WD Timer not started. Device not locked for debugging
2,174,426 UART: [kat] SHA2-256
2,175,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,140 UART: [kat] ++
2,178,624 UART: [kat] sha1
2,179,139 UART: [kat] SHA2-256
2,179,879 UART: [kat] SHA2-384
2,180,566 UART: [kat] SHA2-512-ACC
2,181,391 UART: [kat] ECC-384
2,946,308 UART: [kat] HMAC-384Kdf
2,970,972 UART: [kat] LMS
3,500,427 UART: [kat] --
3,503,689 UART: [cold-reset] ++
3,506,027 UART: [fht] FHT @ 0x50003400
3,516,699 UART: [idev] ++
3,517,264 UART: [idev] CDI.KEYID = 6
3,518,224 UART: [idev] SUBJECT.KEYID = 7
3,519,382 UART: [idev] UDS.KEYID = 0
3,543,513 UART: [idev] Erasing UDS.KEYID = 0
6,026,067 UART: [idev] Sha1 KeyId Algorithm
6,049,062 UART: [idev] --
6,053,333 UART: [ldev] ++
6,053,965 UART: [ldev] CDI.KEYID = 6
6,054,860 UART: [ldev] SUBJECT.KEYID = 5
6,056,026 UART: [ldev] AUTHORITY.KEYID = 7
6,057,261 UART: [ldev] FE.KEYID = 1
6,099,531 UART: [ldev] Erasing FE.KEYID = 1
8,604,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,220 UART: [ldev] --
10,414,458 UART: [fwproc] Wait for Commands...
10,417,529 UART: [fwproc] Recv command 0x46574c44
10,419,570 UART: [fwproc] Recv'd Img size: 114360 bytes
12,708,510 UART: ROM Fatal Error: 0x000B0021
12,711,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
2,022,306 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,723 UART:
2,167,140 UART: Running Caliptra ROM ...
2,168,308 UART:
2,168,484 UART: [state] CFI Enabled
2,169,680 UART: [state] LifecycleState = Unprovisioned
2,171,344 UART: [state] DebugLocked = No
2,172,377 UART: [state] WD Timer not started. Device not locked for debugging
2,174,856 UART: [kat] SHA2-256
2,175,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,535 UART: [kat] ++
2,179,032 UART: [kat] sha1
2,179,553 UART: [kat] SHA2-256
2,180,208 UART: [kat] SHA2-384
2,180,862 UART: [kat] SHA2-512-ACC
2,181,702 UART: [kat] ECC-384
2,947,155 UART: [kat] HMAC-384Kdf
2,971,090 UART: [kat] LMS
3,500,520 UART: [kat] --
3,504,508 UART: [cold-reset] ++
3,505,467 UART: [fht] FHT @ 0x50003400
3,517,173 UART: [idev] ++
3,517,732 UART: [idev] CDI.KEYID = 6
3,518,666 UART: [idev] SUBJECT.KEYID = 7
3,519,880 UART: [idev] UDS.KEYID = 0
3,542,960 UART: [idev] Erasing UDS.KEYID = 0
6,026,407 UART: [idev] Sha1 KeyId Algorithm
6,048,999 UART: [idev] --
6,053,382 UART: [ldev] ++
6,053,957 UART: [ldev] CDI.KEYID = 6
6,054,873 UART: [ldev] SUBJECT.KEYID = 5
6,056,036 UART: [ldev] AUTHORITY.KEYID = 7
6,057,294 UART: [ldev] FE.KEYID = 1
6,098,963 UART: [ldev] Erasing FE.KEYID = 1
8,602,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,799 UART: [ldev] --
10,414,505 UART: [fwproc] Wait for Commands...
10,416,611 UART: [fwproc] Recv command 0x46574c44
10,418,718 UART: [fwproc] Recv'd Img size: 114360 bytes
12,708,400 UART: ROM Fatal Error: 0x000B0021
12,711,540 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,066 writing to cptra_bootfsm_go
2,023,037 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,515,325 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,023,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,544 UART:
2,168,949 UART: Running Caliptra ROM ...
2,170,115 UART:
2,170,297 UART: [state] CFI Enabled
2,171,262 UART: [state] LifecycleState = Unprovisioned
2,172,903 UART: [state] DebugLocked = No
2,174,006 UART: [state] WD Timer not started. Device not locked for debugging
2,176,508 UART: [kat] SHA2-256
2,177,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,188 UART: [kat] ++
2,180,634 UART: [kat] sha1
2,181,145 UART: [kat] SHA2-256
2,181,882 UART: [kat] SHA2-384
2,182,541 UART: [kat] SHA2-512-ACC
2,183,373 UART: [kat] ECC-384
3,276,888 UART: [kat] HMAC-384Kdf
3,289,184 UART: [kat] LMS
3,818,699 UART: [kat] --
3,822,688 UART: [cold-reset] ++
3,823,588 UART: [fht] FHT @ 0x50003400
3,834,827 UART: [idev] ++
3,835,385 UART: [idev] CDI.KEYID = 6
3,836,394 UART: [idev] SUBJECT.KEYID = 7
3,837,567 UART: [idev] UDS.KEYID = 0
3,854,515 UART: [idev] Erasing UDS.KEYID = 0
6,310,811 UART: [idev] Sha1 KeyId Algorithm
6,333,277 UART: [idev] --
6,336,878 UART: [ldev] ++
6,337,447 UART: [ldev] CDI.KEYID = 6
6,338,329 UART: [ldev] SUBJECT.KEYID = 5
6,339,546 UART: [ldev] AUTHORITY.KEYID = 7
6,340,727 UART: [ldev] FE.KEYID = 1
6,350,982 UART: [ldev] Erasing FE.KEYID = 1
8,823,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,130 UART: [ldev] --
10,614,052 UART: [fwproc] Wait for Commands...
10,616,867 UART: [fwproc] Recv command 0x46574c44
10,618,969 UART: [fwproc] Recv'd Img size: 114360 bytes
12,912,666 UART: ROM Fatal Error: 0x000B0021
12,915,802 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,027,433 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,689,824 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,352 UART: [kat] HMAC-384Kdf
919,764 UART: [kat] LMS
1,168,076 UART: [kat] --
1,168,961 UART: [cold-reset] ++
1,169,519 UART: [fht] FHT @ 0x50003400
1,172,155 UART: [idev] ++
1,172,323 UART: [idev] CDI.KEYID = 6
1,172,684 UART: [idev] SUBJECT.KEYID = 7
1,173,109 UART: [idev] UDS.KEYID = 0
1,181,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,249 UART: [idev] Sha1 KeyId Algorithm
1,207,053 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,241,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,123 UART: [fwproc] Recv command 0x46574c44
1,281,856 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,405 UART: ROM Fatal Error: 0x000B0021
1,549,562 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,687 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,501 UART: [kat] LMS
1,169,813 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,330 UART: [idev] ++
1,173,498 UART: [idev] CDI.KEYID = 6
1,173,859 UART: [idev] SUBJECT.KEYID = 7
1,174,284 UART: [idev] UDS.KEYID = 0
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,208,024 UART: [idev] --
1,209,257 UART: [ldev] ++
1,209,425 UART: [ldev] CDI.KEYID = 6
1,209,789 UART: [ldev] SUBJECT.KEYID = 5
1,210,216 UART: [ldev] AUTHORITY.KEYID = 7
1,210,679 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,316 UART: [fwproc] Recv command 0x46574c44
1,283,049 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,424 UART: ROM Fatal Error: 0x000B0021
1,550,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,726 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,239 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,429 UART: [idev] ++
1,172,597 UART: [idev] CDI.KEYID = 6
1,172,958 UART: [idev] SUBJECT.KEYID = 7
1,173,383 UART: [idev] UDS.KEYID = 0
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,167 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,214,848 UART: [ldev] Erasing FE.KEYID = 1
1,240,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,328 UART: [ldev] --
1,279,780 UART: [fwproc] Wait for Commands...
1,280,483 UART: [fwproc] Recv command 0x46574c44
1,281,216 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,279 UART: ROM Fatal Error: 0x000B0021
1,548,436 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,675 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,171,010 UART: [fht] FHT @ 0x50003400
1,173,804 UART: [idev] ++
1,173,972 UART: [idev] CDI.KEYID = 6
1,174,333 UART: [idev] SUBJECT.KEYID = 7
1,174,758 UART: [idev] UDS.KEYID = 0
1,182,718 UART: [idev] Erasing UDS.KEYID = 0
1,199,872 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,282,017 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,465 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,326 UART: ROM Fatal Error: 0x000B0021
1,551,483 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,418 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,875 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,558 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,551 UART: [fwproc] Recv command 0x46574c44
1,282,284 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,997 UART: ROM Fatal Error: 0x000B0021
1,550,154 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,247 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,988 UART: [idev] Sha1 KeyId Algorithm
1,208,988 UART: [idev] --
1,210,073 UART: [ldev] ++
1,210,241 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,032 UART: [ldev] AUTHORITY.KEYID = 7
1,211,495 UART: [ldev] FE.KEYID = 1
1,216,915 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,221 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,572 UART: ROM Fatal Error: 0x000B0021
1,551,729 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,886 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,021,830 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,982 UART:
2,166,382 UART: Running Caliptra ROM ...
2,167,560 UART:
2,167,733 UART: [state] CFI Enabled
2,168,705 UART: [state] LifecycleState = Unprovisioned
2,170,351 UART: [state] DebugLocked = No
2,171,460 UART: [state] WD Timer not started. Device not locked for debugging
2,173,932 UART: [kat] SHA2-256
2,174,599 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,606 UART: [kat] ++
2,178,055 UART: [kat] sha1
2,178,568 UART: [kat] SHA2-256
2,179,307 UART: [kat] SHA2-384
2,179,973 UART: [kat] SHA2-512-ACC
2,180,874 UART: [kat] ECC-384
3,777,071 UART: [kat] HMAC-384Kdf
3,802,105 UART: [kat] LMS
4,875,230 UART: [kat] --
4,877,900 UART: [cold-reset] ++
4,879,032 UART: [fht] FHT @ 0x50003400
4,891,528 UART: [idev] ++
4,892,209 UART: [idev] CDI.KEYID = 6
4,893,445 UART: [idev] SUBJECT.KEYID = 7
4,894,545 UART: [idev] UDS.KEYID = 0
4,928,633 UART: [idev] Erasing UDS.KEYID = 0
8,238,617 UART: [idev] Sha1 KeyId Algorithm
8,260,873 UART: [idev] --
8,263,359 UART: [ldev] ++
8,263,927 UART: [ldev] CDI.KEYID = 6
8,265,285 UART: [ldev] SUBJECT.KEYID = 5
8,266,336 UART: [ldev] AUTHORITY.KEYID = 7
8,267,526 UART: [ldev] FE.KEYID = 1
8,294,993 UART: [ldev] Erasing FE.KEYID = 1
11,632,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,317 UART: [ldev] --
14,014,936 UART: [fwproc] Wait for Commands...
14,017,519 UART: [fwproc] Recv command 0x46574c44
14,019,838 UART: [fwproc] Recv'd Img size: 114036 bytes
16,967,352 UART: ROM Fatal Error: 0x000B0022
16,970,811 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,020,772 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,767,698 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,022,272 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,757 UART:
2,167,170 UART: Running Caliptra ROM ...
2,168,335 UART:
2,168,497 UART: [state] CFI Enabled
2,169,474 UART: [state] LifecycleState = Unprovisioned
2,171,113 UART: [state] DebugLocked = No
2,172,214 UART: [state] WD Timer not started. Device not locked for debugging
2,174,682 UART: [kat] SHA2-256
2,175,367 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,373 UART: [kat] ++
2,178,818 UART: [kat] sha1
2,179,323 UART: [kat] SHA2-256
2,180,054 UART: [kat] SHA2-384
2,180,715 UART: [kat] SHA2-512-ACC
2,181,539 UART: [kat] ECC-384
4,094,337 UART: [kat] HMAC-384Kdf
4,105,543 UART: [kat] LMS
5,178,643 UART: [kat] --
5,182,177 UART: [cold-reset] ++
5,184,658 UART: [fht] FHT @ 0x50003400
5,196,122 UART: [idev] ++
5,196,855 UART: [idev] CDI.KEYID = 6
5,198,036 UART: [idev] SUBJECT.KEYID = 7
5,199,466 UART: [idev] UDS.KEYID = 0
5,217,135 UART: [idev] Erasing UDS.KEYID = 0
8,492,236 UART: [idev] Sha1 KeyId Algorithm
8,514,514 UART: [idev] --
8,519,023 UART: [ldev] ++
8,519,654 UART: [ldev] CDI.KEYID = 6
8,520,835 UART: [ldev] SUBJECT.KEYID = 5
8,522,273 UART: [ldev] AUTHORITY.KEYID = 7
8,523,835 UART: [ldev] FE.KEYID = 1
8,535,940 UART: [ldev] Erasing FE.KEYID = 1
11,827,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,641 UART: [ldev] --
14,191,766 UART: [fwproc] Wait for Commands...
14,194,460 UART: [fwproc] Recv command 0x46574c44
14,196,778 UART: [fwproc] Recv'd Img size: 114036 bytes
17,138,911 UART: ROM Fatal Error: 0x000B0022
17,142,338 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
2,020,975 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,962,356 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,022,560 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,462 UART:
2,167,875 UART: Running Caliptra ROM ...
2,169,045 UART:
2,169,215 UART: [state] CFI Enabled
2,170,180 UART: [state] LifecycleState = Unprovisioned
2,171,971 UART: [state] DebugLocked = No
2,173,026 UART: [state] WD Timer not started. Device not locked for debugging
2,175,514 UART: [kat] SHA2-256
2,176,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,193 UART: [kat] ++
2,179,640 UART: [kat] sha1
2,180,147 UART: [kat] SHA2-256
2,180,802 UART: [kat] SHA2-384
2,181,459 UART: [kat] SHA2-512-ACC
2,182,457 UART: [kat] ECC-384
2,947,641 UART: [kat] HMAC-384Kdf
2,970,552 UART: [kat] LMS
3,499,992 UART: [kat] --
3,502,140 UART: [cold-reset] ++
3,504,131 UART: [fht] FHT @ 0x50003400
3,514,840 UART: [idev] ++
3,515,433 UART: [idev] CDI.KEYID = 6
3,516,316 UART: [idev] SUBJECT.KEYID = 7
3,517,536 UART: [idev] UDS.KEYID = 0
3,542,329 UART: [idev] Erasing UDS.KEYID = 0
6,025,102 UART: [idev] Sha1 KeyId Algorithm
6,048,495 UART: [idev] --
6,052,280 UART: [ldev] ++
6,052,852 UART: [ldev] CDI.KEYID = 6
6,053,764 UART: [ldev] SUBJECT.KEYID = 5
6,054,930 UART: [ldev] AUTHORITY.KEYID = 7
6,056,165 UART: [ldev] FE.KEYID = 1
6,099,124 UART: [ldev] Erasing FE.KEYID = 1
8,604,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,365 UART: [ldev] --
10,408,879 UART: [fwproc] Wait for Commands...
10,410,396 UART: [fwproc] Recv command 0x46574c44
10,412,497 UART: [fwproc] Recv'd Img size: 114360 bytes
12,695,886 UART: ROM Fatal Error: 0x000B0022
12,698,995 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
2,025,709 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,170,082 UART:
2,170,481 UART: Running Caliptra ROM ...
2,171,561 UART:
2,171,722 UART: [state] CFI Enabled
2,172,692 UART: [state] LifecycleState = Unprovisioned
2,174,466 UART: [state] DebugLocked = No
2,175,602 UART: [state] WD Timer not started. Device not locked for debugging
2,178,004 UART: [kat] SHA2-256
2,178,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,736 UART: [kat] ++
2,182,189 UART: [kat] sha1
2,182,701 UART: [kat] SHA2-256
2,183,444 UART: [kat] SHA2-384
2,184,112 UART: [kat] SHA2-512-ACC
2,185,014 UART: [kat] ECC-384
2,946,983 UART: [kat] HMAC-384Kdf
2,972,704 UART: [kat] LMS
3,502,165 UART: [kat] --
3,506,051 UART: [cold-reset] ++
3,508,051 UART: [fht] FHT @ 0x50003400
3,518,340 UART: [idev] ++
3,518,905 UART: [idev] CDI.KEYID = 6
3,519,812 UART: [idev] SUBJECT.KEYID = 7
3,521,027 UART: [idev] UDS.KEYID = 0
3,544,089 UART: [idev] Erasing UDS.KEYID = 0
6,029,891 UART: [idev] Sha1 KeyId Algorithm
6,052,102 UART: [idev] --
6,056,321 UART: [ldev] ++
6,056,893 UART: [ldev] CDI.KEYID = 6
6,057,804 UART: [ldev] SUBJECT.KEYID = 5
6,058,985 UART: [ldev] AUTHORITY.KEYID = 7
6,060,225 UART: [ldev] FE.KEYID = 1
6,101,611 UART: [ldev] Erasing FE.KEYID = 1
8,604,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,655 UART: [ldev] --
10,413,847 UART: [fwproc] Wait for Commands...
10,415,989 UART: [fwproc] Recv command 0x46574c44
10,418,101 UART: [fwproc] Recv'd Img size: 114360 bytes
12,707,971 UART: ROM Fatal Error: 0x000B0022
12,711,059 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,029,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,473,297 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,999 writing to cptra_bootfsm_go
2,021,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,456 UART:
2,166,846 UART: Running Caliptra ROM ...
2,167,924 UART:
2,168,076 UART: [state] CFI Enabled
2,168,999 UART: [state] LifecycleState = Unprovisioned
2,170,646 UART: [state] DebugLocked = No
2,171,673 UART: [state] WD Timer not started. Device not locked for debugging
2,174,148 UART: [kat] SHA2-256
2,174,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,819 UART: [kat] ++
2,178,267 UART: [kat] sha1
2,178,776 UART: [kat] SHA2-256
2,179,431 UART: [kat] SHA2-384
2,180,086 UART: [kat] SHA2-512-ACC
2,180,887 UART: [kat] ECC-384
3,283,455 UART: [kat] HMAC-384Kdf
3,295,353 UART: [kat] LMS
3,824,842 UART: [kat] --
3,829,259 UART: [cold-reset] ++
3,831,079 UART: [fht] FHT @ 0x50003400
3,843,250 UART: [idev] ++
3,843,848 UART: [idev] CDI.KEYID = 6
3,844,763 UART: [idev] SUBJECT.KEYID = 7
3,845,923 UART: [idev] UDS.KEYID = 0
3,862,223 UART: [idev] Erasing UDS.KEYID = 0
6,317,100 UART: [idev] Sha1 KeyId Algorithm
6,340,095 UART: [idev] --
6,343,643 UART: [ldev] ++
6,344,216 UART: [ldev] CDI.KEYID = 6
6,345,101 UART: [ldev] SUBJECT.KEYID = 5
6,346,312 UART: [ldev] AUTHORITY.KEYID = 7
6,347,560 UART: [ldev] FE.KEYID = 1
6,360,610 UART: [ldev] Erasing FE.KEYID = 1
8,837,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,551 UART: [ldev] --
10,627,458 UART: [fwproc] Wait for Commands...
10,629,720 UART: [fwproc] Recv command 0x46574c44
10,631,814 UART: [fwproc] Recv'd Img size: 114360 bytes
12,920,475 UART: ROM Fatal Error: 0x000B0022
12,923,605 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,023,231 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,704,703 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,782 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,241,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,864 UART: [ldev] --
1,280,220 UART: [fwproc] Wait for Commands...
1,280,819 UART: [fwproc] Recv command 0x46574c44
1,281,552 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,184 UART: ROM Fatal Error: 0x000B0022
1,548,341 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,323 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,334 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,212 UART: [fwproc] Recv command 0x46574c44
1,282,945 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,470 UART: ROM Fatal Error: 0x000B0022
1,549,627 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,306 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,199,219 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,209,196 UART: [ldev] ++
1,209,364 UART: [ldev] CDI.KEYID = 6
1,209,728 UART: [ldev] SUBJECT.KEYID = 5
1,210,155 UART: [ldev] AUTHORITY.KEYID = 7
1,210,618 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,242,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,950 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,909 UART: ROM Fatal Error: 0x000B0022
1,549,066 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,187 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,623 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,406 UART: [cold-reset] ++
1,169,928 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,678 UART: [idev] Erasing UDS.KEYID = 0
1,199,062 UART: [idev] Sha1 KeyId Algorithm
1,207,760 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,549 UART: [ldev] Erasing FE.KEYID = 1
1,241,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,415 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,622 UART: [fwproc] Recv command 0x46574c44
1,282,355 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,224 UART: ROM Fatal Error: 0x000B0022
1,549,381 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,328 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,216 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,974 UART: [ldev] --
1,280,434 UART: [fwproc] Wait for Commands...
1,281,203 UART: [fwproc] Recv command 0x46574c44
1,281,936 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,407 UART: ROM Fatal Error: 0x000B0022
1,548,564 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,400,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,170,002 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,158 UART: [idev] ++
1,173,326 UART: [idev] CDI.KEYID = 6
1,173,687 UART: [idev] SUBJECT.KEYID = 7
1,174,112 UART: [idev] UDS.KEYID = 0
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,346 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,743 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x46574c44
1,283,065 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,048 UART: ROM Fatal Error: 0x000B0022
1,550,205 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,486 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,039,413 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,183,906 UART:
2,184,314 UART: Running Caliptra ROM ...
2,185,487 UART:
2,185,662 UART: [state] CFI Enabled
2,186,635 UART: [state] LifecycleState = Unprovisioned
2,188,281 UART: [state] DebugLocked = No
2,189,390 UART: [state] WD Timer not started. Device not locked for debugging
2,191,856 UART: [kat] SHA2-256
2,192,541 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,195,547 UART: [kat] ++
2,196,003 UART: [kat] sha1
2,196,524 UART: [kat] SHA2-256
2,197,263 UART: [kat] SHA2-384
2,197,928 UART: [kat] SHA2-512-ACC
2,198,730 UART: [kat] ECC-384
3,775,509 UART: [kat] HMAC-384Kdf
3,805,026 UART: [kat] LMS
4,878,195 UART: [kat] --
4,884,235 UART: [cold-reset] ++
4,885,682 UART: [fht] FHT @ 0x50003400
4,897,304 UART: [idev] ++
4,897,980 UART: [idev] CDI.KEYID = 6
4,899,216 UART: [idev] SUBJECT.KEYID = 7
4,900,374 UART: [idev] UDS.KEYID = 0
4,933,017 UART: [idev] Erasing UDS.KEYID = 0
8,246,019 UART: [idev] Sha1 KeyId Algorithm
8,267,730 UART: [idev] --
8,271,214 UART: [ldev] ++
8,271,792 UART: [ldev] CDI.KEYID = 6
8,273,036 UART: [ldev] SUBJECT.KEYID = 5
8,274,292 UART: [ldev] AUTHORITY.KEYID = 7
8,275,397 UART: [ldev] FE.KEYID = 1
8,320,255 UART: [ldev] Erasing FE.KEYID = 1
11,652,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,074 UART: [ldev] --
14,019,566 UART: [fwproc] Wait for Commands...
14,021,415 UART: [fwproc] Recv command 0x46574c44
14,023,896 UART: [fwproc] Recv'd Img size: 114036 bytes
16,969,723 UART: ROM Fatal Error: 0x000B0021
16,973,138 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,028,742 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,791,897 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,030,910 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,174,977 UART:
2,175,382 UART: Running Caliptra ROM ...
2,176,456 UART:
2,176,602 UART: [state] CFI Enabled
2,177,577 UART: [state] LifecycleState = Unprovisioned
2,179,221 UART: [state] DebugLocked = No
2,180,326 UART: [state] WD Timer not started. Device not locked for debugging
2,182,790 UART: [kat] SHA2-256
2,183,449 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,186,453 UART: [kat] ++
2,186,902 UART: [kat] sha1
2,187,406 UART: [kat] SHA2-256
2,188,142 UART: [kat] SHA2-384
2,188,823 UART: [kat] SHA2-512-ACC
2,189,701 UART: [kat] ECC-384
4,097,850 UART: [kat] HMAC-384Kdf
4,109,187 UART: [kat] LMS
5,182,336 UART: [kat] --
5,186,986 UART: [cold-reset] ++
5,188,814 UART: [fht] FHT @ 0x50003400
5,199,630 UART: [idev] ++
5,200,352 UART: [idev] CDI.KEYID = 6
5,201,528 UART: [idev] SUBJECT.KEYID = 7
5,203,008 UART: [idev] UDS.KEYID = 0
5,217,697 UART: [idev] Erasing UDS.KEYID = 0
8,488,649 UART: [idev] Sha1 KeyId Algorithm
8,511,290 UART: [idev] --
8,516,634 UART: [ldev] ++
8,517,196 UART: [ldev] CDI.KEYID = 6
8,518,381 UART: [ldev] SUBJECT.KEYID = 5
8,519,865 UART: [ldev] AUTHORITY.KEYID = 7
8,521,348 UART: [ldev] FE.KEYID = 1
8,534,481 UART: [ldev] Erasing FE.KEYID = 1
11,827,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,260 UART: [ldev] --
14,194,411 UART: [fwproc] Wait for Commands...
14,196,017 UART: [fwproc] Recv command 0x46574c44
14,198,339 UART: [fwproc] Recv'd Img size: 114036 bytes
17,138,758 UART: ROM Fatal Error: 0x000B0021
17,142,183 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,031,543 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,962,034 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
2,032,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,177,506 UART:
2,177,930 UART: Running Caliptra ROM ...
2,179,102 UART:
2,179,270 UART: [state] CFI Enabled
2,180,236 UART: [state] LifecycleState = Unprovisioned
2,181,879 UART: [state] DebugLocked = No
2,182,989 UART: [state] WD Timer not started. Device not locked for debugging
2,185,470 UART: [kat] SHA2-256
2,186,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,153 UART: [kat] ++
2,189,602 UART: [kat] sha1
2,190,199 UART: [kat] SHA2-256
2,190,864 UART: [kat] SHA2-384
2,191,521 UART: [kat] SHA2-512-ACC
2,192,380 UART: [kat] ECC-384
2,949,197 UART: [kat] HMAC-384Kdf
2,973,914 UART: [kat] LMS
3,503,345 UART: [kat] --
3,507,498 UART: [cold-reset] ++
3,509,489 UART: [fht] FHT @ 0x50003400
3,521,980 UART: [idev] ++
3,522,800 UART: [idev] CDI.KEYID = 6
3,523,695 UART: [idev] SUBJECT.KEYID = 7
3,524,747 UART: [idev] UDS.KEYID = 0
3,546,184 UART: [idev] Erasing UDS.KEYID = 0
6,028,715 UART: [idev] Sha1 KeyId Algorithm
6,050,789 UART: [idev] --
6,055,977 UART: [ldev] ++
6,056,552 UART: [ldev] CDI.KEYID = 6
6,057,470 UART: [ldev] SUBJECT.KEYID = 5
6,058,653 UART: [ldev] AUTHORITY.KEYID = 7
6,059,894 UART: [ldev] FE.KEYID = 1
6,102,040 UART: [ldev] Erasing FE.KEYID = 1
8,604,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,850 UART: [ldev] --
10,417,077 UART: [fwproc] Wait for Commands...
10,419,453 UART: [fwproc] Recv command 0x46574c44
10,421,550 UART: [fwproc] Recv'd Img size: 114360 bytes
12,709,823 UART: ROM Fatal Error: 0x000B0021
12,712,960 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,026,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,170,590 UART:
2,170,990 UART: Running Caliptra ROM ...
2,172,157 UART:
2,172,324 UART: [state] CFI Enabled
2,173,287 UART: [state] LifecycleState = Unprovisioned
2,175,246 UART: [state] DebugLocked = No
2,176,317 UART: [state] WD Timer not started. Device not locked for debugging
2,178,808 UART: [kat] SHA2-256
2,179,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,491 UART: [kat] ++
2,182,943 UART: [kat] sha1
2,183,457 UART: [kat] SHA2-256
2,184,195 UART: [kat] SHA2-384
2,184,857 UART: [kat] SHA2-512-ACC
2,185,720 UART: [kat] ECC-384
2,948,132 UART: [kat] HMAC-384Kdf
2,971,257 UART: [kat] LMS
3,500,712 UART: [kat] --
3,503,484 UART: [cold-reset] ++
3,504,340 UART: [fht] FHT @ 0x50003400
3,516,081 UART: [idev] ++
3,516,648 UART: [idev] CDI.KEYID = 6
3,517,554 UART: [idev] SUBJECT.KEYID = 7
3,518,770 UART: [idev] UDS.KEYID = 0
3,542,364 UART: [idev] Erasing UDS.KEYID = 0
6,027,896 UART: [idev] Sha1 KeyId Algorithm
6,050,800 UART: [idev] --
6,054,896 UART: [ldev] ++
6,055,465 UART: [ldev] CDI.KEYID = 6
6,056,371 UART: [ldev] SUBJECT.KEYID = 5
6,057,609 UART: [ldev] AUTHORITY.KEYID = 7
6,058,846 UART: [ldev] FE.KEYID = 1
6,098,230 UART: [ldev] Erasing FE.KEYID = 1
8,599,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,966 UART: [ldev] --
10,413,132 UART: [fwproc] Wait for Commands...
10,415,243 UART: [fwproc] Recv command 0x46574c44
10,417,355 UART: [fwproc] Recv'd Img size: 114360 bytes
12,702,496 UART: ROM Fatal Error: 0x000B0021
12,705,627 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,025,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,495,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,025,235 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,749 UART:
2,170,146 UART: Running Caliptra ROM ...
2,171,311 UART:
2,171,490 UART: [state] CFI Enabled
2,172,460 UART: [state] LifecycleState = Unprovisioned
2,174,100 UART: [state] DebugLocked = No
2,175,205 UART: [state] WD Timer not started. Device not locked for debugging
2,177,673 UART: [kat] SHA2-256
2,178,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,346 UART: [kat] ++
2,181,794 UART: [kat] sha1
2,182,308 UART: [kat] SHA2-256
2,183,045 UART: [kat] SHA2-384
2,183,713 UART: [kat] SHA2-512-ACC
2,184,570 UART: [kat] ECC-384
3,282,201 UART: [kat] HMAC-384Kdf
3,295,406 UART: [kat] LMS
3,824,906 UART: [kat] --
3,829,435 UART: [cold-reset] ++
3,831,896 UART: [fht] FHT @ 0x50003400
3,843,627 UART: [idev] ++
3,844,194 UART: [idev] CDI.KEYID = 6
3,845,124 UART: [idev] SUBJECT.KEYID = 7
3,846,331 UART: [idev] UDS.KEYID = 0
3,859,118 UART: [idev] Erasing UDS.KEYID = 0
6,317,250 UART: [idev] Sha1 KeyId Algorithm
6,339,407 UART: [idev] --
6,343,019 UART: [ldev] ++
6,343,587 UART: [ldev] CDI.KEYID = 6
6,344,494 UART: [ldev] SUBJECT.KEYID = 5
6,345,725 UART: [ldev] AUTHORITY.KEYID = 7
6,346,955 UART: [ldev] FE.KEYID = 1
6,356,880 UART: [ldev] Erasing FE.KEYID = 1
8,828,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,136 UART: [ldev] --
10,619,287 UART: [fwproc] Wait for Commands...
10,621,871 UART: [fwproc] Recv command 0x46574c44
10,623,968 UART: [fwproc] Recv'd Img size: 114360 bytes
12,914,338 UART: ROM Fatal Error: 0x000B0021
12,917,417 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
2,026,582 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,695,804 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,519 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,859 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,292 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,389 UART: [fwproc] Recv command 0x46574c44
1,282,122 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,831 UART: ROM Fatal Error: 0x000B0021
1,548,988 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,215 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,508 UART: [idev] ++
1,173,676 UART: [idev] CDI.KEYID = 6
1,174,037 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,014 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,351 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,060 UART: ROM Fatal Error: 0x000B0021
1,551,217 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,572 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,480 UART: [kat] SHA2-512-ACC
906,381 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,197,899 UART: [idev] Sha1 KeyId Algorithm
1,206,713 UART: [idev] --
1,207,856 UART: [ldev] ++
1,208,024 UART: [ldev] CDI.KEYID = 6
1,208,388 UART: [ldev] SUBJECT.KEYID = 5
1,208,815 UART: [ldev] AUTHORITY.KEYID = 7
1,209,278 UART: [ldev] FE.KEYID = 1
1,214,510 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,264 UART: [ldev] --
1,280,658 UART: [fwproc] Wait for Commands...
1,281,299 UART: [fwproc] Recv command 0x46574c44
1,282,032 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,907 UART: ROM Fatal Error: 0x000B0021
1,549,064 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,893 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,963 UART: [state] LifecycleState = Unprovisioned
86,618 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,016 UART: [kat] ++
896,168 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,828 UART: [cold-reset] ++
1,171,338 UART: [fht] FHT @ 0x50003400
1,174,162 UART: [idev] ++
1,174,330 UART: [idev] CDI.KEYID = 6
1,174,691 UART: [idev] SUBJECT.KEYID = 7
1,175,116 UART: [idev] UDS.KEYID = 0
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,426 UART: [idev] Sha1 KeyId Algorithm
1,209,274 UART: [idev] --
1,210,295 UART: [ldev] ++
1,210,463 UART: [ldev] CDI.KEYID = 6
1,210,827 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,211 UART: [fwproc] Wait for Commands...
1,282,986 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,204 UART: ROM Fatal Error: 0x000B0021
1,551,361 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,562 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,342 UART: [kat] LMS
1,169,654 UART: [kat] --
1,170,539 UART: [cold-reset] ++
1,170,993 UART: [fht] FHT @ 0x50003400
1,173,625 UART: [idev] ++
1,173,793 UART: [idev] CDI.KEYID = 6
1,174,154 UART: [idev] SUBJECT.KEYID = 7
1,174,579 UART: [idev] UDS.KEYID = 0
1,182,793 UART: [idev] Erasing UDS.KEYID = 0
1,199,991 UART: [idev] Sha1 KeyId Algorithm
1,208,893 UART: [idev] --
1,209,998 UART: [ldev] ++
1,210,166 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,957 UART: [ldev] AUTHORITY.KEYID = 7
1,211,420 UART: [ldev] FE.KEYID = 1
1,216,578 UART: [ldev] Erasing FE.KEYID = 1
1,242,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,670 UART: [ldev] --
1,282,004 UART: [fwproc] Wait for Commands...
1,282,703 UART: [fwproc] Recv command 0x46574c44
1,283,436 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,545 UART: ROM Fatal Error: 0x000B0021
1,550,702 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,129 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,856 UART: [cold-reset] ++
1,171,250 UART: [fht] FHT @ 0x50003400
1,174,120 UART: [idev] ++
1,174,288 UART: [idev] CDI.KEYID = 6
1,174,649 UART: [idev] SUBJECT.KEYID = 7
1,175,074 UART: [idev] UDS.KEYID = 0
1,183,190 UART: [idev] Erasing UDS.KEYID = 0
1,200,066 UART: [idev] Sha1 KeyId Algorithm
1,209,024 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,469 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,814 UART: ROM Fatal Error: 0x000B0021
1,550,971 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,404,222 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,022,239 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,167,981 UART:
2,168,413 UART: Running Caliptra ROM ...
2,169,585 UART:
2,169,753 UART: [state] CFI Enabled
2,170,723 UART: [state] LifecycleState = Unprovisioned
2,172,359 UART: [state] DebugLocked = No
2,173,465 UART: [state] WD Timer not started. Device not locked for debugging
2,175,934 UART: [kat] SHA2-256
2,176,601 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,855 UART: [kat] ++
2,180,319 UART: [kat] sha1
2,180,835 UART: [kat] SHA2-256
2,181,490 UART: [kat] SHA2-384
2,182,143 UART: [kat] SHA2-512-ACC
2,182,970 UART: [kat] ECC-384
3,774,801 UART: [kat] HMAC-384Kdf
3,802,264 UART: [kat] LMS
4,875,387 UART: [kat] --
4,879,836 UART: [cold-reset] ++
4,880,910 UART: [fht] FHT @ 0x50003400
4,891,786 UART: [idev] ++
4,892,467 UART: [idev] CDI.KEYID = 6
4,893,701 UART: [idev] SUBJECT.KEYID = 7
4,894,804 UART: [idev] UDS.KEYID = 0
4,908,480 UART: [idev] Erasing UDS.KEYID = 0
8,223,607 UART: [idev] Sha1 KeyId Algorithm
8,245,756 UART: [idev] --
8,250,820 UART: [ldev] ++
8,251,397 UART: [ldev] CDI.KEYID = 6
8,252,578 UART: [ldev] SUBJECT.KEYID = 5
8,253,735 UART: [ldev] AUTHORITY.KEYID = 7
8,254,982 UART: [ldev] FE.KEYID = 1
8,295,801 UART: [ldev] Erasing FE.KEYID = 1
11,631,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,929 UART: [ldev] --
14,018,307 UART: [fwproc] Wait for Commands...
14,020,878 UART: [fwproc] Recv command 0x46574c44
14,023,154 UART: [fwproc] Recv'd Img size: 114036 bytes
16,728,355 UART: ROM Fatal Error: 0x000B0034
16,731,802 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,018,378 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,162,153 UART:
2,162,537 UART: Running Caliptra ROM ...
2,163,709 UART:
2,163,882 UART: [state] CFI Enabled
2,164,841 UART: [state] LifecycleState = Unprovisioned
2,166,488 UART: [state] DebugLocked = No
2,167,557 UART: [state] WD Timer not started. Device not locked for debugging
2,170,041 UART: [kat] SHA2-256
2,170,715 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,173,725 UART: [kat] ++
2,174,173 UART: [kat] sha1
2,174,881 UART: [kat] SHA2-256
2,175,593 UART: [kat] SHA2-384
2,176,256 UART: [kat] SHA2-512-ACC
2,177,137 UART: [kat] ECC-384
3,778,611 UART: [kat] HMAC-384Kdf
3,802,627 UART: [kat] LMS
4,875,743 UART: [kat] --
4,882,242 UART: [cold-reset] ++
4,883,968 UART: [fht] FHT @ 0x50003400
4,896,566 UART: [idev] ++
4,897,241 UART: [idev] CDI.KEYID = 6
4,898,470 UART: [idev] SUBJECT.KEYID = 7
4,899,570 UART: [idev] UDS.KEYID = 0
4,931,592 UART: [idev] Erasing UDS.KEYID = 0
8,244,858 UART: [idev] Sha1 KeyId Algorithm
8,267,308 UART: [idev] --
8,270,420 UART: [ldev] ++
8,270,994 UART: [ldev] CDI.KEYID = 6
8,272,232 UART: [ldev] SUBJECT.KEYID = 5
8,273,385 UART: [ldev] AUTHORITY.KEYID = 7
8,274,562 UART: [ldev] FE.KEYID = 1
8,318,798 UART: [ldev] Erasing FE.KEYID = 1
11,653,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,381 UART: [ldev] --
14,039,966 UART: [fwproc] Wait for Commands...
14,042,122 UART: [fwproc] Recv command 0x46574c44
14,044,440 UART: [fwproc] Recv'd Img size: 114036 bytes
16,748,846 UART: ROM Fatal Error: 0x000B0034
16,752,262 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
2,019,601 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,530,039 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
2,019,209 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,533,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,022,198 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,137 UART:
2,166,534 UART: Running Caliptra ROM ...
2,167,698 UART:
2,167,867 UART: [state] CFI Enabled
2,168,833 UART: [state] LifecycleState = Unprovisioned
2,170,473 UART: [state] DebugLocked = No
2,171,576 UART: [state] WD Timer not started. Device not locked for debugging
2,174,034 UART: [kat] SHA2-256
2,174,694 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,699 UART: [kat] ++
2,178,145 UART: [kat] sha1
2,178,651 UART: [kat] SHA2-256
2,179,398 UART: [kat] SHA2-384
2,180,060 UART: [kat] SHA2-512-ACC
2,180,937 UART: [kat] ECC-384
4,100,138 UART: [kat] HMAC-384Kdf
4,112,807 UART: [kat] LMS
5,185,947 UART: [kat] --
5,190,332 UART: [cold-reset] ++
5,191,996 UART: [fht] FHT @ 0x50003400
5,204,389 UART: [idev] ++
5,205,104 UART: [idev] CDI.KEYID = 6
5,206,209 UART: [idev] SUBJECT.KEYID = 7
5,207,744 UART: [idev] UDS.KEYID = 0
5,226,714 UART: [idev] Erasing UDS.KEYID = 0
8,501,877 UART: [idev] Sha1 KeyId Algorithm
8,524,658 UART: [idev] --
8,528,171 UART: [ldev] ++
8,528,763 UART: [ldev] CDI.KEYID = 6
8,529,940 UART: [ldev] SUBJECT.KEYID = 5
8,531,430 UART: [ldev] AUTHORITY.KEYID = 7
8,532,987 UART: [ldev] FE.KEYID = 1
8,543,445 UART: [ldev] Erasing FE.KEYID = 1
11,837,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,132,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,148,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,164,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,180,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,202,605 UART: [ldev] --
14,207,646 UART: [fwproc] Wait for Commands...
14,210,448 UART: [fwproc] Recv command 0x46574c44
14,212,763 UART: [fwproc] Recv'd Img size: 114036 bytes
16,921,081 UART: ROM Fatal Error: 0x000B0034
16,924,488 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,019,728 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,163,443 UART:
2,163,833 UART: Running Caliptra ROM ...
2,164,907 UART:
2,165,054 UART: [state] CFI Enabled
2,166,018 UART: [state] LifecycleState = Unprovisioned
2,167,671 UART: [state] DebugLocked = No
2,168,689 UART: [state] WD Timer not started. Device not locked for debugging
2,171,155 UART: [kat] SHA2-256
2,171,837 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,848 UART: [kat] ++
2,175,294 UART: [kat] sha1
2,175,798 UART: [kat] SHA2-256
2,176,533 UART: [kat] SHA2-384
2,177,190 UART: [kat] SHA2-512-ACC
2,177,985 UART: [kat] ECC-384
4,099,019 UART: [kat] HMAC-384Kdf
4,111,244 UART: [kat] LMS
5,184,429 UART: [kat] --
5,188,750 UART: [cold-reset] ++
5,191,221 UART: [fht] FHT @ 0x50003400
5,202,745 UART: [idev] ++
5,203,412 UART: [idev] CDI.KEYID = 6
5,204,640 UART: [idev] SUBJECT.KEYID = 7
5,206,034 UART: [idev] UDS.KEYID = 0
5,224,089 UART: [idev] Erasing UDS.KEYID = 0
8,496,378 UART: [idev] Sha1 KeyId Algorithm
8,518,535 UART: [idev] --
8,522,853 UART: [ldev] ++
8,523,469 UART: [ldev] CDI.KEYID = 6
8,524,568 UART: [ldev] SUBJECT.KEYID = 5
8,526,097 UART: [ldev] AUTHORITY.KEYID = 7
8,527,631 UART: [ldev] FE.KEYID = 1
8,539,890 UART: [ldev] Erasing FE.KEYID = 1
11,834,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,080 UART: [ldev] --
14,199,106 UART: [fwproc] Wait for Commands...
14,202,243 UART: [fwproc] Recv command 0x46574c44
14,204,557 UART: [fwproc] Recv'd Img size: 114036 bytes
16,912,757 UART: ROM Fatal Error: 0x000B0034
16,916,217 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,021,129 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,734,237 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,030,366 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,728,948 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,024,278 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,682 UART:
2,169,083 UART: Running Caliptra ROM ...
2,170,256 UART:
2,170,427 UART: [state] CFI Enabled
2,171,389 UART: [state] LifecycleState = Unprovisioned
2,173,032 UART: [state] DebugLocked = No
2,174,147 UART: [state] WD Timer not started. Device not locked for debugging
2,176,621 UART: [kat] SHA2-256
2,177,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,324 UART: [kat] ++
2,180,777 UART: [kat] sha1
2,181,287 UART: [kat] SHA2-256
2,182,024 UART: [kat] SHA2-384
2,182,691 UART: [kat] SHA2-512-ACC
2,183,525 UART: [kat] ECC-384
2,928,013 UART: [kat] HMAC-384Kdf
2,951,422 UART: [kat] LMS
3,480,867 UART: [kat] --
3,486,847 UART: [cold-reset] ++
3,488,723 UART: [fht] FHT @ 0x50003400
3,500,618 UART: [idev] ++
3,501,178 UART: [idev] CDI.KEYID = 6
3,502,110 UART: [idev] SUBJECT.KEYID = 7
3,503,321 UART: [idev] UDS.KEYID = 0
3,522,836 UART: [idev] Erasing UDS.KEYID = 0
6,007,430 UART: [idev] Sha1 KeyId Algorithm
6,030,929 UART: [idev] --
6,034,549 UART: [ldev] ++
6,035,120 UART: [ldev] CDI.KEYID = 6
6,036,030 UART: [ldev] SUBJECT.KEYID = 5
6,037,193 UART: [ldev] AUTHORITY.KEYID = 7
6,038,482 UART: [ldev] FE.KEYID = 1
6,079,355 UART: [ldev] Erasing FE.KEYID = 1
8,582,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,771 UART: [ldev] --
10,392,936 UART: [fwproc] Wait for Commands...
10,395,081 UART: [fwproc] Recv command 0x46574c44
10,397,221 UART: [fwproc] Recv'd Img size: 114360 bytes
12,456,636 UART: ROM Fatal Error: 0x000B0034
12,459,760 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,024,453 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,597 UART:
2,169,004 UART: Running Caliptra ROM ...
2,170,101 UART:
2,170,255 UART: [state] CFI Enabled
2,171,222 UART: [state] LifecycleState = Unprovisioned
2,172,903 UART: [state] DebugLocked = No
2,173,930 UART: [state] WD Timer not started. Device not locked for debugging
2,176,390 UART: [kat] SHA2-256
2,177,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,063 UART: [kat] ++
2,180,513 UART: [kat] sha1
2,181,025 UART: [kat] SHA2-256
2,181,682 UART: [kat] SHA2-384
2,182,338 UART: [kat] SHA2-512-ACC
2,183,183 UART: [kat] ECC-384
2,945,962 UART: [kat] HMAC-384Kdf
2,970,704 UART: [kat] LMS
3,500,158 UART: [kat] --
3,504,955 UART: [cold-reset] ++
3,507,321 UART: [fht] FHT @ 0x50003400
3,518,846 UART: [idev] ++
3,519,430 UART: [idev] CDI.KEYID = 6
3,520,339 UART: [idev] SUBJECT.KEYID = 7
3,521,557 UART: [idev] UDS.KEYID = 0
3,542,121 UART: [idev] Erasing UDS.KEYID = 0
6,024,972 UART: [idev] Sha1 KeyId Algorithm
6,046,748 UART: [idev] --
6,050,749 UART: [ldev] ++
6,051,324 UART: [ldev] CDI.KEYID = 6
6,052,209 UART: [ldev] SUBJECT.KEYID = 5
6,053,431 UART: [ldev] AUTHORITY.KEYID = 7
6,054,666 UART: [ldev] FE.KEYID = 1
6,098,109 UART: [ldev] Erasing FE.KEYID = 1
8,601,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,360 UART: [ldev] --
10,409,608 UART: [fwproc] Wait for Commands...
10,412,364 UART: [fwproc] Recv command 0x46574c44
10,414,423 UART: [fwproc] Recv'd Img size: 114360 bytes
12,461,110 UART: ROM Fatal Error: 0x000B0034
12,464,231 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,032,713 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,177,105 UART:
2,177,511 UART: Running Caliptra ROM ...
2,178,676 UART:
2,178,847 UART: [state] CFI Enabled
2,179,756 UART: [state] LifecycleState = Unprovisioned
2,181,401 UART: [state] DebugLocked = No
2,182,513 UART: [state] WD Timer not started. Device not locked for debugging
2,184,984 UART: [kat] SHA2-256
2,185,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,659 UART: [kat] ++
2,189,112 UART: [kat] sha1
2,189,627 UART: [kat] SHA2-256
2,190,370 UART: [kat] SHA2-384
2,191,054 UART: [kat] SHA2-512-ACC
2,191,884 UART: [kat] ECC-384
2,946,073 UART: [kat] HMAC-384Kdf
2,970,858 UART: [kat] LMS
3,500,285 UART: [kat] --
3,502,063 UART: [cold-reset] ++
3,504,376 UART: [fht] FHT @ 0x50003400
3,515,462 UART: [idev] ++
3,516,034 UART: [idev] CDI.KEYID = 6
3,516,946 UART: [idev] SUBJECT.KEYID = 7
3,518,160 UART: [idev] UDS.KEYID = 0
3,542,831 UART: [idev] Erasing UDS.KEYID = 0
6,024,620 UART: [idev] Sha1 KeyId Algorithm
6,047,327 UART: [idev] --
6,051,262 UART: [ldev] ++
6,051,848 UART: [ldev] CDI.KEYID = 6
6,052,784 UART: [ldev] SUBJECT.KEYID = 5
6,053,951 UART: [ldev] AUTHORITY.KEYID = 7
6,055,198 UART: [ldev] FE.KEYID = 1
6,098,496 UART: [ldev] Erasing FE.KEYID = 1
8,598,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,230 UART: [ldev] --
10,411,119 UART: [fwproc] Wait for Commands...
10,414,036 UART: [fwproc] Recv command 0x46574c44
10,416,086 UART: [fwproc] Recv'd Img size: 114360 bytes
12,469,355 UART: ROM Fatal Error: 0x000B0034
12,472,479 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,027,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,172,065 UART:
2,172,461 UART: Running Caliptra ROM ...
2,173,539 UART:
2,173,695 UART: [state] CFI Enabled
2,174,670 UART: [state] LifecycleState = Unprovisioned
2,176,348 UART: [state] DebugLocked = No
2,177,380 UART: [state] WD Timer not started. Device not locked for debugging
2,179,836 UART: [kat] SHA2-256
2,180,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,530 UART: [kat] ++
2,183,978 UART: [kat] sha1
2,184,490 UART: [kat] SHA2-256
2,185,147 UART: [kat] SHA2-384
2,185,803 UART: [kat] SHA2-512-ACC
2,186,688 UART: [kat] ECC-384
2,947,399 UART: [kat] HMAC-384Kdf
2,969,881 UART: [kat] LMS
3,499,290 UART: [kat] --
3,502,620 UART: [cold-reset] ++
3,503,955 UART: [fht] FHT @ 0x50003400
3,515,369 UART: [idev] ++
3,515,942 UART: [idev] CDI.KEYID = 6
3,516,866 UART: [idev] SUBJECT.KEYID = 7
3,518,027 UART: [idev] UDS.KEYID = 0
3,541,242 UART: [idev] Erasing UDS.KEYID = 0
6,022,207 UART: [idev] Sha1 KeyId Algorithm
6,045,671 UART: [idev] --
6,049,679 UART: [ldev] ++
6,050,282 UART: [ldev] CDI.KEYID = 6
6,051,171 UART: [ldev] SUBJECT.KEYID = 5
6,052,341 UART: [ldev] AUTHORITY.KEYID = 7
6,053,496 UART: [ldev] FE.KEYID = 1
6,097,494 UART: [ldev] Erasing FE.KEYID = 1
8,602,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,784 UART: [ldev] --
10,408,889 UART: [fwproc] Wait for Commands...
10,410,610 UART: [fwproc] Recv command 0x46574c44
10,412,741 UART: [fwproc] Recv'd Img size: 114360 bytes
12,464,465 UART: ROM Fatal Error: 0x000B0034
12,467,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,026,081 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,228,485 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
2,021,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,249,825 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,025,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,170,068 UART:
2,170,471 UART: Running Caliptra ROM ...
2,171,549 UART:
2,171,722 UART: [state] CFI Enabled
2,172,692 UART: [state] LifecycleState = Unprovisioned
2,174,333 UART: [state] DebugLocked = No
2,175,358 UART: [state] WD Timer not started. Device not locked for debugging
2,177,830 UART: [kat] SHA2-256
2,178,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,576 UART: [kat] ++
2,182,027 UART: [kat] sha1
2,182,541 UART: [kat] SHA2-256
2,183,198 UART: [kat] SHA2-384
2,183,856 UART: [kat] SHA2-512-ACC
2,184,699 UART: [kat] ECC-384
3,278,532 UART: [kat] HMAC-384Kdf
3,291,392 UART: [kat] LMS
3,820,911 UART: [kat] --
3,825,575 UART: [cold-reset] ++
3,826,927 UART: [fht] FHT @ 0x50003400
3,838,122 UART: [idev] ++
3,838,681 UART: [idev] CDI.KEYID = 6
3,839,600 UART: [idev] SUBJECT.KEYID = 7
3,840,816 UART: [idev] UDS.KEYID = 0
3,854,713 UART: [idev] Erasing UDS.KEYID = 0
6,313,138 UART: [idev] Sha1 KeyId Algorithm
6,336,531 UART: [idev] --
6,340,825 UART: [ldev] ++
6,341,400 UART: [ldev] CDI.KEYID = 6
6,342,284 UART: [ldev] SUBJECT.KEYID = 5
6,343,492 UART: [ldev] AUTHORITY.KEYID = 7
6,344,782 UART: [ldev] FE.KEYID = 1
6,356,260 UART: [ldev] Erasing FE.KEYID = 1
8,827,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,099 UART: [ldev] --
10,617,015 UART: [fwproc] Wait for Commands...
10,619,052 UART: [fwproc] Recv command 0x46574c44
10,621,144 UART: [fwproc] Recv'd Img size: 114360 bytes
12,671,574 UART: ROM Fatal Error: 0x000B0034
12,674,698 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
2,020,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,164,127 UART:
2,164,506 UART: Running Caliptra ROM ...
2,165,670 UART:
2,165,844 UART: [state] CFI Enabled
2,166,802 UART: [state] LifecycleState = Unprovisioned
2,168,456 UART: [state] DebugLocked = No
2,169,557 UART: [state] WD Timer not started. Device not locked for debugging
2,172,024 UART: [kat] SHA2-256
2,172,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,706 UART: [kat] ++
2,176,155 UART: [kat] sha1
2,176,666 UART: [kat] SHA2-256
2,177,404 UART: [kat] SHA2-384
2,178,070 UART: [kat] SHA2-512-ACC
2,178,956 UART: [kat] ECC-384
3,285,236 UART: [kat] HMAC-384Kdf
3,297,998 UART: [kat] LMS
3,827,459 UART: [kat] --
3,833,680 UART: [cold-reset] ++
3,835,879 UART: [fht] FHT @ 0x50003400
3,847,665 UART: [idev] ++
3,848,234 UART: [idev] CDI.KEYID = 6
3,849,144 UART: [idev] SUBJECT.KEYID = 7
3,850,356 UART: [idev] UDS.KEYID = 0
3,865,170 UART: [idev] Erasing UDS.KEYID = 0
6,321,569 UART: [idev] Sha1 KeyId Algorithm
6,343,335 UART: [idev] --
6,346,787 UART: [ldev] ++
6,347,352 UART: [ldev] CDI.KEYID = 6
6,348,284 UART: [ldev] SUBJECT.KEYID = 5
6,349,493 UART: [ldev] AUTHORITY.KEYID = 7
6,350,740 UART: [ldev] FE.KEYID = 1
6,359,666 UART: [ldev] Erasing FE.KEYID = 1
8,836,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,829 UART: [ldev] --
10,627,158 UART: [fwproc] Wait for Commands...
10,629,419 UART: [fwproc] Recv command 0x46574c44
10,631,515 UART: [fwproc] Recv'd Img size: 114360 bytes
12,681,295 UART: ROM Fatal Error: 0x000B0034
12,684,422 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,790 writing to cptra_bootfsm_go
2,032,413 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,468,260 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
2,021,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,458,963 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,598 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,893 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,892 UART: [ldev] --
1,281,232 UART: [fwproc] Wait for Commands...
1,281,927 UART: [fwproc] Recv command 0x46574c44
1,282,660 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,598 UART: ROM Fatal Error: 0x000B0034
1,330,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,382 UART: [kat] LMS
1,169,694 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,170,979 UART: [fht] FHT @ 0x50003400
1,173,705 UART: [idev] ++
1,173,873 UART: [idev] CDI.KEYID = 6
1,174,234 UART: [idev] SUBJECT.KEYID = 7
1,174,659 UART: [idev] UDS.KEYID = 0
1,182,787 UART: [idev] Erasing UDS.KEYID = 0
1,199,781 UART: [idev] Sha1 KeyId Algorithm
1,208,753 UART: [idev] --
1,210,006 UART: [ldev] ++
1,210,174 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,965 UART: [ldev] AUTHORITY.KEYID = 7
1,211,428 UART: [ldev] FE.KEYID = 1
1,216,550 UART: [ldev] Erasing FE.KEYID = 1
1,243,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,398 UART: [ldev] --
1,282,802 UART: [fwproc] Wait for Commands...
1,283,439 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,134 UART: ROM Fatal Error: 0x000B0034
1,332,291 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,678 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,297 UART: [fwproc] Wait for Commands...
1,283,002 UART: [fwproc] Recv command 0x46574c44
1,283,735 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,713 UART: ROM Fatal Error: 0x000B0034
1,332,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,310 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,444 UART: [idev] ++
1,173,612 UART: [idev] CDI.KEYID = 6
1,173,973 UART: [idev] SUBJECT.KEYID = 7
1,174,398 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,667 UART: [ldev] ++
1,209,835 UART: [ldev] CDI.KEYID = 6
1,210,199 UART: [ldev] SUBJECT.KEYID = 5
1,210,626 UART: [ldev] AUTHORITY.KEYID = 7
1,211,089 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,549 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,221 UART: ROM Fatal Error: 0x000B0034
1,331,378 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,725 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,148 UART: [kat] LMS
1,168,460 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,170,045 UART: [fht] FHT @ 0x50003400
1,172,681 UART: [idev] ++
1,172,849 UART: [idev] CDI.KEYID = 6
1,173,210 UART: [idev] SUBJECT.KEYID = 7
1,173,635 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,718 UART: [fwproc] Wait for Commands...
1,281,315 UART: [fwproc] Recv command 0x46574c44
1,282,048 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,824 UART: ROM Fatal Error: 0x000B0034
1,330,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,176 UART: [kat] HMAC-384Kdf
919,620 UART: [kat] LMS
1,167,932 UART: [kat] --
1,168,781 UART: [cold-reset] ++
1,169,321 UART: [fht] FHT @ 0x50003400
1,171,923 UART: [idev] ++
1,172,091 UART: [idev] CDI.KEYID = 6
1,172,452 UART: [idev] SUBJECT.KEYID = 7
1,172,877 UART: [idev] UDS.KEYID = 0
1,181,221 UART: [idev] Erasing UDS.KEYID = 0
1,198,383 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,000 UART: [ldev] ++
1,208,168 UART: [ldev] CDI.KEYID = 6
1,208,532 UART: [ldev] SUBJECT.KEYID = 5
1,208,959 UART: [ldev] AUTHORITY.KEYID = 7
1,209,422 UART: [ldev] FE.KEYID = 1
1,215,038 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,712 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,376 UART: ROM Fatal Error: 0x000B0034
1,330,533 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,392 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,612 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x46574c44
1,283,639 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,481 UART: ROM Fatal Error: 0x000B0034
1,331,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,596 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,253 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,234 UART: [fwproc] Recv command 0x46574c44
1,283,967 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,549 UART: ROM Fatal Error: 0x000B0034
1,332,706 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,186,133 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,346 UART: [kat] LMS
1,168,658 UART: [kat] --
1,169,425 UART: [cold-reset] ++
1,169,831 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,181,521 UART: [idev] Erasing UDS.KEYID = 0
1,198,383 UART: [idev] Sha1 KeyId Algorithm
1,207,479 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,176 UART: [fwproc] Wait for Commands...
1,280,859 UART: [fwproc] Recv command 0x46574c44
1,281,592 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,844 UART: ROM Fatal Error: 0x000B0034
1,330,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,181,591 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,726 UART: [ldev] ++
1,208,894 UART: [ldev] CDI.KEYID = 6
1,209,258 UART: [ldev] SUBJECT.KEYID = 5
1,209,685 UART: [ldev] AUTHORITY.KEYID = 7
1,210,148 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,444 UART: [ldev] --
1,280,730 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,484 UART: ROM Fatal Error: 0x000B0034
1,330,641 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,372 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,284 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x46574c44
1,283,367 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,679 UART: ROM Fatal Error: 0x000B0034
1,331,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,904 UART: [idev] Sha1 KeyId Algorithm
1,208,914 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,447 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,282,071 UART: [fwproc] Wait for Commands...
1,282,800 UART: [fwproc] Recv command 0x46574c44
1,283,533 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,661 UART: ROM Fatal Error: 0x000B0034
1,331,818 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,515 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,333 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,003 UART:
192,390 UART: Running Caliptra ROM ...
193,467 UART:
193,610 UART: [state] CFI Enabled
265,723 UART: [state] LifecycleState = Manufacturing
267,769 UART: [state] DebugLocked = No
270,524 UART: [state] WD Timer not started. Device not locked for debugging
274,935 UART: [kat] SHA2-256
456,887 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,385 UART: [kat] ++
468,975 UART: [kat] sha1
478,882 UART: [kat] SHA2-256
481,890 UART: [kat] SHA2-384
487,230 UART: [kat] SHA2-512-ACC
489,842 UART: [kat] ECC-384
3,778,635 UART: [kat] HMAC-384Kdf
3,804,220 UART: [kat] LMS
4,877,406 UART: [kat] --
4,882,770 UART: [cold-reset] ++
4,885,141 UART: [fht] FHT @ 0x50003400
4,896,824 UART: [idev] ++
4,897,504 UART: [idev] CDI.KEYID = 6
4,898,737 UART: [idev] SUBJECT.KEYID = 7
4,899,836 UART: [idev] UDS.KEYID = 0
4,931,420 UART: [idev] Erasing UDS.KEYID = 0
8,243,646 UART: [idev] Sha1 KeyId Algorithm
8,265,625 UART: [idev] --
8,269,610 UART: [ldev] ++
8,270,173 UART: [ldev] CDI.KEYID = 6
8,271,425 UART: [ldev] SUBJECT.KEYID = 5
8,272,534 UART: [ldev] AUTHORITY.KEYID = 7
8,273,716 UART: [ldev] FE.KEYID = 1
8,319,325 UART: [ldev] Erasing FE.KEYID = 1
11,656,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,294 UART: [ldev] --
14,041,781 UART: [fwproc] Wait for Commands...
14,043,882 UART: [fwproc] Recv command 0x46574c44
14,046,206 UART: [fwproc] Recv'd Img size: 114036 bytes
17,028,880 UART: ROM Fatal Error: 0x000B0025
17,032,238 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
5,273 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,822,535 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
6,024 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,311 UART:
192,691 UART: Running Caliptra ROM ...
193,767 UART:
603,291 UART: [state] CFI Enabled
615,451 UART: [state] LifecycleState = Manufacturing
617,829 UART: [state] DebugLocked = No
619,336 UART: [state] WD Timer not started. Device not locked for debugging
623,068 UART: [kat] SHA2-256
804,834 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,400 UART: [kat] ++
816,896 UART: [kat] sha1
826,954 UART: [kat] SHA2-256
829,965 UART: [kat] SHA2-384
836,046 UART: [kat] SHA2-512-ACC
838,626 UART: [kat] ECC-384
4,095,313 UART: [kat] HMAC-384Kdf
4,106,419 UART: [kat] LMS
5,179,562 UART: [kat] --
5,183,791 UART: [cold-reset] ++
5,186,591 UART: [fht] FHT @ 0x50003400
5,196,936 UART: [idev] ++
5,197,614 UART: [idev] CDI.KEYID = 6
5,198,846 UART: [idev] SUBJECT.KEYID = 7
5,200,273 UART: [idev] UDS.KEYID = 0
5,218,025 UART: [idev] Erasing UDS.KEYID = 0
8,488,496 UART: [idev] Sha1 KeyId Algorithm
8,511,237 UART: [idev] --
8,513,661 UART: [ldev] ++
8,514,283 UART: [ldev] CDI.KEYID = 6
8,515,458 UART: [ldev] SUBJECT.KEYID = 5
8,516,942 UART: [ldev] AUTHORITY.KEYID = 7
8,518,459 UART: [ldev] FE.KEYID = 1
8,527,993 UART: [ldev] Erasing FE.KEYID = 1
11,822,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,389 UART: [ldev] --
14,186,405 UART: [fwproc] Wait for Commands...
14,188,824 UART: [fwproc] Recv command 0x46574c44
14,191,133 UART: [fwproc] Recv'd Img size: 114036 bytes
17,169,886 UART: ROM Fatal Error: 0x000B0025
17,173,246 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
6,029 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,994,692 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
5,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,249 UART:
192,626 UART: Running Caliptra ROM ...
193,798 UART:
193,951 UART: [state] CFI Enabled
264,554 UART: [state] LifecycleState = Manufacturing
266,419 UART: [state] DebugLocked = No
268,133 UART: [state] WD Timer not started. Device not locked for debugging
271,046 UART: [kat] SHA2-256
450,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,709 UART: [kat] ++
462,250 UART: [kat] sha1
474,102 UART: [kat] SHA2-256
477,122 UART: [kat] SHA2-384
484,075 UART: [kat] SHA2-512-ACC
487,068 UART: [kat] ECC-384
2,946,153 UART: [kat] HMAC-384Kdf
2,971,517 UART: [kat] LMS
3,501,008 UART: [kat] --
3,505,165 UART: [cold-reset] ++
3,507,052 UART: [fht] FHT @ 0x50003400
3,517,491 UART: [idev] ++
3,518,055 UART: [idev] CDI.KEYID = 6
3,518,963 UART: [idev] SUBJECT.KEYID = 7
3,520,177 UART: [idev] UDS.KEYID = 0
3,543,258 UART: [idev] Erasing UDS.KEYID = 0
6,025,052 UART: [idev] Sha1 KeyId Algorithm
6,047,584 UART: [idev] --
6,052,986 UART: [ldev] ++
6,053,556 UART: [ldev] CDI.KEYID = 6
6,054,440 UART: [ldev] SUBJECT.KEYID = 5
6,055,652 UART: [ldev] AUTHORITY.KEYID = 7
6,056,905 UART: [ldev] FE.KEYID = 1
6,098,425 UART: [ldev] Erasing FE.KEYID = 1
8,601,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,218 UART: [ldev] --
10,412,024 UART: [fwproc] Wait for Commands...
10,415,149 UART: [fwproc] Recv command 0x46574c44
10,417,246 UART: [fwproc] Recv'd Img size: 114360 bytes
12,751,481 UART: ROM Fatal Error: 0x000B0025
12,754,612 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
5,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,258 UART:
192,634 UART: Running Caliptra ROM ...
193,806 UART:
193,962 UART: [state] CFI Enabled
262,315 UART: [state] LifecycleState = Manufacturing
264,193 UART: [state] DebugLocked = No
265,577 UART: [state] WD Timer not started. Device not locked for debugging
269,291 UART: [kat] SHA2-256
448,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,004 UART: [kat] ++
460,545 UART: [kat] sha1
470,346 UART: [kat] SHA2-256
473,409 UART: [kat] SHA2-384
479,358 UART: [kat] SHA2-512-ACC
482,286 UART: [kat] ECC-384
2,928,065 UART: [kat] HMAC-384Kdf
2,951,976 UART: [kat] LMS
3,481,471 UART: [kat] --
3,485,954 UART: [cold-reset] ++
3,487,831 UART: [fht] FHT @ 0x50003400
3,498,811 UART: [idev] ++
3,499,374 UART: [idev] CDI.KEYID = 6
3,500,346 UART: [idev] SUBJECT.KEYID = 7
3,501,449 UART: [idev] UDS.KEYID = 0
3,522,782 UART: [idev] Erasing UDS.KEYID = 0
6,005,281 UART: [idev] Sha1 KeyId Algorithm
6,028,140 UART: [idev] --
6,030,896 UART: [ldev] ++
6,031,470 UART: [ldev] CDI.KEYID = 6
6,032,380 UART: [ldev] SUBJECT.KEYID = 5
6,033,598 UART: [ldev] AUTHORITY.KEYID = 7
6,034,837 UART: [ldev] FE.KEYID = 1
6,081,004 UART: [ldev] Erasing FE.KEYID = 1
8,584,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,201 UART: [ldev] --
10,392,659 UART: [fwproc] Wait for Commands...
10,395,185 UART: [fwproc] Recv command 0x46574c44
10,397,278 UART: [fwproc] Recv'd Img size: 114360 bytes
12,725,971 UART: ROM Fatal Error: 0x000B0025
12,729,043 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
5,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,505,214 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
6,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,416 UART:
192,812 UART: Running Caliptra ROM ...
193,901 UART:
603,555 UART: [state] CFI Enabled
621,082 UART: [state] LifecycleState = Manufacturing
622,997 UART: [state] DebugLocked = No
624,669 UART: [state] WD Timer not started. Device not locked for debugging
628,170 UART: [kat] SHA2-256
807,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,850 UART: [kat] ++
819,299 UART: [kat] sha1
828,983 UART: [kat] SHA2-256
831,984 UART: [kat] SHA2-384
838,472 UART: [kat] SHA2-512-ACC
841,458 UART: [kat] ECC-384
3,285,190 UART: [kat] HMAC-384Kdf
3,297,683 UART: [kat] LMS
3,827,131 UART: [kat] --
3,831,160 UART: [cold-reset] ++
3,832,766 UART: [fht] FHT @ 0x50003400
3,844,871 UART: [idev] ++
3,845,427 UART: [idev] CDI.KEYID = 6
3,846,437 UART: [idev] SUBJECT.KEYID = 7
3,847,640 UART: [idev] UDS.KEYID = 0
3,865,425 UART: [idev] Erasing UDS.KEYID = 0
6,318,792 UART: [idev] Sha1 KeyId Algorithm
6,342,084 UART: [idev] --
6,347,269 UART: [ldev] ++
6,347,838 UART: [ldev] CDI.KEYID = 6
6,348,820 UART: [ldev] SUBJECT.KEYID = 5
6,349,976 UART: [ldev] AUTHORITY.KEYID = 7
6,351,202 UART: [ldev] FE.KEYID = 1
6,362,763 UART: [ldev] Erasing FE.KEYID = 1
8,836,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,156 UART: [ldev] --
10,626,184 UART: [fwproc] Wait for Commands...
10,629,135 UART: [fwproc] Recv command 0x46574c44
10,631,168 UART: [fwproc] Recv'd Img size: 114360 bytes
12,954,075 UART: ROM Fatal Error: 0x000B0025
12,957,195 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
6,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,727,453 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Manufacturing
85,699 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,045 UART: [kat] ++
895,197 UART: [kat] sha1
899,395 UART: [kat] SHA2-256
901,335 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,405 UART: [idev] Sha1 KeyId Algorithm
1,208,221 UART: [idev] --
1,209,196 UART: [ldev] ++
1,209,364 UART: [ldev] CDI.KEYID = 6
1,209,728 UART: [ldev] SUBJECT.KEYID = 5
1,210,155 UART: [ldev] AUTHORITY.KEYID = 7
1,210,618 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,241,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,433 UART: ROM Fatal Error: 0x000B0025
1,575,590 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,217 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Manufacturing
86,108 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,782 UART: [idev] ++
1,172,950 UART: [idev] CDI.KEYID = 6
1,173,311 UART: [idev] SUBJECT.KEYID = 7
1,173,736 UART: [idev] UDS.KEYID = 0
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,198,260 UART: [idev] Sha1 KeyId Algorithm
1,207,192 UART: [idev] --
1,208,123 UART: [ldev] ++
1,208,291 UART: [ldev] CDI.KEYID = 6
1,208,655 UART: [ldev] SUBJECT.KEYID = 5
1,209,082 UART: [ldev] AUTHORITY.KEYID = 7
1,209,545 UART: [ldev] FE.KEYID = 1
1,214,839 UART: [ldev] Erasing FE.KEYID = 1
1,241,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,725 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,790 UART: [fwproc] Recv command 0x46574c44
1,282,523 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,284 UART: ROM Fatal Error: 0x000B0025
1,575,441 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,248 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Manufacturing
86,099 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,141 UART: [idev] --
1,208,414 UART: [ldev] ++
1,208,582 UART: [ldev] CDI.KEYID = 6
1,208,946 UART: [ldev] SUBJECT.KEYID = 5
1,209,373 UART: [ldev] AUTHORITY.KEYID = 7
1,209,836 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,134 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,003 UART: ROM Fatal Error: 0x000B0025
1,575,160 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,425,603 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Manufacturing
86,232 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,514 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,198,810 UART: [idev] Sha1 KeyId Algorithm
1,207,774 UART: [idev] --
1,208,777 UART: [ldev] ++
1,208,945 UART: [ldev] CDI.KEYID = 6
1,209,309 UART: [ldev] SUBJECT.KEYID = 5
1,209,736 UART: [ldev] AUTHORITY.KEYID = 7
1,210,199 UART: [ldev] FE.KEYID = 1
1,215,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,058 UART: [fwproc] Recv command 0x46574c44
1,282,791 UART: [fwproc] Recv'd Img size: 114360 bytes
1,573,710 UART: ROM Fatal Error: 0x000B0025
1,574,867 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,900 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Manufacturing
86,161 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,199,663 UART: [idev] Sha1 KeyId Algorithm
1,208,597 UART: [idev] --
1,209,650 UART: [ldev] ++
1,209,818 UART: [ldev] CDI.KEYID = 6
1,210,182 UART: [ldev] SUBJECT.KEYID = 5
1,210,609 UART: [ldev] AUTHORITY.KEYID = 7
1,211,072 UART: [ldev] FE.KEYID = 1
1,216,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,798 UART: [ldev] --
1,281,092 UART: [fwproc] Wait for Commands...
1,281,821 UART: [fwproc] Recv command 0x46574c44
1,282,554 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,447 UART: ROM Fatal Error: 0x000B0025
1,575,604 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,709 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Manufacturing
86,224 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,474 UART: [kat] SHA2-256
902,414 UART: [kat] SHA2-384
905,141 UART: [kat] SHA2-512-ACC
907,042 UART: [kat] ECC-384
916,947 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,348 UART: [fht] FHT @ 0x50003400
1,174,086 UART: [idev] ++
1,174,254 UART: [idev] CDI.KEYID = 6
1,174,615 UART: [idev] SUBJECT.KEYID = 7
1,175,040 UART: [idev] UDS.KEYID = 0
1,183,068 UART: [idev] Erasing UDS.KEYID = 0
1,200,346 UART: [idev] Sha1 KeyId Algorithm
1,209,420 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,885 UART: [ldev] SUBJECT.KEYID = 5
1,211,312 UART: [ldev] AUTHORITY.KEYID = 7
1,211,775 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,475 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,160 UART: ROM Fatal Error: 0x000B0025
1,575,317 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,500 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
5,794 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,368 UART:
192,741 UART: Running Caliptra ROM ...
193,912 UART:
194,073 UART: [state] CFI Enabled
265,391 UART: [state] LifecycleState = Manufacturing
267,816 UART: [state] DebugLocked = No
269,580 UART: [state] WD Timer not started. Device not locked for debugging
273,775 UART: [kat] SHA2-256
455,694 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,254 UART: [kat] ++
467,737 UART: [kat] sha1
478,444 UART: [kat] SHA2-256
481,464 UART: [kat] SHA2-384
486,527 UART: [kat] SHA2-512-ACC
489,142 UART: [kat] ECC-384
3,776,026 UART: [kat] HMAC-384Kdf
3,802,246 UART: [kat] LMS
4,875,430 UART: [kat] --
4,878,999 UART: [cold-reset] ++
4,880,340 UART: [fht] FHT @ 0x50003400
4,891,912 UART: [idev] ++
4,892,639 UART: [idev] CDI.KEYID = 6
4,893,819 UART: [idev] SUBJECT.KEYID = 7
4,894,996 UART: [idev] UDS.KEYID = 0
4,930,900 UART: [idev] Erasing UDS.KEYID = 0
8,244,703 UART: [idev] Sha1 KeyId Algorithm
8,267,991 UART: [idev] --
8,271,822 UART: [ldev] ++
8,272,390 UART: [ldev] CDI.KEYID = 6
8,273,633 UART: [ldev] SUBJECT.KEYID = 5
8,274,791 UART: [ldev] AUTHORITY.KEYID = 7
8,276,026 UART: [ldev] FE.KEYID = 1
8,316,663 UART: [ldev] Erasing FE.KEYID = 1
11,651,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,870 UART: [ldev] --
14,016,792 UART: [fwproc] Wait for Commands...
14,019,331 UART: [fwproc] Recv command 0x46574c44
14,021,650 UART: [fwproc] Recv'd Img size: 114036 bytes
17,000,824 UART: ROM Fatal Error: 0x000B0027
17,004,177 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
5,629 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,822,197 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
6,095 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,442 UART:
192,816 UART: Running Caliptra ROM ...
193,923 UART:
603,765 UART: [state] CFI Enabled
618,882 UART: [state] LifecycleState = Manufacturing
621,301 UART: [state] DebugLocked = No
623,001 UART: [state] WD Timer not started. Device not locked for debugging
627,184 UART: [kat] SHA2-256
809,201 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,726 UART: [kat] ++
821,312 UART: [kat] sha1
831,651 UART: [kat] SHA2-256
834,714 UART: [kat] SHA2-384
841,436 UART: [kat] SHA2-512-ACC
844,045 UART: [kat] ECC-384
4,098,842 UART: [kat] HMAC-384Kdf
4,111,137 UART: [kat] LMS
5,184,279 UART: [kat] --
5,187,646 UART: [cold-reset] ++
5,188,780 UART: [fht] FHT @ 0x50003400
5,200,996 UART: [idev] ++
5,201,716 UART: [idev] CDI.KEYID = 6
5,202,891 UART: [idev] SUBJECT.KEYID = 7
5,204,372 UART: [idev] UDS.KEYID = 0
5,221,536 UART: [idev] Erasing UDS.KEYID = 0
8,493,584 UART: [idev] Sha1 KeyId Algorithm
8,515,842 UART: [idev] --
8,519,484 UART: [ldev] ++
8,520,058 UART: [ldev] CDI.KEYID = 6
8,521,300 UART: [ldev] SUBJECT.KEYID = 5
8,522,744 UART: [ldev] AUTHORITY.KEYID = 7
8,524,302 UART: [ldev] FE.KEYID = 1
8,535,939 UART: [ldev] Erasing FE.KEYID = 1
11,828,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,361 UART: [ldev] --
14,193,590 UART: [fwproc] Wait for Commands...
14,195,253 UART: [fwproc] Recv command 0x46574c44
14,197,514 UART: [fwproc] Recv'd Img size: 114036 bytes
17,168,650 UART: ROM Fatal Error: 0x000B0027
17,172,008 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
5,979 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,984,099 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
5,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,314 UART:
192,699 UART: Running Caliptra ROM ...
193,813 UART:
193,961 UART: [state] CFI Enabled
264,981 UART: [state] LifecycleState = Manufacturing
266,892 UART: [state] DebugLocked = No
269,470 UART: [state] WD Timer not started. Device not locked for debugging
273,459 UART: [kat] SHA2-256
452,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,170 UART: [kat] ++
464,710 UART: [kat] sha1
475,860 UART: [kat] SHA2-256
478,862 UART: [kat] SHA2-384
486,076 UART: [kat] SHA2-512-ACC
489,018 UART: [kat] ECC-384
2,948,897 UART: [kat] HMAC-384Kdf
2,973,489 UART: [kat] LMS
3,502,926 UART: [kat] --
3,508,021 UART: [cold-reset] ++
3,509,475 UART: [fht] FHT @ 0x50003400
3,520,999 UART: [idev] ++
3,521,586 UART: [idev] CDI.KEYID = 6
3,522,498 UART: [idev] SUBJECT.KEYID = 7
3,523,714 UART: [idev] UDS.KEYID = 0
3,545,470 UART: [idev] Erasing UDS.KEYID = 0
6,025,405 UART: [idev] Sha1 KeyId Algorithm
6,048,644 UART: [idev] --
6,053,526 UART: [ldev] ++
6,054,137 UART: [ldev] CDI.KEYID = 6
6,055,052 UART: [ldev] SUBJECT.KEYID = 5
6,056,166 UART: [ldev] AUTHORITY.KEYID = 7
6,057,462 UART: [ldev] FE.KEYID = 1
6,102,143 UART: [ldev] Erasing FE.KEYID = 1
8,607,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,214 UART: [ldev] --
10,416,619 UART: [fwproc] Wait for Commands...
10,419,742 UART: [fwproc] Recv command 0x46574c44
10,421,842 UART: [fwproc] Recv'd Img size: 114360 bytes
12,745,177 UART: ROM Fatal Error: 0x000B0027
12,748,258 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
5,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,201 UART:
192,590 UART: Running Caliptra ROM ...
193,713 UART:
193,857 UART: [state] CFI Enabled
264,041 UART: [state] LifecycleState = Manufacturing
265,912 UART: [state] DebugLocked = No
268,432 UART: [state] WD Timer not started. Device not locked for debugging
271,456 UART: [kat] SHA2-256
450,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,128 UART: [kat] ++
462,667 UART: [kat] sha1
472,463 UART: [kat] SHA2-256
475,464 UART: [kat] SHA2-384
482,033 UART: [kat] SHA2-512-ACC
485,031 UART: [kat] ECC-384
2,928,363 UART: [kat] HMAC-384Kdf
2,951,839 UART: [kat] LMS
3,481,322 UART: [kat] --
3,484,973 UART: [cold-reset] ++
3,487,180 UART: [fht] FHT @ 0x50003400
3,499,348 UART: [idev] ++
3,499,916 UART: [idev] CDI.KEYID = 6
3,500,885 UART: [idev] SUBJECT.KEYID = 7
3,502,042 UART: [idev] UDS.KEYID = 0
3,523,312 UART: [idev] Erasing UDS.KEYID = 0
6,180,821 UART: [idev] Sha1 KeyId Algorithm
6,204,175 UART: [idev] --
6,208,508 UART: [ldev] ++
6,209,074 UART: [ldev] CDI.KEYID = 6
6,209,969 UART: [ldev] SUBJECT.KEYID = 5
6,211,138 UART: [ldev] AUTHORITY.KEYID = 7
6,212,454 UART: [ldev] FE.KEYID = 1
6,259,564 UART: [ldev] Erasing FE.KEYID = 1
8,758,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,477,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,493,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,509,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,525,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,545,917 UART: [ldev] --
10,550,209 UART: [fwproc] Wait for Commands...
10,552,363 UART: [fwproc] Recv command 0x46574c44
10,554,461 UART: [fwproc] Recv'd Img size: 114360 bytes
12,877,486 UART: ROM Fatal Error: 0x000B0027
12,880,612 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
5,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,525,272 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
6,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,496 UART:
192,871 UART: Running Caliptra ROM ...
193,959 UART:
603,471 UART: [state] CFI Enabled
619,139 UART: [state] LifecycleState = Manufacturing
620,982 UART: [state] DebugLocked = No
622,758 UART: [state] WD Timer not started. Device not locked for debugging
625,812 UART: [kat] SHA2-256
804,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,503 UART: [kat] ++
816,946 UART: [kat] sha1
827,116 UART: [kat] SHA2-256
830,124 UART: [kat] SHA2-384
835,773 UART: [kat] SHA2-512-ACC
838,752 UART: [kat] ECC-384
3,283,104 UART: [kat] HMAC-384Kdf
3,295,557 UART: [kat] LMS
3,825,062 UART: [kat] --
3,829,002 UART: [cold-reset] ++
3,831,428 UART: [fht] FHT @ 0x50003400
3,842,292 UART: [idev] ++
3,842,849 UART: [idev] CDI.KEYID = 6
3,843,959 UART: [idev] SUBJECT.KEYID = 7
3,845,262 UART: [idev] UDS.KEYID = 0
3,861,151 UART: [idev] Erasing UDS.KEYID = 0
6,320,389 UART: [idev] Sha1 KeyId Algorithm
6,342,457 UART: [idev] --
6,346,103 UART: [ldev] ++
6,346,676 UART: [ldev] CDI.KEYID = 6
6,347,566 UART: [ldev] SUBJECT.KEYID = 5
6,348,778 UART: [ldev] AUTHORITY.KEYID = 7
6,349,952 UART: [ldev] FE.KEYID = 1
6,360,381 UART: [ldev] Erasing FE.KEYID = 1
8,834,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,536 UART: [ldev] --
10,626,665 UART: [fwproc] Wait for Commands...
10,629,726 UART: [fwproc] Recv command 0x46574c44
10,631,837 UART: [fwproc] Recv'd Img size: 114360 bytes
12,950,779 UART: ROM Fatal Error: 0x000B0027
12,953,849 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
6,531 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,730,000 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Manufacturing
86,197 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
891,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,281,100 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x46574c44
1,282,556 UART: [fwproc] Recv'd Img size: 114360 bytes
1,572,792 UART: ROM Fatal Error: 0x000B0027
1,573,949 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,383 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Manufacturing
86,032 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,169,838 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,181,606 UART: [idev] Erasing UDS.KEYID = 0
1,198,702 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,731 UART: [ldev] ++
1,208,899 UART: [ldev] CDI.KEYID = 6
1,209,263 UART: [ldev] SUBJECT.KEYID = 5
1,209,690 UART: [ldev] AUTHORITY.KEYID = 7
1,210,153 UART: [ldev] FE.KEYID = 1
1,215,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,395 UART: [ldev] --
1,280,743 UART: [fwproc] Wait for Commands...
1,281,464 UART: [fwproc] Recv command 0x46574c44
1,282,197 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,016 UART: ROM Fatal Error: 0x000B0027
1,575,173 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,982 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Manufacturing
85,809 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,203 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,004 UART: [ldev] ++
1,209,172 UART: [ldev] CDI.KEYID = 6
1,209,536 UART: [ldev] SUBJECT.KEYID = 5
1,209,963 UART: [ldev] AUTHORITY.KEYID = 7
1,210,426 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,530 UART: [ldev] --
1,280,966 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x46574c44
1,282,292 UART: [fwproc] Recv'd Img size: 114360 bytes
1,573,209 UART: ROM Fatal Error: 0x000B0027
1,574,366 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,181 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Manufacturing
85,978 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,881 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,686 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,208,094 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,771 UART: [ldev] --
1,281,129 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 114360 bytes
1,573,374 UART: ROM Fatal Error: 0x000B0027
1,574,531 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,429,102 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Manufacturing
85,329 UART: [state] DebugLocked = No
85,845 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,161 UART: [kat] SHA2-256
901,101 UART: [kat] SHA2-384
903,716 UART: [kat] SHA2-512-ACC
905,617 UART: [kat] ECC-384
914,890 UART: [kat] HMAC-384Kdf
919,592 UART: [kat] LMS
1,167,904 UART: [kat] --
1,168,831 UART: [cold-reset] ++
1,169,345 UART: [fht] FHT @ 0x50003400
1,171,835 UART: [idev] ++
1,172,003 UART: [idev] CDI.KEYID = 6
1,172,364 UART: [idev] SUBJECT.KEYID = 7
1,172,789 UART: [idev] UDS.KEYID = 0
1,180,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,207,251 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,214,666 UART: [ldev] Erasing FE.KEYID = 1
1,240,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,468 UART: [ldev] --
1,279,860 UART: [fwproc] Wait for Commands...
1,280,487 UART: [fwproc] Recv command 0x46574c44
1,281,220 UART: [fwproc] Recv'd Img size: 114360 bytes
1,573,175 UART: ROM Fatal Error: 0x000B0027
1,574,332 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,355 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Manufacturing
85,910 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,836 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,997 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,849 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,172 UART: ROM Fatal Error: 0x000B0027
1,575,329 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,428,206 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,021,513 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,485 UART:
2,165,884 UART: Running Caliptra ROM ...
2,166,962 UART:
2,167,113 UART: [state] CFI Enabled
2,168,092 UART: [state] LifecycleState = Unprovisioned
2,169,732 UART: [state] DebugLocked = No
2,170,759 UART: [state] WD Timer not started. Device not locked for debugging
2,173,219 UART: [kat] SHA2-256
2,173,880 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,110 UART: [kat] ++
2,177,589 UART: [kat] sha1
2,178,108 UART: [kat] SHA2-256
2,178,766 UART: [kat] SHA2-384
2,179,423 UART: [kat] SHA2-512-ACC
2,180,256 UART: [kat] ECC-384
3,766,411 UART: [kat] HMAC-384Kdf
3,793,929 UART: [kat] LMS
4,867,055 UART: [kat] --
4,870,427 UART: [cold-reset] ++
4,871,446 UART: [fht] FHT @ 0x50003400
4,881,834 UART: [idev] ++
4,882,514 UART: [idev] CDI.KEYID = 6
4,883,696 UART: [idev] SUBJECT.KEYID = 7
4,884,855 UART: [idev] UDS.KEYID = 0
4,920,760 UART: [idev] Erasing UDS.KEYID = 0
8,233,375 UART: [idev] Sha1 KeyId Algorithm
8,256,737 UART: [idev] --
8,260,856 UART: [ldev] ++
8,261,427 UART: [ldev] CDI.KEYID = 6
8,262,614 UART: [ldev] SUBJECT.KEYID = 5
8,263,771 UART: [ldev] AUTHORITY.KEYID = 7
8,264,953 UART: [ldev] FE.KEYID = 1
8,311,077 UART: [ldev] Erasing FE.KEYID = 1
11,646,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,954,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,971,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,987,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,002,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,024,181 UART: [ldev] --
14,029,565 UART: [fwproc] Wait for Commands...
14,032,311 UART: [fwproc] Recv command 0x46574c44
14,034,637 UART: [fwproc] Recv'd Img size: 114036 bytes
15,426,088 UART: ROM Fatal Error: 0x000B000D
15,429,497 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,028,372 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,223,905 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
2,024,070 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,168,310 UART:
2,168,727 UART: Running Caliptra ROM ...
2,169,808 UART:
2,169,957 UART: [state] CFI Enabled
2,170,925 UART: [state] LifecycleState = Unprovisioned
2,172,569 UART: [state] DebugLocked = No
2,173,588 UART: [state] WD Timer not started. Device not locked for debugging
2,176,051 UART: [kat] SHA2-256
2,176,740 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,746 UART: [kat] ++
2,180,192 UART: [kat] sha1
2,180,697 UART: [kat] SHA2-256
2,181,348 UART: [kat] SHA2-384
2,182,023 UART: [kat] SHA2-512-ACC
2,182,849 UART: [kat] ECC-384
4,098,498 UART: [kat] HMAC-384Kdf
4,110,589 UART: [kat] LMS
5,183,757 UART: [kat] --
5,188,253 UART: [cold-reset] ++
5,189,872 UART: [fht] FHT @ 0x50003400
5,201,123 UART: [idev] ++
5,201,797 UART: [idev] CDI.KEYID = 6
5,202,977 UART: [idev] SUBJECT.KEYID = 7
5,204,463 UART: [idev] UDS.KEYID = 0
5,221,375 UART: [idev] Erasing UDS.KEYID = 0
8,499,300 UART: [idev] Sha1 KeyId Algorithm
8,521,239 UART: [idev] --
8,523,733 UART: [ldev] ++
8,524,345 UART: [ldev] CDI.KEYID = 6
8,525,452 UART: [ldev] SUBJECT.KEYID = 5
8,526,908 UART: [ldev] AUTHORITY.KEYID = 7
8,528,578 UART: [ldev] FE.KEYID = 1
8,538,576 UART: [ldev] Erasing FE.KEYID = 1
11,827,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,058 UART: [ldev] --
14,194,050 UART: [fwproc] Wait for Commands...
14,196,333 UART: [fwproc] Recv command 0x46574c44
14,198,603 UART: [fwproc] Recv'd Img size: 114036 bytes
15,588,402 UART: ROM Fatal Error: 0x000B000D
15,591,815 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,025,837 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,411,040 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,023,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,170 UART:
2,168,558 UART: Running Caliptra ROM ...
2,169,644 UART:
2,169,798 UART: [state] CFI Enabled
2,170,772 UART: [state] LifecycleState = Unprovisioned
2,172,429 UART: [state] DebugLocked = No
2,173,457 UART: [state] WD Timer not started. Device not locked for debugging
2,175,916 UART: [kat] SHA2-256
2,176,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,608 UART: [kat] ++
2,180,058 UART: [kat] sha1
2,180,609 UART: [kat] SHA2-256
2,181,268 UART: [kat] SHA2-384
2,181,924 UART: [kat] SHA2-512-ACC
2,182,722 UART: [kat] ECC-384
2,948,445 UART: [kat] HMAC-384Kdf
2,970,758 UART: [kat] LMS
3,500,217 UART: [kat] --
3,506,902 UART: [cold-reset] ++
3,508,992 UART: [fht] FHT @ 0x50003400
3,520,032 UART: [idev] ++
3,520,602 UART: [idev] CDI.KEYID = 6
3,521,528 UART: [idev] SUBJECT.KEYID = 7
3,522,690 UART: [idev] UDS.KEYID = 0
3,542,464 UART: [idev] Erasing UDS.KEYID = 0
6,027,509 UART: [idev] Sha1 KeyId Algorithm
6,051,511 UART: [idev] --
6,055,022 UART: [ldev] ++
6,055,600 UART: [ldev] CDI.KEYID = 6
6,056,510 UART: [ldev] SUBJECT.KEYID = 5
6,057,672 UART: [ldev] AUTHORITY.KEYID = 7
6,058,966 UART: [ldev] FE.KEYID = 1
6,098,886 UART: [ldev] Erasing FE.KEYID = 1
8,599,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,754 UART: [ldev] --
10,392,284 UART: [fwproc] Wait for Commands...
10,395,210 UART: [fwproc] Recv command 0x46574c44
10,397,306 UART: [fwproc] Recv'd Img size: 114360 bytes
11,465,135 UART: ROM Fatal Error: 0x000B000D
11,468,537 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
2,024,952 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,667 UART:
2,170,069 UART: Running Caliptra ROM ...
2,171,154 UART:
2,171,309 UART: [state] CFI Enabled
2,172,222 UART: [state] LifecycleState = Unprovisioned
2,173,878 UART: [state] DebugLocked = No
2,174,905 UART: [state] WD Timer not started. Device not locked for debugging
2,177,369 UART: [kat] SHA2-256
2,178,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,036 UART: [kat] ++
2,181,482 UART: [kat] sha1
2,182,013 UART: [kat] SHA2-256
2,182,674 UART: [kat] SHA2-384
2,183,327 UART: [kat] SHA2-512-ACC
2,184,149 UART: [kat] ECC-384
2,947,811 UART: [kat] HMAC-384Kdf
2,970,749 UART: [kat] LMS
3,500,221 UART: [kat] --
3,503,651 UART: [cold-reset] ++
3,505,978 UART: [fht] FHT @ 0x50003400
3,517,069 UART: [idev] ++
3,517,639 UART: [idev] CDI.KEYID = 6
3,518,544 UART: [idev] SUBJECT.KEYID = 7
3,519,759 UART: [idev] UDS.KEYID = 0
3,542,217 UART: [idev] Erasing UDS.KEYID = 0
6,026,164 UART: [idev] Sha1 KeyId Algorithm
6,048,534 UART: [idev] --
6,052,879 UART: [ldev] ++
6,053,464 UART: [ldev] CDI.KEYID = 6
6,054,372 UART: [ldev] SUBJECT.KEYID = 5
6,055,540 UART: [ldev] AUTHORITY.KEYID = 7
6,056,773 UART: [ldev] FE.KEYID = 1
6,098,663 UART: [ldev] Erasing FE.KEYID = 1
8,599,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,194 UART: [ldev] --
10,410,222 UART: [fwproc] Wait for Commands...
10,412,002 UART: [fwproc] Recv command 0x46574c44
10,414,110 UART: [fwproc] Recv'd Img size: 114360 bytes
11,483,173 UART: ROM Fatal Error: 0x000B000D
11,486,260 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,023,202 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,251,612 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
2,024,681 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,723 UART:
2,170,146 UART: Running Caliptra ROM ...
2,171,317 UART:
2,171,486 UART: [state] CFI Enabled
2,172,446 UART: [state] LifecycleState = Unprovisioned
2,174,093 UART: [state] DebugLocked = No
2,175,198 UART: [state] WD Timer not started. Device not locked for debugging
2,177,661 UART: [kat] SHA2-256
2,178,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,319 UART: [kat] ++
2,181,768 UART: [kat] sha1
2,182,278 UART: [kat] SHA2-256
2,183,017 UART: [kat] SHA2-384
2,183,683 UART: [kat] SHA2-512-ACC
2,184,525 UART: [kat] ECC-384
3,280,729 UART: [kat] HMAC-384Kdf
3,294,568 UART: [kat] LMS
3,824,050 UART: [kat] --
3,830,097 UART: [cold-reset] ++
3,831,540 UART: [fht] FHT @ 0x50003400
3,842,844 UART: [idev] ++
3,843,410 UART: [idev] CDI.KEYID = 6
3,844,318 UART: [idev] SUBJECT.KEYID = 7
3,845,527 UART: [idev] UDS.KEYID = 0
3,861,977 UART: [idev] Erasing UDS.KEYID = 0
6,319,225 UART: [idev] Sha1 KeyId Algorithm
6,342,784 UART: [idev] --
6,345,325 UART: [ldev] ++
6,345,891 UART: [ldev] CDI.KEYID = 6
6,346,774 UART: [ldev] SUBJECT.KEYID = 5
6,347,983 UART: [ldev] AUTHORITY.KEYID = 7
6,349,211 UART: [ldev] FE.KEYID = 1
6,360,341 UART: [ldev] Erasing FE.KEYID = 1
8,834,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,713 UART: [ldev] --
10,624,583 UART: [fwproc] Wait for Commands...
10,626,625 UART: [fwproc] Recv command 0x46574c44
10,628,720 UART: [fwproc] Recv'd Img size: 114360 bytes
11,702,964 UART: ROM Fatal Error: 0x000B000D
11,706,065 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,023,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,470,657 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,589 UART: [idev] ++
1,172,757 UART: [idev] CDI.KEYID = 6
1,173,118 UART: [idev] SUBJECT.KEYID = 7
1,173,543 UART: [idev] UDS.KEYID = 0
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,123 UART: [idev] Sha1 KeyId Algorithm
1,206,959 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,400 UART: [ldev] Erasing FE.KEYID = 1
1,240,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,548 UART: [ldev] --
1,279,872 UART: [fwproc] Wait for Commands...
1,280,681 UART: [fwproc] Recv command 0x46574c44
1,281,414 UART: [fwproc] Recv'd Img size: 114360 bytes
1,319,009 UART: ROM Fatal Error: 0x000B000D
1,320,168 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,172,841 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,975 UART: [kat] LMS
1,169,287 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,514 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,198,798 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,689 UART: [ldev] ++
1,208,857 UART: [ldev] CDI.KEYID = 6
1,209,221 UART: [ldev] SUBJECT.KEYID = 5
1,209,648 UART: [ldev] AUTHORITY.KEYID = 7
1,210,111 UART: [ldev] FE.KEYID = 1
1,215,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,623 UART: [ldev] --
1,281,099 UART: [fwproc] Wait for Commands...
1,281,862 UART: [fwproc] Recv command 0x46574c44
1,282,595 UART: [fwproc] Recv'd Img size: 114360 bytes
1,320,866 UART: ROM Fatal Error: 0x000B000D
1,322,025 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,174,580 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,308 UART: [kat] LMS
1,168,620 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,763 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,532 UART: [ldev] ++
1,208,700 UART: [ldev] CDI.KEYID = 6
1,209,064 UART: [ldev] SUBJECT.KEYID = 5
1,209,491 UART: [ldev] AUTHORITY.KEYID = 7
1,209,954 UART: [ldev] FE.KEYID = 1
1,215,378 UART: [ldev] Erasing FE.KEYID = 1
1,241,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,030 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,033 UART: [fwproc] Recv command 0x46574c44
1,282,766 UART: [fwproc] Recv'd Img size: 114360 bytes
1,320,455 UART: ROM Fatal Error: 0x000B000D
1,321,614 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,173,245 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
915,617 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,408 UART: [cold-reset] ++
1,169,858 UART: [fht] FHT @ 0x50003400
1,172,502 UART: [idev] ++
1,172,670 UART: [idev] CDI.KEYID = 6
1,173,031 UART: [idev] SUBJECT.KEYID = 7
1,173,456 UART: [idev] UDS.KEYID = 0
1,181,456 UART: [idev] Erasing UDS.KEYID = 0
1,198,450 UART: [idev] Sha1 KeyId Algorithm
1,207,294 UART: [idev] --
1,208,217 UART: [ldev] ++
1,208,385 UART: [ldev] CDI.KEYID = 6
1,208,749 UART: [ldev] SUBJECT.KEYID = 5
1,209,176 UART: [ldev] AUTHORITY.KEYID = 7
1,209,639 UART: [ldev] FE.KEYID = 1
1,214,737 UART: [ldev] Erasing FE.KEYID = 1
1,240,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,955 UART: [ldev] --
1,280,341 UART: [fwproc] Wait for Commands...
1,280,976 UART: [fwproc] Recv command 0x46574c44
1,281,709 UART: [fwproc] Recv'd Img size: 114360 bytes
1,319,390 UART: ROM Fatal Error: 0x000B000D
1,320,549 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,175,828 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,204 UART: [kat] LMS
1,168,516 UART: [kat] --
1,169,359 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,623 UART: [idev] ++
1,172,791 UART: [idev] CDI.KEYID = 6
1,173,152 UART: [idev] SUBJECT.KEYID = 7
1,173,577 UART: [idev] UDS.KEYID = 0
1,181,373 UART: [idev] Erasing UDS.KEYID = 0
1,198,107 UART: [idev] Sha1 KeyId Algorithm
1,206,941 UART: [idev] --
1,208,034 UART: [ldev] ++
1,208,202 UART: [ldev] CDI.KEYID = 6
1,208,566 UART: [ldev] SUBJECT.KEYID = 5
1,208,993 UART: [ldev] AUTHORITY.KEYID = 7
1,209,456 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,364 UART: [ldev] --
1,280,656 UART: [fwproc] Wait for Commands...
1,281,339 UART: [fwproc] Recv command 0x46574c44
1,282,072 UART: [fwproc] Recv'd Img size: 114360 bytes
1,319,479 UART: ROM Fatal Error: 0x000B000D
1,320,638 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,172,495 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,375 UART: [kat] SHA2-256
890,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,488 UART: [kat] SHA2-256
901,428 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,818 UART: [idev] Sha1 KeyId Algorithm
1,207,926 UART: [idev] --
1,208,893 UART: [ldev] ++
1,209,061 UART: [ldev] CDI.KEYID = 6
1,209,425 UART: [ldev] SUBJECT.KEYID = 5
1,209,852 UART: [ldev] AUTHORITY.KEYID = 7
1,210,315 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,335 UART: [ldev] --
1,281,611 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,953 UART: [fwproc] Recv'd Img size: 114360 bytes
1,321,434 UART: ROM Fatal Error: 0x000B000D
1,322,593 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,174,483 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,021,209 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,229 UART:
2,165,635 UART: Running Caliptra ROM ...
2,166,805 UART:
2,166,981 UART: [state] CFI Enabled
2,167,974 UART: [state] LifecycleState = Unprovisioned
2,169,630 UART: [state] DebugLocked = No
2,170,739 UART: [state] WD Timer not started. Device not locked for debugging
2,173,209 UART: [kat] SHA2-256
2,173,875 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,881 UART: [kat] ++
2,177,330 UART: [kat] sha1
2,177,923 UART: [kat] SHA2-256
2,178,588 UART: [kat] SHA2-384
2,179,244 UART: [kat] SHA2-512-ACC
2,180,125 UART: [kat] ECC-384
3,776,517 UART: [kat] HMAC-384Kdf
3,803,209 UART: [kat] LMS
4,876,374 UART: [kat] --
4,879,070 UART: [cold-reset] ++
4,881,382 UART: [fht] FHT @ 0x50003400
4,891,783 UART: [idev] ++
4,892,454 UART: [idev] CDI.KEYID = 6
4,893,614 UART: [idev] SUBJECT.KEYID = 7
4,894,822 UART: [idev] UDS.KEYID = 0
4,929,026 UART: [idev] Erasing UDS.KEYID = 0
8,242,594 UART: [idev] Sha1 KeyId Algorithm
8,265,234 UART: [idev] --
8,268,743 UART: [ldev] ++
8,269,310 UART: [ldev] CDI.KEYID = 6
8,270,541 UART: [ldev] SUBJECT.KEYID = 5
8,271,704 UART: [ldev] AUTHORITY.KEYID = 7
8,272,876 UART: [ldev] FE.KEYID = 1
8,315,410 UART: [ldev] Erasing FE.KEYID = 1
11,648,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,187 UART: [ldev] --
14,035,154 UART: [fwproc] Wait for Commands...
14,037,357 UART: [fwproc] Recv command 0x46574c44
14,039,685 UART: [fwproc] Recv'd Img size: 114036 bytes
18,109,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,185,271 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,254,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,571,171 >>> mbox cmd response: success
18,574,962 UART: [afmc] ++
18,575,544 UART: [afmc] CDI.KEYID = 6
18,576,785 UART: [afmc] SUBJECT.KEYID = 7
18,577,889 UART: [afmc] AUTHORITY.KEYID = 5
21,942,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,237,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,239,909 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,256,061 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,272,133 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,288,092 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,310,855 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
2,025,336 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,329,542 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,023,601 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,167,595 UART:
2,168,011 UART: Running Caliptra ROM ...
2,169,089 UART:
2,169,243 UART: [state] CFI Enabled
2,170,156 UART: [state] LifecycleState = Unprovisioned
2,171,803 UART: [state] DebugLocked = No
2,172,825 UART: [state] WD Timer not started. Device not locked for debugging
2,175,287 UART: [kat] SHA2-256
2,175,944 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,947 UART: [kat] ++
2,179,389 UART: [kat] sha1
2,179,889 UART: [kat] SHA2-256
2,180,538 UART: [kat] SHA2-384
2,181,280 UART: [kat] SHA2-512-ACC
2,182,083 UART: [kat] ECC-384
4,099,239 UART: [kat] HMAC-384Kdf
4,110,885 UART: [kat] LMS
5,184,078 UART: [kat] --
5,188,679 UART: [cold-reset] ++
5,191,311 UART: [fht] FHT @ 0x50003400
5,202,282 UART: [idev] ++
5,202,949 UART: [idev] CDI.KEYID = 6
5,204,099 UART: [idev] SUBJECT.KEYID = 7
5,205,577 UART: [idev] UDS.KEYID = 0
5,221,953 UART: [idev] Erasing UDS.KEYID = 0
8,494,389 UART: [idev] Sha1 KeyId Algorithm
8,516,323 UART: [idev] --
8,519,320 UART: [ldev] ++
8,519,889 UART: [ldev] CDI.KEYID = 6
8,521,125 UART: [ldev] SUBJECT.KEYID = 5
8,522,569 UART: [ldev] AUTHORITY.KEYID = 7
8,524,070 UART: [ldev] FE.KEYID = 1
8,534,181 UART: [ldev] Erasing FE.KEYID = 1
11,824,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,695 UART: [ldev] --
14,190,864 UART: [fwproc] Wait for Commands...
14,193,543 UART: [fwproc] Recv command 0x46574c44
14,195,869 UART: [fwproc] Recv'd Img size: 114036 bytes
18,273,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,348,131 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,416,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,733,662 >>> mbox cmd response: success
18,738,474 UART: [afmc] ++
18,739,082 UART: [afmc] CDI.KEYID = 6
18,740,266 UART: [afmc] SUBJECT.KEYID = 7
18,741,414 UART: [afmc] AUTHORITY.KEYID = 5
22,055,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,350,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,352,379 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,368,581 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,384,601 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,400,615 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,424,622 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,023,021 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,543,566 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,028,941 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,173,422 UART:
2,173,834 UART: Running Caliptra ROM ...
2,174,999 UART:
2,175,168 UART: [state] CFI Enabled
2,176,140 UART: [state] LifecycleState = Unprovisioned
2,177,783 UART: [state] DebugLocked = No
2,178,892 UART: [state] WD Timer not started. Device not locked for debugging
2,181,358 UART: [kat] SHA2-256
2,182,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,249 UART: [kat] ++
2,185,709 UART: [kat] sha1
2,186,227 UART: [kat] SHA2-256
2,186,972 UART: [kat] SHA2-384
2,187,657 UART: [kat] SHA2-512-ACC
2,188,507 UART: [kat] ECC-384
2,946,958 UART: [kat] HMAC-384Kdf
2,971,167 UART: [kat] LMS
3,500,608 UART: [kat] --
3,506,434 UART: [cold-reset] ++
3,508,690 UART: [fht] FHT @ 0x50003400
3,520,532 UART: [idev] ++
3,521,096 UART: [idev] CDI.KEYID = 6
3,522,006 UART: [idev] SUBJECT.KEYID = 7
3,523,176 UART: [idev] UDS.KEYID = 0
3,541,807 UART: [idev] Erasing UDS.KEYID = 0
6,023,289 UART: [idev] Sha1 KeyId Algorithm
6,045,420 UART: [idev] --
6,050,344 UART: [ldev] ++
6,050,920 UART: [ldev] CDI.KEYID = 6
6,051,852 UART: [ldev] SUBJECT.KEYID = 5
6,053,020 UART: [ldev] AUTHORITY.KEYID = 7
6,054,336 UART: [ldev] FE.KEYID = 1
6,098,885 UART: [ldev] Erasing FE.KEYID = 1
8,605,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,725 UART: [ldev] --
10,412,071 UART: [fwproc] Wait for Commands...
10,415,039 UART: [fwproc] Recv command 0x46574c44
10,417,087 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,276,874 >>> mbox cmd response: success
14,281,036 UART: [afmc] ++
14,281,634 UART: [afmc] CDI.KEYID = 6
14,282,522 UART: [afmc] SUBJECT.KEYID = 7
14,283,735 UART: [afmc] AUTHORITY.KEYID = 5
16,809,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,647 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,026,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,170,832 UART:
2,171,229 UART: Running Caliptra ROM ...
2,172,525 UART:
2,172,700 UART: [state] CFI Enabled
2,173,676 UART: [state] LifecycleState = Unprovisioned
2,175,326 UART: [state] DebugLocked = No
2,176,434 UART: [state] WD Timer not started. Device not locked for debugging
2,178,902 UART: [kat] SHA2-256
2,179,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,571 UART: [kat] ++
2,183,018 UART: [kat] sha1
2,183,533 UART: [kat] SHA2-256
2,184,270 UART: [kat] SHA2-384
2,184,955 UART: [kat] SHA2-512-ACC
2,185,799 UART: [kat] ECC-384
2,945,268 UART: [kat] HMAC-384Kdf
2,970,781 UART: [kat] LMS
3,500,242 UART: [kat] --
3,503,719 UART: [cold-reset] ++
3,505,120 UART: [fht] FHT @ 0x50003400
3,516,214 UART: [idev] ++
3,516,780 UART: [idev] CDI.KEYID = 6
3,517,741 UART: [idev] SUBJECT.KEYID = 7
3,518,899 UART: [idev] UDS.KEYID = 0
3,543,410 UART: [idev] Erasing UDS.KEYID = 0
6,025,933 UART: [idev] Sha1 KeyId Algorithm
6,048,730 UART: [idev] --
6,052,490 UART: [ldev] ++
6,053,072 UART: [ldev] CDI.KEYID = 6
6,054,014 UART: [ldev] SUBJECT.KEYID = 5
6,055,188 UART: [ldev] AUTHORITY.KEYID = 7
6,056,427 UART: [ldev] FE.KEYID = 1
6,097,700 UART: [ldev] Erasing FE.KEYID = 1
8,599,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,799 UART: [ldev] --
10,390,473 UART: [fwproc] Wait for Commands...
10,392,356 UART: [fwproc] Recv command 0x46574c44
10,394,457 UART: [fwproc] Recv'd Img size: 114360 bytes
13,797,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,254,582 >>> mbox cmd response: success
14,258,427 UART: [afmc] ++
14,259,012 UART: [afmc] CDI.KEYID = 6
14,259,927 UART: [afmc] SUBJECT.KEYID = 7
14,261,091 UART: [afmc] AUTHORITY.KEYID = 5
16,806,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,663 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
2,023,736 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,038,947 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,022,551 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,021 UART:
2,167,428 UART: Running Caliptra ROM ...
2,168,609 UART:
2,168,783 UART: [state] CFI Enabled
2,169,749 UART: [state] LifecycleState = Unprovisioned
2,171,389 UART: [state] DebugLocked = No
2,172,491 UART: [state] WD Timer not started. Device not locked for debugging
2,174,957 UART: [kat] SHA2-256
2,175,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,619 UART: [kat] ++
2,179,069 UART: [kat] sha1
2,179,586 UART: [kat] SHA2-256
2,180,322 UART: [kat] SHA2-384
2,181,011 UART: [kat] SHA2-512-ACC
2,181,897 UART: [kat] ECC-384
3,279,116 UART: [kat] HMAC-384Kdf
3,290,652 UART: [kat] LMS
3,820,141 UART: [kat] --
3,823,588 UART: [cold-reset] ++
3,825,891 UART: [fht] FHT @ 0x50003400
3,837,673 UART: [idev] ++
3,838,272 UART: [idev] CDI.KEYID = 6
3,839,193 UART: [idev] SUBJECT.KEYID = 7
3,840,353 UART: [idev] UDS.KEYID = 0
3,854,705 UART: [idev] Erasing UDS.KEYID = 0
6,312,212 UART: [idev] Sha1 KeyId Algorithm
6,335,689 UART: [idev] --
6,338,985 UART: [ldev] ++
6,339,550 UART: [ldev] CDI.KEYID = 6
6,340,451 UART: [ldev] SUBJECT.KEYID = 5
6,341,667 UART: [ldev] AUTHORITY.KEYID = 7
6,342,896 UART: [ldev] FE.KEYID = 1
6,353,620 UART: [ldev] Erasing FE.KEYID = 1
8,833,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,832 UART: [ldev] --
10,626,776 UART: [fwproc] Wait for Commands...
10,629,897 UART: [fwproc] Recv command 0x46574c44
10,632,042 UART: [fwproc] Recv'd Img size: 114360 bytes
14,038,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,502,527 >>> mbox cmd response: success
14,506,675 UART: [afmc] ++
14,507,267 UART: [afmc] CDI.KEYID = 6
14,508,182 UART: [afmc] SUBJECT.KEYID = 7
14,509,337 UART: [afmc] AUTHORITY.KEYID = 5
17,012,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,737,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,753,029 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,769,088 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,784,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,257 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,029,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,264,756 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
890,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,053 UART: [kat] ++
895,205 UART: [kat] sha1
899,299 UART: [kat] SHA2-256
901,239 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,646 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,181,351 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,143 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,456 UART: [ldev] Erasing FE.KEYID = 1
1,240,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,076 UART: [ldev] --
1,280,374 UART: [fwproc] Wait for Commands...
1,281,129 UART: [fwproc] Recv command 0x46574c44
1,281,862 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,374 >>> mbox cmd response: success
2,773,497 UART: [afmc] ++
2,773,665 UART: [afmc] CDI.KEYID = 6
2,774,028 UART: [afmc] SUBJECT.KEYID = 7
2,774,454 UART: [afmc] AUTHORITY.KEYID = 5
2,809,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,100 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,908 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,282,000 UART: [fwproc] Recv command 0x46574c44
1,282,733 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,521 >>> mbox cmd response: success
2,774,630 UART: [afmc] ++
2,774,798 UART: [afmc] CDI.KEYID = 6
2,775,161 UART: [afmc] SUBJECT.KEYID = 7
2,775,587 UART: [afmc] AUTHORITY.KEYID = 5
2,811,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,045 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,764 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,611 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,427 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,182,549 UART: [idev] Erasing UDS.KEYID = 0
1,199,869 UART: [idev] Sha1 KeyId Algorithm
1,208,707 UART: [idev] --
1,209,772 UART: [ldev] ++
1,209,940 UART: [ldev] CDI.KEYID = 6
1,210,304 UART: [ldev] SUBJECT.KEYID = 5
1,210,731 UART: [ldev] AUTHORITY.KEYID = 7
1,211,194 UART: [ldev] FE.KEYID = 1
1,216,440 UART: [ldev] Erasing FE.KEYID = 1
1,243,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,646 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,677 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,174 >>> mbox cmd response: success
2,777,323 UART: [afmc] ++
2,777,491 UART: [afmc] CDI.KEYID = 6
2,777,854 UART: [afmc] SUBJECT.KEYID = 7
2,778,280 UART: [afmc] AUTHORITY.KEYID = 5
2,813,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,394 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,730 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,624 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,688 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,550 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,337 >>> mbox cmd response: success
2,774,416 UART: [afmc] ++
2,774,584 UART: [afmc] CDI.KEYID = 6
2,774,947 UART: [afmc] SUBJECT.KEYID = 7
2,775,373 UART: [afmc] AUTHORITY.KEYID = 5
2,810,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,829 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,055 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,531 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,493 UART: [fht] FHT @ 0x50003400
1,173,233 UART: [idev] ++
1,173,401 UART: [idev] CDI.KEYID = 6
1,173,762 UART: [idev] SUBJECT.KEYID = 7
1,174,187 UART: [idev] UDS.KEYID = 0
1,182,261 UART: [idev] Erasing UDS.KEYID = 0
1,199,649 UART: [idev] Sha1 KeyId Algorithm
1,208,629 UART: [idev] --
1,209,654 UART: [ldev] ++
1,209,822 UART: [ldev] CDI.KEYID = 6
1,210,186 UART: [ldev] SUBJECT.KEYID = 5
1,210,613 UART: [ldev] AUTHORITY.KEYID = 7
1,211,076 UART: [ldev] FE.KEYID = 1
1,216,260 UART: [ldev] Erasing FE.KEYID = 1
1,242,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,602 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,273 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,362 >>> mbox cmd response: success
2,775,525 UART: [afmc] ++
2,775,693 UART: [afmc] CDI.KEYID = 6
2,776,056 UART: [afmc] SUBJECT.KEYID = 7
2,776,482 UART: [afmc] AUTHORITY.KEYID = 5
2,811,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,050 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,720 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
915,787 UART: [kat] HMAC-384Kdf
920,511 UART: [kat] LMS
1,168,823 UART: [kat] --
1,169,876 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,207,892 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,937 UART: [ldev] --
1,282,363 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,795 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,413 >>> mbox cmd response: success
2,775,542 UART: [afmc] ++
2,775,710 UART: [afmc] CDI.KEYID = 6
2,776,073 UART: [afmc] SUBJECT.KEYID = 7
2,776,499 UART: [afmc] AUTHORITY.KEYID = 5
2,812,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,983 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,457 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
2,020,163 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,268 UART:
2,164,666 UART: Running Caliptra ROM ...
2,165,839 UART:
2,166,017 UART: [state] CFI Enabled
2,166,996 UART: [state] LifecycleState = Unprovisioned
2,168,719 UART: [state] DebugLocked = No
2,169,752 UART: [state] WD Timer not started. Device not locked for debugging
2,172,245 UART: [kat] SHA2-256
2,172,916 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,928 UART: [kat] ++
2,176,377 UART: [kat] sha1
2,176,973 UART: [kat] SHA2-256
2,177,640 UART: [kat] SHA2-384
2,178,480 UART: [kat] SHA2-512-ACC
2,179,369 UART: [kat] ECC-384
3,769,003 UART: [kat] HMAC-384Kdf
3,798,830 UART: [kat] LMS
4,872,001 UART: [kat] --
4,878,540 UART: [cold-reset] ++
4,881,259 UART: [fht] FHT @ 0x50003400
4,892,972 UART: [idev] ++
4,893,663 UART: [idev] CDI.KEYID = 6
4,894,849 UART: [idev] SUBJECT.KEYID = 7
4,896,037 UART: [idev] UDS.KEYID = 0
4,927,114 UART: [idev] Erasing UDS.KEYID = 0
8,240,774 UART: [idev] Sha1 KeyId Algorithm
8,261,036 UART: [idev] --
8,264,815 UART: [ldev] ++
8,265,377 UART: [ldev] CDI.KEYID = 6
8,266,619 UART: [ldev] SUBJECT.KEYID = 5
8,267,646 UART: [ldev] AUTHORITY.KEYID = 7
8,268,944 UART: [ldev] FE.KEYID = 1
8,312,889 UART: [ldev] Erasing FE.KEYID = 1
11,648,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,975,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,991,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,007,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,027,801 UART: [ldev] --
14,033,252 UART: [fwproc] Wait for Commands...
14,036,494 UART: [fwproc] Recv command 0x46574c44
14,038,763 UART: [fwproc] Recv'd Img size: 114036 bytes
17,498,862 UART: ROM Fatal Error: 0x000B0030
17,501,983 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,020,112 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,262,719 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,023,459 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,167,406 UART:
2,167,813 UART: Running Caliptra ROM ...
2,168,978 UART:
2,169,143 UART: [state] CFI Enabled
2,170,145 UART: [state] LifecycleState = Unprovisioned
2,171,792 UART: [state] DebugLocked = No
2,172,895 UART: [state] WD Timer not started. Device not locked for debugging
2,175,356 UART: [kat] SHA2-256
2,176,020 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,028 UART: [kat] ++
2,179,476 UART: [kat] sha1
2,179,982 UART: [kat] SHA2-256
2,180,714 UART: [kat] SHA2-384
2,182,158 UART: [kat] SHA2-512-ACC
2,183,075 UART: [kat] ECC-384
4,096,664 UART: [kat] HMAC-384Kdf
4,108,235 UART: [kat] LMS
5,181,370 UART: [kat] --
5,186,590 UART: [cold-reset] ++
5,188,534 UART: [fht] FHT @ 0x50003400
5,200,450 UART: [idev] ++
5,201,121 UART: [idev] CDI.KEYID = 6
5,202,279 UART: [idev] SUBJECT.KEYID = 7
5,203,752 UART: [idev] UDS.KEYID = 0
5,222,436 UART: [idev] Erasing UDS.KEYID = 0
8,497,453 UART: [idev] Sha1 KeyId Algorithm
8,520,043 UART: [idev] --
8,524,184 UART: [ldev] ++
8,524,753 UART: [ldev] CDI.KEYID = 6
8,525,911 UART: [ldev] SUBJECT.KEYID = 5
8,527,445 UART: [ldev] AUTHORITY.KEYID = 7
8,528,923 UART: [ldev] FE.KEYID = 1
8,540,649 UART: [ldev] Erasing FE.KEYID = 1
11,833,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,896 UART: [ldev] --
14,198,142 UART: [fwproc] Wait for Commands...
14,200,290 UART: [fwproc] Recv command 0x46574c44
14,202,611 UART: [fwproc] Recv'd Img size: 114036 bytes
17,456,154 UART: ROM Fatal Error: 0x000B0030
17,459,280 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
2,031,481 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,457,192 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,034,400 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,179,228 UART:
2,179,635 UART: Running Caliptra ROM ...
2,180,726 UART:
2,180,882 UART: [state] CFI Enabled
2,181,856 UART: [state] LifecycleState = Unprovisioned
2,183,506 UART: [state] DebugLocked = No
2,184,532 UART: [state] WD Timer not started. Device not locked for debugging
2,186,998 UART: [kat] SHA2-256
2,187,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,190,662 UART: [kat] ++
2,191,117 UART: [kat] sha1
2,191,631 UART: [kat] SHA2-256
2,192,287 UART: [kat] SHA2-384
2,192,941 UART: [kat] SHA2-512-ACC
2,193,739 UART: [kat] ECC-384
2,944,163 UART: [kat] HMAC-384Kdf
2,969,464 UART: [kat] LMS
3,498,919 UART: [kat] --
3,501,953 UART: [cold-reset] ++
3,503,576 UART: [fht] FHT @ 0x50003400
3,514,560 UART: [idev] ++
3,515,127 UART: [idev] CDI.KEYID = 6
3,516,101 UART: [idev] SUBJECT.KEYID = 7
3,517,260 UART: [idev] UDS.KEYID = 0
3,542,093 UART: [idev] Erasing UDS.KEYID = 0
6,019,498 UART: [idev] Sha1 KeyId Algorithm
6,043,432 UART: [idev] --
6,046,996 UART: [ldev] ++
6,047,569 UART: [ldev] CDI.KEYID = 6
6,048,479 UART: [ldev] SUBJECT.KEYID = 5
6,049,729 UART: [ldev] AUTHORITY.KEYID = 7
6,050,932 UART: [ldev] FE.KEYID = 1
6,097,415 UART: [ldev] Erasing FE.KEYID = 1
8,601,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,449 UART: [ldev] --
10,411,500 UART: [fwproc] Wait for Commands...
10,414,246 UART: [fwproc] Recv command 0x46574c44
10,416,342 UART: [fwproc] Recv'd Img size: 114360 bytes
12,057,453 UART: ROM Fatal Error: 0x000B0030
12,060,525 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,021,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,222 UART:
2,166,635 UART: Running Caliptra ROM ...
2,167,804 UART:
2,167,977 UART: [state] CFI Enabled
2,168,942 UART: [state] LifecycleState = Unprovisioned
2,170,589 UART: [state] DebugLocked = No
2,171,697 UART: [state] WD Timer not started. Device not locked for debugging
2,174,165 UART: [kat] SHA2-256
2,174,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,836 UART: [kat] ++
2,178,284 UART: [kat] sha1
2,178,817 UART: [kat] SHA2-256
2,179,477 UART: [kat] SHA2-384
2,180,166 UART: [kat] SHA2-512-ACC
2,180,965 UART: [kat] ECC-384
2,944,662 UART: [kat] HMAC-384Kdf
2,969,577 UART: [kat] LMS
3,499,058 UART: [kat] --
3,503,677 UART: [cold-reset] ++
3,505,027 UART: [fht] FHT @ 0x50003400
3,515,580 UART: [idev] ++
3,516,146 UART: [idev] CDI.KEYID = 6
3,517,082 UART: [idev] SUBJECT.KEYID = 7
3,518,297 UART: [idev] UDS.KEYID = 0
3,540,999 UART: [idev] Erasing UDS.KEYID = 0
6,024,210 UART: [idev] Sha1 KeyId Algorithm
6,046,827 UART: [idev] --
6,051,526 UART: [ldev] ++
6,052,110 UART: [ldev] CDI.KEYID = 6
6,053,026 UART: [ldev] SUBJECT.KEYID = 5
6,054,194 UART: [ldev] AUTHORITY.KEYID = 7
6,055,479 UART: [ldev] FE.KEYID = 1
6,096,534 UART: [ldev] Erasing FE.KEYID = 1
8,604,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,190 UART: [ldev] --
10,409,572 UART: [fwproc] Wait for Commands...
10,411,508 UART: [fwproc] Recv command 0x46574c44
10,413,604 UART: [fwproc] Recv'd Img size: 114360 bytes
12,071,090 UART: ROM Fatal Error: 0x000B0030
12,074,226 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,022,744 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,760,705 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,023,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,305 UART:
2,168,714 UART: Running Caliptra ROM ...
2,169,851 UART:
2,170,017 UART: [state] CFI Enabled
2,170,999 UART: [state] LifecycleState = Unprovisioned
2,172,658 UART: [state] DebugLocked = No
2,173,682 UART: [state] WD Timer not started. Device not locked for debugging
2,176,141 UART: [kat] SHA2-256
2,176,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,790 UART: [kat] ++
2,180,235 UART: [kat] sha1
2,180,763 UART: [kat] SHA2-256
2,181,421 UART: [kat] SHA2-384
2,182,080 UART: [kat] SHA2-512-ACC
2,182,906 UART: [kat] ECC-384
3,279,327 UART: [kat] HMAC-384Kdf
3,290,940 UART: [kat] LMS
3,820,462 UART: [kat] --
3,825,048 UART: [cold-reset] ++
3,826,600 UART: [fht] FHT @ 0x50003400
3,837,202 UART: [idev] ++
3,837,764 UART: [idev] CDI.KEYID = 6
3,838,674 UART: [idev] SUBJECT.KEYID = 7
3,839,887 UART: [idev] UDS.KEYID = 0
3,856,510 UART: [idev] Erasing UDS.KEYID = 0
6,316,945 UART: [idev] Sha1 KeyId Algorithm
6,339,373 UART: [idev] --
6,343,657 UART: [ldev] ++
6,344,222 UART: [ldev] CDI.KEYID = 6
6,345,158 UART: [ldev] SUBJECT.KEYID = 5
6,346,315 UART: [ldev] AUTHORITY.KEYID = 7
6,347,601 UART: [ldev] FE.KEYID = 1
6,356,834 UART: [ldev] Erasing FE.KEYID = 1
8,828,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,677 UART: [ldev] --
10,619,803 UART: [fwproc] Wait for Commands...
10,622,925 UART: [fwproc] Recv command 0x46574c44
10,624,972 UART: [fwproc] Recv'd Img size: 114360 bytes
12,258,996 UART: ROM Fatal Error: 0x000B0030
12,262,113 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,021,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,967,901 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,322 UART: [ldev] ++
1,208,490 UART: [ldev] CDI.KEYID = 6
1,208,854 UART: [ldev] SUBJECT.KEYID = 5
1,209,281 UART: [ldev] AUTHORITY.KEYID = 7
1,209,744 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,292 UART: [ldev] --
1,280,720 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 114360 bytes
1,592,701 UART: ROM Fatal Error: 0x000B0030
1,593,858 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,448,484 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
891,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,034 UART: [kat] ++
896,186 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
916,985 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,170,890 UART: [cold-reset] ++
1,171,356 UART: [fht] FHT @ 0x50003400
1,173,984 UART: [idev] ++
1,174,152 UART: [idev] CDI.KEYID = 6
1,174,513 UART: [idev] SUBJECT.KEYID = 7
1,174,938 UART: [idev] UDS.KEYID = 0
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,580 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,853 UART: [ldev] --
1,281,141 UART: [fwproc] Wait for Commands...
1,281,880 UART: [fwproc] Recv command 0x46574c44
1,282,613 UART: [fwproc] Recv'd Img size: 114360 bytes
1,597,420 UART: ROM Fatal Error: 0x000B0030
1,598,577 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,444,008 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,182 UART: [kat] SHA2-256
890,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,861 UART: [kat] ++
895,013 UART: [kat] sha1
899,231 UART: [kat] SHA2-256
901,171 UART: [kat] SHA2-384
903,944 UART: [kat] SHA2-512-ACC
905,845 UART: [kat] ECC-384
915,222 UART: [kat] HMAC-384Kdf
919,672 UART: [kat] LMS
1,167,984 UART: [kat] --
1,168,967 UART: [cold-reset] ++
1,169,409 UART: [fht] FHT @ 0x50003400
1,172,113 UART: [idev] ++
1,172,281 UART: [idev] CDI.KEYID = 6
1,172,642 UART: [idev] SUBJECT.KEYID = 7
1,173,067 UART: [idev] UDS.KEYID = 0
1,180,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,465 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,098 UART: [ldev] ++
1,208,266 UART: [ldev] CDI.KEYID = 6
1,208,630 UART: [ldev] SUBJECT.KEYID = 5
1,209,057 UART: [ldev] AUTHORITY.KEYID = 7
1,209,520 UART: [ldev] FE.KEYID = 1
1,214,736 UART: [ldev] Erasing FE.KEYID = 1
1,240,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,300 UART: [ldev] --
1,279,640 UART: [fwproc] Wait for Commands...
1,280,231 UART: [fwproc] Recv command 0x46574c44
1,280,964 UART: [fwproc] Recv'd Img size: 114360 bytes
1,591,321 UART: ROM Fatal Error: 0x000B0030
1,592,478 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,454,598 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,760 UART: [idev] ++
1,173,928 UART: [idev] CDI.KEYID = 6
1,174,289 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,281,937 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 114360 bytes
1,593,460 UART: ROM Fatal Error: 0x000B0030
1,594,617 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,452,812 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,041 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
890,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,963 UART: [kat] ++
895,115 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
903,886 UART: [kat] SHA2-512-ACC
905,787 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,489 UART: [idev] Sha1 KeyId Algorithm
1,207,465 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,436 UART: [ldev] --
1,280,890 UART: [fwproc] Wait for Commands...
1,281,541 UART: [fwproc] Recv command 0x46574c44
1,282,274 UART: [fwproc] Recv'd Img size: 114360 bytes
1,598,800 UART: ROM Fatal Error: 0x000B0030
1,599,957 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,448,202 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,789 UART: [kat] HMAC-384Kdf
921,355 UART: [kat] LMS
1,169,667 UART: [kat] --
1,170,518 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,533 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,765 UART: [fwproc] Recv'd Img size: 114360 bytes
1,598,946 UART: ROM Fatal Error: 0x000B0030
1,600,103 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,454,491 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
5,723 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,249 UART:
192,644 UART: Running Caliptra ROM ...
193,749 UART:
193,896 UART: [state] CFI Enabled
263,600 UART: [state] LifecycleState = Unprovisioned
265,929 UART: [state] DebugLocked = No
268,329 UART: [state] WD Timer not started. Device not locked for debugging
272,218 UART: [kat] SHA2-256
454,164 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,660 UART: [kat] ++
466,164 UART: [kat] sha1
477,373 UART: [kat] SHA2-256
480,394 UART: [kat] SHA2-384
485,565 UART: [kat] SHA2-512-ACC
488,183 UART: [kat] ECC-384
3,777,898 UART: [kat] HMAC-384Kdf
3,804,348 UART: [kat] LMS
4,877,496 UART: [kat] --
4,883,129 UART: [cold-reset] ++
4,884,375 UART: [fht] FHT @ 0x50003400
4,895,256 UART: [idev] ++
4,895,929 UART: [idev] CDI.KEYID = 6
4,897,115 UART: [idev] SUBJECT.KEYID = 7
4,898,276 UART: [idev] UDS.KEYID = 0
4,930,979 UART: [idev] Erasing UDS.KEYID = 0
8,242,667 UART: [idev] Sha1 KeyId Algorithm
8,265,181 UART: [idev] --
8,268,962 UART: [ldev] ++
8,269,531 UART: [ldev] CDI.KEYID = 6
8,270,757 UART: [ldev] SUBJECT.KEYID = 5
8,271,942 UART: [ldev] AUTHORITY.KEYID = 7
8,273,145 UART: [ldev] FE.KEYID = 1
8,319,231 UART: [ldev] Erasing FE.KEYID = 1
11,653,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,464 UART: [ldev] --
14,041,954 UART: [fwproc] Wait for Commands...
14,043,783 UART: [fwproc] Recv command 0x46574c44
14,046,120 UART: [fwproc] Recv'd Img size: 114036 bytes
14,098,661 UART: ROM Fatal Error: 0x000B0001
14,102,049 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
5,652 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,879,525 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
6,416 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,391 UART:
192,799 UART: Running Caliptra ROM ...
193,983 UART:
603,541 UART: [state] CFI Enabled
615,586 UART: [state] LifecycleState = Unprovisioned
617,919 UART: [state] DebugLocked = No
620,749 UART: [state] WD Timer not started. Device not locked for debugging
625,538 UART: [kat] SHA2-256
807,551 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,096 UART: [kat] ++
819,599 UART: [kat] sha1
829,172 UART: [kat] SHA2-256
832,199 UART: [kat] SHA2-384
838,715 UART: [kat] SHA2-512-ACC
841,343 UART: [kat] ECC-384
4,098,529 UART: [kat] HMAC-384Kdf
4,111,435 UART: [kat] LMS
5,184,553 UART: [kat] --
5,189,872 UART: [cold-reset] ++
5,191,595 UART: [fht] FHT @ 0x50003400
5,202,849 UART: [idev] ++
5,203,528 UART: [idev] CDI.KEYID = 6
5,204,759 UART: [idev] SUBJECT.KEYID = 7
5,206,190 UART: [idev] UDS.KEYID = 0
5,225,189 UART: [idev] Erasing UDS.KEYID = 0
8,501,169 UART: [idev] Sha1 KeyId Algorithm
8,524,395 UART: [idev] --
8,529,283 UART: [ldev] ++
8,529,870 UART: [ldev] CDI.KEYID = 6
8,531,109 UART: [ldev] SUBJECT.KEYID = 5
8,532,543 UART: [ldev] AUTHORITY.KEYID = 7
8,534,104 UART: [ldev] FE.KEYID = 1
8,546,261 UART: [ldev] Erasing FE.KEYID = 1
11,834,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,789 UART: [ldev] --
14,199,728 UART: [fwproc] Wait for Commands...
14,201,228 UART: [fwproc] Recv command 0x46574c44
14,203,594 UART: [fwproc] Recv'd Img size: 114036 bytes
14,261,274 UART: ROM Fatal Error: 0x000B0001
14,264,657 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
6,220 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,068,257 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
5,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,228 UART:
192,625 UART: Running Caliptra ROM ...
193,788 UART:
193,943 UART: [state] CFI Enabled
261,450 UART: [state] LifecycleState = Unprovisioned
263,323 UART: [state] DebugLocked = No
265,520 UART: [state] WD Timer not started. Device not locked for debugging
269,480 UART: [kat] SHA2-256
448,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,146 UART: [kat] ++
460,678 UART: [kat] sha1
472,767 UART: [kat] SHA2-256
475,766 UART: [kat] SHA2-384
483,250 UART: [kat] SHA2-512-ACC
486,191 UART: [kat] ECC-384
2,948,602 UART: [kat] HMAC-384Kdf
2,971,974 UART: [kat] LMS
3,501,433 UART: [kat] --
3,505,967 UART: [cold-reset] ++
3,507,087 UART: [fht] FHT @ 0x50003400
3,519,256 UART: [idev] ++
3,519,831 UART: [idev] CDI.KEYID = 6
3,520,855 UART: [idev] SUBJECT.KEYID = 7
3,521,958 UART: [idev] UDS.KEYID = 0
3,543,929 UART: [idev] Erasing UDS.KEYID = 0
6,025,561 UART: [idev] Sha1 KeyId Algorithm
6,048,525 UART: [idev] --
6,051,572 UART: [ldev] ++
6,052,150 UART: [ldev] CDI.KEYID = 6
6,053,060 UART: [ldev] SUBJECT.KEYID = 5
6,054,230 UART: [ldev] AUTHORITY.KEYID = 7
6,055,465 UART: [ldev] FE.KEYID = 1
6,099,942 UART: [ldev] Erasing FE.KEYID = 1
8,636,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,372,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,388,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,404,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,420,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,440,363 UART: [ldev] --
10,445,799 UART: [fwproc] Wait for Commands...
10,448,172 UART: [fwproc] Recv command 0x46574c44
10,450,269 UART: [fwproc] Recv'd Img size: 114360 bytes
10,502,333 UART: ROM Fatal Error: 0x000B0001
10,505,447 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
5,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,358 UART:
192,738 UART: Running Caliptra ROM ...
193,859 UART:
194,006 UART: [state] CFI Enabled
264,177 UART: [state] LifecycleState = Unprovisioned
266,095 UART: [state] DebugLocked = No
268,511 UART: [state] WD Timer not started. Device not locked for debugging
272,580 UART: [kat] SHA2-256
451,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,274 UART: [kat] ++
463,807 UART: [kat] sha1
475,038 UART: [kat] SHA2-256
478,066 UART: [kat] SHA2-384
484,601 UART: [kat] SHA2-512-ACC
487,548 UART: [kat] ECC-384
2,948,445 UART: [kat] HMAC-384Kdf
2,970,684 UART: [kat] LMS
3,500,121 UART: [kat] --
3,504,398 UART: [cold-reset] ++
3,506,121 UART: [fht] FHT @ 0x50003400
3,517,371 UART: [idev] ++
3,517,975 UART: [idev] CDI.KEYID = 6
3,518,864 UART: [idev] SUBJECT.KEYID = 7
3,520,027 UART: [idev] UDS.KEYID = 0
3,542,545 UART: [idev] Erasing UDS.KEYID = 0
6,026,748 UART: [idev] Sha1 KeyId Algorithm
6,049,596 UART: [idev] --
6,054,837 UART: [ldev] ++
6,055,431 UART: [ldev] CDI.KEYID = 6
6,056,346 UART: [ldev] SUBJECT.KEYID = 5
6,057,509 UART: [ldev] AUTHORITY.KEYID = 7
6,058,796 UART: [ldev] FE.KEYID = 1
6,098,379 UART: [ldev] Erasing FE.KEYID = 1
8,600,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,152 UART: [ldev] --
10,411,461 UART: [fwproc] Wait for Commands...
10,414,487 UART: [fwproc] Recv command 0x46574c44
10,416,534 UART: [fwproc] Recv'd Img size: 114360 bytes
10,470,758 UART: ROM Fatal Error: 0x000B0001
10,473,867 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
5,180 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,257,120 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
6,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,390 UART:
192,768 UART: Running Caliptra ROM ...
193,843 UART:
603,668 UART: [state] CFI Enabled
618,927 UART: [state] LifecycleState = Unprovisioned
620,773 UART: [state] DebugLocked = No
623,017 UART: [state] WD Timer not started. Device not locked for debugging
626,650 UART: [kat] SHA2-256
805,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,337 UART: [kat] ++
817,870 UART: [kat] sha1
828,644 UART: [kat] SHA2-256
831,699 UART: [kat] SHA2-384
837,669 UART: [kat] SHA2-512-ACC
840,634 UART: [kat] ECC-384
3,278,842 UART: [kat] HMAC-384Kdf
3,290,595 UART: [kat] LMS
3,820,087 UART: [kat] --
3,824,176 UART: [cold-reset] ++
3,825,790 UART: [fht] FHT @ 0x50003400
3,836,500 UART: [idev] ++
3,837,142 UART: [idev] CDI.KEYID = 6
3,838,034 UART: [idev] SUBJECT.KEYID = 7
3,839,143 UART: [idev] UDS.KEYID = 0
3,856,280 UART: [idev] Erasing UDS.KEYID = 0
6,310,189 UART: [idev] Sha1 KeyId Algorithm
6,333,047 UART: [idev] --
6,336,938 UART: [ldev] ++
6,337,502 UART: [ldev] CDI.KEYID = 6
6,338,389 UART: [ldev] SUBJECT.KEYID = 5
6,339,600 UART: [ldev] AUTHORITY.KEYID = 7
6,340,890 UART: [ldev] FE.KEYID = 1
6,350,804 UART: [ldev] Erasing FE.KEYID = 1
8,823,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,948 UART: [ldev] --
10,615,253 UART: [fwproc] Wait for Commands...
10,618,103 UART: [fwproc] Recv command 0x46574c44
10,620,138 UART: [fwproc] Recv'd Img size: 114360 bytes
10,676,792 UART: ROM Fatal Error: 0x000B0001
10,679,897 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
6,161 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,463,831 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,332 UART: [state] LifecycleState = Unprovisioned
84,987 UART: [state] DebugLocked = No
85,565 UART: [state] WD Timer not started. Device not locked for debugging
86,902 UART: [kat] SHA2-256
890,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,581 UART: [kat] ++
894,733 UART: [kat] sha1
898,881 UART: [kat] SHA2-256
900,821 UART: [kat] SHA2-384
903,548 UART: [kat] SHA2-512-ACC
905,449 UART: [kat] ECC-384
914,774 UART: [kat] HMAC-384Kdf
919,446 UART: [kat] LMS
1,167,758 UART: [kat] --
1,169,059 UART: [cold-reset] ++
1,169,633 UART: [fht] FHT @ 0x50003400
1,172,277 UART: [idev] ++
1,172,445 UART: [idev] CDI.KEYID = 6
1,172,806 UART: [idev] SUBJECT.KEYID = 7
1,173,231 UART: [idev] UDS.KEYID = 0
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,066 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,129 UART: ROM Fatal Error: 0x000B0001
1,303,286 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,103 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,443 UART: [kat] SHA2-256
890,993 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,122 UART: [kat] ++
895,274 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
915,675 UART: [kat] HMAC-384Kdf
920,137 UART: [kat] LMS
1,168,449 UART: [kat] --
1,169,578 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,181,636 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,662 UART: [idev] --
1,208,859 UART: [ldev] ++
1,209,027 UART: [ldev] CDI.KEYID = 6
1,209,391 UART: [ldev] SUBJECT.KEYID = 5
1,209,818 UART: [ldev] AUTHORITY.KEYID = 7
1,210,281 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,241,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,321 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 114360 bytes
1,301,472 UART: ROM Fatal Error: 0x000B0001
1,302,629 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,550 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,319 UART: [idev] ++
1,173,487 UART: [idev] CDI.KEYID = 6
1,173,848 UART: [idev] SUBJECT.KEYID = 7
1,174,273 UART: [idev] UDS.KEYID = 0
1,182,231 UART: [idev] Erasing UDS.KEYID = 0
1,199,503 UART: [idev] Sha1 KeyId Algorithm
1,208,595 UART: [idev] --
1,209,842 UART: [ldev] ++
1,210,010 UART: [ldev] CDI.KEYID = 6
1,210,374 UART: [ldev] SUBJECT.KEYID = 5
1,210,801 UART: [ldev] AUTHORITY.KEYID = 7
1,211,264 UART: [ldev] FE.KEYID = 1
1,216,438 UART: [ldev] Erasing FE.KEYID = 1
1,242,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,600 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,683 UART: [fwproc] Recv command 0x46574c44
1,283,416 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,101 UART: ROM Fatal Error: 0x000B0001
1,304,258 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,861 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
905,101 UART: [kat] SHA2-512-ACC
907,002 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,814 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,847 UART: [ldev] ++
1,210,015 UART: [ldev] CDI.KEYID = 6
1,210,379 UART: [ldev] SUBJECT.KEYID = 5
1,210,806 UART: [ldev] AUTHORITY.KEYID = 7
1,211,269 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,557 UART: [fwproc] Wait for Commands...
1,283,232 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,118 UART: ROM Fatal Error: 0x000B0001
1,304,275 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,156,100 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,024 UART: [kat] LMS
1,168,336 UART: [kat] --
1,169,379 UART: [cold-reset] ++
1,169,891 UART: [fht] FHT @ 0x50003400
1,172,573 UART: [idev] ++
1,172,741 UART: [idev] CDI.KEYID = 6
1,173,102 UART: [idev] SUBJECT.KEYID = 7
1,173,527 UART: [idev] UDS.KEYID = 0
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] --
1,208,668 UART: [ldev] ++
1,208,836 UART: [ldev] CDI.KEYID = 6
1,209,200 UART: [ldev] SUBJECT.KEYID = 5
1,209,627 UART: [ldev] AUTHORITY.KEYID = 7
1,210,090 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114360 bytes
1,301,629 UART: ROM Fatal Error: 0x000B0001
1,302,786 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,307 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,571 UART: [kat] LMS
1,169,883 UART: [kat] --
1,170,874 UART: [cold-reset] ++
1,171,418 UART: [fht] FHT @ 0x50003400
1,174,120 UART: [idev] ++
1,174,288 UART: [idev] CDI.KEYID = 6
1,174,649 UART: [idev] SUBJECT.KEYID = 7
1,175,074 UART: [idev] UDS.KEYID = 0
1,183,120 UART: [idev] Erasing UDS.KEYID = 0
1,200,494 UART: [idev] Sha1 KeyId Algorithm
1,209,328 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,791 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,363 UART: [ldev] --
1,282,869 UART: [fwproc] Wait for Commands...
1,283,660 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,608 UART: ROM Fatal Error: 0x000B0001
1,304,765 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,156,154 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
6,472 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,045 UART:
192,426 UART: Running Caliptra ROM ...
193,535 UART:
193,684 UART: [state] CFI Enabled
266,775 UART: [state] LifecycleState = Unprovisioned
269,159 UART: [state] DebugLocked = No
271,255 UART: [state] WD Timer not started. Device not locked for debugging
275,563 UART: [kat] SHA2-256
457,491 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,034 UART: [kat] ++
469,575 UART: [kat] sha1
480,406 UART: [kat] SHA2-256
483,474 UART: [kat] SHA2-384
487,556 UART: [kat] SHA2-512-ACC
490,142 UART: [kat] ECC-384
3,779,261 UART: [kat] HMAC-384Kdf
3,804,468 UART: [kat] LMS
4,877,649 UART: [kat] --
4,883,285 UART: [cold-reset] ++
4,886,055 UART: [fht] FHT @ 0x50003400
4,896,405 UART: [idev] ++
4,897,090 UART: [idev] CDI.KEYID = 6
4,898,275 UART: [idev] SUBJECT.KEYID = 7
4,899,429 UART: [idev] UDS.KEYID = 0
4,931,494 UART: [idev] Erasing UDS.KEYID = 0
8,242,065 UART: [idev] Sha1 KeyId Algorithm
8,264,435 UART: [idev] --
8,268,192 UART: [ldev] ++
8,268,778 UART: [ldev] CDI.KEYID = 6
8,269,966 UART: [ldev] SUBJECT.KEYID = 5
8,271,118 UART: [ldev] AUTHORITY.KEYID = 7
8,272,344 UART: [ldev] FE.KEYID = 1
8,317,185 UART: [ldev] Erasing FE.KEYID = 1
11,649,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,928 UART: [ldev] --
14,014,025 UART: [fwproc] Wait for Commands...
14,017,057 UART: [fwproc] Recv command 0x46574c44
14,019,389 UART: [fwproc] Recv'd Img size: 114036 bytes
14,075,549 UART: ROM Fatal Error: 0x000B0002
14,078,988 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
5,402 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,912,663 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
6,355 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,403 UART:
192,796 UART: Running Caliptra ROM ...
193,922 UART:
603,489 UART: [state] CFI Enabled
619,424 UART: [state] LifecycleState = Unprovisioned
621,763 UART: [state] DebugLocked = No
624,568 UART: [state] WD Timer not started. Device not locked for debugging
628,372 UART: [kat] SHA2-256
810,393 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,916 UART: [kat] ++
822,445 UART: [kat] sha1
833,270 UART: [kat] SHA2-256
836,275 UART: [kat] SHA2-384
842,146 UART: [kat] SHA2-512-ACC
844,772 UART: [kat] ECC-384
4,099,278 UART: [kat] HMAC-384Kdf
4,111,018 UART: [kat] LMS
5,184,159 UART: [kat] --
5,189,084 UART: [cold-reset] ++
5,190,484 UART: [fht] FHT @ 0x50003400
5,203,408 UART: [idev] ++
5,204,087 UART: [idev] CDI.KEYID = 6
5,205,326 UART: [idev] SUBJECT.KEYID = 7
5,206,760 UART: [idev] UDS.KEYID = 0
5,220,301 UART: [idev] Erasing UDS.KEYID = 0
8,491,729 UART: [idev] Sha1 KeyId Algorithm
8,514,383 UART: [idev] --
8,518,900 UART: [ldev] ++
8,519,538 UART: [ldev] CDI.KEYID = 6
8,520,720 UART: [ldev] SUBJECT.KEYID = 5
8,522,157 UART: [ldev] AUTHORITY.KEYID = 7
8,523,646 UART: [ldev] FE.KEYID = 1
8,533,814 UART: [ldev] Erasing FE.KEYID = 1
11,827,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,224 UART: [ldev] --
14,193,939 UART: [fwproc] Wait for Commands...
14,195,612 UART: [fwproc] Recv command 0x46574c44
14,197,938 UART: [fwproc] Recv'd Img size: 114036 bytes
14,252,437 UART: ROM Fatal Error: 0x000B0002
14,255,814 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
6,168 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,078,915 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
5,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,394 UART:
192,784 UART: Running Caliptra ROM ...
193,950 UART:
194,102 UART: [state] CFI Enabled
267,270 UART: [state] LifecycleState = Unprovisioned
269,198 UART: [state] DebugLocked = No
271,172 UART: [state] WD Timer not started. Device not locked for debugging
274,913 UART: [kat] SHA2-256
454,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,612 UART: [kat] ++
466,151 UART: [kat] sha1
476,765 UART: [kat] SHA2-256
479,828 UART: [kat] SHA2-384
487,150 UART: [kat] SHA2-512-ACC
490,141 UART: [kat] ECC-384
2,949,508 UART: [kat] HMAC-384Kdf
2,971,797 UART: [kat] LMS
3,501,210 UART: [kat] --
3,506,304 UART: [cold-reset] ++
3,508,611 UART: [fht] FHT @ 0x50003400
3,518,618 UART: [idev] ++
3,519,183 UART: [idev] CDI.KEYID = 6
3,520,094 UART: [idev] SUBJECT.KEYID = 7
3,521,260 UART: [idev] UDS.KEYID = 0
3,544,663 UART: [idev] Erasing UDS.KEYID = 0
6,027,239 UART: [idev] Sha1 KeyId Algorithm
6,051,131 UART: [idev] --
6,055,304 UART: [ldev] ++
6,055,920 UART: [ldev] CDI.KEYID = 6
6,056,845 UART: [ldev] SUBJECT.KEYID = 5
6,057,956 UART: [ldev] AUTHORITY.KEYID = 7
6,059,248 UART: [ldev] FE.KEYID = 1
6,100,893 UART: [ldev] Erasing FE.KEYID = 1
8,602,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,995 UART: [ldev] --
10,391,814 UART: [fwproc] Wait for Commands...
10,393,404 UART: [fwproc] Recv command 0x46574c44
10,395,455 UART: [fwproc] Recv'd Img size: 114360 bytes
10,450,860 UART: ROM Fatal Error: 0x000B0002
10,453,965 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
5,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,370 UART:
192,752 UART: Running Caliptra ROM ...
193,907 UART:
194,060 UART: [state] CFI Enabled
264,017 UART: [state] LifecycleState = Unprovisioned
265,875 UART: [state] DebugLocked = No
267,259 UART: [state] WD Timer not started. Device not locked for debugging
270,879 UART: [kat] SHA2-256
450,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,609 UART: [kat] ++
462,172 UART: [kat] sha1
473,763 UART: [kat] SHA2-256
476,829 UART: [kat] SHA2-384
482,441 UART: [kat] SHA2-512-ACC
485,390 UART: [kat] ECC-384
2,947,411 UART: [kat] HMAC-384Kdf
2,972,219 UART: [kat] LMS
3,501,646 UART: [kat] --
3,505,742 UART: [cold-reset] ++
3,506,859 UART: [fht] FHT @ 0x50003400
3,518,425 UART: [idev] ++
3,519,037 UART: [idev] CDI.KEYID = 6
3,519,977 UART: [idev] SUBJECT.KEYID = 7
3,521,086 UART: [idev] UDS.KEYID = 0
3,543,436 UART: [idev] Erasing UDS.KEYID = 0
6,026,635 UART: [idev] Sha1 KeyId Algorithm
6,049,346 UART: [idev] --
6,054,047 UART: [ldev] ++
6,054,628 UART: [ldev] CDI.KEYID = 6
6,055,539 UART: [ldev] SUBJECT.KEYID = 5
6,056,757 UART: [ldev] AUTHORITY.KEYID = 7
6,057,991 UART: [ldev] FE.KEYID = 1
6,099,106 UART: [ldev] Erasing FE.KEYID = 1
8,603,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,467 UART: [ldev] --
10,415,289 UART: [fwproc] Wait for Commands...
10,417,992 UART: [fwproc] Recv command 0x46574c44
10,420,035 UART: [fwproc] Recv'd Img size: 114360 bytes
10,475,408 UART: ROM Fatal Error: 0x000B0002
10,478,554 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
5,524 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,286,869 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
6,339 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,466 UART:
192,873 UART: Running Caliptra ROM ...
194,037 UART:
603,735 UART: [state] CFI Enabled
617,212 UART: [state] LifecycleState = Unprovisioned
619,096 UART: [state] DebugLocked = No
620,905 UART: [state] WD Timer not started. Device not locked for debugging
624,801 UART: [kat] SHA2-256
803,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,525 UART: [kat] ++
816,066 UART: [kat] sha1
827,354 UART: [kat] SHA2-256
830,372 UART: [kat] SHA2-384
836,134 UART: [kat] SHA2-512-ACC
839,119 UART: [kat] ECC-384
3,280,156 UART: [kat] HMAC-384Kdf
3,291,478 UART: [kat] LMS
3,821,005 UART: [kat] --
3,826,997 UART: [cold-reset] ++
3,829,188 UART: [fht] FHT @ 0x50003400
3,840,541 UART: [idev] ++
3,841,110 UART: [idev] CDI.KEYID = 6
3,842,084 UART: [idev] SUBJECT.KEYID = 7
3,843,243 UART: [idev] UDS.KEYID = 0
3,860,444 UART: [idev] Erasing UDS.KEYID = 0
6,321,815 UART: [idev] Sha1 KeyId Algorithm
6,345,083 UART: [idev] --
6,348,706 UART: [ldev] ++
6,349,283 UART: [ldev] CDI.KEYID = 6
6,350,169 UART: [ldev] SUBJECT.KEYID = 5
6,351,382 UART: [ldev] AUTHORITY.KEYID = 7
6,352,613 UART: [ldev] FE.KEYID = 1
6,361,068 UART: [ldev] Erasing FE.KEYID = 1
8,834,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,524 UART: [ldev] --
10,625,889 UART: [fwproc] Wait for Commands...
10,629,116 UART: [fwproc] Recv command 0x46574c44
10,631,204 UART: [fwproc] Recv'd Img size: 114360 bytes
10,686,563 UART: ROM Fatal Error: 0x000B0002
10,689,674 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
6,055 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,471,803 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
85,965 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
890,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,907 UART: [kat] ++
895,059 UART: [kat] sha1
899,139 UART: [kat] SHA2-256
901,079 UART: [kat] SHA2-384
903,790 UART: [kat] SHA2-512-ACC
905,691 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,669 UART: [fht] FHT @ 0x50003400
1,172,281 UART: [idev] ++
1,172,449 UART: [idev] CDI.KEYID = 6
1,172,810 UART: [idev] SUBJECT.KEYID = 7
1,173,235 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,770 UART: [ldev] --
1,281,282 UART: [fwproc] Wait for Commands...
1,281,945 UART: [fwproc] Recv command 0x46574c44
1,282,678 UART: [fwproc] Recv'd Img size: 114360 bytes
1,301,566 UART: ROM Fatal Error: 0x000B0002
1,302,723 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,153,796 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,182,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,228 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,837 UART: [ldev] SUBJECT.KEYID = 5
1,211,264 UART: [ldev] AUTHORITY.KEYID = 7
1,211,727 UART: [ldev] FE.KEYID = 1
1,217,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,771 UART: [fwproc] Wait for Commands...
1,283,474 UART: [fwproc] Recv command 0x46574c44
1,284,207 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,043 UART: ROM Fatal Error: 0x000B0002
1,304,200 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,156,221 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,578 UART: [state] LifecycleState = Unprovisioned
85,233 UART: [state] DebugLocked = No
85,719 UART: [state] WD Timer not started. Device not locked for debugging
86,954 UART: [kat] SHA2-256
890,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,633 UART: [kat] ++
894,785 UART: [kat] sha1
899,009 UART: [kat] SHA2-256
900,949 UART: [kat] SHA2-384
903,786 UART: [kat] SHA2-512-ACC
905,687 UART: [kat] ECC-384
915,198 UART: [kat] HMAC-384Kdf
919,710 UART: [kat] LMS
1,168,022 UART: [kat] --
1,168,851 UART: [cold-reset] ++
1,169,181 UART: [fht] FHT @ 0x50003400
1,171,665 UART: [idev] ++
1,171,833 UART: [idev] CDI.KEYID = 6
1,172,194 UART: [idev] SUBJECT.KEYID = 7
1,172,619 UART: [idev] UDS.KEYID = 0
1,180,553 UART: [idev] Erasing UDS.KEYID = 0
1,197,173 UART: [idev] Sha1 KeyId Algorithm
1,206,181 UART: [idev] --
1,207,154 UART: [ldev] ++
1,207,322 UART: [ldev] CDI.KEYID = 6
1,207,686 UART: [ldev] SUBJECT.KEYID = 5
1,208,113 UART: [ldev] AUTHORITY.KEYID = 7
1,208,576 UART: [ldev] FE.KEYID = 1
1,213,622 UART: [ldev] Erasing FE.KEYID = 1
1,240,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,590 UART: [ldev] --
1,279,864 UART: [fwproc] Wait for Commands...
1,280,611 UART: [fwproc] Recv command 0x46574c44
1,281,344 UART: [fwproc] Recv'd Img size: 114360 bytes
1,300,644 UART: ROM Fatal Error: 0x000B0002
1,301,801 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,240 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,895 UART: [kat] SHA2-512-ACC
906,796 UART: [kat] ECC-384
916,933 UART: [kat] HMAC-384Kdf
921,469 UART: [kat] LMS
1,169,781 UART: [kat] --
1,170,802 UART: [cold-reset] ++
1,171,172 UART: [fht] FHT @ 0x50003400
1,173,966 UART: [idev] ++
1,174,134 UART: [idev] CDI.KEYID = 6
1,174,495 UART: [idev] SUBJECT.KEYID = 7
1,174,920 UART: [idev] UDS.KEYID = 0
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,056 UART: [idev] Sha1 KeyId Algorithm
1,207,754 UART: [idev] --
1,208,663 UART: [ldev] ++
1,208,831 UART: [ldev] CDI.KEYID = 6
1,209,195 UART: [ldev] SUBJECT.KEYID = 5
1,209,622 UART: [ldev] AUTHORITY.KEYID = 7
1,210,085 UART: [ldev] FE.KEYID = 1
1,214,989 UART: [ldev] Erasing FE.KEYID = 1
1,241,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,755 UART: [ldev] --
1,281,107 UART: [fwproc] Wait for Commands...
1,281,922 UART: [fwproc] Recv command 0x46574c44
1,282,655 UART: [fwproc] Recv'd Img size: 114360 bytes
1,301,843 UART: ROM Fatal Error: 0x000B0002
1,303,000 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,152,927 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,519 UART: [cold-reset] ++
1,169,845 UART: [fht] FHT @ 0x50003400
1,172,439 UART: [idev] ++
1,172,607 UART: [idev] CDI.KEYID = 6
1,172,968 UART: [idev] SUBJECT.KEYID = 7
1,173,393 UART: [idev] UDS.KEYID = 0
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,824 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,280,810 UART: [fwproc] Wait for Commands...
1,281,591 UART: [fwproc] Recv command 0x46574c44
1,282,324 UART: [fwproc] Recv'd Img size: 114360 bytes
1,301,628 UART: ROM Fatal Error: 0x000B0002
1,302,785 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,764 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,920 UART: [idev] --
1,208,759 UART: [ldev] ++
1,208,927 UART: [ldev] CDI.KEYID = 6
1,209,291 UART: [ldev] SUBJECT.KEYID = 5
1,209,718 UART: [ldev] AUTHORITY.KEYID = 7
1,210,181 UART: [ldev] FE.KEYID = 1
1,215,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,717 UART: ROM Fatal Error: 0x000B0002
1,303,874 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,441 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,218,402 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,384,728 UART:
2,385,153 UART: Running Caliptra ROM ...
2,386,244 UART:
2,386,398 UART: [state] CFI Enabled
2,387,361 UART: [state] LifecycleState = Unprovisioned
2,389,014 UART: [state] DebugLocked = No
2,390,121 UART: [state] WD Timer not started. Device not locked for debugging
2,392,593 UART: [kat] SHA2-256
2,393,260 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,396,263 UART: [kat] ++
2,396,709 UART: [kat] sha1
2,397,220 UART: [kat] SHA2-256
2,397,953 UART: [kat] SHA2-384
2,398,617 UART: [kat] SHA2-512-ACC
2,399,449 UART: [kat] ECC-384
3,775,619 UART: [kat] HMAC-384Kdf
3,800,821 UART: [kat] LMS
4,873,957 UART: [kat] --
4,877,960 UART: [cold-reset] ++
4,879,793 UART: [fht] FHT @ 0x50003400
4,890,452 UART: [idev] ++
4,891,131 UART: [idev] CDI.KEYID = 6
4,892,312 UART: [idev] SUBJECT.KEYID = 7
4,893,476 UART: [idev] UDS.KEYID = 0
4,907,430 UART: [idev] Erasing UDS.KEYID = 0
8,216,765 UART: [idev] Sha1 KeyId Algorithm
8,238,319 UART: [idev] --
8,242,471 UART: [ldev] ++
8,243,034 UART: [ldev] CDI.KEYID = 6
8,244,276 UART: [ldev] SUBJECT.KEYID = 5
8,245,443 UART: [ldev] AUTHORITY.KEYID = 7
8,246,594 UART: [ldev] FE.KEYID = 1
8,273,002 UART: [ldev] Erasing FE.KEYID = 1
11,605,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,896,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,912,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,928,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,944,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,966,597 UART: [ldev] --
13,971,645 UART: [fwproc] Wait for Commands...
13,974,861 UART: [fwproc] Recv command 0x46574c44
13,977,183 UART: [fwproc] Recv'd Img size: 131072 bytes
18,261,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,333,948 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,394,180 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,778,545 >>> mbox cmd response: success
18,782,310 UART: [afmc] ++
18,783,004 UART: [afmc] CDI.KEYID = 6
18,784,136 UART: [afmc] SUBJECT.KEYID = 7
18,785,359 UART: [afmc] AUTHORITY.KEYID = 5
22,156,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,451,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,453,536 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,469,727 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,485,808 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,501,666 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,524,252 UART: [afmc] --
24,529,758 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,687,058 UART: [cold-reset] --
24,687,918 UART: [state] Locking Datavault
24,688,990 UART: [state] Locking PCR0, PCR1 and PCR31
24,690,835 UART: [state] Locking ICCM
24,691,728 UART: [exit] Launching FMC @ 0x40000000
24,693,158 UART:
24,693,337 UART: Running Caliptra FMC ...
24,694,350 UART:
24,694,496 UART: [fmc] Received command: 0x1000000E
25,471,439 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,159 writing to cptra_bootfsm_go
2,213,256 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,656,723 >>> mbox cmd response: success
24,333,133 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,490,548 UART:
24,490,924 UART: Running Caliptra FMC ...
24,492,135 UART:
24,492,305 UART: [fmc] Received command: 0x1000000E
25,274,925 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
2,225,453 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,391,253 UART:
2,391,679 UART: Running Caliptra ROM ...
2,392,764 UART:
2,392,918 UART: [state] CFI Enabled
2,393,889 UART: [state] LifecycleState = Unprovisioned
2,395,546 UART: [state] DebugLocked = No
2,396,565 UART: [state] WD Timer not started. Device not locked for debugging
2,399,027 UART: [kat] SHA2-256
2,399,690 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,402,692 UART: [kat] ++
2,403,134 UART: [kat] sha1
2,403,633 UART: [kat] SHA2-256
2,404,284 UART: [kat] SHA2-384
2,404,935 UART: [kat] SHA2-512-ACC
2,405,728 UART: [kat] ECC-384
4,095,041 UART: [kat] HMAC-384Kdf
4,106,664 UART: [kat] LMS
5,179,809 UART: [kat] --
5,185,236 UART: [cold-reset] ++
5,186,418 UART: [fht] FHT @ 0x50003400
5,197,643 UART: [idev] ++
5,198,322 UART: [idev] CDI.KEYID = 6
5,199,503 UART: [idev] SUBJECT.KEYID = 7
5,200,984 UART: [idev] UDS.KEYID = 0
5,213,769 UART: [idev] Erasing UDS.KEYID = 0
8,487,737 UART: [idev] Sha1 KeyId Algorithm
8,509,104 UART: [idev] --
8,513,002 UART: [ldev] ++
8,513,578 UART: [ldev] CDI.KEYID = 6
8,514,814 UART: [ldev] SUBJECT.KEYID = 5
8,516,308 UART: [ldev] AUTHORITY.KEYID = 7
8,517,814 UART: [ldev] FE.KEYID = 1
8,527,381 UART: [ldev] Erasing FE.KEYID = 1
11,815,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,157,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,176,497 UART: [ldev] --
14,180,620 UART: [fwproc] Wait for Commands...
14,183,744 UART: [fwproc] Recv command 0x46574c44
14,186,003 UART: [fwproc] Recv'd Img size: 131072 bytes
18,475,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,547,719 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,607,896 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,992,126 >>> mbox cmd response: success
18,996,242 UART: [afmc] ++
18,996,934 UART: [afmc] CDI.KEYID = 6
18,998,113 UART: [afmc] SUBJECT.KEYID = 7
18,999,327 UART: [afmc] AUTHORITY.KEYID = 5
22,316,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,612,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,614,535 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,630,728 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,646,869 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,662,672 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,685,482 UART: [afmc] --
24,691,567 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,848,949 UART: [cold-reset] --
24,849,809 UART: [state] Locking Datavault
24,850,883 UART: [state] Locking PCR0, PCR1 and PCR31
24,852,413 UART: [state] Locking ICCM
24,853,282 UART: [exit] Launching FMC @ 0x40000000
24,854,614 UART:
24,854,773 UART: Running Caliptra FMC ...
24,855,868 UART:
24,856,012 UART: [fmc] Received command: 0x1000000E
25,633,343 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,226,939 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,805,300 >>> mbox cmd response: success
24,431,854 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,589,273 UART:
24,589,652 UART: Running Caliptra FMC ...
24,590,881 UART:
24,591,052 UART: [fmc] Received command: 0x1000000E
25,373,675 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,233,053 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,398,872 UART:
2,399,296 UART: Running Caliptra ROM ...
2,400,402 UART:
2,400,563 UART: [state] CFI Enabled
2,401,477 UART: [state] LifecycleState = Unprovisioned
2,403,149 UART: [state] DebugLocked = No
2,404,179 UART: [state] WD Timer not started. Device not locked for debugging
2,406,658 UART: [kat] SHA2-256
2,407,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,410,330 UART: [kat] ++
2,410,778 UART: [kat] sha1
2,411,292 UART: [kat] SHA2-256
2,411,948 UART: [kat] SHA2-384
2,412,603 UART: [kat] SHA2-512-ACC
2,413,427 UART: [kat] ECC-384
2,947,480 UART: [kat] HMAC-384Kdf
2,970,665 UART: [kat] LMS
3,500,114 UART: [kat] --
3,504,718 UART: [cold-reset] ++
3,505,946 UART: [fht] FHT @ 0x50003400
3,516,710 UART: [idev] ++
3,517,283 UART: [idev] CDI.KEYID = 6
3,518,188 UART: [idev] SUBJECT.KEYID = 7
3,519,401 UART: [idev] UDS.KEYID = 0
3,541,478 UART: [idev] Erasing UDS.KEYID = 0
6,027,137 UART: [idev] Sha1 KeyId Algorithm
6,049,083 UART: [idev] --
6,052,086 UART: [ldev] ++
6,052,669 UART: [ldev] CDI.KEYID = 6
6,053,554 UART: [ldev] SUBJECT.KEYID = 5
6,054,891 UART: [ldev] AUTHORITY.KEYID = 7
6,056,076 UART: [ldev] FE.KEYID = 1
6,098,788 UART: [ldev] Erasing FE.KEYID = 1
8,600,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,278 UART: [ldev] --
10,411,489 UART: [fwproc] Wait for Commands...
10,413,314 UART: [fwproc] Recv command 0x46574c44
10,415,411 UART: [fwproc] Recv'd Img size: 131072 bytes
14,021,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,204 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,151,565 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,535,841 >>> mbox cmd response: success
14,540,804 UART: [afmc] ++
14,541,402 UART: [afmc] CDI.KEYID = 6
14,542,285 UART: [afmc] SUBJECT.KEYID = 7
14,543,502 UART: [afmc] AUTHORITY.KEYID = 5
17,084,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,807,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,809,738 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,825,827 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,841,850 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,857,580 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,881,058 UART: [afmc] --
18,887,452 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,044,784 UART: [cold-reset] --
19,045,645 UART: [state] Locking Datavault
19,046,809 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,350 UART: [state] Locking ICCM
19,049,259 UART: [exit] Launching FMC @ 0x40000000
19,050,689 UART:
19,050,848 UART: Running Caliptra FMC ...
19,051,946 UART:
19,052,126 UART: [fmc] Received command: 0x1000000E
19,829,198 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,219,809 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,385,560 UART:
2,385,969 UART: Running Caliptra ROM ...
2,387,047 UART:
2,387,205 UART: [state] CFI Enabled
2,388,171 UART: [state] LifecycleState = Unprovisioned
2,389,849 UART: [state] DebugLocked = No
2,390,916 UART: [state] WD Timer not started. Device not locked for debugging
2,393,391 UART: [kat] SHA2-256
2,394,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,397,072 UART: [kat] ++
2,397,524 UART: [kat] sha1
2,398,122 UART: [kat] SHA2-256
2,398,792 UART: [kat] SHA2-384
2,399,475 UART: [kat] SHA2-512-ACC
2,400,298 UART: [kat] ECC-384
2,946,436 UART: [kat] HMAC-384Kdf
2,971,774 UART: [kat] LMS
3,501,255 UART: [kat] --
3,505,410 UART: [cold-reset] ++
3,507,291 UART: [fht] FHT @ 0x50003400
3,517,945 UART: [idev] ++
3,518,518 UART: [idev] CDI.KEYID = 6
3,519,426 UART: [idev] SUBJECT.KEYID = 7
3,520,588 UART: [idev] UDS.KEYID = 0
3,543,270 UART: [idev] Erasing UDS.KEYID = 0
6,021,055 UART: [idev] Sha1 KeyId Algorithm
6,045,213 UART: [idev] --
6,049,116 UART: [ldev] ++
6,049,732 UART: [ldev] CDI.KEYID = 6
6,050,623 UART: [ldev] SUBJECT.KEYID = 5
6,051,910 UART: [ldev] AUTHORITY.KEYID = 7
6,053,112 UART: [ldev] FE.KEYID = 1
6,099,988 UART: [ldev] Erasing FE.KEYID = 1
8,601,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,420 UART: [ldev] --
10,414,734 UART: [fwproc] Wait for Commands...
10,417,752 UART: [fwproc] Recv command 0x46574c44
10,419,848 UART: [fwproc] Recv'd Img size: 131072 bytes
14,025,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,223 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,166,584 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,550,961 >>> mbox cmd response: success
14,554,990 UART: [afmc] ++
14,555,598 UART: [afmc] CDI.KEYID = 6
14,556,513 UART: [afmc] SUBJECT.KEYID = 7
14,557,670 UART: [afmc] AUTHORITY.KEYID = 5
17,080,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,807,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,809,174 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,825,228 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,841,308 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,857,004 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,878,762 UART: [afmc] --
18,885,639 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,042,958 UART: [cold-reset] --
19,043,833 UART: [state] Locking Datavault
19,044,913 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,453 UART: [state] Locking ICCM
19,047,367 UART: [exit] Launching FMC @ 0x40000000
19,048,813 UART:
19,048,975 UART: Running Caliptra FMC ...
19,050,080 UART:
19,050,239 UART: [fmc] Received command: 0x1000000E
19,827,356 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,221,996 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,323,549 >>> mbox cmd response: success
18,604,885 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,762,273 UART:
18,762,670 UART: Running Caliptra FMC ...
18,763,875 UART:
18,764,059 UART: [fmc] Received command: 0x1000000E
19,546,675 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,224,890 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,390,659 UART:
2,391,090 UART: Running Caliptra ROM ...
2,392,185 UART:
2,392,340 UART: [state] CFI Enabled
2,393,313 UART: [state] LifecycleState = Unprovisioned
2,394,999 UART: [state] DebugLocked = No
2,396,027 UART: [state] WD Timer not started. Device not locked for debugging
2,398,493 UART: [kat] SHA2-256
2,399,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,402,160 UART: [kat] ++
2,402,606 UART: [kat] sha1
2,403,115 UART: [kat] SHA2-256
2,403,769 UART: [kat] SHA2-384
2,404,424 UART: [kat] SHA2-512-ACC
2,405,255 UART: [kat] ECC-384
3,277,073 UART: [kat] HMAC-384Kdf
3,289,766 UART: [kat] LMS
3,819,214 UART: [kat] --
3,823,417 UART: [cold-reset] ++
3,824,540 UART: [fht] FHT @ 0x50003400
3,835,731 UART: [idev] ++
3,836,316 UART: [idev] CDI.KEYID = 6
3,837,199 UART: [idev] SUBJECT.KEYID = 7
3,838,406 UART: [idev] UDS.KEYID = 0
3,853,569 UART: [idev] Erasing UDS.KEYID = 0
6,305,974 UART: [idev] Sha1 KeyId Algorithm
6,328,884 UART: [idev] --
6,332,871 UART: [ldev] ++
6,333,437 UART: [ldev] CDI.KEYID = 6
6,334,372 UART: [ldev] SUBJECT.KEYID = 5
6,335,628 UART: [ldev] AUTHORITY.KEYID = 7
6,336,815 UART: [ldev] FE.KEYID = 1
6,346,723 UART: [ldev] Erasing FE.KEYID = 1
8,819,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,603,919 UART: [ldev] --
10,607,881 UART: [fwproc] Wait for Commands...
10,610,511 UART: [fwproc] Recv command 0x46574c44
10,612,598 UART: [fwproc] Recv'd Img size: 131072 bytes
14,218,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,295,301 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,355,603 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,739,944 >>> mbox cmd response: success
14,743,593 UART: [afmc] ++
14,744,182 UART: [afmc] CDI.KEYID = 6
14,745,070 UART: [afmc] SUBJECT.KEYID = 7
14,746,230 UART: [afmc] AUTHORITY.KEYID = 5
17,244,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,962,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,964,227 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,980,355 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,996,363 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,012,010 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,035,117 UART: [afmc] --
19,042,389 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,199,660 UART: [cold-reset] --
19,200,527 UART: [state] Locking Datavault
19,201,603 UART: [state] Locking PCR0, PCR1 and PCR31
19,203,135 UART: [state] Locking ICCM
19,204,007 UART: [exit] Launching FMC @ 0x40000000
19,205,349 UART:
19,205,495 UART: Running Caliptra FMC ...
19,206,591 UART:
19,206,741 UART: [fmc] Received command: 0x1000000E
19,984,094 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
2,218,687 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,540,531 >>> mbox cmd response: success
18,779,512 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,936,941 UART:
18,937,326 UART: Running Caliptra FMC ...
18,938,447 UART:
18,938,598 UART: [fmc] Received command: 0x1000000E
19,721,328 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,088 UART: [kat] HMAC-384Kdf
919,752 UART: [kat] LMS
1,168,064 UART: [kat] --
1,168,925 UART: [cold-reset] ++
1,169,481 UART: [fht] FHT @ 0x50003400
1,172,189 UART: [idev] ++
1,172,357 UART: [idev] CDI.KEYID = 6
1,172,718 UART: [idev] SUBJECT.KEYID = 7
1,173,143 UART: [idev] UDS.KEYID = 0
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,553 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,160 UART: [ldev] Erasing FE.KEYID = 1
1,240,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,322 UART: [fwproc] Wait for Commands...
1,280,995 UART: [fwproc] Recv command 0x46574c44
1,281,728 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,014 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,699 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,173 >>> mbox cmd response: success
2,990,274 UART: [afmc] ++
2,990,442 UART: [afmc] CDI.KEYID = 6
2,990,805 UART: [afmc] SUBJECT.KEYID = 7
2,991,231 UART: [afmc] AUTHORITY.KEYID = 5
3,026,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,447 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,143 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,042 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,735 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,587 UART: [afmc] --
3,069,499 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,521 UART: [cold-reset] --
3,070,215 UART: [state] Locking Datavault
3,071,448 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,052 UART: [state] Locking ICCM
3,072,552 UART: [exit] Launching FMC @ 0x40000000
3,077,849 UART:
3,077,865 UART: Running Caliptra FMC ...
3,078,273 UART:
3,078,503 UART: [fmc] Received command: 0x1000000E
3,423,557 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,005 >>> mbox cmd response: success
2,893,836 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,315 UART:
2,900,331 UART: Running Caliptra FMC ...
2,900,739 UART:
2,900,969 UART: [fmc] Received command: 0x1000000E
3,246,023 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0x46574c44
1,283,767 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,201 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,886 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,394 >>> mbox cmd response: success
2,990,533 UART: [afmc] ++
2,990,701 UART: [afmc] CDI.KEYID = 6
2,991,064 UART: [afmc] SUBJECT.KEYID = 7
2,991,490 UART: [afmc] AUTHORITY.KEYID = 5
3,027,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,600 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,296 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,195 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,888 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,920 UART: [afmc] --
3,070,988 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,010 UART: [cold-reset] --
3,071,904 UART: [state] Locking Datavault
3,073,101 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,705 UART: [state] Locking ICCM
3,074,323 UART: [exit] Launching FMC @ 0x40000000
3,079,620 UART:
3,079,636 UART: Running Caliptra FMC ...
3,080,044 UART:
3,080,274 UART: [fmc] Received command: 0x1000000E
3,425,328 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,082 >>> mbox cmd response: success
2,894,843 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,948 UART:
2,900,964 UART: Running Caliptra FMC ...
2,901,372 UART:
2,901,602 UART: [fmc] Received command: 0x1000000E
3,246,656 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,536 UART: [kat] HMAC-384Kdf
921,350 UART: [kat] LMS
1,169,662 UART: [kat] --
1,170,619 UART: [cold-reset] ++
1,171,129 UART: [fht] FHT @ 0x50003400
1,173,551 UART: [idev] ++
1,173,719 UART: [idev] CDI.KEYID = 6
1,174,080 UART: [idev] SUBJECT.KEYID = 7
1,174,505 UART: [idev] UDS.KEYID = 0
1,182,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,710 UART: [ldev] ++
1,208,878 UART: [ldev] CDI.KEYID = 6
1,209,242 UART: [ldev] SUBJECT.KEYID = 5
1,209,669 UART: [ldev] AUTHORITY.KEYID = 7
1,210,132 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,184 UART: [ldev] --
1,281,564 UART: [fwproc] Wait for Commands...
1,282,385 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,314 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,999 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,587 >>> mbox cmd response: success
2,991,608 UART: [afmc] ++
2,991,776 UART: [afmc] CDI.KEYID = 6
2,992,139 UART: [afmc] SUBJECT.KEYID = 7
2,992,565 UART: [afmc] AUTHORITY.KEYID = 5
3,028,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,191 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,887 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,786 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,479 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,333 UART: [afmc] --
3,071,417 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,439 UART: [cold-reset] --
3,072,455 UART: [state] Locking Datavault
3,073,684 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,288 UART: [state] Locking ICCM
3,074,808 UART: [exit] Launching FMC @ 0x40000000
3,080,105 UART:
3,080,121 UART: Running Caliptra FMC ...
3,080,529 UART:
3,080,759 UART: [fmc] Received command: 0x1000000E
3,425,813 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,581 >>> mbox cmd response: success
2,895,172 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,517 UART:
2,901,533 UART: Running Caliptra FMC ...
2,901,941 UART:
2,902,171 UART: [fmc] Received command: 0x1000000E
3,247,225 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,309 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,209,007 UART: [ldev] ++
1,209,175 UART: [ldev] CDI.KEYID = 6
1,209,539 UART: [ldev] SUBJECT.KEYID = 5
1,209,966 UART: [ldev] AUTHORITY.KEYID = 7
1,210,429 UART: [ldev] FE.KEYID = 1
1,215,755 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,991 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x46574c44
1,282,777 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,711 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,396 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,036 >>> mbox cmd response: success
2,991,281 UART: [afmc] ++
2,991,449 UART: [afmc] CDI.KEYID = 6
2,991,812 UART: [afmc] SUBJECT.KEYID = 7
2,992,238 UART: [afmc] AUTHORITY.KEYID = 5
3,027,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,054 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,750 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,649 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,342 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,240 UART: [afmc] --
3,071,278 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,300 UART: [cold-reset] --
3,072,086 UART: [state] Locking Datavault
3,073,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,769 UART: [state] Locking ICCM
3,074,429 UART: [exit] Launching FMC @ 0x40000000
3,079,726 UART:
3,079,742 UART: Running Caliptra FMC ...
3,080,150 UART:
3,080,380 UART: [fmc] Received command: 0x1000000E
3,425,434 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,502 >>> mbox cmd response: success
2,897,885 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,904,026 UART:
2,904,042 UART: Running Caliptra FMC ...
2,904,450 UART:
2,904,680 UART: [fmc] Received command: 0x1000000E
3,249,734 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,381 UART: [cold-reset] ++
1,169,777 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,327 UART: [idev] Sha1 KeyId Algorithm
1,207,029 UART: [idev] --
1,207,992 UART: [ldev] ++
1,208,160 UART: [ldev] CDI.KEYID = 6
1,208,524 UART: [ldev] SUBJECT.KEYID = 5
1,208,951 UART: [ldev] AUTHORITY.KEYID = 7
1,209,414 UART: [ldev] FE.KEYID = 1
1,214,572 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,279,970 UART: [fwproc] Wait for Commands...
1,280,621 UART: [fwproc] Recv command 0x46574c44
1,281,354 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,120 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,805 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,351 >>> mbox cmd response: success
2,989,374 UART: [afmc] ++
2,989,542 UART: [afmc] CDI.KEYID = 6
2,989,905 UART: [afmc] SUBJECT.KEYID = 7
2,990,331 UART: [afmc] AUTHORITY.KEYID = 5
3,025,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,041,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,537 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,233 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,132 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,059,825 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,067,637 UART: [afmc] --
3,068,643 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,068,665 UART: [cold-reset] --
3,069,539 UART: [state] Locking Datavault
3,070,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,272 UART: [state] Locking ICCM
3,071,796 UART: [exit] Launching FMC @ 0x40000000
3,077,093 UART:
3,077,109 UART: Running Caliptra FMC ...
3,077,517 UART:
3,077,747 UART: [fmc] Received command: 0x1000000E
3,422,801 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,079 >>> mbox cmd response: success
2,896,514 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,809 UART:
2,902,825 UART: Running Caliptra FMC ...
2,903,233 UART:
2,903,463 UART: [fmc] Received command: 0x1000000E
3,248,517 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,294 UART: [kat] SHA2-256
902,234 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,118 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,182,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,842 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,359 UART: [ldev] --
1,282,727 UART: [fwproc] Wait for Commands...
1,283,332 UART: [fwproc] Recv command 0x46574c44
1,284,065 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,569 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,254 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,780 >>> mbox cmd response: success
2,991,975 UART: [afmc] ++
2,992,143 UART: [afmc] CDI.KEYID = 6
2,992,506 UART: [afmc] SUBJECT.KEYID = 7
2,992,932 UART: [afmc] AUTHORITY.KEYID = 5
3,028,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,320 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,016 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,915 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,608 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,394 UART: [afmc] --
3,071,278 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,300 UART: [cold-reset] --
3,071,928 UART: [state] Locking Datavault
3,073,087 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,691 UART: [state] Locking ICCM
3,074,147 UART: [exit] Launching FMC @ 0x40000000
3,079,444 UART:
3,079,460 UART: Running Caliptra FMC ...
3,079,868 UART:
3,080,098 UART: [fmc] Received command: 0x1000000E
3,425,152 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,658 >>> mbox cmd response: success
2,898,009 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,904,232 UART:
2,904,248 UART: Running Caliptra FMC ...
2,904,656 UART:
2,904,886 UART: [fmc] Received command: 0x1000000E
3,249,940 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
5,699 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,144 UART:
192,539 UART: Running Caliptra ROM ...
193,736 UART:
193,898 UART: [state] CFI Enabled
265,116 UART: [state] LifecycleState = Unprovisioned
267,472 UART: [state] DebugLocked = No
269,290 UART: [state] WD Timer not started. Device not locked for debugging
274,049 UART: [kat] SHA2-256
455,979 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,524 UART: [kat] ++
468,051 UART: [kat] sha1
478,615 UART: [kat] SHA2-256
481,625 UART: [kat] SHA2-384
486,840 UART: [kat] SHA2-512-ACC
489,451 UART: [kat] ECC-384
3,779,535 UART: [kat] HMAC-384Kdf
3,803,605 UART: [kat] LMS
4,876,749 UART: [kat] --
4,882,551 UART: [cold-reset] ++
4,884,614 UART: [fht] FHT @ 0x50003400
4,895,701 UART: [idev] ++
4,896,372 UART: [idev] CDI.KEYID = 6
4,897,607 UART: [idev] SUBJECT.KEYID = 7
4,898,707 UART: [idev] UDS.KEYID = 0
4,931,523 UART: [idev] Erasing UDS.KEYID = 0
8,244,763 UART: [idev] Sha1 KeyId Algorithm
8,265,881 UART: [idev] --
8,269,645 UART: [ldev] ++
8,270,225 UART: [ldev] CDI.KEYID = 6
8,271,416 UART: [ldev] SUBJECT.KEYID = 5
8,272,586 UART: [ldev] AUTHORITY.KEYID = 7
8,273,743 UART: [ldev] FE.KEYID = 1
8,318,489 UART: [ldev] Erasing FE.KEYID = 1
11,653,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,356 UART: [ldev] --
14,041,793 UART: [fwproc] Wait for Commands...
14,043,481 UART: [fwproc] Recv command 0x46574c44
14,045,804 UART: [fwproc] Recv'd Img size: 114036 bytes
14,112,020 UART: ROM Fatal Error: 0x000B0007
14,115,437 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,368 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,871,080 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,374 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,473 UART:
192,896 UART: Running Caliptra ROM ...
194,083 UART:
603,732 UART: [state] CFI Enabled
617,875 UART: [state] LifecycleState = Unprovisioned
620,244 UART: [state] DebugLocked = No
622,455 UART: [state] WD Timer not started. Device not locked for debugging
627,694 UART: [kat] SHA2-256
809,629 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,191 UART: [kat] ++
821,693 UART: [kat] sha1
831,701 UART: [kat] SHA2-256
834,756 UART: [kat] SHA2-384
840,669 UART: [kat] SHA2-512-ACC
843,276 UART: [kat] ECC-384
4,097,950 UART: [kat] HMAC-384Kdf
4,110,057 UART: [kat] LMS
5,183,198 UART: [kat] --
5,187,797 UART: [cold-reset] ++
5,189,627 UART: [fht] FHT @ 0x50003400
5,199,470 UART: [idev] ++
5,200,134 UART: [idev] CDI.KEYID = 6
5,201,285 UART: [idev] SUBJECT.KEYID = 7
5,202,819 UART: [idev] UDS.KEYID = 0
5,220,553 UART: [idev] Erasing UDS.KEYID = 0
8,497,837 UART: [idev] Sha1 KeyId Algorithm
8,518,370 UART: [idev] --
8,523,548 UART: [ldev] ++
8,524,115 UART: [ldev] CDI.KEYID = 6
8,525,345 UART: [ldev] SUBJECT.KEYID = 5
8,526,774 UART: [ldev] AUTHORITY.KEYID = 7
8,528,331 UART: [ldev] FE.KEYID = 1
8,540,165 UART: [ldev] Erasing FE.KEYID = 1
11,830,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,586 UART: [ldev] --
14,195,100 UART: [fwproc] Wait for Commands...
14,197,304 UART: [fwproc] Recv command 0x46574c44
14,199,620 UART: [fwproc] Recv'd Img size: 114036 bytes
14,262,805 UART: ROM Fatal Error: 0x000B0007
14,266,211 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
6,194 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,085,408 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
5,677 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,214 UART:
192,581 UART: Running Caliptra ROM ...
193,695 UART:
193,839 UART: [state] CFI Enabled
267,072 UART: [state] LifecycleState = Unprovisioned
268,938 UART: [state] DebugLocked = No
270,488 UART: [state] WD Timer not started. Device not locked for debugging
274,770 UART: [kat] SHA2-256
453,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,501 UART: [kat] ++
466,037 UART: [kat] sha1
477,844 UART: [kat] SHA2-256
480,907 UART: [kat] SHA2-384
487,230 UART: [kat] SHA2-512-ACC
490,169 UART: [kat] ECC-384
2,948,671 UART: [kat] HMAC-384Kdf
2,972,467 UART: [kat] LMS
3,501,909 UART: [kat] --
3,508,658 UART: [cold-reset] ++
3,509,893 UART: [fht] FHT @ 0x50003400
3,520,958 UART: [idev] ++
3,521,529 UART: [idev] CDI.KEYID = 6
3,522,415 UART: [idev] SUBJECT.KEYID = 7
3,523,630 UART: [idev] UDS.KEYID = 0
3,544,743 UART: [idev] Erasing UDS.KEYID = 0
6,025,931 UART: [idev] Sha1 KeyId Algorithm
6,048,409 UART: [idev] --
6,053,001 UART: [ldev] ++
6,053,626 UART: [ldev] CDI.KEYID = 6
6,054,564 UART: [ldev] SUBJECT.KEYID = 5
6,055,685 UART: [ldev] AUTHORITY.KEYID = 7
6,056,923 UART: [ldev] FE.KEYID = 1
6,099,819 UART: [ldev] Erasing FE.KEYID = 1
8,602,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,499 UART: [ldev] --
10,413,603 UART: [fwproc] Wait for Commands...
10,416,737 UART: [fwproc] Recv command 0x46574c44
10,418,834 UART: [fwproc] Recv'd Img size: 114360 bytes
10,482,314 UART: ROM Fatal Error: 0x000B0007
10,485,397 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
5,968 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,273 UART:
192,649 UART: Running Caliptra ROM ...
193,808 UART:
193,964 UART: [state] CFI Enabled
265,073 UART: [state] LifecycleState = Unprovisioned
266,953 UART: [state] DebugLocked = No
269,201 UART: [state] WD Timer not started. Device not locked for debugging
273,214 UART: [kat] SHA2-256
452,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,882 UART: [kat] ++
464,435 UART: [kat] sha1
475,806 UART: [kat] SHA2-256
478,804 UART: [kat] SHA2-384
484,020 UART: [kat] SHA2-512-ACC
487,008 UART: [kat] ECC-384
2,947,698 UART: [kat] HMAC-384Kdf
2,971,623 UART: [kat] LMS
3,501,090 UART: [kat] --
3,505,624 UART: [cold-reset] ++
3,508,192 UART: [fht] FHT @ 0x50003400
3,520,420 UART: [idev] ++
3,520,984 UART: [idev] CDI.KEYID = 6
3,521,891 UART: [idev] SUBJECT.KEYID = 7
3,523,101 UART: [idev] UDS.KEYID = 0
3,544,370 UART: [idev] Erasing UDS.KEYID = 0
6,026,037 UART: [idev] Sha1 KeyId Algorithm
6,049,465 UART: [idev] --
6,053,086 UART: [ldev] ++
6,053,661 UART: [ldev] CDI.KEYID = 6
6,054,546 UART: [ldev] SUBJECT.KEYID = 5
6,055,770 UART: [ldev] AUTHORITY.KEYID = 7
6,057,011 UART: [ldev] FE.KEYID = 1
6,100,845 UART: [ldev] Erasing FE.KEYID = 1
8,605,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,001 UART: [ldev] --
10,413,979 UART: [fwproc] Wait for Commands...
10,416,238 UART: [fwproc] Recv command 0x46574c44
10,418,333 UART: [fwproc] Recv'd Img size: 114360 bytes
10,484,535 UART: ROM Fatal Error: 0x000B0007
10,487,676 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,935 writing to cptra_bootfsm_go
6,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,264,124 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
6,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,544 UART:
192,927 UART: Running Caliptra ROM ...
194,033 UART:
603,741 UART: [state] CFI Enabled
615,909 UART: [state] LifecycleState = Unprovisioned
617,732 UART: [state] DebugLocked = No
620,542 UART: [state] WD Timer not started. Device not locked for debugging
624,588 UART: [kat] SHA2-256
803,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,312 UART: [kat] ++
815,756 UART: [kat] sha1
826,973 UART: [kat] SHA2-256
829,972 UART: [kat] SHA2-384
835,946 UART: [kat] SHA2-512-ACC
838,911 UART: [kat] ECC-384
3,281,986 UART: [kat] HMAC-384Kdf
3,294,170 UART: [kat] LMS
3,823,713 UART: [kat] --
3,827,996 UART: [cold-reset] ++
3,830,520 UART: [fht] FHT @ 0x50003400
3,841,661 UART: [idev] ++
3,842,222 UART: [idev] CDI.KEYID = 6
3,843,131 UART: [idev] SUBJECT.KEYID = 7
3,844,345 UART: [idev] UDS.KEYID = 0
3,858,749 UART: [idev] Erasing UDS.KEYID = 0
6,318,139 UART: [idev] Sha1 KeyId Algorithm
6,340,989 UART: [idev] --
6,345,274 UART: [ldev] ++
6,345,840 UART: [ldev] CDI.KEYID = 6
6,346,849 UART: [ldev] SUBJECT.KEYID = 5
6,347,945 UART: [ldev] AUTHORITY.KEYID = 7
6,349,226 UART: [ldev] FE.KEYID = 1
6,359,551 UART: [ldev] Erasing FE.KEYID = 1
8,835,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,776 UART: [ldev] --
10,625,387 UART: [fwproc] Wait for Commands...
10,628,079 UART: [fwproc] Recv command 0x46574c44
10,630,118 UART: [fwproc] Recv'd Img size: 114360 bytes
10,694,474 UART: ROM Fatal Error: 0x000B0007
10,697,576 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
6,542 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,477,355 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,182,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,221 UART: [idev] --
1,209,282 UART: [ldev] ++
1,209,450 UART: [ldev] CDI.KEYID = 6
1,209,814 UART: [ldev] SUBJECT.KEYID = 5
1,210,241 UART: [ldev] AUTHORITY.KEYID = 7
1,210,704 UART: [ldev] FE.KEYID = 1
1,216,156 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,110 UART: [ldev] --
1,281,446 UART: [fwproc] Wait for Commands...
1,282,027 UART: [fwproc] Recv command 0x46574c44
1,282,760 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,213 UART: ROM Fatal Error: 0x000B0007
1,308,370 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,139 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,182,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,182 UART: [idev] --
1,209,463 UART: [ldev] ++
1,209,631 UART: [ldev] CDI.KEYID = 6
1,209,995 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,071 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,465 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,006 UART: ROM Fatal Error: 0x000B0007
1,308,163 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,756 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,220 UART: [ldev] --
1,280,596 UART: [fwproc] Wait for Commands...
1,281,267 UART: [fwproc] Recv command 0x46574c44
1,282,000 UART: [fwproc] Recv'd Img size: 114360 bytes
1,305,721 UART: ROM Fatal Error: 0x000B0007
1,306,878 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,158,647 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,427 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,581 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,678 UART: [fwproc] Recv command 0x46574c44
1,284,411 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,824 UART: ROM Fatal Error: 0x000B0007
1,308,981 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,270 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,199,241 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,932 UART: [ldev] Erasing FE.KEYID = 1
1,242,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,460 UART: [ldev] --
1,281,940 UART: [fwproc] Wait for Commands...
1,282,567 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,461 UART: ROM Fatal Error: 0x000B0007
1,307,618 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,479 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,850 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,711 UART: [ldev] ++
1,209,879 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,670 UART: [ldev] AUTHORITY.KEYID = 7
1,211,133 UART: [ldev] FE.KEYID = 1
1,216,231 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,675 UART: [ldev] --
1,282,033 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,503 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,250 UART: ROM Fatal Error: 0x000B0007
1,308,407 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,606 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
6,043 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,441 UART:
192,830 UART: Running Caliptra ROM ...
194,022 UART:
194,206 UART: [state] CFI Enabled
259,589 UART: [state] LifecycleState = Unprovisioned
262,020 UART: [state] DebugLocked = No
264,651 UART: [state] WD Timer not started. Device not locked for debugging
268,797 UART: [kat] SHA2-256
450,731 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,272 UART: [kat] ++
462,736 UART: [kat] sha1
473,350 UART: [kat] SHA2-256
476,349 UART: [kat] SHA2-384
482,683 UART: [kat] SHA2-512-ACC
485,252 UART: [kat] ECC-384
3,775,563 UART: [kat] HMAC-384Kdf
3,803,863 UART: [kat] LMS
4,877,023 UART: [kat] --
4,882,157 UART: [cold-reset] ++
4,884,795 UART: [fht] FHT @ 0x50003400
4,895,830 UART: [idev] ++
4,896,513 UART: [idev] CDI.KEYID = 6
4,897,746 UART: [idev] SUBJECT.KEYID = 7
4,898,847 UART: [idev] UDS.KEYID = 0
4,930,327 UART: [idev] Erasing UDS.KEYID = 0
8,243,561 UART: [idev] Sha1 KeyId Algorithm
8,266,145 UART: [idev] --
8,271,323 UART: [ldev] ++
8,271,941 UART: [ldev] CDI.KEYID = 6
8,273,044 UART: [ldev] SUBJECT.KEYID = 5
8,274,316 UART: [ldev] AUTHORITY.KEYID = 7
8,275,467 UART: [ldev] FE.KEYID = 1
8,319,061 UART: [ldev] Erasing FE.KEYID = 1
11,654,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,253 UART: [ldev] --
14,038,868 UART: [fwproc] Wait for Commands...
14,040,427 UART: [fwproc] Recv command 0x46574c44
14,042,703 UART: [fwproc] Recv'd Img size: 114036 bytes
14,113,484 UART: ROM Fatal Error: 0x000B0008
14,116,908 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
5,602 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,894,902 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
7,151 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,468 UART:
192,841 UART: Running Caliptra ROM ...
194,031 UART:
603,658 UART: [state] CFI Enabled
618,509 UART: [state] LifecycleState = Unprovisioned
620,898 UART: [state] DebugLocked = No
623,036 UART: [state] WD Timer not started. Device not locked for debugging
628,254 UART: [kat] SHA2-256
810,232 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,762 UART: [kat] ++
822,293 UART: [kat] sha1
833,662 UART: [kat] SHA2-256
836,696 UART: [kat] SHA2-384
842,997 UART: [kat] SHA2-512-ACC
845,613 UART: [kat] ECC-384
4,097,461 UART: [kat] HMAC-384Kdf
4,108,190 UART: [kat] LMS
5,181,336 UART: [kat] --
5,185,360 UART: [cold-reset] ++
5,187,035 UART: [fht] FHT @ 0x50003400
5,198,186 UART: [idev] ++
5,198,863 UART: [idev] CDI.KEYID = 6
5,200,100 UART: [idev] SUBJECT.KEYID = 7
5,201,530 UART: [idev] UDS.KEYID = 0
5,217,028 UART: [idev] Erasing UDS.KEYID = 0
8,491,855 UART: [idev] Sha1 KeyId Algorithm
8,514,070 UART: [idev] --
8,518,390 UART: [ldev] ++
8,518,953 UART: [ldev] CDI.KEYID = 6
8,520,192 UART: [ldev] SUBJECT.KEYID = 5
8,521,624 UART: [ldev] AUTHORITY.KEYID = 7
8,523,190 UART: [ldev] FE.KEYID = 1
8,536,568 UART: [ldev] Erasing FE.KEYID = 1
11,826,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,043 UART: [ldev] --
14,194,806 UART: [fwproc] Wait for Commands...
14,196,363 UART: [fwproc] Recv command 0x46574c44
14,198,682 UART: [fwproc] Recv'd Img size: 114036 bytes
14,266,530 UART: ROM Fatal Error: 0x000B0008
14,269,903 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
6,061 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,093,401 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
5,490 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,097 UART:
192,493 UART: Running Caliptra ROM ...
193,572 UART:
193,716 UART: [state] CFI Enabled
265,261 UART: [state] LifecycleState = Unprovisioned
267,154 UART: [state] DebugLocked = No
268,617 UART: [state] WD Timer not started. Device not locked for debugging
272,311 UART: [kat] SHA2-256
451,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,016 UART: [kat] ++
463,468 UART: [kat] sha1
473,635 UART: [kat] SHA2-256
476,705 UART: [kat] SHA2-384
483,083 UART: [kat] SHA2-512-ACC
486,030 UART: [kat] ECC-384
2,947,647 UART: [kat] HMAC-384Kdf
2,972,903 UART: [kat] LMS
3,502,310 UART: [kat] --
3,508,566 UART: [cold-reset] ++
3,509,630 UART: [fht] FHT @ 0x50003400
3,519,852 UART: [idev] ++
3,520,415 UART: [idev] CDI.KEYID = 6
3,521,337 UART: [idev] SUBJECT.KEYID = 7
3,522,499 UART: [idev] UDS.KEYID = 0
3,544,954 UART: [idev] Erasing UDS.KEYID = 0
6,027,802 UART: [idev] Sha1 KeyId Algorithm
6,051,299 UART: [idev] --
6,054,614 UART: [ldev] ++
6,055,196 UART: [ldev] CDI.KEYID = 6
6,056,103 UART: [ldev] SUBJECT.KEYID = 5
6,057,277 UART: [ldev] AUTHORITY.KEYID = 7
6,058,578 UART: [ldev] FE.KEYID = 1
6,101,956 UART: [ldev] Erasing FE.KEYID = 1
8,607,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,602 UART: [ldev] --
10,413,057 UART: [fwproc] Wait for Commands...
10,415,647 UART: [fwproc] Recv command 0x46574c44
10,417,745 UART: [fwproc] Recv'd Img size: 114360 bytes
10,490,757 UART: ROM Fatal Error: 0x000B0008
10,493,853 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
5,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,324 UART:
192,703 UART: Running Caliptra ROM ...
193,866 UART:
194,019 UART: [state] CFI Enabled
264,036 UART: [state] LifecycleState = Unprovisioned
265,936 UART: [state] DebugLocked = No
268,742 UART: [state] WD Timer not started. Device not locked for debugging
272,046 UART: [kat] SHA2-256
451,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,728 UART: [kat] ++
463,266 UART: [kat] sha1
475,338 UART: [kat] SHA2-256
478,358 UART: [kat] SHA2-384
484,985 UART: [kat] SHA2-512-ACC
487,920 UART: [kat] ECC-384
2,948,440 UART: [kat] HMAC-384Kdf
2,972,007 UART: [kat] LMS
3,501,474 UART: [kat] --
3,505,723 UART: [cold-reset] ++
3,507,457 UART: [fht] FHT @ 0x50003400
3,519,369 UART: [idev] ++
3,519,944 UART: [idev] CDI.KEYID = 6
3,520,859 UART: [idev] SUBJECT.KEYID = 7
3,522,041 UART: [idev] UDS.KEYID = 0
3,542,779 UART: [idev] Erasing UDS.KEYID = 0
6,024,369 UART: [idev] Sha1 KeyId Algorithm
6,047,174 UART: [idev] --
6,051,282 UART: [ldev] ++
6,051,856 UART: [ldev] CDI.KEYID = 6
6,052,764 UART: [ldev] SUBJECT.KEYID = 5
6,053,927 UART: [ldev] AUTHORITY.KEYID = 7
6,055,220 UART: [ldev] FE.KEYID = 1
6,100,060 UART: [ldev] Erasing FE.KEYID = 1
8,600,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,138 UART: [ldev] --
10,392,029 UART: [fwproc] Wait for Commands...
10,393,976 UART: [fwproc] Recv command 0x46574c44
10,396,023 UART: [fwproc] Recv'd Img size: 114360 bytes
10,465,610 UART: ROM Fatal Error: 0x000B0008
10,468,708 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
5,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,267,009 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
6,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,475 UART:
192,851 UART: Running Caliptra ROM ...
194,022 UART:
603,754 UART: [state] CFI Enabled
615,924 UART: [state] LifecycleState = Unprovisioned
617,821 UART: [state] DebugLocked = No
619,169 UART: [state] WD Timer not started. Device not locked for debugging
623,286 UART: [kat] SHA2-256
802,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,958 UART: [kat] ++
814,402 UART: [kat] sha1
825,655 UART: [kat] SHA2-256
828,703 UART: [kat] SHA2-384
835,099 UART: [kat] SHA2-512-ACC
838,060 UART: [kat] ECC-384
3,282,591 UART: [kat] HMAC-384Kdf
3,295,472 UART: [kat] LMS
3,824,957 UART: [kat] --
3,828,749 UART: [cold-reset] ++
3,829,760 UART: [fht] FHT @ 0x50003400
3,840,584 UART: [idev] ++
3,841,146 UART: [idev] CDI.KEYID = 6
3,842,054 UART: [idev] SUBJECT.KEYID = 7
3,843,269 UART: [idev] UDS.KEYID = 0
3,861,917 UART: [idev] Erasing UDS.KEYID = 0
6,317,295 UART: [idev] Sha1 KeyId Algorithm
6,340,904 UART: [idev] --
6,345,914 UART: [ldev] ++
6,346,482 UART: [ldev] CDI.KEYID = 6
6,347,397 UART: [ldev] SUBJECT.KEYID = 5
6,348,580 UART: [ldev] AUTHORITY.KEYID = 7
6,349,810 UART: [ldev] FE.KEYID = 1
6,360,727 UART: [ldev] Erasing FE.KEYID = 1
8,833,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,161 UART: [ldev] --
10,623,331 UART: [fwproc] Wait for Commands...
10,625,488 UART: [fwproc] Recv command 0x46574c44
10,627,530 UART: [fwproc] Recv'd Img size: 114360 bytes
10,701,454 UART: ROM Fatal Error: 0x000B0008
10,704,598 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
6,437 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,475,829 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,031 UART: [idev] ++
1,173,199 UART: [idev] CDI.KEYID = 6
1,173,560 UART: [idev] SUBJECT.KEYID = 7
1,173,985 UART: [idev] UDS.KEYID = 0
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,199,261 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,276 UART: [ldev] ++
1,209,444 UART: [ldev] CDI.KEYID = 6
1,209,808 UART: [ldev] SUBJECT.KEYID = 5
1,210,235 UART: [ldev] AUTHORITY.KEYID = 7
1,210,698 UART: [ldev] FE.KEYID = 1
1,215,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,859 UART: [fwproc] Recv command 0x46574c44
1,282,592 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,428 UART: ROM Fatal Error: 0x000B0008
1,308,585 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,808 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,629 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,182,830 UART: [idev] Erasing UDS.KEYID = 0
1,200,006 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,635 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,216,925 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,309 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,645 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,649 UART: ROM Fatal Error: 0x000B0008
1,308,806 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,445 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,569 UART: [idev] ++
1,172,737 UART: [idev] CDI.KEYID = 6
1,173,098 UART: [idev] SUBJECT.KEYID = 7
1,173,523 UART: [idev] UDS.KEYID = 0
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,123 UART: [idev] Sha1 KeyId Algorithm
1,206,935 UART: [idev] --
1,208,052 UART: [ldev] ++
1,208,220 UART: [ldev] CDI.KEYID = 6
1,208,584 UART: [ldev] SUBJECT.KEYID = 5
1,209,011 UART: [ldev] AUTHORITY.KEYID = 7
1,209,474 UART: [ldev] FE.KEYID = 1
1,214,610 UART: [ldev] Erasing FE.KEYID = 1
1,240,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,590 UART: [ldev] --
1,280,026 UART: [fwproc] Wait for Commands...
1,280,769 UART: [fwproc] Recv command 0x46574c44
1,281,502 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,766 UART: ROM Fatal Error: 0x000B0008
1,307,923 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,398 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,209,685 UART: [ldev] ++
1,209,853 UART: [ldev] CDI.KEYID = 6
1,210,217 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,727 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,093 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,753 UART: ROM Fatal Error: 0x000B0008
1,308,910 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,277 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,198 UART: [kat] LMS
1,169,510 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,845 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,182,357 UART: [idev] Erasing UDS.KEYID = 0
1,199,421 UART: [idev] Sha1 KeyId Algorithm
1,208,265 UART: [idev] --
1,209,330 UART: [ldev] ++
1,209,498 UART: [ldev] CDI.KEYID = 6
1,209,862 UART: [ldev] SUBJECT.KEYID = 5
1,210,289 UART: [ldev] AUTHORITY.KEYID = 7
1,210,752 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,241,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,160 UART: [ldev] --
1,280,446 UART: [fwproc] Wait for Commands...
1,281,159 UART: [fwproc] Recv command 0x46574c44
1,281,892 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,530 UART: ROM Fatal Error: 0x000B0008
1,308,687 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,276 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,646 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,198,716 UART: [idev] Sha1 KeyId Algorithm
1,207,714 UART: [idev] --
1,208,777 UART: [ldev] ++
1,208,945 UART: [ldev] CDI.KEYID = 6
1,209,309 UART: [ldev] SUBJECT.KEYID = 5
1,209,736 UART: [ldev] AUTHORITY.KEYID = 7
1,210,199 UART: [ldev] FE.KEYID = 1
1,215,561 UART: [ldev] Erasing FE.KEYID = 1
1,241,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,347 UART: [ldev] --
1,280,735 UART: [fwproc] Wait for Commands...
1,281,372 UART: [fwproc] Recv command 0x46574c44
1,282,105 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,687 UART: ROM Fatal Error: 0x000B0008
1,307,844 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,443 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,219,184 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,363,788 UART:
2,364,197 UART: Running Caliptra ROM ...
2,365,299 UART:
2,365,465 UART: [state] CFI Enabled
2,366,440 UART: [state] LifecycleState = Unprovisioned
2,368,014 UART: [state] DebugLocked = No
2,369,037 UART: [state] WD Timer not started. Device not locked for debugging
2,371,511 UART: [kat] SHA2-256
2,372,174 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,375,188 UART: [kat] ++
2,375,633 UART: [kat] sha1
2,376,142 UART: [kat] SHA2-256
2,376,799 UART: [kat] SHA2-384
2,377,453 UART: [kat] SHA2-512-ACC
2,378,451 UART: [kat] ECC-384
3,777,330 UART: [kat] HMAC-384Kdf
3,804,474 UART: [kat] LMS
4,877,667 UART: [kat] --
4,882,571 UART: [cold-reset] ++
4,884,673 UART: [fht] FHT @ 0x50003400
4,896,149 UART: [idev] ++
4,896,756 UART: [idev] CDI.KEYID = 6
4,897,921 UART: [idev] SUBJECT.KEYID = 7
4,899,079 UART: [idev] UDS.KEYID = 0
4,932,517 UART: [idev] Erasing UDS.KEYID = 0
8,246,357 UART: [idev] Sha1 KeyId Algorithm
8,267,964 UART: [idev] --
8,272,314 UART: [ldev] ++
8,272,890 UART: [ldev] CDI.KEYID = 6
8,274,136 UART: [ldev] SUBJECT.KEYID = 5
8,275,196 UART: [ldev] AUTHORITY.KEYID = 7
8,276,483 UART: [ldev] FE.KEYID = 1
8,319,861 UART: [ldev] Erasing FE.KEYID = 1
11,651,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,349 UART: [ldev] --
14,038,677 UART: [fwproc] Wait for Commands...
14,040,614 UART: [fwproc] Recv command 0x46574c44
14,042,930 UART: [fwproc] Recv'd Img size: 114036 bytes
14,107,762 UART: ROM Fatal Error: 0x000B0009
14,111,186 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,818 writing to cptra_bootfsm_go
2,057,656 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,201,738 UART:
2,202,154 UART: Running Caliptra ROM ...
2,203,317 UART:
2,203,497 UART: [state] CFI Enabled
2,204,461 UART: [state] LifecycleState = Unprovisioned
2,206,124 UART: [state] DebugLocked = No
2,207,201 UART: [state] WD Timer not started. Device not locked for debugging
2,209,674 UART: [kat] SHA2-256
2,210,346 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,341 UART: [kat] ++
2,213,836 UART: [kat] sha1
2,214,369 UART: [kat] SHA2-256
2,215,109 UART: [kat] SHA2-384
2,215,777 UART: [kat] SHA2-512-ACC
2,216,657 UART: [kat] ECC-384
3,774,213 UART: [kat] HMAC-384Kdf
3,802,008 UART: [kat] LMS
4,875,145 UART: [kat] --
4,877,683 UART: [cold-reset] ++
4,879,832 UART: [fht] FHT @ 0x50003400
4,891,518 UART: [idev] ++
4,892,241 UART: [idev] CDI.KEYID = 6
4,893,432 UART: [idev] SUBJECT.KEYID = 7
4,894,597 UART: [idev] UDS.KEYID = 0
4,928,616 UART: [idev] Erasing UDS.KEYID = 0
8,241,237 UART: [idev] Sha1 KeyId Algorithm
8,263,983 UART: [idev] --
8,268,024 UART: [ldev] ++
8,268,610 UART: [ldev] CDI.KEYID = 6
8,269,718 UART: [ldev] SUBJECT.KEYID = 5
8,270,989 UART: [ldev] AUTHORITY.KEYID = 7
8,272,084 UART: [ldev] FE.KEYID = 1
8,316,896 UART: [ldev] Erasing FE.KEYID = 1
11,651,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,062 UART: [ldev] --
14,035,954 UART: [fwproc] Wait for Commands...
14,038,166 UART: [fwproc] Recv command 0x46574c44
14,040,431 UART: [fwproc] Recv'd Img size: 114036 bytes
14,105,226 UART: ROM Fatal Error: 0x000B0009
14,108,605 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
2,052,337 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,196,378 UART:
2,196,776 UART: Running Caliptra ROM ...
2,197,900 UART:
2,198,066 UART: [state] CFI Enabled
2,198,993 UART: [state] LifecycleState = Unprovisioned
2,200,640 UART: [state] DebugLocked = No
2,201,781 UART: [state] WD Timer not started. Device not locked for debugging
2,204,260 UART: [kat] SHA2-256
2,204,930 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,958 UART: [kat] ++
2,208,407 UART: [kat] sha1
2,208,945 UART: [kat] SHA2-256
2,209,607 UART: [kat] SHA2-384
2,210,321 UART: [kat] SHA2-512-ACC
2,211,150 UART: [kat] ECC-384
3,769,996 UART: [kat] HMAC-384Kdf
3,795,908 UART: [kat] LMS
4,869,071 UART: [kat] --
4,871,937 UART: [cold-reset] ++
4,873,275 UART: [fht] FHT @ 0x50003400
4,884,313 UART: [idev] ++
4,885,030 UART: [idev] CDI.KEYID = 6
4,886,165 UART: [idev] SUBJECT.KEYID = 7
4,887,329 UART: [idev] UDS.KEYID = 0
4,922,614 UART: [idev] Erasing UDS.KEYID = 0
8,229,432 UART: [idev] Sha1 KeyId Algorithm
8,251,121 UART: [idev] --
8,255,637 UART: [ldev] ++
8,256,266 UART: [ldev] CDI.KEYID = 6
8,257,374 UART: [ldev] SUBJECT.KEYID = 5
8,258,584 UART: [ldev] AUTHORITY.KEYID = 7
8,259,741 UART: [ldev] FE.KEYID = 1
8,302,495 UART: [ldev] Erasing FE.KEYID = 1
11,637,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,946,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,962,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,978,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,994,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,015,322 UART: [ldev] --
14,019,258 UART: [fwproc] Wait for Commands...
14,021,955 UART: [fwproc] Recv command 0x46574c44
14,024,283 UART: [fwproc] Recv'd Img size: 114036 bytes
14,093,192 UART: ROM Fatal Error: 0x000B0009
14,096,607 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,051,013 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,195,155 UART:
2,195,556 UART: Running Caliptra ROM ...
2,196,657 UART:
2,196,815 UART: [state] CFI Enabled
2,197,819 UART: [state] LifecycleState = Unprovisioned
2,199,377 UART: [state] DebugLocked = No
2,200,403 UART: [state] WD Timer not started. Device not locked for debugging
2,202,874 UART: [kat] SHA2-256
2,203,546 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,557 UART: [kat] ++
2,207,007 UART: [kat] sha1
2,207,525 UART: [kat] SHA2-256
2,208,267 UART: [kat] SHA2-384
2,208,933 UART: [kat] SHA2-512-ACC
2,209,769 UART: [kat] ECC-384
3,775,410 UART: [kat] HMAC-384Kdf
3,801,792 UART: [kat] LMS
4,874,922 UART: [kat] --
4,879,922 UART: [cold-reset] ++
4,882,593 UART: [fht] FHT @ 0x50003400
4,894,881 UART: [idev] ++
4,895,567 UART: [idev] CDI.KEYID = 6
4,896,802 UART: [idev] SUBJECT.KEYID = 7
4,897,961 UART: [idev] UDS.KEYID = 0
4,929,007 UART: [idev] Erasing UDS.KEYID = 0
8,243,565 UART: [idev] Sha1 KeyId Algorithm
8,265,832 UART: [idev] --
8,271,069 UART: [ldev] ++
8,271,647 UART: [ldev] CDI.KEYID = 6
8,272,830 UART: [ldev] SUBJECT.KEYID = 5
8,273,991 UART: [ldev] AUTHORITY.KEYID = 7
8,275,146 UART: [ldev] FE.KEYID = 1
8,316,009 UART: [ldev] Erasing FE.KEYID = 1
11,651,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,014 UART: [ldev] --
14,037,338 UART: [fwproc] Wait for Commands...
14,039,064 UART: [fwproc] Recv command 0x46574c44
14,041,391 UART: [fwproc] Recv'd Img size: 114036 bytes
18,106,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,176,625 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,245,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,562,828 >>> mbox cmd response: success
18,567,560 UART: [afmc] ++
18,568,268 UART: [afmc] CDI.KEYID = 6
18,569,452 UART: [afmc] SUBJECT.KEYID = 7
18,570,624 UART: [afmc] AUTHORITY.KEYID = 5
21,939,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,241,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,243,822 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,259,969 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,276,045 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,291,911 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,314,015 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,218,224 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,877,697 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,056,248 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,897,711 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
2,049,514 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,898,936 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,054,238 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,343,752 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,225,979 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,370,541 UART:
2,370,955 UART: Running Caliptra ROM ...
2,372,120 UART:
2,372,285 UART: [state] CFI Enabled
2,373,247 UART: [state] LifecycleState = Unprovisioned
2,374,901 UART: [state] DebugLocked = No
2,376,002 UART: [state] WD Timer not started. Device not locked for debugging
2,378,496 UART: [kat] SHA2-256
2,379,160 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,382,176 UART: [kat] ++
2,382,622 UART: [kat] sha1
2,383,126 UART: [kat] SHA2-256
2,383,965 UART: [kat] SHA2-384
2,384,623 UART: [kat] SHA2-512-ACC
2,385,419 UART: [kat] ECC-384
4,098,737 UART: [kat] HMAC-384Kdf
4,110,442 UART: [kat] LMS
5,183,546 UART: [kat] --
5,189,169 UART: [cold-reset] ++
5,190,346 UART: [fht] FHT @ 0x50003400
5,201,104 UART: [idev] ++
5,201,772 UART: [idev] CDI.KEYID = 6
5,202,996 UART: [idev] SUBJECT.KEYID = 7
5,204,497 UART: [idev] UDS.KEYID = 0
5,223,981 UART: [idev] Erasing UDS.KEYID = 0
8,496,540 UART: [idev] Sha1 KeyId Algorithm
8,519,388 UART: [idev] --
8,524,447 UART: [ldev] ++
8,525,025 UART: [ldev] CDI.KEYID = 6
8,526,210 UART: [ldev] SUBJECT.KEYID = 5
8,527,695 UART: [ldev] AUTHORITY.KEYID = 7
8,529,247 UART: [ldev] FE.KEYID = 1
8,541,349 UART: [ldev] Erasing FE.KEYID = 1
11,832,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,591 UART: [ldev] --
14,198,103 UART: [fwproc] Wait for Commands...
14,199,936 UART: [fwproc] Recv command 0x46574c44
14,202,243 UART: [fwproc] Recv'd Img size: 114036 bytes
14,275,978 UART: ROM Fatal Error: 0x000B0009
14,279,394 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,062,540 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,206,630 UART:
2,207,043 UART: Running Caliptra ROM ...
2,208,217 UART:
2,208,386 UART: [state] CFI Enabled
2,209,338 UART: [state] LifecycleState = Unprovisioned
2,210,989 UART: [state] DebugLocked = No
2,212,091 UART: [state] WD Timer not started. Device not locked for debugging
2,214,552 UART: [kat] SHA2-256
2,215,213 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,218,209 UART: [kat] ++
2,218,651 UART: [kat] sha1
2,219,191 UART: [kat] SHA2-256
2,219,842 UART: [kat] SHA2-384
2,220,491 UART: [kat] SHA2-512-ACC
2,221,306 UART: [kat] ECC-384
4,103,114 UART: [kat] HMAC-384Kdf
4,113,596 UART: [kat] LMS
5,186,747 UART: [kat] --
5,190,956 UART: [cold-reset] ++
5,192,401 UART: [fht] FHT @ 0x50003400
5,204,079 UART: [idev] ++
5,204,752 UART: [idev] CDI.KEYID = 6
5,205,900 UART: [idev] SUBJECT.KEYID = 7
5,207,385 UART: [idev] UDS.KEYID = 0
5,225,449 UART: [idev] Erasing UDS.KEYID = 0
8,499,469 UART: [idev] Sha1 KeyId Algorithm
8,521,573 UART: [idev] --
8,526,317 UART: [ldev] ++
8,526,939 UART: [ldev] CDI.KEYID = 6
8,528,119 UART: [ldev] SUBJECT.KEYID = 5
8,529,606 UART: [ldev] AUTHORITY.KEYID = 7
8,531,086 UART: [ldev] FE.KEYID = 1
8,541,539 UART: [ldev] Erasing FE.KEYID = 1
11,835,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,908 UART: [ldev] --
14,201,038 UART: [fwproc] Wait for Commands...
14,202,541 UART: [fwproc] Recv command 0x46574c44
14,204,529 UART: [fwproc] Recv'd Img size: 114036 bytes
14,277,163 UART: ROM Fatal Error: 0x000B0009
14,280,581 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,062,215 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,206,141 UART:
2,206,544 UART: Running Caliptra ROM ...
2,207,623 UART:
2,207,767 UART: [state] CFI Enabled
2,208,750 UART: [state] LifecycleState = Unprovisioned
2,210,390 UART: [state] DebugLocked = No
2,211,413 UART: [state] WD Timer not started. Device not locked for debugging
2,213,873 UART: [kat] SHA2-256
2,214,535 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,217,551 UART: [kat] ++
2,217,999 UART: [kat] sha1
2,218,524 UART: [kat] SHA2-256
2,219,259 UART: [kat] SHA2-384
2,219,917 UART: [kat] SHA2-512-ACC
2,220,712 UART: [kat] ECC-384
4,100,750 UART: [kat] HMAC-384Kdf
4,111,848 UART: [kat] LMS
5,184,991 UART: [kat] --
5,189,747 UART: [cold-reset] ++
5,192,541 UART: [fht] FHT @ 0x50003400
5,202,724 UART: [idev] ++
5,203,439 UART: [idev] CDI.KEYID = 6
5,204,543 UART: [idev] SUBJECT.KEYID = 7
5,206,079 UART: [idev] UDS.KEYID = 0
5,222,407 UART: [idev] Erasing UDS.KEYID = 0
8,490,748 UART: [idev] Sha1 KeyId Algorithm
8,513,070 UART: [idev] --
8,518,061 UART: [ldev] ++
8,518,690 UART: [ldev] CDI.KEYID = 6
8,519,866 UART: [ldev] SUBJECT.KEYID = 5
8,521,350 UART: [ldev] AUTHORITY.KEYID = 7
8,522,903 UART: [ldev] FE.KEYID = 1
8,533,868 UART: [ldev] Erasing FE.KEYID = 1
11,828,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,312 UART: [ldev] --
14,193,496 UART: [fwproc] Wait for Commands...
14,196,450 UART: [fwproc] Recv command 0x46574c44
14,198,760 UART: [fwproc] Recv'd Img size: 114036 bytes
14,273,395 UART: ROM Fatal Error: 0x000B0009
14,276,776 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,059,898 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,203,743 UART:
2,204,157 UART: Running Caliptra ROM ...
2,205,237 UART:
2,205,384 UART: [state] CFI Enabled
2,206,355 UART: [state] LifecycleState = Unprovisioned
2,207,992 UART: [state] DebugLocked = No
2,209,009 UART: [state] WD Timer not started. Device not locked for debugging
2,211,490 UART: [kat] SHA2-256
2,212,149 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,149 UART: [kat] ++
2,215,586 UART: [kat] sha1
2,216,088 UART: [kat] SHA2-256
2,216,738 UART: [kat] SHA2-384
2,217,384 UART: [kat] SHA2-512-ACC
2,218,173 UART: [kat] ECC-384
4,101,000 UART: [kat] HMAC-384Kdf
4,112,622 UART: [kat] LMS
5,185,742 UART: [kat] --
5,192,233 UART: [cold-reset] ++
5,193,567 UART: [fht] FHT @ 0x50003400
5,205,081 UART: [idev] ++
5,205,749 UART: [idev] CDI.KEYID = 6
5,206,977 UART: [idev] SUBJECT.KEYID = 7
5,208,481 UART: [idev] UDS.KEYID = 0
5,227,028 UART: [idev] Erasing UDS.KEYID = 0
8,503,751 UART: [idev] Sha1 KeyId Algorithm
8,525,595 UART: [idev] --
8,529,266 UART: [ldev] ++
8,529,885 UART: [ldev] CDI.KEYID = 6
8,531,063 UART: [ldev] SUBJECT.KEYID = 5
8,532,552 UART: [ldev] AUTHORITY.KEYID = 7
8,534,106 UART: [ldev] FE.KEYID = 1
8,545,244 UART: [ldev] Erasing FE.KEYID = 1
11,830,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,824 UART: [ldev] --
14,192,966 UART: [fwproc] Wait for Commands...
14,195,118 UART: [fwproc] Recv command 0x46574c44
14,197,430 UART: [fwproc] Recv'd Img size: 114036 bytes
18,265,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,333,448 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,402,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,719,722 >>> mbox cmd response: success
18,724,037 UART: [afmc] ++
18,724,743 UART: [afmc] CDI.KEYID = 6
18,725,929 UART: [afmc] SUBJECT.KEYID = 7
18,727,078 UART: [afmc] AUTHORITY.KEYID = 5
22,047,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,343,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,345,263 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,361,406 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,377,483 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,393,407 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,416,351 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,224,310 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,098,599 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,422 writing to cptra_bootfsm_go
2,069,667 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,097,067 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,054,816 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,082,479 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,064,487 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,543,498 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,226,966 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,372,221 UART:
2,372,641 UART: Running Caliptra ROM ...
2,373,723 UART:
2,373,881 UART: [state] CFI Enabled
2,374,860 UART: [state] LifecycleState = Unprovisioned
2,376,536 UART: [state] DebugLocked = No
2,377,595 UART: [state] WD Timer not started. Device not locked for debugging
2,380,088 UART: [kat] SHA2-256
2,380,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,383,781 UART: [kat] ++
2,384,233 UART: [kat] sha1
2,384,745 UART: [kat] SHA2-256
2,385,505 UART: [kat] SHA2-384
2,386,175 UART: [kat] SHA2-512-ACC
2,387,001 UART: [kat] ECC-384
2,943,321 UART: [kat] HMAC-384Kdf
2,968,701 UART: [kat] LMS
3,498,132 UART: [kat] --
3,502,902 UART: [cold-reset] ++
3,504,999 UART: [fht] FHT @ 0x50003400
3,515,879 UART: [idev] ++
3,516,484 UART: [idev] CDI.KEYID = 6
3,517,370 UART: [idev] SUBJECT.KEYID = 7
3,518,475 UART: [idev] UDS.KEYID = 0
3,540,503 UART: [idev] Erasing UDS.KEYID = 0
6,023,258 UART: [idev] Sha1 KeyId Algorithm
6,046,482 UART: [idev] --
6,050,589 UART: [ldev] ++
6,051,180 UART: [ldev] CDI.KEYID = 6
6,052,065 UART: [ldev] SUBJECT.KEYID = 5
6,053,227 UART: [ldev] AUTHORITY.KEYID = 7
6,054,521 UART: [ldev] FE.KEYID = 1
6,097,494 UART: [ldev] Erasing FE.KEYID = 1
8,600,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,813 UART: [ldev] --
10,413,195 UART: [fwproc] Wait for Commands...
10,415,569 UART: [fwproc] Recv command 0x46574c44
10,417,665 UART: [fwproc] Recv'd Img size: 114360 bytes
10,491,594 UART: ROM Fatal Error: 0x000B0009
10,494,682 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,058,100 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,202,557 UART:
2,202,964 UART: Running Caliptra ROM ...
2,204,133 UART:
2,204,304 UART: [state] CFI Enabled
2,205,270 UART: [state] LifecycleState = Unprovisioned
2,206,948 UART: [state] DebugLocked = No
2,208,056 UART: [state] WD Timer not started. Device not locked for debugging
2,210,524 UART: [kat] SHA2-256
2,211,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,187 UART: [kat] ++
2,214,638 UART: [kat] sha1
2,215,178 UART: [kat] SHA2-256
2,215,838 UART: [kat] SHA2-384
2,216,497 UART: [kat] SHA2-512-ACC
2,217,389 UART: [kat] ECC-384
2,946,400 UART: [kat] HMAC-384Kdf
2,971,447 UART: [kat] LMS
3,500,907 UART: [kat] --
3,506,002 UART: [cold-reset] ++
3,507,782 UART: [fht] FHT @ 0x50003400
3,517,900 UART: [idev] ++
3,518,531 UART: [idev] CDI.KEYID = 6
3,519,445 UART: [idev] SUBJECT.KEYID = 7
3,520,550 UART: [idev] UDS.KEYID = 0
3,543,604 UART: [idev] Erasing UDS.KEYID = 0
6,021,593 UART: [idev] Sha1 KeyId Algorithm
6,043,596 UART: [idev] --
6,047,008 UART: [ldev] ++
6,047,587 UART: [ldev] CDI.KEYID = 6
6,048,468 UART: [ldev] SUBJECT.KEYID = 5
6,049,688 UART: [ldev] AUTHORITY.KEYID = 7
6,050,926 UART: [ldev] FE.KEYID = 1
6,078,895 UART: [ldev] Erasing FE.KEYID = 1
8,582,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,343 UART: [ldev] --
10,389,203 UART: [fwproc] Wait for Commands...
10,392,485 UART: [fwproc] Recv command 0x46574c44
10,394,542 UART: [fwproc] Recv'd Img size: 114360 bytes
10,471,499 UART: ROM Fatal Error: 0x000B0009
10,474,589 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,055,288 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,199,791 UART:
2,200,194 UART: Running Caliptra ROM ...
2,201,366 UART:
2,201,553 UART: [state] CFI Enabled
2,202,542 UART: [state] LifecycleState = Unprovisioned
2,204,186 UART: [state] DebugLocked = No
2,205,293 UART: [state] WD Timer not started. Device not locked for debugging
2,207,764 UART: [kat] SHA2-256
2,208,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,440 UART: [kat] ++
2,211,889 UART: [kat] sha1
2,212,402 UART: [kat] SHA2-256
2,213,143 UART: [kat] SHA2-384
2,213,805 UART: [kat] SHA2-512-ACC
2,214,646 UART: [kat] ECC-384
2,950,140 UART: [kat] HMAC-384Kdf
2,973,098 UART: [kat] LMS
3,502,520 UART: [kat] --
3,506,966 UART: [cold-reset] ++
3,508,204 UART: [fht] FHT @ 0x50003400
3,519,888 UART: [idev] ++
3,520,451 UART: [idev] CDI.KEYID = 6
3,521,471 UART: [idev] SUBJECT.KEYID = 7
3,522,583 UART: [idev] UDS.KEYID = 0
3,544,381 UART: [idev] Erasing UDS.KEYID = 0
6,025,633 UART: [idev] Sha1 KeyId Algorithm
6,050,055 UART: [idev] --
6,053,025 UART: [ldev] ++
6,053,601 UART: [ldev] CDI.KEYID = 6
6,054,508 UART: [ldev] SUBJECT.KEYID = 5
6,055,726 UART: [ldev] AUTHORITY.KEYID = 7
6,056,984 UART: [ldev] FE.KEYID = 1
6,102,261 UART: [ldev] Erasing FE.KEYID = 1
8,605,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,623 UART: [ldev] --
10,416,143 UART: [fwproc] Wait for Commands...
10,418,518 UART: [fwproc] Recv command 0x46574c44
10,420,558 UART: [fwproc] Recv'd Img size: 114360 bytes
10,493,521 UART: ROM Fatal Error: 0x000B0009
10,496,609 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
2,058,147 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,202,582 UART:
2,202,977 UART: Running Caliptra ROM ...
2,204,146 UART:
2,204,329 UART: [state] CFI Enabled
2,205,306 UART: [state] LifecycleState = Unprovisioned
2,206,948 UART: [state] DebugLocked = No
2,208,053 UART: [state] WD Timer not started. Device not locked for debugging
2,210,518 UART: [kat] SHA2-256
2,211,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,202 UART: [kat] ++
2,214,676 UART: [kat] sha1
2,215,193 UART: [kat] SHA2-256
2,215,848 UART: [kat] SHA2-384
2,216,507 UART: [kat] SHA2-512-ACC
2,217,305 UART: [kat] ECC-384
2,947,651 UART: [kat] HMAC-384Kdf
2,970,854 UART: [kat] LMS
3,500,330 UART: [kat] --
3,504,588 UART: [cold-reset] ++
3,506,028 UART: [fht] FHT @ 0x50003400
3,516,693 UART: [idev] ++
3,517,257 UART: [idev] CDI.KEYID = 6
3,518,164 UART: [idev] SUBJECT.KEYID = 7
3,519,377 UART: [idev] UDS.KEYID = 0
3,543,945 UART: [idev] Erasing UDS.KEYID = 0
6,027,527 UART: [idev] Sha1 KeyId Algorithm
6,049,912 UART: [idev] --
6,054,775 UART: [ldev] ++
6,055,349 UART: [ldev] CDI.KEYID = 6
6,056,257 UART: [ldev] SUBJECT.KEYID = 5
6,057,420 UART: [ldev] AUTHORITY.KEYID = 7
6,058,655 UART: [ldev] FE.KEYID = 1
6,098,851 UART: [ldev] Erasing FE.KEYID = 1
8,602,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,299 UART: [ldev] --
10,414,422 UART: [fwproc] Wait for Commands...
10,417,393 UART: [fwproc] Recv command 0x46574c44
10,419,441 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,899,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,285,530 >>> mbox cmd response: success
14,290,461 UART: [afmc] ++
14,291,057 UART: [afmc] CDI.KEYID = 6
14,291,970 UART: [afmc] SUBJECT.KEYID = 7
14,293,133 UART: [afmc] AUTHORITY.KEYID = 5
16,826,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,040 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,568,021 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,583,850 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,599,593 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,622,612 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,225,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,370,894 UART:
2,371,302 UART: Running Caliptra ROM ...
2,372,430 UART:
2,372,593 UART: [state] CFI Enabled
2,373,557 UART: [state] LifecycleState = Unprovisioned
2,375,221 UART: [state] DebugLocked = No
2,376,334 UART: [state] WD Timer not started. Device not locked for debugging
2,378,806 UART: [kat] SHA2-256
2,379,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,382,507 UART: [kat] ++
2,382,958 UART: [kat] sha1
2,383,471 UART: [kat] SHA2-256
2,384,215 UART: [kat] SHA2-384
2,384,877 UART: [kat] SHA2-512-ACC
2,385,674 UART: [kat] ECC-384
2,948,865 UART: [kat] HMAC-384Kdf
2,971,129 UART: [kat] LMS
3,500,581 UART: [kat] --
3,506,130 UART: [cold-reset] ++
3,507,742 UART: [fht] FHT @ 0x50003400
3,518,996 UART: [idev] ++
3,519,560 UART: [idev] CDI.KEYID = 6
3,520,469 UART: [idev] SUBJECT.KEYID = 7
3,521,690 UART: [idev] UDS.KEYID = 0
3,543,331 UART: [idev] Erasing UDS.KEYID = 0
6,026,405 UART: [idev] Sha1 KeyId Algorithm
6,050,014 UART: [idev] --
6,054,053 UART: [ldev] ++
6,054,695 UART: [ldev] CDI.KEYID = 6
6,055,595 UART: [ldev] SUBJECT.KEYID = 5
6,056,737 UART: [ldev] AUTHORITY.KEYID = 7
6,058,032 UART: [ldev] FE.KEYID = 1
6,093,783 UART: [ldev] Erasing FE.KEYID = 1
8,593,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,373 UART: [ldev] --
10,386,501 UART: [fwproc] Wait for Commands...
10,388,839 UART: [fwproc] Recv command 0x46574c44
10,390,941 UART: [fwproc] Recv'd Img size: 114360 bytes
10,464,494 UART: ROM Fatal Error: 0x000B0009
10,467,635 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,059,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,204,319 UART:
2,204,853 UART: Running Caliptra ROM ...
2,205,955 UART:
2,206,110 UART: [state] CFI Enabled
2,207,027 UART: [state] LifecycleState = Unprovisioned
2,208,707 UART: [state] DebugLocked = No
2,209,728 UART: [state] WD Timer not started. Device not locked for debugging
2,212,197 UART: [kat] SHA2-256
2,212,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,865 UART: [kat] ++
2,216,311 UART: [kat] sha1
2,216,827 UART: [kat] SHA2-256
2,217,483 UART: [kat] SHA2-384
2,218,138 UART: [kat] SHA2-512-ACC
2,218,937 UART: [kat] ECC-384
2,944,819 UART: [kat] HMAC-384Kdf
2,971,314 UART: [kat] LMS
3,500,766 UART: [kat] --
3,504,708 UART: [cold-reset] ++
3,506,100 UART: [fht] FHT @ 0x50003400
3,517,531 UART: [idev] ++
3,518,136 UART: [idev] CDI.KEYID = 6
3,519,025 UART: [idev] SUBJECT.KEYID = 7
3,520,132 UART: [idev] UDS.KEYID = 0
3,543,559 UART: [idev] Erasing UDS.KEYID = 0
6,024,751 UART: [idev] Sha1 KeyId Algorithm
6,048,751 UART: [idev] --
6,053,452 UART: [ldev] ++
6,054,035 UART: [ldev] CDI.KEYID = 6
6,054,949 UART: [ldev] SUBJECT.KEYID = 5
6,056,113 UART: [ldev] AUTHORITY.KEYID = 7
6,057,407 UART: [ldev] FE.KEYID = 1
6,097,762 UART: [ldev] Erasing FE.KEYID = 1
8,601,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,455 UART: [ldev] --
10,412,201 UART: [fwproc] Wait for Commands...
10,414,958 UART: [fwproc] Recv command 0x46574c44
10,417,054 UART: [fwproc] Recv'd Img size: 114360 bytes
10,492,785 UART: ROM Fatal Error: 0x000B0009
10,495,869 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,054,108 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,198,418 UART:
2,198,833 UART: Running Caliptra ROM ...
2,199,961 UART:
2,200,121 UART: [state] CFI Enabled
2,201,001 UART: [state] LifecycleState = Unprovisioned
2,202,655 UART: [state] DebugLocked = No
2,203,774 UART: [state] WD Timer not started. Device not locked for debugging
2,206,252 UART: [kat] SHA2-256
2,206,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,928 UART: [kat] ++
2,210,379 UART: [kat] sha1
2,210,890 UART: [kat] SHA2-256
2,211,650 UART: [kat] SHA2-384
2,212,318 UART: [kat] SHA2-512-ACC
2,213,143 UART: [kat] ECC-384
2,946,160 UART: [kat] HMAC-384Kdf
2,970,631 UART: [kat] LMS
3,500,081 UART: [kat] --
3,504,993 UART: [cold-reset] ++
3,505,875 UART: [fht] FHT @ 0x50003400
3,516,883 UART: [idev] ++
3,517,447 UART: [idev] CDI.KEYID = 6
3,518,325 UART: [idev] SUBJECT.KEYID = 7
3,519,542 UART: [idev] UDS.KEYID = 0
3,542,567 UART: [idev] Erasing UDS.KEYID = 0
6,024,917 UART: [idev] Sha1 KeyId Algorithm
6,047,616 UART: [idev] --
6,052,913 UART: [ldev] ++
6,053,507 UART: [ldev] CDI.KEYID = 6
6,054,420 UART: [ldev] SUBJECT.KEYID = 5
6,055,585 UART: [ldev] AUTHORITY.KEYID = 7
6,056,875 UART: [ldev] FE.KEYID = 1
6,098,002 UART: [ldev] Erasing FE.KEYID = 1
8,601,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,353 UART: [ldev] --
10,410,677 UART: [fwproc] Wait for Commands...
10,412,447 UART: [fwproc] Recv command 0x46574c44
10,414,496 UART: [fwproc] Recv'd Img size: 114360 bytes
10,487,243 UART: ROM Fatal Error: 0x000B0009
10,490,335 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,053,840 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,198,228 UART:
2,198,632 UART: Running Caliptra ROM ...
2,199,801 UART:
2,199,976 UART: [state] CFI Enabled
2,200,864 UART: [state] LifecycleState = Unprovisioned
2,202,503 UART: [state] DebugLocked = No
2,203,610 UART: [state] WD Timer not started. Device not locked for debugging
2,206,111 UART: [kat] SHA2-256
2,206,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,803 UART: [kat] ++
2,210,258 UART: [kat] sha1
2,210,771 UART: [kat] SHA2-256
2,211,423 UART: [kat] SHA2-384
2,212,074 UART: [kat] SHA2-512-ACC
2,212,907 UART: [kat] ECC-384
2,945,187 UART: [kat] HMAC-384Kdf
2,971,021 UART: [kat] LMS
3,500,479 UART: [kat] --
3,507,319 UART: [cold-reset] ++
3,508,581 UART: [fht] FHT @ 0x50003400
3,520,271 UART: [idev] ++
3,520,838 UART: [idev] CDI.KEYID = 6
3,521,775 UART: [idev] SUBJECT.KEYID = 7
3,523,007 UART: [idev] UDS.KEYID = 0
3,541,475 UART: [idev] Erasing UDS.KEYID = 0
6,025,283 UART: [idev] Sha1 KeyId Algorithm
6,047,992 UART: [idev] --
6,051,508 UART: [ldev] ++
6,052,087 UART: [ldev] CDI.KEYID = 6
6,053,003 UART: [ldev] SUBJECT.KEYID = 5
6,054,166 UART: [ldev] AUTHORITY.KEYID = 7
6,055,401 UART: [ldev] FE.KEYID = 1
6,098,075 UART: [ldev] Erasing FE.KEYID = 1
8,601,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,243 UART: [ldev] --
10,412,644 UART: [fwproc] Wait for Commands...
10,415,448 UART: [fwproc] Recv command 0x46574c44
10,417,543 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,895,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,282,587 >>> mbox cmd response: success
14,287,267 UART: [afmc] ++
14,287,859 UART: [afmc] CDI.KEYID = 6
14,288,773 UART: [afmc] SUBJECT.KEYID = 7
14,289,932 UART: [afmc] AUTHORITY.KEYID = 5
16,827,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,699 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,567,641 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,583,445 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,599,206 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,622,171 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,226,646 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,294,905 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,057,368 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,253,515 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
2,058,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,275,053 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,079,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,035,487 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,227,670 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,372,681 UART:
2,373,094 UART: Running Caliptra ROM ...
2,374,209 UART:
2,374,374 UART: [state] CFI Enabled
2,375,336 UART: [state] LifecycleState = Unprovisioned
2,376,992 UART: [state] DebugLocked = No
2,378,097 UART: [state] WD Timer not started. Device not locked for debugging
2,380,572 UART: [kat] SHA2-256
2,381,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,384,276 UART: [kat] ++
2,384,729 UART: [kat] sha1
2,385,243 UART: [kat] SHA2-256
2,385,895 UART: [kat] SHA2-384
2,386,550 UART: [kat] SHA2-512-ACC
2,387,531 UART: [kat] ECC-384
3,279,776 UART: [kat] HMAC-384Kdf
3,291,309 UART: [kat] LMS
3,820,784 UART: [kat] --
3,826,597 UART: [cold-reset] ++
3,828,585 UART: [fht] FHT @ 0x50003400
3,838,863 UART: [idev] ++
3,839,425 UART: [idev] CDI.KEYID = 6
3,840,391 UART: [idev] SUBJECT.KEYID = 7
3,841,545 UART: [idev] UDS.KEYID = 0
3,855,464 UART: [idev] Erasing UDS.KEYID = 0
6,314,286 UART: [idev] Sha1 KeyId Algorithm
6,337,194 UART: [idev] --
6,342,426 UART: [ldev] ++
6,342,985 UART: [ldev] CDI.KEYID = 6
6,343,867 UART: [ldev] SUBJECT.KEYID = 5
6,345,075 UART: [ldev] AUTHORITY.KEYID = 7
6,346,362 UART: [ldev] FE.KEYID = 1
6,356,064 UART: [ldev] Erasing FE.KEYID = 1
8,829,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,980 UART: [ldev] --
10,617,497 UART: [fwproc] Wait for Commands...
10,619,336 UART: [fwproc] Recv command 0x46574c44
10,621,452 UART: [fwproc] Recv'd Img size: 114360 bytes
10,694,300 UART: ROM Fatal Error: 0x000B0009
10,697,444 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,062,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,207,596 UART:
2,208,024 UART: Running Caliptra ROM ...
2,209,130 UART:
2,209,293 UART: [state] CFI Enabled
2,210,168 UART: [state] LifecycleState = Unprovisioned
2,211,824 UART: [state] DebugLocked = No
2,212,851 UART: [state] WD Timer not started. Device not locked for debugging
2,215,314 UART: [kat] SHA2-256
2,215,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,970 UART: [kat] ++
2,219,418 UART: [kat] sha1
2,219,927 UART: [kat] SHA2-256
2,220,589 UART: [kat] SHA2-384
2,221,337 UART: [kat] SHA2-512-ACC
2,222,146 UART: [kat] ECC-384
3,278,634 UART: [kat] HMAC-384Kdf
3,291,012 UART: [kat] LMS
3,820,504 UART: [kat] --
3,824,831 UART: [cold-reset] ++
3,825,795 UART: [fht] FHT @ 0x50003400
3,837,315 UART: [idev] ++
3,837,878 UART: [idev] CDI.KEYID = 6
3,838,787 UART: [idev] SUBJECT.KEYID = 7
3,840,003 UART: [idev] UDS.KEYID = 0
3,857,168 UART: [idev] Erasing UDS.KEYID = 0
6,315,117 UART: [idev] Sha1 KeyId Algorithm
6,338,403 UART: [idev] --
6,342,336 UART: [ldev] ++
6,342,922 UART: [ldev] CDI.KEYID = 6
6,343,832 UART: [ldev] SUBJECT.KEYID = 5
6,344,990 UART: [ldev] AUTHORITY.KEYID = 7
6,346,275 UART: [ldev] FE.KEYID = 1
6,358,595 UART: [ldev] Erasing FE.KEYID = 1
8,835,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,909 UART: [ldev] --
10,627,142 UART: [fwproc] Wait for Commands...
10,629,180 UART: [fwproc] Recv command 0x46574c44
10,631,273 UART: [fwproc] Recv'd Img size: 114360 bytes
10,703,604 UART: ROM Fatal Error: 0x000B0009
10,706,742 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,061,394 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,205,768 UART:
2,206,164 UART: Running Caliptra ROM ...
2,207,246 UART:
2,207,398 UART: [state] CFI Enabled
2,208,380 UART: [state] LifecycleState = Unprovisioned
2,210,034 UART: [state] DebugLocked = No
2,211,066 UART: [state] WD Timer not started. Device not locked for debugging
2,213,533 UART: [kat] SHA2-256
2,214,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,206 UART: [kat] ++
2,217,651 UART: [kat] sha1
2,218,158 UART: [kat] SHA2-256
2,218,815 UART: [kat] SHA2-384
2,219,492 UART: [kat] SHA2-512-ACC
2,220,336 UART: [kat] ECC-384
3,283,477 UART: [kat] HMAC-384Kdf
3,296,662 UART: [kat] LMS
3,826,172 UART: [kat] --
3,831,021 UART: [cold-reset] ++
3,833,164 UART: [fht] FHT @ 0x50003400
3,845,542 UART: [idev] ++
3,846,109 UART: [idev] CDI.KEYID = 6
3,847,125 UART: [idev] SUBJECT.KEYID = 7
3,848,227 UART: [idev] UDS.KEYID = 0
3,863,824 UART: [idev] Erasing UDS.KEYID = 0
6,320,492 UART: [idev] Sha1 KeyId Algorithm
6,343,513 UART: [idev] --
6,347,831 UART: [ldev] ++
6,348,400 UART: [ldev] CDI.KEYID = 6
6,349,304 UART: [ldev] SUBJECT.KEYID = 5
6,350,517 UART: [ldev] AUTHORITY.KEYID = 7
6,351,749 UART: [ldev] FE.KEYID = 1
6,362,482 UART: [ldev] Erasing FE.KEYID = 1
8,838,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,937 UART: [ldev] --
10,628,664 UART: [fwproc] Wait for Commands...
10,631,352 UART: [fwproc] Recv command 0x46574c44
10,633,390 UART: [fwproc] Recv'd Img size: 114360 bytes
10,706,847 UART: ROM Fatal Error: 0x000B0009
10,709,989 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,056,894 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,201,328 UART:
2,201,745 UART: Running Caliptra ROM ...
2,202,825 UART:
2,202,977 UART: [state] CFI Enabled
2,203,960 UART: [state] LifecycleState = Unprovisioned
2,205,600 UART: [state] DebugLocked = No
2,206,624 UART: [state] WD Timer not started. Device not locked for debugging
2,209,102 UART: [kat] SHA2-256
2,209,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,772 UART: [kat] ++
2,213,215 UART: [kat] sha1
2,213,723 UART: [kat] SHA2-256
2,214,381 UART: [kat] SHA2-384
2,215,037 UART: [kat] SHA2-512-ACC
2,215,872 UART: [kat] ECC-384
3,284,061 UART: [kat] HMAC-384Kdf
3,295,214 UART: [kat] LMS
3,824,711 UART: [kat] --
3,828,403 UART: [cold-reset] ++
3,829,422 UART: [fht] FHT @ 0x50003400
3,840,431 UART: [idev] ++
3,840,986 UART: [idev] CDI.KEYID = 6
3,841,917 UART: [idev] SUBJECT.KEYID = 7
3,843,147 UART: [idev] UDS.KEYID = 0
3,858,289 UART: [idev] Erasing UDS.KEYID = 0
6,313,124 UART: [idev] Sha1 KeyId Algorithm
6,335,266 UART: [idev] --
6,338,923 UART: [ldev] ++
6,339,488 UART: [ldev] CDI.KEYID = 6
6,340,421 UART: [ldev] SUBJECT.KEYID = 5
6,341,631 UART: [ldev] AUTHORITY.KEYID = 7
6,342,865 UART: [ldev] FE.KEYID = 1
6,353,757 UART: [ldev] Erasing FE.KEYID = 1
8,825,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,389 UART: [ldev] --
10,617,855 UART: [fwproc] Wait for Commands...
10,619,842 UART: [fwproc] Recv command 0x46574c44
10,622,025 UART: [fwproc] Recv'd Img size: 114360 bytes
14,020,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,095,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,481,873 >>> mbox cmd response: success
14,486,526 UART: [afmc] ++
14,487,112 UART: [afmc] CDI.KEYID = 6
14,487,989 UART: [afmc] SUBJECT.KEYID = 7
14,489,196 UART: [afmc] AUTHORITY.KEYID = 5
16,991,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,221 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,729,172 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,745,000 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,760,797 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,783,460 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,227,151 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,470,451 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,061,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,479,941 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,055,233 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,470,541 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,054,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,268,709 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,013 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
890,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,901 UART: [kat] ++
895,053 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,199,761 UART: [idev] Sha1 KeyId Algorithm
1,208,613 UART: [idev] --
1,209,642 UART: [ldev] ++
1,209,810 UART: [ldev] CDI.KEYID = 6
1,210,174 UART: [ldev] SUBJECT.KEYID = 5
1,210,601 UART: [ldev] AUTHORITY.KEYID = 7
1,211,064 UART: [ldev] FE.KEYID = 1
1,216,282 UART: [ldev] Erasing FE.KEYID = 1
1,242,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,126 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,289 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,154 UART: ROM Fatal Error: 0x000B0009
1,309,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,275 UART: [kat] SHA2-256
901,215 UART: [kat] SHA2-384
903,778 UART: [kat] SHA2-512-ACC
905,679 UART: [kat] ECC-384
915,494 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,214,460 UART: [ldev] Erasing FE.KEYID = 1
1,240,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,088 UART: [fwproc] Wait for Commands...
1,280,813 UART: [fwproc] Recv command 0x46574c44
1,281,546 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,204 UART: ROM Fatal Error: 0x000B0009
1,307,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,354 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,223 UART: [idev] Sha1 KeyId Algorithm
1,207,977 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,410 UART: [ldev] --
1,280,678 UART: [fwproc] Wait for Commands...
1,281,347 UART: [fwproc] Recv command 0x46574c44
1,282,080 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,272 UART: ROM Fatal Error: 0x000B0009
1,308,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,403 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,088 UART: [ldev] --
1,280,590 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,735 >>> mbox cmd response: success
2,772,910 UART: [afmc] ++
2,773,078 UART: [afmc] CDI.KEYID = 6
2,773,441 UART: [afmc] SUBJECT.KEYID = 7
2,773,867 UART: [afmc] AUTHORITY.KEYID = 5
2,809,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,407 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,120 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,029 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,743 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,618 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,165 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,208,945 UART: [ldev] ++
1,209,113 UART: [ldev] CDI.KEYID = 6
1,209,477 UART: [ldev] SUBJECT.KEYID = 5
1,209,904 UART: [ldev] AUTHORITY.KEYID = 7
1,210,367 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,933 UART: [ldev] --
1,281,207 UART: [fwproc] Wait for Commands...
1,281,980 UART: [fwproc] Recv command 0x46574c44
1,282,713 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,021 UART: ROM Fatal Error: 0x000B0009
1,309,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,860 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,867 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,611 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,690 UART: [fwproc] Recv command 0x46574c44
1,284,423 UART: [fwproc] Recv'd Img size: 114360 bytes
1,310,257 UART: ROM Fatal Error: 0x000B0009
1,311,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
921,045 UART: [kat] LMS
1,169,357 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,182,922 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,282,001 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,349 UART: ROM Fatal Error: 0x000B0009
1,309,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,345 UART: [ldev] --
1,281,793 UART: [fwproc] Wait for Commands...
1,282,376 UART: [fwproc] Recv command 0x46574c44
1,283,109 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,896 >>> mbox cmd response: success
2,773,139 UART: [afmc] ++
2,773,307 UART: [afmc] CDI.KEYID = 6
2,773,670 UART: [afmc] SUBJECT.KEYID = 7
2,774,096 UART: [afmc] AUTHORITY.KEYID = 5
2,809,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,718 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,431 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,340 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,054 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,857 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,438 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,205 UART: [kat] SHA2-256
901,145 UART: [kat] SHA2-384
903,760 UART: [kat] SHA2-512-ACC
905,661 UART: [kat] ECC-384
915,380 UART: [kat] HMAC-384Kdf
919,880 UART: [kat] LMS
1,168,192 UART: [kat] --
1,169,267 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,217 UART: [idev] ++
1,172,385 UART: [idev] CDI.KEYID = 6
1,172,746 UART: [idev] SUBJECT.KEYID = 7
1,173,171 UART: [idev] UDS.KEYID = 0
1,180,971 UART: [idev] Erasing UDS.KEYID = 0
1,197,915 UART: [idev] Sha1 KeyId Algorithm
1,207,037 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,462 UART: [ldev] Erasing FE.KEYID = 1
1,240,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,660 UART: [ldev] --
1,279,100 UART: [fwproc] Wait for Commands...
1,279,833 UART: [fwproc] Recv command 0x46574c44
1,280,566 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,756 UART: ROM Fatal Error: 0x000B0009
1,307,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,988 UART: [kat] SHA2-512-ACC
906,889 UART: [kat] ECC-384
917,080 UART: [kat] HMAC-384Kdf
921,664 UART: [kat] LMS
1,169,976 UART: [kat] --
1,170,699 UART: [cold-reset] ++
1,171,239 UART: [fht] FHT @ 0x50003400
1,173,929 UART: [idev] ++
1,174,097 UART: [idev] CDI.KEYID = 6
1,174,458 UART: [idev] SUBJECT.KEYID = 7
1,174,883 UART: [idev] UDS.KEYID = 0
1,182,857 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,403 UART: [idev] --
1,209,508 UART: [ldev] ++
1,209,676 UART: [ldev] CDI.KEYID = 6
1,210,040 UART: [ldev] SUBJECT.KEYID = 5
1,210,467 UART: [ldev] AUTHORITY.KEYID = 7
1,210,930 UART: [ldev] FE.KEYID = 1
1,216,046 UART: [ldev] Erasing FE.KEYID = 1
1,242,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,002 UART: [ldev] --
1,281,334 UART: [fwproc] Wait for Commands...
1,282,035 UART: [fwproc] Recv command 0x46574c44
1,282,768 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,372 UART: ROM Fatal Error: 0x000B0009
1,309,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,987 UART: [kat] ++
895,139 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,683 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,510 UART: [ldev] --
1,281,996 UART: [fwproc] Wait for Commands...
1,282,639 UART: [fwproc] Recv command 0x46574c44
1,283,372 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,736 UART: ROM Fatal Error: 0x000B0009
1,309,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,155 UART: [kat] SHA2-256
902,095 UART: [kat] SHA2-384
904,836 UART: [kat] SHA2-512-ACC
906,737 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,042 UART: [kat] LMS
1,169,354 UART: [kat] --
1,170,389 UART: [cold-reset] ++
1,170,959 UART: [fht] FHT @ 0x50003400
1,173,597 UART: [idev] ++
1,173,765 UART: [idev] CDI.KEYID = 6
1,174,126 UART: [idev] SUBJECT.KEYID = 7
1,174,551 UART: [idev] UDS.KEYID = 0
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,207,917 UART: [idev] --
1,208,900 UART: [ldev] ++
1,209,068 UART: [ldev] CDI.KEYID = 6
1,209,432 UART: [ldev] SUBJECT.KEYID = 5
1,209,859 UART: [ldev] AUTHORITY.KEYID = 7
1,210,322 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,970 UART: [ldev] --
1,281,426 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,929 >>> mbox cmd response: success
2,773,194 UART: [afmc] ++
2,773,362 UART: [afmc] CDI.KEYID = 6
2,773,725 UART: [afmc] SUBJECT.KEYID = 7
2,774,151 UART: [afmc] AUTHORITY.KEYID = 5
2,809,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,389 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,102 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,011 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,725 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,578 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,319 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,928 UART: [kat] ++
896,080 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,905 UART: [kat] HMAC-384Kdf
921,549 UART: [kat] LMS
1,169,861 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,848 UART: [idev] ++
1,174,016 UART: [idev] CDI.KEYID = 6
1,174,377 UART: [idev] SUBJECT.KEYID = 7
1,174,802 UART: [idev] UDS.KEYID = 0
1,183,120 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,720 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,431 UART: [ldev] Erasing FE.KEYID = 1
1,242,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,129 UART: ROM Fatal Error: 0x000B0009
1,310,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,603 UART: [kat] HMAC-384Kdf
920,241 UART: [kat] LMS
1,168,553 UART: [kat] --
1,169,470 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,528 UART: [idev] ++
1,172,696 UART: [idev] CDI.KEYID = 6
1,173,057 UART: [idev] SUBJECT.KEYID = 7
1,173,482 UART: [idev] UDS.KEYID = 0
1,181,582 UART: [idev] Erasing UDS.KEYID = 0
1,198,688 UART: [idev] Sha1 KeyId Algorithm
1,207,482 UART: [idev] --
1,208,607 UART: [ldev] ++
1,208,775 UART: [ldev] CDI.KEYID = 6
1,209,139 UART: [ldev] SUBJECT.KEYID = 5
1,209,566 UART: [ldev] AUTHORITY.KEYID = 7
1,210,029 UART: [ldev] FE.KEYID = 1
1,215,545 UART: [ldev] Erasing FE.KEYID = 1
1,242,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,281,946 UART: [fwproc] Recv command 0x46574c44
1,282,679 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,443 UART: ROM Fatal Error: 0x000B0009
1,309,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,368 UART: [idev] ++
1,173,536 UART: [idev] CDI.KEYID = 6
1,173,897 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,254 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,097 UART: [ldev] ++
1,209,265 UART: [ldev] CDI.KEYID = 6
1,209,629 UART: [ldev] SUBJECT.KEYID = 5
1,210,056 UART: [ldev] AUTHORITY.KEYID = 7
1,210,519 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,369 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,497 UART: ROM Fatal Error: 0x000B0009
1,309,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,411 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,087 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,960 >>> mbox cmd response: success
2,773,035 UART: [afmc] ++
2,773,203 UART: [afmc] CDI.KEYID = 6
2,773,566 UART: [afmc] SUBJECT.KEYID = 7
2,773,992 UART: [afmc] AUTHORITY.KEYID = 5
2,809,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,038 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,751 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,660 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,374 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,317 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,784 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
915,548 UART: [kat] HMAC-384Kdf
919,902 UART: [kat] LMS
1,168,214 UART: [kat] --
1,169,011 UART: [cold-reset] ++
1,169,357 UART: [fht] FHT @ 0x50003400
1,172,157 UART: [idev] ++
1,172,325 UART: [idev] CDI.KEYID = 6
1,172,686 UART: [idev] SUBJECT.KEYID = 7
1,173,111 UART: [idev] UDS.KEYID = 0
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,197,871 UART: [idev] Sha1 KeyId Algorithm
1,206,739 UART: [idev] --
1,207,800 UART: [ldev] ++
1,207,968 UART: [ldev] CDI.KEYID = 6
1,208,332 UART: [ldev] SUBJECT.KEYID = 5
1,208,759 UART: [ldev] AUTHORITY.KEYID = 7
1,209,222 UART: [ldev] FE.KEYID = 1
1,214,192 UART: [ldev] Erasing FE.KEYID = 1
1,240,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,318 UART: [ldev] --
1,279,726 UART: [fwproc] Wait for Commands...
1,280,349 UART: [fwproc] Recv command 0x46574c44
1,281,082 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,012 UART: ROM Fatal Error: 0x000B0009
1,307,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
920,880 UART: [kat] LMS
1,169,192 UART: [kat] --
1,169,983 UART: [cold-reset] ++
1,170,535 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,202 UART: [ldev] ++
1,209,370 UART: [ldev] CDI.KEYID = 6
1,209,734 UART: [ldev] SUBJECT.KEYID = 5
1,210,161 UART: [ldev] AUTHORITY.KEYID = 7
1,210,624 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,242,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,050 UART: [ldev] --
1,281,368 UART: [fwproc] Wait for Commands...
1,282,105 UART: [fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,160 UART: ROM Fatal Error: 0x000B0009
1,309,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,899 UART: [state] WD Timer not started. Device not locked for debugging
87,048 UART: [kat] SHA2-256
890,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,727 UART: [kat] ++
894,879 UART: [kat] sha1
898,909 UART: [kat] SHA2-256
900,849 UART: [kat] SHA2-384
903,438 UART: [kat] SHA2-512-ACC
905,339 UART: [kat] ECC-384
914,752 UART: [kat] HMAC-384Kdf
919,296 UART: [kat] LMS
1,167,608 UART: [kat] --
1,168,485 UART: [cold-reset] ++
1,168,831 UART: [fht] FHT @ 0x50003400
1,171,391 UART: [idev] ++
1,171,559 UART: [idev] CDI.KEYID = 6
1,171,920 UART: [idev] SUBJECT.KEYID = 7
1,172,345 UART: [idev] UDS.KEYID = 0
1,180,523 UART: [idev] Erasing UDS.KEYID = 0
1,197,061 UART: [idev] Sha1 KeyId Algorithm
1,205,859 UART: [idev] --
1,206,870 UART: [ldev] ++
1,207,038 UART: [ldev] CDI.KEYID = 6
1,207,402 UART: [ldev] SUBJECT.KEYID = 5
1,207,829 UART: [ldev] AUTHORITY.KEYID = 7
1,208,292 UART: [ldev] FE.KEYID = 1
1,213,562 UART: [ldev] Erasing FE.KEYID = 1
1,240,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,932 UART: [ldev] --
1,279,322 UART: [fwproc] Wait for Commands...
1,280,123 UART: [fwproc] Recv command 0x46574c44
1,280,856 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,200 UART: ROM Fatal Error: 0x000B0009
1,307,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,181,667 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,520 UART: [ldev] ++
1,208,688 UART: [ldev] CDI.KEYID = 6
1,209,052 UART: [ldev] SUBJECT.KEYID = 5
1,209,479 UART: [ldev] AUTHORITY.KEYID = 7
1,209,942 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,464 UART: [fwproc] Wait for Commands...
1,281,085 UART: [fwproc] Recv command 0x46574c44
1,281,818 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,183 >>> mbox cmd response: success
2,772,304 UART: [afmc] ++
2,772,472 UART: [afmc] CDI.KEYID = 6
2,772,835 UART: [afmc] SUBJECT.KEYID = 7
2,773,261 UART: [afmc] AUTHORITY.KEYID = 5
2,808,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,897 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,610 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,519 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,233 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,110 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,601 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,207,968 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,687 UART: [ldev] Erasing FE.KEYID = 1
1,241,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,363 UART: [ldev] --
1,280,799 UART: [fwproc] Wait for Commands...
1,281,522 UART: [fwproc] Recv command 0x46574c44
1,282,255 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,405 UART: ROM Fatal Error: 0x000B0009
1,308,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,198,888 UART: [idev] Sha1 KeyId Algorithm
1,207,732 UART: [idev] --
1,208,695 UART: [ldev] ++
1,208,863 UART: [ldev] CDI.KEYID = 6
1,209,227 UART: [ldev] SUBJECT.KEYID = 5
1,209,654 UART: [ldev] AUTHORITY.KEYID = 7
1,210,117 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,241,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,803 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,282,010 UART: [fwproc] Recv command 0x46574c44
1,282,743 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,417 UART: ROM Fatal Error: 0x000B0009
1,309,574 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,855 UART: [state] LifecycleState = Unprovisioned
85,510 UART: [state] DebugLocked = No
86,054 UART: [state] WD Timer not started. Device not locked for debugging
87,283 UART: [kat] SHA2-256
890,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,962 UART: [kat] ++
895,114 UART: [kat] sha1
899,212 UART: [kat] SHA2-256
901,152 UART: [kat] SHA2-384
903,959 UART: [kat] SHA2-512-ACC
905,860 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,211 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,453 UART: ROM Fatal Error: 0x000B0009
1,309,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,940 UART: [kat] ++
896,092 UART: [kat] sha1
900,490 UART: [kat] SHA2-256
902,430 UART: [kat] SHA2-384
905,051 UART: [kat] SHA2-512-ACC
906,952 UART: [kat] ECC-384
917,193 UART: [kat] HMAC-384Kdf
921,885 UART: [kat] LMS
1,170,197 UART: [kat] --
1,170,854 UART: [cold-reset] ++
1,171,234 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,207,962 UART: [idev] --
1,209,027 UART: [ldev] ++
1,209,195 UART: [ldev] CDI.KEYID = 6
1,209,559 UART: [ldev] SUBJECT.KEYID = 5
1,209,986 UART: [ldev] AUTHORITY.KEYID = 7
1,210,449 UART: [ldev] FE.KEYID = 1
1,215,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,803 UART: [ldev] --
1,281,109 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,546 >>> mbox cmd response: success
2,772,595 UART: [afmc] ++
2,772,763 UART: [afmc] CDI.KEYID = 6
2,773,126 UART: [afmc] SUBJECT.KEYID = 7
2,773,552 UART: [afmc] AUTHORITY.KEYID = 5
2,808,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,242 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,955 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,864 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,578 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,425 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,588 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
5,865 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,243 UART:
192,619 UART: Running Caliptra ROM ...
193,748 UART:
193,919 UART: [state] CFI Enabled
264,098 UART: [state] LifecycleState = Unprovisioned
266,473 UART: [state] DebugLocked = No
267,860 UART: [state] WD Timer not started. Device not locked for debugging
272,835 UART: [kat] SHA2-256
454,763 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,296 UART: [kat] ++
466,830 UART: [kat] sha1
476,353 UART: [kat] SHA2-256
479,359 UART: [kat] SHA2-384
484,640 UART: [kat] SHA2-512-ACC
487,253 UART: [kat] ECC-384
3,773,937 UART: [kat] HMAC-384Kdf
3,799,245 UART: [kat] LMS
4,872,401 UART: [kat] --
4,876,744 UART: [cold-reset] ++
4,879,021 UART: [fht] FHT @ 0x50003400
4,890,665 UART: [idev] ++
4,891,338 UART: [idev] CDI.KEYID = 6
4,892,495 UART: [idev] SUBJECT.KEYID = 7
4,893,705 UART: [idev] UDS.KEYID = 0
4,920,613 UART: [idev] Erasing UDS.KEYID = 0
8,232,550 UART: [idev] Sha1 KeyId Algorithm
8,255,580 UART: [idev] --
8,258,799 UART: [ldev] ++
8,259,380 UART: [ldev] CDI.KEYID = 6
8,260,620 UART: [ldev] SUBJECT.KEYID = 5
8,261,790 UART: [ldev] AUTHORITY.KEYID = 7
8,262,892 UART: [ldev] FE.KEYID = 1
8,309,322 UART: [ldev] Erasing FE.KEYID = 1
11,645,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,958,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,974,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,114 UART: [ldev] --
14,033,385 UART: [fwproc] Wait for Commands...
14,036,236 UART: [fwproc] Recv command 0x46574c44
14,038,495 UART: [fwproc] Recv'd Img size: 114036 bytes
18,112,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,190,256 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,259,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,576,546 >>> mbox cmd response: success
18,581,281 UART: [afmc] ++
18,581,864 UART: [afmc] CDI.KEYID = 6
18,583,108 UART: [afmc] SUBJECT.KEYID = 7
18,584,220 UART: [afmc] AUTHORITY.KEYID = 5
21,952,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,252,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,254,867 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,271,061 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,287,092 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,303,067 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,327,157 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
5,391 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,341,006 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
6,181 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,217 UART:
192,617 UART: Running Caliptra ROM ...
193,836 UART:
603,451 UART: [state] CFI Enabled
615,766 UART: [state] LifecycleState = Unprovisioned
618,144 UART: [state] DebugLocked = No
619,890 UART: [state] WD Timer not started. Device not locked for debugging
624,424 UART: [kat] SHA2-256
806,426 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,964 UART: [kat] ++
818,547 UART: [kat] sha1
828,835 UART: [kat] SHA2-256
831,823 UART: [kat] SHA2-384
837,156 UART: [kat] SHA2-512-ACC
839,763 UART: [kat] ECC-384
4,095,150 UART: [kat] HMAC-384Kdf
4,107,288 UART: [kat] LMS
5,180,449 UART: [kat] --
5,185,982 UART: [cold-reset] ++
5,188,026 UART: [fht] FHT @ 0x50003400
5,199,925 UART: [idev] ++
5,200,596 UART: [idev] CDI.KEYID = 6
5,201,823 UART: [idev] SUBJECT.KEYID = 7
5,203,251 UART: [idev] UDS.KEYID = 0
5,221,437 UART: [idev] Erasing UDS.KEYID = 0
8,494,407 UART: [idev] Sha1 KeyId Algorithm
8,516,380 UART: [idev] --
8,521,266 UART: [ldev] ++
8,521,843 UART: [ldev] CDI.KEYID = 6
8,522,955 UART: [ldev] SUBJECT.KEYID = 5
8,524,486 UART: [ldev] AUTHORITY.KEYID = 7
8,525,960 UART: [ldev] FE.KEYID = 1
8,537,578 UART: [ldev] Erasing FE.KEYID = 1
11,827,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,246 UART: [ldev] --
14,196,219 UART: [fwproc] Wait for Commands...
14,198,111 UART: [fwproc] Recv command 0x46574c44
14,200,376 UART: [fwproc] Recv'd Img size: 114036 bytes
18,275,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,347,914 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,416,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,733,421 >>> mbox cmd response: success
18,738,310 UART: [afmc] ++
18,738,899 UART: [afmc] CDI.KEYID = 6
18,740,077 UART: [afmc] SUBJECT.KEYID = 7
18,741,232 UART: [afmc] AUTHORITY.KEYID = 5
22,063,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,356,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,358,696 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,374,852 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,390,925 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,406,880 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,429,692 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
6,370 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,541,224 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,644 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,102 UART:
192,492 UART: Running Caliptra ROM ...
193,608 UART:
193,757 UART: [state] CFI Enabled
264,397 UART: [state] LifecycleState = Unprovisioned
266,270 UART: [state] DebugLocked = No
268,468 UART: [state] WD Timer not started. Device not locked for debugging
272,038 UART: [kat] SHA2-256
451,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,751 UART: [kat] ++
463,286 UART: [kat] sha1
474,675 UART: [kat] SHA2-256
477,690 UART: [kat] SHA2-384
483,775 UART: [kat] SHA2-512-ACC
486,762 UART: [kat] ECC-384
2,946,793 UART: [kat] HMAC-384Kdf
2,969,049 UART: [kat] LMS
3,498,521 UART: [kat] --
3,503,651 UART: [cold-reset] ++
3,505,262 UART: [fht] FHT @ 0x50003400
3,516,191 UART: [idev] ++
3,516,758 UART: [idev] CDI.KEYID = 6
3,517,673 UART: [idev] SUBJECT.KEYID = 7
3,518,885 UART: [idev] UDS.KEYID = 0
3,541,445 UART: [idev] Erasing UDS.KEYID = 0
6,021,862 UART: [idev] Sha1 KeyId Algorithm
6,045,586 UART: [idev] --
6,048,955 UART: [ldev] ++
6,049,534 UART: [ldev] CDI.KEYID = 6
6,050,443 UART: [ldev] SUBJECT.KEYID = 5
6,051,546 UART: [ldev] AUTHORITY.KEYID = 7
6,052,835 UART: [ldev] FE.KEYID = 1
6,096,976 UART: [ldev] Erasing FE.KEYID = 1
8,600,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,008 UART: [ldev] --
10,409,004 UART: [fwproc] Wait for Commands...
10,411,657 UART: [fwproc] Recv command 0x46574c44
10,413,753 UART: [fwproc] Recv'd Img size: 114360 bytes
13,817,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,977 >>> mbox cmd response: success
14,285,883 UART: [afmc] ++
14,286,479 UART: [afmc] CDI.KEYID = 6
14,287,391 UART: [afmc] SUBJECT.KEYID = 7
14,288,548 UART: [afmc] AUTHORITY.KEYID = 5
16,826,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,165 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
5,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,250 UART:
192,622 UART: Running Caliptra ROM ...
193,786 UART:
193,939 UART: [state] CFI Enabled
259,031 UART: [state] LifecycleState = Unprovisioned
260,952 UART: [state] DebugLocked = No
262,710 UART: [state] WD Timer not started. Device not locked for debugging
266,065 UART: [kat] SHA2-256
445,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,744 UART: [kat] ++
457,193 UART: [kat] sha1
468,291 UART: [kat] SHA2-256
471,334 UART: [kat] SHA2-384
475,814 UART: [kat] SHA2-512-ACC
478,803 UART: [kat] ECC-384
2,944,040 UART: [kat] HMAC-384Kdf
2,966,924 UART: [kat] LMS
3,496,382 UART: [kat] --
3,500,099 UART: [cold-reset] ++
3,502,622 UART: [fht] FHT @ 0x50003400
3,513,576 UART: [idev] ++
3,514,154 UART: [idev] CDI.KEYID = 6
3,515,063 UART: [idev] SUBJECT.KEYID = 7
3,516,285 UART: [idev] UDS.KEYID = 0
3,540,416 UART: [idev] Erasing UDS.KEYID = 0
6,025,395 UART: [idev] Sha1 KeyId Algorithm
6,048,630 UART: [idev] --
6,053,429 UART: [ldev] ++
6,054,002 UART: [ldev] CDI.KEYID = 6
6,054,917 UART: [ldev] SUBJECT.KEYID = 5
6,056,140 UART: [ldev] AUTHORITY.KEYID = 7
6,057,397 UART: [ldev] FE.KEYID = 1
6,095,117 UART: [ldev] Erasing FE.KEYID = 1
8,597,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,239 UART: [ldev] --
10,409,454 UART: [fwproc] Wait for Commands...
10,412,582 UART: [fwproc] Recv command 0x46574c44
10,414,624 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,276,133 >>> mbox cmd response: success
14,279,679 UART: [afmc] ++
14,280,298 UART: [afmc] CDI.KEYID = 6
14,281,217 UART: [afmc] SUBJECT.KEYID = 7
14,282,379 UART: [afmc] AUTHORITY.KEYID = 5
16,823,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,195 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,617,538 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
5,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,091,981 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
6,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,624 UART:
193,011 UART: Running Caliptra ROM ...
194,195 UART:
603,652 UART: [state] CFI Enabled
615,288 UART: [state] LifecycleState = Unprovisioned
617,163 UART: [state] DebugLocked = No
620,025 UART: [state] WD Timer not started. Device not locked for debugging
623,982 UART: [kat] SHA2-256
802,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,553 UART: [kat] ++
815,000 UART: [kat] sha1
825,341 UART: [kat] SHA2-256
828,349 UART: [kat] SHA2-384
835,455 UART: [kat] SHA2-512-ACC
838,378 UART: [kat] ECC-384
3,278,512 UART: [kat] HMAC-384Kdf
3,292,839 UART: [kat] LMS
3,822,291 UART: [kat] --
3,825,692 UART: [cold-reset] ++
3,827,490 UART: [fht] FHT @ 0x50003400
3,837,067 UART: [idev] ++
3,837,632 UART: [idev] CDI.KEYID = 6
3,838,534 UART: [idev] SUBJECT.KEYID = 7
3,839,739 UART: [idev] UDS.KEYID = 0
3,857,004 UART: [idev] Erasing UDS.KEYID = 0
6,316,320 UART: [idev] Sha1 KeyId Algorithm
6,338,784 UART: [idev] --
6,343,480 UART: [ldev] ++
6,344,046 UART: [ldev] CDI.KEYID = 6
6,344,951 UART: [ldev] SUBJECT.KEYID = 5
6,346,108 UART: [ldev] AUTHORITY.KEYID = 7
6,347,389 UART: [ldev] FE.KEYID = 1
6,357,438 UART: [ldev] Erasing FE.KEYID = 1
8,828,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,667 UART: [ldev] --
10,618,635 UART: [fwproc] Wait for Commands...
10,621,335 UART: [fwproc] Recv command 0x46574c44
10,623,370 UART: [fwproc] Recv'd Img size: 114360 bytes
14,032,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,492,666 >>> mbox cmd response: success
14,496,754 UART: [afmc] ++
14,497,339 UART: [afmc] CDI.KEYID = 6
14,498,218 UART: [afmc] SUBJECT.KEYID = 7
14,499,376 UART: [afmc] AUTHORITY.KEYID = 5
16,996,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,136 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,172 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,131 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
6,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,270,769 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,736 UART: [kat] LMS
1,169,048 UART: [kat] --
1,170,033 UART: [cold-reset] ++
1,170,519 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,182,439 UART: [idev] Erasing UDS.KEYID = 0
1,199,905 UART: [idev] Sha1 KeyId Algorithm
1,209,011 UART: [idev] --
1,209,936 UART: [ldev] ++
1,210,104 UART: [ldev] CDI.KEYID = 6
1,210,468 UART: [ldev] SUBJECT.KEYID = 5
1,210,895 UART: [ldev] AUTHORITY.KEYID = 7
1,211,358 UART: [ldev] FE.KEYID = 1
1,216,450 UART: [ldev] Erasing FE.KEYID = 1
1,242,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,958 UART: [ldev] --
1,281,452 UART: [fwproc] Wait for Commands...
1,282,161 UART: [fwproc] Recv command 0x46574c44
1,282,894 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,316 >>> mbox cmd response: success
2,774,371 UART: [afmc] ++
2,774,539 UART: [afmc] CDI.KEYID = 6
2,774,902 UART: [afmc] SUBJECT.KEYID = 7
2,775,328 UART: [afmc] AUTHORITY.KEYID = 5
2,810,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,414 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,054 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,344 UART: [kat] SHA2-256
902,284 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,779 UART: [kat] HMAC-384Kdf
921,451 UART: [kat] LMS
1,169,763 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,181 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,371 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,157 >>> mbox cmd response: success
2,776,194 UART: [afmc] ++
2,776,362 UART: [afmc] CDI.KEYID = 6
2,776,725 UART: [afmc] SUBJECT.KEYID = 7
2,777,151 UART: [afmc] AUTHORITY.KEYID = 5
2,812,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,161 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,721 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,249 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Unprovisioned
85,303 UART: [state] DebugLocked = No
85,821 UART: [state] WD Timer not started. Device not locked for debugging
87,092 UART: [kat] SHA2-256
890,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,771 UART: [kat] ++
894,923 UART: [kat] sha1
899,079 UART: [kat] SHA2-256
901,019 UART: [kat] SHA2-384
903,896 UART: [kat] SHA2-512-ACC
905,797 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,609 UART: [idev] ++
1,172,777 UART: [idev] CDI.KEYID = 6
1,173,138 UART: [idev] SUBJECT.KEYID = 7
1,173,563 UART: [idev] UDS.KEYID = 0
1,181,523 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,364 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,288 UART: [fwproc] Wait for Commands...
1,281,985 UART: [fwproc] Recv command 0x46574c44
1,282,718 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,024 >>> mbox cmd response: success
2,773,061 UART: [afmc] ++
2,773,229 UART: [afmc] CDI.KEYID = 6
2,773,592 UART: [afmc] SUBJECT.KEYID = 7
2,774,018 UART: [afmc] AUTHORITY.KEYID = 5
2,809,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,867 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,650 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,820 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,001 UART: [state] LifecycleState = Unprovisioned
86,656 UART: [state] DebugLocked = No
87,374 UART: [state] WD Timer not started. Device not locked for debugging
88,483 UART: [kat] SHA2-256
892,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,162 UART: [kat] ++
896,314 UART: [kat] sha1
900,492 UART: [kat] SHA2-256
902,432 UART: [kat] SHA2-384
905,259 UART: [kat] SHA2-512-ACC
907,160 UART: [kat] ECC-384
917,111 UART: [kat] HMAC-384Kdf
921,659 UART: [kat] LMS
1,169,971 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,040 UART: [fht] FHT @ 0x50003400
1,173,590 UART: [idev] ++
1,173,758 UART: [idev] CDI.KEYID = 6
1,174,119 UART: [idev] SUBJECT.KEYID = 7
1,174,544 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,200,054 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,242,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,395 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,429 >>> mbox cmd response: success
2,774,664 UART: [afmc] ++
2,774,832 UART: [afmc] CDI.KEYID = 6
2,775,195 UART: [afmc] SUBJECT.KEYID = 7
2,775,621 UART: [afmc] AUTHORITY.KEYID = 5
2,811,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,255 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,439 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,059 UART: [idev] ++
1,173,227 UART: [idev] CDI.KEYID = 6
1,173,588 UART: [idev] SUBJECT.KEYID = 7
1,174,013 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,160 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,630 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,156 >>> mbox cmd response: success
2,773,367 UART: [afmc] ++
2,773,535 UART: [afmc] CDI.KEYID = 6
2,773,898 UART: [afmc] SUBJECT.KEYID = 7
2,774,324 UART: [afmc] AUTHORITY.KEYID = 5
2,809,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,146 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,864 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,669 UART: [kat] HMAC-384Kdf
921,291 UART: [kat] LMS
1,169,603 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,782 UART: [idev] ++
1,173,950 UART: [idev] CDI.KEYID = 6
1,174,311 UART: [idev] SUBJECT.KEYID = 7
1,174,736 UART: [idev] UDS.KEYID = 0
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,903 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,775 >>> mbox cmd response: success
2,773,974 UART: [afmc] ++
2,774,142 UART: [afmc] CDI.KEYID = 6
2,774,505 UART: [afmc] SUBJECT.KEYID = 7
2,774,931 UART: [afmc] AUTHORITY.KEYID = 5
2,810,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,071 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,189 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
Truncated 107056 bytes from beginning
253,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,570,395 >>> mbox cmd response: success
18,574,418 UART: [afmc] ++
18,575,118 UART: [afmc] CDI.KEYID = 6
18,576,277 UART: [afmc] SUBJECT.KEYID = 7
18,577,484 UART: [afmc] AUTHORITY.KEYID = 5
21,938,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,242,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,244,066 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,260,217 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,276,268 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,292,135 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,314,477 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
2,050,647 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,194,593 UART:
2,194,993 UART: Running Caliptra ROM ...
2,196,151 UART:
2,196,331 UART: [state] CFI Enabled
2,197,302 UART: [state] LifecycleState = Unprovisioned
2,198,952 UART: [state] DebugLocked = No
2,200,059 UART: [state] WD Timer not started. Device not locked for debugging
2,202,572 UART: [kat] SHA2-256
2,203,242 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,252 UART: [kat] ++
2,206,927 UART: [kat] sha1
2,207,484 UART: [kat] SHA2-256
2,208,146 UART: [kat] SHA2-384
2,208,899 UART: [kat] SHA2-512-ACC
2,209,892 UART: [kat] ECC-384
3,771,879 UART: [kat] HMAC-384Kdf
3,798,601 UART: [kat] LMS
4,871,776 UART: [kat] --
4,875,985 UART: [cold-reset] ++
4,878,347 UART: [fht] FHT @ 0x50003400
4,889,810 UART: [idev] ++
4,890,487 UART: [idev] CDI.KEYID = 6
4,891,718 UART: [idev] SUBJECT.KEYID = 7
4,892,852 UART: [idev] UDS.KEYID = 0
4,925,867 UART: [idev] Erasing UDS.KEYID = 0
8,235,806 UART: [idev] Sha1 KeyId Algorithm
8,257,744 UART: [idev] --
8,263,033 UART: [ldev] ++
8,263,610 UART: [ldev] CDI.KEYID = 6
8,264,793 UART: [ldev] SUBJECT.KEYID = 5
8,265,953 UART: [ldev] AUTHORITY.KEYID = 7
8,267,186 UART: [ldev] FE.KEYID = 1
8,312,406 UART: [ldev] Erasing FE.KEYID = 1
11,644,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,957,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,974,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,026,370 UART: [ldev] --
14,030,137 UART: [fwproc] Wait for Commands...
14,032,620 UART: [fwproc] Recv command 0x46574c44
14,034,941 UART: [fwproc] Recv'd Img size: 114036 bytes
18,111,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,190,227 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,259,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,576,253 >>> mbox cmd response: success
18,581,039 UART: [afmc] ++
18,581,745 UART: [afmc] CDI.KEYID = 6
18,582,933 UART: [afmc] SUBJECT.KEYID = 7
18,584,089 UART: [afmc] AUTHORITY.KEYID = 5
21,944,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,239,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,240,948 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,257,069 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,273,171 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,289,063 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,312,071 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,049,977 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,193,946 UART:
2,194,333 UART: Running Caliptra ROM ...
2,195,499 UART:
2,195,670 UART: [state] CFI Enabled
2,196,638 UART: [state] LifecycleState = Unprovisioned
2,198,290 UART: [state] DebugLocked = No
2,199,416 UART: [state] WD Timer not started. Device not locked for debugging
2,201,896 UART: [kat] SHA2-256
2,202,567 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,577 UART: [kat] ++
2,206,028 UART: [kat] sha1
2,206,542 UART: [kat] SHA2-256
2,207,282 UART: [kat] SHA2-384
2,207,947 UART: [kat] SHA2-512-ACC
2,208,791 UART: [kat] ECC-384
3,772,004 UART: [kat] HMAC-384Kdf
3,797,915 UART: [kat] LMS
4,871,064 UART: [kat] --
4,876,734 UART: [cold-reset] ++
4,878,178 UART: [fht] FHT @ 0x50003400
4,890,130 UART: [idev] ++
4,890,797 UART: [idev] CDI.KEYID = 6
4,891,973 UART: [idev] SUBJECT.KEYID = 7
4,893,128 UART: [idev] UDS.KEYID = 0
4,924,741 UART: [idev] Erasing UDS.KEYID = 0
8,240,011 UART: [idev] Sha1 KeyId Algorithm
8,262,655 UART: [idev] --
8,265,405 UART: [ldev] ++
8,266,028 UART: [ldev] CDI.KEYID = 6
8,267,209 UART: [ldev] SUBJECT.KEYID = 5
8,268,366 UART: [ldev] AUTHORITY.KEYID = 7
8,269,593 UART: [ldev] FE.KEYID = 1
8,313,243 UART: [ldev] Erasing FE.KEYID = 1
11,648,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,867 UART: [ldev] --
14,033,895 UART: [fwproc] Wait for Commands...
14,036,583 UART: [fwproc] Recv command 0x46574c44
14,038,895 UART: [fwproc] Recv'd Img size: 114036 bytes
18,116,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,191,487 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,260,328 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,576,830 >>> mbox cmd response: success
18,581,683 UART: [afmc] ++
18,582,378 UART: [afmc] CDI.KEYID = 6
18,583,617 UART: [afmc] SUBJECT.KEYID = 7
18,584,716 UART: [afmc] AUTHORITY.KEYID = 5
21,943,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,239,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,240,932 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,257,072 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,273,165 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,289,017 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,312,455 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,590 writing to cptra_bootfsm_go
2,054,522 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,198,967 UART:
2,199,376 UART: Running Caliptra ROM ...
2,200,452 UART:
2,200,608 UART: [state] CFI Enabled
2,201,534 UART: [state] LifecycleState = Unprovisioned
2,203,205 UART: [state] DebugLocked = No
2,204,239 UART: [state] WD Timer not started. Device not locked for debugging
2,206,712 UART: [kat] SHA2-256
2,207,380 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,392 UART: [kat] ++
2,210,840 UART: [kat] sha1
2,211,352 UART: [kat] SHA2-256
2,212,037 UART: [kat] SHA2-384
2,212,702 UART: [kat] SHA2-512-ACC
2,213,502 UART: [kat] ECC-384
3,774,720 UART: [kat] HMAC-384Kdf
3,798,778 UART: [kat] LMS
4,871,921 UART: [kat] --
4,875,506 UART: [cold-reset] ++
4,877,555 UART: [fht] FHT @ 0x50003400
4,889,852 UART: [idev] ++
4,890,567 UART: [idev] CDI.KEYID = 6
4,891,753 UART: [idev] SUBJECT.KEYID = 7
4,892,911 UART: [idev] UDS.KEYID = 0
4,926,653 UART: [idev] Erasing UDS.KEYID = 0
8,239,170 UART: [idev] Sha1 KeyId Algorithm
8,262,387 UART: [idev] --
8,267,342 UART: [ldev] ++
8,267,974 UART: [ldev] CDI.KEYID = 6
8,269,154 UART: [ldev] SUBJECT.KEYID = 5
8,270,262 UART: [ldev] AUTHORITY.KEYID = 7
8,271,487 UART: [ldev] FE.KEYID = 1
8,316,351 UART: [ldev] Erasing FE.KEYID = 1
11,646,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,204 UART: [ldev] --
14,015,160 UART: [fwproc] Wait for Commands...
14,017,690 UART: [fwproc] Recv command 0x46574c44
14,020,007 UART: [fwproc] Recv'd Img size: 114036 bytes
18,093,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,171,624 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,240,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,558,150 >>> mbox cmd response: success
18,562,139 UART: [afmc] ++
18,562,835 UART: [afmc] CDI.KEYID = 6
18,564,047 UART: [afmc] SUBJECT.KEYID = 7
18,565,225 UART: [afmc] AUTHORITY.KEYID = 5
21,923,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,221,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,222,932 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,239,079 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,255,200 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,271,017 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,293,832 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.01s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,048,962 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,367,468 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,048,709 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,347,985 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,047,814 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,361,288 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,050,208 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,358,125 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,049,356 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,383,892 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,049,497 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,321,725 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,050,002 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,363,773 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,049,416 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,347,947 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,056,982 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,323,114 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,049,370 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,353,558 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,049,234 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,348,560 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,049,530 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,332,437 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
2,053,206 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,326,176 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,051,929 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,346,908 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,050,902 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,367,554 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,053,023 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,370,738 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,057,200 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,338,267 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,050,431 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,395,347 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,048,653 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,333,641 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.55s
Truncated 107056 bytes from beginning
406,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,723,307 >>> mbox cmd response: success
18,726,721 UART: [afmc] ++
18,727,422 UART: [afmc] CDI.KEYID = 6
18,728,654 UART: [afmc] SUBJECT.KEYID = 7
18,729,753 UART: [afmc] AUTHORITY.KEYID = 5
22,042,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,338,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,340,094 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,356,207 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,372,331 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,388,189 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,410,095 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,054,802 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,198,885 UART:
2,199,309 UART: Running Caliptra ROM ...
2,200,488 UART:
2,200,654 UART: [state] CFI Enabled
2,201,554 UART: [state] LifecycleState = Unprovisioned
2,203,200 UART: [state] DebugLocked = No
2,204,223 UART: [state] WD Timer not started. Device not locked for debugging
2,206,691 UART: [kat] SHA2-256
2,207,349 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,349 UART: [kat] ++
2,210,787 UART: [kat] sha1
2,211,286 UART: [kat] SHA2-256
2,211,938 UART: [kat] SHA2-384
2,212,586 UART: [kat] SHA2-512-ACC
2,213,377 UART: [kat] ECC-384
4,097,283 UART: [kat] HMAC-384Kdf
4,110,235 UART: [kat] LMS
5,183,368 UART: [kat] --
5,187,867 UART: [cold-reset] ++
5,190,078 UART: [fht] FHT @ 0x50003400
5,201,794 UART: [idev] ++
5,202,472 UART: [idev] CDI.KEYID = 6
5,203,708 UART: [idev] SUBJECT.KEYID = 7
5,205,146 UART: [idev] UDS.KEYID = 0
5,221,823 UART: [idev] Erasing UDS.KEYID = 0
8,497,092 UART: [idev] Sha1 KeyId Algorithm
8,518,217 UART: [idev] --
8,521,127 UART: [ldev] ++
8,521,744 UART: [ldev] CDI.KEYID = 6
8,522,843 UART: [ldev] SUBJECT.KEYID = 5
8,524,374 UART: [ldev] AUTHORITY.KEYID = 7
8,525,852 UART: [ldev] FE.KEYID = 1
8,534,987 UART: [ldev] Erasing FE.KEYID = 1
11,827,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,913 UART: [ldev] --
14,194,660 UART: [fwproc] Wait for Commands...
14,196,426 UART: [fwproc] Recv command 0x46574c44
14,198,736 UART: [fwproc] Recv'd Img size: 114036 bytes
18,271,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,341,887 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,410,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,728,782 >>> mbox cmd response: success
18,732,254 UART: [afmc] ++
18,732,947 UART: [afmc] CDI.KEYID = 6
18,734,103 UART: [afmc] SUBJECT.KEYID = 7
18,735,316 UART: [afmc] AUTHORITY.KEYID = 5
22,054,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,349,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,351,917 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,368,057 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,384,168 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,399,981 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,423,013 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,055,882 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,199,956 UART:
2,200,367 UART: Running Caliptra ROM ...
2,201,533 UART:
2,201,723 UART: [state] CFI Enabled
2,202,680 UART: [state] LifecycleState = Unprovisioned
2,204,326 UART: [state] DebugLocked = No
2,205,441 UART: [state] WD Timer not started. Device not locked for debugging
2,207,913 UART: [kat] SHA2-256
2,208,576 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,589 UART: [kat] ++
2,212,033 UART: [kat] sha1
2,212,544 UART: [kat] SHA2-256
2,213,276 UART: [kat] SHA2-384
2,213,937 UART: [kat] SHA2-512-ACC
2,214,770 UART: [kat] ECC-384
4,101,863 UART: [kat] HMAC-384Kdf
4,113,624 UART: [kat] LMS
5,186,741 UART: [kat] --
5,190,865 UART: [cold-reset] ++
5,192,497 UART: [fht] FHT @ 0x50003400
5,203,965 UART: [idev] ++
5,204,641 UART: [idev] CDI.KEYID = 6
5,205,797 UART: [idev] SUBJECT.KEYID = 7
5,207,276 UART: [idev] UDS.KEYID = 0
5,222,253 UART: [idev] Erasing UDS.KEYID = 0
8,494,350 UART: [idev] Sha1 KeyId Algorithm
8,515,688 UART: [idev] --
8,520,649 UART: [ldev] ++
8,521,264 UART: [ldev] CDI.KEYID = 6
8,522,455 UART: [ldev] SUBJECT.KEYID = 5
8,523,885 UART: [ldev] AUTHORITY.KEYID = 7
8,525,438 UART: [ldev] FE.KEYID = 1
8,534,833 UART: [ldev] Erasing FE.KEYID = 1
11,825,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,635 UART: [ldev] --
14,192,189 UART: [fwproc] Wait for Commands...
14,195,358 UART: [fwproc] Recv command 0x46574c44
14,197,664 UART: [fwproc] Recv'd Img size: 114036 bytes
18,273,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,346,399 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,415,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,732,754 >>> mbox cmd response: success
18,737,425 UART: [afmc] ++
18,738,121 UART: [afmc] CDI.KEYID = 6
18,739,253 UART: [afmc] SUBJECT.KEYID = 7
18,740,461 UART: [afmc] AUTHORITY.KEYID = 5
22,053,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,348,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,350,835 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,367,012 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,383,109 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,398,922 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,421,725 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,054,604 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,198,717 UART:
2,199,121 UART: Running Caliptra ROM ...
2,200,255 UART:
2,200,423 UART: [state] CFI Enabled
2,201,308 UART: [state] LifecycleState = Unprovisioned
2,202,970 UART: [state] DebugLocked = No
2,204,074 UART: [state] WD Timer not started. Device not locked for debugging
2,206,546 UART: [kat] SHA2-256
2,207,210 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,219 UART: [kat] ++
2,210,664 UART: [kat] sha1
2,211,254 UART: [kat] SHA2-256
2,211,911 UART: [kat] SHA2-384
2,212,562 UART: [kat] SHA2-512-ACC
2,213,439 UART: [kat] ECC-384
4,095,316 UART: [kat] HMAC-384Kdf
4,107,342 UART: [kat] LMS
5,180,479 UART: [kat] --
5,183,268 UART: [cold-reset] ++
5,185,748 UART: [fht] FHT @ 0x50003400
5,196,780 UART: [idev] ++
5,197,456 UART: [idev] CDI.KEYID = 6
5,198,612 UART: [idev] SUBJECT.KEYID = 7
5,200,142 UART: [idev] UDS.KEYID = 0
5,217,382 UART: [idev] Erasing UDS.KEYID = 0
8,491,483 UART: [idev] Sha1 KeyId Algorithm
8,513,156 UART: [idev] --
8,516,625 UART: [ldev] ++
8,517,232 UART: [ldev] CDI.KEYID = 6
8,518,417 UART: [ldev] SUBJECT.KEYID = 5
8,519,847 UART: [ldev] AUTHORITY.KEYID = 7
8,521,457 UART: [ldev] FE.KEYID = 1
8,531,348 UART: [ldev] Erasing FE.KEYID = 1
11,818,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,664 UART: [ldev] --
14,185,595 UART: [fwproc] Wait for Commands...
14,188,009 UART: [fwproc] Recv command 0x46574c44
14,190,323 UART: [fwproc] Recv'd Img size: 114036 bytes
18,257,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,335,984 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,404,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,721,308 >>> mbox cmd response: success
18,725,509 UART: [afmc] ++
18,726,260 UART: [afmc] CDI.KEYID = 6
18,727,444 UART: [afmc] SUBJECT.KEYID = 7
18,728,600 UART: [afmc] AUTHORITY.KEYID = 5
22,042,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,338,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,340,734 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,356,910 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,372,947 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,388,802 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,412,416 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.19s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
2,052,848 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,527,983 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,054,330 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,523,915 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,054,052 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,542,737 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,060,027 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,523,916 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,989 writing to cptra_bootfsm_go
2,054,847 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,533,956 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,053,712 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,548,157 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,054,227 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,538,144 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
2,060,470 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,539,480 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,052,195 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,523,257 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,054,043 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,530,410 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,052,748 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,548,229 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,054,186 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,547,522 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,060,608 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,534,805 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,059,760 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,535,035 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
2,052,820 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,534,084 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,053,771 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,534,862 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
2,058,419 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,545,724 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
2,059,505 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,529,384 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,052,950 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,525,358 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.76s
Truncated 107056 bytes from beginning
964,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,282,501 >>> mbox cmd response: success
14,286,054 UART: [afmc] ++
14,286,645 UART: [afmc] CDI.KEYID = 6
14,287,711 UART: [afmc] SUBJECT.KEYID = 7
14,288,815 UART: [afmc] AUTHORITY.KEYID = 5
16,828,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,998 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,567,962 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,583,778 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,599,524 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,622,064 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,052,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,196,538 UART:
2,196,960 UART: Running Caliptra ROM ...
2,198,135 UART:
2,198,318 UART: [state] CFI Enabled
2,199,286 UART: [state] LifecycleState = Unprovisioned
2,200,945 UART: [state] DebugLocked = No
2,202,057 UART: [state] WD Timer not started. Device not locked for debugging
2,204,541 UART: [kat] SHA2-256
2,205,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,260 UART: [kat] ++
2,208,720 UART: [kat] sha1
2,209,234 UART: [kat] SHA2-256
2,209,890 UART: [kat] SHA2-384
2,210,563 UART: [kat] SHA2-512-ACC
2,211,410 UART: [kat] ECC-384
2,945,219 UART: [kat] HMAC-384Kdf
2,968,337 UART: [kat] LMS
3,497,779 UART: [kat] --
3,500,201 UART: [cold-reset] ++
3,501,585 UART: [fht] FHT @ 0x50003400
3,512,347 UART: [idev] ++
3,512,910 UART: [idev] CDI.KEYID = 6
3,513,814 UART: [idev] SUBJECT.KEYID = 7
3,515,031 UART: [idev] UDS.KEYID = 0
3,539,980 UART: [idev] Erasing UDS.KEYID = 0
6,023,948 UART: [idev] Sha1 KeyId Algorithm
6,046,090 UART: [idev] --
6,049,742 UART: [ldev] ++
6,050,324 UART: [ldev] CDI.KEYID = 6
6,051,233 UART: [ldev] SUBJECT.KEYID = 5
6,052,450 UART: [ldev] AUTHORITY.KEYID = 7
6,053,686 UART: [ldev] FE.KEYID = 1
6,095,172 UART: [ldev] Erasing FE.KEYID = 1
8,601,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,028 UART: [ldev] --
10,409,374 UART: [fwproc] Wait for Commands...
10,412,173 UART: [fwproc] Recv command 0x46574c44
10,414,235 UART: [fwproc] Recv'd Img size: 114360 bytes
13,813,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,887,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,273,540 >>> mbox cmd response: success
14,278,327 UART: [afmc] ++
14,278,924 UART: [afmc] CDI.KEYID = 6
14,279,833 UART: [afmc] SUBJECT.KEYID = 7
14,280,994 UART: [afmc] AUTHORITY.KEYID = 5
16,824,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,659 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,564,590 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,580,453 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,596,231 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,619,823 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,055,964 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,201,024 UART:
2,201,487 UART: Running Caliptra ROM ...
2,202,578 UART:
2,202,731 UART: [state] CFI Enabled
2,203,645 UART: [state] LifecycleState = Unprovisioned
2,205,302 UART: [state] DebugLocked = No
2,206,327 UART: [state] WD Timer not started. Device not locked for debugging
2,208,797 UART: [kat] SHA2-256
2,209,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,504 UART: [kat] ++
2,212,950 UART: [kat] sha1
2,213,461 UART: [kat] SHA2-256
2,214,469 UART: [kat] SHA2-384
2,215,126 UART: [kat] SHA2-512-ACC
2,216,015 UART: [kat] ECC-384
2,941,042 UART: [kat] HMAC-384Kdf
2,968,320 UART: [kat] LMS
3,497,765 UART: [kat] --
3,503,157 UART: [cold-reset] ++
3,504,254 UART: [fht] FHT @ 0x50003400
3,515,618 UART: [idev] ++
3,516,192 UART: [idev] CDI.KEYID = 6
3,517,101 UART: [idev] SUBJECT.KEYID = 7
3,518,317 UART: [idev] UDS.KEYID = 0
3,539,442 UART: [idev] Erasing UDS.KEYID = 0
6,024,014 UART: [idev] Sha1 KeyId Algorithm
6,048,277 UART: [idev] --
6,053,302 UART: [ldev] ++
6,053,880 UART: [ldev] CDI.KEYID = 6
6,054,791 UART: [ldev] SUBJECT.KEYID = 5
6,055,956 UART: [ldev] AUTHORITY.KEYID = 7
6,057,190 UART: [ldev] FE.KEYID = 1
6,095,072 UART: [ldev] Erasing FE.KEYID = 1
8,596,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,166 UART: [ldev] --
10,388,495 UART: [fwproc] Wait for Commands...
10,390,518 UART: [fwproc] Recv command 0x46574c44
10,392,576 UART: [fwproc] Recv'd Img size: 114360 bytes
13,797,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,875,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,262,936 >>> mbox cmd response: success
14,267,131 UART: [afmc] ++
14,267,708 UART: [afmc] CDI.KEYID = 6
14,268,585 UART: [afmc] SUBJECT.KEYID = 7
14,269,798 UART: [afmc] AUTHORITY.KEYID = 5
16,812,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,890 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,567,862 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,583,677 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,599,432 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,622,744 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,053,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,198,794 UART:
2,199,226 UART: Running Caliptra ROM ...
2,200,396 UART:
2,200,570 UART: [state] CFI Enabled
2,201,535 UART: [state] LifecycleState = Unprovisioned
2,203,196 UART: [state] DebugLocked = No
2,204,302 UART: [state] WD Timer not started. Device not locked for debugging
2,206,798 UART: [kat] SHA2-256
2,207,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,474 UART: [kat] ++
2,210,923 UART: [kat] sha1
2,211,435 UART: [kat] SHA2-256
2,212,133 UART: [kat] SHA2-384
2,212,835 UART: [kat] SHA2-512-ACC
2,213,638 UART: [kat] ECC-384
2,943,354 UART: [kat] HMAC-384Kdf
2,968,739 UART: [kat] LMS
3,498,202 UART: [kat] --
3,502,189 UART: [cold-reset] ++
3,503,905 UART: [fht] FHT @ 0x50003400
3,514,452 UART: [idev] ++
3,515,021 UART: [idev] CDI.KEYID = 6
3,516,041 UART: [idev] SUBJECT.KEYID = 7
3,517,090 UART: [idev] UDS.KEYID = 0
3,540,680 UART: [idev] Erasing UDS.KEYID = 0
6,022,301 UART: [idev] Sha1 KeyId Algorithm
6,046,064 UART: [idev] --
6,049,955 UART: [ldev] ++
6,050,522 UART: [ldev] CDI.KEYID = 6
6,051,431 UART: [ldev] SUBJECT.KEYID = 5
6,052,590 UART: [ldev] AUTHORITY.KEYID = 7
6,053,927 UART: [ldev] FE.KEYID = 1
6,099,403 UART: [ldev] Erasing FE.KEYID = 1
8,598,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,475 UART: [ldev] --
10,390,302 UART: [fwproc] Wait for Commands...
10,393,428 UART: [fwproc] Recv command 0x46574c44
10,395,469 UART: [fwproc] Recv'd Img size: 114360 bytes
13,794,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,865,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,933,972 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,252,793 >>> mbox cmd response: success
14,256,238 UART: [afmc] ++
14,256,830 UART: [afmc] CDI.KEYID = 6
14,257,712 UART: [afmc] SUBJECT.KEYID = 7
14,258,926 UART: [afmc] AUTHORITY.KEYID = 5
16,783,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,903 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,528,885 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,544,687 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,560,453 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,582,863 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.89s
Truncated 107056 bytes from beginning
939,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,257,924 >>> mbox cmd response: success
14,261,677 UART: [afmc] ++
14,262,289 UART: [afmc] CDI.KEYID = 6
14,263,199 UART: [afmc] SUBJECT.KEYID = 7
14,264,357 UART: [afmc] AUTHORITY.KEYID = 5
16,809,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,907 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,548,899 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,564,710 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,580,494 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,603,866 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,050,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,194,631 UART:
2,195,037 UART: Running Caliptra ROM ...
2,196,210 UART:
2,196,384 UART: [state] CFI Enabled
2,197,341 UART: [state] LifecycleState = Unprovisioned
2,198,998 UART: [state] DebugLocked = No
2,200,106 UART: [state] WD Timer not started. Device not locked for debugging
2,202,584 UART: [kat] SHA2-256
2,203,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,206,286 UART: [kat] ++
2,206,735 UART: [kat] sha1
2,207,292 UART: [kat] SHA2-256
2,207,947 UART: [kat] SHA2-384
2,208,601 UART: [kat] SHA2-512-ACC
2,209,432 UART: [kat] ECC-384
2,945,022 UART: [kat] HMAC-384Kdf
2,969,108 UART: [kat] LMS
3,498,566 UART: [kat] --
3,502,789 UART: [cold-reset] ++
3,504,776 UART: [fht] FHT @ 0x50003400
3,515,163 UART: [idev] ++
3,515,768 UART: [idev] CDI.KEYID = 6
3,516,683 UART: [idev] SUBJECT.KEYID = 7
3,517,849 UART: [idev] UDS.KEYID = 0
3,540,322 UART: [idev] Erasing UDS.KEYID = 0
6,023,974 UART: [idev] Sha1 KeyId Algorithm
6,047,367 UART: [idev] --
6,050,223 UART: [ldev] ++
6,050,806 UART: [ldev] CDI.KEYID = 6
6,051,695 UART: [ldev] SUBJECT.KEYID = 5
6,052,858 UART: [ldev] AUTHORITY.KEYID = 7
6,054,154 UART: [ldev] FE.KEYID = 1
6,097,959 UART: [ldev] Erasing FE.KEYID = 1
8,600,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,496 UART: [ldev] --
10,411,584 UART: [fwproc] Wait for Commands...
10,414,304 UART: [fwproc] Recv command 0x46574c44
10,416,405 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,894,253 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,476 >>> mbox cmd response: success
14,285,065 UART: [afmc] ++
14,285,661 UART: [afmc] CDI.KEYID = 6
14,286,577 UART: [afmc] SUBJECT.KEYID = 7
14,287,736 UART: [afmc] AUTHORITY.KEYID = 5
16,827,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,840 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,569,830 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,585,636 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,601,389 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,625,364 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,052,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,196,526 UART:
2,196,956 UART: Running Caliptra ROM ...
2,198,127 UART:
2,198,306 UART: [state] CFI Enabled
2,199,280 UART: [state] LifecycleState = Unprovisioned
2,200,936 UART: [state] DebugLocked = No
2,202,071 UART: [state] WD Timer not started. Device not locked for debugging
2,204,562 UART: [kat] SHA2-256
2,205,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,248 UART: [kat] ++
2,208,701 UART: [kat] sha1
2,209,302 UART: [kat] SHA2-256
2,209,969 UART: [kat] SHA2-384
2,210,667 UART: [kat] SHA2-512-ACC
2,211,473 UART: [kat] ECC-384
2,943,425 UART: [kat] HMAC-384Kdf
2,969,252 UART: [kat] LMS
3,498,734 UART: [kat] --
3,504,097 UART: [cold-reset] ++
3,506,523 UART: [fht] FHT @ 0x50003400
3,517,342 UART: [idev] ++
3,517,904 UART: [idev] CDI.KEYID = 6
3,518,830 UART: [idev] SUBJECT.KEYID = 7
3,519,990 UART: [idev] UDS.KEYID = 0
3,539,920 UART: [idev] Erasing UDS.KEYID = 0
6,023,613 UART: [idev] Sha1 KeyId Algorithm
6,047,272 UART: [idev] --
6,050,945 UART: [ldev] ++
6,051,519 UART: [ldev] CDI.KEYID = 6
6,052,426 UART: [ldev] SUBJECT.KEYID = 5
6,053,589 UART: [ldev] AUTHORITY.KEYID = 7
6,054,826 UART: [ldev] FE.KEYID = 1
6,096,267 UART: [ldev] Erasing FE.KEYID = 1
8,600,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,550 UART: [ldev] --
10,412,498 UART: [fwproc] Wait for Commands...
10,414,924 UART: [fwproc] Recv command 0x46574c44
10,416,900 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,888,816 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,276,385 >>> mbox cmd response: success
14,280,293 UART: [afmc] ++
14,280,878 UART: [afmc] CDI.KEYID = 6
14,281,791 UART: [afmc] SUBJECT.KEYID = 7
14,282,948 UART: [afmc] AUTHORITY.KEYID = 5
16,826,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,496 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,569,441 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,585,294 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,601,054 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,623,659 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,073,577 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,218,074 UART:
2,218,488 UART: Running Caliptra ROM ...
2,219,571 UART:
2,219,729 UART: [state] CFI Enabled
2,220,693 UART: [state] LifecycleState = Unprovisioned
2,222,375 UART: [state] DebugLocked = No
2,223,403 UART: [state] WD Timer not started. Device not locked for debugging
2,225,882 UART: [kat] SHA2-256
2,226,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,229,565 UART: [kat] ++
2,230,012 UART: [kat] sha1
2,230,530 UART: [kat] SHA2-256
2,231,187 UART: [kat] SHA2-384
2,231,841 UART: [kat] SHA2-512-ACC
2,232,639 UART: [kat] ECC-384
2,943,627 UART: [kat] HMAC-384Kdf
2,959,564 UART: [kat] LMS
3,488,992 UART: [kat] --
3,494,635 UART: [cold-reset] ++
3,496,574 UART: [fht] FHT @ 0x50003400
3,506,964 UART: [idev] ++
3,507,547 UART: [idev] CDI.KEYID = 6
3,508,453 UART: [idev] SUBJECT.KEYID = 7
3,509,614 UART: [idev] UDS.KEYID = 0
3,531,594 UART: [idev] Erasing UDS.KEYID = 0
6,014,210 UART: [idev] Sha1 KeyId Algorithm
6,036,536 UART: [idev] --
6,040,427 UART: [ldev] ++
6,041,004 UART: [ldev] CDI.KEYID = 6
6,041,919 UART: [ldev] SUBJECT.KEYID = 5
6,043,238 UART: [ldev] AUTHORITY.KEYID = 7
6,044,432 UART: [ldev] FE.KEYID = 1
6,088,681 UART: [ldev] Erasing FE.KEYID = 1
8,589,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,150 UART: [ldev] --
10,399,957 UART: [fwproc] Wait for Commands...
10,401,896 UART: [fwproc] Recv command 0x46574c44
10,403,939 UART: [fwproc] Recv'd Img size: 114360 bytes
13,803,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,875,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,261,506 >>> mbox cmd response: success
14,265,802 UART: [afmc] ++
14,266,389 UART: [afmc] CDI.KEYID = 6
14,267,293 UART: [afmc] SUBJECT.KEYID = 7
14,268,503 UART: [afmc] AUTHORITY.KEYID = 5
16,794,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,519,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,521,096 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,537,138 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,552,913 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,568,666 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,591,923 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.89s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,051,657 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,097,395 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,051,109 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,072,163 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,057,438 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,067,305 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
2,062,421 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,059,297 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,056,211 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,032,905 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
2,051,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,071,464 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,054,616 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,091,000 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,051,866 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,013,835 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,050,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,060,491 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,058,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,046,603 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,060,793 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,074,074 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,056,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,056,495 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
2,056,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,024,963 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,053,883 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,067,815 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,065,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,040,970 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,052,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,066,476 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,056,168 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,073,905 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,051,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,056,547 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,059,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,087,507 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.44s
Truncated 107056 bytes from beginning
179,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,497,841 >>> mbox cmd response: success
14,501,775 UART: [afmc] ++
14,502,358 UART: [afmc] CDI.KEYID = 6
14,503,269 UART: [afmc] SUBJECT.KEYID = 7
14,504,400 UART: [afmc] AUTHORITY.KEYID = 5
17,001,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,126 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,742,111 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,757,936 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,773,733 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,794,935 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,054,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,198,576 UART:
2,198,973 UART: Running Caliptra ROM ...
2,200,067 UART:
2,200,228 UART: [state] CFI Enabled
2,201,190 UART: [state] LifecycleState = Unprovisioned
2,202,855 UART: [state] DebugLocked = No
2,203,884 UART: [state] WD Timer not started. Device not locked for debugging
2,206,353 UART: [kat] SHA2-256
2,207,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,043 UART: [kat] ++
2,210,492 UART: [kat] sha1
2,211,002 UART: [kat] SHA2-256
2,211,665 UART: [kat] SHA2-384
2,212,321 UART: [kat] SHA2-512-ACC
2,213,119 UART: [kat] ECC-384
3,279,045 UART: [kat] HMAC-384Kdf
3,291,930 UART: [kat] LMS
3,821,423 UART: [kat] --
3,824,378 UART: [cold-reset] ++
3,825,505 UART: [fht] FHT @ 0x50003400
3,837,032 UART: [idev] ++
3,837,646 UART: [idev] CDI.KEYID = 6
3,838,532 UART: [idev] SUBJECT.KEYID = 7
3,839,749 UART: [idev] UDS.KEYID = 0
3,856,099 UART: [idev] Erasing UDS.KEYID = 0
6,310,586 UART: [idev] Sha1 KeyId Algorithm
6,334,084 UART: [idev] --
6,336,993 UART: [ldev] ++
6,337,556 UART: [ldev] CDI.KEYID = 6
6,338,568 UART: [ldev] SUBJECT.KEYID = 5
6,339,666 UART: [ldev] AUTHORITY.KEYID = 7
6,340,947 UART: [ldev] FE.KEYID = 1
6,352,242 UART: [ldev] Erasing FE.KEYID = 1
8,821,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,835 UART: [ldev] --
10,611,390 UART: [fwproc] Wait for Commands...
10,612,968 UART: [fwproc] Recv command 0x46574c44
10,615,015 UART: [fwproc] Recv'd Img size: 114360 bytes
14,019,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,092,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,479,210 >>> mbox cmd response: success
14,483,051 UART: [afmc] ++
14,483,639 UART: [afmc] CDI.KEYID = 6
14,484,551 UART: [afmc] SUBJECT.KEYID = 7
14,485,705 UART: [afmc] AUTHORITY.KEYID = 5
16,988,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,112 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,727,111 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,742,921 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,758,687 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,781,372 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,055,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,199,694 UART:
2,200,087 UART: Running Caliptra ROM ...
2,201,164 UART:
2,201,320 UART: [state] CFI Enabled
2,202,190 UART: [state] LifecycleState = Unprovisioned
2,203,845 UART: [state] DebugLocked = No
2,204,871 UART: [state] WD Timer not started. Device not locked for debugging
2,207,362 UART: [kat] SHA2-256
2,208,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,040 UART: [kat] ++
2,211,490 UART: [kat] sha1
2,212,000 UART: [kat] SHA2-256
2,212,661 UART: [kat] SHA2-384
2,213,315 UART: [kat] SHA2-512-ACC
2,214,117 UART: [kat] ECC-384
3,284,394 UART: [kat] HMAC-384Kdf
3,297,483 UART: [kat] LMS
3,827,010 UART: [kat] --
3,830,138 UART: [cold-reset] ++
3,832,013 UART: [fht] FHT @ 0x50003400
3,843,098 UART: [idev] ++
3,843,672 UART: [idev] CDI.KEYID = 6
3,844,582 UART: [idev] SUBJECT.KEYID = 7
3,845,811 UART: [idev] UDS.KEYID = 0
3,860,759 UART: [idev] Erasing UDS.KEYID = 0
6,314,265 UART: [idev] Sha1 KeyId Algorithm
6,337,698 UART: [idev] --
6,341,936 UART: [ldev] ++
6,342,509 UART: [ldev] CDI.KEYID = 6
6,343,393 UART: [ldev] SUBJECT.KEYID = 5
6,344,601 UART: [ldev] AUTHORITY.KEYID = 7
6,345,878 UART: [ldev] FE.KEYID = 1
6,357,710 UART: [ldev] Erasing FE.KEYID = 1
8,830,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,615 UART: [ldev] --
10,621,892 UART: [fwproc] Wait for Commands...
10,625,010 UART: [fwproc] Recv command 0x46574c44
10,627,104 UART: [fwproc] Recv'd Img size: 114360 bytes
14,026,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,097,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,484,899 >>> mbox cmd response: success
14,489,366 UART: [afmc] ++
14,489,957 UART: [afmc] CDI.KEYID = 6
14,491,035 UART: [afmc] SUBJECT.KEYID = 7
14,492,160 UART: [afmc] AUTHORITY.KEYID = 5
16,994,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,531 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,732,543 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,377 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,764,106 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,788,126 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,056,098 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,200,542 UART:
2,200,947 UART: Running Caliptra ROM ...
2,202,108 UART:
2,202,279 UART: [state] CFI Enabled
2,203,232 UART: [state] LifecycleState = Unprovisioned
2,204,914 UART: [state] DebugLocked = No
2,205,943 UART: [state] WD Timer not started. Device not locked for debugging
2,208,415 UART: [kat] SHA2-256
2,209,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,096 UART: [kat] ++
2,212,587 UART: [kat] sha1
2,213,101 UART: [kat] SHA2-256
2,213,839 UART: [kat] SHA2-384
2,214,502 UART: [kat] SHA2-512-ACC
2,215,335 UART: [kat] ECC-384
3,282,699 UART: [kat] HMAC-384Kdf
3,296,335 UART: [kat] LMS
3,825,849 UART: [kat] --
3,829,191 UART: [cold-reset] ++
3,830,682 UART: [fht] FHT @ 0x50003400
3,842,145 UART: [idev] ++
3,842,736 UART: [idev] CDI.KEYID = 6
3,843,642 UART: [idev] SUBJECT.KEYID = 7
3,844,858 UART: [idev] UDS.KEYID = 0
3,862,396 UART: [idev] Erasing UDS.KEYID = 0
6,321,276 UART: [idev] Sha1 KeyId Algorithm
6,343,362 UART: [idev] --
6,347,076 UART: [ldev] ++
6,347,642 UART: [ldev] CDI.KEYID = 6
6,348,654 UART: [ldev] SUBJECT.KEYID = 5
6,349,752 UART: [ldev] AUTHORITY.KEYID = 7
6,350,975 UART: [ldev] FE.KEYID = 1
6,361,364 UART: [ldev] Erasing FE.KEYID = 1
8,830,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,589 UART: [ldev] --
10,617,064 UART: [fwproc] Wait for Commands...
10,619,704 UART: [fwproc] Recv command 0x46574c44
10,621,746 UART: [fwproc] Recv'd Img size: 114360 bytes
14,022,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,102,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,489,383 >>> mbox cmd response: success
14,493,794 UART: [afmc] ++
14,494,380 UART: [afmc] CDI.KEYID = 6
14,495,285 UART: [afmc] SUBJECT.KEYID = 7
14,496,442 UART: [afmc] AUTHORITY.KEYID = 5
16,993,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,001 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,731,971 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,747,801 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,763,588 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,786,225 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,061,202 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,270,717 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,053,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,273,348 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,054,718 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,260,936 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,053,358 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,259,338 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,054,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,265,442 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,054,694 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,274,150 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,053,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,275,955 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,059,727 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,274,724 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
2,054,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,263,686 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,054,308 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,264,316 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
2,060,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,264,252 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,054,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,276,287 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,054,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,265,741 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,055,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,259,251 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,054,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,261,865 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
2,054,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,266,013 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,055,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,276,357 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
2,060,448 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,268,816 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,053,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,272,914 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.71s
Truncated 104976 bytes from beginning
4
1,282,956 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,293 >>> mbox cmd response: success
2,773,450 UART: [afmc] ++
2,773,618 UART: [afmc] CDI.KEYID = 6
2,773,981 UART: [afmc] SUBJECT.KEYID = 7
2,774,407 UART: [afmc] AUTHORITY.KEYID = 5
2,810,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,049 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,762 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,671 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,385 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,346 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,851 UART: [fht] FHT @ 0x50003400
1,172,383 UART: [idev] ++
1,172,551 UART: [idev] CDI.KEYID = 6
1,172,912 UART: [idev] SUBJECT.KEYID = 7
1,173,337 UART: [idev] UDS.KEYID = 0
1,181,197 UART: [idev] Erasing UDS.KEYID = 0
1,197,941 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,208,036 UART: [ldev] ++
1,208,204 UART: [ldev] CDI.KEYID = 6
1,208,568 UART: [ldev] SUBJECT.KEYID = 5
1,208,995 UART: [ldev] AUTHORITY.KEYID = 7
1,209,458 UART: [ldev] FE.KEYID = 1
1,214,520 UART: [ldev] Erasing FE.KEYID = 1
1,240,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,210 UART: [ldev] --
1,279,584 UART: [fwproc] Wait for Commands...
1,280,179 UART: [fwproc] Recv command 0x46574c44
1,280,912 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,689 >>> mbox cmd response: success
2,772,748 UART: [afmc] ++
2,772,916 UART: [afmc] CDI.KEYID = 6
2,773,279 UART: [afmc] SUBJECT.KEYID = 7
2,773,705 UART: [afmc] AUTHORITY.KEYID = 5
2,809,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,547 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,260 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,169 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,883 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,594 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
88,064 UART: [kat] SHA2-256
891,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,174 UART: [kat] LMS
1,169,486 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,339 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,886 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x46574c44
1,282,310 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,907 >>> mbox cmd response: success
2,772,928 UART: [afmc] ++
2,773,096 UART: [afmc] CDI.KEYID = 6
2,773,459 UART: [afmc] SUBJECT.KEYID = 7
2,773,885 UART: [afmc] AUTHORITY.KEYID = 5
2,809,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,069 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,782 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,691 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,405 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,144 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,805 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,182,253 UART: [idev] Erasing UDS.KEYID = 0
1,199,837 UART: [idev] Sha1 KeyId Algorithm
1,208,535 UART: [idev] --
1,209,428 UART: [ldev] ++
1,209,596 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,387 UART: [ldev] AUTHORITY.KEYID = 7
1,210,850 UART: [ldev] FE.KEYID = 1
1,216,032 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,752 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,765 UART: [fwproc] Recv command 0x46574c44
1,283,498 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,733 >>> mbox cmd response: success
2,773,830 UART: [afmc] ++
2,773,998 UART: [afmc] CDI.KEYID = 6
2,774,361 UART: [afmc] SUBJECT.KEYID = 7
2,774,787 UART: [afmc] AUTHORITY.KEYID = 5
2,810,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,273 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,986 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,895 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,609 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,532 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 33.19s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,545 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,837 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,798 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,159 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,957 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,763 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,751 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,257 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,957 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,867 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,669 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,351 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,039 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,409 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,309 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,975 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,409 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,945 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,501 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,335 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,127 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.56s
Truncated 104976 bytes from beginning
4
1,282,779 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,844 >>> mbox cmd response: success
2,773,093 UART: [afmc] ++
2,773,261 UART: [afmc] CDI.KEYID = 6
2,773,624 UART: [afmc] SUBJECT.KEYID = 7
2,774,050 UART: [afmc] AUTHORITY.KEYID = 5
2,809,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,224 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,937 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,846 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,560 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,335 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
915,951 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,181,736 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,823 UART: [ldev] --
1,282,189 UART: [fwproc] Wait for Commands...
1,282,916 UART: [fwproc] Recv command 0x46574c44
1,283,649 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,989 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,104 >>> mbox cmd response: success
2,774,337 UART: [afmc] ++
2,774,505 UART: [afmc] CDI.KEYID = 6
2,774,868 UART: [afmc] SUBJECT.KEYID = 7
2,775,294 UART: [afmc] AUTHORITY.KEYID = 5
2,810,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,396 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,109 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,018 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,732 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,343 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,181,726 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,786 UART: [idev] --
1,208,807 UART: [ldev] ++
1,208,975 UART: [ldev] CDI.KEYID = 6
1,209,339 UART: [ldev] SUBJECT.KEYID = 5
1,209,766 UART: [ldev] AUTHORITY.KEYID = 7
1,210,229 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,119 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,174 >>> mbox cmd response: success
2,774,367 UART: [afmc] ++
2,774,535 UART: [afmc] CDI.KEYID = 6
2,774,898 UART: [afmc] SUBJECT.KEYID = 7
2,775,324 UART: [afmc] AUTHORITY.KEYID = 5
2,811,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,998 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,711 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,620 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,334 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,267 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,180,996 UART: [idev] Erasing UDS.KEYID = 0
1,197,708 UART: [idev] Sha1 KeyId Algorithm
1,206,568 UART: [idev] --
1,207,607 UART: [ldev] ++
1,207,775 UART: [ldev] CDI.KEYID = 6
1,208,139 UART: [ldev] SUBJECT.KEYID = 5
1,208,566 UART: [ldev] AUTHORITY.KEYID = 7
1,209,029 UART: [ldev] FE.KEYID = 1
1,214,123 UART: [ldev] Erasing FE.KEYID = 1
1,239,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,809 UART: [ldev] --
1,279,149 UART: [fwproc] Wait for Commands...
1,279,918 UART: [fwproc] Recv command 0x46574c44
1,280,651 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,104 >>> mbox cmd response: success
2,772,345 UART: [afmc] ++
2,772,513 UART: [afmc] CDI.KEYID = 6
2,772,876 UART: [afmc] SUBJECT.KEYID = 7
2,773,302 UART: [afmc] AUTHORITY.KEYID = 5
2,808,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,366 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,079 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,988 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,702 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,507 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.63s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,540 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,450 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,452 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,548 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,898 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,346 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,218 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,740 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,866 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,946 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,782 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,300 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,622 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,530 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,212 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,558 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,718 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,204 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,526 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,588 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,224 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.70s
Truncated 104976 bytes from beginning
4
1,283,950 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,295 >>> mbox cmd response: success
2,775,342 UART: [afmc] ++
2,775,510 UART: [afmc] CDI.KEYID = 6
2,775,873 UART: [afmc] SUBJECT.KEYID = 7
2,776,299 UART: [afmc] AUTHORITY.KEYID = 5
2,812,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,477 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,835,190 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,841,099 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,813 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,502 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,307 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,474 UART: [ldev] Erasing FE.KEYID = 1
1,241,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,012 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,159 UART: [fwproc] Recv command 0x46574c44
1,281,892 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,817 >>> mbox cmd response: success
2,772,850 UART: [afmc] ++
2,773,018 UART: [afmc] CDI.KEYID = 6
2,773,381 UART: [afmc] SUBJECT.KEYID = 7
2,773,807 UART: [afmc] AUTHORITY.KEYID = 5
2,809,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,247 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,960 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,869 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,583 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,420 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,644 UART: [state] LifecycleState = Unprovisioned
85,299 UART: [state] DebugLocked = No
85,891 UART: [state] WD Timer not started. Device not locked for debugging
87,114 UART: [kat] SHA2-256
890,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,793 UART: [kat] ++
894,945 UART: [kat] sha1
899,073 UART: [kat] SHA2-256
901,013 UART: [kat] SHA2-384
903,722 UART: [kat] SHA2-512-ACC
905,623 UART: [kat] ECC-384
915,054 UART: [kat] HMAC-384Kdf
919,614 UART: [kat] LMS
1,167,926 UART: [kat] --
1,168,831 UART: [cold-reset] ++
1,169,179 UART: [fht] FHT @ 0x50003400
1,171,893 UART: [idev] ++
1,172,061 UART: [idev] CDI.KEYID = 6
1,172,422 UART: [idev] SUBJECT.KEYID = 7
1,172,847 UART: [idev] UDS.KEYID = 0
1,180,501 UART: [idev] Erasing UDS.KEYID = 0
1,197,513 UART: [idev] Sha1 KeyId Algorithm
1,206,351 UART: [idev] --
1,207,432 UART: [ldev] ++
1,207,600 UART: [ldev] CDI.KEYID = 6
1,207,964 UART: [ldev] SUBJECT.KEYID = 5
1,208,391 UART: [ldev] AUTHORITY.KEYID = 7
1,208,854 UART: [ldev] FE.KEYID = 1
1,213,918 UART: [ldev] Erasing FE.KEYID = 1
1,240,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,732 UART: [ldev] --
1,280,082 UART: [fwproc] Wait for Commands...
1,280,907 UART: [fwproc] Recv command 0x46574c44
1,281,640 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,785 >>> mbox cmd response: success
2,773,008 UART: [afmc] ++
2,773,176 UART: [afmc] CDI.KEYID = 6
2,773,539 UART: [afmc] SUBJECT.KEYID = 7
2,773,965 UART: [afmc] AUTHORITY.KEYID = 5
2,809,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,923 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,636 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,545 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,259 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,966 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
905,002 UART: [kat] SHA2-512-ACC
906,903 UART: [kat] ECC-384
916,694 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,765 UART: [cold-reset] ++
1,171,151 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,182,421 UART: [idev] Erasing UDS.KEYID = 0
1,199,937 UART: [idev] Sha1 KeyId Algorithm
1,208,855 UART: [idev] --
1,209,844 UART: [ldev] ++
1,210,012 UART: [ldev] CDI.KEYID = 6
1,210,376 UART: [ldev] SUBJECT.KEYID = 5
1,210,803 UART: [ldev] AUTHORITY.KEYID = 7
1,211,266 UART: [ldev] FE.KEYID = 1
1,216,510 UART: [ldev] Erasing FE.KEYID = 1
1,242,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,734 UART: [ldev] --
1,282,108 UART: [fwproc] Wait for Commands...
1,282,887 UART: [fwproc] Recv command 0x46574c44
1,283,620 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,570 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,693 >>> mbox cmd response: success
2,772,890 UART: [afmc] ++
2,773,058 UART: [afmc] CDI.KEYID = 6
2,773,421 UART: [afmc] SUBJECT.KEYID = 7
2,773,847 UART: [afmc] AUTHORITY.KEYID = 5
2,809,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,945 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,658 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,567 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,281 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,216 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.82s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,605 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,637 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,899 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,391 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,913 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,097 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,869 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,229 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,209 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,199 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,801 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,641 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,325 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,157 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,445 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,109 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,209 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,847 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,625 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,419 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,435 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.67s
Truncated 104976 bytes from beginning
4
1,283,067 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,754 >>> mbox cmd response: success
2,773,775 UART: [afmc] ++
2,773,943 UART: [afmc] CDI.KEYID = 6
2,774,306 UART: [afmc] SUBJECT.KEYID = 7
2,774,732 UART: [afmc] AUTHORITY.KEYID = 5
2,810,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,604 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,317 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,226 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,940 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,733 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,181,904 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,797 UART: [ldev] --
1,282,123 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,491 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,836 >>> mbox cmd response: success
2,773,937 UART: [afmc] ++
2,774,105 UART: [afmc] CDI.KEYID = 6
2,774,468 UART: [afmc] SUBJECT.KEYID = 7
2,774,894 UART: [afmc] AUTHORITY.KEYID = 5
2,810,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,764 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,477 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,386 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,100 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,043 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,058 UART: [idev] ++
1,173,226 UART: [idev] CDI.KEYID = 6
1,173,587 UART: [idev] SUBJECT.KEYID = 7
1,174,012 UART: [idev] UDS.KEYID = 0
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,274 UART: [idev] --
1,209,371 UART: [ldev] ++
1,209,539 UART: [ldev] CDI.KEYID = 6
1,209,903 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,161 UART: [ldev] --
1,281,525 UART: [fwproc] Wait for Commands...
1,282,308 UART: [fwproc] Recv command 0x46574c44
1,283,041 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,372 >>> mbox cmd response: success
2,774,511 UART: [afmc] ++
2,774,679 UART: [afmc] CDI.KEYID = 6
2,775,042 UART: [afmc] SUBJECT.KEYID = 7
2,775,468 UART: [afmc] AUTHORITY.KEYID = 5
2,811,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,910 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,623 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,532 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,246 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,051 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,521 UART: [kat] SHA2-256
891,071 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,200 UART: [kat] ++
895,352 UART: [kat] sha1
899,506 UART: [kat] SHA2-256
901,446 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,169,976 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,173,008 UART: [idev] ++
1,173,176 UART: [idev] CDI.KEYID = 6
1,173,537 UART: [idev] SUBJECT.KEYID = 7
1,173,962 UART: [idev] UDS.KEYID = 0
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,200,010 UART: [idev] Sha1 KeyId Algorithm
1,208,928 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,367 UART: [ldev] SUBJECT.KEYID = 5
1,210,794 UART: [ldev] AUTHORITY.KEYID = 7
1,211,257 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,243,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,343 UART: [ldev] --
1,282,739 UART: [fwproc] Wait for Commands...
1,283,318 UART: [fwproc] Recv command 0x46574c44
1,284,051 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,140 >>> mbox cmd response: success
2,774,325 UART: [afmc] ++
2,774,493 UART: [afmc] CDI.KEYID = 6
2,774,856 UART: [afmc] SUBJECT.KEYID = 7
2,775,282 UART: [afmc] AUTHORITY.KEYID = 5
2,811,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,522 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,235 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,144 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,858 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,553 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.04s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,682 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,120 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,168 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,688 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,372 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,284 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,606 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,828 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,714 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,398 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,017 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,588 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,134 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,634 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,216 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,948 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,758 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,642 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,314 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,992 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,948 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.89s
Truncated 104976 bytes from beginning
4
1,281,564 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,461 >>> mbox cmd response: success
2,771,552 UART: [afmc] ++
2,771,720 UART: [afmc] CDI.KEYID = 6
2,772,083 UART: [afmc] SUBJECT.KEYID = 7
2,772,509 UART: [afmc] AUTHORITY.KEYID = 5
2,807,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,983 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,696 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,605 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,319 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,244 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,576 UART: [state] LifecycleState = Unprovisioned
85,231 UART: [state] DebugLocked = No
85,779 UART: [state] WD Timer not started. Device not locked for debugging
87,112 UART: [kat] SHA2-256
890,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,791 UART: [kat] ++
894,943 UART: [kat] sha1
899,091 UART: [kat] SHA2-256
901,031 UART: [kat] SHA2-384
903,854 UART: [kat] SHA2-512-ACC
905,755 UART: [kat] ECC-384
915,218 UART: [kat] HMAC-384Kdf
919,718 UART: [kat] LMS
1,168,030 UART: [kat] --
1,168,965 UART: [cold-reset] ++
1,169,381 UART: [fht] FHT @ 0x50003400
1,172,105 UART: [idev] ++
1,172,273 UART: [idev] CDI.KEYID = 6
1,172,634 UART: [idev] SUBJECT.KEYID = 7
1,173,059 UART: [idev] UDS.KEYID = 0
1,181,055 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,140 UART: [ldev] ++
1,208,308 UART: [ldev] CDI.KEYID = 6
1,208,672 UART: [ldev] SUBJECT.KEYID = 5
1,209,099 UART: [ldev] AUTHORITY.KEYID = 7
1,209,562 UART: [ldev] FE.KEYID = 1
1,214,506 UART: [ldev] Erasing FE.KEYID = 1
1,240,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,460 UART: [ldev] --
1,279,750 UART: [fwproc] Wait for Commands...
1,280,519 UART: [fwproc] Recv command 0x46574c44
1,281,252 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,149 >>> mbox cmd response: success
2,772,320 UART: [afmc] ++
2,772,488 UART: [afmc] CDI.KEYID = 6
2,772,851 UART: [afmc] SUBJECT.KEYID = 7
2,773,277 UART: [afmc] AUTHORITY.KEYID = 5
2,809,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,755 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,468 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,377 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,091 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,900 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,546 UART: [kat] LMS
1,168,858 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,502 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,690 UART: [ldev] --
1,281,014 UART: [fwproc] Wait for Commands...
1,281,721 UART: [fwproc] Recv command 0x46574c44
1,282,454 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,421 >>> mbox cmd response: success
2,772,534 UART: [afmc] ++
2,772,702 UART: [afmc] CDI.KEYID = 6
2,773,065 UART: [afmc] SUBJECT.KEYID = 7
2,773,491 UART: [afmc] AUTHORITY.KEYID = 5
2,808,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,301 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,014 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,923 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,637 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,448 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,977 UART: [idev] ++
1,173,145 UART: [idev] CDI.KEYID = 6
1,173,506 UART: [idev] SUBJECT.KEYID = 7
1,173,931 UART: [idev] UDS.KEYID = 0
1,182,445 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,291 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,242,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,629 >>> mbox cmd response: success
2,772,746 UART: [afmc] ++
2,772,914 UART: [afmc] CDI.KEYID = 6
2,773,277 UART: [afmc] SUBJECT.KEYID = 7
2,773,703 UART: [afmc] AUTHORITY.KEYID = 5
2,808,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,949 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,662 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,571 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,285 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,000 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.74s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,133 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,781 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,971 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,907 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,891 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,465 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,345 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,893 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,015 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,733 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,611 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,585 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,201 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,917 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,545 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,425 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,797 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,981 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,523 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,481 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,945 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.73s
Truncated 104976 bytes from beginning
4
1,283,723 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,148 >>> mbox cmd response: success
2,774,317 UART: [afmc] ++
2,774,485 UART: [afmc] CDI.KEYID = 6
2,774,848 UART: [afmc] SUBJECT.KEYID = 7
2,775,274 UART: [afmc] AUTHORITY.KEYID = 5
2,810,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,786 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,499 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,408 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,122 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,769 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,122 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,668 UART: [idev] --
1,208,623 UART: [ldev] ++
1,208,791 UART: [ldev] CDI.KEYID = 6
1,209,155 UART: [ldev] SUBJECT.KEYID = 5
1,209,582 UART: [ldev] AUTHORITY.KEYID = 7
1,210,045 UART: [ldev] FE.KEYID = 1
1,215,137 UART: [ldev] Erasing FE.KEYID = 1
1,240,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,883 UART: [ldev] --
1,280,371 UART: [fwproc] Wait for Commands...
1,281,002 UART: [fwproc] Recv command 0x46574c44
1,281,735 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,232 >>> mbox cmd response: success
2,773,399 UART: [afmc] ++
2,773,567 UART: [afmc] CDI.KEYID = 6
2,773,930 UART: [afmc] SUBJECT.KEYID = 7
2,774,356 UART: [afmc] AUTHORITY.KEYID = 5
2,810,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,892 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,605 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,514 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,228 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,853,149 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,267 UART: [kat] LMS
1,169,579 UART: [kat] --
1,170,502 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,864 UART: [idev] ++
1,174,032 UART: [idev] CDI.KEYID = 6
1,174,393 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,182,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,648 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,889 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,586 >>> mbox cmd response: success
2,773,819 UART: [afmc] ++
2,773,987 UART: [afmc] CDI.KEYID = 6
2,774,350 UART: [afmc] SUBJECT.KEYID = 7
2,774,776 UART: [afmc] AUTHORITY.KEYID = 5
2,810,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,450 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,163 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,072 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,786 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,533 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,003 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,754 UART: [idev] --
1,208,753 UART: [ldev] ++
1,208,921 UART: [ldev] CDI.KEYID = 6
1,209,285 UART: [ldev] SUBJECT.KEYID = 5
1,209,712 UART: [ldev] AUTHORITY.KEYID = 7
1,210,175 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,241,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,571 UART: [ldev] --
1,280,841 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,399 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,082 >>> mbox cmd response: success
2,774,299 UART: [afmc] ++
2,774,467 UART: [afmc] CDI.KEYID = 6
2,774,830 UART: [afmc] SUBJECT.KEYID = 7
2,775,256 UART: [afmc] AUTHORITY.KEYID = 5
2,810,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,540 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,253 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,162 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,876 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,621 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.85s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,954 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,238 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,510 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,420 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,892 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,672 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,380 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,610 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,950 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,452 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,884 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,864 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,182 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,420 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,294 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,738 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,650 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,150 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,420 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,542 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,518 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
5,747 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,240 UART:
192,639 UART: Running Caliptra ROM ...
193,828 UART:
193,991 UART: [state] CFI Enabled
258,318 UART: [state] LifecycleState = Unprovisioned
260,662 UART: [state] DebugLocked = No
262,599 UART: [state] WD Timer not started. Device not locked for debugging
267,633 UART: [kat] SHA2-256
449,558 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
461,059 UART: [kat] ++
461,655 UART: [kat] sha1
472,537 UART: [kat] SHA2-256
475,602 UART: [kat] SHA2-384
482,382 UART: [kat] SHA2-512-ACC
485,002 UART: [kat] ECC-384
3,772,507 UART: [kat] HMAC-384Kdf
3,799,878 UART: [kat] LMS
4,873,042 UART: [kat] --
4,877,150 UART: [cold-reset] ++
4,879,410 UART: [fht] FHT @ 0x50003400
4,890,497 UART: [idev] ++
4,891,170 UART: [idev] CDI.KEYID = 6
4,892,427 UART: [idev] SUBJECT.KEYID = 7
4,893,532 UART: [idev] UDS.KEYID = 0
4,925,954 UART: [idev] Erasing UDS.KEYID = 0
8,240,959 UART: [idev] Sha1 KeyId Algorithm
8,262,784 UART: [idev] --
8,266,804 UART: [ldev] ++
8,267,376 UART: [ldev] CDI.KEYID = 6
8,268,537 UART: [ldev] SUBJECT.KEYID = 5
8,269,749 UART: [ldev] AUTHORITY.KEYID = 7
8,270,897 UART: [ldev] FE.KEYID = 1
8,313,432 UART: [ldev] Erasing FE.KEYID = 1
11,645,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,490 UART: [ldev] --
14,032,688 UART: [fwproc] Wait for Commands...
14,035,167 UART: [fwproc] Recv command 0x46574c44
14,037,427 UART: [fwproc] Recv'd Img size: 114036 bytes
14,113,355 UART: ROM Fatal Error: 0x000B0032
14,116,771 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
5,524 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,879,512 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
6,427 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,450 UART:
192,850 UART: Running Caliptra ROM ...
194,166 UART:
603,542 UART: [state] CFI Enabled
616,775 UART: [state] LifecycleState = Unprovisioned
619,100 UART: [state] DebugLocked = No
620,741 UART: [state] WD Timer not started. Device not locked for debugging
624,682 UART: [kat] SHA2-256
806,619 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,161 UART: [kat] ++
818,745 UART: [kat] sha1
828,978 UART: [kat] SHA2-256
831,974 UART: [kat] SHA2-384
836,860 UART: [kat] SHA2-512-ACC
839,466 UART: [kat] ECC-384
4,095,601 UART: [kat] HMAC-384Kdf
4,108,446 UART: [kat] LMS
5,181,569 UART: [kat] --
5,186,316 UART: [cold-reset] ++
5,187,773 UART: [fht] FHT @ 0x50003400
5,199,879 UART: [idev] ++
5,200,597 UART: [idev] CDI.KEYID = 6
5,201,828 UART: [idev] SUBJECT.KEYID = 7
5,203,266 UART: [idev] UDS.KEYID = 0
5,221,288 UART: [idev] Erasing UDS.KEYID = 0
8,497,841 UART: [idev] Sha1 KeyId Algorithm
8,519,833 UART: [idev] --
8,524,188 UART: [ldev] ++
8,524,747 UART: [ldev] CDI.KEYID = 6
8,525,973 UART: [ldev] SUBJECT.KEYID = 5
8,527,454 UART: [ldev] AUTHORITY.KEYID = 7
8,529,005 UART: [ldev] FE.KEYID = 1
8,541,054 UART: [ldev] Erasing FE.KEYID = 1
11,832,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,393 UART: [ldev] --
14,196,297 UART: [fwproc] Wait for Commands...
14,197,898 UART: [fwproc] Recv command 0x46574c44
14,200,216 UART: [fwproc] Recv'd Img size: 114036 bytes
14,278,033 UART: ROM Fatal Error: 0x000B0032
14,281,445 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
6,304 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,084,803 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
5,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,209 UART:
192,596 UART: Running Caliptra ROM ...
193,695 UART:
193,840 UART: [state] CFI Enabled
261,349 UART: [state] LifecycleState = Unprovisioned
263,264 UART: [state] DebugLocked = No
265,944 UART: [state] WD Timer not started. Device not locked for debugging
270,217 UART: [kat] SHA2-256
449,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,928 UART: [kat] ++
461,473 UART: [kat] sha1
472,518 UART: [kat] SHA2-256
475,579 UART: [kat] SHA2-384
480,635 UART: [kat] SHA2-512-ACC
483,633 UART: [kat] ECC-384
2,945,037 UART: [kat] HMAC-384Kdf
2,967,211 UART: [kat] LMS
3,496,667 UART: [kat] --
3,502,358 UART: [cold-reset] ++
3,504,044 UART: [fht] FHT @ 0x50003400
3,513,707 UART: [idev] ++
3,514,274 UART: [idev] CDI.KEYID = 6
3,515,183 UART: [idev] SUBJECT.KEYID = 7
3,516,400 UART: [idev] UDS.KEYID = 0
3,539,289 UART: [idev] Erasing UDS.KEYID = 0
6,023,084 UART: [idev] Sha1 KeyId Algorithm
6,045,782 UART: [idev] --
6,050,320 UART: [ldev] ++
6,050,892 UART: [ldev] CDI.KEYID = 6
6,051,800 UART: [ldev] SUBJECT.KEYID = 5
6,052,964 UART: [ldev] AUTHORITY.KEYID = 7
6,054,258 UART: [ldev] FE.KEYID = 1
6,096,618 UART: [ldev] Erasing FE.KEYID = 1
8,598,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,806 UART: [ldev] --
10,408,966 UART: [fwproc] Wait for Commands...
10,412,039 UART: [fwproc] Recv command 0x46574c44
10,414,135 UART: [fwproc] Recv'd Img size: 114360 bytes
10,489,194 UART: ROM Fatal Error: 0x000B0032
10,492,291 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
6,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,312 UART:
192,696 UART: Running Caliptra ROM ...
193,860 UART:
194,012 UART: [state] CFI Enabled
263,176 UART: [state] LifecycleState = Unprovisioned
265,103 UART: [state] DebugLocked = No
267,410 UART: [state] WD Timer not started. Device not locked for debugging
270,618 UART: [kat] SHA2-256
449,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,344 UART: [kat] ++
461,878 UART: [kat] sha1
473,731 UART: [kat] SHA2-256
476,789 UART: [kat] SHA2-384
481,763 UART: [kat] SHA2-512-ACC
484,744 UART: [kat] ECC-384
2,945,091 UART: [kat] HMAC-384Kdf
2,967,263 UART: [kat] LMS
3,496,728 UART: [kat] --
3,501,099 UART: [cold-reset] ++
3,503,090 UART: [fht] FHT @ 0x50003400
3,514,826 UART: [idev] ++
3,515,390 UART: [idev] CDI.KEYID = 6
3,516,358 UART: [idev] SUBJECT.KEYID = 7
3,517,656 UART: [idev] UDS.KEYID = 0
3,540,801 UART: [idev] Erasing UDS.KEYID = 0
6,024,925 UART: [idev] Sha1 KeyId Algorithm
6,048,271 UART: [idev] --
6,051,572 UART: [ldev] ++
6,052,147 UART: [ldev] CDI.KEYID = 6
6,053,055 UART: [ldev] SUBJECT.KEYID = 5
6,054,223 UART: [ldev] AUTHORITY.KEYID = 7
6,055,458 UART: [ldev] FE.KEYID = 1
6,096,196 UART: [ldev] Erasing FE.KEYID = 1
8,599,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,491 UART: [ldev] --
10,407,422 UART: [fwproc] Wait for Commands...
10,410,659 UART: [fwproc] Recv command 0x46574c44
10,412,775 UART: [fwproc] Recv'd Img size: 114360 bytes
10,489,513 UART: ROM Fatal Error: 0x000B0032
10,492,596 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
5,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,253,994 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
6,689 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,537 UART:
192,946 UART: Running Caliptra ROM ...
194,111 UART:
603,591 UART: [state] CFI Enabled
617,935 UART: [state] LifecycleState = Unprovisioned
619,758 UART: [state] DebugLocked = No
621,215 UART: [state] WD Timer not started. Device not locked for debugging
624,570 UART: [kat] SHA2-256
803,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,246 UART: [kat] ++
815,690 UART: [kat] sha1
826,615 UART: [kat] SHA2-256
829,665 UART: [kat] SHA2-384
835,038 UART: [kat] SHA2-512-ACC
837,980 UART: [kat] ECC-384
3,280,000 UART: [kat] HMAC-384Kdf
3,291,803 UART: [kat] LMS
3,821,258 UART: [kat] --
3,825,781 UART: [cold-reset] ++
3,827,006 UART: [fht] FHT @ 0x50003400
3,837,659 UART: [idev] ++
3,838,228 UART: [idev] CDI.KEYID = 6
3,839,194 UART: [idev] SUBJECT.KEYID = 7
3,840,350 UART: [idev] UDS.KEYID = 0
3,857,369 UART: [idev] Erasing UDS.KEYID = 0
6,310,562 UART: [idev] Sha1 KeyId Algorithm
6,334,114 UART: [idev] --
6,337,025 UART: [ldev] ++
6,337,595 UART: [ldev] CDI.KEYID = 6
6,338,474 UART: [ldev] SUBJECT.KEYID = 5
6,339,683 UART: [ldev] AUTHORITY.KEYID = 7
6,340,909 UART: [ldev] FE.KEYID = 1
6,351,834 UART: [ldev] Erasing FE.KEYID = 1
8,826,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,723 UART: [ldev] --
10,615,970 UART: [fwproc] Wait for Commands...
10,617,653 UART: [fwproc] Recv command 0x46574c44
10,619,748 UART: [fwproc] Recv'd Img size: 114360 bytes
10,698,588 UART: ROM Fatal Error: 0x000B0032
10,701,672 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
6,264 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,483,630 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,169,875 UART: [fht] FHT @ 0x50003400
1,172,451 UART: [idev] ++
1,172,619 UART: [idev] CDI.KEYID = 6
1,172,980 UART: [idev] SUBJECT.KEYID = 7
1,173,405 UART: [idev] UDS.KEYID = 0
1,181,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,015 UART: [idev] Sha1 KeyId Algorithm
1,206,825 UART: [idev] --
1,207,932 UART: [ldev] ++
1,208,100 UART: [ldev] CDI.KEYID = 6
1,208,464 UART: [ldev] SUBJECT.KEYID = 5
1,208,891 UART: [ldev] AUTHORITY.KEYID = 7
1,209,354 UART: [ldev] FE.KEYID = 1
1,214,586 UART: [ldev] Erasing FE.KEYID = 1
1,240,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,768 UART: [ldev] --
1,280,254 UART: [fwproc] Wait for Commands...
1,280,849 UART: [fwproc] Recv command 0x46574c44
1,281,582 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,240 UART: ROM Fatal Error: 0x000B0032
1,308,397 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,282 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,600 UART: [kat] SHA2-256
901,540 UART: [kat] SHA2-384
904,277 UART: [kat] SHA2-512-ACC
906,178 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,198,934 UART: [idev] Sha1 KeyId Algorithm
1,207,726 UART: [idev] --
1,208,659 UART: [ldev] ++
1,208,827 UART: [ldev] CDI.KEYID = 6
1,209,191 UART: [ldev] SUBJECT.KEYID = 5
1,209,618 UART: [ldev] AUTHORITY.KEYID = 7
1,210,081 UART: [ldev] FE.KEYID = 1
1,215,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,423 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,021 UART: ROM Fatal Error: 0x000B0032
1,310,178 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,755 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,181,945 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,796 UART: [ldev] ++
1,208,964 UART: [ldev] CDI.KEYID = 6
1,209,328 UART: [ldev] SUBJECT.KEYID = 5
1,209,755 UART: [ldev] AUTHORITY.KEYID = 7
1,210,218 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,175 UART: [fwproc] Recv command 0x46574c44
1,281,908 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,110 UART: ROM Fatal Error: 0x000B0032
1,309,267 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,624 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,051 UART: [ldev] --
1,281,561 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,545 UART: ROM Fatal Error: 0x000B0032
1,310,702 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,935 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,170,119 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,381 UART: [idev] ++
1,173,549 UART: [idev] CDI.KEYID = 6
1,173,910 UART: [idev] SUBJECT.KEYID = 7
1,174,335 UART: [idev] UDS.KEYID = 0
1,182,681 UART: [idev] Erasing UDS.KEYID = 0
1,199,429 UART: [idev] Sha1 KeyId Algorithm
1,208,307 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,215,846 UART: [ldev] Erasing FE.KEYID = 1
1,242,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,554 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,669 UART: [fwproc] Recv command 0x46574c44
1,283,402 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,518 UART: ROM Fatal Error: 0x000B0032
1,310,675 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,268 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,622 UART: [cold-reset] ++
1,171,182 UART: [fht] FHT @ 0x50003400
1,173,956 UART: [idev] ++
1,174,124 UART: [idev] CDI.KEYID = 6
1,174,485 UART: [idev] SUBJECT.KEYID = 7
1,174,910 UART: [idev] UDS.KEYID = 0
1,182,888 UART: [idev] Erasing UDS.KEYID = 0
1,200,084 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,487 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,195 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,873 UART: ROM Fatal Error: 0x000B0032
1,311,030 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,881 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 76844 bytes from beginning
4,043,541 UART: [fwproc] Recv'd Img size: 114036 bytes
14,119,842 UART: ROM Fatal Error: 0x00B0003A
14,123,204 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
2,051,712 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,195,801 UART:
2,196,200 UART: Running Caliptra ROM ...
2,197,301 UART:
2,197,455 UART: [state] CFI Enabled
2,198,424 UART: [state] LifecycleState = Unprovisioned
2,200,088 UART: [state] DebugLocked = No
2,201,115 UART: [state] WD Timer not started. Device not locked for debugging
2,203,585 UART: [kat] SHA2-256
2,204,247 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,269 UART: [kat] ++
2,207,714 UART: [kat] sha1
2,208,226 UART: [kat] SHA2-256
2,208,885 UART: [kat] SHA2-384
2,209,541 UART: [kat] SHA2-512-ACC
2,210,383 UART: [kat] ECC-384
3,776,271 UART: [kat] HMAC-384Kdf
3,800,657 UART: [kat] LMS
4,873,778 UART: [kat] --
4,877,958 UART: [cold-reset] ++
4,880,600 UART: [fht] FHT @ 0x50003400
4,892,230 UART: [idev] ++
4,892,903 UART: [idev] CDI.KEYID = 6
4,894,137 UART: [idev] SUBJECT.KEYID = 7
4,895,293 UART: [idev] UDS.KEYID = 0
4,928,932 UART: [idev] Erasing UDS.KEYID = 0
8,242,437 UART: [idev] Sha1 KeyId Algorithm
8,264,321 UART: [idev] --
8,267,558 UART: [ldev] ++
8,268,126 UART: [ldev] CDI.KEYID = 6
8,269,230 UART: [ldev] SUBJECT.KEYID = 5
8,270,498 UART: [ldev] AUTHORITY.KEYID = 7
8,271,647 UART: [ldev] FE.KEYID = 1
8,316,626 UART: [ldev] Erasing FE.KEYID = 1
11,651,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,173 UART: [ldev] --
14,035,041 UART: [fwproc] Wait for Commands...
14,037,401 UART: [fwproc] Recv command 0x46574c44
14,039,704 UART: [fwproc] Recv'd Img size: 114036 bytes
14,116,659 UART: ROM Fatal Error: 0x00B0003A
14,120,018 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,053,167 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,197,296 UART:
2,197,686 UART: Running Caliptra ROM ...
2,198,841 UART:
2,199,008 UART: [state] CFI Enabled
2,199,982 UART: [state] LifecycleState = Unprovisioned
2,201,675 UART: [state] DebugLocked = No
2,202,788 UART: [state] WD Timer not started. Device not locked for debugging
2,205,263 UART: [kat] SHA2-256
2,205,930 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,938 UART: [kat] ++
2,209,391 UART: [kat] sha1
2,209,903 UART: [kat] SHA2-256
2,210,639 UART: [kat] SHA2-384
2,211,306 UART: [kat] SHA2-512-ACC
2,212,155 UART: [kat] ECC-384
3,775,997 UART: [kat] HMAC-384Kdf
3,802,003 UART: [kat] LMS
4,875,129 UART: [kat] --
4,879,186 UART: [cold-reset] ++
4,880,955 UART: [fht] FHT @ 0x50003400
4,892,040 UART: [idev] ++
4,892,788 UART: [idev] CDI.KEYID = 6
4,893,982 UART: [idev] SUBJECT.KEYID = 7
4,895,093 UART: [idev] UDS.KEYID = 0
4,930,305 UART: [idev] Erasing UDS.KEYID = 0
8,242,095 UART: [idev] Sha1 KeyId Algorithm
8,263,499 UART: [idev] --
8,268,931 UART: [ldev] ++
8,269,508 UART: [ldev] CDI.KEYID = 6
8,270,746 UART: [ldev] SUBJECT.KEYID = 5
8,271,847 UART: [ldev] AUTHORITY.KEYID = 7
8,273,076 UART: [ldev] FE.KEYID = 1
8,318,026 UART: [ldev] Erasing FE.KEYID = 1
11,653,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,814 UART: [ldev] --
14,036,837 UART: [fwproc] Wait for Commands...
14,038,935 UART: [fwproc] Recv command 0x46574c44
14,041,202 UART: [fwproc] Recv'd Img size: 114036 bytes
14,121,824 UART: ROM Fatal Error: 0x00B0003A
14,125,176 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,052,606 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,196,682 UART:
2,197,101 UART: Running Caliptra ROM ...
2,198,182 UART:
2,198,339 UART: [state] CFI Enabled
2,199,305 UART: [state] LifecycleState = Unprovisioned
2,200,956 UART: [state] DebugLocked = No
2,202,061 UART: [state] WD Timer not started. Device not locked for debugging
2,204,540 UART: [kat] SHA2-256
2,205,208 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,218 UART: [kat] ++
2,208,672 UART: [kat] sha1
2,209,189 UART: [kat] SHA2-256
2,209,929 UART: [kat] SHA2-384
2,210,597 UART: [kat] SHA2-512-ACC
2,211,425 UART: [kat] ECC-384
3,772,471 UART: [kat] HMAC-384Kdf
3,801,732 UART: [kat] LMS
4,874,924 UART: [kat] --
4,877,802 UART: [cold-reset] ++
4,879,745 UART: [fht] FHT @ 0x50003400
4,891,156 UART: [idev] ++
4,891,880 UART: [idev] CDI.KEYID = 6
4,892,988 UART: [idev] SUBJECT.KEYID = 7
4,894,195 UART: [idev] UDS.KEYID = 0
4,928,943 UART: [idev] Erasing UDS.KEYID = 0
8,240,858 UART: [idev] Sha1 KeyId Algorithm
8,262,792 UART: [idev] --
8,267,485 UART: [ldev] ++
8,268,050 UART: [ldev] CDI.KEYID = 6
8,269,159 UART: [ldev] SUBJECT.KEYID = 5
8,270,424 UART: [ldev] AUTHORITY.KEYID = 7
8,271,572 UART: [ldev] FE.KEYID = 1
8,317,246 UART: [ldev] Erasing FE.KEYID = 1
11,652,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,009 UART: [ldev] --
14,035,031 UART: [fwproc] Wait for Commands...
14,036,698 UART: [fwproc] Recv command 0x46574c44
14,038,960 UART: [fwproc] Recv'd Img size: 114036 bytes
14,116,379 UART: ROM Fatal Error: 0x00B0003A
14,119,739 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
2,055,135 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,199,091 UART:
2,199,493 UART: Running Caliptra ROM ...
2,200,658 UART:
2,200,828 UART: [state] CFI Enabled
2,201,792 UART: [state] LifecycleState = Unprovisioned
2,203,446 UART: [state] DebugLocked = No
2,204,548 UART: [state] WD Timer not started. Device not locked for debugging
2,207,018 UART: [kat] SHA2-256
2,207,688 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,708 UART: [kat] ++
2,211,161 UART: [kat] sha1
2,211,673 UART: [kat] SHA2-256
2,212,432 UART: [kat] SHA2-384
2,213,100 UART: [kat] SHA2-512-ACC
2,213,980 UART: [kat] ECC-384
3,776,322 UART: [kat] HMAC-384Kdf
3,801,630 UART: [kat] LMS
4,874,758 UART: [kat] --
4,879,971 UART: [cold-reset] ++
4,882,448 UART: [fht] FHT @ 0x50003400
4,892,779 UART: [idev] ++
4,893,452 UART: [idev] CDI.KEYID = 6
4,894,685 UART: [idev] SUBJECT.KEYID = 7
4,895,785 UART: [idev] UDS.KEYID = 0
4,929,270 UART: [idev] Erasing UDS.KEYID = 0
8,241,362 UART: [idev] Sha1 KeyId Algorithm
8,263,410 UART: [idev] --
8,268,377 UART: [ldev] ++
8,268,963 UART: [ldev] CDI.KEYID = 6
8,270,145 UART: [ldev] SUBJECT.KEYID = 5
8,271,303 UART: [ldev] AUTHORITY.KEYID = 7
8,272,700 UART: [ldev] FE.KEYID = 1
8,314,948 UART: [ldev] Erasing FE.KEYID = 1
11,648,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,682 UART: [ldev] --
14,015,684 UART: [fwproc] Wait for Commands...
14,018,856 UART: [fwproc] Recv command 0x46574c44
14,021,172 UART: [fwproc] Recv'd Img size: 114036 bytes
22,073,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,157,084 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,225,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
22,543,499 >>> mbox cmd response: success
22,547,404 UART: [afmc] ++
22,548,102 UART: [afmc] CDI.KEYID = 6
22,549,289 UART: [afmc] SUBJECT.KEYID = 7
22,550,448 UART: [afmc] AUTHORITY.KEYID = 5
25,909,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,227,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,229,551 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,245,633 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,261,756 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,277,491 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,300,792 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.40s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,057,140 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,916,663 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
2,051,222 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,946,122 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,049,594 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,882,198 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
2,052,067 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,884,940 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,062,366 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,907,037 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,051,835 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,901,591 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,053,207 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,906,654 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,052,070 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,873,391 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,058,900 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,922,138 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,051,510 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,870,481 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,050,810 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,900,420 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,051,933 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,879,133 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,051,579 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,906,092 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,060,251 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,908,309 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
2,052,412 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,902,287 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,051,291 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,900,596 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,050,983 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,889,039 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,053,617 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,911,012 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,050,383 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,020,337 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.08s
Truncated 76844 bytes from beginning
4,195,178 UART: [fwproc] Recv'd Img size: 114036 bytes
14,272,119 UART: ROM Fatal Error: 0x00B0003A
14,275,484 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,057,731 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,201,732 UART:
2,202,156 UART: Running Caliptra ROM ...
2,203,332 UART:
2,203,501 UART: [state] CFI Enabled
2,204,461 UART: [state] LifecycleState = Unprovisioned
2,206,114 UART: [state] DebugLocked = No
2,207,216 UART: [state] WD Timer not started. Device not locked for debugging
2,209,688 UART: [kat] SHA2-256
2,210,353 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,369 UART: [kat] ++
2,213,817 UART: [kat] sha1
2,214,323 UART: [kat] SHA2-256
2,215,057 UART: [kat] SHA2-384
2,215,723 UART: [kat] SHA2-512-ACC
2,216,596 UART: [kat] ECC-384
4,099,769 UART: [kat] HMAC-384Kdf
4,112,017 UART: [kat] LMS
5,185,140 UART: [kat] --
5,190,219 UART: [cold-reset] ++
5,192,912 UART: [fht] FHT @ 0x50003400
5,204,162 UART: [idev] ++
5,204,976 UART: [idev] CDI.KEYID = 6
5,206,260 UART: [idev] SUBJECT.KEYID = 7
5,207,580 UART: [idev] UDS.KEYID = 0
5,222,159 UART: [idev] Erasing UDS.KEYID = 0
8,496,583 UART: [idev] Sha1 KeyId Algorithm
8,518,538 UART: [idev] --
8,521,550 UART: [ldev] ++
8,522,116 UART: [ldev] CDI.KEYID = 6
8,523,347 UART: [ldev] SUBJECT.KEYID = 5
8,524,774 UART: [ldev] AUTHORITY.KEYID = 7
8,526,382 UART: [ldev] FE.KEYID = 1
8,537,994 UART: [ldev] Erasing FE.KEYID = 1
11,827,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,607 UART: [ldev] --
14,192,520 UART: [fwproc] Wait for Commands...
14,195,102 UART: [fwproc] Recv command 0x46574c44
14,197,355 UART: [fwproc] Recv'd Img size: 114036 bytes
14,270,633 UART: ROM Fatal Error: 0x00B0003A
14,274,046 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,060,110 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,204,427 UART:
2,204,827 UART: Running Caliptra ROM ...
2,206,009 UART:
2,206,183 UART: [state] CFI Enabled
2,207,136 UART: [state] LifecycleState = Unprovisioned
2,208,786 UART: [state] DebugLocked = No
2,209,890 UART: [state] WD Timer not started. Device not locked for debugging
2,212,357 UART: [kat] SHA2-256
2,213,018 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,216,018 UART: [kat] ++
2,216,466 UART: [kat] sha1
2,217,056 UART: [kat] SHA2-256
2,217,716 UART: [kat] SHA2-384
2,218,387 UART: [kat] SHA2-512-ACC
2,219,266 UART: [kat] ECC-384
4,097,358 UART: [kat] HMAC-384Kdf
4,108,639 UART: [kat] LMS
5,181,807 UART: [kat] --
5,185,602 UART: [cold-reset] ++
5,188,076 UART: [fht] FHT @ 0x50003400
5,198,243 UART: [idev] ++
5,198,922 UART: [idev] CDI.KEYID = 6
5,200,153 UART: [idev] SUBJECT.KEYID = 7
5,201,584 UART: [idev] UDS.KEYID = 0
5,216,748 UART: [idev] Erasing UDS.KEYID = 0
8,490,028 UART: [idev] Sha1 KeyId Algorithm
8,512,131 UART: [idev] --
8,516,011 UART: [ldev] ++
8,516,580 UART: [ldev] CDI.KEYID = 6
8,517,838 UART: [ldev] SUBJECT.KEYID = 5
8,519,280 UART: [ldev] AUTHORITY.KEYID = 7
8,520,837 UART: [ldev] FE.KEYID = 1
8,531,042 UART: [ldev] Erasing FE.KEYID = 1
11,814,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,124,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,140,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,156,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,176,979 UART: [ldev] --
14,180,886 UART: [fwproc] Wait for Commands...
14,182,976 UART: [fwproc] Recv command 0x46574c44
14,185,286 UART: [fwproc] Recv'd Img size: 114036 bytes
14,259,164 UART: ROM Fatal Error: 0x00B0003A
14,262,524 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,059,645 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,203,585 UART:
2,203,997 UART: Running Caliptra ROM ...
2,205,170 UART:
2,205,356 UART: [state] CFI Enabled
2,206,534 UART: [state] LifecycleState = Unprovisioned
2,208,207 UART: [state] DebugLocked = No
2,209,310 UART: [state] WD Timer not started. Device not locked for debugging
2,211,778 UART: [kat] SHA2-256
2,212,440 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,474 UART: [kat] ++
2,215,975 UART: [kat] sha1
2,216,484 UART: [kat] SHA2-256
2,217,178 UART: [kat] SHA2-384
2,217,828 UART: [kat] SHA2-512-ACC
2,218,619 UART: [kat] ECC-384
4,098,909 UART: [kat] HMAC-384Kdf
4,110,236 UART: [kat] LMS
5,183,389 UART: [kat] --
5,188,388 UART: [cold-reset] ++
5,190,760 UART: [fht] FHT @ 0x50003400
5,203,631 UART: [idev] ++
5,204,297 UART: [idev] CDI.KEYID = 6
5,205,535 UART: [idev] SUBJECT.KEYID = 7
5,206,964 UART: [idev] UDS.KEYID = 0
5,221,191 UART: [idev] Erasing UDS.KEYID = 0
8,490,725 UART: [idev] Sha1 KeyId Algorithm
8,512,770 UART: [idev] --
8,517,678 UART: [ldev] ++
8,518,240 UART: [ldev] CDI.KEYID = 6
8,519,397 UART: [ldev] SUBJECT.KEYID = 5
8,520,929 UART: [ldev] AUTHORITY.KEYID = 7
8,522,410 UART: [ldev] FE.KEYID = 1
8,532,155 UART: [ldev] Erasing FE.KEYID = 1
11,825,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,466 UART: [ldev] --
14,191,343 UART: [fwproc] Wait for Commands...
14,193,376 UART: [fwproc] Recv command 0x46574c44
14,195,708 UART: [fwproc] Recv'd Img size: 114036 bytes
14,272,437 UART: ROM Fatal Error: 0x00B0003A
14,275,803 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,058,338 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,202,878 UART:
2,203,293 UART: Running Caliptra ROM ...
2,204,460 UART:
2,204,627 UART: [state] CFI Enabled
2,205,585 UART: [state] LifecycleState = Unprovisioned
2,207,254 UART: [state] DebugLocked = No
2,208,356 UART: [state] WD Timer not started. Device not locked for debugging
2,210,820 UART: [kat] SHA2-256
2,211,485 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,496 UART: [kat] ++
2,214,943 UART: [kat] sha1
2,215,501 UART: [kat] SHA2-256
2,216,150 UART: [kat] SHA2-384
2,216,895 UART: [kat] SHA2-512-ACC
2,217,734 UART: [kat] ECC-384
4,097,007 UART: [kat] HMAC-384Kdf
4,109,515 UART: [kat] LMS
5,182,653 UART: [kat] --
5,186,309 UART: [cold-reset] ++
5,188,136 UART: [fht] FHT @ 0x50003400
5,199,335 UART: [idev] ++
5,200,023 UART: [idev] CDI.KEYID = 6
5,201,258 UART: [idev] SUBJECT.KEYID = 7
5,202,688 UART: [idev] UDS.KEYID = 0
5,219,076 UART: [idev] Erasing UDS.KEYID = 0
8,490,683 UART: [idev] Sha1 KeyId Algorithm
8,513,165 UART: [idev] --
8,516,655 UART: [ldev] ++
8,517,228 UART: [ldev] CDI.KEYID = 6
8,518,463 UART: [ldev] SUBJECT.KEYID = 5
8,519,892 UART: [ldev] AUTHORITY.KEYID = 7
8,521,446 UART: [ldev] FE.KEYID = 1
8,533,005 UART: [ldev] Erasing FE.KEYID = 1
11,829,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,213 UART: [ldev] --
14,195,392 UART: [fwproc] Wait for Commands...
14,197,927 UART: [fwproc] Recv command 0x46574c44
14,200,242 UART: [fwproc] Recv'd Img size: 114036 bytes
22,466,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,546,609 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,615,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
22,932,042 >>> mbox cmd response: success
22,936,062 UART: [afmc] ++
22,936,776 UART: [afmc] CDI.KEYID = 6
22,938,016 UART: [afmc] SUBJECT.KEYID = 7
22,939,169 UART: [afmc] AUTHORITY.KEYID = 5
26,255,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,552,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,554,136 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,570,239 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,586,312 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,602,101 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,624,054 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.66s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,059,735 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,097,767 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,061,653 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,087,126 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,063,154 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,092,669 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,061,477 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,087,428 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,057,371 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,089,265 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,058,147 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,091,455 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,056,979 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,100,286 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,059,862 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,095,404 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,063,289 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,081,427 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,060,418 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,085,113 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,056,548 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,087,201 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,057,550 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,086,288 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,057,679 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,096,562 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,063,722 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,093,097 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,056,957 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,085,655 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
2,058,838 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,091,314 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
2,057,557 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,097,883 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,061,402 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,102,565 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,056,783 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,616,757 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.36s
Truncated 76844 bytes from beginning
0,414,057 UART: [fwproc] Recv'd Img size: 114360 bytes
10,494,201 UART: ROM Fatal Error: 0x00B0003A
10,497,296 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,068,875 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,213,312 UART:
2,213,807 UART: Running Caliptra ROM ...
2,214,944 UART:
2,215,109 UART: [state] CFI Enabled
2,216,072 UART: [state] LifecycleState = Unprovisioned
2,217,745 UART: [state] DebugLocked = No
2,218,776 UART: [state] WD Timer not started. Device not locked for debugging
2,221,254 UART: [kat] SHA2-256
2,221,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,224,928 UART: [kat] ++
2,225,381 UART: [kat] sha1
2,225,889 UART: [kat] SHA2-256
2,226,544 UART: [kat] SHA2-384
2,227,196 UART: [kat] SHA2-512-ACC
2,228,018 UART: [kat] ECC-384
2,946,367 UART: [kat] HMAC-384Kdf
2,970,468 UART: [kat] LMS
3,499,923 UART: [kat] --
3,503,247 UART: [cold-reset] ++
3,505,783 UART: [fht] FHT @ 0x50003400
3,516,875 UART: [idev] ++
3,517,450 UART: [idev] CDI.KEYID = 6
3,518,356 UART: [idev] SUBJECT.KEYID = 7
3,519,574 UART: [idev] UDS.KEYID = 0
3,541,871 UART: [idev] Erasing UDS.KEYID = 0
6,023,822 UART: [idev] Sha1 KeyId Algorithm
6,046,401 UART: [idev] --
6,049,998 UART: [ldev] ++
6,050,583 UART: [ldev] CDI.KEYID = 6
6,051,494 UART: [ldev] SUBJECT.KEYID = 5
6,052,660 UART: [ldev] AUTHORITY.KEYID = 7
6,053,901 UART: [ldev] FE.KEYID = 1
6,099,333 UART: [ldev] Erasing FE.KEYID = 1
8,600,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,154 UART: [ldev] --
10,391,283 UART: [fwproc] Wait for Commands...
10,393,653 UART: [fwproc] Recv command 0x46574c44
10,395,754 UART: [fwproc] Recv'd Img size: 114360 bytes
10,468,444 UART: ROM Fatal Error: 0x00B0003A
10,471,533 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,056,402 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,200,704 UART:
2,201,115 UART: Running Caliptra ROM ...
2,202,291 UART:
2,202,467 UART: [state] CFI Enabled
2,203,434 UART: [state] LifecycleState = Unprovisioned
2,205,097 UART: [state] DebugLocked = No
2,206,127 UART: [state] WD Timer not started. Device not locked for debugging
2,208,824 UART: [kat] SHA2-256
2,209,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,521 UART: [kat] ++
2,212,972 UART: [kat] sha1
2,213,490 UART: [kat] SHA2-256
2,214,231 UART: [kat] SHA2-384
2,214,919 UART: [kat] SHA2-512-ACC
2,215,807 UART: [kat] ECC-384
2,950,180 UART: [kat] HMAC-384Kdf
2,971,870 UART: [kat] LMS
3,501,345 UART: [kat] --
3,505,498 UART: [cold-reset] ++
3,507,371 UART: [fht] FHT @ 0x50003400
3,519,650 UART: [idev] ++
3,520,228 UART: [idev] CDI.KEYID = 6
3,521,138 UART: [idev] SUBJECT.KEYID = 7
3,522,357 UART: [idev] UDS.KEYID = 0
3,544,379 UART: [idev] Erasing UDS.KEYID = 0
6,023,973 UART: [idev] Sha1 KeyId Algorithm
6,048,605 UART: [idev] --
6,052,420 UART: [ldev] ++
6,053,002 UART: [ldev] CDI.KEYID = 6
6,053,935 UART: [ldev] SUBJECT.KEYID = 5
6,055,108 UART: [ldev] AUTHORITY.KEYID = 7
6,056,347 UART: [ldev] FE.KEYID = 1
6,099,993 UART: [ldev] Erasing FE.KEYID = 1
8,603,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,717 UART: [ldev] --
10,410,689 UART: [fwproc] Wait for Commands...
10,412,948 UART: [fwproc] Recv command 0x46574c44
10,415,044 UART: [fwproc] Recv'd Img size: 114360 bytes
10,493,246 UART: ROM Fatal Error: 0x00B0003A
10,496,332 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,054,524 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,198,913 UART:
2,199,340 UART: Running Caliptra ROM ...
2,200,509 UART:
2,200,684 UART: [state] CFI Enabled
2,201,652 UART: [state] LifecycleState = Unprovisioned
2,203,315 UART: [state] DebugLocked = No
2,204,655 UART: [state] WD Timer not started. Device not locked for debugging
2,207,152 UART: [kat] SHA2-256
2,207,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,861 UART: [kat] ++
2,211,320 UART: [kat] sha1
2,211,836 UART: [kat] SHA2-256
2,212,576 UART: [kat] SHA2-384
2,213,243 UART: [kat] SHA2-512-ACC
2,214,075 UART: [kat] ECC-384
2,948,376 UART: [kat] HMAC-384Kdf
2,969,526 UART: [kat] LMS
3,499,006 UART: [kat] --
3,503,164 UART: [cold-reset] ++
3,504,180 UART: [fht] FHT @ 0x50003400
3,515,676 UART: [idev] ++
3,516,237 UART: [idev] CDI.KEYID = 6
3,517,172 UART: [idev] SUBJECT.KEYID = 7
3,518,386 UART: [idev] UDS.KEYID = 0
3,541,850 UART: [idev] Erasing UDS.KEYID = 0
6,024,032 UART: [idev] Sha1 KeyId Algorithm
6,047,323 UART: [idev] --
6,051,563 UART: [ldev] ++
6,052,147 UART: [ldev] CDI.KEYID = 6
6,053,061 UART: [ldev] SUBJECT.KEYID = 5
6,054,232 UART: [ldev] AUTHORITY.KEYID = 7
6,055,471 UART: [ldev] FE.KEYID = 1
6,098,037 UART: [ldev] Erasing FE.KEYID = 1
8,603,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,103 UART: [ldev] --
10,412,100 UART: [fwproc] Wait for Commands...
10,413,661 UART: [fwproc] Recv command 0x46574c44
10,415,780 UART: [fwproc] Recv'd Img size: 114360 bytes
10,491,176 UART: ROM Fatal Error: 0x00B0003A
10,494,321 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
2,077,172 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,221,652 UART:
2,222,059 UART: Running Caliptra ROM ...
2,223,230 UART:
2,223,394 UART: [state] CFI Enabled
2,224,354 UART: [state] LifecycleState = Unprovisioned
2,226,032 UART: [state] DebugLocked = No
2,227,148 UART: [state] WD Timer not started. Device not locked for debugging
2,229,624 UART: [kat] SHA2-256
2,230,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,233,313 UART: [kat] ++
2,233,770 UART: [kat] sha1
2,234,282 UART: [kat] SHA2-256
2,235,024 UART: [kat] SHA2-384
2,235,693 UART: [kat] SHA2-512-ACC
2,236,528 UART: [kat] ECC-384
2,947,083 UART: [kat] HMAC-384Kdf
2,971,792 UART: [kat] LMS
3,501,268 UART: [kat] --
3,505,594 UART: [cold-reset] ++
3,507,420 UART: [fht] FHT @ 0x50003400
3,517,806 UART: [idev] ++
3,518,398 UART: [idev] CDI.KEYID = 6
3,519,310 UART: [idev] SUBJECT.KEYID = 7
3,520,471 UART: [idev] UDS.KEYID = 0
3,543,638 UART: [idev] Erasing UDS.KEYID = 0
6,024,200 UART: [idev] Sha1 KeyId Algorithm
6,047,150 UART: [idev] --
6,051,453 UART: [ldev] ++
6,052,038 UART: [ldev] CDI.KEYID = 6
6,052,953 UART: [ldev] SUBJECT.KEYID = 5
6,054,123 UART: [ldev] AUTHORITY.KEYID = 7
6,055,358 UART: [ldev] FE.KEYID = 1
6,100,252 UART: [ldev] Erasing FE.KEYID = 1
8,602,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,886 UART: [ldev] --
10,414,179 UART: [fwproc] Wait for Commands...
10,417,358 UART: [fwproc] Recv command 0x46574c44
10,419,456 UART: [fwproc] Recv'd Img size: 114360 bytes
14,968,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,045,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,114,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,431,841 >>> mbox cmd response: success
15,436,414 UART: [afmc] ++
15,437,010 UART: [afmc] CDI.KEYID = 6
15,438,084 UART: [afmc] SUBJECT.KEYID = 7
15,439,198 UART: [afmc] AUTHORITY.KEYID = 5
17,981,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,707,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,709,404 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,725,423 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,741,365 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,757,177 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,779,296 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.36s
Truncated 76844 bytes from beginning
0,395,018 UART: [fwproc] Recv'd Img size: 114360 bytes
10,473,492 UART: ROM Fatal Error: 0x00B0003A
10,476,582 >>> mbox cmd response: failed
0 new_unbooted
534 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,543 writing to cptra_bootfsm_go
2,060,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,204,580 UART:
2,204,994 UART: Running Caliptra ROM ...
2,206,113 UART:
2,206,270 UART: [state] CFI Enabled
2,207,248 UART: [state] LifecycleState = Unprovisioned
2,208,914 UART: [state] DebugLocked = No
2,209,988 UART: [state] WD Timer not started. Device not locked for debugging
2,212,468 UART: [kat] SHA2-256
2,213,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,150 UART: [kat] ++
2,216,599 UART: [kat] sha1
2,217,112 UART: [kat] SHA2-256
2,217,852 UART: [kat] SHA2-384
2,218,518 UART: [kat] SHA2-512-ACC
2,219,401 UART: [kat] ECC-384
2,950,124 UART: [kat] HMAC-384Kdf
2,971,649 UART: [kat] LMS
3,501,068 UART: [kat] --
3,505,368 UART: [cold-reset] ++
3,506,716 UART: [fht] FHT @ 0x50003400
3,517,756 UART: [idev] ++
3,518,330 UART: [idev] CDI.KEYID = 6
3,519,238 UART: [idev] SUBJECT.KEYID = 7
3,520,550 UART: [idev] UDS.KEYID = 0
3,543,235 UART: [idev] Erasing UDS.KEYID = 0
6,025,778 UART: [idev] Sha1 KeyId Algorithm
6,049,716 UART: [idev] --
6,053,445 UART: [ldev] ++
6,054,028 UART: [ldev] CDI.KEYID = 6
6,054,941 UART: [ldev] SUBJECT.KEYID = 5
6,056,104 UART: [ldev] AUTHORITY.KEYID = 7
6,057,339 UART: [ldev] FE.KEYID = 1
6,098,884 UART: [ldev] Erasing FE.KEYID = 1
8,598,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,409 UART: [ldev] --
10,390,674 UART: [fwproc] Wait for Commands...
10,393,040 UART: [fwproc] Recv command 0x46574c44
10,395,147 UART: [fwproc] Recv'd Img size: 114360 bytes
10,471,287 UART: ROM Fatal Error: 0x00B0003A
10,474,380 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
2,065,370 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,209,835 UART:
2,210,249 UART: Running Caliptra ROM ...
2,211,413 UART:
2,211,586 UART: [state] CFI Enabled
2,212,558 UART: [state] LifecycleState = Unprovisioned
2,214,217 UART: [state] DebugLocked = No
2,215,326 UART: [state] WD Timer not started. Device not locked for debugging
2,217,802 UART: [kat] SHA2-256
2,218,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,221,486 UART: [kat] ++
2,221,935 UART: [kat] sha1
2,222,451 UART: [kat] SHA2-256
2,223,197 UART: [kat] SHA2-384
2,223,861 UART: [kat] SHA2-512-ACC
2,224,724 UART: [kat] ECC-384
2,927,577 UART: [kat] HMAC-384Kdf
2,949,602 UART: [kat] LMS
3,479,080 UART: [kat] --
3,483,352 UART: [cold-reset] ++
3,485,773 UART: [fht] FHT @ 0x50003400
3,497,400 UART: [idev] ++
3,497,965 UART: [idev] CDI.KEYID = 6
3,498,869 UART: [idev] SUBJECT.KEYID = 7
3,500,085 UART: [idev] UDS.KEYID = 0
3,521,840 UART: [idev] Erasing UDS.KEYID = 0
6,004,834 UART: [idev] Sha1 KeyId Algorithm
6,028,125 UART: [idev] --
6,031,562 UART: [ldev] ++
6,032,145 UART: [ldev] CDI.KEYID = 6
6,033,056 UART: [ldev] SUBJECT.KEYID = 5
6,034,241 UART: [ldev] AUTHORITY.KEYID = 7
6,035,482 UART: [ldev] FE.KEYID = 1
6,076,328 UART: [ldev] Erasing FE.KEYID = 1
8,581,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,148 UART: [ldev] --
10,392,613 UART: [fwproc] Wait for Commands...
10,395,251 UART: [fwproc] Recv command 0x46574c44
10,397,348 UART: [fwproc] Recv'd Img size: 114360 bytes
10,469,490 UART: ROM Fatal Error: 0x00B0003A
10,472,574 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,055,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,199,830 UART:
2,200,228 UART: Running Caliptra ROM ...
2,201,408 UART:
2,201,582 UART: [state] CFI Enabled
2,202,543 UART: [state] LifecycleState = Unprovisioned
2,204,201 UART: [state] DebugLocked = No
2,205,315 UART: [state] WD Timer not started. Device not locked for debugging
2,207,789 UART: [kat] SHA2-256
2,208,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,477 UART: [kat] ++
2,212,001 UART: [kat] sha1
2,212,530 UART: [kat] SHA2-256
2,213,189 UART: [kat] SHA2-384
2,213,876 UART: [kat] SHA2-512-ACC
2,214,716 UART: [kat] ECC-384
2,945,807 UART: [kat] HMAC-384Kdf
2,969,551 UART: [kat] LMS
3,498,969 UART: [kat] --
3,503,444 UART: [cold-reset] ++
3,505,000 UART: [fht] FHT @ 0x50003400
3,516,154 UART: [idev] ++
3,516,717 UART: [idev] CDI.KEYID = 6
3,517,624 UART: [idev] SUBJECT.KEYID = 7
3,518,844 UART: [idev] UDS.KEYID = 0
3,541,297 UART: [idev] Erasing UDS.KEYID = 0
6,023,010 UART: [idev] Sha1 KeyId Algorithm
6,045,234 UART: [idev] --
6,048,769 UART: [ldev] ++
6,049,349 UART: [ldev] CDI.KEYID = 6
6,050,258 UART: [ldev] SUBJECT.KEYID = 5
6,051,423 UART: [ldev] AUTHORITY.KEYID = 7
6,052,658 UART: [ldev] FE.KEYID = 1
6,099,037 UART: [ldev] Erasing FE.KEYID = 1
8,604,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,598 UART: [ldev] --
10,409,517 UART: [fwproc] Wait for Commands...
10,412,704 UART: [fwproc] Recv command 0x46574c44
10,414,804 UART: [fwproc] Recv'd Img size: 114360 bytes
10,489,235 UART: ROM Fatal Error: 0x00B0003A
10,492,331 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,056,341 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,200,697 UART:
2,201,123 UART: Running Caliptra ROM ...
2,202,288 UART:
2,202,456 UART: [state] CFI Enabled
2,203,423 UART: [state] LifecycleState = Unprovisioned
2,205,090 UART: [state] DebugLocked = No
2,206,225 UART: [state] WD Timer not started. Device not locked for debugging
2,208,702 UART: [kat] SHA2-256
2,209,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,382 UART: [kat] ++
2,212,832 UART: [kat] sha1
2,213,346 UART: [kat] SHA2-256
2,214,090 UART: [kat] SHA2-384
2,214,759 UART: [kat] SHA2-512-ACC
2,215,605 UART: [kat] ECC-384
2,947,544 UART: [kat] HMAC-384Kdf
2,970,532 UART: [kat] LMS
3,500,011 UART: [kat] --
3,505,142 UART: [cold-reset] ++
3,506,096 UART: [fht] FHT @ 0x50003400
3,516,001 UART: [idev] ++
3,516,579 UART: [idev] CDI.KEYID = 6
3,517,616 UART: [idev] SUBJECT.KEYID = 7
3,518,721 UART: [idev] UDS.KEYID = 0
3,543,013 UART: [idev] Erasing UDS.KEYID = 0
6,024,967 UART: [idev] Sha1 KeyId Algorithm
6,049,382 UART: [idev] --
6,054,651 UART: [ldev] ++
6,055,236 UART: [ldev] CDI.KEYID = 6
6,056,147 UART: [ldev] SUBJECT.KEYID = 5
6,057,313 UART: [ldev] AUTHORITY.KEYID = 7
6,058,551 UART: [ldev] FE.KEYID = 1
6,099,175 UART: [ldev] Erasing FE.KEYID = 1
8,601,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,863 UART: [ldev] --
10,412,035 UART: [fwproc] Wait for Commands...
10,413,545 UART: [fwproc] Recv command 0x46574c44
10,415,595 UART: [fwproc] Recv'd Img size: 114360 bytes
14,989,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,067,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,136,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,453,950 >>> mbox cmd response: success
15,457,897 UART: [afmc] ++
15,458,493 UART: [afmc] CDI.KEYID = 6
15,459,419 UART: [afmc] SUBJECT.KEYID = 7
15,460,582 UART: [afmc] AUTHORITY.KEYID = 5
18,002,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,745,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,747,544 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,763,530 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,779,526 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,795,377 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,818,290 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.35s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,063,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,296,490 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,053,524 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,297,515 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,056,273 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,281,151 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,062,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,276,006 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,060,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,283,876 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,067,248 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,272,116 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,056,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,281,355 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,057,207 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,301,063 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,078,266 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,287,328 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,064,309 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,291,418 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,055,422 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,298,974 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,057,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,262,035 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,053,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,255,685 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,055,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,296,558 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,060,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,256,576 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,052,316 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,257,744 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,055,153 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,269,487 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
2,055,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,274,512 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
2,058,793 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,008,939 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.00s
Truncated 76844 bytes from beginning
0,617,053 UART: [fwproc] Recv'd Img size: 114360 bytes
10,690,440 UART: ROM Fatal Error: 0x00B0003A
10,693,516 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,060,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,204,667 UART:
2,205,059 UART: Running Caliptra ROM ...
2,206,231 UART:
2,206,424 UART: [state] CFI Enabled
2,207,386 UART: [state] LifecycleState = Unprovisioned
2,209,051 UART: [state] DebugLocked = No
2,210,164 UART: [state] WD Timer not started. Device not locked for debugging
2,212,862 UART: [kat] SHA2-256
2,213,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,571 UART: [kat] ++
2,217,025 UART: [kat] sha1
2,217,540 UART: [kat] SHA2-256
2,218,281 UART: [kat] SHA2-384
2,218,946 UART: [kat] SHA2-512-ACC
2,219,825 UART: [kat] ECC-384
3,279,977 UART: [kat] HMAC-384Kdf
3,292,570 UART: [kat] LMS
3,822,058 UART: [kat] --
3,826,129 UART: [cold-reset] ++
3,828,294 UART: [fht] FHT @ 0x50003400
3,839,810 UART: [idev] ++
3,840,382 UART: [idev] CDI.KEYID = 6
3,841,398 UART: [idev] SUBJECT.KEYID = 7
3,842,501 UART: [idev] UDS.KEYID = 0
3,860,309 UART: [idev] Erasing UDS.KEYID = 0
6,315,756 UART: [idev] Sha1 KeyId Algorithm
6,339,088 UART: [idev] --
6,341,630 UART: [ldev] ++
6,342,195 UART: [ldev] CDI.KEYID = 6
6,343,106 UART: [ldev] SUBJECT.KEYID = 5
6,344,324 UART: [ldev] AUTHORITY.KEYID = 7
6,345,553 UART: [ldev] FE.KEYID = 1
6,355,978 UART: [ldev] Erasing FE.KEYID = 1
8,830,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,950 UART: [ldev] --
10,625,021 UART: [fwproc] Wait for Commands...
10,628,156 UART: [fwproc] Recv command 0x46574c44
10,630,193 UART: [fwproc] Recv'd Img size: 114360 bytes
10,707,140 UART: ROM Fatal Error: 0x00B0003A
10,710,282 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,056,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,201,472 UART:
2,201,870 UART: Running Caliptra ROM ...
2,202,955 UART:
2,203,111 UART: [state] CFI Enabled
2,204,073 UART: [state] LifecycleState = Unprovisioned
2,205,736 UART: [state] DebugLocked = No
2,206,760 UART: [state] WD Timer not started. Device not locked for debugging
2,209,231 UART: [kat] SHA2-256
2,209,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,897 UART: [kat] ++
2,213,345 UART: [kat] sha1
2,213,855 UART: [kat] SHA2-256
2,214,515 UART: [kat] SHA2-384
2,215,173 UART: [kat] SHA2-512-ACC
2,215,976 UART: [kat] ECC-384
3,286,927 UART: [kat] HMAC-384Kdf
3,299,867 UART: [kat] LMS
3,829,343 UART: [kat] --
3,833,111 UART: [cold-reset] ++
3,834,911 UART: [fht] FHT @ 0x50003400
3,846,383 UART: [idev] ++
3,846,944 UART: [idev] CDI.KEYID = 6
3,847,955 UART: [idev] SUBJECT.KEYID = 7
3,849,052 UART: [idev] UDS.KEYID = 0
3,866,275 UART: [idev] Erasing UDS.KEYID = 0
6,324,525 UART: [idev] Sha1 KeyId Algorithm
6,348,014 UART: [idev] --
6,352,490 UART: [ldev] ++
6,353,056 UART: [ldev] CDI.KEYID = 6
6,353,995 UART: [ldev] SUBJECT.KEYID = 5
6,355,244 UART: [ldev] AUTHORITY.KEYID = 7
6,356,470 UART: [ldev] FE.KEYID = 1
6,367,069 UART: [ldev] Erasing FE.KEYID = 1
8,838,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,913 UART: [ldev] --
10,630,385 UART: [fwproc] Wait for Commands...
10,633,130 UART: [fwproc] Recv command 0x46574c44
10,635,268 UART: [fwproc] Recv'd Img size: 114360 bytes
10,717,289 UART: ROM Fatal Error: 0x00B0003A
10,720,422 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,057,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,201,990 UART:
2,202,409 UART: Running Caliptra ROM ...
2,203,579 UART:
2,203,755 UART: [state] CFI Enabled
2,204,715 UART: [state] LifecycleState = Unprovisioned
2,206,368 UART: [state] DebugLocked = No
2,207,476 UART: [state] WD Timer not started. Device not locked for debugging
2,209,943 UART: [kat] SHA2-256
2,210,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,622 UART: [kat] ++
2,214,075 UART: [kat] sha1
2,214,614 UART: [kat] SHA2-256
2,215,356 UART: [kat] SHA2-384
2,216,023 UART: [kat] SHA2-512-ACC
2,216,908 UART: [kat] ECC-384
3,277,944 UART: [kat] HMAC-384Kdf
3,291,267 UART: [kat] LMS
3,820,782 UART: [kat] --
3,825,261 UART: [cold-reset] ++
3,826,102 UART: [fht] FHT @ 0x50003400
3,836,271 UART: [idev] ++
3,836,837 UART: [idev] CDI.KEYID = 6
3,837,773 UART: [idev] SUBJECT.KEYID = 7
3,838,981 UART: [idev] UDS.KEYID = 0
3,855,413 UART: [idev] Erasing UDS.KEYID = 0
6,311,395 UART: [idev] Sha1 KeyId Algorithm
6,333,220 UART: [idev] --
6,337,399 UART: [ldev] ++
6,338,166 UART: [ldev] CDI.KEYID = 6
6,339,058 UART: [ldev] SUBJECT.KEYID = 5
6,340,162 UART: [ldev] AUTHORITY.KEYID = 7
6,341,335 UART: [ldev] FE.KEYID = 1
6,351,436 UART: [ldev] Erasing FE.KEYID = 1
8,827,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,595 UART: [ldev] --
10,618,539 UART: [fwproc] Wait for Commands...
10,621,394 UART: [fwproc] Recv command 0x46574c44
10,623,483 UART: [fwproc] Recv'd Img size: 114360 bytes
10,699,771 UART: ROM Fatal Error: 0x00B0003A
10,702,878 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,057,788 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,202,082 UART:
2,202,480 UART: Running Caliptra ROM ...
2,203,649 UART:
2,203,816 UART: [state] CFI Enabled
2,204,688 UART: [state] LifecycleState = Unprovisioned
2,206,347 UART: [state] DebugLocked = No
2,207,587 UART: [state] WD Timer not started. Device not locked for debugging
2,210,110 UART: [kat] SHA2-256
2,210,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,803 UART: [kat] ++
2,214,253 UART: [kat] sha1
2,214,797 UART: [kat] SHA2-256
2,215,457 UART: [kat] SHA2-384
2,216,114 UART: [kat] SHA2-512-ACC
2,216,998 UART: [kat] ECC-384
3,282,637 UART: [kat] HMAC-384Kdf
3,294,759 UART: [kat] LMS
3,824,249 UART: [kat] --
3,828,452 UART: [cold-reset] ++
3,829,997 UART: [fht] FHT @ 0x50003400
3,841,031 UART: [idev] ++
3,841,593 UART: [idev] CDI.KEYID = 6
3,842,605 UART: [idev] SUBJECT.KEYID = 7
3,843,788 UART: [idev] UDS.KEYID = 0
3,859,117 UART: [idev] Erasing UDS.KEYID = 0
6,311,965 UART: [idev] Sha1 KeyId Algorithm
6,334,804 UART: [idev] --
6,337,599 UART: [ldev] ++
6,338,168 UART: [ldev] CDI.KEYID = 6
6,339,073 UART: [ldev] SUBJECT.KEYID = 5
6,340,239 UART: [ldev] AUTHORITY.KEYID = 7
6,341,524 UART: [ldev] FE.KEYID = 1
6,352,821 UART: [ldev] Erasing FE.KEYID = 1
8,828,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,940 UART: [ldev] --
10,617,867 UART: [fwproc] Wait for Commands...
10,619,491 UART: [fwproc] Recv command 0x46574c44
10,621,540 UART: [fwproc] Recv'd Img size: 114360 bytes
15,164,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,240,859 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,309,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,627,666 >>> mbox cmd response: success
15,632,562 UART: [afmc] ++
15,633,162 UART: [afmc] CDI.KEYID = 6
15,634,072 UART: [afmc] SUBJECT.KEYID = 7
15,635,290 UART: [afmc] AUTHORITY.KEYID = 5
18,138,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,861,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,863,286 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,879,288 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,895,274 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,911,124 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,934,102 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.69s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,058,657 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,468,291 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
2,059,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,487,400 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,056,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,479,224 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,056,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,479,855 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,057,311 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,489,199 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,056,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,484,662 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,056,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,477,219 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,055,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,472,380 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,064,391 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,484,167 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,057,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,489,619 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,055,091 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,488,454 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
2,055,498 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,482,990 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,055,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,482,045 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,057,346 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,476,461 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,063,881 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,483,385 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,055,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,480,148 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,055,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,481,525 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,056,612 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,484,901 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,055,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,270,743 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 74764 bytes from beginning
1,273,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,488 UART: [fwproc] Wait for Commands...
1,282,287 UART: [fwproc] Recv command 0x46574c44
1,283,020 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,212 UART: ROM Fatal Error: 0x00B0003A
1,310,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
86,007 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,827 UART: [idev] Sha1 KeyId Algorithm
1,208,709 UART: [idev] --
1,209,702 UART: [ldev] ++
1,209,870 UART: [ldev] CDI.KEYID = 6
1,210,234 UART: [ldev] SUBJECT.KEYID = 5
1,210,661 UART: [ldev] AUTHORITY.KEYID = 7
1,211,124 UART: [ldev] FE.KEYID = 1
1,216,126 UART: [ldev] Erasing FE.KEYID = 1
1,242,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,670 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,659 UART: [fwproc] Recv command 0x46574c44
1,283,392 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,522 UART: ROM Fatal Error: 0x00B0003A
1,310,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,508 UART: [kat] LMS
1,168,820 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,221 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,419 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,214,744 UART: [ldev] Erasing FE.KEYID = 1
1,240,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,594 UART: [ldev] --
1,279,880 UART: [fwproc] Wait for Commands...
1,280,589 UART: [fwproc] Recv command 0x46574c44
1,281,322 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,340 UART: ROM Fatal Error: 0x00B0003A
1,308,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,182,335 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,364 UART: [ldev] ++
1,209,532 UART: [ldev] CDI.KEYID = 6
1,209,896 UART: [ldev] SUBJECT.KEYID = 5
1,210,323 UART: [ldev] AUTHORITY.KEYID = 7
1,210,786 UART: [ldev] FE.KEYID = 1
1,215,836 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,830 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,283,047 UART: [fwproc] Recv command 0x46574c44
1,283,780 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,184 UART: ROM Fatal Error: 0x00B0003A
1,310,345 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,136 UART: [kat] SHA2-256
890,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,815 UART: [kat] ++
894,967 UART: [kat] sha1
899,121 UART: [kat] SHA2-256
901,061 UART: [kat] SHA2-384
903,760 UART: [kat] SHA2-512-ACC
905,661 UART: [kat] ECC-384
915,386 UART: [kat] HMAC-384Kdf
919,948 UART: [kat] LMS
1,168,260 UART: [kat] --
1,168,975 UART: [cold-reset] ++
1,169,447 UART: [fht] FHT @ 0x50003400
1,172,039 UART: [idev] ++
1,172,207 UART: [idev] CDI.KEYID = 6
1,172,568 UART: [idev] SUBJECT.KEYID = 7
1,172,993 UART: [idev] UDS.KEYID = 0
1,181,247 UART: [idev] Erasing UDS.KEYID = 0
1,197,989 UART: [idev] Sha1 KeyId Algorithm
1,206,859 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,470 UART: [ldev] Erasing FE.KEYID = 1
1,240,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,386 UART: [ldev] --
1,279,844 UART: [fwproc] Wait for Commands...
1,280,417 UART: [fwproc] Recv command 0x46574c44
1,281,150 UART: [fwproc] Recv'd Img size: 114360 bytes
3,116,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,144,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,309,736 >>> mbox cmd response: success
3,310,751 UART: [afmc] ++
3,310,919 UART: [afmc] CDI.KEYID = 6
3,311,282 UART: [afmc] SUBJECT.KEYID = 7
3,311,708 UART: [afmc] AUTHORITY.KEYID = 5
3,347,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,567 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,370,275 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,376,160 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,381,862 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,389,596 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 19.18s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,155,356 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.96s
Truncated 74764 bytes from beginning
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,765 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,923 UART: ROM Fatal Error: 0x00B0003A
1,311,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,788 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,450 UART: [idev] --
1,209,681 UART: [ldev] ++
1,209,849 UART: [ldev] CDI.KEYID = 6
1,210,213 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,273 UART: [fwproc] Wait for Commands...
1,282,902 UART: [fwproc] Recv command 0x46574c44
1,283,635 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,017 UART: ROM Fatal Error: 0x00B0003A
1,310,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,629 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,170,922 UART: [cold-reset] ++
1,171,288 UART: [fht] FHT @ 0x50003400
1,173,978 UART: [idev] ++
1,174,146 UART: [idev] CDI.KEYID = 6
1,174,507 UART: [idev] SUBJECT.KEYID = 7
1,174,932 UART: [idev] UDS.KEYID = 0
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,058 UART: [idev] Sha1 KeyId Algorithm
1,208,952 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,499 UART: [fwproc] Wait for Commands...
1,282,210 UART: [fwproc] Recv command 0x46574c44
1,282,943 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,925 UART: ROM Fatal Error: 0x00B0003A
1,310,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,678 UART: [cold-reset] ++
1,171,152 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,004 UART: [idev] Sha1 KeyId Algorithm
1,208,896 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,447 UART: ROM Fatal Error: 0x00B0003A
1,310,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,689 UART: [kat] LMS
1,170,001 UART: [kat] --
1,170,938 UART: [cold-reset] ++
1,171,370 UART: [fht] FHT @ 0x50003400
1,174,014 UART: [idev] ++
1,174,182 UART: [idev] CDI.KEYID = 6
1,174,543 UART: [idev] SUBJECT.KEYID = 7
1,174,968 UART: [idev] UDS.KEYID = 0
1,183,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,026 UART: [idev] Sha1 KeyId Algorithm
1,208,842 UART: [idev] --
1,209,899 UART: [ldev] ++
1,210,067 UART: [ldev] CDI.KEYID = 6
1,210,431 UART: [ldev] SUBJECT.KEYID = 5
1,210,858 UART: [ldev] AUTHORITY.KEYID = 7
1,211,321 UART: [ldev] FE.KEYID = 1
1,216,667 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,403 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,943 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,153,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,319,012 >>> mbox cmd response: success
3,320,271 UART: [afmc] ++
3,320,439 UART: [afmc] CDI.KEYID = 6
3,320,802 UART: [afmc] SUBJECT.KEYID = 7
3,321,228 UART: [afmc] AUTHORITY.KEYID = 5
3,356,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,779 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,379,487 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,385,372 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,391,074 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,398,970 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 19.05s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,164,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,164,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,163,417 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.53s
Truncated 74764 bytes from beginning
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,366 UART: [fwproc] Wait for Commands...
1,281,947 UART: [fwproc] Recv command 0x46574c44
1,282,680 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,202 UART: ROM Fatal Error: 0x00B0003A
1,310,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,418 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,170,277 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,122 UART: [ldev] --
1,280,472 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,756 UART: ROM Fatal Error: 0x00B0003A
1,308,917 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,434 UART: [state] LifecycleState = Unprovisioned
85,089 UART: [state] DebugLocked = No
85,577 UART: [state] WD Timer not started. Device not locked for debugging
86,840 UART: [kat] SHA2-256
890,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,519 UART: [kat] ++
894,671 UART: [kat] sha1
898,719 UART: [kat] SHA2-256
900,659 UART: [kat] SHA2-384
903,462 UART: [kat] SHA2-512-ACC
905,363 UART: [kat] ECC-384
914,918 UART: [kat] HMAC-384Kdf
919,528 UART: [kat] LMS
1,167,840 UART: [kat] --
1,168,721 UART: [cold-reset] ++
1,169,145 UART: [fht] FHT @ 0x50003400
1,171,773 UART: [idev] ++
1,171,941 UART: [idev] CDI.KEYID = 6
1,172,302 UART: [idev] SUBJECT.KEYID = 7
1,172,727 UART: [idev] UDS.KEYID = 0
1,181,055 UART: [idev] Erasing UDS.KEYID = 0
1,197,725 UART: [idev] Sha1 KeyId Algorithm
1,206,495 UART: [idev] --
1,207,688 UART: [ldev] ++
1,207,856 UART: [ldev] CDI.KEYID = 6
1,208,220 UART: [ldev] SUBJECT.KEYID = 5
1,208,647 UART: [ldev] AUTHORITY.KEYID = 7
1,209,110 UART: [ldev] FE.KEYID = 1
1,214,458 UART: [ldev] Erasing FE.KEYID = 1
1,240,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,560 UART: [ldev] --
1,280,072 UART: [fwproc] Wait for Commands...
1,280,873 UART: [fwproc] Recv command 0x46574c44
1,281,606 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,082 UART: ROM Fatal Error: 0x00B0003A
1,309,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
890,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,087 UART: [kat] ++
895,239 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,172,837 UART: [idev] ++
1,173,005 UART: [idev] CDI.KEYID = 6
1,173,366 UART: [idev] SUBJECT.KEYID = 7
1,173,791 UART: [idev] UDS.KEYID = 0
1,181,285 UART: [idev] Erasing UDS.KEYID = 0
1,198,363 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,487 UART: [fwproc] Recv command 0x46574c44
1,282,220 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,806 UART: ROM Fatal Error: 0x00B0003A
1,308,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,988 UART: [kat] LMS
1,169,300 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,182,343 UART: [idev] Erasing UDS.KEYID = 0
1,199,451 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,486 UART: [ldev] ++
1,209,654 UART: [ldev] CDI.KEYID = 6
1,210,018 UART: [ldev] SUBJECT.KEYID = 5
1,210,445 UART: [ldev] AUTHORITY.KEYID = 7
1,210,908 UART: [ldev] FE.KEYID = 1
1,216,196 UART: [ldev] Erasing FE.KEYID = 1
1,242,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,276 UART: [ldev] --
1,282,598 UART: [fwproc] Wait for Commands...
1,283,215 UART: [fwproc] Recv command 0x46574c44
1,283,948 UART: [fwproc] Recv'd Img size: 114360 bytes
3,128,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,156,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,026 >>> mbox cmd response: success
3,323,255 UART: [afmc] ++
3,323,423 UART: [afmc] CDI.KEYID = 6
3,323,786 UART: [afmc] SUBJECT.KEYID = 7
3,324,212 UART: [afmc] AUTHORITY.KEYID = 5
3,358,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,445 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,382,153 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,388,038 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,393,740 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,401,438 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.40s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,167,212 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.54s
Truncated 74764 bytes from beginning
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,237 UART: [fwproc] Wait for Commands...
1,282,012 UART: [fwproc] Recv command 0x46574c44
1,282,745 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,181 UART: ROM Fatal Error: 0x00B0003A
1,309,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,658 UART: [idev] ++
1,173,826 UART: [idev] CDI.KEYID = 6
1,174,187 UART: [idev] SUBJECT.KEYID = 7
1,174,612 UART: [idev] UDS.KEYID = 0
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,339 UART: [ldev] --
1,281,749 UART: [fwproc] Wait for Commands...
1,282,544 UART: [fwproc] Recv command 0x46574c44
1,283,277 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,223 UART: ROM Fatal Error: 0x00B0003A
1,310,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,198,996 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,907 UART: [ldev] ++
1,209,075 UART: [ldev] CDI.KEYID = 6
1,209,439 UART: [ldev] SUBJECT.KEYID = 5
1,209,866 UART: [ldev] AUTHORITY.KEYID = 7
1,210,329 UART: [ldev] FE.KEYID = 1
1,215,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,434 UART: [fwproc] Recv command 0x46574c44
1,283,167 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,883 UART: ROM Fatal Error: 0x00B0003A
1,310,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,281,957 UART: [fwproc] Wait for Commands...
1,282,672 UART: [fwproc] Recv command 0x46574c44
1,283,405 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,245 UART: ROM Fatal Error: 0x00B0003A
1,310,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,154 UART: [idev] --
1,209,005 UART: [ldev] ++
1,209,173 UART: [ldev] CDI.KEYID = 6
1,209,537 UART: [ldev] SUBJECT.KEYID = 5
1,209,964 UART: [ldev] AUTHORITY.KEYID = 7
1,210,427 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,241,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,317 UART: [ldev] --
1,280,599 UART: [fwproc] Wait for Commands...
1,281,296 UART: [fwproc] Recv command 0x46574c44
1,282,029 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,150,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,059 >>> mbox cmd response: success
3,317,158 UART: [afmc] ++
3,317,326 UART: [afmc] CDI.KEYID = 6
3,317,689 UART: [afmc] SUBJECT.KEYID = 7
3,318,115 UART: [afmc] AUTHORITY.KEYID = 5
3,353,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,208 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,376,916 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,382,801 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,388,503 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,396,433 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.65s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,467 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,164,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,154,410 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.63s
Truncated 74764 bytes from beginning
1,271,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,132 UART: [ldev] --
1,279,432 UART: [fwproc] Wait for Commands...
1,280,135 UART: [fwproc] Recv command 0x46574c44
1,280,868 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,504 UART: ROM Fatal Error: 0x00B0003A
1,307,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,343 UART: [cold-reset] ++
1,169,789 UART: [fht] FHT @ 0x50003400
1,172,289 UART: [idev] ++
1,172,457 UART: [idev] CDI.KEYID = 6
1,172,818 UART: [idev] SUBJECT.KEYID = 7
1,173,243 UART: [idev] UDS.KEYID = 0
1,180,943 UART: [idev] Erasing UDS.KEYID = 0
1,198,069 UART: [idev] Sha1 KeyId Algorithm
1,206,821 UART: [idev] --
1,207,874 UART: [ldev] ++
1,208,042 UART: [ldev] CDI.KEYID = 6
1,208,406 UART: [ldev] SUBJECT.KEYID = 5
1,208,833 UART: [ldev] AUTHORITY.KEYID = 7
1,209,296 UART: [ldev] FE.KEYID = 1
1,214,424 UART: [ldev] Erasing FE.KEYID = 1
1,240,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,556 UART: [ldev] --
1,280,028 UART: [fwproc] Wait for Commands...
1,280,721 UART: [fwproc] Recv command 0x46574c44
1,281,454 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,516 UART: ROM Fatal Error: 0x00B0003A
1,307,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,291 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,635 UART: [fwproc] Recv command 0x46574c44
1,282,368 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,882 UART: ROM Fatal Error: 0x00B0003A
1,309,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,241 UART: [kat] SHA2-256
901,181 UART: [kat] SHA2-384
903,912 UART: [kat] SHA2-512-ACC
905,813 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,793 UART: [idev] ++
1,172,961 UART: [idev] CDI.KEYID = 6
1,173,322 UART: [idev] SUBJECT.KEYID = 7
1,173,747 UART: [idev] UDS.KEYID = 0
1,181,891 UART: [idev] Erasing UDS.KEYID = 0
1,198,329 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,364 UART: [fwproc] Wait for Commands...
1,281,031 UART: [fwproc] Recv command 0x46574c44
1,281,764 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,560 UART: ROM Fatal Error: 0x00B0003A
1,308,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,181,393 UART: [idev] Erasing UDS.KEYID = 0
1,198,311 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,336 UART: [ldev] ++
1,208,504 UART: [ldev] CDI.KEYID = 6
1,208,868 UART: [ldev] SUBJECT.KEYID = 5
1,209,295 UART: [ldev] AUTHORITY.KEYID = 7
1,209,758 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,346 UART: [ldev] --
1,280,802 UART: [fwproc] Wait for Commands...
1,281,579 UART: [fwproc] Recv command 0x46574c44
1,282,312 UART: [fwproc] Recv'd Img size: 114360 bytes
3,128,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,155,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,320,908 >>> mbox cmd response: success
3,322,001 UART: [afmc] ++
3,322,169 UART: [afmc] CDI.KEYID = 6
3,322,532 UART: [afmc] SUBJECT.KEYID = 7
3,322,958 UART: [afmc] AUTHORITY.KEYID = 5
3,358,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,973 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,381,681 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,387,566 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,393,268 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,401,188 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.64s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,978 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,800 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,727 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.52s
Truncated 74764 bytes from beginning
1,273,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x46574c44
1,283,009 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,717 UART: ROM Fatal Error: 0x00B0003A
1,309,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,207,958 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,535 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,487 UART: ROM Fatal Error: 0x00B0003A
1,310,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,128 UART: [kat] SHA2-256
902,068 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,198,772 UART: [idev] Sha1 KeyId Algorithm
1,207,572 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,469 UART: [ldev] Erasing FE.KEYID = 1
1,241,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,281,994 UART: [fwproc] Recv command 0x46574c44
1,282,727 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,795 UART: ROM Fatal Error: 0x00B0003A
1,309,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,013 UART: [kat] SHA2-512-ACC
905,914 UART: [kat] ECC-384
915,717 UART: [kat] HMAC-384Kdf
920,395 UART: [kat] LMS
1,168,707 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,181,414 UART: [idev] Erasing UDS.KEYID = 0
1,198,636 UART: [idev] Sha1 KeyId Algorithm
1,207,518 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,241,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,395 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,923 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,183 UART: ROM Fatal Error: 0x00B0003A
1,309,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,112 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,023 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,158,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,323,351 >>> mbox cmd response: success
3,324,480 UART: [afmc] ++
3,324,648 UART: [afmc] CDI.KEYID = 6
3,325,011 UART: [afmc] SUBJECT.KEYID = 7
3,325,437 UART: [afmc] AUTHORITY.KEYID = 5
3,361,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,964 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,383,672 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,389,557 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,395,259 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,403,195 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.67s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,164,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,178,488 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
5,771 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,199 UART:
192,580 UART: Running Caliptra ROM ...
193,713 UART:
193,862 UART: [state] CFI Enabled
262,053 UART: [state] LifecycleState = Manufacturing
264,429 UART: [state] DebugLocked = No
266,088 UART: [state] WD Timer not started. Device not locked for debugging
271,232 UART: [kat] SHA2-256
453,143 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,690 UART: [kat] ++
465,156 UART: [kat] sha1
475,982 UART: [kat] SHA2-256
479,039 UART: [kat] SHA2-384
483,179 UART: [kat] SHA2-512-ACC
485,793 UART: [kat] ECC-384
3,774,744 UART: [kat] HMAC-384Kdf
3,800,851 UART: [kat] LMS
4,874,032 UART: [kat] --
4,876,405 UART: [cold-reset] ++
4,878,341 UART: [fht] FHT @ 0x50003400
4,888,292 UART: [idev] ++
4,888,977 UART: [idev] CDI.KEYID = 6
4,890,152 UART: [idev] SUBJECT.KEYID = 7
4,891,304 UART: [idev] UDS.KEYID = 0
4,906,997 UART: [idev] Erasing UDS.KEYID = 0
8,218,010 UART: [idev] Sha1 KeyId Algorithm
8,239,164 UART: [idev] --
8,243,375 UART: [ldev] ++
8,243,945 UART: [ldev] CDI.KEYID = 6
8,245,179 UART: [ldev] SUBJECT.KEYID = 5
8,246,337 UART: [ldev] AUTHORITY.KEYID = 7
8,247,562 UART: [ldev] FE.KEYID = 1
8,289,051 UART: [ldev] Erasing FE.KEYID = 1
11,623,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,934,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,950,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,966,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,982,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,001,311 UART: [ldev] --
14,006,364 UART: [fwproc] Wait for Commands...
14,008,086 UART: [fwproc] Recv command 0x46574c44
14,010,414 UART: [fwproc] Recv'd Img size: 114036 bytes
14,103,738 UART: ROM Fatal Error: 0x000B0005
14,107,103 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
5,849 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,900,429 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
6,409 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,410 UART:
192,798 UART: Running Caliptra ROM ...
193,926 UART:
603,580 UART: [state] CFI Enabled
613,407 UART: [state] LifecycleState = Manufacturing
615,750 UART: [state] DebugLocked = No
616,963 UART: [state] WD Timer not started. Device not locked for debugging
619,920 UART: [kat] SHA2-256
801,872 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
813,416 UART: [kat] ++
813,996 UART: [kat] sha1
824,569 UART: [kat] SHA2-256
827,566 UART: [kat] SHA2-384
832,561 UART: [kat] SHA2-512-ACC
835,175 UART: [kat] ECC-384
4,088,734 UART: [kat] HMAC-384Kdf
4,099,847 UART: [kat] LMS
5,173,030 UART: [kat] --
5,176,736 UART: [cold-reset] ++
5,178,729 UART: [fht] FHT @ 0x50003400
5,189,113 UART: [idev] ++
5,189,838 UART: [idev] CDI.KEYID = 6
5,190,939 UART: [idev] SUBJECT.KEYID = 7
5,192,471 UART: [idev] UDS.KEYID = 0
5,209,712 UART: [idev] Erasing UDS.KEYID = 0
8,482,864 UART: [idev] Sha1 KeyId Algorithm
8,503,884 UART: [idev] --
8,507,300 UART: [ldev] ++
8,507,866 UART: [ldev] CDI.KEYID = 6
8,509,025 UART: [ldev] SUBJECT.KEYID = 5
8,510,562 UART: [ldev] AUTHORITY.KEYID = 7
8,512,037 UART: [ldev] FE.KEYID = 1
8,525,117 UART: [ldev] Erasing FE.KEYID = 1
11,814,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,106,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,122,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,138,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,154,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,174,795 UART: [ldev] --
14,180,003 UART: [fwproc] Wait for Commands...
14,181,886 UART: [fwproc] Recv command 0x46574c44
14,184,198 UART: [fwproc] Recv'd Img size: 114036 bytes
14,273,930 UART: ROM Fatal Error: 0x000B0005
14,277,310 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
6,283 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,105,794 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
5,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,005 UART:
192,391 UART: Running Caliptra ROM ...
193,465 UART:
193,611 UART: [state] CFI Enabled
261,495 UART: [state] LifecycleState = Manufacturing
263,357 UART: [state] DebugLocked = No
265,536 UART: [state] WD Timer not started. Device not locked for debugging
269,058 UART: [kat] SHA2-256
448,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,716 UART: [kat] ++
460,156 UART: [kat] sha1
471,513 UART: [kat] SHA2-256
474,575 UART: [kat] SHA2-384
480,658 UART: [kat] SHA2-512-ACC
483,592 UART: [kat] ECC-384
2,945,012 UART: [kat] HMAC-384Kdf
2,967,620 UART: [kat] LMS
3,497,072 UART: [kat] --
3,500,609 UART: [cold-reset] ++
3,503,192 UART: [fht] FHT @ 0x50003400
3,514,232 UART: [idev] ++
3,514,793 UART: [idev] CDI.KEYID = 6
3,515,736 UART: [idev] SUBJECT.KEYID = 7
3,516,901 UART: [idev] UDS.KEYID = 0
3,540,491 UART: [idev] Erasing UDS.KEYID = 0
6,025,161 UART: [idev] Sha1 KeyId Algorithm
6,047,692 UART: [idev] --
6,050,989 UART: [ldev] ++
6,051,560 UART: [ldev] CDI.KEYID = 6
6,052,445 UART: [ldev] SUBJECT.KEYID = 5
6,053,662 UART: [ldev] AUTHORITY.KEYID = 7
6,054,899 UART: [ldev] FE.KEYID = 1
6,095,200 UART: [ldev] Erasing FE.KEYID = 1
8,602,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,334 UART: [ldev] --
10,407,483 UART: [fwproc] Wait for Commands...
10,410,077 UART: [fwproc] Recv command 0x46574c44
10,412,183 UART: [fwproc] Recv'd Img size: 114360 bytes
10,508,981 UART: ROM Fatal Error: 0x000B0005
10,512,078 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
5,900 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,240 UART:
192,646 UART: Running Caliptra ROM ...
193,813 UART:
193,965 UART: [state] CFI Enabled
259,066 UART: [state] LifecycleState = Manufacturing
260,972 UART: [state] DebugLocked = No
262,623 UART: [state] WD Timer not started. Device not locked for debugging
265,978 UART: [kat] SHA2-256
445,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,656 UART: [kat] ++
457,189 UART: [kat] sha1
467,373 UART: [kat] SHA2-256
470,370 UART: [kat] SHA2-384
476,570 UART: [kat] SHA2-512-ACC
479,501 UART: [kat] ECC-384
2,924,212 UART: [kat] HMAC-384Kdf
2,946,430 UART: [kat] LMS
3,475,870 UART: [kat] --
3,478,726 UART: [cold-reset] ++
3,479,688 UART: [fht] FHT @ 0x50003400
3,490,010 UART: [idev] ++
3,490,669 UART: [idev] CDI.KEYID = 6
3,491,602 UART: [idev] SUBJECT.KEYID = 7
3,492,785 UART: [idev] UDS.KEYID = 0
3,520,838 UART: [idev] Erasing UDS.KEYID = 0
6,003,013 UART: [idev] Sha1 KeyId Algorithm
6,025,765 UART: [idev] --
6,029,437 UART: [ldev] ++
6,030,011 UART: [ldev] CDI.KEYID = 6
6,030,901 UART: [ldev] SUBJECT.KEYID = 5
6,032,119 UART: [ldev] AUTHORITY.KEYID = 7
6,033,353 UART: [ldev] FE.KEYID = 1
6,076,009 UART: [ldev] Erasing FE.KEYID = 1
8,580,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,501 UART: [ldev] --
10,391,023 UART: [fwproc] Wait for Commands...
10,394,053 UART: [fwproc] Recv command 0x46574c44
10,396,097 UART: [fwproc] Recv'd Img size: 114360 bytes
10,484,269 UART: ROM Fatal Error: 0x000B0005
10,487,419 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
5,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,294,190 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
6,438 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,509 UART:
192,918 UART: Running Caliptra ROM ...
194,081 UART:
603,821 UART: [state] CFI Enabled
617,133 UART: [state] LifecycleState = Manufacturing
619,011 UART: [state] DebugLocked = No
620,900 UART: [state] WD Timer not started. Device not locked for debugging
624,086 UART: [kat] SHA2-256
803,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,785 UART: [kat] ++
815,283 UART: [kat] sha1
827,019 UART: [kat] SHA2-256
830,021 UART: [kat] SHA2-384
836,036 UART: [kat] SHA2-512-ACC
839,029 UART: [kat] ECC-384
3,283,002 UART: [kat] HMAC-384Kdf
3,295,294 UART: [kat] LMS
3,824,739 UART: [kat] --
3,830,459 UART: [cold-reset] ++
3,832,447 UART: [fht] FHT @ 0x50003400
3,843,280 UART: [idev] ++
3,843,840 UART: [idev] CDI.KEYID = 6
3,844,771 UART: [idev] SUBJECT.KEYID = 7
3,845,979 UART: [idev] UDS.KEYID = 0
3,864,356 UART: [idev] Erasing UDS.KEYID = 0
6,321,697 UART: [idev] Sha1 KeyId Algorithm
6,345,191 UART: [idev] --
6,349,398 UART: [ldev] ++
6,349,999 UART: [ldev] CDI.KEYID = 6
6,350,914 UART: [ldev] SUBJECT.KEYID = 5
6,352,070 UART: [ldev] AUTHORITY.KEYID = 7
6,353,302 UART: [ldev] FE.KEYID = 1
6,363,404 UART: [ldev] Erasing FE.KEYID = 1
8,833,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,163 UART: [ldev] --
10,624,371 UART: [fwproc] Wait for Commands...
10,625,925 UART: [fwproc] Recv command 0x46574c44
10,628,015 UART: [fwproc] Recv'd Img size: 114360 bytes
10,717,039 UART: ROM Fatal Error: 0x000B0005
10,720,132 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
6,527 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,502,177 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Manufacturing
85,685 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,182,395 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,219 UART: [idev] --
1,209,416 UART: [ldev] ++
1,209,584 UART: [ldev] CDI.KEYID = 6
1,209,948 UART: [ldev] SUBJECT.KEYID = 5
1,210,375 UART: [ldev] AUTHORITY.KEYID = 7
1,210,838 UART: [ldev] FE.KEYID = 1
1,215,878 UART: [ldev] Erasing FE.KEYID = 1
1,241,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,844 UART: [ldev] --
1,281,146 UART: [fwproc] Wait for Commands...
1,281,895 UART: [fwproc] Recv command 0x46574c44
1,282,628 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,225 UART: ROM Fatal Error: 0x000B0005
1,328,382 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,713 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Manufacturing
85,766 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,622 UART: [kat] SHA2-256
901,562 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,208,296 UART: [idev] --
1,209,199 UART: [ldev] ++
1,209,367 UART: [ldev] CDI.KEYID = 6
1,209,731 UART: [ldev] SUBJECT.KEYID = 5
1,210,158 UART: [ldev] AUTHORITY.KEYID = 7
1,210,621 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,031 UART: [ldev] --
1,281,501 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,262 UART: ROM Fatal Error: 0x000B0005
1,328,419 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,912 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Manufacturing
85,297 UART: [state] DebugLocked = No
85,903 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
890,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,829 UART: [kat] ++
894,981 UART: [kat] sha1
899,191 UART: [kat] SHA2-256
901,131 UART: [kat] SHA2-384
903,700 UART: [kat] SHA2-512-ACC
905,601 UART: [kat] ECC-384
914,980 UART: [kat] HMAC-384Kdf
919,588 UART: [kat] LMS
1,167,900 UART: [kat] --
1,168,903 UART: [cold-reset] ++
1,169,401 UART: [fht] FHT @ 0x50003400
1,172,019 UART: [idev] ++
1,172,187 UART: [idev] CDI.KEYID = 6
1,172,548 UART: [idev] SUBJECT.KEYID = 7
1,172,973 UART: [idev] UDS.KEYID = 0
1,180,947 UART: [idev] Erasing UDS.KEYID = 0
1,197,965 UART: [idev] Sha1 KeyId Algorithm
1,206,665 UART: [idev] --
1,207,792 UART: [ldev] ++
1,207,960 UART: [ldev] CDI.KEYID = 6
1,208,324 UART: [ldev] SUBJECT.KEYID = 5
1,208,751 UART: [ldev] AUTHORITY.KEYID = 7
1,209,214 UART: [ldev] FE.KEYID = 1
1,214,262 UART: [ldev] Erasing FE.KEYID = 1
1,240,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,564 UART: [ldev] --
1,280,070 UART: [fwproc] Wait for Commands...
1,280,749 UART: [fwproc] Recv command 0x46574c44
1,281,482 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,049 UART: ROM Fatal Error: 0x000B0005
1,327,206 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,047 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Manufacturing
86,078 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,182,096 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,218 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,215,875 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,293 UART: [fwproc] Wait for Commands...
1,283,084 UART: [fwproc] Recv command 0x46574c44
1,283,817 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,694 UART: ROM Fatal Error: 0x000B0005
1,329,851 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,306 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,328 UART: [state] LifecycleState = Manufacturing
84,983 UART: [state] DebugLocked = No
85,707 UART: [state] WD Timer not started. Device not locked for debugging
86,914 UART: [kat] SHA2-256
890,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,593 UART: [kat] ++
894,745 UART: [kat] sha1
898,881 UART: [kat] SHA2-256
900,821 UART: [kat] SHA2-384
903,610 UART: [kat] SHA2-512-ACC
905,511 UART: [kat] ECC-384
915,150 UART: [kat] HMAC-384Kdf
919,748 UART: [kat] LMS
1,168,060 UART: [kat] --
1,169,047 UART: [cold-reset] ++
1,169,595 UART: [fht] FHT @ 0x50003400
1,172,123 UART: [idev] ++
1,172,291 UART: [idev] CDI.KEYID = 6
1,172,652 UART: [idev] SUBJECT.KEYID = 7
1,173,077 UART: [idev] UDS.KEYID = 0
1,180,847 UART: [idev] Erasing UDS.KEYID = 0
1,198,259 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,240,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,066 UART: [ldev] --
1,279,508 UART: [fwproc] Wait for Commands...
1,280,253 UART: [fwproc] Recv command 0x46574c44
1,280,986 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,323 UART: ROM Fatal Error: 0x000B0005
1,326,480 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,185 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Manufacturing
86,054 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,555 UART: [kat] LMS
1,169,867 UART: [kat] --
1,170,772 UART: [cold-reset] ++
1,171,116 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,183,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,702 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,635 UART: [ldev] ++
1,210,803 UART: [ldev] CDI.KEYID = 6
1,211,167 UART: [ldev] SUBJECT.KEYID = 5
1,211,594 UART: [ldev] AUTHORITY.KEYID = 7
1,212,057 UART: [ldev] FE.KEYID = 1
1,217,503 UART: [ldev] Erasing FE.KEYID = 1
1,244,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,173 UART: [ldev] --
1,283,437 UART: [fwproc] Wait for Commands...
1,284,052 UART: [fwproc] Recv command 0x46574c44
1,284,785 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,054 UART: ROM Fatal Error: 0x000B0005
1,330,211 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,662 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
5,746 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,116 UART:
192,508 UART: Running Caliptra ROM ...
193,705 UART:
193,880 UART: [state] CFI Enabled
264,826 UART: [state] LifecycleState = Manufacturing
267,173 UART: [state] DebugLocked = No
269,796 UART: [state] WD Timer not started. Device not locked for debugging
273,632 UART: [kat] SHA2-256
455,553 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,045 UART: [kat] ++
467,637 UART: [kat] sha1
479,762 UART: [kat] SHA2-256
482,763 UART: [kat] SHA2-384
489,531 UART: [kat] SHA2-512-ACC
492,190 UART: [kat] ECC-384
3,780,277 UART: [kat] HMAC-384Kdf
3,804,954 UART: [kat] LMS
4,878,070 UART: [kat] --
4,882,170 UART: [cold-reset] ++
4,884,715 UART: [fht] FHT @ 0x50003400
4,897,416 UART: [idev] ++
4,898,130 UART: [idev] CDI.KEYID = 6
4,899,237 UART: [idev] SUBJECT.KEYID = 7
4,900,452 UART: [idev] UDS.KEYID = 0
4,932,224 UART: [idev] Erasing UDS.KEYID = 0
8,242,942 UART: [idev] Sha1 KeyId Algorithm
8,264,299 UART: [idev] --
8,268,379 UART: [ldev] ++
8,269,010 UART: [ldev] CDI.KEYID = 6
8,270,120 UART: [ldev] SUBJECT.KEYID = 5
8,271,335 UART: [ldev] AUTHORITY.KEYID = 7
8,272,482 UART: [ldev] FE.KEYID = 1
8,321,445 UART: [ldev] Erasing FE.KEYID = 1
11,657,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,058 UART: [ldev] --
14,039,252 UART: [fwproc] Wait for Commands...
14,042,218 UART: [fwproc] Recv command 0x46574c44
14,044,539 UART: [fwproc] Recv'd Img size: 114036 bytes
14,105,335 UART: ROM Fatal Error: 0x000B0003
14,108,702 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
5,391 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,888,740 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
6,450 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,370 UART:
192,768 UART: Running Caliptra ROM ...
193,949 UART:
603,597 UART: [state] CFI Enabled
617,467 UART: [state] LifecycleState = Manufacturing
619,787 UART: [state] DebugLocked = No
621,616 UART: [state] WD Timer not started. Device not locked for debugging
626,953 UART: [kat] SHA2-256
808,884 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,464 UART: [kat] ++
820,961 UART: [kat] sha1
831,669 UART: [kat] SHA2-256
834,676 UART: [kat] SHA2-384
841,085 UART: [kat] SHA2-512-ACC
843,694 UART: [kat] ECC-384
4,095,478 UART: [kat] HMAC-384Kdf
4,108,511 UART: [kat] LMS
5,181,635 UART: [kat] --
5,187,171 UART: [cold-reset] ++
5,189,701 UART: [fht] FHT @ 0x50003400
5,200,907 UART: [idev] ++
5,201,619 UART: [idev] CDI.KEYID = 6
5,202,810 UART: [idev] SUBJECT.KEYID = 7
5,204,247 UART: [idev] UDS.KEYID = 0
5,221,708 UART: [idev] Erasing UDS.KEYID = 0
8,495,988 UART: [idev] Sha1 KeyId Algorithm
8,518,402 UART: [idev] --
8,522,281 UART: [ldev] ++
8,522,899 UART: [ldev] CDI.KEYID = 6
8,523,996 UART: [ldev] SUBJECT.KEYID = 5
8,525,526 UART: [ldev] AUTHORITY.KEYID = 7
8,527,052 UART: [ldev] FE.KEYID = 1
8,538,669 UART: [ldev] Erasing FE.KEYID = 1
11,829,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,232 UART: [ldev] --
14,198,283 UART: [fwproc] Wait for Commands...
14,200,321 UART: [fwproc] Recv command 0x46574c44
14,202,628 UART: [fwproc] Recv'd Img size: 114036 bytes
14,262,980 UART: ROM Fatal Error: 0x000B0003
14,266,391 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
6,203 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,067,872 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
5,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,254 UART:
192,624 UART: Running Caliptra ROM ...
193,786 UART:
193,941 UART: [state] CFI Enabled
263,263 UART: [state] LifecycleState = Manufacturing
265,149 UART: [state] DebugLocked = No
267,723 UART: [state] WD Timer not started. Device not locked for debugging
270,648 UART: [kat] SHA2-256
449,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,353 UART: [kat] ++
461,894 UART: [kat] sha1
472,130 UART: [kat] SHA2-256
475,187 UART: [kat] SHA2-384
480,942 UART: [kat] SHA2-512-ACC
483,872 UART: [kat] ECC-384
2,944,833 UART: [kat] HMAC-384Kdf
2,969,603 UART: [kat] LMS
3,499,059 UART: [kat] --
3,502,787 UART: [cold-reset] ++
3,503,694 UART: [fht] FHT @ 0x50003400
3,514,297 UART: [idev] ++
3,514,880 UART: [idev] CDI.KEYID = 6
3,515,769 UART: [idev] SUBJECT.KEYID = 7
3,516,982 UART: [idev] UDS.KEYID = 0
3,542,628 UART: [idev] Erasing UDS.KEYID = 0
6,021,896 UART: [idev] Sha1 KeyId Algorithm
6,046,313 UART: [idev] --
6,049,603 UART: [ldev] ++
6,050,175 UART: [ldev] CDI.KEYID = 6
6,051,087 UART: [ldev] SUBJECT.KEYID = 5
6,052,194 UART: [ldev] AUTHORITY.KEYID = 7
6,053,483 UART: [ldev] FE.KEYID = 1
6,097,988 UART: [ldev] Erasing FE.KEYID = 1
8,602,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,686 UART: [ldev] --
10,416,167 UART: [fwproc] Wait for Commands...
10,418,056 UART: [fwproc] Recv command 0x46574c44
10,420,174 UART: [fwproc] Recv'd Img size: 114360 bytes
10,482,927 UART: ROM Fatal Error: 0x000B0003
10,486,072 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
5,947 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,300 UART:
192,677 UART: Running Caliptra ROM ...
193,752 UART:
193,894 UART: [state] CFI Enabled
260,087 UART: [state] LifecycleState = Manufacturing
261,945 UART: [state] DebugLocked = No
263,565 UART: [state] WD Timer not started. Device not locked for debugging
267,027 UART: [kat] SHA2-256
446,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,694 UART: [kat] ++
458,142 UART: [kat] sha1
468,102 UART: [kat] SHA2-256
471,113 UART: [kat] SHA2-384
477,149 UART: [kat] SHA2-512-ACC
480,083 UART: [kat] ECC-384
2,948,518 UART: [kat] HMAC-384Kdf
2,970,281 UART: [kat] LMS
3,499,772 UART: [kat] --
3,504,868 UART: [cold-reset] ++
3,506,594 UART: [fht] FHT @ 0x50003400
3,516,817 UART: [idev] ++
3,517,381 UART: [idev] CDI.KEYID = 6
3,518,306 UART: [idev] SUBJECT.KEYID = 7
3,519,522 UART: [idev] UDS.KEYID = 0
3,542,252 UART: [idev] Erasing UDS.KEYID = 0
6,025,004 UART: [idev] Sha1 KeyId Algorithm
6,048,634 UART: [idev] --
6,052,747 UART: [ldev] ++
6,053,322 UART: [ldev] CDI.KEYID = 6
6,054,378 UART: [ldev] SUBJECT.KEYID = 5
6,055,417 UART: [ldev] AUTHORITY.KEYID = 7
6,056,564 UART: [ldev] FE.KEYID = 1
6,099,108 UART: [ldev] Erasing FE.KEYID = 1
8,604,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,337 UART: [ldev] --
10,413,396 UART: [fwproc] Wait for Commands...
10,416,358 UART: [fwproc] Recv command 0x46574c44
10,418,453 UART: [fwproc] Recv'd Img size: 114360 bytes
10,478,572 UART: ROM Fatal Error: 0x000B0003
10,481,717 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
5,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,224,156 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
6,578 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,441 UART:
192,828 UART: Running Caliptra ROM ...
193,902 UART:
603,553 UART: [state] CFI Enabled
615,452 UART: [state] LifecycleState = Manufacturing
617,276 UART: [state] DebugLocked = No
619,676 UART: [state] WD Timer not started. Device not locked for debugging
623,190 UART: [kat] SHA2-256
802,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,866 UART: [kat] ++
814,308 UART: [kat] sha1
826,098 UART: [kat] SHA2-256
829,139 UART: [kat] SHA2-384
835,989 UART: [kat] SHA2-512-ACC
838,975 UART: [kat] ECC-384
3,281,408 UART: [kat] HMAC-384Kdf
3,293,965 UART: [kat] LMS
3,823,493 UART: [kat] --
3,828,780 UART: [cold-reset] ++
3,830,881 UART: [fht] FHT @ 0x50003400
3,840,829 UART: [idev] ++
3,841,385 UART: [idev] CDI.KEYID = 6
3,842,355 UART: [idev] SUBJECT.KEYID = 7
3,843,511 UART: [idev] UDS.KEYID = 0
3,859,593 UART: [idev] Erasing UDS.KEYID = 0
6,319,722 UART: [idev] Sha1 KeyId Algorithm
6,343,539 UART: [idev] --
6,348,565 UART: [ldev] ++
6,349,169 UART: [ldev] CDI.KEYID = 6
6,350,080 UART: [ldev] SUBJECT.KEYID = 5
6,351,238 UART: [ldev] AUTHORITY.KEYID = 7
6,352,465 UART: [ldev] FE.KEYID = 1
6,362,517 UART: [ldev] Erasing FE.KEYID = 1
8,831,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,071 UART: [ldev] --
10,622,259 UART: [fwproc] Wait for Commands...
10,624,681 UART: [fwproc] Recv command 0x46574c44
10,626,717 UART: [fwproc] Recv'd Img size: 114360 bytes
10,686,549 UART: ROM Fatal Error: 0x000B0003
10,689,634 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
6,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,463,961 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Manufacturing
85,569 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,208,175 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,996 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,282,159 UART: [fwproc] Recv command 0x46574c44
1,282,892 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,289 UART: ROM Fatal Error: 0x000B0003
1,304,446 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,156,159 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Manufacturing
86,390 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,076 UART: [kat] ++
896,228 UART: [kat] sha1
900,542 UART: [kat] SHA2-256
902,482 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,542 UART: [cold-reset] ++
1,171,114 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,032 UART: [idev] Sha1 KeyId Algorithm
1,208,860 UART: [idev] --
1,210,005 UART: [ldev] ++
1,210,173 UART: [ldev] CDI.KEYID = 6
1,210,537 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,321 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,466 UART: [fwproc] Recv command 0x46574c44
1,284,199 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,390 UART: ROM Fatal Error: 0x000B0003
1,305,547 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,157,950 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,550 UART: [state] LifecycleState = Manufacturing
85,205 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
890,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,817 UART: [kat] ++
894,969 UART: [kat] sha1
899,107 UART: [kat] SHA2-256
901,047 UART: [kat] SHA2-384
903,764 UART: [kat] SHA2-512-ACC
905,665 UART: [kat] ECC-384
915,076 UART: [kat] HMAC-384Kdf
919,638 UART: [kat] LMS
1,167,950 UART: [kat] --
1,168,601 UART: [cold-reset] ++
1,169,039 UART: [fht] FHT @ 0x50003400
1,171,773 UART: [idev] ++
1,171,941 UART: [idev] CDI.KEYID = 6
1,172,302 UART: [idev] SUBJECT.KEYID = 7
1,172,727 UART: [idev] UDS.KEYID = 0
1,180,595 UART: [idev] Erasing UDS.KEYID = 0
1,197,389 UART: [idev] Sha1 KeyId Algorithm
1,206,149 UART: [idev] --
1,207,212 UART: [ldev] ++
1,207,380 UART: [ldev] CDI.KEYID = 6
1,207,744 UART: [ldev] SUBJECT.KEYID = 5
1,208,171 UART: [ldev] AUTHORITY.KEYID = 7
1,208,634 UART: [ldev] FE.KEYID = 1
1,213,818 UART: [ldev] Erasing FE.KEYID = 1
1,239,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,590 UART: [ldev] --
1,279,088 UART: [fwproc] Wait for Commands...
1,279,725 UART: [fwproc] Recv command 0x46574c44
1,280,458 UART: [fwproc] Recv'd Img size: 114360 bytes
1,301,093 UART: ROM Fatal Error: 0x000B0003
1,302,250 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,577 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Manufacturing
86,422 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,170,876 UART: [cold-reset] ++
1,171,430 UART: [fht] FHT @ 0x50003400
1,174,316 UART: [idev] ++
1,174,484 UART: [idev] CDI.KEYID = 6
1,174,845 UART: [idev] SUBJECT.KEYID = 7
1,175,270 UART: [idev] UDS.KEYID = 0
1,183,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,168 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,635 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,217,019 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,843 UART: [ldev] --
1,283,353 UART: [fwproc] Wait for Commands...
1,284,094 UART: [fwproc] Recv command 0x46574c44
1,284,827 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,912 UART: ROM Fatal Error: 0x000B0003
1,306,069 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,157,226 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Manufacturing
85,769 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,198,683 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,622 UART: [ldev] ++
1,208,790 UART: [ldev] CDI.KEYID = 6
1,209,154 UART: [ldev] SUBJECT.KEYID = 5
1,209,581 UART: [ldev] AUTHORITY.KEYID = 7
1,210,044 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,966 UART: [ldev] --
1,280,412 UART: [fwproc] Wait for Commands...
1,281,095 UART: [fwproc] Recv command 0x46574c44
1,281,828 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,531 UART: ROM Fatal Error: 0x000B0003
1,303,688 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,599 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Manufacturing
86,170 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,433 UART: [kat] LMS
1,169,745 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,778 UART: [idev] Sha1 KeyId Algorithm
1,208,632 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,161 UART: [ldev] SUBJECT.KEYID = 5
1,210,588 UART: [ldev] AUTHORITY.KEYID = 7
1,211,051 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,437 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,950 UART: ROM Fatal Error: 0x000B0003
1,305,107 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,156,094 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
5,907 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,407 UART:
192,788 UART: Running Caliptra ROM ...
193,969 UART:
194,122 UART: [state] CFI Enabled
264,312 UART: [state] LifecycleState = Unprovisioned
266,770 UART: [state] DebugLocked = No
269,667 UART: [state] WD Timer not started. Device not locked for debugging
273,438 UART: [kat] SHA2-256
455,190 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,693 UART: [kat] ++
467,193 UART: [kat] sha1
476,451 UART: [kat] SHA2-256
479,469 UART: [kat] SHA2-384
484,308 UART: [kat] SHA2-512-ACC
486,924 UART: [kat] ECC-384
3,778,973 UART: [kat] HMAC-384Kdf
3,802,665 UART: [kat] LMS
4,875,784 UART: [kat] --
4,881,262 UART: [cold-reset] ++
4,883,043 UART: [fht] FHT @ 0x50003400
4,893,569 UART: [idev] ++
4,894,305 UART: [idev] CDI.KEYID = 6
4,895,417 UART: [idev] SUBJECT.KEYID = 7
4,896,633 UART: [idev] UDS.KEYID = 0
4,929,811 UART: [idev] Erasing UDS.KEYID = 0
8,243,061 UART: [idev] Sha1 KeyId Algorithm
8,263,973 UART: [idev] --
8,268,180 UART: [ldev] ++
8,268,808 UART: [ldev] CDI.KEYID = 6
8,269,914 UART: [ldev] SUBJECT.KEYID = 5
8,271,128 UART: [ldev] AUTHORITY.KEYID = 7
8,272,277 UART: [ldev] FE.KEYID = 1
8,318,974 UART: [ldev] Erasing FE.KEYID = 1
11,648,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,230 UART: [ldev] --
14,013,152 UART: [fwproc] Wait for Commands...
14,015,743 UART: [fwproc] Recv command 0x46574c44
14,018,072 UART: [fwproc] Recv'd Img size: 114036 bytes
18,089,585 UART: ROM Fatal Error: 0x000B0016
18,092,995 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
5,271 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,893,717 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,455 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,425 UART:
192,824 UART: Running Caliptra ROM ...
193,952 UART:
604,196 UART: [state] CFI Enabled
617,122 UART: [state] LifecycleState = Unprovisioned
619,523 UART: [state] DebugLocked = No
621,763 UART: [state] WD Timer not started. Device not locked for debugging
626,012 UART: [kat] SHA2-256
807,988 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,492 UART: [kat] ++
820,061 UART: [kat] sha1
831,584 UART: [kat] SHA2-256
834,598 UART: [kat] SHA2-384
839,666 UART: [kat] SHA2-512-ACC
842,288 UART: [kat] ECC-384
4,094,654 UART: [kat] HMAC-384Kdf
4,106,517 UART: [kat] LMS
5,179,624 UART: [kat] --
5,182,798 UART: [cold-reset] ++
5,183,935 UART: [fht] FHT @ 0x50003400
5,196,920 UART: [idev] ++
5,197,645 UART: [idev] CDI.KEYID = 6
5,198,825 UART: [idev] SUBJECT.KEYID = 7
5,200,311 UART: [idev] UDS.KEYID = 0
5,218,830 UART: [idev] Erasing UDS.KEYID = 0
8,490,317 UART: [idev] Sha1 KeyId Algorithm
8,512,735 UART: [idev] --
8,516,943 UART: [ldev] ++
8,517,509 UART: [ldev] CDI.KEYID = 6
8,518,693 UART: [ldev] SUBJECT.KEYID = 5
8,520,177 UART: [ldev] AUTHORITY.KEYID = 7
8,521,658 UART: [ldev] FE.KEYID = 1
8,530,806 UART: [ldev] Erasing FE.KEYID = 1
11,820,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,407 UART: [ldev] --
14,185,805 UART: [fwproc] Wait for Commands...
14,187,568 UART: [fwproc] Recv command 0x46574c44
14,189,885 UART: [fwproc] Recv'd Img size: 114036 bytes
18,256,286 UART: ROM Fatal Error: 0x000B0016
18,259,703 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,122 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,078,330 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
5,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,313 UART:
192,692 UART: Running Caliptra ROM ...
193,853 UART:
194,005 UART: [state] CFI Enabled
264,483 UART: [state] LifecycleState = Unprovisioned
266,349 UART: [state] DebugLocked = No
268,003 UART: [state] WD Timer not started. Device not locked for debugging
272,021 UART: [kat] SHA2-256
451,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,713 UART: [kat] ++
463,255 UART: [kat] sha1
475,111 UART: [kat] SHA2-256
478,117 UART: [kat] SHA2-384
484,313 UART: [kat] SHA2-512-ACC
487,249 UART: [kat] ECC-384
2,949,632 UART: [kat] HMAC-384Kdf
2,971,676 UART: [kat] LMS
3,501,155 UART: [kat] --
3,504,065 UART: [cold-reset] ++
3,506,007 UART: [fht] FHT @ 0x50003400
3,515,911 UART: [idev] ++
3,516,475 UART: [idev] CDI.KEYID = 6
3,517,358 UART: [idev] SUBJECT.KEYID = 7
3,518,569 UART: [idev] UDS.KEYID = 0
3,546,269 UART: [idev] Erasing UDS.KEYID = 0
6,026,886 UART: [idev] Sha1 KeyId Algorithm
6,049,963 UART: [idev] --
6,054,125 UART: [ldev] ++
6,054,702 UART: [ldev] CDI.KEYID = 6
6,055,588 UART: [ldev] SUBJECT.KEYID = 5
6,056,811 UART: [ldev] AUTHORITY.KEYID = 7
6,058,254 UART: [ldev] FE.KEYID = 1
6,102,233 UART: [ldev] Erasing FE.KEYID = 1
8,605,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,117 UART: [ldev] --
10,413,979 UART: [fwproc] Wait for Commands...
10,416,675 UART: [fwproc] Recv command 0x46574c44
10,418,718 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,013 UART: ROM Fatal Error: 0x000B0016
13,819,146 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,530 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,109 UART:
192,507 UART: Running Caliptra ROM ...
193,638 UART:
193,787 UART: [state] CFI Enabled
265,012 UART: [state] LifecycleState = Unprovisioned
266,886 UART: [state] DebugLocked = No
269,565 UART: [state] WD Timer not started. Device not locked for debugging
273,039 UART: [kat] SHA2-256
452,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,761 UART: [kat] ++
464,213 UART: [kat] sha1
474,653 UART: [kat] SHA2-256
477,673 UART: [kat] SHA2-384
484,462 UART: [kat] SHA2-512-ACC
487,453 UART: [kat] ECC-384
2,950,335 UART: [kat] HMAC-384Kdf
2,974,410 UART: [kat] LMS
3,503,862 UART: [kat] --
3,507,840 UART: [cold-reset] ++
3,509,461 UART: [fht] FHT @ 0x50003400
3,520,553 UART: [idev] ++
3,521,116 UART: [idev] CDI.KEYID = 6
3,522,032 UART: [idev] SUBJECT.KEYID = 7
3,523,250 UART: [idev] UDS.KEYID = 0
3,546,409 UART: [idev] Erasing UDS.KEYID = 0
6,028,349 UART: [idev] Sha1 KeyId Algorithm
6,051,468 UART: [idev] --
6,055,006 UART: [ldev] ++
6,055,590 UART: [ldev] CDI.KEYID = 6
6,056,501 UART: [ldev] SUBJECT.KEYID = 5
6,057,579 UART: [ldev] AUTHORITY.KEYID = 7
6,058,919 UART: [ldev] FE.KEYID = 1
6,102,706 UART: [ldev] Erasing FE.KEYID = 1
8,607,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,541 UART: [ldev] --
10,415,567 UART: [fwproc] Wait for Commands...
10,418,694 UART: [fwproc] Recv command 0x46574c44
10,420,794 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,421 UART: ROM Fatal Error: 0x000B0016
13,822,545 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,629,106 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
6,437 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,500 UART:
193,039 UART: Running Caliptra ROM ...
194,140 UART:
603,607 UART: [state] CFI Enabled
615,760 UART: [state] LifecycleState = Unprovisioned
617,674 UART: [state] DebugLocked = No
619,429 UART: [state] WD Timer not started. Device not locked for debugging
622,525 UART: [kat] SHA2-256
801,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,255 UART: [kat] ++
813,827 UART: [kat] sha1
825,040 UART: [kat] SHA2-256
828,047 UART: [kat] SHA2-384
834,943 UART: [kat] SHA2-512-ACC
837,870 UART: [kat] ECC-384
3,281,940 UART: [kat] HMAC-384Kdf
3,296,146 UART: [kat] LMS
3,825,650 UART: [kat] --
3,829,385 UART: [cold-reset] ++
3,830,458 UART: [fht] FHT @ 0x50003400
3,841,714 UART: [idev] ++
3,842,276 UART: [idev] CDI.KEYID = 6
3,843,248 UART: [idev] SUBJECT.KEYID = 7
3,844,405 UART: [idev] UDS.KEYID = 0
3,859,459 UART: [idev] Erasing UDS.KEYID = 0
6,316,265 UART: [idev] Sha1 KeyId Algorithm
6,338,893 UART: [idev] --
6,342,560 UART: [ldev] ++
6,343,124 UART: [ldev] CDI.KEYID = 6
6,344,001 UART: [ldev] SUBJECT.KEYID = 5
6,345,161 UART: [ldev] AUTHORITY.KEYID = 7
6,346,500 UART: [ldev] FE.KEYID = 1
6,357,676 UART: [ldev] Erasing FE.KEYID = 1
8,836,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,511 UART: [ldev] --
10,628,303 UART: [fwproc] Wait for Commands...
10,630,990 UART: [fwproc] Recv command 0x46574c44
10,633,027 UART: [fwproc] Recv'd Img size: 114360 bytes
14,033,886 UART: ROM Fatal Error: 0x000B0016
14,037,011 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
6,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,813,509 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,026 UART: [kat] SHA2-512-ACC
905,927 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
920,248 UART: [kat] LMS
1,168,560 UART: [kat] --
1,169,621 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,199,341 UART: [idev] Sha1 KeyId Algorithm
1,208,281 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,503 UART: [ldev] AUTHORITY.KEYID = 7
1,210,966 UART: [ldev] FE.KEYID = 1
1,216,278 UART: [ldev] Erasing FE.KEYID = 1
1,242,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,546 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,531 UART: [fwproc] Recv command 0x46574c44
1,283,264 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,879 UART: ROM Fatal Error: 0x000B0016
2,580,036 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,461 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,584 UART: [cold-reset] ++
1,171,088 UART: [fht] FHT @ 0x50003400
1,173,834 UART: [idev] ++
1,174,002 UART: [idev] CDI.KEYID = 6
1,174,363 UART: [idev] SUBJECT.KEYID = 7
1,174,788 UART: [idev] UDS.KEYID = 0
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,513 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,260 UART: ROM Fatal Error: 0x000B0016
2,581,417 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,435,178 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,898 UART: [kat] LMS
1,169,210 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,348 UART: [ldev] ++
1,209,516 UART: [ldev] CDI.KEYID = 6
1,209,880 UART: [ldev] SUBJECT.KEYID = 5
1,210,307 UART: [ldev] AUTHORITY.KEYID = 7
1,210,770 UART: [ldev] FE.KEYID = 1
1,216,104 UART: [ldev] Erasing FE.KEYID = 1
1,242,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,062 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,247 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,679 UART: ROM Fatal Error: 0x000B0016
2,581,836 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,757 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,372 UART: [kat] SHA2-256
901,312 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,761 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,390 UART: [cold-reset] ++
1,169,754 UART: [fht] FHT @ 0x50003400
1,172,384 UART: [idev] ++
1,172,552 UART: [idev] CDI.KEYID = 6
1,172,913 UART: [idev] SUBJECT.KEYID = 7
1,173,338 UART: [idev] UDS.KEYID = 0
1,181,092 UART: [idev] Erasing UDS.KEYID = 0
1,198,064 UART: [idev] Sha1 KeyId Algorithm
1,206,876 UART: [idev] --
1,207,877 UART: [ldev] ++
1,208,045 UART: [ldev] CDI.KEYID = 6
1,208,409 UART: [ldev] SUBJECT.KEYID = 5
1,208,836 UART: [ldev] AUTHORITY.KEYID = 7
1,209,299 UART: [ldev] FE.KEYID = 1
1,214,607 UART: [ldev] Erasing FE.KEYID = 1
1,240,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,947 UART: [ldev] --
1,280,325 UART: [fwproc] Wait for Commands...
1,281,146 UART: [fwproc] Recv command 0x46574c44
1,281,879 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,902 UART: ROM Fatal Error: 0x000B0016
2,579,059 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,874 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,282 UART: [kat] LMS
1,168,594 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,035 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,208,164 UART: [ldev] ++
1,208,332 UART: [ldev] CDI.KEYID = 6
1,208,696 UART: [ldev] SUBJECT.KEYID = 5
1,209,123 UART: [ldev] AUTHORITY.KEYID = 7
1,209,586 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,240,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,812 UART: [ldev] --
1,280,270 UART: [fwproc] Wait for Commands...
1,280,939 UART: [fwproc] Recv command 0x46574c44
1,281,672 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,441 UART: ROM Fatal Error: 0x000B0016
2,579,598 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,941 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
917,093 UART: [kat] HMAC-384Kdf
921,573 UART: [kat] LMS
1,169,885 UART: [kat] --
1,170,754 UART: [cold-reset] ++
1,171,086 UART: [fht] FHT @ 0x50003400
1,173,948 UART: [idev] ++
1,174,116 UART: [idev] CDI.KEYID = 6
1,174,477 UART: [idev] SUBJECT.KEYID = 7
1,174,902 UART: [idev] UDS.KEYID = 0
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,940 UART: [idev] Sha1 KeyId Algorithm
1,208,812 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,723 UART: [fwproc] Wait for Commands...
1,283,508 UART: [fwproc] Recv command 0x46574c44
1,284,241 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,752 UART: ROM Fatal Error: 0x000B0016
2,581,909 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,504 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,020,451 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,543 UART:
2,164,934 UART: Running Caliptra ROM ...
2,166,016 UART:
2,166,177 UART: [state] CFI Enabled
2,167,156 UART: [state] LifecycleState = Unprovisioned
2,168,715 UART: [state] DebugLocked = No
2,169,737 UART: [state] WD Timer not started. Device not locked for debugging
2,172,198 UART: [kat] SHA2-256
2,172,862 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,862 UART: [kat] ++
2,176,310 UART: [kat] sha1
2,176,824 UART: [kat] SHA2-256
2,177,481 UART: [kat] SHA2-384
2,178,139 UART: [kat] SHA2-512-ACC
2,179,133 UART: [kat] ECC-384
3,777,181 UART: [kat] HMAC-384Kdf
3,802,720 UART: [kat] LMS
4,875,859 UART: [kat] --
4,880,503 UART: [cold-reset] ++
4,883,085 UART: [fht] FHT @ 0x50003400
4,894,341 UART: [idev] ++
4,895,016 UART: [idev] CDI.KEYID = 6
4,896,251 UART: [idev] SUBJECT.KEYID = 7
4,897,404 UART: [idev] UDS.KEYID = 0
4,929,693 UART: [idev] Erasing UDS.KEYID = 0
8,239,293 UART: [idev] Sha1 KeyId Algorithm
8,261,125 UART: [idev] --
8,265,067 UART: [ldev] ++
8,265,637 UART: [ldev] CDI.KEYID = 6
8,266,877 UART: [ldev] SUBJECT.KEYID = 5
8,268,032 UART: [ldev] AUTHORITY.KEYID = 7
8,269,260 UART: [ldev] FE.KEYID = 1
8,296,193 UART: [ldev] Erasing FE.KEYID = 1
11,628,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,284 UART: [ldev] --
14,014,091 UART: [fwproc] Wait for Commands...
14,016,244 UART: [fwproc] Recv command 0x46574c44
14,018,516 UART: [fwproc] Recv'd Img size: 114036 bytes
18,091,158 UART: ROM Fatal Error: 0x000B002B
18,094,341 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,019,322 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,891,460 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,023,386 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,167,645 UART:
2,168,059 UART: Running Caliptra ROM ...
2,169,151 UART:
2,169,298 UART: [state] CFI Enabled
2,170,275 UART: [state] LifecycleState = Unprovisioned
2,171,931 UART: [state] DebugLocked = No
2,172,949 UART: [state] WD Timer not started. Device not locked for debugging
2,175,414 UART: [kat] SHA2-256
2,176,153 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,076 UART: [kat] ++
2,179,514 UART: [kat] sha1
2,180,041 UART: [kat] SHA2-256
2,180,726 UART: [kat] SHA2-384
2,181,405 UART: [kat] SHA2-512-ACC
2,182,202 UART: [kat] ECC-384
4,096,408 UART: [kat] HMAC-384Kdf
4,108,111 UART: [kat] LMS
5,181,256 UART: [kat] --
5,185,311 UART: [cold-reset] ++
5,187,410 UART: [fht] FHT @ 0x50003400
5,199,042 UART: [idev] ++
5,199,764 UART: [idev] CDI.KEYID = 6
5,200,914 UART: [idev] SUBJECT.KEYID = 7
5,202,390 UART: [idev] UDS.KEYID = 0
5,222,119 UART: [idev] Erasing UDS.KEYID = 0
8,497,489 UART: [idev] Sha1 KeyId Algorithm
8,520,072 UART: [idev] --
8,524,383 UART: [ldev] ++
8,524,954 UART: [ldev] CDI.KEYID = 6
8,526,199 UART: [ldev] SUBJECT.KEYID = 5
8,527,640 UART: [ldev] AUTHORITY.KEYID = 7
8,529,123 UART: [ldev] FE.KEYID = 1
8,540,689 UART: [ldev] Erasing FE.KEYID = 1
11,831,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,996 UART: [ldev] --
14,197,072 UART: [fwproc] Wait for Commands...
14,199,706 UART: [fwproc] Recv command 0x46574c44
14,202,025 UART: [fwproc] Recv'd Img size: 114036 bytes
18,280,829 UART: ROM Fatal Error: 0x000B002B
18,284,204 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,021,221 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,085,016 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,025,332 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,781 UART:
2,170,175 UART: Running Caliptra ROM ...
2,171,345 UART:
2,171,512 UART: [state] CFI Enabled
2,173,198 UART: [state] LifecycleState = Unprovisioned
2,174,880 UART: [state] DebugLocked = No
2,175,998 UART: [state] WD Timer not started. Device not locked for debugging
2,178,482 UART: [kat] SHA2-256
2,179,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,189 UART: [kat] ++
2,182,643 UART: [kat] sha1
2,183,157 UART: [kat] SHA2-256
2,183,903 UART: [kat] SHA2-384
2,184,573 UART: [kat] SHA2-512-ACC
2,185,379 UART: [kat] ECC-384
2,937,647 UART: [kat] HMAC-384Kdf
2,963,852 UART: [kat] LMS
3,493,310 UART: [kat] --
3,498,541 UART: [cold-reset] ++
3,499,616 UART: [fht] FHT @ 0x50003400
3,510,327 UART: [idev] ++
3,510,889 UART: [idev] CDI.KEYID = 6
3,511,795 UART: [idev] SUBJECT.KEYID = 7
3,513,009 UART: [idev] UDS.KEYID = 0
3,534,131 UART: [idev] Erasing UDS.KEYID = 0
6,016,720 UART: [idev] Sha1 KeyId Algorithm
6,038,388 UART: [idev] --
6,042,439 UART: [ldev] ++
6,043,013 UART: [ldev] CDI.KEYID = 6
6,043,926 UART: [ldev] SUBJECT.KEYID = 5
6,045,091 UART: [ldev] AUTHORITY.KEYID = 7
6,046,335 UART: [ldev] FE.KEYID = 1
6,091,390 UART: [ldev] Erasing FE.KEYID = 1
8,590,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,378 UART: [ldev] --
10,385,129 UART: [fwproc] Wait for Commands...
10,387,339 UART: [fwproc] Recv command 0x46574c44
10,389,461 UART: [fwproc] Recv'd Img size: 114360 bytes
13,783,029 UART: ROM Fatal Error: 0x000B002B
13,786,176 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,022,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,449 UART:
2,166,854 UART: Running Caliptra ROM ...
2,168,027 UART:
2,168,201 UART: [state] CFI Enabled
2,169,171 UART: [state] LifecycleState = Unprovisioned
2,170,817 UART: [state] DebugLocked = No
2,171,928 UART: [state] WD Timer not started. Device not locked for debugging
2,174,407 UART: [kat] SHA2-256
2,175,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,094 UART: [kat] ++
2,178,546 UART: [kat] sha1
2,179,097 UART: [kat] SHA2-256
2,179,760 UART: [kat] SHA2-384
2,180,415 UART: [kat] SHA2-512-ACC
2,181,262 UART: [kat] ECC-384
2,928,709 UART: [kat] HMAC-384Kdf
2,951,846 UART: [kat] LMS
3,481,305 UART: [kat] --
3,486,101 UART: [cold-reset] ++
3,486,893 UART: [fht] FHT @ 0x50003400
3,498,904 UART: [idev] ++
3,499,469 UART: [idev] CDI.KEYID = 6
3,500,375 UART: [idev] SUBJECT.KEYID = 7
3,501,589 UART: [idev] UDS.KEYID = 0
3,523,647 UART: [idev] Erasing UDS.KEYID = 0
6,002,004 UART: [idev] Sha1 KeyId Algorithm
6,026,137 UART: [idev] --
6,029,758 UART: [ldev] ++
6,030,332 UART: [ldev] CDI.KEYID = 6
6,031,217 UART: [ldev] SUBJECT.KEYID = 5
6,032,433 UART: [ldev] AUTHORITY.KEYID = 7
6,033,695 UART: [ldev] FE.KEYID = 1
6,079,546 UART: [ldev] Erasing FE.KEYID = 1
8,586,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,880 UART: [ldev] --
10,393,810 UART: [fwproc] Wait for Commands...
10,396,782 UART: [fwproc] Recv command 0x46574c44
10,398,883 UART: [fwproc] Recv'd Img size: 114360 bytes
13,805,371 UART: ROM Fatal Error: 0x000B002B
13,808,507 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,021,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,592,164 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
2,022,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,992 UART:
2,167,388 UART: Running Caliptra ROM ...
2,168,466 UART:
2,168,620 UART: [state] CFI Enabled
2,169,593 UART: [state] LifecycleState = Unprovisioned
2,171,238 UART: [state] DebugLocked = No
2,172,264 UART: [state] WD Timer not started. Device not locked for debugging
2,174,730 UART: [kat] SHA2-256
2,175,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,417 UART: [kat] ++
2,178,863 UART: [kat] sha1
2,179,372 UART: [kat] SHA2-256
2,180,030 UART: [kat] SHA2-384
2,180,687 UART: [kat] SHA2-512-ACC
2,181,517 UART: [kat] ECC-384
3,283,181 UART: [kat] HMAC-384Kdf
3,295,582 UART: [kat] LMS
3,825,055 UART: [kat] --
3,828,581 UART: [cold-reset] ++
3,830,619 UART: [fht] FHT @ 0x50003400
3,840,781 UART: [idev] ++
3,841,347 UART: [idev] CDI.KEYID = 6
3,842,258 UART: [idev] SUBJECT.KEYID = 7
3,843,469 UART: [idev] UDS.KEYID = 0
3,860,577 UART: [idev] Erasing UDS.KEYID = 0
6,318,144 UART: [idev] Sha1 KeyId Algorithm
6,340,940 UART: [idev] --
6,345,120 UART: [ldev] ++
6,345,690 UART: [ldev] CDI.KEYID = 6
6,346,568 UART: [ldev] SUBJECT.KEYID = 5
6,347,776 UART: [ldev] AUTHORITY.KEYID = 7
6,349,003 UART: [ldev] FE.KEYID = 1
6,358,384 UART: [ldev] Erasing FE.KEYID = 1
8,834,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,266 UART: [ldev] --
10,625,256 UART: [fwproc] Wait for Commands...
10,626,751 UART: [fwproc] Recv command 0x46574c44
10,628,870 UART: [fwproc] Recv'd Img size: 114360 bytes
14,033,650 UART: ROM Fatal Error: 0x000B002B
14,036,781 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,022,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,822,036 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,917 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
891,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,416 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,527 UART: [idev] --
1,208,502 UART: [ldev] ++
1,208,670 UART: [ldev] CDI.KEYID = 6
1,209,034 UART: [ldev] SUBJECT.KEYID = 5
1,209,461 UART: [ldev] AUTHORITY.KEYID = 7
1,209,924 UART: [ldev] FE.KEYID = 1
1,214,870 UART: [ldev] Erasing FE.KEYID = 1
1,240,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,504 UART: [fwproc] Wait for Commands...
1,281,203 UART: [fwproc] Recv command 0x46574c44
1,281,936 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,390 UART: ROM Fatal Error: 0x000B002B
2,579,549 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,440 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,206 UART: [state] WD Timer not started. Device not locked for debugging
88,467 UART: [kat] SHA2-256
892,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,146 UART: [kat] ++
896,298 UART: [kat] sha1
900,590 UART: [kat] SHA2-256
902,530 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,161 UART: [kat] HMAC-384Kdf
921,857 UART: [kat] LMS
1,170,169 UART: [kat] --
1,171,118 UART: [cold-reset] ++
1,171,642 UART: [fht] FHT @ 0x50003400
1,174,246 UART: [idev] ++
1,174,414 UART: [idev] CDI.KEYID = 6
1,174,775 UART: [idev] SUBJECT.KEYID = 7
1,175,200 UART: [idev] UDS.KEYID = 0
1,182,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,874 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,845 UART: [ldev] ++
1,210,013 UART: [ldev] CDI.KEYID = 6
1,210,377 UART: [ldev] SUBJECT.KEYID = 5
1,210,804 UART: [ldev] AUTHORITY.KEYID = 7
1,211,267 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,501 UART: [ldev] --
1,282,953 UART: [fwproc] Wait for Commands...
1,283,670 UART: [fwproc] Recv command 0x46574c44
1,284,403 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,291 UART: ROM Fatal Error: 0x000B002B
2,582,450 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,073 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
900,263 UART: [kat] SHA2-256
902,203 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,777 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,182,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,713 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,182 UART: [ldev] Erasing FE.KEYID = 1
1,241,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,890 UART: [ldev] --
1,280,266 UART: [fwproc] Wait for Commands...
1,280,971 UART: [fwproc] Recv command 0x46574c44
1,281,704 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,414 UART: ROM Fatal Error: 0x000B002B
2,580,573 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,810 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
915,955 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,880 UART: [idev] ++
1,173,048 UART: [idev] CDI.KEYID = 6
1,173,409 UART: [idev] SUBJECT.KEYID = 7
1,173,834 UART: [idev] UDS.KEYID = 0
1,181,672 UART: [idev] Erasing UDS.KEYID = 0
1,199,056 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,208,915 UART: [ldev] ++
1,209,083 UART: [ldev] CDI.KEYID = 6
1,209,447 UART: [ldev] SUBJECT.KEYID = 5
1,209,874 UART: [ldev] AUTHORITY.KEYID = 7
1,210,337 UART: [ldev] FE.KEYID = 1
1,215,349 UART: [ldev] Erasing FE.KEYID = 1
1,241,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,915 UART: [ldev] --
1,280,363 UART: [fwproc] Wait for Commands...
1,281,098 UART: [fwproc] Recv command 0x46574c44
1,281,831 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,629 UART: ROM Fatal Error: 0x000B002B
2,579,788 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,693 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,606 UART: [state] LifecycleState = Unprovisioned
85,261 UART: [state] DebugLocked = No
85,757 UART: [state] WD Timer not started. Device not locked for debugging
86,896 UART: [kat] SHA2-256
890,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,575 UART: [kat] ++
894,727 UART: [kat] sha1
898,879 UART: [kat] SHA2-256
900,819 UART: [kat] SHA2-384
903,602 UART: [kat] SHA2-512-ACC
905,503 UART: [kat] ECC-384
914,858 UART: [kat] HMAC-384Kdf
919,596 UART: [kat] LMS
1,167,908 UART: [kat] --
1,168,771 UART: [cold-reset] ++
1,169,275 UART: [fht] FHT @ 0x50003400
1,171,999 UART: [idev] ++
1,172,167 UART: [idev] CDI.KEYID = 6
1,172,528 UART: [idev] SUBJECT.KEYID = 7
1,172,953 UART: [idev] UDS.KEYID = 0
1,180,811 UART: [idev] Erasing UDS.KEYID = 0
1,197,299 UART: [idev] Sha1 KeyId Algorithm
1,206,213 UART: [idev] --
1,207,242 UART: [ldev] ++
1,207,410 UART: [ldev] CDI.KEYID = 6
1,207,774 UART: [ldev] SUBJECT.KEYID = 5
1,208,201 UART: [ldev] AUTHORITY.KEYID = 7
1,208,664 UART: [ldev] FE.KEYID = 1
1,213,596 UART: [ldev] Erasing FE.KEYID = 1
1,239,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,716 UART: [ldev] --
1,279,100 UART: [fwproc] Wait for Commands...
1,279,811 UART: [fwproc] Recv command 0x46574c44
1,280,544 UART: [fwproc] Recv'd Img size: 114360 bytes
2,575,886 UART: ROM Fatal Error: 0x000B002B
2,577,045 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,241,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,055 UART: [fwproc] Wait for Commands...
1,281,762 UART: [fwproc] Recv command 0x46574c44
1,282,495 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,913 UART: ROM Fatal Error: 0x000B002B
2,581,072 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,221 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,020,081 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,222 UART:
2,164,634 UART: Running Caliptra ROM ...
2,165,806 UART:
2,165,979 UART: [state] CFI Enabled
2,166,948 UART: [state] LifecycleState = Unprovisioned
2,168,585 UART: [state] DebugLocked = No
2,169,693 UART: [state] WD Timer not started. Device not locked for debugging
2,172,159 UART: [kat] SHA2-256
2,172,828 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,849 UART: [kat] ++
2,176,320 UART: [kat] sha1
2,176,836 UART: [kat] SHA2-256
2,177,497 UART: [kat] SHA2-384
2,178,332 UART: [kat] SHA2-512-ACC
2,179,188 UART: [kat] ECC-384
3,778,010 UART: [kat] HMAC-384Kdf
3,803,027 UART: [kat] LMS
4,876,182 UART: [kat] --
4,881,491 UART: [cold-reset] ++
4,884,135 UART: [fht] FHT @ 0x50003400
4,895,763 UART: [idev] ++
4,896,499 UART: [idev] CDI.KEYID = 6
4,897,675 UART: [idev] SUBJECT.KEYID = 7
4,898,832 UART: [idev] UDS.KEYID = 0
4,931,550 UART: [idev] Erasing UDS.KEYID = 0
8,245,690 UART: [idev] Sha1 KeyId Algorithm
8,267,637 UART: [idev] --
8,271,580 UART: [ldev] ++
8,272,242 UART: [ldev] CDI.KEYID = 6
8,273,381 UART: [ldev] SUBJECT.KEYID = 5
8,274,546 UART: [ldev] AUTHORITY.KEYID = 7
8,275,784 UART: [ldev] FE.KEYID = 1
8,318,981 UART: [ldev] Erasing FE.KEYID = 1
11,653,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,415 UART: [ldev] --
14,038,882 UART: [fwproc] Wait for Commands...
14,041,148 UART: [fwproc] Recv command 0x46574c44
14,043,473 UART: [fwproc] Recv'd Img size: 114036 bytes
18,119,009 UART: ROM Fatal Error: 0x000B002A
18,122,430 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,020,629 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,871,659 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,524 writing to cptra_bootfsm_go
2,028,836 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,172,778 UART:
2,173,188 UART: Running Caliptra ROM ...
2,174,264 UART:
2,174,411 UART: [state] CFI Enabled
2,175,395 UART: [state] LifecycleState = Unprovisioned
2,177,161 UART: [state] DebugLocked = No
2,178,224 UART: [state] WD Timer not started. Device not locked for debugging
2,180,684 UART: [kat] SHA2-256
2,181,341 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,184,350 UART: [kat] ++
2,184,806 UART: [kat] sha1
2,185,308 UART: [kat] SHA2-256
2,185,956 UART: [kat] SHA2-384
2,186,604 UART: [kat] SHA2-512-ACC
2,187,482 UART: [kat] ECC-384
4,101,596 UART: [kat] HMAC-384Kdf
4,113,568 UART: [kat] LMS
5,186,760 UART: [kat] --
5,190,971 UART: [cold-reset] ++
5,192,968 UART: [fht] FHT @ 0x50003400
5,204,215 UART: [idev] ++
5,204,947 UART: [idev] CDI.KEYID = 6
5,206,127 UART: [idev] SUBJECT.KEYID = 7
5,207,554 UART: [idev] UDS.KEYID = 0
5,225,045 UART: [idev] Erasing UDS.KEYID = 0
8,497,654 UART: [idev] Sha1 KeyId Algorithm
8,520,095 UART: [idev] --
8,524,310 UART: [ldev] ++
8,524,935 UART: [ldev] CDI.KEYID = 6
8,526,116 UART: [ldev] SUBJECT.KEYID = 5
8,527,557 UART: [ldev] AUTHORITY.KEYID = 7
8,529,120 UART: [ldev] FE.KEYID = 1
8,543,092 UART: [ldev] Erasing FE.KEYID = 1
11,835,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,238 UART: [ldev] --
14,202,016 UART: [fwproc] Wait for Commands...
14,205,200 UART: [fwproc] Recv command 0x46574c44
14,207,464 UART: [fwproc] Recv'd Img size: 114036 bytes
18,279,234 UART: ROM Fatal Error: 0x000B002A
18,282,646 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,020,058 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,075,428 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,021,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,117 UART:
2,166,519 UART: Running Caliptra ROM ...
2,167,685 UART:
2,167,855 UART: [state] CFI Enabled
2,168,819 UART: [state] LifecycleState = Unprovisioned
2,170,465 UART: [state] DebugLocked = No
2,171,535 UART: [state] WD Timer not started. Device not locked for debugging
2,174,027 UART: [kat] SHA2-256
2,174,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,725 UART: [kat] ++
2,178,177 UART: [kat] sha1
2,178,691 UART: [kat] SHA2-256
2,179,431 UART: [kat] SHA2-384
2,180,094 UART: [kat] SHA2-512-ACC
2,180,923 UART: [kat] ECC-384
2,948,871 UART: [kat] HMAC-384Kdf
2,970,998 UART: [kat] LMS
3,500,464 UART: [kat] --
3,506,342 UART: [cold-reset] ++
3,508,760 UART: [fht] FHT @ 0x50003400
3,521,030 UART: [idev] ++
3,521,646 UART: [idev] CDI.KEYID = 6
3,522,563 UART: [idev] SUBJECT.KEYID = 7
3,523,748 UART: [idev] UDS.KEYID = 0
3,542,864 UART: [idev] Erasing UDS.KEYID = 0
6,023,411 UART: [idev] Sha1 KeyId Algorithm
6,045,804 UART: [idev] --
6,049,806 UART: [ldev] ++
6,050,387 UART: [ldev] CDI.KEYID = 6
6,051,300 UART: [ldev] SUBJECT.KEYID = 5
6,052,488 UART: [ldev] AUTHORITY.KEYID = 7
6,053,729 UART: [ldev] FE.KEYID = 1
6,098,147 UART: [ldev] Erasing FE.KEYID = 1
8,601,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,382 UART: [ldev] --
10,414,081 UART: [fwproc] Wait for Commands...
10,416,620 UART: [fwproc] Recv command 0x46574c44
10,418,727 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,486 UART: ROM Fatal Error: 0x000B002A
13,819,616 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,026,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,170,760 UART:
2,171,163 UART: Running Caliptra ROM ...
2,172,244 UART:
2,172,407 UART: [state] CFI Enabled
2,173,621 UART: [state] LifecycleState = Unprovisioned
2,175,291 UART: [state] DebugLocked = No
2,176,321 UART: [state] WD Timer not started. Device not locked for debugging
2,178,799 UART: [kat] SHA2-256
2,179,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,478 UART: [kat] ++
2,182,927 UART: [kat] sha1
2,183,471 UART: [kat] SHA2-256
2,184,128 UART: [kat] SHA2-384
2,184,873 UART: [kat] SHA2-512-ACC
2,185,768 UART: [kat] ECC-384
2,948,828 UART: [kat] HMAC-384Kdf
2,971,149 UART: [kat] LMS
3,500,614 UART: [kat] --
3,506,436 UART: [cold-reset] ++
3,508,531 UART: [fht] FHT @ 0x50003400
3,519,416 UART: [idev] ++
3,519,994 UART: [idev] CDI.KEYID = 6
3,520,903 UART: [idev] SUBJECT.KEYID = 7
3,522,068 UART: [idev] UDS.KEYID = 0
3,543,565 UART: [idev] Erasing UDS.KEYID = 0
6,027,242 UART: [idev] Sha1 KeyId Algorithm
6,050,430 UART: [idev] --
6,054,378 UART: [ldev] ++
6,054,959 UART: [ldev] CDI.KEYID = 6
6,055,870 UART: [ldev] SUBJECT.KEYID = 5
6,057,041 UART: [ldev] AUTHORITY.KEYID = 7
6,058,281 UART: [ldev] FE.KEYID = 1
6,098,855 UART: [ldev] Erasing FE.KEYID = 1
8,601,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,454 UART: [ldev] --
10,390,800 UART: [fwproc] Wait for Commands...
10,393,496 UART: [fwproc] Recv command 0x46574c44
10,395,552 UART: [fwproc] Recv'd Img size: 114360 bytes
13,801,923 UART: ROM Fatal Error: 0x000B002A
13,804,998 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
2,035,878 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,610,840 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
2,021,892 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,253 UART:
2,166,638 UART: Running Caliptra ROM ...
2,167,809 UART:
2,167,985 UART: [state] CFI Enabled
2,168,952 UART: [state] LifecycleState = Unprovisioned
2,170,589 UART: [state] DebugLocked = No
2,171,693 UART: [state] WD Timer not started. Device not locked for debugging
2,174,166 UART: [kat] SHA2-256
2,174,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,834 UART: [kat] ++
2,178,282 UART: [kat] sha1
2,178,794 UART: [kat] SHA2-256
2,179,531 UART: [kat] SHA2-384
2,180,195 UART: [kat] SHA2-512-ACC
2,181,078 UART: [kat] ECC-384
3,283,517 UART: [kat] HMAC-384Kdf
3,295,002 UART: [kat] LMS
3,824,515 UART: [kat] --
3,827,614 UART: [cold-reset] ++
3,828,521 UART: [fht] FHT @ 0x50003400
3,840,572 UART: [idev] ++
3,841,130 UART: [idev] CDI.KEYID = 6
3,842,106 UART: [idev] SUBJECT.KEYID = 7
3,843,257 UART: [idev] UDS.KEYID = 0
3,858,093 UART: [idev] Erasing UDS.KEYID = 0
6,319,427 UART: [idev] Sha1 KeyId Algorithm
6,341,746 UART: [idev] --
6,344,552 UART: [ldev] ++
6,345,118 UART: [ldev] CDI.KEYID = 6
6,346,000 UART: [ldev] SUBJECT.KEYID = 5
6,347,210 UART: [ldev] AUTHORITY.KEYID = 7
6,348,489 UART: [ldev] FE.KEYID = 1
6,358,720 UART: [ldev] Erasing FE.KEYID = 1
8,839,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,923 UART: [ldev] --
10,631,036 UART: [fwproc] Wait for Commands...
10,633,840 UART: [fwproc] Recv command 0x46574c44
10,635,930 UART: [fwproc] Recv'd Img size: 114360 bytes
14,038,770 UART: ROM Fatal Error: 0x000B002A
14,041,900 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,021,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,806,198 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,510 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,170,997 UART: [fht] FHT @ 0x50003400
1,173,843 UART: [idev] ++
1,174,011 UART: [idev] CDI.KEYID = 6
1,174,372 UART: [idev] SUBJECT.KEYID = 7
1,174,797 UART: [idev] UDS.KEYID = 0
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,819 UART: [idev] Sha1 KeyId Algorithm
1,208,825 UART: [idev] --
1,209,808 UART: [ldev] ++
1,209,976 UART: [ldev] CDI.KEYID = 6
1,210,340 UART: [ldev] SUBJECT.KEYID = 5
1,210,767 UART: [ldev] AUTHORITY.KEYID = 7
1,211,230 UART: [ldev] FE.KEYID = 1
1,216,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,678 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,755 UART: [fwproc] Recv command 0x46574c44
1,283,488 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,046 UART: ROM Fatal Error: 0x000B002A
2,582,205 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,988 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,935 UART: [ldev] ++
1,209,103 UART: [ldev] CDI.KEYID = 6
1,209,467 UART: [ldev] SUBJECT.KEYID = 5
1,209,894 UART: [ldev] AUTHORITY.KEYID = 7
1,210,357 UART: [ldev] FE.KEYID = 1
1,215,721 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,365 UART: [fwproc] Wait for Commands...
1,282,112 UART: [fwproc] Recv command 0x46574c44
1,282,845 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,687 UART: ROM Fatal Error: 0x000B002A
2,580,846 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,325 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,197,969 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,770 UART: [ldev] ++
1,207,938 UART: [ldev] CDI.KEYID = 6
1,208,302 UART: [ldev] SUBJECT.KEYID = 5
1,208,729 UART: [ldev] AUTHORITY.KEYID = 7
1,209,192 UART: [ldev] FE.KEYID = 1
1,214,276 UART: [ldev] Erasing FE.KEYID = 1
1,239,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,816 UART: [ldev] --
1,279,334 UART: [fwproc] Wait for Commands...
1,280,135 UART: [fwproc] Recv command 0x46574c44
1,280,868 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,650 UART: ROM Fatal Error: 0x000B002A
2,579,809 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,570 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,182,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,300 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,125 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,889 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,719 UART: ROM Fatal Error: 0x000B002A
2,580,878 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,901 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,523 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,272 UART: [ldev] Erasing FE.KEYID = 1
1,241,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,812 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,826 UART: ROM Fatal Error: 0x000B002A
2,579,985 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,182,494 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,339 UART: [ldev] --
1,281,779 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,165 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,527 UART: ROM Fatal Error: 0x000B002A
2,581,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,987 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
2,019,759 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,163,736 UART:
2,164,132 UART: Running Caliptra ROM ...
2,165,210 UART:
2,165,365 UART: [state] CFI Enabled
2,166,344 UART: [state] LifecycleState = Unprovisioned
2,167,988 UART: [state] DebugLocked = No
2,169,121 UART: [state] WD Timer not started. Device not locked for debugging
2,171,592 UART: [kat] SHA2-256
2,172,262 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,268 UART: [kat] ++
2,175,721 UART: [kat] sha1
2,176,234 UART: [kat] SHA2-256
2,176,974 UART: [kat] SHA2-384
2,177,637 UART: [kat] SHA2-512-ACC
2,178,472 UART: [kat] ECC-384
3,776,530 UART: [kat] HMAC-384Kdf
3,802,216 UART: [kat] LMS
4,875,334 UART: [kat] --
4,879,817 UART: [cold-reset] ++
4,881,152 UART: [fht] FHT @ 0x50003400
4,892,874 UART: [idev] ++
4,893,558 UART: [idev] CDI.KEYID = 6
4,894,822 UART: [idev] SUBJECT.KEYID = 7
4,895,936 UART: [idev] UDS.KEYID = 0
4,929,005 UART: [idev] Erasing UDS.KEYID = 0
8,242,036 UART: [idev] Sha1 KeyId Algorithm
8,264,251 UART: [idev] --
8,268,833 UART: [ldev] ++
8,269,400 UART: [ldev] CDI.KEYID = 6
8,270,561 UART: [ldev] SUBJECT.KEYID = 5
8,271,773 UART: [ldev] AUTHORITY.KEYID = 7
8,272,920 UART: [ldev] FE.KEYID = 1
8,317,627 UART: [ldev] Erasing FE.KEYID = 1
11,650,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,921 UART: [ldev] --
14,036,734 UART: [fwproc] Wait for Commands...
14,038,508 UART: [fwproc] Recv command 0x46574c44
14,040,835 UART: [fwproc] Recv'd Img size: 114036 bytes
18,105,065 UART: ROM Fatal Error: 0x000B002A
18,108,488 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,019,273 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,897,031 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,022,788 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,791 UART:
2,167,196 UART: Running Caliptra ROM ...
2,168,369 UART:
2,168,566 UART: [state] CFI Enabled
2,169,532 UART: [state] LifecycleState = Unprovisioned
2,171,165 UART: [state] DebugLocked = No
2,172,264 UART: [state] WD Timer not started. Device not locked for debugging
2,174,728 UART: [kat] SHA2-256
2,175,387 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,386 UART: [kat] ++
2,178,828 UART: [kat] sha1
2,179,334 UART: [kat] SHA2-256
2,180,062 UART: [kat] SHA2-384
2,180,726 UART: [kat] SHA2-512-ACC
2,181,549 UART: [kat] ECC-384
4,097,282 UART: [kat] HMAC-384Kdf
4,107,854 UART: [kat] LMS
5,181,018 UART: [kat] --
5,185,892 UART: [cold-reset] ++
5,188,657 UART: [fht] FHT @ 0x50003400
5,199,633 UART: [idev] ++
5,200,308 UART: [idev] CDI.KEYID = 6
5,201,538 UART: [idev] SUBJECT.KEYID = 7
5,202,964 UART: [idev] UDS.KEYID = 0
5,218,505 UART: [idev] Erasing UDS.KEYID = 0
8,492,131 UART: [idev] Sha1 KeyId Algorithm
8,513,855 UART: [idev] --
8,517,454 UART: [ldev] ++
8,518,110 UART: [ldev] CDI.KEYID = 6
8,519,298 UART: [ldev] SUBJECT.KEYID = 5
8,520,733 UART: [ldev] AUTHORITY.KEYID = 7
8,522,291 UART: [ldev] FE.KEYID = 1
8,533,692 UART: [ldev] Erasing FE.KEYID = 1
11,827,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,077 UART: [ldev] --
14,190,015 UART: [fwproc] Wait for Commands...
14,193,298 UART: [fwproc] Recv command 0x46574c44
14,195,722 UART: [fwproc] Recv'd Img size: 114036 bytes
18,269,719 UART: ROM Fatal Error: 0x000B002A
18,273,137 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,028,062 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,079,005 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,021,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,195 UART:
2,166,606 UART: Running Caliptra ROM ...
2,167,772 UART:
2,167,941 UART: [state] CFI Enabled
2,169,132 UART: [state] LifecycleState = Unprovisioned
2,170,789 UART: [state] DebugLocked = No
2,171,903 UART: [state] WD Timer not started. Device not locked for debugging
2,174,382 UART: [kat] SHA2-256
2,175,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,060 UART: [kat] ++
2,178,557 UART: [kat] sha1
2,179,161 UART: [kat] SHA2-256
2,179,851 UART: [kat] SHA2-384
2,180,510 UART: [kat] SHA2-512-ACC
2,181,501 UART: [kat] ECC-384
2,950,609 UART: [kat] HMAC-384Kdf
2,971,030 UART: [kat] LMS
3,500,499 UART: [kat] --
3,503,923 UART: [cold-reset] ++
3,506,133 UART: [fht] FHT @ 0x50003400
3,517,870 UART: [idev] ++
3,518,442 UART: [idev] CDI.KEYID = 6
3,519,404 UART: [idev] SUBJECT.KEYID = 7
3,520,569 UART: [idev] UDS.KEYID = 0
3,542,058 UART: [idev] Erasing UDS.KEYID = 0
6,025,016 UART: [idev] Sha1 KeyId Algorithm
6,047,124 UART: [idev] --
6,050,960 UART: [ldev] ++
6,051,534 UART: [ldev] CDI.KEYID = 6
6,052,444 UART: [ldev] SUBJECT.KEYID = 5
6,053,607 UART: [ldev] AUTHORITY.KEYID = 7
6,054,895 UART: [ldev] FE.KEYID = 1
6,098,929 UART: [ldev] Erasing FE.KEYID = 1
8,600,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,112 UART: [ldev] --
10,391,381 UART: [fwproc] Wait for Commands...
10,393,374 UART: [fwproc] Recv command 0x46574c44
10,395,415 UART: [fwproc] Recv'd Img size: 114360 bytes
13,790,161 UART: ROM Fatal Error: 0x000B002A
13,793,289 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,023,938 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,755 UART:
2,169,157 UART: Running Caliptra ROM ...
2,170,231 UART:
2,170,384 UART: [state] CFI Enabled
2,171,299 UART: [state] LifecycleState = Unprovisioned
2,172,944 UART: [state] DebugLocked = No
2,173,971 UART: [state] WD Timer not started. Device not locked for debugging
2,176,453 UART: [kat] SHA2-256
2,177,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,130 UART: [kat] ++
2,180,581 UART: [kat] sha1
2,181,095 UART: [kat] SHA2-256
2,181,754 UART: [kat] SHA2-384
2,182,412 UART: [kat] SHA2-512-ACC
2,183,257 UART: [kat] ECC-384
2,948,690 UART: [kat] HMAC-384Kdf
2,973,513 UART: [kat] LMS
3,502,934 UART: [kat] --
3,507,257 UART: [cold-reset] ++
3,509,466 UART: [fht] FHT @ 0x50003400
3,519,581 UART: [idev] ++
3,520,143 UART: [idev] CDI.KEYID = 6
3,521,022 UART: [idev] SUBJECT.KEYID = 7
3,522,240 UART: [idev] UDS.KEYID = 0
3,545,793 UART: [idev] Erasing UDS.KEYID = 0
6,028,625 UART: [idev] Sha1 KeyId Algorithm
6,051,939 UART: [idev] --
6,056,293 UART: [ldev] ++
6,056,878 UART: [ldev] CDI.KEYID = 6
6,057,794 UART: [ldev] SUBJECT.KEYID = 5
6,058,983 UART: [ldev] AUTHORITY.KEYID = 7
6,060,227 UART: [ldev] FE.KEYID = 1
6,101,129 UART: [ldev] Erasing FE.KEYID = 1
8,603,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,988 UART: [ldev] --
10,414,395 UART: [fwproc] Wait for Commands...
10,416,771 UART: [fwproc] Recv command 0x46574c44
10,418,872 UART: [fwproc] Recv'd Img size: 114360 bytes
13,821,390 UART: ROM Fatal Error: 0x000B002A
13,824,523 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,028,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,636,351 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
2,022,678 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,481 UART:
2,167,893 UART: Running Caliptra ROM ...
2,169,057 UART:
2,169,252 UART: [state] CFI Enabled
2,170,220 UART: [state] LifecycleState = Unprovisioned
2,171,862 UART: [state] DebugLocked = No
2,172,965 UART: [state] WD Timer not started. Device not locked for debugging
2,175,440 UART: [kat] SHA2-256
2,176,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,122 UART: [kat] ++
2,179,573 UART: [kat] sha1
2,180,086 UART: [kat] SHA2-256
2,180,850 UART: [kat] SHA2-384
2,181,520 UART: [kat] SHA2-512-ACC
2,182,402 UART: [kat] ECC-384
3,278,677 UART: [kat] HMAC-384Kdf
3,291,429 UART: [kat] LMS
3,820,915 UART: [kat] --
3,826,113 UART: [cold-reset] ++
3,828,429 UART: [fht] FHT @ 0x50003400
3,839,833 UART: [idev] ++
3,840,392 UART: [idev] CDI.KEYID = 6
3,841,298 UART: [idev] SUBJECT.KEYID = 7
3,842,509 UART: [idev] UDS.KEYID = 0
3,856,107 UART: [idev] Erasing UDS.KEYID = 0
6,313,224 UART: [idev] Sha1 KeyId Algorithm
6,335,497 UART: [idev] --
6,339,114 UART: [ldev] ++
6,339,704 UART: [ldev] CDI.KEYID = 6
6,340,614 UART: [ldev] SUBJECT.KEYID = 5
6,341,773 UART: [ldev] AUTHORITY.KEYID = 7
6,343,059 UART: [ldev] FE.KEYID = 1
6,353,063 UART: [ldev] Erasing FE.KEYID = 1
8,824,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,620 UART: [ldev] --
10,616,288 UART: [fwproc] Wait for Commands...
10,618,388 UART: [fwproc] Recv command 0x46574c44
10,620,483 UART: [fwproc] Recv'd Img size: 114360 bytes
14,015,895 UART: ROM Fatal Error: 0x000B002A
14,018,978 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
2,022,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,822,993 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,150 UART: [ldev] ++
1,209,318 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,109 UART: [ldev] AUTHORITY.KEYID = 7
1,210,572 UART: [ldev] FE.KEYID = 1
1,215,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,154 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,717 UART: ROM Fatal Error: 0x000B002A
2,579,876 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,348 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,480 UART: [cold-reset] ++
1,169,958 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,379 UART: ROM Fatal Error: 0x000B002A
2,580,538 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,609 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,780 UART: [kat] HMAC-384Kdf
920,254 UART: [kat] LMS
1,168,566 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,949 UART: [idev] Sha1 KeyId Algorithm
1,207,839 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,272 UART: [ldev] Erasing FE.KEYID = 1
1,240,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,776 UART: [ldev] --
1,280,254 UART: [fwproc] Wait for Commands...
1,281,017 UART: [fwproc] Recv command 0x46574c44
1,281,750 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,530 UART: ROM Fatal Error: 0x000B002A
2,578,689 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,490 UART: [idev] Sha1 KeyId Algorithm
1,208,514 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,687 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,203 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,863 UART: ROM Fatal Error: 0x000B002A
2,580,022 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,759 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,084 UART: [ldev] Erasing FE.KEYID = 1
1,241,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,539 UART: [fwproc] Recv command 0x46574c44
1,282,272 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,422 UART: ROM Fatal Error: 0x000B002A
2,580,581 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,602 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,302 UART: [kat] SHA2-256
902,242 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,803 UART: [kat] HMAC-384Kdf
921,525 UART: [kat] LMS
1,169,837 UART: [kat] --
1,170,490 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,533 UART: [ldev] Erasing FE.KEYID = 1
1,242,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,277 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,865 UART: ROM Fatal Error: 0x000B002A
2,581,024 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,269 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,020,849 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,039 UART:
2,165,446 UART: Running Caliptra ROM ...
2,166,614 UART:
2,166,785 UART: [state] CFI Enabled
2,167,759 UART: [state] LifecycleState = Unprovisioned
2,169,414 UART: [state] DebugLocked = No
2,170,520 UART: [state] WD Timer not started. Device not locked for debugging
2,172,993 UART: [kat] SHA2-256
2,173,662 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,677 UART: [kat] ++
2,177,131 UART: [kat] sha1
2,177,651 UART: [kat] SHA2-256
2,178,497 UART: [kat] SHA2-384
2,179,165 UART: [kat] SHA2-512-ACC
2,179,970 UART: [kat] ECC-384
3,777,190 UART: [kat] HMAC-384Kdf
3,806,057 UART: [kat] LMS
4,879,215 UART: [kat] --
4,884,595 UART: [cold-reset] ++
4,886,100 UART: [fht] FHT @ 0x50003400
4,897,355 UART: [idev] ++
4,898,085 UART: [idev] CDI.KEYID = 6
4,899,275 UART: [idev] SUBJECT.KEYID = 7
4,900,431 UART: [idev] UDS.KEYID = 0
4,932,859 UART: [idev] Erasing UDS.KEYID = 0
8,246,571 UART: [idev] Sha1 KeyId Algorithm
8,268,406 UART: [idev] --
8,271,585 UART: [ldev] ++
8,272,160 UART: [ldev] CDI.KEYID = 6
8,273,402 UART: [ldev] SUBJECT.KEYID = 5
8,274,503 UART: [ldev] AUTHORITY.KEYID = 7
8,275,752 UART: [ldev] FE.KEYID = 1
8,322,874 UART: [ldev] Erasing FE.KEYID = 1
11,660,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,222 UART: [ldev] --
14,041,667 UART: [fwproc] Wait for Commands...
14,044,697 UART: [fwproc] Recv command 0x46574c44
14,046,971 UART: [fwproc] Recv'd Img size: 114036 bytes
18,119,317 UART: ROM Fatal Error: 0x000B0028
18,122,739 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,960 writing to cptra_bootfsm_go
2,023,071 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,857,160 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,022,537 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,410 UART:
2,166,801 UART: Running Caliptra ROM ...
2,167,969 UART:
2,168,136 UART: [state] CFI Enabled
2,169,112 UART: [state] LifecycleState = Unprovisioned
2,170,752 UART: [state] DebugLocked = No
2,171,857 UART: [state] WD Timer not started. Device not locked for debugging
2,174,318 UART: [kat] SHA2-256
2,174,980 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,213 UART: [kat] ++
2,178,670 UART: [kat] sha1
2,179,178 UART: [kat] SHA2-256
2,179,916 UART: [kat] SHA2-384
2,180,578 UART: [kat] SHA2-512-ACC
2,181,454 UART: [kat] ECC-384
4,099,812 UART: [kat] HMAC-384Kdf
4,111,583 UART: [kat] LMS
5,184,730 UART: [kat] --
5,190,512 UART: [cold-reset] ++
5,192,467 UART: [fht] FHT @ 0x50003400
5,204,481 UART: [idev] ++
5,205,209 UART: [idev] CDI.KEYID = 6
5,206,382 UART: [idev] SUBJECT.KEYID = 7
5,207,863 UART: [idev] UDS.KEYID = 0
5,222,576 UART: [idev] Erasing UDS.KEYID = 0
8,494,503 UART: [idev] Sha1 KeyId Algorithm
8,517,442 UART: [idev] --
8,520,441 UART: [ldev] ++
8,521,011 UART: [ldev] CDI.KEYID = 6
8,522,196 UART: [ldev] SUBJECT.KEYID = 5
8,523,690 UART: [ldev] AUTHORITY.KEYID = 7
8,525,251 UART: [ldev] FE.KEYID = 1
8,536,675 UART: [ldev] Erasing FE.KEYID = 1
11,831,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,353 UART: [ldev] --
14,196,435 UART: [fwproc] Wait for Commands...
14,199,232 UART: [fwproc] Recv command 0x46574c44
14,201,551 UART: [fwproc] Recv'd Img size: 114036 bytes
18,268,260 UART: ROM Fatal Error: 0x000B0028
18,271,683 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
2,025,082 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,092,564 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,024,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,685 UART:
2,170,091 UART: Running Caliptra ROM ...
2,171,180 UART:
2,171,333 UART: [state] CFI Enabled
2,172,302 UART: [state] LifecycleState = Unprovisioned
2,173,952 UART: [state] DebugLocked = No
2,174,981 UART: [state] WD Timer not started. Device not locked for debugging
2,177,453 UART: [kat] SHA2-256
2,178,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,123 UART: [kat] ++
2,181,569 UART: [kat] sha1
2,182,079 UART: [kat] SHA2-256
2,182,739 UART: [kat] SHA2-384
2,183,392 UART: [kat] SHA2-512-ACC
2,184,189 UART: [kat] ECC-384
2,950,943 UART: [kat] HMAC-384Kdf
2,972,960 UART: [kat] LMS
3,502,367 UART: [kat] --
3,506,202 UART: [cold-reset] ++
3,507,929 UART: [fht] FHT @ 0x50003400
3,519,414 UART: [idev] ++
3,519,983 UART: [idev] CDI.KEYID = 6
3,520,951 UART: [idev] SUBJECT.KEYID = 7
3,522,113 UART: [idev] UDS.KEYID = 0
3,545,327 UART: [idev] Erasing UDS.KEYID = 0
6,027,005 UART: [idev] Sha1 KeyId Algorithm
6,051,164 UART: [idev] --
6,054,616 UART: [ldev] ++
6,055,258 UART: [ldev] CDI.KEYID = 6
6,056,151 UART: [ldev] SUBJECT.KEYID = 5
6,057,200 UART: [ldev] AUTHORITY.KEYID = 7
6,058,576 UART: [ldev] FE.KEYID = 1
6,099,995 UART: [ldev] Erasing FE.KEYID = 1
8,603,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,714 UART: [ldev] --
10,412,635 UART: [fwproc] Wait for Commands...
10,414,521 UART: [fwproc] Recv command 0x46574c44
10,416,620 UART: [fwproc] Recv'd Img size: 114360 bytes
13,810,761 UART: ROM Fatal Error: 0x000B0028
13,813,892 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,021,822 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,304 UART:
2,166,714 UART: Running Caliptra ROM ...
2,167,889 UART:
2,168,060 UART: [state] CFI Enabled
2,169,024 UART: [state] LifecycleState = Unprovisioned
2,170,672 UART: [state] DebugLocked = No
2,171,779 UART: [state] WD Timer not started. Device not locked for debugging
2,174,264 UART: [kat] SHA2-256
2,174,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,944 UART: [kat] ++
2,178,415 UART: [kat] sha1
2,178,934 UART: [kat] SHA2-256
2,179,592 UART: [kat] SHA2-384
2,180,247 UART: [kat] SHA2-512-ACC
2,181,238 UART: [kat] ECC-384
2,948,913 UART: [kat] HMAC-384Kdf
2,972,214 UART: [kat] LMS
3,501,663 UART: [kat] --
3,506,845 UART: [cold-reset] ++
3,507,857 UART: [fht] FHT @ 0x50003400
3,518,754 UART: [idev] ++
3,519,322 UART: [idev] CDI.KEYID = 6
3,520,257 UART: [idev] SUBJECT.KEYID = 7
3,521,475 UART: [idev] UDS.KEYID = 0
3,544,015 UART: [idev] Erasing UDS.KEYID = 0
6,026,275 UART: [idev] Sha1 KeyId Algorithm
6,048,782 UART: [idev] --
6,053,729 UART: [ldev] ++
6,054,320 UART: [ldev] CDI.KEYID = 6
6,055,248 UART: [ldev] SUBJECT.KEYID = 5
6,056,412 UART: [ldev] AUTHORITY.KEYID = 7
6,057,646 UART: [ldev] FE.KEYID = 1
6,100,761 UART: [ldev] Erasing FE.KEYID = 1
8,605,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,064 UART: [ldev] --
10,413,084 UART: [fwproc] Wait for Commands...
10,415,074 UART: [fwproc] Recv command 0x46574c44
10,417,183 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,448 UART: ROM Fatal Error: 0x000B0028
13,821,589 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,024,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,594,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,021,870 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,129 UART:
2,166,518 UART: Running Caliptra ROM ...
2,167,685 UART:
2,167,856 UART: [state] CFI Enabled
2,168,821 UART: [state] LifecycleState = Unprovisioned
2,170,459 UART: [state] DebugLocked = No
2,171,566 UART: [state] WD Timer not started. Device not locked for debugging
2,174,263 UART: [kat] SHA2-256
2,174,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,956 UART: [kat] ++
2,178,408 UART: [kat] sha1
2,178,944 UART: [kat] SHA2-256
2,179,602 UART: [kat] SHA2-384
2,180,256 UART: [kat] SHA2-512-ACC
2,181,053 UART: [kat] ECC-384
3,280,405 UART: [kat] HMAC-384Kdf
3,293,159 UART: [kat] LMS
3,822,682 UART: [kat] --
3,827,697 UART: [cold-reset] ++
3,829,588 UART: [fht] FHT @ 0x50003400
3,839,597 UART: [idev] ++
3,840,157 UART: [idev] CDI.KEYID = 6
3,841,171 UART: [idev] SUBJECT.KEYID = 7
3,842,324 UART: [idev] UDS.KEYID = 0
3,859,718 UART: [idev] Erasing UDS.KEYID = 0
6,316,853 UART: [idev] Sha1 KeyId Algorithm
6,338,952 UART: [idev] --
6,342,140 UART: [ldev] ++
6,342,725 UART: [ldev] CDI.KEYID = 6
6,343,644 UART: [ldev] SUBJECT.KEYID = 5
6,344,805 UART: [ldev] AUTHORITY.KEYID = 7
6,346,089 UART: [ldev] FE.KEYID = 1
6,356,302 UART: [ldev] Erasing FE.KEYID = 1
8,829,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,500 UART: [ldev] --
10,619,056 UART: [fwproc] Wait for Commands...
10,621,861 UART: [fwproc] Recv command 0x46574c44
10,623,952 UART: [fwproc] Recv'd Img size: 114360 bytes
14,027,325 UART: ROM Fatal Error: 0x000B0028
14,030,441 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,021,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,819,121 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,733 UART: [fht] FHT @ 0x50003400
1,173,417 UART: [idev] ++
1,173,585 UART: [idev] CDI.KEYID = 6
1,173,946 UART: [idev] SUBJECT.KEYID = 7
1,174,371 UART: [idev] UDS.KEYID = 0
1,182,409 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,374 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,613 UART: ROM Fatal Error: 0x000B0028
2,580,770 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,241 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [kat] SHA2-256
891,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,148 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] --
1,208,651 UART: [ldev] ++
1,208,819 UART: [ldev] CDI.KEYID = 6
1,209,183 UART: [ldev] SUBJECT.KEYID = 5
1,209,610 UART: [ldev] AUTHORITY.KEYID = 7
1,210,073 UART: [ldev] FE.KEYID = 1
1,215,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,177 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,604 UART: ROM Fatal Error: 0x000B0028
2,580,761 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,242 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
916,280 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,395 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,750 UART: [fwproc] Wait for Commands...
1,281,449 UART: [fwproc] Recv command 0x46574c44
1,282,182 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,785 UART: ROM Fatal Error: 0x000B0028
2,578,942 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,725 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,094 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,981 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,120 UART: ROM Fatal Error: 0x000B0028
2,580,277 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,656 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,843 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,490 UART: [ldev] Erasing FE.KEYID = 1
1,241,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,624 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,967 UART: ROM Fatal Error: 0x000B0028
2,580,124 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,537 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,336 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,027 UART: [ldev] ++
1,209,195 UART: [ldev] CDI.KEYID = 6
1,209,559 UART: [ldev] SUBJECT.KEYID = 5
1,209,986 UART: [ldev] AUTHORITY.KEYID = 7
1,210,449 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,529 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,349 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,422 UART: ROM Fatal Error: 0x000B0028
2,580,579 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,060 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
2,021,008 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,163 UART:
2,165,556 UART: Running Caliptra ROM ...
2,166,735 UART:
2,166,908 UART: [state] CFI Enabled
2,167,880 UART: [state] LifecycleState = Unprovisioned
2,169,521 UART: [state] DebugLocked = No
2,170,623 UART: [state] WD Timer not started. Device not locked for debugging
2,173,093 UART: [kat] SHA2-256
2,173,790 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,807 UART: [kat] ++
2,177,259 UART: [kat] sha1
2,177,774 UART: [kat] SHA2-256
2,178,516 UART: [kat] SHA2-384
2,179,180 UART: [kat] SHA2-512-ACC
2,180,063 UART: [kat] ECC-384
3,776,048 UART: [kat] HMAC-384Kdf
3,803,568 UART: [kat] LMS
4,876,745 UART: [kat] --
4,881,081 UART: [cold-reset] ++
4,882,892 UART: [fht] FHT @ 0x50003400
4,894,966 UART: [idev] ++
4,895,641 UART: [idev] CDI.KEYID = 6
4,896,798 UART: [idev] SUBJECT.KEYID = 7
4,898,014 UART: [idev] UDS.KEYID = 0
4,930,616 UART: [idev] Erasing UDS.KEYID = 0
8,242,588 UART: [idev] Sha1 KeyId Algorithm
8,265,345 UART: [idev] --
8,269,340 UART: [ldev] ++
8,269,908 UART: [ldev] CDI.KEYID = 6
8,271,209 UART: [ldev] SUBJECT.KEYID = 5
8,272,258 UART: [ldev] AUTHORITY.KEYID = 7
8,273,504 UART: [ldev] FE.KEYID = 1
8,316,966 UART: [ldev] Erasing FE.KEYID = 1
11,652,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,966 UART: [ldev] --
14,035,209 UART: [fwproc] Wait for Commands...
14,037,649 UART: [fwproc] Recv command 0x46574c44
14,039,978 UART: [fwproc] Recv'd Img size: 114036 bytes
18,107,292 UART: ROM Fatal Error: 0x000B0028
18,110,709 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
2,019,819 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,869,129 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,022,531 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,488 UART:
2,166,901 UART: Running Caliptra ROM ...
2,168,101 UART:
2,168,277 UART: [state] CFI Enabled
2,169,258 UART: [state] LifecycleState = Unprovisioned
2,170,904 UART: [state] DebugLocked = No
2,172,012 UART: [state] WD Timer not started. Device not locked for debugging
2,174,485 UART: [kat] SHA2-256
2,175,148 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,154 UART: [kat] ++
2,178,598 UART: [kat] sha1
2,179,107 UART: [kat] SHA2-256
2,179,840 UART: [kat] SHA2-384
2,180,504 UART: [kat] SHA2-512-ACC
2,181,347 UART: [kat] ECC-384
4,097,873 UART: [kat] HMAC-384Kdf
4,110,012 UART: [kat] LMS
5,183,166 UART: [kat] --
5,186,558 UART: [cold-reset] ++
5,188,442 UART: [fht] FHT @ 0x50003400
5,200,286 UART: [idev] ++
5,200,973 UART: [idev] CDI.KEYID = 6
5,202,209 UART: [idev] SUBJECT.KEYID = 7
5,203,637 UART: [idev] UDS.KEYID = 0
5,219,611 UART: [idev] Erasing UDS.KEYID = 0
8,491,922 UART: [idev] Sha1 KeyId Algorithm
8,513,267 UART: [idev] --
8,516,835 UART: [ldev] ++
8,517,456 UART: [ldev] CDI.KEYID = 6
8,518,636 UART: [ldev] SUBJECT.KEYID = 5
8,520,133 UART: [ldev] AUTHORITY.KEYID = 7
8,521,699 UART: [ldev] FE.KEYID = 1
8,534,016 UART: [ldev] Erasing FE.KEYID = 1
11,827,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,151 UART: [ldev] --
14,194,033 UART: [fwproc] Wait for Commands...
14,196,564 UART: [fwproc] Recv command 0x46574c44
14,198,884 UART: [fwproc] Recv'd Img size: 114036 bytes
18,275,260 UART: ROM Fatal Error: 0x000B0028
18,278,690 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,032,659 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,268 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,022,286 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,784 UART:
2,167,215 UART: Running Caliptra ROM ...
2,168,382 UART:
2,168,555 UART: [state] CFI Enabled
2,169,526 UART: [state] LifecycleState = Unprovisioned
2,171,395 UART: [state] DebugLocked = No
2,172,519 UART: [state] WD Timer not started. Device not locked for debugging
2,175,076 UART: [kat] SHA2-256
2,175,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,766 UART: [kat] ++
2,179,219 UART: [kat] sha1
2,179,734 UART: [kat] SHA2-256
2,180,478 UART: [kat] SHA2-384
2,181,144 UART: [kat] SHA2-512-ACC
2,182,028 UART: [kat] ECC-384
2,949,806 UART: [kat] HMAC-384Kdf
2,975,004 UART: [kat] LMS
3,504,461 UART: [kat] --
3,509,642 UART: [cold-reset] ++
3,510,978 UART: [fht] FHT @ 0x50003400
3,522,012 UART: [idev] ++
3,522,581 UART: [idev] CDI.KEYID = 6
3,523,542 UART: [idev] SUBJECT.KEYID = 7
3,524,704 UART: [idev] UDS.KEYID = 0
3,546,033 UART: [idev] Erasing UDS.KEYID = 0
6,027,761 UART: [idev] Sha1 KeyId Algorithm
6,050,878 UART: [idev] --
6,054,232 UART: [ldev] ++
6,054,804 UART: [ldev] CDI.KEYID = 6
6,055,693 UART: [ldev] SUBJECT.KEYID = 5
6,056,913 UART: [ldev] AUTHORITY.KEYID = 7
6,058,156 UART: [ldev] FE.KEYID = 1
6,101,689 UART: [ldev] Erasing FE.KEYID = 1
8,602,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,938 UART: [ldev] --
10,414,047 UART: [fwproc] Wait for Commands...
10,415,701 UART: [fwproc] Recv command 0x46574c44
10,417,808 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,996 UART: ROM Fatal Error: 0x000B0028
13,823,128 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,023,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,240 UART:
2,168,639 UART: Running Caliptra ROM ...
2,169,816 UART:
2,169,982 UART: [state] CFI Enabled
2,170,949 UART: [state] LifecycleState = Unprovisioned
2,172,602 UART: [state] DebugLocked = No
2,173,714 UART: [state] WD Timer not started. Device not locked for debugging
2,176,192 UART: [kat] SHA2-256
2,176,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,872 UART: [kat] ++
2,180,319 UART: [kat] sha1
2,180,833 UART: [kat] SHA2-256
2,181,573 UART: [kat] SHA2-384
2,182,237 UART: [kat] SHA2-512-ACC
2,183,095 UART: [kat] ECC-384
2,926,854 UART: [kat] HMAC-384Kdf
2,951,018 UART: [kat] LMS
3,480,441 UART: [kat] --
3,483,572 UART: [cold-reset] ++
3,485,665 UART: [fht] FHT @ 0x50003400
3,496,644 UART: [idev] ++
3,497,217 UART: [idev] CDI.KEYID = 6
3,498,128 UART: [idev] SUBJECT.KEYID = 7
3,499,380 UART: [idev] UDS.KEYID = 0
3,523,025 UART: [idev] Erasing UDS.KEYID = 0
6,005,078 UART: [idev] Sha1 KeyId Algorithm
6,028,102 UART: [idev] --
6,031,992 UART: [ldev] ++
6,032,563 UART: [ldev] CDI.KEYID = 6
6,033,470 UART: [ldev] SUBJECT.KEYID = 5
6,034,574 UART: [ldev] AUTHORITY.KEYID = 7
6,035,928 UART: [ldev] FE.KEYID = 1
6,079,473 UART: [ldev] Erasing FE.KEYID = 1
8,580,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,544 UART: [ldev] --
10,393,639 UART: [fwproc] Wait for Commands...
10,395,316 UART: [fwproc] Recv command 0x46574c44
10,397,364 UART: [fwproc] Recv'd Img size: 114360 bytes
13,792,722 UART: ROM Fatal Error: 0x000B0028
13,795,860 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,026,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,590,518 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
2,021,610 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,165,970 UART:
2,166,356 UART: Running Caliptra ROM ...
2,167,512 UART:
2,167,681 UART: [state] CFI Enabled
2,168,644 UART: [state] LifecycleState = Unprovisioned
2,170,279 UART: [state] DebugLocked = No
2,171,381 UART: [state] WD Timer not started. Device not locked for debugging
2,173,849 UART: [kat] SHA2-256
2,174,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,511 UART: [kat] ++
2,177,957 UART: [kat] sha1
2,178,466 UART: [kat] SHA2-256
2,179,199 UART: [kat] SHA2-384
2,179,863 UART: [kat] SHA2-512-ACC
2,180,710 UART: [kat] ECC-384
3,281,283 UART: [kat] HMAC-384Kdf
3,292,767 UART: [kat] LMS
3,822,243 UART: [kat] --
3,826,310 UART: [cold-reset] ++
3,828,515 UART: [fht] FHT @ 0x50003400
3,840,732 UART: [idev] ++
3,841,301 UART: [idev] CDI.KEYID = 6
3,842,212 UART: [idev] SUBJECT.KEYID = 7
3,843,424 UART: [idev] UDS.KEYID = 0
3,856,316 UART: [idev] Erasing UDS.KEYID = 0
6,314,833 UART: [idev] Sha1 KeyId Algorithm
6,337,889 UART: [idev] --
6,341,124 UART: [ldev] ++
6,341,689 UART: [ldev] CDI.KEYID = 6
6,342,595 UART: [ldev] SUBJECT.KEYID = 5
6,343,807 UART: [ldev] AUTHORITY.KEYID = 7
6,345,035 UART: [ldev] FE.KEYID = 1
6,355,808 UART: [ldev] Erasing FE.KEYID = 1
8,830,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,650 UART: [ldev] --
10,622,898 UART: [fwproc] Wait for Commands...
10,626,027 UART: [fwproc] Recv command 0x46574c44
10,628,074 UART: [fwproc] Recv'd Img size: 114360 bytes
14,020,325 UART: ROM Fatal Error: 0x000B0028
14,023,454 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
2,021,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,809,468 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,518 UART: [kat] HMAC-384Kdf
921,028 UART: [kat] LMS
1,169,340 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,249 UART: [fwproc] Recv command 0x46574c44
1,281,982 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,157 UART: ROM Fatal Error: 0x000B0028
2,580,314 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,143 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,375 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,406 UART: [idev] --
1,209,409 UART: [ldev] ++
1,209,577 UART: [ldev] CDI.KEYID = 6
1,209,941 UART: [ldev] SUBJECT.KEYID = 5
1,210,368 UART: [ldev] AUTHORITY.KEYID = 7
1,210,831 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,775 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,307 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,113 UART: ROM Fatal Error: 0x000B0028
2,582,270 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,536 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,839 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,547 UART: [fwproc] Recv command 0x46574c44
1,282,280 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,453 UART: ROM Fatal Error: 0x000B0028
2,580,610 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,111 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,433 UART: [kat] SHA2-256
891,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,112 UART: [kat] ++
896,264 UART: [kat] sha1
900,568 UART: [kat] SHA2-256
902,508 UART: [kat] SHA2-384
905,231 UART: [kat] SHA2-512-ACC
907,132 UART: [kat] ECC-384
917,131 UART: [kat] HMAC-384Kdf
921,651 UART: [kat] LMS
1,169,963 UART: [kat] --
1,170,936 UART: [cold-reset] ++
1,171,512 UART: [fht] FHT @ 0x50003400
1,174,026 UART: [idev] ++
1,174,194 UART: [idev] CDI.KEYID = 6
1,174,555 UART: [idev] SUBJECT.KEYID = 7
1,174,980 UART: [idev] UDS.KEYID = 0
1,183,104 UART: [idev] Erasing UDS.KEYID = 0
1,200,194 UART: [idev] Sha1 KeyId Algorithm
1,209,014 UART: [idev] --
1,209,987 UART: [ldev] ++
1,210,155 UART: [ldev] CDI.KEYID = 6
1,210,519 UART: [ldev] SUBJECT.KEYID = 5
1,210,946 UART: [ldev] AUTHORITY.KEYID = 7
1,211,409 UART: [ldev] FE.KEYID = 1
1,216,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,693 UART: [ldev] --
1,282,017 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,492 UART: ROM Fatal Error: 0x000B0028
2,580,649 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,548 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,170,127 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,003 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,242,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,956 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,021 UART: [fwproc] Recv command 0x46574c44
1,282,754 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,659 UART: ROM Fatal Error: 0x000B0028
2,579,816 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,027 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,103 UART: [kat] LMS
1,169,415 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,005 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,218 UART: ROM Fatal Error: 0x000B0028
2,581,375 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,874 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,020,832 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,413 UART:
2,165,851 UART: Running Caliptra ROM ...
2,166,927 UART:
2,167,080 UART: [state] CFI Enabled
2,168,080 UART: [state] LifecycleState = Unprovisioned
2,169,664 UART: [state] DebugLocked = No
2,170,783 UART: [state] WD Timer not started. Device not locked for debugging
2,173,265 UART: [kat] SHA2-256
2,173,932 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,970 UART: [kat] ++
2,177,417 UART: [kat] sha1
2,177,927 UART: [kat] SHA2-256
2,178,585 UART: [kat] SHA2-384
2,179,244 UART: [kat] SHA2-512-ACC
2,180,131 UART: [kat] ECC-384
3,773,269 UART: [kat] HMAC-384Kdf
3,803,276 UART: [kat] LMS
4,876,399 UART: [kat] --
4,882,749 UART: [cold-reset] ++
4,883,770 UART: [fht] FHT @ 0x50003400
4,895,647 UART: [idev] ++
4,896,323 UART: [idev] CDI.KEYID = 6
4,897,482 UART: [idev] SUBJECT.KEYID = 7
4,898,693 UART: [idev] UDS.KEYID = 0
4,931,170 UART: [idev] Erasing UDS.KEYID = 0
8,243,482 UART: [idev] Sha1 KeyId Algorithm
8,264,397 UART: [idev] --
8,270,064 UART: [ldev] ++
8,270,635 UART: [ldev] CDI.KEYID = 6
8,271,817 UART: [ldev] SUBJECT.KEYID = 5
8,273,027 UART: [ldev] AUTHORITY.KEYID = 7
8,274,163 UART: [ldev] FE.KEYID = 1
8,317,494 UART: [ldev] Erasing FE.KEYID = 1
11,652,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,083 UART: [ldev] --
14,037,599 UART: [fwproc] Wait for Commands...
14,039,591 UART: [fwproc] Recv command 0x46574c44
14,041,879 UART: [fwproc] Recv'd Img size: 114036 bytes
18,116,127 UART: ROM Fatal Error: 0x000B0029
18,119,576 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,019,446 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,892,609 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,021,463 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,165,615 UART:
2,166,002 UART: Running Caliptra ROM ...
2,167,171 UART:
2,167,331 UART: [state] CFI Enabled
2,168,299 UART: [state] LifecycleState = Unprovisioned
2,169,937 UART: [state] DebugLocked = No
2,171,043 UART: [state] WD Timer not started. Device not locked for debugging
2,173,511 UART: [kat] SHA2-256
2,174,172 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,184 UART: [kat] ++
2,177,631 UART: [kat] sha1
2,178,138 UART: [kat] SHA2-256
2,178,808 UART: [kat] SHA2-384
2,179,461 UART: [kat] SHA2-512-ACC
2,180,343 UART: [kat] ECC-384
4,098,507 UART: [kat] HMAC-384Kdf
4,110,540 UART: [kat] LMS
5,183,692 UART: [kat] --
5,187,370 UART: [cold-reset] ++
5,188,769 UART: [fht] FHT @ 0x50003400
5,200,555 UART: [idev] ++
5,201,285 UART: [idev] CDI.KEYID = 6
5,202,395 UART: [idev] SUBJECT.KEYID = 7
5,203,877 UART: [idev] UDS.KEYID = 0
5,220,283 UART: [idev] Erasing UDS.KEYID = 0
8,491,389 UART: [idev] Sha1 KeyId Algorithm
8,512,991 UART: [idev] --
8,515,893 UART: [ldev] ++
8,516,482 UART: [ldev] CDI.KEYID = 6
8,517,664 UART: [ldev] SUBJECT.KEYID = 5
8,519,097 UART: [ldev] AUTHORITY.KEYID = 7
8,520,657 UART: [ldev] FE.KEYID = 1
8,532,275 UART: [ldev] Erasing FE.KEYID = 1
11,822,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,110 UART: [ldev] --
14,190,475 UART: [fwproc] Wait for Commands...
14,193,096 UART: [fwproc] Recv command 0x46574c44
14,195,377 UART: [fwproc] Recv'd Img size: 114036 bytes
18,269,968 UART: ROM Fatal Error: 0x000B0029
18,273,418 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,022,469 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,081,324 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,933 writing to cptra_bootfsm_go
2,023,486 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,036 UART:
2,168,434 UART: Running Caliptra ROM ...
2,169,509 UART:
2,169,664 UART: [state] CFI Enabled
2,170,638 UART: [state] LifecycleState = Unprovisioned
2,172,308 UART: [state] DebugLocked = No
2,173,337 UART: [state] WD Timer not started. Device not locked for debugging
2,175,806 UART: [kat] SHA2-256
2,176,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,477 UART: [kat] ++
2,179,925 UART: [kat] sha1
2,180,438 UART: [kat] SHA2-256
2,181,095 UART: [kat] SHA2-384
2,181,841 UART: [kat] SHA2-512-ACC
2,182,649 UART: [kat] ECC-384
2,947,760 UART: [kat] HMAC-384Kdf
2,971,637 UART: [kat] LMS
3,501,092 UART: [kat] --
3,505,524 UART: [cold-reset] ++
3,507,836 UART: [fht] FHT @ 0x50003400
3,519,354 UART: [idev] ++
3,519,947 UART: [idev] CDI.KEYID = 6
3,520,875 UART: [idev] SUBJECT.KEYID = 7
3,522,186 UART: [idev] UDS.KEYID = 0
3,543,034 UART: [idev] Erasing UDS.KEYID = 0
6,028,965 UART: [idev] Sha1 KeyId Algorithm
6,051,824 UART: [idev] --
6,055,179 UART: [ldev] ++
6,055,756 UART: [ldev] CDI.KEYID = 6
6,056,664 UART: [ldev] SUBJECT.KEYID = 5
6,057,832 UART: [ldev] AUTHORITY.KEYID = 7
6,059,125 UART: [ldev] FE.KEYID = 1
6,097,866 UART: [ldev] Erasing FE.KEYID = 1
8,604,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,261 UART: [ldev] --
10,412,247 UART: [fwproc] Wait for Commands...
10,415,322 UART: [fwproc] Recv command 0x46574c44
10,417,368 UART: [fwproc] Recv'd Img size: 114360 bytes
13,809,445 UART: ROM Fatal Error: 0x000B0029
13,812,581 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,021,189 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,047 UART:
2,166,465 UART: Running Caliptra ROM ...
2,167,635 UART:
2,167,808 UART: [state] CFI Enabled
2,168,781 UART: [state] LifecycleState = Unprovisioned
2,170,432 UART: [state] DebugLocked = No
2,171,544 UART: [state] WD Timer not started. Device not locked for debugging
2,174,029 UART: [kat] SHA2-256
2,174,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,744 UART: [kat] ++
2,178,248 UART: [kat] sha1
2,178,762 UART: [kat] SHA2-256
2,179,416 UART: [kat] SHA2-384
2,180,074 UART: [kat] SHA2-512-ACC
2,180,874 UART: [kat] ECC-384
2,947,991 UART: [kat] HMAC-384Kdf
2,975,029 UART: [kat] LMS
3,504,446 UART: [kat] --
3,510,383 UART: [cold-reset] ++
3,512,535 UART: [fht] FHT @ 0x50003400
3,522,326 UART: [idev] ++
3,522,893 UART: [idev] CDI.KEYID = 6
3,523,875 UART: [idev] SUBJECT.KEYID = 7
3,525,038 UART: [idev] UDS.KEYID = 0
3,547,204 UART: [idev] Erasing UDS.KEYID = 0
6,030,425 UART: [idev] Sha1 KeyId Algorithm
6,052,601 UART: [idev] --
6,056,935 UART: [ldev] ++
6,057,512 UART: [ldev] CDI.KEYID = 6
6,058,397 UART: [ldev] SUBJECT.KEYID = 5
6,059,563 UART: [ldev] AUTHORITY.KEYID = 7
6,060,862 UART: [ldev] FE.KEYID = 1
6,105,080 UART: [ldev] Erasing FE.KEYID = 1
8,611,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,832 UART: [ldev] --
10,415,964 UART: [fwproc] Wait for Commands...
10,418,677 UART: [fwproc] Recv command 0x46574c44
10,420,783 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,072 UART: ROM Fatal Error: 0x000B0029
13,819,222 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,024,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,609,392 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,023,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,206 UART:
2,168,627 UART: Running Caliptra ROM ...
2,169,705 UART:
2,169,858 UART: [state] CFI Enabled
2,170,824 UART: [state] LifecycleState = Unprovisioned
2,172,465 UART: [state] DebugLocked = No
2,173,487 UART: [state] WD Timer not started. Device not locked for debugging
2,175,965 UART: [kat] SHA2-256
2,176,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,679 UART: [kat] ++
2,180,131 UART: [kat] sha1
2,180,642 UART: [kat] SHA2-256
2,181,381 UART: [kat] SHA2-384
2,182,044 UART: [kat] SHA2-512-ACC
2,182,926 UART: [kat] ECC-384
3,276,797 UART: [kat] HMAC-384Kdf
3,289,178 UART: [kat] LMS
3,818,693 UART: [kat] --
3,823,951 UART: [cold-reset] ++
3,826,372 UART: [fht] FHT @ 0x50003400
3,836,371 UART: [idev] ++
3,836,938 UART: [idev] CDI.KEYID = 6
3,837,877 UART: [idev] SUBJECT.KEYID = 7
3,839,090 UART: [idev] UDS.KEYID = 0
3,856,032 UART: [idev] Erasing UDS.KEYID = 0
6,312,899 UART: [idev] Sha1 KeyId Algorithm
6,336,069 UART: [idev] --
6,339,144 UART: [ldev] ++
6,339,708 UART: [ldev] CDI.KEYID = 6
6,340,645 UART: [ldev] SUBJECT.KEYID = 5
6,341,854 UART: [ldev] AUTHORITY.KEYID = 7
6,343,078 UART: [ldev] FE.KEYID = 1
6,353,104 UART: [ldev] Erasing FE.KEYID = 1
8,826,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,430 UART: [ldev] --
10,617,242 UART: [fwproc] Wait for Commands...
10,620,270 UART: [fwproc] Recv command 0x46574c44
10,622,315 UART: [fwproc] Recv'd Img size: 114360 bytes
14,022,815 UART: ROM Fatal Error: 0x000B0029
14,025,891 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,022,360 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,818,154 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,629 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,417 UART: [idev] ++
1,172,585 UART: [idev] CDI.KEYID = 6
1,172,946 UART: [idev] SUBJECT.KEYID = 7
1,173,371 UART: [idev] UDS.KEYID = 0
1,181,277 UART: [idev] Erasing UDS.KEYID = 0
1,198,119 UART: [idev] Sha1 KeyId Algorithm
1,207,009 UART: [idev] --
1,208,024 UART: [ldev] ++
1,208,192 UART: [ldev] CDI.KEYID = 6
1,208,556 UART: [ldev] SUBJECT.KEYID = 5
1,208,983 UART: [ldev] AUTHORITY.KEYID = 7
1,209,446 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,534 UART: [ldev] --
1,280,830 UART: [fwproc] Wait for Commands...
1,281,449 UART: [fwproc] Recv command 0x46574c44
1,282,182 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,345 UART: ROM Fatal Error: 0x000B0029
2,579,502 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,391 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,647 UART: [kat] LMS
1,168,959 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,196 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,181,840 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,209,171 UART: [ldev] ++
1,209,339 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,282,151 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,386 UART: ROM Fatal Error: 0x000B0029
2,581,543 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,435,070 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,209,164 UART: [ldev] ++
1,209,332 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,123 UART: [ldev] AUTHORITY.KEYID = 7
1,210,586 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,250 UART: [ldev] --
1,281,750 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,599 UART: ROM Fatal Error: 0x000B0029
2,579,756 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,369 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,107 UART: [kat] LMS
1,169,419 UART: [kat] --
1,170,356 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,640 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,253 UART: [ldev] --
1,281,607 UART: [fwproc] Wait for Commands...
1,282,380 UART: [fwproc] Recv command 0x46574c44
1,283,113 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,694 UART: ROM Fatal Error: 0x000B0029
2,580,851 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,372 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,851 UART: [kat] ++
895,003 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,176 UART: [kat] HMAC-384Kdf
919,796 UART: [kat] LMS
1,168,108 UART: [kat] --
1,168,969 UART: [cold-reset] ++
1,169,353 UART: [fht] FHT @ 0x50003400
1,172,135 UART: [idev] ++
1,172,303 UART: [idev] CDI.KEYID = 6
1,172,664 UART: [idev] SUBJECT.KEYID = 7
1,173,089 UART: [idev] UDS.KEYID = 0
1,181,429 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,403 UART: [idev] --
1,208,394 UART: [ldev] ++
1,208,562 UART: [ldev] CDI.KEYID = 6
1,208,926 UART: [ldev] SUBJECT.KEYID = 5
1,209,353 UART: [ldev] AUTHORITY.KEYID = 7
1,209,816 UART: [ldev] FE.KEYID = 1
1,215,316 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,236 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,417 UART: [fwproc] Recv command 0x46574c44
1,282,150 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,101 UART: ROM Fatal Error: 0x000B0029
2,580,258 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,481 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,761 UART: [state] LifecycleState = Unprovisioned
85,416 UART: [state] DebugLocked = No
86,088 UART: [state] WD Timer not started. Device not locked for debugging
87,281 UART: [kat] SHA2-256
890,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,960 UART: [kat] ++
895,112 UART: [kat] sha1
899,310 UART: [kat] SHA2-256
901,250 UART: [kat] SHA2-384
903,765 UART: [kat] SHA2-512-ACC
905,666 UART: [kat] ECC-384
915,497 UART: [kat] HMAC-384Kdf
920,217 UART: [kat] LMS
1,168,529 UART: [kat] --
1,169,392 UART: [cold-reset] ++
1,169,818 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,181,476 UART: [idev] Erasing UDS.KEYID = 0
1,198,736 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,815 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,282,068 UART: [fwproc] Recv command 0x46574c44
1,282,801 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,236 UART: ROM Fatal Error: 0x000B0029
2,581,393 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,180 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,024,796 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,168,830 UART:
2,169,220 UART: Running Caliptra ROM ...
2,170,389 UART:
2,170,557 UART: [state] CFI Enabled
2,171,531 UART: [state] LifecycleState = Unprovisioned
2,173,173 UART: [state] DebugLocked = No
2,174,461 UART: [state] WD Timer not started. Device not locked for debugging
2,176,952 UART: [kat] SHA2-256
2,177,627 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,636 UART: [kat] ++
2,181,107 UART: [kat] sha1
2,181,625 UART: [kat] SHA2-256
2,182,363 UART: [kat] SHA2-384
2,183,031 UART: [kat] SHA2-512-ACC
2,183,911 UART: [kat] ECC-384
3,775,608 UART: [kat] HMAC-384Kdf
3,803,457 UART: [kat] LMS
4,876,600 UART: [kat] --
4,880,466 UART: [cold-reset] ++
4,883,266 UART: [fht] FHT @ 0x50003400
4,894,519 UART: [idev] ++
4,895,234 UART: [idev] CDI.KEYID = 6
4,896,347 UART: [idev] SUBJECT.KEYID = 7
4,897,565 UART: [idev] UDS.KEYID = 0
4,929,820 UART: [idev] Erasing UDS.KEYID = 0
8,242,852 UART: [idev] Sha1 KeyId Algorithm
8,264,763 UART: [idev] --
8,267,598 UART: [ldev] ++
8,268,171 UART: [ldev] CDI.KEYID = 6
8,269,412 UART: [ldev] SUBJECT.KEYID = 5
8,270,515 UART: [ldev] AUTHORITY.KEYID = 7
8,271,743 UART: [ldev] FE.KEYID = 1
8,316,680 UART: [ldev] Erasing FE.KEYID = 1
11,651,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,899 UART: [ldev] --
14,036,307 UART: [fwproc] Wait for Commands...
14,039,379 UART: [fwproc] Recv command 0x46574c44
14,041,654 UART: [fwproc] Recv'd Img size: 114036 bytes
18,113,563 UART: ROM Fatal Error: 0x000B0028
18,116,978 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,023,187 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,893,364 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,026,036 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,170,164 UART:
2,170,582 UART: Running Caliptra ROM ...
2,171,756 UART:
2,171,921 UART: [state] CFI Enabled
2,172,890 UART: [state] LifecycleState = Unprovisioned
2,174,530 UART: [state] DebugLocked = No
2,175,631 UART: [state] WD Timer not started. Device not locked for debugging
2,178,091 UART: [kat] SHA2-256
2,178,757 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,764 UART: [kat] ++
2,182,252 UART: [kat] sha1
2,182,780 UART: [kat] SHA2-256
2,183,469 UART: [kat] SHA2-384
2,184,124 UART: [kat] SHA2-512-ACC
2,184,917 UART: [kat] ECC-384
4,097,140 UART: [kat] HMAC-384Kdf
4,108,249 UART: [kat] LMS
5,181,421 UART: [kat] --
5,186,335 UART: [cold-reset] ++
5,188,126 UART: [fht] FHT @ 0x50003400
5,199,319 UART: [idev] ++
5,199,988 UART: [idev] CDI.KEYID = 6
5,201,215 UART: [idev] SUBJECT.KEYID = 7
5,202,639 UART: [idev] UDS.KEYID = 0
5,217,117 UART: [idev] Erasing UDS.KEYID = 0
8,493,062 UART: [idev] Sha1 KeyId Algorithm
8,515,219 UART: [idev] --
8,519,006 UART: [ldev] ++
8,519,575 UART: [ldev] CDI.KEYID = 6
8,520,808 UART: [ldev] SUBJECT.KEYID = 5
8,522,295 UART: [ldev] AUTHORITY.KEYID = 7
8,523,851 UART: [ldev] FE.KEYID = 1
8,536,815 UART: [ldev] Erasing FE.KEYID = 1
11,826,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,525 UART: [ldev] --
14,189,362 UART: [fwproc] Wait for Commands...
14,192,162 UART: [fwproc] Recv command 0x46574c44
14,194,489 UART: [fwproc] Recv'd Img size: 114036 bytes
18,267,915 UART: ROM Fatal Error: 0x000B0028
18,271,343 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,026,895 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,079,219 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,040,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,185,040 UART:
2,185,457 UART: Running Caliptra ROM ...
2,186,634 UART:
2,186,811 UART: [state] CFI Enabled
2,187,793 UART: [state] LifecycleState = Unprovisioned
2,189,453 UART: [state] DebugLocked = No
2,190,787 UART: [state] WD Timer not started. Device not locked for debugging
2,193,286 UART: [kat] SHA2-256
2,193,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,196,979 UART: [kat] ++
2,197,431 UART: [kat] sha1
2,198,030 UART: [kat] SHA2-256
2,198,702 UART: [kat] SHA2-384
2,199,412 UART: [kat] SHA2-512-ACC
2,200,236 UART: [kat] ECC-384
2,947,459 UART: [kat] HMAC-384Kdf
2,972,537 UART: [kat] LMS
3,502,004 UART: [kat] --
3,507,161 UART: [cold-reset] ++
3,509,149 UART: [fht] FHT @ 0x50003400
3,519,476 UART: [idev] ++
3,520,042 UART: [idev] CDI.KEYID = 6
3,520,984 UART: [idev] SUBJECT.KEYID = 7
3,522,197 UART: [idev] UDS.KEYID = 0
3,544,198 UART: [idev] Erasing UDS.KEYID = 0
6,026,678 UART: [idev] Sha1 KeyId Algorithm
6,049,384 UART: [idev] --
6,052,448 UART: [ldev] ++
6,053,037 UART: [ldev] CDI.KEYID = 6
6,053,957 UART: [ldev] SUBJECT.KEYID = 5
6,055,129 UART: [ldev] AUTHORITY.KEYID = 7
6,056,387 UART: [ldev] FE.KEYID = 1
6,100,799 UART: [ldev] Erasing FE.KEYID = 1
8,605,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,834 UART: [ldev] --
10,413,865 UART: [fwproc] Wait for Commands...
10,415,423 UART: [fwproc] Recv command 0x46574c44
10,417,470 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,412 UART: ROM Fatal Error: 0x000B0028
13,823,559 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,025,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,796 UART:
2,170,200 UART: Running Caliptra ROM ...
2,171,366 UART:
2,171,536 UART: [state] CFI Enabled
2,172,501 UART: [state] LifecycleState = Unprovisioned
2,174,145 UART: [state] DebugLocked = No
2,175,256 UART: [state] WD Timer not started. Device not locked for debugging
2,177,733 UART: [kat] SHA2-256
2,178,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,411 UART: [kat] ++
2,181,861 UART: [kat] sha1
2,182,417 UART: [kat] SHA2-256
2,183,097 UART: [kat] SHA2-384
2,183,758 UART: [kat] SHA2-512-ACC
2,184,591 UART: [kat] ECC-384
2,946,404 UART: [kat] HMAC-384Kdf
2,970,609 UART: [kat] LMS
3,500,049 UART: [kat] --
3,503,371 UART: [cold-reset] ++
3,505,036 UART: [fht] FHT @ 0x50003400
3,516,783 UART: [idev] ++
3,517,358 UART: [idev] CDI.KEYID = 6
3,518,297 UART: [idev] SUBJECT.KEYID = 7
3,519,508 UART: [idev] UDS.KEYID = 0
3,542,266 UART: [idev] Erasing UDS.KEYID = 0
6,023,190 UART: [idev] Sha1 KeyId Algorithm
6,047,286 UART: [idev] --
6,050,850 UART: [ldev] ++
6,051,444 UART: [ldev] CDI.KEYID = 6
6,052,359 UART: [ldev] SUBJECT.KEYID = 5
6,053,444 UART: [ldev] AUTHORITY.KEYID = 7
6,054,733 UART: [ldev] FE.KEYID = 1
6,099,526 UART: [ldev] Erasing FE.KEYID = 1
8,599,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,870 UART: [ldev] --
10,390,502 UART: [fwproc] Wait for Commands...
10,393,205 UART: [fwproc] Recv command 0x46574c44
10,395,252 UART: [fwproc] Recv'd Img size: 114360 bytes
13,800,600 UART: ROM Fatal Error: 0x000B0028
13,803,730 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
2,027,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,590,655 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,031,793 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,176,094 UART:
2,176,485 UART: Running Caliptra ROM ...
2,177,571 UART:
2,177,724 UART: [state] CFI Enabled
2,178,690 UART: [state] LifecycleState = Unprovisioned
2,180,335 UART: [state] DebugLocked = No
2,181,357 UART: [state] WD Timer not started. Device not locked for debugging
2,183,845 UART: [kat] SHA2-256
2,184,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,187,737 UART: [kat] ++
2,188,197 UART: [kat] sha1
2,188,709 UART: [kat] SHA2-256
2,189,366 UART: [kat] SHA2-384
2,190,019 UART: [kat] SHA2-512-ACC
2,190,818 UART: [kat] ECC-384
3,282,493 UART: [kat] HMAC-384Kdf
3,296,028 UART: [kat] LMS
3,825,503 UART: [kat] --
3,830,056 UART: [cold-reset] ++
3,832,577 UART: [fht] FHT @ 0x50003400
3,843,824 UART: [idev] ++
3,844,382 UART: [idev] CDI.KEYID = 6
3,845,318 UART: [idev] SUBJECT.KEYID = 7
3,846,546 UART: [idev] UDS.KEYID = 0
3,864,604 UART: [idev] Erasing UDS.KEYID = 0
6,320,457 UART: [idev] Sha1 KeyId Algorithm
6,343,202 UART: [idev] --
6,347,108 UART: [ldev] ++
6,347,721 UART: [ldev] CDI.KEYID = 6
6,348,641 UART: [ldev] SUBJECT.KEYID = 5
6,349,746 UART: [ldev] AUTHORITY.KEYID = 7
6,351,032 UART: [ldev] FE.KEYID = 1
6,362,488 UART: [ldev] Erasing FE.KEYID = 1
8,839,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,863 UART: [ldev] --
10,632,016 UART: [fwproc] Wait for Commands...
10,634,980 UART: [fwproc] Recv command 0x46574c44
10,637,073 UART: [fwproc] Recv'd Img size: 114360 bytes
14,036,320 UART: ROM Fatal Error: 0x000B0028
14,039,456 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,780 writing to cptra_bootfsm_go
2,025,552 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,807,543 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,753 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,329 UART: [fwproc] Recv command 0x46574c44
1,282,062 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,681 UART: ROM Fatal Error: 0x000B0028
2,579,838 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,657 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,713 UART: [kat] SHA2-512-ACC
906,614 UART: [kat] ECC-384
916,787 UART: [kat] HMAC-384Kdf
921,571 UART: [kat] LMS
1,169,883 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,873 UART: [ldev] ++
1,210,041 UART: [ldev] CDI.KEYID = 6
1,210,405 UART: [ldev] SUBJECT.KEYID = 5
1,210,832 UART: [ldev] AUTHORITY.KEYID = 7
1,211,295 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,089 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,160 UART: [fwproc] Recv command 0x46574c44
1,283,893 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,776 UART: ROM Fatal Error: 0x000B0028
2,581,933 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,126 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,562 UART: [state] LifecycleState = Unprovisioned
85,217 UART: [state] DebugLocked = No
85,933 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
890,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
904,044 UART: [kat] SHA2-512-ACC
905,945 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,172,835 UART: [idev] ++
1,173,003 UART: [idev] CDI.KEYID = 6
1,173,364 UART: [idev] SUBJECT.KEYID = 7
1,173,789 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,241,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,574 UART: [ldev] --
1,280,974 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46574c44
1,282,354 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,357 UART: ROM Fatal Error: 0x000B0028
2,580,514 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,637 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,605 UART: [state] LifecycleState = Unprovisioned
85,260 UART: [state] DebugLocked = No
85,778 UART: [state] WD Timer not started. Device not locked for debugging
87,135 UART: [kat] SHA2-256
890,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,814 UART: [kat] ++
894,966 UART: [kat] sha1
899,070 UART: [kat] SHA2-256
901,010 UART: [kat] SHA2-384
903,611 UART: [kat] SHA2-512-ACC
905,512 UART: [kat] ECC-384
915,607 UART: [kat] HMAC-384Kdf
920,345 UART: [kat] LMS
1,168,657 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,169,968 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,181,522 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,208,801 UART: [ldev] ++
1,208,969 UART: [ldev] CDI.KEYID = 6
1,209,333 UART: [ldev] SUBJECT.KEYID = 5
1,209,760 UART: [ldev] AUTHORITY.KEYID = 7
1,210,223 UART: [ldev] FE.KEYID = 1
1,215,357 UART: [ldev] Erasing FE.KEYID = 1
1,241,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,693 UART: [ldev] --
1,281,039 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,502 UART: ROM Fatal Error: 0x000B0028
2,579,659 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,796 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
890,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,955 UART: [kat] ++
895,107 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
919,924 UART: [kat] LMS
1,168,236 UART: [kat] --
1,169,039 UART: [cold-reset] ++
1,169,585 UART: [fht] FHT @ 0x50003400
1,172,109 UART: [idev] ++
1,172,277 UART: [idev] CDI.KEYID = 6
1,172,638 UART: [idev] SUBJECT.KEYID = 7
1,173,063 UART: [idev] UDS.KEYID = 0
1,181,149 UART: [idev] Erasing UDS.KEYID = 0
1,197,957 UART: [idev] Sha1 KeyId Algorithm
1,206,777 UART: [idev] --
1,207,842 UART: [ldev] ++
1,208,010 UART: [ldev] CDI.KEYID = 6
1,208,374 UART: [ldev] SUBJECT.KEYID = 5
1,208,801 UART: [ldev] AUTHORITY.KEYID = 7
1,209,264 UART: [ldev] FE.KEYID = 1
1,214,424 UART: [ldev] Erasing FE.KEYID = 1
1,240,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,280,030 UART: [fwproc] Wait for Commands...
1,280,679 UART: [fwproc] Recv command 0x46574c44
1,281,412 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,699 UART: ROM Fatal Error: 0x000B0028
2,579,856 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,430,201 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,106 UART: [kat] SHA2-256
902,046 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,752 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,317 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,198 UART: ROM Fatal Error: 0x000B0028
2,580,355 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,934 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
5,277 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,108 UART:
192,488 UART: Running Caliptra ROM ...
193,601 UART:
193,751 UART: [state] CFI Enabled
269,334 UART: [state] LifecycleState = Manufacturing
271,743 UART: [state] DebugLocked = No
273,882 UART: [state] WD Timer not started. Device not locked for debugging
278,375 UART: [kat] SHA2-256
460,331 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,828 UART: [kat] ++
472,329 UART: [kat] sha1
482,507 UART: [kat] SHA2-256
485,568 UART: [kat] SHA2-384
491,485 UART: [kat] SHA2-512-ACC
494,103 UART: [kat] ECC-384
3,776,081 UART: [kat] HMAC-384Kdf
3,804,054 UART: [kat] LMS
4,877,234 UART: [kat] --
4,880,761 UART: [cold-reset] ++
4,883,346 UART: [fht] FHT @ 0x50003400
4,895,100 UART: [idev] ++
4,895,874 UART: [idev] CDI.KEYID = 6
4,896,990 UART: [idev] SUBJECT.KEYID = 7
4,898,152 UART: [idev] UDS.KEYID = 0
4,932,675 UART: [idev] Erasing UDS.KEYID = 0
8,245,881 UART: [idev] Sha1 KeyId Algorithm
8,267,105 UART: [idev] --
8,270,957 UART: [ldev] ++
8,271,528 UART: [ldev] CDI.KEYID = 6
8,272,763 UART: [ldev] SUBJECT.KEYID = 5
8,273,916 UART: [ldev] AUTHORITY.KEYID = 7
8,275,143 UART: [ldev] FE.KEYID = 1
8,321,222 UART: [ldev] Erasing FE.KEYID = 1
11,656,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,985,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,001,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,017,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,038,764 UART: [ldev] --
14,044,135 UART: [fwproc] Wait for Commands...
14,045,583 UART: [fwproc] Recv command 0x46574c44
14,047,591 UART: [fwproc] Recv'd Img size: 114036 bytes
18,159,561 UART: ROM Fatal Error: 0x000B002C
18,162,971 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
5,473 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,931,987 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,771 writing to cptra_bootfsm_go
7,832 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
194,087 UART:
194,460 UART: Running Caliptra ROM ...
195,537 UART:
605,400 UART: [state] CFI Enabled
620,550 UART: [state] LifecycleState = Manufacturing
622,924 UART: [state] DebugLocked = No
624,348 UART: [state] WD Timer not started. Device not locked for debugging
629,489 UART: [kat] SHA2-256
811,462 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,011 UART: [kat] ++
823,623 UART: [kat] sha1
834,393 UART: [kat] SHA2-256
837,453 UART: [kat] SHA2-384
843,906 UART: [kat] SHA2-512-ACC
846,575 UART: [kat] ECC-384
4,100,207 UART: [kat] HMAC-384Kdf
4,110,934 UART: [kat] LMS
5,184,106 UART: [kat] --
5,187,969 UART: [cold-reset] ++
5,190,339 UART: [fht] FHT @ 0x50003400
5,201,585 UART: [idev] ++
5,202,248 UART: [idev] CDI.KEYID = 6
5,203,447 UART: [idev] SUBJECT.KEYID = 7
5,204,957 UART: [idev] UDS.KEYID = 0
5,222,127 UART: [idev] Erasing UDS.KEYID = 0
8,498,214 UART: [idev] Sha1 KeyId Algorithm
8,520,595 UART: [idev] --
8,524,314 UART: [ldev] ++
8,524,875 UART: [ldev] CDI.KEYID = 6
8,526,031 UART: [ldev] SUBJECT.KEYID = 5
8,527,563 UART: [ldev] AUTHORITY.KEYID = 7
8,529,044 UART: [ldev] FE.KEYID = 1
8,539,096 UART: [ldev] Erasing FE.KEYID = 1
11,828,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,554 UART: [ldev] --
14,194,218 UART: [fwproc] Wait for Commands...
14,196,091 UART: [fwproc] Recv command 0x46574c44
14,198,353 UART: [fwproc] Recv'd Img size: 114036 bytes
18,299,291 UART: ROM Fatal Error: 0x000B002C
18,302,647 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
5,986 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,110,813 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
5,608 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,238 UART:
192,608 UART: Running Caliptra ROM ...
193,690 UART:
193,836 UART: [state] CFI Enabled
267,570 UART: [state] LifecycleState = Manufacturing
269,488 UART: [state] DebugLocked = No
271,000 UART: [state] WD Timer not started. Device not locked for debugging
275,206 UART: [kat] SHA2-256
454,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,894 UART: [kat] ++
466,339 UART: [kat] sha1
477,289 UART: [kat] SHA2-256
480,308 UART: [kat] SHA2-384
486,232 UART: [kat] SHA2-512-ACC
489,165 UART: [kat] ECC-384
2,948,698 UART: [kat] HMAC-384Kdf
2,973,490 UART: [kat] LMS
3,502,924 UART: [kat] --
3,507,966 UART: [cold-reset] ++
3,509,146 UART: [fht] FHT @ 0x50003400
3,520,614 UART: [idev] ++
3,521,178 UART: [idev] CDI.KEYID = 6
3,522,156 UART: [idev] SUBJECT.KEYID = 7
3,523,252 UART: [idev] UDS.KEYID = 0
3,544,832 UART: [idev] Erasing UDS.KEYID = 0
6,028,091 UART: [idev] Sha1 KeyId Algorithm
6,051,160 UART: [idev] --
6,053,551 UART: [ldev] ++
6,054,162 UART: [ldev] CDI.KEYID = 6
6,055,077 UART: [ldev] SUBJECT.KEYID = 5
6,056,124 UART: [ldev] AUTHORITY.KEYID = 7
6,057,472 UART: [ldev] FE.KEYID = 1
6,100,899 UART: [ldev] Erasing FE.KEYID = 1
8,604,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,728 UART: [ldev] --
10,412,594 UART: [fwproc] Wait for Commands...
10,415,824 UART: [fwproc] Recv command 0x46574c44
10,417,916 UART: [fwproc] Recv'd Img size: 114360 bytes
13,851,333 UART: ROM Fatal Error: 0x000B002C
13,854,431 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
5,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,159 UART:
192,560 UART: Running Caliptra ROM ...
193,672 UART:
193,822 UART: [state] CFI Enabled
264,533 UART: [state] LifecycleState = Manufacturing
266,404 UART: [state] DebugLocked = No
268,333 UART: [state] WD Timer not started. Device not locked for debugging
272,047 UART: [kat] SHA2-256
451,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,704 UART: [kat] ++
463,245 UART: [kat] sha1
473,317 UART: [kat] SHA2-256
476,327 UART: [kat] SHA2-384
482,200 UART: [kat] SHA2-512-ACC
485,182 UART: [kat] ECC-384
2,949,213 UART: [kat] HMAC-384Kdf
2,971,827 UART: [kat] LMS
3,501,232 UART: [kat] --
3,506,223 UART: [cold-reset] ++
3,507,782 UART: [fht] FHT @ 0x50003400
3,519,745 UART: [idev] ++
3,520,309 UART: [idev] CDI.KEYID = 6
3,521,273 UART: [idev] SUBJECT.KEYID = 7
3,522,433 UART: [idev] UDS.KEYID = 0
3,544,082 UART: [idev] Erasing UDS.KEYID = 0
6,025,278 UART: [idev] Sha1 KeyId Algorithm
6,047,698 UART: [idev] --
6,050,942 UART: [ldev] ++
6,051,515 UART: [ldev] CDI.KEYID = 6
6,052,423 UART: [ldev] SUBJECT.KEYID = 5
6,053,644 UART: [ldev] AUTHORITY.KEYID = 7
6,054,882 UART: [ldev] FE.KEYID = 1
6,099,559 UART: [ldev] Erasing FE.KEYID = 1
8,602,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,001 UART: [ldev] --
10,415,218 UART: [fwproc] Wait for Commands...
10,417,156 UART: [fwproc] Recv command 0x46574c44
10,419,297 UART: [fwproc] Recv'd Img size: 114360 bytes
13,855,890 UART: ROM Fatal Error: 0x000B002C
13,858,991 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
5,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,623,946 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
6,112 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,448 UART:
192,875 UART: Running Caliptra ROM ...
194,181 UART:
603,665 UART: [state] CFI Enabled
619,072 UART: [state] LifecycleState = Manufacturing
620,939 UART: [state] DebugLocked = No
623,065 UART: [state] WD Timer not started. Device not locked for debugging
626,531 UART: [kat] SHA2-256
805,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,177 UART: [kat] ++
817,709 UART: [kat] sha1
828,641 UART: [kat] SHA2-256
831,679 UART: [kat] SHA2-384
837,929 UART: [kat] SHA2-512-ACC
840,865 UART: [kat] ECC-384
3,281,237 UART: [kat] HMAC-384Kdf
3,294,238 UART: [kat] LMS
3,823,755 UART: [kat] --
3,828,196 UART: [cold-reset] ++
3,829,314 UART: [fht] FHT @ 0x50003400
3,839,319 UART: [idev] ++
3,839,884 UART: [idev] CDI.KEYID = 6
3,840,815 UART: [idev] SUBJECT.KEYID = 7
3,842,039 UART: [idev] UDS.KEYID = 0
3,860,420 UART: [idev] Erasing UDS.KEYID = 0
6,317,289 UART: [idev] Sha1 KeyId Algorithm
6,341,389 UART: [idev] --
6,345,853 UART: [ldev] ++
6,346,430 UART: [ldev] CDI.KEYID = 6
6,347,316 UART: [ldev] SUBJECT.KEYID = 5
6,348,529 UART: [ldev] AUTHORITY.KEYID = 7
6,349,757 UART: [ldev] FE.KEYID = 1
6,362,158 UART: [ldev] Erasing FE.KEYID = 1
8,837,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,689 UART: [ldev] --
10,628,593 UART: [fwproc] Wait for Commands...
10,631,119 UART: [fwproc] Recv command 0x46574c44
10,633,209 UART: [fwproc] Recv'd Img size: 114360 bytes
14,060,921 UART: ROM Fatal Error: 0x000B002C
14,064,051 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
6,180 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,846,143 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Manufacturing
86,003 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,340 UART: [kat] LMS
1,168,652 UART: [kat] --
1,169,721 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,068 UART: [ldev] ++
1,208,236 UART: [ldev] CDI.KEYID = 6
1,208,600 UART: [ldev] SUBJECT.KEYID = 5
1,209,027 UART: [ldev] AUTHORITY.KEYID = 7
1,209,490 UART: [ldev] FE.KEYID = 1
1,214,814 UART: [ldev] Erasing FE.KEYID = 1
1,240,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,820 UART: [ldev] --
1,280,176 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,584 UART: ROM Fatal Error: 0x000B002C
2,604,743 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,456,246 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Manufacturing
86,234 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,688 UART: [idev] ++
1,173,856 UART: [idev] CDI.KEYID = 6
1,174,217 UART: [idev] SUBJECT.KEYID = 7
1,174,642 UART: [idev] UDS.KEYID = 0
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,721 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,339 UART: ROM Fatal Error: 0x000B002C
2,604,498 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,457,853 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Manufacturing
86,131 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,513 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,342 UART: [ldev] ++
1,209,510 UART: [ldev] CDI.KEYID = 6
1,209,874 UART: [ldev] SUBJECT.KEYID = 5
1,210,301 UART: [ldev] AUTHORITY.KEYID = 7
1,210,764 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,242,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,142 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,388 UART: ROM Fatal Error: 0x000B002C
2,604,547 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,456,838 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Manufacturing
86,182 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,502 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,785 UART: [ldev] Erasing FE.KEYID = 1
1,241,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,961 UART: [ldev] --
1,281,287 UART: [fwproc] Wait for Commands...
1,282,052 UART: [fwproc] Recv command 0x46574c44
1,282,785 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,051 UART: ROM Fatal Error: 0x000B002C
2,606,210 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,457,217 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Manufacturing
86,007 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,160 UART: [ldev] ++
1,208,328 UART: [ldev] CDI.KEYID = 6
1,208,692 UART: [ldev] SUBJECT.KEYID = 5
1,209,119 UART: [ldev] AUTHORITY.KEYID = 7
1,209,582 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,988 UART: [ldev] --
1,280,384 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,210 UART: ROM Fatal Error: 0x000B002C
2,604,369 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,455,926 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Manufacturing
86,208 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,803 UART: [kat] LMS
1,169,115 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,491 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,011 UART: ROM Fatal Error: 0x000B002C
2,606,170 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,457,121 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
5,346 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,027 UART:
192,421 UART: Running Caliptra ROM ...
193,593 UART:
193,748 UART: [state] CFI Enabled
266,410 UART: [state] LifecycleState = Manufacturing
268,844 UART: [state] DebugLocked = No
271,471 UART: [state] WD Timer not started. Device not locked for debugging
275,985 UART: [kat] SHA2-256
457,908 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,436 UART: [kat] ++
470,023 UART: [kat] sha1
479,773 UART: [kat] SHA2-256
482,781 UART: [kat] SHA2-384
488,696 UART: [kat] SHA2-512-ACC
491,300 UART: [kat] ECC-384
3,779,132 UART: [kat] HMAC-384Kdf
3,804,477 UART: [kat] LMS
4,877,632 UART: [kat] --
4,883,634 UART: [cold-reset] ++
4,885,352 UART: [fht] FHT @ 0x50003400
4,897,574 UART: [idev] ++
4,898,269 UART: [idev] CDI.KEYID = 6
4,899,507 UART: [idev] SUBJECT.KEYID = 7
4,900,607 UART: [idev] UDS.KEYID = 0
4,932,687 UART: [idev] Erasing UDS.KEYID = 0
8,246,293 UART: [idev] Sha1 KeyId Algorithm
8,269,403 UART: [idev] --
8,272,077 UART: [ldev] ++
8,272,656 UART: [ldev] CDI.KEYID = 6
8,273,815 UART: [ldev] SUBJECT.KEYID = 5
8,274,973 UART: [ldev] AUTHORITY.KEYID = 7
8,276,262 UART: [ldev] FE.KEYID = 1
8,320,579 UART: [ldev] Erasing FE.KEYID = 1
11,656,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,833 UART: [ldev] --
14,039,462 UART: [fwproc] Wait for Commands...
14,042,324 UART: [fwproc] Recv command 0x46574c44
14,044,643 UART: [fwproc] Recv'd Img size: 114036 bytes
18,154,146 UART: ROM Fatal Error: 0x000B002E
18,157,506 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,358 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,927,229 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
6,202 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,463 UART:
192,868 UART: Running Caliptra ROM ...
193,970 UART:
603,634 UART: [state] CFI Enabled
618,756 UART: [state] LifecycleState = Manufacturing
621,136 UART: [state] DebugLocked = No
623,098 UART: [state] WD Timer not started. Device not locked for debugging
627,818 UART: [kat] SHA2-256
809,769 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,292 UART: [kat] ++
821,870 UART: [kat] sha1
832,373 UART: [kat] SHA2-256
835,433 UART: [kat] SHA2-384
840,157 UART: [kat] SHA2-512-ACC
842,752 UART: [kat] ECC-384
4,099,525 UART: [kat] HMAC-384Kdf
4,111,177 UART: [kat] LMS
5,184,317 UART: [kat] --
5,190,434 UART: [cold-reset] ++
5,192,912 UART: [fht] FHT @ 0x50003400
5,203,852 UART: [idev] ++
5,204,523 UART: [idev] CDI.KEYID = 6
5,205,751 UART: [idev] SUBJECT.KEYID = 7
5,207,183 UART: [idev] UDS.KEYID = 0
5,224,950 UART: [idev] Erasing UDS.KEYID = 0
8,497,842 UART: [idev] Sha1 KeyId Algorithm
8,520,859 UART: [idev] --
8,525,167 UART: [ldev] ++
8,525,787 UART: [ldev] CDI.KEYID = 6
8,526,980 UART: [ldev] SUBJECT.KEYID = 5
8,528,412 UART: [ldev] AUTHORITY.KEYID = 7
8,529,966 UART: [ldev] FE.KEYID = 1
8,539,098 UART: [ldev] Erasing FE.KEYID = 1
11,833,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,851 UART: [ldev] --
14,197,921 UART: [fwproc] Wait for Commands...
14,201,198 UART: [fwproc] Recv command 0x46574c44
14,203,450 UART: [fwproc] Recv'd Img size: 114036 bytes
18,305,585 UART: ROM Fatal Error: 0x000B002E
18,308,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
6,041 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,108,073 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
5,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,167 UART:
192,537 UART: Running Caliptra ROM ...
193,618 UART:
193,760 UART: [state] CFI Enabled
261,611 UART: [state] LifecycleState = Manufacturing
263,541 UART: [state] DebugLocked = No
265,217 UART: [state] WD Timer not started. Device not locked for debugging
269,041 UART: [kat] SHA2-256
448,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,760 UART: [kat] ++
460,291 UART: [kat] sha1
472,618 UART: [kat] SHA2-256
475,663 UART: [kat] SHA2-384
480,946 UART: [kat] SHA2-512-ACC
483,907 UART: [kat] ECC-384
2,948,681 UART: [kat] HMAC-384Kdf
2,971,326 UART: [kat] LMS
3,500,775 UART: [kat] --
3,505,727 UART: [cold-reset] ++
3,507,977 UART: [fht] FHT @ 0x50003400
3,519,457 UART: [idev] ++
3,520,034 UART: [idev] CDI.KEYID = 6
3,520,946 UART: [idev] SUBJECT.KEYID = 7
3,522,106 UART: [idev] UDS.KEYID = 0
3,543,323 UART: [idev] Erasing UDS.KEYID = 0
6,027,351 UART: [idev] Sha1 KeyId Algorithm
6,049,235 UART: [idev] --
6,051,826 UART: [ldev] ++
6,052,400 UART: [ldev] CDI.KEYID = 6
6,053,307 UART: [ldev] SUBJECT.KEYID = 5
6,054,484 UART: [ldev] AUTHORITY.KEYID = 7
6,055,724 UART: [ldev] FE.KEYID = 1
6,100,239 UART: [ldev] Erasing FE.KEYID = 1
8,603,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,283 UART: [ldev] --
10,413,338 UART: [fwproc] Wait for Commands...
10,416,190 UART: [fwproc] Recv command 0x46574c44
10,418,238 UART: [fwproc] Recv'd Img size: 114360 bytes
13,847,674 UART: ROM Fatal Error: 0x000B002E
13,850,820 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,339 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,061 UART:
192,470 UART: Running Caliptra ROM ...
193,596 UART:
193,744 UART: [state] CFI Enabled
265,786 UART: [state] LifecycleState = Manufacturing
267,671 UART: [state] DebugLocked = No
268,885 UART: [state] WD Timer not started. Device not locked for debugging
272,123 UART: [kat] SHA2-256
451,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,801 UART: [kat] ++
463,248 UART: [kat] sha1
474,391 UART: [kat] SHA2-256
477,400 UART: [kat] SHA2-384
483,163 UART: [kat] SHA2-512-ACC
486,068 UART: [kat] ECC-384
2,952,541 UART: [kat] HMAC-384Kdf
2,973,490 UART: [kat] LMS
3,502,959 UART: [kat] --
3,507,018 UART: [cold-reset] ++
3,508,471 UART: [fht] FHT @ 0x50003400
3,518,912 UART: [idev] ++
3,519,473 UART: [idev] CDI.KEYID = 6
3,520,442 UART: [idev] SUBJECT.KEYID = 7
3,521,601 UART: [idev] UDS.KEYID = 0
3,546,926 UART: [idev] Erasing UDS.KEYID = 0
6,029,698 UART: [idev] Sha1 KeyId Algorithm
6,053,015 UART: [idev] --
6,056,913 UART: [ldev] ++
6,057,490 UART: [ldev] CDI.KEYID = 6
6,058,401 UART: [ldev] SUBJECT.KEYID = 5
6,059,594 UART: [ldev] AUTHORITY.KEYID = 7
6,060,837 UART: [ldev] FE.KEYID = 1
6,102,167 UART: [ldev] Erasing FE.KEYID = 1
8,604,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,965 UART: [ldev] --
10,395,445 UART: [fwproc] Wait for Commands...
10,398,518 UART: [fwproc] Recv command 0x46574c44
10,400,621 UART: [fwproc] Recv'd Img size: 114360 bytes
13,840,999 UART: ROM Fatal Error: 0x000B002E
13,844,077 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
5,339 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,642,898 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
6,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,413 UART:
192,785 UART: Running Caliptra ROM ...
193,961 UART:
603,677 UART: [state] CFI Enabled
620,321 UART: [state] LifecycleState = Manufacturing
622,261 UART: [state] DebugLocked = No
624,723 UART: [state] WD Timer not started. Device not locked for debugging
628,227 UART: [kat] SHA2-256
807,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,940 UART: [kat] ++
819,471 UART: [kat] sha1
829,974 UART: [kat] SHA2-256
832,980 UART: [kat] SHA2-384
838,901 UART: [kat] SHA2-512-ACC
841,826 UART: [kat] ECC-384
3,285,733 UART: [kat] HMAC-384Kdf
3,298,467 UART: [kat] LMS
3,827,965 UART: [kat] --
3,834,292 UART: [cold-reset] ++
3,835,955 UART: [fht] FHT @ 0x50003400
3,847,899 UART: [idev] ++
3,848,460 UART: [idev] CDI.KEYID = 6
3,849,421 UART: [idev] SUBJECT.KEYID = 7
3,850,574 UART: [idev] UDS.KEYID = 0
3,866,675 UART: [idev] Erasing UDS.KEYID = 0
6,325,236 UART: [idev] Sha1 KeyId Algorithm
6,347,061 UART: [idev] --
6,350,894 UART: [ldev] ++
6,351,461 UART: [ldev] CDI.KEYID = 6
6,352,420 UART: [ldev] SUBJECT.KEYID = 5
6,353,575 UART: [ldev] AUTHORITY.KEYID = 7
6,354,805 UART: [ldev] FE.KEYID = 1
6,367,664 UART: [ldev] Erasing FE.KEYID = 1
8,840,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,031 UART: [ldev] --
10,631,959 UART: [fwproc] Wait for Commands...
10,633,859 UART: [fwproc] Recv command 0x46574c44
10,635,900 UART: [fwproc] Recv'd Img size: 114360 bytes
14,060,627 UART: ROM Fatal Error: 0x000B002E
14,063,733 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
5,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,833,576 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Manufacturing
85,713 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,169,993 UART: [fht] FHT @ 0x50003400
1,172,793 UART: [idev] ++
1,172,961 UART: [idev] CDI.KEYID = 6
1,173,322 UART: [idev] SUBJECT.KEYID = 7
1,173,747 UART: [idev] UDS.KEYID = 0
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,262 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,006 UART: ROM Fatal Error: 0x000B002E
2,605,165 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,456,618 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Manufacturing
86,464 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,827 UART: [ldev] --
1,281,147 UART: [fwproc] Wait for Commands...
1,281,852 UART: [fwproc] Recv command 0x46574c44
1,282,585 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,597 UART: ROM Fatal Error: 0x000B002E
2,604,756 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,457,895 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Manufacturing
85,479 UART: [state] DebugLocked = No
85,991 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,109 UART: [kat] SHA2-256
901,049 UART: [kat] SHA2-384
903,888 UART: [kat] SHA2-512-ACC
905,789 UART: [kat] ECC-384
915,436 UART: [kat] HMAC-384Kdf
920,040 UART: [kat] LMS
1,168,352 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,767 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,214,804 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,112 UART: [ldev] --
1,280,516 UART: [fwproc] Wait for Commands...
1,281,253 UART: [fwproc] Recv command 0x46574c44
1,281,986 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,586 UART: ROM Fatal Error: 0x000B002E
2,604,745 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,458,088 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Manufacturing
85,664 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
903,935 UART: [kat] SHA2-512-ACC
905,836 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,237 UART: [kat] LMS
1,168,549 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,706 UART: [idev] ++
1,172,874 UART: [idev] CDI.KEYID = 6
1,173,235 UART: [idev] SUBJECT.KEYID = 7
1,173,660 UART: [idev] UDS.KEYID = 0
1,181,758 UART: [idev] Erasing UDS.KEYID = 0
1,198,852 UART: [idev] Sha1 KeyId Algorithm
1,207,674 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,203 UART: [ldev] Erasing FE.KEYID = 1
1,241,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,189 UART: ROM Fatal Error: 0x000B002E
2,605,348 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,456,473 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Manufacturing
85,813 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,436 UART: [kat] LMS
1,168,748 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,182,423 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,312 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,822 UART: [ldev] --
1,281,218 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,728 UART: ROM Fatal Error: 0x000B002E
2,605,887 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,458,960 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Manufacturing
85,878 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,273 UART: [ldev] --
1,281,543 UART: [fwproc] Wait for Commands...
1,282,144 UART: [fwproc] Recv command 0x46574c44
1,282,877 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,997 UART: ROM Fatal Error: 0x000B002E
2,606,156 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,458,141 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
2,028,335 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,172,334 UART:
2,172,743 UART: Running Caliptra ROM ...
2,173,915 UART:
2,174,090 UART: [state] CFI Enabled
2,175,098 UART: [state] LifecycleState = Unprovisioned
2,176,755 UART: [state] DebugLocked = No
2,177,869 UART: [state] WD Timer not started. Device not locked for debugging
2,180,342 UART: [kat] SHA2-256
2,181,009 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,184,261 UART: [kat] ++
2,184,761 UART: [kat] sha1
2,185,280 UART: [kat] SHA2-256
2,185,937 UART: [kat] SHA2-384
2,186,597 UART: [kat] SHA2-512-ACC
2,187,394 UART: [kat] ECC-384
3,774,631 UART: [kat] HMAC-384Kdf
3,802,863 UART: [kat] LMS
4,876,055 UART: [kat] --
4,881,257 UART: [cold-reset] ++
4,883,738 UART: [fht] FHT @ 0x50003400
4,895,121 UART: [idev] ++
4,895,855 UART: [idev] CDI.KEYID = 6
4,897,040 UART: [idev] SUBJECT.KEYID = 7
4,898,206 UART: [idev] UDS.KEYID = 0
4,930,287 UART: [idev] Erasing UDS.KEYID = 0
8,242,951 UART: [idev] Sha1 KeyId Algorithm
8,263,757 UART: [idev] --
8,266,869 UART: [ldev] ++
8,267,447 UART: [ldev] CDI.KEYID = 6
8,268,636 UART: [ldev] SUBJECT.KEYID = 5
8,269,803 UART: [ldev] AUTHORITY.KEYID = 7
8,271,038 UART: [ldev] FE.KEYID = 1
8,317,768 UART: [ldev] Erasing FE.KEYID = 1
11,652,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,574 UART: [ldev] --
14,038,095 UART: [fwproc] Wait for Commands...
14,039,822 UART: [fwproc] Recv command 0x46574c44
14,042,151 UART: [fwproc] Recv'd Img size: 114036 bytes
16,746,003 UART: ROM Fatal Error: 0x000B0018
16,749,409 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,021,190 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,573,923 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,020,798 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,736 UART:
2,165,144 UART: Running Caliptra ROM ...
2,166,310 UART:
2,166,503 UART: [state] CFI Enabled
2,167,474 UART: [state] LifecycleState = Unprovisioned
2,169,118 UART: [state] DebugLocked = No
2,170,226 UART: [state] WD Timer not started. Device not locked for debugging
2,172,693 UART: [kat] SHA2-256
2,173,353 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,354 UART: [kat] ++
2,176,798 UART: [kat] sha1
2,177,303 UART: [kat] SHA2-256
2,177,979 UART: [kat] SHA2-384
2,178,722 UART: [kat] SHA2-512-ACC
2,179,525 UART: [kat] ECC-384
4,099,516 UART: [kat] HMAC-384Kdf
4,112,306 UART: [kat] LMS
5,185,453 UART: [kat] --
5,191,090 UART: [cold-reset] ++
5,192,127 UART: [fht] FHT @ 0x50003400
5,204,724 UART: [idev] ++
5,205,445 UART: [idev] CDI.KEYID = 6
5,206,621 UART: [idev] SUBJECT.KEYID = 7
5,208,108 UART: [idev] UDS.KEYID = 0
5,226,810 UART: [idev] Erasing UDS.KEYID = 0
8,499,535 UART: [idev] Sha1 KeyId Algorithm
8,522,634 UART: [idev] --
8,525,228 UART: [ldev] ++
8,525,795 UART: [ldev] CDI.KEYID = 6
8,526,955 UART: [ldev] SUBJECT.KEYID = 5
8,528,448 UART: [ldev] AUTHORITY.KEYID = 7
8,529,928 UART: [ldev] FE.KEYID = 1
8,539,699 UART: [ldev] Erasing FE.KEYID = 1
11,833,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,426 UART: [ldev] --
14,201,824 UART: [fwproc] Wait for Commands...
14,204,298 UART: [fwproc] Recv command 0x46574c44
14,206,618 UART: [fwproc] Recv'd Img size: 114036 bytes
16,912,165 UART: ROM Fatal Error: 0x000B0018
16,915,589 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
2,021,373 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,727,125 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,025,307 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,169,801 UART:
2,170,206 UART: Running Caliptra ROM ...
2,171,374 UART:
2,171,545 UART: [state] CFI Enabled
2,172,510 UART: [state] LifecycleState = Unprovisioned
2,174,155 UART: [state] DebugLocked = No
2,175,260 UART: [state] WD Timer not started. Device not locked for debugging
2,177,741 UART: [kat] SHA2-256
2,178,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,419 UART: [kat] ++
2,181,910 UART: [kat] sha1
2,182,425 UART: [kat] SHA2-256
2,183,100 UART: [kat] SHA2-384
2,183,759 UART: [kat] SHA2-512-ACC
2,184,589 UART: [kat] ECC-384
2,948,379 UART: [kat] HMAC-384Kdf
2,973,171 UART: [kat] LMS
3,502,622 UART: [kat] --
3,508,073 UART: [cold-reset] ++
3,509,532 UART: [fht] FHT @ 0x50003400
3,521,439 UART: [idev] ++
3,522,006 UART: [idev] CDI.KEYID = 6
3,522,919 UART: [idev] SUBJECT.KEYID = 7
3,524,131 UART: [idev] UDS.KEYID = 0
3,545,944 UART: [idev] Erasing UDS.KEYID = 0
6,029,657 UART: [idev] Sha1 KeyId Algorithm
6,052,361 UART: [idev] --
6,055,152 UART: [ldev] ++
6,055,749 UART: [ldev] CDI.KEYID = 6
6,056,663 UART: [ldev] SUBJECT.KEYID = 5
6,057,827 UART: [ldev] AUTHORITY.KEYID = 7
6,059,063 UART: [ldev] FE.KEYID = 1
6,101,577 UART: [ldev] Erasing FE.KEYID = 1
8,607,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,411 UART: [ldev] --
10,412,813 UART: [fwproc] Wait for Commands...
10,414,749 UART: [fwproc] Recv command 0x46574c44
10,416,844 UART: [fwproc] Recv'd Img size: 114360 bytes
12,470,434 UART: ROM Fatal Error: 0x000B0018
12,473,559 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,022,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,380 UART:
2,167,806 UART: Running Caliptra ROM ...
2,168,983 UART:
2,169,157 UART: [state] CFI Enabled
2,170,129 UART: [state] LifecycleState = Unprovisioned
2,171,774 UART: [state] DebugLocked = No
2,172,803 UART: [state] WD Timer not started. Device not locked for debugging
2,175,293 UART: [kat] SHA2-256
2,175,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,000 UART: [kat] ++
2,179,461 UART: [kat] sha1
2,180,015 UART: [kat] SHA2-256
2,180,716 UART: [kat] SHA2-384
2,181,379 UART: [kat] SHA2-512-ACC
2,182,201 UART: [kat] ECC-384
2,946,970 UART: [kat] HMAC-384Kdf
2,972,312 UART: [kat] LMS
3,501,730 UART: [kat] --
3,504,986 UART: [cold-reset] ++
3,506,001 UART: [fht] FHT @ 0x50003400
3,517,418 UART: [idev] ++
3,517,981 UART: [idev] CDI.KEYID = 6
3,518,948 UART: [idev] SUBJECT.KEYID = 7
3,520,106 UART: [idev] UDS.KEYID = 0
3,544,257 UART: [idev] Erasing UDS.KEYID = 0
6,027,686 UART: [idev] Sha1 KeyId Algorithm
6,049,106 UART: [idev] --
6,053,808 UART: [ldev] ++
6,054,377 UART: [ldev] CDI.KEYID = 6
6,055,270 UART: [ldev] SUBJECT.KEYID = 5
6,056,375 UART: [ldev] AUTHORITY.KEYID = 7
6,057,723 UART: [ldev] FE.KEYID = 1
6,101,356 UART: [ldev] Erasing FE.KEYID = 1
8,603,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,693 UART: [ldev] --
10,415,240 UART: [fwproc] Wait for Commands...
10,418,368 UART: [fwproc] Recv command 0x46574c44
10,420,487 UART: [fwproc] Recv'd Img size: 114360 bytes
12,469,946 UART: ROM Fatal Error: 0x000B0018
12,473,070 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,027,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,271,052 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
2,029,478 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,173,877 UART:
2,174,278 UART: Running Caliptra ROM ...
2,175,461 UART:
2,175,632 UART: [state] CFI Enabled
2,176,594 UART: [state] LifecycleState = Unprovisioned
2,178,232 UART: [state] DebugLocked = No
2,179,337 UART: [state] WD Timer not started. Device not locked for debugging
2,181,809 UART: [kat] SHA2-256
2,182,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,498 UART: [kat] ++
2,185,944 UART: [kat] sha1
2,186,457 UART: [kat] SHA2-256
2,187,194 UART: [kat] SHA2-384
2,187,857 UART: [kat] SHA2-512-ACC
2,188,736 UART: [kat] ECC-384
3,277,494 UART: [kat] HMAC-384Kdf
3,289,549 UART: [kat] LMS
3,819,041 UART: [kat] --
3,823,293 UART: [cold-reset] ++
3,825,092 UART: [fht] FHT @ 0x50003400
3,835,761 UART: [idev] ++
3,836,325 UART: [idev] CDI.KEYID = 6
3,837,295 UART: [idev] SUBJECT.KEYID = 7
3,838,450 UART: [idev] UDS.KEYID = 0
3,856,636 UART: [idev] Erasing UDS.KEYID = 0
6,313,285 UART: [idev] Sha1 KeyId Algorithm
6,336,073 UART: [idev] --
6,341,744 UART: [ldev] ++
6,342,310 UART: [ldev] CDI.KEYID = 6
6,343,215 UART: [ldev] SUBJECT.KEYID = 5
6,344,312 UART: [ldev] AUTHORITY.KEYID = 7
6,345,648 UART: [ldev] FE.KEYID = 1
6,355,427 UART: [ldev] Erasing FE.KEYID = 1
8,825,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,227 UART: [ldev] --
10,614,135 UART: [fwproc] Wait for Commands...
10,616,674 UART: [fwproc] Recv command 0x46574c44
10,618,766 UART: [fwproc] Recv'd Img size: 114360 bytes
12,670,449 UART: ROM Fatal Error: 0x000B0018
12,673,579 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,023,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,449,243 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,510 UART: [state] LifecycleState = Unprovisioned
85,165 UART: [state] DebugLocked = No
85,885 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,237 UART: [kat] SHA2-256
901,177 UART: [kat] SHA2-384
903,726 UART: [kat] SHA2-512-ACC
905,627 UART: [kat] ECC-384
915,442 UART: [kat] HMAC-384Kdf
920,066 UART: [kat] LMS
1,168,378 UART: [kat] --
1,169,105 UART: [cold-reset] ++
1,169,453 UART: [fht] FHT @ 0x50003400
1,172,155 UART: [idev] ++
1,172,323 UART: [idev] CDI.KEYID = 6
1,172,684 UART: [idev] SUBJECT.KEYID = 7
1,173,109 UART: [idev] UDS.KEYID = 0
1,180,643 UART: [idev] Erasing UDS.KEYID = 0
1,197,515 UART: [idev] Sha1 KeyId Algorithm
1,206,609 UART: [idev] --
1,207,656 UART: [ldev] ++
1,207,824 UART: [ldev] CDI.KEYID = 6
1,208,188 UART: [ldev] SUBJECT.KEYID = 5
1,208,615 UART: [ldev] AUTHORITY.KEYID = 7
1,209,078 UART: [ldev] FE.KEYID = 1
1,214,340 UART: [ldev] Erasing FE.KEYID = 1
1,240,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,278 UART: [ldev] --
1,279,726 UART: [fwproc] Wait for Commands...
1,280,539 UART: [fwproc] Recv command 0x46574c44
1,281,272 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,520 UART: ROM Fatal Error: 0x000B0018
1,328,677 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,118 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,452 UART: [kat] SHA2-256
902,392 UART: [kat] SHA2-384
905,169 UART: [kat] SHA2-512-ACC
907,070 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,812 UART: [cold-reset] ++
1,171,288 UART: [fht] FHT @ 0x50003400
1,173,918 UART: [idev] ++
1,174,086 UART: [idev] CDI.KEYID = 6
1,174,447 UART: [idev] SUBJECT.KEYID = 7
1,174,872 UART: [idev] UDS.KEYID = 0
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,262 UART: [idev] Sha1 KeyId Algorithm
1,209,136 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,905 UART: [ldev] SUBJECT.KEYID = 5
1,211,332 UART: [ldev] AUTHORITY.KEYID = 7
1,211,795 UART: [ldev] FE.KEYID = 1
1,217,399 UART: [ldev] Erasing FE.KEYID = 1
1,244,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,699 UART: [ldev] --
1,283,969 UART: [fwproc] Wait for Commands...
1,284,718 UART: [fwproc] Recv command 0x46574c44
1,285,451 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,247 UART: ROM Fatal Error: 0x000B0018
1,333,404 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,103 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,199,443 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,444 UART: [ldev] ++
1,209,612 UART: [ldev] CDI.KEYID = 6
1,209,976 UART: [ldev] SUBJECT.KEYID = 5
1,210,403 UART: [ldev] AUTHORITY.KEYID = 7
1,210,866 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,482 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,567 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,700 UART: ROM Fatal Error: 0x000B0018
1,330,857 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,742 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,867 UART: [state] LifecycleState = Unprovisioned
85,522 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,909 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,569 UART: ROM Fatal Error: 0x000B0018
1,331,726 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,759 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,927 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
890,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,863 UART: [kat] ++
895,015 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
903,986 UART: [kat] SHA2-512-ACC
905,887 UART: [kat] ECC-384
915,498 UART: [kat] HMAC-384Kdf
919,888 UART: [kat] LMS
1,168,200 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,727 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,181,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,083 UART: [idev] Sha1 KeyId Algorithm
1,207,095 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,214,734 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,835 UART: [fwproc] Recv command 0x46574c44
1,282,568 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,448 UART: ROM Fatal Error: 0x000B0018
1,330,605 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,564 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,062 UART: [kat] ++
896,214 UART: [kat] sha1
900,380 UART: [kat] SHA2-256
902,320 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,776 UART: [idev] ++
1,173,944 UART: [idev] CDI.KEYID = 6
1,174,305 UART: [idev] SUBJECT.KEYID = 7
1,174,730 UART: [idev] UDS.KEYID = 0
1,183,186 UART: [idev] Erasing UDS.KEYID = 0
1,200,202 UART: [idev] Sha1 KeyId Algorithm
1,209,170 UART: [idev] --
1,210,205 UART: [ldev] ++
1,210,373 UART: [ldev] CDI.KEYID = 6
1,210,737 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,611 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,163 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,895 UART: ROM Fatal Error: 0x000B0018
1,331,052 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,143 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,020,600 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,708 UART:
2,165,108 UART: Running Caliptra ROM ...
2,166,276 UART:
2,166,449 UART: [state] CFI Enabled
2,167,439 UART: [state] LifecycleState = Unprovisioned
2,169,082 UART: [state] DebugLocked = No
2,170,192 UART: [state] WD Timer not started. Device not locked for debugging
2,172,658 UART: [kat] SHA2-256
2,173,328 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,351 UART: [kat] ++
2,176,802 UART: [kat] sha1
2,177,314 UART: [kat] SHA2-256
2,177,969 UART: [kat] SHA2-384
2,178,668 UART: [kat] SHA2-512-ACC
2,179,471 UART: [kat] ECC-384
3,762,652 UART: [kat] HMAC-384Kdf
3,788,465 UART: [kat] LMS
4,861,612 UART: [kat] --
4,864,289 UART: [cold-reset] ++
4,866,123 UART: [fht] FHT @ 0x50003400
4,876,212 UART: [idev] ++
4,876,935 UART: [idev] CDI.KEYID = 6
4,878,129 UART: [idev] SUBJECT.KEYID = 7
4,879,238 UART: [idev] UDS.KEYID = 0
4,916,491 UART: [idev] Erasing UDS.KEYID = 0
8,227,305 UART: [idev] Sha1 KeyId Algorithm
8,250,741 UART: [idev] --
8,253,519 UART: [ldev] ++
8,254,094 UART: [ldev] CDI.KEYID = 6
8,255,286 UART: [ldev] SUBJECT.KEYID = 5
8,256,446 UART: [ldev] AUTHORITY.KEYID = 7
8,257,673 UART: [ldev] FE.KEYID = 1
8,302,997 UART: [ldev] Erasing FE.KEYID = 1
11,635,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,949,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,965,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,981,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,997,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,016,758 UART: [ldev] --
14,021,054 UART: [fwproc] Wait for Commands...
14,024,071 UART: [fwproc] Recv command 0x46574c44
14,026,392 UART: [fwproc] Recv'd Img size: 114036 bytes
16,729,941 UART: ROM Fatal Error: 0x000B0017
16,733,336 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,024,224 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,168,343 UART:
2,168,743 UART: Running Caliptra ROM ...
2,169,913 UART:
2,170,086 UART: [state] CFI Enabled
2,171,056 UART: [state] LifecycleState = Unprovisioned
2,172,702 UART: [state] DebugLocked = No
2,173,808 UART: [state] WD Timer not started. Device not locked for debugging
2,176,283 UART: [kat] SHA2-256
2,176,951 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,959 UART: [kat] ++
2,180,410 UART: [kat] sha1
2,181,003 UART: [kat] SHA2-256
2,181,856 UART: [kat] SHA2-384
2,182,523 UART: [kat] SHA2-512-ACC
2,183,403 UART: [kat] ECC-384
3,774,590 UART: [kat] HMAC-384Kdf
3,799,314 UART: [kat] LMS
4,872,444 UART: [kat] --
4,877,542 UART: [cold-reset] ++
4,879,273 UART: [fht] FHT @ 0x50003400
4,890,528 UART: [idev] ++
4,891,205 UART: [idev] CDI.KEYID = 6
4,892,365 UART: [idev] SUBJECT.KEYID = 7
4,893,574 UART: [idev] UDS.KEYID = 0
4,927,023 UART: [idev] Erasing UDS.KEYID = 0
8,242,623 UART: [idev] Sha1 KeyId Algorithm
8,264,658 UART: [idev] --
8,267,893 UART: [ldev] ++
8,268,456 UART: [ldev] CDI.KEYID = 6
8,269,620 UART: [ldev] SUBJECT.KEYID = 5
8,270,832 UART: [ldev] AUTHORITY.KEYID = 7
8,271,980 UART: [ldev] FE.KEYID = 1
8,314,860 UART: [ldev] Erasing FE.KEYID = 1
11,647,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,934 UART: [ldev] --
14,033,062 UART: [fwproc] Wait for Commands...
14,035,915 UART: [fwproc] Recv command 0x46574c44
14,038,177 UART: [fwproc] Recv'd Img size: 114036 bytes
16,736,922 UART: ROM Fatal Error: 0x000B0017
16,740,321 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,020,537 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,443 UART:
2,164,856 UART: Running Caliptra ROM ...
2,165,941 UART:
2,166,096 UART: [state] CFI Enabled
2,167,067 UART: [state] LifecycleState = Unprovisioned
2,168,724 UART: [state] DebugLocked = No
2,169,751 UART: [state] WD Timer not started. Device not locked for debugging
2,172,213 UART: [kat] SHA2-256
2,172,877 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,876 UART: [kat] ++
2,176,320 UART: [kat] sha1
2,176,828 UART: [kat] SHA2-256
2,177,504 UART: [kat] SHA2-384
2,178,161 UART: [kat] SHA2-512-ACC
2,179,156 UART: [kat] ECC-384
3,773,404 UART: [kat] HMAC-384Kdf
3,801,604 UART: [kat] LMS
4,874,757 UART: [kat] --
4,881,262 UART: [cold-reset] ++
4,882,828 UART: [fht] FHT @ 0x50003400
4,894,189 UART: [idev] ++
4,894,917 UART: [idev] CDI.KEYID = 6
4,896,093 UART: [idev] SUBJECT.KEYID = 7
4,897,251 UART: [idev] UDS.KEYID = 0
4,927,763 UART: [idev] Erasing UDS.KEYID = 0
8,239,408 UART: [idev] Sha1 KeyId Algorithm
8,261,290 UART: [idev] --
8,265,763 UART: [ldev] ++
8,266,401 UART: [ldev] CDI.KEYID = 6
8,267,502 UART: [ldev] SUBJECT.KEYID = 5
8,268,712 UART: [ldev] AUTHORITY.KEYID = 7
8,269,859 UART: [ldev] FE.KEYID = 1
8,316,319 UART: [ldev] Erasing FE.KEYID = 1
11,650,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,274 UART: [ldev] --
14,035,295 UART: [fwproc] Wait for Commands...
14,037,174 UART: [fwproc] Recv command 0x46574c44
14,039,489 UART: [fwproc] Recv'd Img size: 114036 bytes
16,743,980 UART: ROM Fatal Error: 0x000B0017
16,747,386 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,021,920 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,529,176 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,026,332 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,549,521 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,020,098 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,521,428 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,022,144 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,253 UART:
2,166,663 UART: Running Caliptra ROM ...
2,167,846 UART:
2,168,014 UART: [state] CFI Enabled
2,169,001 UART: [state] LifecycleState = Unprovisioned
2,170,645 UART: [state] DebugLocked = No
2,171,750 UART: [state] WD Timer not started. Device not locked for debugging
2,174,216 UART: [kat] SHA2-256
2,174,878 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,879 UART: [kat] ++
2,178,326 UART: [kat] sha1
2,178,867 UART: [kat] SHA2-256
2,179,522 UART: [kat] SHA2-384
2,180,169 UART: [kat] SHA2-512-ACC
2,181,045 UART: [kat] ECC-384
4,100,411 UART: [kat] HMAC-384Kdf
4,112,919 UART: [kat] LMS
5,186,095 UART: [kat] --
5,191,471 UART: [cold-reset] ++
5,192,764 UART: [fht] FHT @ 0x50003400
5,204,871 UART: [idev] ++
5,205,587 UART: [idev] CDI.KEYID = 6
5,206,816 UART: [idev] SUBJECT.KEYID = 7
5,208,240 UART: [idev] UDS.KEYID = 0
5,221,944 UART: [idev] Erasing UDS.KEYID = 0
8,495,197 UART: [idev] Sha1 KeyId Algorithm
8,516,661 UART: [idev] --
8,519,221 UART: [ldev] ++
8,519,793 UART: [ldev] CDI.KEYID = 6
8,521,026 UART: [ldev] SUBJECT.KEYID = 5
8,522,458 UART: [ldev] AUTHORITY.KEYID = 7
8,524,011 UART: [ldev] FE.KEYID = 1
8,535,740 UART: [ldev] Erasing FE.KEYID = 1
11,827,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,047 UART: [ldev] --
14,192,709 UART: [fwproc] Wait for Commands...
14,195,568 UART: [fwproc] Recv command 0x46574c44
14,197,880 UART: [fwproc] Recv'd Img size: 114036 bytes
16,901,572 UART: ROM Fatal Error: 0x000B0017
16,904,971 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,021,126 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,164,758 UART:
2,165,154 UART: Running Caliptra ROM ...
2,166,240 UART:
2,166,388 UART: [state] CFI Enabled
2,167,356 UART: [state] LifecycleState = Unprovisioned
2,169,026 UART: [state] DebugLocked = No
2,170,047 UART: [state] WD Timer not started. Device not locked for debugging
2,172,516 UART: [kat] SHA2-256
2,173,175 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,182 UART: [kat] ++
2,176,624 UART: [kat] sha1
2,177,126 UART: [kat] SHA2-256
2,177,775 UART: [kat] SHA2-384
2,178,422 UART: [kat] SHA2-512-ACC
2,179,323 UART: [kat] ECC-384
4,098,738 UART: [kat] HMAC-384Kdf
4,110,829 UART: [kat] LMS
5,183,996 UART: [kat] --
5,189,771 UART: [cold-reset] ++
5,190,950 UART: [fht] FHT @ 0x50003400
5,201,098 UART: [idev] ++
5,201,820 UART: [idev] CDI.KEYID = 6
5,202,916 UART: [idev] SUBJECT.KEYID = 7
5,204,447 UART: [idev] UDS.KEYID = 0
5,221,151 UART: [idev] Erasing UDS.KEYID = 0
8,496,119 UART: [idev] Sha1 KeyId Algorithm
8,516,813 UART: [idev] --
8,520,788 UART: [ldev] ++
8,521,358 UART: [ldev] CDI.KEYID = 6
8,522,514 UART: [ldev] SUBJECT.KEYID = 5
8,524,068 UART: [ldev] AUTHORITY.KEYID = 7
8,525,495 UART: [ldev] FE.KEYID = 1
8,537,658 UART: [ldev] Erasing FE.KEYID = 1
11,830,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,604 UART: [ldev] --
14,195,333 UART: [fwproc] Wait for Commands...
14,197,267 UART: [fwproc] Recv command 0x46574c44
14,199,578 UART: [fwproc] Recv'd Img size: 114036 bytes
16,899,378 UART: ROM Fatal Error: 0x000B0017
16,902,997 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
2,022,717 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,207 UART:
2,166,595 UART: Running Caliptra ROM ...
2,167,683 UART:
2,167,828 UART: [state] CFI Enabled
2,168,797 UART: [state] LifecycleState = Unprovisioned
2,170,435 UART: [state] DebugLocked = No
2,171,455 UART: [state] WD Timer not started. Device not locked for debugging
2,173,914 UART: [kat] SHA2-256
2,174,574 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,573 UART: [kat] ++
2,178,037 UART: [kat] sha1
2,178,546 UART: [kat] SHA2-256
2,179,197 UART: [kat] SHA2-384
2,179,844 UART: [kat] SHA2-512-ACC
2,180,634 UART: [kat] ECC-384
4,101,974 UART: [kat] HMAC-384Kdf
4,114,509 UART: [kat] LMS
5,187,663 UART: [kat] --
5,192,756 UART: [cold-reset] ++
5,194,798 UART: [fht] FHT @ 0x50003400
5,205,612 UART: [idev] ++
5,206,278 UART: [idev] CDI.KEYID = 6
5,207,507 UART: [idev] SUBJECT.KEYID = 7
5,208,933 UART: [idev] UDS.KEYID = 0
5,228,104 UART: [idev] Erasing UDS.KEYID = 0
8,503,158 UART: [idev] Sha1 KeyId Algorithm
8,526,293 UART: [idev] --
8,530,718 UART: [ldev] ++
8,531,283 UART: [ldev] CDI.KEYID = 6
8,532,508 UART: [ldev] SUBJECT.KEYID = 5
8,533,934 UART: [ldev] AUTHORITY.KEYID = 7
8,535,541 UART: [ldev] FE.KEYID = 1
8,546,237 UART: [ldev] Erasing FE.KEYID = 1
11,836,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,145,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,161,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,177,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,198,012 UART: [ldev] --
14,202,375 UART: [fwproc] Wait for Commands...
14,203,927 UART: [fwproc] Recv command 0x46574c44
14,206,250 UART: [fwproc] Recv'd Img size: 114036 bytes
16,909,015 UART: ROM Fatal Error: 0x000B0017
16,912,416 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,027,525 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,723,571 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,021,090 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,719,263 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,020,842 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,725,485 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,035,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,179,722 UART:
2,180,125 UART: Running Caliptra ROM ...
2,181,315 UART:
2,181,489 UART: [state] CFI Enabled
2,182,457 UART: [state] LifecycleState = Unprovisioned
2,184,102 UART: [state] DebugLocked = No
2,185,211 UART: [state] WD Timer not started. Device not locked for debugging
2,187,696 UART: [kat] SHA2-256
2,188,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,372 UART: [kat] ++
2,191,858 UART: [kat] sha1
2,192,373 UART: [kat] SHA2-256
2,193,028 UART: [kat] SHA2-384
2,193,689 UART: [kat] SHA2-512-ACC
2,194,482 UART: [kat] ECC-384
2,948,508 UART: [kat] HMAC-384Kdf
2,970,910 UART: [kat] LMS
3,500,374 UART: [kat] --
3,504,309 UART: [cold-reset] ++
3,505,778 UART: [fht] FHT @ 0x50003400
3,515,635 UART: [idev] ++
3,516,203 UART: [idev] CDI.KEYID = 6
3,517,121 UART: [idev] SUBJECT.KEYID = 7
3,518,280 UART: [idev] UDS.KEYID = 0
3,543,975 UART: [idev] Erasing UDS.KEYID = 0
6,027,412 UART: [idev] Sha1 KeyId Algorithm
6,050,660 UART: [idev] --
6,055,579 UART: [ldev] ++
6,056,146 UART: [ldev] CDI.KEYID = 6
6,057,056 UART: [ldev] SUBJECT.KEYID = 5
6,058,280 UART: [ldev] AUTHORITY.KEYID = 7
6,059,517 UART: [ldev] FE.KEYID = 1
6,099,778 UART: [ldev] Erasing FE.KEYID = 1
8,603,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,794 UART: [ldev] --
10,413,148 UART: [fwproc] Wait for Commands...
10,415,303 UART: [fwproc] Recv command 0x46574c44
10,417,405 UART: [fwproc] Recv'd Img size: 114360 bytes
12,467,656 UART: ROM Fatal Error: 0x000B0017
12,470,778 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,033,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,178,015 UART:
2,178,414 UART: Running Caliptra ROM ...
2,179,520 UART:
2,179,679 UART: [state] CFI Enabled
2,180,643 UART: [state] LifecycleState = Unprovisioned
2,182,303 UART: [state] DebugLocked = No
2,183,335 UART: [state] WD Timer not started. Device not locked for debugging
2,185,738 UART: [kat] SHA2-256
2,186,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,405 UART: [kat] ++
2,189,856 UART: [kat] sha1
2,190,369 UART: [kat] SHA2-256
2,191,108 UART: [kat] SHA2-384
2,191,772 UART: [kat] SHA2-512-ACC
2,192,617 UART: [kat] ECC-384
2,947,874 UART: [kat] HMAC-384Kdf
2,971,593 UART: [kat] LMS
3,501,016 UART: [kat] --
3,505,296 UART: [cold-reset] ++
3,506,593 UART: [fht] FHT @ 0x50003400
3,518,844 UART: [idev] ++
3,519,406 UART: [idev] CDI.KEYID = 6
3,520,341 UART: [idev] SUBJECT.KEYID = 7
3,521,555 UART: [idev] UDS.KEYID = 0
3,543,400 UART: [idev] Erasing UDS.KEYID = 0
6,026,915 UART: [idev] Sha1 KeyId Algorithm
6,051,502 UART: [idev] --
6,055,771 UART: [ldev] ++
6,056,343 UART: [ldev] CDI.KEYID = 6
6,057,227 UART: [ldev] SUBJECT.KEYID = 5
6,058,464 UART: [ldev] AUTHORITY.KEYID = 7
6,059,709 UART: [ldev] FE.KEYID = 1
6,099,888 UART: [ldev] Erasing FE.KEYID = 1
8,602,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,709 UART: [ldev] --
10,414,155 UART: [fwproc] Wait for Commands...
10,416,205 UART: [fwproc] Recv command 0x46574c44
10,418,300 UART: [fwproc] Recv'd Img size: 114360 bytes
12,465,326 UART: ROM Fatal Error: 0x000B0017
12,468,444 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,038,367 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,182,290 UART:
2,182,679 UART: Running Caliptra ROM ...
2,183,849 UART:
2,184,021 UART: [state] CFI Enabled
2,184,985 UART: [state] LifecycleState = Unprovisioned
2,186,646 UART: [state] DebugLocked = No
2,187,753 UART: [state] WD Timer not started. Device not locked for debugging
2,190,234 UART: [kat] SHA2-256
2,190,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,193,961 UART: [kat] ++
2,194,415 UART: [kat] sha1
2,194,926 UART: [kat] SHA2-256
2,195,581 UART: [kat] SHA2-384
2,196,237 UART: [kat] SHA2-512-ACC
2,197,067 UART: [kat] ECC-384
2,925,614 UART: [kat] HMAC-384Kdf
2,953,102 UART: [kat] LMS
3,482,567 UART: [kat] --
3,486,593 UART: [cold-reset] ++
3,487,941 UART: [fht] FHT @ 0x50003400
3,498,001 UART: [idev] ++
3,498,572 UART: [idev] CDI.KEYID = 6
3,499,450 UART: [idev] SUBJECT.KEYID = 7
3,500,719 UART: [idev] UDS.KEYID = 0
3,525,175 UART: [idev] Erasing UDS.KEYID = 0
6,006,880 UART: [idev] Sha1 KeyId Algorithm
6,028,441 UART: [idev] --
6,033,142 UART: [ldev] ++
6,033,714 UART: [ldev] CDI.KEYID = 6
6,034,596 UART: [ldev] SUBJECT.KEYID = 5
6,035,819 UART: [ldev] AUTHORITY.KEYID = 7
6,037,052 UART: [ldev] FE.KEYID = 1
6,080,691 UART: [ldev] Erasing FE.KEYID = 1
8,582,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,585 UART: [ldev] --
10,373,974 UART: [fwproc] Wait for Commands...
10,377,123 UART: [fwproc] Recv command 0x46574c44
10,379,224 UART: [fwproc] Recv'd Img size: 114360 bytes
12,430,266 UART: ROM Fatal Error: 0x000B0017
12,433,389 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,021,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,348 UART:
2,166,748 UART: Running Caliptra ROM ...
2,167,849 UART:
2,168,006 UART: [state] CFI Enabled
2,168,989 UART: [state] LifecycleState = Unprovisioned
2,170,638 UART: [state] DebugLocked = No
2,171,667 UART: [state] WD Timer not started. Device not locked for debugging
2,174,146 UART: [kat] SHA2-256
2,174,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,830 UART: [kat] ++
2,178,277 UART: [kat] sha1
2,178,786 UART: [kat] SHA2-256
2,179,442 UART: [kat] SHA2-384
2,180,098 UART: [kat] SHA2-512-ACC
2,180,897 UART: [kat] ECC-384
2,947,982 UART: [kat] HMAC-384Kdf
2,970,967 UART: [kat] LMS
3,500,445 UART: [kat] --
3,505,484 UART: [cold-reset] ++
3,507,854 UART: [fht] FHT @ 0x50003400
3,518,834 UART: [idev] ++
3,519,405 UART: [idev] CDI.KEYID = 6
3,520,286 UART: [idev] SUBJECT.KEYID = 7
3,521,498 UART: [idev] UDS.KEYID = 0
3,544,141 UART: [idev] Erasing UDS.KEYID = 0
6,025,919 UART: [idev] Sha1 KeyId Algorithm
6,049,747 UART: [idev] --
6,053,531 UART: [ldev] ++
6,054,107 UART: [ldev] CDI.KEYID = 6
6,055,036 UART: [ldev] SUBJECT.KEYID = 5
6,056,202 UART: [ldev] AUTHORITY.KEYID = 7
6,057,439 UART: [ldev] FE.KEYID = 1
6,099,905 UART: [ldev] Erasing FE.KEYID = 1
8,601,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,388 UART: [ldev] --
10,412,572 UART: [fwproc] Wait for Commands...
10,414,671 UART: [fwproc] Recv command 0x46574c44
10,416,767 UART: [fwproc] Recv'd Img size: 114360 bytes
12,468,007 UART: ROM Fatal Error: 0x000B0017
12,471,089 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,021,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,040 UART:
2,166,435 UART: Running Caliptra ROM ...
2,167,565 UART:
2,167,723 UART: [state] CFI Enabled
2,168,688 UART: [state] LifecycleState = Unprovisioned
2,170,356 UART: [state] DebugLocked = No
2,171,383 UART: [state] WD Timer not started. Device not locked for debugging
2,173,842 UART: [kat] SHA2-256
2,174,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,519 UART: [kat] ++
2,178,007 UART: [kat] sha1
2,178,525 UART: [kat] SHA2-256
2,179,291 UART: [kat] SHA2-384
2,179,961 UART: [kat] SHA2-512-ACC
2,180,856 UART: [kat] ECC-384
2,947,401 UART: [kat] HMAC-384Kdf
2,970,664 UART: [kat] LMS
3,500,089 UART: [kat] --
3,505,332 UART: [cold-reset] ++
3,506,346 UART: [fht] FHT @ 0x50003400
3,516,930 UART: [idev] ++
3,517,497 UART: [idev] CDI.KEYID = 6
3,518,410 UART: [idev] SUBJECT.KEYID = 7
3,519,628 UART: [idev] UDS.KEYID = 0
3,543,273 UART: [idev] Erasing UDS.KEYID = 0
6,027,542 UART: [idev] Sha1 KeyId Algorithm
6,050,176 UART: [idev] --
6,054,479 UART: [ldev] ++
6,055,082 UART: [ldev] CDI.KEYID = 6
6,055,999 UART: [ldev] SUBJECT.KEYID = 5
6,057,108 UART: [ldev] AUTHORITY.KEYID = 7
6,058,398 UART: [ldev] FE.KEYID = 1
6,098,970 UART: [ldev] Erasing FE.KEYID = 1
8,600,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,115 UART: [ldev] --
10,412,056 UART: [fwproc] Wait for Commands...
10,414,261 UART: [fwproc] Recv command 0x46574c44
10,416,357 UART: [fwproc] Recv'd Img size: 114360 bytes
12,466,110 UART: ROM Fatal Error: 0x000B0017
12,469,231 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,026,944 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,171,032 UART:
2,171,446 UART: Running Caliptra ROM ...
2,172,618 UART:
2,172,783 UART: [state] CFI Enabled
2,173,743 UART: [state] LifecycleState = Unprovisioned
2,175,394 UART: [state] DebugLocked = No
2,176,504 UART: [state] WD Timer not started. Device not locked for debugging
2,178,977 UART: [kat] SHA2-256
2,179,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,677 UART: [kat] ++
2,183,128 UART: [kat] sha1
2,183,678 UART: [kat] SHA2-256
2,184,332 UART: [kat] SHA2-384
2,184,989 UART: [kat] SHA2-512-ACC
2,185,789 UART: [kat] ECC-384
2,950,046 UART: [kat] HMAC-384Kdf
2,971,840 UART: [kat] LMS
3,501,268 UART: [kat] --
3,503,858 UART: [cold-reset] ++
3,504,765 UART: [fht] FHT @ 0x50003400
3,515,882 UART: [idev] ++
3,516,451 UART: [idev] CDI.KEYID = 6
3,517,386 UART: [idev] SUBJECT.KEYID = 7
3,518,771 UART: [idev] UDS.KEYID = 0
3,543,832 UART: [idev] Erasing UDS.KEYID = 0
6,023,433 UART: [idev] Sha1 KeyId Algorithm
6,046,340 UART: [idev] --
6,049,687 UART: [ldev] ++
6,050,261 UART: [ldev] CDI.KEYID = 6
6,051,174 UART: [ldev] SUBJECT.KEYID = 5
6,052,337 UART: [ldev] AUTHORITY.KEYID = 7
6,053,573 UART: [ldev] FE.KEYID = 1
6,098,253 UART: [ldev] Erasing FE.KEYID = 1
8,601,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,753 UART: [ldev] --
10,410,789 UART: [fwproc] Wait for Commands...
10,412,479 UART: [fwproc] Recv command 0x46574c44
10,414,581 UART: [fwproc] Recv'd Img size: 114360 bytes
12,461,289 UART: ROM Fatal Error: 0x000B0017
12,464,414 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,020,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,244,274 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,024,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,202,282 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,021,891 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,241,127 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,021,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,351 UART:
2,166,744 UART: Running Caliptra ROM ...
2,167,823 UART:
2,167,977 UART: [state] CFI Enabled
2,168,948 UART: [state] LifecycleState = Unprovisioned
2,170,593 UART: [state] DebugLocked = No
2,171,616 UART: [state] WD Timer not started. Device not locked for debugging
2,174,106 UART: [kat] SHA2-256
2,174,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,786 UART: [kat] ++
2,178,231 UART: [kat] sha1
2,178,739 UART: [kat] SHA2-256
2,179,395 UART: [kat] SHA2-384
2,180,050 UART: [kat] SHA2-512-ACC
2,180,880 UART: [kat] ECC-384
3,279,888 UART: [kat] HMAC-384Kdf
3,293,911 UART: [kat] LMS
3,823,424 UART: [kat] --
3,826,390 UART: [cold-reset] ++
3,827,664 UART: [fht] FHT @ 0x50003400
3,839,138 UART: [idev] ++
3,839,703 UART: [idev] CDI.KEYID = 6
3,840,581 UART: [idev] SUBJECT.KEYID = 7
3,841,755 UART: [idev] UDS.KEYID = 0
3,856,701 UART: [idev] Erasing UDS.KEYID = 0
6,310,426 UART: [idev] Sha1 KeyId Algorithm
6,333,632 UART: [idev] --
6,337,142 UART: [ldev] ++
6,337,711 UART: [ldev] CDI.KEYID = 6
6,338,617 UART: [ldev] SUBJECT.KEYID = 5
6,339,776 UART: [ldev] AUTHORITY.KEYID = 7
6,341,062 UART: [ldev] FE.KEYID = 1
6,349,665 UART: [ldev] Erasing FE.KEYID = 1
8,822,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,719 UART: [ldev] --
10,609,771 UART: [fwproc] Wait for Commands...
10,612,367 UART: [fwproc] Recv command 0x46574c44
10,614,463 UART: [fwproc] Recv'd Img size: 114360 bytes
12,668,174 UART: ROM Fatal Error: 0x000B0017
12,671,245 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,021,759 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,165,796 UART:
2,166,356 UART: Running Caliptra ROM ...
2,167,537 UART:
2,167,731 UART: [state] CFI Enabled
2,168,692 UART: [state] LifecycleState = Unprovisioned
2,170,347 UART: [state] DebugLocked = No
2,171,455 UART: [state] WD Timer not started. Device not locked for debugging
2,173,925 UART: [kat] SHA2-256
2,174,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,593 UART: [kat] ++
2,178,039 UART: [kat] sha1
2,178,555 UART: [kat] SHA2-256
2,179,288 UART: [kat] SHA2-384
2,179,953 UART: [kat] SHA2-512-ACC
2,180,755 UART: [kat] ECC-384
3,278,483 UART: [kat] HMAC-384Kdf
3,290,995 UART: [kat] LMS
3,820,470 UART: [kat] --
3,825,541 UART: [cold-reset] ++
3,826,781 UART: [fht] FHT @ 0x50003400
3,837,110 UART: [idev] ++
3,837,667 UART: [idev] CDI.KEYID = 6
3,838,679 UART: [idev] SUBJECT.KEYID = 7
3,839,789 UART: [idev] UDS.KEYID = 0
3,858,237 UART: [idev] Erasing UDS.KEYID = 0
6,316,956 UART: [idev] Sha1 KeyId Algorithm
6,340,856 UART: [idev] --
6,344,776 UART: [ldev] ++
6,345,350 UART: [ldev] CDI.KEYID = 6
6,346,323 UART: [ldev] SUBJECT.KEYID = 5
6,347,481 UART: [ldev] AUTHORITY.KEYID = 7
6,348,709 UART: [ldev] FE.KEYID = 1
6,358,058 UART: [ldev] Erasing FE.KEYID = 1
8,832,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,380 UART: [ldev] --
10,625,206 UART: [fwproc] Wait for Commands...
10,626,704 UART: [fwproc] Recv command 0x46574c44
10,628,792 UART: [fwproc] Recv'd Img size: 114360 bytes
12,684,304 UART: ROM Fatal Error: 0x000B0017
12,687,392 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
2,022,510 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,166,913 UART:
2,167,311 UART: Running Caliptra ROM ...
2,168,481 UART:
2,168,663 UART: [state] CFI Enabled
2,169,617 UART: [state] LifecycleState = Unprovisioned
2,171,254 UART: [state] DebugLocked = No
2,172,357 UART: [state] WD Timer not started. Device not locked for debugging
2,174,832 UART: [kat] SHA2-256
2,175,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,497 UART: [kat] ++
2,178,945 UART: [kat] sha1
2,179,458 UART: [kat] SHA2-256
2,180,190 UART: [kat] SHA2-384
2,180,854 UART: [kat] SHA2-512-ACC
2,181,655 UART: [kat] ECC-384
3,279,259 UART: [kat] HMAC-384Kdf
3,292,133 UART: [kat] LMS
3,821,754 UART: [kat] --
3,826,187 UART: [cold-reset] ++
3,827,531 UART: [fht] FHT @ 0x50003400
3,837,855 UART: [idev] ++
3,838,414 UART: [idev] CDI.KEYID = 6
3,839,335 UART: [idev] SUBJECT.KEYID = 7
3,840,485 UART: [idev] UDS.KEYID = 0
3,857,515 UART: [idev] Erasing UDS.KEYID = 0
6,314,839 UART: [idev] Sha1 KeyId Algorithm
6,338,233 UART: [idev] --
6,343,086 UART: [ldev] ++
6,343,658 UART: [ldev] CDI.KEYID = 6
6,344,565 UART: [ldev] SUBJECT.KEYID = 5
6,345,775 UART: [ldev] AUTHORITY.KEYID = 7
6,347,025 UART: [ldev] FE.KEYID = 1
6,357,728 UART: [ldev] Erasing FE.KEYID = 1
8,838,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,932 UART: [ldev] --
10,628,939 UART: [fwproc] Wait for Commands...
10,630,396 UART: [fwproc] Recv command 0x46574c44
10,632,493 UART: [fwproc] Recv'd Img size: 114360 bytes
12,681,837 UART: ROM Fatal Error: 0x000B0017
12,684,956 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
2,020,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,457,811 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,020,784 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,455,111 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,020,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,453,087 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,759 UART: [idev] --
1,208,632 UART: [ldev] ++
1,208,800 UART: [ldev] CDI.KEYID = 6
1,209,164 UART: [ldev] SUBJECT.KEYID = 5
1,209,591 UART: [ldev] AUTHORITY.KEYID = 7
1,210,054 UART: [ldev] FE.KEYID = 1
1,215,172 UART: [ldev] Erasing FE.KEYID = 1
1,240,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,280,146 UART: [fwproc] Wait for Commands...
1,280,911 UART: [fwproc] Recv command 0x46574c44
1,281,644 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,796 UART: ROM Fatal Error: 0x000B0017
1,328,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,867 UART: [kat] ++
895,019 UART: [kat] sha1
899,229 UART: [kat] SHA2-256
901,169 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,628 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,681 UART: [idev] ++
1,172,849 UART: [idev] CDI.KEYID = 6
1,173,210 UART: [idev] SUBJECT.KEYID = 7
1,173,635 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,206,825 UART: [idev] --
1,207,874 UART: [ldev] ++
1,208,042 UART: [ldev] CDI.KEYID = 6
1,208,406 UART: [ldev] SUBJECT.KEYID = 5
1,208,833 UART: [ldev] AUTHORITY.KEYID = 7
1,209,296 UART: [ldev] FE.KEYID = 1
1,214,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,684 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,628 UART: ROM Fatal Error: 0x000B0017
1,330,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,664 UART: [ldev] ++
1,208,832 UART: [ldev] CDI.KEYID = 6
1,209,196 UART: [ldev] SUBJECT.KEYID = 5
1,209,623 UART: [ldev] AUTHORITY.KEYID = 7
1,210,086 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,602 UART: [ldev] --
1,280,904 UART: [fwproc] Wait for Commands...
1,281,603 UART: [fwproc] Recv command 0x46574c44
1,282,336 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,438 UART: ROM Fatal Error: 0x000B0017
1,330,595 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,930 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,275 UART: [state] LifecycleState = Unprovisioned
86,930 UART: [state] DebugLocked = No
87,538 UART: [state] WD Timer not started. Device not locked for debugging
88,791 UART: [kat] SHA2-256
892,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,470 UART: [kat] ++
896,622 UART: [kat] sha1
900,826 UART: [kat] SHA2-256
902,766 UART: [kat] SHA2-384
905,435 UART: [kat] SHA2-512-ACC
907,336 UART: [kat] ECC-384
917,433 UART: [kat] HMAC-384Kdf
922,093 UART: [kat] LMS
1,170,405 UART: [kat] --
1,171,346 UART: [cold-reset] ++
1,171,740 UART: [fht] FHT @ 0x50003400
1,174,490 UART: [idev] ++
1,174,658 UART: [idev] CDI.KEYID = 6
1,175,019 UART: [idev] SUBJECT.KEYID = 7
1,175,444 UART: [idev] UDS.KEYID = 0
1,182,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,798 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,651 UART: [ldev] ++
1,209,819 UART: [ldev] CDI.KEYID = 6
1,210,183 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,359 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,893 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,849 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,669 UART: ROM Fatal Error: 0x000B0017
1,331,826 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,291 UART: [kat] LMS
1,169,603 UART: [kat] --
1,170,592 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,562 UART: [idev] ++
1,173,730 UART: [idev] CDI.KEYID = 6
1,174,091 UART: [idev] SUBJECT.KEYID = 7
1,174,516 UART: [idev] UDS.KEYID = 0
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,175 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,957 UART: [ldev] --
1,282,363 UART: [fwproc] Wait for Commands...
1,283,104 UART: [fwproc] Recv command 0x46574c44
1,283,837 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,967 UART: ROM Fatal Error: 0x000B0017
1,332,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,208,146 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,911 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,437 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,575 UART: ROM Fatal Error: 0x000B0017
1,331,732 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,751 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,057 UART: [fht] FHT @ 0x50003400
1,172,629 UART: [idev] ++
1,172,797 UART: [idev] CDI.KEYID = 6
1,173,158 UART: [idev] SUBJECT.KEYID = 7
1,173,583 UART: [idev] UDS.KEYID = 0
1,181,215 UART: [idev] Erasing UDS.KEYID = 0
1,197,899 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,030 UART: [ldev] ++
1,208,198 UART: [ldev] CDI.KEYID = 6
1,208,562 UART: [ldev] SUBJECT.KEYID = 5
1,208,989 UART: [ldev] AUTHORITY.KEYID = 7
1,209,452 UART: [ldev] FE.KEYID = 1
1,214,908 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,252 UART: [ldev] --
1,280,604 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,934 UART: ROM Fatal Error: 0x000B0017
1,331,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,202 UART: [kat] HMAC-384Kdf
919,858 UART: [kat] LMS
1,168,170 UART: [kat] --
1,169,111 UART: [cold-reset] ++
1,169,687 UART: [fht] FHT @ 0x50003400
1,172,419 UART: [idev] ++
1,172,587 UART: [idev] CDI.KEYID = 6
1,172,948 UART: [idev] SUBJECT.KEYID = 7
1,173,373 UART: [idev] UDS.KEYID = 0
1,180,799 UART: [idev] Erasing UDS.KEYID = 0
1,197,875 UART: [idev] Sha1 KeyId Algorithm
1,206,685 UART: [idev] --
1,207,716 UART: [ldev] ++
1,207,884 UART: [ldev] CDI.KEYID = 6
1,208,248 UART: [ldev] SUBJECT.KEYID = 5
1,208,675 UART: [ldev] AUTHORITY.KEYID = 7
1,209,138 UART: [ldev] FE.KEYID = 1
1,214,536 UART: [ldev] Erasing FE.KEYID = 1
1,240,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,970 UART: [ldev] --
1,279,298 UART: [fwproc] Wait for Commands...
1,280,051 UART: [fwproc] Recv command 0x46574c44
1,280,784 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,354 UART: ROM Fatal Error: 0x000B0017
1,329,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,741 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,199,089 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,337 UART: [fwproc] Recv command 0x46574c44
1,282,070 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,134 UART: ROM Fatal Error: 0x000B0017
1,330,291 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,690 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,874 UART: [idev] Sha1 KeyId Algorithm
1,208,766 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,115 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,216,495 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,282,073 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,157 UART: ROM Fatal Error: 0x000B0017
1,332,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
891,865 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,994 UART: [kat] ++
896,146 UART: [kat] sha1
900,494 UART: [kat] SHA2-256
902,434 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
916,881 UART: [kat] HMAC-384Kdf
921,599 UART: [kat] LMS
1,169,911 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,056 UART: [fht] FHT @ 0x50003400
1,173,742 UART: [idev] ++
1,173,910 UART: [idev] CDI.KEYID = 6
1,174,271 UART: [idev] SUBJECT.KEYID = 7
1,174,696 UART: [idev] UDS.KEYID = 0
1,182,772 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,245 UART: [ldev] Erasing FE.KEYID = 1
1,242,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,403 UART: [fwproc] Wait for Commands...
1,283,094 UART: [fwproc] Recv command 0x46574c44
1,283,827 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,293 UART: ROM Fatal Error: 0x000B0017
1,331,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,104 UART: [state] WD Timer not started. Device not locked for debugging
87,287 UART: [kat] SHA2-256
890,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,966 UART: [kat] ++
895,118 UART: [kat] sha1
899,276 UART: [kat] SHA2-256
901,216 UART: [kat] SHA2-384
903,891 UART: [kat] SHA2-512-ACC
905,792 UART: [kat] ECC-384
915,401 UART: [kat] HMAC-384Kdf
919,883 UART: [kat] LMS
1,168,195 UART: [kat] --
1,168,880 UART: [cold-reset] ++
1,169,354 UART: [fht] FHT @ 0x50003400
1,172,162 UART: [idev] ++
1,172,330 UART: [idev] CDI.KEYID = 6
1,172,691 UART: [idev] SUBJECT.KEYID = 7
1,173,116 UART: [idev] UDS.KEYID = 0
1,180,474 UART: [idev] Erasing UDS.KEYID = 0
1,197,386 UART: [idev] Sha1 KeyId Algorithm
1,206,010 UART: [idev] --
1,207,215 UART: [ldev] ++
1,207,383 UART: [ldev] CDI.KEYID = 6
1,207,747 UART: [ldev] SUBJECT.KEYID = 5
1,208,174 UART: [ldev] AUTHORITY.KEYID = 7
1,208,637 UART: [ldev] FE.KEYID = 1
1,213,819 UART: [ldev] Erasing FE.KEYID = 1
1,240,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,045 UART: [ldev] --
1,279,403 UART: [fwproc] Wait for Commands...
1,280,212 UART: [fwproc] Recv command 0x46574c44
1,280,945 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,525 UART: ROM Fatal Error: 0x000B0017
1,328,682 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,289 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,976 UART: [kat] SHA2-512-ACC
906,877 UART: [kat] ECC-384
916,624 UART: [kat] HMAC-384Kdf
921,270 UART: [kat] LMS
1,169,582 UART: [kat] --
1,170,671 UART: [cold-reset] ++
1,171,197 UART: [fht] FHT @ 0x50003400
1,173,755 UART: [idev] ++
1,173,923 UART: [idev] CDI.KEYID = 6
1,174,284 UART: [idev] SUBJECT.KEYID = 7
1,174,709 UART: [idev] UDS.KEYID = 0
1,183,033 UART: [idev] Erasing UDS.KEYID = 0
1,199,849 UART: [idev] Sha1 KeyId Algorithm
1,208,791 UART: [idev] --
1,209,910 UART: [ldev] ++
1,210,078 UART: [ldev] CDI.KEYID = 6
1,210,442 UART: [ldev] SUBJECT.KEYID = 5
1,210,869 UART: [ldev] AUTHORITY.KEYID = 7
1,211,332 UART: [ldev] FE.KEYID = 1
1,216,698 UART: [ldev] Erasing FE.KEYID = 1
1,242,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,878 UART: [ldev] --
1,282,376 UART: [fwproc] Wait for Commands...
1,283,015 UART: [fwproc] Recv command 0x46574c44
1,283,748 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,934 UART: ROM Fatal Error: 0x000B0017
1,332,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,315 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,240,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,808 UART: [ldev] --
1,280,190 UART: [fwproc] Wait for Commands...
1,280,941 UART: [fwproc] Recv command 0x46574c44
1,281,674 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,324 UART: ROM Fatal Error: 0x000B0017
1,329,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,775 UART: [idev] ++
1,172,943 UART: [idev] CDI.KEYID = 6
1,173,304 UART: [idev] SUBJECT.KEYID = 7
1,173,729 UART: [idev] UDS.KEYID = 0
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,656 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,343 UART: ROM Fatal Error: 0x000B0017
1,330,500 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,436 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,929 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,673 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,879 UART: ROM Fatal Error: 0x000B0017
1,331,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,714 UART: [kat] ++
895,866 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,291 UART: [kat] LMS
1,169,603 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,170,966 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,182,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,457 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,913 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,671 UART: ROM Fatal Error: 0x000B0017
1,330,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
904,899 UART: [kat] SHA2-512-ACC
906,800 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,182,064 UART: [idev] Erasing UDS.KEYID = 0
1,198,716 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] --
1,208,785 UART: [ldev] ++
1,208,953 UART: [ldev] CDI.KEYID = 6
1,209,317 UART: [ldev] SUBJECT.KEYID = 5
1,209,744 UART: [ldev] AUTHORITY.KEYID = 7
1,210,207 UART: [ldev] FE.KEYID = 1
1,215,383 UART: [ldev] Erasing FE.KEYID = 1
1,241,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,348 UART: [fwproc] Recv command 0x46574c44
1,283,081 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,803 UART: ROM Fatal Error: 0x000B0017
1,330,960 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,945 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,023,684 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,168,001 UART:
2,168,411 UART: Running Caliptra ROM ...
2,169,491 UART:
2,169,648 UART: [state] CFI Enabled
2,170,649 UART: [state] LifecycleState = Unprovisioned
2,172,297 UART: [state] DebugLocked = No
2,173,322 UART: [state] WD Timer not started. Device not locked for debugging
2,175,797 UART: [kat] SHA2-256
2,176,671 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,709 UART: [kat] ++
2,180,159 UART: [kat] sha1
2,180,672 UART: [kat] SHA2-256
2,181,328 UART: [kat] SHA2-384
2,181,985 UART: [kat] SHA2-512-ACC
2,182,816 UART: [kat] ECC-384
3,774,690 UART: [kat] HMAC-384Kdf
3,803,491 UART: [kat] LMS
4,876,618 UART: [kat] --
4,881,071 UART: [cold-reset] ++
4,882,158 UART: [fht] FHT @ 0x50003400
4,892,945 UART: [idev] ++
4,893,621 UART: [idev] CDI.KEYID = 6
4,894,856 UART: [idev] SUBJECT.KEYID = 7
4,896,012 UART: [idev] UDS.KEYID = 0
4,930,665 UART: [idev] Erasing UDS.KEYID = 0
8,244,523 UART: [idev] Sha1 KeyId Algorithm
8,267,429 UART: [idev] --
8,271,398 UART: [ldev] ++
8,271,973 UART: [ldev] CDI.KEYID = 6
8,273,215 UART: [ldev] SUBJECT.KEYID = 5
8,274,385 UART: [ldev] AUTHORITY.KEYID = 7
8,275,485 UART: [ldev] FE.KEYID = 1
8,318,941 UART: [ldev] Erasing FE.KEYID = 1
11,652,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,827 UART: [ldev] --
14,037,792 UART: [fwproc] Wait for Commands...
14,040,658 UART: [fwproc] Recv command 0x46574c44
14,042,935 UART: [fwproc] Recv'd Img size: 114036 bytes
16,740,603 UART: ROM Fatal Error: 0x000B003B
16,744,022 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,023,736 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,543,606 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,033,401 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,177,812 UART:
2,178,220 UART: Running Caliptra ROM ...
2,179,296 UART:
2,179,445 UART: [state] CFI Enabled
2,180,429 UART: [state] LifecycleState = Unprovisioned
2,182,068 UART: [state] DebugLocked = No
2,183,090 UART: [state] WD Timer not started. Device not locked for debugging
2,185,568 UART: [kat] SHA2-256
2,186,229 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,189,233 UART: [kat] ++
2,189,674 UART: [kat] sha1
2,190,176 UART: [kat] SHA2-256
2,190,824 UART: [kat] SHA2-384
2,191,471 UART: [kat] SHA2-512-ACC
2,192,261 UART: [kat] ECC-384
4,098,377 UART: [kat] HMAC-384Kdf
4,110,420 UART: [kat] LMS
5,183,603 UART: [kat] --
5,188,226 UART: [cold-reset] ++
5,189,733 UART: [fht] FHT @ 0x50003400
5,200,927 UART: [idev] ++
5,201,659 UART: [idev] CDI.KEYID = 6
5,202,841 UART: [idev] SUBJECT.KEYID = 7
5,204,294 UART: [idev] UDS.KEYID = 0
5,219,360 UART: [idev] Erasing UDS.KEYID = 0
8,492,730 UART: [idev] Sha1 KeyId Algorithm
8,513,052 UART: [idev] --
8,516,670 UART: [ldev] ++
8,517,238 UART: [ldev] CDI.KEYID = 6
8,518,474 UART: [ldev] SUBJECT.KEYID = 5
8,519,907 UART: [ldev] AUTHORITY.KEYID = 7
8,521,467 UART: [ldev] FE.KEYID = 1
8,533,628 UART: [ldev] Erasing FE.KEYID = 1
11,819,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,791 UART: [ldev] --
14,185,286 UART: [fwproc] Wait for Commands...
14,187,111 UART: [fwproc] Recv command 0x46574c44
14,189,378 UART: [fwproc] Recv'd Img size: 114036 bytes
16,897,358 UART: ROM Fatal Error: 0x000B003B
16,900,771 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,025,737 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,712,602 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,037,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,182,207 UART:
2,182,610 UART: Running Caliptra ROM ...
2,183,692 UART:
2,183,865 UART: [state] CFI Enabled
2,184,839 UART: [state] LifecycleState = Unprovisioned
2,186,490 UART: [state] DebugLocked = No
2,187,600 UART: [state] WD Timer not started. Device not locked for debugging
2,190,078 UART: [kat] SHA2-256
2,190,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,193,762 UART: [kat] ++
2,194,215 UART: [kat] sha1
2,194,818 UART: [kat] SHA2-256
2,195,499 UART: [kat] SHA2-384
2,196,156 UART: [kat] SHA2-512-ACC
2,196,955 UART: [kat] ECC-384
2,946,666 UART: [kat] HMAC-384Kdf
2,969,480 UART: [kat] LMS
3,498,946 UART: [kat] --
3,504,823 UART: [cold-reset] ++
3,507,313 UART: [fht] FHT @ 0x50003400
3,518,622 UART: [idev] ++
3,519,194 UART: [idev] CDI.KEYID = 6
3,520,105 UART: [idev] SUBJECT.KEYID = 7
3,521,259 UART: [idev] UDS.KEYID = 0
3,540,301 UART: [idev] Erasing UDS.KEYID = 0
6,023,307 UART: [idev] Sha1 KeyId Algorithm
6,045,846 UART: [idev] --
6,048,599 UART: [ldev] ++
6,049,174 UART: [ldev] CDI.KEYID = 6
6,050,084 UART: [ldev] SUBJECT.KEYID = 5
6,051,306 UART: [ldev] AUTHORITY.KEYID = 7
6,052,542 UART: [ldev] FE.KEYID = 1
6,097,493 UART: [ldev] Erasing FE.KEYID = 1
8,600,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,764 UART: [ldev] --
10,410,610 UART: [fwproc] Wait for Commands...
10,412,177 UART: [fwproc] Recv command 0x46574c44
10,414,228 UART: [fwproc] Recv'd Img size: 114360 bytes
12,458,741 UART: ROM Fatal Error: 0x000B003B
12,461,822 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
2,027,218 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,171,504 UART:
2,171,912 UART: Running Caliptra ROM ...
2,173,085 UART:
2,173,262 UART: [state] CFI Enabled
2,174,497 UART: [state] LifecycleState = Unprovisioned
2,176,159 UART: [state] DebugLocked = No
2,177,270 UART: [state] WD Timer not started. Device not locked for debugging
2,179,748 UART: [kat] SHA2-256
2,180,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,526 UART: [kat] ++
2,183,987 UART: [kat] sha1
2,184,504 UART: [kat] SHA2-256
2,185,163 UART: [kat] SHA2-384
2,185,850 UART: [kat] SHA2-512-ACC
2,186,678 UART: [kat] ECC-384
2,947,672 UART: [kat] HMAC-384Kdf
2,970,139 UART: [kat] LMS
3,499,596 UART: [kat] --
3,504,076 UART: [cold-reset] ++
3,506,179 UART: [fht] FHT @ 0x50003400
3,516,370 UART: [idev] ++
3,516,940 UART: [idev] CDI.KEYID = 6
3,517,880 UART: [idev] SUBJECT.KEYID = 7
3,519,096 UART: [idev] UDS.KEYID = 0
3,542,482 UART: [idev] Erasing UDS.KEYID = 0
6,025,215 UART: [idev] Sha1 KeyId Algorithm
6,047,010 UART: [idev] --
6,050,636 UART: [ldev] ++
6,051,211 UART: [ldev] CDI.KEYID = 6
6,052,123 UART: [ldev] SUBJECT.KEYID = 5
6,053,289 UART: [ldev] AUTHORITY.KEYID = 7
6,054,529 UART: [ldev] FE.KEYID = 1
6,098,486 UART: [ldev] Erasing FE.KEYID = 1
8,603,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,356 UART: [ldev] --
10,413,859 UART: [fwproc] Wait for Commands...
10,417,081 UART: [fwproc] Recv command 0x46574c44
10,419,195 UART: [fwproc] Recv'd Img size: 114360 bytes
12,469,934 UART: ROM Fatal Error: 0x000B003B
12,473,048 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,025,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,227,098 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
2,027,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,171,439 UART:
2,171,829 UART: Running Caliptra ROM ...
2,172,899 UART:
2,173,055 UART: [state] CFI Enabled
2,174,025 UART: [state] LifecycleState = Unprovisioned
2,175,674 UART: [state] DebugLocked = No
2,176,695 UART: [state] WD Timer not started. Device not locked for debugging
2,179,163 UART: [kat] SHA2-256
2,179,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,084 UART: [kat] ++
2,183,549 UART: [kat] sha1
2,184,061 UART: [kat] SHA2-256
2,184,721 UART: [kat] SHA2-384
2,185,377 UART: [kat] SHA2-512-ACC
2,186,263 UART: [kat] ECC-384
3,284,779 UART: [kat] HMAC-384Kdf
3,297,545 UART: [kat] LMS
3,827,069 UART: [kat] --
3,832,411 UART: [cold-reset] ++
3,834,116 UART: [fht] FHT @ 0x50003400
3,846,658 UART: [idev] ++
3,847,213 UART: [idev] CDI.KEYID = 6
3,848,086 UART: [idev] SUBJECT.KEYID = 7
3,849,295 UART: [idev] UDS.KEYID = 0
3,865,651 UART: [idev] Erasing UDS.KEYID = 0
6,323,832 UART: [idev] Sha1 KeyId Algorithm
6,346,677 UART: [idev] --
6,350,695 UART: [ldev] ++
6,351,272 UART: [ldev] CDI.KEYID = 6
6,352,154 UART: [ldev] SUBJECT.KEYID = 5
6,353,370 UART: [ldev] AUTHORITY.KEYID = 7
6,354,593 UART: [ldev] FE.KEYID = 1
6,363,856 UART: [ldev] Erasing FE.KEYID = 1
8,837,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,393 UART: [ldev] --
10,627,110 UART: [fwproc] Wait for Commands...
10,628,824 UART: [fwproc] Recv command 0x46574c44
10,630,938 UART: [fwproc] Recv'd Img size: 114360 bytes
12,682,468 UART: ROM Fatal Error: 0x000B003B
12,685,592 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,025,480 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,454,392 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,367 UART: [kat] SHA2-256
901,307 UART: [kat] SHA2-384
903,998 UART: [kat] SHA2-512-ACC
905,899 UART: [kat] ECC-384
915,192 UART: [kat] HMAC-384Kdf
919,678 UART: [kat] LMS
1,167,990 UART: [kat] --
1,169,167 UART: [cold-reset] ++
1,169,529 UART: [fht] FHT @ 0x50003400
1,172,289 UART: [idev] ++
1,172,457 UART: [idev] CDI.KEYID = 6
1,172,818 UART: [idev] SUBJECT.KEYID = 7
1,173,243 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,253 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,214,842 UART: [ldev] Erasing FE.KEYID = 1
1,240,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,416 UART: [ldev] --
1,279,930 UART: [fwproc] Wait for Commands...
1,280,721 UART: [fwproc] Recv command 0x46574c44
1,281,454 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,386 UART: ROM Fatal Error: 0x000B003B
1,329,545 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,948 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,399 UART: [kat] LMS
1,169,711 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,824 UART: [idev] ++
1,173,992 UART: [idev] CDI.KEYID = 6
1,174,353 UART: [idev] SUBJECT.KEYID = 7
1,174,778 UART: [idev] UDS.KEYID = 0
1,182,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,380 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,865 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,825 UART: ROM Fatal Error: 0x000B003B
1,331,984 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,747 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,984 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,784 UART: [ldev] --
1,280,076 UART: [fwproc] Wait for Commands...
1,280,895 UART: [fwproc] Recv command 0x46574c44
1,281,628 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,652 UART: ROM Fatal Error: 0x000B003B
1,329,811 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,156 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,433 UART: [kat] LMS
1,169,745 UART: [kat] --
1,170,796 UART: [cold-reset] ++
1,171,262 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,485 UART: [ldev] --
1,282,973 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,249 UART: ROM Fatal Error: 0x000B003B
1,332,408 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,144 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,799 UART: [idev] Sha1 KeyId Algorithm
1,208,525 UART: [idev] --
1,209,490 UART: [ldev] ++
1,209,658 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,449 UART: [ldev] AUTHORITY.KEYID = 7
1,210,912 UART: [ldev] FE.KEYID = 1
1,216,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,846 UART: [ldev] --
1,281,234 UART: [fwproc] Wait for Commands...
1,281,981 UART: [fwproc] Recv command 0x46574c44
1,282,714 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,522 UART: ROM Fatal Error: 0x000B003B
1,331,681 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,658 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
891,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,094 UART: [kat] ++
896,246 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
905,273 UART: [kat] SHA2-512-ACC
907,174 UART: [kat] ECC-384
916,837 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,187 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,851 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,015 UART: ROM Fatal Error: 0x000B003B
1,331,174 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,211 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,022,039 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,152 UART:
2,166,676 UART: Running Caliptra ROM ...
2,167,781 UART:
2,167,938 UART: [state] CFI Enabled
2,168,845 UART: [state] LifecycleState = Unprovisioned
2,170,491 UART: [state] DebugLocked = No
2,171,519 UART: [state] WD Timer not started. Device not locked for debugging
2,173,991 UART: [kat] SHA2-256
2,174,660 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,670 UART: [kat] ++
2,178,118 UART: [kat] sha1
2,178,646 UART: [kat] SHA2-256
2,179,310 UART: [kat] SHA2-384
2,179,971 UART: [kat] SHA2-512-ACC
2,180,818 UART: [kat] ECC-384
3,778,274 UART: [kat] HMAC-384Kdf
3,803,819 UART: [kat] LMS
4,876,972 UART: [kat] --
4,880,717 UART: [cold-reset] ++
4,883,306 UART: [fht] FHT @ 0x50003400
4,895,150 UART: [idev] ++
4,895,884 UART: [idev] CDI.KEYID = 6
4,897,064 UART: [idev] SUBJECT.KEYID = 7
4,898,220 UART: [idev] UDS.KEYID = 0
4,932,128 UART: [idev] Erasing UDS.KEYID = 0
8,246,074 UART: [idev] Sha1 KeyId Algorithm
8,268,329 UART: [idev] --
8,273,632 UART: [ldev] ++
8,274,321 UART: [ldev] CDI.KEYID = 6
8,275,567 UART: [ldev] SUBJECT.KEYID = 5
8,276,625 UART: [ldev] AUTHORITY.KEYID = 7
8,277,799 UART: [ldev] FE.KEYID = 1
8,319,017 UART: [ldev] Erasing FE.KEYID = 1
11,654,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,218 UART: [ldev] --
14,038,159 UART: [fwproc] Wait for Commands...
14,039,876 UART: [fwproc] Recv command 0x46574c44
14,042,203 UART: [fwproc] Recv'd Img size: 114036 bytes
16,738,963 UART: ROM Fatal Error: 0x000B0010
16,742,397 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,032 writing to cptra_bootfsm_go
2,022,339 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,514,908 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,030,002 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,174,426 UART:
2,174,831 UART: Running Caliptra ROM ...
2,175,916 UART:
2,176,066 UART: [state] CFI Enabled
2,177,042 UART: [state] LifecycleState = Unprovisioned
2,178,689 UART: [state] DebugLocked = No
2,179,712 UART: [state] WD Timer not started. Device not locked for debugging
2,182,167 UART: [kat] SHA2-256
2,182,827 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,185,824 UART: [kat] ++
2,186,265 UART: [kat] sha1
2,186,766 UART: [kat] SHA2-256
2,187,417 UART: [kat] SHA2-384
2,188,090 UART: [kat] SHA2-512-ACC
2,188,890 UART: [kat] ECC-384
4,094,464 UART: [kat] HMAC-384Kdf
4,105,357 UART: [kat] LMS
5,178,533 UART: [kat] --
5,185,237 UART: [cold-reset] ++
5,187,171 UART: [fht] FHT @ 0x50003400
5,199,507 UART: [idev] ++
5,200,175 UART: [idev] CDI.KEYID = 6
5,201,403 UART: [idev] SUBJECT.KEYID = 7
5,202,832 UART: [idev] UDS.KEYID = 0
5,221,287 UART: [idev] Erasing UDS.KEYID = 0
8,494,171 UART: [idev] Sha1 KeyId Algorithm
8,516,805 UART: [idev] --
8,519,714 UART: [ldev] ++
8,520,278 UART: [ldev] CDI.KEYID = 6
8,521,535 UART: [ldev] SUBJECT.KEYID = 5
8,522,974 UART: [ldev] AUTHORITY.KEYID = 7
8,524,533 UART: [ldev] FE.KEYID = 1
8,535,462 UART: [ldev] Erasing FE.KEYID = 1
11,827,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,228 UART: [ldev] --
14,191,496 UART: [fwproc] Wait for Commands...
14,194,132 UART: [fwproc] Recv command 0x46574c44
14,196,447 UART: [fwproc] Recv'd Img size: 114036 bytes
16,896,423 UART: ROM Fatal Error: 0x000B0010
16,899,843 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,029,924 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,702,798 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,023,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,236 UART:
2,168,635 UART: Running Caliptra ROM ...
2,169,811 UART:
2,169,980 UART: [state] CFI Enabled
2,170,945 UART: [state] LifecycleState = Unprovisioned
2,173,286 UART: [state] DebugLocked = No
2,174,415 UART: [state] WD Timer not started. Device not locked for debugging
2,176,909 UART: [kat] SHA2-256
2,177,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,599 UART: [kat] ++
2,181,091 UART: [kat] sha1
2,181,613 UART: [kat] SHA2-256
2,182,270 UART: [kat] SHA2-384
2,182,959 UART: [kat] SHA2-512-ACC
2,183,787 UART: [kat] ECC-384
2,946,786 UART: [kat] HMAC-384Kdf
2,973,525 UART: [kat] LMS
3,502,972 UART: [kat] --
3,508,776 UART: [cold-reset] ++
3,509,625 UART: [fht] FHT @ 0x50003400
3,519,900 UART: [idev] ++
3,520,465 UART: [idev] CDI.KEYID = 6
3,521,426 UART: [idev] SUBJECT.KEYID = 7
3,522,659 UART: [idev] UDS.KEYID = 0
3,544,802 UART: [idev] Erasing UDS.KEYID = 0
6,028,791 UART: [idev] Sha1 KeyId Algorithm
6,051,676 UART: [idev] --
6,054,222 UART: [ldev] ++
6,054,793 UART: [ldev] CDI.KEYID = 6
6,055,677 UART: [ldev] SUBJECT.KEYID = 5
6,056,896 UART: [ldev] AUTHORITY.KEYID = 7
6,058,129 UART: [ldev] FE.KEYID = 1
6,102,005 UART: [ldev] Erasing FE.KEYID = 1
8,605,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,789 UART: [ldev] --
10,417,271 UART: [fwproc] Wait for Commands...
10,419,384 UART: [fwproc] Recv command 0x46574c44
10,421,432 UART: [fwproc] Recv'd Img size: 114360 bytes
12,461,479 UART: ROM Fatal Error: 0x000B0010
12,464,595 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
2,035,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,179,960 UART:
2,180,380 UART: Running Caliptra ROM ...
2,181,548 UART:
2,181,725 UART: [state] CFI Enabled
2,182,693 UART: [state] LifecycleState = Unprovisioned
2,184,341 UART: [state] DebugLocked = No
2,185,452 UART: [state] WD Timer not started. Device not locked for debugging
2,187,922 UART: [kat] SHA2-256
2,188,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,590 UART: [kat] ++
2,192,255 UART: [kat] sha1
2,192,994 UART: [kat] SHA2-256
2,193,667 UART: [kat] SHA2-384
2,194,355 UART: [kat] SHA2-512-ACC
2,195,181 UART: [kat] ECC-384
2,947,791 UART: [kat] HMAC-384Kdf
2,973,959 UART: [kat] LMS
3,503,421 UART: [kat] --
3,506,002 UART: [cold-reset] ++
3,508,267 UART: [fht] FHT @ 0x50003400
3,520,110 UART: [idev] ++
3,520,675 UART: [idev] CDI.KEYID = 6
3,521,692 UART: [idev] SUBJECT.KEYID = 7
3,522,795 UART: [idev] UDS.KEYID = 0
3,544,771 UART: [idev] Erasing UDS.KEYID = 0
6,026,941 UART: [idev] Sha1 KeyId Algorithm
6,049,590 UART: [idev] --
6,052,761 UART: [ldev] ++
6,053,344 UART: [ldev] CDI.KEYID = 6
6,054,257 UART: [ldev] SUBJECT.KEYID = 5
6,055,422 UART: [ldev] AUTHORITY.KEYID = 7
6,056,662 UART: [ldev] FE.KEYID = 1
6,102,233 UART: [ldev] Erasing FE.KEYID = 1
8,604,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,678 UART: [ldev] --
10,412,810 UART: [fwproc] Wait for Commands...
10,415,885 UART: [fwproc] Recv command 0x46574c44
10,417,985 UART: [fwproc] Recv'd Img size: 114360 bytes
12,457,919 UART: ROM Fatal Error: 0x000B0010
12,461,055 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,022,308 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,247,662 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,023,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,906 UART:
2,168,331 UART: Running Caliptra ROM ...
2,169,506 UART:
2,169,679 UART: [state] CFI Enabled
2,170,636 UART: [state] LifecycleState = Unprovisioned
2,172,280 UART: [state] DebugLocked = No
2,173,306 UART: [state] WD Timer not started. Device not locked for debugging
2,175,769 UART: [kat] SHA2-256
2,176,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,441 UART: [kat] ++
2,179,887 UART: [kat] sha1
2,180,396 UART: [kat] SHA2-256
2,181,056 UART: [kat] SHA2-384
2,181,716 UART: [kat] SHA2-512-ACC
2,182,556 UART: [kat] ECC-384
3,274,402 UART: [kat] HMAC-384Kdf
3,287,289 UART: [kat] LMS
3,816,815 UART: [kat] --
3,820,447 UART: [cold-reset] ++
3,822,857 UART: [fht] FHT @ 0x50003400
3,832,312 UART: [idev] ++
3,832,869 UART: [idev] CDI.KEYID = 6
3,833,811 UART: [idev] SUBJECT.KEYID = 7
3,835,017 UART: [idev] UDS.KEYID = 0
3,852,318 UART: [idev] Erasing UDS.KEYID = 0
6,307,482 UART: [idev] Sha1 KeyId Algorithm
6,330,767 UART: [idev] --
6,334,543 UART: [ldev] ++
6,335,112 UART: [ldev] CDI.KEYID = 6
6,336,086 UART: [ldev] SUBJECT.KEYID = 5
6,337,245 UART: [ldev] AUTHORITY.KEYID = 7
6,338,469 UART: [ldev] FE.KEYID = 1
6,349,922 UART: [ldev] Erasing FE.KEYID = 1
8,820,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,603,476 UART: [ldev] --
10,608,148 UART: [fwproc] Wait for Commands...
10,610,120 UART: [fwproc] Recv command 0x46574c44
10,612,242 UART: [fwproc] Recv'd Img size: 114360 bytes
12,659,956 UART: ROM Fatal Error: 0x000B0010
12,663,061 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,022,219 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,458,002 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,605 UART: [idev] ++
1,172,773 UART: [idev] CDI.KEYID = 6
1,173,134 UART: [idev] SUBJECT.KEYID = 7
1,173,559 UART: [idev] UDS.KEYID = 0
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,209 UART: [idev] --
1,208,406 UART: [ldev] ++
1,208,574 UART: [ldev] CDI.KEYID = 6
1,208,938 UART: [ldev] SUBJECT.KEYID = 5
1,209,365 UART: [ldev] AUTHORITY.KEYID = 7
1,209,828 UART: [ldev] FE.KEYID = 1
1,215,230 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,073 UART: ROM Fatal Error: 0x000B0010
1,326,230 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,177,949 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,675 UART: [ldev] ++
1,208,843 UART: [ldev] CDI.KEYID = 6
1,209,207 UART: [ldev] SUBJECT.KEYID = 5
1,209,634 UART: [ldev] AUTHORITY.KEYID = 7
1,210,097 UART: [ldev] FE.KEYID = 1
1,215,409 UART: [ldev] Erasing FE.KEYID = 1
1,241,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,201 UART: [fwproc] Wait for Commands...
1,281,930 UART: [fwproc] Recv command 0x46574c44
1,282,663 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,148 UART: ROM Fatal Error: 0x000B0010
1,326,305 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,582 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
920,778 UART: [kat] LMS
1,169,090 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,199,355 UART: [idev] Sha1 KeyId Algorithm
1,208,333 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,120 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,569 UART: ROM Fatal Error: 0x000B0010
1,326,726 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,177,699 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,680 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,281,973 UART: [fwproc] Wait for Commands...
1,282,592 UART: [fwproc] Recv command 0x46574c44
1,283,325 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,470 UART: ROM Fatal Error: 0x000B0010
1,327,627 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,688 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,654 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,381 UART: [cold-reset] ++
1,169,879 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,198,333 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,088 UART: [ldev] ++
1,208,256 UART: [ldev] CDI.KEYID = 6
1,208,620 UART: [ldev] SUBJECT.KEYID = 5
1,209,047 UART: [ldev] AUTHORITY.KEYID = 7
1,209,510 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,240,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,306 UART: [ldev] --
1,279,816 UART: [fwproc] Wait for Commands...
1,280,403 UART: [fwproc] Recv command 0x46574c44
1,281,136 UART: [fwproc] Recv'd Img size: 114360 bytes
1,323,833 UART: ROM Fatal Error: 0x000B0010
1,324,990 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,129 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,956 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,181,460 UART: [idev] Erasing UDS.KEYID = 0
1,198,500 UART: [idev] Sha1 KeyId Algorithm
1,207,318 UART: [idev] --
1,208,313 UART: [ldev] ++
1,208,481 UART: [ldev] CDI.KEYID = 6
1,208,845 UART: [ldev] SUBJECT.KEYID = 5
1,209,272 UART: [ldev] AUTHORITY.KEYID = 7
1,209,735 UART: [ldev] FE.KEYID = 1
1,215,021 UART: [ldev] Erasing FE.KEYID = 1
1,241,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,991 UART: [ldev] --
1,280,419 UART: [fwproc] Wait for Commands...
1,281,192 UART: [fwproc] Recv command 0x46574c44
1,281,925 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,482 UART: ROM Fatal Error: 0x000B0010
1,326,639 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,880 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,022,420 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,166,565 UART:
2,166,976 UART: Running Caliptra ROM ...
2,168,061 UART:
2,168,218 UART: [state] CFI Enabled
2,169,203 UART: [state] LifecycleState = Unprovisioned
2,170,845 UART: [state] DebugLocked = No
2,171,868 UART: [state] WD Timer not started. Device not locked for debugging
2,174,338 UART: [kat] SHA2-256
2,175,002 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,012 UART: [kat] ++
2,178,461 UART: [kat] sha1
2,178,970 UART: [kat] SHA2-256
2,179,627 UART: [kat] SHA2-384
2,180,283 UART: [kat] SHA2-512-ACC
2,181,128 UART: [kat] ECC-384
3,777,900 UART: [kat] HMAC-384Kdf
3,803,523 UART: [kat] LMS
4,876,673 UART: [kat] --
4,880,909 UART: [cold-reset] ++
4,882,097 UART: [fht] FHT @ 0x50003400
4,893,604 UART: [idev] ++
4,894,284 UART: [idev] CDI.KEYID = 6
4,895,460 UART: [idev] SUBJECT.KEYID = 7
4,896,620 UART: [idev] UDS.KEYID = 0
4,930,452 UART: [idev] Erasing UDS.KEYID = 0
8,242,129 UART: [idev] Sha1 KeyId Algorithm
8,264,888 UART: [idev] --
8,268,941 UART: [ldev] ++
8,269,509 UART: [ldev] CDI.KEYID = 6
8,270,752 UART: [ldev] SUBJECT.KEYID = 5
8,271,836 UART: [ldev] AUTHORITY.KEYID = 7
8,273,244 UART: [ldev] FE.KEYID = 1
8,317,585 UART: [ldev] Erasing FE.KEYID = 1
11,652,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,493 UART: [ldev] --
14,034,463 UART: [fwproc] Wait for Commands...
14,036,149 UART: [fwproc] Recv command 0x46574c44
14,038,491 UART: [fwproc] Recv'd Img size: 114036 bytes
16,743,673 UART: ROM Fatal Error: 0x000B0012
16,747,091 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,020,458 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,553,181 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,026,993 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,171,406 UART:
2,171,826 UART: Running Caliptra ROM ...
2,173,005 UART:
2,173,176 UART: [state] CFI Enabled
2,174,186 UART: [state] LifecycleState = Unprovisioned
2,175,830 UART: [state] DebugLocked = No
2,176,931 UART: [state] WD Timer not started. Device not locked for debugging
2,179,407 UART: [kat] SHA2-256
2,180,069 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,071 UART: [kat] ++
2,183,518 UART: [kat] sha1
2,184,024 UART: [kat] SHA2-256
2,184,759 UART: [kat] SHA2-384
2,185,419 UART: [kat] SHA2-512-ACC
2,186,294 UART: [kat] ECC-384
4,095,524 UART: [kat] HMAC-384Kdf
4,107,456 UART: [kat] LMS
5,180,629 UART: [kat] --
5,184,977 UART: [cold-reset] ++
5,187,135 UART: [fht] FHT @ 0x50003400
5,198,356 UART: [idev] ++
5,199,036 UART: [idev] CDI.KEYID = 6
5,200,222 UART: [idev] SUBJECT.KEYID = 7
5,201,708 UART: [idev] UDS.KEYID = 0
5,217,949 UART: [idev] Erasing UDS.KEYID = 0
8,491,853 UART: [idev] Sha1 KeyId Algorithm
8,513,784 UART: [idev] --
8,519,031 UART: [ldev] ++
8,519,639 UART: [ldev] CDI.KEYID = 6
8,520,747 UART: [ldev] SUBJECT.KEYID = 5
8,522,292 UART: [ldev] AUTHORITY.KEYID = 7
8,523,775 UART: [ldev] FE.KEYID = 1
8,535,664 UART: [ldev] Erasing FE.KEYID = 1
11,829,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,102 UART: [ldev] --
14,196,972 UART: [fwproc] Wait for Commands...
14,200,085 UART: [fwproc] Recv command 0x46574c44
14,202,420 UART: [fwproc] Recv'd Img size: 114036 bytes
16,904,889 UART: ROM Fatal Error: 0x000B0012
16,908,300 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,022,581 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,717,832 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,023,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,167,941 UART:
2,168,339 UART: Running Caliptra ROM ...
2,169,515 UART:
2,169,700 UART: [state] CFI Enabled
2,170,667 UART: [state] LifecycleState = Unprovisioned
2,172,331 UART: [state] DebugLocked = No
2,173,620 UART: [state] WD Timer not started. Device not locked for debugging
2,176,103 UART: [kat] SHA2-256
2,176,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,775 UART: [kat] ++
2,180,225 UART: [kat] sha1
2,180,737 UART: [kat] SHA2-256
2,181,477 UART: [kat] SHA2-384
2,182,145 UART: [kat] SHA2-512-ACC
2,183,027 UART: [kat] ECC-384
2,947,126 UART: [kat] HMAC-384Kdf
2,971,715 UART: [kat] LMS
3,501,173 UART: [kat] --
3,506,002 UART: [cold-reset] ++
3,507,033 UART: [fht] FHT @ 0x50003400
3,517,479 UART: [idev] ++
3,518,066 UART: [idev] CDI.KEYID = 6
3,518,977 UART: [idev] SUBJECT.KEYID = 7
3,520,136 UART: [idev] UDS.KEYID = 0
3,544,274 UART: [idev] Erasing UDS.KEYID = 0
6,024,916 UART: [idev] Sha1 KeyId Algorithm
6,046,698 UART: [idev] --
6,049,615 UART: [ldev] ++
6,050,185 UART: [ldev] CDI.KEYID = 6
6,051,066 UART: [ldev] SUBJECT.KEYID = 5
6,052,201 UART: [ldev] AUTHORITY.KEYID = 7
6,053,541 UART: [ldev] FE.KEYID = 1
6,099,710 UART: [ldev] Erasing FE.KEYID = 1
8,603,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,407 UART: [ldev] --
10,410,160 UART: [fwproc] Wait for Commands...
10,411,933 UART: [fwproc] Recv command 0x46574c44
10,414,026 UART: [fwproc] Recv'd Img size: 114360 bytes
12,463,451 UART: ROM Fatal Error: 0x000B0012
12,466,587 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,030,208 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,175,068 UART:
2,175,490 UART: Running Caliptra ROM ...
2,176,629 UART:
2,176,794 UART: [state] CFI Enabled
2,177,700 UART: [state] LifecycleState = Unprovisioned
2,179,350 UART: [state] DebugLocked = No
2,180,459 UART: [state] WD Timer not started. Device not locked for debugging
2,182,927 UART: [kat] SHA2-256
2,183,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,186,602 UART: [kat] ++
2,187,094 UART: [kat] sha1
2,187,613 UART: [kat] SHA2-256
2,188,293 UART: [kat] SHA2-384
2,188,949 UART: [kat] SHA2-512-ACC
2,189,746 UART: [kat] ECC-384
2,946,981 UART: [kat] HMAC-384Kdf
2,972,236 UART: [kat] LMS
3,501,652 UART: [kat] --
3,505,339 UART: [cold-reset] ++
3,507,542 UART: [fht] FHT @ 0x50003400
3,519,606 UART: [idev] ++
3,520,177 UART: [idev] CDI.KEYID = 6
3,521,138 UART: [idev] SUBJECT.KEYID = 7
3,522,298 UART: [idev] UDS.KEYID = 0
3,543,299 UART: [idev] Erasing UDS.KEYID = 0
6,026,203 UART: [idev] Sha1 KeyId Algorithm
6,049,115 UART: [idev] --
6,053,283 UART: [ldev] ++
6,053,897 UART: [ldev] CDI.KEYID = 6
6,054,791 UART: [ldev] SUBJECT.KEYID = 5
6,055,870 UART: [ldev] AUTHORITY.KEYID = 7
6,057,229 UART: [ldev] FE.KEYID = 1
6,100,376 UART: [ldev] Erasing FE.KEYID = 1
8,606,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,737 UART: [ldev] --
10,413,137 UART: [fwproc] Wait for Commands...
10,415,456 UART: [fwproc] Recv command 0x46574c44
10,417,500 UART: [fwproc] Recv'd Img size: 114360 bytes
12,462,960 UART: ROM Fatal Error: 0x000B0012
12,466,085 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,027,400 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,261,282 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,023,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,246 UART:
2,168,638 UART: Running Caliptra ROM ...
2,169,812 UART:
2,169,984 UART: [state] CFI Enabled
2,170,946 UART: [state] LifecycleState = Unprovisioned
2,172,590 UART: [state] DebugLocked = No
2,173,690 UART: [state] WD Timer not started. Device not locked for debugging
2,176,152 UART: [kat] SHA2-256
2,176,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,807 UART: [kat] ++
2,180,256 UART: [kat] sha1
2,180,769 UART: [kat] SHA2-256
2,181,507 UART: [kat] SHA2-384
2,182,178 UART: [kat] SHA2-512-ACC
2,183,055 UART: [kat] ECC-384
3,279,841 UART: [kat] HMAC-384Kdf
3,293,380 UART: [kat] LMS
3,822,839 UART: [kat] --
3,825,313 UART: [cold-reset] ++
3,827,453 UART: [fht] FHT @ 0x50003400
3,839,018 UART: [idev] ++
3,839,581 UART: [idev] CDI.KEYID = 6
3,840,487 UART: [idev] SUBJECT.KEYID = 7
3,841,697 UART: [idev] UDS.KEYID = 0
3,860,314 UART: [idev] Erasing UDS.KEYID = 0
6,314,780 UART: [idev] Sha1 KeyId Algorithm
6,338,064 UART: [idev] --
6,343,297 UART: [ldev] ++
6,343,862 UART: [ldev] CDI.KEYID = 6
6,344,796 UART: [ldev] SUBJECT.KEYID = 5
6,346,007 UART: [ldev] AUTHORITY.KEYID = 7
6,347,241 UART: [ldev] FE.KEYID = 1
6,357,670 UART: [ldev] Erasing FE.KEYID = 1
8,833,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,692 UART: [ldev] --
10,623,655 UART: [fwproc] Wait for Commands...
10,625,314 UART: [fwproc] Recv command 0x46574c44
10,627,415 UART: [fwproc] Recv'd Img size: 114360 bytes
12,674,149 UART: ROM Fatal Error: 0x000B0012
12,677,283 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,026,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,449,131 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,251 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,854 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,100 UART: [ldev] --
1,280,384 UART: [fwproc] Wait for Commands...
1,281,019 UART: [fwproc] Recv command 0x46574c44
1,281,752 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,985 UART: ROM Fatal Error: 0x000B0012
1,330,142 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,349 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,645 UART: [kat] LMS
1,168,957 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,172,926 UART: [idev] ++
1,173,094 UART: [idev] CDI.KEYID = 6
1,173,455 UART: [idev] SUBJECT.KEYID = 7
1,173,880 UART: [idev] UDS.KEYID = 0
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,943 UART: [ldev] ++
1,209,111 UART: [ldev] CDI.KEYID = 6
1,209,475 UART: [ldev] SUBJECT.KEYID = 5
1,209,902 UART: [ldev] AUTHORITY.KEYID = 7
1,210,365 UART: [ldev] FE.KEYID = 1
1,215,461 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,547 UART: [ldev] --
1,280,891 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,862 UART: ROM Fatal Error: 0x000B0012
1,330,019 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,022 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,504 UART: [state] LifecycleState = Unprovisioned
85,159 UART: [state] DebugLocked = No
85,733 UART: [state] WD Timer not started. Device not locked for debugging
86,878 UART: [kat] SHA2-256
890,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,557 UART: [kat] ++
894,709 UART: [kat] sha1
898,861 UART: [kat] SHA2-256
900,801 UART: [kat] SHA2-384
903,360 UART: [kat] SHA2-512-ACC
905,261 UART: [kat] ECC-384
914,874 UART: [kat] HMAC-384Kdf
919,530 UART: [kat] LMS
1,167,842 UART: [kat] --
1,168,415 UART: [cold-reset] ++
1,168,867 UART: [fht] FHT @ 0x50003400
1,171,633 UART: [idev] ++
1,171,801 UART: [idev] CDI.KEYID = 6
1,172,162 UART: [idev] SUBJECT.KEYID = 7
1,172,587 UART: [idev] UDS.KEYID = 0
1,180,523 UART: [idev] Erasing UDS.KEYID = 0
1,197,285 UART: [idev] Sha1 KeyId Algorithm
1,206,305 UART: [idev] --
1,207,462 UART: [ldev] ++
1,207,630 UART: [ldev] CDI.KEYID = 6
1,207,994 UART: [ldev] SUBJECT.KEYID = 5
1,208,421 UART: [ldev] AUTHORITY.KEYID = 7
1,208,884 UART: [ldev] FE.KEYID = 1
1,213,948 UART: [ldev] Erasing FE.KEYID = 1
1,240,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,564 UART: [ldev] --
1,280,068 UART: [fwproc] Wait for Commands...
1,280,749 UART: [fwproc] Recv command 0x46574c44
1,281,482 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,489 UART: ROM Fatal Error: 0x000B0012
1,328,646 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,095 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,744 UART: [idev] --
1,208,751 UART: [ldev] ++
1,208,919 UART: [ldev] CDI.KEYID = 6
1,209,283 UART: [ldev] SUBJECT.KEYID = 5
1,209,710 UART: [ldev] AUTHORITY.KEYID = 7
1,210,173 UART: [ldev] FE.KEYID = 1
1,215,369 UART: [ldev] Erasing FE.KEYID = 1
1,241,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,403 UART: [ldev] --
1,280,675 UART: [fwproc] Wait for Commands...
1,281,344 UART: [fwproc] Recv command 0x46574c44
1,282,077 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,842 UART: ROM Fatal Error: 0x000B0012
1,329,999 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,808 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,566 UART: [kat] HMAC-384Kdf
921,126 UART: [kat] LMS
1,169,438 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,399 UART: ROM Fatal Error: 0x000B0012
1,329,556 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,535 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,181,910 UART: [idev] Erasing UDS.KEYID = 0
1,199,092 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,208,915 UART: [ldev] ++
1,209,083 UART: [ldev] CDI.KEYID = 6
1,209,447 UART: [ldev] SUBJECT.KEYID = 5
1,209,874 UART: [ldev] AUTHORITY.KEYID = 7
1,210,337 UART: [ldev] FE.KEYID = 1
1,215,247 UART: [ldev] Erasing FE.KEYID = 1
1,241,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,205 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,709 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,484 UART: ROM Fatal Error: 0x000B0012
1,330,641 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,886 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,023,070 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,167,100 UART:
2,167,510 UART: Running Caliptra ROM ...
2,168,622 UART:
2,168,787 UART: [state] CFI Enabled
2,169,763 UART: [state] LifecycleState = Unprovisioned
2,171,407 UART: [state] DebugLocked = No
2,172,439 UART: [state] WD Timer not started. Device not locked for debugging
2,174,911 UART: [kat] SHA2-256
2,175,577 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,583 UART: [kat] ++
2,179,047 UART: [kat] sha1
2,179,561 UART: [kat] SHA2-256
2,180,218 UART: [kat] SHA2-384
2,180,874 UART: [kat] SHA2-512-ACC
2,181,700 UART: [kat] ECC-384
3,775,175 UART: [kat] HMAC-384Kdf
3,802,993 UART: [kat] LMS
4,876,127 UART: [kat] --
4,881,816 UART: [cold-reset] ++
4,883,815 UART: [fht] FHT @ 0x50003400
4,894,726 UART: [idev] ++
4,895,406 UART: [idev] CDI.KEYID = 6
4,896,639 UART: [idev] SUBJECT.KEYID = 7
4,897,741 UART: [idev] UDS.KEYID = 0
4,930,192 UART: [idev] Erasing UDS.KEYID = 0
8,240,306 UART: [idev] Sha1 KeyId Algorithm
8,262,006 UART: [idev] --
8,266,155 UART: [ldev] ++
8,266,727 UART: [ldev] CDI.KEYID = 6
8,267,840 UART: [ldev] SUBJECT.KEYID = 5
8,269,108 UART: [ldev] AUTHORITY.KEYID = 7
8,270,255 UART: [ldev] FE.KEYID = 1
8,296,424 UART: [ldev] Erasing FE.KEYID = 1
11,633,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,774 UART: [ldev] --
14,016,710 UART: [fwproc] Wait for Commands...
14,019,353 UART: [fwproc] Recv command 0x46574c44
14,021,678 UART: [fwproc] Recv'd Img size: 114036 bytes
16,730,114 UART: ROM Fatal Error: 0x000B003C
16,733,527 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,023,538 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,544,718 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,025,393 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,169,698 UART:
2,170,114 UART: Running Caliptra ROM ...
2,171,282 UART:
2,171,448 UART: [state] CFI Enabled
2,172,426 UART: [state] LifecycleState = Unprovisioned
2,174,073 UART: [state] DebugLocked = No
2,175,182 UART: [state] WD Timer not started. Device not locked for debugging
2,177,649 UART: [kat] SHA2-256
2,178,312 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,322 UART: [kat] ++
2,181,769 UART: [kat] sha1
2,182,297 UART: [kat] SHA2-256
2,183,030 UART: [kat] SHA2-384
2,183,689 UART: [kat] SHA2-512-ACC
2,184,528 UART: [kat] ECC-384
4,096,440 UART: [kat] HMAC-384Kdf
4,106,743 UART: [kat] LMS
5,179,876 UART: [kat] --
5,184,496 UART: [cold-reset] ++
5,185,900 UART: [fht] FHT @ 0x50003400
5,196,883 UART: [idev] ++
5,197,600 UART: [idev] CDI.KEYID = 6
5,198,790 UART: [idev] SUBJECT.KEYID = 7
5,200,227 UART: [idev] UDS.KEYID = 0
5,214,997 UART: [idev] Erasing UDS.KEYID = 0
8,488,574 UART: [idev] Sha1 KeyId Algorithm
8,511,319 UART: [idev] --
8,515,751 UART: [ldev] ++
8,516,316 UART: [ldev] CDI.KEYID = 6
8,517,549 UART: [ldev] SUBJECT.KEYID = 5
8,518,981 UART: [ldev] AUTHORITY.KEYID = 7
8,520,541 UART: [ldev] FE.KEYID = 1
8,531,134 UART: [ldev] Erasing FE.KEYID = 1
11,820,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,444 UART: [ldev] --
14,186,684 UART: [fwproc] Wait for Commands...
14,189,581 UART: [fwproc] Recv command 0x46574c44
14,191,906 UART: [fwproc] Recv'd Img size: 114036 bytes
16,897,812 UART: ROM Fatal Error: 0x000B003C
16,901,242 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,027,536 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,710,273 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,027,892 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,172,277 UART:
2,172,672 UART: Running Caliptra ROM ...
2,173,841 UART:
2,174,034 UART: [state] CFI Enabled
2,175,014 UART: [state] LifecycleState = Unprovisioned
2,176,659 UART: [state] DebugLocked = No
2,177,765 UART: [state] WD Timer not started. Device not locked for debugging
2,180,248 UART: [kat] SHA2-256
2,180,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,920 UART: [kat] ++
2,184,368 UART: [kat] sha1
2,184,881 UART: [kat] SHA2-256
2,185,626 UART: [kat] SHA2-384
2,186,291 UART: [kat] SHA2-512-ACC
2,187,170 UART: [kat] ECC-384
2,948,529 UART: [kat] HMAC-384Kdf
2,971,277 UART: [kat] LMS
3,500,718 UART: [kat] --
3,506,153 UART: [cold-reset] ++
3,507,841 UART: [fht] FHT @ 0x50003400
3,518,607 UART: [idev] ++
3,519,177 UART: [idev] CDI.KEYID = 6
3,520,086 UART: [idev] SUBJECT.KEYID = 7
3,521,305 UART: [idev] UDS.KEYID = 0
3,544,354 UART: [idev] Erasing UDS.KEYID = 0
6,024,750 UART: [idev] Sha1 KeyId Algorithm
6,048,242 UART: [idev] --
6,052,266 UART: [ldev] ++
6,052,847 UART: [ldev] CDI.KEYID = 6
6,053,759 UART: [ldev] SUBJECT.KEYID = 5
6,054,917 UART: [ldev] AUTHORITY.KEYID = 7
6,056,210 UART: [ldev] FE.KEYID = 1
6,099,649 UART: [ldev] Erasing FE.KEYID = 1
8,602,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,257 UART: [ldev] --
10,413,738 UART: [fwproc] Wait for Commands...
10,415,782 UART: [fwproc] Recv command 0x46574c44
10,417,882 UART: [fwproc] Recv'd Img size: 114360 bytes
12,471,369 UART: ROM Fatal Error: 0x000B003C
12,474,442 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,033,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,177,452 UART:
2,177,857 UART: Running Caliptra ROM ...
2,178,936 UART:
2,179,087 UART: [state] CFI Enabled
2,180,056 UART: [state] LifecycleState = Unprovisioned
2,181,707 UART: [state] DebugLocked = No
2,182,737 UART: [state] WD Timer not started. Device not locked for debugging
2,185,211 UART: [kat] SHA2-256
2,185,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,885 UART: [kat] ++
2,189,353 UART: [kat] sha1
2,189,863 UART: [kat] SHA2-256
2,190,519 UART: [kat] SHA2-384
2,191,177 UART: [kat] SHA2-512-ACC
2,192,019 UART: [kat] ECC-384
2,950,505 UART: [kat] HMAC-384Kdf
2,971,820 UART: [kat] LMS
3,501,281 UART: [kat] --
3,505,164 UART: [cold-reset] ++
3,507,037 UART: [fht] FHT @ 0x50003400
3,518,105 UART: [idev] ++
3,518,685 UART: [idev] CDI.KEYID = 6
3,519,566 UART: [idev] SUBJECT.KEYID = 7
3,520,782 UART: [idev] UDS.KEYID = 0
3,543,352 UART: [idev] Erasing UDS.KEYID = 0
6,027,125 UART: [idev] Sha1 KeyId Algorithm
6,050,109 UART: [idev] --
6,054,706 UART: [ldev] ++
6,055,284 UART: [ldev] CDI.KEYID = 6
6,056,166 UART: [ldev] SUBJECT.KEYID = 5
6,057,386 UART: [ldev] AUTHORITY.KEYID = 7
6,058,623 UART: [ldev] FE.KEYID = 1
6,099,929 UART: [ldev] Erasing FE.KEYID = 1
8,604,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,662 UART: [ldev] --
10,416,171 UART: [fwproc] Wait for Commands...
10,418,384 UART: [fwproc] Recv command 0x46574c44
10,420,482 UART: [fwproc] Recv'd Img size: 114360 bytes
12,469,992 UART: ROM Fatal Error: 0x000B003C
12,473,121 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,025,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,271,966 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,023,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,168,384 UART:
2,168,783 UART: Running Caliptra ROM ...
2,169,897 UART:
2,170,080 UART: [state] CFI Enabled
2,170,963 UART: [state] LifecycleState = Unprovisioned
2,172,614 UART: [state] DebugLocked = No
2,173,724 UART: [state] WD Timer not started. Device not locked for debugging
2,176,196 UART: [kat] SHA2-256
2,176,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,880 UART: [kat] ++
2,180,329 UART: [kat] sha1
2,180,841 UART: [kat] SHA2-256
2,181,579 UART: [kat] SHA2-384
2,182,244 UART: [kat] SHA2-512-ACC
2,183,122 UART: [kat] ECC-384
3,278,458 UART: [kat] HMAC-384Kdf
3,290,695 UART: [kat] LMS
3,820,194 UART: [kat] --
3,827,499 UART: [cold-reset] ++
3,829,884 UART: [fht] FHT @ 0x50003400
3,841,680 UART: [idev] ++
3,842,292 UART: [idev] CDI.KEYID = 6
3,843,183 UART: [idev] SUBJECT.KEYID = 7
3,844,287 UART: [idev] UDS.KEYID = 0
3,860,741 UART: [idev] Erasing UDS.KEYID = 0
6,318,582 UART: [idev] Sha1 KeyId Algorithm
6,342,744 UART: [idev] --
6,345,768 UART: [ldev] ++
6,346,335 UART: [ldev] CDI.KEYID = 6
6,347,213 UART: [ldev] SUBJECT.KEYID = 5
6,348,424 UART: [ldev] AUTHORITY.KEYID = 7
6,349,706 UART: [ldev] FE.KEYID = 1
6,360,647 UART: [ldev] Erasing FE.KEYID = 1
8,835,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,049 UART: [ldev] --
10,622,802 UART: [fwproc] Wait for Commands...
10,625,438 UART: [fwproc] Recv command 0x46574c44
10,627,530 UART: [fwproc] Recv'd Img size: 114360 bytes
12,683,481 UART: ROM Fatal Error: 0x000B003C
12,686,606 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
2,031,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,457,901 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,470 UART: [kat] HMAC-384Kdf
919,968 UART: [kat] LMS
1,168,280 UART: [kat] --
1,169,247 UART: [cold-reset] ++
1,169,575 UART: [fht] FHT @ 0x50003400
1,172,405 UART: [idev] ++
1,172,573 UART: [idev] CDI.KEYID = 6
1,172,934 UART: [idev] SUBJECT.KEYID = 7
1,173,359 UART: [idev] UDS.KEYID = 0
1,180,977 UART: [idev] Erasing UDS.KEYID = 0
1,197,359 UART: [idev] Sha1 KeyId Algorithm
1,206,097 UART: [idev] --
1,207,298 UART: [ldev] ++
1,207,466 UART: [ldev] CDI.KEYID = 6
1,207,830 UART: [ldev] SUBJECT.KEYID = 5
1,208,257 UART: [ldev] AUTHORITY.KEYID = 7
1,208,720 UART: [ldev] FE.KEYID = 1
1,213,996 UART: [ldev] Erasing FE.KEYID = 1
1,240,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,710 UART: [ldev] --
1,280,046 UART: [fwproc] Wait for Commands...
1,280,851 UART: [fwproc] Recv command 0x46574c44
1,281,584 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,019 UART: ROM Fatal Error: 0x000B003C
1,329,178 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,755 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,053 UART: [state] LifecycleState = Unprovisioned
86,708 UART: [state] DebugLocked = No
87,362 UART: [state] WD Timer not started. Device not locked for debugging
88,565 UART: [kat] SHA2-256
892,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,244 UART: [kat] ++
896,396 UART: [kat] sha1
900,648 UART: [kat] SHA2-256
902,588 UART: [kat] SHA2-384
905,235 UART: [kat] SHA2-512-ACC
907,136 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,575 UART: [kat] LMS
1,169,887 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,182,478 UART: [idev] Erasing UDS.KEYID = 0
1,198,828 UART: [idev] Sha1 KeyId Algorithm
1,207,696 UART: [idev] --
1,208,747 UART: [ldev] ++
1,208,915 UART: [ldev] CDI.KEYID = 6
1,209,279 UART: [ldev] SUBJECT.KEYID = 5
1,209,706 UART: [ldev] AUTHORITY.KEYID = 7
1,210,169 UART: [ldev] FE.KEYID = 1
1,215,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,621 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,061 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,932 UART: ROM Fatal Error: 0x000B003C
1,331,091 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,522 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,166 UART: [kat] LMS
1,168,478 UART: [kat] --
1,169,421 UART: [cold-reset] ++
1,169,865 UART: [fht] FHT @ 0x50003400
1,172,517 UART: [idev] ++
1,172,685 UART: [idev] CDI.KEYID = 6
1,173,046 UART: [idev] SUBJECT.KEYID = 7
1,173,471 UART: [idev] UDS.KEYID = 0
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,063 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,538 UART: [ldev] Erasing FE.KEYID = 1
1,240,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,836 UART: [ldev] --
1,280,162 UART: [fwproc] Wait for Commands...
1,280,835 UART: [fwproc] Recv command 0x46574c44
1,281,568 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,011 UART: ROM Fatal Error: 0x000B003C
1,330,170 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,826 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,198,750 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,641 UART: [ldev] ++
1,208,809 UART: [ldev] CDI.KEYID = 6
1,209,173 UART: [ldev] SUBJECT.KEYID = 5
1,209,600 UART: [ldev] AUTHORITY.KEYID = 7
1,210,063 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,241,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,899 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,282,148 UART: [fwproc] Recv command 0x46574c44
1,282,881 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,888 UART: ROM Fatal Error: 0x000B003C
1,332,047 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,306 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
915,244 UART: [kat] HMAC-384Kdf
919,820 UART: [kat] LMS
1,168,132 UART: [kat] --
1,168,943 UART: [cold-reset] ++
1,169,399 UART: [fht] FHT @ 0x50003400
1,172,135 UART: [idev] ++
1,172,303 UART: [idev] CDI.KEYID = 6
1,172,664 UART: [idev] SUBJECT.KEYID = 7
1,173,089 UART: [idev] UDS.KEYID = 0
1,181,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,081 UART: [idev] Sha1 KeyId Algorithm
1,206,773 UART: [idev] --
1,207,650 UART: [ldev] ++
1,207,818 UART: [ldev] CDI.KEYID = 6
1,208,182 UART: [ldev] SUBJECT.KEYID = 5
1,208,609 UART: [ldev] AUTHORITY.KEYID = 7
1,209,072 UART: [ldev] FE.KEYID = 1
1,214,084 UART: [ldev] Erasing FE.KEYID = 1
1,240,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,970 UART: [ldev] --
1,279,416 UART: [fwproc] Wait for Commands...
1,280,161 UART: [fwproc] Recv command 0x46574c44
1,280,894 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,609 UART: ROM Fatal Error: 0x000B003C
1,328,768 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,249 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,181,762 UART: [idev] Erasing UDS.KEYID = 0
1,198,700 UART: [idev] Sha1 KeyId Algorithm
1,207,562 UART: [idev] --
1,208,541 UART: [ldev] ++
1,208,709 UART: [ldev] CDI.KEYID = 6
1,209,073 UART: [ldev] SUBJECT.KEYID = 5
1,209,500 UART: [ldev] AUTHORITY.KEYID = 7
1,209,963 UART: [ldev] FE.KEYID = 1
1,215,153 UART: [ldev] Erasing FE.KEYID = 1
1,241,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,433 UART: [ldev] --
1,280,905 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,263 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,380 UART: ROM Fatal Error: 0x000B003C
1,330,539 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,638 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,640 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,292 UART:
192,660 UART: Running Caliptra ROM ...
193,864 UART:
194,019 UART: [state] CFI Enabled
262,526 UART: [state] LifecycleState = Unprovisioned
264,902 UART: [state] DebugLocked = No
266,552 UART: [state] WD Timer not started. Device not locked for debugging
270,539 UART: [kat] SHA2-256
452,459 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,983 UART: [kat] ++
464,523 UART: [kat] sha1
476,703 UART: [kat] SHA2-256
479,723 UART: [kat] SHA2-384
484,636 UART: [kat] SHA2-512-ACC
487,256 UART: [kat] ECC-384
3,774,016 UART: [kat] HMAC-384Kdf
3,800,424 UART: [kat] LMS
4,873,555 UART: [kat] --
4,878,054 UART: [cold-reset] ++
4,880,756 UART: [fht] FHT @ 0x50003400
4,892,598 UART: [idev] ++
4,893,270 UART: [idev] CDI.KEYID = 6
4,894,430 UART: [idev] SUBJECT.KEYID = 7
4,895,640 UART: [idev] UDS.KEYID = 0
4,928,547 UART: [idev] Erasing UDS.KEYID = 0
8,245,913 UART: [idev] Sha1 KeyId Algorithm
8,268,449 UART: [idev] --
8,272,224 UART: [ldev] ++
8,272,788 UART: [ldev] CDI.KEYID = 6
8,273,988 UART: [ldev] SUBJECT.KEYID = 5
8,275,147 UART: [ldev] AUTHORITY.KEYID = 7
8,276,375 UART: [ldev] FE.KEYID = 1
8,315,392 UART: [ldev] Erasing FE.KEYID = 1
11,653,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,185 UART: [ldev] --
14,037,316 UART: [fwproc] Wait for Commands...
14,040,173 UART: [fwproc] Recv command 0x46574c44
14,042,504 UART: Invalid Img size: 0 bytes
14,045,273 UART: ROM Fatal Error: 0x01020002
14,048,602 >>> mbox cmd response: failed
14,051,150 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,194,556 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,553 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,850,474 >>> mbox cmd response: failed
13,853,371 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,996,643 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,910 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,492 UART:
192,894 UART: Running Caliptra ROM ...
194,001 UART:
603,719 UART: [state] CFI Enabled
615,819 UART: [state] LifecycleState = Unprovisioned
618,203 UART: [state] DebugLocked = No
620,921 UART: [state] WD Timer not started. Device not locked for debugging
626,236 UART: [kat] SHA2-256
808,176 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,760 UART: [kat] ++
820,255 UART: [kat] sha1
831,181 UART: [kat] SHA2-256
834,193 UART: [kat] SHA2-384
841,249 UART: [kat] SHA2-512-ACC
843,869 UART: [kat] ECC-384
4,099,955 UART: [kat] HMAC-384Kdf
4,111,727 UART: [kat] LMS
5,184,887 UART: [kat] --
5,189,813 UART: [cold-reset] ++
5,190,828 UART: [fht] FHT @ 0x50003400
5,202,217 UART: [idev] ++
5,202,893 UART: [idev] CDI.KEYID = 6
5,204,129 UART: [idev] SUBJECT.KEYID = 7
5,205,560 UART: [idev] UDS.KEYID = 0
5,220,617 UART: [idev] Erasing UDS.KEYID = 0
8,496,154 UART: [idev] Sha1 KeyId Algorithm
8,517,716 UART: [idev] --
8,521,118 UART: [ldev] ++
8,521,686 UART: [ldev] CDI.KEYID = 6
8,522,851 UART: [ldev] SUBJECT.KEYID = 5
8,524,389 UART: [ldev] AUTHORITY.KEYID = 7
8,525,875 UART: [ldev] FE.KEYID = 1
8,536,310 UART: [ldev] Erasing FE.KEYID = 1
11,831,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,896 UART: [ldev] --
14,195,649 UART: [fwproc] Wait for Commands...
14,198,125 UART: [fwproc] Recv command 0x46574c44
14,200,392 UART: Invalid Img size: 0 bytes
14,204,124 UART: ROM Fatal Error: 0x01020002
14,207,440 >>> mbox cmd response: failed
14,209,998 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,353,774 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,798 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,017,264 >>> mbox cmd response: failed
14,020,096 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,163,515 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,395 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,031 UART:
192,402 UART: Running Caliptra ROM ...
193,482 UART:
193,629 UART: [state] CFI Enabled
264,071 UART: [state] LifecycleState = Unprovisioned
265,937 UART: [state] DebugLocked = No
268,027 UART: [state] WD Timer not started. Device not locked for debugging
271,768 UART: [kat] SHA2-256
450,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,470 UART: [kat] ++
462,999 UART: [kat] sha1
473,769 UART: [kat] SHA2-256
476,777 UART: [kat] SHA2-384
482,970 UART: [kat] SHA2-512-ACC
485,906 UART: [kat] ECC-384
2,949,968 UART: [kat] HMAC-384Kdf
2,973,574 UART: [kat] LMS
3,503,048 UART: [kat] --
3,506,448 UART: [cold-reset] ++
3,508,435 UART: [fht] FHT @ 0x50003400
3,519,467 UART: [idev] ++
3,520,039 UART: [idev] CDI.KEYID = 6
3,520,955 UART: [idev] SUBJECT.KEYID = 7
3,522,169 UART: [idev] UDS.KEYID = 0
3,544,304 UART: [idev] Erasing UDS.KEYID = 0
6,027,599 UART: [idev] Sha1 KeyId Algorithm
6,049,050 UART: [idev] --
6,053,782 UART: [ldev] ++
6,054,361 UART: [ldev] CDI.KEYID = 6
6,055,271 UART: [ldev] SUBJECT.KEYID = 5
6,056,492 UART: [ldev] AUTHORITY.KEYID = 7
6,057,728 UART: [ldev] FE.KEYID = 1
6,101,557 UART: [ldev] Erasing FE.KEYID = 1
8,603,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,339 UART: [ldev] --
10,417,446 UART: [fwproc] Wait for Commands...
10,419,872 UART: [fwproc] Recv command 0x46574c44
10,421,972 UART: Invalid Img size: 0 bytes
10,425,873 UART: ROM Fatal Error: 0x01020002
10,428,970 >>> mbox cmd response: failed
10,431,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,575,280 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,146 writing to cptra_bootfsm_go
4,650 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
193,262 UART:
193,637 UART: Running Caliptra ROM ...
194,724 UART:
194,871 UART: [state] CFI Enabled
263,830 UART: [state] LifecycleState = Unprovisioned
265,715 UART: [state] DebugLocked = No
267,427 UART: [state] WD Timer not started. Device not locked for debugging
270,462 UART: [kat] SHA2-256
449,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,146 UART: [kat] ++
461,679 UART: [kat] sha1
473,205 UART: [kat] SHA2-256
476,270 UART: [kat] SHA2-384
482,029 UART: [kat] SHA2-512-ACC
484,340 UART: [kat] ECC-384
2,951,137 UART: [kat] HMAC-384Kdf
2,973,614 UART: [kat] LMS
3,503,086 UART: [kat] --
3,507,343 UART: [cold-reset] ++
3,508,253 UART: [fht] FHT @ 0x50003400
3,520,538 UART: [idev] ++
3,521,108 UART: [idev] CDI.KEYID = 6
3,522,197 UART: [idev] SUBJECT.KEYID = 7
3,523,317 UART: [idev] UDS.KEYID = 0
3,545,562 UART: [idev] Erasing UDS.KEYID = 0
6,023,741 UART: [idev] Sha1 KeyId Algorithm
6,047,044 UART: [idev] --
6,052,074 UART: [ldev] ++
6,052,653 UART: [ldev] CDI.KEYID = 6
6,053,583 UART: [ldev] SUBJECT.KEYID = 5
6,054,753 UART: [ldev] AUTHORITY.KEYID = 7
6,055,987 UART: [ldev] FE.KEYID = 1
6,102,287 UART: [ldev] Erasing FE.KEYID = 1
8,606,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,819 UART: [ldev] --
10,415,745 UART: [fwproc] Wait for Commands...
10,417,957 UART: [fwproc] Recv command 0x46574c44
10,420,055 UART: Invalid Img size: 0 bytes
10,423,935 UART: ROM Fatal Error: 0x01020002
10,427,026 >>> mbox cmd response: failed
10,429,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,573,345 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,410 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,185,062 >>> mbox cmd response: failed
10,187,528 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,331,374 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,914 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,454 UART:
192,834 UART: Running Caliptra ROM ...
193,916 UART:
603,406 UART: [state] CFI Enabled
617,633 UART: [state] LifecycleState = Unprovisioned
619,518 UART: [state] DebugLocked = No
622,410 UART: [state] WD Timer not started. Device not locked for debugging
625,669 UART: [kat] SHA2-256
804,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,358 UART: [kat] ++
816,898 UART: [kat] sha1
827,368 UART: [kat] SHA2-256
830,416 UART: [kat] SHA2-384
836,395 UART: [kat] SHA2-512-ACC
839,334 UART: [kat] ECC-384
3,283,057 UART: [kat] HMAC-384Kdf
3,294,666 UART: [kat] LMS
3,824,194 UART: [kat] --
3,828,456 UART: [cold-reset] ++
3,829,575 UART: [fht] FHT @ 0x50003400
3,841,010 UART: [idev] ++
3,841,585 UART: [idev] CDI.KEYID = 6
3,842,467 UART: [idev] SUBJECT.KEYID = 7
3,843,674 UART: [idev] UDS.KEYID = 0
3,860,899 UART: [idev] Erasing UDS.KEYID = 0
6,316,795 UART: [idev] Sha1 KeyId Algorithm
6,340,019 UART: [idev] --
6,342,560 UART: [ldev] ++
6,343,168 UART: [ldev] CDI.KEYID = 6
6,344,087 UART: [ldev] SUBJECT.KEYID = 5
6,345,250 UART: [ldev] AUTHORITY.KEYID = 7
6,346,476 UART: [ldev] FE.KEYID = 1
6,358,542 UART: [ldev] Erasing FE.KEYID = 1
8,836,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,688 UART: [ldev] --
10,630,947 UART: [fwproc] Wait for Commands...
10,633,200 UART: [fwproc] Recv command 0x46574c44
10,635,296 UART: Invalid Img size: 0 bytes
10,637,738 UART: ROM Fatal Error: 0x01020002
10,640,889 >>> mbox cmd response: failed
10,643,264 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,787,071 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,958 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,404,640 >>> mbox cmd response: failed
10,408,725 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,552,813 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Unprovisioned
86,295 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,471 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,506 UART: [ldev] ++
1,208,674 UART: [ldev] CDI.KEYID = 6
1,209,038 UART: [ldev] SUBJECT.KEYID = 5
1,209,465 UART: [ldev] AUTHORITY.KEYID = 7
1,209,928 UART: [ldev] FE.KEYID = 1
1,214,768 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,848 UART: [ldev] --
1,280,228 UART: [fwproc] Wait for Commands...
1,280,937 UART: [fwproc] Recv command 0x46574c44
1,281,666 UART: Invalid Img size: 0 bytes
1,282,380 UART: ROM Fatal Error: 0x01020002
1,283,539 >>> mbox cmd response: failed
1,283,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,283,545 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,301 >>> mbox cmd response: failed
1,136,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,136,307 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
891,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,803 UART: [kat] LMS
1,169,115 UART: [kat] --
1,169,812 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,208,072 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,241,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,565 UART: [ldev] --
1,280,875 UART: [fwproc] Wait for Commands...
1,281,472 UART: [fwproc] Recv command 0x46574c44
1,282,201 UART: Invalid Img size: 0 bytes
1,283,125 UART: ROM Fatal Error: 0x01020002
1,284,284 >>> mbox cmd response: failed
1,284,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,284,290 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,756 >>> mbox cmd response: failed
1,136,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,136,762 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,214,748 UART: [ldev] Erasing FE.KEYID = 1
1,241,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,389 UART: [fwproc] Recv command 0x46574c44
1,282,118 UART: Invalid Img size: 0 bytes
1,282,930 UART: ROM Fatal Error: 0x01020002
1,284,089 >>> mbox cmd response: failed
1,284,089 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,284,095 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,135,493 >>> mbox cmd response: failed
1,135,493 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,135,499 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,341 UART: [kat] LMS
1,169,653 UART: [kat] --
1,170,606 UART: [cold-reset] ++
1,171,086 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,200,114 UART: [idev] Sha1 KeyId Algorithm
1,209,052 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,111 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,615 UART: Invalid Img size: 0 bytes
1,284,459 UART: ROM Fatal Error: 0x01020002
1,285,618 >>> mbox cmd response: failed
1,285,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,285,624 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,708 >>> mbox cmd response: failed
1,137,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,137,714 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,055 UART: [kat] ++
895,207 UART: [kat] sha1
899,331 UART: [kat] SHA2-256
901,271 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,242,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,752 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,791 UART: [fwproc] Recv command 0x46574c44
1,283,520 UART: Invalid Img size: 0 bytes
1,284,336 UART: ROM Fatal Error: 0x01020002
1,285,495 >>> mbox cmd response: failed
1,285,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,285,501 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,291 >>> mbox cmd response: failed
1,137,291 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,137,297 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,108 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,278 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,023 UART: [ldev] ++
1,209,191 UART: [ldev] CDI.KEYID = 6
1,209,555 UART: [ldev] SUBJECT.KEYID = 5
1,209,982 UART: [ldev] AUTHORITY.KEYID = 7
1,210,445 UART: [ldev] FE.KEYID = 1
1,215,997 UART: [ldev] Erasing FE.KEYID = 1
1,242,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,777 UART: Invalid Img size: 0 bytes
1,283,599 UART: ROM Fatal Error: 0x01020002
1,284,758 >>> mbox cmd response: failed
1,284,758 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,284,764 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,618 >>> mbox cmd response: failed
1,136,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,136,624 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,061 UART:
192,445 UART: Running Caliptra ROM ...
193,669 UART:
193,826 UART: [state] CFI Enabled
266,467 UART: [state] LifecycleState = Unprovisioned
268,876 UART: [state] DebugLocked = No
270,740 UART: [state] WD Timer not started. Device not locked for debugging
276,099 UART: [kat] SHA2-256
458,053 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,539 UART: [kat] ++
470,063 UART: [kat] sha1
478,954 UART: [kat] SHA2-256
481,963 UART: [kat] SHA2-384
487,071 UART: [kat] SHA2-512-ACC
489,693 UART: [kat] ECC-384
3,776,285 UART: [kat] HMAC-384Kdf
3,802,022 UART: [kat] LMS
4,875,146 UART: [kat] --
4,878,726 UART: [cold-reset] ++
4,880,072 UART: [fht] FHT @ 0x50003400
4,890,358 UART: [idev] ++
4,891,029 UART: [idev] CDI.KEYID = 6
4,892,271 UART: [idev] SUBJECT.KEYID = 7
4,893,371 UART: [idev] UDS.KEYID = 0
4,929,496 UART: [idev] Erasing UDS.KEYID = 0
8,246,968 UART: [idev] Sha1 KeyId Algorithm
8,269,498 UART: [idev] --
8,273,874 UART: [ldev] ++
8,274,442 UART: [ldev] CDI.KEYID = 6
8,275,624 UART: [ldev] SUBJECT.KEYID = 5
8,276,883 UART: [ldev] AUTHORITY.KEYID = 7
8,278,078 UART: [ldev] FE.KEYID = 1
8,318,439 UART: [ldev] Erasing FE.KEYID = 1
11,653,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,243 UART: [ldev] --
14,039,342 UART: [fwproc] Wait for Commands...
14,041,217 UART: [fwproc] Recv command 0x4d454153
14,047,166 UART: ROM Fatal Error: 0x01020005
14,050,501 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,857 writing to cptra_bootfsm_go
4,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,833,095 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,463 UART:
192,845 UART: Running Caliptra ROM ...
194,010 UART:
603,746 UART: [state] CFI Enabled
618,833 UART: [state] LifecycleState = Unprovisioned
621,208 UART: [state] DebugLocked = No
624,098 UART: [state] WD Timer not started. Device not locked for debugging
628,802 UART: [kat] SHA2-256
810,817 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,319 UART: [kat] ++
822,910 UART: [kat] sha1
832,755 UART: [kat] SHA2-256
835,784 UART: [kat] SHA2-384
842,624 UART: [kat] SHA2-512-ACC
845,237 UART: [kat] ECC-384
4,099,417 UART: [kat] HMAC-384Kdf
4,111,426 UART: [kat] LMS
5,184,587 UART: [kat] --
5,188,717 UART: [cold-reset] ++
5,190,563 UART: [fht] FHT @ 0x50003400
5,201,023 UART: [idev] ++
5,201,699 UART: [idev] CDI.KEYID = 6
5,202,926 UART: [idev] SUBJECT.KEYID = 7
5,204,360 UART: [idev] UDS.KEYID = 0
5,220,658 UART: [idev] Erasing UDS.KEYID = 0
8,494,729 UART: [idev] Sha1 KeyId Algorithm
8,515,830 UART: [idev] --
8,519,955 UART: [ldev] ++
8,520,536 UART: [ldev] CDI.KEYID = 6
8,521,720 UART: [ldev] SUBJECT.KEYID = 5
8,523,202 UART: [ldev] AUTHORITY.KEYID = 7
8,524,753 UART: [ldev] FE.KEYID = 1
8,536,097 UART: [ldev] Erasing FE.KEYID = 1
11,832,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,457 UART: [ldev] --
14,202,240 UART: [fwproc] Wait for Commands...
14,204,257 UART: [fwproc] Recv command 0x4d454153
14,210,856 UART: ROM Fatal Error: 0x01020005
14,214,228 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
4,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,030,506 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,129 UART:
192,516 UART: Running Caliptra ROM ...
193,627 UART:
193,778 UART: [state] CFI Enabled
267,776 UART: [state] LifecycleState = Unprovisioned
269,856 UART: [state] DebugLocked = No
271,841 UART: [state] WD Timer not started. Device not locked for debugging
276,171 UART: [kat] SHA2-256
455,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,891 UART: [kat] ++
467,432 UART: [kat] sha1
478,313 UART: [kat] SHA2-256
481,329 UART: [kat] SHA2-384
486,123 UART: [kat] SHA2-512-ACC
489,111 UART: [kat] ECC-384
2,947,389 UART: [kat] HMAC-384Kdf
2,973,919 UART: [kat] LMS
3,503,384 UART: [kat] --
3,508,569 UART: [cold-reset] ++
3,510,065 UART: [fht] FHT @ 0x50003400
3,522,348 UART: [idev] ++
3,522,916 UART: [idev] CDI.KEYID = 6
3,523,795 UART: [idev] SUBJECT.KEYID = 7
3,525,013 UART: [idev] UDS.KEYID = 0
3,544,347 UART: [idev] Erasing UDS.KEYID = 0
6,027,490 UART: [idev] Sha1 KeyId Algorithm
6,049,893 UART: [idev] --
6,054,939 UART: [ldev] ++
6,055,519 UART: [ldev] CDI.KEYID = 6
6,056,435 UART: [ldev] SUBJECT.KEYID = 5
6,057,603 UART: [ldev] AUTHORITY.KEYID = 7
6,058,842 UART: [ldev] FE.KEYID = 1
6,100,997 UART: [ldev] Erasing FE.KEYID = 1
8,604,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,186 UART: [ldev] --
10,414,640 UART: [fwproc] Wait for Commands...
10,416,693 UART: [fwproc] Recv command 0x4d454153
10,423,597 UART: ROM Fatal Error: 0x01020005
10,426,693 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,217 UART:
192,590 UART: Running Caliptra ROM ...
193,665 UART:
193,806 UART: [state] CFI Enabled
259,830 UART: [state] LifecycleState = Unprovisioned
261,705 UART: [state] DebugLocked = No
263,491 UART: [state] WD Timer not started. Device not locked for debugging
266,851 UART: [kat] SHA2-256
445,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,588 UART: [kat] ++
458,031 UART: [kat] sha1
469,286 UART: [kat] SHA2-256
472,366 UART: [kat] SHA2-384
477,685 UART: [kat] SHA2-512-ACC
480,627 UART: [kat] ECC-384
2,926,503 UART: [kat] HMAC-384Kdf
2,949,161 UART: [kat] LMS
3,478,592 UART: [kat] --
3,484,281 UART: [cold-reset] ++
3,485,734 UART: [fht] FHT @ 0x50003400
3,497,307 UART: [idev] ++
3,497,898 UART: [idev] CDI.KEYID = 6
3,498,865 UART: [idev] SUBJECT.KEYID = 7
3,500,028 UART: [idev] UDS.KEYID = 0
3,520,650 UART: [idev] Erasing UDS.KEYID = 0
6,002,050 UART: [idev] Sha1 KeyId Algorithm
6,025,873 UART: [idev] --
6,029,546 UART: [ldev] ++
6,030,127 UART: [ldev] CDI.KEYID = 6
6,031,067 UART: [ldev] SUBJECT.KEYID = 5
6,032,119 UART: [ldev] AUTHORITY.KEYID = 7
6,033,467 UART: [ldev] FE.KEYID = 1
6,076,203 UART: [ldev] Erasing FE.KEYID = 1
8,578,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,918 UART: [ldev] --
10,390,374 UART: [fwproc] Wait for Commands...
10,393,459 UART: [fwproc] Recv command 0x4d454153
10,400,790 UART: ROM Fatal Error: 0x01020005
10,403,892 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,178,597 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,479 UART:
192,864 UART: Running Caliptra ROM ...
193,944 UART:
603,457 UART: [state] CFI Enabled
614,887 UART: [state] LifecycleState = Unprovisioned
616,766 UART: [state] DebugLocked = No
619,351 UART: [state] WD Timer not started. Device not locked for debugging
622,330 UART: [kat] SHA2-256
801,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,039 UART: [kat] ++
813,493 UART: [kat] sha1
825,230 UART: [kat] SHA2-256
828,246 UART: [kat] SHA2-384
833,986 UART: [kat] SHA2-512-ACC
836,917 UART: [kat] ECC-384
3,279,588 UART: [kat] HMAC-384Kdf
3,292,308 UART: [kat] LMS
3,821,814 UART: [kat] --
3,826,188 UART: [cold-reset] ++
3,828,386 UART: [fht] FHT @ 0x50003400
3,839,464 UART: [idev] ++
3,840,029 UART: [idev] CDI.KEYID = 6
3,841,003 UART: [idev] SUBJECT.KEYID = 7
3,842,193 UART: [idev] UDS.KEYID = 0
3,856,929 UART: [idev] Erasing UDS.KEYID = 0
6,316,750 UART: [idev] Sha1 KeyId Algorithm
6,339,167 UART: [idev] --
6,343,213 UART: [ldev] ++
6,343,778 UART: [ldev] CDI.KEYID = 6
6,344,685 UART: [ldev] SUBJECT.KEYID = 5
6,345,898 UART: [ldev] AUTHORITY.KEYID = 7
6,347,132 UART: [ldev] FE.KEYID = 1
6,358,031 UART: [ldev] Erasing FE.KEYID = 1
8,829,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,647 UART: [ldev] --
10,618,714 UART: [fwproc] Wait for Commands...
10,620,438 UART: [fwproc] Recv command 0x4d454153
10,626,424 UART: ROM Fatal Error: 0x01020005
10,629,517 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,412,946 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,557 UART: [idev] ++
1,172,725 UART: [idev] CDI.KEYID = 6
1,173,086 UART: [idev] SUBJECT.KEYID = 7
1,173,511 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,014 UART: [ldev] ++
1,209,182 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,973 UART: [ldev] AUTHORITY.KEYID = 7
1,210,436 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,498 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x4d454153
1,284,514 UART: ROM Fatal Error: 0x01020005
1,285,673 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,147 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,947 UART: [kat] HMAC-384Kdf
921,645 UART: [kat] LMS
1,169,957 UART: [kat] --
1,171,122 UART: [cold-reset] ++
1,171,638 UART: [fht] FHT @ 0x50003400
1,174,362 UART: [idev] ++
1,174,530 UART: [idev] CDI.KEYID = 6
1,174,891 UART: [idev] SUBJECT.KEYID = 7
1,175,316 UART: [idev] UDS.KEYID = 0
1,183,400 UART: [idev] Erasing UDS.KEYID = 0
1,200,298 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,521 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,717 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x4d454153
1,284,407 UART: ROM Fatal Error: 0x01020005
1,285,566 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,472 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,141 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,249 UART: [idev] ++
1,173,417 UART: [idev] CDI.KEYID = 6
1,173,778 UART: [idev] SUBJECT.KEYID = 7
1,174,203 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,805 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,930 UART: [ldev] ++
1,209,098 UART: [ldev] CDI.KEYID = 6
1,209,462 UART: [ldev] SUBJECT.KEYID = 5
1,209,889 UART: [ldev] AUTHORITY.KEYID = 7
1,210,352 UART: [ldev] FE.KEYID = 1
1,215,722 UART: [ldev] Erasing FE.KEYID = 1
1,241,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,153 UART: [fwproc] Recv command 0x4d454153
1,283,332 UART: ROM Fatal Error: 0x01020005
1,284,491 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,487 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,169,864 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,181,716 UART: [idev] Erasing UDS.KEYID = 0
1,198,736 UART: [idev] Sha1 KeyId Algorithm
1,207,784 UART: [idev] --
1,208,803 UART: [ldev] ++
1,208,971 UART: [ldev] CDI.KEYID = 6
1,209,335 UART: [ldev] SUBJECT.KEYID = 5
1,209,762 UART: [ldev] AUTHORITY.KEYID = 7
1,210,225 UART: [ldev] FE.KEYID = 1
1,215,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,853 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,281,926 UART: [fwproc] Recv command 0x4d454153
1,284,033 UART: ROM Fatal Error: 0x01020005
1,285,192 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,568 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,837 UART: [idev] ++
1,173,005 UART: [idev] CDI.KEYID = 6
1,173,366 UART: [idev] SUBJECT.KEYID = 7
1,173,791 UART: [idev] UDS.KEYID = 0
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,725 UART: [idev] --
1,208,778 UART: [ldev] ++
1,208,946 UART: [ldev] CDI.KEYID = 6
1,209,310 UART: [ldev] SUBJECT.KEYID = 5
1,209,737 UART: [ldev] AUTHORITY.KEYID = 7
1,210,200 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,241,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,426 UART: [ldev] --
1,280,794 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x4d454153
1,283,408 UART: ROM Fatal Error: 0x01020005
1,284,567 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,136,723 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,208,971 UART: [ldev] ++
1,209,139 UART: [ldev] CDI.KEYID = 6
1,209,503 UART: [ldev] SUBJECT.KEYID = 5
1,209,930 UART: [ldev] AUTHORITY.KEYID = 7
1,210,393 UART: [ldev] FE.KEYID = 1
1,215,659 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,395 UART: [ldev] --
1,280,787 UART: [fwproc] Wait for Commands...
1,281,440 UART: [fwproc] Recv command 0x4d454153
1,283,447 UART: ROM Fatal Error: 0x01020005
1,284,606 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,796 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,694 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,346 UART:
192,713 UART: Running Caliptra ROM ...
193,914 UART:
194,091 UART: [state] CFI Enabled
265,135 UART: [state] LifecycleState = Unprovisioned
267,558 UART: [state] DebugLocked = No
268,724 UART: [state] WD Timer not started. Device not locked for debugging
272,551 UART: [kat] SHA2-256
454,452 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,997 UART: [kat] ++
466,502 UART: [kat] sha1
477,066 UART: [kat] SHA2-256
480,089 UART: [kat] SHA2-384
486,508 UART: [kat] SHA2-512-ACC
489,119 UART: [kat] ECC-384
3,777,844 UART: [kat] HMAC-384Kdf
3,802,514 UART: [kat] LMS
4,875,693 UART: [kat] --
4,882,571 UART: [cold-reset] ++
4,883,885 UART: [fht] FHT @ 0x50003400
4,895,355 UART: [idev] ++
4,896,024 UART: [idev] CDI.KEYID = 6
4,897,261 UART: [idev] SUBJECT.KEYID = 7
4,898,416 UART: [idev] UDS.KEYID = 0
4,930,754 UART: [idev] Erasing UDS.KEYID = 0
8,242,930 UART: [idev] Sha1 KeyId Algorithm
8,264,911 UART: [idev] --
8,268,196 UART: [ldev] ++
8,268,761 UART: [ldev] CDI.KEYID = 6
8,269,918 UART: [ldev] SUBJECT.KEYID = 5
8,271,128 UART: [ldev] AUTHORITY.KEYID = 7
8,272,279 UART: [ldev] FE.KEYID = 1
8,317,991 UART: [ldev] Erasing FE.KEYID = 1
11,650,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,456 UART: [ldev] --
14,035,836 UART: [fwproc] Wait for Commands...
14,038,533 UART: [fwproc] Recv command 0x43415053
14,042,799 UART: ROM Fatal Error: 0x01020006
14,046,124 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,491 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
13,842,380 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,945 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,510 UART:
192,886 UART: Running Caliptra ROM ...
194,103 UART:
603,570 UART: [state] CFI Enabled
615,620 UART: [state] LifecycleState = Unprovisioned
618,028 UART: [state] DebugLocked = No
620,660 UART: [state] WD Timer not started. Device not locked for debugging
625,471 UART: [kat] SHA2-256
807,475 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,987 UART: [kat] ++
819,567 UART: [kat] sha1
831,365 UART: [kat] SHA2-256
834,386 UART: [kat] SHA2-384
841,277 UART: [kat] SHA2-512-ACC
843,881 UART: [kat] ECC-384
4,098,735 UART: [kat] HMAC-384Kdf
4,111,478 UART: [kat] LMS
5,184,630 UART: [kat] --
5,190,415 UART: [cold-reset] ++
5,191,810 UART: [fht] FHT @ 0x50003400
5,202,901 UART: [idev] ++
5,203,566 UART: [idev] CDI.KEYID = 6
5,204,718 UART: [idev] SUBJECT.KEYID = 7
5,206,249 UART: [idev] UDS.KEYID = 0
5,221,870 UART: [idev] Erasing UDS.KEYID = 0
8,492,786 UART: [idev] Sha1 KeyId Algorithm
8,514,662 UART: [idev] --
8,519,670 UART: [ldev] ++
8,520,306 UART: [ldev] CDI.KEYID = 6
8,521,483 UART: [ldev] SUBJECT.KEYID = 5
8,522,908 UART: [ldev] AUTHORITY.KEYID = 7
8,524,512 UART: [ldev] FE.KEYID = 1
8,535,160 UART: [ldev] Erasing FE.KEYID = 1
11,826,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,885 UART: [ldev] --
14,190,952 UART: [fwproc] Wait for Commands...
14,192,879 UART: [fwproc] Recv command 0x43415053
14,197,079 UART: ROM Fatal Error: 0x01020006
14,200,389 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,781 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
14,020,008 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,413 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,076 UART:
192,462 UART: Running Caliptra ROM ...
193,539 UART:
193,683 UART: [state] CFI Enabled
265,913 UART: [state] LifecycleState = Unprovisioned
267,774 UART: [state] DebugLocked = No
270,315 UART: [state] WD Timer not started. Device not locked for debugging
274,150 UART: [kat] SHA2-256
453,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,823 UART: [kat] ++
465,316 UART: [kat] sha1
475,489 UART: [kat] SHA2-256
478,548 UART: [kat] SHA2-384
485,290 UART: [kat] SHA2-512-ACC
488,246 UART: [kat] ECC-384
2,949,255 UART: [kat] HMAC-384Kdf
2,972,239 UART: [kat] LMS
3,501,728 UART: [kat] --
3,506,187 UART: [cold-reset] ++
3,507,425 UART: [fht] FHT @ 0x50003400
3,518,780 UART: [idev] ++
3,519,351 UART: [idev] CDI.KEYID = 6
3,520,268 UART: [idev] SUBJECT.KEYID = 7
3,521,429 UART: [idev] UDS.KEYID = 0
3,543,731 UART: [idev] Erasing UDS.KEYID = 0
6,027,142 UART: [idev] Sha1 KeyId Algorithm
6,050,971 UART: [idev] --
6,055,460 UART: [ldev] ++
6,056,034 UART: [ldev] CDI.KEYID = 6
6,056,944 UART: [ldev] SUBJECT.KEYID = 5
6,058,187 UART: [ldev] AUTHORITY.KEYID = 7
6,059,376 UART: [ldev] FE.KEYID = 1
6,099,258 UART: [ldev] Erasing FE.KEYID = 1
8,603,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,066 UART: [ldev] --
10,411,970 UART: [fwproc] Wait for Commands...
10,413,999 UART: [fwproc] Recv command 0x43415053
10,416,700 UART: ROM Fatal Error: 0x01020006
10,419,795 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,587 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,232 UART:
192,605 UART: Running Caliptra ROM ...
193,782 UART:
193,936 UART: [state] CFI Enabled
260,073 UART: [state] LifecycleState = Unprovisioned
261,927 UART: [state] DebugLocked = No
264,549 UART: [state] WD Timer not started. Device not locked for debugging
268,929 UART: [kat] SHA2-256
448,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,637 UART: [kat] ++
460,147 UART: [kat] sha1
470,865 UART: [kat] SHA2-256
473,885 UART: [kat] SHA2-384
478,952 UART: [kat] SHA2-512-ACC
481,942 UART: [kat] ECC-384
2,927,580 UART: [kat] HMAC-384Kdf
2,950,031 UART: [kat] LMS
3,479,484 UART: [kat] --
3,482,530 UART: [cold-reset] ++
3,484,634 UART: [fht] FHT @ 0x50003400
3,494,665 UART: [idev] ++
3,495,235 UART: [idev] CDI.KEYID = 6
3,496,142 UART: [idev] SUBJECT.KEYID = 7
3,497,357 UART: [idev] UDS.KEYID = 0
3,522,391 UART: [idev] Erasing UDS.KEYID = 0
6,005,422 UART: [idev] Sha1 KeyId Algorithm
6,028,591 UART: [idev] --
6,032,958 UART: [ldev] ++
6,033,528 UART: [ldev] CDI.KEYID = 6
6,034,440 UART: [ldev] SUBJECT.KEYID = 5
6,035,601 UART: [ldev] AUTHORITY.KEYID = 7
6,036,834 UART: [ldev] FE.KEYID = 1
6,070,874 UART: [ldev] Erasing FE.KEYID = 1
8,577,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,800 UART: [ldev] --
10,382,972 UART: [fwproc] Wait for Commands...
10,385,578 UART: [fwproc] Recv command 0x43415053
10,391,516 UART: ROM Fatal Error: 0x01020006
10,394,608 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,464 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,205,106 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,885 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,465 UART:
192,834 UART: Running Caliptra ROM ...
193,909 UART:
603,365 UART: [state] CFI Enabled
617,125 UART: [state] LifecycleState = Unprovisioned
619,015 UART: [state] DebugLocked = No
621,987 UART: [state] WD Timer not started. Device not locked for debugging
625,014 UART: [kat] SHA2-256
804,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,730 UART: [kat] ++
816,264 UART: [kat] sha1
827,792 UART: [kat] SHA2-256
830,850 UART: [kat] SHA2-384
837,201 UART: [kat] SHA2-512-ACC
840,142 UART: [kat] ECC-384
3,281,103 UART: [kat] HMAC-384Kdf
3,292,617 UART: [kat] LMS
3,822,133 UART: [kat] --
3,825,102 UART: [cold-reset] ++
3,827,306 UART: [fht] FHT @ 0x50003400
3,837,696 UART: [idev] ++
3,838,259 UART: [idev] CDI.KEYID = 6
3,839,295 UART: [idev] SUBJECT.KEYID = 7
3,840,407 UART: [idev] UDS.KEYID = 0
3,852,876 UART: [idev] Erasing UDS.KEYID = 0
6,309,295 UART: [idev] Sha1 KeyId Algorithm
6,332,740 UART: [idev] --
6,337,058 UART: [ldev] ++
6,337,630 UART: [ldev] CDI.KEYID = 6
6,338,535 UART: [ldev] SUBJECT.KEYID = 5
6,339,696 UART: [ldev] AUTHORITY.KEYID = 7
6,340,984 UART: [ldev] FE.KEYID = 1
6,349,578 UART: [ldev] Erasing FE.KEYID = 1
8,822,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,789 UART: [ldev] --
10,613,283 UART: [fwproc] Wait for Commands...
10,615,482 UART: [fwproc] Recv command 0x43415053
10,620,708 UART: ROM Fatal Error: 0x01020006
10,623,804 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,372 writing to cptra_bootfsm_go
5,099 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,413,332 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,261 UART: [kat] SHA2-256
901,201 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,198,439 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,272 UART: [ldev] ++
1,208,440 UART: [ldev] CDI.KEYID = 6
1,208,804 UART: [ldev] SUBJECT.KEYID = 5
1,209,231 UART: [ldev] AUTHORITY.KEYID = 7
1,209,694 UART: [ldev] FE.KEYID = 1
1,214,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,448 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,591 UART: [fwproc] Recv command 0x43415053
1,282,806 UART: ROM Fatal Error: 0x01020006
1,283,965 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,367 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,946 UART: [fht] FHT @ 0x50003400
1,173,666 UART: [idev] ++
1,173,834 UART: [idev] CDI.KEYID = 6
1,174,195 UART: [idev] SUBJECT.KEYID = 7
1,174,620 UART: [idev] UDS.KEYID = 0
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,918 UART: [idev] Sha1 KeyId Algorithm
1,208,934 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,289 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x43415053
1,284,183 UART: ROM Fatal Error: 0x01020006
1,285,342 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,968 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,199,871 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,716 UART: [ldev] ++
1,209,884 UART: [ldev] CDI.KEYID = 6
1,210,248 UART: [ldev] SUBJECT.KEYID = 5
1,210,675 UART: [ldev] AUTHORITY.KEYID = 7
1,211,138 UART: [ldev] FE.KEYID = 1
1,216,268 UART: [ldev] Erasing FE.KEYID = 1
1,243,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,580 UART: [ldev] --
1,282,978 UART: [fwproc] Wait for Commands...
1,283,789 UART: [fwproc] Recv command 0x43415053
1,284,918 UART: ROM Fatal Error: 0x01020006
1,286,077 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,235 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
891,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,135 UART: [kat] SHA2-512-ACC
906,036 UART: [kat] ECC-384
915,951 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,199,284 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,383 UART: [ldev] ++
1,209,551 UART: [ldev] CDI.KEYID = 6
1,209,915 UART: [ldev] SUBJECT.KEYID = 5
1,210,342 UART: [ldev] AUTHORITY.KEYID = 7
1,210,805 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x43415053
1,283,631 UART: ROM Fatal Error: 0x01020006
1,284,790 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,182 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,549 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,198,243 UART: [idev] Sha1 KeyId Algorithm
1,207,135 UART: [idev] --
1,207,996 UART: [ldev] ++
1,208,164 UART: [ldev] CDI.KEYID = 6
1,208,528 UART: [ldev] SUBJECT.KEYID = 5
1,208,955 UART: [ldev] AUTHORITY.KEYID = 7
1,209,418 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,124 UART: [ldev] --
1,280,552 UART: [fwproc] Wait for Commands...
1,281,311 UART: [fwproc] Recv command 0x43415053
1,282,382 UART: ROM Fatal Error: 0x01020006
1,283,541 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,529 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,190 UART: [state] WD Timer not started. Device not locked for debugging
88,377 UART: [kat] SHA2-256
891,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,056 UART: [kat] ++
896,208 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
917,023 UART: [kat] HMAC-384Kdf
921,743 UART: [kat] LMS
1,170,055 UART: [kat] --
1,171,310 UART: [cold-reset] ++
1,171,704 UART: [fht] FHT @ 0x50003400
1,174,298 UART: [idev] ++
1,174,466 UART: [idev] CDI.KEYID = 6
1,174,827 UART: [idev] SUBJECT.KEYID = 7
1,175,252 UART: [idev] UDS.KEYID = 0
1,183,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,822 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,995 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x43415053
1,283,877 UART: ROM Fatal Error: 0x01020006
1,285,036 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,054 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,475 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,138 UART:
192,526 UART: Running Caliptra ROM ...
193,749 UART:
193,908 UART: [state] CFI Enabled
268,188 UART: [state] LifecycleState = Unprovisioned
270,610 UART: [state] DebugLocked = No
271,794 UART: [state] WD Timer not started. Device not locked for debugging
276,376 UART: [kat] SHA2-256
458,330 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,817 UART: [kat] ++
470,322 UART: [kat] sha1
480,227 UART: [kat] SHA2-256
483,239 UART: [kat] SHA2-384
487,918 UART: [kat] SHA2-512-ACC
490,581 UART: [kat] ECC-384
3,774,449 UART: [kat] HMAC-384Kdf
3,805,096 UART: [kat] LMS
4,878,291 UART: [kat] --
4,881,599 UART: [cold-reset] ++
4,883,159 UART: [fht] FHT @ 0x50003400
4,894,840 UART: [idev] ++
4,895,515 UART: [idev] CDI.KEYID = 6
4,896,749 UART: [idev] SUBJECT.KEYID = 7
4,897,903 UART: [idev] UDS.KEYID = 0
4,931,989 UART: [idev] Erasing UDS.KEYID = 0
8,245,700 UART: [idev] Sha1 KeyId Algorithm
8,266,671 UART: [idev] --
8,270,585 UART: [ldev] ++
8,271,216 UART: [ldev] CDI.KEYID = 6
8,272,403 UART: [ldev] SUBJECT.KEYID = 5
8,273,485 UART: [ldev] AUTHORITY.KEYID = 7
8,274,687 UART: [ldev] FE.KEYID = 1
8,318,605 UART: [ldev] Erasing FE.KEYID = 1
11,652,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,465 UART: [ldev] --
14,015,649 UART: [fwproc] Wait for Commands...
14,018,231 UART: [fwproc] Recv command 0x4d454153
14,023,459 UART: ROM Fatal Error: 0x01020006
14,026,800 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,515 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
13,810,020 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,835 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,422 UART:
192,824 UART: Running Caliptra ROM ...
193,949 UART:
603,425 UART: [state] CFI Enabled
617,807 UART: [state] LifecycleState = Unprovisioned
620,189 UART: [state] DebugLocked = No
621,941 UART: [state] WD Timer not started. Device not locked for debugging
626,639 UART: [kat] SHA2-256
808,653 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,186 UART: [kat] ++
820,781 UART: [kat] sha1
830,312 UART: [kat] SHA2-256
833,385 UART: [kat] SHA2-384
838,002 UART: [kat] SHA2-512-ACC
840,616 UART: [kat] ECC-384
4,097,011 UART: [kat] HMAC-384Kdf
4,108,870 UART: [kat] LMS
5,182,002 UART: [kat] --
5,187,554 UART: [cold-reset] ++
5,190,359 UART: [fht] FHT @ 0x50003400
5,201,618 UART: [idev] ++
5,202,344 UART: [idev] CDI.KEYID = 6
5,203,518 UART: [idev] SUBJECT.KEYID = 7
5,205,004 UART: [idev] UDS.KEYID = 0
5,222,724 UART: [idev] Erasing UDS.KEYID = 0
8,495,291 UART: [idev] Sha1 KeyId Algorithm
8,516,958 UART: [idev] --
8,520,516 UART: [ldev] ++
8,521,080 UART: [ldev] CDI.KEYID = 6
8,522,259 UART: [ldev] SUBJECT.KEYID = 5
8,523,741 UART: [ldev] AUTHORITY.KEYID = 7
8,525,306 UART: [ldev] FE.KEYID = 1
8,537,250 UART: [ldev] Erasing FE.KEYID = 1
11,832,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,202 UART: [ldev] --
14,195,652 UART: [fwproc] Wait for Commands...
14,197,275 UART: [fwproc] Recv command 0x4d454153
14,201,481 UART: ROM Fatal Error: 0x01020006
14,204,788 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,786 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
14,015,895 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,599 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,241 UART:
192,614 UART: Running Caliptra ROM ...
193,794 UART:
193,940 UART: [state] CFI Enabled
264,026 UART: [state] LifecycleState = Unprovisioned
265,885 UART: [state] DebugLocked = No
268,828 UART: [state] WD Timer not started. Device not locked for debugging
273,364 UART: [kat] SHA2-256
452,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,073 UART: [kat] ++
464,609 UART: [kat] sha1
476,536 UART: [kat] SHA2-256
479,536 UART: [kat] SHA2-384
484,355 UART: [kat] SHA2-512-ACC
487,345 UART: [kat] ECC-384
2,950,656 UART: [kat] HMAC-384Kdf
2,974,834 UART: [kat] LMS
3,504,323 UART: [kat] --
3,509,043 UART: [cold-reset] ++
3,511,420 UART: [fht] FHT @ 0x50003400
3,521,974 UART: [idev] ++
3,522,574 UART: [idev] CDI.KEYID = 6
3,523,459 UART: [idev] SUBJECT.KEYID = 7
3,524,677 UART: [idev] UDS.KEYID = 0
3,548,408 UART: [idev] Erasing UDS.KEYID = 0
6,030,376 UART: [idev] Sha1 KeyId Algorithm
6,052,476 UART: [idev] --
6,057,074 UART: [ldev] ++
6,057,652 UART: [ldev] CDI.KEYID = 6
6,058,584 UART: [ldev] SUBJECT.KEYID = 5
6,059,749 UART: [ldev] AUTHORITY.KEYID = 7
6,060,981 UART: [ldev] FE.KEYID = 1
6,103,934 UART: [ldev] Erasing FE.KEYID = 1
8,608,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,356 UART: [ldev] --
10,416,449 UART: [fwproc] Wait for Commands...
10,419,251 UART: [fwproc] Recv command 0x4d454153
10,423,350 UART: ROM Fatal Error: 0x01020006
10,426,444 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,701 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,326 UART:
192,697 UART: Running Caliptra ROM ...
193,877 UART:
194,029 UART: [state] CFI Enabled
264,963 UART: [state] LifecycleState = Unprovisioned
266,883 UART: [state] DebugLocked = No
268,044 UART: [state] WD Timer not started. Device not locked for debugging
272,135 UART: [kat] SHA2-256
451,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,835 UART: [kat] ++
463,364 UART: [kat] sha1
475,548 UART: [kat] SHA2-256
478,593 UART: [kat] SHA2-384
483,067 UART: [kat] SHA2-512-ACC
486,004 UART: [kat] ECC-384
2,947,727 UART: [kat] HMAC-384Kdf
2,971,845 UART: [kat] LMS
3,501,333 UART: [kat] --
3,505,705 UART: [cold-reset] ++
3,508,177 UART: [fht] FHT @ 0x50003400
3,520,179 UART: [idev] ++
3,520,786 UART: [idev] CDI.KEYID = 6
3,521,715 UART: [idev] SUBJECT.KEYID = 7
3,522,899 UART: [idev] UDS.KEYID = 0
3,544,770 UART: [idev] Erasing UDS.KEYID = 0
6,027,843 UART: [idev] Sha1 KeyId Algorithm
6,052,127 UART: [idev] --
6,056,670 UART: [ldev] ++
6,057,246 UART: [ldev] CDI.KEYID = 6
6,058,156 UART: [ldev] SUBJECT.KEYID = 5
6,059,322 UART: [ldev] AUTHORITY.KEYID = 7
6,060,557 UART: [ldev] FE.KEYID = 1
6,101,089 UART: [ldev] Erasing FE.KEYID = 1
8,601,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,685 UART: [ldev] --
10,416,900 UART: [fwproc] Wait for Commands...
10,418,465 UART: [fwproc] Recv command 0x4d454153
10,423,271 UART: ROM Fatal Error: 0x01020006
10,426,367 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,494 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,202,903 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,682 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,309 UART:
192,686 UART: Running Caliptra ROM ...
193,760 UART:
603,367 UART: [state] CFI Enabled
615,482 UART: [state] LifecycleState = Unprovisioned
617,389 UART: [state] DebugLocked = No
618,953 UART: [state] WD Timer not started. Device not locked for debugging
622,767 UART: [kat] SHA2-256
801,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,474 UART: [kat] ++
813,919 UART: [kat] sha1
825,277 UART: [kat] SHA2-256
828,330 UART: [kat] SHA2-384
832,953 UART: [kat] SHA2-512-ACC
835,890 UART: [kat] ECC-384
3,281,985 UART: [kat] HMAC-384Kdf
3,294,862 UART: [kat] LMS
3,824,365 UART: [kat] --
3,828,188 UART: [cold-reset] ++
3,829,735 UART: [fht] FHT @ 0x50003400
3,839,685 UART: [idev] ++
3,840,245 UART: [idev] CDI.KEYID = 6
3,841,256 UART: [idev] SUBJECT.KEYID = 7
3,842,376 UART: [idev] UDS.KEYID = 0
3,856,841 UART: [idev] Erasing UDS.KEYID = 0
6,312,753 UART: [idev] Sha1 KeyId Algorithm
6,336,350 UART: [idev] --
6,339,855 UART: [ldev] ++
6,340,422 UART: [ldev] CDI.KEYID = 6
6,341,298 UART: [ldev] SUBJECT.KEYID = 5
6,342,508 UART: [ldev] AUTHORITY.KEYID = 7
6,343,740 UART: [ldev] FE.KEYID = 1
6,355,271 UART: [ldev] Erasing FE.KEYID = 1
8,829,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,797 UART: [ldev] --
10,619,117 UART: [fwproc] Wait for Commands...
10,620,785 UART: [fwproc] Recv command 0x4d454153
10,625,366 UART: ROM Fatal Error: 0x01020006
10,628,461 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
4,104 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,405,501 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,849 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,182,335 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,113 UART: [idev] --
1,209,088 UART: [ldev] ++
1,209,256 UART: [ldev] CDI.KEYID = 6
1,209,620 UART: [ldev] SUBJECT.KEYID = 5
1,210,047 UART: [ldev] AUTHORITY.KEYID = 7
1,210,510 UART: [ldev] FE.KEYID = 1
1,215,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,034 UART: [ldev] --
1,281,372 UART: [fwproc] Wait for Commands...
1,282,157 UART: [fwproc] Recv command 0x4d454153
1,283,491 UART: ROM Fatal Error: 0x01020006
1,284,650 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,772 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,625 UART: [kat] LMS
1,169,937 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,322 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,669 UART: [idev] SUBJECT.KEYID = 7
1,175,094 UART: [idev] UDS.KEYID = 0
1,183,716 UART: [idev] Erasing UDS.KEYID = 0
1,200,752 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,601 UART: [ldev] ++
1,210,769 UART: [ldev] CDI.KEYID = 6
1,211,133 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,581 UART: [ldev] --
1,282,961 UART: [fwproc] Wait for Commands...
1,283,564 UART: [fwproc] Recv command 0x4d454153
1,284,778 UART: ROM Fatal Error: 0x01020006
1,285,937 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,455 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,873 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,209,008 UART: [ldev] ++
1,209,176 UART: [ldev] CDI.KEYID = 6
1,209,540 UART: [ldev] SUBJECT.KEYID = 5
1,209,967 UART: [ldev] AUTHORITY.KEYID = 7
1,210,430 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,242,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,038 UART: [ldev] --
1,281,518 UART: [fwproc] Wait for Commands...
1,282,133 UART: [fwproc] Recv command 0x4d454153
1,283,351 UART: ROM Fatal Error: 0x01020006
1,284,510 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,192 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,237 UART: [kat] LMS
1,169,549 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,578 UART: [idev] Sha1 KeyId Algorithm
1,208,628 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,291 UART: [ldev] --
1,282,735 UART: [fwproc] Wait for Commands...
1,283,466 UART: [fwproc] Recv command 0x4d454153
1,284,872 UART: ROM Fatal Error: 0x01020006
1,286,031 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,603 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,234 UART: [kat] LMS
1,168,546 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,209,122 UART: [ldev] ++
1,209,290 UART: [ldev] CDI.KEYID = 6
1,209,654 UART: [ldev] SUBJECT.KEYID = 5
1,210,081 UART: [ldev] AUTHORITY.KEYID = 7
1,210,544 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,818 UART: [ldev] --
1,281,088 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x4d454153
1,283,225 UART: ROM Fatal Error: 0x01020006
1,284,384 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,848 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,789 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,350 UART: [fwproc] Recv command 0x4d454153
1,283,486 UART: ROM Fatal Error: 0x01020006
1,284,645 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,895 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,663 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,302 UART:
192,667 UART: Running Caliptra ROM ...
193,872 UART:
194,028 UART: [state] CFI Enabled
261,815 UART: [state] LifecycleState = Unprovisioned
264,229 UART: [state] DebugLocked = No
265,608 UART: [state] WD Timer not started. Device not locked for debugging
269,901 UART: [kat] SHA2-256
451,817 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,331 UART: [kat] ++
463,921 UART: [kat] sha1
473,186 UART: [kat] SHA2-256
476,166 UART: [kat] SHA2-384
481,994 UART: [kat] SHA2-512-ACC
484,589 UART: [kat] ECC-384
3,772,493 UART: [kat] HMAC-384Kdf
3,800,394 UART: [kat] LMS
4,873,530 UART: [kat] --
4,878,104 UART: [cold-reset] ++
4,879,727 UART: [fht] FHT @ 0x50003400
4,890,606 UART: [idev] ++
4,891,288 UART: [idev] CDI.KEYID = 6
4,892,470 UART: [idev] SUBJECT.KEYID = 7
4,893,626 UART: [idev] UDS.KEYID = 0
4,907,500 UART: [idev] Erasing UDS.KEYID = 0
8,218,185 UART: [idev] Sha1 KeyId Algorithm
8,239,753 UART: [idev] --
8,244,204 UART: [ldev] ++
8,244,776 UART: [ldev] CDI.KEYID = 6
8,245,892 UART: [ldev] SUBJECT.KEYID = 5
8,247,177 UART: [ldev] AUTHORITY.KEYID = 7
8,248,273 UART: [ldev] FE.KEYID = 1
8,294,429 UART: [ldev] Erasing FE.KEYID = 1
11,632,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,634 UART: [ldev] --
14,014,788 UART: [fwproc] Wait for Commands...
14,016,353 UART: [fwproc] Recv command 0x43415053
14,020,358 UART: ROM Fatal Error: 0x01020006
14,023,684 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,442 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
13,809,560 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,863 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,483 UART:
192,866 UART: Running Caliptra ROM ...
194,014 UART:
603,743 UART: [state] CFI Enabled
615,788 UART: [state] LifecycleState = Unprovisioned
618,180 UART: [state] DebugLocked = No
619,601 UART: [state] WD Timer not started. Device not locked for debugging
623,791 UART: [kat] SHA2-256
805,781 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,291 UART: [kat] ++
817,879 UART: [kat] sha1
828,329 UART: [kat] SHA2-256
831,393 UART: [kat] SHA2-384
837,162 UART: [kat] SHA2-512-ACC
839,777 UART: [kat] ECC-384
4,095,433 UART: [kat] HMAC-384Kdf
4,108,114 UART: [kat] LMS
5,181,241 UART: [kat] --
5,184,664 UART: [cold-reset] ++
5,187,253 UART: [fht] FHT @ 0x50003400
5,198,830 UART: [idev] ++
5,199,557 UART: [idev] CDI.KEYID = 6
5,200,731 UART: [idev] SUBJECT.KEYID = 7
5,202,162 UART: [idev] UDS.KEYID = 0
5,217,650 UART: [idev] Erasing UDS.KEYID = 0
8,489,296 UART: [idev] Sha1 KeyId Algorithm
8,510,444 UART: [idev] --
8,514,981 UART: [ldev] ++
8,515,545 UART: [ldev] CDI.KEYID = 6
8,516,797 UART: [ldev] SUBJECT.KEYID = 5
8,518,237 UART: [ldev] AUTHORITY.KEYID = 7
8,519,796 UART: [ldev] FE.KEYID = 1
8,532,176 UART: [ldev] Erasing FE.KEYID = 1
11,823,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,544 UART: [ldev] --
14,186,932 UART: [fwproc] Wait for Commands...
14,189,291 UART: [fwproc] Recv command 0x43415053
14,192,636 UART: ROM Fatal Error: 0x01020006
14,195,950 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,840 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
14,021,262 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,576 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,240 UART:
192,619 UART: Running Caliptra ROM ...
193,720 UART:
193,870 UART: [state] CFI Enabled
262,513 UART: [state] LifecycleState = Unprovisioned
264,441 UART: [state] DebugLocked = No
265,665 UART: [state] WD Timer not started. Device not locked for debugging
269,100 UART: [kat] SHA2-256
448,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,822 UART: [kat] ++
460,363 UART: [kat] sha1
471,730 UART: [kat] SHA2-256
474,796 UART: [kat] SHA2-384
479,527 UART: [kat] SHA2-512-ACC
482,516 UART: [kat] ECC-384
2,927,684 UART: [kat] HMAC-384Kdf
2,952,020 UART: [kat] LMS
3,481,488 UART: [kat] --
3,486,124 UART: [cold-reset] ++
3,488,220 UART: [fht] FHT @ 0x50003400
3,499,093 UART: [idev] ++
3,499,694 UART: [idev] CDI.KEYID = 6
3,500,602 UART: [idev] SUBJECT.KEYID = 7
3,501,785 UART: [idev] UDS.KEYID = 0
3,523,757 UART: [idev] Erasing UDS.KEYID = 0
6,005,208 UART: [idev] Sha1 KeyId Algorithm
6,028,114 UART: [idev] --
6,032,057 UART: [ldev] ++
6,032,638 UART: [ldev] CDI.KEYID = 6
6,033,556 UART: [ldev] SUBJECT.KEYID = 5
6,034,721 UART: [ldev] AUTHORITY.KEYID = 7
6,035,958 UART: [ldev] FE.KEYID = 1
6,079,519 UART: [ldev] Erasing FE.KEYID = 1
8,583,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,990 UART: [ldev] --
10,391,858 UART: [fwproc] Wait for Commands...
10,393,321 UART: [fwproc] Recv command 0x43415053
10,396,400 UART: ROM Fatal Error: 0x01020006
10,399,498 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,438 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,031 UART:
192,415 UART: Running Caliptra ROM ...
193,597 UART:
193,755 UART: [state] CFI Enabled
264,171 UART: [state] LifecycleState = Unprovisioned
266,092 UART: [state] DebugLocked = No
268,453 UART: [state] WD Timer not started. Device not locked for debugging
271,948 UART: [kat] SHA2-256
451,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,629 UART: [kat] ++
463,166 UART: [kat] sha1
474,154 UART: [kat] SHA2-256
477,211 UART: [kat] SHA2-384
483,021 UART: [kat] SHA2-512-ACC
485,961 UART: [kat] ECC-384
2,948,487 UART: [kat] HMAC-384Kdf
2,972,235 UART: [kat] LMS
3,501,706 UART: [kat] --
3,506,509 UART: [cold-reset] ++
3,508,390 UART: [fht] FHT @ 0x50003400
3,520,236 UART: [idev] ++
3,520,810 UART: [idev] CDI.KEYID = 6
3,521,690 UART: [idev] SUBJECT.KEYID = 7
3,522,881 UART: [idev] UDS.KEYID = 0
3,543,730 UART: [idev] Erasing UDS.KEYID = 0
6,024,480 UART: [idev] Sha1 KeyId Algorithm
6,047,386 UART: [idev] --
6,051,750 UART: [ldev] ++
6,052,336 UART: [ldev] CDI.KEYID = 6
6,053,248 UART: [ldev] SUBJECT.KEYID = 5
6,054,468 UART: [ldev] AUTHORITY.KEYID = 7
6,055,710 UART: [ldev] FE.KEYID = 1
6,101,151 UART: [ldev] Erasing FE.KEYID = 1
8,604,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,989 UART: [ldev] --
10,412,815 UART: [fwproc] Wait for Commands...
10,415,893 UART: [fwproc] Recv command 0x43415053
10,420,588 UART: ROM Fatal Error: 0x01020006
10,423,684 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
4,976 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,207,987 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
4,040 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,621 UART:
192,996 UART: Running Caliptra ROM ...
194,169 UART:
603,730 UART: [state] CFI Enabled
612,616 UART: [state] LifecycleState = Unprovisioned
614,500 UART: [state] DebugLocked = No
616,678 UART: [state] WD Timer not started. Device not locked for debugging
620,072 UART: [kat] SHA2-256
798,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,502 UART: [kat] ++
811,038 UART: [kat] sha1
822,306 UART: [kat] SHA2-256
825,317 UART: [kat] SHA2-384
832,477 UART: [kat] SHA2-512-ACC
835,459 UART: [kat] ECC-384
3,277,700 UART: [kat] HMAC-384Kdf
3,290,742 UART: [kat] LMS
3,820,247 UART: [kat] --
3,824,936 UART: [cold-reset] ++
3,827,232 UART: [fht] FHT @ 0x50003400
3,838,089 UART: [idev] ++
3,838,656 UART: [idev] CDI.KEYID = 6
3,839,589 UART: [idev] SUBJECT.KEYID = 7
3,840,796 UART: [idev] UDS.KEYID = 0
3,857,773 UART: [idev] Erasing UDS.KEYID = 0
6,317,977 UART: [idev] Sha1 KeyId Algorithm
6,341,185 UART: [idev] --
6,346,419 UART: [ldev] ++
6,346,977 UART: [ldev] CDI.KEYID = 6
6,347,857 UART: [ldev] SUBJECT.KEYID = 5
6,349,066 UART: [ldev] AUTHORITY.KEYID = 7
6,350,352 UART: [ldev] FE.KEYID = 1
6,359,563 UART: [ldev] Erasing FE.KEYID = 1
8,837,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,978 UART: [ldev] --
10,628,383 UART: [fwproc] Wait for Commands...
10,630,312 UART: [fwproc] Recv command 0x43415053
10,633,676 UART: ROM Fatal Error: 0x01020006
10,636,825 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,753 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,409,362 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,921 UART: [fht] FHT @ 0x50003400
1,172,467 UART: [idev] ++
1,172,635 UART: [idev] CDI.KEYID = 6
1,172,996 UART: [idev] SUBJECT.KEYID = 7
1,173,421 UART: [idev] UDS.KEYID = 0
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,598 UART: [fwproc] Wait for Commands...
1,281,183 UART: [fwproc] Recv command 0x43415053
1,282,420 UART: ROM Fatal Error: 0x01020006
1,283,579 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,867 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,954 UART: [kat] ++
896,106 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,730 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,062 UART: [idev] Sha1 KeyId Algorithm
1,207,892 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,707 UART: [ldev] Erasing FE.KEYID = 1
1,242,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,835 UART: [ldev] --
1,281,133 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x43415053
1,282,993 UART: ROM Fatal Error: 0x01020006
1,284,152 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,146 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,621 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,577 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,326 UART: [ldev] ++
1,208,494 UART: [ldev] CDI.KEYID = 6
1,208,858 UART: [ldev] SUBJECT.KEYID = 5
1,209,285 UART: [ldev] AUTHORITY.KEYID = 7
1,209,748 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,240,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,242 UART: [fwproc] Wait for Commands...
1,280,885 UART: [fwproc] Recv command 0x43415053
1,282,080 UART: ROM Fatal Error: 0x01020006
1,283,239 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,605 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,961 UART: [state] LifecycleState = Unprovisioned
86,616 UART: [state] DebugLocked = No
87,244 UART: [state] WD Timer not started. Device not locked for debugging
88,513 UART: [kat] SHA2-256
892,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,192 UART: [kat] ++
896,344 UART: [kat] sha1
900,412 UART: [kat] SHA2-256
902,352 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,287 UART: [ldev] ++
1,209,455 UART: [ldev] CDI.KEYID = 6
1,209,819 UART: [ldev] SUBJECT.KEYID = 5
1,210,246 UART: [ldev] AUTHORITY.KEYID = 7
1,210,709 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,713 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x43415053
1,283,505 UART: ROM Fatal Error: 0x01020006
1,284,664 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,936 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,550 UART: [state] LifecycleState = Unprovisioned
85,205 UART: [state] DebugLocked = No
85,929 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
890,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,893 UART: [kat] ++
895,045 UART: [kat] sha1
899,321 UART: [kat] SHA2-256
901,261 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,967 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,992 UART: [ldev] --
1,282,256 UART: [fwproc] Wait for Commands...
1,282,833 UART: [fwproc] Recv command 0x43415053
1,283,848 UART: ROM Fatal Error: 0x01020006
1,285,007 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,735 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,777 UART: [kat] HMAC-384Kdf
921,213 UART: [kat] LMS
1,169,525 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,738 UART: [idev] ++
1,173,906 UART: [idev] CDI.KEYID = 6
1,174,267 UART: [idev] SUBJECT.KEYID = 7
1,174,692 UART: [idev] UDS.KEYID = 0
1,182,774 UART: [idev] Erasing UDS.KEYID = 0
1,200,622 UART: [idev] Sha1 KeyId Algorithm
1,209,502 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,909 UART: [ldev] SUBJECT.KEYID = 5
1,211,336 UART: [ldev] AUTHORITY.KEYID = 7
1,211,799 UART: [ldev] FE.KEYID = 1
1,217,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,857 UART: [fwproc] Wait for Commands...
1,283,664 UART: [fwproc] Recv command 0x43415053
1,284,941 UART: ROM Fatal Error: 0x01020006
1,286,100 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,936 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,443 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,098 UART:
192,480 UART: Running Caliptra ROM ...
193,687 UART:
193,856 UART: [state] CFI Enabled
263,234 UART: [state] LifecycleState = Unprovisioned
265,620 UART: [state] DebugLocked = No
268,029 UART: [state] WD Timer not started. Device not locked for debugging
272,397 UART: [kat] SHA2-256
454,312 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,818 UART: [kat] ++
466,322 UART: [kat] sha1
477,094 UART: [kat] SHA2-256
480,067 UART: [kat] SHA2-384
486,153 UART: [kat] SHA2-512-ACC
488,770 UART: [kat] ECC-384
3,774,440 UART: [kat] HMAC-384Kdf
3,802,093 UART: [kat] LMS
4,875,202 UART: [kat] --
4,878,009 UART: [cold-reset] ++
4,880,655 UART: [fht] FHT @ 0x50003400
4,892,180 UART: [idev] ++
4,892,850 UART: [idev] CDI.KEYID = 6
4,894,010 UART: [idev] SUBJECT.KEYID = 7
4,895,169 UART: [idev] UDS.KEYID = 0
4,929,668 UART: [idev] Erasing UDS.KEYID = 0
8,242,002 UART: [idev] Sha1 KeyId Algorithm
8,264,918 UART: [idev] --
8,268,209 UART: [ldev] ++
8,268,776 UART: [ldev] CDI.KEYID = 6
8,269,956 UART: [ldev] SUBJECT.KEYID = 5
8,271,118 UART: [ldev] AUTHORITY.KEYID = 7
8,272,345 UART: [ldev] FE.KEYID = 1
8,316,778 UART: [ldev] Erasing FE.KEYID = 1
11,649,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,032 UART: [ldev] --
14,016,058 UART: [fwproc] Wait for Commands...
14,020,015 UART: ROM Fatal Error: 0x01020009
14,023,341 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,522 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
13,850,840 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,937 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,551 UART:
192,932 UART: Running Caliptra ROM ...
194,048 UART:
603,808 UART: [state] CFI Enabled
616,113 UART: [state] LifecycleState = Unprovisioned
618,461 UART: [state] DebugLocked = No
620,323 UART: [state] WD Timer not started. Device not locked for debugging
624,779 UART: [kat] SHA2-256
806,791 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,316 UART: [kat] ++
818,813 UART: [kat] sha1
829,853 UART: [kat] SHA2-256
832,920 UART: [kat] SHA2-384
838,888 UART: [kat] SHA2-512-ACC
841,499 UART: [kat] ECC-384
4,098,719 UART: [kat] HMAC-384Kdf
4,110,809 UART: [kat] LMS
5,183,964 UART: [kat] --
5,187,775 UART: [cold-reset] ++
5,189,179 UART: [fht] FHT @ 0x50003400
5,200,657 UART: [idev] ++
5,201,328 UART: [idev] CDI.KEYID = 6
5,202,564 UART: [idev] SUBJECT.KEYID = 7
5,204,000 UART: [idev] UDS.KEYID = 0
5,219,184 UART: [idev] Erasing UDS.KEYID = 0
8,492,467 UART: [idev] Sha1 KeyId Algorithm
8,513,541 UART: [idev] --
8,516,836 UART: [ldev] ++
8,517,405 UART: [ldev] CDI.KEYID = 6
8,518,640 UART: [ldev] SUBJECT.KEYID = 5
8,520,073 UART: [ldev] AUTHORITY.KEYID = 7
8,521,638 UART: [ldev] FE.KEYID = 1
8,532,985 UART: [ldev] Erasing FE.KEYID = 1
11,827,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,408 UART: [ldev] --
14,192,687 UART: [fwproc] Wait for Commands...
14,197,055 UART: ROM Fatal Error: 0x01020009
14,200,344 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,755 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
14,019,272 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,480 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,089 UART:
192,477 UART: Running Caliptra ROM ...
193,555 UART:
193,695 UART: [state] CFI Enabled
264,350 UART: [state] LifecycleState = Unprovisioned
266,230 UART: [state] DebugLocked = No
267,691 UART: [state] WD Timer not started. Device not locked for debugging
272,131 UART: [kat] SHA2-256
451,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,860 UART: [kat] ++
463,310 UART: [kat] sha1
475,910 UART: [kat] SHA2-256
478,979 UART: [kat] SHA2-384
485,070 UART: [kat] SHA2-512-ACC
488,033 UART: [kat] ECC-384
2,949,697 UART: [kat] HMAC-384Kdf
2,972,185 UART: [kat] LMS
3,501,620 UART: [kat] --
3,505,720 UART: [cold-reset] ++
3,507,325 UART: [fht] FHT @ 0x50003400
3,518,463 UART: [idev] ++
3,519,032 UART: [idev] CDI.KEYID = 6
3,519,975 UART: [idev] SUBJECT.KEYID = 7
3,521,193 UART: [idev] UDS.KEYID = 0
3,543,459 UART: [idev] Erasing UDS.KEYID = 0
6,022,425 UART: [idev] Sha1 KeyId Algorithm
6,046,095 UART: [idev] --
6,049,561 UART: [ldev] ++
6,050,135 UART: [ldev] CDI.KEYID = 6
6,051,047 UART: [ldev] SUBJECT.KEYID = 5
6,052,234 UART: [ldev] AUTHORITY.KEYID = 7
6,053,606 UART: [ldev] FE.KEYID = 1
6,100,162 UART: [ldev] Erasing FE.KEYID = 1
8,601,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,473 UART: [ldev] --
10,411,821 UART: [fwproc] Wait for Commands...
10,416,351 UART: ROM Fatal Error: 0x01020009
10,419,457 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,516 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,169 UART:
192,571 UART: Running Caliptra ROM ...
193,753 UART:
193,909 UART: [state] CFI Enabled
266,499 UART: [state] LifecycleState = Unprovisioned
268,176 UART: [state] DebugLocked = No
269,724 UART: [state] WD Timer not started. Device not locked for debugging
274,003 UART: [kat] SHA2-256
453,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,662 UART: [kat] ++
465,259 UART: [kat] sha1
475,765 UART: [kat] SHA2-256
478,779 UART: [kat] SHA2-384
484,866 UART: [kat] SHA2-512-ACC
487,810 UART: [kat] ECC-384
2,949,712 UART: [kat] HMAC-384Kdf
2,972,371 UART: [kat] LMS
3,501,825 UART: [kat] --
3,505,774 UART: [cold-reset] ++
3,507,819 UART: [fht] FHT @ 0x50003400
3,519,282 UART: [idev] ++
3,519,846 UART: [idev] CDI.KEYID = 6
3,520,805 UART: [idev] SUBJECT.KEYID = 7
3,521,964 UART: [idev] UDS.KEYID = 0
3,543,899 UART: [idev] Erasing UDS.KEYID = 0
6,029,042 UART: [idev] Sha1 KeyId Algorithm
6,053,036 UART: [idev] --
6,056,277 UART: [ldev] ++
6,056,847 UART: [ldev] CDI.KEYID = 6
6,057,730 UART: [ldev] SUBJECT.KEYID = 5
6,058,947 UART: [ldev] AUTHORITY.KEYID = 7
6,060,184 UART: [ldev] FE.KEYID = 1
6,100,629 UART: [ldev] Erasing FE.KEYID = 1
8,604,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,279 UART: [ldev] --
10,416,272 UART: [fwproc] Wait for Commands...
10,422,923 UART: ROM Fatal Error: 0x01020009
10,426,027 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,408 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,187,942 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,154 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,707 UART:
193,077 UART: Running Caliptra ROM ...
194,247 UART:
603,912 UART: [state] CFI Enabled
616,979 UART: [state] LifecycleState = Unprovisioned
618,807 UART: [state] DebugLocked = No
621,262 UART: [state] WD Timer not started. Device not locked for debugging
624,622 UART: [kat] SHA2-256
803,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,311 UART: [kat] ++
815,840 UART: [kat] sha1
827,603 UART: [kat] SHA2-256
830,608 UART: [kat] SHA2-384
835,714 UART: [kat] SHA2-512-ACC
838,639 UART: [kat] ECC-384
3,280,030 UART: [kat] HMAC-384Kdf
3,292,901 UART: [kat] LMS
3,822,405 UART: [kat] --
3,828,062 UART: [cold-reset] ++
3,830,401 UART: [fht] FHT @ 0x50003400
3,841,111 UART: [idev] ++
3,841,682 UART: [idev] CDI.KEYID = 6
3,842,593 UART: [idev] SUBJECT.KEYID = 7
3,843,806 UART: [idev] UDS.KEYID = 0
3,859,402 UART: [idev] Erasing UDS.KEYID = 0
6,316,408 UART: [idev] Sha1 KeyId Algorithm
6,339,802 UART: [idev] --
6,342,947 UART: [ldev] ++
6,343,514 UART: [ldev] CDI.KEYID = 6
6,344,420 UART: [ldev] SUBJECT.KEYID = 5
6,345,630 UART: [ldev] AUTHORITY.KEYID = 7
6,346,856 UART: [ldev] FE.KEYID = 1
6,356,149 UART: [ldev] Erasing FE.KEYID = 1
8,827,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,665 UART: [ldev] --
10,616,056 UART: [fwproc] Wait for Commands...
10,619,459 UART: ROM Fatal Error: 0x01020009
10,622,556 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,776 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,398,528 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,459 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,188 UART:
192,568 UART: Running Caliptra ROM ...
193,785 UART:
193,953 UART: [state] CFI Enabled
264,300 UART: [state] LifecycleState = Unprovisioned
266,628 UART: [state] DebugLocked = No
268,765 UART: [state] WD Timer not started. Device not locked for debugging
274,232 UART: [kat] SHA2-256
456,150 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,708 UART: [kat] ++
468,187 UART: [kat] sha1
479,881 UART: [kat] SHA2-256
482,943 UART: [kat] SHA2-384
490,221 UART: [kat] SHA2-512-ACC
492,842 UART: [kat] ECC-384
3,777,404 UART: [kat] HMAC-384Kdf
3,805,241 UART: [kat] LMS
4,878,386 UART: [kat] --
4,881,536 UART: [cold-reset] ++
4,882,576 UART: [fht] FHT @ 0x50003400
4,893,614 UART: [idev] ++
4,894,293 UART: [idev] CDI.KEYID = 6
4,895,527 UART: [idev] SUBJECT.KEYID = 7
4,896,685 UART: [idev] UDS.KEYID = 0
4,931,953 UART: [idev] Erasing UDS.KEYID = 0
8,246,715 UART: [idev] Sha1 KeyId Algorithm
8,269,192 UART: [idev] --
8,272,698 UART: [ldev] ++
8,273,308 UART: [ldev] CDI.KEYID = 6
8,274,502 UART: [ldev] SUBJECT.KEYID = 5
8,275,615 UART: [ldev] AUTHORITY.KEYID = 7
8,276,775 UART: [ldev] FE.KEYID = 1
8,319,585 UART: [ldev] Erasing FE.KEYID = 1
11,654,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,255 UART: [ldev] --
14,038,316 UART: [fwproc] Wait for Commands...
14,040,749 UART: [fwproc] Recv command 0xabcd1234
14,043,075 UART: [fwproc] Invalid command received
14,046,866 UART: ROM Fatal Error: 0x01020004
14,050,182 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,531 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
13,826,431 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,706 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,325 UART:
192,716 UART: Running Caliptra ROM ...
193,926 UART:
603,386 UART: [state] CFI Enabled
619,918 UART: [state] LifecycleState = Unprovisioned
622,279 UART: [state] DebugLocked = No
624,174 UART: [state] WD Timer not started. Device not locked for debugging
628,702 UART: [kat] SHA2-256
810,681 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,219 UART: [kat] ++
822,714 UART: [kat] sha1
833,593 UART: [kat] SHA2-256
836,654 UART: [kat] SHA2-384
842,897 UART: [kat] SHA2-512-ACC
845,514 UART: [kat] ECC-384
4,101,919 UART: [kat] HMAC-384Kdf
4,112,969 UART: [kat] LMS
5,186,078 UART: [kat] --
5,191,621 UART: [cold-reset] ++
5,193,022 UART: [fht] FHT @ 0x50003400
5,204,280 UART: [idev] ++
5,204,957 UART: [idev] CDI.KEYID = 6
5,206,196 UART: [idev] SUBJECT.KEYID = 7
5,207,636 UART: [idev] UDS.KEYID = 0
5,224,318 UART: [idev] Erasing UDS.KEYID = 0
8,500,362 UART: [idev] Sha1 KeyId Algorithm
8,523,327 UART: [idev] --
8,526,029 UART: [ldev] ++
8,526,602 UART: [ldev] CDI.KEYID = 6
8,527,841 UART: [ldev] SUBJECT.KEYID = 5
8,529,279 UART: [ldev] AUTHORITY.KEYID = 7
8,530,842 UART: [ldev] FE.KEYID = 1
8,542,157 UART: [ldev] Erasing FE.KEYID = 1
11,837,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,667 UART: [ldev] --
14,200,287 UART: [fwproc] Wait for Commands...
14,202,403 UART: [fwproc] Recv command 0xabcd1234
14,204,729 UART: [fwproc] Invalid command received
14,208,535 UART: ROM Fatal Error: 0x01020004
14,211,852 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,855 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
14,013,795 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,477 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,139 UART:
192,535 UART: Running Caliptra ROM ...
193,708 UART:
193,861 UART: [state] CFI Enabled
264,479 UART: [state] LifecycleState = Unprovisioned
266,338 UART: [state] DebugLocked = No
269,296 UART: [state] WD Timer not started. Device not locked for debugging
273,486 UART: [kat] SHA2-256
452,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,203 UART: [kat] ++
464,739 UART: [kat] sha1
476,704 UART: [kat] SHA2-256
479,770 UART: [kat] SHA2-384
485,585 UART: [kat] SHA2-512-ACC
488,517 UART: [kat] ECC-384
2,948,332 UART: [kat] HMAC-384Kdf
2,971,820 UART: [kat] LMS
3,501,240 UART: [kat] --
3,505,534 UART: [cold-reset] ++
3,506,616 UART: [fht] FHT @ 0x50003400
3,517,973 UART: [idev] ++
3,518,549 UART: [idev] CDI.KEYID = 6
3,519,433 UART: [idev] SUBJECT.KEYID = 7
3,520,666 UART: [idev] UDS.KEYID = 0
3,544,412 UART: [idev] Erasing UDS.KEYID = 0
6,026,177 UART: [idev] Sha1 KeyId Algorithm
6,048,719 UART: [idev] --
6,053,531 UART: [ldev] ++
6,054,105 UART: [ldev] CDI.KEYID = 6
6,054,993 UART: [ldev] SUBJECT.KEYID = 5
6,056,212 UART: [ldev] AUTHORITY.KEYID = 7
6,057,446 UART: [ldev] FE.KEYID = 1
6,100,075 UART: [ldev] Erasing FE.KEYID = 1
8,603,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,955 UART: [ldev] --
10,411,858 UART: [fwproc] Wait for Commands...
10,413,811 UART: [fwproc] Recv command 0xabcd1234
10,415,913 UART: [fwproc] Invalid command received
10,419,111 UART: ROM Fatal Error: 0x01020004
10,422,205 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,524 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,170 UART:
192,568 UART: Running Caliptra ROM ...
193,696 UART:
193,847 UART: [state] CFI Enabled
263,993 UART: [state] LifecycleState = Unprovisioned
265,844 UART: [state] DebugLocked = No
268,306 UART: [state] WD Timer not started. Device not locked for debugging
271,666 UART: [kat] SHA2-256
450,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,379 UART: [kat] ++
462,916 UART: [kat] sha1
473,959 UART: [kat] SHA2-256
476,967 UART: [kat] SHA2-384
484,672 UART: [kat] SHA2-512-ACC
487,624 UART: [kat] ECC-384
2,948,041 UART: [kat] HMAC-384Kdf
2,972,148 UART: [kat] LMS
3,501,650 UART: [kat] --
3,505,293 UART: [cold-reset] ++
3,507,182 UART: [fht] FHT @ 0x50003400
3,518,109 UART: [idev] ++
3,518,671 UART: [idev] CDI.KEYID = 6
3,519,558 UART: [idev] SUBJECT.KEYID = 7
3,520,733 UART: [idev] UDS.KEYID = 0
3,543,150 UART: [idev] Erasing UDS.KEYID = 0
6,028,016 UART: [idev] Sha1 KeyId Algorithm
6,052,176 UART: [idev] --
6,055,201 UART: [ldev] ++
6,055,777 UART: [ldev] CDI.KEYID = 6
6,056,660 UART: [ldev] SUBJECT.KEYID = 5
6,057,822 UART: [ldev] AUTHORITY.KEYID = 7
6,059,113 UART: [ldev] FE.KEYID = 1
6,100,689 UART: [ldev] Erasing FE.KEYID = 1
8,599,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,205 UART: [ldev] --
10,392,399 UART: [fwproc] Wait for Commands...
10,394,663 UART: [fwproc] Recv command 0xabcd1234
10,396,763 UART: [fwproc] Invalid command received
10,398,822 UART: ROM Fatal Error: 0x01020004
10,401,919 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,460 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,206,832 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,836 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,433 UART:
192,809 UART: Running Caliptra ROM ...
193,891 UART:
603,695 UART: [state] CFI Enabled
616,660 UART: [state] LifecycleState = Unprovisioned
618,543 UART: [state] DebugLocked = No
621,023 UART: [state] WD Timer not started. Device not locked for debugging
625,626 UART: [kat] SHA2-256
804,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,347 UART: [kat] ++
816,877 UART: [kat] sha1
827,813 UART: [kat] SHA2-256
830,820 UART: [kat] SHA2-384
837,816 UART: [kat] SHA2-512-ACC
840,797 UART: [kat] ECC-384
3,281,850 UART: [kat] HMAC-384Kdf
3,294,140 UART: [kat] LMS
3,823,644 UART: [kat] --
3,828,771 UART: [cold-reset] ++
3,831,124 UART: [fht] FHT @ 0x50003400
3,842,266 UART: [idev] ++
3,842,872 UART: [idev] CDI.KEYID = 6
3,843,757 UART: [idev] SUBJECT.KEYID = 7
3,844,973 UART: [idev] UDS.KEYID = 0
3,860,843 UART: [idev] Erasing UDS.KEYID = 0
6,319,789 UART: [idev] Sha1 KeyId Algorithm
6,342,318 UART: [idev] --
6,346,855 UART: [ldev] ++
6,347,424 UART: [ldev] CDI.KEYID = 6
6,348,333 UART: [ldev] SUBJECT.KEYID = 5
6,349,550 UART: [ldev] AUTHORITY.KEYID = 7
6,350,780 UART: [ldev] FE.KEYID = 1
6,361,913 UART: [ldev] Erasing FE.KEYID = 1
8,840,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,046 UART: [ldev] --
10,629,503 UART: [fwproc] Wait for Commands...
10,632,296 UART: [fwproc] Recv command 0xabcd1234
10,634,407 UART: [fwproc] Invalid command received
10,638,440 UART: ROM Fatal Error: 0x01020004
10,641,534 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,672 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,413,233 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,930 UART: [ldev] --
1,280,200 UART: [fwproc] Wait for Commands...
1,280,931 UART: [fwproc] Recv command 0xabcd1234
1,281,676 UART: [fwproc] Invalid command received
1,282,543 UART: ROM Fatal Error: 0x01020004
1,283,702 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,135,038 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,416 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,518 UART: [idev] ++
1,173,686 UART: [idev] CDI.KEYID = 6
1,174,047 UART: [idev] SUBJECT.KEYID = 7
1,174,472 UART: [idev] UDS.KEYID = 0
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,229 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0xabcd1234
1,283,595 UART: [fwproc] Invalid command received
1,284,500 UART: ROM Fatal Error: 0x01020004
1,285,659 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,509 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,312 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,198,887 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,712 UART: [ldev] ++
1,208,880 UART: [ldev] CDI.KEYID = 6
1,209,244 UART: [ldev] SUBJECT.KEYID = 5
1,209,671 UART: [ldev] AUTHORITY.KEYID = 7
1,210,134 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,344 UART: [ldev] --
1,280,706 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0xabcd1234
1,282,224 UART: [fwproc] Invalid command received
1,283,237 UART: ROM Fatal Error: 0x01020004
1,284,396 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,680 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,306 UART: [fwproc] Recv command 0xabcd1234
1,284,051 UART: [fwproc] Invalid command received
1,285,024 UART: ROM Fatal Error: 0x01020004
1,286,183 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,361 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,198,831 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,256 UART: [ldev] --
1,280,670 UART: [fwproc] Wait for Commands...
1,281,457 UART: [fwproc] Recv command 0xabcd1234
1,282,202 UART: [fwproc] Invalid command received
1,283,349 UART: ROM Fatal Error: 0x01020004
1,284,508 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,610 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,246 UART: [kat] SHA2-256
902,186 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,381 UART: [fwproc] Wait for Commands...
1,283,034 UART: [fwproc] Recv command 0xabcd1234
1,283,779 UART: [fwproc] Invalid command received
1,284,752 UART: ROM Fatal Error: 0x01020004
1,285,911 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,875 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,025 UART:
192,389 UART: Running Caliptra ROM ...
193,476 UART:
193,622 UART: [state] CFI Enabled
268,153 UART: [state] LifecycleState = Unprovisioned
270,492 UART: [state] DebugLocked = No
273,429 UART: [state] WD Timer not started. Device not locked for debugging
277,815 UART: [kat] SHA2-256
459,766 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,287 UART: [kat] ++
471,738 UART: [kat] sha1
481,543 UART: [kat] SHA2-256
484,552 UART: [kat] SHA2-384
489,994 UART: [kat] SHA2-512-ACC
492,575 UART: [kat] ECC-384
3,777,330 UART: [kat] HMAC-384Kdf
3,803,849 UART: [kat] LMS
4,877,030 UART: [kat] --
4,881,403 UART: [cold-reset] ++
4,883,694 UART: [fht] FHT @ 0x50003400
4,894,739 UART: [idev] ++
4,895,377 UART: [idev] CDI.KEYID = 6
4,896,618 UART: [idev] SUBJECT.KEYID = 7
4,897,719 UART: [idev] UDS.KEYID = 0
4,898,719 ready_for_fw is high
4,898,910 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,032,937 UART: [idev] Erasing UDS.KEYID = 0
8,244,401 UART: [idev] Sha1 KeyId Algorithm
8,265,912 UART: [idev] --
8,269,875 UART: [ldev] ++
8,270,444 UART: [ldev] CDI.KEYID = 6
8,271,679 UART: [ldev] SUBJECT.KEYID = 5
8,272,842 UART: [ldev] AUTHORITY.KEYID = 7
8,273,993 UART: [ldev] FE.KEYID = 1
8,319,735 UART: [ldev] Erasing FE.KEYID = 1
11,657,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,616 UART: [ldev] --
14,040,283 UART: [fwproc] Wait for Commands...
14,043,023 UART: [fwproc] Recv command 0x46574c44
14,045,439 UART: [fwproc] Recv'd Img size: 106532 bytes
18,021,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,094,528 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,136,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,453,905 >>> mbox cmd response: success
18,454,897 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,458,243 UART: [afmc] ++
18,458,851 UART: [afmc] CDI.KEYID = 6
18,460,046 UART: [afmc] SUBJECT.KEYID = 7
18,461,206 UART: [afmc] AUTHORITY.KEYID = 5
21,819,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,118,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,120,688 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,136,740 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,152,785 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,168,859 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,191,026 UART: [afmc] --
24,195,043 UART: [cold-reset] --
24,198,544 UART: [state] Locking Datavault
24,203,200 UART: [state] Locking PCR0, PCR1 and PCR31
24,204,849 UART: [state] Locking ICCM
24,207,304 UART: [exit] Launching FMC @ 0x40000000
24,215,937 UART:
24,216,171 UART: Running Caliptra FMC ...
24,217,269 UART:
24,217,422 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,219,072 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
4,805,167 ready_for_fw is high
4,805,720 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,215,661 >>> mbox cmd response: success
18,216,896 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
23,905,758 UART:
23,906,163 UART: Running Caliptra FMC ...
23,907,358 UART:
23,907,521 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
23,909,226 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,459 UART:
192,808 UART: Running Caliptra ROM ...
193,929 UART:
603,457 UART: [state] CFI Enabled
618,464 UART: [state] LifecycleState = Unprovisioned
620,838 UART: [state] DebugLocked = No
622,650 UART: [state] WD Timer not started. Device not locked for debugging
627,470 UART: [kat] SHA2-256
809,469 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,043 UART: [kat] ++
821,579 UART: [kat] sha1
832,383 UART: [kat] SHA2-256
835,375 UART: [kat] SHA2-384
842,848 UART: [kat] SHA2-512-ACC
845,495 UART: [kat] ECC-384
4,099,723 UART: [kat] HMAC-384Kdf
4,111,493 UART: [kat] LMS
5,184,642 UART: [kat] --
5,190,353 UART: [cold-reset] ++
5,191,876 UART: [fht] FHT @ 0x50003400
5,203,707 UART: [idev] ++
5,204,344 UART: [idev] CDI.KEYID = 6
5,205,582 UART: [idev] SUBJECT.KEYID = 7
5,207,036 UART: [idev] UDS.KEYID = 0
5,208,293 ready_for_fw is high
5,208,501 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,343,839 UART: [idev] Erasing UDS.KEYID = 0
8,497,100 UART: [idev] Sha1 KeyId Algorithm
8,517,905 UART: [idev] --
8,521,893 UART: [ldev] ++
8,522,457 UART: [ldev] CDI.KEYID = 6
8,523,688 UART: [ldev] SUBJECT.KEYID = 5
8,525,163 UART: [ldev] AUTHORITY.KEYID = 7
8,526,713 UART: [ldev] FE.KEYID = 1
8,536,646 UART: [ldev] Erasing FE.KEYID = 1
11,826,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,541 UART: [ldev] --
14,189,689 UART: [fwproc] Wait for Commands...
14,191,932 UART: [fwproc] Recv command 0x46574c44
14,194,232 UART: [fwproc] Recv'd Img size: 106532 bytes
18,167,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,249,607 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,292,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,609,514 >>> mbox cmd response: success
18,610,427 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,614,173 UART: [afmc] ++
18,614,771 UART: [afmc] CDI.KEYID = 6
18,615,897 UART: [afmc] SUBJECT.KEYID = 7
18,617,057 UART: [afmc] AUTHORITY.KEYID = 5
21,937,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,232,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,234,759 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,250,785 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,266,812 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,282,937 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,305,695 UART: [afmc] --
24,309,495 UART: [cold-reset] --
24,313,364 UART: [state] Locking Datavault
24,318,503 UART: [state] Locking PCR0, PCR1 and PCR31
24,320,140 UART: [state] Locking ICCM
24,322,556 UART: [exit] Launching FMC @ 0x40000000
24,331,178 UART:
24,331,407 UART: Running Caliptra FMC ...
24,332,524 UART:
24,332,674 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,334,224 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
5,104,143 ready_for_fw is high
5,104,993 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,414,810 >>> mbox cmd response: success
18,415,972 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
24,052,062 UART:
24,052,576 UART: Running Caliptra FMC ...
24,053,736 UART:
24,053,906 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,055,627 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,152 UART:
192,513 UART: Running Caliptra ROM ...
193,697 UART:
193,851 UART: [state] CFI Enabled
262,990 UART: [state] LifecycleState = Unprovisioned
264,913 UART: [state] DebugLocked = No
266,666 UART: [state] WD Timer not started. Device not locked for debugging
269,985 UART: [kat] SHA2-256
449,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,659 UART: [kat] ++
461,209 UART: [kat] sha1
471,993 UART: [kat] SHA2-256
475,000 UART: [kat] SHA2-384
481,226 UART: [kat] SHA2-512-ACC
484,164 UART: [kat] ECC-384
2,947,500 UART: [kat] HMAC-384Kdf
2,969,392 UART: [kat] LMS
3,498,829 UART: [kat] --
3,502,540 UART: [cold-reset] ++
3,504,119 UART: [fht] FHT @ 0x50003400
3,515,114 UART: [idev] ++
3,515,719 UART: [idev] CDI.KEYID = 6
3,516,642 UART: [idev] SUBJECT.KEYID = 7
3,517,821 UART: [idev] UDS.KEYID = 0
3,518,745 ready_for_fw is high
3,518,929 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,653,255 UART: [idev] Erasing UDS.KEYID = 0
6,028,320 UART: [idev] Sha1 KeyId Algorithm
6,051,280 UART: [idev] --
6,056,211 UART: [ldev] ++
6,056,788 UART: [ldev] CDI.KEYID = 6
6,057,676 UART: [ldev] SUBJECT.KEYID = 5
6,058,891 UART: [ldev] AUTHORITY.KEYID = 7
6,060,134 UART: [ldev] FE.KEYID = 1
6,098,367 UART: [ldev] Erasing FE.KEYID = 1
8,602,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,631 UART: [ldev] --
10,413,899 UART: [fwproc] Wait for Commands...
10,416,501 UART: [fwproc] Recv command 0x46574c44
10,418,604 UART: [fwproc] Recv'd Img size: 106876 bytes
13,731,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,810,186 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,852,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,170,150 >>> mbox cmd response: success
14,171,157 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,175,203 UART: [afmc] ++
14,175,808 UART: [afmc] CDI.KEYID = 6
14,176,719 UART: [afmc] SUBJECT.KEYID = 7
14,177,885 UART: [afmc] AUTHORITY.KEYID = 5
16,719,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,445,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,447,724 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,463,703 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,479,651 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,495,602 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,516,878 UART: [afmc] --
18,520,205 UART: [cold-reset] --
18,523,416 UART: [state] Locking Datavault
18,527,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,528,902 UART: [state] Locking ICCM
18,530,940 UART: [exit] Launching FMC @ 0x40000000
18,539,281 UART:
18,539,512 UART: Running Caliptra FMC ...
18,540,613 UART:
18,540,771 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,542,421 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,095 UART:
192,518 UART: Running Caliptra ROM ...
193,632 UART:
193,777 UART: [state] CFI Enabled
264,634 UART: [state] LifecycleState = Unprovisioned
266,566 UART: [state] DebugLocked = No
268,827 UART: [state] WD Timer not started. Device not locked for debugging
272,152 UART: [kat] SHA2-256
451,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,846 UART: [kat] ++
463,385 UART: [kat] sha1
473,910 UART: [kat] SHA2-256
476,915 UART: [kat] SHA2-384
482,904 UART: [kat] SHA2-512-ACC
485,850 UART: [kat] ECC-384
2,947,782 UART: [kat] HMAC-384Kdf
2,971,679 UART: [kat] LMS
3,501,137 UART: [kat] --
3,506,834 UART: [cold-reset] ++
3,507,917 UART: [fht] FHT @ 0x50003400
3,517,354 UART: [idev] ++
3,517,920 UART: [idev] CDI.KEYID = 6
3,518,952 UART: [idev] SUBJECT.KEYID = 7
3,520,055 UART: [idev] UDS.KEYID = 0
3,520,981 ready_for_fw is high
3,521,173 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,655,570 UART: [idev] Erasing UDS.KEYID = 0
6,029,841 UART: [idev] Sha1 KeyId Algorithm
6,052,862 UART: [idev] --
6,057,288 UART: [ldev] ++
6,057,864 UART: [ldev] CDI.KEYID = 6
6,058,773 UART: [ldev] SUBJECT.KEYID = 5
6,060,152 UART: [ldev] AUTHORITY.KEYID = 7
6,061,356 UART: [ldev] FE.KEYID = 1
6,101,227 UART: [ldev] Erasing FE.KEYID = 1
8,604,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,925 UART: [ldev] --
10,413,010 UART: [fwproc] Wait for Commands...
10,415,922 UART: [fwproc] Recv command 0x46574c44
10,418,015 UART: [fwproc] Recv'd Img size: 106876 bytes
13,722,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,794,102 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,836,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,154,716 >>> mbox cmd response: success
14,155,642 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,159,110 UART: [afmc] ++
14,159,712 UART: [afmc] CDI.KEYID = 6
14,160,601 UART: [afmc] SUBJECT.KEYID = 7
14,161,842 UART: [afmc] AUTHORITY.KEYID = 5
16,702,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,682 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,668 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,593 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,474,600 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,124 UART: [afmc] --
18,500,835 UART: [cold-reset] --
18,504,542 UART: [state] Locking Datavault
18,509,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,067 UART: [state] Locking ICCM
18,512,248 UART: [exit] Launching FMC @ 0x40000000
18,520,648 UART:
18,520,895 UART: Running Caliptra FMC ...
18,521,996 UART:
18,522,175 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,523,743 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,361,332 ready_for_fw is high
3,361,725 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,947,337 >>> mbox cmd response: success
13,948,248 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,235,663 UART:
18,236,052 UART: Running Caliptra FMC ...
18,237,378 UART:
18,237,547 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,239,172 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,415 UART:
192,776 UART: Running Caliptra ROM ...
193,900 UART:
603,542 UART: [state] CFI Enabled
617,336 UART: [state] LifecycleState = Unprovisioned
619,211 UART: [state] DebugLocked = No
621,083 UART: [state] WD Timer not started. Device not locked for debugging
624,894 UART: [kat] SHA2-256
804,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,578 UART: [kat] ++
816,095 UART: [kat] sha1
825,833 UART: [kat] SHA2-256
828,858 UART: [kat] SHA2-384
835,484 UART: [kat] SHA2-512-ACC
838,484 UART: [kat] ECC-384
3,281,172 UART: [kat] HMAC-384Kdf
3,294,685 UART: [kat] LMS
3,824,130 UART: [kat] --
3,828,196 UART: [cold-reset] ++
3,830,340 UART: [fht] FHT @ 0x50003400
3,840,673 UART: [idev] ++
3,841,231 UART: [idev] CDI.KEYID = 6
3,842,208 UART: [idev] SUBJECT.KEYID = 7
3,843,374 UART: [idev] UDS.KEYID = 0
3,844,419 ready_for_fw is high
3,844,610 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,978,869 UART: [idev] Erasing UDS.KEYID = 0
6,310,541 UART: [idev] Sha1 KeyId Algorithm
6,333,170 UART: [idev] --
6,335,440 UART: [ldev] ++
6,336,016 UART: [ldev] CDI.KEYID = 6
6,336,929 UART: [ldev] SUBJECT.KEYID = 5
6,338,145 UART: [ldev] AUTHORITY.KEYID = 7
6,339,371 UART: [ldev] FE.KEYID = 1
6,349,849 UART: [ldev] Erasing FE.KEYID = 1
8,825,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,067 UART: [ldev] --
10,619,073 UART: [fwproc] Wait for Commands...
10,620,739 UART: [fwproc] Recv command 0x46574c44
10,622,834 UART: [fwproc] Recv'd Img size: 106876 bytes
13,940,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,216 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,055,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,374,477 >>> mbox cmd response: success
14,375,455 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,378,451 UART: [afmc] ++
14,379,050 UART: [afmc] CDI.KEYID = 6
14,380,121 UART: [afmc] SUBJECT.KEYID = 7
14,381,223 UART: [afmc] AUTHORITY.KEYID = 5
16,877,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,601,005 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,616,952 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,632,850 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,648,782 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,670,800 UART: [afmc] --
18,675,116 UART: [cold-reset] --
18,679,408 UART: [state] Locking Datavault
18,684,364 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,042 UART: [state] Locking ICCM
18,688,687 UART: [exit] Launching FMC @ 0x40000000
18,697,035 UART:
18,697,276 UART: Running Caliptra FMC ...
18,698,375 UART:
18,698,530 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,700,099 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,689,658 ready_for_fw is high
3,690,196 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,140,356 >>> mbox cmd response: success
14,141,371 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,390,389 UART:
18,390,790 UART: Running Caliptra FMC ...
18,391,930 UART:
18,392,085 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,393,784 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
920,898 UART: [kat] LMS
1,169,210 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 ready_for_fw is high
1,174,199 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,533 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,120 UART: [fwproc] Wait for Commands...
1,281,777 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,344 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,299 >>> mbox cmd response: success
2,673,299 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,400 UART: [afmc] ++
2,674,568 UART: [afmc] CDI.KEYID = 6
2,674,931 UART: [afmc] SUBJECT.KEYID = 7
2,675,357 UART: [afmc] AUTHORITY.KEYID = 5
2,710,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,128 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,848 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,741 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,434 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,267 UART: [afmc] --
2,754,389 UART: [cold-reset] --
2,755,307 UART: [state] Locking Datavault
2,756,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,184 UART: [state] Locking ICCM
2,757,770 UART: [exit] Launching FMC @ 0x40000000
2,763,067 UART:
2,763,083 UART: Running Caliptra FMC ...
2,763,491 UART:
2,763,629 UART: [fmc] Received command: 0x10000008
2,764,661 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,146 ready_for_fw is high
1,056,146 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,807 >>> mbox cmd response: success
2,524,807 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,586,816 UART:
2,586,832 UART: Running Caliptra FMC ...
2,587,240 UART:
2,587,378 UART: [fmc] Received command: 0x10000008
2,588,410 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,174,372 ready_for_fw is high
1,174,372 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,208,972 UART: [idev] --
1,210,051 UART: [ldev] ++
1,210,219 UART: [ldev] CDI.KEYID = 6
1,210,583 UART: [ldev] SUBJECT.KEYID = 5
1,211,010 UART: [ldev] AUTHORITY.KEYID = 7
1,211,473 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,273 UART: [fwproc] Wait for Commands...
1,282,898 UART: [fwproc] Recv command 0x46574c44
1,283,631 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,575 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,468 >>> mbox cmd response: success
2,676,468 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,673 UART: [afmc] ++
2,677,841 UART: [afmc] CDI.KEYID = 6
2,678,204 UART: [afmc] SUBJECT.KEYID = 7
2,678,630 UART: [afmc] AUTHORITY.KEYID = 5
2,713,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,813 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,533 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,426 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,119 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,824 UART: [afmc] --
2,756,768 UART: [cold-reset] --
2,757,780 UART: [state] Locking Datavault
2,758,861 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,465 UART: [state] Locking ICCM
2,760,007 UART: [exit] Launching FMC @ 0x40000000
2,765,304 UART:
2,765,320 UART: Running Caliptra FMC ...
2,765,728 UART:
2,765,866 UART: [fmc] Received command: 0x10000008
2,766,898 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,823 ready_for_fw is high
1,055,823 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,880 >>> mbox cmd response: success
2,523,880 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,586,071 UART:
2,586,087 UART: Running Caliptra FMC ...
2,586,495 UART:
2,586,633 UART: [fmc] Received command: 0x10000008
2,587,665 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,120 UART: [kat] SHA2-256
890,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,799 UART: [kat] ++
894,951 UART: [kat] sha1
899,269 UART: [kat] SHA2-256
901,209 UART: [kat] SHA2-384
903,882 UART: [kat] SHA2-512-ACC
905,783 UART: [kat] ECC-384
915,482 UART: [kat] HMAC-384Kdf
919,988 UART: [kat] LMS
1,168,300 UART: [kat] --
1,168,993 UART: [cold-reset] ++
1,169,389 UART: [fht] FHT @ 0x50003400
1,171,975 UART: [idev] ++
1,172,143 UART: [idev] CDI.KEYID = 6
1,172,504 UART: [idev] SUBJECT.KEYID = 7
1,172,929 UART: [idev] UDS.KEYID = 0
1,173,275 ready_for_fw is high
1,173,275 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,180,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,061 UART: [idev] Sha1 KeyId Algorithm
1,206,877 UART: [idev] --
1,208,028 UART: [ldev] ++
1,208,196 UART: [ldev] CDI.KEYID = 6
1,208,560 UART: [ldev] SUBJECT.KEYID = 5
1,208,987 UART: [ldev] AUTHORITY.KEYID = 7
1,209,450 UART: [ldev] FE.KEYID = 1
1,214,768 UART: [ldev] Erasing FE.KEYID = 1
1,241,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,604 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x46574c44
1,281,948 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,630 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,481 >>> mbox cmd response: success
2,673,481 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,614 UART: [afmc] ++
2,674,782 UART: [afmc] CDI.KEYID = 6
2,675,145 UART: [afmc] SUBJECT.KEYID = 7
2,675,571 UART: [afmc] AUTHORITY.KEYID = 5
2,710,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,848 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,568 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,461 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,154 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,151 UART: [afmc] --
2,754,131 UART: [cold-reset] --
2,755,227 UART: [state] Locking Datavault
2,756,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,154 UART: [state] Locking ICCM
2,757,630 UART: [exit] Launching FMC @ 0x40000000
2,762,927 UART:
2,762,943 UART: Running Caliptra FMC ...
2,763,351 UART:
2,763,489 UART: [fmc] Received command: 0x10000008
2,764,521 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,748 ready_for_fw is high
1,055,748 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,007 >>> mbox cmd response: success
2,523,007 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,584,716 UART:
2,584,732 UART: Running Caliptra FMC ...
2,585,140 UART:
2,585,278 UART: [fmc] Received command: 0x10000008
2,586,310 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 ready_for_fw is high
1,174,144 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,395 UART: [ldev] ++
1,209,563 UART: [ldev] CDI.KEYID = 6
1,209,927 UART: [ldev] SUBJECT.KEYID = 5
1,210,354 UART: [ldev] AUTHORITY.KEYID = 7
1,210,817 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,401 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,901 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,760 >>> mbox cmd response: success
2,676,760 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,979 UART: [afmc] ++
2,678,147 UART: [afmc] CDI.KEYID = 6
2,678,510 UART: [afmc] SUBJECT.KEYID = 7
2,678,936 UART: [afmc] AUTHORITY.KEYID = 5
2,715,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,731,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,732,627 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,738,347 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,744,240 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,933 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,866 UART: [afmc] --
2,758,922 UART: [cold-reset] --
2,759,864 UART: [state] Locking Datavault
2,761,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,761,621 UART: [state] Locking ICCM
2,762,277 UART: [exit] Launching FMC @ 0x40000000
2,767,574 UART:
2,767,590 UART: Running Caliptra FMC ...
2,767,998 UART:
2,768,136 UART: [fmc] Received command: 0x10000008
2,769,168 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,505 ready_for_fw is high
1,056,505 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,608 >>> mbox cmd response: success
2,525,608 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,588,127 UART:
2,588,143 UART: Running Caliptra FMC ...
2,588,551 UART:
2,588,689 UART: [fmc] Received command: 0x10000008
2,589,721 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,199,415 UART: [idev] Sha1 KeyId Algorithm
1,208,267 UART: [idev] --
1,209,362 UART: [ldev] ++
1,209,530 UART: [ldev] CDI.KEYID = 6
1,209,894 UART: [ldev] SUBJECT.KEYID = 5
1,210,321 UART: [ldev] AUTHORITY.KEYID = 7
1,210,784 UART: [ldev] FE.KEYID = 1
1,216,138 UART: [ldev] Erasing FE.KEYID = 1
1,242,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,042 UART: [ldev] --
1,281,372 UART: [fwproc] Wait for Commands...
1,282,143 UART: [fwproc] Recv command 0x46574c44
1,282,876 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,926 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,833 >>> mbox cmd response: success
2,675,833 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,068 UART: [afmc] ++
2,677,236 UART: [afmc] CDI.KEYID = 6
2,677,599 UART: [afmc] SUBJECT.KEYID = 7
2,678,025 UART: [afmc] AUTHORITY.KEYID = 5
2,713,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,784 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,504 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,397 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,090 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,075 UART: [afmc] --
2,757,091 UART: [cold-reset] --
2,757,811 UART: [state] Locking Datavault
2,759,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,624 UART: [state] Locking ICCM
2,760,228 UART: [exit] Launching FMC @ 0x40000000
2,765,525 UART:
2,765,541 UART: Running Caliptra FMC ...
2,765,949 UART:
2,766,087 UART: [fmc] Received command: 0x10000008
2,767,119 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,758 ready_for_fw is high
1,055,758 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,745 >>> mbox cmd response: success
2,523,745 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,586,506 UART:
2,586,522 UART: Running Caliptra FMC ...
2,586,930 UART:
2,587,068 UART: [fmc] Received command: 0x10000008
2,588,100 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 ready_for_fw is high
1,174,604 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,688 UART: [idev] Erasing UDS.KEYID = 0
1,200,174 UART: [idev] Sha1 KeyId Algorithm
1,209,108 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,815 UART: [ldev] SUBJECT.KEYID = 5
1,211,242 UART: [ldev] AUTHORITY.KEYID = 7
1,211,705 UART: [ldev] FE.KEYID = 1
1,217,167 UART: [ldev] Erasing FE.KEYID = 1
1,243,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,505 UART: [ldev] --
1,282,775 UART: [fwproc] Wait for Commands...
1,283,542 UART: [fwproc] Recv command 0x46574c44
1,284,275 UART: [fwproc] Recv'd Img size: 106876 bytes
2,495,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,570 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,676,637 >>> mbox cmd response: success
2,676,637 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,677,864 UART: [afmc] ++
2,678,032 UART: [afmc] CDI.KEYID = 6
2,678,395 UART: [afmc] SUBJECT.KEYID = 7
2,678,821 UART: [afmc] AUTHORITY.KEYID = 5
2,714,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,700 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,737,420 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,743,313 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,749,006 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,757,035 UART: [afmc] --
2,758,059 UART: [cold-reset] --
2,758,781 UART: [state] Locking Datavault
2,759,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,760,592 UART: [state] Locking ICCM
2,761,116 UART: [exit] Launching FMC @ 0x40000000
2,766,413 UART:
2,766,429 UART: Running Caliptra FMC ...
2,766,837 UART:
2,766,975 UART: [fmc] Received command: 0x10000008
2,768,007 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,817 ready_for_fw is high
1,056,817 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,314 >>> mbox cmd response: success
2,525,314 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,587,141 UART:
2,587,157 UART: Running Caliptra FMC ...
2,587,565 UART:
2,587,703 UART: [fmc] Received command: 0x10000008
2,588,735 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,020 UART:
192,393 UART: Running Caliptra ROM ...
193,689 UART:
193,843 UART: [state] CFI Enabled
262,512 UART: [state] LifecycleState = Unprovisioned
264,895 UART: [state] DebugLocked = No
267,352 UART: [state] WD Timer not started. Device not locked for debugging
271,652 UART: [kat] SHA2-256
453,601 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,764 UART: ROM integrity test failed
466,046 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 41856
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48448
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,462 UART:
192,842 UART: Running Caliptra ROM ...
193,960 UART:
603,760 UART: [state] CFI Enabled
616,222 UART: [state] LifecycleState = Unprovisioned
618,580 UART: [state] DebugLocked = No
620,680 UART: [state] WD Timer not started. Device not locked for debugging
626,052 UART: [kat] SHA2-256
808,021 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,191 UART: ROM integrity test failed
820,480 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 41856
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,273 UART:
192,632 UART: Running Caliptra ROM ...
193,806 UART:
193,956 UART: [state] CFI Enabled
261,727 UART: [state] LifecycleState = Unprovisioned
263,610 UART: [state] DebugLocked = No
265,663 UART: [state] WD Timer not started. Device not locked for debugging
268,683 UART: [kat] SHA2-256
447,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,388 UART: ROM integrity test failed
460,548 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,247 UART:
192,590 UART: Running Caliptra ROM ...
193,763 UART:
193,912 UART: [state] CFI Enabled
260,694 UART: [state] LifecycleState = Unprovisioned
262,599 UART: [state] DebugLocked = No
264,704 UART: [state] WD Timer not started. Device not locked for debugging
268,935 UART: [kat] SHA2-256
448,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,090 UART: ROM integrity test failed
460,311 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,379 UART:
192,755 UART: Running Caliptra ROM ...
193,847 UART:
603,660 UART: [state] CFI Enabled
618,735 UART: [state] LifecycleState = Unprovisioned
620,592 UART: [state] DebugLocked = No
623,116 UART: [state] WD Timer not started. Device not locked for debugging
626,200 UART: [kat] SHA2-256
805,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,312 UART: ROM integrity test failed
817,597 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,921 UART: ROM integrity test failed
895,368 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "835fc4d11bf138381821fcdf3690a9ad54bcb19c50d59b24c392d3fc3f2ef66c34c32bbd3e51cca2ef07c0898f7c3410",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: ROM integrity test failed
896,365 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "835fc4d11bf138381821fcdf3690a9ad54bcb19c50d59b24c392d3fc3f2ef66c34c32bbd3e51cca2ef07c0898f7c3410",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: ROM integrity test failed
895,844 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "835fc4d11bf138381821fcdf3690a9ad54bcb19c50d59b24c392d3fc3f2ef66c34c32bbd3e51cca2ef07c0898f7c3410",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,367 UART: [kat] SHA2-256
891,917 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: ROM integrity test failed
896,335 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "835fc4d11bf138381821fcdf3690a9ad54bcb19c50d59b24c392d3fc3f2ef66c34c32bbd3e51cca2ef07c0898f7c3410",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: ROM integrity test failed
895,296 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "835fc4d11bf138381821fcdf3690a9ad54bcb19c50d59b24c392d3fc3f2ef66c34c32bbd3e51cca2ef07c0898f7c3410",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: ROM integrity test failed
896,225 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "835fc4d11bf138381821fcdf3690a9ad54bcb19c50d59b24c392d3fc3f2ef66c34c32bbd3e51cca2ef07c0898f7c3410",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,041 UART:
192,398 UART: Running Caliptra ROM ...
193,491 UART:
193,630 UART: [state] CFI Enabled
266,519 UART: [state] LifecycleState = Unprovisioned
268,927 UART: [state] DebugLocked = No
271,012 UART: [state] WD Timer not started. Device not locked for debugging
276,339 UART: [kat] SHA2-256
458,300 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,800 UART: [kat] ++
470,242 UART: [kat] sha1
480,827 UART: [kat] SHA2-256
483,836 UART: [kat] SHA2-384
489,326 UART: [kat] SHA2-512-ACC
491,974 UART: [kat] ECC-384
3,776,988 UART: [kat] HMAC-384Kdf
3,803,725 UART: [kat] LMS
4,876,910 UART: [kat] --
4,881,477 UART: [cold-reset] ++
4,882,987 UART: [fht] FHT @ 0x50003400
4,893,749 UART: [idev] ++
4,894,309 UART: [idev] CDI.KEYID = 6
4,895,554 UART: [idev] SUBJECT.KEYID = 7
4,896,668 UART: [idev] UDS.KEYID = 0
4,897,563 ready_for_fw is high
4,897,748 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,038,873 UART: [idev] Erasing UDS.KEYID = 0
8,226,706 UART: [idev] Sha1 KeyId Algorithm
8,249,239 UART: [idev] --
8,253,235 UART: [ldev] ++
8,253,806 UART: [ldev] CDI.KEYID = 6
8,255,057 UART: [ldev] SUBJECT.KEYID = 5
8,256,169 UART: [ldev] AUTHORITY.KEYID = 7
8,257,394 UART: [ldev] FE.KEYID = 1
8,297,698 UART: [ldev] Erasing FE.KEYID = 1
11,634,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,947,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,963,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,979,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,995,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,016,853 UART: [ldev] --
14,020,724 UART: [fwproc] Wait for Commands...
14,023,778 UART: [fwproc] Recv command 0x46574c44
14,026,044 UART: [fwproc] Recv'd Img size: 111600 bytes
18,069,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,147,217 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,207,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,524,535 >>> mbox cmd response: success
18,528,249 UART: [afmc] ++
18,528,858 UART: [afmc] CDI.KEYID = 6
18,530,054 UART: [afmc] SUBJECT.KEYID = 7
18,531,168 UART: [afmc] AUTHORITY.KEYID = 5
21,887,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,185,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,187,802 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,203,947 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,220,080 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,235,880 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,258,051 UART: [afmc] --
24,263,125 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,403,681 UART: [cold-reset] --
24,404,539 UART: [state] Locking Datavault
24,405,610 UART: [state] Locking PCR0, PCR1 and PCR31
24,407,160 UART: [state] Locking ICCM
24,408,038 UART: [exit] Launching FMC @ 0x40000000
24,409,378 UART:
24,409,527 UART: Running Caliptra FMC ...
24,410,621 UART:
24,410,776 UART: [fmc] Received command: 0x46574C44
24,412,148 UART:
24,412,291 UART: Running Caliptra ROM ...
24,413,331 UART:
24,413,476 UART: [state] CFI Enabled
24,481,702 UART: [state] LifecycleState = Unprovisioned
24,483,582 UART: [state] DebugLocked = No
24,485,373 UART: [state] WD Timer not started. Device not locked for debugging
24,489,827 UART: [kat] SHA2-256
24,671,742 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,683,290 UART: [kat] ++
24,683,778 UART: [kat] sha1
24,694,287 UART: [kat] SHA2-256
24,697,300 UART: [kat] SHA2-384
24,702,795 UART: [kat] SHA2-512-ACC
24,705,419 UART: [kat] ECC-384
27,992,269 UART: [kat] HMAC-384Kdf
28,018,114 UART: [kat] LMS
29,091,270 UART: [kat] --
29,095,016 UART: [update-reset] ++
33,170,331 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,173,165 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,546,471 >>> mbox cmd response: success
33,548,038 UART: [update-reset] Copying MAN_2 To MAN_1
33,570,920 UART: [update-reset Success] --
33,572,565 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,574,570 UART: [state] Locking Datavault
33,578,601 UART: [state] Locking PCR0, PCR1 and PCR31
33,580,301 UART: [state] Locking ICCM
33,582,561 UART: [exit] Launching FMC @ 0x40000000
33,591,181 UART:
33,591,469 UART: Running Caliptra FMC ...
33,592,499 UART:
33,592,649 UART: [fmc] Received command: 0x1000000D
33,594,163 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
4,782,384 ready_for_fw is high
4,782,949 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,303,003 >>> mbox cmd response: success
23,975,562 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,116,243 UART:
24,116,627 UART: Running Caliptra FMC ...
24,117,761 UART:
24,117,914 UART: [fmc] Received command: 0x46574C44
33,144,255 >>> mbox cmd response: success
33,165,856 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,176,689 UART:
33,176,944 UART: Running Caliptra FMC ...
33,178,031 UART:
33,178,184 UART: [fmc] Received command: 0x1000000D
33,179,706 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,310 UART:
192,675 UART: Running Caliptra ROM ...
193,866 UART:
603,437 UART: [state] CFI Enabled
617,885 UART: [state] LifecycleState = Unprovisioned
620,200 UART: [state] DebugLocked = No
622,481 UART: [state] WD Timer not started. Device not locked for debugging
627,808 UART: [kat] SHA2-256
809,815 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,307 UART: [kat] ++
821,840 UART: [kat] sha1
832,350 UART: [kat] SHA2-256
835,418 UART: [kat] SHA2-384
841,611 UART: [kat] SHA2-512-ACC
844,192 UART: [kat] ECC-384
4,100,304 UART: [kat] HMAC-384Kdf
4,111,827 UART: [kat] LMS
5,184,946 UART: [kat] --
5,190,700 UART: [cold-reset] ++
5,191,931 UART: [fht] FHT @ 0x50003400
5,202,408 UART: [idev] ++
5,203,117 UART: [idev] CDI.KEYID = 6
5,204,357 UART: [idev] SUBJECT.KEYID = 7
5,205,807 UART: [idev] UDS.KEYID = 0
5,206,991 ready_for_fw is high
5,207,199 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,347,990 UART: [idev] Erasing UDS.KEYID = 0
8,498,782 UART: [idev] Sha1 KeyId Algorithm
8,521,214 UART: [idev] --
8,524,291 UART: [ldev] ++
8,524,855 UART: [ldev] CDI.KEYID = 6
8,526,084 UART: [ldev] SUBJECT.KEYID = 5
8,527,514 UART: [ldev] AUTHORITY.KEYID = 7
8,529,063 UART: [ldev] FE.KEYID = 1
8,540,852 UART: [ldev] Erasing FE.KEYID = 1
11,830,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,294 UART: [ldev] --
14,196,176 UART: [fwproc] Wait for Commands...
14,197,908 UART: [fwproc] Recv command 0x46574c44
14,200,213 UART: [fwproc] Recv'd Img size: 111600 bytes
18,246,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,315,069 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,375,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,691,599 >>> mbox cmd response: success
18,695,514 UART: [afmc] ++
18,696,125 UART: [afmc] CDI.KEYID = 6
18,697,310 UART: [afmc] SUBJECT.KEYID = 7
18,698,464 UART: [afmc] AUTHORITY.KEYID = 5
22,014,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,309,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,311,574 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,327,763 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,343,856 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,359,668 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,382,310 UART: [afmc] --
24,387,389 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,528,379 UART: [cold-reset] --
24,529,256 UART: [state] Locking Datavault
24,530,328 UART: [state] Locking PCR0, PCR1 and PCR31
24,531,862 UART: [state] Locking ICCM
24,532,733 UART: [exit] Launching FMC @ 0x40000000
24,534,065 UART:
24,534,209 UART: Running Caliptra FMC ...
24,535,303 UART:
24,535,453 UART: [fmc] Received command: 0x46574C44
24,536,912 UART:
24,537,061 UART: Running Caliptra ROM ...
24,538,161 UART:
24,538,311 UART: [state] CFI Enabled
24,545,679 UART: [state] LifecycleState = Unprovisioned
24,547,566 UART: [state] DebugLocked = No
24,549,896 UART: [state] WD Timer not started. Device not locked for debugging
24,555,100 UART: [kat] SHA2-256
24,737,051 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,748,611 UART: [kat] ++
24,749,060 UART: [kat] sha1
24,758,702 UART: [kat] SHA2-256
24,761,768 UART: [kat] SHA2-384
24,767,635 UART: [kat] SHA2-512-ACC
24,770,263 UART: [kat] ECC-384
28,027,485 UART: [kat] HMAC-384Kdf
28,039,352 UART: [kat] LMS
29,112,492 UART: [kat] --
29,118,026 UART: [update-reset] ++
33,183,076 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,186,188 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,559,501 >>> mbox cmd response: success
33,561,148 UART: [update-reset] Copying MAN_2 To MAN_1
33,583,997 UART: [update-reset Success] --
33,585,674 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,589,948 UART: [state] Locking Datavault
33,593,962 UART: [state] Locking PCR0, PCR1 and PCR31
33,595,657 UART: [state] Locking ICCM
33,596,940 UART: [exit] Launching FMC @ 0x40000000
33,605,556 UART:
33,605,782 UART: Running Caliptra FMC ...
33,606,873 UART:
33,607,021 UART: [fmc] Received command: 0x1000000D
33,608,533 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
5,102,153 ready_for_fw is high
5,102,686 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,499,414 >>> mbox cmd response: success
24,117,682 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,258,374 UART:
24,258,773 UART: Running Caliptra FMC ...
24,259,896 UART:
24,260,040 UART: [fmc] Received command: 0x46574C44
33,184,809 >>> mbox cmd response: success
33,206,371 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,218,206 UART:
33,218,462 UART: Running Caliptra FMC ...
33,219,642 UART:
33,219,795 UART: [fmc] Received command: 0x1000000D
33,221,309 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,204 UART:
192,560 UART: Running Caliptra ROM ...
193,749 UART:
193,905 UART: [state] CFI Enabled
264,129 UART: [state] LifecycleState = Unprovisioned
266,056 UART: [state] DebugLocked = No
267,742 UART: [state] WD Timer not started. Device not locked for debugging
271,074 UART: [kat] SHA2-256
450,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,785 UART: [kat] ++
462,329 UART: [kat] sha1
472,381 UART: [kat] SHA2-256
475,395 UART: [kat] SHA2-384
481,315 UART: [kat] SHA2-512-ACC
484,252 UART: [kat] ECC-384
2,946,805 UART: [kat] HMAC-384Kdf
2,971,695 UART: [kat] LMS
3,501,138 UART: [kat] --
3,504,878 UART: [cold-reset] ++
3,507,314 UART: [fht] FHT @ 0x50003400
3,517,796 UART: [idev] ++
3,518,364 UART: [idev] CDI.KEYID = 6
3,519,254 UART: [idev] SUBJECT.KEYID = 7
3,520,500 UART: [idev] UDS.KEYID = 0
3,521,427 ready_for_fw is high
3,521,622 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,662,527 UART: [idev] Erasing UDS.KEYID = 0
6,027,607 UART: [idev] Sha1 KeyId Algorithm
6,050,636 UART: [idev] --
6,054,205 UART: [ldev] ++
6,054,780 UART: [ldev] CDI.KEYID = 6
6,055,669 UART: [ldev] SUBJECT.KEYID = 5
6,056,962 UART: [ldev] AUTHORITY.KEYID = 7
6,058,105 UART: [ldev] FE.KEYID = 1
6,102,076 UART: [ldev] Erasing FE.KEYID = 1
8,609,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,813 UART: [ldev] --
10,415,917 UART: [fwproc] Wait for Commands...
10,418,284 UART: [fwproc] Recv command 0x46574c44
10,420,397 UART: [fwproc] Recv'd Img size: 111944 bytes
13,786,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,853,833 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,914,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,231,379 >>> mbox cmd response: success
14,235,962 UART: [afmc] ++
14,236,582 UART: [afmc] CDI.KEYID = 6
14,237,498 UART: [afmc] SUBJECT.KEYID = 7
14,238,660 UART: [afmc] AUTHORITY.KEYID = 5
16,765,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,491,975 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,508,019 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,524,056 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,539,762 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,561,219 UART: [afmc] --
18,566,981 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,708,070 UART: [cold-reset] --
18,708,946 UART: [state] Locking Datavault
18,710,109 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,660 UART: [state] Locking ICCM
18,712,566 UART: [exit] Launching FMC @ 0x40000000
18,713,996 UART:
18,714,155 UART: Running Caliptra FMC ...
18,715,254 UART:
18,715,410 UART: [fmc] Received command: 0x46574C44
18,716,872 UART:
18,717,025 UART: Running Caliptra ROM ...
18,718,127 UART:
18,718,281 UART: [state] CFI Enabled
18,782,882 UART: [state] LifecycleState = Unprovisioned
18,784,752 UART: [state] DebugLocked = No
18,786,239 UART: [state] WD Timer not started. Device not locked for debugging
18,789,935 UART: [kat] SHA2-256
18,969,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,980,628 UART: [kat] ++
18,981,083 UART: [kat] sha1
18,991,589 UART: [kat] SHA2-256
18,994,613 UART: [kat] SHA2-384
19,000,552 UART: [kat] SHA2-512-ACC
19,003,502 UART: [kat] ECC-384
21,466,279 UART: [kat] HMAC-384Kdf
21,490,279 UART: [kat] LMS
22,019,741 UART: [kat] --
22,023,752 UART: [update-reset] ++
25,428,397 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,431,943 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,806,465 >>> mbox cmd response: success
25,808,216 UART: [update-reset] Copying MAN_2 To MAN_1
25,830,551 UART: [update-reset Success] --
25,831,855 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,834,186 UART: [state] Locking Datavault
25,838,410 UART: [state] Locking PCR0, PCR1 and PCR31
25,840,114 UART: [state] Locking ICCM
25,841,183 UART: [exit] Launching FMC @ 0x40000000
25,849,583 UART:
25,849,820 UART: Running Caliptra FMC ...
25,850,919 UART:
25,851,074 UART: [fmc] Received command: 0x1000000D
25,852,592 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,066 UART:
192,444 UART: Running Caliptra ROM ...
193,630 UART:
193,799 UART: [state] CFI Enabled
261,450 UART: [state] LifecycleState = Unprovisioned
263,360 UART: [state] DebugLocked = No
264,564 UART: [state] WD Timer not started. Device not locked for debugging
268,108 UART: [kat] SHA2-256
447,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,826 UART: [kat] ++
459,352 UART: [kat] sha1
469,755 UART: [kat] SHA2-256
472,822 UART: [kat] SHA2-384
479,176 UART: [kat] SHA2-512-ACC
482,108 UART: [kat] ECC-384
2,925,729 UART: [kat] HMAC-384Kdf
2,949,782 UART: [kat] LMS
3,479,232 UART: [kat] --
3,484,359 UART: [cold-reset] ++
3,485,606 UART: [fht] FHT @ 0x50003400
3,497,233 UART: [idev] ++
3,497,798 UART: [idev] CDI.KEYID = 6
3,498,719 UART: [idev] SUBJECT.KEYID = 7
3,499,892 UART: [idev] UDS.KEYID = 0
3,500,830 ready_for_fw is high
3,501,011 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,641,793 UART: [idev] Erasing UDS.KEYID = 0
6,004,608 UART: [idev] Sha1 KeyId Algorithm
6,028,548 UART: [idev] --
6,033,136 UART: [ldev] ++
6,033,720 UART: [ldev] CDI.KEYID = 6
6,034,604 UART: [ldev] SUBJECT.KEYID = 5
6,035,772 UART: [ldev] AUTHORITY.KEYID = 7
6,037,008 UART: [ldev] FE.KEYID = 1
6,078,292 UART: [ldev] Erasing FE.KEYID = 1
8,581,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,699 UART: [ldev] --
10,392,435 UART: [fwproc] Wait for Commands...
10,393,935 UART: [fwproc] Recv command 0x46574c44
10,396,026 UART: [fwproc] Recv'd Img size: 111944 bytes
13,755,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,825,149 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,885,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,202,786 >>> mbox cmd response: success
14,207,411 UART: [afmc] ++
14,208,023 UART: [afmc] CDI.KEYID = 6
14,208,943 UART: [afmc] SUBJECT.KEYID = 7
14,210,122 UART: [afmc] AUTHORITY.KEYID = 5
16,744,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,468,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,470,521 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,486,576 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,502,653 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,518,307 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,541,605 UART: [afmc] --
18,546,228 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,687,153 UART: [cold-reset] --
18,688,019 UART: [state] Locking Datavault
18,689,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,690,721 UART: [state] Locking ICCM
18,691,632 UART: [exit] Launching FMC @ 0x40000000
18,693,055 UART:
18,693,219 UART: Running Caliptra FMC ...
18,694,338 UART:
18,694,495 UART: [fmc] Received command: 0x46574C44
18,695,956 UART:
18,696,110 UART: Running Caliptra ROM ...
18,697,208 UART:
18,697,360 UART: [state] CFI Enabled
18,757,271 UART: [state] LifecycleState = Unprovisioned
18,759,149 UART: [state] DebugLocked = No
18,760,810 UART: [state] WD Timer not started. Device not locked for debugging
18,765,260 UART: [kat] SHA2-256
18,944,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,956,002 UART: [kat] ++
18,956,546 UART: [kat] sha1
18,966,572 UART: [kat] SHA2-256
18,969,594 UART: [kat] SHA2-384
18,975,524 UART: [kat] SHA2-512-ACC
18,978,486 UART: [kat] ECC-384
21,442,960 UART: [kat] HMAC-384Kdf
21,465,938 UART: [kat] LMS
21,995,387 UART: [kat] --
21,998,692 UART: [update-reset] ++
25,394,891 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,399,127 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,773,651 >>> mbox cmd response: success
25,775,442 UART: [update-reset] Copying MAN_2 To MAN_1
25,797,776 UART: [update-reset Success] --
25,799,097 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,802,408 UART: [state] Locking Datavault
25,805,879 UART: [state] Locking PCR0, PCR1 and PCR31
25,807,523 UART: [state] Locking ICCM
25,809,218 UART: [exit] Launching FMC @ 0x40000000
25,817,620 UART:
25,817,883 UART: Running Caliptra FMC ...
25,818,993 UART:
25,819,146 UART: [fmc] Received command: 0x1000000D
25,820,661 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
3,373,858 ready_for_fw is high
3,374,256 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,017,215 >>> mbox cmd response: success
18,301,091 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,442,206 UART:
18,442,594 UART: Running Caliptra FMC ...
18,443,707 UART:
18,443,858 UART: [fmc] Received command: 0x46574C44
25,399,122 >>> mbox cmd response: success
25,420,865 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,433,650 UART:
25,433,895 UART: Running Caliptra FMC ...
25,434,976 UART:
25,435,126 UART: [fmc] Received command: 0x1000000D
25,436,645 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,451 UART:
192,808 UART: Running Caliptra ROM ...
193,992 UART:
603,700 UART: [state] CFI Enabled
613,367 UART: [state] LifecycleState = Unprovisioned
615,250 UART: [state] DebugLocked = No
618,083 UART: [state] WD Timer not started. Device not locked for debugging
621,738 UART: [kat] SHA2-256
800,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,477 UART: [kat] ++
813,017 UART: [kat] sha1
824,686 UART: [kat] SHA2-256
827,693 UART: [kat] SHA2-384
834,463 UART: [kat] SHA2-512-ACC
837,411 UART: [kat] ECC-384
3,278,440 UART: [kat] HMAC-384Kdf
3,291,395 UART: [kat] LMS
3,820,862 UART: [kat] --
3,824,077 UART: [cold-reset] ++
3,826,505 UART: [fht] FHT @ 0x50003400
3,835,984 UART: [idev] ++
3,836,541 UART: [idev] CDI.KEYID = 6
3,837,451 UART: [idev] SUBJECT.KEYID = 7
3,838,625 UART: [idev] UDS.KEYID = 0
3,839,670 ready_for_fw is high
3,839,876 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,980,524 UART: [idev] Erasing UDS.KEYID = 0
6,312,289 UART: [idev] Sha1 KeyId Algorithm
6,335,563 UART: [idev] --
6,339,653 UART: [ldev] ++
6,340,245 UART: [ldev] CDI.KEYID = 6
6,341,154 UART: [ldev] SUBJECT.KEYID = 5
6,342,306 UART: [ldev] AUTHORITY.KEYID = 7
6,343,585 UART: [ldev] FE.KEYID = 1
6,352,610 UART: [ldev] Erasing FE.KEYID = 1
8,824,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,401 UART: [ldev] --
10,614,902 UART: [fwproc] Wait for Commands...
10,617,372 UART: [fwproc] Recv command 0x46574c44
10,619,506 UART: [fwproc] Recv'd Img size: 111944 bytes
13,986,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,063,877 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,124,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,442,723 >>> mbox cmd response: success
14,447,720 UART: [afmc] ++
14,448,330 UART: [afmc] CDI.KEYID = 6
14,449,211 UART: [afmc] SUBJECT.KEYID = 7
14,450,313 UART: [afmc] AUTHORITY.KEYID = 5
16,951,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,671,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,672,874 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,688,961 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,704,986 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,720,706 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,744,718 UART: [afmc] --
18,750,136 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,891,220 UART: [cold-reset] --
18,892,087 UART: [state] Locking Datavault
18,893,260 UART: [state] Locking PCR0, PCR1 and PCR31
18,894,792 UART: [state] Locking ICCM
18,895,697 UART: [exit] Launching FMC @ 0x40000000
18,897,115 UART:
18,897,271 UART: Running Caliptra FMC ...
18,898,365 UART:
18,898,516 UART: [fmc] Received command: 0x46574C44
18,899,968 UART:
18,900,118 UART: Running Caliptra ROM ...
18,901,211 UART:
18,901,362 UART: [state] CFI Enabled
18,909,945 UART: [state] LifecycleState = Unprovisioned
18,911,821 UART: [state] DebugLocked = No
18,914,220 UART: [state] WD Timer not started. Device not locked for debugging
18,918,327 UART: [kat] SHA2-256
19,097,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,109,085 UART: [kat] ++
19,109,624 UART: [kat] sha1
19,120,780 UART: [kat] SHA2-256
19,123,839 UART: [kat] SHA2-384
19,130,300 UART: [kat] SHA2-512-ACC
19,133,244 UART: [kat] ECC-384
21,573,803 UART: [kat] HMAC-384Kdf
21,587,269 UART: [kat] LMS
22,116,774 UART: [kat] --
22,120,920 UART: [update-reset] ++
25,510,514 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,514,219 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,888,730 >>> mbox cmd response: success
25,889,867 UART: [update-reset] Copying MAN_2 To MAN_1
25,912,242 UART: [update-reset Success] --
25,913,542 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,916,591 UART: [state] Locking Datavault
25,919,196 UART: [state] Locking PCR0, PCR1 and PCR31
25,920,841 UART: [state] Locking ICCM
25,922,043 UART: [exit] Launching FMC @ 0x40000000
25,930,490 UART:
25,930,719 UART: Running Caliptra FMC ...
25,931,742 UART:
25,931,885 UART: [fmc] Received command: 0x1000000D
25,933,395 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,697,661 ready_for_fw is high
3,698,119 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,236,009 >>> mbox cmd response: success
18,471,415 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,612,678 UART:
18,613,071 UART: Running Caliptra FMC ...
18,614,279 UART:
18,614,455 UART: [fmc] Received command: 0x46574C44
25,478,950 >>> mbox cmd response: success
25,500,602 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,516,046 UART:
25,516,297 UART: Running Caliptra FMC ...
25,517,467 UART:
25,517,630 UART: [fmc] Received command: 0x1000000D
25,519,148 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,065 UART: [idev] ++
1,173,233 UART: [idev] CDI.KEYID = 6
1,173,594 UART: [idev] SUBJECT.KEYID = 7
1,174,019 UART: [idev] UDS.KEYID = 0
1,174,365 ready_for_fw is high
1,174,365 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,743 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,700 UART: [fwproc] Wait for Commands...
1,281,383 UART: [fwproc] Recv command 0x46574c44
1,282,116 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,973 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,470 >>> mbox cmd response: success
2,741,729 UART: [afmc] ++
2,741,897 UART: [afmc] CDI.KEYID = 6
2,742,260 UART: [afmc] SUBJECT.KEYID = 7
2,742,686 UART: [afmc] AUTHORITY.KEYID = 5
2,777,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,396 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,092 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,991 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,684 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,444 UART: [afmc] --
2,821,352 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,374 UART: [cold-reset] --
2,822,084 UART: [state] Locking Datavault
2,823,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,897 UART: [state] Locking ICCM
2,824,399 UART: [exit] Launching FMC @ 0x40000000
2,829,696 UART:
2,829,712 UART: Running Caliptra FMC ...
2,830,120 UART:
2,830,350 UART: [fmc] Received command: 0x46574C44
2,831,176 UART:
2,831,192 UART: Running Caliptra ROM ...
2,831,600 UART:
2,831,655 UART: [state] CFI Enabled
2,834,305 UART: [state] LifecycleState = Unprovisioned
2,834,960 UART: [state] DebugLocked = No
2,835,476 UART: [state] WD Timer not started. Device not locked for debugging
2,836,610 UART: [kat] SHA2-256
3,640,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,289 UART: [kat] ++
3,644,441 UART: [kat] sha1
3,648,697 UART: [kat] SHA2-256
3,650,637 UART: [kat] SHA2-384
3,653,412 UART: [kat] SHA2-512-ACC
3,655,312 UART: [kat] ECC-384
3,665,019 UART: [kat] HMAC-384Kdf
3,669,687 UART: [kat] LMS
3,917,999 UART: [kat] --
3,919,135 UART: [update-reset] ++
5,202,867 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,050 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,352,104 >>> mbox cmd response: success
5,352,319 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,333 UART: [update-reset Success] --
5,360,742 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,361,364 UART: [state] Locking Datavault
5,362,166 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,770 UART: [state] Locking ICCM
5,363,420 UART: [exit] Launching FMC @ 0x40000000
5,368,717 UART:
5,368,733 UART: Running Caliptra FMC ...
5,369,141 UART:
5,369,363 UART: [fmc] Received command: 0x1000000D
5,370,455 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,448 ready_for_fw is high
1,056,448 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,969 >>> mbox cmd response: success
2,646,314 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,325 UART:
2,652,341 UART: Running Caliptra FMC ...
2,652,749 UART:
2,652,979 UART: [fmc] Received command: 0x46574C44
5,055,605 >>> mbox cmd response: success
5,063,335 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,068,863 UART:
5,068,879 UART: Running Caliptra FMC ...
5,069,287 UART:
5,069,509 UART: [fmc] Received command: 0x1000000D
5,070,601 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,730 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,174,696 ready_for_fw is high
1,174,696 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,706 UART: [idev] --
1,208,785 UART: [ldev] ++
1,208,953 UART: [ldev] CDI.KEYID = 6
1,209,317 UART: [ldev] SUBJECT.KEYID = 5
1,209,744 UART: [ldev] AUTHORITY.KEYID = 7
1,210,207 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,241,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,282,056 UART: [fwproc] Recv command 0x46574c44
1,282,789 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,504 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,161 >>> mbox cmd response: success
2,742,242 UART: [afmc] ++
2,742,410 UART: [afmc] CDI.KEYID = 6
2,742,773 UART: [afmc] SUBJECT.KEYID = 7
2,743,199 UART: [afmc] AUTHORITY.KEYID = 5
2,778,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,727 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,423 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,322 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,015 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,941 UART: [afmc] --
2,821,991 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,822,013 UART: [cold-reset] --
2,822,807 UART: [state] Locking Datavault
2,823,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,384 UART: [state] Locking ICCM
2,824,958 UART: [exit] Launching FMC @ 0x40000000
2,830,255 UART:
2,830,271 UART: Running Caliptra FMC ...
2,830,679 UART:
2,830,909 UART: [fmc] Received command: 0x46574C44
2,831,735 UART:
2,831,751 UART: Running Caliptra ROM ...
2,832,159 UART:
2,832,301 UART: [state] CFI Enabled
2,835,231 UART: [state] LifecycleState = Unprovisioned
2,835,886 UART: [state] DebugLocked = No
2,836,474 UART: [state] WD Timer not started. Device not locked for debugging
2,837,646 UART: [kat] SHA2-256
3,641,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,325 UART: [kat] ++
3,645,477 UART: [kat] sha1
3,649,875 UART: [kat] SHA2-256
3,651,815 UART: [kat] SHA2-384
3,654,418 UART: [kat] SHA2-512-ACC
3,656,318 UART: [kat] ECC-384
3,665,941 UART: [kat] HMAC-384Kdf
3,670,551 UART: [kat] LMS
3,918,863 UART: [kat] --
3,919,667 UART: [update-reset] ++
5,203,143 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,352,332 >>> mbox cmd response: success
5,352,493 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,507 UART: [update-reset Success] --
5,360,916 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,361,644 UART: [state] Locking Datavault
5,362,432 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,036 UART: [state] Locking ICCM
5,363,634 UART: [exit] Launching FMC @ 0x40000000
5,368,931 UART:
5,368,947 UART: Running Caliptra FMC ...
5,369,355 UART:
5,369,577 UART: [fmc] Received command: 0x1000000D
5,370,669 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,839 ready_for_fw is high
1,056,839 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,731 >>> mbox cmd response: success
2,646,690 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,745 UART:
2,652,761 UART: Running Caliptra FMC ...
2,653,169 UART:
2,653,399 UART: [fmc] Received command: 0x46574C44
5,055,389 >>> mbox cmd response: success
5,063,073 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,068,989 UART:
5,069,005 UART: Running Caliptra FMC ...
5,069,413 UART:
5,069,635 UART: [fmc] Received command: 0x1000000D
5,070,727 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 ready_for_fw is high
1,174,521 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,299 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,928 UART: [ldev] --
1,280,196 UART: [fwproc] Wait for Commands...
1,280,957 UART: [fwproc] Recv command 0x46574c44
1,281,690 UART: [fwproc] Recv'd Img size: 111944 bytes
2,550,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,525 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,738,008 >>> mbox cmd response: success
2,739,113 UART: [afmc] ++
2,739,281 UART: [afmc] CDI.KEYID = 6
2,739,644 UART: [afmc] SUBJECT.KEYID = 7
2,740,070 UART: [afmc] AUTHORITY.KEYID = 5
2,776,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,548 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,244 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,143 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,836 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,668 UART: [afmc] --
2,819,606 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,819,628 UART: [cold-reset] --
2,820,398 UART: [state] Locking Datavault
2,821,317 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,921 UART: [state] Locking ICCM
2,822,535 UART: [exit] Launching FMC @ 0x40000000
2,827,832 UART:
2,827,848 UART: Running Caliptra FMC ...
2,828,256 UART:
2,828,486 UART: [fmc] Received command: 0x46574C44
2,829,312 UART:
2,829,328 UART: Running Caliptra ROM ...
2,829,736 UART:
2,829,791 UART: [state] CFI Enabled
2,832,479 UART: [state] LifecycleState = Unprovisioned
2,833,134 UART: [state] DebugLocked = No
2,833,774 UART: [state] WD Timer not started. Device not locked for debugging
2,835,098 UART: [kat] SHA2-256
3,638,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,777 UART: [kat] ++
3,642,929 UART: [kat] sha1
3,647,225 UART: [kat] SHA2-256
3,649,165 UART: [kat] SHA2-384
3,651,800 UART: [kat] SHA2-512-ACC
3,653,700 UART: [kat] ECC-384
3,663,563 UART: [kat] HMAC-384Kdf
3,668,243 UART: [kat] LMS
3,916,555 UART: [kat] --
3,917,389 UART: [update-reset] ++
5,202,115 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,220 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,351,274 >>> mbox cmd response: success
5,351,561 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,575 UART: [update-reset Success] --
5,359,984 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,360,730 UART: [state] Locking Datavault
5,361,354 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,958 UART: [state] Locking ICCM
5,362,384 UART: [exit] Launching FMC @ 0x40000000
5,367,681 UART:
5,367,697 UART: Running Caliptra FMC ...
5,368,105 UART:
5,368,327 UART: [fmc] Received command: 0x1000000D
5,369,419 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,324 ready_for_fw is high
1,056,324 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,136 >>> mbox cmd response: success
2,647,131 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,653,316 UART:
2,653,332 UART: Running Caliptra FMC ...
2,653,740 UART:
2,653,970 UART: [fmc] Received command: 0x46574C44
5,057,701 >>> mbox cmd response: success
5,065,219 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,733 UART:
5,070,749 UART: Running Caliptra FMC ...
5,071,157 UART:
5,071,379 UART: [fmc] Received command: 0x1000000D
5,072,471 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,580 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,175,074 ready_for_fw is high
1,175,074 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,478 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,662 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,379 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,476 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,907 >>> mbox cmd response: success
2,742,982 UART: [afmc] ++
2,743,150 UART: [afmc] CDI.KEYID = 6
2,743,513 UART: [afmc] SUBJECT.KEYID = 7
2,743,939 UART: [afmc] AUTHORITY.KEYID = 5
2,779,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,657 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,353 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,252 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,945 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,745 UART: [afmc] --
2,822,639 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,822,661 UART: [cold-reset] --
2,823,607 UART: [state] Locking Datavault
2,824,692 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,296 UART: [state] Locking ICCM
2,825,850 UART: [exit] Launching FMC @ 0x40000000
2,831,147 UART:
2,831,163 UART: Running Caliptra FMC ...
2,831,571 UART:
2,831,801 UART: [fmc] Received command: 0x46574C44
2,832,627 UART:
2,832,643 UART: Running Caliptra ROM ...
2,833,051 UART:
2,833,193 UART: [state] CFI Enabled
2,835,803 UART: [state] LifecycleState = Unprovisioned
2,836,458 UART: [state] DebugLocked = No
2,837,110 UART: [state] WD Timer not started. Device not locked for debugging
2,838,280 UART: [kat] SHA2-256
3,641,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,959 UART: [kat] ++
3,646,111 UART: [kat] sha1
3,650,487 UART: [kat] SHA2-256
3,652,427 UART: [kat] SHA2-384
3,655,054 UART: [kat] SHA2-512-ACC
3,656,954 UART: [kat] ECC-384
3,666,793 UART: [kat] HMAC-384Kdf
3,671,431 UART: [kat] LMS
3,919,743 UART: [kat] --
3,920,609 UART: [update-reset] ++
5,204,019 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,216 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,353,270 >>> mbox cmd response: success
5,353,439 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,453 UART: [update-reset Success] --
5,361,862 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,362,350 UART: [state] Locking Datavault
5,363,152 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,756 UART: [state] Locking ICCM
5,364,234 UART: [exit] Launching FMC @ 0x40000000
5,369,531 UART:
5,369,547 UART: Running Caliptra FMC ...
5,369,955 UART:
5,370,177 UART: [fmc] Received command: 0x1000000D
5,371,269 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,697 ready_for_fw is high
1,056,697 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,531 >>> mbox cmd response: success
2,645,742 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,131 UART:
2,652,147 UART: Running Caliptra FMC ...
2,652,555 UART:
2,652,785 UART: [fmc] Received command: 0x46574C44
5,057,157 >>> mbox cmd response: success
5,064,897 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,070,299 UART:
5,070,315 UART: Running Caliptra FMC ...
5,070,723 UART:
5,070,945 UART: [fmc] Received command: 0x1000000D
5,072,037 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,699 UART: [kat] ++
895,851 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,246 UART: [kat] LMS
1,169,558 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,673 UART: [idev] ++
1,173,841 UART: [idev] CDI.KEYID = 6
1,174,202 UART: [idev] SUBJECT.KEYID = 7
1,174,627 UART: [idev] UDS.KEYID = 0
1,174,973 ready_for_fw is high
1,174,973 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,507 UART: [idev] Erasing UDS.KEYID = 0
1,199,377 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,384 UART: [ldev] ++
1,209,552 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,343 UART: [ldev] AUTHORITY.KEYID = 7
1,210,806 UART: [ldev] FE.KEYID = 1
1,215,628 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,658 UART: [ldev] --
1,282,076 UART: [fwproc] Wait for Commands...
1,282,769 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,384 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,877 >>> mbox cmd response: success
2,741,970 UART: [afmc] ++
2,742,138 UART: [afmc] CDI.KEYID = 6
2,742,501 UART: [afmc] SUBJECT.KEYID = 7
2,742,927 UART: [afmc] AUTHORITY.KEYID = 5
2,778,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,685 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,381 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,280 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,973 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,733 UART: [afmc] --
2,821,589 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,611 UART: [cold-reset] --
2,822,307 UART: [state] Locking Datavault
2,823,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,336 UART: [state] Locking ICCM
2,824,836 UART: [exit] Launching FMC @ 0x40000000
2,830,133 UART:
2,830,149 UART: Running Caliptra FMC ...
2,830,557 UART:
2,830,787 UART: [fmc] Received command: 0x46574C44
2,831,613 UART:
2,831,629 UART: Running Caliptra ROM ...
2,832,037 UART:
2,832,092 UART: [state] CFI Enabled
2,834,366 UART: [state] LifecycleState = Unprovisioned
2,835,021 UART: [state] DebugLocked = No
2,835,579 UART: [state] WD Timer not started. Device not locked for debugging
2,836,935 UART: [kat] SHA2-256
3,640,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,614 UART: [kat] ++
3,644,766 UART: [kat] sha1
3,648,960 UART: [kat] SHA2-256
3,650,900 UART: [kat] SHA2-384
3,653,815 UART: [kat] SHA2-512-ACC
3,655,715 UART: [kat] ECC-384
3,665,650 UART: [kat] HMAC-384Kdf
3,670,242 UART: [kat] LMS
3,918,554 UART: [kat] --
3,919,504 UART: [update-reset] ++
5,205,035 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,092 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,354,146 >>> mbox cmd response: success
5,354,495 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,509 UART: [update-reset Success] --
5,362,918 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,363,780 UART: [state] Locking Datavault
5,364,764 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,368 UART: [state] Locking ICCM
5,365,800 UART: [exit] Launching FMC @ 0x40000000
5,371,097 UART:
5,371,113 UART: Running Caliptra FMC ...
5,371,521 UART:
5,371,743 UART: [fmc] Received command: 0x1000000D
5,372,835 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,544 ready_for_fw is high
1,056,544 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,282 >>> mbox cmd response: success
2,644,933 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,650,734 UART:
2,650,750 UART: Running Caliptra FMC ...
2,651,158 UART:
2,651,388 UART: [fmc] Received command: 0x46574C44
5,052,567 >>> mbox cmd response: success
5,060,237 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,065,705 UART:
5,065,721 UART: Running Caliptra FMC ...
5,066,129 UART:
5,066,351 UART: [fmc] Received command: 0x1000000D
5,067,443 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,343 UART: [kat] LMS
1,169,655 UART: [kat] --
1,170,804 UART: [cold-reset] ++
1,171,236 UART: [fht] FHT @ 0x50003400
1,173,882 UART: [idev] ++
1,174,050 UART: [idev] CDI.KEYID = 6
1,174,411 UART: [idev] SUBJECT.KEYID = 7
1,174,836 UART: [idev] UDS.KEYID = 0
1,175,182 ready_for_fw is high
1,175,182 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,183,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,592 UART: [idev] Sha1 KeyId Algorithm
1,209,438 UART: [idev] --
1,210,585 UART: [ldev] ++
1,210,753 UART: [ldev] CDI.KEYID = 6
1,211,117 UART: [ldev] SUBJECT.KEYID = 5
1,211,544 UART: [ldev] AUTHORITY.KEYID = 7
1,212,007 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,463 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,576 UART: [fwproc] Recv command 0x46574c44
1,284,309 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,362 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,905 >>> mbox cmd response: success
2,742,954 UART: [afmc] ++
2,743,122 UART: [afmc] CDI.KEYID = 6
2,743,485 UART: [afmc] SUBJECT.KEYID = 7
2,743,911 UART: [afmc] AUTHORITY.KEYID = 5
2,779,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,071 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,767 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,666 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,359 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,017 UART: [afmc] --
2,823,107 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,823,129 UART: [cold-reset] --
2,823,947 UART: [state] Locking Datavault
2,825,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,814 UART: [state] Locking ICCM
2,826,368 UART: [exit] Launching FMC @ 0x40000000
2,831,665 UART:
2,831,681 UART: Running Caliptra FMC ...
2,832,089 UART:
2,832,319 UART: [fmc] Received command: 0x46574C44
2,833,145 UART:
2,833,161 UART: Running Caliptra ROM ...
2,833,569 UART:
2,833,711 UART: [state] CFI Enabled
2,836,251 UART: [state] LifecycleState = Unprovisioned
2,836,906 UART: [state] DebugLocked = No
2,837,388 UART: [state] WD Timer not started. Device not locked for debugging
2,838,534 UART: [kat] SHA2-256
3,642,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,213 UART: [kat] ++
3,646,365 UART: [kat] sha1
3,650,803 UART: [kat] SHA2-256
3,652,743 UART: [kat] SHA2-384
3,655,438 UART: [kat] SHA2-512-ACC
3,657,338 UART: [kat] ECC-384
3,667,217 UART: [kat] HMAC-384Kdf
3,671,803 UART: [kat] LMS
3,920,115 UART: [kat] --
3,921,063 UART: [update-reset] ++
5,203,843 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,912 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,352,966 >>> mbox cmd response: success
5,353,189 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,203 UART: [update-reset Success] --
5,361,612 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,362,218 UART: [state] Locking Datavault
5,363,026 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,630 UART: [state] Locking ICCM
5,364,120 UART: [exit] Launching FMC @ 0x40000000
5,369,417 UART:
5,369,433 UART: Running Caliptra FMC ...
5,369,841 UART:
5,370,063 UART: [fmc] Received command: 0x1000000D
5,371,155 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,283 ready_for_fw is high
1,056,283 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,877 >>> mbox cmd response: success
2,647,564 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,653,855 UART:
2,653,871 UART: Running Caliptra FMC ...
2,654,279 UART:
2,654,509 UART: [fmc] Received command: 0x46574C44
5,056,071 >>> mbox cmd response: success
5,063,731 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,069,623 UART:
5,069,639 UART: Running Caliptra FMC ...
5,070,047 UART:
5,070,269 UART: [fmc] Received command: 0x1000000D
5,071,361 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,237 UART:
192,620 UART: Running Caliptra ROM ...
193,803 UART:
193,955 UART: [state] CFI Enabled
260,729 UART: [state] LifecycleState = Unprovisioned
263,076 UART: [state] DebugLocked = No
265,326 UART: [state] WD Timer not started. Device not locked for debugging
270,712 UART: [kat] SHA2-256
452,622 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,141 UART: [kat] ++
464,857 UART: [kat] sha1
474,957 UART: [kat] SHA2-256
477,953 UART: [kat] SHA2-384
483,729 UART: [kat] SHA2-512-ACC
486,305 UART: [kat] ECC-384
3,778,591 UART: [kat] HMAC-384Kdf
3,804,601 UART: [kat] LMS
4,877,757 UART: [kat] --
4,881,696 UART: [cold-reset] ++
4,883,918 UART: [fht] FHT @ 0x50003400
4,895,317 UART: [idev] ++
4,895,947 UART: [idev] CDI.KEYID = 6
4,897,185 UART: [idev] SUBJECT.KEYID = 7
4,898,353 UART: [idev] UDS.KEYID = 0
4,899,280 ready_for_fw is high
4,899,469 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,039,853 UART: [idev] Erasing UDS.KEYID = 0
8,249,098 UART: [idev] Sha1 KeyId Algorithm
8,271,030 UART: [idev] --
8,274,110 UART: [ldev] ++
8,274,678 UART: [ldev] CDI.KEYID = 6
8,275,787 UART: [ldev] SUBJECT.KEYID = 5
8,277,003 UART: [ldev] AUTHORITY.KEYID = 7
8,278,179 UART: [ldev] FE.KEYID = 1
8,321,530 UART: [ldev] Erasing FE.KEYID = 1
11,653,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,947,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,963,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,979,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,995,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,016,423 UART: [ldev] --
14,021,633 UART: [fwproc] Wait for Commands...
14,023,777 UART: [fwproc] Recv command 0x46574c44
14,026,025 UART: [fwproc] Recv'd Img size: 111600 bytes
18,075,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,153,220 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,213,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,529,473 >>> mbox cmd response: success
18,533,419 UART: [afmc] ++
18,534,052 UART: [afmc] CDI.KEYID = 6
18,535,153 UART: [afmc] SUBJECT.KEYID = 7
18,536,333 UART: [afmc] AUTHORITY.KEYID = 5
21,907,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,205,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,208,272 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,224,496 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,240,583 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,256,379 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,277,889 UART: [afmc] --
24,282,579 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,423,265 UART: [cold-reset] --
24,424,128 UART: [state] Locking Datavault
24,425,275 UART: [state] Locking PCR0, PCR1 and PCR31
24,426,811 UART: [state] Locking ICCM
24,427,721 UART: [exit] Launching FMC @ 0x40000000
24,429,162 UART:
24,429,322 UART: Running Caliptra FMC ...
24,430,421 UART:
24,430,577 UART: [fmc] Received command: 0x46574C44
24,432,028 UART:
24,432,185 UART: Running Caliptra ROM ...
24,433,280 UART:
24,433,433 UART: [state] CFI Enabled
24,500,415 UART: [state] LifecycleState = Unprovisioned
24,502,292 UART: [state] DebugLocked = No
24,504,592 UART: [state] WD Timer not started. Device not locked for debugging
24,509,644 UART: [kat] SHA2-256
24,691,560 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,703,127 UART: [kat] ++
24,703,618 UART: [kat] sha1
24,714,349 UART: [kat] SHA2-256
24,717,396 UART: [kat] SHA2-384
24,723,652 UART: [kat] SHA2-512-ACC
24,726,282 UART: [kat] ECC-384
28,010,773 UART: [kat] HMAC-384Kdf
28,037,976 UART: [kat] LMS
29,111,124 UART: [kat] --
29,114,914 UART: [update-reset] ++
33,177,854 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,181,027 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,555,471 UART: [update-reset] Copying MAN_2 To MAN_1
33,578,374 UART: [update-reset Success] --
33,580,018 >>> mbox cmd response: success
33,580,269 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,583,415 UART: [state] Locking Datavault
33,587,973 UART: [state] Locking PCR0, PCR1 and PCR31
33,589,676 UART: [state] Locking ICCM
33,591,572 UART: [exit] Launching FMC @ 0x40000000
33,600,257 UART:
33,600,490 UART: Running Caliptra FMC ...
33,601,591 UART:
33,601,746 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,603,377 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
4,781,726 ready_for_fw is high
4,782,419 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,286,371 >>> mbox cmd response: success
23,955,995 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,097,173 UART:
24,097,557 UART: Running Caliptra FMC ...
24,098,798 UART:
24,098,974 UART: [fmc] Received command: 0x46574C44
33,154,886 >>> mbox cmd response: success
33,155,276 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,166,742 UART:
33,167,006 UART: Running Caliptra FMC ...
33,168,183 UART:
33,168,340 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,169,980 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,437 UART:
192,794 UART: Running Caliptra ROM ...
193,919 UART:
603,547 UART: [state] CFI Enabled
619,333 UART: [state] LifecycleState = Unprovisioned
621,695 UART: [state] DebugLocked = No
624,428 UART: [state] WD Timer not started. Device not locked for debugging
628,394 UART: [kat] SHA2-256
810,377 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,893 UART: [kat] ++
822,498 UART: [kat] sha1
833,018 UART: [kat] SHA2-256
836,018 UART: [kat] SHA2-384
842,009 UART: [kat] SHA2-512-ACC
844,665 UART: [kat] ECC-384
4,100,399 UART: [kat] HMAC-384Kdf
4,111,640 UART: [kat] LMS
5,184,804 UART: [kat] --
5,189,328 UART: [cold-reset] ++
5,190,767 UART: [fht] FHT @ 0x50003400
5,202,846 UART: [idev] ++
5,203,568 UART: [idev] CDI.KEYID = 6
5,204,739 UART: [idev] SUBJECT.KEYID = 7
5,206,188 UART: [idev] UDS.KEYID = 0
5,207,446 ready_for_fw is high
5,207,673 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,347,745 UART: [idev] Erasing UDS.KEYID = 0
8,491,164 UART: [idev] Sha1 KeyId Algorithm
8,512,292 UART: [idev] --
8,516,610 UART: [ldev] ++
8,517,179 UART: [ldev] CDI.KEYID = 6
8,518,407 UART: [ldev] SUBJECT.KEYID = 5
8,519,883 UART: [ldev] AUTHORITY.KEYID = 7
8,521,355 UART: [ldev] FE.KEYID = 1
8,530,861 UART: [ldev] Erasing FE.KEYID = 1
11,824,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,104 UART: [ldev] --
14,187,301 UART: [fwproc] Wait for Commands...
14,190,200 UART: [fwproc] Recv command 0x46574c44
14,192,496 UART: [fwproc] Recv'd Img size: 111600 bytes
18,236,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,309,448 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,369,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,686,541 >>> mbox cmd response: success
18,691,455 UART: [afmc] ++
18,692,066 UART: [afmc] CDI.KEYID = 6
18,693,173 UART: [afmc] SUBJECT.KEYID = 7
18,694,386 UART: [afmc] AUTHORITY.KEYID = 5
22,007,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,302,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,305,091 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,321,332 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,337,429 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,353,253 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,376,274 UART: [afmc] --
24,381,454 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,522,099 UART: [cold-reset] --
24,522,966 UART: [state] Locking Datavault
24,524,035 UART: [state] Locking PCR0, PCR1 and PCR31
24,525,571 UART: [state] Locking ICCM
24,526,444 UART: [exit] Launching FMC @ 0x40000000
24,527,776 UART:
24,527,914 UART: Running Caliptra FMC ...
24,529,004 UART:
24,529,156 UART: [fmc] Received command: 0x46574C44
24,530,604 UART:
24,530,751 UART: Running Caliptra ROM ...
24,531,838 UART:
24,531,983 UART: [state] CFI Enabled
24,537,774 UART: [state] LifecycleState = Unprovisioned
24,539,648 UART: [state] DebugLocked = No
24,541,337 UART: [state] WD Timer not started. Device not locked for debugging
24,546,216 UART: [kat] SHA2-256
24,728,125 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,739,683 UART: [kat] ++
24,740,187 UART: [kat] sha1
24,751,336 UART: [kat] SHA2-256
24,754,399 UART: [kat] SHA2-384
24,759,183 UART: [kat] SHA2-512-ACC
24,761,793 UART: [kat] ECC-384
28,019,124 UART: [kat] HMAC-384Kdf
28,031,248 UART: [kat] LMS
29,104,401 UART: [kat] --
29,109,601 UART: [update-reset] ++
33,179,163 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,182,507 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,556,879 UART: [update-reset] Copying MAN_2 To MAN_1
33,579,742 UART: [update-reset Success] --
33,581,402 >>> mbox cmd response: success
33,581,620 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,584,514 UART: [state] Locking Datavault
33,587,932 UART: [state] Locking PCR0, PCR1 and PCR31
33,589,626 UART: [state] Locking ICCM
33,591,495 UART: [exit] Launching FMC @ 0x40000000
33,600,110 UART:
33,600,355 UART: Running Caliptra FMC ...
33,601,456 UART:
33,601,602 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,603,240 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
5,104,238 ready_for_fw is high
5,104,848 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,487,092 >>> mbox cmd response: success
24,111,295 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,252,036 UART:
24,252,421 UART: Running Caliptra FMC ...
24,253,631 UART:
24,253,809 UART: [fmc] Received command: 0x46574C44
33,196,787 >>> mbox cmd response: success
33,197,166 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,211,104 UART:
33,211,352 UART: Running Caliptra FMC ...
33,212,511 UART:
33,212,661 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,214,299 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,011 UART:
192,387 UART: Running Caliptra ROM ...
193,519 UART:
193,682 UART: [state] CFI Enabled
263,035 UART: [state] LifecycleState = Unprovisioned
264,905 UART: [state] DebugLocked = No
266,919 UART: [state] WD Timer not started. Device not locked for debugging
271,173 UART: [kat] SHA2-256
450,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,892 UART: [kat] ++
462,338 UART: [kat] sha1
472,993 UART: [kat] SHA2-256
476,070 UART: [kat] SHA2-384
483,273 UART: [kat] SHA2-512-ACC
486,218 UART: [kat] ECC-384
2,946,819 UART: [kat] HMAC-384Kdf
2,970,497 UART: [kat] LMS
3,499,940 UART: [kat] --
3,504,666 UART: [cold-reset] ++
3,505,988 UART: [fht] FHT @ 0x50003400
3,516,778 UART: [idev] ++
3,517,342 UART: [idev] CDI.KEYID = 6
3,518,220 UART: [idev] SUBJECT.KEYID = 7
3,519,465 UART: [idev] UDS.KEYID = 0
3,520,367 ready_for_fw is high
3,520,555 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,661,354 UART: [idev] Erasing UDS.KEYID = 0
6,026,808 UART: [idev] Sha1 KeyId Algorithm
6,048,367 UART: [idev] --
6,051,236 UART: [ldev] ++
6,051,847 UART: [ldev] CDI.KEYID = 6
6,052,766 UART: [ldev] SUBJECT.KEYID = 5
6,053,929 UART: [ldev] AUTHORITY.KEYID = 7
6,055,162 UART: [ldev] FE.KEYID = 1
6,089,905 UART: [ldev] Erasing FE.KEYID = 1
8,606,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,367 UART: [ldev] --
10,407,505 UART: [fwproc] Wait for Commands...
10,409,115 UART: [fwproc] Recv command 0x46574c44
10,411,212 UART: [fwproc] Recv'd Img size: 111944 bytes
13,779,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,851,476 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,911,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,229,328 >>> mbox cmd response: success
14,234,126 UART: [afmc] ++
14,234,747 UART: [afmc] CDI.KEYID = 6
14,235,826 UART: [afmc] SUBJECT.KEYID = 7
14,236,901 UART: [afmc] AUTHORITY.KEYID = 5
16,760,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,484,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,486,448 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,502,497 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,518,541 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,534,236 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,557,094 UART: [afmc] --
18,562,640 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,703,745 UART: [cold-reset] --
18,704,611 UART: [state] Locking Datavault
18,705,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,307 UART: [state] Locking ICCM
18,708,214 UART: [exit] Launching FMC @ 0x40000000
18,709,637 UART:
18,709,797 UART: Running Caliptra FMC ...
18,710,915 UART:
18,711,073 UART: [fmc] Received command: 0x46574C44
18,712,534 UART:
18,712,687 UART: Running Caliptra ROM ...
18,713,783 UART:
18,713,937 UART: [state] CFI Enabled
18,778,056 UART: [state] LifecycleState = Unprovisioned
18,779,933 UART: [state] DebugLocked = No
18,782,128 UART: [state] WD Timer not started. Device not locked for debugging
18,786,676 UART: [kat] SHA2-256
18,965,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,977,410 UART: [kat] ++
18,977,948 UART: [kat] sha1
18,989,757 UART: [kat] SHA2-256
18,992,774 UART: [kat] SHA2-384
18,998,328 UART: [kat] SHA2-512-ACC
19,001,230 UART: [kat] ECC-384
21,461,451 UART: [kat] HMAC-384Kdf
21,484,532 UART: [kat] LMS
22,013,990 UART: [kat] --
22,019,299 UART: [update-reset] ++
25,416,992 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,419,621 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,795,459 UART: [update-reset] Copying MAN_2 To MAN_1
25,817,773 UART: [update-reset Success] --
25,819,093 >>> mbox cmd response: success
25,819,332 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,824,126 UART: [state] Locking Datavault
25,827,385 UART: [state] Locking PCR0, PCR1 and PCR31
25,829,036 UART: [state] Locking ICCM
25,830,054 UART: [exit] Launching FMC @ 0x40000000
25,838,456 UART:
25,838,721 UART: Running Caliptra FMC ...
25,839,824 UART:
25,839,978 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,841,617 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,078 UART:
192,462 UART: Running Caliptra ROM ...
193,598 UART:
193,746 UART: [state] CFI Enabled
263,282 UART: [state] LifecycleState = Unprovisioned
265,201 UART: [state] DebugLocked = No
267,376 UART: [state] WD Timer not started. Device not locked for debugging
270,925 UART: [kat] SHA2-256
450,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,631 UART: [kat] ++
462,158 UART: [kat] sha1
474,385 UART: [kat] SHA2-256
477,398 UART: [kat] SHA2-384
482,391 UART: [kat] SHA2-512-ACC
485,346 UART: [kat] ECC-384
2,948,057 UART: [kat] HMAC-384Kdf
2,971,657 UART: [kat] LMS
3,501,119 UART: [kat] --
3,503,786 UART: [cold-reset] ++
3,506,362 UART: [fht] FHT @ 0x50003400
3,517,340 UART: [idev] ++
3,517,903 UART: [idev] CDI.KEYID = 6
3,518,811 UART: [idev] SUBJECT.KEYID = 7
3,519,986 UART: [idev] UDS.KEYID = 0
3,520,907 ready_for_fw is high
3,521,112 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,661,987 UART: [idev] Erasing UDS.KEYID = 0
6,025,855 UART: [idev] Sha1 KeyId Algorithm
6,049,741 UART: [idev] --
6,053,143 UART: [ldev] ++
6,053,734 UART: [ldev] CDI.KEYID = 6
6,054,653 UART: [ldev] SUBJECT.KEYID = 5
6,055,756 UART: [ldev] AUTHORITY.KEYID = 7
6,057,103 UART: [ldev] FE.KEYID = 1
6,100,294 UART: [ldev] Erasing FE.KEYID = 1
8,605,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,618 UART: [ldev] --
10,413,882 UART: [fwproc] Wait for Commands...
10,416,785 UART: [fwproc] Recv command 0x46574c44
10,418,882 UART: [fwproc] Recv'd Img size: 111944 bytes
13,786,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,855,677 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,915,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,233,710 >>> mbox cmd response: success
14,238,463 UART: [afmc] ++
14,239,077 UART: [afmc] CDI.KEYID = 6
14,239,999 UART: [afmc] SUBJECT.KEYID = 7
14,241,041 UART: [afmc] AUTHORITY.KEYID = 5
16,764,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,026 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,506,106 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,522,155 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,537,806 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,559,876 UART: [afmc] --
18,565,296 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,706,369 UART: [cold-reset] --
18,707,233 UART: [state] Locking Datavault
18,708,331 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,883 UART: [state] Locking ICCM
18,710,791 UART: [exit] Launching FMC @ 0x40000000
18,712,216 UART:
18,712,375 UART: Running Caliptra FMC ...
18,713,476 UART:
18,713,626 UART: [fmc] Received command: 0x46574C44
18,715,081 UART:
18,715,235 UART: Running Caliptra ROM ...
18,716,332 UART:
18,716,487 UART: [state] CFI Enabled
18,778,174 UART: [state] LifecycleState = Unprovisioned
18,780,053 UART: [state] DebugLocked = No
18,782,956 UART: [state] WD Timer not started. Device not locked for debugging
18,786,260 UART: [kat] SHA2-256
18,965,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,976,935 UART: [kat] ++
18,977,478 UART: [kat] sha1
18,988,259 UART: [kat] SHA2-256
18,991,273 UART: [kat] SHA2-384
18,996,622 UART: [kat] SHA2-512-ACC
18,999,564 UART: [kat] ECC-384
21,462,091 UART: [kat] HMAC-384Kdf
21,485,661 UART: [kat] LMS
22,015,115 UART: [kat] --
22,020,794 UART: [update-reset] ++
25,421,268 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,423,896 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,799,097 UART: [update-reset] Copying MAN_2 To MAN_1
25,821,417 UART: [update-reset Success] --
25,822,700 >>> mbox cmd response: success
25,822,918 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,825,142 UART: [state] Locking Datavault
25,828,129 UART: [state] Locking PCR0, PCR1 and PCR31
25,829,833 UART: [state] Locking ICCM
25,830,850 UART: [exit] Launching FMC @ 0x40000000
25,839,247 UART:
25,839,485 UART: Running Caliptra FMC ...
25,840,589 UART:
25,840,746 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,842,379 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,381,693 ready_for_fw is high
3,382,387 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,033,912 >>> mbox cmd response: success
18,313,100 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,454,247 UART:
18,454,637 UART: Running Caliptra FMC ...
18,455,755 UART:
18,455,909 UART: [fmc] Received command: 0x46574C44
25,409,380 >>> mbox cmd response: success
25,409,768 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,420,363 UART:
25,420,626 UART: Running Caliptra FMC ...
25,421,802 UART:
25,421,962 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,423,603 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,528 UART:
192,887 UART: Running Caliptra ROM ...
193,976 UART:
603,837 UART: [state] CFI Enabled
617,202 UART: [state] LifecycleState = Unprovisioned
619,012 UART: [state] DebugLocked = No
620,404 UART: [state] WD Timer not started. Device not locked for debugging
623,363 UART: [kat] SHA2-256
802,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,033 UART: [kat] ++
814,565 UART: [kat] sha1
826,362 UART: [kat] SHA2-256
829,441 UART: [kat] SHA2-384
835,711 UART: [kat] SHA2-512-ACC
838,664 UART: [kat] ECC-384
3,279,364 UART: [kat] HMAC-384Kdf
3,292,593 UART: [kat] LMS
3,822,084 UART: [kat] --
3,826,971 UART: [cold-reset] ++
3,828,899 UART: [fht] FHT @ 0x50003400
3,838,736 UART: [idev] ++
3,839,307 UART: [idev] CDI.KEYID = 6
3,840,258 UART: [idev] SUBJECT.KEYID = 7
3,841,429 UART: [idev] UDS.KEYID = 0
3,842,324 ready_for_fw is high
3,842,507 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,983,092 UART: [idev] Erasing UDS.KEYID = 0
6,316,157 UART: [idev] Sha1 KeyId Algorithm
6,338,735 UART: [idev] --
6,342,068 UART: [ldev] ++
6,342,655 UART: [ldev] CDI.KEYID = 6
6,343,589 UART: [ldev] SUBJECT.KEYID = 5
6,344,752 UART: [ldev] AUTHORITY.KEYID = 7
6,345,982 UART: [ldev] FE.KEYID = 1
6,357,477 UART: [ldev] Erasing FE.KEYID = 1
8,826,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,711 UART: [ldev] --
10,616,113 UART: [fwproc] Wait for Commands...
10,618,474 UART: [fwproc] Recv command 0x46574c44
10,620,566 UART: [fwproc] Recv'd Img size: 111944 bytes
13,995,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,064,152 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,124,489 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,443,212 >>> mbox cmd response: success
14,446,770 UART: [afmc] ++
14,447,376 UART: [afmc] CDI.KEYID = 6
14,448,291 UART: [afmc] SUBJECT.KEYID = 7
14,449,446 UART: [afmc] AUTHORITY.KEYID = 5
16,947,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,667,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,669,565 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,685,631 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,701,663 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,717,366 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,740,384 UART: [afmc] --
18,745,077 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,886,215 UART: [cold-reset] --
18,887,078 UART: [state] Locking Datavault
18,888,255 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,796 UART: [state] Locking ICCM
18,890,699 UART: [exit] Launching FMC @ 0x40000000
18,892,117 UART:
18,892,279 UART: Running Caliptra FMC ...
18,893,375 UART:
18,893,527 UART: [fmc] Received command: 0x46574C44
18,894,980 UART:
18,895,129 UART: Running Caliptra ROM ...
18,896,223 UART:
18,896,385 UART: [state] CFI Enabled
18,901,082 UART: [state] LifecycleState = Unprovisioned
18,902,907 UART: [state] DebugLocked = No
18,904,655 UART: [state] WD Timer not started. Device not locked for debugging
18,909,142 UART: [kat] SHA2-256
19,088,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,099,876 UART: [kat] ++
19,100,420 UART: [kat] sha1
19,110,456 UART: [kat] SHA2-256
19,113,461 UART: [kat] SHA2-384
19,119,777 UART: [kat] SHA2-512-ACC
19,122,716 UART: [kat] ECC-384
21,563,050 UART: [kat] HMAC-384Kdf
21,575,487 UART: [kat] LMS
22,104,998 UART: [kat] --
22,108,297 UART: [update-reset] ++
25,494,923 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,498,513 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,874,358 UART: [update-reset] Copying MAN_2 To MAN_1
25,896,688 UART: [update-reset Success] --
25,898,027 >>> mbox cmd response: success
25,898,258 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,902,773 UART: [state] Locking Datavault
25,907,418 UART: [state] Locking PCR0, PCR1 and PCR31
25,909,074 UART: [state] Locking ICCM
25,911,656 UART: [exit] Launching FMC @ 0x40000000
25,920,053 UART:
25,920,294 UART: Running Caliptra FMC ...
25,921,393 UART:
25,921,550 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,923,182 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
3,693,967 ready_for_fw is high
3,694,529 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,228,502 >>> mbox cmd response: success
18,472,411 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,613,417 UART:
18,613,778 UART: Running Caliptra FMC ...
18,614,979 UART:
18,615,149 UART: [fmc] Received command: 0x46574C44
25,502,194 >>> mbox cmd response: success
25,502,605 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,517,110 UART:
25,517,414 UART: Running Caliptra FMC ...
25,518,619 UART:
25,518,800 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,520,496 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,174,013 ready_for_fw is high
1,174,013 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,207,173 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,214,956 UART: [ldev] Erasing FE.KEYID = 1
1,241,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x46574c44
1,281,948 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,285 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,952 >>> mbox cmd response: success
2,741,073 UART: [afmc] ++
2,741,241 UART: [afmc] CDI.KEYID = 6
2,741,604 UART: [afmc] SUBJECT.KEYID = 7
2,742,030 UART: [afmc] AUTHORITY.KEYID = 5
2,777,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,160 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,856 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,755 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,448 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,328 UART: [afmc] --
2,821,338 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,360 UART: [cold-reset] --
2,822,200 UART: [state] Locking Datavault
2,823,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,189 UART: [state] Locking ICCM
2,824,755 UART: [exit] Launching FMC @ 0x40000000
2,830,052 UART:
2,830,068 UART: Running Caliptra FMC ...
2,830,476 UART:
2,830,706 UART: [fmc] Received command: 0x46574C44
2,831,532 UART:
2,831,548 UART: Running Caliptra ROM ...
2,831,956 UART:
2,832,011 UART: [state] CFI Enabled
2,834,713 UART: [state] LifecycleState = Unprovisioned
2,835,368 UART: [state] DebugLocked = No
2,836,078 UART: [state] WD Timer not started. Device not locked for debugging
2,837,224 UART: [kat] SHA2-256
3,640,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,903 UART: [kat] ++
3,645,055 UART: [kat] sha1
3,649,213 UART: [kat] SHA2-256
3,651,153 UART: [kat] SHA2-384
3,654,146 UART: [kat] SHA2-512-ACC
3,656,046 UART: [kat] ECC-384
3,665,971 UART: [kat] HMAC-384Kdf
3,670,555 UART: [kat] LMS
3,918,867 UART: [kat] --
3,919,639 UART: [update-reset] ++
5,204,275 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,462 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,353,731 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,745 UART: [update-reset Success] --
5,362,154 >>> mbox cmd response: success
5,362,154 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,756 UART: [state] Locking Datavault
5,363,408 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,012 UART: [state] Locking ICCM
5,364,522 UART: [exit] Launching FMC @ 0x40000000
5,369,819 UART:
5,369,835 UART: Running Caliptra FMC ...
5,370,243 UART:
5,370,465 UART: [fmc] Received command: 0x1000000C
5,371,200 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,082 ready_for_fw is high
1,056,082 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,080 >>> mbox cmd response: success
2,646,447 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,824 UART:
2,652,840 UART: Running Caliptra FMC ...
2,653,248 UART:
2,653,478 UART: [fmc] Received command: 0x46574C44
5,065,415 >>> mbox cmd response: success
5,065,415 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,071,027 UART:
5,071,043 UART: Running Caliptra FMC ...
5,071,451 UART:
5,071,673 UART: [fmc] Received command: 0x1000000C
5,072,408 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,322 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,174,272 ready_for_fw is high
1,174,272 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,626 UART: [idev] Erasing UDS.KEYID = 0
1,198,582 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,719 UART: [ldev] ++
1,208,887 UART: [ldev] CDI.KEYID = 6
1,209,251 UART: [ldev] SUBJECT.KEYID = 5
1,209,678 UART: [ldev] AUTHORITY.KEYID = 7
1,210,141 UART: [ldev] FE.KEYID = 1
1,215,563 UART: [ldev] Erasing FE.KEYID = 1
1,241,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,877 UART: [ldev] --
1,280,383 UART: [fwproc] Wait for Commands...
1,281,140 UART: [fwproc] Recv command 0x46574c44
1,281,873 UART: [fwproc] Recv'd Img size: 111944 bytes
2,550,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,416 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,029 >>> mbox cmd response: success
2,740,196 UART: [afmc] ++
2,740,364 UART: [afmc] CDI.KEYID = 6
2,740,727 UART: [afmc] SUBJECT.KEYID = 7
2,741,153 UART: [afmc] AUTHORITY.KEYID = 5
2,777,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,409 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,105 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,004 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,697 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,353 UART: [afmc] --
2,820,243 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,820,265 UART: [cold-reset] --
2,821,195 UART: [state] Locking Datavault
2,822,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,940 UART: [state] Locking ICCM
2,823,524 UART: [exit] Launching FMC @ 0x40000000
2,828,821 UART:
2,828,837 UART: Running Caliptra FMC ...
2,829,245 UART:
2,829,475 UART: [fmc] Received command: 0x46574C44
2,830,301 UART:
2,830,317 UART: Running Caliptra ROM ...
2,830,725 UART:
2,830,867 UART: [state] CFI Enabled
2,834,079 UART: [state] LifecycleState = Unprovisioned
2,834,734 UART: [state] DebugLocked = No
2,835,320 UART: [state] WD Timer not started. Device not locked for debugging
2,836,558 UART: [kat] SHA2-256
3,640,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,237 UART: [kat] ++
3,644,389 UART: [kat] sha1
3,648,675 UART: [kat] SHA2-256
3,650,615 UART: [kat] SHA2-384
3,653,406 UART: [kat] SHA2-512-ACC
3,655,306 UART: [kat] ECC-384
3,664,989 UART: [kat] HMAC-384Kdf
3,669,857 UART: [kat] LMS
3,918,169 UART: [kat] --
3,919,017 UART: [update-reset] ++
5,203,689 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,886 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,353,097 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,111 UART: [update-reset Success] --
5,361,520 >>> mbox cmd response: success
5,361,520 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,100 UART: [state] Locking Datavault
5,363,008 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,612 UART: [state] Locking ICCM
5,364,034 UART: [exit] Launching FMC @ 0x40000000
5,369,331 UART:
5,369,347 UART: Running Caliptra FMC ...
5,369,755 UART:
5,369,977 UART: [fmc] Received command: 0x1000000C
5,370,712 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 ready_for_fw is high
1,056,327 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,667 >>> mbox cmd response: success
2,645,756 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,651,939 UART:
2,651,955 UART: Running Caliptra FMC ...
2,652,363 UART:
2,652,593 UART: [fmc] Received command: 0x46574C44
5,063,681 >>> mbox cmd response: success
5,063,681 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,589 UART:
5,069,605 UART: Running Caliptra FMC ...
5,070,013 UART:
5,070,235 UART: [fmc] Received command: 0x1000000C
5,070,970 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,750 UART: [kat] HMAC-384Kdf
920,486 UART: [kat] LMS
1,168,798 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,697 UART: [idev] ++
1,172,865 UART: [idev] CDI.KEYID = 6
1,173,226 UART: [idev] SUBJECT.KEYID = 7
1,173,651 UART: [idev] UDS.KEYID = 0
1,173,997 ready_for_fw is high
1,173,997 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,925 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,310 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,407 UART: [fwproc] Recv command 0x46574c44
1,282,140 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,902 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,369 >>> mbox cmd response: success
2,742,492 UART: [afmc] ++
2,742,660 UART: [afmc] CDI.KEYID = 6
2,743,023 UART: [afmc] SUBJECT.KEYID = 7
2,743,449 UART: [afmc] AUTHORITY.KEYID = 5
2,778,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,745 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,441 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,340 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,033 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,823 UART: [afmc] --
2,821,751 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,773 UART: [cold-reset] --
2,822,665 UART: [state] Locking Datavault
2,823,916 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,520 UART: [state] Locking ICCM
2,825,052 UART: [exit] Launching FMC @ 0x40000000
2,830,349 UART:
2,830,365 UART: Running Caliptra FMC ...
2,830,773 UART:
2,831,003 UART: [fmc] Received command: 0x46574C44
2,831,829 UART:
2,831,845 UART: Running Caliptra ROM ...
2,832,253 UART:
2,832,308 UART: [state] CFI Enabled
2,834,810 UART: [state] LifecycleState = Unprovisioned
2,835,465 UART: [state] DebugLocked = No
2,836,045 UART: [state] WD Timer not started. Device not locked for debugging
2,837,379 UART: [kat] SHA2-256
3,640,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,058 UART: [kat] ++
3,645,210 UART: [kat] sha1
3,649,336 UART: [kat] SHA2-256
3,651,276 UART: [kat] SHA2-384
3,654,131 UART: [kat] SHA2-512-ACC
3,656,031 UART: [kat] ECC-384
3,666,098 UART: [kat] HMAC-384Kdf
3,670,566 UART: [kat] LMS
3,918,878 UART: [kat] --
3,919,580 UART: [update-reset] ++
5,204,813 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,354,191 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,205 UART: [update-reset Success] --
5,362,614 >>> mbox cmd response: success
5,362,614 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,458 UART: [state] Locking Datavault
5,364,220 UART: [state] Locking PCR0, PCR1 and PCR31
5,364,824 UART: [state] Locking ICCM
5,365,276 UART: [exit] Launching FMC @ 0x40000000
5,370,573 UART:
5,370,589 UART: Running Caliptra FMC ...
5,370,997 UART:
5,371,219 UART: [fmc] Received command: 0x1000000C
5,371,954 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,236 ready_for_fw is high
1,056,236 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,408 >>> mbox cmd response: success
2,645,857 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,651,682 UART:
2,651,698 UART: Running Caliptra FMC ...
2,652,106 UART:
2,652,336 UART: [fmc] Received command: 0x46574C44
5,063,321 >>> mbox cmd response: success
5,063,321 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,129 UART:
5,069,145 UART: Running Caliptra FMC ...
5,069,553 UART:
5,069,775 UART: [fmc] Received command: 0x1000000C
5,070,510 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 ready_for_fw is high
1,174,222 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,886 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,759 UART: [ldev] ++
1,208,927 UART: [ldev] CDI.KEYID = 6
1,209,291 UART: [ldev] SUBJECT.KEYID = 5
1,209,718 UART: [ldev] AUTHORITY.KEYID = 7
1,210,181 UART: [ldev] FE.KEYID = 1
1,215,465 UART: [ldev] Erasing FE.KEYID = 1
1,241,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,451 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,215 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,348 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,875 >>> mbox cmd response: success
2,741,890 UART: [afmc] ++
2,742,058 UART: [afmc] CDI.KEYID = 6
2,742,421 UART: [afmc] SUBJECT.KEYID = 7
2,742,847 UART: [afmc] AUTHORITY.KEYID = 5
2,778,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,813 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,509 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,408 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,101 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,861 UART: [afmc] --
2,821,759 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,781 UART: [cold-reset] --
2,822,681 UART: [state] Locking Datavault
2,823,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,528 UART: [state] Locking ICCM
2,825,046 UART: [exit] Launching FMC @ 0x40000000
2,830,343 UART:
2,830,359 UART: Running Caliptra FMC ...
2,830,767 UART:
2,830,997 UART: [fmc] Received command: 0x46574C44
2,831,823 UART:
2,831,839 UART: Running Caliptra ROM ...
2,832,247 UART:
2,832,389 UART: [state] CFI Enabled
2,835,265 UART: [state] LifecycleState = Unprovisioned
2,835,920 UART: [state] DebugLocked = No
2,836,448 UART: [state] WD Timer not started. Device not locked for debugging
2,837,722 UART: [kat] SHA2-256
3,641,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,401 UART: [kat] ++
3,645,553 UART: [kat] sha1
3,649,719 UART: [kat] SHA2-256
3,651,659 UART: [kat] SHA2-384
3,654,414 UART: [kat] SHA2-512-ACC
3,656,314 UART: [kat] ECC-384
3,666,117 UART: [kat] HMAC-384Kdf
3,670,655 UART: [kat] LMS
3,918,967 UART: [kat] --
3,919,959 UART: [update-reset] ++
5,204,223 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,248 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,353,485 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,499 UART: [update-reset Success] --
5,361,908 >>> mbox cmd response: success
5,361,908 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,632 UART: [state] Locking Datavault
5,363,324 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,928 UART: [state] Locking ICCM
5,364,374 UART: [exit] Launching FMC @ 0x40000000
5,369,671 UART:
5,369,687 UART: Running Caliptra FMC ...
5,370,095 UART:
5,370,317 UART: [fmc] Received command: 0x1000000C
5,371,052 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,815 ready_for_fw is high
1,056,815 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,477 >>> mbox cmd response: success
2,648,826 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,654,939 UART:
2,654,955 UART: Running Caliptra FMC ...
2,655,363 UART:
2,655,593 UART: [fmc] Received command: 0x46574C44
5,066,447 >>> mbox cmd response: success
5,066,447 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,072,137 UART:
5,072,153 UART: Running Caliptra FMC ...
5,072,561 UART:
5,072,783 UART: [fmc] Received command: 0x1000000C
5,073,518 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,307 UART: [cold-reset] ++
1,170,647 UART: [fht] FHT @ 0x50003400
1,173,249 UART: [idev] ++
1,173,417 UART: [idev] CDI.KEYID = 6
1,173,778 UART: [idev] SUBJECT.KEYID = 7
1,174,203 UART: [idev] UDS.KEYID = 0
1,174,549 ready_for_fw is high
1,174,549 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,491 UART: [idev] Erasing UDS.KEYID = 0
1,199,847 UART: [idev] Sha1 KeyId Algorithm
1,208,621 UART: [idev] --
1,209,712 UART: [ldev] ++
1,209,880 UART: [ldev] CDI.KEYID = 6
1,210,244 UART: [ldev] SUBJECT.KEYID = 5
1,210,671 UART: [ldev] AUTHORITY.KEYID = 7
1,211,134 UART: [ldev] FE.KEYID = 1
1,216,284 UART: [ldev] Erasing FE.KEYID = 1
1,242,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,874 UART: [ldev] --
1,282,268 UART: [fwproc] Wait for Commands...
1,282,949 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,253 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,700 >>> mbox cmd response: success
2,742,787 UART: [afmc] ++
2,742,955 UART: [afmc] CDI.KEYID = 6
2,743,318 UART: [afmc] SUBJECT.KEYID = 7
2,743,744 UART: [afmc] AUTHORITY.KEYID = 5
2,778,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,002 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,698 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,597 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,290 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,110 UART: [afmc] --
2,822,110 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,822,132 UART: [cold-reset] --
2,822,942 UART: [state] Locking Datavault
2,824,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,659 UART: [state] Locking ICCM
2,825,223 UART: [exit] Launching FMC @ 0x40000000
2,830,520 UART:
2,830,536 UART: Running Caliptra FMC ...
2,830,944 UART:
2,831,174 UART: [fmc] Received command: 0x46574C44
2,832,000 UART:
2,832,016 UART: Running Caliptra ROM ...
2,832,424 UART:
2,832,479 UART: [state] CFI Enabled
2,835,115 UART: [state] LifecycleState = Unprovisioned
2,835,770 UART: [state] DebugLocked = No
2,836,504 UART: [state] WD Timer not started. Device not locked for debugging
2,837,614 UART: [kat] SHA2-256
3,641,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,293 UART: [kat] ++
3,645,445 UART: [kat] sha1
3,649,583 UART: [kat] SHA2-256
3,651,523 UART: [kat] SHA2-384
3,654,384 UART: [kat] SHA2-512-ACC
3,656,284 UART: [kat] ECC-384
3,665,883 UART: [kat] HMAC-384Kdf
3,670,557 UART: [kat] LMS
3,918,869 UART: [kat] --
3,919,943 UART: [update-reset] ++
5,203,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,784 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,352,947 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,961 UART: [update-reset Success] --
5,361,370 >>> mbox cmd response: success
5,361,370 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,196 UART: [state] Locking Datavault
5,363,004 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,608 UART: [state] Locking ICCM
5,364,106 UART: [exit] Launching FMC @ 0x40000000
5,369,403 UART:
5,369,419 UART: Running Caliptra FMC ...
5,369,827 UART:
5,370,049 UART: [fmc] Received command: 0x1000000C
5,370,784 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,688 ready_for_fw is high
1,055,688 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,284 >>> mbox cmd response: success
2,646,057 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,186 UART:
2,652,202 UART: Running Caliptra FMC ...
2,652,610 UART:
2,652,840 UART: [fmc] Received command: 0x46574C44
5,064,881 >>> mbox cmd response: success
5,064,881 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,070,353 UART:
5,070,369 UART: Running Caliptra FMC ...
5,070,777 UART:
5,070,999 UART: [fmc] Received command: 0x1000000C
5,071,734 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 ready_for_fw is high
1,174,652 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,380 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,241 UART: [ldev] ++
1,209,409 UART: [ldev] CDI.KEYID = 6
1,209,773 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,215,545 UART: [ldev] Erasing FE.KEYID = 1
1,241,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,813 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,281,902 UART: [fwproc] Recv command 0x46574c44
1,282,635 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,288 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,743 >>> mbox cmd response: success
2,741,782 UART: [afmc] ++
2,741,950 UART: [afmc] CDI.KEYID = 6
2,742,313 UART: [afmc] SUBJECT.KEYID = 7
2,742,739 UART: [afmc] AUTHORITY.KEYID = 5
2,777,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,031 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,727 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,626 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,319 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,159 UART: [afmc] --
2,821,057 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,079 UART: [cold-reset] --
2,821,785 UART: [state] Locking Datavault
2,822,850 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,454 UART: [state] Locking ICCM
2,823,960 UART: [exit] Launching FMC @ 0x40000000
2,829,257 UART:
2,829,273 UART: Running Caliptra FMC ...
2,829,681 UART:
2,829,911 UART: [fmc] Received command: 0x46574C44
2,830,737 UART:
2,830,753 UART: Running Caliptra ROM ...
2,831,161 UART:
2,831,303 UART: [state] CFI Enabled
2,834,103 UART: [state] LifecycleState = Unprovisioned
2,834,758 UART: [state] DebugLocked = No
2,835,382 UART: [state] WD Timer not started. Device not locked for debugging
2,836,734 UART: [kat] SHA2-256
3,640,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,413 UART: [kat] ++
3,644,565 UART: [kat] sha1
3,648,817 UART: [kat] SHA2-256
3,650,757 UART: [kat] SHA2-384
3,653,526 UART: [kat] SHA2-512-ACC
3,655,426 UART: [kat] ECC-384
3,665,355 UART: [kat] HMAC-384Kdf
3,669,827 UART: [kat] LMS
3,918,139 UART: [kat] --
3,918,975 UART: [update-reset] ++
5,203,465 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,432 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,352,815 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,829 UART: [update-reset Success] --
5,361,238 >>> mbox cmd response: success
5,361,238 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,580 UART: [state] Locking Datavault
5,362,324 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,928 UART: [state] Locking ICCM
5,363,518 UART: [exit] Launching FMC @ 0x40000000
5,368,815 UART:
5,368,831 UART: Running Caliptra FMC ...
5,369,239 UART:
5,369,461 UART: [fmc] Received command: 0x1000000C
5,370,196 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,837 ready_for_fw is high
1,056,837 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,957 >>> mbox cmd response: success
2,649,482 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,655,615 UART:
2,655,631 UART: Running Caliptra FMC ...
2,656,039 UART:
2,656,269 UART: [fmc] Received command: 0x46574C44
5,067,885 >>> mbox cmd response: success
5,067,885 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,073,785 UART:
5,073,801 UART: Running Caliptra FMC ...
5,074,209 UART:
5,074,431 UART: [fmc] Received command: 0x1000000C
5,075,166 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,132 UART:
192,489 UART: Running Caliptra ROM ...
193,680 UART:
193,853 UART: [state] CFI Enabled
266,366 UART: [state] LifecycleState = Unprovisioned
268,775 UART: [state] DebugLocked = No
271,086 UART: [state] WD Timer not started. Device not locked for debugging
275,129 UART: [kat] SHA2-256
457,049 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,637 UART: [kat] ++
469,162 UART: [kat] sha1
481,035 UART: [kat] SHA2-256
484,035 UART: [kat] SHA2-384
490,590 UART: [kat] SHA2-512-ACC
493,172 UART: [kat] ECC-384
3,778,743 UART: [kat] HMAC-384Kdf
3,802,490 UART: [kat] LMS
4,875,585 UART: [kat] --
4,877,899 UART: [cold-reset] ++
4,880,563 UART: [fht] FHT @ 0x50003400
4,890,688 UART: [idev] ++
4,891,399 UART: [idev] CDI.KEYID = 6
4,892,637 UART: [idev] SUBJECT.KEYID = 7
4,893,733 UART: [idev] UDS.KEYID = 0
4,894,667 ready_for_fw is high
4,894,852 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,035,277 UART: [idev] Erasing UDS.KEYID = 0
8,221,397 UART: [idev] Sha1 KeyId Algorithm
8,242,788 UART: [idev] --
8,246,066 UART: [ldev] ++
8,246,640 UART: [ldev] CDI.KEYID = 6
8,247,877 UART: [ldev] SUBJECT.KEYID = 5
8,249,031 UART: [ldev] AUTHORITY.KEYID = 7
8,250,259 UART: [ldev] FE.KEYID = 1
8,296,875 UART: [ldev] Erasing FE.KEYID = 1
11,630,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,924,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,940,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,956,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,972,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,993,506 UART: [ldev] --
13,997,641 UART: [fwproc] Wait for Commands...
14,000,818 UART: [fwproc] Recv command 0x46574c44
14,003,076 UART: [fwproc] Recv'd Img size: 111600 bytes
18,050,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,123,705 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,183,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,500,634 >>> mbox cmd response: success
18,504,531 UART: [afmc] ++
18,505,142 UART: [afmc] CDI.KEYID = 6
18,506,328 UART: [afmc] SUBJECT.KEYID = 7
18,507,401 UART: [afmc] AUTHORITY.KEYID = 5
21,859,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,163,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,166,167 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,182,301 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,198,429 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,214,274 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,236,397 UART: [afmc] --
26,297,779 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,463,578 UART: [cold-reset] --
26,464,535 UART: [state] Locking Datavault
26,465,705 UART: [state] Locking PCR0, PCR1 and PCR31
26,467,243 UART: [state] Locking ICCM
26,468,153 UART: [exit] Launching FMC @ 0x40000000
26,469,580 UART:
26,469,747 UART: Running Caliptra FMC ...
26,470,855 UART:
26,471,010 UART: [fmc] Received command: 0x46574C44
26,472,482 UART:
26,472,640 UART: Running Caliptra ROM ...
26,473,651 UART:
26,473,793 UART: [state] CFI Enabled
26,527,514 UART: [state] LifecycleState = Unprovisioned
26,529,442 UART: [state] DebugLocked = No
26,531,289 UART: [state] WD Timer not started. Device not locked for debugging
26,535,155 UART: [kat] SHA2-256
26,717,034 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,728,582 UART: [kat] ++
26,729,034 UART: [kat] sha1
26,740,842 UART: [kat] SHA2-256
26,743,852 UART: [kat] SHA2-384
26,749,722 UART: [kat] SHA2-512-ACC
26,752,341 UART: [kat] ECC-384
30,042,170 UART: [kat] HMAC-384Kdf
30,067,232 UART: [kat] LMS
31,140,358 UART: [kat] --
31,145,237 UART: [update-reset] ++
35,455,216 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,457,948 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,899,463 >>> mbox cmd response: success
35,899,854 UART: [update-reset] Copying MAN_2 To MAN_1
35,922,627 UART: [update-reset Success] --
35,929,668 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,087,020 UART: [state] Locking Datavault
36,088,253 UART: [state] Locking PCR0, PCR1 and PCR31
36,089,807 UART: [state] Locking ICCM
36,090,728 UART: [exit] Launching FMC @ 0x40000000
36,092,154 UART:
36,092,334 UART: Running Caliptra FMC ...
36,093,439 UART:
36,093,594 UART: [fmc] Received command: 0x1000000E
36,871,437 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
4,783,435 ready_for_fw is high
4,783,832 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,286,311 >>> mbox cmd response: success
26,013,684 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,179,418 UART:
26,179,839 UART: Running Caliptra FMC ...
26,180,997 UART:
26,181,167 UART: [fmc] Received command: 0x46574C44
35,495,637 >>> mbox cmd response: success
35,523,264 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,680,737 UART:
35,681,078 UART: Running Caliptra FMC ...
35,682,319 UART:
35,682,507 UART: [fmc] Received command: 0x1000000E
36,465,121 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,378 UART:
192,757 UART: Running Caliptra ROM ...
193,932 UART:
603,648 UART: [state] CFI Enabled
616,302 UART: [state] LifecycleState = Unprovisioned
618,686 UART: [state] DebugLocked = No
620,565 UART: [state] WD Timer not started. Device not locked for debugging
624,813 UART: [kat] SHA2-256
806,788 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,355 UART: [kat] ++
818,878 UART: [kat] sha1
829,257 UART: [kat] SHA2-256
832,258 UART: [kat] SHA2-384
839,453 UART: [kat] SHA2-512-ACC
842,028 UART: [kat] ECC-384
4,097,242 UART: [kat] HMAC-384Kdf
4,108,852 UART: [kat] LMS
5,182,039 UART: [kat] --
5,185,859 UART: [cold-reset] ++
5,187,396 UART: [fht] FHT @ 0x50003400
5,198,235 UART: [idev] ++
5,198,936 UART: [idev] CDI.KEYID = 6
5,200,109 UART: [idev] SUBJECT.KEYID = 7
5,201,564 UART: [idev] UDS.KEYID = 0
5,202,742 ready_for_fw is high
5,202,918 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,342,928 UART: [idev] Erasing UDS.KEYID = 0
8,492,684 UART: [idev] Sha1 KeyId Algorithm
8,514,936 UART: [idev] --
8,518,879 UART: [ldev] ++
8,519,449 UART: [ldev] CDI.KEYID = 6
8,520,606 UART: [ldev] SUBJECT.KEYID = 5
8,522,133 UART: [ldev] AUTHORITY.KEYID = 7
8,523,622 UART: [ldev] FE.KEYID = 1
8,534,258 UART: [ldev] Erasing FE.KEYID = 1
11,825,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,095 UART: [ldev] --
14,192,363 UART: [fwproc] Wait for Commands...
14,194,343 UART: [fwproc] Recv command 0x46574c44
14,196,645 UART: [fwproc] Recv'd Img size: 111600 bytes
18,243,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,321,594 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,381,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,697,838 >>> mbox cmd response: success
18,702,201 UART: [afmc] ++
18,702,841 UART: [afmc] CDI.KEYID = 6
18,703,974 UART: [afmc] SUBJECT.KEYID = 7
18,705,352 UART: [afmc] AUTHORITY.KEYID = 5
22,025,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,318,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,320,413 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,336,548 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,352,675 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,368,531 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,392,145 UART: [afmc] --
26,453,129 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,618,988 UART: [cold-reset] --
26,619,965 UART: [state] Locking Datavault
26,621,090 UART: [state] Locking PCR0, PCR1 and PCR31
26,622,636 UART: [state] Locking ICCM
26,623,540 UART: [exit] Launching FMC @ 0x40000000
26,625,939 UART:
26,626,187 UART: Running Caliptra FMC ...
26,627,230 UART:
26,627,379 UART: [fmc] Received command: 0x46574C44
26,628,853 UART:
26,629,007 UART: Running Caliptra ROM ...
26,630,111 UART:
26,630,260 UART: [state] CFI Enabled
26,636,574 UART: [state] LifecycleState = Unprovisioned
26,638,397 UART: [state] DebugLocked = No
26,640,166 UART: [state] WD Timer not started. Device not locked for debugging
26,644,244 UART: [kat] SHA2-256
26,826,194 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,837,720 UART: [kat] ++
26,838,319 UART: [kat] sha1
26,848,452 UART: [kat] SHA2-256
26,851,454 UART: [kat] SHA2-384
26,857,704 UART: [kat] SHA2-512-ACC
26,860,272 UART: [kat] ECC-384
30,118,137 UART: [kat] HMAC-384Kdf
30,129,567 UART: [kat] LMS
31,202,719 UART: [kat] --
31,208,024 UART: [update-reset] ++
35,512,295 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,515,892 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,957,480 >>> mbox cmd response: success
35,958,550 UART: [update-reset] Copying MAN_2 To MAN_1
35,981,435 UART: [update-reset Success] --
35,988,984 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,146,357 UART: [state] Locking Datavault
36,147,578 UART: [state] Locking PCR0, PCR1 and PCR31
36,149,041 UART: [state] Locking ICCM
36,150,017 UART: [exit] Launching FMC @ 0x40000000
36,151,453 UART:
36,151,615 UART: Running Caliptra FMC ...
36,152,706 UART:
36,152,853 UART: [fmc] Received command: 0x1000000E
36,930,771 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
5,093,278 ready_for_fw is high
5,093,687 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,501,172 >>> mbox cmd response: success
26,187,130 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,353,127 UART:
26,353,536 UART: Running Caliptra FMC ...
26,354,658 UART:
26,354,813 UART: [fmc] Received command: 0x46574C44
35,584,977 >>> mbox cmd response: success
35,612,265 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,769,667 UART:
35,769,990 UART: Running Caliptra FMC ...
35,771,196 UART:
35,771,354 UART: [fmc] Received command: 0x1000000E
36,554,062 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,049 UART:
192,419 UART: Running Caliptra ROM ...
193,597 UART:
193,748 UART: [state] CFI Enabled
262,905 UART: [state] LifecycleState = Unprovisioned
264,784 UART: [state] DebugLocked = No
267,444 UART: [state] WD Timer not started. Device not locked for debugging
270,909 UART: [kat] SHA2-256
450,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,657 UART: [kat] ++
462,186 UART: [kat] sha1
472,993 UART: [kat] SHA2-256
476,002 UART: [kat] SHA2-384
482,848 UART: [kat] SHA2-512-ACC
485,783 UART: [kat] ECC-384
2,950,754 UART: [kat] HMAC-384Kdf
2,972,250 UART: [kat] LMS
3,501,656 UART: [kat] --
3,508,422 UART: [cold-reset] ++
3,510,213 UART: [fht] FHT @ 0x50003400
3,522,205 UART: [idev] ++
3,522,773 UART: [idev] CDI.KEYID = 6
3,523,695 UART: [idev] SUBJECT.KEYID = 7
3,524,871 UART: [idev] UDS.KEYID = 0
3,525,793 ready_for_fw is high
3,525,989 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,666,795 UART: [idev] Erasing UDS.KEYID = 0
6,024,544 UART: [idev] Sha1 KeyId Algorithm
6,048,365 UART: [idev] --
6,050,716 UART: [ldev] ++
6,051,303 UART: [ldev] CDI.KEYID = 6
6,052,189 UART: [ldev] SUBJECT.KEYID = 5
6,053,320 UART: [ldev] AUTHORITY.KEYID = 7
6,054,659 UART: [ldev] FE.KEYID = 1
6,100,495 UART: [ldev] Erasing FE.KEYID = 1
8,603,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,499 UART: [ldev] --
10,414,385 UART: [fwproc] Wait for Commands...
10,416,261 UART: [fwproc] Recv command 0x46574c44
10,418,351 UART: [fwproc] Recv'd Img size: 111944 bytes
13,798,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,097 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,934,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,252,940 >>> mbox cmd response: success
14,257,448 UART: [afmc] ++
14,258,062 UART: [afmc] CDI.KEYID = 6
14,258,983 UART: [afmc] SUBJECT.KEYID = 7
14,260,147 UART: [afmc] AUTHORITY.KEYID = 5
16,782,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,360 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,524,448 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,540,502 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,556,163 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,578,369 UART: [afmc] --
20,641,110 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,807,348 UART: [cold-reset] --
20,808,307 UART: [state] Locking Datavault
20,809,458 UART: [state] Locking PCR0, PCR1 and PCR31
20,811,014 UART: [state] Locking ICCM
20,811,923 UART: [exit] Launching FMC @ 0x40000000
20,813,355 UART:
20,813,514 UART: Running Caliptra FMC ...
20,814,623 UART:
20,814,779 UART: [fmc] Received command: 0x46574C44
20,816,242 UART:
20,816,396 UART: Running Caliptra ROM ...
20,817,491 UART:
20,817,640 UART: [state] CFI Enabled
20,886,101 UART: [state] LifecycleState = Unprovisioned
20,887,980 UART: [state] DebugLocked = No
20,890,583 UART: [state] WD Timer not started. Device not locked for debugging
20,894,977 UART: [kat] SHA2-256
21,074,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,085,664 UART: [kat] ++
21,086,125 UART: [kat] sha1
21,096,954 UART: [kat] SHA2-256
21,100,021 UART: [kat] SHA2-384
21,105,097 UART: [kat] SHA2-512-ACC
21,108,041 UART: [kat] ECC-384
23,570,974 UART: [kat] HMAC-384Kdf
23,593,643 UART: [kat] LMS
24,123,104 UART: [kat] --
24,127,313 UART: [update-reset] ++
27,752,943 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,756,106 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,197,651 >>> mbox cmd response: success
28,199,554 UART: [update-reset] Copying MAN_2 To MAN_1
28,221,885 UART: [update-reset Success] --
28,229,038 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,386,423 UART: [state] Locking Datavault
28,387,643 UART: [state] Locking PCR0, PCR1 and PCR31
28,389,193 UART: [state] Locking ICCM
28,390,105 UART: [exit] Launching FMC @ 0x40000000
28,391,532 UART:
28,391,693 UART: Running Caliptra FMC ...
28,392,791 UART:
28,392,948 UART: [fmc] Received command: 0x1000000E
29,170,860 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,277 UART:
192,647 UART: Running Caliptra ROM ...
193,727 UART:
193,870 UART: [state] CFI Enabled
268,367 UART: [state] LifecycleState = Unprovisioned
270,285 UART: [state] DebugLocked = No
272,657 UART: [state] WD Timer not started. Device not locked for debugging
277,050 UART: [kat] SHA2-256
456,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,748 UART: [kat] ++
468,193 UART: [kat] sha1
480,268 UART: [kat] SHA2-256
483,273 UART: [kat] SHA2-384
490,470 UART: [kat] SHA2-512-ACC
493,423 UART: [kat] ECC-384
2,950,960 UART: [kat] HMAC-384Kdf
2,972,521 UART: [kat] LMS
3,502,024 UART: [kat] --
3,507,027 UART: [cold-reset] ++
3,509,390 UART: [fht] FHT @ 0x50003400
3,520,154 UART: [idev] ++
3,520,719 UART: [idev] CDI.KEYID = 6
3,521,754 UART: [idev] SUBJECT.KEYID = 7
3,522,864 UART: [idev] UDS.KEYID = 0
3,523,803 ready_for_fw is high
3,523,986 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,664,774 UART: [idev] Erasing UDS.KEYID = 0
6,029,978 UART: [idev] Sha1 KeyId Algorithm
6,052,538 UART: [idev] --
6,057,623 UART: [ldev] ++
6,058,215 UART: [ldev] CDI.KEYID = 6
6,059,139 UART: [ldev] SUBJECT.KEYID = 5
6,060,311 UART: [ldev] AUTHORITY.KEYID = 7
6,061,549 UART: [ldev] FE.KEYID = 1
6,103,157 UART: [ldev] Erasing FE.KEYID = 1
8,606,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,884 UART: [ldev] --
10,416,368 UART: [fwproc] Wait for Commands...
10,418,447 UART: [fwproc] Recv command 0x46574c44
10,420,551 UART: [fwproc] Recv'd Img size: 111944 bytes
13,785,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,855,493 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,915,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,233,878 >>> mbox cmd response: success
14,237,247 UART: [afmc] ++
14,237,854 UART: [afmc] CDI.KEYID = 6
14,238,744 UART: [afmc] SUBJECT.KEYID = 7
14,239,905 UART: [afmc] AUTHORITY.KEYID = 5
16,767,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,489,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,491,254 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,507,321 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,523,370 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,539,028 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,562,347 UART: [afmc] --
20,624,439 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,790,129 UART: [cold-reset] --
20,791,125 UART: [state] Locking Datavault
20,792,209 UART: [state] Locking PCR0, PCR1 and PCR31
20,793,761 UART: [state] Locking ICCM
20,794,684 UART: [exit] Launching FMC @ 0x40000000
20,796,115 UART:
20,796,275 UART: Running Caliptra FMC ...
20,797,379 UART:
20,797,540 UART: [fmc] Received command: 0x46574C44
20,798,918 UART:
20,799,061 UART: Running Caliptra ROM ...
20,800,163 UART:
20,800,339 UART: [state] CFI Enabled
20,853,671 UART: [state] LifecycleState = Unprovisioned
20,855,551 UART: [state] DebugLocked = No
20,857,259 UART: [state] WD Timer not started. Device not locked for debugging
20,861,490 UART: [kat] SHA2-256
21,040,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,052,194 UART: [kat] ++
21,052,656 UART: [kat] sha1
21,062,457 UART: [kat] SHA2-256
21,065,465 UART: [kat] SHA2-384
21,071,734 UART: [kat] SHA2-512-ACC
21,074,677 UART: [kat] ECC-384
23,533,556 UART: [kat] HMAC-384Kdf
23,558,361 UART: [kat] LMS
24,087,830 UART: [kat] --
24,093,633 UART: [update-reset] ++
27,720,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,724,090 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,165,682 >>> mbox cmd response: success
28,167,506 UART: [update-reset] Copying MAN_2 To MAN_1
28,189,791 UART: [update-reset Success] --
28,196,611 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,353,960 UART: [state] Locking Datavault
28,355,203 UART: [state] Locking PCR0, PCR1 and PCR31
28,356,756 UART: [state] Locking ICCM
28,357,663 UART: [exit] Launching FMC @ 0x40000000
28,359,088 UART:
28,359,254 UART: Running Caliptra FMC ...
28,360,354 UART:
28,360,510 UART: [fmc] Received command: 0x1000000E
29,138,383 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,360,640 ready_for_fw is high
3,361,032 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,007,273 >>> mbox cmd response: success
20,355,783 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,521,897 UART:
20,522,312 UART: Running Caliptra FMC ...
20,523,479 UART:
20,523,673 UART: [fmc] Received command: 0x46574C44
27,787,355 >>> mbox cmd response: success
27,814,345 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,971,749 UART:
27,972,073 UART: Running Caliptra FMC ...
27,973,283 UART:
27,973,452 UART: [fmc] Received command: 0x1000000E
28,756,139 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,482 UART:
192,839 UART: Running Caliptra ROM ...
193,923 UART:
603,528 UART: [state] CFI Enabled
614,915 UART: [state] LifecycleState = Unprovisioned
616,917 UART: [state] DebugLocked = No
618,637 UART: [state] WD Timer not started. Device not locked for debugging
622,329 UART: [kat] SHA2-256
801,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,999 UART: [kat] ++
813,446 UART: [kat] sha1
825,596 UART: [kat] SHA2-256
828,666 UART: [kat] SHA2-384
833,872 UART: [kat] SHA2-512-ACC
836,872 UART: [kat] ECC-384
3,280,061 UART: [kat] HMAC-384Kdf
3,292,557 UART: [kat] LMS
3,822,028 UART: [kat] --
3,824,602 UART: [cold-reset] ++
3,826,669 UART: [fht] FHT @ 0x50003400
3,836,435 UART: [idev] ++
3,837,005 UART: [idev] CDI.KEYID = 6
3,837,940 UART: [idev] SUBJECT.KEYID = 7
3,839,115 UART: [idev] UDS.KEYID = 0
3,840,085 ready_for_fw is high
3,840,275 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,980,868 UART: [idev] Erasing UDS.KEYID = 0
6,310,699 UART: [idev] Sha1 KeyId Algorithm
6,333,175 UART: [idev] --
6,337,330 UART: [ldev] ++
6,337,895 UART: [ldev] CDI.KEYID = 6
6,338,777 UART: [ldev] SUBJECT.KEYID = 5
6,339,984 UART: [ldev] AUTHORITY.KEYID = 7
6,341,214 UART: [ldev] FE.KEYID = 1
6,352,995 UART: [ldev] Erasing FE.KEYID = 1
8,825,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,730 UART: [ldev] --
10,618,569 UART: [fwproc] Wait for Commands...
10,620,333 UART: [fwproc] Recv command 0x46574c44
10,622,433 UART: [fwproc] Recv'd Img size: 111944 bytes
13,994,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,070,692 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,131,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,448,896 >>> mbox cmd response: success
14,452,826 UART: [afmc] ++
14,453,436 UART: [afmc] CDI.KEYID = 6
14,454,320 UART: [afmc] SUBJECT.KEYID = 7
14,455,480 UART: [afmc] AUTHORITY.KEYID = 5
16,955,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,679,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,681,095 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,697,194 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,713,191 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,728,897 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,751,457 UART: [afmc] --
20,811,932 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,977,573 UART: [cold-reset] --
20,978,523 UART: [state] Locking Datavault
20,979,603 UART: [state] Locking PCR0, PCR1 and PCR31
20,981,148 UART: [state] Locking ICCM
20,982,045 UART: [exit] Launching FMC @ 0x40000000
20,983,393 UART:
20,983,541 UART: Running Caliptra FMC ...
20,984,650 UART:
20,984,805 UART: [fmc] Received command: 0x46574C44
20,986,177 UART:
20,986,319 UART: Running Caliptra ROM ...
20,987,333 UART:
20,987,473 UART: [state] CFI Enabled
20,992,560 UART: [state] LifecycleState = Unprovisioned
20,994,389 UART: [state] DebugLocked = No
20,997,307 UART: [state] WD Timer not started. Device not locked for debugging
21,000,170 UART: [kat] SHA2-256
21,179,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,190,960 UART: [kat] ++
21,191,416 UART: [kat] sha1
21,201,719 UART: [kat] SHA2-256
21,204,741 UART: [kat] SHA2-384
21,212,019 UART: [kat] SHA2-512-ACC
21,214,957 UART: [kat] ECC-384
23,656,053 UART: [kat] HMAC-384Kdf
23,670,236 UART: [kat] LMS
24,199,732 UART: [kat] --
24,202,579 UART: [update-reset] ++
27,837,105 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,839,843 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,281,384 >>> mbox cmd response: success
28,281,779 UART: [update-reset] Copying MAN_2 To MAN_1
28,304,019 UART: [update-reset Success] --
28,311,036 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,468,443 UART: [state] Locking Datavault
28,469,692 UART: [state] Locking PCR0, PCR1 and PCR31
28,471,163 UART: [state] Locking ICCM
28,472,035 UART: [exit] Launching FMC @ 0x40000000
28,473,459 UART:
28,473,616 UART: Running Caliptra FMC ...
28,474,627 UART:
28,474,770 UART: [fmc] Received command: 0x1000000E
29,252,865 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,694,185 ready_for_fw is high
3,694,572 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,239,759 >>> mbox cmd response: success
20,526,065 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,691,821 UART:
20,692,228 UART: Running Caliptra FMC ...
20,693,337 UART:
20,693,491 UART: [fmc] Received command: 0x46574C44
27,855,632 >>> mbox cmd response: success
27,883,131 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,040,494 UART:
28,040,844 UART: Running Caliptra FMC ...
28,042,047 UART:
28,042,230 UART: [fmc] Received command: 0x1000000E
28,824,932 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,558 UART: [kat] HMAC-384Kdf
921,332 UART: [kat] LMS
1,169,644 UART: [kat] --
1,170,685 UART: [cold-reset] ++
1,171,253 UART: [fht] FHT @ 0x50003400
1,174,081 UART: [idev] ++
1,174,249 UART: [idev] CDI.KEYID = 6
1,174,610 UART: [idev] SUBJECT.KEYID = 7
1,175,035 UART: [idev] UDS.KEYID = 0
1,175,381 ready_for_fw is high
1,175,381 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,183,163 UART: [idev] Erasing UDS.KEYID = 0
1,199,763 UART: [idev] Sha1 KeyId Algorithm
1,208,643 UART: [idev] --
1,209,654 UART: [ldev] ++
1,209,822 UART: [ldev] CDI.KEYID = 6
1,210,186 UART: [ldev] SUBJECT.KEYID = 5
1,210,613 UART: [ldev] AUTHORITY.KEYID = 7
1,211,076 UART: [ldev] FE.KEYID = 1
1,216,482 UART: [ldev] Erasing FE.KEYID = 1
1,242,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,708 UART: [ldev] --
1,282,112 UART: [fwproc] Wait for Commands...
1,282,695 UART: [fwproc] Recv command 0x46574c44
1,283,428 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,659 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,228 >>> mbox cmd response: success
2,742,265 UART: [afmc] ++
2,742,433 UART: [afmc] CDI.KEYID = 6
2,742,796 UART: [afmc] SUBJECT.KEYID = 7
2,743,222 UART: [afmc] AUTHORITY.KEYID = 5
2,778,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,030 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,726 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,625 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,318 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,178 UART: [afmc] --
2,822,150 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,172 UART: [cold-reset] --
2,822,792 UART: [state] Locking Datavault
2,823,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,479 UART: [state] Locking ICCM
2,825,153 UART: [exit] Launching FMC @ 0x40000000
2,830,450 UART:
2,830,466 UART: Running Caliptra FMC ...
2,830,874 UART:
2,831,104 UART: [fmc] Received command: 0x46574C44
2,831,930 UART:
2,831,946 UART: Running Caliptra ROM ...
2,832,354 UART:
2,832,409 UART: [state] CFI Enabled
2,834,895 UART: [state] LifecycleState = Unprovisioned
2,835,550 UART: [state] DebugLocked = No
2,836,050 UART: [state] WD Timer not started. Device not locked for debugging
2,837,192 UART: [kat] SHA2-256
3,640,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,871 UART: [kat] ++
3,645,023 UART: [kat] sha1
3,649,207 UART: [kat] SHA2-256
3,651,147 UART: [kat] SHA2-384
3,653,896 UART: [kat] SHA2-512-ACC
3,655,796 UART: [kat] ECC-384
3,665,183 UART: [kat] HMAC-384Kdf
3,669,873 UART: [kat] LMS
3,918,185 UART: [kat] --
3,919,149 UART: [update-reset] ++
5,423,992 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,071 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,845 >>> mbox cmd response: success
5,602,126 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,140 UART: [update-reset Success] --
5,610,549 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,135 UART: [state] Locking Datavault
5,611,911 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,515 UART: [state] Locking ICCM
5,613,009 UART: [exit] Launching FMC @ 0x40000000
5,618,306 UART:
5,618,322 UART: Running Caliptra FMC ...
5,618,730 UART:
5,618,952 UART: [fmc] Received command: 0x1000000E
5,964,006 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,558 ready_for_fw is high
1,055,558 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,020 >>> mbox cmd response: success
2,647,961 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,654,138 UART:
2,654,154 UART: Running Caliptra FMC ...
2,654,562 UART:
2,654,792 UART: [fmc] Received command: 0x46574C44
5,304,768 >>> mbox cmd response: success
5,312,420 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,318,248 UART:
5,318,264 UART: Running Caliptra FMC ...
5,318,672 UART:
5,318,894 UART: [fmc] Received command: 0x1000000E
5,663,948 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,559 UART: [kat] LMS
1,169,871 UART: [kat] --
1,170,768 UART: [cold-reset] ++
1,171,128 UART: [fht] FHT @ 0x50003400
1,173,948 UART: [idev] ++
1,174,116 UART: [idev] CDI.KEYID = 6
1,174,477 UART: [idev] SUBJECT.KEYID = 7
1,174,902 UART: [idev] UDS.KEYID = 0
1,175,248 ready_for_fw is high
1,175,248 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,183,244 UART: [idev] Erasing UDS.KEYID = 0
1,200,580 UART: [idev] Sha1 KeyId Algorithm
1,209,474 UART: [idev] --
1,210,543 UART: [ldev] ++
1,210,711 UART: [ldev] CDI.KEYID = 6
1,211,075 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,421 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,679 UART: [ldev] --
1,283,145 UART: [fwproc] Wait for Commands...
1,283,906 UART: [fwproc] Recv command 0x46574c44
1,284,639 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,914 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,743,433 >>> mbox cmd response: success
2,744,670 UART: [afmc] ++
2,744,838 UART: [afmc] CDI.KEYID = 6
2,745,201 UART: [afmc] SUBJECT.KEYID = 7
2,745,627 UART: [afmc] AUTHORITY.KEYID = 5
2,780,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,999 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,695 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,594 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,287 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,013 UART: [afmc] --
2,824,001 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,824,023 UART: [cold-reset] --
2,824,877 UART: [state] Locking Datavault
2,825,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,446 UART: [state] Locking ICCM
2,827,108 UART: [exit] Launching FMC @ 0x40000000
2,832,405 UART:
2,832,421 UART: Running Caliptra FMC ...
2,832,829 UART:
2,833,059 UART: [fmc] Received command: 0x46574C44
2,833,885 UART:
2,833,901 UART: Running Caliptra ROM ...
2,834,309 UART:
2,834,451 UART: [state] CFI Enabled
2,837,313 UART: [state] LifecycleState = Unprovisioned
2,837,968 UART: [state] DebugLocked = No
2,838,604 UART: [state] WD Timer not started. Device not locked for debugging
2,839,770 UART: [kat] SHA2-256
3,643,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,449 UART: [kat] ++
3,647,601 UART: [kat] sha1
3,651,939 UART: [kat] SHA2-256
3,653,879 UART: [kat] SHA2-384
3,656,450 UART: [kat] SHA2-512-ACC
3,658,350 UART: [kat] ECC-384
3,668,275 UART: [kat] HMAC-384Kdf
3,672,937 UART: [kat] LMS
3,921,249 UART: [kat] --
3,922,051 UART: [update-reset] ++
5,425,246 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,426,403 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,603,177 >>> mbox cmd response: success
5,603,436 UART: [update-reset] Copying MAN_2 To MAN_1
5,611,450 UART: [update-reset Success] --
5,611,859 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,612,517 UART: [state] Locking Datavault
5,613,407 UART: [state] Locking PCR0, PCR1 and PCR31
5,614,011 UART: [state] Locking ICCM
5,614,523 UART: [exit] Launching FMC @ 0x40000000
5,619,820 UART:
5,619,836 UART: Running Caliptra FMC ...
5,620,244 UART:
5,620,466 UART: [fmc] Received command: 0x1000000E
5,965,520 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 ready_for_fw is high
1,056,145 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,201 >>> mbox cmd response: success
2,646,934 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,031 UART:
2,653,047 UART: Running Caliptra FMC ...
2,653,455 UART:
2,653,685 UART: [fmc] Received command: 0x46574C44
5,307,048 >>> mbox cmd response: success
5,314,654 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,780 UART:
5,320,796 UART: Running Caliptra FMC ...
5,321,204 UART:
5,321,426 UART: [fmc] Received command: 0x1000000E
5,666,480 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 ready_for_fw is high
1,174,101 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,417 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,130 UART: [ldev] ++
1,208,298 UART: [ldev] CDI.KEYID = 6
1,208,662 UART: [ldev] SUBJECT.KEYID = 5
1,209,089 UART: [ldev] AUTHORITY.KEYID = 7
1,209,552 UART: [ldev] FE.KEYID = 1
1,214,618 UART: [ldev] Erasing FE.KEYID = 1
1,240,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,738 UART: [ldev] --
1,280,136 UART: [fwproc] Wait for Commands...
1,280,925 UART: [fwproc] Recv command 0x46574c44
1,281,658 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,179 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,758 >>> mbox cmd response: success
2,740,829 UART: [afmc] ++
2,740,997 UART: [afmc] CDI.KEYID = 6
2,741,360 UART: [afmc] SUBJECT.KEYID = 7
2,741,786 UART: [afmc] AUTHORITY.KEYID = 5
2,777,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,708 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,404 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,303 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,996 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,836 UART: [afmc] --
2,820,906 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,820,928 UART: [cold-reset] --
2,821,782 UART: [state] Locking Datavault
2,822,813 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,417 UART: [state] Locking ICCM
2,824,063 UART: [exit] Launching FMC @ 0x40000000
2,829,360 UART:
2,829,376 UART: Running Caliptra FMC ...
2,829,784 UART:
2,830,014 UART: [fmc] Received command: 0x46574C44
2,830,840 UART:
2,830,856 UART: Running Caliptra ROM ...
2,831,264 UART:
2,831,319 UART: [state] CFI Enabled
2,833,755 UART: [state] LifecycleState = Unprovisioned
2,834,410 UART: [state] DebugLocked = No
2,835,026 UART: [state] WD Timer not started. Device not locked for debugging
2,836,260 UART: [kat] SHA2-256
3,639,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,939 UART: [kat] ++
3,644,091 UART: [kat] sha1
3,648,329 UART: [kat] SHA2-256
3,650,269 UART: [kat] SHA2-384
3,653,018 UART: [kat] SHA2-512-ACC
3,654,918 UART: [kat] ECC-384
3,664,387 UART: [kat] HMAC-384Kdf
3,669,001 UART: [kat] LMS
3,917,313 UART: [kat] --
3,918,413 UART: [update-reset] ++
5,421,478 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,635 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,599,409 >>> mbox cmd response: success
5,599,618 UART: [update-reset] Copying MAN_2 To MAN_1
5,607,632 UART: [update-reset Success] --
5,608,041 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,608,631 UART: [state] Locking Datavault
5,609,631 UART: [state] Locking PCR0, PCR1 and PCR31
5,610,235 UART: [state] Locking ICCM
5,610,839 UART: [exit] Launching FMC @ 0x40000000
5,616,136 UART:
5,616,152 UART: Running Caliptra FMC ...
5,616,560 UART:
5,616,782 UART: [fmc] Received command: 0x1000000E
5,961,836 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,528 ready_for_fw is high
1,056,528 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,042 >>> mbox cmd response: success
2,647,479 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,856 UART:
2,653,872 UART: Running Caliptra FMC ...
2,654,280 UART:
2,654,510 UART: [fmc] Received command: 0x46574C44
5,306,812 >>> mbox cmd response: success
5,314,328 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,036 UART:
5,320,052 UART: Running Caliptra FMC ...
5,320,460 UART:
5,320,682 UART: [fmc] Received command: 0x1000000E
5,665,736 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,162 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,174,654 ready_for_fw is high
1,174,654 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,199,702 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,243,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,411 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,416 UART: [fwproc] Recv command 0x46574c44
1,284,149 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,670 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,281 >>> mbox cmd response: success
2,743,402 UART: [afmc] ++
2,743,570 UART: [afmc] CDI.KEYID = 6
2,743,933 UART: [afmc] SUBJECT.KEYID = 7
2,744,359 UART: [afmc] AUTHORITY.KEYID = 5
2,780,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,521 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,217 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,116 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,809 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,533 UART: [afmc] --
2,823,607 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,823,629 UART: [cold-reset] --
2,824,523 UART: [state] Locking Datavault
2,825,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,428 UART: [state] Locking ICCM
2,826,888 UART: [exit] Launching FMC @ 0x40000000
2,832,185 UART:
2,832,201 UART: Running Caliptra FMC ...
2,832,609 UART:
2,832,839 UART: [fmc] Received command: 0x46574C44
2,833,665 UART:
2,833,681 UART: Running Caliptra ROM ...
2,834,089 UART:
2,834,231 UART: [state] CFI Enabled
2,836,975 UART: [state] LifecycleState = Unprovisioned
2,837,630 UART: [state] DebugLocked = No
2,838,118 UART: [state] WD Timer not started. Device not locked for debugging
2,839,422 UART: [kat] SHA2-256
3,642,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,101 UART: [kat] ++
3,647,253 UART: [kat] sha1
3,651,555 UART: [kat] SHA2-256
3,653,495 UART: [kat] SHA2-384
3,656,208 UART: [kat] SHA2-512-ACC
3,658,108 UART: [kat] ECC-384
3,668,037 UART: [kat] HMAC-384Kdf
3,672,669 UART: [kat] LMS
3,920,981 UART: [kat] --
3,921,835 UART: [update-reset] ++
5,427,546 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,428,549 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,605,323 >>> mbox cmd response: success
5,605,528 UART: [update-reset] Copying MAN_2 To MAN_1
5,613,542 UART: [update-reset Success] --
5,613,951 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,614,587 UART: [state] Locking Datavault
5,615,595 UART: [state] Locking PCR0, PCR1 and PCR31
5,616,199 UART: [state] Locking ICCM
5,616,687 UART: [exit] Launching FMC @ 0x40000000
5,621,984 UART:
5,622,000 UART: Running Caliptra FMC ...
5,622,408 UART:
5,622,630 UART: [fmc] Received command: 0x1000000E
5,967,684 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,513 ready_for_fw is high
1,056,513 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,119 >>> mbox cmd response: success
2,648,242 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,654,423 UART:
2,654,439 UART: Running Caliptra FMC ...
2,654,847 UART:
2,655,077 UART: [fmc] Received command: 0x46574C44
5,306,870 >>> mbox cmd response: success
5,314,368 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,320,134 UART:
5,320,150 UART: Running Caliptra FMC ...
5,320,558 UART:
5,320,780 UART: [fmc] Received command: 0x1000000E
5,665,834 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,210 UART: [kat] SHA2-256
890,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,889 UART: [kat] ++
895,041 UART: [kat] sha1
899,345 UART: [kat] SHA2-256
901,285 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,675 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,757 UART: [idev] ++
1,172,925 UART: [idev] CDI.KEYID = 6
1,173,286 UART: [idev] SUBJECT.KEYID = 7
1,173,711 UART: [idev] UDS.KEYID = 0
1,174,057 ready_for_fw is high
1,174,057 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,197,871 UART: [idev] Sha1 KeyId Algorithm
1,206,951 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,660 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,034 UART: [ldev] --
1,280,474 UART: [fwproc] Wait for Commands...
1,281,207 UART: [fwproc] Recv command 0x46574c44
1,281,940 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,659 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,306 >>> mbox cmd response: success
2,742,571 UART: [afmc] ++
2,742,739 UART: [afmc] CDI.KEYID = 6
2,743,102 UART: [afmc] SUBJECT.KEYID = 7
2,743,528 UART: [afmc] AUTHORITY.KEYID = 5
2,778,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,292 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,988 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,887 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,580 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,576 UART: [afmc] --
2,822,544 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,822,566 UART: [cold-reset] --
2,823,096 UART: [state] Locking Datavault
2,824,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,725 UART: [state] Locking ICCM
2,825,223 UART: [exit] Launching FMC @ 0x40000000
2,830,520 UART:
2,830,536 UART: Running Caliptra FMC ...
2,830,944 UART:
2,831,174 UART: [fmc] Received command: 0x46574C44
2,832,000 UART:
2,832,016 UART: Running Caliptra ROM ...
2,832,424 UART:
2,832,479 UART: [state] CFI Enabled
2,835,195 UART: [state] LifecycleState = Unprovisioned
2,835,850 UART: [state] DebugLocked = No
2,836,380 UART: [state] WD Timer not started. Device not locked for debugging
2,837,606 UART: [kat] SHA2-256
3,641,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,285 UART: [kat] ++
3,645,437 UART: [kat] sha1
3,649,681 UART: [kat] SHA2-256
3,651,621 UART: [kat] SHA2-384
3,654,530 UART: [kat] SHA2-512-ACC
3,656,430 UART: [kat] ECC-384
3,666,519 UART: [kat] HMAC-384Kdf
3,671,203 UART: [kat] LMS
3,919,515 UART: [kat] --
3,920,381 UART: [update-reset] ++
5,424,748 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,765 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,539 >>> mbox cmd response: success
5,602,662 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,676 UART: [update-reset Success] --
5,611,085 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,569 UART: [state] Locking Datavault
5,612,297 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,901 UART: [state] Locking ICCM
5,613,567 UART: [exit] Launching FMC @ 0x40000000
5,618,864 UART:
5,618,880 UART: Running Caliptra FMC ...
5,619,288 UART:
5,619,510 UART: [fmc] Received command: 0x1000000E
5,964,564 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,318 ready_for_fw is high
1,056,318 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,582 >>> mbox cmd response: success
2,645,389 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,766 UART:
2,651,782 UART: Running Caliptra FMC ...
2,652,190 UART:
2,652,420 UART: [fmc] Received command: 0x46574C44
5,304,101 >>> mbox cmd response: success
5,311,821 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,943 UART:
5,317,959 UART: Running Caliptra FMC ...
5,318,367 UART:
5,318,589 UART: [fmc] Received command: 0x1000000E
5,663,643 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,931 UART: [state] LifecycleState = Unprovisioned
86,586 UART: [state] DebugLocked = No
87,194 UART: [state] WD Timer not started. Device not locked for debugging
88,493 UART: [kat] SHA2-256
892,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,172 UART: [kat] ++
896,324 UART: [kat] sha1
900,496 UART: [kat] SHA2-256
902,436 UART: [kat] SHA2-384
905,379 UART: [kat] SHA2-512-ACC
907,280 UART: [kat] ECC-384
916,975 UART: [kat] HMAC-384Kdf
921,637 UART: [kat] LMS
1,169,949 UART: [kat] --
1,170,602 UART: [cold-reset] ++
1,171,138 UART: [fht] FHT @ 0x50003400
1,173,916 UART: [idev] ++
1,174,084 UART: [idev] CDI.KEYID = 6
1,174,445 UART: [idev] SUBJECT.KEYID = 7
1,174,870 UART: [idev] UDS.KEYID = 0
1,175,216 ready_for_fw is high
1,175,216 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,231 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,302 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,739 >>> mbox cmd response: success
2,743,828 UART: [afmc] ++
2,743,996 UART: [afmc] CDI.KEYID = 6
2,744,359 UART: [afmc] SUBJECT.KEYID = 7
2,744,785 UART: [afmc] AUTHORITY.KEYID = 5
2,780,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,421 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,117 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,016 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,709 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,575 UART: [afmc] --
2,823,431 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,823,453 UART: [cold-reset] --
2,824,531 UART: [state] Locking Datavault
2,825,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,532 UART: [state] Locking ICCM
2,826,956 UART: [exit] Launching FMC @ 0x40000000
2,832,253 UART:
2,832,269 UART: Running Caliptra FMC ...
2,832,677 UART:
2,832,907 UART: [fmc] Received command: 0x46574C44
2,833,733 UART:
2,833,749 UART: Running Caliptra ROM ...
2,834,157 UART:
2,834,299 UART: [state] CFI Enabled
2,837,129 UART: [state] LifecycleState = Unprovisioned
2,837,784 UART: [state] DebugLocked = No
2,838,484 UART: [state] WD Timer not started. Device not locked for debugging
2,839,624 UART: [kat] SHA2-256
3,643,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,303 UART: [kat] ++
3,647,455 UART: [kat] sha1
3,651,531 UART: [kat] SHA2-256
3,653,471 UART: [kat] SHA2-384
3,656,096 UART: [kat] SHA2-512-ACC
3,657,996 UART: [kat] ECC-384
3,667,559 UART: [kat] HMAC-384Kdf
3,672,071 UART: [kat] LMS
3,920,383 UART: [kat] --
3,921,251 UART: [update-reset] ++
5,424,782 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,783 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,557 >>> mbox cmd response: success
5,602,846 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,860 UART: [update-reset Success] --
5,611,269 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,611,777 UART: [state] Locking Datavault
5,612,383 UART: [state] Locking PCR0, PCR1 and PCR31
5,612,987 UART: [state] Locking ICCM
5,613,435 UART: [exit] Launching FMC @ 0x40000000
5,618,732 UART:
5,618,748 UART: Running Caliptra FMC ...
5,619,156 UART:
5,619,378 UART: [fmc] Received command: 0x1000000E
5,964,432 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 ready_for_fw is high
1,056,269 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,453 >>> mbox cmd response: success
2,646,774 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,033 UART:
2,653,049 UART: Running Caliptra FMC ...
2,653,457 UART:
2,653,687 UART: [fmc] Received command: 0x46574C44
5,304,180 >>> mbox cmd response: success
5,311,718 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,310 UART:
5,317,326 UART: Running Caliptra FMC ...
5,317,734 UART:
5,317,956 UART: [fmc] Received command: 0x1000000E
5,663,010 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,361 UART:
192,808 UART: Running Caliptra ROM ...
193,941 UART:
194,090 UART: [state] CFI Enabled
256,272 UART: [state] LifecycleState = Unprovisioned
258,694 UART: [state] DebugLocked = No
259,901 UART: [state] WD Timer not started. Device not locked for debugging
265,144 UART: [kat] SHA2-256
447,061 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
458,599 UART: [kat] ++
459,094 UART: [kat] sha1
469,618 UART: [kat] SHA2-256
472,702 UART: [kat] SHA2-384
478,121 UART: [kat] SHA2-512-ACC
480,703 UART: [kat] ECC-384
3,767,855 UART: [kat] HMAC-384Kdf
3,796,286 UART: [kat] LMS
4,869,378 UART: [kat] --
4,872,804 UART: [cold-reset] ++
4,875,090 UART: [fht] FHT @ 0x50003400
4,886,916 UART: [idev] ++
4,887,617 UART: [idev] CDI.KEYID = 6
4,888,782 UART: [idev] SUBJECT.KEYID = 7
4,889,965 UART: [idev] UDS.KEYID = 0
4,890,864 ready_for_fw is high
4,891,064 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,025,687 UART: [idev] Erasing UDS.KEYID = 0
8,232,721 UART: [idev] Sha1 KeyId Algorithm
8,254,595 UART: [idev] --
8,258,154 UART: [ldev] ++
8,258,719 UART: [ldev] CDI.KEYID = 6
8,259,951 UART: [ldev] SUBJECT.KEYID = 5
8,261,114 UART: [ldev] AUTHORITY.KEYID = 7
8,262,263 UART: [ldev] FE.KEYID = 1
8,290,864 UART: [ldev] Erasing FE.KEYID = 1
11,627,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,936,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,952,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,968,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,984,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,006,460 UART: [ldev] --
14,010,647 UART: [fwproc] Wait for Commands...
14,012,383 UART: [fwproc] Recv command 0x46574c44
14,014,696 UART: [fwproc] Recv'd Img size: 106532 bytes
17,996,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,068,261 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,110,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,426,969 >>> mbox cmd response: success
18,430,703 UART: [afmc] ++
18,431,288 UART: [afmc] CDI.KEYID = 6
18,432,475 UART: [afmc] SUBJECT.KEYID = 7
18,433,633 UART: [afmc] AUTHORITY.KEYID = 5
21,793,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,088,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,090,486 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,106,521 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,122,551 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,138,653 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,160,302 UART: [afmc] --
24,163,636 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,164,597 UART: [cold-reset] --
24,167,469 UART: [state] Locking Datavault
24,171,382 UART: [state] Locking PCR0, PCR1 and PCR31
24,173,080 UART: [state] Locking ICCM
24,174,670 UART: [exit] Launching FMC @ 0x40000000
24,183,285 UART:
24,183,526 UART: Running Caliptra FMC ...
24,184,549 UART:
24,184,696 UART: [fmc] Received command: 0x10000004
24,186,153 UART:
24,186,305 UART: Running Caliptra ROM ...
24,187,316 UART:
24,187,457 UART: [state] CFI Enabled
24,188,333 >>> mbox cmd response: success
24,254,607 UART: [state] LifecycleState = Unprovisioned
24,256,537 UART: [state] DebugLocked = No
24,257,952 UART: [state] WD Timer not started. Device not locked for debugging
24,263,098 UART: [kat] SHA2-256
24,444,994 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,456,565 UART: [kat] ++
24,457,104 UART: [kat] sha1
24,466,321 UART: [kat] SHA2-256
24,469,389 UART: [kat] SHA2-384
24,475,746 UART: [kat] SHA2-512-ACC
24,478,363 UART: [kat] ECC-384
27,764,207 UART: [kat] HMAC-384Kdf
27,790,695 UART: [kat] LMS
28,863,855 UART: [kat] --
28,869,346 UART: [update-reset] ++
28,870,442 UART: Failed To Get Mailbox Txn
28,872,549 UART: ROM Non-Fatal Error: 0x01040004
28,874,803 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,875,458 UART: [state] Locking Datavault
28,877,907 UART: [state] Locking PCR0, PCR1 and PCR31
28,880,104 UART: [state] Locking ICCM
28,881,400 UART: [exit] Launching FMC @ 0x40000000
28,890,074 UART:
28,890,308 UART: Running Caliptra FMC ...
28,891,354 UART:
28,891,503 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,893,130 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
4,794,734 ready_for_fw is high
4,795,147 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,214,345 >>> mbox cmd response: success
23,884,763 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
23,898,779 UART:
23,899,125 UART: Running Caliptra FMC ...
23,900,398 UART:
23,900,564 UART: [fmc] Received command: 0x10000004
23,902,100 >>> mbox cmd response: success
28,478,713 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,489,966 UART:
28,490,257 UART: Running Caliptra FMC ...
28,491,430 UART:
28,491,595 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,493,241 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,344 UART:
192,732 UART: Running Caliptra ROM ...
193,855 UART:
603,462 UART: [state] CFI Enabled
617,329 UART: [state] LifecycleState = Unprovisioned
619,629 UART: [state] DebugLocked = No
621,866 UART: [state] WD Timer not started. Device not locked for debugging
626,242 UART: [kat] SHA2-256
808,182 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,747 UART: [kat] ++
820,353 UART: [kat] sha1
829,599 UART: [kat] SHA2-256
832,599 UART: [kat] SHA2-384
838,941 UART: [kat] SHA2-512-ACC
841,588 UART: [kat] ECC-384
4,097,974 UART: [kat] HMAC-384Kdf
4,108,652 UART: [kat] LMS
5,181,799 UART: [kat] --
5,186,306 UART: [cold-reset] ++
5,187,741 UART: [fht] FHT @ 0x50003400
5,198,499 UART: [idev] ++
5,199,195 UART: [idev] CDI.KEYID = 6
5,200,284 UART: [idev] SUBJECT.KEYID = 7
5,201,802 UART: [idev] UDS.KEYID = 0
5,202,979 ready_for_fw is high
5,203,152 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,336,973 UART: [idev] Erasing UDS.KEYID = 0
8,492,603 UART: [idev] Sha1 KeyId Algorithm
8,515,781 UART: [idev] --
8,519,891 UART: [ldev] ++
8,520,464 UART: [ldev] CDI.KEYID = 6
8,521,694 UART: [ldev] SUBJECT.KEYID = 5
8,523,116 UART: [ldev] AUTHORITY.KEYID = 7
8,524,692 UART: [ldev] FE.KEYID = 1
8,534,260 UART: [ldev] Erasing FE.KEYID = 1
11,822,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,731 UART: [ldev] --
14,188,368 UART: [fwproc] Wait for Commands...
14,190,630 UART: [fwproc] Recv command 0x46574c44
14,192,934 UART: [fwproc] Recv'd Img size: 106532 bytes
18,174,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,254,442 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,296,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,613,280 >>> mbox cmd response: success
18,616,614 UART: [afmc] ++
18,617,229 UART: [afmc] CDI.KEYID = 6
18,618,413 UART: [afmc] SUBJECT.KEYID = 7
18,619,508 UART: [afmc] AUTHORITY.KEYID = 5
21,940,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,235,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,238,174 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,254,235 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,270,262 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,286,344 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,309,420 UART: [afmc] --
24,313,783 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,314,781 UART: [cold-reset] --
24,317,972 UART: [state] Locking Datavault
24,324,574 UART: [state] Locking PCR0, PCR1 and PCR31
24,326,267 UART: [state] Locking ICCM
24,328,285 UART: [exit] Launching FMC @ 0x40000000
24,336,933 UART:
24,337,221 UART: Running Caliptra FMC ...
24,338,246 UART:
24,338,385 UART: [fmc] Received command: 0x10000004
24,339,838 UART:
24,339,985 UART: Running Caliptra ROM ...
24,341,078 UART:
24,341,227 UART: [state] CFI Enabled
24,342,180 >>> mbox cmd response: success
24,357,485 UART: [state] LifecycleState = Unprovisioned
24,359,367 UART: [state] DebugLocked = No
24,361,765 UART: [state] WD Timer not started. Device not locked for debugging
24,366,683 UART: [kat] SHA2-256
24,548,624 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,560,172 UART: [kat] ++
24,560,621 UART: [kat] sha1
24,570,980 UART: [kat] SHA2-256
24,574,007 UART: [kat] SHA2-384
24,579,455 UART: [kat] SHA2-512-ACC
24,582,032 UART: [kat] ECC-384
27,838,607 UART: [kat] HMAC-384Kdf
27,852,045 UART: [kat] LMS
28,925,101 UART: [kat] --
28,929,744 UART: [update-reset] ++
28,930,896 UART: Failed To Get Mailbox Txn
28,935,518 UART: ROM Non-Fatal Error: 0x01040004
28,937,874 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,939,231 UART: [state] Locking Datavault
28,942,058 UART: [state] Locking PCR0, PCR1 and PCR31
28,944,253 UART: [state] Locking ICCM
28,946,432 UART: [exit] Launching FMC @ 0x40000000
28,955,145 UART:
28,955,391 UART: Running Caliptra FMC ...
28,956,408 UART:
28,956,548 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,958,164 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
5,097,921 ready_for_fw is high
5,098,315 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,412,969 >>> mbox cmd response: success
24,034,573 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,050,269 UART:
24,050,636 UART: Running Caliptra FMC ...
24,051,888 UART:
24,052,052 UART: [fmc] Received command: 0x10000004
24,053,604 >>> mbox cmd response: success
28,543,225 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,552,376 UART:
28,552,642 UART: Running Caliptra FMC ...
28,553,851 UART:
28,554,013 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,555,673 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,243 UART:
192,628 UART: Running Caliptra ROM ...
193,808 UART:
193,959 UART: [state] CFI Enabled
266,152 UART: [state] LifecycleState = Unprovisioned
268,072 UART: [state] DebugLocked = No
269,330 UART: [state] WD Timer not started. Device not locked for debugging
272,927 UART: [kat] SHA2-256
452,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,649 UART: [kat] ++
464,182 UART: [kat] sha1
476,621 UART: [kat] SHA2-256
479,630 UART: [kat] SHA2-384
484,977 UART: [kat] SHA2-512-ACC
487,914 UART: [kat] ECC-384
2,947,966 UART: [kat] HMAC-384Kdf
2,972,845 UART: [kat] LMS
3,502,286 UART: [kat] --
3,507,024 UART: [cold-reset] ++
3,509,320 UART: [fht] FHT @ 0x50003400
3,521,366 UART: [idev] ++
3,521,940 UART: [idev] CDI.KEYID = 6
3,522,850 UART: [idev] SUBJECT.KEYID = 7
3,524,025 UART: [idev] UDS.KEYID = 0
3,525,083 ready_for_fw is high
3,525,280 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,659,743 UART: [idev] Erasing UDS.KEYID = 0
6,025,320 UART: [idev] Sha1 KeyId Algorithm
6,048,497 UART: [idev] --
6,053,002 UART: [ldev] ++
6,053,594 UART: [ldev] CDI.KEYID = 6
6,054,512 UART: [ldev] SUBJECT.KEYID = 5
6,055,673 UART: [ldev] AUTHORITY.KEYID = 7
6,056,984 UART: [ldev] FE.KEYID = 1
6,099,177 UART: [ldev] Erasing FE.KEYID = 1
8,603,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,370 UART: [ldev] --
10,413,338 UART: [fwproc] Wait for Commands...
10,416,508 UART: [fwproc] Recv command 0x46574c44
10,418,607 UART: [fwproc] Recv'd Img size: 106876 bytes
13,737,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,815,156 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,857,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,176,132 >>> mbox cmd response: success
14,181,041 UART: [afmc] ++
14,181,651 UART: [afmc] CDI.KEYID = 6
14,182,569 UART: [afmc] SUBJECT.KEYID = 7
14,183,732 UART: [afmc] AUTHORITY.KEYID = 5
16,725,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,445,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,447,436 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,463,477 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,479,351 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,495,298 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,517,104 UART: [afmc] --
18,521,470 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,522,339 UART: [cold-reset] --
18,525,361 UART: [state] Locking Datavault
18,529,985 UART: [state] Locking PCR0, PCR1 and PCR31
18,531,672 UART: [state] Locking ICCM
18,533,339 UART: [exit] Launching FMC @ 0x40000000
18,541,704 UART:
18,541,946 UART: Running Caliptra FMC ...
18,543,047 UART:
18,543,209 UART: [fmc] Received command: 0x10000004
18,544,664 UART:
18,544,818 UART: Running Caliptra ROM ...
18,545,915 UART:
18,546,068 UART: [state] CFI Enabled
18,547,031 >>> mbox cmd response: success
18,610,643 UART: [state] LifecycleState = Unprovisioned
18,612,519 UART: [state] DebugLocked = No
18,613,744 UART: [state] WD Timer not started. Device not locked for debugging
18,617,962 UART: [kat] SHA2-256
18,797,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,808,647 UART: [kat] ++
18,809,184 UART: [kat] sha1
18,821,118 UART: [kat] SHA2-256
18,824,182 UART: [kat] SHA2-384
18,829,674 UART: [kat] SHA2-512-ACC
18,832,622 UART: [kat] ECC-384
21,295,680 UART: [kat] HMAC-384Kdf
21,318,329 UART: [kat] LMS
21,847,759 UART: [kat] --
21,851,514 UART: [update-reset] ++
21,852,378 UART: Failed To Get Mailbox Txn
21,856,247 UART: ROM Non-Fatal Error: 0x01040004
21,858,336 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,858,928 UART: [state] Locking Datavault
21,862,232 UART: [state] Locking PCR0, PCR1 and PCR31
21,863,935 UART: [state] Locking ICCM
21,865,163 UART: [exit] Launching FMC @ 0x40000000
21,873,562 UART:
21,873,818 UART: Running Caliptra FMC ...
21,874,922 UART:
21,875,080 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,876,733 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,441 UART:
192,798 UART: Running Caliptra ROM ...
193,914 UART:
194,057 UART: [state] CFI Enabled
263,580 UART: [state] LifecycleState = Unprovisioned
265,515 UART: [state] DebugLocked = No
266,984 UART: [state] WD Timer not started. Device not locked for debugging
271,300 UART: [kat] SHA2-256
450,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,014 UART: [kat] ++
462,466 UART: [kat] sha1
473,578 UART: [kat] SHA2-256
476,558 UART: [kat] SHA2-384
483,763 UART: [kat] SHA2-512-ACC
486,722 UART: [kat] ECC-384
2,947,178 UART: [kat] HMAC-384Kdf
2,972,070 UART: [kat] LMS
3,501,519 UART: [kat] --
3,505,934 UART: [cold-reset] ++
3,507,319 UART: [fht] FHT @ 0x50003400
3,519,121 UART: [idev] ++
3,519,694 UART: [idev] CDI.KEYID = 6
3,520,624 UART: [idev] SUBJECT.KEYID = 7
3,521,801 UART: [idev] UDS.KEYID = 0
3,522,740 ready_for_fw is high
3,522,934 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,657,336 UART: [idev] Erasing UDS.KEYID = 0
6,031,255 UART: [idev] Sha1 KeyId Algorithm
6,052,710 UART: [idev] --
6,057,029 UART: [ldev] ++
6,057,625 UART: [ldev] CDI.KEYID = 6
6,058,539 UART: [ldev] SUBJECT.KEYID = 5
6,059,705 UART: [ldev] AUTHORITY.KEYID = 7
6,060,944 UART: [ldev] FE.KEYID = 1
6,101,085 UART: [ldev] Erasing FE.KEYID = 1
8,607,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,619 UART: [ldev] --
10,417,618 UART: [fwproc] Wait for Commands...
10,420,790 UART: [fwproc] Recv command 0x46574c44
10,422,884 UART: [fwproc] Recv'd Img size: 106876 bytes
13,731,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,806,657 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,849,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,167,587 >>> mbox cmd response: success
14,171,575 UART: [afmc] ++
14,172,181 UART: [afmc] CDI.KEYID = 6
14,173,065 UART: [afmc] SUBJECT.KEYID = 7
14,174,230 UART: [afmc] AUTHORITY.KEYID = 5
16,705,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,449,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,451,674 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,467,683 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,483,572 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,499,494 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,522,791 UART: [afmc] --
18,526,782 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,527,709 UART: [cold-reset] --
18,530,691 UART: [state] Locking Datavault
18,536,348 UART: [state] Locking PCR0, PCR1 and PCR31
18,538,000 UART: [state] Locking ICCM
18,539,804 UART: [exit] Launching FMC @ 0x40000000
18,548,171 UART:
18,548,446 UART: Running Caliptra FMC ...
18,549,474 UART:
18,549,621 UART: [fmc] Received command: 0x10000004
18,551,081 UART:
18,551,237 UART: Running Caliptra ROM ...
18,552,248 UART:
18,552,389 UART: [state] CFI Enabled
18,553,263 >>> mbox cmd response: success
18,613,067 UART: [state] LifecycleState = Unprovisioned
18,614,906 UART: [state] DebugLocked = No
18,616,228 UART: [state] WD Timer not started. Device not locked for debugging
18,620,600 UART: [kat] SHA2-256
18,799,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,811,320 UART: [kat] ++
18,811,777 UART: [kat] sha1
18,823,251 UART: [kat] SHA2-256
18,826,263 UART: [kat] SHA2-384
18,831,064 UART: [kat] SHA2-512-ACC
18,834,010 UART: [kat] ECC-384
21,296,081 UART: [kat] HMAC-384Kdf
21,319,272 UART: [kat] LMS
21,848,708 UART: [kat] --
21,851,977 UART: [update-reset] ++
21,852,840 UART: Failed To Get Mailbox Txn
21,854,881 UART: ROM Non-Fatal Error: 0x01040004
21,856,982 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,858,383 UART: [state] Locking Datavault
21,861,365 UART: [state] Locking PCR0, PCR1 and PCR31
21,863,029 UART: [state] Locking ICCM
21,865,132 UART: [exit] Launching FMC @ 0x40000000
21,873,528 UART:
21,873,761 UART: Running Caliptra FMC ...
21,874,861 UART:
21,875,016 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,876,659 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
3,383,031 ready_for_fw is high
3,383,506 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,958,896 >>> mbox cmd response: success
18,234,145 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,249,315 UART:
18,249,682 UART: Running Caliptra FMC ...
18,250,858 UART:
18,251,010 UART: [fmc] Received command: 0x10000004
18,252,569 >>> mbox cmd response: success
21,428,210 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,439,756 UART:
21,440,021 UART: Running Caliptra FMC ...
21,441,193 UART:
21,441,378 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,443,191 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,559 UART:
192,926 UART: Running Caliptra ROM ...
194,115 UART:
603,720 UART: [state] CFI Enabled
618,013 UART: [state] LifecycleState = Unprovisioned
619,896 UART: [state] DebugLocked = No
622,208 UART: [state] WD Timer not started. Device not locked for debugging
625,453 UART: [kat] SHA2-256
804,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,098 UART: [kat] ++
816,663 UART: [kat] sha1
827,832 UART: [kat] SHA2-256
830,830 UART: [kat] SHA2-384
836,181 UART: [kat] SHA2-512-ACC
839,120 UART: [kat] ECC-384
3,278,169 UART: [kat] HMAC-384Kdf
3,290,692 UART: [kat] LMS
3,820,181 UART: [kat] --
3,824,952 UART: [cold-reset] ++
3,827,088 UART: [fht] FHT @ 0x50003400
3,838,434 UART: [idev] ++
3,839,039 UART: [idev] CDI.KEYID = 6
3,839,958 UART: [idev] SUBJECT.KEYID = 7
3,841,136 UART: [idev] UDS.KEYID = 0
3,842,055 ready_for_fw is high
3,842,246 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,976,374 UART: [idev] Erasing UDS.KEYID = 0
6,317,263 UART: [idev] Sha1 KeyId Algorithm
6,339,387 UART: [idev] --
6,343,589 UART: [ldev] ++
6,344,152 UART: [ldev] CDI.KEYID = 6
6,345,114 UART: [ldev] SUBJECT.KEYID = 5
6,346,281 UART: [ldev] AUTHORITY.KEYID = 7
6,347,513 UART: [ldev] FE.KEYID = 1
6,358,646 UART: [ldev] Erasing FE.KEYID = 1
8,837,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,099 UART: [ldev] --
10,629,044 UART: [fwproc] Wait for Commands...
10,631,427 UART: [fwproc] Recv command 0x46574c44
10,633,668 UART: [fwproc] Recv'd Img size: 106876 bytes
13,945,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,021,459 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,064,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,382,218 >>> mbox cmd response: success
14,386,674 UART: [afmc] ++
14,387,261 UART: [afmc] CDI.KEYID = 6
14,388,167 UART: [afmc] SUBJECT.KEYID = 7
14,389,378 UART: [afmc] AUTHORITY.KEYID = 5
16,887,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,611,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,613,603 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,629,534 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,645,517 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,661,462 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,684,726 UART: [afmc] --
18,688,006 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,688,982 UART: [cold-reset] --
18,692,016 UART: [state] Locking Datavault
18,696,244 UART: [state] Locking PCR0, PCR1 and PCR31
18,697,889 UART: [state] Locking ICCM
18,700,039 UART: [exit] Launching FMC @ 0x40000000
18,708,435 UART:
18,708,666 UART: Running Caliptra FMC ...
18,709,764 UART:
18,709,926 UART: [fmc] Received command: 0x10000004
18,711,382 UART:
18,711,534 UART: Running Caliptra ROM ...
18,712,628 UART:
18,712,776 UART: [state] CFI Enabled
18,713,968 >>> mbox cmd response: success
18,725,640 UART: [state] LifecycleState = Unprovisioned
18,727,482 UART: [state] DebugLocked = No
18,728,963 UART: [state] WD Timer not started. Device not locked for debugging
18,731,979 UART: [kat] SHA2-256
18,911,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,922,702 UART: [kat] ++
18,923,247 UART: [kat] sha1
18,933,707 UART: [kat] SHA2-256
18,936,717 UART: [kat] SHA2-384
18,943,292 UART: [kat] SHA2-512-ACC
18,946,228 UART: [kat] ECC-384
21,388,704 UART: [kat] HMAC-384Kdf
21,401,459 UART: [kat] LMS
21,930,955 UART: [kat] --
21,935,169 UART: [update-reset] ++
21,936,088 UART: Failed To Get Mailbox Txn
21,939,865 UART: ROM Non-Fatal Error: 0x01040004
21,941,951 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,942,495 UART: [state] Locking Datavault
21,945,475 UART: [state] Locking PCR0, PCR1 and PCR31
21,947,117 UART: [state] Locking ICCM
21,949,375 UART: [exit] Launching FMC @ 0x40000000
21,957,766 UART:
21,957,995 UART: Running Caliptra FMC ...
21,959,091 UART:
21,959,248 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,960,872 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,581 writing to cptra_bootfsm_go
3,696,010 ready_for_fw is high
3,696,665 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,149,285 >>> mbox cmd response: success
18,387,656 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,402,709 UART:
18,403,075 UART: Running Caliptra FMC ...
18,404,334 UART:
18,404,503 UART: [fmc] Received command: 0x10000004
18,406,055 >>> mbox cmd response: success
21,488,302 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,498,468 UART:
21,498,761 UART: Running Caliptra FMC ...
21,499,846 UART:
21,499,995 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,501,641 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,352 UART: [kat] LMS
1,168,664 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,757 UART: [idev] ++
1,172,925 UART: [idev] CDI.KEYID = 6
1,173,286 UART: [idev] SUBJECT.KEYID = 7
1,173,711 UART: [idev] UDS.KEYID = 0
1,174,057 ready_for_fw is high
1,174,057 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,827 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,480 UART: [ldev] ++
1,208,648 UART: [ldev] CDI.KEYID = 6
1,209,012 UART: [ldev] SUBJECT.KEYID = 5
1,209,439 UART: [ldev] AUTHORITY.KEYID = 7
1,209,902 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,934 UART: [ldev] --
1,281,406 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,890 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,901 >>> mbox cmd response: success
2,675,118 UART: [afmc] ++
2,675,286 UART: [afmc] CDI.KEYID = 6
2,675,649 UART: [afmc] SUBJECT.KEYID = 7
2,676,075 UART: [afmc] AUTHORITY.KEYID = 5
2,711,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,826 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,546 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,439 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,132 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,893 UART: [afmc] --
2,753,891 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,753,913 UART: [cold-reset] --
2,754,921 UART: [state] Locking Datavault
2,755,998 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,602 UART: [state] Locking ICCM
2,757,042 UART: [exit] Launching FMC @ 0x40000000
2,762,339 UART:
2,762,355 UART: Running Caliptra FMC ...
2,762,763 UART:
2,762,901 UART: [fmc] Received command: 0x10000004
2,763,638 >>> mbox cmd response: success
2,763,734 UART:
2,763,750 UART: Running Caliptra ROM ...
2,764,158 UART:
2,764,213 UART: [state] CFI Enabled
2,767,105 UART: [state] LifecycleState = Unprovisioned
2,767,760 UART: [state] DebugLocked = No
2,768,262 UART: [state] WD Timer not started. Device not locked for debugging
2,769,434 UART: [kat] SHA2-256
3,572,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,113 UART: [kat] ++
3,577,265 UART: [kat] sha1
3,581,753 UART: [kat] SHA2-256
3,583,693 UART: [kat] SHA2-384
3,586,472 UART: [kat] SHA2-512-ACC
3,588,372 UART: [kat] ECC-384
3,598,321 UART: [kat] HMAC-384Kdf
3,602,913 UART: [kat] LMS
3,851,225 UART: [kat] --
3,852,051 UART: [update-reset] ++
3,852,362 UART: Failed To Get Mailbox Txn
3,853,377 UART: ROM Non-Fatal Error: 0x01040004
3,854,052 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,217 UART: [state] Locking Datavault
3,855,133 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,737 UART: [state] Locking ICCM
3,856,175 UART: [exit] Launching FMC @ 0x40000000
3,861,472 UART:
3,861,488 UART: Running Caliptra FMC ...
3,861,896 UART:
3,862,026 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,802 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,026 ready_for_fw is high
1,056,026 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,585 >>> mbox cmd response: success
2,580,137 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,242 UART:
2,586,258 UART: Running Caliptra FMC ...
2,586,666 UART:
2,586,804 UART: [fmc] Received command: 0x10000004
2,587,541 >>> mbox cmd response: success
3,559,813 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,565,080 UART:
3,565,096 UART: Running Caliptra FMC ...
3,565,504 UART:
3,565,634 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,566,410 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,062 UART: [kat] ++
895,214 UART: [kat] sha1
899,396 UART: [kat] SHA2-256
901,336 UART: [kat] SHA2-384
903,959 UART: [kat] SHA2-512-ACC
905,860 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,498 UART: [cold-reset] ++
1,169,942 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,174,052 ready_for_fw is high
1,174,052 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,528 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,686 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,491 UART: [ldev] Erasing FE.KEYID = 1
1,241,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,051 UART: [fwproc] Wait for Commands...
1,281,668 UART: [fwproc] Recv command 0x46574c44
1,282,401 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,763 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,826 >>> mbox cmd response: success
2,675,879 UART: [afmc] ++
2,676,047 UART: [afmc] CDI.KEYID = 6
2,676,410 UART: [afmc] SUBJECT.KEYID = 7
2,676,836 UART: [afmc] AUTHORITY.KEYID = 5
2,712,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,959 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,679 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,572 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,265 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,180 UART: [afmc] --
2,756,072 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,756,094 UART: [cold-reset] --
2,756,800 UART: [state] Locking Datavault
2,758,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,693 UART: [state] Locking ICCM
2,759,239 UART: [exit] Launching FMC @ 0x40000000
2,764,536 UART:
2,764,552 UART: Running Caliptra FMC ...
2,764,960 UART:
2,765,098 UART: [fmc] Received command: 0x10000004
2,765,835 >>> mbox cmd response: success
2,765,931 UART:
2,765,947 UART: Running Caliptra ROM ...
2,766,355 UART:
2,766,497 UART: [state] CFI Enabled
2,768,997 UART: [state] LifecycleState = Unprovisioned
2,769,652 UART: [state] DebugLocked = No
2,770,216 UART: [state] WD Timer not started. Device not locked for debugging
2,771,550 UART: [kat] SHA2-256
3,575,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,229 UART: [kat] ++
3,579,381 UART: [kat] sha1
3,583,451 UART: [kat] SHA2-256
3,585,391 UART: [kat] SHA2-384
3,588,054 UART: [kat] SHA2-512-ACC
3,589,954 UART: [kat] ECC-384
3,599,895 UART: [kat] HMAC-384Kdf
3,604,363 UART: [kat] LMS
3,852,675 UART: [kat] --
3,853,281 UART: [update-reset] ++
3,853,592 UART: Failed To Get Mailbox Txn
3,854,491 UART: ROM Non-Fatal Error: 0x01040004
3,855,166 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,855,249 UART: [state] Locking Datavault
3,856,049 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,653 UART: [state] Locking ICCM
3,857,255 UART: [exit] Launching FMC @ 0x40000000
3,862,552 UART:
3,862,568 UART: Running Caliptra FMC ...
3,862,976 UART:
3,863,106 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,882 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,851 ready_for_fw is high
1,055,851 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,902 >>> mbox cmd response: success
2,581,702 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,541 UART:
2,587,557 UART: Running Caliptra FMC ...
2,587,965 UART:
2,588,103 UART: [fmc] Received command: 0x10000004
2,588,840 >>> mbox cmd response: success
3,561,105 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,478 UART:
3,566,494 UART: Running Caliptra FMC ...
3,566,902 UART:
3,567,032 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,808 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,758 UART: [kat] HMAC-384Kdf
920,240 UART: [kat] LMS
1,168,552 UART: [kat] --
1,169,393 UART: [cold-reset] ++
1,169,919 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,173,839 ready_for_fw is high
1,173,839 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,390 UART: [ldev] ++
1,208,558 UART: [ldev] CDI.KEYID = 6
1,208,922 UART: [ldev] SUBJECT.KEYID = 5
1,209,349 UART: [ldev] AUTHORITY.KEYID = 7
1,209,812 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,241,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,558 UART: [ldev] --
1,280,894 UART: [fwproc] Wait for Commands...
1,281,623 UART: [fwproc] Recv command 0x46574c44
1,282,356 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,000 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,979 >>> mbox cmd response: success
2,676,000 UART: [afmc] ++
2,676,168 UART: [afmc] CDI.KEYID = 6
2,676,531 UART: [afmc] SUBJECT.KEYID = 7
2,676,957 UART: [afmc] AUTHORITY.KEYID = 5
2,711,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,834 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,554 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,447 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,140 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,979 UART: [afmc] --
2,755,017 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,039 UART: [cold-reset] --
2,755,997 UART: [state] Locking Datavault
2,757,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,972 UART: [state] Locking ICCM
2,758,564 UART: [exit] Launching FMC @ 0x40000000
2,763,861 UART:
2,763,877 UART: Running Caliptra FMC ...
2,764,285 UART:
2,764,423 UART: [fmc] Received command: 0x10000004
2,765,160 >>> mbox cmd response: success
2,765,256 UART:
2,765,272 UART: Running Caliptra ROM ...
2,765,680 UART:
2,765,735 UART: [state] CFI Enabled
2,768,769 UART: [state] LifecycleState = Unprovisioned
2,769,424 UART: [state] DebugLocked = No
2,770,116 UART: [state] WD Timer not started. Device not locked for debugging
2,771,440 UART: [kat] SHA2-256
3,574,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,119 UART: [kat] ++
3,579,271 UART: [kat] sha1
3,583,533 UART: [kat] SHA2-256
3,585,473 UART: [kat] SHA2-384
3,588,428 UART: [kat] SHA2-512-ACC
3,590,328 UART: [kat] ECC-384
3,599,759 UART: [kat] HMAC-384Kdf
3,604,393 UART: [kat] LMS
3,852,705 UART: [kat] --
3,853,349 UART: [update-reset] ++
3,853,660 UART: Failed To Get Mailbox Txn
3,854,373 UART: ROM Non-Fatal Error: 0x01040004
3,855,048 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,855,183 UART: [state] Locking Datavault
3,856,095 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,699 UART: [state] Locking ICCM
3,857,227 UART: [exit] Launching FMC @ 0x40000000
3,862,524 UART:
3,862,540 UART: Running Caliptra FMC ...
3,862,948 UART:
3,863,078 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,854 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,176 ready_for_fw is high
1,056,176 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,587 >>> mbox cmd response: success
2,579,461 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,585,940 UART:
2,585,956 UART: Running Caliptra FMC ...
2,586,364 UART:
2,586,502 UART: [fmc] Received command: 0x10000004
2,587,239 >>> mbox cmd response: success
3,559,871 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,565,414 UART:
3,565,430 UART: Running Caliptra FMC ...
3,565,838 UART:
3,565,968 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,566,744 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,947 UART: [state] LifecycleState = Unprovisioned
86,602 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,980 UART: [kat] ++
896,132 UART: [kat] sha1
900,520 UART: [kat] SHA2-256
902,460 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,174,992 ready_for_fw is high
1,174,992 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,626 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,366 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,689 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,185 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,425 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,284 >>> mbox cmd response: success
2,676,361 UART: [afmc] ++
2,676,529 UART: [afmc] CDI.KEYID = 6
2,676,892 UART: [afmc] SUBJECT.KEYID = 7
2,677,318 UART: [afmc] AUTHORITY.KEYID = 5
2,712,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,033 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,753 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,646 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,339 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,210 UART: [afmc] --
2,756,316 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,756,338 UART: [cold-reset] --
2,756,932 UART: [state] Locking Datavault
2,758,309 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,913 UART: [state] Locking ICCM
2,759,535 UART: [exit] Launching FMC @ 0x40000000
2,764,832 UART:
2,764,848 UART: Running Caliptra FMC ...
2,765,256 UART:
2,765,394 UART: [fmc] Received command: 0x10000004
2,766,131 >>> mbox cmd response: success
2,766,227 UART:
2,766,243 UART: Running Caliptra ROM ...
2,766,651 UART:
2,766,793 UART: [state] CFI Enabled
2,769,531 UART: [state] LifecycleState = Unprovisioned
2,770,186 UART: [state] DebugLocked = No
2,770,758 UART: [state] WD Timer not started. Device not locked for debugging
2,771,954 UART: [kat] SHA2-256
3,575,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,633 UART: [kat] ++
3,579,785 UART: [kat] sha1
3,583,919 UART: [kat] SHA2-256
3,585,859 UART: [kat] SHA2-384
3,588,610 UART: [kat] SHA2-512-ACC
3,590,510 UART: [kat] ECC-384
3,600,563 UART: [kat] HMAC-384Kdf
3,605,263 UART: [kat] LMS
3,853,575 UART: [kat] --
3,854,589 UART: [update-reset] ++
3,854,900 UART: Failed To Get Mailbox Txn
3,855,725 UART: ROM Non-Fatal Error: 0x01040004
3,856,400 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,856,709 UART: [state] Locking Datavault
3,857,445 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,049 UART: [state] Locking ICCM
3,858,583 UART: [exit] Launching FMC @ 0x40000000
3,863,880 UART:
3,863,896 UART: Running Caliptra FMC ...
3,864,304 UART:
3,864,434 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,865,210 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 ready_for_fw is high
1,056,251 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,960 >>> mbox cmd response: success
2,579,724 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,585,403 UART:
2,585,419 UART: Running Caliptra FMC ...
2,585,827 UART:
2,585,965 UART: [fmc] Received command: 0x10000004
2,586,702 >>> mbox cmd response: success
3,559,135 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,700 UART:
3,564,716 UART: Running Caliptra FMC ...
3,565,124 UART:
3,565,254 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,566,030 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,491 UART: [idev] ++
1,172,659 UART: [idev] CDI.KEYID = 6
1,173,020 UART: [idev] SUBJECT.KEYID = 7
1,173,445 UART: [idev] UDS.KEYID = 0
1,173,791 ready_for_fw is high
1,173,791 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,287 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,207,111 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,240,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,030 UART: [ldev] --
1,279,420 UART: [fwproc] Wait for Commands...
1,280,059 UART: [fwproc] Recv command 0x46574c44
1,280,792 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,430 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,293 >>> mbox cmd response: success
2,675,396 UART: [afmc] ++
2,675,564 UART: [afmc] CDI.KEYID = 6
2,675,927 UART: [afmc] SUBJECT.KEYID = 7
2,676,353 UART: [afmc] AUTHORITY.KEYID = 5
2,712,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,274 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,994 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,887 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,580 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,341 UART: [afmc] --
2,755,387 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,755,409 UART: [cold-reset] --
2,756,375 UART: [state] Locking Datavault
2,757,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,168 UART: [state] Locking ICCM
2,758,838 UART: [exit] Launching FMC @ 0x40000000
2,764,135 UART:
2,764,151 UART: Running Caliptra FMC ...
2,764,559 UART:
2,764,697 UART: [fmc] Received command: 0x10000004
2,765,434 >>> mbox cmd response: success
2,765,530 UART:
2,765,546 UART: Running Caliptra ROM ...
2,765,954 UART:
2,766,009 UART: [state] CFI Enabled
2,768,115 UART: [state] LifecycleState = Unprovisioned
2,768,770 UART: [state] DebugLocked = No
2,769,382 UART: [state] WD Timer not started. Device not locked for debugging
2,770,542 UART: [kat] SHA2-256
3,574,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,221 UART: [kat] ++
3,578,373 UART: [kat] sha1
3,582,623 UART: [kat] SHA2-256
3,584,563 UART: [kat] SHA2-384
3,587,276 UART: [kat] SHA2-512-ACC
3,589,176 UART: [kat] ECC-384
3,599,163 UART: [kat] HMAC-384Kdf
3,603,807 UART: [kat] LMS
3,852,119 UART: [kat] --
3,852,751 UART: [update-reset] ++
3,853,062 UART: Failed To Get Mailbox Txn
3,853,885 UART: ROM Non-Fatal Error: 0x01040004
3,854,560 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,823 UART: [state] Locking Datavault
3,855,521 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,125 UART: [state] Locking ICCM
3,856,685 UART: [exit] Launching FMC @ 0x40000000
3,861,982 UART:
3,861,998 UART: Running Caliptra FMC ...
3,862,406 UART:
3,862,536 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,312 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,936 ready_for_fw is high
1,055,936 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,522,509 >>> mbox cmd response: success
2,577,923 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,584,114 UART:
2,584,130 UART: Running Caliptra FMC ...
2,584,538 UART:
2,584,676 UART: [fmc] Received command: 0x10000004
2,585,413 >>> mbox cmd response: success
3,556,687 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,562,170 UART:
3,562,186 UART: Running Caliptra FMC ...
3,562,594 UART:
3,562,724 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,563,500 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,174,816 ready_for_fw is high
1,174,816 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,636 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,445 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,187 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,633 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,883 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,858 >>> mbox cmd response: success
2,677,117 UART: [afmc] ++
2,677,285 UART: [afmc] CDI.KEYID = 6
2,677,648 UART: [afmc] SUBJECT.KEYID = 7
2,678,074 UART: [afmc] AUTHORITY.KEYID = 5
2,713,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,763 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,483 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,376 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,069 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,990 UART: [afmc] --
2,756,872 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,756,894 UART: [cold-reset] --
2,757,544 UART: [state] Locking Datavault
2,758,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,097 UART: [state] Locking ICCM
2,759,645 UART: [exit] Launching FMC @ 0x40000000
2,764,942 UART:
2,764,958 UART: Running Caliptra FMC ...
2,765,366 UART:
2,765,504 UART: [fmc] Received command: 0x10000004
2,766,241 >>> mbox cmd response: success
2,766,337 UART:
2,766,353 UART: Running Caliptra ROM ...
2,766,761 UART:
2,766,903 UART: [state] CFI Enabled
2,769,479 UART: [state] LifecycleState = Unprovisioned
2,770,134 UART: [state] DebugLocked = No
2,770,690 UART: [state] WD Timer not started. Device not locked for debugging
2,771,914 UART: [kat] SHA2-256
3,575,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,593 UART: [kat] ++
3,579,745 UART: [kat] sha1
3,583,967 UART: [kat] SHA2-256
3,585,907 UART: [kat] SHA2-384
3,588,724 UART: [kat] SHA2-512-ACC
3,590,624 UART: [kat] ECC-384
3,600,137 UART: [kat] HMAC-384Kdf
3,604,831 UART: [kat] LMS
3,853,143 UART: [kat] --
3,854,305 UART: [update-reset] ++
3,854,616 UART: Failed To Get Mailbox Txn
3,855,535 UART: ROM Non-Fatal Error: 0x01040004
3,856,210 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,856,375 UART: [state] Locking Datavault
3,857,133 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,737 UART: [state] Locking ICCM
3,858,261 UART: [exit] Launching FMC @ 0x40000000
3,863,558 UART:
3,863,574 UART: Running Caliptra FMC ...
3,863,982 UART:
3,864,112 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,864,888 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,099 ready_for_fw is high
1,057,099 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,526,216 >>> mbox cmd response: success
2,582,152 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,769 UART:
2,587,785 UART: Running Caliptra FMC ...
2,588,193 UART:
2,588,331 UART: [fmc] Received command: 0x10000004
2,589,068 >>> mbox cmd response: success
3,561,289 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,782 UART:
3,566,798 UART: Running Caliptra FMC ...
3,567,206 UART:
3,567,336 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,568,112 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,169 UART:
192,537 UART: Running Caliptra ROM ...
193,678 UART:
193,826 UART: [state] CFI Enabled
263,470 UART: [state] LifecycleState = Unprovisioned
265,831 UART: [state] DebugLocked = No
267,289 UART: [state] WD Timer not started. Device not locked for debugging
272,204 UART: [kat] SHA2-256
454,192 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,662 UART: [kat] ++
466,266 UART: [kat] sha1
477,290 UART: [kat] SHA2-256
480,294 UART: [kat] SHA2-384
486,347 UART: [kat] SHA2-512-ACC
488,931 UART: [kat] ECC-384
3,774,661 UART: [kat] HMAC-384Kdf
3,801,770 UART: [kat] LMS
4,874,943 UART: [kat] --
4,880,151 UART: [cold-reset] ++
4,881,514 UART: [fht] FHT @ 0x50003400
4,894,475 UART: [idev] ++
4,895,188 UART: [idev] CDI.KEYID = 6
4,896,360 UART: [idev] SUBJECT.KEYID = 7
4,897,537 UART: [idev] UDS.KEYID = 0
4,898,464 ready_for_fw is high
4,898,674 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,032,717 UART: [idev] Erasing UDS.KEYID = 0
8,244,528 UART: [idev] Sha1 KeyId Algorithm
8,265,754 UART: [idev] --
8,269,314 UART: [ldev] ++
8,270,084 UART: [ldev] CDI.KEYID = 6
8,271,063 UART: [ldev] SUBJECT.KEYID = 5
8,272,285 UART: [ldev] AUTHORITY.KEYID = 7
8,273,518 UART: [ldev] FE.KEYID = 1
8,318,570 UART: [ldev] Erasing FE.KEYID = 1
11,651,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,171 UART: [ldev] --
14,016,272 UART: [fwproc] Wait for Commands...
14,018,154 UART: [fwproc] Recv command 0x46574c44
14,020,466 UART: [fwproc] Recv'd Img size: 106532 bytes
17,999,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,072,162 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,114,610 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,431,266 >>> mbox cmd response: success
18,434,755 UART: [afmc] ++
18,435,363 UART: [afmc] CDI.KEYID = 6
18,436,550 UART: [afmc] SUBJECT.KEYID = 7
18,437,707 UART: [afmc] AUTHORITY.KEYID = 5
21,799,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,097,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,099,737 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,115,776 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,131,848 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,147,919 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,171,241 UART: [afmc] --
24,175,218 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,176,143 UART: [cold-reset] --
24,179,556 UART: [state] Locking Datavault
24,183,363 UART: [state] Locking PCR0, PCR1 and PCR31
24,185,058 UART: [state] Locking ICCM
24,186,563 UART: [exit] Launching FMC @ 0x40000000
24,195,192 UART:
24,195,475 UART: Running Caliptra FMC ...
24,196,583 UART:
24,196,742 UART: [fmc] Received command: 0x1000000B
24,198,196 UART:
24,198,351 UART: Running Caliptra ROM ...
24,199,447 UART:
24,199,601 UART: [state] CFI Enabled
24,259,029 UART: [state] LifecycleState = Unprovisioned
24,260,856 UART: [state] DebugLocked = No
24,263,420 UART: [state] WD Timer not started. Device not locked for debugging
24,268,515 UART: [kat] SHA2-256
24,450,410 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,461,932 UART: [kat] ++
24,462,531 UART: [kat] sha1
24,474,502 UART: [kat] SHA2-256
24,477,473 UART: [kat] SHA2-384
24,484,153 UART: [kat] SHA2-512-ACC
24,486,773 UART: [kat] ECC-384
27,772,658 UART: [kat] HMAC-384Kdf
27,798,820 UART: [kat] LMS
28,871,942 UART: [kat] --
28,878,366 UART: [update-reset] ++
28,879,458 UART: Invalid command 0x1000000b recv
28,883,332 UART: ROM Non-Fatal Error: 0x01040003
28,886,832 UART: [state] Locking Datavault
28,889,096 UART: [state] Locking PCR0, PCR1 and PCR31
28,891,297 UART: [state] Locking ICCM
28,894,009 UART: [exit] Launching FMC @ 0x40000000
28,902,681 UART:
28,902,930 UART: Running Caliptra FMC ...
28,904,097 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
4,781,737 ready_for_fw is high
4,782,113 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,203,466 >>> mbox cmd response: success
23,875,791 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
23,889,090 UART:
23,889,471 UART: Running Caliptra FMC ...
23,890,751 UART:
23,890,925 UART: [fmc] Received command: 0x1000000B
28,503,086 UART:
28,503,421 UART: Running Caliptra FMC ...
28,504,507 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,429 UART:
192,795 UART: Running Caliptra ROM ...
193,886 UART:
603,722 UART: [state] CFI Enabled
617,020 UART: [state] LifecycleState = Unprovisioned
619,399 UART: [state] DebugLocked = No
621,336 UART: [state] WD Timer not started. Device not locked for debugging
626,015 UART: [kat] SHA2-256
807,970 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,556 UART: [kat] ++
819,997 UART: [kat] sha1
830,528 UART: [kat] SHA2-256
833,569 UART: [kat] SHA2-384
838,419 UART: [kat] SHA2-512-ACC
841,064 UART: [kat] ECC-384
4,097,298 UART: [kat] HMAC-384Kdf
4,109,194 UART: [kat] LMS
5,182,338 UART: [kat] --
5,186,752 UART: [cold-reset] ++
5,189,415 UART: [fht] FHT @ 0x50003400
5,201,451 UART: [idev] ++
5,202,078 UART: [idev] CDI.KEYID = 6
5,203,245 UART: [idev] SUBJECT.KEYID = 7
5,204,779 UART: [idev] UDS.KEYID = 0
5,205,958 ready_for_fw is high
5,206,158 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,340,065 UART: [idev] Erasing UDS.KEYID = 0
8,492,129 UART: [idev] Sha1 KeyId Algorithm
8,514,352 UART: [idev] --
8,519,674 UART: [ldev] ++
8,520,256 UART: [ldev] CDI.KEYID = 6
8,521,407 UART: [ldev] SUBJECT.KEYID = 5
8,522,935 UART: [ldev] AUTHORITY.KEYID = 7
8,524,404 UART: [ldev] FE.KEYID = 1
8,537,041 UART: [ldev] Erasing FE.KEYID = 1
11,827,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,690 UART: [ldev] --
14,194,988 UART: [fwproc] Wait for Commands...
14,197,831 UART: [fwproc] Recv command 0x46574c44
14,200,129 UART: [fwproc] Recv'd Img size: 106532 bytes
18,187,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,262,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,305,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,621,958 >>> mbox cmd response: success
18,625,871 UART: [afmc] ++
18,626,459 UART: [afmc] CDI.KEYID = 6
18,627,688 UART: [afmc] SUBJECT.KEYID = 7
18,628,778 UART: [afmc] AUTHORITY.KEYID = 5
21,952,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,247,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,249,386 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,265,431 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,281,466 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,297,545 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,321,600 UART: [afmc] --
24,324,662 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,325,633 UART: [cold-reset] --
24,328,331 UART: [state] Locking Datavault
24,334,019 UART: [state] Locking PCR0, PCR1 and PCR31
24,335,721 UART: [state] Locking ICCM
24,338,728 UART: [exit] Launching FMC @ 0x40000000
24,347,352 UART:
24,347,625 UART: Running Caliptra FMC ...
24,348,728 UART:
24,348,876 UART: [fmc] Received command: 0x1000000B
24,350,244 UART:
24,350,378 UART: Running Caliptra ROM ...
24,351,485 UART:
24,351,631 UART: [state] CFI Enabled
24,368,415 UART: [state] LifecycleState = Unprovisioned
24,370,240 UART: [state] DebugLocked = No
24,372,530 UART: [state] WD Timer not started. Device not locked for debugging
24,376,643 UART: [kat] SHA2-256
24,558,590 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,570,136 UART: [kat] ++
24,570,675 UART: [kat] sha1
24,580,637 UART: [kat] SHA2-256
24,583,698 UART: [kat] SHA2-384
24,590,111 UART: [kat] SHA2-512-ACC
24,592,715 UART: [kat] ECC-384
27,848,048 UART: [kat] HMAC-384Kdf
27,859,904 UART: [kat] LMS
28,933,018 UART: [kat] --
28,937,773 UART: [update-reset] ++
28,938,912 UART: Invalid command 0x1000000b recv
28,942,970 UART: ROM Non-Fatal Error: 0x01040003
28,946,579 UART: [state] Locking Datavault
28,950,569 UART: [state] Locking PCR0, PCR1 and PCR31
28,952,768 UART: [state] Locking ICCM
28,955,342 UART: [exit] Launching FMC @ 0x40000000
28,963,982 UART:
28,964,219 UART: Running Caliptra FMC ...
28,965,385 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,104,522 ready_for_fw is high
5,104,914 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,419,581 >>> mbox cmd response: success
24,040,582 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,053,679 UART:
24,054,055 UART: Running Caliptra FMC ...
24,055,324 UART:
24,055,492 UART: [fmc] Received command: 0x1000000B
28,558,906 UART:
28,559,243 UART: Running Caliptra FMC ...
28,560,364 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,056 UART:
192,451 UART: Running Caliptra ROM ...
193,646 UART:
193,799 UART: [state] CFI Enabled
263,622 UART: [state] LifecycleState = Unprovisioned
265,548 UART: [state] DebugLocked = No
267,080 UART: [state] WD Timer not started. Device not locked for debugging
270,196 UART: [kat] SHA2-256
449,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,894 UART: [kat] ++
461,425 UART: [kat] sha1
473,651 UART: [kat] SHA2-256
476,651 UART: [kat] SHA2-384
483,134 UART: [kat] SHA2-512-ACC
486,070 UART: [kat] ECC-384
2,945,958 UART: [kat] HMAC-384Kdf
2,971,123 UART: [kat] LMS
3,500,594 UART: [kat] --
3,503,595 UART: [cold-reset] ++
3,505,241 UART: [fht] FHT @ 0x50003400
3,516,164 UART: [idev] ++
3,516,728 UART: [idev] CDI.KEYID = 6
3,517,714 UART: [idev] SUBJECT.KEYID = 7
3,518,893 UART: [idev] UDS.KEYID = 0
3,519,815 ready_for_fw is high
3,520,006 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,654,509 UART: [idev] Erasing UDS.KEYID = 0
6,026,980 UART: [idev] Sha1 KeyId Algorithm
6,051,151 UART: [idev] --
6,055,161 UART: [ldev] ++
6,055,733 UART: [ldev] CDI.KEYID = 6
6,056,659 UART: [ldev] SUBJECT.KEYID = 5
6,057,823 UART: [ldev] AUTHORITY.KEYID = 7
6,059,056 UART: [ldev] FE.KEYID = 1
6,099,037 UART: [ldev] Erasing FE.KEYID = 1
8,601,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,651 UART: [ldev] --
10,410,805 UART: [fwproc] Wait for Commands...
10,412,844 UART: [fwproc] Recv command 0x46574c44
10,415,028 UART: [fwproc] Recv'd Img size: 106876 bytes
13,726,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,800,282 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,842,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,161,748 >>> mbox cmd response: success
14,166,342 UART: [afmc] ++
14,166,936 UART: [afmc] CDI.KEYID = 6
14,167,847 UART: [afmc] SUBJECT.KEYID = 7
14,169,058 UART: [afmc] AUTHORITY.KEYID = 5
16,697,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,730 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,713 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,634 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,552 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,456 UART: [afmc] --
18,499,662 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,500,701 UART: [cold-reset] --
18,504,432 UART: [state] Locking Datavault
18,510,713 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,359 UART: [state] Locking ICCM
18,513,888 UART: [exit] Launching FMC @ 0x40000000
18,522,279 UART:
18,522,512 UART: Running Caliptra FMC ...
18,523,608 UART:
18,523,786 UART: [fmc] Received command: 0x1000000B
18,525,246 UART:
18,525,397 UART: Running Caliptra ROM ...
18,526,492 UART:
18,526,643 UART: [state] CFI Enabled
18,588,386 UART: [state] LifecycleState = Unprovisioned
18,590,263 UART: [state] DebugLocked = No
18,592,625 UART: [state] WD Timer not started. Device not locked for debugging
18,596,515 UART: [kat] SHA2-256
18,775,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,787,197 UART: [kat] ++
18,787,651 UART: [kat] sha1
18,799,017 UART: [kat] SHA2-256
18,802,085 UART: [kat] SHA2-384
18,808,717 UART: [kat] SHA2-512-ACC
18,811,659 UART: [kat] ECC-384
21,271,948 UART: [kat] HMAC-384Kdf
21,295,026 UART: [kat] LMS
21,824,516 UART: [kat] --
21,828,755 UART: [update-reset] ++
21,829,673 UART: Invalid command 0x1000000b recv
21,834,392 UART: ROM Non-Fatal Error: 0x01040003
21,836,821 UART: [state] Locking Datavault
21,840,806 UART: [state] Locking PCR0, PCR1 and PCR31
21,842,487 UART: [state] Locking ICCM
21,845,170 UART: [exit] Launching FMC @ 0x40000000
21,853,622 UART:
21,853,869 UART: Running Caliptra FMC ...
21,855,224 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,051 UART:
192,417 UART: Running Caliptra ROM ...
193,732 UART:
193,905 UART: [state] CFI Enabled
267,218 UART: [state] LifecycleState = Unprovisioned
269,093 UART: [state] DebugLocked = No
271,770 UART: [state] WD Timer not started. Device not locked for debugging
275,650 UART: [kat] SHA2-256
454,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,358 UART: [kat] ++
466,899 UART: [kat] sha1
478,065 UART: [kat] SHA2-256
481,148 UART: [kat] SHA2-384
487,774 UART: [kat] SHA2-512-ACC
490,716 UART: [kat] ECC-384
2,951,250 UART: [kat] HMAC-384Kdf
2,972,017 UART: [kat] LMS
3,501,472 UART: [kat] --
3,507,120 UART: [cold-reset] ++
3,508,210 UART: [fht] FHT @ 0x50003400
3,520,118 UART: [idev] ++
3,520,679 UART: [idev] CDI.KEYID = 6
3,521,577 UART: [idev] SUBJECT.KEYID = 7
3,522,755 UART: [idev] UDS.KEYID = 0
3,523,752 ready_for_fw is high
3,523,934 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,658,402 UART: [idev] Erasing UDS.KEYID = 0
6,027,212 UART: [idev] Sha1 KeyId Algorithm
6,049,248 UART: [idev] --
6,052,679 UART: [ldev] ++
6,053,256 UART: [ldev] CDI.KEYID = 6
6,054,142 UART: [ldev] SUBJECT.KEYID = 5
6,055,363 UART: [ldev] AUTHORITY.KEYID = 7
6,056,600 UART: [ldev] FE.KEYID = 1
6,099,897 UART: [ldev] Erasing FE.KEYID = 1
8,603,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,119 UART: [ldev] --
10,414,030 UART: [fwproc] Wait for Commands...
10,415,801 UART: [fwproc] Recv command 0x46574c44
10,417,840 UART: [fwproc] Recv'd Img size: 106876 bytes
13,722,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,794,380 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,836,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,155,169 >>> mbox cmd response: success
14,159,173 UART: [afmc] ++
14,159,764 UART: [afmc] CDI.KEYID = 6
14,160,676 UART: [afmc] SUBJECT.KEYID = 7
14,161,894 UART: [afmc] AUTHORITY.KEYID = 5
16,700,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,817 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,839 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,711 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,684 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,494,985 UART: [afmc] --
18,499,400 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,500,291 UART: [cold-reset] --
18,502,255 UART: [state] Locking Datavault
18,506,546 UART: [state] Locking PCR0, PCR1 and PCR31
18,508,192 UART: [state] Locking ICCM
18,510,960 UART: [exit] Launching FMC @ 0x40000000
18,519,355 UART:
18,519,604 UART: Running Caliptra FMC ...
18,520,629 UART:
18,520,774 UART: [fmc] Received command: 0x1000000B
18,522,235 UART:
18,522,406 UART: Running Caliptra ROM ...
18,523,420 UART:
18,523,561 UART: [state] CFI Enabled
18,590,395 UART: [state] LifecycleState = Unprovisioned
18,592,227 UART: [state] DebugLocked = No
18,594,415 UART: [state] WD Timer not started. Device not locked for debugging
18,597,724 UART: [kat] SHA2-256
18,776,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,788,376 UART: [kat] ++
18,788,831 UART: [kat] sha1
18,799,549 UART: [kat] SHA2-256
18,802,562 UART: [kat] SHA2-384
18,808,601 UART: [kat] SHA2-512-ACC
18,811,541 UART: [kat] ECC-384
21,270,516 UART: [kat] HMAC-384Kdf
21,294,296 UART: [kat] LMS
21,823,727 UART: [kat] --
21,826,571 UART: [update-reset] ++
21,827,490 UART: Invalid command 0x1000000b recv
21,831,334 UART: ROM Non-Fatal Error: 0x01040003
21,833,443 UART: [state] Locking Datavault
21,837,991 UART: [state] Locking PCR0, PCR1 and PCR31
21,839,692 UART: [state] Locking ICCM
21,841,736 UART: [exit] Launching FMC @ 0x40000000
21,850,109 UART:
21,850,359 UART: Running Caliptra FMC ...
21,851,506 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,379,995 ready_for_fw is high
3,380,385 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,920,332 >>> mbox cmd response: success
18,203,382 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,218,233 UART:
18,218,615 UART: Running Caliptra FMC ...
18,219,871 UART:
18,220,041 UART: [fmc] Received command: 0x1000000B
21,387,920 UART:
21,388,258 UART: Running Caliptra FMC ...
21,389,440 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,419 UART:
192,794 UART: Running Caliptra ROM ...
193,942 UART:
603,574 UART: [state] CFI Enabled
616,845 UART: [state] LifecycleState = Unprovisioned
618,696 UART: [state] DebugLocked = No
621,210 UART: [state] WD Timer not started. Device not locked for debugging
624,956 UART: [kat] SHA2-256
804,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,710 UART: [kat] ++
816,248 UART: [kat] sha1
826,203 UART: [kat] SHA2-256
829,207 UART: [kat] SHA2-384
834,480 UART: [kat] SHA2-512-ACC
837,411 UART: [kat] ECC-384
3,278,502 UART: [kat] HMAC-384Kdf
3,291,424 UART: [kat] LMS
3,820,946 UART: [kat] --
3,825,875 UART: [cold-reset] ++
3,827,760 UART: [fht] FHT @ 0x50003400
3,838,313 UART: [idev] ++
3,838,872 UART: [idev] CDI.KEYID = 6
3,839,898 UART: [idev] SUBJECT.KEYID = 7
3,840,993 UART: [idev] UDS.KEYID = 0
3,841,986 ready_for_fw is high
3,842,185 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,976,524 UART: [idev] Erasing UDS.KEYID = 0
6,313,020 UART: [idev] Sha1 KeyId Algorithm
6,336,948 UART: [idev] --
6,341,370 UART: [ldev] ++
6,341,938 UART: [ldev] CDI.KEYID = 6
6,342,845 UART: [ldev] SUBJECT.KEYID = 5
6,344,057 UART: [ldev] AUTHORITY.KEYID = 7
6,345,288 UART: [ldev] FE.KEYID = 1
6,354,851 UART: [ldev] Erasing FE.KEYID = 1
8,830,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,494 UART: [ldev] --
10,621,587 UART: [fwproc] Wait for Commands...
10,624,004 UART: [fwproc] Recv command 0x46574c44
10,626,099 UART: [fwproc] Recv'd Img size: 106876 bytes
13,936,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,149 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,051,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,368,947 >>> mbox cmd response: success
14,373,782 UART: [afmc] ++
14,374,367 UART: [afmc] CDI.KEYID = 6
14,375,276 UART: [afmc] SUBJECT.KEYID = 7
14,376,453 UART: [afmc] AUTHORITY.KEYID = 5
16,877,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,473 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,616,447 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,632,372 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,648,298 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,671,061 UART: [afmc] --
18,674,934 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,675,897 UART: [cold-reset] --
18,677,258 UART: [state] Locking Datavault
18,683,343 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,032 UART: [state] Locking ICCM
18,686,234 UART: [exit] Launching FMC @ 0x40000000
18,694,576 UART:
18,694,830 UART: Running Caliptra FMC ...
18,695,875 UART:
18,696,021 UART: [fmc] Received command: 0x1000000B
18,697,480 UART:
18,697,628 UART: Running Caliptra ROM ...
18,698,637 UART:
18,698,776 UART: [state] CFI Enabled
18,713,600 UART: [state] LifecycleState = Unprovisioned
18,715,478 UART: [state] DebugLocked = No
18,718,415 UART: [state] WD Timer not started. Device not locked for debugging
18,721,535 UART: [kat] SHA2-256
18,900,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,912,307 UART: [kat] ++
18,912,757 UART: [kat] sha1
18,924,338 UART: [kat] SHA2-256
18,927,400 UART: [kat] SHA2-384
18,933,252 UART: [kat] SHA2-512-ACC
18,936,214 UART: [kat] ECC-384
21,377,823 UART: [kat] HMAC-384Kdf
21,389,454 UART: [kat] LMS
21,918,953 UART: [kat] --
21,923,787 UART: [update-reset] ++
21,924,644 UART: Invalid command 0x1000000b recv
21,927,558 UART: ROM Non-Fatal Error: 0x01040003
21,930,649 UART: [state] Locking Datavault
21,933,934 UART: [state] Locking PCR0, PCR1 and PCR31
21,935,605 UART: [state] Locking ICCM
21,936,699 UART: [exit] Launching FMC @ 0x40000000
21,945,068 UART:
21,945,324 UART: Running Caliptra FMC ...
21,946,458 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,700,165 ready_for_fw is high
3,700,556 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,163,459 >>> mbox cmd response: success
18,393,468 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,407,219 UART:
18,407,574 UART: Running Caliptra FMC ...
18,408,807 UART:
18,408,977 UART: [fmc] Received command: 0x1000000B
21,507,341 UART:
21,507,674 UART: Running Caliptra FMC ...
21,508,789 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,174,041 ready_for_fw is high
1,174,041 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,731 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,478 UART: [fwproc] Wait for Commands...
1,281,061 UART: [fwproc] Recv command 0x46574c44
1,281,794 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,866 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,719 >>> mbox cmd response: success
2,675,850 UART: [afmc] ++
2,676,018 UART: [afmc] CDI.KEYID = 6
2,676,381 UART: [afmc] SUBJECT.KEYID = 7
2,676,807 UART: [afmc] AUTHORITY.KEYID = 5
2,712,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,288 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,008 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,901 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,594 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,447 UART: [afmc] --
2,756,447 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,469 UART: [cold-reset] --
2,757,221 UART: [state] Locking Datavault
2,758,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,998 UART: [state] Locking ICCM
2,759,426 UART: [exit] Launching FMC @ 0x40000000
2,764,723 UART:
2,764,739 UART: Running Caliptra FMC ...
2,765,147 UART:
2,765,285 UART: [fmc] Received command: 0x1000000B
2,766,117 UART:
2,766,133 UART: Running Caliptra ROM ...
2,766,541 UART:
2,766,596 UART: [state] CFI Enabled
2,768,968 UART: [state] LifecycleState = Unprovisioned
2,769,623 UART: [state] DebugLocked = No
2,770,247 UART: [state] WD Timer not started. Device not locked for debugging
2,771,447 UART: [kat] SHA2-256
3,574,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,126 UART: [kat] ++
3,579,278 UART: [kat] sha1
3,583,530 UART: [kat] SHA2-256
3,585,470 UART: [kat] SHA2-384
3,587,999 UART: [kat] SHA2-512-ACC
3,589,899 UART: [kat] ECC-384
3,599,474 UART: [kat] HMAC-384Kdf
3,604,218 UART: [kat] LMS
3,852,530 UART: [kat] --
3,853,226 UART: [update-reset] ++
3,853,543 UART: Invalid command 0x1000000b recv
3,854,479 UART: ROM Non-Fatal Error: 0x01040003
3,855,281 UART: [state] Locking Datavault
3,856,279 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,883 UART: [state] Locking ICCM
3,857,329 UART: [exit] Launching FMC @ 0x40000000
3,862,626 UART:
3,862,642 UART: Running Caliptra FMC ...
3,863,050 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,610 ready_for_fw is high
1,055,610 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,059 >>> mbox cmd response: success
2,579,993 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,306 UART:
2,586,322 UART: Running Caliptra FMC ...
2,586,730 UART:
2,586,868 UART: [fmc] Received command: 0x1000000B
3,565,077 UART:
3,565,093 UART: Running Caliptra FMC ...
3,565,501 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,843 UART: [kat] LMS
1,169,155 UART: [kat] --
1,170,056 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 ready_for_fw is high
1,174,348 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,056 UART: [idev] Sha1 KeyId Algorithm
1,207,968 UART: [idev] --
1,208,985 UART: [ldev] ++
1,209,153 UART: [ldev] CDI.KEYID = 6
1,209,517 UART: [ldev] SUBJECT.KEYID = 5
1,209,944 UART: [ldev] AUTHORITY.KEYID = 7
1,210,407 UART: [ldev] FE.KEYID = 1
1,215,763 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,091 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,731 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,772 >>> mbox cmd response: success
2,677,005 UART: [afmc] ++
2,677,173 UART: [afmc] CDI.KEYID = 6
2,677,536 UART: [afmc] SUBJECT.KEYID = 7
2,677,962 UART: [afmc] AUTHORITY.KEYID = 5
2,713,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,679 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,399 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,292 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,985 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,894 UART: [afmc] --
2,756,806 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,828 UART: [cold-reset] --
2,757,540 UART: [state] Locking Datavault
2,758,505 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,109 UART: [state] Locking ICCM
2,759,781 UART: [exit] Launching FMC @ 0x40000000
2,765,078 UART:
2,765,094 UART: Running Caliptra FMC ...
2,765,502 UART:
2,765,640 UART: [fmc] Received command: 0x1000000B
2,766,472 UART:
2,766,488 UART: Running Caliptra ROM ...
2,766,896 UART:
2,767,038 UART: [state] CFI Enabled
2,769,670 UART: [state] LifecycleState = Unprovisioned
2,770,325 UART: [state] DebugLocked = No
2,770,977 UART: [state] WD Timer not started. Device not locked for debugging
2,772,291 UART: [kat] SHA2-256
3,575,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,970 UART: [kat] ++
3,580,122 UART: [kat] sha1
3,584,352 UART: [kat] SHA2-256
3,586,292 UART: [kat] SHA2-384
3,588,875 UART: [kat] SHA2-512-ACC
3,590,775 UART: [kat] ECC-384
3,600,682 UART: [kat] HMAC-384Kdf
3,605,500 UART: [kat] LMS
3,853,812 UART: [kat] --
3,854,552 UART: [update-reset] ++
3,854,869 UART: Invalid command 0x1000000b recv
3,855,987 UART: ROM Non-Fatal Error: 0x01040003
3,856,899 UART: [state] Locking Datavault
3,857,549 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,153 UART: [state] Locking ICCM
3,858,739 UART: [exit] Launching FMC @ 0x40000000
3,864,036 UART:
3,864,052 UART: Running Caliptra FMC ...
3,864,460 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,095 ready_for_fw is high
1,056,095 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,072 >>> mbox cmd response: success
2,581,144 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,473 UART:
2,587,489 UART: Running Caliptra FMC ...
2,587,897 UART:
2,588,035 UART: [fmc] Received command: 0x1000000B
3,567,151 UART:
3,567,167 UART: Running Caliptra FMC ...
3,567,575 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,174,089 ready_for_fw is high
1,174,089 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,242,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,320 UART: [fwproc] Wait for Commands...
1,281,921 UART: [fwproc] Recv command 0x46574c44
1,282,654 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,016 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,071 >>> mbox cmd response: success
2,675,260 UART: [afmc] ++
2,675,428 UART: [afmc] CDI.KEYID = 6
2,675,791 UART: [afmc] SUBJECT.KEYID = 7
2,676,217 UART: [afmc] AUTHORITY.KEYID = 5
2,711,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,680 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,400 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,293 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,986 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,905 UART: [afmc] --
2,754,767 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,789 UART: [cold-reset] --
2,755,785 UART: [state] Locking Datavault
2,757,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,712 UART: [state] Locking ICCM
2,758,304 UART: [exit] Launching FMC @ 0x40000000
2,763,601 UART:
2,763,617 UART: Running Caliptra FMC ...
2,764,025 UART:
2,764,163 UART: [fmc] Received command: 0x1000000B
2,764,995 UART:
2,765,011 UART: Running Caliptra ROM ...
2,765,419 UART:
2,765,474 UART: [state] CFI Enabled
2,768,144 UART: [state] LifecycleState = Unprovisioned
2,768,799 UART: [state] DebugLocked = No
2,769,299 UART: [state] WD Timer not started. Device not locked for debugging
2,770,505 UART: [kat] SHA2-256
3,574,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,184 UART: [kat] ++
3,578,336 UART: [kat] sha1
3,582,570 UART: [kat] SHA2-256
3,584,510 UART: [kat] SHA2-384
3,587,281 UART: [kat] SHA2-512-ACC
3,589,181 UART: [kat] ECC-384
3,598,646 UART: [kat] HMAC-384Kdf
3,603,324 UART: [kat] LMS
3,851,636 UART: [kat] --
3,852,528 UART: [update-reset] ++
3,852,845 UART: Invalid command 0x1000000b recv
3,853,993 UART: ROM Non-Fatal Error: 0x01040003
3,854,829 UART: [state] Locking Datavault
3,855,489 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,093 UART: [state] Locking ICCM
3,856,659 UART: [exit] Launching FMC @ 0x40000000
3,861,956 UART:
3,861,972 UART: Running Caliptra FMC ...
3,862,380 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,610 ready_for_fw is high
1,056,610 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,763 >>> mbox cmd response: success
2,581,597 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,914 UART:
2,587,930 UART: Running Caliptra FMC ...
2,588,338 UART:
2,588,476 UART: [fmc] Received command: 0x1000000B
3,566,939 UART:
3,566,955 UART: Running Caliptra FMC ...
3,567,363 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,463 UART: [kat] HMAC-384Kdf
920,159 UART: [kat] LMS
1,168,471 UART: [kat] --
1,169,590 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,174,090 ready_for_fw is high
1,174,090 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,694 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,560 UART: [idev] --
1,208,577 UART: [ldev] ++
1,208,745 UART: [ldev] CDI.KEYID = 6
1,209,109 UART: [ldev] SUBJECT.KEYID = 5
1,209,536 UART: [ldev] AUTHORITY.KEYID = 7
1,209,999 UART: [ldev] FE.KEYID = 1
1,215,111 UART: [ldev] Erasing FE.KEYID = 1
1,241,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,041 UART: [ldev] --
1,280,499 UART: [fwproc] Wait for Commands...
1,281,280 UART: [fwproc] Recv command 0x46574c44
1,282,013 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,135 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,192 >>> mbox cmd response: success
2,674,343 UART: [afmc] ++
2,674,511 UART: [afmc] CDI.KEYID = 6
2,674,874 UART: [afmc] SUBJECT.KEYID = 7
2,675,300 UART: [afmc] AUTHORITY.KEYID = 5
2,710,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,151 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,871 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,764 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,457 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,382 UART: [afmc] --
2,754,444 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,466 UART: [cold-reset] --
2,755,292 UART: [state] Locking Datavault
2,756,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,253 UART: [state] Locking ICCM
2,757,749 UART: [exit] Launching FMC @ 0x40000000
2,763,046 UART:
2,763,062 UART: Running Caliptra FMC ...
2,763,470 UART:
2,763,608 UART: [fmc] Received command: 0x1000000B
2,764,440 UART:
2,764,456 UART: Running Caliptra ROM ...
2,764,864 UART:
2,765,006 UART: [state] CFI Enabled
2,768,198 UART: [state] LifecycleState = Unprovisioned
2,768,853 UART: [state] DebugLocked = No
2,769,507 UART: [state] WD Timer not started. Device not locked for debugging
2,770,681 UART: [kat] SHA2-256
3,574,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,360 UART: [kat] ++
3,578,512 UART: [kat] sha1
3,582,642 UART: [kat] SHA2-256
3,584,582 UART: [kat] SHA2-384
3,587,205 UART: [kat] SHA2-512-ACC
3,589,105 UART: [kat] ECC-384
3,599,148 UART: [kat] HMAC-384Kdf
3,603,790 UART: [kat] LMS
3,852,102 UART: [kat] --
3,852,870 UART: [update-reset] ++
3,853,187 UART: Invalid command 0x1000000b recv
3,854,291 UART: ROM Non-Fatal Error: 0x01040003
3,855,291 UART: [state] Locking Datavault
3,856,201 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,805 UART: [state] Locking ICCM
3,857,385 UART: [exit] Launching FMC @ 0x40000000
3,862,682 UART:
3,862,698 UART: Running Caliptra FMC ...
3,863,106 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 ready_for_fw is high
1,056,251 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,570 >>> mbox cmd response: success
2,579,964 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,003 UART:
2,586,019 UART: Running Caliptra FMC ...
2,586,427 UART:
2,586,565 UART: [fmc] Received command: 0x1000000B
3,565,175 UART:
3,565,191 UART: Running Caliptra FMC ...
3,565,599 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,693 UART: [idev] ++
1,172,861 UART: [idev] CDI.KEYID = 6
1,173,222 UART: [idev] SUBJECT.KEYID = 7
1,173,647 UART: [idev] UDS.KEYID = 0
1,173,993 ready_for_fw is high
1,173,993 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,242,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,104 UART: [ldev] --
1,281,548 UART: [fwproc] Wait for Commands...
1,282,341 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,076 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,103 >>> mbox cmd response: success
2,675,232 UART: [afmc] ++
2,675,400 UART: [afmc] CDI.KEYID = 6
2,675,763 UART: [afmc] SUBJECT.KEYID = 7
2,676,189 UART: [afmc] AUTHORITY.KEYID = 5
2,710,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,382 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,102 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,995 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,688 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,539 UART: [afmc] --
2,754,463 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,485 UART: [cold-reset] --
2,755,145 UART: [state] Locking Datavault
2,756,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,040 UART: [state] Locking ICCM
2,757,568 UART: [exit] Launching FMC @ 0x40000000
2,762,865 UART:
2,762,881 UART: Running Caliptra FMC ...
2,763,289 UART:
2,763,427 UART: [fmc] Received command: 0x1000000B
2,764,259 UART:
2,764,275 UART: Running Caliptra ROM ...
2,764,683 UART:
2,764,738 UART: [state] CFI Enabled
2,767,134 UART: [state] LifecycleState = Unprovisioned
2,767,789 UART: [state] DebugLocked = No
2,768,483 UART: [state] WD Timer not started. Device not locked for debugging
2,769,839 UART: [kat] SHA2-256
3,573,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,518 UART: [kat] ++
3,577,670 UART: [kat] sha1
3,582,030 UART: [kat] SHA2-256
3,583,970 UART: [kat] SHA2-384
3,586,803 UART: [kat] SHA2-512-ACC
3,588,703 UART: [kat] ECC-384
3,598,700 UART: [kat] HMAC-384Kdf
3,603,312 UART: [kat] LMS
3,851,624 UART: [kat] --
3,852,454 UART: [update-reset] ++
3,852,771 UART: Invalid command 0x1000000b recv
3,853,977 UART: ROM Non-Fatal Error: 0x01040003
3,854,787 UART: [state] Locking Datavault
3,855,689 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,293 UART: [state] Locking ICCM
3,856,937 UART: [exit] Launching FMC @ 0x40000000
3,862,234 UART:
3,862,250 UART: Running Caliptra FMC ...
3,862,658 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,152 ready_for_fw is high
1,056,152 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,947 >>> mbox cmd response: success
2,580,031 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,586,256 UART:
2,586,272 UART: Running Caliptra FMC ...
2,586,680 UART:
2,586,818 UART: [fmc] Received command: 0x1000000B
3,564,847 UART:
3,564,863 UART: Running Caliptra FMC ...
3,565,271 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,861 UART: [kat] LMS
1,169,173 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,096 UART: [idev] Sha1 KeyId Algorithm
1,208,006 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,195 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,663 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,309 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,290 >>> mbox cmd response: success
2,676,357 UART: [afmc] ++
2,676,525 UART: [afmc] CDI.KEYID = 6
2,676,888 UART: [afmc] SUBJECT.KEYID = 7
2,677,314 UART: [afmc] AUTHORITY.KEYID = 5
2,712,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,003 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,723 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,616 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,309 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,066 UART: [afmc] --
2,756,162 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,184 UART: [cold-reset] --
2,757,012 UART: [state] Locking Datavault
2,758,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,735 UART: [state] Locking ICCM
2,759,365 UART: [exit] Launching FMC @ 0x40000000
2,764,662 UART:
2,764,678 UART: Running Caliptra FMC ...
2,765,086 UART:
2,765,224 UART: [fmc] Received command: 0x1000000B
2,766,056 UART:
2,766,072 UART: Running Caliptra ROM ...
2,766,480 UART:
2,766,622 UART: [state] CFI Enabled
2,769,520 UART: [state] LifecycleState = Unprovisioned
2,770,175 UART: [state] DebugLocked = No
2,770,779 UART: [state] WD Timer not started. Device not locked for debugging
2,772,085 UART: [kat] SHA2-256
3,575,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,764 UART: [kat] ++
3,579,916 UART: [kat] sha1
3,584,174 UART: [kat] SHA2-256
3,586,114 UART: [kat] SHA2-384
3,588,743 UART: [kat] SHA2-512-ACC
3,590,643 UART: [kat] ECC-384
3,600,606 UART: [kat] HMAC-384Kdf
3,605,222 UART: [kat] LMS
3,853,534 UART: [kat] --
3,854,592 UART: [update-reset] ++
3,854,909 UART: Invalid command 0x1000000b recv
3,856,045 UART: ROM Non-Fatal Error: 0x01040003
3,856,861 UART: [state] Locking Datavault
3,857,865 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,469 UART: [state] Locking ICCM
3,858,987 UART: [exit] Launching FMC @ 0x40000000
3,864,284 UART:
3,864,300 UART: Running Caliptra FMC ...
3,864,708 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 ready_for_fw is high
1,056,753 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,526,236 >>> mbox cmd response: success
2,582,626 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,588,759 UART:
2,588,775 UART: Running Caliptra FMC ...
2,589,183 UART:
2,589,321 UART: [fmc] Received command: 0x1000000B
3,567,501 UART:
3,567,517 UART: Running Caliptra FMC ...
3,567,925 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,232 writing to cptra_bootfsm_go
193,436 UART:
193,803 UART: Running Caliptra ROM ...
195,001 UART:
195,164 UART: [state] CFI Enabled
266,464 UART: [state] LifecycleState = Unprovisioned
268,885 UART: [state] DebugLocked = No
271,627 UART: [state] WD Timer not started. Device not locked for debugging
276,864 UART: [kat] SHA2-256
458,823 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,323 UART: [kat] ++
470,798 UART: [kat] sha1
480,036 UART: [kat] SHA2-256
483,079 UART: [kat] SHA2-384
489,626 UART: [kat] SHA2-512-ACC
492,291 UART: [kat] ECC-384
3,777,060 UART: [kat] HMAC-384Kdf
3,803,721 UART: [kat] LMS
4,876,860 UART: [kat] --
4,882,812 UART: [cold-reset] ++
4,885,627 UART: [fht] FHT @ 0x50003400
4,897,527 UART: [idev] ++
4,898,232 UART: [idev] CDI.KEYID = 6
4,899,399 UART: [idev] SUBJECT.KEYID = 7
4,900,578 UART: [idev] UDS.KEYID = 0
4,901,501 ready_for_fw is high
4,901,686 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,042,071 UART: [idev] Erasing UDS.KEYID = 0
8,245,075 UART: [idev] Sha1 KeyId Algorithm
8,267,975 UART: [idev] --
8,272,845 UART: [ldev] ++
8,273,412 UART: [ldev] CDI.KEYID = 6
8,274,569 UART: [ldev] SUBJECT.KEYID = 5
8,275,783 UART: [ldev] AUTHORITY.KEYID = 7
8,276,937 UART: [ldev] FE.KEYID = 1
8,319,688 UART: [ldev] Erasing FE.KEYID = 1
11,656,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,364 UART: [ldev] --
14,039,576 UART: [fwproc] Wait for Commands...
14,042,257 UART: [fwproc] Recv command 0x46574c44
14,044,568 UART: [fwproc] Recv'd Img size: 111600 bytes
18,087,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,168,592 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,228,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,545,531 >>> mbox cmd response: success
18,549,453 UART: [afmc] ++
18,550,040 UART: [afmc] CDI.KEYID = 6
18,551,151 UART: [afmc] SUBJECT.KEYID = 7
18,552,369 UART: [afmc] AUTHORITY.KEYID = 5
21,926,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,224,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,226,531 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,242,747 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,258,832 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,274,635 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,298,089 UART: [afmc] --
24,302,548 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,443,473 UART: [cold-reset] --
24,444,355 UART: [state] Locking Datavault
24,445,430 UART: [state] Locking PCR0, PCR1 and PCR31
24,446,963 UART: [state] Locking ICCM
24,447,840 UART: [exit] Launching FMC @ 0x40000000
24,449,179 UART:
24,449,325 UART: Running Caliptra FMC ...
24,450,420 UART:
24,450,571 UART: [fmc] Received command: 0x46574C44
24,451,939 UART:
24,452,082 UART: Running Caliptra ROM ...
24,453,181 UART:
24,453,333 UART: [state] CFI Enabled
24,516,698 UART: [state] LifecycleState = Unprovisioned
24,518,575 UART: [state] DebugLocked = No
24,521,391 UART: [state] WD Timer not started. Device not locked for debugging
24,525,894 UART: [kat] SHA2-256
24,707,828 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,719,322 UART: [kat] ++
24,719,830 UART: [kat] sha1
24,730,387 UART: [kat] SHA2-256
24,733,440 UART: [kat] SHA2-384
24,739,694 UART: [kat] SHA2-512-ACC
24,742,322 UART: [kat] ECC-384
28,027,034 UART: [kat] HMAC-384Kdf
28,053,599 UART: [kat] LMS
29,126,705 UART: [kat] --
29,131,665 UART: [update-reset] ++
33,198,185 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,202,375 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,575,684 >>> mbox cmd response: success
33,577,352 UART: [update-reset] Copying MAN_2 To MAN_1
33,600,240 UART: [update-reset Success] --
33,601,853 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,603,637 UART: [state] Locking Datavault
33,607,131 UART: [state] Locking PCR0, PCR1 and PCR31
33,608,836 UART: [state] Locking ICCM
33,611,151 UART: [exit] Launching FMC @ 0x40000000
33,619,825 UART:
33,620,057 UART: Running Caliptra FMC ...
33,621,086 UART:
33,621,234 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,622,861 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
4,802,172 ready_for_fw is high
4,802,717 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,332,771 >>> mbox cmd response: success
24,004,150 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,145,138 UART:
24,145,551 UART: Running Caliptra FMC ...
24,146,723 UART:
24,146,887 UART: [fmc] Received command: 0x46574C44
33,178,925 >>> mbox cmd response: success
33,200,411 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,213,540 UART:
33,213,789 UART: Running Caliptra FMC ...
33,214,956 UART:
33,215,123 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,216,803 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,466 UART:
192,829 UART: Running Caliptra ROM ...
193,938 UART:
603,706 UART: [state] CFI Enabled
617,561 UART: [state] LifecycleState = Unprovisioned
619,860 UART: [state] DebugLocked = No
621,668 UART: [state] WD Timer not started. Device not locked for debugging
625,413 UART: [kat] SHA2-256
807,226 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,793 UART: [kat] ++
819,386 UART: [kat] sha1
829,144 UART: [kat] SHA2-256
832,209 UART: [kat] SHA2-384
838,347 UART: [kat] SHA2-512-ACC
840,993 UART: [kat] ECC-384
4,097,591 UART: [kat] HMAC-384Kdf
4,109,891 UART: [kat] LMS
5,183,054 UART: [kat] --
5,186,628 UART: [cold-reset] ++
5,189,198 UART: [fht] FHT @ 0x50003400
5,201,372 UART: [idev] ++
5,202,069 UART: [idev] CDI.KEYID = 6
5,203,240 UART: [idev] SUBJECT.KEYID = 7
5,204,690 UART: [idev] UDS.KEYID = 0
5,205,949 ready_for_fw is high
5,206,157 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,346,399 UART: [idev] Erasing UDS.KEYID = 0
8,492,045 UART: [idev] Sha1 KeyId Algorithm
8,513,507 UART: [idev] --
8,516,990 UART: [ldev] ++
8,517,564 UART: [ldev] CDI.KEYID = 6
8,518,719 UART: [ldev] SUBJECT.KEYID = 5
8,520,247 UART: [ldev] AUTHORITY.KEYID = 7
8,521,719 UART: [ldev] FE.KEYID = 1
8,532,310 UART: [ldev] Erasing FE.KEYID = 1
11,827,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,641 UART: [ldev] --
14,192,406 UART: [fwproc] Wait for Commands...
14,194,230 UART: [fwproc] Recv command 0x46574c44
14,196,479 UART: [fwproc] Recv'd Img size: 111600 bytes
18,237,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,311,779 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,372,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,689,005 >>> mbox cmd response: success
18,693,414 UART: [afmc] ++
18,694,000 UART: [afmc] CDI.KEYID = 6
18,695,189 UART: [afmc] SUBJECT.KEYID = 7
18,696,351 UART: [afmc] AUTHORITY.KEYID = 5
22,014,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,307,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,309,695 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,325,847 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,341,985 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,357,901 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,379,599 UART: [afmc] --
24,384,314 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,525,438 UART: [cold-reset] --
24,526,328 UART: [state] Locking Datavault
24,527,483 UART: [state] Locking PCR0, PCR1 and PCR31
24,529,017 UART: [state] Locking ICCM
24,529,933 UART: [exit] Launching FMC @ 0x40000000
24,531,356 UART:
24,531,514 UART: Running Caliptra FMC ...
24,532,604 UART:
24,532,753 UART: [fmc] Received command: 0x46574C44
24,534,315 UART:
24,534,463 UART: Running Caliptra ROM ...
24,535,499 UART:
24,535,640 UART: [state] CFI Enabled
24,543,460 UART: [state] LifecycleState = Unprovisioned
24,545,286 UART: [state] DebugLocked = No
24,547,283 UART: [state] WD Timer not started. Device not locked for debugging
24,551,689 UART: [kat] SHA2-256
24,733,650 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,745,228 UART: [kat] ++
24,745,682 UART: [kat] sha1
24,757,481 UART: [kat] SHA2-256
24,760,496 UART: [kat] SHA2-384
24,766,853 UART: [kat] SHA2-512-ACC
24,769,466 UART: [kat] ECC-384
28,022,679 UART: [kat] HMAC-384Kdf
28,035,967 UART: [kat] LMS
29,109,116 UART: [kat] --
29,113,772 UART: [update-reset] ++
33,179,315 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,183,281 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
33,556,556 >>> mbox cmd response: success
33,557,171 UART: [update-reset] Copying MAN_2 To MAN_1
33,580,072 UART: [update-reset Success] --
33,581,669 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,585,503 UART: [state] Locking Datavault
33,589,735 UART: [state] Locking PCR0, PCR1 and PCR31
33,591,372 UART: [state] Locking ICCM
33,594,091 UART: [exit] Launching FMC @ 0x40000000
33,602,705 UART:
33,602,929 UART: Running Caliptra FMC ...
33,603,945 UART:
33,604,085 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,605,703 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,585 writing to cptra_bootfsm_go
5,097,014 ready_for_fw is high
5,097,579 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,506,868 >>> mbox cmd response: success
24,134,898 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
24,275,864 UART:
24,276,251 UART: Running Caliptra FMC ...
24,277,468 UART:
24,277,632 UART: [fmc] Received command: 0x46574C44
33,195,393 >>> mbox cmd response: success
33,218,002 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,231,701 UART:
33,231,962 UART: Running Caliptra FMC ...
33,233,153 UART:
33,233,309 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,234,951 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,352 UART:
192,705 UART: Running Caliptra ROM ...
193,894 UART:
194,046 UART: [state] CFI Enabled
264,842 UART: [state] LifecycleState = Unprovisioned
266,763 UART: [state] DebugLocked = No
268,655 UART: [state] WD Timer not started. Device not locked for debugging
272,554 UART: [kat] SHA2-256
451,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,261 UART: [kat] ++
463,790 UART: [kat] sha1
474,546 UART: [kat] SHA2-256
477,598 UART: [kat] SHA2-384
483,169 UART: [kat] SHA2-512-ACC
486,108 UART: [kat] ECC-384
2,947,555 UART: [kat] HMAC-384Kdf
2,972,952 UART: [kat] LMS
3,502,368 UART: [kat] --
3,504,651 UART: [cold-reset] ++
3,507,147 UART: [fht] FHT @ 0x50003400
3,518,018 UART: [idev] ++
3,518,629 UART: [idev] CDI.KEYID = 6
3,519,549 UART: [idev] SUBJECT.KEYID = 7
3,520,728 UART: [idev] UDS.KEYID = 0
3,521,653 ready_for_fw is high
3,521,836 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,662,486 UART: [idev] Erasing UDS.KEYID = 0
6,030,131 UART: [idev] Sha1 KeyId Algorithm
6,052,808 UART: [idev] --
6,056,745 UART: [ldev] ++
6,057,315 UART: [ldev] CDI.KEYID = 6
6,058,281 UART: [ldev] SUBJECT.KEYID = 5
6,059,445 UART: [ldev] AUTHORITY.KEYID = 7
6,060,677 UART: [ldev] FE.KEYID = 1
6,101,680 UART: [ldev] Erasing FE.KEYID = 1
8,607,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,823 UART: [ldev] --
10,414,607 UART: [fwproc] Wait for Commands...
10,416,113 UART: [fwproc] Recv command 0x46574c44
10,418,205 UART: [fwproc] Recv'd Img size: 111944 bytes
13,794,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,864,321 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,924,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,243,272 >>> mbox cmd response: success
14,247,351 UART: [afmc] ++
14,247,941 UART: [afmc] CDI.KEYID = 6
14,248,828 UART: [afmc] SUBJECT.KEYID = 7
14,250,043 UART: [afmc] AUTHORITY.KEYID = 5
16,787,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,866 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,907 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,981 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,712 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,583,658 UART: [afmc] --
18,589,380 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,731,111 UART: [cold-reset] --
18,731,972 UART: [state] Locking Datavault
18,733,128 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,664 UART: [state] Locking ICCM
18,735,545 UART: [exit] Launching FMC @ 0x40000000
18,736,972 UART:
18,737,136 UART: Running Caliptra FMC ...
18,738,235 UART:
18,738,409 UART: [fmc] Received command: 0x46574C44
18,739,871 UART:
18,740,027 UART: Running Caliptra ROM ...
18,741,127 UART:
18,741,283 UART: [state] CFI Enabled
18,805,351 UART: [state] LifecycleState = Unprovisioned
18,807,230 UART: [state] DebugLocked = No
18,809,109 UART: [state] WD Timer not started. Device not locked for debugging
18,813,394 UART: [kat] SHA2-256
18,992,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,004,069 UART: [kat] ++
19,004,612 UART: [kat] sha1
19,016,801 UART: [kat] SHA2-256
19,019,820 UART: [kat] SHA2-384
19,027,322 UART: [kat] SHA2-512-ACC
19,030,269 UART: [kat] ECC-384
21,492,447 UART: [kat] HMAC-384Kdf
21,512,982 UART: [kat] LMS
22,042,391 UART: [kat] --
22,047,087 UART: [update-reset] ++
25,447,240 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,450,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,824,726 >>> mbox cmd response: success
25,826,090 UART: [update-reset] Copying MAN_2 To MAN_1
25,848,423 UART: [update-reset Success] --
25,849,726 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,851,459 UART: [state] Locking Datavault
25,854,665 UART: [state] Locking PCR0, PCR1 and PCR31
25,856,310 UART: [state] Locking ICCM
25,857,871 UART: [exit] Launching FMC @ 0x40000000
25,866,265 UART:
25,866,507 UART: Running Caliptra FMC ...
25,867,630 UART:
25,867,787 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,869,420 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,033 UART:
192,442 UART: Running Caliptra ROM ...
193,641 UART:
193,800 UART: [state] CFI Enabled
264,502 UART: [state] LifecycleState = Unprovisioned
266,365 UART: [state] DebugLocked = No
268,989 UART: [state] WD Timer not started. Device not locked for debugging
273,465 UART: [kat] SHA2-256
452,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,173 UART: [kat] ++
464,709 UART: [kat] sha1
475,521 UART: [kat] SHA2-256
478,534 UART: [kat] SHA2-384
485,236 UART: [kat] SHA2-512-ACC
488,174 UART: [kat] ECC-384
2,949,298 UART: [kat] HMAC-384Kdf
2,971,852 UART: [kat] LMS
3,501,360 UART: [kat] --
3,505,671 UART: [cold-reset] ++
3,507,759 UART: [fht] FHT @ 0x50003400
3,517,747 UART: [idev] ++
3,518,312 UART: [idev] CDI.KEYID = 6
3,519,223 UART: [idev] SUBJECT.KEYID = 7
3,520,470 UART: [idev] UDS.KEYID = 0
3,521,397 ready_for_fw is high
3,521,611 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,662,512 UART: [idev] Erasing UDS.KEYID = 0
6,030,042 UART: [idev] Sha1 KeyId Algorithm
6,052,107 UART: [idev] --
6,054,385 UART: [ldev] ++
6,054,966 UART: [ldev] CDI.KEYID = 6
6,055,898 UART: [ldev] SUBJECT.KEYID = 5
6,057,004 UART: [ldev] AUTHORITY.KEYID = 7
6,058,319 UART: [ldev] FE.KEYID = 1
6,101,351 UART: [ldev] Erasing FE.KEYID = 1
8,603,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,724 UART: [ldev] --
10,412,541 UART: [fwproc] Wait for Commands...
10,414,769 UART: [fwproc] Recv command 0x46574c44
10,416,827 UART: [fwproc] Recv'd Img size: 111944 bytes
13,792,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,058 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,928,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,246,302 >>> mbox cmd response: success
14,250,269 UART: [afmc] ++
14,250,878 UART: [afmc] CDI.KEYID = 6
14,251,960 UART: [afmc] SUBJECT.KEYID = 7
14,253,082 UART: [afmc] AUTHORITY.KEYID = 5
16,789,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,460 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,503 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,581 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,234 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,581,412 UART: [afmc] --
18,586,493 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,727,672 UART: [cold-reset] --
18,728,539 UART: [state] Locking Datavault
18,729,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,309 UART: [state] Locking ICCM
18,732,215 UART: [exit] Launching FMC @ 0x40000000
18,733,609 UART:
18,733,757 UART: Running Caliptra FMC ...
18,734,867 UART:
18,735,022 UART: [fmc] Received command: 0x46574C44
18,736,397 UART:
18,736,540 UART: Running Caliptra ROM ...
18,737,552 UART:
18,737,696 UART: [state] CFI Enabled
18,801,641 UART: [state] LifecycleState = Unprovisioned
18,803,532 UART: [state] DebugLocked = No
18,805,206 UART: [state] WD Timer not started. Device not locked for debugging
18,808,943 UART: [kat] SHA2-256
18,988,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,999,679 UART: [kat] ++
19,000,135 UART: [kat] sha1
19,011,237 UART: [kat] SHA2-256
19,014,274 UART: [kat] SHA2-384
19,019,129 UART: [kat] SHA2-512-ACC
19,022,084 UART: [kat] ECC-384
21,487,515 UART: [kat] HMAC-384Kdf
21,510,002 UART: [kat] LMS
22,039,459 UART: [kat] --
22,043,607 UART: [update-reset] ++
25,443,787 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,446,349 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,820,868 >>> mbox cmd response: success
25,821,921 UART: [update-reset] Copying MAN_2 To MAN_1
25,844,207 UART: [update-reset Success] --
25,845,528 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,847,685 UART: [state] Locking Datavault
25,851,335 UART: [state] Locking PCR0, PCR1 and PCR31
25,852,916 UART: [state] Locking ICCM
25,855,440 UART: [exit] Launching FMC @ 0x40000000
25,863,801 UART:
25,864,044 UART: Running Caliptra FMC ...
25,865,149 UART:
25,865,305 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,866,944 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,362,148 ready_for_fw is high
3,362,533 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
13,991,478 >>> mbox cmd response: success
18,273,686 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,415,274 UART:
18,415,669 UART: Running Caliptra FMC ...
18,416,889 UART:
18,417,061 UART: [fmc] Received command: 0x46574C44
25,353,730 >>> mbox cmd response: success
25,375,209 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,387,616 UART:
25,387,878 UART: Running Caliptra FMC ...
25,389,047 UART:
25,389,211 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,390,857 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,299 UART:
192,668 UART: Running Caliptra ROM ...
193,762 UART:
603,350 UART: [state] CFI Enabled
615,796 UART: [state] LifecycleState = Unprovisioned
617,609 UART: [state] DebugLocked = No
619,411 UART: [state] WD Timer not started. Device not locked for debugging
623,728 UART: [kat] SHA2-256
802,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,443 UART: [kat] ++
814,894 UART: [kat] sha1
826,191 UART: [kat] SHA2-256
829,198 UART: [kat] SHA2-384
836,106 UART: [kat] SHA2-512-ACC
839,035 UART: [kat] ECC-384
3,278,680 UART: [kat] HMAC-384Kdf
3,290,198 UART: [kat] LMS
3,819,651 UART: [kat] --
3,824,778 UART: [cold-reset] ++
3,825,653 UART: [fht] FHT @ 0x50003400
3,837,630 UART: [idev] ++
3,838,190 UART: [idev] CDI.KEYID = 6
3,839,217 UART: [idev] SUBJECT.KEYID = 7
3,840,315 UART: [idev] UDS.KEYID = 0
3,841,362 ready_for_fw is high
3,841,551 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,982,126 UART: [idev] Erasing UDS.KEYID = 0
6,316,019 UART: [idev] Sha1 KeyId Algorithm
6,339,173 UART: [idev] --
6,342,381 UART: [ldev] ++
6,342,952 UART: [ldev] CDI.KEYID = 6
6,343,861 UART: [ldev] SUBJECT.KEYID = 5
6,345,073 UART: [ldev] AUTHORITY.KEYID = 7
6,346,302 UART: [ldev] FE.KEYID = 1
6,356,672 UART: [ldev] Erasing FE.KEYID = 1
8,834,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,738 UART: [ldev] --
10,629,732 UART: [fwproc] Wait for Commands...
10,631,444 UART: [fwproc] Recv command 0x46574c44
10,633,536 UART: [fwproc] Recv'd Img size: 111944 bytes
14,005,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,075,823 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,136,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,453,754 >>> mbox cmd response: success
14,457,633 UART: [afmc] ++
14,458,221 UART: [afmc] CDI.KEYID = 6
14,459,134 UART: [afmc] SUBJECT.KEYID = 7
14,460,315 UART: [afmc] AUTHORITY.KEYID = 5
16,960,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,680,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,682,465 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,698,501 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,714,542 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,730,209 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,751,181 UART: [afmc] --
18,756,667 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,897,980 UART: [cold-reset] --
18,898,839 UART: [state] Locking Datavault
18,899,996 UART: [state] Locking PCR0, PCR1 and PCR31
18,901,530 UART: [state] Locking ICCM
18,902,437 UART: [exit] Launching FMC @ 0x40000000
18,903,870 UART:
18,904,029 UART: Running Caliptra FMC ...
18,905,150 UART:
18,905,310 UART: [fmc] Received command: 0x46574C44
18,906,766 UART:
18,906,916 UART: Running Caliptra ROM ...
18,907,927 UART:
18,908,072 UART: [state] CFI Enabled
18,914,150 UART: [state] LifecycleState = Unprovisioned
18,916,026 UART: [state] DebugLocked = No
18,917,782 UART: [state] WD Timer not started. Device not locked for debugging
18,921,998 UART: [kat] SHA2-256
19,101,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,112,765 UART: [kat] ++
19,113,307 UART: [kat] sha1
19,125,493 UART: [kat] SHA2-256
19,128,563 UART: [kat] SHA2-384
19,133,253 UART: [kat] SHA2-512-ACC
19,136,192 UART: [kat] ECC-384
21,576,696 UART: [kat] HMAC-384Kdf
21,589,516 UART: [kat] LMS
22,119,034 UART: [kat] --
22,126,044 UART: [update-reset] ++
25,522,712 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,526,573 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
25,901,136 >>> mbox cmd response: success
25,901,541 UART: [update-reset] Copying MAN_2 To MAN_1
25,923,846 UART: [update-reset Success] --
25,925,108 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,926,297 UART: [state] Locking Datavault
25,930,040 UART: [state] Locking PCR0, PCR1 and PCR31
25,931,899 UART: [state] Locking ICCM
25,933,280 UART: [exit] Launching FMC @ 0x40000000
25,941,732 UART:
25,941,987 UART: Running Caliptra FMC ...
25,943,085 UART:
25,943,241 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,944,886 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,697,288 ready_for_fw is high
3,697,694 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,240,569 >>> mbox cmd response: success
18,479,593 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
18,621,074 UART:
18,621,457 UART: Running Caliptra FMC ...
18,622,665 UART:
18,622,845 UART: [fmc] Received command: 0x46574C44
25,480,573 >>> mbox cmd response: success
25,502,920 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,514,588 UART:
25,514,826 UART: Running Caliptra FMC ...
25,515,987 UART:
25,516,147 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,517,781 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,693 UART: [idev] ++
1,172,861 UART: [idev] CDI.KEYID = 6
1,173,222 UART: [idev] SUBJECT.KEYID = 7
1,173,647 UART: [idev] UDS.KEYID = 0
1,173,993 ready_for_fw is high
1,173,993 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,736 UART: [fwproc] Wait for Commands...
1,281,337 UART: [fwproc] Recv command 0x46574c44
1,282,070 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,421 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,894 >>> mbox cmd response: success
2,741,137 UART: [afmc] ++
2,741,305 UART: [afmc] CDI.KEYID = 6
2,741,668 UART: [afmc] SUBJECT.KEYID = 7
2,742,094 UART: [afmc] AUTHORITY.KEYID = 5
2,778,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,478 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,174 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,073 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,766 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,688 UART: [afmc] --
2,821,772 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,821,794 UART: [cold-reset] --
2,822,852 UART: [state] Locking Datavault
2,824,145 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,749 UART: [state] Locking ICCM
2,825,351 UART: [exit] Launching FMC @ 0x40000000
2,830,648 UART:
2,830,664 UART: Running Caliptra FMC ...
2,831,072 UART:
2,831,302 UART: [fmc] Received command: 0x46574C44
2,832,128 UART:
2,832,144 UART: Running Caliptra ROM ...
2,832,552 UART:
2,832,607 UART: [state] CFI Enabled
2,835,271 UART: [state] LifecycleState = Unprovisioned
2,835,926 UART: [state] DebugLocked = No
2,836,418 UART: [state] WD Timer not started. Device not locked for debugging
2,837,718 UART: [kat] SHA2-256
3,641,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,397 UART: [kat] ++
3,645,549 UART: [kat] sha1
3,649,647 UART: [kat] SHA2-256
3,651,587 UART: [kat] SHA2-384
3,654,342 UART: [kat] SHA2-512-ACC
3,656,242 UART: [kat] ECC-384
3,666,221 UART: [kat] HMAC-384Kdf
3,670,863 UART: [kat] LMS
3,919,175 UART: [kat] --
3,920,155 UART: [update-reset] ++
5,204,391 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,205,496 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,353,550 >>> mbox cmd response: success
5,353,865 UART: [update-reset] Copying MAN_2 To MAN_1
5,361,879 UART: [update-reset Success] --
5,362,288 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,362,624 UART: [state] Locking Datavault
5,363,298 UART: [state] Locking PCR0, PCR1 and PCR31
5,363,902 UART: [state] Locking ICCM
5,364,496 UART: [exit] Launching FMC @ 0x40000000
5,369,793 UART:
5,369,809 UART: Running Caliptra FMC ...
5,370,217 UART:
5,370,439 UART: [fmc] Received command: 0x1000000C
5,371,174 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,494 ready_for_fw is high
1,056,494 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,774 >>> mbox cmd response: success
2,645,591 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,651,954 UART:
2,651,970 UART: Running Caliptra FMC ...
2,652,378 UART:
2,652,608 UART: [fmc] Received command: 0x46574C44
5,056,159 >>> mbox cmd response: success
5,063,753 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,865 UART:
5,069,881 UART: Running Caliptra FMC ...
5,070,289 UART:
5,070,511 UART: [fmc] Received command: 0x1000000C
5,071,246 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,576 UART: [kat] SHA2-256
901,516 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
916,241 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,466 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,874 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,003 UART: [ldev] --
1,282,445 UART: [fwproc] Wait for Commands...
1,283,076 UART: [fwproc] Recv command 0x46574c44
1,283,809 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,438 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,919 >>> mbox cmd response: success
2,744,146 UART: [afmc] ++
2,744,314 UART: [afmc] CDI.KEYID = 6
2,744,677 UART: [afmc] SUBJECT.KEYID = 7
2,745,103 UART: [afmc] AUTHORITY.KEYID = 5
2,780,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,249 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,945 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,844 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,537 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,337 UART: [afmc] --
2,823,207 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,823,229 UART: [cold-reset] --
2,824,275 UART: [state] Locking Datavault
2,825,352 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,956 UART: [state] Locking ICCM
2,826,622 UART: [exit] Launching FMC @ 0x40000000
2,831,919 UART:
2,831,935 UART: Running Caliptra FMC ...
2,832,343 UART:
2,832,573 UART: [fmc] Received command: 0x46574C44
2,833,399 UART:
2,833,415 UART: Running Caliptra ROM ...
2,833,823 UART:
2,833,965 UART: [state] CFI Enabled
2,837,199 UART: [state] LifecycleState = Unprovisioned
2,837,854 UART: [state] DebugLocked = No
2,838,376 UART: [state] WD Timer not started. Device not locked for debugging
2,839,650 UART: [kat] SHA2-256
3,643,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,329 UART: [kat] ++
3,647,481 UART: [kat] sha1
3,651,611 UART: [kat] SHA2-256
3,653,551 UART: [kat] SHA2-384
3,656,378 UART: [kat] SHA2-512-ACC
3,658,278 UART: [kat] ECC-384
3,668,271 UART: [kat] HMAC-384Kdf
3,672,851 UART: [kat] LMS
3,921,163 UART: [kat] --
3,922,029 UART: [update-reset] ++
5,205,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,802 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,354,856 >>> mbox cmd response: success
5,354,961 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,975 UART: [update-reset Success] --
5,363,384 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,874 UART: [state] Locking Datavault
5,364,684 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,288 UART: [state] Locking ICCM
5,365,882 UART: [exit] Launching FMC @ 0x40000000
5,371,179 UART:
5,371,195 UART: Running Caliptra FMC ...
5,371,603 UART:
5,371,825 UART: [fmc] Received command: 0x1000000C
5,372,560 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,729 ready_for_fw is high
1,055,729 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,865 >>> mbox cmd response: success
2,646,618 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,211 UART:
2,652,227 UART: Running Caliptra FMC ...
2,652,635 UART:
2,652,865 UART: [fmc] Received command: 0x46574C44
5,055,047 >>> mbox cmd response: success
5,062,577 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,068,305 UART:
5,068,321 UART: Running Caliptra FMC ...
5,068,729 UART:
5,068,951 UART: [fmc] Received command: 0x1000000C
5,069,686 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
890,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,955 UART: [kat] ++
895,107 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
903,938 UART: [kat] SHA2-512-ACC
905,839 UART: [kat] ECC-384
915,112 UART: [kat] HMAC-384Kdf
919,830 UART: [kat] LMS
1,168,142 UART: [kat] --
1,168,833 UART: [cold-reset] ++
1,169,311 UART: [fht] FHT @ 0x50003400
1,171,957 UART: [idev] ++
1,172,125 UART: [idev] CDI.KEYID = 6
1,172,486 UART: [idev] SUBJECT.KEYID = 7
1,172,911 UART: [idev] UDS.KEYID = 0
1,173,257 ready_for_fw is high
1,173,257 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,007 UART: [idev] Erasing UDS.KEYID = 0
1,198,385 UART: [idev] Sha1 KeyId Algorithm
1,207,355 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,214,960 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,006 UART: [ldev] --
1,280,490 UART: [fwproc] Wait for Commands...
1,281,187 UART: [fwproc] Recv command 0x46574c44
1,281,920 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,299 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,736 >>> mbox cmd response: success
2,740,797 UART: [afmc] ++
2,740,965 UART: [afmc] CDI.KEYID = 6
2,741,328 UART: [afmc] SUBJECT.KEYID = 7
2,741,754 UART: [afmc] AUTHORITY.KEYID = 5
2,777,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,272 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,968 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,867 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,560 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,210 UART: [afmc] --
2,820,242 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,820,264 UART: [cold-reset] --
2,821,252 UART: [state] Locking Datavault
2,822,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,197 UART: [state] Locking ICCM
2,823,829 UART: [exit] Launching FMC @ 0x40000000
2,829,126 UART:
2,829,142 UART: Running Caliptra FMC ...
2,829,550 UART:
2,829,780 UART: [fmc] Received command: 0x46574C44
2,830,606 UART:
2,830,622 UART: Running Caliptra ROM ...
2,831,030 UART:
2,831,085 UART: [state] CFI Enabled
2,833,613 UART: [state] LifecycleState = Unprovisioned
2,834,268 UART: [state] DebugLocked = No
2,834,962 UART: [state] WD Timer not started. Device not locked for debugging
2,836,088 UART: [kat] SHA2-256
3,639,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,767 UART: [kat] ++
3,643,919 UART: [kat] sha1
3,648,227 UART: [kat] SHA2-256
3,650,167 UART: [kat] SHA2-384
3,653,008 UART: [kat] SHA2-512-ACC
3,654,908 UART: [kat] ECC-384
3,664,481 UART: [kat] HMAC-384Kdf
3,669,181 UART: [kat] LMS
3,917,493 UART: [kat] --
3,918,123 UART: [update-reset] ++
5,203,179 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,204,160 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,352,214 >>> mbox cmd response: success
5,352,403 UART: [update-reset] Copying MAN_2 To MAN_1
5,360,417 UART: [update-reset Success] --
5,360,826 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,366 UART: [state] Locking Datavault
5,362,184 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,788 UART: [state] Locking ICCM
5,363,424 UART: [exit] Launching FMC @ 0x40000000
5,368,721 UART:
5,368,737 UART: Running Caliptra FMC ...
5,369,145 UART:
5,369,367 UART: [fmc] Received command: 0x1000000C
5,370,102 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,050 ready_for_fw is high
1,055,050 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,588,296 >>> mbox cmd response: success
2,644,401 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,650,436 UART:
2,650,452 UART: Running Caliptra FMC ...
2,650,860 UART:
2,651,090 UART: [fmc] Received command: 0x46574C44
5,054,429 >>> mbox cmd response: success
5,062,125 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,067,997 UART:
5,068,013 UART: Running Caliptra FMC ...
5,068,421 UART:
5,068,643 UART: [fmc] Received command: 0x1000000C
5,069,378 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,174,546 ready_for_fw is high
1,174,546 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,980 UART: [idev] Sha1 KeyId Algorithm
1,208,952 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,551 UART: [ldev] SUBJECT.KEYID = 5
1,210,978 UART: [ldev] AUTHORITY.KEYID = 7
1,211,441 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,931 UART: [fwproc] Recv'd Img size: 111944 bytes
2,554,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,757 >>> mbox cmd response: success
2,742,800 UART: [afmc] ++
2,742,968 UART: [afmc] CDI.KEYID = 6
2,743,331 UART: [afmc] SUBJECT.KEYID = 7
2,743,757 UART: [afmc] AUTHORITY.KEYID = 5
2,779,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,055 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,802,751 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,808,650 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,343 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,255 UART: [afmc] --
2,823,207 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,823,229 UART: [cold-reset] --
2,824,051 UART: [state] Locking Datavault
2,825,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,778 UART: [state] Locking ICCM
2,826,352 UART: [exit] Launching FMC @ 0x40000000
2,831,649 UART:
2,831,665 UART: Running Caliptra FMC ...
2,832,073 UART:
2,832,303 UART: [fmc] Received command: 0x46574C44
2,833,129 UART:
2,833,145 UART: Running Caliptra ROM ...
2,833,553 UART:
2,833,695 UART: [state] CFI Enabled
2,836,965 UART: [state] LifecycleState = Unprovisioned
2,837,620 UART: [state] DebugLocked = No
2,838,184 UART: [state] WD Timer not started. Device not locked for debugging
2,839,486 UART: [kat] SHA2-256
3,643,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,647,165 UART: [kat] ++
3,647,317 UART: [kat] sha1
3,651,651 UART: [kat] SHA2-256
3,653,591 UART: [kat] SHA2-384
3,656,414 UART: [kat] SHA2-512-ACC
3,658,314 UART: [kat] ECC-384
3,667,773 UART: [kat] HMAC-384Kdf
3,672,249 UART: [kat] LMS
3,920,561 UART: [kat] --
3,921,567 UART: [update-reset] ++
5,206,589 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,207,630 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,355,684 >>> mbox cmd response: success
5,355,899 UART: [update-reset] Copying MAN_2 To MAN_1
5,363,913 UART: [update-reset Success] --
5,364,322 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,365,062 UART: [state] Locking Datavault
5,365,630 UART: [state] Locking PCR0, PCR1 and PCR31
5,366,234 UART: [state] Locking ICCM
5,366,816 UART: [exit] Launching FMC @ 0x40000000
5,372,113 UART:
5,372,129 UART: Running Caliptra FMC ...
5,372,537 UART:
5,372,759 UART: [fmc] Received command: 0x1000000C
5,373,494 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,653 ready_for_fw is high
1,055,653 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,993 >>> mbox cmd response: success
2,645,938 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,652,145 UART:
2,652,161 UART: Running Caliptra FMC ...
2,652,569 UART:
2,652,799 UART: [fmc] Received command: 0x46574C44
5,055,717 >>> mbox cmd response: success
5,063,211 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,068,889 UART:
5,068,905 UART: Running Caliptra FMC ...
5,069,313 UART:
5,069,535 UART: [fmc] Received command: 0x1000000C
5,070,270 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,399 UART: [kat] SHA2-256
901,339 UART: [kat] SHA2-384
904,044 UART: [kat] SHA2-512-ACC
905,945 UART: [kat] ECC-384
915,544 UART: [kat] HMAC-384Kdf
920,008 UART: [kat] LMS
1,168,320 UART: [kat] --
1,169,081 UART: [cold-reset] ++
1,169,461 UART: [fht] FHT @ 0x50003400
1,172,145 UART: [idev] ++
1,172,313 UART: [idev] CDI.KEYID = 6
1,172,674 UART: [idev] SUBJECT.KEYID = 7
1,173,099 UART: [idev] UDS.KEYID = 0
1,173,445 ready_for_fw is high
1,173,445 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,180,903 UART: [idev] Erasing UDS.KEYID = 0
1,197,661 UART: [idev] Sha1 KeyId Algorithm
1,206,471 UART: [idev] --
1,207,420 UART: [ldev] ++
1,207,588 UART: [ldev] CDI.KEYID = 6
1,207,952 UART: [ldev] SUBJECT.KEYID = 5
1,208,379 UART: [ldev] AUTHORITY.KEYID = 7
1,208,842 UART: [ldev] FE.KEYID = 1
1,214,058 UART: [ldev] Erasing FE.KEYID = 1
1,240,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,930 UART: [ldev] --
1,279,432 UART: [fwproc] Wait for Commands...
1,280,015 UART: [fwproc] Recv command 0x46574c44
1,280,748 UART: [fwproc] Recv'd Img size: 111944 bytes
2,549,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,305 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,738,792 >>> mbox cmd response: success
2,740,059 UART: [afmc] ++
2,740,227 UART: [afmc] CDI.KEYID = 6
2,740,590 UART: [afmc] SUBJECT.KEYID = 7
2,741,016 UART: [afmc] AUTHORITY.KEYID = 5
2,776,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,516 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,212 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,111 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,804 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,544 UART: [afmc] --
2,819,522 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,819,544 UART: [cold-reset] --
2,820,476 UART: [state] Locking Datavault
2,821,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,285 UART: [state] Locking ICCM
2,822,957 UART: [exit] Launching FMC @ 0x40000000
2,828,254 UART:
2,828,270 UART: Running Caliptra FMC ...
2,828,678 UART:
2,828,908 UART: [fmc] Received command: 0x46574C44
2,829,734 UART:
2,829,750 UART: Running Caliptra ROM ...
2,830,158 UART:
2,830,213 UART: [state] CFI Enabled
2,832,605 UART: [state] LifecycleState = Unprovisioned
2,833,260 UART: [state] DebugLocked = No
2,833,806 UART: [state] WD Timer not started. Device not locked for debugging
2,835,086 UART: [kat] SHA2-256
3,638,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,765 UART: [kat] ++
3,642,917 UART: [kat] sha1
3,647,125 UART: [kat] SHA2-256
3,649,065 UART: [kat] SHA2-384
3,651,924 UART: [kat] SHA2-512-ACC
3,653,824 UART: [kat] ECC-384
3,664,009 UART: [kat] HMAC-384Kdf
3,668,501 UART: [kat] LMS
3,916,813 UART: [kat] --
3,917,791 UART: [update-reset] ++
5,201,821 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,876 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,350,930 >>> mbox cmd response: success
5,351,259 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,273 UART: [update-reset Success] --
5,359,682 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,014 UART: [state] Locking Datavault
5,360,668 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,272 UART: [state] Locking ICCM
5,361,906 UART: [exit] Launching FMC @ 0x40000000
5,367,203 UART:
5,367,219 UART: Running Caliptra FMC ...
5,367,627 UART:
5,367,849 UART: [fmc] Received command: 0x1000000C
5,368,584 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,392 ready_for_fw is high
1,055,392 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,980 >>> mbox cmd response: success
2,645,771 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,651,892 UART:
2,651,908 UART: Running Caliptra FMC ...
2,652,316 UART:
2,652,546 UART: [fmc] Received command: 0x46574C44
5,056,025 >>> mbox cmd response: success
5,063,587 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,225 UART:
5,069,241 UART: Running Caliptra FMC ...
5,069,649 UART:
5,069,871 UART: [fmc] Received command: 0x1000000C
5,070,606 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 ready_for_fw is high
1,174,916 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,208,999 UART: [ldev] ++
1,209,167 UART: [ldev] CDI.KEYID = 6
1,209,531 UART: [ldev] SUBJECT.KEYID = 5
1,209,958 UART: [ldev] AUTHORITY.KEYID = 7
1,210,421 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,200 UART: [fwproc] Recv command 0x46574c44
1,282,933 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,598 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,205 >>> mbox cmd response: success
2,742,222 UART: [afmc] ++
2,742,390 UART: [afmc] CDI.KEYID = 6
2,742,753 UART: [afmc] SUBJECT.KEYID = 7
2,743,179 UART: [afmc] AUTHORITY.KEYID = 5
2,778,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,775 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,471 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,370 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,063 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,033 UART: [afmc] --
2,822,105 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,822,127 UART: [cold-reset] --
2,823,023 UART: [state] Locking Datavault
2,824,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,752 UART: [state] Locking ICCM
2,825,386 UART: [exit] Launching FMC @ 0x40000000
2,830,683 UART:
2,830,699 UART: Running Caliptra FMC ...
2,831,107 UART:
2,831,337 UART: [fmc] Received command: 0x46574C44
2,832,163 UART:
2,832,179 UART: Running Caliptra ROM ...
2,832,587 UART:
2,832,729 UART: [state] CFI Enabled
2,835,747 UART: [state] LifecycleState = Unprovisioned
2,836,402 UART: [state] DebugLocked = No
2,836,998 UART: [state] WD Timer not started. Device not locked for debugging
2,838,238 UART: [kat] SHA2-256
3,641,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,917 UART: [kat] ++
3,646,069 UART: [kat] sha1
3,650,131 UART: [kat] SHA2-256
3,652,071 UART: [kat] SHA2-384
3,655,048 UART: [kat] SHA2-512-ACC
3,656,948 UART: [kat] ECC-384
3,666,853 UART: [kat] HMAC-384Kdf
3,671,481 UART: [kat] LMS
3,919,793 UART: [kat] --
3,920,659 UART: [update-reset] ++
5,205,767 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,206,728 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,354,782 >>> mbox cmd response: success
5,354,905 UART: [update-reset] Copying MAN_2 To MAN_1
5,362,919 UART: [update-reset Success] --
5,363,328 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,363,884 UART: [state] Locking Datavault
5,364,828 UART: [state] Locking PCR0, PCR1 and PCR31
5,365,432 UART: [state] Locking ICCM
5,366,042 UART: [exit] Launching FMC @ 0x40000000
5,371,339 UART:
5,371,355 UART: Running Caliptra FMC ...
5,371,763 UART:
5,371,985 UART: [fmc] Received command: 0x1000000C
5,372,720 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,601 ready_for_fw is high
1,056,601 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,993 >>> mbox cmd response: success
2,647,920 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,654,139 UART:
2,654,155 UART: Running Caliptra FMC ...
2,654,563 UART:
2,654,793 UART: [fmc] Received command: 0x46574C44
5,058,373 >>> mbox cmd response: success
5,066,075 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,071,349 UART:
5,071,365 UART: Running Caliptra FMC ...
5,071,773 UART:
5,071,995 UART: [fmc] Received command: 0x1000000C
5,072,730 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,141 UART:
192,504 UART: Running Caliptra ROM ...
193,681 UART:
193,837 UART: [state] CFI Enabled
261,675 UART: [state] LifecycleState = Unprovisioned
264,111 UART: [state] DebugLocked = No
266,376 UART: [state] WD Timer not started. Device not locked for debugging
271,411 UART: [kat] SHA2-256
453,375 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,890 UART: [kat] ++
465,377 UART: [kat] sha1
476,184 UART: [kat] SHA2-256
479,196 UART: [kat] SHA2-384
484,827 UART: [kat] SHA2-512-ACC
487,474 UART: [kat] ECC-384
3,774,136 UART: [kat] HMAC-384Kdf
3,800,868 UART: [kat] LMS
4,874,038 UART: [kat] --
4,878,056 UART: [cold-reset] ++
4,879,475 UART: [fht] FHT @ 0x50003400
4,891,096 UART: [idev] ++
4,891,801 UART: [idev] CDI.KEYID = 6
4,892,990 UART: [idev] SUBJECT.KEYID = 7
4,894,165 UART: [idev] UDS.KEYID = 0
4,895,110 ready_for_fw is high
4,895,320 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,035,884 UART: [idev] Erasing UDS.KEYID = 0
8,240,080 UART: [idev] Sha1 KeyId Algorithm
8,262,015 UART: [idev] --
8,266,331 UART: [ldev] ++
8,266,900 UART: [ldev] CDI.KEYID = 6
8,268,133 UART: [ldev] SUBJECT.KEYID = 5
8,269,236 UART: [ldev] AUTHORITY.KEYID = 7
8,270,461 UART: [ldev] FE.KEYID = 1
8,316,382 UART: [ldev] Erasing FE.KEYID = 1
11,650,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,437 UART: [ldev] --
14,015,782 UART: [fwproc] Wait for Commands...
14,017,604 UART: [fwproc] Recv command 0x46574c44
14,019,922 UART: [fwproc] Recv'd Img size: 111600 bytes
18,063,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,141,382 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,201,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,518,346 >>> mbox cmd response: success
18,522,279 UART: [afmc] ++
18,523,005 UART: [afmc] CDI.KEYID = 6
18,524,200 UART: [afmc] SUBJECT.KEYID = 7
18,525,357 UART: [afmc] AUTHORITY.KEYID = 5
21,880,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,174,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,176,440 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,192,523 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,208,700 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,224,685 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,248,048 UART: [afmc] --
26,314,586 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
26,449,757 UART: [cold-reset] --
26,450,695 UART: [state] Locking Datavault
26,451,825 UART: [state] Locking PCR0, PCR1 and PCR31
26,453,366 UART: [state] Locking ICCM
26,454,300 UART: [exit] Launching FMC @ 0x40000000
26,455,726 UART:
26,455,885 UART: Running Caliptra FMC ...
26,456,976 UART:
26,457,133 UART: [fmc] Received command: 0x46574C44
26,458,852 UART:
26,459,017 UART: Running Caliptra ROM ...
26,460,073 UART:
26,460,224 UART: [state] CFI Enabled
26,514,731 UART: [state] LifecycleState = Unprovisioned
26,516,633 UART: [state] DebugLocked = No
26,518,496 UART: [state] WD Timer not started. Device not locked for debugging
26,522,842 UART: [kat] SHA2-256
26,704,791 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,716,311 UART: [kat] ++
26,716,766 UART: [kat] sha1
26,727,168 UART: [kat] SHA2-256
26,730,190 UART: [kat] SHA2-384
26,734,604 UART: [kat] SHA2-512-ACC
26,737,167 UART: [kat] ECC-384
30,029,828 UART: [kat] HMAC-384Kdf
30,053,479 UART: [kat] LMS
31,126,662 UART: [kat] --
31,130,352 UART: [update-reset] ++
31,177,645 >>> mbox cmd response: failed
31,178,012 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,180,984 UART: ROM Non-Fatal Error: 0x000B001E
31,183,407 UART: [state] Locking Datavault
31,187,160 UART: [state] Locking PCR0, PCR1 and PCR31
31,189,378 UART: [state] Locking ICCM
31,190,624 UART: [exit] Launching FMC @ 0x40000000
31,199,246 UART:
31,199,492 UART: Running Caliptra FMC ...
31,200,596 UART:
31,200,754 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,202,396 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
4,780,701 ready_for_fw is high
4,781,141 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,286,551 >>> mbox cmd response: success
26,010,994 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
26,146,180 UART:
26,146,622 UART: Running Caliptra FMC ...
26,147,713 UART:
26,147,863 UART: [fmc] Received command: 0x46574C44
30,766,783 >>> mbox cmd response: failed
30,767,223 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,782,084 UART:
30,782,347 UART: Running Caliptra FMC ...
30,783,423 UART:
30,783,572 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,785,235 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,515 UART:
192,886 UART: Running Caliptra ROM ...
194,071 UART:
603,535 UART: [state] CFI Enabled
617,188 UART: [state] LifecycleState = Unprovisioned
619,497 UART: [state] DebugLocked = No
621,154 UART: [state] WD Timer not started. Device not locked for debugging
625,612 UART: [kat] SHA2-256
807,548 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,092 UART: [kat] ++
819,609 UART: [kat] sha1
830,258 UART: [kat] SHA2-256
833,275 UART: [kat] SHA2-384
839,046 UART: [kat] SHA2-512-ACC
841,632 UART: [kat] ECC-384
4,094,081 UART: [kat] HMAC-384Kdf
4,105,262 UART: [kat] LMS
5,178,399 UART: [kat] --
5,183,903 UART: [cold-reset] ++
5,186,055 UART: [fht] FHT @ 0x50003400
5,197,813 UART: [idev] ++
5,198,511 UART: [idev] CDI.KEYID = 6
5,199,602 UART: [idev] SUBJECT.KEYID = 7
5,201,117 UART: [idev] UDS.KEYID = 0
5,202,295 ready_for_fw is high
5,202,476 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,342,622 UART: [idev] Erasing UDS.KEYID = 0
8,490,332 UART: [idev] Sha1 KeyId Algorithm
8,512,849 UART: [idev] --
8,516,066 UART: [ldev] ++
8,516,651 UART: [ldev] CDI.KEYID = 6
8,517,887 UART: [ldev] SUBJECT.KEYID = 5
8,519,316 UART: [ldev] AUTHORITY.KEYID = 7
8,520,864 UART: [ldev] FE.KEYID = 1
8,531,609 UART: [ldev] Erasing FE.KEYID = 1
11,824,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,518 UART: [ldev] --
14,189,952 UART: [fwproc] Wait for Commands...
14,192,964 UART: [fwproc] Recv command 0x46574c44
14,195,267 UART: [fwproc] Recv'd Img size: 111600 bytes
18,234,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,310,438 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,370,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,688,425 >>> mbox cmd response: success
18,691,728 UART: [afmc] ++
18,692,450 UART: [afmc] CDI.KEYID = 6
18,693,636 UART: [afmc] SUBJECT.KEYID = 7
18,694,794 UART: [afmc] AUTHORITY.KEYID = 5
22,014,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,312,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,314,453 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,330,542 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,346,681 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,362,687 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,385,146 UART: [afmc] --
26,449,653 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
26,584,971 UART: [cold-reset] --
26,585,929 UART: [state] Locking Datavault
26,587,056 UART: [state] Locking PCR0, PCR1 and PCR31
26,588,598 UART: [state] Locking ICCM
26,589,500 UART: [exit] Launching FMC @ 0x40000000
26,590,919 UART:
26,591,080 UART: Running Caliptra FMC ...
26,592,200 UART:
26,592,349 UART: [fmc] Received command: 0x46574C44
26,593,719 UART:
26,593,853 UART: Running Caliptra ROM ...
26,594,859 UART:
26,594,992 UART: [state] CFI Enabled
26,602,114 UART: [state] LifecycleState = Unprovisioned
26,603,993 UART: [state] DebugLocked = No
26,606,877 UART: [state] WD Timer not started. Device not locked for debugging
26,612,297 UART: [kat] SHA2-256
26,794,241 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,805,759 UART: [kat] ++
26,806,358 UART: [kat] sha1
26,816,808 UART: [kat] SHA2-256
26,819,873 UART: [kat] SHA2-384
26,826,456 UART: [kat] SHA2-512-ACC
26,829,048 UART: [kat] ECC-384
30,085,016 UART: [kat] HMAC-384Kdf
30,096,582 UART: [kat] LMS
31,169,725 UART: [kat] --
31,174,585 UART: [update-reset] ++
31,216,241 >>> mbox cmd response: failed
31,216,611 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,218,978 UART: ROM Non-Fatal Error: 0x000B001E
31,221,975 UART: [state] Locking Datavault
31,226,748 UART: [state] Locking PCR0, PCR1 and PCR31
31,228,891 UART: [state] Locking ICCM
31,231,398 UART: [exit] Launching FMC @ 0x40000000
31,240,059 UART:
31,240,285 UART: Running Caliptra FMC ...
31,241,302 UART:
31,241,440 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,243,083 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
5,103,701 ready_for_fw is high
5,104,080 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,503,133 >>> mbox cmd response: success
26,181,072 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
26,316,268 UART:
26,316,703 UART: Running Caliptra FMC ...
26,317,794 UART:
26,317,939 UART: [fmc] Received command: 0x46574C44
30,855,728 >>> mbox cmd response: failed
30,856,187 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,869,820 UART:
30,870,117 UART: Running Caliptra FMC ...
30,871,281 UART:
30,871,435 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,873,150 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,006 UART:
192,384 UART: Running Caliptra ROM ...
193,473 UART:
193,616 UART: [state] CFI Enabled
264,497 UART: [state] LifecycleState = Unprovisioned
266,409 UART: [state] DebugLocked = No
269,138 UART: [state] WD Timer not started. Device not locked for debugging
272,967 UART: [kat] SHA2-256
452,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,669 UART: [kat] ++
464,205 UART: [kat] sha1
474,518 UART: [kat] SHA2-256
477,527 UART: [kat] SHA2-384
484,864 UART: [kat] SHA2-512-ACC
487,800 UART: [kat] ECC-384
2,946,070 UART: [kat] HMAC-384Kdf
2,970,919 UART: [kat] LMS
3,500,368 UART: [kat] --
3,503,587 UART: [cold-reset] ++
3,505,821 UART: [fht] FHT @ 0x50003400
3,515,673 UART: [idev] ++
3,516,239 UART: [idev] CDI.KEYID = 6
3,517,151 UART: [idev] SUBJECT.KEYID = 7
3,518,324 UART: [idev] UDS.KEYID = 0
3,519,372 ready_for_fw is high
3,519,610 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,660,613 UART: [idev] Erasing UDS.KEYID = 0
6,027,554 UART: [idev] Sha1 KeyId Algorithm
6,049,859 UART: [idev] --
6,054,752 UART: [ldev] ++
6,055,333 UART: [ldev] CDI.KEYID = 6
6,056,216 UART: [ldev] SUBJECT.KEYID = 5
6,057,398 UART: [ldev] AUTHORITY.KEYID = 7
6,058,635 UART: [ldev] FE.KEYID = 1
6,098,822 UART: [ldev] Erasing FE.KEYID = 1
8,605,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,332 UART: [ldev] --
10,411,819 UART: [fwproc] Wait for Commands...
10,414,886 UART: [fwproc] Recv command 0x46574c44
10,416,977 UART: [fwproc] Recv'd Img size: 111944 bytes
13,790,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,860,167 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,920,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,237,849 >>> mbox cmd response: success
14,241,753 UART: [afmc] ++
14,242,368 UART: [afmc] CDI.KEYID = 6
14,243,252 UART: [afmc] SUBJECT.KEYID = 7
14,244,471 UART: [afmc] AUTHORITY.KEYID = 5
16,782,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,452 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,525,494 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,541,499 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,557,266 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,580,673 UART: [afmc] --
20,652,764 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
20,788,644 UART: [cold-reset] --
20,789,576 UART: [state] Locking Datavault
20,790,705 UART: [state] Locking PCR0, PCR1 and PCR31
20,792,258 UART: [state] Locking ICCM
20,793,163 UART: [exit] Launching FMC @ 0x40000000
20,794,591 UART:
20,794,755 UART: Running Caliptra FMC ...
20,795,856 UART:
20,796,009 UART: [fmc] Received command: 0x46574C44
20,797,475 UART:
20,797,628 UART: Running Caliptra ROM ...
20,798,745 UART:
20,798,904 UART: [state] CFI Enabled
20,870,114 UART: [state] LifecycleState = Unprovisioned
20,871,996 UART: [state] DebugLocked = No
20,874,463 UART: [state] WD Timer not started. Device not locked for debugging
20,878,476 UART: [kat] SHA2-256
21,057,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,069,135 UART: [kat] ++
21,069,677 UART: [kat] sha1
21,081,003 UART: [kat] SHA2-256
21,084,032 UART: [kat] SHA2-384
21,090,365 UART: [kat] SHA2-512-ACC
21,093,305 UART: [kat] ECC-384
23,551,009 UART: [kat] HMAC-384Kdf
23,574,841 UART: [kat] LMS
24,104,261 UART: [kat] --
24,109,042 UART: [update-reset] ++
24,155,250 >>> mbox cmd response: failed
24,155,638 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,157,589 UART: ROM Non-Fatal Error: 0x000B001E
24,160,475 UART: [state] Locking Datavault
24,164,427 UART: [state] Locking PCR0, PCR1 and PCR31
24,166,081 UART: [state] Locking ICCM
24,168,369 UART: [exit] Launching FMC @ 0x40000000
24,176,770 UART:
24,177,001 UART: Running Caliptra FMC ...
24,178,031 UART:
24,178,177 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,179,812 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,139 UART:
192,508 UART: Running Caliptra ROM ...
193,705 UART:
193,858 UART: [state] CFI Enabled
264,848 UART: [state] LifecycleState = Unprovisioned
266,740 UART: [state] DebugLocked = No
268,709 UART: [state] WD Timer not started. Device not locked for debugging
273,177 UART: [kat] SHA2-256
452,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,898 UART: [kat] ++
464,438 UART: [kat] sha1
475,033 UART: [kat] SHA2-256
478,124 UART: [kat] SHA2-384
482,909 UART: [kat] SHA2-512-ACC
485,842 UART: [kat] ECC-384
2,945,181 UART: [kat] HMAC-384Kdf
2,969,499 UART: [kat] LMS
3,498,935 UART: [kat] --
3,503,514 UART: [cold-reset] ++
3,505,546 UART: [fht] FHT @ 0x50003400
3,517,603 UART: [idev] ++
3,518,199 UART: [idev] CDI.KEYID = 6
3,519,120 UART: [idev] SUBJECT.KEYID = 7
3,520,298 UART: [idev] UDS.KEYID = 0
3,521,223 ready_for_fw is high
3,521,404 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,662,195 UART: [idev] Erasing UDS.KEYID = 0
6,024,851 UART: [idev] Sha1 KeyId Algorithm
6,046,231 UART: [idev] --
6,050,333 UART: [ldev] ++
6,050,908 UART: [ldev] CDI.KEYID = 6
6,051,796 UART: [ldev] SUBJECT.KEYID = 5
6,053,012 UART: [ldev] AUTHORITY.KEYID = 7
6,054,250 UART: [ldev] FE.KEYID = 1
6,098,313 UART: [ldev] Erasing FE.KEYID = 1
8,602,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,121 UART: [ldev] --
10,411,420 UART: [fwproc] Wait for Commands...
10,414,603 UART: [fwproc] Recv command 0x46574c44
10,416,697 UART: [fwproc] Recv'd Img size: 111944 bytes
13,790,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,867,375 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,927,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,245,154 >>> mbox cmd response: success
14,249,189 UART: [afmc] ++
14,249,810 UART: [afmc] CDI.KEYID = 6
14,250,734 UART: [afmc] SUBJECT.KEYID = 7
14,251,841 UART: [afmc] AUTHORITY.KEYID = 5
16,784,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,188 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,526,169 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,542,227 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,557,997 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,581,414 UART: [afmc] --
20,647,281 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
20,782,949 UART: [cold-reset] --
20,783,882 UART: [state] Locking Datavault
20,784,968 UART: [state] Locking PCR0, PCR1 and PCR31
20,786,516 UART: [state] Locking ICCM
20,787,431 UART: [exit] Launching FMC @ 0x40000000
20,788,860 UART:
20,789,015 UART: Running Caliptra FMC ...
20,790,116 UART:
20,790,271 UART: [fmc] Received command: 0x46574C44
20,791,728 UART:
20,791,881 UART: Running Caliptra ROM ...
20,792,980 UART:
20,793,136 UART: [state] CFI Enabled
20,849,846 UART: [state] LifecycleState = Unprovisioned
20,851,682 UART: [state] DebugLocked = No
20,853,871 UART: [state] WD Timer not started. Device not locked for debugging
20,858,232 UART: [kat] SHA2-256
21,037,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,048,907 UART: [kat] ++
21,049,459 UART: [kat] sha1
21,061,647 UART: [kat] SHA2-256
21,064,724 UART: [kat] SHA2-384
21,069,260 UART: [kat] SHA2-512-ACC
21,072,209 UART: [kat] ECC-384
23,533,908 UART: [kat] HMAC-384Kdf
23,554,452 UART: [kat] LMS
24,083,973 UART: [kat] --
24,087,645 UART: [update-reset] ++
24,133,793 >>> mbox cmd response: failed
24,134,146 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,134,419 UART: ROM Non-Fatal Error: 0x000B001E
24,136,923 UART: [state] Locking Datavault
24,140,627 UART: [state] Locking PCR0, PCR1 and PCR31
24,142,397 UART: [state] Locking ICCM
24,143,909 UART: [exit] Launching FMC @ 0x40000000
24,152,312 UART:
24,152,557 UART: Running Caliptra FMC ...
24,153,668 UART:
24,153,824 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,155,461 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,358,308 ready_for_fw is high
3,358,715 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,008,938 >>> mbox cmd response: success
20,353,637 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
20,489,142 UART:
20,489,562 UART: Running Caliptra FMC ...
20,490,728 UART:
20,490,896 UART: [fmc] Received command: 0x46574C44
23,678,061 >>> mbox cmd response: failed
23,678,505 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,691,422 UART:
23,691,689 UART: Running Caliptra FMC ...
23,692,788 UART:
23,692,941 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,694,591 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,455 UART:
192,814 UART: Running Caliptra ROM ...
193,948 UART:
603,464 UART: [state] CFI Enabled
618,185 UART: [state] LifecycleState = Unprovisioned
619,999 UART: [state] DebugLocked = No
621,388 UART: [state] WD Timer not started. Device not locked for debugging
625,857 UART: [kat] SHA2-256
805,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,529 UART: [kat] ++
817,134 UART: [kat] sha1
828,794 UART: [kat] SHA2-256
831,798 UART: [kat] SHA2-384
838,066 UART: [kat] SHA2-512-ACC
841,068 UART: [kat] ECC-384
3,282,490 UART: [kat] HMAC-384Kdf
3,294,587 UART: [kat] LMS
3,824,082 UART: [kat] --
3,828,583 UART: [cold-reset] ++
3,830,899 UART: [fht] FHT @ 0x50003400
3,842,304 UART: [idev] ++
3,842,864 UART: [idev] CDI.KEYID = 6
3,843,888 UART: [idev] SUBJECT.KEYID = 7
3,844,983 UART: [idev] UDS.KEYID = 0
3,846,026 ready_for_fw is high
3,846,223 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,986,666 UART: [idev] Erasing UDS.KEYID = 0
6,322,058 UART: [idev] Sha1 KeyId Algorithm
6,345,705 UART: [idev] --
6,350,664 UART: [ldev] ++
6,351,227 UART: [ldev] CDI.KEYID = 6
6,352,237 UART: [ldev] SUBJECT.KEYID = 5
6,353,357 UART: [ldev] AUTHORITY.KEYID = 7
6,354,581 UART: [ldev] FE.KEYID = 1
6,366,794 UART: [ldev] Erasing FE.KEYID = 1
8,841,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,892 UART: [ldev] --
10,634,404 UART: [fwproc] Wait for Commands...
10,636,232 UART: [fwproc] Recv command 0x46574c44
10,638,264 UART: [fwproc] Recv'd Img size: 111944 bytes
14,007,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,082,798 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,143,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,461,413 >>> mbox cmd response: success
14,465,820 UART: [afmc] ++
14,466,434 UART: [afmc] CDI.KEYID = 6
14,467,558 UART: [afmc] SUBJECT.KEYID = 7
14,468,682 UART: [afmc] AUTHORITY.KEYID = 5
16,967,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,689,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,691,156 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,707,108 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,723,138 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,738,923 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,762,665 UART: [afmc] --
20,828,069 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
20,963,764 UART: [cold-reset] --
20,964,705 UART: [state] Locking Datavault
20,965,868 UART: [state] Locking PCR0, PCR1 and PCR31
20,967,406 UART: [state] Locking ICCM
20,968,314 UART: [exit] Launching FMC @ 0x40000000
20,969,732 UART:
20,969,897 UART: Running Caliptra FMC ...
20,970,997 UART:
20,971,149 UART: [fmc] Received command: 0x46574C44
20,972,600 UART:
20,972,751 UART: Running Caliptra ROM ...
20,973,865 UART:
20,974,020 UART: [state] CFI Enabled
20,980,289 UART: [state] LifecycleState = Unprovisioned
20,982,119 UART: [state] DebugLocked = No
20,983,979 UART: [state] WD Timer not started. Device not locked for debugging
20,987,714 UART: [kat] SHA2-256
21,166,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,178,462 UART: [kat] ++
21,179,003 UART: [kat] sha1
21,189,542 UART: [kat] SHA2-256
21,192,538 UART: [kat] SHA2-384
21,199,074 UART: [kat] SHA2-512-ACC
21,202,012 UART: [kat] ECC-384
23,641,405 UART: [kat] HMAC-384Kdf
23,654,485 UART: [kat] LMS
24,183,990 UART: [kat] --
24,187,396 UART: [update-reset] ++
24,234,499 >>> mbox cmd response: failed
24,234,889 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,236,955 UART: ROM Non-Fatal Error: 0x000B001E
24,239,248 UART: [state] Locking Datavault
24,241,742 UART: [state] Locking PCR0, PCR1 and PCR31
24,243,385 UART: [state] Locking ICCM
24,245,963 UART: [exit] Launching FMC @ 0x40000000
24,254,354 UART:
24,254,591 UART: Running Caliptra FMC ...
24,255,614 UART:
24,255,758 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,257,379 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,699,376 ready_for_fw is high
3,699,791 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,225,279 >>> mbox cmd response: success
20,522,010 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
20,657,426 UART:
20,657,834 UART: Running Caliptra FMC ...
20,658,997 UART:
20,659,174 UART: [fmc] Received command: 0x46574C44
23,786,930 >>> mbox cmd response: failed
23,787,393 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,799,510 UART:
23,799,761 UART: Running Caliptra FMC ...
23,800,929 UART:
23,801,096 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,802,735 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,322 UART: [kat] HMAC-384Kdf
919,926 UART: [kat] LMS
1,168,238 UART: [kat] --
1,168,843 UART: [cold-reset] ++
1,169,231 UART: [fht] FHT @ 0x50003400
1,171,935 UART: [idev] ++
1,172,103 UART: [idev] CDI.KEYID = 6
1,172,464 UART: [idev] SUBJECT.KEYID = 7
1,172,889 UART: [idev] UDS.KEYID = 0
1,173,235 ready_for_fw is high
1,173,235 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,180,679 UART: [idev] Erasing UDS.KEYID = 0
1,197,491 UART: [idev] Sha1 KeyId Algorithm
1,206,547 UART: [idev] --
1,207,388 UART: [ldev] ++
1,207,556 UART: [ldev] CDI.KEYID = 6
1,207,920 UART: [ldev] SUBJECT.KEYID = 5
1,208,347 UART: [ldev] AUTHORITY.KEYID = 7
1,208,810 UART: [ldev] FE.KEYID = 1
1,214,256 UART: [ldev] Erasing FE.KEYID = 1
1,240,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,440 UART: [ldev] --
1,279,920 UART: [fwproc] Wait for Commands...
1,280,527 UART: [fwproc] Recv command 0x46574c44
1,281,260 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,154 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,825 >>> mbox cmd response: success
2,741,020 UART: [afmc] ++
2,741,188 UART: [afmc] CDI.KEYID = 6
2,741,551 UART: [afmc] SUBJECT.KEYID = 7
2,741,977 UART: [afmc] AUTHORITY.KEYID = 5
2,777,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,739 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,454 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,346 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,058 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,965 UART: [afmc] --
2,820,985 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,821,007 UART: [cold-reset] --
2,821,833 UART: [state] Locking Datavault
2,823,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,814 UART: [state] Locking ICCM
2,824,374 UART: [exit] Launching FMC @ 0x40000000
2,829,671 UART:
2,829,687 UART: Running Caliptra FMC ...
2,830,095 UART:
2,830,325 UART: [fmc] Received command: 0x46574C44
2,831,151 UART:
2,831,167 UART: Running Caliptra ROM ...
2,831,575 UART:
2,831,630 UART: [state] CFI Enabled
2,834,540 UART: [state] LifecycleState = Unprovisioned
2,835,195 UART: [state] DebugLocked = No
2,835,779 UART: [state] WD Timer not started. Device not locked for debugging
2,837,007 UART: [kat] SHA2-256
3,640,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,686 UART: [kat] ++
3,644,838 UART: [kat] sha1
3,649,040 UART: [kat] SHA2-256
3,650,980 UART: [kat] SHA2-384
3,653,625 UART: [kat] SHA2-512-ACC
3,655,525 UART: [kat] ECC-384
3,665,072 UART: [kat] HMAC-384Kdf
3,669,618 UART: [kat] LMS
3,917,930 UART: [kat] --
3,918,916 UART: [update-reset] ++
3,935,778 >>> mbox cmd response: failed
3,935,778 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,112 UART: ROM Non-Fatal Error: 0x000B001E
3,936,924 UART: [state] Locking Datavault
3,937,916 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,520 UART: [state] Locking ICCM
3,938,964 UART: [exit] Launching FMC @ 0x40000000
3,944,261 UART:
3,944,277 UART: Running Caliptra FMC ...
3,944,685 UART:
3,944,907 UART: [fmc] Received command: 0x1000000C
3,945,642 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,476 ready_for_fw is high
1,056,476 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,783 >>> mbox cmd response: success
2,646,196 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,652,329 UART:
2,652,345 UART: Running Caliptra FMC ...
2,652,753 UART:
2,652,983 UART: [fmc] Received command: 0x46574C44
3,641,160 >>> mbox cmd response: failed
3,641,160 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,329 UART:
3,647,345 UART: Running Caliptra FMC ...
3,647,753 UART:
3,647,975 UART: [fmc] Received command: 0x1000000C
3,648,710 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,442 UART: [cold-reset] ++
1,171,016 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,174,906 ready_for_fw is high
1,174,906 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,198,688 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,845 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,580,407 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,974 >>> mbox cmd response: success
2,743,063 UART: [afmc] ++
2,743,231 UART: [afmc] CDI.KEYID = 6
2,743,594 UART: [afmc] SUBJECT.KEYID = 7
2,744,020 UART: [afmc] AUTHORITY.KEYID = 5
2,779,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,700 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,415 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,307 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,814,019 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,814 UART: [afmc] --
2,822,892 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,822,914 UART: [cold-reset] --
2,823,792 UART: [state] Locking Datavault
2,825,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,697 UART: [state] Locking ICCM
2,826,239 UART: [exit] Launching FMC @ 0x40000000
2,831,536 UART:
2,831,552 UART: Running Caliptra FMC ...
2,831,960 UART:
2,832,190 UART: [fmc] Received command: 0x46574C44
2,833,016 UART:
2,833,032 UART: Running Caliptra ROM ...
2,833,440 UART:
2,833,582 UART: [state] CFI Enabled
2,836,336 UART: [state] LifecycleState = Unprovisioned
2,836,991 UART: [state] DebugLocked = No
2,837,727 UART: [state] WD Timer not started. Device not locked for debugging
2,839,055 UART: [kat] SHA2-256
3,642,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,734 UART: [kat] ++
3,646,886 UART: [kat] sha1
3,651,106 UART: [kat] SHA2-256
3,653,046 UART: [kat] SHA2-384
3,655,749 UART: [kat] SHA2-512-ACC
3,657,649 UART: [kat] ECC-384
3,667,302 UART: [kat] HMAC-384Kdf
3,671,962 UART: [kat] LMS
3,920,274 UART: [kat] --
3,921,096 UART: [update-reset] ++
3,937,950 >>> mbox cmd response: failed
3,937,950 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,430 UART: ROM Non-Fatal Error: 0x000B001E
3,939,332 UART: [state] Locking Datavault
3,940,090 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,694 UART: [state] Locking ICCM
3,941,304 UART: [exit] Launching FMC @ 0x40000000
3,946,601 UART:
3,946,617 UART: Running Caliptra FMC ...
3,947,025 UART:
3,947,247 UART: [fmc] Received command: 0x1000000C
3,947,982 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 ready_for_fw is high
1,056,827 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,320 >>> mbox cmd response: success
2,647,645 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,653,612 UART:
2,653,628 UART: Running Caliptra FMC ...
2,654,036 UART:
2,654,266 UART: [fmc] Received command: 0x46574C44
3,643,760 >>> mbox cmd response: failed
3,643,760 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,649,503 UART:
3,649,519 UART: Running Caliptra FMC ...
3,649,927 UART:
3,650,149 UART: [fmc] Received command: 0x1000000C
3,650,884 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,173,975 ready_for_fw is high
1,173,975 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,199,031 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,242,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,080 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,293 UART: [fwproc] Recv command 0x46574c44
1,283,026 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,776 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,305 >>> mbox cmd response: success
2,742,528 UART: [afmc] ++
2,742,696 UART: [afmc] CDI.KEYID = 6
2,743,059 UART: [afmc] SUBJECT.KEYID = 7
2,743,485 UART: [afmc] AUTHORITY.KEYID = 5
2,778,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,665 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,801,380 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,807,272 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,984 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,805 UART: [afmc] --
2,821,879 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,821,901 UART: [cold-reset] --
2,822,859 UART: [state] Locking Datavault
2,824,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,652 UART: [state] Locking ICCM
2,825,166 UART: [exit] Launching FMC @ 0x40000000
2,830,463 UART:
2,830,479 UART: Running Caliptra FMC ...
2,830,887 UART:
2,831,117 UART: [fmc] Received command: 0x46574C44
2,831,943 UART:
2,831,959 UART: Running Caliptra ROM ...
2,832,367 UART:
2,832,422 UART: [state] CFI Enabled
2,834,800 UART: [state] LifecycleState = Unprovisioned
2,835,455 UART: [state] DebugLocked = No
2,836,129 UART: [state] WD Timer not started. Device not locked for debugging
2,837,249 UART: [kat] SHA2-256
3,640,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,928 UART: [kat] ++
3,645,080 UART: [kat] sha1
3,649,370 UART: [kat] SHA2-256
3,651,310 UART: [kat] SHA2-384
3,653,999 UART: [kat] SHA2-512-ACC
3,655,899 UART: [kat] ECC-384
3,665,578 UART: [kat] HMAC-384Kdf
3,670,200 UART: [kat] LMS
3,918,512 UART: [kat] --
3,919,268 UART: [update-reset] ++
3,935,698 >>> mbox cmd response: failed
3,935,698 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,198 UART: ROM Non-Fatal Error: 0x000B001E
3,937,088 UART: [state] Locking Datavault
3,937,662 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,266 UART: [state] Locking ICCM
3,938,852 UART: [exit] Launching FMC @ 0x40000000
3,944,149 UART:
3,944,165 UART: Running Caliptra FMC ...
3,944,573 UART:
3,944,795 UART: [fmc] Received command: 0x1000000C
3,945,530 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,810 ready_for_fw is high
1,055,810 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,629 >>> mbox cmd response: success
2,645,892 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,652,353 UART:
2,652,369 UART: Running Caliptra FMC ...
2,652,777 UART:
2,653,007 UART: [fmc] Received command: 0x46574C44
3,641,648 >>> mbox cmd response: failed
3,641,648 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,475 UART:
3,647,491 UART: Running Caliptra FMC ...
3,647,899 UART:
3,648,121 UART: [fmc] Received command: 0x1000000C
3,648,856 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,174,296 ready_for_fw is high
1,174,296 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,108 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,849 UART: [fwproc] Wait for Commands...
1,282,628 UART: [fwproc] Recv command 0x46574c44
1,283,361 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,581,349 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,034 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,742,990 >>> mbox cmd response: success
2,744,223 UART: [afmc] ++
2,744,391 UART: [afmc] CDI.KEYID = 6
2,744,754 UART: [afmc] SUBJECT.KEYID = 7
2,745,180 UART: [afmc] AUTHORITY.KEYID = 5
2,780,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,208 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,803,923 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,809,815 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,815,527 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,823,348 UART: [afmc] --
2,824,378 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,824,400 UART: [cold-reset] --
2,825,466 UART: [state] Locking Datavault
2,826,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,287 UART: [state] Locking ICCM
2,827,855 UART: [exit] Launching FMC @ 0x40000000
2,833,152 UART:
2,833,168 UART: Running Caliptra FMC ...
2,833,576 UART:
2,833,806 UART: [fmc] Received command: 0x46574C44
2,834,632 UART:
2,834,648 UART: Running Caliptra ROM ...
2,835,056 UART:
2,835,198 UART: [state] CFI Enabled
2,838,004 UART: [state] LifecycleState = Unprovisioned
2,838,659 UART: [state] DebugLocked = No
2,839,257 UART: [state] WD Timer not started. Device not locked for debugging
2,840,441 UART: [kat] SHA2-256
3,643,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,648,120 UART: [kat] ++
3,648,272 UART: [kat] sha1
3,652,286 UART: [kat] SHA2-256
3,654,226 UART: [kat] SHA2-384
3,656,951 UART: [kat] SHA2-512-ACC
3,658,851 UART: [kat] ECC-384
3,668,414 UART: [kat] HMAC-384Kdf
3,672,946 UART: [kat] LMS
3,921,258 UART: [kat] --
3,921,986 UART: [update-reset] ++
3,938,608 >>> mbox cmd response: failed
3,938,608 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,939,228 UART: ROM Non-Fatal Error: 0x000B001E
3,940,012 UART: [state] Locking Datavault
3,940,824 UART: [state] Locking PCR0, PCR1 and PCR31
3,941,428 UART: [state] Locking ICCM
3,942,084 UART: [exit] Launching FMC @ 0x40000000
3,947,381 UART:
3,947,397 UART: Running Caliptra FMC ...
3,947,805 UART:
3,948,027 UART: [fmc] Received command: 0x1000000C
3,948,762 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 ready_for_fw is high
1,056,511 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,926 >>> mbox cmd response: success
2,646,531 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,652,764 UART:
2,652,780 UART: Running Caliptra FMC ...
2,653,188 UART:
2,653,418 UART: [fmc] Received command: 0x46574C44
3,642,594 >>> mbox cmd response: failed
3,642,594 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,648,119 UART:
3,648,135 UART: Running Caliptra FMC ...
3,648,543 UART:
3,648,765 UART: [fmc] Received command: 0x1000000C
3,649,500 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
916,350 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,407 UART: [cold-reset] ++
1,170,749 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,174,687 ready_for_fw is high
1,174,687 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,723 UART: [idev] Erasing UDS.KEYID = 0
1,199,753 UART: [idev] Sha1 KeyId Algorithm
1,208,773 UART: [idev] --
1,209,770 UART: [ldev] ++
1,209,938 UART: [ldev] CDI.KEYID = 6
1,210,302 UART: [ldev] SUBJECT.KEYID = 5
1,210,729 UART: [ldev] AUTHORITY.KEYID = 7
1,211,192 UART: [ldev] FE.KEYID = 1
1,216,500 UART: [ldev] Erasing FE.KEYID = 1
1,243,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,674 UART: [ldev] --
1,283,086 UART: [fwproc] Wait for Commands...
1,283,701 UART: [fwproc] Recv command 0x46574c44
1,284,434 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,846 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,479 >>> mbox cmd response: success
2,742,612 UART: [afmc] ++
2,742,780 UART: [afmc] CDI.KEYID = 6
2,743,143 UART: [afmc] SUBJECT.KEYID = 7
2,743,569 UART: [afmc] AUTHORITY.KEYID = 5
2,779,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,521 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,236 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,128 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,813,840 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,693 UART: [afmc] --
2,822,779 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,822,801 UART: [cold-reset] --
2,823,675 UART: [state] Locking Datavault
2,824,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,825,164 UART: [state] Locking ICCM
2,825,634 UART: [exit] Launching FMC @ 0x40000000
2,830,931 UART:
2,830,947 UART: Running Caliptra FMC ...
2,831,355 UART:
2,831,585 UART: [fmc] Received command: 0x46574C44
2,832,411 UART:
2,832,427 UART: Running Caliptra ROM ...
2,832,835 UART:
2,832,890 UART: [state] CFI Enabled
2,835,980 UART: [state] LifecycleState = Unprovisioned
2,836,635 UART: [state] DebugLocked = No
2,837,369 UART: [state] WD Timer not started. Device not locked for debugging
2,838,495 UART: [kat] SHA2-256
3,642,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,646,174 UART: [kat] ++
3,646,326 UART: [kat] sha1
3,650,606 UART: [kat] SHA2-256
3,652,546 UART: [kat] SHA2-384
3,655,417 UART: [kat] SHA2-512-ACC
3,657,317 UART: [kat] ECC-384
3,667,128 UART: [kat] HMAC-384Kdf
3,671,622 UART: [kat] LMS
3,919,934 UART: [kat] --
3,920,824 UART: [update-reset] ++
3,937,622 >>> mbox cmd response: failed
3,937,622 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,937,918 UART: ROM Non-Fatal Error: 0x000B001E
3,938,744 UART: [state] Locking Datavault
3,939,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,194 UART: [state] Locking ICCM
3,940,778 UART: [exit] Launching FMC @ 0x40000000
3,946,075 UART:
3,946,091 UART: Running Caliptra FMC ...
3,946,499 UART:
3,946,721 UART: [fmc] Received command: 0x1000000C
3,947,456 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,672 ready_for_fw is high
1,055,672 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,587,469 >>> mbox cmd response: success
2,642,982 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,649,363 UART:
2,649,379 UART: Running Caliptra FMC ...
2,649,787 UART:
2,650,017 UART: [fmc] Received command: 0x46574C44
3,638,822 >>> mbox cmd response: failed
3,638,822 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,644,513 UART:
3,644,529 UART: Running Caliptra FMC ...
3,644,937 UART:
3,645,159 UART: [fmc] Received command: 0x1000000C
3,645,894 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,334 UART: [kat] SHA2-256
902,274 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,174,264 ready_for_fw is high
1,174,264 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,198,762 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,769 UART: [ldev] ++
1,208,937 UART: [ldev] CDI.KEYID = 6
1,209,301 UART: [ldev] SUBJECT.KEYID = 5
1,209,728 UART: [ldev] AUTHORITY.KEYID = 7
1,210,191 UART: [ldev] FE.KEYID = 1
1,215,571 UART: [ldev] Erasing FE.KEYID = 1
1,241,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,163 UART: [fwproc] Wait for Commands...
1,281,820 UART: [fwproc] Recv command 0x46574c44
1,282,553 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,355 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,834 >>> mbox cmd response: success
2,740,881 UART: [afmc] ++
2,741,049 UART: [afmc] CDI.KEYID = 6
2,741,412 UART: [afmc] SUBJECT.KEYID = 7
2,741,838 UART: [afmc] AUTHORITY.KEYID = 5
2,777,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,070 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,785 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,677 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,389 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,820,090 UART: [afmc] --
2,820,950 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,820,972 UART: [cold-reset] --
2,821,888 UART: [state] Locking Datavault
2,823,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,611 UART: [state] Locking ICCM
2,824,057 UART: [exit] Launching FMC @ 0x40000000
2,829,354 UART:
2,829,370 UART: Running Caliptra FMC ...
2,829,778 UART:
2,830,008 UART: [fmc] Received command: 0x46574C44
2,830,834 UART:
2,830,850 UART: Running Caliptra ROM ...
2,831,258 UART:
2,831,400 UART: [state] CFI Enabled
2,834,272 UART: [state] LifecycleState = Unprovisioned
2,834,927 UART: [state] DebugLocked = No
2,835,583 UART: [state] WD Timer not started. Device not locked for debugging
2,836,877 UART: [kat] SHA2-256
3,640,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,556 UART: [kat] ++
3,644,708 UART: [kat] sha1
3,648,704 UART: [kat] SHA2-256
3,650,644 UART: [kat] SHA2-384
3,653,343 UART: [kat] SHA2-512-ACC
3,655,243 UART: [kat] ECC-384
3,664,678 UART: [kat] HMAC-384Kdf
3,669,310 UART: [kat] LMS
3,917,622 UART: [kat] --
3,918,168 UART: [update-reset] ++
3,935,016 >>> mbox cmd response: failed
3,935,016 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,935,324 UART: ROM Non-Fatal Error: 0x000B001E
3,936,136 UART: [state] Locking Datavault
3,936,700 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,304 UART: [state] Locking ICCM
3,937,804 UART: [exit] Launching FMC @ 0x40000000
3,943,101 UART:
3,943,117 UART: Running Caliptra FMC ...
3,943,525 UART:
3,943,747 UART: [fmc] Received command: 0x1000000C
3,944,482 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,633 ready_for_fw is high
1,056,633 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,636 >>> mbox cmd response: success
2,648,285 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,654,514 UART:
2,654,530 UART: Running Caliptra FMC ...
2,654,938 UART:
2,655,168 UART: [fmc] Received command: 0x46574C44
3,643,758 >>> mbox cmd response: failed
3,643,758 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,649,553 UART:
3,649,569 UART: Running Caliptra FMC ...
3,649,977 UART:
3,650,199 UART: [fmc] Received command: 0x1000000C
3,650,934 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,164 UART:
192,519 UART: Running Caliptra ROM ...
193,636 UART:
193,781 UART: [state] CFI Enabled
266,447 UART: [state] LifecycleState = Unprovisioned
268,860 UART: [state] DebugLocked = No
270,322 UART: [state] WD Timer not started. Device not locked for debugging
274,199 UART: [kat] SHA2-256
456,112 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,674 UART: [kat] ++
468,120 UART: [kat] sha1
478,922 UART: [kat] SHA2-256
481,994 UART: [kat] SHA2-384
487,197 UART: [kat] SHA2-512-ACC
489,844 UART: [kat] ECC-384
3,775,916 UART: [kat] HMAC-384Kdf
3,801,752 UART: [kat] LMS
4,874,897 UART: [kat] --
4,879,132 UART: [cold-reset] ++
4,881,138 UART: [fht] FHT @ 0x50003400
4,892,825 UART: [idev] ++
4,893,465 UART: [idev] CDI.KEYID = 6
4,894,710 UART: [idev] SUBJECT.KEYID = 7
4,895,810 UART: [idev] UDS.KEYID = 0
4,896,810 ready_for_fw is high
4,897,006 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,037,471 UART: [idev] Erasing UDS.KEYID = 0
8,243,117 UART: [idev] Sha1 KeyId Algorithm
8,266,358 UART: [idev] --
8,269,106 UART: [ldev] ++
8,269,677 UART: [ldev] CDI.KEYID = 6
8,270,906 UART: [ldev] SUBJECT.KEYID = 5
8,272,086 UART: [ldev] AUTHORITY.KEYID = 7
8,273,217 UART: [ldev] FE.KEYID = 1
8,318,733 UART: [ldev] Erasing FE.KEYID = 1
11,651,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,691 UART: [ldev] --
14,038,516 UART: [fwproc] Wait for Commands...
14,041,256 UART: [fwproc] Recv command 0x46574c44
14,043,562 UART: [fwproc] Recv'd Img size: 111600 bytes
22,786,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,866,273 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,926,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
23,244,649 >>> mbox cmd response: success
23,247,979 UART: [afmc] ++
23,248,701 UART: [afmc] CDI.KEYID = 6
23,249,809 UART: [afmc] SUBJECT.KEYID = 7
23,251,022 UART: [afmc] AUTHORITY.KEYID = 5
26,612,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,914,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,916,538 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,932,627 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,948,692 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,964,678 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,986,573 UART: [afmc] --
28,990,722 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
29,131,344 UART: [cold-reset] --
29,132,195 UART: [state] Locking Datavault
29,133,269 UART: [state] Locking PCR0, PCR1 and PCR31
29,134,803 UART: [state] Locking ICCM
29,135,702 UART: [exit] Launching FMC @ 0x40000000
29,137,044 UART:
29,137,191 UART: Running Caliptra FMC ...
29,138,290 UART:
29,138,441 UART: [fmc] Received command: 0x46574C44
29,139,811 UART:
29,139,955 UART: Running Caliptra ROM ...
29,140,967 UART:
29,141,111 UART: [state] CFI Enabled
29,207,360 UART: [state] LifecycleState = Unprovisioned
29,209,235 UART: [state] DebugLocked = No
29,212,111 UART: [state] WD Timer not started. Device not locked for debugging
29,216,192 UART: [kat] SHA2-256
29,398,113 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,409,609 UART: [kat] ++
29,410,117 UART: [kat] sha1
29,419,940 UART: [kat] SHA2-256
29,422,963 UART: [kat] SHA2-384
29,429,761 UART: [kat] SHA2-512-ACC
29,432,368 UART: [kat] ECC-384
32,719,428 UART: [kat] HMAC-384Kdf
32,743,226 UART: [kat] LMS
33,816,397 UART: [kat] --
33,821,143 UART: [update-reset] ++
33,869,898 >>> mbox cmd response: failed
33,870,321 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,871,523 UART: ROM Non-Fatal Error: 0x000B003D
33,874,685 UART: [state] Locking Datavault
33,879,021 UART: [state] Locking PCR0, PCR1 and PCR31
33,881,215 UART: [state] Locking ICCM
33,883,579 UART: [exit] Launching FMC @ 0x40000000
33,892,218 UART:
33,892,485 UART: Running Caliptra FMC ...
33,893,592 UART:
33,893,750 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,895,381 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
4,781,434 ready_for_fw is high
4,782,060 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
22,798,706 >>> mbox cmd response: success
28,475,720 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
28,616,519 UART:
28,616,895 UART: Running Caliptra FMC ...
28,618,096 UART:
28,618,269 UART: [fmc] Received command: 0x46574C44
33,267,296 >>> mbox cmd response: failed
33,267,769 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,281,010 UART:
33,281,269 UART: Running Caliptra FMC ...
33,282,462 UART:
33,282,621 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,284,491 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
193,204 UART:
193,563 UART: Running Caliptra ROM ...
194,750 UART:
604,443 UART: [state] CFI Enabled
618,699 UART: [state] LifecycleState = Unprovisioned
621,071 UART: [state] DebugLocked = No
623,029 UART: [state] WD Timer not started. Device not locked for debugging
627,114 UART: [kat] SHA2-256
809,122 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,646 UART: [kat] ++
821,160 UART: [kat] sha1
832,044 UART: [kat] SHA2-256
835,058 UART: [kat] SHA2-384
841,756 UART: [kat] SHA2-512-ACC
844,401 UART: [kat] ECC-384
4,100,806 UART: [kat] HMAC-384Kdf
4,113,725 UART: [kat] LMS
5,186,873 UART: [kat] --
5,191,959 UART: [cold-reset] ++
5,193,402 UART: [fht] FHT @ 0x50003400
5,204,616 UART: [idev] ++
5,205,409 UART: [idev] CDI.KEYID = 6
5,206,446 UART: [idev] SUBJECT.KEYID = 7
5,207,975 UART: [idev] UDS.KEYID = 0
5,209,154 ready_for_fw is high
5,209,356 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,349,453 UART: [idev] Erasing UDS.KEYID = 0
8,501,596 UART: [idev] Sha1 KeyId Algorithm
8,524,125 UART: [idev] --
8,527,733 UART: [ldev] ++
8,528,293 UART: [ldev] CDI.KEYID = 6
8,529,444 UART: [ldev] SUBJECT.KEYID = 5
8,530,976 UART: [ldev] AUTHORITY.KEYID = 7
8,532,528 UART: [ldev] FE.KEYID = 1
8,542,492 UART: [ldev] Erasing FE.KEYID = 1
11,831,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,874 UART: [ldev] --
14,196,624 UART: [fwproc] Wait for Commands...
14,199,466 UART: [fwproc] Recv command 0x46574c44
14,201,785 UART: [fwproc] Recv'd Img size: 111600 bytes
22,805,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,886,855 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,947,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
23,264,317 >>> mbox cmd response: success
23,268,409 UART: [afmc] ++
23,269,138 UART: [afmc] CDI.KEYID = 6
23,270,241 UART: [afmc] SUBJECT.KEYID = 7
23,271,508 UART: [afmc] AUTHORITY.KEYID = 5
26,590,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,884,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,885,928 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,902,022 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,918,103 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,934,067 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,956,821 UART: [afmc] --
28,961,928 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
29,102,707 UART: [cold-reset] --
29,103,572 UART: [state] Locking Datavault
29,104,643 UART: [state] Locking PCR0, PCR1 and PCR31
29,106,173 UART: [state] Locking ICCM
29,107,042 UART: [exit] Launching FMC @ 0x40000000
29,108,379 UART:
29,108,518 UART: Running Caliptra FMC ...
29,109,607 UART:
29,109,750 UART: [fmc] Received command: 0x46574C44
29,111,113 UART:
29,111,249 UART: Running Caliptra ROM ...
29,112,284 UART:
29,112,423 UART: [state] CFI Enabled
29,120,783 UART: [state] LifecycleState = Unprovisioned
29,122,661 UART: [state] DebugLocked = No
29,124,406 UART: [state] WD Timer not started. Device not locked for debugging
29,129,904 UART: [kat] SHA2-256
29,311,851 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,323,418 UART: [kat] ++
29,323,921 UART: [kat] sha1
29,334,146 UART: [kat] SHA2-256
29,337,211 UART: [kat] SHA2-384
29,343,407 UART: [kat] SHA2-512-ACC
29,346,020 UART: [kat] ECC-384
32,602,257 UART: [kat] HMAC-384Kdf
32,614,067 UART: [kat] LMS
33,687,214 UART: [kat] --
33,691,215 UART: [update-reset] ++
33,741,920 >>> mbox cmd response: failed
33,742,303 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,744,783 UART: ROM Non-Fatal Error: 0x000B003D
33,746,873 UART: [state] Locking Datavault
33,749,537 UART: [state] Locking PCR0, PCR1 and PCR31
33,751,726 UART: [state] Locking ICCM
33,753,980 UART: [exit] Launching FMC @ 0x40000000
33,762,652 UART:
33,762,879 UART: Running Caliptra FMC ...
33,764,484 UART:
33,764,648 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,766,292 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
5,099,945 ready_for_fw is high
5,100,543 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
22,927,052 >>> mbox cmd response: success
28,547,164 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
28,687,866 UART:
28,688,259 UART: Running Caliptra FMC ...
28,689,362 UART:
28,689,507 UART: [fmc] Received command: 0x46574C44
33,228,272 >>> mbox cmd response: failed
33,228,765 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,241,850 UART:
33,242,131 UART: Running Caliptra FMC ...
33,243,312 UART:
33,243,465 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,245,098 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,050 UART:
192,423 UART: Running Caliptra ROM ...
193,513 UART:
193,653 UART: [state] CFI Enabled
262,236 UART: [state] LifecycleState = Unprovisioned
264,147 UART: [state] DebugLocked = No
266,161 UART: [state] WD Timer not started. Device not locked for debugging
269,604 UART: [kat] SHA2-256
448,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,348 UART: [kat] ++
460,886 UART: [kat] sha1
471,622 UART: [kat] SHA2-256
474,695 UART: [kat] SHA2-384
480,751 UART: [kat] SHA2-512-ACC
483,703 UART: [kat] ECC-384
2,949,733 UART: [kat] HMAC-384Kdf
2,972,357 UART: [kat] LMS
3,501,832 UART: [kat] --
3,506,638 UART: [cold-reset] ++
3,508,363 UART: [fht] FHT @ 0x50003400
3,518,991 UART: [idev] ++
3,519,552 UART: [idev] CDI.KEYID = 6
3,520,472 UART: [idev] SUBJECT.KEYID = 7
3,521,647 UART: [idev] UDS.KEYID = 0
3,522,697 ready_for_fw is high
3,522,911 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,663,800 UART: [idev] Erasing UDS.KEYID = 0
6,028,043 UART: [idev] Sha1 KeyId Algorithm
6,050,366 UART: [idev] --
6,055,849 UART: [ldev] ++
6,056,452 UART: [ldev] CDI.KEYID = 6
6,057,370 UART: [ldev] SUBJECT.KEYID = 5
6,058,478 UART: [ldev] AUTHORITY.KEYID = 7
6,059,764 UART: [ldev] FE.KEYID = 1
6,101,739 UART: [ldev] Erasing FE.KEYID = 1
8,604,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,087 UART: [ldev] --
10,416,920 UART: [fwproc] Wait for Commands...
10,420,087 UART: [fwproc] Recv command 0x46574c44
10,422,180 UART: [fwproc] Recv'd Img size: 111944 bytes
14,975,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,056,869 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,117,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,435,099 >>> mbox cmd response: success
15,440,112 UART: [afmc] ++
15,440,723 UART: [afmc] CDI.KEYID = 6
15,441,632 UART: [afmc] SUBJECT.KEYID = 7
15,442,730 UART: [afmc] AUTHORITY.KEYID = 5
17,981,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,704,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,706,135 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,722,128 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,738,098 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,753,908 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,776,591 UART: [afmc] --
19,781,570 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
19,922,659 UART: [cold-reset] --
19,923,520 UART: [state] Locking Datavault
19,924,697 UART: [state] Locking PCR0, PCR1 and PCR31
19,926,239 UART: [state] Locking ICCM
19,927,145 UART: [exit] Launching FMC @ 0x40000000
19,928,570 UART:
19,928,729 UART: Running Caliptra FMC ...
19,929,826 UART:
19,929,982 UART: [fmc] Received command: 0x46574C44
19,931,437 UART:
19,931,594 UART: Running Caliptra ROM ...
19,932,689 UART:
19,932,844 UART: [state] CFI Enabled
19,998,196 UART: [state] LifecycleState = Unprovisioned
20,000,076 UART: [state] DebugLocked = No
20,002,392 UART: [state] WD Timer not started. Device not locked for debugging
20,006,732 UART: [kat] SHA2-256
20,185,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,197,443 UART: [kat] ++
20,197,982 UART: [kat] sha1
20,208,307 UART: [kat] SHA2-256
20,211,353 UART: [kat] SHA2-384
20,217,991 UART: [kat] SHA2-512-ACC
20,220,942 UART: [kat] ECC-384
22,680,131 UART: [kat] HMAC-384Kdf
22,701,634 UART: [kat] LMS
23,231,094 UART: [kat] --
23,236,229 UART: [update-reset] ++
23,293,737 >>> mbox cmd response: failed
23,294,152 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,295,128 UART: ROM Non-Fatal Error: 0x000B003D
23,298,236 UART: [state] Locking Datavault
23,301,875 UART: [state] Locking PCR0, PCR1 and PCR31
23,303,521 UART: [state] Locking ICCM
23,305,583 UART: [exit] Launching FMC @ 0x40000000
23,313,983 UART:
23,314,218 UART: Running Caliptra FMC ...
23,315,318 UART:
23,315,471 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,317,097 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,188 UART:
192,553 UART: Running Caliptra ROM ...
193,671 UART:
193,813 UART: [state] CFI Enabled
264,134 UART: [state] LifecycleState = Unprovisioned
266,041 UART: [state] DebugLocked = No
267,868 UART: [state] WD Timer not started. Device not locked for debugging
271,816 UART: [kat] SHA2-256
450,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,521 UART: [kat] ++
463,050 UART: [kat] sha1
475,709 UART: [kat] SHA2-256
478,734 UART: [kat] SHA2-384
486,409 UART: [kat] SHA2-512-ACC
488,982 UART: [kat] ECC-384
2,950,028 UART: [kat] HMAC-384Kdf
2,973,504 UART: [kat] LMS
3,502,937 UART: [kat] --
3,505,664 UART: [cold-reset] ++
3,507,169 UART: [fht] FHT @ 0x50003400
3,518,432 UART: [idev] ++
3,519,002 UART: [idev] CDI.KEYID = 6
3,519,890 UART: [idev] SUBJECT.KEYID = 7
3,521,139 UART: [idev] UDS.KEYID = 0
3,522,040 ready_for_fw is high
3,522,227 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,663,026 UART: [idev] Erasing UDS.KEYID = 0
6,030,223 UART: [idev] Sha1 KeyId Algorithm
6,053,749 UART: [idev] --
6,056,886 UART: [ldev] ++
6,057,460 UART: [ldev] CDI.KEYID = 6
6,058,382 UART: [ldev] SUBJECT.KEYID = 5
6,059,546 UART: [ldev] AUTHORITY.KEYID = 7
6,060,781 UART: [ldev] FE.KEYID = 1
6,101,456 UART: [ldev] Erasing FE.KEYID = 1
8,610,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,088 UART: [ldev] --
10,416,678 UART: [fwproc] Wait for Commands...
10,418,290 UART: [fwproc] Recv command 0x46574c44
10,420,385 UART: [fwproc] Recv'd Img size: 111944 bytes
14,967,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,048,041 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,108,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,427,237 >>> mbox cmd response: success
15,432,235 UART: [afmc] ++
15,432,842 UART: [afmc] CDI.KEYID = 6
15,433,725 UART: [afmc] SUBJECT.KEYID = 7
15,434,833 UART: [afmc] AUTHORITY.KEYID = 5
17,956,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,686,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,687,938 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,703,934 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,719,957 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,735,709 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,758,801 UART: [afmc] --
19,764,154 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
19,905,251 UART: [cold-reset] --
19,906,115 UART: [state] Locking Datavault
19,907,269 UART: [state] Locking PCR0, PCR1 and PCR31
19,908,808 UART: [state] Locking ICCM
19,909,717 UART: [exit] Launching FMC @ 0x40000000
19,911,149 UART:
19,911,305 UART: Running Caliptra FMC ...
19,912,408 UART:
19,912,567 UART: [fmc] Received command: 0x46574C44
19,914,033 UART:
19,914,189 UART: Running Caliptra ROM ...
19,915,202 UART:
19,915,348 UART: [state] CFI Enabled
19,972,921 UART: [state] LifecycleState = Unprovisioned
19,974,799 UART: [state] DebugLocked = No
19,976,160 UART: [state] WD Timer not started. Device not locked for debugging
19,980,080 UART: [kat] SHA2-256
20,159,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,170,742 UART: [kat] ++
20,171,201 UART: [kat] sha1
20,182,086 UART: [kat] SHA2-256
20,185,154 UART: [kat] SHA2-384
20,191,363 UART: [kat] SHA2-512-ACC
20,194,307 UART: [kat] ECC-384
22,638,748 UART: [kat] HMAC-384Kdf
22,674,394 UART: [kat] LMS
23,203,818 UART: [kat] --
23,207,529 UART: [update-reset] ++
23,261,124 >>> mbox cmd response: failed
23,261,513 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,262,271 UART: ROM Non-Fatal Error: 0x000B003D
23,265,754 UART: [state] Locking Datavault
23,268,164 UART: [state] Locking PCR0, PCR1 and PCR31
23,269,875 UART: [state] Locking ICCM
23,272,132 UART: [exit] Launching FMC @ 0x40000000
23,280,530 UART:
23,280,764 UART: Running Caliptra FMC ...
23,281,865 UART:
23,282,018 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,283,653 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,383,095 ready_for_fw is high
3,383,497 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
15,044,512 >>> mbox cmd response: success
19,312,447 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
19,453,537 UART:
19,453,910 UART: Running Caliptra FMC ...
19,455,000 UART:
19,455,155 UART: [fmc] Received command: 0x46574C44
22,685,860 >>> mbox cmd response: failed
22,686,338 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,699,001 UART:
22,699,276 UART: Running Caliptra FMC ...
22,700,460 UART:
22,700,625 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,702,263 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,327 UART:
192,684 UART: Running Caliptra ROM ...
193,859 UART:
603,615 UART: [state] CFI Enabled
615,242 UART: [state] LifecycleState = Unprovisioned
617,122 UART: [state] DebugLocked = No
618,717 UART: [state] WD Timer not started. Device not locked for debugging
622,943 UART: [kat] SHA2-256
802,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,669 UART: [kat] ++
814,199 UART: [kat] sha1
825,574 UART: [kat] SHA2-256
828,571 UART: [kat] SHA2-384
834,569 UART: [kat] SHA2-512-ACC
837,575 UART: [kat] ECC-384
3,279,197 UART: [kat] HMAC-384Kdf
3,290,776 UART: [kat] LMS
3,820,258 UART: [kat] --
3,825,456 UART: [cold-reset] ++
3,827,666 UART: [fht] FHT @ 0x50003400
3,839,108 UART: [idev] ++
3,839,688 UART: [idev] CDI.KEYID = 6
3,840,595 UART: [idev] SUBJECT.KEYID = 7
3,841,769 UART: [idev] UDS.KEYID = 0
3,842,758 ready_for_fw is high
3,842,941 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,983,384 UART: [idev] Erasing UDS.KEYID = 0
6,315,950 UART: [idev] Sha1 KeyId Algorithm
6,338,688 UART: [idev] --
6,343,509 UART: [ldev] ++
6,344,075 UART: [ldev] CDI.KEYID = 6
6,344,984 UART: [ldev] SUBJECT.KEYID = 5
6,346,192 UART: [ldev] AUTHORITY.KEYID = 7
6,347,429 UART: [ldev] FE.KEYID = 1
6,357,366 UART: [ldev] Erasing FE.KEYID = 1
8,829,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,777 UART: [ldev] --
10,618,550 UART: [fwproc] Wait for Commands...
10,620,745 UART: [fwproc] Recv command 0x46574c44
10,622,835 UART: [fwproc] Recv'd Img size: 111944 bytes
15,147,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,225,479 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,285,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,603,501 >>> mbox cmd response: success
15,607,309 UART: [afmc] ++
15,607,920 UART: [afmc] CDI.KEYID = 6
15,608,833 UART: [afmc] SUBJECT.KEYID = 7
15,609,996 UART: [afmc] AUTHORITY.KEYID = 5
18,111,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,834,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,836,298 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,852,242 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,868,277 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,884,006 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,906,693 UART: [afmc] --
19,911,449 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
20,052,405 UART: [cold-reset] --
20,053,290 UART: [state] Locking Datavault
20,054,449 UART: [state] Locking PCR0, PCR1 and PCR31
20,055,980 UART: [state] Locking ICCM
20,056,883 UART: [exit] Launching FMC @ 0x40000000
20,058,314 UART:
20,058,476 UART: Running Caliptra FMC ...
20,059,603 UART:
20,059,769 UART: [fmc] Received command: 0x46574C44
20,061,287 UART:
20,061,447 UART: Running Caliptra ROM ...
20,062,488 UART:
20,062,641 UART: [state] CFI Enabled
20,068,958 UART: [state] LifecycleState = Unprovisioned
20,070,899 UART: [state] DebugLocked = No
20,072,422 UART: [state] WD Timer not started. Device not locked for debugging
20,076,356 UART: [kat] SHA2-256
20,255,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,267,110 UART: [kat] ++
20,267,563 UART: [kat] sha1
20,277,579 UART: [kat] SHA2-256
20,280,590 UART: [kat] SHA2-384
20,286,783 UART: [kat] SHA2-512-ACC
20,289,717 UART: [kat] ECC-384
22,730,942 UART: [kat] HMAC-384Kdf
22,743,104 UART: [kat] LMS
23,272,646 UART: [kat] --
23,278,159 UART: [update-reset] ++
23,324,909 >>> mbox cmd response: failed
23,325,291 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,327,724 UART: ROM Non-Fatal Error: 0x000B003D
23,330,664 UART: [state] Locking Datavault
23,333,694 UART: [state] Locking PCR0, PCR1 and PCR31
23,335,361 UART: [state] Locking ICCM
23,337,343 UART: [exit] Launching FMC @ 0x40000000
23,345,733 UART:
23,345,965 UART: Running Caliptra FMC ...
23,347,056 UART:
23,347,214 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,349,060 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,700,394 ready_for_fw is high
3,700,839 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
15,233,152 >>> mbox cmd response: success
19,472,975 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
19,614,146 UART:
19,614,523 UART: Running Caliptra FMC ...
19,615,711 UART:
19,615,891 UART: [fmc] Received command: 0x46574C44
22,751,111 >>> mbox cmd response: failed
22,751,576 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,764,173 UART:
22,764,436 UART: Running Caliptra FMC ...
22,765,615 UART:
22,765,770 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,767,413 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,199,601 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,934 UART: [ldev] SUBJECT.KEYID = 5
1,210,361 UART: [ldev] AUTHORITY.KEYID = 7
1,210,824 UART: [ldev] FE.KEYID = 1
1,215,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,334 UART: [fwproc] Wait for Commands...
1,282,009 UART: [fwproc] Recv command 0x46574c44
1,282,742 UART: [fwproc] Recv'd Img size: 111944 bytes
3,102,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,129,778 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,155,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,291,339 >>> mbox cmd response: success
3,292,396 UART: [afmc] ++
3,292,564 UART: [afmc] CDI.KEYID = 6
3,292,927 UART: [afmc] SUBJECT.KEYID = 7
3,293,353 UART: [afmc] AUTHORITY.KEYID = 5
3,328,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,345,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,346,089 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,351,800 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,357,687 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,363,385 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,371,266 UART: [afmc] --
3,372,258 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,372,280 UART: [cold-reset] --
3,373,168 UART: [state] Locking Datavault
3,373,991 UART: [state] Locking PCR0, PCR1 and PCR31
3,374,595 UART: [state] Locking ICCM
3,375,195 UART: [exit] Launching FMC @ 0x40000000
3,380,492 UART:
3,380,508 UART: Running Caliptra FMC ...
3,380,916 UART:
3,381,146 UART: [fmc] Received command: 0x46574C44
3,381,972 UART:
3,381,988 UART: Running Caliptra ROM ...
3,382,396 UART:
3,382,451 UART: [state] CFI Enabled
3,385,551 UART: [state] LifecycleState = Unprovisioned
3,386,206 UART: [state] DebugLocked = No
3,386,894 UART: [state] WD Timer not started. Device not locked for debugging
3,388,158 UART: [kat] SHA2-256
4,191,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,195,837 UART: [kat] ++
4,195,989 UART: [kat] sha1
4,200,267 UART: [kat] SHA2-256
4,202,207 UART: [kat] SHA2-384
4,204,972 UART: [kat] SHA2-512-ACC
4,206,872 UART: [kat] ECC-384
4,216,379 UART: [kat] HMAC-384Kdf
4,221,039 UART: [kat] LMS
4,469,351 UART: [kat] --
4,470,367 UART: [update-reset] ++
4,487,951 >>> mbox cmd response: failed
4,487,951 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,488,359 UART: ROM Non-Fatal Error: 0x000B003D
4,489,153 UART: [state] Locking Datavault
4,489,847 UART: [state] Locking PCR0, PCR1 and PCR31
4,490,451 UART: [state] Locking ICCM
4,490,895 UART: [exit] Launching FMC @ 0x40000000
4,496,192 UART:
4,496,208 UART: Running Caliptra FMC ...
4,496,616 UART:
4,496,838 UART: [fmc] Received command: 0x1000000C
4,497,573 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,028 ready_for_fw is high
1,057,028 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,134,650 >>> mbox cmd response: success
3,190,415 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,196,964 UART:
3,196,980 UART: Running Caliptra FMC ...
3,197,388 UART:
3,197,618 UART: [fmc] Received command: 0x46574C44
4,187,515 >>> mbox cmd response: failed
4,187,515 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,193,406 UART:
4,193,422 UART: Running Caliptra FMC ...
4,193,830 UART:
4,194,052 UART: [fmc] Received command: 0x1000000C
4,194,787 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,174,710 ready_for_fw is high
1,174,710 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,023 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,070 UART: [fwproc] Recv command 0x46574c44
1,283,803 UART: [fwproc] Recv'd Img size: 111944 bytes
3,099,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,128,326 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,154,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,289,809 >>> mbox cmd response: success
3,290,834 UART: [afmc] ++
3,291,002 UART: [afmc] CDI.KEYID = 6
3,291,365 UART: [afmc] SUBJECT.KEYID = 7
3,291,791 UART: [afmc] AUTHORITY.KEYID = 5
3,326,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,009 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,349,720 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,355,607 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,361,305 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,369,120 UART: [afmc] --
3,370,156 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,370,178 UART: [cold-reset] --
3,370,954 UART: [state] Locking Datavault
3,372,137 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,741 UART: [state] Locking ICCM
3,373,319 UART: [exit] Launching FMC @ 0x40000000
3,378,616 UART:
3,378,632 UART: Running Caliptra FMC ...
3,379,040 UART:
3,379,270 UART: [fmc] Received command: 0x46574C44
3,380,096 UART:
3,380,112 UART: Running Caliptra ROM ...
3,380,520 UART:
3,380,662 UART: [state] CFI Enabled
3,383,284 UART: [state] LifecycleState = Unprovisioned
3,383,939 UART: [state] DebugLocked = No
3,384,549 UART: [state] WD Timer not started. Device not locked for debugging
3,385,819 UART: [kat] SHA2-256
4,189,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,193,498 UART: [kat] ++
4,193,650 UART: [kat] sha1
4,197,936 UART: [kat] SHA2-256
4,199,876 UART: [kat] SHA2-384
4,202,725 UART: [kat] SHA2-512-ACC
4,204,625 UART: [kat] ECC-384
4,214,724 UART: [kat] HMAC-384Kdf
4,219,272 UART: [kat] LMS
4,467,584 UART: [kat] --
4,468,336 UART: [update-reset] ++
4,485,850 >>> mbox cmd response: failed
4,485,850 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,486,420 UART: ROM Non-Fatal Error: 0x000B003D
4,487,274 UART: [state] Locking Datavault
4,488,076 UART: [state] Locking PCR0, PCR1 and PCR31
4,488,680 UART: [state] Locking ICCM
4,489,230 UART: [exit] Launching FMC @ 0x40000000
4,494,527 UART:
4,494,543 UART: Running Caliptra FMC ...
4,494,951 UART:
4,495,173 UART: [fmc] Received command: 0x1000000C
4,495,908 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,617 ready_for_fw is high
1,056,617 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,129,611 >>> mbox cmd response: success
3,185,144 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,191,103 UART:
3,191,119 UART: Running Caliptra FMC ...
3,191,527 UART:
3,191,757 UART: [fmc] Received command: 0x46574C44
4,182,413 >>> mbox cmd response: failed
4,182,413 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,188,312 UART:
4,188,328 UART: Running Caliptra FMC ...
4,188,736 UART:
4,188,958 UART: [fmc] Received command: 0x1000000C
4,189,693 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,173,287 UART: [idev] ++
1,173,455 UART: [idev] CDI.KEYID = 6
1,173,816 UART: [idev] SUBJECT.KEYID = 7
1,174,241 UART: [idev] UDS.KEYID = 0
1,174,587 ready_for_fw is high
1,174,587 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,569 UART: [idev] Sha1 KeyId Algorithm
1,208,413 UART: [idev] --
1,209,314 UART: [ldev] ++
1,209,482 UART: [ldev] CDI.KEYID = 6
1,209,846 UART: [ldev] SUBJECT.KEYID = 5
1,210,273 UART: [ldev] AUTHORITY.KEYID = 7
1,210,736 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,404 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,383 UART: [fwproc] Recv command 0x46574c44
1,283,116 UART: [fwproc] Recv'd Img size: 111944 bytes
3,091,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,119,306 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,280,809 >>> mbox cmd response: success
3,282,064 UART: [afmc] ++
3,282,232 UART: [afmc] CDI.KEYID = 6
3,282,595 UART: [afmc] SUBJECT.KEYID = 7
3,283,021 UART: [afmc] AUTHORITY.KEYID = 5
3,318,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,193 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,340,904 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,346,791 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,352,489 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,360,220 UART: [afmc] --
3,361,318 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,361,340 UART: [cold-reset] --
3,362,422 UART: [state] Locking Datavault
3,363,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,059 UART: [state] Locking ICCM
3,364,645 UART: [exit] Launching FMC @ 0x40000000
3,369,942 UART:
3,369,958 UART: Running Caliptra FMC ...
3,370,366 UART:
3,370,596 UART: [fmc] Received command: 0x46574C44
3,371,422 UART:
3,371,438 UART: Running Caliptra ROM ...
3,371,846 UART:
3,371,901 UART: [state] CFI Enabled
3,374,375 UART: [state] LifecycleState = Unprovisioned
3,375,030 UART: [state] DebugLocked = No
3,375,562 UART: [state] WD Timer not started. Device not locked for debugging
3,376,706 UART: [kat] SHA2-256
4,180,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,184,385 UART: [kat] ++
4,184,537 UART: [kat] sha1
4,188,733 UART: [kat] SHA2-256
4,190,673 UART: [kat] SHA2-384
4,193,386 UART: [kat] SHA2-512-ACC
4,195,286 UART: [kat] ECC-384
4,204,721 UART: [kat] HMAC-384Kdf
4,209,313 UART: [kat] LMS
4,457,625 UART: [kat] --
4,458,551 UART: [update-reset] ++
4,476,485 >>> mbox cmd response: failed
4,476,485 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,476,791 UART: ROM Non-Fatal Error: 0x000B003D
4,477,565 UART: [state] Locking Datavault
4,478,279 UART: [state] Locking PCR0, PCR1 and PCR31
4,478,883 UART: [state] Locking ICCM
4,479,335 UART: [exit] Launching FMC @ 0x40000000
4,484,632 UART:
4,484,648 UART: Running Caliptra FMC ...
4,485,056 UART:
4,485,278 UART: [fmc] Received command: 0x1000000C
4,486,013 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,840 ready_for_fw is high
1,055,840 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,122,742 >>> mbox cmd response: success
3,178,761 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,185,058 UART:
3,185,074 UART: Running Caliptra FMC ...
3,185,482 UART:
3,185,712 UART: [fmc] Received command: 0x46574C44
4,175,977 >>> mbox cmd response: failed
4,175,977 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,181,232 UART:
4,181,248 UART: Running Caliptra FMC ...
4,181,656 UART:
4,181,878 UART: [fmc] Received command: 0x1000000C
4,182,613 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,174,580 ready_for_fw is high
1,174,580 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,043 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 111944 bytes
3,107,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,135,584 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,161,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,297,195 >>> mbox cmd response: success
3,298,216 UART: [afmc] ++
3,298,384 UART: [afmc] CDI.KEYID = 6
3,298,747 UART: [afmc] SUBJECT.KEYID = 7
3,299,173 UART: [afmc] AUTHORITY.KEYID = 5
3,334,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,351,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,351,851 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,357,562 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,363,449 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,369,147 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,376,872 UART: [afmc] --
3,377,834 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,377,856 UART: [cold-reset] --
3,378,698 UART: [state] Locking Datavault
3,379,829 UART: [state] Locking PCR0, PCR1 and PCR31
3,380,433 UART: [state] Locking ICCM
3,380,929 UART: [exit] Launching FMC @ 0x40000000
3,386,226 UART:
3,386,242 UART: Running Caliptra FMC ...
3,386,650 UART:
3,386,880 UART: [fmc] Received command: 0x46574C44
3,387,706 UART:
3,387,722 UART: Running Caliptra ROM ...
3,388,130 UART:
3,388,272 UART: [state] CFI Enabled
3,391,522 UART: [state] LifecycleState = Unprovisioned
3,392,177 UART: [state] DebugLocked = No
3,392,685 UART: [state] WD Timer not started. Device not locked for debugging
3,393,801 UART: [kat] SHA2-256
4,197,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,201,480 UART: [kat] ++
4,201,632 UART: [kat] sha1
4,205,856 UART: [kat] SHA2-256
4,207,796 UART: [kat] SHA2-384
4,210,581 UART: [kat] SHA2-512-ACC
4,212,481 UART: [kat] ECC-384
4,222,124 UART: [kat] HMAC-384Kdf
4,226,742 UART: [kat] LMS
4,475,054 UART: [kat] --
4,476,044 UART: [update-reset] ++
4,493,388 >>> mbox cmd response: failed
4,493,388 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,493,752 UART: ROM Non-Fatal Error: 0x000B003D
4,494,640 UART: [state] Locking Datavault
4,495,426 UART: [state] Locking PCR0, PCR1 and PCR31
4,496,030 UART: [state] Locking ICCM
4,496,674 UART: [exit] Launching FMC @ 0x40000000
4,501,971 UART:
4,501,987 UART: Running Caliptra FMC ...
4,502,395 UART:
4,502,617 UART: [fmc] Received command: 0x1000000C
4,503,352 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 ready_for_fw is high
1,056,247 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,143,879 >>> mbox cmd response: success
3,199,120 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,205,517 UART:
3,205,533 UART: Running Caliptra FMC ...
3,205,941 UART:
3,206,171 UART: [fmc] Received command: 0x46574C44
4,196,661 >>> mbox cmd response: failed
4,196,661 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,202,210 UART:
4,202,226 UART: Running Caliptra FMC ...
4,202,634 UART:
4,202,856 UART: [fmc] Received command: 0x1000000C
4,203,591 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,174,243 ready_for_fw is high
1,174,243 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,417 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,390 UART: [ldev] ++
1,209,558 UART: [ldev] CDI.KEYID = 6
1,209,922 UART: [ldev] SUBJECT.KEYID = 5
1,210,349 UART: [ldev] AUTHORITY.KEYID = 7
1,210,812 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,242,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,304 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,429 UART: [fwproc] Recv command 0x46574c44
1,283,162 UART: [fwproc] Recv'd Img size: 111944 bytes
3,107,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,135,298 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,160,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,296,761 >>> mbox cmd response: success
3,297,842 UART: [afmc] ++
3,298,010 UART: [afmc] CDI.KEYID = 6
3,298,373 UART: [afmc] SUBJECT.KEYID = 7
3,298,799 UART: [afmc] AUTHORITY.KEYID = 5
3,334,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,350,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,351,167 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,356,878 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,362,765 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,368,463 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,376,494 UART: [afmc] --
3,377,438 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,377,460 UART: [cold-reset] --
3,378,446 UART: [state] Locking Datavault
3,379,401 UART: [state] Locking PCR0, PCR1 and PCR31
3,380,005 UART: [state] Locking ICCM
3,380,557 UART: [exit] Launching FMC @ 0x40000000
3,385,854 UART:
3,385,870 UART: Running Caliptra FMC ...
3,386,278 UART:
3,386,508 UART: [fmc] Received command: 0x46574C44
3,387,334 UART:
3,387,350 UART: Running Caliptra ROM ...
3,387,758 UART:
3,387,813 UART: [state] CFI Enabled
3,390,651 UART: [state] LifecycleState = Unprovisioned
3,391,306 UART: [state] DebugLocked = No
3,391,834 UART: [state] WD Timer not started. Device not locked for debugging
3,392,946 UART: [kat] SHA2-256
4,196,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,200,625 UART: [kat] ++
4,200,777 UART: [kat] sha1
4,204,963 UART: [kat] SHA2-256
4,206,903 UART: [kat] SHA2-384
4,209,758 UART: [kat] SHA2-512-ACC
4,211,658 UART: [kat] ECC-384
4,221,763 UART: [kat] HMAC-384Kdf
4,226,355 UART: [kat] LMS
4,474,667 UART: [kat] --
4,475,747 UART: [update-reset] ++
4,493,417 >>> mbox cmd response: failed
4,493,417 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,493,763 UART: ROM Non-Fatal Error: 0x000B003D
4,494,631 UART: [state] Locking Datavault
4,495,373 UART: [state] Locking PCR0, PCR1 and PCR31
4,495,977 UART: [state] Locking ICCM
4,496,475 UART: [exit] Launching FMC @ 0x40000000
4,501,772 UART:
4,501,788 UART: Running Caliptra FMC ...
4,502,196 UART:
4,502,418 UART: [fmc] Received command: 0x1000000C
4,503,153 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,720 ready_for_fw is high
1,055,720 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,132,750 >>> mbox cmd response: success
3,188,719 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,195,140 UART:
3,195,156 UART: Running Caliptra FMC ...
3,195,564 UART:
3,195,794 UART: [fmc] Received command: 0x46574C44
4,185,463 >>> mbox cmd response: failed
4,185,463 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,190,794 UART:
4,190,810 UART: Running Caliptra FMC ...
4,191,218 UART:
4,191,440 UART: [fmc] Received command: 0x1000000C
4,192,175 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,174,772 ready_for_fw is high
1,174,772 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,285 UART: [ldev] ++
1,209,453 UART: [ldev] CDI.KEYID = 6
1,209,817 UART: [ldev] SUBJECT.KEYID = 5
1,210,244 UART: [ldev] AUTHORITY.KEYID = 7
1,210,707 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,299 UART: [ldev] --
1,281,761 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46574c44
1,283,283 UART: [fwproc] Recv'd Img size: 111944 bytes
3,098,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,125,545 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,151,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,287,162 >>> mbox cmd response: success
3,288,413 UART: [afmc] ++
3,288,581 UART: [afmc] CDI.KEYID = 6
3,288,944 UART: [afmc] SUBJECT.KEYID = 7
3,289,370 UART: [afmc] AUTHORITY.KEYID = 5
3,325,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,342,444 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,348,155 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,354,042 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,359,740 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,367,477 UART: [afmc] --
3,368,397 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,368,419 UART: [cold-reset] --
3,369,219 UART: [state] Locking Datavault
3,370,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,370,960 UART: [state] Locking ICCM
3,371,522 UART: [exit] Launching FMC @ 0x40000000
3,376,819 UART:
3,376,835 UART: Running Caliptra FMC ...
3,377,243 UART:
3,377,473 UART: [fmc] Received command: 0x46574C44
3,378,299 UART:
3,378,315 UART: Running Caliptra ROM ...
3,378,723 UART:
3,378,865 UART: [state] CFI Enabled
3,381,609 UART: [state] LifecycleState = Unprovisioned
3,382,264 UART: [state] DebugLocked = No
3,382,850 UART: [state] WD Timer not started. Device not locked for debugging
3,384,178 UART: [kat] SHA2-256
4,187,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,191,857 UART: [kat] ++
4,192,009 UART: [kat] sha1
4,196,051 UART: [kat] SHA2-256
4,197,991 UART: [kat] SHA2-384
4,200,828 UART: [kat] SHA2-512-ACC
4,202,728 UART: [kat] ECC-384
4,212,467 UART: [kat] HMAC-384Kdf
4,216,987 UART: [kat] LMS
4,465,299 UART: [kat] --
4,466,187 UART: [update-reset] ++
4,484,057 >>> mbox cmd response: failed
4,484,057 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,484,603 UART: ROM Non-Fatal Error: 0x000B003D
4,485,499 UART: [state] Locking Datavault
4,486,247 UART: [state] Locking PCR0, PCR1 and PCR31
4,486,851 UART: [state] Locking ICCM
4,487,485 UART: [exit] Launching FMC @ 0x40000000
4,492,782 UART:
4,492,798 UART: Running Caliptra FMC ...
4,493,206 UART:
4,493,428 UART: [fmc] Received command: 0x1000000C
4,494,163 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,795 ready_for_fw is high
1,056,795 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,126,288 >>> mbox cmd response: success
3,183,019 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,189,264 UART:
3,189,280 UART: Running Caliptra FMC ...
3,189,688 UART:
3,189,918 UART: [fmc] Received command: 0x46574C44
4,180,318 >>> mbox cmd response: failed
4,180,318 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,186,075 UART:
4,186,091 UART: Running Caliptra FMC ...
4,186,499 UART:
4,186,721 UART: [fmc] Received command: 0x1000000C
4,187,456 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,024 UART:
192,398 UART: Running Caliptra ROM ...
193,494 UART:
193,634 UART: [state] CFI Enabled
267,876 UART: [state] LifecycleState = Unprovisioned
270,297 UART: [state] DebugLocked = No
272,743 UART: [state] WD Timer not started. Device not locked for debugging
277,056 UART: [kat] SHA2-256
459,009 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,531 UART: [kat] ++
470,978 UART: [kat] sha1
481,423 UART: [kat] SHA2-256
484,419 UART: [kat] SHA2-384
490,581 UART: [kat] SHA2-512-ACC
493,188 UART: [kat] ECC-384
3,777,222 UART: [kat] HMAC-384Kdf
3,804,373 UART: [kat] LMS
4,877,501 UART: [kat] --
4,881,305 UART: [cold-reset] ++
4,882,527 UART: [fht] FHT @ 0x50003400
4,895,158 UART: [idev] ++
4,895,834 UART: [idev] CDI.KEYID = 6
4,897,015 UART: [idev] SUBJECT.KEYID = 7
4,898,202 UART: [idev] UDS.KEYID = 0
4,899,281 ready_for_fw is high
4,899,480 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,033,420 UART: [idev] Erasing UDS.KEYID = 0
8,244,342 UART: [idev] Sha1 KeyId Algorithm
8,266,818 UART: [idev] --
8,271,186 UART: [ldev] ++
8,271,770 UART: [ldev] CDI.KEYID = 6
8,272,871 UART: [ldev] SUBJECT.KEYID = 5
8,274,138 UART: [ldev] AUTHORITY.KEYID = 7
8,275,234 UART: [ldev] FE.KEYID = 1
8,319,392 UART: [ldev] Erasing FE.KEYID = 1
11,654,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,761 UART: [ldev] --
14,038,272 UART: [fwproc] Wait for Commands...
14,040,687 UART: [fwproc] Recv command 0x46574c44
14,043,003 UART: [fwproc] Recv'd Img size: 106532 bytes
18,026,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,096,597 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,139,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,455,696 >>> mbox cmd response: success
18,460,397 UART: [afmc] ++
18,461,015 UART: [afmc] CDI.KEYID = 6
18,462,155 UART: [afmc] SUBJECT.KEYID = 7
18,463,315 UART: [afmc] AUTHORITY.KEYID = 5
21,818,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,118,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,120,926 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,136,972 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,153,001 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,169,117 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,192,745 UART: [afmc] --
24,196,900 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,197,675 UART: [cold-reset] --
24,200,318 UART: [state] Locking Datavault
24,204,568 UART: [state] Locking PCR0, PCR1 and PCR31
24,206,268 UART: [state] Locking ICCM
24,207,766 UART: [exit] Launching FMC @ 0x40000000
24,216,378 UART:
24,216,617 UART: Running Caliptra FMC ...
24,217,717 UART:
24,217,886 UART: [fmc] Received command: 0x46574C44
24,219,339 UART:
24,219,495 UART: Running Caliptra ROM ...
24,220,591 UART:
24,220,745 UART: [state] CFI Enabled
24,279,297 UART: [state] LifecycleState = Unprovisioned
24,281,172 UART: [state] DebugLocked = No
24,283,361 UART: [state] WD Timer not started. Device not locked for debugging
24,287,254 UART: [kat] SHA2-256
24,469,173 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,480,682 UART: [kat] ++
24,481,167 UART: [kat] sha1
24,492,378 UART: [kat] SHA2-256
24,495,388 UART: [kat] SHA2-384
24,500,621 UART: [kat] SHA2-512-ACC
24,503,241 UART: [kat] ECC-384
27,794,751 UART: [kat] HMAC-384Kdf
27,819,615 UART: [kat] LMS
28,892,762 UART: [kat] --
28,897,704 UART: [update-reset] ++
28,906,202 >>> mbox cmd response: failed
28,907,387 UART: ROM Non-Fatal Error: 0x000B0001
28,909,764 UART: [state] Locking Datavault
28,914,512 UART: [state] Locking PCR0, PCR1 and PCR31
28,916,705 UART: [state] Locking ICCM
28,918,999 UART: [exit] Launching FMC @ 0x40000000
28,927,666 UART:
28,927,910 UART: Running Caliptra FMC ...
28,928,985 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
4,783,192 ready_for_fw is high
4,783,579 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,226,136 >>> mbox cmd response: success
23,912,203 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
23,928,646 UART:
23,929,006 UART: Running Caliptra FMC ...
23,930,270 UART:
23,930,443 UART: [fmc] Received command: 0x46574C44
28,517,806 >>> mbox cmd response: failed
28,531,139 UART:
28,531,421 UART: Running Caliptra FMC ...
28,532,582 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,475 UART:
192,837 UART: Running Caliptra ROM ...
194,008 UART:
603,647 UART: [state] CFI Enabled
618,005 UART: [state] LifecycleState = Unprovisioned
620,315 UART: [state] DebugLocked = No
621,554 UART: [state] WD Timer not started. Device not locked for debugging
625,362 UART: [kat] SHA2-256
807,301 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,814 UART: [kat] ++
819,413 UART: [kat] sha1
829,505 UART: [kat] SHA2-256
832,576 UART: [kat] SHA2-384
837,706 UART: [kat] SHA2-512-ACC
840,352 UART: [kat] ECC-384
4,096,437 UART: [kat] HMAC-384Kdf
4,109,034 UART: [kat] LMS
5,182,169 UART: [kat] --
5,188,282 UART: [cold-reset] ++
5,189,907 UART: [fht] FHT @ 0x50003400
5,201,171 UART: [idev] ++
5,201,798 UART: [idev] CDI.KEYID = 6
5,203,033 UART: [idev] SUBJECT.KEYID = 7
5,204,498 UART: [idev] UDS.KEYID = 0
5,205,777 ready_for_fw is high
5,205,987 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
5,339,683 UART: [idev] Erasing UDS.KEYID = 0
8,493,672 UART: [idev] Sha1 KeyId Algorithm
8,515,712 UART: [idev] --
8,518,998 UART: [ldev] ++
8,519,573 UART: [ldev] CDI.KEYID = 6
8,520,748 UART: [ldev] SUBJECT.KEYID = 5
8,522,221 UART: [ldev] AUTHORITY.KEYID = 7
8,523,770 UART: [ldev] FE.KEYID = 1
8,535,434 UART: [ldev] Erasing FE.KEYID = 1
11,826,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,584 UART: [ldev] --
14,192,412 UART: [fwproc] Wait for Commands...
14,194,064 UART: [fwproc] Recv command 0x46574c44
14,196,365 UART: [fwproc] Recv'd Img size: 106532 bytes
18,176,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,252,905 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,295,359 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,611,871 >>> mbox cmd response: success
18,616,639 UART: [afmc] ++
18,617,247 UART: [afmc] CDI.KEYID = 6
18,618,353 UART: [afmc] SUBJECT.KEYID = 7
18,619,566 UART: [afmc] AUTHORITY.KEYID = 5
21,938,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,230,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,233,205 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,249,205 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,265,260 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,281,366 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,305,066 UART: [afmc] --
24,309,112 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,309,936 UART: [cold-reset] --
24,314,040 UART: [state] Locking Datavault
24,320,163 UART: [state] Locking PCR0, PCR1 and PCR31
24,321,806 UART: [state] Locking ICCM
24,324,110 UART: [exit] Launching FMC @ 0x40000000
24,332,726 UART:
24,332,964 UART: Running Caliptra FMC ...
24,334,061 UART:
24,334,213 UART: [fmc] Received command: 0x46574C44
24,335,660 UART:
24,335,809 UART: Running Caliptra ROM ...
24,336,897 UART:
24,337,064 UART: [state] CFI Enabled
24,349,156 UART: [state] LifecycleState = Unprovisioned
24,350,976 UART: [state] DebugLocked = No
24,352,884 UART: [state] WD Timer not started. Device not locked for debugging
24,356,779 UART: [kat] SHA2-256
24,538,745 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,550,274 UART: [kat] ++
24,550,873 UART: [kat] sha1
24,561,543 UART: [kat] SHA2-256
24,564,612 UART: [kat] SHA2-384
24,571,291 UART: [kat] SHA2-512-ACC
24,573,901 UART: [kat] ECC-384
27,831,412 UART: [kat] HMAC-384Kdf
27,844,128 UART: [kat] LMS
28,917,242 UART: [kat] --
28,922,053 UART: [update-reset] ++
28,931,075 >>> mbox cmd response: failed
28,932,064 UART: ROM Non-Fatal Error: 0x000B0001
28,934,485 UART: [state] Locking Datavault
28,938,115 UART: [state] Locking PCR0, PCR1 and PCR31
28,940,312 UART: [state] Locking ICCM
28,941,985 UART: [exit] Launching FMC @ 0x40000000
28,950,701 UART:
28,950,978 UART: Running Caliptra FMC ...
28,952,045 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
5,101,427 ready_for_fw is high
5,101,821 <<< Executing mbox cmd 0x46574c44 (106532 bytes) from SoC
18,402,892 >>> mbox cmd response: success
24,029,219 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,045,467 UART:
24,045,816 UART: Running Caliptra FMC ...
24,046,992 UART:
24,047,162 UART: [fmc] Received command: 0x46574C44
28,542,414 >>> mbox cmd response: failed
28,557,154 UART:
28,557,439 UART: Running Caliptra FMC ...
28,558,605 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,887 writing to cptra_bootfsm_go
193,053 UART:
193,430 UART: Running Caliptra ROM ...
194,615 UART:
194,771 UART: [state] CFI Enabled
263,312 UART: [state] LifecycleState = Unprovisioned
265,212 UART: [state] DebugLocked = No
267,669 UART: [state] WD Timer not started. Device not locked for debugging
270,911 UART: [kat] SHA2-256
450,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,631 UART: [kat] ++
462,164 UART: [kat] sha1
473,753 UART: [kat] SHA2-256
476,758 UART: [kat] SHA2-384
482,627 UART: [kat] SHA2-512-ACC
485,539 UART: [kat] ECC-384
2,949,009 UART: [kat] HMAC-384Kdf
2,970,804 UART: [kat] LMS
3,500,261 UART: [kat] --
3,503,542 UART: [cold-reset] ++
3,505,476 UART: [fht] FHT @ 0x50003400
3,516,739 UART: [idev] ++
3,517,306 UART: [idev] CDI.KEYID = 6
3,518,214 UART: [idev] SUBJECT.KEYID = 7
3,519,463 UART: [idev] UDS.KEYID = 0
3,520,383 ready_for_fw is high
3,520,575 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,655,038 UART: [idev] Erasing UDS.KEYID = 0
6,025,507 UART: [idev] Sha1 KeyId Algorithm
6,049,358 UART: [idev] --
6,052,334 UART: [ldev] ++
6,052,909 UART: [ldev] CDI.KEYID = 6
6,053,822 UART: [ldev] SUBJECT.KEYID = 5
6,055,008 UART: [ldev] AUTHORITY.KEYID = 7
6,056,251 UART: [ldev] FE.KEYID = 1
6,101,865 UART: [ldev] Erasing FE.KEYID = 1
8,607,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,901 UART: [ldev] --
10,416,204 UART: [fwproc] Wait for Commands...
10,418,194 UART: [fwproc] Recv command 0x46574c44
10,420,286 UART: [fwproc] Recv'd Img size: 106876 bytes
13,726,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,805,359 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,847,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,166,816 >>> mbox cmd response: success
14,171,690 UART: [afmc] ++
14,172,303 UART: [afmc] CDI.KEYID = 6
14,173,215 UART: [afmc] SUBJECT.KEYID = 7
14,174,376 UART: [afmc] AUTHORITY.KEYID = 5
16,704,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,427,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,429,530 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,445,524 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,461,451 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,477,367 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,499,100 UART: [afmc] --
18,503,687 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,504,449 UART: [cold-reset] --
18,507,123 UART: [state] Locking Datavault
18,512,054 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,707 UART: [state] Locking ICCM
18,516,096 UART: [exit] Launching FMC @ 0x40000000
18,524,515 UART:
18,524,753 UART: Running Caliptra FMC ...
18,525,858 UART:
18,526,015 UART: [fmc] Received command: 0x46574C44
18,527,477 UART:
18,527,628 UART: Running Caliptra ROM ...
18,528,729 UART:
18,528,882 UART: [state] CFI Enabled
18,591,723 UART: [state] LifecycleState = Unprovisioned
18,593,600 UART: [state] DebugLocked = No
18,596,017 UART: [state] WD Timer not started. Device not locked for debugging
18,599,046 UART: [kat] SHA2-256
18,778,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,789,786 UART: [kat] ++
18,790,327 UART: [kat] sha1
18,802,635 UART: [kat] SHA2-256
18,805,690 UART: [kat] SHA2-384
18,811,464 UART: [kat] SHA2-512-ACC
18,814,416 UART: [kat] ECC-384
21,275,435 UART: [kat] HMAC-384Kdf
21,296,616 UART: [kat] LMS
21,826,038 UART: [kat] --
21,828,989 UART: [update-reset] ++
21,837,979 >>> mbox cmd response: failed
21,839,992 UART: ROM Non-Fatal Error: 0x000B0001
21,843,466 UART: [state] Locking Datavault
21,847,420 UART: [state] Locking PCR0, PCR1 and PCR31
21,849,114 UART: [state] Locking ICCM
21,850,743 UART: [exit] Launching FMC @ 0x40000000
21,859,132 UART:
21,859,385 UART: Running Caliptra FMC ...
21,860,463 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,273 UART:
192,750 UART: Running Caliptra ROM ...
193,878 UART:
194,020 UART: [state] CFI Enabled
252,910 UART: [state] LifecycleState = Unprovisioned
254,834 UART: [state] DebugLocked = No
257,423 UART: [state] WD Timer not started. Device not locked for debugging
261,665 UART: [kat] SHA2-256
440,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,371 UART: [kat] ++
452,821 UART: [kat] sha1
463,192 UART: [kat] SHA2-256
466,283 UART: [kat] SHA2-384
471,938 UART: [kat] SHA2-512-ACC
474,912 UART: [kat] ECC-384
2,938,725 UART: [kat] HMAC-384Kdf
2,961,853 UART: [kat] LMS
3,491,304 UART: [kat] --
3,495,745 UART: [cold-reset] ++
3,497,681 UART: [fht] FHT @ 0x50003400
3,507,531 UART: [idev] ++
3,508,096 UART: [idev] CDI.KEYID = 6
3,509,007 UART: [idev] SUBJECT.KEYID = 7
3,510,128 UART: [idev] UDS.KEYID = 0
3,511,283 ready_for_fw is high
3,511,518 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,645,917 UART: [idev] Erasing UDS.KEYID = 0
6,019,151 UART: [idev] Sha1 KeyId Algorithm
6,040,977 UART: [idev] --
6,045,998 UART: [ldev] ++
6,046,571 UART: [ldev] CDI.KEYID = 6
6,047,703 UART: [ldev] SUBJECT.KEYID = 5
6,048,813 UART: [ldev] AUTHORITY.KEYID = 7
6,049,989 UART: [ldev] FE.KEYID = 1
6,088,949 UART: [ldev] Erasing FE.KEYID = 1
8,593,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,156 UART: [ldev] --
10,405,915 UART: [fwproc] Wait for Commands...
10,408,447 UART: [fwproc] Recv command 0x46574c44
10,410,487 UART: [fwproc] Recv'd Img size: 106876 bytes
13,721,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,804,779 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,847,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,164,771 >>> mbox cmd response: success
14,169,764 UART: [afmc] ++
14,170,381 UART: [afmc] CDI.KEYID = 6
14,171,301 UART: [afmc] SUBJECT.KEYID = 7
14,172,413 UART: [afmc] AUTHORITY.KEYID = 5
16,710,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,438,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,440,348 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,456,289 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,472,242 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,488,184 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,510,156 UART: [afmc] --
18,513,550 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,514,286 UART: [cold-reset] --
18,518,342 UART: [state] Locking Datavault
18,523,493 UART: [state] Locking PCR0, PCR1 and PCR31
18,525,140 UART: [state] Locking ICCM
18,526,998 UART: [exit] Launching FMC @ 0x40000000
18,535,395 UART:
18,535,636 UART: Running Caliptra FMC ...
18,536,661 UART:
18,536,807 UART: [fmc] Received command: 0x46574C44
18,538,259 UART:
18,538,411 UART: Running Caliptra ROM ...
18,539,427 UART:
18,539,568 UART: [state] CFI Enabled
18,602,178 UART: [state] LifecycleState = Unprovisioned
18,604,057 UART: [state] DebugLocked = No
18,605,959 UART: [state] WD Timer not started. Device not locked for debugging
18,609,792 UART: [kat] SHA2-256
18,788,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,800,462 UART: [kat] ++
18,800,918 UART: [kat] sha1
18,811,584 UART: [kat] SHA2-256
18,814,597 UART: [kat] SHA2-384
18,820,530 UART: [kat] SHA2-512-ACC
18,823,523 UART: [kat] ECC-384
21,286,758 UART: [kat] HMAC-384Kdf
21,307,729 UART: [kat] LMS
21,837,183 UART: [kat] --
21,841,877 UART: [update-reset] ++
21,848,597 >>> mbox cmd response: failed
21,851,120 UART: ROM Non-Fatal Error: 0x000B0001
21,853,406 UART: [state] Locking Datavault
21,855,660 UART: [state] Locking PCR0, PCR1 and PCR31
21,857,342 UART: [state] Locking ICCM
21,859,841 UART: [exit] Launching FMC @ 0x40000000
21,868,215 UART:
21,868,462 UART: Running Caliptra FMC ...
21,869,601 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
3,382,594 ready_for_fw is high
3,382,974 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
13,952,068 >>> mbox cmd response: success
18,244,611 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,259,351 UART:
18,259,717 UART: Running Caliptra FMC ...
18,260,986 UART:
18,261,162 UART: [fmc] Received command: 0x46574C44
21,427,579 >>> mbox cmd response: failed
21,440,702 UART:
21,440,994 UART: Running Caliptra FMC ...
21,442,077 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,432 UART:
192,793 UART: Running Caliptra ROM ...
193,933 UART:
603,542 UART: [state] CFI Enabled
621,534 UART: [state] LifecycleState = Unprovisioned
623,422 UART: [state] DebugLocked = No
624,592 UART: [state] WD Timer not started. Device not locked for debugging
628,198 UART: [kat] SHA2-256
807,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,905 UART: [kat] ++
819,443 UART: [kat] sha1
830,393 UART: [kat] SHA2-256
833,466 UART: [kat] SHA2-384
840,868 UART: [kat] SHA2-512-ACC
843,805 UART: [kat] ECC-384
3,287,801 UART: [kat] HMAC-384Kdf
3,300,853 UART: [kat] LMS
3,830,379 UART: [kat] --
3,831,981 UART: [cold-reset] ++
3,834,216 UART: [fht] FHT @ 0x50003400
3,845,482 UART: [idev] ++
3,846,042 UART: [idev] CDI.KEYID = 6
3,846,961 UART: [idev] SUBJECT.KEYID = 7
3,848,199 UART: [idev] UDS.KEYID = 0
3,849,122 ready_for_fw is high
3,849,321 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
3,983,492 UART: [idev] Erasing UDS.KEYID = 0
6,325,284 UART: [idev] Sha1 KeyId Algorithm
6,348,728 UART: [idev] --
6,353,309 UART: [ldev] ++
6,353,881 UART: [ldev] CDI.KEYID = 6
6,354,810 UART: [ldev] SUBJECT.KEYID = 5
6,356,016 UART: [ldev] AUTHORITY.KEYID = 7
6,357,250 UART: [ldev] FE.KEYID = 1
6,368,737 UART: [ldev] Erasing FE.KEYID = 1
8,840,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,283 UART: [ldev] --
10,629,304 UART: [fwproc] Wait for Commands...
10,631,395 UART: [fwproc] Recv command 0x46574c44
10,633,492 UART: [fwproc] Recv'd Img size: 106876 bytes
13,943,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,081 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,053,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,371,018 >>> mbox cmd response: success
14,376,065 UART: [afmc] ++
14,376,684 UART: [afmc] CDI.KEYID = 6
14,377,595 UART: [afmc] SUBJECT.KEYID = 7
14,378,778 UART: [afmc] AUTHORITY.KEYID = 5
16,876,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,779 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,614,757 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,630,687 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,646,635 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,669,567 UART: [afmc] --
18,673,920 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,674,692 UART: [cold-reset] --
18,678,155 UART: [state] Locking Datavault
18,682,541 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,244 UART: [state] Locking ICCM
18,686,013 UART: [exit] Launching FMC @ 0x40000000
18,694,354 UART:
18,694,586 UART: Running Caliptra FMC ...
18,695,702 UART:
18,695,861 UART: [fmc] Received command: 0x46574C44
18,697,315 UART:
18,697,468 UART: Running Caliptra ROM ...
18,698,559 UART:
18,698,713 UART: [state] CFI Enabled
18,710,984 UART: [state] LifecycleState = Unprovisioned
18,712,846 UART: [state] DebugLocked = No
18,715,683 UART: [state] WD Timer not started. Device not locked for debugging
18,718,857 UART: [kat] SHA2-256
18,897,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,909,560 UART: [kat] ++
18,910,011 UART: [kat] sha1
18,921,112 UART: [kat] SHA2-256
18,924,124 UART: [kat] SHA2-384
18,928,803 UART: [kat] SHA2-512-ACC
18,931,758 UART: [kat] ECC-384
21,371,676 UART: [kat] HMAC-384Kdf
21,384,227 UART: [kat] LMS
21,913,784 UART: [kat] --
21,917,341 UART: [update-reset] ++
21,927,237 >>> mbox cmd response: failed
21,927,760 UART: ROM Non-Fatal Error: 0x000B0001
21,930,383 UART: [state] Locking Datavault
21,932,977 UART: [state] Locking PCR0, PCR1 and PCR31
21,934,668 UART: [state] Locking ICCM
21,936,277 UART: [exit] Launching FMC @ 0x40000000
21,944,646 UART:
21,944,889 UART: Running Caliptra FMC ...
21,946,026 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,696,988 ready_for_fw is high
3,697,582 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
14,142,835 >>> mbox cmd response: success
18,380,382 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,394,675 UART:
18,395,027 UART: Running Caliptra FMC ...
18,396,280 UART:
18,396,457 UART: [fmc] Received command: 0x46574C44
21,489,040 >>> mbox cmd response: failed
21,502,928 UART:
21,503,210 UART: Running Caliptra FMC ...
21,504,287 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,365 UART: [cold-reset] ++
1,169,883 UART: [fht] FHT @ 0x50003400
1,172,591 UART: [idev] ++
1,172,759 UART: [idev] CDI.KEYID = 6
1,173,120 UART: [idev] SUBJECT.KEYID = 7
1,173,545 UART: [idev] UDS.KEYID = 0
1,173,891 ready_for_fw is high
1,173,891 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,639 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,207,001 UART: [idev] --
1,207,892 UART: [ldev] ++
1,208,060 UART: [ldev] CDI.KEYID = 6
1,208,424 UART: [ldev] SUBJECT.KEYID = 5
1,208,851 UART: [ldev] AUTHORITY.KEYID = 7
1,209,314 UART: [ldev] FE.KEYID = 1
1,214,546 UART: [ldev] Erasing FE.KEYID = 1
1,240,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,906 UART: [ldev] --
1,279,218 UART: [fwproc] Wait for Commands...
1,279,937 UART: [fwproc] Recv command 0x46574c44
1,280,670 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,740 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,691 >>> mbox cmd response: success
2,674,818 UART: [afmc] ++
2,674,986 UART: [afmc] CDI.KEYID = 6
2,675,349 UART: [afmc] SUBJECT.KEYID = 7
2,675,775 UART: [afmc] AUTHORITY.KEYID = 5
2,711,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,836 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,556 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,449 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,142 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,077 UART: [afmc] --
2,755,029 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,051 UART: [cold-reset] --
2,755,885 UART: [state] Locking Datavault
2,757,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,824 UART: [state] Locking ICCM
2,758,280 UART: [exit] Launching FMC @ 0x40000000
2,763,577 UART:
2,763,593 UART: Running Caliptra FMC ...
2,764,001 UART:
2,764,139 UART: [fmc] Received command: 0x46574C44
2,764,968 UART:
2,764,984 UART: Running Caliptra ROM ...
2,765,392 UART:
2,765,447 UART: [state] CFI Enabled
2,768,333 UART: [state] LifecycleState = Unprovisioned
2,768,988 UART: [state] DebugLocked = No
2,769,550 UART: [state] WD Timer not started. Device not locked for debugging
2,770,862 UART: [kat] SHA2-256
3,574,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,541 UART: [kat] ++
3,578,693 UART: [kat] sha1
3,582,991 UART: [kat] SHA2-256
3,584,931 UART: [kat] SHA2-384
3,587,680 UART: [kat] SHA2-512-ACC
3,589,580 UART: [kat] ECC-384
3,599,441 UART: [kat] HMAC-384Kdf
3,604,029 UART: [kat] LMS
3,852,341 UART: [kat] --
3,852,885 UART: [update-reset] ++
3,854,226 >>> mbox cmd response: failed
3,854,508 UART: ROM Non-Fatal Error: 0x000B0001
3,855,442 UART: [state] Locking Datavault
3,856,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,000 UART: [state] Locking ICCM
3,857,616 UART: [exit] Launching FMC @ 0x40000000
3,862,913 UART:
3,862,929 UART: Running Caliptra FMC ...
3,863,337 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,754 ready_for_fw is high
1,056,754 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,523,833 >>> mbox cmd response: success
2,579,829 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,108 UART:
2,586,124 UART: Running Caliptra FMC ...
2,586,532 UART:
2,586,670 UART: [fmc] Received command: 0x46574C44
3,560,665 >>> mbox cmd response: failed
3,566,214 UART:
3,566,230 UART: Running Caliptra FMC ...
3,566,638 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,174,650 ready_for_fw is high
1,174,650 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,242 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,479 UART: [fwproc] Recv'd Img size: 106876 bytes
2,494,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,969 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,958 >>> mbox cmd response: success
2,676,015 UART: [afmc] ++
2,676,183 UART: [afmc] CDI.KEYID = 6
2,676,546 UART: [afmc] SUBJECT.KEYID = 7
2,676,972 UART: [afmc] AUTHORITY.KEYID = 5
2,713,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,187 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,907 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,800 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,493 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,202 UART: [afmc] --
2,756,176 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,198 UART: [cold-reset] --
2,757,102 UART: [state] Locking Datavault
2,758,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,911 UART: [state] Locking ICCM
2,759,385 UART: [exit] Launching FMC @ 0x40000000
2,764,682 UART:
2,764,698 UART: Running Caliptra FMC ...
2,765,106 UART:
2,765,244 UART: [fmc] Received command: 0x46574C44
2,766,073 UART:
2,766,089 UART: Running Caliptra ROM ...
2,766,497 UART:
2,766,639 UART: [state] CFI Enabled
2,769,659 UART: [state] LifecycleState = Unprovisioned
2,770,314 UART: [state] DebugLocked = No
2,770,884 UART: [state] WD Timer not started. Device not locked for debugging
2,772,062 UART: [kat] SHA2-256
3,575,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,741 UART: [kat] ++
3,579,893 UART: [kat] sha1
3,584,247 UART: [kat] SHA2-256
3,586,187 UART: [kat] SHA2-384
3,588,782 UART: [kat] SHA2-512-ACC
3,590,682 UART: [kat] ECC-384
3,600,643 UART: [kat] HMAC-384Kdf
3,605,209 UART: [kat] LMS
3,853,521 UART: [kat] --
3,854,483 UART: [update-reset] ++
3,855,828 >>> mbox cmd response: failed
3,856,290 UART: ROM Non-Fatal Error: 0x000B0001
3,857,214 UART: [state] Locking Datavault
3,857,948 UART: [state] Locking PCR0, PCR1 and PCR31
3,858,552 UART: [state] Locking ICCM
3,859,018 UART: [exit] Launching FMC @ 0x40000000
3,864,315 UART:
3,864,331 UART: Running Caliptra FMC ...
3,864,739 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,763 ready_for_fw is high
1,055,763 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,022 >>> mbox cmd response: success
2,580,234 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,543 UART:
2,586,559 UART: Running Caliptra FMC ...
2,586,967 UART:
2,587,105 UART: [fmc] Received command: 0x46574C44
3,560,669 >>> mbox cmd response: failed
3,566,216 UART:
3,566,232 UART: Running Caliptra FMC ...
3,566,640 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,634 UART: [state] LifecycleState = Unprovisioned
85,289 UART: [state] DebugLocked = No
85,935 UART: [state] WD Timer not started. Device not locked for debugging
87,096 UART: [kat] SHA2-256
890,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,775 UART: [kat] ++
894,927 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,044 UART: [kat] SHA2-512-ACC
905,945 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 ready_for_fw is high
1,174,119 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,256 UART: [ldev] ++
1,208,424 UART: [ldev] CDI.KEYID = 6
1,208,788 UART: [ldev] SUBJECT.KEYID = 5
1,209,215 UART: [ldev] AUTHORITY.KEYID = 7
1,209,678 UART: [ldev] FE.KEYID = 1
1,214,668 UART: [ldev] Erasing FE.KEYID = 1
1,241,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,570 UART: [fwproc] Wait for Commands...
1,281,335 UART: [fwproc] Recv command 0x46574c44
1,282,068 UART: [fwproc] Recv'd Img size: 106876 bytes
2,492,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,932 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,905 >>> mbox cmd response: success
2,675,056 UART: [afmc] ++
2,675,224 UART: [afmc] CDI.KEYID = 6
2,675,587 UART: [afmc] SUBJECT.KEYID = 7
2,676,013 UART: [afmc] AUTHORITY.KEYID = 5
2,711,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,766 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,486 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,379 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,072 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,919 UART: [afmc] --
2,754,957 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,754,979 UART: [cold-reset] --
2,755,699 UART: [state] Locking Datavault
2,756,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,574 UART: [state] Locking ICCM
2,758,116 UART: [exit] Launching FMC @ 0x40000000
2,763,413 UART:
2,763,429 UART: Running Caliptra FMC ...
2,763,837 UART:
2,763,975 UART: [fmc] Received command: 0x46574C44
2,764,804 UART:
2,764,820 UART: Running Caliptra ROM ...
2,765,228 UART:
2,765,283 UART: [state] CFI Enabled
2,767,677 UART: [state] LifecycleState = Unprovisioned
2,768,332 UART: [state] DebugLocked = No
2,768,892 UART: [state] WD Timer not started. Device not locked for debugging
2,770,114 UART: [kat] SHA2-256
3,573,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,793 UART: [kat] ++
3,577,945 UART: [kat] sha1
3,582,167 UART: [kat] SHA2-256
3,584,107 UART: [kat] SHA2-384
3,586,756 UART: [kat] SHA2-512-ACC
3,588,656 UART: [kat] ECC-384
3,598,265 UART: [kat] HMAC-384Kdf
3,602,699 UART: [kat] LMS
3,851,011 UART: [kat] --
3,851,751 UART: [update-reset] ++
3,853,518 >>> mbox cmd response: failed
3,853,774 UART: ROM Non-Fatal Error: 0x000B0001
3,854,610 UART: [state] Locking Datavault
3,855,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,978 UART: [state] Locking ICCM
3,856,562 UART: [exit] Launching FMC @ 0x40000000
3,861,859 UART:
3,861,875 UART: Running Caliptra FMC ...
3,862,283 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,790 ready_for_fw is high
1,055,790 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,611 >>> mbox cmd response: success
2,580,781 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,274 UART:
2,587,290 UART: Running Caliptra FMC ...
2,587,698 UART:
2,587,836 UART: [fmc] Received command: 0x46574C44
3,561,263 >>> mbox cmd response: failed
3,566,984 UART:
3,567,000 UART: Running Caliptra FMC ...
3,567,408 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,174,664 ready_for_fw is high
1,174,664 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,519 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x46574c44
1,282,961 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,807 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,674,822 >>> mbox cmd response: success
2,676,015 UART: [afmc] ++
2,676,183 UART: [afmc] CDI.KEYID = 6
2,676,546 UART: [afmc] SUBJECT.KEYID = 7
2,676,972 UART: [afmc] AUTHORITY.KEYID = 5
2,712,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,096 UART: [afmc] --
2,756,010 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,756,032 UART: [cold-reset] --
2,757,042 UART: [state] Locking Datavault
2,758,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,719 UART: [state] Locking ICCM
2,759,363 UART: [exit] Launching FMC @ 0x40000000
2,764,660 UART:
2,764,676 UART: Running Caliptra FMC ...
2,765,084 UART:
2,765,222 UART: [fmc] Received command: 0x46574C44
2,766,051 UART:
2,766,067 UART: Running Caliptra ROM ...
2,766,475 UART:
2,766,617 UART: [state] CFI Enabled
2,769,141 UART: [state] LifecycleState = Unprovisioned
2,769,796 UART: [state] DebugLocked = No
2,770,468 UART: [state] WD Timer not started. Device not locked for debugging
2,771,636 UART: [kat] SHA2-256
3,575,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,315 UART: [kat] ++
3,579,467 UART: [kat] sha1
3,583,727 UART: [kat] SHA2-256
3,585,667 UART: [kat] SHA2-384
3,588,350 UART: [kat] SHA2-512-ACC
3,590,250 UART: [kat] ECC-384
3,600,163 UART: [kat] HMAC-384Kdf
3,604,879 UART: [kat] LMS
3,853,191 UART: [kat] --
3,853,929 UART: [update-reset] ++
3,855,266 >>> mbox cmd response: failed
3,855,728 UART: ROM Non-Fatal Error: 0x000B0001
3,856,640 UART: [state] Locking Datavault
3,857,336 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,940 UART: [state] Locking ICCM
3,858,592 UART: [exit] Launching FMC @ 0x40000000
3,863,889 UART:
3,863,905 UART: Running Caliptra FMC ...
3,864,313 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,943 ready_for_fw is high
1,055,943 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,908 >>> mbox cmd response: success
2,581,012 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,167 UART:
2,587,183 UART: Running Caliptra FMC ...
2,587,591 UART:
2,587,729 UART: [fmc] Received command: 0x46574C44
3,561,187 >>> mbox cmd response: failed
3,567,334 UART:
3,567,350 UART: Running Caliptra FMC ...
3,567,758 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 ready_for_fw is high
1,174,307 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,257 UART: [idev] --
1,209,370 UART: [ldev] ++
1,209,538 UART: [ldev] CDI.KEYID = 6
1,209,902 UART: [ldev] SUBJECT.KEYID = 5
1,210,329 UART: [ldev] AUTHORITY.KEYID = 7
1,210,792 UART: [ldev] FE.KEYID = 1
1,216,166 UART: [ldev] Erasing FE.KEYID = 1
1,242,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,910 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,773 UART: [fwproc] Recv command 0x46574c44
1,282,506 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,062 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,673,927 >>> mbox cmd response: success
2,674,972 UART: [afmc] ++
2,675,140 UART: [afmc] CDI.KEYID = 6
2,675,503 UART: [afmc] SUBJECT.KEYID = 7
2,675,929 UART: [afmc] AUTHORITY.KEYID = 5
2,711,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,802 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,522 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,415 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,108 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,187 UART: [afmc] --
2,755,265 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,287 UART: [cold-reset] --
2,756,133 UART: [state] Locking Datavault
2,757,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,894 UART: [state] Locking ICCM
2,758,484 UART: [exit] Launching FMC @ 0x40000000
2,763,781 UART:
2,763,797 UART: Running Caliptra FMC ...
2,764,205 UART:
2,764,343 UART: [fmc] Received command: 0x46574C44
2,765,172 UART:
2,765,188 UART: Running Caliptra ROM ...
2,765,596 UART:
2,765,651 UART: [state] CFI Enabled
2,768,319 UART: [state] LifecycleState = Unprovisioned
2,768,974 UART: [state] DebugLocked = No
2,769,484 UART: [state] WD Timer not started. Device not locked for debugging
2,770,662 UART: [kat] SHA2-256
3,574,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,341 UART: [kat] ++
3,578,493 UART: [kat] sha1
3,582,717 UART: [kat] SHA2-256
3,584,657 UART: [kat] SHA2-384
3,587,562 UART: [kat] SHA2-512-ACC
3,589,462 UART: [kat] ECC-384
3,599,099 UART: [kat] HMAC-384Kdf
3,603,787 UART: [kat] LMS
3,852,099 UART: [kat] --
3,852,869 UART: [update-reset] ++
3,854,354 >>> mbox cmd response: failed
3,854,872 UART: ROM Non-Fatal Error: 0x000B0001
3,855,840 UART: [state] Locking Datavault
3,856,724 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,328 UART: [state] Locking ICCM
3,857,984 UART: [exit] Launching FMC @ 0x40000000
3,863,281 UART:
3,863,297 UART: Running Caliptra FMC ...
3,863,705 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 ready_for_fw is high
1,056,156 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,524,587 >>> mbox cmd response: success
2,580,907 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,404 UART:
2,587,420 UART: Running Caliptra FMC ...
2,587,828 UART:
2,587,966 UART: [fmc] Received command: 0x46574C44
3,561,607 >>> mbox cmd response: failed
3,567,316 UART:
3,567,332 UART: Running Caliptra FMC ...
3,567,740 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,174,548 ready_for_fw is high
1,174,548 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,420 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,282,047 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,593 UART: [fwproc] Recv'd Img size: 106876 bytes
2,493,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,215 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,675,240 >>> mbox cmd response: success
2,676,281 UART: [afmc] ++
2,676,449 UART: [afmc] CDI.KEYID = 6
2,676,812 UART: [afmc] SUBJECT.KEYID = 7
2,677,238 UART: [afmc] AUTHORITY.KEYID = 5
2,712,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,549 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,269 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,162 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,855 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,788 UART: [afmc] --
2,755,710 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,732 UART: [cold-reset] --
2,756,652 UART: [state] Locking Datavault
2,757,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,091 UART: [state] Locking ICCM
2,758,651 UART: [exit] Launching FMC @ 0x40000000
2,763,948 UART:
2,763,964 UART: Running Caliptra FMC ...
2,764,372 UART:
2,764,510 UART: [fmc] Received command: 0x46574C44
2,765,339 UART:
2,765,355 UART: Running Caliptra ROM ...
2,765,763 UART:
2,765,905 UART: [state] CFI Enabled
2,768,501 UART: [state] LifecycleState = Unprovisioned
2,769,156 UART: [state] DebugLocked = No
2,769,638 UART: [state] WD Timer not started. Device not locked for debugging
2,770,756 UART: [kat] SHA2-256
3,574,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,435 UART: [kat] ++
3,578,587 UART: [kat] sha1
3,582,751 UART: [kat] SHA2-256
3,584,691 UART: [kat] SHA2-384
3,587,266 UART: [kat] SHA2-512-ACC
3,589,166 UART: [kat] ECC-384
3,598,983 UART: [kat] HMAC-384Kdf
3,603,591 UART: [kat] LMS
3,851,903 UART: [kat] --
3,852,827 UART: [update-reset] ++
3,854,324 >>> mbox cmd response: failed
3,854,528 UART: ROM Non-Fatal Error: 0x000B0001
3,855,482 UART: [state] Locking Datavault
3,856,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,820 UART: [state] Locking ICCM
3,857,276 UART: [exit] Launching FMC @ 0x40000000
3,862,573 UART:
3,862,589 UART: Running Caliptra FMC ...
3,862,997 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,905 ready_for_fw is high
1,055,905 <<< Executing mbox cmd 0x46574c44 (106876 bytes) from SoC
2,525,198 >>> mbox cmd response: success
2,582,080 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,588,133 UART:
2,588,149 UART: Running Caliptra FMC ...
2,588,557 UART:
2,588,695 UART: [fmc] Received command: 0x46574C44
3,562,211 >>> mbox cmd response: failed
3,567,892 UART:
3,567,908 UART: Running Caliptra FMC ...
3,568,316 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,917 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,199 UART:
192,582 UART: Running Caliptra ROM ...
193,792 UART:
193,943 UART: [state] CFI Enabled
265,939 UART: [state] LifecycleState = Unprovisioned
268,349 UART: [state] DebugLocked = No
270,270 UART: [state] WD Timer not started. Device not locked for debugging
275,621 UART: [kat] SHA2-256
457,558 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,058 UART: [kat] ++
469,652 UART: [kat] sha1
481,238 UART: [kat] SHA2-256
484,292 UART: [kat] SHA2-384
490,583 UART: [kat] SHA2-512-ACC
493,191 UART: [kat] ECC-384
3,775,885 UART: [kat] HMAC-384Kdf
3,802,814 UART: [kat] LMS
4,876,005 UART: [kat] --
4,879,752 UART: [cold-reset] ++
4,880,878 UART: [fht] FHT @ 0x50003400
4,892,376 UART: [idev] ++
4,893,062 UART: [idev] CDI.KEYID = 6
4,894,303 UART: [idev] SUBJECT.KEYID = 7
4,895,409 UART: [idev] UDS.KEYID = 0
4,929,269 UART: [idev] Erasing UDS.KEYID = 0
8,242,864 UART: [idev] Sha1 KeyId Algorithm
8,265,978 UART: [idev] --
8,270,732 UART: [ldev] ++
8,271,411 UART: [ldev] CDI.KEYID = 6
8,272,605 UART: [ldev] SUBJECT.KEYID = 5
8,273,763 UART: [ldev] AUTHORITY.KEYID = 7
8,275,010 UART: [ldev] FE.KEYID = 1
8,318,220 UART: [ldev] Erasing FE.KEYID = 1
11,657,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,958,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,974,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,026,305 UART: [ldev] --
14,030,653 UART: [fwproc] Wait for Commands...
14,032,317 UART: [fwproc] Recv command 0x46505652
14,034,918 UART: [rt] FIPS Version
14,036,688 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,927 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,809,993 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,087 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,308 UART:
192,699 UART: Running Caliptra ROM ...
193,914 UART:
603,355 UART: [state] CFI Enabled
614,476 UART: [state] LifecycleState = Unprovisioned
616,853 UART: [state] DebugLocked = No
618,087 UART: [state] WD Timer not started. Device not locked for debugging
622,606 UART: [kat] SHA2-256
805,158 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,067 UART: [kat] ++
816,576 UART: [kat] sha1
827,231 UART: [kat] SHA2-256
830,238 UART: [kat] SHA2-384
836,101 UART: [kat] SHA2-512-ACC
838,764 UART: [kat] ECC-384
4,096,144 UART: [kat] HMAC-384Kdf
4,108,273 UART: [kat] LMS
5,181,443 UART: [kat] --
5,185,902 UART: [cold-reset] ++
5,187,488 UART: [fht] FHT @ 0x50003400
5,198,955 UART: [idev] ++
5,199,679 UART: [idev] CDI.KEYID = 6
5,200,910 UART: [idev] SUBJECT.KEYID = 7
5,202,335 UART: [idev] UDS.KEYID = 0
5,220,646 UART: [idev] Erasing UDS.KEYID = 0
8,491,858 UART: [idev] Sha1 KeyId Algorithm
8,513,411 UART: [idev] --
8,516,271 UART: [ldev] ++
8,516,838 UART: [ldev] CDI.KEYID = 6
8,518,072 UART: [ldev] SUBJECT.KEYID = 5
8,519,504 UART: [ldev] AUTHORITY.KEYID = 7
8,521,057 UART: [ldev] FE.KEYID = 1
8,532,677 UART: [ldev] Erasing FE.KEYID = 1
11,826,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,294 UART: [ldev] --
14,193,367 UART: [fwproc] Wait for Commands...
14,195,568 UART: [fwproc] Recv command 0x46505652
14,198,151 UART: [rt] FIPS Version
14,199,923 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
4,292 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,007,562 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
4,071 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,301 UART:
192,697 UART: Running Caliptra ROM ...
193,874 UART:
194,023 UART: [state] CFI Enabled
262,971 UART: [state] LifecycleState = Unprovisioned
264,836 UART: [state] DebugLocked = No
266,381 UART: [state] WD Timer not started. Device not locked for debugging
270,810 UART: [kat] SHA2-256
449,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,507 UART: [kat] ++
462,037 UART: [kat] sha1
473,211 UART: [kat] SHA2-256
476,259 UART: [kat] SHA2-384
482,462 UART: [kat] SHA2-512-ACC
485,406 UART: [kat] ECC-384
2,947,237 UART: [kat] HMAC-384Kdf
2,969,467 UART: [kat] LMS
3,498,960 UART: [kat] --
3,503,901 UART: [cold-reset] ++
3,505,841 UART: [fht] FHT @ 0x50003400
3,516,647 UART: [idev] ++
3,517,224 UART: [idev] CDI.KEYID = 6
3,518,113 UART: [idev] SUBJECT.KEYID = 7
3,519,328 UART: [idev] UDS.KEYID = 0
3,541,151 UART: [idev] Erasing UDS.KEYID = 0
6,022,694 UART: [idev] Sha1 KeyId Algorithm
6,045,546 UART: [idev] --
6,049,870 UART: [ldev] ++
6,050,443 UART: [ldev] CDI.KEYID = 6
6,051,353 UART: [ldev] SUBJECT.KEYID = 5
6,052,515 UART: [ldev] AUTHORITY.KEYID = 7
6,053,802 UART: [ldev] FE.KEYID = 1
6,096,702 UART: [ldev] Erasing FE.KEYID = 1
8,597,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,216 UART: [ldev] --
10,387,400 UART: [fwproc] Wait for Commands...
10,388,941 UART: [fwproc] Recv command 0x46505652
10,391,324 UART: [rt] FIPS Version
10,392,779 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,853 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,137 UART:
192,524 UART: Running Caliptra ROM ...
193,596 UART:
193,735 UART: [state] CFI Enabled
262,732 UART: [state] LifecycleState = Unprovisioned
264,603 UART: [state] DebugLocked = No
266,446 UART: [state] WD Timer not started. Device not locked for debugging
269,758 UART: [kat] SHA2-256
448,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,454 UART: [kat] ++
460,997 UART: [kat] sha1
473,504 UART: [kat] SHA2-256
476,512 UART: [kat] SHA2-384
482,813 UART: [kat] SHA2-512-ACC
485,768 UART: [kat] ECC-384
2,948,572 UART: [kat] HMAC-384Kdf
2,972,691 UART: [kat] LMS
3,502,147 UART: [kat] --
3,507,375 UART: [cold-reset] ++
3,508,279 UART: [fht] FHT @ 0x50003400
3,518,394 UART: [idev] ++
3,518,956 UART: [idev] CDI.KEYID = 6
3,519,920 UART: [idev] SUBJECT.KEYID = 7
3,521,075 UART: [idev] UDS.KEYID = 0
3,545,540 UART: [idev] Erasing UDS.KEYID = 0
6,026,317 UART: [idev] Sha1 KeyId Algorithm
6,050,559 UART: [idev] --
6,055,399 UART: [ldev] ++
6,055,974 UART: [ldev] CDI.KEYID = 6
6,056,861 UART: [ldev] SUBJECT.KEYID = 5
6,058,098 UART: [ldev] AUTHORITY.KEYID = 7
6,059,234 UART: [ldev] FE.KEYID = 1
6,100,397 UART: [ldev] Erasing FE.KEYID = 1
8,606,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,656 UART: [ldev] --
10,416,082 UART: [fwproc] Wait for Commands...
10,418,072 UART: [fwproc] Recv command 0x46505652
10,420,445 UART: [rt] FIPS Version
10,421,951 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
4,055 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,173,533 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,202 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,416 UART:
192,795 UART: Running Caliptra ROM ...
193,943 UART:
603,373 UART: [state] CFI Enabled
615,773 UART: [state] LifecycleState = Unprovisioned
617,663 UART: [state] DebugLocked = No
620,441 UART: [state] WD Timer not started. Device not locked for debugging
624,114 UART: [kat] SHA2-256
803,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,817 UART: [kat] ++
815,342 UART: [kat] sha1
826,224 UART: [kat] SHA2-256
829,233 UART: [kat] SHA2-384
833,802 UART: [kat] SHA2-512-ACC
836,786 UART: [kat] ECC-384
3,278,957 UART: [kat] HMAC-384Kdf
3,290,649 UART: [kat] LMS
3,820,152 UART: [kat] --
3,823,389 UART: [cold-reset] ++
3,825,434 UART: [fht] FHT @ 0x50003400
3,836,847 UART: [idev] ++
3,837,407 UART: [idev] CDI.KEYID = 6
3,838,315 UART: [idev] SUBJECT.KEYID = 7
3,839,526 UART: [idev] UDS.KEYID = 0
3,855,446 UART: [idev] Erasing UDS.KEYID = 0
6,316,633 UART: [idev] Sha1 KeyId Algorithm
6,339,434 UART: [idev] --
6,343,533 UART: [ldev] ++
6,344,103 UART: [ldev] CDI.KEYID = 6
6,345,010 UART: [ldev] SUBJECT.KEYID = 5
6,346,226 UART: [ldev] AUTHORITY.KEYID = 7
6,347,452 UART: [ldev] FE.KEYID = 1
6,358,453 UART: [ldev] Erasing FE.KEYID = 1
8,826,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,168 UART: [ldev] --
10,618,708 UART: [fwproc] Wait for Commands...
10,621,184 UART: [fwproc] Recv command 0x46505652
10,623,498 UART: [rt] FIPS Version
10,624,980 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
4,391 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,398,517 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
890,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,959 UART: [kat] ++
895,111 UART: [kat] sha1
899,285 UART: [kat] SHA2-256
901,225 UART: [kat] SHA2-384
903,904 UART: [kat] SHA2-512-ACC
905,805 UART: [kat] ECC-384
915,718 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,693 UART: [idev] ++
1,172,861 UART: [idev] CDI.KEYID = 6
1,173,222 UART: [idev] SUBJECT.KEYID = 7
1,173,647 UART: [idev] UDS.KEYID = 0
1,181,373 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,274 UART: [ldev] ++
1,208,442 UART: [ldev] CDI.KEYID = 6
1,208,806 UART: [ldev] SUBJECT.KEYID = 5
1,209,233 UART: [ldev] AUTHORITY.KEYID = 7
1,209,696 UART: [ldev] FE.KEYID = 1
1,214,854 UART: [ldev] Erasing FE.KEYID = 1
1,240,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,314 UART: [ldev] --
1,279,644 UART: [fwproc] Wait for Commands...
1,280,379 UART: [fwproc] Recv command 0x46505652
1,281,206 UART: [rt] FIPS Version
1,281,767 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,718 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,666 UART: [idev] ++
1,173,834 UART: [idev] CDI.KEYID = 6
1,174,195 UART: [idev] SUBJECT.KEYID = 7
1,174,620 UART: [idev] UDS.KEYID = 0
1,182,654 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,282,027 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46505652
1,283,513 UART: [rt] FIPS Version
1,284,074 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,027 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
904,090 UART: [kat] SHA2-512-ACC
905,991 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,213 UART: [cold-reset] ++
1,169,775 UART: [fht] FHT @ 0x50003400
1,172,371 UART: [idev] ++
1,172,539 UART: [idev] CDI.KEYID = 6
1,172,900 UART: [idev] SUBJECT.KEYID = 7
1,173,325 UART: [idev] UDS.KEYID = 0
1,181,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,590 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,598 UART: [ldev] --
1,280,022 UART: [fwproc] Wait for Commands...
1,280,747 UART: [fwproc] Recv command 0x46505652
1,281,574 UART: [rt] FIPS Version
1,282,135 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,376 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,892 UART: [idev] Sha1 KeyId Algorithm
1,207,730 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,241,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,189 UART: [ldev] --
1,280,517 UART: [fwproc] Wait for Commands...
1,281,218 UART: [fwproc] Recv command 0x46505652
1,282,045 UART: [rt] FIPS Version
1,282,606 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,581 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
890,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,963 UART: [kat] ++
895,115 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,576 UART: [kat] HMAC-384Kdf
920,084 UART: [kat] LMS
1,168,396 UART: [kat] --
1,169,009 UART: [cold-reset] ++
1,169,567 UART: [fht] FHT @ 0x50003400
1,172,243 UART: [idev] ++
1,172,411 UART: [idev] CDI.KEYID = 6
1,172,772 UART: [idev] SUBJECT.KEYID = 7
1,173,197 UART: [idev] UDS.KEYID = 0
1,181,141 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,573 UART: [fwproc] Recv command 0x46505652
1,282,400 UART: [rt] FIPS Version
1,282,961 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,466 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,974 UART: [kat] ++
896,126 UART: [kat] sha1
900,446 UART: [kat] SHA2-256
902,386 UART: [kat] SHA2-384
905,243 UART: [kat] SHA2-512-ACC
907,144 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,285 UART: [kat] LMS
1,169,597 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,998 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,200,242 UART: [idev] Sha1 KeyId Algorithm
1,209,204 UART: [idev] --
1,210,187 UART: [ldev] ++
1,210,355 UART: [ldev] CDI.KEYID = 6
1,210,719 UART: [ldev] SUBJECT.KEYID = 5
1,211,146 UART: [ldev] AUTHORITY.KEYID = 7
1,211,609 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,281 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46505652
1,283,851 UART: [rt] FIPS Version
1,284,412 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,741 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
6,035 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,139 UART:
192,522 UART: Running Caliptra ROM ...
193,708 UART:
193,867 UART: [state] CFI Enabled
266,224 UART: [state] LifecycleState = Unprovisioned
268,640 UART: [state] DebugLocked = No
269,856 UART: [state] WD Timer not started. Device not locked for debugging
274,137 UART: [kat] SHA2-256
456,060 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,587 UART: [kat] ++
468,096 UART: [kat] sha1
478,296 UART: [kat] SHA2-256
481,299 UART: [kat] SHA2-384
487,250 UART: [kat] SHA2-512-ACC
489,865 UART: [kat] ECC-384
3,777,313 UART: [kat] HMAC-384Kdf
3,801,384 UART: [kat] LMS
4,874,531 UART: [kat] --
4,879,994 UART: [cold-reset] ++
4,882,401 UART: [fht] FHT @ 0x50003400
4,894,854 UART: [idev] ++
4,895,531 UART: [idev] CDI.KEYID = 6
4,896,762 UART: [idev] SUBJECT.KEYID = 7
4,897,863 UART: [idev] UDS.KEYID = 0
4,929,875 UART: [idev] Erasing UDS.KEYID = 0
8,246,646 UART: [idev] Sha1 KeyId Algorithm
8,267,499 UART: [idev] --
8,270,729 UART: [ldev] ++
8,271,296 UART: [ldev] CDI.KEYID = 6
8,272,548 UART: [ldev] SUBJECT.KEYID = 5
8,273,662 UART: [ldev] AUTHORITY.KEYID = 7
8,274,816 UART: [ldev] FE.KEYID = 1
8,317,037 UART: [ldev] Erasing FE.KEYID = 1
11,655,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,319 UART: [ldev] --
14,038,420 UART: [fwproc] Wait for Commands...
14,041,547 UART: [fwproc] Recv command 0x46574c44
14,043,868 UART: [fwproc] Recv'd Img size: 114036 bytes
18,119,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,190,906 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,259,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,576,609 >>> mbox cmd response: success
18,581,557 UART: [afmc] ++
18,582,153 UART: [afmc] CDI.KEYID = 6
18,583,340 UART: [afmc] SUBJECT.KEYID = 7
18,584,447 UART: [afmc] AUTHORITY.KEYID = 5
21,946,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,245,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,247,335 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,263,486 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,279,508 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,295,533 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
821 UART: [
1,327 UART: Running Caliptra ROM ...
2,433 UART:
2,588 UART: [state] CFI Enabled
68,553 UART: [state] LifecycleState = Unprovisioned
70,380 UART: [state] DebugLocked = No
73,154 UART: [state] WD Timer not started. Device not locked for debugging
77,867 UART: [kat] SHA2-256
259,813 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
271,296 UART: [kat] ++
271,795 UART: [kat] sha1
281,212 UART: [kat] SHA2-256
284,276 UART: [kat] SHA2-384
288,515 UART: [kat] SHA2-512-ACC
291,122 UART: [kat] ECC-384
3,583,515 UART: [kat] HMAC-384Kdf
3,608,482 UART: [kat] LMS
4,681,652 UART: [kat] --
4,687,423 UART: [warm-reset] ++
4,688,434 UART: [warm-reset] Prev Cold-Reset failed
4,691,372 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
5,697 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,350,830 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
6,366 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,361 UART:
192,777 UART: Running Caliptra ROM ...
193,978 UART:
603,753 UART: [state] CFI Enabled
616,072 UART: [state] LifecycleState = Unprovisioned
618,402 UART: [state] DebugLocked = No
620,041 UART: [state] WD Timer not started. Device not locked for debugging
624,588 UART: [kat] SHA2-256
806,559 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,071 UART: [kat] ++
818,664 UART: [kat] sha1
829,657 UART: [kat] SHA2-256
832,710 UART: [kat] SHA2-384
838,843 UART: [kat] SHA2-512-ACC
841,467 UART: [kat] ECC-384
4,094,099 UART: [kat] HMAC-384Kdf
4,106,175 UART: [kat] LMS
5,179,331 UART: [kat] --
5,185,288 UART: [cold-reset] ++
5,186,686 UART: [fht] FHT @ 0x50003400
5,197,339 UART: [idev] ++
5,198,007 UART: [idev] CDI.KEYID = 6
5,199,239 UART: [idev] SUBJECT.KEYID = 7
5,200,662 UART: [idev] UDS.KEYID = 0
5,219,870 UART: [idev] Erasing UDS.KEYID = 0
8,490,546 UART: [idev] Sha1 KeyId Algorithm
8,513,640 UART: [idev] --
8,517,797 UART: [ldev] ++
8,518,356 UART: [ldev] CDI.KEYID = 6
8,519,682 UART: [ldev] SUBJECT.KEYID = 5
8,521,080 UART: [ldev] AUTHORITY.KEYID = 7
8,522,582 UART: [ldev] FE.KEYID = 1
8,532,498 UART: [ldev] Erasing FE.KEYID = 1
11,825,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,727 UART: [ldev] --
14,189,067 UART: [fwproc] Wait for Commands...
14,191,971 UART: [fwproc] Recv command 0x46574c44
14,194,281 UART: [fwproc] Recv'd Img size: 114036 bytes
18,273,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,346,802 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,415,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,732,564 >>> mbox cmd response: success
18,736,571 UART: [afmc] ++
18,737,151 UART: [afmc] CDI.KEYID = 6
18,738,331 UART: [afmc] SUBJECT.KEYID = 7
18,739,507 UART: [afmc] AUTHORITY.KEYID = 5
22,059,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,352,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,355,142 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,371,326 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,387,355 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,403,309 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
796 UART: [
1,336 UART: Running Caliptra ROM ...
2,431 UART:
16,159,635 UART: [state] CFI Enabled
16,174,052 UART: [state] LifecycleState = Unprovisioned
16,175,941 UART: [state] DebugLocked = No
16,177,627 UART: [state] WD Timer not started. Device not locked for debugging
16,181,701 UART: [kat] SHA2-256
16,363,643 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
16,375,192 UART: [kat] ++
16,375,724 UART: [kat] sha1
16,385,694 UART: [kat] SHA2-256
16,388,713 UART: [kat] SHA2-384
16,393,882 UART: [kat] SHA2-512-ACC
16,396,500 UART: [kat] ECC-384
19,653,653 UART: [kat] HMAC-384Kdf
19,665,883 UART: [kat] LMS
20,739,068 UART: [kat] --
20,742,265 UART: [warm-reset] ++
20,743,278 UART: [warm-reset] Prev Cold-Reset failed
20,746,513 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,131 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,540,089 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
5,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,313 UART:
192,694 UART: Running Caliptra ROM ...
193,855 UART:
194,030 UART: [state] CFI Enabled
265,037 UART: [state] LifecycleState = Unprovisioned
266,952 UART: [state] DebugLocked = No
268,822 UART: [state] WD Timer not started. Device not locked for debugging
272,993 UART: [kat] SHA2-256
452,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,724 UART: [kat] ++
464,257 UART: [kat] sha1
476,113 UART: [kat] SHA2-256
479,142 UART: [kat] SHA2-384
485,652 UART: [kat] SHA2-512-ACC
488,646 UART: [kat] ECC-384
2,961,499 UART: [kat] HMAC-384Kdf
2,983,613 UART: [kat] LMS
3,513,064 UART: [kat] --
3,519,748 UART: [cold-reset] ++
3,520,764 UART: [fht] FHT @ 0x50003400
3,531,926 UART: [idev] ++
3,532,492 UART: [idev] CDI.KEYID = 6
3,533,458 UART: [idev] SUBJECT.KEYID = 7
3,534,617 UART: [idev] UDS.KEYID = 0
3,556,693 UART: [idev] Erasing UDS.KEYID = 0
6,037,919 UART: [idev] Sha1 KeyId Algorithm
6,061,048 UART: [idev] --
6,064,777 UART: [ldev] ++
6,065,348 UART: [ldev] CDI.KEYID = 6
6,066,258 UART: [ldev] SUBJECT.KEYID = 5
6,067,479 UART: [ldev] AUTHORITY.KEYID = 7
6,068,711 UART: [ldev] FE.KEYID = 1
6,112,202 UART: [ldev] Erasing FE.KEYID = 1
8,613,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,239 UART: [ldev] --
10,403,624 UART: [fwproc] Wait for Commands...
10,405,835 UART: [fwproc] Recv command 0x46574c44
10,407,935 UART: [fwproc] Recv'd Img size: 114360 bytes
13,802,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,263,254 >>> mbox cmd response: success
14,267,944 UART: [afmc] ++
14,268,526 UART: [afmc] CDI.KEYID = 6
14,269,432 UART: [afmc] SUBJECT.KEYID = 7
14,270,644 UART: [afmc] AUTHORITY.KEYID = 5
16,800,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,524,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,526,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,542,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,558,211 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,574,089 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
1,129 UART:
1,381 UART: Running Caliptra ROM ...
2,481 UART:
2,639 UART: [state] CFI Enabled
70,673 UART: [state] LifecycleState = Unprovisioned
72,533 UART: [state] DebugLocked = No
74,343 UART: [state] WD Timer not started. Device not locked for debugging
78,887 UART: [kat] SHA2-256
258,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
269,597 UART: [kat] ++
270,148 UART: [kat] sha1
282,017 UART: [kat] SHA2-256
285,068 UART: [kat] SHA2-384
290,242 UART: [kat] SHA2-512-ACC
293,237 UART: [kat] ECC-384
2,750,839 UART: [kat] HMAC-384Kdf
2,775,118 UART: [kat] LMS
3,304,598 UART: [kat] --
3,311,171 UART: [warm-reset] ++
3,311,971 UART: [warm-reset] Prev Cold-Reset failed
3,316,016 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
5,738 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,183 UART:
192,578 UART: Running Caliptra ROM ...
193,671 UART:
193,818 UART: [state] CFI Enabled
265,064 UART: [state] LifecycleState = Unprovisioned
266,938 UART: [state] DebugLocked = No
269,156 UART: [state] WD Timer not started. Device not locked for debugging
272,573 UART: [kat] SHA2-256
451,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,265 UART: [kat] ++
463,711 UART: [kat] sha1
475,341 UART: [kat] SHA2-256
478,402 UART: [kat] SHA2-384
483,242 UART: [kat] SHA2-512-ACC
486,174 UART: [kat] ECC-384
2,947,112 UART: [kat] HMAC-384Kdf
2,972,070 UART: [kat] LMS
3,501,533 UART: [kat] --
3,507,925 UART: [cold-reset] ++
3,509,486 UART: [fht] FHT @ 0x50003400
3,520,147 UART: [idev] ++
3,520,724 UART: [idev] CDI.KEYID = 6
3,521,648 UART: [idev] SUBJECT.KEYID = 7
3,522,810 UART: [idev] UDS.KEYID = 0
3,544,079 UART: [idev] Erasing UDS.KEYID = 0
6,026,931 UART: [idev] Sha1 KeyId Algorithm
6,049,177 UART: [idev] --
6,053,670 UART: [ldev] ++
6,054,244 UART: [ldev] CDI.KEYID = 6
6,055,130 UART: [ldev] SUBJECT.KEYID = 5
6,056,357 UART: [ldev] AUTHORITY.KEYID = 7
6,057,594 UART: [ldev] FE.KEYID = 1
6,102,114 UART: [ldev] Erasing FE.KEYID = 1
8,604,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,745 UART: [ldev] --
10,394,769 UART: [fwproc] Wait for Commands...
10,396,820 UART: [fwproc] Recv command 0x46574c44
10,398,918 UART: [fwproc] Recv'd Img size: 114360 bytes
13,804,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,263,407 >>> mbox cmd response: success
14,268,437 UART: [afmc] ++
14,269,049 UART: [afmc] CDI.KEYID = 6
14,269,942 UART: [afmc] SUBJECT.KEYID = 7
14,271,048 UART: [afmc] AUTHORITY.KEYID = 5
16,811,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
1,138 UART:
1,395 UART: Running Caliptra ROM ...
2,495 UART:
2,647 UART: [state] CFI Enabled
70,538 UART: [state] LifecycleState = Unprovisioned
72,427 UART: [state] DebugLocked = No
75,213 UART: [state] WD Timer not started. Device not locked for debugging
79,593 UART: [kat] SHA2-256
258,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,296 UART: [kat] ++
270,826 UART: [kat] sha1
282,135 UART: [kat] SHA2-256
285,134 UART: [kat] SHA2-384
292,248 UART: [kat] SHA2-512-ACC
295,235 UART: [kat] ECC-384
2,756,427 UART: [kat] HMAC-384Kdf
2,780,307 UART: [kat] LMS
3,309,760 UART: [kat] --
3,313,640 UART: [warm-reset] ++
3,314,434 UART: [warm-reset] Prev Cold-Reset failed
3,318,048 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
5,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,036,062 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,587 writing to cptra_bootfsm_go
6,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,715 UART:
193,114 UART: Running Caliptra ROM ...
194,210 UART:
603,999 UART: [state] CFI Enabled
618,559 UART: [state] LifecycleState = Unprovisioned
620,422 UART: [state] DebugLocked = No
621,965 UART: [state] WD Timer not started. Device not locked for debugging
625,259 UART: [kat] SHA2-256
804,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,954 UART: [kat] ++
816,484 UART: [kat] sha1
828,822 UART: [kat] SHA2-256
831,832 UART: [kat] SHA2-384
838,186 UART: [kat] SHA2-512-ACC
841,169 UART: [kat] ECC-384
3,279,278 UART: [kat] HMAC-384Kdf
3,290,976 UART: [kat] LMS
3,820,490 UART: [kat] --
3,825,556 UART: [cold-reset] ++
3,826,948 UART: [fht] FHT @ 0x50003400
3,837,486 UART: [idev] ++
3,838,047 UART: [idev] CDI.KEYID = 6
3,839,065 UART: [idev] SUBJECT.KEYID = 7
3,840,173 UART: [idev] UDS.KEYID = 0
3,858,418 UART: [idev] Erasing UDS.KEYID = 0
6,311,362 UART: [idev] Sha1 KeyId Algorithm
6,333,412 UART: [idev] --
6,338,109 UART: [ldev] ++
6,338,677 UART: [ldev] CDI.KEYID = 6
6,339,591 UART: [ldev] SUBJECT.KEYID = 5
6,340,746 UART: [ldev] AUTHORITY.KEYID = 7
6,342,136 UART: [ldev] FE.KEYID = 1
6,352,767 UART: [ldev] Erasing FE.KEYID = 1
8,832,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,975 UART: [ldev] --
10,620,113 UART: [fwproc] Wait for Commands...
10,621,892 UART: [fwproc] Recv command 0x46574c44
10,623,986 UART: [fwproc] Recv'd Img size: 114360 bytes
14,023,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,482,799 >>> mbox cmd response: success
14,487,040 UART: [afmc] ++
14,487,650 UART: [afmc] CDI.KEYID = 6
14,488,563 UART: [afmc] SUBJECT.KEYID = 7
14,489,720 UART: [afmc] AUTHORITY.KEYID = 5
16,989,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,021 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,926 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
818 UART: [
1,288 UART: Running Caliptra ROM ...
2,390 UART:
1,734,806 UART: [state] CFI Enabled
1,750,599 UART: [state] LifecycleState = Unprovisioned
1,752,471 UART: [state] DebugLocked = No
1,753,850 UART: [state] WD Timer not started. Device not locked for debugging
1,756,722 UART: [kat] SHA2-256
1,935,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,947,418 UART: [kat] ++
1,947,874 UART: [kat] sha1
1,958,866 UART: [kat] SHA2-256
1,961,875 UART: [kat] SHA2-384
1,967,426 UART: [kat] SHA2-512-ACC
1,970,373 UART: [kat] ECC-384
4,412,862 UART: [kat] HMAC-384Kdf
4,426,219 UART: [kat] LMS
4,955,726 UART: [kat] --
4,958,679 UART: [warm-reset] ++
4,959,515 UART: [warm-reset] Prev Cold-Reset failed
4,964,093 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
6,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,266,108 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
86,097 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
903,854 UART: [kat] SHA2-512-ACC
905,755 UART: [kat] ECC-384
915,550 UART: [kat] HMAC-384Kdf
920,224 UART: [kat] LMS
1,168,536 UART: [kat] --
1,169,317 UART: [cold-reset] ++
1,169,871 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,469 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,622 UART: [ldev] ++
1,208,790 UART: [ldev] CDI.KEYID = 6
1,209,154 UART: [ldev] SUBJECT.KEYID = 5
1,209,581 UART: [ldev] AUTHORITY.KEYID = 7
1,210,044 UART: [ldev] FE.KEYID = 1
1,215,160 UART: [ldev] Erasing FE.KEYID = 1
1,241,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,212 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,279 UART: [fwproc] Recv command 0x46574c44
1,283,012 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,100 >>> mbox cmd response: success
2,774,155 UART: [afmc] ++
2,774,323 UART: [afmc] CDI.KEYID = 6
2,774,686 UART: [afmc] SUBJECT.KEYID = 7
2,775,112 UART: [afmc] AUTHORITY.KEYID = 5
2,810,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,771 UART:
2,852,787 UART: Running Caliptra ROM ...
2,853,195 UART:
2,853,250 UART: [state] CFI Enabled
2,855,626 UART: [state] LifecycleState = Unprovisioned
2,856,281 UART: [state] DebugLocked = No
2,856,999 UART: [state] WD Timer not started. Device not locked for debugging
2,858,252 UART: [kat] SHA2-256
3,661,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,931 UART: [kat] ++
3,666,083 UART: [kat] sha1
3,670,365 UART: [kat] SHA2-256
3,672,305 UART: [kat] SHA2-384
3,675,146 UART: [kat] SHA2-512-ACC
3,677,047 UART: [kat] ECC-384
3,687,118 UART: [kat] HMAC-384Kdf
3,691,622 UART: [kat] LMS
3,939,934 UART: [kat] --
3,940,850 UART: [warm-reset] ++
3,941,118 UART: [warm-reset] Prev Cold-Reset failed
3,941,955 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,500 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,496 UART: [cold-reset] ++
1,170,048 UART: [fht] FHT @ 0x50003400
1,172,530 UART: [idev] ++
1,172,698 UART: [idev] CDI.KEYID = 6
1,173,059 UART: [idev] SUBJECT.KEYID = 7
1,173,484 UART: [idev] UDS.KEYID = 0
1,181,560 UART: [idev] Erasing UDS.KEYID = 0
1,198,474 UART: [idev] Sha1 KeyId Algorithm
1,207,422 UART: [idev] --
1,208,473 UART: [ldev] ++
1,208,641 UART: [ldev] CDI.KEYID = 6
1,209,005 UART: [ldev] SUBJECT.KEYID = 5
1,209,432 UART: [ldev] AUTHORITY.KEYID = 7
1,209,895 UART: [ldev] FE.KEYID = 1
1,214,939 UART: [ldev] Erasing FE.KEYID = 1
1,240,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,619 UART: [ldev] --
1,280,013 UART: [fwproc] Wait for Commands...
1,280,688 UART: [fwproc] Recv command 0x46574c44
1,281,421 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,921 >>> mbox cmd response: success
2,773,010 UART: [afmc] ++
2,773,178 UART: [afmc] CDI.KEYID = 6
2,773,541 UART: [afmc] SUBJECT.KEYID = 7
2,773,967 UART: [afmc] AUTHORITY.KEYID = 5
2,809,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,721 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,300 UART:
2,852,316 UART: Running Caliptra ROM ...
2,852,724 UART:
2,852,866 UART: [state] CFI Enabled
2,855,308 UART: [state] LifecycleState = Unprovisioned
2,855,963 UART: [state] DebugLocked = No
2,856,579 UART: [state] WD Timer not started. Device not locked for debugging
2,857,726 UART: [kat] SHA2-256
3,661,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,405 UART: [kat] ++
3,665,557 UART: [kat] sha1
3,669,679 UART: [kat] SHA2-256
3,671,619 UART: [kat] SHA2-384
3,674,256 UART: [kat] SHA2-512-ACC
3,676,157 UART: [kat] ECC-384
3,685,596 UART: [kat] HMAC-384Kdf
3,690,448 UART: [kat] LMS
3,938,760 UART: [kat] --
3,939,316 UART: [warm-reset] ++
3,939,584 UART: [warm-reset] Prev Cold-Reset failed
3,940,599 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,123 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,208 UART: [kat] LMS
1,168,520 UART: [kat] --
1,169,417 UART: [cold-reset] ++
1,169,759 UART: [fht] FHT @ 0x50003400
1,172,433 UART: [idev] ++
1,172,601 UART: [idev] CDI.KEYID = 6
1,172,962 UART: [idev] SUBJECT.KEYID = 7
1,173,387 UART: [idev] UDS.KEYID = 0
1,181,457 UART: [idev] Erasing UDS.KEYID = 0
1,198,071 UART: [idev] Sha1 KeyId Algorithm
1,207,049 UART: [idev] --
1,208,028 UART: [ldev] ++
1,208,196 UART: [ldev] CDI.KEYID = 6
1,208,560 UART: [ldev] SUBJECT.KEYID = 5
1,208,987 UART: [ldev] AUTHORITY.KEYID = 7
1,209,450 UART: [ldev] FE.KEYID = 1
1,214,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,600 UART: [ldev] --
1,280,032 UART: [fwproc] Wait for Commands...
1,280,627 UART: [fwproc] Recv command 0x46574c44
1,281,360 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,088 >>> mbox cmd response: success
2,773,123 UART: [afmc] ++
2,773,291 UART: [afmc] CDI.KEYID = 6
2,773,654 UART: [afmc] SUBJECT.KEYID = 7
2,774,080 UART: [afmc] AUTHORITY.KEYID = 5
2,809,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,749 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,632 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,351 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,852,135 UART:
2,852,151 UART: Running Caliptra ROM ...
2,852,559 UART:
2,852,614 UART: [state] CFI Enabled
2,855,066 UART: [state] LifecycleState = Unprovisioned
2,855,721 UART: [state] DebugLocked = No
2,856,297 UART: [state] WD Timer not started. Device not locked for debugging
2,857,486 UART: [kat] SHA2-256
3,661,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,165 UART: [kat] ++
3,665,317 UART: [kat] sha1
3,669,657 UART: [kat] SHA2-256
3,671,597 UART: [kat] SHA2-384
3,674,272 UART: [kat] SHA2-512-ACC
3,676,173 UART: [kat] ECC-384
3,685,900 UART: [kat] HMAC-384Kdf
3,690,458 UART: [kat] LMS
3,938,770 UART: [kat] --
3,939,652 UART: [warm-reset] ++
3,939,920 UART: [warm-reset] Prev Cold-Reset failed
3,940,851 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,594 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,335 UART: [kat] LMS
1,169,647 UART: [kat] --
1,170,830 UART: [cold-reset] ++
1,171,408 UART: [fht] FHT @ 0x50003400
1,173,906 UART: [idev] ++
1,174,074 UART: [idev] CDI.KEYID = 6
1,174,435 UART: [idev] SUBJECT.KEYID = 7
1,174,860 UART: [idev] UDS.KEYID = 0
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,200,018 UART: [idev] Sha1 KeyId Algorithm
1,208,888 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,217,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,329 UART: [ldev] --
1,283,603 UART: [fwproc] Wait for Commands...
1,284,282 UART: [fwproc] Recv command 0x46574c44
1,285,015 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,403 >>> mbox cmd response: success
2,776,568 UART: [afmc] ++
2,776,736 UART: [afmc] CDI.KEYID = 6
2,777,099 UART: [afmc] SUBJECT.KEYID = 7
2,777,525 UART: [afmc] AUTHORITY.KEYID = 5
2,812,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,861 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,580 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,855,536 UART:
2,855,552 UART: Running Caliptra ROM ...
2,855,960 UART:
2,856,102 UART: [state] CFI Enabled
2,859,138 UART: [state] LifecycleState = Unprovisioned
2,859,793 UART: [state] DebugLocked = No
2,860,343 UART: [state] WD Timer not started. Device not locked for debugging
2,861,592 UART: [kat] SHA2-256
3,665,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,669,271 UART: [kat] ++
3,669,423 UART: [kat] sha1
3,673,667 UART: [kat] SHA2-256
3,675,607 UART: [kat] SHA2-384
3,678,426 UART: [kat] SHA2-512-ACC
3,680,327 UART: [kat] ECC-384
3,690,396 UART: [kat] HMAC-384Kdf
3,695,040 UART: [kat] LMS
3,943,352 UART: [kat] --
3,944,066 UART: [warm-reset] ++
3,944,334 UART: [warm-reset] Prev Cold-Reset failed
3,945,125 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,507 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,424 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,541 UART: [idev] ++
1,173,709 UART: [idev] CDI.KEYID = 6
1,174,070 UART: [idev] SUBJECT.KEYID = 7
1,174,495 UART: [idev] UDS.KEYID = 0
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,659 UART: [idev] Sha1 KeyId Algorithm
1,208,617 UART: [idev] --
1,209,866 UART: [ldev] ++
1,210,034 UART: [ldev] CDI.KEYID = 6
1,210,398 UART: [ldev] SUBJECT.KEYID = 5
1,210,825 UART: [ldev] AUTHORITY.KEYID = 7
1,211,288 UART: [ldev] FE.KEYID = 1
1,216,334 UART: [ldev] Erasing FE.KEYID = 1
1,242,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,594 UART: [ldev] --
1,281,964 UART: [fwproc] Wait for Commands...
1,282,723 UART: [fwproc] Recv command 0x46574c44
1,283,456 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,220 >>> mbox cmd response: success
2,776,255 UART: [afmc] ++
2,776,423 UART: [afmc] CDI.KEYID = 6
2,776,786 UART: [afmc] SUBJECT.KEYID = 7
2,777,212 UART: [afmc] AUTHORITY.KEYID = 5
2,812,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,782 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,501 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,855,437 UART:
2,855,453 UART: Running Caliptra ROM ...
2,855,861 UART:
2,855,916 UART: [state] CFI Enabled
2,858,234 UART: [state] LifecycleState = Unprovisioned
2,858,889 UART: [state] DebugLocked = No
2,859,623 UART: [state] WD Timer not started. Device not locked for debugging
2,860,730 UART: [kat] SHA2-256
3,664,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,409 UART: [kat] ++
3,668,561 UART: [kat] sha1
3,672,887 UART: [kat] SHA2-256
3,674,827 UART: [kat] SHA2-384
3,677,646 UART: [kat] SHA2-512-ACC
3,679,547 UART: [kat] ECC-384
3,689,390 UART: [kat] HMAC-384Kdf
3,694,018 UART: [kat] LMS
3,942,330 UART: [kat] --
3,943,232 UART: [warm-reset] ++
3,943,500 UART: [warm-reset] Prev Cold-Reset failed
3,944,701 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,694 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,200,194 UART: [idev] Sha1 KeyId Algorithm
1,209,058 UART: [idev] --
1,209,985 UART: [ldev] ++
1,210,153 UART: [ldev] CDI.KEYID = 6
1,210,517 UART: [ldev] SUBJECT.KEYID = 5
1,210,944 UART: [ldev] AUTHORITY.KEYID = 7
1,211,407 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,581 UART: [fwproc] Wait for Commands...
1,283,184 UART: [fwproc] Recv command 0x46574c44
1,283,917 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,983 >>> mbox cmd response: success
2,775,134 UART: [afmc] ++
2,775,302 UART: [afmc] CDI.KEYID = 6
2,775,665 UART: [afmc] SUBJECT.KEYID = 7
2,776,091 UART: [afmc] AUTHORITY.KEYID = 5
2,812,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,259 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,978 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,854,658 UART:
2,854,674 UART: Running Caliptra ROM ...
2,855,082 UART:
2,855,224 UART: [state] CFI Enabled
2,858,020 UART: [state] LifecycleState = Unprovisioned
2,858,675 UART: [state] DebugLocked = No
2,859,295 UART: [state] WD Timer not started. Device not locked for debugging
2,860,514 UART: [kat] SHA2-256
3,664,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,668,193 UART: [kat] ++
3,668,345 UART: [kat] sha1
3,672,673 UART: [kat] SHA2-256
3,674,613 UART: [kat] SHA2-384
3,677,428 UART: [kat] SHA2-512-ACC
3,679,329 UART: [kat] ECC-384
3,689,388 UART: [kat] HMAC-384Kdf
3,693,984 UART: [kat] LMS
3,942,296 UART: [kat] --
3,943,280 UART: [warm-reset] ++
3,943,548 UART: [warm-reset] Prev Cold-Reset failed
3,944,427 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,445 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,169 UART:
192,563 UART: Running Caliptra ROM ...
193,765 UART:
193,918 UART: [state] CFI Enabled
263,564 UART: [state] LifecycleState = Production
265,931 UART: [state] DebugLocked = No
267,635 UART: [state] WD Timer not started. Device not locked for debugging
272,663 UART: [kat] SHA2-256
454,593 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,133 UART: [kat] ++
466,665 UART: [kat] sha1
476,325 UART: [kat] SHA2-256
479,341 UART: [kat] SHA2-384
484,338 UART: [kat] SHA2-512-ACC
486,949 UART: [kat] ECC-384
3,776,350 UART: [kat] HMAC-384Kdf
3,793,999 UART: [kat] LMS
4,867,182 UART: [kat] --
4,871,936 UART: [cold-reset] ++
4,873,002 UART: [fht] FHT @ 0x50003400
4,884,288 UART: [idev] ++
4,884,972 UART: [idev] CDI.KEYID = 6
4,886,210 UART: [idev] SUBJECT.KEYID = 7
4,887,319 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,469 UART:
1,736 UART: Running Caliptra ROM ...
2,894 UART:
3,055 UART: [state] CFI Enabled
80,956 UART: [state] LifecycleState = Production
82,715 UART: [state] DebugLocked = No
84,198 UART: [state] WD Timer not started. Device not locked for debugging
88,590 UART: [kat] SHA2-256
270,544 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
282,057 UART: [kat] ++
282,557 UART: [kat] sha1
292,790 UART: [kat] SHA2-256
295,796 UART: [kat] SHA2-384
301,550 UART: [kat] SHA2-512-ACC
304,164 UART: [kat] ECC-384
3,591,750 UART: [kat] HMAC-384Kdf
3,617,909 UART: [kat] LMS
4,691,032 UART: [kat] --
4,695,602 UART: [warm-reset] ++
4,696,622 UART: [warm-reset] Prev Cold-Reset failed
4,700,946 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,522 UART:
192,935 UART: Running Caliptra ROM ...
194,169 UART:
603,564 UART: [state] CFI Enabled
616,688 UART: [state] LifecycleState = Production
618,842 UART: [state] DebugLocked = No
620,648 UART: [state] WD Timer not started. Device not locked for debugging
626,013 UART: [kat] SHA2-256
807,976 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,508 UART: [kat] ++
820,086 UART: [kat] sha1
830,751 UART: [kat] SHA2-256
833,799 UART: [kat] SHA2-384
839,500 UART: [kat] SHA2-512-ACC
842,108 UART: [kat] ECC-384
4,095,885 UART: [kat] HMAC-384Kdf
4,107,099 UART: [kat] LMS
5,180,251 UART: [kat] --
5,187,275 UART: [cold-reset] ++
5,188,914 UART: [fht] FHT @ 0x50003400
5,200,981 UART: [idev] ++
5,201,657 UART: [idev] CDI.KEYID = 6
5,202,813 UART: [idev] SUBJECT.KEYID = 7
5,204,347 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,422 UART:
1,596 UART: Running Caliptra ROM ...
2,670 UART:
15,264,892 UART: [state] CFI Enabled
15,277,129 UART: [state] LifecycleState = Production
15,278,900 UART: [state] DebugLocked = No
15,280,607 UART: [state] WD Timer not started. Device not locked for debugging
15,284,525 UART: [kat] SHA2-256
15,466,545 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
15,478,045 UART: [kat] ++
15,478,589 UART: [kat] sha1
15,489,047 UART: [kat] SHA2-256
15,492,119 UART: [kat] SHA2-384
15,498,629 UART: [kat] SHA2-512-ACC
15,501,209 UART: [kat] ECC-384
18,756,282 UART: [kat] HMAC-384Kdf
18,767,804 UART: [kat] LMS
19,840,940 UART: [kat] --
19,847,162 UART: [warm-reset] ++
19,848,180 UART: [warm-reset] Prev Cold-Reset failed
19,851,902 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,085 UART:
192,476 UART: Running Caliptra ROM ...
193,641 UART:
193,799 UART: [state] CFI Enabled
264,930 UART: [state] LifecycleState = Production
266,681 UART: [state] DebugLocked = No
268,880 UART: [state] WD Timer not started. Device not locked for debugging
272,611 UART: [kat] SHA2-256
451,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,294 UART: [kat] ++
463,828 UART: [kat] sha1
473,739 UART: [kat] SHA2-256
476,792 UART: [kat] SHA2-384
483,896 UART: [kat] SHA2-512-ACC
486,857 UART: [kat] ECC-384
2,950,553 UART: [kat] HMAC-384Kdf
2,971,542 UART: [kat] LMS
3,501,030 UART: [kat] --
3,503,667 UART: [cold-reset] ++
3,506,043 UART: [fht] FHT @ 0x50003400
3,515,893 UART: [idev] ++
3,516,455 UART: [idev] CDI.KEYID = 6
3,517,331 UART: [idev] SUBJECT.KEYID = 7
3,518,596 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,459 UART:
1,636 UART: Running Caliptra ROM ...
2,839 UART:
2,996 UART: [state] CFI Enabled
73,464 UART: [state] LifecycleState = Production
75,244 UART: [state] DebugLocked = No
77,352 UART: [state] WD Timer not started. Device not locked for debugging
80,223 UART: [kat] SHA2-256
259,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,913 UART: [kat] ++
271,355 UART: [kat] sha1
282,067 UART: [kat] SHA2-256
285,082 UART: [kat] SHA2-384
290,364 UART: [kat] SHA2-512-ACC
293,352 UART: [kat] ECC-384
2,756,111 UART: [kat] HMAC-384Kdf
2,779,356 UART: [kat] LMS
3,308,778 UART: [kat] --
3,312,793 UART: [warm-reset] ++
3,313,589 UART: [warm-reset] Prev Cold-Reset failed
3,316,881 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,018 UART:
192,456 UART: Running Caliptra ROM ...
193,633 UART:
193,784 UART: [state] CFI Enabled
264,971 UART: [state] LifecycleState = Production
266,710 UART: [state] DebugLocked = No
269,498 UART: [state] WD Timer not started. Device not locked for debugging
272,367 UART: [kat] SHA2-256
451,486 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,064 UART: [kat] ++
463,603 UART: [kat] sha1
474,052 UART: [kat] SHA2-256
477,120 UART: [kat] SHA2-384
484,442 UART: [kat] SHA2-512-ACC
487,370 UART: [kat] ECC-384
2,948,339 UART: [kat] HMAC-384Kdf
2,971,987 UART: [kat] LMS
3,501,436 UART: [kat] --
3,507,104 UART: [cold-reset] ++
3,507,894 UART: [fht] FHT @ 0x50003400
3,517,851 UART: [idev] ++
3,518,413 UART: [idev] CDI.KEYID = 6
3,519,321 UART: [idev] SUBJECT.KEYID = 7
3,520,535 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,332 UART:
1,600 UART: Running Caliptra ROM ...
2,780 UART:
2,935 UART: [state] CFI Enabled
70,087 UART: [state] LifecycleState = Production
71,857 UART: [state] DebugLocked = No
74,587 UART: [state] WD Timer not started. Device not locked for debugging
77,725 UART: [kat] SHA2-256
256,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
268,402 UART: [kat] ++
268,939 UART: [kat] sha1
280,632 UART: [kat] SHA2-256
283,644 UART: [kat] SHA2-384
289,729 UART: [kat] SHA2-512-ACC
292,715 UART: [kat] ECC-384
2,754,856 UART: [kat] HMAC-384Kdf
2,777,234 UART: [kat] LMS
3,306,695 UART: [kat] --
3,312,082 UART: [warm-reset] ++
3,312,934 UART: [warm-reset] Prev Cold-Reset failed
3,316,054 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,656 UART:
193,038 UART: Running Caliptra ROM ...
194,118 UART:
603,831 UART: [state] CFI Enabled
618,877 UART: [state] LifecycleState = Production
620,622 UART: [state] DebugLocked = No
622,746 UART: [state] WD Timer not started. Device not locked for debugging
626,631 UART: [kat] SHA2-256
805,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,357 UART: [kat] ++
817,797 UART: [kat] sha1
828,721 UART: [kat] SHA2-256
831,769 UART: [kat] SHA2-384
839,301 UART: [kat] SHA2-512-ACC
842,232 UART: [kat] ECC-384
3,284,331 UART: [kat] HMAC-384Kdf
3,296,937 UART: [kat] LMS
3,826,429 UART: [kat] --
3,831,337 UART: [cold-reset] ++
3,832,399 UART: [fht] FHT @ 0x50003400
3,842,188 UART: [idev] ++
3,842,761 UART: [idev] CDI.KEYID = 6
3,843,686 UART: [idev] SUBJECT.KEYID = 7
3,844,846 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,377 UART:
1,640 UART: Running Caliptra ROM ...
2,823 UART:
16,625,906 UART: [state] CFI Enabled
16,638,012 UART: [state] LifecycleState = Production
16,639,763 UART: [state] DebugLocked = No
16,641,950 UART: [state] WD Timer not started. Device not locked for debugging
16,645,150 UART: [kat] SHA2-256
16,824,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,835,863 UART: [kat] ++
16,836,395 UART: [kat] sha1
16,847,982 UART: [kat] SHA2-256
16,851,033 UART: [kat] SHA2-384
16,857,368 UART: [kat] SHA2-512-ACC
16,860,316 UART: [kat] ECC-384
19,302,077 UART: [kat] HMAC-384Kdf
19,314,840 UART: [kat] LMS
19,844,332 UART: [kat] --
19,847,072 UART: [warm-reset] ++
19,847,916 UART: [warm-reset] Prev Cold-Reset failed
19,851,196 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Production
85,779 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,825 UART:
1,175,841 UART: Running Caliptra ROM ...
1,176,249 UART:
1,176,304 UART: [state] CFI Enabled
1,178,886 UART: [state] LifecycleState = Production
1,179,493 UART: [state] DebugLocked = No
1,180,175 UART: [state] WD Timer not started. Device not locked for debugging
1,181,334 UART: [kat] SHA2-256
1,984,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,013 UART: [kat] ++
1,989,165 UART: [kat] sha1
1,993,403 UART: [kat] SHA2-256
1,995,343 UART: [kat] SHA2-384
1,998,078 UART: [kat] SHA2-512-ACC
1,999,979 UART: [kat] ECC-384
2,009,798 UART: [kat] HMAC-384Kdf
2,014,272 UART: [kat] LMS
2,262,584 UART: [kat] --
2,263,284 UART: [warm-reset] ++
2,263,552 UART: [warm-reset] Prev Cold-Reset failed
2,264,663 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Production
86,058 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,102 UART:
1,176,118 UART: Running Caliptra ROM ...
1,176,526 UART:
1,176,668 UART: [state] CFI Enabled
1,179,446 UART: [state] LifecycleState = Production
1,180,053 UART: [state] DebugLocked = No
1,180,789 UART: [state] WD Timer not started. Device not locked for debugging
1,181,988 UART: [kat] SHA2-256
1,985,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,667 UART: [kat] ++
1,989,819 UART: [kat] sha1
1,993,885 UART: [kat] SHA2-256
1,995,825 UART: [kat] SHA2-384
1,998,608 UART: [kat] SHA2-512-ACC
2,000,509 UART: [kat] ECC-384
2,010,508 UART: [kat] HMAC-384Kdf
2,015,122 UART: [kat] LMS
2,263,434 UART: [kat] --
2,264,166 UART: [warm-reset] ++
2,264,434 UART: [warm-reset] Prev Cold-Reset failed
2,265,627 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Production
85,883 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,895 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,355 UART:
1,176,371 UART: Running Caliptra ROM ...
1,176,779 UART:
1,176,834 UART: [state] CFI Enabled
1,179,644 UART: [state] LifecycleState = Production
1,180,251 UART: [state] DebugLocked = No
1,180,869 UART: [state] WD Timer not started. Device not locked for debugging
1,182,024 UART: [kat] SHA2-256
1,985,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,703 UART: [kat] ++
1,989,855 UART: [kat] sha1
1,994,031 UART: [kat] SHA2-256
1,995,971 UART: [kat] SHA2-384
1,998,842 UART: [kat] SHA2-512-ACC
2,000,743 UART: [kat] ECC-384
2,010,400 UART: [kat] HMAC-384Kdf
2,014,966 UART: [kat] LMS
2,263,278 UART: [kat] --
2,264,086 UART: [warm-reset] ++
2,264,354 UART: [warm-reset] Prev Cold-Reset failed
2,265,227 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Production
86,476 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
905,123 UART: [kat] SHA2-512-ACC
907,024 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,900 UART:
1,175,916 UART: Running Caliptra ROM ...
1,176,324 UART:
1,176,466 UART: [state] CFI Enabled
1,178,746 UART: [state] LifecycleState = Production
1,179,353 UART: [state] DebugLocked = No
1,179,979 UART: [state] WD Timer not started. Device not locked for debugging
1,181,280 UART: [kat] SHA2-256
1,984,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,959 UART: [kat] ++
1,989,111 UART: [kat] sha1
1,993,403 UART: [kat] SHA2-256
1,995,343 UART: [kat] SHA2-384
1,998,096 UART: [kat] SHA2-512-ACC
1,999,997 UART: [kat] ECC-384
2,009,704 UART: [kat] HMAC-384Kdf
2,014,438 UART: [kat] LMS
2,262,750 UART: [kat] --
2,263,746 UART: [warm-reset] ++
2,264,014 UART: [warm-reset] Prev Cold-Reset failed
2,264,871 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Production
85,239 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,052 UART: [kat] SHA2-256
890,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,731 UART: [kat] ++
894,883 UART: [kat] sha1
899,297 UART: [kat] SHA2-256
901,237 UART: [kat] SHA2-384
903,964 UART: [kat] SHA2-512-ACC
905,865 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,095 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,641 UART:
1,175,657 UART: Running Caliptra ROM ...
1,176,065 UART:
1,176,120 UART: [state] CFI Enabled
1,179,142 UART: [state] LifecycleState = Production
1,179,749 UART: [state] DebugLocked = No
1,180,437 UART: [state] WD Timer not started. Device not locked for debugging
1,181,780 UART: [kat] SHA2-256
1,985,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,459 UART: [kat] ++
1,989,611 UART: [kat] sha1
1,993,839 UART: [kat] SHA2-256
1,995,779 UART: [kat] SHA2-384
1,998,490 UART: [kat] SHA2-512-ACC
2,000,391 UART: [kat] ECC-384
2,009,904 UART: [kat] HMAC-384Kdf
2,014,338 UART: [kat] LMS
2,262,650 UART: [kat] --
2,263,388 UART: [warm-reset] ++
2,263,656 UART: [warm-reset] Prev Cold-Reset failed
2,264,673 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Production
85,836 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,414 UART:
1,175,430 UART: Running Caliptra ROM ...
1,175,838 UART:
1,175,980 UART: [state] CFI Enabled
1,177,894 UART: [state] LifecycleState = Production
1,178,501 UART: [state] DebugLocked = No
1,179,171 UART: [state] WD Timer not started. Device not locked for debugging
1,180,506 UART: [kat] SHA2-256
1,984,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,185 UART: [kat] ++
1,988,337 UART: [kat] sha1
1,992,359 UART: [kat] SHA2-256
1,994,299 UART: [kat] SHA2-384
1,997,110 UART: [kat] SHA2-512-ACC
1,999,011 UART: [kat] ECC-384
2,009,048 UART: [kat] HMAC-384Kdf
2,013,872 UART: [kat] LMS
2,262,184 UART: [kat] --
2,262,894 UART: [warm-reset] ++
2,263,162 UART: [warm-reset] Prev Cold-Reset failed
2,264,121 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
5,650 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,134 UART:
192,516 UART: Running Caliptra ROM ...
193,861 UART:
194,015 UART: [state] CFI Enabled
264,389 UART: [state] LifecycleState = Unprovisioned
266,762 UART: [state] DebugLocked = No
268,193 UART: [state] WD Timer not started. Device not locked for debugging
272,949 UART: [kat] SHA2-256
454,878 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,381 UART: [kat] ++
466,967 UART: [kat] sha1
479,129 UART: [kat] SHA2-256
482,136 UART: [kat] SHA2-384
487,184 UART: [kat] SHA2-512-ACC
489,797 UART: [kat] ECC-384
3,776,434 UART: [kat] HMAC-384Kdf
3,802,712 UART: [kat] LMS
4,875,899 UART: [kat] --
4,879,886 UART: [cold-reset] ++
4,881,170 UART: [fht] FHT @ 0x50003400
4,891,829 UART: [idev] ++
4,892,506 UART: [idev] CDI.KEYID = 6
4,893,665 UART: [idev] SUBJECT.KEYID = 7
4,894,876 UART: [idev] UDS.KEYID = 0
4,931,529 UART: [idev] Erasing UDS.KEYID = 0
8,244,130 UART: [idev] Sha1 KeyId Algorithm
8,267,036 UART: [idev] --
8,269,517 UART: [ldev] ++
8,270,088 UART: [ldev] CDI.KEYID = 6
8,271,325 UART: [ldev] SUBJECT.KEYID = 5
8,272,481 UART: [ldev] AUTHORITY.KEYID = 7
8,273,923 UART: [ldev] FE.KEYID = 1
8,319,179 UART: [ldev] Erasing FE.KEYID = 1
11,651,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,657 UART: [ldev] --
14,037,934 UART: [fwproc] Wait for Commands...
14,040,957 UART: [fwproc] Recv command 0x46574c44
14,043,233 UART: [fwproc] Recv'd Img size: 114036 bytes
Initializing fuses
1,129 UART:
1,319 UART: Running Caliptra ROM ...
2,416 UART:
2,573 UART: [state] CFI Enabled
72,191 UART: [state] LifecycleState = Unprovisioned
74,057 UART: [state] DebugLocked = No
75,872 UART: [state] WD Timer not started. Device not locked for debugging
81,079 UART: [kat] SHA2-256
262,983 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
274,520 UART: [kat] ++
275,045 UART: [kat] sha1
285,554 UART: [kat] SHA2-256
288,611 UART: [kat] SHA2-384
294,060 UART: [kat] SHA2-512-ACC
296,627 UART: [kat] ECC-384
3,582,987 UART: [kat] HMAC-384Kdf
3,609,267 UART: [kat] LMS
4,682,410 UART: [kat] --
4,686,291 UART: [warm-reset] ++
4,687,352 UART: [warm-reset] Prev Cold-Reset failed
4,690,973 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
6,131 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
6,517 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,374 UART:
192,767 UART: Running Caliptra ROM ...
193,902 UART:
603,640 UART: [state] CFI Enabled
617,596 UART: [state] LifecycleState = Unprovisioned
619,924 UART: [state] DebugLocked = No
622,134 UART: [state] WD Timer not started. Device not locked for debugging
626,348 UART: [kat] SHA2-256
808,301 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,856 UART: [kat] ++
820,366 UART: [kat] sha1
831,237 UART: [kat] SHA2-256
834,297 UART: [kat] SHA2-384
839,483 UART: [kat] SHA2-512-ACC
842,116 UART: [kat] ECC-384
4,096,204 UART: [kat] HMAC-384Kdf
4,107,065 UART: [kat] LMS
5,180,220 UART: [kat] --
5,184,675 UART: [cold-reset] ++
5,186,291 UART: [fht] FHT @ 0x50003400
5,197,597 UART: [idev] ++
5,198,261 UART: [idev] CDI.KEYID = 6
5,199,411 UART: [idev] SUBJECT.KEYID = 7
5,200,939 UART: [idev] UDS.KEYID = 0
5,218,395 UART: [idev] Erasing UDS.KEYID = 0
8,490,959 UART: [idev] Sha1 KeyId Algorithm
8,512,298 UART: [idev] --
8,517,638 UART: [ldev] ++
8,518,196 UART: [ldev] CDI.KEYID = 6
8,519,371 UART: [ldev] SUBJECT.KEYID = 5
8,520,908 UART: [ldev] AUTHORITY.KEYID = 7
8,522,428 UART: [ldev] FE.KEYID = 1
8,532,887 UART: [ldev] Erasing FE.KEYID = 1
11,820,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,032 UART: [ldev] --
14,186,789 UART: [fwproc] Wait for Commands...
14,189,421 UART: [fwproc] Recv command 0x46574c44
14,191,733 UART: [fwproc] Recv'd Img size: 114036 bytes
Initializing fuses
1,169 UART:
1,425 UART: Running Caliptra ROM ...
2,538 UART:
6,270,444 UART: [state] CFI Enabled
6,284,850 UART: [state] LifecycleState = Unprovisioned
6,286,736 UART: [state] DebugLocked = No
6,289,204 UART: [state] WD Timer not started. Device not locked for debugging
6,293,224 UART: [kat] SHA2-256
6,475,222 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,486,769 UART: [kat] ++
6,487,359 UART: [kat] sha1
6,497,488 UART: [kat] SHA2-256
6,500,554 UART: [kat] SHA2-384
6,506,532 UART: [kat] SHA2-512-ACC
6,509,143 UART: [kat] ECC-384
9,765,036 UART: [kat] HMAC-384Kdf
9,776,950 UART: [kat] LMS
10,850,084 UART: [kat] --
10,854,478 UART: [warm-reset] ++
10,855,497 UART: [warm-reset] Prev Cold-Reset failed
10,860,301 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
6,471 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
5,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,353 UART:
192,740 UART: Running Caliptra ROM ...
193,906 UART:
194,060 UART: [state] CFI Enabled
262,126 UART: [state] LifecycleState = Unprovisioned
264,005 UART: [state] DebugLocked = No
266,425 UART: [state] WD Timer not started. Device not locked for debugging
270,990 UART: [kat] SHA2-256
450,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,718 UART: [kat] ++
462,262 UART: [kat] sha1
472,766 UART: [kat] SHA2-256
475,775 UART: [kat] SHA2-384
480,939 UART: [kat] SHA2-512-ACC
483,874 UART: [kat] ECC-384
2,949,303 UART: [kat] HMAC-384Kdf
2,970,129 UART: [kat] LMS
3,499,582 UART: [kat] --
3,503,488 UART: [cold-reset] ++
3,505,695 UART: [fht] FHT @ 0x50003400
3,516,836 UART: [idev] ++
3,517,408 UART: [idev] CDI.KEYID = 6
3,518,424 UART: [idev] SUBJECT.KEYID = 7
3,519,550 UART: [idev] UDS.KEYID = 0
3,542,065 UART: [idev] Erasing UDS.KEYID = 0
6,025,320 UART: [idev] Sha1 KeyId Algorithm
6,048,604 UART: [idev] --
6,051,997 UART: [ldev] ++
6,052,566 UART: [ldev] CDI.KEYID = 6
6,053,453 UART: [ldev] SUBJECT.KEYID = 5
6,054,669 UART: [ldev] AUTHORITY.KEYID = 7
6,055,853 UART: [ldev] FE.KEYID = 1
6,098,570 UART: [ldev] Erasing FE.KEYID = 1
8,602,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,120 UART: [ldev] --
10,412,085 UART: [fwproc] Wait for Commands...
10,414,524 UART: [fwproc] Recv command 0x46574c44
10,416,631 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,154 UART:
1,337 UART: Running Caliptra ROM ...
2,384 UART:
2,528 UART: [state] CFI Enabled
74,221 UART: [state] LifecycleState = Unprovisioned
76,095 UART: [state] DebugLocked = No
78,515 UART: [state] WD Timer not started. Device not locked for debugging
81,827 UART: [kat] SHA2-256
260,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
272,495 UART: [kat] ++
273,027 UART: [kat] sha1
283,646 UART: [kat] SHA2-256
286,671 UART: [kat] SHA2-384
293,303 UART: [kat] SHA2-512-ACC
296,247 UART: [kat] ECC-384
2,758,698 UART: [kat] HMAC-384Kdf
2,778,813 UART: [kat] LMS
3,308,279 UART: [kat] --
3,313,963 UART: [warm-reset] ++
3,314,763 UART: [warm-reset] Prev Cold-Reset failed
3,319,484 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
5,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,217 UART:
192,604 UART: Running Caliptra ROM ...
193,775 UART:
193,926 UART: [state] CFI Enabled
267,887 UART: [state] LifecycleState = Unprovisioned
269,819 UART: [state] DebugLocked = No
271,370 UART: [state] WD Timer not started. Device not locked for debugging
275,438 UART: [kat] SHA2-256
454,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,107 UART: [kat] ++
466,647 UART: [kat] sha1
478,067 UART: [kat] SHA2-256
481,102 UART: [kat] SHA2-384
486,062 UART: [kat] SHA2-512-ACC
489,062 UART: [kat] ECC-384
2,948,393 UART: [kat] HMAC-384Kdf
2,972,400 UART: [kat] LMS
3,501,830 UART: [kat] --
3,506,973 UART: [cold-reset] ++
3,508,162 UART: [fht] FHT @ 0x50003400
3,518,548 UART: [idev] ++
3,519,112 UART: [idev] CDI.KEYID = 6
3,520,093 UART: [idev] SUBJECT.KEYID = 7
3,521,197 UART: [idev] UDS.KEYID = 0
3,544,456 UART: [idev] Erasing UDS.KEYID = 0
6,028,694 UART: [idev] Sha1 KeyId Algorithm
6,051,757 UART: [idev] --
6,055,860 UART: [ldev] ++
6,056,507 UART: [ldev] CDI.KEYID = 6
6,057,406 UART: [ldev] SUBJECT.KEYID = 5
6,058,508 UART: [ldev] AUTHORITY.KEYID = 7
6,059,826 UART: [ldev] FE.KEYID = 1
6,101,948 UART: [ldev] Erasing FE.KEYID = 1
8,608,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,894 UART: [ldev] --
10,416,240 UART: [fwproc] Wait for Commands...
10,418,123 UART: [fwproc] Recv command 0x46574c44
10,420,162 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,142 UART:
1,340 UART: Running Caliptra ROM ...
2,454 UART:
2,609 UART: [state] CFI Enabled
73,581 UART: [state] LifecycleState = Unprovisioned
75,511 UART: [state] DebugLocked = No
77,759 UART: [state] WD Timer not started. Device not locked for debugging
81,927 UART: [kat] SHA2-256
261,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
272,649 UART: [kat] ++
273,181 UART: [kat] sha1
284,494 UART: [kat] SHA2-256
287,507 UART: [kat] SHA2-384
293,865 UART: [kat] SHA2-512-ACC
296,795 UART: [kat] ECC-384
2,755,343 UART: [kat] HMAC-384Kdf
2,778,644 UART: [kat] LMS
3,308,103 UART: [kat] --
3,313,079 UART: [warm-reset] ++
3,313,877 UART: [warm-reset] Prev Cold-Reset failed
3,318,897 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,029 writing to cptra_bootfsm_go
6,759 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
6,551 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,465 UART:
192,872 UART: Running Caliptra ROM ...
194,165 UART:
603,588 UART: [state] CFI Enabled
617,234 UART: [state] LifecycleState = Unprovisioned
619,063 UART: [state] DebugLocked = No
621,009 UART: [state] WD Timer not started. Device not locked for debugging
624,092 UART: [kat] SHA2-256
803,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,804 UART: [kat] ++
815,249 UART: [kat] sha1
824,773 UART: [kat] SHA2-256
827,777 UART: [kat] SHA2-384
833,101 UART: [kat] SHA2-512-ACC
836,021 UART: [kat] ECC-384
3,278,328 UART: [kat] HMAC-384Kdf
3,290,721 UART: [kat] LMS
3,820,185 UART: [kat] --
3,822,019 UART: [cold-reset] ++
3,823,370 UART: [fht] FHT @ 0x50003400
3,833,048 UART: [idev] ++
3,833,605 UART: [idev] CDI.KEYID = 6
3,834,540 UART: [idev] SUBJECT.KEYID = 7
3,835,747 UART: [idev] UDS.KEYID = 0
3,853,635 UART: [idev] Erasing UDS.KEYID = 0
6,306,302 UART: [idev] Sha1 KeyId Algorithm
6,329,045 UART: [idev] --
6,332,767 UART: [ldev] ++
6,333,330 UART: [ldev] CDI.KEYID = 6
6,334,206 UART: [ldev] SUBJECT.KEYID = 5
6,335,415 UART: [ldev] AUTHORITY.KEYID = 7
6,336,698 UART: [ldev] FE.KEYID = 1
6,344,991 UART: [ldev] Erasing FE.KEYID = 1
8,818,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,534,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,550,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,565,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,581,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,600,571 UART: [ldev] --
10,605,030 UART: [fwproc] Wait for Commands...
10,607,607 UART: [fwproc] Recv command 0x46574c44
10,609,692 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,133 UART:
1,290 UART: Running Caliptra ROM ...
2,330 UART:
9,851,557 UART: [state] CFI Enabled
9,860,350 UART: [state] LifecycleState = Unprovisioned
9,862,207 UART: [state] DebugLocked = No
9,864,369 UART: [state] WD Timer not started. Device not locked for debugging
9,867,956 UART: [kat] SHA2-256
10,047,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,058,653 UART: [kat] ++
10,059,196 UART: [kat] sha1
10,070,359 UART: [kat] SHA2-256
10,073,364 UART: [kat] SHA2-384
10,080,376 UART: [kat] SHA2-512-ACC
10,083,313 UART: [kat] ECC-384
12,525,576 UART: [kat] HMAC-384Kdf
12,539,418 UART: [kat] LMS
13,068,938 UART: [kat] --
13,074,436 UART: [warm-reset] ++
13,075,290 UART: [warm-reset] Prev Cold-Reset failed
13,080,138 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,370 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,117 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,198,833 UART: [idev] Sha1 KeyId Algorithm
1,207,647 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,242,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,794 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,925 UART: [fwproc] Recv command 0x46574c44
1,282,658 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,293,391 UART:
1,293,407 UART: Running Caliptra ROM ...
1,293,815 UART:
1,293,870 UART: [state] CFI Enabled
1,296,478 UART: [state] LifecycleState = Unprovisioned
1,297,133 UART: [state] DebugLocked = No
1,297,785 UART: [state] WD Timer not started. Device not locked for debugging
1,298,920 UART: [kat] SHA2-256
2,102,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,599 UART: [kat] ++
2,106,751 UART: [kat] sha1
2,110,955 UART: [kat] SHA2-256
2,112,895 UART: [kat] SHA2-384
2,115,516 UART: [kat] SHA2-512-ACC
2,117,417 UART: [kat] ECC-384
2,127,100 UART: [kat] HMAC-384Kdf
2,131,654 UART: [kat] LMS
2,379,966 UART: [kat] --
2,381,046 UART: [warm-reset] ++
2,381,314 UART: [warm-reset] Prev Cold-Reset failed
2,382,055 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,743 UART: [kat] SHA2-512-ACC
906,644 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,036 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,873 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,383 UART: [ldev] --
1,280,757 UART: [fwproc] Wait for Commands...
1,281,522 UART: [fwproc] Recv command 0x46574c44
1,282,255 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,293,132 UART:
1,293,148 UART: Running Caliptra ROM ...
1,293,556 UART:
1,293,698 UART: [state] CFI Enabled
1,296,932 UART: [state] LifecycleState = Unprovisioned
1,297,587 UART: [state] DebugLocked = No
1,298,103 UART: [state] WD Timer not started. Device not locked for debugging
1,299,398 UART: [kat] SHA2-256
2,102,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,077 UART: [kat] ++
2,107,229 UART: [kat] sha1
2,111,423 UART: [kat] SHA2-256
2,113,363 UART: [kat] SHA2-384
2,115,942 UART: [kat] SHA2-512-ACC
2,117,843 UART: [kat] ECC-384
2,127,520 UART: [kat] HMAC-384Kdf
2,132,296 UART: [kat] LMS
2,380,608 UART: [kat] --
2,381,428 UART: [warm-reset] ++
2,381,696 UART: [warm-reset] Prev Cold-Reset failed
2,382,627 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
915,686 UART: [kat] HMAC-384Kdf
920,460 UART: [kat] LMS
1,168,772 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,206,893 UART: [idev] --
1,207,862 UART: [ldev] ++
1,208,030 UART: [ldev] CDI.KEYID = 6
1,208,394 UART: [ldev] SUBJECT.KEYID = 5
1,208,821 UART: [ldev] AUTHORITY.KEYID = 7
1,209,284 UART: [ldev] FE.KEYID = 1
1,214,472 UART: [ldev] Erasing FE.KEYID = 1
1,240,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,930 UART: [ldev] --
1,279,224 UART: [fwproc] Wait for Commands...
1,280,013 UART: [fwproc] Recv command 0x46574c44
1,280,746 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,291,537 UART:
1,291,553 UART: Running Caliptra ROM ...
1,291,961 UART:
1,292,016 UART: [state] CFI Enabled
1,295,060 UART: [state] LifecycleState = Unprovisioned
1,295,715 UART: [state] DebugLocked = No
1,296,241 UART: [state] WD Timer not started. Device not locked for debugging
1,297,462 UART: [kat] SHA2-256
2,101,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,141 UART: [kat] ++
2,105,293 UART: [kat] sha1
2,109,473 UART: [kat] SHA2-256
2,111,413 UART: [kat] SHA2-384
2,114,234 UART: [kat] SHA2-512-ACC
2,116,135 UART: [kat] ECC-384
2,126,088 UART: [kat] HMAC-384Kdf
2,130,660 UART: [kat] LMS
2,378,972 UART: [kat] --
2,379,784 UART: [warm-reset] ++
2,380,052 UART: [warm-reset] Prev Cold-Reset failed
2,381,053 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,763 UART: [kat] LMS
1,169,075 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,560 UART: [fwproc] Recv command 0x46574c44
1,283,293 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,294,030 UART:
1,294,046 UART: Running Caliptra ROM ...
1,294,454 UART:
1,294,596 UART: [state] CFI Enabled
1,297,672 UART: [state] LifecycleState = Unprovisioned
1,298,327 UART: [state] DebugLocked = No
1,298,961 UART: [state] WD Timer not started. Device not locked for debugging
1,300,188 UART: [kat] SHA2-256
2,103,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,867 UART: [kat] ++
2,108,019 UART: [kat] sha1
2,112,101 UART: [kat] SHA2-256
2,114,041 UART: [kat] SHA2-384
2,116,780 UART: [kat] SHA2-512-ACC
2,118,681 UART: [kat] ECC-384
2,128,306 UART: [kat] HMAC-384Kdf
2,132,878 UART: [kat] LMS
2,381,190 UART: [kat] --
2,382,118 UART: [warm-reset] ++
2,382,386 UART: [warm-reset] Prev Cold-Reset failed
2,383,381 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,202 UART: [kat] SHA2-256
890,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,881 UART: [kat] ++
895,033 UART: [kat] sha1
899,143 UART: [kat] SHA2-256
901,083 UART: [kat] SHA2-384
903,722 UART: [kat] SHA2-512-ACC
905,623 UART: [kat] ECC-384
915,368 UART: [kat] HMAC-384Kdf
919,974 UART: [kat] LMS
1,168,286 UART: [kat] --
1,169,199 UART: [cold-reset] ++
1,169,657 UART: [fht] FHT @ 0x50003400
1,172,355 UART: [idev] ++
1,172,523 UART: [idev] CDI.KEYID = 6
1,172,884 UART: [idev] SUBJECT.KEYID = 7
1,173,309 UART: [idev] UDS.KEYID = 0
1,181,263 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,072 UART: [ldev] --
1,280,350 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,292,745 UART:
1,292,761 UART: Running Caliptra ROM ...
1,293,169 UART:
1,293,224 UART: [state] CFI Enabled
1,295,994 UART: [state] LifecycleState = Unprovisioned
1,296,649 UART: [state] DebugLocked = No
1,297,199 UART: [state] WD Timer not started. Device not locked for debugging
1,298,514 UART: [kat] SHA2-256
2,102,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,193 UART: [kat] ++
2,106,345 UART: [kat] sha1
2,110,799 UART: [kat] SHA2-256
2,112,739 UART: [kat] SHA2-384
2,115,498 UART: [kat] SHA2-512-ACC
2,117,399 UART: [kat] ECC-384
2,127,066 UART: [kat] HMAC-384Kdf
2,131,676 UART: [kat] LMS
2,379,988 UART: [kat] --
2,380,840 UART: [warm-reset] ++
2,381,108 UART: [warm-reset] Prev Cold-Reset failed
2,382,189 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,718 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,181,884 UART: [idev] Erasing UDS.KEYID = 0
1,198,682 UART: [idev] Sha1 KeyId Algorithm
1,207,570 UART: [idev] --
1,208,621 UART: [ldev] ++
1,208,789 UART: [ldev] CDI.KEYID = 6
1,209,153 UART: [ldev] SUBJECT.KEYID = 5
1,209,580 UART: [ldev] AUTHORITY.KEYID = 7
1,210,043 UART: [ldev] FE.KEYID = 1
1,215,241 UART: [ldev] Erasing FE.KEYID = 1
1,241,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,888 UART: [fwproc] Recv command 0x46574c44
1,282,621 UART: [fwproc] Recv'd Img size: 114360 bytes
Initializing fuses
1,293,358 UART:
1,293,374 UART: Running Caliptra ROM ...
1,293,782 UART:
1,293,924 UART: [state] CFI Enabled
1,297,054 UART: [state] LifecycleState = Unprovisioned
1,297,709 UART: [state] DebugLocked = No
1,298,397 UART: [state] WD Timer not started. Device not locked for debugging
1,299,634 UART: [kat] SHA2-256
2,103,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,313 UART: [kat] ++
2,107,465 UART: [kat] sha1
2,111,753 UART: [kat] SHA2-256
2,113,693 UART: [kat] SHA2-384
2,116,522 UART: [kat] SHA2-512-ACC
2,118,423 UART: [kat] ECC-384
2,127,834 UART: [kat] HMAC-384Kdf
2,132,526 UART: [kat] LMS
2,380,838 UART: [kat] --
2,381,628 UART: [warm-reset] ++
2,381,896 UART: [warm-reset] Prev Cold-Reset failed
2,382,819 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
5,662 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,045 UART:
192,446 UART: Running Caliptra ROM ...
193,591 UART:
193,737 UART: [state] CFI Enabled
265,585 UART: [state] LifecycleState = Unprovisioned
267,941 UART: [state] DebugLocked = No
270,827 UART: [state] WD Timer not started. Device not locked for debugging
275,239 UART: [kat] SHA2-256
457,135 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,679 UART: [kat] ++
469,206 UART: [kat] sha1
479,496 UART: [kat] SHA2-256
482,509 UART: [kat] SHA2-384
488,644 UART: [kat] SHA2-512-ACC
491,272 UART: [kat] ECC-384
3,779,145 UART: [kat] HMAC-384Kdf
3,803,012 UART: [kat] LMS
4,876,154 UART: [kat] --
4,880,082 UART: [cold-reset] ++
4,882,073 UART: [fht] FHT @ 0x50003400
4,893,825 UART: [idev] ++
4,894,498 UART: [idev] CDI.KEYID = 6
4,895,730 UART: [idev] SUBJECT.KEYID = 7
4,896,757 UART: [idev] UDS.KEYID = 0
4,930,670 UART: [idev] Erasing UDS.KEYID = 0
8,242,045 UART: [idev] Sha1 KeyId Algorithm
8,264,797 UART: [idev] --
8,269,877 UART: [ldev] ++
8,270,448 UART: [ldev] CDI.KEYID = 6
8,272,371 UART: [ldev] SUBJECT.KEYID = 5
8,273,533 UART: [ldev] AUTHORITY.KEYID = 7
8,274,716 UART: [ldev] FE.KEYID = 1
8,319,176 UART: [ldev] Erasing FE.KEYID = 1
11,652,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,765 UART: [ldev] --
14,036,633 UART: [fwproc] Wait for Commands...
14,038,796 UART: [fwproc] Recv command 0x46574c44
14,041,117 UART: [fwproc] Recv'd Img size: 114036 bytes
18,120,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,197,163 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,265,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,582,999 >>> mbox cmd response: success
18,587,044 UART: [afmc] ++
18,587,641 UART: [afmc] CDI.KEYID = 6
18,588,823 UART: [afmc] SUBJECT.KEYID = 7
18,589,979 UART: [afmc] AUTHORITY.KEYID = 5
21,948,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,245,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,247,636 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,263,800 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,279,828 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,295,828 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,318,285 UART: [afmc] --
24,323,155 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,467,096 UART: [cold-reset] --
24,467,971 UART: [state] Locking Datavault
24,469,072 UART: [state] Locking PCR0, PCR1 and PCR31
24,470,627 UART: [state] Locking ICCM
24,471,556 UART: [exit] Launching FMC @ 0x40000130
24,472,987 UART:
24,473,150 UART: Running Caliptra FMC ...
24,474,254 UART:
24,474,411 UART: [state] CFI Enabled
24,475,247 UART: [fht] FMC Alias Private Key: 7
26,742,397 UART: [art] Extend RT PCRs Done
26,743,629 UART: [art] Lock RT PCRs Done
26,745,551 UART: [art] Populate DV Done
26,750,856 UART: [fht] FMC Alias Private Key: 7
26,752,433 UART: [art] Derive CDI
26,753,173 UART: [art] Store in in slot 0x4
26,813,048 UART: [art] Derive Key Pair
26,814,053 UART: [art] Store priv key in slot 0x5
30,106,495 UART: [art] Derive Key Pair - Done
30,119,271 UART: [art] Signing Cert with AUTHO
30,120,628 UART: RITY.KEYID = 7
32,407,428 UART: [art] Erasing AUTHORITY.KEYID = 7
32,408,932 UART: [art] PUB.X = 18D119157B0AB92DBC926E4EFB6CE1B02C2F7E451E49BE2655B4351732EF790992DA2B9B84CAA9EB74879D2B4D822B53
32,416,176 UART: [art] PUB.Y = 1B2D7A174F3281BF90B91F8DF5C59A7FD877EDEAEBA57EA44CD7AAD4EB0D680E499715072F64CA671E712A94B6829F70
32,423,465 UART: [art] SIG.R = 31A82DE75C20D9CCF6AA994D603DCC2B3A166FE314F0428FA176B8B26B163FAE0CE60D3A78D6840B4DDC266A4EA75980
32,430,849 UART: [art] SIG.S = 2DA4BA60E05772E6A2B02E4E3F4A647700F22BFD402862BC17100614FA164127B14E1D576F0CA7D3383E9A103AB05782
33,736,097 UART: Caliptra RT
33,736,807 UART: [state] CFI Enabled
33,896,987 UART: [rt] RT listening for mailbox commands...
33,899,622 UART:
33,899,820 UART: Running Caliptra ROM ...
33,900,927 UART:
33,901,086 UART: [state] CFI Enabled
33,963,416 UART: [state] LifecycleState = Unprovisioned
33,965,289 UART: [state] DebugLocked = No
33,967,972 UART: [state] WD Timer not started. Device not locked for debugging
33,972,667 UART: [kat] SHA2-256
34,154,604 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,166,104 UART: [kat] ++
34,166,690 UART: [kat] sha1
34,177,638 UART: [kat] SHA2-256
34,180,643 UART: [kat] SHA2-384
34,186,193 UART: [kat] SHA2-512-ACC
34,188,811 UART: [kat] ECC-384
37,475,397 UART: [kat] HMAC-384Kdf
37,500,811 UART: [kat] LMS
38,573,973 UART: [kat] --
38,580,229 UART: [update-reset] ++
42,677,963 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,681,551 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
43,063,419 >>> mbox cmd response: success
Initializing fuses
831 UART: [
1,386 UART: Running Caliptra ROM ...
2,485 UART:
2,634 UART: [state] CFI Enabled
65,659 UART: [state] LifecycleState = Unprovisioned
67,528 UART: [state] DebugLocked = No
69,392 UART: [state] WD Timer not started. Device not locked for debugging
73,200 UART: [kat] SHA2-256
255,156 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
266,659 UART: [kat] ++
267,242 UART: [kat] sha1
276,718 UART: [kat] SHA2-256
279,771 UART: [kat] SHA2-384
285,963 UART: [kat] SHA2-512-ACC
288,624 UART: [kat] ECC-384
3,580,828 UART: [kat] HMAC-384Kdf
3,606,370 UART: [kat] LMS
4,679,494 UART: [kat] --
4,683,190 UART: [warm-reset] ++
4,686,489 UART: [warm-reset] Prev Update Reset failed
4,691,532 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,786 writing to cptra_bootfsm_go
7,473 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,350,877 >>> mbox cmd response: success
24,025,527 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,169,177 UART:
24,169,577 UART: Running Caliptra FMC ...
24,170,691 UART:
24,170,844 UART: [state] CFI Enabled
24,171,802 UART: [fht] FMC Alias Private Key: 7
26,444,719 UART: [art] Extend RT PCRs Done
26,445,944 UART: [art] Lock RT PCRs Done
26,447,445 UART: [art] Populate DV Done
26,453,020 UART: [fht] FMC Alias Private Key: 7
26,454,777 UART: [art] Derive CDI
26,455,512 UART: [art] Store in in slot 0x4
26,514,581 UART: [art] Derive Key Pair
26,515,627 UART: [art] Store priv key in slot 0x5
29,808,680 UART: [art] Derive Key Pair - Done
29,821,517 UART: [art] Signing Cert with AUTHO
29,822,823 UART: RITY.KEYID = 7
32,110,276 UART: [art] Erasing AUTHORITY.KEYID = 7
32,111,797 UART: [art] PUB.X = 64CE53E72830D2991D1B0F2B0AF4E6480F3266CFB6DA66EA12F47F9F00BC7E54A8A7CD0D98756C40EA8ACD57CCFF3A9A
32,119,091 UART: [art] PUB.Y = DE678EBEAF8BD3DA2946FB1DB7CFCCB1987AC66ABB45D0B2496FDF4EDA62B9C953D444A51FF46483FF6059559013BD19
32,126,350 UART: [art] SIG.R = FD41C5572360E6C86EBF4A83111D7F46198D0A1108BC0F9173922BBDF20A90CB304985B58C78C7797DB60C9545B991C3
32,133,736 UART: [art] SIG.S = 73F37B5E49B035404A58E0F92EA951CFD426F2FC2DF339DA8511F286E37E10F4B6C6965C5F059A2082971020CD5104A8
33,438,830 UART: Caliptra RT
33,439,543 UART: [state] CFI Enabled
33,601,066 UART: [rt] RT listening for mailbox commands...
42,654,787 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
6,428 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
192,433 UART:
192,820 UART: Running Caliptra ROM ...
194,011 UART:
603,703 UART: [state] CFI Enabled
616,176 UART: [state] LifecycleState = Unprovisioned
618,580 UART: [state] DebugLocked = No
621,252 UART: [state] WD Timer not started. Device not locked for debugging
625,687 UART: [kat] SHA2-256
807,692 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,203 UART: [kat] ++
819,701 UART: [kat] sha1
831,118 UART: [kat] SHA2-256
834,127 UART: [kat] SHA2-384
839,130 UART: [kat] SHA2-512-ACC
841,735 UART: [kat] ECC-384
4,097,074 UART: [kat] HMAC-384Kdf
4,109,111 UART: [kat] LMS
5,182,234 UART: [kat] --
5,188,358 UART: [cold-reset] ++
5,190,455 UART: [fht] FHT @ 0x50003400
5,201,598 UART: [idev] ++
5,202,269 UART: [idev] CDI.KEYID = 6
5,203,425 UART: [idev] SUBJECT.KEYID = 7
5,204,902 UART: [idev] UDS.KEYID = 0
5,224,146 UART: [idev] Erasing UDS.KEYID = 0
8,497,819 UART: [idev] Sha1 KeyId Algorithm
8,521,006 UART: [idev] --
8,524,415 UART: [ldev] ++
8,524,979 UART: [ldev] CDI.KEYID = 6
8,526,211 UART: [ldev] SUBJECT.KEYID = 5
8,527,639 UART: [ldev] AUTHORITY.KEYID = 7
8,529,312 UART: [ldev] FE.KEYID = 1
8,539,975 UART: [ldev] Erasing FE.KEYID = 1
11,829,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,481 UART: [ldev] --
14,196,307 UART: [fwproc] Wait for Commands...
14,199,204 UART: [fwproc] Recv command 0x46574c44
14,201,512 UART: [fwproc] Recv'd Img size: 114036 bytes
18,276,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,354,552 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,423,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,740,091 >>> mbox cmd response: success
18,745,093 UART: [afmc] ++
18,745,697 UART: [afmc] CDI.KEYID = 6
18,746,885 UART: [afmc] SUBJECT.KEYID = 7
18,748,046 UART: [afmc] AUTHORITY.KEYID = 5
22,065,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,361,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,363,646 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,379,816 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,395,875 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,411,828 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,435,804 UART: [afmc] --
24,441,066 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,584,408 UART: [cold-reset] --
24,585,263 UART: [state] Locking Datavault
24,586,415 UART: [state] Locking PCR0, PCR1 and PCR31
24,587,950 UART: [state] Locking ICCM
24,588,853 UART: [exit] Launching FMC @ 0x40000130
24,590,295 UART:
24,590,452 UART: Running Caliptra FMC ...
24,591,543 UART:
24,591,691 UART: [state] CFI Enabled
24,592,605 UART: [fht] FMC Alias Private Key: 7
26,803,374 UART: [art] Extend RT PCRs Done
26,804,601 UART: [art] Lock RT PCRs Done
26,806,259 UART: [art] Populate DV Done
26,811,719 UART: [fht] FMC Alias Private Key: 7
26,813,259 UART: [art] Derive CDI
26,813,987 UART: [art] Store in in slot 0x4
26,857,116 UART: [art] Derive Key Pair
26,858,155 UART: [art] Store priv key in slot 0x5
30,100,546 UART: [art] Derive Key Pair - Done
30,113,549 UART: [art] Signing Cert with AUTHO
30,114,859 UART: RITY.KEYID = 7
32,394,623 UART: [art] Erasing AUTHORITY.KEYID = 7
32,396,131 UART: [art] PUB.X = 833C5E7693D9F98952E0DB565D77CC19F5498E8A93C7DE8E58885B7C88EFFCC014581E8560DFB215A091E566CC89030D
32,403,370 UART: [art] PUB.Y = E899BF20F831DAD4D037AFBB240A8941FFC481BB0549205087AF74A2E41DE33EE6B36FB66E0B5844D9079237C006DBB7
32,410,642 UART: [art] SIG.R = 765CB14BB31CDF32C8E1991D1923AB3D4CB525A24883E42186BDA12C63D408895B75B17AE172B15EC3DF24B0968A6E99
32,418,029 UART: [art] SIG.S = 0CD30E868115172ADB7061770D6582272729F3FFCCCA0D33954A5B785EBC57F4BD0A21EB468BFDE44D6C9FD18E338F97
33,723,405 UART: Caliptra RT
33,724,121 UART: [state] CFI Enabled
33,841,811 UART: [rt] RT listening for mailbox commands...
33,844,502 UART:
33,844,753 UART: Running Caliptra ROM ...
33,845,854 UART:
33,846,114 UART: [state] CFI Enabled
33,860,688 UART: [state] LifecycleState = Unprovisioned
33,862,516 UART: [state] DebugLocked = No
33,864,643 UART: [state] WD Timer not started. Device not locked for debugging
33,868,857 UART: [kat] SHA2-256
34,050,753 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,062,303 UART: [kat] ++
34,062,814 UART: [kat] sha1
34,072,564 UART: [kat] SHA2-256
34,075,576 UART: [kat] SHA2-384
34,082,262 UART: [kat] SHA2-512-ACC
34,084,824 UART: [kat] ECC-384
37,340,912 UART: [kat] HMAC-384Kdf
37,351,473 UART: [kat] LMS
38,424,623 UART: [kat] --
38,428,185 UART: [update-reset] ++
42,524,429 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,528,398 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89332
42,910,222 >>> mbox cmd response: success
Initializing fuses
720 UART: [
1,200 UART: Running Caliptra ROM ...
2,311 UART:
412,128 UART: [state] CFI Enabled
427,759 UART: [state] LifecycleState = Unprovisioned
429,683 UART: [state] DebugLocked = No
431,950 UART: [state] WD Timer not started. Device not locked for debugging
437,416 UART: [kat] SHA2-256
619,401 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
630,940 UART: [kat] ++
631,437 UART: [kat] sha1
642,091 UART: [kat] SHA2-256
645,109 UART: [kat] SHA2-384
650,164 UART: [kat] SHA2-512-ACC
652,774 UART: [kat] ECC-384
3,908,381 UART: [kat] HMAC-384Kdf
3,919,820 UART: [kat] LMS
4,992,988 UART: [kat] --
4,997,212 UART: [warm-reset] ++
5,000,826 UART: [warm-reset] Prev Update Reset failed
5,004,253 UART: ROM Fatal Error: 0x01040011test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
6,169 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,537,811 >>> mbox cmd response: success
24,161,743 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,305,063 UART:
24,305,459 UART: Running Caliptra FMC ...
24,306,672 UART:
24,306,837 UART: [state] CFI Enabled
24,307,816 UART: [fht] FMC Alias Private Key: 7
26,514,523 UART: [art] Extend RT PCRs Done
26,515,752 UART: [art] Lock RT PCRs Done
26,517,377 UART: [art] Populate DV Done
26,522,842 UART: [fht] FMC Alias Private Key: 7
26,524,539 UART: [art] Derive CDI
26,525,343 UART: [art] Store in in slot 0x4
26,568,263 UART: [art] Derive Key Pair
26,569,301 UART: [art] Store priv key in slot 0x5
29,810,586 UART: [art] Derive Key Pair - Done
29,823,475 UART: [art] Signing Cert with AUTHO
29,824,781 UART: RITY.KEYID = 7
32,104,276 UART: [art] Erasing AUTHORITY.KEYID = 7
32,105,779 UART: [art] PUB.X = D5D2159B0F8A072414EECA1B12E5817185F8F702F0FA59C2A216DB5914E0EA266432A11F5B0FD8A6F310D1E22155F972
32,113,045 UART: [art] PUB.Y = 347E720C122539E094E2A451D7449B4C91417FB62EB41D4CF20F93514787D34D0BE1AB8BA84A7567D83AA583EAEF07ED
32,120,269 UART: [art] SIG.R = 239ED94C7F99149E5B3CE82111CBA450FFB96BDDCCD62D77AB126C0F1B8DD147B21E440737C1422E84A415E21CC675BF
32,127,711 UART: [art] SIG.S = A9F6DD6AF3772AFD8E24EC2ABAA71DA5F17180A0B64C22134D861BB5288931A71570494FC5930FFF4C097CCEAC5D2486
33,432,622 UART: Caliptra RT
33,433,317 UART: [state] CFI Enabled
33,550,446 UART: [rt] RT listening for mailbox commands...
42,512,693 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
5,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,203 UART:
192,611 UART: Running Caliptra ROM ...
193,779 UART:
193,935 UART: [state] CFI Enabled
264,199 UART: [state] LifecycleState = Unprovisioned
266,066 UART: [state] DebugLocked = No
268,632 UART: [state] WD Timer not started. Device not locked for debugging
272,064 UART: [kat] SHA2-256
451,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,772 UART: [kat] ++
463,305 UART: [kat] sha1
474,564 UART: [kat] SHA2-256
477,561 UART: [kat] SHA2-384
483,553 UART: [kat] SHA2-512-ACC
486,492 UART: [kat] ECC-384
2,946,946 UART: [kat] HMAC-384Kdf
2,972,256 UART: [kat] LMS
3,501,721 UART: [kat] --
3,505,711 UART: [cold-reset] ++
3,507,962 UART: [fht] FHT @ 0x50003400
3,517,802 UART: [idev] ++
3,518,367 UART: [idev] CDI.KEYID = 6
3,519,277 UART: [idev] SUBJECT.KEYID = 7
3,520,488 UART: [idev] UDS.KEYID = 0
3,543,051 UART: [idev] Erasing UDS.KEYID = 0
6,025,909 UART: [idev] Sha1 KeyId Algorithm
6,049,306 UART: [idev] --
6,054,526 UART: [ldev] ++
6,055,113 UART: [ldev] CDI.KEYID = 6
6,056,043 UART: [ldev] SUBJECT.KEYID = 5
6,057,158 UART: [ldev] AUTHORITY.KEYID = 7
6,058,448 UART: [ldev] FE.KEYID = 1
6,099,177 UART: [ldev] Erasing FE.KEYID = 1
8,603,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,900 UART: [ldev] --
10,411,889 UART: [fwproc] Wait for Commands...
10,414,470 UART: [fwproc] Recv command 0x46574c44
10,416,567 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,277,408 >>> mbox cmd response: success
14,281,639 UART: [afmc] ++
14,282,231 UART: [afmc] CDI.KEYID = 6
14,283,137 UART: [afmc] SUBJECT.KEYID = 7
14,284,352 UART: [afmc] AUTHORITY.KEYID = 5
16,830,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,570,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,572,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,587,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,603,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,619,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,643,500 UART: [afmc] --
18,648,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
18,792,807 UART: [cold-reset] --
18,793,667 UART: [state] Locking Datavault
18,794,821 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,376 UART: [state] Locking ICCM
18,797,335 UART: [exit] Launching FMC @ 0x40000130
18,798,758 UART:
18,798,920 UART: Running Caliptra FMC ...
18,800,017 UART:
18,800,174 UART: [state] CFI Enabled
18,801,015 UART: [fht] FMC Alias Private Key: 7
20,494,883 UART: [art] Extend RT PCRs Done
20,496,101 UART: [art] Lock RT PCRs Done
20,497,942 UART: [art] Populate DV Done
20,503,026 UART: [fht] FMC Alias Private Key: 7
20,504,617 UART: [art] Derive CDI
20,505,432 UART: [art] Store in in slot 0x4
20,563,537 UART: [art] Derive Key Pair
20,564,578 UART: [art] Store priv key in slot 0x5
23,026,995 UART: [art] Derive Key Pair - Done
23,040,172 UART: [art] Signing Cert with AUTHO
23,041,473 UART: RITY.KEYID = 7
24,753,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,961 UART: [art] PUB.X = EC508BC833334230445C3B9CD8D185E441303B3BC600F8748AF44B217932F338E10A3BBBCE7AFE1C3DEE3B7391FA84D8
24,762,204 UART: [art] PUB.Y = 27890BB10CABED39AEB84E3476F1960032C52704A90FCC9AE0D2A248F6FDEFC7AE4E29BABCBEEE78A86599837618C4C2
24,769,434 UART: [art] SIG.R = 0C1F1502AF801EAA692681BC0285FEB61C32B079E45423B2F4D37CD4AC79C39BFBDFF57E58EA3BFBC393ADF84B88FF33
24,776,877 UART: [art] SIG.S = 44E3366A1461CBC0DFBB642E984AD826E62CFD11A8B5734DE3B99265D40BDF56B7450978E44EBA0A88DCC0BD403A2AE8
25,755,907 UART: Caliptra RT
25,756,609 UART: [state] CFI Enabled
25,922,128 UART: [rt] RT listening for mailbox commands...
25,924,866 UART:
25,925,033 UART: Running Caliptra ROM ...
25,926,148 UART:
25,926,303 UART: [state] CFI Enabled
25,988,542 UART: [state] LifecycleState = Unprovisioned
25,990,410 UART: [state] DebugLocked = No
25,992,328 UART: [state] WD Timer not started. Device not locked for debugging
25,996,340 UART: [kat] SHA2-256
26,175,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,187,000 UART: [kat] ++
26,187,459 UART: [kat] sha1
26,198,067 UART: [kat] SHA2-256
26,201,122 UART: [kat] SHA2-384
26,207,326 UART: [kat] SHA2-512-ACC
26,210,267 UART: [kat] ECC-384
28,674,728 UART: [kat] HMAC-384Kdf
28,696,127 UART: [kat] LMS
29,225,597 UART: [kat] --
29,230,028 UART: [update-reset] ++
32,656,058 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,658,792 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
33,041,809 >>> mbox cmd response: success
Initializing fuses
726 UART: [u
1,172 UART: Running Caliptra ROM ...
2,216 UART:
2,359 UART: [state] CFI Enabled
72,087 UART: [state] LifecycleState = Unprovisioned
73,968 UART: [state] DebugLocked = No
75,466 UART: [state] WD Timer not started. Device not locked for debugging
79,039 UART: [kat] SHA2-256
258,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
269,717 UART: [kat] ++
270,246 UART: [kat] sha1
281,075 UART: [kat] SHA2-256
284,073 UART: [kat] SHA2-384
290,868 UART: [kat] SHA2-512-ACC
293,802 UART: [kat] ECC-384
2,755,483 UART: [kat] HMAC-384Kdf
2,779,587 UART: [kat] LMS
3,309,045 UART: [kat] --
3,313,360 UART: [warm-reset] ++
3,315,555 UART: [warm-reset] Prev Update Reset failed
3,318,862 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
5,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,206 UART:
192,591 UART: Running Caliptra ROM ...
193,702 UART:
193,851 UART: [state] CFI Enabled
266,699 UART: [state] LifecycleState = Unprovisioned
268,620 UART: [state] DebugLocked = No
270,607 UART: [state] WD Timer not started. Device not locked for debugging
273,855 UART: [kat] SHA2-256
452,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,546 UART: [kat] ++
465,080 UART: [kat] sha1
477,483 UART: [kat] SHA2-256
480,485 UART: [kat] SHA2-384
486,213 UART: [kat] SHA2-512-ACC
489,160 UART: [kat] ECC-384
2,949,595 UART: [kat] HMAC-384Kdf
2,972,475 UART: [kat] LMS
3,501,904 UART: [kat] --
3,506,009 UART: [cold-reset] ++
3,507,090 UART: [fht] FHT @ 0x50003400
3,518,752 UART: [idev] ++
3,519,314 UART: [idev] CDI.KEYID = 6
3,520,194 UART: [idev] SUBJECT.KEYID = 7
3,521,409 UART: [idev] UDS.KEYID = 0
3,544,146 UART: [idev] Erasing UDS.KEYID = 0
6,024,356 UART: [idev] Sha1 KeyId Algorithm
6,047,753 UART: [idev] --
6,050,184 UART: [ldev] ++
6,050,761 UART: [ldev] CDI.KEYID = 6
6,051,662 UART: [ldev] SUBJECT.KEYID = 5
6,052,788 UART: [ldev] AUTHORITY.KEYID = 7
6,054,083 UART: [ldev] FE.KEYID = 1
6,100,734 UART: [ldev] Erasing FE.KEYID = 1
8,601,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,505 UART: [ldev] --
10,392,609 UART: [fwproc] Wait for Commands...
10,395,195 UART: [fwproc] Recv command 0x46574c44
10,397,239 UART: [fwproc] Recv'd Img size: 114360 bytes
13,802,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,262,528 >>> mbox cmd response: success
14,267,693 UART: [afmc] ++
14,268,276 UART: [afmc] CDI.KEYID = 6
14,269,158 UART: [afmc] SUBJECT.KEYID = 7
14,270,372 UART: [afmc] AUTHORITY.KEYID = 5
16,808,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,811 UART: [afmc] --
18,611,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
18,755,121 UART: [cold-reset] --
18,755,980 UART: [state] Locking Datavault
18,757,134 UART: [state] Locking PCR0, PCR1 and PCR31
18,758,686 UART: [state] Locking ICCM
18,759,594 UART: [exit] Launching FMC @ 0x40000130
18,761,028 UART:
18,761,189 UART: Running Caliptra FMC ...
18,762,286 UART:
18,762,440 UART: [state] CFI Enabled
18,763,277 UART: [fht] FMC Alias Private Key: 7
20,456,378 UART: [art] Extend RT PCRs Done
20,457,610 UART: [art] Lock RT PCRs Done
20,459,045 UART: [art] Populate DV Done
20,464,639 UART: [fht] FMC Alias Private Key: 7
20,466,174 UART: [art] Derive CDI
20,466,936 UART: [art] Store in in slot 0x4
20,524,229 UART: [art] Derive Key Pair
20,525,269 UART: [art] Store priv key in slot 0x5
22,988,549 UART: [art] Derive Key Pair - Done
23,001,565 UART: [art] Signing Cert with AUTHO
23,002,872 UART: RITY.KEYID = 7
24,714,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,989 UART: [art] PUB.X = B20CB25E5D5B86F28EBBAEBF3A6E77E589ABE5CF518811CD892CD941A840C4D9EEA4D6B71CEA31A88075589F82017EEC
24,723,289 UART: [art] PUB.Y = 510FF8A6DBE03396A358B93905C4C6B605CEE5A5A5AC03C30F228572AA41B2260AB39F66CA3AC4EE15AF009C5348B98C
24,730,521 UART: [art] SIG.R = F846F53E168563BD4900E8645027E0D3FB04B4E295E1456360E18C5B7CCE2B60E7C06CFF1388BC2E8DCC357F504B0864
24,737,936 UART: [art] SIG.S = B2728FB89650A46966F72217873B9BD7775203A9D0AE1E1D68F1F8486F553FE8E87C79302CC922EE8D4359967640A1B1
25,717,236 UART: Caliptra RT
25,717,953 UART: [state] CFI Enabled
25,882,988 UART: [rt] RT listening for mailbox commands...
25,885,516 UART:
25,885,707 UART: Running Caliptra ROM ...
25,886,813 UART:
25,886,971 UART: [state] CFI Enabled
25,950,106 UART: [state] LifecycleState = Unprovisioned
25,951,978 UART: [state] DebugLocked = No
25,953,869 UART: [state] WD Timer not started. Device not locked for debugging
25,957,614 UART: [kat] SHA2-256
26,136,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,148,306 UART: [kat] ++
26,148,846 UART: [kat] sha1
26,159,033 UART: [kat] SHA2-256
26,162,050 UART: [kat] SHA2-384
26,169,606 UART: [kat] SHA2-512-ACC
26,172,547 UART: [kat] ECC-384
28,631,531 UART: [kat] HMAC-384Kdf
28,658,169 UART: [kat] LMS
29,187,631 UART: [kat] --
29,192,052 UART: [update-reset] ++
32,615,733 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,619,819 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
33,002,782 >>> mbox cmd response: success
Initializing fuses
742 UART: [
1,208 UART: Running Caliptra ROM ...
2,225 UART:
2,368 UART: [state] CFI Enabled
72,041 UART: [state] LifecycleState = Unprovisioned
73,914 UART: [state] DebugLocked = No
75,135 UART: [state] WD Timer not started. Device not locked for debugging
78,547 UART: [kat] SHA2-256
257,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
269,266 UART: [kat] ++
269,711 UART: [kat] sha1
280,096 UART: [kat] SHA2-256
283,165 UART: [kat] SHA2-384
288,708 UART: [kat] SHA2-512-ACC
291,642 UART: [kat] ECC-384
2,754,908 UART: [kat] HMAC-384Kdf
2,778,260 UART: [kat] LMS
3,307,732 UART: [kat] --
3,311,364 UART: [warm-reset] ++
3,313,355 UART: [warm-reset] Prev Update Reset failed
3,317,910 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
5,474 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,047,211 >>> mbox cmd response: success
18,329,210 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
18,473,712 UART:
18,474,131 UART: Running Caliptra FMC ...
18,475,227 UART:
18,475,381 UART: [state] CFI Enabled
18,476,375 UART: [fht] FMC Alias Private Key: 7
20,176,620 UART: [art] Extend RT PCRs Done
20,177,847 UART: [art] Lock RT PCRs Done
20,179,774 UART: [art] Populate DV Done
20,185,246 UART: [fht] FMC Alias Private Key: 7
20,186,732 UART: [art] Derive CDI
20,187,512 UART: [art] Store in in slot 0x4
20,245,710 UART: [art] Derive Key Pair
20,246,731 UART: [art] Store priv key in slot 0x5
22,709,325 UART: [art] Derive Key Pair - Done
22,722,121 UART: [art] Signing Cert with AUTHO
22,723,423 UART: RITY.KEYID = 7
24,434,500 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,007 UART: [art] PUB.X = 7DF8B33E0ED7D1F7E30B6FE63715246D81B3E897D7BBFFFE680D570C046F6765030F22E48E5A349114439892B3E53AE5
24,443,313 UART: [art] PUB.Y = 396F3833C24431A3E02769805A505D1E72331BE6266AAA8C37FD4DB20363E63890035F3C4091463116FD663D423613AE
24,450,526 UART: [art] SIG.R = 77252362F10038C77F747085D4E688F439A6BC434EB67D7761B77FC1C8F65A74227B6BAB60EA939D87F7FBA109291F6D
24,457,920 UART: [art] SIG.S = 5074736462BE5E9B128F5B41137EF6610EFE6619CFCAFE303847915774798D193155C17376D2358773127880CF962762
25,437,009 UART: Caliptra RT
25,437,734 UART: [state] CFI Enabled
25,603,262 UART: [rt] RT listening for mailbox commands...
32,574,020 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
6,467 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
192,469 UART:
192,868 UART: Running Caliptra ROM ...
194,034 UART:
603,489 UART: [state] CFI Enabled
617,139 UART: [state] LifecycleState = Unprovisioned
618,968 UART: [state] DebugLocked = No
621,855 UART: [state] WD Timer not started. Device not locked for debugging
625,591 UART: [kat] SHA2-256
804,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,282 UART: [kat] ++
816,810 UART: [kat] sha1
827,824 UART: [kat] SHA2-256
830,835 UART: [kat] SHA2-384
836,913 UART: [kat] SHA2-512-ACC
839,889 UART: [kat] ECC-384
3,282,300 UART: [kat] HMAC-384Kdf
3,294,581 UART: [kat] LMS
3,824,053 UART: [kat] --
3,826,416 UART: [cold-reset] ++
3,828,831 UART: [fht] FHT @ 0x50003400
3,840,343 UART: [idev] ++
3,840,900 UART: [idev] CDI.KEYID = 6
3,841,776 UART: [idev] SUBJECT.KEYID = 7
3,843,040 UART: [idev] UDS.KEYID = 0
3,858,397 UART: [idev] Erasing UDS.KEYID = 0
6,319,079 UART: [idev] Sha1 KeyId Algorithm
6,343,007 UART: [idev] --
6,345,730 UART: [ldev] ++
6,346,298 UART: [ldev] CDI.KEYID = 6
6,347,180 UART: [ldev] SUBJECT.KEYID = 5
6,348,311 UART: [ldev] AUTHORITY.KEYID = 7
6,349,650 UART: [ldev] FE.KEYID = 1
6,359,030 UART: [ldev] Erasing FE.KEYID = 1
8,831,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,804 UART: [ldev] --
10,621,054 UART: [fwproc] Wait for Commands...
10,623,697 UART: [fwproc] Recv command 0x46574c44
10,625,789 UART: [fwproc] Recv'd Img size: 114360 bytes
14,029,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,484,833 >>> mbox cmd response: success
14,489,294 UART: [afmc] ++
14,489,879 UART: [afmc] CDI.KEYID = 6
14,490,756 UART: [afmc] SUBJECT.KEYID = 7
14,491,966 UART: [afmc] AUTHORITY.KEYID = 5
16,991,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,983 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,316 UART: [afmc] --
18,787,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
18,931,148 UART: [cold-reset] --
18,932,043 UART: [state] Locking Datavault
18,933,119 UART: [state] Locking PCR0, PCR1 and PCR31
18,934,657 UART: [state] Locking ICCM
18,935,533 UART: [exit] Launching FMC @ 0x40000130
18,936,873 UART:
18,937,018 UART: Running Caliptra FMC ...
18,938,112 UART:
18,938,265 UART: [state] CFI Enabled
18,939,129 UART: [fht] FMC Alias Private Key: 7
20,568,519 UART: [art] Extend RT PCRs Done
20,569,725 UART: [art] Lock RT PCRs Done
20,571,365 UART: [art] Populate DV Done
20,576,444 UART: [fht] FMC Alias Private Key: 7
20,577,972 UART: [art] Derive CDI
20,578,703 UART: [art] Store in in slot 0x4
20,621,449 UART: [art] Derive Key Pair
20,622,503 UART: [art] Store priv key in slot 0x5
23,049,252 UART: [art] Derive Key Pair - Done
23,062,196 UART: [art] Signing Cert with AUTHO
23,063,507 UART: RITY.KEYID = 7
24,769,115 UART: [art] Erasing AUTHORITY.KEYID = 7
24,770,613 UART: [art] PUB.X = 12284E71B74EAD0D3D9A853AF378691FAEDF18296D2C9EB336A4203D7E2BA494551AEF85240C5979EB6B5B7A6D8538D9
24,777,921 UART: [art] PUB.Y = F26392E3BFB524CF6F13C4287334CFDFFDED05CD8D4D7B30566F18D598D1435339D12E969C9AE9368E6C906AC203EA1A
24,785,160 UART: [art] SIG.R = D0ED72A08981B16A3A1052C816D414D36AB2F675FD2CE9B81D2910B61C8C48CBCC0069F125015260DF98F9E89445D5AE
24,792,548 UART: [art] SIG.S = 78F97FE397CF2BB6B2AF5F9EFD2F0ED56585451DE42CFCDBBA84F28E38EA9C83ACD06171BDB908E25EEBBE052A61A073
25,771,063 UART: Caliptra RT
25,771,783 UART: [state] CFI Enabled
25,889,081 UART: [rt] RT listening for mailbox commands...
25,891,880 UART:
25,892,129 UART: Running Caliptra ROM ...
25,893,243 UART:
25,893,399 UART: [state] CFI Enabled
25,905,005 UART: [state] LifecycleState = Unprovisioned
25,906,830 UART: [state] DebugLocked = No
25,909,689 UART: [state] WD Timer not started. Device not locked for debugging
25,912,875 UART: [kat] SHA2-256
26,092,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,103,616 UART: [kat] ++
26,104,150 UART: [kat] sha1
26,116,820 UART: [kat] SHA2-256
26,119,865 UART: [kat] SHA2-384
26,126,010 UART: [kat] SHA2-512-ACC
26,128,947 UART: [kat] ECC-384
28,569,420 UART: [kat] HMAC-384Kdf
28,581,152 UART: [kat] LMS
29,110,644 UART: [kat] --
29,114,081 UART: [update-reset] ++
32,543,800 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,546,376 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
32,929,327 >>> mbox cmd response: success
Initializing fuses
1,039 UART:
1,203 UART: Running Caliptra ROM ...
2,309 UART:
7,646,851 UART: [state] CFI Enabled
7,661,426 UART: [state] LifecycleState = Unprovisioned
7,663,282 UART: [state] DebugLocked = No
7,665,642 UART: [state] WD Timer not started. Device not locked for debugging
7,668,718 UART: [kat] SHA2-256
7,847,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,859,464 UART: [kat] ++
7,859,921 UART: [kat] sha1
7,871,508 UART: [kat] SHA2-256
7,874,523 UART: [kat] SHA2-384
7,880,418 UART: [kat] SHA2-512-ACC
7,883,357 UART: [kat] ECC-384
10,324,021 UART: [kat] HMAC-384Kdf
10,337,108 UART: [kat] LMS
10,866,595 UART: [kat] --
10,871,682 UART: [warm-reset] ++
10,875,603 UART: [warm-reset] Prev Update Reset failed
10,879,439 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
6,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,281,432 >>> mbox cmd response: success
18,513,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
18,656,957 UART:
18,657,342 UART: Running Caliptra FMC ...
18,658,429 UART:
18,658,581 UART: [state] CFI Enabled
18,659,566 UART: [fht] FMC Alias Private Key: 7
20,291,338 UART: [art] Extend RT PCRs Done
20,292,566 UART: [art] Lock RT PCRs Done
20,294,278 UART: [art] Populate DV Done
20,299,721 UART: [fht] FMC Alias Private Key: 7
20,301,464 UART: [art] Derive CDI
20,302,208 UART: [art] Store in in slot 0x4
20,344,697 UART: [art] Derive Key Pair
20,345,696 UART: [art] Store priv key in slot 0x5
22,772,212 UART: [art] Derive Key Pair - Done
22,785,151 UART: [art] Signing Cert with AUTHO
22,786,508 UART: RITY.KEYID = 7
24,492,093 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,597 UART: [art] PUB.X = A259429A4269DE5DE44B07EACE0ED8237D1CA80489436110E88B4F1C35726B0A9D09EB2A09C33C762277B34B9AA66517
24,500,844 UART: [art] PUB.Y = B1E3E88C7693E9615537AD4DB5D4B44EC7CE30019DC01DD32374DDC5B571B662E51EA5E611F91158ABD1F71F7087B3FB
24,508,099 UART: [art] SIG.R = E31FC74D2A91AB421C46E31A92EA6072F4FBDBD1199BFFE4ABB566A75E267FAA24D3F1B9BB89405CB6B1A0FCCF05FF6D
24,515,547 UART: [art] SIG.S = 416689EAAE310B20E2D5F8FF0E4110585EAAAE8C801DC34D5B2E31DF31F255547DAFA82E66C2639ECC1D3251C571FD8D
25,494,843 UART: Caliptra RT
25,495,542 UART: [state] CFI Enabled
25,612,507 UART: [rt] RT listening for mailbox commands...
32,508,799 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,359 UART: [kat] SHA2-256
901,299 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,715 UART: [idev] ++
1,172,883 UART: [idev] CDI.KEYID = 6
1,173,244 UART: [idev] SUBJECT.KEYID = 7
1,173,669 UART: [idev] UDS.KEYID = 0
1,181,457 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,986 UART: [ldev] --
1,280,260 UART: [fwproc] Wait for Commands...
1,280,925 UART: [fwproc] Recv command 0x46574c44
1,281,658 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,796 >>> mbox cmd response: success
2,774,003 UART: [afmc] ++
2,774,171 UART: [afmc] CDI.KEYID = 6
2,774,534 UART: [afmc] SUBJECT.KEYID = 7
2,774,960 UART: [afmc] AUTHORITY.KEYID = 5
2,809,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,908 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,520 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,239 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,944 UART: [afmc] --
2,853,046 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,853,068 UART: [cold-reset] --
2,853,908 UART: [state] Locking Datavault
2,854,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,591 UART: [state] Locking ICCM
2,856,163 UART: [exit] Launching FMC @ 0x40000130
2,861,492 UART:
2,861,508 UART: Running Caliptra FMC ...
2,861,916 UART:
2,861,970 UART: [state] CFI Enabled
2,872,241 UART: [fht] FMC Alias Private Key: 7
2,980,428 UART: [art] Extend RT PCRs Done
2,980,856 UART: [art] Lock RT PCRs Done
2,982,470 UART: [art] Populate DV Done
2,990,733 UART: [fht] FMC Alias Private Key: 7
2,991,669 UART: [art] Derive CDI
2,991,949 UART: [art] Store in in slot 0x4
3,077,548 UART: [art] Derive Key Pair
3,077,908 UART: [art] Store priv key in slot 0x5
3,091,402 UART: [art] Derive Key Pair - Done
3,106,144 UART: [art] Signing Cert with AUTHO
3,106,624 UART: RITY.KEYID = 7
3,121,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,743 UART: [art] PUB.X = F19E9C16F7A3CC0082B6CF6EE1B3C764EC3F1AFF931FFB51EC8A8967BE1365E497138724DAAF8BBE4313B760DA2D20EC
3,129,513 UART: [art] PUB.Y = B24BA53A9E10EDFA275105CCD0D6C91D6D5B20ECF478933481B469793309A45E665CB485E6383E2236BC1C12539CE5A8
3,136,461 UART: [art] SIG.R = D2F7B15F8A143AA24618FA9E62D0B683A34FE8CCB84D378316E6CB9001AFE56816E6874B75AAA9C129E28561B82875FA
3,143,236 UART: [art] SIG.S = 8BAA30A8B73D59A62A7BFF277566BA13270412EDA33E397EDC6C6C9560203B0D85183F550623B8335237312D6532E105
3,167,161 UART: Caliptra RT
3,167,415 UART: [state] CFI Enabled
3,274,770 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,258 UART:
3,276,274 UART: Running Caliptra ROM ...
3,276,682 UART:
3,276,737 UART: [state] CFI Enabled
3,279,323 UART: [state] LifecycleState = Unprovisioned
3,279,978 UART: [state] DebugLocked = No
3,280,708 UART: [state] WD Timer not started. Device not locked for debugging
3,281,974 UART: [kat] SHA2-256
4,085,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,653 UART: [kat] ++
4,089,805 UART: [kat] sha1
4,093,821 UART: [kat] SHA2-256
4,095,761 UART: [kat] SHA2-384
4,098,442 UART: [kat] SHA2-512-ACC
4,100,342 UART: [kat] ECC-384
4,109,829 UART: [kat] HMAC-384Kdf
4,114,579 UART: [kat] LMS
4,362,891 UART: [kat] --
4,363,721 UART: [update-reset] ++
5,675,733 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,676,700 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,826,566 >>> mbox cmd response: success
Initializing fuses
5,826,850 UART:
5,826,866 UART: Running Caliptra ROM ...
5,827,274 UART:
5,827,329 UART: [state] CFI Enabled
5,830,825 UART: [state] LifecycleState = Unprovisioned
5,831,480 UART: [state] DebugLocked = No
5,832,080 UART: [state] WD Timer not started. Device not locked for debugging
5,833,333 UART: [kat] SHA2-256
6,636,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,641,012 UART: [kat] ++
6,641,164 UART: [kat] sha1
6,645,580 UART: [kat] SHA2-256
6,647,520 UART: [kat] SHA2-384
6,650,051 UART: [kat] SHA2-512-ACC
6,651,952 UART: [kat] ECC-384
6,661,345 UART: [kat] HMAC-384Kdf
6,666,017 UART: [kat] LMS
6,914,329 UART: [kat] --
6,915,067 UART: [warm-reset] ++
6,915,722 UART: [warm-reset] Prev Update Reset failed
6,916,813 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,110 >>> mbox cmd response: success
2,679,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,685,388 UART:
2,685,404 UART: Running Caliptra FMC ...
2,685,812 UART:
2,685,866 UART: [state] CFI Enabled
2,695,943 UART: [fht] FMC Alias Private Key: 7
2,804,138 UART: [art] Extend RT PCRs Done
2,804,566 UART: [art] Lock RT PCRs Done
2,806,016 UART: [art] Populate DV Done
2,814,199 UART: [fht] FMC Alias Private Key: 7
2,815,367 UART: [art] Derive CDI
2,815,647 UART: [art] Store in in slot 0x4
2,901,142 UART: [art] Derive Key Pair
2,901,502 UART: [art] Store priv key in slot 0x5
2,914,620 UART: [art] Derive Key Pair - Done
2,929,373 UART: [art] Signing Cert with AUTHO
2,929,853 UART: RITY.KEYID = 7
2,945,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,972 UART: [art] PUB.X = 9071CC660DD273BD6A65749A3A9A83DFB9629222320195E54128B3AE04E25F4BF45F8AC2D8EEF174675469A7F419D037
2,952,733 UART: [art] PUB.Y = 39E4880C94A9557AE2EBA1499EE583B8C26BCE0484859F7A169972A14FF414582FD145ACAFAFA7057269395BC11ED46C
2,959,680 UART: [art] SIG.R = B002CB774E4FB7FBE3D07493B6C6792494E98AF4B1D1CFCC5E42755A69C8C404EEBCDECBAFDACDD98D80058609AB1F0E
2,966,463 UART: [art] SIG.S = EF1AC5FF59476ABDD906FC530F0977D8CBF86697C9BBB9A2BFA1EC4B45751C4B5943D763C63BBB1A371957EA41F928FE
2,990,235 UART: Caliptra RT
2,990,489 UART: [state] CFI Enabled
3,098,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,967 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,725 UART: [kat] SHA2-512-ACC
906,626 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
921,205 UART: [kat] LMS
1,169,517 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,200,282 UART: [idev] Sha1 KeyId Algorithm
1,209,056 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,975 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,989 >>> mbox cmd response: success
2,775,110 UART: [afmc] ++
2,775,278 UART: [afmc] CDI.KEYID = 6
2,775,641 UART: [afmc] SUBJECT.KEYID = 7
2,776,067 UART: [afmc] AUTHORITY.KEYID = 5
2,811,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,347 UART: [afmc] --
2,854,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,854,387 UART: [cold-reset] --
2,855,331 UART: [state] Locking Datavault
2,856,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,278 UART: [state] Locking ICCM
2,857,708 UART: [exit] Launching FMC @ 0x40000130
2,863,037 UART:
2,863,053 UART: Running Caliptra FMC ...
2,863,461 UART:
2,863,604 UART: [state] CFI Enabled
2,874,251 UART: [fht] FMC Alias Private Key: 7
2,982,384 UART: [art] Extend RT PCRs Done
2,982,812 UART: [art] Lock RT PCRs Done
2,984,404 UART: [art] Populate DV Done
2,992,599 UART: [fht] FMC Alias Private Key: 7
2,993,539 UART: [art] Derive CDI
2,993,819 UART: [art] Store in in slot 0x4
3,079,632 UART: [art] Derive Key Pair
3,079,992 UART: [art] Store priv key in slot 0x5
3,093,906 UART: [art] Derive Key Pair - Done
3,108,353 UART: [art] Signing Cert with AUTHO
3,108,833 UART: RITY.KEYID = 7
3,124,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,458 UART: [art] PUB.X = 52DC481F0A18112B33A9AA12E76043CF91440FE8124B58EAE7DB963674599E8E253B39A6693DC87C63292A5D8CF64624
3,132,220 UART: [art] PUB.Y = 4DCC5EC0BF9BBBF272781F84AFF19A04665EC113DE39FD46455FD19C9E93D7C33631089D610F6690605D779276197974
3,139,161 UART: [art] SIG.R = DE6097BB149DF7AEC5D07C7129C1541DBA6C55772A07B69A749B08A83371D5CA847E8FB63D8BA0E3561F3481662DC795
3,145,931 UART: [art] SIG.S = B39164846DA41D0BC5D6A5CEE8511F72B14A493FF3593B7D2DFDDD2E2384B296B31F8052A48F32788ED85CFD07E2EEE6
3,169,636 UART: Caliptra RT
3,169,982 UART: [state] CFI Enabled
3,277,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,997 UART:
3,279,013 UART: Running Caliptra ROM ...
3,279,421 UART:
3,279,563 UART: [state] CFI Enabled
3,282,177 UART: [state] LifecycleState = Unprovisioned
3,282,832 UART: [state] DebugLocked = No
3,283,484 UART: [state] WD Timer not started. Device not locked for debugging
3,284,768 UART: [kat] SHA2-256
4,088,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,447 UART: [kat] ++
4,092,599 UART: [kat] sha1
4,096,857 UART: [kat] SHA2-256
4,098,797 UART: [kat] SHA2-384
4,101,594 UART: [kat] SHA2-512-ACC
4,103,494 UART: [kat] ECC-384
4,113,705 UART: [kat] HMAC-384Kdf
4,118,367 UART: [kat] LMS
4,366,679 UART: [kat] --
4,367,449 UART: [update-reset] ++
5,680,195 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,681,394 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,831,260 >>> mbox cmd response: success
Initializing fuses
5,831,576 UART:
5,831,592 UART: Running Caliptra ROM ...
5,832,000 UART:
5,832,142 UART: [state] CFI Enabled
5,834,806 UART: [state] LifecycleState = Unprovisioned
5,835,461 UART: [state] DebugLocked = No
5,835,965 UART: [state] WD Timer not started. Device not locked for debugging
5,837,162 UART: [kat] SHA2-256
6,640,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,644,841 UART: [kat] ++
6,644,993 UART: [kat] sha1
6,649,247 UART: [kat] SHA2-256
6,651,187 UART: [kat] SHA2-384
6,653,846 UART: [kat] SHA2-512-ACC
6,655,747 UART: [kat] ECC-384
6,665,318 UART: [kat] HMAC-384Kdf
6,669,730 UART: [kat] LMS
6,918,042 UART: [kat] --
6,918,718 UART: [warm-reset] ++
6,919,265 UART: [warm-reset] Prev Update Reset failed
6,920,330 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,921 >>> mbox cmd response: success
2,681,272 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,687,417 UART:
2,687,433 UART: Running Caliptra FMC ...
2,687,841 UART:
2,687,984 UART: [state] CFI Enabled
2,698,101 UART: [fht] FMC Alias Private Key: 7
2,805,512 UART: [art] Extend RT PCRs Done
2,805,940 UART: [art] Lock RT PCRs Done
2,807,360 UART: [art] Populate DV Done
2,815,597 UART: [fht] FMC Alias Private Key: 7
2,816,665 UART: [art] Derive CDI
2,816,945 UART: [art] Store in in slot 0x4
2,902,792 UART: [art] Derive Key Pair
2,903,152 UART: [art] Store priv key in slot 0x5
2,916,444 UART: [art] Derive Key Pair - Done
2,931,151 UART: [art] Signing Cert with AUTHO
2,931,631 UART: RITY.KEYID = 7
2,946,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,564 UART: [art] PUB.X = 61FD4BEC22CAEC19E7FCBF289AEC6F1ADC21D1A42A1B4833803E2305FDCEC8FE7AB82CF5FD3138A557824BF5CAC52950
2,954,359 UART: [art] PUB.Y = 8B7AD0D00A56A88BD3868FE59E6E79A0BADE6273B61AAF1596F706E0433CCEB3354DA9F2658A00FC3FE6695F5BC8C1D7
2,961,299 UART: [art] SIG.R = 46625AF1934D9ABB97F754183F1A3220BA38C1F7EC47F7662B359D358CAD237835AC4FE87D7916F0EACEB6B6E103DB68
2,968,076 UART: [art] SIG.S = ABBFEDCD9B904870BEBAEE424674A7C43DB204823367150FF11CE1B9E66516FA6D749A18A942E20C3D3E8351EBC0059C
2,991,649 UART: Caliptra RT
2,991,995 UART: [state] CFI Enabled
3,100,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,127 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,742 UART: [ldev] Erasing FE.KEYID = 1
1,242,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,496 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,561 UART: [fwproc] Recv command 0x46574c44
1,283,294 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,034 >>> mbox cmd response: success
2,774,061 UART: [afmc] ++
2,774,229 UART: [afmc] CDI.KEYID = 6
2,774,592 UART: [afmc] SUBJECT.KEYID = 7
2,775,018 UART: [afmc] AUTHORITY.KEYID = 5
2,810,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,642 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,110 UART: [afmc] --
2,854,012 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,854,034 UART: [cold-reset] --
2,854,928 UART: [state] Locking Datavault
2,856,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,725 UART: [state] Locking ICCM
2,857,305 UART: [exit] Launching FMC @ 0x40000130
2,862,634 UART:
2,862,650 UART: Running Caliptra FMC ...
2,863,058 UART:
2,863,112 UART: [state] CFI Enabled
2,873,499 UART: [fht] FMC Alias Private Key: 7
2,981,990 UART: [art] Extend RT PCRs Done
2,982,418 UART: [art] Lock RT PCRs Done
2,983,820 UART: [art] Populate DV Done
2,991,833 UART: [fht] FMC Alias Private Key: 7
2,992,953 UART: [art] Derive CDI
2,993,233 UART: [art] Store in in slot 0x4
3,078,946 UART: [art] Derive Key Pair
3,079,306 UART: [art] Store priv key in slot 0x5
3,092,386 UART: [art] Derive Key Pair - Done
3,107,467 UART: [art] Signing Cert with AUTHO
3,107,947 UART: RITY.KEYID = 7
3,123,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,870 UART: [art] PUB.X = BA692468E360CE86394496A65C0F108FCB630E16E1ABE4EF9998C1580A79E3859765B42EAE683851469010895F903707
3,130,618 UART: [art] PUB.Y = DCCEA6C80AFAD9F2EE8D5ED860F46B3FD28B9AF47F05F04B3076C3697A1EE5E01D92E6491DDB44240DFBB62C13E49396
3,137,581 UART: [art] SIG.R = 86A6DD01F7532DE46E672322D7A976695C3FBACD62D11D69B39E140966FDCCD260146F3C0F610692EDA103E3BA97F029
3,144,342 UART: [art] SIG.S = CA756A4BB76FDC3BFD46752AF29C5D391FFA6CFD0273312C94EA360DD86571E056EC555C778AA617E6701538863A950C
3,168,824 UART: Caliptra RT
3,169,078 UART: [state] CFI Enabled
3,277,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,803 UART:
3,278,819 UART: Running Caliptra ROM ...
3,279,227 UART:
3,279,282 UART: [state] CFI Enabled
3,282,412 UART: [state] LifecycleState = Unprovisioned
3,283,067 UART: [state] DebugLocked = No
3,283,611 UART: [state] WD Timer not started. Device not locked for debugging
3,284,809 UART: [kat] SHA2-256
4,088,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,488 UART: [kat] ++
4,092,640 UART: [kat] sha1
4,096,728 UART: [kat] SHA2-256
4,098,668 UART: [kat] SHA2-384
4,101,507 UART: [kat] SHA2-512-ACC
4,103,407 UART: [kat] ECC-384
4,113,066 UART: [kat] HMAC-384Kdf
4,117,686 UART: [kat] LMS
4,365,998 UART: [kat] --
4,367,178 UART: [update-reset] ++
5,680,108 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,681,179 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,831,045 >>> mbox cmd response: success
Initializing fuses
5,831,319 UART:
5,831,335 UART: Running Caliptra ROM ...
5,831,743 UART:
5,831,798 UART: [state] CFI Enabled
5,834,602 UART: [state] LifecycleState = Unprovisioned
5,835,257 UART: [state] DebugLocked = No
5,835,955 UART: [state] WD Timer not started. Device not locked for debugging
5,837,222 UART: [kat] SHA2-256
6,640,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,644,901 UART: [kat] ++
6,645,053 UART: [kat] sha1
6,649,429 UART: [kat] SHA2-256
6,651,369 UART: [kat] SHA2-384
6,653,978 UART: [kat] SHA2-512-ACC
6,655,879 UART: [kat] ECC-384
6,665,776 UART: [kat] HMAC-384Kdf
6,670,390 UART: [kat] LMS
6,918,702 UART: [kat] --
6,919,644 UART: [warm-reset] ++
6,920,287 UART: [warm-reset] Prev Update Reset failed
6,921,140 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,456 >>> mbox cmd response: success
2,678,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,685,198 UART:
2,685,214 UART: Running Caliptra FMC ...
2,685,622 UART:
2,685,676 UART: [state] CFI Enabled
2,695,915 UART: [fht] FMC Alias Private Key: 7
2,804,438 UART: [art] Extend RT PCRs Done
2,804,866 UART: [art] Lock RT PCRs Done
2,806,378 UART: [art] Populate DV Done
2,814,755 UART: [fht] FMC Alias Private Key: 7
2,815,703 UART: [art] Derive CDI
2,815,983 UART: [art] Store in in slot 0x4
2,902,138 UART: [art] Derive Key Pair
2,902,498 UART: [art] Store priv key in slot 0x5
2,915,412 UART: [art] Derive Key Pair - Done
2,930,303 UART: [art] Signing Cert with AUTHO
2,930,783 UART: RITY.KEYID = 7
2,945,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,348 UART: [art] PUB.X = AA89749094E1BED6BEA13AE4C0492BC46A9AAB6B7E7D561B7EC491678699B169544791A7991BC134B48D9A9B65A5970A
2,953,121 UART: [art] PUB.Y = F2EFB480990B64DF8FD50BAD0FA3F1062095A82DE89A73B42BF9E15D99C38A5E830212E67B99746F7CA087888B73B111
2,960,062 UART: [art] SIG.R = D3305857D3E85B2BE57DCA51EBC949C66CB1E63080C2E7A4F5F80EA7747C26E5A5C3210C1523EAA8ED41CD5C790C51BC
2,966,839 UART: [art] SIG.S = C178D0AB3D48E359D323167FC3269FF489C043D9C2599890DA37FEA0D2AE55A91078AEC7332CFF4623A243FD6AF5B04E
2,991,088 UART: Caliptra RT
2,991,342 UART: [state] CFI Enabled
3,098,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,533,216 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,621 UART: [kat] LMS
1,168,933 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,704 UART: [idev] --
1,209,563 UART: [ldev] ++
1,209,731 UART: [ldev] CDI.KEYID = 6
1,210,095 UART: [ldev] SUBJECT.KEYID = 5
1,210,522 UART: [ldev] AUTHORITY.KEYID = 7
1,210,985 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,509 UART: [ldev] --
1,281,913 UART: [fwproc] Wait for Commands...
1,282,538 UART: [fwproc] Recv command 0x46574c44
1,283,271 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,997 >>> mbox cmd response: success
2,774,164 UART: [afmc] ++
2,774,332 UART: [afmc] CDI.KEYID = 6
2,774,695 UART: [afmc] SUBJECT.KEYID = 7
2,775,121 UART: [afmc] AUTHORITY.KEYID = 5
2,810,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,604 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,435 UART: [afmc] --
2,854,461 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,854,483 UART: [cold-reset] --
2,855,423 UART: [state] Locking Datavault
2,856,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,206 UART: [state] Locking ICCM
2,857,838 UART: [exit] Launching FMC @ 0x40000130
2,863,167 UART:
2,863,183 UART: Running Caliptra FMC ...
2,863,591 UART:
2,863,734 UART: [state] CFI Enabled
2,874,471 UART: [fht] FMC Alias Private Key: 7
2,981,780 UART: [art] Extend RT PCRs Done
2,982,208 UART: [art] Lock RT PCRs Done
2,984,030 UART: [art] Populate DV Done
2,992,321 UART: [fht] FMC Alias Private Key: 7
2,993,445 UART: [art] Derive CDI
2,993,725 UART: [art] Store in in slot 0x4
3,079,492 UART: [art] Derive Key Pair
3,079,852 UART: [art] Store priv key in slot 0x5
3,093,182 UART: [art] Derive Key Pair - Done
3,108,176 UART: [art] Signing Cert with AUTHO
3,108,656 UART: RITY.KEYID = 7
3,123,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,729 UART: [art] PUB.X = A00B619F117BB0CE3B1573C45CB632DFF0D1E7DFE38B448854C5E95BC63A445FFF3DE12768FA6BC2A25FA8C415B3652B
3,131,514 UART: [art] PUB.Y = 4B2AF82CE54E54622C89EFAAA62C6E7ABEAFADE017158DEF58EAA4E0AC14AC75D2BC2D82DE595486E1E2E9F6C41D6D31
3,138,494 UART: [art] SIG.R = 96CD4EC106567C2F39E8ABCC87D9A9FCF6A3B817AEBCCB72FFAEECFC62DED540A09B54A914DAF8D7C7286878C017DBF8
3,145,293 UART: [art] SIG.S = 2760A54441BCE6DB6108E64346EB09FD8DBA8BA9DEE5C5F3FF8A5CA4027DC8C0FFB956F08246CEB7BA425F0D6125A691
3,168,664 UART: Caliptra RT
3,169,010 UART: [state] CFI Enabled
3,277,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,848 UART:
3,278,864 UART: Running Caliptra ROM ...
3,279,272 UART:
3,279,414 UART: [state] CFI Enabled
3,281,720 UART: [state] LifecycleState = Unprovisioned
3,282,375 UART: [state] DebugLocked = No
3,282,873 UART: [state] WD Timer not started. Device not locked for debugging
3,284,193 UART: [kat] SHA2-256
4,087,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,872 UART: [kat] ++
4,092,024 UART: [kat] sha1
4,096,120 UART: [kat] SHA2-256
4,098,060 UART: [kat] SHA2-384
4,101,021 UART: [kat] SHA2-512-ACC
4,102,921 UART: [kat] ECC-384
4,112,776 UART: [kat] HMAC-384Kdf
4,117,432 UART: [kat] LMS
4,365,744 UART: [kat] --
4,366,676 UART: [update-reset] ++
5,678,908 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,680,061 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,829,927 >>> mbox cmd response: success
Initializing fuses
5,830,227 UART:
5,830,243 UART: Running Caliptra ROM ...
5,830,651 UART:
5,830,793 UART: [state] CFI Enabled
5,833,097 UART: [state] LifecycleState = Unprovisioned
5,833,752 UART: [state] DebugLocked = No
5,834,476 UART: [state] WD Timer not started. Device not locked for debugging
5,835,611 UART: [kat] SHA2-256
6,639,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,643,290 UART: [kat] ++
6,643,442 UART: [kat] sha1
6,647,636 UART: [kat] SHA2-256
6,649,576 UART: [kat] SHA2-384
6,652,349 UART: [kat] SHA2-512-ACC
6,654,250 UART: [kat] ECC-384
6,663,871 UART: [kat] HMAC-384Kdf
6,668,493 UART: [kat] LMS
6,916,805 UART: [kat] --
6,917,621 UART: [warm-reset] ++
6,918,322 UART: [warm-reset] Prev Update Reset failed
6,919,543 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,289 >>> mbox cmd response: success
2,678,694 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,845 UART:
2,684,861 UART: Running Caliptra FMC ...
2,685,269 UART:
2,685,412 UART: [state] CFI Enabled
2,696,185 UART: [fht] FMC Alias Private Key: 7
2,803,678 UART: [art] Extend RT PCRs Done
2,804,106 UART: [art] Lock RT PCRs Done
2,805,688 UART: [art] Populate DV Done
2,813,997 UART: [fht] FMC Alias Private Key: 7
2,815,175 UART: [art] Derive CDI
2,815,455 UART: [art] Store in in slot 0x4
2,900,670 UART: [art] Derive Key Pair
2,901,030 UART: [art] Store priv key in slot 0x5
2,914,492 UART: [art] Derive Key Pair - Done
2,929,161 UART: [art] Signing Cert with AUTHO
2,929,641 UART: RITY.KEYID = 7
2,944,895 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,660 UART: [art] PUB.X = F577F18ED909C3332D019C5928108515F3B2401168A4659DB9FFC5C3E0833DC5DF91FB7D72CE5B04C02642C7F6C99F3F
2,952,425 UART: [art] PUB.Y = F8CAB8FC2463843295C21C57106F1DCAA33BD99AE0C0A54A75502A695B06B95B66F3CCB664508B1F6692F0D6C4872C74
2,959,378 UART: [art] SIG.R = 38ECBE0F539C153DC68F09122D750F24F2456843C4FD615B424A5B6DE5EC0A8D9757E2F6695CAA542DD5868642D1BDEC
2,966,146 UART: [art] SIG.S = 066B78391270985D748ED38753B6E3583015B90921F229CCB0982AD4EE3BCC190778C12EB02291B9636E859F917E8407
2,989,933 UART: Caliptra RT
2,990,279 UART: [state] CFI Enabled
3,099,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,535,235 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,222 UART: [kat] SHA2-512-ACC
906,123 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
920,086 UART: [kat] LMS
1,168,398 UART: [kat] --
1,169,357 UART: [cold-reset] ++
1,169,785 UART: [fht] FHT @ 0x50003400
1,172,535 UART: [idev] ++
1,172,703 UART: [idev] CDI.KEYID = 6
1,173,064 UART: [idev] SUBJECT.KEYID = 7
1,173,489 UART: [idev] UDS.KEYID = 0
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,990 UART: [ldev] ++
1,208,158 UART: [ldev] CDI.KEYID = 6
1,208,522 UART: [ldev] SUBJECT.KEYID = 5
1,208,949 UART: [ldev] AUTHORITY.KEYID = 7
1,209,412 UART: [ldev] FE.KEYID = 1
1,214,490 UART: [ldev] Erasing FE.KEYID = 1
1,240,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,860 UART: [ldev] --
1,279,302 UART: [fwproc] Wait for Commands...
1,279,941 UART: [fwproc] Recv command 0x46574c44
1,280,674 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,502 >>> mbox cmd response: success
2,773,729 UART: [afmc] ++
2,773,897 UART: [afmc] CDI.KEYID = 6
2,774,260 UART: [afmc] SUBJECT.KEYID = 7
2,774,686 UART: [afmc] AUTHORITY.KEYID = 5
2,810,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,342 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,954 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,673 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,504 UART: [afmc] --
2,853,508 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,853,530 UART: [cold-reset] --
2,854,286 UART: [state] Locking Datavault
2,855,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,047 UART: [state] Locking ICCM
2,856,561 UART: [exit] Launching FMC @ 0x40000130
2,861,890 UART:
2,861,906 UART: Running Caliptra FMC ...
2,862,314 UART:
2,862,368 UART: [state] CFI Enabled
2,873,191 UART: [fht] FMC Alias Private Key: 7
2,980,884 UART: [art] Extend RT PCRs Done
2,981,312 UART: [art] Lock RT PCRs Done
2,982,754 UART: [art] Populate DV Done
2,990,763 UART: [fht] FMC Alias Private Key: 7
2,991,863 UART: [art] Derive CDI
2,992,143 UART: [art] Store in in slot 0x4
3,078,298 UART: [art] Derive Key Pair
3,078,658 UART: [art] Store priv key in slot 0x5
3,091,762 UART: [art] Derive Key Pair - Done
3,106,444 UART: [art] Signing Cert with AUTHO
3,106,924 UART: RITY.KEYID = 7
3,122,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,791 UART: [art] PUB.X = 29DACB380B197775B796C1DB496DE6317FF1A38398C12C1293C8829299E698D41FCBE6FFF94D9355C373C290652AA608
3,129,555 UART: [art] PUB.Y = 52839E3AE4D41AD57D4C8F332F817280BF5ABB93D8F3BA151147C8B6D0E40363313D4EFD36347F788474DC0768548CB6
3,136,501 UART: [art] SIG.R = 8459CB703937C7D4DEFE074539EBEE1921C0790B7BC976DE91A9563D10CE3057473065525DD2BEC2B30763E384066E68
3,143,257 UART: [art] SIG.S = BE97B0EF5AD5A7E51F04BD13377F028C78D12D59FC9C43CDBDA10A0215428A54325BE4C6A4A3508EA0D8CBB7D6B75CE4
3,167,130 UART: Caliptra RT
3,167,384 UART: [state] CFI Enabled
3,273,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,551 UART:
3,275,567 UART: Running Caliptra ROM ...
3,275,975 UART:
3,276,030 UART: [state] CFI Enabled
3,278,584 UART: [state] LifecycleState = Unprovisioned
3,279,239 UART: [state] DebugLocked = No
3,279,901 UART: [state] WD Timer not started. Device not locked for debugging
3,281,061 UART: [kat] SHA2-256
4,084,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,740 UART: [kat] ++
4,088,892 UART: [kat] sha1
4,093,312 UART: [kat] SHA2-256
4,095,252 UART: [kat] SHA2-384
4,097,975 UART: [kat] SHA2-512-ACC
4,099,875 UART: [kat] ECC-384
4,109,436 UART: [kat] HMAC-384Kdf
4,113,884 UART: [kat] LMS
4,362,196 UART: [kat] --
4,363,030 UART: [update-reset] ++
5,675,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,676,633 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,826,499 >>> mbox cmd response: success
Initializing fuses
5,826,801 UART:
5,826,817 UART: Running Caliptra ROM ...
5,827,225 UART:
5,827,280 UART: [state] CFI Enabled
5,830,286 UART: [state] LifecycleState = Unprovisioned
5,830,941 UART: [state] DebugLocked = No
5,831,499 UART: [state] WD Timer not started. Device not locked for debugging
5,832,772 UART: [kat] SHA2-256
6,636,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,640,451 UART: [kat] ++
6,640,603 UART: [kat] sha1
6,644,763 UART: [kat] SHA2-256
6,646,703 UART: [kat] SHA2-384
6,649,424 UART: [kat] SHA2-512-ACC
6,651,325 UART: [kat] ECC-384
6,661,218 UART: [kat] HMAC-384Kdf
6,665,784 UART: [kat] LMS
6,914,096 UART: [kat] --
6,914,928 UART: [warm-reset] ++
6,915,593 UART: [warm-reset] Prev Update Reset failed
6,916,602 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,930 >>> mbox cmd response: success
2,677,467 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,683,754 UART:
2,683,770 UART: Running Caliptra FMC ...
2,684,178 UART:
2,684,232 UART: [state] CFI Enabled
2,694,871 UART: [fht] FMC Alias Private Key: 7
2,803,142 UART: [art] Extend RT PCRs Done
2,803,570 UART: [art] Lock RT PCRs Done
2,804,752 UART: [art] Populate DV Done
2,813,137 UART: [fht] FMC Alias Private Key: 7
2,814,225 UART: [art] Derive CDI
2,814,505 UART: [art] Store in in slot 0x4
2,899,934 UART: [art] Derive Key Pair
2,900,294 UART: [art] Store priv key in slot 0x5
2,913,394 UART: [art] Derive Key Pair - Done
2,928,491 UART: [art] Signing Cert with AUTHO
2,928,971 UART: RITY.KEYID = 7
2,943,427 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,192 UART: [art] PUB.X = B33862CDE7738F56EC31C796DD65E9E1EF296C96B3210EC70CC0CBD1A191C195287A00B88539F1872F19F54CD96FAF91
2,950,942 UART: [art] PUB.Y = AC45F8E97285346AECFAC9B31704B37CD4C87C6F4DB580D79BE0FF42AE4DC6079948966EC38622F46690D55EACB8A4AA
2,957,902 UART: [art] SIG.R = 96504486E4439C9B6E8F75028BCFC79A0F3643F82FF575C10ADB054E49C99A63F6FA13313151893A15D7BA8FB8ACD148
2,964,664 UART: [art] SIG.S = EEBBF4567FA8F67D3D3E98E71D209FDE136B3FCE3C8E09642AD6FD11C195453394F7A5689C7D2DD7E3C268FA640DE958
2,987,967 UART: Caliptra RT
2,988,221 UART: [state] CFI Enabled
3,096,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,531,609 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,407 UART: [kat] HMAC-384Kdf
920,077 UART: [kat] LMS
1,168,389 UART: [kat] --
1,169,360 UART: [cold-reset] ++
1,169,696 UART: [fht] FHT @ 0x50003400
1,172,522 UART: [idev] ++
1,172,690 UART: [idev] CDI.KEYID = 6
1,173,051 UART: [idev] SUBJECT.KEYID = 7
1,173,476 UART: [idev] UDS.KEYID = 0
1,181,670 UART: [idev] Erasing UDS.KEYID = 0
1,198,126 UART: [idev] Sha1 KeyId Algorithm
1,207,050 UART: [idev] --
1,208,013 UART: [ldev] ++
1,208,181 UART: [ldev] CDI.KEYID = 6
1,208,545 UART: [ldev] SUBJECT.KEYID = 5
1,208,972 UART: [ldev] AUTHORITY.KEYID = 7
1,209,435 UART: [ldev] FE.KEYID = 1
1,214,749 UART: [ldev] Erasing FE.KEYID = 1
1,241,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,519 UART: [ldev] --
1,280,995 UART: [fwproc] Wait for Commands...
1,281,788 UART: [fwproc] Recv command 0x46574c44
1,282,521 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,761 >>> mbox cmd response: success
2,773,998 UART: [afmc] ++
2,774,166 UART: [afmc] CDI.KEYID = 6
2,774,529 UART: [afmc] SUBJECT.KEYID = 7
2,774,955 UART: [afmc] AUTHORITY.KEYID = 5
2,810,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,427 UART: [afmc] --
2,854,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,854,393 UART: [cold-reset] --
2,855,197 UART: [state] Locking Datavault
2,856,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,102 UART: [state] Locking ICCM
2,857,578 UART: [exit] Launching FMC @ 0x40000130
2,862,907 UART:
2,862,923 UART: Running Caliptra FMC ...
2,863,331 UART:
2,863,474 UART: [state] CFI Enabled
2,874,259 UART: [fht] FMC Alias Private Key: 7
2,982,148 UART: [art] Extend RT PCRs Done
2,982,576 UART: [art] Lock RT PCRs Done
2,984,052 UART: [art] Populate DV Done
2,992,227 UART: [fht] FMC Alias Private Key: 7
2,993,171 UART: [art] Derive CDI
2,993,451 UART: [art] Store in in slot 0x4
3,079,086 UART: [art] Derive Key Pair
3,079,446 UART: [art] Store priv key in slot 0x5
3,092,712 UART: [art] Derive Key Pair - Done
3,107,868 UART: [art] Signing Cert with AUTHO
3,108,348 UART: RITY.KEYID = 7
3,122,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,725 UART: [art] PUB.X = 8C5F9E01FA46BB3B275D5E641465B25D5AF73CC1B75B1E7446B54E454F3DFE55C2D20AE7E882ED3016B4D0C44F6596F9
3,130,501 UART: [art] PUB.Y = AE7CDEC934B62066CCD294A3C8BF0884160D5B118C4D7783E5BB9DC773FB269FBE55072D1B49E90AD953085BC768C74E
3,137,448 UART: [art] SIG.R = F3B93B7800D1F9F510EEC6F47F7A8D5109ACA643A86720B130746D48283FE402DCD772C4257F20A577838AC29C79360A
3,144,187 UART: [art] SIG.S = 173F682E2244E9BDE08BB1B3D41E4B1F67EFAE74CAD2F7E3B2D00C0F07B6A4C2380C55AE7A1C785B7F5F423591439C37
3,167,774 UART: Caliptra RT
3,168,120 UART: [state] CFI Enabled
3,277,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,370 UART:
3,279,386 UART: Running Caliptra ROM ...
3,279,794 UART:
3,279,936 UART: [state] CFI Enabled
3,282,908 UART: [state] LifecycleState = Unprovisioned
3,283,563 UART: [state] DebugLocked = No
3,284,063 UART: [state] WD Timer not started. Device not locked for debugging
3,285,217 UART: [kat] SHA2-256
4,088,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,896 UART: [kat] ++
4,093,048 UART: [kat] sha1
4,097,366 UART: [kat] SHA2-256
4,099,306 UART: [kat] SHA2-384
4,101,941 UART: [kat] SHA2-512-ACC
4,103,841 UART: [kat] ECC-384
4,113,814 UART: [kat] HMAC-384Kdf
4,118,572 UART: [kat] LMS
4,366,884 UART: [kat] --
4,367,718 UART: [update-reset] ++
5,681,684 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,832,753 >>> mbox cmd response: success
Initializing fuses
5,833,173 UART:
5,833,189 UART: Running Caliptra ROM ...
5,833,597 UART:
5,833,739 UART: [state] CFI Enabled
5,836,417 UART: [state] LifecycleState = Unprovisioned
5,837,072 UART: [state] DebugLocked = No
5,837,574 UART: [state] WD Timer not started. Device not locked for debugging
5,838,879 UART: [kat] SHA2-256
6,642,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,646,558 UART: [kat] ++
6,646,710 UART: [kat] sha1
6,650,792 UART: [kat] SHA2-256
6,652,732 UART: [kat] SHA2-384
6,655,397 UART: [kat] SHA2-512-ACC
6,657,298 UART: [kat] ECC-384
6,666,971 UART: [kat] HMAC-384Kdf
6,671,599 UART: [kat] LMS
6,919,911 UART: [kat] --
6,920,855 UART: [warm-reset] ++
6,921,394 UART: [warm-reset] Prev Update Reset failed
6,922,455 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,055 >>> mbox cmd response: success
2,678,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,825 UART:
2,684,841 UART: Running Caliptra FMC ...
2,685,249 UART:
2,685,392 UART: [state] CFI Enabled
2,695,949 UART: [fht] FMC Alias Private Key: 7
2,804,076 UART: [art] Extend RT PCRs Done
2,804,504 UART: [art] Lock RT PCRs Done
2,806,090 UART: [art] Populate DV Done
2,814,329 UART: [fht] FMC Alias Private Key: 7
2,815,349 UART: [art] Derive CDI
2,815,629 UART: [art] Store in in slot 0x4
2,901,254 UART: [art] Derive Key Pair
2,901,614 UART: [art] Store priv key in slot 0x5
2,914,666 UART: [art] Derive Key Pair - Done
2,929,558 UART: [art] Signing Cert with AUTHO
2,930,038 UART: RITY.KEYID = 7
2,945,330 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,095 UART: [art] PUB.X = 182FFB97CAD55E06D472E917E8E91FA37570320883CB64CA6A447F086ADFAE6C0647B844ECB5BAA388EE3C057B49B600
2,952,840 UART: [art] PUB.Y = 687FC92090AE0490546923B57FB757B1496C3F03F03C9F35404A2EB283153C4887904423C88056A43AEE385685B863D8
2,959,770 UART: [art] SIG.R = AEEB01FD8D47B7F4AFB81E91F537CC95C352507DAC311B586FFEC7EC7D0704BD74DB8EF098708D3F7DDAFA15217D5DC4
2,966,557 UART: [art] SIG.S = 36E5AF3A40EC338B86EDD6859F8551CA9EBDB89B3A136A7835C6AD5D6194E144D34E046FA9787CE7BBD7629B9FD6D750
2,990,257 UART: Caliptra RT
2,990,603 UART: [state] CFI Enabled
3,098,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,395 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
191,540 UART:
191,914 UART: Running Caliptra ROM ...
193,054 UART:
193,205 UART: [state] CFI Enabled
262,158 UART: [state] LifecycleState = Production
264,404 UART: [state] DebugLocked = Yes
266,886 UART: [state] Starting the WD Timer 40000000 cycles
272,705 UART: [kat] SHA2-256
454,671 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,137 UART: [kat] ++
466,731 UART: [kat] sha1
476,642 UART: [kat] SHA2-256
479,650 UART: [kat] SHA2-384
485,986 UART: [kat] SHA2-512-ACC
488,564 UART: [kat] ECC-384
3,775,185 UART: [kat] HMAC-384Kdf
3,803,558 UART: [kat] LMS
4,876,713 UART: [kat] --
4,882,133 UART: [cold-reset] ++
4,884,705 UART: [fht] FHT @ 0x50003400
4,895,342 UART: [idev] ++
4,895,909 UART: [idev] CDI.KEYID = 6
4,897,153 UART: [idev] SUBJECT.KEYID = 7
4,898,322 UART: [idev] UDS.KEYID = 0
4,899,253 ready_for_fw is high
4,899,463 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,042,967 UART: [idev] Erasing UDS.KEYID = 0
8,244,503 UART: [idev] Sha1 KeyId Algorithm
8,267,342 UART: [idev] --
8,272,115 UART: [ldev] ++
8,272,788 UART: [ldev] CDI.KEYID = 6
8,273,841 UART: [ldev] SUBJECT.KEYID = 5
8,275,060 UART: [ldev] AUTHORITY.KEYID = 7
8,276,159 UART: [ldev] FE.KEYID = 1
8,317,879 UART: [ldev] Erasing FE.KEYID = 1
11,653,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,691 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,981,230 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,997,058 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,013,140 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,034,285 UART: [ldev] --
14,039,290 UART: [fwproc] Wait for Commands...
14,041,826 UART: [fwproc] Recv command 0x46574c44
14,044,135 UART: [fwproc] Recv'd Img size: 114036 bytes
18,150,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,218,803 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,287,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,604,099 >>> mbox cmd response: success
18,608,871 UART: [afmc] ++
18,609,473 UART: [afmc] CDI.KEYID = 6
18,610,585 UART: [afmc] SUBJECT.KEYID = 7
18,611,822 UART: [afmc] AUTHORITY.KEYID = 5
21,988,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,285,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,287,540 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,303,525 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,319,661 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,335,680 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,359,504 UART: [afmc] --
24,362,291 UART: [cold-reset] --
24,366,644 UART: [state] Locking Datavault
24,374,755 UART: [state] Locking PCR0, PCR1 and PCR31
24,376,400 UART: [state] Locking ICCM
24,378,008 UART: [exit] Launching FMC @ 0x40000130
24,386,687 UART:
24,386,920 UART: Running Caliptra FMC ...
24,388,014 UART:
24,388,192 UART: [state] CFI Enabled
24,445,419 UART: [fht] FMC Alias Private Key: 7
26,783,995 UART: [art] Extend RT PCRs Done
26,785,213 UART: [art] Lock RT PCRs Done
26,786,782 UART: [art] Populate DV Done
26,792,081 UART: [fht] FMC Alias Private Key: 7
26,793,781 UART: [art] Derive CDI
26,794,591 UART: [art] Store in in slot 0x4
26,853,316 UART: [art] Derive Key Pair
26,854,377 UART: [art] Store priv key in slot 0x5
30,147,130 UART: [art] Derive Key Pair - Done
30,159,965 UART: [art] Signing Cert with AUTHO
30,161,261 UART: RITY.KEYID = 7
32,448,532 UART: [art] Erasing AUTHORITY.KEYID = 7
32,450,043 UART: [art] PUB.X = 4281B8B90D99D5FE2CE46CFFD74A0825CB2F0C2662E6F4C46C123472DAAB67325B270F2B4A7D20F7BEC01ADEAB86382B
32,457,293 UART: [art] PUB.Y = 5F32B5429F3D6E8D430C50760539D040580F00E15A613C660E5096C2183156CE9DD29460D74FE334ABBC8D5465E3194B
32,464,484 UART: [art] SIG.R = D7263D92400D0CBC1A520D7D377F6E3A149BB4372B1BF1AE2FCA78C371EFE203E13C3176491C74DAE1F6513DC4495B0D
32,471,885 UART: [art] SIG.S = BF8D0DC19527063DF42790EE3DB00A2CB4CF078272A7059C59A0236F469F12A087E0030F26EE0C225547F329DEBB884B
33,776,953 UART: Caliptra RT
33,777,669 UART: [state] CFI Enabled
33,936,996 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,352 UART:
1,636 UART: Running Caliptra ROM ...
2,744 UART:
2,898 UART: [state] CFI Enabled
65,562 UART: [state] LifecycleState = Production
67,325 UART: [state] DebugLocked = Yes
68,634 UART: [state] Starting the WD Timer 40000000 cycles
73,741 UART: [kat] SHA2-256
255,688 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
267,169 UART: [kat] ++
267,688 UART: [kat] sha1
278,085 UART: [kat] SHA2-256
281,108 UART: [kat] SHA2-384
287,135 UART: [kat] SHA2-512-ACC
289,745 UART: [kat] ECC-384
3,579,802 UART: [kat] HMAC-384Kdf
3,602,679 UART: [kat] LMS
4,675,842 UART: [kat] --
4,683,289 UART: [warm-reset] ++
4,688,675 UART: [warm-reset] --
4,693,402 UART: [state] Locking Datavault
4,697,029 UART: [state] Locking PCR0, PCR1 and PCR31
4,699,232 UART: [state] Locking ICCM
4,700,741 UART: [exit] Launching FMC @ 0x40000130
4,709,364 UART:
4,709,593 UART: Running Caliptra FMC ...
4,710,717 UART:
4,710,874 UART: [state] CFI Enabled
4,767,626 UART: [aliasrt :skip pcr extension
4,768,911 UART: [art] Extend RT PCRs Done
4,770,054 UART: [art] Lock RT PCRs Done
4,771,335 UART: [art] Populate DV Done
4,776,629 UART: [fht] FMC Alias Private Key: 7
4,778,161 UART: [art] Derive CDI
4,778,971 UART: [art] Store in in slot 0x4
4,836,494 UART: [art] Derive Key Pair
4,837,520 UART: [art] Store priv key in slot 0x5
8,129,798 UART: [art] Derive Key Pair - Done
8,142,955 UART: [art] Signing Cert with AUTHO
8,144,256 UART: RITY.KEYID = 7
10,432,101 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,607 UART: [art] PUB.X = 4281B8B90D99D5FE2CE46CFFD74A0825CB2F0C2662E6F4C46C123472DAAB67325B270F2B4A7D20F7BEC01ADEAB86382B
10,440,865 UART: [art] PUB.Y = 5F32B5429F3D6E8D430C50760539D040580F00E15A613C660E5096C2183156CE9DD29460D74FE334ABBC8D5465E3194B
10,448,105 UART: [art] SIG.R = D7263D92400D0CBC1A520D7D377F6E3A149BB4372B1BF1AE2FCA78C371EFE203E13C3176491C74DAE1F6513DC4495B0D
10,455,496 UART: [art] SIG.S = BF8D0DC19527063DF42790EE3DB00A2CB4CF078272A7059C59A0236F469F12A087E0030F26EE0C225547F329DEBB884B
11,760,233 UART: Caliptra RT
11,760,942 UART: [state] CFI Enabled
12,089,884 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
191,865 UART:
192,225 UART: Running Caliptra ROM ...
193,409 UART:
193,559 UART: [state] CFI Enabled
261,097 UART: [state] LifecycleState = Production
263,244 UART: [state] DebugLocked = Yes
264,953 UART: [state] Starting the WD Timer 40000000 cycles
270,623 UART: [kat] SHA2-256
452,647 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,120 UART: [kat] ++
464,752 UART: [kat] sha1
475,163 UART: [kat] SHA2-256
478,170 UART: [kat] SHA2-384
484,226 UART: [kat] SHA2-512-ACC
486,811 UART: [kat] ECC-384
3,775,616 UART: [kat] HMAC-384Kdf
3,803,550 UART: [kat] LMS
4,876,690 UART: [kat] --
4,880,782 UART: [cold-reset] ++
4,883,496 UART: [fht] FHT @ 0x50003400
4,893,984 UART: [idev] ++
4,894,619 UART: [idev] CDI.KEYID = 6
4,895,862 UART: [idev] SUBJECT.KEYID = 7
4,897,030 UART: [idev] UDS.KEYID = 0
4,897,958 ready_for_fw is high
4,898,142 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,041,558 UART: [idev] Erasing UDS.KEYID = 0
8,242,467 UART: [idev] Sha1 KeyId Algorithm
8,264,417 UART: [idev] --
8,268,471 UART: [ldev] ++
8,269,146 UART: [ldev] CDI.KEYID = 6
8,270,300 UART: [ldev] SUBJECT.KEYID = 5
8,271,515 UART: [ldev] AUTHORITY.KEYID = 7
8,272,611 UART: [ldev] FE.KEYID = 1
8,317,799 UART: [ldev] Erasing FE.KEYID = 1
11,655,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,370 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,981,711 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,997,694 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,013,823 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,033,405 UART: [ldev] --
14,038,397 UART: [fwproc] Wait for Commands...
14,041,156 UART: [fwproc] Recv command 0x46574c44
14,043,469 UART: [fwproc] Recv'd Img size: 114036 bytes
18,152,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,223,215 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,291,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,608,534 >>> mbox cmd response: success
18,613,027 UART: [afmc] ++
18,613,615 UART: [afmc] CDI.KEYID = 6
18,614,725 UART: [afmc] SUBJECT.KEYID = 7
18,615,942 UART: [afmc] AUTHORITY.KEYID = 5
21,988,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,287,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,289,569 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,305,575 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,321,668 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,337,749 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,359,775 UART: [afmc] --
24,362,757 UART: [cold-reset] --
24,365,914 UART: [state] Locking Datavault
24,373,053 UART: [state] Locking PCR0, PCR1 and PCR31
24,374,693 UART: [state] Locking ICCM
24,377,249 UART: [exit] Launching FMC @ 0x40000130
24,385,923 UART:
24,386,193 UART: Running Caliptra FMC ...
24,387,224 UART:
24,387,369 UART: [state] CFI Enabled
24,446,273 UART: [fht] FMC Alias Private Key: 7
26,784,721 UART: [art] Extend RT PCRs Done
26,785,941 UART: [art] Lock RT PCRs Done
26,787,514 UART: [art] Populate DV Done
26,793,037 UART: [fht] FMC Alias Private Key: 7
26,794,519 UART: [art] Derive CDI
26,795,297 UART: [art] Store in in slot 0x4
26,855,204 UART: [art] Derive Key Pair
26,856,199 UART: [art] Store priv key in slot 0x5
30,148,797 UART: [art] Derive Key Pair - Done
30,161,480 UART: [art] Signing Cert with AUTHO
30,162,789 UART: RITY.KEYID = 7
32,451,168 UART: [art] Erasing AUTHORITY.KEYID = 7
32,452,678 UART: [art] PUB.X = 82F5396454FC434E8CCB4EE0C1FD44D2460E0B1DD3E842D5BFCA277EB01ADE720C5BE8559392A4FACF8C0BD830ED8878
32,459,978 UART: [art] PUB.Y = 64D73FBC7865930326B2540E8F257B67AD2591F89A1300FA9AB5372B1EE952CBC8AF1443B2D8746A84691D381A1F82C5
32,467,199 UART: [art] SIG.R = 0149883ADA0DC6446E614B8687F3C9CD6CEFA045E317C5C3F7C294ED47F98CE8EC090526423E1E56FEFA27D5B5E7411D
32,474,603 UART: [art] SIG.S = B51BEFAD335AAE7B82F8999B54D43DE6A4E01C7F59269417CBD8A4CFF5627C0C05082EDEAB1571D6B0A7D6F17D74A05A
33,779,083 UART: Caliptra RT
33,779,772 UART: [state] CFI Enabled
33,941,634 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,310 UART:
1,614 UART: Running Caliptra ROM ...
2,727 UART:
2,880 UART: [state] CFI Enabled
66,672 UART: [state] LifecycleState = Production
68,456 UART: [state] DebugLocked = Yes
70,420 UART: [state] Starting the WD Timer 40000000 cycles
75,924 UART: [kat] SHA2-256
257,899 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
269,378 UART: [kat] ++
269,877 UART: [kat] sha1
279,403 UART: [kat] SHA2-256
282,447 UART: [kat] SHA2-384
286,912 UART: [kat] SHA2-512-ACC
289,518 UART: [kat] ECC-384
3,576,386 UART: [kat] HMAC-384Kdf
3,603,142 UART: [kat] LMS
4,676,338 UART: [kat] --
4,681,912 UART: [warm-reset] ++
4,686,984 UART: [warm-reset] --
4,692,099 UART: [state] Locking Datavault
4,695,840 UART: [state] Locking PCR0, PCR1 and PCR31
4,698,032 UART: [state] Locking ICCM
4,700,562 UART: [exit] Launching FMC @ 0x40000130
4,709,177 UART:
4,709,417 UART: Running Caliptra FMC ...
4,710,516 UART:
4,710,672 UART: [state] CFI Enabled
4,768,127 UART: [aliasrt :skip pcr extension
4,769,424 UART: [art] Extend RT PCRs Done
4,770,570 UART: [art] Lock RT PCRs Done
4,771,639 UART: [art] Populate DV Done
4,777,205 UART: [fht] FMC Alias Private Key: 7
4,778,806 UART: [art] Derive CDI
4,779,619 UART: [art] Store in in slot 0x4
4,836,817 UART: [art] Derive Key Pair
4,837,859 UART: [art] Store priv key in slot 0x5
8,130,757 UART: [art] Derive Key Pair - Done
8,143,864 UART: [art] Signing Cert with AUTHO
8,145,164 UART: RITY.KEYID = 7
10,432,951 UART: [art] Erasing AUTHORITY.KEYID = 7
10,434,452 UART: [art] PUB.X = 82F5396454FC434E8CCB4EE0C1FD44D2460E0B1DD3E842D5BFCA277EB01ADE720C5BE8559392A4FACF8C0BD830ED8878
10,441,744 UART: [art] PUB.Y = 64D73FBC7865930326B2540E8F257B67AD2591F89A1300FA9AB5372B1EE952CBC8AF1443B2D8746A84691D381A1F82C5
10,448,934 UART: [art] SIG.R = 0149883ADA0DC6446E614B8687F3C9CD6CEFA045E317C5C3F7C294ED47F98CE8EC090526423E1E56FEFA27D5B5E7411D
10,456,331 UART: [art] SIG.S = B51BEFAD335AAE7B82F8999B54D43DE6A4E01C7F59269417CBD8A4CFF5627C0C05082EDEAB1571D6B0A7D6F17D74A05A
11,761,132 UART: Caliptra RT
11,761,834 UART: [state] CFI Enabled
12,094,034 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
191,738 UART:
192,113 UART: Running Caliptra ROM ...
193,278 UART:
602,794 UART: [state] CFI Enabled
620,729 UART: [state] LifecycleState = Production
622,954 UART: [state] DebugLocked = Yes
625,090 UART: [state] Starting the WD Timer 40000000 cycles
630,049 UART: [kat] SHA2-256
812,003 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,556 UART: [kat] ++
824,156 UART: [kat] sha1
834,275 UART: [kat] SHA2-256
837,282 UART: [kat] SHA2-384
843,690 UART: [kat] SHA2-512-ACC
846,261 UART: [kat] ECC-384
4,102,737 UART: [kat] HMAC-384Kdf
4,115,744 UART: [kat] LMS
5,188,881 UART: [kat] --
5,194,414 UART: [cold-reset] ++
5,195,574 UART: [fht] FHT @ 0x50003400
5,206,828 UART: [idev] ++
5,207,526 UART: [idev] CDI.KEYID = 6
5,208,693 UART: [idev] SUBJECT.KEYID = 7
5,210,141 UART: [idev] UDS.KEYID = 0
5,211,315 ready_for_fw is high
5,211,508 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,354,783 UART: [idev] Erasing UDS.KEYID = 0
8,504,903 UART: [idev] Sha1 KeyId Algorithm
8,527,629 UART: [idev] --
8,531,275 UART: [ldev] ++
8,531,912 UART: [ldev] CDI.KEYID = 6
8,533,095 UART: [ldev] SUBJECT.KEYID = 5
8,534,251 UART: [ldev] AUTHORITY.KEYID = 7
8,535,475 UART: [ldev] FE.KEYID = 1
8,549,063 UART: [ldev] Erasing FE.KEYID = 1
11,843,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,136,773 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,153,108 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,169,084 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,185,204 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,204,669 UART: [ldev] --
14,210,155 UART: [fwproc] Wait for Commands...
14,212,190 UART: [fwproc] Recv command 0x46574c44
14,214,455 UART: [fwproc] Recv'd Img size: 114036 bytes
18,316,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,386,787 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,455,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,773,033 >>> mbox cmd response: success
18,776,350 UART: [afmc] ++
18,776,947 UART: [afmc] CDI.KEYID = 6
18,778,150 UART: [afmc] SUBJECT.KEYID = 7
18,779,251 UART: [afmc] AUTHORITY.KEYID = 5
22,094,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,389,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,391,661 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,407,651 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,423,784 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,439,798 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,462,722 UART: [afmc] --
24,466,097 UART: [cold-reset] --
24,468,839 UART: [state] Locking Datavault
24,476,247 UART: [state] Locking PCR0, PCR1 and PCR31
24,477,938 UART: [state] Locking ICCM
24,480,087 UART: [exit] Launching FMC @ 0x40000130
24,488,757 UART:
24,488,994 UART: Running Caliptra FMC ...
24,490,109 UART:
24,490,278 UART: [state] CFI Enabled
24,498,484 UART: [fht] FMC Alias Private Key: 7
26,829,009 UART: [art] Extend RT PCRs Done
26,830,225 UART: [art] Lock RT PCRs Done
26,831,847 UART: [art] Populate DV Done
26,837,305 UART: [fht] FMC Alias Private Key: 7
26,839,060 UART: [art] Derive CDI
26,839,874 UART: [art] Store in in slot 0x4
26,882,429 UART: [art] Derive Key Pair
26,883,474 UART: [art] Store priv key in slot 0x5
30,125,402 UART: [art] Derive Key Pair - Done
30,138,397 UART: [art] Signing Cert with AUTHO
30,139,730 UART: RITY.KEYID = 7
32,419,103 UART: [art] Erasing AUTHORITY.KEYID = 7
32,420,608 UART: [art] PUB.X = BAE2CA476511D0627ECDDF6116F13D4E4CF8D59CBA0CB8A59DDCB773616BB6E736C31C7314928ABB6D356643C948BCC9
32,427,871 UART: [art] PUB.Y = D103228B9C57BAE0B6C8137552068A6A039457CA83DC054CFD144D8B90A212D5E80C199BA172CA2122522F995D210A99
32,435,104 UART: [art] SIG.R = 4D38B468AB37FA7F70A0BB134D741A7FB37371C9692E40756A01C527EF32A402159AAA3C2C0550E49F934CF475B93D06
32,442,431 UART: [art] SIG.S = 60D43E9B540CB6D127AC822EEA2E2C9BB890196DE0E346F4541702D4D730E933BF3FC5EA4118948C7FCEE07A7BADE537
33,747,607 UART: Caliptra RT
33,748,335 UART: [state] CFI Enabled
33,866,478 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,320 UART:
1,599 UART: Running Caliptra ROM ...
2,648 UART:
6,665,834 UART: [state] CFI Enabled
6,676,985 UART: [state] LifecycleState = Production
6,678,731 UART: [state] DebugLocked = Yes
6,680,255 UART: [state] Starting the WD Timer 40000000 cycles
6,686,297 UART: [kat] SHA2-256
6,868,274 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,879,795 UART: [kat] ++
6,880,331 UART: [kat] sha1
6,891,330 UART: [kat] SHA2-256
6,894,401 UART: [kat] SHA2-384
6,899,843 UART: [kat] SHA2-512-ACC
6,902,447 UART: [kat] ECC-384
10,157,636 UART: [kat] HMAC-384Kdf
10,168,032 UART: [kat] LMS
11,241,167 UART: [kat] --
11,246,357 UART: [warm-reset] ++
11,252,498 UART: [warm-reset] --
11,255,933 UART: [state] Locking Datavault
11,259,182 UART: [state] Locking PCR0, PCR1 and PCR31
11,261,369 UART: [state] Locking ICCM
11,263,295 UART: [exit] Launching FMC @ 0x40000130
11,271,968 UART:
11,272,217 UART: Running Caliptra FMC ...
11,273,311 UART:
11,273,462 UART: [state] CFI Enabled
11,275,245 UART: [aliasrt :skip pcr extension
11,276,491 UART: [art] Extend RT PCRs Done
11,277,618 UART: [art] Lock RT PCRs Done
11,278,835 UART: [art] Populate DV Done
11,284,501 UART: [fht] FMC Alias Private Key: 7
11,286,134 UART: [art] Derive CDI
11,286,938 UART: [art] Store in in slot 0x4
11,329,531 UART: [art] Derive Key Pair
11,330,571 UART: [art] Store priv key in slot 0x5
14,572,688 UART: [art] Derive Key Pair - Done
14,585,689 UART: [art] Signing Cert with AUTHO
14,587,017 UART: RITY.KEYID = 7
16,866,735 UART: [art] Erasing AUTHORITY.KEYID = 7
16,868,257 UART: [art] PUB.X = BAE2CA476511D0627ECDDF6116F13D4E4CF8D59CBA0CB8A59DDCB773616BB6E736C31C7314928ABB6D356643C948BCC9
16,875,512 UART: [art] PUB.Y = D103228B9C57BAE0B6C8137552068A6A039457CA83DC054CFD144D8B90A212D5E80C199BA172CA2122522F995D210A99
16,882,740 UART: [art] SIG.R = 4D38B468AB37FA7F70A0BB134D741A7FB37371C9692E40756A01C527EF32A402159AAA3C2C0550E49F934CF475B93D06
16,890,070 UART: [art] SIG.S = 60D43E9B540CB6D127AC822EEA2E2C9BB890196DE0E346F4541702D4D730E933BF3FC5EA4118948C7FCEE07A7BADE537
18,195,361 UART: Caliptra RT
18,196,075 UART: [state] CFI Enabled
18,488,833 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,548 writing to cptra_bootfsm_go
193,148 UART:
193,492 UART: Running Caliptra ROM ...
194,596 UART:
604,439 UART: [state] CFI Enabled
614,400 UART: [state] LifecycleState = Production
616,600 UART: [state] DebugLocked = Yes
619,356 UART: [state] Starting the WD Timer 40000000 cycles
624,237 UART: [kat] SHA2-256
806,217 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,701 UART: [kat] ++
818,218 UART: [kat] sha1
828,257 UART: [kat] SHA2-256
831,268 UART: [kat] SHA2-384
838,321 UART: [kat] SHA2-512-ACC
840,971 UART: [kat] ECC-384
4,095,849 UART: [kat] HMAC-384Kdf
4,108,088 UART: [kat] LMS
5,181,263 UART: [kat] --
5,185,980 UART: [cold-reset] ++
5,188,796 UART: [fht] FHT @ 0x50003400
5,201,123 UART: [idev] ++
5,201,750 UART: [idev] CDI.KEYID = 6
5,203,254 UART: [idev] SUBJECT.KEYID = 7
5,204,396 UART: [idev] UDS.KEYID = 0
5,205,678 ready_for_fw is high
5,205,860 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,348,915 UART: [idev] Erasing UDS.KEYID = 0
8,495,618 UART: [idev] Sha1 KeyId Algorithm
8,517,923 UART: [idev] --
8,522,662 UART: [ldev] ++
8,523,235 UART: [ldev] CDI.KEYID = 6
8,524,413 UART: [ldev] SUBJECT.KEYID = 5
8,525,568 UART: [ldev] AUTHORITY.KEYID = 7
8,526,795 UART: [ldev] FE.KEYID = 1
8,539,275 UART: [ldev] Erasing FE.KEYID = 1
11,832,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,082 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,143,400 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,159,428 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,175,538 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,194,922 UART: [ldev] --
14,200,130 UART: [fwproc] Wait for Commands...
14,202,380 UART: [fwproc] Recv command 0x46574c44
14,204,691 UART: [fwproc] Recv'd Img size: 114036 bytes
18,300,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,377,007 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,445,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,762,536 >>> mbox cmd response: success
18,767,356 UART: [afmc] ++
18,767,945 UART: [afmc] CDI.KEYID = 6
18,769,108 UART: [afmc] SUBJECT.KEYID = 7
18,770,342 UART: [afmc] AUTHORITY.KEYID = 5
22,086,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,382,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,384,417 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,400,430 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,416,514 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,432,567 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,454,776 UART: [afmc] --
24,459,056 UART: [cold-reset] --
24,464,065 UART: [state] Locking Datavault
24,471,263 UART: [state] Locking PCR0, PCR1 and PCR31
24,472,897 UART: [state] Locking ICCM
24,474,814 UART: [exit] Launching FMC @ 0x40000130
24,483,491 UART:
24,483,763 UART: Running Caliptra FMC ...
24,484,870 UART:
24,485,040 UART: [state] CFI Enabled
24,492,981 UART: [fht] FMC Alias Private Key: 7
26,823,881 UART: [art] Extend RT PCRs Done
26,825,096 UART: [art] Lock RT PCRs Done
26,827,004 UART: [art] Populate DV Done
26,832,423 UART: [fht] FMC Alias Private Key: 7
26,834,069 UART: [art] Derive CDI
26,834,886 UART: [art] Store in in slot 0x4
26,877,313 UART: [art] Derive Key Pair
26,878,309 UART: [art] Store priv key in slot 0x5
30,120,387 UART: [art] Derive Key Pair - Done
30,133,333 UART: [art] Signing Cert with AUTHO
30,134,625 UART: RITY.KEYID = 7
32,414,057 UART: [art] Erasing AUTHORITY.KEYID = 7
32,415,572 UART: [art] PUB.X = DA438CA020CA023EF276109D5226D59F1C995505120D1E5306FA5697AF6A99573B676D47E300258097A79D2C88A99624
32,422,774 UART: [art] PUB.Y = D765C3522C46AD300C99F809FB9E7A5D96EC897CA797BE7486060BC381C4EBBE98B89400C405120AE53BD1FF2ACB96E1
32,430,048 UART: [art] SIG.R = 02BD0505A5B2F92A1CFADFCDA254FE4F538E047E23FBBE811048554A84E090BD097A5AE2B96DAA0A7FCAA1A1B9643DBC
32,437,418 UART: [art] SIG.S = F7A9D2086E59A5573FA4300A294E3DFFC6744E863822ABEC3839820D989DD590537A31EF6D3EB7F251AEE76AED540767
33,742,620 UART: Caliptra RT
33,743,329 UART: [state] CFI Enabled
33,860,171 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,303 UART:
1,594 UART: Running Caliptra ROM ...
2,616 UART:
6,676,162 UART: [state] CFI Enabled
6,689,336 UART: [state] LifecycleState = Production
6,691,089 UART: [state] DebugLocked = Yes
6,693,829 UART: [state] Starting the WD Timer 40000000 cycles
6,698,893 UART: [kat] SHA2-256
6,880,890 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,892,430 UART: [kat] ++
6,892,964 UART: [kat] sha1
6,904,335 UART: [kat] SHA2-256
6,907,405 UART: [kat] SHA2-384
6,913,869 UART: [kat] SHA2-512-ACC
6,916,499 UART: [kat] ECC-384
10,172,881 UART: [kat] HMAC-384Kdf
10,184,188 UART: [kat] LMS
11,257,337 UART: [kat] --
11,262,225 UART: [warm-reset] ++
11,266,519 UART: [warm-reset] --
11,270,124 UART: [state] Locking Datavault
11,274,193 UART: [state] Locking PCR0, PCR1 and PCR31
11,276,339 UART: [state] Locking ICCM
11,278,201 UART: [exit] Launching FMC @ 0x40000130
11,286,870 UART:
11,287,099 UART: Running Caliptra FMC ...
11,288,144 UART:
11,288,286 UART: [state] CFI Enabled
11,290,227 UART: [aliasrt :skip pcr extension
11,291,466 UART: [art] Extend RT PCRs Done
11,292,596 UART: [art] Lock RT PCRs Done
11,293,714 UART: [art] Populate DV Done
11,299,438 UART: [fht] FMC Alias Private Key: 7
11,301,019 UART: [art] Derive CDI
11,301,829 UART: [art] Store in in slot 0x4
11,344,426 UART: [art] Derive Key Pair
11,345,467 UART: [art] Store priv key in slot 0x5
14,587,637 UART: [art] Derive Key Pair - Done
14,600,519 UART: [art] Signing Cert with AUTHO
14,601,822 UART: RITY.KEYID = 7
16,881,231 UART: [art] Erasing AUTHORITY.KEYID = 7
16,882,738 UART: [art] PUB.X = DA438CA020CA023EF276109D5226D59F1C995505120D1E5306FA5697AF6A99573B676D47E300258097A79D2C88A99624
16,889,969 UART: [art] PUB.Y = D765C3522C46AD300C99F809FB9E7A5D96EC897CA797BE7486060BC381C4EBBE98B89400C405120AE53BD1FF2ACB96E1
16,897,181 UART: [art] SIG.R = 02BD0505A5B2F92A1CFADFCDA254FE4F538E047E23FBBE811048554A84E090BD097A5AE2B96DAA0A7FCAA1A1B9643DBC
16,904,593 UART: [art] SIG.S = F7A9D2086E59A5573FA4300A294E3DFFC6744E863822ABEC3839820D989DD590537A31EF6D3EB7F251AEE76AED540767
18,210,252 UART: Caliptra RT
18,210,953 UART: [state] CFI Enabled
18,499,124 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
191,591 UART:
191,965 UART: Running Caliptra ROM ...
193,063 UART:
193,231 UART: [state] CFI Enabled
264,035 UART: [state] LifecycleState = Production
265,777 UART: [state] DebugLocked = Yes
268,628 UART: [state] Starting the WD Timer 40000000 cycles
273,232 UART: [kat] SHA2-256
452,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,946 UART: [kat] ++
464,479 UART: [kat] sha1
474,769 UART: [kat] SHA2-256
477,796 UART: [kat] SHA2-384
484,081 UART: [kat] SHA2-512-ACC
487,027 UART: [kat] ECC-384
2,948,285 UART: [kat] HMAC-384Kdf
2,969,397 UART: [kat] LMS
3,498,879 UART: [kat] --
3,503,794 UART: [cold-reset] ++
3,504,907 UART: [fht] FHT @ 0x50003400
3,516,220 UART: [idev] ++
3,516,793 UART: [idev] CDI.KEYID = 6
3,517,698 UART: [idev] SUBJECT.KEYID = 7
3,518,878 UART: [idev] UDS.KEYID = 0
3,519,798 ready_for_fw is high
3,519,984 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,672 UART: [idev] Erasing UDS.KEYID = 0
6,028,013 UART: [idev] Sha1 KeyId Algorithm
6,050,398 UART: [idev] --
6,054,234 UART: [ldev] ++
6,054,806 UART: [ldev] CDI.KEYID = 6
6,055,721 UART: [ldev] SUBJECT.KEYID = 5
6,056,886 UART: [ldev] AUTHORITY.KEYID = 7
6,058,122 UART: [ldev] FE.KEYID = 1
6,100,046 UART: [ldev] Erasing FE.KEYID = 1
8,606,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,298 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,281 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,151 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,082 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,646 UART: [ldev] --
10,412,571 UART: [fwproc] Wait for Commands...
10,414,182 UART: [fwproc] Recv command 0x46574c44
10,416,275 UART: [fwproc] Recv'd Img size: 114360 bytes
13,847,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,986,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,304,867 >>> mbox cmd response: success
14,309,633 UART: [afmc] ++
14,310,230 UART: [afmc] CDI.KEYID = 6
14,311,139 UART: [afmc] SUBJECT.KEYID = 7
14,312,318 UART: [afmc] AUTHORITY.KEYID = 5
16,849,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,931 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,590,914 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,606,784 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,622,542 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,644,819 UART: [afmc] --
18,648,094 UART: [cold-reset] --
18,652,508 UART: [state] Locking Datavault
18,657,058 UART: [state] Locking PCR0, PCR1 and PCR31
18,658,705 UART: [state] Locking ICCM
18,660,210 UART: [exit] Launching FMC @ 0x40000130
18,668,659 UART:
18,668,902 UART: Running Caliptra FMC ...
18,670,006 UART:
18,670,193 UART: [state] CFI Enabled
18,729,806 UART: [fht] FMC Alias Private Key: 7
20,494,159 UART: [art] Extend RT PCRs Done
20,495,384 UART: [art] Lock RT PCRs Done
20,497,275 UART: [art] Populate DV Done
20,502,795 UART: [fht] FMC Alias Private Key: 7
20,504,332 UART: [art] Derive CDI
20,505,145 UART: [art] Store in in slot 0x4
20,562,507 UART: [art] Derive Key Pair
20,563,546 UART: [art] Store priv key in slot 0x5
23,026,251 UART: [art] Derive Key Pair - Done
23,039,305 UART: [art] Signing Cert with AUTHO
23,040,620 UART: RITY.KEYID = 7
24,751,717 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,203 UART: [art] PUB.X = 5EC7590563FBCD5890989F90E4D49EDAD0FAF6D06EB25AFC65E5F25D4763717EF2F30F5630542E9068D079A5E277351D
24,760,443 UART: [art] PUB.Y = 01D3FE6B2B91D955350AB028451DCAB982491A11060ED75E928EFA6E9511BDD354B8AFEF052DDBF1A083CE87F329F2F8
24,767,744 UART: [art] SIG.R = 1E75139BF97A3E2A56BA97DC3FA46BAE2E94034F7CCC96870B47CE47F1537B40C251583374F70D09F1A77339C6CED981
24,775,148 UART: [art] SIG.S = 1F456EE01C768A8FBDCF5131CC303991AE73B8F424772A6B94691C6C2EC63C42C41E6D3282E11B1BC844020F58BB7469
25,753,854 UART: Caliptra RT
25,754,573 UART: [state] CFI Enabled
25,918,770 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,311 UART:
1,593 UART: Running Caliptra ROM ...
2,819 UART:
2,973 UART: [state] CFI Enabled
65,470 UART: [state] LifecycleState = Production
67,235 UART: [state] DebugLocked = Yes
69,219 UART: [state] Starting the WD Timer 40000000 cycles
74,704 UART: [kat] SHA2-256
253,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,428 UART: [kat] ++
265,892 UART: [kat] sha1
277,146 UART: [kat] SHA2-256
280,208 UART: [kat] SHA2-384
286,287 UART: [kat] SHA2-512-ACC
289,272 UART: [kat] ECC-384
2,747,433 UART: [kat] HMAC-384Kdf
2,771,057 UART: [kat] LMS
3,300,561 UART: [kat] --
3,304,498 UART: [warm-reset] ++
3,307,770 UART: [warm-reset] --
3,311,846 UART: [state] Locking Datavault
3,314,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,582 UART: [state] Locking ICCM
3,318,030 UART: [exit] Launching FMC @ 0x40000130
3,326,486 UART:
3,326,723 UART: Running Caliptra FMC ...
3,327,843 UART:
3,328,003 UART: [state] CFI Enabled
3,380,808 UART: [aliasrt :skip pcr extension
3,382,127 UART: [art] Extend RT PCRs Done
3,383,284 UART: [art] Lock RT PCRs Done
3,384,407 UART: [art] Populate DV Done
3,389,816 UART: [fht] FMC Alias Private Key: 7
3,391,512 UART: [art] Derive CDI
3,392,325 UART: [art] Store in in slot 0x4
3,449,047 UART: [art] Derive Key Pair
3,450,092 UART: [art] Store priv key in slot 0x5
5,913,331 UART: [art] Derive Key Pair - Done
5,926,432 UART: [art] Signing Cert with AUTHO
5,927,747 UART: RITY.KEYID = 7
7,638,839 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,349 UART: [art] PUB.X = 5EC7590563FBCD5890989F90E4D49EDAD0FAF6D06EB25AFC65E5F25D4763717EF2F30F5630542E9068D079A5E277351D
7,647,673 UART: [art] PUB.Y = 01D3FE6B2B91D955350AB028451DCAB982491A11060ED75E928EFA6E9511BDD354B8AFEF052DDBF1A083CE87F329F2F8
7,654,905 UART: [art] SIG.R = 1E75139BF97A3E2A56BA97DC3FA46BAE2E94034F7CCC96870B47CE47F1537B40C251583374F70D09F1A77339C6CED981
7,662,306 UART: [art] SIG.S = 1F456EE01C768A8FBDCF5131CC303991AE73B8F424772A6B94691C6C2EC63C42C41E6D3282E11B1BC844020F58BB7469
8,641,047 UART: Caliptra RT
8,641,742 UART: [state] CFI Enabled
8,970,730 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
191,588 UART:
191,963 UART: Running Caliptra ROM ...
193,059 UART:
193,204 UART: [state] CFI Enabled
264,069 UART: [state] LifecycleState = Production
265,820 UART: [state] DebugLocked = Yes
267,166 UART: [state] Starting the WD Timer 40000000 cycles
272,258 UART: [kat] SHA2-256
451,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,013 UART: [kat] ++
463,462 UART: [kat] sha1
473,218 UART: [kat] SHA2-256
476,233 UART: [kat] SHA2-384
481,303 UART: [kat] SHA2-512-ACC
484,237 UART: [kat] ECC-384
2,946,497 UART: [kat] HMAC-384Kdf
2,971,234 UART: [kat] LMS
3,500,736 UART: [kat] --
3,505,047 UART: [cold-reset] ++
3,507,345 UART: [fht] FHT @ 0x50003400
3,517,194 UART: [idev] ++
3,517,761 UART: [idev] CDI.KEYID = 6
3,518,686 UART: [idev] SUBJECT.KEYID = 7
3,519,858 UART: [idev] UDS.KEYID = 0
3,520,783 ready_for_fw is high
3,520,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,971 UART: [idev] Erasing UDS.KEYID = 0
6,036,986 UART: [idev] Sha1 KeyId Algorithm
6,060,324 UART: [idev] --
6,063,457 UART: [ldev] ++
6,064,031 UART: [ldev] CDI.KEYID = 6
6,064,952 UART: [ldev] SUBJECT.KEYID = 5
6,066,121 UART: [ldev] AUTHORITY.KEYID = 7
6,067,351 UART: [ldev] FE.KEYID = 1
6,113,701 UART: [ldev] Erasing FE.KEYID = 1
8,618,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,689 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,369,671 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,385,538 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,401,469 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,422,605 UART: [ldev] --
10,427,354 UART: [fwproc] Wait for Commands...
10,429,997 UART: [fwproc] Recv command 0x46574c44
10,432,093 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,016,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,334,333 >>> mbox cmd response: success
14,338,634 UART: [afmc] ++
14,339,227 UART: [afmc] CDI.KEYID = 6
14,340,109 UART: [afmc] SUBJECT.KEYID = 7
14,341,324 UART: [afmc] AUTHORITY.KEYID = 5
16,878,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,604,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,606,809 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,622,791 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,638,659 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,654,418 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,676,128 UART: [afmc] --
18,679,166 UART: [cold-reset] --
18,682,539 UART: [state] Locking Datavault
18,686,869 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,510 UART: [state] Locking ICCM
18,689,820 UART: [exit] Launching FMC @ 0x40000130
18,698,216 UART:
18,698,452 UART: Running Caliptra FMC ...
18,699,554 UART:
18,699,707 UART: [state] CFI Enabled
18,764,351 UART: [fht] FMC Alias Private Key: 7
20,528,268 UART: [art] Extend RT PCRs Done
20,529,487 UART: [art] Lock RT PCRs Done
20,531,168 UART: [art] Populate DV Done
20,536,471 UART: [fht] FMC Alias Private Key: 7
20,538,198 UART: [art] Derive CDI
20,539,017 UART: [art] Store in in slot 0x4
20,598,220 UART: [art] Derive Key Pair
20,599,260 UART: [art] Store priv key in slot 0x5
23,061,946 UART: [art] Derive Key Pair - Done
23,075,371 UART: [art] Signing Cert with AUTHO
23,076,683 UART: RITY.KEYID = 7
24,787,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,468 UART: [art] PUB.X = A3EAEAAC038756176E01E0FC6AF9DAD0C4CBF5848560827D41FEDBC080404A5EFE08B740115ADBC602B34F276A172876
24,796,722 UART: [art] PUB.Y = 1B6E0860CFEA474EBDBF0E0223DDD85026B4F93B35F7002E9EB06442714D879324DA20D4884B9D1C84347240F90FB34F
24,803,962 UART: [art] SIG.R = 19A90FFA50260ECD11714A8A04043AD5BB6A3D3A94B99AF09DFA80CF6A2FE95593CC189D411BA6CFD926345E170A9A8C
24,811,356 UART: [art] SIG.S = 6E8AF91CB54C1CE07FDA59691F3F47B954C1837E16BB73D1A704E2D1B29E4ABB6E46F4C57C5C60C2916A4D78F7959681
25,790,629 UART: Caliptra RT
25,791,330 UART: [state] CFI Enabled
25,956,547 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,302 UART:
1,589 UART: Running Caliptra ROM ...
2,703 UART:
2,858 UART: [state] CFI Enabled
61,101 UART: [state] LifecycleState = Production
62,861 UART: [state] DebugLocked = Yes
65,789 UART: [state] Starting the WD Timer 40000000 cycles
70,462 UART: [kat] SHA2-256
249,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,189 UART: [kat] ++
261,722 UART: [kat] sha1
272,223 UART: [kat] SHA2-256
275,278 UART: [kat] SHA2-384
280,006 UART: [kat] SHA2-512-ACC
282,953 UART: [kat] ECC-384
2,749,077 UART: [kat] HMAC-384Kdf
2,771,371 UART: [kat] LMS
3,300,877 UART: [kat] --
3,303,622 UART: [warm-reset] ++
3,308,088 UART: [warm-reset] --
3,311,519 UART: [state] Locking Datavault
3,314,770 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,415 UART: [state] Locking ICCM
3,318,891 UART: [exit] Launching FMC @ 0x40000130
3,327,355 UART:
3,327,593 UART: Running Caliptra FMC ...
3,328,695 UART:
3,328,850 UART: [state] CFI Enabled
3,380,134 UART: [aliasrt :skip pcr extension
3,381,426 UART: [art] Extend RT PCRs Done
3,382,572 UART: [art] Lock RT PCRs Done
3,383,639 UART: [art] Populate DV Done
3,389,227 UART: [fht] FMC Alias Private Key: 7
3,390,763 UART: [art] Derive CDI
3,391,581 UART: [art] Store in in slot 0x4
3,448,672 UART: [art] Derive Key Pair
3,449,711 UART: [art] Store priv key in slot 0x5
5,912,625 UART: [art] Derive Key Pair - Done
5,925,955 UART: [art] Signing Cert with AUTHO
5,927,266 UART: RITY.KEYID = 7
7,638,050 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,555 UART: [art] PUB.X = A3EAEAAC038756176E01E0FC6AF9DAD0C4CBF5848560827D41FEDBC080404A5EFE08B740115ADBC602B34F276A172876
7,646,794 UART: [art] PUB.Y = 1B6E0860CFEA474EBDBF0E0223DDD85026B4F93B35F7002E9EB06442714D879324DA20D4884B9D1C84347240F90FB34F
7,654,031 UART: [art] SIG.R = 19A90FFA50260ECD11714A8A04043AD5BB6A3D3A94B99AF09DFA80CF6A2FE95593CC189D411BA6CFD926345E170A9A8C
7,661,518 UART: [art] SIG.S = 6E8AF91CB54C1CE07FDA59691F3F47B954C1837E16BB73D1A704E2D1B29E4ABB6E46F4C57C5C60C2916A4D78F7959681
8,640,593 UART: Caliptra RT
8,641,304 UART: [state] CFI Enabled
8,976,103 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
191,649 UART:
192,023 UART: Running Caliptra ROM ...
193,366 UART:
193,519 UART: [state] CFI Enabled
266,255 UART: [state] LifecycleState = Production
268,017 UART: [state] DebugLocked = Yes
269,783 UART: [state] Starting the WD Timer 40000000 cycles
274,307 UART: [kat] SHA2-256
453,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,040 UART: [kat] ++
465,493 UART: [kat] sha1
476,744 UART: [kat] SHA2-256
479,762 UART: [kat] SHA2-384
486,467 UART: [kat] SHA2-512-ACC
489,429 UART: [kat] ECC-384
2,947,289 UART: [kat] HMAC-384Kdf
2,970,891 UART: [kat] LMS
3,500,383 UART: [kat] --
3,504,188 UART: [cold-reset] ++
3,505,270 UART: [fht] FHT @ 0x50003400
3,516,242 UART: [idev] ++
3,516,807 UART: [idev] CDI.KEYID = 6
3,517,708 UART: [idev] SUBJECT.KEYID = 7
3,518,951 UART: [idev] UDS.KEYID = 0
3,519,852 ready_for_fw is high
3,520,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,862 UART: [idev] Erasing UDS.KEYID = 0
6,027,209 UART: [idev] Sha1 KeyId Algorithm
6,050,877 UART: [idev] --
6,054,042 UART: [ldev] ++
6,054,646 UART: [ldev] CDI.KEYID = 6
6,055,563 UART: [ldev] SUBJECT.KEYID = 5
6,056,726 UART: [ldev] AUTHORITY.KEYID = 7
6,057,960 UART: [ldev] FE.KEYID = 1
6,101,615 UART: [ldev] Erasing FE.KEYID = 1
8,604,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,773 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,774 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,600 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,580 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,267 UART: [ldev] --
10,412,609 UART: [fwproc] Wait for Commands...
10,414,981 UART: [fwproc] Recv command 0x46574c44
10,417,076 UART: [fwproc] Recv'd Img size: 114360 bytes
13,838,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,907,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,976,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,295,543 >>> mbox cmd response: success
14,299,360 UART: [afmc] ++
14,299,946 UART: [afmc] CDI.KEYID = 6
14,300,856 UART: [afmc] SUBJECT.KEYID = 7
14,302,016 UART: [afmc] AUTHORITY.KEYID = 5
16,831,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,398 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,570,334 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,586,198 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,601,978 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,624,604 UART: [afmc] --
18,629,009 UART: [cold-reset] --
18,632,184 UART: [state] Locking Datavault
18,635,651 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,367 UART: [state] Locking ICCM
18,639,189 UART: [exit] Launching FMC @ 0x40000130
18,647,583 UART:
18,647,815 UART: Running Caliptra FMC ...
18,648,916 UART:
18,649,071 UART: [state] CFI Enabled
18,712,311 UART: [fht] FMC Alias Private Key: 7
20,475,667 UART: [art] Extend RT PCRs Done
20,476,890 UART: [art] Lock RT PCRs Done
20,478,454 UART: [art] Populate DV Done
20,483,702 UART: [fht] FMC Alias Private Key: 7
20,485,400 UART: [art] Derive CDI
20,486,213 UART: [art] Store in in slot 0x4
20,545,044 UART: [art] Derive Key Pair
20,546,092 UART: [art] Store priv key in slot 0x5
23,008,823 UART: [art] Derive Key Pair - Done
23,021,576 UART: [art] Signing Cert with AUTHO
23,022,892 UART: RITY.KEYID = 7
24,735,508 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,008 UART: [art] PUB.X = 526F7B94A20008B79BB40AC91D050209FFFA576DBF8D931A4AF64A875C792BA7E3F0F134CE371C3F743B64EFD7321544
24,744,260 UART: [art] PUB.Y = 33B4628D77A0C28EE1C1ADC79B39660EBEC1D41423C27B2F7D9D4212A912699C0BBC37DE6F2972B476129AB898B47EB3
24,751,541 UART: [art] SIG.R = DE2F9C8589EB842B51907BA0ACCEE58126E4FA6D64AE5E154DF60B092CA5A1F9120CE473880F56518A478A91D1021C7B
24,758,972 UART: [art] SIG.S = 4CAE5554C75E995A084D07FDE6669FA7963F80DBA2F25BFC62448C25BDA4D928A80C5CB99673EEA73C7164B26FC9FA5D
25,737,243 UART: Caliptra RT
25,737,952 UART: [state] CFI Enabled
25,903,860 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,265 UART:
1,539 UART: Running Caliptra ROM ...
2,647 UART:
2,798 UART: [state] CFI Enabled
65,030 UART: [state] LifecycleState = Production
66,819 UART: [state] DebugLocked = Yes
68,940 UART: [state] Starting the WD Timer 40000000 cycles
73,827 UART: [kat] SHA2-256
253,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,599 UART: [kat] ++
265,043 UART: [kat] sha1
276,030 UART: [kat] SHA2-256
279,042 UART: [kat] SHA2-384
285,294 UART: [kat] SHA2-512-ACC
288,226 UART: [kat] ECC-384
2,750,382 UART: [kat] HMAC-384Kdf
2,771,018 UART: [kat] LMS
3,300,526 UART: [kat] --
3,304,244 UART: [warm-reset] ++
3,309,467 UART: [warm-reset] --
3,313,439 UART: [state] Locking Datavault
3,315,415 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,122 UART: [state] Locking ICCM
3,319,812 UART: [exit] Launching FMC @ 0x40000130
3,328,206 UART:
3,328,479 UART: Running Caliptra FMC ...
3,329,508 UART:
3,329,656 UART: [state] CFI Enabled
3,381,594 UART: [aliasrt :skip pcr extension
3,382,846 UART: [art] Extend RT PCRs Done
3,383,985 UART: [art] Lock RT PCRs Done
3,385,212 UART: [art] Populate DV Done
3,390,557 UART: [fht] FMC Alias Private Key: 7
3,392,144 UART: [art] Derive CDI
3,392,954 UART: [art] Store in in slot 0x4
3,450,474 UART: [art] Derive Key Pair
3,451,513 UART: [art] Store priv key in slot 0x5
5,914,203 UART: [art] Derive Key Pair - Done
5,926,773 UART: [art] Signing Cert with AUTHO
5,928,080 UART: RITY.KEYID = 7
7,639,488 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,987 UART: [art] PUB.X = 526F7B94A20008B79BB40AC91D050209FFFA576DBF8D931A4AF64A875C792BA7E3F0F134CE371C3F743B64EFD7321544
7,648,263 UART: [art] PUB.Y = 33B4628D77A0C28EE1C1ADC79B39660EBEC1D41423C27B2F7D9D4212A912699C0BBC37DE6F2972B476129AB898B47EB3
7,655,516 UART: [art] SIG.R = DE2F9C8589EB842B51907BA0ACCEE58126E4FA6D64AE5E154DF60B092CA5A1F9120CE473880F56518A478A91D1021C7B
7,662,911 UART: [art] SIG.S = 4CAE5554C75E995A084D07FDE6669FA7963F80DBA2F25BFC62448C25BDA4D928A80C5CB99673EEA73C7164B26FC9FA5D
8,641,957 UART: Caliptra RT
8,642,651 UART: [state] CFI Enabled
8,974,319 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,068 UART:
192,443 UART: Running Caliptra ROM ...
193,553 UART:
603,074 UART: [state] CFI Enabled
615,525 UART: [state] LifecycleState = Production
617,298 UART: [state] DebugLocked = Yes
618,646 UART: [state] Starting the WD Timer 40000000 cycles
624,181 UART: [kat] SHA2-256
803,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,887 UART: [kat] ++
815,413 UART: [kat] sha1
827,948 UART: [kat] SHA2-256
830,957 UART: [kat] SHA2-384
838,222 UART: [kat] SHA2-512-ACC
841,173 UART: [kat] ECC-384
3,285,511 UART: [kat] HMAC-384Kdf
3,297,668 UART: [kat] LMS
3,827,192 UART: [kat] --
3,831,840 UART: [cold-reset] ++
3,833,558 UART: [fht] FHT @ 0x50003400
3,845,102 UART: [idev] ++
3,845,671 UART: [idev] CDI.KEYID = 6
3,846,582 UART: [idev] SUBJECT.KEYID = 7
3,847,824 UART: [idev] UDS.KEYID = 0
3,848,745 ready_for_fw is high
3,848,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,992,547 UART: [idev] Erasing UDS.KEYID = 0
6,320,768 UART: [idev] Sha1 KeyId Algorithm
6,343,391 UART: [idev] --
6,347,973 UART: [ldev] ++
6,348,562 UART: [ldev] CDI.KEYID = 6
6,349,476 UART: [ldev] SUBJECT.KEYID = 5
6,350,634 UART: [ldev] AUTHORITY.KEYID = 7
6,351,864 UART: [ldev] FE.KEYID = 1
6,362,451 UART: [ldev] Erasing FE.KEYID = 1
8,837,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,861 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,570,853 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,586,669 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,602,592 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,623,745 UART: [ldev] --
10,628,938 UART: [fwproc] Wait for Commands...
10,631,898 UART: [fwproc] Recv command 0x46574c44
10,633,988 UART: [fwproc] Recv'd Img size: 114360 bytes
14,065,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,211,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,529,387 >>> mbox cmd response: success
14,533,615 UART: [afmc] ++
14,534,194 UART: [afmc] CDI.KEYID = 6
14,535,104 UART: [afmc] SUBJECT.KEYID = 7
14,536,259 UART: [afmc] AUTHORITY.KEYID = 5
17,039,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,760,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,762,326 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,778,268 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,794,127 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,809,858 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,832,856 UART: [afmc] --
18,837,231 UART: [cold-reset] --
18,841,026 UART: [state] Locking Datavault
18,846,381 UART: [state] Locking PCR0, PCR1 and PCR31
18,848,093 UART: [state] Locking ICCM
18,850,190 UART: [exit] Launching FMC @ 0x40000130
18,858,639 UART:
18,858,917 UART: Running Caliptra FMC ...
18,860,024 UART:
18,860,186 UART: [state] CFI Enabled
18,868,120 UART: [fht] FMC Alias Private Key: 7
20,624,939 UART: [art] Extend RT PCRs Done
20,626,159 UART: [art] Lock RT PCRs Done
20,627,917 UART: [art] Populate DV Done
20,633,486 UART: [fht] FMC Alias Private Key: 7
20,635,074 UART: [art] Derive CDI
20,635,885 UART: [art] Store in in slot 0x4
20,678,202 UART: [art] Derive Key Pair
20,679,197 UART: [art] Store priv key in slot 0x5
23,106,094 UART: [art] Derive Key Pair - Done
23,119,327 UART: [art] Signing Cert with AUTHO
23,120,634 UART: RITY.KEYID = 7
24,826,170 UART: [art] Erasing AUTHORITY.KEYID = 7
24,827,672 UART: [art] PUB.X = D68D6C79343CF9DB2884655FF6A44B19A2C658A11B5C015812CBF989FD7B4D5E68196B3E1C2EEDC4835EF74012DBC93A
24,834,927 UART: [art] PUB.Y = 6D64EC81541B8203577D001A8F565BF9888DA395928AD5890FB5F193B594D07411284F321C12B6FF93FEFE87A2AF8429
24,842,165 UART: [art] SIG.R = 1A74775013393912A1CDEE75242693997BBF8B767213223EBFABE6AC5A99E780B9C09141C56DA5969F7D413EBAB4FCAF
24,849,557 UART: [art] SIG.S = A2C243F0F38CB78371015D5AAFE83E63DA50F81701F86430E53AB5D5D5998848A3E864E270CEF995A041027E54424128
25,828,493 UART: Caliptra RT
25,829,185 UART: [state] CFI Enabled
25,946,352 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,365 UART:
1,641 UART: Running Caliptra ROM ...
2,694 UART:
14,579,210 UART: [state] CFI Enabled
14,594,650 UART: [state] LifecycleState = Production
14,596,457 UART: [state] DebugLocked = Yes
14,599,232 UART: [state] Starting the WD Timer 40000000 cycles
14,604,338 UART: [kat] SHA2-256
14,783,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,795,040 UART: [kat] ++
14,795,501 UART: [kat] sha1
14,806,814 UART: [kat] SHA2-256
14,809,829 UART: [kat] SHA2-384
14,815,914 UART: [kat] SHA2-512-ACC
14,818,848 UART: [kat] ECC-384
17,260,602 UART: [kat] HMAC-384Kdf
17,272,176 UART: [kat] LMS
17,801,682 UART: [kat] --
17,805,670 UART: [warm-reset] ++
17,810,300 UART: [warm-reset] --
17,813,937 UART: [state] Locking Datavault
17,816,606 UART: [state] Locking PCR0, PCR1 and PCR31
17,818,303 UART: [state] Locking ICCM
17,820,984 UART: [exit] Launching FMC @ 0x40000130
17,829,381 UART:
17,829,616 UART: Running Caliptra FMC ...
17,830,714 UART:
17,830,867 UART: [state] CFI Enabled
17,832,806 UART: [aliasrt :skip pcr extension
17,834,047 UART: [art] Extend RT PCRs Done
17,835,182 UART: [art] Lock RT PCRs Done
17,836,353 UART: [art] Populate DV Done
17,842,073 UART: [fht] FMC Alias Private Key: 7
17,843,666 UART: [art] Derive CDI
17,844,475 UART: [art] Store in in slot 0x4
17,887,178 UART: [art] Derive Key Pair
17,888,214 UART: [art] Store priv key in slot 0x5
20,314,689 UART: [art] Derive Key Pair - Done
20,327,837 UART: [art] Signing Cert with AUTHO
20,329,129 UART: RITY.KEYID = 7
22,034,370 UART: [art] Erasing AUTHORITY.KEYID = 7
22,035,869 UART: [art] PUB.X = D68D6C79343CF9DB2884655FF6A44B19A2C658A11B5C015812CBF989FD7B4D5E68196B3E1C2EEDC4835EF74012DBC93A
22,043,166 UART: [art] PUB.Y = 6D64EC81541B8203577D001A8F565BF9888DA395928AD5890FB5F193B594D07411284F321C12B6FF93FEFE87A2AF8429
22,050,404 UART: [art] SIG.R = 1A74775013393912A1CDEE75242693997BBF8B767213223EBFABE6AC5A99E780B9C09141C56DA5969F7D413EBAB4FCAF
22,057,754 UART: [art] SIG.S = A2C243F0F38CB78371015D5AAFE83E63DA50F81701F86430E53AB5D5D5998848A3E864E270CEF995A041027E54424128
23,036,536 UART: Caliptra RT
23,037,227 UART: [state] CFI Enabled
23,326,570 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
191,830 UART:
192,192 UART: Running Caliptra ROM ...
193,383 UART:
602,896 UART: [state] CFI Enabled
620,383 UART: [state] LifecycleState = Production
622,086 UART: [state] DebugLocked = Yes
624,155 UART: [state] Starting the WD Timer 40000000 cycles
628,189 UART: [kat] SHA2-256
807,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,890 UART: [kat] ++
819,431 UART: [kat] sha1
830,554 UART: [kat] SHA2-256
833,558 UART: [kat] SHA2-384
839,757 UART: [kat] SHA2-512-ACC
842,764 UART: [kat] ECC-384
3,285,116 UART: [kat] HMAC-384Kdf
3,296,426 UART: [kat] LMS
3,825,935 UART: [kat] --
3,830,996 UART: [cold-reset] ++
3,833,027 UART: [fht] FHT @ 0x50003400
3,845,013 UART: [idev] ++
3,845,580 UART: [idev] CDI.KEYID = 6
3,846,485 UART: [idev] SUBJECT.KEYID = 7
3,847,727 UART: [idev] UDS.KEYID = 0
3,848,649 ready_for_fw is high
3,848,835 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,992,455 UART: [idev] Erasing UDS.KEYID = 0
6,320,292 UART: [idev] Sha1 KeyId Algorithm
6,342,658 UART: [idev] --
6,345,238 UART: [ldev] ++
6,345,803 UART: [ldev] CDI.KEYID = 6
6,346,728 UART: [ldev] SUBJECT.KEYID = 5
6,347,887 UART: [ldev] AUTHORITY.KEYID = 7
6,349,170 UART: [ldev] FE.KEYID = 1
6,361,110 UART: [ldev] Erasing FE.KEYID = 1
8,831,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,626 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,582 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,447 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,366 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,780 UART: [ldev] --
10,622,769 UART: [fwproc] Wait for Commands...
10,625,990 UART: [fwproc] Recv command 0x46574c44
10,628,030 UART: [fwproc] Recv'd Img size: 114360 bytes
14,059,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,133,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,202,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,519,840 >>> mbox cmd response: success
14,524,304 UART: [afmc] ++
14,524,885 UART: [afmc] CDI.KEYID = 6
14,525,944 UART: [afmc] SUBJECT.KEYID = 7
14,527,045 UART: [afmc] AUTHORITY.KEYID = 5
17,022,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,740,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,742,517 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,758,504 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,774,367 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,790,057 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,812,593 UART: [afmc] --
18,816,889 UART: [cold-reset] --
18,820,750 UART: [state] Locking Datavault
18,824,807 UART: [state] Locking PCR0, PCR1 and PCR31
18,826,447 UART: [state] Locking ICCM
18,827,915 UART: [exit] Launching FMC @ 0x40000130
18,836,367 UART:
18,836,605 UART: Running Caliptra FMC ...
18,837,706 UART:
18,837,863 UART: [state] CFI Enabled
18,845,854 UART: [fht] FMC Alias Private Key: 7
20,602,719 UART: [art] Extend RT PCRs Done
20,603,930 UART: [art] Lock RT PCRs Done
20,605,608 UART: [art] Populate DV Done
20,611,066 UART: [fht] FMC Alias Private Key: 7
20,612,764 UART: [art] Derive CDI
20,613,578 UART: [art] Store in in slot 0x4
20,656,486 UART: [art] Derive Key Pair
20,657,516 UART: [art] Store priv key in slot 0x5
23,084,293 UART: [art] Derive Key Pair - Done
23,097,279 UART: [art] Signing Cert with AUTHO
23,098,593 UART: RITY.KEYID = 7
24,804,245 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,740 UART: [art] PUB.X = C0602D5A8DB93B0782BADBA54DF70ECCD6E3EC4B73ABD74202D49A76B46985D0CC722A66D4E49C77673B9BD9CF8802E6
24,813,047 UART: [art] PUB.Y = 483315EE519C2783654BD4638EF56B5D7CA8A57A0D6B45D2BC660631DF528CA4590E36EF312D5AAC1F13A95375A88831
24,820,280 UART: [art] SIG.R = DC0F14AADAF6E18EDD28606EA1501E25CAECFF03B2D2B919D6637FD47368425DE290AD62BB4C84667F90BF25C7406F14
24,827,726 UART: [art] SIG.S = AD454BD20A3170C6957645442E9B339C46B487FEBCF861877FD588D8B33CD07D4D33EA2EDB41576BDCBD62B93FF3F489
25,806,653 UART: Caliptra RT
25,807,357 UART: [state] CFI Enabled
25,924,595 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,301 UART:
1,582 UART: Running Caliptra ROM ...
2,641 UART:
14,606,257 UART: [state] CFI Enabled
14,619,829 UART: [state] LifecycleState = Production
14,621,579 UART: [state] DebugLocked = Yes
14,623,925 UART: [state] Starting the WD Timer 40000000 cycles
14,629,078 UART: [kat] SHA2-256
14,808,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,819,825 UART: [kat] ++
14,820,284 UART: [kat] sha1
14,832,246 UART: [kat] SHA2-256
14,835,310 UART: [kat] SHA2-384
14,842,045 UART: [kat] SHA2-512-ACC
14,844,991 UART: [kat] ECC-384
17,287,666 UART: [kat] HMAC-384Kdf
17,300,646 UART: [kat] LMS
17,830,213 UART: [kat] --
17,833,389 UART: [warm-reset] ++
17,836,504 UART: [warm-reset] --
17,839,767 UART: [state] Locking Datavault
17,844,307 UART: [state] Locking PCR0, PCR1 and PCR31
17,845,967 UART: [state] Locking ICCM
17,848,171 UART: [exit] Launching FMC @ 0x40000130
17,856,625 UART:
17,856,857 UART: Running Caliptra FMC ...
17,857,955 UART:
17,858,122 UART: [state] CFI Enabled
17,859,737 UART: [aliasrt :skip pcr extension
17,860,973 UART: [art] Extend RT PCRs Done
17,862,107 UART: [art] Lock RT PCRs Done
17,863,168 UART: [art] Populate DV Done
17,868,729 UART: [fht] FMC Alias Private Key: 7
17,870,259 UART: [art] Derive CDI
17,871,066 UART: [art] Store in in slot 0x4
17,914,255 UART: [art] Derive Key Pair
17,915,297 UART: [art] Store priv key in slot 0x5
20,342,307 UART: [art] Derive Key Pair - Done
20,355,154 UART: [art] Signing Cert with AUTHO
20,356,453 UART: RITY.KEYID = 7
22,062,307 UART: [art] Erasing AUTHORITY.KEYID = 7
22,063,958 UART: [art] PUB.X = C0602D5A8DB93B0782BADBA54DF70ECCD6E3EC4B73ABD74202D49A76B46985D0CC722A66D4E49C77673B9BD9CF8802E6
22,071,106 UART: [art] PUB.Y = 483315EE519C2783654BD4638EF56B5D7CA8A57A0D6B45D2BC660631DF528CA4590E36EF312D5AAC1F13A95375A88831
22,078,359 UART: [art] SIG.R = DC0F14AADAF6E18EDD28606EA1501E25CAECFF03B2D2B919D6637FD47368425DE290AD62BB4C84667F90BF25C7406F14
22,085,751 UART: [art] SIG.S = AD454BD20A3170C6957645442E9B339C46B487FEBCF861877FD588D8B33CD07D4D33EA2EDB41576BDCBD62B93FF3F489
23,064,435 UART: Caliptra RT
23,065,151 UART: [state] CFI Enabled
23,354,256 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Production
85,825 UART: [state] DebugLocked = Yes
86,449 UART: [state] Starting the WD Timer 40000000 cycles
88,164 UART: [kat] SHA2-256
891,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,843 UART: [kat] ++
895,995 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,896 UART: [kat] SHA2-512-ACC
906,797 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,390 UART: [idev] ++
1,173,558 UART: [idev] CDI.KEYID = 6
1,173,919 UART: [idev] SUBJECT.KEYID = 7
1,174,344 UART: [idev] UDS.KEYID = 0
1,174,690 ready_for_fw is high
1,174,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,344 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,388 UART: [ldev] ++
1,208,556 UART: [ldev] CDI.KEYID = 6
1,208,920 UART: [ldev] SUBJECT.KEYID = 5
1,209,347 UART: [ldev] AUTHORITY.KEYID = 7
1,209,810 UART: [ldev] FE.KEYID = 1
1,214,998 UART: [ldev] Erasing FE.KEYID = 1
1,240,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,373 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,067 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,937 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,643 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,735 UART: [ldev] --
1,280,095 UART: [fwproc] Wait for Commands...
1,280,684 UART: [fwproc] Recv command 0x46574c44
1,281,417 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,797,641 >>> mbox cmd response: success
2,798,669 UART: [afmc] ++
2,798,837 UART: [afmc] CDI.KEYID = 6
2,799,200 UART: [afmc] SUBJECT.KEYID = 7
2,799,626 UART: [afmc] AUTHORITY.KEYID = 5
2,835,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,770 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,489 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,382 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,089 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,992 UART: [afmc] --
2,878,985 UART: [cold-reset] --
2,879,743 UART: [state] Locking Datavault
2,880,844 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,448 UART: [state] Locking ICCM
2,882,088 UART: [exit] Launching FMC @ 0x40000130
2,887,417 UART:
2,887,433 UART: Running Caliptra FMC ...
2,887,841 UART:
2,887,895 UART: [state] CFI Enabled
2,898,282 UART: [fht] FMC Alias Private Key: 7
3,005,933 UART: [art] Extend RT PCRs Done
3,006,361 UART: [art] Lock RT PCRs Done
3,007,889 UART: [art] Populate DV Done
3,016,197 UART: [fht] FMC Alias Private Key: 7
3,017,325 UART: [art] Derive CDI
3,017,605 UART: [art] Store in in slot 0x4
3,103,494 UART: [art] Derive Key Pair
3,103,854 UART: [art] Store priv key in slot 0x5
3,116,442 UART: [art] Derive Key Pair - Done
3,131,417 UART: [art] Signing Cert with AUTHO
3,131,897 UART: RITY.KEYID = 7
3,147,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,082 UART: [art] PUB.X = 2517BCFD281743AB40816F28E1520D743E924A6311532354313927878C2A0C02A0D8557AE0CBCFC3FAF48B88848C3593
3,154,837 UART: [art] PUB.Y = BF0923ADDD1B1B329E769A1DBCA7208800529F5F876D5D11D4CE36BA33402AC4A9568B1C66BCD44152594C1F84EB871E
3,161,772 UART: [art] SIG.R = 4E9B81103D0DC51CF09FC4D5110A69D916612820052BBC2AC724923F939BE47827EBC5498321316B62141AA328F5A5E2
3,168,529 UART: [art] SIG.S = 0BDA03739B9F71663335AB5BBF6F6330E247C4679D6CB3E0DEEDC76D8CDBC523E51A6E5BDE56A163C426E243F448B2EC
3,192,348 UART: Caliptra RT
3,192,602 UART: [state] CFI Enabled
3,302,365 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,121 UART:
3,303,137 UART: Running Caliptra ROM ...
3,303,545 UART:
3,303,600 UART: [state] CFI Enabled
3,306,041 UART: [state] LifecycleState = Production
3,306,649 UART: [state] DebugLocked = Yes
3,307,319 UART: [state] Starting the WD Timer 40000000 cycles
3,308,844 UART: [kat] SHA2-256
4,112,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,523 UART: [kat] ++
4,116,675 UART: [kat] sha1
4,120,949 UART: [kat] SHA2-256
4,122,889 UART: [kat] SHA2-384
4,125,684 UART: [kat] SHA2-512-ACC
4,127,585 UART: [kat] ECC-384
4,137,440 UART: [kat] HMAC-384Kdf
4,141,946 UART: [kat] LMS
4,390,258 UART: [kat] --
4,391,046 UART: [warm-reset] ++
4,392,039 UART: [warm-reset] --
4,392,782 UART: [state] Locking Datavault
4,393,598 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,202 UART: [state] Locking ICCM
4,394,808 UART: [exit] Launching FMC @ 0x40000130
4,400,137 UART:
4,400,153 UART: Running Caliptra FMC ...
4,400,561 UART:
4,400,615 UART: [state] CFI Enabled
4,401,712 UART: [aliasrt :skip pcr extension
4,402,185 UART: [art] Extend RT PCRs Done
4,402,613 UART: [art] Lock RT PCRs Done
4,403,722 UART: [art] Populate DV Done
4,411,956 UART: [fht] FMC Alias Private Key: 7
4,412,916 UART: [art] Derive CDI
4,413,196 UART: [art] Store in in slot 0x4
4,498,683 UART: [art] Derive Key Pair
4,499,043 UART: [art] Store priv key in slot 0x5
4,511,785 UART: [art] Derive Key Pair - Done
4,526,488 UART: [art] Signing Cert with AUTHO
4,526,968 UART: RITY.KEYID = 7
4,542,558 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,323 UART: [art] PUB.X = 2517BCFD281743AB40816F28E1520D743E924A6311532354313927878C2A0C02A0D8557AE0CBCFC3FAF48B88848C3593
4,550,078 UART: [art] PUB.Y = BF0923ADDD1B1B329E769A1DBCA7208800529F5F876D5D11D4CE36BA33402AC4A9568B1C66BCD44152594C1F84EB871E
4,557,013 UART: [art] SIG.R = 4E9B81103D0DC51CF09FC4D5110A69D916612820052BBC2AC724923F939BE47827EBC5498321316B62141AA328F5A5E2
4,563,770 UART: [art] SIG.S = 0BDA03739B9F71663335AB5BBF6F6330E247C4679D6CB3E0DEEDC76D8CDBC523E51A6E5BDE56A163C426E243F448B2EC
4,587,241 UART: Caliptra RT
4,587,495 UART: [state] CFI Enabled
4,865,921 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Production
85,813 UART: [state] DebugLocked = Yes
86,329 UART: [state] Starting the WD Timer 40000000 cycles
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,372 UART: [idev] ++
1,173,540 UART: [idev] CDI.KEYID = 6
1,173,901 UART: [idev] SUBJECT.KEYID = 7
1,174,326 UART: [idev] UDS.KEYID = 0
1,174,672 ready_for_fw is high
1,174,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,609 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,036 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,611 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,305 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,175 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,881 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,119 UART: [ldev] --
1,280,473 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,794,827 >>> mbox cmd response: success
2,796,077 UART: [afmc] ++
2,796,245 UART: [afmc] CDI.KEYID = 6
2,796,608 UART: [afmc] SUBJECT.KEYID = 7
2,797,034 UART: [afmc] AUTHORITY.KEYID = 5
2,832,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,808 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,527 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,420 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,127 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,004 UART: [afmc] --
2,875,997 UART: [cold-reset] --
2,876,941 UART: [state] Locking Datavault
2,877,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,582 UART: [state] Locking ICCM
2,879,168 UART: [exit] Launching FMC @ 0x40000130
2,884,497 UART:
2,884,513 UART: Running Caliptra FMC ...
2,884,921 UART:
2,884,975 UART: [state] CFI Enabled
2,895,138 UART: [fht] FMC Alias Private Key: 7
3,002,761 UART: [art] Extend RT PCRs Done
3,003,189 UART: [art] Lock RT PCRs Done
3,004,923 UART: [art] Populate DV Done
3,013,033 UART: [fht] FMC Alias Private Key: 7
3,013,975 UART: [art] Derive CDI
3,014,255 UART: [art] Store in in slot 0x4
3,099,478 UART: [art] Derive Key Pair
3,099,838 UART: [art] Store priv key in slot 0x5
3,112,730 UART: [art] Derive Key Pair - Done
3,127,202 UART: [art] Signing Cert with AUTHO
3,127,682 UART: RITY.KEYID = 7
3,142,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,441 UART: [art] PUB.X = A7E22E9C0F7E30471C51796116E41B583DDF510492B94AC451076EEBB4E74BEE61AF7382DABBA4024713BF527A3087E8
3,150,205 UART: [art] PUB.Y = 93510D60A26074F9BEE7D445DCDF49856E2C8DCF77F4A15C6568EB153C76583E2979CF9EED576A15C5C4561B5EE8D839
3,157,160 UART: [art] SIG.R = 2C49BDBC389258148938783A765B008E452D03A55F5266C84E63556816A3B4B725205BB8A4A351B7B3C75FF59F92306C
3,163,897 UART: [art] SIG.S = 21B1BE0A97F3546C5627015C77ED93CF9A11E8A0C38CD6AD3765C561E29547F890BF7C38D67F4DD39481E8639FE0AEBB
3,187,654 UART: Caliptra RT
3,187,908 UART: [state] CFI Enabled
3,295,827 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,583 UART:
3,296,599 UART: Running Caliptra ROM ...
3,297,007 UART:
3,297,062 UART: [state] CFI Enabled
3,300,313 UART: [state] LifecycleState = Production
3,300,921 UART: [state] DebugLocked = Yes
3,301,435 UART: [state] Starting the WD Timer 40000000 cycles
3,302,960 UART: [kat] SHA2-256
4,106,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,639 UART: [kat] ++
4,110,791 UART: [kat] sha1
4,115,097 UART: [kat] SHA2-256
4,117,037 UART: [kat] SHA2-384
4,119,696 UART: [kat] SHA2-512-ACC
4,121,597 UART: [kat] ECC-384
4,131,092 UART: [kat] HMAC-384Kdf
4,135,668 UART: [kat] LMS
4,383,980 UART: [kat] --
4,384,738 UART: [warm-reset] ++
4,385,889 UART: [warm-reset] --
4,386,650 UART: [state] Locking Datavault
4,387,576 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,180 UART: [state] Locking ICCM
4,388,612 UART: [exit] Launching FMC @ 0x40000130
4,393,941 UART:
4,393,957 UART: Running Caliptra FMC ...
4,394,365 UART:
4,394,419 UART: [state] CFI Enabled
4,395,786 UART: [aliasrt :skip pcr extension
4,396,259 UART: [art] Extend RT PCRs Done
4,396,687 UART: [art] Lock RT PCRs Done
4,397,822 UART: [art] Populate DV Done
4,406,022 UART: [fht] FMC Alias Private Key: 7
4,407,098 UART: [art] Derive CDI
4,407,378 UART: [art] Store in in slot 0x4
4,492,867 UART: [art] Derive Key Pair
4,493,227 UART: [art] Store priv key in slot 0x5
4,506,649 UART: [art] Derive Key Pair - Done
4,521,335 UART: [art] Signing Cert with AUTHO
4,521,815 UART: RITY.KEYID = 7
4,537,241 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,006 UART: [art] PUB.X = A7E22E9C0F7E30471C51796116E41B583DDF510492B94AC451076EEBB4E74BEE61AF7382DABBA4024713BF527A3087E8
4,544,770 UART: [art] PUB.Y = 93510D60A26074F9BEE7D445DCDF49856E2C8DCF77F4A15C6568EB153C76583E2979CF9EED576A15C5C4561B5EE8D839
4,551,725 UART: [art] SIG.R = 2C49BDBC389258148938783A765B008E452D03A55F5266C84E63556816A3B4B725205BB8A4A351B7B3C75FF59F92306C
4,558,462 UART: [art] SIG.S = 21B1BE0A97F3546C5627015C77ED93CF9A11E8A0C38CD6AD3765C561E29547F890BF7C38D67F4DD39481E8639FE0AEBB
4,581,625 UART: Caliptra RT
4,581,879 UART: [state] CFI Enabled
4,863,193 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Production
85,520 UART: [state] DebugLocked = Yes
86,180 UART: [state] Starting the WD Timer 40000000 cycles
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,174,927 ready_for_fw is high
1,174,927 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,530 UART: [idev] Erasing UDS.KEYID = 0
1,199,209 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,713 UART: [ldev] Erasing FE.KEYID = 1
1,242,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,750 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,444 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,314 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,020 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,104 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,797,218 >>> mbox cmd response: success
2,798,406 UART: [afmc] ++
2,798,574 UART: [afmc] CDI.KEYID = 6
2,798,937 UART: [afmc] SUBJECT.KEYID = 7
2,799,363 UART: [afmc] AUTHORITY.KEYID = 5
2,834,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,177 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,896 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,789 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,496 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,429 UART: [afmc] --
2,878,514 UART: [cold-reset] --
2,879,176 UART: [state] Locking Datavault
2,880,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,965 UART: [state] Locking ICCM
2,881,545 UART: [exit] Launching FMC @ 0x40000130
2,886,874 UART:
2,886,890 UART: Running Caliptra FMC ...
2,887,298 UART:
2,887,441 UART: [state] CFI Enabled
2,897,698 UART: [fht] FMC Alias Private Key: 7
3,005,359 UART: [art] Extend RT PCRs Done
3,005,787 UART: [art] Lock RT PCRs Done
3,007,247 UART: [art] Populate DV Done
3,015,369 UART: [fht] FMC Alias Private Key: 7
3,016,327 UART: [art] Derive CDI
3,016,607 UART: [art] Store in in slot 0x4
3,102,178 UART: [art] Derive Key Pair
3,102,538 UART: [art] Store priv key in slot 0x5
3,116,032 UART: [art] Derive Key Pair - Done
3,130,885 UART: [art] Signing Cert with AUTHO
3,131,365 UART: RITY.KEYID = 7
3,146,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,418 UART: [art] PUB.X = 9CE3AE515F29586B3B074F68A0E6291CEDFB00A5B18ABDD420A19335D98F825D91226445A375E5262386006A1F09CC56
3,154,138 UART: [art] PUB.Y = 118E279771A04B069690D3A42E3AF2194F3DD8CA1CDC7F9F6A1FE69EFF1ED790A6D376BB58228A53D4223CDD8B115AB4
3,161,099 UART: [art] SIG.R = 9FF507F698C6D32AFF38C9308F8D480E9866CB20337F32872D2535830F8F4129B088594707041CB86FCEF97ED20B78E1
3,167,847 UART: [art] SIG.S = B38FDDFC2C514DE63C21DB8438E134EC1B1F7A1E23BD1C635AFFEEA3CBB848719F7645E7E6D1646E8FCC8BFC8A47E3BE
3,192,164 UART: Caliptra RT
3,192,510 UART: [state] CFI Enabled
3,299,990 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,746 UART:
3,300,762 UART: Running Caliptra ROM ...
3,301,170 UART:
3,301,312 UART: [state] CFI Enabled
3,303,573 UART: [state] LifecycleState = Production
3,304,181 UART: [state] DebugLocked = Yes
3,304,927 UART: [state] Starting the WD Timer 40000000 cycles
3,306,426 UART: [kat] SHA2-256
4,109,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,105 UART: [kat] ++
4,114,257 UART: [kat] sha1
4,118,573 UART: [kat] SHA2-256
4,120,513 UART: [kat] SHA2-384
4,123,410 UART: [kat] SHA2-512-ACC
4,125,311 UART: [kat] ECC-384
4,135,414 UART: [kat] HMAC-384Kdf
4,140,070 UART: [kat] LMS
4,388,382 UART: [kat] --
4,389,212 UART: [warm-reset] ++
4,390,325 UART: [warm-reset] --
4,391,148 UART: [state] Locking Datavault
4,391,750 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,354 UART: [state] Locking ICCM
4,392,850 UART: [exit] Launching FMC @ 0x40000130
4,398,179 UART:
4,398,195 UART: Running Caliptra FMC ...
4,398,603 UART:
4,398,746 UART: [state] CFI Enabled
4,400,035 UART: [aliasrt :skip pcr extension
4,400,508 UART: [art] Extend RT PCRs Done
4,400,936 UART: [art] Lock RT PCRs Done
4,402,045 UART: [art] Populate DV Done
4,410,579 UART: [fht] FMC Alias Private Key: 7
4,411,757 UART: [art] Derive CDI
4,412,037 UART: [art] Store in in slot 0x4
4,497,722 UART: [art] Derive Key Pair
4,498,082 UART: [art] Store priv key in slot 0x5
4,511,800 UART: [art] Derive Key Pair - Done
4,526,615 UART: [art] Signing Cert with AUTHO
4,527,095 UART: RITY.KEYID = 7
4,542,549 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,314 UART: [art] PUB.X = 9CE3AE515F29586B3B074F68A0E6291CEDFB00A5B18ABDD420A19335D98F825D91226445A375E5262386006A1F09CC56
4,550,034 UART: [art] PUB.Y = 118E279771A04B069690D3A42E3AF2194F3DD8CA1CDC7F9F6A1FE69EFF1ED790A6D376BB58228A53D4223CDD8B115AB4
4,556,995 UART: [art] SIG.R = 9FF507F698C6D32AFF38C9308F8D480E9866CB20337F32872D2535830F8F4129B088594707041CB86FCEF97ED20B78E1
4,563,743 UART: [art] SIG.S = B38FDDFC2C514DE63C21DB8438E134EC1B1F7A1E23BD1C635AFFEEA3CBB848719F7645E7E6D1646E8FCC8BFC8A47E3BE
4,587,694 UART: Caliptra RT
4,588,040 UART: [state] CFI Enabled
4,870,583 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Production
85,876 UART: [state] DebugLocked = Yes
86,570 UART: [state] Starting the WD Timer 40000000 cycles
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,523 UART: [kat] LMS
1,169,835 UART: [kat] --
1,171,122 UART: [cold-reset] ++
1,171,639 UART: [fht] FHT @ 0x50003400
1,174,245 UART: [idev] ++
1,174,413 UART: [idev] CDI.KEYID = 6
1,174,774 UART: [idev] SUBJECT.KEYID = 7
1,175,199 UART: [idev] UDS.KEYID = 0
1,175,545 ready_for_fw is high
1,175,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,312 UART: [idev] Erasing UDS.KEYID = 0
1,200,389 UART: [idev] Sha1 KeyId Algorithm
1,209,284 UART: [idev] --
1,210,381 UART: [ldev] ++
1,210,549 UART: [ldev] CDI.KEYID = 6
1,210,913 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,618 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,312 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,182 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,888 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,818 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,283,087 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,266 >>> mbox cmd response: success
2,799,368 UART: [afmc] ++
2,799,536 UART: [afmc] CDI.KEYID = 6
2,799,899 UART: [afmc] SUBJECT.KEYID = 7
2,800,325 UART: [afmc] AUTHORITY.KEYID = 5
2,835,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,103 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,822 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,715 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,422 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,363 UART: [afmc] --
2,879,318 UART: [cold-reset] --
2,880,056 UART: [state] Locking Datavault
2,880,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,583 UART: [state] Locking ICCM
2,882,113 UART: [exit] Launching FMC @ 0x40000130
2,887,442 UART:
2,887,458 UART: Running Caliptra FMC ...
2,887,866 UART:
2,888,009 UART: [state] CFI Enabled
2,898,710 UART: [fht] FMC Alias Private Key: 7
3,006,779 UART: [art] Extend RT PCRs Done
3,007,207 UART: [art] Lock RT PCRs Done
3,009,023 UART: [art] Populate DV Done
3,017,241 UART: [fht] FMC Alias Private Key: 7
3,018,379 UART: [art] Derive CDI
3,018,659 UART: [art] Store in in slot 0x4
3,104,624 UART: [art] Derive Key Pair
3,104,984 UART: [art] Store priv key in slot 0x5
3,118,158 UART: [art] Derive Key Pair - Done
3,132,807 UART: [art] Signing Cert with AUTHO
3,133,287 UART: RITY.KEYID = 7
3,148,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,502 UART: [art] PUB.X = 04D9E3E5CB9EFEE267AF0903DE4F7B2AC95799757F268EE0479743F469AACE480DFA47A0B5F0F00E6609EE9C1A634AF4
3,156,270 UART: [art] PUB.Y = C0A562F6F1B362DBB41B5FBFC859E64CB2A4BD63CB58024112DF4143A7214C24FE445AE35B781D9D9A2115EAF5BF9DAD
3,163,237 UART: [art] SIG.R = 26B829C058E54FA37374DBCB795AA7B74FCB5FFACDDFEA48CA52893F626EE1772BEA58E779AB0EB6C63ED201492AEC37
3,170,025 UART: [art] SIG.S = 6E0FF88FEF8A57CB09F1A985560813FECB687D4B2EDE0F95CE32CF55FD4AD13DEA02D116A693D7B942108675757833F9
3,193,759 UART: Caliptra RT
3,194,105 UART: [state] CFI Enabled
3,302,604 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,360 UART:
3,303,376 UART: Running Caliptra ROM ...
3,303,784 UART:
3,303,926 UART: [state] CFI Enabled
3,306,885 UART: [state] LifecycleState = Production
3,307,493 UART: [state] DebugLocked = Yes
3,308,255 UART: [state] Starting the WD Timer 40000000 cycles
3,309,774 UART: [kat] SHA2-256
4,113,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,453 UART: [kat] ++
4,117,605 UART: [kat] sha1
4,121,823 UART: [kat] SHA2-256
4,123,763 UART: [kat] SHA2-384
4,126,752 UART: [kat] SHA2-512-ACC
4,128,653 UART: [kat] ECC-384
4,138,386 UART: [kat] HMAC-384Kdf
4,143,032 UART: [kat] LMS
4,391,344 UART: [kat] --
4,392,242 UART: [warm-reset] ++
4,393,119 UART: [warm-reset] --
4,393,958 UART: [state] Locking Datavault
4,394,740 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,344 UART: [state] Locking ICCM
4,395,826 UART: [exit] Launching FMC @ 0x40000130
4,401,155 UART:
4,401,171 UART: Running Caliptra FMC ...
4,401,579 UART:
4,401,722 UART: [state] CFI Enabled
4,402,963 UART: [aliasrt :skip pcr extension
4,403,436 UART: [art] Extend RT PCRs Done
4,403,864 UART: [art] Lock RT PCRs Done
4,404,893 UART: [art] Populate DV Done
4,413,121 UART: [fht] FMC Alias Private Key: 7
4,414,121 UART: [art] Derive CDI
4,414,401 UART: [art] Store in in slot 0x4
4,500,094 UART: [art] Derive Key Pair
4,500,454 UART: [art] Store priv key in slot 0x5
4,513,398 UART: [art] Derive Key Pair - Done
4,527,869 UART: [art] Signing Cert with AUTHO
4,528,349 UART: RITY.KEYID = 7
4,543,513 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,278 UART: [art] PUB.X = 04D9E3E5CB9EFEE267AF0903DE4F7B2AC95799757F268EE0479743F469AACE480DFA47A0B5F0F00E6609EE9C1A634AF4
4,551,046 UART: [art] PUB.Y = C0A562F6F1B362DBB41B5FBFC859E64CB2A4BD63CB58024112DF4143A7214C24FE445AE35B781D9D9A2115EAF5BF9DAD
4,558,013 UART: [art] SIG.R = 26B829C058E54FA37374DBCB795AA7B74FCB5FFACDDFEA48CA52893F626EE1772BEA58E779AB0EB6C63ED201492AEC37
4,564,801 UART: [art] SIG.S = 6E0FF88FEF8A57CB09F1A985560813FECB687D4B2EDE0F95CE32CF55FD4AD13DEA02D116A693D7B942108675757833F9
4,588,615 UART: Caliptra RT
4,588,961 UART: [state] CFI Enabled
4,874,545 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Production
85,555 UART: [state] DebugLocked = Yes
86,097 UART: [state] Starting the WD Timer 40000000 cycles
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 ready_for_fw is high
1,174,370 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,569 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,208,147 UART: [idev] --
1,209,204 UART: [ldev] ++
1,209,372 UART: [ldev] CDI.KEYID = 6
1,209,736 UART: [ldev] SUBJECT.KEYID = 5
1,210,163 UART: [ldev] AUTHORITY.KEYID = 7
1,210,626 UART: [ldev] FE.KEYID = 1
1,215,768 UART: [ldev] Erasing FE.KEYID = 1
1,241,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,739 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,433 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,303 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,009 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,235 UART: [ldev] --
1,281,505 UART: [fwproc] Wait for Commands...
1,282,162 UART: [fwproc] Recv command 0x46574c44
1,282,895 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,697 >>> mbox cmd response: success
2,799,849 UART: [afmc] ++
2,800,017 UART: [afmc] CDI.KEYID = 6
2,800,380 UART: [afmc] SUBJECT.KEYID = 7
2,800,806 UART: [afmc] AUTHORITY.KEYID = 5
2,836,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,564 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,283 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,176 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,883 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,708 UART: [afmc] --
2,879,595 UART: [cold-reset] --
2,880,631 UART: [state] Locking Datavault
2,881,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,440 UART: [state] Locking ICCM
2,882,922 UART: [exit] Launching FMC @ 0x40000130
2,888,251 UART:
2,888,267 UART: Running Caliptra FMC ...
2,888,675 UART:
2,888,729 UART: [state] CFI Enabled
2,899,480 UART: [fht] FMC Alias Private Key: 7
3,007,379 UART: [art] Extend RT PCRs Done
3,007,807 UART: [art] Lock RT PCRs Done
3,009,459 UART: [art] Populate DV Done
3,017,491 UART: [fht] FMC Alias Private Key: 7
3,018,429 UART: [art] Derive CDI
3,018,709 UART: [art] Store in in slot 0x4
3,104,760 UART: [art] Derive Key Pair
3,105,120 UART: [art] Store priv key in slot 0x5
3,117,910 UART: [art] Derive Key Pair - Done
3,132,748 UART: [art] Signing Cert with AUTHO
3,133,228 UART: RITY.KEYID = 7
3,147,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,683 UART: [art] PUB.X = C8F6A2C7D1E1753D535BDABEEC4B009D902260B996864C837B71764CCA04DCD57FDC7742E6149708F2DEEAA70BE38FA3
3,155,438 UART: [art] PUB.Y = 1386D3B12E4D4049A611D40584E74CBC29181C955AF55F7C5C3F8032C0B285036B74FC5E9035B878CC33E14E6D6D98EA
3,162,384 UART: [art] SIG.R = AB1DD83B8F07BF1225EA10ED0672B3EF71CE73C938B189F05EA7093236BF6F80FC15864BD64E91B2CDB3742C83703D26
3,169,155 UART: [art] SIG.S = C42B01C0A8FC73CB94B7721FA80247E23E7A3F7B556D5005A1554E3A206923A216F6094A30B556D861A0A02FD8131EBA
3,192,944 UART: Caliptra RT
3,193,198 UART: [state] CFI Enabled
3,302,104 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,860 UART:
3,302,876 UART: Running Caliptra ROM ...
3,303,284 UART:
3,303,339 UART: [state] CFI Enabled
3,305,816 UART: [state] LifecycleState = Production
3,306,424 UART: [state] DebugLocked = Yes
3,307,132 UART: [state] Starting the WD Timer 40000000 cycles
3,308,615 UART: [kat] SHA2-256
4,112,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,294 UART: [kat] ++
4,116,446 UART: [kat] sha1
4,120,742 UART: [kat] SHA2-256
4,122,682 UART: [kat] SHA2-384
4,125,439 UART: [kat] SHA2-512-ACC
4,127,340 UART: [kat] ECC-384
4,137,069 UART: [kat] HMAC-384Kdf
4,141,545 UART: [kat] LMS
4,389,857 UART: [kat] --
4,390,923 UART: [warm-reset] ++
4,391,760 UART: [warm-reset] --
4,392,817 UART: [state] Locking Datavault
4,393,483 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,087 UART: [state] Locking ICCM
4,394,653 UART: [exit] Launching FMC @ 0x40000130
4,399,982 UART:
4,399,998 UART: Running Caliptra FMC ...
4,400,406 UART:
4,400,460 UART: [state] CFI Enabled
4,401,685 UART: [aliasrt :skip pcr extension
4,402,158 UART: [art] Extend RT PCRs Done
4,402,586 UART: [art] Lock RT PCRs Done
4,403,765 UART: [art] Populate DV Done
4,412,071 UART: [fht] FMC Alias Private Key: 7
4,413,037 UART: [art] Derive CDI
4,413,317 UART: [art] Store in in slot 0x4
4,498,692 UART: [art] Derive Key Pair
4,499,052 UART: [art] Store priv key in slot 0x5
4,512,804 UART: [art] Derive Key Pair - Done
4,527,696 UART: [art] Signing Cert with AUTHO
4,528,176 UART: RITY.KEYID = 7
4,543,270 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,035 UART: [art] PUB.X = C8F6A2C7D1E1753D535BDABEEC4B009D902260B996864C837B71764CCA04DCD57FDC7742E6149708F2DEEAA70BE38FA3
4,550,790 UART: [art] PUB.Y = 1386D3B12E4D4049A611D40584E74CBC29181C955AF55F7C5C3F8032C0B285036B74FC5E9035B878CC33E14E6D6D98EA
4,557,736 UART: [art] SIG.R = AB1DD83B8F07BF1225EA10ED0672B3EF71CE73C938B189F05EA7093236BF6F80FC15864BD64E91B2CDB3742C83703D26
4,564,507 UART: [art] SIG.S = C42B01C0A8FC73CB94B7721FA80247E23E7A3F7B556D5005A1554E3A206923A216F6094A30B556D861A0A02FD8131EBA
4,588,160 UART: Caliptra RT
4,588,414 UART: [state] CFI Enabled
4,867,127 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,975 UART: [state] LifecycleState = Production
85,583 UART: [state] DebugLocked = Yes
86,097 UART: [state] Starting the WD Timer 40000000 cycles
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,170,106 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 ready_for_fw is high
1,174,190 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,199,102 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,209,144 UART: [ldev] ++
1,209,312 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,103 UART: [ldev] AUTHORITY.KEYID = 7
1,210,566 UART: [ldev] FE.KEYID = 1
1,215,766 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,585 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,455 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,161 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,275 UART: [ldev] --
1,280,561 UART: [fwproc] Wait for Commands...
1,281,168 UART: [fwproc] Recv command 0x46574c44
1,281,901 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,796,909 >>> mbox cmd response: success
2,798,111 UART: [afmc] ++
2,798,279 UART: [afmc] CDI.KEYID = 6
2,798,642 UART: [afmc] SUBJECT.KEYID = 7
2,799,068 UART: [afmc] AUTHORITY.KEYID = 5
2,834,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,298 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,017 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,910 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,617 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,516 UART: [afmc] --
2,877,609 UART: [cold-reset] --
2,878,643 UART: [state] Locking Datavault
2,879,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,434 UART: [state] Locking ICCM
2,880,886 UART: [exit] Launching FMC @ 0x40000130
2,886,215 UART:
2,886,231 UART: Running Caliptra FMC ...
2,886,639 UART:
2,886,693 UART: [state] CFI Enabled
2,897,198 UART: [fht] FMC Alias Private Key: 7
3,005,399 UART: [art] Extend RT PCRs Done
3,005,827 UART: [art] Lock RT PCRs Done
3,007,325 UART: [art] Populate DV Done
3,015,677 UART: [fht] FMC Alias Private Key: 7
3,016,621 UART: [art] Derive CDI
3,016,901 UART: [art] Store in in slot 0x4
3,102,512 UART: [art] Derive Key Pair
3,102,872 UART: [art] Store priv key in slot 0x5
3,115,540 UART: [art] Derive Key Pair - Done
3,130,325 UART: [art] Signing Cert with AUTHO
3,130,805 UART: RITY.KEYID = 7
3,146,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,968 UART: [art] PUB.X = 910C106A4EC4A7DEEE1F8E340B5EB8689DE108244B53D201312C4BFF128A3D4BDD9F03CE872FEF06C5F35BF2A235C791
3,153,736 UART: [art] PUB.Y = 35931C2D7B36F408371021960D1112AE416123E00E2E56502A6D1E750882160E36F8D878CDD4D3B67E4FCB08E84E9FCD
3,160,666 UART: [art] SIG.R = 025391B9979ECB34A46EEF420EB3666E43400F544DBCEEA59772876DDDC84D0035B3C517E1400E81738AEE3C93F5E6F6
3,167,408 UART: [art] SIG.S = CC93625549D5CC1E2DB8DF6C9B466194D33852ED1AF85D682C113A8C92AA59F26391EB7780D44FCA56026CF281F0D65A
3,191,556 UART: Caliptra RT
3,191,810 UART: [state] CFI Enabled
3,299,848 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,604 UART:
3,300,620 UART: Running Caliptra ROM ...
3,301,028 UART:
3,301,083 UART: [state] CFI Enabled
3,303,878 UART: [state] LifecycleState = Production
3,304,486 UART: [state] DebugLocked = Yes
3,305,018 UART: [state] Starting the WD Timer 40000000 cycles
3,306,695 UART: [kat] SHA2-256
4,110,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,374 UART: [kat] ++
4,114,526 UART: [kat] sha1
4,118,866 UART: [kat] SHA2-256
4,120,806 UART: [kat] SHA2-384
4,123,589 UART: [kat] SHA2-512-ACC
4,125,490 UART: [kat] ECC-384
4,135,105 UART: [kat] HMAC-384Kdf
4,139,631 UART: [kat] LMS
4,387,943 UART: [kat] --
4,388,761 UART: [warm-reset] ++
4,389,614 UART: [warm-reset] --
4,390,283 UART: [state] Locking Datavault
4,391,013 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,617 UART: [state] Locking ICCM
4,392,161 UART: [exit] Launching FMC @ 0x40000130
4,397,490 UART:
4,397,506 UART: Running Caliptra FMC ...
4,397,914 UART:
4,397,968 UART: [state] CFI Enabled
4,399,315 UART: [aliasrt :skip pcr extension
4,399,788 UART: [art] Extend RT PCRs Done
4,400,216 UART: [art] Lock RT PCRs Done
4,401,619 UART: [art] Populate DV Done
4,409,699 UART: [fht] FMC Alias Private Key: 7
4,410,709 UART: [art] Derive CDI
4,410,989 UART: [art] Store in in slot 0x4
4,496,442 UART: [art] Derive Key Pair
4,496,802 UART: [art] Store priv key in slot 0x5
4,510,110 UART: [art] Derive Key Pair - Done
4,524,889 UART: [art] Signing Cert with AUTHO
4,525,369 UART: RITY.KEYID = 7
4,540,635 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,400 UART: [art] PUB.X = 910C106A4EC4A7DEEE1F8E340B5EB8689DE108244B53D201312C4BFF128A3D4BDD9F03CE872FEF06C5F35BF2A235C791
4,548,168 UART: [art] PUB.Y = 35931C2D7B36F408371021960D1112AE416123E00E2E56502A6D1E750882160E36F8D878CDD4D3B67E4FCB08E84E9FCD
4,555,098 UART: [art] SIG.R = 025391B9979ECB34A46EEF420EB3666E43400F544DBCEEA59772876DDDC84D0035B3C517E1400E81738AEE3C93F5E6F6
4,561,840 UART: [art] SIG.S = CC93625549D5CC1E2DB8DF6C9B466194D33852ED1AF85D682C113A8C92AA59F26391EB7780D44FCA56026CF281F0D65A
4,585,542 UART: Caliptra RT
4,585,796 UART: [state] CFI Enabled
4,867,915 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Production
86,310 UART: [state] DebugLocked = Yes
87,058 UART: [state] Starting the WD Timer 40000000 cycles
88,601 UART: [kat] SHA2-256
892,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,280 UART: [kat] ++
896,432 UART: [kat] sha1
900,666 UART: [kat] SHA2-256
902,606 UART: [kat] SHA2-384
905,553 UART: [kat] SHA2-512-ACC
907,454 UART: [kat] ECC-384
917,093 UART: [kat] HMAC-384Kdf
921,843 UART: [kat] LMS
1,170,155 UART: [kat] --
1,170,946 UART: [cold-reset] ++
1,171,497 UART: [fht] FHT @ 0x50003400
1,174,087 UART: [idev] ++
1,174,255 UART: [idev] CDI.KEYID = 6
1,174,616 UART: [idev] SUBJECT.KEYID = 7
1,175,041 UART: [idev] UDS.KEYID = 0
1,175,387 ready_for_fw is high
1,175,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,199,603 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,679 UART: [ldev] ++
1,209,847 UART: [ldev] CDI.KEYID = 6
1,210,211 UART: [ldev] SUBJECT.KEYID = 5
1,210,638 UART: [ldev] AUTHORITY.KEYID = 7
1,211,101 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,242,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,800 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,494 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,364 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,070 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,264 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,799,414 >>> mbox cmd response: success
2,800,576 UART: [afmc] ++
2,800,744 UART: [afmc] CDI.KEYID = 6
2,801,107 UART: [afmc] SUBJECT.KEYID = 7
2,801,533 UART: [afmc] AUTHORITY.KEYID = 5
2,837,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,155 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,874 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,767 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,474 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,299 UART: [afmc] --
2,881,394 UART: [cold-reset] --
2,882,080 UART: [state] Locking Datavault
2,883,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,957 UART: [state] Locking ICCM
2,884,511 UART: [exit] Launching FMC @ 0x40000130
2,889,840 UART:
2,889,856 UART: Running Caliptra FMC ...
2,890,264 UART:
2,890,407 UART: [state] CFI Enabled
2,900,850 UART: [fht] FMC Alias Private Key: 7
3,008,553 UART: [art] Extend RT PCRs Done
3,008,981 UART: [art] Lock RT PCRs Done
3,010,629 UART: [art] Populate DV Done
3,019,109 UART: [fht] FMC Alias Private Key: 7
3,020,115 UART: [art] Derive CDI
3,020,395 UART: [art] Store in in slot 0x4
3,105,818 UART: [art] Derive Key Pair
3,106,178 UART: [art] Store priv key in slot 0x5
3,119,466 UART: [art] Derive Key Pair - Done
3,134,190 UART: [art] Signing Cert with AUTHO
3,134,670 UART: RITY.KEYID = 7
3,149,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,223 UART: [art] PUB.X = 5997D68C61E279592BE221AA117D1C56DBC1D145BD15EC24BA69F18197D8D182102F3272FD01565D688002279633BC9F
3,156,983 UART: [art] PUB.Y = 7D9A817E46D2FC1AADB2177CB16DF2ED23394A5A5320369833ACF1B41641189B82DA32F226D1626A817624897EE41C9F
3,163,935 UART: [art] SIG.R = 9F6F7776989B34F7EC378364BF1163C45AE386C4BCA4360257389029F730815190362386AAE913C66C81677C57192584
3,170,684 UART: [art] SIG.S = BEC6FD3B80D0703FF71734F9147E9AA9DE55F1C695357E5A2844676B831B6A0459CF67D165DDC9C515D543E5972A67F5
3,194,292 UART: Caliptra RT
3,194,638 UART: [state] CFI Enabled
3,303,582 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,338 UART:
3,304,354 UART: Running Caliptra ROM ...
3,304,762 UART:
3,304,904 UART: [state] CFI Enabled
3,308,001 UART: [state] LifecycleState = Production
3,308,609 UART: [state] DebugLocked = Yes
3,309,265 UART: [state] Starting the WD Timer 40000000 cycles
3,310,776 UART: [kat] SHA2-256
4,114,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,455 UART: [kat] ++
4,118,607 UART: [kat] sha1
4,122,895 UART: [kat] SHA2-256
4,124,835 UART: [kat] SHA2-384
4,127,508 UART: [kat] SHA2-512-ACC
4,129,409 UART: [kat] ECC-384
4,138,854 UART: [kat] HMAC-384Kdf
4,143,692 UART: [kat] LMS
4,392,004 UART: [kat] --
4,392,774 UART: [warm-reset] ++
4,393,695 UART: [warm-reset] --
4,394,528 UART: [state] Locking Datavault
4,395,192 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,796 UART: [state] Locking ICCM
4,396,438 UART: [exit] Launching FMC @ 0x40000130
4,401,767 UART:
4,401,783 UART: Running Caliptra FMC ...
4,402,191 UART:
4,402,334 UART: [state] CFI Enabled
4,403,949 UART: [aliasrt :skip pcr extension
4,404,422 UART: [art] Extend RT PCRs Done
4,404,850 UART: [art] Lock RT PCRs Done
4,406,297 UART: [art] Populate DV Done
4,414,597 UART: [fht] FMC Alias Private Key: 7
4,415,537 UART: [art] Derive CDI
4,415,817 UART: [art] Store in in slot 0x4
4,501,202 UART: [art] Derive Key Pair
4,501,562 UART: [art] Store priv key in slot 0x5
4,514,888 UART: [art] Derive Key Pair - Done
4,529,628 UART: [art] Signing Cert with AUTHO
4,530,108 UART: RITY.KEYID = 7
4,545,246 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,011 UART: [art] PUB.X = 5997D68C61E279592BE221AA117D1C56DBC1D145BD15EC24BA69F18197D8D182102F3272FD01565D688002279633BC9F
4,552,771 UART: [art] PUB.Y = 7D9A817E46D2FC1AADB2177CB16DF2ED23394A5A5320369833ACF1B41641189B82DA32F226D1626A817624897EE41C9F
4,559,723 UART: [art] SIG.R = 9F6F7776989B34F7EC378364BF1163C45AE386C4BCA4360257389029F730815190362386AAE913C66C81677C57192584
4,566,472 UART: [art] SIG.S = BEC6FD3B80D0703FF71734F9147E9AA9DE55F1C695357E5A2844676B831B6A0459CF67D165DDC9C515D543E5972A67F5
4,590,204 UART: Caliptra RT
4,590,550 UART: [state] CFI Enabled
4,873,373 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Production
85,428 UART: [state] DebugLocked = Yes
86,176 UART: [state] Starting the WD Timer 40000000 cycles
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,174,403 ready_for_fw is high
1,174,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,653 UART: [ldev] ++
1,208,821 UART: [ldev] CDI.KEYID = 6
1,209,185 UART: [ldev] SUBJECT.KEYID = 5
1,209,612 UART: [ldev] AUTHORITY.KEYID = 7
1,210,075 UART: [ldev] FE.KEYID = 1
1,215,149 UART: [ldev] Erasing FE.KEYID = 1
1,241,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,796 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,490 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,360 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,066 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,346 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,090 >>> mbox cmd response: success
2,799,232 UART: [afmc] ++
2,799,400 UART: [afmc] CDI.KEYID = 6
2,799,763 UART: [afmc] SUBJECT.KEYID = 7
2,800,189 UART: [afmc] AUTHORITY.KEYID = 5
2,836,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,477 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,196 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,089 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,796 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,467 UART: [afmc] --
2,879,418 UART: [cold-reset] --
2,880,342 UART: [state] Locking Datavault
2,881,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,997 UART: [state] Locking ICCM
2,882,551 UART: [exit] Launching FMC @ 0x40000130
2,887,880 UART:
2,887,896 UART: Running Caliptra FMC ...
2,888,304 UART:
2,888,447 UART: [state] CFI Enabled
2,898,956 UART: [fht] FMC Alias Private Key: 7
3,006,833 UART: [art] Extend RT PCRs Done
3,007,261 UART: [art] Lock RT PCRs Done
3,008,499 UART: [art] Populate DV Done
3,016,787 UART: [fht] FMC Alias Private Key: 7
3,017,927 UART: [art] Derive CDI
3,018,207 UART: [art] Store in in slot 0x4
3,104,128 UART: [art] Derive Key Pair
3,104,488 UART: [art] Store priv key in slot 0x5
3,118,452 UART: [art] Derive Key Pair - Done
3,133,119 UART: [art] Signing Cert with AUTHO
3,133,599 UART: RITY.KEYID = 7
3,149,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,824 UART: [art] PUB.X = EF955DADB11F770FD3553C539769F9C0E1AC944CE689D16EAB62CF02F1B59C2A161FE2AB3EB55AC4715198187FD2A803
3,156,599 UART: [art] PUB.Y = 3D5D7AAC76405C4AD03C27B08023DB12AE5E61C61A12026C956ABE35430048ECDEDC96D334834BB38EC47F164707951C
3,163,527 UART: [art] SIG.R = 420B4146F8369033996A0A9481E962BB065E2E29DB82881E19461DB3D68CD3510F49CEEF3C4F78A0E462F8169D01FA9D
3,170,282 UART: [art] SIG.S = D609FFE0D079979082466DBFC68CFF11ACB9DBAEDA07D31391436EA48B6A7B0C365206AB09804D77595221CC1C88A2DE
3,194,136 UART: Caliptra RT
3,194,482 UART: [state] CFI Enabled
3,302,982 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,738 UART:
3,303,754 UART: Running Caliptra ROM ...
3,304,162 UART:
3,304,304 UART: [state] CFI Enabled
3,306,987 UART: [state] LifecycleState = Production
3,307,595 UART: [state] DebugLocked = Yes
3,308,337 UART: [state] Starting the WD Timer 40000000 cycles
3,309,964 UART: [kat] SHA2-256
4,113,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,643 UART: [kat] ++
4,117,795 UART: [kat] sha1
4,121,883 UART: [kat] SHA2-256
4,123,823 UART: [kat] SHA2-384
4,126,614 UART: [kat] SHA2-512-ACC
4,128,515 UART: [kat] ECC-384
4,138,174 UART: [kat] HMAC-384Kdf
4,142,840 UART: [kat] LMS
4,391,152 UART: [kat] --
4,392,070 UART: [warm-reset] ++
4,392,937 UART: [warm-reset] --
4,393,764 UART: [state] Locking Datavault
4,394,552 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,156 UART: [state] Locking ICCM
4,395,752 UART: [exit] Launching FMC @ 0x40000130
4,401,081 UART:
4,401,097 UART: Running Caliptra FMC ...
4,401,505 UART:
4,401,648 UART: [state] CFI Enabled
4,403,161 UART: [aliasrt :skip pcr extension
4,403,634 UART: [art] Extend RT PCRs Done
4,404,062 UART: [art] Lock RT PCRs Done
4,405,359 UART: [art] Populate DV Done
4,413,635 UART: [fht] FMC Alias Private Key: 7
4,414,791 UART: [art] Derive CDI
4,415,071 UART: [art] Store in in slot 0x4
4,501,092 UART: [art] Derive Key Pair
4,501,452 UART: [art] Store priv key in slot 0x5
4,515,268 UART: [art] Derive Key Pair - Done
4,529,897 UART: [art] Signing Cert with AUTHO
4,530,377 UART: RITY.KEYID = 7
4,545,629 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,394 UART: [art] PUB.X = EF955DADB11F770FD3553C539769F9C0E1AC944CE689D16EAB62CF02F1B59C2A161FE2AB3EB55AC4715198187FD2A803
4,553,169 UART: [art] PUB.Y = 3D5D7AAC76405C4AD03C27B08023DB12AE5E61C61A12026C956ABE35430048ECDEDC96D334834BB38EC47F164707951C
4,560,097 UART: [art] SIG.R = 420B4146F8369033996A0A9481E962BB065E2E29DB82881E19461DB3D68CD3510F49CEEF3C4F78A0E462F8169D01FA9D
4,566,852 UART: [art] SIG.S = D609FFE0D079979082466DBFC68CFF11ACB9DBAEDA07D31391436EA48B6A7B0C365206AB09804D77595221CC1C88A2DE
4,590,992 UART: Caliptra RT
4,591,338 UART: [state] CFI Enabled
4,872,665 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,817 UART: [state] LifecycleState = Production
85,425 UART: [state] DebugLocked = Yes
86,049 UART: [state] Starting the WD Timer 40000000 cycles
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,174,514 ready_for_fw is high
1,174,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,896 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,241,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,229 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,099 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,805 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,913 UART: [ldev] --
1,281,237 UART: [fwproc] Wait for Commands...
1,281,902 UART: [fwproc] Recv command 0x46574c44
1,282,635 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,796,947 >>> mbox cmd response: success
2,798,023 UART: [afmc] ++
2,798,191 UART: [afmc] CDI.KEYID = 6
2,798,554 UART: [afmc] SUBJECT.KEYID = 7
2,798,980 UART: [afmc] AUTHORITY.KEYID = 5
2,834,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,182 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,901 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,794 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,501 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,194 UART: [afmc] --
2,877,241 UART: [cold-reset] --
2,877,891 UART: [state] Locking Datavault
2,878,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,574 UART: [state] Locking ICCM
2,880,128 UART: [exit] Launching FMC @ 0x40000130
2,885,457 UART:
2,885,473 UART: Running Caliptra FMC ...
2,885,881 UART:
2,885,935 UART: [state] CFI Enabled
2,896,562 UART: [fht] FMC Alias Private Key: 7
3,004,687 UART: [art] Extend RT PCRs Done
3,005,115 UART: [art] Lock RT PCRs Done
3,006,905 UART: [art] Populate DV Done
3,015,017 UART: [fht] FMC Alias Private Key: 7
3,016,019 UART: [art] Derive CDI
3,016,299 UART: [art] Store in in slot 0x4
3,102,300 UART: [art] Derive Key Pair
3,102,660 UART: [art] Store priv key in slot 0x5
3,115,890 UART: [art] Derive Key Pair - Done
3,130,692 UART: [art] Signing Cert with AUTHO
3,131,172 UART: RITY.KEYID = 7
3,146,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,281 UART: [art] PUB.X = CF4FD8D9F9DB3E6EA9A14E36C75FA6D15C4D0CCAAA2122740FEC15F7BBAB82079C91AE153D052A5EE504BABA4E4B2E6E
3,154,068 UART: [art] PUB.Y = A3D1068EF9F395B6D6DD8CB5EC1736433FB02354A3764248D947709C9E277BD0B9CAC10274742D1EFD50FF892E12238C
3,161,016 UART: [art] SIG.R = D06FCFF5A0DBE706DD42AF3C25BBA813AE88044459F5477A631AA4F09E16982542828FEE1728737131B302F2ED814757
3,167,779 UART: [art] SIG.S = 4C2564007B165BA9FF7E0E576BAD279F968AA778BE84D2B60A0F06639BBC4F57AB2EEEC6DA9C00F5922CC19C31BA70EE
3,191,740 UART: Caliptra RT
3,191,994 UART: [state] CFI Enabled
3,299,698 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,454 UART:
3,300,470 UART: Running Caliptra ROM ...
3,300,878 UART:
3,300,933 UART: [state] CFI Enabled
3,303,468 UART: [state] LifecycleState = Production
3,304,076 UART: [state] DebugLocked = Yes
3,304,808 UART: [state] Starting the WD Timer 40000000 cycles
3,306,513 UART: [kat] SHA2-256
4,110,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,192 UART: [kat] ++
4,114,344 UART: [kat] sha1
4,118,604 UART: [kat] SHA2-256
4,120,544 UART: [kat] SHA2-384
4,123,361 UART: [kat] SHA2-512-ACC
4,125,262 UART: [kat] ECC-384
4,135,299 UART: [kat] HMAC-384Kdf
4,139,741 UART: [kat] LMS
4,388,053 UART: [kat] --
4,388,797 UART: [warm-reset] ++
4,389,692 UART: [warm-reset] --
4,390,473 UART: [state] Locking Datavault
4,391,285 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,889 UART: [state] Locking ICCM
4,392,427 UART: [exit] Launching FMC @ 0x40000130
4,397,756 UART:
4,397,772 UART: Running Caliptra FMC ...
4,398,180 UART:
4,398,234 UART: [state] CFI Enabled
4,399,629 UART: [aliasrt :skip pcr extension
4,400,102 UART: [art] Extend RT PCRs Done
4,400,530 UART: [art] Lock RT PCRs Done
4,401,653 UART: [art] Populate DV Done
4,410,085 UART: [fht] FMC Alias Private Key: 7
4,411,141 UART: [art] Derive CDI
4,411,421 UART: [art] Store in in slot 0x4
4,496,826 UART: [art] Derive Key Pair
4,497,186 UART: [art] Store priv key in slot 0x5
4,510,366 UART: [art] Derive Key Pair - Done
4,525,508 UART: [art] Signing Cert with AUTHO
4,525,988 UART: RITY.KEYID = 7
4,541,266 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,031 UART: [art] PUB.X = CF4FD8D9F9DB3E6EA9A14E36C75FA6D15C4D0CCAAA2122740FEC15F7BBAB82079C91AE153D052A5EE504BABA4E4B2E6E
4,548,818 UART: [art] PUB.Y = A3D1068EF9F395B6D6DD8CB5EC1736433FB02354A3764248D947709C9E277BD0B9CAC10274742D1EFD50FF892E12238C
4,555,766 UART: [art] SIG.R = D06FCFF5A0DBE706DD42AF3C25BBA813AE88044459F5477A631AA4F09E16982542828FEE1728737131B302F2ED814757
4,562,529 UART: [art] SIG.S = 4C2564007B165BA9FF7E0E576BAD279F968AA778BE84D2B60A0F06639BBC4F57AB2EEEC6DA9C00F5922CC19C31BA70EE
4,585,864 UART: Caliptra RT
4,586,118 UART: [state] CFI Enabled
4,869,509 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,881 UART: [state] LifecycleState = Production
85,489 UART: [state] DebugLocked = Yes
86,223 UART: [state] Starting the WD Timer 40000000 cycles
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,174,474 ready_for_fw is high
1,174,474 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,869 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,209,088 UART: [ldev] ++
1,209,256 UART: [ldev] CDI.KEYID = 6
1,209,620 UART: [ldev] SUBJECT.KEYID = 5
1,210,047 UART: [ldev] AUTHORITY.KEYID = 7
1,210,510 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,895 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,589 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,459 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,165 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,097 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,797,849 >>> mbox cmd response: success
2,798,889 UART: [afmc] ++
2,799,057 UART: [afmc] CDI.KEYID = 6
2,799,420 UART: [afmc] SUBJECT.KEYID = 7
2,799,846 UART: [afmc] AUTHORITY.KEYID = 5
2,835,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,336 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,055 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,948 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,655 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,482 UART: [afmc] --
2,878,423 UART: [cold-reset] --
2,879,113 UART: [state] Locking Datavault
2,880,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,738 UART: [state] Locking ICCM
2,881,206 UART: [exit] Launching FMC @ 0x40000130
2,886,535 UART:
2,886,551 UART: Running Caliptra FMC ...
2,886,959 UART:
2,887,013 UART: [state] CFI Enabled
2,897,916 UART: [fht] FMC Alias Private Key: 7
3,006,103 UART: [art] Extend RT PCRs Done
3,006,531 UART: [art] Lock RT PCRs Done
3,007,917 UART: [art] Populate DV Done
3,016,051 UART: [fht] FMC Alias Private Key: 7
3,017,039 UART: [art] Derive CDI
3,017,319 UART: [art] Store in in slot 0x4
3,102,902 UART: [art] Derive Key Pair
3,103,262 UART: [art] Store priv key in slot 0x5
3,116,304 UART: [art] Derive Key Pair - Done
3,131,269 UART: [art] Signing Cert with AUTHO
3,131,749 UART: RITY.KEYID = 7
3,146,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,750 UART: [art] PUB.X = 9D909BEA44630C61701AECA0572A30115899B53565FE36384728D59EB5C29D52AFD3C338CC4B9F3685D5AD7BECF6D951
3,154,523 UART: [art] PUB.Y = 7331F0EE6B5046B1DED78EE14B216479AA51D64214AA542F43F8C2A53A8C6EABEAA7D1120FC388EA958326A196ABA264
3,161,482 UART: [art] SIG.R = 2C8872CB4E26F044506F33DBC864C657DFA550B2471CB350368F069E8363A247DB238528A676E6A3BA5DAA7E7D24687B
3,168,251 UART: [art] SIG.S = 18AB45D2ED497F2C5DC36DD7E5A183C1D133BB498CC86885AF770B80ED4C503D4D0EE082195C912A24B970C27FCDD67E
3,192,196 UART: Caliptra RT
3,192,450 UART: [state] CFI Enabled
3,300,543 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,299 UART:
3,301,315 UART: Running Caliptra ROM ...
3,301,723 UART:
3,301,778 UART: [state] CFI Enabled
3,304,731 UART: [state] LifecycleState = Production
3,305,339 UART: [state] DebugLocked = Yes
3,305,919 UART: [state] Starting the WD Timer 40000000 cycles
3,307,468 UART: [kat] SHA2-256
4,111,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,147 UART: [kat] ++
4,115,299 UART: [kat] sha1
4,119,541 UART: [kat] SHA2-256
4,121,481 UART: [kat] SHA2-384
4,124,122 UART: [kat] SHA2-512-ACC
4,126,023 UART: [kat] ECC-384
4,136,006 UART: [kat] HMAC-384Kdf
4,140,600 UART: [kat] LMS
4,388,912 UART: [kat] --
4,389,736 UART: [warm-reset] ++
4,390,659 UART: [warm-reset] --
4,391,596 UART: [state] Locking Datavault
4,392,486 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,090 UART: [state] Locking ICCM
4,393,560 UART: [exit] Launching FMC @ 0x40000130
4,398,889 UART:
4,398,905 UART: Running Caliptra FMC ...
4,399,313 UART:
4,399,367 UART: [state] CFI Enabled
4,400,404 UART: [aliasrt :skip pcr extension
4,400,877 UART: [art] Extend RT PCRs Done
4,401,305 UART: [art] Lock RT PCRs Done
4,402,542 UART: [art] Populate DV Done
4,410,866 UART: [fht] FMC Alias Private Key: 7
4,412,036 UART: [art] Derive CDI
4,412,316 UART: [art] Store in in slot 0x4
4,497,909 UART: [art] Derive Key Pair
4,498,269 UART: [art] Store priv key in slot 0x5
4,511,831 UART: [art] Derive Key Pair - Done
4,526,586 UART: [art] Signing Cert with AUTHO
4,527,066 UART: RITY.KEYID = 7
4,542,108 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,873 UART: [art] PUB.X = 9D909BEA44630C61701AECA0572A30115899B53565FE36384728D59EB5C29D52AFD3C338CC4B9F3685D5AD7BECF6D951
4,549,646 UART: [art] PUB.Y = 7331F0EE6B5046B1DED78EE14B216479AA51D64214AA542F43F8C2A53A8C6EABEAA7D1120FC388EA958326A196ABA264
4,556,605 UART: [art] SIG.R = 2C8872CB4E26F044506F33DBC864C657DFA550B2471CB350368F069E8363A247DB238528A676E6A3BA5DAA7E7D24687B
4,563,374 UART: [art] SIG.S = 18AB45D2ED497F2C5DC36DD7E5A183C1D133BB498CC86885AF770B80ED4C503D4D0EE082195C912A24B970C27FCDD67E
4,587,467 UART: Caliptra RT
4,587,721 UART: [state] CFI Enabled
4,868,295 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,710 UART: [state] LifecycleState = Production
86,318 UART: [state] DebugLocked = Yes
86,968 UART: [state] Starting the WD Timer 40000000 cycles
88,569 UART: [kat] SHA2-256
892,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,248 UART: [kat] ++
896,400 UART: [kat] sha1
900,614 UART: [kat] SHA2-256
902,554 UART: [kat] SHA2-384
905,245 UART: [kat] SHA2-512-ACC
907,146 UART: [kat] ECC-384
916,915 UART: [kat] HMAC-384Kdf
921,447 UART: [kat] LMS
1,169,759 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,174,735 ready_for_fw is high
1,174,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,617 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,718 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,412 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,282 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,988 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,160 UART: [ldev] --
1,281,510 UART: [fwproc] Wait for Commands...
1,282,261 UART: [fwproc] Recv command 0x46574c44
1,282,994 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,796,694 >>> mbox cmd response: success
2,797,740 UART: [afmc] ++
2,797,908 UART: [afmc] CDI.KEYID = 6
2,798,271 UART: [afmc] SUBJECT.KEYID = 7
2,798,697 UART: [afmc] AUTHORITY.KEYID = 5
2,834,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,529 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,248 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,141 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,848 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,655 UART: [afmc] --
2,877,650 UART: [cold-reset] --
2,878,534 UART: [state] Locking Datavault
2,880,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,737 UART: [state] Locking ICCM
2,881,237 UART: [exit] Launching FMC @ 0x40000130
2,886,566 UART:
2,886,582 UART: Running Caliptra FMC ...
2,886,990 UART:
2,887,133 UART: [state] CFI Enabled
2,897,774 UART: [fht] FMC Alias Private Key: 7
3,005,409 UART: [art] Extend RT PCRs Done
3,005,837 UART: [art] Lock RT PCRs Done
3,007,409 UART: [art] Populate DV Done
3,015,637 UART: [fht] FMC Alias Private Key: 7
3,016,779 UART: [art] Derive CDI
3,017,059 UART: [art] Store in in slot 0x4
3,102,956 UART: [art] Derive Key Pair
3,103,316 UART: [art] Store priv key in slot 0x5
3,116,746 UART: [art] Derive Key Pair - Done
3,131,540 UART: [art] Signing Cert with AUTHO
3,132,020 UART: RITY.KEYID = 7
3,147,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,179 UART: [art] PUB.X = 2949B9F272BD6FB9438B8D88D9242BDCE120F790F9C87CBCDE259739FC8B43A6D8491E55AD7301D89EDC2744D294E8C4
3,154,956 UART: [art] PUB.Y = 4CF4B9000F46DC01833E972B1CACC0A434A1009A327BEB51F2D87404E715FF3795F138F3C6E4EEB759EBEF160A1C17C2
3,161,862 UART: [art] SIG.R = 20183521BF2A4E5444834D146BB8F9C69CF823A997FB9358F39B76E8534EC4AF1197AAF945EA09E22BF56EDFE45280DB
3,168,637 UART: [art] SIG.S = 4F107D577D3BD9D6D7159AB022CF07C05B68EE7AA743DCB29AD8E7ABE9DC06B3D010331809E482ADC9F735DFC2778038
3,192,675 UART: Caliptra RT
3,193,021 UART: [state] CFI Enabled
3,300,466 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,222 UART:
3,301,238 UART: Running Caliptra ROM ...
3,301,646 UART:
3,301,788 UART: [state] CFI Enabled
3,304,503 UART: [state] LifecycleState = Production
3,305,111 UART: [state] DebugLocked = Yes
3,305,709 UART: [state] Starting the WD Timer 40000000 cycles
3,307,344 UART: [kat] SHA2-256
4,110,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,023 UART: [kat] ++
4,115,175 UART: [kat] sha1
4,119,371 UART: [kat] SHA2-256
4,121,311 UART: [kat] SHA2-384
4,124,278 UART: [kat] SHA2-512-ACC
4,126,179 UART: [kat] ECC-384
4,135,960 UART: [kat] HMAC-384Kdf
4,140,528 UART: [kat] LMS
4,388,840 UART: [kat] --
4,389,634 UART: [warm-reset] ++
4,390,585 UART: [warm-reset] --
4,391,332 UART: [state] Locking Datavault
4,392,114 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,718 UART: [state] Locking ICCM
4,393,378 UART: [exit] Launching FMC @ 0x40000130
4,398,707 UART:
4,398,723 UART: Running Caliptra FMC ...
4,399,131 UART:
4,399,274 UART: [state] CFI Enabled
4,400,711 UART: [aliasrt :skip pcr extension
4,401,184 UART: [art] Extend RT PCRs Done
4,401,612 UART: [art] Lock RT PCRs Done
4,402,819 UART: [art] Populate DV Done
4,411,019 UART: [fht] FMC Alias Private Key: 7
4,412,153 UART: [art] Derive CDI
4,412,433 UART: [art] Store in in slot 0x4
4,498,184 UART: [art] Derive Key Pair
4,498,544 UART: [art] Store priv key in slot 0x5
4,511,584 UART: [art] Derive Key Pair - Done
4,526,540 UART: [art] Signing Cert with AUTHO
4,527,020 UART: RITY.KEYID = 7
4,542,362 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,127 UART: [art] PUB.X = 2949B9F272BD6FB9438B8D88D9242BDCE120F790F9C87CBCDE259739FC8B43A6D8491E55AD7301D89EDC2744D294E8C4
4,549,904 UART: [art] PUB.Y = 4CF4B9000F46DC01833E972B1CACC0A434A1009A327BEB51F2D87404E715FF3795F138F3C6E4EEB759EBEF160A1C17C2
4,556,810 UART: [art] SIG.R = 20183521BF2A4E5444834D146BB8F9C69CF823A997FB9358F39B76E8534EC4AF1197AAF945EA09E22BF56EDFE45280DB
4,563,585 UART: [art] SIG.S = 4F107D577D3BD9D6D7159AB022CF07C05B68EE7AA743DCB29AD8E7ABE9DC06B3D010331809E482ADC9F735DFC2778038
4,586,733 UART: Caliptra RT
4,587,079 UART: [state] CFI Enabled
4,864,769 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Production
85,638 UART: [state] DebugLocked = Yes
86,170 UART: [state] Starting the WD Timer 40000000 cycles
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,711 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,362 UART: [cold-reset] ++
1,169,871 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,173,811 ready_for_fw is high
1,173,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,210 UART: [idev] Erasing UDS.KEYID = 0
1,198,947 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,813 UART: [ldev] ++
1,208,981 UART: [ldev] CDI.KEYID = 6
1,209,345 UART: [ldev] SUBJECT.KEYID = 5
1,209,772 UART: [ldev] AUTHORITY.KEYID = 7
1,210,235 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,646 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,340 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,210 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,916 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,020 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,181 UART: [fwproc] Recv command 0x46574c44
1,282,914 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,194 >>> mbox cmd response: success
2,799,440 UART: [afmc] ++
2,799,608 UART: [afmc] CDI.KEYID = 6
2,799,971 UART: [afmc] SUBJECT.KEYID = 7
2,800,397 UART: [afmc] AUTHORITY.KEYID = 5
2,836,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,325 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,044 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,937 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,644 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,491 UART: [afmc] --
2,879,574 UART: [cold-reset] --
2,880,736 UART: [state] Locking Datavault
2,881,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,287 UART: [state] Locking ICCM
2,882,715 UART: [exit] Launching FMC @ 0x40000130
2,888,044 UART:
2,888,060 UART: Running Caliptra FMC ...
2,888,468 UART:
2,888,611 UART: [state] CFI Enabled
2,899,164 UART: [fht] FMC Alias Private Key: 7
3,007,017 UART: [art] Extend RT PCRs Done
3,007,445 UART: [art] Lock RT PCRs Done
3,009,161 UART: [art] Populate DV Done
3,017,181 UART: [fht] FMC Alias Private Key: 7
3,018,183 UART: [art] Derive CDI
3,018,463 UART: [art] Store in in slot 0x4
3,103,968 UART: [art] Derive Key Pair
3,104,328 UART: [art] Store priv key in slot 0x5
3,117,232 UART: [art] Derive Key Pair - Done
3,131,691 UART: [art] Signing Cert with AUTHO
3,132,171 UART: RITY.KEYID = 7
3,147,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,126 UART: [art] PUB.X = 0DFFEA29BE71FA7C978C6B23A0ECD2F01AE1E55C2D4A950452AFAC7D98CFE340CF8720E61EE8653C1041D51F029B494B
3,154,907 UART: [art] PUB.Y = 991E26D89CDBFA7273E397AABA4903A8789A08A4635DF1583E6C6DD2996CC67404E81C0244DACB5921DE405118A5EF76
3,161,851 UART: [art] SIG.R = 4D0734C2F26B882FB700CA4720793A8E8444F00993F54CD8758E3AF49E203E22A640864329A739262229BE3E075FBB92
3,168,582 UART: [art] SIG.S = 3C3DE1A9DCEC48A75CCE8DD4E2C006594C05CE4E7FD3134F42251EED72338D17553DF8E763168A543BDB92B5AD7234EF
3,192,345 UART: Caliptra RT
3,192,691 UART: [state] CFI Enabled
3,300,436 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,192 UART:
3,301,208 UART: Running Caliptra ROM ...
3,301,616 UART:
3,301,758 UART: [state] CFI Enabled
3,304,101 UART: [state] LifecycleState = Production
3,304,709 UART: [state] DebugLocked = Yes
3,305,331 UART: [state] Starting the WD Timer 40000000 cycles
3,306,872 UART: [kat] SHA2-256
4,110,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,551 UART: [kat] ++
4,114,703 UART: [kat] sha1
4,118,951 UART: [kat] SHA2-256
4,120,891 UART: [kat] SHA2-384
4,123,764 UART: [kat] SHA2-512-ACC
4,125,665 UART: [kat] ECC-384
4,135,508 UART: [kat] HMAC-384Kdf
4,140,262 UART: [kat] LMS
4,388,574 UART: [kat] --
4,389,546 UART: [warm-reset] ++
4,390,627 UART: [warm-reset] --
4,391,528 UART: [state] Locking Datavault
4,392,132 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,736 UART: [state] Locking ICCM
4,393,182 UART: [exit] Launching FMC @ 0x40000130
4,398,511 UART:
4,398,527 UART: Running Caliptra FMC ...
4,398,935 UART:
4,399,078 UART: [state] CFI Enabled
4,400,581 UART: [aliasrt :skip pcr extension
4,401,054 UART: [art] Extend RT PCRs Done
4,401,482 UART: [art] Lock RT PCRs Done
4,402,853 UART: [art] Populate DV Done
4,411,115 UART: [fht] FMC Alias Private Key: 7
4,412,261 UART: [art] Derive CDI
4,412,541 UART: [art] Store in in slot 0x4
4,498,066 UART: [art] Derive Key Pair
4,498,426 UART: [art] Store priv key in slot 0x5
4,511,794 UART: [art] Derive Key Pair - Done
4,526,741 UART: [art] Signing Cert with AUTHO
4,527,221 UART: RITY.KEYID = 7
4,542,471 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,236 UART: [art] PUB.X = 0DFFEA29BE71FA7C978C6B23A0ECD2F01AE1E55C2D4A950452AFAC7D98CFE340CF8720E61EE8653C1041D51F029B494B
4,550,017 UART: [art] PUB.Y = 991E26D89CDBFA7273E397AABA4903A8789A08A4635DF1583E6C6DD2996CC67404E81C0244DACB5921DE405118A5EF76
4,556,961 UART: [art] SIG.R = 4D0734C2F26B882FB700CA4720793A8E8444F00993F54CD8758E3AF49E203E22A640864329A739262229BE3E075FBB92
4,563,692 UART: [art] SIG.S = 3C3DE1A9DCEC48A75CCE8DD4E2C006594C05CE4E7FD3134F42251EED72338D17553DF8E763168A543BDB92B5AD7234EF
4,587,521 UART: Caliptra RT
4,587,867 UART: [state] CFI Enabled
4,871,867 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
191,582 UART:
192,158 UART: Running Caliptra ROM ...
193,350 UART:
193,505 UART: [state] CFI Enabled
264,342 UART: [state] LifecycleState = Unprovisioned
266,721 UART: [state] DebugLocked = Yes
269,112 UART: [state] Starting the WD Timer 1000000 cycles
274,734 UART: [kat] SHA2-256
456,707 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,171 UART: [kat] ++
468,690 UART: [kat] sha1
479,349 UART: [kat] SHA2-256
482,366 UART: [kat] SHA2-384
486,621 UART: [kat] SHA2-512-ACC
489,285 UART: [kat] ECC-384
1,273,164 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,280,820 UART: WDT Expired
1,281,392 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,145 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C4E ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
192,030 UART:
192,413 UART: Running Caliptra ROM ...
193,591 UART:
603,326 UART: [state] CFI Enabled
615,042 UART: [state] LifecycleState = Unprovisioned
617,398 UART: [state] DebugLocked = Yes
620,157 UART: [state] Starting the WD Timer 1000000 cycles
624,873 UART: [kat] SHA2-256
806,860 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,386 UART: [kat] ++
818,938 UART: [kat] sha1
830,247 UART: [kat] SHA2-256
833,315 UART: [kat] SHA2-384
838,884 UART: [kat] SHA2-512-ACC
841,497 UART: [kat] ECC-384
1,624,150 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D0E ra=0x00008CFA error_internal_intr_r=00000040
1,631,858 UART: WDT Expired
1,632,422 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D0E ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C54 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,533 UART:
191,932 UART: Running Caliptra ROM ...
193,111 UART:
193,265 UART: [state] CFI Enabled
262,486 UART: [state] LifecycleState = Unprovisioned
264,406 UART: [state] DebugLocked = Yes
266,102 UART: [state] Starting the WD Timer 1000000 cycles
270,869 UART: [kat] SHA2-256
450,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,573 UART: [kat] ++
462,126 UART: [kat] sha1
473,298 UART: [kat] SHA2-256
476,366 UART: [kat] SHA2-384
482,123 UART: [kat] SHA2-512-ACC
485,054 UART: [kat] ECC-384
1,269,706 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,276,665 UART: WDT Expired
1,277,234 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
191,603 UART:
192,003 UART: Running Caliptra ROM ...
193,325 UART:
193,480 UART: [state] CFI Enabled
262,892 UART: [state] LifecycleState = Unprovisioned
264,778 UART: [state] DebugLocked = Yes
267,494 UART: [state] Starting the WD Timer 1000000 cycles
272,036 UART: [kat] SHA2-256
451,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,742 UART: [kat] ++
463,291 UART: [kat] sha1
473,368 UART: [kat] SHA2-256
476,375 UART: [kat] SHA2-384
481,199 UART: [kat] SHA2-512-ACC
484,136 UART: [kat] ECC-384
1,271,068 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009118 ra=0x0000910E error_internal_intr_r=00000040
1,278,035 UART: WDT Expired
1,278,614 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009118 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008072 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
192,191 UART:
192,564 UART: Running Caliptra ROM ...
193,701 UART:
603,335 UART: [state] CFI Enabled
617,053 UART: [state] LifecycleState = Unprovisioned
618,915 UART: [state] DebugLocked = Yes
621,631 UART: [state] Starting the WD Timer 1000000 cycles
626,978 UART: [kat] SHA2-256
806,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,702 UART: [kat] ++
818,256 UART: [kat] sha1
828,728 UART: [kat] SHA2-256
831,767 UART: [kat] SHA2-384
838,554 UART: [kat] SHA2-512-ACC
841,482 UART: [kat] ECC-384
1,625,205 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
1,632,182 UART: WDT Expired
1,632,750 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000806C ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = Yes
86,691 UART: [state] Starting the WD Timer 1000000 cycles
88,178 UART: [kat] SHA2-256
891,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,857 UART: [kat] ++
896,009 UART: [kat] sha1
900,137 UART: [kat] SHA2-256
902,077 UART: [kat] SHA2-384
904,676 UART: [kat] SHA2-512-ACC
906,577 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,004 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,090,445 UART: WDT Expired
1,090,654 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007870 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = Yes
86,294 UART: [state] Starting the WD Timer 1000000 cycles
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,607 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008150 error_internal_intr_r=00000040
1,090,046 UART: WDT Expired
1,090,255 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000782A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = Yes
86,351 UART: [state] Starting the WD Timer 1000000 cycles
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,664 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
1,090,103 UART: WDT Expired
1,090,312 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000782A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = Yes
86,774 UART: [state] Starting the WD Timer 1000000 cycles
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,087 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,090,528 UART: WDT Expired
1,090,737 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000077F2 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = Yes
86,953 UART: [state] Starting the WD Timer 1000000 cycles
88,378 UART: [kat] SHA2-256
891,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,057 UART: [kat] ++
896,209 UART: [kat] sha1
900,473 UART: [kat] SHA2-256
902,413 UART: [kat] SHA2-384
905,156 UART: [kat] SHA2-512-ACC
907,057 UART: [kat] ECC-384
917,030 UART: [kat] HMAC-384Kdf
921,560 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,266 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C4 ra=0x00008150 error_internal_intr_r=00000040
1,090,707 UART: WDT Expired
1,090,916 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C4 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = Yes
86,552 UART: [state] Starting the WD Timer 1000000 cycles
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,865 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2EA ra=0x00008132 error_internal_intr_r=00000040
1,090,310 UART: WDT Expired
1,090,519 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000A2EA ra=0x00008132 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007826 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
191,554 UART:
191,925 UART: Running Caliptra ROM ...
192,996 UART:
193,137 UART: [state] CFI Enabled
263,789 UART: [state] LifecycleState = Unprovisioned
266,223 UART: [state] DebugLocked = Yes
267,664 UART: [state] Starting the WD Timer 40000000 cycles
272,676 UART: [kat] SHA2-256
454,642 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,148 UART: [kat] ++
466,672 UART: [kat] sha1
476,305 UART: [kat] SHA2-256
479,334 UART: [kat] SHA2-384
485,013 UART: [kat] SHA2-512-ACC
487,635 UART: [kat] ECC-384
3,778,588 UART: [kat] HMAC-384Kdf
3,801,012 UART: [kat] LMS
4,874,178 UART: [kat] --
4,877,732 UART: [cold-reset] ++
4,878,784 UART: [fht] FHT @ 0x50003400
4,889,458 UART: [idev] ++
4,890,176 UART: [idev] CDI.KEYID = 6
4,891,411 UART: [idev] SUBJECT.KEYID = 7
4,892,513 UART: [idev] UDS.KEYID = 0
4,895,615 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,036,752 UART: [idev] Erasing UDS.KEYID = 0
8,223,765 UART: [idev] Sha1 KeyId Algorithm
8,247,000 UART: [idev] --
8,251,049 UART: [ldev] ++
8,251,676 UART: [ldev] CDI.KEYID = 6
8,252,857 UART: [ldev] SUBJECT.KEYID = 5
8,254,020 UART: [ldev] AUTHORITY.KEYID = 7
8,255,254 UART: [ldev] FE.KEYID = 1
8,296,314 UART: [ldev] Erasing FE.KEYID = 1
11,630,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,920,843 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,937,155 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,953,145 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,969,353 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,988,243 UART: [ldev] --
13,992,711 UART: [fwproc] Wait for Commands...
13,994,750 UART: [fwproc] Recv command 0x46574c44
13,997,064 UART: [fwproc] Recv'd Img size: 111600 bytes
18,040,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,116,639 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,176,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,493,322 >>> mbox cmd response: success
18,497,182 UART: [afmc] ++
18,497,798 UART: [afmc] CDI.KEYID = 6
18,498,958 UART: [afmc] SUBJECT.KEYID = 7
18,500,116 UART: [afmc] AUTHORITY.KEYID = 5
21,858,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,160,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,162,401 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,178,560 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,194,642 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,210,790 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,233,704 UART: [afmc] --
24,236,492 UART: [cold-reset] --
24,242,039 UART: [state] Locking Datavault
24,247,238 UART: [state] Locking PCR0, PCR1 and PCR31
24,248,912 UART: [state] Locking ICCM
24,251,912 UART: [exit] Launching FMC @ 0x40000000
24,260,538 UART:
24,260,789 UART: Running Caliptra FMC ...
24,261,931 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
4,794,553 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,323,339 >>> mbox cmd response: success
24,010,839 UART:
24,011,232 UART: Running Caliptra FMC ...
24,012,481 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
191,822 UART:
192,202 UART: Running Caliptra ROM ...
193,310 UART:
602,967 UART: [state] CFI Enabled
617,487 UART: [state] LifecycleState = Unprovisioned
619,872 UART: [state] DebugLocked = Yes
621,437 UART: [state] Starting the WD Timer 40000000 cycles
626,452 UART: [kat] SHA2-256
808,449 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,004 UART: [kat] ++
820,572 UART: [kat] sha1
832,099 UART: [kat] SHA2-256
835,133 UART: [kat] SHA2-384
840,097 UART: [kat] SHA2-512-ACC
842,704 UART: [kat] ECC-384
4,098,550 UART: [kat] HMAC-384Kdf
4,110,627 UART: [kat] LMS
5,183,785 UART: [kat] --
5,188,220 UART: [cold-reset] ++
5,190,036 UART: [fht] FHT @ 0x50003400
5,202,294 UART: [idev] ++
5,203,009 UART: [idev] CDI.KEYID = 6
5,204,148 UART: [idev] SUBJECT.KEYID = 7
5,205,649 UART: [idev] UDS.KEYID = 0
5,208,921 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
5,349,333 UART: [idev] Erasing UDS.KEYID = 0
8,492,967 UART: [idev] Sha1 KeyId Algorithm
8,515,505 UART: [idev] --
8,519,071 UART: [ldev] ++
8,519,693 UART: [ldev] CDI.KEYID = 6
8,520,874 UART: [ldev] SUBJECT.KEYID = 5
8,522,029 UART: [ldev] AUTHORITY.KEYID = 7
8,523,256 UART: [ldev] FE.KEYID = 1
8,533,814 UART: [ldev] Erasing FE.KEYID = 1
11,827,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,449 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,134,801 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,150,788 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,166,864 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,187,574 UART: [ldev] --
14,192,026 UART: [fwproc] Wait for Commands...
14,194,792 UART: [fwproc] Recv command 0x46574c44
14,197,109 UART: [fwproc] Recv'd Img size: 111600 bytes
18,239,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,314,967 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,375,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,691,961 >>> mbox cmd response: success
18,696,415 UART: [afmc] ++
18,697,036 UART: [afmc] CDI.KEYID = 6
18,698,203 UART: [afmc] SUBJECT.KEYID = 7
18,699,352 UART: [afmc] AUTHORITY.KEYID = 5
22,012,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,309,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,311,327 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,327,497 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,343,595 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,359,698 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,382,891 UART: [afmc] --
24,386,792 UART: [cold-reset] --
24,391,883 UART: [state] Locking Datavault
24,398,110 UART: [state] Locking PCR0, PCR1 and PCR31
24,399,816 UART: [state] Locking ICCM
24,402,352 UART: [exit] Launching FMC @ 0x40000000
24,410,980 UART:
24,411,225 UART: Running Caliptra FMC ...
24,412,364 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
5,107,708 <<< Executing mbox cmd 0x46574c44 (111600 bytes) from SoC
18,496,894 >>> mbox cmd response: success
24,134,332 UART:
24,134,721 UART: Running Caliptra FMC ...
24,135,956 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
191,643 UART:
192,023 UART: Running Caliptra ROM ...
193,202 UART:
193,357 UART: [state] CFI Enabled
263,472 UART: [state] LifecycleState = Unprovisioned
265,382 UART: [state] DebugLocked = Yes
267,907 UART: [state] Starting the WD Timer 40000000 cycles
272,713 UART: [kat] SHA2-256
451,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,412 UART: [kat] ++
463,982 UART: [kat] sha1
476,431 UART: [kat] SHA2-256
479,474 UART: [kat] SHA2-384
484,718 UART: [kat] SHA2-512-ACC
487,694 UART: [kat] ECC-384
2,950,201 UART: [kat] HMAC-384Kdf
2,972,522 UART: [kat] LMS
3,501,984 UART: [kat] --
3,506,351 UART: [cold-reset] ++
3,507,196 UART: [fht] FHT @ 0x50003400
3,518,508 UART: [idev] ++
3,519,078 UART: [idev] CDI.KEYID = 6
3,519,961 UART: [idev] SUBJECT.KEYID = 7
3,521,168 UART: [idev] UDS.KEYID = 0
3,524,198 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,665,205 UART: [idev] Erasing UDS.KEYID = 0
6,025,838 UART: [idev] Sha1 KeyId Algorithm
6,049,135 UART: [idev] --
6,053,994 UART: [ldev] ++
6,054,592 UART: [ldev] CDI.KEYID = 6
6,055,484 UART: [ldev] SUBJECT.KEYID = 5
6,056,706 UART: [ldev] AUTHORITY.KEYID = 7
6,057,947 UART: [ldev] FE.KEYID = 1
6,100,465 UART: [ldev] Erasing FE.KEYID = 1
8,601,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,839 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,836 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,351,677 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,615 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,387,965 UART: [ldev] --
10,392,041 UART: [fwproc] Wait for Commands...
10,394,304 UART: [fwproc] Recv command 0x46574c44
10,396,405 UART: [fwproc] Recv'd Img size: 111944 bytes
13,773,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,850,224 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,910,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,228,095 >>> mbox cmd response: success
14,232,640 UART: [afmc] ++
14,233,259 UART: [afmc] CDI.KEYID = 6
14,234,193 UART: [afmc] SUBJECT.KEYID = 7
14,235,270 UART: [afmc] AUTHORITY.KEYID = 5
16,763,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,618 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,506,818 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,522,741 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,538,644 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,561,438 UART: [afmc] --
18,565,241 UART: [cold-reset] --
18,568,932 UART: [state] Locking Datavault
18,574,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,576,395 UART: [state] Locking ICCM
18,577,695 UART: [exit] Launching FMC @ 0x40000000
18,586,056 UART:
18,586,316 UART: Running Caliptra FMC ...
18,587,462 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
191,738 UART:
192,123 UART: Running Caliptra ROM ...
193,238 UART:
193,381 UART: [state] CFI Enabled
263,928 UART: [state] LifecycleState = Unprovisioned
265,839 UART: [state] DebugLocked = Yes
268,562 UART: [state] Starting the WD Timer 40000000 cycles
273,466 UART: [kat] SHA2-256
452,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,203 UART: [kat] ++
464,765 UART: [kat] sha1
475,584 UART: [kat] SHA2-256
478,620 UART: [kat] SHA2-384
485,708 UART: [kat] SHA2-512-ACC
488,682 UART: [kat] ECC-384
2,949,081 UART: [kat] HMAC-384Kdf
2,971,610 UART: [kat] LMS
3,501,096 UART: [kat] --
3,505,718 UART: [cold-reset] ++
3,507,636 UART: [fht] FHT @ 0x50003400
3,519,942 UART: [idev] ++
3,520,513 UART: [idev] CDI.KEYID = 6
3,521,420 UART: [idev] SUBJECT.KEYID = 7
3,522,624 UART: [idev] UDS.KEYID = 0
3,525,763 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,666,641 UART: [idev] Erasing UDS.KEYID = 0
6,028,841 UART: [idev] Sha1 KeyId Algorithm
6,051,766 UART: [idev] --
6,055,761 UART: [ldev] ++
6,056,338 UART: [ldev] CDI.KEYID = 6
6,057,285 UART: [ldev] SUBJECT.KEYID = 5
6,058,397 UART: [ldev] AUTHORITY.KEYID = 7
6,059,691 UART: [ldev] FE.KEYID = 1
6,100,551 UART: [ldev] Erasing FE.KEYID = 1
8,602,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,442 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,425 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,243 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,178 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,992 UART: [ldev] --
10,413,078 UART: [fwproc] Wait for Commands...
10,415,300 UART: [fwproc] Recv command 0x46574c44
10,417,399 UART: [fwproc] Recv'd Img size: 111944 bytes
13,785,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,654 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,927,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,246,221 >>> mbox cmd response: success
14,250,835 UART: [afmc] ++
14,251,447 UART: [afmc] CDI.KEYID = 6
14,252,407 UART: [afmc] SUBJECT.KEYID = 7
14,253,541 UART: [afmc] AUTHORITY.KEYID = 5
16,790,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,787 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,527,961 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,543,896 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,559,803 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,582,033 UART: [afmc] --
18,585,038 UART: [cold-reset] --
18,589,255 UART: [state] Locking Datavault
18,593,721 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,393 UART: [state] Locking ICCM
18,597,485 UART: [exit] Launching FMC @ 0x40000000
18,605,832 UART:
18,606,087 UART: Running Caliptra FMC ...
18,607,238 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,379,608 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
13,993,752 >>> mbox cmd response: success
18,277,011 UART:
18,277,440 UART: Running Caliptra FMC ...
18,278,610 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
191,867 UART:
192,239 UART: Running Caliptra ROM ...
193,397 UART:
602,837 UART: [state] CFI Enabled
618,095 UART: [state] LifecycleState = Unprovisioned
619,937 UART: [state] DebugLocked = Yes
621,529 UART: [state] Starting the WD Timer 40000000 cycles
626,431 UART: [kat] SHA2-256
805,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,148 UART: [kat] ++
817,707 UART: [kat] sha1
827,912 UART: [kat] SHA2-256
830,972 UART: [kat] SHA2-384
836,660 UART: [kat] SHA2-512-ACC
839,575 UART: [kat] ECC-384
3,280,905 UART: [kat] HMAC-384Kdf
3,292,655 UART: [kat] LMS
3,822,188 UART: [kat] --
3,825,907 UART: [cold-reset] ++
3,827,213 UART: [fht] FHT @ 0x50003400
3,838,169 UART: [idev] ++
3,838,771 UART: [idev] CDI.KEYID = 6
3,839,663 UART: [idev] SUBJECT.KEYID = 7
3,840,813 UART: [idev] UDS.KEYID = 0
3,843,808 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
3,984,472 UART: [idev] Erasing UDS.KEYID = 0
6,312,394 UART: [idev] Sha1 KeyId Algorithm
6,335,984 UART: [idev] --
6,339,443 UART: [ldev] ++
6,340,024 UART: [ldev] CDI.KEYID = 6
6,340,912 UART: [ldev] SUBJECT.KEYID = 5
6,342,083 UART: [ldev] AUTHORITY.KEYID = 7
6,343,370 UART: [ldev] FE.KEYID = 1
6,354,691 UART: [ldev] Erasing FE.KEYID = 1
8,828,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,303 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,277 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,121 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,086 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,776 UART: [ldev] --
10,619,961 UART: [fwproc] Wait for Commands...
10,623,185 UART: [fwproc] Recv command 0x46574c44
10,625,273 UART: [fwproc] Recv'd Img size: 111944 bytes
13,993,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,062,576 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,122,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,440,892 >>> mbox cmd response: success
14,444,960 UART: [afmc] ++
14,445,571 UART: [afmc] CDI.KEYID = 6
14,446,511 UART: [afmc] SUBJECT.KEYID = 7
14,447,648 UART: [afmc] AUTHORITY.KEYID = 5
16,944,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,666,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,667,971 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,684,160 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,700,065 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,715,982 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,739,369 UART: [afmc] --
18,743,909 UART: [cold-reset] --
18,747,799 UART: [state] Locking Datavault
18,752,641 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,356 UART: [state] Locking ICCM
18,756,575 UART: [exit] Launching FMC @ 0x40000000
18,764,940 UART:
18,765,189 UART: Running Caliptra FMC ...
18,766,331 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,695,504 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
14,228,620 >>> mbox cmd response: success
18,477,915 UART:
18,478,368 UART: Running Caliptra FMC ...
18,479,586 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = Yes
86,427 UART: [state] Starting the WD Timer 40000000 cycles
88,070 UART: [kat] SHA2-256
891,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,399 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,349 UART: [idev] --
1,209,406 UART: [ldev] ++
1,209,574 UART: [ldev] CDI.KEYID = 6
1,209,938 UART: [ldev] SUBJECT.KEYID = 5
1,210,365 UART: [ldev] AUTHORITY.KEYID = 7
1,210,828 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,161 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,855 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,725 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,431 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,485 UART: [ldev] --
1,281,911 UART: [fwproc] Wait for Commands...
1,282,526 UART: [fwproc] Recv command 0x46574c44
1,283,259 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,245 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,715 >>> mbox cmd response: success
2,742,947 UART: [afmc] ++
2,743,115 UART: [afmc] CDI.KEYID = 6
2,743,478 UART: [afmc] SUBJECT.KEYID = 7
2,743,904 UART: [afmc] AUTHORITY.KEYID = 5
2,779,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,999 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,712 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,583 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,293 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,065 UART: [afmc] --
2,822,054 UART: [cold-reset] --
2,823,016 UART: [state] Locking Datavault
2,824,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,713 UART: [state] Locking ICCM
2,825,321 UART: [exit] Launching FMC @ 0x40000000
2,830,618 UART:
2,830,634 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,590,641 >>> mbox cmd response: success
2,652,439 UART:
2,652,455 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = Yes
86,898 UART: [state] Starting the WD Timer 40000000 cycles
88,613 UART: [kat] SHA2-256
892,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,292 UART: [kat] ++
896,444 UART: [kat] sha1
900,650 UART: [kat] SHA2-256
902,590 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,857 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
1,169,593 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,671 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,168 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,862 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,732 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,438 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,602 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,853 UART: [fwproc] Recv command 0x46574c44
1,283,586 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,172 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,740,628 >>> mbox cmd response: success
2,741,790 UART: [afmc] ++
2,741,958 UART: [afmc] CDI.KEYID = 6
2,742,321 UART: [afmc] SUBJECT.KEYID = 7
2,742,747 UART: [afmc] AUTHORITY.KEYID = 5
2,778,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,884 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,597 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,468 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,178 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,820,974 UART: [afmc] --
2,822,049 UART: [cold-reset] --
2,822,883 UART: [state] Locking Datavault
2,824,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,718 UART: [state] Locking ICCM
2,825,324 UART: [exit] Launching FMC @ 0x40000000
2,830,621 UART:
2,830,637 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,052 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,548 >>> mbox cmd response: success
2,653,758 UART:
2,653,774 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = Yes
86,699 UART: [state] Starting the WD Timer 40000000 cycles
88,298 UART: [kat] SHA2-256
891,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,977 UART: [kat] ++
896,129 UART: [kat] sha1
900,421 UART: [kat] SHA2-256
902,361 UART: [kat] SHA2-384
905,076 UART: [kat] SHA2-512-ACC
906,977 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,104 UART: [kat] LMS
1,169,416 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,476 UART: [idev] ++
1,173,644 UART: [idev] CDI.KEYID = 6
1,174,005 UART: [idev] SUBJECT.KEYID = 7
1,174,430 UART: [idev] UDS.KEYID = 0
1,174,776 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,263 UART: [idev] --
1,209,294 UART: [ldev] ++
1,209,462 UART: [ldev] CDI.KEYID = 6
1,209,826 UART: [ldev] SUBJECT.KEYID = 5
1,210,253 UART: [ldev] AUTHORITY.KEYID = 7
1,210,716 UART: [ldev] FE.KEYID = 1
1,216,086 UART: [ldev] Erasing FE.KEYID = 1
1,242,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,717 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,587 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,293 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,259 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x46574c44
1,283,183 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,373 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,865 >>> mbox cmd response: success
2,742,963 UART: [afmc] ++
2,743,131 UART: [afmc] CDI.KEYID = 6
2,743,494 UART: [afmc] SUBJECT.KEYID = 7
2,743,920 UART: [afmc] AUTHORITY.KEYID = 5
2,779,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,345 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,802,058 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,929 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,813,639 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,821,439 UART: [afmc] --
2,822,516 UART: [cold-reset] --
2,823,324 UART: [state] Locking Datavault
2,824,395 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,999 UART: [state] Locking ICCM
2,825,537 UART: [exit] Launching FMC @ 0x40000000
2,830,834 UART:
2,830,850 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,112 >>> mbox cmd response: success
2,654,492 UART:
2,654,508 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = Yes
86,688 UART: [state] Starting the WD Timer 40000000 cycles
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,314 UART: [kat] SHA2-256
902,254 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,520 UART: [cold-reset] ++
1,170,863 UART: [fht] FHT @ 0x50003400
1,173,467 UART: [idev] ++
1,173,635 UART: [idev] CDI.KEYID = 6
1,173,996 UART: [idev] SUBJECT.KEYID = 7
1,174,421 UART: [idev] UDS.KEYID = 0
1,174,767 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,208,953 UART: [ldev] ++
1,209,121 UART: [ldev] CDI.KEYID = 6
1,209,485 UART: [ldev] SUBJECT.KEYID = 5
1,209,912 UART: [ldev] AUTHORITY.KEYID = 7
1,210,375 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,122 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,816 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,686 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,392 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,378 UART: [ldev] --
1,281,730 UART: [fwproc] Wait for Commands...
1,282,553 UART: [fwproc] Recv command 0x46574c44
1,283,286 UART: [fwproc] Recv'd Img size: 111944 bytes
2,552,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,514 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,980 >>> mbox cmd response: success
2,741,026 UART: [afmc] ++
2,741,194 UART: [afmc] CDI.KEYID = 6
2,741,557 UART: [afmc] SUBJECT.KEYID = 7
2,741,983 UART: [afmc] AUTHORITY.KEYID = 5
2,777,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,588 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,800,301 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,806,172 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,811,882 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,819,838 UART: [afmc] --
2,820,961 UART: [cold-reset] --
2,821,783 UART: [state] Locking Datavault
2,823,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,796 UART: [state] Locking ICCM
2,824,410 UART: [exit] Launching FMC @ 0x40000000
2,829,707 UART:
2,829,723 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,990 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,591,999 >>> mbox cmd response: success
2,653,923 UART:
2,653,939 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = Yes
86,417 UART: [state] Starting the WD Timer 40000000 cycles
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,468 UART: [idev] Sha1 KeyId Algorithm
1,207,337 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,721 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,415 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,285 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,991 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,055 UART: [ldev] --
1,280,447 UART: [fwproc] Wait for Commands...
1,281,018 UART: [fwproc] Recv command 0x46574c44
1,281,751 UART: [fwproc] Recv'd Img size: 111944 bytes
2,551,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,085 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,770 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,739,751 >>> mbox cmd response: success
2,740,979 UART: [afmc] ++
2,741,147 UART: [afmc] CDI.KEYID = 6
2,741,510 UART: [afmc] SUBJECT.KEYID = 7
2,741,936 UART: [afmc] AUTHORITY.KEYID = 5
2,777,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,907 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,799,620 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,805,491 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,811,201 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,819,193 UART: [afmc] --
2,820,102 UART: [cold-reset] --
2,821,142 UART: [state] Locking Datavault
2,822,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,843 UART: [state] Locking ICCM
2,823,377 UART: [exit] Launching FMC @ 0x40000000
2,828,674 UART:
2,828,690 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,817 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,589,481 >>> mbox cmd response: success
2,651,749 UART:
2,651,765 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = Yes
86,696 UART: [state] Starting the WD Timer 40000000 cycles
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,408 UART: [kat] SHA2-256
902,348 UART: [kat] SHA2-384
905,069 UART: [kat] SHA2-512-ACC
906,970 UART: [kat] ECC-384
916,857 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,871 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,174,959 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,579 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,074 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,768 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,638 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,344 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,280 UART: [ldev] --
1,281,724 UART: [fwproc] Wait for Commands...
1,282,345 UART: [fwproc] Recv command 0x46574c44
1,283,078 UART: [fwproc] Recv'd Img size: 111944 bytes
2,553,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,840 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,741,374 >>> mbox cmd response: success
2,742,484 UART: [afmc] ++
2,742,652 UART: [afmc] CDI.KEYID = 6
2,743,015 UART: [afmc] SUBJECT.KEYID = 7
2,743,441 UART: [afmc] AUTHORITY.KEYID = 5
2,778,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,418 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,801,131 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,807,002 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,812,712 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,820,530 UART: [afmc] --
2,821,433 UART: [cold-reset] --
2,822,067 UART: [state] Locking Datavault
2,823,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,150 UART: [state] Locking ICCM
2,824,716 UART: [exit] Launching FMC @ 0x40000000
2,830,013 UART:
2,830,029 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,030 <<< Executing mbox cmd 0x46574c44 (111944 bytes) from SoC
2,592,064 >>> mbox cmd response: success
2,653,854 UART:
2,653,870 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,279 UART:
192,647 UART: Running Caliptra ROM ...
193,826 UART:
193,981 UART: [state] CFI Enabled
263,670 UART: [state] LifecycleState = Unprovisioned
266,081 UART: [state] DebugLocked = No
268,871 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,313 UART:
192,704 UART: Running Caliptra ROM ...
193,784 UART:
603,310 UART: [state] CFI Enabled
615,510 UART: [state] LifecycleState = Unprovisioned
617,864 UART: [state] DebugLocked = No
619,297 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,228 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,118 UART:
192,489 UART: Running Caliptra ROM ...
193,609 UART:
193,751 UART: [state] CFI Enabled
261,831 UART: [state] LifecycleState = Unprovisioned
263,722 UART: [state] DebugLocked = No
266,559 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,174 UART:
192,563 UART: Running Caliptra ROM ...
193,716 UART:
193,867 UART: [state] CFI Enabled
263,900 UART: [state] LifecycleState = Unprovisioned
265,815 UART: [state] DebugLocked = No
267,953 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,411 UART:
192,795 UART: Running Caliptra ROM ...
193,978 UART:
603,580 UART: [state] CFI Enabled
619,762 UART: [state] LifecycleState = Unprovisioned
621,620 UART: [state] DebugLocked = No
624,079 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,073 UART:
192,466 UART: Running Caliptra ROM ...
193,662 UART:
193,816 UART: [state] CFI Enabled
261,651 UART: [state] LifecycleState = Unprovisioned
264,020 UART: [state] DebugLocked = No
266,549 UART: [state] WD Timer not started. Device not locked for debugging
270,437 UART: [kat] SHA2-256
452,390 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,886 UART: [kat] ++
464,386 UART: [kat] sha1
474,886 UART: [kat] SHA2-256
477,902 UART: [kat] SHA2-384
485,334 UART: [kat] SHA2-512-ACC
487,937 UART: [kat] ECC-384
3,773,525 UART: [kat] HMAC-384Kdf
3,802,861 UART: [kat] LMS
4,876,015 UART: [kat] --
4,879,796 UART: [cold-reset] ++
4,881,617 UART: [fht] FHT @ 0x50003400
4,892,483 UART: [idev] ++
4,893,151 UART: [idev] CDI.KEYID = 6
4,894,311 UART: [idev] SUBJECT.KEYID = 7
4,895,521 UART: [idev] UDS.KEYID = 0
4,929,609 UART: [idev] Erasing UDS.KEYID = 0
8,245,266 UART: [idev] Sha1 KeyId Algorithm
8,265,573 UART: [idev] CSR upload begun
8,271,044 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,573,969 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,590,245 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,606,373 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,622,335 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,646,917 UART: [idev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
10,793,012 UART: [idev] CSR uploaded
10,808,172 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,808,651 UART: [idev] --
10,813,574 UART: [ldev] ++
10,814,142 UART: [ldev] CDI.KEYID = 6
10,815,024 UART: [ldev] SUBJECT.KEYID = 5
10,816,257 UART: [ldev] AUTHORITY.KEYID = 7
10,817,488 UART: [ldev] FE.KEYID = 1
10,857,194 UART: [ldev] Erasing FE.KEYID = 1
14,192,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,503,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,519,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,535,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,551,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,570,692 UART: [ldev] --
16,576,113 UART: [fwproc] Wait for Commands...
16,578,001 UART: [fwproc] Recv command 0x49444352
16,593,448 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
10,479,994 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,166,391 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,448 UART:
192,845 UART: Running Caliptra ROM ...
194,003 UART:
603,644 UART: [state] CFI Enabled
614,763 UART: [state] LifecycleState = Unprovisioned
616,755 UART: [state] DebugLocked = No
618,239 UART: [state] WD Timer not started. Device not locked for debugging
623,364 UART: [kat] SHA2-256
805,307 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,828 UART: [kat] ++
817,466 UART: [kat] sha1
828,990 UART: [kat] SHA2-256
832,031 UART: [kat] SHA2-384
838,214 UART: [kat] SHA2-512-ACC
840,840 UART: [kat] ECC-384
4,095,254 UART: [kat] HMAC-384Kdf
4,106,850 UART: [kat] LMS
5,180,001 UART: [kat] --
5,184,388 UART: [cold-reset] ++
5,186,049 UART: [fht] FHT @ 0x50003400
5,196,647 UART: [idev] ++
5,197,205 UART: [idev] CDI.KEYID = 6
5,198,435 UART: [idev] SUBJECT.KEYID = 7
5,199,857 UART: [idev] UDS.KEYID = 0
5,218,905 UART: [idev] Erasing UDS.KEYID = 0
8,492,437 UART: [idev] Sha1 KeyId Algorithm
8,512,851 UART: [idev] CSR upload begun
8,518,307 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,811,081 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,827,469 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,843,566 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,859,563 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,884,095 UART: [idev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
11,030,147 UART: [idev] CSR uploaded
11,045,310 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,045,790 UART: [idev] --
11,049,423 UART: [ldev] ++
11,049,984 UART: [ldev] CDI.KEYID = 6
11,050,888 UART: [ldev] SUBJECT.KEYID = 5
11,052,063 UART: [ldev] AUTHORITY.KEYID = 7
11,053,294 UART: [ldev] FE.KEYID = 1
11,064,039 UART: [ldev] Erasing FE.KEYID = 1
14,359,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,651,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,667,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,683,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,699,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,720,686 UART: [ldev] --
16,725,782 UART: [fwproc] Wait for Commands...
16,729,006 UART: [fwproc] Recv command 0x49444352
16,744,451 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
10,735,659 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,354,516 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,129 UART:
192,519 UART: Running Caliptra ROM ...
193,692 UART:
193,857 UART: [state] CFI Enabled
259,395 UART: [state] LifecycleState = Unprovisioned
261,261 UART: [state] DebugLocked = No
263,123 UART: [state] WD Timer not started. Device not locked for debugging
267,640 UART: [kat] SHA2-256
446,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,332 UART: [kat] ++
458,880 UART: [kat] sha1
469,494 UART: [kat] SHA2-256
472,502 UART: [kat] SHA2-384
478,424 UART: [kat] SHA2-512-ACC
481,351 UART: [kat] ECC-384
2,946,026 UART: [kat] HMAC-384Kdf
2,969,599 UART: [kat] LMS
3,499,049 UART: [kat] --
3,502,475 UART: [cold-reset] ++
3,504,302 UART: [fht] FHT @ 0x50003400
3,515,657 UART: [idev] ++
3,516,221 UART: [idev] CDI.KEYID = 6
3,517,184 UART: [idev] SUBJECT.KEYID = 7
3,518,341 UART: [idev] UDS.KEYID = 0
3,541,570 UART: [idev] Erasing UDS.KEYID = 0
6,022,635 UART: [idev] Sha1 KeyId Algorithm
6,043,060 UART: [idev] CSR upload begun
6,047,814 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,780,539 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,796,574 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,812,556 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,828,368 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,186 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,997,207 UART: [idev] CSR uploaded
8,013,280 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,013,725 UART: [idev] --
8,019,085 UART: [ldev] ++
8,019,657 UART: [ldev] CDI.KEYID = 6
8,020,567 UART: [ldev] SUBJECT.KEYID = 5
8,021,770 UART: [ldev] AUTHORITY.KEYID = 7
8,023,027 UART: [ldev] FE.KEYID = 1
8,059,087 UART: [ldev] Erasing FE.KEYID = 1
10,564,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,301,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,317,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,333,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,368,812 UART: [ldev] --
12,373,967 UART: [fwproc] Wait for Commands...
12,376,764 UART: [fwproc] Recv command 0x49444352
12,391,934 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,074 UART:
192,463 UART: Running Caliptra ROM ...
193,643 UART:
193,791 UART: [state] CFI Enabled
261,113 UART: [state] LifecycleState = Unprovisioned
262,972 UART: [state] DebugLocked = No
265,919 UART: [state] WD Timer not started. Device not locked for debugging
269,048 UART: [kat] SHA2-256
448,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,760 UART: [kat] ++
460,299 UART: [kat] sha1
470,431 UART: [kat] SHA2-256
473,445 UART: [kat] SHA2-384
479,219 UART: [kat] SHA2-512-ACC
482,205 UART: [kat] ECC-384
2,942,839 UART: [kat] HMAC-384Kdf
2,970,337 UART: [kat] LMS
3,499,808 UART: [kat] --
3,503,521 UART: [cold-reset] ++
3,505,936 UART: [fht] FHT @ 0x50003400
3,515,893 UART: [idev] ++
3,516,460 UART: [idev] CDI.KEYID = 6
3,517,373 UART: [idev] SUBJECT.KEYID = 7
3,518,621 UART: [idev] UDS.KEYID = 0
3,541,759 UART: [idev] Erasing UDS.KEYID = 0
6,022,489 UART: [idev] Sha1 KeyId Algorithm
6,042,596 UART: [idev] CSR upload begun
6,047,310 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,482 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,604 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,549 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,826,355 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,850,174 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,995,313 UART: [idev] CSR uploaded
8,011,411 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,011,863 UART: [idev] --
8,014,850 UART: [ldev] ++
8,015,429 UART: [ldev] CDI.KEYID = 6
8,016,312 UART: [ldev] SUBJECT.KEYID = 5
8,017,519 UART: [ldev] AUTHORITY.KEYID = 7
8,018,759 UART: [ldev] FE.KEYID = 1
8,060,258 UART: [ldev] Erasing FE.KEYID = 1
10,563,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,367,795 UART: [ldev] --
12,372,361 UART: [fwproc] Wait for Commands...
12,374,028 UART: [fwproc] Recv command 0x49444352
12,389,162 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
7,684,790 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,983,180 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,436 UART:
192,798 UART: Running Caliptra ROM ...
193,869 UART:
603,715 UART: [state] CFI Enabled
615,361 UART: [state] LifecycleState = Unprovisioned
617,226 UART: [state] DebugLocked = No
619,165 UART: [state] WD Timer not started. Device not locked for debugging
623,262 UART: [kat] SHA2-256
802,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,999 UART: [kat] ++
814,445 UART: [kat] sha1
825,692 UART: [kat] SHA2-256
828,710 UART: [kat] SHA2-384
833,603 UART: [kat] SHA2-512-ACC
836,529 UART: [kat] ECC-384
3,278,570 UART: [kat] HMAC-384Kdf
3,290,387 UART: [kat] LMS
3,819,882 UART: [kat] --
3,824,263 UART: [cold-reset] ++
3,825,437 UART: [fht] FHT @ 0x50003400
3,835,923 UART: [idev] ++
3,836,488 UART: [idev] CDI.KEYID = 6
3,837,504 UART: [idev] SUBJECT.KEYID = 7
3,838,600 UART: [idev] UDS.KEYID = 0
3,854,530 UART: [idev] Erasing UDS.KEYID = 0
6,317,104 UART: [idev] Sha1 KeyId Algorithm
6,338,375 UART: [idev] CSR upload begun
6,343,059 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,057,854 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,073,913 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,089,861 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,105,739 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,129,540 UART: [idev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
8,274,650 UART: [idev] CSR uploaded
8,290,778 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,291,222 UART: [idev] --
8,296,032 UART: [ldev] ++
8,296,598 UART: [ldev] CDI.KEYID = 6
8,297,612 UART: [ldev] SUBJECT.KEYID = 5
8,298,750 UART: [ldev] AUTHORITY.KEYID = 7
8,299,979 UART: [ldev] FE.KEYID = 1
8,311,596 UART: [ldev] Erasing FE.KEYID = 1
10,785,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,503,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,519,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,535,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,551,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,572,474 UART: [ldev] --
12,576,804 UART: [fwproc] Wait for Commands...
12,579,450 UART: [fwproc] Recv command 0x49444352
12,594,626 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
7,945,654 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,176,203 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,817 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,199,173 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] CSR upload begun
1,209,102 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,459 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,167 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,052 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,758 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,187 UART: [idev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
1,296,684 UART: [idev] CSR uploaded
1,299,729 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,898 UART: [idev] --
1,300,973 UART: [ldev] ++
1,301,141 UART: [ldev] CDI.KEYID = 6
1,301,505 UART: [ldev] SUBJECT.KEYID = 5
1,301,932 UART: [ldev] AUTHORITY.KEYID = 7
1,302,395 UART: [ldev] FE.KEYID = 1
1,307,591 UART: [ldev] Erasing FE.KEYID = 1
1,333,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,213 UART: [ldev] --
1,372,511 UART: [fwproc] Wait for Commands...
1,373,226 UART: [fwproc] Recv command 0x49444352
1,378,355 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,024 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,366 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,809 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,183,060 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,207,404 UART: [idev] CSR upload begun
1,209,183 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,920 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,628 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,513 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,219 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,648 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,145 UART: [idev] CSR uploaded
1,300,190 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,359 UART: [idev] --
1,301,488 UART: [ldev] ++
1,301,656 UART: [ldev] CDI.KEYID = 6
1,302,020 UART: [ldev] SUBJECT.KEYID = 5
1,302,447 UART: [ldev] AUTHORITY.KEYID = 7
1,302,910 UART: [ldev] FE.KEYID = 1
1,308,046 UART: [ldev] Erasing FE.KEYID = 1
1,334,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,172 UART: [ldev] --
1,373,590 UART: [fwproc] Wait for Commands...
1,374,305 UART: [fwproc] Recv command 0x49444352
1,379,434 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,101 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,637 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,427 UART: [idev] ++
1,172,595 UART: [idev] CDI.KEYID = 6
1,172,956 UART: [idev] SUBJECT.KEYID = 7
1,173,381 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,198,957 UART: [idev] Sha1 KeyId Algorithm
1,207,195 UART: [idev] CSR upload begun
1,208,974 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,953 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,661 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,546 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,252 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,681 UART: [idev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
1,297,178 UART: [idev] CSR uploaded
1,300,223 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,392 UART: [idev] --
1,301,405 UART: [ldev] ++
1,301,573 UART: [ldev] CDI.KEYID = 6
1,301,937 UART: [ldev] SUBJECT.KEYID = 5
1,302,364 UART: [ldev] AUTHORITY.KEYID = 7
1,302,827 UART: [ldev] FE.KEYID = 1
1,308,193 UART: [ldev] Erasing FE.KEYID = 1
1,334,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,385 UART: [ldev] --
1,373,835 UART: [fwproc] Wait for Commands...
1,374,638 UART: [fwproc] Recv command 0x49444352
1,379,767 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,428 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,404 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,358 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,207,664 UART: [idev] CSR upload begun
1,209,443 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,286 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,994 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,879 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,585 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,014 UART: [idev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
1,297,511 UART: [idev] CSR uploaded
1,300,556 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,725 UART: [idev] --
1,301,698 UART: [ldev] ++
1,301,866 UART: [ldev] CDI.KEYID = 6
1,302,230 UART: [ldev] SUBJECT.KEYID = 5
1,302,657 UART: [ldev] AUTHORITY.KEYID = 7
1,303,120 UART: [ldev] FE.KEYID = 1
1,308,236 UART: [ldev] Erasing FE.KEYID = 1
1,334,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,242 UART: [ldev] --
1,373,644 UART: [fwproc] Wait for Commands...
1,374,391 UART: [fwproc] Recv command 0x49444352
1,379,520 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,051 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,755 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,911 UART: [state] WD Timer not started. Device not locked for debugging
88,190 UART: [kat] SHA2-256
891,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,869 UART: [kat] ++
896,021 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
904,954 UART: [kat] SHA2-512-ACC
906,855 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,362 UART: [kat] LMS
1,169,674 UART: [kat] --
1,170,919 UART: [cold-reset] ++
1,171,281 UART: [fht] FHT @ 0x50003400
1,174,045 UART: [idev] ++
1,174,213 UART: [idev] CDI.KEYID = 6
1,174,574 UART: [idev] SUBJECT.KEYID = 7
1,174,999 UART: [idev] UDS.KEYID = 0
1,183,073 UART: [idev] Erasing UDS.KEYID = 0
1,199,803 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] CSR upload begun
1,209,734 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,341 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,049 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,934 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,640 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,069 UART: [idev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
1,297,566 UART: [idev] CSR uploaded
1,300,611 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,780 UART: [idev] --
1,301,807 UART: [ldev] ++
1,301,975 UART: [ldev] CDI.KEYID = 6
1,302,339 UART: [ldev] SUBJECT.KEYID = 5
1,302,766 UART: [ldev] AUTHORITY.KEYID = 7
1,303,229 UART: [ldev] FE.KEYID = 1
1,308,347 UART: [ldev] Erasing FE.KEYID = 1
1,334,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,781 UART: [ldev] --
1,374,121 UART: [fwproc] Wait for Commands...
1,374,842 UART: [fwproc] Recv command 0x49444352
1,379,971 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,316 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,170 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,450 UART: [idev] ++
1,173,618 UART: [idev] CDI.KEYID = 6
1,173,979 UART: [idev] SUBJECT.KEYID = 7
1,174,404 UART: [idev] UDS.KEYID = 0
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] CSR upload begun
1,209,513 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,260 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,968 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,853 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,559 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,988 UART: [idev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
1,297,485 UART: [idev] CSR uploaded
1,300,530 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,699 UART: [idev] --
1,301,732 UART: [ldev] ++
1,301,900 UART: [ldev] CDI.KEYID = 6
1,302,264 UART: [ldev] SUBJECT.KEYID = 5
1,302,691 UART: [ldev] AUTHORITY.KEYID = 7
1,303,154 UART: [ldev] FE.KEYID = 1
1,308,588 UART: [ldev] Erasing FE.KEYID = 1
1,334,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,250 UART: [ldev] --
1,373,746 UART: [fwproc] Wait for Commands...
1,374,533 UART: [fwproc] Recv command 0x49444352
1,379,662 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,725 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,597 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,179 UART:
192,549 UART: Running Caliptra ROM ...
193,752 UART:
193,906 UART: [state] CFI Enabled
262,928 UART: [state] LifecycleState = Unprovisioned
265,273 UART: [state] DebugLocked = No
267,300 UART: [state] WD Timer not started. Device not locked for debugging
271,139 UART: [kat] SHA2-256
453,046 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,553 UART: [kat] ++
465,075 UART: [kat] sha1
476,715 UART: [kat] SHA2-256
479,733 UART: [kat] SHA2-384
486,394 UART: [kat] SHA2-512-ACC
489,018 UART: [kat] ECC-384
3,779,069 UART: [kat] HMAC-384Kdf
3,802,026 UART: [kat] LMS
4,875,213 UART: [kat] --
4,880,099 UART: [cold-reset] ++
4,881,471 UART: [fht] FHT @ 0x50003400
4,892,940 UART: [idev] ++
4,893,677 UART: [idev] CDI.KEYID = 6
4,894,860 UART: [idev] SUBJECT.KEYID = 7
4,896,013 UART: [idev] UDS.KEYID = 0
4,896,995 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
4,930,177 UART: [idev] Erasing UDS.KEYID = 0
8,242,759 UART: [idev] Sha1 KeyId Algorithm
8,265,127 UART: [idev] --
8,269,770 UART: [ldev] ++
8,270,341 UART: [ldev] CDI.KEYID = 6
8,271,525 UART: [ldev] SUBJECT.KEYID = 5
8,272,683 UART: [ldev] AUTHORITY.KEYID = 7
8,273,913 UART: [ldev] FE.KEYID = 1
8,317,631 UART: [ldev] Erasing FE.KEYID = 1
11,649,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,976 UART: [ldev] --
14,015,018 UART: [fwproc] Wait for Commands...
14,017,823 UART: [fwproc] Recv command 0x49444352
14,024,864 UART: ROM Fatal Error: 0x0102000A
14,028,180 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
4,779,442 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
13,830,612 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,450 UART:
192,862 UART: Running Caliptra ROM ...
194,018 UART:
603,452 UART: [state] CFI Enabled
617,001 UART: [state] LifecycleState = Unprovisioned
619,385 UART: [state] DebugLocked = No
621,890 UART: [state] WD Timer not started. Device not locked for debugging
627,292 UART: [kat] SHA2-256
809,265 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,821 UART: [kat] ++
821,352 UART: [kat] sha1
832,551 UART: [kat] SHA2-256
835,562 UART: [kat] SHA2-384
842,025 UART: [kat] SHA2-512-ACC
844,637 UART: [kat] ECC-384
4,099,329 UART: [kat] HMAC-384Kdf
4,111,731 UART: [kat] LMS
5,184,892 UART: [kat] --
5,190,534 UART: [cold-reset] ++
5,192,535 UART: [fht] FHT @ 0x50003400
5,203,294 UART: [idev] ++
5,204,017 UART: [idev] CDI.KEYID = 6
5,205,192 UART: [idev] SUBJECT.KEYID = 7
5,206,593 UART: [idev] UDS.KEYID = 0
5,207,972 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
5,220,877 UART: [idev] Erasing UDS.KEYID = 0
8,493,741 UART: [idev] Sha1 KeyId Algorithm
8,514,653 UART: [idev] --
8,519,075 UART: [ldev] ++
8,519,644 UART: [ldev] CDI.KEYID = 6
8,520,874 UART: [ldev] SUBJECT.KEYID = 5
8,522,299 UART: [ldev] AUTHORITY.KEYID = 7
8,523,906 UART: [ldev] FE.KEYID = 1
8,533,541 UART: [ldev] Erasing FE.KEYID = 1
11,823,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,385 UART: [ldev] --
14,190,851 UART: [fwproc] Wait for Commands...
14,192,513 UART: [fwproc] Recv command 0x49444352
14,197,742 UART: ROM Fatal Error: 0x0102000A
14,201,043 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
5,102,579 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
14,022,023 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,128 UART:
192,517 UART: Running Caliptra ROM ...
193,627 UART:
193,770 UART: [state] CFI Enabled
261,403 UART: [state] LifecycleState = Unprovisioned
263,269 UART: [state] DebugLocked = No
265,739 UART: [state] WD Timer not started. Device not locked for debugging
270,206 UART: [kat] SHA2-256
449,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,900 UART: [kat] ++
461,431 UART: [kat] sha1
472,579 UART: [kat] SHA2-256
475,635 UART: [kat] SHA2-384
480,910 UART: [kat] SHA2-512-ACC
483,896 UART: [kat] ECC-384
2,948,170 UART: [kat] HMAC-384Kdf
2,971,494 UART: [kat] LMS
3,500,928 UART: [kat] --
3,505,969 UART: [cold-reset] ++
3,506,935 UART: [fht] FHT @ 0x50003400
3,517,831 UART: [idev] ++
3,518,397 UART: [idev] CDI.KEYID = 6
3,519,283 UART: [idev] SUBJECT.KEYID = 7
3,520,497 UART: [idev] UDS.KEYID = 0
3,521,549 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,543,226 UART: [idev] Erasing UDS.KEYID = 0
6,026,634 UART: [idev] Sha1 KeyId Algorithm
6,049,537 UART: [idev] --
6,054,131 UART: [ldev] ++
6,054,714 UART: [ldev] CDI.KEYID = 6
6,055,785 UART: [ldev] SUBJECT.KEYID = 5
6,056,895 UART: [ldev] AUTHORITY.KEYID = 7
6,058,071 UART: [ldev] FE.KEYID = 1
6,098,077 UART: [ldev] Erasing FE.KEYID = 1
8,601,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,753 UART: [ldev] --
10,410,613 UART: [fwproc] Wait for Commands...
10,413,758 UART: [fwproc] Recv command 0x49444352
10,421,044 UART: ROM Fatal Error: 0x0102000A
10,424,144 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,068 UART:
192,483 UART: Running Caliptra ROM ...
193,676 UART:
193,833 UART: [state] CFI Enabled
267,226 UART: [state] LifecycleState = Unprovisioned
269,126 UART: [state] DebugLocked = No
271,854 UART: [state] WD Timer not started. Device not locked for debugging
275,803 UART: [kat] SHA2-256
454,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,501 UART: [kat] ++
467,040 UART: [kat] sha1
478,198 UART: [kat] SHA2-256
481,258 UART: [kat] SHA2-384
487,192 UART: [kat] SHA2-512-ACC
490,164 UART: [kat] ECC-384
2,950,322 UART: [kat] HMAC-384Kdf
2,972,540 UART: [kat] LMS
3,501,984 UART: [kat] --
3,504,786 UART: [cold-reset] ++
3,506,334 UART: [fht] FHT @ 0x50003400
3,516,663 UART: [idev] ++
3,517,236 UART: [idev] CDI.KEYID = 6
3,518,151 UART: [idev] SUBJECT.KEYID = 7
3,519,371 UART: [idev] UDS.KEYID = 0
3,520,362 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,544,548 UART: [idev] Erasing UDS.KEYID = 0
6,028,328 UART: [idev] Sha1 KeyId Algorithm
6,050,152 UART: [idev] --
6,054,041 UART: [ldev] ++
6,054,621 UART: [ldev] CDI.KEYID = 6
6,055,529 UART: [ldev] SUBJECT.KEYID = 5
6,056,695 UART: [ldev] AUTHORITY.KEYID = 7
6,057,988 UART: [ldev] FE.KEYID = 1
6,100,077 UART: [ldev] Erasing FE.KEYID = 1
8,603,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,382 UART: [ldev] --
10,410,498 UART: [fwproc] Wait for Commands...
10,412,773 UART: [fwproc] Recv command 0x49444352
10,419,139 UART: ROM Fatal Error: 0x0102000A
10,422,235 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,382,514 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,230,899 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
193,004 UART:
194,030 UART: Running Caliptra ROM ...
195,180 UART:
604,237 UART: [state] CFI Enabled
616,471 UART: [state] LifecycleState = Unprovisioned
618,373 UART: [state] DebugLocked = No
621,262 UART: [state] WD Timer not started. Device not locked for debugging
624,207 UART: [kat] SHA2-256
803,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,931 UART: [kat] ++
815,437 UART: [kat] sha1
825,935 UART: [kat] SHA2-256
828,946 UART: [kat] SHA2-384
834,058 UART: [kat] SHA2-512-ACC
837,027 UART: [kat] ECC-384
3,278,957 UART: [kat] HMAC-384Kdf
3,291,148 UART: [kat] LMS
3,820,663 UART: [kat] --
3,825,702 UART: [cold-reset] ++
3,828,164 UART: [fht] FHT @ 0x50003400
3,840,269 UART: [idev] ++
3,840,829 UART: [idev] CDI.KEYID = 6
3,841,715 UART: [idev] SUBJECT.KEYID = 7
3,842,923 UART: [idev] UDS.KEYID = 0
3,843,941 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,862,353 UART: [idev] Erasing UDS.KEYID = 0
6,318,463 UART: [idev] Sha1 KeyId Algorithm
6,341,266 UART: [idev] --
6,345,472 UART: [ldev] ++
6,346,033 UART: [ldev] CDI.KEYID = 6
6,347,024 UART: [ldev] SUBJECT.KEYID = 5
6,348,129 UART: [ldev] AUTHORITY.KEYID = 7
6,349,407 UART: [ldev] FE.KEYID = 1
6,356,816 UART: [ldev] Erasing FE.KEYID = 1
8,832,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,206 UART: [ldev] --
10,624,772 UART: [fwproc] Wait for Commands...
10,626,435 UART: [fwproc] Recv command 0x49444352
10,631,879 UART: ROM Fatal Error: 0x0102000A
10,635,018 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,690,695 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,403,757 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,841 UART: [idev] ++
1,173,009 UART: [idev] CDI.KEYID = 6
1,173,370 UART: [idev] SUBJECT.KEYID = 7
1,173,795 UART: [idev] UDS.KEYID = 0
1,174,141 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,197,841 UART: [idev] Sha1 KeyId Algorithm
1,206,585 UART: [idev] --
1,207,412 UART: [ldev] ++
1,207,580 UART: [ldev] CDI.KEYID = 6
1,207,944 UART: [ldev] SUBJECT.KEYID = 5
1,208,371 UART: [ldev] AUTHORITY.KEYID = 7
1,208,834 UART: [ldev] FE.KEYID = 1
1,213,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,232 UART: [ldev] --
1,279,562 UART: [fwproc] Wait for Commands...
1,280,181 UART: [fwproc] Recv command 0x49444352
1,281,953 UART: ROM Fatal Error: 0x0102000A
1,283,114 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,504 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,308 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,925 UART: [kat] HMAC-384Kdf
921,727 UART: [kat] LMS
1,170,039 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,200 UART: [fht] FHT @ 0x50003400
1,173,828 UART: [idev] ++
1,173,996 UART: [idev] CDI.KEYID = 6
1,174,357 UART: [idev] SUBJECT.KEYID = 7
1,174,782 UART: [idev] UDS.KEYID = 0
1,175,128 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,990 UART: [idev] Erasing UDS.KEYID = 0
1,200,700 UART: [idev] Sha1 KeyId Algorithm
1,209,454 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,909 UART: [ldev] SUBJECT.KEYID = 5
1,211,336 UART: [ldev] AUTHORITY.KEYID = 7
1,211,799 UART: [ldev] FE.KEYID = 1
1,216,941 UART: [ldev] Erasing FE.KEYID = 1
1,243,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,925 UART: [ldev] --
1,283,409 UART: [fwproc] Wait for Commands...
1,284,234 UART: [fwproc] Recv command 0x49444352
1,285,958 UART: ROM Fatal Error: 0x0102000A
1,287,119 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,541 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,139,689 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,051 UART: [kat] ++
895,203 UART: [kat] sha1
899,229 UART: [kat] SHA2-256
901,169 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,749 UART: [idev] --
1,208,632 UART: [ldev] ++
1,208,800 UART: [ldev] CDI.KEYID = 6
1,209,164 UART: [ldev] SUBJECT.KEYID = 5
1,209,591 UART: [ldev] AUTHORITY.KEYID = 7
1,210,054 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,242,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,856 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,825 UART: [fwproc] Recv command 0x49444352
1,284,427 UART: ROM Fatal Error: 0x0102000A
1,285,588 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,256 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,102 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,242,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,653 UART: [ldev] --
1,281,961 UART: [fwproc] Wait for Commands...
1,282,714 UART: [fwproc] Recv command 0x49444352
1,284,286 UART: ROM Fatal Error: 0x0102000A
1,285,447 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,537 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,272 UART: [kat] LMS
1,168,584 UART: [kat] --
1,169,309 UART: [cold-reset] ++
1,169,789 UART: [fht] FHT @ 0x50003400
1,172,419 UART: [idev] ++
1,172,587 UART: [idev] CDI.KEYID = 6
1,172,948 UART: [idev] SUBJECT.KEYID = 7
1,173,373 UART: [idev] UDS.KEYID = 0
1,173,719 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,325 UART: [idev] Erasing UDS.KEYID = 0
1,197,997 UART: [idev] Sha1 KeyId Algorithm
1,206,765 UART: [idev] --
1,207,774 UART: [ldev] ++
1,207,942 UART: [ldev] CDI.KEYID = 6
1,208,306 UART: [ldev] SUBJECT.KEYID = 5
1,208,733 UART: [ldev] AUTHORITY.KEYID = 7
1,209,196 UART: [ldev] FE.KEYID = 1
1,214,570 UART: [ldev] Erasing FE.KEYID = 1
1,240,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,908 UART: [ldev] --
1,279,346 UART: [fwproc] Wait for Commands...
1,280,097 UART: [fwproc] Recv command 0x49444352
1,281,579 UART: ROM Fatal Error: 0x0102000A
1,282,740 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,388 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,436 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,411 UART: [kat] SHA2-512-ACC
906,312 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,843 UART: [kat] LMS
1,169,155 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,174,366 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,238 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,559 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,947 UART: [ldev] --
1,281,395 UART: [fwproc] Wait for Commands...
1,282,086 UART: [fwproc] Recv command 0x49444352
1,283,732 UART: ROM Fatal Error: 0x0102000A
1,284,893 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,851 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
192,897 UART:
193,261 UART: Running Caliptra ROM ...
194,453 UART:
194,599 UART: [state] CFI Enabled
266,341 UART: [state] LifecycleState = Unprovisioned
268,333 UART: [state] DebugLocked = No
270,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,071 UART: [kat] SHA2-256
445,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,274 UART: [kat] ++
456,782 UART: [kat] sha1
467,580 UART: [kat] SHA2-256
470,297 UART: [kat] SHA2-384
476,277 UART: [kat] SHA2-512-ACC
478,633 UART: [kat] ECC-384
2,768,292 UART: [kat] HMAC-384Kdf
2,800,062 UART: [kat] LMS
3,990,368 UART: [kat] --
3,996,474 UART: [cold-reset] ++
3,999,112 UART: [fht] Storing FHT @ 0x50003400
4,010,018 UART: [idev] ++
4,010,575 UART: [idev] CDI.KEYID = 6
4,011,523 UART: [idev] SUBJECT.KEYID = 7
4,012,768 UART: [idev] UDS.KEYID = 0
4,013,757 ready_for_fw is high
4,013,939 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,394 UART: [idev] Erasing UDS.KEYID = 0
7,345,578 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,737 UART: [idev] --
7,370,934 UART: [ldev] ++
7,371,547 UART: [ldev] CDI.KEYID = 6
7,372,478 UART: [ldev] SUBJECT.KEYID = 5
7,373,680 UART: [ldev] AUTHORITY.KEYID = 7
7,374,955 UART: [ldev] FE.KEYID = 1
7,422,133 UART: [ldev] Erasing FE.KEYID = 1
10,750,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,277 UART: [ldev] --
13,113,567 UART: [fwproc] Waiting for Commands...
13,116,599 UART: [fwproc] Received command 0x46574c44
13,118,832 UART: [fwproc] Received Image of size 114036 bytes
17,172,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,856 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,637,445 >>> mbox cmd response: success
17,640,897 UART: [afmc] ++
17,641,732 UART: [afmc] CDI.KEYID = 6
17,642,648 UART: [afmc] SUBJECT.KEYID = 7
17,643,749 UART: [afmc] AUTHORITY.KEYID = 5
21,009,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,309 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,568 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,006 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,794 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,235 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,599 UART: [afmc] --
23,380,223 UART: [cold-reset] --
23,384,240 UART: [state] Locking Datavault
23,388,299 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,049 UART: [state] Locking ICCM
23,391,273 UART: [exit] Launching FMC @ 0x40000130
23,399,664 UART:
23,399,894 UART: Running Caliptra FMC ...
23,400,983 UART:
23,401,136 UART: [state] CFI Enabled
23,467,997 UART: [fht] FMC Alias Private Key: 7
25,806,129 UART: [art] Extend RT PCRs Done
25,807,356 UART: [art] Lock RT PCRs Done
25,809,004 UART: [art] Populate DV Done
25,814,365 UART: [fht] FMC Alias Private Key: 7
25,815,894 UART: [art] Derive CDI
25,816,721 UART: [art] Store in in slot 0x4
25,876,026 UART: [art] Derive Key Pair
25,877,021 UART: [art] Store priv key in slot 0x5
29,169,698 UART: [art] Derive Key Pair - Done
29,182,759 UART: [art] Signing Cert with AUTHO
29,184,065 UART: RITY.KEYID = 7
31,471,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,756 UART: [art] PUB.X = FF900E9C02604B5F2BDB57B6D5D43C817FC48BC1ECDE2BBD3864C5A6368D2262FE98B8D0ED85FE173C6B8284A94101CD
31,479,973 UART: [art] PUB.Y = A175228E75A9F34E8F145975AE0F9F4BF1DA2C220D41561D12F4B4E9502C70AF379C67EE9A3B225ADDA07D5278BD98D1
31,487,265 UART: [art] SIG.R = EE91BA43C4F82D3A4FD0422C778CB51D9586532C303C56F9016AC71BC707F585F4446E10C9B8AB010440ED1874FD9351
31,494,640 UART: [art] SIG.S = FE53EF1B072EFBC37259E3C0D29A938FB788F76014B12796985BAD64E9B3E143EC32FB2C339E275F745D5094F6146462
32,799,770 UART: Caliptra RT
32,800,478 UART: [state] CFI Enabled
32,960,012 UART: [rt] RT listening for mailbox commands...
32,962,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,117,774 UART: [rt]cmd =0x41544d4e, len=14344
38,353,504 >>> mbox cmd response data (8 bytes)
38,354,102 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,384,620 UART: [rt]cmd =0x41545348, len=116
38,404,885 >>> mbox cmd response data (12 bytes)
40,463,997 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,609,000 UART:
40,609,382 UART: Running Caliptra ROM ...
40,610,434 UART:
40,610,580 UART: [state] CFI Enabled
40,685,781 UART: [state] LifecycleState = Unprovisioned
40,687,718 UART: [state] DebugLocked = No
40,690,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,695,776 UART: [kat] SHA2-256
40,865,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,875,992 UART: [kat] ++
40,876,472 UART: [kat] sha1
40,886,479 UART: [kat] SHA2-256
40,889,177 UART: [kat] SHA2-384
40,894,238 UART: [kat] SHA2-512-ACC
40,896,578 UART: [kat] ECC-384
43,186,651 UART: [kat] HMAC-384Kdf
43,220,246 UART: [kat] LMS
44,410,533 UART: [kat] --
44,415,894 UART: [update-reset] ++
48,548,030 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,551,937 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,933,890 >>> mbox cmd response: success
48,938,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,939,129 UART: [update-reset] Copying MAN_2 To MAN_1
48,957,582 UART: [update-reset Success] --
48,960,465 UART: [state] Locking Datavault
48,964,632 UART: [state] Locking PCR0, PCR1 and PCR31
48,966,380 UART: [state] Locking ICCM
48,969,068 UART: [exit] Launching FMC @ 0x40000130
48,977,513 UART:
48,977,751 UART: Running Caliptra FMC ...
48,978,844 UART:
48,978,996 UART: [state] CFI Enabled
49,076,030 UART: [art] Extend RT PCRs Done
49,077,243 UART: [art] Lock RT PCRs Done
49,078,860 UART: [art] Populate DV Done
49,084,260 UART: [fht] FMC Alias Private Key: 7
49,085,895 UART: [art] Derive CDI
49,086,712 UART: [art] Store in in slot 0x4
49,145,289 UART: [art] Derive Key Pair
49,146,284 UART: [art] Store priv key in slot 0x5
52,438,766 UART: [art] Derive Key Pair - Done
52,451,355 UART: [art] Signing Cert with AUTHO
52,452,702 UART: RITY.KEYID = 7
54,739,009 UART: [art] Erasing AUTHORITY.KEYID = 7
54,740,523 UART: [art] PUB.X = 8B3E856416A87B01046FDCDD35F48F08A1EF98E8F85BD74241E06E6F963A898FED3B496825078B1A3C4E33E449B36DFF
54,747,770 UART: [art] PUB.Y = A841A60F6D45F7A1801AC26E898C3936147DC24D95AC2CACA072EEBEED0588ED394FB6F15D2E42AD3F8AFE268A1C856A
54,755,045 UART: [art] SIG.R = AE218C361E8989D0E2444EF546D7777376088C08010D691E252D13838B3B1EDB66B93A762673A6BE4CF23265C013FD82
54,762,684 UART: [art] SIG.S = 1472F871258CB31D09FBF5A00D5DECF1A53B55148EFFA5580D29D542FD4BB61D5ABB0C691E228F96B16DE1D8142C2649
56,067,371 UART: Caliptra RT
56,068,080 UART: [state] CFI Enabled
56,397,404 UART: [rt] RT listening for mailbox commands...
56,429,309 UART: [rt]cmd =0x41545348, len=116
56,448,221 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,776 writing to cptra_bootfsm_go
3,803,383 ready_for_fw is high
3,803,788 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,860,630 >>> mbox cmd response: success
23,564,114 UART:
23,564,504 UART: Running Caliptra FMC ...
23,565,629 UART:
23,565,783 UART: [state] CFI Enabled
23,633,908 UART: [fht] FMC Alias Private Key: 7
25,972,213 UART: [art] Extend RT PCRs Done
25,973,442 UART: [art] Lock RT PCRs Done
25,975,441 UART: [art] Populate DV Done
25,981,005 UART: [fht] FMC Alias Private Key: 7
25,982,653 UART: [art] Derive CDI
25,983,461 UART: [art] Store in in slot 0x4
26,043,098 UART: [art] Derive Key Pair
26,044,136 UART: [art] Store priv key in slot 0x5
29,337,282 UART: [art] Derive Key Pair - Done
29,350,280 UART: [art] Signing Cert with AUTHO
29,351,593 UART: RITY.KEYID = 7
31,639,359 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,870 UART: [art] PUB.X = B21CE36238AC5A6924F79B1C05FAA4A510C8327CA669D953A4E2FABBC15F48210E8967CBF3B5F3FE7B2990C99A96C2B9
31,648,155 UART: [art] PUB.Y = 8C28EC87892C30DB960F213FF587ED2BA428ED014D0A5E309742B786527CF5E83D18626A9CEEDDB43F9FB7289B3993CC
31,655,375 UART: [art] SIG.R = F7378BFA4203BE92835D37BC84B6E18A44B1CF0E78127453ED2A24335A9D761F87A152380A0F61C44198A12C1AC6DA36
31,662,740 UART: [art] SIG.S = 020811B14147E3131C7A6C23C39BFE75174F4C90D1813D0797E0CF336F950C6CE1A5AA2461C987B4A70A4D9611BF85EA
32,968,235 UART: Caliptra RT
32,968,934 UART: [state] CFI Enabled
33,128,855 UART: [rt] RT listening for mailbox commands...
33,131,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,286,716 UART: [rt]cmd =0x41544d4e, len=14344
38,522,301 >>> mbox cmd response data (8 bytes)
38,522,842 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,553,417 UART: [rt]cmd =0x41545348, len=116
38,573,213 >>> mbox cmd response data (12 bytes)
40,630,372 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,386,696 >>> mbox cmd response: success
49,387,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,422,712 UART:
49,423,040 UART: Running Caliptra FMC ...
49,424,167 UART:
49,424,327 UART: [state] CFI Enabled
49,520,743 UART: [art] Extend RT PCRs Done
49,521,926 UART: [art] Lock RT PCRs Done
49,523,375 UART: [art] Populate DV Done
49,528,829 UART: [fht] FMC Alias Private Key: 7
49,530,518 UART: [art] Derive CDI
49,531,327 UART: [art] Store in in slot 0x4
49,590,050 UART: [art] Derive Key Pair
49,591,090 UART: [art] Store priv key in slot 0x5
52,884,504 UART: [art] Derive Key Pair - Done
52,897,470 UART: [art] Signing Cert with AUTHO
52,898,777 UART: RITY.KEYID = 7
55,185,657 UART: [art] Erasing AUTHORITY.KEYID = 7
55,187,171 UART: [art] PUB.X = E9485ADF0C127603E68A3F6060A26B4B13A6DDB41B4E36012CCC1CFB508FC878BA6B5EEF387CD194F2CCEFED1CEFD8DC
55,194,410 UART: [art] PUB.Y = DD164366470C93478F0D2035F590C1D67369B0DB8F0C72A30FC16EC1234C765F1E9A4A593595C47333E294DF816D46A2
55,201,626 UART: [art] SIG.R = 13ED13B0738F2F941793A53A4FF4AB56E9DBC0E42B01158F99014B8F31887C84FFD2306AFD801F2FF79C2461A1AE08C5
55,209,001 UART: [art] SIG.S = E699195BFEF32AA4399258D977AD96A9E5650D71931B4C349794DE8BA54D53045F31B997ED884830E66204F32F7CDA09
56,513,843 UART: Caliptra RT
56,514,552 UART: [state] CFI Enabled
56,843,872 UART: [rt] RT listening for mailbox commands...
56,875,771 UART: [rt]cmd =0x41545348, len=116
56,895,936 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,822 writing to cptra_bootfsm_go
194,079 UART:
194,428 UART: Running Caliptra ROM ...
195,599 UART:
605,289 UART: [state] CFI Enabled
621,177 UART: [state] LifecycleState = Unprovisioned
623,123 UART: [state] DebugLocked = No
624,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,513 UART: [kat] SHA2-256
799,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,782 UART: [kat] ++
810,385 UART: [kat] sha1
821,050 UART: [kat] SHA2-256
823,787 UART: [kat] SHA2-384
829,063 UART: [kat] SHA2-512-ACC
831,431 UART: [kat] ECC-384
3,116,776 UART: [kat] HMAC-384Kdf
3,128,367 UART: [kat] LMS
4,318,460 UART: [kat] --
4,324,310 UART: [cold-reset] ++
4,325,414 UART: [fht] Storing FHT @ 0x50003400
4,337,526 UART: [idev] ++
4,338,159 UART: [idev] CDI.KEYID = 6
4,339,039 UART: [idev] SUBJECT.KEYID = 7
4,340,279 UART: [idev] UDS.KEYID = 0
4,341,316 ready_for_fw is high
4,341,513 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,485,072 UART: [idev] Erasing UDS.KEYID = 0
7,625,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,340 UART: [idev] --
7,651,389 UART: [ldev] ++
7,651,964 UART: [ldev] CDI.KEYID = 6
7,652,923 UART: [ldev] SUBJECT.KEYID = 5
7,654,135 UART: [ldev] AUTHORITY.KEYID = 7
7,655,421 UART: [ldev] FE.KEYID = 1
7,663,468 UART: [ldev] Erasing FE.KEYID = 1
10,954,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,549 UART: [ldev] --
13,316,220 UART: [fwproc] Waiting for Commands...
13,319,131 UART: [fwproc] Received command 0x46574c44
13,321,366 UART: [fwproc] Received Image of size 114036 bytes
17,376,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,513 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,837,604 >>> mbox cmd response: success
17,842,405 UART: [afmc] ++
17,843,027 UART: [afmc] CDI.KEYID = 6
17,843,946 UART: [afmc] SUBJECT.KEYID = 7
17,845,167 UART: [afmc] AUTHORITY.KEYID = 5
21,155,782 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,498 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,846 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,721 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,159 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,222 UART: [afmc] --
23,519,196 UART: [cold-reset] --
23,524,252 UART: [state] Locking Datavault
23,529,425 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,189 UART: [state] Locking ICCM
23,532,314 UART: [exit] Launching FMC @ 0x40000130
23,540,710 UART:
23,540,943 UART: Running Caliptra FMC ...
23,542,040 UART:
23,542,201 UART: [state] CFI Enabled
23,550,622 UART: [fht] FMC Alias Private Key: 7
25,881,273 UART: [art] Extend RT PCRs Done
25,882,498 UART: [art] Lock RT PCRs Done
25,884,173 UART: [art] Populate DV Done
25,889,279 UART: [fht] FMC Alias Private Key: 7
25,890,931 UART: [art] Derive CDI
25,891,746 UART: [art] Store in in slot 0x4
25,934,346 UART: [art] Derive Key Pair
25,935,388 UART: [art] Store priv key in slot 0x5
29,176,643 UART: [art] Derive Key Pair - Done
29,189,741 UART: [art] Signing Cert with AUTHO
29,191,047 UART: RITY.KEYID = 7
31,470,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,498 UART: [art] PUB.X = C6D02590CCDCCE45F35C11F7A005E6CE2377D7EFFEC2F236ED72E82960924277DC7B8E87EB32050DE064790B28B5F88E
31,479,765 UART: [art] PUB.Y = FF9535CA9E54C12F6BAB5EF0189BB94C3F5C9F189EA0868728DF02336D551473992509F7EFA6CC128605563DC2D5429E
31,487,013 UART: [art] SIG.R = 38F489EED38C12F95C3F3BA454596AA9980FDBC9E4D85A99462E9A6656C92ADC36697E40AADBEDA029A0E226D6AB86C1
31,494,362 UART: [art] SIG.S = 88220E99EC00A86D69CB84BB9B2065B351CA2B6317BFA7BE74D25309490FC51F47B38EE533C4A040FE5C11497F222AF7
32,799,635 UART: Caliptra RT
32,800,325 UART: [state] CFI Enabled
32,918,144 UART: [rt] RT listening for mailbox commands...
32,920,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,075,779 UART: [rt]cmd =0x41544d4e, len=14344
38,311,404 >>> mbox cmd response data (8 bytes)
38,311,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,342,815 UART: [rt]cmd =0x41545348, len=116
38,363,515 >>> mbox cmd response data (12 bytes)
40,417,765 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,562,609 UART:
40,562,981 UART: Running Caliptra ROM ...
40,564,057 UART:
40,564,271 UART: [state] CFI Enabled
40,580,067 UART: [state] LifecycleState = Unprovisioned
40,581,969 UART: [state] DebugLocked = No
40,584,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,588,587 UART: [kat] SHA2-256
40,758,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,768,841 UART: [kat] ++
40,769,379 UART: [kat] sha1
40,780,274 UART: [kat] SHA2-256
40,782,968 UART: [kat] SHA2-384
40,787,708 UART: [kat] SHA2-512-ACC
40,790,067 UART: [kat] ECC-384
43,073,642 UART: [kat] HMAC-384Kdf
43,084,852 UART: [kat] LMS
44,274,938 UART: [kat] --
44,278,401 UART: [update-reset] ++
48,416,385 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,419,319 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,801,321 >>> mbox cmd response: success
48,805,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,806,568 UART: [update-reset] Copying MAN_2 To MAN_1
48,824,423 UART: [update-reset Success] --
48,828,487 UART: [state] Locking Datavault
48,831,898 UART: [state] Locking PCR0, PCR1 and PCR31
48,833,649 UART: [state] Locking ICCM
48,834,934 UART: [exit] Launching FMC @ 0x40000130
48,843,385 UART:
48,843,631 UART: Running Caliptra FMC ...
48,844,858 UART:
48,845,037 UART: [state] CFI Enabled
48,889,250 UART: [art] Extend RT PCRs Done
48,890,438 UART: [art] Lock RT PCRs Done
48,891,835 UART: [art] Populate DV Done
48,897,177 UART: [fht] FMC Alias Private Key: 7
48,898,769 UART: [art] Derive CDI
48,899,582 UART: [art] Store in in slot 0x4
48,942,495 UART: [art] Derive Key Pair
48,943,493 UART: [art] Store priv key in slot 0x5
52,185,057 UART: [art] Derive Key Pair - Done
52,197,852 UART: [art] Signing Cert with AUTHO
52,199,160 UART: RITY.KEYID = 7
54,478,569 UART: [art] Erasing AUTHORITY.KEYID = 7
54,480,073 UART: [art] PUB.X = 41C2E6C27F711202D49E59FEDA2C84E509C7529A5642274983A6852C8B07AFB6971FF5A75D0FF43F0757356B39E6ED52
54,487,352 UART: [art] PUB.Y = 6B50B8A12949E10A0946D996F30383D199EFFA57031D6DBF0798C4E68B674F4ED17F9EF14B0E821C37570A07D176427C
54,494,529 UART: [art] SIG.R = 3C004A128E867CA3DC04AC3776F58F65ADFB192D34BAF76EE39542D739A1DBDAC1FA4922F617C2B35A3C080560B65E95
54,501,942 UART: [art] SIG.S = B85D141EE6DFD60797ED457416118B190D7403E0722DE0063FB21FC2BD16B888602EED4622DDBA7584DD7AE245FB6786
55,807,188 UART: Caliptra RT
55,807,890 UART: [state] CFI Enabled
56,092,534 UART: [rt] RT listening for mailbox commands...
56,124,647 UART: [rt]cmd =0x41545348, len=116
56,144,271 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,129,123 ready_for_fw is high
4,129,749 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,065,500 >>> mbox cmd response: success
23,704,166 UART:
23,704,551 UART: Running Caliptra FMC ...
23,705,690 UART:
23,705,851 UART: [state] CFI Enabled
23,713,849 UART: [fht] FMC Alias Private Key: 7
26,044,892 UART: [art] Extend RT PCRs Done
26,046,118 UART: [art] Lock RT PCRs Done
26,048,073 UART: [art] Populate DV Done
26,053,699 UART: [fht] FMC Alias Private Key: 7
26,055,356 UART: [art] Derive CDI
26,056,100 UART: [art] Store in in slot 0x4
26,098,592 UART: [art] Derive Key Pair
26,099,597 UART: [art] Store priv key in slot 0x5
29,342,067 UART: [art] Derive Key Pair - Done
29,354,919 UART: [art] Signing Cert with AUTHO
29,356,231 UART: RITY.KEYID = 7
31,635,882 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,527 UART: [art] PUB.X = 463D88C79029E80BF3E9DD8B473C62D4E07080FA27EB99F952FFC1BA39DB8AC54A3686634462BFAC0A916D4D8DCC24AF
31,644,641 UART: [art] PUB.Y = 02F9EC194E4B2156E73F9B46927A49AE49778339E7EA861F52361AF9B3E177FD82A34DE2A246449C8336DDEB891A88BB
31,651,869 UART: [art] SIG.R = B9936223DABC2D3BCDA5C610460BB84DA519813E63B5C40A5F042A39BBC864D3D700895C732F8883C3CAF5B29868BD54
31,659,291 UART: [art] SIG.S = AF0C8C7BFEC62C032CFC5CB9C2DED637BD16D61FAAE30CB9B4484EF9ADF31F0BD7E246B8C89C56FB7FAD0AC0D9AF3E9C
32,964,453 UART: Caliptra RT
32,965,164 UART: [state] CFI Enabled
33,083,714 UART: [rt] RT listening for mailbox commands...
33,086,116 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,241,365 UART: [rt]cmd =0x41544d4e, len=14344
38,477,239 >>> mbox cmd response data (8 bytes)
38,477,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,508,484 UART: [rt]cmd =0x41545348, len=116
38,528,217 >>> mbox cmd response data (12 bytes)
40,581,056 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,244,650 >>> mbox cmd response: success
49,245,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,280,288 UART:
49,280,587 UART: Running Caliptra FMC ...
49,281,621 UART:
49,281,766 UART: [state] CFI Enabled
49,325,802 UART: [art] Extend RT PCRs Done
49,326,998 UART: [art] Lock RT PCRs Done
49,328,213 UART: [art] Populate DV Done
49,333,748 UART: [fht] FMC Alias Private Key: 7
49,335,285 UART: [art] Derive CDI
49,336,015 UART: [art] Store in in slot 0x4
49,379,091 UART: [art] Derive Key Pair
49,380,092 UART: [art] Store priv key in slot 0x5
52,622,355 UART: [art] Derive Key Pair - Done
52,635,092 UART: [art] Signing Cert with AUTHO
52,636,403 UART: RITY.KEYID = 7
54,915,860 UART: [art] Erasing AUTHORITY.KEYID = 7
54,917,525 UART: [art] PUB.X = 23B3B9337342AAED77295A8856CCB5057F81F6095F91283A414B621F6EF0F6189EDCF92222220E3B6E65FF6BBA7EEB8C
54,924,614 UART: [art] PUB.Y = 4F48F2DA7D3F1B5B8B036BFABA3AEF108D7FA2DD822D7429A846C64431FCBF05B470CAE8CECC5D25FB84B66E3F3C1752
54,931,884 UART: [art] SIG.R = 45115CB81E5F06B3C1F241D471E2A255731938535BFF4CBC8EE9E39B69EB68F4D51AAC2BEC281E22F0E089C3930BC605
54,939,249 UART: [art] SIG.S = 4A8BA13C28CAE7739CE0DAA729DB58C70E617EBDA674F3A0E0BC6A2B1190001303A0E782192995048DCE6A7259D5BD98
56,244,541 UART: Caliptra RT
56,245,253 UART: [state] CFI Enabled
56,533,146 UART: [rt] RT listening for mailbox commands...
56,565,014 UART: [rt]cmd =0x41545348, len=116
56,585,679 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,475 writing to cptra_bootfsm_go
194,554 UART:
194,922 UART: Running Caliptra ROM ...
196,136 UART:
196,291 UART: [state] CFI Enabled
261,531 UART: [state] LifecycleState = Unprovisioned
263,446 UART: [state] DebugLocked = No
266,188 UART: [state] WD Timer not started. Device not locked for debugging
269,500 UART: [kat] SHA2-256
448,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,191 UART: [kat] ++
460,732 UART: [kat] sha1
470,554 UART: [kat] SHA2-256
473,636 UART: [kat] SHA2-384
480,204 UART: [kat] SHA2-512-ACC
483,170 UART: [kat] ECC-384
2,927,505 UART: [kat] HMAC-384Kdf
2,948,912 UART: [kat] LMS
3,478,367 UART: [kat] --
3,482,666 UART: [cold-reset] ++
3,483,603 UART: [fht] FHT @ 0x50003400
3,494,146 UART: [idev] ++
3,494,716 UART: [idev] CDI.KEYID = 6
3,495,673 UART: [idev] SUBJECT.KEYID = 7
3,496,848 UART: [idev] UDS.KEYID = 0
3,497,748 ready_for_fw is high
3,497,964 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,641,789 UART: [idev] Erasing UDS.KEYID = 0
6,004,892 UART: [idev] Sha1 KeyId Algorithm
6,029,147 UART: [idev] --
6,034,120 UART: [ldev] ++
6,034,694 UART: [ldev] CDI.KEYID = 6
6,035,580 UART: [ldev] SUBJECT.KEYID = 5
6,036,790 UART: [ldev] AUTHORITY.KEYID = 7
6,038,033 UART: [ldev] FE.KEYID = 1
6,078,249 UART: [ldev] Erasing FE.KEYID = 1
8,584,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,019 UART: [ldev] --
10,392,928 UART: [fwproc] Wait for Commands...
10,394,649 UART: [fwproc] Recv command 0x46574c44
10,396,690 UART: [fwproc] Recv'd Img size: 114360 bytes
13,794,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,058 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,254,259 >>> mbox cmd response: success
14,257,843 UART: [afmc] ++
14,258,439 UART: [afmc] CDI.KEYID = 6
14,259,322 UART: [afmc] SUBJECT.KEYID = 7
14,260,537 UART: [afmc] AUTHORITY.KEYID = 5
16,785,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,526 UART: [afmc] --
18,585,156 UART: [cold-reset] --
18,587,666 UART: [state] Locking Datavault
18,592,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,703 UART: [state] Locking ICCM
18,595,990 UART: [exit] Launching FMC @ 0x40000130
18,604,383 UART:
18,604,618 UART: Running Caliptra FMC ...
18,605,643 UART:
18,605,788 UART: [state] CFI Enabled
18,665,873 UART: [fht] FMC Alias Private Key: 7
20,430,428 UART: [art] Extend RT PCRs Done
20,431,649 UART: [art] Lock RT PCRs Done
20,433,583 UART: [art] Populate DV Done
20,439,114 UART: [fht] FMC Alias Private Key: 7
20,440,832 UART: [art] Derive CDI
20,441,568 UART: [art] Store in in slot 0x4
20,498,444 UART: [art] Derive Key Pair
20,499,480 UART: [art] Store priv key in slot 0x5
22,962,469 UART: [art] Derive Key Pair - Done
22,975,570 UART: [art] Signing Cert with AUTHO
22,976,877 UART: RITY.KEYID = 7
24,687,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,109 UART: [art] PUB.X = 1D79B42DDA2AC2318E4876267FE73D95ED6582A0A2971A7B49448E75A08E9759DB132D26BE5103BDAB7BDFB4F3A63656
24,696,385 UART: [art] PUB.Y = 9EAAF7211C80E2678E812B8BE83CF3B3D922AB8CD6A276CAB777EF20287851ED62C35696DC27FB2D2026C31E326D0E5E
24,703,645 UART: [art] SIG.R = F32BF24D5F0002579AC7C00CD912B699F6BE6634AEF13080A91D45B7EE630134F4563BC9445BF975B62B39B4222E10C1
24,711,006 UART: [art] SIG.S = 1FCA3CC29CBAD752D551315CC542841015FD921E9A373050F3A2E683131C4985B017A140C1B947DAE8A562E84F00A9E4
25,690,202 UART: Caliptra RT
25,690,899 UART: [state] CFI Enabled
25,855,679 UART: [rt] RT listening for mailbox commands...
25,858,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,013,494 UART: [rt]cmd =0x41544d4e, len=14344
29,944,024 >>> mbox cmd response data (8 bytes)
29,944,604 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,975,166 UART: [rt]cmd =0x41545348, len=116
29,995,301 >>> mbox cmd response data (12 bytes)
32,051,857 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,197,238 UART:
32,197,627 UART: Running Caliptra ROM ...
32,198,764 UART:
32,198,936 UART: [state] CFI Enabled
32,257,508 UART: [state] LifecycleState = Unprovisioned
32,259,386 UART: [state] DebugLocked = No
32,261,173 UART: [state] WD Timer not started. Device not locked for debugging
32,264,391 UART: [kat] SHA2-256
32,443,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,455,094 UART: [kat] ++
32,455,554 UART: [kat] sha1
32,467,299 UART: [kat] SHA2-256
32,470,318 UART: [kat] SHA2-384
32,476,634 UART: [kat] SHA2-512-ACC
32,479,583 UART: [kat] ECC-384
34,942,514 UART: [kat] HMAC-384Kdf
34,963,984 UART: [kat] LMS
35,493,452 UART: [kat] --
35,499,288 UART: [update-reset] ++
38,928,177 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,931,992 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,314,985 >>> mbox cmd response: success
39,315,442 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,316,475 UART: [update-reset] Copying MAN_2 To MAN_1
39,338,807 UART: [update-reset Success] --
39,344,339 UART: [state] Locking Datavault
39,347,866 UART: [state] Locking PCR0, PCR1 and PCR31
39,349,570 UART: [state] Locking ICCM
39,350,643 UART: [exit] Launching FMC @ 0x40000130
39,359,100 UART:
39,359,338 UART: Running Caliptra FMC ...
39,360,444 UART:
39,360,606 UART: [state] CFI Enabled
39,457,215 UART: [art] Extend RT PCRs Done
39,458,398 UART: [art] Lock RT PCRs Done
39,459,966 UART: [art] Populate DV Done
39,465,809 UART: [fht] FMC Alias Private Key: 7
39,467,294 UART: [art] Derive CDI
39,468,078 UART: [art] Store in in slot 0x4
39,526,231 UART: [art] Derive Key Pair
39,527,338 UART: [art] Store priv key in slot 0x5
41,991,231 UART: [art] Derive Key Pair - Done
42,004,010 UART: [art] Signing Cert with AUTHO
42,005,347 UART: RITY.KEYID = 7
43,717,283 UART: [art] Erasing AUTHORITY.KEYID = 7
43,718,794 UART: [art] PUB.X = 000376CFAF29561458E1738FAA5C1077645C41A924C1A4D5ACFFC9C2D61DB1A78DA8854926E3B92FC63B6E76C0CF1421
43,726,029 UART: [art] PUB.Y = 1EA1EB6D0B232DD7AACB39B0F453C021844595AEF097975E7AE51D771A4B1D8184ED2EEF19265FD5630756EBA1798802
43,733,304 UART: [art] SIG.R = 57CBAE616CD33A80C42B8A8230A6BBAAC4176A78F15333A22C342DDC30D99FE2C7736E995F04ED69A4A30DBEA77174ED
43,740,737 UART: [art] SIG.S = 455747375C57D560335F6C60956A8403619067D0CD51E5072C3FDDC7E77B7B38C47C9A554BC134D6732C7D1D471E2B4A
44,719,162 UART: Caliptra RT
44,719,852 UART: [state] CFI Enabled
45,051,985 UART: [rt] RT listening for mailbox commands...
45,083,904 UART: [rt]cmd =0x41545348, len=116
45,103,820 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,941 writing to cptra_bootfsm_go
193,129 UART:
193,498 UART: Running Caliptra ROM ...
194,709 UART:
194,871 UART: [state] CFI Enabled
261,153 UART: [state] LifecycleState = Unprovisioned
263,538 UART: [state] DebugLocked = No
266,063 UART: [state] WD Timer not started. Device not locked for debugging
271,312 UART: [kat] SHA2-256
461,180 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,946 UART: [kat] ++
472,445 UART: [kat] sha1
483,454 UART: [kat] SHA2-256
486,520 UART: [kat] SHA2-384
492,941 UART: [kat] SHA2-512-ACC
495,524 UART: [kat] ECC-384
2,946,355 UART: [kat] HMAC-384Kdf
2,971,960 UART: [kat] LMS
3,503,784 UART: [kat] --
3,507,080 UART: [cold-reset] ++
3,508,942 UART: [fht] FHT @ 0x50003400
3,520,434 UART: [idev] ++
3,521,112 UART: [idev] CDI.KEYID = 6
3,522,067 UART: [idev] SUBJECT.KEYID = 7
3,523,244 UART: [idev] UDS.KEYID = 0
3,524,147 ready_for_fw is high
3,524,355 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,051 UART: [idev] Erasing UDS.KEYID = 0
6,028,259 UART: [idev] Sha1 KeyId Algorithm
6,050,459 UART: [idev] --
6,054,777 UART: [ldev] ++
6,055,516 UART: [ldev] CDI.KEYID = 6
6,056,430 UART: [ldev] SUBJECT.KEYID = 5
6,057,589 UART: [ldev] AUTHORITY.KEYID = 7
6,058,823 UART: [ldev] FE.KEYID = 1
6,099,502 UART: [ldev] Erasing FE.KEYID = 1
8,603,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,461 UART: [ldev] --
10,414,643 UART: [fwproc] Wait for Commands...
10,417,655 UART: [fwproc] Recv command 0x46574c44
10,419,973 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,442 >>> mbox cmd response: success
14,605,137 UART: [afmc] ++
14,605,843 UART: [afmc] CDI.KEYID = 6
14,607,036 UART: [afmc] SUBJECT.KEYID = 7
14,608,537 UART: [afmc] AUTHORITY.KEYID = 5
17,150,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,730 UART: [afmc] --
18,969,632 UART: [cold-reset] --
18,972,267 UART: [state] Locking Datavault
18,977,908 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,124 UART: [state] Locking ICCM
18,982,714 UART: [exit] Launching FMC @ 0x40000130
18,991,401 UART:
18,991,638 UART: Running Caliptra FMC ...
18,992,742 UART:
18,992,900 UART: [state] CFI Enabled
19,051,591 UART: [fht] FMC Alias Private Key: 7
20,815,825 UART: [art] Extend RT PCRs Done
20,817,058 UART: [art] Lock RT PCRs Done
20,818,915 UART: [art] Populate DV Done
20,824,494 UART: [fht] FMC Alias Private Key: 7
20,826,228 UART: [art] Derive CDI
20,827,058 UART: [art] Store in in slot 0x4
20,884,118 UART: [art] Derive Key Pair
20,885,194 UART: [art] Store priv key in slot 0x5
23,347,550 UART: [art] Derive Key Pair - Done
23,360,874 UART: [art] Signing Cert with AUTHO
23,362,218 UART: RITY.KEYID = 7
25,073,388 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,896 UART: [art] PUB.X = AF6C3C660805C7CD47645B8D9082896A3C2EEAED9CBAAE77B5E10606BFBA06377B7F11A058CBCA5DDA54D59774FFE64E
25,082,179 UART: [art] PUB.Y = B97106BF8ED64270FC1CB0FAA43EE5ED83DF17ABC7D2F0D0F7970B34B86F74F1999370A0948843338838FF170D41E16A
25,089,449 UART: [art] SIG.R = 73E9DD060F830A1906293C11D97050D84C04BC6138345F84EC1215DD025E41B7182E916D3EAA3CB673B78622B1BE82A8
25,096,825 UART: [art] SIG.S = 6496466E7FD8E1D7D05CB1211B44EC0F885E77A49440BF44B4AB0B5D625E9891416C2A33D30C1448E1633668F69D2788
26,075,759 UART: Caliptra RT
26,076,470 UART: [state] CFI Enabled
26,241,280 UART: [rt] RT listening for mailbox commands...
26,243,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,399,278 UART: [rt]cmd =0x41544d4e, len=14344
30,329,344 >>> mbox cmd response data (8 bytes)
30,329,952 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,360,844 UART: [rt]cmd =0x41545348, len=116
30,379,682 >>> mbox cmd response data (12 bytes)
32,441,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,587,386 UART:
32,588,322 UART: Running Caliptra ROM ...
32,589,436 UART:
32,589,596 UART: [state] CFI Enabled
32,650,492 UART: [state] LifecycleState = Unprovisioned
32,652,749 UART: [state] DebugLocked = No
32,654,127 UART: [state] WD Timer not started. Device not locked for debugging
32,658,740 UART: [kat] SHA2-256
32,848,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,859,379 UART: [kat] ++
32,859,875 UART: [kat] sha1
32,872,683 UART: [kat] SHA2-256
32,875,689 UART: [kat] SHA2-384
32,883,261 UART: [kat] SHA2-512-ACC
32,885,868 UART: [kat] ECC-384
35,332,953 UART: [kat] HMAC-384Kdf
35,362,409 UART: [kat] LMS
35,893,951 UART: [kat] --
35,899,146 UART: [update-reset] ++
39,357,572 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,360,522 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,968,253 >>> mbox cmd response: success
39,973,114 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,973,725 UART: [update-reset] Copying MAN_2 To MAN_1
40,006,484 UART: [update-reset Success] --
40,011,585 UART: [state] Locking Datavault
40,014,758 UART: [state] Locking PCR0, PCR1 and PCR31
40,016,964 UART: [state] Locking ICCM
40,019,608 UART: [exit] Launching FMC @ 0x40000130
40,028,290 UART:
40,028,531 UART: Running Caliptra FMC ...
40,029,638 UART:
40,029,803 UART: [state] CFI Enabled
40,116,251 UART: [art] Extend RT PCRs Done
40,117,482 UART: [art] Lock RT PCRs Done
40,118,894 UART: [art] Populate DV Done
40,124,469 UART: [fht] FMC Alias Private Key: 7
40,126,054 UART: [art] Derive CDI
40,126,872 UART: [art] Store in in slot 0x4
40,184,807 UART: [art] Derive Key Pair
40,185,939 UART: [art] Store priv key in slot 0x5
42,649,019 UART: [art] Derive Key Pair - Done
42,662,020 UART: [art] Signing Cert with AUTHO
42,663,336 UART: RITY.KEYID = 7
44,374,164 UART: [art] Erasing AUTHORITY.KEYID = 7
44,375,668 UART: [art] PUB.X = F576FFF4DDBCF98C0FA3DB495AE52C37434BF9C72422859FEC0DD5C80BBCD69A9E318162844BEBC6E2EBB2FF60C3A3AA
44,383,015 UART: [art] PUB.Y = B6D436FDDD37B83CCD21426C8B19BE1042E55B98C4FAAFC4FC8ED67B505517884CF275348C4C9593F5A49E22C6096356
44,390,289 UART: [art] SIG.R = 8A142D804831FACD54CDC9000D3BD8F3D6C63ECB2439AD1483BF3C21206974B0C1C0B287F6877773CCF665A95581A6E4
44,397,824 UART: [art] SIG.S = D44BF3829FF6BBE181C473B916F1598027368EB4C9AFEEDDD75743A78E7A22AE013A7AF627D916553F15B8F765A49D63
45,377,050 UART: Caliptra RT
45,377,746 UART: [state] CFI Enabled
45,713,219 UART: [rt] RT listening for mailbox commands...
45,744,864 UART: [rt]cmd =0x41545348, len=116
45,764,333 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
3,438,738 ready_for_fw is high
3,439,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,728,046 >>> mbox cmd response: success
19,007,598 UART:
19,008,003 UART: Running Caliptra FMC ...
19,009,123 UART:
19,009,282 UART: [state] CFI Enabled
19,073,241 UART: [fht] FMC Alias Private Key: 7
20,836,748 UART: [art] Extend RT PCRs Done
20,837,991 UART: [art] Lock RT PCRs Done
20,839,702 UART: [art] Populate DV Done
20,845,240 UART: [fht] FMC Alias Private Key: 7
20,846,774 UART: [art] Derive CDI
20,847,551 UART: [art] Store in in slot 0x4
20,905,833 UART: [art] Derive Key Pair
20,906,841 UART: [art] Store priv key in slot 0x5
23,370,351 UART: [art] Derive Key Pair - Done
23,383,676 UART: [art] Signing Cert with AUTHO
23,385,006 UART: RITY.KEYID = 7
25,096,430 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,936 UART: [art] PUB.X = 9D1176ABF41385C86066F8E66F3171DA613747999698BBFDB8616BF71D91C97FA1FA99E1DC696A45BED13606D56FBE5A
25,105,172 UART: [art] PUB.Y = C0CCC19F39F087B50260D77675F4D9F076BD5CD6B0871EBA0D9C156A96EAF5E186E0970A5207BCED8A64F372A8C05F7A
25,112,465 UART: [art] SIG.R = AD75C4FEECE5796C2B314810E6D04A38D6BDD0530C9C6AAAAE3A113B81C7742277BB57022700653E8BB666E85F84D3F8
25,119,890 UART: [art] SIG.S = 5B4D9DD5EFBD018A293F9FF57DE18CA8044D9AC416CF3948E0E231DC8D9E7E0DDE50C3AABB6258098FB2198F84839644
26,098,429 UART: Caliptra RT
26,099,156 UART: [state] CFI Enabled
26,262,874 UART: [rt] RT listening for mailbox commands...
26,265,285 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,420,686 UART: [rt]cmd =0x41544d4e, len=14344
30,351,502 >>> mbox cmd response data (8 bytes)
30,352,071 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,382,972 UART: [rt]cmd =0x41545348, len=116
30,402,380 >>> mbox cmd response data (12 bytes)
32,456,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,265,419 >>> mbox cmd response: success
40,266,065 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,302,469 UART:
40,302,798 UART: Running Caliptra FMC ...
40,303,844 UART:
40,303,994 UART: [state] CFI Enabled
40,394,663 UART: [art] Extend RT PCRs Done
40,395,862 UART: [art] Lock RT PCRs Done
40,397,346 UART: [art] Populate DV Done
40,403,294 UART: [fht] FMC Alias Private Key: 7
40,404,832 UART: [art] Derive CDI
40,405,588 UART: [art] Store in in slot 0x4
40,463,556 UART: [art] Derive Key Pair
40,464,591 UART: [art] Store priv key in slot 0x5
42,927,290 UART: [art] Derive Key Pair - Done
42,939,969 UART: [art] Signing Cert with AUTHO
42,941,270 UART: RITY.KEYID = 7
44,651,844 UART: [art] Erasing AUTHORITY.KEYID = 7
44,653,351 UART: [art] PUB.X = C5C1E67E1D06609EFB2DBFC2257DB6CAC716C96ACA785B337BE5B65867402B08629AC5B97317D234F95A3F7A8D9BEB73
44,660,645 UART: [art] PUB.Y = 1D38F137FD680D5F42A40BD75C21E293DEC2ECB254A8C217A5B07E701005DB7CD33F60A424CA9342443FA0C5F4F71A30
44,667,918 UART: [art] SIG.R = 1BF8854DC7F8B5B2675445C4820D3758F58118E1568BED5B3C3D3340836BDA9E06966AFF59D52D7EC31D2C1DFB56389C
44,675,300 UART: [art] SIG.S = 496E3264D8A388797CF74A281498584B30DF4575363A7B3E7071EF69092C5AC18069F068B327C9832FE6EB407FEFF2E0
45,654,170 UART: Caliptra RT
45,654,871 UART: [state] CFI Enabled
45,988,890 UART: [rt] RT listening for mailbox commands...
46,020,846 UART: [rt]cmd =0x41545348, len=116
46,040,967 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,513 UART:
192,877 UART: Running Caliptra ROM ...
194,088 UART:
603,682 UART: [state] CFI Enabled
615,383 UART: [state] LifecycleState = Unprovisioned
617,751 UART: [state] DebugLocked = No
620,345 UART: [state] WD Timer not started. Device not locked for debugging
624,369 UART: [kat] SHA2-256
814,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,006 UART: [kat] ++
825,542 UART: [kat] sha1
837,267 UART: [kat] SHA2-256
840,284 UART: [kat] SHA2-384
846,274 UART: [kat] SHA2-512-ACC
848,854 UART: [kat] ECC-384
3,291,753 UART: [kat] HMAC-384Kdf
3,305,648 UART: [kat] LMS
3,837,498 UART: [kat] --
3,840,637 UART: [cold-reset] ++
3,842,284 UART: [fht] FHT @ 0x50003400
3,852,995 UART: [idev] ++
3,853,698 UART: [idev] CDI.KEYID = 6
3,854,606 UART: [idev] SUBJECT.KEYID = 7
3,855,848 UART: [idev] UDS.KEYID = 0
3,856,771 ready_for_fw is high
3,856,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,539 UART: [idev] Erasing UDS.KEYID = 0
6,335,783 UART: [idev] Sha1 KeyId Algorithm
6,358,363 UART: [idev] --
6,363,514 UART: [ldev] ++
6,364,249 UART: [ldev] CDI.KEYID = 6
6,365,157 UART: [ldev] SUBJECT.KEYID = 5
6,366,313 UART: [ldev] AUTHORITY.KEYID = 7
6,367,536 UART: [ldev] FE.KEYID = 1
6,379,527 UART: [ldev] Erasing FE.KEYID = 1
8,856,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,360 UART: [ldev] --
10,645,998 UART: [fwproc] Wait for Commands...
10,647,710 UART: [fwproc] Recv command 0x46574c44
10,650,013 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,831,801 >>> mbox cmd response: success
14,835,033 UART: [afmc] ++
14,835,747 UART: [afmc] CDI.KEYID = 6
14,836,933 UART: [afmc] SUBJECT.KEYID = 7
14,838,416 UART: [afmc] AUTHORITY.KEYID = 5
17,345,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,982 UART: [afmc] --
19,138,895 UART: [cold-reset] --
19,142,672 UART: [state] Locking Datavault
19,146,552 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,751 UART: [state] Locking ICCM
19,150,091 UART: [exit] Launching FMC @ 0x40000130
19,158,757 UART:
19,158,990 UART: Running Caliptra FMC ...
19,160,088 UART:
19,160,243 UART: [state] CFI Enabled
19,168,145 UART: [fht] FMC Alias Private Key: 7
20,924,450 UART: [art] Extend RT PCRs Done
20,925,669 UART: [art] Lock RT PCRs Done
20,927,130 UART: [art] Populate DV Done
20,932,488 UART: [fht] FMC Alias Private Key: 7
20,934,187 UART: [art] Derive CDI
20,935,001 UART: [art] Store in in slot 0x4
20,978,137 UART: [art] Derive Key Pair
20,979,140 UART: [art] Store priv key in slot 0x5
23,405,888 UART: [art] Derive Key Pair - Done
23,418,449 UART: [art] Signing Cert with AUTHO
23,419,743 UART: RITY.KEYID = 7
25,125,114 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,617 UART: [art] PUB.X = E8F2FA6BCBED73201237C2B4FEF9751AFD12ED654F635F18C95A75F70102040977CDB68C6E09834EC7DC68AB4E413188
25,133,868 UART: [art] PUB.Y = 5D31A0C0AC257A56EDD689F4F9CAE7A0CB69722B7B0E71C3B4B913D4599CFBD4961E28EDDD6FC93521CD9CA9681840EC
25,141,205 UART: [art] SIG.R = 74B017C579AB7A71C06568C4F9EFDB260CBC0902014725D012967A3939A4B50560D2C8BB99B771278D41F4F8CBFA5598
25,148,606 UART: [art] SIG.S = 46C9400F1C38122FAD5B2C24822BF70FD12381B1A3947E2DB63FAD950442198FDF0315909BA54523EA78207D19A5E5A2
26,128,130 UART: Caliptra RT
26,128,840 UART: [state] CFI Enabled
26,245,464 UART: [rt] RT listening for mailbox commands...
26,247,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,403,220 UART: [rt]cmd =0x41544d4e, len=14344
30,333,358 >>> mbox cmd response data (8 bytes)
30,333,940 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,364,522 UART: [rt]cmd =0x41545348, len=116
30,384,741 >>> mbox cmd response data (12 bytes)
32,439,715 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,585,079 UART:
32,585,462 UART: Running Caliptra ROM ...
32,586,555 UART:
32,586,720 UART: [state] CFI Enabled
32,600,029 UART: [state] LifecycleState = Unprovisioned
32,601,876 UART: [state] DebugLocked = No
32,603,797 UART: [state] WD Timer not started. Device not locked for debugging
32,608,915 UART: [kat] SHA2-256
32,798,770 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,809,553 UART: [kat] ++
32,810,152 UART: [kat] sha1
32,823,050 UART: [kat] SHA2-256
32,826,068 UART: [kat] SHA2-384
32,832,238 UART: [kat] SHA2-512-ACC
32,834,818 UART: [kat] ECC-384
35,276,303 UART: [kat] HMAC-384Kdf
35,289,640 UART: [kat] LMS
35,821,259 UART: [kat] --
35,824,441 UART: [update-reset] ++
39,274,445 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,278,309 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,886,019 >>> mbox cmd response: success
39,890,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,891,201 UART: [update-reset] Copying MAN_2 To MAN_1
39,923,310 UART: [update-reset Success] --
39,928,681 UART: [state] Locking Datavault
39,932,374 UART: [state] Locking PCR0, PCR1 and PCR31
39,934,563 UART: [state] Locking ICCM
39,937,324 UART: [exit] Launching FMC @ 0x40000130
39,945,981 UART:
39,946,261 UART: Running Caliptra FMC ...
39,947,370 UART:
39,947,524 UART: [state] CFI Enabled
39,991,534 UART: [art] Extend RT PCRs Done
39,992,678 UART: [art] Lock RT PCRs Done
39,994,341 UART: [art] Populate DV Done
40,000,015 UART: [fht] FMC Alias Private Key: 7
40,001,774 UART: [art] Derive CDI
40,002,592 UART: [art] Store in in slot 0x4
40,045,440 UART: [art] Derive Key Pair
40,046,537 UART: [art] Store priv key in slot 0x5
42,473,499 UART: [art] Derive Key Pair - Done
42,486,284 UART: [art] Signing Cert with AUTHO
42,487,586 UART: RITY.KEYID = 7
44,193,165 UART: [art] Erasing AUTHORITY.KEYID = 7
44,194,665 UART: [art] PUB.X = 15DD6C725F883A6F3E13A1828527E3ADADB7EFF2AC9EEF009864D2801B424116EC69634B3D85A5FC95FA5C618AAC1ACA
44,201,910 UART: [art] PUB.Y = 43ACA0C4C5F980DA7769804D179513E9584B084418C4951585A34388E5A83DB09346442634F3D7A5077F4C46EF5B2751
44,209,148 UART: [art] SIG.R = 510250C40CAEBEA60CA479A358B271BACA22A0629AB089AB5B2B4BD2924FF88550B4FFC6329FA4D9F3479C3E66FCFF37
44,216,592 UART: [art] SIG.S = 6161C0D505C91D912C39CF4A2FF610B471ABE7C5C369257FC4CECA631E42D279C48E21F60F2ABB6B1EE2ADDB35537B4B
45,195,159 UART: Caliptra RT
45,195,875 UART: [state] CFI Enabled
45,485,718 UART: [rt] RT listening for mailbox commands...
45,517,462 UART: [rt]cmd =0x41545348, len=116
45,538,175 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,758,181 ready_for_fw is high
3,758,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,957,722 >>> mbox cmd response: success
19,214,504 UART:
19,214,920 UART: Running Caliptra FMC ...
19,216,115 UART:
19,216,282 UART: [state] CFI Enabled
19,224,165 UART: [fht] FMC Alias Private Key: 7
20,981,181 UART: [art] Extend RT PCRs Done
20,982,391 UART: [art] Lock RT PCRs Done
20,983,664 UART: [art] Populate DV Done
20,989,073 UART: [fht] FMC Alias Private Key: 7
20,990,573 UART: [art] Derive CDI
20,991,336 UART: [art] Store in in slot 0x4
21,034,145 UART: [art] Derive Key Pair
21,035,146 UART: [art] Store priv key in slot 0x5
23,461,657 UART: [art] Derive Key Pair - Done
23,474,660 UART: [art] Signing Cert with AUTHO
23,475,958 UART: RITY.KEYID = 7
25,181,071 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,590 UART: [art] PUB.X = D4AAA9C10642CE9812079C4520F15D4C8C1BF78EF5C321D3EE30B4C7AF60488EDB939DA8D397A8D0A7CE469CD5B2E662
25,189,860 UART: [art] PUB.Y = AF4F9478770B8E3BB3671A726AB4051EA3DE3A1CA815526498F13B12D2ECA69D7115A7D74666545BADF6CE9DC12F9205
25,197,134 UART: [art] SIG.R = E7F1AC771FBE475351982301B2053A1092A4759FE18D5C9B1AECB7F73A8C14A62CEE091DAEDC28144B4FBCB0F019D2A7
25,204,545 UART: [art] SIG.S = A4AB97DA5E0B3332AA32ACF149BE185F52C8415F9BA484CBC1E33D2B40DE6442DC2D6F92936535F242E9329B65A88EA2
26,183,912 UART: Caliptra RT
26,184,627 UART: [state] CFI Enabled
26,301,642 UART: [rt] RT listening for mailbox commands...
26,304,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,439 UART: [rt]cmd =0x41544d4e, len=14344
30,389,940 >>> mbox cmd response data (8 bytes)
30,390,513 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,421,088 UART: [rt]cmd =0x41545348, len=116
30,440,763 >>> mbox cmd response data (12 bytes)
32,493,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,229,387 >>> mbox cmd response: success
40,229,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,264,528 UART:
40,264,857 UART: Running Caliptra FMC ...
40,265,993 UART:
40,266,155 UART: [state] CFI Enabled
40,310,263 UART: [art] Extend RT PCRs Done
40,311,417 UART: [art] Lock RT PCRs Done
40,312,974 UART: [art] Populate DV Done
40,318,376 UART: [fht] FMC Alias Private Key: 7
40,319,855 UART: [art] Derive CDI
40,320,619 UART: [art] Store in in slot 0x4
40,363,329 UART: [art] Derive Key Pair
40,364,387 UART: [art] Store priv key in slot 0x5
42,791,437 UART: [art] Derive Key Pair - Done
42,804,054 UART: [art] Signing Cert with AUTHO
42,805,363 UART: RITY.KEYID = 7
44,510,668 UART: [art] Erasing AUTHORITY.KEYID = 7
44,512,176 UART: [art] PUB.X = C8CFD3F770313E4753C9D59405BE3F27AA275E41EC9C3EDA783EBC6E31AF4CDAC5CF1B80AF3FDCFBD867D4AEF5B39622
44,519,478 UART: [art] PUB.Y = 08E02317B6F88A10E23441AFA00E4C16B57792BB47862797AEA851A1CB49BA470DB0E1409A2AB3D98CFB759B80286DFA
44,526,758 UART: [art] SIG.R = 078719C4BEC6E3AE6661831BCB3F479B57CBB0B9F9F439E85520A3A155D3AF6B65160BB6B854883D4D43928668611EAC
44,534,139 UART: [art] SIG.S = D2D8D79C7A3D452C6125F161CD532309713E3A036715F961E99CE75563DF0461967426A565C166269A80F3F5EC306190
45,512,669 UART: Caliptra RT
45,513,361 UART: [state] CFI Enabled
45,800,222 UART: [rt] RT listening for mailbox commands...
45,831,908 UART: [rt]cmd =0x41545348, len=116
45,851,920 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,216 UART: [kat] SHA2-512-ACC
897,117 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,372 UART: [kat] LMS
1,475,568 UART: [kat] --
1,476,521 UART: [cold-reset] ++
1,477,041 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 ready_for_fw is high
1,480,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,724 UART: [idev] Erasing UDS.KEYID = 0
1,505,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,302 UART: [idev] --
1,515,241 UART: [ldev] ++
1,515,409 UART: [ldev] CDI.KEYID = 6
1,515,772 UART: [ldev] SUBJECT.KEYID = 5
1,516,198 UART: [ldev] AUTHORITY.KEYID = 7
1,516,661 UART: [ldev] FE.KEYID = 1
1,521,721 UART: [ldev] Erasing FE.KEYID = 1
1,547,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,790 UART: [ldev] --
1,586,221 UART: [fwproc] Waiting for Commands...
1,586,906 UART: [fwproc] Received command 0x46574c44
1,587,697 UART: [fwproc] Received Image of size 114360 bytes
2,884,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,206 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,558 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,351 >>> mbox cmd response: success
3,079,601 UART: [afmc] ++
3,079,769 UART: [afmc] CDI.KEYID = 6
3,080,131 UART: [afmc] SUBJECT.KEYID = 7
3,080,556 UART: [afmc] AUTHORITY.KEYID = 5
3,115,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,948 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,638 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,497 UART: [afmc] --
3,158,471 UART: [cold-reset] --
3,159,233 UART: [state] Locking Datavault
3,160,530 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,134 UART: [state] Locking ICCM
3,161,686 UART: [exit] Launching FMC @ 0x40000130
3,167,015 UART:
3,167,031 UART: Running Caliptra FMC ...
3,167,439 UART:
3,167,493 UART: [state] CFI Enabled
3,178,066 UART: [fht] FMC Alias Private Key: 7
3,285,839 UART: [art] Extend RT PCRs Done
3,286,267 UART: [art] Lock RT PCRs Done
3,288,075 UART: [art] Populate DV Done
3,296,502 UART: [fht] FMC Alias Private Key: 7
3,297,652 UART: [art] Derive CDI
3,297,932 UART: [art] Store in in slot 0x4
3,383,781 UART: [art] Derive Key Pair
3,384,141 UART: [art] Store priv key in slot 0x5
3,397,853 UART: [art] Derive Key Pair - Done
3,412,370 UART: [art] Signing Cert with AUTHO
3,412,850 UART: RITY.KEYID = 7
3,428,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,017 UART: [art] PUB.X = F5FDD5F7ADA3AB49FC1091A38BD94B65B9C7F4D0F6792426CFBD5D1106F55FC28134E63C0FB23C39660BB7F2DA1AACBD
3,435,804 UART: [art] PUB.Y = 5AAE0704955A39AD9D1B12C2EDD4A23583D6A81606AB36503C08FDC029773E1A3BDE85C625B5A31AB1675860585077A7
3,442,744 UART: [art] SIG.R = A42352CB49127A8195E70A1115A0CE8C50155C06582D452785AA1F247F4EE92AC0F780D5AF066BCC22F3F9BB11EA6AA6
3,449,513 UART: [art] SIG.S = FC5AD39E976EC2E7D7AF848CCDCFA657BB38B60582E693758D72D1101FF040BDEF888F6FA1D576E58E30D870BDB3419B
3,473,163 UART: Caliptra RT
3,473,417 UART: [state] CFI Enabled
3,581,056 UART: [rt] RT listening for mailbox commands...
3,581,726 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,277 UART: [rt]cmd =0x41544d4e, len=14344
3,849,046 >>> mbox cmd response data (8 bytes)
3,849,047 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,118 UART: [rt]cmd =0x41545348, len=116
3,901,501 >>> mbox cmd response data (12 bytes)
3,901,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,165 UART:
3,902,181 UART: Running Caliptra ROM ...
3,902,589 UART:
3,902,643 UART: [state] CFI Enabled
3,905,197 UART: [state] LifecycleState = Unprovisioned
3,905,852 UART: [state] DebugLocked = No
3,906,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,907,917 UART: [kat] SHA2-256
4,701,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,705,963 UART: [kat] ++
4,706,115 UART: [kat] sha1
4,710,447 UART: [kat] SHA2-256
4,712,385 UART: [kat] SHA2-384
4,715,048 UART: [kat] SHA2-512-ACC
4,716,948 UART: [kat] ECC-384
4,722,237 UART: [kat] HMAC-384Kdf
4,726,827 UART: [kat] LMS
5,295,023 UART: [kat] --
5,296,016 UART: [update-reset] ++
6,630,347 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,631,417 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,781,335 >>> mbox cmd response: success
6,781,335 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,781,668 UART: [update-reset] Copying MAN_2 To MAN_1
6,789,682 UART: [update-reset Success] --
6,790,561 UART: [state] Locking Datavault
6,791,323 UART: [state] Locking PCR0, PCR1 and PCR31
6,791,927 UART: [state] Locking ICCM
6,792,547 UART: [exit] Launching FMC @ 0x40000130
6,797,876 UART:
6,797,892 UART: Running Caliptra FMC ...
6,798,300 UART:
6,798,354 UART: [state] CFI Enabled
6,887,779 UART: [art] Extend RT PCRs Done
6,888,207 UART: [art] Lock RT PCRs Done
6,889,670 UART: [art] Populate DV Done
6,898,019 UART: [fht] FMC Alias Private Key: 7
6,899,085 UART: [art] Derive CDI
6,899,365 UART: [art] Store in in slot 0x4
6,985,122 UART: [art] Derive Key Pair
6,985,482 UART: [art] Store priv key in slot 0x5
6,999,110 UART: [art] Derive Key Pair - Done
7,013,833 UART: [art] Signing Cert with AUTHO
7,014,313 UART: RITY.KEYID = 7
7,029,491 UART: [art] Erasing AUTHORITY.KEYID = 7
7,030,256 UART: [art] PUB.X = D563F56EC6030B50DCAB64C1BF4FB63E3F748BA104F339ED71D668B0CCC2B750ED35B6B040291F877DF5AD8D380B28D1
7,037,030 UART: [art] PUB.Y = D05A2BD44D3238A73F317780199477A7E4399380DE2F68635DB660469E6A200E6945B7E94FC38CDB299E8A485E943E27
7,043,971 UART: [art] SIG.R = C6839EB4C91D3433AB6EE387E9785E29C9E601D14349178A4F72A456D21CC3DCC85EA06AF616DAFB3FE229FB8F2FDC92
7,050,754 UART: [art] SIG.S = 379B044EEAD037F968F84B6691AE5E405FE82456FF7D149A002EC95E54BB72E8C3E1D51D867FB74AADC54051B93DA8C7
7,074,570 UART: Caliptra RT
7,074,824 UART: [state] CFI Enabled
7,356,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,386,992 UART: [rt]cmd =0x41545348, len=116
7,408,295 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,747 >>> mbox cmd response: success
2,988,143 UART:
2,988,159 UART: Running Caliptra FMC ...
2,988,567 UART:
2,988,621 UART: [state] CFI Enabled
2,998,772 UART: [fht] FMC Alias Private Key: 7
3,106,729 UART: [art] Extend RT PCRs Done
3,107,157 UART: [art] Lock RT PCRs Done
3,108,895 UART: [art] Populate DV Done
3,117,090 UART: [fht] FMC Alias Private Key: 7
3,118,162 UART: [art] Derive CDI
3,118,442 UART: [art] Store in in slot 0x4
3,204,201 UART: [art] Derive Key Pair
3,204,561 UART: [art] Store priv key in slot 0x5
3,217,957 UART: [art] Derive Key Pair - Done
3,232,905 UART: [art] Signing Cert with AUTHO
3,233,385 UART: RITY.KEYID = 7
3,248,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,266 UART: [art] PUB.X = CEBBF8A9326FC5B1EE3B5C634A0B76F842CD8CC92881805554B36EEFBF3439576EA7D48270AACD19FE2F0EF07C6F4E7F
3,256,052 UART: [art] PUB.Y = ED4A5021E615FBD15AEF094E8B7D63096D25FE6D85642D1FAB39F363DB15740A582380ED1613885A90B14F55C900D119
3,262,973 UART: [art] SIG.R = 5E1808EF69DBEE4E989CF92CA9A00B80CE47507402563F210D708AFD2359B68CAD7E4FD697450917BCD23FDA9803E21B
3,269,735 UART: [art] SIG.S = 2277A1B6DA73FF4A872609AA9371C907144389488D79E70C200127C45A805923A8248FE6881693C9A438772C42727403
3,293,773 UART: Caliptra RT
3,294,027 UART: [state] CFI Enabled
3,402,638 UART: [rt] RT listening for mailbox commands...
3,403,308 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,057 UART: [rt]cmd =0x41544d4e, len=14344
3,670,816 >>> mbox cmd response data (8 bytes)
3,670,817 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,720 UART: [rt]cmd =0x41545348, len=116
3,722,351 >>> mbox cmd response data (12 bytes)
3,722,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,484,419 >>> mbox cmd response: success
6,484,419 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,497,708 UART:
6,497,724 UART: Running Caliptra FMC ...
6,498,132 UART:
6,498,186 UART: [state] CFI Enabled
6,587,307 UART: [art] Extend RT PCRs Done
6,587,735 UART: [art] Lock RT PCRs Done
6,589,306 UART: [art] Populate DV Done
6,597,579 UART: [fht] FMC Alias Private Key: 7
6,598,649 UART: [art] Derive CDI
6,598,929 UART: [art] Store in in slot 0x4
6,684,762 UART: [art] Derive Key Pair
6,685,122 UART: [art] Store priv key in slot 0x5
6,698,648 UART: [art] Derive Key Pair - Done
6,713,210 UART: [art] Signing Cert with AUTHO
6,713,690 UART: RITY.KEYID = 7
6,728,438 UART: [art] Erasing AUTHORITY.KEYID = 7
6,729,203 UART: [art] PUB.X = 70E034BEAE4F1A8EBAA312B3CE62F5D466926B894989B673733CFC12BC76016175D64E2348B3FF518031192912197FB8
6,735,968 UART: [art] PUB.Y = 5D7C6A186653D2B27A28AA5FA69D9C7E04260363ACBC020D3979603FEF13FF4B810AEA2CFFAE77E089B50571A1EE176F
6,742,914 UART: [art] SIG.R = 39DCA82B05ED6570F7A4B4348290F7D609C478846117BC7F27C6AEA0B1243F67FDDDF82AFB4DC932B12F694E9329E929
6,749,686 UART: [art] SIG.S = 83805E1E708DB63EE2228246D92F0C9833ECDD7DC4A9C27B35B9565C0C74765807817DE185C55C3D16882AEA033A1F6D
6,773,911 UART: Caliptra RT
6,774,165 UART: [state] CFI Enabled
7,059,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,090,107 UART: [rt]cmd =0x41545348, len=116
7,112,374 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,746 UART: [kat] SHA2-256
892,684 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,505 UART: [kat] LMS
1,475,701 UART: [kat] --
1,476,760 UART: [cold-reset] ++
1,477,118 UART: [fht] Storing FHT @ 0x50003400
1,479,653 UART: [idev] ++
1,479,821 UART: [idev] CDI.KEYID = 6
1,480,181 UART: [idev] SUBJECT.KEYID = 7
1,480,605 UART: [idev] UDS.KEYID = 0
1,480,950 ready_for_fw is high
1,480,950 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,757 UART: [idev] Erasing UDS.KEYID = 0
1,505,295 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,909 UART: [idev] --
1,514,830 UART: [ldev] ++
1,514,998 UART: [ldev] CDI.KEYID = 6
1,515,361 UART: [ldev] SUBJECT.KEYID = 5
1,515,787 UART: [ldev] AUTHORITY.KEYID = 7
1,516,250 UART: [ldev] FE.KEYID = 1
1,521,550 UART: [ldev] Erasing FE.KEYID = 1
1,546,835 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,487 UART: [ldev] --
1,585,996 UART: [fwproc] Waiting for Commands...
1,586,837 UART: [fwproc] Received command 0x46574c44
1,587,628 UART: [fwproc] Received Image of size 114360 bytes
2,885,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,066 >>> mbox cmd response: success
3,079,186 UART: [afmc] ++
3,079,354 UART: [afmc] CDI.KEYID = 6
3,079,716 UART: [afmc] SUBJECT.KEYID = 7
3,080,141 UART: [afmc] AUTHORITY.KEYID = 5
3,115,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,963 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,653 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,680 UART: [afmc] --
3,158,728 UART: [cold-reset] --
3,159,672 UART: [state] Locking Datavault
3,161,057 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,661 UART: [state] Locking ICCM
3,162,287 UART: [exit] Launching FMC @ 0x40000130
3,167,616 UART:
3,167,632 UART: Running Caliptra FMC ...
3,168,040 UART:
3,168,183 UART: [state] CFI Enabled
3,178,920 UART: [fht] FMC Alias Private Key: 7
3,286,723 UART: [art] Extend RT PCRs Done
3,287,151 UART: [art] Lock RT PCRs Done
3,288,649 UART: [art] Populate DV Done
3,297,008 UART: [fht] FMC Alias Private Key: 7
3,298,060 UART: [art] Derive CDI
3,298,340 UART: [art] Store in in slot 0x4
3,383,943 UART: [art] Derive Key Pair
3,384,303 UART: [art] Store priv key in slot 0x5
3,397,785 UART: [art] Derive Key Pair - Done
3,412,290 UART: [art] Signing Cert with AUTHO
3,412,770 UART: RITY.KEYID = 7
3,427,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,309 UART: [art] PUB.X = 22F39FE243DDB7D95879A35955B0CFBC797455A37E6E91F05720B8F5CE7998F93435BD0967CEE4ECED306EC21D1DFE62
3,435,088 UART: [art] PUB.Y = D23C312ED16976F4F6A9A668A4B3BC0DDA205E08CF8B2D62CEFA6EA1C3563F2C9D5B3DB708E4C8A4E24B5CD84DD9EDF7
3,442,057 UART: [art] SIG.R = C4E079B03E93CE76E6EE9865D36ED5B0292E6B851876EB193CC2FD08B0AC499214E58545E72486DCD1A49520BBE6D56B
3,448,832 UART: [art] SIG.S = 77657623EA6986804B4D117FE5F2A9863725E64ED558E436B209644AF22FDC77AB84334DAE7CC02AE0762AA095591735
3,472,362 UART: Caliptra RT
3,472,708 UART: [state] CFI Enabled
3,581,572 UART: [rt] RT listening for mailbox commands...
3,582,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,155 UART: [rt]cmd =0x41544d4e, len=14344
3,849,834 >>> mbox cmd response data (8 bytes)
3,849,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,038 UART: [rt]cmd =0x41545348, len=116
3,902,551 >>> mbox cmd response data (12 bytes)
3,902,552 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,333 UART:
3,903,349 UART: Running Caliptra ROM ...
3,903,757 UART:
3,903,898 UART: [state] CFI Enabled
3,906,592 UART: [state] LifecycleState = Unprovisioned
3,907,247 UART: [state] DebugLocked = No
3,907,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,909,482 UART: [kat] SHA2-256
4,703,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,707,528 UART: [kat] ++
4,707,680 UART: [kat] sha1
4,712,058 UART: [kat] SHA2-256
4,713,996 UART: [kat] SHA2-384
4,716,961 UART: [kat] SHA2-512-ACC
4,718,861 UART: [kat] ECC-384
4,724,488 UART: [kat] HMAC-384Kdf
4,729,130 UART: [kat] LMS
5,297,326 UART: [kat] --
5,298,443 UART: [update-reset] ++
6,633,672 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,634,732 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,784,650 >>> mbox cmd response: success
6,784,650 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,784,779 UART: [update-reset] Copying MAN_2 To MAN_1
6,792,793 UART: [update-reset Success] --
6,793,870 UART: [state] Locking Datavault
6,794,686 UART: [state] Locking PCR0, PCR1 and PCR31
6,795,290 UART: [state] Locking ICCM
6,795,956 UART: [exit] Launching FMC @ 0x40000130
6,801,285 UART:
6,801,301 UART: Running Caliptra FMC ...
6,801,709 UART:
6,801,852 UART: [state] CFI Enabled
6,891,505 UART: [art] Extend RT PCRs Done
6,891,933 UART: [art] Lock RT PCRs Done
6,893,208 UART: [art] Populate DV Done
6,901,415 UART: [fht] FMC Alias Private Key: 7
6,902,511 UART: [art] Derive CDI
6,902,791 UART: [art] Store in in slot 0x4
6,988,830 UART: [art] Derive Key Pair
6,989,190 UART: [art] Store priv key in slot 0x5
7,002,382 UART: [art] Derive Key Pair - Done
7,017,057 UART: [art] Signing Cert with AUTHO
7,017,537 UART: RITY.KEYID = 7
7,033,573 UART: [art] Erasing AUTHORITY.KEYID = 7
7,034,338 UART: [art] PUB.X = 927E1295EB3981903959AC50F0745EABBF50763EE77AC50F58DDDC7AE9B22A83F5A25665F92F019E746D9562782BB645
7,041,104 UART: [art] PUB.Y = 532C6F3C8D61C2574AC465B372F7C15BC22EF4DF4E222E1FF36F72D8AB659D7F22CEDACD9B23B3AC2A33603F6689E5A2
7,048,072 UART: [art] SIG.R = B05E25F6C649C4D1811C765AC998D36C967F423574A6BC85A6A56D254AB0E802AA1965849EBE82E28DC3FED4B5DF3E1C
7,054,851 UART: [art] SIG.S = 8BFECECEB3BB4608052811BE02DD3EFF6AF5E31070770C17AE9654741A110E47C15C9A7D3AE91A4E96BD07CED22D6439
7,078,174 UART: Caliptra RT
7,078,520 UART: [state] CFI Enabled
7,358,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,389,607 UART: [rt]cmd =0x41545348, len=116
7,411,758 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,056 ready_for_fw is high
1,363,056 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,666 >>> mbox cmd response: success
2,990,894 UART:
2,990,910 UART: Running Caliptra FMC ...
2,991,318 UART:
2,991,461 UART: [state] CFI Enabled
3,001,954 UART: [fht] FMC Alias Private Key: 7
3,110,747 UART: [art] Extend RT PCRs Done
3,111,175 UART: [art] Lock RT PCRs Done
3,112,879 UART: [art] Populate DV Done
3,121,062 UART: [fht] FMC Alias Private Key: 7
3,122,128 UART: [art] Derive CDI
3,122,408 UART: [art] Store in in slot 0x4
3,207,851 UART: [art] Derive Key Pair
3,208,211 UART: [art] Store priv key in slot 0x5
3,221,119 UART: [art] Derive Key Pair - Done
3,236,048 UART: [art] Signing Cert with AUTHO
3,236,528 UART: RITY.KEYID = 7
3,251,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,571 UART: [art] PUB.X = 9541B73F440D90EFBBAC6ED7B6880D310F9248FF3F1492561C369F56F8BF07CDE388BA286747E4BEBCF79086DB76E764
3,259,339 UART: [art] PUB.Y = 3EC21E135701F78A67B6F370A23BFAE5C65507F8D16433A33D49B03998B82292B679C9FF3A6A197B08FE96E20B0E5CFD
3,266,280 UART: [art] SIG.R = 5623E5FEA239CB59AC4DD6E74AD58580324AEE21E27BC07C79A10163BD36A7F5FA259FE176DF54BB8939D5BA3CCA4329
3,273,063 UART: [art] SIG.S = 69ABBB944BF4DA581EFF3B052EEA5AD24AC5E90DBE1F1E2175020DB73268932E79C66619E9D06BAC5A21BB0E75EE8B13
3,297,135 UART: Caliptra RT
3,297,481 UART: [state] CFI Enabled
3,406,460 UART: [rt] RT listening for mailbox commands...
3,407,130 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,623 UART: [rt]cmd =0x41544d4e, len=14344
3,674,394 >>> mbox cmd response data (8 bytes)
3,674,395 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,554 UART: [rt]cmd =0x41545348, len=116
3,726,361 >>> mbox cmd response data (12 bytes)
3,726,362 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,488,118 >>> mbox cmd response: success
6,488,118 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,501,331 UART:
6,501,347 UART: Running Caliptra FMC ...
6,501,755 UART:
6,501,898 UART: [state] CFI Enabled
6,591,107 UART: [art] Extend RT PCRs Done
6,591,535 UART: [art] Lock RT PCRs Done
6,593,032 UART: [art] Populate DV Done
6,601,361 UART: [fht] FMC Alias Private Key: 7
6,602,361 UART: [art] Derive CDI
6,602,641 UART: [art] Store in in slot 0x4
6,688,282 UART: [art] Derive Key Pair
6,688,642 UART: [art] Store priv key in slot 0x5
6,702,580 UART: [art] Derive Key Pair - Done
6,717,245 UART: [art] Signing Cert with AUTHO
6,717,725 UART: RITY.KEYID = 7
6,733,051 UART: [art] Erasing AUTHORITY.KEYID = 7
6,733,816 UART: [art] PUB.X = AE301A39DA4F8E3052CF316304A4EB15709CE96DFB22D397F15CBADF2B3FA36E511B958FDC3A0A96E01760F6D20B20D9
6,740,593 UART: [art] PUB.Y = 6E856A4CD86C093578507F68A5428232E840903C584B8C51DFC74C99BBBB9451A8A2C5BD817CAB776D00C329016FF6DC
6,747,519 UART: [art] SIG.R = A47AF41C721370D87E7BFE2AD64681FA11232BBD30391ADCF809FCF97C0E86ABC056FF5A8EFD9DB214D0B7C5B1F2E544
6,754,305 UART: [art] SIG.S = 77E64C1DF42F404C9D4C6E8FEECD577664568D54D167623E411AC599E2837124831585A76051D5AA7DD3F75728DCAEDE
6,777,964 UART: Caliptra RT
6,778,310 UART: [state] CFI Enabled
7,060,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,091,068 UART: [rt]cmd =0x41545348, len=116
7,112,753 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,769 UART: [kat] SHA2-256
903,709 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
917,946 UART: [kat] HMAC-384Kdf
922,520 UART: [kat] LMS
1,170,848 UART: [kat] --
1,172,001 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,175,028 UART: [idev] ++
1,175,196 UART: [idev] CDI.KEYID = 6
1,175,556 UART: [idev] SUBJECT.KEYID = 7
1,175,980 UART: [idev] UDS.KEYID = 0
1,176,325 ready_for_fw is high
1,176,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,934 UART: [idev] Erasing UDS.KEYID = 0
1,200,639 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,361 UART: [ldev] ++
1,210,529 UART: [ldev] CDI.KEYID = 6
1,210,892 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,216,979 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,434 UART: [fwproc] Wait for Commands...
1,283,176 UART: [fwproc] Recv command 0x46574c44
1,283,904 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,654 >>> mbox cmd response: success
2,774,886 UART: [afmc] ++
2,775,054 UART: [afmc] CDI.KEYID = 6
2,775,416 UART: [afmc] SUBJECT.KEYID = 7
2,775,841 UART: [afmc] AUTHORITY.KEYID = 5
2,811,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,747 UART: [afmc] --
2,854,877 UART: [cold-reset] --
2,855,837 UART: [state] Locking Datavault
2,857,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,610 UART: [state] Locking ICCM
2,858,242 UART: [exit] Launching FMC @ 0x40000130
2,863,571 UART:
2,863,587 UART: Running Caliptra FMC ...
2,863,995 UART:
2,864,049 UART: [state] CFI Enabled
2,874,610 UART: [fht] FMC Alias Private Key: 7
2,982,425 UART: [art] Extend RT PCRs Done
2,982,853 UART: [art] Lock RT PCRs Done
2,984,301 UART: [art] Populate DV Done
2,992,478 UART: [fht] FMC Alias Private Key: 7
2,993,594 UART: [art] Derive CDI
2,993,874 UART: [art] Store in in slot 0x4
3,079,983 UART: [art] Derive Key Pair
3,080,343 UART: [art] Store priv key in slot 0x5
3,093,261 UART: [art] Derive Key Pair - Done
3,108,147 UART: [art] Signing Cert with AUTHO
3,108,627 UART: RITY.KEYID = 7
3,123,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,628 UART: [art] PUB.X = 8D2AFD80DFEDD14C64973FEE90B9230ED7DE3D32C7C0253D34E909E2C7CB9052F249A459CE4AA97E7C644CFEBAE44750
3,131,412 UART: [art] PUB.Y = E4EFE0B724AD88C3ADE8A3F085024E9F0F864AE7F00077AF831CC4A18C2EC976D929E53950FF9F438C7579617B365FFF
3,138,346 UART: [art] SIG.R = 484193DE090EA9AB6EDCB2C9187BAEFA7E3F8E6CBA424812E00AE01A5F6C7D5A7A3F984BE9D93608C244395987E150AA
3,145,120 UART: [art] SIG.S = C9931ACBE25F289939619BE844F0E2EDCFF0FB190FACDCEB81DE459AAC58E9229C253A8911E28CD16B3F1DB3F80C8086
3,168,315 UART: Caliptra RT
3,168,569 UART: [state] CFI Enabled
3,276,467 UART: [rt] RT listening for mailbox commands...
3,277,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,736 UART: [rt]cmd =0x41544d4e, len=14344
3,544,699 >>> mbox cmd response data (8 bytes)
3,544,700 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,785 UART: [rt]cmd =0x41545348, len=116
3,596,974 >>> mbox cmd response data (12 bytes)
3,596,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,599 UART:
3,597,615 UART: Running Caliptra ROM ...
3,598,023 UART:
3,598,078 UART: [state] CFI Enabled
3,600,840 UART: [state] LifecycleState = Unprovisioned
3,601,495 UART: [state] DebugLocked = No
3,602,071 UART: [state] WD Timer not started. Device not locked for debugging
3,603,211 UART: [kat] SHA2-256
4,408,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,412,986 UART: [kat] ++
4,413,138 UART: [kat] sha1
4,417,494 UART: [kat] SHA2-256
4,419,434 UART: [kat] SHA2-384
4,422,255 UART: [kat] SHA2-512-ACC
4,424,155 UART: [kat] ECC-384
4,433,886 UART: [kat] HMAC-384Kdf
4,438,420 UART: [kat] LMS
4,686,748 UART: [kat] --
4,687,522 UART: [update-reset] ++
5,999,235 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,000,440 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,150,306 >>> mbox cmd response: success
6,150,306 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,150,501 UART: [update-reset] Copying MAN_2 To MAN_1
6,158,515 UART: [update-reset Success] --
6,159,710 UART: [state] Locking Datavault
6,160,656 UART: [state] Locking PCR0, PCR1 and PCR31
6,161,260 UART: [state] Locking ICCM
6,161,876 UART: [exit] Launching FMC @ 0x40000130
6,167,205 UART:
6,167,221 UART: Running Caliptra FMC ...
6,167,629 UART:
6,167,683 UART: [state] CFI Enabled
6,256,782 UART: [art] Extend RT PCRs Done
6,257,210 UART: [art] Lock RT PCRs Done
6,258,431 UART: [art] Populate DV Done
6,266,858 UART: [fht] FMC Alias Private Key: 7
6,267,920 UART: [art] Derive CDI
6,268,200 UART: [art] Store in in slot 0x4
6,353,819 UART: [art] Derive Key Pair
6,354,179 UART: [art] Store priv key in slot 0x5
6,367,213 UART: [art] Derive Key Pair - Done
6,382,197 UART: [art] Signing Cert with AUTHO
6,382,677 UART: RITY.KEYID = 7
6,397,879 UART: [art] Erasing AUTHORITY.KEYID = 7
6,398,644 UART: [art] PUB.X = 7982D60B47733ADAD56CD284A0E4B3137AE67EE78AE5CBD5F28DC8E8F8F79B043FC59179C9B1E0B47F453D8EF0C679D8
6,405,424 UART: [art] PUB.Y = 7D0B72CAC4E5947C9732FCB4EC4595C76474A449D254CDF321FE58B50234FB19B6EF09686D0C50D7DF78148ABAA9ABB7
6,412,376 UART: [art] SIG.R = 269BC59D8EACAFEE15CA37A4E9EEC1512355141ED1B3C431151BACE3A04F93509E7DC10AED53195D8AC4C56E3EC9C1C6
6,419,165 UART: [art] SIG.S = B90528E3CDA2B5D45705AACECEE0235F60AE5FB845CAA9607CFBED2F44319673D00D82D2173B0DAC813BE9FA64F5C0C7
6,442,758 UART: Caliptra RT
6,443,012 UART: [state] CFI Enabled
6,725,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,756,262 UART: [rt]cmd =0x41545348, len=116
6,778,209 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,063 ready_for_fw is high
1,061,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,301 >>> mbox cmd response: success
2,690,127 UART:
2,690,143 UART: Running Caliptra FMC ...
2,690,551 UART:
2,690,605 UART: [state] CFI Enabled
2,701,212 UART: [fht] FMC Alias Private Key: 7
2,809,463 UART: [art] Extend RT PCRs Done
2,809,891 UART: [art] Lock RT PCRs Done
2,811,601 UART: [art] Populate DV Done
2,819,904 UART: [fht] FMC Alias Private Key: 7
2,820,926 UART: [art] Derive CDI
2,821,206 UART: [art] Store in in slot 0x4
2,906,753 UART: [art] Derive Key Pair
2,907,113 UART: [art] Store priv key in slot 0x5
2,920,239 UART: [art] Derive Key Pair - Done
2,934,746 UART: [art] Signing Cert with AUTHO
2,935,226 UART: RITY.KEYID = 7
2,950,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,761 UART: [art] PUB.X = 1BAAFBFEE7A0E37E4444E2C24101FA74714F19D88036C1E74C6AEF600093F73BF3A5AC6D2110CBE4315853F968A8E281
2,958,516 UART: [art] PUB.Y = 7BFE5AA9F4CA1F8E80B2E0738102478B8B19B58975CD880076738CF0A45F6D9DFEFD85DF0E8F349F2B33DB6FF466E85F
2,965,454 UART: [art] SIG.R = 1C4DFF99A9336CDFEEFE5499F6F785F74433CAB2380A6344FC7B3543FDA49510B5462C4C7089D3ADC0A7FA5806E04CC7
2,972,232 UART: [art] SIG.S = F7EA8B26F4A7422D1C914FF8E60953D3FBFE03C3A2670697FA7482820C64CC407737921B5C32EB4C2DF3A7E69263D1BB
2,996,181 UART: Caliptra RT
2,996,435 UART: [state] CFI Enabled
3,104,203 UART: [rt] RT listening for mailbox commands...
3,104,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,406 UART: [rt]cmd =0x41544d4e, len=14344
3,372,087 >>> mbox cmd response data (8 bytes)
3,372,088 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,989 UART: [rt]cmd =0x41545348, len=116
3,424,538 >>> mbox cmd response data (12 bytes)
3,424,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,861,255 >>> mbox cmd response: success
5,861,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,874,881 UART:
5,874,897 UART: Running Caliptra FMC ...
5,875,305 UART:
5,875,359 UART: [state] CFI Enabled
5,964,468 UART: [art] Extend RT PCRs Done
5,964,896 UART: [art] Lock RT PCRs Done
5,966,345 UART: [art] Populate DV Done
5,974,766 UART: [fht] FMC Alias Private Key: 7
5,975,932 UART: [art] Derive CDI
5,976,212 UART: [art] Store in in slot 0x4
6,062,043 UART: [art] Derive Key Pair
6,062,403 UART: [art] Store priv key in slot 0x5
6,075,813 UART: [art] Derive Key Pair - Done
6,090,697 UART: [art] Signing Cert with AUTHO
6,091,177 UART: RITY.KEYID = 7
6,106,573 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,338 UART: [art] PUB.X = D43B3FEC26A2B8818A1182B5DB732E11298AA162A401B2DBF3E5C1C52B80BB87F80289AE6D87F0244AF4BFE774296064
6,114,110 UART: [art] PUB.Y = D436DB27AAB9F96EA2085DC20E2A9DBC9B820E25EEC7852121B52F256B90F78266CE6CD2F689DC61762B862B2FECA2A7
6,121,067 UART: [art] SIG.R = D8A5DE0C49DB73D3F874A53908D78B0881E1B65830FA3C94DD38D6FFFD8AC8D4CD7EEFBCAC561B868843037DA251C722
6,127,843 UART: [art] SIG.S = 0092055078AFB0967B0BD8AEC934DB4C3FAE79491B83CD2F424CCF8380D39ACAFFF8A9777121CABCE342535106C15C49
6,151,593 UART: Caliptra RT
6,151,847 UART: [state] CFI Enabled
6,436,627 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,467,724 UART: [rt]cmd =0x41545348, len=116
6,489,531 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,905 UART: [kat] SHA2-512-ACC
908,806 UART: [kat] ECC-384
918,903 UART: [kat] HMAC-384Kdf
923,531 UART: [kat] LMS
1,171,859 UART: [kat] --
1,172,950 UART: [cold-reset] ++
1,173,356 UART: [fht] FHT @ 0x50003400
1,176,243 UART: [idev] ++
1,176,411 UART: [idev] CDI.KEYID = 6
1,176,771 UART: [idev] SUBJECT.KEYID = 7
1,177,195 UART: [idev] UDS.KEYID = 0
1,177,540 ready_for_fw is high
1,177,540 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,784 UART: [idev] Sha1 KeyId Algorithm
1,210,264 UART: [idev] --
1,211,298 UART: [ldev] ++
1,211,466 UART: [ldev] CDI.KEYID = 6
1,211,829 UART: [ldev] SUBJECT.KEYID = 5
1,212,255 UART: [ldev] AUTHORITY.KEYID = 7
1,212,718 UART: [ldev] FE.KEYID = 1
1,218,214 UART: [ldev] Erasing FE.KEYID = 1
1,244,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,856 UART: [ldev] --
1,284,177 UART: [fwproc] Wait for Commands...
1,284,963 UART: [fwproc] Recv command 0x46574c44
1,285,691 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,223 >>> mbox cmd response: success
2,776,439 UART: [afmc] ++
2,776,607 UART: [afmc] CDI.KEYID = 6
2,776,969 UART: [afmc] SUBJECT.KEYID = 7
2,777,394 UART: [afmc] AUTHORITY.KEYID = 5
2,812,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,958 UART: [afmc] --
2,856,046 UART: [cold-reset] --
2,857,006 UART: [state] Locking Datavault
2,858,417 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,021 UART: [state] Locking ICCM
2,859,593 UART: [exit] Launching FMC @ 0x40000130
2,864,922 UART:
2,864,938 UART: Running Caliptra FMC ...
2,865,346 UART:
2,865,489 UART: [state] CFI Enabled
2,876,144 UART: [fht] FMC Alias Private Key: 7
2,984,889 UART: [art] Extend RT PCRs Done
2,985,317 UART: [art] Lock RT PCRs Done
2,986,569 UART: [art] Populate DV Done
2,995,030 UART: [fht] FMC Alias Private Key: 7
2,996,062 UART: [art] Derive CDI
2,996,342 UART: [art] Store in in slot 0x4
3,081,991 UART: [art] Derive Key Pair
3,082,351 UART: [art] Store priv key in slot 0x5
3,095,649 UART: [art] Derive Key Pair - Done
3,110,788 UART: [art] Signing Cert with AUTHO
3,111,268 UART: RITY.KEYID = 7
3,125,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,699 UART: [art] PUB.X = 38DB06754CC466819B5549677C960E20BE70BE64953C911E01F4DEE8ACFD04D4092B8110268B0EBCEE934D84DEFDC830
3,133,459 UART: [art] PUB.Y = 07A06A6BA55E45DE02B3D5FCC373242FA81D3FE34BDE5DCA58C8F84E7B2D4777A0FA4F36DD27775B9AFA39DB24FE1342
3,140,425 UART: [art] SIG.R = 4365A831813069A1ED23CF208BEED5D4A8AE4E21B30C4338B2C007BCBC1F5D6844D8E58B565D6513091A8AB46515319A
3,147,190 UART: [art] SIG.S = E519E83A33A44DC361D929625F2F242A975CB88B7973540E8371A595631134AA65129DE6E84269F61367744AFBB728F5
3,171,156 UART: Caliptra RT
3,171,502 UART: [state] CFI Enabled
3,279,750 UART: [rt] RT listening for mailbox commands...
3,280,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,139 UART: [rt]cmd =0x41544d4e, len=14344
3,548,036 >>> mbox cmd response data (8 bytes)
3,548,037 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,214 UART: [rt]cmd =0x41545348, len=116
3,600,351 >>> mbox cmd response data (12 bytes)
3,600,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,601,294 UART:
3,601,310 UART: Running Caliptra ROM ...
3,601,718 UART:
3,601,860 UART: [state] CFI Enabled
3,604,424 UART: [state] LifecycleState = Unprovisioned
3,605,079 UART: [state] DebugLocked = No
3,605,629 UART: [state] WD Timer not started. Device not locked for debugging
3,606,899 UART: [kat] SHA2-256
4,412,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,416,674 UART: [kat] ++
4,416,826 UART: [kat] sha1
4,420,976 UART: [kat] SHA2-256
4,422,916 UART: [kat] SHA2-384
4,425,671 UART: [kat] SHA2-512-ACC
4,427,571 UART: [kat] ECC-384
4,437,548 UART: [kat] HMAC-384Kdf
4,442,264 UART: [kat] LMS
4,690,592 UART: [kat] --
4,691,396 UART: [update-reset] ++
6,004,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,005,292 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,155,158 >>> mbox cmd response: success
6,155,158 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,155,515 UART: [update-reset] Copying MAN_2 To MAN_1
6,163,529 UART: [update-reset Success] --
6,164,402 UART: [state] Locking Datavault
6,165,250 UART: [state] Locking PCR0, PCR1 and PCR31
6,165,854 UART: [state] Locking ICCM
6,166,366 UART: [exit] Launching FMC @ 0x40000130
6,171,695 UART:
6,171,711 UART: Running Caliptra FMC ...
6,172,119 UART:
6,172,262 UART: [state] CFI Enabled
6,261,669 UART: [art] Extend RT PCRs Done
6,262,097 UART: [art] Lock RT PCRs Done
6,263,428 UART: [art] Populate DV Done
6,272,067 UART: [fht] FMC Alias Private Key: 7
6,273,201 UART: [art] Derive CDI
6,273,481 UART: [art] Store in in slot 0x4
6,359,148 UART: [art] Derive Key Pair
6,359,508 UART: [art] Store priv key in slot 0x5
6,373,160 UART: [art] Derive Key Pair - Done
6,388,491 UART: [art] Signing Cert with AUTHO
6,388,971 UART: RITY.KEYID = 7
6,404,085 UART: [art] Erasing AUTHORITY.KEYID = 7
6,404,850 UART: [art] PUB.X = F579F5AAA435B47B4D5D672E7B45C0EAEC52AE468F2F0EFF0AFD6CFCD01775C055E78087316303E05D1BB087370BB2E4
6,411,624 UART: [art] PUB.Y = D92F8B43F01EDAC58DC36620098D1BB8A94DC69F7F1BABD8A6368594489316E452ADC0CB14949BCF9BFC8155A8F26877
6,418,583 UART: [art] SIG.R = 2E248E8E6DB0E930DA206388D3F2C3E2F381631ED754D6DFF737F675E24798993E03483BD2539903DA3A80BE5C563752
6,425,345 UART: [art] SIG.S = C6FB05E7649675D18D0CD5B8E4C69E35D190D5DF1A6F7C291C0A548C28EA8B51675AD7B90252DD0F87AFD4A2B534431E
6,449,197 UART: Caliptra RT
6,449,543 UART: [state] CFI Enabled
6,729,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,760,117 UART: [rt]cmd =0x41545348, len=116
6,782,094 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 ready_for_fw is high
1,060,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,154 >>> mbox cmd response: success
2,689,750 UART:
2,689,766 UART: Running Caliptra FMC ...
2,690,174 UART:
2,690,317 UART: [state] CFI Enabled
2,701,378 UART: [fht] FMC Alias Private Key: 7
2,809,351 UART: [art] Extend RT PCRs Done
2,809,779 UART: [art] Lock RT PCRs Done
2,811,453 UART: [art] Populate DV Done
2,819,822 UART: [fht] FMC Alias Private Key: 7
2,820,924 UART: [art] Derive CDI
2,821,204 UART: [art] Store in in slot 0x4
2,906,889 UART: [art] Derive Key Pair
2,907,249 UART: [art] Store priv key in slot 0x5
2,921,037 UART: [art] Derive Key Pair - Done
2,935,932 UART: [art] Signing Cert with AUTHO
2,936,412 UART: RITY.KEYID = 7
2,951,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,465 UART: [art] PUB.X = F0312380C8FE7E82CD3FC89C29F8D305DEF0BBD4DE960E4F0FC8FDE8C92E3B1BFD7959B4B5033B49A8E35096F1865AFA
2,959,245 UART: [art] PUB.Y = 5F7F69B409BA7A3081755F545C9C42BB1D1D5DA4A3206C3302076AFD22B0B3F561A553F9F8ABCC5DCDF0F073B7A75C1B
2,966,202 UART: [art] SIG.R = A42F2B0130491FEEFA7B39259AC3C8BDA86B8F6D35A1F00883C1654FD7A4F8365873BB7671965F96301BF7156B26A3DB
2,972,972 UART: [art] SIG.S = C79FE43CABD2D117516F3230119314F1AABAAC43BB49BCC4042819A4C4C774D49983151B4433BB93FF7D7614E2E66ED6
2,996,866 UART: Caliptra RT
2,997,212 UART: [state] CFI Enabled
3,103,807 UART: [rt] RT listening for mailbox commands...
3,104,477 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,250 UART: [rt]cmd =0x41544d4e, len=14344
3,372,393 >>> mbox cmd response data (8 bytes)
3,372,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,477 UART: [rt]cmd =0x41545348, len=116
3,424,260 >>> mbox cmd response data (12 bytes)
3,424,261 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,861,816 >>> mbox cmd response: success
5,861,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,875,282 UART:
5,875,298 UART: Running Caliptra FMC ...
5,875,706 UART:
5,875,849 UART: [state] CFI Enabled
5,965,244 UART: [art] Extend RT PCRs Done
5,965,672 UART: [art] Lock RT PCRs Done
5,966,977 UART: [art] Populate DV Done
5,975,084 UART: [fht] FMC Alias Private Key: 7
5,976,166 UART: [art] Derive CDI
5,976,446 UART: [art] Store in in slot 0x4
6,061,997 UART: [art] Derive Key Pair
6,062,357 UART: [art] Store priv key in slot 0x5
6,076,249 UART: [art] Derive Key Pair - Done
6,091,305 UART: [art] Signing Cert with AUTHO
6,091,785 UART: RITY.KEYID = 7
6,106,853 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,618 UART: [art] PUB.X = 95FDF81913C26840C22660CB8FAFFFD454651DCB4EF55BFB5FD9CD19C1B4BD50C0E88BEEF7AEC26121BFB976416180F2
6,114,410 UART: [art] PUB.Y = 157568B4461F4CC7289D5CCC8C8BFDB86C8D9E83581B18C7A9968CA3A6687F20D0B708647115C6DA63C584C4963601E1
6,121,354 UART: [art] SIG.R = 03B43866F97D11AC501AF6F5A0DBE57352AD557B32C30E819C0F52514D27F806B2F00EA569DA8022CCD87F780AE5B88B
6,128,114 UART: [art] SIG.S = D11DF28E11DE7DB1A03CFF4FB58A66E11A18A0B75BD957CFB7B1A9A474788E119458FE5EF68D9B7F7279FFE46C2E1EA2
6,152,245 UART: Caliptra RT
6,152,591 UART: [state] CFI Enabled
6,434,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,009 UART: [rt]cmd =0x41545348, len=116
6,486,604 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,839 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,174,345 ready_for_fw is high
1,174,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,199,011 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,242,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,342 >>> mbox cmd response: success
2,772,461 UART: [afmc] ++
2,772,629 UART: [afmc] CDI.KEYID = 6
2,772,992 UART: [afmc] SUBJECT.KEYID = 7
2,773,418 UART: [afmc] AUTHORITY.KEYID = 5
2,808,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,262 UART: [afmc] --
2,852,348 UART: [cold-reset] --
2,853,338 UART: [state] Locking Datavault
2,854,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,263 UART: [state] Locking ICCM
2,855,847 UART: [exit] Launching FMC @ 0x40000130
2,861,176 UART:
2,861,192 UART: Running Caliptra FMC ...
2,861,600 UART:
2,861,654 UART: [state] CFI Enabled
2,871,951 UART: [fht] FMC Alias Private Key: 7
2,979,602 UART: [art] Extend RT PCRs Done
2,980,030 UART: [art] Lock RT PCRs Done
2,981,724 UART: [art] Populate DV Done
2,989,919 UART: [fht] FMC Alias Private Key: 7
2,990,973 UART: [art] Derive CDI
2,991,253 UART: [art] Store in in slot 0x4
3,076,802 UART: [art] Derive Key Pair
3,077,162 UART: [art] Store priv key in slot 0x5
3,090,548 UART: [art] Derive Key Pair - Done
3,105,491 UART: [art] Signing Cert with AUTHO
3,105,971 UART: RITY.KEYID = 7
3,120,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,702 UART: [art] PUB.X = 89A1B80A704DC62302F6D281216E36BDE22317FCB33BC5C334E89E9B6345950ED3C1A76CD3E68B20757EE2C0E13473EE
3,128,469 UART: [art] PUB.Y = A2EC08EE8D4A249668E9DE07DCD1A321ED1DCB9222BC778A1D437C8E3C1CAA5C09D3C94DADC288E6FDF3CF2A65AEF6D9
3,135,442 UART: [art] SIG.R = 7C9E364BAC3EE66D9B0332E4850BC4E7DE471D92A15C4B0415237174EBD7F213E85235630549F8888EED9372788321BC
3,142,198 UART: [art] SIG.S = 49849B2E193FE8F2DE36DAA89E25BFDFE356F36D2ACB3A7F46AE59D4BB7F2D62FAE49EAFDD743E94609D291EC8F53B64
3,166,389 UART: Caliptra RT
3,166,643 UART: [state] CFI Enabled
3,274,457 UART: [rt] RT listening for mailbox commands...
3,275,127 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,890 UART: [rt]cmd =0x41544d4e, len=14344
3,542,497 >>> mbox cmd response data (8 bytes)
3,542,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,553 UART: [rt]cmd =0x41545348, len=116
3,593,810 >>> mbox cmd response data (12 bytes)
3,593,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,755 UART:
3,594,771 UART: Running Caliptra ROM ...
3,595,179 UART:
3,595,234 UART: [state] CFI Enabled
3,597,634 UART: [state] LifecycleState = Unprovisioned
3,598,289 UART: [state] DebugLocked = No
3,598,891 UART: [state] WD Timer not started. Device not locked for debugging
3,600,185 UART: [kat] SHA2-256
4,403,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,407,864 UART: [kat] ++
4,408,016 UART: [kat] sha1
4,412,406 UART: [kat] SHA2-256
4,414,346 UART: [kat] SHA2-384
4,417,187 UART: [kat] SHA2-512-ACC
4,419,087 UART: [kat] ECC-384
4,428,902 UART: [kat] HMAC-384Kdf
4,433,392 UART: [kat] LMS
4,681,704 UART: [kat] --
4,682,668 UART: [update-reset] ++
5,994,396 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,995,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,145,223 >>> mbox cmd response: success
6,145,223 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,145,442 UART: [update-reset] Copying MAN_2 To MAN_1
6,153,456 UART: [update-reset Success] --
6,154,389 UART: [state] Locking Datavault
6,154,993 UART: [state] Locking PCR0, PCR1 and PCR31
6,155,597 UART: [state] Locking ICCM
6,156,053 UART: [exit] Launching FMC @ 0x40000130
6,161,382 UART:
6,161,398 UART: Running Caliptra FMC ...
6,161,806 UART:
6,161,860 UART: [state] CFI Enabled
6,250,873 UART: [art] Extend RT PCRs Done
6,251,301 UART: [art] Lock RT PCRs Done
6,252,626 UART: [art] Populate DV Done
6,260,669 UART: [fht] FMC Alias Private Key: 7
6,261,783 UART: [art] Derive CDI
6,262,063 UART: [art] Store in in slot 0x4
6,347,664 UART: [art] Derive Key Pair
6,348,024 UART: [art] Store priv key in slot 0x5
6,361,326 UART: [art] Derive Key Pair - Done
6,376,137 UART: [art] Signing Cert with AUTHO
6,376,617 UART: RITY.KEYID = 7
6,391,989 UART: [art] Erasing AUTHORITY.KEYID = 7
6,392,754 UART: [art] PUB.X = 6D96B7B013954DB9F1150696F6AA169248618543731077375BC8668DF83B7038D26DC665113362E12AC4FDAD554ED5EE
6,399,515 UART: [art] PUB.Y = D4442E36503A9A78526B96F96C1B4BB28DDEA1EDE544BCA6EAAD6A349E2E67DBD4F1690922343944EDFA78A336D4CD09
6,406,475 UART: [art] SIG.R = F8C3F1EDEA5A8ABA51D1D2D532D1DAED887D84504E2A84EC5F5E6A0B68171DA9021FC40EF8EABD4EC706C956903D958C
6,413,257 UART: [art] SIG.S = 3B5E0A2C450D798FF6B47BF95F66321062D8FB62519B71107130510A7239EB865F7418DF90CBDBF48B3C13A3DEDDC218
6,437,165 UART: Caliptra RT
6,437,419 UART: [state] CFI Enabled
6,721,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,753 UART: [rt]cmd =0x41545348, len=116
6,774,928 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,772 ready_for_fw is high
1,055,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,690 >>> mbox cmd response: success
2,686,462 UART:
2,686,478 UART: Running Caliptra FMC ...
2,686,886 UART:
2,686,940 UART: [state] CFI Enabled
2,697,221 UART: [fht] FMC Alias Private Key: 7
2,805,272 UART: [art] Extend RT PCRs Done
2,805,700 UART: [art] Lock RT PCRs Done
2,807,380 UART: [art] Populate DV Done
2,815,625 UART: [fht] FMC Alias Private Key: 7
2,816,641 UART: [art] Derive CDI
2,816,921 UART: [art] Store in in slot 0x4
2,902,200 UART: [art] Derive Key Pair
2,902,560 UART: [art] Store priv key in slot 0x5
2,915,332 UART: [art] Derive Key Pair - Done
2,930,329 UART: [art] Signing Cert with AUTHO
2,930,809 UART: RITY.KEYID = 7
2,945,495 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,260 UART: [art] PUB.X = B96F888155544D64BC1FBC2A6A1AAB7234E53AF15AB26C5AE7FC7415D8D5FC4E526910D158E0FC28BB5A75DFCB3FAE98
2,953,052 UART: [art] PUB.Y = 8C6BBC944993D22280D88CC360B625A242BDD5B1EE63AB179EBA81E1AAF69F22F86802EB5ABBFA67B7536711FCCFBAB9
2,960,021 UART: [art] SIG.R = 76EFC219245648E9A80D7ECFE4EBC76FE66FB93A6AA24835F0F3006D86ED48BF29D07BF14CABF245E2A99FB55C0F949B
2,966,783 UART: [art] SIG.S = EB30407688B6E6989C37ED50117DECB3963827B89765A50E075D4000A90AF53832340591AB0815CC165BFFB16ED7927E
2,990,473 UART: Caliptra RT
2,990,727 UART: [state] CFI Enabled
3,098,007 UART: [rt] RT listening for mailbox commands...
3,098,677 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,440 UART: [rt]cmd =0x41544d4e, len=14344
3,367,057 >>> mbox cmd response data (8 bytes)
3,367,058 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,141 UART: [rt]cmd =0x41545348, len=116
3,418,724 >>> mbox cmd response data (12 bytes)
3,418,725 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,851,580 >>> mbox cmd response: success
5,851,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,865,098 UART:
5,865,114 UART: Running Caliptra FMC ...
5,865,522 UART:
5,865,576 UART: [state] CFI Enabled
5,954,833 UART: [art] Extend RT PCRs Done
5,955,261 UART: [art] Lock RT PCRs Done
5,956,654 UART: [art] Populate DV Done
5,964,603 UART: [fht] FMC Alias Private Key: 7
5,965,681 UART: [art] Derive CDI
5,965,961 UART: [art] Store in in slot 0x4
6,051,830 UART: [art] Derive Key Pair
6,052,190 UART: [art] Store priv key in slot 0x5
6,065,444 UART: [art] Derive Key Pair - Done
6,080,403 UART: [art] Signing Cert with AUTHO
6,080,883 UART: RITY.KEYID = 7
6,096,319 UART: [art] Erasing AUTHORITY.KEYID = 7
6,097,084 UART: [art] PUB.X = 9EE662180C083318CE30A5B54CA5BE20A46A65AE3540300F1FA8E9A2275C390F72B87FA0BFDF12621281DC7EF5BF423D
6,103,852 UART: [art] PUB.Y = 63158BD51220F606631DBFB8C940CC80BECC688BC1B96336A7A86CC34C0A2DBC17830B8C9D2D1F43BE13F24464FF2F4F
6,110,807 UART: [art] SIG.R = A1C6613B4F663712AC62212E42E0EB97577C9568C50DE0D5CA57BE369EC32564010A910FB78C3E0DC09062829F906BD5
6,117,562 UART: [art] SIG.S = CB331DCC8631A71CF51AAE4CCA9B5506F3AF0E9D447EC159DE1016F6770B457A1EA4F8E590F77710A91F3A70AE8D4751
6,141,076 UART: Caliptra RT
6,141,330 UART: [state] CFI Enabled
6,416,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,447,315 UART: [rt]cmd =0x41545348, len=116
6,470,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,484 UART: [kat] SHA2-256
902,424 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 ready_for_fw is high
1,174,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,733 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,652 UART: [fwproc] Recv command 0x46574c44
1,282,385 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,241 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,065 >>> mbox cmd response: success
2,773,316 UART: [afmc] ++
2,773,484 UART: [afmc] CDI.KEYID = 6
2,773,847 UART: [afmc] SUBJECT.KEYID = 7
2,774,273 UART: [afmc] AUTHORITY.KEYID = 5
2,809,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,767 UART: [afmc] --
2,852,703 UART: [cold-reset] --
2,853,441 UART: [state] Locking Datavault
2,854,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,384 UART: [state] Locking ICCM
2,855,892 UART: [exit] Launching FMC @ 0x40000130
2,861,221 UART:
2,861,237 UART: Running Caliptra FMC ...
2,861,645 UART:
2,861,788 UART: [state] CFI Enabled
2,872,151 UART: [fht] FMC Alias Private Key: 7
2,980,018 UART: [art] Extend RT PCRs Done
2,980,446 UART: [art] Lock RT PCRs Done
2,982,060 UART: [art] Populate DV Done
2,990,307 UART: [fht] FMC Alias Private Key: 7
2,991,253 UART: [art] Derive CDI
2,991,533 UART: [art] Store in in slot 0x4
3,077,422 UART: [art] Derive Key Pair
3,077,782 UART: [art] Store priv key in slot 0x5
3,090,702 UART: [art] Derive Key Pair - Done
3,105,340 UART: [art] Signing Cert with AUTHO
3,105,820 UART: RITY.KEYID = 7
3,121,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,867 UART: [art] PUB.X = 0F195A6ED96A0E7784EB140F2CA93FAD56EAEB787209724598F89B6DE8BD9B00C8634CE29927E22A2B60BA40523B9C9E
3,128,613 UART: [art] PUB.Y = CA71FEEE29FD4E662D9D784E43C70C215DCDF53DB02E499EB9319C5CF0D8F6FF7E12BE7D3861B798F5A3DCC8A93FBB74
3,135,586 UART: [art] SIG.R = 2C020B24620C2E1DE17E80931C91BEB64AC2959CBC84510AFE2863908F8EE2CEC4EED8D92C2D0ADE16BC560AB02E9767
3,142,354 UART: [art] SIG.S = B8B1FB32C41B428FEA6F8812FB6A0C70BCA8FE959E817082AF98E701423113EEC759EA4B4A9FBA5960EB8F977AB2B03D
3,166,215 UART: Caliptra RT
3,166,561 UART: [state] CFI Enabled
3,274,823 UART: [rt] RT listening for mailbox commands...
3,275,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,294 UART: [rt]cmd =0x41544d4e, len=14344
3,543,153 >>> mbox cmd response data (8 bytes)
3,543,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,973 UART: [rt]cmd =0x41545348, len=116
3,594,864 >>> mbox cmd response data (12 bytes)
3,594,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,545 UART:
3,595,561 UART: Running Caliptra ROM ...
3,595,969 UART:
3,596,111 UART: [state] CFI Enabled
3,599,107 UART: [state] LifecycleState = Unprovisioned
3,599,762 UART: [state] DebugLocked = No
3,600,346 UART: [state] WD Timer not started. Device not locked for debugging
3,601,686 UART: [kat] SHA2-256
4,405,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,409,365 UART: [kat] ++
4,409,517 UART: [kat] sha1
4,413,723 UART: [kat] SHA2-256
4,415,663 UART: [kat] SHA2-384
4,418,224 UART: [kat] SHA2-512-ACC
4,420,124 UART: [kat] ECC-384
4,429,767 UART: [kat] HMAC-384Kdf
4,434,283 UART: [kat] LMS
4,682,595 UART: [kat] --
4,683,519 UART: [update-reset] ++
5,995,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,996,852 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,146,718 >>> mbox cmd response: success
6,146,718 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,146,897 UART: [update-reset] Copying MAN_2 To MAN_1
6,154,911 UART: [update-reset Success] --
6,156,118 UART: [state] Locking Datavault
6,156,946 UART: [state] Locking PCR0, PCR1 and PCR31
6,157,550 UART: [state] Locking ICCM
6,158,068 UART: [exit] Launching FMC @ 0x40000130
6,163,397 UART:
6,163,413 UART: Running Caliptra FMC ...
6,163,821 UART:
6,163,964 UART: [state] CFI Enabled
6,253,127 UART: [art] Extend RT PCRs Done
6,253,555 UART: [art] Lock RT PCRs Done
6,254,630 UART: [art] Populate DV Done
6,262,919 UART: [fht] FMC Alias Private Key: 7
6,264,091 UART: [art] Derive CDI
6,264,371 UART: [art] Store in in slot 0x4
6,349,598 UART: [art] Derive Key Pair
6,349,958 UART: [art] Store priv key in slot 0x5
6,363,002 UART: [art] Derive Key Pair - Done
6,377,863 UART: [art] Signing Cert with AUTHO
6,378,343 UART: RITY.KEYID = 7
6,393,879 UART: [art] Erasing AUTHORITY.KEYID = 7
6,394,644 UART: [art] PUB.X = 78CC7F0EC870347DDCEA948880306B8052780FEA78D9A467D341524A04C283755D0B487EB1441ACE5AC538442F151D47
6,401,400 UART: [art] PUB.Y = EA747AA6D540893F50E5A15AA17C258A49D7D9B56E5AC4636C40DB15D025DD4B760CFEBBE2E13514AEA11ECD0F901641
6,408,360 UART: [art] SIG.R = 0FA83CFC413DDB3DA012EC56147FAB08BC078E3C0BA584D304E13468954DE6D86211667CFE4B38BAE1F13D45E8412831
6,415,125 UART: [art] SIG.S = E0D22675C1FFF7350023AA4D4134576F9EA1432762D031C6F54567E8E33A80ED7B90D7EA06A9A6D2E40C90505D36D1C7
6,439,074 UART: Caliptra RT
6,439,420 UART: [state] CFI Enabled
6,716,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,747,828 UART: [rt]cmd =0x41545348, len=116
6,770,375 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,487 ready_for_fw is high
1,056,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,995 >>> mbox cmd response: success
2,684,601 UART:
2,684,617 UART: Running Caliptra FMC ...
2,685,025 UART:
2,685,168 UART: [state] CFI Enabled
2,695,673 UART: [fht] FMC Alias Private Key: 7
2,803,524 UART: [art] Extend RT PCRs Done
2,803,952 UART: [art] Lock RT PCRs Done
2,805,500 UART: [art] Populate DV Done
2,813,781 UART: [fht] FMC Alias Private Key: 7
2,814,747 UART: [art] Derive CDI
2,815,027 UART: [art] Store in in slot 0x4
2,900,316 UART: [art] Derive Key Pair
2,900,676 UART: [art] Store priv key in slot 0x5
2,913,612 UART: [art] Derive Key Pair - Done
2,928,563 UART: [art] Signing Cert with AUTHO
2,929,043 UART: RITY.KEYID = 7
2,944,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,130 UART: [art] PUB.X = 64DF58584AB616B95FB4C73C5A370480F502D0324E06DF316A96812365DDFC2C9F7C48397D6F043771494CA4E59157AE
2,951,886 UART: [art] PUB.Y = F12FA25B7B14BC90DC728CC2485D5C432133993FDC9E38D0F3F914D0500DDA3FE2BB0C5CFB00CEE8664B3A5A6DDCA247
2,958,830 UART: [art] SIG.R = CEF02D28D2611A1AA31039C37F745337A9E76D160B1551BC4E60A287C350C15E7B4B985D1395F17D3306B614D47798C4
2,965,590 UART: [art] SIG.S = 1682B038FC6E73D29DC6F92C96B22B41CE3F7F715704A22D0843765D9FC42DBE9F767D6F698AA6005BF04E0CB71DA2F4
2,989,016 UART: Caliptra RT
2,989,362 UART: [state] CFI Enabled
3,097,016 UART: [rt] RT listening for mailbox commands...
3,097,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,651 UART: [rt]cmd =0x41544d4e, len=14344
3,365,278 >>> mbox cmd response data (8 bytes)
3,365,279 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,432 UART: [rt]cmd =0x41545348, len=116
3,417,777 >>> mbox cmd response data (12 bytes)
3,417,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,850,512 >>> mbox cmd response: success
5,850,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,863,734 UART:
5,863,750 UART: Running Caliptra FMC ...
5,864,158 UART:
5,864,301 UART: [state] CFI Enabled
5,953,514 UART: [art] Extend RT PCRs Done
5,953,942 UART: [art] Lock RT PCRs Done
5,955,283 UART: [art] Populate DV Done
5,963,578 UART: [fht] FMC Alias Private Key: 7
5,964,522 UART: [art] Derive CDI
5,964,802 UART: [art] Store in in slot 0x4
6,050,235 UART: [art] Derive Key Pair
6,050,595 UART: [art] Store priv key in slot 0x5
6,063,891 UART: [art] Derive Key Pair - Done
6,078,690 UART: [art] Signing Cert with AUTHO
6,079,170 UART: RITY.KEYID = 7
6,094,554 UART: [art] Erasing AUTHORITY.KEYID = 7
6,095,319 UART: [art] PUB.X = FE6CE0B69F7001D2602D922FC4B533CDDD1C614ECB1FCCD73FD07C5302B4B385E1CC11980E8AA69F9C7FD7FD57873BEC
6,102,104 UART: [art] PUB.Y = FA4DABD47B4B57107E3ABBC6E212DCD38E3A69926D0B8E132B6CC2E0F9457A879A73D8B96DE711C507FB4C26234D3843
6,109,062 UART: [art] SIG.R = 8B9421561D8FFC09EFD51BB0594D8AFC927BC24CD8830E9F9E42E4BB7F4ADB055074A2E1DC69C2513855B1B0D35E6B56
6,115,837 UART: [art] SIG.S = 62F2816E10AF0F1C5E27FDC7DAE7527071A281A3AB20818704A5D0270A04E05B3D81C9D3BF9E1BF8A44C6C6A61FDEF7B
6,139,958 UART: Caliptra RT
6,140,304 UART: [state] CFI Enabled
6,421,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,452,716 UART: [rt]cmd =0x41545348, len=116
6,474,535 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,489 UART:
192,846 UART: Running Caliptra ROM ...
193,996 UART:
194,137 UART: [state] CFI Enabled
267,234 UART: [state] LifecycleState = Unprovisioned
269,148 UART: [state] DebugLocked = No
270,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,172 UART: [kat] SHA2-256
444,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,420 UART: [kat] ++
455,890 UART: [kat] sha1
465,707 UART: [kat] SHA2-256
468,406 UART: [kat] SHA2-384
473,617 UART: [kat] SHA2-512-ACC
475,986 UART: [kat] ECC-384
2,767,249 UART: [kat] HMAC-384Kdf
2,782,166 UART: [kat] LMS
3,972,484 UART: [kat] --
3,976,637 UART: [cold-reset] ++
3,979,279 UART: [fht] Storing FHT @ 0x50003400
3,990,529 UART: [idev] ++
3,991,097 UART: [idev] CDI.KEYID = 6
3,992,076 UART: [idev] SUBJECT.KEYID = 7
3,993,320 UART: [idev] UDS.KEYID = 0
3,994,319 ready_for_fw is high
3,994,538 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,909 UART: [idev] Erasing UDS.KEYID = 0
7,327,978 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,306 UART: [idev] --
7,352,736 UART: [ldev] ++
7,353,307 UART: [ldev] CDI.KEYID = 6
7,354,260 UART: [ldev] SUBJECT.KEYID = 5
7,355,464 UART: [ldev] AUTHORITY.KEYID = 7
7,356,741 UART: [ldev] FE.KEYID = 1
7,402,860 UART: [ldev] Erasing FE.KEYID = 1
10,735,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,133 UART: [ldev] --
13,095,692 UART: [fwproc] Waiting for Commands...
13,098,379 UART: [fwproc] Received command 0x46574c44
13,100,556 UART: [fwproc] Received Image of size 114036 bytes
17,150,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,025 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,611,481 >>> mbox cmd response: success
17,615,449 UART: [afmc] ++
17,616,043 UART: [afmc] CDI.KEYID = 6
17,616,925 UART: [afmc] SUBJECT.KEYID = 7
17,618,188 UART: [afmc] AUTHORITY.KEYID = 5
20,988,811 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,831 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,285,089 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,299,511 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,314,354 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,813 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,369 UART: [afmc] --
23,354,680 UART: [cold-reset] --
23,358,434 UART: [state] Locking Datavault
23,365,351 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,101 UART: [state] Locking ICCM
23,368,537 UART: [exit] Launching FMC @ 0x40000130
23,376,927 UART:
23,377,156 UART: Running Caliptra FMC ...
23,378,248 UART:
23,378,399 UART: [state] CFI Enabled
23,442,720 UART: [fht] FMC Alias Private Key: 7
25,780,592 UART: [art] Extend RT PCRs Done
25,781,812 UART: [art] Lock RT PCRs Done
25,783,188 UART: [art] Populate DV Done
25,788,669 UART: [fht] FMC Alias Private Key: 7
25,790,206 UART: [art] Derive CDI
25,790,961 UART: [art] Store in in slot 0x4
25,851,022 UART: [art] Derive Key Pair
25,852,062 UART: [art] Store priv key in slot 0x5
29,145,351 UART: [art] Derive Key Pair - Done
29,158,789 UART: [art] Signing Cert with AUTHO
29,160,097 UART: RITY.KEYID = 7
31,446,418 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,926 UART: [art] PUB.X = 030909D4FF379FDCA1B3CA2AEFE344BCFB6F0EA3BF177F595DC5604E3FEB57FCB1069DBC68FF11499DFBADFC25049644
31,455,194 UART: [art] PUB.Y = DF165F91FA6CA6D2FCA4C59E96F7AB6B39CD949FB4386CF4C5AA606F99EB10799057FC3FCBC4CD1691968BE057412CE4
31,462,453 UART: [art] SIG.R = 6684853DF55A1A84291178AA58AB0735FCEDB14D463931480825F077DDE11CBF20C5884058301EDB18D063B29AE39388
31,469,814 UART: [art] SIG.S = 2043F40AAC84A9838EE67BECB4003492AEAF8EFABFE350C304100EF25081937C5491BBEC0F7BC61BD3FC1CBCDD00FF38
32,775,169 UART: Caliptra RT
32,775,883 UART: [state] CFI Enabled
32,935,490 UART: [rt] RT listening for mailbox commands...
32,937,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,093,555 UART: [rt]cmd =0x41544d4e, len=14344
38,328,685 >>> mbox cmd response data (8 bytes)
38,329,267 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,359,886 UART: [rt]cmd =0x41545348, len=116
38,362,140 >>> mbox cmd response data (12 bytes)
40,421,152 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,566,358 UART:
40,566,741 UART: Running Caliptra ROM ...
40,567,880 UART:
40,568,051 UART: [state] CFI Enabled
40,637,404 UART: [state] LifecycleState = Unprovisioned
40,639,460 UART: [state] DebugLocked = No
40,641,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,645,458 UART: [kat] SHA2-256
40,815,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,825,628 UART: [kat] ++
40,826,116 UART: [kat] sha1
40,837,264 UART: [kat] SHA2-256
40,839,950 UART: [kat] SHA2-384
40,845,077 UART: [kat] SHA2-512-ACC
40,847,424 UART: [kat] ECC-384
43,142,692 UART: [kat] HMAC-384Kdf
43,175,604 UART: [kat] LMS
44,365,950 UART: [kat] --
44,370,106 UART: [update-reset] ++
48,511,719 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,515,463 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,897,394 >>> mbox cmd response: success
48,902,034 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,902,641 UART: [update-reset] Copying MAN_2 To MAN_1
48,921,682 UART: [update-reset Success] --
48,924,896 UART: [state] Locking Datavault
48,928,148 UART: [state] Locking PCR0, PCR1 and PCR31
48,929,842 UART: [state] Locking ICCM
48,932,628 UART: [exit] Launching FMC @ 0x40000130
48,941,073 UART:
48,941,304 UART: Running Caliptra FMC ...
48,942,841 UART:
48,943,026 UART: [state] CFI Enabled
49,034,340 UART: [art] Extend RT PCRs Done
49,035,530 UART: [art] Lock RT PCRs Done
49,036,773 UART: [art] Populate DV Done
49,042,235 UART: [fht] FMC Alias Private Key: 7
49,043,836 UART: [art] Derive CDI
49,044,649 UART: [art] Store in in slot 0x4
49,103,233 UART: [art] Derive Key Pair
49,104,281 UART: [art] Store priv key in slot 0x5
52,397,530 UART: [art] Derive Key Pair - Done
52,410,366 UART: [art] Signing Cert with AUTHO
52,411,664 UART: RITY.KEYID = 7
54,698,614 UART: [art] Erasing AUTHORITY.KEYID = 7
54,700,124 UART: [art] PUB.X = 2468B55E655FFBB765F41B9A3661622181019D7678C4C915C0EDEF08127F075D2286BE20C1EBF08BEAAA402D5BF9830F
54,707,430 UART: [art] PUB.Y = E89CD75796C130F64B4F61987E648B11B5BD4ABFA637CB69B2C1184391C4ADABE7743606D9587CE5EB7139023F56C17D
54,714,615 UART: [art] SIG.R = D6FB35E3C8CC95443A8FD0B609F12AD5F03B49556D417271DDF50CE299BE7E42A982CC01100BD783E4F97E66DED7A152
54,722,021 UART: [art] SIG.S = D5492E784C122E205BAB7987817AE4771D3B814D24D94F963461CDF252CE020F510E4651F5ACCEE2E50C2D00745AB3FE
56,027,502 UART: Caliptra RT
56,028,222 UART: [state] CFI Enabled
56,357,814 UART: [rt] RT listening for mailbox commands...
56,389,875 UART: [rt]cmd =0x41545348, len=116
56,392,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,783,507 ready_for_fw is high
3,784,056 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,852,420 >>> mbox cmd response: success
23,547,351 UART:
23,547,743 UART: Running Caliptra FMC ...
23,548,850 UART:
23,548,996 UART: [state] CFI Enabled
23,614,661 UART: [fht] FMC Alias Private Key: 7
25,952,791 UART: [art] Extend RT PCRs Done
25,954,016 UART: [art] Lock RT PCRs Done
25,955,895 UART: [art] Populate DV Done
25,961,466 UART: [fht] FMC Alias Private Key: 7
25,963,113 UART: [art] Derive CDI
25,963,841 UART: [art] Store in in slot 0x4
26,022,942 UART: [art] Derive Key Pair
26,023,987 UART: [art] Store priv key in slot 0x5
29,316,937 UART: [art] Derive Key Pair - Done
29,329,939 UART: [art] Signing Cert with AUTHO
29,331,239 UART: RITY.KEYID = 7
31,618,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,502 UART: [art] PUB.X = 0562BDCB5535615E39211E2D74DE15F5654F244410E54773D30FD66BF5486546B845FA009B36ACC44974A01B1D66B6F8
31,627,739 UART: [art] PUB.Y = B6CC74C9B9697FBC7C2EC8489F424E37008FCF847B1A2F5D3B328DCFE5BA722874858E3203106BA2861CBFDD7ECB58C6
31,634,979 UART: [art] SIG.R = C2B0F8D5EDB2E48C207FC486DF9BD471AA5F4ACDE046C4C73AF39FFFCC96C9E3FD1E806F0DF89F3B75C8E52D4BB4A8DA
31,642,392 UART: [art] SIG.S = D10FD5A3BCBB8E0FC8DB55AC4EF14901098B2CFCFCD8A7DAC56D59E0D7B6F6CDA916412283B3BFDB616A0EA7658A25B1
32,947,845 UART: Caliptra RT
32,948,536 UART: [state] CFI Enabled
33,109,689 UART: [rt] RT listening for mailbox commands...
33,112,117 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,267,437 UART: [rt]cmd =0x41544d4e, len=14344
38,503,468 >>> mbox cmd response data (8 bytes)
38,504,033 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,534,923 UART: [rt]cmd =0x41545348, len=116
38,537,283 >>> mbox cmd response data (12 bytes)
40,598,015 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,320,095 >>> mbox cmd response: success
49,320,865 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,354,048 UART:
49,354,341 UART: Running Caliptra FMC ...
49,355,374 UART:
49,355,514 UART: [state] CFI Enabled
49,442,160 UART: [art] Extend RT PCRs Done
49,443,348 UART: [art] Lock RT PCRs Done
49,444,825 UART: [art] Populate DV Done
49,450,224 UART: [fht] FMC Alias Private Key: 7
49,451,923 UART: [art] Derive CDI
49,452,858 UART: [art] Store in in slot 0x4
49,511,265 UART: [art] Derive Key Pair
49,512,269 UART: [art] Store priv key in slot 0x5
52,804,820 UART: [art] Derive Key Pair - Done
52,817,812 UART: [art] Signing Cert with AUTHO
52,819,141 UART: RITY.KEYID = 7
55,107,353 UART: [art] Erasing AUTHORITY.KEYID = 7
55,108,858 UART: [art] PUB.X = E1B3B23A4B7DA60CD4B0751D08E31ED86A7FBF36D0E2023114D1C6A05744352D4851A43E4181415A2D8656AB4AEEA146
55,116,096 UART: [art] PUB.Y = 8D2D63E15258DE3B7E9B5AECA9AD9D6A11DF22C89C9BB504AADBF249B6B167C6BD3898D61DA86986C6DCD9ECFE445D7D
55,123,422 UART: [art] SIG.R = D7F3147A4BB8184B84081DCE2253629CBE4A195C5F00230E7F12AC2D938AB09D115C7091554FC7656FF3B9562CCD6BD6
55,130,740 UART: [art] SIG.S = 517B81A3861B3E536E9708DF2448B7A225D569A0EB5C41A2DBAFBC42E67FDBEE0399F2E1E7D0936D90C5DF68931D6F34
56,435,918 UART: Caliptra RT
56,436,636 UART: [state] CFI Enabled
56,773,292 UART: [rt] RT listening for mailbox commands...
56,805,039 UART: [rt]cmd =0x41545348, len=116
56,807,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,501 UART:
192,853 UART: Running Caliptra ROM ...
193,965 UART:
603,776 UART: [state] CFI Enabled
618,502 UART: [state] LifecycleState = Unprovisioned
620,448 UART: [state] DebugLocked = No
622,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,381 UART: [kat] SHA2-256
797,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,652 UART: [kat] ++
808,097 UART: [kat] sha1
819,399 UART: [kat] SHA2-256
822,073 UART: [kat] SHA2-384
827,399 UART: [kat] SHA2-512-ACC
829,774 UART: [kat] ECC-384
3,113,959 UART: [kat] HMAC-384Kdf
3,126,609 UART: [kat] LMS
4,316,729 UART: [kat] --
4,321,538 UART: [cold-reset] ++
4,322,758 UART: [fht] Storing FHT @ 0x50003400
4,335,870 UART: [idev] ++
4,336,429 UART: [idev] CDI.KEYID = 6
4,337,313 UART: [idev] SUBJECT.KEYID = 7
4,338,630 UART: [idev] UDS.KEYID = 0
4,339,573 ready_for_fw is high
4,339,786 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,087 UART: [idev] Erasing UDS.KEYID = 0
7,627,696 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,446 UART: [idev] --
7,653,975 UART: [ldev] ++
7,654,543 UART: [ldev] CDI.KEYID = 6
7,655,526 UART: [ldev] SUBJECT.KEYID = 5
7,656,742 UART: [ldev] AUTHORITY.KEYID = 7
7,657,972 UART: [ldev] FE.KEYID = 1
7,666,780 UART: [ldev] Erasing FE.KEYID = 1
10,959,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,717 UART: [ldev] --
13,322,717 UART: [fwproc] Waiting for Commands...
13,324,655 UART: [fwproc] Received command 0x46574c44
13,326,835 UART: [fwproc] Received Image of size 114036 bytes
17,376,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,684 >>> mbox cmd response: success
17,838,820 UART: [afmc] ++
17,839,422 UART: [afmc] CDI.KEYID = 6
17,840,335 UART: [afmc] SUBJECT.KEYID = 7
17,841,554 UART: [afmc] AUTHORITY.KEYID = 5
21,159,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,478 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,890 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,662 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,143 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,384 UART: [afmc] --
23,523,198 UART: [cold-reset] --
23,527,492 UART: [state] Locking Datavault
23,533,006 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,710 UART: [state] Locking ICCM
23,537,475 UART: [exit] Launching FMC @ 0x40000130
23,545,889 UART:
23,546,166 UART: Running Caliptra FMC ...
23,547,277 UART:
23,547,440 UART: [state] CFI Enabled
23,555,173 UART: [fht] FMC Alias Private Key: 7
25,885,897 UART: [art] Extend RT PCRs Done
25,887,111 UART: [art] Lock RT PCRs Done
25,888,772 UART: [art] Populate DV Done
25,894,184 UART: [fht] FMC Alias Private Key: 7
25,895,829 UART: [art] Derive CDI
25,896,563 UART: [art] Store in in slot 0x4
25,938,941 UART: [art] Derive Key Pair
25,939,939 UART: [art] Store priv key in slot 0x5
29,182,150 UART: [art] Derive Key Pair - Done
29,195,413 UART: [art] Signing Cert with AUTHO
29,196,735 UART: RITY.KEYID = 7
31,475,862 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,367 UART: [art] PUB.X = 431EB7FAEF57AF5134E852EF2DCA4946750B01D8BC7081B0DF85A1C9DB3C4723C7F6DC63CA00A8168AC052EEEDA348A6
31,484,628 UART: [art] PUB.Y = 251A875C64DCD33969539E17B2CD6327348D8882DB4DFB914D9D1D1EDA70A50C774E1F67B109DDA8084D1EABA9879FE2
31,491,871 UART: [art] SIG.R = EECCB56836144119CB64D06261228ED81DC3E6DA9947A1CDD74B5BC105749AE102F380DCCE438047AC72C909F0931EDA
31,499,270 UART: [art] SIG.S = E58B87E88D569CF0B0CA65BAB5681622E80328D5E91B417EED41D39676E5CD6C7C0D84AAA0B7712E5C2265D5D40EA278
32,805,034 UART: Caliptra RT
32,805,749 UART: [state] CFI Enabled
32,922,929 UART: [rt] RT listening for mailbox commands...
32,925,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,080,893 UART: [rt]cmd =0x41544d4e, len=14344
38,316,692 >>> mbox cmd response data (8 bytes)
38,317,282 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,347,896 UART: [rt]cmd =0x41545348, len=116
38,350,247 >>> mbox cmd response data (12 bytes)
40,404,828 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,551,093 UART:
40,551,482 UART: Running Caliptra ROM ...
40,552,566 UART:
40,552,728 UART: [state] CFI Enabled
40,569,595 UART: [state] LifecycleState = Unprovisioned
40,571,543 UART: [state] DebugLocked = No
40,573,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,577,884 UART: [kat] SHA2-256
40,747,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,758,164 UART: [kat] ++
40,758,706 UART: [kat] sha1
40,768,915 UART: [kat] SHA2-256
40,771,614 UART: [kat] SHA2-384
40,777,168 UART: [kat] SHA2-512-ACC
40,779,569 UART: [kat] ECC-384
43,062,455 UART: [kat] HMAC-384Kdf
43,074,416 UART: [kat] LMS
44,264,463 UART: [kat] --
44,268,844 UART: [update-reset] ++
48,413,517 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,416,649 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,798,642 >>> mbox cmd response: success
48,802,507 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,803,132 UART: [update-reset] Copying MAN_2 To MAN_1
48,821,580 UART: [update-reset Success] --
48,825,929 UART: [state] Locking Datavault
48,828,121 UART: [state] Locking PCR0, PCR1 and PCR31
48,829,826 UART: [state] Locking ICCM
48,832,253 UART: [exit] Launching FMC @ 0x40000130
48,840,697 UART:
48,840,932 UART: Running Caliptra FMC ...
48,842,026 UART:
48,842,206 UART: [state] CFI Enabled
48,886,376 UART: [art] Extend RT PCRs Done
48,887,518 UART: [art] Lock RT PCRs Done
48,888,910 UART: [art] Populate DV Done
48,894,271 UART: [fht] FMC Alias Private Key: 7
48,895,807 UART: [art] Derive CDI
48,896,618 UART: [art] Store in in slot 0x4
48,938,959 UART: [art] Derive Key Pair
48,940,010 UART: [art] Store priv key in slot 0x5
52,182,141 UART: [art] Derive Key Pair - Done
52,194,975 UART: [art] Signing Cert with AUTHO
52,196,280 UART: RITY.KEYID = 7
54,475,723 UART: [art] Erasing AUTHORITY.KEYID = 7
54,477,232 UART: [art] PUB.X = 0409FB39A124EA23944EFA2C598ECE4D7BBE11DFAF64BC703C314E64D21C1232B2A100C96C5BC790EBEA1E7C13DC11F0
54,484,484 UART: [art] PUB.Y = FBD117D98FFB8F07F508EEDBB399F7A6742123C17FA55A2675CF08E03626104999C6C5A8426E02506C2E981EFF20557A
54,491,729 UART: [art] SIG.R = E87BB533EDCA82E1138B3FA59C0C6C21ACE0428855F840CBC5BDFBB2FD81499E5B0D1D9BF658436FBAF0C05A3C45271C
54,499,122 UART: [art] SIG.S = 8D6023EB45BA0717B292BFA26FDC53F6ACEB292B0AD01A93D8D2800C4D276D5EB2C93198AC06E7EC5031AF15BAB5EF53
55,804,326 UART: Caliptra RT
55,805,032 UART: [state] CFI Enabled
56,090,147 UART: [rt] RT listening for mailbox commands...
56,122,050 UART: [rt]cmd =0x41545348, len=116
56,124,488 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
4,126,454 ready_for_fw is high
4,126,907 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,065,107 >>> mbox cmd response: success
23,704,122 UART:
23,704,499 UART: Running Caliptra FMC ...
23,705,688 UART:
23,705,854 UART: [state] CFI Enabled
23,713,645 UART: [fht] FMC Alias Private Key: 7
26,044,796 UART: [art] Extend RT PCRs Done
26,046,030 UART: [art] Lock RT PCRs Done
26,047,613 UART: [art] Populate DV Done
26,053,196 UART: [fht] FMC Alias Private Key: 7
26,054,690 UART: [art] Derive CDI
26,055,458 UART: [art] Store in in slot 0x4
26,098,337 UART: [art] Derive Key Pair
26,099,385 UART: [art] Store priv key in slot 0x5
29,340,774 UART: [art] Derive Key Pair - Done
29,353,719 UART: [art] Signing Cert with AUTHO
29,355,023 UART: RITY.KEYID = 7
31,635,006 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,507 UART: [art] PUB.X = BD2F355BE7891BAD42A9244E685F3101838F21EDAA62335E754C992DE77E86D6FE4192C5B63D915FACC7878BCC3E248F
31,643,779 UART: [art] PUB.Y = AB3446FF4F079AE270E7BA449E08F0243E576B1A45526CEAEE8136F7EB0018D617CCED38A9663518E5D2932CBBBB1445
31,651,014 UART: [art] SIG.R = DDA6B79C5B7F6A8839664BFB99598546B1F725E1FD98DEDCE81665CA26657E33FCAE4E48EE1E65A473C5AA93899FF256
31,658,400 UART: [art] SIG.S = 3457A9232B297ECEA62CE903A0295924B0A52115D5755F5E4283F49D2B22ECEBC90C0F1B8EF123FE712DA5D4A4080130
32,963,262 UART: Caliptra RT
32,963,959 UART: [state] CFI Enabled
33,081,635 UART: [rt] RT listening for mailbox commands...
33,084,053 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,239,169 UART: [rt]cmd =0x41544d4e, len=14344
38,475,159 >>> mbox cmd response data (8 bytes)
38,475,730 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,506,407 UART: [rt]cmd =0x41545348, len=116
38,508,596 >>> mbox cmd response data (12 bytes)
40,561,175 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,212,683 >>> mbox cmd response: success
49,213,299 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,246,208 UART:
49,246,534 UART: Running Caliptra FMC ...
49,247,657 UART:
49,247,817 UART: [state] CFI Enabled
49,291,712 UART: [art] Extend RT PCRs Done
49,292,866 UART: [art] Lock RT PCRs Done
49,294,422 UART: [art] Populate DV Done
49,299,823 UART: [fht] FMC Alias Private Key: 7
49,301,341 UART: [art] Derive CDI
49,302,110 UART: [art] Store in in slot 0x4
49,344,921 UART: [art] Derive Key Pair
49,345,916 UART: [art] Store priv key in slot 0x5
52,588,066 UART: [art] Derive Key Pair - Done
52,601,288 UART: [art] Signing Cert with AUTHO
52,602,621 UART: RITY.KEYID = 7
54,881,668 UART: [art] Erasing AUTHORITY.KEYID = 7
54,883,176 UART: [art] PUB.X = 3FFFF7B7F5A289CA655E833A3933D67E9914A2FC65A9740564F31D3F6A0A36E8864353DD26E999ACC4109AE9B26CA034
54,890,443 UART: [art] PUB.Y = 0CEBB1EF98D7B27C0C4FF2A88B5502E5EE772CA022017D2F55F2A7431FAD7AB301FF0D36EEF696854F4A3420EDFD9246
54,897,681 UART: [art] SIG.R = 84FB2993985332D793F2BA32F788A6C39593E092300441D73181A7412C6C481B82A8DA13B3996D6FC0EFF7932E6C1480
54,905,057 UART: [art] SIG.S = 77F9F28FE0F527A2497B46AEB74DC61BCE97504F5EFF49A2E4D30DFFE89D1677BC2937785E74ADFC20C6C31E7AE901E1
56,210,281 UART: Caliptra RT
56,210,997 UART: [state] CFI Enabled
56,499,373 UART: [rt] RT listening for mailbox commands...
56,531,116 UART: [rt]cmd =0x41545348, len=116
56,533,352 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
192,630 UART:
192,998 UART: Running Caliptra ROM ...
194,220 UART:
194,376 UART: [state] CFI Enabled
265,293 UART: [state] LifecycleState = Unprovisioned
267,212 UART: [state] DebugLocked = No
270,050 UART: [state] WD Timer not started. Device not locked for debugging
274,310 UART: [kat] SHA2-256
453,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,059 UART: [kat] ++
465,514 UART: [kat] sha1
477,164 UART: [kat] SHA2-256
480,240 UART: [kat] SHA2-384
486,376 UART: [kat] SHA2-512-ACC
489,320 UART: [kat] ECC-384
2,947,384 UART: [kat] HMAC-384Kdf
2,970,523 UART: [kat] LMS
3,499,953 UART: [kat] --
3,503,748 UART: [cold-reset] ++
3,505,610 UART: [fht] FHT @ 0x50003400
3,517,153 UART: [idev] ++
3,517,716 UART: [idev] CDI.KEYID = 6
3,518,647 UART: [idev] SUBJECT.KEYID = 7
3,519,826 UART: [idev] UDS.KEYID = 0
3,520,727 ready_for_fw is high
3,520,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,954 UART: [idev] Erasing UDS.KEYID = 0
6,024,081 UART: [idev] Sha1 KeyId Algorithm
6,047,287 UART: [idev] --
6,052,852 UART: [ldev] ++
6,053,427 UART: [ldev] CDI.KEYID = 6
6,054,313 UART: [ldev] SUBJECT.KEYID = 5
6,055,524 UART: [ldev] AUTHORITY.KEYID = 7
6,056,762 UART: [ldev] FE.KEYID = 1
6,098,498 UART: [ldev] Erasing FE.KEYID = 1
8,601,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,565 UART: [ldev] --
10,411,404 UART: [fwproc] Wait for Commands...
10,413,174 UART: [fwproc] Recv command 0x46574c44
10,415,271 UART: [fwproc] Recv'd Img size: 114360 bytes
13,811,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,272,654 >>> mbox cmd response: success
14,276,776 UART: [afmc] ++
14,277,368 UART: [afmc] CDI.KEYID = 6
14,278,251 UART: [afmc] SUBJECT.KEYID = 7
14,279,472 UART: [afmc] AUTHORITY.KEYID = 5
16,805,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,139 UART: [afmc] --
18,604,465 UART: [cold-reset] --
18,606,823 UART: [state] Locking Datavault
18,612,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,613,882 UART: [state] Locking ICCM
18,616,194 UART: [exit] Launching FMC @ 0x40000130
18,624,615 UART:
18,624,878 UART: Running Caliptra FMC ...
18,625,910 UART:
18,626,056 UART: [state] CFI Enabled
18,685,598 UART: [fht] FMC Alias Private Key: 7
20,449,696 UART: [art] Extend RT PCRs Done
20,450,931 UART: [art] Lock RT PCRs Done
20,452,310 UART: [art] Populate DV Done
20,457,721 UART: [fht] FMC Alias Private Key: 7
20,459,456 UART: [art] Derive CDI
20,460,198 UART: [art] Store in in slot 0x4
20,517,832 UART: [art] Derive Key Pair
20,518,832 UART: [art] Store priv key in slot 0x5
22,981,309 UART: [art] Derive Key Pair - Done
22,994,094 UART: [art] Signing Cert with AUTHO
22,995,412 UART: RITY.KEYID = 7
24,706,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,187 UART: [art] PUB.X = F8EB7C5490A21902CEF9B73CAB4B35290B265E99D6C33BD9441468C450F563BFF040FFEF5553EB9BC7407C5CD6513D14
24,715,414 UART: [art] PUB.Y = D536F3247AF331662528A7BA4F85D0E85E62B3BBBB45D0059DB60331990F21E46AD627980B8EFE3EBED5C686488FD2CD
24,722,669 UART: [art] SIG.R = 2ADE1F7F0FF8A1271E0E41A02A447EE4A41EC6EA5CB36928898071A078812DCD8EE5BE2FB9DBD595723B39DDFBFA339C
24,730,100 UART: [art] SIG.S = 06760DA8F49F8F11B2EA9C949C6CD12B5DF304C437899CE53F31217D1E1128C141A49D8A08EA25F38CBE419E8334BB01
25,708,862 UART: Caliptra RT
25,709,596 UART: [state] CFI Enabled
25,873,202 UART: [rt] RT listening for mailbox commands...
25,875,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,030,808 UART: [rt]cmd =0x41544d4e, len=14344
29,960,888 >>> mbox cmd response data (8 bytes)
29,961,484 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,992,061 UART: [rt]cmd =0x41545348, len=116
29,994,353 >>> mbox cmd response data (12 bytes)
32,048,008 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,193,441 UART:
32,193,818 UART: Running Caliptra ROM ...
32,194,879 UART:
32,195,051 UART: [state] CFI Enabled
32,251,630 UART: [state] LifecycleState = Unprovisioned
32,253,513 UART: [state] DebugLocked = No
32,255,088 UART: [state] WD Timer not started. Device not locked for debugging
32,259,711 UART: [kat] SHA2-256
32,438,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,450,415 UART: [kat] ++
32,450,954 UART: [kat] sha1
32,462,117 UART: [kat] SHA2-256
32,465,177 UART: [kat] SHA2-384
32,471,495 UART: [kat] SHA2-512-ACC
32,474,455 UART: [kat] ECC-384
34,938,106 UART: [kat] HMAC-384Kdf
34,959,922 UART: [kat] LMS
35,489,405 UART: [kat] --
35,494,792 UART: [update-reset] ++
38,918,151 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,921,917 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,304,947 >>> mbox cmd response: success
39,305,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,305,837 UART: [update-reset] Copying MAN_2 To MAN_1
39,327,521 UART: [update-reset Success] --
39,331,601 UART: [state] Locking Datavault
39,336,205 UART: [state] Locking PCR0, PCR1 and PCR31
39,337,851 UART: [state] Locking ICCM
39,338,967 UART: [exit] Launching FMC @ 0x40000130
39,347,329 UART:
39,347,575 UART: Running Caliptra FMC ...
39,348,601 UART:
39,348,746 UART: [state] CFI Enabled
39,450,714 UART: [art] Extend RT PCRs Done
39,451,904 UART: [art] Lock RT PCRs Done
39,453,437 UART: [art] Populate DV Done
39,459,008 UART: [fht] FMC Alias Private Key: 7
39,460,549 UART: [art] Derive CDI
39,461,368 UART: [art] Store in in slot 0x4
39,520,328 UART: [art] Derive Key Pair
39,521,420 UART: [art] Store priv key in slot 0x5
41,983,824 UART: [art] Derive Key Pair - Done
41,997,096 UART: [art] Signing Cert with AUTHO
41,998,414 UART: RITY.KEYID = 7
43,710,009 UART: [art] Erasing AUTHORITY.KEYID = 7
43,711,509 UART: [art] PUB.X = FBAA3BD9CCA7D6E40552F67311FB318D43CEAFE44DCCF37FB88AA0A9C3BCE9C321F724C4C89910A5706DDEDF81803947
43,718,805 UART: [art] PUB.Y = A8DDAF8031B63692125313D21924592442793F5480F48AA0ACDC45FFABB5410086DE3ECB4CE7AE87F410C1210B2B35DC
43,726,022 UART: [art] SIG.R = FE096CDD83B36DE58C1502E3AD108DCB7CBCBC1D57D7040D44CEA7CB6BFDF5007662511E7CC9CE6E693F84AE29D6D6E0
43,733,470 UART: [art] SIG.S = B7CCDDEB345B504891F6B58544FEE948EDB252F98A02F736A74D9396DC64DDEC0E09065F53BE8BBEB67B4B68132AD12D
44,712,276 UART: Caliptra RT
44,712,991 UART: [state] CFI Enabled
45,048,340 UART: [rt] RT listening for mailbox commands...
45,080,147 UART: [rt]cmd =0x41545348, len=116
45,082,724 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,469 writing to cptra_bootfsm_go
193,584 UART:
193,947 UART: Running Caliptra ROM ...
195,154 UART:
195,309 UART: [state] CFI Enabled
263,457 UART: [state] LifecycleState = Unprovisioned
265,572 UART: [state] DebugLocked = No
267,376 UART: [state] WD Timer not started. Device not locked for debugging
271,566 UART: [kat] SHA2-256
461,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,172 UART: [kat] ++
472,619 UART: [kat] sha1
482,802 UART: [kat] SHA2-256
485,775 UART: [kat] SHA2-384
492,834 UART: [kat] SHA2-512-ACC
495,423 UART: [kat] ECC-384
2,949,127 UART: [kat] HMAC-384Kdf
2,972,816 UART: [kat] LMS
3,504,614 UART: [kat] --
3,507,401 UART: [cold-reset] ++
3,509,336 UART: [fht] FHT @ 0x50003400
3,521,616 UART: [idev] ++
3,522,291 UART: [idev] CDI.KEYID = 6
3,523,206 UART: [idev] SUBJECT.KEYID = 7
3,524,402 UART: [idev] UDS.KEYID = 0
3,525,330 ready_for_fw is high
3,525,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,286 UART: [idev] Erasing UDS.KEYID = 0
6,030,667 UART: [idev] Sha1 KeyId Algorithm
6,052,113 UART: [idev] --
6,056,935 UART: [ldev] ++
6,057,621 UART: [ldev] CDI.KEYID = 6
6,058,532 UART: [ldev] SUBJECT.KEYID = 5
6,059,693 UART: [ldev] AUTHORITY.KEYID = 7
6,060,927 UART: [ldev] FE.KEYID = 1
6,102,409 UART: [ldev] Erasing FE.KEYID = 1
8,608,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,110 UART: [ldev] --
10,412,791 UART: [fwproc] Wait for Commands...
10,415,920 UART: [fwproc] Recv command 0x46574c44
10,418,178 UART: [fwproc] Recv'd Img size: 114360 bytes
13,869,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,609,822 >>> mbox cmd response: success
14,614,428 UART: [afmc] ++
14,615,140 UART: [afmc] CDI.KEYID = 6
14,616,389 UART: [afmc] SUBJECT.KEYID = 7
14,617,829 UART: [afmc] AUTHORITY.KEYID = 5
17,152,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,368 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,485 UART: [afmc] --
18,968,331 UART: [cold-reset] --
18,970,592 UART: [state] Locking Datavault
18,975,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,352 UART: [state] Locking ICCM
18,979,616 UART: [exit] Launching FMC @ 0x40000130
18,988,294 UART:
18,988,537 UART: Running Caliptra FMC ...
18,989,636 UART:
18,989,799 UART: [state] CFI Enabled
19,050,975 UART: [fht] FMC Alias Private Key: 7
20,815,483 UART: [art] Extend RT PCRs Done
20,816,695 UART: [art] Lock RT PCRs Done
20,818,390 UART: [art] Populate DV Done
20,823,755 UART: [fht] FMC Alias Private Key: 7
20,825,452 UART: [art] Derive CDI
20,826,266 UART: [art] Store in in slot 0x4
20,883,043 UART: [art] Derive Key Pair
20,884,084 UART: [art] Store priv key in slot 0x5
23,346,999 UART: [art] Derive Key Pair - Done
23,359,942 UART: [art] Signing Cert with AUTHO
23,361,244 UART: RITY.KEYID = 7
25,072,171 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,679 UART: [art] PUB.X = 606A76C0871FA412C6D411621EA10343267FB683360213588E6D1F454248FF9EBEC327E29A7914E614B02D1A5D845618
25,080,909 UART: [art] PUB.Y = D74FA0E7CE645C240EFC40E3C4C289FA4B041F5E848609BCF8420A7256B03B601C5A79D13F31A6D46A0A3C7617CB37E9
25,088,181 UART: [art] SIG.R = 6F31614BB254B212799D231E6D6D8FA75A401266CF3290292D27684045D23468DC511800F9506984BC2B9C5346EFAD17
25,095,512 UART: [art] SIG.S = 7730F98F95D0189C9BE2C8C53CC1C19C081D4192D386B41A047280486BA0981F6509303763F550726BA6828E8EFA986F
26,074,892 UART: Caliptra RT
26,075,590 UART: [state] CFI Enabled
26,241,273 UART: [rt] RT listening for mailbox commands...
26,243,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,399,375 UART: [rt]cmd =0x41544d4e, len=14344
30,329,873 >>> mbox cmd response data (8 bytes)
30,330,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,361,077 UART: [rt]cmd =0x41545348, len=116
30,363,396 >>> mbox cmd response data (12 bytes)
32,419,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,565,230 UART:
32,565,609 UART: Running Caliptra ROM ...
32,566,748 UART:
32,566,944 UART: [state] CFI Enabled
32,642,146 UART: [state] LifecycleState = Unprovisioned
32,644,255 UART: [state] DebugLocked = No
32,646,996 UART: [state] WD Timer not started. Device not locked for debugging
32,650,830 UART: [kat] SHA2-256
32,840,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,851,440 UART: [kat] ++
32,851,904 UART: [kat] sha1
32,864,671 UART: [kat] SHA2-256
32,867,691 UART: [kat] SHA2-384
32,872,766 UART: [kat] SHA2-512-ACC
32,875,344 UART: [kat] ECC-384
35,327,947 UART: [kat] HMAC-384Kdf
35,351,589 UART: [kat] LMS
35,883,155 UART: [kat] --
35,888,022 UART: [update-reset] ++
39,346,120 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,348,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,956,734 >>> mbox cmd response: success
39,961,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,962,067 UART: [update-reset] Copying MAN_2 To MAN_1
39,996,293 UART: [update-reset Success] --
40,000,423 UART: [state] Locking Datavault
40,004,033 UART: [state] Locking PCR0, PCR1 and PCR31
40,006,203 UART: [state] Locking ICCM
40,007,719 UART: [exit] Launching FMC @ 0x40000130
40,016,401 UART:
40,016,641 UART: Running Caliptra FMC ...
40,017,769 UART:
40,017,939 UART: [state] CFI Enabled
40,119,242 UART: [art] Extend RT PCRs Done
40,120,437 UART: [art] Lock RT PCRs Done
40,121,952 UART: [art] Populate DV Done
40,127,524 UART: [fht] FMC Alias Private Key: 7
40,129,175 UART: [art] Derive CDI
40,129,991 UART: [art] Store in in slot 0x4
40,188,970 UART: [art] Derive Key Pair
40,190,086 UART: [art] Store priv key in slot 0x5
42,652,982 UART: [art] Derive Key Pair - Done
42,665,882 UART: [art] Signing Cert with AUTHO
42,667,195 UART: RITY.KEYID = 7
44,378,742 UART: [art] Erasing AUTHORITY.KEYID = 7
44,380,254 UART: [art] PUB.X = D61DA57B282D5B5A17346410793B5AE355C1791B9CCF8E54EAA5D440FD4499DC3906CBC202E45AC4D1A98402686595C5
44,387,501 UART: [art] PUB.Y = CF82C0F8DB36435C3A2151BFE9E9C78C9DB607FF55C26CA91027AA8C0E6246B26659D46A3A4163B4500D3DE1588E1DFA
44,394,745 UART: [art] SIG.R = 2D98E05E99DDAA78E213E5E9B0679BAAD670D42863DAB9A93F0EA14F9812FF1664E74891746D683EB257D44BBF0D56FB
44,402,165 UART: [art] SIG.S = 48F0EFBBDD2BA910C4DC151CAD021F5612C6BB6C2EFFC7CA8BB931DB1703612436FA8ABCEEB39EC69FD9001AF16AB281
45,380,903 UART: Caliptra RT
45,381,616 UART: [state] CFI Enabled
45,718,163 UART: [rt] RT listening for mailbox commands...
45,749,716 UART: [rt]cmd =0x41545348, len=116
45,752,182 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
3,436,306 ready_for_fw is high
3,436,890 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,745,979 >>> mbox cmd response: success
19,026,221 UART:
19,026,597 UART: Running Caliptra FMC ...
19,027,802 UART:
19,027,972 UART: [state] CFI Enabled
19,092,875 UART: [fht] FMC Alias Private Key: 7
20,856,693 UART: [art] Extend RT PCRs Done
20,857,914 UART: [art] Lock RT PCRs Done
20,859,833 UART: [art] Populate DV Done
20,865,240 UART: [fht] FMC Alias Private Key: 7
20,866,780 UART: [art] Derive CDI
20,867,599 UART: [art] Store in in slot 0x4
20,925,670 UART: [art] Derive Key Pair
20,926,704 UART: [art] Store priv key in slot 0x5
23,390,104 UART: [art] Derive Key Pair - Done
23,403,006 UART: [art] Signing Cert with AUTHO
23,404,313 UART: RITY.KEYID = 7
25,116,045 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,554 UART: [art] PUB.X = 1AFE0B55340CD158304A1D1E240F29BFBF4D9A2D12F1F86FE59625C2BB26E1B75B02392359B25440A1B8FA9B89E42826
25,124,830 UART: [art] PUB.Y = 4263D110746B679C52FC60073AB4F2557528CB8094F10B97E839A261F454384EE0C38B972A432767A9EF964ECCA94863
25,132,050 UART: [art] SIG.R = BC9C9AB467286D66F0ECD130C9712DF9074BB072E20B15C31D95B3B8542D8D002CD0D57C769BB0D9441F5F8F45D33BFB
25,139,434 UART: [art] SIG.S = 675F32E6EA6B4DD5836DCDB799B61DE9609250448A04E76C0DE8EE56EA5ED831193ED6867EE035589DCC3B2D4308B9C8
26,118,187 UART: Caliptra RT
26,118,907 UART: [state] CFI Enabled
26,284,951 UART: [rt] RT listening for mailbox commands...
26,287,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,442,934 UART: [rt]cmd =0x41544d4e, len=14344
30,373,328 >>> mbox cmd response data (8 bytes)
30,373,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,404,677 UART: [rt]cmd =0x41545348, len=116
30,407,212 >>> mbox cmd response data (12 bytes)
32,460,546 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,271,351 >>> mbox cmd response: success
40,271,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,306,682 UART:
40,306,975 UART: Running Caliptra FMC ...
40,308,014 UART:
40,308,164 UART: [state] CFI Enabled
40,414,796 UART: [art] Extend RT PCRs Done
40,416,007 UART: [art] Lock RT PCRs Done
40,417,447 UART: [art] Populate DV Done
40,422,858 UART: [fht] FMC Alias Private Key: 7
40,424,503 UART: [art] Derive CDI
40,425,241 UART: [art] Store in in slot 0x4
40,484,414 UART: [art] Derive Key Pair
40,485,415 UART: [art] Store priv key in slot 0x5
42,948,223 UART: [art] Derive Key Pair - Done
42,961,329 UART: [art] Signing Cert with AUTHO
42,962,637 UART: RITY.KEYID = 7
44,673,811 UART: [art] Erasing AUTHORITY.KEYID = 7
44,675,317 UART: [art] PUB.X = A728A1F382E38AD1733CD5D8A2F51D89468816ACA0D18D82341F265935083EDBF8D87271C3DBF4837DC0F6CF62D5E34B
44,682,557 UART: [art] PUB.Y = 8010B8344E08280BD25F1C87EB2CA9B7235C9C685F2D049FFF156FE679D323948D85BAEE03D35A950EFCD8FD2E8D3747
44,689,832 UART: [art] SIG.R = F72A424C3237C199EF50788BE507CCD82ACC168782E3248C3535BAEF74B0EAC845133E66D32222755BE03A4717804856
44,697,208 UART: [art] SIG.S = 1D6F81C3ACC38132BC955626F21521448FB37F0ED1DD6BC1C2D7A0BF6B85950572C617455EDA113C018C08A9B31C0A54
45,676,017 UART: Caliptra RT
45,676,733 UART: [state] CFI Enabled
46,015,197 UART: [rt] RT listening for mailbox commands...
46,047,117 UART: [rt]cmd =0x41545348, len=116
46,049,260 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,233 UART:
192,593 UART: Running Caliptra ROM ...
193,715 UART:
603,299 UART: [state] CFI Enabled
615,842 UART: [state] LifecycleState = Unprovisioned
618,218 UART: [state] DebugLocked = No
619,533 UART: [state] WD Timer not started. Device not locked for debugging
624,906 UART: [kat] SHA2-256
814,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,578 UART: [kat] ++
826,095 UART: [kat] sha1
839,381 UART: [kat] SHA2-256
842,384 UART: [kat] SHA2-384
849,585 UART: [kat] SHA2-512-ACC
852,171 UART: [kat] ECC-384
3,294,596 UART: [kat] HMAC-384Kdf
3,305,899 UART: [kat] LMS
3,837,756 UART: [kat] --
3,842,345 UART: [cold-reset] ++
3,843,564 UART: [fht] FHT @ 0x50003400
3,855,676 UART: [idev] ++
3,856,382 UART: [idev] CDI.KEYID = 6
3,857,330 UART: [idev] SUBJECT.KEYID = 7
3,858,500 UART: [idev] UDS.KEYID = 0
3,859,441 ready_for_fw is high
3,859,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,242 UART: [idev] Erasing UDS.KEYID = 0
6,338,359 UART: [idev] Sha1 KeyId Algorithm
6,360,780 UART: [idev] --
6,365,362 UART: [ldev] ++
6,366,041 UART: [ldev] CDI.KEYID = 6
6,367,055 UART: [ldev] SUBJECT.KEYID = 5
6,368,162 UART: [ldev] AUTHORITY.KEYID = 7
6,369,390 UART: [ldev] FE.KEYID = 1
6,379,999 UART: [ldev] Erasing FE.KEYID = 1
8,856,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,872 UART: [ldev] --
10,645,813 UART: [fwproc] Wait for Commands...
10,648,233 UART: [fwproc] Recv command 0x46574c44
10,650,540 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,840,906 >>> mbox cmd response: success
14,845,251 UART: [afmc] ++
14,845,951 UART: [afmc] CDI.KEYID = 6
14,847,152 UART: [afmc] SUBJECT.KEYID = 7
14,848,583 UART: [afmc] AUTHORITY.KEYID = 5
17,354,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,895 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,651 UART: [afmc] --
19,152,056 UART: [cold-reset] --
19,154,681 UART: [state] Locking Datavault
19,160,786 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,966 UART: [state] Locking ICCM
19,164,682 UART: [exit] Launching FMC @ 0x40000130
19,173,347 UART:
19,173,579 UART: Running Caliptra FMC ...
19,174,696 UART:
19,174,875 UART: [state] CFI Enabled
19,182,870 UART: [fht] FMC Alias Private Key: 7
20,939,675 UART: [art] Extend RT PCRs Done
20,940,896 UART: [art] Lock RT PCRs Done
20,942,516 UART: [art] Populate DV Done
20,948,037 UART: [fht] FMC Alias Private Key: 7
20,949,683 UART: [art] Derive CDI
20,950,498 UART: [art] Store in in slot 0x4
20,992,828 UART: [art] Derive Key Pair
20,993,873 UART: [art] Store priv key in slot 0x5
23,420,439 UART: [art] Derive Key Pair - Done
23,433,324 UART: [art] Signing Cert with AUTHO
23,434,820 UART: RITY.KEYID = 7
25,139,878 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,358 UART: [art] PUB.X = CD80D02A99EC7E27210C88B21CBACFF946C193B925751E425F7B23432BE6D9B1C72C8CEE1C4ED76B360ABB4BE68AFD9C
25,148,674 UART: [art] PUB.Y = 1D91F4519BAF7DBAEED337FA3D1B5BC1F7DF83569F036848B2BC7A8EA22D2ED6A360B4F8039D492CEC6F3346B21E0E30
25,155,969 UART: [art] SIG.R = 07192629140B8FC721B9F604B649F47E1F769721348E69AD1E1CA380DF088BFB5CEA0B303228D685D1B7D34C91ED0B46
25,163,363 UART: [art] SIG.S = 16FF6801F0D99375BE6627BE16D4229E27B93CDD5ED47518229F6617441C5E23DFA16BB9DBB2A7438718E5302BA9E45A
26,141,851 UART: Caliptra RT
26,142,567 UART: [state] CFI Enabled
26,260,218 UART: [rt] RT listening for mailbox commands...
26,262,637 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,417,628 UART: [rt]cmd =0x41544d4e, len=14344
30,347,303 >>> mbox cmd response data (8 bytes)
30,347,906 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,378,648 UART: [rt]cmd =0x41545348, len=116
30,380,975 >>> mbox cmd response data (12 bytes)
32,436,319 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,581,952 UART:
32,582,311 UART: Running Caliptra ROM ...
32,583,410 UART:
32,583,569 UART: [state] CFI Enabled
32,596,063 UART: [state] LifecycleState = Unprovisioned
32,597,961 UART: [state] DebugLocked = No
32,599,604 UART: [state] WD Timer not started. Device not locked for debugging
32,603,316 UART: [kat] SHA2-256
32,792,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,803,739 UART: [kat] ++
32,804,276 UART: [kat] sha1
32,814,140 UART: [kat] SHA2-256
32,817,165 UART: [kat] SHA2-384
32,823,425 UART: [kat] SHA2-512-ACC
32,826,019 UART: [kat] ECC-384
35,267,705 UART: [kat] HMAC-384Kdf
35,280,043 UART: [kat] LMS
35,811,645 UART: [kat] --
35,816,936 UART: [update-reset] ++
39,282,426 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,285,218 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,892,967 >>> mbox cmd response: success
39,897,589 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,898,205 UART: [update-reset] Copying MAN_2 To MAN_1
39,931,494 UART: [update-reset Success] --
39,934,906 UART: [state] Locking Datavault
39,938,836 UART: [state] Locking PCR0, PCR1 and PCR31
39,940,981 UART: [state] Locking ICCM
39,943,939 UART: [exit] Launching FMC @ 0x40000130
39,952,604 UART:
39,952,834 UART: Running Caliptra FMC ...
39,953,929 UART:
39,954,084 UART: [state] CFI Enabled
39,998,259 UART: [art] Extend RT PCRs Done
39,999,464 UART: [art] Lock RT PCRs Done
40,000,756 UART: [art] Populate DV Done
40,006,330 UART: [fht] FMC Alias Private Key: 7
40,007,870 UART: [art] Derive CDI
40,008,685 UART: [art] Store in in slot 0x4
40,051,545 UART: [art] Derive Key Pair
40,052,598 UART: [art] Store priv key in slot 0x5
42,478,942 UART: [art] Derive Key Pair - Done
42,491,963 UART: [art] Signing Cert with AUTHO
42,493,265 UART: RITY.KEYID = 7
44,198,873 UART: [art] Erasing AUTHORITY.KEYID = 7
44,200,379 UART: [art] PUB.X = C1B149A7B4A72C34197CF20F8F2C3BDB23909D5836BF1F96759378B7EA5E3710D3ABFFF943317EC8C0F7E0170CE9B5C8
44,207,625 UART: [art] PUB.Y = EFD22B54654B817B143EB22936E2BB8DC9D38CBC45E3318BA368B473BC5F95B7D4248B75AC91916A7C2EC23F67FE2FF1
44,214,908 UART: [art] SIG.R = 89D375A3072113E0273747E614908D81C80ABF994ECAA0350B4B37AE4FA5E9ABC286893807AFC4FEB6ED445D8BCAF51F
44,222,298 UART: [art] SIG.S = 181A630FD01C3433EF662490015035B41408A5555E9669FD4131AACEF5EA7293706D8BC3195070402C59F15461F2FA1C
45,200,732 UART: Caliptra RT
45,201,418 UART: [state] CFI Enabled
45,488,709 UART: [rt] RT listening for mailbox commands...
45,520,755 UART: [rt]cmd =0x41545348, len=116
45,523,129 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,759,214 ready_for_fw is high
3,759,600 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,774 >>> mbox cmd response: success
19,212,668 UART:
19,213,068 UART: Running Caliptra FMC ...
19,214,198 UART:
19,214,360 UART: [state] CFI Enabled
19,222,324 UART: [fht] FMC Alias Private Key: 7
20,978,730 UART: [art] Extend RT PCRs Done
20,979,951 UART: [art] Lock RT PCRs Done
20,981,436 UART: [art] Populate DV Done
20,987,060 UART: [fht] FMC Alias Private Key: 7
20,988,719 UART: [art] Derive CDI
20,989,535 UART: [art] Store in in slot 0x4
21,032,414 UART: [art] Derive Key Pair
21,033,480 UART: [art] Store priv key in slot 0x5
23,460,711 UART: [art] Derive Key Pair - Done
23,473,882 UART: [art] Signing Cert with AUTHO
23,475,178 UART: RITY.KEYID = 7
25,180,641 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,151 UART: [art] PUB.X = 410AE88143601426E3834A4751449788052C9E9FC58EAA0958CA64E055A295536DC9B97A007DF942F500E52BE6B105FF
25,189,380 UART: [art] PUB.Y = 68FC1FC56909909F87FA91F66022D895290ACA42402BDF3AEA628E9F6938E8D9E014B1F5681585E213FC1E0A208BF9D7
25,196,603 UART: [art] SIG.R = E542B9F3E5DE9B3709B2B31137891A530D3276E6EE893353BDA82B83410ABDB9F90233BC1BEB048ABCCFE75854A53AC0
25,204,013 UART: [art] SIG.S = ED59A9CD42595E9D59D2750D08602EEA761A1E98025B920CDC22580F37BACD6AFBA4BAD24B091A5C54FF25FB545472D0
26,183,075 UART: Caliptra RT
26,183,787 UART: [state] CFI Enabled
26,300,464 UART: [rt] RT listening for mailbox commands...
26,302,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,458,344 UART: [rt]cmd =0x41544d4e, len=14344
30,388,939 >>> mbox cmd response data (8 bytes)
30,389,557 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,420,314 UART: [rt]cmd =0x41545348, len=116
30,422,514 >>> mbox cmd response data (12 bytes)
32,474,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,207,403 >>> mbox cmd response: success
40,208,004 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,243,468 UART:
40,243,803 UART: Running Caliptra FMC ...
40,244,936 UART:
40,245,096 UART: [state] CFI Enabled
40,289,353 UART: [art] Extend RT PCRs Done
40,290,503 UART: [art] Lock RT PCRs Done
40,292,133 UART: [art] Populate DV Done
40,297,652 UART: [fht] FMC Alias Private Key: 7
40,299,295 UART: [art] Derive CDI
40,300,104 UART: [art] Store in in slot 0x4
40,342,827 UART: [art] Derive Key Pair
40,343,869 UART: [art] Store priv key in slot 0x5
42,769,979 UART: [art] Derive Key Pair - Done
42,783,199 UART: [art] Signing Cert with AUTHO
42,784,706 UART: RITY.KEYID = 7
44,489,975 UART: [art] Erasing AUTHORITY.KEYID = 7
44,491,468 UART: [art] PUB.X = 04B8F36B0E3A61B6DA905D14492EF8B811C3DCD143CCB9EC6179A6A1EDA418C0440FCCFD5D19F2DF502A5EC5C8992E6F
44,498,817 UART: [art] PUB.Y = 96056FF5D0541586B7FF3B70876FB461EE84AC6BE48B9A1275401EF6A0D56C25F331A0D4B48913C2875EEF7B2CF317CD
44,506,037 UART: [art] SIG.R = 3DC3CA12D57D7710C2B3315783AAD03187F2ADD05CCD6A9EA8DD2BB43EA3A3D03142E2CD4AAFCE5415E3F7EB81CDCC55
44,513,474 UART: [art] SIG.S = ECBDB70AB0E882B6723ACC064716DA50741160E29379B2580EE003BB08875F2EC1D07146009EDB95AEA6A3BBD529C061
45,491,668 UART: Caliptra RT
45,492,383 UART: [state] CFI Enabled
45,780,371 UART: [rt] RT listening for mailbox commands...
45,812,122 UART: [rt]cmd =0x41545348, len=116
45,814,637 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,158 UART: [kat] LMS
1,475,354 UART: [kat] --
1,476,199 UART: [cold-reset] ++
1,476,579 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,228 UART: [idev] Erasing UDS.KEYID = 0
1,504,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,688 UART: [idev] --
1,514,909 UART: [ldev] ++
1,515,077 UART: [ldev] CDI.KEYID = 6
1,515,440 UART: [ldev] SUBJECT.KEYID = 5
1,515,866 UART: [ldev] AUTHORITY.KEYID = 7
1,516,329 UART: [ldev] FE.KEYID = 1
1,521,301 UART: [ldev] Erasing FE.KEYID = 1
1,546,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,766 UART: [ldev] --
1,586,153 UART: [fwproc] Waiting for Commands...
1,586,958 UART: [fwproc] Received command 0x46574c44
1,587,749 UART: [fwproc] Received Image of size 114360 bytes
2,886,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,910 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,183 >>> mbox cmd response: success
3,080,273 UART: [afmc] ++
3,080,441 UART: [afmc] CDI.KEYID = 6
3,080,803 UART: [afmc] SUBJECT.KEYID = 7
3,081,228 UART: [afmc] AUTHORITY.KEYID = 5
3,115,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,252 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,942 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,931 UART: [afmc] --
3,158,977 UART: [cold-reset] --
3,159,901 UART: [state] Locking Datavault
3,160,926 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,530 UART: [state] Locking ICCM
3,162,086 UART: [exit] Launching FMC @ 0x40000130
3,167,415 UART:
3,167,431 UART: Running Caliptra FMC ...
3,167,839 UART:
3,167,893 UART: [state] CFI Enabled
3,178,672 UART: [fht] FMC Alias Private Key: 7
3,286,769 UART: [art] Extend RT PCRs Done
3,287,197 UART: [art] Lock RT PCRs Done
3,289,157 UART: [art] Populate DV Done
3,297,068 UART: [fht] FMC Alias Private Key: 7
3,298,188 UART: [art] Derive CDI
3,298,468 UART: [art] Store in in slot 0x4
3,384,181 UART: [art] Derive Key Pair
3,384,541 UART: [art] Store priv key in slot 0x5
3,397,623 UART: [art] Derive Key Pair - Done
3,412,606 UART: [art] Signing Cert with AUTHO
3,413,086 UART: RITY.KEYID = 7
3,427,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,685 UART: [art] PUB.X = 04D95136535DCBB4802085B9F29476061C15F4A5C9C55C0F1E5943DFDDBBB6967DE0BCDD645C693830186D1133802A17
3,435,446 UART: [art] PUB.Y = E5679F54DBB29CABD21E0BD5B341449BE487CB9A3B32520951C3849FF03711EA97FC9F76AF12F113A7262D6FF2E901C2
3,442,397 UART: [art] SIG.R = 7C78257D5CEBDCAFD752AEE81290BC247D89BBC26431104BB22CDBEA8F034590CC80F3DE032A641723C15B9F69988AF4
3,449,175 UART: [art] SIG.S = F658A2F00E598756A16925C10B807A15B38D24CBD9113529F2250F5B3C2B8EE50C7CBC5D861EEE2ED6CA6B91B1219937
3,473,338 UART: Caliptra RT
3,473,592 UART: [state] CFI Enabled
3,581,832 UART: [rt] RT listening for mailbox commands...
3,582,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,281 UART: [rt]cmd =0x41544d4e, len=14344
3,850,094 >>> mbox cmd response data (8 bytes)
3,850,095 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,062 UART: [rt]cmd =0x41545348, len=116
3,881,885 >>> mbox cmd response data (12 bytes)
3,881,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,437 UART:
3,882,453 UART: Running Caliptra ROM ...
3,882,861 UART:
3,882,915 UART: [state] CFI Enabled
3,885,151 UART: [state] LifecycleState = Unprovisioned
3,885,806 UART: [state] DebugLocked = No
3,886,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,888,115 UART: [kat] SHA2-256
4,682,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,686,161 UART: [kat] ++
4,686,313 UART: [kat] sha1
4,690,411 UART: [kat] SHA2-256
4,692,349 UART: [kat] SHA2-384
4,695,156 UART: [kat] SHA2-512-ACC
4,697,056 UART: [kat] ECC-384
4,702,909 UART: [kat] HMAC-384Kdf
4,707,401 UART: [kat] LMS
5,275,597 UART: [kat] --
5,276,466 UART: [update-reset] ++
6,611,381 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,612,445 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,762,363 >>> mbox cmd response: success
6,762,363 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,762,552 UART: [update-reset] Copying MAN_2 To MAN_1
6,770,566 UART: [update-reset Success] --
6,771,481 UART: [state] Locking Datavault
6,772,455 UART: [state] Locking PCR0, PCR1 and PCR31
6,773,059 UART: [state] Locking ICCM
6,773,719 UART: [exit] Launching FMC @ 0x40000130
6,779,048 UART:
6,779,064 UART: Running Caliptra FMC ...
6,779,472 UART:
6,779,526 UART: [state] CFI Enabled
6,869,269 UART: [art] Extend RT PCRs Done
6,869,697 UART: [art] Lock RT PCRs Done
6,870,890 UART: [art] Populate DV Done
6,879,187 UART: [fht] FMC Alias Private Key: 7
6,880,279 UART: [art] Derive CDI
6,880,559 UART: [art] Store in in slot 0x4
6,966,534 UART: [art] Derive Key Pair
6,966,894 UART: [art] Store priv key in slot 0x5
6,980,548 UART: [art] Derive Key Pair - Done
6,995,164 UART: [art] Signing Cert with AUTHO
6,995,644 UART: RITY.KEYID = 7
7,010,974 UART: [art] Erasing AUTHORITY.KEYID = 7
7,011,739 UART: [art] PUB.X = EC06BAD70478EE9A863BEE4F937E63EB7A22B7EFFBAC26618E291A13B91AB2E668FA4B6616DF583AA9F197A724F58BCF
7,018,525 UART: [art] PUB.Y = A10C83F80E8703D88EB35760BAB7CC4660146AD5E1D8B58DC90D1EEE80EB22E2788946ADFF1D508CE21AC652CFB3C53C
7,025,481 UART: [art] SIG.R = DD3C3B83B18D80EEC5DB1C41EB6EE5C30A2495929BA8F3156940F7A1331F286FAB6EEDC2ADA08A67B0F5E795296D0459
7,032,261 UART: [art] SIG.S = 5FB83C394A7ED1AF7BA868BF0CBE8D4F75274F9867A0A97A8397DA5C64FB3D702750B89BCFBDE1A45E5C72DEFEA8E86D
7,055,983 UART: Caliptra RT
7,056,237 UART: [state] CFI Enabled
7,334,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,365,503 UART: [rt]cmd =0x41545348, len=116
7,367,406 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,141 ready_for_fw is high
1,362,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,655 >>> mbox cmd response: success
2,989,561 UART:
2,989,577 UART: Running Caliptra FMC ...
2,989,985 UART:
2,990,039 UART: [state] CFI Enabled
3,000,542 UART: [fht] FMC Alias Private Key: 7
3,108,495 UART: [art] Extend RT PCRs Done
3,108,923 UART: [art] Lock RT PCRs Done
3,110,389 UART: [art] Populate DV Done
3,118,540 UART: [fht] FMC Alias Private Key: 7
3,119,614 UART: [art] Derive CDI
3,119,894 UART: [art] Store in in slot 0x4
3,205,295 UART: [art] Derive Key Pair
3,205,655 UART: [art] Store priv key in slot 0x5
3,218,785 UART: [art] Derive Key Pair - Done
3,233,824 UART: [art] Signing Cert with AUTHO
3,234,304 UART: RITY.KEYID = 7
3,249,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,983 UART: [art] PUB.X = 90881D23160323E057357BAE101995B35020E84E7467816FCA62750235306DFE32C7DDB270647F27B06C7225B057A946
3,256,731 UART: [art] PUB.Y = 042355A8B4A06B734A2494AA2D738F2AF18A23BDED6943851ADF05010CCBC7BB34A8DDBD0642F529F7ECF692ECD0A3A8
3,263,684 UART: [art] SIG.R = F8A2B32043A765F542CE7255BC3900DFD7F52192EBA0F3502397BA7F35BC3C09077D49EF2D4D830EB670A9006BCBB8B9
3,270,411 UART: [art] SIG.S = 58B093DAC9AE195EF156DE5BE17E979B0EB0079197A5AFA55CC3550EEBDB0CECE6860250D5848A8DC0854B347E81CA78
3,294,599 UART: Caliptra RT
3,294,853 UART: [state] CFI Enabled
3,403,233 UART: [rt] RT listening for mailbox commands...
3,403,903 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,738 UART: [rt]cmd =0x41544d4e, len=14344
3,671,853 >>> mbox cmd response data (8 bytes)
3,671,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,111 UART: [rt]cmd =0x41545348, len=116
3,703,698 >>> mbox cmd response data (12 bytes)
3,703,699 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,762 >>> mbox cmd response: success
6,465,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,479,269 UART:
6,479,285 UART: Running Caliptra FMC ...
6,479,693 UART:
6,479,747 UART: [state] CFI Enabled
6,569,022 UART: [art] Extend RT PCRs Done
6,569,450 UART: [art] Lock RT PCRs Done
6,570,755 UART: [art] Populate DV Done
6,578,830 UART: [fht] FMC Alias Private Key: 7
6,579,788 UART: [art] Derive CDI
6,580,068 UART: [art] Store in in slot 0x4
6,666,289 UART: [art] Derive Key Pair
6,666,649 UART: [art] Store priv key in slot 0x5
6,679,401 UART: [art] Derive Key Pair - Done
6,693,902 UART: [art] Signing Cert with AUTHO
6,694,382 UART: RITY.KEYID = 7
6,710,042 UART: [art] Erasing AUTHORITY.KEYID = 7
6,710,807 UART: [art] PUB.X = 9AA2B3278A3B3751090558DA90F239A6B5B476C77D77915E911609F59D47CC14B6791CBB3522F3A05E61033D6CF355F0
6,717,561 UART: [art] PUB.Y = B25C28BA2270794A24F61C49B77B478BF9C3ADF83726E9E8240134DC04AE42F4A3027EC16C758DD29B10E33278D033EC
6,724,506 UART: [art] SIG.R = F819DEFC88D0D818626EDD006F725F9AA61C70CDD7AEA705D07A1EF70CC6134A0A74D5980EEDB80D8F9FF273FE8E5AD0
6,731,263 UART: [art] SIG.S = 74A878EBF1C1B1FC85E27ACFBD9EE8F33F675E066EBF0E1E4EA765493D9891C375F34BE78F3F7A8CDC4546F04795D9A5
6,754,674 UART: Caliptra RT
6,754,928 UART: [state] CFI Enabled
7,035,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,066,700 UART: [rt]cmd =0x41545348, len=116
7,068,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,276 UART: [kat] SHA2-256
882,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,322 UART: [kat] ++
886,474 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,591 UART: [kat] SHA2-512-ACC
897,492 UART: [kat] ECC-384
903,379 UART: [kat] HMAC-384Kdf
908,047 UART: [kat] LMS
1,476,243 UART: [kat] --
1,476,914 UART: [cold-reset] ++
1,477,276 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 ready_for_fw is high
1,481,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,997 UART: [idev] Erasing UDS.KEYID = 0
1,505,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,691 UART: [idev] --
1,514,798 UART: [ldev] ++
1,514,966 UART: [ldev] CDI.KEYID = 6
1,515,329 UART: [ldev] SUBJECT.KEYID = 5
1,515,755 UART: [ldev] AUTHORITY.KEYID = 7
1,516,218 UART: [ldev] FE.KEYID = 1
1,521,544 UART: [ldev] Erasing FE.KEYID = 1
1,546,703 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,207 UART: [ldev] --
1,585,716 UART: [fwproc] Waiting for Commands...
1,586,567 UART: [fwproc] Received command 0x46574c44
1,587,358 UART: [fwproc] Received Image of size 114360 bytes
2,884,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,581 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,918 >>> mbox cmd response: success
3,079,014 UART: [afmc] ++
3,079,182 UART: [afmc] CDI.KEYID = 6
3,079,544 UART: [afmc] SUBJECT.KEYID = 7
3,079,969 UART: [afmc] AUTHORITY.KEYID = 5
3,114,924 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,803 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,493 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,390 UART: [afmc] --
3,158,412 UART: [cold-reset] --
3,159,260 UART: [state] Locking Datavault
3,160,511 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,115 UART: [state] Locking ICCM
3,161,725 UART: [exit] Launching FMC @ 0x40000130
3,167,054 UART:
3,167,070 UART: Running Caliptra FMC ...
3,167,478 UART:
3,167,621 UART: [state] CFI Enabled
3,178,422 UART: [fht] FMC Alias Private Key: 7
3,286,333 UART: [art] Extend RT PCRs Done
3,286,761 UART: [art] Lock RT PCRs Done
3,288,449 UART: [art] Populate DV Done
3,296,756 UART: [fht] FMC Alias Private Key: 7
3,297,686 UART: [art] Derive CDI
3,297,966 UART: [art] Store in in slot 0x4
3,383,513 UART: [art] Derive Key Pair
3,383,873 UART: [art] Store priv key in slot 0x5
3,396,597 UART: [art] Derive Key Pair - Done
3,411,337 UART: [art] Signing Cert with AUTHO
3,411,817 UART: RITY.KEYID = 7
3,427,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,112 UART: [art] PUB.X = E1E07B3A578F40F67EEDBDC9DE436B3A75396FE12DB457B79551E1290C7B3B010C5D6DE380D17C351EB5664B7A46C0DA
3,434,887 UART: [art] PUB.Y = EDC97C0D63E4BCBC706C011141F694FC65C3876BE3C610514E7B5EF2DF26D0E3E11BF5C0DE1B2D2AC3CFFFCCA3AC607D
3,441,861 UART: [art] SIG.R = DE9D2344861DBCE89A55A9F4D29C61551D23D001334857BB8E55C6C9C2E0572990C0AE9C15EDA6120D0B837F6E19E96C
3,448,628 UART: [art] SIG.S = 696C9EF8F3486646008180898031E811E75AA9C00202C535FE8CEA3FA7E99132E37C1CB0AFD14E2690E948E00510D202
3,472,687 UART: Caliptra RT
3,473,033 UART: [state] CFI Enabled
3,582,531 UART: [rt] RT listening for mailbox commands...
3,583,201 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,924 UART: [rt]cmd =0x41544d4e, len=14344
3,850,841 >>> mbox cmd response data (8 bytes)
3,850,842 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,829 UART: [rt]cmd =0x41545348, len=116
3,882,842 >>> mbox cmd response data (12 bytes)
3,882,843 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,496 UART:
3,883,512 UART: Running Caliptra ROM ...
3,883,920 UART:
3,884,061 UART: [state] CFI Enabled
3,886,365 UART: [state] LifecycleState = Unprovisioned
3,887,020 UART: [state] DebugLocked = No
3,887,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,889,295 UART: [kat] SHA2-256
4,683,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,687,341 UART: [kat] ++
4,687,493 UART: [kat] sha1
4,691,787 UART: [kat] SHA2-256
4,693,725 UART: [kat] SHA2-384
4,696,438 UART: [kat] SHA2-512-ACC
4,698,338 UART: [kat] ECC-384
4,703,911 UART: [kat] HMAC-384Kdf
4,708,405 UART: [kat] LMS
5,276,601 UART: [kat] --
5,277,570 UART: [update-reset] ++
6,612,187 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,613,295 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,763,213 >>> mbox cmd response: success
6,763,213 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,763,506 UART: [update-reset] Copying MAN_2 To MAN_1
6,771,520 UART: [update-reset Success] --
6,772,295 UART: [state] Locking Datavault
6,773,143 UART: [state] Locking PCR0, PCR1 and PCR31
6,773,747 UART: [state] Locking ICCM
6,774,369 UART: [exit] Launching FMC @ 0x40000130
6,779,698 UART:
6,779,714 UART: Running Caliptra FMC ...
6,780,122 UART:
6,780,265 UART: [state] CFI Enabled
6,869,874 UART: [art] Extend RT PCRs Done
6,870,302 UART: [art] Lock RT PCRs Done
6,871,643 UART: [art] Populate DV Done
6,879,782 UART: [fht] FMC Alias Private Key: 7
6,880,810 UART: [art] Derive CDI
6,881,090 UART: [art] Store in in slot 0x4
6,967,233 UART: [art] Derive Key Pair
6,967,593 UART: [art] Store priv key in slot 0x5
6,981,037 UART: [art] Derive Key Pair - Done
6,995,872 UART: [art] Signing Cert with AUTHO
6,996,352 UART: RITY.KEYID = 7
7,011,740 UART: [art] Erasing AUTHORITY.KEYID = 7
7,012,505 UART: [art] PUB.X = 3D5E28D4C27D938EB97571E486548BAAAADFCA624828B9DD54DD8218520F4D68EBF7402EAC4F8EE90B0B524944104FE8
7,019,278 UART: [art] PUB.Y = 53AAD7514B166346A7E59B6FEF3EB2ED5BEE3755115991BE1BC5ECF3264DDDCA10A877C22872D1FA24C5B5ED57F59238
7,026,244 UART: [art] SIG.R = 99509D117BCC1BF2AC749CC3170339145C8118FBA7565BB42E8AF62477C2BC721C43083F45DC5EC8314300755E0A0F4B
7,032,982 UART: [art] SIG.S = A2400D260C5150908A4244218C381CE249004A02573273D2FA58C6F659932CDA11546E00C8AFBE6F9BE34DAC305CD63E
7,056,384 UART: Caliptra RT
7,056,730 UART: [state] CFI Enabled
7,339,026 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,369,937 UART: [rt]cmd =0x41545348, len=116
7,371,704 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,414 ready_for_fw is high
1,362,414 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,240 >>> mbox cmd response: success
2,989,292 UART:
2,989,308 UART: Running Caliptra FMC ...
2,989,716 UART:
2,989,859 UART: [state] CFI Enabled
3,000,572 UART: [fht] FMC Alias Private Key: 7
3,108,645 UART: [art] Extend RT PCRs Done
3,109,073 UART: [art] Lock RT PCRs Done
3,110,369 UART: [art] Populate DV Done
3,118,306 UART: [fht] FMC Alias Private Key: 7
3,119,366 UART: [art] Derive CDI
3,119,646 UART: [art] Store in in slot 0x4
3,205,545 UART: [art] Derive Key Pair
3,205,905 UART: [art] Store priv key in slot 0x5
3,219,301 UART: [art] Derive Key Pair - Done
3,234,073 UART: [art] Signing Cert with AUTHO
3,234,553 UART: RITY.KEYID = 7
3,249,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,590 UART: [art] PUB.X = 83671B2898C72CAE82DA4BD585B84F9F519F26BD4D4B6F9731AE7D3145AB247BB540E8ABBCD36359A50986DF17E3C07B
3,257,369 UART: [art] PUB.Y = DE2D4155B6C0EA45648E45C65755C55CF5FAB7FB64C2EE351357040925721B703B1157B50D89A7C0446E2888CFE61656
3,264,308 UART: [art] SIG.R = 370BFAEA8AA098295BFD4D37007126D16F6346213C81F155142311DB3D72F10038B0AEDFBB6C465026F14BD82C0F3D6B
3,271,034 UART: [art] SIG.S = 0DA53FCEC774D510C4C7BD5A02B79E3D5413564C7A9827774EA0276B2EB1A63D2DD638D0D45F3CF8BE3B1C63B2571E9D
3,294,923 UART: Caliptra RT
3,295,269 UART: [state] CFI Enabled
3,403,106 UART: [rt] RT listening for mailbox commands...
3,403,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,447 UART: [rt]cmd =0x41544d4e, len=14344
3,671,132 >>> mbox cmd response data (8 bytes)
3,671,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,108 UART: [rt]cmd =0x41545348, len=116
3,702,969 >>> mbox cmd response data (12 bytes)
3,702,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,356 >>> mbox cmd response: success
6,465,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,478,737 UART:
6,478,753 UART: Running Caliptra FMC ...
6,479,161 UART:
6,479,304 UART: [state] CFI Enabled
6,568,603 UART: [art] Extend RT PCRs Done
6,569,031 UART: [art] Lock RT PCRs Done
6,570,212 UART: [art] Populate DV Done
6,578,329 UART: [fht] FMC Alias Private Key: 7
6,579,371 UART: [art] Derive CDI
6,579,651 UART: [art] Store in in slot 0x4
6,665,570 UART: [art] Derive Key Pair
6,665,930 UART: [art] Store priv key in slot 0x5
6,679,436 UART: [art] Derive Key Pair - Done
6,694,374 UART: [art] Signing Cert with AUTHO
6,694,854 UART: RITY.KEYID = 7
6,709,886 UART: [art] Erasing AUTHORITY.KEYID = 7
6,710,651 UART: [art] PUB.X = F5899BF6C6D723BFE1B06A1B85B8076605C4B21DFBCB3768FFC89DC8CF1360C636DFADA58888E5735D63039CF0972B37
6,717,424 UART: [art] PUB.Y = 85F8686B04522381D72B9BA8367DF8475B9D01ADE697E2C540DB2407F53869E2DF79AD8EDC3E2B7DC4FD51052BF098BD
6,724,372 UART: [art] SIG.R = F7C183BDBBF5B0ED1139558ECBE17EB257E1AB34EC3E4C0B637D4CA4C9EFA3E90FBACFF14CF4063614747D11345CA517
6,731,157 UART: [art] SIG.S = 4F22810C2BB109490904F85F2B0151AD43FD9CA5483AF1A65DEC3E4387F35C3097CE2BEB665BF08CA2B760733AC87BCC
6,755,083 UART: Caliptra RT
6,755,429 UART: [state] CFI Enabled
7,042,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,073,643 UART: [rt]cmd =0x41545348, len=116
7,075,166 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
893,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,515 UART: [kat] ++
897,667 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,406 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,171,811 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,280 UART: [idev] Erasing UDS.KEYID = 0
1,201,377 UART: [idev] Sha1 KeyId Algorithm
1,209,881 UART: [idev] --
1,211,115 UART: [ldev] ++
1,211,283 UART: [ldev] CDI.KEYID = 6
1,211,646 UART: [ldev] SUBJECT.KEYID = 5
1,212,072 UART: [ldev] AUTHORITY.KEYID = 7
1,212,535 UART: [ldev] FE.KEYID = 1
1,217,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,729 UART: [ldev] --
1,283,176 UART: [fwproc] Wait for Commands...
1,283,766 UART: [fwproc] Recv command 0x46574c44
1,284,494 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,066 >>> mbox cmd response: success
2,776,226 UART: [afmc] ++
2,776,394 UART: [afmc] CDI.KEYID = 6
2,776,756 UART: [afmc] SUBJECT.KEYID = 7
2,777,181 UART: [afmc] AUTHORITY.KEYID = 5
2,812,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,415 UART: [afmc] --
2,856,325 UART: [cold-reset] --
2,857,331 UART: [state] Locking Datavault
2,858,450 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,054 UART: [state] Locking ICCM
2,859,692 UART: [exit] Launching FMC @ 0x40000130
2,865,021 UART:
2,865,037 UART: Running Caliptra FMC ...
2,865,445 UART:
2,865,499 UART: [state] CFI Enabled
2,875,774 UART: [fht] FMC Alias Private Key: 7
2,983,599 UART: [art] Extend RT PCRs Done
2,984,027 UART: [art] Lock RT PCRs Done
2,985,693 UART: [art] Populate DV Done
2,993,884 UART: [fht] FMC Alias Private Key: 7
2,994,860 UART: [art] Derive CDI
2,995,140 UART: [art] Store in in slot 0x4
3,080,199 UART: [art] Derive Key Pair
3,080,559 UART: [art] Store priv key in slot 0x5
3,093,407 UART: [art] Derive Key Pair - Done
3,108,212 UART: [art] Signing Cert with AUTHO
3,108,692 UART: RITY.KEYID = 7
3,123,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,427 UART: [art] PUB.X = 704052CADD203718A6B2707356B3C8D5BDB8EBB0687F0D4D7C0AD8B2CF748B1DA989F9935BE94A9C289AAA1B97A1D2A0
3,131,207 UART: [art] PUB.Y = BF5A31E4900A0E9FCB3BD87F890401E4D05C8540F141A39B9A049A736C3923C98BF68E1398813A064B117E914CB163B2
3,138,139 UART: [art] SIG.R = C322012165F18A3AE9FA134BB47560D1522415D776D0C5A97AF7434CE2CB263140B520CC4938842FF6C888787A60A04D
3,144,902 UART: [art] SIG.S = DA899F50FBD78102257D46E60771925C6297DD00926DFE23AA3770B94093EF026B2B5882B2D1C330FBDF44FA5B432958
3,168,250 UART: Caliptra RT
3,168,504 UART: [state] CFI Enabled
3,276,257 UART: [rt] RT listening for mailbox commands...
3,276,927 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,772 UART: [rt]cmd =0x41544d4e, len=14344
3,545,191 >>> mbox cmd response data (8 bytes)
3,545,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,195 UART: [rt]cmd =0x41545348, len=116
3,577,122 >>> mbox cmd response data (12 bytes)
3,577,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,811 UART:
3,577,827 UART: Running Caliptra ROM ...
3,578,235 UART:
3,578,290 UART: [state] CFI Enabled
3,580,650 UART: [state] LifecycleState = Unprovisioned
3,581,305 UART: [state] DebugLocked = No
3,581,865 UART: [state] WD Timer not started. Device not locked for debugging
3,583,219 UART: [kat] SHA2-256
4,388,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,392,994 UART: [kat] ++
4,393,146 UART: [kat] sha1
4,397,286 UART: [kat] SHA2-256
4,399,226 UART: [kat] SHA2-384
4,401,793 UART: [kat] SHA2-512-ACC
4,403,693 UART: [kat] ECC-384
4,413,502 UART: [kat] HMAC-384Kdf
4,418,132 UART: [kat] LMS
4,666,460 UART: [kat] --
4,667,178 UART: [update-reset] ++
5,979,619 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,980,764 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,130,630 >>> mbox cmd response: success
6,130,630 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,130,879 UART: [update-reset] Copying MAN_2 To MAN_1
6,138,893 UART: [update-reset Success] --
6,140,078 UART: [state] Locking Datavault
6,140,834 UART: [state] Locking PCR0, PCR1 and PCR31
6,141,438 UART: [state] Locking ICCM
6,142,046 UART: [exit] Launching FMC @ 0x40000130
6,147,375 UART:
6,147,391 UART: Running Caliptra FMC ...
6,147,799 UART:
6,147,853 UART: [state] CFI Enabled
6,236,714 UART: [art] Extend RT PCRs Done
6,237,142 UART: [art] Lock RT PCRs Done
6,238,403 UART: [art] Populate DV Done
6,246,704 UART: [fht] FMC Alias Private Key: 7
6,247,680 UART: [art] Derive CDI
6,247,960 UART: [art] Store in in slot 0x4
6,333,469 UART: [art] Derive Key Pair
6,333,829 UART: [art] Store priv key in slot 0x5
6,346,855 UART: [art] Derive Key Pair - Done
6,361,804 UART: [art] Signing Cert with AUTHO
6,362,284 UART: RITY.KEYID = 7
6,377,564 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,329 UART: [art] PUB.X = 65F0B398AFA74D9F82C8D4496676E8EEE8AE33834FD3587133A2E9A2A0F1C45BE19993E775EE63A94387A585728ABADB
6,385,107 UART: [art] PUB.Y = EF4CE271637842B5F630B4183E48D69A40EACB97B46BD9B8F5B9B2965C79EE8763485D2F87C97A61C7E28239528D1786
6,392,057 UART: [art] SIG.R = D668C9E2D3C13B8EAA8444EE700D0A6F0CEF707C5C75D31EF5F9BD3F83A90C726680778707239F95EDD6054000DDC739
6,398,795 UART: [art] SIG.S = 6564E498C18E75823F7B36A02622AEC8FE38A560868B73FB15E1B4D97790FC1C84BFDA8298EAAC978E2153593BEB18A3
6,422,944 UART: Caliptra RT
6,423,198 UART: [state] CFI Enabled
6,700,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,731,416 UART: [rt]cmd =0x41545348, len=116
6,733,121 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,141 ready_for_fw is high
1,060,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,663 >>> mbox cmd response: success
2,690,695 UART:
2,690,711 UART: Running Caliptra FMC ...
2,691,119 UART:
2,691,173 UART: [state] CFI Enabled
2,701,420 UART: [fht] FMC Alias Private Key: 7
2,809,733 UART: [art] Extend RT PCRs Done
2,810,161 UART: [art] Lock RT PCRs Done
2,811,749 UART: [art] Populate DV Done
2,819,992 UART: [fht] FMC Alias Private Key: 7
2,821,156 UART: [art] Derive CDI
2,821,436 UART: [art] Store in in slot 0x4
2,907,315 UART: [art] Derive Key Pair
2,907,675 UART: [art] Store priv key in slot 0x5
2,920,961 UART: [art] Derive Key Pair - Done
2,935,991 UART: [art] Signing Cert with AUTHO
2,936,471 UART: RITY.KEYID = 7
2,951,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,664 UART: [art] PUB.X = 860E1960D65D2903E21926EE08AE62925DCEDD85721B6116ABD9D42C0500035365482C0DB0149776020677D19ED168FC
2,959,380 UART: [art] PUB.Y = 2AA901BD836AD5112A37A01C49B852B27A06BF5282F08858278880946BE36E6DA2D8D71D9A7658E5907175C1616166CC
2,966,318 UART: [art] SIG.R = 201D914669FFA913CAEFC570D7CBDC3CE58A4A887C2FCBE060452BB48B8CD21C9F508A8315074F4DC7CA1300B5BD63A6
2,973,081 UART: [art] SIG.S = 259ED265961CCA60F749060C7FA2B2F1969401501E321AD5A8D941955A7E3D72F9A6D7B6E97B3B010F2371054060BE24
2,996,804 UART: Caliptra RT
2,997,058 UART: [state] CFI Enabled
3,104,840 UART: [rt] RT listening for mailbox commands...
3,105,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,091 UART: [rt]cmd =0x41544d4e, len=14344
3,372,276 >>> mbox cmd response data (8 bytes)
3,372,277 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,104 UART: [rt]cmd =0x41545348, len=116
3,403,787 >>> mbox cmd response data (12 bytes)
3,403,788 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,198 >>> mbox cmd response: success
5,842,198 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,855,468 UART:
5,855,484 UART: Running Caliptra FMC ...
5,855,892 UART:
5,855,946 UART: [state] CFI Enabled
5,944,629 UART: [art] Extend RT PCRs Done
5,945,057 UART: [art] Lock RT PCRs Done
5,946,206 UART: [art] Populate DV Done
5,954,549 UART: [fht] FMC Alias Private Key: 7
5,955,649 UART: [art] Derive CDI
5,955,929 UART: [art] Store in in slot 0x4
6,041,736 UART: [art] Derive Key Pair
6,042,096 UART: [art] Store priv key in slot 0x5
6,054,534 UART: [art] Derive Key Pair - Done
6,069,100 UART: [art] Signing Cert with AUTHO
6,069,580 UART: RITY.KEYID = 7
6,084,464 UART: [art] Erasing AUTHORITY.KEYID = 7
6,085,229 UART: [art] PUB.X = 49591FDFAD3B656E690821290701AF3ECCEFAF402A063568E3E9A1915A8C21AB15D140BC1B6AEE06360D1DA7182891FB
6,091,991 UART: [art] PUB.Y = AB28414EE7963E78A70962F393695767AE49F96663D0E5B43082931FD8448ECCCF6527A6380E90C53C02EF3985C09051
6,098,924 UART: [art] SIG.R = D3E9888101DD0D0DC6ADD47DDCC59E8D984AC0CDBA0312A450FA2E255AFBA02F7EC834CC16A30A78F5F831EF93015964
6,105,696 UART: [art] SIG.S = 5943C087650E1BE7955F2BB9F6C8F8B77C4AF4845579A25F6C06B5B3196671F9713CD6DB9CC9C4C3E4845629576A1E22
6,129,833 UART: Caliptra RT
6,130,087 UART: [state] CFI Enabled
6,413,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,444,781 UART: [rt]cmd =0x41545348, len=116
6,446,680 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
893,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,410 UART: [kat] ++
897,562 UART: [kat] sha1
901,924 UART: [kat] SHA2-256
903,864 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,261 UART: [kat] HMAC-384Kdf
922,993 UART: [kat] LMS
1,171,321 UART: [kat] --
1,172,312 UART: [cold-reset] ++
1,172,820 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,176,756 ready_for_fw is high
1,176,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,201 UART: [idev] Erasing UDS.KEYID = 0
1,200,884 UART: [idev] Sha1 KeyId Algorithm
1,209,378 UART: [idev] --
1,210,326 UART: [ldev] ++
1,210,494 UART: [ldev] CDI.KEYID = 6
1,210,857 UART: [ldev] SUBJECT.KEYID = 5
1,211,283 UART: [ldev] AUTHORITY.KEYID = 7
1,211,746 UART: [ldev] FE.KEYID = 1
1,217,254 UART: [ldev] Erasing FE.KEYID = 1
1,243,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,264 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,421 UART: [fwproc] Recv command 0x46574c44
1,284,149 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,309 >>> mbox cmd response: success
2,775,345 UART: [afmc] ++
2,775,513 UART: [afmc] CDI.KEYID = 6
2,775,875 UART: [afmc] SUBJECT.KEYID = 7
2,776,300 UART: [afmc] AUTHORITY.KEYID = 5
2,811,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,046 UART: [afmc] --
2,855,054 UART: [cold-reset] --
2,855,962 UART: [state] Locking Datavault
2,857,303 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,907 UART: [state] Locking ICCM
2,858,469 UART: [exit] Launching FMC @ 0x40000130
2,863,798 UART:
2,863,814 UART: Running Caliptra FMC ...
2,864,222 UART:
2,864,365 UART: [state] CFI Enabled
2,875,014 UART: [fht] FMC Alias Private Key: 7
2,983,141 UART: [art] Extend RT PCRs Done
2,983,569 UART: [art] Lock RT PCRs Done
2,985,133 UART: [art] Populate DV Done
2,993,720 UART: [fht] FMC Alias Private Key: 7
2,994,782 UART: [art] Derive CDI
2,995,062 UART: [art] Store in in slot 0x4
3,080,899 UART: [art] Derive Key Pair
3,081,259 UART: [art] Store priv key in slot 0x5
3,094,645 UART: [art] Derive Key Pair - Done
3,109,374 UART: [art] Signing Cert with AUTHO
3,109,854 UART: RITY.KEYID = 7
3,125,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,879 UART: [art] PUB.X = E2BE3346E727D62DE44EBC7D2A74F0BFC32B8081BC915C8A54A966F221691E2A6EB8C325F8D63FA1D1670980E37D6867
3,132,654 UART: [art] PUB.Y = D760DA37213D9B5A650C41BB9DC2CB83512E3103FBB831BD1FCB554C04ACA897D9A9D0A8AE60577530BA4BB6EACBDE62
3,139,617 UART: [art] SIG.R = 1E77F332880BCE00EA1BF4EA71726EA0FC0928AF2EF4FEBCD74436CF18BB596008B824445A9981C9D75249122DBAB2FD
3,146,370 UART: [art] SIG.S = BBCC34775FED5B1C5AD8FC1ED4C27FF4147DDD6F7BB8C95DE5E649CE4117F166E97593542BC64A8BB58684BABC81E0B2
3,170,133 UART: Caliptra RT
3,170,479 UART: [state] CFI Enabled
3,278,895 UART: [rt] RT listening for mailbox commands...
3,279,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,138 UART: [rt]cmd =0x41544d4e, len=14344
3,546,639 >>> mbox cmd response data (8 bytes)
3,546,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,647 UART: [rt]cmd =0x41545348, len=116
3,578,280 >>> mbox cmd response data (12 bytes)
3,578,281 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,079 UART:
3,579,095 UART: Running Caliptra ROM ...
3,579,503 UART:
3,579,645 UART: [state] CFI Enabled
3,582,179 UART: [state] LifecycleState = Unprovisioned
3,582,834 UART: [state] DebugLocked = No
3,583,458 UART: [state] WD Timer not started. Device not locked for debugging
3,584,720 UART: [kat] SHA2-256
4,390,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,394,495 UART: [kat] ++
4,394,647 UART: [kat] sha1
4,398,663 UART: [kat] SHA2-256
4,400,603 UART: [kat] SHA2-384
4,403,586 UART: [kat] SHA2-512-ACC
4,405,486 UART: [kat] ECC-384
4,415,133 UART: [kat] HMAC-384Kdf
4,419,681 UART: [kat] LMS
4,668,009 UART: [kat] --
4,668,871 UART: [update-reset] ++
5,980,922 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,982,025 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,131,891 >>> mbox cmd response: success
6,131,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,132,108 UART: [update-reset] Copying MAN_2 To MAN_1
6,140,122 UART: [update-reset Success] --
6,141,319 UART: [state] Locking Datavault
6,142,021 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,625 UART: [state] Locking ICCM
6,143,173 UART: [exit] Launching FMC @ 0x40000130
6,148,502 UART:
6,148,518 UART: Running Caliptra FMC ...
6,148,926 UART:
6,149,069 UART: [state] CFI Enabled
6,238,176 UART: [art] Extend RT PCRs Done
6,238,604 UART: [art] Lock RT PCRs Done
6,239,725 UART: [art] Populate DV Done
6,248,198 UART: [fht] FMC Alias Private Key: 7
6,249,130 UART: [art] Derive CDI
6,249,410 UART: [art] Store in in slot 0x4
6,335,115 UART: [art] Derive Key Pair
6,335,475 UART: [art] Store priv key in slot 0x5
6,348,083 UART: [art] Derive Key Pair - Done
6,362,993 UART: [art] Signing Cert with AUTHO
6,363,473 UART: RITY.KEYID = 7
6,378,667 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,432 UART: [art] PUB.X = 228B7310FE0D120CC055EF40396EC815CE823CF44BC0F426B70FF96DCE3FA07094A1E2C8ADBCFD3AD6316E46D7BA82A8
6,386,213 UART: [art] PUB.Y = 93D8AB1A78984B4E523A13A4C7A023EE4B6AEA7CE22E80A3C224BC025868C061A9BB643C970198156FB8F52748D1663A
6,393,161 UART: [art] SIG.R = 5FCF6FB13C2D774253824FB592E02BE85AEBA08783F0217B7BC843C2D002F0313B1DBE42BCFACB018A5231A371C693D5
6,399,937 UART: [art] SIG.S = A97BB04FF8749FCEC18AE74250FC264B17E37C6A76C99757EB87846518E3D4662F3A7CB97FCD4E99A68033FCB0FCF790
6,423,648 UART: Caliptra RT
6,423,994 UART: [state] CFI Enabled
6,707,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,738,086 UART: [rt]cmd =0x41545348, len=116
6,740,269 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,924 ready_for_fw is high
1,060,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,038 >>> mbox cmd response: success
2,688,326 UART:
2,688,342 UART: Running Caliptra FMC ...
2,688,750 UART:
2,688,893 UART: [state] CFI Enabled
2,699,392 UART: [fht] FMC Alias Private Key: 7
2,807,389 UART: [art] Extend RT PCRs Done
2,807,817 UART: [art] Lock RT PCRs Done
2,809,453 UART: [art] Populate DV Done
2,817,652 UART: [fht] FMC Alias Private Key: 7
2,818,808 UART: [art] Derive CDI
2,819,088 UART: [art] Store in in slot 0x4
2,904,857 UART: [art] Derive Key Pair
2,905,217 UART: [art] Store priv key in slot 0x5
2,918,771 UART: [art] Derive Key Pair - Done
2,933,671 UART: [art] Signing Cert with AUTHO
2,934,151 UART: RITY.KEYID = 7
2,949,151 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,916 UART: [art] PUB.X = 8664EEB08825046982A29ADF3E80FB22E5B7C171D47287B0118AB250966F022BAF0D9CF7F9EEF161ECF2D02B89D1001B
2,956,663 UART: [art] PUB.Y = 5807592DF28D3B8DDC936082DE577063C7D8892AAED38F0772F295F817EC93E8DE84844241BC212BCFE0F9A87F1176B5
2,963,611 UART: [art] SIG.R = 376325B2A6FEC5450A46FF9BF16CED1351AF25F282107F704018B06A98CAB12BFCAFF9830E2CC94886C3CEFB052D45C4
2,970,386 UART: [art] SIG.S = 31462A47C9D03C2274C12FB3C1261E16DD72CAF38F31180D6BE849ECF44657AAF229C2C4F8DC54CFB1E4ADDC811E6E68
2,994,406 UART: Caliptra RT
2,994,752 UART: [state] CFI Enabled
3,102,790 UART: [rt] RT listening for mailbox commands...
3,103,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,131 UART: [rt]cmd =0x41544d4e, len=14344
3,371,060 >>> mbox cmd response data (8 bytes)
3,371,061 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,336 UART: [rt]cmd =0x41545348, len=116
3,403,231 >>> mbox cmd response data (12 bytes)
3,403,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,840,921 >>> mbox cmd response: success
5,840,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,854,389 UART:
5,854,405 UART: Running Caliptra FMC ...
5,854,813 UART:
5,854,956 UART: [state] CFI Enabled
5,943,995 UART: [art] Extend RT PCRs Done
5,944,423 UART: [art] Lock RT PCRs Done
5,945,656 UART: [art] Populate DV Done
5,953,871 UART: [fht] FMC Alias Private Key: 7
5,955,021 UART: [art] Derive CDI
5,955,301 UART: [art] Store in in slot 0x4
6,040,668 UART: [art] Derive Key Pair
6,041,028 UART: [art] Store priv key in slot 0x5
6,054,382 UART: [art] Derive Key Pair - Done
6,068,902 UART: [art] Signing Cert with AUTHO
6,069,382 UART: RITY.KEYID = 7
6,084,498 UART: [art] Erasing AUTHORITY.KEYID = 7
6,085,263 UART: [art] PUB.X = 85F434091208073E3017C81E10AE88778F28FF163D4BAC9277AEBA6C9D710B7679785DE18F7D39603A19AF984B0E5E8F
6,092,018 UART: [art] PUB.Y = EB4D77966078252DBF85CBA9BA921007D304640289EC6A729C09AAF13D6DC459DF4829EB271D1C94B0D5E13B83A597A1
6,098,962 UART: [art] SIG.R = 1D6BBC168218A1C39D660D6930CA654419DE5496489C8A7256C30EE0793F3784088B6B1AC08444E5849B68F34E5087DE
6,105,717 UART: [art] SIG.S = 60897DABD6D939A3D07A43425FE50812ABF65FD17074C98A8E0E7AD0E3C74221A176BB42CBAEF2E9BDF8E9A8E6C9E15A
6,130,058 UART: Caliptra RT
6,130,404 UART: [state] CFI Enabled
6,418,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,449,238 UART: [rt]cmd =0x41545348, len=116
6,450,987 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,173,965 ready_for_fw is high
1,173,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,469 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,572 UART: [ldev] ++
1,208,740 UART: [ldev] CDI.KEYID = 6
1,209,104 UART: [ldev] SUBJECT.KEYID = 5
1,209,531 UART: [ldev] AUTHORITY.KEYID = 7
1,209,994 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,122 UART: [ldev] --
1,280,518 UART: [fwproc] Wait for Commands...
1,281,119 UART: [fwproc] Recv command 0x46574c44
1,281,852 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,870 >>> mbox cmd response: success
2,773,105 UART: [afmc] ++
2,773,273 UART: [afmc] CDI.KEYID = 6
2,773,636 UART: [afmc] SUBJECT.KEYID = 7
2,774,062 UART: [afmc] AUTHORITY.KEYID = 5
2,809,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,591 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,474 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,193 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,050 UART: [afmc] --
2,853,150 UART: [cold-reset] --
2,853,912 UART: [state] Locking Datavault
2,855,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,819 UART: [state] Locking ICCM
2,856,329 UART: [exit] Launching FMC @ 0x40000130
2,861,658 UART:
2,861,674 UART: Running Caliptra FMC ...
2,862,082 UART:
2,862,136 UART: [state] CFI Enabled
2,872,689 UART: [fht] FMC Alias Private Key: 7
2,981,142 UART: [art] Extend RT PCRs Done
2,981,570 UART: [art] Lock RT PCRs Done
2,983,324 UART: [art] Populate DV Done
2,991,557 UART: [fht] FMC Alias Private Key: 7
2,992,735 UART: [art] Derive CDI
2,993,015 UART: [art] Store in in slot 0x4
3,078,606 UART: [art] Derive Key Pair
3,078,966 UART: [art] Store priv key in slot 0x5
3,092,670 UART: [art] Derive Key Pair - Done
3,107,259 UART: [art] Signing Cert with AUTHO
3,107,739 UART: RITY.KEYID = 7
3,122,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,686 UART: [art] PUB.X = 16E670934F0FB10605CBB8924CECB6C525B902654BE6FEB253FE16AEB1E18EA1FBE65A19E32D4D7277621F66C48B3A0A
3,130,455 UART: [art] PUB.Y = 15352712E5FC6CA9E0DC9878A91BED1413A4A70EE22407F6031F7D932DBA9A954F13DFCDE889372246FE690AEF754A23
3,137,401 UART: [art] SIG.R = DE0AA0B27AFC40F2809D24FB7438645DF0D48DEC01D4A6A250BD99BC88F420607E5723059B026049799A44AFD542D91C
3,144,165 UART: [art] SIG.S = 2F6E188E0E199F17CFAF46955419663E9E7DD7CCF666F24F9DF15053E19CCBCA56F4258A08D648DDEE8C0FD19FF19391
3,167,977 UART: Caliptra RT
3,168,231 UART: [state] CFI Enabled
3,275,831 UART: [rt] RT listening for mailbox commands...
3,276,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,000 UART: [rt]cmd =0x41544d4e, len=14344
3,543,577 >>> mbox cmd response data (8 bytes)
3,543,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,559 UART: [rt]cmd =0x41545348, len=116
3,575,748 >>> mbox cmd response data (12 bytes)
3,575,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,507 UART:
3,576,523 UART: Running Caliptra ROM ...
3,576,931 UART:
3,576,986 UART: [state] CFI Enabled
3,579,590 UART: [state] LifecycleState = Unprovisioned
3,580,245 UART: [state] DebugLocked = No
3,580,931 UART: [state] WD Timer not started. Device not locked for debugging
3,582,271 UART: [kat] SHA2-256
4,385,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,389,950 UART: [kat] ++
4,390,102 UART: [kat] sha1
4,394,312 UART: [kat] SHA2-256
4,396,252 UART: [kat] SHA2-384
4,398,911 UART: [kat] SHA2-512-ACC
4,400,811 UART: [kat] ECC-384
4,410,534 UART: [kat] HMAC-384Kdf
4,414,918 UART: [kat] LMS
4,663,230 UART: [kat] --
4,663,696 UART: [update-reset] ++
5,975,518 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,976,651 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,126,517 >>> mbox cmd response: success
6,126,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,126,808 UART: [update-reset] Copying MAN_2 To MAN_1
6,134,822 UART: [update-reset Success] --
6,135,763 UART: [state] Locking Datavault
6,136,403 UART: [state] Locking PCR0, PCR1 and PCR31
6,137,007 UART: [state] Locking ICCM
6,137,483 UART: [exit] Launching FMC @ 0x40000130
6,142,812 UART:
6,142,828 UART: Running Caliptra FMC ...
6,143,236 UART:
6,143,290 UART: [state] CFI Enabled
6,231,875 UART: [art] Extend RT PCRs Done
6,232,303 UART: [art] Lock RT PCRs Done
6,233,814 UART: [art] Populate DV Done
6,242,065 UART: [fht] FMC Alias Private Key: 7
6,243,111 UART: [art] Derive CDI
6,243,391 UART: [art] Store in in slot 0x4
6,329,304 UART: [art] Derive Key Pair
6,329,664 UART: [art] Store priv key in slot 0x5
6,343,092 UART: [art] Derive Key Pair - Done
6,357,753 UART: [art] Signing Cert with AUTHO
6,358,233 UART: RITY.KEYID = 7
6,373,323 UART: [art] Erasing AUTHORITY.KEYID = 7
6,374,088 UART: [art] PUB.X = 070DFC9185E62A89DF2893912FB2E38563245FE5CCC1F6DFA08B470C3BBEB64241990FCE3C3CA336C3A68D26CC63F50E
6,380,857 UART: [art] PUB.Y = 041D2253515704D7B69E98957777EC921088E609F2DCFAE0925E07B39BBB0212AD9D872FAABC36DF5306B3067C51F287
6,387,786 UART: [art] SIG.R = 720BEEBAB1FB09DCF2FA95E8F2C9FCC1452EADA1EC77611E96D04392D18D00A709D500A8DD27345A13EB9A8D59E012B7
6,394,523 UART: [art] SIG.S = 1ADAA4E2568651E47E956C87F3304C880F85967D7EE5743828EBB8D7E06AC0C77394611FE13BE45BE9FF4F524C3361A9
6,418,153 UART: Caliptra RT
6,418,407 UART: [state] CFI Enabled
6,702,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,733,695 UART: [rt]cmd =0x41545348, len=116
6,735,926 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,918 ready_for_fw is high
1,055,918 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,510 >>> mbox cmd response: success
2,684,556 UART:
2,684,572 UART: Running Caliptra FMC ...
2,684,980 UART:
2,685,034 UART: [state] CFI Enabled
2,695,551 UART: [fht] FMC Alias Private Key: 7
2,803,176 UART: [art] Extend RT PCRs Done
2,803,604 UART: [art] Lock RT PCRs Done
2,805,072 UART: [art] Populate DV Done
2,813,209 UART: [fht] FMC Alias Private Key: 7
2,814,143 UART: [art] Derive CDI
2,814,423 UART: [art] Store in in slot 0x4
2,900,362 UART: [art] Derive Key Pair
2,900,722 UART: [art] Store priv key in slot 0x5
2,914,016 UART: [art] Derive Key Pair - Done
2,928,877 UART: [art] Signing Cert with AUTHO
2,929,357 UART: RITY.KEYID = 7
2,944,839 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,604 UART: [art] PUB.X = ED3A5A6A81A86183F5FBAD71698D5D2E9D5E220CDA2CBE027762298840A40AEBF305F7F66D9C3AE91A8068478D258767
2,952,370 UART: [art] PUB.Y = 460820B612FB73CD2647FFEECB9BE520A7A53E47C1E5FEC297E129FFC4132656E812B7F3D1BFF43ADC212E4F50BCAB65
2,959,337 UART: [art] SIG.R = 8604200C94D184BB7A4DE998F91BAA92946991FDF4DD8C2BBE1D04E905D7BB6FDCC8618859D122BA7B99EF0CE50B94C0
2,966,105 UART: [art] SIG.S = 14B4B13EB3293EB9E2563D6377874C770D31768D2F72C229F8523CBF52F842B676591F76AE76C2BC3EA9119F6318D6E8
2,989,963 UART: Caliptra RT
2,990,217 UART: [state] CFI Enabled
3,097,909 UART: [rt] RT listening for mailbox commands...
3,098,579 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,134 UART: [rt]cmd =0x41544d4e, len=14344
3,366,425 >>> mbox cmd response data (8 bytes)
3,366,426 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,545 UART: [rt]cmd =0x41545348, len=116
3,398,534 >>> mbox cmd response data (12 bytes)
3,398,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,831,308 >>> mbox cmd response: success
5,831,308 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,844,890 UART:
5,844,906 UART: Running Caliptra FMC ...
5,845,314 UART:
5,845,368 UART: [state] CFI Enabled
5,934,133 UART: [art] Extend RT PCRs Done
5,934,561 UART: [art] Lock RT PCRs Done
5,935,474 UART: [art] Populate DV Done
5,943,577 UART: [fht] FMC Alias Private Key: 7
5,944,591 UART: [art] Derive CDI
5,944,871 UART: [art] Store in in slot 0x4
6,030,794 UART: [art] Derive Key Pair
6,031,154 UART: [art] Store priv key in slot 0x5
6,044,698 UART: [art] Derive Key Pair - Done
6,059,649 UART: [art] Signing Cert with AUTHO
6,060,129 UART: RITY.KEYID = 7
6,074,991 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,756 UART: [art] PUB.X = 265F8EA32D8C3554CF25A2A6DA9FFAFD28902D6F6C18C41FE3F65CA7B30B47790AAABBB148C82692DEA3CEA3315C0E34
6,082,539 UART: [art] PUB.Y = 43A52641DE7A57728FD2268B1AE73DBBD008B5B99029E8734C9F90687ABA498AD613A1849C494C2C7571F039AA97BEA5
6,089,490 UART: [art] SIG.R = E9A62DBAC24616C0C853417CFEC9E3C705DDAC6D9228B0824C2512D605497D8454909018BD7813F52AD3BCEAC6330410
6,096,255 UART: [art] SIG.S = E703B50DE2E4D3810B7AF9A296A73DA5D72CF89E096CD24CCF8432F8F1047AC9DDDEDDBFB21D2DDDA4FBEF5D0A3E0521
6,120,135 UART: Caliptra RT
6,120,389 UART: [state] CFI Enabled
6,400,369 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,431,392 UART: [rt]cmd =0x41545348, len=116
6,433,181 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,297 UART: [kat] HMAC-384Kdf
919,867 UART: [kat] LMS
1,168,179 UART: [kat] --
1,168,976 UART: [cold-reset] ++
1,169,460 UART: [fht] FHT @ 0x50003400
1,172,214 UART: [idev] ++
1,172,382 UART: [idev] CDI.KEYID = 6
1,172,743 UART: [idev] SUBJECT.KEYID = 7
1,173,168 UART: [idev] UDS.KEYID = 0
1,173,514 ready_for_fw is high
1,173,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,292 UART: [idev] Erasing UDS.KEYID = 0
1,198,084 UART: [idev] Sha1 KeyId Algorithm
1,207,034 UART: [idev] --
1,207,989 UART: [ldev] ++
1,208,157 UART: [ldev] CDI.KEYID = 6
1,208,521 UART: [ldev] SUBJECT.KEYID = 5
1,208,948 UART: [ldev] AUTHORITY.KEYID = 7
1,209,411 UART: [ldev] FE.KEYID = 1
1,214,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,511 UART: [ldev] --
1,280,893 UART: [fwproc] Wait for Commands...
1,281,480 UART: [fwproc] Recv command 0x46574c44
1,282,213 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,211 >>> mbox cmd response: success
2,773,230 UART: [afmc] ++
2,773,398 UART: [afmc] CDI.KEYID = 6
2,773,761 UART: [afmc] SUBJECT.KEYID = 7
2,774,187 UART: [afmc] AUTHORITY.KEYID = 5
2,810,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,697 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,803 UART: [afmc] --
2,853,845 UART: [cold-reset] --
2,854,475 UART: [state] Locking Datavault
2,855,430 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,034 UART: [state] Locking ICCM
2,856,524 UART: [exit] Launching FMC @ 0x40000130
2,861,853 UART:
2,861,869 UART: Running Caliptra FMC ...
2,862,277 UART:
2,862,420 UART: [state] CFI Enabled
2,873,111 UART: [fht] FMC Alias Private Key: 7
2,981,486 UART: [art] Extend RT PCRs Done
2,981,914 UART: [art] Lock RT PCRs Done
2,983,390 UART: [art] Populate DV Done
2,991,679 UART: [fht] FMC Alias Private Key: 7
2,992,693 UART: [art] Derive CDI
2,992,973 UART: [art] Store in in slot 0x4
3,078,486 UART: [art] Derive Key Pair
3,078,846 UART: [art] Store priv key in slot 0x5
3,091,930 UART: [art] Derive Key Pair - Done
3,106,836 UART: [art] Signing Cert with AUTHO
3,107,316 UART: RITY.KEYID = 7
3,122,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,217 UART: [art] PUB.X = A31663E4C838A26ADF196EF8EDB90CCD88B2085C272AE911E9FC135B0AF765214A58F8262E912E95E716D603FB17E695
3,129,981 UART: [art] PUB.Y = 8D26D39FEB7A5AB3C4049E1310EC12B0C6403B33ECC8AF7AA214BD4D79850F78DA24AC10D3A3E24F97B4674B9F58E866
3,136,939 UART: [art] SIG.R = A4CE34124D1D793D1BF90A902CAA8A34B792E50DAFB63616E262C8AB2DB222E36AF7F2BF5B12A4268BCA9BD40D67D0A8
3,143,720 UART: [art] SIG.S = DF5E44F02CC3230F592EB96A460FE3F833721BD17DAE03740FEC729AF84AD5AF2BB977EA1A13DB1F5D24712BB37E7752
3,167,623 UART: Caliptra RT
3,167,969 UART: [state] CFI Enabled
3,275,206 UART: [rt] RT listening for mailbox commands...
3,275,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,771 UART: [rt]cmd =0x41544d4e, len=14344
3,543,594 >>> mbox cmd response data (8 bytes)
3,543,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,536 UART: [rt]cmd =0x41545348, len=116
3,575,213 >>> mbox cmd response data (12 bytes)
3,575,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,254 UART:
3,576,270 UART: Running Caliptra ROM ...
3,576,678 UART:
3,576,820 UART: [state] CFI Enabled
3,579,476 UART: [state] LifecycleState = Unprovisioned
3,580,131 UART: [state] DebugLocked = No
3,580,661 UART: [state] WD Timer not started. Device not locked for debugging
3,581,767 UART: [kat] SHA2-256
4,385,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,389,446 UART: [kat] ++
4,389,598 UART: [kat] sha1
4,393,966 UART: [kat] SHA2-256
4,395,906 UART: [kat] SHA2-384
4,398,681 UART: [kat] SHA2-512-ACC
4,400,581 UART: [kat] ECC-384
4,410,248 UART: [kat] HMAC-384Kdf
4,414,816 UART: [kat] LMS
4,663,128 UART: [kat] --
4,664,118 UART: [update-reset] ++
5,976,296 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,977,327 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,127,193 >>> mbox cmd response: success
6,127,193 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,127,366 UART: [update-reset] Copying MAN_2 To MAN_1
6,135,380 UART: [update-reset Success] --
6,136,483 UART: [state] Locking Datavault
6,137,423 UART: [state] Locking PCR0, PCR1 and PCR31
6,138,027 UART: [state] Locking ICCM
6,138,577 UART: [exit] Launching FMC @ 0x40000130
6,143,906 UART:
6,143,922 UART: Running Caliptra FMC ...
6,144,330 UART:
6,144,473 UART: [state] CFI Enabled
6,233,746 UART: [art] Extend RT PCRs Done
6,234,174 UART: [art] Lock RT PCRs Done
6,235,423 UART: [art] Populate DV Done
6,243,842 UART: [fht] FMC Alias Private Key: 7
6,244,884 UART: [art] Derive CDI
6,245,164 UART: [art] Store in in slot 0x4
6,330,895 UART: [art] Derive Key Pair
6,331,255 UART: [art] Store priv key in slot 0x5
6,344,211 UART: [art] Derive Key Pair - Done
6,359,282 UART: [art] Signing Cert with AUTHO
6,359,762 UART: RITY.KEYID = 7
6,374,684 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,449 UART: [art] PUB.X = DD3B019615174F378D91914970DDCEB1355BD57902BB5552672BDA46DF75383A2B575FBE4A82C385DD36F0A193B1BC53
6,382,217 UART: [art] PUB.Y = D932B95CF16AF39488183D4409A7FE8E33BA6537CEE1266C46DCE5D8FDC2492BB141BC8DB1FA6E571CFAE7F91E40A524
6,389,182 UART: [art] SIG.R = BD8BB5323608FBE05B5843EEA5F33DC8FC368E709ED04B4E564B8E3E9BC3750B476954A6E15947E4420EF209FC1FAC42
6,395,952 UART: [art] SIG.S = 2DDAB93E1B37D27AF9D1AFBFC3C789A77AFD33333FC87867FFDE673B3DCDA23FBB0DF1899C3CE9ADF6DC10FFCE75F280
6,419,358 UART: Caliptra RT
6,419,704 UART: [state] CFI Enabled
6,703,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,734,226 UART: [rt]cmd =0x41545348, len=116
6,735,987 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,799 ready_for_fw is high
1,056,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,313 >>> mbox cmd response: success
2,685,511 UART:
2,685,527 UART: Running Caliptra FMC ...
2,685,935 UART:
2,686,078 UART: [state] CFI Enabled
2,696,779 UART: [fht] FMC Alias Private Key: 7
2,804,506 UART: [art] Extend RT PCRs Done
2,804,934 UART: [art] Lock RT PCRs Done
2,806,704 UART: [art] Populate DV Done
2,814,613 UART: [fht] FMC Alias Private Key: 7
2,815,647 UART: [art] Derive CDI
2,815,927 UART: [art] Store in in slot 0x4
2,901,612 UART: [art] Derive Key Pair
2,901,972 UART: [art] Store priv key in slot 0x5
2,915,600 UART: [art] Derive Key Pair - Done
2,930,268 UART: [art] Signing Cert with AUTHO
2,930,748 UART: RITY.KEYID = 7
2,946,010 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,775 UART: [art] PUB.X = 7DF492661F95F725C6323F508C7BA85C479C5A5C68C784141DD602CB22620A285430CE496100C3C0F9779BA133EBE729
2,953,513 UART: [art] PUB.Y = 076498975011D2A350458486957A3FA65CD3ABA5847669F99EC943004096D352E91FD0E27B0CB86A27D3FAA6D4E96E76
2,960,431 UART: [art] SIG.R = 8D75F89CA32D4E5D36E904497BD20144D01F12C99746232A364A59F2348DA69A2B44AB9C39819D6B01039E7C3DC0E082
2,967,187 UART: [art] SIG.S = 28F54B0183CFC01E0165EC9A8804FE96C54BD22ACEA1120DF47FB01C4F9C03A0524D95500AE30850FF96D46E1F937EFA
2,991,301 UART: Caliptra RT
2,991,647 UART: [state] CFI Enabled
3,099,381 UART: [rt] RT listening for mailbox commands...
3,100,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,782 UART: [rt]cmd =0x41544d4e, len=14344
3,367,523 >>> mbox cmd response data (8 bytes)
3,367,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,591 UART: [rt]cmd =0x41545348, len=116
3,399,572 >>> mbox cmd response data (12 bytes)
3,399,573 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,832,551 >>> mbox cmd response: success
5,832,551 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,846,119 UART:
5,846,135 UART: Running Caliptra FMC ...
5,846,543 UART:
5,846,686 UART: [state] CFI Enabled
5,936,301 UART: [art] Extend RT PCRs Done
5,936,729 UART: [art] Lock RT PCRs Done
5,938,018 UART: [art] Populate DV Done
5,946,307 UART: [fht] FMC Alias Private Key: 7
5,947,413 UART: [art] Derive CDI
5,947,693 UART: [art] Store in in slot 0x4
6,033,194 UART: [art] Derive Key Pair
6,033,554 UART: [art] Store priv key in slot 0x5
6,046,916 UART: [art] Derive Key Pair - Done
6,061,507 UART: [art] Signing Cert with AUTHO
6,061,987 UART: RITY.KEYID = 7
6,077,189 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,954 UART: [art] PUB.X = 49BC865FBFCD790DDA8F58509051BB88D7DCB6BBDC4CD339DD396E23F2688455DB6C174BC0AD0D778748A441BEB54D1E
6,084,738 UART: [art] PUB.Y = 9B51FEC3ACE576A54510F6CEE49DEA5F4645E0CF032FFE2F3047A2B01DD67CA4C892A86C8E5DDAF4D0928578D00E075F
6,091,699 UART: [art] SIG.R = 9EF43A26C6E6019591D18AE427E94729CFABEF0F650C7DAE884CB79FF2641101B52AFD95D2CEEA9ABCF344B959D12FC0
6,098,477 UART: [art] SIG.S = 953C8F4EEE636F3AB44475769460A726DAD7C94697F94B4B5D97808BE00BAEB47D3D2DA47DB8DB6491379ECAB57317C8
6,122,325 UART: Caliptra RT
6,122,671 UART: [state] CFI Enabled
6,406,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,437,376 UART: [rt]cmd =0x41545348, len=116
6,439,515 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
192,567 UART:
193,325 UART: Running Caliptra ROM ...
194,544 UART:
194,698 UART: [state] CFI Enabled
265,695 UART: [state] LifecycleState = Unprovisioned
267,613 UART: [state] DebugLocked = No
269,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,018 UART: [kat] SHA2-256
443,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,186 UART: [kat] ++
454,659 UART: [kat] sha1
465,239 UART: [kat] SHA2-256
467,958 UART: [kat] SHA2-384
475,006 UART: [kat] SHA2-512-ACC
477,374 UART: [kat] ECC-384
2,765,425 UART: [kat] HMAC-384Kdf
2,778,446 UART: [kat] LMS
3,968,781 UART: [kat] --
3,973,637 UART: [cold-reset] ++
3,974,637 UART: [fht] Storing FHT @ 0x50003400
3,985,626 UART: [idev] ++
3,986,258 UART: [idev] CDI.KEYID = 6
3,987,134 UART: [idev] SUBJECT.KEYID = 7
3,988,384 UART: [idev] UDS.KEYID = 0
3,989,462 ready_for_fw is high
3,989,654 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,081 UART: [idev] Erasing UDS.KEYID = 0
7,323,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,659 UART: [idev] --
7,349,700 UART: [ldev] ++
7,350,261 UART: [ldev] CDI.KEYID = 6
7,351,270 UART: [ldev] SUBJECT.KEYID = 5
7,352,419 UART: [ldev] AUTHORITY.KEYID = 7
7,353,693 UART: [ldev] FE.KEYID = 1
7,402,098 UART: [ldev] Erasing FE.KEYID = 1
10,732,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,133 UART: [ldev] --
13,097,133 UART: [fwproc] Waiting for Commands...
13,098,953 UART: [fwproc] Received command 0x46574c44
13,101,126 UART: [fwproc] Received Image of size 114036 bytes
17,155,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,620,708 >>> mbox cmd response: success
17,625,194 UART: [afmc] ++
17,625,788 UART: [afmc] CDI.KEYID = 6
17,626,697 UART: [afmc] SUBJECT.KEYID = 7
17,627,962 UART: [afmc] AUTHORITY.KEYID = 5
20,988,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,845 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,259 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,108 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,561 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,499 UART: [afmc] --
23,360,117 UART: [cold-reset] --
23,362,458 UART: [state] Locking Datavault
23,368,897 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,592 UART: [state] Locking ICCM
23,372,302 UART: [exit] Launching FMC @ 0x40000130
23,380,698 UART:
23,380,925 UART: Running Caliptra FMC ...
23,382,018 UART:
23,382,170 UART: [state] CFI Enabled
23,449,178 UART: [fht] FMC Alias Private Key: 7
25,787,044 UART: [art] Extend RT PCRs Done
25,788,263 UART: [art] Lock RT PCRs Done
25,790,116 UART: [art] Populate DV Done
25,795,405 UART: [fht] FMC Alias Private Key: 7
25,797,111 UART: [art] Derive CDI
25,797,927 UART: [art] Store in in slot 0x4
25,857,450 UART: [art] Derive Key Pair
25,858,444 UART: [art] Store priv key in slot 0x5
29,151,725 UART: [art] Derive Key Pair - Done
29,164,556 UART: [art] Signing Cert with AUTHO
29,165,908 UART: RITY.KEYID = 7
31,453,943 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,451 UART: [art] PUB.X = 03855E154C1EE12C293D222584C829CD5FD0DCB9BF90FB7BE9316F08222CDDF946662900D4DA78D5872D343648AB726F
31,462,660 UART: [art] PUB.Y = 3F9BA61328CA313F0AE2B62B1018AE8F89F889E7E2A28BD476CF89067D75FD260EA7D54C13578461EA83A9AE5F1F8E7E
31,469,918 UART: [art] SIG.R = C60EDCCD68AEB7EB4DA43F3C4E5AB09B8F3A39991090AFEBD35246FDC3A2D0649A9ECE36A7C64A64AA1095439A8DAA77
31,477,357 UART: [art] SIG.S = 7A4ACB548400E1E2663D3611B4922E8C8389C2211C1DF64E5229B0F4A6F3986F8805964E46F8AD305D69E080F828A5A6
32,782,511 UART: Caliptra RT
32,783,198 UART: [state] CFI Enabled
32,944,051 UART: [rt] RT listening for mailbox commands...
32,946,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,101,522 UART: [rt]cmd =0x41544d4e, len=14344
38,336,831 >>> mbox cmd response data (8 bytes)
38,337,431 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,368,343 UART: [rt]cmd =0x41545348, len=116
38,387,962 >>> mbox cmd response data (12 bytes)
38,389,142 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,419,653 UART: [rt]cmd =0x41545348, len=116
38,421,904 >>> mbox cmd response data (12 bytes)
40,481,085 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,626,274 UART:
40,626,645 UART: Running Caliptra ROM ...
40,627,777 UART:
40,627,942 UART: [state] CFI Enabled
40,689,926 UART: [state] LifecycleState = Unprovisioned
40,691,903 UART: [state] DebugLocked = No
40,694,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,699,370 UART: [kat] SHA2-256
40,869,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,879,597 UART: [kat] ++
40,880,088 UART: [kat] sha1
40,890,269 UART: [kat] SHA2-256
40,893,006 UART: [kat] SHA2-384
40,898,128 UART: [kat] SHA2-512-ACC
40,900,529 UART: [kat] ECC-384
43,196,217 UART: [kat] HMAC-384Kdf
43,227,531 UART: [kat] LMS
44,417,899 UART: [kat] --
44,421,797 UART: [update-reset] ++
48,553,046 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,557,689 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,939,634 >>> mbox cmd response: success
48,944,410 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,945,002 UART: [update-reset] Copying MAN_2 To MAN_1
48,963,081 UART: [update-reset Success] --
48,966,931 UART: [state] Locking Datavault
48,970,826 UART: [state] Locking PCR0, PCR1 and PCR31
48,972,582 UART: [state] Locking ICCM
48,974,051 UART: [exit] Launching FMC @ 0x40000130
48,982,500 UART:
48,982,728 UART: Running Caliptra FMC ...
48,983,819 UART:
48,983,982 UART: [state] CFI Enabled
49,088,128 UART: [art] Extend RT PCRs Done
49,089,358 UART: [art] Lock RT PCRs Done
49,090,926 UART: [art] Populate DV Done
49,096,176 UART: [fht] FMC Alias Private Key: 7
49,097,776 UART: [art] Derive CDI
49,098,584 UART: [art] Store in in slot 0x4
49,157,188 UART: [art] Derive Key Pair
49,158,221 UART: [art] Store priv key in slot 0x5
52,450,909 UART: [art] Derive Key Pair - Done
52,463,750 UART: [art] Signing Cert with AUTHO
52,465,044 UART: RITY.KEYID = 7
54,751,757 UART: [art] Erasing AUTHORITY.KEYID = 7
54,753,269 UART: [art] PUB.X = 48DF25BF09CF98BFED2250B372856C52D6595D3A437DCD2371CB9BCEBE5C657C4687FD8984AB72D316726B3914A30962
54,760,540 UART: [art] PUB.Y = 62A0AC66B701A208E2A881EA811B3C9C5D1520F567F3438E0922ACC5AF452EBF4EE6554061DDCA43E06F211550106778
54,767,769 UART: [art] SIG.R = C6586B1EA4DB4C43A992F40BF0DDA62A5879902F19C3EBC4C997E1F9AB7C082577858C27671BB03AE2581C627244DD3A
54,775,146 UART: [art] SIG.S = EB60F4818E3C25B7386BD437FB4B548A33E3E69EF007D2B2A67FD450A177F7A568F2CADF0D9F72992B83B907FEF9E544
56,079,897 UART: Caliptra RT
56,080,601 UART: [state] CFI Enabled
56,415,766 UART: [rt] RT listening for mailbox commands...
56,447,341 UART: [rt]cmd =0x41545348, len=116
56,467,162 >>> mbox cmd response data (12 bytes)
56,468,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,498,741 UART: [rt]cmd =0x41545348, len=116
56,500,885 >>> mbox cmd response data (12 bytes)
60,535,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,691,483 UART: [rt]cmd =0x41544d4e, len=14344
65,927,173 >>> mbox cmd response data (8 bytes)
65,927,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,958,420 UART: [rt]cmd =0x41545348, len=116
65,978,741 >>> mbox cmd response data (12 bytes)
65,979,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,009,880 UART: [rt]cmd =0x41545348, len=116
66,011,957 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,807,169 ready_for_fw is high
3,807,575 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,903,479 >>> mbox cmd response: success
23,587,929 UART:
23,588,309 UART: Running Caliptra FMC ...
23,589,450 UART:
23,589,604 UART: [state] CFI Enabled
23,659,181 UART: [fht] FMC Alias Private Key: 7
25,996,779 UART: [art] Extend RT PCRs Done
25,998,001 UART: [art] Lock RT PCRs Done
25,999,874 UART: [art] Populate DV Done
26,005,450 UART: [fht] FMC Alias Private Key: 7
26,007,110 UART: [art] Derive CDI
26,007,928 UART: [art] Store in in slot 0x4
26,068,863 UART: [art] Derive Key Pair
26,069,959 UART: [art] Store priv key in slot 0x5
29,362,943 UART: [art] Derive Key Pair - Done
29,375,672 UART: [art] Signing Cert with AUTHO
29,376,966 UART: RITY.KEYID = 7
31,663,359 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,859 UART: [art] PUB.X = 3002680E58B24030128D64FA85A3354B50E4561066CD7345370B8F9C9F1DEDA921B935D1693FAC90818BB0F9C8562E5D
31,672,091 UART: [art] PUB.Y = 461EB34158F7EFFDC25E738A4A408499A57246916A6128461B9B65E6408DE950ED5B4362C5F944F0950D51C22CB8ABA4
31,679,313 UART: [art] SIG.R = 05E46DBCC4722CC7B53037A834419D3C7B1538193EB2B9FBDFF3034CDDC0B829C7014E536E12AA9013E99AD988BE15EF
31,686,725 UART: [art] SIG.S = 94DE0E5412577A60EBB0C153A2452D52EAC21687E7EDBA2A3D04C381AB9AE6FBD4246159B232503ECF774AF03C9A5E74
32,992,208 UART: Caliptra RT
32,992,919 UART: [state] CFI Enabled
33,155,424 UART: [rt] RT listening for mailbox commands...
33,157,814 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,313,511 UART: [rt]cmd =0x41544d4e, len=14344
38,548,794 >>> mbox cmd response data (8 bytes)
38,549,364 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,580,060 UART: [rt]cmd =0x41545348, len=116
38,600,461 >>> mbox cmd response data (12 bytes)
38,601,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,632,486 UART: [rt]cmd =0x41545348, len=116
38,634,665 >>> mbox cmd response data (12 bytes)
40,698,856 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,430,212 >>> mbox cmd response: success
49,430,831 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,462,927 UART:
49,463,211 UART: Running Caliptra FMC ...
49,464,454 UART:
49,464,629 UART: [state] CFI Enabled
49,552,393 UART: [art] Extend RT PCRs Done
49,553,586 UART: [art] Lock RT PCRs Done
49,554,982 UART: [art] Populate DV Done
49,560,488 UART: [fht] FMC Alias Private Key: 7
49,562,065 UART: [art] Derive CDI
49,562,874 UART: [art] Store in in slot 0x4
49,621,342 UART: [art] Derive Key Pair
49,622,377 UART: [art] Store priv key in slot 0x5
52,915,154 UART: [art] Derive Key Pair - Done
52,927,877 UART: [art] Signing Cert with AUTHO
52,929,174 UART: RITY.KEYID = 7
55,217,097 UART: [art] Erasing AUTHORITY.KEYID = 7
55,218,609 UART: [art] PUB.X = 6B1F3F894ED26AF85C6F78E51AAD766C2753AE8C1513252C7F8ACBEEEBD43543D1AF9E1D056F3A2E19198FE134AA5AFB
55,225,847 UART: [art] PUB.Y = 6A97EED2F26665A5A3934ADAC02A5D677CD690BA81B174A2E8FFBF3D1D2A34F8FDC4D1C4A9A61097E133914F4F6A9D54
55,233,111 UART: [art] SIG.R = AD635CF53C61DDAB0CD85FBB12E3353A677130160EE8F3902E70DCD6ED63DAD179E4E2627477D5684E4C05823FA94D55
55,240,508 UART: [art] SIG.S = 91F1AED8EA70109746835BE141F5BDC60F0584B54EA1ED13E79CC1B86A4C1E4FB2E830537AFF911B326327EB66A0B7DE
56,545,795 UART: Caliptra RT
56,546,494 UART: [state] CFI Enabled
56,875,601 UART: [rt] RT listening for mailbox commands...
56,907,504 UART: [rt]cmd =0x41545348, len=116
56,926,909 >>> mbox cmd response data (12 bytes)
56,927,927 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,958,628 UART: [rt]cmd =0x41545348, len=116
56,960,906 >>> mbox cmd response data (12 bytes)
60,996,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,152,143 UART: [rt]cmd =0x41544d4e, len=14344
66,387,420 >>> mbox cmd response data (8 bytes)
66,388,002 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,418,692 UART: [rt]cmd =0x41545348, len=116
66,438,175 >>> mbox cmd response data (12 bytes)
66,438,599 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,469,359 UART: [rt]cmd =0x41545348, len=116
66,471,481 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,434 UART:
192,959 UART: Running Caliptra ROM ...
194,132 UART:
603,681 UART: [state] CFI Enabled
621,059 UART: [state] LifecycleState = Unprovisioned
623,011 UART: [state] DebugLocked = No
624,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,457 UART: [kat] SHA2-256
799,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,708 UART: [kat] ++
810,155 UART: [kat] sha1
821,097 UART: [kat] SHA2-256
823,785 UART: [kat] SHA2-384
829,704 UART: [kat] SHA2-512-ACC
832,069 UART: [kat] ECC-384
3,117,202 UART: [kat] HMAC-384Kdf
3,128,516 UART: [kat] LMS
4,318,648 UART: [kat] --
4,324,644 UART: [cold-reset] ++
4,326,076 UART: [fht] Storing FHT @ 0x50003400
4,335,930 UART: [idev] ++
4,336,572 UART: [idev] CDI.KEYID = 6
4,337,452 UART: [idev] SUBJECT.KEYID = 7
4,338,694 UART: [idev] UDS.KEYID = 0
4,339,774 ready_for_fw is high
4,339,992 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,249 UART: [idev] Erasing UDS.KEYID = 0
7,625,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,269 UART: [idev] --
7,651,961 UART: [ldev] ++
7,652,538 UART: [ldev] CDI.KEYID = 6
7,653,504 UART: [ldev] SUBJECT.KEYID = 5
7,654,716 UART: [ldev] AUTHORITY.KEYID = 7
7,655,947 UART: [ldev] FE.KEYID = 1
7,664,808 UART: [ldev] Erasing FE.KEYID = 1
10,957,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,742 UART: [ldev] --
13,315,464 UART: [fwproc] Waiting for Commands...
13,317,770 UART: [fwproc] Received command 0x46574c44
13,320,002 UART: [fwproc] Received Image of size 114036 bytes
17,376,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,267 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,576 >>> mbox cmd response: success
17,837,469 UART: [afmc] ++
17,838,059 UART: [afmc] CDI.KEYID = 6
17,839,084 UART: [afmc] SUBJECT.KEYID = 7
17,840,250 UART: [afmc] AUTHORITY.KEYID = 5
21,155,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,700 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,110 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,916 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,392 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,700 UART: [afmc] --
23,522,103 UART: [cold-reset] --
23,526,469 UART: [state] Locking Datavault
23,529,786 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,547 UART: [state] Locking ICCM
23,533,975 UART: [exit] Launching FMC @ 0x40000130
23,542,375 UART:
23,542,609 UART: Running Caliptra FMC ...
23,543,713 UART:
23,543,872 UART: [state] CFI Enabled
23,551,760 UART: [fht] FMC Alias Private Key: 7
25,882,676 UART: [art] Extend RT PCRs Done
25,884,150 UART: [art] Lock RT PCRs Done
25,885,911 UART: [art] Populate DV Done
25,891,050 UART: [fht] FMC Alias Private Key: 7
25,892,548 UART: [art] Derive CDI
25,893,284 UART: [art] Store in in slot 0x4
25,935,854 UART: [art] Derive Key Pair
25,936,886 UART: [art] Store priv key in slot 0x5
29,178,904 UART: [art] Derive Key Pair - Done
29,191,913 UART: [art] Signing Cert with AUTHO
29,193,221 UART: RITY.KEYID = 7
31,472,706 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,448 UART: [art] PUB.X = D69AF1D683567A2AF10DD017A2A7F557E561449E2EEADBB9595196DA6EA1510FA384E25A50D9DCD961A3620D1D5487EF
31,481,459 UART: [art] PUB.Y = B1761BDC3F8FA699C2DA122FD92032DC42231E71AA807834E8893D68289DD9910C4662CA69428D2AB07144BF5AB772BF
31,488,701 UART: [art] SIG.R = 2447DB076757B0582A0CC931701E5853AE09EF755E4722F0D43AB314D062B7715A7D656861A441C86CBD17DD832B4485
31,496,056 UART: [art] SIG.S = 0F4C434B8A8DB72CDE32D5DE7AF4F5FE85654F28F034158AFA016A6C8E2AA83629F57039267BD82F4CEBE29585BED2D1
32,800,573 UART: Caliptra RT
32,801,283 UART: [state] CFI Enabled
32,918,359 UART: [rt] RT listening for mailbox commands...
32,920,868 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,076,148 UART: [rt]cmd =0x41544d4e, len=14344
38,311,931 >>> mbox cmd response data (8 bytes)
38,312,574 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,343,325 UART: [rt]cmd =0x41545348, len=116
38,363,473 >>> mbox cmd response data (12 bytes)
38,364,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,395,481 UART: [rt]cmd =0x41545348, len=116
38,397,746 >>> mbox cmd response data (12 bytes)
40,451,518 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,596,524 UART:
40,596,885 UART: Running Caliptra ROM ...
40,598,015 UART:
40,598,186 UART: [state] CFI Enabled
40,609,711 UART: [state] LifecycleState = Unprovisioned
40,611,656 UART: [state] DebugLocked = No
40,613,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,617,744 UART: [kat] SHA2-256
40,787,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,797,984 UART: [kat] ++
40,798,523 UART: [kat] sha1
40,808,065 UART: [kat] SHA2-256
40,810,817 UART: [kat] SHA2-384
40,816,853 UART: [kat] SHA2-512-ACC
40,819,255 UART: [kat] ECC-384
43,103,491 UART: [kat] HMAC-384Kdf
43,115,508 UART: [kat] LMS
44,305,565 UART: [kat] --
44,309,787 UART: [update-reset] ++
48,445,853 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,448,756 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,830,745 >>> mbox cmd response: success
48,835,418 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,836,010 UART: [update-reset] Copying MAN_2 To MAN_1
48,854,955 UART: [update-reset Success] --
48,859,070 UART: [state] Locking Datavault
48,862,328 UART: [state] Locking PCR0, PCR1 and PCR31
48,864,083 UART: [state] Locking ICCM
48,866,430 UART: [exit] Launching FMC @ 0x40000130
48,874,824 UART:
48,875,053 UART: Running Caliptra FMC ...
48,876,078 UART:
48,876,225 UART: [state] CFI Enabled
48,920,739 UART: [art] Extend RT PCRs Done
48,921,884 UART: [art] Lock RT PCRs Done
48,923,392 UART: [art] Populate DV Done
48,928,583 UART: [fht] FMC Alias Private Key: 7
48,930,172 UART: [art] Derive CDI
48,930,918 UART: [art] Store in in slot 0x4
48,973,290 UART: [art] Derive Key Pair
48,974,290 UART: [art] Store priv key in slot 0x5
52,216,488 UART: [art] Derive Key Pair - Done
52,229,440 UART: [art] Signing Cert with AUTHO
52,230,740 UART: RITY.KEYID = 7
54,510,150 UART: [art] Erasing AUTHORITY.KEYID = 7
54,511,651 UART: [art] PUB.X = 832A1F049798579FE63DF833D3D37A588F476B2A54F76EC472FC284F3C1C0A2CDFA978391E6653B32FB130C598DCE011
54,518,884 UART: [art] PUB.Y = 408CB7898DAD6706E60AF328CD5410B22F26BB725AD77CBE9F0CD6B2CD2B57D015D71A7D51D8F2A35F1D69058B978CF7
54,526,158 UART: [art] SIG.R = E5F404FFC82A50A5C8E47A405B12F7A35A1A62489BC9C765A87B7C1ACB1EA6353E0AC82AD97A0C1ED83AD607E895E82C
54,533,564 UART: [art] SIG.S = 3381CBCC516130A62117AAFFBBFCEEA6C8F8D7BBAE10B71DAE9CF32105C3C0213EAAC4DC48843DB3EACF27DB96DF3121
55,838,906 UART: Caliptra RT
55,839,622 UART: [state] CFI Enabled
56,130,757 UART: [rt] RT listening for mailbox commands...
56,162,550 UART: [rt]cmd =0x41545348, len=116
56,182,504 >>> mbox cmd response data (12 bytes)
56,183,383 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,213,967 UART: [rt]cmd =0x41545348, len=116
56,216,251 >>> mbox cmd response data (12 bytes)
60,240,881 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,396,361 UART: [rt]cmd =0x41544d4e, len=14344
65,632,035 >>> mbox cmd response data (8 bytes)
65,632,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,663,161 UART: [rt]cmd =0x41545348, len=116
65,682,787 >>> mbox cmd response data (12 bytes)
65,683,224 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,713,881 UART: [rt]cmd =0x41545348, len=116
65,716,033 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,130,174 ready_for_fw is high
4,130,747 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,061,090 >>> mbox cmd response: success
23,708,650 UART:
23,709,055 UART: Running Caliptra FMC ...
23,710,350 UART:
23,710,513 UART: [state] CFI Enabled
23,718,458 UART: [fht] FMC Alias Private Key: 7
26,049,968 UART: [art] Extend RT PCRs Done
26,051,219 UART: [art] Lock RT PCRs Done
26,053,262 UART: [art] Populate DV Done
26,058,739 UART: [fht] FMC Alias Private Key: 7
26,060,228 UART: [art] Derive CDI
26,060,995 UART: [art] Store in in slot 0x4
26,103,969 UART: [art] Derive Key Pair
26,104,972 UART: [art] Store priv key in slot 0x5
29,347,079 UART: [art] Derive Key Pair - Done
29,360,196 UART: [art] Signing Cert with AUTHO
29,361,508 UART: RITY.KEYID = 7
31,641,237 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,746 UART: [art] PUB.X = EE7DB077A2C644BB7E927094D188BBDB44DE796871D619C1B85B1C43A9241E278B40E1474B2D205E80FCA73179682144
31,649,968 UART: [art] PUB.Y = D82AE155C4E0D32226591D21A039F3351947501A5F872F9FBE3EFAFBB44837F815D9187479AD5ABCB4DAFD40973459A5
31,657,194 UART: [art] SIG.R = 19179681A816D0844ED04091EB8A1536027CD06B284C0EBECE5C6193A871C81843AF960D0921F7F77953A40B51F043AB
31,664,563 UART: [art] SIG.S = E81817C1F8607BD6DD52B5F51025C5826AFD13E28EBC0DA69915E848496A33B0AD1CFC52A730013F0BCB3D2851F60934
32,969,877 UART: Caliptra RT
32,970,590 UART: [state] CFI Enabled
33,087,719 UART: [rt] RT listening for mailbox commands...
33,090,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,245,426 UART: [rt]cmd =0x41544d4e, len=14344
38,480,307 >>> mbox cmd response data (8 bytes)
38,480,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,511,623 UART: [rt]cmd =0x41545348, len=116
38,530,872 >>> mbox cmd response data (12 bytes)
38,532,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,562,621 UART: [rt]cmd =0x41545348, len=116
38,564,664 >>> mbox cmd response data (12 bytes)
40,617,187 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,284,672 >>> mbox cmd response: success
49,285,358 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,317,298 UART:
49,317,626 UART: Running Caliptra FMC ...
49,318,871 UART:
49,319,034 UART: [state] CFI Enabled
49,362,966 UART: [art] Extend RT PCRs Done
49,364,118 UART: [art] Lock RT PCRs Done
49,365,916 UART: [art] Populate DV Done
49,371,209 UART: [fht] FMC Alias Private Key: 7
49,372,843 UART: [art] Derive CDI
49,373,582 UART: [art] Store in in slot 0x4
49,416,080 UART: [art] Derive Key Pair
49,417,123 UART: [art] Store priv key in slot 0x5
52,658,977 UART: [art] Derive Key Pair - Done
52,671,941 UART: [art] Signing Cert with AUTHO
52,673,277 UART: RITY.KEYID = 7
54,952,419 UART: [art] Erasing AUTHORITY.KEYID = 7
54,953,925 UART: [art] PUB.X = 914DFBF26B351BB1595167206D99C1A685843636FD4402985ED96E6F5D26649C633C79C663BC3CC4C3ABF7ACA8893DB4
54,961,192 UART: [art] PUB.Y = BAFD589790E7194F4D5C4F3697B4FCED9FBC65E188836502C4CF1F291CE91D2E30AF4AA876C4F8F4ED3A2269E27AE211
54,968,456 UART: [art] SIG.R = C603865D8A504374A0A391734FAE6B4AE8C459CC4463DED67D368F3B49040EBE4B6027A505A0FAC4B04249B0773F4F47
54,975,830 UART: [art] SIG.S = 495F2CB13F6B9AB517E6596FA033CBFB6A3509857ECD9CEDC664EDCB27D0705CC2709D35F4CAE0EAC0627FC31D3177C3
56,280,942 UART: Caliptra RT
56,281,657 UART: [state] CFI Enabled
56,568,202 UART: [rt] RT listening for mailbox commands...
56,600,045 UART: [rt]cmd =0x41545348, len=116
56,619,657 >>> mbox cmd response data (12 bytes)
56,620,575 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,651,256 UART: [rt]cmd =0x41545348, len=116
56,653,351 >>> mbox cmd response data (12 bytes)
60,678,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,834,343 UART: [rt]cmd =0x41544d4e, len=14344
66,069,998 >>> mbox cmd response data (8 bytes)
66,071,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,101,747 UART: [rt]cmd =0x41545348, len=116
66,121,835 >>> mbox cmd response data (12 bytes)
66,122,313 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,153,138 UART: [rt]cmd =0x41545348, len=116
66,155,166 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,562 UART:
192,952 UART: Running Caliptra ROM ...
194,624 UART:
194,788 UART: [state] CFI Enabled
263,521 UART: [state] LifecycleState = Unprovisioned
265,390 UART: [state] DebugLocked = No
268,264 UART: [state] WD Timer not started. Device not locked for debugging
272,577 UART: [kat] SHA2-256
451,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,251 UART: [kat] ++
463,785 UART: [kat] sha1
474,664 UART: [kat] SHA2-256
477,681 UART: [kat] SHA2-384
485,162 UART: [kat] SHA2-512-ACC
488,098 UART: [kat] ECC-384
2,950,372 UART: [kat] HMAC-384Kdf
2,972,675 UART: [kat] LMS
3,502,097 UART: [kat] --
3,507,531 UART: [cold-reset] ++
3,509,185 UART: [fht] FHT @ 0x50003400
3,521,728 UART: [idev] ++
3,522,302 UART: [idev] CDI.KEYID = 6
3,523,363 UART: [idev] SUBJECT.KEYID = 7
3,524,470 UART: [idev] UDS.KEYID = 0
3,525,402 ready_for_fw is high
3,525,619 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,644 UART: [idev] Erasing UDS.KEYID = 0
6,029,828 UART: [idev] Sha1 KeyId Algorithm
6,051,445 UART: [idev] --
6,055,489 UART: [ldev] ++
6,056,075 UART: [ldev] CDI.KEYID = 6
6,056,995 UART: [ldev] SUBJECT.KEYID = 5
6,058,155 UART: [ldev] AUTHORITY.KEYID = 7
6,059,390 UART: [ldev] FE.KEYID = 1
6,100,499 UART: [ldev] Erasing FE.KEYID = 1
8,604,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,241 UART: [ldev] --
10,416,478 UART: [fwproc] Wait for Commands...
10,419,166 UART: [fwproc] Recv command 0x46574c44
10,421,263 UART: [fwproc] Recv'd Img size: 114360 bytes
13,830,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,292,074 >>> mbox cmd response: success
14,296,930 UART: [afmc] ++
14,297,533 UART: [afmc] CDI.KEYID = 6
14,298,447 UART: [afmc] SUBJECT.KEYID = 7
14,299,606 UART: [afmc] AUTHORITY.KEYID = 5
16,830,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,350 UART: [afmc] --
18,629,270 UART: [cold-reset] --
18,631,855 UART: [state] Locking Datavault
18,637,431 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,082 UART: [state] Locking ICCM
18,641,101 UART: [exit] Launching FMC @ 0x40000130
18,649,496 UART:
18,649,728 UART: Running Caliptra FMC ...
18,650,827 UART:
18,650,991 UART: [state] CFI Enabled
18,713,078 UART: [fht] FMC Alias Private Key: 7
20,476,932 UART: [art] Extend RT PCRs Done
20,478,140 UART: [art] Lock RT PCRs Done
20,479,815 UART: [art] Populate DV Done
20,485,333 UART: [fht] FMC Alias Private Key: 7
20,487,045 UART: [art] Derive CDI
20,487,869 UART: [art] Store in in slot 0x4
20,545,729 UART: [art] Derive Key Pair
20,546,785 UART: [art] Store priv key in slot 0x5
23,009,483 UART: [art] Derive Key Pair - Done
23,022,586 UART: [art] Signing Cert with AUTHO
23,023,894 UART: RITY.KEYID = 7
24,735,875 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,381 UART: [art] PUB.X = A1A13BD5FF724928824E3C4870AA283ABBB244686EFD55EAB532BA3840D3FD5EFAA4838DC95599917AAB853776AC51DF
24,744,655 UART: [art] PUB.Y = A4C0D97B78902AB035CF322B8F25373295E242F8DF6D9D1A9E35BB227916A2FA00729027967189B96928F3B81E5395EA
24,751,855 UART: [art] SIG.R = 17A341A114E5B3B74945BA02354F623973CF8BCE5D619EAAFB7DC49F82A27FFC39D1E296F01F2382083EBD9694B223D2
24,759,302 UART: [art] SIG.S = 20DC022BDB33C23BA734DA06952F6A105023977851765921762EAEC9510B6391DC9F5AAA8A03CC9A2C5D454ED37F512C
25,738,375 UART: Caliptra RT
25,739,059 UART: [state] CFI Enabled
25,904,592 UART: [rt] RT listening for mailbox commands...
25,907,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,062,241 UART: [rt]cmd =0x41544d4e, len=14344
29,993,113 >>> mbox cmd response data (8 bytes)
29,993,715 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,024,351 UART: [rt]cmd =0x41545348, len=116
30,044,719 >>> mbox cmd response data (12 bytes)
30,046,007 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,076,751 UART: [rt]cmd =0x41545348, len=116
30,079,008 >>> mbox cmd response data (12 bytes)
32,136,591 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,281,942 UART:
32,282,314 UART: Running Caliptra ROM ...
32,283,389 UART:
32,283,553 UART: [state] CFI Enabled
32,349,295 UART: [state] LifecycleState = Unprovisioned
32,351,142 UART: [state] DebugLocked = No
32,352,653 UART: [state] WD Timer not started. Device not locked for debugging
32,356,553 UART: [kat] SHA2-256
32,535,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,547,265 UART: [kat] ++
32,547,815 UART: [kat] sha1
32,559,677 UART: [kat] SHA2-256
32,562,741 UART: [kat] SHA2-384
32,569,481 UART: [kat] SHA2-512-ACC
32,572,430 UART: [kat] ECC-384
35,036,220 UART: [kat] HMAC-384Kdf
35,057,162 UART: [kat] LMS
35,586,657 UART: [kat] --
35,591,635 UART: [update-reset] ++
39,021,664 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,024,707 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,407,582 >>> mbox cmd response: success
39,408,841 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,409,318 UART: [update-reset] Copying MAN_2 To MAN_1
39,430,545 UART: [update-reset Success] --
39,433,688 UART: [state] Locking Datavault
39,438,260 UART: [state] Locking PCR0, PCR1 and PCR31
39,439,974 UART: [state] Locking ICCM
39,441,704 UART: [exit] Launching FMC @ 0x40000130
39,450,164 UART:
39,450,430 UART: Running Caliptra FMC ...
39,451,533 UART:
39,451,696 UART: [state] CFI Enabled
39,543,870 UART: [art] Extend RT PCRs Done
39,545,088 UART: [art] Lock RT PCRs Done
39,546,444 UART: [art] Populate DV Done
39,552,178 UART: [fht] FMC Alias Private Key: 7
39,553,836 UART: [art] Derive CDI
39,554,611 UART: [art] Store in in slot 0x4
39,612,772 UART: [art] Derive Key Pair
39,613,787 UART: [art] Store priv key in slot 0x5
42,077,765 UART: [art] Derive Key Pair - Done
42,090,679 UART: [art] Signing Cert with AUTHO
42,091,986 UART: RITY.KEYID = 7
43,803,174 UART: [art] Erasing AUTHORITY.KEYID = 7
43,804,690 UART: [art] PUB.X = FD4A04B679CD8E155E6FDB63F03966D716E53CD2C642CBA30E0776241CE4686741BA4237C734B57764A4EE468BD98191
43,811,940 UART: [art] PUB.Y = 6F64E66A005ADEA41165E0A4727541F554B5A0BF854F43B8BE4156B915636FA9C84C0AABB97F49F5A772F60CFB65EA46
43,819,158 UART: [art] SIG.R = FB4F71A2324931B0B9CCC25529EC1DDA996E67CCE366BF320D15EB51B6DE09DFC2AC636E3EE3889A775100F3B068D07F
43,826,535 UART: [art] SIG.S = 381DEF57A4A8F97B0B049D749C6D5B731654B2A49157DE33C209BB1C45A97AE319A6EA06E6367BB6972193FD316289A9
44,806,203 UART: Caliptra RT
44,806,893 UART: [state] CFI Enabled
45,143,459 UART: [rt] RT listening for mailbox commands...
45,175,458 UART: [rt]cmd =0x41545348, len=116
45,195,340 >>> mbox cmd response data (12 bytes)
45,196,422 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,227,224 UART: [rt]cmd =0x41545348, len=116
45,229,319 >>> mbox cmd response data (12 bytes)
49,255,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,411,521 UART: [rt]cmd =0x41544d4e, len=14344
53,341,952 >>> mbox cmd response data (8 bytes)
53,342,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,373,285 UART: [rt]cmd =0x41545348, len=116
53,393,598 >>> mbox cmd response data (12 bytes)
53,394,063 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,424,887 UART: [rt]cmd =0x41545348, len=116
53,426,974 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,563 writing to cptra_bootfsm_go
192,683 UART:
193,053 UART: Running Caliptra ROM ...
194,284 UART:
194,457 UART: [state] CFI Enabled
263,216 UART: [state] LifecycleState = Unprovisioned
265,630 UART: [state] DebugLocked = No
268,521 UART: [state] WD Timer not started. Device not locked for debugging
272,838 UART: [kat] SHA2-256
462,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,523 UART: [kat] ++
473,975 UART: [kat] sha1
485,626 UART: [kat] SHA2-256
488,644 UART: [kat] SHA2-384
494,500 UART: [kat] SHA2-512-ACC
497,083 UART: [kat] ECC-384
2,950,659 UART: [kat] HMAC-384Kdf
2,973,405 UART: [kat] LMS
3,505,169 UART: [kat] --
3,509,953 UART: [cold-reset] ++
3,511,220 UART: [fht] FHT @ 0x50003400
3,523,909 UART: [idev] ++
3,524,609 UART: [idev] CDI.KEYID = 6
3,525,504 UART: [idev] SUBJECT.KEYID = 7
3,526,755 UART: [idev] UDS.KEYID = 0
3,527,656 ready_for_fw is high
3,527,846 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,783 UART: [idev] Erasing UDS.KEYID = 0
6,030,139 UART: [idev] Sha1 KeyId Algorithm
6,053,103 UART: [idev] --
6,057,208 UART: [ldev] ++
6,057,893 UART: [ldev] CDI.KEYID = 6
6,058,820 UART: [ldev] SUBJECT.KEYID = 5
6,059,981 UART: [ldev] AUTHORITY.KEYID = 7
6,061,211 UART: [ldev] FE.KEYID = 1
6,101,615 UART: [ldev] Erasing FE.KEYID = 1
8,611,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,041 UART: [ldev] --
10,416,876 UART: [fwproc] Wait for Commands...
10,418,645 UART: [fwproc] Recv command 0x46574c44
10,420,952 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,225 >>> mbox cmd response: success
14,606,548 UART: [afmc] ++
14,607,260 UART: [afmc] CDI.KEYID = 6
14,608,452 UART: [afmc] SUBJECT.KEYID = 7
14,609,914 UART: [afmc] AUTHORITY.KEYID = 5
17,155,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,879,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,881,148 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,896,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,911,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,926,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,951,049 UART: [afmc] --
18,955,282 UART: [cold-reset] --
18,957,865 UART: [state] Locking Datavault
18,962,801 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,007 UART: [state] Locking ICCM
18,967,741 UART: [exit] Launching FMC @ 0x40000130
18,976,417 UART:
18,976,651 UART: Running Caliptra FMC ...
18,977,675 UART:
18,977,841 UART: [state] CFI Enabled
19,035,884 UART: [fht] FMC Alias Private Key: 7
20,799,821 UART: [art] Extend RT PCRs Done
20,801,020 UART: [art] Lock RT PCRs Done
20,802,565 UART: [art] Populate DV Done
20,808,024 UART: [fht] FMC Alias Private Key: 7
20,809,519 UART: [art] Derive CDI
20,810,253 UART: [art] Store in in slot 0x4
20,868,646 UART: [art] Derive Key Pair
20,869,711 UART: [art] Store priv key in slot 0x5
23,332,809 UART: [art] Derive Key Pair - Done
23,345,796 UART: [art] Signing Cert with AUTHO
23,347,101 UART: RITY.KEYID = 7
25,058,460 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,966 UART: [art] PUB.X = C15B7117686D0A97C820484769CD29AF03491B6AEA6C6EAF91008D49339ED1978C1B9B6AEB69BB8602FE10B8A3EE9DF4
25,067,256 UART: [art] PUB.Y = C9937D891914D83D8D79698E4AFC9DADCC161E1B4FF7EDEDABB2A5E4FB2B23426864EF91D1122765F080333AF49136A5
25,074,489 UART: [art] SIG.R = 0DF0BA00244C16EB7B00DB778723D47D804111FF3E5E573A62DB26D1FD03C3714240F4FF393887BD8AE9CCAA60ED71C8
25,081,862 UART: [art] SIG.S = DE8A603DF6E37F8389ED32C4E02FD07A87210D0C218D827CD94F709E7B3F0B2F8E9863B6C2D6A11359C967FF7E882A07
26,060,837 UART: Caliptra RT
26,061,539 UART: [state] CFI Enabled
26,227,384 UART: [rt] RT listening for mailbox commands...
26,229,947 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,385,133 UART: [rt]cmd =0x41544d4e, len=14344
30,315,494 >>> mbox cmd response data (8 bytes)
30,316,095 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,346,714 UART: [rt]cmd =0x41545348, len=116
30,366,406 >>> mbox cmd response data (12 bytes)
30,367,623 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,398,438 UART: [rt]cmd =0x41545348, len=116
30,401,062 >>> mbox cmd response data (12 bytes)
32,458,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,604,112 UART:
32,604,499 UART: Running Caliptra ROM ...
32,605,549 UART:
32,605,697 UART: [state] CFI Enabled
32,673,347 UART: [state] LifecycleState = Unprovisioned
32,675,453 UART: [state] DebugLocked = No
32,678,057 UART: [state] WD Timer not started. Device not locked for debugging
32,682,632 UART: [kat] SHA2-256
32,872,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,883,276 UART: [kat] ++
32,883,818 UART: [kat] sha1
32,894,066 UART: [kat] SHA2-256
32,897,114 UART: [kat] SHA2-384
32,904,348 UART: [kat] SHA2-512-ACC
32,906,972 UART: [kat] ECC-384
35,358,149 UART: [kat] HMAC-384Kdf
35,381,127 UART: [kat] LMS
35,912,670 UART: [kat] --
35,917,237 UART: [update-reset] ++
39,376,249 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,378,872 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,986,564 >>> mbox cmd response: success
39,991,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,991,999 UART: [update-reset] Copying MAN_2 To MAN_1
40,024,843 UART: [update-reset Success] --
40,029,296 UART: [state] Locking Datavault
40,032,176 UART: [state] Locking PCR0, PCR1 and PCR31
40,034,374 UART: [state] Locking ICCM
40,036,150 UART: [exit] Launching FMC @ 0x40000130
40,044,785 UART:
40,045,026 UART: Running Caliptra FMC ...
40,046,134 UART:
40,046,295 UART: [state] CFI Enabled
40,149,599 UART: [art] Extend RT PCRs Done
40,150,804 UART: [art] Lock RT PCRs Done
40,152,269 UART: [art] Populate DV Done
40,157,837 UART: [fht] FMC Alias Private Key: 7
40,159,426 UART: [art] Derive CDI
40,160,240 UART: [art] Store in in slot 0x4
40,218,674 UART: [art] Derive Key Pair
40,219,699 UART: [art] Store priv key in slot 0x5
42,682,448 UART: [art] Derive Key Pair - Done
42,695,395 UART: [art] Signing Cert with AUTHO
42,696,704 UART: RITY.KEYID = 7
44,408,280 UART: [art] Erasing AUTHORITY.KEYID = 7
44,409,793 UART: [art] PUB.X = CA5F2438D2666B29127A327D8EBD59DA6D2BD8BA812AC8C5F6069EF954987364C995F19B7A259EB504EBC25B71ACF24D
44,417,090 UART: [art] PUB.Y = 54C8879289A255D6FE50CDC559AF6049AB7280B90062582D5C0AF8B3CA6DE9F7C95439557937B4269C845AF3427F5A39
44,424,320 UART: [art] SIG.R = 600F1BF8DFBCBE2D24ACA96F0830832AF66CFE79842C4AE580C633035B59DCACD595215EAC8AA4DE0D471D4CE9F58DA5
44,431,701 UART: [art] SIG.S = 72EC163747278C54DD0753CF2FF92CCC5CB72EDB4A36586EBF8E179C04F5BE3232E4BE907D930D0CAAA7C6F24D26A3B6
45,410,555 UART: Caliptra RT
45,411,246 UART: [state] CFI Enabled
45,749,192 UART: [rt] RT listening for mailbox commands...
45,781,103 UART: [rt]cmd =0x41545348, len=116
45,800,685 >>> mbox cmd response data (12 bytes)
45,801,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,832,477 UART: [rt]cmd =0x41545348, len=116
45,834,413 >>> mbox cmd response data (12 bytes)
49,858,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,014,397 UART: [rt]cmd =0x41544d4e, len=14344
53,944,741 >>> mbox cmd response data (8 bytes)
53,945,299 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,976,035 UART: [rt]cmd =0x41545348, len=116
53,996,629 >>> mbox cmd response data (12 bytes)
53,997,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,027,588 UART: [rt]cmd =0x41545348, len=116
54,029,518 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,441,292 ready_for_fw is high
3,441,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,737,604 >>> mbox cmd response: success
19,024,107 UART:
19,024,507 UART: Running Caliptra FMC ...
19,025,707 UART:
19,025,880 UART: [state] CFI Enabled
19,093,659 UART: [fht] FMC Alias Private Key: 7
20,857,096 UART: [art] Extend RT PCRs Done
20,858,320 UART: [art] Lock RT PCRs Done
20,860,153 UART: [art] Populate DV Done
20,865,525 UART: [fht] FMC Alias Private Key: 7
20,867,069 UART: [art] Derive CDI
20,867,889 UART: [art] Store in in slot 0x4
20,926,017 UART: [art] Derive Key Pair
20,927,062 UART: [art] Store priv key in slot 0x5
23,389,490 UART: [art] Derive Key Pair - Done
23,402,823 UART: [art] Signing Cert with AUTHO
23,404,137 UART: RITY.KEYID = 7
25,115,151 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,659 UART: [art] PUB.X = E47D5DAEA32B67E88CF0CFF197C6525A0F46F65BCFAAFF19C82F1D0B9989A5284FF168545376C177CECD6AB933554BCB
25,123,934 UART: [art] PUB.Y = 4C354DAE418C1219A3EB1190C078DDF5DE7E6766492F749AD78ABC60E54A22A5B17C4CEA52D52389E27F82A8B3D99481
25,131,217 UART: [art] SIG.R = 21D1602E0ED2BD1C736143F28254AEF4D04210ED88239B7A878D925A2B13C78DD77367274E64C055F1C4EB8CEA0F71D1
25,138,628 UART: [art] SIG.S = 8EF3E826A6D6C555E3356BBE00507F324F85A5329556EE7DEA90434920B90C0F02A5E38687418826F5C529272B30C046
26,117,770 UART: Caliptra RT
26,118,477 UART: [state] CFI Enabled
26,282,608 UART: [rt] RT listening for mailbox commands...
26,285,000 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,440,387 UART: [rt]cmd =0x41544d4e, len=14344
30,370,869 >>> mbox cmd response data (8 bytes)
30,371,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,402,117 UART: [rt]cmd =0x41545348, len=116
30,422,109 >>> mbox cmd response data (12 bytes)
30,423,324 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,454,378 UART: [rt]cmd =0x41545348, len=116
30,456,522 >>> mbox cmd response data (12 bytes)
32,509,147 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,339,206 >>> mbox cmd response: success
40,339,887 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,374,684 UART:
40,374,974 UART: Running Caliptra FMC ...
40,376,091 UART:
40,376,245 UART: [state] CFI Enabled
40,478,091 UART: [art] Extend RT PCRs Done
40,479,291 UART: [art] Lock RT PCRs Done
40,480,951 UART: [art] Populate DV Done
40,486,362 UART: [fht] FMC Alias Private Key: 7
40,487,957 UART: [art] Derive CDI
40,488,772 UART: [art] Store in in slot 0x4
40,547,418 UART: [art] Derive Key Pair
40,548,458 UART: [art] Store priv key in slot 0x5
43,011,424 UART: [art] Derive Key Pair - Done
43,024,646 UART: [art] Signing Cert with AUTHO
43,025,974 UART: RITY.KEYID = 7
44,737,449 UART: [art] Erasing AUTHORITY.KEYID = 7
44,738,945 UART: [art] PUB.X = E34EFAA8AA0DEE0E1A1F1E1C73FB05EA53C778A1006AD0F99F827DADBEEA8A5066A2C74A4624A99DAB05FE7EC5884B48
44,746,237 UART: [art] PUB.Y = E75A35AAA484BCE343430F6DED60770AAA4CD1634AD0CF2F7106D4101DA2A32CF8F6CD235D8864E3A25FCB27D7F5CB4C
44,753,515 UART: [art] SIG.R = 17C87BBC8951A6B437368EAB15838C2707F252E3C5315CBAFB7FDFB1950D59CF1EDFE2D6CAEE7558C97CDF51E041ECB8
44,760,951 UART: [art] SIG.S = 3D536FCBF1356FE084CAC57D22E7D11782B12DE80D2ED246C59DBC60948F5070D14DCA8F14051E7D44EF7B3736C208FE
45,739,647 UART: Caliptra RT
45,740,368 UART: [state] CFI Enabled
46,079,358 UART: [rt] RT listening for mailbox commands...
46,111,370 UART: [rt]cmd =0x41545348, len=116
46,131,518 >>> mbox cmd response data (12 bytes)
46,132,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,163,288 UART: [rt]cmd =0x41545348, len=116
46,165,651 >>> mbox cmd response data (12 bytes)
50,191,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,346,542 UART: [rt]cmd =0x41544d4e, len=14344
54,277,004 >>> mbox cmd response data (8 bytes)
54,277,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,308,053 UART: [rt]cmd =0x41545348, len=116
54,328,947 >>> mbox cmd response data (12 bytes)
54,329,365 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,360,139 UART: [rt]cmd =0x41545348, len=116
54,362,526 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,548 UART:
192,903 UART: Running Caliptra ROM ...
194,134 UART:
603,714 UART: [state] CFI Enabled
617,924 UART: [state] LifecycleState = Unprovisioned
620,252 UART: [state] DebugLocked = No
622,071 UART: [state] WD Timer not started. Device not locked for debugging
627,030 UART: [kat] SHA2-256
816,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,723 UART: [kat] ++
828,201 UART: [kat] sha1
838,010 UART: [kat] SHA2-256
841,088 UART: [kat] SHA2-384
847,931 UART: [kat] SHA2-512-ACC
850,520 UART: [kat] ECC-384
3,291,429 UART: [kat] HMAC-384Kdf
3,305,289 UART: [kat] LMS
3,837,146 UART: [kat] --
3,842,879 UART: [cold-reset] ++
3,844,173 UART: [fht] FHT @ 0x50003400
3,854,736 UART: [idev] ++
3,855,443 UART: [idev] CDI.KEYID = 6
3,856,416 UART: [idev] SUBJECT.KEYID = 7
3,857,589 UART: [idev] UDS.KEYID = 0
3,858,506 ready_for_fw is high
3,858,696 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,327 UART: [idev] Erasing UDS.KEYID = 0
6,332,503 UART: [idev] Sha1 KeyId Algorithm
6,353,581 UART: [idev] --
6,359,792 UART: [ldev] ++
6,360,466 UART: [ldev] CDI.KEYID = 6
6,361,373 UART: [ldev] SUBJECT.KEYID = 5
6,362,581 UART: [ldev] AUTHORITY.KEYID = 7
6,363,809 UART: [ldev] FE.KEYID = 1
6,374,426 UART: [ldev] Erasing FE.KEYID = 1
8,852,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,185 UART: [ldev] --
10,644,449 UART: [fwproc] Wait for Commands...
10,646,647 UART: [fwproc] Recv command 0x46574c44
10,648,898 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,841,306 >>> mbox cmd response: success
14,845,394 UART: [afmc] ++
14,846,102 UART: [afmc] CDI.KEYID = 6
14,847,306 UART: [afmc] SUBJECT.KEYID = 7
14,848,732 UART: [afmc] AUTHORITY.KEYID = 5
17,356,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,518 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,739 UART: [afmc] --
19,155,548 UART: [cold-reset] --
19,159,198 UART: [state] Locking Datavault
19,166,656 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,783 UART: [state] Locking ICCM
19,170,924 UART: [exit] Launching FMC @ 0x40000130
19,179,545 UART:
19,179,827 UART: Running Caliptra FMC ...
19,180,951 UART:
19,181,107 UART: [state] CFI Enabled
19,189,206 UART: [fht] FMC Alias Private Key: 7
20,945,622 UART: [art] Extend RT PCRs Done
20,946,869 UART: [art] Lock RT PCRs Done
20,948,518 UART: [art] Populate DV Done
20,953,925 UART: [fht] FMC Alias Private Key: 7
20,955,617 UART: [art] Derive CDI
20,956,351 UART: [art] Store in in slot 0x4
20,999,100 UART: [art] Derive Key Pair
21,000,094 UART: [art] Store priv key in slot 0x5
23,426,409 UART: [art] Derive Key Pair - Done
23,439,460 UART: [art] Signing Cert with AUTHO
23,440,766 UART: RITY.KEYID = 7
25,146,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,519 UART: [art] PUB.X = A2BA66266309A74B70C206367A0D8FAAA514BFC54674E877FEE1BD6359EA72DEE8421A4B26A596820E52FBFBF5D3A721
25,154,800 UART: [art] PUB.Y = D03A77EA9197406B8D36807C41B69CD43A92F237B98C60DEA2ADC89CFF598FD5395C90D2BD2DB032F25CEA65E94E2FAC
25,162,087 UART: [art] SIG.R = 146F04876DC6155554B3174A36B693A965F50774630E949FABA954498B22D56660452FED560F2DECB719F29ECBC2D470
25,169,430 UART: [art] SIG.S = 68CF8BBA90D081499A752188D9CF5096CD9EA32C83E0D0CF4C651B72DF33EEF4632787E3158FFC2BD085630D7EDBD1BE
26,148,163 UART: Caliptra RT
26,148,870 UART: [state] CFI Enabled
26,266,307 UART: [rt] RT listening for mailbox commands...
26,268,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,423,906 UART: [rt]cmd =0x41544d4e, len=14344
30,354,498 >>> mbox cmd response data (8 bytes)
30,355,093 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,385,939 UART: [rt]cmd =0x41545348, len=116
30,405,453 >>> mbox cmd response data (12 bytes)
30,406,699 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,437,437 UART: [rt]cmd =0x41545348, len=116
30,439,736 >>> mbox cmd response data (12 bytes)
32,493,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,639,290 UART:
32,639,666 UART: Running Caliptra ROM ...
32,640,799 UART:
32,640,986 UART: [state] CFI Enabled
32,654,765 UART: [state] LifecycleState = Unprovisioned
32,656,647 UART: [state] DebugLocked = No
32,658,073 UART: [state] WD Timer not started. Device not locked for debugging
32,662,257 UART: [kat] SHA2-256
32,852,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,862,903 UART: [kat] ++
32,863,505 UART: [kat] sha1
32,876,306 UART: [kat] SHA2-256
32,879,322 UART: [kat] SHA2-384
32,883,685 UART: [kat] SHA2-512-ACC
32,886,244 UART: [kat] ECC-384
35,326,051 UART: [kat] HMAC-384Kdf
35,339,893 UART: [kat] LMS
35,871,506 UART: [kat] --
35,876,204 UART: [update-reset] ++
39,339,097 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,342,477 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,950,185 >>> mbox cmd response: success
39,954,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,955,417 UART: [update-reset] Copying MAN_2 To MAN_1
39,987,499 UART: [update-reset Success] --
39,991,782 UART: [state] Locking Datavault
39,996,068 UART: [state] Locking PCR0, PCR1 and PCR31
39,998,261 UART: [state] Locking ICCM
40,000,518 UART: [exit] Launching FMC @ 0x40000130
40,009,197 UART:
40,009,436 UART: Running Caliptra FMC ...
40,010,539 UART:
40,010,695 UART: [state] CFI Enabled
40,055,587 UART: [art] Extend RT PCRs Done
40,056,803 UART: [art] Lock RT PCRs Done
40,058,215 UART: [art] Populate DV Done
40,063,571 UART: [fht] FMC Alias Private Key: 7
40,065,330 UART: [art] Derive CDI
40,066,147 UART: [art] Store in in slot 0x4
40,108,661 UART: [art] Derive Key Pair
40,109,671 UART: [art] Store priv key in slot 0x5
42,536,127 UART: [art] Derive Key Pair - Done
42,549,334 UART: [art] Signing Cert with AUTHO
42,550,629 UART: RITY.KEYID = 7
44,255,718 UART: [art] Erasing AUTHORITY.KEYID = 7
44,257,238 UART: [art] PUB.X = 6A98EC532644179B15810C6277B4BBFD30252EC816C14632FCB69459DC47FC861D4B2BE4CFD723B076ED6AA762C70DB9
44,264,487 UART: [art] PUB.Y = DDA9DD034AB0AE869B50D9F7061026C9BFEC72F689BC6C20C618FAF7E29974565D3B479C79B72812D042A9795F1DF45A
44,271,726 UART: [art] SIG.R = 4F48E50B1B213E98ED8FE8487E19B45821355DFBE6427AD459631D45615E4401A40CA27E1034F2FD2E3EE66327206F52
44,279,125 UART: [art] SIG.S = 09344AD017D78851C5293F56BE460D615785AE5BDFABDF27533CF49159B60C11CA3894C92192731686092C4CEF8A954C
45,257,838 UART: Caliptra RT
45,258,553 UART: [state] CFI Enabled
45,546,817 UART: [rt] RT listening for mailbox commands...
45,578,657 UART: [rt]cmd =0x41545348, len=116
45,599,243 >>> mbox cmd response data (12 bytes)
45,600,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,631,120 UART: [rt]cmd =0x41545348, len=116
45,633,318 >>> mbox cmd response data (12 bytes)
49,658,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,814,008 UART: [rt]cmd =0x41544d4e, len=14344
53,744,311 >>> mbox cmd response data (8 bytes)
53,744,924 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,775,340 UART: [rt]cmd =0x41545348, len=116
53,795,799 >>> mbox cmd response data (12 bytes)
53,796,222 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,827,053 UART: [rt]cmd =0x41545348, len=116
53,829,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,757,468 ready_for_fw is high
3,757,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,966,555 >>> mbox cmd response: success
19,215,915 UART:
19,216,294 UART: Running Caliptra FMC ...
19,217,405 UART:
19,217,556 UART: [state] CFI Enabled
19,225,562 UART: [fht] FMC Alias Private Key: 7
20,982,561 UART: [art] Extend RT PCRs Done
20,983,788 UART: [art] Lock RT PCRs Done
20,985,272 UART: [art] Populate DV Done
20,990,839 UART: [fht] FMC Alias Private Key: 7
20,992,540 UART: [art] Derive CDI
20,993,279 UART: [art] Store in in slot 0x4
21,035,982 UART: [art] Derive Key Pair
21,037,019 UART: [art] Store priv key in slot 0x5
23,464,037 UART: [art] Derive Key Pair - Done
23,476,767 UART: [art] Signing Cert with AUTHO
23,478,065 UART: RITY.KEYID = 7
25,183,004 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,513 UART: [art] PUB.X = 06E1C93E81B42967CD41EF0F6275E828A02354D67C2F6879AACE766EB83E3E4C083B39B1CB9D3ADF75A8852520AEC464
25,191,787 UART: [art] PUB.Y = 7EF835D0FE81C8033380F01505F2F56D088002F6540E3388C3E5F73B0E47F2DB4787765F63A023F62E3D4F751B3220BF
25,199,005 UART: [art] SIG.R = 8BBF52C14B11C35535D77B9227B71045A9E66542540175220B89565E39EDFFC0EBE64F408FFBD8F92EC37A75E2284E84
25,206,407 UART: [art] SIG.S = 3E389A78ADEA9265F7863B9B47568298BECC5208B6E8075504787B2E212823183B034CE31BFAA866E9644F3C18A66791
26,185,461 UART: Caliptra RT
26,186,172 UART: [state] CFI Enabled
26,303,931 UART: [rt] RT listening for mailbox commands...
26,306,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,461,595 UART: [rt]cmd =0x41544d4e, len=14344
30,391,777 >>> mbox cmd response data (8 bytes)
30,392,348 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,423,236 UART: [rt]cmd =0x41545348, len=116
30,443,547 >>> mbox cmd response data (12 bytes)
30,444,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,475,528 UART: [rt]cmd =0x41545348, len=116
30,477,869 >>> mbox cmd response data (12 bytes)
32,530,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,258,996 >>> mbox cmd response: success
40,259,643 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,293,897 UART:
40,294,202 UART: Running Caliptra FMC ...
40,295,402 UART:
40,295,565 UART: [state] CFI Enabled
40,340,102 UART: [art] Extend RT PCRs Done
40,341,289 UART: [art] Lock RT PCRs Done
40,342,741 UART: [art] Populate DV Done
40,348,093 UART: [fht] FMC Alias Private Key: 7
40,349,791 UART: [art] Derive CDI
40,350,601 UART: [art] Store in in slot 0x4
40,392,978 UART: [art] Derive Key Pair
40,394,022 UART: [art] Store priv key in slot 0x5
42,820,542 UART: [art] Derive Key Pair - Done
42,833,379 UART: [art] Signing Cert with AUTHO
42,834,679 UART: RITY.KEYID = 7
44,540,445 UART: [art] Erasing AUTHORITY.KEYID = 7
44,541,934 UART: [art] PUB.X = 9CBE12BC566D1FCC0CC1E3A88D8057368A755A4B9EC67E9D4F97E023DA4545E303A224EF835F4B25C09506790DB54763
44,549,218 UART: [art] PUB.Y = 2E33DA7322189D5D8EBFA7DB847E063D79551A8E3FC11BA5269578F0FB5DAF86FA43C29BBC6DB55B76883920B3D2A461
44,556,521 UART: [art] SIG.R = B0349765ACCFDDA8EE50E4B53E132BD00E7B3461759D7B1D5AE27C49CE43571B793AB80862935C45BC866DA242AD059D
44,563,915 UART: [art] SIG.S = 7014719CDD67208EE16DF92670F2E9A0601BFFF2C294EBE2B81DE82C26EC0D8F308C131924AB971B3CCFA52102560307
45,542,799 UART: Caliptra RT
45,543,509 UART: [state] CFI Enabled
45,832,095 UART: [rt] RT listening for mailbox commands...
45,863,902 UART: [rt]cmd =0x41545348, len=116
45,884,016 >>> mbox cmd response data (12 bytes)
45,884,933 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,915,843 UART: [rt]cmd =0x41545348, len=116
45,917,899 >>> mbox cmd response data (12 bytes)
49,942,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,097,998 UART: [rt]cmd =0x41544d4e, len=14344
54,027,679 >>> mbox cmd response data (8 bytes)
54,028,217 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,058,953 UART: [rt]cmd =0x41545348, len=116
54,079,048 >>> mbox cmd response data (12 bytes)
54,079,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,110,287 UART: [rt]cmd =0x41545348, len=116
54,112,284 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,271 UART: [kat] SHA2-256
882,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,317 UART: [kat] ++
886,469 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,426 UART: [kat] SHA2-512-ACC
897,327 UART: [kat] ECC-384
903,146 UART: [kat] HMAC-384Kdf
907,672 UART: [kat] LMS
1,475,868 UART: [kat] --
1,476,649 UART: [cold-reset] ++
1,477,101 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 ready_for_fw is high
1,481,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,754 UART: [idev] Erasing UDS.KEYID = 0
1,505,168 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,936 UART: [idev] --
1,514,971 UART: [ldev] ++
1,515,139 UART: [ldev] CDI.KEYID = 6
1,515,502 UART: [ldev] SUBJECT.KEYID = 5
1,515,928 UART: [ldev] AUTHORITY.KEYID = 7
1,516,391 UART: [ldev] FE.KEYID = 1
1,521,687 UART: [ldev] Erasing FE.KEYID = 1
1,547,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,748 UART: [ldev] --
1,586,015 UART: [fwproc] Waiting for Commands...
1,586,812 UART: [fwproc] Received command 0x46574c44
1,587,603 UART: [fwproc] Received Image of size 114360 bytes
2,885,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,400 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,591 >>> mbox cmd response: success
3,078,807 UART: [afmc] ++
3,078,975 UART: [afmc] CDI.KEYID = 6
3,079,337 UART: [afmc] SUBJECT.KEYID = 7
3,079,762 UART: [afmc] AUTHORITY.KEYID = 5
3,114,227 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,101 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,494 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,184 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,891 UART: [afmc] --
3,156,857 UART: [cold-reset] --
3,157,671 UART: [state] Locking Datavault
3,158,884 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,488 UART: [state] Locking ICCM
3,159,934 UART: [exit] Launching FMC @ 0x40000130
3,165,263 UART:
3,165,279 UART: Running Caliptra FMC ...
3,165,687 UART:
3,165,741 UART: [state] CFI Enabled
3,176,200 UART: [fht] FMC Alias Private Key: 7
3,284,103 UART: [art] Extend RT PCRs Done
3,284,531 UART: [art] Lock RT PCRs Done
3,285,979 UART: [art] Populate DV Done
3,294,262 UART: [fht] FMC Alias Private Key: 7
3,295,432 UART: [art] Derive CDI
3,295,712 UART: [art] Store in in slot 0x4
3,381,639 UART: [art] Derive Key Pair
3,381,999 UART: [art] Store priv key in slot 0x5
3,395,491 UART: [art] Derive Key Pair - Done
3,410,367 UART: [art] Signing Cert with AUTHO
3,410,847 UART: RITY.KEYID = 7
3,426,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,152 UART: [art] PUB.X = 2AE9800701832EA830D8417B5825E0CE7DD6601D88C582EAE8596AB1A0843D2F98A05DD15ABDBDCBC3225C1D58EF469F
3,433,928 UART: [art] PUB.Y = 0661B708C2A99971D62231669968C3CE75A215271383D32DE7509B14B9B6B10FE97565579AAD9EDD594F226FA4332339
3,440,859 UART: [art] SIG.R = 4CC3761052C417A6B17D53E577CD8A07305E966690CBE5659B1C44D130A3C4F808BB2877E923598E3585229B3D61D5F6
3,447,617 UART: [art] SIG.S = 3DA8343F63142F7EC1DE82B5DFC82F4A6DE02782EC9E7BAE3D615448E0AFB7B3012967E92EB9832A659C188D64A298C8
3,471,867 UART: Caliptra RT
3,472,121 UART: [state] CFI Enabled
3,580,728 UART: [rt] RT listening for mailbox commands...
3,581,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,059 UART: [rt]cmd =0x41544d4e, len=14344
3,848,828 >>> mbox cmd response data (8 bytes)
3,848,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,852 UART: [rt]cmd =0x41545348, len=116
3,900,547 >>> mbox cmd response data (12 bytes)
3,900,548 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,649 UART: [rt]cmd =0x41545348, len=116
3,932,314 >>> mbox cmd response data (12 bytes)
3,932,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,058 UART:
3,933,074 UART: Running Caliptra ROM ...
3,933,482 UART:
3,933,536 UART: [state] CFI Enabled
3,935,704 UART: [state] LifecycleState = Unprovisioned
3,936,359 UART: [state] DebugLocked = No
3,937,043 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,938,582 UART: [kat] SHA2-256
4,732,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,736,628 UART: [kat] ++
4,736,780 UART: [kat] sha1
4,741,084 UART: [kat] SHA2-256
4,743,022 UART: [kat] SHA2-384
4,745,669 UART: [kat] SHA2-512-ACC
4,747,569 UART: [kat] ECC-384
4,753,098 UART: [kat] HMAC-384Kdf
4,757,792 UART: [kat] LMS
5,325,988 UART: [kat] --
5,326,787 UART: [update-reset] ++
6,660,898 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,662,158 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,812,076 >>> mbox cmd response: success
6,812,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,812,351 UART: [update-reset] Copying MAN_2 To MAN_1
6,820,365 UART: [update-reset Success] --
6,821,204 UART: [state] Locking Datavault
6,821,972 UART: [state] Locking PCR0, PCR1 and PCR31
6,822,576 UART: [state] Locking ICCM
6,823,228 UART: [exit] Launching FMC @ 0x40000130
6,828,557 UART:
6,828,573 UART: Running Caliptra FMC ...
6,828,981 UART:
6,829,035 UART: [state] CFI Enabled
6,917,660 UART: [art] Extend RT PCRs Done
6,918,088 UART: [art] Lock RT PCRs Done
6,919,199 UART: [art] Populate DV Done
6,927,602 UART: [fht] FMC Alias Private Key: 7
6,928,742 UART: [art] Derive CDI
6,929,022 UART: [art] Store in in slot 0x4
7,014,755 UART: [art] Derive Key Pair
7,015,115 UART: [art] Store priv key in slot 0x5
7,028,677 UART: [art] Derive Key Pair - Done
7,043,221 UART: [art] Signing Cert with AUTHO
7,043,701 UART: RITY.KEYID = 7
7,058,879 UART: [art] Erasing AUTHORITY.KEYID = 7
7,059,644 UART: [art] PUB.X = 468D385AB3E0EECEBA4DC9B17AD7547B6AFC7E91BFC251E1B35331F863455C74F6DBECA110B25C4A573A1E9E7F40F18B
7,066,436 UART: [art] PUB.Y = 4C0F6F2E0694710369084C57E50C604F6D59DDC16A3C4E4F09707909215FFE816D70A9B0D9E2CCA6809133CB996C1AFE
7,073,369 UART: [art] SIG.R = 253BCB78F638C38845D0B58B9999708ED217166B2251ADCBAC6D697F8967CAF7AA567694AA8032C79E384FC750DBC675
7,080,143 UART: [art] SIG.S = FCAC8D248C35966B42D97A8E70E1F2088CE73D23C57DC366FF419E0305F1A1049EB771C333756CCE1505439569B08D37
7,103,901 UART: Caliptra RT
7,104,155 UART: [state] CFI Enabled
7,383,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,414,987 UART: [rt]cmd =0x41545348, len=116
7,436,828 >>> mbox cmd response data (12 bytes)
7,436,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,467,116 UART: [rt]cmd =0x41545348, len=116
7,468,893 >>> mbox cmd response data (12 bytes)
7,468,894 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,591,479 UART: [rt]cmd =0x41544d4e, len=14344
7,735,976 >>> mbox cmd response data (8 bytes)
7,735,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,766,206 UART: [rt]cmd =0x41545348, len=116
7,788,673 >>> mbox cmd response data (12 bytes)
7,788,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,818,877 UART: [rt]cmd =0x41545348, len=116
7,820,647 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,081 ready_for_fw is high
1,363,081 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,743 >>> mbox cmd response: success
2,989,417 UART:
2,989,433 UART: Running Caliptra FMC ...
2,989,841 UART:
2,989,895 UART: [state] CFI Enabled
3,000,438 UART: [fht] FMC Alias Private Key: 7
3,107,891 UART: [art] Extend RT PCRs Done
3,108,319 UART: [art] Lock RT PCRs Done
3,109,731 UART: [art] Populate DV Done
3,117,806 UART: [fht] FMC Alias Private Key: 7
3,118,962 UART: [art] Derive CDI
3,119,242 UART: [art] Store in in slot 0x4
3,204,897 UART: [art] Derive Key Pair
3,205,257 UART: [art] Store priv key in slot 0x5
3,218,007 UART: [art] Derive Key Pair - Done
3,232,688 UART: [art] Signing Cert with AUTHO
3,233,168 UART: RITY.KEYID = 7
3,248,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,199 UART: [art] PUB.X = 53FA88525FDBAFD64A079B6F89E19375B67EA4DDA6676D9EE2826AD4BB08AAE50A9690D982903E0F52D44A0FF201D22E
3,255,965 UART: [art] PUB.Y = 9A1E0BE481E700F88EDE702AC9C910FA669B2303503F8C806411C9D2354EBF161D79DB79D151BF8D6634D3DC76412D3C
3,262,893 UART: [art] SIG.R = F27AF3B6DC0ACF333A2566C705D5DEBF4FBE9B8BDCFE375886702F8798E99F9B1553616C04E549AB55A48B5A0AA22595
3,269,665 UART: [art] SIG.S = 04F013F5AFBBC2CD1EAD1269F2C5EED77BDB6D0F16DB57B0C949C7D8891142DAAD660F6496C6D997E58D54ACBC5CE16B
3,293,451 UART: Caliptra RT
3,293,705 UART: [state] CFI Enabled
3,401,543 UART: [rt] RT listening for mailbox commands...
3,402,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,984 UART: [rt]cmd =0x41544d4e, len=14344
3,669,609 >>> mbox cmd response data (8 bytes)
3,669,610 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,679 UART: [rt]cmd =0x41545348, len=116
3,720,982 >>> mbox cmd response data (12 bytes)
3,720,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,912 UART: [rt]cmd =0x41545348, len=116
3,752,697 >>> mbox cmd response data (12 bytes)
3,752,698 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,514,593 >>> mbox cmd response: success
6,514,593 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,528,056 UART:
6,528,072 UART: Running Caliptra FMC ...
6,528,480 UART:
6,528,534 UART: [state] CFI Enabled
6,617,683 UART: [art] Extend RT PCRs Done
6,618,111 UART: [art] Lock RT PCRs Done
6,619,408 UART: [art] Populate DV Done
6,627,747 UART: [fht] FMC Alias Private Key: 7
6,628,823 UART: [art] Derive CDI
6,629,103 UART: [art] Store in in slot 0x4
6,714,902 UART: [art] Derive Key Pair
6,715,262 UART: [art] Store priv key in slot 0x5
6,728,528 UART: [art] Derive Key Pair - Done
6,742,927 UART: [art] Signing Cert with AUTHO
6,743,407 UART: RITY.KEYID = 7
6,758,849 UART: [art] Erasing AUTHORITY.KEYID = 7
6,759,614 UART: [art] PUB.X = DAE3BBD31571C4FDFAB5E66A6D2FDBD51D357F7F7019D5D392F4E881E9A6B251A16C2396576B087D5D112353CE8959C7
6,766,393 UART: [art] PUB.Y = 936DCC68F146F93A2F588BAD1279CDBE054C35740EDDC6D51E0F3B05EE288289F132484E475AA26F24F192A7C77679E3
6,773,337 UART: [art] SIG.R = 21AD0043303B8CBCBB2EAF1F3A6D195C1BE9669CC1BD52CA630F8B8B4C0174C6F7B08FB98C6A8EEDD9E9986362DA63BA
6,780,103 UART: [art] SIG.S = C35DCF2C675D02830BDE9D181D2DEADC5F18B0C1E22DD2D4F899E27D3C0FC4EB10388B7CC3D70136DFBA8D08BC0DEA60
6,804,620 UART: Caliptra RT
6,804,874 UART: [state] CFI Enabled
7,083,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,114,156 UART: [rt]cmd =0x41545348, len=116
7,136,429 >>> mbox cmd response data (12 bytes)
7,136,430 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,166,611 UART: [rt]cmd =0x41545348, len=116
7,168,532 >>> mbox cmd response data (12 bytes)
7,168,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,291,146 UART: [rt]cmd =0x41544d4e, len=14344
7,435,783 >>> mbox cmd response data (8 bytes)
7,435,784 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,465,845 UART: [rt]cmd =0x41545348, len=116
7,487,942 >>> mbox cmd response data (12 bytes)
7,487,943 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,517,910 UART: [rt]cmd =0x41545348, len=116
7,519,896 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,655 UART: [kat] SHA2-512-ACC
897,556 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,771 UART: [kat] LMS
1,475,967 UART: [kat] --
1,476,836 UART: [cold-reset] ++
1,477,414 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 ready_for_fw is high
1,481,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,123 UART: [idev] Erasing UDS.KEYID = 0
1,505,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,515,006 UART: [ldev] ++
1,515,174 UART: [ldev] CDI.KEYID = 6
1,515,537 UART: [ldev] SUBJECT.KEYID = 5
1,515,963 UART: [ldev] AUTHORITY.KEYID = 7
1,516,426 UART: [ldev] FE.KEYID = 1
1,521,516 UART: [ldev] Erasing FE.KEYID = 1
1,546,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,935 UART: [ldev] --
1,586,296 UART: [fwproc] Waiting for Commands...
1,586,963 UART: [fwproc] Received command 0x46574c44
1,587,754 UART: [fwproc] Received Image of size 114360 bytes
2,886,659 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,104 >>> mbox cmd response: success
3,079,196 UART: [afmc] ++
3,079,364 UART: [afmc] CDI.KEYID = 6
3,079,726 UART: [afmc] SUBJECT.KEYID = 7
3,080,151 UART: [afmc] AUTHORITY.KEYID = 5
3,115,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,197 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,887 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,810 UART: [afmc] --
3,158,710 UART: [cold-reset] --
3,159,418 UART: [state] Locking Datavault
3,160,637 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,241 UART: [state] Locking ICCM
3,161,775 UART: [exit] Launching FMC @ 0x40000130
3,167,104 UART:
3,167,120 UART: Running Caliptra FMC ...
3,167,528 UART:
3,167,671 UART: [state] CFI Enabled
3,178,352 UART: [fht] FMC Alias Private Key: 7
3,286,391 UART: [art] Extend RT PCRs Done
3,286,819 UART: [art] Lock RT PCRs Done
3,288,351 UART: [art] Populate DV Done
3,296,730 UART: [fht] FMC Alias Private Key: 7
3,297,812 UART: [art] Derive CDI
3,298,092 UART: [art] Store in in slot 0x4
3,383,719 UART: [art] Derive Key Pair
3,384,079 UART: [art] Store priv key in slot 0x5
3,397,253 UART: [art] Derive Key Pair - Done
3,412,271 UART: [art] Signing Cert with AUTHO
3,412,751 UART: RITY.KEYID = 7
3,427,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,566 UART: [art] PUB.X = F5187FFFE912B23C5BAD0B360D42C1B279C4A8F2F388F8195A5FBB08DE6FE717634B45D4C0AA86F3ED7536CDD127F084
3,435,343 UART: [art] PUB.Y = 9AA2582F07F0E79FF18997CE768DC8AD9A4B854BC0FD9D2EA5A842501EB999594FABDCBEC94D36A74F539A05ABEF5BD7
3,442,311 UART: [art] SIG.R = F0D462296B8DAA01259A62456B73EF99086CDA29B1A6CF84F3F4EC5C3A56701345BDDEF2D702DA9D45C9B7E27CAEAA9A
3,449,092 UART: [art] SIG.S = 85E9A31AF563C049E56D4B211A62347C4E19FC64FED04817A1E1742F4504B2C9CEA4D9E3A5EE98726B8994ED5D4CB14D
3,472,562 UART: Caliptra RT
3,472,908 UART: [state] CFI Enabled
3,581,065 UART: [rt] RT listening for mailbox commands...
3,581,735 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,514 UART: [rt]cmd =0x41544d4e, len=14344
3,849,455 >>> mbox cmd response data (8 bytes)
3,849,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,395 UART: [rt]cmd =0x41545348, len=116
3,901,772 >>> mbox cmd response data (12 bytes)
3,901,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,702 UART: [rt]cmd =0x41545348, len=116
3,933,801 >>> mbox cmd response data (12 bytes)
3,933,802 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,589 UART:
3,934,605 UART: Running Caliptra ROM ...
3,935,013 UART:
3,935,154 UART: [state] CFI Enabled
3,937,580 UART: [state] LifecycleState = Unprovisioned
3,938,235 UART: [state] DebugLocked = No
3,938,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,940,532 UART: [kat] SHA2-256
4,734,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,738,578 UART: [kat] ++
4,738,730 UART: [kat] sha1
4,742,942 UART: [kat] SHA2-256
4,744,880 UART: [kat] SHA2-384
4,747,683 UART: [kat] SHA2-512-ACC
4,749,583 UART: [kat] ECC-384
4,755,074 UART: [kat] HMAC-384Kdf
4,759,610 UART: [kat] LMS
5,327,806 UART: [kat] --
5,328,705 UART: [update-reset] ++
6,662,262 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,663,456 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,813,374 >>> mbox cmd response: success
6,813,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,813,725 UART: [update-reset] Copying MAN_2 To MAN_1
6,821,739 UART: [update-reset Success] --
6,822,782 UART: [state] Locking Datavault
6,823,626 UART: [state] Locking PCR0, PCR1 and PCR31
6,824,230 UART: [state] Locking ICCM
6,824,898 UART: [exit] Launching FMC @ 0x40000130
6,830,227 UART:
6,830,243 UART: Running Caliptra FMC ...
6,830,651 UART:
6,830,794 UART: [state] CFI Enabled
6,919,651 UART: [art] Extend RT PCRs Done
6,920,079 UART: [art] Lock RT PCRs Done
6,921,388 UART: [art] Populate DV Done
6,929,903 UART: [fht] FMC Alias Private Key: 7
6,930,885 UART: [art] Derive CDI
6,931,165 UART: [art] Store in in slot 0x4
7,016,942 UART: [art] Derive Key Pair
7,017,302 UART: [art] Store priv key in slot 0x5
7,030,514 UART: [art] Derive Key Pair - Done
7,045,264 UART: [art] Signing Cert with AUTHO
7,045,744 UART: RITY.KEYID = 7
7,061,198 UART: [art] Erasing AUTHORITY.KEYID = 7
7,061,963 UART: [art] PUB.X = ECAEEFF2AB01EBE9D72F367C480A5C89C4DF9623CC11B0AD18502EA61C01B8B470403DE55B1F0DF40B1E5005C48DF359
7,068,735 UART: [art] PUB.Y = E70BCB59ACCD65451E3361C0836FD5D6F62B447CB285FD6BE61C5306AFF952A98586E9B97D738397D2CC5C7E88591B77
7,075,687 UART: [art] SIG.R = 3E76AC3C5D5A25737B5BCA072DBE7AC5418C87038BC3378DB45945A9ACD967E8EF71080903BDFFE9077D0227205C47BC
7,082,446 UART: [art] SIG.S = E29B05C6CF99618066D264472B88E1899B498918E19D34C9C599169C67108DEFC5590EEEA64B835022952AA372FE49F8
7,106,247 UART: Caliptra RT
7,106,593 UART: [state] CFI Enabled
7,387,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,418,285 UART: [rt]cmd =0x41545348, len=116
7,439,442 >>> mbox cmd response data (12 bytes)
7,439,443 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,469,416 UART: [rt]cmd =0x41545348, len=116
7,471,053 >>> mbox cmd response data (12 bytes)
7,471,054 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,593,353 UART: [rt]cmd =0x41544d4e, len=14344
7,738,080 >>> mbox cmd response data (8 bytes)
7,738,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,768,236 UART: [rt]cmd =0x41545348, len=116
7,789,863 >>> mbox cmd response data (12 bytes)
7,789,864 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,820,025 UART: [rt]cmd =0x41545348, len=116
7,821,669 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,178 ready_for_fw is high
1,363,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,828 >>> mbox cmd response: success
2,991,346 UART:
2,991,362 UART: Running Caliptra FMC ...
2,991,770 UART:
2,991,913 UART: [state] CFI Enabled
3,002,628 UART: [fht] FMC Alias Private Key: 7
3,110,959 UART: [art] Extend RT PCRs Done
3,111,387 UART: [art] Lock RT PCRs Done
3,112,991 UART: [art] Populate DV Done
3,121,178 UART: [fht] FMC Alias Private Key: 7
3,122,214 UART: [art] Derive CDI
3,122,494 UART: [art] Store in in slot 0x4
3,207,875 UART: [art] Derive Key Pair
3,208,235 UART: [art] Store priv key in slot 0x5
3,221,735 UART: [art] Derive Key Pair - Done
3,236,596 UART: [art] Signing Cert with AUTHO
3,237,076 UART: RITY.KEYID = 7
3,252,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,451 UART: [art] PUB.X = EF0F0AEBA74E84EF9BA370D831044E49474AEFA198C34AECC9ECBB71C13E1E84FC451297FBBC79EAF2B71B8D3B96B8A5
3,260,240 UART: [art] PUB.Y = 6EF7F965E86DE73B6B149F8162F326ABD5163815B86B959C46FF18343BDF6ABF0C1D1BA8B700786067357150C0A2D868
3,267,167 UART: [art] SIG.R = 6917154732CFE0D67BCA664F29C5E22F4BBBF0FA374AA6189339DC0793265BFB1A0C574683F88599708FB36BCFAF787C
3,273,939 UART: [art] SIG.S = EF776D8D3531069B96C31F14C6AFC054615DC3796FE0B28DF66EE8C5EA3B0139FCB09314C260BB195C11CA7168F8F81D
3,297,882 UART: Caliptra RT
3,298,228 UART: [state] CFI Enabled
3,406,732 UART: [rt] RT listening for mailbox commands...
3,407,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,177 UART: [rt]cmd =0x41544d4e, len=14344
3,674,774 >>> mbox cmd response data (8 bytes)
3,674,775 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,874 UART: [rt]cmd =0x41545348, len=116
3,726,209 >>> mbox cmd response data (12 bytes)
3,726,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,285 UART: [rt]cmd =0x41545348, len=116
3,758,162 >>> mbox cmd response data (12 bytes)
3,758,163 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,519,541 >>> mbox cmd response: success
6,519,541 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,532,844 UART:
6,532,860 UART: Running Caliptra FMC ...
6,533,268 UART:
6,533,411 UART: [state] CFI Enabled
6,622,798 UART: [art] Extend RT PCRs Done
6,623,226 UART: [art] Lock RT PCRs Done
6,624,129 UART: [art] Populate DV Done
6,632,408 UART: [fht] FMC Alias Private Key: 7
6,633,508 UART: [art] Derive CDI
6,633,788 UART: [art] Store in in slot 0x4
6,719,861 UART: [art] Derive Key Pair
6,720,221 UART: [art] Store priv key in slot 0x5
6,733,341 UART: [art] Derive Key Pair - Done
6,748,286 UART: [art] Signing Cert with AUTHO
6,748,766 UART: RITY.KEYID = 7
6,763,770 UART: [art] Erasing AUTHORITY.KEYID = 7
6,764,535 UART: [art] PUB.X = 40F8E4B5A7DC9FE97CB7531380156BF8BCE5D1CFA975594F3D196809C8DC716B0741B98640751B41DA293AC45D01A6F9
6,771,302 UART: [art] PUB.Y = C7E28BC13B90F7EE8F1179A49BCE073BD1A42C2B23113F5F12DE855194F5E709BA62CEF966FC112054199CDC996F6755
6,778,254 UART: [art] SIG.R = 3A9FD1626AFC17D96B414AF62D840EEC9E101E7C3CCFEF784409D58334F4BD8D94B2A87F43BB7DADB1D6D2B142E5A210
6,785,038 UART: [art] SIG.S = 537C77F1E16D1E0691A151D1D2BE3BD1A4D6547EE3857E18C2B9EE5C0C989CF4BC5D9037A4B0724D52E4A592998DA53B
6,809,129 UART: Caliptra RT
6,809,475 UART: [state] CFI Enabled
7,089,889 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,120,852 UART: [rt]cmd =0x41545348, len=116
7,143,093 >>> mbox cmd response data (12 bytes)
7,143,094 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,173,209 UART: [rt]cmd =0x41545348, len=116
7,174,836 >>> mbox cmd response data (12 bytes)
7,174,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,297,496 UART: [rt]cmd =0x41544d4e, len=14344
7,442,283 >>> mbox cmd response data (8 bytes)
7,442,284 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,472,297 UART: [rt]cmd =0x41545348, len=116
7,493,728 >>> mbox cmd response data (12 bytes)
7,493,729 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,523,854 UART: [rt]cmd =0x41545348, len=116
7,525,710 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
85,929 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
892,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,017 UART: [kat] ++
897,169 UART: [kat] sha1
901,471 UART: [kat] SHA2-256
903,411 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
918,028 UART: [kat] HMAC-384Kdf
922,608 UART: [kat] LMS
1,170,936 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,261 UART: [fht] FHT @ 0x50003400
1,175,012 UART: [idev] ++
1,175,180 UART: [idev] CDI.KEYID = 6
1,175,540 UART: [idev] SUBJECT.KEYID = 7
1,175,964 UART: [idev] UDS.KEYID = 0
1,176,309 ready_for_fw is high
1,176,309 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,200 UART: [idev] Erasing UDS.KEYID = 0
1,201,031 UART: [idev] Sha1 KeyId Algorithm
1,209,591 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,250 UART: [ldev] SUBJECT.KEYID = 5
1,211,676 UART: [ldev] AUTHORITY.KEYID = 7
1,212,139 UART: [ldev] FE.KEYID = 1
1,217,385 UART: [ldev] Erasing FE.KEYID = 1
1,244,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,931 UART: [ldev] --
1,283,234 UART: [fwproc] Wait for Commands...
1,283,824 UART: [fwproc] Recv command 0x46574c44
1,284,552 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,820 >>> mbox cmd response: success
2,775,926 UART: [afmc] ++
2,776,094 UART: [afmc] CDI.KEYID = 6
2,776,456 UART: [afmc] SUBJECT.KEYID = 7
2,776,881 UART: [afmc] AUTHORITY.KEYID = 5
2,812,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,719 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,051 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,017 UART: [afmc] --
2,855,939 UART: [cold-reset] --
2,856,749 UART: [state] Locking Datavault
2,857,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,436 UART: [state] Locking ICCM
2,859,030 UART: [exit] Launching FMC @ 0x40000130
2,864,359 UART:
2,864,375 UART: Running Caliptra FMC ...
2,864,783 UART:
2,864,837 UART: [state] CFI Enabled
2,875,240 UART: [fht] FMC Alias Private Key: 7
2,982,465 UART: [art] Extend RT PCRs Done
2,982,893 UART: [art] Lock RT PCRs Done
2,984,519 UART: [art] Populate DV Done
2,992,906 UART: [fht] FMC Alias Private Key: 7
2,993,842 UART: [art] Derive CDI
2,994,122 UART: [art] Store in in slot 0x4
3,079,807 UART: [art] Derive Key Pair
3,080,167 UART: [art] Store priv key in slot 0x5
3,093,675 UART: [art] Derive Key Pair - Done
3,108,409 UART: [art] Signing Cert with AUTHO
3,108,889 UART: RITY.KEYID = 7
3,124,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,796 UART: [art] PUB.X = D4924B3A133D0B4E6C939C564BDAE13AFFE7051647ED50BECAC215EEE45ED2B59C1A7DF6F590C41C9E19C5B2D704808C
3,131,577 UART: [art] PUB.Y = D909D01792CB8B3D3B5582D1B58938D0C475B9895EF298AC2696BB1292CF98C6A6B526154D58A3FAAEC50FB9F161FA87
3,138,529 UART: [art] SIG.R = CBD36C24F110E8F85FE5B5CD69AFCC11002A706807BD212C9B37D88C6878FB6A5FAF01789E47939D57141434696D78CE
3,145,277 UART: [art] SIG.S = 9514B016AA4D2E540551F29315696CA56EBCD4E3DA330A78F7C4D99F7DAE4C1BED62C01C153FE3C0AA515096880AC015
3,168,831 UART: Caliptra RT
3,169,085 UART: [state] CFI Enabled
3,277,714 UART: [rt] RT listening for mailbox commands...
3,278,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,111 UART: [rt]cmd =0x41544d4e, len=14344
3,545,702 >>> mbox cmd response data (8 bytes)
3,545,703 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,578 UART: [rt]cmd =0x41545348, len=116
3,597,497 >>> mbox cmd response data (12 bytes)
3,597,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,577 UART: [rt]cmd =0x41545348, len=116
3,629,486 >>> mbox cmd response data (12 bytes)
3,629,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,431 UART:
3,630,447 UART: Running Caliptra ROM ...
3,630,855 UART:
3,630,910 UART: [state] CFI Enabled
3,633,892 UART: [state] LifecycleState = Unprovisioned
3,634,547 UART: [state] DebugLocked = No
3,635,089 UART: [state] WD Timer not started. Device not locked for debugging
3,636,359 UART: [kat] SHA2-256
4,442,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,446,134 UART: [kat] ++
4,446,286 UART: [kat] sha1
4,450,530 UART: [kat] SHA2-256
4,452,470 UART: [kat] SHA2-384
4,455,201 UART: [kat] SHA2-512-ACC
4,457,101 UART: [kat] ECC-384
4,466,962 UART: [kat] HMAC-384Kdf
4,471,562 UART: [kat] LMS
4,719,890 UART: [kat] --
4,720,862 UART: [update-reset] ++
6,032,871 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,033,924 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,183,790 >>> mbox cmd response: success
6,183,790 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,183,939 UART: [update-reset] Copying MAN_2 To MAN_1
6,191,953 UART: [update-reset Success] --
6,192,976 UART: [state] Locking Datavault
6,193,822 UART: [state] Locking PCR0, PCR1 and PCR31
6,194,426 UART: [state] Locking ICCM
6,195,052 UART: [exit] Launching FMC @ 0x40000130
6,200,381 UART:
6,200,397 UART: Running Caliptra FMC ...
6,200,805 UART:
6,200,859 UART: [state] CFI Enabled
6,289,158 UART: [art] Extend RT PCRs Done
6,289,586 UART: [art] Lock RT PCRs Done
6,290,841 UART: [art] Populate DV Done
6,298,902 UART: [fht] FMC Alias Private Key: 7
6,299,830 UART: [art] Derive CDI
6,300,110 UART: [art] Store in in slot 0x4
6,385,959 UART: [art] Derive Key Pair
6,386,319 UART: [art] Store priv key in slot 0x5
6,399,533 UART: [art] Derive Key Pair - Done
6,414,774 UART: [art] Signing Cert with AUTHO
6,415,254 UART: RITY.KEYID = 7
6,430,104 UART: [art] Erasing AUTHORITY.KEYID = 7
6,430,869 UART: [art] PUB.X = E51638511E5449D1F2DA93AD0FDBE7651B3F51EC4771F088ADE30361619E7AE5B4BE025E444E1B9F8B82975E527C84AC
6,437,638 UART: [art] PUB.Y = 8807A882C10D8112D2D0010F98F7755940AE82C0F01C3E0604FDFB6D78936017AA355816B8B0735A6343A5FFFFFF147A
6,444,570 UART: [art] SIG.R = 5E61771837013A83F9A3719EC605601BBAB77B42744D0540254B57C9CC4D3C033BE35B81A5D37281CFE9D4379EFDFF44
6,451,330 UART: [art] SIG.S = 5EF512223883260BA6C0FC29BD6A297F7BE75FF1E4EB03AE2FEEAABED0D972DE4E8C3B41D73DC23304D227E72D67F24D
6,475,098 UART: Caliptra RT
6,475,352 UART: [state] CFI Enabled
6,756,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,787,034 UART: [rt]cmd =0x41545348, len=116
6,808,319 >>> mbox cmd response data (12 bytes)
6,808,320 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,838,421 UART: [rt]cmd =0x41545348, len=116
6,840,212 >>> mbox cmd response data (12 bytes)
6,840,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,962,686 UART: [rt]cmd =0x41544d4e, len=14344
7,107,585 >>> mbox cmd response data (8 bytes)
7,107,586 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,137,709 UART: [rt]cmd =0x41545348, len=116
7,160,182 >>> mbox cmd response data (12 bytes)
7,160,183 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,190,348 UART: [rt]cmd =0x41545348, len=116
7,192,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,645 ready_for_fw is high
1,059,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,661 >>> mbox cmd response: success
2,688,275 UART:
2,688,291 UART: Running Caliptra FMC ...
2,688,699 UART:
2,688,753 UART: [state] CFI Enabled
2,699,130 UART: [fht] FMC Alias Private Key: 7
2,807,325 UART: [art] Extend RT PCRs Done
2,807,753 UART: [art] Lock RT PCRs Done
2,809,073 UART: [art] Populate DV Done
2,816,980 UART: [fht] FMC Alias Private Key: 7
2,818,020 UART: [art] Derive CDI
2,818,300 UART: [art] Store in in slot 0x4
2,903,859 UART: [art] Derive Key Pair
2,904,219 UART: [art] Store priv key in slot 0x5
2,917,413 UART: [art] Derive Key Pair - Done
2,931,860 UART: [art] Signing Cert with AUTHO
2,932,340 UART: RITY.KEYID = 7
2,947,244 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,009 UART: [art] PUB.X = 85683D284A5BDC3CEB2540BB89B3182326A52513DB270BB739D0756EB6130182228E7D0BD8DBC8A56CC8B97BC6DA70FA
2,954,780 UART: [art] PUB.Y = 3C5C6660FF7982B4BD7D8CE3D035B109773B43E598D3F702DCEAAC3A238F583A3FBB191863D8520EC50442F7F945C509
2,961,721 UART: [art] SIG.R = 1855B20311A0529C1185966CCE9417C89D63FAB78508641474D08418D1B910F8F87E64B040C1DE7C16CBE8276ECDEF51
2,968,483 UART: [art] SIG.S = E92D03F3480E8586B96651AC98F5E46B46E1B23689FCFA0BFE3B0A256C43C6312B0DD925CB12B31BABAAFCF842B2F36E
2,992,325 UART: Caliptra RT
2,992,579 UART: [state] CFI Enabled
3,100,597 UART: [rt] RT listening for mailbox commands...
3,101,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,898 UART: [rt]cmd =0x41544d4e, len=14344
3,368,563 >>> mbox cmd response data (8 bytes)
3,368,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,501 UART: [rt]cmd =0x41545348, len=116
3,420,526 >>> mbox cmd response data (12 bytes)
3,420,527 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,464 UART: [rt]cmd =0x41545348, len=116
3,452,035 >>> mbox cmd response data (12 bytes)
3,452,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,890,302 >>> mbox cmd response: success
5,890,302 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,903,908 UART:
5,903,924 UART: Running Caliptra FMC ...
5,904,332 UART:
5,904,386 UART: [state] CFI Enabled
5,992,887 UART: [art] Extend RT PCRs Done
5,993,315 UART: [art] Lock RT PCRs Done
5,994,650 UART: [art] Populate DV Done
6,002,839 UART: [fht] FMC Alias Private Key: 7
6,003,977 UART: [art] Derive CDI
6,004,257 UART: [art] Store in in slot 0x4
6,089,816 UART: [art] Derive Key Pair
6,090,176 UART: [art] Store priv key in slot 0x5
6,103,666 UART: [art] Derive Key Pair - Done
6,118,469 UART: [art] Signing Cert with AUTHO
6,118,949 UART: RITY.KEYID = 7
6,134,535 UART: [art] Erasing AUTHORITY.KEYID = 7
6,135,300 UART: [art] PUB.X = 9CACEABBD4B667740A5B70024B97348C6E2543EE6706D9F9389E58B91958D4C9591599C4A1EE97DB419453B06B571ADF
6,142,065 UART: [art] PUB.Y = AAC3638F69B5E7E5B3E96EE5386601AE3F1DD576E0E8F21C367512D7F8C13C713AE340444D16B509E15E00216013D8B9
6,148,989 UART: [art] SIG.R = C74984D1E67D7501C096027349698165CB7CEFB1A7B186BC2916049D96DE335F7C08C157B7B104CEFE649C8B27BB4386
6,155,744 UART: [art] SIG.S = B9B40B0C87D89BFB5234276E36B57E723AD8B7419515FF5087EEC164F0A25FC4454AA8A68C08B8E9200BE4A10E03FE69
6,179,277 UART: Caliptra RT
6,179,531 UART: [state] CFI Enabled
6,464,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,495,016 UART: [rt]cmd =0x41545348, len=116
6,516,671 >>> mbox cmd response data (12 bytes)
6,516,672 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,546,833 UART: [rt]cmd =0x41545348, len=116
6,548,588 >>> mbox cmd response data (12 bytes)
6,548,589 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,671,146 UART: [rt]cmd =0x41544d4e, len=14344
6,815,873 >>> mbox cmd response data (8 bytes)
6,815,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,845,837 UART: [rt]cmd =0x41545348, len=116
6,867,374 >>> mbox cmd response data (12 bytes)
6,867,375 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,897,694 UART: [rt]cmd =0x41545348, len=116
6,899,380 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,181 UART: [kat] HMAC-384Kdf
922,903 UART: [kat] LMS
1,171,231 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,600 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 ready_for_fw is high
1,176,608 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,217 UART: [idev] Erasing UDS.KEYID = 0
1,201,326 UART: [idev] Sha1 KeyId Algorithm
1,209,692 UART: [idev] --
1,210,844 UART: [ldev] ++
1,211,012 UART: [ldev] CDI.KEYID = 6
1,211,375 UART: [ldev] SUBJECT.KEYID = 5
1,211,801 UART: [ldev] AUTHORITY.KEYID = 7
1,212,264 UART: [ldev] FE.KEYID = 1
1,217,186 UART: [ldev] Erasing FE.KEYID = 1
1,243,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,730 UART: [ldev] --
1,282,195 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,591 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,197 >>> mbox cmd response: success
2,774,389 UART: [afmc] ++
2,774,557 UART: [afmc] CDI.KEYID = 6
2,774,919 UART: [afmc] SUBJECT.KEYID = 7
2,775,344 UART: [afmc] AUTHORITY.KEYID = 5
2,810,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,880 UART: [afmc] --
2,853,906 UART: [cold-reset] --
2,854,610 UART: [state] Locking Datavault
2,855,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,481 UART: [state] Locking ICCM
2,856,921 UART: [exit] Launching FMC @ 0x40000130
2,862,250 UART:
2,862,266 UART: Running Caliptra FMC ...
2,862,674 UART:
2,862,817 UART: [state] CFI Enabled
2,873,636 UART: [fht] FMC Alias Private Key: 7
2,982,075 UART: [art] Extend RT PCRs Done
2,982,503 UART: [art] Lock RT PCRs Done
2,983,867 UART: [art] Populate DV Done
2,992,060 UART: [fht] FMC Alias Private Key: 7
2,993,058 UART: [art] Derive CDI
2,993,338 UART: [art] Store in in slot 0x4
3,079,191 UART: [art] Derive Key Pair
3,079,551 UART: [art] Store priv key in slot 0x5
3,092,537 UART: [art] Derive Key Pair - Done
3,107,308 UART: [art] Signing Cert with AUTHO
3,107,788 UART: RITY.KEYID = 7
3,122,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,501 UART: [art] PUB.X = 7DBA1A80CC0A20E4730C981B62F703FE5A7B26534BEB394647CAADEAAFE0C9B3D34997CA5B6611B66C68C20CDFCA511E
3,130,281 UART: [art] PUB.Y = 9E1C4D909BAF7C516268369507ED75BE220CD32C0446895D4F6CE25957D1C718B9F6152BA6AC06CC9570610F25A74643
3,137,214 UART: [art] SIG.R = D7967F635212FE850EDF022A22DE1BC90C9EDEBDDB4A802DD7F0468CA577B161F8DAC3584C3CD128DE447848E11A8EE5
3,143,993 UART: [art] SIG.S = 18B3BA68A32D5C898E1019F087951632CFCEA975C8F0CB216B8CF68393981421621B969531D073714B4AFA5D0837338B
3,168,179 UART: Caliptra RT
3,168,525 UART: [state] CFI Enabled
3,277,119 UART: [rt] RT listening for mailbox commands...
3,277,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,500 UART: [rt]cmd =0x41544d4e, len=14344
3,545,221 >>> mbox cmd response data (8 bytes)
3,545,222 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,323 UART: [rt]cmd =0x41545348, len=116
3,597,770 >>> mbox cmd response data (12 bytes)
3,597,771 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,924 UART: [rt]cmd =0x41545348, len=116
3,629,779 >>> mbox cmd response data (12 bytes)
3,629,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,632 UART:
3,630,648 UART: Running Caliptra ROM ...
3,631,056 UART:
3,631,198 UART: [state] CFI Enabled
3,633,734 UART: [state] LifecycleState = Unprovisioned
3,634,389 UART: [state] DebugLocked = No
3,635,017 UART: [state] WD Timer not started. Device not locked for debugging
3,636,337 UART: [kat] SHA2-256
4,441,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,446,112 UART: [kat] ++
4,446,264 UART: [kat] sha1
4,450,408 UART: [kat] SHA2-256
4,452,348 UART: [kat] SHA2-384
4,455,273 UART: [kat] SHA2-512-ACC
4,457,173 UART: [kat] ECC-384
4,466,900 UART: [kat] HMAC-384Kdf
4,471,422 UART: [kat] LMS
4,719,750 UART: [kat] --
4,720,634 UART: [update-reset] ++
6,032,173 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,033,244 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,183,110 >>> mbox cmd response: success
6,183,110 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,183,405 UART: [update-reset] Copying MAN_2 To MAN_1
6,191,419 UART: [update-reset Success] --
6,192,404 UART: [state] Locking Datavault
6,193,334 UART: [state] Locking PCR0, PCR1 and PCR31
6,193,938 UART: [state] Locking ICCM
6,194,530 UART: [exit] Launching FMC @ 0x40000130
6,199,859 UART:
6,199,875 UART: Running Caliptra FMC ...
6,200,283 UART:
6,200,426 UART: [state] CFI Enabled
6,289,949 UART: [art] Extend RT PCRs Done
6,290,377 UART: [art] Lock RT PCRs Done
6,291,638 UART: [art] Populate DV Done
6,299,943 UART: [fht] FMC Alias Private Key: 7
6,301,067 UART: [art] Derive CDI
6,301,347 UART: [art] Store in in slot 0x4
6,386,860 UART: [art] Derive Key Pair
6,387,220 UART: [art] Store priv key in slot 0x5
6,400,314 UART: [art] Derive Key Pair - Done
6,415,182 UART: [art] Signing Cert with AUTHO
6,415,662 UART: RITY.KEYID = 7
6,430,936 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,701 UART: [art] PUB.X = 7C45785CDB5D9F459919D3AA273D2247469AA85BE2BCD3A543ECE491A5ACBDB4F8E1AD53F0DEDB9DF6EB9815981AD247
6,438,493 UART: [art] PUB.Y = 6643BA16BD604B857EAAA4C984CEE575A6B3B6E9D4741862CAD40C068D21A324C4E03A3A961EDB45FB19AD0985848C17
6,445,444 UART: [art] SIG.R = 82018C44F87108DBC4DECE0F15AB842A2F1547CDCCE181D57153872D883DBB015635FA1D1E8A0D6E245CB90949375B29
6,452,202 UART: [art] SIG.S = F8EE29DBF2B21DCAC283157BB8512BB8F5039EDE3A8981038724093B9D1D677FA9FA695C8578F2481C4E2169DACED1C7
6,475,926 UART: Caliptra RT
6,476,272 UART: [state] CFI Enabled
6,758,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,789,589 UART: [rt]cmd =0x41545348, len=116
6,812,440 >>> mbox cmd response data (12 bytes)
6,812,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,842,654 UART: [rt]cmd =0x41545348, len=116
6,844,637 >>> mbox cmd response data (12 bytes)
6,844,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,967,023 UART: [rt]cmd =0x41544d4e, len=14344
7,112,758 >>> mbox cmd response data (8 bytes)
7,112,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,142,906 UART: [rt]cmd =0x41545348, len=116
7,165,529 >>> mbox cmd response data (12 bytes)
7,165,530 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,195,707 UART: [rt]cmd =0x41545348, len=116
7,197,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,618 ready_for_fw is high
1,060,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,190 >>> mbox cmd response: success
2,688,634 UART:
2,688,650 UART: Running Caliptra FMC ...
2,689,058 UART:
2,689,201 UART: [state] CFI Enabled
2,699,722 UART: [fht] FMC Alias Private Key: 7
2,807,571 UART: [art] Extend RT PCRs Done
2,807,999 UART: [art] Lock RT PCRs Done
2,809,307 UART: [art] Populate DV Done
2,817,810 UART: [fht] FMC Alias Private Key: 7
2,818,920 UART: [art] Derive CDI
2,819,200 UART: [art] Store in in slot 0x4
2,904,623 UART: [art] Derive Key Pair
2,904,983 UART: [art] Store priv key in slot 0x5
2,918,349 UART: [art] Derive Key Pair - Done
2,932,805 UART: [art] Signing Cert with AUTHO
2,933,285 UART: RITY.KEYID = 7
2,948,277 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,042 UART: [art] PUB.X = 885A78C358441A596039F93FBBD49F6F7B95BA772748E2C2B8E1DB03273D5B559CCE01A6DF20F1BE82C9AB7CF6F2C98D
2,955,820 UART: [art] PUB.Y = 28176A94DEE28C26D9C846B190DD023AE209907CB14E6BCF6081517110AE170E21EC2822C8EE784D99E3F40A0670EC9C
2,962,759 UART: [art] SIG.R = 54AB5455A14E56FB6AE2F97A365E3EACB44EBAA387449F3820A6D66E4174EEA5DE010D560106E4A8B8F6AA2A94F17A1C
2,969,533 UART: [art] SIG.S = 7482FFDE352FFEC01965140600B36DEB906002264CAC460F2732D11CAEEA8D4FCF6DBF6381AB304C5359B2CD5BDC5E53
2,993,591 UART: Caliptra RT
2,993,937 UART: [state] CFI Enabled
3,101,819 UART: [rt] RT listening for mailbox commands...
3,102,489 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,126 UART: [rt]cmd =0x41544d4e, len=14344
3,369,895 >>> mbox cmd response data (8 bytes)
3,369,896 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,039 UART: [rt]cmd =0x41545348, len=116
3,422,120 >>> mbox cmd response data (12 bytes)
3,422,121 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,232 UART: [rt]cmd =0x41545348, len=116
3,453,733 >>> mbox cmd response data (12 bytes)
3,453,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,892,673 >>> mbox cmd response: success
5,892,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,905,927 UART:
5,905,943 UART: Running Caliptra FMC ...
5,906,351 UART:
5,906,494 UART: [state] CFI Enabled
5,995,469 UART: [art] Extend RT PCRs Done
5,995,897 UART: [art] Lock RT PCRs Done
5,997,150 UART: [art] Populate DV Done
6,005,383 UART: [fht] FMC Alias Private Key: 7
6,006,497 UART: [art] Derive CDI
6,006,777 UART: [art] Store in in slot 0x4
6,091,922 UART: [art] Derive Key Pair
6,092,282 UART: [art] Store priv key in slot 0x5
6,105,538 UART: [art] Derive Key Pair - Done
6,120,030 UART: [art] Signing Cert with AUTHO
6,120,510 UART: RITY.KEYID = 7
6,135,020 UART: [art] Erasing AUTHORITY.KEYID = 7
6,135,785 UART: [art] PUB.X = A89B389183881A453F27AB558DFEEE300CF04EE41CB297342348C4B4D61FB6B1E2697D5E60F075C1FD981158E7E494A2
6,142,556 UART: [art] PUB.Y = D45C1F0C61F60218B5B2903F67A51C565DCD13385A0D421F38B6CA1B764DA6460705A613FCB2A548FAF627DE89E80AC4
6,149,496 UART: [art] SIG.R = BC6E985A8468D32575939195A01B070888585F57236D954EE3A96EDE8C22E264998206EA0D2E003D46DC148F65EDEAC2
6,156,230 UART: [art] SIG.S = DBBC2D5F913430412DBDDA73FA9E25F23EFB7F73637F76A8AA43D62CF36A8B2C15F84B1ED4D1FFB796EA60A8C8D7D71F
6,180,335 UART: Caliptra RT
6,180,681 UART: [state] CFI Enabled
6,458,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,489,664 UART: [rt]cmd =0x41545348, len=116
6,511,567 >>> mbox cmd response data (12 bytes)
6,511,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,541,525 UART: [rt]cmd =0x41545348, len=116
6,543,030 >>> mbox cmd response data (12 bytes)
6,543,031 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,665,276 UART: [rt]cmd =0x41544d4e, len=14344
6,809,853 >>> mbox cmd response data (8 bytes)
6,809,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,839,879 UART: [rt]cmd =0x41545348, len=116
6,861,958 >>> mbox cmd response data (12 bytes)
6,861,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,892,254 UART: [rt]cmd =0x41545348, len=116
6,893,838 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,240,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,292 UART: [ldev] --
1,279,792 UART: [fwproc] Wait for Commands...
1,280,477 UART: [fwproc] Recv command 0x46574c44
1,281,210 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,190 >>> mbox cmd response: success
2,771,237 UART: [afmc] ++
2,771,405 UART: [afmc] CDI.KEYID = 6
2,771,768 UART: [afmc] SUBJECT.KEYID = 7
2,772,194 UART: [afmc] AUTHORITY.KEYID = 5
2,807,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,565 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,167 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,148 UART: [afmc] --
2,851,280 UART: [cold-reset] --
2,852,024 UART: [state] Locking Datavault
2,853,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,933 UART: [state] Locking ICCM
2,854,551 UART: [exit] Launching FMC @ 0x40000130
2,859,880 UART:
2,859,896 UART: Running Caliptra FMC ...
2,860,304 UART:
2,860,358 UART: [state] CFI Enabled
2,870,569 UART: [fht] FMC Alias Private Key: 7
2,979,360 UART: [art] Extend RT PCRs Done
2,979,788 UART: [art] Lock RT PCRs Done
2,981,508 UART: [art] Populate DV Done
2,989,771 UART: [fht] FMC Alias Private Key: 7
2,990,925 UART: [art] Derive CDI
2,991,205 UART: [art] Store in in slot 0x4
3,076,732 UART: [art] Derive Key Pair
3,077,092 UART: [art] Store priv key in slot 0x5
3,090,968 UART: [art] Derive Key Pair - Done
3,106,115 UART: [art] Signing Cert with AUTHO
3,106,595 UART: RITY.KEYID = 7
3,121,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,536 UART: [art] PUB.X = 7CB01AD90690C2C8DA60850098289452DB6842B5C5627040F42F416DCEE719BE7ED91D89A8E3595200D4B9CA3210B334
3,129,257 UART: [art] PUB.Y = 90F5D4CBA1C568CEA759D9733E0D139FD25ACE7B8D823056EA6B14199D9F517E81759AD4C599E370D937FE345B4B4445
3,136,210 UART: [art] SIG.R = 15511B979825A44D4DE596F25A1873CE056EE6AC7530BBE25247BDEDB98A50B9B4417347DA5751360D377E5931B0479D
3,142,972 UART: [art] SIG.S = E344E9B844CB6A04EA9F3B80CAD45CE50AFB45D88499DC9468767B56891D87935220C7640E6CA2EE20AB63430A5798E4
3,166,807 UART: Caliptra RT
3,167,061 UART: [state] CFI Enabled
3,275,313 UART: [rt] RT listening for mailbox commands...
3,275,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,608 UART: [rt]cmd =0x41544d4e, len=14344
3,543,159 >>> mbox cmd response data (8 bytes)
3,543,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,225 UART: [rt]cmd =0x41545348, len=116
3,594,986 >>> mbox cmd response data (12 bytes)
3,594,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,134 UART: [rt]cmd =0x41545348, len=116
3,626,953 >>> mbox cmd response data (12 bytes)
3,626,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,930 UART:
3,627,946 UART: Running Caliptra ROM ...
3,628,354 UART:
3,628,409 UART: [state] CFI Enabled
3,631,081 UART: [state] LifecycleState = Unprovisioned
3,631,736 UART: [state] DebugLocked = No
3,632,378 UART: [state] WD Timer not started. Device not locked for debugging
3,633,726 UART: [kat] SHA2-256
4,437,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,441,405 UART: [kat] ++
4,441,557 UART: [kat] sha1
4,445,849 UART: [kat] SHA2-256
4,447,789 UART: [kat] SHA2-384
4,450,540 UART: [kat] SHA2-512-ACC
4,452,440 UART: [kat] ECC-384
4,462,183 UART: [kat] HMAC-384Kdf
4,466,821 UART: [kat] LMS
4,715,133 UART: [kat] --
4,715,917 UART: [update-reset] ++
6,028,483 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,029,452 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,179,318 >>> mbox cmd response: success
6,179,318 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,179,461 UART: [update-reset] Copying MAN_2 To MAN_1
6,187,475 UART: [update-reset Success] --
6,188,670 UART: [state] Locking Datavault
6,189,304 UART: [state] Locking PCR0, PCR1 and PCR31
6,189,908 UART: [state] Locking ICCM
6,190,524 UART: [exit] Launching FMC @ 0x40000130
6,195,853 UART:
6,195,869 UART: Running Caliptra FMC ...
6,196,277 UART:
6,196,331 UART: [state] CFI Enabled
6,285,598 UART: [art] Extend RT PCRs Done
6,286,026 UART: [art] Lock RT PCRs Done
6,287,213 UART: [art] Populate DV Done
6,295,558 UART: [fht] FMC Alias Private Key: 7
6,296,638 UART: [art] Derive CDI
6,296,918 UART: [art] Store in in slot 0x4
6,382,153 UART: [art] Derive Key Pair
6,382,513 UART: [art] Store priv key in slot 0x5
6,396,103 UART: [art] Derive Key Pair - Done
6,410,660 UART: [art] Signing Cert with AUTHO
6,411,140 UART: RITY.KEYID = 7
6,426,226 UART: [art] Erasing AUTHORITY.KEYID = 7
6,426,991 UART: [art] PUB.X = 2446EB8C61910D723BA50412A48CC178C564173CC7532111C7E264A8BE74F5D7A944225F5D2C15999706828DDE645F0A
6,433,743 UART: [art] PUB.Y = EAB31B49ECDC4D9C6DEFFC3AEF8AC42209DD1717F11131483283607A8FCE53E746AF271ED21E985EB65B355395ADADA9
6,440,710 UART: [art] SIG.R = 94C8B2815D62E5B6D93C4338B84AF2CDB88C541E94886120ACB41E41682391D9696F7E61895635475FDE615664B7006A
6,447,450 UART: [art] SIG.S = F157E919A71E62CA0F1ADB06E268366C8F4189CDDB39A61242461D341E8347F1C517C3C71447624F003E34D85EEB877E
6,471,051 UART: Caliptra RT
6,471,305 UART: [state] CFI Enabled
6,748,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,779,056 UART: [rt]cmd =0x41545348, len=116
6,801,085 >>> mbox cmd response data (12 bytes)
6,801,086 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,831,161 UART: [rt]cmd =0x41545348, len=116
6,832,860 >>> mbox cmd response data (12 bytes)
6,832,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,955,370 UART: [rt]cmd =0x41544d4e, len=14344
7,099,861 >>> mbox cmd response data (8 bytes)
7,099,862 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,129,929 UART: [rt]cmd =0x41545348, len=116
7,152,030 >>> mbox cmd response data (12 bytes)
7,152,031 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,182,094 UART: [rt]cmd =0x41545348, len=116
7,184,028 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,550 ready_for_fw is high
1,055,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,578 >>> mbox cmd response: success
2,682,698 UART:
2,682,714 UART: Running Caliptra FMC ...
2,683,122 UART:
2,683,176 UART: [state] CFI Enabled
2,693,953 UART: [fht] FMC Alias Private Key: 7
2,802,686 UART: [art] Extend RT PCRs Done
2,803,114 UART: [art] Lock RT PCRs Done
2,804,788 UART: [art] Populate DV Done
2,812,903 UART: [fht] FMC Alias Private Key: 7
2,813,903 UART: [art] Derive CDI
2,814,183 UART: [art] Store in in slot 0x4
2,899,770 UART: [art] Derive Key Pair
2,900,130 UART: [art] Store priv key in slot 0x5
2,912,944 UART: [art] Derive Key Pair - Done
2,927,461 UART: [art] Signing Cert with AUTHO
2,927,941 UART: RITY.KEYID = 7
2,942,837 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,602 UART: [art] PUB.X = D3AD645ECA380B45C14FF213A9AB88869E55D26593C891E4AEEC6807972A85B3AC99A950BCCDA2253DD673815952DF2C
2,950,376 UART: [art] PUB.Y = 7A014BAABF0B118F944D9D34E252454008CBF99A91F894305F967CE695B817D6975E08C0A0B1318DABF6BBD0134F262E
2,957,320 UART: [art] SIG.R = B553C9315FD993403CC8A4EC8237E8B0C8E780B6CAA4F78FF95ADA1E2CB4F576C97D34CD8A5C2C7A6EE47497C56E909F
2,964,108 UART: [art] SIG.S = C10CD6E4189D85CC8205E56B1A1889C543C510FF21361986648AE846E4E27A787868F61812200B6809899D30A3F729A7
2,987,939 UART: Caliptra RT
2,988,193 UART: [state] CFI Enabled
3,095,522 UART: [rt] RT listening for mailbox commands...
3,096,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,043 UART: [rt]cmd =0x41544d4e, len=14344
3,364,368 >>> mbox cmd response data (8 bytes)
3,364,369 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,392 UART: [rt]cmd =0x41545348, len=116
3,416,375 >>> mbox cmd response data (12 bytes)
3,416,376 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,413 UART: [rt]cmd =0x41545348, len=116
3,448,306 >>> mbox cmd response data (12 bytes)
3,448,307 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,316 >>> mbox cmd response: success
5,881,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,894,680 UART:
5,894,696 UART: Running Caliptra FMC ...
5,895,104 UART:
5,895,158 UART: [state] CFI Enabled
5,983,839 UART: [art] Extend RT PCRs Done
5,984,267 UART: [art] Lock RT PCRs Done
5,985,514 UART: [art] Populate DV Done
5,993,699 UART: [fht] FMC Alias Private Key: 7
5,994,737 UART: [art] Derive CDI
5,995,017 UART: [art] Store in in slot 0x4
6,080,914 UART: [art] Derive Key Pair
6,081,274 UART: [art] Store priv key in slot 0x5
6,095,438 UART: [art] Derive Key Pair - Done
6,110,599 UART: [art] Signing Cert with AUTHO
6,111,079 UART: RITY.KEYID = 7
6,126,217 UART: [art] Erasing AUTHORITY.KEYID = 7
6,126,982 UART: [art] PUB.X = BD12A613BC5196D63A142042D965C155CA578E060351FB0C13074F9D599BEB837B2D4F9053C46033AE5AF2B4CC9EE5D9
6,133,746 UART: [art] PUB.Y = 25667B22748CF2E1ED11FEC0419995E1B3D6208F1F36734FC3717E0BC4BB74B9D1AAC8C762C7A963710F62FB046E123B
6,140,693 UART: [art] SIG.R = F7B6903E4935A35394ED4D5B0359E7C7A79A943B216793044C7CC4BBCFF64F04163F92DA1D275AA0897FA4BC881C8CE2
6,147,462 UART: [art] SIG.S = 5A8D78D2B78C5D2E9CA343F27F2EE6A1CAE9192C9CF94896725C99C9D0D9828CDEAFD9C633F02ECEF296C7D35890F6F0
6,171,489 UART: Caliptra RT
6,171,743 UART: [state] CFI Enabled
6,451,458 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,482,331 UART: [rt]cmd =0x41545348, len=116
6,504,546 >>> mbox cmd response data (12 bytes)
6,504,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,534,658 UART: [rt]cmd =0x41545348, len=116
6,536,155 >>> mbox cmd response data (12 bytes)
6,536,156 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,658,739 UART: [rt]cmd =0x41544d4e, len=14344
6,803,614 >>> mbox cmd response data (8 bytes)
6,803,615 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,833,502 UART: [rt]cmd =0x41545348, len=116
6,855,475 >>> mbox cmd response data (12 bytes)
6,855,476 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,885,535 UART: [rt]cmd =0x41545348, len=116
6,887,461 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,777 UART: [kat] HMAC-384Kdf
921,395 UART: [kat] LMS
1,169,707 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,610 UART: [idev] ++
1,173,778 UART: [idev] CDI.KEYID = 6
1,174,139 UART: [idev] SUBJECT.KEYID = 7
1,174,564 UART: [idev] UDS.KEYID = 0
1,174,910 ready_for_fw is high
1,174,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,315 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,765 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,329 >>> mbox cmd response: success
2,774,454 UART: [afmc] ++
2,774,622 UART: [afmc] CDI.KEYID = 6
2,774,985 UART: [afmc] SUBJECT.KEYID = 7
2,775,411 UART: [afmc] AUTHORITY.KEYID = 5
2,811,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,065 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,784 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,655 UART: [afmc] --
2,854,555 UART: [cold-reset] --
2,855,401 UART: [state] Locking Datavault
2,856,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,476 UART: [state] Locking ICCM
2,858,102 UART: [exit] Launching FMC @ 0x40000130
2,863,431 UART:
2,863,447 UART: Running Caliptra FMC ...
2,863,855 UART:
2,863,998 UART: [state] CFI Enabled
2,874,563 UART: [fht] FMC Alias Private Key: 7
2,982,098 UART: [art] Extend RT PCRs Done
2,982,526 UART: [art] Lock RT PCRs Done
2,984,192 UART: [art] Populate DV Done
2,992,285 UART: [fht] FMC Alias Private Key: 7
2,993,375 UART: [art] Derive CDI
2,993,655 UART: [art] Store in in slot 0x4
3,079,442 UART: [art] Derive Key Pair
3,079,802 UART: [art] Store priv key in slot 0x5
3,093,176 UART: [art] Derive Key Pair - Done
3,108,197 UART: [art] Signing Cert with AUTHO
3,108,677 UART: RITY.KEYID = 7
3,124,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,828 UART: [art] PUB.X = 65DAF2B361472FA9E6A0F23261607F96D2D0E096109D2CD0DE9CD7013464E73B2CD15038585F221A031EBA77581F8B44
3,131,592 UART: [art] PUB.Y = D53AB0CF00CDB5E5DE44616B64C9286B6BFC0D112F8965F5DA18899AFB2580925EBD8E49FFD7F171C9E2CB3FDB685974
3,138,535 UART: [art] SIG.R = 39DD9044E6B5B0234F9B873F0C622A738A330191B599047BFB2F10932C34AD4571BAF41BFFAB8E9A719347669C217FFA
3,145,300 UART: [art] SIG.S = 4EEC92BE5E86EBB1CDA8E8FC5A7EFAB927239698E318AB1C78309BD9788584D6E9906AA36D522C4945B5A6794A81CD12
3,168,783 UART: Caliptra RT
3,169,129 UART: [state] CFI Enabled
3,277,485 UART: [rt] RT listening for mailbox commands...
3,278,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,812 UART: [rt]cmd =0x41544d4e, len=14344
3,545,815 >>> mbox cmd response data (8 bytes)
3,545,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,037 UART: [rt]cmd =0x41545348, len=116
3,598,546 >>> mbox cmd response data (12 bytes)
3,598,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,636 UART: [rt]cmd =0x41545348, len=116
3,630,415 >>> mbox cmd response data (12 bytes)
3,630,416 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,240 UART:
3,631,256 UART: Running Caliptra ROM ...
3,631,664 UART:
3,631,806 UART: [state] CFI Enabled
3,634,666 UART: [state] LifecycleState = Unprovisioned
3,635,321 UART: [state] DebugLocked = No
3,635,891 UART: [state] WD Timer not started. Device not locked for debugging
3,637,087 UART: [kat] SHA2-256
4,440,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,444,766 UART: [kat] ++
4,444,918 UART: [kat] sha1
4,448,970 UART: [kat] SHA2-256
4,450,910 UART: [kat] SHA2-384
4,453,555 UART: [kat] SHA2-512-ACC
4,455,455 UART: [kat] ECC-384
4,465,214 UART: [kat] HMAC-384Kdf
4,469,762 UART: [kat] LMS
4,718,074 UART: [kat] --
4,718,874 UART: [update-reset] ++
6,030,988 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,031,997 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,181,863 >>> mbox cmd response: success
6,181,863 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,182,032 UART: [update-reset] Copying MAN_2 To MAN_1
6,190,046 UART: [update-reset Success] --
6,190,861 UART: [state] Locking Datavault
6,191,647 UART: [state] Locking PCR0, PCR1 and PCR31
6,192,251 UART: [state] Locking ICCM
6,192,891 UART: [exit] Launching FMC @ 0x40000130
6,198,220 UART:
6,198,236 UART: Running Caliptra FMC ...
6,198,644 UART:
6,198,787 UART: [state] CFI Enabled
6,288,208 UART: [art] Extend RT PCRs Done
6,288,636 UART: [art] Lock RT PCRs Done
6,289,641 UART: [art] Populate DV Done
6,297,940 UART: [fht] FMC Alias Private Key: 7
6,299,080 UART: [art] Derive CDI
6,299,360 UART: [art] Store in in slot 0x4
6,385,283 UART: [art] Derive Key Pair
6,385,643 UART: [art] Store priv key in slot 0x5
6,398,875 UART: [art] Derive Key Pair - Done
6,413,609 UART: [art] Signing Cert with AUTHO
6,414,089 UART: RITY.KEYID = 7
6,428,973 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,738 UART: [art] PUB.X = ABDD4D42E9DDB50E6AEA817A72994ACFBC6F5D53E661757F4527D8B23A7D1EAB0D2C70758D6783A298F9F82D6616BB0A
6,436,517 UART: [art] PUB.Y = 6CE97549D72FC62882A2AE8844B784A88718923A8E9ED899E6DFDCB6320F4CE7D85227293E232210A8BE399852AC9C53
6,443,464 UART: [art] SIG.R = FF86A3AB64C83955C15E288A955E9F5A7EC9B829E04B429BBCAB6EB0C6AFE0653FCB28E44BB105D2DF9CF3254370F2CD
6,450,253 UART: [art] SIG.S = 991C18F599C3BB671E758867C4FA934168B1C79C7B815319730673100DBF1281C9063B46F64604C364089DDD6E1007CF
6,473,968 UART: Caliptra RT
6,474,314 UART: [state] CFI Enabled
6,756,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,787,267 UART: [rt]cmd =0x41545348, len=116
6,809,334 >>> mbox cmd response data (12 bytes)
6,809,335 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,839,388 UART: [rt]cmd =0x41545348, len=116
6,841,323 >>> mbox cmd response data (12 bytes)
6,841,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,963,867 UART: [rt]cmd =0x41544d4e, len=14344
7,108,196 >>> mbox cmd response data (8 bytes)
7,108,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,138,342 UART: [rt]cmd =0x41545348, len=116
7,160,663 >>> mbox cmd response data (12 bytes)
7,160,664 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,190,587 UART: [rt]cmd =0x41545348, len=116
7,192,335 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,347 ready_for_fw is high
1,056,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,885 >>> mbox cmd response: success
2,684,097 UART:
2,684,113 UART: Running Caliptra FMC ...
2,684,521 UART:
2,684,664 UART: [state] CFI Enabled
2,695,133 UART: [fht] FMC Alias Private Key: 7
2,803,108 UART: [art] Extend RT PCRs Done
2,803,536 UART: [art] Lock RT PCRs Done
2,804,962 UART: [art] Populate DV Done
2,813,073 UART: [fht] FMC Alias Private Key: 7
2,814,255 UART: [art] Derive CDI
2,814,535 UART: [art] Store in in slot 0x4
2,900,060 UART: [art] Derive Key Pair
2,900,420 UART: [art] Store priv key in slot 0x5
2,913,406 UART: [art] Derive Key Pair - Done
2,928,013 UART: [art] Signing Cert with AUTHO
2,928,493 UART: RITY.KEYID = 7
2,943,755 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,520 UART: [art] PUB.X = 192B23C967CE825B4B42D91726E4C4D6F27A87C14F7408112F2ECF7DF70B8B403D84F11FEEBCD175AB1741AA6BAF4623
2,951,296 UART: [art] PUB.Y = A15A496E9037959301C8914C068B0E97651694062799812385ABE9609B3740365EFB12F3880AF9B0C03E3E6E673371A5
2,958,215 UART: [art] SIG.R = DFBCDEB11816EE89F46484AB734BE00095A88411E7A7999DDAA23807AE60A831A4ECD832D503D60651B8A4A694EB4A02
2,964,961 UART: [art] SIG.S = 984A97FE7702FE36476C88636EA3B84112163F25BAED00F56B63B070E572B585CEBE3E8422734C40BEB9F6A5648501F8
2,989,486 UART: Caliptra RT
2,989,832 UART: [state] CFI Enabled
3,097,585 UART: [rt] RT listening for mailbox commands...
3,098,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,994 UART: [rt]cmd =0x41544d4e, len=14344
3,365,567 >>> mbox cmd response data (8 bytes)
3,365,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,529 UART: [rt]cmd =0x41545348, len=116
3,417,100 >>> mbox cmd response data (12 bytes)
3,417,101 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,114 UART: [rt]cmd =0x41545348, len=116
3,449,145 >>> mbox cmd response data (12 bytes)
3,449,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,064 >>> mbox cmd response: success
5,884,064 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,897,808 UART:
5,897,824 UART: Running Caliptra FMC ...
5,898,232 UART:
5,898,375 UART: [state] CFI Enabled
5,987,528 UART: [art] Extend RT PCRs Done
5,987,956 UART: [art] Lock RT PCRs Done
5,989,317 UART: [art] Populate DV Done
5,997,534 UART: [fht] FMC Alias Private Key: 7
5,998,582 UART: [art] Derive CDI
5,998,862 UART: [art] Store in in slot 0x4
6,084,831 UART: [art] Derive Key Pair
6,085,191 UART: [art] Store priv key in slot 0x5
6,098,845 UART: [art] Derive Key Pair - Done
6,113,778 UART: [art] Signing Cert with AUTHO
6,114,258 UART: RITY.KEYID = 7
6,129,410 UART: [art] Erasing AUTHORITY.KEYID = 7
6,130,175 UART: [art] PUB.X = 241E4637100FB8DC24D0BBFC65D1C77E11759589BA66ED8D196E84937885450AF953F31F59925100B47E2D8F56E514D0
6,136,913 UART: [art] PUB.Y = C226CDA8FFA8AC32F1149375CECC5529F84669E4BE9C463D75C610A10FE13EDCB15051E5F67751EAF5C4A181B9F3F60A
6,143,873 UART: [art] SIG.R = D07A47E43F49F8AF9CDD5320B6F7B3B8B8D5867CE6DFA749C09DA43C43F75F44E673BF32A41E7EF2B3C73BE86B1B5DBE
6,150,667 UART: [art] SIG.S = DA29C2789A6FD99CEB03111C816B488590D8882ED3DB736A1325E53E1AED8C5AB45F3CACD4FECC4AB56ECE1D72C592D1
6,174,491 UART: Caliptra RT
6,174,837 UART: [state] CFI Enabled
6,454,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,485,852 UART: [rt]cmd =0x41545348, len=116
6,508,367 >>> mbox cmd response data (12 bytes)
6,508,368 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,538,341 UART: [rt]cmd =0x41545348, len=116
6,539,952 >>> mbox cmd response data (12 bytes)
6,539,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,662,320 UART: [rt]cmd =0x41544d4e, len=14344
6,807,589 >>> mbox cmd response data (8 bytes)
6,807,590 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,837,569 UART: [rt]cmd =0x41545348, len=116
6,858,602 >>> mbox cmd response data (12 bytes)
6,858,603 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,888,402 UART: [rt]cmd =0x41545348, len=116
6,890,374 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,413 UART:
192,866 UART: Running Caliptra ROM ...
194,005 UART:
194,159 UART: [state] CFI Enabled
264,848 UART: [state] LifecycleState = Unprovisioned
266,860 UART: [state] DebugLocked = No
269,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,692 UART: [kat] SHA2-256
444,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,925 UART: [kat] ++
455,408 UART: [kat] sha1
465,711 UART: [kat] SHA2-256
468,423 UART: [kat] SHA2-384
473,908 UART: [kat] SHA2-512-ACC
476,277 UART: [kat] ECC-384
2,768,000 UART: [kat] HMAC-384Kdf
2,780,129 UART: [kat] LMS
3,970,473 UART: [kat] --
3,974,892 UART: [cold-reset] ++
3,977,039 UART: [fht] Storing FHT @ 0x50003400
3,989,861 UART: [idev] ++
3,990,435 UART: [idev] CDI.KEYID = 6
3,991,458 UART: [idev] SUBJECT.KEYID = 7
3,992,623 UART: [idev] UDS.KEYID = 0
3,993,650 ready_for_fw is high
3,993,857 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,354 UART: [idev] Erasing UDS.KEYID = 0
7,328,352 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,146 UART: [idev] --
7,353,408 UART: [ldev] ++
7,353,971 UART: [ldev] CDI.KEYID = 6
7,354,982 UART: [ldev] SUBJECT.KEYID = 5
7,356,131 UART: [ldev] AUTHORITY.KEYID = 7
7,357,407 UART: [ldev] FE.KEYID = 1
7,402,398 UART: [ldev] Erasing FE.KEYID = 1
10,737,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,579 UART: [ldev] --
13,115,298 UART: [fwproc] Waiting for Commands...
13,118,369 UART: [fwproc] Received command 0x46574c44
13,120,543 UART: [fwproc] Received Image of size 114036 bytes
17,177,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,987 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,640,364 >>> mbox cmd response: success
17,644,953 UART: [afmc] ++
17,645,584 UART: [afmc] CDI.KEYID = 6
17,646,496 UART: [afmc] SUBJECT.KEYID = 7
17,647,708 UART: [afmc] AUTHORITY.KEYID = 5
21,010,531 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,005 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,404 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,236 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,678 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,187 UART: [afmc] --
23,379,773 UART: [cold-reset] --
23,383,244 UART: [state] Locking Datavault
23,389,022 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,772 UART: [state] Locking ICCM
23,392,427 UART: [exit] Launching FMC @ 0x40000130
23,400,813 UART:
23,401,041 UART: Running Caliptra FMC ...
23,402,134 UART:
23,402,284 UART: [state] CFI Enabled
23,469,152 UART: [fht] FMC Alias Private Key: 7
25,806,826 UART: [art] Extend RT PCRs Done
25,808,091 UART: [art] Lock RT PCRs Done
25,809,693 UART: [art] Populate DV Done
25,815,161 UART: [fht] FMC Alias Private Key: 7
25,816,854 UART: [art] Derive CDI
25,817,662 UART: [art] Store in in slot 0x4
25,877,675 UART: [art] Derive Key Pair
25,878,670 UART: [art] Store priv key in slot 0x5
29,171,359 UART: [art] Derive Key Pair - Done
29,184,079 UART: [art] Signing Cert with AUTHO
29,185,383 UART: RITY.KEYID = 7
31,473,669 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,175 UART: [art] PUB.X = E0DD85C2B80668DC25DC0E20BC5587E2243D62D5B24EE073C1AA9709B807D7C91CD15ACC21B86CE7110939BD6F2D1EF4
31,482,395 UART: [art] PUB.Y = 2E4B23D8CEB2D66C53CC2843D2F2C507AE1B28A207E0EFC1594D430E8012710C1C685870FF3F6BB505C7E79A7E63F4B3
31,489,685 UART: [art] SIG.R = 2243C713A48300E9ED9283E85CCC12DA750C6B30E506CBF0527F51B277AA8C1DA9066899C30B9D84E852AB558342B60D
31,497,052 UART: [art] SIG.S = 378BAEACD252CE3FBC9BD7DDE40FB6AC0FB66A785B4F48BEE9046BA750363BA2EB70D09685A78C01052EF7811026F421
32,802,488 UART: Caliptra RT
32,803,201 UART: [state] CFI Enabled
32,964,741 UART: [rt] RT listening for mailbox commands...
36,998,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,154,749 UART: [rt]cmd =0x41544d4e, len=14344
42,390,481 >>> mbox cmd response data (8 bytes)
42,391,050 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,421,890 UART: [rt]cmd =0x41545348, len=116
42,441,372 >>> mbox cmd response data (12 bytes)
44,499,858 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
44,645,079 UART:
44,645,489 UART: Running Caliptra ROM ...
44,646,539 UART:
44,646,683 UART: [state] CFI Enabled
44,711,255 UART: [state] LifecycleState = Unprovisioned
44,713,201 UART: [state] DebugLocked = No
44,715,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,721,172 UART: [kat] SHA2-256
44,890,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,901,355 UART: [kat] ++
44,901,807 UART: [kat] sha1
44,912,038 UART: [kat] SHA2-256
44,914,726 UART: [kat] SHA2-384
44,919,193 UART: [kat] SHA2-512-ACC
44,921,587 UART: [kat] ECC-384
47,216,336 UART: [kat] HMAC-384Kdf
47,246,876 UART: [kat] LMS
48,437,220 UART: [kat] --
48,441,696 UART: [update-reset] ++
52,587,146 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,590,280 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
52,972,228 >>> mbox cmd response: success
52,976,828 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,977,433 UART: [update-reset] Copying MAN_2 To MAN_1
52,996,645 UART: [update-reset Success] --
53,000,990 UART: [state] Locking Datavault
53,003,988 UART: [state] Locking PCR0, PCR1 and PCR31
53,005,804 UART: [state] Locking ICCM
53,006,941 UART: [exit] Launching FMC @ 0x40000130
53,015,360 UART:
53,015,597 UART: Running Caliptra FMC ...
53,016,697 UART:
53,016,853 UART: [state] CFI Enabled
53,103,613 UART: [art] Extend RT PCRs Done
53,104,798 UART: [art] Lock RT PCRs Done
53,106,411 UART: [art] Populate DV Done
53,111,841 UART: [fht] FMC Alias Private Key: 7
53,113,441 UART: [art] Derive CDI
53,114,251 UART: [art] Store in in slot 0x4
53,172,361 UART: [art] Derive Key Pair
53,173,400 UART: [art] Store priv key in slot 0x5
56,465,451 UART: [art] Derive Key Pair - Done
56,478,380 UART: [art] Signing Cert with AUTHO
56,479,677 UART: RITY.KEYID = 7
58,766,492 UART: [art] Erasing AUTHORITY.KEYID = 7
58,768,023 UART: [art] PUB.X = 4AC4715B7F3B847C2177A5774DC94E8F3178170F7CB780AAED30F5EF97CC3E8AF3641F88E183291BD84A9AE293F4EDFA
58,775,272 UART: [art] PUB.Y = 75E4AB1F74C2B4BF4B6AD55324B8132D4DB77928CBAD36D22EBC46E7097ACD085E007200C892936DEA29E0082343AE7D
58,782,488 UART: [art] SIG.R = 438ED7D916A8135936E14FBA46D91F5080983954416795AC6823CDC7C58B2CF029AC66F5E1F76C73B65B0B5E4612C407
58,789,861 UART: [art] SIG.S = C5D103A822EE2CE50E535B71AC111464091F6AF1842921155EC8C7CCDAE3F4AA6C513656DD3B1CF20F841E924D42BCC6
60,095,320 UART: Caliptra RT
60,096,049 UART: [state] CFI Enabled
60,435,486 UART: [rt] RT listening for mailbox commands...
60,467,426 UART: [rt]cmd =0x41545348, len=116
60,486,927 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,786,899 ready_for_fw is high
3,787,428 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,855,069 >>> mbox cmd response: success
23,546,351 UART:
23,546,753 UART: Running Caliptra FMC ...
23,547,900 UART:
23,548,068 UART: [state] CFI Enabled
23,598,761 UART: [fht] FMC Alias Private Key: 7
25,937,087 UART: [art] Extend RT PCRs Done
25,938,323 UART: [art] Lock RT PCRs Done
25,939,914 UART: [art] Populate DV Done
25,945,291 UART: [fht] FMC Alias Private Key: 7
25,946,827 UART: [art] Derive CDI
25,947,561 UART: [art] Store in in slot 0x4
26,009,851 UART: [art] Derive Key Pair
26,010,895 UART: [art] Store priv key in slot 0x5
29,304,450 UART: [art] Derive Key Pair - Done
29,317,283 UART: [art] Signing Cert with AUTHO
29,318,583 UART: RITY.KEYID = 7
31,605,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,607,051 UART: [art] PUB.X = 19E385FDAD8B5A497DECB25FD021F0B6EE0CDD576B0B837F514F5D2DD50989C8545B62E978C03F03413FCAA91015758F
31,614,285 UART: [art] PUB.Y = 99E45D2C9B7EC1B202F7E660B6C5BA23B29BE54905C825BC52823E90AB1264F5382499D91B77EFB642DDF4E658106293
31,621,542 UART: [art] SIG.R = CE5A1309E3F0C4676C2BC94ACB4970EA47DEDE6BC63C7A8F15661354025DDC6E569DA0215E576EB3791E75F6A9A90B3C
31,628,898 UART: [art] SIG.S = 8A42970A7B880F40907E8783F158A59A9CAE9C0C199080DA5BDA1B3BFB4ACC72656A8943ADED0886164707401F635DBB
32,934,679 UART: Caliptra RT
32,935,395 UART: [state] CFI Enabled
33,095,588 UART: [rt] RT listening for mailbox commands...
37,131,950 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,287,306 UART: [rt]cmd =0x41544d4e, len=14344
42,523,056 >>> mbox cmd response data (8 bytes)
42,523,645 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,554,328 UART: [rt]cmd =0x41545348, len=116
42,573,937 >>> mbox cmd response data (12 bytes)
44,633,171 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
53,386,475 >>> mbox cmd response: success
53,391,342 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,419,770 UART:
53,420,065 UART: Running Caliptra FMC ...
53,421,103 UART:
53,421,243 UART: [state] CFI Enabled
53,521,435 UART: [art] Extend RT PCRs Done
53,522,647 UART: [art] Lock RT PCRs Done
53,523,805 UART: [art] Populate DV Done
53,529,375 UART: [fht] FMC Alias Private Key: 7
53,530,930 UART: [art] Derive CDI
53,531,741 UART: [art] Store in in slot 0x4
53,591,069 UART: [art] Derive Key Pair
53,592,064 UART: [art] Store priv key in slot 0x5
56,884,640 UART: [art] Derive Key Pair - Done
56,897,916 UART: [art] Signing Cert with AUTHO
56,899,223 UART: RITY.KEYID = 7
59,185,768 UART: [art] Erasing AUTHORITY.KEYID = 7
59,187,274 UART: [art] PUB.X = EE67F822C9EA4252EFC799B5ED99A70D087F6EC5DF890FA3551901FE67D2A30A280DC00B9A4B1C2BBF29F4A8209DD77E
59,194,560 UART: [art] PUB.Y = D03FD8643CC03987D2E66AA5F09FB7C2DB49617400536FE28303D5EACDC778BEE2A8BECCD4FFB6CF751227C759A4B07F
59,201,812 UART: [art] SIG.R = 4F411FAC28CBFA271F768FBDD09BFCF54BCA91A1E956D8764FE1881D9713B0A7019209C823EC3D939374CD7E96758F27
59,209,205 UART: [art] SIG.S = 793BC3572D295638F985DA6BED5E937DC6A1BE8319E93AEB8FC5EA11A62BC4A2CFA47CA839704960213235C30FFA590F
60,514,694 UART: Caliptra RT
60,515,387 UART: [state] CFI Enabled
60,845,657 UART: [rt] RT listening for mailbox commands...
60,877,654 UART: [rt]cmd =0x41545348, len=116
60,896,893 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,373 UART:
192,737 UART: Running Caliptra ROM ...
193,857 UART:
603,721 UART: [state] CFI Enabled
617,381 UART: [state] LifecycleState = Unprovisioned
619,338 UART: [state] DebugLocked = No
621,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,516 UART: [kat] SHA2-256
796,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,830 UART: [kat] ++
807,364 UART: [kat] sha1
818,101 UART: [kat] SHA2-256
820,821 UART: [kat] SHA2-384
827,171 UART: [kat] SHA2-512-ACC
829,503 UART: [kat] ECC-384
3,114,375 UART: [kat] HMAC-384Kdf
3,126,856 UART: [kat] LMS
4,316,969 UART: [kat] --
4,321,877 UART: [cold-reset] ++
4,323,748 UART: [fht] Storing FHT @ 0x50003400
4,335,445 UART: [idev] ++
4,336,008 UART: [idev] CDI.KEYID = 6
4,336,961 UART: [idev] SUBJECT.KEYID = 7
4,338,201 UART: [idev] UDS.KEYID = 0
4,339,210 ready_for_fw is high
4,339,432 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,718 UART: [idev] Erasing UDS.KEYID = 0
7,622,430 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,171 UART: [idev] --
7,648,582 UART: [ldev] ++
7,649,158 UART: [ldev] CDI.KEYID = 6
7,650,099 UART: [ldev] SUBJECT.KEYID = 5
7,651,322 UART: [ldev] AUTHORITY.KEYID = 7
7,652,607 UART: [ldev] FE.KEYID = 1
7,663,269 UART: [ldev] Erasing FE.KEYID = 1
10,947,660 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,838 UART: [ldev] --
13,309,031 UART: [fwproc] Waiting for Commands...
13,311,575 UART: [fwproc] Received command 0x46574c44
13,313,758 UART: [fwproc] Received Image of size 114036 bytes
17,367,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,829,686 >>> mbox cmd response: success
17,833,621 UART: [afmc] ++
17,834,243 UART: [afmc] CDI.KEYID = 6
17,835,180 UART: [afmc] SUBJECT.KEYID = 7
17,836,399 UART: [afmc] AUTHORITY.KEYID = 5
21,150,976 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,946 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,262 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,606 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,473 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,906 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,264 UART: [afmc] --
23,513,559 UART: [cold-reset] --
23,518,296 UART: [state] Locking Datavault
23,525,163 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,913 UART: [state] Locking ICCM
23,528,898 UART: [exit] Launching FMC @ 0x40000130
23,537,292 UART:
23,537,532 UART: Running Caliptra FMC ...
23,538,650 UART:
23,538,813 UART: [state] CFI Enabled
23,546,686 UART: [fht] FMC Alias Private Key: 7
25,877,898 UART: [art] Extend RT PCRs Done
25,879,116 UART: [art] Lock RT PCRs Done
25,880,713 UART: [art] Populate DV Done
25,886,135 UART: [fht] FMC Alias Private Key: 7
25,887,835 UART: [art] Derive CDI
25,888,572 UART: [art] Store in in slot 0x4
25,931,328 UART: [art] Derive Key Pair
25,932,328 UART: [art] Store priv key in slot 0x5
29,174,058 UART: [art] Derive Key Pair - Done
29,187,226 UART: [art] Signing Cert with AUTHO
29,188,530 UART: RITY.KEYID = 7
31,468,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,564 UART: [art] PUB.X = 0E912D21563C751C1B0BC4C8EC14FFDDC3EE6152CE1AE7F187521BE351C3A11EF03B543248516BC40B733F27BAEE8606
31,476,790 UART: [art] PUB.Y = DE8D05B3F399B376119086DA0B0F0C3F18E14782651EAD1B898BA6C27672A8CE6665EF45EF61B0054DBC1973CBD4B855
31,484,044 UART: [art] SIG.R = 3F87287454A1BDD541BC1E4C0F4DE3C9621FB70C4CEB04EC24E1B78AEA65EB527E3464F0FA93D18423EC70D427EAE6F2
31,491,446 UART: [art] SIG.S = 50E201E8999F7ABCEA9D80FE4802A1959A297BC85E6529EF34685FA941FC7565D59F85BE1A2FE3CAA3C0F57EA7FDCFD3
32,796,901 UART: Caliptra RT
32,797,625 UART: [state] CFI Enabled
32,915,361 UART: [rt] RT listening for mailbox commands...
36,939,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,094,482 UART: [rt]cmd =0x41544d4e, len=14344
42,329,991 >>> mbox cmd response data (8 bytes)
42,330,573 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,361,211 UART: [rt]cmd =0x41545348, len=116
42,381,012 >>> mbox cmd response data (12 bytes)
44,434,038 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
44,578,792 UART:
44,579,153 UART: Running Caliptra ROM ...
44,580,284 UART:
44,580,451 UART: [state] CFI Enabled
44,592,034 UART: [state] LifecycleState = Unprovisioned
44,593,976 UART: [state] DebugLocked = No
44,596,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,602,321 UART: [kat] SHA2-256
44,772,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,782,574 UART: [kat] ++
44,783,109 UART: [kat] sha1
44,793,853 UART: [kat] SHA2-256
44,796,547 UART: [kat] SHA2-384
44,801,668 UART: [kat] SHA2-512-ACC
44,804,034 UART: [kat] ECC-384
47,086,813 UART: [kat] HMAC-384Kdf
47,099,649 UART: [kat] LMS
48,289,736 UART: [kat] --
48,294,829 UART: [update-reset] ++
52,434,862 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,439,404 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
52,821,397 >>> mbox cmd response: success
52,826,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,826,898 UART: [update-reset] Copying MAN_2 To MAN_1
52,845,833 UART: [update-reset Success] --
52,850,230 UART: [state] Locking Datavault
52,853,020 UART: [state] Locking PCR0, PCR1 and PCR31
52,854,782 UART: [state] Locking ICCM
52,856,666 UART: [exit] Launching FMC @ 0x40000130
52,865,069 UART:
52,865,305 UART: Running Caliptra FMC ...
52,866,405 UART:
52,866,565 UART: [state] CFI Enabled
52,910,949 UART: [art] Extend RT PCRs Done
52,912,233 UART: [art] Lock RT PCRs Done
52,913,724 UART: [art] Populate DV Done
52,919,172 UART: [fht] FMC Alias Private Key: 7
52,920,766 UART: [art] Derive CDI
52,921,582 UART: [art] Store in in slot 0x4
52,964,335 UART: [art] Derive Key Pair
52,965,337 UART: [art] Store priv key in slot 0x5
56,207,959 UART: [art] Derive Key Pair - Done
56,220,740 UART: [art] Signing Cert with AUTHO
56,222,054 UART: RITY.KEYID = 7
58,501,600 UART: [art] Erasing AUTHORITY.KEYID = 7
58,503,119 UART: [art] PUB.X = 8EEA03CDEF8E168BCBB46CE0EFBB2BDE6327CE1545E8BEF8A7D3659EBB451C5B5FC76ACE59E26D020F7090D5BEFCAE0F
58,510,441 UART: [art] PUB.Y = D6C706FABD3B9BAA96991DD5F4777CCBA7706B7BDF894D64AB04236EA12FEC3523BDEA54D1C33D636DB709E7FCAA8370
58,517,651 UART: [art] SIG.R = 37622D2C4B17A9BAFFF38DCB49428C88DABCE130D6DD73B2EEFB404CAA2D4465169512D01F11A5E67E2A5708BE644825
58,525,049 UART: [art] SIG.S = 7514B3973FAFF98AD9A40C2943ED3FF4755095D5650A66DFF9C4E49AC76EE0D638FD77FC5200DC1A9FE8D21FCA547553
59,830,095 UART: Caliptra RT
59,830,797 UART: [state] CFI Enabled
60,118,869 UART: [rt] RT listening for mailbox commands...
60,150,845 UART: [rt]cmd =0x41545348, len=116
60,171,499 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
4,129,540 ready_for_fw is high
4,129,918 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,396 >>> mbox cmd response: success
23,716,364 UART:
23,716,777 UART: Running Caliptra FMC ...
23,717,978 UART:
23,718,168 UART: [state] CFI Enabled
23,725,903 UART: [fht] FMC Alias Private Key: 7
26,056,948 UART: [art] Extend RT PCRs Done
26,058,178 UART: [art] Lock RT PCRs Done
26,060,123 UART: [art] Populate DV Done
26,065,019 UART: [fht] FMC Alias Private Key: 7
26,066,577 UART: [art] Derive CDI
26,067,401 UART: [art] Store in in slot 0x4
26,110,053 UART: [art] Derive Key Pair
26,111,059 UART: [art] Store priv key in slot 0x5
29,352,705 UART: [art] Derive Key Pair - Done
29,365,541 UART: [art] Signing Cert with AUTHO
29,366,839 UART: RITY.KEYID = 7
31,646,269 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,782 UART: [art] PUB.X = 92BDE9D5AA1E0AA8E49CF40CD020BC59C309D56B9FEA783714AC30F3E9AC1A29D6BB7DA7E15B1CE409F691E11E57AFEB
31,655,052 UART: [art] PUB.Y = 0688E174DA781E6481E49E89C96ECB99C17F8CD32F1EECCC8F27ED7FBB2780CBE9D36030999CCBBF230B3577C9095567
31,662,301 UART: [art] SIG.R = 3316333ED995C88502A8FFE355F79E8DE1F34E512F28EBDBFAC1893D97AD7FC9985D4DBD20D87E174772C8638C479BAB
31,669,678 UART: [art] SIG.S = 22D5DEAB52C18CC040D385271ABEC1D403979592C0651909FC0FC86C8B763478C633F2823E42C85BFFCF90F430662799
32,975,321 UART: Caliptra RT
32,976,037 UART: [state] CFI Enabled
33,093,006 UART: [rt] RT listening for mailbox commands...
37,118,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,274,382 UART: [rt]cmd =0x41544d4e, len=14344
42,509,570 >>> mbox cmd response data (8 bytes)
42,510,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,540,952 UART: [rt]cmd =0x41545348, len=116
42,559,993 >>> mbox cmd response data (12 bytes)
44,613,251 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
53,270,976 >>> mbox cmd response: success
53,275,879 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,307,656 UART:
53,307,948 UART: Running Caliptra FMC ...
53,309,061 UART:
53,309,230 UART: [state] CFI Enabled
53,353,209 UART: [art] Extend RT PCRs Done
53,354,414 UART: [art] Lock RT PCRs Done
53,355,767 UART: [art] Populate DV Done
53,361,337 UART: [fht] FMC Alias Private Key: 7
53,362,980 UART: [art] Derive CDI
53,363,814 UART: [art] Store in in slot 0x4
53,406,192 UART: [art] Derive Key Pair
53,407,196 UART: [art] Store priv key in slot 0x5
56,648,873 UART: [art] Derive Key Pair - Done
56,661,774 UART: [art] Signing Cert with AUTHO
56,663,090 UART: RITY.KEYID = 7
58,942,043 UART: [art] Erasing AUTHORITY.KEYID = 7
58,943,554 UART: [art] PUB.X = D8E78DADAD9AD751A2F0484661439DFA1513A0608AB8581A97B871F51D0EC010F6B363AE7C320C9FAF0BF4479F5D59D5
58,950,780 UART: [art] PUB.Y = EA5F805A7DB6EBB32DA2153B7C4EE8FB70BF2CCEEC0E24265E982141A2E485008C5175E64C8C620DE484E4005DBC2C96
58,958,044 UART: [art] SIG.R = FBE672DE41F0FE77C340395B45592876A9E02B56AB88233DEA7BD40812F0C71312E561328A21BF8854FB8B87E24DF31A
58,965,420 UART: [art] SIG.S = C5B58F3CA913F6ED913FB4C1B73A97CB187D9B0F95EA290506C6071E9FF93ED0A879FBB8CE3367A08C57FE85741EE71E
60,270,527 UART: Caliptra RT
60,271,245 UART: [state] CFI Enabled
60,561,133 UART: [rt] RT listening for mailbox commands...
60,592,984 UART: [rt]cmd =0x41545348, len=116
60,613,264 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,543 writing to cptra_bootfsm_go
192,650 UART:
193,015 UART: Running Caliptra ROM ...
194,212 UART:
194,364 UART: [state] CFI Enabled
261,242 UART: [state] LifecycleState = Unprovisioned
263,153 UART: [state] DebugLocked = No
265,119 UART: [state] WD Timer not started. Device not locked for debugging
268,795 UART: [kat] SHA2-256
447,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,527 UART: [kat] ++
460,088 UART: [kat] sha1
470,910 UART: [kat] SHA2-256
473,926 UART: [kat] SHA2-384
479,495 UART: [kat] SHA2-512-ACC
482,501 UART: [kat] ECC-384
2,928,025 UART: [kat] HMAC-384Kdf
2,949,578 UART: [kat] LMS
3,479,046 UART: [kat] --
3,484,763 UART: [cold-reset] ++
3,486,084 UART: [fht] FHT @ 0x50003400
3,496,744 UART: [idev] ++
3,497,312 UART: [idev] CDI.KEYID = 6
3,498,270 UART: [idev] SUBJECT.KEYID = 7
3,499,443 UART: [idev] UDS.KEYID = 0
3,500,411 ready_for_fw is high
3,500,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,644,551 UART: [idev] Erasing UDS.KEYID = 0
6,004,603 UART: [idev] Sha1 KeyId Algorithm
6,026,935 UART: [idev] --
6,029,587 UART: [ldev] ++
6,030,161 UART: [ldev] CDI.KEYID = 6
6,031,046 UART: [ldev] SUBJECT.KEYID = 5
6,032,181 UART: [ldev] AUTHORITY.KEYID = 7
6,033,474 UART: [ldev] FE.KEYID = 1
6,078,456 UART: [ldev] Erasing FE.KEYID = 1
8,583,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,679 UART: [ldev] --
10,393,466 UART: [fwproc] Wait for Commands...
10,395,634 UART: [fwproc] Recv command 0x46574c44
10,397,727 UART: [fwproc] Recv'd Img size: 114360 bytes
13,792,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,257,386 >>> mbox cmd response: success
14,261,208 UART: [afmc] ++
14,261,835 UART: [afmc] CDI.KEYID = 6
14,262,757 UART: [afmc] SUBJECT.KEYID = 7
14,263,864 UART: [afmc] AUTHORITY.KEYID = 5
16,807,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,165 UART: [afmc] --
18,609,801 UART: [cold-reset] --
18,613,351 UART: [state] Locking Datavault
18,616,820 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,468 UART: [state] Locking ICCM
18,620,025 UART: [exit] Launching FMC @ 0x40000130
18,628,428 UART:
18,628,674 UART: Running Caliptra FMC ...
18,629,788 UART:
18,629,947 UART: [state] CFI Enabled
18,689,932 UART: [fht] FMC Alias Private Key: 7
20,453,913 UART: [art] Extend RT PCRs Done
20,455,133 UART: [art] Lock RT PCRs Done
20,457,080 UART: [art] Populate DV Done
20,462,493 UART: [fht] FMC Alias Private Key: 7
20,464,035 UART: [art] Derive CDI
20,464,875 UART: [art] Store in in slot 0x4
20,522,560 UART: [art] Derive Key Pair
20,523,601 UART: [art] Store priv key in slot 0x5
22,986,600 UART: [art] Derive Key Pair - Done
22,999,424 UART: [art] Signing Cert with AUTHO
23,000,727 UART: RITY.KEYID = 7
24,712,709 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,227 UART: [art] PUB.X = C523F86DFC42F1755438F6ED6D1D1E5C6CFCDE5702A9F908569C7F373B1F31146728DEC13840FDB9E0E90F4EA4D1B8CA
24,721,502 UART: [art] PUB.Y = 4CEBE1608737BFF02964A94276889312D641D79E14D5EED465A2EAD920445CFCD5AE46A96B69378766B7E7BA87BCBDFD
24,728,761 UART: [art] SIG.R = 7ACD6A643FCC015D6C1D0B360DDDB98E42D083AF3BEC68919610C339B61C9F9736222FC5A628140BADF4327EFB779BC7
24,736,180 UART: [art] SIG.S = 37F8D9A135EDF3F4357F681A1F38FF05AF979C40904B00DF6C94F037A938463E8F48C01E477AD4451172FBBA40665F86
25,714,801 UART: Caliptra RT
25,715,512 UART: [state] CFI Enabled
25,881,502 UART: [rt] RT listening for mailbox commands...
29,911,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,067,359 UART: [rt]cmd =0x41544d4e, len=14344
33,997,404 >>> mbox cmd response data (8 bytes)
33,997,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,028,558 UART: [rt]cmd =0x41545348, len=116
34,047,791 >>> mbox cmd response data (12 bytes)
36,100,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
36,246,123 UART:
36,246,549 UART: Running Caliptra ROM ...
36,247,686 UART:
36,247,860 UART: [state] CFI Enabled
36,309,445 UART: [state] LifecycleState = Unprovisioned
36,311,324 UART: [state] DebugLocked = No
36,313,683 UART: [state] WD Timer not started. Device not locked for debugging
36,317,445 UART: [kat] SHA2-256
36,496,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,508,186 UART: [kat] ++
36,508,727 UART: [kat] sha1
36,520,918 UART: [kat] SHA2-256
36,523,956 UART: [kat] SHA2-384
36,530,451 UART: [kat] SHA2-512-ACC
36,533,415 UART: [kat] ECC-384
38,996,728 UART: [kat] HMAC-384Kdf
39,019,053 UART: [kat] LMS
39,548,524 UART: [kat] --
39,554,987 UART: [update-reset] ++
42,984,491 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,987,067 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
43,369,980 >>> mbox cmd response: success
43,370,432 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,371,230 UART: [update-reset] Copying MAN_2 To MAN_1
43,393,523 UART: [update-reset Success] --
43,397,543 UART: [state] Locking Datavault
43,401,068 UART: [state] Locking PCR0, PCR1 and PCR31
43,402,941 UART: [state] Locking ICCM
43,403,914 UART: [exit] Launching FMC @ 0x40000130
43,412,367 UART:
43,412,611 UART: Running Caliptra FMC ...
43,413,714 UART:
43,413,873 UART: [state] CFI Enabled
43,509,686 UART: [art] Extend RT PCRs Done
43,510,869 UART: [art] Lock RT PCRs Done
43,512,110 UART: [art] Populate DV Done
43,517,681 UART: [fht] FMC Alias Private Key: 7
43,519,328 UART: [art] Derive CDI
43,520,143 UART: [art] Store in in slot 0x4
43,578,905 UART: [art] Derive Key Pair
43,580,104 UART: [art] Store priv key in slot 0x5
46,042,887 UART: [art] Derive Key Pair - Done
46,055,786 UART: [art] Signing Cert with AUTHO
46,057,101 UART: RITY.KEYID = 7
47,768,712 UART: [art] Erasing AUTHORITY.KEYID = 7
47,770,210 UART: [art] PUB.X = B41693ACAD11030654EE656D017A4E78CA6E618751CC51C001C043B0100A2DCD4E8184FBFE42A17447CCB67F07E75F71
47,777,512 UART: [art] PUB.Y = B3C77CBE21DB3A31017A0942337774F8F7352076381D0AB58E232C6BE334C66023A84015C914D259F5A5BDF83528B365
47,784,741 UART: [art] SIG.R = 8E41EB1170017D648519A4F05D01142E17917C82536B8222D13C51F1C82CBCEE9DE3516C8AE7706E775DD1A2A4071930
47,792,125 UART: [art] SIG.S = 8144A1D0F586D1D3E887ADD393764FE5D24AD104551F0D4B38B4FF1D39B401A0B073BE3F5913820A969C19DBCDB6A49C
48,770,560 UART: Caliptra RT
48,771,275 UART: [state] CFI Enabled
49,112,809 UART: [rt] RT listening for mailbox commands...
49,144,657 UART: [rt]cmd =0x41545348, len=116
49,164,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
192,647 UART:
193,019 UART: Running Caliptra ROM ...
194,222 UART:
194,376 UART: [state] CFI Enabled
261,540 UART: [state] LifecycleState = Unprovisioned
263,956 UART: [state] DebugLocked = No
265,992 UART: [state] WD Timer not started. Device not locked for debugging
270,038 UART: [kat] SHA2-256
459,880 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,696 UART: [kat] ++
471,159 UART: [kat] sha1
483,881 UART: [kat] SHA2-256
486,893 UART: [kat] SHA2-384
494,096 UART: [kat] SHA2-512-ACC
496,681 UART: [kat] ECC-384
2,947,189 UART: [kat] HMAC-384Kdf
2,969,725 UART: [kat] LMS
3,501,521 UART: [kat] --
3,508,215 UART: [cold-reset] ++
3,510,858 UART: [fht] FHT @ 0x50003400
3,522,758 UART: [idev] ++
3,523,470 UART: [idev] CDI.KEYID = 6
3,524,381 UART: [idev] SUBJECT.KEYID = 7
3,525,557 UART: [idev] UDS.KEYID = 0
3,526,483 ready_for_fw is high
3,526,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,503 UART: [idev] Erasing UDS.KEYID = 0
6,047,573 UART: [idev] Sha1 KeyId Algorithm
6,069,183 UART: [idev] --
6,074,399 UART: [ldev] ++
6,075,094 UART: [ldev] CDI.KEYID = 6
6,076,014 UART: [ldev] SUBJECT.KEYID = 5
6,077,179 UART: [ldev] AUTHORITY.KEYID = 7
6,078,410 UART: [ldev] FE.KEYID = 1
6,119,899 UART: [ldev] Erasing FE.KEYID = 1
8,625,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,219 UART: [ldev] --
10,434,452 UART: [fwproc] Wait for Commands...
10,436,725 UART: [fwproc] Recv command 0x46574c44
10,439,042 UART: [fwproc] Recv'd Img size: 114360 bytes
13,882,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,076,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,619,411 >>> mbox cmd response: success
14,623,699 UART: [afmc] ++
14,624,439 UART: [afmc] CDI.KEYID = 6
14,625,634 UART: [afmc] SUBJECT.KEYID = 7
14,627,000 UART: [afmc] AUTHORITY.KEYID = 5
17,168,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,904,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,906,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,921,357 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,936,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,951,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,975,462 UART: [afmc] --
18,978,311 UART: [cold-reset] --
18,982,021 UART: [state] Locking Datavault
18,986,689 UART: [state] Locking PCR0, PCR1 and PCR31
18,988,895 UART: [state] Locking ICCM
18,990,940 UART: [exit] Launching FMC @ 0x40000130
18,999,621 UART:
18,999,859 UART: Running Caliptra FMC ...
19,000,965 UART:
19,001,137 UART: [state] CFI Enabled
19,061,667 UART: [fht] FMC Alias Private Key: 7
20,825,261 UART: [art] Extend RT PCRs Done
20,826,486 UART: [art] Lock RT PCRs Done
20,828,438 UART: [art] Populate DV Done
20,833,743 UART: [fht] FMC Alias Private Key: 7
20,835,439 UART: [art] Derive CDI
20,836,273 UART: [art] Store in in slot 0x4
20,893,715 UART: [art] Derive Key Pair
20,894,759 UART: [art] Store priv key in slot 0x5
23,357,777 UART: [art] Derive Key Pair - Done
23,370,616 UART: [art] Signing Cert with AUTHO
23,371,919 UART: RITY.KEYID = 7
25,084,287 UART: [art] Erasing AUTHORITY.KEYID = 7
25,085,805 UART: [art] PUB.X = 438FFD03D2164903955D4D2BA7D9DA43712853D0286DB9D14A8225D97583B9A2C0441B2043C06ADD0D1DEE4E4871A176
25,093,087 UART: [art] PUB.Y = C1DB55CC634FEB9E95346424331C77585C8099680BB9E3ACCD3C61C3D310B98707C8A2AA8D5C2C4235FAD638E60507F7
25,100,336 UART: [art] SIG.R = 754CC08663B9E34D33883A66CA97204210609874D2CD1653C01BA7D7AFD9BBDD10769B2438F622DA1225EE7921F15A92
25,107,720 UART: [art] SIG.S = 4D9632797D25FD998EB25290ECF1D68BD4EB931550B9537EDCC7A59741BEF24CDFE9E82640339C964A0CFA11DA1763CA
26,086,862 UART: Caliptra RT
26,087,558 UART: [state] CFI Enabled
26,251,528 UART: [rt] RT listening for mailbox commands...
30,279,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,435,176 UART: [rt]cmd =0x41544d4e, len=14344
34,365,907 >>> mbox cmd response data (8 bytes)
34,366,501 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,397,304 UART: [rt]cmd =0x41545348, len=116
34,416,725 >>> mbox cmd response data (12 bytes)
36,471,676 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
36,616,918 UART:
36,617,298 UART: Running Caliptra ROM ...
36,618,439 UART:
36,618,620 UART: [state] CFI Enabled
36,689,009 UART: [state] LifecycleState = Unprovisioned
36,691,075 UART: [state] DebugLocked = No
36,692,481 UART: [state] WD Timer not started. Device not locked for debugging
36,697,113 UART: [kat] SHA2-256
36,886,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,897,757 UART: [kat] ++
36,898,220 UART: [kat] sha1
36,908,759 UART: [kat] SHA2-256
36,911,786 UART: [kat] SHA2-384
36,918,375 UART: [kat] SHA2-512-ACC
36,920,943 UART: [kat] ECC-384
39,369,744 UART: [kat] HMAC-384Kdf
39,394,088 UART: [kat] LMS
39,925,640 UART: [kat] --
39,929,551 UART: [update-reset] ++
43,397,933 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,401,222 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
44,008,926 >>> mbox cmd response: success
44,013,858 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,014,493 UART: [update-reset] Copying MAN_2 To MAN_1
44,047,478 UART: [update-reset Success] --
44,051,662 UART: [state] Locking Datavault
44,055,393 UART: [state] Locking PCR0, PCR1 and PCR31
44,057,322 UART: [state] Locking ICCM
44,059,438 UART: [exit] Launching FMC @ 0x40000130
44,068,120 UART:
44,068,360 UART: Running Caliptra FMC ...
44,069,466 UART:
44,069,635 UART: [state] CFI Enabled
44,162,627 UART: [art] Extend RT PCRs Done
44,164,041 UART: [art] Lock RT PCRs Done
44,165,157 UART: [art] Populate DV Done
44,170,640 UART: [fht] FMC Alias Private Key: 7
44,172,178 UART: [art] Derive CDI
44,172,999 UART: [art] Store in in slot 0x4
44,231,725 UART: [art] Derive Key Pair
44,233,031 UART: [art] Store priv key in slot 0x5
46,695,823 UART: [art] Derive Key Pair - Done
46,709,051 UART: [art] Signing Cert with AUTHO
46,710,356 UART: RITY.KEYID = 7
48,422,898 UART: [art] Erasing AUTHORITY.KEYID = 7
48,424,415 UART: [art] PUB.X = 493B1B51DE8273FF4D35891C004D011F4EB78F37F2A5B4810FB0124A72E55771FCFC9A41E08BF2F8981D82588A7C495B
48,431,654 UART: [art] PUB.Y = 5AD5079F2D571EF5054D4550307EB66E2B73E2F229EEA9A08001C18583DAB4E5F80FA2F79D18F041BB570DBD81356091
48,438,943 UART: [art] SIG.R = B30CF9F7DA22E74E47D10BF5FE8213EF59C6F8954B352C5EF595E5F2F5691D85FA430CC19C92E44F74713EA0FAD4954E
48,446,324 UART: [art] SIG.S = F152EB41E1B58795B438ED7BB9D88C58B21F83361524ABE07286238D41838EF8E7C0F28F9AB8741FAE25B8FCB228F420
49,425,728 UART: Caliptra RT
49,426,444 UART: [state] CFI Enabled
49,762,724 UART: [rt] RT listening for mailbox commands...
49,794,553 UART: [rt]cmd =0x41545348, len=116
49,813,770 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
3,438,186 ready_for_fw is high
3,438,738 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,731,975 >>> mbox cmd response: success
19,021,540 UART:
19,021,947 UART: Running Caliptra FMC ...
19,023,068 UART:
19,023,227 UART: [state] CFI Enabled
19,092,802 UART: [fht] FMC Alias Private Key: 7
20,856,940 UART: [art] Extend RT PCRs Done
20,858,173 UART: [art] Lock RT PCRs Done
20,859,841 UART: [art] Populate DV Done
20,865,254 UART: [fht] FMC Alias Private Key: 7
20,866,836 UART: [art] Derive CDI
20,867,576 UART: [art] Store in in slot 0x4
20,925,262 UART: [art] Derive Key Pair
20,926,262 UART: [art] Store priv key in slot 0x5
23,389,500 UART: [art] Derive Key Pair - Done
23,402,662 UART: [art] Signing Cert with AUTHO
23,403,984 UART: RITY.KEYID = 7
25,115,995 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,504 UART: [art] PUB.X = E7436413F2AC8F11610F18F225A8FAFF785480C56277774FA394E587215B46D8BCABFF32250F333719A6F09B8B5BB8AD
25,124,729 UART: [art] PUB.Y = 52D9ADE5DFCE82DE24EFD728568E0EFFD184CB08CD2C824FD0CCDD0E1BB55BDA80018788543B516621B50534AD4A4362
25,132,009 UART: [art] SIG.R = 8B345754BFD001AF10642269CEB8514376FE8CD63B4AFBA2E0300F32705BAE1EBA14166B074D8C20CF6911195BB11896
25,139,378 UART: [art] SIG.S = D6E74138085D080738CA81222C0F6E7C47202D2B3187063CD2012790551ACCA2C93A4FE7CB2E2AF546A81DD4C2FE0865
26,118,401 UART: Caliptra RT
26,119,114 UART: [state] CFI Enabled
26,284,719 UART: [rt] RT listening for mailbox commands...
30,313,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,468,793 UART: [rt]cmd =0x41544d4e, len=14344
34,399,863 >>> mbox cmd response data (8 bytes)
34,400,450 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,430,912 UART: [rt]cmd =0x41545348, len=116
34,450,616 >>> mbox cmd response data (12 bytes)
36,506,885 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
44,323,154 >>> mbox cmd response: success
44,327,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,360,174 UART:
44,360,476 UART: Running Caliptra FMC ...
44,361,599 UART:
44,361,771 UART: [state] CFI Enabled
44,451,540 UART: [art] Extend RT PCRs Done
44,452,765 UART: [art] Lock RT PCRs Done
44,454,013 UART: [art] Populate DV Done
44,459,645 UART: [fht] FMC Alias Private Key: 7
44,461,611 UART: [art] Derive CDI
44,462,423 UART: [art] Store in in slot 0x4
44,520,202 UART: [art] Derive Key Pair
44,521,219 UART: [art] Store priv key in slot 0x5
46,984,318 UART: [art] Derive Key Pair - Done
46,997,547 UART: [art] Signing Cert with AUTHO
46,998,859 UART: RITY.KEYID = 7
48,710,252 UART: [art] Erasing AUTHORITY.KEYID = 7
48,711,773 UART: [art] PUB.X = C4ED2478906A86FA6084D53109EFC91844491DE2AF83E9B78AB989A1262DAC5806DFDCE4AE377932BA9535D342FF61C2
48,719,020 UART: [art] PUB.Y = A36D578EC7B82AA1F26EFACDB2A90D194000FA770811AB5F61C7B00F7243D25CF5E5817FEEF90E523403C188D687E620
48,726,302 UART: [art] SIG.R = 219DB55DFE1A6CE1857168A2F95DC899F85724FE9A22BCA8E0E6E9479143E803497D951786AEBD1B9D3D29BCB33D45BA
48,733,685 UART: [art] SIG.S = 7949FE8067F21F5830B01CCE9887851E4336046BF375DEE923451796676CB78EAF679430BF30D0B7BEB7913133383540
49,712,596 UART: Caliptra RT
49,713,307 UART: [state] CFI Enabled
50,049,344 UART: [rt] RT listening for mailbox commands...
50,081,315 UART: [rt]cmd =0x41545348, len=116
50,100,338 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,136 writing to cptra_bootfsm_go
193,482 UART:
193,855 UART: Running Caliptra ROM ...
195,041 UART:
604,559 UART: [state] CFI Enabled
618,757 UART: [state] LifecycleState = Unprovisioned
621,139 UART: [state] DebugLocked = No
623,380 UART: [state] WD Timer not started. Device not locked for debugging
628,412 UART: [kat] SHA2-256
818,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,099 UART: [kat] ++
829,583 UART: [kat] sha1
840,317 UART: [kat] SHA2-256
843,323 UART: [kat] SHA2-384
849,449 UART: [kat] SHA2-512-ACC
852,034 UART: [kat] ECC-384
3,292,152 UART: [kat] HMAC-384Kdf
3,304,878 UART: [kat] LMS
3,836,712 UART: [kat] --
3,838,855 UART: [cold-reset] ++
3,840,657 UART: [fht] FHT @ 0x50003400
3,851,761 UART: [idev] ++
3,852,486 UART: [idev] CDI.KEYID = 6
3,853,523 UART: [idev] SUBJECT.KEYID = 7
3,854,628 UART: [idev] UDS.KEYID = 0
3,855,549 ready_for_fw is high
3,855,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,203 UART: [idev] Erasing UDS.KEYID = 0
6,336,248 UART: [idev] Sha1 KeyId Algorithm
6,357,646 UART: [idev] --
6,362,175 UART: [ldev] ++
6,362,908 UART: [ldev] CDI.KEYID = 6
6,363,817 UART: [ldev] SUBJECT.KEYID = 5
6,364,972 UART: [ldev] AUTHORITY.KEYID = 7
6,366,200 UART: [ldev] FE.KEYID = 1
6,376,456 UART: [ldev] Erasing FE.KEYID = 1
8,855,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,132 UART: [ldev] --
10,650,027 UART: [fwproc] Wait for Commands...
10,653,104 UART: [fwproc] Recv command 0x46574c44
10,655,407 UART: [fwproc] Recv'd Img size: 114360 bytes
14,109,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,846,245 >>> mbox cmd response: success
14,849,617 UART: [afmc] ++
14,850,344 UART: [afmc] CDI.KEYID = 6
14,851,583 UART: [afmc] SUBJECT.KEYID = 7
14,853,015 UART: [afmc] AUTHORITY.KEYID = 5
17,355,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,068 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,201 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,423 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,911 UART: [afmc] --
19,151,012 UART: [cold-reset] --
19,156,772 UART: [state] Locking Datavault
19,162,079 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,211 UART: [state] Locking ICCM
19,166,799 UART: [exit] Launching FMC @ 0x40000130
19,175,465 UART:
19,175,697 UART: Running Caliptra FMC ...
19,176,794 UART:
19,176,952 UART: [state] CFI Enabled
19,184,911 UART: [fht] FMC Alias Private Key: 7
20,941,813 UART: [art] Extend RT PCRs Done
20,943,023 UART: [art] Lock RT PCRs Done
20,944,859 UART: [art] Populate DV Done
20,950,214 UART: [fht] FMC Alias Private Key: 7
20,951,854 UART: [art] Derive CDI
20,952,665 UART: [art] Store in in slot 0x4
20,995,342 UART: [art] Derive Key Pair
20,996,408 UART: [art] Store priv key in slot 0x5
23,423,141 UART: [art] Derive Key Pair - Done
23,436,191 UART: [art] Signing Cert with AUTHO
23,437,502 UART: RITY.KEYID = 7
25,142,997 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,499 UART: [art] PUB.X = AD34E3F587E6AA183DE1D35331AA6AECD73891725BB6B88B475692885A407DBCEFC4FECAE6F83AA6E8487016EFD3F9E1
25,151,805 UART: [art] PUB.Y = EFF869885916027CABF679CBAD30038AECC9DC14CE368B05C5017B8EC3057881A7E72296F88A7E00EC331E758A94D2B1
25,159,042 UART: [art] SIG.R = 9F1CC60B788E34994093C5CD69B0C9D202CC2CFBB089090432B8BE1EAA999EB303310E590EFE669235F68ABED963DA0F
25,166,455 UART: [art] SIG.S = B909001EE04E918C949FD5CFED2A71B376AB7D532988DB1A94C0825F2E2B321519C87B99CBB442B4E414B0B24435D980
26,145,435 UART: Caliptra RT
26,146,127 UART: [state] CFI Enabled
26,263,357 UART: [rt] RT listening for mailbox commands...
30,290,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,446,061 UART: [rt]cmd =0x41544d4e, len=14344
34,376,718 >>> mbox cmd response data (8 bytes)
34,377,283 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,408,129 UART: [rt]cmd =0x41545348, len=116
34,427,107 >>> mbox cmd response data (12 bytes)
36,481,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
36,626,702 UART:
36,627,077 UART: Running Caliptra ROM ...
36,628,132 UART:
36,628,336 UART: [state] CFI Enabled
36,641,488 UART: [state] LifecycleState = Unprovisioned
36,643,421 UART: [state] DebugLocked = No
36,644,722 UART: [state] WD Timer not started. Device not locked for debugging
36,648,682 UART: [kat] SHA2-256
36,838,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,849,307 UART: [kat] ++
36,849,830 UART: [kat] sha1
36,862,333 UART: [kat] SHA2-256
36,865,345 UART: [kat] SHA2-384
36,869,980 UART: [kat] SHA2-512-ACC
36,872,538 UART: [kat] ECC-384
39,313,194 UART: [kat] HMAC-384Kdf
39,325,447 UART: [kat] LMS
39,857,018 UART: [kat] --
39,860,875 UART: [update-reset] ++
43,329,098 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,332,964 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
43,940,666 >>> mbox cmd response: success
43,945,289 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,945,882 UART: [update-reset] Copying MAN_2 To MAN_1
43,978,698 UART: [update-reset Success] --
43,983,154 UART: [state] Locking Datavault
43,987,646 UART: [state] Locking PCR0, PCR1 and PCR31
43,989,842 UART: [state] Locking ICCM
43,992,388 UART: [exit] Launching FMC @ 0x40000130
44,001,033 UART:
44,001,328 UART: Running Caliptra FMC ...
44,002,461 UART:
44,002,623 UART: [state] CFI Enabled
44,046,099 UART: [art] Extend RT PCRs Done
44,047,246 UART: [art] Lock RT PCRs Done
44,048,911 UART: [art] Populate DV Done
44,054,364 UART: [fht] FMC Alias Private Key: 7
44,055,957 UART: [art] Derive CDI
44,056,771 UART: [art] Store in in slot 0x4
44,099,673 UART: [art] Derive Key Pair
44,100,854 UART: [art] Store priv key in slot 0x5
46,527,182 UART: [art] Derive Key Pair - Done
46,540,137 UART: [art] Signing Cert with AUTHO
46,541,436 UART: RITY.KEYID = 7
48,247,130 UART: [art] Erasing AUTHORITY.KEYID = 7
48,248,647 UART: [art] PUB.X = 520A15679820695A073A481A841CE3DB608CA3C35F7CC62855945D6FD7E40A4B25133472505A465C2DC248FF9F2ECBA4
48,255,902 UART: [art] PUB.Y = 2E0F7E32BAF0DDBB73C84D88C629E42FA0EEA7DBD21C7AB5E4B50F8A56B1B9B0CA7DBD9A9042A370E7C3495978B9B93C
48,263,197 UART: [art] SIG.R = 89D6792B5DBDAF3436AB19E9DA210FC5218DA2B123D1199FDB5DD79851EE48E2D929B7CC739372394793A3A7D8FB91B3
48,270,597 UART: [art] SIG.S = 7D2964C663523853C1C352FBC73A40F0CC0C398B2D3A70B8B2430AA4AF022EF0780637755959C9BB6F02AA3B2C80EAD5
49,249,338 UART: Caliptra RT
49,250,023 UART: [state] CFI Enabled
49,538,079 UART: [rt] RT listening for mailbox commands...
49,570,143 UART: [rt]cmd =0x41545348, len=116
49,590,265 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,759,922 ready_for_fw is high
3,760,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,593 >>> mbox cmd response: success
19,213,144 UART:
19,213,565 UART: Running Caliptra FMC ...
19,214,670 UART:
19,214,836 UART: [state] CFI Enabled
19,222,903 UART: [fht] FMC Alias Private Key: 7
20,979,618 UART: [art] Extend RT PCRs Done
20,980,845 UART: [art] Lock RT PCRs Done
20,982,518 UART: [art] Populate DV Done
20,988,059 UART: [fht] FMC Alias Private Key: 7
20,989,552 UART: [art] Derive CDI
20,990,311 UART: [art] Store in in slot 0x4
21,033,289 UART: [art] Derive Key Pair
21,034,338 UART: [art] Store priv key in slot 0x5
23,460,442 UART: [art] Derive Key Pair - Done
23,473,434 UART: [art] Signing Cert with AUTHO
23,474,744 UART: RITY.KEYID = 7
25,180,158 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,654 UART: [art] PUB.X = 22DEBFEDE585DA0C118B6F0301E059B619DF7CC9D995DA0976389C0948A8DA6EDB75ADC8B913DB61DBB4F8E5DE6B9D90
25,188,974 UART: [art] PUB.Y = C7158C1B5B627711C065B0AA6779A3417830189050D45A8E103292E1AB9E5B6F1BFB7958E59EC6B9FE1824B967A24D83
25,196,191 UART: [art] SIG.R = D5B1A3FC4C97184E20DB818B9E7A3AD498AB0499B00C3BDDACE5BB36867214E518F3057EAB2B146FBF22DB8C64549C7D
25,203,591 UART: [art] SIG.S = 5054FC842FBB236389E3B8D3D99622D859F34B84B942FEC26EF300813E260F7E88A764E629D17C557831342C78B00EB6
26,183,043 UART: Caliptra RT
26,183,761 UART: [state] CFI Enabled
26,299,852 UART: [rt] RT listening for mailbox commands...
30,324,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,480,277 UART: [rt]cmd =0x41544d4e, len=14344
34,411,232 >>> mbox cmd response data (8 bytes)
34,411,801 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,442,378 UART: [rt]cmd =0x41545348, len=116
34,461,169 >>> mbox cmd response data (12 bytes)
36,516,713 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
44,240,838 >>> mbox cmd response: success
44,245,658 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,277,317 UART:
44,277,622 UART: Running Caliptra FMC ...
44,278,742 UART:
44,278,907 UART: [state] CFI Enabled
44,323,411 UART: [art] Extend RT PCRs Done
44,324,607 UART: [art] Lock RT PCRs Done
44,326,009 UART: [art] Populate DV Done
44,331,369 UART: [fht] FMC Alias Private Key: 7
44,332,958 UART: [art] Derive CDI
44,333,769 UART: [art] Store in in slot 0x4
44,376,405 UART: [art] Derive Key Pair
44,377,456 UART: [art] Store priv key in slot 0x5
46,804,493 UART: [art] Derive Key Pair - Done
46,817,440 UART: [art] Signing Cert with AUTHO
46,818,763 UART: RITY.KEYID = 7
48,524,348 UART: [art] Erasing AUTHORITY.KEYID = 7
48,525,850 UART: [art] PUB.X = 61D9EA3DD75342CF4188656C905D020F144D46DEADD0DE30BC51123EAF0C9AE92FC74AF5562D12B4F81504591DFA65DD
48,533,142 UART: [art] PUB.Y = 1D5D2B257003ADC0F168FDCA10A50EB2A0440EB0EB4A8F3720F11CEE78FB60E8C7AAF5F7D9A78C5D5A35126A4B92265E
48,540,454 UART: [art] SIG.R = 0FE1B99CAF096A49DC59FE27905AC7D55EBF6BDBC2B9632291FD5CCF53E09FC5F8DD41A1823EB3A67271ED8A4DFF56C7
48,547,902 UART: [art] SIG.S = 6273ABA20A339FE5C319C7CA4CB45673B84F6B57BEE429717D052C66F21952E7D92A8DD6DF69AE9EFB4239E12E19222B
49,527,091 UART: Caliptra RT
49,527,778 UART: [state] CFI Enabled
49,819,663 UART: [rt] RT listening for mailbox commands...
49,851,526 UART: [rt]cmd =0x41545348, len=116
49,870,793 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,339 UART: [cold-reset] ++
1,476,667 UART: [fht] Storing FHT @ 0x50003400
1,479,520 UART: [idev] ++
1,479,688 UART: [idev] CDI.KEYID = 6
1,480,048 UART: [idev] SUBJECT.KEYID = 7
1,480,472 UART: [idev] UDS.KEYID = 0
1,480,817 ready_for_fw is high
1,480,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,505,262 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,514,995 UART: [ldev] ++
1,515,163 UART: [ldev] CDI.KEYID = 6
1,515,526 UART: [ldev] SUBJECT.KEYID = 5
1,515,952 UART: [ldev] AUTHORITY.KEYID = 7
1,516,415 UART: [ldev] FE.KEYID = 1
1,521,643 UART: [ldev] Erasing FE.KEYID = 1
1,546,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,914 UART: [ldev] --
1,586,421 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 114360 bytes
2,886,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,334 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,547 >>> mbox cmd response: success
3,079,715 UART: [afmc] ++
3,079,883 UART: [afmc] CDI.KEYID = 6
3,080,245 UART: [afmc] SUBJECT.KEYID = 7
3,080,670 UART: [afmc] AUTHORITY.KEYID = 5
3,115,425 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,032 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,722 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,499 UART: [afmc] --
3,158,569 UART: [cold-reset] --
3,159,527 UART: [state] Locking Datavault
3,160,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,232 UART: [state] Locking ICCM
3,161,854 UART: [exit] Launching FMC @ 0x40000130
3,167,183 UART:
3,167,199 UART: Running Caliptra FMC ...
3,167,607 UART:
3,167,661 UART: [state] CFI Enabled
3,178,258 UART: [fht] FMC Alias Private Key: 7
3,285,671 UART: [art] Extend RT PCRs Done
3,286,099 UART: [art] Lock RT PCRs Done
3,287,993 UART: [art] Populate DV Done
3,296,136 UART: [fht] FMC Alias Private Key: 7
3,297,292 UART: [art] Derive CDI
3,297,572 UART: [art] Store in in slot 0x4
3,383,201 UART: [art] Derive Key Pair
3,383,561 UART: [art] Store priv key in slot 0x5
3,396,247 UART: [art] Derive Key Pair - Done
3,410,984 UART: [art] Signing Cert with AUTHO
3,411,464 UART: RITY.KEYID = 7
3,426,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,215 UART: [art] PUB.X = 590087A7E9104F7608BE6A4D3DF089BAA4F24AD48D086C3A4426C53A401E52CC955D594000BD67E0571F8C109D8CB5D0
3,433,939 UART: [art] PUB.Y = CCA82AFDC6697F98D5396B13CBC895A9C12F785F6CFB3E6271630FAF9DC1FB35D2DDE4AD57A2711E2424D71E11A67C15
3,440,904 UART: [art] SIG.R = 51704AE6C55E5052BB9CE62098BCDF2DEE1A09B1D1F5BB62B746AA2C8A2715E7ABECB27ACF963E6E688023C19103D4D2
3,447,686 UART: [art] SIG.S = 3847279812CC8F1C30F070AF237234C7CD990DB0CDD8D142A2382867024D7F5199863ADA939DEFE3670E5553CAA03569
3,471,678 UART: Caliptra RT
3,471,932 UART: [state] CFI Enabled
3,580,739 UART: [rt] RT listening for mailbox commands...
3,581,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,242 UART: [rt]cmd =0x41544d4e, len=14344
3,848,842 >>> mbox cmd response data (8 bytes)
3,848,843 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,788 UART: [rt]cmd =0x41545348, len=116
3,900,549 >>> mbox cmd response data (12 bytes)
3,900,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,901,229 UART:
3,901,245 UART: Running Caliptra ROM ...
3,901,653 UART:
3,901,707 UART: [state] CFI Enabled
3,904,369 UART: [state] LifecycleState = Unprovisioned
3,905,024 UART: [state] DebugLocked = No
3,905,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,907,287 UART: [kat] SHA2-256
4,701,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,705,333 UART: [kat] ++
4,705,485 UART: [kat] sha1
4,709,909 UART: [kat] SHA2-256
4,711,847 UART: [kat] SHA2-384
4,714,598 UART: [kat] SHA2-512-ACC
4,716,498 UART: [kat] ECC-384
4,722,121 UART: [kat] HMAC-384Kdf
4,726,669 UART: [kat] LMS
5,294,865 UART: [kat] --
5,295,598 UART: [update-reset] ++
6,629,643 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,630,691 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,780,609 >>> mbox cmd response: success
6,780,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,780,958 UART: [update-reset] Copying MAN_2 To MAN_1
6,788,972 UART: [update-reset Success] --
6,790,015 UART: [state] Locking Datavault
6,790,959 UART: [state] Locking PCR0, PCR1 and PCR31
6,791,563 UART: [state] Locking ICCM
6,792,191 UART: [exit] Launching FMC @ 0x40000130
6,797,520 UART:
6,797,536 UART: Running Caliptra FMC ...
6,797,944 UART:
6,797,998 UART: [state] CFI Enabled
6,887,109 UART: [art] Extend RT PCRs Done
6,887,537 UART: [art] Lock RT PCRs Done
6,888,870 UART: [art] Populate DV Done
6,897,029 UART: [fht] FMC Alias Private Key: 7
6,898,075 UART: [art] Derive CDI
6,898,355 UART: [art] Store in in slot 0x4
6,983,946 UART: [art] Derive Key Pair
6,984,306 UART: [art] Store priv key in slot 0x5
6,997,926 UART: [art] Derive Key Pair - Done
7,013,030 UART: [art] Signing Cert with AUTHO
7,013,510 UART: RITY.KEYID = 7
7,028,604 UART: [art] Erasing AUTHORITY.KEYID = 7
7,029,369 UART: [art] PUB.X = 1B6663185AF95CBE275A63E476D4A8F870BC368FE79E207A34BDE1F5A5976C7C02B48567FB917BCDB3EE3624E3A2C017
7,036,146 UART: [art] PUB.Y = D1E3FDF309D1D5290544FB08EB0F9707DF41644A65325D578F1D79E8337E856E319F8D35266737954986AAB08A26E1F3
7,043,077 UART: [art] SIG.R = E5C383989172A91EAD1AB32C2F16503DFADF314F007B264C1DE52FF4BDAD6C9C4DF5E8ED02ED12F27CBA46A03D69A709
7,049,841 UART: [art] SIG.S = 798A36CD1E11E5CF0BE977913E888F53F5B08A0CDB2CB3AA3C72D6E560D85ABB70A3F1FFEC76E601BA82F7135E6BFD66
7,073,489 UART: Caliptra RT
7,073,743 UART: [state] CFI Enabled
7,350,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,381,897 UART: [rt]cmd =0x41545348, len=116
7,403,744 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,545 ready_for_fw is high
1,362,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,517 >>> mbox cmd response: success
2,988,955 UART:
2,988,971 UART: Running Caliptra FMC ...
2,989,379 UART:
2,989,433 UART: [state] CFI Enabled
2,999,916 UART: [fht] FMC Alias Private Key: 7
3,108,247 UART: [art] Extend RT PCRs Done
3,108,675 UART: [art] Lock RT PCRs Done
3,110,405 UART: [art] Populate DV Done
3,118,480 UART: [fht] FMC Alias Private Key: 7
3,119,630 UART: [art] Derive CDI
3,119,910 UART: [art] Store in in slot 0x4
3,205,613 UART: [art] Derive Key Pair
3,205,973 UART: [art] Store priv key in slot 0x5
3,219,581 UART: [art] Derive Key Pair - Done
3,234,526 UART: [art] Signing Cert with AUTHO
3,235,006 UART: RITY.KEYID = 7
3,250,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,949 UART: [art] PUB.X = 4AF6437C778A2ED26EEEA43C636ED0D28374EAC3EC059A2005926C1072EE0AC9D368C1141FCF0AE04D41836C8E6E4094
3,257,717 UART: [art] PUB.Y = 6BBD2968B27AFA11579874AD0DC01456DE7790BDE456353438E42055D8BE037317865A0A6C1C0CA1039951CBAB0FC969
3,264,651 UART: [art] SIG.R = A4B1B75F33EFF92EAA700DDDD79CB2EB12FD7A93DD09579D222CE0CB9DCEBEB20E61824B63F25D69165BB630A11C02F0
3,271,433 UART: [art] SIG.S = 2FA6E33992B7AD77E425EF5809DFCC8171AB419FEF73F1AA2EA89EC4E7D038E1FD845A8385AC483602798CDC187B071C
3,295,097 UART: Caliptra RT
3,295,351 UART: [state] CFI Enabled
3,403,573 UART: [rt] RT listening for mailbox commands...
3,404,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,948 UART: [rt]cmd =0x41544d4e, len=14344
3,671,592 >>> mbox cmd response data (8 bytes)
3,671,593 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,928 UART: [rt]cmd =0x41545348, len=116
3,723,941 >>> mbox cmd response data (12 bytes)
3,723,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,486,453 >>> mbox cmd response: success
6,486,453 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,499,710 UART:
6,499,726 UART: Running Caliptra FMC ...
6,500,134 UART:
6,500,188 UART: [state] CFI Enabled
6,589,333 UART: [art] Extend RT PCRs Done
6,589,761 UART: [art] Lock RT PCRs Done
6,591,294 UART: [art] Populate DV Done
6,599,415 UART: [fht] FMC Alias Private Key: 7
6,600,539 UART: [art] Derive CDI
6,600,819 UART: [art] Store in in slot 0x4
6,686,754 UART: [art] Derive Key Pair
6,687,114 UART: [art] Store priv key in slot 0x5
6,701,068 UART: [art] Derive Key Pair - Done
6,715,884 UART: [art] Signing Cert with AUTHO
6,716,364 UART: RITY.KEYID = 7
6,731,726 UART: [art] Erasing AUTHORITY.KEYID = 7
6,732,491 UART: [art] PUB.X = 5669C6AD1B89903629EA0E75BD34BAB860BB4166309D53BA0287CBC3DF88357088467F65F3B609D3871D57898CB45897
6,739,248 UART: [art] PUB.Y = 95EC2F9DB2BDE19ABC4A4615A782C7C451A6FECC54E2FD8A8580994DB6AD67B333B43B11D3FA1B5B21E203F9FC809420
6,746,213 UART: [art] SIG.R = 5A8875A0D59677DE0D83A3966589EC28AD9F02BA6278BE4F136FCD47215F0F8B88B3E6B35AFEF60BB205F9F50E68558B
6,752,975 UART: [art] SIG.S = 037314406C656DC4B8A32F3C75047B996443B687BFE628DE6330C95E84A6333928C5C4D67D1BF05A4CD345AE07F9F5CB
6,776,699 UART: Caliptra RT
6,776,953 UART: [state] CFI Enabled
7,057,599 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,088,412 UART: [rt]cmd =0x41545348, len=116
7,110,197 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,320 UART: [kat] SHA2-256
882,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,366 UART: [kat] ++
886,518 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,319 UART: [kat] SHA2-512-ACC
897,220 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,477,126 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,481,276 ready_for_fw is high
1,481,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,505,559 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,013 UART: [idev] --
1,514,972 UART: [ldev] ++
1,515,140 UART: [ldev] CDI.KEYID = 6
1,515,503 UART: [ldev] SUBJECT.KEYID = 5
1,515,929 UART: [ldev] AUTHORITY.KEYID = 7
1,516,392 UART: [ldev] FE.KEYID = 1
1,521,686 UART: [ldev] Erasing FE.KEYID = 1
1,547,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,205 UART: [ldev] --
1,586,674 UART: [fwproc] Waiting for Commands...
1,587,347 UART: [fwproc] Received command 0x46574c44
1,588,138 UART: [fwproc] Received Image of size 114360 bytes
2,885,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,755 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,726 >>> mbox cmd response: success
3,079,898 UART: [afmc] ++
3,080,066 UART: [afmc] CDI.KEYID = 6
3,080,428 UART: [afmc] SUBJECT.KEYID = 7
3,080,853 UART: [afmc] AUTHORITY.KEYID = 5
3,115,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,084 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,477 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,167 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,098 UART: [afmc] --
3,159,146 UART: [cold-reset] --
3,159,840 UART: [state] Locking Datavault
3,161,011 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,615 UART: [state] Locking ICCM
3,162,087 UART: [exit] Launching FMC @ 0x40000130
3,167,416 UART:
3,167,432 UART: Running Caliptra FMC ...
3,167,840 UART:
3,167,983 UART: [state] CFI Enabled
3,178,402 UART: [fht] FMC Alias Private Key: 7
3,286,385 UART: [art] Extend RT PCRs Done
3,286,813 UART: [art] Lock RT PCRs Done
3,288,329 UART: [art] Populate DV Done
3,296,512 UART: [fht] FMC Alias Private Key: 7
3,297,616 UART: [art] Derive CDI
3,297,896 UART: [art] Store in in slot 0x4
3,383,519 UART: [art] Derive Key Pair
3,383,879 UART: [art] Store priv key in slot 0x5
3,397,075 UART: [art] Derive Key Pair - Done
3,411,636 UART: [art] Signing Cert with AUTHO
3,412,116 UART: RITY.KEYID = 7
3,427,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,035 UART: [art] PUB.X = 7D455ECD723E03A882A6921D9B2E9341FFA565EDE6544C204AE6EAE4C803F32EF2E06A97287E3C6D17B5D118425A0816
3,434,802 UART: [art] PUB.Y = CB34AB125CD5E41FDC92140CD7A0DA11647B512627EA1FED970EAC0553E4BE05C3EABC9380599890591033EE6682FEFD
3,441,754 UART: [art] SIG.R = 8A6D5998D343977EE8920B45630B78C9442A9ABD1E2FE4E574C1F063674D47479FBFE97C6FB1C2A404489AA52CEAC9A4
3,448,523 UART: [art] SIG.S = C69BD732629AD310002DA5B1F73D3A6F52E7BD4E30C655C235F33A746F4865DFA7D6F8DFE1AED58A2E10B5EC6356D8BF
3,472,708 UART: Caliptra RT
3,473,054 UART: [state] CFI Enabled
3,581,825 UART: [rt] RT listening for mailbox commands...
3,582,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,988 UART: [rt]cmd =0x41544d4e, len=14344
3,849,558 >>> mbox cmd response data (8 bytes)
3,849,559 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,742 UART: [rt]cmd =0x41545348, len=116
3,901,969 >>> mbox cmd response data (12 bytes)
3,901,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,015 UART:
3,903,031 UART: Running Caliptra ROM ...
3,903,439 UART:
3,903,580 UART: [state] CFI Enabled
3,905,988 UART: [state] LifecycleState = Unprovisioned
3,906,643 UART: [state] DebugLocked = No
3,907,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,908,728 UART: [kat] SHA2-256
4,702,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,706,774 UART: [kat] ++
4,706,926 UART: [kat] sha1
4,711,376 UART: [kat] SHA2-256
4,713,314 UART: [kat] SHA2-384
4,716,099 UART: [kat] SHA2-512-ACC
4,717,999 UART: [kat] ECC-384
4,723,622 UART: [kat] HMAC-384Kdf
4,728,242 UART: [kat] LMS
5,296,438 UART: [kat] --
5,297,303 UART: [update-reset] ++
6,631,776 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,633,030 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,782,948 >>> mbox cmd response: success
6,782,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,783,157 UART: [update-reset] Copying MAN_2 To MAN_1
6,791,171 UART: [update-reset Success] --
6,792,060 UART: [state] Locking Datavault
6,792,820 UART: [state] Locking PCR0, PCR1 and PCR31
6,793,424 UART: [state] Locking ICCM
6,793,898 UART: [exit] Launching FMC @ 0x40000130
6,799,227 UART:
6,799,243 UART: Running Caliptra FMC ...
6,799,651 UART:
6,799,794 UART: [state] CFI Enabled
6,889,135 UART: [art] Extend RT PCRs Done
6,889,563 UART: [art] Lock RT PCRs Done
6,890,862 UART: [art] Populate DV Done
6,899,307 UART: [fht] FMC Alias Private Key: 7
6,900,359 UART: [art] Derive CDI
6,900,639 UART: [art] Store in in slot 0x4
6,986,426 UART: [art] Derive Key Pair
6,986,786 UART: [art] Store priv key in slot 0x5
7,000,392 UART: [art] Derive Key Pair - Done
7,015,214 UART: [art] Signing Cert with AUTHO
7,015,694 UART: RITY.KEYID = 7
7,030,366 UART: [art] Erasing AUTHORITY.KEYID = 7
7,031,131 UART: [art] PUB.X = 44DA16B88F1FD497D3FCE8236CBA9D068989020AA7E3D0D342FFDC1D1114A11C5C59DEFD5C55C2DA9FD5915371C6402A
7,037,908 UART: [art] PUB.Y = 0147850A5BA5A6E64EE631013B01FBD42F7C3AE6DD5184E6E5C706A407CAECE28DE69125682C07EAAF80B1CA3531DD7F
7,044,853 UART: [art] SIG.R = 8BE7206747FDF00E16412F0788311590820883546FBCB00B84246A9D1F888164366BFD6943125C3C9B918F5301F7D6FA
7,051,598 UART: [art] SIG.S = 51FB90135BFFA91387C24731A590FA2EA6882B61EFE6C4AC8BA286C32E9AD7928DE988B10F027492731141CD0869C412
7,074,750 UART: Caliptra RT
7,075,096 UART: [state] CFI Enabled
7,355,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,386,166 UART: [rt]cmd =0x41545348, len=116
7,408,099 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,850 ready_for_fw is high
1,362,850 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,188 >>> mbox cmd response: success
2,989,118 UART:
2,989,134 UART: Running Caliptra FMC ...
2,989,542 UART:
2,989,685 UART: [state] CFI Enabled
3,000,220 UART: [fht] FMC Alias Private Key: 7
3,108,005 UART: [art] Extend RT PCRs Done
3,108,433 UART: [art] Lock RT PCRs Done
3,109,907 UART: [art] Populate DV Done
3,118,412 UART: [fht] FMC Alias Private Key: 7
3,119,500 UART: [art] Derive CDI
3,119,780 UART: [art] Store in in slot 0x4
3,205,427 UART: [art] Derive Key Pair
3,205,787 UART: [art] Store priv key in slot 0x5
3,219,207 UART: [art] Derive Key Pair - Done
3,234,186 UART: [art] Signing Cert with AUTHO
3,234,666 UART: RITY.KEYID = 7
3,249,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,599 UART: [art] PUB.X = 1D7B273A5723B94E1394DAF100A5445BFD0DE7F7225D07DEF477479D8FBBF59CA49E7323F27CF6E387EBB38879BEB5DB
3,257,357 UART: [art] PUB.Y = 28D4D8C87C3F558A291D224B35E3752F1ACE8EC6EAC6FFC163F2D57EC4165E8C7E83379335146E54A315D998ECFA6B56
3,264,317 UART: [art] SIG.R = 5EFC04C02555B797078D00FB7D0336043C6D9638241C3A5AE690C2F3C240157E53B621C79581389CE368A1553B04E6E6
3,271,042 UART: [art] SIG.S = 2861F2BC51852C22F6C72208CB5FA39CDFC512A18066BC60BD060B2ED64E562BA3FD8AF5DC5EEB038E64031A09154110
3,295,199 UART: Caliptra RT
3,295,545 UART: [state] CFI Enabled
3,403,196 UART: [rt] RT listening for mailbox commands...
3,403,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,483 UART: [rt]cmd =0x41544d4e, len=14344
3,671,159 >>> mbox cmd response data (8 bytes)
3,671,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,461 UART: [rt]cmd =0x41545348, len=116
3,723,032 >>> mbox cmd response data (12 bytes)
3,723,033 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,485,113 >>> mbox cmd response: success
6,485,113 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,498,424 UART:
6,498,440 UART: Running Caliptra FMC ...
6,498,848 UART:
6,498,991 UART: [state] CFI Enabled
6,588,274 UART: [art] Extend RT PCRs Done
6,588,702 UART: [art] Lock RT PCRs Done
6,590,155 UART: [art] Populate DV Done
6,598,408 UART: [fht] FMC Alias Private Key: 7
6,599,456 UART: [art] Derive CDI
6,599,736 UART: [art] Store in in slot 0x4
6,685,417 UART: [art] Derive Key Pair
6,685,777 UART: [art] Store priv key in slot 0x5
6,699,091 UART: [art] Derive Key Pair - Done
6,713,740 UART: [art] Signing Cert with AUTHO
6,714,220 UART: RITY.KEYID = 7
6,729,426 UART: [art] Erasing AUTHORITY.KEYID = 7
6,730,191 UART: [art] PUB.X = FF4FD77B11A967621DAD6331DA220D3D522C3FBF7E4E23357C9A0E6956DD32F55421E55C931ED4B5207C6C3C3D126224
6,736,961 UART: [art] PUB.Y = ACBE2F4F90243D54513FDD655DD9997444B4E15F7AB50B52A5CE98D2FEF1BBD8F15BD904B770F309581E9A9AB39121F8
6,743,916 UART: [art] SIG.R = 0AF5E909A5A46F479645EDCF02336883875BE67B44E460E03FEC27D2A91EB70F26BC0C4A6ED04CDF231B6DA6EAC4B6B3
6,750,689 UART: [art] SIG.S = 6B33F1A5A5A2D99C649A1540B8B555BB2372819398B749D0BF32269384DC85C733B506E3177806FAB61D528788C4CAAC
6,774,238 UART: Caliptra RT
6,774,584 UART: [state] CFI Enabled
7,056,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,703 UART: [rt]cmd =0x41545348, len=116
7,109,172 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
893,058 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,183 UART: [kat] ++
897,335 UART: [kat] sha1
901,533 UART: [kat] SHA2-256
903,473 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
917,952 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,645 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 ready_for_fw is high
1,176,583 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,201,403 UART: [idev] Sha1 KeyId Algorithm
1,210,041 UART: [idev] --
1,210,991 UART: [ldev] ++
1,211,159 UART: [ldev] CDI.KEYID = 6
1,211,522 UART: [ldev] SUBJECT.KEYID = 5
1,211,948 UART: [ldev] AUTHORITY.KEYID = 7
1,212,411 UART: [ldev] FE.KEYID = 1
1,217,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,453 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,248 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,938 >>> mbox cmd response: success
2,775,020 UART: [afmc] ++
2,775,188 UART: [afmc] CDI.KEYID = 6
2,775,550 UART: [afmc] SUBJECT.KEYID = 7
2,775,975 UART: [afmc] AUTHORITY.KEYID = 5
2,811,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,477 UART: [afmc] --
2,854,523 UART: [cold-reset] --
2,855,439 UART: [state] Locking Datavault
2,856,754 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,358 UART: [state] Locking ICCM
2,857,828 UART: [exit] Launching FMC @ 0x40000130
2,863,157 UART:
2,863,173 UART: Running Caliptra FMC ...
2,863,581 UART:
2,863,635 UART: [state] CFI Enabled
2,874,246 UART: [fht] FMC Alias Private Key: 7
2,981,771 UART: [art] Extend RT PCRs Done
2,982,199 UART: [art] Lock RT PCRs Done
2,983,449 UART: [art] Populate DV Done
2,991,566 UART: [fht] FMC Alias Private Key: 7
2,992,580 UART: [art] Derive CDI
2,992,860 UART: [art] Store in in slot 0x4
3,078,399 UART: [art] Derive Key Pair
3,078,759 UART: [art] Store priv key in slot 0x5
3,091,903 UART: [art] Derive Key Pair - Done
3,106,475 UART: [art] Signing Cert with AUTHO
3,106,955 UART: RITY.KEYID = 7
3,122,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,772 UART: [art] PUB.X = 2B05B60B33C45D2C06E54B5C5FEE04BB23F3E247A0C3848751A4612C50087A3DAA7A0D849C848643DF597BD0B4E91CF7
3,129,532 UART: [art] PUB.Y = DA115B929CF37C2B5B46155C6DD62A34865E0B4DD2D2EB193C14BA1FE1145568BB78120B3D625C3D9FE238B9599A291D
3,136,484 UART: [art] SIG.R = EF5A57199D25C3053ADDA7F8B8120987493E9FD5E91F342DF8667A58CEE68A03919FD68E6A0A074D43FB44E8B377C932
3,143,245 UART: [art] SIG.S = 48BC385E3F2547F18F9C5BC5446E1CFBDDA388DFDE24F05DA6EE489A40A6DE4D4EBCCF26C8D3FAB52E6219826EABF6C4
3,166,656 UART: Caliptra RT
3,166,910 UART: [state] CFI Enabled
3,274,740 UART: [rt] RT listening for mailbox commands...
3,275,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,179 UART: [rt]cmd =0x41544d4e, len=14344
3,543,035 >>> mbox cmd response data (8 bytes)
3,543,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,981 UART: [rt]cmd =0x41545348, len=116
3,594,624 >>> mbox cmd response data (12 bytes)
3,594,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,377 UART:
3,595,393 UART: Running Caliptra ROM ...
3,595,801 UART:
3,595,856 UART: [state] CFI Enabled
3,598,160 UART: [state] LifecycleState = Unprovisioned
3,598,815 UART: [state] DebugLocked = No
3,599,485 UART: [state] WD Timer not started. Device not locked for debugging
3,600,795 UART: [kat] SHA2-256
4,406,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,410,570 UART: [kat] ++
4,410,722 UART: [kat] sha1
4,415,054 UART: [kat] SHA2-256
4,416,994 UART: [kat] SHA2-384
4,419,649 UART: [kat] SHA2-512-ACC
4,421,549 UART: [kat] ECC-384
4,431,904 UART: [kat] HMAC-384Kdf
4,436,564 UART: [kat] LMS
4,684,892 UART: [kat] --
4,685,924 UART: [update-reset] ++
5,998,351 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,999,318 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,149,184 >>> mbox cmd response: success
6,149,184 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,149,383 UART: [update-reset] Copying MAN_2 To MAN_1
6,157,397 UART: [update-reset Success] --
6,158,452 UART: [state] Locking Datavault
6,159,298 UART: [state] Locking PCR0, PCR1 and PCR31
6,159,902 UART: [state] Locking ICCM
6,160,472 UART: [exit] Launching FMC @ 0x40000130
6,165,801 UART:
6,165,817 UART: Running Caliptra FMC ...
6,166,225 UART:
6,166,279 UART: [state] CFI Enabled
6,255,476 UART: [art] Extend RT PCRs Done
6,255,904 UART: [art] Lock RT PCRs Done
6,257,065 UART: [art] Populate DV Done
6,265,474 UART: [fht] FMC Alias Private Key: 7
6,266,422 UART: [art] Derive CDI
6,266,702 UART: [art] Store in in slot 0x4
6,351,767 UART: [art] Derive Key Pair
6,352,127 UART: [art] Store priv key in slot 0x5
6,365,553 UART: [art] Derive Key Pair - Done
6,380,172 UART: [art] Signing Cert with AUTHO
6,380,652 UART: RITY.KEYID = 7
6,396,026 UART: [art] Erasing AUTHORITY.KEYID = 7
6,396,791 UART: [art] PUB.X = F51F6BB064974EB9C4721AFFE9610944B7646C2FD77FA928A320E2B48A330E7FDC62A78B9304BDC2A4EBBA1C83820722
6,403,559 UART: [art] PUB.Y = D7505B282C058140ED2F5E829C48A60A8F8F88A114A05F61AD2E7E5DACC17B1A7D1F7F809946597F50C3256AD372F099
6,410,507 UART: [art] SIG.R = DF990FEC6F575F9E70AF60DF8C8E5FB7DC2BCCC9E1C6E550C7C01C919FF63A9C63174920495E26B124E085A7D1F38A6A
6,417,292 UART: [art] SIG.S = 35A66A589CFC9AC5E96C74B87DC30330801464D8A8DF7819E44E20A9A15E35F16AD6E92E8B60EF2334678EE6F64F9C3B
6,440,770 UART: Caliptra RT
6,441,024 UART: [state] CFI Enabled
6,723,545 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,754,660 UART: [rt]cmd =0x41545348, len=116
6,776,499 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,313 ready_for_fw is high
1,060,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,213 >>> mbox cmd response: success
2,689,183 UART:
2,689,199 UART: Running Caliptra FMC ...
2,689,607 UART:
2,689,661 UART: [state] CFI Enabled
2,699,890 UART: [fht] FMC Alias Private Key: 7
2,807,141 UART: [art] Extend RT PCRs Done
2,807,569 UART: [art] Lock RT PCRs Done
2,808,847 UART: [art] Populate DV Done
2,817,072 UART: [fht] FMC Alias Private Key: 7
2,818,250 UART: [art] Derive CDI
2,818,530 UART: [art] Store in in slot 0x4
2,904,091 UART: [art] Derive Key Pair
2,904,451 UART: [art] Store priv key in slot 0x5
2,917,453 UART: [art] Derive Key Pair - Done
2,932,664 UART: [art] Signing Cert with AUTHO
2,933,144 UART: RITY.KEYID = 7
2,948,604 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,369 UART: [art] PUB.X = 2C1DC6106724633A0CEF193C19E0085C342F056DAFE8842EDA699581E7B38C11C0537F72F9B242575F863AD654A7FA49
2,956,130 UART: [art] PUB.Y = 33A64A3FB10D3F0BBCDC587CD66012B06756E32F96BD77372EECC3D1821270F644CC63BF52CB7C08DE1C0A6E781D1545
2,963,080 UART: [art] SIG.R = FFA77365EDBF6BFDA54AC786FB987FE6A69D4919EAD01D17E8BCF4AB3525D2552720C92CF138EFD2F97931FB3DD08AB0
2,969,874 UART: [art] SIG.S = 83E37E2C27DB19D1E3BEF741027DD78A5C03AD6D1046BAB990DB854366DE66ADDBEFCF6C048E075A36A6A5BD2292A053
2,993,543 UART: Caliptra RT
2,993,797 UART: [state] CFI Enabled
3,101,756 UART: [rt] RT listening for mailbox commands...
3,102,426 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,965 UART: [rt]cmd =0x41544d4e, len=14344
3,369,993 >>> mbox cmd response data (8 bytes)
3,369,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,785 UART: [rt]cmd =0x41545348, len=116
3,420,692 >>> mbox cmd response data (12 bytes)
3,420,693 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,857,427 >>> mbox cmd response: success
5,857,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,870,619 UART:
5,870,635 UART: Running Caliptra FMC ...
5,871,043 UART:
5,871,097 UART: [state] CFI Enabled
5,960,198 UART: [art] Extend RT PCRs Done
5,960,626 UART: [art] Lock RT PCRs Done
5,961,861 UART: [art] Populate DV Done
5,970,254 UART: [fht] FMC Alias Private Key: 7
5,971,248 UART: [art] Derive CDI
5,971,528 UART: [art] Store in in slot 0x4
6,056,973 UART: [art] Derive Key Pair
6,057,333 UART: [art] Store priv key in slot 0x5
6,069,917 UART: [art] Derive Key Pair - Done
6,084,959 UART: [art] Signing Cert with AUTHO
6,085,439 UART: RITY.KEYID = 7
6,100,569 UART: [art] Erasing AUTHORITY.KEYID = 7
6,101,334 UART: [art] PUB.X = 4755256CC5CFCB4805BC7A64E3EE4F93151C63ADA533A64B0BE3063CB507BDB0FA44A2DF2EA948E2BF2411C81B7C5081
6,108,108 UART: [art] PUB.Y = DDF0710811F9A1DCD4AC2276916B874670AD33840AA06B04EC964356785EFE9D5D94CB15F0D1ECC27125542012368A29
6,115,049 UART: [art] SIG.R = 3813A254EF297388268C519C7F61884775B63A7CB95C42B3A54F34E748E87D61EED8C68C2A76B002C30BBCFB72F7E307
6,121,812 UART: [art] SIG.S = D822EA7677BA6E9277185FDA4B32930A50028895C73A69F767C3DC82A407085F9D263612497578A525D4432E449B9D26
6,146,671 UART: Caliptra RT
6,146,925 UART: [state] CFI Enabled
6,428,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,459,635 UART: [rt]cmd =0x41545348, len=116
6,480,704 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,151 UART: [kat] HMAC-384Kdf
922,601 UART: [kat] LMS
1,170,929 UART: [kat] --
1,172,040 UART: [cold-reset] ++
1,172,564 UART: [fht] FHT @ 0x50003400
1,175,241 UART: [idev] ++
1,175,409 UART: [idev] CDI.KEYID = 6
1,175,769 UART: [idev] SUBJECT.KEYID = 7
1,176,193 UART: [idev] UDS.KEYID = 0
1,176,538 ready_for_fw is high
1,176,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,200,584 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,032 UART: [ldev] ++
1,210,200 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,989 UART: [ldev] AUTHORITY.KEYID = 7
1,211,452 UART: [ldev] FE.KEYID = 1
1,216,692 UART: [ldev] Erasing FE.KEYID = 1
1,243,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,986 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,081 UART: [fwproc] Recv command 0x46574c44
1,283,809 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,973 >>> mbox cmd response: success
2,775,113 UART: [afmc] ++
2,775,281 UART: [afmc] CDI.KEYID = 6
2,775,643 UART: [afmc] SUBJECT.KEYID = 7
2,776,068 UART: [afmc] AUTHORITY.KEYID = 5
2,812,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,292 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,905 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,372 UART: [afmc] --
2,855,342 UART: [cold-reset] --
2,856,230 UART: [state] Locking Datavault
2,857,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,009 UART: [state] Locking ICCM
2,858,477 UART: [exit] Launching FMC @ 0x40000130
2,863,806 UART:
2,863,822 UART: Running Caliptra FMC ...
2,864,230 UART:
2,864,373 UART: [state] CFI Enabled
2,874,966 UART: [fht] FMC Alias Private Key: 7
2,983,331 UART: [art] Extend RT PCRs Done
2,983,759 UART: [art] Lock RT PCRs Done
2,985,379 UART: [art] Populate DV Done
2,993,610 UART: [fht] FMC Alias Private Key: 7
2,994,704 UART: [art] Derive CDI
2,994,984 UART: [art] Store in in slot 0x4
3,080,679 UART: [art] Derive Key Pair
3,081,039 UART: [art] Store priv key in slot 0x5
3,094,303 UART: [art] Derive Key Pair - Done
3,108,942 UART: [art] Signing Cert with AUTHO
3,109,422 UART: RITY.KEYID = 7
3,125,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,977 UART: [art] PUB.X = AAA072270BBF96D68B4EE342C80ABAC940AA0453327490B51334BD636B87F5643BC5B312B448246B4CB95BB9054103AF
3,132,736 UART: [art] PUB.Y = C87843B94E2939EE7AFA676AB83666D993C0369FA77D6865C2E3BBADC2161D6BFF628DC265FE2B67B27F6785266FEB51
3,139,696 UART: [art] SIG.R = 5A8E19D0B36CE18E00C15CFC8A7879158C69A5023243F10317082285A15F2908B7D14EE1152744A8B4D27CD000DA7602
3,146,401 UART: [art] SIG.S = 6F8B166DF156C04688F240B36C80702E94C6FB08627B8B2B721BC959A9C2B1E238C5C2AA8D4FC19AAD6CBDF353DDE620
3,170,185 UART: Caliptra RT
3,170,531 UART: [state] CFI Enabled
3,278,897 UART: [rt] RT listening for mailbox commands...
3,279,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,032 UART: [rt]cmd =0x41544d4e, len=14344
3,547,180 >>> mbox cmd response data (8 bytes)
3,547,181 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,194 UART: [rt]cmd =0x41545348, len=116
3,598,255 >>> mbox cmd response data (12 bytes)
3,598,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,599,212 UART:
3,599,228 UART: Running Caliptra ROM ...
3,599,636 UART:
3,599,778 UART: [state] CFI Enabled
3,602,908 UART: [state] LifecycleState = Unprovisioned
3,603,563 UART: [state] DebugLocked = No
3,604,045 UART: [state] WD Timer not started. Device not locked for debugging
3,605,293 UART: [kat] SHA2-256
4,410,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,415,068 UART: [kat] ++
4,415,220 UART: [kat] sha1
4,419,416 UART: [kat] SHA2-256
4,421,356 UART: [kat] SHA2-384
4,424,147 UART: [kat] SHA2-512-ACC
4,426,047 UART: [kat] ECC-384
4,435,292 UART: [kat] HMAC-384Kdf
4,439,762 UART: [kat] LMS
4,688,090 UART: [kat] --
4,689,070 UART: [update-reset] ++
6,001,109 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,002,130 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,151,996 >>> mbox cmd response: success
6,151,996 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,152,261 UART: [update-reset] Copying MAN_2 To MAN_1
6,160,275 UART: [update-reset Success] --
6,161,112 UART: [state] Locking Datavault
6,161,804 UART: [state] Locking PCR0, PCR1 and PCR31
6,162,408 UART: [state] Locking ICCM
6,163,062 UART: [exit] Launching FMC @ 0x40000130
6,168,391 UART:
6,168,407 UART: Running Caliptra FMC ...
6,168,815 UART:
6,168,958 UART: [state] CFI Enabled
6,257,967 UART: [art] Extend RT PCRs Done
6,258,395 UART: [art] Lock RT PCRs Done
6,259,680 UART: [art] Populate DV Done
6,267,981 UART: [fht] FMC Alias Private Key: 7
6,269,117 UART: [art] Derive CDI
6,269,397 UART: [art] Store in in slot 0x4
6,355,082 UART: [art] Derive Key Pair
6,355,442 UART: [art] Store priv key in slot 0x5
6,368,398 UART: [art] Derive Key Pair - Done
6,383,609 UART: [art] Signing Cert with AUTHO
6,384,089 UART: RITY.KEYID = 7
6,399,395 UART: [art] Erasing AUTHORITY.KEYID = 7
6,400,160 UART: [art] PUB.X = DFF3F87F4B16EA9F8BBB03E7379226196D7A82DDA8351D10F2FB5B3E2E123273B662E0DBB5E426DD8144EC87A67CE428
6,406,941 UART: [art] PUB.Y = CC0DCE3B6CAFF971A078F8C3A4459C36642B8B5DD3AF9D99B6A92B28B6EC15C5AD962635136BA5C4E4716D99CC5D0D72
6,413,903 UART: [art] SIG.R = EEB0C7F70D9E9AAF849A4E22FEB80A7B7B76C442209507A260A1F1B0B75105B62F4259EDF9980C3E514E311FD528583B
6,420,666 UART: [art] SIG.S = FD720823577794203A87B46EF7A0611925B9FFE1CD5E96044DAD121B7C529D5B3D62D1BD19BC3F38C773CECAB1E76DFB
6,444,725 UART: Caliptra RT
6,445,071 UART: [state] CFI Enabled
6,731,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,762,472 UART: [rt]cmd =0x41545348, len=116
6,783,205 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,882 ready_for_fw is high
1,060,882 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,930 >>> mbox cmd response: success
2,689,654 UART:
2,689,670 UART: Running Caliptra FMC ...
2,690,078 UART:
2,690,221 UART: [state] CFI Enabled
2,700,702 UART: [fht] FMC Alias Private Key: 7
2,808,163 UART: [art] Extend RT PCRs Done
2,808,591 UART: [art] Lock RT PCRs Done
2,809,939 UART: [art] Populate DV Done
2,818,106 UART: [fht] FMC Alias Private Key: 7
2,819,038 UART: [art] Derive CDI
2,819,318 UART: [art] Store in in slot 0x4
2,904,925 UART: [art] Derive Key Pair
2,905,285 UART: [art] Store priv key in slot 0x5
2,918,357 UART: [art] Derive Key Pair - Done
2,933,328 UART: [art] Signing Cert with AUTHO
2,933,808 UART: RITY.KEYID = 7
2,948,908 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,673 UART: [art] PUB.X = 3F7820CA8A6DCC64EEB8BD1EB744F75C37F62E10DADE29DECA74E52086CBA8FD621606592932257814495664E35F66B1
2,956,448 UART: [art] PUB.Y = 7A3BFBE1769BBCDD3C915A2DE6BA3A4C4302C26B66F94814F4FF4C7FFE6CE6408CE616D8FBA5276D3FB5AC73044903F2
2,963,411 UART: [art] SIG.R = 356E2955A64636063A5D58A8A56CE6C929B06FBE3DCFB5F1A6344093E8320EEF9854D03165939ADF6ED810E23DE2DE02
2,970,178 UART: [art] SIG.S = 6F4D8FFCEE01E889253D6171E5AEEE5669DC8CA4A48E58E922A8775BB61C4F5A5755BC7EC38D9A7358F487E29BEF723E
2,993,532 UART: Caliptra RT
2,993,878 UART: [state] CFI Enabled
3,101,038 UART: [rt] RT listening for mailbox commands...
3,101,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,589 UART: [rt]cmd =0x41544d4e, len=14344
3,369,541 >>> mbox cmd response data (8 bytes)
3,369,542 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,549 UART: [rt]cmd =0x41545348, len=116
3,420,802 >>> mbox cmd response data (12 bytes)
3,420,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,858,656 >>> mbox cmd response: success
5,858,656 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,871,712 UART:
5,871,728 UART: Running Caliptra FMC ...
5,872,136 UART:
5,872,279 UART: [state] CFI Enabled
5,962,024 UART: [art] Extend RT PCRs Done
5,962,452 UART: [art] Lock RT PCRs Done
5,963,705 UART: [art] Populate DV Done
5,971,972 UART: [fht] FMC Alias Private Key: 7
5,973,102 UART: [art] Derive CDI
5,973,382 UART: [art] Store in in slot 0x4
6,059,247 UART: [art] Derive Key Pair
6,059,607 UART: [art] Store priv key in slot 0x5
6,072,561 UART: [art] Derive Key Pair - Done
6,087,273 UART: [art] Signing Cert with AUTHO
6,087,753 UART: RITY.KEYID = 7
6,102,897 UART: [art] Erasing AUTHORITY.KEYID = 7
6,103,662 UART: [art] PUB.X = 0473C05C1396DC0546C82B5BDDE994BCD254B283B92F7429307145C5EC6DD9864D175E38434AB0D2AF09AB15E6020A43
6,110,419 UART: [art] PUB.Y = A4B471F6B26DD75AAE90FF3474C60D8CCA656B49A7D4CCE4A9472ACE0D879C1675CE42BD339D39EF9F42C9365F35FA40
6,117,381 UART: [art] SIG.R = 86F50042F2271053BCD7267765E19F2869A7672AD6BBEB17D67EDE120038911F3C0D3E46DCF02B71D10F96506AFF9A1E
6,124,105 UART: [art] SIG.S = 34C2F36C8BFEF22E033F1B77D9945BFB9BE9E1B2C1AF19F97B608469DCA7EDF4B3AE35624D0D72099F851239CB025B4C
6,148,152 UART: Caliptra RT
6,148,498 UART: [state] CFI Enabled
6,431,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,462,092 UART: [rt]cmd =0x41545348, len=116
6,483,343 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,465 UART: [idev] ++
1,173,633 UART: [idev] CDI.KEYID = 6
1,173,994 UART: [idev] SUBJECT.KEYID = 7
1,174,419 UART: [idev] UDS.KEYID = 0
1,174,765 ready_for_fw is high
1,174,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,457 UART: [idev] Erasing UDS.KEYID = 0
1,200,077 UART: [idev] Sha1 KeyId Algorithm
1,208,985 UART: [idev] --
1,210,100 UART: [ldev] ++
1,210,268 UART: [ldev] CDI.KEYID = 6
1,210,632 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,994 UART: [ldev] Erasing FE.KEYID = 1
1,243,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,168 UART: [ldev] --
1,282,620 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,200 >>> mbox cmd response: success
2,775,407 UART: [afmc] ++
2,775,575 UART: [afmc] CDI.KEYID = 6
2,775,938 UART: [afmc] SUBJECT.KEYID = 7
2,776,364 UART: [afmc] AUTHORITY.KEYID = 5
2,811,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,972 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,691 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,532 UART: [afmc] --
2,854,472 UART: [cold-reset] --
2,855,308 UART: [state] Locking Datavault
2,856,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,139 UART: [state] Locking ICCM
2,857,739 UART: [exit] Launching FMC @ 0x40000130
2,863,068 UART:
2,863,084 UART: Running Caliptra FMC ...
2,863,492 UART:
2,863,546 UART: [state] CFI Enabled
2,874,079 UART: [fht] FMC Alias Private Key: 7
2,982,132 UART: [art] Extend RT PCRs Done
2,982,560 UART: [art] Lock RT PCRs Done
2,984,318 UART: [art] Populate DV Done
2,992,783 UART: [fht] FMC Alias Private Key: 7
2,993,869 UART: [art] Derive CDI
2,994,149 UART: [art] Store in in slot 0x4
3,079,970 UART: [art] Derive Key Pair
3,080,330 UART: [art] Store priv key in slot 0x5
3,093,114 UART: [art] Derive Key Pair - Done
3,107,662 UART: [art] Signing Cert with AUTHO
3,108,142 UART: RITY.KEYID = 7
3,122,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,563 UART: [art] PUB.X = AAAF44F227F00B0B446550CD8CF39B32EDBACFD8597C46BBBFA5300B568A65EC60F6520945C4173C9D21E6A064DF1D34
3,130,337 UART: [art] PUB.Y = 248FF02FD6AE5C6B9361B961DC97FFDFA1A41104D4AA1CDC1D0370D47D8E895563980C8CA721FF5BC05365F8AC1F187D
3,137,294 UART: [art] SIG.R = B255631F89505685DB9D45E074A1C41D179FBE5C1877937E4787ED9785FEAB012F53D723E79C6B9D06BEF5DA996DF604
3,144,059 UART: [art] SIG.S = 6A42429641DC2D8EB6A3B2EFC7D5ED4A1E0107ECF507F99FD0B209FDA3567EC08CC2AC5174F98CE9E412560AB55F789C
3,167,573 UART: Caliptra RT
3,167,827 UART: [state] CFI Enabled
3,275,849 UART: [rt] RT listening for mailbox commands...
3,276,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,460 UART: [rt]cmd =0x41544d4e, len=14344
3,544,560 >>> mbox cmd response data (8 bytes)
3,544,561 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,764 UART: [rt]cmd =0x41545348, len=116
3,596,397 >>> mbox cmd response data (12 bytes)
3,596,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,228 UART:
3,597,244 UART: Running Caliptra ROM ...
3,597,652 UART:
3,597,707 UART: [state] CFI Enabled
3,600,485 UART: [state] LifecycleState = Unprovisioned
3,601,140 UART: [state] DebugLocked = No
3,601,730 UART: [state] WD Timer not started. Device not locked for debugging
3,602,862 UART: [kat] SHA2-256
4,406,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,410,541 UART: [kat] ++
4,410,693 UART: [kat] sha1
4,414,883 UART: [kat] SHA2-256
4,416,823 UART: [kat] SHA2-384
4,419,546 UART: [kat] SHA2-512-ACC
4,421,446 UART: [kat] ECC-384
4,430,967 UART: [kat] HMAC-384Kdf
4,435,733 UART: [kat] LMS
4,684,045 UART: [kat] --
4,684,871 UART: [update-reset] ++
5,996,589 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,997,684 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,147,550 >>> mbox cmd response: success
6,147,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,881 UART: [update-reset] Copying MAN_2 To MAN_1
6,155,895 UART: [update-reset Success] --
6,157,078 UART: [state] Locking Datavault
6,157,820 UART: [state] Locking PCR0, PCR1 and PCR31
6,158,424 UART: [state] Locking ICCM
6,159,016 UART: [exit] Launching FMC @ 0x40000130
6,164,345 UART:
6,164,361 UART: Running Caliptra FMC ...
6,164,769 UART:
6,164,823 UART: [state] CFI Enabled
6,254,160 UART: [art] Extend RT PCRs Done
6,254,588 UART: [art] Lock RT PCRs Done
6,256,069 UART: [art] Populate DV Done
6,264,278 UART: [fht] FMC Alias Private Key: 7
6,265,414 UART: [art] Derive CDI
6,265,694 UART: [art] Store in in slot 0x4
6,351,409 UART: [art] Derive Key Pair
6,351,769 UART: [art] Store priv key in slot 0x5
6,364,491 UART: [art] Derive Key Pair - Done
6,379,387 UART: [art] Signing Cert with AUTHO
6,379,867 UART: RITY.KEYID = 7
6,394,887 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,652 UART: [art] PUB.X = 3696C6797AD551D3A4654C1F747AE18D7527032D04340D8BFF2D50971CF0F8537D39401FE1E1258AA3F675E886DB980D
6,402,408 UART: [art] PUB.Y = D98958498B8D8AECFE773481812358525C93F83CBB146B3A2E4C135F3A9905BDA56DB0AE8A047486274CF43313CC640F
6,409,351 UART: [art] SIG.R = AA1903C8B1D6EEA20693191AA843385B6AEEE15C802F6849BBD8F69CC2E0D5DE774CC2031801F298967133AB77560AD4
6,416,112 UART: [art] SIG.S = 8C2EC40A668388A1A080C2DCA9DF411303066749100EB6D3D8F6CF8DE57281D77F4DC42C186CDF42BEA9469F392FF05E
6,440,201 UART: Caliptra RT
6,440,455 UART: [state] CFI Enabled
6,722,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,753,134 UART: [rt]cmd =0x41545348, len=116
6,774,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 ready_for_fw is high
1,055,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,556 >>> mbox cmd response: success
2,684,780 UART:
2,684,796 UART: Running Caliptra FMC ...
2,685,204 UART:
2,685,258 UART: [state] CFI Enabled
2,695,839 UART: [fht] FMC Alias Private Key: 7
2,803,738 UART: [art] Extend RT PCRs Done
2,804,166 UART: [art] Lock RT PCRs Done
2,805,586 UART: [art] Populate DV Done
2,813,693 UART: [fht] FMC Alias Private Key: 7
2,814,867 UART: [art] Derive CDI
2,815,147 UART: [art] Store in in slot 0x4
2,900,694 UART: [art] Derive Key Pair
2,901,054 UART: [art] Store priv key in slot 0x5
2,913,980 UART: [art] Derive Key Pair - Done
2,928,684 UART: [art] Signing Cert with AUTHO
2,929,164 UART: RITY.KEYID = 7
2,944,632 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,397 UART: [art] PUB.X = 24CA4E4FEEE73BCCCF12A1AF5268DBA9DD826463C3294DD4B665CBEDFD9E9A7174EED18F03A32C5E69CEF5A7B727BEBA
2,952,198 UART: [art] PUB.Y = 7A2F69BF2F69CB05F57875CB72238EE44BA2CCC1AB4B33A8203630603C6E787B9C4E072BB91F8B7C03E2D69408822554
2,959,140 UART: [art] SIG.R = 1D23ABE7C17001100AD95BEF767FA50BED1FBCD643FE8D3AC488653E209821B8E0D33BA02E729B207065411C3BAD3E9B
2,965,915 UART: [art] SIG.S = 18273D86E153BC2EAF667A2E0EE2E064BE6761F0658C8A80D842D38368EDA505CF01ADA6237DEEB3D9E7DE752D4E6A5C
2,989,671 UART: Caliptra RT
2,989,925 UART: [state] CFI Enabled
3,098,423 UART: [rt] RT listening for mailbox commands...
3,099,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,108 UART: [rt]cmd =0x41544d4e, len=14344
3,366,948 >>> mbox cmd response data (8 bytes)
3,366,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,062 UART: [rt]cmd =0x41545348, len=116
3,418,467 >>> mbox cmd response data (12 bytes)
3,418,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,850,123 >>> mbox cmd response: success
5,850,123 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,863,529 UART:
5,863,545 UART: Running Caliptra FMC ...
5,863,953 UART:
5,864,007 UART: [state] CFI Enabled
5,952,902 UART: [art] Extend RT PCRs Done
5,953,330 UART: [art] Lock RT PCRs Done
5,954,607 UART: [art] Populate DV Done
5,963,014 UART: [fht] FMC Alias Private Key: 7
5,964,026 UART: [art] Derive CDI
5,964,306 UART: [art] Store in in slot 0x4
6,049,845 UART: [art] Derive Key Pair
6,050,205 UART: [art] Store priv key in slot 0x5
6,063,223 UART: [art] Derive Key Pair - Done
6,077,992 UART: [art] Signing Cert with AUTHO
6,078,472 UART: RITY.KEYID = 7
6,093,414 UART: [art] Erasing AUTHORITY.KEYID = 7
6,094,179 UART: [art] PUB.X = 54EC6E0A232CF6F17AAADF4DB6F81BB04146431E9DBC6E60981ECDC4643DEAD7A82AD7653D7DFD45D00D1A905CA1DD96
6,100,969 UART: [art] PUB.Y = BD0B23460260DBCBBAB31B62E36FD4BB796BFFAB96CE4A83782D01F384E51A9771933CBE3A9D569B8ECA658B41DD2A41
6,107,930 UART: [art] SIG.R = 71CC41F814701431F98178126E8C060BDE2DF35CD99B8FB6B8F93DE4D674989A808EFA17EE8B233D947EB4C03659B7B4
6,114,700 UART: [art] SIG.S = FEDDAA5398EE1BB1C0CD7A9A51E6D0E03E9E51765615C367359B29FC4BDC238C19E34098515D127BDB88A1B2CF304537
6,138,937 UART: Caliptra RT
6,139,191 UART: [state] CFI Enabled
6,421,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,452,623 UART: [rt]cmd =0x41545348, len=116
6,473,884 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,939 UART: [kat] SHA2-512-ACC
906,840 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,312 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,198,784 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,599 UART: [ldev] ++
1,208,767 UART: [ldev] CDI.KEYID = 6
1,209,131 UART: [ldev] SUBJECT.KEYID = 5
1,209,558 UART: [ldev] AUTHORITY.KEYID = 7
1,210,021 UART: [ldev] FE.KEYID = 1
1,214,957 UART: [ldev] Erasing FE.KEYID = 1
1,241,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,473 UART: [ldev] --
1,280,743 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,193 >>> mbox cmd response: success
2,773,212 UART: [afmc] ++
2,773,380 UART: [afmc] CDI.KEYID = 6
2,773,743 UART: [afmc] SUBJECT.KEYID = 7
2,774,169 UART: [afmc] AUTHORITY.KEYID = 5
2,809,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,119 UART: [afmc] --
2,853,197 UART: [cold-reset] --
2,854,003 UART: [state] Locking Datavault
2,855,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,880 UART: [state] Locking ICCM
2,856,348 UART: [exit] Launching FMC @ 0x40000130
2,861,677 UART:
2,861,693 UART: Running Caliptra FMC ...
2,862,101 UART:
2,862,244 UART: [state] CFI Enabled
2,872,979 UART: [fht] FMC Alias Private Key: 7
2,981,578 UART: [art] Extend RT PCRs Done
2,982,006 UART: [art] Lock RT PCRs Done
2,983,430 UART: [art] Populate DV Done
2,991,935 UART: [fht] FMC Alias Private Key: 7
2,993,033 UART: [art] Derive CDI
2,993,313 UART: [art] Store in in slot 0x4
3,079,416 UART: [art] Derive Key Pair
3,079,776 UART: [art] Store priv key in slot 0x5
3,093,074 UART: [art] Derive Key Pair - Done
3,107,956 UART: [art] Signing Cert with AUTHO
3,108,436 UART: RITY.KEYID = 7
3,123,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,285 UART: [art] PUB.X = B6185E2349F6262092FDE78F0C84389824CD33BB9C13F0B5C3B37F71157B3B15285E701D15F3F06F89583E6631407995
3,131,042 UART: [art] PUB.Y = 59CC66DED198957C650CAFB330E884212D21B90FF3494796241031EBB7F2FF38FD8CDFDD31DD155BBA7DB74CD871136A
3,138,000 UART: [art] SIG.R = 23B7789AC168C7C96353D4ABADACED6C41C17F6D0C0F69658906A5EE0D3C787B9E66E218B416FFFDE05324F0A3152FF6
3,144,772 UART: [art] SIG.S = F905E1341CB7A6EA7EA3E18F9DA093A26F83628CBB13C9CE38766C79120A81C9DA7100D619DFCA319E4B23C5967B7488
3,168,371 UART: Caliptra RT
3,168,717 UART: [state] CFI Enabled
3,277,749 UART: [rt] RT listening for mailbox commands...
3,278,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,314 UART: [rt]cmd =0x41544d4e, len=14344
3,545,734 >>> mbox cmd response data (8 bytes)
3,545,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,820 UART: [rt]cmd =0x41545348, len=116
3,596,727 >>> mbox cmd response data (12 bytes)
3,596,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,490 UART:
3,597,506 UART: Running Caliptra ROM ...
3,597,914 UART:
3,598,056 UART: [state] CFI Enabled
3,600,594 UART: [state] LifecycleState = Unprovisioned
3,601,249 UART: [state] DebugLocked = No
3,601,831 UART: [state] WD Timer not started. Device not locked for debugging
3,602,985 UART: [kat] SHA2-256
4,406,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,410,664 UART: [kat] ++
4,410,816 UART: [kat] sha1
4,414,980 UART: [kat] SHA2-256
4,416,920 UART: [kat] SHA2-384
4,419,657 UART: [kat] SHA2-512-ACC
4,421,557 UART: [kat] ECC-384
4,431,508 UART: [kat] HMAC-384Kdf
4,436,132 UART: [kat] LMS
4,684,444 UART: [kat] --
4,685,458 UART: [update-reset] ++
5,998,050 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,999,075 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,148,941 >>> mbox cmd response: success
6,148,941 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,149,106 UART: [update-reset] Copying MAN_2 To MAN_1
6,157,120 UART: [update-reset Success] --
6,158,317 UART: [state] Locking Datavault
6,159,127 UART: [state] Locking PCR0, PCR1 and PCR31
6,159,731 UART: [state] Locking ICCM
6,160,315 UART: [exit] Launching FMC @ 0x40000130
6,165,644 UART:
6,165,660 UART: Running Caliptra FMC ...
6,166,068 UART:
6,166,211 UART: [state] CFI Enabled
6,255,016 UART: [art] Extend RT PCRs Done
6,255,444 UART: [art] Lock RT PCRs Done
6,256,919 UART: [art] Populate DV Done
6,265,220 UART: [fht] FMC Alias Private Key: 7
6,266,342 UART: [art] Derive CDI
6,266,622 UART: [art] Store in in slot 0x4
6,352,193 UART: [art] Derive Key Pair
6,352,553 UART: [art] Store priv key in slot 0x5
6,366,113 UART: [art] Derive Key Pair - Done
6,380,952 UART: [art] Signing Cert with AUTHO
6,381,432 UART: RITY.KEYID = 7
6,396,426 UART: [art] Erasing AUTHORITY.KEYID = 7
6,397,191 UART: [art] PUB.X = 421CB8F2B857BCF5E39FF5A835F54B6802A3C4B18FEF650C8B7DF8575DE35481DEF8F4E687C7A48AF918448F0A06229A
6,403,961 UART: [art] PUB.Y = 3EA357D31DB7BEE698EBFBE086F32A66B5ACD2D0D4B2DE1B25851CD83D4E76E2007CEC907532BFDB2ED3C81AB74F370F
6,410,912 UART: [art] SIG.R = 490CFB97A985FC3B856718B5AA37730C8667623E14942F82B60568698CFEF6A521BA23733D1AFE2CA5D60C4E11A42336
6,417,670 UART: [art] SIG.S = 0800DDCABB7B4E69F034AE7D4B27C8935D7D78D7E5F163B70F4CD836516960A61A6CCA72E3363393C29DBD81B6A215F9
6,441,271 UART: Caliptra RT
6,441,617 UART: [state] CFI Enabled
6,719,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,750,191 UART: [rt]cmd =0x41545348, len=116
6,771,584 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,999 ready_for_fw is high
1,056,999 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,501 >>> mbox cmd response: success
2,685,451 UART:
2,685,467 UART: Running Caliptra FMC ...
2,685,875 UART:
2,686,018 UART: [state] CFI Enabled
2,696,583 UART: [fht] FMC Alias Private Key: 7
2,804,290 UART: [art] Extend RT PCRs Done
2,804,718 UART: [art] Lock RT PCRs Done
2,806,294 UART: [art] Populate DV Done
2,814,437 UART: [fht] FMC Alias Private Key: 7
2,815,381 UART: [art] Derive CDI
2,815,661 UART: [art] Store in in slot 0x4
2,901,540 UART: [art] Derive Key Pair
2,901,900 UART: [art] Store priv key in slot 0x5
2,914,370 UART: [art] Derive Key Pair - Done
2,929,079 UART: [art] Signing Cert with AUTHO
2,929,559 UART: RITY.KEYID = 7
2,944,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,310 UART: [art] PUB.X = E52C8440059C168F1C2E8ED7CB19A808C859B20318D7096A42B746B3DDC132E869C539C7E5B86A390806D2E8D33CC457
2,952,062 UART: [art] PUB.Y = 7CDBC2D08A12DCCE2FB1427EDEE508E594A77BFFE342D21FAC35F3F64E2035F046CA104182F36406E05565B4DE225820
2,959,018 UART: [art] SIG.R = 356C35498DF89420C64EB2BF551A93ABE0437F3436A5B2F9FA2FC909C389D63FB7F830F88C9FF776C405A34C1A48D507
2,965,785 UART: [art] SIG.S = 042259319852F7405DDC38293E02CAEDD2E24AB7F3515BF48253B1EC26A4E089C369C192571B9A338ECAC1BF24B1FB11
2,989,858 UART: Caliptra RT
2,990,204 UART: [state] CFI Enabled
3,098,052 UART: [rt] RT listening for mailbox commands...
3,098,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,395 UART: [rt]cmd =0x41544d4e, len=14344
3,366,389 >>> mbox cmd response data (8 bytes)
3,366,390 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,321 UART: [rt]cmd =0x41545348, len=116
3,417,954 >>> mbox cmd response data (12 bytes)
3,417,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,851,173 >>> mbox cmd response: success
5,851,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,864,595 UART:
5,864,611 UART: Running Caliptra FMC ...
5,865,019 UART:
5,865,162 UART: [state] CFI Enabled
5,953,877 UART: [art] Extend RT PCRs Done
5,954,305 UART: [art] Lock RT PCRs Done
5,955,526 UART: [art] Populate DV Done
5,963,857 UART: [fht] FMC Alias Private Key: 7
5,964,943 UART: [art] Derive CDI
5,965,223 UART: [art] Store in in slot 0x4
6,050,910 UART: [art] Derive Key Pair
6,051,270 UART: [art] Store priv key in slot 0x5
6,063,354 UART: [art] Derive Key Pair - Done
6,078,212 UART: [art] Signing Cert with AUTHO
6,078,692 UART: RITY.KEYID = 7
6,093,730 UART: [art] Erasing AUTHORITY.KEYID = 7
6,094,495 UART: [art] PUB.X = EEF81772E302465680DE4143F4D888E5AB78D32A016AA24D85198E4066E574356C17B93DE7ADBFDF04D4A8FF4342FED8
6,101,264 UART: [art] PUB.Y = 66FC7466979A64A676758996701295AD49274C0BDF6E9C63FB1DC06F0723D20213A5FB8C5B373BEFF546A27273570CF9
6,108,200 UART: [art] SIG.R = 97B4CEA4C28010C6A942C9661E07BFEB7B2DF2DD26207584C7A61B359F79454E4FCA30FA44541FAAAAE00FCBD8A2313F
6,114,982 UART: [art] SIG.S = 26A0C5DF9630E57045F498E53821083ACB26372355CBB2A721512FF01839D6E1B7A9F2763DEFC12F96C454EDB2F907FD
6,139,327 UART: Caliptra RT
6,139,673 UART: [state] CFI Enabled
6,422,254 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,453,055 UART: [rt]cmd =0x41545348, len=116
6,473,810 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,389 UART:
192,755 UART: Running Caliptra ROM ...
193,915 UART:
194,056 UART: [state] CFI Enabled
266,412 UART: [state] LifecycleState = Unprovisioned
268,399 UART: [state] DebugLocked = No
269,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,222 UART: [kat] SHA2-256
444,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,400 UART: [kat] ++
455,995 UART: [kat] sha1
467,224 UART: [kat] SHA2-256
469,862 UART: [kat] SHA2-384
475,838 UART: [kat] SHA2-512-ACC
478,203 UART: [kat] ECC-384
2,768,589 UART: [kat] HMAC-384Kdf
2,799,552 UART: [kat] LMS
3,989,807 UART: [kat] --
3,994,560 UART: [cold-reset] ++
3,997,054 UART: [fht] Storing FHT @ 0x50003400
4,009,730 UART: [idev] ++
4,010,291 UART: [idev] CDI.KEYID = 6
4,011,313 UART: [idev] SUBJECT.KEYID = 7
4,012,480 UART: [idev] UDS.KEYID = 0
4,013,497 ready_for_fw is high
4,013,716 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,226 UART: [idev] Erasing UDS.KEYID = 0
7,342,610 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,301 UART: [idev] --
7,369,030 UART: [ldev] ++
7,369,617 UART: [ldev] CDI.KEYID = 6
7,370,587 UART: [ldev] SUBJECT.KEYID = 5
7,371,758 UART: [ldev] AUTHORITY.KEYID = 7
7,373,039 UART: [ldev] FE.KEYID = 1
7,402,291 UART: [ldev] Erasing FE.KEYID = 1
10,724,075 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,017,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,061,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,081,097 UART: [ldev] --
13,085,881 UART: [fwproc] Waiting for Commands...
13,089,159 UART: [fwproc] Received command 0x46574c44
13,091,334 UART: [fwproc] Received Image of size 114036 bytes
17,144,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,215,363 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,284,254 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,600,982 >>> mbox cmd response: success
17,605,868 UART: [afmc] ++
17,606,464 UART: [afmc] CDI.KEYID = 6
17,607,346 UART: [afmc] SUBJECT.KEYID = 7
17,608,609 UART: [afmc] AUTHORITY.KEYID = 5
20,977,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,274,562 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,276,830 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,291,224 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,306,083 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,320,493 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,342,209 UART: [afmc] --
23,346,548 UART: [cold-reset] --
23,351,431 UART: [state] Locking Datavault
23,357,429 UART: [state] Locking PCR0, PCR1 and PCR31
23,359,185 UART: [state] Locking ICCM
23,360,467 UART: [exit] Launching FMC @ 0x40000130
23,368,883 UART:
23,369,118 UART: Running Caliptra FMC ...
23,370,218 UART:
23,370,369 UART: [state] CFI Enabled
23,435,483 UART: [fht] FMC Alias Private Key: 7
25,773,405 UART: [art] Extend RT PCRs Done
25,774,626 UART: [art] Lock RT PCRs Done
25,776,222 UART: [art] Populate DV Done
25,781,582 UART: [fht] FMC Alias Private Key: 7
25,783,315 UART: [art] Derive CDI
25,784,051 UART: [art] Store in in slot 0x4
25,844,065 UART: [art] Derive Key Pair
25,845,065 UART: [art] Store priv key in slot 0x5
29,137,483 UART: [art] Derive Key Pair - Done
29,150,644 UART: [art] Signing Cert with AUTHO
29,151,981 UART: RITY.KEYID = 7
31,439,595 UART: [art] Erasing AUTHORITY.KEYID = 7
31,441,103 UART: [art] PUB.X = 0CE1109EAC24A2D81B43913EEE3DAC9D426C5645D1E03C1D7DC22E3363163C3B8AD4D59964BC68AF37BB91759BA01ABC
31,448,342 UART: [art] PUB.Y = BB4D89B0BDDAE8B695B6E5DE8866BF46E0A61E8627786D907F324D34D7C4C2AB84D096325ABFE9997B025304043145D5
31,455,604 UART: [art] SIG.R = 182A0297F6C9BB34B7B715CBD66ABA6898450BBAF48D98276A2525F4F0A9ACCB6C0E79AAA19E11135BF72C79DA68059D
31,463,051 UART: [art] SIG.S = 6E4E4A8FA8049A5229A17992DBFEDB8C6FAE85C08F72FDBD3B40C5A73110FE4E438BFE95AC3B6B18F372A3CA888DA4D4
32,768,227 UART: Caliptra RT
32,768,939 UART: [state] CFI Enabled
32,929,500 UART: [rt] RT listening for mailbox commands...
32,931,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,087,455 UART: [rt]cmd =0x41544d4e, len=14344
38,322,633 >>> mbox cmd response data (8 bytes)
38,323,262 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,353,908 UART: [rt]cmd =0x41545348, len=116
38,356,042 >>> mbox cmd response data (12 bytes)
40,415,706 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,560,927 UART:
40,561,318 UART: Running Caliptra ROM ...
40,562,359 UART:
40,562,505 UART: [state] CFI Enabled
40,630,732 UART: [state] LifecycleState = Unprovisioned
40,632,671 UART: [state] DebugLocked = No
40,635,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,639,471 UART: [kat] SHA2-256
40,809,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,819,674 UART: [kat] ++
40,820,151 UART: [kat] sha1
40,832,055 UART: [kat] SHA2-256
40,834,725 UART: [kat] SHA2-384
40,839,686 UART: [kat] SHA2-512-ACC
40,842,031 UART: [kat] ECC-384
43,136,459 UART: [kat] HMAC-384Kdf
43,167,387 UART: [kat] LMS
44,357,722 UART: [kat] --
44,363,685 UART: [update-reset] ++
48,497,584 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,500,934 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,882,845 >>> mbox cmd response: success
48,887,516 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,888,106 UART: [update-reset] Copying MAN_2 To MAN_1
48,905,577 UART: [update-reset Success] --
48,909,370 UART: [state] Locking Datavault
48,913,382 UART: [state] Locking PCR0, PCR1 and PCR31
48,915,126 UART: [state] Locking ICCM
48,917,407 UART: [exit] Launching FMC @ 0x40000130
48,925,849 UART:
48,926,074 UART: Running Caliptra FMC ...
48,927,096 UART:
48,927,239 UART: [state] CFI Enabled
49,023,081 UART: [art] Extend RT PCRs Done
49,024,281 UART: [art] Lock RT PCRs Done
49,025,974 UART: [art] Populate DV Done
49,031,217 UART: [fht] FMC Alias Private Key: 7
49,032,699 UART: [art] Derive CDI
49,033,453 UART: [art] Store in in slot 0x4
49,092,559 UART: [art] Derive Key Pair
49,093,626 UART: [art] Store priv key in slot 0x5
52,386,305 UART: [art] Derive Key Pair - Done
52,398,878 UART: [art] Signing Cert with AUTHO
52,400,170 UART: RITY.KEYID = 7
54,687,948 UART: [art] Erasing AUTHORITY.KEYID = 7
54,689,463 UART: [art] PUB.X = 2FA8BC1D5EF5066C14508EC5ADE1228D08EE778EE07A1203C48E476257BE09BB243D84D5D9FE6015077452D47310202D
54,696,700 UART: [art] PUB.Y = 8FB08925D432F250C0550C3FC1BBA99C4BB768FDDA8462EC8DA93E0718BB5ADEB5C9B912ACE9644B0E48552301475DFA
54,703,970 UART: [art] SIG.R = 8EF14C28E27EB9CE505FD7AFAB16E0CF4DA971D0406BC66288A2D2F21E2008CB218CBEDAF7AD3A8D0CC94DB58CC12401
54,711,412 UART: [art] SIG.S = C070A0B0F7465AE3F032F18C13E093B7C7A5D83BD64480E95AE9B41EA22614D6DB73125718BB2443B9B5369FB643F4C1
56,016,491 UART: Caliptra RT
56,017,197 UART: [state] CFI Enabled
56,349,192 UART: [rt] RT listening for mailbox commands...
56,381,257 UART: [rt]cmd =0x41545348, len=116
56,383,444 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,805,949 ready_for_fw is high
3,806,766 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,879,496 >>> mbox cmd response: success
23,569,137 UART:
23,569,702 UART: Running Caliptra FMC ...
23,570,846 UART:
23,571,006 UART: [state] CFI Enabled
23,637,807 UART: [fht] FMC Alias Private Key: 7
25,975,839 UART: [art] Extend RT PCRs Done
25,977,070 UART: [art] Lock RT PCRs Done
25,978,714 UART: [art] Populate DV Done
25,984,288 UART: [fht] FMC Alias Private Key: 7
25,985,932 UART: [art] Derive CDI
25,986,744 UART: [art] Store in in slot 0x4
26,046,858 UART: [art] Derive Key Pair
26,047,860 UART: [art] Store priv key in slot 0x5
29,340,725 UART: [art] Derive Key Pair - Done
29,353,461 UART: [art] Signing Cert with AUTHO
29,354,774 UART: RITY.KEYID = 7
31,641,407 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,924 UART: [art] PUB.X = 782AFB01DCF91F368E9EA9B6F6A095D7D9B7F0BD2F9D00081CD599EC4E784A1658C4673AD43DB95CA719FA6DFC542B5B
31,650,233 UART: [art] PUB.Y = ADD90BCC00A727B24E248B93F23AF2A7AD506C065B61575AB737CB3010746F72CB5924BCF0D9663F080A100D64181496
31,657,397 UART: [art] SIG.R = E72E49AA8682BF0A57EA1E4F74F23A463E39D91E958249FC61F460331B698CFDBECFF443429A1DB041D01447B3CC3506
31,664,803 UART: [art] SIG.S = C7679952245AC43618CD8F952600D86424645D1C29318829E0B83FD34CAFB18B63F0E0AA46E182399AAA0693CA656429
32,970,393 UART: Caliptra RT
32,971,103 UART: [state] CFI Enabled
33,131,754 UART: [rt] RT listening for mailbox commands...
33,134,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,289,480 UART: [rt]cmd =0x41544d4e, len=14344
38,525,394 >>> mbox cmd response data (8 bytes)
38,525,991 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,557,005 UART: [rt]cmd =0x41545348, len=116
38,559,085 >>> mbox cmd response data (12 bytes)
40,619,813 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,343,447 >>> mbox cmd response: success
49,344,051 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,379,387 UART:
49,379,684 UART: Running Caliptra FMC ...
49,380,747 UART:
49,380,893 UART: [state] CFI Enabled
49,482,428 UART: [art] Extend RT PCRs Done
49,483,621 UART: [art] Lock RT PCRs Done
49,485,075 UART: [art] Populate DV Done
49,490,647 UART: [fht] FMC Alias Private Key: 7
49,492,221 UART: [art] Derive CDI
49,493,042 UART: [art] Store in in slot 0x4
49,550,813 UART: [art] Derive Key Pair
49,551,804 UART: [art] Store priv key in slot 0x5
52,845,284 UART: [art] Derive Key Pair - Done
52,858,012 UART: [art] Signing Cert with AUTHO
52,859,363 UART: RITY.KEYID = 7
55,145,874 UART: [art] Erasing AUTHORITY.KEYID = 7
55,147,389 UART: [art] PUB.X = CEFCD04DDA900B02034194B0CFD1CD00FFDE075843ECFEC4D51F51AB920BE83966C22A4127EF69E7DC83ED4766730340
55,154,650 UART: [art] PUB.Y = 40FFA367E705C42481663BB147549A920BBA2D4918C66765686782091253DC78E9AD652B476FF13AA288DF5AC6F4501D
55,161,867 UART: [art] SIG.R = 7549733818C7B194774E22F7550BF890AD3232DEA863A0B5AF769A1862E483307E5974585CE219D7C9305C102576AEEB
55,169,242 UART: [art] SIG.S = 583CD481582F7137EDEF4C7823B7A8F912A53318828EE398C9FE6F462D2EC808EFDC5EF23AA7CED1A215BE0706BEDA86
56,474,196 UART: Caliptra RT
56,474,895 UART: [state] CFI Enabled
56,810,153 UART: [rt] RT listening for mailbox commands...
56,841,972 UART: [rt]cmd =0x41545348, len=116
56,844,158 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,527 UART:
192,885 UART: Running Caliptra ROM ...
194,016 UART:
603,604 UART: [state] CFI Enabled
617,635 UART: [state] LifecycleState = Unprovisioned
619,577 UART: [state] DebugLocked = No
622,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,740 UART: [kat] SHA2-256
796,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,010 UART: [kat] ++
807,496 UART: [kat] sha1
818,936 UART: [kat] SHA2-256
821,600 UART: [kat] SHA2-384
828,585 UART: [kat] SHA2-512-ACC
830,969 UART: [kat] ECC-384
3,115,645 UART: [kat] HMAC-384Kdf
3,126,241 UART: [kat] LMS
4,316,365 UART: [kat] --
4,321,739 UART: [cold-reset] ++
4,323,819 UART: [fht] Storing FHT @ 0x50003400
4,335,013 UART: [idev] ++
4,335,574 UART: [idev] CDI.KEYID = 6
4,336,454 UART: [idev] SUBJECT.KEYID = 7
4,337,766 UART: [idev] UDS.KEYID = 0
4,338,683 ready_for_fw is high
4,338,879 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,088 UART: [idev] Erasing UDS.KEYID = 0
7,628,224 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,190 UART: [idev] --
7,654,964 UART: [ldev] ++
7,655,539 UART: [ldev] CDI.KEYID = 6
7,656,501 UART: [ldev] SUBJECT.KEYID = 5
7,657,652 UART: [ldev] AUTHORITY.KEYID = 7
7,658,934 UART: [ldev] FE.KEYID = 1
7,670,350 UART: [ldev] Erasing FE.KEYID = 1
10,959,373 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,273 UART: [ldev] --
13,319,114 UART: [fwproc] Waiting for Commands...
13,321,430 UART: [fwproc] Received command 0x46574c44
13,323,612 UART: [fwproc] Received Image of size 114036 bytes
17,374,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,589 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,832,587 >>> mbox cmd response: success
17,837,332 UART: [afmc] ++
17,837,925 UART: [afmc] CDI.KEYID = 6
17,838,852 UART: [afmc] SUBJECT.KEYID = 7
17,840,074 UART: [afmc] AUTHORITY.KEYID = 5
21,155,450 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,988 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,376 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,239 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,676 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,873 UART: [afmc] --
23,522,573 UART: [cold-reset] --
23,525,969 UART: [state] Locking Datavault
23,531,602 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,361 UART: [state] Locking ICCM
23,535,826 UART: [exit] Launching FMC @ 0x40000130
23,544,221 UART:
23,544,457 UART: Running Caliptra FMC ...
23,545,575 UART:
23,545,737 UART: [state] CFI Enabled
23,553,771 UART: [fht] FMC Alias Private Key: 7
25,884,532 UART: [art] Extend RT PCRs Done
25,885,763 UART: [art] Lock RT PCRs Done
25,887,809 UART: [art] Populate DV Done
25,893,120 UART: [fht] FMC Alias Private Key: 7
25,894,658 UART: [art] Derive CDI
25,895,389 UART: [art] Store in in slot 0x4
25,937,876 UART: [art] Derive Key Pair
25,938,881 UART: [art] Store priv key in slot 0x5
29,180,946 UART: [art] Derive Key Pair - Done
29,194,044 UART: [art] Signing Cert with AUTHO
29,195,352 UART: RITY.KEYID = 7
31,475,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,833 UART: [art] PUB.X = 98993343EE920D212DBF16F2955FBC24FE9CAA7B3ED6FE3E943090D66E4FA975A646CD36E7D81903EA1332F2DD496573
31,483,802 UART: [art] PUB.Y = A59FA6A231CD69F6C5B33483C5BA0998540E5320AF1FC76A5B5352BCA1805A35968115370F002025E82CE221691FA6EF
31,490,993 UART: [art] SIG.R = 8ABC8820A10750298F9B66EE75000669411B71CD7C8EA44800F31957E29ADAB00DA62E25D24D13AAA61C6C09C7C7CD76
31,498,342 UART: [art] SIG.S = 83720DF0D6E27B6049A973118AD6B6D16C9147F3E200B01284CD505086BEF7ABDA88076FAB90ECCC05626ACF9B19AD29
32,803,908 UART: Caliptra RT
32,804,626 UART: [state] CFI Enabled
32,922,191 UART: [rt] RT listening for mailbox commands...
32,924,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,080,018 UART: [rt]cmd =0x41544d4e, len=14344
38,315,055 >>> mbox cmd response data (8 bytes)
38,315,699 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,346,538 UART: [rt]cmd =0x41545348, len=116
38,348,741 >>> mbox cmd response data (12 bytes)
40,403,795 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,548,720 UART:
40,549,075 UART: Running Caliptra ROM ...
40,550,206 UART:
40,550,374 UART: [state] CFI Enabled
40,563,560 UART: [state] LifecycleState = Unprovisioned
40,565,515 UART: [state] DebugLocked = No
40,567,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,571,526 UART: [kat] SHA2-256
40,741,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,751,785 UART: [kat] ++
40,752,291 UART: [kat] sha1
40,763,554 UART: [kat] SHA2-256
40,766,247 UART: [kat] SHA2-384
40,771,146 UART: [kat] SHA2-512-ACC
40,773,510 UART: [kat] ECC-384
43,058,814 UART: [kat] HMAC-384Kdf
43,069,749 UART: [kat] LMS
44,259,810 UART: [kat] --
44,264,340 UART: [update-reset] ++
48,404,677 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,409,057 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
48,791,059 >>> mbox cmd response: success
48,795,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,796,319 UART: [update-reset] Copying MAN_2 To MAN_1
48,814,772 UART: [update-reset Success] --
48,820,144 UART: [state] Locking Datavault
48,822,605 UART: [state] Locking PCR0, PCR1 and PCR31
48,824,359 UART: [state] Locking ICCM
48,826,996 UART: [exit] Launching FMC @ 0x40000130
48,835,415 UART:
48,835,666 UART: Running Caliptra FMC ...
48,836,770 UART:
48,836,932 UART: [state] CFI Enabled
48,880,832 UART: [art] Extend RT PCRs Done
48,881,975 UART: [art] Lock RT PCRs Done
48,883,146 UART: [art] Populate DV Done
48,888,657 UART: [fht] FMC Alias Private Key: 7
48,890,304 UART: [art] Derive CDI
48,891,118 UART: [art] Store in in slot 0x4
48,933,511 UART: [art] Derive Key Pair
48,934,586 UART: [art] Store priv key in slot 0x5
52,176,747 UART: [art] Derive Key Pair - Done
52,189,819 UART: [art] Signing Cert with AUTHO
52,191,153 UART: RITY.KEYID = 7
54,470,578 UART: [art] Erasing AUTHORITY.KEYID = 7
54,472,086 UART: [art] PUB.X = FCC86323A7F9B8DE66641CE63EF2B12A20F3E9C25295EC130CB6CAE774B08B84C328E1AD9B54D790E581D88641740E7F
54,479,330 UART: [art] PUB.Y = 404A794D83658C8B206E2C57D8723EBC627FE935258C5DF1712CC5A9E2757E1C2F1DF6881A6AD412068C91EE3361F6A7
54,486,564 UART: [art] SIG.R = 8156DDAEC01D08CF3F02D5884E8E146809B1EB521BCD616A6482AE4385444D5E3A11F6C233D86109871AE72E3AC7E727
54,493,953 UART: [art] SIG.S = BB33AE5B155E46943C6563115AC0922751E81750D1A859F894E4BA80FB08DF1DD154898FC53E185361BAECBC80CA8EB3
55,798,671 UART: Caliptra RT
55,799,384 UART: [state] CFI Enabled
56,084,738 UART: [rt] RT listening for mailbox commands...
56,116,479 UART: [rt]cmd =0x41545348, len=116
56,118,865 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,132,370 ready_for_fw is high
4,132,758 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,787 >>> mbox cmd response: success
23,723,114 UART:
23,723,498 UART: Running Caliptra FMC ...
23,724,590 UART:
23,724,741 UART: [state] CFI Enabled
23,732,737 UART: [fht] FMC Alias Private Key: 7
26,063,389 UART: [art] Extend RT PCRs Done
26,064,641 UART: [art] Lock RT PCRs Done
26,066,132 UART: [art] Populate DV Done
26,071,557 UART: [fht] FMC Alias Private Key: 7
26,073,109 UART: [art] Derive CDI
26,073,931 UART: [art] Store in in slot 0x4
26,116,002 UART: [art] Derive Key Pair
26,117,052 UART: [art] Store priv key in slot 0x5
29,359,111 UART: [art] Derive Key Pair - Done
29,372,555 UART: [art] Signing Cert with AUTHO
29,373,860 UART: RITY.KEYID = 7
31,653,295 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,798 UART: [art] PUB.X = 378A72B2BFE28E56C7D48B17D9D22AF5AA541978914DFC93B4C0D01723342D320A25FE989EA7A7FC9D3F3E1AE92F02BF
31,662,019 UART: [art] PUB.Y = 0AAEFE560C6E623D33EE1D0817BC10F9C069DC83B6BA2EAA2187F2319F8F0A917ECAD6BF7B465BD31668F387A55A1CE6
31,669,326 UART: [art] SIG.R = 2B3B757760889A3CF47D543D1D6F7783F5384FE1945CB4270A4FEA055536A7DCB7D6978883498D438F53D003B9DF6351
31,676,684 UART: [art] SIG.S = 28FDB1F8780A201754CCCAAF1BB290A711929054383BC86BBCB5149B1F29E59229A18CF7D491534B55D15FE723F002A0
32,982,285 UART: Caliptra RT
32,983,012 UART: [state] CFI Enabled
33,101,217 UART: [rt] RT listening for mailbox commands...
33,103,622 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,258,916 UART: [rt]cmd =0x41544d4e, len=14344
38,494,859 >>> mbox cmd response data (8 bytes)
38,495,437 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,526,000 UART: [rt]cmd =0x41545348, len=116
38,528,100 >>> mbox cmd response data (12 bytes)
40,580,965 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
49,229,931 >>> mbox cmd response: success
49,230,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,265,422 UART:
49,265,716 UART: Running Caliptra FMC ...
49,266,743 UART:
49,266,889 UART: [state] CFI Enabled
49,310,869 UART: [art] Extend RT PCRs Done
49,312,067 UART: [art] Lock RT PCRs Done
49,313,556 UART: [art] Populate DV Done
49,318,861 UART: [fht] FMC Alias Private Key: 7
49,320,339 UART: [art] Derive CDI
49,321,072 UART: [art] Store in in slot 0x4
49,363,718 UART: [art] Derive Key Pair
49,364,714 UART: [art] Store priv key in slot 0x5
52,606,259 UART: [art] Derive Key Pair - Done
52,619,366 UART: [art] Signing Cert with AUTHO
52,620,678 UART: RITY.KEYID = 7
54,899,965 UART: [art] Erasing AUTHORITY.KEYID = 7
54,901,493 UART: [art] PUB.X = 84362FC0CA9C46A216D686883A7965F0569967C30ADD090C71386F7F8F2A5A90519338FF606EA98DABAB8D253DCC60F3
54,908,726 UART: [art] PUB.Y = 1B186D3FDB9213732B2B8CEC0DA5C7EF8C2EA9F9BDD5412D4402D0E697362CA37341A146750177FFC5EBECD4695F8B12
54,915,944 UART: [art] SIG.R = 9408BF70908761EDEFD8F7A3FBE6C6AA41D9C664E1AF2EF16421707CD160EA7AAB6836E947E1391EC5EDC2D1C629D33F
54,923,362 UART: [art] SIG.S = F928E7CA68B6D1D4A1CAC860D6C0A840759F21591A8CB57118072029E863A23E62595665A3DA9759487DEFBF359F5C88
56,228,282 UART: Caliptra RT
56,228,998 UART: [state] CFI Enabled
56,516,840 UART: [rt] RT listening for mailbox commands...
56,548,588 UART: [rt]cmd =0x41545348, len=116
56,550,726 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
192,533 UART:
192,889 UART: Running Caliptra ROM ...
194,091 UART:
194,255 UART: [state] CFI Enabled
264,407 UART: [state] LifecycleState = Unprovisioned
266,441 UART: [state] DebugLocked = No
268,930 UART: [state] WD Timer not started. Device not locked for debugging
272,115 UART: [kat] SHA2-256
451,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,866 UART: [kat] ++
463,402 UART: [kat] sha1
473,856 UART: [kat] SHA2-256
476,859 UART: [kat] SHA2-384
483,985 UART: [kat] SHA2-512-ACC
486,921 UART: [kat] ECC-384
2,949,394 UART: [kat] HMAC-384Kdf
2,971,938 UART: [kat] LMS
3,501,405 UART: [kat] --
3,502,859 UART: [cold-reset] ++
3,505,292 UART: [fht] FHT @ 0x50003400
3,515,986 UART: [idev] ++
3,516,560 UART: [idev] CDI.KEYID = 6
3,517,483 UART: [idev] SUBJECT.KEYID = 7
3,518,658 UART: [idev] UDS.KEYID = 0
3,519,583 ready_for_fw is high
3,519,767 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,613 UART: [idev] Erasing UDS.KEYID = 0
6,025,441 UART: [idev] Sha1 KeyId Algorithm
6,049,424 UART: [idev] --
6,053,638 UART: [ldev] ++
6,054,215 UART: [ldev] CDI.KEYID = 6
6,055,125 UART: [ldev] SUBJECT.KEYID = 5
6,056,292 UART: [ldev] AUTHORITY.KEYID = 7
6,057,527 UART: [ldev] FE.KEYID = 1
6,100,197 UART: [ldev] Erasing FE.KEYID = 1
8,602,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,552 UART: [ldev] --
10,412,572 UART: [fwproc] Wait for Commands...
10,415,748 UART: [fwproc] Recv command 0x46574c44
10,417,846 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,278,279 >>> mbox cmd response: success
14,282,734 UART: [afmc] ++
14,283,333 UART: [afmc] CDI.KEYID = 6
14,284,251 UART: [afmc] SUBJECT.KEYID = 7
14,285,411 UART: [afmc] AUTHORITY.KEYID = 5
16,826,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,269 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,081 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,322 UART: [afmc] --
18,628,081 UART: [cold-reset] --
18,632,597 UART: [state] Locking Datavault
18,636,885 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,600 UART: [state] Locking ICCM
18,641,270 UART: [exit] Launching FMC @ 0x40000130
18,649,669 UART:
18,649,904 UART: Running Caliptra FMC ...
18,651,008 UART:
18,651,178 UART: [state] CFI Enabled
18,711,023 UART: [fht] FMC Alias Private Key: 7
20,474,861 UART: [art] Extend RT PCRs Done
20,476,104 UART: [art] Lock RT PCRs Done
20,477,626 UART: [art] Populate DV Done
20,483,094 UART: [fht] FMC Alias Private Key: 7
20,484,702 UART: [art] Derive CDI
20,485,520 UART: [art] Store in in slot 0x4
20,543,866 UART: [art] Derive Key Pair
20,544,908 UART: [art] Store priv key in slot 0x5
23,007,822 UART: [art] Derive Key Pair - Done
23,021,038 UART: [art] Signing Cert with AUTHO
23,022,355 UART: RITY.KEYID = 7
24,733,655 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,162 UART: [art] PUB.X = 6C3B0AE2D812DE9800DD659ACEF25C1F069918B9968C0D5C351CE8BF7F1EF4D38C08E6F1D2B1CD049CB8AB2ADDFBACDD
24,742,442 UART: [art] PUB.Y = FCFD4EFA544673448ED71659EBCC76F938F0C7B2583E73D2CC7E03230B8AA81E46967F27555142061035B2B0E3FEF42B
24,749,676 UART: [art] SIG.R = D15C760720A001905FDC5EFBCF3033E125400F1088586115E203D81942490204C76A35D5E61ADD9560188F7DD18A01F8
24,757,052 UART: [art] SIG.S = EE9703D1D1B89127A35CD127F079A1C5C6C0FAA9F9EE6FBCFFCC8F62FB9862553E5EBA4E8E8D3F6322706B0E234F8B7D
25,735,941 UART: Caliptra RT
25,736,677 UART: [state] CFI Enabled
25,901,242 UART: [rt] RT listening for mailbox commands...
25,903,672 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,103 UART: [rt]cmd =0x41544d4e, len=14344
29,989,904 >>> mbox cmd response data (8 bytes)
29,990,500 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,021,170 UART: [rt]cmd =0x41545348, len=116
30,023,377 >>> mbox cmd response data (12 bytes)
32,076,234 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,221,786 UART:
32,222,146 UART: Running Caliptra ROM ...
32,223,200 UART:
32,223,369 UART: [state] CFI Enabled
32,282,388 UART: [state] LifecycleState = Unprovisioned
32,284,273 UART: [state] DebugLocked = No
32,286,769 UART: [state] WD Timer not started. Device not locked for debugging
32,290,729 UART: [kat] SHA2-256
32,469,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,481,402 UART: [kat] ++
32,481,855 UART: [kat] sha1
32,493,438 UART: [kat] SHA2-256
32,496,453 UART: [kat] SHA2-384
32,501,526 UART: [kat] SHA2-512-ACC
32,504,520 UART: [kat] ECC-384
34,966,774 UART: [kat] HMAC-384Kdf
34,987,425 UART: [kat] LMS
35,516,862 UART: [kat] --
35,521,137 UART: [update-reset] ++
38,948,826 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,951,500 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,334,530 >>> mbox cmd response: success
39,334,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,336,366 UART: [update-reset] Copying MAN_2 To MAN_1
39,358,702 UART: [update-reset Success] --
39,362,504 UART: [state] Locking Datavault
39,365,377 UART: [state] Locking PCR0, PCR1 and PCR31
39,367,021 UART: [state] Locking ICCM
39,369,552 UART: [exit] Launching FMC @ 0x40000130
39,377,989 UART:
39,378,237 UART: Running Caliptra FMC ...
39,379,279 UART:
39,379,431 UART: [state] CFI Enabled
39,478,754 UART: [art] Extend RT PCRs Done
39,479,962 UART: [art] Lock RT PCRs Done
39,481,578 UART: [art] Populate DV Done
39,487,056 UART: [fht] FMC Alias Private Key: 7
39,488,763 UART: [art] Derive CDI
39,489,577 UART: [art] Store in in slot 0x4
39,548,115 UART: [art] Derive Key Pair
39,549,209 UART: [art] Store priv key in slot 0x5
42,011,535 UART: [art] Derive Key Pair - Done
42,024,702 UART: [art] Signing Cert with AUTHO
42,026,177 UART: RITY.KEYID = 7
43,737,207 UART: [art] Erasing AUTHORITY.KEYID = 7
43,738,711 UART: [art] PUB.X = 3EBFDAFA93649CC23A8D3FB89273D99BF059BA74F3D7976F764A46B205C5A2806ACAD3146D9857B9894A5DA7D253113F
43,745,956 UART: [art] PUB.Y = 40F6CE454DF48B32C38B4F8DBA412755AAA102C0213547C5699469BD8186A34174E320CF2F72566C21A1393962835F39
43,753,177 UART: [art] SIG.R = 1B445A43E473F7B6060B6CCE09B90D85E501AB63DD95E421D5466B9A16969FC414A95567596F873F38A4C027546450DE
43,760,566 UART: [art] SIG.S = 46271167A4CD96D7CA457DCE85D1246095E1CE7A03A118CFA8F3966B8C250A72768CC1C3CDDDAFD048CA2293CD0B5809
44,738,719 UART: Caliptra RT
44,739,406 UART: [state] CFI Enabled
45,075,983 UART: [rt] RT listening for mailbox commands...
45,107,886 UART: [rt]cmd =0x41545348, len=116
45,110,505 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,730 UART:
193,100 UART: Running Caliptra ROM ...
194,220 UART:
194,363 UART: [state] CFI Enabled
267,555 UART: [state] LifecycleState = Unprovisioned
269,964 UART: [state] DebugLocked = No
271,218 UART: [state] WD Timer not started. Device not locked for debugging
275,200 UART: [kat] SHA2-256
465,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,878 UART: [kat] ++
476,328 UART: [kat] sha1
488,194 UART: [kat] SHA2-256
491,203 UART: [kat] SHA2-384
497,402 UART: [kat] SHA2-512-ACC
499,995 UART: [kat] ECC-384
2,949,045 UART: [kat] HMAC-384Kdf
2,973,684 UART: [kat] LMS
3,505,462 UART: [kat] --
3,509,452 UART: [cold-reset] ++
3,511,961 UART: [fht] FHT @ 0x50003400
3,523,224 UART: [idev] ++
3,523,931 UART: [idev] CDI.KEYID = 6
3,524,927 UART: [idev] SUBJECT.KEYID = 7
3,526,064 UART: [idev] UDS.KEYID = 0
3,526,985 ready_for_fw is high
3,527,187 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,222 UART: [idev] Erasing UDS.KEYID = 0
6,034,761 UART: [idev] Sha1 KeyId Algorithm
6,057,932 UART: [idev] --
6,064,306 UART: [ldev] ++
6,064,987 UART: [ldev] CDI.KEYID = 6
6,065,904 UART: [ldev] SUBJECT.KEYID = 5
6,067,060 UART: [ldev] AUTHORITY.KEYID = 7
6,068,295 UART: [ldev] FE.KEYID = 1
6,102,971 UART: [ldev] Erasing FE.KEYID = 1
8,610,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,503 UART: [ldev] --
10,419,724 UART: [fwproc] Wait for Commands...
10,421,451 UART: [fwproc] Recv command 0x46574c44
10,423,764 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,607,007 >>> mbox cmd response: success
14,612,008 UART: [afmc] ++
14,612,730 UART: [afmc] CDI.KEYID = 6
14,613,923 UART: [afmc] SUBJECT.KEYID = 7
14,615,363 UART: [afmc] AUTHORITY.KEYID = 5
17,149,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,466 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,126 UART: [afmc] --
18,950,267 UART: [cold-reset] --
18,954,678 UART: [state] Locking Datavault
18,961,014 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,223 UART: [state] Locking ICCM
18,966,036 UART: [exit] Launching FMC @ 0x40000130
18,974,741 UART:
18,975,019 UART: Running Caliptra FMC ...
18,976,132 UART:
18,976,293 UART: [state] CFI Enabled
19,035,623 UART: [fht] FMC Alias Private Key: 7
20,799,290 UART: [art] Extend RT PCRs Done
20,800,513 UART: [art] Lock RT PCRs Done
20,802,107 UART: [art] Populate DV Done
20,807,740 UART: [fht] FMC Alias Private Key: 7
20,809,388 UART: [art] Derive CDI
20,810,205 UART: [art] Store in in slot 0x4
20,868,384 UART: [art] Derive Key Pair
20,869,411 UART: [art] Store priv key in slot 0x5
23,332,440 UART: [art] Derive Key Pair - Done
23,345,120 UART: [art] Signing Cert with AUTHO
23,346,429 UART: RITY.KEYID = 7
25,058,687 UART: [art] Erasing AUTHORITY.KEYID = 7
25,060,195 UART: [art] PUB.X = EB2B80BCD83F6C70C03F01878912A1DB1E72CCFA377E63F6881D29ED2993A6D84E3DDD7206AFC1F7D77496EF572E338B
25,067,488 UART: [art] PUB.Y = 987CAE6FC0265B27A6F9C54604A15425DC0C5F72FE2D24D6EE8512D863C5578564CDA45A1BA96BEA8F9EBF73D769B522
25,074,759 UART: [art] SIG.R = 61734ECE2D561A5F2882E43825CC9E68F8463EBC281FC7CCE18EDAB8DB67EFCCC8FBB4422EA3783099C8FC232F676930
25,082,137 UART: [art] SIG.S = C0DD7D366BE2CAC66ED543EF6BB1B312ED3F217550F5CF7C76A0D6DA6181D65134F9B9F90FF58E33C8A1F1EA0483F75B
26,060,883 UART: Caliptra RT
26,061,585 UART: [state] CFI Enabled
26,226,938 UART: [rt] RT listening for mailbox commands...
26,229,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,384,477 UART: [rt]cmd =0x41544d4e, len=14344
30,314,957 >>> mbox cmd response data (8 bytes)
30,315,535 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,346,364 UART: [rt]cmd =0x41545348, len=116
30,348,547 >>> mbox cmd response data (12 bytes)
32,405,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,550,899 UART:
32,551,285 UART: Running Caliptra ROM ...
32,552,428 UART:
32,552,626 UART: [state] CFI Enabled
32,628,242 UART: [state] LifecycleState = Unprovisioned
32,630,288 UART: [state] DebugLocked = No
32,632,755 UART: [state] WD Timer not started. Device not locked for debugging
32,637,829 UART: [kat] SHA2-256
32,827,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,838,448 UART: [kat] ++
32,838,947 UART: [kat] sha1
32,850,266 UART: [kat] SHA2-256
32,853,298 UART: [kat] SHA2-384
32,859,134 UART: [kat] SHA2-512-ACC
32,861,709 UART: [kat] ECC-384
35,310,632 UART: [kat] HMAC-384Kdf
35,334,703 UART: [kat] LMS
35,866,242 UART: [kat] --
35,870,192 UART: [update-reset] ++
39,328,445 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,332,475 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,940,188 >>> mbox cmd response: success
39,944,898 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,945,493 UART: [update-reset] Copying MAN_2 To MAN_1
39,979,393 UART: [update-reset Success] --
39,982,659 UART: [state] Locking Datavault
39,987,109 UART: [state] Locking PCR0, PCR1 and PCR31
39,989,308 UART: [state] Locking ICCM
39,990,758 UART: [exit] Launching FMC @ 0x40000130
39,999,381 UART:
39,999,624 UART: Running Caliptra FMC ...
40,000,749 UART:
40,000,920 UART: [state] CFI Enabled
40,102,238 UART: [art] Extend RT PCRs Done
40,103,442 UART: [art] Lock RT PCRs Done
40,105,013 UART: [art] Populate DV Done
40,110,375 UART: [fht] FMC Alias Private Key: 7
40,111,963 UART: [art] Derive CDI
40,112,777 UART: [art] Store in in slot 0x4
40,171,721 UART: [art] Derive Key Pair
40,172,831 UART: [art] Store priv key in slot 0x5
42,635,841 UART: [art] Derive Key Pair - Done
42,648,528 UART: [art] Signing Cert with AUTHO
42,649,838 UART: RITY.KEYID = 7
44,361,951 UART: [art] Erasing AUTHORITY.KEYID = 7
44,363,463 UART: [art] PUB.X = 5B586182065D1B14BBF51346B14EECA3E1B923070C0CDA245946CB603D1EA5C54F5A17F0001BCDF92FD7D5DCB3F26739
44,370,764 UART: [art] PUB.Y = D825C2369BA85E5DBB921449B44660F2FD92BF634EFAE9D828B233A18FCF20066F2CDFE9AA2CA03CC1C3E24C9EF695B2
44,378,055 UART: [art] SIG.R = E4DBA027E2B91E4A6E8F0FB8CF9492F02D943C2FEF3B8463A591CDFAB4AA644416648F819084258FD25EC36032644A1F
44,385,446 UART: [art] SIG.S = 4715D9984E0B20F3DADBE2C4B8375C9E728307DFC3AE3A076B3FB3BE33639A7120595C8A44A793A7DD7F11A2B58D9132
45,364,262 UART: Caliptra RT
45,364,962 UART: [state] CFI Enabled
45,700,866 UART: [rt] RT listening for mailbox commands...
45,732,844 UART: [rt]cmd =0x41545348, len=116
45,735,149 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,438,498 ready_for_fw is high
3,438,907 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,742,734 >>> mbox cmd response: success
19,032,751 UART:
19,033,140 UART: Running Caliptra FMC ...
19,034,250 UART:
19,034,404 UART: [state] CFI Enabled
19,098,167 UART: [fht] FMC Alias Private Key: 7
20,861,968 UART: [art] Extend RT PCRs Done
20,863,179 UART: [art] Lock RT PCRs Done
20,865,098 UART: [art] Populate DV Done
20,870,669 UART: [fht] FMC Alias Private Key: 7
20,872,232 UART: [art] Derive CDI
20,873,050 UART: [art] Store in in slot 0x4
20,930,696 UART: [art] Derive Key Pair
20,931,735 UART: [art] Store priv key in slot 0x5
23,394,687 UART: [art] Derive Key Pair - Done
23,407,523 UART: [art] Signing Cert with AUTHO
23,408,867 UART: RITY.KEYID = 7
25,120,876 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,357 UART: [art] PUB.X = 31E018183ABFE53BB75EFF561008F088B76D5E9ECA884056A191700BD713FC0FF0EC586BDA4002292A702F2A22748F4C
25,129,622 UART: [art] PUB.Y = 4545160DFAFACE5F03E3FFC9DC7D363029EE18D4D6C7BFC7BF0E830C556477EE532448B6CB5937340F2CE4AA4F4FB86B
25,136,904 UART: [art] SIG.R = 2F79281FA9044623F48E07890E62AF0E2D53F085C634F8FFC2626565FEF976F1E9EEB00AE3AE61D390E3F8972A3723A2
25,144,263 UART: [art] SIG.S = 6E653A77E25E5D7C2D5853EE62EAEAD9F080D5E7C3A7511BD960437EBD36644B33394A8ACABD5BC3B1DC26433CF8A5B1
26,123,133 UART: Caliptra RT
26,123,849 UART: [state] CFI Enabled
26,289,692 UART: [rt] RT listening for mailbox commands...
26,292,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,447,623 UART: [rt]cmd =0x41544d4e, len=14344
30,378,348 >>> mbox cmd response data (8 bytes)
30,378,910 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,409,476 UART: [rt]cmd =0x41545348, len=116
30,412,002 >>> mbox cmd response data (12 bytes)
32,464,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,278,340 >>> mbox cmd response: success
40,279,019 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,313,663 UART:
40,313,998 UART: Running Caliptra FMC ...
40,315,038 UART:
40,315,211 UART: [state] CFI Enabled
40,401,241 UART: [art] Extend RT PCRs Done
40,402,434 UART: [art] Lock RT PCRs Done
40,404,030 UART: [art] Populate DV Done
40,409,442 UART: [fht] FMC Alias Private Key: 7
40,410,929 UART: [art] Derive CDI
40,411,663 UART: [art] Store in in slot 0x4
40,470,238 UART: [art] Derive Key Pair
40,471,275 UART: [art] Store priv key in slot 0x5
42,933,762 UART: [art] Derive Key Pair - Done
42,946,617 UART: [art] Signing Cert with AUTHO
42,947,932 UART: RITY.KEYID = 7
44,659,597 UART: [art] Erasing AUTHORITY.KEYID = 7
44,661,107 UART: [art] PUB.X = 42CFAA3AC9E8EC191A92D3CE4DE5F95BE01D0AF03EA48010D6C373A2DD67981D4CDBEB384153B3E7B2214B21824D10C2
44,668,407 UART: [art] PUB.Y = 0F27D3282B5C18199DF3F5503006FBC4DA3FC74B696DF56B6F2209D509B5DB560C84D3DD525A5B35108FC65106F962D3
44,675,626 UART: [art] SIG.R = 9BDC38AA353F30F6CBCD42385D3BFF667B78286B059C04209F614B614911388F799501A1F1AEB3C834B7C9720B36DCA7
44,683,022 UART: [art] SIG.S = 34FA2A3E3EFD9AAEB9D50A2CE3A2A5D47E56D42FE21BE0BE8B75681A6F150DA6EE4C96C2AD1FA566C8EAA7B28BFAF560
45,661,598 UART: Caliptra RT
45,662,298 UART: [state] CFI Enabled
45,996,434 UART: [rt] RT listening for mailbox commands...
46,028,411 UART: [rt]cmd =0x41545348, len=116
46,030,768 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
192,690 UART:
193,056 UART: Running Caliptra ROM ...
194,209 UART:
603,831 UART: [state] CFI Enabled
616,935 UART: [state] LifecycleState = Unprovisioned
619,300 UART: [state] DebugLocked = No
621,602 UART: [state] WD Timer not started. Device not locked for debugging
625,770 UART: [kat] SHA2-256
815,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,438 UART: [kat] ++
827,042 UART: [kat] sha1
839,627 UART: [kat] SHA2-256
842,631 UART: [kat] SHA2-384
848,689 UART: [kat] SHA2-512-ACC
851,273 UART: [kat] ECC-384
3,292,222 UART: [kat] HMAC-384Kdf
3,306,143 UART: [kat] LMS
3,837,943 UART: [kat] --
3,841,911 UART: [cold-reset] ++
3,843,775 UART: [fht] FHT @ 0x50003400
3,854,436 UART: [idev] ++
3,855,114 UART: [idev] CDI.KEYID = 6
3,856,152 UART: [idev] SUBJECT.KEYID = 7
3,857,258 UART: [idev] UDS.KEYID = 0
3,858,192 ready_for_fw is high
3,858,429 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,026 UART: [idev] Erasing UDS.KEYID = 0
6,337,444 UART: [idev] Sha1 KeyId Algorithm
6,360,348 UART: [idev] --
6,366,333 UART: [ldev] ++
6,367,016 UART: [ldev] CDI.KEYID = 6
6,367,933 UART: [ldev] SUBJECT.KEYID = 5
6,369,088 UART: [ldev] AUTHORITY.KEYID = 7
6,370,317 UART: [ldev] FE.KEYID = 1
6,382,305 UART: [ldev] Erasing FE.KEYID = 1
8,864,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,015 UART: [ldev] --
10,657,694 UART: [fwproc] Wait for Commands...
10,659,903 UART: [fwproc] Recv command 0x46574c44
10,662,154 UART: [fwproc] Recv'd Img size: 114360 bytes
14,112,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,845,268 >>> mbox cmd response: success
14,849,892 UART: [afmc] ++
14,850,602 UART: [afmc] CDI.KEYID = 6
14,851,844 UART: [afmc] SUBJECT.KEYID = 7
14,853,277 UART: [afmc] AUTHORITY.KEYID = 5
17,357,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,738 UART: [afmc] --
19,154,341 UART: [cold-reset] --
19,157,174 UART: [state] Locking Datavault
19,162,958 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,137 UART: [state] Locking ICCM
19,167,909 UART: [exit] Launching FMC @ 0x40000130
19,176,567 UART:
19,176,806 UART: Running Caliptra FMC ...
19,177,826 UART:
19,177,972 UART: [state] CFI Enabled
19,186,450 UART: [fht] FMC Alias Private Key: 7
20,943,396 UART: [art] Extend RT PCRs Done
20,944,600 UART: [art] Lock RT PCRs Done
20,946,407 UART: [art] Populate DV Done
20,951,919 UART: [fht] FMC Alias Private Key: 7
20,953,577 UART: [art] Derive CDI
20,954,311 UART: [art] Store in in slot 0x4
20,996,853 UART: [art] Derive Key Pair
20,997,921 UART: [art] Store priv key in slot 0x5
23,424,775 UART: [art] Derive Key Pair - Done
23,437,983 UART: [art] Signing Cert with AUTHO
23,439,285 UART: RITY.KEYID = 7
25,145,377 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,871 UART: [art] PUB.X = 26801212C84D801552FBCFC1871CB9592F54EBEBDD667BF694226FADA8044674E64A64AE22423F4F40DFCC789A4552CC
25,154,123 UART: [art] PUB.Y = 427480C8C4B1865B2A26E27CD3A8B2598428DC1A1CB9A8CE85453AC95561C2FF859C2EB66178B0C8C2C47F54BFBE6F18
25,161,410 UART: [art] SIG.R = 2AE35729D07A006907ACBF218598584CF01862D57612C7083D9331A69B7DE5FD55384FBE62433FC2EA26481EF2EF1CA3
25,168,797 UART: [art] SIG.S = 1F79A19396F8C0AC834B8E93747EF95C83DC6557C1565E16C37825A129995AF02A349D9D46CD8766708BBCE5B35D2CAF
26,147,632 UART: Caliptra RT
26,148,336 UART: [state] CFI Enabled
26,266,216 UART: [rt] RT listening for mailbox commands...
26,268,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,423,921 UART: [rt]cmd =0x41544d4e, len=14344
30,353,944 >>> mbox cmd response data (8 bytes)
30,354,523 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,385,143 UART: [rt]cmd =0x41545348, len=116
30,387,449 >>> mbox cmd response data (12 bytes)
32,443,665 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
32,589,036 UART:
32,589,407 UART: Running Caliptra ROM ...
32,590,538 UART:
32,590,715 UART: [state] CFI Enabled
32,603,952 UART: [state] LifecycleState = Unprovisioned
32,605,866 UART: [state] DebugLocked = No
32,608,003 UART: [state] WD Timer not started. Device not locked for debugging
32,613,293 UART: [kat] SHA2-256
32,803,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,813,902 UART: [kat] ++
32,814,429 UART: [kat] sha1
32,825,851 UART: [kat] SHA2-256
32,828,813 UART: [kat] SHA2-384
32,834,864 UART: [kat] SHA2-512-ACC
32,837,440 UART: [kat] ECC-384
35,279,574 UART: [kat] HMAC-384Kdf
35,292,082 UART: [kat] LMS
35,823,715 UART: [kat] --
35,828,758 UART: [update-reset] ++
39,287,712 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,290,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
39,898,145 >>> mbox cmd response: success
39,902,878 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,903,470 UART: [update-reset] Copying MAN_2 To MAN_1
39,936,570 UART: [update-reset Success] --
39,940,531 UART: [state] Locking Datavault
39,943,470 UART: [state] Locking PCR0, PCR1 and PCR31
39,945,657 UART: [state] Locking ICCM
39,946,943 UART: [exit] Launching FMC @ 0x40000130
39,955,607 UART:
39,955,837 UART: Running Caliptra FMC ...
39,956,938 UART:
39,957,094 UART: [state] CFI Enabled
40,001,018 UART: [art] Extend RT PCRs Done
40,002,174 UART: [art] Lock RT PCRs Done
40,003,402 UART: [art] Populate DV Done
40,008,976 UART: [fht] FMC Alias Private Key: 7
40,010,617 UART: [art] Derive CDI
40,011,432 UART: [art] Store in in slot 0x4
40,053,951 UART: [art] Derive Key Pair
40,055,038 UART: [art] Store priv key in slot 0x5
42,481,139 UART: [art] Derive Key Pair - Done
42,494,147 UART: [art] Signing Cert with AUTHO
42,495,483 UART: RITY.KEYID = 7
44,201,464 UART: [art] Erasing AUTHORITY.KEYID = 7
44,202,975 UART: [art] PUB.X = E3D921A06852731D9534740F093E0CA50ECF0CD8827EC49FE990E17CCED380BD840E963834E481ED61B862B7C4F170CA
44,210,230 UART: [art] PUB.Y = 1762329D5ED5FE1D61504E4592CBD2A55FA92DAF94CE42A4C4AC02D5A7F3A1CCEA5409562EFD793CAB64A996DC2EA0E9
44,217,525 UART: [art] SIG.R = 56E05C3CB17A98A0690AE0ADDAA0AE3BC5FC6AC3BBF8E327310E8A260D1A2CFF96FA3D888B729065861FA221D26D7537
44,224,913 UART: [art] SIG.S = 8FE6021F7BBC686C56766F45A7BE6A9C68771307A6AC88387C1E7A65AE9BDF136EF0ED25A3A978BEF753582E27FB2F99
45,203,984 UART: Caliptra RT
45,204,682 UART: [state] CFI Enabled
45,494,573 UART: [rt] RT listening for mailbox commands...
45,526,364 UART: [rt]cmd =0x41545348, len=116
45,528,819 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,752,979 ready_for_fw is high
3,753,525 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,953,908 >>> mbox cmd response: success
19,206,562 UART:
19,206,942 UART: Running Caliptra FMC ...
19,208,133 UART:
19,208,301 UART: [state] CFI Enabled
19,216,179 UART: [fht] FMC Alias Private Key: 7
20,972,821 UART: [art] Extend RT PCRs Done
20,974,053 UART: [art] Lock RT PCRs Done
20,975,658 UART: [art] Populate DV Done
20,980,904 UART: [fht] FMC Alias Private Key: 7
20,982,608 UART: [art] Derive CDI
20,983,418 UART: [art] Store in in slot 0x4
21,025,965 UART: [art] Derive Key Pair
21,027,028 UART: [art] Store priv key in slot 0x5
23,453,929 UART: [art] Derive Key Pair - Done
23,466,978 UART: [art] Signing Cert with AUTHO
23,468,314 UART: RITY.KEYID = 7
25,173,645 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,149 UART: [art] PUB.X = DC28F3CE44998C6765BE1386A41E5F45343A816241178597D67B5030F69788C88E8872BB8F5A7F72C1706C8EFA34360E
25,182,371 UART: [art] PUB.Y = CFC74069333F34CF50E3C99479AEDD7B11F9D360EF8AF611D8CDC034E33ED8B3879BCE9F548B6EBDB3F9294D7A2F9057
25,189,644 UART: [art] SIG.R = E91D37D05FF0906B21894AC3AF17CF3776B9BA8543C6F48B50B7DE08FD80E9C7A9E3C650907A3B5B7F531287953D8664
25,197,043 UART: [art] SIG.S = DAC171BC13E0EC57301F983D4DF23FC35AAD1F20B55E162DE9C6D1251D532F9A506B6A8C56AD9888435D66F619FC39DB
26,175,617 UART: Caliptra RT
26,176,330 UART: [state] CFI Enabled
26,294,051 UART: [rt] RT listening for mailbox commands...
26,296,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,451,653 UART: [rt]cmd =0x41544d4e, len=14344
30,382,248 >>> mbox cmd response data (8 bytes)
30,382,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,413,180 UART: [rt]cmd =0x41545348, len=116
30,415,655 >>> mbox cmd response data (12 bytes)
32,467,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
40,195,968 >>> mbox cmd response: success
40,196,631 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,228,898 UART:
40,229,194 UART: Running Caliptra FMC ...
40,230,225 UART:
40,230,370 UART: [state] CFI Enabled
40,273,958 UART: [art] Extend RT PCRs Done
40,275,155 UART: [art] Lock RT PCRs Done
40,276,517 UART: [art] Populate DV Done
40,282,151 UART: [fht] FMC Alias Private Key: 7
40,283,635 UART: [art] Derive CDI
40,284,367 UART: [art] Store in in slot 0x4
40,327,386 UART: [art] Derive Key Pair
40,328,380 UART: [art] Store priv key in slot 0x5
42,755,870 UART: [art] Derive Key Pair - Done
42,768,824 UART: [art] Signing Cert with AUTHO
42,770,125 UART: RITY.KEYID = 7
44,475,310 UART: [art] Erasing AUTHORITY.KEYID = 7
44,476,822 UART: [art] PUB.X = E8C0DCF552187406E0C76D29780AAA0B7882AAB584198AC366EE4A69474D439A0BD218B909271AFEBD962303807AC249
44,484,058 UART: [art] PUB.Y = CA4AFDE68E5EB3E350CA2BE2AC47406A9E6340D2F68C91BFA600215042BBBB2B80B6EB8557258DE84EB21430DE2CC589
44,491,334 UART: [art] SIG.R = 47FEA795876D94F315D0638A70072A876BAC3E872EB74D9F09D1C7ECAD4A2688BE59D86ACD91272C0AB8647397D98667
44,498,727 UART: [art] SIG.S = 16D061E56B989739FD1AECC23C1A60E208C71B40114070CEEEEEA3183BAA978898752C256711602A44A288736E5ED1D2
45,477,821 UART: Caliptra RT
45,478,520 UART: [state] CFI Enabled
45,769,763 UART: [rt] RT listening for mailbox commands...
45,801,780 UART: [rt]cmd =0x41545348, len=116
45,804,058 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,170 UART: [kat] SHA2-512-ACC
897,071 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,066 UART: [kat] LMS
1,475,262 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 ready_for_fw is high
1,480,857 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,072 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,674 UART: [idev] --
1,514,793 UART: [ldev] ++
1,514,961 UART: [ldev] CDI.KEYID = 6
1,515,324 UART: [ldev] SUBJECT.KEYID = 5
1,515,750 UART: [ldev] AUTHORITY.KEYID = 7
1,516,213 UART: [ldev] FE.KEYID = 1
1,521,315 UART: [ldev] Erasing FE.KEYID = 1
1,546,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,312 UART: [ldev] --
1,585,805 UART: [fwproc] Waiting for Commands...
1,586,618 UART: [fwproc] Received command 0x46574c44
1,587,409 UART: [fwproc] Received Image of size 114360 bytes
2,886,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,537 >>> mbox cmd response: success
3,079,753 UART: [afmc] ++
3,079,921 UART: [afmc] CDI.KEYID = 6
3,080,283 UART: [afmc] SUBJECT.KEYID = 7
3,080,708 UART: [afmc] AUTHORITY.KEYID = 5
3,116,383 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,236 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,926 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,807 UART: [afmc] --
3,159,823 UART: [cold-reset] --
3,160,439 UART: [state] Locking Datavault
3,161,804 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,408 UART: [state] Locking ICCM
3,163,042 UART: [exit] Launching FMC @ 0x40000130
3,168,371 UART:
3,168,387 UART: Running Caliptra FMC ...
3,168,795 UART:
3,168,849 UART: [state] CFI Enabled
3,179,264 UART: [fht] FMC Alias Private Key: 7
3,286,651 UART: [art] Extend RT PCRs Done
3,287,079 UART: [art] Lock RT PCRs Done
3,288,523 UART: [art] Populate DV Done
3,296,718 UART: [fht] FMC Alias Private Key: 7
3,297,894 UART: [art] Derive CDI
3,298,174 UART: [art] Store in in slot 0x4
3,383,883 UART: [art] Derive Key Pair
3,384,243 UART: [art] Store priv key in slot 0x5
3,397,433 UART: [art] Derive Key Pair - Done
3,411,852 UART: [art] Signing Cert with AUTHO
3,412,332 UART: RITY.KEYID = 7
3,427,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,405 UART: [art] PUB.X = DF7192F237AE8B81E6DCE140C6EE2FA3FBCB5490C6961C42B15413B2C2A1BE0AD497852712D5BDFE0C36A8A8EC0C3E08
3,435,183 UART: [art] PUB.Y = 6FABCB13C77FD1C9F2DB8FDC5013E7BB318AA508FECAA5D961229A4072F8C3409D793283896AA0E8C04C408E535D8053
3,442,142 UART: [art] SIG.R = F932894D1F0E2A27B38EFA3F25592CFF727A2653D120560DC366CE22BEE6A0E8DE06961882AE4742B3F4379984E21CF8
3,448,907 UART: [art] SIG.S = 1782B8562A0B7A995C0D8492832D29ED551C8761B0257103BA36C7152C4D1C96C91AA3157437F4DCB5DAD1B0891BDC82
3,472,293 UART: Caliptra RT
3,472,547 UART: [state] CFI Enabled
3,581,023 UART: [rt] RT listening for mailbox commands...
3,581,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,342 UART: [rt]cmd =0x41544d4e, len=14344
3,849,077 >>> mbox cmd response data (8 bytes)
3,849,078 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,103 UART: [rt]cmd =0x41545348, len=116
3,880,716 >>> mbox cmd response data (12 bytes)
3,880,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,398 UART:
3,881,414 UART: Running Caliptra ROM ...
3,881,822 UART:
3,881,876 UART: [state] CFI Enabled
3,884,990 UART: [state] LifecycleState = Unprovisioned
3,885,645 UART: [state] DebugLocked = No
3,886,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,887,972 UART: [kat] SHA2-256
4,681,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,686,018 UART: [kat] ++
4,686,170 UART: [kat] sha1
4,690,444 UART: [kat] SHA2-256
4,692,382 UART: [kat] SHA2-384
4,695,143 UART: [kat] SHA2-512-ACC
4,697,043 UART: [kat] ECC-384
4,702,654 UART: [kat] HMAC-384Kdf
4,707,158 UART: [kat] LMS
5,275,354 UART: [kat] --
5,276,117 UART: [update-reset] ++
6,610,480 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,611,772 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,761,690 >>> mbox cmd response: success
6,761,690 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,761,833 UART: [update-reset] Copying MAN_2 To MAN_1
6,769,847 UART: [update-reset Success] --
6,770,858 UART: [state] Locking Datavault
6,771,696 UART: [state] Locking PCR0, PCR1 and PCR31
6,772,300 UART: [state] Locking ICCM
6,772,940 UART: [exit] Launching FMC @ 0x40000130
6,778,269 UART:
6,778,285 UART: Running Caliptra FMC ...
6,778,693 UART:
6,778,747 UART: [state] CFI Enabled
6,867,910 UART: [art] Extend RT PCRs Done
6,868,338 UART: [art] Lock RT PCRs Done
6,869,547 UART: [art] Populate DV Done
6,877,552 UART: [fht] FMC Alias Private Key: 7
6,878,568 UART: [art] Derive CDI
6,878,848 UART: [art] Store in in slot 0x4
6,964,471 UART: [art] Derive Key Pair
6,964,831 UART: [art] Store priv key in slot 0x5
6,977,719 UART: [art] Derive Key Pair - Done
6,992,713 UART: [art] Signing Cert with AUTHO
6,993,193 UART: RITY.KEYID = 7
7,008,135 UART: [art] Erasing AUTHORITY.KEYID = 7
7,008,900 UART: [art] PUB.X = 85B2F9BD01B681672C788A6C8559D235B8046095644A2CEB5A8F692D3CDDB03B9F473E9017711619059F72E0B90C3D95
7,015,654 UART: [art] PUB.Y = C947CE3221415855451480CBE2F230ED7BEE9D42491FCC540424F08BC6ADE5D8A3D5BDBF42CCA554662AAD5CFAFF9890
7,022,619 UART: [art] SIG.R = 2F9EBB020D2F02B18D88D4AECC7CBBBD16F4B18A9F68A7759DD592AA1DDDDCC5A6DDC208065250BDC8F1423731435872
7,029,394 UART: [art] SIG.S = 0B8E745EEB67BACD2D8223AE1DA32BD4041A461709639770E12C4CA084445202ACD7A0B646C0D17BB583F1CE9DF125E7
7,052,609 UART: Caliptra RT
7,052,863 UART: [state] CFI Enabled
7,336,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,367,304 UART: [rt]cmd =0x41545348, len=116
7,369,041 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,753 ready_for_fw is high
1,361,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,987 >>> mbox cmd response: success
2,988,321 UART:
2,988,337 UART: Running Caliptra FMC ...
2,988,745 UART:
2,988,799 UART: [state] CFI Enabled
2,999,682 UART: [fht] FMC Alias Private Key: 7
3,107,117 UART: [art] Extend RT PCRs Done
3,107,545 UART: [art] Lock RT PCRs Done
3,109,035 UART: [art] Populate DV Done
3,117,428 UART: [fht] FMC Alias Private Key: 7
3,118,568 UART: [art] Derive CDI
3,118,848 UART: [art] Store in in slot 0x4
3,204,299 UART: [art] Derive Key Pair
3,204,659 UART: [art] Store priv key in slot 0x5
3,217,613 UART: [art] Derive Key Pair - Done
3,232,381 UART: [art] Signing Cert with AUTHO
3,232,861 UART: RITY.KEYID = 7
3,247,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,732 UART: [art] PUB.X = F4EFA4EF72EAAA6711F8F6B899D2ED044142A974B3254F17545FF3535FFE0D85BC485F529C5595338A38FAF699CE9EF5
3,255,508 UART: [art] PUB.Y = 2C995BDF8261CAFA0AB65E4F796F9B6F4E3F7CED38ED4808BCA8A0FCB9343ECE64994E6976E86CE6DBC84B13E118B3AE
3,262,478 UART: [art] SIG.R = 941E7A7DC2422F4320B5E6B8D34A26AEECA2A090E433FC2EEB1DE4DCC454CCA8771F7BFA7FBCA717BA2AB9654CDB51F3
3,269,278 UART: [art] SIG.S = E987525013359A3E94CBFAEA3313FA2F700ED2868A4A378F3543BC2A39C14448759C1972DA0BB3F5695932E11D30D174
3,293,205 UART: Caliptra RT
3,293,459 UART: [state] CFI Enabled
3,402,568 UART: [rt] RT listening for mailbox commands...
3,403,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,989 UART: [rt]cmd =0x41544d4e, len=14344
3,670,818 >>> mbox cmd response data (8 bytes)
3,670,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,030 UART: [rt]cmd =0x41545348, len=116
3,702,795 >>> mbox cmd response data (12 bytes)
3,702,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,463,761 >>> mbox cmd response: success
6,463,761 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,477,024 UART:
6,477,040 UART: Running Caliptra FMC ...
6,477,448 UART:
6,477,502 UART: [state] CFI Enabled
6,566,523 UART: [art] Extend RT PCRs Done
6,566,951 UART: [art] Lock RT PCRs Done
6,568,360 UART: [art] Populate DV Done
6,576,303 UART: [fht] FMC Alias Private Key: 7
6,577,389 UART: [art] Derive CDI
6,577,669 UART: [art] Store in in slot 0x4
6,663,026 UART: [art] Derive Key Pair
6,663,386 UART: [art] Store priv key in slot 0x5
6,676,922 UART: [art] Derive Key Pair - Done
6,691,796 UART: [art] Signing Cert with AUTHO
6,692,276 UART: RITY.KEYID = 7
6,707,416 UART: [art] Erasing AUTHORITY.KEYID = 7
6,708,181 UART: [art] PUB.X = 15F309489FE06ECBB0E76538AB1C4C15D1128290BCFAD38E2C14F279A09658ED4B64B6576F10C0236AB5AD1A1D2B727E
6,714,958 UART: [art] PUB.Y = 4344EA7BEBC16DB23992CDF517186DAB5A903FA21D7B6519CBE2996E96DF28DF812098D4EBBA3867596CEABD0BA03C21
6,721,923 UART: [art] SIG.R = 77058419AE198873F030AA5000FCCD8519816EBFFC0B7D31B252DC6C32152E73170E719833173D95A7F41A71E77E971E
6,728,658 UART: [art] SIG.S = 4E8AAABD4B3DA2E0819FBAC3FFD9A49BE35F4B3E102148E2F2A1B7CCA4FDE73A7376B4712507DC7EC2776A3EC1F4A24B
6,752,642 UART: Caliptra RT
6,752,896 UART: [state] CFI Enabled
7,031,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,062,791 UART: [rt]cmd =0x41545348, len=116
7,064,760 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,888 UART: [kat] SHA2-256
892,826 UART: [kat] SHA2-384
895,525 UART: [kat] SHA2-512-ACC
897,426 UART: [kat] ECC-384
903,345 UART: [kat] HMAC-384Kdf
908,067 UART: [kat] LMS
1,476,263 UART: [kat] --
1,477,098 UART: [cold-reset] ++
1,477,588 UART: [fht] Storing FHT @ 0x50003400
1,480,555 UART: [idev] ++
1,480,723 UART: [idev] CDI.KEYID = 6
1,481,083 UART: [idev] SUBJECT.KEYID = 7
1,481,507 UART: [idev] UDS.KEYID = 0
1,481,852 ready_for_fw is high
1,481,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,717 UART: [idev] Erasing UDS.KEYID = 0
1,506,035 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,625 UART: [idev] --
1,515,710 UART: [ldev] ++
1,515,878 UART: [ldev] CDI.KEYID = 6
1,516,241 UART: [ldev] SUBJECT.KEYID = 5
1,516,667 UART: [ldev] AUTHORITY.KEYID = 7
1,517,130 UART: [ldev] FE.KEYID = 1
1,522,170 UART: [ldev] Erasing FE.KEYID = 1
1,547,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,945 UART: [ldev] --
1,587,322 UART: [fwproc] Waiting for Commands...
1,588,177 UART: [fwproc] Received command 0x46574c44
1,588,968 UART: [fwproc] Received Image of size 114360 bytes
2,887,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,618 >>> mbox cmd response: success
3,080,852 UART: [afmc] ++
3,081,020 UART: [afmc] CDI.KEYID = 6
3,081,382 UART: [afmc] SUBJECT.KEYID = 7
3,081,807 UART: [afmc] AUTHORITY.KEYID = 5
3,116,824 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,142 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,922 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,535 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,225 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,304 UART: [afmc] --
3,160,364 UART: [cold-reset] --
3,160,960 UART: [state] Locking Datavault
3,162,179 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,783 UART: [state] Locking ICCM
3,163,407 UART: [exit] Launching FMC @ 0x40000130
3,168,736 UART:
3,168,752 UART: Running Caliptra FMC ...
3,169,160 UART:
3,169,303 UART: [state] CFI Enabled
3,179,746 UART: [fht] FMC Alias Private Key: 7
3,287,975 UART: [art] Extend RT PCRs Done
3,288,403 UART: [art] Lock RT PCRs Done
3,290,025 UART: [art] Populate DV Done
3,298,294 UART: [fht] FMC Alias Private Key: 7
3,299,282 UART: [art] Derive CDI
3,299,562 UART: [art] Store in in slot 0x4
3,385,091 UART: [art] Derive Key Pair
3,385,451 UART: [art] Store priv key in slot 0x5
3,398,547 UART: [art] Derive Key Pair - Done
3,413,250 UART: [art] Signing Cert with AUTHO
3,413,730 UART: RITY.KEYID = 7
3,429,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,121 UART: [art] PUB.X = 6A494E7B1D09B11FECBAF3C1D44D88D17F482EE011077C2D59C2955C697EE1CE1DFEF93325F978C856B667BDC75394E2
3,436,897 UART: [art] PUB.Y = 759E6B6FBB7A613E485AE005F46F39C28FC30A75FD9FC160C627F8FC6181AE9CFF36C133C190AB64E468A3DA5304A2B8
3,443,852 UART: [art] SIG.R = 3CD4BB3EA53FB5B8A88D02E173A8DAF31F54A34DE12F33B980C4AFCB077392D69C7B80B520509E637697A6D7D6427D94
3,450,626 UART: [art] SIG.S = 8057D981282DD01DEFADB66FBB06ED58DCC3CC3758A296A46C4F4DDBF3AEECDB644269DA127AA7D40E49B7E481CF01C2
3,473,908 UART: Caliptra RT
3,474,254 UART: [state] CFI Enabled
3,582,374 UART: [rt] RT listening for mailbox commands...
3,583,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,673 UART: [rt]cmd =0x41544d4e, len=14344
3,850,372 >>> mbox cmd response data (8 bytes)
3,850,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,496 UART: [rt]cmd =0x41545348, len=116
3,882,335 >>> mbox cmd response data (12 bytes)
3,882,336 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,985 UART:
3,883,001 UART: Running Caliptra ROM ...
3,883,409 UART:
3,883,550 UART: [state] CFI Enabled
3,886,600 UART: [state] LifecycleState = Unprovisioned
3,887,255 UART: [state] DebugLocked = No
3,887,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,889,458 UART: [kat] SHA2-256
4,683,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,687,504 UART: [kat] ++
4,687,656 UART: [kat] sha1
4,691,870 UART: [kat] SHA2-256
4,693,808 UART: [kat] SHA2-384
4,696,555 UART: [kat] SHA2-512-ACC
4,698,455 UART: [kat] ECC-384
4,704,242 UART: [kat] HMAC-384Kdf
4,708,908 UART: [kat] LMS
5,277,104 UART: [kat] --
5,278,237 UART: [update-reset] ++
6,613,930 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,615,034 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,764,952 >>> mbox cmd response: success
6,764,952 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,765,087 UART: [update-reset] Copying MAN_2 To MAN_1
6,773,101 UART: [update-reset Success] --
6,773,820 UART: [state] Locking Datavault
6,774,608 UART: [state] Locking PCR0, PCR1 and PCR31
6,775,212 UART: [state] Locking ICCM
6,775,652 UART: [exit] Launching FMC @ 0x40000130
6,780,981 UART:
6,780,997 UART: Running Caliptra FMC ...
6,781,405 UART:
6,781,548 UART: [state] CFI Enabled
6,871,025 UART: [art] Extend RT PCRs Done
6,871,453 UART: [art] Lock RT PCRs Done
6,872,912 UART: [art] Populate DV Done
6,880,927 UART: [fht] FMC Alias Private Key: 7
6,881,873 UART: [art] Derive CDI
6,882,153 UART: [art] Store in in slot 0x4
6,967,934 UART: [art] Derive Key Pair
6,968,294 UART: [art] Store priv key in slot 0x5
6,981,896 UART: [art] Derive Key Pair - Done
6,996,893 UART: [art] Signing Cert with AUTHO
6,997,373 UART: RITY.KEYID = 7
7,012,451 UART: [art] Erasing AUTHORITY.KEYID = 7
7,013,216 UART: [art] PUB.X = 835F93B38E38795BEF8B36E40D09F16BA23FE9F38E6B0A7A55DAB9EFFE68833170E117C080BE7D5DCDBEFBAB8AC9AD49
7,020,003 UART: [art] PUB.Y = 15838D61C3CE58D27B075D8286F020D1E5D20DF861392E452AC0ED21DA0B8AA3CD25142ED3364322B2BD74C7B74AF8D0
7,026,952 UART: [art] SIG.R = CBD39DA9E668ACCCB9A28D8387D01E40F2588D8A8FCB8D67AE746BE3787FF908020243AD66D9D7E6E3D5F5805589A7BC
7,033,729 UART: [art] SIG.S = 3FCE62247CD340FA533F3A03A3133F53BD31E287F2CB05CDC11B3E4A5FE0606F36B81A2D4C29B71AC8037AA61DEE6977
7,057,791 UART: Caliptra RT
7,058,137 UART: [state] CFI Enabled
7,340,798 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,503 UART: [rt]cmd =0x41545348, len=116
7,373,304 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,472 ready_for_fw is high
1,363,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,702 >>> mbox cmd response: success
2,988,830 UART:
2,988,846 UART: Running Caliptra FMC ...
2,989,254 UART:
2,989,397 UART: [state] CFI Enabled
3,000,184 UART: [fht] FMC Alias Private Key: 7
3,108,803 UART: [art] Extend RT PCRs Done
3,109,231 UART: [art] Lock RT PCRs Done
3,110,985 UART: [art] Populate DV Done
3,119,234 UART: [fht] FMC Alias Private Key: 7
3,120,174 UART: [art] Derive CDI
3,120,454 UART: [art] Store in in slot 0x4
3,205,829 UART: [art] Derive Key Pair
3,206,189 UART: [art] Store priv key in slot 0x5
3,219,829 UART: [art] Derive Key Pair - Done
3,234,701 UART: [art] Signing Cert with AUTHO
3,235,181 UART: RITY.KEYID = 7
3,250,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,270 UART: [art] PUB.X = D8BF6662D1BD040E076DF38C69C02DB6AD045D0E7F6845DD8CF0672D20DDC84DB910F8568A430BEEE65B2708420272A8
3,258,026 UART: [art] PUB.Y = CE864CA4D87767502ABB205E64D74729992022E093FC0EFDDA32ACAD4887EC093E0B619667311EBD1BD28B93A9CE8843
3,264,975 UART: [art] SIG.R = 524D1E7CA9E248CFBAFA5D09401C79662044FE2D959F370759F1DC5679677F1138743EA98D73D8B075A7D491C095171F
3,271,737 UART: [art] SIG.S = 739C967CC14B52E0DD189C8D3C0D55DE65E218BFDF72CBCB8EAE1D50A6CC919D20C2C294D14DED3F42CEDF93804944E4
3,295,883 UART: Caliptra RT
3,296,229 UART: [state] CFI Enabled
3,404,740 UART: [rt] RT listening for mailbox commands...
3,405,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,345 UART: [rt]cmd =0x41544d4e, len=14344
3,673,406 >>> mbox cmd response data (8 bytes)
3,673,407 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,442 UART: [rt]cmd =0x41545348, len=116
3,705,165 >>> mbox cmd response data (12 bytes)
3,705,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,467,870 >>> mbox cmd response: success
6,467,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,481,155 UART:
6,481,171 UART: Running Caliptra FMC ...
6,481,579 UART:
6,481,722 UART: [state] CFI Enabled
6,570,887 UART: [art] Extend RT PCRs Done
6,571,315 UART: [art] Lock RT PCRs Done
6,572,878 UART: [art] Populate DV Done
6,581,193 UART: [fht] FMC Alias Private Key: 7
6,582,137 UART: [art] Derive CDI
6,582,417 UART: [art] Store in in slot 0x4
6,667,958 UART: [art] Derive Key Pair
6,668,318 UART: [art] Store priv key in slot 0x5
6,681,880 UART: [art] Derive Key Pair - Done
6,696,950 UART: [art] Signing Cert with AUTHO
6,697,430 UART: RITY.KEYID = 7
6,712,774 UART: [art] Erasing AUTHORITY.KEYID = 7
6,713,539 UART: [art] PUB.X = E71F2802C163152C4B40576FF7E2BA556ED3503F3B0B1BC369D54AF12D92C6132D23D87218549B4FC76389D060091A63
6,720,296 UART: [art] PUB.Y = A97267FADAF32BD82CF04043210D142BEED357860534F3FB0EB6C5A424C0B69DEEAFF4F901378B7A3240E3329A3111C9
6,727,244 UART: [art] SIG.R = B5A5CD2642EF1631D1ECEFAC420A1C3454DD5DACDCA71E3563A5C44CD347A8E5862593DC973DF60362C24FF681E2FE98
6,734,026 UART: [art] SIG.S = 9F48E64D3A7C0B4E74F8B9FCE7F0E6A3E81BB7ABA0C3BFA0E95E58293B2BAB681C7FE7331538FCE2E98738A28FAE1E1C
6,758,022 UART: Caliptra RT
6,758,368 UART: [state] CFI Enabled
7,040,364 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,071,319 UART: [rt]cmd =0x41545348, len=116
7,072,834 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,891 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,174,880 UART: [idev] ++
1,175,048 UART: [idev] CDI.KEYID = 6
1,175,408 UART: [idev] SUBJECT.KEYID = 7
1,175,832 UART: [idev] UDS.KEYID = 0
1,176,177 ready_for_fw is high
1,176,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,309 UART: [idev] Sha1 KeyId Algorithm
1,208,969 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,864 UART: [fwproc] Wait for Commands...
1,282,450 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,140 >>> mbox cmd response: success
2,774,192 UART: [afmc] ++
2,774,360 UART: [afmc] CDI.KEYID = 6
2,774,722 UART: [afmc] SUBJECT.KEYID = 7
2,775,147 UART: [afmc] AUTHORITY.KEYID = 5
2,811,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,892 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,611 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,295 UART: [afmc] --
2,854,197 UART: [cold-reset] --
2,855,245 UART: [state] Locking Datavault
2,856,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,974 UART: [state] Locking ICCM
2,857,594 UART: [exit] Launching FMC @ 0x40000130
2,862,923 UART:
2,862,939 UART: Running Caliptra FMC ...
2,863,347 UART:
2,863,401 UART: [state] CFI Enabled
2,873,780 UART: [fht] FMC Alias Private Key: 7
2,981,329 UART: [art] Extend RT PCRs Done
2,981,757 UART: [art] Lock RT PCRs Done
2,983,313 UART: [art] Populate DV Done
2,991,504 UART: [fht] FMC Alias Private Key: 7
2,992,486 UART: [art] Derive CDI
2,992,766 UART: [art] Store in in slot 0x4
3,078,723 UART: [art] Derive Key Pair
3,079,083 UART: [art] Store priv key in slot 0x5
3,092,159 UART: [art] Derive Key Pair - Done
3,106,823 UART: [art] Signing Cert with AUTHO
3,107,303 UART: RITY.KEYID = 7
3,122,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,392 UART: [art] PUB.X = 8DEA55CD4B352092A05E641E63F8B261D08970FE430B0F0873E2B7C135CFBA2542EDC3769021D1EA763ABD3AAB5A1227
3,130,163 UART: [art] PUB.Y = E0114F65DA2116069C9653346B23D6609F37762314953F4746BFCF133D42C6FA1CEAC40EE4274B960A7E04C657FA4E7D
3,137,101 UART: [art] SIG.R = CB432E0344B3211329B8CFE103C9E32124832AFA8E98B0BCCCBE38D28EB88C7B7B34F6A72A60BEDF6489AB36EA918F94
3,143,881 UART: [art] SIG.S = 358A215F3052330F591CA5D02B5CFF91CA48BDA7F47460B1634CEB22968A51FFDE989B1C23B6017C40D64B7E148A1225
3,167,926 UART: Caliptra RT
3,168,180 UART: [state] CFI Enabled
3,275,668 UART: [rt] RT listening for mailbox commands...
3,276,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,003 UART: [rt]cmd =0x41544d4e, len=14344
3,543,894 >>> mbox cmd response data (8 bytes)
3,543,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,770 UART: [rt]cmd =0x41545348, len=116
3,575,587 >>> mbox cmd response data (12 bytes)
3,575,588 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,236 UART:
3,576,252 UART: Running Caliptra ROM ...
3,576,660 UART:
3,576,715 UART: [state] CFI Enabled
3,579,979 UART: [state] LifecycleState = Unprovisioned
3,580,634 UART: [state] DebugLocked = No
3,581,240 UART: [state] WD Timer not started. Device not locked for debugging
3,582,526 UART: [kat] SHA2-256
4,388,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,392,301 UART: [kat] ++
4,392,453 UART: [kat] sha1
4,396,749 UART: [kat] SHA2-256
4,398,689 UART: [kat] SHA2-384
4,401,622 UART: [kat] SHA2-512-ACC
4,403,522 UART: [kat] ECC-384
4,412,975 UART: [kat] HMAC-384Kdf
4,417,531 UART: [kat] LMS
4,665,859 UART: [kat] --
4,666,723 UART: [update-reset] ++
5,978,958 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,979,967 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,129,833 >>> mbox cmd response: success
6,129,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,130,130 UART: [update-reset] Copying MAN_2 To MAN_1
6,138,144 UART: [update-reset Success] --
6,139,305 UART: [state] Locking Datavault
6,140,239 UART: [state] Locking PCR0, PCR1 and PCR31
6,140,843 UART: [state] Locking ICCM
6,141,399 UART: [exit] Launching FMC @ 0x40000130
6,146,728 UART:
6,146,744 UART: Running Caliptra FMC ...
6,147,152 UART:
6,147,206 UART: [state] CFI Enabled
6,236,311 UART: [art] Extend RT PCRs Done
6,236,739 UART: [art] Lock RT PCRs Done
6,238,128 UART: [art] Populate DV Done
6,246,467 UART: [fht] FMC Alias Private Key: 7
6,247,569 UART: [art] Derive CDI
6,247,849 UART: [art] Store in in slot 0x4
6,333,586 UART: [art] Derive Key Pair
6,333,946 UART: [art] Store priv key in slot 0x5
6,347,118 UART: [art] Derive Key Pair - Done
6,361,916 UART: [art] Signing Cert with AUTHO
6,362,396 UART: RITY.KEYID = 7
6,377,730 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,495 UART: [art] PUB.X = 5AABF0C10F16C1E6C2FAA33BAF4F6F3F287FD863A4CDA43F909010D8885FE1B9DD4B45C5489825BD1A27145DDA4A9C5E
6,385,284 UART: [art] PUB.Y = 3B1BF999E37968C93AAAAE46C9941B993419A60AFA6CA51D778179FE4EB68F729026D76FF756A7993158D867E053C517
6,392,231 UART: [art] SIG.R = F68243A037F1D06560124961AE14CB8BA8136260D92986195822A2B610AA844403E52E384A85F25C1D0A3211BEC84261
6,398,983 UART: [art] SIG.S = B528DEDD82485A0516B28F68E98B680A321AE2124C4B47F154405648E2E087915A0A67107542EB7C9ED6D0602C212032
6,422,635 UART: Caliptra RT
6,422,889 UART: [state] CFI Enabled
6,703,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,734,244 UART: [rt]cmd =0x41545348, len=116
6,736,015 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,843 ready_for_fw is high
1,059,843 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,572 >>> mbox cmd response: success
2,687,696 UART:
2,687,712 UART: Running Caliptra FMC ...
2,688,120 UART:
2,688,174 UART: [state] CFI Enabled
2,698,283 UART: [fht] FMC Alias Private Key: 7
2,806,230 UART: [art] Extend RT PCRs Done
2,806,658 UART: [art] Lock RT PCRs Done
2,808,238 UART: [art] Populate DV Done
2,816,639 UART: [fht] FMC Alias Private Key: 7
2,817,717 UART: [art] Derive CDI
2,817,997 UART: [art] Store in in slot 0x4
2,903,670 UART: [art] Derive Key Pair
2,904,030 UART: [art] Store priv key in slot 0x5
2,917,938 UART: [art] Derive Key Pair - Done
2,932,815 UART: [art] Signing Cert with AUTHO
2,933,295 UART: RITY.KEYID = 7
2,948,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,568 UART: [art] PUB.X = 0DE172BFF5D188479CF996634CB00A0605BE86675BB780A1EC5590A5A9A97890E16BAE172A48935C6C4A3215A4301EDF
2,956,330 UART: [art] PUB.Y = 3BAB80F02C1BF8A0D4524CBF6AE8FAACB8A427E4E8BCA4EBC0FA3C873909801473AAE30031A8C245C0DCF44DE293EA6C
2,963,283 UART: [art] SIG.R = 874502025FF0FFC59C0E7C3E697DE7E4C852DA5AB8A25A9FF913089B28EAB1B8DDF76A390251D62BFDAAD7212D33FE43
2,970,056 UART: [art] SIG.S = 945CBB0B58862CD310BF6E2575FD29CEE1FEC26EF682CCE5C27EFAC590C234C0EB1871C0015DFC2830749D234472DD42
2,994,075 UART: Caliptra RT
2,994,329 UART: [state] CFI Enabled
3,101,518 UART: [rt] RT listening for mailbox commands...
3,102,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,995 UART: [rt]cmd =0x41544d4e, len=14344
3,369,648 >>> mbox cmd response data (8 bytes)
3,369,649 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,614 UART: [rt]cmd =0x41545348, len=116
3,401,437 >>> mbox cmd response data (12 bytes)
3,401,438 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,582 >>> mbox cmd response: success
5,838,582 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,852,104 UART:
5,852,120 UART: Running Caliptra FMC ...
5,852,528 UART:
5,852,582 UART: [state] CFI Enabled
5,941,561 UART: [art] Extend RT PCRs Done
5,941,989 UART: [art] Lock RT PCRs Done
5,942,990 UART: [art] Populate DV Done
5,951,367 UART: [fht] FMC Alias Private Key: 7
5,952,315 UART: [art] Derive CDI
5,952,595 UART: [art] Store in in slot 0x4
6,038,476 UART: [art] Derive Key Pair
6,038,836 UART: [art] Store priv key in slot 0x5
6,052,232 UART: [art] Derive Key Pair - Done
6,067,124 UART: [art] Signing Cert with AUTHO
6,067,604 UART: RITY.KEYID = 7
6,082,982 UART: [art] Erasing AUTHORITY.KEYID = 7
6,083,747 UART: [art] PUB.X = 40DB94D8C10013A0BA42F2F593D55EC181FB133339E068ED8D7087C0BCB9722422316CE2DEFC74600AC1A9C2B6410EC2
6,090,497 UART: [art] PUB.Y = EB0D8761DBAA070928F90A76A50F75913902FDDCA88DED3FF9EF338891A080F5F443E4A94232AA762EE56F2FEAF3DECA
6,097,449 UART: [art] SIG.R = 29BA49E87E53893C1784EB23B4FD8ACAB484D59CF21BCD6260A022C0B72D2185149618AEA0A64D20147BD67CF6B154D8
6,104,227 UART: [art] SIG.S = BE545E146BA1F43759241832063227BFEC25E5FD5CC6F5925D000FF5B5818EBB2939E67186EE541452CDDE0C775DC147
6,127,571 UART: Caliptra RT
6,127,825 UART: [state] CFI Enabled
6,411,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,442,133 UART: [rt]cmd =0x41545348, len=116
6,443,914 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
894,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,186 UART: [kat] ++
898,338 UART: [kat] sha1
902,400 UART: [kat] SHA2-256
904,340 UART: [kat] SHA2-384
907,193 UART: [kat] SHA2-512-ACC
909,094 UART: [kat] ECC-384
918,817 UART: [kat] HMAC-384Kdf
923,233 UART: [kat] LMS
1,171,561 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,457 UART: [idev] ++
1,175,625 UART: [idev] CDI.KEYID = 6
1,175,985 UART: [idev] SUBJECT.KEYID = 7
1,176,409 UART: [idev] UDS.KEYID = 0
1,176,754 ready_for_fw is high
1,176,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,901 UART: [idev] Erasing UDS.KEYID = 0
1,200,946 UART: [idev] Sha1 KeyId Algorithm
1,209,224 UART: [idev] --
1,210,320 UART: [ldev] ++
1,210,488 UART: [ldev] CDI.KEYID = 6
1,210,851 UART: [ldev] SUBJECT.KEYID = 5
1,211,277 UART: [ldev] AUTHORITY.KEYID = 7
1,211,740 UART: [ldev] FE.KEYID = 1
1,216,930 UART: [ldev] Erasing FE.KEYID = 1
1,243,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,572 UART: [ldev] --
1,283,039 UART: [fwproc] Wait for Commands...
1,283,809 UART: [fwproc] Recv command 0x46574c44
1,284,537 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,407 >>> mbox cmd response: success
2,774,425 UART: [afmc] ++
2,774,593 UART: [afmc] CDI.KEYID = 6
2,774,955 UART: [afmc] SUBJECT.KEYID = 7
2,775,380 UART: [afmc] AUTHORITY.KEYID = 5
2,811,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,694 UART: [afmc] --
2,854,632 UART: [cold-reset] --
2,855,390 UART: [state] Locking Datavault
2,856,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,361 UART: [state] Locking ICCM
2,857,805 UART: [exit] Launching FMC @ 0x40000130
2,863,134 UART:
2,863,150 UART: Running Caliptra FMC ...
2,863,558 UART:
2,863,701 UART: [state] CFI Enabled
2,874,174 UART: [fht] FMC Alias Private Key: 7
2,982,255 UART: [art] Extend RT PCRs Done
2,982,683 UART: [art] Lock RT PCRs Done
2,983,957 UART: [art] Populate DV Done
2,991,986 UART: [fht] FMC Alias Private Key: 7
2,993,036 UART: [art] Derive CDI
2,993,316 UART: [art] Store in in slot 0x4
3,079,281 UART: [art] Derive Key Pair
3,079,641 UART: [art] Store priv key in slot 0x5
3,093,485 UART: [art] Derive Key Pair - Done
3,108,301 UART: [art] Signing Cert with AUTHO
3,108,781 UART: RITY.KEYID = 7
3,124,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,938 UART: [art] PUB.X = CFD76D298753ED787080F7E97A55C576EA675811C5C694E1E410EF4E632F1644467DB37E64DE45770ADAE7CDC806C43D
3,131,708 UART: [art] PUB.Y = AEE450D3F474E1B0B8D5E02423D2A3089D7AEC7E9CB99420B98413DBC11DC3A57CC441225160FB2ED06BAD27746E0975
3,138,662 UART: [art] SIG.R = A3C33F68BB96F23BB7EC6178FDD9962E0ACC324FFED2631D56C593DF1CB2175CB114A9DCDD520F38925E39DB4F3354DA
3,145,446 UART: [art] SIG.S = 922E35DA7329AAAA199DEC48EBF1DD6896812F275DBC590CA9CC33F0D62E1E165647CDAA16A9107143508434B4634FFC
3,169,420 UART: Caliptra RT
3,169,766 UART: [state] CFI Enabled
3,276,775 UART: [rt] RT listening for mailbox commands...
3,277,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,184 UART: [rt]cmd =0x41544d4e, len=14344
3,545,157 >>> mbox cmd response data (8 bytes)
3,545,158 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,177 UART: [rt]cmd =0x41545348, len=116
3,576,950 >>> mbox cmd response data (12 bytes)
3,576,951 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,679 UART:
3,577,695 UART: Running Caliptra ROM ...
3,578,103 UART:
3,578,245 UART: [state] CFI Enabled
3,581,325 UART: [state] LifecycleState = Unprovisioned
3,581,980 UART: [state] DebugLocked = No
3,582,492 UART: [state] WD Timer not started. Device not locked for debugging
3,583,672 UART: [kat] SHA2-256
4,389,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,393,447 UART: [kat] ++
4,393,599 UART: [kat] sha1
4,397,695 UART: [kat] SHA2-256
4,399,635 UART: [kat] SHA2-384
4,402,390 UART: [kat] SHA2-512-ACC
4,404,290 UART: [kat] ECC-384
4,414,065 UART: [kat] HMAC-384Kdf
4,418,811 UART: [kat] LMS
4,667,139 UART: [kat] --
4,667,871 UART: [update-reset] ++
5,980,648 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,781 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,131,647 >>> mbox cmd response: success
6,131,647 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,131,804 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,818 UART: [update-reset Success] --
6,140,843 UART: [state] Locking Datavault
6,141,637 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,241 UART: [state] Locking ICCM
6,142,907 UART: [exit] Launching FMC @ 0x40000130
6,148,236 UART:
6,148,252 UART: Running Caliptra FMC ...
6,148,660 UART:
6,148,803 UART: [state] CFI Enabled
6,238,006 UART: [art] Extend RT PCRs Done
6,238,434 UART: [art] Lock RT PCRs Done
6,239,585 UART: [art] Populate DV Done
6,247,820 UART: [fht] FMC Alias Private Key: 7
6,248,938 UART: [art] Derive CDI
6,249,218 UART: [art] Store in in slot 0x4
6,334,985 UART: [art] Derive Key Pair
6,335,345 UART: [art] Store priv key in slot 0x5
6,348,155 UART: [art] Derive Key Pair - Done
6,362,779 UART: [art] Signing Cert with AUTHO
6,363,259 UART: RITY.KEYID = 7
6,378,969 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,734 UART: [art] PUB.X = F194E7A04B4E30AA628B249705588D6A9EE7E301800DCF83B685657AB42F5208D6D34E03CBF5D04680D3044C219DBD64
6,386,488 UART: [art] PUB.Y = 62462E5B4258BF3A8A3F064DAE62B4D032020BFFBA72385F7E2E56917F02E91A06A2766010E282342422284BBAEB95D6
6,393,423 UART: [art] SIG.R = 289D3E745CEBD05D46D5DB4B44777FE0D511625BFB96208ED7CB7C113DB9B31A848FA1E53644486810236688C851B6C0
6,400,195 UART: [art] SIG.S = 712A2FBF904A459F4760FD171A217E08980D6CD6394CD5EC7618BB17A2DEF4FDA51ADF885765F0C96A9EF27C363C6080
6,423,458 UART: Caliptra RT
6,423,804 UART: [state] CFI Enabled
6,706,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,736,898 UART: [rt]cmd =0x41545348, len=116
6,738,851 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,284 ready_for_fw is high
1,060,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,200 >>> mbox cmd response: success
2,688,650 UART:
2,688,666 UART: Running Caliptra FMC ...
2,689,074 UART:
2,689,217 UART: [state] CFI Enabled
2,699,640 UART: [fht] FMC Alias Private Key: 7
2,807,639 UART: [art] Extend RT PCRs Done
2,808,067 UART: [art] Lock RT PCRs Done
2,809,389 UART: [art] Populate DV Done
2,817,400 UART: [fht] FMC Alias Private Key: 7
2,818,394 UART: [art] Derive CDI
2,818,674 UART: [art] Store in in slot 0x4
2,904,467 UART: [art] Derive Key Pair
2,904,827 UART: [art] Store priv key in slot 0x5
2,918,351 UART: [art] Derive Key Pair - Done
2,933,039 UART: [art] Signing Cert with AUTHO
2,933,519 UART: RITY.KEYID = 7
2,949,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,776 UART: [art] PUB.X = 9F331F3FF67B336408C7EDB014FE02E20AE41DD5C6616D414DDB66F008E09CC4F69AC4802CEEC9A1283040A01F5F0AA6
2,956,545 UART: [art] PUB.Y = 90DDA6BF62AFF247CC68A5F2C6371A042A9AC7EC34D06F5DC2A6C61EF804E64B765F65F56EA448971264C11B267EDD00
2,963,481 UART: [art] SIG.R = 95BBA23E608BE9BE39C513D72FB31868D98C4B40E50291D7DAE3535AF54071D501CA05A005323723346B08BE4A1B8A6C
2,970,240 UART: [art] SIG.S = C8A88CFB60E873EF251F753285F7E28BFC4363C75D41EAB6ACB452AC8F89AE267D474DFC089D00F82FE24E0C43B0A39F
2,993,799 UART: Caliptra RT
2,994,145 UART: [state] CFI Enabled
3,102,322 UART: [rt] RT listening for mailbox commands...
3,102,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,941 UART: [rt]cmd =0x41544d4e, len=14344
3,370,980 >>> mbox cmd response data (8 bytes)
3,370,981 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,958 UART: [rt]cmd =0x41545348, len=116
3,402,903 >>> mbox cmd response data (12 bytes)
3,402,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,841,707 >>> mbox cmd response: success
5,841,707 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,855,135 UART:
5,855,151 UART: Running Caliptra FMC ...
5,855,559 UART:
5,855,702 UART: [state] CFI Enabled
5,944,737 UART: [art] Extend RT PCRs Done
5,945,165 UART: [art] Lock RT PCRs Done
5,946,292 UART: [art] Populate DV Done
5,954,471 UART: [fht] FMC Alias Private Key: 7
5,955,567 UART: [art] Derive CDI
5,955,847 UART: [art] Store in in slot 0x4
6,041,528 UART: [art] Derive Key Pair
6,041,888 UART: [art] Store priv key in slot 0x5
6,054,706 UART: [art] Derive Key Pair - Done
6,069,747 UART: [art] Signing Cert with AUTHO
6,070,227 UART: RITY.KEYID = 7
6,085,121 UART: [art] Erasing AUTHORITY.KEYID = 7
6,085,886 UART: [art] PUB.X = 18CDF77E40C78317197BD61D5A2465BA1963D0B073DF70496EDF3676791A19CF3F5DD60E3EBFCFCAA3FE325CF0B18DE2
6,092,671 UART: [art] PUB.Y = 772D2FE42DE5F00B2318635C7E9F1E5F94ED15B74F0395DD2C18C4AB8548EE606B3FDE9CC494942937C53FB1DFB9AC57
6,099,629 UART: [art] SIG.R = 3EFFC217D07B7C0441293F52EF104750D399D9E56A9175121E7BB6D9F712C7A7B145BB3DEFF51252A66BB5C1EBD10FD3
6,106,405 UART: [art] SIG.S = 6CA8052DAFC3CD91A88EB3C31E86BF600AD9DFA52CEE5412FB846E92E3F4481EB28D7433D247C320DA8896FF0601C034
6,130,212 UART: Caliptra RT
6,130,558 UART: [state] CFI Enabled
6,415,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,446,708 UART: [rt]cmd =0x41545348, len=116
6,448,171 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,791 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,173,787 ready_for_fw is high
1,173,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,502 UART: [ldev] Erasing FE.KEYID = 1
1,242,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,220 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,227 UART: [fwproc] Recv command 0x46574c44
1,282,960 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,790 >>> mbox cmd response: success
2,774,851 UART: [afmc] ++
2,775,019 UART: [afmc] CDI.KEYID = 6
2,775,382 UART: [afmc] SUBJECT.KEYID = 7
2,775,808 UART: [afmc] AUTHORITY.KEYID = 5
2,811,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,569 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,180 UART: [afmc] --
2,854,102 UART: [cold-reset] --
2,854,900 UART: [state] Locking Datavault
2,856,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,119 UART: [state] Locking ICCM
2,857,673 UART: [exit] Launching FMC @ 0x40000130
2,863,002 UART:
2,863,018 UART: Running Caliptra FMC ...
2,863,426 UART:
2,863,480 UART: [state] CFI Enabled
2,874,277 UART: [fht] FMC Alias Private Key: 7
2,982,522 UART: [art] Extend RT PCRs Done
2,982,950 UART: [art] Lock RT PCRs Done
2,984,768 UART: [art] Populate DV Done
2,992,861 UART: [fht] FMC Alias Private Key: 7
2,994,009 UART: [art] Derive CDI
2,994,289 UART: [art] Store in in slot 0x4
3,080,018 UART: [art] Derive Key Pair
3,080,378 UART: [art] Store priv key in slot 0x5
3,093,178 UART: [art] Derive Key Pair - Done
3,107,809 UART: [art] Signing Cert with AUTHO
3,108,289 UART: RITY.KEYID = 7
3,123,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,346 UART: [art] PUB.X = 0988A7FBE26B208E5506960EA376A90F2A99445B29F231AAF84B55A374DEE75C1FE5F80FE67ABC9D72ED07D16FF57085
3,131,108 UART: [art] PUB.Y = B30DDBF02CE65A4631D63F37A15BD20957708ACD6A83E1F7911B52FDFB47817261D24052ECA81DB772ED2ADEFD6169F0
3,138,066 UART: [art] SIG.R = 61D79A10E8AAEC764DC98020B8610367EDEBC44A19D3AAAB0687F064F271B8CF7857DF767AFD50FA0ABA8FD0EF348D3B
3,144,849 UART: [art] SIG.S = 39E81A011A10F722C4E1EDB0D0E7A799F8AE3D9C3F415FFB52453D97B2D2A9F684AC0A4B77D3B3BCCC7574F97183A62B
3,168,570 UART: Caliptra RT
3,168,824 UART: [state] CFI Enabled
3,275,488 UART: [rt] RT listening for mailbox commands...
3,276,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,787 UART: [rt]cmd =0x41544d4e, len=14344
3,543,214 >>> mbox cmd response data (8 bytes)
3,543,215 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,148 UART: [rt]cmd =0x41545348, len=116
3,574,687 >>> mbox cmd response data (12 bytes)
3,574,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,426 UART:
3,575,442 UART: Running Caliptra ROM ...
3,575,850 UART:
3,575,905 UART: [state] CFI Enabled
3,578,373 UART: [state] LifecycleState = Unprovisioned
3,579,028 UART: [state] DebugLocked = No
3,579,580 UART: [state] WD Timer not started. Device not locked for debugging
3,580,804 UART: [kat] SHA2-256
4,384,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,388,483 UART: [kat] ++
4,388,635 UART: [kat] sha1
4,392,769 UART: [kat] SHA2-256
4,394,709 UART: [kat] SHA2-384
4,397,638 UART: [kat] SHA2-512-ACC
4,399,538 UART: [kat] ECC-384
4,409,577 UART: [kat] HMAC-384Kdf
4,414,079 UART: [kat] LMS
4,662,391 UART: [kat] --
4,663,331 UART: [update-reset] ++
5,975,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,976,330 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,126,196 >>> mbox cmd response: success
6,126,196 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,126,545 UART: [update-reset] Copying MAN_2 To MAN_1
6,134,559 UART: [update-reset Success] --
6,135,498 UART: [state] Locking Datavault
6,136,158 UART: [state] Locking PCR0, PCR1 and PCR31
6,136,762 UART: [state] Locking ICCM
6,137,256 UART: [exit] Launching FMC @ 0x40000130
6,142,585 UART:
6,142,601 UART: Running Caliptra FMC ...
6,143,009 UART:
6,143,063 UART: [state] CFI Enabled
6,232,314 UART: [art] Extend RT PCRs Done
6,232,742 UART: [art] Lock RT PCRs Done
6,233,879 UART: [art] Populate DV Done
6,242,274 UART: [fht] FMC Alias Private Key: 7
6,243,416 UART: [art] Derive CDI
6,243,696 UART: [art] Store in in slot 0x4
6,329,123 UART: [art] Derive Key Pair
6,329,483 UART: [art] Store priv key in slot 0x5
6,342,229 UART: [art] Derive Key Pair - Done
6,357,036 UART: [art] Signing Cert with AUTHO
6,357,516 UART: RITY.KEYID = 7
6,372,366 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,131 UART: [art] PUB.X = AE925BE23BA4AABF8592DC426B8EEB1873B596EA6E4A364B46271AEAF21352FA73178BFF8B9A6D58D470A8A57DEE0575
6,379,916 UART: [art] PUB.Y = 3AF8861A941E87E15C0EF6B59623E845052E596030C93B64899BEF7E54C104A5F0FE98A5EAC9FC94F8BCE0DCE85060D3
6,386,867 UART: [art] SIG.R = 1F01DBD67933282EC28F45D5F3690E5A6BFD82614C67E2BE58B63A095FFC22D789D7D81C88414C71F90131678C77285A
6,393,625 UART: [art] SIG.S = 890A2165A7644AE3EB65E1AF5481EA24B9EF66037A7C2D73C0880B9DD4E75D87F6469D4AC0F6A6BA9DFA0E0F87D55891
6,417,701 UART: Caliptra RT
6,417,955 UART: [state] CFI Enabled
6,700,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,731,905 UART: [rt]cmd =0x41545348, len=116
6,733,678 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,228 ready_for_fw is high
1,056,228 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,176 >>> mbox cmd response: success
2,684,522 UART:
2,684,538 UART: Running Caliptra FMC ...
2,684,946 UART:
2,685,000 UART: [state] CFI Enabled
2,695,321 UART: [fht] FMC Alias Private Key: 7
2,803,072 UART: [art] Extend RT PCRs Done
2,803,500 UART: [art] Lock RT PCRs Done
2,805,110 UART: [art] Populate DV Done
2,813,341 UART: [fht] FMC Alias Private Key: 7
2,814,303 UART: [art] Derive CDI
2,814,583 UART: [art] Store in in slot 0x4
2,900,500 UART: [art] Derive Key Pair
2,900,860 UART: [art] Store priv key in slot 0x5
2,913,944 UART: [art] Derive Key Pair - Done
2,929,008 UART: [art] Signing Cert with AUTHO
2,929,488 UART: RITY.KEYID = 7
2,944,314 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,079 UART: [art] PUB.X = 5B6A9BFA1E427BF34633361FD63C4741209D30273466C8B2FD15B7D469B7D26DC5842FB55C27FC9481305AAA65C79912
2,951,849 UART: [art] PUB.Y = A26019E9DE317A0A2FB2C887084365917F326E2FBB3B8E8AF6E9C4A025B04AC7E1C8D97A0FBBBF0F2F02BAD026955CC6
2,958,802 UART: [art] SIG.R = 2FF73149F9E33134E62BFAB0ABB4D1B38D12097149F21A22F8F9BA566B341D47D65AE2418BEDF8ADC0DAE4138458161A
2,965,581 UART: [art] SIG.S = B21131A0DC1145B252B85BF4384CCD7C1CB253293DD89CE21180DBFD44AD00B83CE63486D96E25052D3B06BA78C71FD1
2,989,020 UART: Caliptra RT
2,989,274 UART: [state] CFI Enabled
3,096,548 UART: [rt] RT listening for mailbox commands...
3,097,218 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,795 UART: [rt]cmd =0x41544d4e, len=14344
3,364,554 >>> mbox cmd response data (8 bytes)
3,364,555 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,852 UART: [rt]cmd =0x41545348, len=116
3,396,757 >>> mbox cmd response data (12 bytes)
3,396,758 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,829,641 >>> mbox cmd response: success
5,829,641 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,843,009 UART:
5,843,025 UART: Running Caliptra FMC ...
5,843,433 UART:
5,843,487 UART: [state] CFI Enabled
5,933,176 UART: [art] Extend RT PCRs Done
5,933,604 UART: [art] Lock RT PCRs Done
5,935,073 UART: [art] Populate DV Done
5,943,504 UART: [fht] FMC Alias Private Key: 7
5,944,600 UART: [art] Derive CDI
5,944,880 UART: [art] Store in in slot 0x4
6,030,499 UART: [art] Derive Key Pair
6,030,859 UART: [art] Store priv key in slot 0x5
6,044,023 UART: [art] Derive Key Pair - Done
6,058,857 UART: [art] Signing Cert with AUTHO
6,059,337 UART: RITY.KEYID = 7
6,074,421 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,186 UART: [art] PUB.X = 2463AD26D7315838D5C6A8F6B480F8D8F2D33506945F5DCEC903E64734CCF8FEEEC971DE5FF66E9505D1E0F6508DAF10
6,081,959 UART: [art] PUB.Y = B1DF8A2355575C222B4AA38AF7B2FC37962A7E47845C9EA36583E9C6A64A688D22C3E1828EF06CA0E8661998B19AE59C
6,088,915 UART: [art] SIG.R = F5D3D1E0ECDBB6A2041D2F4FE785E51C1A6B5BE88642FE755A12DDAC5BEC091A5FD0CB7EEBD2DBB65BB869EB917F4CE7
6,095,715 UART: [art] SIG.S = 7406B7F6F1B776D7167049449DBDF21914BBFD18053EFEC1449E105D2D103F994AE796A2A162DBAAF5D4BF81D3FF6F2A
6,119,670 UART: Caliptra RT
6,119,924 UART: [state] CFI Enabled
6,405,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,436,580 UART: [rt]cmd =0x41545348, len=116
6,438,505 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,403 UART: [kat] LMS
1,169,715 UART: [kat] --
1,170,924 UART: [cold-reset] ++
1,171,424 UART: [fht] FHT @ 0x50003400
1,174,172 UART: [idev] ++
1,174,340 UART: [idev] CDI.KEYID = 6
1,174,701 UART: [idev] SUBJECT.KEYID = 7
1,175,126 UART: [idev] UDS.KEYID = 0
1,175,472 ready_for_fw is high
1,175,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,396 UART: [idev] Erasing UDS.KEYID = 0
1,200,394 UART: [idev] Sha1 KeyId Algorithm
1,209,130 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,601 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,325 >>> mbox cmd response: success
2,775,370 UART: [afmc] ++
2,775,538 UART: [afmc] CDI.KEYID = 6
2,775,901 UART: [afmc] SUBJECT.KEYID = 7
2,776,327 UART: [afmc] AUTHORITY.KEYID = 5
2,812,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,631 UART: [afmc] --
2,855,675 UART: [cold-reset] --
2,856,601 UART: [state] Locking Datavault
2,857,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,336 UART: [state] Locking ICCM
2,858,826 UART: [exit] Launching FMC @ 0x40000130
2,864,155 UART:
2,864,171 UART: Running Caliptra FMC ...
2,864,579 UART:
2,864,722 UART: [state] CFI Enabled
2,875,629 UART: [fht] FMC Alias Private Key: 7
2,983,504 UART: [art] Extend RT PCRs Done
2,983,932 UART: [art] Lock RT PCRs Done
2,985,498 UART: [art] Populate DV Done
2,993,573 UART: [fht] FMC Alias Private Key: 7
2,994,667 UART: [art] Derive CDI
2,994,947 UART: [art] Store in in slot 0x4
3,080,374 UART: [art] Derive Key Pair
3,080,734 UART: [art] Store priv key in slot 0x5
3,094,950 UART: [art] Derive Key Pair - Done
3,109,616 UART: [art] Signing Cert with AUTHO
3,110,096 UART: RITY.KEYID = 7
3,125,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,841 UART: [art] PUB.X = F6444F2C0354B9343C3E15B5A6F3D2E3A2FC00D92C6D7DD5657E49BCF3FCB27C23CBC08191FBF1656673A4EA2F7A572E
3,132,602 UART: [art] PUB.Y = 1ACBA769BA49C7B35CDDB72D7B04ABEEC02C238D88E8A6172BEDBEFB0C8C1391D1825A86DF77A4A761E6BFBE7D4E43A9
3,139,576 UART: [art] SIG.R = AE6123A42CAD27691B8151430EA082B97D129D4E7D0E7D41FD046652146BE5DB6E38480C50ADFD508AE6B366052322FE
3,146,335 UART: [art] SIG.S = 7660B84520238FF7E26A1634F0A627302BE188E1459789D486E9DB4E29597F86CE83FE98FCE4031D4ED6DC45740376EA
3,169,786 UART: Caliptra RT
3,170,132 UART: [state] CFI Enabled
3,278,746 UART: [rt] RT listening for mailbox commands...
3,279,416 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,143 UART: [rt]cmd =0x41544d4e, len=14344
3,547,004 >>> mbox cmd response data (8 bytes)
3,547,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,872 UART: [rt]cmd =0x41545348, len=116
3,578,733 >>> mbox cmd response data (12 bytes)
3,578,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,372 UART:
3,579,388 UART: Running Caliptra ROM ...
3,579,796 UART:
3,579,938 UART: [state] CFI Enabled
3,582,678 UART: [state] LifecycleState = Unprovisioned
3,583,333 UART: [state] DebugLocked = No
3,583,899 UART: [state] WD Timer not started. Device not locked for debugging
3,585,013 UART: [kat] SHA2-256
4,388,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,392,692 UART: [kat] ++
4,392,844 UART: [kat] sha1
4,397,034 UART: [kat] SHA2-256
4,398,974 UART: [kat] SHA2-384
4,401,775 UART: [kat] SHA2-512-ACC
4,403,675 UART: [kat] ECC-384
4,413,598 UART: [kat] HMAC-384Kdf
4,418,320 UART: [kat] LMS
4,666,632 UART: [kat] --
4,667,594 UART: [update-reset] ++
5,980,768 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,981,923 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
6,131,789 >>> mbox cmd response: success
6,131,789 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,132,012 UART: [update-reset] Copying MAN_2 To MAN_1
6,140,026 UART: [update-reset Success] --
6,141,105 UART: [state] Locking Datavault
6,141,909 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,513 UART: [state] Locking ICCM
6,143,011 UART: [exit] Launching FMC @ 0x40000130
6,148,340 UART:
6,148,356 UART: Running Caliptra FMC ...
6,148,764 UART:
6,148,907 UART: [state] CFI Enabled
6,238,270 UART: [art] Extend RT PCRs Done
6,238,698 UART: [art] Lock RT PCRs Done
6,239,999 UART: [art] Populate DV Done
6,248,330 UART: [fht] FMC Alias Private Key: 7
6,249,360 UART: [art] Derive CDI
6,249,640 UART: [art] Store in in slot 0x4
6,335,371 UART: [art] Derive Key Pair
6,335,731 UART: [art] Store priv key in slot 0x5
6,348,549 UART: [art] Derive Key Pair - Done
6,363,339 UART: [art] Signing Cert with AUTHO
6,363,819 UART: RITY.KEYID = 7
6,379,143 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,908 UART: [art] PUB.X = 7F89AE6AC3E9E3A151E44FC4ED1C1B5D42F8FEAE34786CC31B1054899CD2AE5AA95600BC6A00A499206F4D76FA105A39
6,386,650 UART: [art] PUB.Y = 150ADEC645B81A498CD789E3132D59EFAE7791002C32EAE5B092E366AAD2D3144DD81EA08355909EE84E7938B6ED83D0
6,393,583 UART: [art] SIG.R = F92A6F9D20DAF831729029165BF637DF3AA277E09AFCEE2A4DE33CC2D591F2E889FDCC24186D8F2DFCD5822208C3D897
6,400,366 UART: [art] SIG.S = 83E2AE2F58C4367F9E2A38AD2DF27BCA275102DAEBEE0F2698BDB7ED3C3D8BA5074EAB77592ECE916C3033410555B345
6,424,247 UART: Caliptra RT
6,424,593 UART: [state] CFI Enabled
6,706,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,737,934 UART: [rt]cmd =0x41545348, len=116
6,739,597 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,855 ready_for_fw is high
1,056,855 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,267 >>> mbox cmd response: success
2,685,929 UART:
2,685,945 UART: Running Caliptra FMC ...
2,686,353 UART:
2,686,496 UART: [state] CFI Enabled
2,697,215 UART: [fht] FMC Alias Private Key: 7
2,804,534 UART: [art] Extend RT PCRs Done
2,804,962 UART: [art] Lock RT PCRs Done
2,806,390 UART: [art] Populate DV Done
2,814,661 UART: [fht] FMC Alias Private Key: 7
2,815,783 UART: [art] Derive CDI
2,816,063 UART: [art] Store in in slot 0x4
2,901,980 UART: [art] Derive Key Pair
2,902,340 UART: [art] Store priv key in slot 0x5
2,915,390 UART: [art] Derive Key Pair - Done
2,930,364 UART: [art] Signing Cert with AUTHO
2,930,844 UART: RITY.KEYID = 7
2,945,694 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,459 UART: [art] PUB.X = A6A5699B2EBD1F1D00C169A60F0E550764B82D5E303057F0720C087E3071DC3647E9BBAA6662DF9732269FE74688413B
2,953,190 UART: [art] PUB.Y = CF27CDE219A9BC9DB6482694566AEC7F6678911491DA3D3CA212266EC78E754587E96C72E759E4A35FA95E607B88EBD2
2,960,146 UART: [art] SIG.R = F5513CB490F98198E93F19DC4B1B91D10B5D2AB6C3BCA4B21FABB10114A61986C654BF102951596C9DD47EA5CFBFA792
2,966,924 UART: [art] SIG.S = A70CD8BDDC76A4B9BB0F3C8F2BA9DE12AA0B18D27BDE0F8EB55770BF636955263BCF43CB4BEAAD0BFD21963118C2F607
2,990,771 UART: Caliptra RT
2,991,117 UART: [state] CFI Enabled
3,098,488 UART: [rt] RT listening for mailbox commands...
3,099,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,807 UART: [rt]cmd =0x41544d4e, len=14344
3,366,906 >>> mbox cmd response data (8 bytes)
3,366,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,078 UART: [rt]cmd =0x41545348, len=116
3,399,045 >>> mbox cmd response data (12 bytes)
3,399,046 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,831,932 >>> mbox cmd response: success
5,831,932 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
5,845,508 UART:
5,845,524 UART: Running Caliptra FMC ...
5,845,932 UART:
5,846,075 UART: [state] CFI Enabled
5,935,582 UART: [art] Extend RT PCRs Done
5,936,010 UART: [art] Lock RT PCRs Done
5,937,189 UART: [art] Populate DV Done
5,945,608 UART: [fht] FMC Alias Private Key: 7
5,946,682 UART: [art] Derive CDI
5,946,962 UART: [art] Store in in slot 0x4
6,032,563 UART: [art] Derive Key Pair
6,032,923 UART: [art] Store priv key in slot 0x5
6,046,521 UART: [art] Derive Key Pair - Done
6,061,160 UART: [art] Signing Cert with AUTHO
6,061,640 UART: RITY.KEYID = 7
6,076,750 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,515 UART: [art] PUB.X = C7EB91AB45371DFFC1D2A20DB734CE0E873BC58C6E6673DA432613E28FF1746F99AD4DC473D829F1AD4AA557892CD2C5
6,084,295 UART: [art] PUB.Y = D90D436F7ACB4E88D6FA6FE4A5A0264731A5ACF0C6992476032A3DC8007CB1285FBD96200B09AB92B3FBEAEDA8E0755A
6,091,229 UART: [art] SIG.R = 1EB504A7A62DECD3B90AE5DFDE1E950E3857D2A0D354555BE45A96DE61666EBB9F07230A47634908B5F2432F8EAD1D45
6,097,993 UART: [art] SIG.S = E906F55F033142FC335CDF387BDFA9B74B776BEAA2229528BCF48470FE22D77D904EC6DF7CA8137E934BF75601FE92E9
6,121,815 UART: Caliptra RT
6,122,161 UART: [state] CFI Enabled
6,403,404 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,434,297 UART: [rt]cmd =0x41545348, len=116
6,436,000 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,422 UART:
192,790 UART: Running Caliptra ROM ...
193,887 UART:
194,025 UART: [state] CFI Enabled
268,520 UART: [state] LifecycleState = Unprovisioned
270,434 UART: [state] DebugLocked = No
272,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,676 UART: [kat] SHA2-256
447,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,911 UART: [kat] ++
458,414 UART: [kat] sha1
468,574 UART: [kat] SHA2-256
471,297 UART: [kat] SHA2-384
475,644 UART: [kat] SHA2-512-ACC
478,000 UART: [kat] ECC-384
2,765,947 UART: [kat] HMAC-384Kdf
2,779,687 UART: [kat] LMS
3,969,979 UART: [kat] --
3,975,480 UART: [cold-reset] ++
3,977,970 UART: [fht] Storing FHT @ 0x50003400
3,989,948 UART: [idev] ++
3,990,577 UART: [idev] CDI.KEYID = 6
3,991,460 UART: [idev] SUBJECT.KEYID = 7
3,992,657 UART: [idev] UDS.KEYID = 0
3,993,953 ready_for_fw is high
3,994,155 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,674 UART: [idev] Erasing UDS.KEYID = 0
7,326,322 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,622 UART: [idev] --
7,351,992 UART: [ldev] ++
7,352,559 UART: [ldev] CDI.KEYID = 6
7,353,526 UART: [ldev] SUBJECT.KEYID = 5
7,354,731 UART: [ldev] AUTHORITY.KEYID = 7
7,356,016 UART: [ldev] FE.KEYID = 1
7,401,525 UART: [ldev] Erasing FE.KEYID = 1
10,732,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,296 UART: [ldev] --
13,095,634 UART: [fwproc] Waiting for Commands...
13,097,856 UART: [fwproc] Received command 0x46574c44
13,100,093 UART: [fwproc] Received Image of size 114036 bytes
17,154,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,618,824 >>> mbox cmd response: success
17,623,886 UART: [afmc] ++
17,624,480 UART: [afmc] CDI.KEYID = 6
17,625,442 UART: [afmc] SUBJECT.KEYID = 7
17,626,646 UART: [afmc] AUTHORITY.KEYID = 5
20,983,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,282 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,693 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,513 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,973 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,808 UART: [afmc] --
23,357,322 UART: [cold-reset] --
23,361,078 UART: [state] Locking Datavault
23,367,993 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,688 UART: [state] Locking ICCM
23,370,798 UART: [exit] Launching FMC @ 0x40000130
23,379,185 UART:
23,379,419 UART: Running Caliptra FMC ...
23,380,511 UART:
23,380,666 UART: [state] CFI Enabled
23,443,564 UART: [fht] FMC Alias Private Key: 7
25,781,439 UART: [art] Extend RT PCRs Done
25,782,662 UART: [art] Lock RT PCRs Done
25,784,426 UART: [art] Populate DV Done
25,789,885 UART: [fht] FMC Alias Private Key: 7
25,791,525 UART: [art] Derive CDI
25,792,278 UART: [art] Store in in slot 0x4
25,851,379 UART: [art] Derive Key Pair
25,852,416 UART: [art] Store priv key in slot 0x5
29,145,684 UART: [art] Derive Key Pair - Done
29,158,738 UART: [art] Signing Cert with AUTHO
29,160,035 UART: RITY.KEYID = 7
31,446,505 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,011 UART: [art] PUB.X = D662AA8B98C746D24EA49978792CB58EBFEF17B90301C4945FEC70E34AF1CB34A1506443EC67C8B4725CB7C3992B79A3
31,455,264 UART: [art] PUB.Y = 5B161DFBDD2383811D39AD60FF75848602A152F341CD5EB7FD3600A63839E8649CED56303E46D84862F75766B6DA20C1
31,462,516 UART: [art] SIG.R = 9E9683D706AA6CDBA0E38B0561C2E2C63ED756F95D7C8EA944F3AAA8FB53A0A430EA11C9A6B4F5D5979DDA75BD1473B5
31,469,923 UART: [art] SIG.S = A354A7B15BF89FB3C95DCF23B0AC625B6AD9C9328D137D774659899F41E2D694F686F799770607DCC8F86862B568B8F6
32,775,096 UART: Caliptra RT
32,775,809 UART: [state] CFI Enabled
32,937,834 UART: [rt] RT listening for mailbox commands...
32,939,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,970,458 UART: [rt]cmd =0x41545348, len=116
32,972,517 >>> mbox cmd response data (12 bytes)
35,028,112 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,128,731 UART:
35,129,102 UART: Running Caliptra ROM ...
35,130,233 UART:
35,130,396 UART: [state] CFI Enabled
35,200,161 UART: [state] LifecycleState = Unprovisioned
35,202,089 UART: [state] DebugLocked = No
35,203,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,208,276 UART: [kat] SHA2-256
35,377,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,388,461 UART: [kat] ++
35,388,989 UART: [kat] sha1
35,399,543 UART: [kat] SHA2-256
35,402,228 UART: [kat] SHA2-384
35,409,073 UART: [kat] SHA2-512-ACC
35,411,461 UART: [kat] ECC-384
37,704,280 UART: [kat] HMAC-384Kdf
37,737,243 UART: [kat] LMS
38,927,664 UART: [kat] --
38,933,073 UART: [update-reset] ++
42,646,591 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,650,585 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,908,786 >>> mbox cmd response: success
42,909,138 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,909,412 UART: [update-reset] Copying MAN_2 To MAN_1
42,931,603 UART: [update-reset Success] --
42,934,625 UART: [state] Locking Datavault
42,936,657 UART: [state] Locking PCR0, PCR1 and PCR31
42,938,412 UART: [state] Locking ICCM
42,941,100 UART: [exit] Launching FMC @ 0x40000130
42,949,542 UART:
42,949,776 UART: Running Caliptra FMC ...
42,950,871 UART:
42,951,021 UART: [state] CFI Enabled
43,040,445 UART: [art] Extend RT PCRs Done
43,041,656 UART: [art] Lock RT PCRs Done
43,042,842 UART: [art] Populate DV Done
43,048,299 UART: [fht] FMC Alias Private Key: 7
43,049,999 UART: [art] Derive CDI
43,050,810 UART: [art] Store in in slot 0x4
43,109,505 UART: [art] Derive Key Pair
43,110,546 UART: [art] Store priv key in slot 0x5
46,403,188 UART: [art] Derive Key Pair - Done
46,416,361 UART: [art] Signing Cert with AUTHO
46,417,653 UART: RITY.KEYID = 7
48,705,710 UART: [art] Erasing AUTHORITY.KEYID = 7
48,707,216 UART: [art] PUB.X = 044D325554A3200DA25A86143D3105A07E71040CA6FF939086C96AC7E35CA5EEDF9D80280981CAEB2F111213F124C758
48,714,456 UART: [art] PUB.Y = 8B8F52EC3877752AE4C37D64D6CE915D2D692CABEAFA12A426B04D5FCEAFD296DB8118876A47019EBE3784A18EA79B13
48,721,727 UART: [art] SIG.R = 1933AA0448DA0352AEB5DEDFD0BDF348C9675A05242394302D5E691A9868B1C44990CAF18C7EBE515D59B4B139390932
48,729,100 UART: [art] SIG.S = 7969926501CABDAEB181B387F4636020B9B4EAE185EEC0D10D2D71BB856E31BA45DBA25F6C603E3C96B61C29EFA94342
50,033,766 UART: mbox::rt_entry...
50,034,732 UART: ____ _ _ _ ____ _____
50,036,659 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,038,663 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,040,591 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,042,513 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,044,431 UART: |_|
50,045,255 UART:
50,327,277 UART: [rt] Runtime listening for mailbox commands...
50,329,354 >>> mbox cmd response data (48 bytes)
50,329,914 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,332,223 >>> mbox cmd response data (48 bytes)
50,333,075 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,345,622 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,807,472 ready_for_fw is high
3,808,034 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,874,728 >>> mbox cmd response: success
23,568,113 UART:
23,568,506 UART: Running Caliptra FMC ...
23,569,601 UART:
23,569,744 UART: [state] CFI Enabled
23,636,869 UART: [fht] FMC Alias Private Key: 7
25,974,970 UART: [art] Extend RT PCRs Done
25,976,192 UART: [art] Lock RT PCRs Done
25,977,925 UART: [art] Populate DV Done
25,983,560 UART: [fht] FMC Alias Private Key: 7
25,985,102 UART: [art] Derive CDI
25,985,856 UART: [art] Store in in slot 0x4
26,044,894 UART: [art] Derive Key Pair
26,045,941 UART: [art] Store priv key in slot 0x5
29,338,392 UART: [art] Derive Key Pair - Done
29,351,496 UART: [art] Signing Cert with AUTHO
29,352,805 UART: RITY.KEYID = 7
31,640,594 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,096 UART: [art] PUB.X = 1866C06C5B0B5992A763245F9B0C6381E783804A8102B6C4A652428B6F9F131FB8B727254D2A655BCB509F2B6CAE23FF
31,649,367 UART: [art] PUB.Y = 1259B6B748A5989380D91E33993DA94E79AB37DA321CE08A8343525590FC86D41F4171294EE9563243057CE544BFFD14
31,656,525 UART: [art] SIG.R = B6F25C02C8B428CC72BBB15E7A507C88518089D4472C4F671F47BF0CF84E15731D4E51FF9B9399B404E289A61C20B482
31,663,889 UART: [art] SIG.S = C42A1D6FE420C99370F6B88BA920922DD9DF3A79735339B2636954D1C07628F920CF8C539978B7089A0BAF7B0449A5EB
32,969,077 UART: Caliptra RT
32,969,778 UART: [state] CFI Enabled
33,131,704 UART: [rt] RT listening for mailbox commands...
33,133,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,164,605 UART: [rt]cmd =0x41545348, len=116
33,166,999 >>> mbox cmd response data (12 bytes)
35,221,887 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,183,872 >>> mbox cmd response: success
43,184,349 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,219,098 UART:
43,219,413 UART: Running Caliptra FMC ...
43,220,534 UART:
43,220,694 UART: [state] CFI Enabled
43,319,306 UART: [art] Extend RT PCRs Done
43,320,511 UART: [art] Lock RT PCRs Done
43,321,695 UART: [art] Populate DV Done
43,327,271 UART: [fht] FMC Alias Private Key: 7
43,328,855 UART: [art] Derive CDI
43,329,660 UART: [art] Store in in slot 0x4
43,388,675 UART: [art] Derive Key Pair
43,389,711 UART: [art] Store priv key in slot 0x5
46,682,680 UART: [art] Derive Key Pair - Done
46,695,793 UART: [art] Signing Cert with AUTHO
46,697,099 UART: RITY.KEYID = 7
48,984,390 UART: [art] Erasing AUTHORITY.KEYID = 7
48,985,897 UART: [art] PUB.X = FAF22F59A3183F7000007E17083104D7E0179ACC6383EBE4E8AEAEB2C14F9C8D6ADDBD0564F80DC7337C9C7415CF59EA
48,993,130 UART: [art] PUB.Y = 27B32DFC9E9AAF3CA8FFD4F06931C8AC2960F15D4DF526A894E8727FAD25415B4D2C98983C486C7595188FF5FDEBB592
49,000,404 UART: [art] SIG.R = 77DA40E552668959E5E65394CF35DB563199B7B04B0A31D7721F99E0223F13A1D8CDF0800453316AB6880AFA5EE1AA47
49,007,782 UART: [art] SIG.S = 9B0920C65C965A93BE1B0CFC80C8122FAA42FBC231847536219C7500F01907973BC67654CC40C171FEDEA05AE7B15025
50,312,376 UART: mbox::rt_entry...
50,313,362 UART: ____ _ _ _ ____ _____
50,315,346 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,317,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,319,262 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,321,188 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,323,110 UART: |_|
50,323,910 UART:
50,606,531 UART: [rt] Runtime listening for mailbox commands...
50,608,674 >>> mbox cmd response data (48 bytes)
50,609,231 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,611,552 >>> mbox cmd response data (48 bytes)
50,612,406 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,624,985 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,268 UART:
192,638 UART: Running Caliptra ROM ...
193,843 UART:
603,331 UART: [state] CFI Enabled
619,565 UART: [state] LifecycleState = Unprovisioned
621,510 UART: [state] DebugLocked = No
622,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,610 UART: [kat] SHA2-256
797,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,897 UART: [kat] ++
808,419 UART: [kat] sha1
819,101 UART: [kat] SHA2-256
821,798 UART: [kat] SHA2-384
827,723 UART: [kat] SHA2-512-ACC
830,100 UART: [kat] ECC-384
3,112,205 UART: [kat] HMAC-384Kdf
3,124,584 UART: [kat] LMS
4,314,700 UART: [kat] --
4,318,710 UART: [cold-reset] ++
4,320,854 UART: [fht] Storing FHT @ 0x50003400
4,331,833 UART: [idev] ++
4,332,404 UART: [idev] CDI.KEYID = 6
4,333,435 UART: [idev] SUBJECT.KEYID = 7
4,334,609 UART: [idev] UDS.KEYID = 0
4,335,590 ready_for_fw is high
4,335,794 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,352 UART: [idev] Erasing UDS.KEYID = 0
7,621,052 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,072 UART: [idev] --
7,647,534 UART: [ldev] ++
7,648,158 UART: [ldev] CDI.KEYID = 6
7,649,068 UART: [ldev] SUBJECT.KEYID = 5
7,650,283 UART: [ldev] AUTHORITY.KEYID = 7
7,651,570 UART: [ldev] FE.KEYID = 1
7,661,425 UART: [ldev] Erasing FE.KEYID = 1
10,952,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,568 UART: [ldev] --
13,310,661 UART: [fwproc] Waiting for Commands...
13,312,863 UART: [fwproc] Received command 0x46574c44
13,315,043 UART: [fwproc] Received Image of size 114036 bytes
17,364,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,979 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,830,647 >>> mbox cmd response: success
17,835,023 UART: [afmc] ++
17,835,630 UART: [afmc] CDI.KEYID = 6
17,836,559 UART: [afmc] SUBJECT.KEYID = 7
17,837,781 UART: [afmc] AUTHORITY.KEYID = 5
21,155,699 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,490 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,739 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,141 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,985 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,388 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,790 UART: [afmc] --
23,519,220 UART: [cold-reset] --
23,521,898 UART: [state] Locking Datavault
23,526,875 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,628 UART: [state] Locking ICCM
23,531,426 UART: [exit] Launching FMC @ 0x40000130
23,539,824 UART:
23,540,104 UART: Running Caliptra FMC ...
23,541,230 UART:
23,541,394 UART: [state] CFI Enabled
23,549,336 UART: [fht] FMC Alias Private Key: 7
25,880,034 UART: [art] Extend RT PCRs Done
25,881,243 UART: [art] Lock RT PCRs Done
25,883,078 UART: [art] Populate DV Done
25,888,490 UART: [fht] FMC Alias Private Key: 7
25,890,146 UART: [art] Derive CDI
25,890,967 UART: [art] Store in in slot 0x4
25,933,673 UART: [art] Derive Key Pair
25,934,672 UART: [art] Store priv key in slot 0x5
29,176,771 UART: [art] Derive Key Pair - Done
29,189,768 UART: [art] Signing Cert with AUTHO
29,191,072 UART: RITY.KEYID = 7
31,470,548 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,054 UART: [art] PUB.X = 2514D92DE1F0AA52B35EF810637A1C67641571BC92356EDB5F17DB8609C1492EDCE387C0F46FEC931BF10EE7390B1C2C
31,479,279 UART: [art] PUB.Y = C82B14CB3ED47A6EFA866FCB8E55DA45CD64EAC028B633F505511E322F1BD0C93A91B0C72D8BB7F5063C4CFD3B9801DE
31,486,571 UART: [art] SIG.R = 5FA66AFC37BA214B088C9CD15DABC5DFFCBB3D7440B8313FC33799D17267F5668309786B7695975B55047602F58E615B
31,493,915 UART: [art] SIG.S = 08757A873FEFB2C9C9648BC0BD8CAB134D130614C257DBF9F1FA72250F4EB6939E1F03FD03F981485E5DDD970158E7FA
32,799,149 UART: Caliptra RT
32,799,849 UART: [state] CFI Enabled
32,917,579 UART: [rt] RT listening for mailbox commands...
32,919,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,950,765 UART: [rt]cmd =0x41545348, len=116
32,952,972 >>> mbox cmd response data (12 bytes)
35,003,250 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,104,168 UART:
35,104,531 UART: Running Caliptra ROM ...
35,105,686 UART:
35,105,857 UART: [state] CFI Enabled
35,118,080 UART: [state] LifecycleState = Unprovisioned
35,119,979 UART: [state] DebugLocked = No
35,122,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,127,287 UART: [kat] SHA2-256
35,297,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,307,563 UART: [kat] ++
35,308,110 UART: [kat] sha1
35,319,920 UART: [kat] SHA2-256
35,322,658 UART: [kat] SHA2-384
35,328,694 UART: [kat] SHA2-512-ACC
35,331,043 UART: [kat] ECC-384
37,614,819 UART: [kat] HMAC-384Kdf
37,626,731 UART: [kat] LMS
38,816,819 UART: [kat] --
38,821,983 UART: [update-reset] ++
42,527,124 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,530,578 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,788,790 >>> mbox cmd response: success
42,789,151 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,790,134 UART: [update-reset] Copying MAN_2 To MAN_1
42,812,573 UART: [update-reset Success] --
42,816,674 UART: [state] Locking Datavault
42,820,227 UART: [state] Locking PCR0, PCR1 and PCR31
42,821,931 UART: [state] Locking ICCM
42,824,701 UART: [exit] Launching FMC @ 0x40000130
42,833,152 UART:
42,833,394 UART: Running Caliptra FMC ...
42,834,498 UART:
42,834,647 UART: [state] CFI Enabled
42,878,552 UART: [art] Extend RT PCRs Done
42,879,711 UART: [art] Lock RT PCRs Done
42,881,157 UART: [art] Populate DV Done
42,886,616 UART: [fht] FMC Alias Private Key: 7
42,888,136 UART: [art] Derive CDI
42,888,900 UART: [art] Store in in slot 0x4
42,931,662 UART: [art] Derive Key Pair
42,932,703 UART: [art] Store priv key in slot 0x5
46,174,910 UART: [art] Derive Key Pair - Done
46,187,590 UART: [art] Signing Cert with AUTHO
46,188,926 UART: RITY.KEYID = 7
48,468,271 UART: [art] Erasing AUTHORITY.KEYID = 7
48,469,784 UART: [art] PUB.X = C390D30D772F680973D6F28F35CD363528089179F62EDCAE0C6366153A9CA06F0D67144BCB087B2D5D8CF227B3B47CA6
48,477,048 UART: [art] PUB.Y = EFD11B4FBF131A0D230386EAE94834A0D9C959B4672571A52A8EFABD5D87D246736F6F008EFF1879D74F5843CAD6A0C7
48,484,283 UART: [art] SIG.R = 582784BD8D598A9545C88468A3221A36D01C931DABD559B05F09801F14810A00C41CA335ACA46FD2DE68970912004044
48,491,556 UART: [art] SIG.S = 9FB39AC3D9ED6F9A74C3BDE2B70E818509BC6686C85F6AA9CB547D50F9047A44B76B3E88AA0F9C94B9522502B4BE29AF
49,796,706 UART: mbox::rt_entry...
49,797,683 UART: ____ _ _ _ ____ _____
49,799,668 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,801,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,803,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,805,527 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,807,457 UART: |_|
49,808,263 UART:
50,092,767 UART: [rt] Runtime listening for mailbox commands...
50,094,881 >>> mbox cmd response data (48 bytes)
50,095,473 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,097,834 >>> mbox cmd response data (48 bytes)
50,098,741 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,111,292 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,132,556 ready_for_fw is high
4,132,965 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,085,817 >>> mbox cmd response: success
23,726,993 UART:
23,727,399 UART: Running Caliptra FMC ...
23,728,562 UART:
23,728,726 UART: [state] CFI Enabled
23,737,033 UART: [fht] FMC Alias Private Key: 7
26,067,696 UART: [art] Extend RT PCRs Done
26,068,926 UART: [art] Lock RT PCRs Done
26,070,231 UART: [art] Populate DV Done
26,075,546 UART: [fht] FMC Alias Private Key: 7
26,077,250 UART: [art] Derive CDI
26,078,015 UART: [art] Store in in slot 0x4
26,121,101 UART: [art] Derive Key Pair
26,122,100 UART: [art] Store priv key in slot 0x5
29,364,580 UART: [art] Derive Key Pair - Done
29,377,369 UART: [art] Signing Cert with AUTHO
29,378,681 UART: RITY.KEYID = 7
31,658,148 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,652 UART: [art] PUB.X = F50841B1498CD86305BC80C653A51C4C321C403851C9BB46CC6A7DF468DE4A2AC8BA36B3C4E69202D8B24A2CAE579243
31,666,888 UART: [art] PUB.Y = BF9CFD677090121552113815DB7110FD6820706A147C36432A24DF8CE307F00A2D5BF69D0C63E2592A22A722761835D6
31,674,086 UART: [art] SIG.R = A3E057264A0F8FCEA7C44628D73FA7EACE926E25E833324EDD4D34CC797139F0E3EE810E33C3F3780BC2EED44156D86E
31,681,504 UART: [art] SIG.S = 2286101076F4676EF7F05446A6D9E1F8CFE2C1E97AEF271B8B23CAB982B343BBC04985DBFE68DC64648B241F68190479
32,987,173 UART: Caliptra RT
32,987,889 UART: [state] CFI Enabled
33,105,727 UART: [rt] RT listening for mailbox commands...
33,108,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,139,096 UART: [rt]cmd =0x41545348, len=116
33,141,411 >>> mbox cmd response data (12 bytes)
35,189,959 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,079,200 >>> mbox cmd response: success
43,079,693 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,114,202 UART:
43,114,515 UART: Running Caliptra FMC ...
43,115,642 UART:
43,115,803 UART: [state] CFI Enabled
43,159,717 UART: [art] Extend RT PCRs Done
43,160,856 UART: [art] Lock RT PCRs Done
43,162,409 UART: [art] Populate DV Done
43,168,012 UART: [fht] FMC Alias Private Key: 7
43,169,872 UART: [art] Derive CDI
43,170,646 UART: [art] Store in in slot 0x4
43,213,208 UART: [art] Derive Key Pair
43,214,210 UART: [art] Store priv key in slot 0x5
46,456,459 UART: [art] Derive Key Pair - Done
46,469,345 UART: [art] Signing Cert with AUTHO
46,470,646 UART: RITY.KEYID = 7
48,749,816 UART: [art] Erasing AUTHORITY.KEYID = 7
48,751,349 UART: [art] PUB.X = 0310C0CF83CCD0E2F593F010910B1C69AA5DAEDD1331AC8EA9F1D1445FABF3A57E3B72B38FE61FF996C6D94F27B0FCAF
48,758,635 UART: [art] PUB.Y = 448C9529D86869A53BB87BC476B63E9228B0AAB3217D580B26B1425505B86723735A2E136D721E451C7D592C74DF14AC
48,765,798 UART: [art] SIG.R = 77A7E58761FC7F1C4C1F1A645351841D28135DDE0F08AEA2D0352E08CE222FCA8C3742165B9B31C1EB14C20A7A686345
48,773,205 UART: [art] SIG.S = AD4605DE2D3452F39B4B2F3CF549EAE6AF824F4B55930A97A26A65EB8CEAA1CDE08AC3C49BFC23099910B7AE22F162D0
50,077,756 UART: mbox::rt_entry...
50,078,734 UART: ____ _ _ _ ____ _____
50,080,723 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,082,729 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,084,661 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,086,594 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,088,522 UART: |_|
50,089,334 UART:
50,376,427 UART: [rt] Runtime listening for mailbox commands...
50,378,550 >>> mbox cmd response data (48 bytes)
50,379,125 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,381,449 >>> mbox cmd response data (48 bytes)
50,382,336 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,394,886 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,513 UART:
192,892 UART: Running Caliptra ROM ...
194,094 UART:
194,252 UART: [state] CFI Enabled
265,843 UART: [state] LifecycleState = Unprovisioned
267,752 UART: [state] DebugLocked = No
269,379 UART: [state] WD Timer not started. Device not locked for debugging
272,915 UART: [kat] SHA2-256
452,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,618 UART: [kat] ++
464,065 UART: [kat] sha1
476,571 UART: [kat] SHA2-256
479,580 UART: [kat] SHA2-384
485,004 UART: [kat] SHA2-512-ACC
487,941 UART: [kat] ECC-384
2,950,563 UART: [kat] HMAC-384Kdf
2,972,974 UART: [kat] LMS
3,502,431 UART: [kat] --
3,507,908 UART: [cold-reset] ++
3,509,125 UART: [fht] FHT @ 0x50003400
3,520,680 UART: [idev] ++
3,521,250 UART: [idev] CDI.KEYID = 6
3,522,164 UART: [idev] SUBJECT.KEYID = 7
3,523,340 UART: [idev] UDS.KEYID = 0
3,524,264 ready_for_fw is high
3,524,474 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,384 UART: [idev] Erasing UDS.KEYID = 0
6,026,534 UART: [idev] Sha1 KeyId Algorithm
6,049,510 UART: [idev] --
6,054,481 UART: [ldev] ++
6,055,055 UART: [ldev] CDI.KEYID = 6
6,055,987 UART: [ldev] SUBJECT.KEYID = 5
6,057,156 UART: [ldev] AUTHORITY.KEYID = 7
6,058,392 UART: [ldev] FE.KEYID = 1
6,102,153 UART: [ldev] Erasing FE.KEYID = 1
8,606,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,570 UART: [ldev] --
10,414,738 UART: [fwproc] Wait for Commands...
10,417,476 UART: [fwproc] Recv command 0x46574c44
10,419,568 UART: [fwproc] Recv'd Img size: 114360 bytes
13,821,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,279,702 >>> mbox cmd response: success
14,283,399 UART: [afmc] ++
14,284,002 UART: [afmc] CDI.KEYID = 6
14,284,923 UART: [afmc] SUBJECT.KEYID = 7
14,286,086 UART: [afmc] AUTHORITY.KEYID = 5
16,808,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,346 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,304 UART: [afmc] --
18,608,818 UART: [cold-reset] --
18,613,929 UART: [state] Locking Datavault
18,618,313 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,960 UART: [state] Locking ICCM
18,621,103 UART: [exit] Launching FMC @ 0x40000130
18,629,504 UART:
18,629,743 UART: Running Caliptra FMC ...
18,630,844 UART:
18,630,999 UART: [state] CFI Enabled
18,691,791 UART: [fht] FMC Alias Private Key: 7
20,455,905 UART: [art] Extend RT PCRs Done
20,457,124 UART: [art] Lock RT PCRs Done
20,458,718 UART: [art] Populate DV Done
20,464,130 UART: [fht] FMC Alias Private Key: 7
20,465,826 UART: [art] Derive CDI
20,466,637 UART: [art] Store in in slot 0x4
20,524,543 UART: [art] Derive Key Pair
20,525,587 UART: [art] Store priv key in slot 0x5
22,988,695 UART: [art] Derive Key Pair - Done
23,001,792 UART: [art] Signing Cert with AUTHO
23,003,116 UART: RITY.KEYID = 7
24,714,386 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,890 UART: [art] PUB.X = 51595E704C1B59D02F307EB26FA80F26671DA99184CDED09E1C6FCAC33257710179C7AB9FE4750F1B1E9CD0E74AE5013
24,723,174 UART: [art] PUB.Y = 2403F0C213B36486299540698B51B97F7A27C1C87CEC0C843C3507BBB32DA01AC6DFC61BEBE01135E01A8F53023D1EBC
24,730,440 UART: [art] SIG.R = 05E2489D1FC9F99AEF466DCF227DB6A2D8F6E81919332CCBF5A6AD34704EDEFC568C7C253740D60FFBC24DE087AEBBA5
24,737,876 UART: [art] SIG.S = B9570A3A5990351D31FCD947EE9F39FA1C3578127A8F610F2581626B0B60026E3F4CDBE9DB9BC77B05C88B03421311C6
25,717,219 UART: Caliptra RT
25,717,923 UART: [state] CFI Enabled
25,881,998 UART: [rt] RT listening for mailbox commands...
25,884,365 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,915,206 UART: [rt]cmd =0x41545348, len=116
25,917,458 >>> mbox cmd response data (12 bytes)
27,967,091 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,067,859 UART:
28,068,228 UART: Running Caliptra ROM ...
28,069,327 UART:
28,069,493 UART: [state] CFI Enabled
28,124,308 UART: [state] LifecycleState = Unprovisioned
28,126,194 UART: [state] DebugLocked = No
28,128,607 UART: [state] WD Timer not started. Device not locked for debugging
28,131,763 UART: [kat] SHA2-256
28,310,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,322,461 UART: [kat] ++
28,322,916 UART: [kat] sha1
28,333,364 UART: [kat] SHA2-256
28,336,418 UART: [kat] SHA2-384
28,342,522 UART: [kat] SHA2-512-ACC
28,345,474 UART: [kat] ECC-384
30,809,268 UART: [kat] HMAC-384Kdf
30,831,927 UART: [kat] LMS
31,361,383 UART: [kat] --
31,365,845 UART: [update-reset] ++
34,365,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,368,771 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
34,626,726 >>> mbox cmd response: success
34,627,084 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,628,124 UART: [update-reset] Copying MAN_2 To MAN_1
34,650,448 UART: [update-reset Success] --
34,653,476 UART: [state] Locking Datavault
34,656,745 UART: [state] Locking PCR0, PCR1 and PCR31
34,658,399 UART: [state] Locking ICCM
34,659,713 UART: [exit] Launching FMC @ 0x40000130
34,668,106 UART:
34,668,341 UART: Running Caliptra FMC ...
34,669,465 UART:
34,669,630 UART: [state] CFI Enabled
34,769,605 UART: [art] Extend RT PCRs Done
34,770,789 UART: [art] Lock RT PCRs Done
34,772,191 UART: [art] Populate DV Done
34,777,709 UART: [fht] FMC Alias Private Key: 7
34,779,414 UART: [art] Derive CDI
34,780,235 UART: [art] Store in in slot 0x4
34,838,376 UART: [art] Derive Key Pair
34,839,429 UART: [art] Store priv key in slot 0x5
37,302,250 UART: [art] Derive Key Pair - Done
37,315,466 UART: [art] Signing Cert with AUTHO
37,316,774 UART: RITY.KEYID = 7
39,028,384 UART: [art] Erasing AUTHORITY.KEYID = 7
39,029,895 UART: [art] PUB.X = 4A278DA4E4FFDD79149AE354E66B899F3F3D423D04E1F8D391C7D9AA47ACA80238DCEF0A34741B00C8FA88E21BB16ED1
39,037,198 UART: [art] PUB.Y = D8D1C851DA7E0294C9FA348BA14BF8F16CEB34CD67398DB6C216C5E0B51852CB9252604BC3F6D6C05B42E5CD37805F3C
39,044,441 UART: [art] SIG.R = 7AF1C2DA56B9FE7DEA9696B47CB9D23955E05ACCB9A0CA503BC5C9490D81FA1D9B0700D6A07E2AFC62F903081AC15277
39,051,869 UART: [art] SIG.S = 8205783F2C23C3AE23EC81CBF411A288CA8CD968DAB9C3379766096245DF0DA0777B0D56883C61F9891583FB90F2DAC2
40,030,291 UART: mbox::rt_entry...
40,031,272 UART: ____ _ _ _ ____ _____
40,033,268 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,035,281 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,037,220 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,039,154 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,041,009 UART: |_|
40,041,893 UART:
40,324,715 UART: [rt] Runtime listening for mailbox commands...
40,326,870 >>> mbox cmd response data (48 bytes)
40,327,453 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,329,763 >>> mbox cmd response data (48 bytes)
40,330,630 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,343,172 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,462 UART:
192,832 UART: Running Caliptra ROM ...
194,032 UART:
194,197 UART: [state] CFI Enabled
261,936 UART: [state] LifecycleState = Unprovisioned
264,343 UART: [state] DebugLocked = No
265,884 UART: [state] WD Timer not started. Device not locked for debugging
270,697 UART: [kat] SHA2-256
460,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,378 UART: [kat] ++
471,825 UART: [kat] sha1
482,125 UART: [kat] SHA2-256
485,146 UART: [kat] SHA2-384
492,272 UART: [kat] SHA2-512-ACC
494,853 UART: [kat] ECC-384
2,948,247 UART: [kat] HMAC-384Kdf
2,970,445 UART: [kat] LMS
3,502,195 UART: [kat] --
3,507,486 UART: [cold-reset] ++
3,509,493 UART: [fht] FHT @ 0x50003400
3,520,616 UART: [idev] ++
3,521,255 UART: [idev] CDI.KEYID = 6
3,522,243 UART: [idev] SUBJECT.KEYID = 7
3,523,413 UART: [idev] UDS.KEYID = 0
3,524,336 ready_for_fw is high
3,524,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,468 UART: [idev] Erasing UDS.KEYID = 0
6,026,011 UART: [idev] Sha1 KeyId Algorithm
6,049,682 UART: [idev] --
6,054,943 UART: [ldev] ++
6,055,629 UART: [ldev] CDI.KEYID = 6
6,056,545 UART: [ldev] SUBJECT.KEYID = 5
6,057,703 UART: [ldev] AUTHORITY.KEYID = 7
6,058,938 UART: [ldev] FE.KEYID = 1
6,099,991 UART: [ldev] Erasing FE.KEYID = 1
8,604,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,096 UART: [ldev] --
10,414,737 UART: [fwproc] Wait for Commands...
10,417,316 UART: [fwproc] Recv command 0x46574c44
10,419,625 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,751 >>> mbox cmd response: success
14,605,122 UART: [afmc] ++
14,605,837 UART: [afmc] CDI.KEYID = 6
14,607,094 UART: [afmc] SUBJECT.KEYID = 7
14,608,446 UART: [afmc] AUTHORITY.KEYID = 5
17,148,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,718 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,859 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,322 UART: [afmc] --
18,945,497 UART: [cold-reset] --
18,948,687 UART: [state] Locking Datavault
18,953,631 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,781 UART: [state] Locking ICCM
18,957,829 UART: [exit] Launching FMC @ 0x40000130
18,966,523 UART:
18,966,758 UART: Running Caliptra FMC ...
18,967,860 UART:
18,968,016 UART: [state] CFI Enabled
19,030,376 UART: [fht] FMC Alias Private Key: 7
20,794,351 UART: [art] Extend RT PCRs Done
20,795,572 UART: [art] Lock RT PCRs Done
20,797,381 UART: [art] Populate DV Done
20,802,739 UART: [fht] FMC Alias Private Key: 7
20,804,275 UART: [art] Derive CDI
20,805,036 UART: [art] Store in in slot 0x4
20,863,483 UART: [art] Derive Key Pair
20,864,540 UART: [art] Store priv key in slot 0x5
23,327,267 UART: [art] Derive Key Pair - Done
23,340,319 UART: [art] Signing Cert with AUTHO
23,341,625 UART: RITY.KEYID = 7
25,053,676 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,186 UART: [art] PUB.X = DF5957BF8EA120EA7CCD28C2444C4ADA981D42BEF54BBAC465515F74F77EE91887B5D0D62602849E509B1E1AE99B7C87
25,062,473 UART: [art] PUB.Y = 8DA925EA5FDECD64E4AF5CE3B2DF46F932AE3EC78EE3F8854EE0E8DA95407D518D7A4721A19C0C8F300D84BC3AFC92ED
25,069,754 UART: [art] SIG.R = 1CB66D3031D05275B7855FAC26CE7F530D5D28790840A487BA673C7D52942F43011279D341E2FD5BDE9B6012E0B58623
25,077,131 UART: [art] SIG.S = 76E1B61F56E84645BCF059C5121962FF5F9F8DEF0135AC1F6DC4004F2BDB418A6573126963BDCED29A49800DABB949A4
26,055,603 UART: Caliptra RT
26,056,301 UART: [state] CFI Enabled
26,222,346 UART: [rt] RT listening for mailbox commands...
26,224,734 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,255,631 UART: [rt]cmd =0x41545348, len=116
26,257,727 >>> mbox cmd response data (12 bytes)
28,311,086 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,411,679 UART:
28,412,044 UART: Running Caliptra ROM ...
28,413,123 UART:
28,413,281 UART: [state] CFI Enabled
28,487,844 UART: [state] LifecycleState = Unprovisioned
28,489,892 UART: [state] DebugLocked = No
28,492,364 UART: [state] WD Timer not started. Device not locked for debugging
28,496,608 UART: [kat] SHA2-256
28,686,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,697,256 UART: [kat] ++
28,697,745 UART: [kat] sha1
28,709,602 UART: [kat] SHA2-256
28,712,583 UART: [kat] SHA2-384
28,719,339 UART: [kat] SHA2-512-ACC
28,721,906 UART: [kat] ECC-384
31,173,249 UART: [kat] HMAC-384Kdf
31,194,243 UART: [kat] LMS
31,725,807 UART: [kat] --
31,729,611 UART: [update-reset] ++
34,745,445 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,748,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,142,198 >>> mbox cmd response: success
35,142,570 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,143,345 UART: [update-reset] Copying MAN_2 To MAN_1
35,180,963 UART: [update-reset Success] --
35,185,179 UART: [state] Locking Datavault
35,189,793 UART: [state] Locking PCR0, PCR1 and PCR31
35,191,994 UART: [state] Locking ICCM
35,193,821 UART: [exit] Launching FMC @ 0x40000130
35,202,493 UART:
35,202,730 UART: Running Caliptra FMC ...
35,203,755 UART:
35,203,902 UART: [state] CFI Enabled
35,301,865 UART: [art] Extend RT PCRs Done
35,303,047 UART: [art] Lock RT PCRs Done
35,304,805 UART: [art] Populate DV Done
35,310,265 UART: [fht] FMC Alias Private Key: 7
35,311,963 UART: [art] Derive CDI
35,312,776 UART: [art] Store in in slot 0x4
35,370,716 UART: [art] Derive Key Pair
35,371,754 UART: [art] Store priv key in slot 0x5
37,834,846 UART: [art] Derive Key Pair - Done
37,847,568 UART: [art] Signing Cert with AUTHO
37,848,869 UART: RITY.KEYID = 7
39,560,738 UART: [art] Erasing AUTHORITY.KEYID = 7
39,562,242 UART: [art] PUB.X = C76448A52D3489A50E02ACA1400CC029AEAD543F58A0A8A84A63DF994695DF607A92EB29FAC0CF67136A90AB25028C6A
39,569,535 UART: [art] PUB.Y = 4E407BF180D2137D0A10269B0644BCBA840415E94614D2589CC916D9D839E3E163ACD6AD80DA8DAB764923DF46AD96C6
39,576,776 UART: [art] SIG.R = 8084B8A54F740DC0644166DB799D34DBE98450DB3F4EE1248F78997F1CA6656D917E8A95A7E9C1F523CE0E773829F617
39,584,162 UART: [art] SIG.S = 4366CF4E0745A59FD5FD4E7CD4BD965B194D1CBD2C2CC9CBAC32167FDE9CB33A2E706A5DB5ADA12EF722756B3D00487B
40,562,761 UART: mbox::rt_entry...
40,563,712 UART: ____ _ _ _ ____ _____
40,565,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,567,649 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,569,504 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,571,431 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,573,315 UART: |_|
40,574,198 UART:
40,858,454 UART: [rt] Runtime listening for mailbox commands...
40,860,591 >>> mbox cmd response data (48 bytes)
40,861,169 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,863,508 >>> mbox cmd response data (48 bytes)
40,864,370 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,876,962 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,439,270 ready_for_fw is high
3,439,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,725,526 >>> mbox cmd response: success
19,005,807 UART:
19,006,281 UART: Running Caliptra FMC ...
19,007,414 UART:
19,007,574 UART: [state] CFI Enabled
19,075,212 UART: [fht] FMC Alias Private Key: 7
20,838,768 UART: [art] Extend RT PCRs Done
20,839,994 UART: [art] Lock RT PCRs Done
20,841,683 UART: [art] Populate DV Done
20,847,314 UART: [fht] FMC Alias Private Key: 7
20,849,021 UART: [art] Derive CDI
20,849,843 UART: [art] Store in in slot 0x4
20,908,197 UART: [art] Derive Key Pair
20,909,242 UART: [art] Store priv key in slot 0x5
23,372,270 UART: [art] Derive Key Pair - Done
23,385,319 UART: [art] Signing Cert with AUTHO
23,386,631 UART: RITY.KEYID = 7
25,097,967 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,487 UART: [art] PUB.X = F2032495D238E1ED3AA61679B750A4D77D574F56B4AF97DA5A8FBA7E68C55F6AEA653C03B330F88D0971FD1759863219
25,106,741 UART: [art] PUB.Y = 82374A8D8F2FCF8E2D312FE0FD8059AA7DEC3EEA13007CB307A79155E7283FA5CF8520F8226C013155D45E540C65AB1A
25,113,972 UART: [art] SIG.R = D49222786E75A7381E8878BA49666D2785C17768B8C8552B0520C252378D742D045F195882F705A2E2A941B749D44FE9
25,121,301 UART: [art] SIG.S = EDBFBB4BDC5261DD79CC292F81501DB728B8918CF8BD2CAEEFD04A142163C7B2F4BD09E3A7F56B381F178EEBC5064DF5
26,100,921 UART: Caliptra RT
26,101,643 UART: [state] CFI Enabled
26,265,065 UART: [rt] RT listening for mailbox commands...
26,267,459 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,298,448 UART: [rt]cmd =0x41545348, len=116
26,300,826 >>> mbox cmd response data (12 bytes)
28,351,334 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,327,933 >>> mbox cmd response: success
35,328,418 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,359,744 UART:
35,360,046 UART: Running Caliptra FMC ...
35,361,172 UART:
35,361,335 UART: [state] CFI Enabled
35,449,924 UART: [art] Extend RT PCRs Done
35,451,107 UART: [art] Lock RT PCRs Done
35,452,839 UART: [art] Populate DV Done
35,458,475 UART: [fht] FMC Alias Private Key: 7
35,459,973 UART: [art] Derive CDI
35,460,746 UART: [art] Store in in slot 0x4
35,519,107 UART: [art] Derive Key Pair
35,520,102 UART: [art] Store priv key in slot 0x5
37,983,010 UART: [art] Derive Key Pair - Done
37,996,066 UART: [art] Signing Cert with AUTHO
37,997,382 UART: RITY.KEYID = 7
39,708,860 UART: [art] Erasing AUTHORITY.KEYID = 7
39,710,381 UART: [art] PUB.X = A77B3A0A2CB9099F79156E7171DF383056338505240D5A0F31321EB6A731AC996F547091821C1504974EDE93CAFE84FE
39,717,668 UART: [art] PUB.Y = 25EEB832A8D3167AC0132B90C35C9603871CAD5E8FCC18175FD353FE1E41A92AEF59AF33A6C03F7E5FFEC81AC1E96E39
39,724,893 UART: [art] SIG.R = D41C8D716ADD9AB8E352531E964F6FE7ADC767FAF2A8907FD8AFC38BBD277D09194B8B7F41487E88770372EE44E90435
39,732,331 UART: [art] SIG.S = 2A9CCDD06D97F9F78B0F726800BCCCA905F94ED7BCA35E233E1B17C460B231CE0AD53EDAAF9AA5379D229C237088A604
40,710,621 UART: mbox::rt_entry...
40,711,592 UART: ____ _ _ _ ____ _____
40,713,523 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,715,534 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,717,471 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,719,399 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,721,329 UART: |_|
40,722,163 UART:
41,004,938 UART: [rt] Runtime listening for mailbox commands...
41,007,044 >>> mbox cmd response data (48 bytes)
41,007,619 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,009,939 >>> mbox cmd response data (48 bytes)
41,010,760 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,023,308 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,588 UART:
192,958 UART: Running Caliptra ROM ...
194,088 UART:
603,866 UART: [state] CFI Enabled
616,899 UART: [state] LifecycleState = Unprovisioned
619,265 UART: [state] DebugLocked = No
621,070 UART: [state] WD Timer not started. Device not locked for debugging
626,552 UART: [kat] SHA2-256
816,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,193 UART: [kat] ++
827,712 UART: [kat] sha1
839,142 UART: [kat] SHA2-256
842,171 UART: [kat] SHA2-384
847,240 UART: [kat] SHA2-512-ACC
849,885 UART: [kat] ECC-384
3,290,366 UART: [kat] HMAC-384Kdf
3,302,740 UART: [kat] LMS
3,834,538 UART: [kat] --
3,839,487 UART: [cold-reset] ++
3,840,995 UART: [fht] FHT @ 0x50003400
3,853,318 UART: [idev] ++
3,854,028 UART: [idev] CDI.KEYID = 6
3,855,012 UART: [idev] SUBJECT.KEYID = 7
3,856,206 UART: [idev] UDS.KEYID = 0
3,857,131 ready_for_fw is high
3,857,323 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,950 UART: [idev] Erasing UDS.KEYID = 0
6,333,610 UART: [idev] Sha1 KeyId Algorithm
6,355,484 UART: [idev] --
6,359,237 UART: [ldev] ++
6,359,979 UART: [ldev] CDI.KEYID = 6
6,360,865 UART: [ldev] SUBJECT.KEYID = 5
6,361,976 UART: [ldev] AUTHORITY.KEYID = 7
6,363,263 UART: [ldev] FE.KEYID = 1
6,374,152 UART: [ldev] Erasing FE.KEYID = 1
8,849,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,168 UART: [ldev] --
10,639,007 UART: [fwproc] Wait for Commands...
10,640,620 UART: [fwproc] Recv command 0x46574c44
10,642,925 UART: [fwproc] Recv'd Img size: 114360 bytes
14,091,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,829,958 >>> mbox cmd response: success
14,833,559 UART: [afmc] ++
14,834,267 UART: [afmc] CDI.KEYID = 6
14,835,509 UART: [afmc] SUBJECT.KEYID = 7
14,836,942 UART: [afmc] AUTHORITY.KEYID = 5
17,339,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,600 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,284 UART: [afmc] --
19,136,715 UART: [cold-reset] --
19,140,195 UART: [state] Locking Datavault
19,144,902 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,083 UART: [state] Locking ICCM
19,148,542 UART: [exit] Launching FMC @ 0x40000130
19,157,161 UART:
19,157,394 UART: Running Caliptra FMC ...
19,158,416 UART:
19,158,560 UART: [state] CFI Enabled
19,166,654 UART: [fht] FMC Alias Private Key: 7
20,923,687 UART: [art] Extend RT PCRs Done
20,924,898 UART: [art] Lock RT PCRs Done
20,926,503 UART: [art] Populate DV Done
20,931,639 UART: [fht] FMC Alias Private Key: 7
20,933,171 UART: [art] Derive CDI
20,933,900 UART: [art] Store in in slot 0x4
20,976,270 UART: [art] Derive Key Pair
20,977,262 UART: [art] Store priv key in slot 0x5
23,404,205 UART: [art] Derive Key Pair - Done
23,417,105 UART: [art] Signing Cert with AUTHO
23,418,404 UART: RITY.KEYID = 7
25,124,132 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,635 UART: [art] PUB.X = 90326726D9368CFA6DFC73E9CBEBD3BFFFD1D4981FC5137F9565E3DB9EC7D6255DDDA8BD8344227AB3C4F025A57063E1
25,132,938 UART: [art] PUB.Y = 901F8CB97EAE79A1B53D770A5EEA00D64BFD6F8933B6E388BC8CF6B0E42B62CE8824E7C1556272E313AB5328FCDEF3F0
25,140,184 UART: [art] SIG.R = 5A89D63E098EA95F249D05D2B54FEB2F54706CFFBB03338967CFB382EFCEF710A4C3D9500C590AF1588572D49D23DE09
25,147,744 UART: [art] SIG.S = E97650A3CC951D764982EBC17BFCCB86B331F7EA845A773B02FF2BAC78E2D0D2506C618E098BD5DF46E13B9F9C6AAE3B
26,126,588 UART: Caliptra RT
26,127,281 UART: [state] CFI Enabled
26,245,543 UART: [rt] RT listening for mailbox commands...
26,247,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,278,574 UART: [rt]cmd =0x41545348, len=116
26,280,861 >>> mbox cmd response data (12 bytes)
28,330,763 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,431,582 UART:
28,431,960 UART: Running Caliptra ROM ...
28,433,090 UART:
28,433,264 UART: [state] CFI Enabled
28,445,802 UART: [state] LifecycleState = Unprovisioned
28,447,688 UART: [state] DebugLocked = No
28,450,361 UART: [state] WD Timer not started. Device not locked for debugging
28,454,291 UART: [kat] SHA2-256
28,644,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,654,913 UART: [kat] ++
28,655,428 UART: [kat] sha1
28,666,472 UART: [kat] SHA2-256
28,669,458 UART: [kat] SHA2-384
28,675,830 UART: [kat] SHA2-512-ACC
28,678,454 UART: [kat] ECC-384
31,121,220 UART: [kat] HMAC-384Kdf
31,133,887 UART: [kat] LMS
31,665,524 UART: [kat] --
31,671,186 UART: [update-reset] ++
34,698,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,701,597 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,094,928 >>> mbox cmd response: success
35,095,296 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,096,300 UART: [update-reset] Copying MAN_2 To MAN_1
35,133,857 UART: [update-reset Success] --
35,138,408 UART: [state] Locking Datavault
35,141,378 UART: [state] Locking PCR0, PCR1 and PCR31
35,143,511 UART: [state] Locking ICCM
35,146,305 UART: [exit] Launching FMC @ 0x40000130
35,154,956 UART:
35,155,200 UART: Running Caliptra FMC ...
35,156,301 UART:
35,156,459 UART: [state] CFI Enabled
35,200,357 UART: [art] Extend RT PCRs Done
35,201,498 UART: [art] Lock RT PCRs Done
35,203,156 UART: [art] Populate DV Done
35,208,666 UART: [fht] FMC Alias Private Key: 7
35,210,258 UART: [art] Derive CDI
35,211,065 UART: [art] Store in in slot 0x4
35,253,635 UART: [art] Derive Key Pair
35,254,698 UART: [art] Store priv key in slot 0x5
37,681,595 UART: [art] Derive Key Pair - Done
37,694,473 UART: [art] Signing Cert with AUTHO
37,695,780 UART: RITY.KEYID = 7
39,401,380 UART: [art] Erasing AUTHORITY.KEYID = 7
39,402,897 UART: [art] PUB.X = A948E5485F9D28F41C71D2ABE5AED1D6016FC355C205EEF4A7D5BDDBD464323DCACD908DA5009C1240118B648DE4F29F
39,410,148 UART: [art] PUB.Y = 35B3CDB8C975455D5D0C41C23C3C1A773F515B4610E5D3268397188414CD2E55B9FE3CD70C8F5911418EDC7B71861C15
39,417,444 UART: [art] SIG.R = 5CFBFB13D804AE4FC1FA1745A55B383CB8B77E1E32A1D913A475A4C6964E09F5C0ED7F1F4F260EB028B1E884C87016A4
39,424,842 UART: [art] SIG.S = A1713D1FA636EF210B350ACEF665E43B7FAAF44471F555F1200359FF2E21E55162B024A262A7E1D14FCED3EF59A343C6
40,402,952 UART: mbox::rt_entry...
40,404,232 UART: ____ _ _ _ ____ _____
40,406,192 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,408,197 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,410,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,412,052 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,414,002 UART: |_|
40,414,838 UART:
40,701,846 UART: [rt] Runtime listening for mailbox commands...
40,703,963 >>> mbox cmd response data (48 bytes)
40,704,677 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,707,066 >>> mbox cmd response data (48 bytes)
40,707,938 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,720,536 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,753,810 ready_for_fw is high
3,754,191 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,964,073 >>> mbox cmd response: success
19,214,315 UART:
19,214,714 UART: Running Caliptra FMC ...
19,215,907 UART:
19,216,083 UART: [state] CFI Enabled
19,223,978 UART: [fht] FMC Alias Private Key: 7
20,981,057 UART: [art] Extend RT PCRs Done
20,982,281 UART: [art] Lock RT PCRs Done
20,983,986 UART: [art] Populate DV Done
20,989,395 UART: [fht] FMC Alias Private Key: 7
20,990,880 UART: [art] Derive CDI
20,991,647 UART: [art] Store in in slot 0x4
21,034,236 UART: [art] Derive Key Pair
21,035,239 UART: [art] Store priv key in slot 0x5
23,461,844 UART: [art] Derive Key Pair - Done
23,474,999 UART: [art] Signing Cert with AUTHO
23,476,298 UART: RITY.KEYID = 7
25,182,145 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,676 UART: [art] PUB.X = E9A65A41C7558340F8B847473867FE013C619A4A970B364F22463F21DCCEF6D9CBE560D87AD26235247CA06A6D580A9C
25,190,889 UART: [art] PUB.Y = 119F9ED2F47FC1D0044F0E32D9B0F34F19924788D06AEDD0BB03B67627B88447BDA49E53B3A7EE4EC174FECAC09D437A
25,198,201 UART: [art] SIG.R = 068ECF46559DC7E8434542C7F8FD927DE0C7E13EACF1D5664A32547387AB82E637524B42001985D5752D090EDC3CDA25
25,205,564 UART: [art] SIG.S = 61E3776BD7E22AC5126DEAE23025AF0D514FAF29BE7F6E51873DBA35BED536DB914577AB261EA9EFCAA55DE32A988EB4
26,184,566 UART: Caliptra RT
26,185,255 UART: [state] CFI Enabled
26,303,069 UART: [rt] RT listening for mailbox commands...
26,305,445 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,336,321 UART: [rt]cmd =0x41545348, len=116
26,338,664 >>> mbox cmd response data (12 bytes)
28,387,590 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,306,200 >>> mbox cmd response: success
35,307,111 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,341,941 UART:
35,342,226 UART: Running Caliptra FMC ...
35,343,344 UART:
35,343,502 UART: [state] CFI Enabled
35,387,041 UART: [art] Extend RT PCRs Done
35,388,233 UART: [art] Lock RT PCRs Done
35,389,869 UART: [art] Populate DV Done
35,395,108 UART: [fht] FMC Alias Private Key: 7
35,396,804 UART: [art] Derive CDI
35,397,538 UART: [art] Store in in slot 0x4
35,440,466 UART: [art] Derive Key Pair
35,441,511 UART: [art] Store priv key in slot 0x5
37,867,729 UART: [art] Derive Key Pair - Done
37,880,574 UART: [art] Signing Cert with AUTHO
37,881,878 UART: RITY.KEYID = 7
39,587,094 UART: [art] Erasing AUTHORITY.KEYID = 7
39,588,603 UART: [art] PUB.X = 1DD1D16B6D00CCB2F2DA10C78D2C8593FC5F938A7B74E56BBD013DC515EDDD214C54DF907BF1A68A82B81005C8CDE14E
39,595,848 UART: [art] PUB.Y = 29764FF47787F55B6C57DB37907093C92B458FD59A7500912089935655B85CD61CF110C6DAC6C75F9D7ACBBF51B89888
39,603,117 UART: [art] SIG.R = 7AA50E3D4910F0445810D57C4ED4D562831E2AC672CDD74917A29FA999239C3951CAE2D6F83561DB501FD6F8124FE8C9
39,610,519 UART: [art] SIG.S = 826EC2DA03FE0F7262D67C25C04DBBF663F82F62C951CDAAE36EEDDC2695C883737A77A3905B1AB4DAD9D586F443DBCF
40,589,664 UART: mbox::rt_entry...
40,590,616 UART: ____ _ _ _ ____ _____
40,592,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,594,601 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,596,527 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,598,454 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,600,378 UART: |_|
40,601,184 UART:
40,888,963 UART: [rt] Runtime listening for mailbox commands...
40,891,060 >>> mbox cmd response data (48 bytes)
40,891,651 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,893,989 >>> mbox cmd response data (48 bytes)
40,894,851 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,907,396 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,780 UART: [state] LifecycleState = Unprovisioned
86,435 UART: [state] DebugLocked = No
87,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,715 UART: [kat] SHA2-256
882,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,761 UART: [kat] ++
886,913 UART: [kat] sha1
891,233 UART: [kat] SHA2-256
893,171 UART: [kat] SHA2-384
895,812 UART: [kat] SHA2-512-ACC
897,713 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,625 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 ready_for_fw is high
1,481,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,900 UART: [idev] Erasing UDS.KEYID = 0
1,505,200 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,479 UART: [ldev] Erasing FE.KEYID = 1
1,546,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,632 UART: [ldev] --
1,586,057 UART: [fwproc] Waiting for Commands...
1,586,886 UART: [fwproc] Received command 0x46574c44
1,587,677 UART: [fwproc] Received Image of size 114360 bytes
2,886,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,678 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,919 >>> mbox cmd response: success
3,078,963 UART: [afmc] ++
3,079,131 UART: [afmc] CDI.KEYID = 6
3,079,493 UART: [afmc] SUBJECT.KEYID = 7
3,079,918 UART: [afmc] AUTHORITY.KEYID = 5
3,115,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,077 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,805 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,690 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,380 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,419 UART: [afmc] --
3,158,545 UART: [cold-reset] --
3,159,483 UART: [state] Locking Datavault
3,160,480 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,084 UART: [state] Locking ICCM
3,161,640 UART: [exit] Launching FMC @ 0x40000130
3,166,969 UART:
3,166,985 UART: Running Caliptra FMC ...
3,167,393 UART:
3,167,447 UART: [state] CFI Enabled
3,177,782 UART: [fht] FMC Alias Private Key: 7
3,285,787 UART: [art] Extend RT PCRs Done
3,286,215 UART: [art] Lock RT PCRs Done
3,287,543 UART: [art] Populate DV Done
3,295,660 UART: [fht] FMC Alias Private Key: 7
3,296,812 UART: [art] Derive CDI
3,297,092 UART: [art] Store in in slot 0x4
3,382,833 UART: [art] Derive Key Pair
3,383,193 UART: [art] Store priv key in slot 0x5
3,396,427 UART: [art] Derive Key Pair - Done
3,411,656 UART: [art] Signing Cert with AUTHO
3,412,136 UART: RITY.KEYID = 7
3,427,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,907 UART: [art] PUB.X = A5E5C9D84AA90CA2DCCFE4AD1007A073811E0A99EBF02BDC8F38F72A24E049E9B2AA41491B88E18F65EBE8AFBA7EBFA5
3,434,698 UART: [art] PUB.Y = 3FA94D28283FCDE060A7640435B3D96E35E07D94A1203582C321CDFEE28A68EDDA397F114274E34E919FCF092F5DA090
3,441,648 UART: [art] SIG.R = F9185002EED16F335936067EBFD4F12DC04674DB361F1A1A43B9BA82A730C0699FF193873CEE42F96DEDD7A4A61E484A
3,448,422 UART: [art] SIG.S = D6DD53DB86C96B43C817533CC8573CC9317A7D5DCAB992F03F3CE964D6B11DC6C6C5CF70F1F364A937AC1EBB3567BDB1
3,471,787 UART: Caliptra RT
3,472,041 UART: [state] CFI Enabled
3,579,712 UART: [rt] RT listening for mailbox commands...
3,580,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,669 UART: [rt]cmd =0x41545348, len=116
3,612,324 >>> mbox cmd response data (12 bytes)
3,612,325 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,268 UART:
3,613,284 UART: Running Caliptra ROM ...
3,613,692 UART:
3,613,746 UART: [state] CFI Enabled
3,616,594 UART: [state] LifecycleState = Unprovisioned
3,617,249 UART: [state] DebugLocked = No
3,617,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,430 UART: [kat] SHA2-256
4,413,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,476 UART: [kat] ++
4,417,628 UART: [kat] sha1
4,421,790 UART: [kat] SHA2-256
4,423,728 UART: [kat] SHA2-384
4,426,449 UART: [kat] SHA2-512-ACC
4,428,349 UART: [kat] ECC-384
4,434,258 UART: [kat] HMAC-384Kdf
4,438,878 UART: [kat] LMS
5,007,074 UART: [kat] --
5,007,957 UART: [update-reset] ++
5,934,258 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,935,322 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,031,648 >>> mbox cmd response: success
6,031,648 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,031,997 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,011 UART: [update-reset Success] --
6,040,810 UART: [state] Locking Datavault
6,041,522 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,126 UART: [state] Locking ICCM
6,042,610 UART: [exit] Launching FMC @ 0x40000130
6,047,939 UART:
6,047,955 UART: Running Caliptra FMC ...
6,048,363 UART:
6,048,417 UART: [state] CFI Enabled
6,137,544 UART: [art] Extend RT PCRs Done
6,137,972 UART: [art] Lock RT PCRs Done
6,139,355 UART: [art] Populate DV Done
6,147,824 UART: [fht] FMC Alias Private Key: 7
6,148,796 UART: [art] Derive CDI
6,149,076 UART: [art] Store in in slot 0x4
6,235,153 UART: [art] Derive Key Pair
6,235,513 UART: [art] Store priv key in slot 0x5
6,248,651 UART: [art] Derive Key Pair - Done
6,263,564 UART: [art] Signing Cert with AUTHO
6,264,044 UART: RITY.KEYID = 7
6,279,572 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,337 UART: [art] PUB.X = 3F1962481FCC2F9406746806EC2476563764D0F518C638D7DF90E7F51DA93E62F41E186CEC68AFA458A7AA0C647C2FA3
6,287,102 UART: [art] PUB.Y = FDC6CFB316604BF64BC3761039612D1B1AACB40123DAD3AF8CFA2FEF5CE84F22642380079BFFE39FAD5BF92A7BA2FE2C
6,294,074 UART: [art] SIG.R = 797A46F6151A44065E0B086F29880CADFA47EED87265E182230083885D9ED1871A1F9CCE6888DB774ADEB4C00D45EE60
6,300,811 UART: [art] SIG.S = 95F8103D94CEE6BF87F3D6D8B8C8E2BB6B5AFC22DBFB84EC1A66EB8E510E086890E1401BA3A28A875554CF51F1342B2A
6,324,638 UART: mbox::rt_entry...
6,325,010 UART: ____ _ _ _ ____ _____
6,325,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,326,594 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,327,362 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,328,130 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,328,898 UART: |_|
6,329,210 UART:
6,607,880 UART: [rt] Runtime listening for mailbox commands...
6,609,051 >>> mbox cmd response data (48 bytes)
6,609,052 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,611,835 >>> mbox cmd response data (48 bytes)
6,611,836 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,624,773 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,499 ready_for_fw is high
1,361,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,995 >>> mbox cmd response: success
2,987,639 UART:
2,987,655 UART: Running Caliptra FMC ...
2,988,063 UART:
2,988,117 UART: [state] CFI Enabled
2,998,478 UART: [fht] FMC Alias Private Key: 7
3,105,939 UART: [art] Extend RT PCRs Done
3,106,367 UART: [art] Lock RT PCRs Done
3,108,173 UART: [art] Populate DV Done
3,116,360 UART: [fht] FMC Alias Private Key: 7
3,117,348 UART: [art] Derive CDI
3,117,628 UART: [art] Store in in slot 0x4
3,203,253 UART: [art] Derive Key Pair
3,203,613 UART: [art] Store priv key in slot 0x5
3,216,301 UART: [art] Derive Key Pair - Done
3,230,886 UART: [art] Signing Cert with AUTHO
3,231,366 UART: RITY.KEYID = 7
3,246,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,137 UART: [art] PUB.X = E4C456EAFF8812AF5DD4B2330B8AF2961EDC17737579894879476341D6B48B9ABE882B0C3A5C0D96047336CC33EB298A
3,253,899 UART: [art] PUB.Y = 4F91E2F78428F0D308CA1811F6D130E81B19A71B4BAFBCAA96FEBC908FB1FC07332190FF51EF771B05D5B5C8F8B71133
3,260,854 UART: [art] SIG.R = ECB65031B6E26E970BA0071FC590424D061A1A5625A354C56277FA59987239B685DAE460E7C76B136B6A979DB107F7D3
3,267,610 UART: [art] SIG.S = FAE143996A6C45D852C0F84C69869B90604718B2D700B2BFA48B3E1D9E37460386D38B4CE999C05351C123330118D601
3,291,798 UART: Caliptra RT
3,292,052 UART: [state] CFI Enabled
3,400,505 UART: [rt] RT listening for mailbox commands...
3,401,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,588 UART: [rt]cmd =0x41545348, len=116
3,433,181 >>> mbox cmd response data (12 bytes)
3,433,182 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,642 >>> mbox cmd response: success
5,732,642 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,745,947 UART:
5,745,963 UART: Running Caliptra FMC ...
5,746,371 UART:
5,746,425 UART: [state] CFI Enabled
5,835,476 UART: [art] Extend RT PCRs Done
5,835,904 UART: [art] Lock RT PCRs Done
5,837,341 UART: [art] Populate DV Done
5,845,498 UART: [fht] FMC Alias Private Key: 7
5,846,558 UART: [art] Derive CDI
5,846,838 UART: [art] Store in in slot 0x4
5,932,169 UART: [art] Derive Key Pair
5,932,529 UART: [art] Store priv key in slot 0x5
5,945,625 UART: [art] Derive Key Pair - Done
5,960,267 UART: [art] Signing Cert with AUTHO
5,960,747 UART: RITY.KEYID = 7
5,975,719 UART: [art] Erasing AUTHORITY.KEYID = 7
5,976,484 UART: [art] PUB.X = 10459C5936826DA696ED82F5E1E6E0394675124CFC6F0A12AAE2C825E7BE0E76A5BEC0C64D0E5FEAD1E144241AA7AEF6
5,983,261 UART: [art] PUB.Y = 0C18DF9D7C393F220CFBFB4A5DCDD2F19F0BAC3766CFEB53693B58A293476119EA9621CDAAAD0AD01E00D61BFD5B24D4
5,990,203 UART: [art] SIG.R = B00D7F4AB6E7DDED83234B2160F1F0CF1135F4AC974419591870FC4850D2875776EC6661C35651C86779B7999D49C24F
5,996,966 UART: [art] SIG.S = 5EBF683DF2E844392A1BE3AC583FB78A1F4FFB153394107D1D0AB9D5B7F09ED451D4978A0A465C6E89165CB9285C212E
6,021,209 UART: mbox::rt_entry...
6,021,581 UART: ____ _ _ _ ____ _____
6,022,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,023,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,023,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,024,701 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,025,469 UART: |_|
6,025,781 UART:
6,304,773 UART: [rt] Runtime listening for mailbox commands...
6,305,944 >>> mbox cmd response data (48 bytes)
6,305,945 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,308,728 >>> mbox cmd response data (48 bytes)
6,308,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,321,666 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,454 UART: [kat] SHA2-256
892,392 UART: [kat] SHA2-384
894,913 UART: [kat] SHA2-512-ACC
896,814 UART: [kat] ECC-384
902,121 UART: [kat] HMAC-384Kdf
906,711 UART: [kat] LMS
1,474,907 UART: [kat] --
1,475,764 UART: [cold-reset] ++
1,476,248 UART: [fht] Storing FHT @ 0x50003400
1,479,061 UART: [idev] ++
1,479,229 UART: [idev] CDI.KEYID = 6
1,479,589 UART: [idev] SUBJECT.KEYID = 7
1,480,013 UART: [idev] UDS.KEYID = 0
1,480,358 ready_for_fw is high
1,480,358 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,995 UART: [idev] Erasing UDS.KEYID = 0
1,504,887 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,397 UART: [idev] --
1,514,544 UART: [ldev] ++
1,514,712 UART: [ldev] CDI.KEYID = 6
1,515,075 UART: [ldev] SUBJECT.KEYID = 5
1,515,501 UART: [ldev] AUTHORITY.KEYID = 7
1,515,964 UART: [ldev] FE.KEYID = 1
1,521,664 UART: [ldev] Erasing FE.KEYID = 1
1,547,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,681 UART: [ldev] --
1,587,122 UART: [fwproc] Waiting for Commands...
1,587,973 UART: [fwproc] Received command 0x46574c44
1,588,764 UART: [fwproc] Received Image of size 114360 bytes
2,887,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,639 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,894 >>> mbox cmd response: success
3,082,066 UART: [afmc] ++
3,082,234 UART: [afmc] CDI.KEYID = 6
3,082,596 UART: [afmc] SUBJECT.KEYID = 7
3,083,021 UART: [afmc] AUTHORITY.KEYID = 5
3,118,662 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,123 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,813 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,732 UART: [afmc] --
3,161,780 UART: [cold-reset] --
3,162,660 UART: [state] Locking Datavault
3,164,073 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,677 UART: [state] Locking ICCM
3,165,123 UART: [exit] Launching FMC @ 0x40000130
3,170,452 UART:
3,170,468 UART: Running Caliptra FMC ...
3,170,876 UART:
3,171,019 UART: [state] CFI Enabled
3,181,728 UART: [fht] FMC Alias Private Key: 7
3,290,111 UART: [art] Extend RT PCRs Done
3,290,539 UART: [art] Lock RT PCRs Done
3,292,231 UART: [art] Populate DV Done
3,300,220 UART: [fht] FMC Alias Private Key: 7
3,301,316 UART: [art] Derive CDI
3,301,596 UART: [art] Store in in slot 0x4
3,387,259 UART: [art] Derive Key Pair
3,387,619 UART: [art] Store priv key in slot 0x5
3,400,761 UART: [art] Derive Key Pair - Done
3,415,330 UART: [art] Signing Cert with AUTHO
3,415,810 UART: RITY.KEYID = 7
3,431,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,033 UART: [art] PUB.X = D9C545AC920394954E9A600ABE0A6FD1E6778A1C93F77AA5B2DDA412304F84C535836873A16DD582FB57827A9F1E6D64
3,438,798 UART: [art] PUB.Y = 8BAB1FB543855FD7B60CC9B315D488E62A0F93467EA0297D5C0C368C2D043FF2D9FE558FB4BD7D87E54C25C44C8F143F
3,445,750 UART: [art] SIG.R = 66AAA02C6077CD2E270957A68ECFF03D4E1A73F46FCFE7B6A23E917C74F539975F574771375FE91D2A6C069223205815
3,452,514 UART: [art] SIG.S = 7FD26738E17D45138D1297E7E189F3656B659F626CCB4DC47F4004543F7C7DAD407FFF0B7C59FF01974565BB9BB54E3C
3,475,970 UART: Caliptra RT
3,476,316 UART: [state] CFI Enabled
3,584,541 UART: [rt] RT listening for mailbox commands...
3,585,211 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,448 UART: [rt]cmd =0x41545348, len=116
3,617,259 >>> mbox cmd response data (12 bytes)
3,617,260 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,347 UART:
3,618,363 UART: Running Caliptra ROM ...
3,618,771 UART:
3,618,912 UART: [state] CFI Enabled
3,621,942 UART: [state] LifecycleState = Unprovisioned
3,622,597 UART: [state] DebugLocked = No
3,623,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,624,708 UART: [kat] SHA2-256
4,418,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,422,754 UART: [kat] ++
4,422,906 UART: [kat] sha1
4,427,312 UART: [kat] SHA2-256
4,429,250 UART: [kat] SHA2-384
4,431,879 UART: [kat] SHA2-512-ACC
4,433,779 UART: [kat] ECC-384
4,439,152 UART: [kat] HMAC-384Kdf
4,443,878 UART: [kat] LMS
5,012,074 UART: [kat] --
5,013,343 UART: [update-reset] ++
5,937,638 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,938,690 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,035,016 >>> mbox cmd response: success
6,035,016 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,035,195 UART: [update-reset] Copying MAN_2 To MAN_1
6,043,209 UART: [update-reset Success] --
6,044,340 UART: [state] Locking Datavault
6,045,250 UART: [state] Locking PCR0, PCR1 and PCR31
6,045,854 UART: [state] Locking ICCM
6,046,440 UART: [exit] Launching FMC @ 0x40000130
6,051,769 UART:
6,051,785 UART: Running Caliptra FMC ...
6,052,193 UART:
6,052,336 UART: [state] CFI Enabled
6,141,379 UART: [art] Extend RT PCRs Done
6,141,807 UART: [art] Lock RT PCRs Done
6,142,896 UART: [art] Populate DV Done
6,151,173 UART: [fht] FMC Alias Private Key: 7
6,152,297 UART: [art] Derive CDI
6,152,577 UART: [art] Store in in slot 0x4
6,238,206 UART: [art] Derive Key Pair
6,238,566 UART: [art] Store priv key in slot 0x5
6,251,632 UART: [art] Derive Key Pair - Done
6,266,334 UART: [art] Signing Cert with AUTHO
6,266,814 UART: RITY.KEYID = 7
6,281,840 UART: [art] Erasing AUTHORITY.KEYID = 7
6,282,605 UART: [art] PUB.X = 1F952457AA1B6794F32275702D03D9388DFD083AB8AA3C06161998033BFAD8761D39718CC77522D00EEAD24DE1D8F3F0
6,289,362 UART: [art] PUB.Y = 49D0024F91D11BA9C9DB6E14CE6A4B1C0C8F013079B064816A5B8F05CD96981D1D6B84DE295A2427A88FAEFCDF8AE06E
6,296,316 UART: [art] SIG.R = B5C812A1AFD892053E48F3931586DCFDD6EAF8D90F1DD64836EBBECB0A82A715D196941F0108975F7C3D8DCC3590A465
6,303,083 UART: [art] SIG.S = A592DD5465AD0C92AE483D332557040FD5CD101186FF66C6171E3A5C3BCF90364124143B446BD4D27178FAB3C2B4DB98
6,327,011 UART: mbox::rt_entry...
6,327,383 UART: ____ _ _ _ ____ _____
6,328,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,328,967 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,329,735 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,330,503 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,331,271 UART: |_|
6,331,583 UART:
6,614,336 UART: [rt] Runtime listening for mailbox commands...
6,615,507 >>> mbox cmd response data (48 bytes)
6,615,508 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,618,291 >>> mbox cmd response data (48 bytes)
6,618,292 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,631,229 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,666 ready_for_fw is high
1,362,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,612 >>> mbox cmd response: success
2,991,936 UART:
2,991,952 UART: Running Caliptra FMC ...
2,992,360 UART:
2,992,503 UART: [state] CFI Enabled
3,003,182 UART: [fht] FMC Alias Private Key: 7
3,111,045 UART: [art] Extend RT PCRs Done
3,111,473 UART: [art] Lock RT PCRs Done
3,113,273 UART: [art] Populate DV Done
3,121,600 UART: [fht] FMC Alias Private Key: 7
3,122,656 UART: [art] Derive CDI
3,122,936 UART: [art] Store in in slot 0x4
3,208,451 UART: [art] Derive Key Pair
3,208,811 UART: [art] Store priv key in slot 0x5
3,222,237 UART: [art] Derive Key Pair - Done
3,236,980 UART: [art] Signing Cert with AUTHO
3,237,460 UART: RITY.KEYID = 7
3,252,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,689 UART: [art] PUB.X = 482F23D0C13EE18EB3D5A2D8E62156944128633E262106F99E9D8B5A6CC555E3DF17D415C6255255052A5AD54DF66C8D
3,260,453 UART: [art] PUB.Y = DEFBF98334E9993001DE4891E1BE41FA16940B04FAB70AC3D661A2672F04838C1655C69F47B6D9297C981754B2A6FDA7
3,267,392 UART: [art] SIG.R = 5A8253F88FEE1652E536FD6CE6AB484354625A8FCE654A6443D2DB0DC5DF85351AF42E7391A414D87DA45E9CE4DF4456
3,274,169 UART: [art] SIG.S = 3898E77A6F5985B9D3CDD3640C719409C2C8BDEDB77E8E069A8C81170B48470B9CCE20B70193A11A1189AD5A291B710E
3,297,755 UART: Caliptra RT
3,298,101 UART: [state] CFI Enabled
3,406,532 UART: [rt] RT listening for mailbox commands...
3,407,202 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,613 UART: [rt]cmd =0x41545348, len=116
3,439,434 >>> mbox cmd response data (12 bytes)
3,439,435 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,739,881 >>> mbox cmd response: success
5,739,881 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,753,210 UART:
5,753,226 UART: Running Caliptra FMC ...
5,753,634 UART:
5,753,777 UART: [state] CFI Enabled
5,842,622 UART: [art] Extend RT PCRs Done
5,843,050 UART: [art] Lock RT PCRs Done
5,844,399 UART: [art] Populate DV Done
5,852,452 UART: [fht] FMC Alias Private Key: 7
5,853,438 UART: [art] Derive CDI
5,853,718 UART: [art] Store in in slot 0x4
5,939,459 UART: [art] Derive Key Pair
5,939,819 UART: [art] Store priv key in slot 0x5
5,952,687 UART: [art] Derive Key Pair - Done
5,967,670 UART: [art] Signing Cert with AUTHO
5,968,150 UART: RITY.KEYID = 7
5,984,016 UART: [art] Erasing AUTHORITY.KEYID = 7
5,984,781 UART: [art] PUB.X = AB6832AA92B992BA838C2196D6D4FBF4545F9A7F880D522DA8160FB1B2A994DD64F8A83028B144B852FE7447D4172147
5,991,547 UART: [art] PUB.Y = B96067671F3147C346889B0F98BD3A8C86198F328C36D149C79C6B0ABA6142632308A6740D2CDB52584AF6EC22920147
5,998,474 UART: [art] SIG.R = 61A292C4108A4CDCE7935A080B3EAD64966D78C10725D5EA2D6DF479FD9D30564FBDA27A72A6343A2593903FECD5F4F7
6,005,245 UART: [art] SIG.S = 975978815E2046A842ABDB3155E1ABEFB624E0E8CAC56CCD08AD0F70855B4D486B2494C474AA48335E9DC71827647CF2
6,028,494 UART: mbox::rt_entry...
6,028,866 UART: ____ _ _ _ ____ _____
6,029,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,030,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,031,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,031,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,032,754 UART: |_|
6,033,066 UART:
6,315,352 UART: [rt] Runtime listening for mailbox commands...
6,316,523 >>> mbox cmd response data (48 bytes)
6,316,524 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,319,307 >>> mbox cmd response data (48 bytes)
6,319,308 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,332,245 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
893,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,443 UART: [kat] ++
897,595 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
917,956 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,723 UART: [cold-reset] ++
1,172,067 UART: [fht] FHT @ 0x50003400
1,174,680 UART: [idev] ++
1,174,848 UART: [idev] CDI.KEYID = 6
1,175,208 UART: [idev] SUBJECT.KEYID = 7
1,175,632 UART: [idev] UDS.KEYID = 0
1,175,977 ready_for_fw is high
1,175,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,457 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,243,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,564 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,002 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,708 >>> mbox cmd response: success
2,774,792 UART: [afmc] ++
2,774,960 UART: [afmc] CDI.KEYID = 6
2,775,322 UART: [afmc] SUBJECT.KEYID = 7
2,775,747 UART: [afmc] AUTHORITY.KEYID = 5
2,810,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,331 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,059 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,944 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,663 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,417 UART: [afmc] --
2,854,503 UART: [cold-reset] --
2,855,373 UART: [state] Locking Datavault
2,856,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,220 UART: [state] Locking ICCM
2,857,866 UART: [exit] Launching FMC @ 0x40000130
2,863,195 UART:
2,863,211 UART: Running Caliptra FMC ...
2,863,619 UART:
2,863,673 UART: [state] CFI Enabled
2,874,506 UART: [fht] FMC Alias Private Key: 7
2,982,937 UART: [art] Extend RT PCRs Done
2,983,365 UART: [art] Lock RT PCRs Done
2,985,183 UART: [art] Populate DV Done
2,993,494 UART: [fht] FMC Alias Private Key: 7
2,994,558 UART: [art] Derive CDI
2,994,838 UART: [art] Store in in slot 0x4
3,080,965 UART: [art] Derive Key Pair
3,081,325 UART: [art] Store priv key in slot 0x5
3,094,579 UART: [art] Derive Key Pair - Done
3,109,686 UART: [art] Signing Cert with AUTHO
3,110,166 UART: RITY.KEYID = 7
3,125,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,235 UART: [art] PUB.X = 33E52E06AD8647D919395562A91A4F93236C6D319DEDF7A35665EF670E330D0C8F636C4B9A9F6033CDB63FACDDA6B8EA
3,133,005 UART: [art] PUB.Y = 86D49B3F9D4B95026E75B69C1EE47B9C2EDB4FC3C6CD0D7897F2F0D14CE7AF3A299FE7FD21F44F04E978BCAEA1562EAE
3,139,972 UART: [art] SIG.R = CF29D4E1931662CB434055E187C994518346C0AB67A9D092BAB64839E7448345C68CBE7E38100CCA321123F5DEB4490F
3,146,734 UART: [art] SIG.S = 17852D149E1DABF5E9F66A172E3E2229EF1DE40CE0C36A19B516B8E1D1F9BFF89E4CDA5774DA6D6A9AC7CD505D97A9E3
3,170,750 UART: Caliptra RT
3,171,004 UART: [state] CFI Enabled
3,278,150 UART: [rt] RT listening for mailbox commands...
3,278,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,041 UART: [rt]cmd =0x41545348, len=116
3,310,934 >>> mbox cmd response data (12 bytes)
3,310,935 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,861 UART:
3,311,877 UART: Running Caliptra ROM ...
3,312,285 UART:
3,312,340 UART: [state] CFI Enabled
3,314,732 UART: [state] LifecycleState = Unprovisioned
3,315,387 UART: [state] DebugLocked = No
3,316,099 UART: [state] WD Timer not started. Device not locked for debugging
3,317,303 UART: [kat] SHA2-256
4,122,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,127,078 UART: [kat] ++
4,127,230 UART: [kat] sha1
4,131,488 UART: [kat] SHA2-256
4,133,428 UART: [kat] SHA2-384
4,136,229 UART: [kat] SHA2-512-ACC
4,138,129 UART: [kat] ECC-384
4,147,768 UART: [kat] HMAC-384Kdf
4,152,468 UART: [kat] LMS
4,400,796 UART: [kat] --
4,401,742 UART: [update-reset] ++
5,306,001 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,307,024 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,403,298 >>> mbox cmd response: success
5,403,298 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,403,435 UART: [update-reset] Copying MAN_2 To MAN_1
5,411,449 UART: [update-reset Success] --
5,412,464 UART: [state] Locking Datavault
5,413,098 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,702 UART: [state] Locking ICCM
5,414,128 UART: [exit] Launching FMC @ 0x40000130
5,419,457 UART:
5,419,473 UART: Running Caliptra FMC ...
5,419,881 UART:
5,419,935 UART: [state] CFI Enabled
5,508,722 UART: [art] Extend RT PCRs Done
5,509,150 UART: [art] Lock RT PCRs Done
5,510,341 UART: [art] Populate DV Done
5,518,674 UART: [fht] FMC Alias Private Key: 7
5,519,736 UART: [art] Derive CDI
5,520,016 UART: [art] Store in in slot 0x4
5,605,855 UART: [art] Derive Key Pair
5,606,215 UART: [art] Store priv key in slot 0x5
5,619,889 UART: [art] Derive Key Pair - Done
5,634,501 UART: [art] Signing Cert with AUTHO
5,634,981 UART: RITY.KEYID = 7
5,649,807 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,572 UART: [art] PUB.X = D4EEFC1AEA97582F941F2EAD8FB2496D5784EE733BFB9D379528B807F8849568D2C8CF1F7FFA7B58F113299B9CAC93C5
5,657,355 UART: [art] PUB.Y = 2E38EEF5F02D289CDB70DC794FDF301DD6949B10C371379614D04C410CB49E704570519EF77A1DA39B854A5B1DE49B7C
5,664,310 UART: [art] SIG.R = 31CD6DB3ABA35AB2F285366472FA254ACEEC8A09B1CE9D1C41527A5BBD7EA1B453D66E2BD2FA537A2C48EEFC5AB72A37
5,671,105 UART: [art] SIG.S = 4EA11B597B64800037D3BD7067F380912DD572004BA8A12F055831DE0F9AD5E95F50ACFACC7CDC908F73CE026DADD720
5,695,121 UART: mbox::rt_entry...
5,695,493 UART: ____ _ _ _ ____ _____
5,696,277 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,697,077 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,698,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,699,381 UART: |_|
5,699,693 UART:
5,979,719 UART: [rt] Runtime listening for mailbox commands...
5,980,890 >>> mbox cmd response data (48 bytes)
5,980,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,983,674 >>> mbox cmd response data (48 bytes)
5,983,675 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,996,612 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,991 ready_for_fw is high
1,059,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,265 >>> mbox cmd response: success
2,687,287 UART:
2,687,303 UART: Running Caliptra FMC ...
2,687,711 UART:
2,687,765 UART: [state] CFI Enabled
2,698,280 UART: [fht] FMC Alias Private Key: 7
2,805,833 UART: [art] Extend RT PCRs Done
2,806,261 UART: [art] Lock RT PCRs Done
2,807,975 UART: [art] Populate DV Done
2,816,298 UART: [fht] FMC Alias Private Key: 7
2,817,456 UART: [art] Derive CDI
2,817,736 UART: [art] Store in in slot 0x4
2,903,327 UART: [art] Derive Key Pair
2,903,687 UART: [art] Store priv key in slot 0x5
2,917,287 UART: [art] Derive Key Pair - Done
2,932,245 UART: [art] Signing Cert with AUTHO
2,932,725 UART: RITY.KEYID = 7
2,947,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,664 UART: [art] PUB.X = EE62640203254C76DB9159EBEF8383FE29C9B421C9C1EA4505D9B7834688698EF5CD072A0363D5483232B1D270F3091D
2,955,412 UART: [art] PUB.Y = F472DBA14010354DC889A1E85169ED1E96290CCFA394238833299A2DCC15D009C30C394BE895D70455091813BB4D71D2
2,962,343 UART: [art] SIG.R = 4ACA2DE5E892C471B417737578C5846CC0C1207A73ACC6DC70084976736770B49080AE86FC852F4F4FBF56F52E160AB4
2,969,109 UART: [art] SIG.S = 37C65FFA3663F5754D2872F81A101CE2913A12713C92AC36B635C3B0A8204B2C501579BF4D3C76630DE536018F356702
2,993,657 UART: Caliptra RT
2,993,911 UART: [state] CFI Enabled
3,101,319 UART: [rt] RT listening for mailbox commands...
3,101,989 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,366 UART: [rt]cmd =0x41545348, len=116
3,134,227 >>> mbox cmd response data (12 bytes)
3,134,228 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,046 >>> mbox cmd response: success
5,110,046 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,123,078 UART:
5,123,094 UART: Running Caliptra FMC ...
5,123,502 UART:
5,123,556 UART: [state] CFI Enabled
5,212,487 UART: [art] Extend RT PCRs Done
5,212,915 UART: [art] Lock RT PCRs Done
5,214,296 UART: [art] Populate DV Done
5,222,747 UART: [fht] FMC Alias Private Key: 7
5,223,753 UART: [art] Derive CDI
5,224,033 UART: [art] Store in in slot 0x4
5,309,444 UART: [art] Derive Key Pair
5,309,804 UART: [art] Store priv key in slot 0x5
5,323,168 UART: [art] Derive Key Pair - Done
5,337,757 UART: [art] Signing Cert with AUTHO
5,338,237 UART: RITY.KEYID = 7
5,353,513 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,278 UART: [art] PUB.X = FD4EB043287D38827D77489D2B3E38DB91A5219667D7BA49C23DC7C5FF82EA9ACAB4B9DEA8BE6DD0EE1E8CE3F20FCDA6
5,361,073 UART: [art] PUB.Y = 76F581E9C88B57ECE09FEF536EA0A9E1A164A056011598F2295E2B9687028C16381418CE6526FA178CBAE015B11BDAFA
5,368,023 UART: [art] SIG.R = CF75F08F182B8CB11001FA48C4743A1A623B4B719F8F38720709B3D12C99D9D0002C66470D9EF9B373BC664EA94D6117
5,374,759 UART: [art] SIG.S = 3E9B19D5B082B5DC9EEFEEDCCC5AD0A9D97C7C721C9FFB247EA9F326CC19512D5E420020B5E75982EE545884C050FA0C
5,398,087 UART: mbox::rt_entry...
5,398,459 UART: ____ _ _ _ ____ _____
5,399,243 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,400,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,811 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,347 UART: |_|
5,402,659 UART:
5,682,543 UART: [rt] Runtime listening for mailbox commands...
5,683,714 >>> mbox cmd response data (48 bytes)
5,683,715 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,686,498 >>> mbox cmd response data (48 bytes)
5,686,499 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,699,436 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,783 UART: [kat] HMAC-384Kdf
923,367 UART: [kat] LMS
1,171,695 UART: [kat] --
1,172,310 UART: [cold-reset] ++
1,172,886 UART: [fht] FHT @ 0x50003400
1,175,493 UART: [idev] ++
1,175,661 UART: [idev] CDI.KEYID = 6
1,176,021 UART: [idev] SUBJECT.KEYID = 7
1,176,445 UART: [idev] UDS.KEYID = 0
1,176,790 ready_for_fw is high
1,176,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,310 UART: [idev] --
1,211,332 UART: [ldev] ++
1,211,500 UART: [ldev] CDI.KEYID = 6
1,211,863 UART: [ldev] SUBJECT.KEYID = 5
1,212,289 UART: [ldev] AUTHORITY.KEYID = 7
1,212,752 UART: [ldev] FE.KEYID = 1
1,218,146 UART: [ldev] Erasing FE.KEYID = 1
1,244,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,124 UART: [ldev] --
1,283,611 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,737 >>> mbox cmd response: success
2,776,861 UART: [afmc] ++
2,777,029 UART: [afmc] CDI.KEYID = 6
2,777,391 UART: [afmc] SUBJECT.KEYID = 7
2,777,816 UART: [afmc] AUTHORITY.KEYID = 5
2,812,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,924 UART: [afmc] --
2,855,860 UART: [cold-reset] --
2,856,530 UART: [state] Locking Datavault
2,857,595 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,199 UART: [state] Locking ICCM
2,858,637 UART: [exit] Launching FMC @ 0x40000130
2,863,966 UART:
2,863,982 UART: Running Caliptra FMC ...
2,864,390 UART:
2,864,533 UART: [state] CFI Enabled
2,875,232 UART: [fht] FMC Alias Private Key: 7
2,982,751 UART: [art] Extend RT PCRs Done
2,983,179 UART: [art] Lock RT PCRs Done
2,984,585 UART: [art] Populate DV Done
2,992,802 UART: [fht] FMC Alias Private Key: 7
2,993,770 UART: [art] Derive CDI
2,994,050 UART: [art] Store in in slot 0x4
3,079,779 UART: [art] Derive Key Pair
3,080,139 UART: [art] Store priv key in slot 0x5
3,093,109 UART: [art] Derive Key Pair - Done
3,107,951 UART: [art] Signing Cert with AUTHO
3,108,431 UART: RITY.KEYID = 7
3,123,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,190 UART: [art] PUB.X = 6DE389CAB7BCC245B2FB64D1C5A4474CE71BC652CB189CF867A96A2C79617C557B3F6B34D987AA35FD3C0B151ED242C2
3,130,973 UART: [art] PUB.Y = DCCD7597ABC24AD43BEE985D35E37C5620AABEBD95D009A7DCADCBCCDC453DD30DA7DF65228B39CB7AAE1456A5C7F5CF
3,137,955 UART: [art] SIG.R = 92EA50BC6CA4D2A3447AA8C7F41A129EE0A8F98FBCF3AE36F876080EADC34E6BB7AEC582C2E9B664E8C01744872911D1
3,144,737 UART: [art] SIG.S = 1421AEA22C1FC6AC078D2CEAE6BAD39B6FA06F7E4E865A14ADDD8FF4D6A175B7296F1AB88E479141303A7579B9451167
3,168,595 UART: Caliptra RT
3,168,941 UART: [state] CFI Enabled
3,277,185 UART: [rt] RT listening for mailbox commands...
3,277,855 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,186 UART: [rt]cmd =0x41545348, len=116
3,309,773 >>> mbox cmd response data (12 bytes)
3,309,774 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,552 UART:
3,310,568 UART: Running Caliptra ROM ...
3,310,976 UART:
3,311,118 UART: [state] CFI Enabled
3,313,790 UART: [state] LifecycleState = Unprovisioned
3,314,445 UART: [state] DebugLocked = No
3,315,097 UART: [state] WD Timer not started. Device not locked for debugging
3,316,411 UART: [kat] SHA2-256
4,122,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,186 UART: [kat] ++
4,126,338 UART: [kat] sha1
4,130,498 UART: [kat] SHA2-256
4,132,438 UART: [kat] SHA2-384
4,135,059 UART: [kat] SHA2-512-ACC
4,136,959 UART: [kat] ECC-384
4,147,176 UART: [kat] HMAC-384Kdf
4,151,732 UART: [kat] LMS
4,400,060 UART: [kat] --
4,400,966 UART: [update-reset] ++
5,302,973 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,998 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,400,272 >>> mbox cmd response: success
5,400,272 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,400,441 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,455 UART: [update-reset Success] --
5,409,578 UART: [state] Locking Datavault
5,410,310 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,914 UART: [state] Locking ICCM
5,411,414 UART: [exit] Launching FMC @ 0x40000130
5,416,743 UART:
5,416,759 UART: Running Caliptra FMC ...
5,417,167 UART:
5,417,310 UART: [state] CFI Enabled
5,506,365 UART: [art] Extend RT PCRs Done
5,506,793 UART: [art] Lock RT PCRs Done
5,507,880 UART: [art] Populate DV Done
5,516,197 UART: [fht] FMC Alias Private Key: 7
5,517,225 UART: [art] Derive CDI
5,517,505 UART: [art] Store in in slot 0x4
5,602,958 UART: [art] Derive Key Pair
5,603,318 UART: [art] Store priv key in slot 0x5
5,616,070 UART: [art] Derive Key Pair - Done
5,630,666 UART: [art] Signing Cert with AUTHO
5,631,146 UART: RITY.KEYID = 7
5,646,682 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,447 UART: [art] PUB.X = 837E76F813EBEB7508B70A5C5300691C5CBA269F736D62054843ACB7CEC3AA96AC9E0B20A1CC9EE707793E182F542D19
5,654,188 UART: [art] PUB.Y = 59AC1039BA0E91908487B48675FE9DB57D360C7C8D91DE425E6D09E4F7175B66216FA300E909B86C0A36646644B4E877
5,661,097 UART: [art] SIG.R = 8C45FDDA664B765D716080CE396A7DF74368BAC3D103A1A644AA67E7FFF688D1ED5EEB3AF4C245EC090B170D846FDEC5
5,667,875 UART: [art] SIG.S = 96E0C4CDCEB298545985507AE67EDA8CEF8832D888D91412921F5D8C00D9CB9E3382AFD72F0C644AEF788E785863EF76
5,691,337 UART: mbox::rt_entry...
5,691,709 UART: ____ _ _ _ ____ _____
5,692,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,293 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,829 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,597 UART: |_|
5,695,909 UART:
5,974,286 UART: [rt] Runtime listening for mailbox commands...
5,975,457 >>> mbox cmd response data (48 bytes)
5,975,458 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,978,241 >>> mbox cmd response data (48 bytes)
5,978,242 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,991,179 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,304 ready_for_fw is high
1,060,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,340 >>> mbox cmd response: success
2,689,510 UART:
2,689,526 UART: Running Caliptra FMC ...
2,689,934 UART:
2,690,077 UART: [state] CFI Enabled
2,700,688 UART: [fht] FMC Alias Private Key: 7
2,809,113 UART: [art] Extend RT PCRs Done
2,809,541 UART: [art] Lock RT PCRs Done
2,811,199 UART: [art] Populate DV Done
2,819,558 UART: [fht] FMC Alias Private Key: 7
2,820,500 UART: [art] Derive CDI
2,820,780 UART: [art] Store in in slot 0x4
2,906,441 UART: [art] Derive Key Pair
2,906,801 UART: [art] Store priv key in slot 0x5
2,919,859 UART: [art] Derive Key Pair - Done
2,934,589 UART: [art] Signing Cert with AUTHO
2,935,069 UART: RITY.KEYID = 7
2,950,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,572 UART: [art] PUB.X = 8BB54B77DD40E2B5594560771C87350BD2004B6BCDC05F6E2FC9B6AB482B1F6E9D5015E5E95191A5ADA78A7C5CB7C56D
2,958,331 UART: [art] PUB.Y = 6F37F55C35BA2658CDFCDC98619C61486B94FC3C58C8E2B0B33D80A2F460ECEAA2873EF3CD3AAB5783FD46C9C1BEDB57
2,965,305 UART: [art] SIG.R = 7BD7945B64706CFA0758952D33D88D3F0D3F2E92595338D7953E42134F13E23787A8FE06E39EB9044D31E292D3D2FC20
2,972,059 UART: [art] SIG.S = 3B34A6B5D65648D229B899E75EFD5247D4254140DA0FA76C5A461366519A9267369049B422BD32402F4B904CB60CCD1A
2,996,080 UART: Caliptra RT
2,996,426 UART: [state] CFI Enabled
3,103,148 UART: [rt] RT listening for mailbox commands...
3,103,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,217 UART: [rt]cmd =0x41545348, len=116
3,136,018 >>> mbox cmd response data (12 bytes)
3,136,019 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,111,684 >>> mbox cmd response: success
5,111,684 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,125,116 UART:
5,125,132 UART: Running Caliptra FMC ...
5,125,540 UART:
5,125,683 UART: [state] CFI Enabled
5,214,968 UART: [art] Extend RT PCRs Done
5,215,396 UART: [art] Lock RT PCRs Done
5,216,575 UART: [art] Populate DV Done
5,225,062 UART: [fht] FMC Alias Private Key: 7
5,226,050 UART: [art] Derive CDI
5,226,330 UART: [art] Store in in slot 0x4
5,311,879 UART: [art] Derive Key Pair
5,312,239 UART: [art] Store priv key in slot 0x5
5,325,115 UART: [art] Derive Key Pair - Done
5,340,006 UART: [art] Signing Cert with AUTHO
5,340,486 UART: RITY.KEYID = 7
5,356,180 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,945 UART: [art] PUB.X = B9A0535EEAB96B24102BD0E6CE8D29672DBB00C2B7ED8A5F2771FC015844AAA27BF38386200EDB1C8025D54129F38CE5
5,363,699 UART: [art] PUB.Y = 4C519D378AD12BAC306E033A057956BB555909024BB981DF6AB67B8BF5080DED95EE1C8930241B117A92FC9C203C2AB8
5,370,637 UART: [art] SIG.R = 41D43048CC896BBF09EC7D262421884A98B214C0D9456FF556CE601F877D60EDB334031C27574685E1B9BC3B0AE12819
5,377,396 UART: [art] SIG.S = 939C0FFB037DAA82A799186B259C7CD33E3B65872BE78129885658A5DEB7CC330E1B7152006ED68369867643323C2944
5,401,362 UART: mbox::rt_entry...
5,401,734 UART: ____ _ _ _ ____ _____
5,402,518 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,403,318 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,854 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,405,622 UART: |_|
5,405,934 UART:
5,690,156 UART: [rt] Runtime listening for mailbox commands...
5,691,327 >>> mbox cmd response data (48 bytes)
5,691,328 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,694,111 >>> mbox cmd response data (48 bytes)
5,694,112 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,707,049 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,336 UART: [state] LifecycleState = Unprovisioned
84,991 UART: [state] DebugLocked = No
85,643 UART: [state] WD Timer not started. Device not locked for debugging
86,910 UART: [kat] SHA2-256
890,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,589 UART: [kat] ++
894,741 UART: [kat] sha1
899,109 UART: [kat] SHA2-256
901,049 UART: [kat] SHA2-384
903,826 UART: [kat] SHA2-512-ACC
905,727 UART: [kat] ECC-384
914,810 UART: [kat] HMAC-384Kdf
919,396 UART: [kat] LMS
1,167,708 UART: [kat] --
1,168,661 UART: [cold-reset] ++
1,169,017 UART: [fht] FHT @ 0x50003400
1,171,825 UART: [idev] ++
1,171,993 UART: [idev] CDI.KEYID = 6
1,172,354 UART: [idev] SUBJECT.KEYID = 7
1,172,779 UART: [idev] UDS.KEYID = 0
1,173,125 ready_for_fw is high
1,173,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,063 UART: [idev] Erasing UDS.KEYID = 0
1,197,499 UART: [idev] Sha1 KeyId Algorithm
1,206,491 UART: [idev] --
1,207,642 UART: [ldev] ++
1,207,810 UART: [ldev] CDI.KEYID = 6
1,208,174 UART: [ldev] SUBJECT.KEYID = 5
1,208,601 UART: [ldev] AUTHORITY.KEYID = 7
1,209,064 UART: [ldev] FE.KEYID = 1
1,214,042 UART: [ldev] Erasing FE.KEYID = 1
1,240,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,204 UART: [ldev] --
1,279,710 UART: [fwproc] Wait for Commands...
1,280,513 UART: [fwproc] Recv command 0x46574c44
1,281,246 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,918 >>> mbox cmd response: success
2,772,011 UART: [afmc] ++
2,772,179 UART: [afmc] CDI.KEYID = 6
2,772,542 UART: [afmc] SUBJECT.KEYID = 7
2,772,968 UART: [afmc] AUTHORITY.KEYID = 5
2,808,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,058 UART: [afmc] --
2,851,946 UART: [cold-reset] --
2,852,804 UART: [state] Locking Datavault
2,854,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,761 UART: [state] Locking ICCM
2,855,301 UART: [exit] Launching FMC @ 0x40000130
2,860,630 UART:
2,860,646 UART: Running Caliptra FMC ...
2,861,054 UART:
2,861,108 UART: [state] CFI Enabled
2,871,591 UART: [fht] FMC Alias Private Key: 7
2,978,562 UART: [art] Extend RT PCRs Done
2,978,990 UART: [art] Lock RT PCRs Done
2,980,848 UART: [art] Populate DV Done
2,989,025 UART: [fht] FMC Alias Private Key: 7
2,990,057 UART: [art] Derive CDI
2,990,337 UART: [art] Store in in slot 0x4
3,076,060 UART: [art] Derive Key Pair
3,076,420 UART: [art] Store priv key in slot 0x5
3,089,380 UART: [art] Derive Key Pair - Done
3,104,151 UART: [art] Signing Cert with AUTHO
3,104,631 UART: RITY.KEYID = 7
3,119,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,408 UART: [art] PUB.X = E228559BD331D5B7B91E5F9DAAB43485D0FDFF40FF273C492EFB44697BC77682DADF411661E118FB9BDCF61F0FFEC950
3,127,195 UART: [art] PUB.Y = 5DA828FD95E55F21A8AE5937C8C8EE96CBEB3AF55765CF40549986A9BC370EC322B8F9B4E7967A03BF7A80D451FCB58F
3,134,155 UART: [art] SIG.R = AAF407493B9600A414D8E4FF61865C57452A3E14B831A751510C1F5EBDE2330BB35F29B8B2BA67DEAC138E3560403261
3,140,896 UART: [art] SIG.S = D26AD5FCC314D2D68639C27E23D5564451F21BC8BB789C6206E251A55F1458032C5F8C03F02E23F0EF3BB59827EBEB52
3,164,634 UART: Caliptra RT
3,164,888 UART: [state] CFI Enabled
3,272,691 UART: [rt] RT listening for mailbox commands...
3,273,361 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,738 UART: [rt]cmd =0x41545348, len=116
3,305,765 >>> mbox cmd response data (12 bytes)
3,305,766 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,534 UART:
3,306,550 UART: Running Caliptra ROM ...
3,306,958 UART:
3,307,013 UART: [state] CFI Enabled
3,309,639 UART: [state] LifecycleState = Unprovisioned
3,310,294 UART: [state] DebugLocked = No
3,310,968 UART: [state] WD Timer not started. Device not locked for debugging
3,312,100 UART: [kat] SHA2-256
4,115,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,119,779 UART: [kat] ++
4,119,931 UART: [kat] sha1
4,124,373 UART: [kat] SHA2-256
4,126,313 UART: [kat] SHA2-384
4,129,158 UART: [kat] SHA2-512-ACC
4,131,058 UART: [kat] ECC-384
4,140,305 UART: [kat] HMAC-384Kdf
4,144,841 UART: [kat] LMS
4,393,153 UART: [kat] --
4,394,275 UART: [update-reset] ++
5,297,667 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,298,772 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,395,046 >>> mbox cmd response: success
5,395,046 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,395,331 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,345 UART: [update-reset Success] --
5,404,192 UART: [state] Locking Datavault
5,405,130 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,734 UART: [state] Locking ICCM
5,406,396 UART: [exit] Launching FMC @ 0x40000130
5,411,725 UART:
5,411,741 UART: Running Caliptra FMC ...
5,412,149 UART:
5,412,203 UART: [state] CFI Enabled
5,501,312 UART: [art] Extend RT PCRs Done
5,501,740 UART: [art] Lock RT PCRs Done
5,502,985 UART: [art] Populate DV Done
5,511,552 UART: [fht] FMC Alias Private Key: 7
5,512,710 UART: [art] Derive CDI
5,512,990 UART: [art] Store in in slot 0x4
5,598,745 UART: [art] Derive Key Pair
5,599,105 UART: [art] Store priv key in slot 0x5
5,611,661 UART: [art] Derive Key Pair - Done
5,626,538 UART: [art] Signing Cert with AUTHO
5,627,018 UART: RITY.KEYID = 7
5,641,886 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,651 UART: [art] PUB.X = 3BFEAFACA75AFA0CE07519F81BA897D1393F6688BE2FDE691B54A8950C289C4E1B5BF35891ADE860B113058A0548615B
5,649,421 UART: [art] PUB.Y = E31B2ACEAF0A0F39494E006F4272FB616F811F944242845CD962566B0BC8A27F996F54E4FC0B85AB3B1BC54674AF3E2C
5,656,347 UART: [art] SIG.R = 1EAA1089EB498BC194BF7F26CB5575584067665FBDCDF5E589C275CFFB4C796B67DEF4AB23E0930B9E1C46C79EDFF750
5,663,132 UART: [art] SIG.S = BF9745C58C770D16C2E06E8D8EA571E563B2427E5AE0D3F343FBF1A7F9C7CE2CE119A645591905A43EEDCCF6CF8B3A4B
5,686,523 UART: mbox::rt_entry...
5,686,895 UART: ____ _ _ _ ____ _____
5,687,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,688,479 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,247 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,690,015 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,690,783 UART: |_|
5,691,095 UART:
5,973,053 UART: [rt] Runtime listening for mailbox commands...
5,974,224 >>> mbox cmd response data (48 bytes)
5,974,225 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,977,008 >>> mbox cmd response data (48 bytes)
5,977,009 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,989,946 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,404 ready_for_fw is high
1,055,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,618 >>> mbox cmd response: success
2,683,062 UART:
2,683,078 UART: Running Caliptra FMC ...
2,683,486 UART:
2,683,540 UART: [state] CFI Enabled
2,693,977 UART: [fht] FMC Alias Private Key: 7
2,802,250 UART: [art] Extend RT PCRs Done
2,802,678 UART: [art] Lock RT PCRs Done
2,803,984 UART: [art] Populate DV Done
2,812,123 UART: [fht] FMC Alias Private Key: 7
2,813,265 UART: [art] Derive CDI
2,813,545 UART: [art] Store in in slot 0x4
2,899,258 UART: [art] Derive Key Pair
2,899,618 UART: [art] Store priv key in slot 0x5
2,912,386 UART: [art] Derive Key Pair - Done
2,926,955 UART: [art] Signing Cert with AUTHO
2,927,435 UART: RITY.KEYID = 7
2,942,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,626 UART: [art] PUB.X = 912EB3A2CC85C587B77BAF007A9AE6CEE8284A1C430A01A6932EC30BA78A9618336965EE6C1BFF9025275BA1D663071A
2,950,370 UART: [art] PUB.Y = 63D3FC7E489AD9B30018E08B7246DF0A4FF03A1B44B7BE1698F508C93008224F7F60EC5DDDAB85DA41D503F466EFF53F
2,957,300 UART: [art] SIG.R = 56CA9E7F071E5DBC3DE6779FDD51AC328F706E217A0E1F813B78320819FE00A234D0F5D7BA08C7047A8523DC4FEC2164
2,964,043 UART: [art] SIG.S = 423886C77914CEEF21092CB2F6FD87E7122F4BDCDADF3B2DB7E311364039D41A63845B43E2E3A7614D93CA95E02219F8
2,987,597 UART: Caliptra RT
2,987,851 UART: [state] CFI Enabled
3,095,953 UART: [rt] RT listening for mailbox commands...
3,096,623 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,010 UART: [rt]cmd =0x41545348, len=116
3,128,761 >>> mbox cmd response data (12 bytes)
3,128,762 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,097,357 >>> mbox cmd response: success
5,097,357 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,110,553 UART:
5,110,569 UART: Running Caliptra FMC ...
5,110,977 UART:
5,111,031 UART: [state] CFI Enabled
5,199,920 UART: [art] Extend RT PCRs Done
5,200,348 UART: [art] Lock RT PCRs Done
5,201,973 UART: [art] Populate DV Done
5,210,088 UART: [fht] FMC Alias Private Key: 7
5,211,080 UART: [art] Derive CDI
5,211,360 UART: [art] Store in in slot 0x4
5,296,929 UART: [art] Derive Key Pair
5,297,289 UART: [art] Store priv key in slot 0x5
5,310,279 UART: [art] Derive Key Pair - Done
5,325,114 UART: [art] Signing Cert with AUTHO
5,325,594 UART: RITY.KEYID = 7
5,341,150 UART: [art] Erasing AUTHORITY.KEYID = 7
5,341,915 UART: [art] PUB.X = 9ACE038EF219AD6DAF5BCB7E83C4690E2224D330DF78BB567BB51380825A2F1C9AB30BD077447BD3B914C28C5F179E5C
5,348,690 UART: [art] PUB.Y = 6D5159E13038E927E02BEB8DA3D69BD2B7D487157C1C16F1BDE40792CA0F3AB3D7BD1D96636575385BD6B1AB2549EA2E
5,355,646 UART: [art] SIG.R = 6758A7CA0E8490C5A70BB311C360757ECC5478AA773060D0FE7400598BC698FD034BFFA63190B734ABE9A7BB97E8A1BB
5,362,395 UART: [art] SIG.S = F3C12D6010545F204F00DB5B3240B140A119001353156915EA9F7D07243ABA52FB9589C668FDBA650B13D25A872E0859
5,385,947 UART: mbox::rt_entry...
5,386,319 UART: ____ _ _ _ ____ _____
5,387,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,387,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,388,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,389,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,390,207 UART: |_|
5,390,519 UART:
5,669,623 UART: [rt] Runtime listening for mailbox commands...
5,670,794 >>> mbox cmd response data (48 bytes)
5,670,795 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,673,578 >>> mbox cmd response data (48 bytes)
5,673,579 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,686,516 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 ready_for_fw is high
1,174,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,769 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,211 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,555 >>> mbox cmd response: success
2,774,782 UART: [afmc] ++
2,774,950 UART: [afmc] CDI.KEYID = 6
2,775,313 UART: [afmc] SUBJECT.KEYID = 7
2,775,739 UART: [afmc] AUTHORITY.KEYID = 5
2,811,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,745 UART: [afmc] --
2,854,753 UART: [cold-reset] --
2,855,775 UART: [state] Locking Datavault
2,857,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,638 UART: [state] Locking ICCM
2,858,090 UART: [exit] Launching FMC @ 0x40000130
2,863,419 UART:
2,863,435 UART: Running Caliptra FMC ...
2,863,843 UART:
2,863,986 UART: [state] CFI Enabled
2,874,553 UART: [fht] FMC Alias Private Key: 7
2,982,428 UART: [art] Extend RT PCRs Done
2,982,856 UART: [art] Lock RT PCRs Done
2,984,600 UART: [art] Populate DV Done
2,992,913 UART: [fht] FMC Alias Private Key: 7
2,994,045 UART: [art] Derive CDI
2,994,325 UART: [art] Store in in slot 0x4
3,079,842 UART: [art] Derive Key Pair
3,080,202 UART: [art] Store priv key in slot 0x5
3,093,874 UART: [art] Derive Key Pair - Done
3,108,367 UART: [art] Signing Cert with AUTHO
3,108,847 UART: RITY.KEYID = 7
3,124,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,944 UART: [art] PUB.X = 8B324B70A2A58D1D63510A7E3503DD652E521FFECACAA7F7839F55ED23DBE2B9CBD0A2BEEC272DD266D5F9F6605092E1
3,131,728 UART: [art] PUB.Y = C134C7838670C9FC5602BC1E44E1FD2702AA45526BD6945F52F80CBE941749CCD12C9A080F7D3D0E2E7C29D5509A4652
3,138,664 UART: [art] SIG.R = 5BB44B57308CE5F59AB519414D4F3D32FF11B9D36342FD5EB0F1AC9DAFBBF20026BE8E026D0C093355D58B10AD2FD02C
3,145,421 UART: [art] SIG.S = 26A300F3FABB8C482A97889ABC674385BFFFEA9970AC7BD7051417A8973BDAF361481CF989D6AE2A1D0CEB1902EB868D
3,169,497 UART: Caliptra RT
3,169,843 UART: [state] CFI Enabled
3,277,815 UART: [rt] RT listening for mailbox commands...
3,278,485 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,684 UART: [rt]cmd =0x41545348, len=116
3,310,687 >>> mbox cmd response data (12 bytes)
3,310,688 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,452 UART:
3,311,468 UART: Running Caliptra ROM ...
3,311,876 UART:
3,312,018 UART: [state] CFI Enabled
3,314,872 UART: [state] LifecycleState = Unprovisioned
3,315,527 UART: [state] DebugLocked = No
3,316,019 UART: [state] WD Timer not started. Device not locked for debugging
3,317,325 UART: [kat] SHA2-256
4,120,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,004 UART: [kat] ++
4,125,156 UART: [kat] sha1
4,129,456 UART: [kat] SHA2-256
4,131,396 UART: [kat] SHA2-384
4,134,111 UART: [kat] SHA2-512-ACC
4,136,011 UART: [kat] ECC-384
4,145,504 UART: [kat] HMAC-384Kdf
4,150,208 UART: [kat] LMS
4,398,520 UART: [kat] --
4,399,184 UART: [update-reset] ++
5,302,480 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,537 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,811 >>> mbox cmd response: success
5,399,811 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,400,120 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,134 UART: [update-reset Success] --
5,409,337 UART: [state] Locking Datavault
5,410,381 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,985 UART: [state] Locking ICCM
5,411,457 UART: [exit] Launching FMC @ 0x40000130
5,416,786 UART:
5,416,802 UART: Running Caliptra FMC ...
5,417,210 UART:
5,417,353 UART: [state] CFI Enabled
5,506,456 UART: [art] Extend RT PCRs Done
5,506,884 UART: [art] Lock RT PCRs Done
5,508,107 UART: [art] Populate DV Done
5,516,240 UART: [fht] FMC Alias Private Key: 7
5,517,370 UART: [art] Derive CDI
5,517,650 UART: [art] Store in in slot 0x4
5,603,057 UART: [art] Derive Key Pair
5,603,417 UART: [art] Store priv key in slot 0x5
5,616,677 UART: [art] Derive Key Pair - Done
5,631,526 UART: [art] Signing Cert with AUTHO
5,632,006 UART: RITY.KEYID = 7
5,647,150 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,915 UART: [art] PUB.X = 86153837256B914DC3281CA37BD5E1F70C8AB64CDE4F40F73A426DB4729DB952962AFA0A7A7BD5EC1C489BB1ACD5A3A5
5,654,695 UART: [art] PUB.Y = 2C4CCA2C18D94A22349BB614F96D505FE0D532FCCB4D1182B6189D82A7157F497B81399BB954FBD819C4FADA23D164E9
5,661,655 UART: [art] SIG.R = 77B7005D045680FDC9706933231C83421AB381B2702DAFC33CE9AB2BECE3211D991B34538DF942CF899F01D88C0B6E9C
5,668,398 UART: [art] SIG.S = AB29459781736F17A43BAC5418D35399A4C4177EE5D05DC785BFCEBAC775B66F7B048CB0C65065D7D8B6ADD7A6F494CB
5,691,970 UART: mbox::rt_entry...
5,692,342 UART: ____ _ _ _ ____ _____
5,693,126 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,926 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,694 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,462 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,696,230 UART: |_|
5,696,542 UART:
5,980,240 UART: [rt] Runtime listening for mailbox commands...
5,981,411 >>> mbox cmd response data (48 bytes)
5,981,412 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,984,195 >>> mbox cmd response data (48 bytes)
5,984,196 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,997,133 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,295 ready_for_fw is high
1,056,295 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,475 >>> mbox cmd response: success
2,685,959 UART:
2,685,975 UART: Running Caliptra FMC ...
2,686,383 UART:
2,686,526 UART: [state] CFI Enabled
2,697,339 UART: [fht] FMC Alias Private Key: 7
2,805,104 UART: [art] Extend RT PCRs Done
2,805,532 UART: [art] Lock RT PCRs Done
2,807,058 UART: [art] Populate DV Done
2,815,675 UART: [fht] FMC Alias Private Key: 7
2,816,831 UART: [art] Derive CDI
2,817,111 UART: [art] Store in in slot 0x4
2,902,702 UART: [art] Derive Key Pair
2,903,062 UART: [art] Store priv key in slot 0x5
2,916,080 UART: [art] Derive Key Pair - Done
2,930,803 UART: [art] Signing Cert with AUTHO
2,931,283 UART: RITY.KEYID = 7
2,947,137 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,902 UART: [art] PUB.X = E2C3211619223A2192005B3042E2BAEF888A30C9CFFD56D45FDFB64FC38C5C873A2F10AE2C9EAE01E1405307CFC1FA47
2,954,658 UART: [art] PUB.Y = 6189470E526DADE3A9AA872EC8A32507C9ABBE7693F73EDE67A154205428101A6C37640A03130A03C02D32D930FCD5E7
2,961,592 UART: [art] SIG.R = 3FC19211D8B63B3B7ABCBA5532C5E3F5A8C64A67B12CAB93C09900D603806DF53B02F9F72D3481805CD8AD6FA2708ECD
2,968,348 UART: [art] SIG.S = 6D1724E74031850DEA9FBC74294B07AB694BB06F87FC08DF30F9458DDF623DC1A5161498E4C0AB2D03D7F0C579236866
2,992,355 UART: Caliptra RT
2,992,701 UART: [state] CFI Enabled
3,100,051 UART: [rt] RT listening for mailbox commands...
3,100,721 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,986 UART: [rt]cmd =0x41545348, len=116
3,132,911 >>> mbox cmd response data (12 bytes)
3,132,912 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,160 >>> mbox cmd response: success
5,103,160 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,116,492 UART:
5,116,508 UART: Running Caliptra FMC ...
5,116,916 UART:
5,117,059 UART: [state] CFI Enabled
5,206,128 UART: [art] Extend RT PCRs Done
5,206,556 UART: [art] Lock RT PCRs Done
5,207,895 UART: [art] Populate DV Done
5,216,046 UART: [fht] FMC Alias Private Key: 7
5,217,004 UART: [art] Derive CDI
5,217,284 UART: [art] Store in in slot 0x4
5,303,101 UART: [art] Derive Key Pair
5,303,461 UART: [art] Store priv key in slot 0x5
5,317,409 UART: [art] Derive Key Pair - Done
5,332,002 UART: [art] Signing Cert with AUTHO
5,332,482 UART: RITY.KEYID = 7
5,348,292 UART: [art] Erasing AUTHORITY.KEYID = 7
5,349,057 UART: [art] PUB.X = B509202A4A0DB8ACA2EB46A9481E0C9AA2DFDAED1557B429262FF59D71480A9CE99D132EB18E21EB48EDA08FB4B2D69B
5,355,837 UART: [art] PUB.Y = 322CC260912AD59445111D0F6EDF40F0EE4D3C99084D9F2A7F88A66E79D4D6DD8B518FDC40A6F5610AF542C6E67136E4
5,362,786 UART: [art] SIG.R = 915FA79DB7565C5450DFB8AAF40DAE269F0D37D44503F44D7EAB9AD6CD932FE78EFABBA3041507E2204B9330C18E99E8
5,369,557 UART: [art] SIG.S = CAB9A38D470944E10B5C0B7686FFBDEA5AA1C5731F5C0445239822F10E7C9B1F25DCA81D2E0CA2E1186FBE3F652BE34B
5,392,932 UART: mbox::rt_entry...
5,393,304 UART: ____ _ _ _ ____ _____
5,394,088 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,394,888 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,395,656 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,396,424 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,397,192 UART: |_|
5,397,504 UART:
5,682,369 UART: [rt] Runtime listening for mailbox commands...
5,683,540 >>> mbox cmd response data (48 bytes)
5,683,541 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,686,324 >>> mbox cmd response data (48 bytes)
5,686,325 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,699,262 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,376 UART:
192,757 UART: Running Caliptra ROM ...
193,906 UART:
194,049 UART: [state] CFI Enabled
264,380 UART: [state] LifecycleState = Unprovisioned
266,358 UART: [state] DebugLocked = No
268,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,258 UART: [kat] SHA2-256
442,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,470 UART: [kat] ++
452,937 UART: [kat] sha1
464,105 UART: [kat] SHA2-256
466,830 UART: [kat] SHA2-384
472,884 UART: [kat] SHA2-512-ACC
475,244 UART: [kat] ECC-384
2,766,726 UART: [kat] HMAC-384Kdf
2,779,356 UART: [kat] LMS
3,969,605 UART: [kat] --
3,973,124 UART: [cold-reset] ++
3,975,699 UART: [fht] Storing FHT @ 0x50003400
3,986,244 UART: [idev] ++
3,986,806 UART: [idev] CDI.KEYID = 6
3,987,786 UART: [idev] SUBJECT.KEYID = 7
3,988,945 UART: [idev] UDS.KEYID = 0
3,990,007 ready_for_fw is high
3,990,226 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,734 UART: [idev] Erasing UDS.KEYID = 0
7,326,549 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,887 UART: [idev] --
7,354,099 UART: [ldev] ++
7,354,668 UART: [ldev] CDI.KEYID = 6
7,355,676 UART: [ldev] SUBJECT.KEYID = 5
7,356,823 UART: [ldev] AUTHORITY.KEYID = 7
7,358,095 UART: [ldev] FE.KEYID = 1
7,404,234 UART: [ldev] Erasing FE.KEYID = 1
10,739,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,681 UART: [ldev] --
13,119,990 UART: [fwproc] Waiting for Commands...
13,122,937 UART: [fwproc] Received command 0x46574c44
13,125,180 UART: [fwproc] Received Image of size 114036 bytes
17,174,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,190 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,636,548 >>> mbox cmd response: success
17,640,378 UART: [afmc] ++
17,640,984 UART: [afmc] CDI.KEYID = 6
17,642,070 UART: [afmc] SUBJECT.KEYID = 7
17,643,192 UART: [afmc] AUTHORITY.KEYID = 5
21,012,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,875 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,301 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,160 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,570 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,262 UART: [afmc] --
23,379,031 UART: [cold-reset] --
23,385,055 UART: [state] Locking Datavault
23,388,687 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,437 UART: [state] Locking ICCM
23,393,121 UART: [exit] Launching FMC @ 0x40000130
23,401,681 UART:
23,401,958 UART: Running Caliptra FMC ...
23,403,067 UART:
23,403,225 UART: [state] CFI Enabled
23,468,576 UART: [fht] FMC Alias Private Key: 7
25,806,697 UART: [art] Extend RT PCRs Done
25,807,925 UART: [art] Lock RT PCRs Done
25,809,708 UART: [art] Populate DV Done
25,815,115 UART: [fht] FMC Alias Private Key: 7
25,816,751 UART: [art] Derive CDI
25,817,557 UART: [art] Store in in slot 0x4
25,876,715 UART: [art] Derive Key Pair
25,877,706 UART: [art] Store priv key in slot 0x5
29,170,700 UART: [art] Derive Key Pair - Done
29,183,419 UART: [art] Signing Cert with AUTHO
29,184,724 UART: RITY.KEYID = 7
31,472,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,378 UART: [art] PUB.X = 68E81E69B34F67653FB79E78ED50336D10586A3EB620314FE8BFE537A9E486EBF7BBA5776453F004D9D93E7CA38797E1
31,481,595 UART: [art] PUB.Y = 07296AB52606CB33686E30237A9B01822082D592A309A0C64E4EC1E195486CE0544C0E85A17B37C8E361D498A0F2584E
31,488,808 UART: [art] SIG.R = 5605DD6FC639820DD21985244AD2E521AF13086ACB2D8E6D35594A306A7DE4ABCE4246B89849B745E0940AC4A322F6A4
31,496,181 UART: [art] SIG.S = C89E3D69E70342CFD1C11EB663AD314F89A7FA3B8074E46BC5B1016C68F5070BC48B511D976DDAC9A713EC9547B3240A
32,800,620 UART: Caliptra RT
32,801,334 UART: [state] CFI Enabled
32,964,496 UART: [rt] RT listening for mailbox commands...
36,994,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,150,760 UART: [rt]cmd =0x41544d4e, len=14344
42,386,569 >>> mbox cmd response data (8 bytes)
42,387,190 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,417,818 UART: [rt]cmd =0x41545348, len=116
42,419,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,785,603 ready_for_fw is high
3,786,150 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,873,519 >>> mbox cmd response: success
23,572,533 UART:
23,572,952 UART: Running Caliptra FMC ...
23,574,052 UART:
23,574,202 UART: [state] CFI Enabled
23,641,653 UART: [fht] FMC Alias Private Key: 7
25,980,115 UART: [art] Extend RT PCRs Done
25,981,343 UART: [art] Lock RT PCRs Done
25,983,193 UART: [art] Populate DV Done
25,988,601 UART: [fht] FMC Alias Private Key: 7
25,990,134 UART: [art] Derive CDI
25,990,946 UART: [art] Store in in slot 0x4
26,050,743 UART: [art] Derive Key Pair
26,051,788 UART: [art] Store priv key in slot 0x5
29,344,219 UART: [art] Derive Key Pair - Done
29,357,542 UART: [art] Signing Cert with AUTHO
29,358,852 UART: RITY.KEYID = 7
31,646,648 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,177 UART: [art] PUB.X = FC245E20B5803B5AE20BE21FCF48C77050A5C635FA603D2AA279A93C2FCF124281A4ACC78516F48C36714F85A2C1E649
31,655,429 UART: [art] PUB.Y = 35474244378B89BC8954D11B00A69B9C1791350BF2005D9AD98D6CE8EC0F2BD8E8D4369739F53989983A02622B80DF2F
31,662,626 UART: [art] SIG.R = AC9BC83151D5F52ED62EAE6CC72AC20BD5D0E576B8A1963A33BF0E3FF552B03FA9A083D37D9E6386996C202CACBD9A5F
31,669,988 UART: [art] SIG.S = F270B63CD13AD08667CDD25E8075FC3AAFF57F64C9D7B7C5DFDA19F6C9E4E8E262C13B72C395B78691E407F772E19E69
32,975,426 UART: Caliptra RT
32,976,142 UART: [state] CFI Enabled
33,137,466 UART: [rt] RT listening for mailbox commands...
37,167,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,323,548 UART: [rt]cmd =0x41544d4e, len=14344
42,559,170 >>> mbox cmd response data (8 bytes)
42,559,721 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,590,297 UART: [rt]cmd =0x41545348, len=116
42,592,451 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,330 UART:
192,693 UART: Running Caliptra ROM ...
193,888 UART:
603,666 UART: [state] CFI Enabled
620,241 UART: [state] LifecycleState = Unprovisioned
622,184 UART: [state] DebugLocked = No
624,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,639 UART: [kat] SHA2-256
798,374 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,963 UART: [kat] ++
809,490 UART: [kat] sha1
820,226 UART: [kat] SHA2-256
822,940 UART: [kat] SHA2-384
828,072 UART: [kat] SHA2-512-ACC
830,449 UART: [kat] ECC-384
3,113,828 UART: [kat] HMAC-384Kdf
3,125,578 UART: [kat] LMS
4,315,793 UART: [kat] --
4,319,671 UART: [cold-reset] ++
4,321,395 UART: [fht] Storing FHT @ 0x50003400
4,333,012 UART: [idev] ++
4,333,583 UART: [idev] CDI.KEYID = 6
4,334,469 UART: [idev] SUBJECT.KEYID = 7
4,335,783 UART: [idev] UDS.KEYID = 0
4,336,769 ready_for_fw is high
4,336,981 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,260 UART: [idev] Erasing UDS.KEYID = 0
7,623,376 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,888 UART: [idev] --
7,647,702 UART: [ldev] ++
7,648,264 UART: [ldev] CDI.KEYID = 6
7,649,297 UART: [ldev] SUBJECT.KEYID = 5
7,650,457 UART: [ldev] AUTHORITY.KEYID = 7
7,651,744 UART: [ldev] FE.KEYID = 1
7,661,635 UART: [ldev] Erasing FE.KEYID = 1
10,946,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,801 UART: [ldev] --
13,308,273 UART: [fwproc] Waiting for Commands...
13,311,120 UART: [fwproc] Received command 0x46574c44
13,313,352 UART: [fwproc] Received Image of size 114036 bytes
17,365,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,252 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,832,408 >>> mbox cmd response: success
17,835,914 UART: [afmc] ++
17,836,534 UART: [afmc] CDI.KEYID = 6
17,837,418 UART: [afmc] SUBJECT.KEYID = 7
17,838,464 UART: [afmc] AUTHORITY.KEYID = 5
21,147,719 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,885 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,190 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,533 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,367 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,845 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,865 UART: [afmc] --
23,512,023 UART: [cold-reset] --
23,516,322 UART: [state] Locking Datavault
23,522,528 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,237 UART: [state] Locking ICCM
23,525,954 UART: [exit] Launching FMC @ 0x40000130
23,534,291 UART:
23,534,522 UART: Running Caliptra FMC ...
23,535,546 UART:
23,535,692 UART: [state] CFI Enabled
23,543,787 UART: [fht] FMC Alias Private Key: 7
25,875,027 UART: [art] Extend RT PCRs Done
25,876,246 UART: [art] Lock RT PCRs Done
25,878,056 UART: [art] Populate DV Done
25,883,519 UART: [fht] FMC Alias Private Key: 7
25,885,108 UART: [art] Derive CDI
25,885,843 UART: [art] Store in in slot 0x4
25,928,918 UART: [art] Derive Key Pair
25,929,954 UART: [art] Store priv key in slot 0x5
29,172,396 UART: [art] Derive Key Pair - Done
29,185,496 UART: [art] Signing Cert with AUTHO
29,186,823 UART: RITY.KEYID = 7
31,465,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,380 UART: [art] PUB.X = 5B14737E51E92628AF5F68047802CFE52829C03895D8F4A2CC1263E345DB85BF61F1E4CEC17C01F13CE4963F4596F46C
31,474,609 UART: [art] PUB.Y = 5A93B3880D0E9C2CBD715E044D8C85EEC2FC608C305388E5CE5FB40C05C10C69E1D8AD2F596FF5C0D3A2DAF3BADEC7CB
31,481,934 UART: [art] SIG.R = 7AB884109E7B6537E21B8CF9DD8F52B76E057F8A2D72471599AD6AA03F8C9827C1B44992056C5E86C946676DA338FACC
31,489,307 UART: [art] SIG.S = 8C6584AA5FD11844DD8768631F6A8724D660DE48859F53F90B90A5E0F6B609E29B41F4F49A4A84D204461347B96D7A56
32,794,478 UART: Caliptra RT
32,795,174 UART: [state] CFI Enabled
32,913,776 UART: [rt] RT listening for mailbox commands...
36,933,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,089,461 UART: [rt]cmd =0x41544d4e, len=14344
42,325,153 >>> mbox cmd response data (8 bytes)
42,325,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,356,526 UART: [rt]cmd =0x41545348, len=116
42,358,737 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,383 writing to cptra_bootfsm_go
4,130,649 ready_for_fw is high
4,131,010 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,234 >>> mbox cmd response: success
23,711,403 UART:
23,711,806 UART: Running Caliptra FMC ...
23,712,909 UART:
23,713,064 UART: [state] CFI Enabled
23,720,814 UART: [fht] FMC Alias Private Key: 7
26,052,084 UART: [art] Extend RT PCRs Done
26,053,314 UART: [art] Lock RT PCRs Done
26,055,080 UART: [art] Populate DV Done
26,060,343 UART: [fht] FMC Alias Private Key: 7
26,061,993 UART: [art] Derive CDI
26,062,732 UART: [art] Store in in slot 0x4
26,105,499 UART: [art] Derive Key Pair
26,106,546 UART: [art] Store priv key in slot 0x5
29,348,652 UART: [art] Derive Key Pair - Done
29,361,540 UART: [art] Signing Cert with AUTHO
29,363,033 UART: RITY.KEYID = 7
31,642,855 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,361 UART: [art] PUB.X = 6922AA62FEDACECA3A3571FF9AFE7E5B9CA31A754643C342948F0A4BE369A61CF26D41905F5277ACB2E4483A178450A8
31,651,644 UART: [art] PUB.Y = DC2FB86522FFCA4779E48842E19285EEEA9353D8ADCA231C39C57A6F259A5F123534AD20AAA828F0BC5522C87F364662
31,658,903 UART: [art] SIG.R = 930D2DA266837B0EEB79D2430891FF4D2BA4A700CF45AFD5C11916139E83A8758CC82BC6EE637154AB41C7897C662AAA
31,666,268 UART: [art] SIG.S = 9F72DEB8310AA0069243D3C12A47B2693DEB5644AA42474B469CD9B458C6C129868B6819E10015DC59AE9E36C8E66FBB
32,971,556 UART: Caliptra RT
32,972,273 UART: [state] CFI Enabled
33,089,778 UART: [rt] RT listening for mailbox commands...
37,110,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,266,745 UART: [rt]cmd =0x41544d4e, len=14344
42,502,295 >>> mbox cmd response data (8 bytes)
42,502,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,533,508 UART: [rt]cmd =0x41545348, len=116
42,535,790 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,490 UART:
192,865 UART: Running Caliptra ROM ...
194,011 UART:
194,164 UART: [state] CFI Enabled
260,408 UART: [state] LifecycleState = Unprovisioned
262,318 UART: [state] DebugLocked = No
265,211 UART: [state] WD Timer not started. Device not locked for debugging
269,674 UART: [kat] SHA2-256
448,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,314 UART: [kat] ++
460,859 UART: [kat] sha1
473,447 UART: [kat] SHA2-256
476,466 UART: [kat] SHA2-384
481,675 UART: [kat] SHA2-512-ACC
484,613 UART: [kat] ECC-384
2,948,633 UART: [kat] HMAC-384Kdf
2,970,761 UART: [kat] LMS
3,500,225 UART: [kat] --
3,505,113 UART: [cold-reset] ++
3,506,766 UART: [fht] FHT @ 0x50003400
3,517,677 UART: [idev] ++
3,518,250 UART: [idev] CDI.KEYID = 6
3,519,132 UART: [idev] SUBJECT.KEYID = 7
3,520,378 UART: [idev] UDS.KEYID = 0
3,521,304 ready_for_fw is high
3,521,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,336 UART: [idev] Erasing UDS.KEYID = 0
6,024,350 UART: [idev] Sha1 KeyId Algorithm
6,046,813 UART: [idev] --
6,049,325 UART: [ldev] ++
6,049,910 UART: [ldev] CDI.KEYID = 6
6,050,795 UART: [ldev] SUBJECT.KEYID = 5
6,051,925 UART: [ldev] AUTHORITY.KEYID = 7
6,053,265 UART: [ldev] FE.KEYID = 1
6,098,746 UART: [ldev] Erasing FE.KEYID = 1
8,601,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,183 UART: [ldev] --
10,409,155 UART: [fwproc] Wait for Commands...
10,411,355 UART: [fwproc] Recv command 0x46574c44
10,413,390 UART: [fwproc] Recv'd Img size: 114360 bytes
13,813,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,266,062 >>> mbox cmd response: success
14,269,728 UART: [afmc] ++
14,270,325 UART: [afmc] CDI.KEYID = 6
14,271,236 UART: [afmc] SUBJECT.KEYID = 7
14,272,341 UART: [afmc] AUTHORITY.KEYID = 5
16,806,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,085 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,232 UART: [afmc] --
18,608,539 UART: [cold-reset] --
18,613,592 UART: [state] Locking Datavault
18,618,089 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,794 UART: [state] Locking ICCM
18,621,833 UART: [exit] Launching FMC @ 0x40000130
18,630,284 UART:
18,630,522 UART: Running Caliptra FMC ...
18,631,646 UART:
18,631,809 UART: [state] CFI Enabled
18,688,492 UART: [fht] FMC Alias Private Key: 7
20,453,623 UART: [art] Extend RT PCRs Done
20,454,844 UART: [art] Lock RT PCRs Done
20,456,711 UART: [art] Populate DV Done
20,462,013 UART: [fht] FMC Alias Private Key: 7
20,463,607 UART: [art] Derive CDI
20,464,338 UART: [art] Store in in slot 0x4
20,521,044 UART: [art] Derive Key Pair
20,522,086 UART: [art] Store priv key in slot 0x5
22,985,136 UART: [art] Derive Key Pair - Done
22,998,065 UART: [art] Signing Cert with AUTHO
22,999,405 UART: RITY.KEYID = 7
24,710,723 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,219 UART: [art] PUB.X = 8FA1106A6CEFEC6D8DFD07E895E330AE8789D22072FC91E60DFCCB4642B4C5157161DB2D57018D1DA8D3FD9555950942
24,719,521 UART: [art] PUB.Y = 72AA464062BD560AD1FCA006A50C80A6E32CD002D08BCFEE5060D9F0C80DABE6E42C1696868574653B02D4DFB92E3B0A
24,726,780 UART: [art] SIG.R = D3435EE10DCA3FA1907F0026EE3757DE98F4691D3E796239FDBA80E8337734148811E4A60C8C3D8898382D422CFA9807
24,734,144 UART: [art] SIG.S = 2CF2D8AD80033224E3F1EC7D108305437CDE2C2B0C63A9E3F8AE82EB8C7AC6636ADA1611900D4EA9B196136D6D75C757
25,713,375 UART: Caliptra RT
25,714,074 UART: [state] CFI Enabled
25,879,480 UART: [rt] RT listening for mailbox commands...
29,901,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,056,971 UART: [rt]cmd =0x41544d4e, len=14344
33,987,622 >>> mbox cmd response data (8 bytes)
33,988,212 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,018,889 UART: [rt]cmd =0x41545348, len=116
34,021,199 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,485 writing to cptra_bootfsm_go
192,693 UART:
193,055 UART: Running Caliptra ROM ...
194,245 UART:
194,407 UART: [state] CFI Enabled
265,520 UART: [state] LifecycleState = Unprovisioned
267,865 UART: [state] DebugLocked = No
269,474 UART: [state] WD Timer not started. Device not locked for debugging
274,794 UART: [kat] SHA2-256
464,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,482 UART: [kat] ++
475,950 UART: [kat] sha1
488,028 UART: [kat] SHA2-256
491,040 UART: [kat] SHA2-384
497,391 UART: [kat] SHA2-512-ACC
500,042 UART: [kat] ECC-384
2,949,130 UART: [kat] HMAC-384Kdf
2,971,880 UART: [kat] LMS
3,503,680 UART: [kat] --
3,508,133 UART: [cold-reset] ++
3,508,964 UART: [fht] FHT @ 0x50003400
3,520,084 UART: [idev] ++
3,520,808 UART: [idev] CDI.KEYID = 6
3,521,695 UART: [idev] SUBJECT.KEYID = 7
3,522,940 UART: [idev] UDS.KEYID = 0
3,523,878 ready_for_fw is high
3,524,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,761 UART: [idev] Erasing UDS.KEYID = 0
6,031,007 UART: [idev] Sha1 KeyId Algorithm
6,053,393 UART: [idev] --
6,059,770 UART: [ldev] ++
6,060,456 UART: [ldev] CDI.KEYID = 6
6,061,376 UART: [ldev] SUBJECT.KEYID = 5
6,062,540 UART: [ldev] AUTHORITY.KEYID = 7
6,063,776 UART: [ldev] FE.KEYID = 1
6,100,141 UART: [ldev] Erasing FE.KEYID = 1
8,604,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,945 UART: [ldev] --
10,412,622 UART: [fwproc] Wait for Commands...
10,414,896 UART: [fwproc] Recv command 0x46574c44
10,417,211 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,593,986 >>> mbox cmd response: success
14,597,672 UART: [afmc] ++
14,598,383 UART: [afmc] CDI.KEYID = 6
14,599,635 UART: [afmc] SUBJECT.KEYID = 7
14,601,076 UART: [afmc] AUTHORITY.KEYID = 5
17,124,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,516 UART: [afmc] --
18,925,553 UART: [cold-reset] --
18,930,661 UART: [state] Locking Datavault
18,935,540 UART: [state] Locking PCR0, PCR1 and PCR31
18,937,695 UART: [state] Locking ICCM
18,939,467 UART: [exit] Launching FMC @ 0x40000130
18,948,152 UART:
18,948,426 UART: Running Caliptra FMC ...
18,949,481 UART:
18,949,638 UART: [state] CFI Enabled
19,006,976 UART: [fht] FMC Alias Private Key: 7
20,771,266 UART: [art] Extend RT PCRs Done
20,772,487 UART: [art] Lock RT PCRs Done
20,774,275 UART: [art] Populate DV Done
20,779,737 UART: [fht] FMC Alias Private Key: 7
20,781,391 UART: [art] Derive CDI
20,782,146 UART: [art] Store in in slot 0x4
20,839,776 UART: [art] Derive Key Pair
20,840,822 UART: [art] Store priv key in slot 0x5
23,303,959 UART: [art] Derive Key Pair - Done
23,317,116 UART: [art] Signing Cert with AUTHO
23,318,420 UART: RITY.KEYID = 7
25,029,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,178 UART: [art] PUB.X = 4A991BA76B752C95ED6C4D98A4377EBA6AE2430AF1C942BD141E225547EFB21EC0F8BF55E9F034E2D5616A275C82702F
25,038,413 UART: [art] PUB.Y = 761EEC731A5D67DF2D3D76E9701C2ABCC8795E5C2D7250040976344F9ABB9C1AAA06B6304CFB62323CF81BE16E120BD8
25,045,682 UART: [art] SIG.R = CF754A1FB8A1A4781B71B30A0C797D4D0FDD28A0A5E2F54FEAEC7840DE586DCDF2F7FDAB5DAA7F3375F23981EDF0C142
25,053,109 UART: [art] SIG.S = 0CC88A1F62E37FB980D8281D3AF53FCD46D9F53561EC9CCE50CE6F02D327D0F27FF17FBD1618972FFAFC58D4651FCB98
26,031,860 UART: Caliptra RT
26,032,587 UART: [state] CFI Enabled
26,197,768 UART: [rt] RT listening for mailbox commands...
30,219,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,375,386 UART: [rt]cmd =0x41544d4e, len=14344
34,306,720 >>> mbox cmd response data (8 bytes)
34,307,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,337,931 UART: [rt]cmd =0x41545348, len=116
34,340,244 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,440,954 ready_for_fw is high
3,441,417 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,749,304 >>> mbox cmd response: success
19,030,075 UART:
19,030,488 UART: Running Caliptra FMC ...
19,031,699 UART:
19,031,874 UART: [state] CFI Enabled
19,097,131 UART: [fht] FMC Alias Private Key: 7
20,860,948 UART: [art] Extend RT PCRs Done
20,862,184 UART: [art] Lock RT PCRs Done
20,864,024 UART: [art] Populate DV Done
20,869,443 UART: [fht] FMC Alias Private Key: 7
20,871,096 UART: [art] Derive CDI
20,871,921 UART: [art] Store in in slot 0x4
20,929,928 UART: [art] Derive Key Pair
20,930,958 UART: [art] Store priv key in slot 0x5
23,394,082 UART: [art] Derive Key Pair - Done
23,406,919 UART: [art] Signing Cert with AUTHO
23,408,249 UART: RITY.KEYID = 7
25,119,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,309 UART: [art] PUB.X = 8B1453DE8BC2D89742E764D14D26DC783490FDF271D83566AD846DCDCF15FCA8CB7C99D42028A261E93D4DAF810E1D44
25,128,582 UART: [art] PUB.Y = C0EB88E956CFD498280E52F83E609CDDF71135A649C75AE0039D4A14091EE7A219ADC29A97823DD5EB6847B0B2D2CD66
25,135,813 UART: [art] SIG.R = 245D17FA5F75AA2BA2F14EB675606152022AF060300EF0506A27C3E8D2CAB25715746FB600103E113AD2ADA91C79F505
25,143,182 UART: [art] SIG.S = 8570A70D51A3AF7C78FFA0B4F129931D75D0F05F6F8B39D570BF8D405E73C549D4F1A8E1CF292B9C7092B1A67076D8E2
26,122,159 UART: Caliptra RT
26,122,869 UART: [state] CFI Enabled
26,288,225 UART: [rt] RT listening for mailbox commands...
30,311,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,467,346 UART: [rt]cmd =0x41544d4e, len=14344
34,397,480 >>> mbox cmd response data (8 bytes)
34,398,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,428,600 UART: [rt]cmd =0x41545348, len=116
34,430,863 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,352 UART:
192,719 UART: Running Caliptra ROM ...
193,910 UART:
603,350 UART: [state] CFI Enabled
620,630 UART: [state] LifecycleState = Unprovisioned
622,968 UART: [state] DebugLocked = No
624,933 UART: [state] WD Timer not started. Device not locked for debugging
628,826 UART: [kat] SHA2-256
818,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,535 UART: [kat] ++
830,062 UART: [kat] sha1
841,015 UART: [kat] SHA2-256
844,023 UART: [kat] SHA2-384
850,365 UART: [kat] SHA2-512-ACC
852,952 UART: [kat] ECC-384
3,293,391 UART: [kat] HMAC-384Kdf
3,307,627 UART: [kat] LMS
3,839,420 UART: [kat] --
3,843,139 UART: [cold-reset] ++
3,844,924 UART: [fht] FHT @ 0x50003400
3,855,990 UART: [idev] ++
3,856,703 UART: [idev] CDI.KEYID = 6
3,857,611 UART: [idev] SUBJECT.KEYID = 7
3,858,857 UART: [idev] UDS.KEYID = 0
3,859,781 ready_for_fw is high
3,859,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,694 UART: [idev] Erasing UDS.KEYID = 0
6,334,943 UART: [idev] Sha1 KeyId Algorithm
6,356,382 UART: [idev] --
6,360,479 UART: [ldev] ++
6,361,158 UART: [ldev] CDI.KEYID = 6
6,362,092 UART: [ldev] SUBJECT.KEYID = 5
6,363,250 UART: [ldev] AUTHORITY.KEYID = 7
6,364,478 UART: [ldev] FE.KEYID = 1
6,375,702 UART: [ldev] Erasing FE.KEYID = 1
8,854,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,725 UART: [ldev] --
10,643,830 UART: [fwproc] Wait for Commands...
10,646,468 UART: [fwproc] Recv command 0x46574c44
10,648,721 UART: [fwproc] Recv'd Img size: 114360 bytes
14,091,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,826,164 >>> mbox cmd response: success
14,829,789 UART: [afmc] ++
14,830,493 UART: [afmc] CDI.KEYID = 6
14,831,592 UART: [afmc] SUBJECT.KEYID = 7
14,833,122 UART: [afmc] AUTHORITY.KEYID = 5
17,335,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,528 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,654 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,125,642 UART: [afmc] --
19,129,340 UART: [cold-reset] --
19,133,574 UART: [state] Locking Datavault
19,140,488 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,672 UART: [state] Locking ICCM
19,145,517 UART: [exit] Launching FMC @ 0x40000130
19,154,179 UART:
19,154,412 UART: Running Caliptra FMC ...
19,155,509 UART:
19,155,662 UART: [state] CFI Enabled
19,164,046 UART: [fht] FMC Alias Private Key: 7
20,921,290 UART: [art] Extend RT PCRs Done
20,922,516 UART: [art] Lock RT PCRs Done
20,924,162 UART: [art] Populate DV Done
20,929,357 UART: [fht] FMC Alias Private Key: 7
20,930,999 UART: [art] Derive CDI
20,931,731 UART: [art] Store in in slot 0x4
20,974,539 UART: [art] Derive Key Pair
20,975,578 UART: [art] Store priv key in slot 0x5
23,402,180 UART: [art] Derive Key Pair - Done
23,415,440 UART: [art] Signing Cert with AUTHO
23,416,770 UART: RITY.KEYID = 7
25,122,129 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,644 UART: [art] PUB.X = 5456C97D11439B3011A5925126DEBF3D23CCCE3E77FD50249F3C516657505D566A5EC84AE223631FEA66E98DF10192D0
25,130,891 UART: [art] PUB.Y = D0BD8DFE223604DBD7E2DADA49036513C9230E4D4E113E92655FB882ABE08BB3BCC35E75ADB9173172674E8512BBB64F
25,138,180 UART: [art] SIG.R = B278C60628651262788E4A4BE3BA51FB2F716D99B06CE542F6AD595BA736D5521037FE4B773CDB54D5B0127361C52CC6
25,145,592 UART: [art] SIG.S = C77CEC1E2CD0025A0875CE4691E32F0875CB993B07532AAE518B33A1D0749C2D692874271150DECDA5658B4DF60D7593
26,125,035 UART: Caliptra RT
26,125,750 UART: [state] CFI Enabled
26,242,455 UART: [rt] RT listening for mailbox commands...
30,262,971 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,418,552 UART: [rt]cmd =0x41544d4e, len=14344
34,349,037 >>> mbox cmd response data (8 bytes)
34,349,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,380,426 UART: [rt]cmd =0x41545348, len=116
34,382,404 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,756,168 ready_for_fw is high
3,756,727 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,948,205 >>> mbox cmd response: success
19,204,116 UART:
19,204,493 UART: Running Caliptra FMC ...
19,205,598 UART:
19,205,750 UART: [state] CFI Enabled
19,213,864 UART: [fht] FMC Alias Private Key: 7
20,971,194 UART: [art] Extend RT PCRs Done
20,972,420 UART: [art] Lock RT PCRs Done
20,973,961 UART: [art] Populate DV Done
20,979,700 UART: [fht] FMC Alias Private Key: 7
20,981,345 UART: [art] Derive CDI
20,982,081 UART: [art] Store in in slot 0x4
21,024,784 UART: [art] Derive Key Pair
21,025,788 UART: [art] Store priv key in slot 0x5
23,452,921 UART: [art] Derive Key Pair - Done
23,465,971 UART: [art] Signing Cert with AUTHO
23,467,267 UART: RITY.KEYID = 7
25,172,432 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,938 UART: [art] PUB.X = F0C2D4EC25607E61C3C1B3181518119B637047FC890AFE5ADEB0F888DEFAE079659BD23F0272BD7521466BAAF21E512D
25,181,197 UART: [art] PUB.Y = FEF575D6CA920789A18680C51A8B3A9F4446FA86AD89580BE98DB088B7991F3AE1BE38942AFB0714F47EB174C88A289C
25,188,513 UART: [art] SIG.R = E4484BE79403FD0C53E4127CD00731D3D4890DF6D71CF539C3B8A1D742B560BAFB2B4407DFC6C677C2E2F8226AD75E93
25,195,910 UART: [art] SIG.S = 41F6AB6AC1A7D7D6F354652B13DA7543845939B4E032B2FB4B41D638FB851F5D2695326635862A96F96CDFD8E7326395
26,174,921 UART: Caliptra RT
26,175,631 UART: [state] CFI Enabled
26,292,961 UART: [rt] RT listening for mailbox commands...
30,313,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,469,530 UART: [rt]cmd =0x41544d4e, len=14344
34,399,589 >>> mbox cmd response data (8 bytes)
34,400,159 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,430,843 UART: [rt]cmd =0x41545348, len=116
34,432,686 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,825 UART: [kat] SHA2-256
881,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,871 UART: [kat] ++
886,023 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,150 UART: [kat] HMAC-384Kdf
906,714 UART: [kat] LMS
1,474,910 UART: [kat] --
1,475,705 UART: [cold-reset] ++
1,476,085 UART: [fht] Storing FHT @ 0x50003400
1,479,064 UART: [idev] ++
1,479,232 UART: [idev] CDI.KEYID = 6
1,479,592 UART: [idev] SUBJECT.KEYID = 7
1,480,016 UART: [idev] UDS.KEYID = 0
1,480,361 ready_for_fw is high
1,480,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,862 UART: [idev] Erasing UDS.KEYID = 0
1,504,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,024 UART: [idev] --
1,513,939 UART: [ldev] ++
1,514,107 UART: [ldev] CDI.KEYID = 6
1,514,470 UART: [ldev] SUBJECT.KEYID = 5
1,514,896 UART: [ldev] AUTHORITY.KEYID = 7
1,515,359 UART: [ldev] FE.KEYID = 1
1,520,879 UART: [ldev] Erasing FE.KEYID = 1
1,546,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,128 UART: [ldev] --
1,585,469 UART: [fwproc] Waiting for Commands...
1,586,332 UART: [fwproc] Received command 0x46574c44
1,587,123 UART: [fwproc] Received Image of size 114360 bytes
2,886,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,157 >>> mbox cmd response: success
3,080,405 UART: [afmc] ++
3,080,573 UART: [afmc] CDI.KEYID = 6
3,080,935 UART: [afmc] SUBJECT.KEYID = 7
3,081,360 UART: [afmc] AUTHORITY.KEYID = 5
3,116,201 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,014 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,704 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,533 UART: [afmc] --
3,159,443 UART: [cold-reset] --
3,160,399 UART: [state] Locking Datavault
3,161,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,320 UART: [state] Locking ICCM
3,162,810 UART: [exit] Launching FMC @ 0x40000130
3,168,139 UART:
3,168,155 UART: Running Caliptra FMC ...
3,168,563 UART:
3,168,617 UART: [state] CFI Enabled
3,178,918 UART: [fht] FMC Alias Private Key: 7
3,286,925 UART: [art] Extend RT PCRs Done
3,287,353 UART: [art] Lock RT PCRs Done
3,288,909 UART: [art] Populate DV Done
3,297,242 UART: [fht] FMC Alias Private Key: 7
3,298,310 UART: [art] Derive CDI
3,298,590 UART: [art] Store in in slot 0x4
3,384,297 UART: [art] Derive Key Pair
3,384,657 UART: [art] Store priv key in slot 0x5
3,397,973 UART: [art] Derive Key Pair - Done
3,412,803 UART: [art] Signing Cert with AUTHO
3,413,283 UART: RITY.KEYID = 7
3,428,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,448 UART: [art] PUB.X = 9CECF3DBE56EF27DE356007E93B1D6AAF3B7407FD557CBDA9761933D82C9A53E1AC7BB98F0EC2541C61DCAF0F2482C73
3,436,218 UART: [art] PUB.Y = B38E1553C85DC537CC01BA274DF634D10350C26F0BB15E58DD8F04B12FCDAC8C1E884E87EC9300F907497080E53A80C7
3,443,139 UART: [art] SIG.R = A6701839E7BD471FD70627CBDF7AC1A7BF34B683D6A9A5CBC5599FD9C3A7232D294583E4C6893D7B445300293105A538
3,449,883 UART: [art] SIG.S = 9548A84B9E3203E6D76F8BC7B7771E13558889B52EAE730D83BB4DD367E73D1C46C158FEB627611E0568C4C601FD7DBB
3,473,040 UART: Caliptra RT
3,473,294 UART: [state] CFI Enabled
3,581,339 UART: [rt] RT listening for mailbox commands...
3,582,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,732 UART: [rt]cmd =0x41544d4e, len=14344
3,849,446 >>> mbox cmd response data (8 bytes)
3,849,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,496 UART: [rt]cmd =0x41545348, len=116
3,881,324 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,967 ready_for_fw is high
1,361,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,751 >>> mbox cmd response: success
2,988,663 UART:
2,988,679 UART: Running Caliptra FMC ...
2,989,087 UART:
2,989,141 UART: [state] CFI Enabled
2,999,394 UART: [fht] FMC Alias Private Key: 7
3,107,783 UART: [art] Extend RT PCRs Done
3,108,211 UART: [art] Lock RT PCRs Done
3,109,851 UART: [art] Populate DV Done
3,117,968 UART: [fht] FMC Alias Private Key: 7
3,118,998 UART: [art] Derive CDI
3,119,278 UART: [art] Store in in slot 0x4
3,204,919 UART: [art] Derive Key Pair
3,205,279 UART: [art] Store priv key in slot 0x5
3,219,047 UART: [art] Derive Key Pair - Done
3,234,059 UART: [art] Signing Cert with AUTHO
3,234,539 UART: RITY.KEYID = 7
3,249,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,518 UART: [art] PUB.X = F1AF2B92092B640E6FF5E6528CC19BC50378AC53AA9C709BFB443612ED9987F811136DB160C326958899C633D1E0E97B
3,257,281 UART: [art] PUB.Y = FD9640769C1E424E6817DB2B9DA04025546D7CE50BEBA7EE31C1FB8DEDB8744E6CB0180C44AE1E16DD82555CAC6C12A4
3,264,243 UART: [art] SIG.R = 17BAA82C7A6102D9F0C479C78CBEE40E88479DA69E3EDDAAC6C20C23C0C00C2F50193D5811AF568A75C8538C529B337C
3,271,013 UART: [art] SIG.S = 52EA7E36C623D95B6C8FFA5BBCA0A4B9EAD755CBE65A610671AD3E8EBB3D0129D886F7F208AA914D73EB6276D20C486A
3,294,590 UART: Caliptra RT
3,294,844 UART: [state] CFI Enabled
3,403,931 UART: [rt] RT listening for mailbox commands...
3,404,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,458 UART: [rt]cmd =0x41544d4e, len=14344
3,672,204 >>> mbox cmd response data (8 bytes)
3,672,205 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,434 UART: [rt]cmd =0x41545348, len=116
3,704,526 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,010 UART: [kat] SHA2-256
881,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,056 UART: [kat] ++
886,208 UART: [kat] sha1
890,344 UART: [kat] SHA2-256
892,282 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,181 UART: [kat] HMAC-384Kdf
906,895 UART: [kat] LMS
1,475,091 UART: [kat] --
1,475,932 UART: [cold-reset] ++
1,476,340 UART: [fht] Storing FHT @ 0x50003400
1,478,917 UART: [idev] ++
1,479,085 UART: [idev] CDI.KEYID = 6
1,479,445 UART: [idev] SUBJECT.KEYID = 7
1,479,869 UART: [idev] UDS.KEYID = 0
1,480,214 ready_for_fw is high
1,480,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,559 UART: [idev] Erasing UDS.KEYID = 0
1,504,053 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,593 UART: [idev] --
1,513,452 UART: [ldev] ++
1,513,620 UART: [ldev] CDI.KEYID = 6
1,513,983 UART: [ldev] SUBJECT.KEYID = 5
1,514,409 UART: [ldev] AUTHORITY.KEYID = 7
1,514,872 UART: [ldev] FE.KEYID = 1
1,520,040 UART: [ldev] Erasing FE.KEYID = 1
1,545,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,825 UART: [ldev] --
1,585,116 UART: [fwproc] Waiting for Commands...
1,585,885 UART: [fwproc] Received command 0x46574c44
1,586,676 UART: [fwproc] Received Image of size 114360 bytes
2,884,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,309 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,632 >>> mbox cmd response: success
3,077,808 UART: [afmc] ++
3,077,976 UART: [afmc] CDI.KEYID = 6
3,078,338 UART: [afmc] SUBJECT.KEYID = 7
3,078,763 UART: [afmc] AUTHORITY.KEYID = 5
3,114,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,803 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,493 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,436 UART: [afmc] --
3,157,374 UART: [cold-reset] --
3,158,016 UART: [state] Locking Datavault
3,159,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,075 UART: [state] Locking ICCM
3,160,535 UART: [exit] Launching FMC @ 0x40000130
3,165,864 UART:
3,165,880 UART: Running Caliptra FMC ...
3,166,288 UART:
3,166,431 UART: [state] CFI Enabled
3,177,322 UART: [fht] FMC Alias Private Key: 7
3,284,897 UART: [art] Extend RT PCRs Done
3,285,325 UART: [art] Lock RT PCRs Done
3,286,845 UART: [art] Populate DV Done
3,295,212 UART: [fht] FMC Alias Private Key: 7
3,296,176 UART: [art] Derive CDI
3,296,456 UART: [art] Store in in slot 0x4
3,382,109 UART: [art] Derive Key Pair
3,382,469 UART: [art] Store priv key in slot 0x5
3,395,939 UART: [art] Derive Key Pair - Done
3,410,896 UART: [art] Signing Cert with AUTHO
3,411,376 UART: RITY.KEYID = 7
3,425,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,725 UART: [art] PUB.X = B6F3D7E36BF5F05474E69709947C0BA5E8CA7EDFDE54255EB70DE4ABC07A2C5099C0CFA096B845A76C4040C789F655D7
3,433,500 UART: [art] PUB.Y = 7D394C8F0540045AF9C2BCE78E6CAA2D6163B13E7E4F634B5B9D5B2F75E90B59C893E99C55964D97755E07B531963E72
3,440,440 UART: [art] SIG.R = 86EA89E5D1E269E27E0799E527D69F5E34D1598D70DA4525B3E524212B93A88CB67D2A27C0516425D239FBA49424A450
3,447,203 UART: [art] SIG.S = 55D22EC34D4226744CA3BC6DFE7E8B25F95F5638167ED99765CF90485E38B14FD67B7BCC24A6D5BB454D876B445A1D0A
3,471,727 UART: Caliptra RT
3,472,073 UART: [state] CFI Enabled
3,580,205 UART: [rt] RT listening for mailbox commands...
3,580,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,394 UART: [rt]cmd =0x41544d4e, len=14344
3,848,648 >>> mbox cmd response data (8 bytes)
3,848,649 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,812 UART: [rt]cmd =0x41545348, len=116
3,880,636 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,958 ready_for_fw is high
1,362,958 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,606 >>> mbox cmd response: success
2,990,908 UART:
2,990,924 UART: Running Caliptra FMC ...
2,991,332 UART:
2,991,475 UART: [state] CFI Enabled
3,002,110 UART: [fht] FMC Alias Private Key: 7
3,109,803 UART: [art] Extend RT PCRs Done
3,110,231 UART: [art] Lock RT PCRs Done
3,111,563 UART: [art] Populate DV Done
3,119,840 UART: [fht] FMC Alias Private Key: 7
3,120,838 UART: [art] Derive CDI
3,121,118 UART: [art] Store in in slot 0x4
3,206,627 UART: [art] Derive Key Pair
3,206,987 UART: [art] Store priv key in slot 0x5
3,220,443 UART: [art] Derive Key Pair - Done
3,235,211 UART: [art] Signing Cert with AUTHO
3,235,691 UART: RITY.KEYID = 7
3,250,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,650 UART: [art] PUB.X = 694C8621ED1B4BD1B1FD00FBC2F3C5F97493A02A4A715429F197E0746ABFB6DAA038E9416A269C15AF317383E76FC645
3,258,406 UART: [art] PUB.Y = EF02503CEFB0AACBB7D4F02FA1A2B500610908EBFA4C148DFA24E45AE52A76BA526C3DAB82458E898C55BB3A0702B36A
3,265,341 UART: [art] SIG.R = 120AACD316D30ECBDEFD31FA659C3B7E7FDC91DE75293022E7B40BAB21A13F9D05B870C0C4EF7756BB514DD9C9BE2304
3,272,118 UART: [art] SIG.S = 1DFE0ADA36DA063D5A3F3D4B9F0FD3CADE954ADA23F185B0A7CF64EA8DE9DBF285B9BAB62E12EF117ED4E489C24C54CF
3,295,944 UART: Caliptra RT
3,296,290 UART: [state] CFI Enabled
3,405,479 UART: [rt] RT listening for mailbox commands...
3,406,149 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,828 UART: [rt]cmd =0x41544d4e, len=14344
3,673,580 >>> mbox cmd response data (8 bytes)
3,673,581 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,766 UART: [rt]cmd =0x41545348, len=116
3,705,428 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,174 UART: [kat] SHA2-256
892,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,949 UART: [kat] ++
897,101 UART: [kat] sha1
901,447 UART: [kat] SHA2-256
903,387 UART: [kat] SHA2-384
906,190 UART: [kat] SHA2-512-ACC
908,091 UART: [kat] ECC-384
917,820 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,825 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 ready_for_fw is high
1,176,197 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,353 UART: [idev] --
1,210,447 UART: [ldev] ++
1,210,615 UART: [ldev] CDI.KEYID = 6
1,210,978 UART: [ldev] SUBJECT.KEYID = 5
1,211,404 UART: [ldev] AUTHORITY.KEYID = 7
1,211,867 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,269 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,348 UART: [fwproc] Recv command 0x46574c44
1,284,076 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,898 >>> mbox cmd response: success
2,774,958 UART: [afmc] ++
2,775,126 UART: [afmc] CDI.KEYID = 6
2,775,488 UART: [afmc] SUBJECT.KEYID = 7
2,775,913 UART: [afmc] AUTHORITY.KEYID = 5
2,811,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,867 UART: [afmc] --
2,854,799 UART: [cold-reset] --
2,855,577 UART: [state] Locking Datavault
2,856,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,310 UART: [state] Locking ICCM
2,857,920 UART: [exit] Launching FMC @ 0x40000130
2,863,249 UART:
2,863,265 UART: Running Caliptra FMC ...
2,863,673 UART:
2,863,727 UART: [state] CFI Enabled
2,874,408 UART: [fht] FMC Alias Private Key: 7
2,982,227 UART: [art] Extend RT PCRs Done
2,982,655 UART: [art] Lock RT PCRs Done
2,984,359 UART: [art] Populate DV Done
2,992,394 UART: [fht] FMC Alias Private Key: 7
2,993,488 UART: [art] Derive CDI
2,993,768 UART: [art] Store in in slot 0x4
3,079,413 UART: [art] Derive Key Pair
3,079,773 UART: [art] Store priv key in slot 0x5
3,092,543 UART: [art] Derive Key Pair - Done
3,107,364 UART: [art] Signing Cert with AUTHO
3,107,844 UART: RITY.KEYID = 7
3,123,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,979 UART: [art] PUB.X = AF0B625DDE3AACCA87A345B8E316C7A3D60AED144EF4D96632B427DC3AB9C8335C0A10910B48C274A2391BE36F319188
3,130,749 UART: [art] PUB.Y = 21670D12D0B6C9D7DD68F20E665D5AC9370DCAD6B17332D4BDDE147B26E5E1B532D92B500E8E38ED15EE43913DE33798
3,137,697 UART: [art] SIG.R = 9F3FB3D5545AB9B76E4B8205E141C5D0FC455A2E2B43C063D55CB2281675F8BFB1AC6C5FED3FE9277948D645CE9855E9
3,144,476 UART: [art] SIG.S = D2F68C3C1B5E9B54BA013CCA7C9C99F73B132CC45936E5B13563E98D707D3F54D074072F36542308AF06C42DB2016BA3
3,168,144 UART: Caliptra RT
3,168,398 UART: [state] CFI Enabled
3,275,527 UART: [rt] RT listening for mailbox commands...
3,276,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,894 UART: [rt]cmd =0x41544d4e, len=14344
3,544,418 >>> mbox cmd response data (8 bytes)
3,544,419 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,406 UART: [rt]cmd =0x41545348, len=116
3,576,156 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,777 ready_for_fw is high
1,060,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,161 >>> mbox cmd response: success
2,689,403 UART:
2,689,419 UART: Running Caliptra FMC ...
2,689,827 UART:
2,689,881 UART: [state] CFI Enabled
2,700,532 UART: [fht] FMC Alias Private Key: 7
2,808,121 UART: [art] Extend RT PCRs Done
2,808,549 UART: [art] Lock RT PCRs Done
2,809,943 UART: [art] Populate DV Done
2,818,352 UART: [fht] FMC Alias Private Key: 7
2,819,364 UART: [art] Derive CDI
2,819,644 UART: [art] Store in in slot 0x4
2,905,291 UART: [art] Derive Key Pair
2,905,651 UART: [art] Store priv key in slot 0x5
2,919,229 UART: [art] Derive Key Pair - Done
2,933,547 UART: [art] Signing Cert with AUTHO
2,934,027 UART: RITY.KEYID = 7
2,949,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,022 UART: [art] PUB.X = B32C7FE23C33F1FFBFB5B5BF6E7C4437813E85B399E0ABE0AF61F4C5E71902F1D136BFE1D5141623795568B7CEBB1246
2,956,803 UART: [art] PUB.Y = 8C326F7C327AE773CDD957EAAF14E8D7EF5A47674A859BB00C0A89A52B41D5C61D3EC49E7C580B0116551E542EDBD725
2,963,753 UART: [art] SIG.R = 74B904B4B57A81EDB807BB042B8A2BFE4B470129D79A9846445020EFA659E20C67859139BAF3E5F5E6D4AE713B097FA1
2,970,511 UART: [art] SIG.S = F1BB0BC0590CB14B9DFEF0986E8FC895CC2E49D6879E2D331C410B9E1868D3B47DAA99E962AFD9F49CEFA7823DE9F1F8
2,994,825 UART: Caliptra RT
2,995,079 UART: [state] CFI Enabled
3,102,861 UART: [rt] RT listening for mailbox commands...
3,103,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,170 UART: [rt]cmd =0x41544d4e, len=14344
3,371,454 >>> mbox cmd response data (8 bytes)
3,371,455 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,668 UART: [rt]cmd =0x41545348, len=116
3,403,518 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
893,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,988 UART: [kat] ++
898,140 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,091 UART: [kat] SHA2-512-ACC
908,992 UART: [kat] ECC-384
918,845 UART: [kat] HMAC-384Kdf
923,435 UART: [kat] LMS
1,171,763 UART: [kat] --
1,172,652 UART: [cold-reset] ++
1,172,992 UART: [fht] FHT @ 0x50003400
1,175,601 UART: [idev] ++
1,175,769 UART: [idev] CDI.KEYID = 6
1,176,129 UART: [idev] SUBJECT.KEYID = 7
1,176,553 UART: [idev] UDS.KEYID = 0
1,176,898 ready_for_fw is high
1,176,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,267 UART: [idev] Erasing UDS.KEYID = 0
1,201,742 UART: [idev] Sha1 KeyId Algorithm
1,210,364 UART: [idev] --
1,211,520 UART: [ldev] ++
1,211,688 UART: [ldev] CDI.KEYID = 6
1,212,051 UART: [ldev] SUBJECT.KEYID = 5
1,212,477 UART: [ldev] AUTHORITY.KEYID = 7
1,212,940 UART: [ldev] FE.KEYID = 1
1,218,130 UART: [ldev] Erasing FE.KEYID = 1
1,244,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,280 UART: [ldev] --
1,283,767 UART: [fwproc] Wait for Commands...
1,284,543 UART: [fwproc] Recv command 0x46574c44
1,285,271 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,135 >>> mbox cmd response: success
2,775,309 UART: [afmc] ++
2,775,477 UART: [afmc] CDI.KEYID = 6
2,775,839 UART: [afmc] SUBJECT.KEYID = 7
2,776,264 UART: [afmc] AUTHORITY.KEYID = 5
2,812,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,456 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,500 UART: [afmc] --
2,855,562 UART: [cold-reset] --
2,856,536 UART: [state] Locking Datavault
2,857,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,073 UART: [state] Locking ICCM
2,858,621 UART: [exit] Launching FMC @ 0x40000130
2,863,950 UART:
2,863,966 UART: Running Caliptra FMC ...
2,864,374 UART:
2,864,517 UART: [state] CFI Enabled
2,875,262 UART: [fht] FMC Alias Private Key: 7
2,983,437 UART: [art] Extend RT PCRs Done
2,983,865 UART: [art] Lock RT PCRs Done
2,985,391 UART: [art] Populate DV Done
2,993,396 UART: [fht] FMC Alias Private Key: 7
2,994,578 UART: [art] Derive CDI
2,994,858 UART: [art] Store in in slot 0x4
3,080,565 UART: [art] Derive Key Pair
3,080,925 UART: [art] Store priv key in slot 0x5
3,094,135 UART: [art] Derive Key Pair - Done
3,109,341 UART: [art] Signing Cert with AUTHO
3,109,821 UART: RITY.KEYID = 7
3,124,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,330 UART: [art] PUB.X = DD053284A289EE89F81B83E092CF39925A58B4D5A658881B7CFFBDA4D902B79F54D9C4E5EE580E3428BD25D8D065818A
3,132,099 UART: [art] PUB.Y = C39A6B8864125F2D80B4C10644EA9324736C9596B91CD8B244A7F8DEC42B221740EF65FBC6526069DE3C445FD120D498
3,139,046 UART: [art] SIG.R = 42786A15E7A865DE369F19DD3F7F27E381E4C2BE073A8EDA78BB8B973436254D01FDC2C38FB3B7758FB1034AE81433B4
3,145,815 UART: [art] SIG.S = 193025069AB1F5869440DDD1B4BA494AD0E56D0E51B9D07E5D80B5BA0000403B578C176451C39D7EF9573F96EA7F02A7
3,169,423 UART: Caliptra RT
3,169,769 UART: [state] CFI Enabled
3,278,591 UART: [rt] RT listening for mailbox commands...
3,279,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,208 UART: [rt]cmd =0x41544d4e, len=14344
3,547,004 >>> mbox cmd response data (8 bytes)
3,547,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,396 UART: [rt]cmd =0x41545348, len=116
3,579,292 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,666 ready_for_fw is high
1,060,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,629,188 >>> mbox cmd response: success
2,691,570 UART:
2,691,586 UART: Running Caliptra FMC ...
2,691,994 UART:
2,692,137 UART: [state] CFI Enabled
2,702,786 UART: [fht] FMC Alias Private Key: 7
2,811,103 UART: [art] Extend RT PCRs Done
2,811,531 UART: [art] Lock RT PCRs Done
2,812,607 UART: [art] Populate DV Done
2,820,684 UART: [fht] FMC Alias Private Key: 7
2,821,760 UART: [art] Derive CDI
2,822,040 UART: [art] Store in in slot 0x4
2,907,961 UART: [art] Derive Key Pair
2,908,321 UART: [art] Store priv key in slot 0x5
2,922,275 UART: [art] Derive Key Pair - Done
2,937,280 UART: [art] Signing Cert with AUTHO
2,937,760 UART: RITY.KEYID = 7
2,953,034 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,799 UART: [art] PUB.X = 3796A411E63B89098E2523D4ACED3F687DA14A4C9BAC067A37CE5817ADECC59B973385B01DAB0756F69D4535973BD43E
2,960,568 UART: [art] PUB.Y = D1C3604209F1C7B6BD5405D9F1587B4952E1A8C0BD55C793E1C938782C353B27B121C852ED7426C67E33D097D0FDFC09
2,967,511 UART: [art] SIG.R = AE8F9007A0F5EC6B6A10A98CAC5A848CCB22895DA8FD9954E81B3D69C173C4CB15F58FAF929046C6F54DB30F4A83DDD7
2,974,295 UART: [art] SIG.S = 5440CD215F39D9998CFDB5E15663A82B367089325BBE151FC7B6CC4D88E546809E696147038B3408947C186352B7F495
2,998,944 UART: Caliptra RT
2,999,290 UART: [state] CFI Enabled
3,106,550 UART: [rt] RT listening for mailbox commands...
3,107,220 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,169 UART: [rt]cmd =0x41544d4e, len=14344
3,374,817 >>> mbox cmd response data (8 bytes)
3,374,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,761 UART: [rt]cmd =0x41545348, len=116
3,406,483 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,680 UART: [state] LifecycleState = Unprovisioned
85,335 UART: [state] DebugLocked = No
85,885 UART: [state] WD Timer not started. Device not locked for debugging
87,100 UART: [kat] SHA2-256
890,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,779 UART: [kat] ++
894,931 UART: [kat] sha1
899,173 UART: [kat] SHA2-256
901,113 UART: [kat] SHA2-384
903,742 UART: [kat] SHA2-512-ACC
905,643 UART: [kat] ECC-384
915,380 UART: [kat] HMAC-384Kdf
919,952 UART: [kat] LMS
1,168,264 UART: [kat] --
1,168,839 UART: [cold-reset] ++
1,169,351 UART: [fht] FHT @ 0x50003400
1,172,025 UART: [idev] ++
1,172,193 UART: [idev] CDI.KEYID = 6
1,172,554 UART: [idev] SUBJECT.KEYID = 7
1,172,979 UART: [idev] UDS.KEYID = 0
1,173,325 ready_for_fw is high
1,173,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,325 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,768 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,596 >>> mbox cmd response: success
2,772,729 UART: [afmc] ++
2,772,897 UART: [afmc] CDI.KEYID = 6
2,773,260 UART: [afmc] SUBJECT.KEYID = 7
2,773,686 UART: [afmc] AUTHORITY.KEYID = 5
2,809,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,600 UART: [afmc] --
2,852,570 UART: [cold-reset] --
2,853,524 UART: [state] Locking Datavault
2,854,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,291 UART: [state] Locking ICCM
2,855,801 UART: [exit] Launching FMC @ 0x40000130
2,861,130 UART:
2,861,146 UART: Running Caliptra FMC ...
2,861,554 UART:
2,861,608 UART: [state] CFI Enabled
2,871,827 UART: [fht] FMC Alias Private Key: 7
2,980,040 UART: [art] Extend RT PCRs Done
2,980,468 UART: [art] Lock RT PCRs Done
2,982,026 UART: [art] Populate DV Done
2,990,043 UART: [fht] FMC Alias Private Key: 7
2,990,977 UART: [art] Derive CDI
2,991,257 UART: [art] Store in in slot 0x4
3,076,970 UART: [art] Derive Key Pair
3,077,330 UART: [art] Store priv key in slot 0x5
3,090,300 UART: [art] Derive Key Pair - Done
3,105,299 UART: [art] Signing Cert with AUTHO
3,105,779 UART: RITY.KEYID = 7
3,120,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,712 UART: [art] PUB.X = 9E86711CFF6444C6D93718C42891609E6DE37CEDD89EE12931604735A57DC0C9B3E1005241768CE8431AA7BFC5290A1A
3,128,457 UART: [art] PUB.Y = A2F28EB463E18751E8BA7B244F236E1113342EFD7562F10D4A4EE68DF92F893816025AF639A517D4C9887FF9E81EE750
3,135,403 UART: [art] SIG.R = 4450AB70BAD97DD2F6CC3DB30EC8579FA397E9BFB9490859855AF80C9F0BF4924FA82B11D19DF215F6FD09406C3F025A
3,142,169 UART: [art] SIG.S = 8E2C81BB14329049E03228CEDE08671363B6CD1919DB0B4286040316C01C9291976D7125D1D9AA1020115238E47D3EF2
3,166,314 UART: Caliptra RT
3,166,568 UART: [state] CFI Enabled
3,274,472 UART: [rt] RT listening for mailbox commands...
3,275,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,773 UART: [rt]cmd =0x41544d4e, len=14344
3,542,639 >>> mbox cmd response data (8 bytes)
3,542,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,793 UART: [rt]cmd =0x41545348, len=116
3,574,617 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,654 ready_for_fw is high
1,056,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,238 >>> mbox cmd response: success
2,685,256 UART:
2,685,272 UART: Running Caliptra FMC ...
2,685,680 UART:
2,685,734 UART: [state] CFI Enabled
2,696,697 UART: [fht] FMC Alias Private Key: 7
2,804,440 UART: [art] Extend RT PCRs Done
2,804,868 UART: [art] Lock RT PCRs Done
2,806,478 UART: [art] Populate DV Done
2,814,803 UART: [fht] FMC Alias Private Key: 7
2,815,931 UART: [art] Derive CDI
2,816,211 UART: [art] Store in in slot 0x4
2,901,612 UART: [art] Derive Key Pair
2,901,972 UART: [art] Store priv key in slot 0x5
2,915,248 UART: [art] Derive Key Pair - Done
2,929,831 UART: [art] Signing Cert with AUTHO
2,930,311 UART: RITY.KEYID = 7
2,945,511 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,276 UART: [art] PUB.X = CE5DA8909FE15495585CE2EBC2553ACDDD6E9F89FF14C8262340E5344CD8D7E8FAB4580FFA574B9C10B0C4FC4A0F21F4
2,953,060 UART: [art] PUB.Y = FF62A3566FFA8CCA4EBD7E49CED88DE4986439BDED0D6257601FDDD7161519CE3AE5E3C2304F3666BCD59DC408EA91F3
2,960,026 UART: [art] SIG.R = 9D55806D5EB0BD4FAEBA10AD9A40F1928F9D3CB16D82D63B8336E4B78AA0C3129BFD16DD00299814BE2B72C0FC6A42CF
2,966,794 UART: [art] SIG.S = DE7BB45FFD84B2934F64675F612B9B59C20677DA0B2E8C94A83DFDAA8416D256B29051F72A904258EBE2D60A00CD7928
2,991,290 UART: Caliptra RT
2,991,544 UART: [state] CFI Enabled
3,100,017 UART: [rt] RT listening for mailbox commands...
3,100,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,468 UART: [rt]cmd =0x41544d4e, len=14344
3,368,440 >>> mbox cmd response data (8 bytes)
3,368,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,272 UART: [rt]cmd =0x41545348, len=116
3,400,006 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,354 UART: [kat] SHA2-256
902,294 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,817 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,342 UART: [fht] FHT @ 0x50003400
1,174,162 UART: [idev] ++
1,174,330 UART: [idev] CDI.KEYID = 6
1,174,691 UART: [idev] SUBJECT.KEYID = 7
1,175,116 UART: [idev] UDS.KEYID = 0
1,175,462 ready_for_fw is high
1,175,462 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,004 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,208,950 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,603 UART: [ldev] SUBJECT.KEYID = 5
1,211,030 UART: [ldev] AUTHORITY.KEYID = 7
1,211,493 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,401 UART: [fwproc] Wait for Commands...
1,283,104 UART: [fwproc] Recv command 0x46574c44
1,283,837 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,567 >>> mbox cmd response: success
2,774,742 UART: [afmc] ++
2,774,910 UART: [afmc] CDI.KEYID = 6
2,775,273 UART: [afmc] SUBJECT.KEYID = 7
2,775,699 UART: [afmc] AUTHORITY.KEYID = 5
2,811,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,765 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,427 UART: [afmc] --
2,854,345 UART: [cold-reset] --
2,855,075 UART: [state] Locking Datavault
2,856,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,928 UART: [state] Locking ICCM
2,857,600 UART: [exit] Launching FMC @ 0x40000130
2,862,929 UART:
2,862,945 UART: Running Caliptra FMC ...
2,863,353 UART:
2,863,496 UART: [state] CFI Enabled
2,874,275 UART: [fht] FMC Alias Private Key: 7
2,982,208 UART: [art] Extend RT PCRs Done
2,982,636 UART: [art] Lock RT PCRs Done
2,984,074 UART: [art] Populate DV Done
2,992,307 UART: [fht] FMC Alias Private Key: 7
2,993,489 UART: [art] Derive CDI
2,993,769 UART: [art] Store in in slot 0x4
3,079,514 UART: [art] Derive Key Pair
3,079,874 UART: [art] Store priv key in slot 0x5
3,093,620 UART: [art] Derive Key Pair - Done
3,108,314 UART: [art] Signing Cert with AUTHO
3,108,794 UART: RITY.KEYID = 7
3,123,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,615 UART: [art] PUB.X = 167FB1B10418D746EBE9875B2CA7EE74CF76324BCB5A67379B9546A8DA7401853117A2EB27A085F894C9EC10B40355DB
3,131,380 UART: [art] PUB.Y = 02AF26106386D0FE4E4C406969364B9002439DE61610388B87CE04B01A438C346416D59D5377DE839876B23211BC736C
3,138,307 UART: [art] SIG.R = 4A9A12BF94DAA18F21078EED3B50F041B75754FFB855A6C0839544185A9D704AB41D96D70084229CBADB82C645EF75EB
3,145,060 UART: [art] SIG.S = F738C1026A448CF642F30195B877015869762A29F3732443459D918BF039155BAFABE5CFC4980F04D344D17223EAE913
3,169,146 UART: Caliptra RT
3,169,492 UART: [state] CFI Enabled
3,277,870 UART: [rt] RT listening for mailbox commands...
3,278,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,227 UART: [rt]cmd =0x41544d4e, len=14344
3,546,203 >>> mbox cmd response data (8 bytes)
3,546,204 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,269 UART: [rt]cmd =0x41545348, len=116
3,578,139 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,631 ready_for_fw is high
1,056,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,551 >>> mbox cmd response: success
2,686,259 UART:
2,686,275 UART: Running Caliptra FMC ...
2,686,683 UART:
2,686,826 UART: [state] CFI Enabled
2,697,715 UART: [fht] FMC Alias Private Key: 7
2,805,892 UART: [art] Extend RT PCRs Done
2,806,320 UART: [art] Lock RT PCRs Done
2,808,102 UART: [art] Populate DV Done
2,816,327 UART: [fht] FMC Alias Private Key: 7
2,817,291 UART: [art] Derive CDI
2,817,571 UART: [art] Store in in slot 0x4
2,903,210 UART: [art] Derive Key Pair
2,903,570 UART: [art] Store priv key in slot 0x5
2,916,122 UART: [art] Derive Key Pair - Done
2,930,857 UART: [art] Signing Cert with AUTHO
2,931,337 UART: RITY.KEYID = 7
2,946,291 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,056 UART: [art] PUB.X = ECDC1B14E111F36F027FDEFBE148635E7AFE53E988B7343BA055C3466686BDC6207BCC25A4A821436BD5E077EFCB4C5E
2,953,841 UART: [art] PUB.Y = 78E18DD7B2952EF2FF0667464580C9F8C5DD34E8341C62811A6B2A6EDD580A2C0DCB79DBAAE0F6E0301D9992047CADC0
2,960,793 UART: [art] SIG.R = C6FE9024130B9B52D95F29C32DD094E6955041379E2E0C4E613ECBC3041AB7856CAA89B97DAD0FD92B7D611A3C1117CD
2,967,561 UART: [art] SIG.S = A8728A54ACE07BB2AB2485E2A3784E4FD8B5A5E3E64AFCC72419E2A362D4BB8000589CBBF3C703B2C7B620962D39FFDA
2,991,611 UART: Caliptra RT
2,991,957 UART: [state] CFI Enabled
3,100,156 UART: [rt] RT listening for mailbox commands...
3,100,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,591 UART: [rt]cmd =0x41544d4e, len=14344
3,368,283 >>> mbox cmd response data (8 bytes)
3,368,284 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,523 UART: [rt]cmd =0x41545348, len=116
3,400,357 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,505 UART:
192,878 UART: Running Caliptra ROM ...
193,962 UART:
194,102 UART: [state] CFI Enabled
264,064 UART: [state] LifecycleState = Unprovisioned
266,044 UART: [state] DebugLocked = No
268,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,333 UART: [kat] SHA2-256
444,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,500 UART: [kat] ++
455,019 UART: [kat] sha1
466,596 UART: [kat] SHA2-256
469,307 UART: [kat] SHA2-384
475,088 UART: [kat] SHA2-512-ACC
477,462 UART: [kat] ECC-384
2,765,168 UART: [kat] HMAC-384Kdf
2,798,994 UART: [kat] LMS
3,989,290 UART: [kat] --
3,992,021 UART: [cold-reset] ++
3,993,882 UART: [fht] Storing FHT @ 0x50003400
4,004,074 UART: [idev] ++
4,004,636 UART: [idev] CDI.KEYID = 6
4,005,584 UART: [idev] SUBJECT.KEYID = 7
4,006,817 UART: [idev] UDS.KEYID = 0
4,007,771 ready_for_fw is high
4,007,957 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,151,355 UART: [idev] Erasing UDS.KEYID = 0
7,342,526 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,605 UART: [idev] --
7,369,442 UART: [ldev] ++
7,370,056 UART: [ldev] CDI.KEYID = 6
7,371,022 UART: [ldev] SUBJECT.KEYID = 5
7,372,230 UART: [ldev] AUTHORITY.KEYID = 7
7,373,467 UART: [ldev] FE.KEYID = 1
7,421,252 UART: [ldev] Erasing FE.KEYID = 1
10,754,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,969 UART: [ldev] --
13,111,203 UART: [fwproc] Waiting for Commands...
13,114,427 UART: [fwproc] Received command 0x46574c44
13,116,649 UART: [fwproc] Received Image of size 114036 bytes
17,176,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,381 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,638,317 >>> mbox cmd response: success
17,642,968 UART: [afmc] ++
17,643,557 UART: [afmc] CDI.KEYID = 6
17,644,459 UART: [afmc] SUBJECT.KEYID = 7
17,645,901 UART: [afmc] AUTHORITY.KEYID = 5
21,011,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,854 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,131 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,554 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,372 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,809 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,380,167 UART: [afmc] --
23,383,436 UART: [cold-reset] --
23,387,023 UART: [state] Locking Datavault
23,392,122 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,817 UART: [state] Locking ICCM
23,396,068 UART: [exit] Launching FMC @ 0x40000130
23,404,465 UART:
23,404,691 UART: Running Caliptra FMC ...
23,405,782 UART:
23,406,145 UART: [state] CFI Enabled
23,472,589 UART: [fht] FMC Alias Private Key: 7
25,810,394 UART: [art] Extend RT PCRs Done
25,811,627 UART: [art] Lock RT PCRs Done
25,813,327 UART: [art] Populate DV Done
25,818,785 UART: [fht] FMC Alias Private Key: 7
25,820,316 UART: [art] Derive CDI
25,821,123 UART: [art] Store in in slot 0x4
25,880,860 UART: [art] Derive Key Pair
25,881,852 UART: [art] Store priv key in slot 0x5
29,174,738 UART: [art] Derive Key Pair - Done
29,187,687 UART: [art] Signing Cert with AUTHO
29,188,987 UART: RITY.KEYID = 7
31,477,284 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,786 UART: [art] PUB.X = ED22E929D98441B695F56D25E512239856FC51AD0B4E6998D34FEB0E7AAFC19D8D0366E2B2667A071C770E4A18AC684D
31,486,198 UART: [art] PUB.Y = C4FB12D681D5181BAB63C85710A26947D1DF74963F65AB0D45576025B6E820EF87295350EDA1DCDA5782B20228AA1BB8
31,493,262 UART: [art] SIG.R = 3DA87F5A820B8B6167A02734808553DC2E5A48EF6AB36E0D0BBF78444C8C8E9EF552ECFBE38A8704BDE8FC52B41E9C7B
31,500,678 UART: [art] SIG.S = 583D5A0A814AC4817317F70853D73F0D877773671A84CC8E1DFC2266D6A5C005488C96643A1CBAA941594D53D72C3806
32,805,288 UART: Caliptra RT
32,805,993 UART: [state] CFI Enabled
32,968,336 UART: [rt] RT listening for mailbox commands...
36,998,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,154,590 UART: [rt]cmd =0x41544d4e, len=14344
42,390,119 >>> mbox cmd response data (8 bytes)
42,390,714 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,421,618 UART: [rt]cmd =0x41545348, len=116
42,423,950 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,804,826 ready_for_fw is high
3,805,221 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,893,974 >>> mbox cmd response: success
23,592,047 UART:
23,592,452 UART: Running Caliptra FMC ...
23,593,578 UART:
23,593,733 UART: [state] CFI Enabled
23,659,992 UART: [fht] FMC Alias Private Key: 7
25,998,115 UART: [art] Extend RT PCRs Done
25,999,341 UART: [art] Lock RT PCRs Done
26,000,903 UART: [art] Populate DV Done
26,006,504 UART: [fht] FMC Alias Private Key: 7
26,008,105 UART: [art] Derive CDI
26,008,865 UART: [art] Store in in slot 0x4
26,068,828 UART: [art] Derive Key Pair
26,069,867 UART: [art] Store priv key in slot 0x5
29,362,316 UART: [art] Derive Key Pair - Done
29,375,498 UART: [art] Signing Cert with AUTHO
29,376,804 UART: RITY.KEYID = 7
31,663,810 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,322 UART: [art] PUB.X = A70633A662303E1F043D396BF991EED08FB069BCF9128C493FBF3BF90B8F46B3D81A0ECF59E55152C33657EF89A8B484
31,672,551 UART: [art] PUB.Y = 6EF0A7CBA368DA1D199F14BDCB8EF04F878C4DD4F482E21EE84CE407F12746BA2A63EC02547D1A72DB72389C209ACD99
31,679,808 UART: [art] SIG.R = 50C6D381341306B92496A6F3D0F3BA9D878E8401275CCAD8FD353D03F6AA6D15EA5C5559FF8EE7CB504A0677A78E7540
31,687,226 UART: [art] SIG.S = 0DE5C7D336DAA1CA3F7C1B4AE619735BF4F51D6AF0C8ECA4597FE3B147C608F2B5054783F330BAC895B6B64AF3CBE1AE
32,992,089 UART: Caliptra RT
32,992,813 UART: [state] CFI Enabled
33,152,968 UART: [rt] RT listening for mailbox commands...
37,183,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,338,455 UART: [rt]cmd =0x41544d4e, len=14344
42,573,305 >>> mbox cmd response data (8 bytes)
42,573,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,604,610 UART: [rt]cmd =0x41545348, len=116
42,606,737 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,448 UART:
192,794 UART: Running Caliptra ROM ...
193,979 UART:
603,756 UART: [state] CFI Enabled
620,816 UART: [state] LifecycleState = Unprovisioned
622,756 UART: [state] DebugLocked = No
624,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,702 UART: [kat] SHA2-256
799,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,045 UART: [kat] ++
810,583 UART: [kat] sha1
820,272 UART: [kat] SHA2-256
822,992 UART: [kat] SHA2-384
829,124 UART: [kat] SHA2-512-ACC
831,488 UART: [kat] ECC-384
3,114,360 UART: [kat] HMAC-384Kdf
3,125,519 UART: [kat] LMS
4,315,593 UART: [kat] --
4,321,214 UART: [cold-reset] ++
4,322,857 UART: [fht] Storing FHT @ 0x50003400
4,334,412 UART: [idev] ++
4,334,970 UART: [idev] CDI.KEYID = 6
4,335,950 UART: [idev] SUBJECT.KEYID = 7
4,337,197 UART: [idev] UDS.KEYID = 0
4,338,169 ready_for_fw is high
4,338,361 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,533 UART: [idev] Erasing UDS.KEYID = 0
7,625,371 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,202 UART: [idev] --
7,649,493 UART: [ldev] ++
7,650,058 UART: [ldev] CDI.KEYID = 6
7,651,023 UART: [ldev] SUBJECT.KEYID = 5
7,652,235 UART: [ldev] AUTHORITY.KEYID = 7
7,653,514 UART: [ldev] FE.KEYID = 1
7,665,728 UART: [ldev] Erasing FE.KEYID = 1
10,951,894 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,550 UART: [ldev] --
13,312,729 UART: [fwproc] Waiting for Commands...
13,315,354 UART: [fwproc] Received command 0x46574c44
13,317,549 UART: [fwproc] Received Image of size 114036 bytes
17,373,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,466 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,368 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,836,792 >>> mbox cmd response: success
17,840,590 UART: [afmc] ++
17,841,187 UART: [afmc] CDI.KEYID = 6
17,842,096 UART: [afmc] SUBJECT.KEYID = 7
17,843,369 UART: [afmc] AUTHORITY.KEYID = 5
21,158,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,807 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,175 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,009 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,443 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,173 UART: [afmc] --
23,525,008 UART: [cold-reset] --
23,530,225 UART: [state] Locking Datavault
23,537,035 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,796 UART: [state] Locking ICCM
23,540,296 UART: [exit] Launching FMC @ 0x40000130
23,548,687 UART:
23,548,921 UART: Running Caliptra FMC ...
23,550,019 UART:
23,550,182 UART: [state] CFI Enabled
23,558,449 UART: [fht] FMC Alias Private Key: 7
25,889,706 UART: [art] Extend RT PCRs Done
25,890,926 UART: [art] Lock RT PCRs Done
25,892,545 UART: [art] Populate DV Done
25,898,172 UART: [fht] FMC Alias Private Key: 7
25,899,652 UART: [art] Derive CDI
25,900,463 UART: [art] Store in in slot 0x4
25,943,127 UART: [art] Derive Key Pair
25,944,165 UART: [art] Store priv key in slot 0x5
29,186,372 UART: [art] Derive Key Pair - Done
29,199,478 UART: [art] Signing Cert with AUTHO
29,200,787 UART: RITY.KEYID = 7
31,480,553 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,064 UART: [art] PUB.X = CD978780677A3329EF0445371C46812166392B2CAD4D547F65BD3A616953140D9F70889D61256CAA8C6EC04B5BEE98F7
31,489,274 UART: [art] PUB.Y = 153807378D1A99FC1651C3C41E54921853429EF51E288C5B143608E158A646FDB6F1DF96412D4409635B0F31F2AAEF63
31,496,516 UART: [art] SIG.R = 9992FD0CE5D598CCC9DDBF2AA02869D94D58E15C7112C794AFF20C8362AEB430F80B46FCCFABFB66AEA0031063271B88
31,503,919 UART: [art] SIG.S = BCDD24024764D1DE237ADA0E55C7EC6AF8AD11BEE1891CFF5B38594B25CB43FD9C5492A71994B779F2CB439D75215878
32,808,915 UART: Caliptra RT
32,809,632 UART: [state] CFI Enabled
32,927,666 UART: [rt] RT listening for mailbox commands...
36,947,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,102,484 UART: [rt]cmd =0x41544d4e, len=14344
42,337,788 >>> mbox cmd response data (8 bytes)
42,338,391 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,369,178 UART: [rt]cmd =0x41545348, len=116
42,371,274 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,129,279 ready_for_fw is high
4,129,888 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,066,697 >>> mbox cmd response: success
23,714,138 UART:
23,714,525 UART: Running Caliptra FMC ...
23,715,658 UART:
23,715,818 UART: [state] CFI Enabled
23,723,498 UART: [fht] FMC Alias Private Key: 7
26,054,248 UART: [art] Extend RT PCRs Done
26,055,477 UART: [art] Lock RT PCRs Done
26,057,047 UART: [art] Populate DV Done
26,062,367 UART: [fht] FMC Alias Private Key: 7
26,063,966 UART: [art] Derive CDI
26,064,805 UART: [art] Store in in slot 0x4
26,107,462 UART: [art] Derive Key Pair
26,108,456 UART: [art] Store priv key in slot 0x5
29,350,686 UART: [art] Derive Key Pair - Done
29,363,798 UART: [art] Signing Cert with AUTHO
29,365,110 UART: RITY.KEYID = 7
31,644,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,554 UART: [art] PUB.X = 399F9FEFC7EC85FA9CCD8D80401298C46CDB4C5A6A67E9D8716C9EE65033B42A21FFD8EE3FFFA750EC7C0BC8583AA992
31,653,674 UART: [art] PUB.Y = CAFD5195E65F18CF91FFB0E0A28D4FBC30274CD1BD71A0BCBD32BB596D9B50F780454F0DD2C438EFF653C613BD2C09AC
31,660,944 UART: [art] SIG.R = 37A62DBF4120C6E8CE038C9863149F36A740285A208DE933BDACC9EA0DFA0E68551FB092D2FF9C11E66C7AF0BA51B04E
31,668,373 UART: [art] SIG.S = EB9692E0F848B38E1CB16375B8F975B45A0942C1AAA6520BECD3ACC5F481F79C87EEFB916D0E30D871DD0247E420F53F
32,973,295 UART: Caliptra RT
32,974,014 UART: [state] CFI Enabled
33,092,029 UART: [rt] RT listening for mailbox commands...
37,111,453 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,267,206 UART: [rt]cmd =0x41544d4e, len=14344
42,502,813 >>> mbox cmd response data (8 bytes)
42,503,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,534,282 UART: [rt]cmd =0x41545348, len=116
42,536,582 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,560 writing to cptra_bootfsm_go
192,749 UART:
193,096 UART: Running Caliptra ROM ...
194,291 UART:
194,447 UART: [state] CFI Enabled
261,759 UART: [state] LifecycleState = Unprovisioned
263,671 UART: [state] DebugLocked = No
265,418 UART: [state] WD Timer not started. Device not locked for debugging
269,875 UART: [kat] SHA2-256
448,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,597 UART: [kat] ++
461,049 UART: [kat] sha1
472,207 UART: [kat] SHA2-256
475,217 UART: [kat] SHA2-384
480,505 UART: [kat] SHA2-512-ACC
483,457 UART: [kat] ECC-384
2,945,789 UART: [kat] HMAC-384Kdf
2,970,783 UART: [kat] LMS
3,500,246 UART: [kat] --
3,504,306 UART: [cold-reset] ++
3,506,377 UART: [fht] FHT @ 0x50003400
3,517,459 UART: [idev] ++
3,518,063 UART: [idev] CDI.KEYID = 6
3,519,000 UART: [idev] SUBJECT.KEYID = 7
3,520,111 UART: [idev] UDS.KEYID = 0
3,521,107 ready_for_fw is high
3,521,323 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,061 UART: [idev] Erasing UDS.KEYID = 0
6,025,569 UART: [idev] Sha1 KeyId Algorithm
6,049,166 UART: [idev] --
6,051,815 UART: [ldev] ++
6,052,392 UART: [ldev] CDI.KEYID = 6
6,053,304 UART: [ldev] SUBJECT.KEYID = 5
6,054,632 UART: [ldev] AUTHORITY.KEYID = 7
6,055,820 UART: [ldev] FE.KEYID = 1
6,099,538 UART: [ldev] Erasing FE.KEYID = 1
8,603,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,327 UART: [ldev] --
10,414,713 UART: [fwproc] Wait for Commands...
10,416,224 UART: [fwproc] Recv command 0x46574c44
10,418,320 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,290,014 >>> mbox cmd response: success
14,294,914 UART: [afmc] ++
14,295,516 UART: [afmc] CDI.KEYID = 6
14,296,428 UART: [afmc] SUBJECT.KEYID = 7
14,297,592 UART: [afmc] AUTHORITY.KEYID = 5
16,831,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,412 UART: [afmc] --
18,629,304 UART: [cold-reset] --
18,631,868 UART: [state] Locking Datavault
18,635,287 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,041 UART: [state] Locking ICCM
18,639,370 UART: [exit] Launching FMC @ 0x40000130
18,647,772 UART:
18,648,013 UART: Running Caliptra FMC ...
18,649,118 UART:
18,649,285 UART: [state] CFI Enabled
18,710,481 UART: [fht] FMC Alias Private Key: 7
20,474,963 UART: [art] Extend RT PCRs Done
20,476,281 UART: [art] Lock RT PCRs Done
20,477,692 UART: [art] Populate DV Done
20,483,101 UART: [fht] FMC Alias Private Key: 7
20,484,747 UART: [art] Derive CDI
20,485,562 UART: [art] Store in in slot 0x4
20,543,087 UART: [art] Derive Key Pair
20,544,090 UART: [art] Store priv key in slot 0x5
23,007,377 UART: [art] Derive Key Pair - Done
23,020,118 UART: [art] Signing Cert with AUTHO
23,021,430 UART: RITY.KEYID = 7
24,733,238 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,722 UART: [art] PUB.X = 5327AF7CF49831DCC13CD4114B666B58EAAD4FF6D8348BEAEE37C197B87A942819BA218639B2C2C4971315FC0F34A720
24,741,986 UART: [art] PUB.Y = 21CECC06CA020198BD00CDD4BEE4B023356AF49F8AE2D95DF0B10E13B58A2D2806BCDAF323C1E431EFDAEA60B5C7C769
24,749,243 UART: [art] SIG.R = 25ED35DD10EF0F6DB08F4DA8CA1E40746372FFBA6D62480FCD1913416D12A8ED9C159A10635E3A4D9C376093F97513DC
24,756,694 UART: [art] SIG.S = FE1AB6814D3324287888F6A86EB9294A01CAF22BBFE6B8E9A9D66BAFB008A26813A2F9B495A34D735732B461571B6E78
25,735,749 UART: Caliptra RT
25,736,462 UART: [state] CFI Enabled
25,900,710 UART: [rt] RT listening for mailbox commands...
29,925,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,080,605 UART: [rt]cmd =0x41544d4e, len=14344
34,010,912 >>> mbox cmd response data (8 bytes)
34,011,507 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,042,357 UART: [rt]cmd =0x41545348, len=116
34,044,619 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,445 UART:
192,809 UART: Running Caliptra ROM ...
194,109 UART:
194,288 UART: [state] CFI Enabled
264,438 UART: [state] LifecycleState = Unprovisioned
266,856 UART: [state] DebugLocked = No
269,181 UART: [state] WD Timer not started. Device not locked for debugging
274,647 UART: [kat] SHA2-256
464,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,262 UART: [kat] ++
475,757 UART: [kat] sha1
486,631 UART: [kat] SHA2-256
489,645 UART: [kat] SHA2-384
495,571 UART: [kat] SHA2-512-ACC
498,157 UART: [kat] ECC-384
2,945,508 UART: [kat] HMAC-384Kdf
2,970,577 UART: [kat] LMS
3,502,348 UART: [kat] --
3,507,268 UART: [cold-reset] ++
3,508,661 UART: [fht] FHT @ 0x50003400
3,519,925 UART: [idev] ++
3,520,635 UART: [idev] CDI.KEYID = 6
3,521,672 UART: [idev] SUBJECT.KEYID = 7
3,522,778 UART: [idev] UDS.KEYID = 0
3,523,845 ready_for_fw is high
3,524,065 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,956 UART: [idev] Erasing UDS.KEYID = 0
6,025,220 UART: [idev] Sha1 KeyId Algorithm
6,047,210 UART: [idev] --
6,052,339 UART: [ldev] ++
6,053,017 UART: [ldev] CDI.KEYID = 6
6,053,905 UART: [ldev] SUBJECT.KEYID = 5
6,055,117 UART: [ldev] AUTHORITY.KEYID = 7
6,056,261 UART: [ldev] FE.KEYID = 1
6,099,366 UART: [ldev] Erasing FE.KEYID = 1
8,605,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,175 UART: [ldev] --
10,413,551 UART: [fwproc] Wait for Commands...
10,416,239 UART: [fwproc] Recv command 0x46574c44
10,418,547 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,598,153 >>> mbox cmd response: success
14,602,160 UART: [afmc] ++
14,602,873 UART: [afmc] CDI.KEYID = 6
14,604,039 UART: [afmc] SUBJECT.KEYID = 7
14,605,547 UART: [afmc] AUTHORITY.KEYID = 5
17,150,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,789 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,885 UART: [afmc] --
18,968,037 UART: [cold-reset] --
18,974,606 UART: [state] Locking Datavault
18,980,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,991 UART: [state] Locking ICCM
18,985,336 UART: [exit] Launching FMC @ 0x40000130
18,994,006 UART:
18,994,245 UART: Running Caliptra FMC ...
18,995,282 UART:
18,995,447 UART: [state] CFI Enabled
19,049,054 UART: [fht] FMC Alias Private Key: 7
20,812,964 UART: [art] Extend RT PCRs Done
20,814,186 UART: [art] Lock RT PCRs Done
20,815,893 UART: [art] Populate DV Done
20,821,520 UART: [fht] FMC Alias Private Key: 7
20,823,004 UART: [art] Derive CDI
20,823,740 UART: [art] Store in in slot 0x4
20,881,533 UART: [art] Derive Key Pair
20,882,569 UART: [art] Store priv key in slot 0x5
23,346,412 UART: [art] Derive Key Pair - Done
23,359,245 UART: [art] Signing Cert with AUTHO
23,360,542 UART: RITY.KEYID = 7
25,072,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,329 UART: [art] PUB.X = 2AD4FBAA05F44AD03F1274DDBD2016BA6220AFEF954C3B9474FB5C2E2855D7D5DACB329C698630435DBC9FAF93EAE767
25,081,667 UART: [art] PUB.Y = BA74298A5D7BC63A7AF9A794F575824835E54AE53F1276922D783A11FB3057734DDFC271363603B96F1B1FF4B27F12ED
25,088,908 UART: [art] SIG.R = D88965ECE66F81371BAE7D4A628C6F5D59B539AB717B7D5D4C26791635EB21435D311B194E12CB604E9FD2593CDEAC81
25,096,281 UART: [art] SIG.S = 2DCF1EDE4F5C1635A22516CAF4F4430B145A2E9182E0E334E9C04358FFAB43F3F00D1E9D55C1CCA99C4BA4A104313E31
26,075,535 UART: Caliptra RT
26,076,246 UART: [state] CFI Enabled
26,240,063 UART: [rt] RT listening for mailbox commands...
30,264,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,419,545 UART: [rt]cmd =0x41544d4e, len=14344
34,350,578 >>> mbox cmd response data (8 bytes)
34,351,179 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,381,771 UART: [rt]cmd =0x41545348, len=116
34,384,068 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,441,682 ready_for_fw is high
3,442,091 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,744,436 >>> mbox cmd response: success
19,024,175 UART:
19,024,578 UART: Running Caliptra FMC ...
19,025,693 UART:
19,025,853 UART: [state] CFI Enabled
19,091,214 UART: [fht] FMC Alias Private Key: 7
20,854,693 UART: [art] Extend RT PCRs Done
20,855,936 UART: [art] Lock RT PCRs Done
20,857,374 UART: [art] Populate DV Done
20,862,919 UART: [fht] FMC Alias Private Key: 7
20,864,470 UART: [art] Derive CDI
20,865,207 UART: [art] Store in in slot 0x4
20,924,033 UART: [art] Derive Key Pair
20,925,080 UART: [art] Store priv key in slot 0x5
23,387,983 UART: [art] Derive Key Pair - Done
23,400,812 UART: [art] Signing Cert with AUTHO
23,402,150 UART: RITY.KEYID = 7
25,113,729 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,247 UART: [art] PUB.X = 6EF6A1C02AB2156244CB76B5F0194327F579E2B222BD47174313F68C8107EF8E9C65C8BB7AF53A97822C047A8F04D1BA
25,122,537 UART: [art] PUB.Y = E3C5F1B201D68435B1A1052BD05893DA4AA6866D80FAAC2F898F4DB40391EA7A6E11C82B68410CAC77E01B1BCEF2F776
25,129,769 UART: [art] SIG.R = A5B1BBA52FBAD3EF06FA2E5C51B8CC0B7A50B44F874AB7B85C6D6051042C9AA884ED0BCFB2A484CE7B77ECA436F028CD
25,137,245 UART: [art] SIG.S = 98BC3D0360FBB082D8D8F07E1B8148AFD023E44E314B7BC46F7CD2E7DCF93262A3F490583EF21EBCF7B027B6BBCF32D9
26,116,047 UART: Caliptra RT
26,116,740 UART: [state] CFI Enabled
26,281,526 UART: [rt] RT listening for mailbox commands...
30,304,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,460,070 UART: [rt]cmd =0x41544d4e, len=14344
34,390,716 >>> mbox cmd response data (8 bytes)
34,391,298 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,422,094 UART: [rt]cmd =0x41545348, len=116
34,424,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,321 UART:
192,683 UART: Running Caliptra ROM ...
193,777 UART:
603,283 UART: [state] CFI Enabled
613,881 UART: [state] LifecycleState = Unprovisioned
616,242 UART: [state] DebugLocked = No
617,830 UART: [state] WD Timer not started. Device not locked for debugging
622,865 UART: [kat] SHA2-256
812,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,499 UART: [kat] ++
824,099 UART: [kat] sha1
834,554 UART: [kat] SHA2-256
837,569 UART: [kat] SHA2-384
844,337 UART: [kat] SHA2-512-ACC
846,984 UART: [kat] ECC-384
3,288,246 UART: [kat] HMAC-384Kdf
3,301,167 UART: [kat] LMS
3,832,907 UART: [kat] --
3,837,871 UART: [cold-reset] ++
3,840,013 UART: [fht] FHT @ 0x50003400
3,851,702 UART: [idev] ++
3,852,412 UART: [idev] CDI.KEYID = 6
3,853,299 UART: [idev] SUBJECT.KEYID = 7
3,854,539 UART: [idev] UDS.KEYID = 0
3,855,439 ready_for_fw is high
3,855,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,356 UART: [idev] Erasing UDS.KEYID = 0
6,328,794 UART: [idev] Sha1 KeyId Algorithm
6,351,687 UART: [idev] --
6,355,980 UART: [ldev] ++
6,356,664 UART: [ldev] CDI.KEYID = 6
6,357,608 UART: [ldev] SUBJECT.KEYID = 5
6,358,766 UART: [ldev] AUTHORITY.KEYID = 7
6,359,940 UART: [ldev] FE.KEYID = 1
6,371,013 UART: [ldev] Erasing FE.KEYID = 1
8,848,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,662 UART: [ldev] --
10,640,709 UART: [fwproc] Wait for Commands...
10,642,904 UART: [fwproc] Recv command 0x46574c44
10,645,206 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,836,684 >>> mbox cmd response: success
14,840,539 UART: [afmc] ++
14,841,239 UART: [afmc] CDI.KEYID = 6
14,842,420 UART: [afmc] SUBJECT.KEYID = 7
14,843,908 UART: [afmc] AUTHORITY.KEYID = 5
17,347,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,452 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,822 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,482 UART: [afmc] --
19,145,691 UART: [cold-reset] --
19,150,372 UART: [state] Locking Datavault
19,157,074 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,268 UART: [state] Locking ICCM
19,160,840 UART: [exit] Launching FMC @ 0x40000130
19,169,508 UART:
19,169,741 UART: Running Caliptra FMC ...
19,170,842 UART:
19,171,011 UART: [state] CFI Enabled
19,178,897 UART: [fht] FMC Alias Private Key: 7
20,935,198 UART: [art] Extend RT PCRs Done
20,936,408 UART: [art] Lock RT PCRs Done
20,938,357 UART: [art] Populate DV Done
20,943,655 UART: [fht] FMC Alias Private Key: 7
20,945,294 UART: [art] Derive CDI
20,946,106 UART: [art] Store in in slot 0x4
20,988,916 UART: [art] Derive Key Pair
20,989,949 UART: [art] Store priv key in slot 0x5
23,417,068 UART: [art] Derive Key Pair - Done
23,429,799 UART: [art] Signing Cert with AUTHO
23,431,118 UART: RITY.KEYID = 7
25,136,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,889 UART: [art] PUB.X = D140D7DEF5285FF9F4EFDD8B739972B746B52319E71EB8215DBE5FEB88807D7E8EB88F1C5DDA4BA817CF632BC558882F
25,145,160 UART: [art] PUB.Y = A49074CA9FE4F7DC68A82E1D47F6E67CCB26BD6C5FD68C628B7A2EB2145BA33877F6218989713850ACAD36CFB21E37CA
25,152,458 UART: [art] SIG.R = A9EF6D8436ED98B8BA5776172FBA908781D08492B8218AC3FEE8ABF40E87FB92B64CAA9378FF5B9D0EB14262A29BBBED
25,159,857 UART: [art] SIG.S = D9B441146B618CC6AEF709606FCACF69B76D7A1EE152BFC144FD07372B334435E191490C2ED67CDD572C1C273630A6A4
26,139,377 UART: Caliptra RT
26,140,061 UART: [state] CFI Enabled
26,256,901 UART: [rt] RT listening for mailbox commands...
30,278,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,433,837 UART: [rt]cmd =0x41544d4e, len=14344
34,364,087 >>> mbox cmd response data (8 bytes)
34,364,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,395,359 UART: [rt]cmd =0x41545348, len=116
34,397,781 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,754,197 ready_for_fw is high
3,754,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,365 >>> mbox cmd response: success
19,206,115 UART:
19,206,536 UART: Running Caliptra FMC ...
19,207,674 UART:
19,207,838 UART: [state] CFI Enabled
19,215,577 UART: [fht] FMC Alias Private Key: 7
20,972,607 UART: [art] Extend RT PCRs Done
20,973,829 UART: [art] Lock RT PCRs Done
20,975,615 UART: [art] Populate DV Done
20,980,921 UART: [fht] FMC Alias Private Key: 7
20,982,405 UART: [art] Derive CDI
20,983,164 UART: [art] Store in in slot 0x4
21,025,933 UART: [art] Derive Key Pair
21,026,976 UART: [art] Store priv key in slot 0x5
23,453,662 UART: [art] Derive Key Pair - Done
23,466,922 UART: [art] Signing Cert with AUTHO
23,468,218 UART: RITY.KEYID = 7
25,173,752 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,261 UART: [art] PUB.X = DDED0BF62DFBFD5071797167F7E7359A837C9CFC42F551FCC38AE54BC9B0BCBC5D67941AA22B43EF8843874AA9104ADB
25,182,524 UART: [art] PUB.Y = 1E6FAE2789947442983054795F2432363871BE7D34AB262ACE6B0849303C2252E2B72CCBFE4A94AE892224E0322D7C16
25,189,795 UART: [art] SIG.R = 2750E16948489151A47BCF5F56FF05D458F8259ED3D2B3A8D36CF6E9B229EABFA002FC87A0DE4ABBE4D1F78B3B479567
25,197,193 UART: [art] SIG.S = EDE9FBFB81D28341742C789A6E6CD3229656CB39243F68467EC9671A20E9EB0B429F572A20624F9F50407AE6DADAE95A
26,176,343 UART: Caliptra RT
26,177,034 UART: [state] CFI Enabled
26,294,171 UART: [rt] RT listening for mailbox commands...
30,315,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,471,353 UART: [rt]cmd =0x41544d4e, len=14344
34,401,673 >>> mbox cmd response data (8 bytes)
34,402,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,433,080 UART: [rt]cmd =0x41545348, len=116
34,435,197 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,067 UART: [kat] SHA2-256
881,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,113 UART: [kat] ++
886,265 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,960 UART: [kat] HMAC-384Kdf
907,588 UART: [kat] LMS
1,475,784 UART: [kat] --
1,476,635 UART: [cold-reset] ++
1,477,185 UART: [fht] Storing FHT @ 0x50003400
1,479,798 UART: [idev] ++
1,479,966 UART: [idev] CDI.KEYID = 6
1,480,326 UART: [idev] SUBJECT.KEYID = 7
1,480,750 UART: [idev] UDS.KEYID = 0
1,481,095 ready_for_fw is high
1,481,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,710 UART: [idev] Erasing UDS.KEYID = 0
1,504,986 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,626 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,169 UART: [ldev] Erasing FE.KEYID = 1
1,546,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,643 UART: [fwproc] Waiting for Commands...
1,586,512 UART: [fwproc] Received command 0x46574c44
1,587,303 UART: [fwproc] Received Image of size 114360 bytes
2,885,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,291 >>> mbox cmd response: success
3,080,305 UART: [afmc] ++
3,080,473 UART: [afmc] CDI.KEYID = 6
3,080,835 UART: [afmc] SUBJECT.KEYID = 7
3,081,260 UART: [afmc] AUTHORITY.KEYID = 5
3,115,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,185 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,693 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,578 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,268 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,257 UART: [afmc] --
3,159,219 UART: [cold-reset] --
3,160,119 UART: [state] Locking Datavault
3,161,306 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,910 UART: [state] Locking ICCM
3,162,448 UART: [exit] Launching FMC @ 0x40000130
3,167,777 UART:
3,167,793 UART: Running Caliptra FMC ...
3,168,201 UART:
3,168,255 UART: [state] CFI Enabled
3,178,964 UART: [fht] FMC Alias Private Key: 7
3,287,269 UART: [art] Extend RT PCRs Done
3,287,697 UART: [art] Lock RT PCRs Done
3,289,361 UART: [art] Populate DV Done
3,297,626 UART: [fht] FMC Alias Private Key: 7
3,298,716 UART: [art] Derive CDI
3,298,996 UART: [art] Store in in slot 0x4
3,384,799 UART: [art] Derive Key Pair
3,385,159 UART: [art] Store priv key in slot 0x5
3,398,191 UART: [art] Derive Key Pair - Done
3,413,171 UART: [art] Signing Cert with AUTHO
3,413,651 UART: RITY.KEYID = 7
3,429,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,816 UART: [art] PUB.X = A5399831647AB7640A1D70F97DE81EE99E831BA3E03AD6ADCF7F4C5A4B5CDA7F19FAFED04B8B372C29764750C4A26389
3,436,597 UART: [art] PUB.Y = F4354ECEF184EDBDD95CC7138F05E94E03694E47954A2B63694AED5F6C7DCF08FCA99075117EC696C0BFE96F403054CE
3,443,552 UART: [art] SIG.R = D01293E9D74C5EAD6C72A0AC49186FC92BB32808DFA3205C389493AE94D90ED7CBC7769630CC78405774116F08B4CE05
3,450,314 UART: [art] SIG.S = 85BD1951C1026D26AF3B702B7E3E559DB1B1494A4F2866A9B159602FD43A983A2AC3AB7CE4E36B7FEAC3113257571C37
3,473,894 UART: Caliptra RT
3,474,148 UART: [state] CFI Enabled
3,581,953 UART: [rt] RT listening for mailbox commands...
3,582,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,514 UART: [rt]cmd =0x41544d4e, len=14344
3,850,268 >>> mbox cmd response data (8 bytes)
3,850,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,542 UART: [rt]cmd =0x41545348, len=116
3,882,517 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,053 ready_for_fw is high
1,362,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,847 >>> mbox cmd response: success
2,990,201 UART:
2,990,217 UART: Running Caliptra FMC ...
2,990,625 UART:
2,990,679 UART: [state] CFI Enabled
3,001,452 UART: [fht] FMC Alias Private Key: 7
3,109,267 UART: [art] Extend RT PCRs Done
3,109,695 UART: [art] Lock RT PCRs Done
3,111,027 UART: [art] Populate DV Done
3,119,080 UART: [fht] FMC Alias Private Key: 7
3,120,054 UART: [art] Derive CDI
3,120,334 UART: [art] Store in in slot 0x4
3,205,993 UART: [art] Derive Key Pair
3,206,353 UART: [art] Store priv key in slot 0x5
3,219,421 UART: [art] Derive Key Pair - Done
3,234,229 UART: [art] Signing Cert with AUTHO
3,234,709 UART: RITY.KEYID = 7
3,249,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,186 UART: [art] PUB.X = 828426FA2558157A5C1AC037736A5AD54DEF7E6E2C44206C82BEE07E9CA38526B55913FF252027700CA6530FC44B465A
3,256,950 UART: [art] PUB.Y = EFED86213316DBE262664AEA35EA4A3F5347FB4ADE9FB478B156177D750014D0E91D387EEC453C1C9907E01FEBFD79D8
3,263,889 UART: [art] SIG.R = E9AE390BD23B8E75D5CD81EC53230E0B2BE9F774A49B25055F7A6A5C044BE67B7F39DDABD22C3FCD26859CDAC16046D1
3,270,664 UART: [art] SIG.S = 4B0AED957A2337CABE5A8C2911689A30779136A65008E7FDEB961E20A507827C82B322D0E998C41D270B67B3DD1C2F81
3,294,575 UART: Caliptra RT
3,294,829 UART: [state] CFI Enabled
3,402,669 UART: [rt] RT listening for mailbox commands...
3,403,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,208 UART: [rt]cmd =0x41544d4e, len=14344
3,670,772 >>> mbox cmd response data (8 bytes)
3,670,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,792 UART: [rt]cmd =0x41545348, len=116
3,702,887 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,776 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,305 UART: [kat] SHA2-512-ACC
897,206 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,559 UART: [kat] LMS
1,475,755 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 ready_for_fw is high
1,481,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,505,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,885 UART: [idev] --
1,514,714 UART: [ldev] ++
1,514,882 UART: [ldev] CDI.KEYID = 6
1,515,245 UART: [ldev] SUBJECT.KEYID = 5
1,515,671 UART: [ldev] AUTHORITY.KEYID = 7
1,516,134 UART: [ldev] FE.KEYID = 1
1,521,484 UART: [ldev] Erasing FE.KEYID = 1
1,547,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,059 UART: [ldev] --
1,586,432 UART: [fwproc] Waiting for Commands...
1,587,197 UART: [fwproc] Received command 0x46574c44
1,587,988 UART: [fwproc] Received Image of size 114360 bytes
2,885,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,264 >>> mbox cmd response: success
3,079,510 UART: [afmc] ++
3,079,678 UART: [afmc] CDI.KEYID = 6
3,080,040 UART: [afmc] SUBJECT.KEYID = 7
3,080,465 UART: [afmc] AUTHORITY.KEYID = 5
3,115,436 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,708 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,488 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,216 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,101 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,791 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,886 UART: [afmc] --
3,158,776 UART: [cold-reset] --
3,159,884 UART: [state] Locking Datavault
3,161,253 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,857 UART: [state] Locking ICCM
3,162,487 UART: [exit] Launching FMC @ 0x40000130
3,167,816 UART:
3,167,832 UART: Running Caliptra FMC ...
3,168,240 UART:
3,168,383 UART: [state] CFI Enabled
3,179,026 UART: [fht] FMC Alias Private Key: 7
3,286,653 UART: [art] Extend RT PCRs Done
3,287,081 UART: [art] Lock RT PCRs Done
3,288,781 UART: [art] Populate DV Done
3,296,998 UART: [fht] FMC Alias Private Key: 7
3,297,956 UART: [art] Derive CDI
3,298,236 UART: [art] Store in in slot 0x4
3,383,563 UART: [art] Derive Key Pair
3,383,923 UART: [art] Store priv key in slot 0x5
3,396,557 UART: [art] Derive Key Pair - Done
3,411,439 UART: [art] Signing Cert with AUTHO
3,411,919 UART: RITY.KEYID = 7
3,427,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,322 UART: [art] PUB.X = 4587F36D48D45B0556209262A7B2756271E07A572236832B72DAAE52B73DF05D4808AD6E120D0A9F17317E071673F0D9
3,435,067 UART: [art] PUB.Y = 980473FEF72121C49A758335356C13A9B6A464603C018AC7EE4CE6401C87BCA1785A1FB498433124C46692B1F4A95CBE
3,442,009 UART: [art] SIG.R = 6AA4FE53B9065E98F738859243A439CCC3A2FCB01815984E29AD1C6D2FC30D99290D72338F8647465CC53DA0595DFB32
3,448,772 UART: [art] SIG.S = 4AE0DABA2D7A4CE898ABAC0ADE189C6D0949164E229C6452E84347C66B56DD8098EABDC3FF199ED7076DA59B574F356D
3,473,032 UART: Caliptra RT
3,473,378 UART: [state] CFI Enabled
3,581,883 UART: [rt] RT listening for mailbox commands...
3,582,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,272 UART: [rt]cmd =0x41544d4e, len=14344
3,849,426 >>> mbox cmd response data (8 bytes)
3,849,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,500 UART: [rt]cmd =0x41545348, len=116
3,881,147 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,362 ready_for_fw is high
1,363,362 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,630 >>> mbox cmd response: success
2,990,670 UART:
2,990,686 UART: Running Caliptra FMC ...
2,991,094 UART:
2,991,237 UART: [state] CFI Enabled
3,001,898 UART: [fht] FMC Alias Private Key: 7
3,109,789 UART: [art] Extend RT PCRs Done
3,110,217 UART: [art] Lock RT PCRs Done
3,111,855 UART: [art] Populate DV Done
3,120,258 UART: [fht] FMC Alias Private Key: 7
3,121,352 UART: [art] Derive CDI
3,121,632 UART: [art] Store in in slot 0x4
3,207,347 UART: [art] Derive Key Pair
3,207,707 UART: [art] Store priv key in slot 0x5
3,221,429 UART: [art] Derive Key Pair - Done
3,236,130 UART: [art] Signing Cert with AUTHO
3,236,610 UART: RITY.KEYID = 7
3,251,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,999 UART: [art] PUB.X = 539A5B8F3D2EDCE2B135A173FFFACA83C4F951DD867D9B75ACA91A77A467DD41C9CAC821470E6B74725A84A2C6B4D0E5
3,258,786 UART: [art] PUB.Y = 67A84D4FE8674EFE720634B7DB7771EBAD543924D2712D2BE377A5871000DC9E4D4481638BFE3FCE74CDB75431A45B92
3,265,717 UART: [art] SIG.R = 8DEE58F72F3C827436CEC1680E7B02DBAB1DCB16530AC570E1F37C9063F53CD5092748DD86AF67849F5BC54CD89114A2
3,272,485 UART: [art] SIG.S = 4C806569D538348794E98E74C318D8083C032DE6393E2C8B36F6C32AF8360A0E7514117FF5E537C02860391FDE08450D
3,296,234 UART: Caliptra RT
3,296,580 UART: [state] CFI Enabled
3,404,942 UART: [rt] RT listening for mailbox commands...
3,405,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,511 UART: [rt]cmd =0x41544d4e, len=14344
3,673,209 >>> mbox cmd response data (8 bytes)
3,673,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,315 UART: [rt]cmd =0x41545348, len=116
3,705,088 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
893,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,717 UART: [kat] ++
897,869 UART: [kat] sha1
902,095 UART: [kat] SHA2-256
904,035 UART: [kat] SHA2-384
906,840 UART: [kat] SHA2-512-ACC
908,741 UART: [kat] ECC-384
918,798 UART: [kat] HMAC-384Kdf
923,544 UART: [kat] LMS
1,171,872 UART: [kat] --
1,172,761 UART: [cold-reset] ++
1,173,229 UART: [fht] FHT @ 0x50003400
1,175,976 UART: [idev] ++
1,176,144 UART: [idev] CDI.KEYID = 6
1,176,504 UART: [idev] SUBJECT.KEYID = 7
1,176,928 UART: [idev] UDS.KEYID = 0
1,177,273 ready_for_fw is high
1,177,273 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,590 UART: [idev] Erasing UDS.KEYID = 0
1,202,207 UART: [idev] Sha1 KeyId Algorithm
1,210,699 UART: [idev] --
1,211,647 UART: [ldev] ++
1,211,815 UART: [ldev] CDI.KEYID = 6
1,212,178 UART: [ldev] SUBJECT.KEYID = 5
1,212,604 UART: [ldev] AUTHORITY.KEYID = 7
1,213,067 UART: [ldev] FE.KEYID = 1
1,218,483 UART: [ldev] Erasing FE.KEYID = 1
1,245,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,993 UART: [ldev] --
1,284,324 UART: [fwproc] Wait for Commands...
1,285,014 UART: [fwproc] Recv command 0x46574c44
1,285,742 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,839 >>> mbox cmd response: success
2,776,935 UART: [afmc] ++
2,777,103 UART: [afmc] CDI.KEYID = 6
2,777,465 UART: [afmc] SUBJECT.KEYID = 7
2,777,890 UART: [afmc] AUTHORITY.KEYID = 5
2,813,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,138 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,023 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,742 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,436 UART: [afmc] --
2,856,540 UART: [cold-reset] --
2,857,298 UART: [state] Locking Datavault
2,858,211 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,815 UART: [state] Locking ICCM
2,859,391 UART: [exit] Launching FMC @ 0x40000130
2,864,720 UART:
2,864,736 UART: Running Caliptra FMC ...
2,865,144 UART:
2,865,198 UART: [state] CFI Enabled
2,875,573 UART: [fht] FMC Alias Private Key: 7
2,983,808 UART: [art] Extend RT PCRs Done
2,984,236 UART: [art] Lock RT PCRs Done
2,985,786 UART: [art] Populate DV Done
2,994,075 UART: [fht] FMC Alias Private Key: 7
2,995,075 UART: [art] Derive CDI
2,995,355 UART: [art] Store in in slot 0x4
3,081,082 UART: [art] Derive Key Pair
3,081,442 UART: [art] Store priv key in slot 0x5
3,095,068 UART: [art] Derive Key Pair - Done
3,109,782 UART: [art] Signing Cert with AUTHO
3,110,262 UART: RITY.KEYID = 7
3,125,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,799 UART: [art] PUB.X = 6F6E2B2D594475F2DE713B182D67B8B0C797B5D4A9E5B357E68EF4723CAD90055B519027B1BBFC2F409749327B7A1C14
3,132,570 UART: [art] PUB.Y = 4F28562D3550D044DFED76FB307B59C4B53CE37B6A94F6C3E794E5C3F7C016A962516CD5E26A6A4B95E50B9CF1E9E548
3,139,527 UART: [art] SIG.R = 43C46C4766AAAECBF1AE2A6F5DDA66019AA9C60BB62893603D41DC033A448986AC50001D93E9D5EFBE62204B113B0A3D
3,146,277 UART: [art] SIG.S = 0B57260895BB148E665B9CEC3B9C8B24B0AB8046A6DCFAC99695A075BE7C1312CA4E3EE869434E65FBB7435EC777CBB9
3,170,238 UART: Caliptra RT
3,170,492 UART: [state] CFI Enabled
3,278,928 UART: [rt] RT listening for mailbox commands...
3,279,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,559 UART: [rt]cmd =0x41544d4e, len=14344
3,547,675 >>> mbox cmd response data (8 bytes)
3,547,676 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,711 UART: [rt]cmd =0x41545348, len=116
3,579,710 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,907 ready_for_fw is high
1,059,907 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,091 >>> mbox cmd response: success
2,688,179 UART:
2,688,195 UART: Running Caliptra FMC ...
2,688,603 UART:
2,688,657 UART: [state] CFI Enabled
2,699,028 UART: [fht] FMC Alias Private Key: 7
2,807,215 UART: [art] Extend RT PCRs Done
2,807,643 UART: [art] Lock RT PCRs Done
2,809,205 UART: [art] Populate DV Done
2,817,532 UART: [fht] FMC Alias Private Key: 7
2,818,614 UART: [art] Derive CDI
2,818,894 UART: [art] Store in in slot 0x4
2,904,345 UART: [art] Derive Key Pair
2,904,705 UART: [art] Store priv key in slot 0x5
2,918,109 UART: [art] Derive Key Pair - Done
2,932,640 UART: [art] Signing Cert with AUTHO
2,933,120 UART: RITY.KEYID = 7
2,948,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,061 UART: [art] PUB.X = 2503C699C2A0388CF2AE0E74A1975D69E491149BBEFAE222260A2539C8D6413816C6F4377590FD5E79095E687487116A
2,955,811 UART: [art] PUB.Y = C28363D829430D512DCB3659FD3327E2775128DC0C996777F2C9F04DBD356B73E964E9F6256FC0BCE2733C11DFB9A50C
2,962,756 UART: [art] SIG.R = 60984D66241D5545D98DCA352D39DFEB1C4CF8B8C9F7B3CB2BA39DA7C547F4D9B0C64615C41DED53CF8411E13BDD18CE
2,969,546 UART: [art] SIG.S = 99D0BC6E97BDBF7A8593CB69C55359C410D4923D481FEF245A5B215382EEB9BE22C156306B4887FE70F2686404CDC3F2
2,993,282 UART: Caliptra RT
2,993,536 UART: [state] CFI Enabled
3,100,218 UART: [rt] RT listening for mailbox commands...
3,100,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,489 UART: [rt]cmd =0x41544d4e, len=14344
3,368,387 >>> mbox cmd response data (8 bytes)
3,368,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,579 UART: [rt]cmd =0x41545348, len=116
3,400,294 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
893,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,374 UART: [kat] ++
897,526 UART: [kat] sha1
901,734 UART: [kat] SHA2-256
903,674 UART: [kat] SHA2-384
906,215 UART: [kat] SHA2-512-ACC
908,116 UART: [kat] ECC-384
917,809 UART: [kat] HMAC-384Kdf
922,357 UART: [kat] LMS
1,170,685 UART: [kat] --
1,171,406 UART: [cold-reset] ++
1,171,848 UART: [fht] FHT @ 0x50003400
1,174,417 UART: [idev] ++
1,174,585 UART: [idev] CDI.KEYID = 6
1,174,945 UART: [idev] SUBJECT.KEYID = 7
1,175,369 UART: [idev] UDS.KEYID = 0
1,175,714 ready_for_fw is high
1,175,714 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,791 UART: [idev] Erasing UDS.KEYID = 0
1,200,802 UART: [idev] Sha1 KeyId Algorithm
1,209,240 UART: [idev] --
1,210,246 UART: [ldev] ++
1,210,414 UART: [ldev] CDI.KEYID = 6
1,210,777 UART: [ldev] SUBJECT.KEYID = 5
1,211,203 UART: [ldev] AUTHORITY.KEYID = 7
1,211,666 UART: [ldev] FE.KEYID = 1
1,217,322 UART: [ldev] Erasing FE.KEYID = 1
1,243,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,754 UART: [ldev] --
1,283,099 UART: [fwproc] Wait for Commands...
1,283,761 UART: [fwproc] Recv command 0x46574c44
1,284,489 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,343 >>> mbox cmd response: success
2,775,461 UART: [afmc] ++
2,775,629 UART: [afmc] CDI.KEYID = 6
2,775,991 UART: [afmc] SUBJECT.KEYID = 7
2,776,416 UART: [afmc] AUTHORITY.KEYID = 5
2,812,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,512 UART: [afmc] --
2,855,562 UART: [cold-reset] --
2,856,404 UART: [state] Locking Datavault
2,857,651 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,255 UART: [state] Locking ICCM
2,858,873 UART: [exit] Launching FMC @ 0x40000130
2,864,202 UART:
2,864,218 UART: Running Caliptra FMC ...
2,864,626 UART:
2,864,769 UART: [state] CFI Enabled
2,875,368 UART: [fht] FMC Alias Private Key: 7
2,983,365 UART: [art] Extend RT PCRs Done
2,983,793 UART: [art] Lock RT PCRs Done
2,985,403 UART: [art] Populate DV Done
2,993,620 UART: [fht] FMC Alias Private Key: 7
2,994,696 UART: [art] Derive CDI
2,994,976 UART: [art] Store in in slot 0x4
3,080,729 UART: [art] Derive Key Pair
3,081,089 UART: [art] Store priv key in slot 0x5
3,094,789 UART: [art] Derive Key Pair - Done
3,109,427 UART: [art] Signing Cert with AUTHO
3,109,907 UART: RITY.KEYID = 7
3,125,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,886 UART: [art] PUB.X = DC8E1302E58842DC9F435C80B623B71BF041265289A57BD9C1FFCC0E119DAAF0FE0B1E0F664E8283405ACCEEF98C823F
3,132,660 UART: [art] PUB.Y = 173FE2E766318ECE7D41B899D42677D53277D4326A17DE36980A7DAC0003A9194FAA3168413CE9D27712C35430AE81D1
3,139,578 UART: [art] SIG.R = 0A4521AB15E9C4A20CA47C7457D7D63654115D1933BA206A0F75172230F9BEE8A67283259DC420764706B69376818153
3,146,322 UART: [art] SIG.S = 7A5C7CFF5465D8BA480E887DD8A8103ECAD4CEF820C8C5E42638A718448C67314D8593A33A134FCFC8ECEB0CF4A2D18D
3,169,889 UART: Caliptra RT
3,170,235 UART: [state] CFI Enabled
3,277,789 UART: [rt] RT listening for mailbox commands...
3,278,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,916 UART: [rt]cmd =0x41544d4e, len=14344
3,545,720 >>> mbox cmd response data (8 bytes)
3,545,721 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,796 UART: [rt]cmd =0x41545348, len=116
3,577,595 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,254 ready_for_fw is high
1,061,254 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,452 >>> mbox cmd response: success
2,690,954 UART:
2,690,970 UART: Running Caliptra FMC ...
2,691,378 UART:
2,691,521 UART: [state] CFI Enabled
2,702,202 UART: [fht] FMC Alias Private Key: 7
2,809,489 UART: [art] Extend RT PCRs Done
2,809,917 UART: [art] Lock RT PCRs Done
2,811,201 UART: [art] Populate DV Done
2,819,574 UART: [fht] FMC Alias Private Key: 7
2,820,540 UART: [art] Derive CDI
2,820,820 UART: [art] Store in in slot 0x4
2,906,729 UART: [art] Derive Key Pair
2,907,089 UART: [art] Store priv key in slot 0x5
2,919,975 UART: [art] Derive Key Pair - Done
2,934,421 UART: [art] Signing Cert with AUTHO
2,934,901 UART: RITY.KEYID = 7
2,950,187 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,952 UART: [art] PUB.X = F8AB115825FA10E75C0AC83EC35AB0F24991745FCC217CD539B77C81C462A6D47B2D3A56F41FB91AD8F9071231F2B4DA
2,957,728 UART: [art] PUB.Y = EF8781812F19354903453515B1060B0F995DEF816BAAEC201AA8B85AEEE6FDAB65BC55B4447043753B393083CC72DB85
2,964,670 UART: [art] SIG.R = 0DC517E2BF91E2011DD5448842B9A069F53BA6C5E67EA7EE86D782E43AE81C71BD8810C0B8681B019A667B5B8466183E
2,971,435 UART: [art] SIG.S = 115D54FFBF299DDF5BCB285C246E9B52C662BCADF48DF3E51379B422FB83BE7424D8F831B9AA0B5E66A1544403D36A66
2,995,040 UART: Caliptra RT
2,995,386 UART: [state] CFI Enabled
3,101,920 UART: [rt] RT listening for mailbox commands...
3,102,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,209 UART: [rt]cmd =0x41544d4e, len=14344
3,369,925 >>> mbox cmd response data (8 bytes)
3,369,926 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,965 UART: [rt]cmd =0x41545348, len=116
3,401,982 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,465 UART: [idev] ++
1,173,633 UART: [idev] CDI.KEYID = 6
1,173,994 UART: [idev] SUBJECT.KEYID = 7
1,174,419 UART: [idev] UDS.KEYID = 0
1,174,765 ready_for_fw is high
1,174,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,339 UART: [idev] Erasing UDS.KEYID = 0
1,199,791 UART: [idev] Sha1 KeyId Algorithm
1,208,757 UART: [idev] --
1,209,720 UART: [ldev] ++
1,209,888 UART: [ldev] CDI.KEYID = 6
1,210,252 UART: [ldev] SUBJECT.KEYID = 5
1,210,679 UART: [ldev] AUTHORITY.KEYID = 7
1,211,142 UART: [ldev] FE.KEYID = 1
1,216,340 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,590 UART: [ldev] --
1,281,076 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,454 >>> mbox cmd response: success
2,773,653 UART: [afmc] ++
2,773,821 UART: [afmc] CDI.KEYID = 6
2,774,184 UART: [afmc] SUBJECT.KEYID = 7
2,774,610 UART: [afmc] AUTHORITY.KEYID = 5
2,810,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,620 UART: [afmc] --
2,853,692 UART: [cold-reset] --
2,854,670 UART: [state] Locking Datavault
2,856,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,693 UART: [state] Locking ICCM
2,857,143 UART: [exit] Launching FMC @ 0x40000130
2,862,472 UART:
2,862,488 UART: Running Caliptra FMC ...
2,862,896 UART:
2,862,950 UART: [state] CFI Enabled
2,873,215 UART: [fht] FMC Alias Private Key: 7
2,981,036 UART: [art] Extend RT PCRs Done
2,981,464 UART: [art] Lock RT PCRs Done
2,982,868 UART: [art] Populate DV Done
2,991,195 UART: [fht] FMC Alias Private Key: 7
2,992,167 UART: [art] Derive CDI
2,992,447 UART: [art] Store in in slot 0x4
3,078,244 UART: [art] Derive Key Pair
3,078,604 UART: [art] Store priv key in slot 0x5
3,091,066 UART: [art] Derive Key Pair - Done
3,106,223 UART: [art] Signing Cert with AUTHO
3,106,703 UART: RITY.KEYID = 7
3,121,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,506 UART: [art] PUB.X = 6BC30ACCE96637FBA1BCCF240A539A943D35168A43220FB84030298B58AA0207E28754D9FE5F8190AD1A566A8D200A97
3,129,262 UART: [art] PUB.Y = 7C2E47FE69499A68DF19D2BC0ACC087510B89F1A41E305803DDFF4FEEA2F32C2C39E5BB064FB83D754F754140CBD22FA
3,136,218 UART: [art] SIG.R = FFEA990BDB3CE9C55D94CA951BDCD6299BB3FBFCADCED315FC28EA9758302BF782A0F93576C3D3E8DECB5E78C70D6854
3,143,012 UART: [art] SIG.S = 67DAFAF997CFF2AAB36276175383D6CA6A35AE369FD60DEDED6B79182C7AC1F73EE560CD8811752DB028D5CBD6DB5D7B
3,167,512 UART: Caliptra RT
3,167,766 UART: [state] CFI Enabled
3,275,616 UART: [rt] RT listening for mailbox commands...
3,276,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,043 UART: [rt]cmd =0x41544d4e, len=14344
3,543,581 >>> mbox cmd response data (8 bytes)
3,543,582 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,593 UART: [rt]cmd =0x41545348, len=116
3,575,638 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 ready_for_fw is high
1,055,804 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,732 >>> mbox cmd response: success
2,683,688 UART:
2,683,704 UART: Running Caliptra FMC ...
2,684,112 UART:
2,684,166 UART: [state] CFI Enabled
2,694,603 UART: [fht] FMC Alias Private Key: 7
2,802,676 UART: [art] Extend RT PCRs Done
2,803,104 UART: [art] Lock RT PCRs Done
2,804,856 UART: [art] Populate DV Done
2,813,083 UART: [fht] FMC Alias Private Key: 7
2,814,173 UART: [art] Derive CDI
2,814,453 UART: [art] Store in in slot 0x4
2,900,126 UART: [art] Derive Key Pair
2,900,486 UART: [art] Store priv key in slot 0x5
2,913,652 UART: [art] Derive Key Pair - Done
2,928,428 UART: [art] Signing Cert with AUTHO
2,928,908 UART: RITY.KEYID = 7
2,944,000 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,765 UART: [art] PUB.X = 775D13333386DBFDF3CC6FCFB483EEE321FB9020ED8586083280B8DE39512A64E56143A746566FC65432E26042A9FD79
2,951,532 UART: [art] PUB.Y = B737F04E338E11D050679D0FFDB8A7F2A40A58366398A8D278C4E1BDF8ADC07793221F0A879C9FA824E18606014B9CE9
2,958,471 UART: [art] SIG.R = D65EE636B68047A3B360FD4A7360E44E5106510F41DC87E591EB5BD911011D61C35CD06A28A58243C6C15635AA388AB4
2,965,232 UART: [art] SIG.S = 3C53AAD5DF38C6120F6D483B61D3C589E284AA6E9FE56F83E0720CBCDEDE288A60655DC5C2093FC04C039893D077FFB2
2,988,363 UART: Caliptra RT
2,988,617 UART: [state] CFI Enabled
3,095,711 UART: [rt] RT listening for mailbox commands...
3,096,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,220 UART: [rt]cmd =0x41544d4e, len=14344
3,364,006 >>> mbox cmd response data (8 bytes)
3,364,007 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,196 UART: [rt]cmd =0x41545348, len=116
3,396,031 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
891,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,172,910 UART: [idev] ++
1,173,078 UART: [idev] CDI.KEYID = 6
1,173,439 UART: [idev] SUBJECT.KEYID = 7
1,173,864 UART: [idev] UDS.KEYID = 0
1,174,210 ready_for_fw is high
1,174,210 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] --
1,208,849 UART: [ldev] ++
1,209,017 UART: [ldev] CDI.KEYID = 6
1,209,381 UART: [ldev] SUBJECT.KEYID = 5
1,209,808 UART: [ldev] AUTHORITY.KEYID = 7
1,210,271 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,346 UART: [fwproc] Recv command 0x46574c44
1,283,079 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,345 >>> mbox cmd response: success
2,774,562 UART: [afmc] ++
2,774,730 UART: [afmc] CDI.KEYID = 6
2,775,093 UART: [afmc] SUBJECT.KEYID = 7
2,775,519 UART: [afmc] AUTHORITY.KEYID = 5
2,811,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,589 UART: [afmc] --
2,854,497 UART: [cold-reset] --
2,855,175 UART: [state] Locking Datavault
2,856,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,768 UART: [state] Locking ICCM
2,857,326 UART: [exit] Launching FMC @ 0x40000130
2,862,655 UART:
2,862,671 UART: Running Caliptra FMC ...
2,863,079 UART:
2,863,222 UART: [state] CFI Enabled
2,873,607 UART: [fht] FMC Alias Private Key: 7
2,980,898 UART: [art] Extend RT PCRs Done
2,981,326 UART: [art] Lock RT PCRs Done
2,982,970 UART: [art] Populate DV Done
2,991,051 UART: [fht] FMC Alias Private Key: 7
2,992,137 UART: [art] Derive CDI
2,992,417 UART: [art] Store in in slot 0x4
3,077,884 UART: [art] Derive Key Pair
3,078,244 UART: [art] Store priv key in slot 0x5
3,091,714 UART: [art] Derive Key Pair - Done
3,106,467 UART: [art] Signing Cert with AUTHO
3,106,947 UART: RITY.KEYID = 7
3,122,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,990 UART: [art] PUB.X = F761C4A2E4345A32789C3FBA6958209DB091D09955F8593CC41259BCFC62D773D3A430FBB5CF31541B6B8AA8D2555201
3,129,759 UART: [art] PUB.Y = 2C5DF750E58FFE277BB026182B340BC1656DC0D7C54302D75A8989B640ABEBB286A07ECB27EEA64B301E80C0C54818F3
3,136,713 UART: [art] SIG.R = 4EF74575CB4E4890AB312EF85492F1589494A1B4ADE402766BE56FBCAC44DA0593BC49BEECA4939C658A8AD2D68D71B7
3,143,491 UART: [art] SIG.S = FE5BDD42172AFE3DCBCCFC4D5E0DBD975A360837A17BF074405B58248BD2749936B1E1AF10364FF4FC6D8FF6F2D4093E
3,167,189 UART: Caliptra RT
3,167,535 UART: [state] CFI Enabled
3,276,595 UART: [rt] RT listening for mailbox commands...
3,277,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,030 UART: [rt]cmd =0x41544d4e, len=14344
3,544,646 >>> mbox cmd response data (8 bytes)
3,544,647 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,820 UART: [rt]cmd =0x41545348, len=116
3,576,913 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,177 ready_for_fw is high
1,057,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,751 >>> mbox cmd response: success
2,686,773 UART:
2,686,789 UART: Running Caliptra FMC ...
2,687,197 UART:
2,687,340 UART: [state] CFI Enabled
2,697,767 UART: [fht] FMC Alias Private Key: 7
2,804,680 UART: [art] Extend RT PCRs Done
2,805,108 UART: [art] Lock RT PCRs Done
2,806,446 UART: [art] Populate DV Done
2,814,487 UART: [fht] FMC Alias Private Key: 7
2,815,595 UART: [art] Derive CDI
2,815,875 UART: [art] Store in in slot 0x4
2,901,376 UART: [art] Derive Key Pair
2,901,736 UART: [art] Store priv key in slot 0x5
2,914,932 UART: [art] Derive Key Pair - Done
2,929,865 UART: [art] Signing Cert with AUTHO
2,930,345 UART: RITY.KEYID = 7
2,945,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,572 UART: [art] PUB.X = B8E3F30E1CD4D0574721FDCBD80D8C4DB22522A0D783D7105C36D824F7D87CBF995BAB387DBB9AF3AE9C7C51A771B335
2,953,354 UART: [art] PUB.Y = 4F59FFB3587B43DC3B2C96923DEA4509E0B6771E41EBDDACFACD24E2E2B346C2C35C13C4D1AA5A9C1E04D4DA3F70A6D2
2,960,324 UART: [art] SIG.R = 40CE172D50245CB625D235FD8EC5C137250A5085FF244722D4F5EC7F8C031B62ADD85E7C09F3334278AF18F1CA743C2B
2,967,091 UART: [art] SIG.S = 5096E315DBE1E9A7D4D07738AA3AA390152F66D15E9BA941E9D41AABE158C2C53BCE3E74C454504037F06A04EC55372F
2,990,767 UART: Caliptra RT
2,991,113 UART: [state] CFI Enabled
3,098,099 UART: [rt] RT listening for mailbox commands...
3,098,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,308 UART: [rt]cmd =0x41544d4e, len=14344
3,366,174 >>> mbox cmd response data (8 bytes)
3,366,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,240 UART: [rt]cmd =0x41545348, len=116
3,398,163 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,499 UART:
192,860 UART: Running Caliptra ROM ...
193,951 UART:
194,089 UART: [state] CFI Enabled
265,083 UART: [state] LifecycleState = Unprovisioned
266,994 UART: [state] DebugLocked = No
268,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,361 UART: [kat] SHA2-256
443,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,563 UART: [kat] ++
454,013 UART: [kat] sha1
465,029 UART: [kat] SHA2-256
467,763 UART: [kat] SHA2-384
472,185 UART: [kat] SHA2-512-ACC
474,543 UART: [kat] ECC-384
2,768,027 UART: [kat] HMAC-384Kdf
2,791,284 UART: [kat] LMS
3,981,557 UART: [kat] --
3,987,158 UART: [cold-reset] ++
3,989,236 UART: [fht] Storing FHT @ 0x50003400
3,999,571 UART: [idev] ++
4,000,130 UART: [idev] CDI.KEYID = 6
4,001,157 UART: [idev] SUBJECT.KEYID = 7
4,002,331 UART: [idev] UDS.KEYID = 0
4,003,403 ready_for_fw is high
4,003,621 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,147,121 UART: [idev] Erasing UDS.KEYID = 0
7,330,064 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,029 UART: [idev] --
7,355,157 UART: [ldev] ++
7,355,718 UART: [ldev] CDI.KEYID = 6
7,356,670 UART: [ldev] SUBJECT.KEYID = 5
7,357,875 UART: [ldev] AUTHORITY.KEYID = 7
7,359,153 UART: [ldev] FE.KEYID = 1
7,385,545 UART: [ldev] Erasing FE.KEYID = 1
10,716,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,009,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,024,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,039,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,053,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,072,577 UART: [ldev] --
13,077,455 UART: [fwproc] Waiting for Commands...
13,079,274 UART: [fwproc] Received command 0x46574c44
13,081,503 UART: [fwproc] Received Image of size 114036 bytes
17,129,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,204,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,273,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,590,497 >>> mbox cmd response: success
17,594,199 UART: [afmc] ++
17,594,800 UART: [afmc] CDI.KEYID = 6
17,595,676 UART: [afmc] SUBJECT.KEYID = 7
17,596,943 UART: [afmc] AUTHORITY.KEYID = 5
20,975,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,271,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,273,530 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,287,937 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,302,759 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,317,228 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,339,252 UART: [afmc] --
23,342,740 UART: [cold-reset] --
23,348,333 UART: [state] Locking Datavault
23,353,360 UART: [state] Locking PCR0, PCR1 and PCR31
23,355,107 UART: [state] Locking ICCM
23,357,490 UART: [exit] Launching FMC @ 0x40000130
23,365,887 UART:
23,366,124 UART: Running Caliptra FMC ...
23,367,224 UART:
23,367,371 UART: [state] CFI Enabled
23,430,644 UART: [fht] FMC Alias Private Key: 7
25,769,337 UART: [art] Extend RT PCRs Done
25,770,563 UART: [art] Lock RT PCRs Done
25,772,263 UART: [art] Populate DV Done
25,777,672 UART: [fht] FMC Alias Private Key: 7
25,779,359 UART: [art] Derive CDI
25,780,090 UART: [art] Store in in slot 0x4
25,839,394 UART: [art] Derive Key Pair
25,840,427 UART: [art] Store priv key in slot 0x5
29,133,617 UART: [art] Derive Key Pair - Done
29,146,339 UART: [art] Signing Cert with AUTHO
29,147,653 UART: RITY.KEYID = 7
31,434,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,435,889 UART: [art] PUB.X = A0F735396C2165BB7A2C08D342274674CFB9AD71BE51350CBF54DB9309032E08B2872AC34D99E9F24341EFFEC96E70D5
31,443,116 UART: [art] PUB.Y = 59F9BFEEC18055F14119F8BAD3AA83DFFD6F8745BF975A0B182B1225129AE41F0DAA69EA64051A084CD139601A6DDF82
31,450,369 UART: [art] SIG.R = 404801C944D0B01660CEB15121FD83E87A86F1865F5C7EB45C3152220459C80FC9E180BA6E363EEDDF00BB4227956A88
31,457,722 UART: [art] SIG.S = 433DA66AACB36CB402EE3B595A0FAC78B65BADFB9A5ACCF195E2DF0CF40C869B90E3F1C6EE9D3A495F7E0C7C7F936C53
32,763,231 UART: Caliptra RT
32,763,951 UART: [state] CFI Enabled
32,923,724 UART: [rt] RT listening for mailbox commands...
36,953,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,109,635 UART: [rt]cmd =0x41544d4e, len=14344
42,344,823 >>> mbox cmd response data (8 bytes)
42,345,402 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,376,098 UART: [rt]cmd =0x41545348, len=116
42,378,447 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
3,804,851 ready_for_fw is high
3,805,262 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,894,991 >>> mbox cmd response: success
23,591,123 UART:
23,591,518 UART: Running Caliptra FMC ...
23,592,647 UART:
23,592,803 UART: [state] CFI Enabled
23,661,720 UART: [fht] FMC Alias Private Key: 7
25,999,490 UART: [art] Extend RT PCRs Done
26,000,743 UART: [art] Lock RT PCRs Done
26,002,474 UART: [art] Populate DV Done
26,007,683 UART: [fht] FMC Alias Private Key: 7
26,009,344 UART: [art] Derive CDI
26,010,167 UART: [art] Store in in slot 0x4
26,070,198 UART: [art] Derive Key Pair
26,071,238 UART: [art] Store priv key in slot 0x5
29,363,998 UART: [art] Derive Key Pair - Done
29,377,156 UART: [art] Signing Cert with AUTHO
29,378,490 UART: RITY.KEYID = 7
31,665,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,200 UART: [art] PUB.X = 8DC63907C3DE3151A8683B8799E7DB96CC4BF4B364A7D21F289024E36DAD55DCE80DC3A3A4EBA268A6D9826628B3E6B2
31,674,453 UART: [art] PUB.Y = 4827D636112FB058BB2ADED7A906A377389D31C18517443F95AA9FFD7787AE7D1303E6E4E065BB10E60397FEDFB1B7D6
31,681,704 UART: [art] SIG.R = 13A11EA8AAD7AAFD453CF1557C3D08E1041988B87EEB66E8C9653D63463D8BAD43AE780D77CB6D5B928BC0D3B48895C2
31,689,124 UART: [art] SIG.S = 56C9F4DCC97FFB34C3314CE5D0E3CF5730207469A36112EE2F015058EC0A39DEEFF8568631787465764340F15DB70103
32,994,372 UART: Caliptra RT
32,995,087 UART: [state] CFI Enabled
33,158,113 UART: [rt] RT listening for mailbox commands...
37,188,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,344,432 UART: [rt]cmd =0x41544d4e, len=14344
42,579,791 >>> mbox cmd response data (8 bytes)
42,580,352 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,611,085 UART: [rt]cmd =0x41545348, len=116
42,613,241 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,483 UART:
192,870 UART: Running Caliptra ROM ...
194,010 UART:
603,669 UART: [state] CFI Enabled
620,121 UART: [state] LifecycleState = Unprovisioned
622,033 UART: [state] DebugLocked = No
624,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,868 UART: [kat] SHA2-256
798,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,177 UART: [kat] ++
809,653 UART: [kat] sha1
821,093 UART: [kat] SHA2-256
823,749 UART: [kat] SHA2-384
828,671 UART: [kat] SHA2-512-ACC
831,043 UART: [kat] ECC-384
3,111,374 UART: [kat] HMAC-384Kdf
3,123,461 UART: [kat] LMS
4,313,517 UART: [kat] --
4,319,697 UART: [cold-reset] ++
4,321,566 UART: [fht] Storing FHT @ 0x50003400
4,332,548 UART: [idev] ++
4,333,118 UART: [idev] CDI.KEYID = 6
4,334,103 UART: [idev] SUBJECT.KEYID = 7
4,335,279 UART: [idev] UDS.KEYID = 0
4,336,353 ready_for_fw is high
4,336,588 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,863 UART: [idev] Erasing UDS.KEYID = 0
7,621,118 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,074 UART: [idev] --
7,649,312 UART: [ldev] ++
7,650,097 UART: [ldev] CDI.KEYID = 6
7,651,021 UART: [ldev] SUBJECT.KEYID = 5
7,652,127 UART: [ldev] AUTHORITY.KEYID = 7
7,653,326 UART: [ldev] FE.KEYID = 1
7,664,460 UART: [ldev] Erasing FE.KEYID = 1
10,952,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,806 UART: [ldev] --
13,317,396 UART: [fwproc] Waiting for Commands...
13,319,919 UART: [fwproc] Received command 0x46574c44
13,322,098 UART: [fwproc] Received Image of size 114036 bytes
17,376,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,841,391 >>> mbox cmd response: success
17,845,085 UART: [afmc] ++
17,845,705 UART: [afmc] CDI.KEYID = 6
17,846,591 UART: [afmc] SUBJECT.KEYID = 7
17,847,812 UART: [afmc] AUTHORITY.KEYID = 5
21,162,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,662 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,038 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,891 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,408 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,606 UART: [afmc] --
23,530,749 UART: [cold-reset] --
23,536,072 UART: [state] Locking Datavault
23,542,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,839 UART: [state] Locking ICCM
23,546,048 UART: [exit] Launching FMC @ 0x40000130
23,554,443 UART:
23,554,694 UART: Running Caliptra FMC ...
23,555,794 UART:
23,555,952 UART: [state] CFI Enabled
23,563,839 UART: [fht] FMC Alias Private Key: 7
25,894,882 UART: [art] Extend RT PCRs Done
25,896,109 UART: [art] Lock RT PCRs Done
25,897,842 UART: [art] Populate DV Done
25,903,311 UART: [fht] FMC Alias Private Key: 7
25,904,796 UART: [art] Derive CDI
25,905,557 UART: [art] Store in in slot 0x4
25,948,041 UART: [art] Derive Key Pair
25,949,045 UART: [art] Store priv key in slot 0x5
29,191,134 UART: [art] Derive Key Pair - Done
29,203,855 UART: [art] Signing Cert with AUTHO
29,205,166 UART: RITY.KEYID = 7
31,484,642 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,170 UART: [art] PUB.X = 0326F125204EA3FCBCB8287EE2E257B2ADA971D054EEA11E554D0522E44978853C8BC68DBA02099DCF6C66645E548FA9
31,493,414 UART: [art] PUB.Y = E22902402173B151ADFDCAF094CA2FD193A8324307EF98FDF1F0BC1443B7BB5DA2D636181D67C31C05083D94F102E4B2
31,500,613 UART: [art] SIG.R = D5835DE217FC0498A82FE156209202C0797D664689A9792F0217EE4AFDCA836B2D696217E523F3063E1172E9E728192F
31,507,959 UART: [art] SIG.S = BBB6D66B5342658E8D4EB7A354F760B1AF1E563698F15AA50B3EE35AC4E551B4980EEC2DC2F31F785FB1B55E1D6D14BB
32,813,471 UART: Caliptra RT
32,814,173 UART: [state] CFI Enabled
32,932,658 UART: [rt] RT listening for mailbox commands...
36,951,987 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,107,715 UART: [rt]cmd =0x41544d4e, len=14344
42,343,691 >>> mbox cmd response data (8 bytes)
42,344,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,375,010 UART: [rt]cmd =0x41545348, len=116
42,377,365 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,127,884 ready_for_fw is high
4,128,295 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,067,195 >>> mbox cmd response: success
23,710,608 UART:
23,711,009 UART: Running Caliptra FMC ...
23,712,151 UART:
23,712,329 UART: [state] CFI Enabled
23,720,339 UART: [fht] FMC Alias Private Key: 7
26,051,528 UART: [art] Extend RT PCRs Done
26,052,753 UART: [art] Lock RT PCRs Done
26,054,518 UART: [art] Populate DV Done
26,059,886 UART: [fht] FMC Alias Private Key: 7
26,061,442 UART: [art] Derive CDI
26,062,267 UART: [art] Store in in slot 0x4
26,104,445 UART: [art] Derive Key Pair
26,105,492 UART: [art] Store priv key in slot 0x5
29,347,442 UART: [art] Derive Key Pair - Done
29,360,120 UART: [art] Signing Cert with AUTHO
29,361,424 UART: RITY.KEYID = 7
31,640,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,494 UART: [art] PUB.X = 35EF2992B5D66D4E7C0C6BFA48F745AD46B2D7284C3B8218B2DE6BF005BEF7B265C759B1A1BEBADDA2D3A15E3DEF6317
31,649,765 UART: [art] PUB.Y = EEA866F77C777C2E58D4EBD64613C732C204C50479C2CEA9B8AA37193A358BA8EEFEDD01F163190D89F0CC9EFA91A915
31,657,032 UART: [art] SIG.R = FB0B3B115A2C906E75F8ED9D9EA30CE098A7321A512778CA189788BDF8C68CBFF0E2FD4698BED5218EEA9588C7433EB1
31,664,448 UART: [art] SIG.S = 6D57939BDCEAD629031CE02D9D0B010CE5C9E93877F0D71D7E1B8548B05A81D228D535FBF4101661E23FF1702B6E0BBD
32,968,874 UART: Caliptra RT
32,969,582 UART: [state] CFI Enabled
33,088,327 UART: [rt] RT listening for mailbox commands...
37,108,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,264,476 UART: [rt]cmd =0x41544d4e, len=14344
42,499,865 >>> mbox cmd response data (8 bytes)
42,500,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,531,182 UART: [rt]cmd =0x41545348, len=116
42,533,233 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,488 UART:
192,850 UART: Running Caliptra ROM ...
194,054 UART:
194,216 UART: [state] CFI Enabled
262,903 UART: [state] LifecycleState = Unprovisioned
264,823 UART: [state] DebugLocked = No
266,787 UART: [state] WD Timer not started. Device not locked for debugging
270,034 UART: [kat] SHA2-256
449,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,723 UART: [kat] ++
461,251 UART: [kat] sha1
473,619 UART: [kat] SHA2-256
476,702 UART: [kat] SHA2-384
482,480 UART: [kat] SHA2-512-ACC
485,416 UART: [kat] ECC-384
2,946,514 UART: [kat] HMAC-384Kdf
2,970,858 UART: [kat] LMS
3,500,364 UART: [kat] --
3,503,743 UART: [cold-reset] ++
3,505,827 UART: [fht] FHT @ 0x50003400
3,517,090 UART: [idev] ++
3,517,656 UART: [idev] CDI.KEYID = 6
3,518,539 UART: [idev] SUBJECT.KEYID = 7
3,519,780 UART: [idev] UDS.KEYID = 0
3,520,706 ready_for_fw is high
3,520,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,745 UART: [idev] Erasing UDS.KEYID = 0
6,028,764 UART: [idev] Sha1 KeyId Algorithm
6,051,923 UART: [idev] --
6,056,618 UART: [ldev] ++
6,057,191 UART: [ldev] CDI.KEYID = 6
6,058,079 UART: [ldev] SUBJECT.KEYID = 5
6,059,218 UART: [ldev] AUTHORITY.KEYID = 7
6,060,511 UART: [ldev] FE.KEYID = 1
6,100,900 UART: [ldev] Erasing FE.KEYID = 1
8,601,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,065 UART: [ldev] --
10,394,252 UART: [fwproc] Wait for Commands...
10,396,182 UART: [fwproc] Recv command 0x46574c44
10,398,275 UART: [fwproc] Recv'd Img size: 114360 bytes
13,804,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,267,951 >>> mbox cmd response: success
14,272,822 UART: [afmc] ++
14,273,423 UART: [afmc] CDI.KEYID = 6
14,274,311 UART: [afmc] SUBJECT.KEYID = 7
14,275,529 UART: [afmc] AUTHORITY.KEYID = 5
16,808,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,717 UART: [afmc] --
18,607,047 UART: [cold-reset] --
18,611,287 UART: [state] Locking Datavault
18,617,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,987 UART: [state] Locking ICCM
18,620,113 UART: [exit] Launching FMC @ 0x40000130
18,628,534 UART:
18,628,783 UART: Running Caliptra FMC ...
18,629,887 UART:
18,630,046 UART: [state] CFI Enabled
18,688,525 UART: [fht] FMC Alias Private Key: 7
20,452,314 UART: [art] Extend RT PCRs Done
20,453,541 UART: [art] Lock RT PCRs Done
20,455,004 UART: [art] Populate DV Done
20,460,529 UART: [fht] FMC Alias Private Key: 7
20,462,283 UART: [art] Derive CDI
20,463,099 UART: [art] Store in in slot 0x4
20,520,418 UART: [art] Derive Key Pair
20,521,463 UART: [art] Store priv key in slot 0x5
22,986,252 UART: [art] Derive Key Pair - Done
22,999,033 UART: [art] Signing Cert with AUTHO
23,000,337 UART: RITY.KEYID = 7
24,711,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,325 UART: [art] PUB.X = 85F38D30BA85A068F33C8D93BF8DCAF90ADFBB2041F965EBCC513D3A9BE114C187BD939E673CD4FF6E448B9570701D5A
24,720,605 UART: [art] PUB.Y = 91B1156E4EE634D8B2A2E6F7D904447D4B47CA4A26A8865CDB0CD11AD22CB4A1B48FD50C71C2906C4491CE710A4FF871
24,727,868 UART: [art] SIG.R = DB5343B6537A00FCE0D48393741BEC57F5323B5C0D376359F61DDC2AC0C4FEBEAAFADF918B9A53694B211C7BF925D443
24,735,267 UART: [art] SIG.S = 3AA76B688FD4EC8681369B3AECB45D14F509ED3FAA2A6EC4F2B9FD0B0CDB4F99773B6ACD055F6A2493B36D0DE4826B12
25,713,811 UART: Caliptra RT
25,714,512 UART: [state] CFI Enabled
25,878,703 UART: [rt] RT listening for mailbox commands...
29,901,085 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,056,539 UART: [rt]cmd =0x41544d4e, len=14344
33,987,378 >>> mbox cmd response data (8 bytes)
33,987,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,018,444 UART: [rt]cmd =0x41545348, len=116
34,020,576 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,751 UART:
193,142 UART: Running Caliptra ROM ...
194,250 UART:
194,394 UART: [state] CFI Enabled
265,349 UART: [state] LifecycleState = Unprovisioned
267,761 UART: [state] DebugLocked = No
269,360 UART: [state] WD Timer not started. Device not locked for debugging
273,676 UART: [kat] SHA2-256
463,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,308 UART: [kat] ++
474,759 UART: [kat] sha1
485,914 UART: [kat] SHA2-256
488,922 UART: [kat] SHA2-384
495,639 UART: [kat] SHA2-512-ACC
498,239 UART: [kat] ECC-384
2,949,794 UART: [kat] HMAC-384Kdf
2,970,870 UART: [kat] LMS
3,502,659 UART: [kat] --
3,508,500 UART: [cold-reset] ++
3,510,507 UART: [fht] FHT @ 0x50003400
3,522,621 UART: [idev] ++
3,523,330 UART: [idev] CDI.KEYID = 6
3,524,362 UART: [idev] SUBJECT.KEYID = 7
3,525,466 UART: [idev] UDS.KEYID = 0
3,526,404 ready_for_fw is high
3,526,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,414 UART: [idev] Erasing UDS.KEYID = 0
6,026,543 UART: [idev] Sha1 KeyId Algorithm
6,048,989 UART: [idev] --
6,053,316 UART: [ldev] ++
6,054,002 UART: [ldev] CDI.KEYID = 6
6,054,927 UART: [ldev] SUBJECT.KEYID = 5
6,056,110 UART: [ldev] AUTHORITY.KEYID = 7
6,057,294 UART: [ldev] FE.KEYID = 1
6,099,658 UART: [ldev] Erasing FE.KEYID = 1
8,605,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,220 UART: [ldev] --
10,413,924 UART: [fwproc] Wait for Commands...
10,416,704 UART: [fwproc] Recv command 0x46574c44
10,419,017 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,083 >>> mbox cmd response: success
14,607,976 UART: [afmc] ++
14,608,691 UART: [afmc] CDI.KEYID = 6
14,609,807 UART: [afmc] SUBJECT.KEYID = 7
14,611,349 UART: [afmc] AUTHORITY.KEYID = 5
17,146,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,393 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,409 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,887 UART: [afmc] --
18,947,544 UART: [cold-reset] --
18,951,845 UART: [state] Locking Datavault
18,958,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,822 UART: [state] Locking ICCM
18,963,495 UART: [exit] Launching FMC @ 0x40000130
18,972,150 UART:
18,972,427 UART: Running Caliptra FMC ...
18,973,456 UART:
18,973,605 UART: [state] CFI Enabled
19,031,326 UART: [fht] FMC Alias Private Key: 7
20,794,635 UART: [art] Extend RT PCRs Done
20,795,853 UART: [art] Lock RT PCRs Done
20,797,659 UART: [art] Populate DV Done
20,803,070 UART: [fht] FMC Alias Private Key: 7
20,804,663 UART: [art] Derive CDI
20,805,477 UART: [art] Store in in slot 0x4
20,863,167 UART: [art] Derive Key Pair
20,864,210 UART: [art] Store priv key in slot 0x5
23,326,712 UART: [art] Derive Key Pair - Done
23,339,709 UART: [art] Signing Cert with AUTHO
23,341,012 UART: RITY.KEYID = 7
25,053,262 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,763 UART: [art] PUB.X = B1CDF4F0F15B04FD46E1C5F819679E20F516CD5EA7E0165B48CF0B54D5858433D51F7959DB9B173824AB0E4D2A911C54
25,061,991 UART: [art] PUB.Y = 6AFB12E403D0BC47B10B4A888AC465A9C359DCD3CCBFCE89CBAC01C76E8ABEDA6FD229C8D7CBDD07244494DB9B57ECC0
25,069,324 UART: [art] SIG.R = C1BC50F387CBF3E08BCB90DDAF62C74E2AB6046925E2A18609594A3833CE06BD02FADBC218314F90D221AB40A97E6EB4
25,076,702 UART: [art] SIG.S = 7413A3133183A516751B7DD0EA766250FB62B9B03368CB338F73C67AF2833284D20CD62C37652678A60B6A68FFF5D676
26,055,648 UART: Caliptra RT
26,056,362 UART: [state] CFI Enabled
26,220,514 UART: [rt] RT listening for mailbox commands...
30,245,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,400,817 UART: [rt]cmd =0x41544d4e, len=14344
34,331,194 >>> mbox cmd response data (8 bytes)
34,331,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,362,557 UART: [rt]cmd =0x41545348, len=116
34,364,878 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,442,391 ready_for_fw is high
3,442,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,745,277 >>> mbox cmd response: success
19,028,243 UART:
19,028,646 UART: Running Caliptra FMC ...
19,029,853 UART:
19,030,029 UART: [state] CFI Enabled
19,094,661 UART: [fht] FMC Alias Private Key: 7
20,859,092 UART: [art] Extend RT PCRs Done
20,860,311 UART: [art] Lock RT PCRs Done
20,861,727 UART: [art] Populate DV Done
20,867,025 UART: [fht] FMC Alias Private Key: 7
20,868,675 UART: [art] Derive CDI
20,869,494 UART: [art] Store in in slot 0x4
20,928,107 UART: [art] Derive Key Pair
20,929,146 UART: [art] Store priv key in slot 0x5
23,391,858 UART: [art] Derive Key Pair - Done
23,404,810 UART: [art] Signing Cert with AUTHO
23,406,114 UART: RITY.KEYID = 7
25,117,849 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,345 UART: [art] PUB.X = 2B7E9A0BE746F7C38475AEB539628FE105D817471F5F1A9B08A69B85485BDF9693AE4F79947453C5C4AA5933CFB6BECB
25,126,624 UART: [art] PUB.Y = 94B68E50C7DF4CA96B5812FEE315E1674BCEC875AA4B2FB5B2581CAEE9260655B8D7286222C43C95DE0E0C24721119A6
25,133,895 UART: [art] SIG.R = 919BA749927F3C3116E53CAB56F818F31E46488BCB989EF5A2F8F6EE965D1E406848FAEBA6123DD47D09E563A59385A3
25,141,260 UART: [art] SIG.S = E18F6FCDACA10D3B008E4E40DE7AE05A440F4F98F7DF67F77D8AD142E1F5276026D403C3DB4C091EA9A4AA24AA710CE4
26,119,820 UART: Caliptra RT
26,120,520 UART: [state] CFI Enabled
26,286,199 UART: [rt] RT listening for mailbox commands...
30,312,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,468,180 UART: [rt]cmd =0x41544d4e, len=14344
34,398,332 >>> mbox cmd response data (8 bytes)
34,398,909 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,429,712 UART: [rt]cmd =0x41545348, len=116
34,431,998 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,446 UART:
192,820 UART: Running Caliptra ROM ...
193,939 UART:
603,639 UART: [state] CFI Enabled
619,876 UART: [state] LifecycleState = Unprovisioned
622,274 UART: [state] DebugLocked = No
624,024 UART: [state] WD Timer not started. Device not locked for debugging
629,415 UART: [kat] SHA2-256
819,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,051 UART: [kat] ++
830,655 UART: [kat] sha1
842,245 UART: [kat] SHA2-256
845,252 UART: [kat] SHA2-384
851,521 UART: [kat] SHA2-512-ACC
854,043 UART: [kat] ECC-384
3,293,638 UART: [kat] HMAC-384Kdf
3,306,291 UART: [kat] LMS
3,838,090 UART: [kat] --
3,840,623 UART: [cold-reset] ++
3,842,765 UART: [fht] FHT @ 0x50003400
3,855,800 UART: [idev] ++
3,856,508 UART: [idev] CDI.KEYID = 6
3,857,536 UART: [idev] SUBJECT.KEYID = 7
3,858,640 UART: [idev] UDS.KEYID = 0
3,859,564 ready_for_fw is high
3,859,748 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,357 UART: [idev] Erasing UDS.KEYID = 0
6,338,664 UART: [idev] Sha1 KeyId Algorithm
6,361,894 UART: [idev] --
6,366,536 UART: [ldev] ++
6,367,253 UART: [ldev] CDI.KEYID = 6
6,368,137 UART: [ldev] SUBJECT.KEYID = 5
6,369,237 UART: [ldev] AUTHORITY.KEYID = 7
6,370,543 UART: [ldev] FE.KEYID = 1
6,379,651 UART: [ldev] Erasing FE.KEYID = 1
8,857,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,987 UART: [ldev] --
10,648,765 UART: [fwproc] Wait for Commands...
10,650,260 UART: [fwproc] Recv command 0x46574c44
10,652,567 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,843,013 >>> mbox cmd response: success
14,846,863 UART: [afmc] ++
14,847,612 UART: [afmc] CDI.KEYID = 6
14,848,800 UART: [afmc] SUBJECT.KEYID = 7
14,850,232 UART: [afmc] AUTHORITY.KEYID = 5
17,350,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,336 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,660 UART: [afmc] --
19,148,955 UART: [cold-reset] --
19,153,898 UART: [state] Locking Datavault
19,158,652 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,838 UART: [state] Locking ICCM
19,162,770 UART: [exit] Launching FMC @ 0x40000130
19,171,434 UART:
19,171,726 UART: Running Caliptra FMC ...
19,172,837 UART:
19,173,001 UART: [state] CFI Enabled
19,180,781 UART: [fht] FMC Alias Private Key: 7
20,937,795 UART: [art] Extend RT PCRs Done
20,939,011 UART: [art] Lock RT PCRs Done
20,940,680 UART: [art] Populate DV Done
20,945,982 UART: [fht] FMC Alias Private Key: 7
20,947,512 UART: [art] Derive CDI
20,948,243 UART: [art] Store in in slot 0x4
20,990,720 UART: [art] Derive Key Pair
20,991,715 UART: [art] Store priv key in slot 0x5
23,418,669 UART: [art] Derive Key Pair - Done
23,431,554 UART: [art] Signing Cert with AUTHO
23,432,850 UART: RITY.KEYID = 7
25,138,375 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,898 UART: [art] PUB.X = 22E1FABEFE185AB747014372B966E3231A09FA03143B24AEDC8545E8BFC2E1AD644F8049A6080138D546C7B99C17F891
25,147,144 UART: [art] PUB.Y = E8EF3ACE595CCE277DB2BB1EADC2F156B58CB5C672526B2303FDD986CAA46E6AEE1BAE192044AE9705533389F6569A54
25,154,425 UART: [art] SIG.R = DD2AAD7BA1230F328627D1D8C6B867153A21B7B593AD5436D092B6C323BCE0BF645A31C96B827A1029FA846C2E425A6F
25,161,811 UART: [art] SIG.S = C67D9A8C7E81886F239C829025920276F282A7765CAFC7DF25EBB13843A0050E781DEBFE4B935BC2F1C37C6F73F4DDE8
26,140,750 UART: Caliptra RT
26,141,465 UART: [state] CFI Enabled
26,258,636 UART: [rt] RT listening for mailbox commands...
30,278,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,434,401 UART: [rt]cmd =0x41544d4e, len=14344
34,364,650 >>> mbox cmd response data (8 bytes)
34,365,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,396,199 UART: [rt]cmd =0x41545348, len=116
34,398,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,758,181 ready_for_fw is high
3,758,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,961,797 >>> mbox cmd response: success
19,211,377 UART:
19,211,769 UART: Running Caliptra FMC ...
19,212,913 UART:
19,213,098 UART: [state] CFI Enabled
19,221,008 UART: [fht] FMC Alias Private Key: 7
20,978,154 UART: [art] Extend RT PCRs Done
20,979,382 UART: [art] Lock RT PCRs Done
20,980,899 UART: [art] Populate DV Done
20,986,261 UART: [fht] FMC Alias Private Key: 7
20,987,913 UART: [art] Derive CDI
20,988,727 UART: [art] Store in in slot 0x4
21,031,170 UART: [art] Derive Key Pair
21,032,217 UART: [art] Store priv key in slot 0x5
23,459,065 UART: [art] Derive Key Pair - Done
23,471,851 UART: [art] Signing Cert with AUTHO
23,473,347 UART: RITY.KEYID = 7
25,178,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,087 UART: [art] PUB.X = 14707EFDF909B5688A06FE54E275CEBF38D9DF78E5FDCC968BBC23067D9181CA25C0C7E8A6C84B11594DBB31145087F7
25,187,345 UART: [art] PUB.Y = DCD73AA4AB2DB16FCD706AE96358C7E69293A41698C9AE93BC97E557CE39DDBFFC9AF4D0CE0EE9072353AAB6136D3BDE
25,194,689 UART: [art] SIG.R = 9F83135D91B646A7CA0CEF80247688B26AC7870671BFBD7F278D9A5C350186FE7CE40DC458F42D140215FB1F948C3B5C
25,202,038 UART: [art] SIG.S = 3D48C612EC8D6678CC062E4CF2C26AB77FE7E732F346F6517A739AB5500E8C4BE2D27FFD8ACC308C7A01DAAE69181C4C
26,181,240 UART: Caliptra RT
26,181,952 UART: [state] CFI Enabled
26,299,833 UART: [rt] RT listening for mailbox commands...
30,320,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,475,882 UART: [rt]cmd =0x41544d4e, len=14344
34,406,738 >>> mbox cmd response data (8 bytes)
34,407,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,437,823 UART: [rt]cmd =0x41545348, len=116
34,440,064 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,755 UART: [kat] SHA2-256
881,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,801 UART: [kat] ++
885,953 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,276 UART: [idev] Erasing UDS.KEYID = 0
1,505,026 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,679 UART: [ldev] ++
1,514,847 UART: [ldev] CDI.KEYID = 6
1,515,210 UART: [ldev] SUBJECT.KEYID = 5
1,515,636 UART: [ldev] AUTHORITY.KEYID = 7
1,516,099 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,238 UART: [ldev] --
1,585,571 UART: [fwproc] Waiting for Commands...
1,586,340 UART: [fwproc] Received command 0x46574c44
1,587,131 UART: [fwproc] Received Image of size 114360 bytes
2,884,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,030 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,381 >>> mbox cmd response: success
3,077,567 UART: [afmc] ++
3,077,735 UART: [afmc] CDI.KEYID = 6
3,078,097 UART: [afmc] SUBJECT.KEYID = 7
3,078,522 UART: [afmc] AUTHORITY.KEYID = 5
3,113,405 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,791 UART: [afmc] --
3,156,919 UART: [cold-reset] --
3,157,739 UART: [state] Locking Datavault
3,158,876 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,480 UART: [state] Locking ICCM
3,159,998 UART: [exit] Launching FMC @ 0x40000130
3,165,327 UART:
3,165,343 UART: Running Caliptra FMC ...
3,165,751 UART:
3,165,805 UART: [state] CFI Enabled
3,176,178 UART: [fht] FMC Alias Private Key: 7
3,283,477 UART: [art] Extend RT PCRs Done
3,283,905 UART: [art] Lock RT PCRs Done
3,285,129 UART: [art] Populate DV Done
3,293,606 UART: [fht] FMC Alias Private Key: 7
3,294,618 UART: [art] Derive CDI
3,294,898 UART: [art] Store in in slot 0x4
3,380,517 UART: [art] Derive Key Pair
3,380,877 UART: [art] Store priv key in slot 0x5
3,394,241 UART: [art] Derive Key Pair - Done
3,408,675 UART: [art] Signing Cert with AUTHO
3,409,155 UART: RITY.KEYID = 7
3,423,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,508 UART: [art] PUB.X = 729EDCBF5E60B43D609CB81B28ECF01E69E9B9F66565149C80E116B1A9CAB5CF8DBDD9E986A6560A958FF0018A0F381B
3,431,285 UART: [art] PUB.Y = 5166EE05ABDC03543DFE39015462A068F1543305C502E896B76C8DFA4A3BFB76B2FCC11D1218A16F42F5993680E236A8
3,438,222 UART: [art] SIG.R = 7D09FBE1959942BB18127EC81B3D8C7B7AE77A7C39E2B33D7F4FAAE66410F29056D9992F0269AB1E2B4B7B7CC51CB5C2
3,445,000 UART: [art] SIG.S = 24B44966656EE006D30AFD184A8E46327749FD07F729B1514437D123F9E5FF90428D95525A7DD515F2B98ED1FB3FD3D7
3,468,950 UART: Caliptra RT
3,469,204 UART: [state] CFI Enabled
3,577,519 UART: [rt] RT listening for mailbox commands...
3,578,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,830 UART: [rt]cmd =0x41544d4e, len=14344
3,845,440 >>> mbox cmd response data (8 bytes)
3,845,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,564 UART: [rt]cmd =0x41545348, len=116
3,877,675 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,717 ready_for_fw is high
1,362,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,581 >>> mbox cmd response: success
2,987,407 UART:
2,987,423 UART: Running Caliptra FMC ...
2,987,831 UART:
2,987,885 UART: [state] CFI Enabled
2,998,158 UART: [fht] FMC Alias Private Key: 7
3,106,207 UART: [art] Extend RT PCRs Done
3,106,635 UART: [art] Lock RT PCRs Done
3,108,241 UART: [art] Populate DV Done
3,116,528 UART: [fht] FMC Alias Private Key: 7
3,117,708 UART: [art] Derive CDI
3,117,988 UART: [art] Store in in slot 0x4
3,203,841 UART: [art] Derive Key Pair
3,204,201 UART: [art] Store priv key in slot 0x5
3,217,197 UART: [art] Derive Key Pair - Done
3,232,070 UART: [art] Signing Cert with AUTHO
3,232,550 UART: RITY.KEYID = 7
3,247,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,453 UART: [art] PUB.X = AF14223EB8409644D081E2CA35F31EA0EFC61EE36E743C2E5E60F838F6689685FF50F4807804B7925D769900C7ED8597
3,255,196 UART: [art] PUB.Y = D6361BE884A0EE28A78C28585E64DDDB2FF51D2D09F139C1285DF4ACA3389047310CE03B76E2C84DD3796B679B8BC544
3,262,148 UART: [art] SIG.R = C4989BF5388E0A6FD6F6E3D40C8EF22E3C254044B6F91CC4B91BDF0D907AD87ED4994598FF57202A4C8F04B83CA13C92
3,268,918 UART: [art] SIG.S = 7F37057B657340097B0DEF1295AA9BE3733346CC6B7D836791906CC82D783BAD7A63CF83BFF7A7F4037C85B027E83361
3,292,875 UART: Caliptra RT
3,293,129 UART: [state] CFI Enabled
3,400,609 UART: [rt] RT listening for mailbox commands...
3,401,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,206 UART: [rt]cmd =0x41544d4e, len=14344
3,668,432 >>> mbox cmd response data (8 bytes)
3,668,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,556 UART: [rt]cmd =0x41545348, len=116
3,700,531 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,094 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,654 UART: [kat] SHA2-256
882,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,700 UART: [kat] ++
886,852 UART: [kat] sha1
891,166 UART: [kat] SHA2-256
893,104 UART: [kat] SHA2-384
895,855 UART: [kat] SHA2-512-ACC
897,756 UART: [kat] ECC-384
903,523 UART: [kat] HMAC-384Kdf
908,093 UART: [kat] LMS
1,476,289 UART: [kat] --
1,476,996 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,195 UART: [idev] ++
1,480,363 UART: [idev] CDI.KEYID = 6
1,480,723 UART: [idev] SUBJECT.KEYID = 7
1,481,147 UART: [idev] UDS.KEYID = 0
1,481,492 ready_for_fw is high
1,481,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,259 UART: [idev] Erasing UDS.KEYID = 0
1,505,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,889 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,958 UART: [ldev] Erasing FE.KEYID = 1
1,547,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,811 UART: [ldev] --
1,587,244 UART: [fwproc] Waiting for Commands...
1,587,987 UART: [fwproc] Received command 0x46574c44
1,588,778 UART: [fwproc] Received Image of size 114360 bytes
2,886,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,626 >>> mbox cmd response: success
3,079,638 UART: [afmc] ++
3,079,806 UART: [afmc] CDI.KEYID = 6
3,080,168 UART: [afmc] SUBJECT.KEYID = 7
3,080,593 UART: [afmc] AUTHORITY.KEYID = 5
3,115,880 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,654 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,047 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,737 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,696 UART: [afmc] --
3,159,598 UART: [cold-reset] --
3,160,496 UART: [state] Locking Datavault
3,161,481 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,085 UART: [state] Locking ICCM
3,162,513 UART: [exit] Launching FMC @ 0x40000130
3,167,842 UART:
3,167,858 UART: Running Caliptra FMC ...
3,168,266 UART:
3,168,409 UART: [state] CFI Enabled
3,179,510 UART: [fht] FMC Alias Private Key: 7
3,287,679 UART: [art] Extend RT PCRs Done
3,288,107 UART: [art] Lock RT PCRs Done
3,289,637 UART: [art] Populate DV Done
3,297,800 UART: [fht] FMC Alias Private Key: 7
3,298,814 UART: [art] Derive CDI
3,299,094 UART: [art] Store in in slot 0x4
3,384,951 UART: [art] Derive Key Pair
3,385,311 UART: [art] Store priv key in slot 0x5
3,398,809 UART: [art] Derive Key Pair - Done
3,413,414 UART: [art] Signing Cert with AUTHO
3,413,894 UART: RITY.KEYID = 7
3,429,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,939 UART: [art] PUB.X = 8FF7502CE1F443335837932ED7C710BDADF427E78718C7F93DBED03791AF2E7C7885C0C47787F36D9BAC51B4A03323CC
3,436,717 UART: [art] PUB.Y = 90D8AD381A65625E46596DFA49153B1ACAC2A6CFAEAE76170AF0FD070ED6F05534B1D7798738CB6213784F6BE7A83D82
3,443,668 UART: [art] SIG.R = 930A3789C2B68FB2895BEB83A76DF4FEE7759DB682D627A45DD824F83CFACB3911FB2E19B832710BF9DA24EB46BDB150
3,450,448 UART: [art] SIG.S = 7012FAB9A136F1B65CBD26986F88844686084EBC9EEE43A28A84844909AA5BFA1E87B28E26FD53485FD3D595C40640EC
3,474,670 UART: Caliptra RT
3,475,016 UART: [state] CFI Enabled
3,582,874 UART: [rt] RT listening for mailbox commands...
3,583,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,123 UART: [rt]cmd =0x41544d4e, len=14344
3,851,105 >>> mbox cmd response data (8 bytes)
3,851,106 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,055 UART: [rt]cmd =0x41545348, len=116
3,882,650 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,620 ready_for_fw is high
1,362,620 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,612 >>> mbox cmd response: success
2,987,324 UART:
2,987,340 UART: Running Caliptra FMC ...
2,987,748 UART:
2,987,891 UART: [state] CFI Enabled
2,998,596 UART: [fht] FMC Alias Private Key: 7
3,106,953 UART: [art] Extend RT PCRs Done
3,107,381 UART: [art] Lock RT PCRs Done
3,108,765 UART: [art] Populate DV Done
3,117,068 UART: [fht] FMC Alias Private Key: 7
3,118,022 UART: [art] Derive CDI
3,118,302 UART: [art] Store in in slot 0x4
3,204,139 UART: [art] Derive Key Pair
3,204,499 UART: [art] Store priv key in slot 0x5
3,218,435 UART: [art] Derive Key Pair - Done
3,233,175 UART: [art] Signing Cert with AUTHO
3,233,655 UART: RITY.KEYID = 7
3,248,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,356 UART: [art] PUB.X = 8EE615FCC39BC7403F98D4E92E1DA8CA091D194ED6AE208CCB9F579E63A7D9443258C7C1ECD469D58D00E3B3072A3ED4
3,256,114 UART: [art] PUB.Y = 760DDA2D6502357E0929F550C57AE695CE59EDF36DB60A95811E3031C31AE8D3BE40E107D0C64FA5F43D195FB5610FF1
3,263,054 UART: [art] SIG.R = 0D4FBAEC51B5775621A1D7CB280D40D4CFFB93C2E121D5BE0AB1C940CEBD7811B05B0869B3923EE5BECD9AFF73F162FF
3,269,838 UART: [art] SIG.S = 7C0045FC9267BFD773DD3D5EDC971961F4E3C809414FD83E964FBA947D9D8DA234683BF3DA2803CF74FA3BE69DC193F1
3,293,583 UART: Caliptra RT
3,293,929 UART: [state] CFI Enabled
3,402,040 UART: [rt] RT listening for mailbox commands...
3,402,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,419 UART: [rt]cmd =0x41544d4e, len=14344
3,670,381 >>> mbox cmd response data (8 bytes)
3,670,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,657 UART: [rt]cmd =0x41545348, len=116
3,702,326 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,553 UART: [kat] SHA2-256
903,493 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,234 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,200,875 UART: [idev] Sha1 KeyId Algorithm
1,209,267 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,521 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,184 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,120 >>> mbox cmd response: success
2,775,340 UART: [afmc] ++
2,775,508 UART: [afmc] CDI.KEYID = 6
2,775,870 UART: [afmc] SUBJECT.KEYID = 7
2,776,295 UART: [afmc] AUTHORITY.KEYID = 5
2,811,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,147 UART: [afmc] --
2,855,235 UART: [cold-reset] --
2,856,135 UART: [state] Locking Datavault
2,857,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,722 UART: [state] Locking ICCM
2,858,172 UART: [exit] Launching FMC @ 0x40000130
2,863,501 UART:
2,863,517 UART: Running Caliptra FMC ...
2,863,925 UART:
2,863,979 UART: [state] CFI Enabled
2,874,472 UART: [fht] FMC Alias Private Key: 7
2,983,041 UART: [art] Extend RT PCRs Done
2,983,469 UART: [art] Lock RT PCRs Done
2,984,691 UART: [art] Populate DV Done
2,993,254 UART: [fht] FMC Alias Private Key: 7
2,994,240 UART: [art] Derive CDI
2,994,520 UART: [art] Store in in slot 0x4
3,080,479 UART: [art] Derive Key Pair
3,080,839 UART: [art] Store priv key in slot 0x5
3,093,465 UART: [art] Derive Key Pair - Done
3,108,203 UART: [art] Signing Cert with AUTHO
3,108,683 UART: RITY.KEYID = 7
3,124,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,298 UART: [art] PUB.X = 4DEFD2F68027E3C952662F42707A144D766292E6F6876E8B7BB63860F3ED67D71A27C9099AAC1CC2F8069A762D2E0EB8
3,132,063 UART: [art] PUB.Y = 00D56D64863D16A89A3A5682A675E3C738A6183D956D1B13CCB287BE770859D70D6211585796DD6D1177C5D069D531F8
3,138,977 UART: [art] SIG.R = 3CFC1C3D9CA9863DB5269B2819C18E4CA0E930C3D71314360B806D4B63E480553ED65F2B366443CACEE48A2F41AC7FC1
3,145,754 UART: [art] SIG.S = 5D8497189561BCBF50A23690876B945EEB3D46A032B932F6C5A70B8AD34923D2C0775A9AE3AD4CD5DA45519292EA3D8D
3,169,342 UART: Caliptra RT
3,169,596 UART: [state] CFI Enabled
3,277,354 UART: [rt] RT listening for mailbox commands...
3,278,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,855 UART: [rt]cmd =0x41544d4e, len=14344
3,545,869 >>> mbox cmd response data (8 bytes)
3,545,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,959 UART: [rt]cmd =0x41545348, len=116
3,577,754 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,167 ready_for_fw is high
1,060,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,747 >>> mbox cmd response: success
2,687,715 UART:
2,687,731 UART: Running Caliptra FMC ...
2,688,139 UART:
2,688,193 UART: [state] CFI Enabled
2,698,662 UART: [fht] FMC Alias Private Key: 7
2,807,037 UART: [art] Extend RT PCRs Done
2,807,465 UART: [art] Lock RT PCRs Done
2,809,109 UART: [art] Populate DV Done
2,817,110 UART: [fht] FMC Alias Private Key: 7
2,818,112 UART: [art] Derive CDI
2,818,392 UART: [art] Store in in slot 0x4
2,903,921 UART: [art] Derive Key Pair
2,904,281 UART: [art] Store priv key in slot 0x5
2,917,217 UART: [art] Derive Key Pair - Done
2,932,025 UART: [art] Signing Cert with AUTHO
2,932,505 UART: RITY.KEYID = 7
2,948,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,928 UART: [art] PUB.X = 1364A9F6DDA6140A52462D187AC3DCEC0C8F57DE6287403F37F32808E3F7152A0AF4AFFA6A48268120D309A7CDB2B848
2,955,691 UART: [art] PUB.Y = EA7B70487A93EEC2A462B8D5748FD9A317F58F6FD6D6289796A67686890839850368E5B811C50FDE1056FDEEB23A5AA6
2,962,636 UART: [art] SIG.R = AA9EBD8619A988CE07A4BAE090E549C44A35A3EC8C5768884CF4E99940BB8CDB207AB79347FE6D894A8BE40611439ACD
2,969,414 UART: [art] SIG.S = 403A6712085558D399189D1C8861457DF1FD8D23A7F24B88E614E2C6E5C47AAF39ABF753CF37789E0A50530E129B3EA4
2,993,068 UART: Caliptra RT
2,993,322 UART: [state] CFI Enabled
3,099,954 UART: [rt] RT listening for mailbox commands...
3,100,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,165 UART: [rt]cmd =0x41544d4e, len=14344
3,367,899 >>> mbox cmd response data (8 bytes)
3,367,900 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,701 UART: [rt]cmd =0x41545348, len=116
3,399,434 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Unprovisioned
85,646 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
893,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,272 UART: [kat] ++
897,424 UART: [kat] sha1
901,616 UART: [kat] SHA2-256
903,556 UART: [kat] SHA2-384
906,403 UART: [kat] SHA2-512-ACC
908,304 UART: [kat] ECC-384
918,277 UART: [kat] HMAC-384Kdf
923,063 UART: [kat] LMS
1,171,391 UART: [kat] --
1,172,172 UART: [cold-reset] ++
1,172,680 UART: [fht] FHT @ 0x50003400
1,175,307 UART: [idev] ++
1,175,475 UART: [idev] CDI.KEYID = 6
1,175,835 UART: [idev] SUBJECT.KEYID = 7
1,176,259 UART: [idev] UDS.KEYID = 0
1,176,604 ready_for_fw is high
1,176,604 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,801 UART: [idev] Erasing UDS.KEYID = 0
1,201,572 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,310 UART: [ldev] ++
1,211,478 UART: [ldev] CDI.KEYID = 6
1,211,841 UART: [ldev] SUBJECT.KEYID = 5
1,212,267 UART: [ldev] AUTHORITY.KEYID = 7
1,212,730 UART: [ldev] FE.KEYID = 1
1,217,992 UART: [ldev] Erasing FE.KEYID = 1
1,244,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,098 UART: [ldev] --
1,283,543 UART: [fwproc] Wait for Commands...
1,284,131 UART: [fwproc] Recv command 0x46574c44
1,284,859 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,134 >>> mbox cmd response: success
2,776,384 UART: [afmc] ++
2,776,552 UART: [afmc] CDI.KEYID = 6
2,776,914 UART: [afmc] SUBJECT.KEYID = 7
2,777,339 UART: [afmc] AUTHORITY.KEYID = 5
2,812,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,628 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,347 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,047 UART: [afmc] --
2,856,029 UART: [cold-reset] --
2,856,901 UART: [state] Locking Datavault
2,858,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,768 UART: [state] Locking ICCM
2,859,408 UART: [exit] Launching FMC @ 0x40000130
2,864,737 UART:
2,864,753 UART: Running Caliptra FMC ...
2,865,161 UART:
2,865,304 UART: [state] CFI Enabled
2,876,053 UART: [fht] FMC Alias Private Key: 7
2,983,730 UART: [art] Extend RT PCRs Done
2,984,158 UART: [art] Lock RT PCRs Done
2,985,556 UART: [art] Populate DV Done
2,993,787 UART: [fht] FMC Alias Private Key: 7
2,994,969 UART: [art] Derive CDI
2,995,249 UART: [art] Store in in slot 0x4
3,081,140 UART: [art] Derive Key Pair
3,081,500 UART: [art] Store priv key in slot 0x5
3,094,230 UART: [art] Derive Key Pair - Done
3,109,034 UART: [art] Signing Cert with AUTHO
3,109,514 UART: RITY.KEYID = 7
3,124,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,669 UART: [art] PUB.X = 93587402124A9027A5BCB86AC9EFF2BC18EA7A4F5A7FC0809C4D53A99F44D2975A598F839BB4C06A42C2B2A4203011F2
3,132,442 UART: [art] PUB.Y = 234875357AECFEC4FA9D54EEE4F7DC76E8BB09B02C76AF7BD42A946B3A7FD8C43297296E82ED5047B8EE1C9D80A41515
3,139,405 UART: [art] SIG.R = EB6EA085071925E3F58FC7312651FF5211CFCD78D7C657E214F46153EC7189FA79C421EAC6A4A57F3DD6307300670CBE
3,146,153 UART: [art] SIG.S = 091FA7BFC8995E776041A4ADFCFCFA63A52247877FF0BA2D09F07E61C34717471428A43DD1F1DC1711CF42D79BD83E05
3,169,939 UART: Caliptra RT
3,170,285 UART: [state] CFI Enabled
3,278,019 UART: [rt] RT listening for mailbox commands...
3,278,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,394 UART: [rt]cmd =0x41544d4e, len=14344
3,546,184 >>> mbox cmd response data (8 bytes)
3,546,185 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,948 UART: [rt]cmd =0x41545348, len=116
3,577,903 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,640 ready_for_fw is high
1,060,640 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,790 >>> mbox cmd response: success
2,689,242 UART:
2,689,258 UART: Running Caliptra FMC ...
2,689,666 UART:
2,689,809 UART: [state] CFI Enabled
2,700,410 UART: [fht] FMC Alias Private Key: 7
2,808,127 UART: [art] Extend RT PCRs Done
2,808,555 UART: [art] Lock RT PCRs Done
2,809,531 UART: [art] Populate DV Done
2,817,636 UART: [fht] FMC Alias Private Key: 7
2,818,814 UART: [art] Derive CDI
2,819,094 UART: [art] Store in in slot 0x4
2,904,609 UART: [art] Derive Key Pair
2,904,969 UART: [art] Store priv key in slot 0x5
2,918,305 UART: [art] Derive Key Pair - Done
2,933,238 UART: [art] Signing Cert with AUTHO
2,933,718 UART: RITY.KEYID = 7
2,949,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,039 UART: [art] PUB.X = 6247DFC9B1D648B6D6E63ABF2408AF20B2F04630AA40F0D6E073B6C86C61D92761565586DF56738EDC9BC01F97B0DC97
2,956,814 UART: [art] PUB.Y = 89B8793E10598C0F56E7ADCDDD230E87C0246B275AD5E1A4BE77B053DED0AD1750D495E3FCD0C671443AE284A4BD35B2
2,963,772 UART: [art] SIG.R = FB0764D11139F66E743DF1D82BB461181A68A3A6AC99C24AEF6093C1279BC108EA1A2E57288419E9F025877E508693D8
2,970,534 UART: [art] SIG.S = EDD5B4EF00F5A2278E65A2DD26BD5FD880D001E9AEE4A3972C92DF6563DA3A31B4D8BFB23D1CA08D57DA3B98A250CE85
2,994,708 UART: Caliptra RT
2,995,054 UART: [state] CFI Enabled
3,102,695 UART: [rt] RT listening for mailbox commands...
3,103,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,204 UART: [rt]cmd =0x41544d4e, len=14344
3,371,408 >>> mbox cmd response data (8 bytes)
3,371,409 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,370 UART: [rt]cmd =0x41545348, len=116
3,403,199 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,199,969 UART: [idev] Sha1 KeyId Algorithm
1,208,633 UART: [idev] --
1,209,654 UART: [ldev] ++
1,209,822 UART: [ldev] CDI.KEYID = 6
1,210,186 UART: [ldev] SUBJECT.KEYID = 5
1,210,613 UART: [ldev] AUTHORITY.KEYID = 7
1,211,076 UART: [ldev] FE.KEYID = 1
1,216,348 UART: [ldev] Erasing FE.KEYID = 1
1,243,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,040 UART: [ldev] --
1,282,514 UART: [fwproc] Wait for Commands...
1,283,137 UART: [fwproc] Recv command 0x46574c44
1,283,870 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,508 >>> mbox cmd response: success
2,775,583 UART: [afmc] ++
2,775,751 UART: [afmc] CDI.KEYID = 6
2,776,114 UART: [afmc] SUBJECT.KEYID = 7
2,776,540 UART: [afmc] AUTHORITY.KEYID = 5
2,812,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,522 UART: [afmc] --
2,855,422 UART: [cold-reset] --
2,856,442 UART: [state] Locking Datavault
2,857,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,091 UART: [state] Locking ICCM
2,858,703 UART: [exit] Launching FMC @ 0x40000130
2,864,032 UART:
2,864,048 UART: Running Caliptra FMC ...
2,864,456 UART:
2,864,510 UART: [state] CFI Enabled
2,875,279 UART: [fht] FMC Alias Private Key: 7
2,982,984 UART: [art] Extend RT PCRs Done
2,983,412 UART: [art] Lock RT PCRs Done
2,984,826 UART: [art] Populate DV Done
2,993,025 UART: [fht] FMC Alias Private Key: 7
2,994,119 UART: [art] Derive CDI
2,994,399 UART: [art] Store in in slot 0x4
3,079,526 UART: [art] Derive Key Pair
3,079,886 UART: [art] Store priv key in slot 0x5
3,092,736 UART: [art] Derive Key Pair - Done
3,107,576 UART: [art] Signing Cert with AUTHO
3,108,056 UART: RITY.KEYID = 7
3,122,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,305 UART: [art] PUB.X = DC3D8D5EC02178E28C25BA58B81E8D885AE5D49177E897649D139D5E604D315B6D9D97AC0B22B585DC19272760DB4DB5
3,130,078 UART: [art] PUB.Y = 06170EF6F8310D9B3AF85CF11FBDD6E4ACC7D943EB9DA2106F5E5995354C297069351AD3B5D97B6BC691A35D7041A9D5
3,137,029 UART: [art] SIG.R = 78D8D8DF5F69E0F30F91578FC02BBBE3B73FD0C03E67A12361C89DF6363CCF956FE42AF58D90EFD7B047085B62FB4791
3,143,807 UART: [art] SIG.S = 3A51C7D0F06293973F4081661024D9418070AA3B19FA0E0E9ABDB54E87CA0F597BEB032673BEF77A05542970C9416EB8
3,167,719 UART: Caliptra RT
3,167,973 UART: [state] CFI Enabled
3,276,155 UART: [rt] RT listening for mailbox commands...
3,276,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,638 UART: [rt]cmd =0x41544d4e, len=14344
3,544,816 >>> mbox cmd response data (8 bytes)
3,544,817 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,884 UART: [rt]cmd =0x41545348, len=116
3,576,601 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,748 ready_for_fw is high
1,056,748 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,600 >>> mbox cmd response: success
2,684,298 UART:
2,684,314 UART: Running Caliptra FMC ...
2,684,722 UART:
2,684,776 UART: [state] CFI Enabled
2,694,977 UART: [fht] FMC Alias Private Key: 7
2,803,242 UART: [art] Extend RT PCRs Done
2,803,670 UART: [art] Lock RT PCRs Done
2,805,486 UART: [art] Populate DV Done
2,813,669 UART: [fht] FMC Alias Private Key: 7
2,814,677 UART: [art] Derive CDI
2,814,957 UART: [art] Store in in slot 0x4
2,900,542 UART: [art] Derive Key Pair
2,900,902 UART: [art] Store priv key in slot 0x5
2,913,824 UART: [art] Derive Key Pair - Done
2,928,605 UART: [art] Signing Cert with AUTHO
2,929,085 UART: RITY.KEYID = 7
2,944,499 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,264 UART: [art] PUB.X = 727EDFEE3741BD2F148B66D19002353798228F4AFE1720A0ABBA16B515EC4519C50BEB2A9BC4AEE09AE7DC25C8F2F93A
2,952,046 UART: [art] PUB.Y = 8E6163F41B5370DDDFF96BD9301F1DF53CF7D47398FA5B254F5F652F1AF595053472D6507D8EA29CE578744E62A0D6C9
2,958,999 UART: [art] SIG.R = 28BF1FEF97C7AEDD63CAA6AD643ED8F0811CD1E82C44019043B4DA961547873449C59DE78911C5371FCE7D7C55C641BE
2,965,778 UART: [art] SIG.S = 8D83CA3EFF1C58240206F5A6DBE86061553E49363F6A69B3D55B2F48EEA4A2FB6991B8BB3D791D237DE1BFFB4DFEAECC
2,989,487 UART: Caliptra RT
2,989,741 UART: [state] CFI Enabled
3,096,665 UART: [rt] RT listening for mailbox commands...
3,097,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,998 UART: [rt]cmd =0x41544d4e, len=14344
3,365,232 >>> mbox cmd response data (8 bytes)
3,365,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,118 UART: [rt]cmd =0x41545348, len=116
3,396,717 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 ready_for_fw is high
1,174,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,404 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,799 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,001 >>> mbox cmd response: success
2,775,168 UART: [afmc] ++
2,775,336 UART: [afmc] CDI.KEYID = 6
2,775,699 UART: [afmc] SUBJECT.KEYID = 7
2,776,125 UART: [afmc] AUTHORITY.KEYID = 5
2,811,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,013 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,732 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,551 UART: [afmc] --
2,854,463 UART: [cold-reset] --
2,855,101 UART: [state] Locking Datavault
2,856,146 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,750 UART: [state] Locking ICCM
2,857,204 UART: [exit] Launching FMC @ 0x40000130
2,862,533 UART:
2,862,549 UART: Running Caliptra FMC ...
2,862,957 UART:
2,863,100 UART: [state] CFI Enabled
2,873,521 UART: [fht] FMC Alias Private Key: 7
2,980,972 UART: [art] Extend RT PCRs Done
2,981,400 UART: [art] Lock RT PCRs Done
2,983,014 UART: [art] Populate DV Done
2,991,535 UART: [fht] FMC Alias Private Key: 7
2,992,689 UART: [art] Derive CDI
2,992,969 UART: [art] Store in in slot 0x4
3,078,494 UART: [art] Derive Key Pair
3,078,854 UART: [art] Store priv key in slot 0x5
3,092,732 UART: [art] Derive Key Pair - Done
3,107,565 UART: [art] Signing Cert with AUTHO
3,108,045 UART: RITY.KEYID = 7
3,123,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,018 UART: [art] PUB.X = 58D9D5ADEF03F0A223A0CE660BD1079BE6DFD04CD11EB92475010ED6B9182C228C30DE9DBAA6443EA2224500FC15F7FF
3,130,769 UART: [art] PUB.Y = 9C3F190624A79948AED2C7F100F3A0213E1301F6AA07BA9D044A844EFC5253AE91CD601BEDFCC81349758F84C019EE07
3,137,690 UART: [art] SIG.R = CFE69B4280C5CF19F693BDC8A9D52BDFB168B786BDA4BEA06DE9B16DE9AA00F46BCF5DEB0DB0FDFAFF888988D3FCDF06
3,144,472 UART: [art] SIG.S = EA580A5C856A9F96E5823CAEA4109A9309C99C7A9945FDC69CB8815BBB6BDCB2C1433886BB01E272971D18537CB1156D
3,167,856 UART: Caliptra RT
3,168,202 UART: [state] CFI Enabled
3,275,515 UART: [rt] RT listening for mailbox commands...
3,276,185 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,906 UART: [rt]cmd =0x41544d4e, len=14344
3,543,792 >>> mbox cmd response data (8 bytes)
3,543,793 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,638 UART: [rt]cmd =0x41545348, len=116
3,575,377 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,851 ready_for_fw is high
1,056,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,509 >>> mbox cmd response: success
2,684,899 UART:
2,684,915 UART: Running Caliptra FMC ...
2,685,323 UART:
2,685,466 UART: [state] CFI Enabled
2,695,883 UART: [fht] FMC Alias Private Key: 7
2,803,182 UART: [art] Extend RT PCRs Done
2,803,610 UART: [art] Lock RT PCRs Done
2,805,224 UART: [art] Populate DV Done
2,813,721 UART: [fht] FMC Alias Private Key: 7
2,814,717 UART: [art] Derive CDI
2,814,997 UART: [art] Store in in slot 0x4
2,900,548 UART: [art] Derive Key Pair
2,900,908 UART: [art] Store priv key in slot 0x5
2,914,204 UART: [art] Derive Key Pair - Done
2,928,664 UART: [art] Signing Cert with AUTHO
2,929,144 UART: RITY.KEYID = 7
2,944,462 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,227 UART: [art] PUB.X = D3D59219E60CD374ACE43D24FACC4C37E08CCCEB2AB7EA6B441F905D0AA1883059493BC4960B5873A5F451927E0EB70A
2,951,996 UART: [art] PUB.Y = 7A88ADBABE40DF4CBCA966E83C23B268171A55A1E80BF250506AB779BD02B72814A7AA25BE0FEB7E789E065F031A043D
2,958,944 UART: [art] SIG.R = C8FBDDC7AEF754481B3E9F419BCD21E64A775D0AC6F6E28AA2366116205A7D81EA0ABD2A22ADAA9514A9ACCBEF7EA4AC
2,965,740 UART: [art] SIG.S = 591776AB3351E2D28194D16AFBDDE6783743AFA15BE50B61F44864A41FC109647837D0A490C04BB56C00F24789EAB733
2,988,673 UART: Caliptra RT
2,989,019 UART: [state] CFI Enabled
3,096,353 UART: [rt] RT listening for mailbox commands...
3,097,023 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,720 UART: [rt]cmd =0x41544d4e, len=14344
3,364,610 >>> mbox cmd response data (8 bytes)
3,364,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,560 UART: [rt]cmd =0x41545348, len=116
3,396,557 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,430 UART:
192,810 UART: Running Caliptra ROM ...
193,993 UART:
194,143 UART: [state] CFI Enabled
265,517 UART: [state] LifecycleState = Unprovisioned
267,481 UART: [state] DebugLocked = No
269,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,649 UART: [kat] SHA2-256
444,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,813 UART: [kat] ++
455,368 UART: [kat] sha1
467,085 UART: [kat] SHA2-256
469,815 UART: [kat] SHA2-384
475,515 UART: [kat] SHA2-512-ACC
477,872 UART: [kat] ECC-384
2,766,733 UART: [kat] HMAC-384Kdf
2,779,264 UART: [kat] LMS
3,969,594 UART: [kat] --
3,975,191 UART: [cold-reset] ++
3,977,123 UART: [fht] Storing FHT @ 0x50003400
3,987,740 UART: [idev] ++
3,988,374 UART: [idev] CDI.KEYID = 6
3,989,251 UART: [idev] SUBJECT.KEYID = 7
3,990,486 UART: [idev] UDS.KEYID = 0
3,991,602 ready_for_fw is high
3,991,835 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,357 UART: [idev] Erasing UDS.KEYID = 0
7,328,899 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,495 UART: [idev] --
7,355,759 UART: [ldev] ++
7,356,324 UART: [ldev] CDI.KEYID = 6
7,357,286 UART: [ldev] SUBJECT.KEYID = 5
7,358,494 UART: [ldev] AUTHORITY.KEYID = 7
7,359,774 UART: [ldev] FE.KEYID = 1
7,402,857 UART: [ldev] Erasing FE.KEYID = 1
10,735,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,078 UART: [ldev] --
13,096,051 UART: [fwproc] Waiting for Commands...
13,098,631 UART: [fwproc] Received command 0x46574c44
13,100,811 UART: [fwproc] Received Image of size 114036 bytes
17,153,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,185 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,295,037 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,611,441 >>> mbox cmd response: success
17,615,955 UART: [afmc] ++
17,616,603 UART: [afmc] CDI.KEYID = 6
17,617,485 UART: [afmc] SUBJECT.KEYID = 7
17,618,746 UART: [afmc] AUTHORITY.KEYID = 5
20,985,090 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,027 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,463 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,275 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,715 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,988 UART: [afmc] --
23,356,272 UART: [cold-reset] --
23,359,046 UART: [state] Locking Datavault
23,363,912 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,667 UART: [state] Locking ICCM
23,367,957 UART: [exit] Launching FMC @ 0x40000130
23,376,348 UART:
23,376,587 UART: Running Caliptra FMC ...
23,377,684 UART:
23,377,834 UART: [state] CFI Enabled
23,444,727 UART: [fht] FMC Alias Private Key: 7
25,782,930 UART: [art] Extend RT PCRs Done
25,784,150 UART: [art] Lock RT PCRs Done
25,785,742 UART: [art] Populate DV Done
25,791,200 UART: [fht] FMC Alias Private Key: 7
25,792,832 UART: [art] Derive CDI
25,793,559 UART: [art] Store in in slot 0x4
25,853,137 UART: [art] Derive Key Pair
25,854,175 UART: [art] Store priv key in slot 0x5
29,146,976 UART: [art] Derive Key Pair - Done
29,159,758 UART: [art] Signing Cert with AUTHO
29,161,082 UART: RITY.KEYID = 7
31,449,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,804 UART: [art] PUB.X = 83C41F7F5F2AA5D0A4846FB3459DD453E0D3EF8F37D9012B45815E999B7411AA1908CCC1DCBD3D2856FA48ED90B876E9
31,458,076 UART: [art] PUB.Y = A3FC788270D794D1A8640CB8474846CE17F940804B8B8BD6D46BA64B42C4E0B3FD3F29B7264387C48726756E482DCC35
31,465,281 UART: [art] SIG.R = 47D7B98A929DBBC5275360BF72FB3698936785D8C5BA4850111E2CDA97C4DD800673C20519192080A2C3EC53E4FB7DCE
31,472,638 UART: [art] SIG.S = 714AB3A12FD767E0453A6EA0B3077FF506C59F9C799776C58F0BB6207268E0DDFEB86C28E0282A30214BF59381A333F4
32,777,935 UART: Caliptra RT
32,778,647 UART: [state] CFI Enabled
32,939,987 UART: [rt] RT listening for mailbox commands...
36,978,135 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,133,877 UART: [rt]cmd =0x41544d4e, len=14344
42,369,982 >>> mbox cmd response data (8 bytes)
42,370,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,401,190 UART: [rt]cmd =0x41545348, len=116
42,421,066 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,289 UART:
192,642 UART: Running Caliptra ROM ...
193,813 UART:
193,962 UART: [state] CFI Enabled
262,563 UART: [state] LifecycleState = Unprovisioned
264,463 UART: [state] DebugLocked = No
267,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,806 UART: [kat] SHA2-256
441,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,988 UART: [kat] ++
452,504 UART: [kat] sha1
463,156 UART: [kat] SHA2-256
465,877 UART: [kat] SHA2-384
472,099 UART: [kat] SHA2-512-ACC
474,439 UART: [kat] ECC-384
2,765,569 UART: [kat] HMAC-384Kdf
2,776,317 UART: [kat] LMS
3,966,660 UART: [kat] --
3,970,487 UART: [cold-reset] ++
3,972,134 UART: [fht] Storing FHT @ 0x50003400
3,982,467 UART: [idev] ++
3,983,025 UART: [idev] CDI.KEYID = 6
3,984,003 UART: [idev] SUBJECT.KEYID = 7
3,985,269 UART: [idev] UDS.KEYID = 0
3,986,286 ready_for_fw is high
3,986,488 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,129,918 UART: [idev] Erasing UDS.KEYID = 0
7,324,135 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,603 UART: [idev] --
7,350,546 UART: [ldev] ++
7,351,109 UART: [ldev] CDI.KEYID = 6
7,352,194 UART: [ldev] SUBJECT.KEYID = 5
7,353,313 UART: [ldev] AUTHORITY.KEYID = 7
7,354,550 UART: [ldev] FE.KEYID = 1
7,401,277 UART: [ldev] Erasing FE.KEYID = 1
10,732,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,887 UART: [ldev] --
13,094,497 UART: [fwproc] Waiting for Commands...
13,097,177 UART: [fwproc] Received command 0x46574c44
13,099,352 UART: [fwproc] Received Image of size 114036 bytes
17,155,780 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,623,402 >>> mbox cmd response: success
17,628,043 UART: [afmc] ++
17,628,705 UART: [afmc] CDI.KEYID = 6
17,629,596 UART: [afmc] SUBJECT.KEYID = 7
17,630,834 UART: [afmc] AUTHORITY.KEYID = 5
21,008,329 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,417 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,821 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,690 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,212 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,622 UART: [afmc] --
23,377,319 UART: [cold-reset] --
23,383,058 UART: [state] Locking Datavault
23,387,708 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,454 UART: [state] Locking ICCM
23,391,899 UART: [exit] Launching FMC @ 0x40000130
23,400,284 UART:
23,400,513 UART: Running Caliptra FMC ...
23,401,541 UART:
23,401,701 UART: [state] CFI Enabled
23,463,828 UART: [fht] FMC Alias Private Key: 7
25,801,929 UART: [art] Extend RT PCRs Done
25,803,145 UART: [art] Lock RT PCRs Done
25,804,903 UART: [art] Populate DV Done
25,810,366 UART: [fht] FMC Alias Private Key: 7
25,812,001 UART: [art] Derive CDI
25,812,736 UART: [art] Store in in slot 0x4
25,871,879 UART: [art] Derive Key Pair
25,872,916 UART: [art] Store priv key in slot 0x5
29,165,438 UART: [art] Derive Key Pair - Done
29,177,953 UART: [art] Signing Cert with AUTHO
29,179,252 UART: RITY.KEYID = 7
31,466,596 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,104 UART: [art] PUB.X = 3318F76EF95A41106CA33EC967FF7FDC244A64E67FC8E63C0E3DC5E070C1A59BEFD9676C916391162B5C2D9495D4559E
31,475,375 UART: [art] PUB.Y = 98BC8248228F6E68676F6909E273F0A97D9CB5F012C2A376638A81EEAC3828433F7797EAEA351C6582264A05C570C7F1
31,482,592 UART: [art] SIG.R = 142A5ABCFA9402FB1879BBF6E6E58CD86B298FF82A4687E276DC8273B906A9D82AF25F5C55D30ED6B5F525F1C17F2C17
31,490,008 UART: [art] SIG.S = 9212CA6D9F933C67760AA7630E48F17548653F4EB63D2888DF974D59DACBF0070B39D25A5929B5A2A17FCD11B7F5C4D6
32,795,053 UART: Caliptra RT
32,795,741 UART: [state] CFI Enabled
32,957,310 UART: [rt] RT listening for mailbox commands...
32,959,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,115,121 UART: [rt]cmd =0x41544d4e, len=14344
38,351,035 >>> mbox cmd response data (8 bytes)
38,351,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,382,197 UART: [rt]cmd =0x41545348, len=116
38,384,341 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,800,667 ready_for_fw is high
3,801,032 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,871,944 >>> mbox cmd response: success
23,564,840 UART:
23,565,245 UART: Running Caliptra FMC ...
23,566,353 UART:
23,566,497 UART: [state] CFI Enabled
23,635,308 UART: [fht] FMC Alias Private Key: 7
25,973,897 UART: [art] Extend RT PCRs Done
25,975,138 UART: [art] Lock RT PCRs Done
25,976,518 UART: [art] Populate DV Done
25,982,159 UART: [fht] FMC Alias Private Key: 7
25,983,785 UART: [art] Derive CDI
25,984,522 UART: [art] Store in in slot 0x4
26,044,751 UART: [art] Derive Key Pair
26,045,752 UART: [art] Store priv key in slot 0x5
29,338,906 UART: [art] Derive Key Pair - Done
29,351,835 UART: [art] Signing Cert with AUTHO
29,353,149 UART: RITY.KEYID = 7
31,640,585 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,091 UART: [art] PUB.X = 220B04309E39589EA700831E9E4CA5D6238458839C7DC0E55016E68772CAB3775F43A81B4E9204636D156154DCD2D3C3
31,649,320 UART: [art] PUB.Y = 7732A25A5B5D5756124802B0ED1AE12140A699CBE55AA2C6E4C11921970A016C08EA0A5DC590744F9CB49BF43A3D8B48
31,656,576 UART: [art] SIG.R = 9874E15FE68DB7C33593D7EA39372F2B2D328FBC92D5CC3EDF393B77859E699FA80F51C52F210976460B67384FE622B3
31,663,974 UART: [art] SIG.S = DF2B46567D2757206EE3565DA9220470FF4D13EFC372998067AE49831EA9C8F0575439F8F4BA2D4EF2CF1B7A1FAC266A
32,969,530 UART: Caliptra RT
32,970,265 UART: [state] CFI Enabled
33,132,081 UART: [rt] RT listening for mailbox commands...
37,170,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,326,407 UART: [rt]cmd =0x41544d4e, len=14344
42,562,418 >>> mbox cmd response data (8 bytes)
42,562,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,593,766 UART: [rt]cmd =0x41545348, len=116
42,613,524 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,925 writing to cptra_bootfsm_go
3,805,329 ready_for_fw is high
3,805,699 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,890,931 >>> mbox cmd response: success
23,585,953 UART:
23,586,361 UART: Running Caliptra FMC ...
23,587,456 UART:
23,587,603 UART: [state] CFI Enabled
23,657,431 UART: [fht] FMC Alias Private Key: 7
25,995,135 UART: [art] Extend RT PCRs Done
25,996,358 UART: [art] Lock RT PCRs Done
25,998,078 UART: [art] Populate DV Done
26,003,594 UART: [fht] FMC Alias Private Key: 7
26,005,231 UART: [art] Derive CDI
26,005,987 UART: [art] Store in in slot 0x4
26,065,895 UART: [art] Derive Key Pair
26,066,896 UART: [art] Store priv key in slot 0x5
29,359,924 UART: [art] Derive Key Pair - Done
29,373,001 UART: [art] Signing Cert with AUTHO
29,374,345 UART: RITY.KEYID = 7
31,662,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,981 UART: [art] PUB.X = 2F7CBEF93677D50C64D9E96B5A495E0F91F44ED4E599F9366723C55B334A3E36B18BCFA5B7B2A03B3028CAE6FCB8A2DE
31,671,258 UART: [art] PUB.Y = EFCB4507D496B6222F7113DE36D2407065038F0566F42E435B8868D61F5DB577263F79B502BBB6018C621D641C62A816
31,678,438 UART: [art] SIG.R = FA67008A891422BB20DFFFCC7304C2B0A58234821110C62B50555C317E9F34ADA4F70BD7144C6F6B8B20B3FD1CFDA7E7
31,685,840 UART: [art] SIG.S = DEDF7A6B1721D6D181AAFBBF06944F7E0205295277803541B8A33BDF2D8BA82F67CAD8FF39D8EE70CB63BBFD04D8FC9E
32,991,303 UART: Caliptra RT
32,991,993 UART: [state] CFI Enabled
33,151,984 UART: [rt] RT listening for mailbox commands...
33,154,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,309,963 UART: [rt]cmd =0x41544d4e, len=14344
38,545,712 >>> mbox cmd response data (8 bytes)
38,546,279 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,576,968 UART: [rt]cmd =0x41545348, len=116
38,579,363 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
193,649 UART:
193,999 UART: Running Caliptra ROM ...
195,196 UART:
605,025 UART: [state] CFI Enabled
619,534 UART: [state] LifecycleState = Unprovisioned
621,474 UART: [state] DebugLocked = No
623,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,930 UART: [kat] SHA2-256
798,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,284 UART: [kat] ++
809,821 UART: [kat] sha1
821,982 UART: [kat] SHA2-256
824,632 UART: [kat] SHA2-384
831,397 UART: [kat] SHA2-512-ACC
833,779 UART: [kat] ECC-384
3,117,267 UART: [kat] HMAC-384Kdf
3,128,800 UART: [kat] LMS
4,318,963 UART: [kat] --
4,321,554 UART: [cold-reset] ++
4,322,638 UART: [fht] Storing FHT @ 0x50003400
4,334,809 UART: [idev] ++
4,335,394 UART: [idev] CDI.KEYID = 6
4,336,430 UART: [idev] SUBJECT.KEYID = 7
4,337,605 UART: [idev] UDS.KEYID = 0
4,338,638 ready_for_fw is high
4,338,848 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,289 UART: [idev] Erasing UDS.KEYID = 0
7,626,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,512 UART: [idev] --
7,652,748 UART: [ldev] ++
7,653,391 UART: [ldev] CDI.KEYID = 6
7,654,305 UART: [ldev] SUBJECT.KEYID = 5
7,655,513 UART: [ldev] AUTHORITY.KEYID = 7
7,656,795 UART: [ldev] FE.KEYID = 1
7,669,760 UART: [ldev] Erasing FE.KEYID = 1
10,959,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,459 UART: [ldev] --
13,319,883 UART: [fwproc] Waiting for Commands...
13,322,840 UART: [fwproc] Received command 0x46574c44
13,325,073 UART: [fwproc] Received Image of size 114036 bytes
17,378,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,905 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,838,196 >>> mbox cmd response: success
17,842,496 UART: [afmc] ++
17,843,092 UART: [afmc] CDI.KEYID = 6
17,844,199 UART: [afmc] SUBJECT.KEYID = 7
17,845,256 UART: [afmc] AUTHORITY.KEYID = 5
21,158,515 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,144 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,452 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,791 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,651 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,072 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,264 UART: [afmc] --
23,523,537 UART: [cold-reset] --
23,527,545 UART: [state] Locking Datavault
23,532,855 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,635 UART: [state] Locking ICCM
23,536,134 UART: [exit] Launching FMC @ 0x40000130
23,544,528 UART:
23,544,770 UART: Running Caliptra FMC ...
23,545,872 UART:
23,546,034 UART: [state] CFI Enabled
23,553,756 UART: [fht] FMC Alias Private Key: 7
25,884,417 UART: [art] Extend RT PCRs Done
25,885,633 UART: [art] Lock RT PCRs Done
25,887,552 UART: [art] Populate DV Done
25,893,013 UART: [fht] FMC Alias Private Key: 7
25,894,659 UART: [art] Derive CDI
25,895,395 UART: [art] Store in in slot 0x4
25,937,823 UART: [art] Derive Key Pair
25,938,863 UART: [art] Store priv key in slot 0x5
29,181,705 UART: [art] Derive Key Pair - Done
29,194,728 UART: [art] Signing Cert with AUTHO
29,196,029 UART: RITY.KEYID = 7
31,475,223 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,721 UART: [art] PUB.X = 144A70A61A243594ED57F31D15100D7F54578886D422A1608EFA7EAE71BAD6B777D9CAD2ACDFDD4620468341AD4D55AD
31,483,924 UART: [art] PUB.Y = 9AC0696D3C4D1364ED5F33F7BA898D383442137650D740115E4DE5B04867F3F0E632A178E13796322A36381FBDCDA0CC
31,491,167 UART: [art] SIG.R = F171B27A200EA03798CC19A03378E58010BE78FCE433970E62FC74A1BED87DD6A24C6D6B51D8DEE1A455CF22A53D70E5
31,498,567 UART: [art] SIG.S = 5F7EE73A69A072A8662BE2A7F5939D3432929BEFB64C7A874B33B462382CC125DFA0A8E508CAA0CCA62A459E411BEA69
32,803,398 UART: Caliptra RT
32,804,208 UART: [state] CFI Enabled
32,921,699 UART: [rt] RT listening for mailbox commands...
36,946,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,102,359 UART: [rt]cmd =0x41544d4e, len=14344
42,337,455 >>> mbox cmd response data (8 bytes)
42,338,059 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,368,654 UART: [rt]cmd =0x41545348, len=116
42,387,926 >>> mbox cmd response data (12 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,505 UART:
192,876 UART: Running Caliptra ROM ...
193,996 UART:
603,561 UART: [state] CFI Enabled
618,316 UART: [state] LifecycleState = Unprovisioned
620,250 UART: [state] DebugLocked = No
622,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,142 UART: [kat] SHA2-256
796,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,451 UART: [kat] ++
807,897 UART: [kat] sha1
818,201 UART: [kat] SHA2-256
820,910 UART: [kat] SHA2-384
826,059 UART: [kat] SHA2-512-ACC
828,432 UART: [kat] ECC-384
3,114,405 UART: [kat] HMAC-384Kdf
3,126,846 UART: [kat] LMS
4,317,007 UART: [kat] --
4,320,960 UART: [cold-reset] ++
4,322,749 UART: [fht] Storing FHT @ 0x50003400
4,335,287 UART: [idev] ++
4,335,857 UART: [idev] CDI.KEYID = 6
4,336,830 UART: [idev] SUBJECT.KEYID = 7
4,338,073 UART: [idev] UDS.KEYID = 0
4,339,252 ready_for_fw is high
4,339,455 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,517 UART: [idev] Erasing UDS.KEYID = 0
7,629,697 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,719 UART: [idev] --
7,656,034 UART: [ldev] ++
7,656,604 UART: [ldev] CDI.KEYID = 6
7,657,538 UART: [ldev] SUBJECT.KEYID = 5
7,658,800 UART: [ldev] AUTHORITY.KEYID = 7
7,659,953 UART: [ldev] FE.KEYID = 1
7,671,754 UART: [ldev] Erasing FE.KEYID = 1
10,957,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,317 UART: [ldev] --
13,317,557 UART: [fwproc] Waiting for Commands...
13,319,645 UART: [fwproc] Received command 0x46574c44
13,321,879 UART: [fwproc] Received Image of size 114036 bytes
17,374,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,853 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,836,303 >>> mbox cmd response: success
17,840,599 UART: [afmc] ++
17,841,262 UART: [afmc] CDI.KEYID = 6
17,842,176 UART: [afmc] SUBJECT.KEYID = 7
17,843,227 UART: [afmc] AUTHORITY.KEYID = 5
21,160,291 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,541 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,948 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,776 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,185 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,121 UART: [afmc] --
23,525,471 UART: [cold-reset] --
23,527,551 UART: [state] Locking Datavault
23,532,853 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,604 UART: [state] Locking ICCM
23,537,127 UART: [exit] Launching FMC @ 0x40000130
23,545,474 UART:
23,545,729 UART: Running Caliptra FMC ...
23,546,787 UART:
23,546,937 UART: [state] CFI Enabled
23,555,419 UART: [fht] FMC Alias Private Key: 7
25,886,181 UART: [art] Extend RT PCRs Done
25,887,396 UART: [art] Lock RT PCRs Done
25,889,202 UART: [art] Populate DV Done
25,894,503 UART: [fht] FMC Alias Private Key: 7
25,895,994 UART: [art] Derive CDI
25,896,725 UART: [art] Store in in slot 0x4
25,939,647 UART: [art] Derive Key Pair
25,940,679 UART: [art] Store priv key in slot 0x5
29,182,466 UART: [art] Derive Key Pair - Done
29,195,571 UART: [art] Signing Cert with AUTHO
29,196,883 UART: RITY.KEYID = 7
31,476,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,759 UART: [art] PUB.X = CAB77361339057DCFD9258E6CC9607696DC46399F60C64304BEBD32295BCD6C3CE67B29780830800A1A428A3A5BF37CD
31,484,991 UART: [art] PUB.Y = D89A10FD91FF952143220E32B63E25D3ECAAB91CCF411FF264C78EB384B37DCAA2379261A4BE20E2BDD3B17FE219A5DB
31,492,298 UART: [art] SIG.R = EA8B5EBB384B7253815AD3AAFB4A00CDA3BEBDFF4B443B5A8C67524741AE29E198596E0D9945E01FA294A3F47B305D24
31,499,643 UART: [art] SIG.S = 9AF0EC1B45860CD6D82719A7123863856E67BF842567E1BE0C645CEC22A581088EE3CB80FA9141633B22D2E1C386683A
32,804,900 UART: Caliptra RT
32,805,612 UART: [state] CFI Enabled
32,923,507 UART: [rt] RT listening for mailbox commands...
32,925,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,081,226 UART: [rt]cmd =0x41544d4e, len=14344
38,317,222 >>> mbox cmd response data (8 bytes)
38,317,803 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,348,644 UART: [rt]cmd =0x41545348, len=116
38,351,259 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
4,124,323 ready_for_fw is high
4,124,846 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,748 >>> mbox cmd response: success
23,714,344 UART:
23,714,797 UART: Running Caliptra FMC ...
23,715,913 UART:
23,716,072 UART: [state] CFI Enabled
23,724,151 UART: [fht] FMC Alias Private Key: 7
26,055,346 UART: [art] Extend RT PCRs Done
26,056,579 UART: [art] Lock RT PCRs Done
26,058,564 UART: [art] Populate DV Done
26,064,068 UART: [fht] FMC Alias Private Key: 7
26,065,763 UART: [art] Derive CDI
26,066,530 UART: [art] Store in in slot 0x4
26,109,250 UART: [art] Derive Key Pair
26,110,249 UART: [art] Store priv key in slot 0x5
29,352,586 UART: [art] Derive Key Pair - Done
29,365,371 UART: [art] Signing Cert with AUTHO
29,366,683 UART: RITY.KEYID = 7
31,646,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,572 UART: [art] PUB.X = DA397D68745643AD36A7D58F7CC40EDFAB1748958361581E4BE275DD3199C34CEDB9D42F4CB5269B48248E1477144964
31,654,790 UART: [art] PUB.Y = 6339F1D2A9E41F8749558BC028D1D810B12D8411CB3E7FC0C5A9AF7FA10A624A0DAE20D57E5EDF71E940E58BE2CF97A4
31,662,286 UART: [art] SIG.R = 0C0B9595FF43142679A68D5AD2336BBDC0C08A08F5692D6373F3E0D0FED1598CC3F8FAD8732AB98E87D025C7C5AB786E
31,669,458 UART: [art] SIG.S = 55DEF789D1C0A7565FB76D1AA7E8D1F2B92DD2D16D2C4350B09D32BDBE4AFB7311BCAB8FC1416961220BB92E470D2FBC
32,974,637 UART: Caliptra RT
32,975,345 UART: [state] CFI Enabled
33,093,272 UART: [rt] RT listening for mailbox commands...
37,121,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,276,653 UART: [rt]cmd =0x41544d4e, len=14344
42,512,074 >>> mbox cmd response data (8 bytes)
42,512,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,543,320 UART: [rt]cmd =0x41545348, len=116
42,563,225 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,124,732 ready_for_fw is high
4,125,501 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,201 >>> mbox cmd response: success
23,706,020 UART:
23,706,473 UART: Running Caliptra FMC ...
23,707,597 UART:
23,707,764 UART: [state] CFI Enabled
23,715,833 UART: [fht] FMC Alias Private Key: 7
26,045,815 UART: [art] Extend RT PCRs Done
26,047,039 UART: [art] Lock RT PCRs Done
26,048,790 UART: [art] Populate DV Done
26,054,201 UART: [fht] FMC Alias Private Key: 7
26,055,810 UART: [art] Derive CDI
26,056,587 UART: [art] Store in in slot 0x4
26,099,165 UART: [art] Derive Key Pair
26,100,218 UART: [art] Store priv key in slot 0x5
29,341,975 UART: [art] Derive Key Pair - Done
29,354,983 UART: [art] Signing Cert with AUTHO
29,356,317 UART: RITY.KEYID = 7
31,635,858 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,366 UART: [art] PUB.X = 64D718B7838C5DFF697E58C979DFC547B96D5CE6B0C44903C93DAE8084EB5153F97AD8FFDF02BB3FD3935E4131DEEFEA
31,644,636 UART: [art] PUB.Y = 5A201BA82068F0B8FB7DFDEEE7F9C25DFA1CB86316296DC94D021485B93AE735809B8A5FBC496683D1025B8BE3FEB712
31,651,868 UART: [art] SIG.R = 03A947632092FB8111D54145D882D8DA73BA6F19B901B2818E2A5993F41E97BF4F0A822AFE26D1F4985EC47F3306A896
31,659,232 UART: [art] SIG.S = 4B276017F2A77D5DB68C9C7C38CDF8B2D36164AEFEFE6AD29E66E9B33D5F56EEC1EEC5A75286847549DB59AFA7E64C2C
32,964,795 UART: Caliptra RT
32,965,489 UART: [state] CFI Enabled
33,082,604 UART: [rt] RT listening for mailbox commands...
33,085,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,240,123 UART: [rt]cmd =0x41544d4e, len=14344
38,475,613 >>> mbox cmd response data (8 bytes)
38,476,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,506,872 UART: [rt]cmd =0x41545348, len=116
38,509,344 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,515 UART:
192,886 UART: Running Caliptra ROM ...
194,226 UART:
194,380 UART: [state] CFI Enabled
266,100 UART: [state] LifecycleState = Unprovisioned
267,981 UART: [state] DebugLocked = No
269,933 UART: [state] WD Timer not started. Device not locked for debugging
274,070 UART: [kat] SHA2-256
453,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,799 UART: [kat] ++
465,361 UART: [kat] sha1
476,247 UART: [kat] SHA2-256
479,256 UART: [kat] SHA2-384
485,674 UART: [kat] SHA2-512-ACC
488,611 UART: [kat] ECC-384
2,949,236 UART: [kat] HMAC-384Kdf
2,972,549 UART: [kat] LMS
3,502,037 UART: [kat] --
3,505,559 UART: [cold-reset] ++
3,506,499 UART: [fht] FHT @ 0x50003400
3,517,184 UART: [idev] ++
3,517,748 UART: [idev] CDI.KEYID = 6
3,518,702 UART: [idev] SUBJECT.KEYID = 7
3,519,876 UART: [idev] UDS.KEYID = 0
3,520,879 ready_for_fw is high
3,521,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,925 UART: [idev] Erasing UDS.KEYID = 0
6,025,233 UART: [idev] Sha1 KeyId Algorithm
6,049,154 UART: [idev] --
6,052,750 UART: [ldev] ++
6,053,328 UART: [ldev] CDI.KEYID = 6
6,054,213 UART: [ldev] SUBJECT.KEYID = 5
6,055,320 UART: [ldev] AUTHORITY.KEYID = 7
6,056,665 UART: [ldev] FE.KEYID = 1
6,100,822 UART: [ldev] Erasing FE.KEYID = 1
8,603,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,909 UART: [ldev] --
10,392,667 UART: [fwproc] Wait for Commands...
10,394,187 UART: [fwproc] Recv command 0x46574c44
10,396,284 UART: [fwproc] Recv'd Img size: 114360 bytes
13,804,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,266,828 >>> mbox cmd response: success
14,271,699 UART: [afmc] ++
14,272,301 UART: [afmc] CDI.KEYID = 6
14,273,211 UART: [afmc] SUBJECT.KEYID = 7
14,274,464 UART: [afmc] AUTHORITY.KEYID = 5
16,810,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,262 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,300 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,113 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,830 UART: [afmc] --
18,610,190 UART: [cold-reset] --
18,614,812 UART: [state] Locking Datavault
18,618,927 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,571 UART: [state] Locking ICCM
18,622,368 UART: [exit] Launching FMC @ 0x40000130
18,630,815 UART:
18,631,054 UART: Running Caliptra FMC ...
18,632,093 UART:
18,632,241 UART: [state] CFI Enabled
18,693,466 UART: [fht] FMC Alias Private Key: 7
20,456,718 UART: [art] Extend RT PCRs Done
20,457,947 UART: [art] Lock RT PCRs Done
20,459,706 UART: [art] Populate DV Done
20,465,169 UART: [fht] FMC Alias Private Key: 7
20,466,653 UART: [art] Derive CDI
20,467,436 UART: [art] Store in in slot 0x4
20,525,779 UART: [art] Derive Key Pair
20,526,822 UART: [art] Store priv key in slot 0x5
22,991,456 UART: [art] Derive Key Pair - Done
23,004,330 UART: [art] Signing Cert with AUTHO
23,005,667 UART: RITY.KEYID = 7
24,716,772 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,273 UART: [art] PUB.X = 7905E01960D081BD2B269E218EFB4972812B372A08EC834B349F681640E6EBA7105D0B8B77877914F0885D2DF9F28545
24,725,541 UART: [art] PUB.Y = 77AA048264D73619669D689D37A61E2472DC72D716A95F9792665CD02D1A429EF2DF4DA4527AF60432470D502B90ED26
24,732,750 UART: [art] SIG.R = BC4426590953DC66BD85F64C05305C74E2B89349E17DF945F1CA80627A3C3EE454D28D1D3C3DB964DA7B7665F6C09DF0
24,740,164 UART: [art] SIG.S = 4E189F9C3BC9CCF2B7CC8F276A5E6535F316FD485924F25F36155AC476319EBE6AFE9FAC3CF3272336D140C4C38C6C44
25,719,625 UART: Caliptra RT
25,720,322 UART: [state] CFI Enabled
25,884,738 UART: [rt] RT listening for mailbox commands...
29,915,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,071,100 UART: [rt]cmd =0x41544d4e, len=14344
34,001,135 >>> mbox cmd response data (8 bytes)
34,001,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,032,627 UART: [rt]cmd =0x41545348, len=116
34,052,429 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,051 UART:
192,407 UART: Running Caliptra ROM ...
193,497 UART:
193,638 UART: [state] CFI Enabled
265,133 UART: [state] LifecycleState = Unprovisioned
267,047 UART: [state] DebugLocked = No
269,572 UART: [state] WD Timer not started. Device not locked for debugging
273,667 UART: [kat] SHA2-256
452,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,323 UART: [kat] ++
464,778 UART: [kat] sha1
474,815 UART: [kat] SHA2-256
477,906 UART: [kat] SHA2-384
484,550 UART: [kat] SHA2-512-ACC
487,488 UART: [kat] ECC-384
2,947,842 UART: [kat] HMAC-384Kdf
2,971,789 UART: [kat] LMS
3,501,267 UART: [kat] --
3,505,330 UART: [cold-reset] ++
3,507,757 UART: [fht] FHT @ 0x50003400
3,517,603 UART: [idev] ++
3,518,170 UART: [idev] CDI.KEYID = 6
3,519,203 UART: [idev] SUBJECT.KEYID = 7
3,520,310 UART: [idev] UDS.KEYID = 0
3,521,247 ready_for_fw is high
3,521,440 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,278 UART: [idev] Erasing UDS.KEYID = 0
6,044,987 UART: [idev] Sha1 KeyId Algorithm
6,067,899 UART: [idev] --
6,071,408 UART: [ldev] ++
6,071,982 UART: [ldev] CDI.KEYID = 6
6,072,896 UART: [ldev] SUBJECT.KEYID = 5
6,074,113 UART: [ldev] AUTHORITY.KEYID = 7
6,075,264 UART: [ldev] FE.KEYID = 1
6,114,552 UART: [ldev] Erasing FE.KEYID = 1
8,616,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,416,244 UART: [ldev] --
10,420,320 UART: [fwproc] Wait for Commands...
10,423,281 UART: [fwproc] Recv command 0x46574c44
10,425,390 UART: [fwproc] Recv'd Img size: 114360 bytes
13,826,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,288,921 >>> mbox cmd response: success
14,293,153 UART: [afmc] ++
14,293,807 UART: [afmc] CDI.KEYID = 6
14,294,725 UART: [afmc] SUBJECT.KEYID = 7
14,295,831 UART: [afmc] AUTHORITY.KEYID = 5
16,829,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,205 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,207 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,344 UART: [afmc] --
18,630,110 UART: [cold-reset] --
18,635,374 UART: [state] Locking Datavault
18,640,459 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,166 UART: [state] Locking ICCM
18,644,911 UART: [exit] Launching FMC @ 0x40000130
18,653,306 UART:
18,653,543 UART: Running Caliptra FMC ...
18,654,648 UART:
18,654,804 UART: [state] CFI Enabled
18,712,632 UART: [fht] FMC Alias Private Key: 7
20,476,870 UART: [art] Extend RT PCRs Done
20,478,103 UART: [art] Lock RT PCRs Done
20,479,804 UART: [art] Populate DV Done
20,485,329 UART: [fht] FMC Alias Private Key: 7
20,487,039 UART: [art] Derive CDI
20,487,780 UART: [art] Store in in slot 0x4
20,545,906 UART: [art] Derive Key Pair
20,546,987 UART: [art] Store priv key in slot 0x5
23,009,758 UART: [art] Derive Key Pair - Done
23,022,755 UART: [art] Signing Cert with AUTHO
23,024,067 UART: RITY.KEYID = 7
24,735,312 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,826 UART: [art] PUB.X = 7BCC087935474E2B7BCC0E745910815ADE792731A51E90D4CB987C1E1C815C3EECB23F3FFCBEBFE72E66F1A911C63518
24,744,102 UART: [art] PUB.Y = DDF5CEE202DB7E8D8FD2FF6CD494E05D177CDC51E6B6D3EC371DD31DBDD602FD1AF9484F4C9F9E7782C93347E449F929
24,751,368 UART: [art] SIG.R = 57A3DCA208A63A0348F027E1E519A847E2F68C40AB43BAE49930F9EB4D796BB669663487E0C4B1442B3A3D8F6855327C
24,758,935 UART: [art] SIG.S = 3AE1D0FED2AC22A8DE83EC99CDE26018AC4AC4A44F17C5B2F8D8A8804984ECFAD58D11CB77E99836EF7739837F1EFFE8
25,737,671 UART: Caliptra RT
25,738,379 UART: [state] CFI Enabled
25,903,108 UART: [rt] RT listening for mailbox commands...
25,905,517 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,060,868 UART: [rt]cmd =0x41544d4e, len=14344
29,990,841 >>> mbox cmd response data (8 bytes)
29,991,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,022,298 UART: [rt]cmd =0x41545348, len=116
30,024,834 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,509 UART:
192,881 UART: Running Caliptra ROM ...
194,076 UART:
194,240 UART: [state] CFI Enabled
266,190 UART: [state] LifecycleState = Unprovisioned
268,588 UART: [state] DebugLocked = No
270,262 UART: [state] WD Timer not started. Device not locked for debugging
274,221 UART: [kat] SHA2-256
464,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,881 UART: [kat] ++
475,334 UART: [kat] sha1
487,610 UART: [kat] SHA2-256
490,690 UART: [kat] SHA2-384
497,963 UART: [kat] SHA2-512-ACC
500,541 UART: [kat] ECC-384
2,947,691 UART: [kat] HMAC-384Kdf
2,971,105 UART: [kat] LMS
3,502,850 UART: [kat] --
3,507,767 UART: [cold-reset] ++
3,508,987 UART: [fht] FHT @ 0x50003400
3,520,885 UART: [idev] ++
3,521,587 UART: [idev] CDI.KEYID = 6
3,522,618 UART: [idev] SUBJECT.KEYID = 7
3,523,727 UART: [idev] UDS.KEYID = 0
3,524,657 ready_for_fw is high
3,524,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,093 UART: [idev] Erasing UDS.KEYID = 0
6,025,870 UART: [idev] Sha1 KeyId Algorithm
6,048,294 UART: [idev] --
6,053,264 UART: [ldev] ++
6,053,948 UART: [ldev] CDI.KEYID = 6
6,054,860 UART: [ldev] SUBJECT.KEYID = 5
6,056,034 UART: [ldev] AUTHORITY.KEYID = 7
6,057,811 UART: [ldev] FE.KEYID = 1
6,098,941 UART: [ldev] Erasing FE.KEYID = 1
8,603,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,177 UART: [ldev] --
10,414,935 UART: [fwproc] Wait for Commands...
10,416,754 UART: [fwproc] Recv command 0x46574c44
10,419,005 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,597,897 >>> mbox cmd response: success
14,601,230 UART: [afmc] ++
14,601,953 UART: [afmc] CDI.KEYID = 6
14,603,199 UART: [afmc] SUBJECT.KEYID = 7
14,604,637 UART: [afmc] AUTHORITY.KEYID = 5
17,148,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,600 UART: [afmc] --
18,945,427 UART: [cold-reset] --
18,948,771 UART: [state] Locking Datavault
18,955,059 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,271 UART: [state] Locking ICCM
18,960,288 UART: [exit] Launching FMC @ 0x40000130
18,968,987 UART:
18,969,232 UART: Running Caliptra FMC ...
18,970,334 UART:
18,970,494 UART: [state] CFI Enabled
19,029,446 UART: [fht] FMC Alias Private Key: 7
20,792,469 UART: [art] Extend RT PCRs Done
20,793,698 UART: [art] Lock RT PCRs Done
20,795,406 UART: [art] Populate DV Done
20,800,924 UART: [fht] FMC Alias Private Key: 7
20,802,569 UART: [art] Derive CDI
20,803,385 UART: [art] Store in in slot 0x4
20,862,052 UART: [art] Derive Key Pair
20,863,091 UART: [art] Store priv key in slot 0x5
23,326,702 UART: [art] Derive Key Pair - Done
23,340,289 UART: [art] Signing Cert with AUTHO
23,341,619 UART: RITY.KEYID = 7
25,051,630 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,140 UART: [art] PUB.X = 9F1A2DEC3D202ADC42DCBF72FF883FB361348785FD4FEFDB437C05EDFA37776DB6C8FDAB3DF7546B86E09A2229638324
25,060,422 UART: [art] PUB.Y = C66025A62A81D27AECACED589612FEA747EC07292575912304922C0C29BD79F8619C9F228EFB35428B98387978FDCA17
25,067,689 UART: [art] SIG.R = 46CBBC9B7D6BC54705C83C5745B4343FB71C74B764B0AA196DE12B151EA5A68177E2F0A55D6A8B51B5A77ADAE22F3AD1
25,075,058 UART: [art] SIG.S = BAA1C7F11CB8312D82A1C26428E25600ACA5C786DEEE692DEF4A56DAA61F9A1900F9168E387AEEAF618338766B12A269
26,054,243 UART: Caliptra RT
26,054,933 UART: [state] CFI Enabled
26,219,898 UART: [rt] RT listening for mailbox commands...
30,249,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,404,919 UART: [rt]cmd =0x41544d4e, len=14344
34,335,504 >>> mbox cmd response data (8 bytes)
34,336,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,366,987 UART: [rt]cmd =0x41545348, len=116
34,387,199 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,438 UART:
192,798 UART: Running Caliptra ROM ...
193,993 UART:
194,148 UART: [state] CFI Enabled
261,482 UART: [state] LifecycleState = Unprovisioned
263,832 UART: [state] DebugLocked = No
265,655 UART: [state] WD Timer not started. Device not locked for debugging
271,101 UART: [kat] SHA2-256
460,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,730 UART: [kat] ++
472,216 UART: [kat] sha1
484,271 UART: [kat] SHA2-256
487,249 UART: [kat] SHA2-384
493,460 UART: [kat] SHA2-512-ACC
496,046 UART: [kat] ECC-384
2,946,145 UART: [kat] HMAC-384Kdf
2,968,495 UART: [kat] LMS
3,500,266 UART: [kat] --
3,505,335 UART: [cold-reset] ++
3,507,483 UART: [fht] FHT @ 0x50003400
3,518,889 UART: [idev] ++
3,519,556 UART: [idev] CDI.KEYID = 6
3,520,597 UART: [idev] SUBJECT.KEYID = 7
3,521,703 UART: [idev] UDS.KEYID = 0
3,522,655 ready_for_fw is high
3,522,843 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,535 UART: [idev] Erasing UDS.KEYID = 0
6,026,543 UART: [idev] Sha1 KeyId Algorithm
6,049,775 UART: [idev] --
6,054,639 UART: [ldev] ++
6,055,322 UART: [ldev] CDI.KEYID = 6
6,056,238 UART: [ldev] SUBJECT.KEYID = 5
6,057,400 UART: [ldev] AUTHORITY.KEYID = 7
6,058,634 UART: [ldev] FE.KEYID = 1
6,097,426 UART: [ldev] Erasing FE.KEYID = 1
8,603,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,265 UART: [ldev] --
10,410,510 UART: [fwproc] Wait for Commands...
10,413,044 UART: [fwproc] Recv command 0x46574c44
10,415,356 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,805 >>> mbox cmd response: success
14,609,151 UART: [afmc] ++
14,609,818 UART: [afmc] CDI.KEYID = 6
14,610,739 UART: [afmc] SUBJECT.KEYID = 7
14,611,851 UART: [afmc] AUTHORITY.KEYID = 5
17,145,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,890,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,891,960 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,907,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,922,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,937,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,960,707 UART: [afmc] --
18,965,156 UART: [cold-reset] --
18,969,046 UART: [state] Locking Datavault
18,975,339 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,504 UART: [state] Locking ICCM
18,979,826 UART: [exit] Launching FMC @ 0x40000130
18,988,508 UART:
18,988,756 UART: Running Caliptra FMC ...
18,989,862 UART:
18,990,024 UART: [state] CFI Enabled
19,047,053 UART: [fht] FMC Alias Private Key: 7
20,811,446 UART: [art] Extend RT PCRs Done
20,812,672 UART: [art] Lock RT PCRs Done
20,814,540 UART: [art] Populate DV Done
20,819,952 UART: [fht] FMC Alias Private Key: 7
20,821,487 UART: [art] Derive CDI
20,822,222 UART: [art] Store in in slot 0x4
20,879,795 UART: [art] Derive Key Pair
20,880,836 UART: [art] Store priv key in slot 0x5
23,344,129 UART: [art] Derive Key Pair - Done
23,356,746 UART: [art] Signing Cert with AUTHO
23,358,238 UART: RITY.KEYID = 7
25,069,165 UART: [art] Erasing AUTHORITY.KEYID = 7
25,070,675 UART: [art] PUB.X = EE6146282A290249226B0035E7F05A36E34162C3E912728DFF4524838F243D8A42EDC45BF0506FD4E37C66B1B05AB079
25,077,909 UART: [art] PUB.Y = 6D8898B6BEC0B3BEB002FA9072DBCDACD178FFCF23CDC124B1C0548F30A76918B091DB6F295A0F0BC49437CB128DEAFB
25,085,233 UART: [art] SIG.R = A0C7A95FB241BA529528FA807664C406025F60D62AB51204734252CB4CD0C0C4B5DC3019350134E24C2096C0597EBBAB
25,092,636 UART: [art] SIG.S = 0C8B5C9AEDD1C29EAB9A3247FC6566C1A2C3874F8D4B53787417216182B81B8A3F2350B4138105F5565FC16272D12951
26,071,508 UART: Caliptra RT
26,072,225 UART: [state] CFI Enabled
26,236,944 UART: [rt] RT listening for mailbox commands...
26,239,481 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,394,848 UART: [rt]cmd =0x41544d4e, len=14344
30,324,680 >>> mbox cmd response data (8 bytes)
30,325,288 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,355,805 UART: [rt]cmd =0x41545348, len=116
30,358,064 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,471 writing to cptra_bootfsm_go
3,438,310 ready_for_fw is high
3,438,826 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,706,140 >>> mbox cmd response: success
18,984,219 UART:
18,984,608 UART: Running Caliptra FMC ...
18,985,743 UART:
18,985,902 UART: [state] CFI Enabled
19,052,988 UART: [fht] FMC Alias Private Key: 7
20,816,652 UART: [art] Extend RT PCRs Done
20,817,878 UART: [art] Lock RT PCRs Done
20,819,649 UART: [art] Populate DV Done
20,824,849 UART: [fht] FMC Alias Private Key: 7
20,826,445 UART: [art] Derive CDI
20,827,190 UART: [art] Store in in slot 0x4
20,885,744 UART: [art] Derive Key Pair
20,886,786 UART: [art] Store priv key in slot 0x5
23,349,427 UART: [art] Derive Key Pair - Done
23,362,369 UART: [art] Signing Cert with AUTHO
23,363,709 UART: RITY.KEYID = 7
25,076,294 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,805 UART: [art] PUB.X = 9C1AB5D02B64A57FF3DD4E29E9E2A00E7AB32C7F06B6CD68A024A75BCB4F643857BFEDA2692D843673C7268F384AE9DB
25,085,081 UART: [art] PUB.Y = FEB87ECC457D035D591839183E963F7ECDD9E02C6AF312689FCA79AEC8BCEB5D072F351B9BE907DA6E9C842F8B2E8653
25,092,421 UART: [art] SIG.R = 5E95ECFDADC82F6DFE5ED4C161319980C242137C8300B961A59F5DC9AD18F3DF4BEEAE4B2EFAED9225728182AA269BC5
25,099,802 UART: [art] SIG.S = B97FB19497CE0C4647E57C97C5E51864D7A5555531E8D9CBD22105F8BDFB89EA8D8B363FEE104897B4A1CB62DCA52933
26,078,778 UART: Caliptra RT
26,079,506 UART: [state] CFI Enabled
26,243,517 UART: [rt] RT listening for mailbox commands...
30,273,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,429,010 UART: [rt]cmd =0x41544d4e, len=14344
34,359,577 >>> mbox cmd response data (8 bytes)
34,360,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,390,875 UART: [rt]cmd =0x41545348, len=116
34,409,804 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
3,436,884 ready_for_fw is high
3,437,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,738,692 >>> mbox cmd response: success
19,020,585 UART:
19,021,013 UART: Running Caliptra FMC ...
19,022,168 UART:
19,022,332 UART: [state] CFI Enabled
19,090,567 UART: [fht] FMC Alias Private Key: 7
20,854,264 UART: [art] Extend RT PCRs Done
20,855,483 UART: [art] Lock RT PCRs Done
20,856,922 UART: [art] Populate DV Done
20,862,557 UART: [fht] FMC Alias Private Key: 7
20,864,102 UART: [art] Derive CDI
20,864,836 UART: [art] Store in in slot 0x4
20,923,011 UART: [art] Derive Key Pair
20,924,060 UART: [art] Store priv key in slot 0x5
23,386,460 UART: [art] Derive Key Pair - Done
23,399,581 UART: [art] Signing Cert with AUTHO
23,400,887 UART: RITY.KEYID = 7
25,112,745 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,252 UART: [art] PUB.X = 75D33982B3F6B378EE2884D68D9A5846BFD919A318CCBEBF4AAB3B14F1AB98BEDB958AF26F856E19DA0707D6E81B196F
25,121,538 UART: [art] PUB.Y = 35B262CAE183C4AFA30C4B721E22DDDCD50CFB1CE4CCD5688345167BC2629EE02F469F00CF32D34179894E74C8510A7D
25,128,820 UART: [art] SIG.R = 69A7E2DBA1699CE2F1CD3B4E19A1D9140C3325204263596B7C1E693B53492F1985D8A9958E1B1A2C5CF3231F09732DBB
25,136,191 UART: [art] SIG.S = 92030C9A4AB0F3A84D15C76B83C547F9D3FB3438C04414F30A2F6901A6A91CACD38F3B365A49AC3CB1B47F82A0352A15
26,115,459 UART: Caliptra RT
26,116,179 UART: [state] CFI Enabled
26,281,493 UART: [rt] RT listening for mailbox commands...
26,283,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,196 UART: [rt]cmd =0x41544d4e, len=14344
30,369,527 >>> mbox cmd response data (8 bytes)
30,370,108 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,400,989 UART: [rt]cmd =0x41545348, len=116
30,403,110 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,417 UART:
192,775 UART: Running Caliptra ROM ...
193,956 UART:
603,684 UART: [state] CFI Enabled
615,494 UART: [state] LifecycleState = Unprovisioned
617,865 UART: [state] DebugLocked = No
619,735 UART: [state] WD Timer not started. Device not locked for debugging
623,756 UART: [kat] SHA2-256
813,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,420 UART: [kat] ++
824,961 UART: [kat] sha1
835,620 UART: [kat] SHA2-256
838,635 UART: [kat] SHA2-384
846,116 UART: [kat] SHA2-512-ACC
848,705 UART: [kat] ECC-384
3,293,641 UART: [kat] HMAC-384Kdf
3,307,434 UART: [kat] LMS
3,839,240 UART: [kat] --
3,843,444 UART: [cold-reset] ++
3,845,089 UART: [fht] FHT @ 0x50003400
3,857,272 UART: [idev] ++
3,857,975 UART: [idev] CDI.KEYID = 6
3,859,001 UART: [idev] SUBJECT.KEYID = 7
3,860,108 UART: [idev] UDS.KEYID = 0
3,861,048 ready_for_fw is high
3,861,236 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,224 UART: [idev] Erasing UDS.KEYID = 0
6,336,613 UART: [idev] Sha1 KeyId Algorithm
6,360,109 UART: [idev] --
6,364,747 UART: [ldev] ++
6,365,423 UART: [ldev] CDI.KEYID = 6
6,366,333 UART: [ldev] SUBJECT.KEYID = 5
6,367,490 UART: [ldev] AUTHORITY.KEYID = 7
6,368,717 UART: [ldev] FE.KEYID = 1
6,378,278 UART: [ldev] Erasing FE.KEYID = 1
8,853,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,026 UART: [ldev] --
10,644,840 UART: [fwproc] Wait for Commands...
10,647,438 UART: [fwproc] Recv command 0x46574c44
10,649,749 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,836,534 >>> mbox cmd response: success
14,839,956 UART: [afmc] ++
14,840,664 UART: [afmc] CDI.KEYID = 6
14,841,852 UART: [afmc] SUBJECT.KEYID = 7
14,843,332 UART: [afmc] AUTHORITY.KEYID = 5
17,348,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,543 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,757 UART: [afmc] --
19,141,970 UART: [cold-reset] --
19,145,396 UART: [state] Locking Datavault
19,151,665 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,851 UART: [state] Locking ICCM
19,156,050 UART: [exit] Launching FMC @ 0x40000130
19,164,719 UART:
19,164,953 UART: Running Caliptra FMC ...
19,166,051 UART:
19,166,213 UART: [state] CFI Enabled
19,174,474 UART: [fht] FMC Alias Private Key: 7
20,931,462 UART: [art] Extend RT PCRs Done
20,932,680 UART: [art] Lock RT PCRs Done
20,934,531 UART: [art] Populate DV Done
20,939,940 UART: [fht] FMC Alias Private Key: 7
20,941,422 UART: [art] Derive CDI
20,942,202 UART: [art] Store in in slot 0x4
20,985,140 UART: [art] Derive Key Pair
20,986,160 UART: [art] Store priv key in slot 0x5
23,413,026 UART: [art] Derive Key Pair - Done
23,426,183 UART: [art] Signing Cert with AUTHO
23,427,511 UART: RITY.KEYID = 7
25,132,747 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,253 UART: [art] PUB.X = FE03ED0EABC2E707852B7B4F53A07966879BCA13B3328B24707FF42A48FF383B3757E5E187775D3AA8FE5B54E1B7EC8E
25,141,500 UART: [art] PUB.Y = 0531794D46B4924592631FFE770FC8B52B3B3F70CB8E5E5FE1BEE54EA1097619267261CE30F925ED09572B9BC766E764
25,148,737 UART: [art] SIG.R = 3C3E623AE1EC780DE233D3F9C86BF011CB04C46B1F0F6AE1EF59B419A3C75BBD77BCCA5E7850B196BE1E13DAA9BFE50D
25,156,180 UART: [art] SIG.S = 4B408FB037AB3B259F659F2B29FC8F7D773E6FDA9F62D64B0085919AB060D82E86A69AF4D4180C70152933661DA8811F
26,135,093 UART: Caliptra RT
26,135,782 UART: [state] CFI Enabled
26,253,183 UART: [rt] RT listening for mailbox commands...
30,280,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,436,435 UART: [rt]cmd =0x41544d4e, len=14344
34,367,033 >>> mbox cmd response data (8 bytes)
34,367,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,398,365 UART: [rt]cmd =0x41545348, len=116
34,419,016 >>> mbox cmd response data (12 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,431 UART:
192,784 UART: Running Caliptra ROM ...
193,890 UART:
603,498 UART: [state] CFI Enabled
617,318 UART: [state] LifecycleState = Unprovisioned
619,722 UART: [state] DebugLocked = No
621,030 UART: [state] WD Timer not started. Device not locked for debugging
625,633 UART: [kat] SHA2-256
815,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,288 UART: [kat] ++
826,816 UART: [kat] sha1
837,117 UART: [kat] SHA2-256
840,120 UART: [kat] SHA2-384
847,741 UART: [kat] SHA2-512-ACC
850,318 UART: [kat] ECC-384
3,292,765 UART: [kat] HMAC-384Kdf
3,306,562 UART: [kat] LMS
3,838,366 UART: [kat] --
3,842,232 UART: [cold-reset] ++
3,844,443 UART: [fht] FHT @ 0x50003400
3,857,050 UART: [idev] ++
3,857,764 UART: [idev] CDI.KEYID = 6
3,858,645 UART: [idev] SUBJECT.KEYID = 7
3,859,885 UART: [idev] UDS.KEYID = 0
3,860,856 ready_for_fw is high
3,861,052 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,667 UART: [idev] Erasing UDS.KEYID = 0
6,340,081 UART: [idev] Sha1 KeyId Algorithm
6,362,223 UART: [idev] --
6,367,238 UART: [ldev] ++
6,367,919 UART: [ldev] CDI.KEYID = 6
6,368,831 UART: [ldev] SUBJECT.KEYID = 5
6,369,990 UART: [ldev] AUTHORITY.KEYID = 7
6,371,219 UART: [ldev] FE.KEYID = 1
6,381,729 UART: [ldev] Erasing FE.KEYID = 1
8,859,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,725 UART: [ldev] --
10,649,556 UART: [fwproc] Wait for Commands...
10,651,751 UART: [fwproc] Recv command 0x46574c44
10,654,000 UART: [fwproc] Recv'd Img size: 114360 bytes
14,110,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,308,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,851,384 >>> mbox cmd response: success
14,855,869 UART: [afmc] ++
14,856,538 UART: [afmc] CDI.KEYID = 6
14,857,464 UART: [afmc] SUBJECT.KEYID = 7
14,858,564 UART: [afmc] AUTHORITY.KEYID = 5
17,365,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,090,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,092,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,107,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,122,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,137,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,161,968 UART: [afmc] --
19,164,752 UART: [cold-reset] --
19,168,886 UART: [state] Locking Datavault
19,175,593 UART: [state] Locking PCR0, PCR1 and PCR31
19,177,786 UART: [state] Locking ICCM
19,180,165 UART: [exit] Launching FMC @ 0x40000130
19,188,834 UART:
19,189,065 UART: Running Caliptra FMC ...
19,190,169 UART:
19,190,330 UART: [state] CFI Enabled
19,198,321 UART: [fht] FMC Alias Private Key: 7
20,955,891 UART: [art] Extend RT PCRs Done
20,957,101 UART: [art] Lock RT PCRs Done
20,958,450 UART: [art] Populate DV Done
20,963,858 UART: [fht] FMC Alias Private Key: 7
20,965,401 UART: [art] Derive CDI
20,966,209 UART: [art] Store in in slot 0x4
21,008,479 UART: [art] Derive Key Pair
21,009,479 UART: [art] Store priv key in slot 0x5
23,435,994 UART: [art] Derive Key Pair - Done
23,448,853 UART: [art] Signing Cert with AUTHO
23,450,153 UART: RITY.KEYID = 7
25,155,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,202 UART: [art] PUB.X = 6E10306B6D1F9FB8BA34B3BB649FA761FCC787D52601D8771D7FDD3A84FEA7D16D977CCCC6BFFDCE7809FEEF945DA107
25,164,509 UART: [art] PUB.Y = E9B682E3ED1074F081998451AC6D7F48D5EB581DAFE65F887391FFA5EFFC27037FDD6D4AB6BECE76AD69378AAC52BEA8
25,171,799 UART: [art] SIG.R = CE96486DDEB16D3BA408F505C00F1149B7090260E928367B58C759E406B60E8F66178629C1D56235C308E7DD57D15C24
25,179,242 UART: [art] SIG.S = 570B972C8F95708703D7C497A6918EC4A6DF19977167248E98AFB4264FA0883F499906BAEE3CFFCEFEF6216175F52467
26,158,334 UART: Caliptra RT
26,159,042 UART: [state] CFI Enabled
26,276,699 UART: [rt] RT listening for mailbox commands...
26,279,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,434,738 UART: [rt]cmd =0x41544d4e, len=14344
30,364,677 >>> mbox cmd response data (8 bytes)
30,365,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,395,892 UART: [rt]cmd =0x41545348, len=116
30,398,133 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,758,499 ready_for_fw is high
3,758,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,055 >>> mbox cmd response: success
19,210,347 UART:
19,210,736 UART: Running Caliptra FMC ...
19,212,050 UART:
19,212,226 UART: [state] CFI Enabled
19,219,970 UART: [fht] FMC Alias Private Key: 7
20,976,884 UART: [art] Extend RT PCRs Done
20,978,112 UART: [art] Lock RT PCRs Done
20,979,843 UART: [art] Populate DV Done
20,985,360 UART: [fht] FMC Alias Private Key: 7
20,987,007 UART: [art] Derive CDI
20,987,748 UART: [art] Store in in slot 0x4
21,030,339 UART: [art] Derive Key Pair
21,031,346 UART: [art] Store priv key in slot 0x5
23,458,342 UART: [art] Derive Key Pair - Done
23,471,559 UART: [art] Signing Cert with AUTHO
23,472,885 UART: RITY.KEYID = 7
25,178,202 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,712 UART: [art] PUB.X = A06085C0614AFB10C17C3889AE0EEAB320A3F4D8E619E51708E8180CA2C4265CCDD3256B394100B5366A571CFC456C42
25,186,913 UART: [art] PUB.Y = 2D7ACB9B9E3E8220222A1601832EF05654FC35214DCB9F72C1038D6EFBD44FD124E635B63E16EA909114FC6C37CDD119
25,194,224 UART: [art] SIG.R = 6BC569FCFE38E00A17FD413910AFF9E7F2F38FBD9E4C8F226DB101A0E5834B5E865EE7B8799DB430CA604EF0635DF7A7
25,201,565 UART: [art] SIG.S = 1D585AF4034137211D4DAC269B79D6F5F1AA4AC6F0AE2C70DC43173B2F7502BB21965B37610299D3B66610AEDBD67EF7
26,180,497 UART: Caliptra RT
26,181,210 UART: [state] CFI Enabled
26,298,762 UART: [rt] RT listening for mailbox commands...
30,325,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,481,122 UART: [rt]cmd =0x41544d4e, len=14344
34,411,206 >>> mbox cmd response data (8 bytes)
34,411,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,442,287 UART: [rt]cmd =0x41545348, len=116
34,463,292 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
3,755,188 ready_for_fw is high
3,755,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,930 >>> mbox cmd response: success
19,207,236 UART:
19,207,648 UART: Running Caliptra FMC ...
19,208,778 UART:
19,208,932 UART: [state] CFI Enabled
19,217,009 UART: [fht] FMC Alias Private Key: 7
20,973,822 UART: [art] Extend RT PCRs Done
20,975,048 UART: [art] Lock RT PCRs Done
20,976,953 UART: [art] Populate DV Done
20,982,406 UART: [fht] FMC Alias Private Key: 7
20,984,058 UART: [art] Derive CDI
20,984,881 UART: [art] Store in in slot 0x4
21,027,485 UART: [art] Derive Key Pair
21,028,528 UART: [art] Store priv key in slot 0x5
23,455,365 UART: [art] Derive Key Pair - Done
23,468,309 UART: [art] Signing Cert with AUTHO
23,469,613 UART: RITY.KEYID = 7
25,175,461 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,968 UART: [art] PUB.X = 3FA493FEEE8F1E9C53C62548ABF5CB43AB7772BA43A2FAE11463FDBC47174163F79B01462E3F3B8E59C85D6AC85EB756
25,184,226 UART: [art] PUB.Y = 52CD5374DE50530C4EE6CADBB99B655D7122C818883B66DF405C1EFFAE91D4B301E5C14C3D2E230D7AA49D67DDC3D0D0
25,191,522 UART: [art] SIG.R = 19CDE3092A0AEED2B83DB4673B6B78067B7F4582C1C042DD27C4FFF8BBA576DBDA4899117DAC268AB3C14ECCEB9C2F1C
25,198,937 UART: [art] SIG.S = 3622373356F932AED9B566F91B7E19A4A2E3413C724DB2BA154F20ED2086D4EC09DADE2960CBDF83E19E20EB46DD2BC3
26,177,712 UART: Caliptra RT
26,178,405 UART: [state] CFI Enabled
26,295,635 UART: [rt] RT listening for mailbox commands...
26,298,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,453,497 UART: [rt]cmd =0x41544d4e, len=14344
30,384,696 >>> mbox cmd response data (8 bytes)
30,385,249 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,416,086 UART: [rt]cmd =0x41545348, len=116
30,418,400 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,614 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,614 UART: [idev] ++
1,479,782 UART: [idev] CDI.KEYID = 6
1,480,142 UART: [idev] SUBJECT.KEYID = 7
1,480,566 UART: [idev] UDS.KEYID = 0
1,480,911 ready_for_fw is high
1,480,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,504,514 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,174 UART: [idev] --
1,514,117 UART: [ldev] ++
1,514,285 UART: [ldev] CDI.KEYID = 6
1,514,648 UART: [ldev] SUBJECT.KEYID = 5
1,515,074 UART: [ldev] AUTHORITY.KEYID = 7
1,515,537 UART: [ldev] FE.KEYID = 1
1,520,919 UART: [ldev] Erasing FE.KEYID = 1
1,546,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,534 UART: [ldev] --
1,585,837 UART: [fwproc] Waiting for Commands...
1,586,606 UART: [fwproc] Received command 0x46574c44
1,587,397 UART: [fwproc] Received Image of size 114360 bytes
2,885,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,467 >>> mbox cmd response: success
3,079,679 UART: [afmc] ++
3,079,847 UART: [afmc] CDI.KEYID = 6
3,080,209 UART: [afmc] SUBJECT.KEYID = 7
3,080,634 UART: [afmc] AUTHORITY.KEYID = 5
3,115,973 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,241 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,749 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,634 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,324 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,245 UART: [afmc] --
3,159,169 UART: [cold-reset] --
3,160,123 UART: [state] Locking Datavault
3,161,360 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,964 UART: [state] Locking ICCM
3,162,516 UART: [exit] Launching FMC @ 0x40000130
3,167,845 UART:
3,167,861 UART: Running Caliptra FMC ...
3,168,269 UART:
3,168,323 UART: [state] CFI Enabled
3,179,170 UART: [fht] FMC Alias Private Key: 7
3,287,363 UART: [art] Extend RT PCRs Done
3,287,791 UART: [art] Lock RT PCRs Done
3,289,361 UART: [art] Populate DV Done
3,297,712 UART: [fht] FMC Alias Private Key: 7
3,298,744 UART: [art] Derive CDI
3,299,024 UART: [art] Store in in slot 0x4
3,384,941 UART: [art] Derive Key Pair
3,385,301 UART: [art] Store priv key in slot 0x5
3,399,313 UART: [art] Derive Key Pair - Done
3,414,087 UART: [art] Signing Cert with AUTHO
3,414,567 UART: RITY.KEYID = 7
3,429,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,508 UART: [art] PUB.X = A405BCB6A51C38AF14CD4CA2710AB83457449D596D8817C83EF340952D2499EA4908B35A71AB93204C1A1C481E10E0E7
3,437,271 UART: [art] PUB.Y = 9A03096AB3B6E5983DDAFC61C3CC33E4C2B387DF35243B54D7CAEF978CED0897456E6C92EC734635B1BFB5C81E1FAE23
3,444,230 UART: [art] SIG.R = 15BFFEE7ECD68DBF8D2048F26B8DB6EC274345FB49F3B795020C82F5F34C38AA4E1D47A8C96F405A9FFD59FFD5A561AB
3,451,018 UART: [art] SIG.S = F3C4AF483B56F2934C9664C88BD1E5328958B3851B53125856E620064030A80F999D14478D57AB2EA8C88C3D5584F35D
3,474,411 UART: Caliptra RT
3,474,665 UART: [state] CFI Enabled
3,583,267 UART: [rt] RT listening for mailbox commands...
3,583,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,598 UART: [rt]cmd =0x41544d4e, len=14344
3,851,614 >>> mbox cmd response data (8 bytes)
3,851,615 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,566 UART: [rt]cmd =0x41545348, len=116
3,903,351 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,981 UART: [kat] SHA2-256
881,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,027 UART: [kat] ++
886,179 UART: [kat] sha1
890,493 UART: [kat] SHA2-256
892,431 UART: [kat] SHA2-384
895,116 UART: [kat] SHA2-512-ACC
897,017 UART: [kat] ECC-384
902,756 UART: [kat] HMAC-384Kdf
907,334 UART: [kat] LMS
1,475,530 UART: [kat] --
1,476,629 UART: [cold-reset] ++
1,477,123 UART: [fht] Storing FHT @ 0x50003400
1,480,104 UART: [idev] ++
1,480,272 UART: [idev] CDI.KEYID = 6
1,480,632 UART: [idev] SUBJECT.KEYID = 7
1,481,056 UART: [idev] UDS.KEYID = 0
1,481,401 ready_for_fw is high
1,481,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,952 UART: [idev] Erasing UDS.KEYID = 0
1,505,940 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,598 UART: [idev] --
1,515,447 UART: [ldev] ++
1,515,615 UART: [ldev] CDI.KEYID = 6
1,515,978 UART: [ldev] SUBJECT.KEYID = 5
1,516,404 UART: [ldev] AUTHORITY.KEYID = 7
1,516,867 UART: [ldev] FE.KEYID = 1
1,522,095 UART: [ldev] Erasing FE.KEYID = 1
1,547,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,092 UART: [ldev] --
1,586,421 UART: [fwproc] Waiting for Commands...
1,587,090 UART: [fwproc] Received command 0x46574c44
1,587,881 UART: [fwproc] Received Image of size 114360 bytes
2,885,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,490 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,842 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,797 >>> mbox cmd response: success
3,078,991 UART: [afmc] ++
3,079,159 UART: [afmc] CDI.KEYID = 6
3,079,521 UART: [afmc] SUBJECT.KEYID = 7
3,079,946 UART: [afmc] AUTHORITY.KEYID = 5
3,115,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,998 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,688 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,579 UART: [afmc] --
3,158,563 UART: [cold-reset] --
3,159,263 UART: [state] Locking Datavault
3,160,582 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,186 UART: [state] Locking ICCM
3,161,696 UART: [exit] Launching FMC @ 0x40000130
3,167,025 UART:
3,167,041 UART: Running Caliptra FMC ...
3,167,449 UART:
3,167,503 UART: [state] CFI Enabled
3,178,236 UART: [fht] FMC Alias Private Key: 7
3,286,661 UART: [art] Extend RT PCRs Done
3,287,089 UART: [art] Lock RT PCRs Done
3,288,743 UART: [art] Populate DV Done
3,297,118 UART: [fht] FMC Alias Private Key: 7
3,298,180 UART: [art] Derive CDI
3,298,460 UART: [art] Store in in slot 0x4
3,384,201 UART: [art] Derive Key Pair
3,384,561 UART: [art] Store priv key in slot 0x5
3,397,577 UART: [art] Derive Key Pair - Done
3,412,188 UART: [art] Signing Cert with AUTHO
3,412,668 UART: RITY.KEYID = 7
3,427,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,417 UART: [art] PUB.X = C0535945C9CF51263739BD54A1B6FA69A0F25A90A8A00335F2CAE67D4CFEF120AEC7D3EAB6BD53D07A74F82119B49950
3,435,196 UART: [art] PUB.Y = 7664A49CFAEBC228A884F8C7C791A430CFD3B2D0E48CDF1A4B5621025DD5B96162A97AB5FE328BB4575AB5C5D8C9E6F2
3,442,161 UART: [art] SIG.R = 8F293E3A615952D0E6623949588480F80477DAEC4FE15B045E52EF565F09DF7C6F587A643F576297753600B5CF0F51F0
3,448,891 UART: [art] SIG.S = 744D42516BED71D7A0262E864DD9601EE898355D25AA6CAC89F746D9E3B11FF1F7FDDDD5D2C9A0FD5F298F743A6135AE
3,473,044 UART: Caliptra RT
3,473,298 UART: [state] CFI Enabled
3,580,932 UART: [rt] RT listening for mailbox commands...
3,581,602 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,179 UART: [rt]cmd =0x41544d4e, len=14344
3,849,388 >>> mbox cmd response data (8 bytes)
3,849,389 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,362 UART: [rt]cmd =0x41545348, len=116
3,881,401 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,335 ready_for_fw is high
1,362,335 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,941 >>> mbox cmd response: success
2,988,629 UART:
2,988,645 UART: Running Caliptra FMC ...
2,989,053 UART:
2,989,107 UART: [state] CFI Enabled
2,999,772 UART: [fht] FMC Alias Private Key: 7
3,107,811 UART: [art] Extend RT PCRs Done
3,108,239 UART: [art] Lock RT PCRs Done
3,109,537 UART: [art] Populate DV Done
3,117,468 UART: [fht] FMC Alias Private Key: 7
3,118,536 UART: [art] Derive CDI
3,118,816 UART: [art] Store in in slot 0x4
3,204,179 UART: [art] Derive Key Pair
3,204,539 UART: [art] Store priv key in slot 0x5
3,217,983 UART: [art] Derive Key Pair - Done
3,232,532 UART: [art] Signing Cert with AUTHO
3,233,012 UART: RITY.KEYID = 7
3,248,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,061 UART: [art] PUB.X = 929F355A0CD1A40E83BFBD6B997F5147760B648054393F8CE7EE943A3FBEB6741722AD41B09D7C6C3972266AA56E77F9
3,255,826 UART: [art] PUB.Y = 04B06FDDCC14A91BBD7A1D42C1AB8946E9CACB44AA8B80A3A0B3F2245342E43758D8E414F9F944B9E1303FDB4C7D2B72
3,262,791 UART: [art] SIG.R = 0AB4D347A835C30202DC6ECCFF94DBAEF877EA93199171154FEAC19ADC7577744E678835C6BB24DF51A95AD2B5962AF0
3,269,566 UART: [art] SIG.S = 6998F9C08AAF43824338988653112CA7EF3BF6AC53BFAB00B95532F7362C7C197653580EB101BEDA8AC07255A14D8748
3,293,365 UART: Caliptra RT
3,293,619 UART: [state] CFI Enabled
3,401,782 UART: [rt] RT listening for mailbox commands...
3,402,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,199 UART: [rt]cmd =0x41544d4e, len=14344
3,670,243 >>> mbox cmd response data (8 bytes)
3,670,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,229 UART: [rt]cmd =0x41545348, len=116
3,722,048 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,891 ready_for_fw is high
1,362,891 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,731 >>> mbox cmd response: success
2,990,593 UART:
2,990,609 UART: Running Caliptra FMC ...
2,991,017 UART:
2,991,071 UART: [state] CFI Enabled
3,001,488 UART: [fht] FMC Alias Private Key: 7
3,109,951 UART: [art] Extend RT PCRs Done
3,110,379 UART: [art] Lock RT PCRs Done
3,112,057 UART: [art] Populate DV Done
3,120,306 UART: [fht] FMC Alias Private Key: 7
3,121,404 UART: [art] Derive CDI
3,121,684 UART: [art] Store in in slot 0x4
3,207,829 UART: [art] Derive Key Pair
3,208,189 UART: [art] Store priv key in slot 0x5
3,221,461 UART: [art] Derive Key Pair - Done
3,236,059 UART: [art] Signing Cert with AUTHO
3,236,539 UART: RITY.KEYID = 7
3,251,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,128 UART: [art] PUB.X = 41DCA5F3AFB4845A3819D7068A0406C148468A2598A1C14F64D50BC4BDC608A4A8A52E36E16D3477F3FAD20672D54714
3,258,882 UART: [art] PUB.Y = 5A3352A5F9998B3D2797EA8EBD3A292207C82858409B0CFAAF600786616F96CAC02AE39C24C10FC293387D86E2C53041
3,265,820 UART: [art] SIG.R = 3248B0CA4A73B8F09F5C0507ADD5EED3D0649CD7EB6D41EDF752C11D82A52FE8136A0A5C1C77B6FD446BFF9D7AB79531
3,272,601 UART: [art] SIG.S = 96A97D8FF2BF7818C9BC68ECF231ABC3A513EFCA8F4F8DB27FE71EFBA00953BCDB96713CC77F6CFA0273D969F42407D4
3,296,859 UART: Caliptra RT
3,297,113 UART: [state] CFI Enabled
3,405,405 UART: [rt] RT listening for mailbox commands...
3,406,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,582 UART: [rt]cmd =0x41544d4e, len=14344
3,673,449 >>> mbox cmd response data (8 bytes)
3,673,450 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,539 UART: [rt]cmd =0x41545348, len=116
3,705,424 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,454 UART: [kat] SHA2-256
892,392 UART: [kat] SHA2-384
895,129 UART: [kat] SHA2-512-ACC
897,030 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,291 UART: [kat] LMS
1,475,487 UART: [kat] --
1,476,608 UART: [cold-reset] ++
1,477,058 UART: [fht] Storing FHT @ 0x50003400
1,479,697 UART: [idev] ++
1,479,865 UART: [idev] CDI.KEYID = 6
1,480,225 UART: [idev] SUBJECT.KEYID = 7
1,480,649 UART: [idev] UDS.KEYID = 0
1,480,994 ready_for_fw is high
1,480,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,775 UART: [idev] Erasing UDS.KEYID = 0
1,504,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,301 UART: [idev] --
1,514,206 UART: [ldev] ++
1,514,374 UART: [ldev] CDI.KEYID = 6
1,514,737 UART: [ldev] SUBJECT.KEYID = 5
1,515,163 UART: [ldev] AUTHORITY.KEYID = 7
1,515,626 UART: [ldev] FE.KEYID = 1
1,520,908 UART: [ldev] Erasing FE.KEYID = 1
1,546,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,713 UART: [ldev] --
1,586,108 UART: [fwproc] Waiting for Commands...
1,586,863 UART: [fwproc] Received command 0x46574c44
1,587,654 UART: [fwproc] Received Image of size 114360 bytes
2,885,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,883 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,236 >>> mbox cmd response: success
3,079,280 UART: [afmc] ++
3,079,448 UART: [afmc] CDI.KEYID = 6
3,079,810 UART: [afmc] SUBJECT.KEYID = 7
3,080,235 UART: [afmc] AUTHORITY.KEYID = 5
3,115,574 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,964 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,357 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,047 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,714 UART: [afmc] --
3,158,774 UART: [cold-reset] --
3,159,768 UART: [state] Locking Datavault
3,160,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,423 UART: [state] Locking ICCM
3,161,853 UART: [exit] Launching FMC @ 0x40000130
3,167,182 UART:
3,167,198 UART: Running Caliptra FMC ...
3,167,606 UART:
3,167,749 UART: [state] CFI Enabled
3,178,582 UART: [fht] FMC Alias Private Key: 7
3,286,845 UART: [art] Extend RT PCRs Done
3,287,273 UART: [art] Lock RT PCRs Done
3,288,797 UART: [art] Populate DV Done
3,296,948 UART: [fht] FMC Alias Private Key: 7
3,298,078 UART: [art] Derive CDI
3,298,358 UART: [art] Store in in slot 0x4
3,384,061 UART: [art] Derive Key Pair
3,384,421 UART: [art] Store priv key in slot 0x5
3,397,739 UART: [art] Derive Key Pair - Done
3,412,684 UART: [art] Signing Cert with AUTHO
3,413,164 UART: RITY.KEYID = 7
3,428,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,545 UART: [art] PUB.X = FC1BD282CA2EA9814A2226E29DF4FC612C67BE093981E9C2A8711F13B40D48774C4DF96CDCD14810B420A1B06EBAE902
3,436,318 UART: [art] PUB.Y = 9111CA78D007969FC185C2B4C776000E34C653E613771EB4F214988D28CC46E66532C64A3859B82762112D760695212A
3,443,221 UART: [art] SIG.R = B92FC8EEB8793029296322C8C1EB49A02AC4AFE7F9723DC9A55260B4C7CD5D93E3CC95D2522B91EF20D6556615A8CAAD
3,450,005 UART: [art] SIG.S = 034DF28167EA1056E3571D28B720F07DEC15C1C887D73D066F6FED2EFEF2609B287B95A603F7DD2F192E61E23A827D46
3,473,681 UART: Caliptra RT
3,474,027 UART: [state] CFI Enabled
3,583,151 UART: [rt] RT listening for mailbox commands...
3,583,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,606 UART: [rt]cmd =0x41544d4e, len=14344
3,851,126 >>> mbox cmd response data (8 bytes)
3,851,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,188 UART: [rt]cmd =0x41545348, len=116
3,903,511 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,162 UART: [kat] SHA2-256
882,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,208 UART: [kat] ++
886,360 UART: [kat] sha1
890,600 UART: [kat] SHA2-256
892,538 UART: [kat] SHA2-384
895,279 UART: [kat] SHA2-512-ACC
897,180 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,499 UART: [kat] LMS
1,475,695 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,476,904 UART: [fht] Storing FHT @ 0x50003400
1,479,693 UART: [idev] ++
1,479,861 UART: [idev] CDI.KEYID = 6
1,480,221 UART: [idev] SUBJECT.KEYID = 7
1,480,645 UART: [idev] UDS.KEYID = 0
1,480,990 ready_for_fw is high
1,480,990 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,665 UART: [idev] Erasing UDS.KEYID = 0
1,506,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,743 UART: [idev] --
1,515,768 UART: [ldev] ++
1,515,936 UART: [ldev] CDI.KEYID = 6
1,516,299 UART: [ldev] SUBJECT.KEYID = 5
1,516,725 UART: [ldev] AUTHORITY.KEYID = 7
1,517,188 UART: [ldev] FE.KEYID = 1
1,522,520 UART: [ldev] Erasing FE.KEYID = 1
1,548,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,309 UART: [ldev] --
1,587,782 UART: [fwproc] Waiting for Commands...
1,588,611 UART: [fwproc] Received command 0x46574c44
1,589,402 UART: [fwproc] Received Image of size 114360 bytes
2,887,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,241 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,514 >>> mbox cmd response: success
3,080,602 UART: [afmc] ++
3,080,770 UART: [afmc] CDI.KEYID = 6
3,081,132 UART: [afmc] SUBJECT.KEYID = 7
3,081,557 UART: [afmc] AUTHORITY.KEYID = 5
3,116,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,144 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,537 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,227 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,320 UART: [afmc] --
3,160,296 UART: [cold-reset] --
3,161,190 UART: [state] Locking Datavault
3,162,461 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,065 UART: [state] Locking ICCM
3,163,631 UART: [exit] Launching FMC @ 0x40000130
3,168,960 UART:
3,168,976 UART: Running Caliptra FMC ...
3,169,384 UART:
3,169,527 UART: [state] CFI Enabled
3,180,428 UART: [fht] FMC Alias Private Key: 7
3,288,709 UART: [art] Extend RT PCRs Done
3,289,137 UART: [art] Lock RT PCRs Done
3,290,913 UART: [art] Populate DV Done
3,299,152 UART: [fht] FMC Alias Private Key: 7
3,300,094 UART: [art] Derive CDI
3,300,374 UART: [art] Store in in slot 0x4
3,386,011 UART: [art] Derive Key Pair
3,386,371 UART: [art] Store priv key in slot 0x5
3,399,805 UART: [art] Derive Key Pair - Done
3,414,394 UART: [art] Signing Cert with AUTHO
3,414,874 UART: RITY.KEYID = 7
3,429,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,691 UART: [art] PUB.X = 4937023FFECC7269F8ABC04FB1168A5166507E696305138983F7D743FD2F75E2402503CC17908021F864B00321DDF4AE
3,437,443 UART: [art] PUB.Y = 5049CB7D37F1233B1B30DD8EAE4173044716E448DEADC34F05BB7E82C9EE6FC6F74D5E08E66906A0201ACA1D69961565
3,444,389 UART: [art] SIG.R = 7D05EE3B7BD18CE279620F85355459C08BD8B8038B9DA598393995A732E066E61B5F83AD39ACEBB3F2F75D56F762E8EC
3,451,158 UART: [art] SIG.S = 8CAE471A156D478C64615EF2721BFF99A375228611C29CF5730E218F92FE1863C66AB74940CE14270B3BB7F1F8AE06C6
3,474,792 UART: Caliptra RT
3,475,138 UART: [state] CFI Enabled
3,583,628 UART: [rt] RT listening for mailbox commands...
3,584,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,009 UART: [rt]cmd =0x41544d4e, len=14344
3,852,224 >>> mbox cmd response data (8 bytes)
3,852,225 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,314 UART: [rt]cmd =0x41545348, len=116
3,884,149 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,472 ready_for_fw is high
1,362,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,832 >>> mbox cmd response: success
2,988,048 UART:
2,988,064 UART: Running Caliptra FMC ...
2,988,472 UART:
2,988,615 UART: [state] CFI Enabled
2,999,020 UART: [fht] FMC Alias Private Key: 7
3,107,161 UART: [art] Extend RT PCRs Done
3,107,589 UART: [art] Lock RT PCRs Done
3,109,187 UART: [art] Populate DV Done
3,117,278 UART: [fht] FMC Alias Private Key: 7
3,118,270 UART: [art] Derive CDI
3,118,550 UART: [art] Store in in slot 0x4
3,204,181 UART: [art] Derive Key Pair
3,204,541 UART: [art] Store priv key in slot 0x5
3,217,095 UART: [art] Derive Key Pair - Done
3,231,648 UART: [art] Signing Cert with AUTHO
3,232,128 UART: RITY.KEYID = 7
3,247,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,969 UART: [art] PUB.X = E38DCACD9A56B312C81A823D2AFDAEDDB01F1AAA32D980B3596115AD392F14956080E308B14DB09EDAE418D98EF94C4B
3,254,756 UART: [art] PUB.Y = 35BB0725AC795E13E10C0BB44A16DD7F314616E1A0795C3B04F94B518DF236FFED32E040BC59BFFA7F0B0E441C8FDDD3
3,261,706 UART: [art] SIG.R = 6752DE844884B1B7B7AFC382DF1C651877345DCEC0D10EC8B222EDE2C54AAD40ADB0B7A8A6039E707DB094E87A22CFD4
3,268,488 UART: [art] SIG.S = 39418FE564C1329E68F5FFA66ACC0F700453078BAE0D429CB761DC4996AA266DB0F77A877A9F3F77AD6952500CED7FDC
3,292,272 UART: Caliptra RT
3,292,618 UART: [state] CFI Enabled
3,401,527 UART: [rt] RT listening for mailbox commands...
3,402,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,790 UART: [rt]cmd =0x41544d4e, len=14344
3,669,626 >>> mbox cmd response data (8 bytes)
3,669,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,550 UART: [rt]cmd =0x41545348, len=116
3,721,391 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,924 >>> mbox cmd response: success
2,989,628 UART:
2,989,644 UART: Running Caliptra FMC ...
2,990,052 UART:
2,990,195 UART: [state] CFI Enabled
3,000,598 UART: [fht] FMC Alias Private Key: 7
3,108,631 UART: [art] Extend RT PCRs Done
3,109,059 UART: [art] Lock RT PCRs Done
3,110,231 UART: [art] Populate DV Done
3,118,456 UART: [fht] FMC Alias Private Key: 7
3,119,556 UART: [art] Derive CDI
3,119,836 UART: [art] Store in in slot 0x4
3,205,871 UART: [art] Derive Key Pair
3,206,231 UART: [art] Store priv key in slot 0x5
3,220,467 UART: [art] Derive Key Pair - Done
3,235,349 UART: [art] Signing Cert with AUTHO
3,235,829 UART: RITY.KEYID = 7
3,251,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,858 UART: [art] PUB.X = 762F0B56D08AD5752827CACFBBBF3C811A52394D93EF85ACEB0AAE343C4558B66F2F90BFDBFB1410DE7093DC39F27861
3,258,640 UART: [art] PUB.Y = 712E9AE58D16D56201D1667B976BAD08A03FE318525156E6F21B75CA081F2BCAFEE4ACBDB184AF8F0C28E27534790606
3,265,580 UART: [art] SIG.R = B24F84F4B7999E69BE9037978EB7358831761FA68293B707439DD4BCC2A984A644E55B8263EC3CDB10BB0CDE8BDB8768
3,272,350 UART: [art] SIG.S = 415459DABF7E35630988D66CC99BA0A0E5B8213C6D319BCF287F6287BEB8C86646C44CD6F972CCA62E01A14AA5638CB8
3,296,681 UART: Caliptra RT
3,297,027 UART: [state] CFI Enabled
3,405,427 UART: [rt] RT listening for mailbox commands...
3,406,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,996 UART: [rt]cmd =0x41544d4e, len=14344
3,673,781 >>> mbox cmd response data (8 bytes)
3,673,782 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,777 UART: [rt]cmd =0x41545348, len=116
3,705,766 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
893,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,135 UART: [kat] ++
897,287 UART: [kat] sha1
901,465 UART: [kat] SHA2-256
903,405 UART: [kat] SHA2-384
906,050 UART: [kat] SHA2-512-ACC
907,951 UART: [kat] ECC-384
917,448 UART: [kat] HMAC-384Kdf
922,034 UART: [kat] LMS
1,170,362 UART: [kat] --
1,171,487 UART: [cold-reset] ++
1,172,027 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 ready_for_fw is high
1,176,031 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,348 UART: [idev] Erasing UDS.KEYID = 0
1,200,335 UART: [idev] Sha1 KeyId Algorithm
1,209,027 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,164 >>> mbox cmd response: success
2,775,358 UART: [afmc] ++
2,775,526 UART: [afmc] CDI.KEYID = 6
2,775,888 UART: [afmc] SUBJECT.KEYID = 7
2,776,313 UART: [afmc] AUTHORITY.KEYID = 5
2,811,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,272 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,771 UART: [afmc] --
2,855,899 UART: [cold-reset] --
2,856,901 UART: [state] Locking Datavault
2,858,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,756 UART: [state] Locking ICCM
2,859,430 UART: [exit] Launching FMC @ 0x40000130
2,864,759 UART:
2,864,775 UART: Running Caliptra FMC ...
2,865,183 UART:
2,865,237 UART: [state] CFI Enabled
2,875,928 UART: [fht] FMC Alias Private Key: 7
2,984,317 UART: [art] Extend RT PCRs Done
2,984,745 UART: [art] Lock RT PCRs Done
2,986,089 UART: [art] Populate DV Done
2,994,516 UART: [fht] FMC Alias Private Key: 7
2,995,626 UART: [art] Derive CDI
2,995,906 UART: [art] Store in in slot 0x4
3,081,267 UART: [art] Derive Key Pair
3,081,627 UART: [art] Store priv key in slot 0x5
3,094,921 UART: [art] Derive Key Pair - Done
3,109,190 UART: [art] Signing Cert with AUTHO
3,109,670 UART: RITY.KEYID = 7
3,124,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,727 UART: [art] PUB.X = 485695C103EBC23E35E56D0CDE128EC81F085D495648235E87FFB775BD8C8CD90E134DC4C94A0704B367AF2ED439F06F
3,132,487 UART: [art] PUB.Y = BC66CDDA5B8960C9736EB81260B3C63B4ECBA5FFA9B2A7FF46049D9CD9D8EF8BB147E1BA4856D62F9ED22CBC1144E7A5
3,139,460 UART: [art] SIG.R = C3952A62401E82BE5D3ABCCC74B0784A2D42065A0F180BBAD47997069CD0FFD41CAD8374EADAEDF3E9F660996CB306AA
3,146,235 UART: [art] SIG.S = 267391FB68D79956EF6B5BC4397F3C9C27FCA783DE859CE88F0D60D7C4194989AA8E178C94447E19AFFB1CD788910296
3,169,582 UART: Caliptra RT
3,169,836 UART: [state] CFI Enabled
3,277,246 UART: [rt] RT listening for mailbox commands...
3,277,916 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,429 UART: [rt]cmd =0x41544d4e, len=14344
3,545,093 >>> mbox cmd response data (8 bytes)
3,545,094 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,035 UART: [rt]cmd =0x41545348, len=116
3,595,968 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
902,099 UART: [kat] SHA2-256
904,039 UART: [kat] SHA2-384
906,692 UART: [kat] SHA2-512-ACC
908,593 UART: [kat] ECC-384
918,418 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,174,938 UART: [idev] ++
1,175,106 UART: [idev] CDI.KEYID = 6
1,175,466 UART: [idev] SUBJECT.KEYID = 7
1,175,890 UART: [idev] UDS.KEYID = 0
1,176,235 ready_for_fw is high
1,176,235 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,151 UART: [idev] Sha1 KeyId Algorithm
1,209,655 UART: [idev] --
1,210,631 UART: [ldev] ++
1,210,799 UART: [ldev] CDI.KEYID = 6
1,211,162 UART: [ldev] SUBJECT.KEYID = 5
1,211,588 UART: [ldev] AUTHORITY.KEYID = 7
1,212,051 UART: [ldev] FE.KEYID = 1
1,217,203 UART: [ldev] Erasing FE.KEYID = 1
1,243,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,790 UART: [fwproc] Wait for Commands...
1,283,470 UART: [fwproc] Recv command 0x46574c44
1,284,198 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,560 >>> mbox cmd response: success
2,774,600 UART: [afmc] ++
2,774,768 UART: [afmc] CDI.KEYID = 6
2,775,130 UART: [afmc] SUBJECT.KEYID = 7
2,775,555 UART: [afmc] AUTHORITY.KEYID = 5
2,810,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,205 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,391 UART: [afmc] --
2,854,403 UART: [cold-reset] --
2,855,339 UART: [state] Locking Datavault
2,856,596 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,200 UART: [state] Locking ICCM
2,857,856 UART: [exit] Launching FMC @ 0x40000130
2,863,185 UART:
2,863,201 UART: Running Caliptra FMC ...
2,863,609 UART:
2,863,663 UART: [state] CFI Enabled
2,874,136 UART: [fht] FMC Alias Private Key: 7
2,982,319 UART: [art] Extend RT PCRs Done
2,982,747 UART: [art] Lock RT PCRs Done
2,984,389 UART: [art] Populate DV Done
2,992,440 UART: [fht] FMC Alias Private Key: 7
2,993,560 UART: [art] Derive CDI
2,993,840 UART: [art] Store in in slot 0x4
3,079,255 UART: [art] Derive Key Pair
3,079,615 UART: [art] Store priv key in slot 0x5
3,092,829 UART: [art] Derive Key Pair - Done
3,107,550 UART: [art] Signing Cert with AUTHO
3,108,030 UART: RITY.KEYID = 7
3,123,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,797 UART: [art] PUB.X = CE8099962774D6959BB34E08A37C4824329A86F45AEE6BF49D7C5D8C7605E8E1A5481136AC0C3CEDADE9FE2B8A513FFA
3,130,572 UART: [art] PUB.Y = 562A396C84A8BF96C109EC7EA48D308F892627E8E0C9CD4F70D0D9322CCB21513164C664978F1DDEA8EB998F4A5A1243
3,137,525 UART: [art] SIG.R = 094E182B37E119E2AE477F3BCA39690ECA828751DB7262BEA3DD2BC3BAF2EEAE41CEE3C05C4745156494C895EA9F2B13
3,144,305 UART: [art] SIG.S = BE96D90E5EA21FC3F2A7EFBD8A65795D7C12A94154927BEDA3A2E4591E1064E52A5A0FD1A05E94D94D11536A65294707
3,168,461 UART: Caliptra RT
3,168,715 UART: [state] CFI Enabled
3,276,455 UART: [rt] RT listening for mailbox commands...
3,277,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,842 UART: [rt]cmd =0x41544d4e, len=14344
3,544,793 >>> mbox cmd response data (8 bytes)
3,544,794 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,907 UART: [rt]cmd =0x41545348, len=116
3,576,650 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 ready_for_fw is high
1,059,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,537 >>> mbox cmd response: success
2,687,995 UART:
2,688,011 UART: Running Caliptra FMC ...
2,688,419 UART:
2,688,473 UART: [state] CFI Enabled
2,699,032 UART: [fht] FMC Alias Private Key: 7
2,807,445 UART: [art] Extend RT PCRs Done
2,807,873 UART: [art] Lock RT PCRs Done
2,809,215 UART: [art] Populate DV Done
2,817,650 UART: [fht] FMC Alias Private Key: 7
2,818,790 UART: [art] Derive CDI
2,819,070 UART: [art] Store in in slot 0x4
2,904,931 UART: [art] Derive Key Pair
2,905,291 UART: [art] Store priv key in slot 0x5
2,918,297 UART: [art] Derive Key Pair - Done
2,932,951 UART: [art] Signing Cert with AUTHO
2,933,431 UART: RITY.KEYID = 7
2,948,461 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,226 UART: [art] PUB.X = F8DCFAE603ABF45E45E51544FD99FBBD9E7247E3B4EB75FA4AE159FD8625AC8730B89CEA1FC85CEB1D73E25663A31F5C
2,956,019 UART: [art] PUB.Y = 776BA8336093A8F7AD5E59F3CFA75DD94AE802B45E916C26F23A7473E84C349662CE92EC180A6666FBEAB7284F69C829
2,962,969 UART: [art] SIG.R = EA7D3F2810A4F3E02CEBBE249367D9DB1C1D7A55DBF61BEA0A5B4B937E71336EE942D42C41AA2724908525E319991FC8
2,969,748 UART: [art] SIG.S = AD6DC1F44F2165EEC48549D8DB014EC45710B9F2B44B4E7311337CB34D35B069777E5EB4619D7D4257C2B255D65B8F69
2,993,952 UART: Caliptra RT
2,994,206 UART: [state] CFI Enabled
3,102,211 UART: [rt] RT listening for mailbox commands...
3,102,881 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,550 UART: [rt]cmd =0x41544d4e, len=14344
3,370,586 >>> mbox cmd response data (8 bytes)
3,370,587 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,722 UART: [rt]cmd =0x41545348, len=116
3,422,681 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,279 ready_for_fw is high
1,060,279 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,193 >>> mbox cmd response: success
2,688,531 UART:
2,688,547 UART: Running Caliptra FMC ...
2,688,955 UART:
2,689,009 UART: [state] CFI Enabled
2,699,628 UART: [fht] FMC Alias Private Key: 7
2,807,929 UART: [art] Extend RT PCRs Done
2,808,357 UART: [art] Lock RT PCRs Done
2,809,721 UART: [art] Populate DV Done
2,818,218 UART: [fht] FMC Alias Private Key: 7
2,819,234 UART: [art] Derive CDI
2,819,514 UART: [art] Store in in slot 0x4
2,905,841 UART: [art] Derive Key Pair
2,906,201 UART: [art] Store priv key in slot 0x5
2,919,011 UART: [art] Derive Key Pair - Done
2,933,754 UART: [art] Signing Cert with AUTHO
2,934,234 UART: RITY.KEYID = 7
2,949,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,277 UART: [art] PUB.X = A826D1044A69ADADD5DE96CF1D1D4BC73722A0D6FB22E303CF45C53BB2F4605F854477B2973D74FEA49F3D08A278F77B
2,957,052 UART: [art] PUB.Y = E053736C4C25E3A82C533CF3D3F8B4B7FC8491088C3EF6A35EE3D1E59D0E9D9223AF1F10291F84052F108F9F72E41A82
2,963,999 UART: [art] SIG.R = 706225AE9F2D1110E54F584325090D183FB9AB3B36B8245C7FA09519171B58482C9232706874939D6A5BEA8D8551DF0D
2,970,752 UART: [art] SIG.S = A5F20475E6E293604F291B1307F5636788F31CA87BA864FE6838AEF5A393B8AE395F4D13D16B5A96E10E1B9AB54A428D
2,994,768 UART: Caliptra RT
2,995,022 UART: [state] CFI Enabled
3,102,952 UART: [rt] RT listening for mailbox commands...
3,103,622 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,363 UART: [rt]cmd =0x41544d4e, len=14344
3,371,018 >>> mbox cmd response data (8 bytes)
3,371,019 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,162 UART: [rt]cmd =0x41545348, len=116
3,402,915 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
893,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,930 UART: [kat] ++
898,082 UART: [kat] sha1
902,572 UART: [kat] SHA2-256
904,512 UART: [kat] SHA2-384
907,331 UART: [kat] SHA2-512-ACC
909,232 UART: [kat] ECC-384
919,041 UART: [kat] HMAC-384Kdf
923,645 UART: [kat] LMS
1,171,973 UART: [kat] --
1,172,854 UART: [cold-reset] ++
1,173,348 UART: [fht] FHT @ 0x50003400
1,175,835 UART: [idev] ++
1,176,003 UART: [idev] CDI.KEYID = 6
1,176,363 UART: [idev] SUBJECT.KEYID = 7
1,176,787 UART: [idev] UDS.KEYID = 0
1,177,132 ready_for_fw is high
1,177,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,869 UART: [idev] Erasing UDS.KEYID = 0
1,202,624 UART: [idev] Sha1 KeyId Algorithm
1,210,876 UART: [idev] --
1,211,952 UART: [ldev] ++
1,212,120 UART: [ldev] CDI.KEYID = 6
1,212,483 UART: [ldev] SUBJECT.KEYID = 5
1,212,909 UART: [ldev] AUTHORITY.KEYID = 7
1,213,372 UART: [ldev] FE.KEYID = 1
1,218,556 UART: [ldev] Erasing FE.KEYID = 1
1,244,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,526 UART: [ldev] --
1,283,961 UART: [fwproc] Wait for Commands...
1,284,659 UART: [fwproc] Recv command 0x46574c44
1,285,387 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,082 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,217 >>> mbox cmd response: success
2,777,343 UART: [afmc] ++
2,777,511 UART: [afmc] CDI.KEYID = 6
2,777,873 UART: [afmc] SUBJECT.KEYID = 7
2,778,298 UART: [afmc] AUTHORITY.KEYID = 5
2,813,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,082 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,695 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,414 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,412 UART: [afmc] --
2,857,428 UART: [cold-reset] --
2,858,192 UART: [state] Locking Datavault
2,859,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,977 UART: [state] Locking ICCM
2,860,485 UART: [exit] Launching FMC @ 0x40000130
2,865,814 UART:
2,865,830 UART: Running Caliptra FMC ...
2,866,238 UART:
2,866,381 UART: [state] CFI Enabled
2,876,840 UART: [fht] FMC Alias Private Key: 7
2,984,683 UART: [art] Extend RT PCRs Done
2,985,111 UART: [art] Lock RT PCRs Done
2,986,359 UART: [art] Populate DV Done
2,994,682 UART: [fht] FMC Alias Private Key: 7
2,995,790 UART: [art] Derive CDI
2,996,070 UART: [art] Store in in slot 0x4
3,081,881 UART: [art] Derive Key Pair
3,082,241 UART: [art] Store priv key in slot 0x5
3,095,485 UART: [art] Derive Key Pair - Done
3,109,967 UART: [art] Signing Cert with AUTHO
3,110,447 UART: RITY.KEYID = 7
3,125,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,608 UART: [art] PUB.X = D0D6AB29136E1D1B757B0B4F7CBB10E60043511F1D1CEE214040ED815164C4E28C1DC46F51E180226716BCE4190BF521
3,133,354 UART: [art] PUB.Y = B9B05978A1F9720535EC61BC27C025D2EAF5DBD2B651B09DE2B24C999D9E7268995F08C09974C66FEBF9EA19C46CA4E9
3,140,310 UART: [art] SIG.R = D926AC1560AB3D492186EE3A8CAD2DC5ECA9D48FCFD74EDF07AFA5295BA166B6A210A3C11169A4BD8EFD2C3C52B9B4CC
3,147,107 UART: [art] SIG.S = B9B4E708D429662B29AB117819046D48F525C07825D0FA98B2E2EED480E953C0A7E0D1F95468D51A1B24B179434B69C0
3,170,624 UART: Caliptra RT
3,170,970 UART: [state] CFI Enabled
3,277,921 UART: [rt] RT listening for mailbox commands...
3,278,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,206 UART: [rt]cmd =0x41544d4e, len=14344
3,545,676 >>> mbox cmd response data (8 bytes)
3,545,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,714 UART: [rt]cmd =0x41545348, len=116
3,598,583 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,479 UART: [kat] SHA2-256
893,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,254 UART: [kat] ++
897,406 UART: [kat] sha1
901,472 UART: [kat] SHA2-256
903,412 UART: [kat] SHA2-384
906,163 UART: [kat] SHA2-512-ACC
908,064 UART: [kat] ECC-384
917,961 UART: [kat] HMAC-384Kdf
922,469 UART: [kat] LMS
1,170,797 UART: [kat] --
1,171,338 UART: [cold-reset] ++
1,171,812 UART: [fht] FHT @ 0x50003400
1,174,631 UART: [idev] ++
1,174,799 UART: [idev] CDI.KEYID = 6
1,175,159 UART: [idev] SUBJECT.KEYID = 7
1,175,583 UART: [idev] UDS.KEYID = 0
1,175,928 ready_for_fw is high
1,175,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,706 UART: [idev] --
1,210,674 UART: [ldev] ++
1,210,842 UART: [ldev] CDI.KEYID = 6
1,211,205 UART: [ldev] SUBJECT.KEYID = 5
1,211,631 UART: [ldev] AUTHORITY.KEYID = 7
1,212,094 UART: [ldev] FE.KEYID = 1
1,217,262 UART: [ldev] Erasing FE.KEYID = 1
1,243,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,894 UART: [ldev] --
1,283,273 UART: [fwproc] Wait for Commands...
1,284,097 UART: [fwproc] Recv command 0x46574c44
1,284,825 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,365 >>> mbox cmd response: success
2,775,557 UART: [afmc] ++
2,775,725 UART: [afmc] CDI.KEYID = 6
2,776,087 UART: [afmc] SUBJECT.KEYID = 7
2,776,512 UART: [afmc] AUTHORITY.KEYID = 5
2,812,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,013 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,732 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,516 UART: [afmc] --
2,855,634 UART: [cold-reset] --
2,856,372 UART: [state] Locking Datavault
2,857,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,329 UART: [state] Locking ICCM
2,858,805 UART: [exit] Launching FMC @ 0x40000130
2,864,134 UART:
2,864,150 UART: Running Caliptra FMC ...
2,864,558 UART:
2,864,701 UART: [state] CFI Enabled
2,875,630 UART: [fht] FMC Alias Private Key: 7
2,983,563 UART: [art] Extend RT PCRs Done
2,983,991 UART: [art] Lock RT PCRs Done
2,985,489 UART: [art] Populate DV Done
2,993,766 UART: [fht] FMC Alias Private Key: 7
2,994,718 UART: [art] Derive CDI
2,994,998 UART: [art] Store in in slot 0x4
3,081,093 UART: [art] Derive Key Pair
3,081,453 UART: [art] Store priv key in slot 0x5
3,094,157 UART: [art] Derive Key Pair - Done
3,108,935 UART: [art] Signing Cert with AUTHO
3,109,415 UART: RITY.KEYID = 7
3,124,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,480 UART: [art] PUB.X = C6D55CEFF02B35C9C4BC53B862F3202431D2CB9A7300E538B4A64573F1DBF343B11A3F4A9959F677A81AAF955C7CF727
3,132,238 UART: [art] PUB.Y = 273342BD34510DA46B6820E82CFA10E2ECE016177823740ACDFB9B992B57FC647BD647BB259244667A1A37C870F10FDD
3,139,183 UART: [art] SIG.R = 92648E3FDE225670AB11A4321140F9CF5B39AC41E19C39783D7CE7B0D366F2878A4F8C6CFA83CD52CCE8DB1AD3A88D4A
3,145,969 UART: [art] SIG.S = 0CCF6BBD6DCBA97653289F555622D53039E089346D7C00A51A426120845F45EBA594EFFEC826BE951BD8C0A27C4EB7EE
3,169,157 UART: Caliptra RT
3,169,503 UART: [state] CFI Enabled
3,277,407 UART: [rt] RT listening for mailbox commands...
3,278,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,018 UART: [rt]cmd =0x41544d4e, len=14344
3,545,649 >>> mbox cmd response data (8 bytes)
3,545,650 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,767 UART: [rt]cmd =0x41545348, len=116
3,577,830 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,708 ready_for_fw is high
1,059,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,398 >>> mbox cmd response: success
2,688,912 UART:
2,688,928 UART: Running Caliptra FMC ...
2,689,336 UART:
2,689,479 UART: [state] CFI Enabled
2,700,024 UART: [fht] FMC Alias Private Key: 7
2,807,985 UART: [art] Extend RT PCRs Done
2,808,413 UART: [art] Lock RT PCRs Done
2,809,883 UART: [art] Populate DV Done
2,818,276 UART: [fht] FMC Alias Private Key: 7
2,819,332 UART: [art] Derive CDI
2,819,612 UART: [art] Store in in slot 0x4
2,905,399 UART: [art] Derive Key Pair
2,905,759 UART: [art] Store priv key in slot 0x5
2,919,089 UART: [art] Derive Key Pair - Done
2,933,941 UART: [art] Signing Cert with AUTHO
2,934,421 UART: RITY.KEYID = 7
2,949,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,664 UART: [art] PUB.X = A32A6E08680E74E6651759178EC458C259C0323D2338B2A8CCA783BDFC2CE8C1D9B213C589219EABA078DFF65CCC47D0
2,957,438 UART: [art] PUB.Y = D47827AE1D19398E46BD7146019F5DF92A5434F66D80783D9938212CFA89775645A74D0F32049A2BD1AF2E33360B09C0
2,964,367 UART: [art] SIG.R = 224AFD0FE703E56B46F7004AB281457AE0027571CDCBE60B7C1A056BF0DD93579BAD54711341D8D5B42AA6302426C138
2,971,104 UART: [art] SIG.S = 4CE09C47272444F76CE7D5B31AF1898F38E4904E23B15D94C796401C85523860C9AA19DC0721BF9A5E3809FED46F27EA
2,994,909 UART: Caliptra RT
2,995,255 UART: [state] CFI Enabled
3,102,879 UART: [rt] RT listening for mailbox commands...
3,103,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,484 UART: [rt]cmd =0x41544d4e, len=14344
3,370,968 >>> mbox cmd response data (8 bytes)
3,370,969 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,192 UART: [rt]cmd =0x41545348, len=116
3,423,767 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,258 ready_for_fw is high
1,061,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,142 >>> mbox cmd response: success
2,689,470 UART:
2,689,486 UART: Running Caliptra FMC ...
2,689,894 UART:
2,690,037 UART: [state] CFI Enabled
2,700,624 UART: [fht] FMC Alias Private Key: 7
2,809,739 UART: [art] Extend RT PCRs Done
2,810,167 UART: [art] Lock RT PCRs Done
2,811,955 UART: [art] Populate DV Done
2,820,216 UART: [fht] FMC Alias Private Key: 7
2,821,378 UART: [art] Derive CDI
2,821,658 UART: [art] Store in in slot 0x4
2,906,889 UART: [art] Derive Key Pair
2,907,249 UART: [art] Store priv key in slot 0x5
2,920,181 UART: [art] Derive Key Pair - Done
2,934,715 UART: [art] Signing Cert with AUTHO
2,935,195 UART: RITY.KEYID = 7
2,950,293 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,058 UART: [art] PUB.X = 45DDCD53995EC2839199EC846CE3BFBFE198B1026E615CDE377D954D431846DED9791978C4275F295217BCDDB074ABD3
2,957,833 UART: [art] PUB.Y = 91D69D905EBC58FAF861B8B58A25D992856302C46CD64C9D185FEC4683ED2EF955E63503359DFC9D333570F3B5930D13
2,964,776 UART: [art] SIG.R = 8FC079ACA475424BF891879D4242BAAF06586A4B3CA6BE7716357A72C79A37A705A741F4A92532C09727A88ADF4D29E6
2,971,542 UART: [art] SIG.S = 1EC2ABDC7D72C95530EC4370314D4930B1249E248D0806346A472F17307C65EE7A4B67B6B6E83987A4BC1580A22589C5
2,995,143 UART: Caliptra RT
2,995,489 UART: [state] CFI Enabled
3,101,811 UART: [rt] RT listening for mailbox commands...
3,102,481 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,212 UART: [rt]cmd =0x41544d4e, len=14344
3,370,169 >>> mbox cmd response data (8 bytes)
3,370,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,409 UART: [rt]cmd =0x41545348, len=116
3,402,544 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
920,976 UART: [kat] LMS
1,169,288 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 ready_for_fw is high
1,174,605 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,219 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,820 UART: [ldev] ++
1,208,988 UART: [ldev] CDI.KEYID = 6
1,209,352 UART: [ldev] SUBJECT.KEYID = 5
1,209,779 UART: [ldev] AUTHORITY.KEYID = 7
1,210,242 UART: [ldev] FE.KEYID = 1
1,215,398 UART: [ldev] Erasing FE.KEYID = 1
1,241,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,164 UART: [ldev] --
1,281,502 UART: [fwproc] Wait for Commands...
1,282,181 UART: [fwproc] Recv command 0x46574c44
1,282,914 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,916 >>> mbox cmd response: success
2,775,119 UART: [afmc] ++
2,775,287 UART: [afmc] CDI.KEYID = 6
2,775,650 UART: [afmc] SUBJECT.KEYID = 7
2,776,076 UART: [afmc] AUTHORITY.KEYID = 5
2,810,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,755 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,638 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,357 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,990 UART: [afmc] --
2,854,110 UART: [cold-reset] --
2,855,004 UART: [state] Locking Datavault
2,856,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,633 UART: [state] Locking ICCM
2,857,169 UART: [exit] Launching FMC @ 0x40000130
2,862,498 UART:
2,862,514 UART: Running Caliptra FMC ...
2,862,922 UART:
2,862,976 UART: [state] CFI Enabled
2,873,299 UART: [fht] FMC Alias Private Key: 7
2,981,036 UART: [art] Extend RT PCRs Done
2,981,464 UART: [art] Lock RT PCRs Done
2,982,826 UART: [art] Populate DV Done
2,991,131 UART: [fht] FMC Alias Private Key: 7
2,992,205 UART: [art] Derive CDI
2,992,485 UART: [art] Store in in slot 0x4
3,077,880 UART: [art] Derive Key Pair
3,078,240 UART: [art] Store priv key in slot 0x5
3,091,232 UART: [art] Derive Key Pair - Done
3,105,735 UART: [art] Signing Cert with AUTHO
3,106,215 UART: RITY.KEYID = 7
3,121,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,106 UART: [art] PUB.X = B73D890BABCF0B6C31F802AB7C8396701CFA14700DD6A06B48C62BE483133E9A1464F488A54744CFA8EF9B75A3752D52
3,128,872 UART: [art] PUB.Y = F06D4C0F7F207AA90FC75DE35DFD33BD8D37222C43A15AE9F296033A5EB99CA33221733DC274C2781F148B5603D9A127
3,135,816 UART: [art] SIG.R = D38AF457059B0A6E13841EF5B59792F21016237669DB9599F1047FACFD389A260BF61A9485F4E34E2826632C7853F0E1
3,142,568 UART: [art] SIG.S = 1134C726A01BDC67D6B9A7321D59D13CC0C86270C48435C672AD19A7E348A5AA891DDED6CD24FFAF626739ABD03F13B7
3,166,081 UART: Caliptra RT
3,166,335 UART: [state] CFI Enabled
3,274,121 UART: [rt] RT listening for mailbox commands...
3,274,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,460 UART: [rt]cmd =0x41544d4e, len=14344
3,542,694 >>> mbox cmd response data (8 bytes)
3,542,695 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,626 UART: [rt]cmd =0x41545348, len=116
3,594,463 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,416 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 ready_for_fw is high
1,174,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,216,060 UART: [ldev] Erasing FE.KEYID = 1
1,242,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,278 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,172 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,916 >>> mbox cmd response: success
2,775,001 UART: [afmc] ++
2,775,169 UART: [afmc] CDI.KEYID = 6
2,775,532 UART: [afmc] SUBJECT.KEYID = 7
2,775,958 UART: [afmc] AUTHORITY.KEYID = 5
2,811,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,614 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,150 UART: [afmc] --
2,855,056 UART: [cold-reset] --
2,855,840 UART: [state] Locking Datavault
2,856,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,573 UART: [state] Locking ICCM
2,858,173 UART: [exit] Launching FMC @ 0x40000130
2,863,502 UART:
2,863,518 UART: Running Caliptra FMC ...
2,863,926 UART:
2,863,980 UART: [state] CFI Enabled
2,874,461 UART: [fht] FMC Alias Private Key: 7
2,982,140 UART: [art] Extend RT PCRs Done
2,982,568 UART: [art] Lock RT PCRs Done
2,983,918 UART: [art] Populate DV Done
2,991,983 UART: [fht] FMC Alias Private Key: 7
2,993,023 UART: [art] Derive CDI
2,993,303 UART: [art] Store in in slot 0x4
3,078,774 UART: [art] Derive Key Pair
3,079,134 UART: [art] Store priv key in slot 0x5
3,092,460 UART: [art] Derive Key Pair - Done
3,107,185 UART: [art] Signing Cert with AUTHO
3,107,665 UART: RITY.KEYID = 7
3,122,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,760 UART: [art] PUB.X = 0FD8C9AA9B59A679FC77F69041903F50F3F96C88381295C3397771C82C961FF5A64BBED53383C0E4EEED94559818825F
3,130,527 UART: [art] PUB.Y = A0191EF11068A9010A01FA6E3876510AC6980E6FFDC970C03F1AD6DF7954C950AF24DD4071E5CECC582991BAA95B6A34
3,137,472 UART: [art] SIG.R = 2477B440C182D7226879EF97812BA1ABDE53C44E0EA21C11F99DC567D4856930EDF7A57803174AEBE2923FE5CD347A57
3,144,240 UART: [art] SIG.S = 44D2700F2315FE15AB9D9434ACB73C0F40C75968947D3FC244E372EB4D40DF7417D5267367BA9103C2A5584E9F8E5A77
3,167,928 UART: Caliptra RT
3,168,182 UART: [state] CFI Enabled
3,275,164 UART: [rt] RT listening for mailbox commands...
3,275,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,669 UART: [rt]cmd =0x41544d4e, len=14344
3,543,154 >>> mbox cmd response data (8 bytes)
3,543,155 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,318 UART: [rt]cmd =0x41545348, len=116
3,575,381 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,098 ready_for_fw is high
1,056,098 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,188 >>> mbox cmd response: success
2,683,722 UART:
2,683,738 UART: Running Caliptra FMC ...
2,684,146 UART:
2,684,200 UART: [state] CFI Enabled
2,694,967 UART: [fht] FMC Alias Private Key: 7
2,802,898 UART: [art] Extend RT PCRs Done
2,803,326 UART: [art] Lock RT PCRs Done
2,804,684 UART: [art] Populate DV Done
2,812,849 UART: [fht] FMC Alias Private Key: 7
2,813,965 UART: [art] Derive CDI
2,814,245 UART: [art] Store in in slot 0x4
2,899,778 UART: [art] Derive Key Pair
2,900,138 UART: [art] Store priv key in slot 0x5
2,913,092 UART: [art] Derive Key Pair - Done
2,927,827 UART: [art] Signing Cert with AUTHO
2,928,307 UART: RITY.KEYID = 7
2,943,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,802 UART: [art] PUB.X = C36DCAEF041C4D3F4D3BC1E80E3B9A2DD3F36963884B3709C2D7219C327EFD60808B5D57C400DC647DBD4F652A183821
2,950,551 UART: [art] PUB.Y = 2A9B64F9909C43D7FE9EF3F6E58014861552F3B765D7AD7C3CD26E98A71232A3CE85E4F5D692B03D08E778DDA18BEF1D
2,957,510 UART: [art] SIG.R = 2C9641F45818F3D3D4ED55FA6F38CEDCB2CBAEB689C490854809B0FD1EBA4B563AD0F62EEDC7012F55DF8267922BF061
2,964,292 UART: [art] SIG.S = DB23107DB7CA8E14D6C988709E24BF448678A652909E7AC726091CE174032D75847F2EB70B58FB4865A081889C5B90C5
2,987,628 UART: Caliptra RT
2,987,882 UART: [state] CFI Enabled
3,094,888 UART: [rt] RT listening for mailbox commands...
3,095,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,327 UART: [rt]cmd =0x41544d4e, len=14344
3,362,741 >>> mbox cmd response data (8 bytes)
3,362,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,587 UART: [rt]cmd =0x41545348, len=116
3,414,194 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,304 ready_for_fw is high
1,055,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,414 >>> mbox cmd response: success
2,685,920 UART:
2,685,936 UART: Running Caliptra FMC ...
2,686,344 UART:
2,686,398 UART: [state] CFI Enabled
2,697,107 UART: [fht] FMC Alias Private Key: 7
2,804,496 UART: [art] Extend RT PCRs Done
2,804,924 UART: [art] Lock RT PCRs Done
2,806,320 UART: [art] Populate DV Done
2,814,639 UART: [fht] FMC Alias Private Key: 7
2,815,777 UART: [art] Derive CDI
2,816,057 UART: [art] Store in in slot 0x4
2,901,430 UART: [art] Derive Key Pair
2,901,790 UART: [art] Store priv key in slot 0x5
2,915,030 UART: [art] Derive Key Pair - Done
2,929,761 UART: [art] Signing Cert with AUTHO
2,930,241 UART: RITY.KEYID = 7
2,945,369 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,134 UART: [art] PUB.X = 684C0AA85D68DC06039F420B37201F6C77DC20A80CBF5821503E1E9A78C7CA1EE2E400E27103733BE4421EF575A66318
2,952,864 UART: [art] PUB.Y = C0E7D3899B6CE560FCDEFB7FA608FF983A751AC7DB6687E94CF205193427BB2176E5C8D4F3EA089D6B59BB7FEB28A283
2,959,823 UART: [art] SIG.R = A0C991452488C3B61EC4F69CE343F4F5B2FBBEE3AD91A3EA0F8831640305CD5F623B5410EDBC46C8F7B2457A474456D3
2,966,594 UART: [art] SIG.S = 927896C14AC0BF75BF532A561D4A9492AA74D69461153BA9E37C42C92C34DDFE11D3CD9F7E6C45A076468E4830629D04
2,990,250 UART: Caliptra RT
2,990,504 UART: [state] CFI Enabled
3,098,075 UART: [rt] RT listening for mailbox commands...
3,098,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,710 UART: [rt]cmd =0x41544d4e, len=14344
3,366,385 >>> mbox cmd response data (8 bytes)
3,366,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,691 UART: [rt]cmd =0x41545348, len=116
3,398,546 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,317 UART: [kat] LMS
1,169,629 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,958 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 ready_for_fw is high
1,174,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,637 UART: [ldev] --
1,281,145 UART: [fwproc] Wait for Commands...
1,281,774 UART: [fwproc] Recv command 0x46574c44
1,282,507 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,626 >>> mbox cmd response: success
2,773,841 UART: [afmc] ++
2,774,009 UART: [afmc] CDI.KEYID = 6
2,774,372 UART: [afmc] SUBJECT.KEYID = 7
2,774,798 UART: [afmc] AUTHORITY.KEYID = 5
2,810,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,790 UART: [afmc] --
2,853,858 UART: [cold-reset] --
2,854,722 UART: [state] Locking Datavault
2,855,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,591 UART: [state] Locking ICCM
2,857,173 UART: [exit] Launching FMC @ 0x40000130
2,862,502 UART:
2,862,518 UART: Running Caliptra FMC ...
2,862,926 UART:
2,863,069 UART: [state] CFI Enabled
2,873,850 UART: [fht] FMC Alias Private Key: 7
2,981,589 UART: [art] Extend RT PCRs Done
2,982,017 UART: [art] Lock RT PCRs Done
2,983,393 UART: [art] Populate DV Done
2,991,656 UART: [fht] FMC Alias Private Key: 7
2,992,638 UART: [art] Derive CDI
2,992,918 UART: [art] Store in in slot 0x4
3,078,611 UART: [art] Derive Key Pair
3,078,971 UART: [art] Store priv key in slot 0x5
3,091,707 UART: [art] Derive Key Pair - Done
3,106,628 UART: [art] Signing Cert with AUTHO
3,107,108 UART: RITY.KEYID = 7
3,122,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,361 UART: [art] PUB.X = 4D5F93BD724BDCCC5DE28539D92469E59DA83BA4381882BBC3408D4D02C6093039E3F71E1A768E610400B0CDC0B012F0
3,130,106 UART: [art] PUB.Y = 3F08248D2069900EAB56BC250DECDB47A92C6E6B78D8F09D60BA9A526466E3728BA0EEDD518DE3C3C3B1558E8817FE1E
3,137,061 UART: [art] SIG.R = 42056AF801614D69E6979B219C514D08FD1E758D88A2FACD4CFB3CB4DA8AC69E175FBB5D0730B79327013BD1BB884076
3,143,824 UART: [art] SIG.S = EDBAF9A97DAE1F36D9E4C90C7C6B9B2F118836096DE4929D982F21E048E73CBF3D8E951B6FD7BACB71E7C0F8DEE72BEA
3,167,939 UART: Caliptra RT
3,168,285 UART: [state] CFI Enabled
3,277,275 UART: [rt] RT listening for mailbox commands...
3,277,945 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,716 UART: [rt]cmd =0x41544d4e, len=14344
3,545,354 >>> mbox cmd response data (8 bytes)
3,545,355 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,580 UART: [rt]cmd =0x41545348, len=116
3,597,393 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,362 UART: [kat] SHA2-256
902,302 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 ready_for_fw is high
1,174,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Sha1 KeyId Algorithm
1,207,618 UART: [idev] --
1,208,687 UART: [ldev] ++
1,208,855 UART: [ldev] CDI.KEYID = 6
1,209,219 UART: [ldev] SUBJECT.KEYID = 5
1,209,646 UART: [ldev] AUTHORITY.KEYID = 7
1,210,109 UART: [ldev] FE.KEYID = 1
1,215,151 UART: [ldev] Erasing FE.KEYID = 1
1,241,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,285 UART: [ldev] --
1,280,641 UART: [fwproc] Wait for Commands...
1,281,284 UART: [fwproc] Recv command 0x46574c44
1,282,017 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,005 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,783 >>> mbox cmd response: success
2,772,802 UART: [afmc] ++
2,772,970 UART: [afmc] CDI.KEYID = 6
2,773,333 UART: [afmc] SUBJECT.KEYID = 7
2,773,759 UART: [afmc] AUTHORITY.KEYID = 5
2,809,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,811 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,253 UART: [afmc] --
2,853,209 UART: [cold-reset] --
2,853,929 UART: [state] Locking Datavault
2,855,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,822 UART: [state] Locking ICCM
2,856,304 UART: [exit] Launching FMC @ 0x40000130
2,861,633 UART:
2,861,649 UART: Running Caliptra FMC ...
2,862,057 UART:
2,862,200 UART: [state] CFI Enabled
2,872,967 UART: [fht] FMC Alias Private Key: 7
2,980,300 UART: [art] Extend RT PCRs Done
2,980,728 UART: [art] Lock RT PCRs Done
2,982,496 UART: [art] Populate DV Done
2,990,999 UART: [fht] FMC Alias Private Key: 7
2,992,005 UART: [art] Derive CDI
2,992,285 UART: [art] Store in in slot 0x4
3,078,098 UART: [art] Derive Key Pair
3,078,458 UART: [art] Store priv key in slot 0x5
3,091,914 UART: [art] Derive Key Pair - Done
3,106,571 UART: [art] Signing Cert with AUTHO
3,107,051 UART: RITY.KEYID = 7
3,122,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,136 UART: [art] PUB.X = 8ECD5266E717E5DAF6D69D2598D761C327BDC44F08DCC429BF3131D8EBD889A77CBED93AE10DE72834D9B726B0468594
3,129,912 UART: [art] PUB.Y = 238028B9AB31DAEEE8C889BCAB7659D7FA4A67A3F724474864FA9E507C769AFD9D8197BE6360FD80C31B16B13AC7A263
3,136,874 UART: [art] SIG.R = 357225CF5458B8AD8E4806F015B939C7AAC34C5515F981CF3584DA9535A2B5A26541367CE8CB681F240D77A963DDC813
3,143,638 UART: [art] SIG.S = D3BF739E94EC0F15398B8B0380A2528AAFB45F673DBEAB15285F2B7D2832980DCDC5D5E1486CD319F82630049A9D2358
3,167,385 UART: Caliptra RT
3,167,731 UART: [state] CFI Enabled
3,275,571 UART: [rt] RT listening for mailbox commands...
3,276,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,884 UART: [rt]cmd =0x41544d4e, len=14344
3,544,015 >>> mbox cmd response data (8 bytes)
3,544,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,829 UART: [rt]cmd =0x41545348, len=116
3,575,818 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,183 ready_for_fw is high
1,056,183 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,491 >>> mbox cmd response: success
2,683,839 UART:
2,683,855 UART: Running Caliptra FMC ...
2,684,263 UART:
2,684,406 UART: [state] CFI Enabled
2,695,063 UART: [fht] FMC Alias Private Key: 7
2,803,158 UART: [art] Extend RT PCRs Done
2,803,586 UART: [art] Lock RT PCRs Done
2,805,552 UART: [art] Populate DV Done
2,814,097 UART: [fht] FMC Alias Private Key: 7
2,815,251 UART: [art] Derive CDI
2,815,531 UART: [art] Store in in slot 0x4
2,901,036 UART: [art] Derive Key Pair
2,901,396 UART: [art] Store priv key in slot 0x5
2,914,756 UART: [art] Derive Key Pair - Done
2,929,618 UART: [art] Signing Cert with AUTHO
2,930,098 UART: RITY.KEYID = 7
2,945,212 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,977 UART: [art] PUB.X = B0B22CDC6C55D5024B2FDD216D21B2D1010D30841EB640DAFEE5AA7F437ECDEB26E9D346CB0C73CEAA7A4E9303F2648E
2,952,756 UART: [art] PUB.Y = 586C4F009DC0BD59268F424E535EC498DBBCCABD3BA3A428E0B9037A136E597E30572572A1C714B898B099D5AF055D50
2,959,684 UART: [art] SIG.R = 8E4F86C1C424E3FD283A9337CAD8E85C1C99BD3B4E6153C10F67EF98537803D60DD467EF763AC03A282A533329017074
2,966,442 UART: [art] SIG.S = F9735D24AF7759AFB7BA5EE0F54B02E6B1A11BC794C14D945268F8B3C7ECDEDC121243CBE29A56874EE4ECB9DFBDE549
2,990,248 UART: Caliptra RT
2,990,594 UART: [state] CFI Enabled
3,098,483 UART: [rt] RT listening for mailbox commands...
3,099,153 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,962 UART: [rt]cmd =0x41544d4e, len=14344
3,366,814 >>> mbox cmd response data (8 bytes)
3,366,815 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,022 UART: [rt]cmd =0x41545348, len=116
3,418,861 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,961 ready_for_fw is high
1,056,961 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,045 >>> mbox cmd response: success
2,686,035 UART:
2,686,051 UART: Running Caliptra FMC ...
2,686,459 UART:
2,686,602 UART: [state] CFI Enabled
2,697,333 UART: [fht] FMC Alias Private Key: 7
2,806,138 UART: [art] Extend RT PCRs Done
2,806,566 UART: [art] Lock RT PCRs Done
2,807,916 UART: [art] Populate DV Done
2,816,079 UART: [fht] FMC Alias Private Key: 7
2,817,203 UART: [art] Derive CDI
2,817,483 UART: [art] Store in in slot 0x4
2,903,180 UART: [art] Derive Key Pair
2,903,540 UART: [art] Store priv key in slot 0x5
2,916,624 UART: [art] Derive Key Pair - Done
2,931,501 UART: [art] Signing Cert with AUTHO
2,931,981 UART: RITY.KEYID = 7
2,947,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,340 UART: [art] PUB.X = 4FEB0E84504239F066E1B64D97ACAF83C5F7CC2A4521351DAD83CA6F2720EF22FC6330DE108B701911B43EF08C836883
2,955,113 UART: [art] PUB.Y = AB2EC545F3ECE61568D67B065B177757853D52331C1FE698218D127B9DCD4C88B6284E47228BC7BBF2E1B108A6681412
2,962,057 UART: [art] SIG.R = B80EFADF2C4C3663E0CB4102B20BD31F672CC0A387F76CD986C9F615A2DA6A4A7D15CCAD4727FEA5D2497BA24C9BB99C
2,968,842 UART: [art] SIG.S = CEEDA7C7FB0C192A984E48AB7D5549D26EB75D4E4B517E4151D81ED7BB0259078C3FB47DCCAE864281BF05DD6CB1EEDD
2,992,717 UART: Caliptra RT
2,993,063 UART: [state] CFI Enabled
3,099,948 UART: [rt] RT listening for mailbox commands...
3,100,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,311 UART: [rt]cmd =0x41544d4e, len=14344
3,368,082 >>> mbox cmd response data (8 bytes)
3,368,083 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,212 UART: [rt]cmd =0x41545348, len=116
3,399,957 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,418 UART:
192,787 UART: Running Caliptra ROM ...
193,915 UART:
194,054 UART: [state] CFI Enabled
262,371 UART: [state] LifecycleState = Unprovisioned
264,307 UART: [state] DebugLocked = No
265,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,125 UART: [kat] SHA2-256
440,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,345 UART: [kat] ++
451,818 UART: [kat] sha1
462,900 UART: [kat] SHA2-256
465,616 UART: [kat] SHA2-384
471,536 UART: [kat] SHA2-512-ACC
473,968 UART: [kat] ECC-384
2,769,218 UART: [kat] HMAC-384Kdf
2,799,979 UART: [kat] LMS
3,990,282 UART: [kat] --
3,994,344 UART: [cold-reset] ++
3,996,408 UART: [fht] Storing FHT @ 0x50003400
4,007,876 UART: [idev] ++
4,008,435 UART: [idev] CDI.KEYID = 6
4,009,411 UART: [idev] SUBJECT.KEYID = 7
4,010,650 UART: [idev] UDS.KEYID = 0
4,011,623 ready_for_fw is high
4,011,819 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,230 UART: [idev] Erasing UDS.KEYID = 0
7,347,849 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,607 UART: [idev] --
7,374,352 UART: [ldev] ++
7,374,915 UART: [ldev] CDI.KEYID = 6
7,375,900 UART: [ldev] SUBJECT.KEYID = 5
7,377,117 UART: [ldev] AUTHORITY.KEYID = 7
7,378,343 UART: [ldev] FE.KEYID = 1
7,425,395 UART: [ldev] Erasing FE.KEYID = 1
10,758,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,132 UART: [ldev] --
13,139,746 UART: [fwproc] Waiting for Commands...
13,142,587 UART: [fwproc] Received command 0x46574c44
13,144,761 UART: [fwproc] Received Image of size 114036 bytes
17,195,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,662,519 >>> mbox cmd response: success
17,666,446 UART: [afmc] ++
17,667,037 UART: [afmc] CDI.KEYID = 6
17,668,001 UART: [afmc] SUBJECT.KEYID = 7
17,669,210 UART: [afmc] AUTHORITY.KEYID = 5
21,032,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,883 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,293 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,115 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,575 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,400,424 UART: [afmc] --
23,404,261 UART: [cold-reset] --
23,407,213 UART: [state] Locking Datavault
23,414,029 UART: [state] Locking PCR0, PCR1 and PCR31
23,415,725 UART: [state] Locking ICCM
23,417,160 UART: [exit] Launching FMC @ 0x40000130
23,425,551 UART:
23,425,776 UART: Running Caliptra FMC ...
23,426,789 UART:
23,426,932 UART: [state] CFI Enabled
23,493,889 UART: [fht] FMC Alias Private Key: 7
25,831,328 UART: [art] Extend RT PCRs Done
25,832,547 UART: [art] Lock RT PCRs Done
25,834,136 UART: [art] Populate DV Done
25,839,542 UART: [fht] FMC Alias Private Key: 7
25,841,186 UART: [art] Derive CDI
25,841,998 UART: [art] Store in in slot 0x4
25,901,952 UART: [art] Derive Key Pair
25,902,992 UART: [art] Store priv key in slot 0x5
29,196,017 UART: [art] Derive Key Pair - Done
29,209,281 UART: [art] Signing Cert with AUTHO
29,210,593 UART: RITY.KEYID = 7
31,498,173 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,689 UART: [art] PUB.X = 3E22B9E64FFABDB6099A9D1DE31247AF653027A303B5F657A08404D862C2863C2A5D18400FE613CA8F07B4AD65147F47
31,506,908 UART: [art] PUB.Y = 83A68AB5B7431BD24729EA662B745B38A4A2FAB9ABC28655B20DF41C1591D3F355932693B1316618C1FE73A63A0960BC
31,514,152 UART: [art] SIG.R = D3A44AC65576E38D15EC79A476C04DE998051D875D70D780E215BD4F9A437728916CECCC50E2C106DF22608E63434F71
31,521,503 UART: [art] SIG.S = 2188D2137A68A376AAB724843C91D287C651E7A4F1FD336CF8A5BC11F387CB18A8DA79636AD608F274FB96C41A2A75B6
32,826,818 UART: Caliptra RT
32,827,514 UART: [state] CFI Enabled
32,988,143 UART: [rt] RT listening for mailbox commands...
37,023,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,179,358 UART: [rt]cmd =0x41544d4e, len=14344
42,415,353 >>> mbox cmd response data (8 bytes)
42,416,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,446,800 UART: [rt]cmd =0x41545348, len=116
42,466,111 >>> mbox cmd response data (12 bytes)
44,516,370 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
44,617,073 UART:
44,617,450 UART: Running Caliptra ROM ...
44,618,526 UART:
44,618,679 UART: [state] CFI Enabled
44,687,590 UART: [state] LifecycleState = Unprovisioned
44,689,511 UART: [state] DebugLocked = No
44,692,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,696,632 UART: [kat] SHA2-256
44,866,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,876,833 UART: [kat] ++
44,877,283 UART: [kat] sha1
44,887,179 UART: [kat] SHA2-256
44,889,834 UART: [kat] SHA2-384
44,896,520 UART: [kat] SHA2-512-ACC
44,898,859 UART: [kat] ECC-384
47,187,760 UART: [kat] HMAC-384Kdf
47,217,872 UART: [kat] LMS
48,408,207 UART: [kat] --
48,412,537 UART: [update-reset] ++
52,113,489 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,116,443 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
52,374,638 >>> mbox cmd response: success
52,375,012 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,375,617 UART: [update-reset] Copying MAN_2 To MAN_1
52,398,044 UART: [update-reset Success] --
52,401,208 UART: [state] Locking Datavault
52,404,841 UART: [state] Locking PCR0, PCR1 and PCR31
52,406,589 UART: [state] Locking ICCM
52,409,237 UART: [exit] Launching FMC @ 0x40000130
52,417,683 UART:
52,417,910 UART: Running Caliptra FMC ...
52,418,999 UART:
52,419,148 UART: [state] CFI Enabled
52,521,900 UART: [art] Extend RT PCRs Done
52,523,098 UART: [art] Lock RT PCRs Done
52,524,546 UART: [art] Populate DV Done
52,530,357 UART: [fht] FMC Alias Private Key: 7
52,531,839 UART: [art] Derive CDI
52,532,592 UART: [art] Store in in slot 0x4
52,590,836 UART: [art] Derive Key Pair
52,591,833 UART: [art] Store priv key in slot 0x5
55,884,421 UART: [art] Derive Key Pair - Done
55,897,471 UART: [art] Signing Cert with AUTHO
55,898,778 UART: RITY.KEYID = 7
58,185,621 UART: [art] Erasing AUTHORITY.KEYID = 7
58,187,137 UART: [art] PUB.X = 82663BE92D741C2614403915FC88A6FBA143F093D46AF5C6F0D24F06E1EA42B04C1F537AE4E2B14AA6F108E0F19DFA57
58,194,374 UART: [art] PUB.Y = D375856EB4BEF6E3703F42A59E371373F0E89E63FA8568D8ECFA02D1CA355E6C85E9ADC3AAD4E629FE4E42315B2F62A6
58,201,638 UART: [art] SIG.R = 72BA782A1F9BCE41214856C79AA7224830C0ADE3B142ACA2AEE8499D1A5DB51F732750827B905DEDD66C9337F69136FE
58,209,028 UART: [art] SIG.S = 0691CADEA287FB7A28C661AA5E183134FC6B71ADC3189F2589C1E042D726A547E179E4080A96B3E5A506979305B7328E
59,513,263 UART: mbox::rt_entry...
59,514,224 UART: ____ _ _ _ ____ _____
59,516,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,518,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,520,065 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,521,994 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,523,918 UART: |_|
59,524,799 UART:
59,809,823 UART: [rt] Runtime listening for mailbox commands...
59,811,889 >>> mbox cmd response data (48 bytes)
59,812,453 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,814,788 >>> mbox cmd response data (48 bytes)
59,815,687 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,829,526 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,648 writing to cptra_bootfsm_go
3,782,185 ready_for_fw is high
3,782,577 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,870,519 >>> mbox cmd response: success
23,565,566 UART:
23,565,969 UART: Running Caliptra FMC ...
23,567,160 UART:
23,567,321 UART: [state] CFI Enabled
23,631,800 UART: [fht] FMC Alias Private Key: 7
25,969,910 UART: [art] Extend RT PCRs Done
25,971,137 UART: [art] Lock RT PCRs Done
25,972,707 UART: [art] Populate DV Done
25,978,175 UART: [fht] FMC Alias Private Key: 7
25,979,775 UART: [art] Derive CDI
25,980,587 UART: [art] Store in in slot 0x4
26,040,012 UART: [art] Derive Key Pair
26,041,059 UART: [art] Store priv key in slot 0x5
29,333,735 UART: [art] Derive Key Pair - Done
29,346,972 UART: [art] Signing Cert with AUTHO
29,348,276 UART: RITY.KEYID = 7
31,634,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,407 UART: [art] PUB.X = E19AFA58C3AE8582F0D7D9A7CF9946AB04A9B4E4EA8C6A9C8F5FB928C21B921BB9BFD7A4A41DD3A787ABFFA36F200580
31,643,691 UART: [art] PUB.Y = 13AF35F51A408EF53BEA4F93884DDDE933839F9639B134C2A30F418BDCC133C69BE4A05FB49E74463DE6B43B3E88AA8E
31,650,933 UART: [art] SIG.R = 155178C3588590527E887E6A83A79FBBF4DA69178661C0906CD6CD546DF293805E8211FEF0C7B58598243B1B0AEE2378
31,658,288 UART: [art] SIG.S = 1E9AB1CF4F297652A6B6F1504DB287D37824228D19223F56728AB518B22DB0FBA5C06085C731E56728702DFFD5B2590E
32,963,700 UART: Caliptra RT
32,964,415 UART: [state] CFI Enabled
33,145,819 UART: [rt] RT listening for mailbox commands...
37,184,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,340,254 UART: [rt]cmd =0x41544d4e, len=14344
42,575,650 >>> mbox cmd response data (8 bytes)
42,576,397 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,607,259 UART: [rt]cmd =0x41545348, len=116
42,627,345 >>> mbox cmd response data (12 bytes)
44,685,640 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,641,434 >>> mbox cmd response: success
52,642,249 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,676,334 UART:
52,676,660 UART: Running Caliptra FMC ...
52,677,692 UART:
52,677,835 UART: [state] CFI Enabled
52,778,157 UART: [art] Extend RT PCRs Done
52,779,346 UART: [art] Lock RT PCRs Done
52,780,759 UART: [art] Populate DV Done
52,786,216 UART: [fht] FMC Alias Private Key: 7
52,787,742 UART: [art] Derive CDI
52,788,484 UART: [art] Store in in slot 0x4
52,846,406 UART: [art] Derive Key Pair
52,847,454 UART: [art] Store priv key in slot 0x5
56,140,599 UART: [art] Derive Key Pair - Done
56,153,332 UART: [art] Signing Cert with AUTHO
56,154,631 UART: RITY.KEYID = 7
58,441,523 UART: [art] Erasing AUTHORITY.KEYID = 7
58,443,031 UART: [art] PUB.X = 1096E46A44564419CC0E141FF1472C0A7BD2E89B42052221C74D016B5ADF5CFA118DBA11825F2BF5B3E07C5A780F0A75
58,450,268 UART: [art] PUB.Y = FE24821AAE6A6A7A7E1C9AE3F6AE41D64615C9674751421A5196D0CF9F764A73E49FC8477E7CC9A4D9198C29AA918A99
58,457,533 UART: [art] SIG.R = 816561C5E66ECDFF5C2E3461CBE3F93D966FD6FFFE3721CDB2EE0622393D279761B9CE47E009135ECD507F2B26663C97
58,464,911 UART: [art] SIG.S = 981AE6DB8D56BA1DD5583EA59E917AAA04421B3422159AF0DA9807F409F580CB96DA146624E7F4A89E500338693B118A
59,769,902 UART: mbox::rt_entry...
59,770,868 UART: ____ _ _ _ ____ _____
59,772,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,774,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,776,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,778,575 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,780,527 UART: |_|
59,781,323 UART:
60,070,038 UART: [rt] Runtime listening for mailbox commands...
60,072,159 >>> mbox cmd response data (48 bytes)
60,072,732 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,075,058 >>> mbox cmd response data (48 bytes)
60,075,961 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,089,825 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,491 UART:
192,872 UART: Running Caliptra ROM ...
193,966 UART:
603,689 UART: [state] CFI Enabled
616,137 UART: [state] LifecycleState = Unprovisioned
618,005 UART: [state] DebugLocked = No
619,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,898 UART: [kat] SHA2-256
794,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,134 UART: [kat] ++
805,583 UART: [kat] sha1
815,887 UART: [kat] SHA2-256
818,604 UART: [kat] SHA2-384
824,457 UART: [kat] SHA2-512-ACC
826,833 UART: [kat] ECC-384
3,111,553 UART: [kat] HMAC-384Kdf
3,122,359 UART: [kat] LMS
4,312,423 UART: [kat] --
4,314,785 UART: [cold-reset] ++
4,317,356 UART: [fht] Storing FHT @ 0x50003400
4,329,393 UART: [idev] ++
4,330,035 UART: [idev] CDI.KEYID = 6
4,330,953 UART: [idev] SUBJECT.KEYID = 7
4,332,201 UART: [idev] UDS.KEYID = 0
4,333,445 ready_for_fw is high
4,333,680 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,476,752 UART: [idev] Erasing UDS.KEYID = 0
7,621,359 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,331 UART: [idev] --
7,648,243 UART: [ldev] ++
7,648,811 UART: [ldev] CDI.KEYID = 6
7,649,771 UART: [ldev] SUBJECT.KEYID = 5
7,650,984 UART: [ldev] AUTHORITY.KEYID = 7
7,652,265 UART: [ldev] FE.KEYID = 1
7,664,181 UART: [ldev] Erasing FE.KEYID = 1
10,949,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,082 UART: [ldev] --
13,309,572 UART: [fwproc] Waiting for Commands...
13,312,802 UART: [fwproc] Received command 0x46574c44
13,314,976 UART: [fwproc] Received Image of size 114036 bytes
17,370,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,530 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,419 >>> mbox cmd response: success
17,838,915 UART: [afmc] ++
17,839,506 UART: [afmc] CDI.KEYID = 6
17,840,412 UART: [afmc] SUBJECT.KEYID = 7
17,841,631 UART: [afmc] AUTHORITY.KEYID = 5
21,156,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,131 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,532 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,330 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,813 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,416 UART: [afmc] --
23,521,968 UART: [cold-reset] --
23,525,394 UART: [state] Locking Datavault
23,530,422 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,168 UART: [state] Locking ICCM
23,533,920 UART: [exit] Launching FMC @ 0x40000130
23,542,341 UART:
23,542,578 UART: Running Caliptra FMC ...
23,543,608 UART:
23,543,755 UART: [state] CFI Enabled
23,552,202 UART: [fht] FMC Alias Private Key: 7
25,883,439 UART: [art] Extend RT PCRs Done
25,884,660 UART: [art] Lock RT PCRs Done
25,886,262 UART: [art] Populate DV Done
25,891,889 UART: [fht] FMC Alias Private Key: 7
25,893,390 UART: [art] Derive CDI
25,894,125 UART: [art] Store in in slot 0x4
25,937,424 UART: [art] Derive Key Pair
25,938,461 UART: [art] Store priv key in slot 0x5
29,180,351 UART: [art] Derive Key Pair - Done
29,193,127 UART: [art] Signing Cert with AUTHO
29,194,422 UART: RITY.KEYID = 7
31,473,951 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,468 UART: [art] PUB.X = 51AB7F442BC44145CBB8BBB4DC3BE104CB7373BEEF0FC9EA8C4FB41636137B6CCCCA9C5E3D130F655AC6C74E4FDE31CB
31,482,729 UART: [art] PUB.Y = F803D3DCEBBF0F23F612382337F59B690BFE086F8374E0AC6899CFF33D811590C87AB93C291D8376015837B65394FA1D
31,489,967 UART: [art] SIG.R = D151F46CB0AE723EA4D1E49DF68E2C9DC895EDC92F89D2BB998262902BB161FFCC5610B551BB8A63549F4EC9292B45BE
31,497,317 UART: [art] SIG.S = E87B8DEC77045CE93AB77EB4A5B86AB6BEA08B57109F4F9888436F1EAD6B434E999E2A640EE186EC2FA3CDA9793D7911
32,802,602 UART: Caliptra RT
32,803,313 UART: [state] CFI Enabled
32,920,211 UART: [rt] RT listening for mailbox commands...
36,953,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,109,405 UART: [rt]cmd =0x41544d4e, len=14344
42,345,281 >>> mbox cmd response data (8 bytes)
42,346,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,376,932 UART: [rt]cmd =0x41545348, len=116
42,396,697 >>> mbox cmd response data (12 bytes)
44,441,272 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
44,542,109 UART:
44,542,458 UART: Running Caliptra ROM ...
44,543,503 UART:
44,543,763 UART: [state] CFI Enabled
44,559,015 UART: [state] LifecycleState = Unprovisioned
44,560,913 UART: [state] DebugLocked = No
44,562,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,567,072 UART: [kat] SHA2-256
44,736,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,747,345 UART: [kat] ++
44,747,798 UART: [kat] sha1
44,760,206 UART: [kat] SHA2-256
44,762,895 UART: [kat] SHA2-384
44,768,720 UART: [kat] SHA2-512-ACC
44,771,065 UART: [kat] ECC-384
47,059,298 UART: [kat] HMAC-384Kdf
47,070,710 UART: [kat] LMS
48,260,783 UART: [kat] --
48,265,587 UART: [update-reset] ++
51,969,244 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,973,565 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
52,231,761 >>> mbox cmd response: success
52,232,158 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,233,031 UART: [update-reset] Copying MAN_2 To MAN_1
52,255,472 UART: [update-reset Success] --
52,258,605 UART: [state] Locking Datavault
52,260,833 UART: [state] Locking PCR0, PCR1 and PCR31
52,262,589 UART: [state] Locking ICCM
52,263,774 UART: [exit] Launching FMC @ 0x40000130
52,272,225 UART:
52,272,460 UART: Running Caliptra FMC ...
52,273,559 UART:
52,273,717 UART: [state] CFI Enabled
52,318,027 UART: [art] Extend RT PCRs Done
52,319,173 UART: [art] Lock RT PCRs Done
52,320,702 UART: [art] Populate DV Done
52,326,138 UART: [fht] FMC Alias Private Key: 7
52,327,782 UART: [art] Derive CDI
52,328,533 UART: [art] Store in in slot 0x4
52,371,133 UART: [art] Derive Key Pair
52,372,166 UART: [art] Store priv key in slot 0x5
55,614,610 UART: [art] Derive Key Pair - Done
55,627,450 UART: [art] Signing Cert with AUTHO
55,628,761 UART: RITY.KEYID = 7
57,907,996 UART: [art] Erasing AUTHORITY.KEYID = 7
57,909,506 UART: [art] PUB.X = CEDA16E730698AC6A27C900FF3B4D3346EBD331E49CBF482CF9AA491C4AD6E2D28CF65FEC2CB06009879090B25657992
57,916,743 UART: [art] PUB.Y = 17ECC07BE34C0B63C5E4A1D48F0038FA9BBA7807A002B250D03D36719A07F77C30DB3839F7DEE67BD81ED23DACE57E75
57,924,011 UART: [art] SIG.R = DC34D4034DEB34B113F3876360DFF0CE3C03BE20E90CB15DD78D8A9D27CB2023F837933E084E08D7A2B870394C2386E5
57,931,398 UART: [art] SIG.S = 89BFD840B2B027F17D2DE64365A9C88748F1C34F3DE1D3BDFB1DCCAE7B8C4E71EBF93B58DF9B818119209DC938BFE16A
59,236,178 UART: mbox::rt_entry...
59,237,138 UART: ____ _ _ _ ____ _____
59,239,245 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,241,248 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,243,098 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,245,046 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,246,978 UART: |_|
59,247,957 UART:
59,533,817 UART: [rt] Runtime listening for mailbox commands...
59,535,929 >>> mbox cmd response data (48 bytes)
59,536,490 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,538,800 >>> mbox cmd response data (48 bytes)
59,539,683 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,553,522 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,124,280 ready_for_fw is high
4,124,847 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,053,785 >>> mbox cmd response: success
23,689,720 UART:
23,690,117 UART: Running Caliptra FMC ...
23,691,430 UART:
23,691,605 UART: [state] CFI Enabled
23,699,337 UART: [fht] FMC Alias Private Key: 7
26,030,760 UART: [art] Extend RT PCRs Done
26,031,985 UART: [art] Lock RT PCRs Done
26,033,808 UART: [art] Populate DV Done
26,039,409 UART: [fht] FMC Alias Private Key: 7
26,041,065 UART: [art] Derive CDI
26,041,812 UART: [art] Store in in slot 0x4
26,084,305 UART: [art] Derive Key Pair
26,085,351 UART: [art] Store priv key in slot 0x5
29,327,197 UART: [art] Derive Key Pair - Done
29,339,887 UART: [art] Signing Cert with AUTHO
29,341,196 UART: RITY.KEYID = 7
31,620,612 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,125 UART: [art] PUB.X = E35E039B22E874E0CF75B15C0B7EFA18DA7B98792DAC8AD6CD28AF3072000CA2ACC1E8F2F4B30D68C0780FC3744CA0E4
31,629,410 UART: [art] PUB.Y = 558C725CB9163B451DF5AD3ED7ACCE9A66A122BB77E1CE487B9E833B1BAE72E89E30CEBC1F48498E63AA6CED05845C52
31,636,716 UART: [art] SIG.R = 7F3A2585AA14A92F1FD147CB92D68F959976A322512B7E4742AF898673F550B92F0E85875D1A678B3E944938F10250DC
31,644,029 UART: [art] SIG.S = 3F149F4714A097D413E79B76748FB84EAC7EB71C024DC08D4174CE76F4F375A2633EB922D60053C8DC5E6ED6075D82BD
32,948,680 UART: Caliptra RT
32,949,384 UART: [state] CFI Enabled
33,067,636 UART: [rt] RT listening for mailbox commands...
37,103,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,259,035 UART: [rt]cmd =0x41544d4e, len=14344
42,495,009 >>> mbox cmd response data (8 bytes)
42,495,799 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,526,384 UART: [rt]cmd =0x41545348, len=116
42,545,780 >>> mbox cmd response data (12 bytes)
44,591,212 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,486,743 >>> mbox cmd response: success
52,487,245 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,520,004 UART:
52,520,294 UART: Running Caliptra FMC ...
52,521,413 UART:
52,521,589 UART: [state] CFI Enabled
52,565,443 UART: [art] Extend RT PCRs Done
52,566,640 UART: [art] Lock RT PCRs Done
52,568,255 UART: [art] Populate DV Done
52,573,930 UART: [fht] FMC Alias Private Key: 7
52,575,579 UART: [art] Derive CDI
52,576,388 UART: [art] Store in in slot 0x4
52,619,032 UART: [art] Derive Key Pair
52,620,032 UART: [art] Store priv key in slot 0x5
55,862,090 UART: [art] Derive Key Pair - Done
55,874,982 UART: [art] Signing Cert with AUTHO
55,876,285 UART: RITY.KEYID = 7
58,155,527 UART: [art] Erasing AUTHORITY.KEYID = 7
58,157,031 UART: [art] PUB.X = 612DEF4C57F94218AC94EAE628E3DE545E35073A98CA664D733E518494869BF773652C9C0FD678C4D972ED51002F188E
58,164,245 UART: [art] PUB.Y = EF977EA457C34A03C10D53A89953F3E096E80CD23C7BF6FF77C603A7D89D9ACC146258835B393CC0C00DFF0F2549CA26
58,171,489 UART: [art] SIG.R = 75AD3ED3F394F64836D76B91A01F0A30995748D5198673EB09A36551242CA48E7C10228E137F577B063E5B303911C2D6
58,178,866 UART: [art] SIG.S = 3864AF96B8517A2A9A9297581AA505ADE6ABD132E23195BE11BDF847AF6E42A37A2D89E24E25D0B7B4FD6AF203280C83
59,483,634 UART: mbox::rt_entry...
59,484,594 UART: ____ _ _ _ ____ _____
59,486,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,488,580 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,490,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,492,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,494,439 UART: |_|
59,495,249 UART:
59,779,200 UART: [rt] Runtime listening for mailbox commands...
59,781,333 >>> mbox cmd response data (48 bytes)
59,781,896 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,784,249 >>> mbox cmd response data (48 bytes)
59,785,124 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,798,958 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,473 UART:
192,868 UART: Running Caliptra ROM ...
193,966 UART:
194,105 UART: [state] CFI Enabled
264,496 UART: [state] LifecycleState = Unprovisioned
266,334 UART: [state] DebugLocked = No
267,854 UART: [state] WD Timer not started. Device not locked for debugging
272,461 UART: [kat] SHA2-256
451,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,110 UART: [kat] ++
463,558 UART: [kat] sha1
474,145 UART: [kat] SHA2-256
477,153 UART: [kat] SHA2-384
483,078 UART: [kat] SHA2-512-ACC
485,998 UART: [kat] ECC-384
2,950,007 UART: [kat] HMAC-384Kdf
2,972,791 UART: [kat] LMS
3,502,228 UART: [kat] --
3,506,668 UART: [cold-reset] ++
3,508,529 UART: [fht] FHT @ 0x50003400
3,520,359 UART: [idev] ++
3,520,930 UART: [idev] CDI.KEYID = 6
3,521,815 UART: [idev] SUBJECT.KEYID = 7
3,523,055 UART: [idev] UDS.KEYID = 0
3,524,337 ready_for_fw is high
3,524,559 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,261 UART: [idev] Erasing UDS.KEYID = 0
6,029,734 UART: [idev] Sha1 KeyId Algorithm
6,051,780 UART: [idev] --
6,056,802 UART: [ldev] ++
6,057,374 UART: [ldev] CDI.KEYID = 6
6,058,255 UART: [ldev] SUBJECT.KEYID = 5
6,059,417 UART: [ldev] AUTHORITY.KEYID = 7
6,060,774 UART: [ldev] FE.KEYID = 1
6,100,782 UART: [ldev] Erasing FE.KEYID = 1
8,604,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,419 UART: [ldev] --
10,412,398 UART: [fwproc] Wait for Commands...
10,415,522 UART: [fwproc] Recv command 0x46574c44
10,417,621 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,898 >>> mbox cmd response: success
14,286,330 UART: [afmc] ++
14,286,944 UART: [afmc] CDI.KEYID = 6
14,287,826 UART: [afmc] SUBJECT.KEYID = 7
14,288,925 UART: [afmc] AUTHORITY.KEYID = 5
16,824,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,174 UART: [afmc] --
18,626,224 UART: [cold-reset] --
18,631,271 UART: [state] Locking Datavault
18,635,869 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,514 UART: [state] Locking ICCM
18,639,960 UART: [exit] Launching FMC @ 0x40000130
18,648,356 UART:
18,648,650 UART: Running Caliptra FMC ...
18,649,683 UART:
18,649,830 UART: [state] CFI Enabled
18,707,106 UART: [fht] FMC Alias Private Key: 7
20,471,423 UART: [art] Extend RT PCRs Done
20,472,685 UART: [art] Lock RT PCRs Done
20,474,277 UART: [art] Populate DV Done
20,479,846 UART: [fht] FMC Alias Private Key: 7
20,481,489 UART: [art] Derive CDI
20,482,314 UART: [art] Store in in slot 0x4
20,540,630 UART: [art] Derive Key Pair
20,541,691 UART: [art] Store priv key in slot 0x5
23,005,229 UART: [art] Derive Key Pair - Done
23,018,450 UART: [art] Signing Cert with AUTHO
23,019,760 UART: RITY.KEYID = 7
24,730,590 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,111 UART: [art] PUB.X = 6BD9185FF83E9EF2810B182BCB1B8D4A0C74C01ED2F28F3B173194D7488622CCF965D2DB19E1AAD4DF72E3024E53DBD9
24,739,381 UART: [art] PUB.Y = 33DE37D9389BC01D788F818C145EA229AB71885B83459A372BEB39542C6EC6541A9B071752306B63FC9BC10F0FA40E62
24,746,638 UART: [art] SIG.R = BF05CE6C28617CCACA166BAE01EAC627743E86CE43178F98D3872CB263CF2EF1E6D236DC06298BB06783AF11B8FE2D57
24,754,034 UART: [art] SIG.S = 5B0E7F0274A57C5E714FBD6D567E74686C40226D55047EF6B6FCD6BA4660DADD174F6CB1089BC0D5836F70D9D38B1B01
25,733,430 UART: Caliptra RT
25,734,136 UART: [state] CFI Enabled
25,897,584 UART: [rt] RT listening for mailbox commands...
29,931,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,086,967 UART: [rt]cmd =0x41544d4e, len=14344
34,017,612 >>> mbox cmd response data (8 bytes)
34,018,391 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,049,252 UART: [rt]cmd =0x41545348, len=116
34,069,455 >>> mbox cmd response data (12 bytes)
36,120,951 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
36,221,631 UART:
36,222,000 UART: Running Caliptra ROM ...
36,223,082 UART:
36,223,247 UART: [state] CFI Enabled
36,287,441 UART: [state] LifecycleState = Unprovisioned
36,289,322 UART: [state] DebugLocked = No
36,291,735 UART: [state] WD Timer not started. Device not locked for debugging
36,295,855 UART: [kat] SHA2-256
36,474,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,486,521 UART: [kat] ++
36,487,066 UART: [kat] sha1
36,498,232 UART: [kat] SHA2-256
36,501,245 UART: [kat] SHA2-384
36,507,120 UART: [kat] SHA2-512-ACC
36,510,036 UART: [kat] ECC-384
38,972,868 UART: [kat] HMAC-384Kdf
38,996,546 UART: [kat] LMS
39,525,960 UART: [kat] --
39,529,680 UART: [update-reset] ++
42,519,705 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,523,020 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
42,780,993 >>> mbox cmd response: success
42,781,345 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,782,159 UART: [update-reset] Copying MAN_2 To MAN_1
42,804,485 UART: [update-reset Success] --
42,807,723 UART: [state] Locking Datavault
42,810,603 UART: [state] Locking PCR0, PCR1 and PCR31
42,812,253 UART: [state] Locking ICCM
42,814,404 UART: [exit] Launching FMC @ 0x40000130
42,822,862 UART:
42,823,132 UART: Running Caliptra FMC ...
42,824,240 UART:
42,824,400 UART: [state] CFI Enabled
42,911,440 UART: [art] Extend RT PCRs Done
42,912,655 UART: [art] Lock RT PCRs Done
42,914,000 UART: [art] Populate DV Done
42,919,589 UART: [fht] FMC Alias Private Key: 7
42,921,290 UART: [art] Derive CDI
42,922,113 UART: [art] Store in in slot 0x4
42,980,449 UART: [art] Derive Key Pair
42,981,626 UART: [art] Store priv key in slot 0x5
45,444,421 UART: [art] Derive Key Pair - Done
45,457,476 UART: [art] Signing Cert with AUTHO
45,458,777 UART: RITY.KEYID = 7
47,171,415 UART: [art] Erasing AUTHORITY.KEYID = 7
47,172,921 UART: [art] PUB.X = 03B054A202F2274135CBD95D55918E5CDDD2092E67142DDE3852CB541551B2C062901FDB443A92D7CD36FD010D7ADCCB
47,180,183 UART: [art] PUB.Y = 4047E2E425C328C090F7DCA853A379A33A3ADDEA4870DADAFF9B21EE9FEB1C076E5307F3BCFEB7B3CB5BBA2953358869
47,187,462 UART: [art] SIG.R = E4F5E938D0200884819B02A640F1743689B66269A77E2BA3BFA3641CC5744AF855B86D9C0FDC41EE987274412C24152D
47,194,844 UART: [art] SIG.S = 443C8F74CBA0FFE91C648D09D5EE2A06CA0D12137C418D4C95F2C0CFCEEE717870E49A669832763F91FE18AA75375BDA
48,172,899 UART: mbox::rt_entry...
48,173,869 UART: ____ _ _ _ ____ _____
48,175,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,177,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,179,659 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,181,585 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,183,461 UART: |_|
48,184,345 UART:
48,470,303 UART: [rt] Runtime listening for mailbox commands...
48,472,418 >>> mbox cmd response data (48 bytes)
48,472,985 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,475,302 >>> mbox cmd response data (48 bytes)
48,476,210 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,490,083 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
192,553 UART:
192,935 UART: Running Caliptra ROM ...
194,151 UART:
194,314 UART: [state] CFI Enabled
261,957 UART: [state] LifecycleState = Unprovisioned
264,289 UART: [state] DebugLocked = No
265,753 UART: [state] WD Timer not started. Device not locked for debugging
270,003 UART: [kat] SHA2-256
459,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,650 UART: [kat] ++
471,144 UART: [kat] sha1
482,940 UART: [kat] SHA2-256
485,948 UART: [kat] SHA2-384
492,368 UART: [kat] SHA2-512-ACC
494,950 UART: [kat] ECC-384
2,946,292 UART: [kat] HMAC-384Kdf
2,970,055 UART: [kat] LMS
3,501,858 UART: [kat] --
3,504,727 UART: [cold-reset] ++
3,507,227 UART: [fht] FHT @ 0x50003400
3,517,930 UART: [idev] ++
3,518,591 UART: [idev] CDI.KEYID = 6
3,519,636 UART: [idev] SUBJECT.KEYID = 7
3,520,742 UART: [idev] UDS.KEYID = 0
3,521,667 ready_for_fw is high
3,521,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,543 UART: [idev] Erasing UDS.KEYID = 0
6,027,148 UART: [idev] Sha1 KeyId Algorithm
6,050,684 UART: [idev] --
6,055,387 UART: [ldev] ++
6,056,071 UART: [ldev] CDI.KEYID = 6
6,056,984 UART: [ldev] SUBJECT.KEYID = 5
6,058,143 UART: [ldev] AUTHORITY.KEYID = 7
6,059,377 UART: [ldev] FE.KEYID = 1
6,099,694 UART: [ldev] Erasing FE.KEYID = 1
8,609,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,194 UART: [ldev] --
10,418,296 UART: [fwproc] Wait for Commands...
10,421,002 UART: [fwproc] Recv command 0x46574c44
10,423,227 UART: [fwproc] Recv'd Img size: 114360 bytes
13,869,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,606,035 >>> mbox cmd response: success
14,610,613 UART: [afmc] ++
14,611,328 UART: [afmc] CDI.KEYID = 6
14,612,596 UART: [afmc] SUBJECT.KEYID = 7
14,614,036 UART: [afmc] AUTHORITY.KEYID = 5
17,148,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,190 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,482 UART: [afmc] --
18,949,843 UART: [cold-reset] --
18,952,568 UART: [state] Locking Datavault
18,957,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,663 UART: [state] Locking ICCM
18,962,288 UART: [exit] Launching FMC @ 0x40000130
18,970,920 UART:
18,971,160 UART: Running Caliptra FMC ...
18,972,205 UART:
18,972,354 UART: [state] CFI Enabled
19,030,399 UART: [fht] FMC Alias Private Key: 7
20,795,189 UART: [art] Extend RT PCRs Done
20,796,421 UART: [art] Lock RT PCRs Done
20,798,127 UART: [art] Populate DV Done
20,803,556 UART: [fht] FMC Alias Private Key: 7
20,805,198 UART: [art] Derive CDI
20,806,021 UART: [art] Store in in slot 0x4
20,863,177 UART: [art] Derive Key Pair
20,864,174 UART: [art] Store priv key in slot 0x5
23,327,104 UART: [art] Derive Key Pair - Done
23,340,272 UART: [art] Signing Cert with AUTHO
23,341,580 UART: RITY.KEYID = 7
25,053,242 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,752 UART: [art] PUB.X = 6BFB76BC2A1392C46822CBF3B9373A5803C909C83A69399FEE1244F1D0335CB2CFB597F801144046FA535E130DB6975F
25,062,005 UART: [art] PUB.Y = 0213EE8BBC96756FBFEC354575D86BE581A651F2CA46DB768E674365D7833E90A2EB87F9E1F2D10994549CDDF39DFB86
25,069,292 UART: [art] SIG.R = 129C06B4ECE10461EC2E59FD9FB5BD087643E69C16B5235EE126BF766E3BF9CCF0267DF3B7723B12A08D4BF8B81B414E
25,076,671 UART: [art] SIG.S = 443E4DECCF977A7359975BB8B20B39555AD338821FD5725A77CCF5603CB6F149832FB625C6F7DD6A139930F6B8C9EA94
26,055,750 UART: Caliptra RT
26,056,449 UART: [state] CFI Enabled
26,222,144 UART: [rt] RT listening for mailbox commands...
30,255,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,411,425 UART: [rt]cmd =0x41544d4e, len=14344
34,342,214 >>> mbox cmd response data (8 bytes)
34,343,020 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,373,660 UART: [rt]cmd =0x41545348, len=116
34,393,333 >>> mbox cmd response data (12 bytes)
36,445,661 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
36,546,386 UART:
36,546,751 UART: Running Caliptra ROM ...
36,547,809 UART:
36,547,962 UART: [state] CFI Enabled
36,618,275 UART: [state] LifecycleState = Unprovisioned
36,620,367 UART: [state] DebugLocked = No
36,623,049 UART: [state] WD Timer not started. Device not locked for debugging
36,627,622 UART: [kat] SHA2-256
36,817,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,828,242 UART: [kat] ++
36,828,786 UART: [kat] sha1
36,841,024 UART: [kat] SHA2-256
36,844,048 UART: [kat] SHA2-384
36,849,390 UART: [kat] SHA2-512-ACC
36,851,959 UART: [kat] ECC-384
39,303,401 UART: [kat] HMAC-384Kdf
39,327,027 UART: [kat] LMS
39,858,604 UART: [kat] --
39,863,375 UART: [update-reset] ++
42,882,924 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,885,751 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
43,279,088 >>> mbox cmd response: success
43,279,440 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,280,584 UART: [update-reset] Copying MAN_2 To MAN_1
43,318,146 UART: [update-reset Success] --
43,322,810 UART: [state] Locking Datavault
43,325,907 UART: [state] Locking PCR0, PCR1 and PCR31
43,328,105 UART: [state] Locking ICCM
43,329,770 UART: [exit] Launching FMC @ 0x40000130
43,338,393 UART:
43,338,633 UART: Running Caliptra FMC ...
43,339,757 UART:
43,339,915 UART: [state] CFI Enabled
43,432,109 UART: [art] Extend RT PCRs Done
43,433,297 UART: [art] Lock RT PCRs Done
43,434,674 UART: [art] Populate DV Done
43,440,199 UART: [fht] FMC Alias Private Key: 7
43,441,791 UART: [art] Derive CDI
43,442,530 UART: [art] Store in in slot 0x4
43,501,110 UART: [art] Derive Key Pair
43,502,249 UART: [art] Store priv key in slot 0x5
45,964,356 UART: [art] Derive Key Pair - Done
45,977,303 UART: [art] Signing Cert with AUTHO
45,978,615 UART: RITY.KEYID = 7
47,690,232 UART: [art] Erasing AUTHORITY.KEYID = 7
47,691,749 UART: [art] PUB.X = 842BB1A20FD03784648FD010847C9140C9AD0C20FDDD781CE2B0D38CF906235D78009319459CA8DB994814EB51480454
47,698,945 UART: [art] PUB.Y = 11A8C0601737CF7244170FCCBC1FD002C18600274B7B25890C30AF1FF8A844EAC0EE71CCD5CB851163E14FA54132181E
47,706,188 UART: [art] SIG.R = FB89539243FB76D19568E07ED7184F577CFE4718D0EE52F43944486C5A63ECAB15E1B5369B51AC97FAD5881EE71EA49E
47,713,572 UART: [art] SIG.S = 60D7845C5C3598AF3786E2A63A2468CE5E066C4E03E274A2A7575B8D154041B25EB9201D6822C3764AA720A3DED27557
48,692,021 UART: mbox::rt_entry...
48,692,985 UART: ____ _ _ _ ____ _____
48,694,974 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,696,981 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,698,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,700,849 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,702,782 UART: |_|
48,703,595 UART:
48,985,751 UART: [rt] Runtime listening for mailbox commands...
48,987,859 >>> mbox cmd response data (48 bytes)
48,988,439 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,990,797 >>> mbox cmd response data (48 bytes)
48,991,692 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,005,619 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,440,103 ready_for_fw is high
3,440,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,743,387 >>> mbox cmd response: success
19,046,463 UART:
19,046,866 UART: Running Caliptra FMC ...
19,047,976 UART:
19,048,131 UART: [state] CFI Enabled
19,114,460 UART: [fht] FMC Alias Private Key: 7
20,878,135 UART: [art] Extend RT PCRs Done
20,879,361 UART: [art] Lock RT PCRs Done
20,881,066 UART: [art] Populate DV Done
20,886,696 UART: [fht] FMC Alias Private Key: 7
20,888,347 UART: [art] Derive CDI
20,889,086 UART: [art] Store in in slot 0x4
20,947,324 UART: [art] Derive Key Pair
20,948,416 UART: [art] Store priv key in slot 0x5
23,411,399 UART: [art] Derive Key Pair - Done
23,424,182 UART: [art] Signing Cert with AUTHO
23,425,490 UART: RITY.KEYID = 7
25,137,129 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,634 UART: [art] PUB.X = FF3A8F4D705BFEE483067DFCD9DBD90F1475F70B5E05BF6C841F24BC55D06F4EEA4285AF0020187778CB42760C35C6DA
25,145,913 UART: [art] PUB.Y = 262609D88801D46345D128F7731142231718B4EA596266FC368ED862D4147E5B3A60C9F4DBE41B8B9D8E566D0D67476F
25,153,139 UART: [art] SIG.R = 3CC72A3BB7452129FEDEBF91BBE06726DA1ACCEA918057A35BFB898D3AFE5A4CFA8B9DE5614772826D186F8CFB7F6FEB
25,160,561 UART: [art] SIG.S = A0F4EE9113C8373A2DF7737E882AFC8325C15C1839F6BCA91783C8136BFD4463BAAF754068345A30973D40C0450B1C03
26,139,390 UART: Caliptra RT
26,140,086 UART: [state] CFI Enabled
26,305,187 UART: [rt] RT listening for mailbox commands...
30,336,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,492,409 UART: [rt]cmd =0x41544d4e, len=14344
34,423,186 >>> mbox cmd response data (8 bytes)
34,423,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,454,618 UART: [rt]cmd =0x41545348, len=116
34,474,555 >>> mbox cmd response data (12 bytes)
36,521,630 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
43,531,418 >>> mbox cmd response: success
43,531,979 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,566,638 UART:
43,566,974 UART: Running Caliptra FMC ...
43,568,019 UART:
43,568,170 UART: [state] CFI Enabled
43,655,891 UART: [art] Extend RT PCRs Done
43,657,091 UART: [art] Lock RT PCRs Done
43,658,580 UART: [art] Populate DV Done
43,664,061 UART: [fht] FMC Alias Private Key: 7
43,665,713 UART: [art] Derive CDI
43,666,454 UART: [art] Store in in slot 0x4
43,725,037 UART: [art] Derive Key Pair
43,726,080 UART: [art] Store priv key in slot 0x5
46,188,817 UART: [art] Derive Key Pair - Done
46,201,768 UART: [art] Signing Cert with AUTHO
46,203,075 UART: RITY.KEYID = 7
47,914,554 UART: [art] Erasing AUTHORITY.KEYID = 7
47,916,046 UART: [art] PUB.X = 41BBE388C8ED47FDEBBF9B07D605D46E485DF8934671CF8445B04269419CF9D12BF3F9C0030ED182EE67C485572D2BDF
47,923,347 UART: [art] PUB.Y = 0D3154A88EA1E1591FA90E68D9E355AFA3C57E1602A7A590EF204D4D3D6850127FD255B5CDA047DA38760FD34CD25FAB
47,930,565 UART: [art] SIG.R = 775568EEC0E0CC4A3F04E7C79EFCACCE5FBF82C06D7C4E592D8B5221C6EAE629B257383E8FBA748B17752290B1BF963B
47,938,052 UART: [art] SIG.S = F60334229E1180CDA56FE79E4112A2943E1FB068D1AAEDCFAB6B420D850B9F3807549E90C736C4FBC806DED7A6464682
48,916,593 UART: mbox::rt_entry...
48,917,541 UART: ____ _ _ _ ____ _____
48,919,443 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,921,464 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,923,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,925,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,927,230 UART: |_|
48,928,041 UART:
49,210,436 UART: [rt] Runtime listening for mailbox commands...
49,212,599 >>> mbox cmd response data (48 bytes)
49,213,184 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,215,497 >>> mbox cmd response data (48 bytes)
49,216,423 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,230,316 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
192,785 UART:
193,146 UART: Running Caliptra ROM ...
194,329 UART:
604,150 UART: [state] CFI Enabled
615,964 UART: [state] LifecycleState = Unprovisioned
618,323 UART: [state] DebugLocked = No
620,547 UART: [state] WD Timer not started. Device not locked for debugging
624,923 UART: [kat] SHA2-256
814,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,516 UART: [kat] ++
826,031 UART: [kat] sha1
838,041 UART: [kat] SHA2-256
841,058 UART: [kat] SHA2-384
847,830 UART: [kat] SHA2-512-ACC
850,408 UART: [kat] ECC-384
3,291,706 UART: [kat] HMAC-384Kdf
3,304,373 UART: [kat] LMS
3,836,170 UART: [kat] --
3,840,478 UART: [cold-reset] ++
3,841,725 UART: [fht] FHT @ 0x50003400
3,853,201 UART: [idev] ++
3,853,903 UART: [idev] CDI.KEYID = 6
3,854,892 UART: [idev] SUBJECT.KEYID = 7
3,856,062 UART: [idev] UDS.KEYID = 0
3,856,990 ready_for_fw is high
3,857,181 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,818 UART: [idev] Erasing UDS.KEYID = 0
6,335,205 UART: [idev] Sha1 KeyId Algorithm
6,356,865 UART: [idev] --
6,361,938 UART: [ldev] ++
6,362,669 UART: [ldev] CDI.KEYID = 6
6,363,580 UART: [ldev] SUBJECT.KEYID = 5
6,364,736 UART: [ldev] AUTHORITY.KEYID = 7
6,365,964 UART: [ldev] FE.KEYID = 1
6,375,688 UART: [ldev] Erasing FE.KEYID = 1
8,852,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,253 UART: [ldev] --
10,643,957 UART: [fwproc] Wait for Commands...
10,646,696 UART: [fwproc] Recv command 0x46574c44
10,649,000 UART: [fwproc] Recv'd Img size: 114360 bytes
14,092,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,988 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,822,764 >>> mbox cmd response: success
14,827,503 UART: [afmc] ++
14,828,213 UART: [afmc] CDI.KEYID = 6
14,829,372 UART: [afmc] SUBJECT.KEYID = 7
14,830,924 UART: [afmc] AUTHORITY.KEYID = 5
17,332,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,125,252 UART: [afmc] --
19,129,509 UART: [cold-reset] --
19,132,345 UART: [state] Locking Datavault
19,138,507 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,689 UART: [state] Locking ICCM
19,142,783 UART: [exit] Launching FMC @ 0x40000130
19,151,444 UART:
19,151,678 UART: Running Caliptra FMC ...
19,152,776 UART:
19,152,947 UART: [state] CFI Enabled
19,160,834 UART: [fht] FMC Alias Private Key: 7
20,918,055 UART: [art] Extend RT PCRs Done
20,919,275 UART: [art] Lock RT PCRs Done
20,921,116 UART: [art] Populate DV Done
20,926,634 UART: [fht] FMC Alias Private Key: 7
20,928,114 UART: [art] Derive CDI
20,928,873 UART: [art] Store in in slot 0x4
20,971,951 UART: [art] Derive Key Pair
20,972,994 UART: [art] Store priv key in slot 0x5
23,399,625 UART: [art] Derive Key Pair - Done
23,412,680 UART: [art] Signing Cert with AUTHO
23,413,984 UART: RITY.KEYID = 7
25,119,250 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,761 UART: [art] PUB.X = 01066D66B30B0795DAD149872C2D11500700B27B7B35E9348246B3AE3272662D5B79CF8E31FD9A0B88650DABF507E924
25,127,970 UART: [art] PUB.Y = 42F1EE0819FB1428B952F88DC1F3FEA6DF30A341271320633CAEC7CC46B0B8F2C08995E487A023ED8680E604BEC97A29
25,135,222 UART: [art] SIG.R = 61B0F859125D996AD37818CED26D93D85F8C683A50B73AD1F3C9A2B28690086D7453A99232110B90B7C30A56FD00E35E
25,142,563 UART: [art] SIG.S = 25443F6F99D756026D3EAE641EB7C101DC66003B08F30DB9BD13018D45F8A20B17DA60B43B1A54345305AAC7FBE51EEF
26,121,541 UART: Caliptra RT
26,122,260 UART: [state] CFI Enabled
26,240,201 UART: [rt] RT listening for mailbox commands...
30,273,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,428,752 UART: [rt]cmd =0x41544d4e, len=14344
34,359,037 >>> mbox cmd response data (8 bytes)
34,359,887 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,390,747 UART: [rt]cmd =0x41545348, len=116
34,410,865 >>> mbox cmd response data (12 bytes)
36,457,669 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
36,558,593 UART:
36,558,970 UART: Running Caliptra ROM ...
36,560,106 UART:
36,560,281 UART: [state] CFI Enabled
36,573,683 UART: [state] LifecycleState = Unprovisioned
36,575,567 UART: [state] DebugLocked = No
36,576,943 UART: [state] WD Timer not started. Device not locked for debugging
36,582,140 UART: [kat] SHA2-256
36,772,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,782,758 UART: [kat] ++
36,783,309 UART: [kat] sha1
36,794,732 UART: [kat] SHA2-256
36,797,738 UART: [kat] SHA2-384
36,804,004 UART: [kat] SHA2-512-ACC
36,806,578 UART: [kat] ECC-384
39,248,898 UART: [kat] HMAC-384Kdf
39,262,124 UART: [kat] LMS
39,793,747 UART: [kat] --
39,798,438 UART: [update-reset] ++
42,824,245 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,828,209 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
43,221,551 >>> mbox cmd response: success
43,221,925 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,223,390 UART: [update-reset] Copying MAN_2 To MAN_1
43,260,997 UART: [update-reset Success] --
43,263,883 UART: [state] Locking Datavault
43,268,055 UART: [state] Locking PCR0, PCR1 and PCR31
43,270,234 UART: [state] Locking ICCM
43,272,911 UART: [exit] Launching FMC @ 0x40000130
43,281,569 UART:
43,281,801 UART: Running Caliptra FMC ...
43,282,824 UART:
43,282,986 UART: [state] CFI Enabled
43,327,211 UART: [art] Extend RT PCRs Done
43,328,347 UART: [art] Lock RT PCRs Done
43,329,873 UART: [art] Populate DV Done
43,335,055 UART: [fht] FMC Alias Private Key: 7
43,336,645 UART: [art] Derive CDI
43,337,458 UART: [art] Store in in slot 0x4
43,380,102 UART: [art] Derive Key Pair
43,381,245 UART: [art] Store priv key in slot 0x5
45,807,569 UART: [art] Derive Key Pair - Done
45,820,461 UART: [art] Signing Cert with AUTHO
45,821,763 UART: RITY.KEYID = 7
47,527,670 UART: [art] Erasing AUTHORITY.KEYID = 7
47,529,179 UART: [art] PUB.X = B759EFEF92EE98279B7E2F8C0F737496CDDBCB0A57C7AE1EF3A19B043DEC99D864DAAC8B3DFEA9DA92D64F2CF01BBCD2
47,536,538 UART: [art] PUB.Y = 7C7D98D591CD4A3582117C293E69258D9391E31CCE96613F7ECEFF1B43347115ED955367A96437594C12F33061C0CCEA
47,543,773 UART: [art] SIG.R = DA15EDA7285D1B5BF431DFB1AF2977B8CC98B920962271CD4C1A1FCFEA0347DD52765119C6479B57705AA57CFCE13D3B
47,551,192 UART: [art] SIG.S = 445FE7D67E89F4AC1FB490D7DBE3544EACDDEF71253153A7693BBA1D7A5C8196284E8B9BF982996ACC634803C73F500A
48,529,082 UART: mbox::rt_entry...
48,530,031 UART: ____ _ _ _ ____ _____
48,531,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,533,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,535,893 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,537,820 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,539,744 UART: |_|
48,540,729 UART:
48,825,812 UART: [rt] Runtime listening for mailbox commands...
48,827,926 >>> mbox cmd response data (48 bytes)
48,828,486 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,830,810 >>> mbox cmd response data (48 bytes)
48,831,703 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,845,601 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,760,313 ready_for_fw is high
3,760,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,967,131 >>> mbox cmd response: success
19,219,432 UART:
19,219,848 UART: Running Caliptra FMC ...
19,221,058 UART:
19,221,242 UART: [state] CFI Enabled
19,228,866 UART: [fht] FMC Alias Private Key: 7
20,985,934 UART: [art] Extend RT PCRs Done
20,987,160 UART: [art] Lock RT PCRs Done
20,988,785 UART: [art] Populate DV Done
20,994,138 UART: [fht] FMC Alias Private Key: 7
20,995,851 UART: [art] Derive CDI
20,996,650 UART: [art] Store in in slot 0x4
21,038,821 UART: [art] Derive Key Pair
21,039,832 UART: [art] Store priv key in slot 0x5
23,467,035 UART: [art] Derive Key Pair - Done
23,479,929 UART: [art] Signing Cert with AUTHO
23,481,269 UART: RITY.KEYID = 7
25,187,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,550 UART: [art] PUB.X = 3F9E922231BB178E197B818739B7164DEF1FCA4C6F578A8EF36DECE4A9034870254B44A52F2247067F4F96605CC1188A
25,195,752 UART: [art] PUB.Y = B18932A63EA2BBB4A26A9292744DCC3CB09904C7F416E737C53B47CA93ADE064EB10EEA06D518A11275AC93C8247E1D5
25,203,024 UART: [art] SIG.R = CDCB11201E92AD07C399C5C4F6E3629FA5D42C998EB325A39DA3E32BD9721CC3942BD60588A14AA70F3B40AC6D8466E1
25,210,426 UART: [art] SIG.S = C0A6F206775B4EF705AF4435942D83E17C6217F01674338A9636AC133729FEABCFE07DC07C6EC72E25FFA794095D5469
26,189,775 UART: Caliptra RT
26,190,487 UART: [state] CFI Enabled
26,307,396 UART: [rt] RT listening for mailbox commands...
30,340,656 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,496,364 UART: [rt]cmd =0x41544d4e, len=14344
34,426,547 >>> mbox cmd response data (8 bytes)
34,427,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,458,058 UART: [rt]cmd =0x41545348, len=116
34,477,477 >>> mbox cmd response data (12 bytes)
36,524,576 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
43,447,714 >>> mbox cmd response: success
43,448,208 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,484,199 UART:
43,484,523 UART: Running Caliptra FMC ...
43,485,554 UART:
43,485,700 UART: [state] CFI Enabled
43,530,085 UART: [art] Extend RT PCRs Done
43,531,239 UART: [art] Lock RT PCRs Done
43,532,658 UART: [art] Populate DV Done
43,538,063 UART: [fht] FMC Alias Private Key: 7
43,539,764 UART: [art] Derive CDI
43,540,572 UART: [art] Store in in slot 0x4
43,583,412 UART: [art] Derive Key Pair
43,584,490 UART: [art] Store priv key in slot 0x5
46,011,795 UART: [art] Derive Key Pair - Done
46,024,692 UART: [art] Signing Cert with AUTHO
46,026,005 UART: RITY.KEYID = 7
47,731,374 UART: [art] Erasing AUTHORITY.KEYID = 7
47,732,905 UART: [art] PUB.X = F4A39BAED782DC80F8FB16AFE80D219E0080C2B24C64E238CB9728B2DD6E49BC094CED4CA988029D34F0F5FF459EA1E1
47,740,148 UART: [art] PUB.Y = 08B78F4DED89AB3EF8CDB8142A33BF95EF36B0256492376345844476E66B5BD8B8E18802663AA072FABFE976283B6110
47,747,435 UART: [art] SIG.R = 7814E3E9637A905ED24ACC99788AACE7D42C761988EF00F45D4EC2BD87DB22EAD689B3653619FEB441D17AD518929E0F
47,754,820 UART: [art] SIG.S = FB34513D2323B9550760CFE7EBC5666D2F06E6E0A89D1135405D3512005E7FE25685448DBC5A5162434E95A9A5991A81
48,733,128 UART: mbox::rt_entry...
48,734,091 UART: ____ _ _ _ ____ _____
48,736,024 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,738,031 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,739,890 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,741,813 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,743,724 UART: |_|
48,744,528 UART:
49,025,057 UART: [rt] Runtime listening for mailbox commands...
49,027,181 >>> mbox cmd response data (48 bytes)
49,027,745 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,030,062 >>> mbox cmd response data (48 bytes)
49,030,965 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,044,858 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,761 UART: [kat] SHA2-256
881,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,807 UART: [kat] ++
885,959 UART: [kat] sha1
890,277 UART: [kat] SHA2-256
892,215 UART: [kat] SHA2-384
895,060 UART: [kat] SHA2-512-ACC
896,961 UART: [kat] ECC-384
902,266 UART: [kat] HMAC-384Kdf
906,786 UART: [kat] LMS
1,474,982 UART: [kat] --
1,475,975 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,386 UART: [idev] ++
1,479,554 UART: [idev] CDI.KEYID = 6
1,479,914 UART: [idev] SUBJECT.KEYID = 7
1,480,338 UART: [idev] UDS.KEYID = 0
1,480,683 ready_for_fw is high
1,480,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,840 UART: [idev] --
1,514,829 UART: [ldev] ++
1,514,997 UART: [ldev] CDI.KEYID = 6
1,515,360 UART: [ldev] SUBJECT.KEYID = 5
1,515,786 UART: [ldev] AUTHORITY.KEYID = 7
1,516,249 UART: [ldev] FE.KEYID = 1
1,521,167 UART: [ldev] Erasing FE.KEYID = 1
1,545,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,636 UART: [ldev] --
1,585,091 UART: [fwproc] Waiting for Commands...
1,585,800 UART: [fwproc] Received command 0x46574c44
1,586,591 UART: [fwproc] Received Image of size 114360 bytes
2,883,436 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,461 >>> mbox cmd response: success
3,077,513 UART: [afmc] ++
3,077,681 UART: [afmc] CDI.KEYID = 6
3,078,043 UART: [afmc] SUBJECT.KEYID = 7
3,078,468 UART: [afmc] AUTHORITY.KEYID = 5
3,113,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,541 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,934 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,624 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,449 UART: [afmc] --
3,156,347 UART: [cold-reset] --
3,157,123 UART: [state] Locking Datavault
3,158,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,960 UART: [state] Locking ICCM
3,159,488 UART: [exit] Launching FMC @ 0x40000130
3,164,817 UART:
3,164,833 UART: Running Caliptra FMC ...
3,165,241 UART:
3,165,295 UART: [state] CFI Enabled
3,175,736 UART: [fht] FMC Alias Private Key: 7
3,283,913 UART: [art] Extend RT PCRs Done
3,284,341 UART: [art] Lock RT PCRs Done
3,285,827 UART: [art] Populate DV Done
3,293,944 UART: [fht] FMC Alias Private Key: 7
3,295,080 UART: [art] Derive CDI
3,295,360 UART: [art] Store in in slot 0x4
3,380,545 UART: [art] Derive Key Pair
3,380,905 UART: [art] Store priv key in slot 0x5
3,394,331 UART: [art] Derive Key Pair - Done
3,409,186 UART: [art] Signing Cert with AUTHO
3,409,666 UART: RITY.KEYID = 7
3,425,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,055 UART: [art] PUB.X = 7C32317768642B97DCB50B998D0BAF5FD5E6A9EB5499BC37EE154580563864221372C218002DC6B19858D4232C6DF088
3,432,791 UART: [art] PUB.Y = 7A26FCC49EF76434C196C6520E7E1B5C1334A379511262E7BD83CECF551E75B967684BC5E6151FCB3E0854D385E1D18F
3,439,739 UART: [art] SIG.R = 45AC43F3DCA77D97C4034EC7068BE6722AD1055A83E5B12D37B22A5F4C40CD3BA67881A4ACD12D39060BDC18AEB260D0
3,446,508 UART: [art] SIG.S = 677FF15F3D34D09DE0215BDA610606FAB2E5E25CB39265BBB2B7E16A04A029BF66BD2AF794D7151285E5E8398D60D23C
3,470,302 UART: Caliptra RT
3,470,556 UART: [state] CFI Enabled
3,578,447 UART: [rt] RT listening for mailbox commands...
3,579,117 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,822 UART: [rt]cmd =0x41544d4e, len=14344
3,846,432 >>> mbox cmd response data (8 bytes)
3,846,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,518 UART: [rt]cmd =0x41545348, len=116
3,898,377 >>> mbox cmd response data (12 bytes)
3,898,378 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,083 UART:
3,899,099 UART: Running Caliptra ROM ...
3,899,507 UART:
3,899,561 UART: [state] CFI Enabled
3,902,091 UART: [state] LifecycleState = Unprovisioned
3,902,746 UART: [state] DebugLocked = No
3,903,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,904,925 UART: [kat] SHA2-256
4,698,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,702,971 UART: [kat] ++
4,703,123 UART: [kat] sha1
4,707,389 UART: [kat] SHA2-256
4,709,327 UART: [kat] SHA2-384
4,712,076 UART: [kat] SHA2-512-ACC
4,713,976 UART: [kat] ECC-384
4,719,277 UART: [kat] HMAC-384Kdf
4,723,853 UART: [kat] LMS
5,292,049 UART: [kat] --
5,292,844 UART: [update-reset] ++
6,218,987 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,220,255 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,316,581 >>> mbox cmd response: success
6,316,581 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,316,786 UART: [update-reset] Copying MAN_2 To MAN_1
6,324,800 UART: [update-reset Success] --
6,325,967 UART: [state] Locking Datavault
6,326,729 UART: [state] Locking PCR0, PCR1 and PCR31
6,327,333 UART: [state] Locking ICCM
6,327,999 UART: [exit] Launching FMC @ 0x40000130
6,333,328 UART:
6,333,344 UART: Running Caliptra FMC ...
6,333,752 UART:
6,333,806 UART: [state] CFI Enabled
6,423,047 UART: [art] Extend RT PCRs Done
6,423,475 UART: [art] Lock RT PCRs Done
6,424,842 UART: [art] Populate DV Done
6,433,137 UART: [fht] FMC Alias Private Key: 7
6,434,155 UART: [art] Derive CDI
6,434,435 UART: [art] Store in in slot 0x4
6,519,850 UART: [art] Derive Key Pair
6,520,210 UART: [art] Store priv key in slot 0x5
6,533,948 UART: [art] Derive Key Pair - Done
6,548,601 UART: [art] Signing Cert with AUTHO
6,549,081 UART: RITY.KEYID = 7
6,564,027 UART: [art] Erasing AUTHORITY.KEYID = 7
6,564,792 UART: [art] PUB.X = 6A78894395B7C355E1BFE81C26492858F27C980A50195E5210DFB57F37B1D1A1F6FA4691362007D37CB656017DE9D2B6
6,571,549 UART: [art] PUB.Y = 8A405E10EA5C9FABAB673A123CE6B7B3D70A6D9B28CBB36BAB5F56136F6819C4DCCF97CEC400FBCE5084D67F1EE2AB16
6,578,502 UART: [art] SIG.R = BA62B6EA58B25FF4F8C979F58C04C45CBEA4C8ED7330BA2065E89B198EB3DC9DECBB83FA013223976D8D1DD186F71385
6,585,284 UART: [art] SIG.S = EAA2CDFEE93027A6CCDE5862CD2F5A16BEB22B11837FAB3FC77E62D4A9DB8F3602BDDEA0BFB707EE6312BEDC50ECB423
6,608,947 UART: mbox::rt_entry...
6,609,319 UART: ____ _ _ _ ____ _____
6,610,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,610,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,611,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,612,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,613,207 UART: |_|
6,613,519 UART:
6,889,932 UART: [rt] Runtime listening for mailbox commands...
6,891,103 >>> mbox cmd response data (48 bytes)
6,891,104 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,893,887 >>> mbox cmd response data (48 bytes)
6,893,888 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,909,024 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,941 ready_for_fw is high
1,362,941 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,439 >>> mbox cmd response: success
2,989,627 UART:
2,989,643 UART: Running Caliptra FMC ...
2,990,051 UART:
2,990,105 UART: [state] CFI Enabled
3,000,500 UART: [fht] FMC Alias Private Key: 7
3,108,005 UART: [art] Extend RT PCRs Done
3,108,433 UART: [art] Lock RT PCRs Done
3,110,243 UART: [art] Populate DV Done
3,118,610 UART: [fht] FMC Alias Private Key: 7
3,119,742 UART: [art] Derive CDI
3,120,022 UART: [art] Store in in slot 0x4
3,205,551 UART: [art] Derive Key Pair
3,205,911 UART: [art] Store priv key in slot 0x5
3,219,029 UART: [art] Derive Key Pair - Done
3,233,430 UART: [art] Signing Cert with AUTHO
3,233,910 UART: RITY.KEYID = 7
3,248,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,535 UART: [art] PUB.X = EBB7B7DD78D5569C8A3788614B0AD984785EA8080FA24E28F69DFB98472546534398E5F7F1C2C2C191209DABDB8E05F4
3,256,299 UART: [art] PUB.Y = E88779F570F678D25C619F533D5C5A26D19E1D666C1213E19376549C4D124EFC997577BFDE4D2B431254F2A0CE1A9780
3,263,247 UART: [art] SIG.R = 53CBDF405137428E17239C7603645F8DAB2422F1F9D0942B815BF64A39B7714893839E30DAB3AD530FF7786DC9B83128
3,270,007 UART: [art] SIG.S = 687FE21DB7016EDE0FA8AB4FB743E5838CF0DAD86F97A77247E37B087BB21722F4348B37AE66315D11D2EB32DEAC78DE
3,293,827 UART: Caliptra RT
3,294,081 UART: [state] CFI Enabled
3,401,928 UART: [rt] RT listening for mailbox commands...
3,402,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,243 UART: [rt]cmd =0x41544d4e, len=14344
3,670,229 >>> mbox cmd response data (8 bytes)
3,670,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,239 UART: [rt]cmd =0x41545348, len=116
3,722,144 >>> mbox cmd response data (12 bytes)
3,722,145 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,020,110 >>> mbox cmd response: success
6,020,110 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,033,455 UART:
6,033,471 UART: Running Caliptra FMC ...
6,033,879 UART:
6,033,933 UART: [state] CFI Enabled
6,122,974 UART: [art] Extend RT PCRs Done
6,123,402 UART: [art] Lock RT PCRs Done
6,124,881 UART: [art] Populate DV Done
6,133,192 UART: [fht] FMC Alias Private Key: 7
6,134,162 UART: [art] Derive CDI
6,134,442 UART: [art] Store in in slot 0x4
6,220,117 UART: [art] Derive Key Pair
6,220,477 UART: [art] Store priv key in slot 0x5
6,233,691 UART: [art] Derive Key Pair - Done
6,248,878 UART: [art] Signing Cert with AUTHO
6,249,358 UART: RITY.KEYID = 7
6,264,572 UART: [art] Erasing AUTHORITY.KEYID = 7
6,265,337 UART: [art] PUB.X = D42C03571102B556C05528DC2E50ACD280DE1B456EA957DC61B6C7BB54EF7F584074E57562E22D0298137FDE4625FB45
6,272,100 UART: [art] PUB.Y = 5509790AB13BE19C9CFF6B8F7A23B63DC2793424D7290231CDB4D685B5CE5A8FFE170CB0360913048FA0638DFC2EA784
6,279,040 UART: [art] SIG.R = A700CF9FA945FF6B2E77B43F5D3E30E89DBFE4C0C1FCC5FB9FBC668139B041A21C001238C7136E4A3D9DBD0A1A5DE6F0
6,285,787 UART: [art] SIG.S = 5E4237A79544279632DE4E819C7D851D13B79FA2A4F3BE11AE283B0E7A665AA24E23036CBE6BF884AB9508175595834F
6,308,741 UART: mbox::rt_entry...
6,309,113 UART: ____ _ _ _ ____ _____
6,309,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,310,697 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,311,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,312,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,313,001 UART: |_|
6,313,313 UART:
6,593,557 UART: [rt] Runtime listening for mailbox commands...
6,594,728 >>> mbox cmd response data (48 bytes)
6,594,729 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,597,512 >>> mbox cmd response data (48 bytes)
6,597,513 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,612,649 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,952 UART: [kat] SHA2-256
881,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,998 UART: [kat] ++
886,150 UART: [kat] sha1
890,392 UART: [kat] SHA2-256
892,330 UART: [kat] SHA2-384
895,019 UART: [kat] SHA2-512-ACC
896,920 UART: [kat] ECC-384
902,639 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,356 UART: [cold-reset] ++
1,476,864 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 ready_for_fw is high
1,480,840 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,323 UART: [idev] Erasing UDS.KEYID = 0
1,504,833 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,435 UART: [idev] --
1,514,578 UART: [ldev] ++
1,514,746 UART: [ldev] CDI.KEYID = 6
1,515,109 UART: [ldev] SUBJECT.KEYID = 5
1,515,535 UART: [ldev] AUTHORITY.KEYID = 7
1,515,998 UART: [ldev] FE.KEYID = 1
1,521,214 UART: [ldev] Erasing FE.KEYID = 1
1,546,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,305 UART: [ldev] --
1,585,632 UART: [fwproc] Waiting for Commands...
1,586,333 UART: [fwproc] Received command 0x46574c44
1,587,124 UART: [fwproc] Received Image of size 114360 bytes
2,885,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,237 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,578 >>> mbox cmd response: success
3,079,790 UART: [afmc] ++
3,079,958 UART: [afmc] CDI.KEYID = 6
3,080,320 UART: [afmc] SUBJECT.KEYID = 7
3,080,745 UART: [afmc] AUTHORITY.KEYID = 5
3,116,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,272 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,052 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,665 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,355 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,146 UART: [afmc] --
3,159,274 UART: [cold-reset] --
3,160,026 UART: [state] Locking Datavault
3,161,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,807 UART: [state] Locking ICCM
3,162,265 UART: [exit] Launching FMC @ 0x40000130
3,167,594 UART:
3,167,610 UART: Running Caliptra FMC ...
3,168,018 UART:
3,168,161 UART: [state] CFI Enabled
3,178,614 UART: [fht] FMC Alias Private Key: 7
3,286,871 UART: [art] Extend RT PCRs Done
3,287,299 UART: [art] Lock RT PCRs Done
3,288,525 UART: [art] Populate DV Done
3,296,718 UART: [fht] FMC Alias Private Key: 7
3,297,890 UART: [art] Derive CDI
3,298,170 UART: [art] Store in in slot 0x4
3,383,899 UART: [art] Derive Key Pair
3,384,259 UART: [art] Store priv key in slot 0x5
3,397,651 UART: [art] Derive Key Pair - Done
3,412,402 UART: [art] Signing Cert with AUTHO
3,412,882 UART: RITY.KEYID = 7
3,428,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,801 UART: [art] PUB.X = 9AB53C40A6187220C3DB603C8B649A2276F8EE12DDB6EA4937FA4952CD5B4129A88F879E89751A112A65549234B5A484
3,435,569 UART: [art] PUB.Y = AAA8A1DA5A5BDBD33E1ED3B2A754763881745004A5596AF4CE6F706824564DFB81D8895B639093166484C6C44B3B310B
3,442,515 UART: [art] SIG.R = 327EDB6DD3FAE7EAE65470071D8FBCB4C98D564B62621C04A424A4DFDB76B029666E4B71E91CB8FCA9C62D32F43090DB
3,449,297 UART: [art] SIG.S = 7E072E5069F344AE61855FAC3A5AE8983BD62E1365517A788008DB92525CA064002608943C01A0D2022679D613BC4300
3,473,117 UART: Caliptra RT
3,473,463 UART: [state] CFI Enabled
3,582,050 UART: [rt] RT listening for mailbox commands...
3,582,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,273 UART: [rt]cmd =0x41544d4e, len=14344
3,849,889 >>> mbox cmd response data (8 bytes)
3,849,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,013 UART: [rt]cmd =0x41545348, len=116
3,901,684 >>> mbox cmd response data (12 bytes)
3,901,685 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,290 UART:
3,902,306 UART: Running Caliptra ROM ...
3,902,714 UART:
3,902,855 UART: [state] CFI Enabled
3,905,685 UART: [state] LifecycleState = Unprovisioned
3,906,340 UART: [state] DebugLocked = No
3,906,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,908,641 UART: [kat] SHA2-256
4,702,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,706,687 UART: [kat] ++
4,706,839 UART: [kat] sha1
4,711,059 UART: [kat] SHA2-256
4,712,997 UART: [kat] SHA2-384
4,715,774 UART: [kat] SHA2-512-ACC
4,717,674 UART: [kat] ECC-384
4,723,123 UART: [kat] HMAC-384Kdf
4,727,755 UART: [kat] LMS
5,295,951 UART: [kat] --
5,296,912 UART: [update-reset] ++
6,221,423 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,222,669 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,318,995 >>> mbox cmd response: success
6,318,995 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,319,256 UART: [update-reset] Copying MAN_2 To MAN_1
6,327,270 UART: [update-reset Success] --
6,328,249 UART: [state] Locking Datavault
6,329,033 UART: [state] Locking PCR0, PCR1 and PCR31
6,329,637 UART: [state] Locking ICCM
6,330,295 UART: [exit] Launching FMC @ 0x40000130
6,335,624 UART:
6,335,640 UART: Running Caliptra FMC ...
6,336,048 UART:
6,336,191 UART: [state] CFI Enabled
6,425,592 UART: [art] Extend RT PCRs Done
6,426,020 UART: [art] Lock RT PCRs Done
6,427,221 UART: [art] Populate DV Done
6,435,486 UART: [fht] FMC Alias Private Key: 7
6,436,568 UART: [art] Derive CDI
6,436,848 UART: [art] Store in in slot 0x4
6,522,657 UART: [art] Derive Key Pair
6,523,017 UART: [art] Store priv key in slot 0x5
6,536,153 UART: [art] Derive Key Pair - Done
6,550,930 UART: [art] Signing Cert with AUTHO
6,551,410 UART: RITY.KEYID = 7
6,566,892 UART: [art] Erasing AUTHORITY.KEYID = 7
6,567,657 UART: [art] PUB.X = 8AE233360C17C5778EBF77B32487CFEE391F7D6FDE834DF1B650BE8554D328918D8B048DFBFAF7F0B663426BB50ED47D
6,574,432 UART: [art] PUB.Y = B0CF5519649B84C134E9C4F81E69A60BFC05F231E42157CC1A08953612BACFD77BC4F484520EA8E9DAEB4821A594AAB5
6,581,382 UART: [art] SIG.R = BD87CF8232A73A774E6B5303E6F45B6CC2336BE399D621C147D670DC6AAFC8184E54554BC69AA24BBBD6F064D30DB352
6,588,158 UART: [art] SIG.S = 09D0BA48A34D4F7C64D8B54161D096097CDE87109B88DD4EBC8F6EE21B8721AE24F09A98FA9DC629145481B32FE5A6CB
6,611,739 UART: mbox::rt_entry...
6,612,111 UART: ____ _ _ _ ____ _____
6,612,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,613,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,614,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,615,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,615,999 UART: |_|
6,616,311 UART:
6,898,913 UART: [rt] Runtime listening for mailbox commands...
6,900,084 >>> mbox cmd response data (48 bytes)
6,900,085 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,902,868 >>> mbox cmd response data (48 bytes)
6,902,869 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,918,005 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,326 ready_for_fw is high
1,363,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,992 >>> mbox cmd response: success
2,987,482 UART:
2,987,498 UART: Running Caliptra FMC ...
2,987,906 UART:
2,988,049 UART: [state] CFI Enabled
2,998,618 UART: [fht] FMC Alias Private Key: 7
3,106,667 UART: [art] Extend RT PCRs Done
3,107,095 UART: [art] Lock RT PCRs Done
3,108,899 UART: [art] Populate DV Done
3,117,242 UART: [fht] FMC Alias Private Key: 7
3,118,214 UART: [art] Derive CDI
3,118,494 UART: [art] Store in in slot 0x4
3,204,203 UART: [art] Derive Key Pair
3,204,563 UART: [art] Store priv key in slot 0x5
3,217,759 UART: [art] Derive Key Pair - Done
3,232,710 UART: [art] Signing Cert with AUTHO
3,233,190 UART: RITY.KEYID = 7
3,248,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,261 UART: [art] PUB.X = 19947F79ADF4A2192EB37F7D187462A5A201167AFFBC0DD07249564CAEAE8F1734C8DBD67D364F1C2FB94939A457A4BD
3,256,037 UART: [art] PUB.Y = 21AE8180EDE1031FFBB93BE13646BF12B66B1EF61AA5B831A5259E10C45D3A42466055B3ECDA59D88FAC515AC0524364
3,262,994 UART: [art] SIG.R = BE682C99DA996A14CD9B66F30D0832F36C8869361A92277E4DB4F754BFB2B91C9EB6615624F27CE98D6FC9879C92B9DE
3,269,766 UART: [art] SIG.S = 1C350A9C5BC013AD27F5506677FE48140A743FF5B3F876EB45542ED9BB3547FBF0F72FAFF2D18BE853DE193DB984CA14
3,293,875 UART: Caliptra RT
3,294,221 UART: [state] CFI Enabled
3,403,569 UART: [rt] RT listening for mailbox commands...
3,404,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,974 UART: [rt]cmd =0x41544d4e, len=14344
3,671,928 >>> mbox cmd response data (8 bytes)
3,671,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,876 UART: [rt]cmd =0x41545348, len=116
3,724,507 >>> mbox cmd response data (12 bytes)
3,724,508 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,022,902 >>> mbox cmd response: success
6,022,902 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,036,297 UART:
6,036,313 UART: Running Caliptra FMC ...
6,036,721 UART:
6,036,864 UART: [state] CFI Enabled
6,126,247 UART: [art] Extend RT PCRs Done
6,126,675 UART: [art] Lock RT PCRs Done
6,127,762 UART: [art] Populate DV Done
6,136,263 UART: [fht] FMC Alias Private Key: 7
6,137,317 UART: [art] Derive CDI
6,137,597 UART: [art] Store in in slot 0x4
6,222,860 UART: [art] Derive Key Pair
6,223,220 UART: [art] Store priv key in slot 0x5
6,235,952 UART: [art] Derive Key Pair - Done
6,250,819 UART: [art] Signing Cert with AUTHO
6,251,299 UART: RITY.KEYID = 7
6,266,535 UART: [art] Erasing AUTHORITY.KEYID = 7
6,267,300 UART: [art] PUB.X = CCDAFE345166951A0C0B1C655DD6CC9A45161EEC57267715534353C8EFA65841FF0436554E853231C014DA2B609FF5D4
6,274,063 UART: [art] PUB.Y = 1EDD463F19F9EC2E72D0A78C305BB187CBA757A58E653E5E0A61D9A49248DCA7EFBA9DB2EC8039C940F89FDE4B47BC07
6,281,029 UART: [art] SIG.R = 60757F3EC6491D95EFAAC57F337820596A685B55092F91A4099F789773881AF95CBABD433C30E27E05A619071240CEA6
6,287,783 UART: [art] SIG.S = 78EE61FBF7FD61FD5300BEC2C5F977E11C0975676D4C7ADE356590602E48CC9293301199AA77AD3964F5812C0F29D089
6,311,290 UART: mbox::rt_entry...
6,311,662 UART: ____ _ _ _ ____ _____
6,312,446 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,313,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,314,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,314,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,315,550 UART: |_|
6,315,862 UART:
6,594,805 UART: [rt] Runtime listening for mailbox commands...
6,595,976 >>> mbox cmd response data (48 bytes)
6,595,977 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,598,760 >>> mbox cmd response data (48 bytes)
6,598,761 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,613,897 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
892,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,999 UART: [kat] ++
897,151 UART: [kat] sha1
901,471 UART: [kat] SHA2-256
903,411 UART: [kat] SHA2-384
906,184 UART: [kat] SHA2-512-ACC
908,085 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,813 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,174,962 UART: [idev] ++
1,175,130 UART: [idev] CDI.KEYID = 6
1,175,490 UART: [idev] SUBJECT.KEYID = 7
1,175,914 UART: [idev] UDS.KEYID = 0
1,176,259 ready_for_fw is high
1,176,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,799 UART: [idev] Sha1 KeyId Algorithm
1,208,287 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,740 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,739 UART: [ldev] Erasing FE.KEYID = 1
1,242,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,294 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,844 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,094 >>> mbox cmd response: success
2,773,258 UART: [afmc] ++
2,773,426 UART: [afmc] CDI.KEYID = 6
2,773,788 UART: [afmc] SUBJECT.KEYID = 7
2,774,213 UART: [afmc] AUTHORITY.KEYID = 5
2,809,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,558 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,277 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,187 UART: [afmc] --
2,853,199 UART: [cold-reset] --
2,854,239 UART: [state] Locking Datavault
2,855,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,990 UART: [state] Locking ICCM
2,856,652 UART: [exit] Launching FMC @ 0x40000130
2,861,981 UART:
2,861,997 UART: Running Caliptra FMC ...
2,862,405 UART:
2,862,459 UART: [state] CFI Enabled
2,873,150 UART: [fht] FMC Alias Private Key: 7
2,980,511 UART: [art] Extend RT PCRs Done
2,980,939 UART: [art] Lock RT PCRs Done
2,982,339 UART: [art] Populate DV Done
2,990,640 UART: [fht] FMC Alias Private Key: 7
2,991,714 UART: [art] Derive CDI
2,991,994 UART: [art] Store in in slot 0x4
3,077,769 UART: [art] Derive Key Pair
3,078,129 UART: [art] Store priv key in slot 0x5
3,091,585 UART: [art] Derive Key Pair - Done
3,106,586 UART: [art] Signing Cert with AUTHO
3,107,066 UART: RITY.KEYID = 7
3,122,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,215 UART: [art] PUB.X = B0186267597C69DD0F640A44DE2F124D0C8AD913CD15C4D4B74C176118AF6300ABDCC181D5C63E136061E78915963D22
3,129,954 UART: [art] PUB.Y = 162EAEDB559D33947D77E9E47766D04EF48B53C61AC4DDF22B959827B48B04A1E5B91F0766ED972A39CA30E075FEDE1B
3,136,910 UART: [art] SIG.R = B17967C14A3E6100BE78198FF20FEB6B77B56C006D446E70526B1C4494349D9D352F1419A119A6756C05BB93B15A8736
3,143,624 UART: [art] SIG.S = A04AFA21A4E9CD16996DA579FA33E18CFDC9CCAA319C52D02AF328B32E9DE699E935E848B003B9585C0FF2D0EB127E8A
3,168,031 UART: Caliptra RT
3,168,285 UART: [state] CFI Enabled
3,275,992 UART: [rt] RT listening for mailbox commands...
3,276,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,379 UART: [rt]cmd =0x41544d4e, len=14344
3,544,243 >>> mbox cmd response data (8 bytes)
3,544,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,569 UART: [rt]cmd =0x41545348, len=116
3,596,826 >>> mbox cmd response data (12 bytes)
3,596,827 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,497 UART:
3,597,513 UART: Running Caliptra ROM ...
3,597,921 UART:
3,597,976 UART: [state] CFI Enabled
3,600,374 UART: [state] LifecycleState = Unprovisioned
3,601,029 UART: [state] DebugLocked = No
3,601,539 UART: [state] WD Timer not started. Device not locked for debugging
3,602,765 UART: [kat] SHA2-256
4,408,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,412,540 UART: [kat] ++
4,412,692 UART: [kat] sha1
4,416,886 UART: [kat] SHA2-256
4,418,826 UART: [kat] SHA2-384
4,421,573 UART: [kat] SHA2-512-ACC
4,423,473 UART: [kat] ECC-384
4,433,134 UART: [kat] HMAC-384Kdf
4,437,684 UART: [kat] LMS
4,686,012 UART: [kat] --
4,686,860 UART: [update-reset] ++
5,590,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,591,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,687,718 >>> mbox cmd response: success
5,687,718 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,687,845 UART: [update-reset] Copying MAN_2 To MAN_1
5,695,859 UART: [update-reset Success] --
5,697,066 UART: [state] Locking Datavault
5,697,852 UART: [state] Locking PCR0, PCR1 and PCR31
5,698,456 UART: [state] Locking ICCM
5,698,984 UART: [exit] Launching FMC @ 0x40000130
5,704,313 UART:
5,704,329 UART: Running Caliptra FMC ...
5,704,737 UART:
5,704,791 UART: [state] CFI Enabled
5,794,058 UART: [art] Extend RT PCRs Done
5,794,486 UART: [art] Lock RT PCRs Done
5,795,919 UART: [art] Populate DV Done
5,804,056 UART: [fht] FMC Alias Private Key: 7
5,805,078 UART: [art] Derive CDI
5,805,358 UART: [art] Store in in slot 0x4
5,890,749 UART: [art] Derive Key Pair
5,891,109 UART: [art] Store priv key in slot 0x5
5,903,981 UART: [art] Derive Key Pair - Done
5,918,711 UART: [art] Signing Cert with AUTHO
5,919,191 UART: RITY.KEYID = 7
5,934,339 UART: [art] Erasing AUTHORITY.KEYID = 7
5,935,104 UART: [art] PUB.X = 6267862AFE8DCF773BDF3713A0E0FD2CB2E3F3AD20A7A0016B30FEF5430D87B86D1E74CDF8284832607838A9D77C3AAE
5,941,882 UART: [art] PUB.Y = 66E10F15FBF31271191177BED2EBD683049ACCC60D8F9E4431BF896B400BEFCC277AA4D22A4272E230F41A5360D366F8
5,948,828 UART: [art] SIG.R = E7539C448646753D39A4927D70444B1CE177CD48BB4C552E57662B1AB9A105AE6C8D5F56FB8D7232B1948141E91E87B3
5,955,593 UART: [art] SIG.S = 4739CACEED39AC110F64B1316E303A651088918D5B341219B71A8537BE336DA3990A74F6DE9A228E56A71891B45FC14D
5,979,450 UART: mbox::rt_entry...
5,979,822 UART: ____ _ _ _ ____ _____
5,980,606 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,981,406 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,982,174 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,982,942 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,983,710 UART: |_|
5,984,022 UART:
6,262,912 UART: [rt] Runtime listening for mailbox commands...
6,264,083 >>> mbox cmd response data (48 bytes)
6,264,084 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,266,867 >>> mbox cmd response data (48 bytes)
6,266,868 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,282,004 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,055 ready_for_fw is high
1,060,055 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,669 >>> mbox cmd response: success
2,689,429 UART:
2,689,445 UART: Running Caliptra FMC ...
2,689,853 UART:
2,689,907 UART: [state] CFI Enabled
2,700,302 UART: [fht] FMC Alias Private Key: 7
2,807,983 UART: [art] Extend RT PCRs Done
2,808,411 UART: [art] Lock RT PCRs Done
2,810,103 UART: [art] Populate DV Done
2,818,244 UART: [fht] FMC Alias Private Key: 7
2,819,338 UART: [art] Derive CDI
2,819,618 UART: [art] Store in in slot 0x4
2,905,091 UART: [art] Derive Key Pair
2,905,451 UART: [art] Store priv key in slot 0x5
2,918,937 UART: [art] Derive Key Pair - Done
2,933,800 UART: [art] Signing Cert with AUTHO
2,934,280 UART: RITY.KEYID = 7
2,949,498 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,263 UART: [art] PUB.X = B2CBD87FF3E1F5387DE41D2D7B6174DB6495E54B9D5F06AD3E4D898FAD0FC2A5DE33F560BDA8294BF3E358DE6B96B240
2,957,049 UART: [art] PUB.Y = F306554AEE8A54D254A3E455B9CBF448B42DC884882ADF1CCB422B322B70C74F248D127B1CBE0CE396DBA4CCB63997B6
2,964,009 UART: [art] SIG.R = 2389EE1791F1F7F703BBFF1A2CAAA49ABA4D8A2E278B6A50260A80C1B6FC1D01F0322FF5377B1B44BFD055E1FF73E729
2,970,788 UART: [art] SIG.S = 8097DAA200520F5DF1BD52B86752B1469372C3804C2FEDFA4DA845CE561E7E316F6294138A60693703BCA07F2B014A70
2,994,424 UART: Caliptra RT
2,994,678 UART: [state] CFI Enabled
3,102,458 UART: [rt] RT listening for mailbox commands...
3,103,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,043 UART: [rt]cmd =0x41544d4e, len=14344
3,370,935 >>> mbox cmd response data (8 bytes)
3,370,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,043 UART: [rt]cmd =0x41545348, len=116
3,422,940 >>> mbox cmd response data (12 bytes)
3,422,941 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,397,449 >>> mbox cmd response: success
5,397,449 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,410,735 UART:
5,410,751 UART: Running Caliptra FMC ...
5,411,159 UART:
5,411,213 UART: [state] CFI Enabled
5,500,364 UART: [art] Extend RT PCRs Done
5,500,792 UART: [art] Lock RT PCRs Done
5,501,987 UART: [art] Populate DV Done
5,510,140 UART: [fht] FMC Alias Private Key: 7
5,511,228 UART: [art] Derive CDI
5,511,508 UART: [art] Store in in slot 0x4
5,597,115 UART: [art] Derive Key Pair
5,597,475 UART: [art] Store priv key in slot 0x5
5,610,829 UART: [art] Derive Key Pair - Done
5,625,831 UART: [art] Signing Cert with AUTHO
5,626,311 UART: RITY.KEYID = 7
5,641,495 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,260 UART: [art] PUB.X = 3AC296A783A4CD6A27F0E6C2BA8F421F9672DC608916EB570118C02D7BD312AC60D97265C55C9B4CF7CF6B99848B8A85
5,649,035 UART: [art] PUB.Y = A7BE7F6632C89050BBEF6988A0FA03B871C5457706842D4EED5603845389B45865673A5C6006372B1154B027BBF5660F
5,655,962 UART: [art] SIG.R = 7667AE6A50515DFC258A5DF4E8F815082F44ADBB1C79C8715C34296C498A65FC40DAFF440ECEBC0201BECC244904C12A
5,662,731 UART: [art] SIG.S = D852F8035EAE431EAD62A9623F9808CD6F58C90C4D25777936152E506640081BF4402776A8E33C17CEEFCA8520D9B007
5,687,079 UART: mbox::rt_entry...
5,687,451 UART: ____ _ _ _ ____ _____
5,688,235 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,689,035 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,803 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,690,571 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,691,339 UART: |_|
5,691,651 UART:
5,969,279 UART: [rt] Runtime listening for mailbox commands...
5,970,450 >>> mbox cmd response data (48 bytes)
5,970,451 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,973,234 >>> mbox cmd response data (48 bytes)
5,973,235 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,988,371 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
893,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,422 UART: [kat] ++
897,574 UART: [kat] sha1
901,752 UART: [kat] SHA2-256
903,692 UART: [kat] SHA2-384
906,319 UART: [kat] SHA2-512-ACC
908,220 UART: [kat] ECC-384
918,187 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 ready_for_fw is high
1,176,600 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,779 UART: [idev] Erasing UDS.KEYID = 0
1,201,996 UART: [idev] Sha1 KeyId Algorithm
1,210,588 UART: [idev] --
1,211,708 UART: [ldev] ++
1,211,876 UART: [ldev] CDI.KEYID = 6
1,212,239 UART: [ldev] SUBJECT.KEYID = 5
1,212,665 UART: [ldev] AUTHORITY.KEYID = 7
1,213,128 UART: [ldev] FE.KEYID = 1
1,218,270 UART: [ldev] Erasing FE.KEYID = 1
1,244,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,364 UART: [ldev] --
1,283,841 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,217 >>> mbox cmd response: success
2,774,299 UART: [afmc] ++
2,774,467 UART: [afmc] CDI.KEYID = 6
2,774,829 UART: [afmc] SUBJECT.KEYID = 7
2,775,254 UART: [afmc] AUTHORITY.KEYID = 5
2,810,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,172 UART: [afmc] --
2,854,134 UART: [cold-reset] --
2,854,888 UART: [state] Locking Datavault
2,855,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,449 UART: [state] Locking ICCM
2,856,955 UART: [exit] Launching FMC @ 0x40000130
2,862,284 UART:
2,862,300 UART: Running Caliptra FMC ...
2,862,708 UART:
2,862,851 UART: [state] CFI Enabled
2,873,068 UART: [fht] FMC Alias Private Key: 7
2,981,905 UART: [art] Extend RT PCRs Done
2,982,333 UART: [art] Lock RT PCRs Done
2,983,943 UART: [art] Populate DV Done
2,991,842 UART: [fht] FMC Alias Private Key: 7
2,992,794 UART: [art] Derive CDI
2,993,074 UART: [art] Store in in slot 0x4
3,078,525 UART: [art] Derive Key Pair
3,078,885 UART: [art] Store priv key in slot 0x5
3,091,833 UART: [art] Derive Key Pair - Done
3,106,486 UART: [art] Signing Cert with AUTHO
3,106,966 UART: RITY.KEYID = 7
3,122,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,117 UART: [art] PUB.X = 146897175CA33E925A9FA304840B273F75ACF5A42881202DD917760E878803D8988085CF2EF1D9A19443F1036327B8BB
3,129,862 UART: [art] PUB.Y = C5970D90655B02DBBD697A4156A3E01E7207BB81E4D92B240A1DD289502EB4CCDE53EE09567BF733C7A31F5DF176E9C1
3,136,807 UART: [art] SIG.R = 9618C6061FA6EA1BD5C954A3C2B0315A2E4B2C951AF81153D13507C839C70A16B1357C8CA68849E42CBCAE11CF3DB7BC
3,143,580 UART: [art] SIG.S = 3A7784BAC5D26C73565A2BB0C581B284EBA567CB3549F292318E3B72656E5DB41CAD3E6B4D5312B6672D075E8E79B283
3,167,418 UART: Caliptra RT
3,167,764 UART: [state] CFI Enabled
3,276,216 UART: [rt] RT listening for mailbox commands...
3,276,886 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,573 UART: [rt]cmd =0x41544d4e, len=14344
3,544,493 >>> mbox cmd response data (8 bytes)
3,544,494 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,711 UART: [rt]cmd =0x41545348, len=116
3,597,424 >>> mbox cmd response data (12 bytes)
3,597,425 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,143 UART:
3,598,159 UART: Running Caliptra ROM ...
3,598,567 UART:
3,598,709 UART: [state] CFI Enabled
3,601,371 UART: [state] LifecycleState = Unprovisioned
3,602,026 UART: [state] DebugLocked = No
3,602,530 UART: [state] WD Timer not started. Device not locked for debugging
3,603,688 UART: [kat] SHA2-256
4,409,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,413,463 UART: [kat] ++
4,413,615 UART: [kat] sha1
4,417,773 UART: [kat] SHA2-256
4,419,713 UART: [kat] SHA2-384
4,422,466 UART: [kat] SHA2-512-ACC
4,424,366 UART: [kat] ECC-384
4,434,059 UART: [kat] HMAC-384Kdf
4,438,639 UART: [kat] LMS
4,686,967 UART: [kat] --
4,688,121 UART: [update-reset] ++
5,591,636 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,592,649 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,688,923 >>> mbox cmd response: success
5,688,923 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,689,088 UART: [update-reset] Copying MAN_2 To MAN_1
5,697,102 UART: [update-reset Success] --
5,698,149 UART: [state] Locking Datavault
5,699,035 UART: [state] Locking PCR0, PCR1 and PCR31
5,699,639 UART: [state] Locking ICCM
5,700,085 UART: [exit] Launching FMC @ 0x40000130
5,705,414 UART:
5,705,430 UART: Running Caliptra FMC ...
5,705,838 UART:
5,705,981 UART: [state] CFI Enabled
5,795,308 UART: [art] Extend RT PCRs Done
5,795,736 UART: [art] Lock RT PCRs Done
5,796,753 UART: [art] Populate DV Done
5,804,976 UART: [fht] FMC Alias Private Key: 7
5,805,982 UART: [art] Derive CDI
5,806,262 UART: [art] Store in in slot 0x4
5,891,547 UART: [art] Derive Key Pair
5,891,907 UART: [art] Store priv key in slot 0x5
5,904,957 UART: [art] Derive Key Pair - Done
5,919,725 UART: [art] Signing Cert with AUTHO
5,920,205 UART: RITY.KEYID = 7
5,935,399 UART: [art] Erasing AUTHORITY.KEYID = 7
5,936,164 UART: [art] PUB.X = C425C4F322A5FAE070224F4FD0AF022BF01070757E0235FCF16AED2FD65CB1B044FCCE0AFF96D0FF80D074BE909849DC
5,942,945 UART: [art] PUB.Y = 7F37861080F42A3FF88DC6670779BF744D0812F286A06032756950EA03FD942D5723F732E794B9BADA8232382EF9B142
5,949,878 UART: [art] SIG.R = 40EFB14A78EF7D9B63592912684ECEC812F7B4B106668ACF694F15241EFF4F5B86AAD8880F38699BC2DCDB019968B461
5,956,647 UART: [art] SIG.S = 6A5F97C6A4096A3EBD3DD04AB8263CD87CC437F06E57F63EA5E2B4B337F927D8F5BAB6F48EB20A9CF5B27C058F6437A2
5,979,849 UART: mbox::rt_entry...
5,980,221 UART: ____ _ _ _ ____ _____
5,981,005 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,981,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,982,573 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,983,341 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,984,109 UART: |_|
5,984,421 UART:
6,265,065 UART: [rt] Runtime listening for mailbox commands...
6,266,236 >>> mbox cmd response data (48 bytes)
6,266,237 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,269,020 >>> mbox cmd response data (48 bytes)
6,269,021 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,284,157 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 ready_for_fw is high
1,060,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,056 >>> mbox cmd response: success
2,687,578 UART:
2,687,594 UART: Running Caliptra FMC ...
2,688,002 UART:
2,688,145 UART: [state] CFI Enabled
2,698,858 UART: [fht] FMC Alias Private Key: 7
2,807,023 UART: [art] Extend RT PCRs Done
2,807,451 UART: [art] Lock RT PCRs Done
2,809,091 UART: [art] Populate DV Done
2,817,310 UART: [fht] FMC Alias Private Key: 7
2,818,366 UART: [art] Derive CDI
2,818,646 UART: [art] Store in in slot 0x4
2,904,525 UART: [art] Derive Key Pair
2,904,885 UART: [art] Store priv key in slot 0x5
2,917,389 UART: [art] Derive Key Pair - Done
2,932,453 UART: [art] Signing Cert with AUTHO
2,932,933 UART: RITY.KEYID = 7
2,948,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,268 UART: [art] PUB.X = 1C8EBADF90212D590287F2F1E3E490BA726BE820CAD88D7365191FD8E362B1E6C24D25FD9B2AAB04BEF861CCB124CA32
2,956,050 UART: [art] PUB.Y = 3DF3E3774DBBA253C95DCADB5EC469E56D45E81828D76C4A6F94A39FB4C661E9B995898D0197DF59AD7F3D95DDD8A9E4
2,963,015 UART: [art] SIG.R = B50D0DA2ED72B80DCFB4949B4B890ACA0B3A54A1683631C364CE934BC893F70F8A720D4E03CE162FDA6E1FE4554146E6
2,969,775 UART: [art] SIG.S = A15DF3C6CB1D7E22DFD6418FCDE125616AEF051EA56E15E749E73948938418F1E43869E010622482106911C1537D14D4
2,993,513 UART: Caliptra RT
2,993,859 UART: [state] CFI Enabled
3,101,096 UART: [rt] RT listening for mailbox commands...
3,101,766 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,595 UART: [rt]cmd =0x41544d4e, len=14344
3,369,035 >>> mbox cmd response data (8 bytes)
3,369,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,119 UART: [rt]cmd =0x41545348, len=116
3,420,954 >>> mbox cmd response data (12 bytes)
3,420,955 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,395,078 >>> mbox cmd response: success
5,395,078 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,408,098 UART:
5,408,114 UART: Running Caliptra FMC ...
5,408,522 UART:
5,408,665 UART: [state] CFI Enabled
5,497,984 UART: [art] Extend RT PCRs Done
5,498,412 UART: [art] Lock RT PCRs Done
5,499,649 UART: [art] Populate DV Done
5,508,134 UART: [fht] FMC Alias Private Key: 7
5,509,070 UART: [art] Derive CDI
5,509,350 UART: [art] Store in in slot 0x4
5,594,733 UART: [art] Derive Key Pair
5,595,093 UART: [art] Store priv key in slot 0x5
5,608,251 UART: [art] Derive Key Pair - Done
5,623,086 UART: [art] Signing Cert with AUTHO
5,623,566 UART: RITY.KEYID = 7
5,638,716 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,481 UART: [art] PUB.X = 7119D0AB1907AC5EE71039AFC8A1888029123DCACEE087BFEDEE9B6DB47AB087E2DCA5DF67FB177AA3E9E114F35C96A2
5,646,272 UART: [art] PUB.Y = EA621EB43EADAD3BBAA5CB9A2DED5F7AE7B291F21260581541E1FBFE1A0531525C4E8AEB667987B4E411A5C4F4BD158D
5,653,243 UART: [art] SIG.R = BD34CF4060D36328D5117A7E9DFBFE9C245A328B2BB810260F9A7D2F35A16D312F4EA6B4CECB0DB00C732DB0CCFB92F3
5,660,026 UART: [art] SIG.S = 2D7B4FCB292A01E1091DC6149590F259529013888495085582A074A48E6522C06D2885F69DD16A855C1D57E20401227E
5,683,902 UART: mbox::rt_entry...
5,684,274 UART: ____ _ _ _ ____ _____
5,685,058 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,685,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,686,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,687,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,688,162 UART: |_|
5,688,474 UART:
5,965,482 UART: [rt] Runtime listening for mailbox commands...
5,966,653 >>> mbox cmd response data (48 bytes)
5,966,654 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,969,437 >>> mbox cmd response data (48 bytes)
5,969,438 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,984,574 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
915,724 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,173,931 ready_for_fw is high
1,173,931 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,208,049 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,242,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,944 UART: [ldev] --
1,282,304 UART: [fwproc] Wait for Commands...
1,282,949 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,274 >>> mbox cmd response: success
2,774,441 UART: [afmc] ++
2,774,609 UART: [afmc] CDI.KEYID = 6
2,774,972 UART: [afmc] SUBJECT.KEYID = 7
2,775,398 UART: [afmc] AUTHORITY.KEYID = 5
2,810,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,486 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,142 UART: [afmc] --
2,854,062 UART: [cold-reset] --
2,854,838 UART: [state] Locking Datavault
2,855,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,549 UART: [state] Locking ICCM
2,857,085 UART: [exit] Launching FMC @ 0x40000130
2,862,414 UART:
2,862,430 UART: Running Caliptra FMC ...
2,862,838 UART:
2,862,892 UART: [state] CFI Enabled
2,873,591 UART: [fht] FMC Alias Private Key: 7
2,981,746 UART: [art] Extend RT PCRs Done
2,982,174 UART: [art] Lock RT PCRs Done
2,984,030 UART: [art] Populate DV Done
2,992,249 UART: [fht] FMC Alias Private Key: 7
2,993,241 UART: [art] Derive CDI
2,993,521 UART: [art] Store in in slot 0x4
3,079,366 UART: [art] Derive Key Pair
3,079,726 UART: [art] Store priv key in slot 0x5
3,093,524 UART: [art] Derive Key Pair - Done
3,108,084 UART: [art] Signing Cert with AUTHO
3,108,564 UART: RITY.KEYID = 7
3,123,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,107 UART: [art] PUB.X = 5A0509BA4D3B88CC42FCE79D391FF67E181E55E48FB3304AE217EE3B9A8A1A34578E57FD584343600CD201B7576C31D8
3,130,871 UART: [art] PUB.Y = E713DEC54AC0B13DA602FD6BA62296327ADD13C523B86467C70452B024BBA977CA454050EC63D2F46F1CDBD31D014C1C
3,137,824 UART: [art] SIG.R = 39785B03D399FE751B71D524CC23969F2F0A2EA834120FBCE5D8B485C1E139628DEC5BAB8B736EFF9CD6C697FEE6AECE
3,144,605 UART: [art] SIG.S = FE294B6BF4937200E64C8559F48620E3E7071D6A8DB7A769135304D64807F71475FAA1024AFE2D31A60CA765AB2AEEF9
3,168,435 UART: Caliptra RT
3,168,689 UART: [state] CFI Enabled
3,276,331 UART: [rt] RT listening for mailbox commands...
3,277,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,724 UART: [rt]cmd =0x41544d4e, len=14344
3,544,282 >>> mbox cmd response data (8 bytes)
3,544,283 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,530 UART: [rt]cmd =0x41545348, len=116
3,596,561 >>> mbox cmd response data (12 bytes)
3,596,562 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,190 UART:
3,597,206 UART: Running Caliptra ROM ...
3,597,614 UART:
3,597,669 UART: [state] CFI Enabled
3,600,503 UART: [state] LifecycleState = Unprovisioned
3,601,158 UART: [state] DebugLocked = No
3,601,850 UART: [state] WD Timer not started. Device not locked for debugging
3,603,054 UART: [kat] SHA2-256
4,406,604 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,410,733 UART: [kat] ++
4,410,885 UART: [kat] sha1
4,415,101 UART: [kat] SHA2-256
4,417,041 UART: [kat] SHA2-384
4,419,666 UART: [kat] SHA2-512-ACC
4,421,566 UART: [kat] ECC-384
4,431,337 UART: [kat] HMAC-384Kdf
4,436,085 UART: [kat] LMS
4,684,397 UART: [kat] --
4,685,347 UART: [update-reset] ++
5,588,385 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,589,428 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,685,702 >>> mbox cmd response: success
5,685,702 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,686,015 UART: [update-reset] Copying MAN_2 To MAN_1
5,694,029 UART: [update-reset Success] --
5,694,932 UART: [state] Locking Datavault
5,695,510 UART: [state] Locking PCR0, PCR1 and PCR31
5,696,114 UART: [state] Locking ICCM
5,696,768 UART: [exit] Launching FMC @ 0x40000130
5,702,097 UART:
5,702,113 UART: Running Caliptra FMC ...
5,702,521 UART:
5,702,575 UART: [state] CFI Enabled
5,791,582 UART: [art] Extend RT PCRs Done
5,792,010 UART: [art] Lock RT PCRs Done
5,793,559 UART: [art] Populate DV Done
5,801,530 UART: [fht] FMC Alias Private Key: 7
5,802,458 UART: [art] Derive CDI
5,802,738 UART: [art] Store in in slot 0x4
5,888,129 UART: [art] Derive Key Pair
5,888,489 UART: [art] Store priv key in slot 0x5
5,901,337 UART: [art] Derive Key Pair - Done
5,915,758 UART: [art] Signing Cert with AUTHO
5,916,238 UART: RITY.KEYID = 7
5,931,232 UART: [art] Erasing AUTHORITY.KEYID = 7
5,931,997 UART: [art] PUB.X = 03EDE535F62E6F900B9FFC5D35D35D1AAE7B6098C6660C892D1334EE9ABA3750FDE22A05CE2C7AFCCEBE6C25D05B02C7
5,938,776 UART: [art] PUB.Y = 96EC599297C68A7962F4C15225AC176C2EB29B0B713398B6E31D3FCBC5F0EFC770A210C25AA865DA3739A5B9D05016EB
5,945,731 UART: [art] SIG.R = 3E25C33C41C856D94AEF5403AED5DC2797E0F373CE6EAA33236888F00DAC0B1B85E7F468F5CEE15D605F6F4148F79FCE
5,952,508 UART: [art] SIG.S = D8E629FEFFB13A83A10B8617AB6A429A76C0F33C52F1C92AEC4D03885C37701BF8524DC1F41A7106613A10A8A214DB54
5,976,424 UART: mbox::rt_entry...
5,976,796 UART: ____ _ _ _ ____ _____
5,977,580 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,148 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,979,916 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,980,684 UART: |_|
5,980,996 UART:
6,263,746 UART: [rt] Runtime listening for mailbox commands...
6,264,917 >>> mbox cmd response data (48 bytes)
6,264,918 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,267,701 >>> mbox cmd response data (48 bytes)
6,267,702 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,282,838 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,122 ready_for_fw is high
1,055,122 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,552 >>> mbox cmd response: success
2,683,078 UART:
2,683,094 UART: Running Caliptra FMC ...
2,683,502 UART:
2,683,556 UART: [state] CFI Enabled
2,694,029 UART: [fht] FMC Alias Private Key: 7
2,802,424 UART: [art] Extend RT PCRs Done
2,802,852 UART: [art] Lock RT PCRs Done
2,804,876 UART: [art] Populate DV Done
2,812,899 UART: [fht] FMC Alias Private Key: 7
2,814,035 UART: [art] Derive CDI
2,814,315 UART: [art] Store in in slot 0x4
2,899,898 UART: [art] Derive Key Pair
2,900,258 UART: [art] Store priv key in slot 0x5
2,913,730 UART: [art] Derive Key Pair - Done
2,928,371 UART: [art] Signing Cert with AUTHO
2,928,851 UART: RITY.KEYID = 7
2,944,529 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,294 UART: [art] PUB.X = ADB895344ACDDAB0D3C51C3089C696DEF77D8149E49E9B19E1E3FB0A8AC7A4396917CBBF38DF57171F0AE3A3E5574387
2,952,074 UART: [art] PUB.Y = 74BD8A3CC4E7A6520E8B63E3261C6D65C437C1D3340F4992BF898ADFCC99F3F59D6915216727D2127408BFDB89459D0A
2,959,016 UART: [art] SIG.R = E71A4865075EFE21F2C16E0FA0E9690199D1C2E423308AAD89593D11BB536579E0175E77496F23B8DBEDA02626CDB412
2,965,779 UART: [art] SIG.S = F9DAF1BFAF364328A7354E8BEC6A7CABD2F4BA8D3B61864C32DCDEFF2CAEB766F44629A9E29427F0A1D41F48F59FC0C6
2,989,692 UART: Caliptra RT
2,989,946 UART: [state] CFI Enabled
3,097,835 UART: [rt] RT listening for mailbox commands...
3,098,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,016 UART: [rt]cmd =0x41544d4e, len=14344
3,365,270 >>> mbox cmd response data (8 bytes)
3,365,271 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,530 UART: [rt]cmd =0x41545348, len=116
3,417,971 >>> mbox cmd response data (12 bytes)
3,417,972 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,386,519 >>> mbox cmd response: success
5,386,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,399,991 UART:
5,400,007 UART: Running Caliptra FMC ...
5,400,415 UART:
5,400,469 UART: [state] CFI Enabled
5,489,820 UART: [art] Extend RT PCRs Done
5,490,248 UART: [art] Lock RT PCRs Done
5,491,291 UART: [art] Populate DV Done
5,499,502 UART: [fht] FMC Alias Private Key: 7
5,500,548 UART: [art] Derive CDI
5,500,828 UART: [art] Store in in slot 0x4
5,586,325 UART: [art] Derive Key Pair
5,586,685 UART: [art] Store priv key in slot 0x5
5,599,713 UART: [art] Derive Key Pair - Done
5,614,489 UART: [art] Signing Cert with AUTHO
5,614,969 UART: RITY.KEYID = 7
5,630,293 UART: [art] Erasing AUTHORITY.KEYID = 7
5,631,058 UART: [art] PUB.X = 397DD4B509389C1CA459F67E5A603CC67F9C70DE2108D2CB44E26083203B54BEB99F08881ED11CC1DC5BBFD79858D864
5,637,827 UART: [art] PUB.Y = EA1AE4725818F634FAC69ACF508658A63AC9A00E3920DB346A0D8EEEE5EF3CF20281F6C85DCEDFD4B42F88E1BBD336BD
5,644,794 UART: [art] SIG.R = CB72BA70DF327AA9BB5792FC4B287650918DE64267DE159FC6A13E29940B0F22233D2057ABABD5C3F6B57F0F37F1452D
5,651,565 UART: [art] SIG.S = 64E1776E97DD29AFF5A7BAADF70325537E97F7EE5EEFBAB5584344D763672C1E77E8579ED7FE637A25C111256651E2A0
5,674,701 UART: mbox::rt_entry...
5,675,073 UART: ____ _ _ _ ____ _____
5,675,857 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,676,657 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,677,425 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,678,193 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,678,961 UART: |_|
5,679,273 UART:
5,960,357 UART: [rt] Runtime listening for mailbox commands...
5,961,528 >>> mbox cmd response data (48 bytes)
5,961,529 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,964,312 >>> mbox cmd response data (48 bytes)
5,964,313 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,979,449 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,174,284 ready_for_fw is high
1,174,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,807 UART: [ldev] SUBJECT.KEYID = 5
1,210,234 UART: [ldev] AUTHORITY.KEYID = 7
1,210,697 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,161 UART: [fwproc] Wait for Commands...
1,281,844 UART: [fwproc] Recv command 0x46574c44
1,282,577 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,689 >>> mbox cmd response: success
2,774,940 UART: [afmc] ++
2,775,108 UART: [afmc] CDI.KEYID = 6
2,775,471 UART: [afmc] SUBJECT.KEYID = 7
2,775,897 UART: [afmc] AUTHORITY.KEYID = 5
2,811,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,643 UART: [afmc] --
2,854,685 UART: [cold-reset] --
2,855,793 UART: [state] Locking Datavault
2,856,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,504 UART: [state] Locking ICCM
2,857,970 UART: [exit] Launching FMC @ 0x40000130
2,863,299 UART:
2,863,315 UART: Running Caliptra FMC ...
2,863,723 UART:
2,863,866 UART: [state] CFI Enabled
2,874,605 UART: [fht] FMC Alias Private Key: 7
2,982,816 UART: [art] Extend RT PCRs Done
2,983,244 UART: [art] Lock RT PCRs Done
2,984,766 UART: [art] Populate DV Done
2,993,193 UART: [fht] FMC Alias Private Key: 7
2,994,199 UART: [art] Derive CDI
2,994,479 UART: [art] Store in in slot 0x4
3,079,840 UART: [art] Derive Key Pair
3,080,200 UART: [art] Store priv key in slot 0x5
3,093,238 UART: [art] Derive Key Pair - Done
3,108,098 UART: [art] Signing Cert with AUTHO
3,108,578 UART: RITY.KEYID = 7
3,123,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,551 UART: [art] PUB.X = 59AB84F92D2C9EC90CBEB9B7A40BEF5DEB77A6CEB982CD2184736D3047DEEBBEC8AB600B1C53617E226C5AA09C9A2D98
3,131,338 UART: [art] PUB.Y = 81E9CEDF227549A47D5E681E52A9491F5361EADB6D64DC2A27DEEBE7CF4697FF18A777664745E4186BCE35A33C9E6C5C
3,138,302 UART: [art] SIG.R = 986B07BD2523821764AA7ED3C9828F115FA7F7E6306FDE8FF99332E1CEBFFCF605F39E3723CDAF4CDA11E67029C9CE19
3,145,082 UART: [art] SIG.S = ACC6B9A66E6A51DC373FA214479838AE653234075F6A0DCFEE9D7EF692ADC9BD1E5130601285D67B4DF1DE2BD95D1927
3,168,957 UART: Caliptra RT
3,169,303 UART: [state] CFI Enabled
3,277,802 UART: [rt] RT listening for mailbox commands...
3,278,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,345 UART: [rt]cmd =0x41544d4e, len=14344
3,546,035 >>> mbox cmd response data (8 bytes)
3,546,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,033 UART: [rt]cmd =0x41545348, len=116
3,597,860 >>> mbox cmd response data (12 bytes)
3,597,861 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,569 UART:
3,598,585 UART: Running Caliptra ROM ...
3,598,993 UART:
3,599,135 UART: [state] CFI Enabled
3,601,587 UART: [state] LifecycleState = Unprovisioned
3,602,242 UART: [state] DebugLocked = No
3,602,730 UART: [state] WD Timer not started. Device not locked for debugging
3,604,052 UART: [kat] SHA2-256
4,407,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,411,731 UART: [kat] ++
4,411,883 UART: [kat] sha1
4,416,193 UART: [kat] SHA2-256
4,418,133 UART: [kat] SHA2-384
4,420,836 UART: [kat] SHA2-512-ACC
4,422,736 UART: [kat] ECC-384
4,432,379 UART: [kat] HMAC-384Kdf
4,437,063 UART: [kat] LMS
4,685,375 UART: [kat] --
4,686,073 UART: [update-reset] ++
5,590,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,591,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,687,450 >>> mbox cmd response: success
5,687,450 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,687,681 UART: [update-reset] Copying MAN_2 To MAN_1
5,695,695 UART: [update-reset Success] --
5,696,638 UART: [state] Locking Datavault
5,697,420 UART: [state] Locking PCR0, PCR1 and PCR31
5,698,024 UART: [state] Locking ICCM
5,698,568 UART: [exit] Launching FMC @ 0x40000130
5,703,897 UART:
5,703,913 UART: Running Caliptra FMC ...
5,704,321 UART:
5,704,464 UART: [state] CFI Enabled
5,793,575 UART: [art] Extend RT PCRs Done
5,794,003 UART: [art] Lock RT PCRs Done
5,795,208 UART: [art] Populate DV Done
5,803,569 UART: [fht] FMC Alias Private Key: 7
5,804,521 UART: [art] Derive CDI
5,804,801 UART: [art] Store in in slot 0x4
5,890,594 UART: [art] Derive Key Pair
5,890,954 UART: [art] Store priv key in slot 0x5
5,903,914 UART: [art] Derive Key Pair - Done
5,918,660 UART: [art] Signing Cert with AUTHO
5,919,140 UART: RITY.KEYID = 7
5,934,314 UART: [art] Erasing AUTHORITY.KEYID = 7
5,935,079 UART: [art] PUB.X = 86B02048BEFEF2A5AAA7C5A623244D61D79860C1F13633A70A72BDE758806D37C38318FEA14D9197D3A9215206109CBF
5,941,845 UART: [art] PUB.Y = 864689F6123E99357C992D66DA0DED50961F676AE8B0FD80F4CD07579D25304A33492AF50AC3E54521E113298BF5F3E1
5,948,784 UART: [art] SIG.R = 8311A55595F20E6A6900AD806AE0C48A88A1E1A2300A1ADAC12F36DEEE9948946447BBEB2C4348BDA6D1B0126C61CAB4
5,955,538 UART: [art] SIG.S = 075543EB791EE9040841ED6855006A5E3E722700D9601475084ABD507A336288CAF3ADA68CF8BBD7D89EF78CD61246CC
5,979,157 UART: mbox::rt_entry...
5,979,529 UART: ____ _ _ _ ____ _____
5,980,313 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,981,113 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,981,881 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,982,649 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,983,417 UART: |_|
5,983,729 UART:
6,266,515 UART: [rt] Runtime listening for mailbox commands...
6,267,686 >>> mbox cmd response data (48 bytes)
6,267,687 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,270,470 >>> mbox cmd response data (48 bytes)
6,270,471 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,285,607 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,673 ready_for_fw is high
1,055,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,715 >>> mbox cmd response: success
2,686,411 UART:
2,686,427 UART: Running Caliptra FMC ...
2,686,835 UART:
2,686,978 UART: [state] CFI Enabled
2,697,263 UART: [fht] FMC Alias Private Key: 7
2,805,180 UART: [art] Extend RT PCRs Done
2,805,608 UART: [art] Lock RT PCRs Done
2,807,306 UART: [art] Populate DV Done
2,815,703 UART: [fht] FMC Alias Private Key: 7
2,816,637 UART: [art] Derive CDI
2,816,917 UART: [art] Store in in slot 0x4
2,902,716 UART: [art] Derive Key Pair
2,903,076 UART: [art] Store priv key in slot 0x5
2,916,246 UART: [art] Derive Key Pair - Done
2,930,798 UART: [art] Signing Cert with AUTHO
2,931,278 UART: RITY.KEYID = 7
2,946,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,373 UART: [art] PUB.X = 0819F7041533BCAEC2E8E4BCF1AE0A9258A7078B1EE14C8F86B811492C41F3EDBA5FF21DC45D8F1022392199629A80DE
2,954,141 UART: [art] PUB.Y = 38E798EF7A80D0AB34728C818520ED592D9666EB081DB500C331A1BEF1A66ABB35A8C6C9C6AD8841E3C259EAE8298234
2,961,074 UART: [art] SIG.R = A33B0A29A2D1170CD0A00316B9B703ADDC1467F4B64A84D5239D40ACB79ECF24D551BDF6FFFAE62F599E62387E7C3B75
2,967,848 UART: [art] SIG.S = 3AF87DE368314A5FDDE52E5EB19A558C075635754A4CB62704C99643D25E2DACD8DA4789D1A7B7D6143398B7A5FD4BAD
2,991,547 UART: Caliptra RT
2,991,893 UART: [state] CFI Enabled
3,099,593 UART: [rt] RT listening for mailbox commands...
3,100,263 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,184 UART: [rt]cmd =0x41544d4e, len=14344
3,367,938 >>> mbox cmd response data (8 bytes)
3,367,939 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,002 UART: [rt]cmd =0x41545348, len=116
3,419,547 >>> mbox cmd response data (12 bytes)
3,419,548 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,389,980 >>> mbox cmd response: success
5,389,980 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,402,990 UART:
5,403,006 UART: Running Caliptra FMC ...
5,403,414 UART:
5,403,557 UART: [state] CFI Enabled
5,492,760 UART: [art] Extend RT PCRs Done
5,493,188 UART: [art] Lock RT PCRs Done
5,494,451 UART: [art] Populate DV Done
5,502,798 UART: [fht] FMC Alias Private Key: 7
5,503,800 UART: [art] Derive CDI
5,504,080 UART: [art] Store in in slot 0x4
5,590,125 UART: [art] Derive Key Pair
5,590,485 UART: [art] Store priv key in slot 0x5
5,603,657 UART: [art] Derive Key Pair - Done
5,618,653 UART: [art] Signing Cert with AUTHO
5,619,133 UART: RITY.KEYID = 7
5,634,479 UART: [art] Erasing AUTHORITY.KEYID = 7
5,635,244 UART: [art] PUB.X = 9A59FF410E75CD9B0EE3F6AB61C896EC4466171972F66571C7AE04DA175E8FCDB57F015D01653421F5801C35DA174868
5,642,001 UART: [art] PUB.Y = 34DA1B860EA347CFD12DF345921317701D987E462F1E9D9C0F684CC9F3828AC994A6EE31C46655748CF779DA4A18510F
5,648,944 UART: [art] SIG.R = 9B40CD2D6AFAADDDF373159E8250CE49997DCAE459600711FD3DFEC6227B17FE547FE34E1B5774949E266184C859F234
5,655,719 UART: [art] SIG.S = 22728714B986F7B2669D3EF8D9BF9813B281A81909C0A817C5A0D3571E3BF95FF0C61985838D6D47D2412A35B5DB012B
5,679,272 UART: mbox::rt_entry...
5,679,644 UART: ____ _ _ _ ____ _____
5,680,428 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,681,228 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,681,996 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,682,764 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,683,532 UART: |_|
5,683,844 UART:
5,962,342 UART: [rt] Runtime listening for mailbox commands...
5,963,513 >>> mbox cmd response data (48 bytes)
5,963,514 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,966,297 >>> mbox cmd response data (48 bytes)
5,966,298 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,981,434 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,438 UART:
192,807 UART: Running Caliptra ROM ...
193,993 UART:
194,138 UART: [state] CFI Enabled
262,042 UART: [state] LifecycleState = Unprovisioned
264,036 UART: [state] DebugLocked = No
265,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,210 UART: [kat] SHA2-256
440,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,430 UART: [kat] ++
451,911 UART: [kat] sha1
463,132 UART: [kat] SHA2-256
465,863 UART: [kat] SHA2-384
471,279 UART: [kat] SHA2-512-ACC
473,639 UART: [kat] ECC-384
2,766,863 UART: [kat] HMAC-384Kdf
2,800,136 UART: [kat] LMS
3,990,413 UART: [kat] --
3,994,691 UART: [cold-reset] ++
3,995,693 UART: [fht] Storing FHT @ 0x50003400
4,006,661 UART: [idev] ++
4,007,221 UART: [idev] CDI.KEYID = 6
4,008,208 UART: [idev] SUBJECT.KEYID = 7
4,009,448 UART: [idev] UDS.KEYID = 0
4,010,532 ready_for_fw is high
4,010,747 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,228 UART: [idev] Erasing UDS.KEYID = 0
7,344,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,720 UART: [idev] --
7,371,525 UART: [ldev] ++
7,372,099 UART: [ldev] CDI.KEYID = 6
7,373,066 UART: [ldev] SUBJECT.KEYID = 5
7,374,272 UART: [ldev] AUTHORITY.KEYID = 7
7,375,551 UART: [ldev] FE.KEYID = 1
7,424,056 UART: [ldev] Erasing FE.KEYID = 1
10,755,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,510 UART: [ldev] --
13,115,617 UART: [fwproc] Waiting for Commands...
13,117,278 UART: [fwproc] Received command 0x46574c44
13,119,510 UART: [fwproc] Received Image of size 114036 bytes
17,169,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,910 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,638,154 >>> mbox cmd response: success
17,642,909 UART: [afmc] ++
17,643,507 UART: [afmc] CDI.KEYID = 6
17,644,382 UART: [afmc] SUBJECT.KEYID = 7
17,645,647 UART: [afmc] AUTHORITY.KEYID = 5
21,007,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,685 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,946 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,348 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,214 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,682 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,223 UART: [afmc] --
23,380,513 UART: [cold-reset] --
23,383,950 UART: [state] Locking Datavault
23,388,600 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,296 UART: [state] Locking ICCM
23,392,573 UART: [exit] Launching FMC @ 0x40000130
23,400,960 UART:
23,401,183 UART: Running Caliptra FMC ...
23,402,198 UART:
23,402,338 UART: [state] CFI Enabled
23,470,574 UART: [fht] FMC Alias Private Key: 7
25,808,606 UART: [art] Extend RT PCRs Done
25,809,827 UART: [art] Lock RT PCRs Done
25,811,630 UART: [art] Populate DV Done
25,817,193 UART: [fht] FMC Alias Private Key: 7
25,818,664 UART: [art] Derive CDI
25,819,395 UART: [art] Store in in slot 0x4
25,879,889 UART: [art] Derive Key Pair
25,880,943 UART: [art] Store priv key in slot 0x5
29,173,976 UART: [art] Derive Key Pair - Done
29,186,636 UART: [art] Signing Cert with AUTHO
29,187,926 UART: RITY.KEYID = 7
31,475,288 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,789 UART: [art] PUB.X = F92F8F98416C4323B0869963147EE9905296A0DC6395E414AEDBA225EB81009C682C617492EBDC5566C47CEA24B1C28A
31,484,080 UART: [art] PUB.Y = 3E3E3BE737EFC3F7FB63347568F2B8CAB3CE6D02C930FBDE16779FF68C4BCEE716B9A2E03B5810F3DCDF46740634B9B5
31,491,347 UART: [art] SIG.R = 9730FACADF8BCA6D93E2C67ABAF529A20996AB8D4969AB0AF170AC33B1C971E04EA5D88E8C4A9A958FA5E218F98F8A23
31,498,756 UART: [art] SIG.S = 3EA4F21BA967F6674862953C337C4013D696B06ECBFE388EAF469724D43113CDC7B127651B39EBDD6EC0DDB0157B99B8
32,803,676 UART: Caliptra RT
32,804,391 UART: [state] CFI Enabled
32,964,805 UART: [rt] RT listening for mailbox commands...
36,995,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,151,143 UART: [rt]cmd =0x41544d4e, len=14344
42,386,972 >>> mbox cmd response data (8 bytes)
42,387,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,418,356 UART: [rt]cmd =0x41545348, len=116
42,436,854 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,783,394 ready_for_fw is high
3,784,005 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,870,332 >>> mbox cmd response: success
23,566,792 UART:
23,567,182 UART: Running Caliptra FMC ...
23,568,335 UART:
23,568,497 UART: [state] CFI Enabled
23,633,590 UART: [fht] FMC Alias Private Key: 7
25,971,521 UART: [art] Extend RT PCRs Done
25,972,781 UART: [art] Lock RT PCRs Done
25,974,546 UART: [art] Populate DV Done
25,980,014 UART: [fht] FMC Alias Private Key: 7
25,981,553 UART: [art] Derive CDI
25,982,280 UART: [art] Store in in slot 0x4
26,041,981 UART: [art] Derive Key Pair
26,043,025 UART: [art] Store priv key in slot 0x5
29,336,213 UART: [art] Derive Key Pair - Done
29,349,214 UART: [art] Signing Cert with AUTHO
29,350,510 UART: RITY.KEYID = 7
31,636,600 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,118 UART: [art] PUB.X = A7150B2A61C8AD09BAD7D25B1F21A9E223230B7077D330AEC2DD86F11877342B2AA936E1C8395C7BF581B2F4F52173B6
31,645,357 UART: [art] PUB.Y = 19281ACE7646216C4125C62F87547C8CB2306019B52BF6852E571CD2DD141278EF42B1128AF933D60965E21022C0DE04
31,652,561 UART: [art] SIG.R = 6305C7CCE8497E1CF75301124B352C0F49A0C207B6E494A5D36AE5F828BA1154B40518DB10C304FDE951ADCFA2874B74
31,659,938 UART: [art] SIG.S = E2623D157A9696C68064DA8498B040E85C28E276631F12B2DBFB2C580D1CC077EC0530C074290DCF10DFA316146EB9C2
32,965,557 UART: Caliptra RT
32,966,276 UART: [state] CFI Enabled
33,126,202 UART: [rt] RT listening for mailbox commands...
37,155,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,311,074 UART: [rt]cmd =0x41544d4e, len=14344
42,547,058 >>> mbox cmd response data (8 bytes)
42,547,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,578,347 UART: [rt]cmd =0x41545348, len=116
42,597,756 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,412 UART:
192,792 UART: Running Caliptra ROM ...
193,973 UART:
603,703 UART: [state] CFI Enabled
612,059 UART: [state] LifecycleState = Unprovisioned
613,941 UART: [state] DebugLocked = No
616,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
621,321 UART: [kat] SHA2-256
791,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,642 UART: [kat] ++
802,119 UART: [kat] sha1
813,723 UART: [kat] SHA2-256
816,413 UART: [kat] SHA2-384
821,768 UART: [kat] SHA2-512-ACC
824,139 UART: [kat] ECC-384
3,106,598 UART: [kat] HMAC-384Kdf
3,117,695 UART: [kat] LMS
4,307,826 UART: [kat] --
4,313,408 UART: [cold-reset] ++
4,314,842 UART: [fht] Storing FHT @ 0x50003400
4,324,704 UART: [idev] ++
4,325,276 UART: [idev] CDI.KEYID = 6
4,326,187 UART: [idev] SUBJECT.KEYID = 7
4,327,431 UART: [idev] UDS.KEYID = 0
4,328,675 ready_for_fw is high
4,328,887 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,471,951 UART: [idev] Erasing UDS.KEYID = 0
7,610,291 UART: [idev] Using Sha1 for KeyId Algorithm
7,631,482 UART: [idev] --
7,635,628 UART: [ldev] ++
7,636,201 UART: [ldev] CDI.KEYID = 6
7,637,140 UART: [ldev] SUBJECT.KEYID = 5
7,638,352 UART: [ldev] AUTHORITY.KEYID = 7
7,639,635 UART: [ldev] FE.KEYID = 1
7,652,170 UART: [ldev] Erasing FE.KEYID = 1
10,945,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,241 UART: [ldev] --
13,303,089 UART: [fwproc] Waiting for Commands...
13,305,245 UART: [fwproc] Received command 0x46574c44
13,307,423 UART: [fwproc] Received Image of size 114036 bytes
17,357,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,820,440 >>> mbox cmd response: success
17,824,172 UART: [afmc] ++
17,824,768 UART: [afmc] CDI.KEYID = 6
17,825,679 UART: [afmc] SUBJECT.KEYID = 7
17,826,895 UART: [afmc] AUTHORITY.KEYID = 5
21,144,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,001 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,374 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,197 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,619 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,969 UART: [afmc] --
23,511,508 UART: [cold-reset] --
23,514,665 UART: [state] Locking Datavault
23,519,098 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,849 UART: [state] Locking ICCM
23,522,942 UART: [exit] Launching FMC @ 0x40000130
23,531,347 UART:
23,531,632 UART: Running Caliptra FMC ...
23,532,741 UART:
23,532,903 UART: [state] CFI Enabled
23,541,034 UART: [fht] FMC Alias Private Key: 7
25,872,805 UART: [art] Extend RT PCRs Done
25,874,035 UART: [art] Lock RT PCRs Done
25,875,962 UART: [art] Populate DV Done
25,881,156 UART: [fht] FMC Alias Private Key: 7
25,882,799 UART: [art] Derive CDI
25,883,532 UART: [art] Store in in slot 0x4
25,926,275 UART: [art] Derive Key Pair
25,927,275 UART: [art] Store priv key in slot 0x5
29,169,640 UART: [art] Derive Key Pair - Done
29,182,855 UART: [art] Signing Cert with AUTHO
29,184,152 UART: RITY.KEYID = 7
31,463,954 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,452 UART: [art] PUB.X = E31080E70D9E3F8F6CB5E4A0996EE7F1841759CBF04DE517036ADE999D8B876C677AD73228FE9178AC60D2C79500A321
31,472,707 UART: [art] PUB.Y = 5BE0868848F0F1C7614264C79DE12DBF205E371ABDE438B8769F48DCE9902BDC2DFABE7B46788D2E0D84E472FAC8881F
31,479,950 UART: [art] SIG.R = FAB131593B6A21AAF6EC29DCD1B5DBB692D896A83DB4A71D23A51B926CD01557F73922A3AF90721C11D541C9B06CDC74
31,487,367 UART: [art] SIG.S = 0394139EC3778BF09AC58D293F156ECC3DBD68F4BE978EDA4E9257CDA045D34FF9AA3F2995331FD764582885C739B6EB
32,791,979 UART: Caliptra RT
32,792,677 UART: [state] CFI Enabled
32,910,234 UART: [rt] RT listening for mailbox commands...
36,929,948 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,085,512 UART: [rt]cmd =0x41544d4e, len=14344
42,321,157 >>> mbox cmd response data (8 bytes)
42,321,744 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,352,580 UART: [rt]cmd =0x41545348, len=116
42,372,808 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
4,125,044 ready_for_fw is high
4,125,500 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,816 >>> mbox cmd response: success
23,707,757 UART:
23,708,142 UART: Running Caliptra FMC ...
23,709,237 UART:
23,709,389 UART: [state] CFI Enabled
23,717,466 UART: [fht] FMC Alias Private Key: 7
26,047,817 UART: [art] Extend RT PCRs Done
26,049,049 UART: [art] Lock RT PCRs Done
26,050,764 UART: [art] Populate DV Done
26,056,182 UART: [fht] FMC Alias Private Key: 7
26,057,781 UART: [art] Derive CDI
26,058,524 UART: [art] Store in in slot 0x4
26,100,959 UART: [art] Derive Key Pair
26,101,983 UART: [art] Store priv key in slot 0x5
29,343,897 UART: [art] Derive Key Pair - Done
29,357,017 UART: [art] Signing Cert with AUTHO
29,358,324 UART: RITY.KEYID = 7
31,637,471 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,982 UART: [art] PUB.X = AF6264EFA107AA9E80A4EB7A5B9EF84138736B2DF441AF70B409A8CC5DD5CBCEECEC0207E00BF5B9F2AFE6C5E2E2F5A8
31,646,256 UART: [art] PUB.Y = 745BDF036D4185002B3AAD4AC09FDD5F467CB309985A996733C194E2EDAF7D7F1A2F887AFD9676D0DF7E2E3D3A9FEC83
31,653,519 UART: [art] SIG.R = C141F4A49E5D9735A43D1ABE05A34E66B8035F1102CA1E99CFFB3031AD0A45C262D1C35B9C46B58390D0D3BE857DEBE9
31,660,942 UART: [art] SIG.S = E6C43E131F8FEADA9A4D5D008E51FE8C1D88A932DD0BC1BD2B025510CBBAB5DAAE7A2C2A7903B1B7F4A7487C3EB2D92D
32,966,683 UART: Caliptra RT
32,967,388 UART: [state] CFI Enabled
33,083,767 UART: [rt] RT listening for mailbox commands...
37,104,474 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,260,186 UART: [rt]cmd =0x41544d4e, len=14344
42,496,284 >>> mbox cmd response data (8 bytes)
42,496,879 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,527,644 UART: [rt]cmd =0x41545348, len=116
42,547,220 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
192,667 UART:
193,038 UART: Running Caliptra ROM ...
194,227 UART:
194,385 UART: [state] CFI Enabled
262,844 UART: [state] LifecycleState = Unprovisioned
264,752 UART: [state] DebugLocked = No
267,282 UART: [state] WD Timer not started. Device not locked for debugging
270,765 UART: [kat] SHA2-256
449,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,448 UART: [kat] ++
461,925 UART: [kat] sha1
472,549 UART: [kat] SHA2-256
475,639 UART: [kat] SHA2-384
481,631 UART: [kat] SHA2-512-ACC
484,637 UART: [kat] ECC-384
2,951,345 UART: [kat] HMAC-384Kdf
2,971,748 UART: [kat] LMS
3,501,160 UART: [kat] --
3,506,713 UART: [cold-reset] ++
3,508,297 UART: [fht] FHT @ 0x50003400
3,519,984 UART: [idev] ++
3,520,545 UART: [idev] CDI.KEYID = 6
3,521,527 UART: [idev] SUBJECT.KEYID = 7
3,522,718 UART: [idev] UDS.KEYID = 0
3,523,649 ready_for_fw is high
3,523,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,683 UART: [idev] Erasing UDS.KEYID = 0
6,024,131 UART: [idev] Sha1 KeyId Algorithm
6,047,530 UART: [idev] --
6,051,420 UART: [ldev] ++
6,051,992 UART: [ldev] CDI.KEYID = 6
6,052,908 UART: [ldev] SUBJECT.KEYID = 5
6,054,066 UART: [ldev] AUTHORITY.KEYID = 7
6,055,303 UART: [ldev] FE.KEYID = 1
6,101,151 UART: [ldev] Erasing FE.KEYID = 1
8,606,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,084 UART: [ldev] --
10,414,557 UART: [fwproc] Wait for Commands...
10,416,544 UART: [fwproc] Recv command 0x46574c44
10,418,639 UART: [fwproc] Recv'd Img size: 114360 bytes
13,821,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,277,368 >>> mbox cmd response: success
14,281,792 UART: [afmc] ++
14,282,386 UART: [afmc] CDI.KEYID = 6
14,283,300 UART: [afmc] SUBJECT.KEYID = 7
14,284,456 UART: [afmc] AUTHORITY.KEYID = 5
16,828,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,950 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,728 UART: [afmc] --
18,625,139 UART: [cold-reset] --
18,629,977 UART: [state] Locking Datavault
18,634,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,173 UART: [state] Locking ICCM
18,638,864 UART: [exit] Launching FMC @ 0x40000130
18,647,257 UART:
18,647,511 UART: Running Caliptra FMC ...
18,648,561 UART:
18,648,714 UART: [state] CFI Enabled
18,711,353 UART: [fht] FMC Alias Private Key: 7
20,475,315 UART: [art] Extend RT PCRs Done
20,476,548 UART: [art] Lock RT PCRs Done
20,478,573 UART: [art] Populate DV Done
20,484,095 UART: [fht] FMC Alias Private Key: 7
20,485,694 UART: [art] Derive CDI
20,486,513 UART: [art] Store in in slot 0x4
20,545,287 UART: [art] Derive Key Pair
20,546,327 UART: [art] Store priv key in slot 0x5
23,009,654 UART: [art] Derive Key Pair - Done
23,022,638 UART: [art] Signing Cert with AUTHO
23,023,970 UART: RITY.KEYID = 7
24,734,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,485 UART: [art] PUB.X = F20086625268CEC7D518E464C8B786FC0BF82AAD3C1E6B02C9285D8A5D23CF7C22CC842B58E717311981C647E8B58562
24,743,785 UART: [art] PUB.Y = 6ACB1C616D42966ACED282ED3F7003AE7F6D0FFC5A92EE622E0B9BE9B212D34177CD4861A5E2D80BE8E14E89D0BACAB1
24,751,048 UART: [art] SIG.R = 036F9E020197B2C1608B089D7457D534C26DDDE1C79D1BB1DF1AA1DA1C2862E6F7B43E9B0A029D9A247B19F01ACE1969
24,758,473 UART: [art] SIG.S = 5B8BC602B8C8DB396529A90D9F3E3AE139073DF8CA0A7F022BDFE633F79918408FE29854704B0CBEA1FDF5ED66961E86
25,737,268 UART: Caliptra RT
25,737,983 UART: [state] CFI Enabled
25,904,268 UART: [rt] RT listening for mailbox commands...
29,927,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,083,413 UART: [rt]cmd =0x41544d4e, len=14344
34,013,981 >>> mbox cmd response data (8 bytes)
34,014,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,045,250 UART: [rt]cmd =0x41545348, len=116
34,064,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,474 UART:
192,871 UART: Running Caliptra ROM ...
194,068 UART:
194,228 UART: [state] CFI Enabled
267,561 UART: [state] LifecycleState = Unprovisioned
269,962 UART: [state] DebugLocked = No
271,201 UART: [state] WD Timer not started. Device not locked for debugging
275,299 UART: [kat] SHA2-256
465,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,959 UART: [kat] ++
476,406 UART: [kat] sha1
486,496 UART: [kat] SHA2-256
489,502 UART: [kat] SHA2-384
494,994 UART: [kat] SHA2-512-ACC
497,572 UART: [kat] ECC-384
2,949,949 UART: [kat] HMAC-384Kdf
2,972,166 UART: [kat] LMS
3,503,960 UART: [kat] --
3,508,980 UART: [cold-reset] ++
3,510,851 UART: [fht] FHT @ 0x50003400
3,522,693 UART: [idev] ++
3,523,402 UART: [idev] CDI.KEYID = 6
3,524,437 UART: [idev] SUBJECT.KEYID = 7
3,525,543 UART: [idev] UDS.KEYID = 0
3,526,473 ready_for_fw is high
3,526,684 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,606 UART: [idev] Erasing UDS.KEYID = 0
6,029,598 UART: [idev] Sha1 KeyId Algorithm
6,052,126 UART: [idev] --
6,057,184 UART: [ldev] ++
6,057,877 UART: [ldev] CDI.KEYID = 6
6,058,796 UART: [ldev] SUBJECT.KEYID = 5
6,059,962 UART: [ldev] AUTHORITY.KEYID = 7
6,061,164 UART: [ldev] FE.KEYID = 1
6,102,008 UART: [ldev] Erasing FE.KEYID = 1
8,608,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,332 UART: [ldev] --
10,416,297 UART: [fwproc] Wait for Commands...
10,418,983 UART: [fwproc] Recv command 0x46574c44
10,421,290 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,595,702 >>> mbox cmd response: success
14,599,300 UART: [afmc] ++
14,600,037 UART: [afmc] CDI.KEYID = 6
14,601,233 UART: [afmc] SUBJECT.KEYID = 7
14,602,708 UART: [afmc] AUTHORITY.KEYID = 5
17,123,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,853,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,855,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,870,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,535 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,539 UART: [afmc] --
18,928,260 UART: [cold-reset] --
18,932,242 UART: [state] Locking Datavault
18,937,068 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,223 UART: [state] Locking ICCM
18,941,974 UART: [exit] Launching FMC @ 0x40000130
18,950,602 UART:
18,950,862 UART: Running Caliptra FMC ...
18,951,972 UART:
18,952,129 UART: [state] CFI Enabled
19,009,136 UART: [fht] FMC Alias Private Key: 7
20,773,406 UART: [art] Extend RT PCRs Done
20,774,625 UART: [art] Lock RT PCRs Done
20,776,089 UART: [art] Populate DV Done
20,781,882 UART: [fht] FMC Alias Private Key: 7
20,783,584 UART: [art] Derive CDI
20,784,399 UART: [art] Store in in slot 0x4
20,842,131 UART: [art] Derive Key Pair
20,843,161 UART: [art] Store priv key in slot 0x5
23,305,977 UART: [art] Derive Key Pair - Done
23,318,965 UART: [art] Signing Cert with AUTHO
23,320,271 UART: RITY.KEYID = 7
25,032,555 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,087 UART: [art] PUB.X = 161F1E03769534EFD3D1ABC5324BA0B44F3FE563E32E70225719CE0FDA6B7C8D390B202D2745891F2B32F8F8F52180C6
25,041,320 UART: [art] PUB.Y = C10C5CC16878BAE31B0AA63A6DA79FEEB31E266448D67D2C05D7B0B46CB484579FE26C4D9E790FCC6F1AD25A618FFE28
25,048,594 UART: [art] SIG.R = CF395CDC8CF3566CB9825F5DC2E117AB0433A0B99EA3FD28362DF99097662F8530FDD0D71158799808D4AD8D4DD083BE
25,056,040 UART: [art] SIG.S = 26A2916B27A73807F9BBCA5DA67BA468F6D22208FEF2ED840968C7EF7A2968A2923871E3713B9DA489C159DE1114265D
26,034,786 UART: Caliptra RT
26,035,479 UART: [state] CFI Enabled
26,201,251 UART: [rt] RT listening for mailbox commands...
30,223,532 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,378,840 UART: [rt]cmd =0x41544d4e, len=14344
34,308,460 >>> mbox cmd response data (8 bytes)
34,309,039 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,339,671 UART: [rt]cmd =0x41545348, len=116
34,359,212 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,439,282 ready_for_fw is high
3,439,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,741,105 >>> mbox cmd response: success
19,039,128 UART:
19,039,524 UART: Running Caliptra FMC ...
19,040,665 UART:
19,040,828 UART: [state] CFI Enabled
19,106,834 UART: [fht] FMC Alias Private Key: 7
20,870,417 UART: [art] Extend RT PCRs Done
20,871,633 UART: [art] Lock RT PCRs Done
20,873,531 UART: [art] Populate DV Done
20,878,887 UART: [fht] FMC Alias Private Key: 7
20,880,428 UART: [art] Derive CDI
20,881,190 UART: [art] Store in in slot 0x4
20,939,851 UART: [art] Derive Key Pair
20,940,921 UART: [art] Store priv key in slot 0x5
23,403,546 UART: [art] Derive Key Pair - Done
23,416,382 UART: [art] Signing Cert with AUTHO
23,417,684 UART: RITY.KEYID = 7
25,129,235 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,746 UART: [art] PUB.X = 5140833FF7C1F9EEBABA8635458CA63324A47BDBEF9D80F7A13128D939772F8FE77E626907200046A21EF8889F757BF8
25,138,026 UART: [art] PUB.Y = 1F2B708467774A4287A835A63CBF6A589DA9CD8518FB13EB264215605C7BB89F7A8C789394BD5C028FC935A429FDA916
25,145,253 UART: [art] SIG.R = 4512185716792CFA036CFDDCE7E3DE075087488EB4AF4A802DF33D4C80561AB05898566787EEE1F82E9B1F5019508754
25,152,660 UART: [art] SIG.S = B412FF1AC2804F8FE39C72568240DFE74246957B765E6569A5639305E18BC13E6122C54A7ECEDA6C39A6A46C6D353437
26,131,140 UART: Caliptra RT
26,131,831 UART: [state] CFI Enabled
26,298,352 UART: [rt] RT listening for mailbox commands...
30,323,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,479,736 UART: [rt]cmd =0x41544d4e, len=14344
34,410,909 >>> mbox cmd response data (8 bytes)
34,411,525 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,442,159 UART: [rt]cmd =0x41545348, len=116
34,461,755 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,489 UART:
192,841 UART: Running Caliptra ROM ...
193,961 UART:
603,510 UART: [state] CFI Enabled
615,404 UART: [state] LifecycleState = Unprovisioned
617,494 UART: [state] DebugLocked = No
619,961 UART: [state] WD Timer not started. Device not locked for debugging
625,064 UART: [kat] SHA2-256
814,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,769 UART: [kat] ++
826,245 UART: [kat] sha1
837,683 UART: [kat] SHA2-256
840,696 UART: [kat] SHA2-384
846,785 UART: [kat] SHA2-512-ACC
849,406 UART: [kat] ECC-384
3,288,111 UART: [kat] HMAC-384Kdf
3,301,700 UART: [kat] LMS
3,833,575 UART: [kat] --
3,838,753 UART: [cold-reset] ++
3,840,258 UART: [fht] FHT @ 0x50003400
3,852,084 UART: [idev] ++
3,852,792 UART: [idev] CDI.KEYID = 6
3,853,843 UART: [idev] SUBJECT.KEYID = 7
3,854,944 UART: [idev] UDS.KEYID = 0
3,855,873 ready_for_fw is high
3,856,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,757 UART: [idev] Erasing UDS.KEYID = 0
6,332,049 UART: [idev] Sha1 KeyId Algorithm
6,355,154 UART: [idev] --
6,359,743 UART: [ldev] ++
6,360,421 UART: [ldev] CDI.KEYID = 6
6,361,327 UART: [ldev] SUBJECT.KEYID = 5
6,362,477 UART: [ldev] AUTHORITY.KEYID = 7
6,363,856 UART: [ldev] FE.KEYID = 1
6,374,513 UART: [ldev] Erasing FE.KEYID = 1
8,855,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,326 UART: [ldev] --
10,645,343 UART: [fwproc] Wait for Commands...
10,647,754 UART: [fwproc] Recv command 0x46574c44
10,650,058 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,843,265 >>> mbox cmd response: success
14,847,497 UART: [afmc] ++
14,848,207 UART: [afmc] CDI.KEYID = 6
14,849,441 UART: [afmc] SUBJECT.KEYID = 7
14,850,868 UART: [afmc] AUTHORITY.KEYID = 5
17,357,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,511 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,255 UART: [afmc] --
19,154,098 UART: [cold-reset] --
19,157,262 UART: [state] Locking Datavault
19,161,261 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,407 UART: [state] Locking ICCM
19,166,300 UART: [exit] Launching FMC @ 0x40000130
19,174,959 UART:
19,175,194 UART: Running Caliptra FMC ...
19,176,215 UART:
19,176,361 UART: [state] CFI Enabled
19,184,514 UART: [fht] FMC Alias Private Key: 7
20,941,834 UART: [art] Extend RT PCRs Done
20,943,070 UART: [art] Lock RT PCRs Done
20,944,617 UART: [art] Populate DV Done
20,949,829 UART: [fht] FMC Alias Private Key: 7
20,951,478 UART: [art] Derive CDI
20,952,298 UART: [art] Store in in slot 0x4
20,994,677 UART: [art] Derive Key Pair
20,995,673 UART: [art] Store priv key in slot 0x5
23,421,992 UART: [art] Derive Key Pair - Done
23,434,665 UART: [art] Signing Cert with AUTHO
23,435,964 UART: RITY.KEYID = 7
25,141,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,215 UART: [art] PUB.X = FA3723BADFC75E56A90E8E264C36AC00DA7D5F97BF6303FEDE2B8410C0F0BC0360DB733C945AB1D019ED89F7593B481C
25,150,523 UART: [art] PUB.Y = CE01BEDD03C7D53145BEC641F19E5F5EE1044B89036954C1C6601E85695D245DF92B7CECD3521EA2925D167BC696E0A3
25,157,753 UART: [art] SIG.R = 815F5905EA7955B1C6BA2AC7C37E005C5F94A32AF26D4BD397B2B56B3CD3D56B1EF48895FE8173C1F00C1C9E2C210D90
25,165,198 UART: [art] SIG.S = A7E2DCDFF29F010124479229CC81F332F0E4DFC229E86542FBD9DA898C572E570C4FD4BB1B1C17A44C054B08F2AED55C
26,143,899 UART: Caliptra RT
26,144,607 UART: [state] CFI Enabled
26,262,199 UART: [rt] RT listening for mailbox commands...
30,287,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,443,128 UART: [rt]cmd =0x41544d4e, len=14344
34,373,798 >>> mbox cmd response data (8 bytes)
34,374,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,404,962 UART: [rt]cmd =0x41545348, len=116
34,424,661 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,756,084 ready_for_fw is high
3,756,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,460 >>> mbox cmd response: success
19,195,209 UART:
19,195,668 UART: Running Caliptra FMC ...
19,196,771 UART:
19,196,932 UART: [state] CFI Enabled
19,205,109 UART: [fht] FMC Alias Private Key: 7
20,961,880 UART: [art] Extend RT PCRs Done
20,963,097 UART: [art] Lock RT PCRs Done
20,964,668 UART: [art] Populate DV Done
20,970,189 UART: [fht] FMC Alias Private Key: 7
20,971,912 UART: [art] Derive CDI
20,972,731 UART: [art] Store in in slot 0x4
21,015,226 UART: [art] Derive Key Pair
21,016,438 UART: [art] Store priv key in slot 0x5
23,442,786 UART: [art] Derive Key Pair - Done
23,455,453 UART: [art] Signing Cert with AUTHO
23,456,760 UART: RITY.KEYID = 7
25,162,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,706 UART: [art] PUB.X = FF342B5249C15E6535FA00E04BB8B49128B7E16236B99E0348D1EDB4E0D33C3DAFD84E4D148F737CDC8406F55B6245A1
25,170,965 UART: [art] PUB.Y = 1EDF2533611B0B42B2F3E6A2A982DF3C54F22FD4D8F07369F94ED2FFD8E267BA5A46E0808A2F70AB6A857C4AD2566127
25,178,233 UART: [art] SIG.R = BA7EB3AD1AC134F039C437615CF97FA3E7C6BAEA73ECD456015EAD5D1EE277B6D68EEC8D9627A0ED6FC7BAA01AEFFA4F
25,185,641 UART: [art] SIG.S = 808E449A07621790FEE0AFA6D86B4216661FC5BB9FED4B3398E387C57C8051815AA9BCD84642C6189771B6CB17AFF7AF
26,164,373 UART: Caliptra RT
26,165,055 UART: [state] CFI Enabled
26,283,360 UART: [rt] RT listening for mailbox commands...
30,304,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,459,625 UART: [rt]cmd =0x41544d4e, len=14344
34,389,888 >>> mbox cmd response data (8 bytes)
34,390,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,421,247 UART: [rt]cmd =0x41545348, len=116
34,441,272 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,764 UART: [kat] SHA2-512-ACC
896,665 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,888 UART: [kat] LMS
1,475,084 UART: [kat] --
1,475,951 UART: [cold-reset] ++
1,476,425 UART: [fht] Storing FHT @ 0x50003400
1,479,032 UART: [idev] ++
1,479,200 UART: [idev] CDI.KEYID = 6
1,479,560 UART: [idev] SUBJECT.KEYID = 7
1,479,984 UART: [idev] UDS.KEYID = 0
1,480,329 ready_for_fw is high
1,480,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,888 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,932 UART: [idev] --
1,514,005 UART: [ldev] ++
1,514,173 UART: [ldev] CDI.KEYID = 6
1,514,536 UART: [ldev] SUBJECT.KEYID = 5
1,514,962 UART: [ldev] AUTHORITY.KEYID = 7
1,515,425 UART: [ldev] FE.KEYID = 1
1,520,719 UART: [ldev] Erasing FE.KEYID = 1
1,546,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,980 UART: [ldev] --
1,585,253 UART: [fwproc] Waiting for Commands...
1,586,062 UART: [fwproc] Received command 0x46574c44
1,586,853 UART: [fwproc] Received Image of size 114360 bytes
2,883,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,375 >>> mbox cmd response: success
3,077,467 UART: [afmc] ++
3,077,635 UART: [afmc] CDI.KEYID = 6
3,077,997 UART: [afmc] SUBJECT.KEYID = 7
3,078,422 UART: [afmc] AUTHORITY.KEYID = 5
3,113,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,358 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,048 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,011 UART: [afmc] --
3,157,063 UART: [cold-reset] --
3,157,789 UART: [state] Locking Datavault
3,158,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,502 UART: [state] Locking ICCM
3,160,162 UART: [exit] Launching FMC @ 0x40000130
3,165,491 UART:
3,165,507 UART: Running Caliptra FMC ...
3,165,915 UART:
3,165,969 UART: [state] CFI Enabled
3,176,778 UART: [fht] FMC Alias Private Key: 7
3,284,881 UART: [art] Extend RT PCRs Done
3,285,309 UART: [art] Lock RT PCRs Done
3,286,773 UART: [art] Populate DV Done
3,295,096 UART: [fht] FMC Alias Private Key: 7
3,296,196 UART: [art] Derive CDI
3,296,476 UART: [art] Store in in slot 0x4
3,382,019 UART: [art] Derive Key Pair
3,382,379 UART: [art] Store priv key in slot 0x5
3,395,335 UART: [art] Derive Key Pair - Done
3,410,105 UART: [art] Signing Cert with AUTHO
3,410,585 UART: RITY.KEYID = 7
3,425,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,532 UART: [art] PUB.X = F44862B7C2B75AE28793B89BAFC354E9B2EF2E78BF1280D9D83B55CBED0DD5CBF5522A843FF0C80C4212D6F693B3AB50
3,433,314 UART: [art] PUB.Y = 58DCB87BD5DBE637C6E32016D0E172E31926A56E2833395A966C716EB831E7E5944B1C74F88CCDF888EEFB35156D525F
3,440,270 UART: [art] SIG.R = 4B9EFD0A0FE1D2B40E05916E461FAFCC091A81910CB46386ED9A6F3443D4B0E2309EDD3CF1533BC93E37DCBFDC10C1BF
3,447,046 UART: [art] SIG.S = AF5E59AF5CDEE6B8974D2B0063FEC44D48A262E04F30CFEC7A2724BE97DA86FDD4CD479861382A04078E70D1BDA9E602
3,470,998 UART: Caliptra RT
3,471,252 UART: [state] CFI Enabled
3,579,054 UART: [rt] RT listening for mailbox commands...
3,579,724 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,339 UART: [rt]cmd =0x41544d4e, len=14344
3,847,189 >>> mbox cmd response data (8 bytes)
3,847,190 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,439 UART: [rt]cmd =0x41545348, len=116
3,898,684 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,123 ready_for_fw is high
1,363,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,461 >>> mbox cmd response: success
2,988,137 UART:
2,988,153 UART: Running Caliptra FMC ...
2,988,561 UART:
2,988,615 UART: [state] CFI Enabled
2,999,328 UART: [fht] FMC Alias Private Key: 7
3,107,531 UART: [art] Extend RT PCRs Done
3,107,959 UART: [art] Lock RT PCRs Done
3,109,511 UART: [art] Populate DV Done
3,117,484 UART: [fht] FMC Alias Private Key: 7
3,118,584 UART: [art] Derive CDI
3,118,864 UART: [art] Store in in slot 0x4
3,204,789 UART: [art] Derive Key Pair
3,205,149 UART: [art] Store priv key in slot 0x5
3,218,407 UART: [art] Derive Key Pair - Done
3,233,084 UART: [art] Signing Cert with AUTHO
3,233,564 UART: RITY.KEYID = 7
3,249,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,909 UART: [art] PUB.X = A2A022AC59E63B859EFA042CACBAB23F382CC547014F28EEE7EF2830BC608DAE43E8C48413B42739BD895165824C932B
3,256,683 UART: [art] PUB.Y = 3E809AD8480F49998E4FDB1A3549681F81ABD859D35A210A04A28F8093470D3ACBF456EDCBED324234D22CC4F667D5AA
3,263,631 UART: [art] SIG.R = A90183A22DD863700AA2B45855B65C5011E627065F9B8C8C3D7F18D2B5A66871AA7EDBF1121442D626921607E92EB2C1
3,270,387 UART: [art] SIG.S = 4F9AFC3E7E4A655B1E491C2B7EE889F6A20EFB8BABBAB2DF77A585FF720852797ADA149BFC62E41A0B256EFBAA475C30
3,294,609 UART: Caliptra RT
3,294,863 UART: [state] CFI Enabled
3,402,693 UART: [rt] RT listening for mailbox commands...
3,403,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,056 UART: [rt]cmd =0x41544d4e, len=14344
3,670,850 >>> mbox cmd response data (8 bytes)
3,670,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,992 UART: [rt]cmd =0x41545348, len=116
3,722,817 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,257 UART: [kat] SHA2-512-ACC
897,158 UART: [kat] ECC-384
902,865 UART: [kat] HMAC-384Kdf
907,429 UART: [kat] LMS
1,475,625 UART: [kat] --
1,476,636 UART: [cold-reset] ++
1,477,190 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 ready_for_fw is high
1,481,174 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,522,180 UART: [ldev] Erasing FE.KEYID = 1
1,547,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,041 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,293 UART: [fwproc] Received command 0x46574c44
1,589,084 UART: [fwproc] Received Image of size 114360 bytes
2,886,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,147 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,380 >>> mbox cmd response: success
3,080,608 UART: [afmc] ++
3,080,776 UART: [afmc] CDI.KEYID = 6
3,081,138 UART: [afmc] SUBJECT.KEYID = 7
3,081,563 UART: [afmc] AUTHORITY.KEYID = 5
3,116,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,275 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,965 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,970 UART: [afmc] --
3,159,918 UART: [cold-reset] --
3,160,692 UART: [state] Locking Datavault
3,162,143 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,747 UART: [state] Locking ICCM
3,163,327 UART: [exit] Launching FMC @ 0x40000130
3,168,656 UART:
3,168,672 UART: Running Caliptra FMC ...
3,169,080 UART:
3,169,223 UART: [state] CFI Enabled
3,179,740 UART: [fht] FMC Alias Private Key: 7
3,287,683 UART: [art] Extend RT PCRs Done
3,288,111 UART: [art] Lock RT PCRs Done
3,289,689 UART: [art] Populate DV Done
3,298,154 UART: [fht] FMC Alias Private Key: 7
3,299,234 UART: [art] Derive CDI
3,299,514 UART: [art] Store in in slot 0x4
3,385,611 UART: [art] Derive Key Pair
3,385,971 UART: [art] Store priv key in slot 0x5
3,399,811 UART: [art] Derive Key Pair - Done
3,414,412 UART: [art] Signing Cert with AUTHO
3,414,892 UART: RITY.KEYID = 7
3,430,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,895 UART: [art] PUB.X = 4F52482231C00FBFDA22FC8836B1E5E79BE02B01790BF8FEE67BB54769E4ED3D20573D633B49F21BEE2B587B15155937
3,437,662 UART: [art] PUB.Y = 92C29C011BFCB21AED16A68B337CC26BF193C7709599766C62E21EA2F7C16E1D845CC5E6E53ABB9295744CB1F6193CCD
3,444,621 UART: [art] SIG.R = 2F3A37CB82D2BF7C7B7D408823D561F2643E78A741BCC890AAEB80C774B7B41F927C55FFCEDEBEFDEDC6F43C1E6A5730
3,451,415 UART: [art] SIG.S = 020AADF9D6BFA67F04931EE41874906D18AD6BD08E01317003745C4D7D25F579DF31389EA59A477F6AF081D5FB279AD6
3,475,569 UART: Caliptra RT
3,475,915 UART: [state] CFI Enabled
3,584,132 UART: [rt] RT listening for mailbox commands...
3,584,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,285 UART: [rt]cmd =0x41544d4e, len=14344
3,852,473 >>> mbox cmd response data (8 bytes)
3,852,474 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,341 UART: [rt]cmd =0x41545348, len=116
3,904,164 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 ready_for_fw is high
1,362,496 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,895 >>> mbox cmd response: success
2,988,887 UART:
2,988,903 UART: Running Caliptra FMC ...
2,989,311 UART:
2,989,454 UART: [state] CFI Enabled
3,000,291 UART: [fht] FMC Alias Private Key: 7
3,108,736 UART: [art] Extend RT PCRs Done
3,109,164 UART: [art] Lock RT PCRs Done
3,110,532 UART: [art] Populate DV Done
3,118,695 UART: [fht] FMC Alias Private Key: 7
3,119,799 UART: [art] Derive CDI
3,120,079 UART: [art] Store in in slot 0x4
3,205,390 UART: [art] Derive Key Pair
3,205,750 UART: [art] Store priv key in slot 0x5
3,219,112 UART: [art] Derive Key Pair - Done
3,234,087 UART: [art] Signing Cert with AUTHO
3,234,567 UART: RITY.KEYID = 7
3,249,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,270 UART: [art] PUB.X = C95066D8B887E42C55840177FF4C8B666FE76C48B7BE517DDE452727A7391E108F3776D54B6F01809DCD850D6CBF82C6
3,257,033 UART: [art] PUB.Y = 9740404755CC156A5DD131981A4C25369A26348C3984067D71E041702E155FC771F8B9F152BF5C8BA723BA6B89D4DA07
3,263,971 UART: [art] SIG.R = A5A3BE9D2D94FB0B83E7C0905232B7B3B2E00BADC5D8D49F45657B8E1E4ED8124C7C2B4BE8DA0413C6263516AFD9CA2D
3,270,752 UART: [art] SIG.S = 4A3CE1B4906CEB3EE4BCF381F994C0455CA040B915CFB4BF4DE8E6F4918007F0784F8D49F5F47702DF257C0E0E506419
3,295,053 UART: Caliptra RT
3,295,399 UART: [state] CFI Enabled
3,403,637 UART: [rt] RT listening for mailbox commands...
3,404,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,736 UART: [rt]cmd =0x41544d4e, len=14344
3,671,404 >>> mbox cmd response data (8 bytes)
3,671,405 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,700 UART: [rt]cmd =0x41545348, len=116
3,722,803 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [kat] SHA2-256
893,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,923 UART: [kat] ++
898,075 UART: [kat] sha1
902,261 UART: [kat] SHA2-256
904,201 UART: [kat] SHA2-384
907,032 UART: [kat] SHA2-512-ACC
908,933 UART: [kat] ECC-384
918,732 UART: [kat] HMAC-384Kdf
923,318 UART: [kat] LMS
1,171,646 UART: [kat] --
1,172,833 UART: [cold-reset] ++
1,173,343 UART: [fht] FHT @ 0x50003400
1,176,176 UART: [idev] ++
1,176,344 UART: [idev] CDI.KEYID = 6
1,176,704 UART: [idev] SUBJECT.KEYID = 7
1,177,128 UART: [idev] UDS.KEYID = 0
1,177,473 ready_for_fw is high
1,177,473 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,607 UART: [idev] Sha1 KeyId Algorithm
1,209,903 UART: [idev] --
1,210,975 UART: [ldev] ++
1,211,143 UART: [ldev] CDI.KEYID = 6
1,211,506 UART: [ldev] SUBJECT.KEYID = 5
1,211,932 UART: [ldev] AUTHORITY.KEYID = 7
1,212,395 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,244,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,757 UART: [ldev] --
1,283,110 UART: [fwproc] Wait for Commands...
1,283,838 UART: [fwproc] Recv command 0x46574c44
1,284,566 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,902 >>> mbox cmd response: success
2,775,040 UART: [afmc] ++
2,775,208 UART: [afmc] CDI.KEYID = 6
2,775,570 UART: [afmc] SUBJECT.KEYID = 7
2,775,995 UART: [afmc] AUTHORITY.KEYID = 5
2,811,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,021 UART: [afmc] --
2,855,043 UART: [cold-reset] --
2,855,727 UART: [state] Locking Datavault
2,856,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,334 UART: [state] Locking ICCM
2,857,996 UART: [exit] Launching FMC @ 0x40000130
2,863,325 UART:
2,863,341 UART: Running Caliptra FMC ...
2,863,749 UART:
2,863,803 UART: [state] CFI Enabled
2,874,022 UART: [fht] FMC Alias Private Key: 7
2,981,461 UART: [art] Extend RT PCRs Done
2,981,889 UART: [art] Lock RT PCRs Done
2,983,281 UART: [art] Populate DV Done
2,991,708 UART: [fht] FMC Alias Private Key: 7
2,992,640 UART: [art] Derive CDI
2,992,920 UART: [art] Store in in slot 0x4
3,078,695 UART: [art] Derive Key Pair
3,079,055 UART: [art] Store priv key in slot 0x5
3,092,381 UART: [art] Derive Key Pair - Done
3,107,291 UART: [art] Signing Cert with AUTHO
3,107,771 UART: RITY.KEYID = 7
3,123,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,856 UART: [art] PUB.X = 2854999B3CE5BD7EEAACA5511628407AE5E2393A2FBFF4232F765521CBD692F874552A29FD621BFDE7FB959780996168
3,130,630 UART: [art] PUB.Y = E7CFFCCD29AE84CDEA3E2062D9490F0E5EA21B466F5431569156392EE8A1F37E4ABAB5420D60F63669C21FFFFD1523DB
3,137,589 UART: [art] SIG.R = B43D63CDB84851FE189881700FD65AF146B73CCF71E1A193518C3D0F1B9B11D8BF86730B166928BBF1C2435ACD152D23
3,144,356 UART: [art] SIG.S = 64876D2C4CF7EEF88BC949B2725FEA27CA7FE69A516E206BDE3A37AFE5C4DE451F7173A568B49F30B3CD1D072C8DD65B
3,168,348 UART: Caliptra RT
3,168,602 UART: [state] CFI Enabled
3,277,244 UART: [rt] RT listening for mailbox commands...
3,277,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,613 UART: [rt]cmd =0x41544d4e, len=14344
3,545,413 >>> mbox cmd response data (8 bytes)
3,545,414 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,403 UART: [rt]cmd =0x41545348, len=116
3,596,104 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 ready_for_fw is high
1,059,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,853 >>> mbox cmd response: success
2,687,357 UART:
2,687,373 UART: Running Caliptra FMC ...
2,687,781 UART:
2,687,835 UART: [state] CFI Enabled
2,698,246 UART: [fht] FMC Alias Private Key: 7
2,806,599 UART: [art] Extend RT PCRs Done
2,807,027 UART: [art] Lock RT PCRs Done
2,809,217 UART: [art] Populate DV Done
2,817,052 UART: [fht] FMC Alias Private Key: 7
2,818,234 UART: [art] Derive CDI
2,818,514 UART: [art] Store in in slot 0x4
2,904,237 UART: [art] Derive Key Pair
2,904,597 UART: [art] Store priv key in slot 0x5
2,918,195 UART: [art] Derive Key Pair - Done
2,933,001 UART: [art] Signing Cert with AUTHO
2,933,481 UART: RITY.KEYID = 7
2,948,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,396 UART: [art] PUB.X = BACDF8E465689E134B2C9A2D4E814C65BCD9E8BD068DEDB7693189CE6103F9FF880B5EF8D718CA10CDF676BF9E017675
2,956,172 UART: [art] PUB.Y = 192875E8F31FFFA7B5CC3F65040DBBAE24849E2DFE0A71B47193575401C6FD50A77678CF0655A7D12AC746385331E955
2,963,109 UART: [art] SIG.R = 3FC0FB45FF91F9AC9C5C9AF9C6C8D82565E3B2CE575427A71D58526BDA18CB886EB1FF4D4304AA21BDDF80537AA023D0
2,969,896 UART: [art] SIG.S = CE9F57FC8CF1C69093CCF597E3B49745ADE8936FC6CA9469307067AB2E0493C8CFC6A71DC6431C8262E6BD11935F14BE
2,993,546 UART: Caliptra RT
2,993,800 UART: [state] CFI Enabled
3,100,474 UART: [rt] RT listening for mailbox commands...
3,101,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,649 UART: [rt]cmd =0x41544d4e, len=14344
3,368,305 >>> mbox cmd response data (8 bytes)
3,368,306 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,357 UART: [rt]cmd =0x41545348, len=116
3,419,886 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
893,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,438 UART: [kat] ++
897,590 UART: [kat] sha1
901,966 UART: [kat] SHA2-256
903,906 UART: [kat] SHA2-384
906,719 UART: [kat] SHA2-512-ACC
908,620 UART: [kat] ECC-384
918,621 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,346 UART: [cold-reset] ++
1,172,742 UART: [fht] FHT @ 0x50003400
1,175,371 UART: [idev] ++
1,175,539 UART: [idev] CDI.KEYID = 6
1,175,899 UART: [idev] SUBJECT.KEYID = 7
1,176,323 UART: [idev] UDS.KEYID = 0
1,176,668 ready_for_fw is high
1,176,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,725 UART: [idev] Erasing UDS.KEYID = 0
1,202,278 UART: [idev] Sha1 KeyId Algorithm
1,210,766 UART: [idev] --
1,211,838 UART: [ldev] ++
1,212,006 UART: [ldev] CDI.KEYID = 6
1,212,369 UART: [ldev] SUBJECT.KEYID = 5
1,212,795 UART: [ldev] AUTHORITY.KEYID = 7
1,213,258 UART: [ldev] FE.KEYID = 1
1,218,172 UART: [ldev] Erasing FE.KEYID = 1
1,244,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,096 UART: [ldev] --
1,283,533 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,955 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,725 >>> mbox cmd response: success
2,777,735 UART: [afmc] ++
2,777,903 UART: [afmc] CDI.KEYID = 6
2,778,265 UART: [afmc] SUBJECT.KEYID = 7
2,778,690 UART: [afmc] AUTHORITY.KEYID = 5
2,814,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,568 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,790 UART: [afmc] --
2,857,822 UART: [cold-reset] --
2,858,734 UART: [state] Locking Datavault
2,859,905 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,509 UART: [state] Locking ICCM
2,861,069 UART: [exit] Launching FMC @ 0x40000130
2,866,398 UART:
2,866,414 UART: Running Caliptra FMC ...
2,866,822 UART:
2,866,965 UART: [state] CFI Enabled
2,877,112 UART: [fht] FMC Alias Private Key: 7
2,984,681 UART: [art] Extend RT PCRs Done
2,985,109 UART: [art] Lock RT PCRs Done
2,986,905 UART: [art] Populate DV Done
2,995,090 UART: [fht] FMC Alias Private Key: 7
2,996,230 UART: [art] Derive CDI
2,996,510 UART: [art] Store in in slot 0x4
3,082,643 UART: [art] Derive Key Pair
3,083,003 UART: [art] Store priv key in slot 0x5
3,096,515 UART: [art] Derive Key Pair - Done
3,111,337 UART: [art] Signing Cert with AUTHO
3,111,817 UART: RITY.KEYID = 7
3,126,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,466 UART: [art] PUB.X = 62EB0F2ACBF7DD608BAA6037EAA3A9FA52525CBE70FDA7CFC7F0175CA8A889ED726CFD8C30E57EA8581B2F9101F06A6E
3,134,258 UART: [art] PUB.Y = AE68F05E287C58C7A7304F2F65AF9703C95B32F498749029FF64B3DBC282F5A716F88A79A06747B4A87EA2CB1E0E81B3
3,141,208 UART: [art] SIG.R = E11903B6F33B9F8D7AF7758A92FD6717D64D7F5FDA1EA9B4073E84E5490FAAA43DF6D294A4651B3A182C3D98AAC13FAC
3,147,987 UART: [art] SIG.S = 16263B33F966E915DA1D199EE540023E6F4E1C46D93195C6D545452FE9AC9DB0280C55914A095893166117F79743E23B
3,171,629 UART: Caliptra RT
3,171,975 UART: [state] CFI Enabled
3,279,409 UART: [rt] RT listening for mailbox commands...
3,280,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,914 UART: [rt]cmd =0x41544d4e, len=14344
3,547,620 >>> mbox cmd response data (8 bytes)
3,547,621 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,888 UART: [rt]cmd =0x41545348, len=116
3,599,487 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,030 ready_for_fw is high
1,061,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,108 >>> mbox cmd response: success
2,690,336 UART:
2,690,352 UART: Running Caliptra FMC ...
2,690,760 UART:
2,690,903 UART: [state] CFI Enabled
2,701,528 UART: [fht] FMC Alias Private Key: 7
2,809,423 UART: [art] Extend RT PCRs Done
2,809,851 UART: [art] Lock RT PCRs Done
2,811,145 UART: [art] Populate DV Done
2,819,450 UART: [fht] FMC Alias Private Key: 7
2,820,410 UART: [art] Derive CDI
2,820,690 UART: [art] Store in in slot 0x4
2,906,381 UART: [art] Derive Key Pair
2,906,741 UART: [art] Store priv key in slot 0x5
2,920,269 UART: [art] Derive Key Pair - Done
2,935,181 UART: [art] Signing Cert with AUTHO
2,935,661 UART: RITY.KEYID = 7
2,951,019 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,784 UART: [art] PUB.X = 1E7D20BE0F2C4EA58E5EB955421A1D07C3D81A9B741F5DFB89505CC8E90F7E1A3C26F13E3C44DA116181213B97559C19
2,958,553 UART: [art] PUB.Y = 19AFDCBBAF6A39D4C4A0859B90DDC9FC6A29213B167DE34AC9177A89DA5B7D8C089B48391CEF2082EB7A1777C5226BD7
2,965,518 UART: [art] SIG.R = 304C078C3F44A20B5E1FBB0C232A0F2FC8C97214DD3AE634CD38227A9202048796406D0D933A8F9D632132451DF4EA25
2,972,267 UART: [art] SIG.S = 9EC5040C025F7D03FC4DFF5EDAA511D0819519A07F400D1F009B502F3B9B39514383144110889629484BD6225D8B9240
2,995,983 UART: Caliptra RT
2,996,329 UART: [state] CFI Enabled
3,104,591 UART: [rt] RT listening for mailbox commands...
3,105,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,866 UART: [rt]cmd =0x41544d4e, len=14344
3,372,726 >>> mbox cmd response data (8 bytes)
3,372,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,790 UART: [rt]cmd =0x41545348, len=116
3,424,663 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,532 UART: [kat] HMAC-384Kdf
920,100 UART: [kat] LMS
1,168,412 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,483 UART: [idev] ++
1,172,651 UART: [idev] CDI.KEYID = 6
1,173,012 UART: [idev] SUBJECT.KEYID = 7
1,173,437 UART: [idev] UDS.KEYID = 0
1,173,783 ready_for_fw is high
1,173,783 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,449 UART: [idev] Erasing UDS.KEYID = 0
1,198,101 UART: [idev] Sha1 KeyId Algorithm
1,207,005 UART: [idev] --
1,208,012 UART: [ldev] ++
1,208,180 UART: [ldev] CDI.KEYID = 6
1,208,544 UART: [ldev] SUBJECT.KEYID = 5
1,208,971 UART: [ldev] AUTHORITY.KEYID = 7
1,209,434 UART: [ldev] FE.KEYID = 1
1,214,622 UART: [ldev] Erasing FE.KEYID = 1
1,240,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,822 UART: [ldev] --
1,280,144 UART: [fwproc] Wait for Commands...
1,280,793 UART: [fwproc] Recv command 0x46574c44
1,281,526 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,112 >>> mbox cmd response: success
2,773,265 UART: [afmc] ++
2,773,433 UART: [afmc] CDI.KEYID = 6
2,773,796 UART: [afmc] SUBJECT.KEYID = 7
2,774,222 UART: [afmc] AUTHORITY.KEYID = 5
2,809,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,504 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,223 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,022 UART: [afmc] --
2,853,124 UART: [cold-reset] --
2,854,146 UART: [state] Locking Datavault
2,855,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,767 UART: [state] Locking ICCM
2,856,295 UART: [exit] Launching FMC @ 0x40000130
2,861,624 UART:
2,861,640 UART: Running Caliptra FMC ...
2,862,048 UART:
2,862,102 UART: [state] CFI Enabled
2,872,407 UART: [fht] FMC Alias Private Key: 7
2,980,276 UART: [art] Extend RT PCRs Done
2,980,704 UART: [art] Lock RT PCRs Done
2,982,064 UART: [art] Populate DV Done
2,990,335 UART: [fht] FMC Alias Private Key: 7
2,991,363 UART: [art] Derive CDI
2,991,643 UART: [art] Store in in slot 0x4
3,077,480 UART: [art] Derive Key Pair
3,077,840 UART: [art] Store priv key in slot 0x5
3,091,114 UART: [art] Derive Key Pair - Done
3,105,624 UART: [art] Signing Cert with AUTHO
3,106,104 UART: RITY.KEYID = 7
3,121,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,821 UART: [art] PUB.X = D0BA06D01C1E93F659B401085600A8D75FE768368E22FAEC6DB9F236A9F9DA8AC77B2B2D9B688D054ACEA510E224F868
3,128,569 UART: [art] PUB.Y = 7A605212D2BB01362337E2D8685D239E960348EF9573E04BE2F35095B644C391213ECEC9DC1917FB5C1D5EF9292D637E
3,135,511 UART: [art] SIG.R = A05AA0E2DDE1E9C79B84EEC200990812FC33B7F7FA1CABFA5AE2321B792BE76382DF065D262A22AD116EBC12007E0F21
3,142,246 UART: [art] SIG.S = 86283874AABA803CCD482446084A76FE1130A53B44CF8B0444A8C8DCB77F471951E7293385944BBF1137AA84BF6542F9
3,165,773 UART: Caliptra RT
3,166,027 UART: [state] CFI Enabled
3,274,386 UART: [rt] RT listening for mailbox commands...
3,275,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,757 UART: [rt]cmd =0x41544d4e, len=14344
3,542,127 >>> mbox cmd response data (8 bytes)
3,542,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,205 UART: [rt]cmd =0x41545348, len=116
3,593,578 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,508 ready_for_fw is high
1,055,508 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,496 >>> mbox cmd response: success
2,682,738 UART:
2,682,754 UART: Running Caliptra FMC ...
2,683,162 UART:
2,683,216 UART: [state] CFI Enabled
2,693,703 UART: [fht] FMC Alias Private Key: 7
2,801,564 UART: [art] Extend RT PCRs Done
2,801,992 UART: [art] Lock RT PCRs Done
2,803,800 UART: [art] Populate DV Done
2,812,053 UART: [fht] FMC Alias Private Key: 7
2,813,151 UART: [art] Derive CDI
2,813,431 UART: [art] Store in in slot 0x4
2,898,588 UART: [art] Derive Key Pair
2,898,948 UART: [art] Store priv key in slot 0x5
2,912,708 UART: [art] Derive Key Pair - Done
2,927,305 UART: [art] Signing Cert with AUTHO
2,927,785 UART: RITY.KEYID = 7
2,942,997 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,762 UART: [art] PUB.X = 9B069F9C3754BDD40C28890DE1EC1A175CFB50C81D66A4A94C086B6AA0A0E7C821D4F4C536213B8173E11FCD33088F21
2,950,525 UART: [art] PUB.Y = 3A7AF522C0DFD9B185535C964B2257FC46E1CA580A40831088CA359D83CA2C8EB75099012263FCD37D70C4C1B537295B
2,957,471 UART: [art] SIG.R = E86F96855CF988FEDD22D1ADC3BCA68AF260BFAE7C1C213784873322D742283767958BE3DB263EA7B5A6811067C58BDF
2,964,251 UART: [art] SIG.S = 816CE011EC09B8A2CE6955D60CEEED2065750DD5F18B772A00A0673E9AA24405E5BD2A140ECFFCA82798328D41C37444
2,988,233 UART: Caliptra RT
2,988,487 UART: [state] CFI Enabled
3,096,654 UART: [rt] RT listening for mailbox commands...
3,097,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,109 UART: [rt]cmd =0x41544d4e, len=14344
3,364,851 >>> mbox cmd response data (8 bytes)
3,364,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,007 UART: [rt]cmd =0x41545348, len=116
3,417,016 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,610 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,174,786 ready_for_fw is high
1,174,786 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,215 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,869 >>> mbox cmd response: success
2,776,086 UART: [afmc] ++
2,776,254 UART: [afmc] CDI.KEYID = 6
2,776,617 UART: [afmc] SUBJECT.KEYID = 7
2,777,043 UART: [afmc] AUTHORITY.KEYID = 5
2,812,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,731 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,143 UART: [afmc] --
2,856,201 UART: [cold-reset] --
2,857,005 UART: [state] Locking Datavault
2,858,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,726 UART: [state] Locking ICCM
2,859,184 UART: [exit] Launching FMC @ 0x40000130
2,864,513 UART:
2,864,529 UART: Running Caliptra FMC ...
2,864,937 UART:
2,865,080 UART: [state] CFI Enabled
2,875,943 UART: [fht] FMC Alias Private Key: 7
2,983,846 UART: [art] Extend RT PCRs Done
2,984,274 UART: [art] Lock RT PCRs Done
2,985,466 UART: [art] Populate DV Done
2,993,805 UART: [fht] FMC Alias Private Key: 7
2,994,779 UART: [art] Derive CDI
2,995,059 UART: [art] Store in in slot 0x4
3,080,988 UART: [art] Derive Key Pair
3,081,348 UART: [art] Store priv key in slot 0x5
3,094,404 UART: [art] Derive Key Pair - Done
3,109,207 UART: [art] Signing Cert with AUTHO
3,109,687 UART: RITY.KEYID = 7
3,124,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,192 UART: [art] PUB.X = 26258F26B018F4D960C64D09EE34666B785391C76F1390CF5D64F0881E677353ACF979CE61D035BC5B4F66F2FA30A7E1
3,131,959 UART: [art] PUB.Y = A2E0B5EB5CF861A292951C5864E1284F7B4D6DC868FF468FED00ECB5CC88FC5DCEEB3034AD258678A9FD3A722B1B535B
3,138,907 UART: [art] SIG.R = D7978E893CE58292D16D5FFC201BCD148E944D3D4BC6ADFF7FB2D5E315DD1095D02DBD653756E05470F7E33E1EF6A459
3,145,691 UART: [art] SIG.S = B50AF098229B96B832ED1485FBCADCFD2E77C04183E2A43D4CDC4D3D686AF45FA735820588B0D6E51B14F3E5EF75F6CD
3,169,818 UART: Caliptra RT
3,170,164 UART: [state] CFI Enabled
3,278,553 UART: [rt] RT listening for mailbox commands...
3,279,223 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,218 UART: [rt]cmd =0x41544d4e, len=14344
3,546,858 >>> mbox cmd response data (8 bytes)
3,546,859 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,788 UART: [rt]cmd =0x41545348, len=116
3,598,481 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,967 ready_for_fw is high
1,056,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,533 >>> mbox cmd response: success
2,686,949 UART:
2,686,965 UART: Running Caliptra FMC ...
2,687,373 UART:
2,687,516 UART: [state] CFI Enabled
2,698,225 UART: [fht] FMC Alias Private Key: 7
2,806,286 UART: [art] Extend RT PCRs Done
2,806,714 UART: [art] Lock RT PCRs Done
2,808,324 UART: [art] Populate DV Done
2,816,869 UART: [fht] FMC Alias Private Key: 7
2,817,823 UART: [art] Derive CDI
2,818,103 UART: [art] Store in in slot 0x4
2,903,962 UART: [art] Derive Key Pair
2,904,322 UART: [art] Store priv key in slot 0x5
2,917,396 UART: [art] Derive Key Pair - Done
2,932,220 UART: [art] Signing Cert with AUTHO
2,932,700 UART: RITY.KEYID = 7
2,948,030 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,795 UART: [art] PUB.X = B0B7F458198141B038F1FA07AE6B4A5384734774C4E24AEE653F606036B40A9F6748D566DA34D56608C9179DF7171F9C
2,955,552 UART: [art] PUB.Y = A69FA760281F9F03332700C9F408E3686C14B4ECEE6F9246BB156D7607CB1703D3269E0768405E7E8F9AB2505F1A4FA6
2,962,465 UART: [art] SIG.R = ECA33BF08757A4162CF6361ADC8439279E51851C85941E16BC8618CAF139E844DE434B806D8F4C03E6EA310E240669F9
2,969,226 UART: [art] SIG.S = 7A124D0442D16A136C3221D54FF2302E4B1032F2EAA0F336E243A8A69F7F67CCECA1ECBC71CB6F74B93DB2612B49756C
2,992,694 UART: Caliptra RT
2,993,040 UART: [state] CFI Enabled
3,101,330 UART: [rt] RT listening for mailbox commands...
3,102,000 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,591 UART: [rt]cmd =0x41544d4e, len=14344
3,369,633 >>> mbox cmd response data (8 bytes)
3,369,634 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,903 UART: [rt]cmd =0x41545348, len=116
3,422,400 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,439 UART:
192,802 UART: Running Caliptra ROM ...
193,918 UART:
194,076 UART: [state] CFI Enabled
264,924 UART: [state] LifecycleState = Unprovisioned
266,844 UART: [state] DebugLocked = No
268,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,784 UART: [kat] SHA2-256
442,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,030 UART: [kat] ++
453,474 UART: [kat] sha1
465,230 UART: [kat] SHA2-256
467,868 UART: [kat] SHA2-384
473,778 UART: [kat] SHA2-512-ACC
476,133 UART: [kat] ECC-384
2,768,018 UART: [kat] HMAC-384Kdf
2,799,790 UART: [kat] LMS
3,990,131 UART: [kat] --
3,995,290 UART: [cold-reset] ++
3,997,525 UART: [fht] Storing FHT @ 0x50003400
4,009,144 UART: [idev] ++
4,009,707 UART: [idev] CDI.KEYID = 6
4,010,682 UART: [idev] SUBJECT.KEYID = 7
4,011,914 UART: [idev] UDS.KEYID = 0
4,012,860 ready_for_fw is high
4,013,051 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,466 UART: [idev] Erasing UDS.KEYID = 0
7,347,708 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,687 UART: [idev] --
7,374,436 UART: [ldev] ++
7,374,998 UART: [ldev] CDI.KEYID = 6
7,375,924 UART: [ldev] SUBJECT.KEYID = 5
7,377,163 UART: [ldev] AUTHORITY.KEYID = 7
7,378,456 UART: [ldev] FE.KEYID = 1
7,422,657 UART: [ldev] Erasing FE.KEYID = 1
10,756,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,952 UART: [ldev] --
13,136,382 UART: [fwproc] Waiting for Commands...
13,138,781 UART: [fwproc] Received command 0x46574c44
13,140,969 UART: [fwproc] Received Image of size 114036 bytes
17,187,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,478 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,656,415 >>> mbox cmd response: success
17,660,034 UART: [afmc] ++
17,660,631 UART: [afmc] CDI.KEYID = 6
17,661,536 UART: [afmc] SUBJECT.KEYID = 7
17,662,824 UART: [afmc] AUTHORITY.KEYID = 5
21,026,308 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,810 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,058 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,500 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,335 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,775 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,828 UART: [afmc] --
23,399,047 UART: [cold-reset] --
23,403,288 UART: [state] Locking Datavault
23,407,879 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,643 UART: [state] Locking ICCM
23,411,357 UART: [exit] Launching FMC @ 0x40000130
23,419,746 UART:
23,419,974 UART: Running Caliptra FMC ...
23,421,065 UART:
23,421,244 UART: [state] CFI Enabled
23,487,017 UART: [fht] FMC Alias Private Key: 7
25,825,172 UART: [art] Extend RT PCRs Done
25,826,397 UART: [art] Lock RT PCRs Done
25,827,961 UART: [art] Populate DV Done
25,833,198 UART: [fht] FMC Alias Private Key: 7
25,834,781 UART: [art] Derive CDI
25,835,529 UART: [art] Store in in slot 0x4
25,895,952 UART: [art] Derive Key Pair
25,897,000 UART: [art] Store priv key in slot 0x5
29,189,333 UART: [art] Derive Key Pair - Done
29,202,650 UART: [art] Signing Cert with AUTHO
29,203,954 UART: RITY.KEYID = 7
31,490,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,244 UART: [art] PUB.X = CA2CAEAC103FE9AE407007A776B53E68F6A9F29B529DC531FA9BA88D2C4FCACDA4A2E1CFC8543A37B2F095D26F7461FE
31,499,509 UART: [art] PUB.Y = 0ACEFD99FCDBEF3875951DC93DDE1110149E6168D8E59D944C3E97B69703C72AD9E8B9908F1DBE9EFA69401E2F30C0B0
31,506,790 UART: [art] SIG.R = DE19499790713DE35877437916118726FCC322D6E44A31F1CA1A5A1E342962D1E75AA3391F3D9226FBCB3D3F6562851D
31,514,145 UART: [art] SIG.S = 4AF1D2EF8217FBCF8E4E5C4974380AFA9E65F8A61E5533972EA2D4C21D7D793C244DFB21E71021F44F29D1C491B324AB
32,819,833 UART: Caliptra RT
32,820,541 UART: [state] CFI Enabled
32,980,077 UART: [rt] RT listening for mailbox commands...
32,982,522 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,137,912 UART: [rt]cmd =0x41544d4e, len=14344
38,373,737 >>> mbox cmd response data (8 bytes)
38,374,305 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,405,027 UART: [rt]cmd =0x41545348, len=116
38,424,574 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,785,175 ready_for_fw is high
3,785,707 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,867,159 >>> mbox cmd response: success
23,550,981 UART:
23,551,399 UART: Running Caliptra FMC ...
23,552,531 UART:
23,552,684 UART: [state] CFI Enabled
23,621,776 UART: [fht] FMC Alias Private Key: 7
25,959,236 UART: [art] Extend RT PCRs Done
25,960,469 UART: [art] Lock RT PCRs Done
25,962,035 UART: [art] Populate DV Done
25,967,292 UART: [fht] FMC Alias Private Key: 7
25,968,931 UART: [art] Derive CDI
25,969,753 UART: [art] Store in in slot 0x4
26,028,573 UART: [art] Derive Key Pair
26,029,572 UART: [art] Store priv key in slot 0x5
29,322,014 UART: [art] Derive Key Pair - Done
29,334,793 UART: [art] Signing Cert with AUTHO
29,336,125 UART: RITY.KEYID = 7
31,623,285 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,796 UART: [art] PUB.X = AFA2897128BE200AB29D6168DEE1223CD62DB23C5DFFEB1A02A61CBD4F20E642659A5326514CD6E959014D5E7F94E09F
31,632,072 UART: [art] PUB.Y = 269F4F32EB057A4F47683F4A3EDDDFE3FEB54F23DC81E1AC8FB9CAB2E0F937AB1CA605C72FEEE038DC82FD32B6DA3807
31,639,297 UART: [art] SIG.R = 936CD3994560513BE80FD979C2FBAA64B0A92644D8E4D69229AE14333629B7CDB13D8A4DA160519CB5F106990756BE0B
31,646,884 UART: [art] SIG.S = 655FB862B947002E8D19492C612C391134E66163DB02E6A938D356A6EA324000DE7F1FB6F6A4A18C4B8385D4861C7058
32,951,984 UART: Caliptra RT
32,952,694 UART: [state] CFI Enabled
33,112,381 UART: [rt] RT listening for mailbox commands...
33,114,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,269,994 UART: [rt]cmd =0x41544d4e, len=14344
38,505,102 >>> mbox cmd response data (8 bytes)
38,505,682 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,536,417 UART: [rt]cmd =0x41545348, len=116
38,557,224 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,529 UART:
192,896 UART: Running Caliptra ROM ...
194,004 UART:
603,893 UART: [state] CFI Enabled
620,757 UART: [state] LifecycleState = Unprovisioned
622,696 UART: [state] DebugLocked = No
624,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,842 UART: [kat] SHA2-256
799,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,166 UART: [kat] ++
810,643 UART: [kat] sha1
820,880 UART: [kat] SHA2-256
823,610 UART: [kat] SHA2-384
828,111 UART: [kat] SHA2-512-ACC
830,482 UART: [kat] ECC-384
3,113,027 UART: [kat] HMAC-384Kdf
3,124,629 UART: [kat] LMS
4,314,706 UART: [kat] --
4,319,508 UART: [cold-reset] ++
4,322,066 UART: [fht] Storing FHT @ 0x50003400
4,333,132 UART: [idev] ++
4,333,696 UART: [idev] CDI.KEYID = 6
4,334,578 UART: [idev] SUBJECT.KEYID = 7
4,335,892 UART: [idev] UDS.KEYID = 0
4,336,820 ready_for_fw is high
4,337,018 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,245 UART: [idev] Erasing UDS.KEYID = 0
7,627,233 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,510 UART: [idev] --
7,655,208 UART: [ldev] ++
7,655,816 UART: [ldev] CDI.KEYID = 6
7,656,729 UART: [ldev] SUBJECT.KEYID = 5
7,657,948 UART: [ldev] AUTHORITY.KEYID = 7
7,659,179 UART: [ldev] FE.KEYID = 1
7,669,773 UART: [ldev] Erasing FE.KEYID = 1
10,955,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,865 UART: [ldev] --
13,315,748 UART: [fwproc] Waiting for Commands...
13,317,570 UART: [fwproc] Received command 0x46574c44
13,319,758 UART: [fwproc] Received Image of size 114036 bytes
17,370,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,319 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,704 >>> mbox cmd response: success
17,836,295 UART: [afmc] ++
17,836,895 UART: [afmc] CDI.KEYID = 6
17,837,863 UART: [afmc] SUBJECT.KEYID = 7
17,839,080 UART: [afmc] AUTHORITY.KEYID = 5
21,152,881 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,636 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,028 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,846 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,304 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,668 UART: [afmc] --
23,518,156 UART: [cold-reset] --
23,522,717 UART: [state] Locking Datavault
23,528,072 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,826 UART: [state] Locking ICCM
23,532,536 UART: [exit] Launching FMC @ 0x40000130
23,540,939 UART:
23,541,176 UART: Running Caliptra FMC ...
23,542,276 UART:
23,542,433 UART: [state] CFI Enabled
23,550,857 UART: [fht] FMC Alias Private Key: 7
25,881,165 UART: [art] Extend RT PCRs Done
25,882,396 UART: [art] Lock RT PCRs Done
25,883,693 UART: [art] Populate DV Done
25,889,001 UART: [fht] FMC Alias Private Key: 7
25,890,595 UART: [art] Derive CDI
25,891,408 UART: [art] Store in in slot 0x4
25,934,005 UART: [art] Derive Key Pair
25,935,012 UART: [art] Store priv key in slot 0x5
29,177,585 UART: [art] Derive Key Pair - Done
29,190,531 UART: [art] Signing Cert with AUTHO
29,191,848 UART: RITY.KEYID = 7
31,471,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,764 UART: [art] PUB.X = 94F98D5FEF47E6495F74CE63C4A7F6DCA7324599D510C377117A3006CAEA1AE55CC5ABE67391C7DC90A0913F4C05CD36
31,479,990 UART: [art] PUB.Y = 75A12CA2322E7716AF19ED5DC878CC975D749937275121C49CB57635C531B8804F56A6AF910CA99136F1569B018F9230
31,487,245 UART: [art] SIG.R = 4C8F7DA5CB969DDFC466CEED2C13AC974798366F61D2F76F4EF003BCF2D0C18EBA67755D1EF3F3EFB2C58EBEEB1C14AC
31,494,637 UART: [art] SIG.S = 535C0539E6980B487BE2434AB865B95FBEA70ED59FFB23F1E96B0DEE1053298F6021038E05AFBB52C9ADB7B9552F88F7
32,800,339 UART: Caliptra RT
32,801,028 UART: [state] CFI Enabled
32,918,684 UART: [rt] RT listening for mailbox commands...
32,921,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,076,623 UART: [rt]cmd =0x41544d4e, len=14344
38,311,743 >>> mbox cmd response data (8 bytes)
38,312,324 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,343,165 UART: [rt]cmd =0x41545348, len=116
38,362,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,124,657 ready_for_fw is high
4,125,219 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,350 >>> mbox cmd response: success
23,719,507 UART:
23,719,929 UART: Running Caliptra FMC ...
23,721,066 UART:
23,721,222 UART: [state] CFI Enabled
23,729,014 UART: [fht] FMC Alias Private Key: 7
26,059,998 UART: [art] Extend RT PCRs Done
26,061,225 UART: [art] Lock RT PCRs Done
26,062,830 UART: [art] Populate DV Done
26,068,457 UART: [fht] FMC Alias Private Key: 7
26,069,891 UART: [art] Derive CDI
26,070,632 UART: [art] Store in in slot 0x4
26,113,552 UART: [art] Derive Key Pair
26,114,549 UART: [art] Store priv key in slot 0x5
29,356,314 UART: [art] Derive Key Pair - Done
29,369,265 UART: [art] Signing Cert with AUTHO
29,370,569 UART: RITY.KEYID = 7
31,650,395 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,915 UART: [art] PUB.X = 40705DDABC5C3013230C7D75F8530C6B7AEC39B59D610F0CE0F3EAF0EE74E43F56456CA1F9A36A35DB5C9A44531A4C7E
31,659,216 UART: [art] PUB.Y = F6702CF2CC19654AD36B5D4BAB1CD7C1C263CD70BE51C2658DE0BBAA55CEE0343A9239519FEC1210C96A33841D8BEAEF
31,666,452 UART: [art] SIG.R = FC11EC206CB4770B942E6739DA29FC1B85692311618B36B280456D7359E5E8885D0BFAB209CA1CB94298440090458342
31,673,758 UART: [art] SIG.S = CA895CCC74F774E7334B421F07A4C5DD845579DF6B11E702CA4E6706674FC1774D996F25628AD667911A602478C65DB4
32,978,829 UART: Caliptra RT
32,979,540 UART: [state] CFI Enabled
33,097,215 UART: [rt] RT listening for mailbox commands...
33,099,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,255,216 UART: [rt]cmd =0x41544d4e, len=14344
38,491,563 >>> mbox cmd response data (8 bytes)
38,492,152 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,522,929 UART: [rt]cmd =0x41545348, len=116
38,541,937 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
192,703 UART:
193,062 UART: Running Caliptra ROM ...
194,181 UART:
194,321 UART: [state] CFI Enabled
264,983 UART: [state] LifecycleState = Unprovisioned
266,854 UART: [state] DebugLocked = No
268,799 UART: [state] WD Timer not started. Device not locked for debugging
271,946 UART: [kat] SHA2-256
451,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,653 UART: [kat] ++
463,099 UART: [kat] sha1
473,408 UART: [kat] SHA2-256
476,493 UART: [kat] SHA2-384
481,918 UART: [kat] SHA2-512-ACC
484,854 UART: [kat] ECC-384
2,948,128 UART: [kat] HMAC-384Kdf
2,971,589 UART: [kat] LMS
3,500,985 UART: [kat] --
3,504,098 UART: [cold-reset] ++
3,504,903 UART: [fht] FHT @ 0x50003400
3,517,232 UART: [idev] ++
3,517,804 UART: [idev] CDI.KEYID = 6
3,518,717 UART: [idev] SUBJECT.KEYID = 7
3,519,839 UART: [idev] UDS.KEYID = 0
3,520,827 ready_for_fw is high
3,521,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,099 UART: [idev] Erasing UDS.KEYID = 0
6,029,321 UART: [idev] Sha1 KeyId Algorithm
6,052,286 UART: [idev] --
6,056,345 UART: [ldev] ++
6,056,930 UART: [ldev] CDI.KEYID = 6
6,057,840 UART: [ldev] SUBJECT.KEYID = 5
6,059,004 UART: [ldev] AUTHORITY.KEYID = 7
6,060,245 UART: [ldev] FE.KEYID = 1
6,101,031 UART: [ldev] Erasing FE.KEYID = 1
8,606,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,989 UART: [ldev] --
10,413,387 UART: [fwproc] Wait for Commands...
10,416,235 UART: [fwproc] Recv command 0x46574c44
10,418,268 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,786 >>> mbox cmd response: success
14,286,781 UART: [afmc] ++
14,287,377 UART: [afmc] CDI.KEYID = 6
14,288,289 UART: [afmc] SUBJECT.KEYID = 7
14,289,446 UART: [afmc] AUTHORITY.KEYID = 5
16,830,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,092 UART: [afmc] --
18,629,532 UART: [cold-reset] --
18,633,125 UART: [state] Locking Datavault
18,637,613 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,257 UART: [state] Locking ICCM
18,641,459 UART: [exit] Launching FMC @ 0x40000130
18,649,914 UART:
18,650,151 UART: Running Caliptra FMC ...
18,651,253 UART:
18,651,417 UART: [state] CFI Enabled
18,713,076 UART: [fht] FMC Alias Private Key: 7
20,477,262 UART: [art] Extend RT PCRs Done
20,478,496 UART: [art] Lock RT PCRs Done
20,479,982 UART: [art] Populate DV Done
20,485,177 UART: [fht] FMC Alias Private Key: 7
20,486,666 UART: [art] Derive CDI
20,487,403 UART: [art] Store in in slot 0x4
20,546,161 UART: [art] Derive Key Pair
20,547,194 UART: [art] Store priv key in slot 0x5
23,010,809 UART: [art] Derive Key Pair - Done
23,023,973 UART: [art] Signing Cert with AUTHO
23,025,316 UART: RITY.KEYID = 7
24,736,752 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,258 UART: [art] PUB.X = 5B18789278B3D7E706191FB28B6B565D566F99DD749EEB9A1848C9914BE1A48104E3E774523DEBDB6D6041873E0824E4
24,745,534 UART: [art] PUB.Y = 3A4E87DBA555CCC62B12A904F526939EF1A721C829C7A2EB1D783244D8A209C5A05DAD4F7512F80CAF7535BEBC92E2C0
24,752,815 UART: [art] SIG.R = 5B880245D45B9924D3A40BDA149338217FF2BA731591419EF5F650FB1E58CD62B28A9426FE6CBC2452B4910122B83D49
24,760,190 UART: [art] SIG.S = 7F9255A9F7E26AA414A29F589184BBD519C2E2045C1AF48DE3E510EA2D8DB979264D159847BD9FFFC319243BD87BA027
25,739,688 UART: Caliptra RT
25,740,395 UART: [state] CFI Enabled
25,903,626 UART: [rt] RT listening for mailbox commands...
25,906,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,183 UART: [rt]cmd =0x41544d4e, len=14344
29,991,747 >>> mbox cmd response data (8 bytes)
29,992,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,023,078 UART: [rt]cmd =0x41545348, len=116
30,043,432 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
192,761 UART:
193,132 UART: Running Caliptra ROM ...
194,334 UART:
194,489 UART: [state] CFI Enabled
258,980 UART: [state] LifecycleState = Unprovisioned
261,378 UART: [state] DebugLocked = No
262,560 UART: [state] WD Timer not started. Device not locked for debugging
267,091 UART: [kat] SHA2-256
457,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,766 UART: [kat] ++
468,280 UART: [kat] sha1
480,769 UART: [kat] SHA2-256
483,756 UART: [kat] SHA2-384
488,978 UART: [kat] SHA2-512-ACC
491,562 UART: [kat] ECC-384
2,947,148 UART: [kat] HMAC-384Kdf
2,970,957 UART: [kat] LMS
3,502,694 UART: [kat] --
3,509,112 UART: [cold-reset] ++
3,511,324 UART: [fht] FHT @ 0x50003400
3,523,181 UART: [idev] ++
3,523,841 UART: [idev] CDI.KEYID = 6
3,524,880 UART: [idev] SUBJECT.KEYID = 7
3,525,990 UART: [idev] UDS.KEYID = 0
3,527,258 ready_for_fw is high
3,527,481 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,327 UART: [idev] Erasing UDS.KEYID = 0
6,031,273 UART: [idev] Sha1 KeyId Algorithm
6,053,593 UART: [idev] --
6,058,408 UART: [ldev] ++
6,059,095 UART: [ldev] CDI.KEYID = 6
6,060,014 UART: [ldev] SUBJECT.KEYID = 5
6,061,177 UART: [ldev] AUTHORITY.KEYID = 7
6,062,413 UART: [ldev] FE.KEYID = 1
6,099,647 UART: [ldev] Erasing FE.KEYID = 1
8,602,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,039 UART: [ldev] --
10,414,855 UART: [fwproc] Wait for Commands...
10,416,373 UART: [fwproc] Recv command 0x46574c44
10,418,684 UART: [fwproc] Recv'd Img size: 114360 bytes
13,869,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,798 >>> mbox cmd response: success
14,609,880 UART: [afmc] ++
14,610,592 UART: [afmc] CDI.KEYID = 6
14,611,785 UART: [afmc] SUBJECT.KEYID = 7
14,613,284 UART: [afmc] AUTHORITY.KEYID = 5
17,148,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,951 UART: [afmc] --
18,945,933 UART: [cold-reset] --
18,948,834 UART: [state] Locking Datavault
18,954,855 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,049 UART: [state] Locking ICCM
18,958,839 UART: [exit] Launching FMC @ 0x40000130
18,967,520 UART:
18,967,754 UART: Running Caliptra FMC ...
18,968,785 UART:
18,968,931 UART: [state] CFI Enabled
19,029,775 UART: [fht] FMC Alias Private Key: 7
20,793,601 UART: [art] Extend RT PCRs Done
20,794,813 UART: [art] Lock RT PCRs Done
20,796,572 UART: [art] Populate DV Done
20,802,196 UART: [fht] FMC Alias Private Key: 7
20,803,851 UART: [art] Derive CDI
20,804,688 UART: [art] Store in in slot 0x4
20,861,785 UART: [art] Derive Key Pair
20,862,783 UART: [art] Store priv key in slot 0x5
23,326,258 UART: [art] Derive Key Pair - Done
23,339,423 UART: [art] Signing Cert with AUTHO
23,340,725 UART: RITY.KEYID = 7
25,052,206 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,710 UART: [art] PUB.X = 08E790844EAF5EE4CB30E187BD8A43B9E6AFF14BAEEBAEE05256AA2B6F30BFFDF9B6CB8F4505D2F4741CA26A90744C2F
25,061,000 UART: [art] PUB.Y = 1505B439F2DF527C51BADEF6A012FAD313C7084C1E85C96908F6415D6A6B088E807ADB44BB9086F7BAB83F1CB9E2E20B
25,068,278 UART: [art] SIG.R = AFFC6CD24777116D872709861DDD04DCBB2FB675FD63203F6C94EBA6C13AA4EDC82C77F06BD88C7F885A1CF972D3FEC4
25,075,704 UART: [art] SIG.S = 05112680E18D7D00A7F06B9D49E515955F6669C9E8CE10D7BF9F69E830A91C0BCEC2ABA3EF6ECA349D4BC7A8150CB977
26,054,259 UART: Caliptra RT
26,054,979 UART: [state] CFI Enabled
26,220,079 UART: [rt] RT listening for mailbox commands...
26,222,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,378,093 UART: [rt]cmd =0x41544d4e, len=14344
30,309,105 >>> mbox cmd response data (8 bytes)
30,309,697 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,340,316 UART: [rt]cmd =0x41545348, len=116
30,360,801 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,436,983 ready_for_fw is high
3,437,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,742,020 >>> mbox cmd response: success
19,030,222 UART:
19,030,631 UART: Running Caliptra FMC ...
19,031,771 UART:
19,031,934 UART: [state] CFI Enabled
19,098,191 UART: [fht] FMC Alias Private Key: 7
20,862,395 UART: [art] Extend RT PCRs Done
20,863,617 UART: [art] Lock RT PCRs Done
20,865,537 UART: [art] Populate DV Done
20,870,836 UART: [fht] FMC Alias Private Key: 7
20,872,381 UART: [art] Derive CDI
20,873,199 UART: [art] Store in in slot 0x4
20,930,892 UART: [art] Derive Key Pair
20,931,968 UART: [art] Store priv key in slot 0x5
23,394,658 UART: [art] Derive Key Pair - Done
23,407,708 UART: [art] Signing Cert with AUTHO
23,409,034 UART: RITY.KEYID = 7
25,121,010 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,529 UART: [art] PUB.X = 86127AF7E905AA2D716672B34BD077AF1E239283059E36238436F75DCFB74067A713D81F4F6A945C9E59EFF696F27A35
25,129,813 UART: [art] PUB.Y = 7E831242923740E4DC513C5A8268684B11A4B5D4D1B16EE84B124CCF3F2535E8CE26662C897B95F335FB9657A8B02A8D
25,137,039 UART: [art] SIG.R = 83FBC086007D493D52CCCFCCDA545780745607619459F2DC3AD8FA4E0397533E635E1BF8E97A281225EA2A436DC82956
25,144,423 UART: [art] SIG.S = F28EC48F9418F952A237224C27A1259B70C3C1B82C734A70810DB93825D737DD8A53275D732190E9B3F3EAADA52052F0
26,122,958 UART: Caliptra RT
26,123,662 UART: [state] CFI Enabled
26,288,662 UART: [rt] RT listening for mailbox commands...
26,291,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,446,491 UART: [rt]cmd =0x41544d4e, len=14344
30,376,777 >>> mbox cmd response data (8 bytes)
30,377,344 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,408,017 UART: [rt]cmd =0x41545348, len=116
30,428,330 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,342 UART:
192,698 UART: Running Caliptra ROM ...
193,811 UART:
603,500 UART: [state] CFI Enabled
618,159 UART: [state] LifecycleState = Unprovisioned
620,527 UART: [state] DebugLocked = No
622,895 UART: [state] WD Timer not started. Device not locked for debugging
628,197 UART: [kat] SHA2-256
818,065 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,801 UART: [kat] ++
829,337 UART: [kat] sha1
839,712 UART: [kat] SHA2-256
842,785 UART: [kat] SHA2-384
848,915 UART: [kat] SHA2-512-ACC
851,495 UART: [kat] ECC-384
3,295,357 UART: [kat] HMAC-384Kdf
3,307,952 UART: [kat] LMS
3,839,779 UART: [kat] --
3,845,559 UART: [cold-reset] ++
3,847,769 UART: [fht] FHT @ 0x50003400
3,858,826 UART: [idev] ++
3,859,598 UART: [idev] CDI.KEYID = 6
3,860,531 UART: [idev] SUBJECT.KEYID = 7
3,861,640 UART: [idev] UDS.KEYID = 0
3,862,566 ready_for_fw is high
3,862,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,251 UART: [idev] Erasing UDS.KEYID = 0
6,340,938 UART: [idev] Sha1 KeyId Algorithm
6,362,809 UART: [idev] --
6,368,084 UART: [ldev] ++
6,368,761 UART: [ldev] CDI.KEYID = 6
6,369,642 UART: [ldev] SUBJECT.KEYID = 5
6,370,796 UART: [ldev] AUTHORITY.KEYID = 7
6,372,077 UART: [ldev] FE.KEYID = 1
6,386,147 UART: [ldev] Erasing FE.KEYID = 1
8,865,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,887 UART: [ldev] --
10,659,240 UART: [fwproc] Wait for Commands...
10,660,924 UART: [fwproc] Recv command 0x46574c44
10,663,178 UART: [fwproc] Recv'd Img size: 114360 bytes
14,114,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,853,614 >>> mbox cmd response: success
14,858,517 UART: [afmc] ++
14,859,225 UART: [afmc] CDI.KEYID = 6
14,860,329 UART: [afmc] SUBJECT.KEYID = 7
14,861,860 UART: [afmc] AUTHORITY.KEYID = 5
17,365,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,090,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,092,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,107,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,122,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,137,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,161,854 UART: [afmc] --
19,165,133 UART: [cold-reset] --
19,169,696 UART: [state] Locking Datavault
19,175,535 UART: [state] Locking PCR0, PCR1 and PCR31
19,177,712 UART: [state] Locking ICCM
19,180,190 UART: [exit] Launching FMC @ 0x40000130
19,188,855 UART:
19,189,083 UART: Running Caliptra FMC ...
19,190,104 UART:
19,190,246 UART: [state] CFI Enabled
19,198,400 UART: [fht] FMC Alias Private Key: 7
20,954,238 UART: [art] Extend RT PCRs Done
20,955,452 UART: [art] Lock RT PCRs Done
20,957,099 UART: [art] Populate DV Done
20,962,556 UART: [fht] FMC Alias Private Key: 7
20,964,260 UART: [art] Derive CDI
20,965,013 UART: [art] Store in in slot 0x4
21,008,097 UART: [art] Derive Key Pair
21,009,145 UART: [art] Store priv key in slot 0x5
23,435,613 UART: [art] Derive Key Pair - Done
23,448,613 UART: [art] Signing Cert with AUTHO
23,449,909 UART: RITY.KEYID = 7
25,155,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,862 UART: [art] PUB.X = 62E88D9615C2A2ECF10712057CEA19318F5BB10B2D2862C9CC6A83521835FD1C899D2B9B83D83DFC0FF19FD8A11B1D3D
25,164,106 UART: [art] PUB.Y = EADA49786093C4E5395BE897EBBE0C7945EAC0894D49542B05C2F1A0C0005193174EB40F5AA4F9D516CBCAFA81F12B4B
25,171,392 UART: [art] SIG.R = EAE8AA03003218A8A3EE525EFA051DAF52A0B1365CDF6843785DFD69B4815B932B5F6D9387FE02022F49AB010DC2F67F
25,178,784 UART: [art] SIG.S = 588568BC08C9A4088EFA8F07E5378F384E81A6DFFE72E5B793A3F213133D3206F94DB2F2269CE7925245D1EAE7F2FE42
26,157,444 UART: Caliptra RT
26,158,156 UART: [state] CFI Enabled
26,276,095 UART: [rt] RT listening for mailbox commands...
26,278,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,433,709 UART: [rt]cmd =0x41544d4e, len=14344
30,364,152 >>> mbox cmd response data (8 bytes)
30,364,724 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,395,287 UART: [rt]cmd =0x41545348, len=116
30,415,048 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,757,329 ready_for_fw is high
3,757,936 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,183 >>> mbox cmd response: success
19,207,447 UART:
19,207,941 UART: Running Caliptra FMC ...
19,209,242 UART:
19,209,412 UART: [state] CFI Enabled
19,217,292 UART: [fht] FMC Alias Private Key: 7
20,974,101 UART: [art] Extend RT PCRs Done
20,975,329 UART: [art] Lock RT PCRs Done
20,976,927 UART: [art] Populate DV Done
20,982,288 UART: [fht] FMC Alias Private Key: 7
20,983,885 UART: [art] Derive CDI
20,984,702 UART: [art] Store in in slot 0x4
21,027,050 UART: [art] Derive Key Pair
21,028,059 UART: [art] Store priv key in slot 0x5
23,455,109 UART: [art] Derive Key Pair - Done
23,468,374 UART: [art] Signing Cert with AUTHO
23,469,668 UART: RITY.KEYID = 7
25,175,065 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,569 UART: [art] PUB.X = 2011BD78FDA01B21B1735599D7C9C41411B9875E7595FFE378DF27147DC3C68C2D0ADE5C6C38011A93037A2DC18F88F9
25,183,834 UART: [art] PUB.Y = 489266B6744EA16FC8B4052D2578716429922C14201F0EFEA46D8740D18E58746A91F046D720ADBBF5C2005FE3C8CBA5
25,191,062 UART: [art] SIG.R = 604D3F5C8BF949F54F58EB0290FEA49DAD9D83E1D41C294AC105FF8672422071570BF06FFEF7A89AF9ABFA5D24FC72CE
25,198,464 UART: [art] SIG.S = AAEC01A06DE8854EC6A72840505980E35429F53D09755A97DBF440226077663FEDDF9DFB32EE17394C13E9C29BD5A802
26,177,273 UART: Caliptra RT
26,177,971 UART: [state] CFI Enabled
26,295,244 UART: [rt] RT listening for mailbox commands...
26,297,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,452,892 UART: [rt]cmd =0x41544d4e, len=14344
30,383,693 >>> mbox cmd response data (8 bytes)
30,384,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,414,907 UART: [rt]cmd =0x41545348, len=116
30,434,046 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,733 UART: [kat] SHA2-256
881,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,779 UART: [kat] ++
885,931 UART: [kat] sha1
890,275 UART: [kat] SHA2-256
892,213 UART: [kat] SHA2-384
895,038 UART: [kat] SHA2-512-ACC
896,939 UART: [kat] ECC-384
902,236 UART: [kat] HMAC-384Kdf
906,928 UART: [kat] LMS
1,475,124 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,426 UART: [idev] ++
1,479,594 UART: [idev] CDI.KEYID = 6
1,479,954 UART: [idev] SUBJECT.KEYID = 7
1,480,378 UART: [idev] UDS.KEYID = 0
1,480,723 ready_for_fw is high
1,480,723 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,496 UART: [idev] Erasing UDS.KEYID = 0
1,505,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,514,849 UART: [ldev] ++
1,515,017 UART: [ldev] CDI.KEYID = 6
1,515,380 UART: [ldev] SUBJECT.KEYID = 5
1,515,806 UART: [ldev] AUTHORITY.KEYID = 7
1,516,269 UART: [ldev] FE.KEYID = 1
1,521,521 UART: [ldev] Erasing FE.KEYID = 1
1,546,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,328 UART: [ldev] --
1,585,649 UART: [fwproc] Waiting for Commands...
1,586,374 UART: [fwproc] Received command 0x46574c44
1,587,165 UART: [fwproc] Received Image of size 114360 bytes
2,885,450 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,086 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,319 >>> mbox cmd response: success
3,079,415 UART: [afmc] ++
3,079,583 UART: [afmc] CDI.KEYID = 6
3,079,945 UART: [afmc] SUBJECT.KEYID = 7
3,080,370 UART: [afmc] AUTHORITY.KEYID = 5
3,114,793 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,386 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,076 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,019 UART: [afmc] --
3,158,151 UART: [cold-reset] --
3,158,917 UART: [state] Locking Datavault
3,160,106 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,710 UART: [state] Locking ICCM
3,161,196 UART: [exit] Launching FMC @ 0x40000130
3,166,525 UART:
3,166,541 UART: Running Caliptra FMC ...
3,166,949 UART:
3,167,003 UART: [state] CFI Enabled
3,177,530 UART: [fht] FMC Alias Private Key: 7
3,285,233 UART: [art] Extend RT PCRs Done
3,285,661 UART: [art] Lock RT PCRs Done
3,287,611 UART: [art] Populate DV Done
3,295,890 UART: [fht] FMC Alias Private Key: 7
3,296,942 UART: [art] Derive CDI
3,297,222 UART: [art] Store in in slot 0x4
3,383,059 UART: [art] Derive Key Pair
3,383,419 UART: [art] Store priv key in slot 0x5
3,396,705 UART: [art] Derive Key Pair - Done
3,411,705 UART: [art] Signing Cert with AUTHO
3,412,185 UART: RITY.KEYID = 7
3,427,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,990 UART: [art] PUB.X = 4CB340C327264408E3A6F1D1D939FEFC2E7C7F37156C063BC3266284E7CB2CCA99EEE1D55F0BF675867984A56ED33422
3,434,757 UART: [art] PUB.Y = E24E93FCFA98D3F8E463ACA90E0B2EF4EE6D57E48C51E6658322BF8488C5E5920912526FC1D1F81277B316231E7B7341
3,441,702 UART: [art] SIG.R = CC83617D8E1F8D1FA555E9282A3481A217EAA6301884CE188A0061F285F0B169FC4FCCDF35DB80F80A22C81F2DE261C2
3,448,457 UART: [art] SIG.S = F4564A57479C9ADB2FD8C98BE862F6EA7758A78C55F584133C1D0F2D404EE0915D36B1E87FB5EA2D7B16C6769957ECF9
3,472,115 UART: Caliptra RT
3,472,369 UART: [state] CFI Enabled
3,580,988 UART: [rt] RT listening for mailbox commands...
3,581,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,307 UART: [rt]cmd =0x41544d4e, len=14344
3,849,106 >>> mbox cmd response data (8 bytes)
3,849,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,150 UART: [rt]cmd =0x41545348, len=116
3,901,803 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,625 ready_for_fw is high
1,362,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,143 >>> mbox cmd response: success
2,988,445 UART:
2,988,461 UART: Running Caliptra FMC ...
2,988,869 UART:
2,988,923 UART: [state] CFI Enabled
2,999,100 UART: [fht] FMC Alias Private Key: 7
3,106,605 UART: [art] Extend RT PCRs Done
3,107,033 UART: [art] Lock RT PCRs Done
3,108,521 UART: [art] Populate DV Done
3,116,916 UART: [fht] FMC Alias Private Key: 7
3,117,940 UART: [art] Derive CDI
3,118,220 UART: [art] Store in in slot 0x4
3,203,779 UART: [art] Derive Key Pair
3,204,139 UART: [art] Store priv key in slot 0x5
3,217,255 UART: [art] Derive Key Pair - Done
3,232,018 UART: [art] Signing Cert with AUTHO
3,232,498 UART: RITY.KEYID = 7
3,247,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,257 UART: [art] PUB.X = BC2A14EE44E370D2DA67545117716CC6983483B570231548DFF4067EC158C9513527A19550E6889FE92BFD17684B325E
3,255,016 UART: [art] PUB.Y = F32F9547F1E8F19080B3B6499016E8745EDC9FD1033888EB8B863924F4E49EC5627CDA3D0DD54E16CABA43DD878AEC4C
3,261,972 UART: [art] SIG.R = A022EE9DABF4E430C23BA0E3FBA361F64372967D65DE6065C2F986B7A66374BC72F03ABD6E90253501E62F32DF9FC5E3
3,268,751 UART: [art] SIG.S = 78705EE95BC1F54A81EFB358611DAA70D35DE70FE045E020B4F14C3A3F82646438B533501387A48511FEB01CA29C8FDA
3,292,427 UART: Caliptra RT
3,292,681 UART: [state] CFI Enabled
3,400,647 UART: [rt] RT listening for mailbox commands...
3,401,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,146 UART: [rt]cmd =0x41544d4e, len=14344
3,669,191 >>> mbox cmd response data (8 bytes)
3,669,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,111 UART: [rt]cmd =0x41545348, len=116
3,720,952 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,874 UART: [kat] SHA2-256
881,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,920 UART: [kat] ++
886,072 UART: [kat] sha1
890,380 UART: [kat] SHA2-256
892,318 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,691 UART: [kat] HMAC-384Kdf
907,183 UART: [kat] LMS
1,475,379 UART: [kat] --
1,476,188 UART: [cold-reset] ++
1,476,572 UART: [fht] Storing FHT @ 0x50003400
1,479,315 UART: [idev] ++
1,479,483 UART: [idev] CDI.KEYID = 6
1,479,843 UART: [idev] SUBJECT.KEYID = 7
1,480,267 UART: [idev] UDS.KEYID = 0
1,480,612 ready_for_fw is high
1,480,612 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,475 UART: [idev] Erasing UDS.KEYID = 0
1,504,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,563 UART: [idev] --
1,514,654 UART: [ldev] ++
1,514,822 UART: [ldev] CDI.KEYID = 6
1,515,185 UART: [ldev] SUBJECT.KEYID = 5
1,515,611 UART: [ldev] AUTHORITY.KEYID = 7
1,516,074 UART: [ldev] FE.KEYID = 1
1,521,362 UART: [ldev] Erasing FE.KEYID = 1
1,547,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,877 UART: [ldev] --
1,586,166 UART: [fwproc] Waiting for Commands...
1,586,873 UART: [fwproc] Received command 0x46574c44
1,587,664 UART: [fwproc] Received Image of size 114360 bytes
2,885,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,429 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,628 >>> mbox cmd response: success
3,078,866 UART: [afmc] ++
3,079,034 UART: [afmc] CDI.KEYID = 6
3,079,396 UART: [afmc] SUBJECT.KEYID = 7
3,079,821 UART: [afmc] AUTHORITY.KEYID = 5
3,114,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,148 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,541 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,231 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,316 UART: [afmc] --
3,158,442 UART: [cold-reset] --
3,159,370 UART: [state] Locking Datavault
3,160,797 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,401 UART: [state] Locking ICCM
3,161,901 UART: [exit] Launching FMC @ 0x40000130
3,167,230 UART:
3,167,246 UART: Running Caliptra FMC ...
3,167,654 UART:
3,167,797 UART: [state] CFI Enabled
3,178,656 UART: [fht] FMC Alias Private Key: 7
3,287,067 UART: [art] Extend RT PCRs Done
3,287,495 UART: [art] Lock RT PCRs Done
3,288,861 UART: [art] Populate DV Done
3,296,954 UART: [fht] FMC Alias Private Key: 7
3,297,942 UART: [art] Derive CDI
3,298,222 UART: [art] Store in in slot 0x4
3,383,767 UART: [art] Derive Key Pair
3,384,127 UART: [art] Store priv key in slot 0x5
3,397,565 UART: [art] Derive Key Pair - Done
3,412,154 UART: [art] Signing Cert with AUTHO
3,412,634 UART: RITY.KEYID = 7
3,427,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,567 UART: [art] PUB.X = 616A9EBEABD4A29D1163C6B84CCFC4B8DA3F3EDD7F42FEB94E4EC38AD09FF9E8B811C0B2721ADE01BE4C27E9F276D7F5
3,435,366 UART: [art] PUB.Y = 39140A0AEEEF33070845E70A0353BC4D4B014F0DC65C32691CFCB2D3D288D5A589F0FCC7B1DAA4AD2A909E2FCB5CD330
3,442,312 UART: [art] SIG.R = 4869896243BE910DF99040874965C06CD7F7412FFB4E6C738F512AACDA22CE9CE329377B4AEA33F92283788D0FA8EC7A
3,449,082 UART: [art] SIG.S = 064F9E91EA7DE232296C760148AC1D5AD2CFADD614AE022CE0A0D02B10ACEB74A6D1DCBD6EDA6C5653BD3F75836453BE
3,473,188 UART: Caliptra RT
3,473,534 UART: [state] CFI Enabled
3,582,051 UART: [rt] RT listening for mailbox commands...
3,582,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,598 UART: [rt]cmd =0x41544d4e, len=14344
3,850,161 >>> mbox cmd response data (8 bytes)
3,850,162 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,457 UART: [rt]cmd =0x41545348, len=116
3,902,182 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,548 ready_for_fw is high
1,362,548 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,380 >>> mbox cmd response: success
2,988,504 UART:
2,988,520 UART: Running Caliptra FMC ...
2,988,928 UART:
2,989,071 UART: [state] CFI Enabled
2,999,890 UART: [fht] FMC Alias Private Key: 7
3,107,913 UART: [art] Extend RT PCRs Done
3,108,341 UART: [art] Lock RT PCRs Done
3,110,141 UART: [art] Populate DV Done
3,118,476 UART: [fht] FMC Alias Private Key: 7
3,119,464 UART: [art] Derive CDI
3,119,744 UART: [art] Store in in slot 0x4
3,205,825 UART: [art] Derive Key Pair
3,206,185 UART: [art] Store priv key in slot 0x5
3,219,447 UART: [art] Derive Key Pair - Done
3,234,220 UART: [art] Signing Cert with AUTHO
3,234,700 UART: RITY.KEYID = 7
3,250,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,001 UART: [art] PUB.X = F72E30F6DB52B0A2EF4BE7477448918D09079E497C1D02611091824FE179D458452FD727A35F00ACC2834A727AE47982
3,257,734 UART: [art] PUB.Y = A11892FC2BB34AA57B50A05CF83C1C4CC50C5CD9A6335036AB2C108CC52D53D907BB4F72DE75F74ECA5A6473E7FBA082
3,264,696 UART: [art] SIG.R = FB239861512936A66E806DADECE8D4D9BDA79AE9FD0F7206997E10E4A3F0576A1B0B22217F57B43A9BB92CFD83B68D55
3,271,469 UART: [art] SIG.S = FAD1A141F13E9C59BF9A830ACA2D74D18D979A47B4B6C60FD061AA4EBC171AE2AFDE6C6AD60199F60788BF32B52AC5F3
3,294,546 UART: Caliptra RT
3,294,892 UART: [state] CFI Enabled
3,403,529 UART: [rt] RT listening for mailbox commands...
3,404,199 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,092 UART: [rt]cmd =0x41544d4e, len=14344
3,671,571 >>> mbox cmd response data (8 bytes)
3,671,572 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,671 UART: [rt]cmd =0x41545348, len=116
3,723,500 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,304 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,172,059 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,064 UART: [idev] ++
1,175,232 UART: [idev] CDI.KEYID = 6
1,175,592 UART: [idev] SUBJECT.KEYID = 7
1,176,016 UART: [idev] UDS.KEYID = 0
1,176,361 ready_for_fw is high
1,176,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,678 UART: [idev] Erasing UDS.KEYID = 0
1,200,937 UART: [idev] Sha1 KeyId Algorithm
1,209,267 UART: [idev] --
1,210,421 UART: [ldev] ++
1,210,589 UART: [ldev] CDI.KEYID = 6
1,210,952 UART: [ldev] SUBJECT.KEYID = 5
1,211,378 UART: [ldev] AUTHORITY.KEYID = 7
1,211,841 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,429 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,368 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,400 >>> mbox cmd response: success
2,775,466 UART: [afmc] ++
2,775,634 UART: [afmc] CDI.KEYID = 6
2,775,996 UART: [afmc] SUBJECT.KEYID = 7
2,776,421 UART: [afmc] AUTHORITY.KEYID = 5
2,811,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,155 UART: [afmc] --
2,855,167 UART: [cold-reset] --
2,856,101 UART: [state] Locking Datavault
2,857,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,948 UART: [state] Locking ICCM
2,858,400 UART: [exit] Launching FMC @ 0x40000130
2,863,729 UART:
2,863,745 UART: Running Caliptra FMC ...
2,864,153 UART:
2,864,207 UART: [state] CFI Enabled
2,874,236 UART: [fht] FMC Alias Private Key: 7
2,982,313 UART: [art] Extend RT PCRs Done
2,982,741 UART: [art] Lock RT PCRs Done
2,984,377 UART: [art] Populate DV Done
2,992,464 UART: [fht] FMC Alias Private Key: 7
2,993,434 UART: [art] Derive CDI
2,993,714 UART: [art] Store in in slot 0x4
3,079,539 UART: [art] Derive Key Pair
3,079,899 UART: [art] Store priv key in slot 0x5
3,092,555 UART: [art] Derive Key Pair - Done
3,106,994 UART: [art] Signing Cert with AUTHO
3,107,474 UART: RITY.KEYID = 7
3,122,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,213 UART: [art] PUB.X = 3F866A3EF6A58226E8D12027A27A68CB32E54150247446A226B86D9BDA897633C7BDA00A0BC0BDDDED058D6FD82E3B78
3,129,984 UART: [art] PUB.Y = 9D9B74FCB86351E618EAD443A1DBB1C9A3E00A8DE5FE2156FAED8DD3E8C7D66B99C1C7C03199EB9B408EEB32519C3C83
3,136,953 UART: [art] SIG.R = ABFF50750BB4E6F235FAAAC5F061F9266F6BC80E61318DFC283917DB0C10EA912622275B67AE3E6F53C7CB5608D36247
3,143,721 UART: [art] SIG.S = A1C4D22A6015CE2612DF4C0F1C52D17ABC2C99B7427A755A72B6A24DFC2D2C71FC14FB3D2CC2938A913B0830CBF7C93F
3,167,104 UART: Caliptra RT
3,167,358 UART: [state] CFI Enabled
3,275,723 UART: [rt] RT listening for mailbox commands...
3,276,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,958 UART: [rt]cmd =0x41544d4e, len=14344
3,543,873 >>> mbox cmd response data (8 bytes)
3,543,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,827 UART: [rt]cmd =0x41545348, len=116
3,595,424 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,637 ready_for_fw is high
1,060,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,709 >>> mbox cmd response: success
2,690,085 UART:
2,690,101 UART: Running Caliptra FMC ...
2,690,509 UART:
2,690,563 UART: [state] CFI Enabled
2,700,980 UART: [fht] FMC Alias Private Key: 7
2,808,637 UART: [art] Extend RT PCRs Done
2,809,065 UART: [art] Lock RT PCRs Done
2,810,589 UART: [art] Populate DV Done
2,818,882 UART: [fht] FMC Alias Private Key: 7
2,820,020 UART: [art] Derive CDI
2,820,300 UART: [art] Store in in slot 0x4
2,906,269 UART: [art] Derive Key Pair
2,906,629 UART: [art] Store priv key in slot 0x5
2,920,153 UART: [art] Derive Key Pair - Done
2,935,194 UART: [art] Signing Cert with AUTHO
2,935,674 UART: RITY.KEYID = 7
2,950,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,357 UART: [art] PUB.X = B215EFD330D12BC40D1B27406469D31DA5A0FBEA09661CA388DECACB3E06EFF16DFFBADD61B252B9CDBBC85C5D2ABAE0
2,958,154 UART: [art] PUB.Y = 5F7E14FF9CE1279C5E787DC9D01D881DFFD3FC64BF209C2A7D951AAE6C6713AD1B6F14A512B001B86D9AEA11480D25D1
2,965,116 UART: [art] SIG.R = B2FAC9CC0D65B7F2C443EF8EA8944841523C3C0565257488CE7941AE954B702EA17EDB0AF5F342365FD74866C0738383
2,971,879 UART: [art] SIG.S = 0DA286489BB7AA9E7AFD6EC6D48B47830CA31AC716ADD222A038F3E3103B91A278A2298A2FEF367DDA99E8A9B1F20959
2,995,313 UART: Caliptra RT
2,995,567 UART: [state] CFI Enabled
3,103,321 UART: [rt] RT listening for mailbox commands...
3,103,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,662 UART: [rt]cmd =0x41544d4e, len=14344
3,371,281 >>> mbox cmd response data (8 bytes)
3,371,282 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,345 UART: [rt]cmd =0x41545348, len=116
3,422,946 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,171,640 UART: [cold-reset] ++
1,172,080 UART: [fht] FHT @ 0x50003400
1,174,751 UART: [idev] ++
1,174,919 UART: [idev] CDI.KEYID = 6
1,175,279 UART: [idev] SUBJECT.KEYID = 7
1,175,703 UART: [idev] UDS.KEYID = 0
1,176,048 ready_for_fw is high
1,176,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,727 UART: [idev] Erasing UDS.KEYID = 0
1,200,596 UART: [idev] Sha1 KeyId Algorithm
1,209,146 UART: [idev] --
1,210,200 UART: [ldev] ++
1,210,368 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,157 UART: [ldev] AUTHORITY.KEYID = 7
1,211,620 UART: [ldev] FE.KEYID = 1
1,216,898 UART: [ldev] Erasing FE.KEYID = 1
1,242,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,476 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,201 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,173 >>> mbox cmd response: success
2,774,233 UART: [afmc] ++
2,774,401 UART: [afmc] CDI.KEYID = 6
2,774,763 UART: [afmc] SUBJECT.KEYID = 7
2,775,188 UART: [afmc] AUTHORITY.KEYID = 5
2,810,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,870 UART: [afmc] --
2,853,908 UART: [cold-reset] --
2,854,912 UART: [state] Locking Datavault
2,856,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,887 UART: [state] Locking ICCM
2,857,473 UART: [exit] Launching FMC @ 0x40000130
2,862,802 UART:
2,862,818 UART: Running Caliptra FMC ...
2,863,226 UART:
2,863,369 UART: [state] CFI Enabled
2,873,974 UART: [fht] FMC Alias Private Key: 7
2,982,613 UART: [art] Extend RT PCRs Done
2,983,041 UART: [art] Lock RT PCRs Done
2,984,615 UART: [art] Populate DV Done
2,992,888 UART: [fht] FMC Alias Private Key: 7
2,994,058 UART: [art] Derive CDI
2,994,338 UART: [art] Store in in slot 0x4
3,079,933 UART: [art] Derive Key Pair
3,080,293 UART: [art] Store priv key in slot 0x5
3,093,495 UART: [art] Derive Key Pair - Done
3,108,082 UART: [art] Signing Cert with AUTHO
3,108,562 UART: RITY.KEYID = 7
3,123,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,607 UART: [art] PUB.X = 9F1245B5B169684C16D8479DF5FCC473EF241390C0B942FDA11EB1ED921CDCE434FC096870F8BAA2852CDB65059AAEED
3,131,387 UART: [art] PUB.Y = B36AD2D7163293B859177C675BE1228B9DDC2CC6C1CDF3A4CD9005C36D991E1C9541695CC43568EBA5836F5C6239497F
3,138,338 UART: [art] SIG.R = AE4CD43C1E5F9F8D132AD6997EEDDCC231C9B12476F7219B12660CD8842E8B0F7BAACBEB8F025AF2056DC0886EA34A4F
3,145,118 UART: [art] SIG.S = E31750BB35738C8269968252906F2D6E1216E70FA4D5577924F221DF0530CA8A451FF3C4AC55A9C59B5F6A6F60513246
3,169,127 UART: Caliptra RT
3,169,473 UART: [state] CFI Enabled
3,277,764 UART: [rt] RT listening for mailbox commands...
3,278,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,005 UART: [rt]cmd =0x41544d4e, len=14344
3,546,062 >>> mbox cmd response data (8 bytes)
3,546,063 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,168 UART: [rt]cmd =0x41545348, len=116
3,597,379 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 ready_for_fw is high
1,060,836 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,736 >>> mbox cmd response: success
2,687,210 UART:
2,687,226 UART: Running Caliptra FMC ...
2,687,634 UART:
2,687,777 UART: [state] CFI Enabled
2,698,478 UART: [fht] FMC Alias Private Key: 7
2,806,495 UART: [art] Extend RT PCRs Done
2,806,923 UART: [art] Lock RT PCRs Done
2,808,451 UART: [art] Populate DV Done
2,816,630 UART: [fht] FMC Alias Private Key: 7
2,817,642 UART: [art] Derive CDI
2,817,922 UART: [art] Store in in slot 0x4
2,903,449 UART: [art] Derive Key Pair
2,903,809 UART: [art] Store priv key in slot 0x5
2,917,303 UART: [art] Derive Key Pair - Done
2,931,946 UART: [art] Signing Cert with AUTHO
2,932,426 UART: RITY.KEYID = 7
2,947,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,725 UART: [art] PUB.X = 006484F21AA2DD6AF7D0C7BE2B172B7C33D46DAE5AE6EB900FB816CF6024453E0C904B6C1DFAFDA48252D89B34C4E82A
2,955,487 UART: [art] PUB.Y = 950A4911FF994A59D84743F15D810DFCF5BF8C23D74D28B225A9FB2AE9E9F90B8030D622928BAFA0FD36F67DDA25C54C
2,962,442 UART: [art] SIG.R = 223C4142B7C1C8AFE0A98A0B773AFF6359DF62D75D46E748EDB5564C8CCE5D4B0D432F65AAF4861BCD5A3426CBB547C1
2,969,224 UART: [art] SIG.S = 99DCDE7AF56B428E61CA197CD5CC1994DA16AE902CCA76E21F56F12C670FFE3C34AB173DCDE2EF3501A8CF5145CF9290
2,993,143 UART: Caliptra RT
2,993,489 UART: [state] CFI Enabled
3,101,155 UART: [rt] RT listening for mailbox commands...
3,101,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,786 UART: [rt]cmd =0x41544d4e, len=14344
3,369,889 >>> mbox cmd response data (8 bytes)
3,369,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,741 UART: [rt]cmd =0x41545348, len=116
3,421,470 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,174,411 ready_for_fw is high
1,174,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,199,633 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,788 UART: [ldev] ++
1,209,956 UART: [ldev] CDI.KEYID = 6
1,210,320 UART: [ldev] SUBJECT.KEYID = 5
1,210,747 UART: [ldev] AUTHORITY.KEYID = 7
1,211,210 UART: [ldev] FE.KEYID = 1
1,216,320 UART: [ldev] Erasing FE.KEYID = 1
1,242,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,906 UART: [ldev] --
1,281,360 UART: [fwproc] Wait for Commands...
1,281,945 UART: [fwproc] Recv command 0x46574c44
1,282,678 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,273 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,440 >>> mbox cmd response: success
2,773,703 UART: [afmc] ++
2,773,871 UART: [afmc] CDI.KEYID = 6
2,774,234 UART: [afmc] SUBJECT.KEYID = 7
2,774,660 UART: [afmc] AUTHORITY.KEYID = 5
2,810,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,430 UART: [afmc] --
2,853,462 UART: [cold-reset] --
2,854,342 UART: [state] Locking Datavault
2,855,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,045 UART: [state] Locking ICCM
2,856,583 UART: [exit] Launching FMC @ 0x40000130
2,861,912 UART:
2,861,928 UART: Running Caliptra FMC ...
2,862,336 UART:
2,862,390 UART: [state] CFI Enabled
2,872,403 UART: [fht] FMC Alias Private Key: 7
2,980,038 UART: [art] Extend RT PCRs Done
2,980,466 UART: [art] Lock RT PCRs Done
2,982,354 UART: [art] Populate DV Done
2,990,713 UART: [fht] FMC Alias Private Key: 7
2,991,815 UART: [art] Derive CDI
2,992,095 UART: [art] Store in in slot 0x4
3,077,548 UART: [art] Derive Key Pair
3,077,908 UART: [art] Store priv key in slot 0x5
3,091,308 UART: [art] Derive Key Pair - Done
3,105,875 UART: [art] Signing Cert with AUTHO
3,106,355 UART: RITY.KEYID = 7
3,121,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,334 UART: [art] PUB.X = 569C9CD013D5BA09E3ACF29E0CD2898DA385072D78DACCB2944FACB523010362C1389280E88F031122F4256C36636F18
3,129,086 UART: [art] PUB.Y = 3E853E34640E9A88E1DBAC57EC17D770DB962F3BE0588A387A958E5B3892EF8B0DEBECEE6ACA51742F71705712F99158
3,136,040 UART: [art] SIG.R = 854C386178CB3C77ADE1B523BF60CCF482D3AF9E18530C1FB45BD6B5A20871D4E75D7137C1A2313865A9E3ECC67B4ECC
3,142,818 UART: [art] SIG.S = 0B6FE753A66C23F8AB3BD2E5ED7D8B5F342023D683EB359CB5CD284CC982EBB788C8A8FA7F0C99A2902771066EACD887
3,166,686 UART: Caliptra RT
3,166,940 UART: [state] CFI Enabled
3,274,642 UART: [rt] RT listening for mailbox commands...
3,275,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,861 UART: [rt]cmd =0x41544d4e, len=14344
3,542,844 >>> mbox cmd response data (8 bytes)
3,542,845 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,714 UART: [rt]cmd =0x41545348, len=116
3,594,881 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,672 ready_for_fw is high
1,055,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,116 >>> mbox cmd response: success
2,684,156 UART:
2,684,172 UART: Running Caliptra FMC ...
2,684,580 UART:
2,684,634 UART: [state] CFI Enabled
2,695,677 UART: [fht] FMC Alias Private Key: 7
2,803,644 UART: [art] Extend RT PCRs Done
2,804,072 UART: [art] Lock RT PCRs Done
2,805,606 UART: [art] Populate DV Done
2,813,877 UART: [fht] FMC Alias Private Key: 7
2,814,831 UART: [art] Derive CDI
2,815,111 UART: [art] Store in in slot 0x4
2,900,458 UART: [art] Derive Key Pair
2,900,818 UART: [art] Store priv key in slot 0x5
2,913,980 UART: [art] Derive Key Pair - Done
2,928,715 UART: [art] Signing Cert with AUTHO
2,929,195 UART: RITY.KEYID = 7
2,944,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,386 UART: [art] PUB.X = 6215281D7F3719B070A7612B69F902969B3934892C8678242612B51431B3E3E4BE1EFFC9710A2BB765AF35B703C7465C
2,952,137 UART: [art] PUB.Y = ABC9993D636A343645F961431208823C68EE13129F53DE1A32BDE57D96C22E46F66D00294404837573EAEF496E310EEC
2,959,052 UART: [art] SIG.R = D208859434780CFC82C115C5B2F4947954A7C3BEBD7F11117EF4F7B8E245D5308C51923BE72DBAB8224BA7D94215FA3C
2,965,822 UART: [art] SIG.S = 0009A90B3207C0CBA6BCE951508B19FC310181C10500C6660EA7B389E30D988CD57CB94C31034E95BB0B9585F5F87643
2,990,470 UART: Caliptra RT
2,990,724 UART: [state] CFI Enabled
3,099,543 UART: [rt] RT listening for mailbox commands...
3,100,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,946 UART: [rt]cmd =0x41544d4e, len=14344
3,367,839 >>> mbox cmd response data (8 bytes)
3,367,840 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,001 UART: [rt]cmd =0x41545348, len=116
3,420,082 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,172,998 UART: [idev] ++
1,173,166 UART: [idev] CDI.KEYID = 6
1,173,527 UART: [idev] SUBJECT.KEYID = 7
1,173,952 UART: [idev] UDS.KEYID = 0
1,174,298 ready_for_fw is high
1,174,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,199,596 UART: [idev] Sha1 KeyId Algorithm
1,208,522 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,305 UART: [ldev] --
1,282,685 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,073 >>> mbox cmd response: success
2,775,196 UART: [afmc] ++
2,775,364 UART: [afmc] CDI.KEYID = 6
2,775,727 UART: [afmc] SUBJECT.KEYID = 7
2,776,153 UART: [afmc] AUTHORITY.KEYID = 5
2,811,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,683 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,069 UART: [afmc] --
2,854,047 UART: [cold-reset] --
2,854,797 UART: [state] Locking Datavault
2,855,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,542 UART: [state] Locking ICCM
2,857,136 UART: [exit] Launching FMC @ 0x40000130
2,862,465 UART:
2,862,481 UART: Running Caliptra FMC ...
2,862,889 UART:
2,863,032 UART: [state] CFI Enabled
2,873,801 UART: [fht] FMC Alias Private Key: 7
2,981,492 UART: [art] Extend RT PCRs Done
2,981,920 UART: [art] Lock RT PCRs Done
2,983,430 UART: [art] Populate DV Done
2,991,545 UART: [fht] FMC Alias Private Key: 7
2,992,711 UART: [art] Derive CDI
2,992,991 UART: [art] Store in in slot 0x4
3,078,648 UART: [art] Derive Key Pair
3,079,008 UART: [art] Store priv key in slot 0x5
3,092,342 UART: [art] Derive Key Pair - Done
3,107,454 UART: [art] Signing Cert with AUTHO
3,107,934 UART: RITY.KEYID = 7
3,122,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,213 UART: [art] PUB.X = 114B7A88730BDEF534C483A6B95F24FD322B3C2DF6FF7FDB8E8C17A57201FD1B599C8AD1F91FC5ECC580E90031FE1728
3,129,971 UART: [art] PUB.Y = B6D5174DB8DADE0B8F4525B6F4CB00A33333BD4A7D9E7C04D31BF15B23122CFE37C156B7EDF38B172969E4A306FB7679
3,136,904 UART: [art] SIG.R = A3352EEB9D7AA554A2358E8D372B9DC48B2308805BD85F069EB8FCD2AD82E4694BDD79617A0898AFF8F3D23FAFCDF505
3,143,680 UART: [art] SIG.S = 5237218AA9CED2E04271C1533AD28FB69C693A699EBD74679BB3E2CD5FA891EDCCB638EF66210EB887EAEF02D0AECDD1
3,167,867 UART: Caliptra RT
3,168,213 UART: [state] CFI Enabled
3,275,847 UART: [rt] RT listening for mailbox commands...
3,276,517 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,200 UART: [rt]cmd =0x41544d4e, len=14344
3,544,237 >>> mbox cmd response data (8 bytes)
3,544,238 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,325 UART: [rt]cmd =0x41545348, len=116
3,596,484 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,247 ready_for_fw is high
1,057,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,181 >>> mbox cmd response: success
2,686,863 UART:
2,686,879 UART: Running Caliptra FMC ...
2,687,287 UART:
2,687,430 UART: [state] CFI Enabled
2,698,263 UART: [fht] FMC Alias Private Key: 7
2,806,256 UART: [art] Extend RT PCRs Done
2,806,684 UART: [art] Lock RT PCRs Done
2,808,288 UART: [art] Populate DV Done
2,816,473 UART: [fht] FMC Alias Private Key: 7
2,817,497 UART: [art] Derive CDI
2,817,777 UART: [art] Store in in slot 0x4
2,903,610 UART: [art] Derive Key Pair
2,903,970 UART: [art] Store priv key in slot 0x5
2,916,986 UART: [art] Derive Key Pair - Done
2,931,755 UART: [art] Signing Cert with AUTHO
2,932,235 UART: RITY.KEYID = 7
2,947,771 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,536 UART: [art] PUB.X = 13933A3EFA3500AD72520E70C831B0E0044EE95AAB681AE2D8E52ED1204C7E6793704B5914453B3F397C67E54C50FE78
2,955,278 UART: [art] PUB.Y = 715F72E7B013C3D1712CBC474EDDBDA719B22F09B2D23642F9D13227A2096B0C22B3F8F5D583FA63C84C38BACC7D991D
2,962,231 UART: [art] SIG.R = 77FB0C7B15163D0C1D818402030A17FEE4AAD280D00D44D528382949413915D27503ADF810B2911F0F617CFE3CC49156
2,968,973 UART: [art] SIG.S = FE7CEE86F558A7C5961E205D0FC64791646D3CFE0B5D5373378568D10B924FCEB3B631CBA5DA15EC28075DD511C3BA5E
2,992,802 UART: Caliptra RT
2,993,148 UART: [state] CFI Enabled
3,101,744 UART: [rt] RT listening for mailbox commands...
3,102,414 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,189 UART: [rt]cmd =0x41544d4e, len=14344
3,369,746 >>> mbox cmd response data (8 bytes)
3,369,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,942 UART: [rt]cmd =0x41545348, len=116
3,420,797 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
192,706 UART:
193,069 UART: Running Caliptra ROM ...
194,275 UART:
194,423 UART: [state] CFI Enabled
262,332 UART: [state] LifecycleState = Unprovisioned
264,299 UART: [state] DebugLocked = No
266,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,384 UART: [kat] SHA2-256
441,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,614 UART: [kat] ++
452,146 UART: [kat] sha1
463,608 UART: [kat] SHA2-256
465,213 UART: [kat] SHA2-384
472,349 UART: [kat] SHA2-512-ACC
474,717 UART: [kat] ECC-384
2,767,753 UART: [kat] HMAC-384Kdf
2,798,266 UART: [kat] LMS
3,988,582 UART: [kat] --
3,994,090 UART: [cold-reset] ++
3,995,165 UART: [fht] Storing FHT @ 0x50003400
4,006,587 UART: [idev] ++
4,007,153 UART: [idev] CDI.KEYID = 6
4,008,098 UART: [idev] SUBJECT.KEYID = 7
4,009,341 UART: [idev] UDS.KEYID = 0
4,010,335 ready_for_fw is high
4,010,535 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,153,952 UART: [idev] Erasing UDS.KEYID = 0
7,349,371 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,418 UART: [idev] --
7,376,031 UART: [ldev] ++
7,376,591 UART: [ldev] CDI.KEYID = 6
7,377,521 UART: [ldev] SUBJECT.KEYID = 5
7,378,779 UART: [ldev] AUTHORITY.KEYID = 7
7,380,056 UART: [ldev] FE.KEYID = 1
7,421,407 UART: [ldev] Erasing FE.KEYID = 1
10,755,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,827 UART: [ldev] --
13,135,453 UART: [fwproc] Waiting for Commands...
13,137,867 UART: [fwproc] Received command 0x46574c44
13,140,036 UART: [fwproc] Received Image of size 114036 bytes
17,190,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,091 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,657,806 >>> mbox cmd response: success
17,662,866 UART: [afmc] ++
17,663,481 UART: [afmc] CDI.KEYID = 6
17,664,364 UART: [afmc] SUBJECT.KEYID = 7
17,665,633 UART: [afmc] AUTHORITY.KEYID = 5
21,025,130 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,227 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,771 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,447 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,913 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,281 UART: [afmc] --
23,395,278 UART: [cold-reset] --
23,398,538 UART: [state] Locking Datavault
23,403,183 UART: [state] Locking PCR0, PCR1 and PCR31
23,404,939 UART: [state] Locking ICCM
23,406,915 UART: [exit] Launching FMC @ 0x40000130
23,415,304 UART:
23,415,536 UART: Running Caliptra FMC ...
23,416,631 UART:
23,416,783 UART: [state] CFI Enabled
23,485,252 UART: [fht] FMC Alias Private Key: 7
25,822,778 UART: [art] Extend RT PCRs Done
25,824,003 UART: [art] Lock RT PCRs Done
25,825,545 UART: [art] Populate DV Done
25,831,006 UART: [fht] FMC Alias Private Key: 7
25,832,515 UART: [art] Derive CDI
25,833,431 UART: [art] Store in in slot 0x4
25,893,012 UART: [art] Derive Key Pair
25,894,012 UART: [art] Store priv key in slot 0x5
29,186,447 UART: [art] Derive Key Pair - Done
29,199,666 UART: [art] Signing Cert with AUTHO
29,200,972 UART: RITY.KEYID = 7
31,487,933 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,439 UART: [art] PUB.X = 599608BD3403CD26C70A1A65FDB4EB1DB51E1890F5AC6FCFB59E8897B18BF524A51EC93A1FF275E5BF594CDD71494A4F
31,496,712 UART: [art] PUB.Y = 6F912C48DEC0EB6195DCB21B75E0187F43B574E2D9CD4A972525C1CFAF5E356A86CA99C05937A9850EE738F103FCCC73
31,504,012 UART: [art] SIG.R = E5EE364873FC7F05C22781F9E0950129209CA60B1C51CDCD4C68C1EE1A295736D16EA269106BA8DB980BDFC2B39C6453
31,511,385 UART: [art] SIG.S = 4677E2CC48A6A35B10F53F12DEAB70700E3E8390F8B650D10E9B3822F3FCA809BBD1BEE9D6C7B41920AD785280732724
32,816,026 UART: Caliptra RT
32,816,717 UART: [state] CFI Enabled
32,975,856 UART: [rt] RT listening for mailbox commands...
32,978,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,133,609 UART: [rt]cmd =0x41544d4e, len=14344
38,369,380 >>> mbox cmd response data (8 bytes)
38,369,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,400,602 UART: [rt]cmd =0x41545348, len=116
38,420,697 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,804,213 ready_for_fw is high
3,804,616 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,874,362 >>> mbox cmd response: success
23,565,535 UART:
23,565,942 UART: Running Caliptra FMC ...
23,567,086 UART:
23,567,245 UART: [state] CFI Enabled
23,637,644 UART: [fht] FMC Alias Private Key: 7
25,975,488 UART: [art] Extend RT PCRs Done
25,976,723 UART: [art] Lock RT PCRs Done
25,978,293 UART: [art] Populate DV Done
25,983,401 UART: [fht] FMC Alias Private Key: 7
25,984,993 UART: [art] Derive CDI
25,985,798 UART: [art] Store in in slot 0x4
26,046,678 UART: [art] Derive Key Pair
26,047,720 UART: [art] Store priv key in slot 0x5
29,340,591 UART: [art] Derive Key Pair - Done
29,353,827 UART: [art] Signing Cert with AUTHO
29,355,134 UART: RITY.KEYID = 7
31,642,105 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,634 UART: [art] PUB.X = 726E5078529842F80E3E33757297A344242F1FD7645EEE84E0C8A8C809A6C08DDC45BB5C77A35126E43C35BB6024AEAE
31,650,804 UART: [art] PUB.Y = 3445FA20639D8EE0A1BCEA9F8B9555B9FBD9DC6DB50363438B8F92927B2B1B7ACDC611670FD886BBC5AA07BAC4253D2C
31,658,120 UART: [art] SIG.R = 4B939B10CB7F496149A6FD26B359FAC21FD99AD7EDDB57EB231C64570115CED8A56708F578F9D7F8DAD69CD2A0758C0D
31,665,488 UART: [art] SIG.S = A3F2742E55EC547748C185B1F475C1315DF6E89AD815B39C967E7D4B36AF01247F651193E0187CFA345A08314AEF05B7
32,969,955 UART: Caliptra RT
32,970,652 UART: [state] CFI Enabled
33,133,324 UART: [rt] RT listening for mailbox commands...
33,135,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,291,136 UART: [rt]cmd =0x41544d4e, len=14344
38,526,449 >>> mbox cmd response data (8 bytes)
38,527,031 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,557,936 UART: [rt]cmd =0x41545348, len=116
38,577,471 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,322 UART:
192,680 UART: Running Caliptra ROM ...
193,785 UART:
603,711 UART: [state] CFI Enabled
619,291 UART: [state] LifecycleState = Unprovisioned
621,151 UART: [state] DebugLocked = No
623,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,343 UART: [kat] SHA2-256
797,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,659 UART: [kat] ++
808,106 UART: [kat] sha1
818,642 UART: [kat] SHA2-256
821,339 UART: [kat] SHA2-384
827,692 UART: [kat] SHA2-512-ACC
830,057 UART: [kat] ECC-384
3,114,075 UART: [kat] HMAC-384Kdf
3,126,310 UART: [kat] LMS
4,316,469 UART: [kat] --
4,320,062 UART: [cold-reset] ++
4,321,009 UART: [fht] Storing FHT @ 0x50003400
4,331,651 UART: [idev] ++
4,332,254 UART: [idev] CDI.KEYID = 6
4,333,146 UART: [idev] SUBJECT.KEYID = 7
4,334,409 UART: [idev] UDS.KEYID = 0
4,335,350 ready_for_fw is high
4,335,570 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,668 UART: [idev] Erasing UDS.KEYID = 0
7,624,440 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,534 UART: [idev] --
7,648,339 UART: [ldev] ++
7,648,910 UART: [ldev] CDI.KEYID = 6
7,649,925 UART: [ldev] SUBJECT.KEYID = 5
7,651,081 UART: [ldev] AUTHORITY.KEYID = 7
7,652,307 UART: [ldev] FE.KEYID = 1
7,663,490 UART: [ldev] Erasing FE.KEYID = 1
10,952,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,298 UART: [ldev] --
13,314,031 UART: [fwproc] Waiting for Commands...
13,316,996 UART: [fwproc] Received command 0x46574c44
13,319,179 UART: [fwproc] Received Image of size 114036 bytes
17,369,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,705 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,824,716 >>> mbox cmd response: success
17,829,591 UART: [afmc] ++
17,830,182 UART: [afmc] CDI.KEYID = 6
17,831,121 UART: [afmc] SUBJECT.KEYID = 7
17,832,388 UART: [afmc] AUTHORITY.KEYID = 5
21,143,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,133 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,443 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,865 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,616 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,092 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,930 UART: [afmc] --
23,511,413 UART: [cold-reset] --
23,515,165 UART: [state] Locking Datavault
23,520,032 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,782 UART: [state] Locking ICCM
23,523,791 UART: [exit] Launching FMC @ 0x40000130
23,532,194 UART:
23,532,466 UART: Running Caliptra FMC ...
23,533,489 UART:
23,533,636 UART: [state] CFI Enabled
23,541,467 UART: [fht] FMC Alias Private Key: 7
25,872,848 UART: [art] Extend RT PCRs Done
25,874,068 UART: [art] Lock RT PCRs Done
25,875,900 UART: [art] Populate DV Done
25,881,148 UART: [fht] FMC Alias Private Key: 7
25,882,842 UART: [art] Derive CDI
25,883,576 UART: [art] Store in in slot 0x4
25,926,063 UART: [art] Derive Key Pair
25,927,064 UART: [art] Store priv key in slot 0x5
29,169,452 UART: [art] Derive Key Pair - Done
29,182,610 UART: [art] Signing Cert with AUTHO
29,183,906 UART: RITY.KEYID = 7
31,463,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,004 UART: [art] PUB.X = 5FA3E87230C1C91907509FAF0B79207E4C5538106B6C93612CF5032433EB57053BFB99AF5E99293DCAD4A8D025685BB0
31,471,900 UART: [art] PUB.Y = A0C440206041128816DB2A8BC41FE472CA12A3E940A6385FF4AC11AC46360E7C85101472F010E6644ECAA08798C2398A
31,479,147 UART: [art] SIG.R = 06769FE837AB27B9A07F166F2C1A9B8E53539D485B0AC9FED31CDBA08CEA387A5FFD1887C196E4B236A417A64A8F8355
31,486,545 UART: [art] SIG.S = 382EC1F25BC6423A9C66B53EF2D68BD90B886BAF41364F26FBFB547B684C88FF95BB0216B0B0F7F4B938FE7E53765A5C
32,791,315 UART: Caliptra RT
32,792,033 UART: [state] CFI Enabled
32,909,903 UART: [rt] RT listening for mailbox commands...
32,912,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,067,515 UART: [rt]cmd =0x41544d4e, len=14344
38,302,947 >>> mbox cmd response data (8 bytes)
38,303,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,334,807 UART: [rt]cmd =0x41545348, len=116
38,354,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,131,221 ready_for_fw is high
4,131,612 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,387 >>> mbox cmd response: success
23,709,971 UART:
23,710,500 UART: Running Caliptra FMC ...
23,711,607 UART:
23,711,766 UART: [state] CFI Enabled
23,719,421 UART: [fht] FMC Alias Private Key: 7
26,049,345 UART: [art] Extend RT PCRs Done
26,050,578 UART: [art] Lock RT PCRs Done
26,052,438 UART: [art] Populate DV Done
26,057,640 UART: [fht] FMC Alias Private Key: 7
26,059,191 UART: [art] Derive CDI
26,059,958 UART: [art] Store in in slot 0x4
26,102,455 UART: [art] Derive Key Pair
26,103,516 UART: [art] Store priv key in slot 0x5
29,345,506 UART: [art] Derive Key Pair - Done
29,358,553 UART: [art] Signing Cert with AUTHO
29,359,897 UART: RITY.KEYID = 7
31,639,062 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,593 UART: [art] PUB.X = A60A5BF5CBE4B28525A1B8240F59ACDC945675AF79A8E70884FD4F9AE8D7477B45EAF5B6C47EE4A481F4E41DF589D483
31,647,817 UART: [art] PUB.Y = 82079D574A0D438CEE170563D15BE805C14EC9CD2C8D91E26B4AD28B1D8B3212497594BA4BC13B8044E44ACBB37B7AD3
31,655,054 UART: [art] SIG.R = CE61F9E2404BFAF42601F78DE1E44FF58DF46FE257F49BE866071D81BCE35E4C1BD6864E5EC4A9771589EEB7439D6AB6
31,662,474 UART: [art] SIG.S = 056CF82E11D21F05A51B1E8929CF159A3C5F68C2467FBD3C84920C80EC0D110D7B8918092FA713BA3D559C8E05F6FFBB
32,967,254 UART: Caliptra RT
32,967,952 UART: [state] CFI Enabled
33,085,872 UART: [rt] RT listening for mailbox commands...
33,088,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,243,283 UART: [rt]cmd =0x41544d4e, len=14344
38,478,501 >>> mbox cmd response data (8 bytes)
38,479,091 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,509,800 UART: [rt]cmd =0x41545348, len=116
38,528,900 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
192,551 UART:
192,935 UART: Running Caliptra ROM ...
194,158 UART:
194,336 UART: [state] CFI Enabled
264,632 UART: [state] LifecycleState = Unprovisioned
266,340 UART: [state] DebugLocked = No
269,070 UART: [state] WD Timer not started. Device not locked for debugging
273,596 UART: [kat] SHA2-256
452,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,294 UART: [kat] ++
464,738 UART: [kat] sha1
475,110 UART: [kat] SHA2-256
478,119 UART: [kat] SHA2-384
483,758 UART: [kat] SHA2-512-ACC
486,693 UART: [kat] ECC-384
2,949,302 UART: [kat] HMAC-384Kdf
2,970,491 UART: [kat] LMS
3,499,900 UART: [kat] --
3,504,535 UART: [cold-reset] ++
3,506,271 UART: [fht] FHT @ 0x50003400
3,516,968 UART: [idev] ++
3,517,539 UART: [idev] CDI.KEYID = 6
3,518,452 UART: [idev] SUBJECT.KEYID = 7
3,519,623 UART: [idev] UDS.KEYID = 0
3,520,549 ready_for_fw is high
3,520,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,700 UART: [idev] Erasing UDS.KEYID = 0
6,025,495 UART: [idev] Sha1 KeyId Algorithm
6,048,079 UART: [idev] --
6,051,218 UART: [ldev] ++
6,051,794 UART: [ldev] CDI.KEYID = 6
6,052,683 UART: [ldev] SUBJECT.KEYID = 5
6,053,904 UART: [ldev] AUTHORITY.KEYID = 7
6,055,145 UART: [ldev] FE.KEYID = 1
6,099,418 UART: [ldev] Erasing FE.KEYID = 1
8,602,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,073 UART: [ldev] --
10,412,253 UART: [fwproc] Wait for Commands...
10,414,293 UART: [fwproc] Recv command 0x46574c44
10,416,389 UART: [fwproc] Recv'd Img size: 114360 bytes
13,828,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,313 >>> mbox cmd response: success
14,285,294 UART: [afmc] ++
14,285,898 UART: [afmc] CDI.KEYID = 6
14,286,785 UART: [afmc] SUBJECT.KEYID = 7
14,288,020 UART: [afmc] AUTHORITY.KEYID = 5
16,826,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,451 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,498 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,564 UART: [afmc] --
18,625,326 UART: [cold-reset] --
18,629,239 UART: [state] Locking Datavault
18,634,107 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,752 UART: [state] Locking ICCM
18,638,038 UART: [exit] Launching FMC @ 0x40000130
18,646,488 UART:
18,646,723 UART: Running Caliptra FMC ...
18,647,750 UART:
18,647,916 UART: [state] CFI Enabled
18,709,631 UART: [fht] FMC Alias Private Key: 7
20,473,213 UART: [art] Extend RT PCRs Done
20,474,433 UART: [art] Lock RT PCRs Done
20,476,033 UART: [art] Populate DV Done
20,481,340 UART: [fht] FMC Alias Private Key: 7
20,482,884 UART: [art] Derive CDI
20,483,627 UART: [art] Store in in slot 0x4
20,541,960 UART: [art] Derive Key Pair
20,542,999 UART: [art] Store priv key in slot 0x5
23,005,686 UART: [art] Derive Key Pair - Done
23,018,375 UART: [art] Signing Cert with AUTHO
23,019,686 UART: RITY.KEYID = 7
24,732,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,677 UART: [art] PUB.X = 6319F8B892B94E327E29E660EC235578339C07BB2781F2EBF295BD38DF5AE2B0CF6EF9761FD28462C9A5D7CEAD8663C4
24,740,953 UART: [art] PUB.Y = 079D951F8E59F76E574CFC1A611449BEF12C73D98D5D3D7659119177B3CC6EB595B54B2C43DEEF0A54D69EC18334D9A0
24,748,262 UART: [art] SIG.R = B7248E9E4065B968C9A1071A5FD698E080358DFD3124CCBA3EAF39DD6049891F90F86919EA8CF5431981003168089F59
24,755,588 UART: [art] SIG.S = 8EB861D5C36871406C6A408551071CF2F62E7C669439A196BE3C3A6F5E52FC4A31AD759D99EC3720AD08C19C7B290532
25,734,862 UART: Caliptra RT
25,735,551 UART: [state] CFI Enabled
25,899,911 UART: [rt] RT listening for mailbox commands...
25,902,346 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,057,557 UART: [rt]cmd =0x41544d4e, len=14344
29,988,313 >>> mbox cmd response data (8 bytes)
29,988,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,019,628 UART: [rt]cmd =0x41545348, len=116
30,039,610 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
192,651 UART:
193,059 UART: Running Caliptra ROM ...
194,170 UART:
194,312 UART: [state] CFI Enabled
263,452 UART: [state] LifecycleState = Unprovisioned
265,860 UART: [state] DebugLocked = No
267,754 UART: [state] WD Timer not started. Device not locked for debugging
273,069 UART: [kat] SHA2-256
462,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,786 UART: [kat] ++
474,232 UART: [kat] sha1
485,668 UART: [kat] SHA2-256
488,679 UART: [kat] SHA2-384
494,315 UART: [kat] SHA2-512-ACC
496,980 UART: [kat] ECC-384
2,944,100 UART: [kat] HMAC-384Kdf
2,971,969 UART: [kat] LMS
3,503,743 UART: [kat] --
3,508,384 UART: [cold-reset] ++
3,511,029 UART: [fht] FHT @ 0x50003400
3,522,936 UART: [idev] ++
3,523,652 UART: [idev] CDI.KEYID = 6
3,524,567 UART: [idev] SUBJECT.KEYID = 7
3,525,808 UART: [idev] UDS.KEYID = 0
3,526,732 ready_for_fw is high
3,526,918 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,788 UART: [idev] Erasing UDS.KEYID = 0
6,028,450 UART: [idev] Sha1 KeyId Algorithm
6,051,766 UART: [idev] --
6,055,981 UART: [ldev] ++
6,056,554 UART: [ldev] CDI.KEYID = 6
6,057,463 UART: [ldev] SUBJECT.KEYID = 5
6,058,629 UART: [ldev] AUTHORITY.KEYID = 7
6,059,887 UART: [ldev] FE.KEYID = 1
6,100,249 UART: [ldev] Erasing FE.KEYID = 1
8,609,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,466 UART: [ldev] --
10,415,217 UART: [fwproc] Wait for Commands...
10,416,931 UART: [fwproc] Recv command 0x46574c44
10,419,071 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,597,515 >>> mbox cmd response: success
14,601,846 UART: [afmc] ++
14,602,573 UART: [afmc] CDI.KEYID = 6
14,603,698 UART: [afmc] SUBJECT.KEYID = 7
14,605,245 UART: [afmc] AUTHORITY.KEYID = 5
17,143,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,326 UART: [afmc] --
18,945,115 UART: [cold-reset] --
18,947,957 UART: [state] Locking Datavault
18,955,431 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,639 UART: [state] Locking ICCM
18,960,231 UART: [exit] Launching FMC @ 0x40000130
18,968,858 UART:
18,969,112 UART: Running Caliptra FMC ...
18,970,217 UART:
18,970,378 UART: [state] CFI Enabled
19,028,314 UART: [fht] FMC Alias Private Key: 7
20,792,261 UART: [art] Extend RT PCRs Done
20,793,475 UART: [art] Lock RT PCRs Done
20,794,996 UART: [art] Populate DV Done
20,800,844 UART: [fht] FMC Alias Private Key: 7
20,802,540 UART: [art] Derive CDI
20,803,356 UART: [art] Store in in slot 0x4
20,860,401 UART: [art] Derive Key Pair
20,861,437 UART: [art] Store priv key in slot 0x5
23,323,446 UART: [art] Derive Key Pair - Done
23,336,764 UART: [art] Signing Cert with AUTHO
23,338,067 UART: RITY.KEYID = 7
25,048,907 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,442 UART: [art] PUB.X = EF65C76EE5AF4E9E6B29E0E2D3C183B053DD9FD9AE706B908986E6C43D397EE6257D933DA0B73E6453ED714E73A338D0
25,057,745 UART: [art] PUB.Y = 590DFCF9841A5D15E14CC6D4D09C7DD322447951556F12B718346841D3459504557991F672A6369DDB709B82EFC61A91
25,064,919 UART: [art] SIG.R = 78D973398707B36A9294BE4CE8DE29FF204975A5D76D5DADB3BD1BC665AF7208E5BAE68A3D2769177A7C4504F9E6F1CC
25,072,348 UART: [art] SIG.S = 2459A6EEBEBF097EB563D0B2E936A52B651BA9AD5F6E0658B5C706ECF1C7360A459312F83212F7C5D7BA4A33024A0E95
26,051,194 UART: Caliptra RT
26,051,913 UART: [state] CFI Enabled
26,217,187 UART: [rt] RT listening for mailbox commands...
26,219,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,374,899 UART: [rt]cmd =0x41544d4e, len=14344
30,305,821 >>> mbox cmd response data (8 bytes)
30,306,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,337,146 UART: [rt]cmd =0x41545348, len=116
30,356,829 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,438,584 ready_for_fw is high
3,438,980 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,738,364 >>> mbox cmd response: success
19,026,066 UART:
19,026,477 UART: Running Caliptra FMC ...
19,027,626 UART:
19,027,789 UART: [state] CFI Enabled
19,096,635 UART: [fht] FMC Alias Private Key: 7
20,860,931 UART: [art] Extend RT PCRs Done
20,862,154 UART: [art] Lock RT PCRs Done
20,863,906 UART: [art] Populate DV Done
20,869,308 UART: [fht] FMC Alias Private Key: 7
20,870,861 UART: [art] Derive CDI
20,871,594 UART: [art] Store in in slot 0x4
20,929,333 UART: [art] Derive Key Pair
20,930,337 UART: [art] Store priv key in slot 0x5
23,393,680 UART: [art] Derive Key Pair - Done
23,406,736 UART: [art] Signing Cert with AUTHO
23,408,047 UART: RITY.KEYID = 7
25,119,356 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,865 UART: [art] PUB.X = E7B535D5B246DC2C3F1C86426254989D3DDF3238B208E772F2DC1B565943A3509CF906D765D6790CFF40414EAE34708C
25,128,146 UART: [art] PUB.Y = FF70E3A9C7F2E672CB6C81703008D754E3FA599B4BC90B70D10AD5AD754892FC9ACC5F896B51406E3687B46C62A2B27D
25,135,369 UART: [art] SIG.R = 17010AD7FB1DD70D46113A721A71243137FECBC161CF86AECA51E514B66934C8B11F3EEAB6E4EE95BEA314CF948CD0F1
25,142,794 UART: [art] SIG.S = 2D5974EC87E5092AF067687047B16259980E0EE547298A69C111330C2E479C1074B856B13ADBCCB4894F63598697CBF1
26,121,819 UART: Caliptra RT
26,122,535 UART: [state] CFI Enabled
26,286,925 UART: [rt] RT listening for mailbox commands...
26,289,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,444,847 UART: [rt]cmd =0x41544d4e, len=14344
30,375,853 >>> mbox cmd response data (8 bytes)
30,376,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,407,092 UART: [rt]cmd =0x41545348, len=116
30,426,773 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
193,439 UART:
193,798 UART: Running Caliptra ROM ...
194,999 UART:
604,638 UART: [state] CFI Enabled
617,961 UART: [state] LifecycleState = Unprovisioned
620,345 UART: [state] DebugLocked = No
622,868 UART: [state] WD Timer not started. Device not locked for debugging
628,393 UART: [kat] SHA2-256
818,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,998 UART: [kat] ++
829,516 UART: [kat] sha1
841,590 UART: [kat] SHA2-256
844,600 UART: [kat] SHA2-384
851,579 UART: [kat] SHA2-512-ACC
854,230 UART: [kat] ECC-384
3,296,484 UART: [kat] HMAC-384Kdf
3,308,935 UART: [kat] LMS
3,840,726 UART: [kat] --
3,845,333 UART: [cold-reset] ++
3,847,510 UART: [fht] FHT @ 0x50003400
3,858,561 UART: [idev] ++
3,859,227 UART: [idev] CDI.KEYID = 6
3,860,261 UART: [idev] SUBJECT.KEYID = 7
3,861,360 UART: [idev] UDS.KEYID = 0
3,862,287 ready_for_fw is high
3,862,476 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,116 UART: [idev] Erasing UDS.KEYID = 0
6,339,651 UART: [idev] Sha1 KeyId Algorithm
6,362,819 UART: [idev] --
6,368,379 UART: [ldev] ++
6,369,052 UART: [ldev] CDI.KEYID = 6
6,369,962 UART: [ldev] SUBJECT.KEYID = 5
6,371,172 UART: [ldev] AUTHORITY.KEYID = 7
6,372,345 UART: [ldev] FE.KEYID = 1
6,384,283 UART: [ldev] Erasing FE.KEYID = 1
8,860,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,921 UART: [ldev] --
10,650,064 UART: [fwproc] Wait for Commands...
10,651,733 UART: [fwproc] Recv command 0x46574c44
10,653,989 UART: [fwproc] Recv'd Img size: 114360 bytes
14,101,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,576 >>> mbox cmd response: success
14,839,226 UART: [afmc] ++
14,839,921 UART: [afmc] CDI.KEYID = 6
14,841,161 UART: [afmc] SUBJECT.KEYID = 7
14,842,590 UART: [afmc] AUTHORITY.KEYID = 5
17,349,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,443 UART: [afmc] --
19,146,127 UART: [cold-reset] --
19,148,863 UART: [state] Locking Datavault
19,154,429 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,558 UART: [state] Locking ICCM
19,158,430 UART: [exit] Launching FMC @ 0x40000130
19,167,092 UART:
19,167,335 UART: Running Caliptra FMC ...
19,168,437 UART:
19,168,592 UART: [state] CFI Enabled
19,176,526 UART: [fht] FMC Alias Private Key: 7
20,933,005 UART: [art] Extend RT PCRs Done
20,934,226 UART: [art] Lock RT PCRs Done
20,935,949 UART: [art] Populate DV Done
20,941,521 UART: [fht] FMC Alias Private Key: 7
20,943,110 UART: [art] Derive CDI
20,943,924 UART: [art] Store in in slot 0x4
20,986,338 UART: [art] Derive Key Pair
20,987,392 UART: [art] Store priv key in slot 0x5
23,413,965 UART: [art] Derive Key Pair - Done
23,426,897 UART: [art] Signing Cert with AUTHO
23,428,196 UART: RITY.KEYID = 7
25,133,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,001 UART: [art] PUB.X = 46AD93E237EE3B46914D47404D842AFF327E24A3870735B9EF37ABACF7965ACAF2DB3C8F39D933BDCF8BDB712EA6B213
25,142,305 UART: [art] PUB.Y = 680B2D6A1BD77EB6E81744D8771AAC3DBDD4792CD59CA69CDAB4A8B3092AD55C7AFC77A348AC809F2890FEE7C08ADDEC
25,149,587 UART: [art] SIG.R = 906E99209F74F015935856C4E7FF3AAE813485DCDEED8AC8D6ADE71A7E6C5369B2F6F756D74B29277DB4A447472776C8
25,156,973 UART: [art] SIG.S = EA83AA281098B0A0DFC1BAE0BF9CCB6F0289631261AC865792D31CEF256C795A65167E3C35B416C1BEEA1FA2A8421723
26,136,249 UART: Caliptra RT
26,136,967 UART: [state] CFI Enabled
26,254,544 UART: [rt] RT listening for mailbox commands...
26,256,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,412,239 UART: [rt]cmd =0x41544d4e, len=14344
30,342,804 >>> mbox cmd response data (8 bytes)
30,343,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,374,021 UART: [rt]cmd =0x41545348, len=116
30,394,039 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,754,111 ready_for_fw is high
3,754,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,496 >>> mbox cmd response: success
19,218,043 UART:
19,218,433 UART: Running Caliptra FMC ...
19,219,558 UART:
19,219,716 UART: [state] CFI Enabled
19,227,488 UART: [fht] FMC Alias Private Key: 7
20,984,260 UART: [art] Extend RT PCRs Done
20,985,474 UART: [art] Lock RT PCRs Done
20,987,257 UART: [art] Populate DV Done
20,992,667 UART: [fht] FMC Alias Private Key: 7
20,994,151 UART: [art] Derive CDI
20,994,912 UART: [art] Store in in slot 0x4
21,037,674 UART: [art] Derive Key Pair
21,038,747 UART: [art] Store priv key in slot 0x5
23,465,704 UART: [art] Derive Key Pair - Done
23,478,626 UART: [art] Signing Cert with AUTHO
23,479,930 UART: RITY.KEYID = 7
25,185,397 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,900 UART: [art] PUB.X = 0F11198A3D8D886C47FAD081834D7CC4916BEBDEE260AAF5C8CFE1F57530CBD5937214598713A3C1B2062B8E621A493E
25,194,161 UART: [art] PUB.Y = 15A7ECF53266B1B8BBD8D6E3CE439258CB1A7C5CC15CB6813FDD0467D694E1852D2713BAB1D7C9A73DE92F1644B1C018
25,201,427 UART: [art] SIG.R = B67BA9313D63DE657992A0F6441D047B310823BD7EE517D2E5A4E05DBD91B6759338F2539381B00E6B1B78FABFD70EB6
25,208,854 UART: [art] SIG.S = A54B9C219551AF3F0F1D29CDE8430C992EDCC46F305904DF87C23CB0016E440AD925794041AC6A96174CE25899398844
26,187,828 UART: Caliptra RT
26,188,532 UART: [state] CFI Enabled
26,305,161 UART: [rt] RT listening for mailbox commands...
26,307,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,463,137 UART: [rt]cmd =0x41544d4e, len=14344
30,393,493 >>> mbox cmd response data (8 bytes)
30,394,062 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,424,804 UART: [rt]cmd =0x41545348, len=116
30,444,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,568 UART: [state] LifecycleState = Unprovisioned
85,223 UART: [state] DebugLocked = No
85,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,359 UART: [kat] SHA2-256
881,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,405 UART: [kat] ++
885,557 UART: [kat] sha1
889,819 UART: [kat] SHA2-256
891,757 UART: [kat] SHA2-384
894,536 UART: [kat] SHA2-512-ACC
896,437 UART: [kat] ECC-384
901,894 UART: [kat] HMAC-384Kdf
906,492 UART: [kat] LMS
1,474,688 UART: [kat] --
1,475,729 UART: [cold-reset] ++
1,476,177 UART: [fht] Storing FHT @ 0x50003400
1,478,902 UART: [idev] ++
1,479,070 UART: [idev] CDI.KEYID = 6
1,479,430 UART: [idev] SUBJECT.KEYID = 7
1,479,854 UART: [idev] UDS.KEYID = 0
1,480,199 ready_for_fw is high
1,480,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,050 UART: [idev] Erasing UDS.KEYID = 0
1,504,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,521,177 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,460 UART: [ldev] --
1,585,823 UART: [fwproc] Waiting for Commands...
1,586,536 UART: [fwproc] Received command 0x46574c44
1,587,327 UART: [fwproc] Received Image of size 114360 bytes
2,885,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,932 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,073 >>> mbox cmd response: success
3,079,161 UART: [afmc] ++
3,079,329 UART: [afmc] CDI.KEYID = 6
3,079,691 UART: [afmc] SUBJECT.KEYID = 7
3,080,116 UART: [afmc] AUTHORITY.KEYID = 5
3,116,027 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,210 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,900 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,991 UART: [afmc] --
3,159,871 UART: [cold-reset] --
3,160,917 UART: [state] Locking Datavault
3,162,290 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,894 UART: [state] Locking ICCM
3,163,382 UART: [exit] Launching FMC @ 0x40000130
3,168,711 UART:
3,168,727 UART: Running Caliptra FMC ...
3,169,135 UART:
3,169,189 UART: [state] CFI Enabled
3,179,910 UART: [fht] FMC Alias Private Key: 7
3,288,109 UART: [art] Extend RT PCRs Done
3,288,537 UART: [art] Lock RT PCRs Done
3,289,903 UART: [art] Populate DV Done
3,297,888 UART: [fht] FMC Alias Private Key: 7
3,299,060 UART: [art] Derive CDI
3,299,340 UART: [art] Store in in slot 0x4
3,385,099 UART: [art] Derive Key Pair
3,385,459 UART: [art] Store priv key in slot 0x5
3,398,491 UART: [art] Derive Key Pair - Done
3,413,285 UART: [art] Signing Cert with AUTHO
3,413,765 UART: RITY.KEYID = 7
3,429,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,794 UART: [art] PUB.X = 23EBD4C42BA0ACFD48CD8FA98EDC2539CB7D06B08AB82A0B5F5BBA2512A7F06898470122B0A1D18DC893CDD22066C772
3,436,573 UART: [art] PUB.Y = 2EFD7F6E052B9F9D31155C3DBA4D9B2C39CF654A3B4278849219F890CF8EB6B6CBF854E7C347FB8C00027044BFA73FB1
3,443,509 UART: [art] SIG.R = D2FA8E39FEB85974A763C427FAE60A99E93CBE74BA5F1EC596973DCD7F99C67CC2C879AEED5CF5E1D00FFCCA7C34E79A
3,450,303 UART: [art] SIG.S = C79E0C654F3768D421A4C69290F3E51A8AD15109FEF2F6F2434C155BA94F6FFAFA304E4BEC27DE171387424BBF7494A3
3,474,738 UART: Caliptra RT
3,474,992 UART: [state] CFI Enabled
3,582,523 UART: [rt] RT listening for mailbox commands...
3,583,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,024 UART: [rt]cmd =0x41544d4e, len=14344
3,850,891 >>> mbox cmd response data (8 bytes)
3,850,892 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,839 UART: [rt]cmd =0x41545348, len=116
3,903,038 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,631 ready_for_fw is high
1,361,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,225 >>> mbox cmd response: success
2,988,871 UART:
2,988,887 UART: Running Caliptra FMC ...
2,989,295 UART:
2,989,349 UART: [state] CFI Enabled
2,999,612 UART: [fht] FMC Alias Private Key: 7
3,107,605 UART: [art] Extend RT PCRs Done
3,108,033 UART: [art] Lock RT PCRs Done
3,109,357 UART: [art] Populate DV Done
3,117,696 UART: [fht] FMC Alias Private Key: 7
3,118,772 UART: [art] Derive CDI
3,119,052 UART: [art] Store in in slot 0x4
3,204,685 UART: [art] Derive Key Pair
3,205,045 UART: [art] Store priv key in slot 0x5
3,218,573 UART: [art] Derive Key Pair - Done
3,233,604 UART: [art] Signing Cert with AUTHO
3,234,084 UART: RITY.KEYID = 7
3,249,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,977 UART: [art] PUB.X = 53846F0F6FE5A26D64715E8911D4D7836D03ED75571ADA1D2F7EF90B0B72C97616E3BEA0CF564D8618003FE7101C5EC9
3,256,719 UART: [art] PUB.Y = D555DAB1CA1CB51DFFF30E3260DD993E57A08A868CE9B6667D0E03CF6918A9DEFCFDF4C2F7C6513D06A2FF1D2FAB6071
3,263,683 UART: [art] SIG.R = B588B84A15A2618AF3FA0AB1DEAEE4824E8F19C79A39C21F1D7D19CF56DD9D3472C4429F56ED9AC2A5E8BA2986AEA5F7
3,270,472 UART: [art] SIG.S = 85B27F7D571D74F2F7D81AD2608C1AD6E384328291A14F3924A7E1814C552718EB0C0116037FCAA27A19A7860140BCC7
3,294,235 UART: Caliptra RT
3,294,489 UART: [state] CFI Enabled
3,403,272 UART: [rt] RT listening for mailbox commands...
3,403,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,779 UART: [rt]cmd =0x41544d4e, len=14344
3,671,378 >>> mbox cmd response data (8 bytes)
3,671,379 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,386 UART: [rt]cmd =0x41545348, len=116
3,722,917 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
891,122 UART: [kat] SHA2-256
893,060 UART: [kat] SHA2-384
895,853 UART: [kat] SHA2-512-ACC
897,754 UART: [kat] ECC-384
903,149 UART: [kat] HMAC-384Kdf
907,851 UART: [kat] LMS
1,476,047 UART: [kat] --
1,476,850 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,481,276 ready_for_fw is high
1,481,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,061 UART: [idev] Erasing UDS.KEYID = 0
1,505,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,521,934 UART: [ldev] Erasing FE.KEYID = 1
1,547,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,303 UART: [ldev] --
1,586,768 UART: [fwproc] Waiting for Commands...
1,587,529 UART: [fwproc] Received command 0x46574c44
1,588,320 UART: [fwproc] Received Image of size 114360 bytes
2,886,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,604 >>> mbox cmd response: success
3,080,830 UART: [afmc] ++
3,080,998 UART: [afmc] CDI.KEYID = 6
3,081,360 UART: [afmc] SUBJECT.KEYID = 7
3,081,785 UART: [afmc] AUTHORITY.KEYID = 5
3,116,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,230 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,623 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,313 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,190 UART: [afmc] --
3,160,102 UART: [cold-reset] --
3,161,068 UART: [state] Locking Datavault
3,162,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,847 UART: [state] Locking ICCM
3,163,519 UART: [exit] Launching FMC @ 0x40000130
3,168,848 UART:
3,168,864 UART: Running Caliptra FMC ...
3,169,272 UART:
3,169,415 UART: [state] CFI Enabled
3,179,982 UART: [fht] FMC Alias Private Key: 7
3,288,223 UART: [art] Extend RT PCRs Done
3,288,651 UART: [art] Lock RT PCRs Done
3,289,987 UART: [art] Populate DV Done
3,298,130 UART: [fht] FMC Alias Private Key: 7
3,299,074 UART: [art] Derive CDI
3,299,354 UART: [art] Store in in slot 0x4
3,384,801 UART: [art] Derive Key Pair
3,385,161 UART: [art] Store priv key in slot 0x5
3,398,917 UART: [art] Derive Key Pair - Done
3,413,670 UART: [art] Signing Cert with AUTHO
3,414,150 UART: RITY.KEYID = 7
3,429,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,131 UART: [art] PUB.X = B55D963F0122D6D7C04BC89D91127C58D9D129AFFE24049C8C33F459F9AF4E462AB18F82315AAC79AFD1814941EDF5E3
3,436,905 UART: [art] PUB.Y = CBA75EA0EBAA3E248AF6350F03DEA12B2752672F1AD2383B5C21BE888D4F823DAFE4956EF8C13213E0785F35A46DD3FF
3,443,867 UART: [art] SIG.R = 09F282C6C834D91AA75A0441497C4279F5CE9FA5EEC7462A720EC788170BFC12941D92A0F25BDB24D00E908A74A4E9CC
3,450,630 UART: [art] SIG.S = 96626A9F4565E708C4E8786DB9BB65DDB6E10F4B809358FFF528185A32AD1103851E6CFD1D62C3520E595B680B223EE0
3,474,050 UART: Caliptra RT
3,474,396 UART: [state] CFI Enabled
3,583,228 UART: [rt] RT listening for mailbox commands...
3,583,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,706,605 UART: [rt]cmd =0x41544d4e, len=14344
3,851,226 >>> mbox cmd response data (8 bytes)
3,851,227 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,881,392 UART: [rt]cmd =0x41545348, len=116
3,903,311 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 ready_for_fw is high
1,362,964 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,282 >>> mbox cmd response: success
2,991,060 UART:
2,991,076 UART: Running Caliptra FMC ...
2,991,484 UART:
2,991,627 UART: [state] CFI Enabled
3,001,884 UART: [fht] FMC Alias Private Key: 7
3,110,241 UART: [art] Extend RT PCRs Done
3,110,669 UART: [art] Lock RT PCRs Done
3,112,033 UART: [art] Populate DV Done
3,120,166 UART: [fht] FMC Alias Private Key: 7
3,121,198 UART: [art] Derive CDI
3,121,478 UART: [art] Store in in slot 0x4
3,206,799 UART: [art] Derive Key Pair
3,207,159 UART: [art] Store priv key in slot 0x5
3,220,543 UART: [art] Derive Key Pair - Done
3,235,503 UART: [art] Signing Cert with AUTHO
3,235,983 UART: RITY.KEYID = 7
3,251,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,022 UART: [art] PUB.X = EDCE5EC626F6EFA2E37EC43DEF905D5832E0AB4EA52A8F829E0607BDCE0B1EE6D5BDFF13A3B51C3F46444821852A5173
3,258,805 UART: [art] PUB.Y = E38C6ADE23C598192706F67C9AA89E4B75F386CEB717AE234EC834086A668807741E9AE39F7E0BB2031AD7B82AA29D4A
3,265,748 UART: [art] SIG.R = AB2142FFBF3A12F1EA485D0D0003160EB526054ADB3E9F6592B6EF84BC74C88458732C212CCDE723227F706F2FC68B11
3,272,492 UART: [art] SIG.S = E4DE9F0C684665F296E10AE6D3CAF9160E7F8FACD51AC1F5B4C3045BFB23F101D90ADC350FE0527DCBEF410AEAA9DA11
3,295,899 UART: Caliptra RT
3,296,245 UART: [state] CFI Enabled
3,405,042 UART: [rt] RT listening for mailbox commands...
3,405,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,085 UART: [rt]cmd =0x41544d4e, len=14344
3,672,930 >>> mbox cmd response data (8 bytes)
3,672,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,136 UART: [rt]cmd =0x41545348, len=116
3,724,857 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
918,140 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,967 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,002 UART: [idev] ++
1,175,170 UART: [idev] CDI.KEYID = 6
1,175,530 UART: [idev] SUBJECT.KEYID = 7
1,175,954 UART: [idev] UDS.KEYID = 0
1,176,299 ready_for_fw is high
1,176,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,188 UART: [idev] Erasing UDS.KEYID = 0
1,200,941 UART: [idev] Sha1 KeyId Algorithm
1,209,345 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,814 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,216,897 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,530 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,564 >>> mbox cmd response: success
2,775,788 UART: [afmc] ++
2,775,956 UART: [afmc] CDI.KEYID = 6
2,776,318 UART: [afmc] SUBJECT.KEYID = 7
2,776,743 UART: [afmc] AUTHORITY.KEYID = 5
2,812,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,875 UART: [afmc] --
2,855,973 UART: [cold-reset] --
2,856,635 UART: [state] Locking Datavault
2,857,846 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,450 UART: [state] Locking ICCM
2,858,922 UART: [exit] Launching FMC @ 0x40000130
2,864,251 UART:
2,864,267 UART: Running Caliptra FMC ...
2,864,675 UART:
2,864,729 UART: [state] CFI Enabled
2,875,224 UART: [fht] FMC Alias Private Key: 7
2,983,655 UART: [art] Extend RT PCRs Done
2,984,083 UART: [art] Lock RT PCRs Done
2,985,675 UART: [art] Populate DV Done
2,993,848 UART: [fht] FMC Alias Private Key: 7
2,994,776 UART: [art] Derive CDI
2,995,056 UART: [art] Store in in slot 0x4
3,080,341 UART: [art] Derive Key Pair
3,080,701 UART: [art] Store priv key in slot 0x5
3,093,545 UART: [art] Derive Key Pair - Done
3,108,191 UART: [art] Signing Cert with AUTHO
3,108,671 UART: RITY.KEYID = 7
3,123,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,374 UART: [art] PUB.X = 2F4923202AE6617AFCC09A8EB81BD1B8FACDE2E4B28C9BB5D9908FDCE19BB2DE1F6C1CC6A97C729EAA462AE5157D1E23
3,131,172 UART: [art] PUB.Y = BA4B61CA9D4DB0C4D0A40A0DE7AC8AF3BA72F172480FB103220AD9A7C0E2B9956F573EB98C425E08E2D367168FCB97D9
3,138,122 UART: [art] SIG.R = ADBB9188C81CBC7AF3D256BA4F44278470C385B16ED42F7766794B9BA9BB2D9D0221EF68D08C9C521CD968BFB343628A
3,144,901 UART: [art] SIG.S = 5C3568B330EFA19A791B8B115287617D7A140301673AD5BBFA66489B04AD87869A5F97AFA8E9E4900EE9C95CD8D4113F
3,168,818 UART: Caliptra RT
3,169,072 UART: [state] CFI Enabled
3,277,710 UART: [rt] RT listening for mailbox commands...
3,278,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,209 UART: [rt]cmd =0x41544d4e, len=14344
3,545,626 >>> mbox cmd response data (8 bytes)
3,545,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,648 UART: [rt]cmd =0x41545348, len=116
3,597,047 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,771 >>> mbox cmd response: success
2,687,467 UART:
2,687,483 UART: Running Caliptra FMC ...
2,687,891 UART:
2,687,945 UART: [state] CFI Enabled
2,698,170 UART: [fht] FMC Alias Private Key: 7
2,805,671 UART: [art] Extend RT PCRs Done
2,806,099 UART: [art] Lock RT PCRs Done
2,807,415 UART: [art] Populate DV Done
2,815,640 UART: [fht] FMC Alias Private Key: 7
2,816,704 UART: [art] Derive CDI
2,816,984 UART: [art] Store in in slot 0x4
2,902,893 UART: [art] Derive Key Pair
2,903,253 UART: [art] Store priv key in slot 0x5
2,916,431 UART: [art] Derive Key Pair - Done
2,931,377 UART: [art] Signing Cert with AUTHO
2,931,857 UART: RITY.KEYID = 7
2,947,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,974 UART: [art] PUB.X = 2520A7D5EBB561B617A2446CE43BFE99F9FF1C01D965FD78355BC451AE436A229DCF56671762FDF77DD62EF404E32D01
2,954,745 UART: [art] PUB.Y = D5AF835256EFE02E0C62418A53159A9618406D2A20C667710042C58CA215E361CD421DCBF87A1D096F2946D9FEE29BB1
2,961,669 UART: [art] SIG.R = 84C5440238E5E4C3F288171DA1ADACB06FA53A58F8322F0E62704D628255906D6614DD24F0294727077A78BE94592DD5
2,968,424 UART: [art] SIG.S = 1BC5FED80484FF3294FF13CF0206EEC39EA58D018554861B62973799C58552945DF62423BFFD80F7E71373C3EA566654
2,991,319 UART: Caliptra RT
2,991,573 UART: [state] CFI Enabled
3,098,689 UART: [rt] RT listening for mailbox commands...
3,099,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,884 UART: [rt]cmd =0x41544d4e, len=14344
3,366,307 >>> mbox cmd response data (8 bytes)
3,366,308 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,457 UART: [rt]cmd =0x41545348, len=116
3,418,420 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
893,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,740 UART: [kat] ++
897,892 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,747 UART: [kat] HMAC-384Kdf
923,213 UART: [kat] LMS
1,171,541 UART: [kat] --
1,172,504 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,697 UART: [idev] ++
1,175,865 UART: [idev] CDI.KEYID = 6
1,176,225 UART: [idev] SUBJECT.KEYID = 7
1,176,649 UART: [idev] UDS.KEYID = 0
1,176,994 ready_for_fw is high
1,176,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,279 UART: [idev] Erasing UDS.KEYID = 0
1,202,410 UART: [idev] Sha1 KeyId Algorithm
1,210,864 UART: [idev] --
1,212,042 UART: [ldev] ++
1,212,210 UART: [ldev] CDI.KEYID = 6
1,212,573 UART: [ldev] SUBJECT.KEYID = 5
1,212,999 UART: [ldev] AUTHORITY.KEYID = 7
1,213,462 UART: [ldev] FE.KEYID = 1
1,218,682 UART: [ldev] Erasing FE.KEYID = 1
1,245,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,356 UART: [ldev] --
1,284,701 UART: [fwproc] Wait for Commands...
1,285,403 UART: [fwproc] Recv command 0x46574c44
1,286,131 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,613 >>> mbox cmd response: success
2,777,761 UART: [afmc] ++
2,777,929 UART: [afmc] CDI.KEYID = 6
2,778,291 UART: [afmc] SUBJECT.KEYID = 7
2,778,716 UART: [afmc] AUTHORITY.KEYID = 5
2,813,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,874 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,274 UART: [afmc] --
2,857,266 UART: [cold-reset] --
2,858,120 UART: [state] Locking Datavault
2,859,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,063 UART: [state] Locking ICCM
2,860,609 UART: [exit] Launching FMC @ 0x40000130
2,865,938 UART:
2,865,954 UART: Running Caliptra FMC ...
2,866,362 UART:
2,866,505 UART: [state] CFI Enabled
2,877,000 UART: [fht] FMC Alias Private Key: 7
2,984,977 UART: [art] Extend RT PCRs Done
2,985,405 UART: [art] Lock RT PCRs Done
2,987,259 UART: [art] Populate DV Done
2,995,454 UART: [fht] FMC Alias Private Key: 7
2,996,398 UART: [art] Derive CDI
2,996,678 UART: [art] Store in in slot 0x4
3,082,259 UART: [art] Derive Key Pair
3,082,619 UART: [art] Store priv key in slot 0x5
3,096,089 UART: [art] Derive Key Pair - Done
3,110,861 UART: [art] Signing Cert with AUTHO
3,111,341 UART: RITY.KEYID = 7
3,126,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,394 UART: [art] PUB.X = 88266D551F38E93089EBEE697B9FAA3DA7D6FBE074C8ABA3D93B2D782304980B72EABD7ECF55D52544007969C0262ED4
3,134,146 UART: [art] PUB.Y = 08338426C28D941278093A0AF7F5BD60A6728B619943967141E10701D1304DA67B7ECFA8EDC25D8A1359821DDBAF0D84
3,141,076 UART: [art] SIG.R = 5EDE4A7A1FB5CEC513A052C426325B190A47D28A6DC25CBE5504EB632122ABA0A0D65F31F5C8722B949B7AF047AE4D62
3,147,854 UART: [art] SIG.S = 876AABB3FD825C95A35FF3E451211DC883F7755BA7D2B59A4B802D910D5F43D4DCBAD67C9F0FF3C3CD63191EDABC9BDD
3,171,237 UART: Caliptra RT
3,171,583 UART: [state] CFI Enabled
3,280,331 UART: [rt] RT listening for mailbox commands...
3,281,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,612 UART: [rt]cmd =0x41544d4e, len=14344
3,548,389 >>> mbox cmd response data (8 bytes)
3,548,390 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,579 UART: [rt]cmd =0x41545348, len=116
3,601,170 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,814 ready_for_fw is high
1,060,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,346 >>> mbox cmd response: success
2,688,472 UART:
2,688,488 UART: Running Caliptra FMC ...
2,688,896 UART:
2,689,039 UART: [state] CFI Enabled
2,699,752 UART: [fht] FMC Alias Private Key: 7
2,807,885 UART: [art] Extend RT PCRs Done
2,808,313 UART: [art] Lock RT PCRs Done
2,810,091 UART: [art] Populate DV Done
2,818,618 UART: [fht] FMC Alias Private Key: 7
2,819,706 UART: [art] Derive CDI
2,819,986 UART: [art] Store in in slot 0x4
2,905,637 UART: [art] Derive Key Pair
2,905,997 UART: [art] Store priv key in slot 0x5
2,919,351 UART: [art] Derive Key Pair - Done
2,933,974 UART: [art] Signing Cert with AUTHO
2,934,454 UART: RITY.KEYID = 7
2,949,520 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,285 UART: [art] PUB.X = 5A56C0354AB9F15D905B7564CDEAA1A23BC4D10D5E4BFD0E5E9412B53CCD056080E75EEF445C308DA50BD6B352149723
2,957,055 UART: [art] PUB.Y = 22A049B3F724D23DC65F6DC94DFF8C05E5C122AC64942637C6A7E5CD10C1FA48B974E2420CF22630817C5E6245586952
2,963,999 UART: [art] SIG.R = 202DEB30FA43EF972648E335B58AAD445B2772F1D2EDC9534D028C7F1B0DE674A5F77F288174E651CCB69C3CCCF16AA5
2,970,777 UART: [art] SIG.S = AA99D897F69F2B2E329AA691C7115493D50A9059C12597EE8C982D4555C65EC7877A93805DABEE23172DCF8EE25D7BF7
2,994,909 UART: Caliptra RT
2,995,255 UART: [state] CFI Enabled
3,103,707 UART: [rt] RT listening for mailbox commands...
3,104,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,026 UART: [rt]cmd =0x41544d4e, len=14344
3,371,697 >>> mbox cmd response data (8 bytes)
3,371,698 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,873 UART: [rt]cmd =0x41545348, len=116
3,424,188 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,150 UART: [kat] LMS
1,168,462 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,173,849 ready_for_fw is high
1,173,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,341 UART: [idev] --
1,208,388 UART: [ldev] ++
1,208,556 UART: [ldev] CDI.KEYID = 6
1,208,920 UART: [ldev] SUBJECT.KEYID = 5
1,209,347 UART: [ldev] AUTHORITY.KEYID = 7
1,209,810 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,240,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,786 UART: [ldev] --
1,280,192 UART: [fwproc] Wait for Commands...
1,280,765 UART: [fwproc] Recv command 0x46574c44
1,281,498 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,854 >>> mbox cmd response: success
2,773,945 UART: [afmc] ++
2,774,113 UART: [afmc] CDI.KEYID = 6
2,774,476 UART: [afmc] SUBJECT.KEYID = 7
2,774,902 UART: [afmc] AUTHORITY.KEYID = 5
2,810,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,625 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,508 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,078 UART: [afmc] --
2,853,998 UART: [cold-reset] --
2,854,612 UART: [state] Locking Datavault
2,855,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,023 UART: [state] Locking ICCM
2,856,563 UART: [exit] Launching FMC @ 0x40000130
2,861,892 UART:
2,861,908 UART: Running Caliptra FMC ...
2,862,316 UART:
2,862,370 UART: [state] CFI Enabled
2,872,529 UART: [fht] FMC Alias Private Key: 7
2,979,886 UART: [art] Extend RT PCRs Done
2,980,314 UART: [art] Lock RT PCRs Done
2,981,992 UART: [art] Populate DV Done
2,990,363 UART: [fht] FMC Alias Private Key: 7
2,991,427 UART: [art] Derive CDI
2,991,707 UART: [art] Store in in slot 0x4
3,077,202 UART: [art] Derive Key Pair
3,077,562 UART: [art] Store priv key in slot 0x5
3,090,688 UART: [art] Derive Key Pair - Done
3,105,312 UART: [art] Signing Cert with AUTHO
3,105,792 UART: RITY.KEYID = 7
3,121,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,935 UART: [art] PUB.X = BDEAE4C503DCFF51C25495AE85793849A13259254B632A10574005A31B1EFB20A5169ECEBBCBD89A5673C12A441C6DBB
3,128,711 UART: [art] PUB.Y = 547420455C8C79B97E3E1ABDC036B8916A949D1037F7F173ADB044EBB21964270A6127008F6D62DA86A732803E0930BF
3,135,629 UART: [art] SIG.R = B53A6A3AB4F60FCA5503C512F64A919587ADEDF7CF8037D292FCC86F027F9D9BE604602017A54837FB8D8C54D41BF619
3,142,397 UART: [art] SIG.S = 4361777B1A6D4EE8B99FB3923C356EDF814398D4D16FE2644F280C874CA24A75EE07B3572540F8321A0D16B432A40862
3,165,916 UART: Caliptra RT
3,166,170 UART: [state] CFI Enabled
3,274,754 UART: [rt] RT listening for mailbox commands...
3,275,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,251 UART: [rt]cmd =0x41544d4e, len=14344
3,543,158 >>> mbox cmd response data (8 bytes)
3,543,159 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,350 UART: [rt]cmd =0x41545348, len=116
3,595,173 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 ready_for_fw is high
1,055,804 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,138 >>> mbox cmd response: success
2,682,774 UART:
2,682,790 UART: Running Caliptra FMC ...
2,683,198 UART:
2,683,252 UART: [state] CFI Enabled
2,693,715 UART: [fht] FMC Alias Private Key: 7
2,801,362 UART: [art] Extend RT PCRs Done
2,801,790 UART: [art] Lock RT PCRs Done
2,803,368 UART: [art] Populate DV Done
2,811,281 UART: [fht] FMC Alias Private Key: 7
2,812,325 UART: [art] Derive CDI
2,812,605 UART: [art] Store in in slot 0x4
2,898,196 UART: [art] Derive Key Pair
2,898,556 UART: [art] Store priv key in slot 0x5
2,911,954 UART: [art] Derive Key Pair - Done
2,926,553 UART: [art] Signing Cert with AUTHO
2,927,033 UART: RITY.KEYID = 7
2,942,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,808 UART: [art] PUB.X = D81895EF5C85836D1A2F7431EA681BE7924CA0B7A5E49F6FD8D1675C63A77839F3ED597078B05FF30ED1FAE736EC4096
2,949,583 UART: [art] PUB.Y = 8CFB076E16766A224BC27A85980E1801061EA16A4BDAA4409646B556FBCDD36FE88BAB222CFA6FF028A8B28139428CC0
2,956,531 UART: [art] SIG.R = 1A97B96B6D308DF43E9630D285B590E26B15072B1A9191AD8C44971C0246DD5A0013D4C12417D1AD1506A6C9B5B1B9CD
2,963,272 UART: [art] SIG.S = 693C0D9A0C1582F01056C750E8A9AA3638AFA1C3CF45BBE2E6FB0B5F380B0F0B0A89D32FED588D8361E7EA71258C3BD4
2,986,734 UART: Caliptra RT
2,986,988 UART: [state] CFI Enabled
3,094,838 UART: [rt] RT listening for mailbox commands...
3,095,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,273 UART: [rt]cmd =0x41544d4e, len=14344
3,362,972 >>> mbox cmd response data (8 bytes)
3,362,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,066 UART: [rt]cmd =0x41545348, len=116
3,415,767 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,633 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,688 UART: [idev] ++
1,173,856 UART: [idev] CDI.KEYID = 6
1,174,217 UART: [idev] SUBJECT.KEYID = 7
1,174,642 UART: [idev] UDS.KEYID = 0
1,174,988 ready_for_fw is high
1,174,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,646 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,555 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,719 UART: [ldev] --
1,282,233 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,109 >>> mbox cmd response: success
2,775,148 UART: [afmc] ++
2,775,316 UART: [afmc] CDI.KEYID = 6
2,775,679 UART: [afmc] SUBJECT.KEYID = 7
2,776,105 UART: [afmc] AUTHORITY.KEYID = 5
2,811,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,931 UART: [afmc] --
2,854,829 UART: [cold-reset] --
2,855,921 UART: [state] Locking Datavault
2,857,094 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,698 UART: [state] Locking ICCM
2,858,210 UART: [exit] Launching FMC @ 0x40000130
2,863,539 UART:
2,863,555 UART: Running Caliptra FMC ...
2,863,963 UART:
2,864,106 UART: [state] CFI Enabled
2,874,621 UART: [fht] FMC Alias Private Key: 7
2,982,412 UART: [art] Extend RT PCRs Done
2,982,840 UART: [art] Lock RT PCRs Done
2,984,116 UART: [art] Populate DV Done
2,992,075 UART: [fht] FMC Alias Private Key: 7
2,993,009 UART: [art] Derive CDI
2,993,289 UART: [art] Store in in slot 0x4
3,079,126 UART: [art] Derive Key Pair
3,079,486 UART: [art] Store priv key in slot 0x5
3,092,526 UART: [art] Derive Key Pair - Done
3,107,412 UART: [art] Signing Cert with AUTHO
3,107,892 UART: RITY.KEYID = 7
3,122,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,483 UART: [art] PUB.X = D9CAA978842B2B0713810A702C7BF4AA1885AB80F72EC074CA5F3B6667B044ED313426585E336A16A901F8AE224AFD9C
3,130,250 UART: [art] PUB.Y = 3BE62A921C8391066A99CB62E4341211B284200BA83CE44B1CA25F38C085150541CB55AE45F69BB96F77A30697816FDA
3,137,186 UART: [art] SIG.R = 7A39E8152ABEEC30B9401ED4116B8436E12C12BD3ED372A94224FEDC11074C3D99929C2CEABDF6E74E02B3EA8A89C5A3
3,143,966 UART: [art] SIG.S = AFD97E0DBDFC070F635D7902773E0E2EA13F0135A14664795AA68C9D5166FE13A0A9F08F85C82B632648C4775D1AD810
3,168,491 UART: Caliptra RT
3,168,837 UART: [state] CFI Enabled
3,276,157 UART: [rt] RT listening for mailbox commands...
3,276,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,278 UART: [rt]cmd =0x41544d4e, len=14344
3,543,761 >>> mbox cmd response data (8 bytes)
3,543,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,859 UART: [rt]cmd =0x41545348, len=116
3,595,166 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,313 ready_for_fw is high
1,056,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,415 >>> mbox cmd response: success
2,683,931 UART:
2,683,947 UART: Running Caliptra FMC ...
2,684,355 UART:
2,684,498 UART: [state] CFI Enabled
2,695,235 UART: [fht] FMC Alias Private Key: 7
2,803,170 UART: [art] Extend RT PCRs Done
2,803,598 UART: [art] Lock RT PCRs Done
2,804,884 UART: [art] Populate DV Done
2,813,053 UART: [fht] FMC Alias Private Key: 7
2,814,141 UART: [art] Derive CDI
2,814,421 UART: [art] Store in in slot 0x4
2,900,192 UART: [art] Derive Key Pair
2,900,552 UART: [art] Store priv key in slot 0x5
2,913,778 UART: [art] Derive Key Pair - Done
2,928,789 UART: [art] Signing Cert with AUTHO
2,929,269 UART: RITY.KEYID = 7
2,944,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,236 UART: [art] PUB.X = 6E10FD9A9CC1871178400BBB03879BD85719182E43C1913DB5766E9978101D894B803E066FC32ADC52B18BF7BEBB68C6
2,951,999 UART: [art] PUB.Y = 70453EF5B23AFDE428424B59DDFA28B454D5147F5719676B5F942825ECBA5B22961708EC13C4C059C7EE8895D89E58E2
2,958,948 UART: [art] SIG.R = 3D0C9986604478195D42F9F3AB1C51E55A435BB1626D34AF2C120E1E4FDC993372EEF2BC1661299D0813E3C53FB41740
2,965,709 UART: [art] SIG.S = 0ED455E13E9AEFE4058789ED82687121C94CD376219B3D2A21DE733D78A0195718E06E8288FD5E9919A8C84427AF086E
2,989,791 UART: Caliptra RT
2,990,137 UART: [state] CFI Enabled
3,097,577 UART: [rt] RT listening for mailbox commands...
3,098,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,054 UART: [rt]cmd =0x41544d4e, len=14344
3,366,019 >>> mbox cmd response data (8 bytes)
3,366,020 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,919 UART: [rt]cmd =0x41545348, len=116
3,417,518 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,472 UART:
192,850 UART: Running Caliptra ROM ...
193,976 UART:
194,121 UART: [state] CFI Enabled
266,086 UART: [state] LifecycleState = Unprovisioned
268,066 UART: [state] DebugLocked = No
269,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,064 UART: [kat] SHA2-256
443,737 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,236 UART: [kat] ++
454,829 UART: [kat] sha1
465,420 UART: [kat] SHA2-256
468,134 UART: [kat] SHA2-384
474,682 UART: [kat] SHA2-512-ACC
477,037 UART: [kat] ECC-384
2,767,528 UART: [kat] HMAC-384Kdf
2,779,694 UART: [kat] LMS
3,969,976 UART: [kat] --
3,975,983 UART: [cold-reset] ++
3,977,415 UART: [fht] Storing FHT @ 0x50003400
3,988,884 UART: [idev] ++
3,989,511 UART: [idev] CDI.KEYID = 6
3,990,430 UART: [idev] SUBJECT.KEYID = 7
3,991,667 UART: [idev] UDS.KEYID = 0
3,992,690 ready_for_fw is high
3,992,882 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,033,136 UART: [idev] Erasing UDS.KEYID = 0
7,329,150 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,304 UART: [idev] --
7,356,406 UART: [ldev] ++
7,356,966 UART: [ldev] CDI.KEYID = 6
7,357,974 UART: [ldev] SUBJECT.KEYID = 5
7,359,177 UART: [ldev] AUTHORITY.KEYID = 7
7,360,394 UART: [ldev] FE.KEYID = 1
7,402,254 UART: [ldev] Erasing FE.KEYID = 1
10,731,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,878 UART: [ldev] --
13,096,646 UART: [fwproc] Waiting for Commands...
13,099,329 UART: [fwproc] Received command 0x46574c44
13,101,504 UART: [fwproc] Received Image of size 31676 bytes
16,152,841 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,229,650 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,298,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,327,228 >>> mbox cmd response: success
16,330,961 UART: [afmc] ++
16,331,566 UART: [afmc] CDI.KEYID = 6
16,332,527 UART: [afmc] SUBJECT.KEYID = 7
16,333,880 UART: [afmc] AUTHORITY.KEYID = 5
19,689,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,987,322 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,989,639 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,004,054 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,018,883 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,033,356 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,054,500 UART: [afmc] --
22,058,974 UART: [cold-reset] --
22,064,855 UART: [state] Locking Datavault
22,068,611 UART: [state] Locking PCR0, PCR1 and PCR31
22,070,345 UART: [state] Locking ICCM
22,071,789 UART: [exit] Launching FMC @ 0x40000130
22,080,231 UART:
22,080,467 UART: Running Caliptra FMC ...
22,081,604 UART:
22,081,761 UART: [state] CFI Enabled
22,148,713 UART: [fht] FMC Alias Private Key: 7
24,486,708 UART: [art] Extend RT PCRs Done
24,488,025 UART: [art] Lock RT PCRs Done
24,489,441 UART: [art] Populate DV Done
24,495,074 UART: [fht] FMC Alias Private Key: 7
24,496,712 UART: [art] Derive CDI
24,497,574 UART: [art] Store in in slot 0x4
24,557,379 UART: [art] Derive Key Pair
24,558,422 UART: [art] Store priv key in slot 0x5
27,851,219 UART: [art] Derive Key Pair - Done
27,864,667 UART: [art] Signing Cert with AUTHO
27,866,046 UART: RITY.KEYID = 7
30,152,162 UART: [art] Erasing AUTHORITY.KEYID = 7
30,153,730 UART: [art] PUB.X = B63113D4A78CDE127B58D81037010D0EE9AB96CEF2E2BAD7B30DD44B5D8BF2E78F133FCC991921AB39BE3731A1661F3E
30,160,949 UART: [art] PUB.Y = 2B6EFBD508C5B2F133FE82D9E0BD64BE5761EE7F1D73163C847472CC61401E896E4725D79168E00F960425985E240379
30,168,186 UART: [art] SIG.R = 1BFABDE1134EC7E6B9DDE54A0E7981614C33CF680D401E0FB9BA3FAEB6B17C31F97CB93AC114B4B71ABAFE8CCA926BCF
30,175,595 UART: [art] SIG.S = 282457B99A30E389D058D67FE22EF3D74A678DB0645DAE3DACA0BFA86DF788F6B22FB88AB461AB4B19603F893BAD85C6
31,480,697 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,783,566 ready_for_fw is high
3,783,933 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,173,322 >>> mbox cmd response: success
21,862,264 UART:
21,862,682 UART: Running Caliptra FMC ...
21,863,798 UART:
21,863,952 UART: [state] CFI Enabled
21,929,268 UART: [fht] FMC Alias Private Key: 7
24,267,326 UART: [art] Extend RT PCRs Done
24,268,691 UART: [art] Lock RT PCRs Done
24,270,586 UART: [art] Populate DV Done
24,276,119 UART: [fht] FMC Alias Private Key: 7
24,277,645 UART: [art] Derive CDI
24,278,492 UART: [art] Store in in slot 0x4
24,338,017 UART: [art] Derive Key Pair
24,339,110 UART: [art] Store priv key in slot 0x5
27,631,644 UART: [art] Derive Key Pair - Done
27,644,369 UART: [art] Signing Cert with AUTHO
27,645,711 UART: RITY.KEYID = 7
29,933,322 UART: [art] Erasing AUTHORITY.KEYID = 7
29,934,900 UART: [art] PUB.X = 53D94188192F3A0237B5B4FDE419E324C7695250D095F19AADCD9859367E25146DAA490320AFE4A871662B149C09AB28
29,942,035 UART: [art] PUB.Y = 24BA399B6EAB1408AF6657CD5B7F720207E9C6F18CBBA6DD0ACE6D03BD0431A20C5CAE81A34C8974C8FDDF8882D2DEB8
29,949,349 UART: [art] SIG.R = B6E89D1FEEAE0E97D37FD2EF3D5742ECE3C3A67D41CD016719D98D27FCC800BA95D845000372447509966BFFCCB5F324
29,956,742 UART: [art] SIG.S = 1BC0E726B0DB576C76B85E4DFDC91F86A141FD989D55AE0B90363E0604BD87CA0358810847A0802FB8B974F90684B86B
31,261,481 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,459 UART:
192,835 UART: Running Caliptra ROM ...
193,955 UART:
603,467 UART: [state] CFI Enabled
618,198 UART: [state] LifecycleState = Unprovisioned
620,069 UART: [state] DebugLocked = No
621,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,008 UART: [kat] SHA2-256
796,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,292 UART: [kat] ++
807,734 UART: [kat] sha1
819,953 UART: [kat] SHA2-256
822,680 UART: [kat] SHA2-384
828,808 UART: [kat] SHA2-512-ACC
831,170 UART: [kat] ECC-384
3,116,179 UART: [kat] HMAC-384Kdf
3,128,623 UART: [kat] LMS
4,318,785 UART: [kat] --
4,322,705 UART: [cold-reset] ++
4,324,347 UART: [fht] Storing FHT @ 0x50003400
4,337,029 UART: [idev] ++
4,337,595 UART: [idev] CDI.KEYID = 6
4,338,578 UART: [idev] SUBJECT.KEYID = 7
4,339,825 UART: [idev] UDS.KEYID = 0
4,340,887 ready_for_fw is high
4,341,115 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,381,303 UART: [idev] Erasing UDS.KEYID = 0
7,625,358 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,755 UART: [idev] --
7,650,511 UART: [ldev] ++
7,651,083 UART: [ldev] CDI.KEYID = 6
7,652,048 UART: [ldev] SUBJECT.KEYID = 5
7,653,271 UART: [ldev] AUTHORITY.KEYID = 7
7,654,518 UART: [ldev] FE.KEYID = 1
7,662,891 UART: [ldev] Erasing FE.KEYID = 1
10,954,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,419 UART: [ldev] --
13,315,245 UART: [fwproc] Waiting for Commands...
13,317,797 UART: [fwproc] Received command 0x46574c44
13,320,003 UART: [fwproc] Received Image of size 31676 bytes
16,365,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,439,478 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,508,365 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,537,751 >>> mbox cmd response: success
16,542,188 UART: [afmc] ++
16,542,825 UART: [afmc] CDI.KEYID = 6
16,543,860 UART: [afmc] SUBJECT.KEYID = 7
16,544,998 UART: [afmc] AUTHORITY.KEYID = 5
19,860,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,154,854 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,157,084 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,171,490 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,186,303 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,200,818 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,222,919 UART: [afmc] --
22,225,872 UART: [cold-reset] --
22,229,659 UART: [state] Locking Datavault
22,235,042 UART: [state] Locking PCR0, PCR1 and PCR31
22,236,796 UART: [state] Locking ICCM
22,238,173 UART: [exit] Launching FMC @ 0x40000130
22,246,557 UART:
22,246,818 UART: Running Caliptra FMC ...
22,247,958 UART:
22,248,120 UART: [state] CFI Enabled
22,256,105 UART: [fht] FMC Alias Private Key: 7
24,587,118 UART: [art] Extend RT PCRs Done
24,588,382 UART: [art] Lock RT PCRs Done
24,589,838 UART: [art] Populate DV Done
24,595,157 UART: [fht] FMC Alias Private Key: 7
24,596,999 UART: [art] Derive CDI
24,597,890 UART: [art] Store in in slot 0x4
24,640,450 UART: [art] Derive Key Pair
24,641,499 UART: [art] Store priv key in slot 0x5
27,883,182 UART: [art] Derive Key Pair - Done
27,895,974 UART: [art] Signing Cert with AUTHO
27,897,314 UART: RITY.KEYID = 7
30,177,053 UART: [art] Erasing AUTHORITY.KEYID = 7
30,178,636 UART: [art] PUB.X = C87224FD135B7C927D94F041183DEBB38FD295EFCFF3D305BD511B48426F19E1276D61648AA7668D6C9F6A718181C545
30,185,758 UART: [art] PUB.Y = 25ABDB3840A942466635B3533D4FF3B89779C03D0ABFAA22EAAE40BEC44E9538AEE1CD86177D2BA74A80BF34BDC48B12
30,193,090 UART: [art] SIG.R = D1A2991FF209B174D56C7A2689573B2C24CAFF53A8C050944155DEABBCA3763E6AC5C1531EACC3A9CD9AD3E9D404FAEA
30,200,531 UART: [art] SIG.S = DB603361521FA0BA29120A76E5D00FA34E9F6927E11A5D2B4C5778449F96B2485BABC78F3B892FCB227E64E3249E9EE9
31,505,391 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,128,667 ready_for_fw is high
4,129,159 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,399,252 >>> mbox cmd response: success
22,047,527 UART:
22,047,903 UART: Running Caliptra FMC ...
22,049,017 UART:
22,049,174 UART: [state] CFI Enabled
22,057,349 UART: [fht] FMC Alias Private Key: 7
24,387,130 UART: [art] Extend RT PCRs Done
24,388,551 UART: [art] Lock RT PCRs Done
24,390,105 UART: [art] Populate DV Done
24,395,223 UART: [fht] FMC Alias Private Key: 7
24,396,820 UART: [art] Derive CDI
24,397,591 UART: [art] Store in in slot 0x4
24,439,889 UART: [art] Derive Key Pair
24,440,933 UART: [art] Store priv key in slot 0x5
27,682,907 UART: [art] Derive Key Pair - Done
27,695,699 UART: [art] Signing Cert with AUTHO
27,697,040 UART: RITY.KEYID = 7
29,976,507 UART: [art] Erasing AUTHORITY.KEYID = 7
29,978,069 UART: [art] PUB.X = E223BC4E7519256EFD20B80169E2CCDC11F756C131FA8019C57AE8E44D537E4F325C782730ABF9172754978709B1F97A
29,985,321 UART: [art] PUB.Y = 423111F564A5AA67889B729CCB6B35A3309B41810A3FD70ACFC299B4E3A10E38D9E9610F482CE54BEDAE902A048DE319
29,992,594 UART: [art] SIG.R = B622BEAB8F3D80A806A4D98576AF7553659B55AD982FB0BC05F64D937F141A9CB89BA806C62AC5CAD87D8409C2D438DF
29,999,948 UART: [art] SIG.S = 0B3BD78CFCB4FF0AD286C31F1EE3625A33B5114C0BED06574752D5C0233C4407EFECF22C86B12F1476522277E0119426
31,304,448 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
192,672 UART:
193,032 UART: Running Caliptra ROM ...
194,227 UART:
194,385 UART: [state] CFI Enabled
266,338 UART: [state] LifecycleState = Unprovisioned
268,247 UART: [state] DebugLocked = No
270,561 UART: [state] WD Timer not started. Device not locked for debugging
275,178 UART: [kat] SHA2-256
454,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,862 UART: [kat] ++
466,402 UART: [kat] sha1
476,784 UART: [kat] SHA2-256
479,783 UART: [kat] SHA2-384
485,964 UART: [kat] SHA2-512-ACC
488,918 UART: [kat] ECC-384
2,947,493 UART: [kat] HMAC-384Kdf
2,969,619 UART: [kat] LMS
3,499,065 UART: [kat] --
3,503,628 UART: [cold-reset] ++
3,505,641 UART: [fht] FHT @ 0x50003400
3,517,472 UART: [idev] ++
3,518,036 UART: [idev] CDI.KEYID = 6
3,519,114 UART: [idev] SUBJECT.KEYID = 7
3,520,244 UART: [idev] UDS.KEYID = 0
3,521,168 ready_for_fw is high
3,521,364 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,561,408 UART: [idev] Erasing UDS.KEYID = 0
6,024,513 UART: [idev] Sha1 KeyId Algorithm
6,048,246 UART: [idev] --
6,053,169 UART: [ldev] ++
6,053,747 UART: [ldev] CDI.KEYID = 6
6,054,667 UART: [ldev] SUBJECT.KEYID = 5
6,055,832 UART: [ldev] AUTHORITY.KEYID = 7
6,057,069 UART: [ldev] FE.KEYID = 1
6,099,104 UART: [ldev] Erasing FE.KEYID = 1
8,601,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,376 UART: [ldev] --
10,411,761 UART: [fwproc] Wait for Commands...
10,414,666 UART: [fwproc] Recv command 0x46574c44
10,416,753 UART: [fwproc] Recv'd Img size: 31656 bytes
12,816,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,886,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,955,497 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,983,356 >>> mbox cmd response: success
12,988,201 UART: [afmc] ++
12,988,830 UART: [afmc] CDI.KEYID = 6
12,989,865 UART: [afmc] SUBJECT.KEYID = 7
12,991,010 UART: [afmc] AUTHORITY.KEYID = 5
15,526,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,249,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,251,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,267,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,283,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,299,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,320,797 UART: [afmc] --
17,324,301 UART: [cold-reset] --
17,325,841 UART: [state] Locking Datavault
17,332,404 UART: [state] Locking PCR0, PCR1 and PCR31
17,334,082 UART: [state] Locking ICCM
17,335,787 UART: [exit] Launching FMC @ 0x40000130
17,344,235 UART:
17,344,490 UART: Running Caliptra FMC ...
17,345,553 UART:
17,345,703 UART: [state] CFI Enabled
17,408,540 UART: [fht] FMC Alias Private Key: 7
19,172,856 UART: [art] Extend RT PCRs Done
19,174,115 UART: [art] Lock RT PCRs Done
19,175,817 UART: [art] Populate DV Done
19,181,164 UART: [fht] FMC Alias Private Key: 7
19,182,758 UART: [art] Derive CDI
19,183,615 UART: [art] Store in in slot 0x4
19,241,050 UART: [art] Derive Key Pair
19,242,139 UART: [art] Store priv key in slot 0x5
21,705,119 UART: [art] Derive Key Pair - Done
21,718,396 UART: [art] Signing Cert with AUTHO
21,719,736 UART: RITY.KEYID = 7
23,431,509 UART: [art] Erasing AUTHORITY.KEYID = 7
23,433,076 UART: [art] PUB.X = F170F0372AE2B5250BF865F3A0C9548EECC07B57B2B8041B6EDB103463030BA694E818BAF77676677F60229CC9FD5994
23,440,304 UART: [art] PUB.Y = 522F8F49E276487F648C917B6D347E6C4597C9D3736CDF84F0F0B6E9B64E6A612F853B023F8D78A5E8095F9B429899F9
23,447,470 UART: [art] SIG.R = 100EC451AED57034EBED56A8B3B826434B27D5A4DB38FCAC7F6CC3C757BF66D18F38B8B9A026BF264C7ED19BE9FC3B90
23,454,971 UART: [art] SIG.S = 5B55900BC7A90F859FACD252C7228336980645AE92B550B3C1DDF30AA119AEB0958CFAF7F18DE9EA5435E3FE11356EB1
24,433,725 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,595 UART:
192,966 UART: Running Caliptra ROM ...
194,157 UART:
194,314 UART: [state] CFI Enabled
266,462 UART: [state] LifecycleState = Unprovisioned
268,842 UART: [state] DebugLocked = No
271,284 UART: [state] WD Timer not started. Device not locked for debugging
275,738 UART: [kat] SHA2-256
465,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,386 UART: [kat] ++
476,835 UART: [kat] sha1
486,993 UART: [kat] SHA2-256
490,004 UART: [kat] SHA2-384
496,075 UART: [kat] SHA2-512-ACC
498,606 UART: [kat] ECC-384
2,951,622 UART: [kat] HMAC-384Kdf
2,973,450 UART: [kat] LMS
3,505,221 UART: [kat] --
3,510,895 UART: [cold-reset] ++
3,513,259 UART: [fht] FHT @ 0x50003400
3,524,882 UART: [idev] ++
3,525,592 UART: [idev] CDI.KEYID = 6
3,526,513 UART: [idev] SUBJECT.KEYID = 7
3,527,756 UART: [idev] UDS.KEYID = 0
3,528,688 ready_for_fw is high
3,528,893 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,569,229 UART: [idev] Erasing UDS.KEYID = 0
6,030,881 UART: [idev] Sha1 KeyId Algorithm
6,054,338 UART: [idev] --
6,060,368 UART: [ldev] ++
6,061,083 UART: [ldev] CDI.KEYID = 6
6,062,066 UART: [ldev] SUBJECT.KEYID = 5
6,063,180 UART: [ldev] AUTHORITY.KEYID = 7
6,064,365 UART: [ldev] FE.KEYID = 1
6,101,863 UART: [ldev] Erasing FE.KEYID = 1
8,606,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,568 UART: [ldev] --
10,416,048 UART: [fwproc] Wait for Commands...
10,418,740 UART: [fwproc] Recv command 0x46574c44
10,420,992 UART: [fwproc] Recv'd Img size: 31656 bytes
12,848,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,927,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,043,479 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,089,037 >>> mbox cmd response: success
13,093,061 UART: [afmc] ++
13,093,699 UART: [afmc] CDI.KEYID = 6
13,094,935 UART: [afmc] SUBJECT.KEYID = 7
13,096,356 UART: [afmc] AUTHORITY.KEYID = 5
15,640,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,361,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,363,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,378,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,393,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,408,951 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,432,706 UART: [afmc] --
17,436,708 UART: [cold-reset] --
17,441,995 UART: [state] Locking Datavault
17,448,397 UART: [state] Locking PCR0, PCR1 and PCR31
17,450,615 UART: [state] Locking ICCM
17,452,291 UART: [exit] Launching FMC @ 0x40000130
17,460,938 UART:
17,461,185 UART: Running Caliptra FMC ...
17,462,327 UART:
17,462,494 UART: [state] CFI Enabled
17,519,261 UART: [fht] FMC Alias Private Key: 7
19,283,679 UART: [art] Extend RT PCRs Done
19,284,945 UART: [art] Lock RT PCRs Done
19,286,448 UART: [art] Populate DV Done
19,291,830 UART: [fht] FMC Alias Private Key: 7
19,293,354 UART: [art] Derive CDI
19,294,212 UART: [art] Store in in slot 0x4
19,352,266 UART: [art] Derive Key Pair
19,353,345 UART: [art] Store priv key in slot 0x5
21,816,591 UART: [art] Derive Key Pair - Done
21,829,668 UART: [art] Signing Cert with AUTHO
21,831,013 UART: RITY.KEYID = 7
23,542,706 UART: [art] Erasing AUTHORITY.KEYID = 7
23,544,263 UART: [art] PUB.X = 6AF443958A990F8408166DBE87078D2799DB8D2CCF03179FD4E66F03F2AEFE355905A06A41562F78FEB89C5261C21244
23,551,484 UART: [art] PUB.Y = 9BCAF95CCFC138D0AC8625E0226ADF234BF2505C94F81503B9EB0CAC9EBF19E8E80B22BB2E35F16440F9EB3F18831429
23,558,732 UART: [art] SIG.R = CC85F3282B1A63167EAC6D1C28474C5C8B8E167991995C64124E1489138856970C63CE76E1B2DA7BDFA24E995DC1D761
23,566,155 UART: [art] SIG.S = B3D9A5A89E3E9BFFE0F5FD54D4AAC758E5DFFF17A815A6724BBAF9DA87B2472CBCE5DF443C9B02EE1264435112D28751
24,544,533 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,421,102 ready_for_fw is high
3,421,507 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,945,455 >>> mbox cmd response: success
17,233,389 UART:
17,233,821 UART: Running Caliptra FMC ...
17,234,942 UART:
17,235,107 UART: [state] CFI Enabled
17,300,741 UART: [fht] FMC Alias Private Key: 7
19,064,543 UART: [art] Extend RT PCRs Done
19,065,813 UART: [art] Lock RT PCRs Done
19,067,807 UART: [art] Populate DV Done
19,073,207 UART: [fht] FMC Alias Private Key: 7
19,074,680 UART: [art] Derive CDI
19,075,492 UART: [art] Store in in slot 0x4
19,133,580 UART: [art] Derive Key Pair
19,134,674 UART: [art] Store priv key in slot 0x5
21,597,577 UART: [art] Derive Key Pair - Done
21,610,711 UART: [art] Signing Cert with AUTHO
21,612,597 UART: RITY.KEYID = 7
23,322,460 UART: [art] Erasing AUTHORITY.KEYID = 7
23,324,008 UART: [art] PUB.X = 0E156BFE9D994071BB404E0849C7BA6D483BAB6702D21E6F2EB104FEBDBB355141178C08CAADE89BEA0FAC9BA5783266
23,331,251 UART: [art] PUB.Y = F539B1A131DE6DB7B3C8F18D5C7D731D234DBE6C20D85498DB5582511B3B3D1EE1A5C88C445582EF6897C6459861951E
23,338,477 UART: [art] SIG.R = F58B6785DE14DD530021175C7D1CF6EBEBE093218E0E7FF55B34E84B01D69F851DFF3687D60C3CDADA1A33E1AD2BF2F7
23,345,879 UART: [art] SIG.S = B0398A0B6E840012FD5E1CF4CE4999E4E9CC93C96535DB13AE13F71C391031CFF02DEA97DBEDFF493C391EC6943AACBB
24,324,290 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,350 UART:
192,704 UART: Running Caliptra ROM ...
193,881 UART:
603,434 UART: [state] CFI Enabled
616,386 UART: [state] LifecycleState = Unprovisioned
618,759 UART: [state] DebugLocked = No
620,645 UART: [state] WD Timer not started. Device not locked for debugging
624,609 UART: [kat] SHA2-256
814,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,295 UART: [kat] ++
825,904 UART: [kat] sha1
838,699 UART: [kat] SHA2-256
841,699 UART: [kat] SHA2-384
848,396 UART: [kat] SHA2-512-ACC
850,982 UART: [kat] ECC-384
3,293,348 UART: [kat] HMAC-384Kdf
3,306,148 UART: [kat] LMS
3,837,917 UART: [kat] --
3,840,979 UART: [cold-reset] ++
3,843,414 UART: [fht] FHT @ 0x50003400
3,853,957 UART: [idev] ++
3,854,586 UART: [idev] CDI.KEYID = 6
3,855,537 UART: [idev] SUBJECT.KEYID = 7
3,856,773 UART: [idev] UDS.KEYID = 0
3,857,671 ready_for_fw is high
3,857,885 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,897,851 UART: [idev] Erasing UDS.KEYID = 0
6,330,371 UART: [idev] Sha1 KeyId Algorithm
6,353,229 UART: [idev] --
6,358,355 UART: [ldev] ++
6,359,034 UART: [ldev] CDI.KEYID = 6
6,359,954 UART: [ldev] SUBJECT.KEYID = 5
6,361,104 UART: [ldev] AUTHORITY.KEYID = 7
6,362,384 UART: [ldev] FE.KEYID = 1
6,373,189 UART: [ldev] Erasing FE.KEYID = 1
8,849,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,451 UART: [ldev] --
10,640,256 UART: [fwproc] Wait for Commands...
10,641,817 UART: [fwproc] Recv command 0x46574c44
10,644,125 UART: [fwproc] Recv'd Img size: 31656 bytes
13,080,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,160,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,276,341 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,322,118 >>> mbox cmd response: success
13,326,770 UART: [afmc] ++
13,327,491 UART: [afmc] CDI.KEYID = 6
13,328,657 UART: [afmc] SUBJECT.KEYID = 7
13,330,074 UART: [afmc] AUTHORITY.KEYID = 5
15,835,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,555,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,556,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,572,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,587,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,602,323 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,625,528 UART: [afmc] --
17,628,642 UART: [cold-reset] --
17,632,085 UART: [state] Locking Datavault
17,636,876 UART: [state] Locking PCR0, PCR1 and PCR31
17,639,072 UART: [state] Locking ICCM
17,641,644 UART: [exit] Launching FMC @ 0x40000130
17,650,306 UART:
17,650,560 UART: Running Caliptra FMC ...
17,651,699 UART:
17,651,862 UART: [state] CFI Enabled
17,659,954 UART: [fht] FMC Alias Private Key: 7
19,416,628 UART: [art] Extend RT PCRs Done
19,417,883 UART: [art] Lock RT PCRs Done
19,419,928 UART: [art] Populate DV Done
19,425,123 UART: [fht] FMC Alias Private Key: 7
19,426,840 UART: [art] Derive CDI
19,427,696 UART: [art] Store in in slot 0x4
19,470,106 UART: [art] Derive Key Pair
19,471,151 UART: [art] Store priv key in slot 0x5
21,898,121 UART: [art] Derive Key Pair - Done
21,911,128 UART: [art] Signing Cert with AUTHO
21,912,492 UART: RITY.KEYID = 7
23,618,025 UART: [art] Erasing AUTHORITY.KEYID = 7
23,619,606 UART: [art] PUB.X = 212359ECC302FD403B3064CDFFF9F1F3EFCAFBACFF7C852152F9258C358E1925DA2EC622BDAF8A791F99C97585FBB39A
23,626,832 UART: [art] PUB.Y = B7807D6E8D887336289062AF05FC289908AF7C4FA9F15FD05914325190B60F64DEE475C8C71921DDFC05A80CAEB61D5A
23,634,067 UART: [art] SIG.R = A0ABC45B87BDEFA1C6CE3242CBF472B773A892BF20572D35843F4F2DFC74E33FE4B32FA8CC56DA72C2509304E0FBB19D
23,641,469 UART: [art] SIG.S = 081F3397AF77F986F19EE120CCD847F188417C15C28F18E4B42E83ED71525E2E76093F56A222493A2F79E3F9D1965C06
24,620,157 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,758,558 ready_for_fw is high
3,759,120 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,175,238 >>> mbox cmd response: success
17,428,993 UART:
17,429,386 UART: Running Caliptra FMC ...
17,430,523 UART:
17,430,683 UART: [state] CFI Enabled
17,438,546 UART: [fht] FMC Alias Private Key: 7
19,195,520 UART: [art] Extend RT PCRs Done
19,196,957 UART: [art] Lock RT PCRs Done
19,198,263 UART: [art] Populate DV Done
19,203,795 UART: [fht] FMC Alias Private Key: 7
19,205,323 UART: [art] Derive CDI
19,206,176 UART: [art] Store in in slot 0x4
19,248,528 UART: [art] Derive Key Pair
19,249,581 UART: [art] Store priv key in slot 0x5
21,676,369 UART: [art] Derive Key Pair - Done
21,689,301 UART: [art] Signing Cert with AUTHO
21,690,649 UART: RITY.KEYID = 7
23,395,941 UART: [art] Erasing AUTHORITY.KEYID = 7
23,397,504 UART: [art] PUB.X = A32C20D91A6DE76152A618E6F7214CFE03F14A4B06DAAB58FBED906D53C1D2F79B9919D45796F1633B9D169DF15D3E44
23,404,732 UART: [art] PUB.Y = 8D3A24270043E7B34DC5C5EBC19D88534E17773DAAB1DF2EBAE920342A7EDF75C9DBE8C975D63937B885982DC5B2E6AD
23,412,054 UART: [art] SIG.R = F79991566AE3A7B1668385860D1F8B66C19DB7D43B79C288B3097265C5E75A08225740CD3B2E10A65DD5A07045D4E7C5
23,419,460 UART: [art] SIG.S = 341DB6DDE58F6311D9BC0502702613EE386B777BE0989FCC73DDEA53FCA134D98D7294A3F64DE31E4286B603797FC6FD
24,397,500 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,231 UART: [kat] SHA2-256
882,162 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,277 UART: [kat] ++
886,429 UART: [kat] sha1
890,521 UART: [kat] SHA2-256
892,459 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,722 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,447 UART: [cold-reset] ++
1,476,937 UART: [fht] Storing FHT @ 0x50003400
1,479,700 UART: [idev] ++
1,479,868 UART: [idev] CDI.KEYID = 6
1,480,228 UART: [idev] SUBJECT.KEYID = 7
1,480,652 UART: [idev] UDS.KEYID = 0
1,480,997 ready_for_fw is high
1,480,997 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,504,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,470 UART: [idev] --
1,514,687 UART: [ldev] ++
1,514,855 UART: [ldev] CDI.KEYID = 6
1,515,218 UART: [ldev] SUBJECT.KEYID = 5
1,515,644 UART: [ldev] AUTHORITY.KEYID = 7
1,516,107 UART: [ldev] FE.KEYID = 1
1,521,545 UART: [ldev] Erasing FE.KEYID = 1
1,546,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,600 UART: [ldev] --
1,585,971 UART: [fwproc] Waiting for Commands...
1,586,698 UART: [fwproc] Received command 0x46574c44
1,587,489 UART: [fwproc] Received Image of size 31656 bytes
1,939,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,974 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,107 >>> mbox cmd response: success
2,008,311 UART: [afmc] ++
2,008,479 UART: [afmc] CDI.KEYID = 6
2,008,841 UART: [afmc] SUBJECT.KEYID = 7
2,009,266 UART: [afmc] AUTHORITY.KEYID = 5
2,044,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,907 UART: [afmc] --
2,087,923 UART: [cold-reset] --
2,088,755 UART: [state] Locking Datavault
2,090,016 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,620 UART: [state] Locking ICCM
2,091,182 UART: [exit] Launching FMC @ 0x40000130
2,096,511 UART:
2,096,527 UART: Running Caliptra FMC ...
2,096,935 UART:
2,096,989 UART: [state] CFI Enabled
2,107,500 UART: [fht] FMC Alias Private Key: 7
2,215,991 UART: [art] Extend RT PCRs Done
2,216,419 UART: [art] Lock RT PCRs Done
2,218,033 UART: [art] Populate DV Done
2,225,872 UART: [fht] FMC Alias Private Key: 7
2,226,858 UART: [art] Derive CDI
2,227,138 UART: [art] Store in in slot 0x4
2,312,531 UART: [art] Derive Key Pair
2,312,891 UART: [art] Store priv key in slot 0x5
2,326,215 UART: [art] Derive Key Pair - Done
2,340,974 UART: [art] Signing Cert with AUTHO
2,341,454 UART: RITY.KEYID = 7
2,356,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,161 UART: [art] PUB.X = B59D27AA0956069F4E08EE98CC3B16FFE71D09141D8CC32EAF759BF49F9ED07F2ED88925B416B45A1C6FB3EFBD209139
2,363,935 UART: [art] PUB.Y = 1D9AB97D8F3729FED808FB24500872394EB17FC68FCFB37E76639432202AF8070B283ECDC73D1FEAB9490D6ED5383E64
2,370,878 UART: [art] SIG.R = A0067FA16059CFAD37CC06A5C33370F66E17E7B51C53CDDE89A5224475A495E8EE6999469A794B50B571A629962A8AF7
2,377,644 UART: [art] SIG.S = 4CC7A600E9B31751B5686FD74080758AE8C6B190404A98C4629D81C5B1093EBE8D1436BB67B1B730F7F98D7ED33D6B8A
2,401,219 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,599 ready_for_fw is high
1,362,599 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,855,649 >>> mbox cmd response: success
1,917,029 UART:
1,917,045 UART: Running Caliptra FMC ...
1,917,453 UART:
1,917,507 UART: [state] CFI Enabled
1,928,262 UART: [fht] FMC Alias Private Key: 7
2,036,883 UART: [art] Extend RT PCRs Done
2,037,311 UART: [art] Lock RT PCRs Done
2,038,799 UART: [art] Populate DV Done
2,047,174 UART: [fht] FMC Alias Private Key: 7
2,048,326 UART: [art] Derive CDI
2,048,606 UART: [art] Store in in slot 0x4
2,134,141 UART: [art] Derive Key Pair
2,134,501 UART: [art] Store priv key in slot 0x5
2,147,519 UART: [art] Derive Key Pair - Done
2,162,371 UART: [art] Signing Cert with AUTHO
2,162,851 UART: RITY.KEYID = 7
2,178,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,788 UART: [art] PUB.X = 6703A1C291C0088E7B525931058B6165DC16225BF33F4585BDE10EC104CB1215EF7B7FFFE1D3602F13A89A0D0B6F4DD4
2,185,543 UART: [art] PUB.Y = 3CC00F02E71FFE0A3C094E525285FEBA966BCAD03D5B14EEFC28D70BA912C204C9B5AD6E432CD25298A41F79B667BC7A
2,192,495 UART: [art] SIG.R = 603B816C7EF631ABBF36BBA6FA5F2FDBEAB0C30B61F1E95AE9D7658B6D3634FAF1F028CDF9810F4C6DB554DBA476F677
2,199,285 UART: [art] SIG.S = 360982D00768B81D496C97D2AEFEE02DF0F29A43351436639B1E2C76E65FCE9D6178C55792BDE5BE82320A462DC82AA6
2,222,686 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
891,124 UART: [kat] SHA2-256
893,062 UART: [kat] SHA2-384
895,831 UART: [kat] SHA2-512-ACC
897,732 UART: [kat] ECC-384
903,497 UART: [kat] HMAC-384Kdf
908,117 UART: [kat] LMS
1,476,313 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,502 UART: [fht] Storing FHT @ 0x50003400
1,480,089 UART: [idev] ++
1,480,257 UART: [idev] CDI.KEYID = 6
1,480,617 UART: [idev] SUBJECT.KEYID = 7
1,481,041 UART: [idev] UDS.KEYID = 0
1,481,386 ready_for_fw is high
1,481,386 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,015 UART: [idev] --
1,515,074 UART: [ldev] ++
1,515,242 UART: [ldev] CDI.KEYID = 6
1,515,605 UART: [ldev] SUBJECT.KEYID = 5
1,516,031 UART: [ldev] AUTHORITY.KEYID = 7
1,516,494 UART: [ldev] FE.KEYID = 1
1,521,648 UART: [ldev] Erasing FE.KEYID = 1
1,546,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,097 UART: [ldev] --
1,585,442 UART: [fwproc] Waiting for Commands...
1,586,161 UART: [fwproc] Received command 0x46574c44
1,586,952 UART: [fwproc] Received Image of size 31656 bytes
1,937,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,493 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,610 >>> mbox cmd response: success
2,007,870 UART: [afmc] ++
2,008,038 UART: [afmc] CDI.KEYID = 6
2,008,400 UART: [afmc] SUBJECT.KEYID = 7
2,008,825 UART: [afmc] AUTHORITY.KEYID = 5
2,043,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,080 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,860 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,588 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,473 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,163 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,930 UART: [afmc] --
2,087,020 UART: [cold-reset] --
2,087,866 UART: [state] Locking Datavault
2,088,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,561 UART: [state] Locking ICCM
2,090,217 UART: [exit] Launching FMC @ 0x40000130
2,095,546 UART:
2,095,562 UART: Running Caliptra FMC ...
2,095,970 UART:
2,096,113 UART: [state] CFI Enabled
2,106,906 UART: [fht] FMC Alias Private Key: 7
2,214,571 UART: [art] Extend RT PCRs Done
2,214,999 UART: [art] Lock RT PCRs Done
2,216,331 UART: [art] Populate DV Done
2,224,392 UART: [fht] FMC Alias Private Key: 7
2,225,508 UART: [art] Derive CDI
2,225,788 UART: [art] Store in in slot 0x4
2,311,629 UART: [art] Derive Key Pair
2,311,989 UART: [art] Store priv key in slot 0x5
2,324,723 UART: [art] Derive Key Pair - Done
2,339,570 UART: [art] Signing Cert with AUTHO
2,340,050 UART: RITY.KEYID = 7
2,355,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,355,893 UART: [art] PUB.X = 29AA1EEDA7D8037C759C1C547845DD948D0117DFFF4DBD9627851E875D306CB487C7971B8B867F9AB4D65B7C29B4FB26
2,362,667 UART: [art] PUB.Y = 2BCF4A97B7BE4F58B9EE5678D5E7FDB240ECA8D0F6BE38EC23AE4BE0B180FFD63FCC30CD9B647DB95F3D8CE4C4C0BDAF
2,369,657 UART: [art] SIG.R = BF6FFA5CA94FC2FCCE255149BE2C32F70532E1D2AC25171045DF61415ACC77C13E18450640E452F7B1A71315EAF786C3
2,376,431 UART: [art] SIG.S = 1C2D16C93A873731050AD301243B786CBDEBDE7FB9F208159056B9CDB81A32990D86284D5CAA045F2DC5CE441F0F49BC
2,400,196 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,266 ready_for_fw is high
1,363,266 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,492 >>> mbox cmd response: success
1,919,272 UART:
1,919,288 UART: Running Caliptra FMC ...
1,919,696 UART:
1,919,839 UART: [state] CFI Enabled
1,930,462 UART: [fht] FMC Alias Private Key: 7
2,038,589 UART: [art] Extend RT PCRs Done
2,039,017 UART: [art] Lock RT PCRs Done
2,040,681 UART: [art] Populate DV Done
2,048,798 UART: [fht] FMC Alias Private Key: 7
2,049,948 UART: [art] Derive CDI
2,050,228 UART: [art] Store in in slot 0x4
2,135,947 UART: [art] Derive Key Pair
2,136,307 UART: [art] Store priv key in slot 0x5
2,149,097 UART: [art] Derive Key Pair - Done
2,163,715 UART: [art] Signing Cert with AUTHO
2,164,195 UART: RITY.KEYID = 7
2,179,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,336 UART: [art] PUB.X = CE71FE315C67F4CF672D263891526F4AA4FC590FEAF291155BA92076B14B1BFC614B9BD6DC7A135B2B5CD2AB779587C0
2,187,117 UART: [art] PUB.Y = DEB96A11876B04A152136433A18D0B4028B6F1561ABC399778E2625EF3FF801B47A605C498D9AD458551A25CEC52D11B
2,194,058 UART: [art] SIG.R = A45B70D4DE7A73C5529C99C9A4CFB6CC8A56790104F3E94B7E75D76BF12CE51BD16EBEF990D33A2EE2A98CEFDF9B7566
2,200,844 UART: [art] SIG.S = 375F24566542EF9E61DD61201FE4227FD335C632FDDDE7ECDB9B7EDF2E7263C98038F107C641ECBC47F27122099B7036
2,224,918 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
893,652 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,777 UART: [kat] ++
897,929 UART: [kat] sha1
902,187 UART: [kat] SHA2-256
904,127 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,126 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,103 UART: [fht] FHT @ 0x50003400
1,174,784 UART: [idev] ++
1,174,952 UART: [idev] CDI.KEYID = 6
1,175,312 UART: [idev] SUBJECT.KEYID = 7
1,175,736 UART: [idev] UDS.KEYID = 0
1,176,081 ready_for_fw is high
1,176,081 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,560 UART: [idev] Erasing UDS.KEYID = 0
1,200,555 UART: [idev] Sha1 KeyId Algorithm
1,209,095 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,832 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,216,907 UART: [ldev] Erasing FE.KEYID = 1
1,243,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,958 UART: [fwproc] Recv command 0x46574c44
1,283,686 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,887 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,628 >>> mbox cmd response: success
1,703,720 UART: [afmc] ++
1,703,888 UART: [afmc] CDI.KEYID = 6
1,704,250 UART: [afmc] SUBJECT.KEYID = 7
1,704,675 UART: [afmc] AUTHORITY.KEYID = 5
1,740,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,529 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,741 UART: [afmc] --
1,783,743 UART: [cold-reset] --
1,784,479 UART: [state] Locking Datavault
1,785,764 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,368 UART: [state] Locking ICCM
1,787,020 UART: [exit] Launching FMC @ 0x40000130
1,792,349 UART:
1,792,365 UART: Running Caliptra FMC ...
1,792,773 UART:
1,792,827 UART: [state] CFI Enabled
1,803,338 UART: [fht] FMC Alias Private Key: 7
1,911,295 UART: [art] Extend RT PCRs Done
1,911,723 UART: [art] Lock RT PCRs Done
1,913,395 UART: [art] Populate DV Done
1,921,796 UART: [fht] FMC Alias Private Key: 7
1,922,820 UART: [art] Derive CDI
1,923,100 UART: [art] Store in in slot 0x4
2,009,067 UART: [art] Derive Key Pair
2,009,427 UART: [art] Store priv key in slot 0x5
2,022,203 UART: [art] Derive Key Pair - Done
2,036,735 UART: [art] Signing Cert with AUTHO
2,037,215 UART: RITY.KEYID = 7
2,052,443 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,208 UART: [art] PUB.X = 94280609D963DD92DEC09AB65FF78563C37E08BCDBBBCFF2E553EFAA137371774FA64CE140E009F6D2B5EFEB1B7B70CC
2,059,988 UART: [art] PUB.Y = 3501DA6590B834A6AFA7C60BEDA5C6B133951A08F57AE1AF4B7C4B3C107091F05022362C9E14D7ED397B1F0A61CAE2BE
2,066,940 UART: [art] SIG.R = 9C658DB02F323CD2C1B2FDF69B8A916C349FF031EE8DF06735E7F456D3ABD532A67DBAD54F00424210D479756519B45C
2,073,696 UART: [art] SIG.S = 79CCADCA8E0B6C3C7D8E8FE3173596EF0D4D067E8E6CF7576ED6CFDEB758F3626345019C35525315BFE1B58455F6BDA9
2,097,880 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,339 ready_for_fw is high
1,060,339 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,821 >>> mbox cmd response: success
1,618,103 UART:
1,618,119 UART: Running Caliptra FMC ...
1,618,527 UART:
1,618,581 UART: [state] CFI Enabled
1,628,886 UART: [fht] FMC Alias Private Key: 7
1,736,613 UART: [art] Extend RT PCRs Done
1,737,041 UART: [art] Lock RT PCRs Done
1,738,249 UART: [art] Populate DV Done
1,746,608 UART: [fht] FMC Alias Private Key: 7
1,747,662 UART: [art] Derive CDI
1,747,942 UART: [art] Store in in slot 0x4
1,833,619 UART: [art] Derive Key Pair
1,833,979 UART: [art] Store priv key in slot 0x5
1,846,885 UART: [art] Derive Key Pair - Done
1,861,831 UART: [art] Signing Cert with AUTHO
1,862,311 UART: RITY.KEYID = 7
1,877,885 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,650 UART: [art] PUB.X = 5AB77CC47A33A35790BECE5C0641669BA5984B11C572E5D9AB5EB1357D7D5D3C11DAD15EB337621DB9933E3F4C723F69
1,885,427 UART: [art] PUB.Y = B40BDD6894839E0ABBAB763B1E2A92A0D0B2E36E0BEC72CA907CD5ABD27ADE2F245328840E64F526849DB4DF0EC67963
1,892,380 UART: [art] SIG.R = 05F52ED7F9C649D6AB95C1A0979958A0E2ADE0D615F09671A0AAAB27872436933A2A2165A41088410D8C710C76C2FE4B
1,899,143 UART: [art] SIG.S = C7E44C431DF08F3D0B5259BEF4F6C16A2B568739E6DE3546D9D4168C3DABAD22EDE5E76597D6A0388E114AF4FA8B78C8
1,922,700 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,089 UART: [state] LifecycleState = Unprovisioned
86,744 UART: [state] DebugLocked = No
87,250 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
894,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,158 UART: [kat] ++
898,310 UART: [kat] sha1
902,490 UART: [kat] SHA2-256
904,430 UART: [kat] SHA2-384
907,127 UART: [kat] SHA2-512-ACC
909,028 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
923,383 UART: [kat] LMS
1,171,711 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,002 UART: [fht] FHT @ 0x50003400
1,175,493 UART: [idev] ++
1,175,661 UART: [idev] CDI.KEYID = 6
1,176,021 UART: [idev] SUBJECT.KEYID = 7
1,176,445 UART: [idev] UDS.KEYID = 0
1,176,790 ready_for_fw is high
1,176,790 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,202,106 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,822 UART: [ldev] ++
1,211,990 UART: [ldev] CDI.KEYID = 6
1,212,353 UART: [ldev] SUBJECT.KEYID = 5
1,212,779 UART: [ldev] AUTHORITY.KEYID = 7
1,213,242 UART: [ldev] FE.KEYID = 1
1,218,646 UART: [ldev] Erasing FE.KEYID = 1
1,244,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,748 UART: [ldev] --
1,284,017 UART: [fwproc] Wait for Commands...
1,284,781 UART: [fwproc] Recv command 0x46574c44
1,285,509 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,470 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,705,293 >>> mbox cmd response: success
1,706,361 UART: [afmc] ++
1,706,529 UART: [afmc] CDI.KEYID = 6
1,706,891 UART: [afmc] SUBJECT.KEYID = 7
1,707,316 UART: [afmc] AUTHORITY.KEYID = 5
1,742,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,682 UART: [afmc] --
1,785,562 UART: [cold-reset] --
1,786,506 UART: [state] Locking Datavault
1,787,581 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,185 UART: [state] Locking ICCM
1,788,653 UART: [exit] Launching FMC @ 0x40000130
1,793,982 UART:
1,793,998 UART: Running Caliptra FMC ...
1,794,406 UART:
1,794,549 UART: [state] CFI Enabled
1,804,984 UART: [fht] FMC Alias Private Key: 7
1,912,659 UART: [art] Extend RT PCRs Done
1,913,087 UART: [art] Lock RT PCRs Done
1,914,601 UART: [art] Populate DV Done
1,922,784 UART: [fht] FMC Alias Private Key: 7
1,923,894 UART: [art] Derive CDI
1,924,174 UART: [art] Store in in slot 0x4
2,010,099 UART: [art] Derive Key Pair
2,010,459 UART: [art] Store priv key in slot 0x5
2,023,623 UART: [art] Derive Key Pair - Done
2,038,556 UART: [art] Signing Cert with AUTHO
2,039,036 UART: RITY.KEYID = 7
2,054,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,091 UART: [art] PUB.X = 1E2B55BC8D336551BE1ED0899CDB7E65C8880AA995EB66EAC5E753154CC5F20A84E6B904A0FB813030B2823754B0A5E1
2,061,860 UART: [art] PUB.Y = 247A75E3A26A223BA1DFA104DD9587911F2790AA7270E6B165720AC47D3787B85A43DA67FF0EE5287AD50B9BEF893ECD
2,068,808 UART: [art] SIG.R = A6A3EBF93FB0592F559468E27FAB426E6F82F7531A3C9F74E5D8EC9CD742A768D48C29E99B55CB2691085EAD268C877B
2,075,585 UART: [art] SIG.S = 02E64B41D8E2BEB7FC9F7088F57E513C236CECF8DFAB1F890DD1C5F379CE81CA9551EAED1730E22201C3A88EE6BF3C7F
2,099,022 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,640 ready_for_fw is high
1,060,640 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,480 >>> mbox cmd response: success
1,618,596 UART:
1,618,612 UART: Running Caliptra FMC ...
1,619,020 UART:
1,619,163 UART: [state] CFI Enabled
1,629,576 UART: [fht] FMC Alias Private Key: 7
1,737,885 UART: [art] Extend RT PCRs Done
1,738,313 UART: [art] Lock RT PCRs Done
1,740,133 UART: [art] Populate DV Done
1,748,446 UART: [fht] FMC Alias Private Key: 7
1,749,488 UART: [art] Derive CDI
1,749,768 UART: [art] Store in in slot 0x4
1,835,415 UART: [art] Derive Key Pair
1,835,775 UART: [art] Store priv key in slot 0x5
1,848,875 UART: [art] Derive Key Pair - Done
1,863,589 UART: [art] Signing Cert with AUTHO
1,864,069 UART: RITY.KEYID = 7
1,879,465 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,230 UART: [art] PUB.X = C73F789A4AAE94511C16E2D6A38E4E8D12EBB6A45707CD5A4B1593C7988582143D2765528D05B79353F9B88B812062DC
1,886,992 UART: [art] PUB.Y = 1D6572590FD6FB277F2939885780775CF2E4A223A2818E1D5DCDA8D061302D1674CB23AC04BD5B74BB6B79650D4F3E98
1,893,935 UART: [art] SIG.R = 64F10C3829F003298C10DF5B23F31950BB06D82002FE3FBF37910281DD01188FBB771F3B58CBAE099D13676CAE4ABFF1
1,900,692 UART: [art] SIG.S = 550EBE0772FAEB1740E0E588A95E98217DAD5FBB20F5BAB681580365B532782A6C231859DD7712BB46FE1609DD4785AF
1,923,798 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,662 UART: [state] LifecycleState = Unprovisioned
86,317 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
891,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,389 UART: [kat] SHA2-256
902,329 UART: [kat] SHA2-384
905,136 UART: [kat] SHA2-512-ACC
907,037 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,090 UART: [kat] LMS
1,169,402 UART: [kat] --
1,170,405 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,174,961 ready_for_fw is high
1,174,961 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,719 UART: [idev] Erasing UDS.KEYID = 0
1,199,879 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,666 UART: [ldev] ++
1,209,834 UART: [ldev] CDI.KEYID = 6
1,210,198 UART: [ldev] SUBJECT.KEYID = 5
1,210,625 UART: [ldev] AUTHORITY.KEYID = 7
1,211,088 UART: [ldev] FE.KEYID = 1
1,216,326 UART: [ldev] Erasing FE.KEYID = 1
1,242,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,470 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,551 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,896 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,620 >>> mbox cmd response: success
1,702,719 UART: [afmc] ++
1,702,887 UART: [afmc] CDI.KEYID = 6
1,703,250 UART: [afmc] SUBJECT.KEYID = 7
1,703,676 UART: [afmc] AUTHORITY.KEYID = 5
1,739,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,069 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,492 UART: [afmc] --
1,782,374 UART: [cold-reset] --
1,783,196 UART: [state] Locking Datavault
1,784,249 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,853 UART: [state] Locking ICCM
1,785,527 UART: [exit] Launching FMC @ 0x40000130
1,790,856 UART:
1,790,872 UART: Running Caliptra FMC ...
1,791,280 UART:
1,791,334 UART: [state] CFI Enabled
1,802,003 UART: [fht] FMC Alias Private Key: 7
1,909,626 UART: [art] Extend RT PCRs Done
1,910,054 UART: [art] Lock RT PCRs Done
1,911,542 UART: [art] Populate DV Done
1,920,167 UART: [fht] FMC Alias Private Key: 7
1,921,159 UART: [art] Derive CDI
1,921,439 UART: [art] Store in in slot 0x4
2,007,278 UART: [art] Derive Key Pair
2,007,638 UART: [art] Store priv key in slot 0x5
2,020,646 UART: [art] Derive Key Pair - Done
2,035,526 UART: [art] Signing Cert with AUTHO
2,036,006 UART: RITY.KEYID = 7
2,051,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,881 UART: [art] PUB.X = F58B3C042A4050DB34CAF43A9A594B7B4B202979D37CDCAE027C3370F498E518D0B39C577DEBADA082AFAEABF24ED8B8
2,058,667 UART: [art] PUB.Y = 59B2F1805B2D4332FFDA93086A42BB13F1D88E67F94235D25DCC9A42DEBDCB2E102F30F10CAAADC3E81880F5481D7423
2,065,625 UART: [art] SIG.R = 4C3E12B073FF14E30A5BC2D2F16333D598A115F99BEFC463201A582E4D94789515BC4B7626FB489C2EC05EC79E5CEBAA
2,072,404 UART: [art] SIG.S = 6A0C54990BE732DBBA810F6DE684CE053651A2BFE77E11AB11C5777DF65A4C849D0DD1FC1B3B7C382027A8F31D02B7FF
2,096,492 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,432 ready_for_fw is high
1,056,432 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,158 >>> mbox cmd response: success
1,614,276 UART:
1,614,292 UART: Running Caliptra FMC ...
1,614,700 UART:
1,614,754 UART: [state] CFI Enabled
1,625,215 UART: [fht] FMC Alias Private Key: 7
1,733,314 UART: [art] Extend RT PCRs Done
1,733,742 UART: [art] Lock RT PCRs Done
1,735,184 UART: [art] Populate DV Done
1,743,683 UART: [fht] FMC Alias Private Key: 7
1,744,613 UART: [art] Derive CDI
1,744,893 UART: [art] Store in in slot 0x4
1,830,268 UART: [art] Derive Key Pair
1,830,628 UART: [art] Store priv key in slot 0x5
1,843,540 UART: [art] Derive Key Pair - Done
1,858,682 UART: [art] Signing Cert with AUTHO
1,859,162 UART: RITY.KEYID = 7
1,874,172 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,937 UART: [art] PUB.X = 0F2C59816B3E633D8A4DA8C31B29F07F38E963CD5EC72DAD82E04A995CED7216BA6DBBF2D8498B253F3DD199D1F22DDE
1,881,724 UART: [art] PUB.Y = 5AE3809AFC753FACF38778F8989D14634CF5BF233778AC1EFD93487A8A38161B7C50AB6B5320C722CD22AD2C6049ABE9
1,888,684 UART: [art] SIG.R = 5E65BD8B1EAB82CEBBA8ECBB39B10B44384FC7B1BAF80E069234F2CDF560C7CEF99E9E007A4BEE2FF1AC68DC6BC8F77C
1,895,459 UART: [art] SIG.S = EDA74F4D3FA44B91BD4EB377E57EF8606C3F15221D16F383B3C5C91622A81A5D98308F7AF1E0FE7FFAD72C47427C09F7
1,919,212 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
915,955 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 ready_for_fw is high
1,174,092 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,014 UART: [idev] Erasing UDS.KEYID = 0
1,198,918 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,707 UART: [ldev] ++
1,208,875 UART: [ldev] CDI.KEYID = 6
1,209,239 UART: [ldev] SUBJECT.KEYID = 5
1,209,666 UART: [ldev] AUTHORITY.KEYID = 7
1,210,129 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,865 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,282,092 UART: [fwproc] Recv command 0x46574c44
1,282,825 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,779 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,541 >>> mbox cmd response: success
1,702,760 UART: [afmc] ++
1,702,928 UART: [afmc] CDI.KEYID = 6
1,703,291 UART: [afmc] SUBJECT.KEYID = 7
1,703,717 UART: [afmc] AUTHORITY.KEYID = 5
1,739,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,649 UART: [afmc] --
1,782,651 UART: [cold-reset] --
1,783,339 UART: [state] Locking Datavault
1,784,520 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,124 UART: [state] Locking ICCM
1,785,736 UART: [exit] Launching FMC @ 0x40000130
1,791,065 UART:
1,791,081 UART: Running Caliptra FMC ...
1,791,489 UART:
1,791,632 UART: [state] CFI Enabled
1,802,135 UART: [fht] FMC Alias Private Key: 7
1,910,044 UART: [art] Extend RT PCRs Done
1,910,472 UART: [art] Lock RT PCRs Done
1,912,288 UART: [art] Populate DV Done
1,920,643 UART: [fht] FMC Alias Private Key: 7
1,921,679 UART: [art] Derive CDI
1,921,959 UART: [art] Store in in slot 0x4
2,007,658 UART: [art] Derive Key Pair
2,008,018 UART: [art] Store priv key in slot 0x5
2,021,168 UART: [art] Derive Key Pair - Done
2,035,928 UART: [art] Signing Cert with AUTHO
2,036,408 UART: RITY.KEYID = 7
2,051,428 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,193 UART: [art] PUB.X = E5D2360CD7D714E5B1220CD3F5155004D8D8CC9418CC519387350BC8907E1E2967D655046D6414E80214CD165D184FD0
2,058,939 UART: [art] PUB.Y = DE774142130B09EC790BF753629145622BAF5B57EE51C511AA4AF6008CEA366E62527A535552C8BB00A277548B5B603C
2,065,834 UART: [art] SIG.R = 55CF124E5C6B7D3D27879CE4CA85D0C8A94D8FBEC6844AF9C6EAEDA9D7CAF94EF0E6C4167004E8156A04E233E9F58FEB
2,072,622 UART: [art] SIG.S = C8085BF39216856DAFE911987090EB6911C8B2D156D59EFFD8838C9D8062F514437F461C144FBEE0040810EE3324A218
2,096,275 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 ready_for_fw is high
1,056,475 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,185 >>> mbox cmd response: success
1,616,573 UART:
1,616,589 UART: Running Caliptra FMC ...
1,616,997 UART:
1,617,140 UART: [state] CFI Enabled
1,627,389 UART: [fht] FMC Alias Private Key: 7
1,735,468 UART: [art] Extend RT PCRs Done
1,735,896 UART: [art] Lock RT PCRs Done
1,737,402 UART: [art] Populate DV Done
1,745,655 UART: [fht] FMC Alias Private Key: 7
1,746,663 UART: [art] Derive CDI
1,746,943 UART: [art] Store in in slot 0x4
1,832,034 UART: [art] Derive Key Pair
1,832,394 UART: [art] Store priv key in slot 0x5
1,845,582 UART: [art] Derive Key Pair - Done
1,860,024 UART: [art] Signing Cert with AUTHO
1,860,504 UART: RITY.KEYID = 7
1,875,770 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,535 UART: [art] PUB.X = E85D83B58B9CAD59401461A397297CF18305A352E760EC1A69E336513B21B8836EB91D21492989A7CF336CBCB0F91044
1,883,298 UART: [art] PUB.Y = D91DBBB8D3AB33F6ADA43EBCC19E5BC6DB370B2648AC2278F6925E83D72686D7042FFA0D8E98564740441F3AC75F0868
1,890,248 UART: [art] SIG.R = 8B1319B2D8B0252DC756B4AD7ACBFD76A9367036316D28CEE0F8BE87AE84BE6835628ABCFAF1232D6DFEE8604A7D921B
1,897,036 UART: [art] SIG.S = 7AC94496C025386CD589A0634860818454A747D5F30D1C6487730A32B9ACEC2425EB4083FD14B2F6D6802101D8D286FE
1,920,581 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,386 UART:
192,759 UART: Running Caliptra ROM ...
193,887 UART:
194,049 UART: [state] CFI Enabled
263,033 UART: [state] LifecycleState = Unprovisioned
264,952 UART: [state] DebugLocked = No
267,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,634 UART: [kat] SHA2-256
442,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,827 UART: [kat] ++
453,271 UART: [kat] sha1
464,204 UART: [kat] SHA2-256
466,914 UART: [kat] SHA2-384
472,680 UART: [kat] SHA2-512-ACC
475,108 UART: [kat] ECC-384
2,766,963 UART: [kat] HMAC-384Kdf
2,800,722 UART: [kat] LMS
3,991,018 UART: [kat] --
3,993,969 UART: [cold-reset] ++
3,995,278 UART: [fht] Storing FHT @ 0x50003400
4,006,256 UART: [idev] ++
4,006,819 UART: [idev] CDI.KEYID = 6
4,007,725 UART: [idev] SUBJECT.KEYID = 7
4,008,966 UART: [idev] UDS.KEYID = 0
4,009,950 ready_for_fw is high
4,010,141 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,110,118 UART: [idev] Erasing UDS.KEYID = 0
7,347,401 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,418 UART: [idev] --
7,372,987 UART: [ldev] ++
7,373,598 UART: [ldev] CDI.KEYID = 6
7,374,510 UART: [ldev] SUBJECT.KEYID = 5
7,375,718 UART: [ldev] AUTHORITY.KEYID = 7
7,377,112 UART: [ldev] FE.KEYID = 1
7,423,060 UART: [ldev] Erasing FE.KEYID = 1
10,756,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,203 UART: [ldev] --
13,134,586 UART: [fwproc] Waiting for Commands...
13,136,588 UART: [fwproc] Received command 0x46574c44
13,138,821 UART: [fwproc] Received Image of size 78676 bytes
16,756,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,832,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,901,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,094,326 >>> mbox cmd response: success
17,094,851 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,098,668 UART: [afmc] ++
17,099,260 UART: [afmc] CDI.KEYID = 6
17,100,185 UART: [afmc] SUBJECT.KEYID = 7
17,101,455 UART: [afmc] AUTHORITY.KEYID = 5
20,473,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,773,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,776,000 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,790,416 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,805,260 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,819,693 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,840,787 UART: [afmc] --
22,845,456 UART: [cold-reset] --
22,850,391 UART: [state] Locking Datavault
22,855,139 UART: [state] Locking PCR0, PCR1 and PCR31
22,856,884 UART: [state] Locking ICCM
22,859,510 UART: [exit] Launching FMC @ 0x40000130
22,867,898 UART:
22,868,125 UART: Running Caliptra FMC ...
22,869,237 UART:
22,869,397 UART: [state] CFI Enabled
22,931,248 UART: [fht] FMC Alias Private Key: 7
25,268,954 UART: [art] Extend RT PCRs Done
25,270,210 UART: [art] Lock RT PCRs Done
25,271,859 UART: [art] Populate DV Done
25,277,105 UART: [fht] FMC Alias Private Key: 7
25,278,756 UART: [art] Derive CDI
25,279,566 UART: [art] Store in in slot 0x4
25,340,661 UART: [art] Derive Key Pair
25,341,694 UART: [art] Store priv key in slot 0x5
28,634,476 UART: [art] Derive Key Pair - Done
28,647,633 UART: [art] Signing Cert with AUTHO
28,648,927 UART: RITY.KEYID = 7
30,934,777 UART: [art] Erasing AUTHORITY.KEYID = 7
30,936,295 UART: [art] PUB.X = 303A9035DC15FBB8B2549651B37F468BEA68FF7CEFA0AC78210D0257E4E217433C6BE7DE1BD2A728A43A6BBF7D5B75F8
30,943,555 UART: [art] PUB.Y = A467A68191CCBFE54DF0F7B64661A94569776045ED8EEA6EE1CCA7018D1AA2BB38A17C42C74BEEB87939862B761F49C3
30,950,778 UART: [art] SIG.R = 09798E7C49FFFE2B8DEE78AA7B90F2BD9595D3674DD0271B30CA07710462CCCA1937457173550A4BE6CC023A0B695955
30,958,156 UART: [art] SIG.S = 47B4CA97C175C1EEE88D2EB823BD894B9D581E64B03A4E432410D0DC05A87053F955180F6B60301A5168B7B9394776AB
32,263,761 UART: mbox::rt_entry...
32,264,704 UART: ____ _ _ _ ____ _____
32,266,805 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,268,798 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,270,643 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,272,553 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,274,400 UART: |_|
32,275,216 UART:
32,389,033 UART: [rt] Runtime listening for mailbox commands...
32,391,197 >>> mbox cmd response data (48 bytes)
32,391,820 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,394,150 >>> mbox cmd response data (48 bytes)
32,394,992 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,407,558 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,781,989 ready_for_fw is high
3,782,512 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,150,428 >>> mbox cmd response: success
17,151,033 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,845,687 UART:
22,846,087 UART: Running Caliptra FMC ...
22,847,235 UART:
22,847,386 UART: [state] CFI Enabled
22,912,800 UART: [fht] FMC Alias Private Key: 7
25,251,314 UART: [art] Extend RT PCRs Done
25,252,533 UART: [art] Lock RT PCRs Done
25,254,313 UART: [art] Populate DV Done
25,259,781 UART: [fht] FMC Alias Private Key: 7
25,261,433 UART: [art] Derive CDI
25,262,245 UART: [art] Store in in slot 0x4
25,321,322 UART: [art] Derive Key Pair
25,322,363 UART: [art] Store priv key in slot 0x5
28,615,345 UART: [art] Derive Key Pair - Done
28,628,079 UART: [art] Signing Cert with AUTHO
28,629,380 UART: RITY.KEYID = 7
30,918,275 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,772 UART: [art] PUB.X = E1D590DAC200A0C16CC895B00FEAEEDCF14DA423B7A916BF15BB7CFEA7BF2416024E066808F7D90555DDB08F45E6C84F
30,927,106 UART: [art] PUB.Y = 9D53A22E2AE21F7520ADAA37F827229E17F132B2084439689F58F3A75D1B8F48D4BEC761358BA1FD1908B4D122BB1D88
30,934,341 UART: [art] SIG.R = 4EF082C0652C8111951756D095B5817B7A5F50E18DAE3D6DEE9611718F574079237B82B78395F80FC11437EDEC2502B1
30,941,672 UART: [art] SIG.S = 7DC01EA6D25C08ED2BD1A2511E693B6BCB7ED322264E77944CBC5F5B704C4D188E333EC084E34607F5CD09498EF5C446
32,246,008 UART: mbox::rt_entry...
32,246,954 UART: ____ _ _ _ ____ _____
32,248,931 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,929 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,803 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,723 UART: |_|
32,257,522 UART:
32,371,433 UART: [rt] Runtime listening for mailbox commands...
32,373,552 >>> mbox cmd response data (48 bytes)
32,374,137 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,376,494 >>> mbox cmd response data (48 bytes)
32,377,335 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,389,895 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,497 UART:
192,852 UART: Running Caliptra ROM ...
194,051 UART:
603,522 UART: [state] CFI Enabled
616,113 UART: [state] LifecycleState = Unprovisioned
618,051 UART: [state] DebugLocked = No
620,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,301 UART: [kat] SHA2-256
794,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,541 UART: [kat] ++
806,031 UART: [kat] sha1
816,358 UART: [kat] SHA2-256
819,093 UART: [kat] SHA2-384
825,163 UART: [kat] SHA2-512-ACC
827,528 UART: [kat] ECC-384
3,110,675 UART: [kat] HMAC-384Kdf
3,123,196 UART: [kat] LMS
4,313,307 UART: [kat] --
4,315,837 UART: [cold-reset] ++
4,318,447 UART: [fht] Storing FHT @ 0x50003400
4,329,297 UART: [idev] ++
4,329,860 UART: [idev] CDI.KEYID = 6
4,330,835 UART: [idev] SUBJECT.KEYID = 7
4,332,086 UART: [idev] UDS.KEYID = 0
4,333,072 ready_for_fw is high
4,333,271 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,432,128 UART: [idev] Erasing UDS.KEYID = 0
7,622,751 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,149 UART: [idev] --
7,650,327 UART: [ldev] ++
7,650,896 UART: [ldev] CDI.KEYID = 6
7,651,856 UART: [ldev] SUBJECT.KEYID = 5
7,653,065 UART: [ldev] AUTHORITY.KEYID = 7
7,654,349 UART: [ldev] FE.KEYID = 1
7,664,313 UART: [ldev] Erasing FE.KEYID = 1
10,950,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,152 UART: [ldev] --
13,310,875 UART: [fwproc] Waiting for Commands...
13,312,804 UART: [fwproc] Received command 0x46574c44
13,314,991 UART: [fwproc] Received Image of size 78676 bytes
16,925,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,006,669 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,075,525 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,268,551 >>> mbox cmd response: success
17,269,005 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,272,053 UART: [afmc] ++
17,272,652 UART: [afmc] CDI.KEYID = 6
17,273,536 UART: [afmc] SUBJECT.KEYID = 7
17,274,902 UART: [afmc] AUTHORITY.KEYID = 5
20,590,162 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,885,578 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,887,830 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,902,246 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,917,066 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,931,502 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,952,844 UART: [afmc] --
22,957,013 UART: [cold-reset] --
22,961,986 UART: [state] Locking Datavault
22,965,680 UART: [state] Locking PCR0, PCR1 and PCR31
22,967,433 UART: [state] Locking ICCM
22,968,477 UART: [exit] Launching FMC @ 0x40000130
22,976,866 UART:
22,977,113 UART: Running Caliptra FMC ...
22,978,136 UART:
22,978,282 UART: [state] CFI Enabled
22,986,326 UART: [fht] FMC Alias Private Key: 7
25,316,931 UART: [art] Extend RT PCRs Done
25,318,160 UART: [art] Lock RT PCRs Done
25,319,428 UART: [art] Populate DV Done
25,324,782 UART: [fht] FMC Alias Private Key: 7
25,326,419 UART: [art] Derive CDI
25,327,151 UART: [art] Store in in slot 0x4
25,369,524 UART: [art] Derive Key Pair
25,370,566 UART: [art] Store priv key in slot 0x5
28,612,656 UART: [art] Derive Key Pair - Done
28,626,017 UART: [art] Signing Cert with AUTHO
28,627,326 UART: RITY.KEYID = 7
30,906,632 UART: [art] Erasing AUTHORITY.KEYID = 7
30,908,149 UART: [art] PUB.X = 941B16F694BFA436FC150497D7D00AFCA46C143A862858B0BF3A3CB2754DCE8CA66485AE49898313D0D047882FBDE6EC
30,915,375 UART: [art] PUB.Y = 59B0A85A37128D433F8337435F378ECE701A754317E754C7AB2459AEA1DEE673A5B5B89B0FE48768E8B6CCBD19A1BAC4
30,922,647 UART: [art] SIG.R = 35C7A3EB0727D2131E63EE03C8C0AD7FDED183893148B4809E7248502D33EA3D443D46233596C0929D39D4B47811604C
30,929,975 UART: [art] SIG.S = 4A37E119C65B4B74E95F2CDD951D75542F6BBCE7EA40945A1909F4006540A046E57FA721080D0DC8B579538088B33BF3
32,235,345 UART: mbox::rt_entry...
32,236,305 UART: ____ _ _ _ ____ _____
32,238,229 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,240,240 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,242,169 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,244,093 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,246,019 UART: |_|
32,246,853 UART:
32,361,061 UART: [rt] Runtime listening for mailbox commands...
32,363,168 >>> mbox cmd response data (48 bytes)
32,363,801 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,366,129 >>> mbox cmd response data (48 bytes)
32,366,987 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,379,560 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
4,132,250 ready_for_fw is high
4,132,641 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,352,069 >>> mbox cmd response: success
17,352,633 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,995,507 UART:
22,995,892 UART: Running Caliptra FMC ...
22,997,076 UART:
22,997,245 UART: [state] CFI Enabled
23,005,404 UART: [fht] FMC Alias Private Key: 7
25,336,528 UART: [art] Extend RT PCRs Done
25,337,751 UART: [art] Lock RT PCRs Done
25,339,297 UART: [art] Populate DV Done
25,344,769 UART: [fht] FMC Alias Private Key: 7
25,346,469 UART: [art] Derive CDI
25,347,205 UART: [art] Store in in slot 0x4
25,390,043 UART: [art] Derive Key Pair
25,391,090 UART: [art] Store priv key in slot 0x5
28,633,065 UART: [art] Derive Key Pair - Done
28,646,278 UART: [art] Signing Cert with AUTHO
28,647,579 UART: RITY.KEYID = 7
30,926,511 UART: [art] Erasing AUTHORITY.KEYID = 7
30,928,019 UART: [art] PUB.X = C1D3E62A962C836506CDDE96FDAEB5DDD55A550F3776BB011286DEAD3FC0F6B6145F57D60B060ABA78DEAD12A3D14D54
30,935,294 UART: [art] PUB.Y = 44F57C54B0A89C8AB1CD450C61D764A14EE23DFF4814FDC5ACAE935111E6BF81F8F131106245AD71EEEE437C83A6CDA9
30,942,549 UART: [art] SIG.R = 9CB3EF7D10A659E2690FD552068FB6E7673CC7F9A6FBE45FBAC22D81B6409C8AF0CE9524A8056980E346DA26ABB3FA81
30,950,004 UART: [art] SIG.S = B97A7212124F6714D4530CBCE3D1FFDDB4CF98DF0AE6FE3A59C372D34DD2BE0C5DEA75E76F9AEFA902BE3D4F2FAFE30E
32,255,263 UART: mbox::rt_entry...
32,256,201 UART: ____ _ _ _ ____ _____
32,258,184 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,260,199 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,262,130 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,264,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,265,963 UART: |_|
32,266,772 UART:
32,380,756 UART: [rt] Runtime listening for mailbox commands...
32,382,868 >>> mbox cmd response data (48 bytes)
32,383,470 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,385,729 >>> mbox cmd response data (48 bytes)
32,386,587 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,399,124 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,633 UART:
193,005 UART: Running Caliptra ROM ...
194,208 UART:
194,367 UART: [state] CFI Enabled
265,008 UART: [state] LifecycleState = Unprovisioned
266,926 UART: [state] DebugLocked = No
268,181 UART: [state] WD Timer not started. Device not locked for debugging
271,862 UART: [kat] SHA2-256
450,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,523 UART: [kat] ++
462,976 UART: [kat] sha1
475,048 UART: [kat] SHA2-256
478,123 UART: [kat] SHA2-384
483,836 UART: [kat] SHA2-512-ACC
486,842 UART: [kat] ECC-384
2,950,692 UART: [kat] HMAC-384Kdf
2,972,726 UART: [kat] LMS
3,502,205 UART: [kat] --
3,505,675 UART: [cold-reset] ++
3,506,906 UART: [fht] FHT @ 0x50003400
3,518,305 UART: [idev] ++
3,518,870 UART: [idev] CDI.KEYID = 6
3,519,750 UART: [idev] SUBJECT.KEYID = 7
3,520,991 UART: [idev] UDS.KEYID = 0
3,521,892 ready_for_fw is high
3,522,077 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,621,066 UART: [idev] Erasing UDS.KEYID = 0
6,025,540 UART: [idev] Sha1 KeyId Algorithm
6,048,864 UART: [idev] --
6,052,947 UART: [ldev] ++
6,053,525 UART: [ldev] CDI.KEYID = 6
6,054,440 UART: [ldev] SUBJECT.KEYID = 5
6,055,606 UART: [ldev] AUTHORITY.KEYID = 7
6,056,840 UART: [ldev] FE.KEYID = 1
6,100,348 UART: [ldev] Erasing FE.KEYID = 1
8,606,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,251 UART: [ldev] --
10,412,570 UART: [fwproc] Wait for Commands...
10,415,747 UART: [fwproc] Recv command 0x46574c44
10,417,838 UART: [fwproc] Recv'd Img size: 78632 bytes
13,388,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,463,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,532,331 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,724,514 >>> mbox cmd response: success
13,725,022 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,728,400 UART: [afmc] ++
13,729,002 UART: [afmc] CDI.KEYID = 6
13,729,890 UART: [afmc] SUBJECT.KEYID = 7
13,731,111 UART: [afmc] AUTHORITY.KEYID = 5
16,270,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,994,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,996,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,012,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,028,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,044,275 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,067,374 UART: [afmc] --
18,071,943 UART: [cold-reset] --
18,075,746 UART: [state] Locking Datavault
18,081,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,083,079 UART: [state] Locking ICCM
18,085,533 UART: [exit] Launching FMC @ 0x40000130
18,093,935 UART:
18,094,204 UART: Running Caliptra FMC ...
18,095,317 UART:
18,095,482 UART: [state] CFI Enabled
18,152,153 UART: [fht] FMC Alias Private Key: 7
19,915,707 UART: [art] Extend RT PCRs Done
19,916,925 UART: [art] Lock RT PCRs Done
19,918,525 UART: [art] Populate DV Done
19,923,988 UART: [fht] FMC Alias Private Key: 7
19,925,634 UART: [art] Derive CDI
19,926,371 UART: [art] Store in in slot 0x4
19,983,907 UART: [art] Derive Key Pair
19,984,959 UART: [art] Store priv key in slot 0x5
22,447,903 UART: [art] Derive Key Pair - Done
22,461,006 UART: [art] Signing Cert with AUTHO
22,462,314 UART: RITY.KEYID = 7
24,173,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,174,623 UART: [art] PUB.X = D46CB7E93824C780A8FA1782AAC859B94D31ADF95D1EED390E3C7BDBE2B18EBC5CFBB5BD5486EC9B48F20277C5AB282D
24,181,857 UART: [art] PUB.Y = 5F3D6C3EAE48AAD496E173C0EB1E2A9FD2DC07B55A3277B4E22E717515134022902C0EBE9961B460895A197DCCDF58AD
24,189,183 UART: [art] SIG.R = 7ED8B0DD9C15DF42DECC2193169A99CF6CB842086B2656AB2FCF3676F994522BE2C8FE6B8B8125299B1CAF5D06E50DE1
24,196,566 UART: [art] SIG.S = 88C3F27D09F28D92F1841264EE01A9AC3E605A926065ABD32A8D4B8539EE272CD249AE36D54D02ABC1A57A57E5097BE4
25,175,594 UART: mbox::rt_entry...
25,176,551 UART: ____ _ _ _ ____ _____
25,178,489 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,180,495 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,182,429 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,184,357 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,186,285 UART: |_|
25,187,098 UART:
25,300,116 UART: [rt] Runtime listening for mailbox commands...
25,302,284 >>> mbox cmd response data (48 bytes)
25,302,897 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,305,214 >>> mbox cmd response data (48 bytes)
25,306,074 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,318,866 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
192,494 UART:
192,865 UART: Running Caliptra ROM ...
193,964 UART:
194,106 UART: [state] CFI Enabled
265,468 UART: [state] LifecycleState = Unprovisioned
267,891 UART: [state] DebugLocked = No
269,984 UART: [state] WD Timer not started. Device not locked for debugging
273,808 UART: [kat] SHA2-256
463,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,466 UART: [kat] ++
474,914 UART: [kat] sha1
485,406 UART: [kat] SHA2-256
488,388 UART: [kat] SHA2-384
493,460 UART: [kat] SHA2-512-ACC
496,045 UART: [kat] ECC-384
2,946,171 UART: [kat] HMAC-384Kdf
2,970,491 UART: [kat] LMS
3,502,276 UART: [kat] --
3,505,703 UART: [cold-reset] ++
3,508,205 UART: [fht] FHT @ 0x50003400
3,519,324 UART: [idev] ++
3,520,063 UART: [idev] CDI.KEYID = 6
3,520,951 UART: [idev] SUBJECT.KEYID = 7
3,522,196 UART: [idev] UDS.KEYID = 0
3,523,099 ready_for_fw is high
3,523,289 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,622,292 UART: [idev] Erasing UDS.KEYID = 0
6,026,072 UART: [idev] Sha1 KeyId Algorithm
6,048,610 UART: [idev] --
6,053,040 UART: [ldev] ++
6,053,726 UART: [ldev] CDI.KEYID = 6
6,054,613 UART: [ldev] SUBJECT.KEYID = 5
6,055,822 UART: [ldev] AUTHORITY.KEYID = 7
6,056,963 UART: [ldev] FE.KEYID = 1
6,098,687 UART: [ldev] Erasing FE.KEYID = 1
8,604,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,643 UART: [ldev] --
10,412,255 UART: [fwproc] Wait for Commands...
10,414,347 UART: [fwproc] Recv command 0x46574c44
10,416,678 UART: [fwproc] Recv'd Img size: 78632 bytes
13,420,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,612,610 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,940,030 >>> mbox cmd response: success
13,940,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,943,686 UART: [afmc] ++
13,944,385 UART: [afmc] CDI.KEYID = 6
13,945,573 UART: [afmc] SUBJECT.KEYID = 7
13,947,061 UART: [afmc] AUTHORITY.KEYID = 5
16,486,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,209,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,211,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,227,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,242,213 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,257,230 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,280,414 UART: [afmc] --
18,283,416 UART: [cold-reset] --
18,287,448 UART: [state] Locking Datavault
18,292,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,295,068 UART: [state] Locking ICCM
18,296,476 UART: [exit] Launching FMC @ 0x40000130
18,305,146 UART:
18,305,380 UART: Running Caliptra FMC ...
18,306,404 UART:
18,306,549 UART: [state] CFI Enabled
18,368,541 UART: [fht] FMC Alias Private Key: 7
20,132,124 UART: [art] Extend RT PCRs Done
20,133,342 UART: [art] Lock RT PCRs Done
20,134,890 UART: [art] Populate DV Done
20,140,247 UART: [fht] FMC Alias Private Key: 7
20,141,896 UART: [art] Derive CDI
20,142,650 UART: [art] Store in in slot 0x4
20,200,752 UART: [art] Derive Key Pair
20,201,790 UART: [art] Store priv key in slot 0x5
22,664,933 UART: [art] Derive Key Pair - Done
22,677,982 UART: [art] Signing Cert with AUTHO
22,679,288 UART: RITY.KEYID = 7
24,390,524 UART: [art] Erasing AUTHORITY.KEYID = 7
24,392,011 UART: [art] PUB.X = 61698C6B5F4B89A83539D03571AB98C22BB4741E3AF5DA6EDA875CC43112E7ED844FE596DB466522233E9B5B9B8225CA
24,399,291 UART: [art] PUB.Y = 0924D0E1DEA665C1E2C6F302B8E098405AC61E038AAA7CCB6A9A6B9830FCFB74CDC8855CA235209DE2CCA22C383E5FF0
24,406,568 UART: [art] SIG.R = 1FC6BDFC91281F5BEFE6AB9AACF70FA2746A66086A388B10501D5F2B390A97ECE619BF170A74E7042318E8732E288D66
24,413,958 UART: [art] SIG.S = 7D4B32F17F8A3339723A89E517410E8F7BA88013F4D2EB55A4A25A4C476DFB3BBF5A25B9218BE1AC7FDFBC1F3A56B316
25,392,046 UART: mbox::rt_entry...
25,393,014 UART: ____ _ _ _ ____ _____
25,395,007 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,397,022 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,398,961 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,400,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,402,781 UART: |_|
25,403,581 UART:
25,516,323 UART: [rt] Runtime listening for mailbox commands...
25,518,460 >>> mbox cmd response data (48 bytes)
25,519,085 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,521,414 >>> mbox cmd response data (48 bytes)
25,522,265 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,534,863 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,436,302 ready_for_fw is high
3,436,728 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,969,047 >>> mbox cmd response: success
13,969,598 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,256,975 UART:
18,257,349 UART: Running Caliptra FMC ...
18,258,445 UART:
18,258,595 UART: [state] CFI Enabled
18,329,301 UART: [fht] FMC Alias Private Key: 7
20,093,697 UART: [art] Extend RT PCRs Done
20,094,923 UART: [art] Lock RT PCRs Done
20,096,795 UART: [art] Populate DV Done
20,102,162 UART: [fht] FMC Alias Private Key: 7
20,103,765 UART: [art] Derive CDI
20,104,507 UART: [art] Store in in slot 0x4
20,162,118 UART: [art] Derive Key Pair
20,163,161 UART: [art] Store priv key in slot 0x5
22,626,344 UART: [art] Derive Key Pair - Done
22,639,317 UART: [art] Signing Cert with AUTHO
22,640,631 UART: RITY.KEYID = 7
24,352,358 UART: [art] Erasing AUTHORITY.KEYID = 7
24,353,858 UART: [art] PUB.X = DC160A3F2AD57935280A77C63A469A66696433853F0081F4552AAC13C431D3E5A1722287A0771646E2DE1F8554821F67
24,361,045 UART: [art] PUB.Y = 7A64D3CFE632E1F2A44D30859283DBE887EF314518E68AEE5B770AEB8C8389AF27AB0893399E1126F1DCD0C478599F8A
24,368,339 UART: [art] SIG.R = 645D7D5305AC60B1635F517E38B6DCFAA346D41E10A954B45104F5030E633669B4E83AD06270A4C9203775D90EE313F2
24,375,678 UART: [art] SIG.S = 4D7E11A2789DB6968D5CBA22D34EDA6FD4400156ACB78991C6C24DF754E5357515D7E557586E9101FB3E2170007A0A15
25,354,174 UART: mbox::rt_entry...
25,355,129 UART: ____ _ _ _ ____ _____
25,357,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,359,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,360,935 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,362,889 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,364,745 UART: |_|
25,365,548 UART:
25,479,048 UART: [rt] Runtime listening for mailbox commands...
25,481,123 >>> mbox cmd response data (48 bytes)
25,481,733 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,484,047 >>> mbox cmd response data (48 bytes)
25,485,071 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,497,643 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,344 UART:
192,698 UART: Running Caliptra ROM ...
193,784 UART:
603,424 UART: [state] CFI Enabled
616,085 UART: [state] LifecycleState = Unprovisioned
618,451 UART: [state] DebugLocked = No
620,887 UART: [state] WD Timer not started. Device not locked for debugging
625,847 UART: [kat] SHA2-256
815,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,573 UART: [kat] ++
827,020 UART: [kat] sha1
838,347 UART: [kat] SHA2-256
841,332 UART: [kat] SHA2-384
847,543 UART: [kat] SHA2-512-ACC
850,125 UART: [kat] ECC-384
3,290,460 UART: [kat] HMAC-384Kdf
3,302,701 UART: [kat] LMS
3,834,527 UART: [kat] --
3,838,378 UART: [cold-reset] ++
3,840,519 UART: [fht] FHT @ 0x50003400
3,852,986 UART: [idev] ++
3,853,694 UART: [idev] CDI.KEYID = 6
3,854,577 UART: [idev] SUBJECT.KEYID = 7
3,855,820 UART: [idev] UDS.KEYID = 0
3,856,924 ready_for_fw is high
3,857,127 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,956,087 UART: [idev] Erasing UDS.KEYID = 0
6,329,268 UART: [idev] Sha1 KeyId Algorithm
6,351,894 UART: [idev] --
6,356,723 UART: [ldev] ++
6,357,408 UART: [ldev] CDI.KEYID = 6
6,358,295 UART: [ldev] SUBJECT.KEYID = 5
6,359,455 UART: [ldev] AUTHORITY.KEYID = 7
6,360,740 UART: [ldev] FE.KEYID = 1
6,373,629 UART: [ldev] Erasing FE.KEYID = 1
8,853,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,009 UART: [ldev] --
10,643,119 UART: [fwproc] Wait for Commands...
10,645,642 UART: [fwproc] Recv command 0x46574c44
10,647,891 UART: [fwproc] Recv'd Img size: 78632 bytes
13,653,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,732,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,848,180 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,177,002 >>> mbox cmd response: success
14,177,489 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,181,883 UART: [afmc] ++
14,182,574 UART: [afmc] CDI.KEYID = 6
14,183,728 UART: [afmc] SUBJECT.KEYID = 7
14,185,263 UART: [afmc] AUTHORITY.KEYID = 5
16,692,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,413,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,415,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,430,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,445,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,460,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,484,070 UART: [afmc] --
18,486,856 UART: [cold-reset] --
18,490,552 UART: [state] Locking Datavault
18,495,638 UART: [state] Locking PCR0, PCR1 and PCR31
18,497,821 UART: [state] Locking ICCM
18,499,429 UART: [exit] Launching FMC @ 0x40000130
18,508,099 UART:
18,508,375 UART: Running Caliptra FMC ...
18,509,480 UART:
18,509,635 UART: [state] CFI Enabled
18,517,677 UART: [fht] FMC Alias Private Key: 7
20,274,374 UART: [art] Extend RT PCRs Done
20,275,614 UART: [art] Lock RT PCRs Done
20,277,495 UART: [art] Populate DV Done
20,282,961 UART: [fht] FMC Alias Private Key: 7
20,284,550 UART: [art] Derive CDI
20,285,362 UART: [art] Store in in slot 0x4
20,328,114 UART: [art] Derive Key Pair
20,329,112 UART: [art] Store priv key in slot 0x5
22,755,785 UART: [art] Derive Key Pair - Done
22,768,838 UART: [art] Signing Cert with AUTHO
22,770,139 UART: RITY.KEYID = 7
24,475,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,079 UART: [art] PUB.X = B8187A5FCE6D42048902028600BD1093F8B74ADF497527AA6E6077A5F9196C2CE6467106558566EBD187387D205B3573
24,484,329 UART: [art] PUB.Y = C8ECFCCD0CEBB35FE15AD8B036C17B7DECB447A4B797A22893E2D125D08C2C9CA710B24BA42D5A767A3918A88A3109DE
24,491,570 UART: [art] SIG.R = 50D889AB7348F6CC811088D4BBFDACBB04B05895543B904C12EC85EE728BCDCF7991EE245793BA7EDF60422D5E5106D5
24,498,964 UART: [art] SIG.S = 123E3A17BE6886A98F12E69ACAB8E2B9C2888567E4BA05506D692D2CE4B535DC4DBD090830466DA4212EDB3160369678
25,477,469 UART: mbox::rt_entry...
25,478,436 UART: ____ _ _ _ ____ _____
25,480,388 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,482,421 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,484,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,486,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,488,141 UART: |_|
25,488,949 UART:
25,602,672 UART: [rt] Runtime listening for mailbox commands...
25,604,783 >>> mbox cmd response data (48 bytes)
25,605,461 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,607,817 >>> mbox cmd response data (48 bytes)
25,608,671 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,621,267 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,757,704 ready_for_fw is high
3,758,137 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,181,080 >>> mbox cmd response: success
14,181,829 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,432,681 UART:
18,433,087 UART: Running Caliptra FMC ...
18,434,196 UART:
18,434,345 UART: [state] CFI Enabled
18,442,399 UART: [fht] FMC Alias Private Key: 7
20,199,142 UART: [art] Extend RT PCRs Done
20,200,370 UART: [art] Lock RT PCRs Done
20,202,076 UART: [art] Populate DV Done
20,207,636 UART: [fht] FMC Alias Private Key: 7
20,209,176 UART: [art] Derive CDI
20,209,908 UART: [art] Store in in slot 0x4
20,252,877 UART: [art] Derive Key Pair
20,253,875 UART: [art] Store priv key in slot 0x5
22,680,245 UART: [art] Derive Key Pair - Done
22,693,296 UART: [art] Signing Cert with AUTHO
22,694,600 UART: RITY.KEYID = 7
24,400,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,401,748 UART: [art] PUB.X = 024738024E7A8AD1630550D1D8795FE69E9EFB43730EBBC4A97175BE7D7683C227D49E070D2616129AFFACFEB4AF1083
24,409,051 UART: [art] PUB.Y = CE74AEE9723517E9270DF238417A4E6D5853B2FC9ADEB7EFAAC6198F09135054536EBD2ADE61CA94689122F951232D84
24,416,283 UART: [art] SIG.R = 292F31FEAB6C3294EDD821AB66929E60E3B54204856B7B0FAE46F55BB940CF1B2C19AF819F22C09DBA4755819A8199FC
24,423,710 UART: [art] SIG.S = E3D0C30C6E04E1547D8392EEAF1CB38E22C471D74DC9BFEF83750CDCDC149903E84DA509E792FF776F76718C02029605
25,402,047 UART: mbox::rt_entry...
25,403,002 UART: ____ _ _ _ ____ _____
25,404,996 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,407,017 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,408,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,410,921 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,412,773 UART: |_|
25,413,572 UART:
25,527,561 UART: [rt] Runtime listening for mailbox commands...
25,529,672 >>> mbox cmd response data (48 bytes)
25,530,269 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,532,627 >>> mbox cmd response data (48 bytes)
25,533,476 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,546,224 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,543 UART: [kat] SHA2-256
892,481 UART: [kat] SHA2-384
895,322 UART: [kat] SHA2-512-ACC
897,223 UART: [kat] ECC-384
902,638 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 ready_for_fw is high
1,480,867 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,852 UART: [idev] Erasing UDS.KEYID = 0
1,505,302 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,118 UART: [idev] --
1,515,269 UART: [ldev] ++
1,515,437 UART: [ldev] CDI.KEYID = 6
1,515,800 UART: [ldev] SUBJECT.KEYID = 5
1,516,226 UART: [ldev] AUTHORITY.KEYID = 7
1,516,689 UART: [ldev] FE.KEYID = 1
1,522,061 UART: [ldev] Erasing FE.KEYID = 1
1,547,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,216 UART: [ldev] --
1,586,695 UART: [fwproc] Waiting for Commands...
1,587,510 UART: [fwproc] Received command 0x46574c44
1,588,301 UART: [fwproc] Received Image of size 78632 bytes
2,477,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,360 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,712 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,615,945 >>> mbox cmd response: success
2,615,945 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,617,027 UART: [afmc] ++
2,617,195 UART: [afmc] CDI.KEYID = 6
2,617,557 UART: [afmc] SUBJECT.KEYID = 7
2,617,982 UART: [afmc] AUTHORITY.KEYID = 5
2,653,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,979 UART: [afmc] --
2,696,985 UART: [cold-reset] --
2,698,059 UART: [state] Locking Datavault
2,699,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,910 UART: [state] Locking ICCM
2,700,528 UART: [exit] Launching FMC @ 0x40000130
2,705,857 UART:
2,705,873 UART: Running Caliptra FMC ...
2,706,281 UART:
2,706,335 UART: [state] CFI Enabled
2,716,550 UART: [fht] FMC Alias Private Key: 7
2,824,143 UART: [art] Extend RT PCRs Done
2,824,571 UART: [art] Lock RT PCRs Done
2,826,361 UART: [art] Populate DV Done
2,834,582 UART: [fht] FMC Alias Private Key: 7
2,835,566 UART: [art] Derive CDI
2,835,846 UART: [art] Store in in slot 0x4
2,921,287 UART: [art] Derive Key Pair
2,921,647 UART: [art] Store priv key in slot 0x5
2,934,847 UART: [art] Derive Key Pair - Done
2,949,448 UART: [art] Signing Cert with AUTHO
2,949,928 UART: RITY.KEYID = 7
2,965,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,783 UART: [art] PUB.X = 0B092F16B50DA309B39774EB7AC740206B65CFA38FCAE1F12B1F662B10467B9A2150E3FE75CBD0F9E289FFB502D315DC
2,972,552 UART: [art] PUB.Y = DFFDC40950DD0FAEEF3943FF5B4C5F24C2E1985DB549837626453CE2E5FF010CB3401AA68715EE7A1A56A09A651EAA9C
2,979,508 UART: [art] SIG.R = 7A4D6E4408B02F44B77604EE922C09305C9F45A137BEFAA8595053BD2907D2C4E9B2100FC4749D89E29556C7D4C5B7B5
2,986,265 UART: [art] SIG.S = F67DAB366325389C4062BA7C91FF47ADAB9518703CED44AB78C907F4FE7F682BD8B0784CCBAAC1411E4C54DDE72D7225
3,009,619 UART: mbox::rt_entry...
3,009,991 UART: ____ _ _ _ ____ _____
3,010,775 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,575 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,343 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,111 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,879 UART: |_|
3,014,191 UART:
3,121,149 UART: [rt] Runtime listening for mailbox commands...
3,122,320 >>> mbox cmd response data (48 bytes)
3,122,321 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,125,104 >>> mbox cmd response data (48 bytes)
3,125,105 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,138,042 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,089 ready_for_fw is high
1,363,089 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,466,690 >>> mbox cmd response: success
2,466,690 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,528,322 UART:
2,528,338 UART: Running Caliptra FMC ...
2,528,746 UART:
2,528,800 UART: [state] CFI Enabled
2,539,357 UART: [fht] FMC Alias Private Key: 7
2,647,700 UART: [art] Extend RT PCRs Done
2,648,128 UART: [art] Lock RT PCRs Done
2,649,604 UART: [art] Populate DV Done
2,657,761 UART: [fht] FMC Alias Private Key: 7
2,658,845 UART: [art] Derive CDI
2,659,125 UART: [art] Store in in slot 0x4
2,745,014 UART: [art] Derive Key Pair
2,745,374 UART: [art] Store priv key in slot 0x5
2,758,740 UART: [art] Derive Key Pair - Done
2,773,522 UART: [art] Signing Cert with AUTHO
2,774,002 UART: RITY.KEYID = 7
2,789,166 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,931 UART: [art] PUB.X = 6D3F5322E04AC1C78396267538CFEE6C7249A00800AE5CA8B9ED4E0B6A90295DE57B3581EA18DCD508709840D2491081
2,796,670 UART: [art] PUB.Y = 3AFD48DB5620E21683547FCF9E39A63CF3F56136B79A30EF0F5CB79E29863A7058874D2B53ACC81DAC5F3E9B17B17F41
2,803,627 UART: [art] SIG.R = 00EC281DF3B24F63F150455CACEC91EE3E88B4754A11F51296CF01B3183E04FC6E787F17E676B9BF04FB58E88D269873
2,810,372 UART: [art] SIG.S = 4CCE8B4C6EE06C7CBBF38A6F1057B62D6599A6DD9BD944C39774EF1A75D7C2AF10DB05377863E4E325E94DAF1ED55455
2,834,346 UART: mbox::rt_entry...
2,834,718 UART: ____ _ _ _ ____ _____
2,835,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,070 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,606 UART: |_|
2,838,918 UART:
2,946,772 UART: [rt] Runtime listening for mailbox commands...
2,947,943 >>> mbox cmd response data (48 bytes)
2,947,944 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,950,727 >>> mbox cmd response data (48 bytes)
2,950,728 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,963,665 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,995 UART: [state] LifecycleState = Unprovisioned
86,650 UART: [state] DebugLocked = No
87,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,750 UART: [kat] SHA2-256
882,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,796 UART: [kat] ++
886,948 UART: [kat] sha1
891,252 UART: [kat] SHA2-256
893,190 UART: [kat] SHA2-384
896,123 UART: [kat] SHA2-512-ACC
898,024 UART: [kat] ECC-384
903,683 UART: [kat] HMAC-384Kdf
908,413 UART: [kat] LMS
1,476,609 UART: [kat] --
1,477,444 UART: [cold-reset] ++
1,477,826 UART: [fht] Storing FHT @ 0x50003400
1,480,413 UART: [idev] ++
1,480,581 UART: [idev] CDI.KEYID = 6
1,480,941 UART: [idev] SUBJECT.KEYID = 7
1,481,365 UART: [idev] UDS.KEYID = 0
1,481,710 ready_for_fw is high
1,481,710 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,085 UART: [idev] --
1,516,102 UART: [ldev] ++
1,516,270 UART: [ldev] CDI.KEYID = 6
1,516,633 UART: [ldev] SUBJECT.KEYID = 5
1,517,059 UART: [ldev] AUTHORITY.KEYID = 7
1,517,522 UART: [ldev] FE.KEYID = 1
1,522,880 UART: [ldev] Erasing FE.KEYID = 1
1,548,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,479 UART: [ldev] --
1,587,912 UART: [fwproc] Waiting for Commands...
1,588,623 UART: [fwproc] Received command 0x46574c44
1,589,414 UART: [fwproc] Received Image of size 78632 bytes
2,478,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,617,202 >>> mbox cmd response: success
2,617,202 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,618,228 UART: [afmc] ++
2,618,396 UART: [afmc] CDI.KEYID = 6
2,618,758 UART: [afmc] SUBJECT.KEYID = 7
2,619,183 UART: [afmc] AUTHORITY.KEYID = 5
2,654,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,963 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,653 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,680 UART: [afmc] --
2,697,688 UART: [cold-reset] --
2,698,610 UART: [state] Locking Datavault
2,699,857 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,461 UART: [state] Locking ICCM
2,701,135 UART: [exit] Launching FMC @ 0x40000130
2,706,464 UART:
2,706,480 UART: Running Caliptra FMC ...
2,706,888 UART:
2,707,031 UART: [state] CFI Enabled
2,717,438 UART: [fht] FMC Alias Private Key: 7
2,825,165 UART: [art] Extend RT PCRs Done
2,825,593 UART: [art] Lock RT PCRs Done
2,827,185 UART: [art] Populate DV Done
2,835,452 UART: [fht] FMC Alias Private Key: 7
2,836,402 UART: [art] Derive CDI
2,836,682 UART: [art] Store in in slot 0x4
2,922,031 UART: [art] Derive Key Pair
2,922,391 UART: [art] Store priv key in slot 0x5
2,935,299 UART: [art] Derive Key Pair - Done
2,950,317 UART: [art] Signing Cert with AUTHO
2,950,797 UART: RITY.KEYID = 7
2,965,777 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,542 UART: [art] PUB.X = 44441AA63CBDA098C7E4B7F64D907934885F982EEEACCDBC227AC84475CEA9BEB7B9C9174AA9A45ADC1FE72E314FBE21
2,973,336 UART: [art] PUB.Y = 526DCBEACD676DE63BE3FEFFE7F07ED82C748FDA5A24552F0DF8B562CF1A3192E8FF9EBA40B7302CB53FA00DA5EBB97F
2,980,314 UART: [art] SIG.R = 830146C714D559F183E1B06B338BAABB2BBFFF2F4076ECF47369B8DD95918845508F245C6C69B25CB77601EA30617109
2,987,075 UART: [art] SIG.S = E778B985B279A1B470BB1B3499D4243864BD360286690F574CD357C0EEAFEAA5A9291620728BECF9325AAE7667114123
3,010,378 UART: mbox::rt_entry...
3,010,750 UART: ____ _ _ _ ____ _____
3,011,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,638 UART: |_|
3,014,950 UART:
3,120,655 UART: [rt] Runtime listening for mailbox commands...
3,121,826 >>> mbox cmd response data (48 bytes)
3,121,827 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,124,610 >>> mbox cmd response data (48 bytes)
3,124,611 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,137,548 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 ready_for_fw is high
1,362,932 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,466,590 >>> mbox cmd response: success
2,466,590 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,528,218 UART:
2,528,234 UART: Running Caliptra FMC ...
2,528,642 UART:
2,528,785 UART: [state] CFI Enabled
2,539,242 UART: [fht] FMC Alias Private Key: 7
2,646,849 UART: [art] Extend RT PCRs Done
2,647,277 UART: [art] Lock RT PCRs Done
2,648,797 UART: [art] Populate DV Done
2,657,014 UART: [fht] FMC Alias Private Key: 7
2,657,994 UART: [art] Derive CDI
2,658,274 UART: [art] Store in in slot 0x4
2,743,855 UART: [art] Derive Key Pair
2,744,215 UART: [art] Store priv key in slot 0x5
2,757,727 UART: [art] Derive Key Pair - Done
2,772,208 UART: [art] Signing Cert with AUTHO
2,772,688 UART: RITY.KEYID = 7
2,788,042 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,807 UART: [art] PUB.X = 9C71C92ABE1E485F4241F6B5A69BD6960BFDF04423759E805B47901C5BB40F20EB98F89119EC6FA6C3F7B77914790926
2,795,570 UART: [art] PUB.Y = DC6DFB8A4BCACA9CE0231789DBAFE51CDB44142C9348C3514429A72D2B2CD8EDAC2F61349D065367B9EDE372FBAA177D
2,802,541 UART: [art] SIG.R = E9D7A59BA50D44B0F75FC5326459F1907FB1780AB4F241F2A0B6F445F81C9BB0A6EABC2C8E216A400AAAB576F742ED42
2,809,318 UART: [art] SIG.S = 933C54066262232D8E626D2DCF2A65B58E65A9EC1E06F21F4FBEBD3455EB7D335846CBFE08F37469651851510D89A45D
2,833,097 UART: mbox::rt_entry...
2,833,469 UART: ____ _ _ _ ____ _____
2,834,253 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,821 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,589 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,357 UART: |_|
2,837,669 UART:
2,944,062 UART: [rt] Runtime listening for mailbox commands...
2,945,233 >>> mbox cmd response data (48 bytes)
2,945,234 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,948,017 >>> mbox cmd response data (48 bytes)
2,948,018 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,960,955 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
893,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,141 UART: [kat] ++
897,293 UART: [kat] sha1
901,371 UART: [kat] SHA2-256
903,311 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
917,790 UART: [kat] HMAC-384Kdf
922,226 UART: [kat] LMS
1,170,554 UART: [kat] --
1,171,633 UART: [cold-reset] ++
1,171,991 UART: [fht] FHT @ 0x50003400
1,174,794 UART: [idev] ++
1,174,962 UART: [idev] CDI.KEYID = 6
1,175,322 UART: [idev] SUBJECT.KEYID = 7
1,175,746 UART: [idev] UDS.KEYID = 0
1,176,091 ready_for_fw is high
1,176,091 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,183,668 UART: [idev] Erasing UDS.KEYID = 0
1,200,311 UART: [idev] Sha1 KeyId Algorithm
1,208,757 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,254 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,428 UART: [fwproc] Recv command 0x46574c44
1,283,156 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,465 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,826 >>> mbox cmd response: success
2,310,826 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,311,932 UART: [afmc] ++
2,312,100 UART: [afmc] CDI.KEYID = 6
2,312,462 UART: [afmc] SUBJECT.KEYID = 7
2,312,887 UART: [afmc] AUTHORITY.KEYID = 5
2,347,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,497 UART: [afmc] --
2,391,575 UART: [cold-reset] --
2,392,337 UART: [state] Locking Datavault
2,393,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,800 UART: [state] Locking ICCM
2,394,390 UART: [exit] Launching FMC @ 0x40000130
2,399,719 UART:
2,399,735 UART: Running Caliptra FMC ...
2,400,143 UART:
2,400,197 UART: [state] CFI Enabled
2,410,952 UART: [fht] FMC Alias Private Key: 7
2,519,009 UART: [art] Extend RT PCRs Done
2,519,437 UART: [art] Lock RT PCRs Done
2,520,837 UART: [art] Populate DV Done
2,529,354 UART: [fht] FMC Alias Private Key: 7
2,530,284 UART: [art] Derive CDI
2,530,564 UART: [art] Store in in slot 0x4
2,616,525 UART: [art] Derive Key Pair
2,616,885 UART: [art] Store priv key in slot 0x5
2,629,761 UART: [art] Derive Key Pair - Done
2,644,580 UART: [art] Signing Cert with AUTHO
2,645,060 UART: RITY.KEYID = 7
2,660,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,081 UART: [art] PUB.X = 8D53E861A1CB4E4E4BC43D64DBBFCB753917C68509C3F345A2EEC0591F933CAD0936AA0B0CB3DF865913195DEB8717CF
2,667,855 UART: [art] PUB.Y = 117CEDC7AEA973D2A1D0C8E14B3AF9F143124D6B00DD14A450541906D9EEEB0790C9FB934B44907213C02CE333558C76
2,674,783 UART: [art] SIG.R = 11CFC642664B24B5979B66F1C5E26661E5F9B6F2292DAAFCDA0CBBA87FA77C99FF1F548CA10C8A8DCBA4E13BE9C705A2
2,681,568 UART: [art] SIG.S = 6CC735354C7AABD62B793AD0B03426229C1FCDB58ACB0E8599C0161625B8C2A9B65706A99F7C276000072DC8BD8AE82B
2,705,540 UART: mbox::rt_entry...
2,705,912 UART: ____ _ _ _ ____ _____
2,706,696 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,496 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,264 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,032 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,800 UART: |_|
2,710,112 UART:
2,816,178 UART: [rt] Runtime listening for mailbox commands...
2,817,349 >>> mbox cmd response data (48 bytes)
2,817,350 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,820,133 >>> mbox cmd response data (48 bytes)
2,820,134 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,833,071 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,773 ready_for_fw is high
1,060,773 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,164,677 >>> mbox cmd response: success
2,164,677 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,523 UART:
2,227,539 UART: Running Caliptra FMC ...
2,227,947 UART:
2,228,001 UART: [state] CFI Enabled
2,238,442 UART: [fht] FMC Alias Private Key: 7
2,346,791 UART: [art] Extend RT PCRs Done
2,347,219 UART: [art] Lock RT PCRs Done
2,348,767 UART: [art] Populate DV Done
2,357,118 UART: [fht] FMC Alias Private Key: 7
2,358,142 UART: [art] Derive CDI
2,358,422 UART: [art] Store in in slot 0x4
2,443,901 UART: [art] Derive Key Pair
2,444,261 UART: [art] Store priv key in slot 0x5
2,457,329 UART: [art] Derive Key Pair - Done
2,471,729 UART: [art] Signing Cert with AUTHO
2,472,209 UART: RITY.KEYID = 7
2,487,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,000 UART: [art] PUB.X = 8C42DB2BBCE6B806AA2AD8802A2CE5EC5B1B77A98DB3D597C837EACDBB6A432BBB959CAC86C4E5E2B64E40DEF8DF9E1C
2,494,803 UART: [art] PUB.Y = 3BBE9D2F4356EC63372A43C98123412E9FC57802143537B75AE2647E76575FDFE2424932C564D6047ECF1A9D6108DBBA
2,501,744 UART: [art] SIG.R = E535C6D72EB9AF5B8E821FC8874842E1EE3A1FFED10A13A3B4292FCCCB8852F55B88D06CC747AFFF19FBEEB1F533977E
2,508,535 UART: [art] SIG.S = A4F1566D6CF22A24AD22A220342476B0FF763A03006CD1E34AC80A0B77D9A6B470105E0515ED9C3E8AAE285D2519F0BD
2,532,340 UART: mbox::rt_entry...
2,532,712 UART: ____ _ _ _ ____ _____
2,533,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,296 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,064 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,832 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,600 UART: |_|
2,536,912 UART:
2,643,615 UART: [rt] Runtime listening for mailbox commands...
2,644,786 >>> mbox cmd response data (48 bytes)
2,644,787 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,647,570 >>> mbox cmd response data (48 bytes)
2,647,571 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,660,508 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,833 UART: [state] LifecycleState = Unprovisioned
85,488 UART: [state] DebugLocked = No
86,082 UART: [state] WD Timer not started. Device not locked for debugging
87,223 UART: [kat] SHA2-256
892,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,998 UART: [kat] ++
897,150 UART: [kat] sha1
901,248 UART: [kat] SHA2-256
903,188 UART: [kat] SHA2-384
905,891 UART: [kat] SHA2-512-ACC
907,792 UART: [kat] ECC-384
917,511 UART: [kat] HMAC-384Kdf
922,001 UART: [kat] LMS
1,170,329 UART: [kat] --
1,171,438 UART: [cold-reset] ++
1,171,960 UART: [fht] FHT @ 0x50003400
1,174,679 UART: [idev] ++
1,174,847 UART: [idev] CDI.KEYID = 6
1,175,207 UART: [idev] SUBJECT.KEYID = 7
1,175,631 UART: [idev] UDS.KEYID = 0
1,175,976 ready_for_fw is high
1,175,976 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,183,989 UART: [idev] Erasing UDS.KEYID = 0
1,201,242 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,718 UART: [ldev] ++
1,210,886 UART: [ldev] CDI.KEYID = 6
1,211,249 UART: [ldev] SUBJECT.KEYID = 5
1,211,675 UART: [ldev] AUTHORITY.KEYID = 7
1,212,138 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,244,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,218 UART: [ldev] --
1,283,677 UART: [fwproc] Wait for Commands...
1,284,347 UART: [fwproc] Recv command 0x46574c44
1,285,075 UART: [fwproc] Recv'd Img size: 78632 bytes
2,173,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,558 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,311,739 >>> mbox cmd response: success
2,311,739 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,312,977 UART: [afmc] ++
2,313,145 UART: [afmc] CDI.KEYID = 6
2,313,507 UART: [afmc] SUBJECT.KEYID = 7
2,313,932 UART: [afmc] AUTHORITY.KEYID = 5
2,349,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,647 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,366 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,414 UART: [afmc] --
2,393,518 UART: [cold-reset] --
2,394,400 UART: [state] Locking Datavault
2,395,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,313 UART: [state] Locking ICCM
2,396,807 UART: [exit] Launching FMC @ 0x40000130
2,402,136 UART:
2,402,152 UART: Running Caliptra FMC ...
2,402,560 UART:
2,402,703 UART: [state] CFI Enabled
2,413,382 UART: [fht] FMC Alias Private Key: 7
2,521,411 UART: [art] Extend RT PCRs Done
2,521,839 UART: [art] Lock RT PCRs Done
2,523,447 UART: [art] Populate DV Done
2,531,830 UART: [fht] FMC Alias Private Key: 7
2,532,768 UART: [art] Derive CDI
2,533,048 UART: [art] Store in in slot 0x4
2,618,609 UART: [art] Derive Key Pair
2,618,969 UART: [art] Store priv key in slot 0x5
2,632,751 UART: [art] Derive Key Pair - Done
2,647,295 UART: [art] Signing Cert with AUTHO
2,647,775 UART: RITY.KEYID = 7
2,663,225 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,990 UART: [art] PUB.X = 0AC152DBAD49933579F29DA79ECBF85605ED27D20D93ACF6262A8AE2DC27FD886B9DC65E6DC404B571B960ECC4EE2B29
2,670,768 UART: [art] PUB.Y = 3301E4B017B9CC4A828B2FE42C578E1F3BDCC0CC08862FDD493EDEABDA2C093313653B52DC5FA87212A50750D216B69B
2,677,720 UART: [art] SIG.R = 00C3CECA0B51C63590260DCA2A2D4ED548966575EF990D5916D5F946A95B8CC6D98CB39674EF7B15DD32FFE57A8F9084
2,684,469 UART: [art] SIG.S = DC61FAE7E137A79B631BA7F30FAB9FD78604B75FE013AB855A349872101004D1C199264A9F85D4BF4B864524A589AF05
2,708,088 UART: mbox::rt_entry...
2,708,460 UART: ____ _ _ _ ____ _____
2,709,244 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,044 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,348 UART: |_|
2,712,660 UART:
2,819,471 UART: [rt] Runtime listening for mailbox commands...
2,820,642 >>> mbox cmd response data (48 bytes)
2,820,643 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,823,426 >>> mbox cmd response data (48 bytes)
2,823,427 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,836,364 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 ready_for_fw is high
1,060,342 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,164,170 >>> mbox cmd response: success
2,164,170 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,226,818 UART:
2,226,834 UART: Running Caliptra FMC ...
2,227,242 UART:
2,227,385 UART: [state] CFI Enabled
2,237,824 UART: [fht] FMC Alias Private Key: 7
2,346,391 UART: [art] Extend RT PCRs Done
2,346,819 UART: [art] Lock RT PCRs Done
2,348,339 UART: [art] Populate DV Done
2,356,474 UART: [fht] FMC Alias Private Key: 7
2,357,580 UART: [art] Derive CDI
2,357,860 UART: [art] Store in in slot 0x4
2,443,357 UART: [art] Derive Key Pair
2,443,717 UART: [art] Store priv key in slot 0x5
2,457,397 UART: [art] Derive Key Pair - Done
2,472,141 UART: [art] Signing Cert with AUTHO
2,472,621 UART: RITY.KEYID = 7
2,487,943 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,708 UART: [art] PUB.X = 18A422C8D3E2613F59A17BB72F799A48E2692A8BB5A8F4C42D83256C584AD0C2794F594F478A2CD340DA3D40EB8CAC90
2,495,486 UART: [art] PUB.Y = EC057F93EA239DC863C47BE0FB0CF09193B24F4FF4760583EFAA341F6746556789E3FBA7AF2DDA14F729E14D2F80F8BE
2,502,443 UART: [art] SIG.R = D30AE285DB08707DEA5B35B5F12E2D21092F9066800D407BBBBC356AFAA0911316A5943DD037AECBC0CAB06261568129
2,509,209 UART: [art] SIG.S = 20A4AF6284B7E0CA018BDC282927D0042FDFC14724314122C79F77B58F6BCC0FA80C4E7F441CB82D6CC2EED57B76051A
2,533,527 UART: mbox::rt_entry...
2,533,899 UART: ____ _ _ _ ____ _____
2,534,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,251 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,019 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,787 UART: |_|
2,538,099 UART:
2,643,773 UART: [rt] Runtime listening for mailbox commands...
2,644,944 >>> mbox cmd response data (48 bytes)
2,644,945 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,647,728 >>> mbox cmd response data (48 bytes)
2,647,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,660,666 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 ready_for_fw is high
1,174,363 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,485 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,860 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,843 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 78632 bytes
2,170,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,424 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,309,606 >>> mbox cmd response: success
2,309,606 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,310,633 UART: [afmc] ++
2,310,801 UART: [afmc] CDI.KEYID = 6
2,311,164 UART: [afmc] SUBJECT.KEYID = 7
2,311,590 UART: [afmc] AUTHORITY.KEYID = 5
2,347,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,846 UART: [afmc] --
2,390,732 UART: [cold-reset] --
2,391,560 UART: [state] Locking Datavault
2,392,801 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,405 UART: [state] Locking ICCM
2,393,869 UART: [exit] Launching FMC @ 0x40000130
2,399,198 UART:
2,399,214 UART: Running Caliptra FMC ...
2,399,622 UART:
2,399,676 UART: [state] CFI Enabled
2,409,919 UART: [fht] FMC Alias Private Key: 7
2,517,826 UART: [art] Extend RT PCRs Done
2,518,254 UART: [art] Lock RT PCRs Done
2,519,776 UART: [art] Populate DV Done
2,528,147 UART: [fht] FMC Alias Private Key: 7
2,529,163 UART: [art] Derive CDI
2,529,443 UART: [art] Store in in slot 0x4
2,615,222 UART: [art] Derive Key Pair
2,615,582 UART: [art] Store priv key in slot 0x5
2,628,796 UART: [art] Derive Key Pair - Done
2,643,723 UART: [art] Signing Cert with AUTHO
2,644,203 UART: RITY.KEYID = 7
2,659,177 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,942 UART: [art] PUB.X = CFACA9B5D76EAC9DA5EB7A0F88FD3147FACA8CDB22B67D8D9BF477A0715C08FD45794D4297D14F83CE9E2C968BE12430
2,666,730 UART: [art] PUB.Y = A60505FDB933A5C5717E29D8C014FA53EB183DA833B81DB7118E7D663690D2B57E555C1B4D237A1CF22160399F17E458
2,673,674 UART: [art] SIG.R = 065C8FAF6B2E7B817AD802F0FA1BCE85A59EE7F2B6917C5C4481B0C67A6E8CD84B6A7B85EDF0DCD983270D40EC15B252
2,680,455 UART: [art] SIG.S = 8741A3BD8603A8E7E44068E37CDD63CF2DF54DA402C208ACB287D0FDE658F824C31AD8CE96BCF508A8138E30B6558151
2,704,650 UART: mbox::rt_entry...
2,705,022 UART: ____ _ _ _ ____ _____
2,705,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,910 UART: |_|
2,709,222 UART:
2,815,814 UART: [rt] Runtime listening for mailbox commands...
2,816,985 >>> mbox cmd response data (48 bytes)
2,816,986 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,819,769 >>> mbox cmd response data (48 bytes)
2,819,770 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,832,707 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,494 ready_for_fw is high
1,056,494 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,161,418 >>> mbox cmd response: success
2,161,418 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,340 UART:
2,223,356 UART: Running Caliptra FMC ...
2,223,764 UART:
2,223,818 UART: [state] CFI Enabled
2,234,123 UART: [fht] FMC Alias Private Key: 7
2,341,842 UART: [art] Extend RT PCRs Done
2,342,270 UART: [art] Lock RT PCRs Done
2,343,740 UART: [art] Populate DV Done
2,351,787 UART: [fht] FMC Alias Private Key: 7
2,352,785 UART: [art] Derive CDI
2,353,065 UART: [art] Store in in slot 0x4
2,438,498 UART: [art] Derive Key Pair
2,438,858 UART: [art] Store priv key in slot 0x5
2,452,460 UART: [art] Derive Key Pair - Done
2,467,049 UART: [art] Signing Cert with AUTHO
2,467,529 UART: RITY.KEYID = 7
2,482,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,688 UART: [art] PUB.X = DC7CC7C45AE6E513B2F2929F4A438243220C1C862457D714F97E54E34BD3CE6BA0EBD196734DC34524EE48FBA470675E
2,490,463 UART: [art] PUB.Y = 75F483737AB91C2C799E1DE1B8765D7834BBCE72D2E71A8E7320DE4B2832428E675CF42A9E10BBB04479DAB9730778CC
2,497,416 UART: [art] SIG.R = 9EB343ACD3B658B7A4FE9E08C94DE80F18FB9E6D29E45E7D0DF75AFDB1864D0134DFBFE029AD5DE6FEE96454F47E9468
2,504,198 UART: [art] SIG.S = B2B7BC303330C3BC0EDA09A1CCED559AED5130DF91C2A6B5DCBEB36CCB158E7CEB1E7C4C4025EC1EBE02F82A587BF411
2,528,664 UART: mbox::rt_entry...
2,529,036 UART: ____ _ _ _ ____ _____
2,529,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,156 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,924 UART: |_|
2,533,236 UART:
2,639,581 UART: [rt] Runtime listening for mailbox commands...
2,640,752 >>> mbox cmd response data (48 bytes)
2,640,753 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,643,536 >>> mbox cmd response data (48 bytes)
2,643,537 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,656,474 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,400 UART: [kat] SHA2-256
902,340 UART: [kat] SHA2-384
905,237 UART: [kat] SHA2-512-ACC
907,138 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,272 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 ready_for_fw is high
1,174,686 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,770 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,524 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,906 >>> mbox cmd response: success
2,310,906 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,312,165 UART: [afmc] ++
2,312,333 UART: [afmc] CDI.KEYID = 6
2,312,696 UART: [afmc] SUBJECT.KEYID = 7
2,313,122 UART: [afmc] AUTHORITY.KEYID = 5
2,349,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,270 UART: [afmc] --
2,392,188 UART: [cold-reset] --
2,393,116 UART: [state] Locking Datavault
2,394,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,945 UART: [state] Locking ICCM
2,395,559 UART: [exit] Launching FMC @ 0x40000130
2,400,888 UART:
2,400,904 UART: Running Caliptra FMC ...
2,401,312 UART:
2,401,455 UART: [state] CFI Enabled
2,412,238 UART: [fht] FMC Alias Private Key: 7
2,520,419 UART: [art] Extend RT PCRs Done
2,520,847 UART: [art] Lock RT PCRs Done
2,522,401 UART: [art] Populate DV Done
2,530,624 UART: [fht] FMC Alias Private Key: 7
2,531,770 UART: [art] Derive CDI
2,532,050 UART: [art] Store in in slot 0x4
2,617,633 UART: [art] Derive Key Pair
2,617,993 UART: [art] Store priv key in slot 0x5
2,630,879 UART: [art] Derive Key Pair - Done
2,645,437 UART: [art] Signing Cert with AUTHO
2,645,917 UART: RITY.KEYID = 7
2,661,429 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,194 UART: [art] PUB.X = 35374D8BF79714175249B34B35886FBBB54F287539BE72D3603D3D98CD592B69C205B3C4A9D3EE6E520CED3BF0C7B244
2,668,962 UART: [art] PUB.Y = 8FC3BBF158667267ABE614AF287AF22B2DE938EF8F18D655775ACC8F4AC61C9E2B3D9161A937C4A8F4E5788A75A85B9E
2,675,926 UART: [art] SIG.R = 990250182C6DF11E0DB02BD7B583E7264CB75144A5C3326DFA9A539F6554B713A469C3D5E096AFCD1A20B968258A4B9D
2,682,694 UART: [art] SIG.S = DED4E266671CED97879A1F9E8CFA599AF34BD8234E39144B2FAFCC6439151E3820416B10CDFDADEA275AE547AADFAB74
2,706,395 UART: mbox::rt_entry...
2,706,767 UART: ____ _ _ _ ____ _____
2,707,551 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,351 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,119 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,887 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,655 UART: |_|
2,710,967 UART:
2,817,262 UART: [rt] Runtime listening for mailbox commands...
2,818,433 >>> mbox cmd response data (48 bytes)
2,818,434 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,821,217 >>> mbox cmd response data (48 bytes)
2,821,218 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,834,155 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,255 ready_for_fw is high
1,055,255 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,160,469 >>> mbox cmd response: success
2,160,469 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,627 UART:
2,223,643 UART: Running Caliptra FMC ...
2,224,051 UART:
2,224,194 UART: [state] CFI Enabled
2,234,833 UART: [fht] FMC Alias Private Key: 7
2,343,122 UART: [art] Extend RT PCRs Done
2,343,550 UART: [art] Lock RT PCRs Done
2,345,156 UART: [art] Populate DV Done
2,353,303 UART: [fht] FMC Alias Private Key: 7
2,354,431 UART: [art] Derive CDI
2,354,711 UART: [art] Store in in slot 0x4
2,440,684 UART: [art] Derive Key Pair
2,441,044 UART: [art] Store priv key in slot 0x5
2,454,770 UART: [art] Derive Key Pair - Done
2,469,789 UART: [art] Signing Cert with AUTHO
2,470,269 UART: RITY.KEYID = 7
2,485,413 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,178 UART: [art] PUB.X = E79DD062A8BC153A3367C5878A4F5145AD14DDC163325F9599FE7D4169180533D964D3125A0DDD3F02567B6B30A0B661
2,492,937 UART: [art] PUB.Y = FA6EB226E722F443745EA0732508E6A58073D6372C358BC1087A6ED2583291E5BCCAAF6F8044DB6486E94F92A55CB729
2,499,883 UART: [art] SIG.R = 8AF0A68B3C43700C49CBB313B1F9DE692F48C0FF6A045F4F120C921668DE9DA5E86A9CEE6C1EDB6D1F08F1FFB973FF8F
2,506,665 UART: [art] SIG.S = 5A6972F6B1AC863E9CE1039206A948E38CB4FC033387148734A5CE75B848056D36AFA0F48FBB55A1CBF969C75EF03397
2,530,084 UART: mbox::rt_entry...
2,530,456 UART: ____ _ _ _ ____ _____
2,531,240 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,808 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,576 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,344 UART: |_|
2,534,656 UART:
2,641,714 UART: [rt] Runtime listening for mailbox commands...
2,642,885 >>> mbox cmd response data (48 bytes)
2,642,886 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,645,669 >>> mbox cmd response data (48 bytes)
2,645,670 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,658,607 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,420 UART:
192,797 UART: Running Caliptra ROM ...
193,981 UART:
194,134 UART: [state] CFI Enabled
263,846 UART: [state] LifecycleState = Unprovisioned
265,773 UART: [state] DebugLocked = No
267,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,967 UART: [kat] SHA2-256
441,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,150 UART: [kat] ++
452,629 UART: [kat] sha1
463,278 UART: [kat] SHA2-256
465,990 UART: [kat] SHA2-384
470,693 UART: [kat] SHA2-512-ACC
473,052 UART: [kat] ECC-384
2,766,979 UART: [kat] HMAC-384Kdf
2,798,907 UART: [kat] LMS
3,989,223 UART: [kat] --
3,992,789 UART: [cold-reset] ++
3,994,862 UART: [fht] Storing FHT @ 0x50003400
4,006,475 UART: [idev] ++
4,007,036 UART: [idev] CDI.KEYID = 6
4,007,946 UART: [idev] SUBJECT.KEYID = 7
4,009,205 UART: [idev] UDS.KEYID = 0
4,010,253 ready_for_fw is high
4,010,453 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,157 UART: [idev] Erasing UDS.KEYID = 0
7,347,074 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,279 UART: [idev] --
7,371,838 UART: [ldev] ++
7,372,457 UART: [ldev] CDI.KEYID = 6
7,373,416 UART: [ldev] SUBJECT.KEYID = 5
7,374,620 UART: [ldev] AUTHORITY.KEYID = 7
7,375,840 UART: [ldev] FE.KEYID = 1
7,421,699 UART: [ldev] Erasing FE.KEYID = 1
10,752,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,669 UART: [ldev] --
13,114,959 UART: [fwproc] Waiting for Commands...
13,117,100 UART: [fwproc] Received command 0x46574c44
13,119,327 UART: [fwproc] Received Image of size 114036 bytes
17,165,322 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,628,506 >>> mbox cmd response: success
17,632,085 UART: [afmc] ++
17,632,679 UART: [afmc] CDI.KEYID = 6
17,633,557 UART: [afmc] SUBJECT.KEYID = 7
17,634,822 UART: [afmc] AUTHORITY.KEYID = 5
21,004,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,137 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,395 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,840 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,603 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,045 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,139 UART: [afmc] --
23,374,217 UART: [cold-reset] --
23,379,637 UART: [state] Locking Datavault
23,384,392 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,082 UART: [state] Locking ICCM
23,388,078 UART: [exit] Launching FMC @ 0x40000130
23,396,467 UART:
23,396,709 UART: Running Caliptra FMC ...
23,397,804 UART:
23,397,951 UART: [state] CFI Enabled
23,464,679 UART: [fht] FMC Alias Private Key: 7
25,802,499 UART: [art] Extend RT PCRs Done
25,803,734 UART: [art] Lock RT PCRs Done
25,805,293 UART: [art] Populate DV Done
25,810,866 UART: [fht] FMC Alias Private Key: 7
25,812,560 UART: [art] Derive CDI
25,813,370 UART: [art] Store in in slot 0x4
25,873,204 UART: [art] Derive Key Pair
25,874,228 UART: [art] Store priv key in slot 0x5
29,167,142 UART: [art] Derive Key Pair - Done
29,180,044 UART: [art] Signing Cert with AUTHO
29,181,345 UART: RITY.KEYID = 7
31,469,672 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,189 UART: [art] PUB.X = 57E2AE11337FAD7ACBD16B0DB407E4DD4E882E55551912C34534FA9644D523B0577E1F7EFF2286015997FA7EE79857E3
31,478,399 UART: [art] PUB.Y = F01166104B4450C67E3F241B6B0ADD74B7C4C123F32CF14C176C12CAB47F2266DF50E2D24A0628B3A63FBA5C23751058
31,485,661 UART: [art] SIG.R = 493A5A122B2BB004CB7661CBB6E00B257FC8ABCD8370CC518F4ABB9F67FC95665F3C5F04ADF4AF944A68E2CC3B8B795A
31,493,016 UART: [art] SIG.S = 1FC858AF46BD0100B192048ACE08A92BFC60E9E929ADCF09DDD9872A5B3A56315E10CB9A2C8EBDE4EBAFC3DFB64DC7E9
32,798,328 UART: Caliptra RT
32,799,031 UART: [state] CFI Enabled
32,960,271 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,608 writing to cptra_bootfsm_go
3,787,320 ready_for_fw is high
3,787,698 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,868,578 >>> mbox cmd response: success
23,564,036 UART:
23,564,420 UART: Running Caliptra FMC ...
23,565,554 UART:
23,565,706 UART: [state] CFI Enabled
23,616,711 UART: [fht] FMC Alias Private Key: 7
25,954,529 UART: [art] Extend RT PCRs Done
25,955,753 UART: [art] Lock RT PCRs Done
25,957,372 UART: [art] Populate DV Done
25,962,840 UART: [fht] FMC Alias Private Key: 7
25,964,329 UART: [art] Derive CDI
25,965,062 UART: [art] Store in in slot 0x4
26,025,560 UART: [art] Derive Key Pair
26,026,600 UART: [art] Store priv key in slot 0x5
29,319,666 UART: [art] Derive Key Pair - Done
29,332,450 UART: [art] Signing Cert with AUTHO
29,333,741 UART: RITY.KEYID = 7
31,621,628 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,143 UART: [art] PUB.X = 07CA1257CEA779907E2C28F41075469E80DAEB62F60490B61FB35DEBC3EF3DBA12A5C0DDF1E3BAF3F43338365D59CB2A
31,630,424 UART: [art] PUB.Y = 3F869236063EA9F714A22DF46BB6F0E710191589E77C8DBB82A8D3BB1288ED51B68E3DE7BDCD9D8CE28736787B821740
31,637,667 UART: [art] SIG.R = 8181C8AC39BE2867FA266F5E8EF7360C4723BF821FF2F12CF3CD6A698CE485DDCC57275ACBB0B758BD11BDE4A346862F
31,645,026 UART: [art] SIG.S = 2107C592226F91E028346F051096CFED6946905055C1F983C626DB5005FC66469D7FBB44643DFFA19140246582CA46D1
32,949,823 UART: Caliptra RT
32,950,542 UART: [state] CFI Enabled
33,112,852 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,472 UART:
192,830 UART: Running Caliptra ROM ...
194,026 UART:
603,610 UART: [state] CFI Enabled
618,430 UART: [state] LifecycleState = Unprovisioned
620,335 UART: [state] DebugLocked = No
623,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,948 UART: [kat] SHA2-256
797,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,212 UART: [kat] ++
808,739 UART: [kat] sha1
819,784 UART: [kat] SHA2-256
822,501 UART: [kat] SHA2-384
828,343 UART: [kat] SHA2-512-ACC
830,714 UART: [kat] ECC-384
3,116,828 UART: [kat] HMAC-384Kdf
3,128,165 UART: [kat] LMS
4,318,297 UART: [kat] --
4,322,253 UART: [cold-reset] ++
4,323,335 UART: [fht] Storing FHT @ 0x50003400
4,335,877 UART: [idev] ++
4,336,448 UART: [idev] CDI.KEYID = 6
4,337,444 UART: [idev] SUBJECT.KEYID = 7
4,338,556 UART: [idev] UDS.KEYID = 0
4,339,586 ready_for_fw is high
4,339,808 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,506 UART: [idev] Erasing UDS.KEYID = 0
7,624,084 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,335 UART: [idev] --
7,649,959 UART: [ldev] ++
7,650,565 UART: [ldev] CDI.KEYID = 6
7,651,452 UART: [ldev] SUBJECT.KEYID = 5
7,652,718 UART: [ldev] AUTHORITY.KEYID = 7
7,653,945 UART: [ldev] FE.KEYID = 1
7,666,533 UART: [ldev] Erasing FE.KEYID = 1
10,954,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,645 UART: [ldev] --
13,317,097 UART: [fwproc] Waiting for Commands...
13,320,111 UART: [fwproc] Received command 0x46574c44
13,322,340 UART: [fwproc] Received Image of size 114036 bytes
17,375,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,835,232 >>> mbox cmd response: success
17,839,751 UART: [afmc] ++
17,840,353 UART: [afmc] CDI.KEYID = 6
17,841,266 UART: [afmc] SUBJECT.KEYID = 7
17,842,484 UART: [afmc] AUTHORITY.KEYID = 5
21,157,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,904 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,182 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,570 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,393 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,850 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,290 UART: [afmc] --
23,522,722 UART: [cold-reset] --
23,526,851 UART: [state] Locking Datavault
23,534,096 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,849 UART: [state] Locking ICCM
23,537,836 UART: [exit] Launching FMC @ 0x40000130
23,546,233 UART:
23,546,479 UART: Running Caliptra FMC ...
23,547,582 UART:
23,547,740 UART: [state] CFI Enabled
23,555,705 UART: [fht] FMC Alias Private Key: 7
25,885,708 UART: [art] Extend RT PCRs Done
25,886,927 UART: [art] Lock RT PCRs Done
25,888,474 UART: [art] Populate DV Done
25,893,765 UART: [fht] FMC Alias Private Key: 7
25,895,305 UART: [art] Derive CDI
25,896,035 UART: [art] Store in in slot 0x4
25,938,083 UART: [art] Derive Key Pair
25,939,086 UART: [art] Store priv key in slot 0x5
29,181,013 UART: [art] Derive Key Pair - Done
29,193,955 UART: [art] Signing Cert with AUTHO
29,195,256 UART: RITY.KEYID = 7
31,474,767 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,265 UART: [art] PUB.X = 9FA44B85CDDD9DBC6A3E7C7FF43236CF5E3789EF7D7B98021630311B1223890EC3E94F6FA162C3C2921D5BC5BA36E106
31,483,549 UART: [art] PUB.Y = 68BE419F733355843CB0FA380BAF569D7F2E960C28A665B499A65F0DAE78D7441F13C8581F5EFE7CAC04815BB093FD9E
31,490,798 UART: [art] SIG.R = 7DAE5465CCE88A248EF53CB81E437D7FBC6F4ABE876520924DEC392337E352EBFF7C4F4D21BC32F5285DA5D7A20F77F0
31,498,178 UART: [art] SIG.S = 09731E6EC347795881A607010064AEF349CBE710DFDD24A782087EFECEFBD1855E6F1AEDADF4FE58EA37DF865DB92EB3
32,803,420 UART: Caliptra RT
32,804,136 UART: [state] CFI Enabled
32,922,603 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,131,636 ready_for_fw is high
4,132,082 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,082,835 >>> mbox cmd response: success
23,727,029 UART:
23,727,425 UART: Running Caliptra FMC ...
23,728,543 UART:
23,728,697 UART: [state] CFI Enabled
23,736,921 UART: [fht] FMC Alias Private Key: 7
26,067,693 UART: [art] Extend RT PCRs Done
26,068,918 UART: [art] Lock RT PCRs Done
26,070,632 UART: [art] Populate DV Done
26,076,114 UART: [fht] FMC Alias Private Key: 7
26,077,714 UART: [art] Derive CDI
26,078,478 UART: [art] Store in in slot 0x4
26,120,869 UART: [art] Derive Key Pair
26,121,917 UART: [art] Store priv key in slot 0x5
29,363,956 UART: [art] Derive Key Pair - Done
29,376,738 UART: [art] Signing Cert with AUTHO
29,378,239 UART: RITY.KEYID = 7
31,657,468 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,972 UART: [art] PUB.X = 3BB36E05073034887E31B31752BF191C5DD6316E589DCC6274DB9CCBF38E39DB6901930AE2B6AC5055201CF7B0320965
31,666,246 UART: [art] PUB.Y = 2650F473BDC2A6219716A3E2749DEFCA91ED068453F89ACB0D0AC3EC81F9A074A6FFF5B2B34034F34DBD87B4C320F54D
31,673,498 UART: [art] SIG.R = B48E8403E9C581DEA1321C1F3B8BD4733E010C543F0B1A39D1B431DA86CC5D4798FB729F957F70EC091E54013EB6A352
31,680,870 UART: [art] SIG.S = E30B2CD2395BCDEC45B492250812A2F8E3DC88ECE9CB395C852B56E670B23123AD9FFF4CAD4FF6CD2577562D264EBCD9
32,986,403 UART: Caliptra RT
32,987,116 UART: [state] CFI Enabled
33,104,615 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,553 UART:
192,911 UART: Running Caliptra ROM ...
194,009 UART:
194,161 UART: [state] CFI Enabled
264,198 UART: [state] LifecycleState = Unprovisioned
266,107 UART: [state] DebugLocked = No
267,575 UART: [state] WD Timer not started. Device not locked for debugging
270,752 UART: [kat] SHA2-256
449,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,541 UART: [kat] ++
462,018 UART: [kat] sha1
472,545 UART: [kat] SHA2-256
475,570 UART: [kat] SHA2-384
481,647 UART: [kat] SHA2-512-ACC
484,590 UART: [kat] ECC-384
2,948,748 UART: [kat] HMAC-384Kdf
2,970,362 UART: [kat] LMS
3,499,797 UART: [kat] --
3,504,305 UART: [cold-reset] ++
3,505,984 UART: [fht] FHT @ 0x50003400
3,515,838 UART: [idev] ++
3,516,407 UART: [idev] CDI.KEYID = 6
3,517,461 UART: [idev] SUBJECT.KEYID = 7
3,518,569 UART: [idev] UDS.KEYID = 0
3,519,512 ready_for_fw is high
3,519,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,053 UART: [idev] Erasing UDS.KEYID = 0
6,024,382 UART: [idev] Sha1 KeyId Algorithm
6,047,801 UART: [idev] --
6,050,470 UART: [ldev] ++
6,051,049 UART: [ldev] CDI.KEYID = 6
6,051,983 UART: [ldev] SUBJECT.KEYID = 5
6,053,088 UART: [ldev] AUTHORITY.KEYID = 7
6,054,399 UART: [ldev] FE.KEYID = 1
6,101,973 UART: [ldev] Erasing FE.KEYID = 1
8,606,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,888 UART: [ldev] --
10,418,257 UART: [fwproc] Wait for Commands...
10,421,113 UART: [fwproc] Recv command 0x46574c44
10,423,203 UART: [fwproc] Recv'd Img size: 114360 bytes
13,831,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,978,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,296,388 >>> mbox cmd response: success
14,299,857 UART: [afmc] ++
14,300,461 UART: [afmc] CDI.KEYID = 6
14,301,625 UART: [afmc] SUBJECT.KEYID = 7
14,302,666 UART: [afmc] AUTHORITY.KEYID = 5
16,828,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,890 UART: [afmc] --
18,631,303 UART: [cold-reset] --
18,634,033 UART: [state] Locking Datavault
18,640,418 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,068 UART: [state] Locking ICCM
18,643,390 UART: [exit] Launching FMC @ 0x40000130
18,651,784 UART:
18,652,019 UART: Running Caliptra FMC ...
18,653,045 UART:
18,653,193 UART: [state] CFI Enabled
18,712,995 UART: [fht] FMC Alias Private Key: 7
20,477,072 UART: [art] Extend RT PCRs Done
20,478,313 UART: [art] Lock RT PCRs Done
20,480,342 UART: [art] Populate DV Done
20,485,589 UART: [fht] FMC Alias Private Key: 7
20,487,071 UART: [art] Derive CDI
20,487,810 UART: [art] Store in in slot 0x4
20,545,005 UART: [art] Derive Key Pair
20,546,048 UART: [art] Store priv key in slot 0x5
23,008,595 UART: [art] Derive Key Pair - Done
23,021,849 UART: [art] Signing Cert with AUTHO
23,023,184 UART: RITY.KEYID = 7
24,734,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,763 UART: [art] PUB.X = C1DB0C579230046792CBBB6820739C4E53099FD8B540566E3B53FF1040845203EF85620A2C1CDC744CE5F9F46B92DC90
24,743,033 UART: [art] PUB.Y = C050EC418A7DEBA8B14D4014CF11F34C98DAB23752F98A3D754151028DFD9943389F6C30EF5AE8BCB556333A3BE20AB5
24,750,348 UART: [art] SIG.R = 005F96F086944F3D3DAF3EE3454AFFDE24346D32F042852C77766D2A1CA18C522568E256A8A8CBA5D9B4360772588D0A
24,757,659 UART: [art] SIG.S = 5707311F124809095F4D9D0CEF012B35C303D636818964A42960D2EDFBAAF3D8B447880F351A6EFC55D9D94406CE2795
25,736,281 UART: Caliptra RT
25,737,002 UART: [state] CFI Enabled
25,900,826 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
192,485 UART:
192,861 UART: Running Caliptra ROM ...
193,996 UART:
194,141 UART: [state] CFI Enabled
266,030 UART: [state] LifecycleState = Unprovisioned
268,460 UART: [state] DebugLocked = No
271,082 UART: [state] WD Timer not started. Device not locked for debugging
276,053 UART: [kat] SHA2-256
465,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,743 UART: [kat] ++
477,219 UART: [kat] sha1
488,875 UART: [kat] SHA2-256
491,901 UART: [kat] SHA2-384
496,836 UART: [kat] SHA2-512-ACC
499,422 UART: [kat] ECC-384
2,948,384 UART: [kat] HMAC-384Kdf
2,972,427 UART: [kat] LMS
3,504,228 UART: [kat] --
3,508,863 UART: [cold-reset] ++
3,510,296 UART: [fht] FHT @ 0x50003400
3,521,225 UART: [idev] ++
3,521,897 UART: [idev] CDI.KEYID = 6
3,522,872 UART: [idev] SUBJECT.KEYID = 7
3,524,050 UART: [idev] UDS.KEYID = 0
3,524,958 ready_for_fw is high
3,525,151 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,843 UART: [idev] Erasing UDS.KEYID = 0
6,029,005 UART: [idev] Sha1 KeyId Algorithm
6,051,314 UART: [idev] --
6,056,661 UART: [ldev] ++
6,057,397 UART: [ldev] CDI.KEYID = 6
6,058,281 UART: [ldev] SUBJECT.KEYID = 5
6,059,387 UART: [ldev] AUTHORITY.KEYID = 7
6,060,673 UART: [ldev] FE.KEYID = 1
6,100,621 UART: [ldev] Erasing FE.KEYID = 1
8,609,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,221 UART: [ldev] --
10,413,198 UART: [fwproc] Wait for Commands...
10,416,003 UART: [fwproc] Recv command 0x46574c44
10,418,323 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,598,340 >>> mbox cmd response: success
14,602,684 UART: [afmc] ++
14,603,389 UART: [afmc] CDI.KEYID = 6
14,604,555 UART: [afmc] SUBJECT.KEYID = 7
14,606,043 UART: [afmc] AUTHORITY.KEYID = 5
17,153,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,785 UART: [afmc] --
18,966,552 UART: [cold-reset] --
18,970,547 UART: [state] Locking Datavault
18,977,211 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,364 UART: [state] Locking ICCM
18,980,933 UART: [exit] Launching FMC @ 0x40000130
18,989,621 UART:
18,989,865 UART: Running Caliptra FMC ...
18,990,964 UART:
18,991,123 UART: [state] CFI Enabled
19,051,157 UART: [fht] FMC Alias Private Key: 7
20,815,135 UART: [art] Extend RT PCRs Done
20,816,378 UART: [art] Lock RT PCRs Done
20,817,975 UART: [art] Populate DV Done
20,823,329 UART: [fht] FMC Alias Private Key: 7
20,824,915 UART: [art] Derive CDI
20,825,653 UART: [art] Store in in slot 0x4
20,883,610 UART: [art] Derive Key Pair
20,884,645 UART: [art] Store priv key in slot 0x5
23,347,873 UART: [art] Derive Key Pair - Done
23,360,751 UART: [art] Signing Cert with AUTHO
23,362,081 UART: RITY.KEYID = 7
25,073,839 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,347 UART: [art] PUB.X = 34D5C4316D51465B045B23D977A9B6806538816D2EE8F46D79FA649626711E25A27ED99EB500195930DB26AC18F319CD
25,082,575 UART: [art] PUB.Y = 533A273F523A9FC848C12F1DC5B24603CDBAC8F7531339A64A59366E4EA1D2CB1143B6CC1278867463CA0F0414ABF2C3
25,089,840 UART: [art] SIG.R = 5AFC6A4F10D313D9C7EC808AD3F27889ACB99DBAD161B59F66541CBAD8DC17084E4C6CDDD7EEAAF6A982E69A5C8AAE51
25,097,267 UART: [art] SIG.S = 5DA7DC47140D1A8C484A8C27CEB9A54CF97DE43E26AF11A46FD62A8AE9D06E617417312184C4337392923B17B75C5FC1
26,076,316 UART: Caliptra RT
26,077,053 UART: [state] CFI Enabled
26,242,449 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,439,589 ready_for_fw is high
3,440,204 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,723,356 >>> mbox cmd response: success
19,038,409 UART:
19,038,803 UART: Running Caliptra FMC ...
19,039,949 UART:
19,040,114 UART: [state] CFI Enabled
19,109,944 UART: [fht] FMC Alias Private Key: 7
20,874,185 UART: [art] Extend RT PCRs Done
20,875,408 UART: [art] Lock RT PCRs Done
20,877,200 UART: [art] Populate DV Done
20,882,577 UART: [fht] FMC Alias Private Key: 7
20,884,287 UART: [art] Derive CDI
20,885,106 UART: [art] Store in in slot 0x4
20,942,695 UART: [art] Derive Key Pair
20,943,734 UART: [art] Store priv key in slot 0x5
23,406,777 UART: [art] Derive Key Pair - Done
23,419,884 UART: [art] Signing Cert with AUTHO
23,421,185 UART: RITY.KEYID = 7
25,132,601 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,101 UART: [art] PUB.X = 17256E115A6EBFAA03AAC865AC25E8A36A18FDBAEA0D573AD02C3C158B8615FE3CE6811F01019906854032E94394E408
25,141,384 UART: [art] PUB.Y = C0E8AF9D98032808134E601739E1F242D631DE48B20EA3D0BC39330EE4BDD9FD95E5A56411ACB1C885B94D1C78E21F0F
25,148,656 UART: [art] SIG.R = 1B76D6F916D471D76B662F775BCD0CBF6E71AC843AD7DFA56A03D67591145B1C9314C2D821ECDDA0598805DEAA5DB1F0
25,156,077 UART: [art] SIG.S = 63B1F95B5228DA3C42732A924530CB984DA5B109518C4D947E396F72AA3B886C17606E5B9D652650AADBBF3BBA973210
26,134,846 UART: Caliptra RT
26,135,558 UART: [state] CFI Enabled
26,300,906 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,446 UART:
192,801 UART: Running Caliptra ROM ...
194,244 UART:
603,600 UART: [state] CFI Enabled
619,813 UART: [state] LifecycleState = Unprovisioned
622,176 UART: [state] DebugLocked = No
623,780 UART: [state] WD Timer not started. Device not locked for debugging
627,596 UART: [kat] SHA2-256
817,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,295 UART: [kat] ++
828,740 UART: [kat] sha1
840,908 UART: [kat] SHA2-256
843,954 UART: [kat] SHA2-384
849,381 UART: [kat] SHA2-512-ACC
851,990 UART: [kat] ECC-384
3,295,784 UART: [kat] HMAC-384Kdf
3,307,593 UART: [kat] LMS
3,839,398 UART: [kat] --
3,843,886 UART: [cold-reset] ++
3,845,739 UART: [fht] FHT @ 0x50003400
3,857,068 UART: [idev] ++
3,857,702 UART: [idev] CDI.KEYID = 6
3,858,732 UART: [idev] SUBJECT.KEYID = 7
3,859,905 UART: [idev] UDS.KEYID = 0
3,860,824 ready_for_fw is high
3,861,005 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,621 UART: [idev] Erasing UDS.KEYID = 0
6,335,106 UART: [idev] Sha1 KeyId Algorithm
6,358,440 UART: [idev] --
6,363,214 UART: [ldev] ++
6,363,921 UART: [ldev] CDI.KEYID = 6
6,364,830 UART: [ldev] SUBJECT.KEYID = 5
6,365,987 UART: [ldev] AUTHORITY.KEYID = 7
6,367,215 UART: [ldev] FE.KEYID = 1
6,379,694 UART: [ldev] Erasing FE.KEYID = 1
8,858,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,423 UART: [ldev] --
10,651,788 UART: [fwproc] Wait for Commands...
10,654,468 UART: [fwproc] Recv command 0x46574c44
10,656,768 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,878 >>> mbox cmd response: success
14,839,132 UART: [afmc] ++
14,839,836 UART: [afmc] CDI.KEYID = 6
14,840,989 UART: [afmc] SUBJECT.KEYID = 7
14,842,523 UART: [afmc] AUTHORITY.KEYID = 5
17,345,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,735 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,147 UART: [afmc] --
19,139,687 UART: [cold-reset] --
19,143,544 UART: [state] Locking Datavault
19,149,592 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,795 UART: [state] Locking ICCM
19,154,154 UART: [exit] Launching FMC @ 0x40000130
19,162,792 UART:
19,163,029 UART: Running Caliptra FMC ...
19,164,053 UART:
19,164,201 UART: [state] CFI Enabled
19,172,193 UART: [fht] FMC Alias Private Key: 7
20,929,416 UART: [art] Extend RT PCRs Done
20,930,633 UART: [art] Lock RT PCRs Done
20,932,389 UART: [art] Populate DV Done
20,938,069 UART: [fht] FMC Alias Private Key: 7
20,939,723 UART: [art] Derive CDI
20,940,536 UART: [art] Store in in slot 0x4
20,983,015 UART: [art] Derive Key Pair
20,984,014 UART: [art] Store priv key in slot 0x5
23,410,721 UART: [art] Derive Key Pair - Done
23,423,517 UART: [art] Signing Cert with AUTHO
23,424,818 UART: RITY.KEYID = 7
25,130,287 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,799 UART: [art] PUB.X = C4379BB06436629D5E25C159664E92F022078BB2EE853E3772F205D710EA4C8159B59704F15A1EA0CB2EB504863B489C
25,139,054 UART: [art] PUB.Y = 5058CD06DFF7C0B57425B16FE2982E5FF0C18F349E012CD2B35686493EC6D4E45F76F505B50908926E7E87459ED207E7
25,146,287 UART: [art] SIG.R = 9453701EC963AAAFA706F53296746691DF131F6777184C314D06E6262338A4540E3731A4F83DDE4A3C9D36A777AA7662
25,153,674 UART: [art] SIG.S = 960E02144CB8EE9E0EF71D3E15B4C9B6600A18A8CA7DB9E6CE19CC0E1DA28854147EB13455792C7EA98F68322FD33375
26,132,864 UART: Caliptra RT
26,133,552 UART: [state] CFI Enabled
26,250,444 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,763,265 ready_for_fw is high
3,763,747 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,310 >>> mbox cmd response: success
19,213,538 UART:
19,213,949 UART: Running Caliptra FMC ...
19,215,057 UART:
19,215,211 UART: [state] CFI Enabled
19,223,125 UART: [fht] FMC Alias Private Key: 7
20,980,248 UART: [art] Extend RT PCRs Done
20,981,476 UART: [art] Lock RT PCRs Done
20,983,070 UART: [art] Populate DV Done
20,988,532 UART: [fht] FMC Alias Private Key: 7
20,990,248 UART: [art] Derive CDI
20,990,990 UART: [art] Store in in slot 0x4
21,033,476 UART: [art] Derive Key Pair
21,034,477 UART: [art] Store priv key in slot 0x5
23,461,255 UART: [art] Derive Key Pair - Done
23,474,630 UART: [art] Signing Cert with AUTHO
23,475,929 UART: RITY.KEYID = 7
25,181,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,166 UART: [art] PUB.X = B367281D8F02C73313D6A0ACE9BA9A8C94845BE43901587B2C36069F9E04F0295A827EAA3414E32DB23134D4691DD597
25,190,377 UART: [art] PUB.Y = 5D34D1655698EB0C3AFF0C4E9803B2ED064D4922031858AAA7B803B806831A4A90AB98FF8680137BA9B8CC2694F508D4
25,197,654 UART: [art] SIG.R = C2E02CD955DA231ECC9EDAB426674DE7B45688C7EDBD7ACD2BEBE259EA4B9D24657DD13D047EF103EE4FCB389FE02063
25,205,050 UART: [art] SIG.S = 14F0CA5D08073B8FCC4676AC974FD0086DF546E392C7E61D6179D5F47EDB2D6CBCD04D4BC688D9684345B75508685C36
26,184,239 UART: Caliptra RT
26,184,948 UART: [state] CFI Enabled
26,302,387 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,483 UART: [kat] SHA2-256
881,414 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,529 UART: [kat] ++
885,681 UART: [kat] sha1
889,783 UART: [kat] SHA2-256
891,721 UART: [kat] SHA2-384
894,440 UART: [kat] SHA2-512-ACC
896,341 UART: [kat] ECC-384
901,802 UART: [kat] HMAC-384Kdf
906,584 UART: [kat] LMS
1,474,780 UART: [kat] --
1,475,537 UART: [cold-reset] ++
1,476,099 UART: [fht] Storing FHT @ 0x50003400
1,478,732 UART: [idev] ++
1,478,900 UART: [idev] CDI.KEYID = 6
1,479,260 UART: [idev] SUBJECT.KEYID = 7
1,479,684 UART: [idev] UDS.KEYID = 0
1,480,029 ready_for_fw is high
1,480,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,002 UART: [idev] Erasing UDS.KEYID = 0
1,504,542 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,136 UART: [idev] --
1,513,947 UART: [ldev] ++
1,514,115 UART: [ldev] CDI.KEYID = 6
1,514,478 UART: [ldev] SUBJECT.KEYID = 5
1,514,904 UART: [ldev] AUTHORITY.KEYID = 7
1,515,367 UART: [ldev] FE.KEYID = 1
1,520,689 UART: [ldev] Erasing FE.KEYID = 1
1,545,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,844 UART: [ldev] --
1,585,257 UART: [fwproc] Waiting for Commands...
1,585,932 UART: [fwproc] Received command 0x46574c44
1,586,723 UART: [fwproc] Received Image of size 114360 bytes
2,884,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,309 >>> mbox cmd response: success
3,078,383 UART: [afmc] ++
3,078,551 UART: [afmc] CDI.KEYID = 6
3,078,913 UART: [afmc] SUBJECT.KEYID = 7
3,079,338 UART: [afmc] AUTHORITY.KEYID = 5
3,114,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,203 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,088 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,778 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,649 UART: [afmc] --
3,157,655 UART: [cold-reset] --
3,158,441 UART: [state] Locking Datavault
3,159,694 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,298 UART: [state] Locking ICCM
3,160,886 UART: [exit] Launching FMC @ 0x40000130
3,166,215 UART:
3,166,231 UART: Running Caliptra FMC ...
3,166,639 UART:
3,166,693 UART: [state] CFI Enabled
3,177,122 UART: [fht] FMC Alias Private Key: 7
3,285,125 UART: [art] Extend RT PCRs Done
3,285,553 UART: [art] Lock RT PCRs Done
3,287,307 UART: [art] Populate DV Done
3,295,332 UART: [fht] FMC Alias Private Key: 7
3,296,460 UART: [art] Derive CDI
3,296,740 UART: [art] Store in in slot 0x4
3,382,427 UART: [art] Derive Key Pair
3,382,787 UART: [art] Store priv key in slot 0x5
3,396,373 UART: [art] Derive Key Pair - Done
3,411,205 UART: [art] Signing Cert with AUTHO
3,411,685 UART: RITY.KEYID = 7
3,426,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,432 UART: [art] PUB.X = 79A7E1AD71FCEAAFB72B90D0CE36753AAC24B810CC6E9FC681FC9286DF018E1A7A7203076B676E8C1C4B507EEA069FFB
3,434,212 UART: [art] PUB.Y = CA24346D215771A6D00F6457017F552D60CFC7FFE0044F9B3A00C13E2F923B9CF396D3A09FBAA6E353C6F060591839AE
3,441,137 UART: [art] SIG.R = C7495877B8BCDD2A5E906D3F672174C091DB20850D295BF0BEEF568D1417027A5E3F9CD65CD8F0BD3FFE812F7531D7CE
3,447,915 UART: [art] SIG.S = 5168EE4F103F5163E61C8459D01FBFD41BA19AE861E16BDA16D92F24AB481775C67F67BEC01963900D5B7D3F0D0F042F
3,472,012 UART: Caliptra RT
3,472,266 UART: [state] CFI Enabled
3,580,946 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,497 ready_for_fw is high
1,362,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,367 >>> mbox cmd response: success
2,987,695 UART:
2,987,711 UART: Running Caliptra FMC ...
2,988,119 UART:
2,988,173 UART: [state] CFI Enabled
2,998,846 UART: [fht] FMC Alias Private Key: 7
3,106,517 UART: [art] Extend RT PCRs Done
3,106,945 UART: [art] Lock RT PCRs Done
3,108,337 UART: [art] Populate DV Done
3,116,612 UART: [fht] FMC Alias Private Key: 7
3,117,584 UART: [art] Derive CDI
3,117,864 UART: [art] Store in in slot 0x4
3,203,595 UART: [art] Derive Key Pair
3,203,955 UART: [art] Store priv key in slot 0x5
3,217,839 UART: [art] Derive Key Pair - Done
3,232,320 UART: [art] Signing Cert with AUTHO
3,232,800 UART: RITY.KEYID = 7
3,248,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,787 UART: [art] PUB.X = E4C86A6D791528BED486010964C17E6C0DDE6FF615FE79BF6B9577F78F7828E93035767A826190866CFB238C9912E456
3,255,544 UART: [art] PUB.Y = 6BBE854B3DF801F1414FAA842D9C2C0473E07D4A8F2383E78E01165FABA103E1E93130F6B2493A2490FC4CDC28338287
3,262,486 UART: [art] SIG.R = EFAADF57508CB21B737131D33EF281AE342FB382229E7099E89040469B4347FC207124794BE6330F32C847A0A7DE931B
3,269,251 UART: [art] SIG.S = 6ECA553970847ECF57D1A6E43E6A1D68332185987DEF39B19ED38ADCA0F6E95EC5CF7CC1DDBF4A16AF89263C21FC2068
3,292,782 UART: Caliptra RT
3,293,036 UART: [state] CFI Enabled
3,401,122 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
902,971 UART: [kat] HMAC-384Kdf
907,379 UART: [kat] LMS
1,475,575 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,133 UART: [idev] Erasing UDS.KEYID = 0
1,505,399 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,165 UART: [idev] --
1,515,250 UART: [ldev] ++
1,515,418 UART: [ldev] CDI.KEYID = 6
1,515,781 UART: [ldev] SUBJECT.KEYID = 5
1,516,207 UART: [ldev] AUTHORITY.KEYID = 7
1,516,670 UART: [ldev] FE.KEYID = 1
1,522,118 UART: [ldev] Erasing FE.KEYID = 1
1,547,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,957 UART: [ldev] --
1,586,276 UART: [fwproc] Waiting for Commands...
1,587,011 UART: [fwproc] Received command 0x46574c44
1,587,802 UART: [fwproc] Received Image of size 114360 bytes
2,885,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,734 >>> mbox cmd response: success
3,078,836 UART: [afmc] ++
3,079,004 UART: [afmc] CDI.KEYID = 6
3,079,366 UART: [afmc] SUBJECT.KEYID = 7
3,079,791 UART: [afmc] AUTHORITY.KEYID = 5
3,115,158 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,691 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,381 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,318 UART: [afmc] --
3,158,386 UART: [cold-reset] --
3,159,166 UART: [state] Locking Datavault
3,160,377 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,981 UART: [state] Locking ICCM
3,161,417 UART: [exit] Launching FMC @ 0x40000130
3,166,746 UART:
3,166,762 UART: Running Caliptra FMC ...
3,167,170 UART:
3,167,313 UART: [state] CFI Enabled
3,178,262 UART: [fht] FMC Alias Private Key: 7
3,285,511 UART: [art] Extend RT PCRs Done
3,285,939 UART: [art] Lock RT PCRs Done
3,287,007 UART: [art] Populate DV Done
3,295,294 UART: [fht] FMC Alias Private Key: 7
3,296,238 UART: [art] Derive CDI
3,296,518 UART: [art] Store in in slot 0x4
3,382,319 UART: [art] Derive Key Pair
3,382,679 UART: [art] Store priv key in slot 0x5
3,395,933 UART: [art] Derive Key Pair - Done
3,410,979 UART: [art] Signing Cert with AUTHO
3,411,459 UART: RITY.KEYID = 7
3,426,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,084 UART: [art] PUB.X = 87B5DC202383E57B7B98C022034A0A93D78643AB27F362047EA02C6B970342516319444EA40BC8DD2AAA9ACF8EA8F5BE
3,433,845 UART: [art] PUB.Y = 3E3C0211D290E5AEAB2B7876793ED3295F1B0DE51775D03BB31C7C57A89996D358A5FC4BFC049480408A3C1AD8E75919
3,440,790 UART: [art] SIG.R = 84AB476A95E0483FD65C7D2656D0BB05A56CD8630D18B07C4C790C3F44E3493DC15A9F14F44287BB46E179B03D994FFB
3,447,557 UART: [art] SIG.S = F048D9625800DBB782C81E6C77BB0FA84A84DB042D1DA09FE706CFF5574A4AA72AD831C5D09A8B1DF80889B45BDD4C1F
3,470,936 UART: Caliptra RT
3,471,282 UART: [state] CFI Enabled
3,579,523 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,122 ready_for_fw is high
1,363,122 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,190 >>> mbox cmd response: success
2,990,118 UART:
2,990,134 UART: Running Caliptra FMC ...
2,990,542 UART:
2,990,685 UART: [state] CFI Enabled
3,001,532 UART: [fht] FMC Alias Private Key: 7
3,109,981 UART: [art] Extend RT PCRs Done
3,110,409 UART: [art] Lock RT PCRs Done
3,112,003 UART: [art] Populate DV Done
3,120,530 UART: [fht] FMC Alias Private Key: 7
3,121,700 UART: [art] Derive CDI
3,121,980 UART: [art] Store in in slot 0x4
3,208,103 UART: [art] Derive Key Pair
3,208,463 UART: [art] Store priv key in slot 0x5
3,222,273 UART: [art] Derive Key Pair - Done
3,237,110 UART: [art] Signing Cert with AUTHO
3,237,590 UART: RITY.KEYID = 7
3,252,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,397 UART: [art] PUB.X = 9224F1C82547CC45B89E95BBA3EA8A7EE7FB1B986AF264C56C2DEA492FA081215FA971C8CDED6764F6317F8687C7C821
3,260,179 UART: [art] PUB.Y = 35E530F68695EF07EA93E3F02D5C72C48CD87B69844349536D5F9D3D7BA90CFA262243813EC35151E40E50620A6F2867
3,267,113 UART: [art] SIG.R = 07B64782C634370E7FDACAB22CEAF5C799891CCEF32849ABAE28048D555160352713DDACB6AEC803C07E2401AB216D33
3,273,878 UART: [art] SIG.S = 668F1ADF2F699C5ED14CA1D1A8A2C0A8C609658315ED3F97F36CE5D73BBCCD5B300DAFA5FB80DB26D7587AED1420CDF4
3,297,677 UART: Caliptra RT
3,298,023 UART: [state] CFI Enabled
3,406,770 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
893,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,149 UART: [kat] ++
897,301 UART: [kat] sha1
901,625 UART: [kat] SHA2-256
903,565 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
918,360 UART: [kat] HMAC-384Kdf
922,862 UART: [kat] LMS
1,171,190 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,399 UART: [fht] FHT @ 0x50003400
1,175,268 UART: [idev] ++
1,175,436 UART: [idev] CDI.KEYID = 6
1,175,796 UART: [idev] SUBJECT.KEYID = 7
1,176,220 UART: [idev] UDS.KEYID = 0
1,176,565 ready_for_fw is high
1,176,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,316 UART: [idev] Erasing UDS.KEYID = 0
1,201,653 UART: [idev] Sha1 KeyId Algorithm
1,210,035 UART: [idev] --
1,211,143 UART: [ldev] ++
1,211,311 UART: [ldev] CDI.KEYID = 6
1,211,674 UART: [ldev] SUBJECT.KEYID = 5
1,212,100 UART: [ldev] AUTHORITY.KEYID = 7
1,212,563 UART: [ldev] FE.KEYID = 1
1,217,809 UART: [ldev] Erasing FE.KEYID = 1
1,243,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,759 UART: [ldev] --
1,283,260 UART: [fwproc] Wait for Commands...
1,284,026 UART: [fwproc] Recv command 0x46574c44
1,284,754 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,345 >>> mbox cmd response: success
2,776,593 UART: [afmc] ++
2,776,761 UART: [afmc] CDI.KEYID = 6
2,777,123 UART: [afmc] SUBJECT.KEYID = 7
2,777,548 UART: [afmc] AUTHORITY.KEYID = 5
2,812,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,657 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,140 UART: [afmc] --
2,856,214 UART: [cold-reset] --
2,856,908 UART: [state] Locking Datavault
2,858,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,681 UART: [state] Locking ICCM
2,859,253 UART: [exit] Launching FMC @ 0x40000130
2,864,582 UART:
2,864,598 UART: Running Caliptra FMC ...
2,865,006 UART:
2,865,060 UART: [state] CFI Enabled
2,875,525 UART: [fht] FMC Alias Private Key: 7
2,982,748 UART: [art] Extend RT PCRs Done
2,983,176 UART: [art] Lock RT PCRs Done
2,984,946 UART: [art] Populate DV Done
2,993,329 UART: [fht] FMC Alias Private Key: 7
2,994,451 UART: [art] Derive CDI
2,994,731 UART: [art] Store in in slot 0x4
3,080,608 UART: [art] Derive Key Pair
3,080,968 UART: [art] Store priv key in slot 0x5
3,094,692 UART: [art] Derive Key Pair - Done
3,109,698 UART: [art] Signing Cert with AUTHO
3,110,178 UART: RITY.KEYID = 7
3,125,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,935 UART: [art] PUB.X = 2C9931069511B549964C73D8196DF3EDE6D03F4D51716ED04D388842FB60DC89CD3441AC304BEEF8FB6649D5717547BF
3,132,704 UART: [art] PUB.Y = 5AD798A56A1852DABA04CBC78AEAF1103A0F234A0C9158EF7B3B6DEF82FE08522D63F9EDFFFE4F29C6878153AC0C2972
3,139,659 UART: [art] SIG.R = 9521F49EF1250F654DCB2B5FAD35B40E153B9D6933E94BBEB5465E5DF49EC5A3780BE8F14A8F8DF6AC92F800520C3A10
3,146,409 UART: [art] SIG.S = 73EE6F29D739317A09BEE6F1454B20FC0129DCF34524C223C8881287894CD1FCE187E4FA345CF89C44CC4F4FCFD8F251
3,170,322 UART: Caliptra RT
3,170,576 UART: [state] CFI Enabled
3,278,932 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,411 ready_for_fw is high
1,059,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,567 >>> mbox cmd response: success
2,686,405 UART:
2,686,421 UART: Running Caliptra FMC ...
2,686,829 UART:
2,686,883 UART: [state] CFI Enabled
2,697,352 UART: [fht] FMC Alias Private Key: 7
2,805,381 UART: [art] Extend RT PCRs Done
2,805,809 UART: [art] Lock RT PCRs Done
2,807,367 UART: [art] Populate DV Done
2,815,612 UART: [fht] FMC Alias Private Key: 7
2,816,766 UART: [art] Derive CDI
2,817,046 UART: [art] Store in in slot 0x4
2,902,361 UART: [art] Derive Key Pair
2,902,721 UART: [art] Store priv key in slot 0x5
2,916,723 UART: [art] Derive Key Pair - Done
2,931,739 UART: [art] Signing Cert with AUTHO
2,932,219 UART: RITY.KEYID = 7
2,947,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,088 UART: [art] PUB.X = EE538D22BB96501259DB1F49748CC2444F4FD026212CB11474C6AFDC078AA12C06FDB3961C3584C464AE9121782B593B
2,954,854 UART: [art] PUB.Y = C1FBA09CE3C10F0B536B9783BD3024792CA5F8EFBD09A1DE22B88E1673D2EBAAD2CCE1E6E025A8C183AF380889BFA009
2,961,811 UART: [art] SIG.R = A7E25FB81A11A9CFED666D2C5D0D24252E2B8291BDE92A5ACB9BD306936FE92EC3C3F236973DC3CA84631660A69CFEF4
2,968,593 UART: [art] SIG.S = BCCD1058B40F7B95D54E81D3372734BAF0863ED0790DFFC9136D6D558D3FFA07A05128651579505F9FCFE28835D5FE74
2,992,415 UART: Caliptra RT
2,992,669 UART: [state] CFI Enabled
3,099,976 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
893,095 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,220 UART: [kat] ++
897,372 UART: [kat] sha1
901,480 UART: [kat] SHA2-256
903,420 UART: [kat] SHA2-384
906,255 UART: [kat] SHA2-512-ACC
908,156 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,172,124 UART: [cold-reset] ++
1,172,544 UART: [fht] FHT @ 0x50003400
1,175,145 UART: [idev] ++
1,175,313 UART: [idev] CDI.KEYID = 6
1,175,673 UART: [idev] SUBJECT.KEYID = 7
1,176,097 UART: [idev] UDS.KEYID = 0
1,176,442 ready_for_fw is high
1,176,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,377 UART: [idev] Erasing UDS.KEYID = 0
1,201,078 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,558 UART: [ldev] ++
1,210,726 UART: [ldev] CDI.KEYID = 6
1,211,089 UART: [ldev] SUBJECT.KEYID = 5
1,211,515 UART: [ldev] AUTHORITY.KEYID = 7
1,211,978 UART: [ldev] FE.KEYID = 1
1,217,484 UART: [ldev] Erasing FE.KEYID = 1
1,243,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,410 UART: [ldev] --
1,282,827 UART: [fwproc] Wait for Commands...
1,283,439 UART: [fwproc] Recv command 0x46574c44
1,284,167 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,489 >>> mbox cmd response: success
2,776,509 UART: [afmc] ++
2,776,677 UART: [afmc] CDI.KEYID = 6
2,777,039 UART: [afmc] SUBJECT.KEYID = 7
2,777,464 UART: [afmc] AUTHORITY.KEYID = 5
2,812,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,993 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,712 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,402 UART: [afmc] --
2,855,374 UART: [cold-reset] --
2,856,346 UART: [state] Locking Datavault
2,857,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,991 UART: [state] Locking ICCM
2,858,581 UART: [exit] Launching FMC @ 0x40000130
2,863,910 UART:
2,863,926 UART: Running Caliptra FMC ...
2,864,334 UART:
2,864,477 UART: [state] CFI Enabled
2,874,924 UART: [fht] FMC Alias Private Key: 7
2,983,515 UART: [art] Extend RT PCRs Done
2,983,943 UART: [art] Lock RT PCRs Done
2,985,367 UART: [art] Populate DV Done
2,993,712 UART: [fht] FMC Alias Private Key: 7
2,994,800 UART: [art] Derive CDI
2,995,080 UART: [art] Store in in slot 0x4
3,080,489 UART: [art] Derive Key Pair
3,080,849 UART: [art] Store priv key in slot 0x5
3,094,105 UART: [art] Derive Key Pair - Done
3,109,234 UART: [art] Signing Cert with AUTHO
3,109,714 UART: RITY.KEYID = 7
3,125,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,805 UART: [art] PUB.X = FC8D983FD10C9902EBA4D2E9D86EF876954602A672908143253B0CC507BAA9608B9E9D70D56C0CBB0A0235AF79D55E80
3,132,557 UART: [art] PUB.Y = 75AEC43E91BABF06C35999B1B42F501A904F4D47822317843F441FD934A9DDF82C6EDEDC24075921309A41B03D4E2CB1
3,139,507 UART: [art] SIG.R = 40795FAA4BDC9F657948A5B6A708A17CE061C36CCDCEB37D425E9AF29C58540FCCF7F628B32C862D6F129543F67D3352
3,146,281 UART: [art] SIG.S = 5DE6274092FBA33818FCD1D5F331BF5A04F4B7F84C1F16DE301D68D3CC90618FF0536301423D3BF5EF1B41CD2EF762D3
3,170,020 UART: Caliptra RT
3,170,366 UART: [state] CFI Enabled
3,277,844 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,798 ready_for_fw is high
1,060,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,356 >>> mbox cmd response: success
2,689,046 UART:
2,689,062 UART: Running Caliptra FMC ...
2,689,470 UART:
2,689,613 UART: [state] CFI Enabled
2,700,444 UART: [fht] FMC Alias Private Key: 7
2,808,979 UART: [art] Extend RT PCRs Done
2,809,407 UART: [art] Lock RT PCRs Done
2,810,677 UART: [art] Populate DV Done
2,819,012 UART: [fht] FMC Alias Private Key: 7
2,820,026 UART: [art] Derive CDI
2,820,306 UART: [art] Store in in slot 0x4
2,906,139 UART: [art] Derive Key Pair
2,906,499 UART: [art] Store priv key in slot 0x5
2,920,147 UART: [art] Derive Key Pair - Done
2,935,120 UART: [art] Signing Cert with AUTHO
2,935,600 UART: RITY.KEYID = 7
2,950,788 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,553 UART: [art] PUB.X = A1BFFED2F1F02880EB9D42D4A89698225BB59A80E9B7513F95D873F0BAB2930E4B401D2FF8F0BEB4DCC5512477B141A4
2,958,334 UART: [art] PUB.Y = 3EF30192C7FE6968A8C8EF526AC1FD616981DE1AACC37A862141F05539B53D7DB4658CB20D7DA11EBA073F6F88A2EBE3
2,965,291 UART: [art] SIG.R = 9C6B10B441657C796CF72BFCB555A3D4DF46981A77E42E68722924884A2A211E1F843718D51BBC5B8A7179C97EFB040F
2,972,057 UART: [art] SIG.S = A92D10533007811F04E7AE18819A74B2AA7D7577AC5EE3DF133F22A874CD5FDA5BDFA841688F5D9925D847667CE7271F
2,995,490 UART: Caliptra RT
2,995,836 UART: [state] CFI Enabled
3,104,715 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,175 UART: [kat] SHA2-256
901,115 UART: [kat] SHA2-384
903,822 UART: [kat] SHA2-512-ACC
905,723 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
920,228 UART: [kat] LMS
1,168,540 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,169,895 UART: [fht] FHT @ 0x50003400
1,172,485 UART: [idev] ++
1,172,653 UART: [idev] CDI.KEYID = 6
1,173,014 UART: [idev] SUBJECT.KEYID = 7
1,173,439 UART: [idev] UDS.KEYID = 0
1,173,785 ready_for_fw is high
1,173,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,623 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,300 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,333 UART: [fwproc] Recv command 0x46574c44
1,282,066 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,102 >>> mbox cmd response: success
2,772,135 UART: [afmc] ++
2,772,303 UART: [afmc] CDI.KEYID = 6
2,772,666 UART: [afmc] SUBJECT.KEYID = 7
2,773,092 UART: [afmc] AUTHORITY.KEYID = 5
2,808,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,818 UART: [afmc] --
2,851,918 UART: [cold-reset] --
2,852,668 UART: [state] Locking Datavault
2,853,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,391 UART: [state] Locking ICCM
2,854,895 UART: [exit] Launching FMC @ 0x40000130
2,860,224 UART:
2,860,240 UART: Running Caliptra FMC ...
2,860,648 UART:
2,860,702 UART: [state] CFI Enabled
2,871,081 UART: [fht] FMC Alias Private Key: 7
2,978,568 UART: [art] Extend RT PCRs Done
2,978,996 UART: [art] Lock RT PCRs Done
2,980,576 UART: [art] Populate DV Done
2,988,547 UART: [fht] FMC Alias Private Key: 7
2,989,509 UART: [art] Derive CDI
2,989,789 UART: [art] Store in in slot 0x4
3,075,778 UART: [art] Derive Key Pair
3,076,138 UART: [art] Store priv key in slot 0x5
3,089,314 UART: [art] Derive Key Pair - Done
3,104,043 UART: [art] Signing Cert with AUTHO
3,104,523 UART: RITY.KEYID = 7
3,119,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,332 UART: [art] PUB.X = E1AAEB04D9C835A51830DCC6D24B47103BCBB85F6A068A1E4DC57B8E788964DA27C67482FEC215E80B630A149E193348
3,127,098 UART: [art] PUB.Y = FD07413F8400F75D4038397EC46B89ED065CDD410B840884C3EC1BC9BA5858373DE10C79639C3B5844CB8EE07516044E
3,134,008 UART: [art] SIG.R = 718A0BBA88366E64338655AE51A4FE36C1975721095074ED19DC585B51E195D912310C97FF8CDB227C0152476AC0C477
3,140,760 UART: [art] SIG.S = 9FFA14FCEA478A8507466166C39FAD1087037E79B386A9B55DAB338BDE32755D777CA35C7154E19D46E7CA5AD0A71EBF
3,164,811 UART: Caliptra RT
3,165,065 UART: [state] CFI Enabled
3,272,647 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,328 ready_for_fw is high
1,055,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,406 >>> mbox cmd response: success
2,686,326 UART:
2,686,342 UART: Running Caliptra FMC ...
2,686,750 UART:
2,686,804 UART: [state] CFI Enabled
2,697,137 UART: [fht] FMC Alias Private Key: 7
2,805,016 UART: [art] Extend RT PCRs Done
2,805,444 UART: [art] Lock RT PCRs Done
2,807,096 UART: [art] Populate DV Done
2,815,245 UART: [fht] FMC Alias Private Key: 7
2,816,349 UART: [art] Derive CDI
2,816,629 UART: [art] Store in in slot 0x4
2,902,048 UART: [art] Derive Key Pair
2,902,408 UART: [art] Store priv key in slot 0x5
2,916,302 UART: [art] Derive Key Pair - Done
2,931,261 UART: [art] Signing Cert with AUTHO
2,931,741 UART: RITY.KEYID = 7
2,946,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,690 UART: [art] PUB.X = 729F28154E31801A3A3A2EECAB22476B3A35B4D5A925571DEF243F16B7C35B6AEEEEDF5EE042A3DB6783173CC940130F
2,954,469 UART: [art] PUB.Y = 801E1F18219D6EFA01309E5F4174A9FD40511470D83AB694E9147FDBCDAF46852D06121ADADE28795621BFCC97275135
2,961,415 UART: [art] SIG.R = EBBF23FF2A038552F86D66E0833A71F8324B7B993C6CBD1B831A369498E722F19382EF81AAC9E28C2512446A4CEA6317
2,968,186 UART: [art] SIG.S = 715CEF0B7F8D68507708F788C0EBB15538ECB64B0DE7588D7AF609DEA40873F94D7F115144D4778462E7E0DF19655C4C
2,991,866 UART: Caliptra RT
2,992,120 UART: [state] CFI Enabled
3,099,942 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
905,115 UART: [kat] SHA2-512-ACC
907,016 UART: [kat] ECC-384
916,937 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,854 UART: [cold-reset] ++
1,171,244 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,175,140 ready_for_fw is high
1,175,140 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,200,156 UART: [idev] Sha1 KeyId Algorithm
1,209,022 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,755 UART: [ldev] SUBJECT.KEYID = 5
1,211,182 UART: [ldev] AUTHORITY.KEYID = 7
1,211,645 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x46574c44
1,283,153 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,059 >>> mbox cmd response: success
2,774,314 UART: [afmc] ++
2,774,482 UART: [afmc] CDI.KEYID = 6
2,774,845 UART: [afmc] SUBJECT.KEYID = 7
2,775,271 UART: [afmc] AUTHORITY.KEYID = 5
2,810,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,858 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,239 UART: [afmc] --
2,854,225 UART: [cold-reset] --
2,855,169 UART: [state] Locking Datavault
2,856,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,852 UART: [state] Locking ICCM
2,857,318 UART: [exit] Launching FMC @ 0x40000130
2,862,647 UART:
2,862,663 UART: Running Caliptra FMC ...
2,863,071 UART:
2,863,214 UART: [state] CFI Enabled
2,873,955 UART: [fht] FMC Alias Private Key: 7
2,981,778 UART: [art] Extend RT PCRs Done
2,982,206 UART: [art] Lock RT PCRs Done
2,983,598 UART: [art] Populate DV Done
2,991,615 UART: [fht] FMC Alias Private Key: 7
2,992,777 UART: [art] Derive CDI
2,993,057 UART: [art] Store in in slot 0x4
3,078,556 UART: [art] Derive Key Pair
3,078,916 UART: [art] Store priv key in slot 0x5
3,091,924 UART: [art] Derive Key Pair - Done
3,106,634 UART: [art] Signing Cert with AUTHO
3,107,114 UART: RITY.KEYID = 7
3,122,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,651 UART: [art] PUB.X = 6C6DC3FD729F1E6C7FF990C61F62AFB49A5875EE8819219601E97C66404EA04F2276E0AB3ADE4BF462697779235867E5
3,130,420 UART: [art] PUB.Y = 831D967700A1BADCCFC3059F6DCCD368D7299EB7BD3F56EAFE8B8C839E000E39F6777F433E94BF82F84B1B9A408648FB
3,137,336 UART: [art] SIG.R = C3B564D0DCFE9E77594F47A1C7B383F4594F4CAF661F63352645FB6F8EC46D3F9A29F70C99C61F905588C0E147C37A80
3,144,109 UART: [art] SIG.S = 077B011CDA4D5094C1CD54A014B9B6797B5AE7265613F4FC375C07103482B89D52D44C12C3145C4B78CE92DE210D3C34
3,167,932 UART: Caliptra RT
3,168,278 UART: [state] CFI Enabled
3,275,986 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,311 ready_for_fw is high
1,056,311 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,829 >>> mbox cmd response: success
2,684,209 UART:
2,684,225 UART: Running Caliptra FMC ...
2,684,633 UART:
2,684,776 UART: [state] CFI Enabled
2,695,529 UART: [fht] FMC Alias Private Key: 7
2,803,458 UART: [art] Extend RT PCRs Done
2,803,886 UART: [art] Lock RT PCRs Done
2,805,426 UART: [art] Populate DV Done
2,813,611 UART: [fht] FMC Alias Private Key: 7
2,814,771 UART: [art] Derive CDI
2,815,051 UART: [art] Store in in slot 0x4
2,900,508 UART: [art] Derive Key Pair
2,900,868 UART: [art] Store priv key in slot 0x5
2,914,132 UART: [art] Derive Key Pair - Done
2,928,980 UART: [art] Signing Cert with AUTHO
2,929,460 UART: RITY.KEYID = 7
2,944,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,341 UART: [art] PUB.X = 83082B8FBCD4C2072089DDEA784F4CD959DCC68291CE21DE7C56C33BEDC282DD1996D95F1136DC9BD566A0EFC138C886
2,952,121 UART: [art] PUB.Y = C337F75B18DA9918B98842ED32C5CD3C81235B8BDEA11A67F66322563A5F06D6DB7B7B3AE82CC4851376CF1507259981
2,959,067 UART: [art] SIG.R = D39B43E556B1E0023C9E32CDB60652CA2527F3C7036BC837ED386D37840E9650F9B6263FACABAE601CB7EE3ABBE41CAB
2,965,843 UART: [art] SIG.S = A0FA0D12B316C9CDB606ECF19BA8836848BA2F0DBCE7DCAAB09D46A05A442FD046C770BDB6B386ED9AAAFB20FDA69CF9
2,989,347 UART: Caliptra RT
2,989,693 UART: [state] CFI Enabled
3,098,058 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,209,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,210,677 UART:
2,210,925 UART: Running Caliptra ROM ...
2,211,978 UART:
2,212,120 UART: [state] CFI Enabled
2,213,020 UART: [state] LifecycleState = Unprovisioned
2,214,677 UART: [state] DebugLocked = No
2,215,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,219,023 UART: [kat] SHA2-256
2,219,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,222,684 UART: [kat] ++
2,223,130 UART: [kat] sha1
2,223,630 UART: [kat] SHA2-256
2,224,277 UART: [kat] SHA2-384
2,224,922 UART: [kat] SHA2-512-ACC
2,225,711 UART: [kat] ECC-384
2,767,219 UART: [kat] HMAC-384Kdf
2,800,098 UART: [kat] LMS
3,990,365 UART: [kat] --
3,994,195 UART: [cold-reset] ++
3,996,495 UART: [fht] Storing FHT @ 0x50003400
4,008,777 UART: [idev] ++
4,009,337 UART: [idev] CDI.KEYID = 6
4,010,291 UART: [idev] SUBJECT.KEYID = 7
4,011,497 UART: [idev] UDS.KEYID = 0
4,033,720 UART: [idev] Erasing UDS.KEYID = 0
7,342,885 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,415 UART: [idev] --
7,369,187 UART: [ldev] ++
7,369,751 UART: [ldev] CDI.KEYID = 6
7,370,685 UART: [ldev] SUBJECT.KEYID = 5
7,371,942 UART: [ldev] AUTHORITY.KEYID = 7
7,373,142 UART: [ldev] FE.KEYID = 1
7,421,904 UART: [ldev] Erasing FE.KEYID = 1
10,753,972 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,601 UART: [ldev] --
13,113,216 UART: [fwproc] Waiting for Commands...
13,115,848 UART: [fwproc] Received command 0x4d454153
13,124,730 >>> mbox cmd response data (12 bytes)
13,127,549 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
13,226,872 UART: [fwproc] Received command 0x46574c44
13,229,128 UART: [fwproc] Received Image of size 78676 bytes
16,845,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,926,078 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,994,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,187,929 >>> mbox cmd response: success
17,192,601 UART: [afmc] ++
17,193,238 UART: [afmc] CDI.KEYID = 6
17,194,139 UART: [afmc] SUBJECT.KEYID = 7
17,195,396 UART: [afmc] AUTHORITY.KEYID = 5
20,556,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,855,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,857,828 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,872,190 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,887,013 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,901,501 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,923,124 UART: [afmc] --
22,926,403 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,926,757 UART: [cold-reset] --
22,930,485 UART: [state] Locking Datavault
22,935,072 UART: [state] Locking PCR0, PCR1 and PCR31
22,936,829 UART: [state] Locking ICCM
22,939,082 UART: [exit] Launching FMC @ 0x40000130
22,947,472 UART:
22,947,699 UART: Running Caliptra FMC ...
22,948,795 UART:
22,948,945 UART: [state] CFI Enabled
23,014,962 UART: [fht] FMC Alias Private Key: 7
25,352,449 UART: [art] Extend RT PCRs Done
25,353,668 UART: [art] Lock RT PCRs Done
25,355,153 UART: [art] Populate DV Done
25,360,722 UART: [fht] FMC Alias Private Key: 7
25,362,307 UART: [art] Derive CDI
25,363,118 UART: [art] Store in in slot 0x4
25,423,481 UART: [art] Derive Key Pair
25,424,523 UART: [art] Store priv key in slot 0x5
28,717,391 UART: [art] Derive Key Pair - Done
28,730,597 UART: [art] Signing Cert with AUTHO
28,731,894 UART: RITY.KEYID = 7
31,018,954 UART: [art] Erasing AUTHORITY.KEYID = 7
31,020,517 UART: [art] PUB.X = CD73B7532B6D596BA058E880195F12D1B6507789DEC0C1F3E52CEF8E1941C1DFB19BC6BDDA000B66DE64734CB6335405
31,027,740 UART: [art] PUB.Y = F007E0999C00175549E1CAE468723C20E299972FE6D585C0AD3C1051C4495A5E3C2EBB0B9E88EF9D875954187E70C85F
31,034,911 UART: [art] SIG.R = 92B02C9AC49150EA031798AA6C7385F1CFE1EEB0ABB8EE19BBAE33445F4D804CE29EEFF8F2FB9DCA90F73CDAD3CB7D05
31,042,368 UART: [art] SIG.S = 59FD2317699579EC225A89ABB2EAB2809E9B4465E18AB77EECFA16F886D814D53280475AC133000C266FADB4040FE7AB
32,347,148 UART: mbox::rt_entry...
32,348,106 UART: ____ _ _ _ ____ _____
32,350,098 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,352,301 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,354,236 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,356,158 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,358,079 UART: |_|
32,358,883 UART:
32,482,580 UART: [rt] Runtime listening for mailbox commands...
32,484,674 >>> mbox cmd response data (48 bytes)
32,485,235 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,487,585 >>> mbox cmd response data (48 bytes)
32,488,467 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,502,303 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,209,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,866,741 >>> mbox cmd response data (12 bytes)
12,869,850 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,280,282 >>> mbox cmd response: success
22,967,532 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,981,024 UART:
22,981,336 UART: Running Caliptra FMC ...
22,982,475 UART:
22,982,637 UART: [state] CFI Enabled
23,052,065 UART: [fht] FMC Alias Private Key: 7
25,389,585 UART: [art] Extend RT PCRs Done
25,390,808 UART: [art] Lock RT PCRs Done
25,392,618 UART: [art] Populate DV Done
25,397,918 UART: [fht] FMC Alias Private Key: 7
25,399,508 UART: [art] Derive CDI
25,400,318 UART: [art] Store in in slot 0x4
25,461,871 UART: [art] Derive Key Pair
25,462,911 UART: [art] Store priv key in slot 0x5
28,755,678 UART: [art] Derive Key Pair - Done
28,768,895 UART: [art] Signing Cert with AUTHO
28,770,215 UART: RITY.KEYID = 7
31,057,655 UART: [art] Erasing AUTHORITY.KEYID = 7
31,059,163 UART: [art] PUB.X = 03EFFFEF149E82E1DDE952C29FB0C40CA783ACBA67B561DE0E665BFE0502AC3E3BE91182E2DF5BAE3A717181BC670896
31,066,459 UART: [art] PUB.Y = C04636CDCD5AAE79572179E1629C684B9C188436707A5378C2F8FC50E31B370F55ECDCB56A352C057F81258340641FFF
31,073,710 UART: [art] SIG.R = 9FB146DC767FCD166AED2D1CB677B2EF71863E1CD85E620AACA2675C6C5FBFAA56FD1B798EBCFC76EFD0FC1915714566
31,081,090 UART: [art] SIG.S = D01A280BBC4ACB91E6E35E515014852B82879F35EC21D57ED6D3142570B1EC710F172A4633F8A3C82F0849984241D820
32,385,894 UART: mbox::rt_entry...
32,386,867 UART: ____ _ _ _ ____ _____
32,388,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,390,848 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,392,771 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,394,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,396,677 UART: |_|
32,397,479 UART:
32,521,264 UART: [rt] Runtime listening for mailbox commands...
32,523,366 >>> mbox cmd response data (48 bytes)
32,523,916 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,526,236 >>> mbox cmd response data (48 bytes)
32,527,111 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,540,985 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,211,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,212,400 UART:
2,212,638 UART: Running Caliptra ROM ...
2,213,690 UART:
2,213,841 UART: [state] CFI Enabled
2,214,731 UART: [state] LifecycleState = Unprovisioned
2,216,286 UART: [state] DebugLocked = No
2,217,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,220,612 UART: [kat] SHA2-256
2,221,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,224,317 UART: [kat] ++
2,224,771 UART: [kat] sha1
2,225,280 UART: [kat] SHA2-256
2,226,022 UART: [kat] SHA2-384
2,226,690 UART: [kat] SHA2-512-ACC
2,227,572 UART: [kat] ECC-384
3,116,480 UART: [kat] HMAC-384Kdf
3,128,749 UART: [kat] LMS
4,318,876 UART: [kat] --
4,323,816 UART: [cold-reset] ++
4,325,449 UART: [fht] Storing FHT @ 0x50003400
4,337,787 UART: [idev] ++
4,338,368 UART: [idev] CDI.KEYID = 6
4,339,337 UART: [idev] SUBJECT.KEYID = 7
4,340,550 UART: [idev] UDS.KEYID = 0
4,357,301 UART: [idev] Erasing UDS.KEYID = 0
7,628,173 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,612 UART: [idev] --
7,652,577 UART: [ldev] ++
7,653,141 UART: [ldev] CDI.KEYID = 6
7,654,075 UART: [ldev] SUBJECT.KEYID = 5
7,655,288 UART: [ldev] AUTHORITY.KEYID = 7
7,656,575 UART: [ldev] FE.KEYID = 1
7,669,026 UART: [ldev] Erasing FE.KEYID = 1
10,950,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,279 UART: [ldev] --
13,310,463 UART: [fwproc] Waiting for Commands...
13,312,913 UART: [fwproc] Received command 0x4d454153
13,321,806 >>> mbox cmd response data (12 bytes)
13,324,550 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
13,423,986 UART: [fwproc] Received command 0x46574c44
13,426,247 UART: [fwproc] Received Image of size 78676 bytes
17,048,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,120,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,189,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,382,716 >>> mbox cmd response: success
17,386,260 UART: [afmc] ++
17,386,845 UART: [afmc] CDI.KEYID = 6
17,387,781 UART: [afmc] SUBJECT.KEYID = 7
17,389,047 UART: [afmc] AUTHORITY.KEYID = 5
20,706,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,003,212 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,005,467 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,019,854 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,034,682 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,049,164 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,071,028 UART: [afmc] --
23,075,332 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,075,686 UART: [cold-reset] --
23,080,119 UART: [state] Locking Datavault
23,084,665 UART: [state] Locking PCR0, PCR1 and PCR31
23,086,416 UART: [state] Locking ICCM
23,088,913 UART: [exit] Launching FMC @ 0x40000130
23,097,300 UART:
23,097,531 UART: Running Caliptra FMC ...
23,098,561 UART:
23,098,709 UART: [state] CFI Enabled
23,106,651 UART: [fht] FMC Alias Private Key: 7
25,438,437 UART: [art] Extend RT PCRs Done
25,439,672 UART: [art] Lock RT PCRs Done
25,441,268 UART: [art] Populate DV Done
25,447,083 UART: [fht] FMC Alias Private Key: 7
25,448,704 UART: [art] Derive CDI
25,449,444 UART: [art] Store in in slot 0x4
25,492,303 UART: [art] Derive Key Pair
25,493,302 UART: [art] Store priv key in slot 0x5
28,736,023 UART: [art] Derive Key Pair - Done
28,749,285 UART: [art] Signing Cert with AUTHO
28,750,589 UART: RITY.KEYID = 7
31,030,251 UART: [art] Erasing AUTHORITY.KEYID = 7
31,031,766 UART: [art] PUB.X = 9F93DAF46FECA8002D768AE4597840C1F84B77231CEBD11B52CA1FE9178D641FECCD1070524BBF1834DEFD0FB48C75A8
31,038,995 UART: [art] PUB.Y = 312B638600F28AFF616F79F0C1DD8E2C1DB6B5F9A17EFE245A294568E5F319E4524D5041E420707124384425A628F983
31,046,280 UART: [art] SIG.R = 174DD3B7DCAE84300EE5202088037C761EC5C411139328991C4AA66385BDEFA3CE72ED6344F2C0EF377C9DFE2FCAE3A1
31,053,685 UART: [art] SIG.S = BD5DC89265E307BAC100A7A41BB2ED194FE908FE58BFD620ADA5E0A60FF53BED55765EC0EB019004A73A45A11715945C
32,358,155 UART: mbox::rt_entry...
32,359,135 UART: ____ _ _ _ ____ _____
32,361,115 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,363,114 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,365,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,366,969 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,368,894 UART: |_|
32,369,699 UART:
32,494,242 UART: [rt] Runtime listening for mailbox commands...
32,496,403 >>> mbox cmd response data (48 bytes)
32,497,005 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,499,330 >>> mbox cmd response data (48 bytes)
32,500,221 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,514,255 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,214,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,047,842 >>> mbox cmd response data (12 bytes)
13,050,545 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,452,096 >>> mbox cmd response: success
23,068,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,083,337 UART:
23,083,698 UART: Running Caliptra FMC ...
23,084,860 UART:
23,085,033 UART: [state] CFI Enabled
23,092,826 UART: [fht] FMC Alias Private Key: 7
25,422,783 UART: [art] Extend RT PCRs Done
25,424,003 UART: [art] Lock RT PCRs Done
25,425,740 UART: [art] Populate DV Done
25,431,316 UART: [fht] FMC Alias Private Key: 7
25,432,750 UART: [art] Derive CDI
25,433,511 UART: [art] Store in in slot 0x4
25,476,489 UART: [art] Derive Key Pair
25,477,493 UART: [art] Store priv key in slot 0x5
28,719,337 UART: [art] Derive Key Pair - Done
28,732,388 UART: [art] Signing Cert with AUTHO
28,733,693 UART: RITY.KEYID = 7
31,013,137 UART: [art] Erasing AUTHORITY.KEYID = 7
31,014,651 UART: [art] PUB.X = D4EDB45B273173DFDC9B03B98F2453AA22B6A50A7535D1E6BE3BDD58A86F20655485271E8CE4575FE7D0FA89D7428FD4
31,021,919 UART: [art] PUB.Y = 900D4D609C861C094D2159D8913EC5401DCF4457C30A41C4A650A9C7CC8BA766BC5F6071873D549E99E060845BE0D016
31,029,124 UART: [art] SIG.R = 63D577A0C2033D66802071AB8DAD72A0779F15095A2ED0BAB20A91171D9016AB1ED377634134322022B34C4714482E9D
31,036,499 UART: [art] SIG.S = E38346239FBD5397DE6AED0F6A11CBC6EDC304F7E4CD95CD4DCCB644A856CE9F82D2CA874E21285A6D0DCBF684FBBACD
32,341,553 UART: mbox::rt_entry...
32,342,522 UART: ____ _ _ _ ____ _____
32,344,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,346,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,348,440 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,350,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,352,365 UART: |_|
32,353,200 UART:
32,478,715 UART: [rt] Runtime listening for mailbox commands...
32,480,827 >>> mbox cmd response data (48 bytes)
32,481,400 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,483,782 >>> mbox cmd response data (48 bytes)
32,484,688 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,498,551 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,206,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,207,701 UART:
2,207,958 UART: Running Caliptra ROM ...
2,209,023 UART:
2,209,179 UART: [state] CFI Enabled
2,210,088 UART: [state] LifecycleState = Unprovisioned
2,211,759 UART: [state] DebugLocked = No
2,212,879 UART: [state] WD Timer not started. Device not locked for debugging
2,215,354 UART: [kat] SHA2-256
2,216,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,041 UART: [kat] ++
2,219,497 UART: [kat] sha1
2,220,008 UART: [kat] SHA2-256
2,220,758 UART: [kat] SHA2-384
2,221,423 UART: [kat] SHA2-512-ACC
2,222,257 UART: [kat] ECC-384
2,948,285 UART: [kat] HMAC-384Kdf
2,971,651 UART: [kat] LMS
3,501,119 UART: [kat] --
3,505,378 UART: [cold-reset] ++
3,506,501 UART: [fht] FHT @ 0x50003400
3,518,256 UART: [idev] ++
3,518,832 UART: [idev] CDI.KEYID = 6
3,519,809 UART: [idev] SUBJECT.KEYID = 7
3,520,967 UART: [idev] UDS.KEYID = 0
3,543,478 UART: [idev] Erasing UDS.KEYID = 0
6,024,433 UART: [idev] Sha1 KeyId Algorithm
6,047,252 UART: [idev] --
6,051,605 UART: [ldev] ++
6,052,186 UART: [ldev] CDI.KEYID = 6
6,053,074 UART: [ldev] SUBJECT.KEYID = 5
6,054,238 UART: [ldev] AUTHORITY.KEYID = 7
6,055,471 UART: [ldev] FE.KEYID = 1
6,098,664 UART: [ldev] Erasing FE.KEYID = 1
8,604,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,115 UART: [ldev] --
10,411,435 UART: [fwproc] Wait for Commands...
10,413,206 UART: [fwproc] Recv command 0x4d454153
10,421,738 >>> mbox cmd response data (12 bytes)
10,424,331 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
10,524,408 UART: [fwproc] Recv command 0x46574c44
10,526,535 UART: [fwproc] Recv'd Img size: 78632 bytes
13,492,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,569,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,638,215 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,831,578 >>> mbox cmd response: success
13,836,101 UART: [afmc] ++
13,836,695 UART: [afmc] CDI.KEYID = 6
13,837,581 UART: [afmc] SUBJECT.KEYID = 7
13,838,817 UART: [afmc] AUTHORITY.KEYID = 5
16,377,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,105,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,107,634 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,123,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,139,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,155,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,178,750 UART: [afmc] --
18,182,571 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,182,926 UART: [cold-reset] --
18,187,035 UART: [state] Locking Datavault
18,191,095 UART: [state] Locking PCR0, PCR1 and PCR31
18,192,742 UART: [state] Locking ICCM
18,194,268 UART: [exit] Launching FMC @ 0x40000130
18,202,723 UART:
18,202,998 UART: Running Caliptra FMC ...
18,204,047 UART:
18,204,202 UART: [state] CFI Enabled
18,262,105 UART: [fht] FMC Alias Private Key: 7
20,026,072 UART: [art] Extend RT PCRs Done
20,027,348 UART: [art] Lock RT PCRs Done
20,028,791 UART: [art] Populate DV Done
20,034,332 UART: [fht] FMC Alias Private Key: 7
20,035,883 UART: [art] Derive CDI
20,036,662 UART: [art] Store in in slot 0x4
20,094,172 UART: [art] Derive Key Pair
20,095,219 UART: [art] Store priv key in slot 0x5
22,557,940 UART: [art] Derive Key Pair - Done
22,571,152 UART: [art] Signing Cert with AUTHO
22,572,452 UART: RITY.KEYID = 7
24,283,318 UART: [art] Erasing AUTHORITY.KEYID = 7
24,284,831 UART: [art] PUB.X = 6AC6AF7811F7B4120379A42E971481DDCCADAE2DA44D7BFFE12D0D34793FFD83D1215014DE56B52281673956E01DB809
24,292,091 UART: [art] PUB.Y = 33DC423F8D6C640929949B2597C8A6FEDA32A2CF5367A462C338C64818F33E7AF5B9B7E6DF6ABA30EF9232F7E4DCD9FA
24,299,370 UART: [art] SIG.R = 454EDF2B1B24356A184AD3002B589A0459E5EEA2557E9849E4DDF2F64FD1A17F9A44CFF212C1BBD0EBA31F0160A6F096
24,306,751 UART: [art] SIG.S = 74CE0BECFFC91FDC59A14684340A29A852F45B1CF7C2B846A5BE5B009189EF743393364FC027702CBB2CD476A4EE7F7F
25,285,061 UART: mbox::rt_entry...
25,286,030 UART: ____ _ _ _ ____ _____
25,287,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,289,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,291,898 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,293,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,295,757 UART: |_|
25,296,591 UART:
25,421,887 UART: [rt] Runtime listening for mailbox commands...
25,424,001 >>> mbox cmd response data (48 bytes)
25,424,570 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,426,916 >>> mbox cmd response data (48 bytes)
25,427,800 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,441,742 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
2,206,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,207,918 UART:
2,208,176 UART: Running Caliptra ROM ...
2,209,244 UART:
2,209,397 UART: [state] CFI Enabled
2,210,292 UART: [state] LifecycleState = Unprovisioned
2,211,946 UART: [state] DebugLocked = No
2,212,978 UART: [state] WD Timer not started. Device not locked for debugging
2,215,447 UART: [kat] SHA2-256
2,216,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,219,140 UART: [kat] ++
2,219,592 UART: [kat] sha1
2,220,104 UART: [kat] SHA2-256
2,220,757 UART: [kat] SHA2-384
2,221,411 UART: [kat] SHA2-512-ACC
2,222,408 UART: [kat] ECC-384
2,949,676 UART: [kat] HMAC-384Kdf
2,971,202 UART: [kat] LMS
3,502,977 UART: [kat] --
3,507,309 UART: [cold-reset] ++
3,509,188 UART: [fht] FHT @ 0x50003400
3,521,687 UART: [idev] ++
3,522,405 UART: [idev] CDI.KEYID = 6
3,523,350 UART: [idev] SUBJECT.KEYID = 7
3,524,565 UART: [idev] UDS.KEYID = 0
3,544,051 UART: [idev] Erasing UDS.KEYID = 0
6,029,770 UART: [idev] Sha1 KeyId Algorithm
6,052,311 UART: [idev] --
6,057,555 UART: [ldev] ++
6,058,238 UART: [ldev] CDI.KEYID = 6
6,059,118 UART: [ldev] SUBJECT.KEYID = 5
6,060,331 UART: [ldev] AUTHORITY.KEYID = 7
6,061,567 UART: [ldev] FE.KEYID = 1
6,098,444 UART: [ldev] Erasing FE.KEYID = 1
8,606,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,468 UART: [ldev] --
10,411,451 UART: [fwproc] Wait for Commands...
10,413,244 UART: [fwproc] Recv command 0x4d454153
10,422,974 >>> mbox cmd response data (12 bytes)
10,425,712 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
10,524,831 UART: [fwproc] Recv command 0x46574c44
10,526,844 UART: [fwproc] Recv'd Img size: 78632 bytes
13,536,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,617,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,733,285 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,061,239 >>> mbox cmd response: success
14,064,592 UART: [afmc] ++
14,065,301 UART: [afmc] CDI.KEYID = 6
14,066,499 UART: [afmc] SUBJECT.KEYID = 7
14,067,994 UART: [afmc] AUTHORITY.KEYID = 5
16,593,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,316,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,318,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,333,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,348,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,363,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,387,052 UART: [afmc] --
18,390,924 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,391,275 UART: [cold-reset] --
18,395,813 UART: [state] Locking Datavault
18,400,091 UART: [state] Locking PCR0, PCR1 and PCR31
18,402,245 UART: [state] Locking ICCM
18,403,835 UART: [exit] Launching FMC @ 0x40000130
18,412,498 UART:
18,412,736 UART: Running Caliptra FMC ...
18,413,836 UART:
18,413,995 UART: [state] CFI Enabled
18,473,723 UART: [fht] FMC Alias Private Key: 7
20,238,558 UART: [art] Extend RT PCRs Done
20,239,801 UART: [art] Lock RT PCRs Done
20,241,249 UART: [art] Populate DV Done
20,246,881 UART: [fht] FMC Alias Private Key: 7
20,248,416 UART: [art] Derive CDI
20,249,148 UART: [art] Store in in slot 0x4
20,306,263 UART: [art] Derive Key Pair
20,307,258 UART: [art] Store priv key in slot 0x5
22,770,583 UART: [art] Derive Key Pair - Done
22,783,640 UART: [art] Signing Cert with AUTHO
22,784,949 UART: RITY.KEYID = 7
24,496,653 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,155 UART: [art] PUB.X = D15D9A4AA3A8CAEF1CFB114F23291B2DD55D9406D02632BF2DD0B9669F73D66B44DF5935479AE4334D5534630636D600
24,505,448 UART: [art] PUB.Y = EEA44A7D3CDD54E7A118547B712CD9FB1DFE05C622CD35D6ABECF56F50202333BD91217437E5768E1F03060A7CBEDCAB
24,512,721 UART: [art] SIG.R = E5270BC664D53CF1D97A5F27885E81011AE0AA2B507FE9BBEE46CA3333F18C6FAD7B478EA2B9C25EF0A62C7A0328085D
24,520,108 UART: [art] SIG.S = 2228555B9BCB50E97FB0FE9AD1459B0763429FF8FECE0D62DDD2692C2274CC0F495AC32DFF50A892CC5C9B5FDE9E2C90
25,499,428 UART: mbox::rt_entry...
25,500,396 UART: ____ _ _ _ ____ _____
25,502,331 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,504,343 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,506,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,508,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,510,135 UART: |_|
25,510,968 UART:
25,635,284 UART: [rt] Runtime listening for mailbox commands...
25,637,394 >>> mbox cmd response data (48 bytes)
25,638,013 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,640,368 >>> mbox cmd response data (48 bytes)
25,641,264 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,655,159 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,208,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,248,625 >>> mbox cmd response data (12 bytes)
10,251,723 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,082,926 >>> mbox cmd response: success
18,369,360 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,384,486 UART:
18,384,813 UART: Running Caliptra FMC ...
18,385,962 UART:
18,386,132 UART: [state] CFI Enabled
18,453,086 UART: [fht] FMC Alias Private Key: 7
20,216,697 UART: [art] Extend RT PCRs Done
20,217,931 UART: [art] Lock RT PCRs Done
20,219,671 UART: [art] Populate DV Done
20,225,037 UART: [fht] FMC Alias Private Key: 7
20,226,636 UART: [art] Derive CDI
20,227,451 UART: [art] Store in in slot 0x4
20,286,039 UART: [art] Derive Key Pair
20,287,086 UART: [art] Store priv key in slot 0x5
22,750,129 UART: [art] Derive Key Pair - Done
22,763,288 UART: [art] Signing Cert with AUTHO
22,764,593 UART: RITY.KEYID = 7
24,475,561 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,067 UART: [art] PUB.X = CFDE840F527387267F13AC86695A71A8AB92E23F0768D4C0975C751B1AB7748DBDB4A0FD4BA580B226FF4E8486CBCC4A
24,484,368 UART: [art] PUB.Y = A28231B295ACB2F47CAF0CDEEFCE0537D5F88F8EAC36B89AD0C7CC949781A0A87D03830A28AF33A5242E6D3C36DBB429
24,491,666 UART: [art] SIG.R = 2327DB40BDC27DB0EB147C2F336E9418A97AF48134B75C65B171F99B90DF3FBA188F04E42CEA3C6901C00F795F2A0F4A
24,499,052 UART: [art] SIG.S = 9C589542E3C7C12100109D90474AFADA43DDCE9735F8278DBB5E0EAFC93C3E5CF580425ED845091FD4C535AB73E30B77
25,477,731 UART: mbox::rt_entry...
25,478,698 UART: ____ _ _ _ ____ _____
25,480,630 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,482,637 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,484,496 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,486,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,488,428 UART: |_|
25,489,241 UART:
25,614,875 UART: [rt] Runtime listening for mailbox commands...
25,617,039 >>> mbox cmd response data (48 bytes)
25,617,603 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,619,923 >>> mbox cmd response data (48 bytes)
25,620,806 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,634,666 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
2,212,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,213,664 UART:
2,213,913 UART: Running Caliptra ROM ...
2,214,983 UART:
2,215,133 UART: [state] CFI Enabled
2,216,029 UART: [state] LifecycleState = Unprovisioned
2,217,705 UART: [state] DebugLocked = No
2,218,732 UART: [state] WD Timer not started. Device not locked for debugging
2,221,204 UART: [kat] SHA2-256
2,221,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,224,875 UART: [kat] ++
2,225,327 UART: [kat] sha1
2,225,840 UART: [kat] SHA2-256
2,226,581 UART: [kat] SHA2-384
2,227,245 UART: [kat] SHA2-512-ACC
2,228,087 UART: [kat] ECC-384
3,293,464 UART: [kat] HMAC-384Kdf
3,307,184 UART: [kat] LMS
3,838,984 UART: [kat] --
3,843,840 UART: [cold-reset] ++
3,845,768 UART: [fht] FHT @ 0x50003400
3,857,243 UART: [idev] ++
3,857,924 UART: [idev] CDI.KEYID = 6
3,858,891 UART: [idev] SUBJECT.KEYID = 7
3,860,182 UART: [idev] UDS.KEYID = 0
3,878,084 UART: [idev] Erasing UDS.KEYID = 0
6,338,101 UART: [idev] Sha1 KeyId Algorithm
6,360,522 UART: [idev] --
6,365,308 UART: [ldev] ++
6,365,998 UART: [ldev] CDI.KEYID = 6
6,366,961 UART: [ldev] SUBJECT.KEYID = 5
6,368,121 UART: [ldev] AUTHORITY.KEYID = 7
6,369,350 UART: [ldev] FE.KEYID = 1
6,380,879 UART: [ldev] Erasing FE.KEYID = 1
8,865,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,654,640 UART: [ldev] --
10,660,227 UART: [fwproc] Wait for Commands...
10,663,029 UART: [fwproc] Recv command 0x4d454153
10,672,797 >>> mbox cmd response data (12 bytes)
10,675,364 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
10,774,936 UART: [fwproc] Recv command 0x46574c44
10,776,967 UART: [fwproc] Recv'd Img size: 78632 bytes
13,786,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,865,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,981,812 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,310,854 >>> mbox cmd response: success
14,314,891 UART: [afmc] ++
14,315,598 UART: [afmc] CDI.KEYID = 6
14,316,830 UART: [afmc] SUBJECT.KEYID = 7
14,318,257 UART: [afmc] AUTHORITY.KEYID = 5
16,821,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,576,374 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,430 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,615,504 UART: [afmc] --
18,619,273 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,619,634 UART: [cold-reset] --
18,623,633 UART: [state] Locking Datavault
18,627,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,630,006 UART: [state] Locking ICCM
18,631,946 UART: [exit] Launching FMC @ 0x40000130
18,640,615 UART:
18,640,847 UART: Running Caliptra FMC ...
18,641,946 UART:
18,642,108 UART: [state] CFI Enabled
18,650,316 UART: [fht] FMC Alias Private Key: 7
20,406,734 UART: [art] Extend RT PCRs Done
20,407,956 UART: [art] Lock RT PCRs Done
20,409,530 UART: [art] Populate DV Done
20,415,105 UART: [fht] FMC Alias Private Key: 7
20,416,802 UART: [art] Derive CDI
20,417,616 UART: [art] Store in in slot 0x4
20,460,275 UART: [art] Derive Key Pair
20,461,316 UART: [art] Store priv key in slot 0x5
22,888,073 UART: [art] Derive Key Pair - Done
22,900,880 UART: [art] Signing Cert with AUTHO
22,902,189 UART: RITY.KEYID = 7
24,607,589 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,093 UART: [art] PUB.X = 593D1F949A22F600137A24B270F785353D17A47B319877E54CC3DAC185EB1725077C71110EA52A9C215CC7ECACA963F0
24,616,344 UART: [art] PUB.Y = 159BBAE278EC565D3A59045610B1ADC6106FC9CC25DF11C70C2D804412D7A3D620EEB90F00C89F18F259DDBEA869F7C4
24,623,631 UART: [art] SIG.R = 214221347BDEE714EC0702C1222523837E1E31C2411461110476DAE714A10D3CCF6ED6F17C09795798CC045C178B75CE
24,630,965 UART: [art] SIG.S = A37BB8995B398E87759E0ED09142B45FD2A3075894349CD31064ACBED82F5CA6C71FD1918C0203B438D8D5617B8F54BE
25,609,410 UART: mbox::rt_entry...
25,610,379 UART: ____ _ _ _ ____ _____
25,612,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,614,316 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,616,245 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,618,174 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,620,099 UART: |_|
25,620,905 UART:
25,745,706 UART: [rt] Runtime listening for mailbox commands...
25,747,838 >>> mbox cmd response data (48 bytes)
25,748,425 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,750,745 >>> mbox cmd response data (48 bytes)
25,751,648 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,765,538 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,221,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,476,204 >>> mbox cmd response data (12 bytes)
10,478,870 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,306,702 >>> mbox cmd response: success
18,545,450 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,562,091 UART:
18,562,429 UART: Running Caliptra FMC ...
18,563,577 UART:
18,563,743 UART: [state] CFI Enabled
18,571,217 UART: [fht] FMC Alias Private Key: 7
20,328,158 UART: [art] Extend RT PCRs Done
20,329,389 UART: [art] Lock RT PCRs Done
20,330,878 UART: [art] Populate DV Done
20,336,395 UART: [fht] FMC Alias Private Key: 7
20,338,092 UART: [art] Derive CDI
20,338,909 UART: [art] Store in in slot 0x4
20,381,514 UART: [art] Derive Key Pair
20,382,558 UART: [art] Store priv key in slot 0x5
22,809,094 UART: [art] Derive Key Pair - Done
22,821,833 UART: [art] Signing Cert with AUTHO
22,823,164 UART: RITY.KEYID = 7
24,529,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,530,541 UART: [art] PUB.X = 1F9F57FDE0F43DFFC67DEC32FF65E87184C912C1142996203CCCF9875647116F5A09D8529A1DB89247E0920E0E0A261C
24,537,799 UART: [art] PUB.Y = 81B2EB827F124296A366726D4C45B9560B5603C5D5C0016DD07CF97131FAEBFF2B6696F0326BA3B883BF6F4864ADF831
24,545,044 UART: [art] SIG.R = 166CD0DB53644A18546627363E6249F194BBBDF3C0D8168A85D1F164AABF7655C1D832E51B8070301C773F847AA7606F
24,552,435 UART: [art] SIG.S = CD3FCE3ED51A59C0EB9DCA8A075DD53AA8E0B1A8DF86F9E0C6D1F6D6BF1245B4EF6DC828A6C7FB5075B2079E9C2EC687
25,530,630 UART: mbox::rt_entry...
25,531,589 UART: ____ _ _ _ ____ _____
25,533,569 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,535,577 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,537,506 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,539,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,541,429 UART: |_|
25,542,267 UART:
25,666,325 UART: [rt] Runtime listening for mailbox commands...
25,668,444 >>> mbox cmd response data (48 bytes)
25,669,097 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,671,634 >>> mbox cmd response data (48 bytes)
25,672,532 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,686,423 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,730 UART: [state] LifecycleState = Unprovisioned
86,385 UART: [state] DebugLocked = No
87,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,787 UART: [kat] SHA2-256
882,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,833 UART: [kat] ++
886,985 UART: [kat] sha1
891,309 UART: [kat] SHA2-256
893,247 UART: [kat] SHA2-384
896,120 UART: [kat] SHA2-512-ACC
898,021 UART: [kat] ECC-384
903,392 UART: [kat] HMAC-384Kdf
908,026 UART: [kat] LMS
1,476,222 UART: [kat] --
1,477,167 UART: [cold-reset] ++
1,477,585 UART: [fht] Storing FHT @ 0x50003400
1,480,392 UART: [idev] ++
1,480,560 UART: [idev] CDI.KEYID = 6
1,480,920 UART: [idev] SUBJECT.KEYID = 7
1,481,344 UART: [idev] UDS.KEYID = 0
1,489,538 UART: [idev] Erasing UDS.KEYID = 0
1,506,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,902 UART: [idev] --
1,515,875 UART: [ldev] ++
1,516,043 UART: [ldev] CDI.KEYID = 6
1,516,406 UART: [ldev] SUBJECT.KEYID = 5
1,516,832 UART: [ldev] AUTHORITY.KEYID = 7
1,517,295 UART: [ldev] FE.KEYID = 1
1,522,397 UART: [ldev] Erasing FE.KEYID = 1
1,547,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,940 UART: [ldev] --
1,587,343 UART: [fwproc] Waiting for Commands...
1,588,086 UART: [fwproc] Received command 0x4d454153
1,592,150 >>> mbox cmd response data (12 bytes)
1,592,151 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,592,289 UART: [fwproc] Received command 0x46574c44
1,593,080 UART: [fwproc] Received Image of size 78632 bytes
2,481,693 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,509,033 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,538,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,620,648 >>> mbox cmd response: success
2,621,852 UART: [afmc] ++
2,622,020 UART: [afmc] CDI.KEYID = 6
2,622,382 UART: [afmc] SUBJECT.KEYID = 7
2,622,807 UART: [afmc] AUTHORITY.KEYID = 5
2,657,844 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,674,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,674,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,680,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,686,505 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,692,195 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,699,960 UART: [afmc] --
2,700,964 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,700,986 UART: [cold-reset] --
2,702,008 UART: [state] Locking Datavault
2,703,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,703,741 UART: [state] Locking ICCM
2,704,201 UART: [exit] Launching FMC @ 0x40000130
2,709,530 UART:
2,709,546 UART: Running Caliptra FMC ...
2,709,954 UART:
2,710,008 UART: [state] CFI Enabled
2,720,425 UART: [fht] FMC Alias Private Key: 7
2,828,654 UART: [art] Extend RT PCRs Done
2,829,082 UART: [art] Lock RT PCRs Done
2,830,730 UART: [art] Populate DV Done
2,839,015 UART: [fht] FMC Alias Private Key: 7
2,840,061 UART: [art] Derive CDI
2,840,341 UART: [art] Store in in slot 0x4
2,926,136 UART: [art] Derive Key Pair
2,926,496 UART: [art] Store priv key in slot 0x5
2,938,922 UART: [art] Derive Key Pair - Done
2,953,614 UART: [art] Signing Cert with AUTHO
2,954,094 UART: RITY.KEYID = 7
2,969,504 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,269 UART: [art] PUB.X = 0980A1BD92D2529F6BB79A7A8DCD08536C3C331299133707776B96FDADB2DEA7517137EE6DD6B0E99BA66D37C1F1F8C1
2,977,040 UART: [art] PUB.Y = D935B6B7DDFBAA1950B60FF0B1D081A65F4E41D97C2F8DE8F8EBE02600C47BB46B93B9C08C9F64EA78C29873EEAFBAD9
2,983,991 UART: [art] SIG.R = E890F1E82B92711FA6E1E8609199597A9752A2F46FC785838D70E39E144E1344888A0414613BD9A4B989DA4F06729913
2,990,743 UART: [art] SIG.S = 51B7C0F09BC5EDC6A8F98AA176A15C07BA2BCD93F5AD2A056A3BBB1C38DA11A358E0F0D0E6BDD2299029C38082BAA831
3,014,368 UART: mbox::rt_entry...
3,014,740 UART: ____ _ _ _ ____ _____
3,015,524 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,324 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,092 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,628 UART: |_|
3,018,940 UART:
3,137,987 UART: [rt] Runtime listening for mailbox commands...
3,139,158 >>> mbox cmd response data (48 bytes)
3,139,159 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,141,942 >>> mbox cmd response data (48 bytes)
3,141,943 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,079 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,251 >>> mbox cmd response data (12 bytes)
1,444,252 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,468,758 >>> mbox cmd response: success
2,524,535 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,530,930 UART:
2,530,946 UART: Running Caliptra FMC ...
2,531,354 UART:
2,531,408 UART: [state] CFI Enabled
2,541,535 UART: [fht] FMC Alias Private Key: 7
2,649,902 UART: [art] Extend RT PCRs Done
2,650,330 UART: [art] Lock RT PCRs Done
2,651,532 UART: [art] Populate DV Done
2,659,659 UART: [fht] FMC Alias Private Key: 7
2,660,747 UART: [art] Derive CDI
2,661,027 UART: [art] Store in in slot 0x4
2,747,026 UART: [art] Derive Key Pair
2,747,386 UART: [art] Store priv key in slot 0x5
2,760,812 UART: [art] Derive Key Pair - Done
2,775,696 UART: [art] Signing Cert with AUTHO
2,776,176 UART: RITY.KEYID = 7
2,791,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,097 UART: [art] PUB.X = 93B6EDE84234C0235FD44B0923F42AE80A05F4DB5CD5CDC796441725A09BF5C2EED1D370EB9B04B37762A914E017F2A6
2,798,865 UART: [art] PUB.Y = 594CACD73E62D133DFCF067879E0E0A92A7E5633203B512A1619859E33E1796A9CFE9C7C8DEDA3730C3CC11B210D3BD6
2,805,816 UART: [art] SIG.R = F0A218F613E6FF88DD9A95DEF423EC9331FB72B532FD36BE506E2FDE17221B620AC7FA5BC1351A6A86A25E785AD1FA2D
2,812,603 UART: [art] SIG.S = EDD62A013A8BDA43649AFB116D2334E33EC3C3457F8DB8C3DB67983573DF7883D37CF6C34F58908ED18FBFA559C599E4
2,836,737 UART: mbox::rt_entry...
2,837,109 UART: ____ _ _ _ ____ _____
2,837,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,840,997 UART: |_|
2,841,309 UART:
2,960,217 UART: [rt] Runtime listening for mailbox commands...
2,961,388 >>> mbox cmd response data (48 bytes)
2,961,389 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,964,172 >>> mbox cmd response data (48 bytes)
2,964,173 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,979,309 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,668 UART: [kat] SHA2-256
882,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,714 UART: [kat] ++
886,866 UART: [kat] sha1
891,036 UART: [kat] SHA2-256
892,974 UART: [kat] SHA2-384
895,653 UART: [kat] SHA2-512-ACC
897,554 UART: [kat] ECC-384
903,285 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,476,976 UART: [cold-reset] ++
1,477,406 UART: [fht] Storing FHT @ 0x50003400
1,480,285 UART: [idev] ++
1,480,453 UART: [idev] CDI.KEYID = 6
1,480,813 UART: [idev] SUBJECT.KEYID = 7
1,481,237 UART: [idev] UDS.KEYID = 0
1,488,937 UART: [idev] Erasing UDS.KEYID = 0
1,505,133 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,856 UART: [ldev] Erasing FE.KEYID = 1
1,547,255 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,249 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,341 UART: [fwproc] Received command 0x4d454153
1,591,405 >>> mbox cmd response data (12 bytes)
1,591,406 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,591,708 UART: [fwproc] Received command 0x46574c44
1,592,499 UART: [fwproc] Received Image of size 78632 bytes
2,480,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,507,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,537,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,619,447 >>> mbox cmd response: success
2,620,553 UART: [afmc] ++
2,620,721 UART: [afmc] CDI.KEYID = 6
2,621,083 UART: [afmc] SUBJECT.KEYID = 7
2,621,508 UART: [afmc] AUTHORITY.KEYID = 5
2,656,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,725 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,673,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,679,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,685,118 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,808 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,703 UART: [afmc] --
2,699,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,699,667 UART: [cold-reset] --
2,700,393 UART: [state] Locking Datavault
2,701,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,114 UART: [state] Locking ICCM
2,702,538 UART: [exit] Launching FMC @ 0x40000130
2,707,867 UART:
2,707,883 UART: Running Caliptra FMC ...
2,708,291 UART:
2,708,434 UART: [state] CFI Enabled
2,719,199 UART: [fht] FMC Alias Private Key: 7
2,826,860 UART: [art] Extend RT PCRs Done
2,827,288 UART: [art] Lock RT PCRs Done
2,828,770 UART: [art] Populate DV Done
2,836,921 UART: [fht] FMC Alias Private Key: 7
2,838,027 UART: [art] Derive CDI
2,838,307 UART: [art] Store in in slot 0x4
2,924,558 UART: [art] Derive Key Pair
2,924,918 UART: [art] Store priv key in slot 0x5
2,938,248 UART: [art] Derive Key Pair - Done
2,953,215 UART: [art] Signing Cert with AUTHO
2,953,695 UART: RITY.KEYID = 7
2,969,167 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,932 UART: [art] PUB.X = F9D8EF09F6D1A51AEF10CBDB5A271A19AEEBAC72859ED1F1877E538043C8AFCAE8162F22019C6DA14F98D2C4E01BFDA2
2,976,722 UART: [art] PUB.Y = 49C8CCA83AF48DC01BB6C9E99EEDEFE4CD7F2CF9106E2B9584E4222B889BCFB991CE526E14DE5DE4BE2737754513CEA3
2,983,696 UART: [art] SIG.R = A9F9FF1C58E67C2237181922553F9062FCCAE6E64F3ADC3674B18316DEE547EF3E1BA5ABBA08FDDABBD6E8C28368925C
2,990,483 UART: [art] SIG.S = F254A1E3E399B4050979D4153D2A33EC04AB020F3E65F62A1E28A6EF4ED040C57CF88148DDCDC0E2F890DD9B145F7889
3,013,957 UART: mbox::rt_entry...
3,014,329 UART: ____ _ _ _ ____ _____
3,015,113 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,015,913 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,016,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,449 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,217 UART: |_|
3,018,529 UART:
3,138,715 UART: [rt] Runtime listening for mailbox commands...
3,139,886 >>> mbox cmd response data (48 bytes)
3,139,887 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,142,670 >>> mbox cmd response data (48 bytes)
3,142,671 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,807 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,580 >>> mbox cmd response data (12 bytes)
1,444,581 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,468,213 >>> mbox cmd response: success
2,523,998 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,530,401 UART:
2,530,417 UART: Running Caliptra FMC ...
2,530,825 UART:
2,530,968 UART: [state] CFI Enabled
2,541,713 UART: [fht] FMC Alias Private Key: 7
2,649,740 UART: [art] Extend RT PCRs Done
2,650,168 UART: [art] Lock RT PCRs Done
2,652,044 UART: [art] Populate DV Done
2,660,229 UART: [fht] FMC Alias Private Key: 7
2,661,333 UART: [art] Derive CDI
2,661,613 UART: [art] Store in in slot 0x4
2,747,734 UART: [art] Derive Key Pair
2,748,094 UART: [art] Store priv key in slot 0x5
2,761,262 UART: [art] Derive Key Pair - Done
2,776,007 UART: [art] Signing Cert with AUTHO
2,776,487 UART: RITY.KEYID = 7
2,791,811 UART: [art] Erasing AUTHORITY.KEYID = 7
2,792,576 UART: [art] PUB.X = FF8B0A8169A5672F129763F6A670F266C3E7F06526B5FA3958AB67AF800FD3C74DBA60129DAD989115600FA9F03DA750
2,799,341 UART: [art] PUB.Y = ED3F253E1F771AE79C03E95E90F8E8DFF79F1ED4C028E0F4034FD7FFCE0D2FCB689DBB47F0AA7D089934E3CA9C9681AB
2,806,305 UART: [art] SIG.R = E541AD77669E2996689DAEE8C2085075D264DA825258A8D9F9172E4002C45919AA90941F06830FFE5264AFD1E70B41FF
2,813,058 UART: [art] SIG.S = 0C855E0CDD94D025863FDD588C3C2DEF480204CAD968C6EE295A70864C7CFCA273AF1251B2E06FA32AA4635EAF7E20AE
2,836,911 UART: mbox::rt_entry...
2,837,283 UART: ____ _ _ _ ____ _____
2,838,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,838,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,839,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,840,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,841,171 UART: |_|
2,841,483 UART:
2,961,074 UART: [rt] Runtime listening for mailbox commands...
2,962,245 >>> mbox cmd response data (48 bytes)
2,962,246 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,965,029 >>> mbox cmd response data (48 bytes)
2,965,030 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,980,166 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,529 UART: [kat] SHA2-256
903,469 UART: [kat] SHA2-384
906,178 UART: [kat] SHA2-512-ACC
908,079 UART: [kat] ECC-384
917,640 UART: [kat] HMAC-384Kdf
922,322 UART: [kat] LMS
1,170,650 UART: [kat] --
1,171,595 UART: [cold-reset] ++
1,172,077 UART: [fht] FHT @ 0x50003400
1,174,682 UART: [idev] ++
1,174,850 UART: [idev] CDI.KEYID = 6
1,175,210 UART: [idev] SUBJECT.KEYID = 7
1,175,634 UART: [idev] UDS.KEYID = 0
1,183,814 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,437 UART: [idev] --
1,210,491 UART: [ldev] ++
1,210,659 UART: [ldev] CDI.KEYID = 6
1,211,022 UART: [ldev] SUBJECT.KEYID = 5
1,211,448 UART: [ldev] AUTHORITY.KEYID = 7
1,211,911 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,243,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,897 UART: [ldev] --
1,283,256 UART: [fwproc] Wait for Commands...
1,283,994 UART: [fwproc] Recv command 0x4d454153
1,288,003 >>> mbox cmd response data (12 bytes)
1,288,004 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,288,065 UART: [fwproc] Recv command 0x46574c44
1,288,793 UART: [fwproc] Recv'd Img size: 78632 bytes
2,176,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,968 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,315,135 >>> mbox cmd response: success
2,316,257 UART: [afmc] ++
2,316,425 UART: [afmc] CDI.KEYID = 6
2,316,787 UART: [afmc] SUBJECT.KEYID = 7
2,317,212 UART: [afmc] AUTHORITY.KEYID = 5
2,352,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,750 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,363 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,082 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,768 UART: [afmc] --
2,395,760 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,782 UART: [cold-reset] --
2,396,688 UART: [state] Locking Datavault
2,397,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,249 UART: [state] Locking ICCM
2,398,833 UART: [exit] Launching FMC @ 0x40000130
2,404,162 UART:
2,404,178 UART: Running Caliptra FMC ...
2,404,586 UART:
2,404,640 UART: [state] CFI Enabled
2,414,961 UART: [fht] FMC Alias Private Key: 7
2,522,506 UART: [art] Extend RT PCRs Done
2,522,934 UART: [art] Lock RT PCRs Done
2,524,436 UART: [art] Populate DV Done
2,532,629 UART: [fht] FMC Alias Private Key: 7
2,533,671 UART: [art] Derive CDI
2,533,951 UART: [art] Store in in slot 0x4
2,619,542 UART: [art] Derive Key Pair
2,619,902 UART: [art] Store priv key in slot 0x5
2,632,076 UART: [art] Derive Key Pair - Done
2,647,048 UART: [art] Signing Cert with AUTHO
2,647,528 UART: RITY.KEYID = 7
2,662,594 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,359 UART: [art] PUB.X = 723D7160D24BB05A17A17E1DDD3742AEE06EB50C7CA230732E0C71FD62897459186AEF231F5003298419DB8C67F5FC7B
2,670,124 UART: [art] PUB.Y = 9377CDF2CC0DDE036C4A18267F2DD4555B947B5250FF80BD4E9B7ED403359501D6892327F784C2E17883A67DA0088392
2,677,057 UART: [art] SIG.R = 873FDF350B92CE9A0ACE3E83277F66B8BC12593AE7EFF453E5E9FF84B79586E39A321CE5A09F18DB4F76793A1B74171D
2,683,833 UART: [art] SIG.S = E24954755855E44D0E26425D8AEF90857417218A7235BB785C42E90D533FC1343B8B106828CB3C4285B93EE45D734FA7
2,707,720 UART: mbox::rt_entry...
2,708,092 UART: ____ _ _ _ ____ _____
2,708,876 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,676 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,444 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,212 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,980 UART: |_|
2,712,292 UART:
2,830,716 UART: [rt] Runtime listening for mailbox commands...
2,831,887 >>> mbox cmd response data (48 bytes)
2,831,888 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,834,671 >>> mbox cmd response data (48 bytes)
2,834,672 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,849,808 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,225 >>> mbox cmd response data (12 bytes)
1,142,226 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,165,625 >>> mbox cmd response: success
2,221,452 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,861 UART:
2,227,877 UART: Running Caliptra FMC ...
2,228,285 UART:
2,228,339 UART: [state] CFI Enabled
2,238,560 UART: [fht] FMC Alias Private Key: 7
2,346,331 UART: [art] Extend RT PCRs Done
2,346,759 UART: [art] Lock RT PCRs Done
2,348,489 UART: [art] Populate DV Done
2,356,538 UART: [fht] FMC Alias Private Key: 7
2,357,640 UART: [art] Derive CDI
2,357,920 UART: [art] Store in in slot 0x4
2,443,905 UART: [art] Derive Key Pair
2,444,265 UART: [art] Store priv key in slot 0x5
2,457,785 UART: [art] Derive Key Pair - Done
2,472,782 UART: [art] Signing Cert with AUTHO
2,473,262 UART: RITY.KEYID = 7
2,488,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,015 UART: [art] PUB.X = 9382C3F5A102CBC6EB6E32F7C7567C87B15B2BEA2F52D22542A9243EC5464E13B5230D48540783C91443FC89622DEAAB
2,495,780 UART: [art] PUB.Y = 939B0B1EBF88942C6104002800BE8A7BA4DFB9D1AF21D3AB789E5E6B878C82C25874550FD90669C7D4D9FF499D78ACA0
2,502,684 UART: [art] SIG.R = 70D6169980F819D47639BB8FB05A0517EDF616C3C4EFB8E3043AAA637DBC3DA1A336C42425804C1D9B19474D596196E9
2,509,450 UART: [art] SIG.S = 43FF48AE17A095288E0B7511B116A2F865792689C76DE71040FA5DEAF9FED6840D59096739E547D849B19F4C4F832DD5
2,533,608 UART: mbox::rt_entry...
2,533,980 UART: ____ _ _ _ ____ _____
2,534,764 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,564 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,332 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,100 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,868 UART: |_|
2,538,180 UART:
2,657,215 UART: [rt] Runtime listening for mailbox commands...
2,658,386 >>> mbox cmd response data (48 bytes)
2,658,387 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,661,170 >>> mbox cmd response data (48 bytes)
2,661,171 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,676,307 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
917,913 UART: [kat] HMAC-384Kdf
922,419 UART: [kat] LMS
1,170,747 UART: [kat] --
1,171,380 UART: [cold-reset] ++
1,171,956 UART: [fht] FHT @ 0x50003400
1,174,731 UART: [idev] ++
1,174,899 UART: [idev] CDI.KEYID = 6
1,175,259 UART: [idev] SUBJECT.KEYID = 7
1,175,683 UART: [idev] UDS.KEYID = 0
1,183,147 UART: [idev] Erasing UDS.KEYID = 0
1,200,324 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,874 UART: [ldev] ++
1,210,042 UART: [ldev] CDI.KEYID = 6
1,210,405 UART: [ldev] SUBJECT.KEYID = 5
1,210,831 UART: [ldev] AUTHORITY.KEYID = 7
1,211,294 UART: [ldev] FE.KEYID = 1
1,216,742 UART: [ldev] Erasing FE.KEYID = 1
1,243,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,912 UART: [ldev] --
1,282,179 UART: [fwproc] Wait for Commands...
1,282,893 UART: [fwproc] Recv command 0x4d454153
1,286,902 >>> mbox cmd response data (12 bytes)
1,286,903 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,287,038 UART: [fwproc] Recv command 0x46574c44
1,287,766 UART: [fwproc] Recv'd Img size: 78632 bytes
2,175,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,277 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,314,556 >>> mbox cmd response: success
2,315,704 UART: [afmc] ++
2,315,872 UART: [afmc] CDI.KEYID = 6
2,316,234 UART: [afmc] SUBJECT.KEYID = 7
2,316,659 UART: [afmc] AUTHORITY.KEYID = 5
2,352,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,926 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,445 UART: [afmc] --
2,395,351 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,373 UART: [cold-reset] --
2,396,187 UART: [state] Locking Datavault
2,397,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,640 UART: [state] Locking ICCM
2,398,156 UART: [exit] Launching FMC @ 0x40000130
2,403,485 UART:
2,403,501 UART: Running Caliptra FMC ...
2,403,909 UART:
2,404,052 UART: [state] CFI Enabled
2,414,929 UART: [fht] FMC Alias Private Key: 7
2,523,656 UART: [art] Extend RT PCRs Done
2,524,084 UART: [art] Lock RT PCRs Done
2,525,350 UART: [art] Populate DV Done
2,533,663 UART: [fht] FMC Alias Private Key: 7
2,534,615 UART: [art] Derive CDI
2,534,895 UART: [art] Store in in slot 0x4
2,620,500 UART: [art] Derive Key Pair
2,620,860 UART: [art] Store priv key in slot 0x5
2,634,062 UART: [art] Derive Key Pair - Done
2,648,451 UART: [art] Signing Cert with AUTHO
2,648,931 UART: RITY.KEYID = 7
2,664,083 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,848 UART: [art] PUB.X = A43F99F07FAAC480730FEFE5B3A6A3A1997B5838998167346A2A9C6F3741C2495ED038A213847F178C2D667B713E5E3F
2,671,615 UART: [art] PUB.Y = 29917F533F26545D73D04AD887828C12C539D55485511A4574BA7825740600B9D2D4CAED50CAED59F206E14A0562C3CF
2,678,530 UART: [art] SIG.R = AC676926D8F4D1D128F3BE7EE5EA834381B690861AA40BAC5FDB123F109DBEFD7D67CD5FF0C89608454D083313A74785
2,685,301 UART: [art] SIG.S = AC7AD273AFEF6BE74EAF513703842A906530FB483E8BFA95CA12945B91B35129BD0F415AC2C0B95310D691E2624FE2DD
2,708,894 UART: mbox::rt_entry...
2,709,266 UART: ____ _ _ _ ____ _____
2,710,050 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,850 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,618 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,386 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,154 UART: |_|
2,713,466 UART:
2,831,784 UART: [rt] Runtime listening for mailbox commands...
2,832,955 >>> mbox cmd response data (48 bytes)
2,832,956 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,739 >>> mbox cmd response data (48 bytes)
2,835,740 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,876 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,882 >>> mbox cmd response data (12 bytes)
1,144,883 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,169,771 >>> mbox cmd response: success
2,225,682 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,231,775 UART:
2,231,791 UART: Running Caliptra FMC ...
2,232,199 UART:
2,232,342 UART: [state] CFI Enabled
2,242,943 UART: [fht] FMC Alias Private Key: 7
2,351,594 UART: [art] Extend RT PCRs Done
2,352,022 UART: [art] Lock RT PCRs Done
2,353,086 UART: [art] Populate DV Done
2,361,313 UART: [fht] FMC Alias Private Key: 7
2,362,243 UART: [art] Derive CDI
2,362,523 UART: [art] Store in in slot 0x4
2,447,918 UART: [art] Derive Key Pair
2,448,278 UART: [art] Store priv key in slot 0x5
2,461,366 UART: [art] Derive Key Pair - Done
2,476,188 UART: [art] Signing Cert with AUTHO
2,476,668 UART: RITY.KEYID = 7
2,492,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,493,069 UART: [art] PUB.X = 1D3EBE2D9DA1ED408EA333CB942D390CF6DDDB63071D8E91BDA8FB2F81C9CDEF6877E762A0466FD07D65E89B6CAE211C
2,499,859 UART: [art] PUB.Y = DD7924C8D40ACBFF82B0C7F20196175ED7CAA5090A77D1FE098C524E4D6FD12B995138B5E95521C0FF0B82A5AF2861D6
2,506,803 UART: [art] SIG.R = FABEFEB61906A11939F5D8CADE8ADFC732867093BE6469D651E579662699BA5C7AE7D50F9DD1AF64274199192CA9D29A
2,513,579 UART: [art] SIG.S = 5A614CBA3971056A1AADBC6DEDD9EA32960F8ED4E53FF0413B2311C2252A9150830EF3F96ED366E527A640F5628812C2
2,537,317 UART: mbox::rt_entry...
2,537,689 UART: ____ _ _ _ ____ _____
2,538,473 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,539,273 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,540,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,540,809 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,541,577 UART: |_|
2,541,889 UART:
2,661,118 UART: [rt] Runtime listening for mailbox commands...
2,662,289 >>> mbox cmd response data (48 bytes)
2,662,290 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,665,073 >>> mbox cmd response data (48 bytes)
2,665,074 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,680,210 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,282 UART: [kat] LMS
1,168,594 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,169,887 UART: [fht] FHT @ 0x50003400
1,172,381 UART: [idev] ++
1,172,549 UART: [idev] CDI.KEYID = 6
1,172,910 UART: [idev] SUBJECT.KEYID = 7
1,173,335 UART: [idev] UDS.KEYID = 0
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,688 UART: [fwproc] Wait for Commands...
1,281,503 UART: [fwproc] Recv command 0x4d454153
1,285,530 >>> mbox cmd response data (12 bytes)
1,285,531 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,285,726 UART: [fwproc] Recv command 0x46574c44
1,286,459 UART: [fwproc] Recv'd Img size: 78632 bytes
2,175,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,203,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,232,939 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,315,119 >>> mbox cmd response: success
2,316,308 UART: [afmc] ++
2,316,476 UART: [afmc] CDI.KEYID = 6
2,316,839 UART: [afmc] SUBJECT.KEYID = 7
2,317,265 UART: [afmc] AUTHORITY.KEYID = 5
2,352,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,889 UART: [afmc] --
2,395,945 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,967 UART: [cold-reset] --
2,396,671 UART: [state] Locking Datavault
2,397,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,320 UART: [state] Locking ICCM
2,398,772 UART: [exit] Launching FMC @ 0x40000130
2,404,101 UART:
2,404,117 UART: Running Caliptra FMC ...
2,404,525 UART:
2,404,579 UART: [state] CFI Enabled
2,415,220 UART: [fht] FMC Alias Private Key: 7
2,523,397 UART: [art] Extend RT PCRs Done
2,523,825 UART: [art] Lock RT PCRs Done
2,524,911 UART: [art] Populate DV Done
2,533,186 UART: [fht] FMC Alias Private Key: 7
2,534,226 UART: [art] Derive CDI
2,534,506 UART: [art] Store in in slot 0x4
2,620,443 UART: [art] Derive Key Pair
2,620,803 UART: [art] Store priv key in slot 0x5
2,633,871 UART: [art] Derive Key Pair - Done
2,648,785 UART: [art] Signing Cert with AUTHO
2,649,265 UART: RITY.KEYID = 7
2,664,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,665,140 UART: [art] PUB.X = 71955D3BBF897461B6A6409D4A75F1F78C7AD04734658EB851BB8679B455157808B77020CE97BA86A660529D65771FDC
2,671,901 UART: [art] PUB.Y = 75F8D1E1093F8AF45B597808540989117A77230B1276C3AF1139FD3D3BC9BB9942DCBE33E015F913D9A6B823FB20E1D5
2,678,841 UART: [art] SIG.R = 441F982FF0A41797C6F236A2E52F35C4254A2641097D0A949AC7406E9BD685E411DF0B699E5370ABC2080A1595C34B51
2,685,592 UART: [art] SIG.S = 496A285D98306D502C99B6E172462F0D90FB8ADD155BDE4F051C4686D18154154A40B21B3C51409F64EC0E133C3BB58F
2,709,192 UART: mbox::rt_entry...
2,709,564 UART: ____ _ _ _ ____ _____
2,710,348 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,148 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,916 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,684 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,452 UART: |_|
2,713,764 UART:
2,831,935 UART: [rt] Runtime listening for mailbox commands...
2,833,106 >>> mbox cmd response data (48 bytes)
2,833,107 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,890 >>> mbox cmd response data (48 bytes)
2,835,891 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,851,027 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,080 >>> mbox cmd response data (12 bytes)
1,139,081 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,022 >>> mbox cmd response: success
2,219,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,284 UART:
2,225,300 UART: Running Caliptra FMC ...
2,225,708 UART:
2,225,762 UART: [state] CFI Enabled
2,236,225 UART: [fht] FMC Alias Private Key: 7
2,344,590 UART: [art] Extend RT PCRs Done
2,345,018 UART: [art] Lock RT PCRs Done
2,346,430 UART: [art] Populate DV Done
2,354,573 UART: [fht] FMC Alias Private Key: 7
2,355,633 UART: [art] Derive CDI
2,355,913 UART: [art] Store in in slot 0x4
2,441,598 UART: [art] Derive Key Pair
2,441,958 UART: [art] Store priv key in slot 0x5
2,455,244 UART: [art] Derive Key Pair - Done
2,470,321 UART: [art] Signing Cert with AUTHO
2,470,801 UART: RITY.KEYID = 7
2,486,301 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,066 UART: [art] PUB.X = EEC93F54C16FE535E43340BEB8337B50110F383C35661336FCDCDBD8FBD0C448EA290E0240F61A555B3E1B6538E390B0
2,493,835 UART: [art] PUB.Y = 59535E7BDDAB5405C5420DC4DB4CE2495B6EAE2E73FF4346229F666F285B8E6F6FDC4059B650D272FB896E3ACB2152B0
2,500,791 UART: [art] SIG.R = 6508F221D4A8F069C4469697ADA1737B7C0224879D19C7067DA65E61315D49E7EE463CE5CACCA42119F4410A004436D3
2,507,523 UART: [art] SIG.S = 91E52EE8F7EFA34A84D650B79074813859CF0769EED0C812B9189F8D987C4288E32BB5E37D3C608D6AB41A7452C83F34
2,531,261 UART: mbox::rt_entry...
2,531,633 UART: ____ _ _ _ ____ _____
2,532,417 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,217 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,985 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,753 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,521 UART: |_|
2,535,833 UART:
2,655,148 UART: [rt] Runtime listening for mailbox commands...
2,656,319 >>> mbox cmd response data (48 bytes)
2,656,320 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,659,103 >>> mbox cmd response data (48 bytes)
2,659,104 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,674,240 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,141 UART: [kat] LMS
1,169,453 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,181,818 UART: [idev] Erasing UDS.KEYID = 0
1,199,254 UART: [idev] Sha1 KeyId Algorithm
1,207,898 UART: [idev] --
1,208,973 UART: [ldev] ++
1,209,141 UART: [ldev] CDI.KEYID = 6
1,209,505 UART: [ldev] SUBJECT.KEYID = 5
1,209,932 UART: [ldev] AUTHORITY.KEYID = 7
1,210,395 UART: [ldev] FE.KEYID = 1
1,215,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,817 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x4d454153
1,286,519 >>> mbox cmd response data (12 bytes)
1,286,520 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,286,641 UART: [fwproc] Recv command 0x46574c44
1,287,374 UART: [fwproc] Recv'd Img size: 78632 bytes
2,175,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,994 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,314,360 >>> mbox cmd response: success
2,315,625 UART: [afmc] ++
2,315,793 UART: [afmc] CDI.KEYID = 6
2,316,156 UART: [afmc] SUBJECT.KEYID = 7
2,316,582 UART: [afmc] AUTHORITY.KEYID = 5
2,352,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,368,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,369,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,375,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,381,104 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,386,823 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,394,646 UART: [afmc] --
2,395,732 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,395,754 UART: [cold-reset] --
2,396,612 UART: [state] Locking Datavault
2,397,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,491 UART: [state] Locking ICCM
2,398,947 UART: [exit] Launching FMC @ 0x40000130
2,404,276 UART:
2,404,292 UART: Running Caliptra FMC ...
2,404,700 UART:
2,404,843 UART: [state] CFI Enabled
2,415,608 UART: [fht] FMC Alias Private Key: 7
2,523,801 UART: [art] Extend RT PCRs Done
2,524,229 UART: [art] Lock RT PCRs Done
2,525,789 UART: [art] Populate DV Done
2,534,182 UART: [fht] FMC Alias Private Key: 7
2,535,182 UART: [art] Derive CDI
2,535,462 UART: [art] Store in in slot 0x4
2,621,159 UART: [art] Derive Key Pair
2,621,519 UART: [art] Store priv key in slot 0x5
2,634,559 UART: [art] Derive Key Pair - Done
2,649,465 UART: [art] Signing Cert with AUTHO
2,649,945 UART: RITY.KEYID = 7
2,665,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,666,172 UART: [art] PUB.X = 6C4A02D36DF63BA4B02F1C4ED22D96245BDCCE289E1C36F90336DF7D9F417954C3B35FDFC1C034C6C03A124D237D5624
2,672,948 UART: [art] PUB.Y = CAA9EF8A1F33479C6FE094F85B3CEEB2EB1252DEF9BC5053257F2DF17E032594027944F3030DCA08561E72A49BD7642E
2,679,893 UART: [art] SIG.R = 9928126793108742001C4D17FF225E9C1F060C1A345E30D7FD9E6DA807217C024ADA204EFD8C33D5B5396E9BE020141D
2,686,627 UART: [art] SIG.S = 47794AA8CAC697DB060C07C9E39D2C4345A89D54F581E51DFD50D5B08E170DFEEACB4A1AB87F179F8F234892165FB25C
2,709,840 UART: mbox::rt_entry...
2,710,212 UART: ____ _ _ _ ____ _____
2,710,996 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,796 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,712,564 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,713,332 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,714,100 UART: |_|
2,714,412 UART:
2,833,263 UART: [rt] Runtime listening for mailbox commands...
2,834,434 >>> mbox cmd response data (48 bytes)
2,834,435 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,837,218 >>> mbox cmd response data (48 bytes)
2,837,219 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,852,355 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,999 >>> mbox cmd response data (12 bytes)
1,140,000 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,939 >>> mbox cmd response: success
2,219,598 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,655 UART:
2,225,671 UART: Running Caliptra FMC ...
2,226,079 UART:
2,226,222 UART: [state] CFI Enabled
2,236,699 UART: [fht] FMC Alias Private Key: 7
2,344,318 UART: [art] Extend RT PCRs Done
2,344,746 UART: [art] Lock RT PCRs Done
2,346,564 UART: [art] Populate DV Done
2,354,683 UART: [fht] FMC Alias Private Key: 7
2,355,791 UART: [art] Derive CDI
2,356,071 UART: [art] Store in in slot 0x4
2,441,648 UART: [art] Derive Key Pair
2,442,008 UART: [art] Store priv key in slot 0x5
2,454,914 UART: [art] Derive Key Pair - Done
2,469,877 UART: [art] Signing Cert with AUTHO
2,470,357 UART: RITY.KEYID = 7
2,485,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,572 UART: [art] PUB.X = 95EF6391BFFC97596D3F6EA727E8929E8961FB7B5A7119F48589107754B99FFED871E1D5A4464D98882602B7CD80314A
2,493,337 UART: [art] PUB.Y = 04D613706C67FBC48D4BC5399DD8642B6AA99741B3938ECF0489F614B0498E46089302AC6EA648D62A472EAE26B43817
2,500,273 UART: [art] SIG.R = EFF116AD53F8CCD56F467650529AACD99DACE5A2135C6E218A2782E15895579F73F97E1169D8898DA38727FB7E132478
2,507,045 UART: [art] SIG.S = 9D1CF4BC4C18A2446B1B3D807126086EF50BAFC494093CAA147DCADC118C25F7F9C9472A091E70078521CA9628DA2631
2,530,601 UART: mbox::rt_entry...
2,530,973 UART: ____ _ _ _ ____ _____
2,531,757 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,557 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,325 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,093 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,861 UART: |_|
2,535,173 UART:
2,652,803 UART: [rt] Runtime listening for mailbox commands...
2,653,974 >>> mbox cmd response data (48 bytes)
2,653,975 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,656,758 >>> mbox cmd response data (48 bytes)
2,656,759 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,671,895 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,393 UART:
192,770 UART: Running Caliptra ROM ...
193,968 UART:
194,113 UART: [state] CFI Enabled
261,974 UART: [state] LifecycleState = Unprovisioned
263,881 UART: [state] DebugLocked = No
265,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,784 UART: [kat] SHA2-256
439,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,029 UART: [kat] ++
450,476 UART: [kat] sha1
460,628 UART: [kat] SHA2-256
463,340 UART: [kat] SHA2-384
469,256 UART: [kat] SHA2-512-ACC
471,616 UART: [kat] ECC-384
2,766,662 UART: [kat] HMAC-384Kdf
2,800,016 UART: [kat] LMS
3,990,337 UART: [kat] --
3,995,396 UART: [cold-reset] ++
3,997,035 UART: [fht] Storing FHT @ 0x50003400
4,008,010 UART: [idev] ++
4,008,582 UART: [idev] CDI.KEYID = 6
4,009,627 UART: [idev] SUBJECT.KEYID = 7
4,010,799 UART: [idev] UDS.KEYID = 0
4,011,854 ready_for_fw is high
4,012,072 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,052,613 UART: [idev] Erasing UDS.KEYID = 0
7,343,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,577 UART: [idev] --
7,370,271 UART: [ldev] ++
7,370,836 UART: [ldev] CDI.KEYID = 6
7,371,797 UART: [ldev] SUBJECT.KEYID = 5
7,373,001 UART: [ldev] AUTHORITY.KEYID = 7
7,374,280 UART: [ldev] FE.KEYID = 1
7,421,141 UART: [ldev] Erasing FE.KEYID = 1
10,753,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,952 UART: [ldev] --
13,135,107 UART: [fwproc] Waiting for Commands...
13,138,057 UART: [fwproc] Received command 0x46574c44
13,140,289 UART: [fwproc] Received Image of size 31852 bytes
16,187,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,263,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,332,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,362,360 >>> mbox cmd response: success
16,367,182 UART: [afmc] ++
16,367,801 UART: [afmc] CDI.KEYID = 6
16,368,723 UART: [afmc] SUBJECT.KEYID = 7
16,369,972 UART: [afmc] AUTHORITY.KEYID = 5
19,745,076 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,043,823 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,046,074 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,060,447 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,075,305 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,089,749 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,112,294 UART: [afmc] --
22,116,104 UART: [cold-reset] --
22,120,277 UART: [state] Locking Datavault
22,124,828 UART: [state] Locking PCR0, PCR1 and PCR31
22,126,572 UART: [state] Locking ICCM
22,127,898 UART: [exit] Launching FMC @ 0x40000130
22,136,275 UART:
22,136,518 UART: Running Caliptra FMC ...
22,137,652 UART:
22,137,804 UART: [state] CFI Enabled
22,202,729 UART: [fht] FMC Alias Private Key: 7
24,541,318 UART: [art] Extend RT PCRs Done
24,542,589 UART: [art] Lock RT PCRs Done
24,543,980 UART: [art] Populate DV Done
24,549,347 UART: [fht] FMC Alias Private Key: 7
24,550,858 UART: [art] Derive CDI
24,551,693 UART: [art] Store in in slot 0x4
24,612,006 UART: [art] Derive Key Pair
24,613,082 UART: [art] Store priv key in slot 0x5
27,906,046 UART: [art] Derive Key Pair - Done
27,919,113 UART: [art] Signing Cert with AUTHO
27,920,458 UART: RITY.KEYID = 7
30,208,026 UART: [art] Erasing AUTHORITY.KEYID = 7
30,209,586 UART: [art] PUB.X = FCAF2AFE98FC82A6CB12A7C82F393E7F382004E53E3F95E60784C8EDA3A1B76C11CFB85F5895E4BF2EDCA980220DA73C
30,216,810 UART: [art] PUB.Y = 6D9D4C93A8A5DE6BB2B2C4CCF8ABDF86FF1081DBBA8C92D66FC3391314AD0E4A247B3C181A37CB7286AFED5303314E74
30,224,039 UART: [art] SIG.R = 8C3690CDF428FE889281C91531C61799D3F7747C31B43A06996BBC16AE69CA751794FB1C300EC86B2C7F1B63774C6AFD
30,231,441 UART: [art] SIG.S = 6F0DCAAC2D446141ADE96EA7CAE5E35C58F4ACDBBD43DD7887E45CF4F63B1683124D14A5D6B660A7E404C10714AB4FCE
31,535,990 UART: persistent_rt::test_persistent_data_layout...[ok]
31,538,251 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,803,427 ready_for_fw is high
3,803,849 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,183,620 >>> mbox cmd response: success
21,898,602 UART:
21,898,990 UART: Running Caliptra FMC ...
21,900,091 UART:
21,900,243 UART: [state] CFI Enabled
21,968,672 UART: [fht] FMC Alias Private Key: 7
24,307,017 UART: [art] Extend RT PCRs Done
24,308,309 UART: [art] Lock RT PCRs Done
24,310,271 UART: [art] Populate DV Done
24,315,789 UART: [fht] FMC Alias Private Key: 7
24,317,515 UART: [art] Derive CDI
24,318,279 UART: [art] Store in in slot 0x4
24,377,981 UART: [art] Derive Key Pair
24,379,060 UART: [art] Store priv key in slot 0x5
27,671,953 UART: [art] Derive Key Pair - Done
27,685,154 UART: [art] Signing Cert with AUTHO
27,686,497 UART: RITY.KEYID = 7
29,973,813 UART: [art] Erasing AUTHORITY.KEYID = 7
29,975,387 UART: [art] PUB.X = 44DA256A565E6EBDACF510EFEBD51BE23DAC5AF2984242F2E9AC668729221FDA4AAA76F495450DCC4F2E8ABC6803AB27
29,982,642 UART: [art] PUB.Y = 8E11C4693AC72915D481608B1C3A969945C4CA1CDE60C70E9365E144E9016A82C6514D140712965C3D5485A092FBAABF
29,989,776 UART: [art] SIG.R = 88D1427F146ABA903F5DBC8800187B226567071EF0A037DAF2EACF6BC79739D43A6A189CD88FE46712507FB748D64DFA
29,997,184 UART: [art] SIG.S = 2AF85D295C6B981C632AEB57725FE3AC13D6434BD3BC383B8929591AE95D9E00CF6A23D8179EE5EC515DFD8D4BF15D48
31,302,378 UART: persistent_rt::test_persistent_data_layout...[ok]
31,304,622 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,430 UART:
192,811 UART: Running Caliptra ROM ...
193,908 UART:
603,650 UART: [state] CFI Enabled
619,373 UART: [state] LifecycleState = Unprovisioned
621,237 UART: [state] DebugLocked = No
624,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,684 UART: [kat] SHA2-256
798,464 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,983 UART: [kat] ++
809,434 UART: [kat] sha1
819,831 UART: [kat] SHA2-256
822,513 UART: [kat] SHA2-384
827,533 UART: [kat] SHA2-512-ACC
829,900 UART: [kat] ECC-384
3,114,202 UART: [kat] HMAC-384Kdf
3,127,353 UART: [kat] LMS
4,317,465 UART: [kat] --
4,321,975 UART: [cold-reset] ++
4,324,617 UART: [fht] Storing FHT @ 0x50003400
4,336,908 UART: [idev] ++
4,337,519 UART: [idev] CDI.KEYID = 6
4,338,433 UART: [idev] SUBJECT.KEYID = 7
4,339,681 UART: [idev] UDS.KEYID = 0
4,340,718 ready_for_fw is high
4,340,924 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,381,070 UART: [idev] Erasing UDS.KEYID = 0
7,625,986 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,701 UART: [idev] --
7,651,741 UART: [ldev] ++
7,652,306 UART: [ldev] CDI.KEYID = 6
7,653,245 UART: [ldev] SUBJECT.KEYID = 5
7,654,456 UART: [ldev] AUTHORITY.KEYID = 7
7,655,740 UART: [ldev] FE.KEYID = 1
7,666,631 UART: [ldev] Erasing FE.KEYID = 1
10,955,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,164 UART: [ldev] --
13,312,787 UART: [fwproc] Waiting for Commands...
13,315,250 UART: [fwproc] Received command 0x46574c44
13,317,479 UART: [fwproc] Received Image of size 31852 bytes
16,370,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,439,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,508,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,537,673 >>> mbox cmd response: success
16,541,242 UART: [afmc] ++
16,541,854 UART: [afmc] CDI.KEYID = 6
16,542,781 UART: [afmc] SUBJECT.KEYID = 7
16,544,049 UART: [afmc] AUTHORITY.KEYID = 5
19,863,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,159,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,161,897 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,176,295 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,191,123 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,205,541 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,226,146 UART: [afmc] --
22,229,854 UART: [cold-reset] --
22,234,538 UART: [state] Locking Datavault
22,238,620 UART: [state] Locking PCR0, PCR1 and PCR31
22,240,382 UART: [state] Locking ICCM
22,242,659 UART: [exit] Launching FMC @ 0x40000130
22,251,019 UART:
22,251,267 UART: Running Caliptra FMC ...
22,252,407 UART:
22,252,566 UART: [state] CFI Enabled
22,260,687 UART: [fht] FMC Alias Private Key: 7
24,591,984 UART: [art] Extend RT PCRs Done
24,593,255 UART: [art] Lock RT PCRs Done
24,594,786 UART: [art] Populate DV Done
24,600,308 UART: [fht] FMC Alias Private Key: 7
24,601,964 UART: [art] Derive CDI
24,602,810 UART: [art] Store in in slot 0x4
24,645,300 UART: [art] Derive Key Pair
24,646,336 UART: [art] Store priv key in slot 0x5
27,889,047 UART: [art] Derive Key Pair - Done
27,902,104 UART: [art] Signing Cert with AUTHO
27,903,443 UART: RITY.KEYID = 7
30,182,541 UART: [art] Erasing AUTHORITY.KEYID = 7
30,184,101 UART: [art] PUB.X = FFA6C78E58821846C3330A488F090FC5809E958A716997DA280FA597ED6D2A961168FAB087B698980D92F1913AB4E56A
30,191,229 UART: [art] PUB.Y = EA93AF75E32F39106DFC77557A0AE7EDA63A77E637D8CD1E8103150F6C8237BBB1A0E5D2C9A60B84AC7AD875556C9998
30,198,544 UART: [art] SIG.R = 7DD20C3C0AABCD27950FBF605A200659E30BF747471DB2A39D0E2F61EC2CCA8E1FABFCB6ADBD3C4C8C5B69800DC505E8
30,205,942 UART: [art] SIG.S = 18D7CD221FD93C2A73D13F0B556B10EB1DED5A917881C85BBCE1BB09123D5A68629CF6D688C76A0C38908DEDDECC6B7C
31,510,296 UART: persistent_rt::test_persistent_data_layout...[ok]
31,512,562 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,130,368 ready_for_fw is high
4,130,736 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,397,665 >>> mbox cmd response: success
22,040,471 UART:
22,040,870 UART: Running Caliptra FMC ...
22,041,976 UART:
22,042,149 UART: [state] CFI Enabled
22,050,491 UART: [fht] FMC Alias Private Key: 7
24,381,213 UART: [art] Extend RT PCRs Done
24,382,486 UART: [art] Lock RT PCRs Done
24,383,975 UART: [art] Populate DV Done
24,389,293 UART: [fht] FMC Alias Private Key: 7
24,390,961 UART: [art] Derive CDI
24,391,821 UART: [art] Store in in slot 0x4
24,435,039 UART: [art] Derive Key Pair
24,436,131 UART: [art] Store priv key in slot 0x5
27,677,991 UART: [art] Derive Key Pair - Done
27,690,985 UART: [art] Signing Cert with AUTHO
27,692,341 UART: RITY.KEYID = 7
29,971,673 UART: [art] Erasing AUTHORITY.KEYID = 7
29,973,231 UART: [art] PUB.X = A853C9629F41111963FB44BC7E371B0AA2468E07E2FBFAE510739A7CC616F3E88CFE978ED4A12B59116A875C6BE311B4
29,980,475 UART: [art] PUB.Y = CD2F8A9338E7AB1B88273E9A7A4009F5A03ED0B35D85E361B4D157D2C9AD2DA263D74C195A6ECADEA530839C2845868E
29,987,737 UART: [art] SIG.R = C92BE5E0801CD30A75F47D777314EFDEAD55DB831CF3ADFCEFB2269F69B7D3D15984DFDC54DA6CE08DCBE98EBC308D35
29,995,156 UART: [art] SIG.S = 1501FD1490CE0E1983A1F112FE38E4153467C4CA80173521A4DF31480A1E0F5D73953574713D9A571EA7CEAF5254FEE6
31,299,768 UART: persistent_rt::test_persistent_data_layout...[ok]
31,302,035 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,486 UART:
192,848 UART: Running Caliptra ROM ...
194,044 UART:
194,208 UART: [state] CFI Enabled
265,482 UART: [state] LifecycleState = Unprovisioned
267,310 UART: [state] DebugLocked = No
269,000 UART: [state] WD Timer not started. Device not locked for debugging
273,132 UART: [kat] SHA2-256
452,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,827 UART: [kat] ++
464,371 UART: [kat] sha1
476,104 UART: [kat] SHA2-256
479,125 UART: [kat] SHA2-384
485,336 UART: [kat] SHA2-512-ACC
488,341 UART: [kat] ECC-384
2,946,988 UART: [kat] HMAC-384Kdf
2,972,359 UART: [kat] LMS
3,501,800 UART: [kat] --
3,507,093 UART: [cold-reset] ++
3,509,385 UART: [fht] FHT @ 0x50003400
3,519,653 UART: [idev] ++
3,520,221 UART: [idev] CDI.KEYID = 6
3,521,199 UART: [idev] SUBJECT.KEYID = 7
3,522,370 UART: [idev] UDS.KEYID = 0
3,523,292 ready_for_fw is high
3,523,492 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,563,757 UART: [idev] Erasing UDS.KEYID = 0
6,029,427 UART: [idev] Sha1 KeyId Algorithm
6,052,402 UART: [idev] --
6,056,319 UART: [ldev] ++
6,056,904 UART: [ldev] CDI.KEYID = 6
6,057,793 UART: [ldev] SUBJECT.KEYID = 5
6,058,963 UART: [ldev] AUTHORITY.KEYID = 7
6,060,203 UART: [ldev] FE.KEYID = 1
6,101,210 UART: [ldev] Erasing FE.KEYID = 1
8,603,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,013 UART: [ldev] --
10,416,846 UART: [fwproc] Wait for Commands...
10,419,582 UART: [fwproc] Recv command 0x46574c44
10,421,618 UART: [fwproc] Recv'd Img size: 31832 bytes
12,812,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,881,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,949,903 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
12,979,482 >>> mbox cmd response: success
12,983,614 UART: [afmc] ++
12,984,229 UART: [afmc] CDI.KEYID = 6
12,985,136 UART: [afmc] SUBJECT.KEYID = 7
12,986,396 UART: [afmc] AUTHORITY.KEYID = 5
15,529,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,252,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,254,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,269,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,285,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,301,827 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,325,345 UART: [afmc] --
17,329,999 UART: [cold-reset] --
17,335,135 UART: [state] Locking Datavault
17,338,900 UART: [state] Locking PCR0, PCR1 and PCR31
17,340,589 UART: [state] Locking ICCM
17,341,665 UART: [exit] Launching FMC @ 0x40000130
17,350,110 UART:
17,350,355 UART: Running Caliptra FMC ...
17,351,505 UART:
17,351,665 UART: [state] CFI Enabled
17,411,590 UART: [fht] FMC Alias Private Key: 7
19,175,445 UART: [art] Extend RT PCRs Done
19,176,699 UART: [art] Lock RT PCRs Done
19,178,301 UART: [art] Populate DV Done
19,183,737 UART: [fht] FMC Alias Private Key: 7
19,185,462 UART: [art] Derive CDI
19,186,228 UART: [art] Store in in slot 0x4
19,244,066 UART: [art] Derive Key Pair
19,245,162 UART: [art] Store priv key in slot 0x5
21,708,479 UART: [art] Derive Key Pair - Done
21,721,192 UART: [art] Signing Cert with AUTHO
21,722,530 UART: RITY.KEYID = 7
23,434,136 UART: [art] Erasing AUTHORITY.KEYID = 7
23,435,695 UART: [art] PUB.X = EA7BCD38AA92875F1925A502CCA877CECFE9145BB6B88AA937C136C25EDDE79725B4C1542A7DC914195140B6EA0F31CA
23,443,003 UART: [art] PUB.Y = 6E2FAE125E6C1C707EE25E8673C025DCF7956A3F7F650245912AD5C595A9E67F44077717B0788E483FAB2608B273BADC
23,450,227 UART: [art] SIG.R = 60DDA4B895B245ADD75A55CCE2A7830BDE1DDDB37AD7D6547686A18C5DFDF3FD101E354DF149D06D60141983553FB15B
23,457,631 UART: [art] SIG.S = 972664554A3E3D51D5C3D065DF5C45D31B6A7440343AE032BBE5F77982A1B15D52D3117F5AC8932F5236B1173C4AC2B0
24,436,477 UART: persistent_rt::test_persistent_data_layout...[ok]
24,438,741 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,363 UART:
192,743 UART: Running Caliptra ROM ...
193,837 UART:
193,980 UART: [state] CFI Enabled
263,875 UART: [state] LifecycleState = Unprovisioned
266,275 UART: [state] DebugLocked = No
267,890 UART: [state] WD Timer not started. Device not locked for debugging
272,429 UART: [kat] SHA2-256
462,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,061 UART: [kat] ++
473,514 UART: [kat] sha1
485,312 UART: [kat] SHA2-256
488,389 UART: [kat] SHA2-384
494,969 UART: [kat] SHA2-512-ACC
497,624 UART: [kat] ECC-384
2,948,122 UART: [kat] HMAC-384Kdf
2,971,687 UART: [kat] LMS
3,503,503 UART: [kat] --
3,508,499 UART: [cold-reset] ++
3,510,290 UART: [fht] FHT @ 0x50003400
3,521,840 UART: [idev] ++
3,522,554 UART: [idev] CDI.KEYID = 6
3,523,638 UART: [idev] SUBJECT.KEYID = 7
3,524,747 UART: [idev] UDS.KEYID = 0
3,525,690 ready_for_fw is high
3,526,111 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,566,478 UART: [idev] Erasing UDS.KEYID = 0
6,028,037 UART: [idev] Sha1 KeyId Algorithm
6,051,165 UART: [idev] --
6,055,599 UART: [ldev] ++
6,056,289 UART: [ldev] CDI.KEYID = 6
6,057,201 UART: [ldev] SUBJECT.KEYID = 5
6,058,415 UART: [ldev] AUTHORITY.KEYID = 7
6,059,610 UART: [ldev] FE.KEYID = 1
6,099,860 UART: [ldev] Erasing FE.KEYID = 1
8,605,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,586 UART: [ldev] --
10,416,639 UART: [fwproc] Wait for Commands...
10,418,957 UART: [fwproc] Recv command 0x46574c44
10,421,267 UART: [fwproc] Recv'd Img size: 31832 bytes
12,853,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,926,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,043,100 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,090,588 >>> mbox cmd response: success
13,095,338 UART: [afmc] ++
13,095,961 UART: [afmc] CDI.KEYID = 6
13,097,157 UART: [afmc] SUBJECT.KEYID = 7
13,098,660 UART: [afmc] AUTHORITY.KEYID = 5
15,633,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,358,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,360,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,376,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,391,085 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,406,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,429,929 UART: [afmc] --
17,432,750 UART: [cold-reset] --
17,436,655 UART: [state] Locking Datavault
17,443,263 UART: [state] Locking PCR0, PCR1 and PCR31
17,445,462 UART: [state] Locking ICCM
17,446,689 UART: [exit] Launching FMC @ 0x40000130
17,455,381 UART:
17,455,634 UART: Running Caliptra FMC ...
17,456,779 UART:
17,456,946 UART: [state] CFI Enabled
17,517,337 UART: [fht] FMC Alias Private Key: 7
19,281,398 UART: [art] Extend RT PCRs Done
19,282,676 UART: [art] Lock RT PCRs Done
19,284,363 UART: [art] Populate DV Done
19,289,591 UART: [fht] FMC Alias Private Key: 7
19,291,291 UART: [art] Derive CDI
19,292,153 UART: [art] Store in in slot 0x4
19,349,901 UART: [art] Derive Key Pair
19,350,932 UART: [art] Store priv key in slot 0x5
21,813,963 UART: [art] Derive Key Pair - Done
21,827,093 UART: [art] Signing Cert with AUTHO
21,828,438 UART: RITY.KEYID = 7
23,540,230 UART: [art] Erasing AUTHORITY.KEYID = 7
23,541,782 UART: [art] PUB.X = 4C35ADC007ACDCE2472371BBD106AECCBDE15E8824D84CE8C009BC6CA1E9CA0289296690EB875D0CD32892A63186C929
23,549,000 UART: [art] PUB.Y = 450862E6EDB343A303DCE778ABDE580991E8452D0B63C08D409E7A72E14E9C4A1291F4CA768941AEFB5F33A160F9CAB9
23,556,223 UART: [art] SIG.R = CF595721F80321EE6E8F7D51C8641D9B091875789A07E81D4E01A9A1B44BB99EACE144E5F146C38D0FFE90C0C8069349
23,563,624 UART: [art] SIG.S = DC0FE8E06B06E0798705A8EACF7AD7F0509B6989D021AADBDE2D253E435D953D1F5130A4E535DA35820654E6E72E83E7
24,541,804 UART: persistent_rt::test_persistent_data_layout...[ok]
24,544,089 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,435,885 ready_for_fw is high
3,436,269 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,966,980 >>> mbox cmd response: success
17,259,658 UART:
17,260,051 UART: Running Caliptra FMC ...
17,261,173 UART:
17,261,330 UART: [state] CFI Enabled
17,326,694 UART: [fht] FMC Alias Private Key: 7
19,090,897 UART: [art] Extend RT PCRs Done
19,092,166 UART: [art] Lock RT PCRs Done
19,093,998 UART: [art] Populate DV Done
19,099,531 UART: [fht] FMC Alias Private Key: 7
19,101,068 UART: [art] Derive CDI
19,101,865 UART: [art] Store in in slot 0x4
19,159,510 UART: [art] Derive Key Pair
19,160,596 UART: [art] Store priv key in slot 0x5
21,623,503 UART: [art] Derive Key Pair - Done
21,636,523 UART: [art] Signing Cert with AUTHO
21,637,899 UART: RITY.KEYID = 7
23,349,705 UART: [art] Erasing AUTHORITY.KEYID = 7
23,351,260 UART: [art] PUB.X = F12D54AE40BFC42D00DA75B4722832857B648F10E8AFDB0F9C6AD3F591539A4C40810A5381E1D6CE39EAB4E9B583D7B6
23,358,480 UART: [art] PUB.Y = 3FEDD11B1BBE929B3394C76EF5C0BA78E71803704A59107D2F391AE1BCFE0DE2D290E28DE5C2A051D769E78975A1D793
23,365,806 UART: [art] SIG.R = F898C7F7D2FAA2323CE8B142573A9A01DC1BA5873731C7116C76E174EE60A168A608333D3B054CC34EACFBE7ECF752BD
23,373,215 UART: [art] SIG.S = DEAA1AFC1EE96A7547BC878F466CDE7293660D3F3472BE114B158CDEA9586335BB1BE15494E524F1E6B628C0021951C3
24,351,908 UART: persistent_rt::test_persistent_data_layout...[ok]
24,354,212 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,334 UART:
192,705 UART: Running Caliptra ROM ...
193,881 UART:
603,563 UART: [state] CFI Enabled
616,017 UART: [state] LifecycleState = Unprovisioned
618,376 UART: [state] DebugLocked = No
621,315 UART: [state] WD Timer not started. Device not locked for debugging
626,333 UART: [kat] SHA2-256
816,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,005 UART: [kat] ++
827,463 UART: [kat] sha1
839,259 UART: [kat] SHA2-256
842,272 UART: [kat] SHA2-384
849,112 UART: [kat] SHA2-512-ACC
851,689 UART: [kat] ECC-384
3,290,468 UART: [kat] HMAC-384Kdf
3,302,102 UART: [kat] LMS
3,833,929 UART: [kat] --
3,840,482 UART: [cold-reset] ++
3,842,549 UART: [fht] FHT @ 0x50003400
3,854,516 UART: [idev] ++
3,855,226 UART: [idev] CDI.KEYID = 6
3,856,108 UART: [idev] SUBJECT.KEYID = 7
3,857,346 UART: [idev] UDS.KEYID = 0
3,858,431 ready_for_fw is high
3,858,642 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,898,880 UART: [idev] Erasing UDS.KEYID = 0
6,328,843 UART: [idev] Sha1 KeyId Algorithm
6,350,833 UART: [idev] --
6,355,259 UART: [ldev] ++
6,355,989 UART: [ldev] CDI.KEYID = 6
6,356,911 UART: [ldev] SUBJECT.KEYID = 5
6,358,066 UART: [ldev] AUTHORITY.KEYID = 7
6,359,313 UART: [ldev] FE.KEYID = 1
6,370,117 UART: [ldev] Erasing FE.KEYID = 1
8,850,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,034 UART: [ldev] --
10,642,689 UART: [fwproc] Wait for Commands...
10,645,321 UART: [fwproc] Recv command 0x46574c44
10,647,625 UART: [fwproc] Recv'd Img size: 31832 bytes
13,070,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,151,350 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,267,492 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,314,943 >>> mbox cmd response: success
13,319,689 UART: [afmc] ++
13,320,398 UART: [afmc] CDI.KEYID = 6
13,321,602 UART: [afmc] SUBJECT.KEYID = 7
13,323,006 UART: [afmc] AUTHORITY.KEYID = 5
15,825,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,548,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,550,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,566,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,581,277 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,596,325 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,619,652 UART: [afmc] --
17,622,399 UART: [cold-reset] --
17,625,351 UART: [state] Locking Datavault
17,631,473 UART: [state] Locking PCR0, PCR1 and PCR31
17,633,677 UART: [state] Locking ICCM
17,635,966 UART: [exit] Launching FMC @ 0x40000130
17,644,611 UART:
17,644,873 UART: Running Caliptra FMC ...
17,646,018 UART:
17,646,176 UART: [state] CFI Enabled
17,654,200 UART: [fht] FMC Alias Private Key: 7
19,411,260 UART: [art] Extend RT PCRs Done
19,412,489 UART: [art] Lock RT PCRs Done
19,414,031 UART: [art] Populate DV Done
19,419,409 UART: [fht] FMC Alias Private Key: 7
19,421,062 UART: [art] Derive CDI
19,421,830 UART: [art] Store in in slot 0x4
19,463,936 UART: [art] Derive Key Pair
19,465,007 UART: [art] Store priv key in slot 0x5
21,891,351 UART: [art] Derive Key Pair - Done
21,904,337 UART: [art] Signing Cert with AUTHO
21,905,675 UART: RITY.KEYID = 7
23,611,108 UART: [art] Erasing AUTHORITY.KEYID = 7
23,612,731 UART: [art] PUB.X = AA293574AA919C955B2B3C21054510ADBDD0F7DD4194714FBEBA5C59EFB51E6629E8F2AE6F1550303112D691C8819F65
23,619,862 UART: [art] PUB.Y = CC6E829A7AC2EE0C0C86CF71055368CE25B7A530CF66B3F2E7AB3A7EC9E75B97F58E1ED064F754885F9F8658FCB1DE19
23,627,181 UART: [art] SIG.R = D969DB9E5D299EAE1D9578291D730374D3E98EC824D108DADAA96E4176167B591A6916C071E1AEFF118EB8241AAAB94E
23,634,579 UART: [art] SIG.S = E53BC7608B99BE6DE8A60DF2D55B83762F5E831811D6C3679DF036D8E8095C5DF1A6EC0AC112BC4B553C5496E6DF4C8A
24,613,295 UART: persistent_rt::test_persistent_data_layout...[ok]
24,615,556 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,758,341 ready_for_fw is high
3,758,946 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
13,190,626 >>> mbox cmd response: success
17,444,171 UART:
17,445,005 UART: Running Caliptra FMC ...
17,446,206 UART:
17,446,370 UART: [state] CFI Enabled
17,453,867 UART: [fht] FMC Alias Private Key: 7
19,211,128 UART: [art] Extend RT PCRs Done
19,212,378 UART: [art] Lock RT PCRs Done
19,213,951 UART: [art] Populate DV Done
19,219,231 UART: [fht] FMC Alias Private Key: 7
19,220,887 UART: [art] Derive CDI
19,221,675 UART: [art] Store in in slot 0x4
19,264,453 UART: [art] Derive Key Pair
19,265,501 UART: [art] Store priv key in slot 0x5
21,692,269 UART: [art] Derive Key Pair - Done
21,705,437 UART: [art] Signing Cert with AUTHO
21,706,812 UART: RITY.KEYID = 7
23,411,763 UART: [art] Erasing AUTHORITY.KEYID = 7
23,413,329 UART: [art] PUB.X = CBD6BB5728C97D622ED019703655E88BCF50360BADA642678B9CEC535718694972339D1F18E1DA69D82F729BCDB9F747
23,420,554 UART: [art] PUB.Y = D319DA02A2433A2D56FE1A11D4E88FAE95686ADEBCFACD70BFF7DED8C6F701C9716C3A30BF98D1ABE622B6E4FEB3E41D
23,427,872 UART: [art] SIG.R = 0D0AF712E742257B9A449F217A31D0EDCA1454A574C627E9030F6E86D2C92CABC5B87C24F7032B7AD840AB42927E22A4
23,435,289 UART: [art] SIG.S = 3DF7EA1B843F3CC869FF88F1ACCFA9D7B144AA2B4DD7F8CFB00B874D16DD590EE2CBECCE28DD962F4EE4636E1A55B065
24,413,516 UART: persistent_rt::test_persistent_data_layout...[ok]
24,415,777 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,595 UART: [kat] SHA2-256
892,533 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
907,188 UART: [kat] LMS
1,475,384 UART: [kat] --
1,476,017 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,506 UART: [idev] ++
1,479,674 UART: [idev] CDI.KEYID = 6
1,480,034 UART: [idev] SUBJECT.KEYID = 7
1,480,458 UART: [idev] UDS.KEYID = 0
1,480,803 ready_for_fw is high
1,480,803 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,570 UART: [idev] Erasing UDS.KEYID = 0
1,505,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,856 UART: [idev] --
1,515,065 UART: [ldev] ++
1,515,233 UART: [ldev] CDI.KEYID = 6
1,515,596 UART: [ldev] SUBJECT.KEYID = 5
1,516,022 UART: [ldev] AUTHORITY.KEYID = 7
1,516,485 UART: [ldev] FE.KEYID = 1
1,521,407 UART: [ldev] Erasing FE.KEYID = 1
1,546,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,590 UART: [ldev] --
1,585,921 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 31832 bytes
1,940,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,497 >>> mbox cmd response: success
2,009,701 UART: [afmc] ++
2,009,869 UART: [afmc] CDI.KEYID = 6
2,010,231 UART: [afmc] SUBJECT.KEYID = 7
2,010,656 UART: [afmc] AUTHORITY.KEYID = 5
2,045,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,546 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,236 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,021 UART: [afmc] --
2,088,019 UART: [cold-reset] --
2,088,869 UART: [state] Locking Datavault
2,089,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,598 UART: [state] Locking ICCM
2,091,246 UART: [exit] Launching FMC @ 0x40000130
2,096,575 UART:
2,096,591 UART: Running Caliptra FMC ...
2,096,999 UART:
2,097,053 UART: [state] CFI Enabled
2,107,334 UART: [fht] FMC Alias Private Key: 7
2,215,027 UART: [art] Extend RT PCRs Done
2,215,455 UART: [art] Lock RT PCRs Done
2,217,315 UART: [art] Populate DV Done
2,225,582 UART: [fht] FMC Alias Private Key: 7
2,226,592 UART: [art] Derive CDI
2,226,872 UART: [art] Store in in slot 0x4
2,312,597 UART: [art] Derive Key Pair
2,312,957 UART: [art] Store priv key in slot 0x5
2,326,347 UART: [art] Derive Key Pair - Done
2,341,166 UART: [art] Signing Cert with AUTHO
2,341,646 UART: RITY.KEYID = 7
2,356,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,627 UART: [art] PUB.X = 5902E90A063621A72F964CDD7C6F9957736B517C5105A16789FEC41C017FCD7931F1D02E666D713EFD8E335486A52A8C
2,364,380 UART: [art] PUB.Y = 820059A07FEDDEE3354D3069EAE250A43FBA429F7158E882DC0DB9C7874E25944B17E163DD680EA8EF689E76A7E3DCD8
2,371,314 UART: [art] SIG.R = C18659A6CE3BC108881D501DDFBC8E8AC6774B28D6DC06695AB4A5AAE7599CCB682DCE8A5CAE0DFE5911C10004EF35F1
2,378,072 UART: [art] SIG.S = 5EA5EF6036CD12CDFAD175F5EA26664C9E2BA5863CC7E05D8CFE08002978805AFA3802B2475F603FA12445D383964224
2,402,166 UART: persistent_rt::test_persistent_data_layout...[ok]
2,403,409 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,799 ready_for_fw is high
1,361,799 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,856,889 >>> mbox cmd response: success
1,918,673 UART:
1,918,689 UART: Running Caliptra FMC ...
1,919,097 UART:
1,919,151 UART: [state] CFI Enabled
1,929,738 UART: [fht] FMC Alias Private Key: 7
2,037,725 UART: [art] Extend RT PCRs Done
2,038,153 UART: [art] Lock RT PCRs Done
2,039,819 UART: [art] Populate DV Done
2,048,242 UART: [fht] FMC Alias Private Key: 7
2,049,218 UART: [art] Derive CDI
2,049,498 UART: [art] Store in in slot 0x4
2,135,507 UART: [art] Derive Key Pair
2,135,867 UART: [art] Store priv key in slot 0x5
2,147,655 UART: [art] Derive Key Pair - Done
2,162,391 UART: [art] Signing Cert with AUTHO
2,162,871 UART: RITY.KEYID = 7
2,178,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,814 UART: [art] PUB.X = 91B1BEEA4BF999BD93494F05D08A39480E0B5D994A51D35CFC742C8B3B9F3BDB2890A46B6076C7522FD5D936F00C43DA
2,185,584 UART: [art] PUB.Y = 398C8B57CC0F14CD3BAE7D77FE6C1430D836B832D90F058A099A67F0AE9EDC6EAD1217FE6543370396185E6DFB9356F2
2,192,529 UART: [art] SIG.R = 7AC07312201CA049B3F0A79DF5D780CA7AF9DC7106E701455B8C2E5AA71F83E869A3C7082AC83B2395BCBC4952E55D45
2,199,298 UART: [art] SIG.S = 22FE2CA04C542A5437FA492927C272B3D784616D1B6C007627DF2CBFC5521EB172851180900876E8F60042661E8430A8
2,223,013 UART: persistent_rt::test_persistent_data_layout...[ok]
2,224,256 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,469 UART: [kat] LMS
1,475,665 UART: [kat] --
1,476,668 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 ready_for_fw is high
1,481,202 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,629 UART: [idev] Erasing UDS.KEYID = 0
1,505,653 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,547,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,507 UART: [ldev] --
1,586,914 UART: [fwproc] Waiting for Commands...
1,587,719 UART: [fwproc] Received command 0x46574c44
1,588,510 UART: [fwproc] Received Image of size 31832 bytes
1,941,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,968,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,997,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,009,940 >>> mbox cmd response: success
2,011,110 UART: [afmc] ++
2,011,278 UART: [afmc] CDI.KEYID = 6
2,011,640 UART: [afmc] SUBJECT.KEYID = 7
2,012,065 UART: [afmc] AUTHORITY.KEYID = 5
2,046,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,063,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,581 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,081,271 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,089,082 UART: [afmc] --
2,089,982 UART: [cold-reset] --
2,090,798 UART: [state] Locking Datavault
2,092,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,733 UART: [state] Locking ICCM
2,093,289 UART: [exit] Launching FMC @ 0x40000130
2,098,618 UART:
2,098,634 UART: Running Caliptra FMC ...
2,099,042 UART:
2,099,185 UART: [state] CFI Enabled
2,109,746 UART: [fht] FMC Alias Private Key: 7
2,217,373 UART: [art] Extend RT PCRs Done
2,217,801 UART: [art] Lock RT PCRs Done
2,219,003 UART: [art] Populate DV Done
2,227,208 UART: [fht] FMC Alias Private Key: 7
2,228,142 UART: [art] Derive CDI
2,228,422 UART: [art] Store in in slot 0x4
2,314,127 UART: [art] Derive Key Pair
2,314,487 UART: [art] Store priv key in slot 0x5
2,328,451 UART: [art] Derive Key Pair - Done
2,343,160 UART: [art] Signing Cert with AUTHO
2,343,640 UART: RITY.KEYID = 7
2,358,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,645 UART: [art] PUB.X = 77CBBC8D1E41690EFADFAE5F5F37051B5A80DF323E48360096D2D93DBBDE05E1C827F0872B54C199754BF48D98272AF3
2,366,396 UART: [art] PUB.Y = 75926D046D44B04667524C33CDC17A760524F379FF22DE78A21B12ADD570BA90A2ACAC709D6BA030BDF124C72684B1F0
2,373,346 UART: [art] SIG.R = 0189211FCA74791D6B809282DCBA772B24D23F7D4E4E876C027D1AD1ADD9F484545E1AF16C9BED112EE90C31F4513C2B
2,380,117 UART: [art] SIG.S = 3C0FEAA4105982BD8D05382ED9C304D7BF678326316BB82345C429A6BD15581F9D14B9F82A06B474EF3A5AD09A81041F
2,403,460 UART: persistent_rt::test_persistent_data_layout...[ok]
2,404,703 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,014 ready_for_fw is high
1,363,014 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,858,312 >>> mbox cmd response: success
1,919,402 UART:
1,919,418 UART: Running Caliptra FMC ...
1,919,826 UART:
1,919,969 UART: [state] CFI Enabled
1,930,680 UART: [fht] FMC Alias Private Key: 7
2,039,409 UART: [art] Extend RT PCRs Done
2,039,837 UART: [art] Lock RT PCRs Done
2,041,267 UART: [art] Populate DV Done
2,049,390 UART: [fht] FMC Alias Private Key: 7
2,050,368 UART: [art] Derive CDI
2,050,648 UART: [art] Store in in slot 0x4
2,136,441 UART: [art] Derive Key Pair
2,136,801 UART: [art] Store priv key in slot 0x5
2,150,143 UART: [art] Derive Key Pair - Done
2,164,582 UART: [art] Signing Cert with AUTHO
2,165,062 UART: RITY.KEYID = 7
2,180,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,419 UART: [art] PUB.X = 3B97DBD6F7C09B6F650683D5869D110517B2B95A6AC2B3E38A308E30853CE51F183B4E429EA65375BC17AAAB669DCADD
2,188,195 UART: [art] PUB.Y = AB40ED71FE6C812A16355489EA1F0A79EF8A5C33C319B4114A0A95385EEBBB80FFA79E5DDD82CC040C780B4AB1B5B718
2,195,148 UART: [art] SIG.R = 24CE30B4ED2F215A2785D197D395EC8C92A1E1ECC69B0EDF96D5C79C4673D07FA09358D4BEA474170DC60FB2E263AE64
2,201,923 UART: [art] SIG.S = 716EB3F51942C8E5E1CB8436F874783FA7CC51F1BCCED97E1EEFD48373575F2FA4541CFE2C3E3D05F56509BF2EB964CA
2,225,733 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,976 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
902,133 UART: [kat] SHA2-256
904,073 UART: [kat] SHA2-384
906,726 UART: [kat] SHA2-512-ACC
908,627 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,426 UART: [kat] LMS
1,170,754 UART: [kat] --
1,171,819 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,175,014 UART: [idev] ++
1,175,182 UART: [idev] CDI.KEYID = 6
1,175,542 UART: [idev] SUBJECT.KEYID = 7
1,175,966 UART: [idev] UDS.KEYID = 0
1,176,311 ready_for_fw is high
1,176,311 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,590 UART: [idev] Erasing UDS.KEYID = 0
1,200,687 UART: [idev] Sha1 KeyId Algorithm
1,209,189 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,881 UART: [ldev] --
1,282,166 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,149 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,705,092 >>> mbox cmd response: success
1,706,270 UART: [afmc] ++
1,706,438 UART: [afmc] CDI.KEYID = 6
1,706,800 UART: [afmc] SUBJECT.KEYID = 7
1,707,225 UART: [afmc] AUTHORITY.KEYID = 5
1,742,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,759,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,504 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,777,223 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,023 UART: [afmc] --
1,786,125 UART: [cold-reset] --
1,786,911 UART: [state] Locking Datavault
1,788,192 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,796 UART: [state] Locking ICCM
1,789,464 UART: [exit] Launching FMC @ 0x40000130
1,794,793 UART:
1,794,809 UART: Running Caliptra FMC ...
1,795,217 UART:
1,795,271 UART: [state] CFI Enabled
1,805,906 UART: [fht] FMC Alias Private Key: 7
1,913,337 UART: [art] Extend RT PCRs Done
1,913,765 UART: [art] Lock RT PCRs Done
1,915,499 UART: [art] Populate DV Done
1,923,782 UART: [fht] FMC Alias Private Key: 7
1,924,824 UART: [art] Derive CDI
1,925,104 UART: [art] Store in in slot 0x4
2,010,563 UART: [art] Derive Key Pair
2,010,923 UART: [art] Store priv key in slot 0x5
2,023,917 UART: [art] Derive Key Pair - Done
2,038,452 UART: [art] Signing Cert with AUTHO
2,038,932 UART: RITY.KEYID = 7
2,053,874 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,639 UART: [art] PUB.X = 5F8688DD3078E520EBB2BB91AF0B7E952872B84A306CE513B75275A9E57BA11C976B2B228CCD5A00B5D1D829DCAF29AB
2,061,398 UART: [art] PUB.Y = 2D8841A7FB580E73E734F3D36AC826A9F891CA3334A0A3B662D13D7C260708D1224AA4670C1575E7370ABAA45AFDEBAC
2,068,343 UART: [art] SIG.R = F80E6F53DCA42C9DF9604E06A168078A34718874B2DE3D622005ACD15B6BB2AF9C5FD3CC119027B9ED3231C7F60DA7CC
2,075,112 UART: [art] SIG.S = 55F012358F6D33E855630CBD9E475F984F1C9AA1E99DC28E7C099B16B98DB093023E69C30004995FF4C8D640B124F169
2,098,448 UART: persistent_rt::test_persistent_data_layout...[ok]
2,099,691 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,927 ready_for_fw is high
1,059,927 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,556,583 >>> mbox cmd response: success
1,617,509 UART:
1,617,525 UART: Running Caliptra FMC ...
1,617,933 UART:
1,617,987 UART: [state] CFI Enabled
1,628,748 UART: [fht] FMC Alias Private Key: 7
1,736,767 UART: [art] Extend RT PCRs Done
1,737,195 UART: [art] Lock RT PCRs Done
1,738,763 UART: [art] Populate DV Done
1,746,944 UART: [fht] FMC Alias Private Key: 7
1,747,914 UART: [art] Derive CDI
1,748,194 UART: [art] Store in in slot 0x4
1,834,117 UART: [art] Derive Key Pair
1,834,477 UART: [art] Store priv key in slot 0x5
1,848,283 UART: [art] Derive Key Pair - Done
1,862,739 UART: [art] Signing Cert with AUTHO
1,863,219 UART: RITY.KEYID = 7
1,878,687 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,452 UART: [art] PUB.X = AB0D08EDB5B418123890D50DECCB425B4906F6F95C4E3D007CCC20F6DB5EBBEEFA7D304037B826D2BE831E57E45CFAB4
1,886,212 UART: [art] PUB.Y = 078959FBB43FA6C3015FBE727DBD14FA069FEC036939D8F39BF571BC24BE2B2EA905550D986234A0C52D1E5154C483E6
1,893,152 UART: [art] SIG.R = 76889E83115449F197E469095DAAA7E630894714ABE2B0AF471020161B988DE1D3272F710E2911E73001A5A7C471037B
1,899,898 UART: [art] SIG.S = DCA6B713B58C8656EBB4AD076874B36B87248145CF8BE583DD9A4786BE5C1DDCEBFC1DA8BDFB907FE25433CBCFDDAF31
1,923,753 UART: persistent_rt::test_persistent_data_layout...[ok]
1,924,996 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,409 UART: [kat] SHA2-256
894,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,184 UART: [kat] ++
898,336 UART: [kat] sha1
902,744 UART: [kat] SHA2-256
904,684 UART: [kat] SHA2-384
907,271 UART: [kat] SHA2-512-ACC
909,172 UART: [kat] ECC-384
919,129 UART: [kat] HMAC-384Kdf
923,723 UART: [kat] LMS
1,172,051 UART: [kat] --
1,173,130 UART: [cold-reset] ++
1,173,660 UART: [fht] FHT @ 0x50003400
1,176,229 UART: [idev] ++
1,176,397 UART: [idev] CDI.KEYID = 6
1,176,757 UART: [idev] SUBJECT.KEYID = 7
1,177,181 UART: [idev] UDS.KEYID = 0
1,177,526 ready_for_fw is high
1,177,526 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,185,029 UART: [idev] Erasing UDS.KEYID = 0
1,202,020 UART: [idev] Sha1 KeyId Algorithm
1,210,450 UART: [idev] --
1,211,656 UART: [ldev] ++
1,211,824 UART: [ldev] CDI.KEYID = 6
1,212,187 UART: [ldev] SUBJECT.KEYID = 5
1,212,613 UART: [ldev] AUTHORITY.KEYID = 7
1,213,076 UART: [ldev] FE.KEYID = 1
1,218,352 UART: [ldev] Erasing FE.KEYID = 1
1,244,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,752 UART: [ldev] --
1,284,239 UART: [fwproc] Wait for Commands...
1,284,871 UART: [fwproc] Recv command 0x46574c44
1,285,599 UART: [fwproc] Recv'd Img size: 31832 bytes
1,637,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,814 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,705,887 >>> mbox cmd response: success
1,707,053 UART: [afmc] ++
1,707,221 UART: [afmc] CDI.KEYID = 6
1,707,583 UART: [afmc] SUBJECT.KEYID = 7
1,708,008 UART: [afmc] AUTHORITY.KEYID = 5
1,743,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,760,850 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,182 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,882 UART: [afmc] --
1,786,940 UART: [cold-reset] --
1,787,824 UART: [state] Locking Datavault
1,788,937 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,541 UART: [state] Locking ICCM
1,790,095 UART: [exit] Launching FMC @ 0x40000130
1,795,424 UART:
1,795,440 UART: Running Caliptra FMC ...
1,795,848 UART:
1,795,991 UART: [state] CFI Enabled
1,806,320 UART: [fht] FMC Alias Private Key: 7
1,914,415 UART: [art] Extend RT PCRs Done
1,914,843 UART: [art] Lock RT PCRs Done
1,916,499 UART: [art] Populate DV Done
1,924,554 UART: [fht] FMC Alias Private Key: 7
1,925,572 UART: [art] Derive CDI
1,925,852 UART: [art] Store in in slot 0x4
2,011,767 UART: [art] Derive Key Pair
2,012,127 UART: [art] Store priv key in slot 0x5
2,025,349 UART: [art] Derive Key Pair - Done
2,040,244 UART: [art] Signing Cert with AUTHO
2,040,724 UART: RITY.KEYID = 7
2,055,614 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,379 UART: [art] PUB.X = ADC0F1C92E0F49124E191AF5859236CA24EF0410CA72283721925DBD50230A116EF02E2E93A3FF748E9F74854D196994
2,063,138 UART: [art] PUB.Y = 0587B80151DEB1CC01A47757DC897DA056A337DC21E1BFB436C2AFCF03B6128F6839268A8F331FB7E3B654591431CE88
2,070,080 UART: [art] SIG.R = D64D2FE8B147FE23F33FF4F359EB8C23B216414CA287EF0E0AAC8D10C23FE757DFAA1E0215623401B9A22EB0D848906B
2,076,852 UART: [art] SIG.S = 926D3FBA3424B0A85A9464FFB9EE075CFBE80AE1145C88E66CF39A9C82E98E6B247919BDA126ACA287F58F342D2F070E
2,099,840 UART: persistent_rt::test_persistent_data_layout...[ok]
2,101,083 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,864 ready_for_fw is high
1,060,864 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,558,574 >>> mbox cmd response: success
1,621,302 UART:
1,621,318 UART: Running Caliptra FMC ...
1,621,726 UART:
1,621,869 UART: [state] CFI Enabled
1,632,388 UART: [fht] FMC Alias Private Key: 7
1,740,291 UART: [art] Extend RT PCRs Done
1,740,719 UART: [art] Lock RT PCRs Done
1,742,195 UART: [art] Populate DV Done
1,750,432 UART: [fht] FMC Alias Private Key: 7
1,751,546 UART: [art] Derive CDI
1,751,826 UART: [art] Store in in slot 0x4
1,837,383 UART: [art] Derive Key Pair
1,837,743 UART: [art] Store priv key in slot 0x5
1,850,799 UART: [art] Derive Key Pair - Done
1,865,810 UART: [art] Signing Cert with AUTHO
1,866,290 UART: RITY.KEYID = 7
1,881,708 UART: [art] Erasing AUTHORITY.KEYID = 7
1,882,473 UART: [art] PUB.X = 8F6C2DC79E155CA5B8C2DE564CD6F13B07719A702DB6B664AD0F72A41C3F924F739A86E0EE85323A1891DDD921B51BDB
1,889,251 UART: [art] PUB.Y = 0573D3CB0345D62C3CCB376AEFEEA3FC0C3733FEE795F33FFF368EBF3C2935C278D893EE8287C8167A5D59B9D338AA13
1,896,208 UART: [art] SIG.R = D17813E205AC0BBE64A0364D936F02766FEC5537D6127E1A7A46D7FE909AFC7A4D9D027280344437E6A9DDE859CEF850
1,902,972 UART: [art] SIG.S = E413E0187D4901F4FE63F298255461698C54C15D75047BF8E29459ABD6F6038E4EE0631A7216B9F899BCD9D2ED8D0A18
1,926,040 UART: persistent_rt::test_persistent_data_layout...[ok]
1,927,283 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
920,916 UART: [kat] LMS
1,169,228 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,174,629 ready_for_fw is high
1,174,629 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,145 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,208,984 UART: [ldev] ++
1,209,152 UART: [ldev] CDI.KEYID = 6
1,209,516 UART: [ldev] SUBJECT.KEYID = 5
1,209,943 UART: [ldev] AUTHORITY.KEYID = 7
1,210,406 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,302 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,365 UART: [fwproc] Recv command 0x46574c44
1,282,098 UART: [fwproc] Recv'd Img size: 31832 bytes
1,634,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,876 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,008 >>> mbox cmd response: success
1,704,137 UART: [afmc] ++
1,704,305 UART: [afmc] CDI.KEYID = 6
1,704,668 UART: [afmc] SUBJECT.KEYID = 7
1,705,094 UART: [afmc] AUTHORITY.KEYID = 5
1,740,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,886 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,615 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,498 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,006 UART: [afmc] --
1,784,014 UART: [cold-reset] --
1,784,846 UART: [state] Locking Datavault
1,785,731 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,335 UART: [state] Locking ICCM
1,786,905 UART: [exit] Launching FMC @ 0x40000130
1,792,234 UART:
1,792,250 UART: Running Caliptra FMC ...
1,792,658 UART:
1,792,712 UART: [state] CFI Enabled
1,803,067 UART: [fht] FMC Alias Private Key: 7
1,911,150 UART: [art] Extend RT PCRs Done
1,911,578 UART: [art] Lock RT PCRs Done
1,913,494 UART: [art] Populate DV Done
1,921,857 UART: [fht] FMC Alias Private Key: 7
1,922,817 UART: [art] Derive CDI
1,923,097 UART: [art] Store in in slot 0x4
2,009,058 UART: [art] Derive Key Pair
2,009,418 UART: [art] Store priv key in slot 0x5
2,022,432 UART: [art] Derive Key Pair - Done
2,037,307 UART: [art] Signing Cert with AUTHO
2,037,787 UART: RITY.KEYID = 7
2,053,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,924 UART: [art] PUB.X = 59CE94DC3AAC511BC420C36D2A6F06A93EB64B011BDC0E2ADA23B9AEC5B50B4524F9D259DE3763F125C12D6A9A87AF6C
2,060,704 UART: [art] PUB.Y = D7985B0AB9C1C73654D13CC27E75AD58FD5A4B155D10A301ED470CFE0F5D22CE97812EA4DB6D36572D0FA940609E1E3D
2,067,653 UART: [art] SIG.R = F9E229068CA12656C8EDD58B3A7526A8DB3BFBFDD2CCA2F87D991AB33E219CBD552FACF764F324D813048E08C65928B4
2,074,430 UART: [art] SIG.S = 25348660C4FFD57B1C69335A1996003C189F1B7187E526BC9F29989E39DC12F43BD54FBB4EE7E27165E6D065862F03BE
2,098,393 UART: persistent_rt::test_persistent_data_layout...[ok]
2,099,636 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,668 ready_for_fw is high
1,056,668 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,553,366 >>> mbox cmd response: success
1,615,836 UART:
1,615,852 UART: Running Caliptra FMC ...
1,616,260 UART:
1,616,314 UART: [state] CFI Enabled
1,626,621 UART: [fht] FMC Alias Private Key: 7
1,735,302 UART: [art] Extend RT PCRs Done
1,735,730 UART: [art] Lock RT PCRs Done
1,736,842 UART: [art] Populate DV Done
1,745,017 UART: [fht] FMC Alias Private Key: 7
1,746,187 UART: [art] Derive CDI
1,746,467 UART: [art] Store in in slot 0x4
1,832,234 UART: [art] Derive Key Pair
1,832,594 UART: [art] Store priv key in slot 0x5
1,846,150 UART: [art] Derive Key Pair - Done
1,860,536 UART: [art] Signing Cert with AUTHO
1,861,016 UART: RITY.KEYID = 7
1,876,462 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,227 UART: [art] PUB.X = F09CDAEC1489335B5DC724A0A99C525816AFF7B860B23ABFCFD460FF3B6E9ADFE1B3D440C0C3BC08313D7DC59D7C0E0A
1,884,014 UART: [art] PUB.Y = FB25D1174C4521A84627294533F13E0A88C60BADCEFFE88E2B5D103A3EE11A65311AA33E1831F4336A6E48AFD680AFF4
1,890,968 UART: [art] SIG.R = BEECAFF73B1DE61C63337A2A0C2659BD2B44681247FE7BFF24AAEADB9B0A035EB1A166E5DF5F1C08B999AA0F302FA753
1,897,749 UART: [art] SIG.S = 5CC85C9A52D12A0016DE3AB013D67C3123B8D24309EF4572719A099B895ABD580772B6F8C6E58A625D35D7CDB8D20A8B
1,921,713 UART: persistent_rt::test_persistent_data_layout...[ok]
1,922,956 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,174,616 ready_for_fw is high
1,174,616 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,649 UART: [ldev] ++
1,209,817 UART: [ldev] CDI.KEYID = 6
1,210,181 UART: [ldev] SUBJECT.KEYID = 5
1,210,608 UART: [ldev] AUTHORITY.KEYID = 7
1,211,071 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,113 UART: [ldev] --
1,282,443 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,905 UART: [fwproc] Recv'd Img size: 31832 bytes
1,635,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,345 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,269 >>> mbox cmd response: success
1,704,408 UART: [afmc] ++
1,704,576 UART: [afmc] CDI.KEYID = 6
1,704,939 UART: [afmc] SUBJECT.KEYID = 7
1,705,365 UART: [afmc] AUTHORITY.KEYID = 5
1,740,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,773 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,492 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,295 UART: [afmc] --
1,784,189 UART: [cold-reset] --
1,785,045 UART: [state] Locking Datavault
1,786,184 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,788 UART: [state] Locking ICCM
1,787,292 UART: [exit] Launching FMC @ 0x40000130
1,792,621 UART:
1,792,637 UART: Running Caliptra FMC ...
1,793,045 UART:
1,793,188 UART: [state] CFI Enabled
1,803,905 UART: [fht] FMC Alias Private Key: 7
1,912,706 UART: [art] Extend RT PCRs Done
1,913,134 UART: [art] Lock RT PCRs Done
1,914,806 UART: [art] Populate DV Done
1,922,975 UART: [fht] FMC Alias Private Key: 7
1,924,005 UART: [art] Derive CDI
1,924,285 UART: [art] Store in in slot 0x4
2,009,826 UART: [art] Derive Key Pair
2,010,186 UART: [art] Store priv key in slot 0x5
2,023,918 UART: [art] Derive Key Pair - Done
2,038,712 UART: [art] Signing Cert with AUTHO
2,039,192 UART: RITY.KEYID = 7
2,054,490 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,255 UART: [art] PUB.X = 3AEA99979F447201F34FDA598DDEF9A94A1D3FE077343EEEF41BD05577A079723CA595097BEDA5CE295FA8F4EAE69F09
2,062,032 UART: [art] PUB.Y = B310FEF2DC07D5D1381E6CBA1B8831E6AD63B28E7F3515A85A4B197206E191697DE16F408FE892E81B60DD7ED3EEDDC4
2,068,992 UART: [art] SIG.R = 04D5A6AF5DAC0FB2C911DD6519358FDD0ADE92C62D67D5950550DA529064F6A9B97DF4239BC163CA6AC491E7C01A41DF
2,075,766 UART: [art] SIG.S = 6781DC9330001C14B34738ADEC14C30BD92B1F5ABBD96D6D3BE971F9A5CE971C85C08AF18971EF76DE2EBA1B7463DB49
2,099,997 UART: persistent_rt::test_persistent_data_layout...[ok]
2,101,240 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,665 ready_for_fw is high
1,055,665 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,552,461 >>> mbox cmd response: success
1,614,935 UART:
1,614,951 UART: Running Caliptra FMC ...
1,615,359 UART:
1,615,502 UART: [state] CFI Enabled
1,625,991 UART: [fht] FMC Alias Private Key: 7
1,733,778 UART: [art] Extend RT PCRs Done
1,734,206 UART: [art] Lock RT PCRs Done
1,735,780 UART: [art] Populate DV Done
1,744,193 UART: [fht] FMC Alias Private Key: 7
1,745,299 UART: [art] Derive CDI
1,745,579 UART: [art] Store in in slot 0x4
1,831,196 UART: [art] Derive Key Pair
1,831,556 UART: [art] Store priv key in slot 0x5
1,844,700 UART: [art] Derive Key Pair - Done
1,859,371 UART: [art] Signing Cert with AUTHO
1,859,851 UART: RITY.KEYID = 7
1,875,223 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,988 UART: [art] PUB.X = F81AA73780B38D8D5C68590F1A983FB7866B37853AAE602A08A36E2C8377A29499960A91636974DCC40067D94506375E
1,882,714 UART: [art] PUB.Y = B12A1C7714033659A4CA96216DEC6BCE55D824716630BE8544F3E57AE90B2D89A091878FF72DA2C4C130C3C8FCE9FCFF
1,889,670 UART: [art] SIG.R = B6E2AD773206AEB036C1443529C63B721987640137299000094528703ABCF38F4CA92934800A7C4559E16998DE0FEC88
1,896,391 UART: [art] SIG.S = B1C9F984E1CFC237A4D5CB0B774A127CA87A020E8A050CAF28CD2F3ABFF2E26B52C2B9C71558BB000DBAB4AD9F41B395
1,920,237 UART: persistent_rt::test_persistent_data_layout...[ok]
1,921,480 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,279 UART:
192,659 UART: Running Caliptra ROM ...
193,805 UART:
193,944 UART: [state] CFI Enabled
265,572 UART: [state] LifecycleState = Unprovisioned
267,504 UART: [state] DebugLocked = No
269,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,477 UART: [kat] SHA2-256
444,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,738 UART: [kat] ++
455,205 UART: [kat] sha1
465,433 UART: [kat] SHA2-256
468,089 UART: [kat] SHA2-384
473,011 UART: [kat] SHA2-512-ACC
475,375 UART: [kat] ECC-384
2,767,012 UART: [kat] HMAC-384Kdf
2,798,793 UART: [kat] LMS
3,989,077 UART: [kat] --
3,994,523 UART: [cold-reset] ++
3,995,883 UART: [fht] Storing FHT @ 0x50003400
4,006,153 UART: [idev] ++
4,006,720 UART: [idev] CDI.KEYID = 6
4,007,669 UART: [idev] SUBJECT.KEYID = 7
4,008,906 UART: [idev] UDS.KEYID = 0
4,009,856 ready_for_fw is high
4,010,042 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,153,458 UART: [idev] Erasing UDS.KEYID = 0
7,345,349 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,273 UART: [idev] --
7,371,455 UART: [ldev] ++
7,372,074 UART: [ldev] CDI.KEYID = 6
7,372,955 UART: [ldev] SUBJECT.KEYID = 5
7,374,207 UART: [ldev] AUTHORITY.KEYID = 7
7,375,501 UART: [ldev] FE.KEYID = 1
7,420,356 UART: [ldev] Erasing FE.KEYID = 1
10,755,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,623 UART: [ldev] --
13,136,201 UART: [fwproc] Waiting for Commands...
13,138,822 UART: [fwproc] Received command 0x46574c44
13,140,994 UART: [fwproc] Received Image of size 114036 bytes
17,192,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,661,886 >>> mbox cmd response: success
17,666,806 UART: [afmc] ++
17,667,419 UART: [afmc] CDI.KEYID = 6
17,668,325 UART: [afmc] SUBJECT.KEYID = 7
17,669,533 UART: [afmc] AUTHORITY.KEYID = 5
21,030,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,514 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,926 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,749 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,192 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,909 UART: [afmc] --
23,398,156 UART: [cold-reset] --
23,401,798 UART: [state] Locking Datavault
23,408,981 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,723 UART: [state] Locking ICCM
23,412,104 UART: [exit] Launching FMC @ 0x40000130
23,420,492 UART:
23,420,740 UART: Running Caliptra FMC ...
23,421,833 UART:
23,421,988 UART: [state] CFI Enabled
23,489,162 UART: [fht] FMC Alias Private Key: 7
25,827,597 UART: [art] Extend RT PCRs Done
25,828,813 UART: [art] Lock RT PCRs Done
25,830,565 UART: [art] Populate DV Done
25,836,026 UART: [fht] FMC Alias Private Key: 7
25,837,512 UART: [art] Derive CDI
25,838,432 UART: [art] Store in in slot 0x4
25,898,454 UART: [art] Derive Key Pair
25,899,485 UART: [art] Store priv key in slot 0x5
29,192,299 UART: [art] Derive Key Pair - Done
29,205,357 UART: [art] Signing Cert with AUTHO
29,206,657 UART: RITY.KEYID = 7
31,494,281 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,803 UART: [art] PUB.X = 4D3EB370A4A313CD4B8DB241891602179B03AFC3AF8EAAB16F1B4C0257756131B99C19C18B4155B21BA6FB9C18D2CE6A
31,503,027 UART: [art] PUB.Y = FA0D4469E350BFA76747B4A0A222CC1E6BEE994A8930A7A7C2FC6090E95493A115292B1434A3D6854FCC15336AB6AECF
31,510,284 UART: [art] SIG.R = 5B1CAE4C4E0338C72844A7C3C0E3013F1E074B8DC2EB535524107C2B98CA3FC8EC85C4FF719D227208E2A802003F3280
31,517,647 UART: [art] SIG.S = F307D16C2B0708C543C958B94ACEE5D31D81239979070BE394DB2A7AFB1E752DBDFA4868043D8C4DF3F9DA4B7D8B378E
32,822,860 UART: Caliptra RT
32,823,559 UART: [state] CFI Enabled
32,984,492 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,807,002 ready_for_fw is high
3,807,416 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,876,011 >>> mbox cmd response: success
23,570,232 UART:
23,570,656 UART: Running Caliptra FMC ...
23,571,802 UART:
23,571,961 UART: [state] CFI Enabled
23,637,518 UART: [fht] FMC Alias Private Key: 7
25,976,031 UART: [art] Extend RT PCRs Done
25,977,255 UART: [art] Lock RT PCRs Done
25,978,766 UART: [art] Populate DV Done
25,984,470 UART: [fht] FMC Alias Private Key: 7
25,985,914 UART: [art] Derive CDI
25,986,649 UART: [art] Store in in slot 0x4
26,046,175 UART: [art] Derive Key Pair
26,047,215 UART: [art] Store priv key in slot 0x5
29,340,537 UART: [art] Derive Key Pair - Done
29,353,162 UART: [art] Signing Cert with AUTHO
29,354,460 UART: RITY.KEYID = 7
31,642,183 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,698 UART: [art] PUB.X = C9139D9ADD67AD8183CD6CA22162BEF82AED0E392D56B140250706E80C83FB9334A0302DE5A331D6C8FEAD9E036E9B44
31,650,940 UART: [art] PUB.Y = FDF28B9BF87398EB1978F4C0C76F9433AB99E4E7CA15D3B9E0D0DB53485C733B301444840F325EE2EB8994B2C8A7C9B9
31,658,204 UART: [art] SIG.R = E3C8F110838B18FEF6433F4AF12F0C156C18E2C4C5BFA3DD885067D9BDF41150A2704DC13A9A3B35E8AFAB5CD2CB97C5
31,665,553 UART: [art] SIG.S = E06D9EC30241E6394E086D15B6A441A52D3EC22C1BD6705F462CE41419E57DF30115509C880E71F1D1E50726529CC7BD
32,969,947 UART: Caliptra RT
32,970,661 UART: [state] CFI Enabled
33,132,213 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,330 UART:
192,683 UART: Running Caliptra ROM ...
193,801 UART:
603,596 UART: [state] CFI Enabled
615,899 UART: [state] LifecycleState = Unprovisioned
617,791 UART: [state] DebugLocked = No
620,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,239 UART: [kat] SHA2-256
795,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,514 UART: [kat] ++
806,958 UART: [kat] sha1
818,965 UART: [kat] SHA2-256
821,689 UART: [kat] SHA2-384
828,244 UART: [kat] SHA2-512-ACC
830,677 UART: [kat] ECC-384
3,116,112 UART: [kat] HMAC-384Kdf
3,126,217 UART: [kat] LMS
4,316,302 UART: [kat] --
4,323,159 UART: [cold-reset] ++
4,324,378 UART: [fht] Storing FHT @ 0x50003400
4,337,080 UART: [idev] ++
4,337,645 UART: [idev] CDI.KEYID = 6
4,338,596 UART: [idev] SUBJECT.KEYID = 7
4,339,840 UART: [idev] UDS.KEYID = 0
4,340,792 ready_for_fw is high
4,341,006 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,281 UART: [idev] Erasing UDS.KEYID = 0
7,630,623 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,100 UART: [idev] --
7,654,160 UART: [ldev] ++
7,654,739 UART: [ldev] CDI.KEYID = 6
7,655,705 UART: [ldev] SUBJECT.KEYID = 5
7,656,917 UART: [ldev] AUTHORITY.KEYID = 7
7,658,143 UART: [ldev] FE.KEYID = 1
7,667,813 UART: [ldev] Erasing FE.KEYID = 1
10,959,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,944 UART: [ldev] --
13,320,152 UART: [fwproc] Waiting for Commands...
13,322,292 UART: [fwproc] Received command 0x46574c44
13,324,635 UART: [fwproc] Received Image of size 114036 bytes
17,377,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,304 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,836,735 >>> mbox cmd response: success
17,840,834 UART: [afmc] ++
17,841,426 UART: [afmc] CDI.KEYID = 6
17,842,337 UART: [afmc] SUBJECT.KEYID = 7
17,843,549 UART: [afmc] AUTHORITY.KEYID = 5
21,158,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,469 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,777 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,135 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,970 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,465 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,251 UART: [afmc] --
23,524,411 UART: [cold-reset] --
23,528,810 UART: [state] Locking Datavault
23,534,764 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,516 UART: [state] Locking ICCM
23,539,258 UART: [exit] Launching FMC @ 0x40000130
23,547,649 UART:
23,547,893 UART: Running Caliptra FMC ...
23,548,942 UART:
23,549,093 UART: [state] CFI Enabled
23,556,883 UART: [fht] FMC Alias Private Key: 7
25,887,794 UART: [art] Extend RT PCRs Done
25,889,014 UART: [art] Lock RT PCRs Done
25,890,612 UART: [art] Populate DV Done
25,896,205 UART: [fht] FMC Alias Private Key: 7
25,897,684 UART: [art] Derive CDI
25,898,449 UART: [art] Store in in slot 0x4
25,941,151 UART: [art] Derive Key Pair
25,942,147 UART: [art] Store priv key in slot 0x5
29,184,005 UART: [art] Derive Key Pair - Done
29,196,847 UART: [art] Signing Cert with AUTHO
29,198,151 UART: RITY.KEYID = 7
31,477,737 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,238 UART: [art] PUB.X = E0C71A4F9EABCC2F2FB858C0983AAD1082B1BB6A1DA8F7AB93193789FB1729E4C98335C18A27E34BDF3013A36033E812
31,486,478 UART: [art] PUB.Y = 07347976C3F053C39F894EECC3FF3DFFD6B1E1127E553FC33C4170330256489918D4032E111A7FBE6A85B3F48893122D
31,493,697 UART: [art] SIG.R = A8C32C182137B029BF21F855B76EB18DD6FA11894C382B37902AE7669405A793ADCECF369112C0BB67E04EBA67DE0884
31,501,096 UART: [art] SIG.S = 6B85F475A7315C6BB3FFF009908B5960BB18D3597B756143FF256649E3F7E42D228CD89C86213BB518152E606B8C1CC1
32,806,166 UART: Caliptra RT
32,806,871 UART: [state] CFI Enabled
32,924,224 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,121,447 ready_for_fw is high
4,121,985 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,070,076 >>> mbox cmd response: success
23,714,759 UART:
23,715,150 UART: Running Caliptra FMC ...
23,716,262 UART:
23,716,413 UART: [state] CFI Enabled
23,724,095 UART: [fht] FMC Alias Private Key: 7
26,054,583 UART: [art] Extend RT PCRs Done
26,055,809 UART: [art] Lock RT PCRs Done
26,057,789 UART: [art] Populate DV Done
26,063,151 UART: [fht] FMC Alias Private Key: 7
26,064,855 UART: [art] Derive CDI
26,065,598 UART: [art] Store in in slot 0x4
26,108,050 UART: [art] Derive Key Pair
26,109,096 UART: [art] Store priv key in slot 0x5
29,351,095 UART: [art] Derive Key Pair - Done
29,364,148 UART: [art] Signing Cert with AUTHO
29,365,446 UART: RITY.KEYID = 7
31,644,588 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,094 UART: [art] PUB.X = 1EFA98FF153626FEDAE8C1468F8AED80912D14388B8AE70E1DBDB3906A589ACA5822B2CC9F86CAFE21EC1FC19818811C
31,653,315 UART: [art] PUB.Y = 017EE4AE80CC92CAB75605F52F56197EFBEC878FCDF739E6A7CD75CEC7526FD5443F8CA7A89027044193D2C4E6B4108C
31,660,620 UART: [art] SIG.R = B787543E78501FB3AA1F20EB81275888CE0DA866ABC11A14D13B4539C23A5B4A42560133962BF0F353F07B358221B6FB
31,667,975 UART: [art] SIG.S = 82D8357880FB952A3BFA18169C2F959971535487B7D75F8F684A7C5B0A26C4D7A2E7E2419017297CCFC67CE1BF597644
32,973,068 UART: Caliptra RT
32,973,780 UART: [state] CFI Enabled
33,090,905 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
192,696 UART:
193,064 UART: Running Caliptra ROM ...
194,266 UART:
194,425 UART: [state] CFI Enabled
266,302 UART: [state] LifecycleState = Unprovisioned
268,238 UART: [state] DebugLocked = No
270,203 UART: [state] WD Timer not started. Device not locked for debugging
274,028 UART: [kat] SHA2-256
453,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,701 UART: [kat] ++
465,148 UART: [kat] sha1
475,876 UART: [kat] SHA2-256
478,845 UART: [kat] SHA2-384
484,661 UART: [kat] SHA2-512-ACC
487,675 UART: [kat] ECC-384
2,949,677 UART: [kat] HMAC-384Kdf
2,971,431 UART: [kat] LMS
3,500,872 UART: [kat] --
3,506,015 UART: [cold-reset] ++
3,508,592 UART: [fht] FHT @ 0x50003400
3,519,035 UART: [idev] ++
3,519,661 UART: [idev] CDI.KEYID = 6
3,520,742 UART: [idev] SUBJECT.KEYID = 7
3,521,844 UART: [idev] UDS.KEYID = 0
3,522,777 ready_for_fw is high
3,522,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,636 UART: [idev] Erasing UDS.KEYID = 0
6,029,715 UART: [idev] Sha1 KeyId Algorithm
6,052,024 UART: [idev] --
6,055,536 UART: [ldev] ++
6,056,116 UART: [ldev] CDI.KEYID = 6
6,057,032 UART: [ldev] SUBJECT.KEYID = 5
6,058,197 UART: [ldev] AUTHORITY.KEYID = 7
6,059,430 UART: [ldev] FE.KEYID = 1
6,100,591 UART: [ldev] Erasing FE.KEYID = 1
8,601,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,427 UART: [ldev] --
10,393,227 UART: [fwproc] Wait for Commands...
10,395,479 UART: [fwproc] Recv command 0x46574c44
10,397,720 UART: [fwproc] Recv'd Img size: 114360 bytes
13,800,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,262,389 >>> mbox cmd response: success
14,267,477 UART: [afmc] ++
14,268,080 UART: [afmc] CDI.KEYID = 6
14,268,997 UART: [afmc] SUBJECT.KEYID = 7
14,270,156 UART: [afmc] AUTHORITY.KEYID = 5
16,806,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,938 UART: [afmc] --
18,610,556 UART: [cold-reset] --
18,613,817 UART: [state] Locking Datavault
18,618,954 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,596 UART: [state] Locking ICCM
18,621,990 UART: [exit] Launching FMC @ 0x40000130
18,630,385 UART:
18,630,631 UART: Running Caliptra FMC ...
18,631,733 UART:
18,631,894 UART: [state] CFI Enabled
18,692,571 UART: [fht] FMC Alias Private Key: 7
20,457,340 UART: [art] Extend RT PCRs Done
20,458,559 UART: [art] Lock RT PCRs Done
20,460,259 UART: [art] Populate DV Done
20,465,996 UART: [fht] FMC Alias Private Key: 7
20,467,638 UART: [art] Derive CDI
20,468,456 UART: [art] Store in in slot 0x4
20,525,606 UART: [art] Derive Key Pair
20,526,643 UART: [art] Store priv key in slot 0x5
22,989,940 UART: [art] Derive Key Pair - Done
23,002,673 UART: [art] Signing Cert with AUTHO
23,003,976 UART: RITY.KEYID = 7
24,715,596 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,099 UART: [art] PUB.X = 3099CFB6290871DF75DE93E782CC69E670F16F9D0A81CEABCF1B7965DA3B0BD3B6D01D360490F7C142B3F9B5E572CBE8
24,724,410 UART: [art] PUB.Y = 4391C4A404FA2A81F778A5A780C8FB21C54EC5A26B34FC89D0513E10DF3EDD0A9EC34FE1373F7F3D8D6D407D40BF4806
24,731,627 UART: [art] SIG.R = 219E4F55FC52298099D6FF2B1CE02ABE90CAC3091A8199A4F8535D827B8DE30F3621D90D9FEC062BF81A110B7E2AC9B1
24,739,055 UART: [art] SIG.S = F8CD7E44943BB720D45038B5D70E30971763547272E00A7691A3202761DADE4E5607FE4B6A103C6DDCE9F88690392357
25,717,865 UART: Caliptra RT
25,718,563 UART: [state] CFI Enabled
25,884,368 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
192,658 UART:
193,040 UART: Running Caliptra ROM ...
194,248 UART:
194,407 UART: [state] CFI Enabled
262,753 UART: [state] LifecycleState = Unprovisioned
265,165 UART: [state] DebugLocked = No
267,342 UART: [state] WD Timer not started. Device not locked for debugging
271,298 UART: [kat] SHA2-256
461,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,957 UART: [kat] ++
472,441 UART: [kat] sha1
484,546 UART: [kat] SHA2-256
487,566 UART: [kat] SHA2-384
493,774 UART: [kat] SHA2-512-ACC
496,358 UART: [kat] ECC-384
2,950,105 UART: [kat] HMAC-384Kdf
2,972,566 UART: [kat] LMS
3,504,377 UART: [kat] --
3,506,666 UART: [cold-reset] ++
3,508,383 UART: [fht] FHT @ 0x50003400
3,520,284 UART: [idev] ++
3,520,917 UART: [idev] CDI.KEYID = 6
3,521,900 UART: [idev] SUBJECT.KEYID = 7
3,523,071 UART: [idev] UDS.KEYID = 0
3,523,974 ready_for_fw is high
3,524,158 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,970 UART: [idev] Erasing UDS.KEYID = 0
6,029,306 UART: [idev] Sha1 KeyId Algorithm
6,052,351 UART: [idev] --
6,055,943 UART: [ldev] ++
6,056,632 UART: [ldev] CDI.KEYID = 6
6,057,523 UART: [ldev] SUBJECT.KEYID = 5
6,058,738 UART: [ldev] AUTHORITY.KEYID = 7
6,059,875 UART: [ldev] FE.KEYID = 1
6,101,849 UART: [ldev] Erasing FE.KEYID = 1
8,605,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,941 UART: [ldev] --
10,414,018 UART: [fwproc] Wait for Commands...
10,417,138 UART: [fwproc] Recv command 0x46574c44
10,419,468 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,555 >>> mbox cmd response: success
14,607,928 UART: [afmc] ++
14,608,639 UART: [afmc] CDI.KEYID = 6
14,609,885 UART: [afmc] SUBJECT.KEYID = 7
14,611,321 UART: [afmc] AUTHORITY.KEYID = 5
17,157,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,849 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,004 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,105 UART: [afmc] --
18,969,209 UART: [cold-reset] --
18,974,321 UART: [state] Locking Datavault
18,981,196 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,344 UART: [state] Locking ICCM
18,984,938 UART: [exit] Launching FMC @ 0x40000130
18,993,602 UART:
18,993,840 UART: Running Caliptra FMC ...
18,994,944 UART:
18,995,100 UART: [state] CFI Enabled
19,051,563 UART: [fht] FMC Alias Private Key: 7
20,815,890 UART: [art] Extend RT PCRs Done
20,817,096 UART: [art] Lock RT PCRs Done
20,818,346 UART: [art] Populate DV Done
20,823,811 UART: [fht] FMC Alias Private Key: 7
20,825,294 UART: [art] Derive CDI
20,826,209 UART: [art] Store in in slot 0x4
20,884,405 UART: [art] Derive Key Pair
20,885,440 UART: [art] Store priv key in slot 0x5
23,348,632 UART: [art] Derive Key Pair - Done
23,361,634 UART: [art] Signing Cert with AUTHO
23,362,937 UART: RITY.KEYID = 7
25,074,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,094 UART: [art] PUB.X = 9639F534C5E8362BD6970E8CA56715149E90DC9BD3CD66CA09E357A144222571B383BFFD2987303353C2B54A10C24B66
25,083,338 UART: [art] PUB.Y = 7D3FC1A31DA37B5B8A7198CC2AEC76F856DCDCB92F9BC7B64E62E9E0D5352ACE62C88284602504BFBEDEF3438293A562
25,090,669 UART: [art] SIG.R = 3346C239D234970DBF5E830830359DA44CF6FBE19CA2DC44B9C2B2CCFD57EED7BF676CCA928BB3106CF029E4455DD71B
25,098,093 UART: [art] SIG.S = 3C5DC3D312ECD5984C8B2F4B47CBA85E1FA1A3809CB7AB93173211ABD4AE043CC29DEAB6B6AD24BC674D59400C9D1C1A
26,077,070 UART: Caliptra RT
26,077,786 UART: [state] CFI Enabled
26,243,363 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,441,318 ready_for_fw is high
3,441,775 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,743,145 >>> mbox cmd response: success
19,047,931 UART:
19,048,321 UART: Running Caliptra FMC ...
19,049,459 UART:
19,049,619 UART: [state] CFI Enabled
19,115,196 UART: [fht] FMC Alias Private Key: 7
20,878,921 UART: [art] Extend RT PCRs Done
20,880,139 UART: [art] Lock RT PCRs Done
20,881,629 UART: [art] Populate DV Done
20,887,044 UART: [fht] FMC Alias Private Key: 7
20,888,592 UART: [art] Derive CDI
20,889,411 UART: [art] Store in in slot 0x4
20,948,295 UART: [art] Derive Key Pair
20,949,331 UART: [art] Store priv key in slot 0x5
23,411,822 UART: [art] Derive Key Pair - Done
23,424,380 UART: [art] Signing Cert with AUTHO
23,425,684 UART: RITY.KEYID = 7
25,137,764 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,273 UART: [art] PUB.X = B745863479E3864473EFABAD7CDFD64881DBFA266716053CBCA65A482BA3605917459ABC955A7D70BCA5B3AC5781EE1C
25,146,546 UART: [art] PUB.Y = AADB668A367BA930017561D7AC9158713F3FE9D15FDF8C4FA8EA50A2D0E0C99C8B19BC849780CC606B46D0417A282426
25,153,811 UART: [art] SIG.R = 14979AE4E6BDC987039D5F971A9C09E78513E794B56D94CDDC08ED27FF2D487EA94C8757CA1D0E00FAF159393FD0C191
25,161,195 UART: [art] SIG.S = DC6998FA9DAFCF7E6C896A36C7009F26EF5D415A35416CEDD515C5636ACA1135A1ECFC36DEEB8BF7828337CF680BE0A9
26,140,451 UART: Caliptra RT
26,141,138 UART: [state] CFI Enabled
26,306,748 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,348 UART:
192,712 UART: Running Caliptra ROM ...
193,806 UART:
603,549 UART: [state] CFI Enabled
617,556 UART: [state] LifecycleState = Unprovisioned
619,955 UART: [state] DebugLocked = No
621,546 UART: [state] WD Timer not started. Device not locked for debugging
626,145 UART: [kat] SHA2-256
816,015 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,821 UART: [kat] ++
827,339 UART: [kat] sha1
838,514 UART: [kat] SHA2-256
841,559 UART: [kat] SHA2-384
846,839 UART: [kat] SHA2-512-ACC
849,417 UART: [kat] ECC-384
3,293,041 UART: [kat] HMAC-384Kdf
3,307,196 UART: [kat] LMS
3,838,987 UART: [kat] --
3,842,908 UART: [cold-reset] ++
3,843,842 UART: [fht] FHT @ 0x50003400
3,856,090 UART: [idev] ++
3,856,746 UART: [idev] CDI.KEYID = 6
3,857,775 UART: [idev] SUBJECT.KEYID = 7
3,858,951 UART: [idev] UDS.KEYID = 0
3,859,850 ready_for_fw is high
3,860,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,665 UART: [idev] Erasing UDS.KEYID = 0
6,336,287 UART: [idev] Sha1 KeyId Algorithm
6,358,058 UART: [idev] --
6,363,696 UART: [ldev] ++
6,364,377 UART: [ldev] CDI.KEYID = 6
6,365,288 UART: [ldev] SUBJECT.KEYID = 5
6,366,442 UART: [ldev] AUTHORITY.KEYID = 7
6,367,669 UART: [ldev] FE.KEYID = 1
6,378,580 UART: [ldev] Erasing FE.KEYID = 1
8,853,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,083 UART: [ldev] --
10,644,889 UART: [fwproc] Wait for Commands...
10,646,766 UART: [fwproc] Recv command 0x46574c44
10,649,017 UART: [fwproc] Recv'd Img size: 114360 bytes
14,094,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,834,326 >>> mbox cmd response: success
14,838,249 UART: [afmc] ++
14,838,966 UART: [afmc] CDI.KEYID = 6
14,840,210 UART: [afmc] SUBJECT.KEYID = 7
14,841,646 UART: [afmc] AUTHORITY.KEYID = 5
17,342,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,532 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,116 UART: [afmc] --
19,137,656 UART: [cold-reset] --
19,142,374 UART: [state] Locking Datavault
19,147,505 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,695 UART: [state] Locking ICCM
19,152,111 UART: [exit] Launching FMC @ 0x40000130
19,160,785 UART:
19,161,060 UART: Running Caliptra FMC ...
19,162,170 UART:
19,162,331 UART: [state] CFI Enabled
19,170,053 UART: [fht] FMC Alias Private Key: 7
20,926,490 UART: [art] Extend RT PCRs Done
20,927,712 UART: [art] Lock RT PCRs Done
20,929,606 UART: [art] Populate DV Done
20,934,965 UART: [fht] FMC Alias Private Key: 7
20,936,660 UART: [art] Derive CDI
20,937,393 UART: [art] Store in in slot 0x4
20,980,415 UART: [art] Derive Key Pair
20,981,412 UART: [art] Store priv key in slot 0x5
23,407,914 UART: [art] Derive Key Pair - Done
23,420,745 UART: [art] Signing Cert with AUTHO
23,422,044 UART: RITY.KEYID = 7
25,127,405 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,910 UART: [art] PUB.X = 0E954382E5BA0AC696788DF1FF7DE4BFAF9E5795EC16183E19837B4088B29E5C21C2E441A3FBE9ABEEBEDFE5313D8228
25,136,160 UART: [art] PUB.Y = B53F178AF65BE5F4DBD21ADE647F7784919D113842BACD224917853E58B0AD09AE187459F0C9263BF8155BCFDDD7C1A6
25,143,441 UART: [art] SIG.R = 1FB3755D650CCC9485A0804C4568692E35EEB19E8968E4247E4F9D9A533B8017B97BDB114B42D1CE47944E8B968E7940
25,150,834 UART: [art] SIG.S = 1984815EE3DFB8BED6622240EB2E53943D400A1D93A2025EAD2A1D0C0891AA8B529FF19292D6F9E113485FA1F4351F40
26,130,129 UART: Caliptra RT
26,130,839 UART: [state] CFI Enabled
26,247,843 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,755,738 ready_for_fw is high
3,756,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,800 >>> mbox cmd response: success
19,209,191 UART:
19,209,590 UART: Running Caliptra FMC ...
19,210,790 UART:
19,210,957 UART: [state] CFI Enabled
19,218,800 UART: [fht] FMC Alias Private Key: 7
20,975,843 UART: [art] Extend RT PCRs Done
20,977,068 UART: [art] Lock RT PCRs Done
20,979,075 UART: [art] Populate DV Done
20,984,488 UART: [fht] FMC Alias Private Key: 7
20,986,027 UART: [art] Derive CDI
20,986,996 UART: [art] Store in in slot 0x4
21,029,500 UART: [art] Derive Key Pair
21,030,504 UART: [art] Store priv key in slot 0x5
23,457,269 UART: [art] Derive Key Pair - Done
23,470,329 UART: [art] Signing Cert with AUTHO
23,471,689 UART: RITY.KEYID = 7
25,176,895 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,404 UART: [art] PUB.X = 23C0084FD853E17E88B26CCFC29E013AFC23A6F834C14F4B006F3F33386FB5A4CCE6335668845EBA13E8449DA123404D
25,185,622 UART: [art] PUB.Y = C40F4FFD06BE6BA61F4367AC01F933DF55BE4C588B855AF6044EB40709A681AEA8F2FC28C926BBAFA178A06F722C0EE1
25,192,950 UART: [art] SIG.R = EE104334113BB76A0DE1A2F89E85194E78676E4C6C08DA80EA5F2969CC6AA581AC3495DB0A8781E4E98E957B3343BA7E
25,200,308 UART: [art] SIG.S = D4A473F965897B557B983207CB05BF62FE5FAD5DDCB1EA89752D290AF936F2FB5B035F96D14925B419DEC269E84B3D81
26,179,388 UART: Caliptra RT
26,180,097 UART: [state] CFI Enabled
26,296,805 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,623 UART: [kat] SHA2-256
881,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,669 UART: [kat] ++
885,821 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,728 UART: [kat] SHA2-512-ACC
896,629 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,477,007 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 ready_for_fw is high
1,480,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,442 UART: [idev] Erasing UDS.KEYID = 0
1,504,602 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,158 UART: [idev] --
1,514,077 UART: [ldev] ++
1,514,245 UART: [ldev] CDI.KEYID = 6
1,514,608 UART: [ldev] SUBJECT.KEYID = 5
1,515,034 UART: [ldev] AUTHORITY.KEYID = 7
1,515,497 UART: [ldev] FE.KEYID = 1
1,520,841 UART: [ldev] Erasing FE.KEYID = 1
1,546,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,024 UART: [ldev] --
1,585,345 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 114360 bytes
2,885,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,836 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,017 >>> mbox cmd response: success
3,079,225 UART: [afmc] ++
3,079,393 UART: [afmc] CDI.KEYID = 6
3,079,755 UART: [afmc] SUBJECT.KEYID = 7
3,080,180 UART: [afmc] AUTHORITY.KEYID = 5
3,115,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,277 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,670 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,360 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,435 UART: [afmc] --
3,158,523 UART: [cold-reset] --
3,159,525 UART: [state] Locking Datavault
3,160,670 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,274 UART: [state] Locking ICCM
3,161,796 UART: [exit] Launching FMC @ 0x40000130
3,167,125 UART:
3,167,141 UART: Running Caliptra FMC ...
3,167,549 UART:
3,167,603 UART: [state] CFI Enabled
3,178,302 UART: [fht] FMC Alias Private Key: 7
3,285,763 UART: [art] Extend RT PCRs Done
3,286,191 UART: [art] Lock RT PCRs Done
3,287,521 UART: [art] Populate DV Done
3,295,664 UART: [fht] FMC Alias Private Key: 7
3,296,788 UART: [art] Derive CDI
3,297,068 UART: [art] Store in in slot 0x4
3,382,491 UART: [art] Derive Key Pair
3,382,851 UART: [art] Store priv key in slot 0x5
3,395,581 UART: [art] Derive Key Pair - Done
3,410,548 UART: [art] Signing Cert with AUTHO
3,411,028 UART: RITY.KEYID = 7
3,426,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,235 UART: [art] PUB.X = E790C68802F19DBB22818FFE43F851BC7B9E5FB9BA5C9E41AE155FBF2C8DA1B5A42F09159BD316D467D1384B490AB244
3,434,010 UART: [art] PUB.Y = C6F653C0AD8ABFEB65592A7D1594564C2174BDEE451BEA5B2771EA651B6754A8EBEE16E5114B52EC304B52DEA215A8A5
3,440,976 UART: [art] SIG.R = D9A66F9351F637313A12973337A8965BADE66BF4B0BE28CCB1176DCB2B4276573536A9722F815BF21B709792E03F4657
3,447,742 UART: [art] SIG.S = 43A0E632E29E6C9CA65EC6A177388C039E67554D20CC4392E4522C604FB3C471B782D4D7C1804D8B4A417A711F22ED03
3,471,039 UART: Caliptra RT
3,471,293 UART: [state] CFI Enabled
3,578,781 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 ready_for_fw is high
1,362,615 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,671 >>> mbox cmd response: success
2,990,835 UART:
2,990,851 UART: Running Caliptra FMC ...
2,991,259 UART:
2,991,313 UART: [state] CFI Enabled
3,001,782 UART: [fht] FMC Alias Private Key: 7
3,109,421 UART: [art] Extend RT PCRs Done
3,109,849 UART: [art] Lock RT PCRs Done
3,111,421 UART: [art] Populate DV Done
3,119,452 UART: [fht] FMC Alias Private Key: 7
3,120,594 UART: [art] Derive CDI
3,120,874 UART: [art] Store in in slot 0x4
3,206,483 UART: [art] Derive Key Pair
3,206,843 UART: [art] Store priv key in slot 0x5
3,220,087 UART: [art] Derive Key Pair - Done
3,234,958 UART: [art] Signing Cert with AUTHO
3,235,438 UART: RITY.KEYID = 7
3,250,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,901 UART: [art] PUB.X = DF1BCA372AAA7664970CBD89EFF22645AB9FAEC932BEB548DB7617C5B6BB91349762A0C3006EF2576616759D218FA91E
3,257,658 UART: [art] PUB.Y = E26B0ABC235A2B529E2F15AB498FC78ED4B89EFDFDC1B60F06314829E391B5C8C971A6564CAF341DFB5281CD9D2EAFE1
3,264,621 UART: [art] SIG.R = F188C7DCDB0E171E2EACC80CC0CCC5E032B0B9043438B8663A8C338A9277939C2546982F0DAFC00ECA6E9D88933F24DE
3,271,390 UART: [art] SIG.S = DDE67F5653F88EAC027C36E7C8E2C67E259022B8A4EAD16289EEF8F396FA6D891CB6E268838390B2145D839C5D882D2C
3,294,798 UART: Caliptra RT
3,295,052 UART: [state] CFI Enabled
3,403,039 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,064 UART: [kat] SHA2-256
881,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,110 UART: [kat] ++
886,262 UART: [kat] sha1
890,642 UART: [kat] SHA2-256
892,580 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
902,571 UART: [kat] HMAC-384Kdf
907,265 UART: [kat] LMS
1,475,461 UART: [kat] --
1,476,548 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,861 UART: [idev] ++
1,480,029 UART: [idev] CDI.KEYID = 6
1,480,389 UART: [idev] SUBJECT.KEYID = 7
1,480,813 UART: [idev] UDS.KEYID = 0
1,481,158 ready_for_fw is high
1,481,158 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,777 UART: [idev] Erasing UDS.KEYID = 0
1,505,089 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,621 UART: [idev] --
1,514,546 UART: [ldev] ++
1,514,714 UART: [ldev] CDI.KEYID = 6
1,515,077 UART: [ldev] SUBJECT.KEYID = 5
1,515,503 UART: [ldev] AUTHORITY.KEYID = 7
1,515,966 UART: [ldev] FE.KEYID = 1
1,521,198 UART: [ldev] Erasing FE.KEYID = 1
1,547,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,177 UART: [ldev] --
1,586,662 UART: [fwproc] Waiting for Commands...
1,587,305 UART: [fwproc] Received command 0x46574c44
1,588,096 UART: [fwproc] Received Image of size 114360 bytes
2,886,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,527 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,892 >>> mbox cmd response: success
3,079,988 UART: [afmc] ++
3,080,156 UART: [afmc] CDI.KEYID = 6
3,080,518 UART: [afmc] SUBJECT.KEYID = 7
3,080,943 UART: [afmc] AUTHORITY.KEYID = 5
3,116,448 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,616 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,229 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,919 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,796 UART: [afmc] --
3,159,714 UART: [cold-reset] --
3,160,514 UART: [state] Locking Datavault
3,161,653 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,257 UART: [state] Locking ICCM
3,162,733 UART: [exit] Launching FMC @ 0x40000130
3,168,062 UART:
3,168,078 UART: Running Caliptra FMC ...
3,168,486 UART:
3,168,629 UART: [state] CFI Enabled
3,179,348 UART: [fht] FMC Alias Private Key: 7
3,287,599 UART: [art] Extend RT PCRs Done
3,288,027 UART: [art] Lock RT PCRs Done
3,289,697 UART: [art] Populate DV Done
3,298,068 UART: [fht] FMC Alias Private Key: 7
3,299,120 UART: [art] Derive CDI
3,299,400 UART: [art] Store in in slot 0x4
3,385,203 UART: [art] Derive Key Pair
3,385,563 UART: [art] Store priv key in slot 0x5
3,398,481 UART: [art] Derive Key Pair - Done
3,413,134 UART: [art] Signing Cert with AUTHO
3,413,614 UART: RITY.KEYID = 7
3,428,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,747 UART: [art] PUB.X = 79FC4A0B2E35CB9BB7C835A9A91C69B7F1ED3C5B4BA7627DB1DE69624D2612E32306A134C3745B7E9BFE2E1AA7613739
3,436,523 UART: [art] PUB.Y = AC2A453E144DD2DF4708EA455C145E9D5A85723F72531B664BB50EFB76EC8C76A2733A812AC08B028B86CEA0DCC0F33E
3,443,478 UART: [art] SIG.R = E9B6C75DB1452613ECF65B0A400400A60F721F2AD4CAD3DC0A0E9BFD99D1FC0AFD61C4E65A1CF9F459785CA73E92ECAF
3,450,234 UART: [art] SIG.S = 7D8C112A5795E4D5A6C43630638CEC68AFEAF846D71B371179C6931550632BB09BCC8AA85469C79CAED535F9B382892D
3,474,055 UART: Caliptra RT
3,474,401 UART: [state] CFI Enabled
3,582,683 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 ready_for_fw is high
1,362,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,966 >>> mbox cmd response: success
2,989,348 UART:
2,989,364 UART: Running Caliptra FMC ...
2,989,772 UART:
2,989,915 UART: [state] CFI Enabled
3,000,224 UART: [fht] FMC Alias Private Key: 7
3,107,701 UART: [art] Extend RT PCRs Done
3,108,129 UART: [art] Lock RT PCRs Done
3,109,755 UART: [art] Populate DV Done
3,118,044 UART: [fht] FMC Alias Private Key: 7
3,119,122 UART: [art] Derive CDI
3,119,402 UART: [art] Store in in slot 0x4
3,205,259 UART: [art] Derive Key Pair
3,205,619 UART: [art] Store priv key in slot 0x5
3,219,185 UART: [art] Derive Key Pair - Done
3,234,326 UART: [art] Signing Cert with AUTHO
3,234,806 UART: RITY.KEYID = 7
3,250,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,789 UART: [art] PUB.X = 2DA6E63B0C49770D62BD9600B370C236ACFF5064CD1E6A05E541678AF262E245EFC898174506E134C215B41E36D327CC
3,257,527 UART: [art] PUB.Y = 4DFF536A38F3303732B170D707A2278C3E7EC31E18DA6EC9E5AB231806BD837A0E92D27375B5034426EFE5E2D0F6A7D5
3,264,471 UART: [art] SIG.R = 55C28C752DFAD429B6DEA07766DFE359A688A60C8EF42E011E5293052CED7E14A5D7E58D9BA652B2CCC8922431ACD78C
3,271,246 UART: [art] SIG.S = B9CF79744EA505ACFFC056780E8908DBA09DCCB3E158904F14F0A5B52BDDC98F7A96DE0A15F0FB3C8A53FB18EC3A7B3B
3,294,473 UART: Caliptra RT
3,294,819 UART: [state] CFI Enabled
3,402,739 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
893,780 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,905 UART: [kat] ++
898,057 UART: [kat] sha1
902,361 UART: [kat] SHA2-256
904,301 UART: [kat] SHA2-384
907,122 UART: [kat] SHA2-512-ACC
909,023 UART: [kat] ECC-384
918,942 UART: [kat] HMAC-384Kdf
923,446 UART: [kat] LMS
1,171,774 UART: [kat] --
1,172,763 UART: [cold-reset] ++
1,173,291 UART: [fht] FHT @ 0x50003400
1,175,904 UART: [idev] ++
1,176,072 UART: [idev] CDI.KEYID = 6
1,176,432 UART: [idev] SUBJECT.KEYID = 7
1,176,856 UART: [idev] UDS.KEYID = 0
1,177,201 ready_for_fw is high
1,177,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,294 UART: [idev] Erasing UDS.KEYID = 0
1,201,127 UART: [idev] Sha1 KeyId Algorithm
1,209,611 UART: [idev] --
1,210,681 UART: [ldev] ++
1,210,849 UART: [ldev] CDI.KEYID = 6
1,211,212 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,171 UART: [ldev] Erasing FE.KEYID = 1
1,243,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,349 UART: [ldev] --
1,282,626 UART: [fwproc] Wait for Commands...
1,283,388 UART: [fwproc] Recv command 0x46574c44
1,284,116 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,648 >>> mbox cmd response: success
2,774,900 UART: [afmc] ++
2,775,068 UART: [afmc] CDI.KEYID = 6
2,775,430 UART: [afmc] SUBJECT.KEYID = 7
2,775,855 UART: [afmc] AUTHORITY.KEYID = 5
2,811,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,198 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,725 UART: [afmc] --
2,854,653 UART: [cold-reset] --
2,855,597 UART: [state] Locking Datavault
2,856,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,344 UART: [state] Locking ICCM
2,857,954 UART: [exit] Launching FMC @ 0x40000130
2,863,283 UART:
2,863,299 UART: Running Caliptra FMC ...
2,863,707 UART:
2,863,761 UART: [state] CFI Enabled
2,874,528 UART: [fht] FMC Alias Private Key: 7
2,982,195 UART: [art] Extend RT PCRs Done
2,982,623 UART: [art] Lock RT PCRs Done
2,983,999 UART: [art] Populate DV Done
2,992,214 UART: [fht] FMC Alias Private Key: 7
2,993,338 UART: [art] Derive CDI
2,993,618 UART: [art] Store in in slot 0x4
3,079,051 UART: [art] Derive Key Pair
3,079,411 UART: [art] Store priv key in slot 0x5
3,092,555 UART: [art] Derive Key Pair - Done
3,107,250 UART: [art] Signing Cert with AUTHO
3,107,730 UART: RITY.KEYID = 7
3,122,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,505 UART: [art] PUB.X = E9E74E7FFB724ADFDD815FB61CA001582A9F4C0779AAF00C90EA9F6CD9D15D62151CA60B22C0E266E95D15C2A6816A75
3,130,279 UART: [art] PUB.Y = A718A096B4680783DB82B72B75B7335A5E7149C6189790B1D7AF9B3BDC7CF9F5E1BAE898D219365CCC7D3287D3C51219
3,137,230 UART: [art] SIG.R = 957CE67F8BBE9EEE8E881D119EFAC892DFB8D662C748D3BA2BC0069A3ACFA9A6E66B551173A1477C57081348757FA1DB
3,144,010 UART: [art] SIG.S = 95A297CDB7F266772823704C70F33824CFDDEB3A1D84E621488E59E5EACF1DB3F681CC6CD6A2BEFC7BA10FB65B3F994A
3,167,698 UART: Caliptra RT
3,167,952 UART: [state] CFI Enabled
3,274,789 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,193 ready_for_fw is high
1,060,193 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,281 >>> mbox cmd response: success
2,687,479 UART:
2,687,495 UART: Running Caliptra FMC ...
2,687,903 UART:
2,687,957 UART: [state] CFI Enabled
2,698,236 UART: [fht] FMC Alias Private Key: 7
2,806,333 UART: [art] Extend RT PCRs Done
2,806,761 UART: [art] Lock RT PCRs Done
2,808,357 UART: [art] Populate DV Done
2,816,556 UART: [fht] FMC Alias Private Key: 7
2,817,590 UART: [art] Derive CDI
2,817,870 UART: [art] Store in in slot 0x4
2,903,471 UART: [art] Derive Key Pair
2,903,831 UART: [art] Store priv key in slot 0x5
2,917,017 UART: [art] Derive Key Pair - Done
2,931,650 UART: [art] Signing Cert with AUTHO
2,932,130 UART: RITY.KEYID = 7
2,947,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,913 UART: [art] PUB.X = 75B9A8A52C4CDC6DC8B910710B0731C37CFAB955D18E6BA0838E1B50CEE8EE38BCDBFFA60E7755A3B3122A242E3E0E41
2,954,691 UART: [art] PUB.Y = 97BB9C1275A041E4603BA74C3A482A9BF5448BCEC3360145163D68E5106581E94AD1F41FA8D3A1E3BBC923B3A6541442
2,961,640 UART: [art] SIG.R = EFEE656AB2BB9846AA2CBE7C2A5EAC4A63784DE1D53420229D4E5276520C9784E1952ECC5B044ED45ABCA992F2C4D4D4
2,968,422 UART: [art] SIG.S = 4F209B93FED5F272F4AAFB85AA76D6EF5C44C8E50002FA51D6F4916AAA3080C3F7FDB4A6CFF4BB165F30BA3C462529E9
2,991,748 UART: Caliptra RT
2,992,002 UART: [state] CFI Enabled
3,100,008 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
907,039 UART: [kat] SHA2-512-ACC
908,940 UART: [kat] ECC-384
918,965 UART: [kat] HMAC-384Kdf
923,671 UART: [kat] LMS
1,171,999 UART: [kat] --
1,172,818 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,176,033 UART: [idev] ++
1,176,201 UART: [idev] CDI.KEYID = 6
1,176,561 UART: [idev] SUBJECT.KEYID = 7
1,176,985 UART: [idev] UDS.KEYID = 0
1,177,330 ready_for_fw is high
1,177,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,135 UART: [idev] Erasing UDS.KEYID = 0
1,202,308 UART: [idev] Sha1 KeyId Algorithm
1,210,930 UART: [idev] --
1,212,226 UART: [ldev] ++
1,212,394 UART: [ldev] CDI.KEYID = 6
1,212,757 UART: [ldev] SUBJECT.KEYID = 5
1,213,183 UART: [ldev] AUTHORITY.KEYID = 7
1,213,646 UART: [ldev] FE.KEYID = 1
1,218,640 UART: [ldev] Erasing FE.KEYID = 1
1,244,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,587 UART: [fwproc] Wait for Commands...
1,284,257 UART: [fwproc] Recv command 0x46574c44
1,284,985 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,969 >>> mbox cmd response: success
2,776,219 UART: [afmc] ++
2,776,387 UART: [afmc] CDI.KEYID = 6
2,776,749 UART: [afmc] SUBJECT.KEYID = 7
2,777,174 UART: [afmc] AUTHORITY.KEYID = 5
2,812,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,381 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,764 UART: [afmc] --
2,855,844 UART: [cold-reset] --
2,856,454 UART: [state] Locking Datavault
2,857,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,301 UART: [state] Locking ICCM
2,858,903 UART: [exit] Launching FMC @ 0x40000130
2,864,232 UART:
2,864,248 UART: Running Caliptra FMC ...
2,864,656 UART:
2,864,799 UART: [state] CFI Enabled
2,875,756 UART: [fht] FMC Alias Private Key: 7
2,983,805 UART: [art] Extend RT PCRs Done
2,984,233 UART: [art] Lock RT PCRs Done
2,985,809 UART: [art] Populate DV Done
2,994,282 UART: [fht] FMC Alias Private Key: 7
2,995,252 UART: [art] Derive CDI
2,995,532 UART: [art] Store in in slot 0x4
3,081,573 UART: [art] Derive Key Pair
3,081,933 UART: [art] Store priv key in slot 0x5
3,094,947 UART: [art] Derive Key Pair - Done
3,109,267 UART: [art] Signing Cert with AUTHO
3,109,747 UART: RITY.KEYID = 7
3,125,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,772 UART: [art] PUB.X = 129FC3445469882A0913A52FF48DC9C2806FF8468BF0DA3362E8803F620FDFBF4BCBAE0DA52B151F2A558B055A5FC344
3,132,540 UART: [art] PUB.Y = 4E623B995D4CC3F05E1FE639C61480C489D536ED1265B40BD8CA695E104454A209248E5F79AFD0382CDF6FD1B155CB4B
3,139,492 UART: [art] SIG.R = CA1AA84E46145D591942BD8851DCF9429FEEFACED1FFD623B8E7B4337F2BC946F21B644D817041C4011144FB7514DF67
3,146,269 UART: [art] SIG.S = C4E7168D5417B5D78D8319C14886F72FCAAA0579EB23588F966174105D8FBDD2EBDF4D49353AD752775EDF5DDA8DA188
3,170,139 UART: Caliptra RT
3,170,485 UART: [state] CFI Enabled
3,278,418 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,940 ready_for_fw is high
1,059,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,532 >>> mbox cmd response: success
2,689,898 UART:
2,689,914 UART: Running Caliptra FMC ...
2,690,322 UART:
2,690,465 UART: [state] CFI Enabled
2,701,178 UART: [fht] FMC Alias Private Key: 7
2,809,003 UART: [art] Extend RT PCRs Done
2,809,431 UART: [art] Lock RT PCRs Done
2,811,215 UART: [art] Populate DV Done
2,819,274 UART: [fht] FMC Alias Private Key: 7
2,820,206 UART: [art] Derive CDI
2,820,486 UART: [art] Store in in slot 0x4
2,906,237 UART: [art] Derive Key Pair
2,906,597 UART: [art] Store priv key in slot 0x5
2,919,923 UART: [art] Derive Key Pair - Done
2,934,666 UART: [art] Signing Cert with AUTHO
2,935,146 UART: RITY.KEYID = 7
2,950,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,267 UART: [art] PUB.X = 8A1C0DE25D8E97B58A8D52D3898A6F90FEE0DFA6BAD2D0CC76FD98396E96F75B8D944853FE7FBCE6EAAA223B9D580D7D
2,958,057 UART: [art] PUB.Y = 98DA38372BA9FE0CFF200F8756F80D7C2ED8DBFB050EEA8A84932465E6151F33103AEFA0F27CF53955D63B2EBB924710
2,965,004 UART: [art] SIG.R = F1C4F4ACA2C05B91D73F70F245DA9B5065E32130614757D07EBF4971662999C71B5FFD35C8D1FD819B646BB44ABCD57A
2,971,784 UART: [art] SIG.S = 0C874ABA00B97491F570D5AC09E66FF04EFE1123FB56A0EDDE0948189810AB81B1860F5FE5F30BF35A288734AE9D9859
2,995,572 UART: Caliptra RT
2,995,918 UART: [state] CFI Enabled
3,103,296 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,174,407 ready_for_fw is high
1,174,407 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,251 UART: [idev] --
1,209,294 UART: [ldev] ++
1,209,462 UART: [ldev] CDI.KEYID = 6
1,209,826 UART: [ldev] SUBJECT.KEYID = 5
1,210,253 UART: [ldev] AUTHORITY.KEYID = 7
1,210,716 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,242,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,176 UART: [ldev] --
1,281,518 UART: [fwproc] Wait for Commands...
1,282,243 UART: [fwproc] Recv command 0x46574c44
1,282,976 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,282 >>> mbox cmd response: success
2,772,373 UART: [afmc] ++
2,772,541 UART: [afmc] CDI.KEYID = 6
2,772,904 UART: [afmc] SUBJECT.KEYID = 7
2,773,330 UART: [afmc] AUTHORITY.KEYID = 5
2,808,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,489 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,514 UART: [afmc] --
2,851,428 UART: [cold-reset] --
2,852,346 UART: [state] Locking Datavault
2,853,465 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,069 UART: [state] Locking ICCM
2,854,657 UART: [exit] Launching FMC @ 0x40000130
2,859,986 UART:
2,860,002 UART: Running Caliptra FMC ...
2,860,410 UART:
2,860,464 UART: [state] CFI Enabled
2,870,909 UART: [fht] FMC Alias Private Key: 7
2,977,872 UART: [art] Extend RT PCRs Done
2,978,300 UART: [art] Lock RT PCRs Done
2,979,894 UART: [art] Populate DV Done
2,988,281 UART: [fht] FMC Alias Private Key: 7
2,989,231 UART: [art] Derive CDI
2,989,511 UART: [art] Store in in slot 0x4
3,075,374 UART: [art] Derive Key Pair
3,075,734 UART: [art] Store priv key in slot 0x5
3,089,182 UART: [art] Derive Key Pair - Done
3,103,954 UART: [art] Signing Cert with AUTHO
3,104,434 UART: RITY.KEYID = 7
3,119,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,649 UART: [art] PUB.X = 776CBBA25C8FAF57D234BD549C135E5F37629494709B40C7FC2F2165F3F652506C26BFDFF4199928292EB121773C412A
3,127,419 UART: [art] PUB.Y = B2CD998A7090AB65DE450A74B916DF047C5380F8E0FA7F8FF5275E26B0C7FF30CBD827AE8437490A32991A2C645D8BFD
3,134,372 UART: [art] SIG.R = 52CDECB7232AE2BDC4873179C1C50E783BA1B3C697C3F211D7969158EF393AA51EAC280E78BB6F5CEE105954D23006BE
3,141,145 UART: [art] SIG.S = 8804E7EC91F87ED987800BD774A0D482D44CC621FE6076D5ACE1BC0FBEEFF2DAAEFFF6022BF9F6E97D21AAC28FABF01C
3,164,688 UART: Caliptra RT
3,164,942 UART: [state] CFI Enabled
3,271,954 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,256 ready_for_fw is high
1,056,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,166 >>> mbox cmd response: success
2,684,026 UART:
2,684,042 UART: Running Caliptra FMC ...
2,684,450 UART:
2,684,504 UART: [state] CFI Enabled
2,694,593 UART: [fht] FMC Alias Private Key: 7
2,802,178 UART: [art] Extend RT PCRs Done
2,802,606 UART: [art] Lock RT PCRs Done
2,803,856 UART: [art] Populate DV Done
2,811,901 UART: [fht] FMC Alias Private Key: 7
2,812,935 UART: [art] Derive CDI
2,813,215 UART: [art] Store in in slot 0x4
2,898,848 UART: [art] Derive Key Pair
2,899,208 UART: [art] Store priv key in slot 0x5
2,912,400 UART: [art] Derive Key Pair - Done
2,927,182 UART: [art] Signing Cert with AUTHO
2,927,662 UART: RITY.KEYID = 7
2,942,726 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,491 UART: [art] PUB.X = D48B8ABFE5084989D05B766EE910BA25CB8551EF0CD61F1817C743435110868915B48B883B8FF10BF594BCDD46085EBF
2,950,255 UART: [art] PUB.Y = 7B541FCC1D73EEF6623B345D3E69FFD79E5B41B71FBD708E2DDC7DA1B0449ABB4A0A8FF819CB118FC703BC2085E8C3D9
2,957,223 UART: [art] SIG.R = 01CFC6FC212FDFD7C0C135F234A80F64B3D5DC6C5545D41DA62362B0672D464AE4AD9C23C0EC9942DF74C47C2D339BFF
2,964,005 UART: [art] SIG.S = B80C97CC1079D54EB187AF55C5A1CBF64CDFF4891D6915F5ACFCF954C33B9FABCD97BFAF3BC6A49D350B12E219BA518A
2,988,040 UART: Caliptra RT
2,988,294 UART: [state] CFI Enabled
3,096,336 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,174,040 ready_for_fw is high
1,174,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,654 UART: [idev] Erasing UDS.KEYID = 0
1,198,920 UART: [idev] Sha1 KeyId Algorithm
1,207,748 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,437 UART: [ldev] SUBJECT.KEYID = 5
1,209,864 UART: [ldev] AUTHORITY.KEYID = 7
1,210,327 UART: [ldev] FE.KEYID = 1
1,215,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,555 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,585 >>> mbox cmd response: success
2,773,790 UART: [afmc] ++
2,773,958 UART: [afmc] CDI.KEYID = 6
2,774,321 UART: [afmc] SUBJECT.KEYID = 7
2,774,747 UART: [afmc] AUTHORITY.KEYID = 5
2,810,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,475 UART: [afmc] --
2,853,403 UART: [cold-reset] --
2,854,257 UART: [state] Locking Datavault
2,855,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,266 UART: [state] Locking ICCM
2,856,874 UART: [exit] Launching FMC @ 0x40000130
2,862,203 UART:
2,862,219 UART: Running Caliptra FMC ...
2,862,627 UART:
2,862,770 UART: [state] CFI Enabled
2,873,299 UART: [fht] FMC Alias Private Key: 7
2,981,440 UART: [art] Extend RT PCRs Done
2,981,868 UART: [art] Lock RT PCRs Done
2,983,156 UART: [art] Populate DV Done
2,991,425 UART: [fht] FMC Alias Private Key: 7
2,992,559 UART: [art] Derive CDI
2,992,839 UART: [art] Store in in slot 0x4
3,078,804 UART: [art] Derive Key Pair
3,079,164 UART: [art] Store priv key in slot 0x5
3,092,394 UART: [art] Derive Key Pair - Done
3,107,254 UART: [art] Signing Cert with AUTHO
3,107,734 UART: RITY.KEYID = 7
3,123,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,991 UART: [art] PUB.X = D9E190C07E00202BD08AB1078DAABC23AE1EC465F76A498524B4F2D95DC1DB30164B904B62C150EA1A44CD73FC31553D
3,130,748 UART: [art] PUB.Y = 0DFF933DEA592A1EE995BE49CEAADCD5558873116D2A81FFC5EDEE11EB23F448D0B00764009E43CAE79750C9A4924855
3,137,684 UART: [art] SIG.R = 29A1EB64C7742C7A1E5975A50717A10853A9812F6E9AA46100B2F73C7A64BF1D88D436433DDFB6A1899B3DE08527B875
3,144,426 UART: [art] SIG.S = F53B6C9506C76AEE1185211E89E844578B1117E74C1B70DC7D36A6C6180FF05176DF93E675AA43CC4DA36DC062696373
3,168,353 UART: Caliptra RT
3,168,699 UART: [state] CFI Enabled
3,276,951 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,381 ready_for_fw is high
1,056,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,617 >>> mbox cmd response: success
2,685,455 UART:
2,685,471 UART: Running Caliptra FMC ...
2,685,879 UART:
2,686,022 UART: [state] CFI Enabled
2,696,761 UART: [fht] FMC Alias Private Key: 7
2,804,614 UART: [art] Extend RT PCRs Done
2,805,042 UART: [art] Lock RT PCRs Done
2,806,528 UART: [art] Populate DV Done
2,814,485 UART: [fht] FMC Alias Private Key: 7
2,815,559 UART: [art] Derive CDI
2,815,839 UART: [art] Store in in slot 0x4
2,901,590 UART: [art] Derive Key Pair
2,901,950 UART: [art] Store priv key in slot 0x5
2,914,926 UART: [art] Derive Key Pair - Done
2,929,611 UART: [art] Signing Cert with AUTHO
2,930,091 UART: RITY.KEYID = 7
2,945,831 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,596 UART: [art] PUB.X = 2B13F5A01718A25CD633786714753F32E0208CFA4990AFFF998C2797C45187766E5AB3688DC541315D8D86B811A54C41
2,953,358 UART: [art] PUB.Y = 9E8813DB5D6C2EEE0C026AEF6D8D2B38426F4B2013F01846E611C4FCBF5F49CF041CB3E8B425085E05DF95B439A73B0E
2,960,304 UART: [art] SIG.R = FE95D130B9FE33E2338EFE3C58714AE38068E68C837EC372E421155923AA62A970E20D7AB1241B46B6B727876F8CCDE2
2,967,075 UART: [art] SIG.S = 360A8FE6F218F0F61C28817AC8EBD2DB716A01B1A8F2F59D983557C3E39B1B51FF351EFD5B666F4D4EBECB8BF8E479C1
2,990,274 UART: Caliptra RT
2,990,620 UART: [state] CFI Enabled
3,098,878 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
Truncated 1347969 bytes from beginning
UART: [art] Extend RT PCRs Done
3,633,458,128 UART: [art] Lock RT PCRs Done
3,633,459,503 UART: [art] Populate DV Done
3,633,465,015 UART: [fht] FMC Alias Private Key: 7
3,633,466,715 UART: [art] Derive CDI
3,633,467,524 UART: [art] Store in in slot 0x4
3,633,525,805 UART: [art] Derive Key Pair
3,633,526,799 UART: [art] Store priv key in slot 0x5
3,636,819,403 UART: [art] Derive Key Pair - Done
3,636,832,409 UART: [art] Signing Cert with AUTHO
3,636,833,715 UART: RITY.KEYID = 7
3,639,120,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,639,122,439 UART: [art] PUB.X = 3155F947EFCC3268543F1EB6065384A122329EDD78CFD6E58012196A124B1A09FB86999ED9D14366ECD2A1E652DF2DED
3,639,129,716 UART: [art] PUB.Y = BF079E1112D3CFD68628C22AFB97E100973BDFCD657A0834852434B2275CD6B535BCE85032559354D6984D59FCBC986F
3,639,136,968 UART: [art] SIG.R = DB2E62E8934EA81538364CA6B142F355D09A89DD3B067B4C081F6C5DE744301D30D268DAAC51C78041040B7340FE5157
3,639,144,377 UART: [art] SIG.S = 11ADD7EDFFBDD70295B5DACCBA89EA8A0BD7BA96550C16C518758EC1563437BBC1B95ED877290236D2E6E149A5C5B20D
3,640,449,164 UART: Caliptra RT
3,640,449,875 UART: [state] CFI Enabled
3,640,781,042 UART: [rt] RT listening for mailbox commands...
3,640,782,914 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,640,926,979 UART:
3,640,927,283 UART: Running Caliptra ROM ...
3,640,928,313 UART:
3,640,928,458 UART: [state] CFI Enabled
3,641,001,722 UART: [state] LifecycleState = Unprovisioned
3,641,003,663 UART: [state] DebugLocked = No
3,641,005,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,641,011,062 UART: [kat] SHA2-256
3,641,180,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,641,191,266 UART: [kat] ++
3,641,191,712 UART: [kat] sha1
3,641,202,754 UART: [kat] SHA2-256
3,641,205,450 UART: [kat] SHA2-384
3,641,210,408 UART: [kat] SHA2-512-ACC
3,641,212,811 UART: [kat] ECC-384
3,643,501,159 UART: [kat] HMAC-384Kdf
3,643,532,614 UART: [kat] LMS
3,644,722,964 UART: [kat] --
3,644,727,929 UART: [update-reset] ++
3,648,864,794 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,648,868,264 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,649,250,199 >>> mbox cmd response: success
3,649,252,087 UART: [update-reset] Copying MAN_2 To MAN_1
3,649,274,528 UART: [update-reset Success] --
3,649,279,239 UART: [state] Locking Datavault
3,649,283,997 UART: [state] Locking PCR0, PCR1 and PCR31
3,649,285,693 UART: [state] Locking ICCM
3,649,287,998 UART: [exit] Launching FMC @ 0x40000130
3,649,296,451 UART:
3,649,296,684 UART: Running Caliptra FMC ...
3,649,297,901 UART:
3,649,298,060 UART: [state] CFI Enabled
3,649,389,311 UART: [art] Extend RT PCRs Done
3,649,390,492 UART: [art] Lock RT PCRs Done
3,649,392,052 UART: [art] Populate DV Done
3,649,397,733 UART: [fht] FMC Alias Private Key: 7
3,649,399,403 UART: [art] Derive CDI
3,649,400,230 UART: [art] Store in in slot 0x4
3,649,457,871 UART: [art] Derive Key Pair
3,649,458,905 UART: [art] Store priv key in slot 0x5
3,652,751,685 UART: [art] Derive Key Pair - Done
3,652,764,563 UART: [art] Signing Cert with AUTHO
3,652,765,866 UART: RITY.KEYID = 7
3,655,047,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,049,320 UART: [art] PUB.X = 92CA1B4686057F2C82F2506991E154D133DECA6D1F91A266ECCA3FBB28E795A0175C2A88DC91BD682F58EED1E7A2D0D2
3,655,056,240 UART: [art] PUB.Y = 4EA2E28FCD6AEACB4E9DEF335C101E92E5A8DE2EF9359FE3DEFDEC1D7D76F6AD0E903CD322A09DD4AAE8561DFC00B2A3
3,655,063,481 UART: [art] SIG.R = E567034F2E7CE2CB4A7DC0B0FB8E074F9AEBB97BA7D850CB2AE9688BA99621B5029674AE885FC9C84232531DC7783AD7
3,655,070,917 UART: [art] SIG.S = 0A25AB3713B467B4887648FD4E156F1B8BA38D363086D6DDEAF87E357E00C68AC4C3EC95A4F51EBE3DAF8717ED16F71F
3,656,375,878 UART: Caliptra RT
3,656,376,586 UART: [state] CFI Enabled
3,656,707,223 UART: [rt] RT listening for mailbox commands...
3,656,709,113 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,656,853,527 UART:
3,656,853,833 UART: Running Caliptra ROM ...
3,656,854,867 UART:
3,656,855,013 UART: [state] CFI Enabled
3,656,923,738 UART: [state] LifecycleState = Unprovisioned
3,656,925,671 UART: [state] DebugLocked = No
3,656,927,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,656,932,546 UART: [kat] SHA2-256
3,657,102,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,657,112,767 UART: [kat] ++
3,657,113,250 UART: [kat] sha1
3,657,123,915 UART: [kat] SHA2-256
3,657,126,601 UART: [kat] SHA2-384
3,657,132,256 UART: [kat] SHA2-512-ACC
3,657,134,611 UART: [kat] ECC-384
3,659,427,975 UART: [kat] HMAC-384Kdf
3,659,458,967 UART: [kat] LMS
3,660,649,307 UART: [kat] --
3,660,654,411 UART: [update-reset] ++
3,664,795,152 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,664,798,447 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,665,180,405 >>> mbox cmd response: success
3,665,181,218 UART: [update-reset] Copying MAN_2 To MAN_1
3,665,203,662 UART: [update-reset Success] --
3,665,207,946 UART: [state] Locking Datavault
3,665,211,470 UART: [state] Locking PCR0, PCR1 and PCR31
3,665,213,226 UART: [state] Locking ICCM
3,665,216,078 UART: [exit] Launching FMC @ 0x40000130
3,665,224,469 UART:
3,665,224,719 UART: Running Caliptra FMC ...
3,665,225,818 UART:
3,665,225,977 UART: [state] CFI Enabled
3,665,314,156 UART: [art] Extend RT PCRs Done
3,665,315,340 UART: [art] Lock RT PCRs Done
3,665,316,843 UART: [art] Populate DV Done
3,665,322,407 UART: [fht] FMC Alias Private Key: 7
3,665,324,050 UART: [art] Derive CDI
3,665,324,870 UART: [art] Store in in slot 0x4
3,665,384,129 UART: [art] Derive Key Pair
3,665,385,163 UART: [art] Store priv key in slot 0x5
3,668,677,728 UART: [art] Derive Key Pair - Done
3,668,690,514 UART: [art] Signing Cert with AUTHO
3,668,691,818 UART: RITY.KEYID = 7
3,670,979,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,980,608 UART: [art] PUB.X = 3155F947EFCC3268543F1EB6065384A122329EDD78CFD6E58012196A124B1A09FB86999ED9D14366ECD2A1E652DF2DED
3,670,987,828 UART: [art] PUB.Y = BF079E1112D3CFD68628C22AFB97E100973BDFCD657A0834852434B2275CD6B535BCE85032559354D6984D59FCBC986F
3,670,995,089 UART: [art] SIG.R = DB2E62E8934EA81538364CA6B142F355D09A89DD3B067B4C081F6C5DE744301D30D268DAAC51C78041040B7340FE5157
3,671,002,455 UART: [art] SIG.S = 11ADD7EDFFBDD70295B5DACCBA89EA8A0BD7BA96550C16C518758EC1563437BBC1B95ED877290236D2E6E149A5C5B20D
3,672,307,539 UART: Caliptra RT
3,672,308,246 UART: [state] CFI Enabled
3,672,640,543 UART: [rt] RT listening for mailbox commands...
3,672,642,454 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,672,786,985 UART:
3,672,787,284 UART: Running Caliptra ROM ...
3,672,788,317 UART:
3,672,788,463 UART: [state] CFI Enabled
3,672,857,553 UART: [state] LifecycleState = Unprovisioned
3,672,859,480 UART: [state] DebugLocked = No
3,672,861,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,672,866,765 UART: [kat] SHA2-256
3,673,036,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,673,046,974 UART: [kat] ++
3,673,047,428 UART: [kat] sha1
3,673,057,177 UART: [kat] SHA2-256
3,673,059,773 UART: [kat] SHA2-384
3,673,065,935 UART: [kat] SHA2-512-ACC
3,673,068,290 UART: [kat] ECC-384
3,675,360,266 UART: [kat] HMAC-384Kdf
3,675,392,753 UART: [kat] LMS
3,676,583,095 UART: [kat] --
3,676,588,061 UART: [update-reset] ++
3,680,729,909 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,680,733,034 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,681,114,973 >>> mbox cmd response: success
3,681,116,342 UART: [update-reset] Copying MAN_2 To MAN_1
3,681,138,740 UART: [update-reset Success] --
3,681,143,119 UART: [state] Locking Datavault
3,681,147,132 UART: [state] Locking PCR0, PCR1 and PCR31
3,681,148,894 UART: [state] Locking ICCM
3,681,151,257 UART: [exit] Launching FMC @ 0x40000130
3,681,159,722 UART:
3,681,159,960 UART: Running Caliptra FMC ...
3,681,161,060 UART:
3,681,161,221 UART: [state] CFI Enabled
3,681,249,272 UART: [art] Extend RT PCRs Done
3,681,250,457 UART: [art] Lock RT PCRs Done
3,681,251,908 UART: [art] Populate DV Done
3,681,257,262 UART: [fht] FMC Alias Private Key: 7
3,681,258,794 UART: [art] Derive CDI
3,681,259,604 UART: [art] Store in in slot 0x4
3,681,318,811 UART: [art] Derive Key Pair
3,681,319,845 UART: [art] Store priv key in slot 0x5
3,684,612,917 UART: [art] Derive Key Pair - Done
3,684,625,644 UART: [art] Signing Cert with AUTHO
3,684,626,949 UART: RITY.KEYID = 7
3,686,914,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,686,916,097 UART: [art] PUB.X = 92CA1B4686057F2C82F2506991E154D133DECA6D1F91A266ECCA3FBB28E795A0175C2A88DC91BD682F58EED1E7A2D0D2
3,686,923,330 UART: [art] PUB.Y = 4EA2E28FCD6AEACB4E9DEF335C101E92E5A8DE2EF9359FE3DEFDEC1D7D76F6AD0E903CD322A09DD4AAE8561DFC00B2A3
3,686,930,646 UART: [art] SIG.R = E567034F2E7CE2CB4A7DC0B0FB8E074F9AEBB97BA7D850CB2AE9688BA99621B5029674AE885FC9C84232531DC7783AD7
3,686,938,022 UART: [art] SIG.S = 0A25AB3713B467B4887648FD4E156F1B8BA38D363086D6DDEAF87E357E00C68AC4C3EC95A4F51EBE3DAF8717ED16F71F
3,688,243,564 UART: Caliptra RT
3,688,244,272 UART: [state] CFI Enabled
3,688,580,347 UART: [rt] RT listening for mailbox commands...
3,688,582,223 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,688,726,152 UART:
3,688,726,447 UART: Running Caliptra ROM ...
3,688,727,482 UART:
3,688,727,628 UART: [state] CFI Enabled
3,688,792,287 UART: [state] LifecycleState = Unprovisioned
3,688,794,272 UART: [state] DebugLocked = No
3,688,797,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,688,802,531 UART: [kat] SHA2-256
3,688,972,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,688,982,730 UART: [kat] ++
3,688,983,183 UART: [kat] sha1
3,688,993,146 UART: [kat] SHA2-256
3,688,995,833 UART: [kat] SHA2-384
3,689,001,760 UART: [kat] SHA2-512-ACC
3,689,004,162 UART: [kat] ECC-384
3,691,297,361 UART: [kat] HMAC-384Kdf
3,691,328,478 UART: [kat] LMS
3,692,518,815 UART: [kat] --
3,692,523,789 UART: [update-reset] ++
3,696,661,858 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,696,666,076 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,697,048,008 >>> mbox cmd response: success
3,697,049,477 UART: [update-reset] Copying MAN_2 To MAN_1
3,697,071,917 UART: [update-reset Success] --
3,697,075,399 UART: [state] Locking Datavault
3,697,079,041 UART: [state] Locking PCR0, PCR1 and PCR31
3,697,080,742 UART: [state] Locking ICCM
3,697,083,376 UART: [exit] Launching FMC @ 0x40000130
3,697,091,780 UART:
3,697,092,014 UART: Running Caliptra FMC ...
3,697,093,118 UART:
3,697,093,280 UART: [state] CFI Enabled
3,697,185,547 UART: [art] Extend RT PCRs Done
3,697,186,731 UART: [art] Lock RT PCRs Done
3,697,188,293 UART: [art] Populate DV Done
3,697,193,707 UART: [fht] FMC Alias Private Key: 7
3,697,195,404 UART: [art] Derive CDI
3,697,196,218 UART: [art] Store in in slot 0x4
3,697,254,831 UART: [art] Derive Key Pair
3,697,255,870 UART: [art] Store priv key in slot 0x5
3,700,548,934 UART: [art] Derive Key Pair - Done
3,700,561,880 UART: [art] Signing Cert with AUTHO
3,700,563,176 UART: RITY.KEYID = 7
3,702,850,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,702,852,207 UART: [art] PUB.X = 3155F947EFCC3268543F1EB6065384A122329EDD78CFD6E58012196A124B1A09FB86999ED9D14366ECD2A1E652DF2DED
3,702,859,504 UART: [art] PUB.Y = BF079E1112D3CFD68628C22AFB97E100973BDFCD657A0834852434B2275CD6B535BCE85032559354D6984D59FCBC986F
3,702,866,716 UART: [art] SIG.R = DB2E62E8934EA81538364CA6B142F355D09A89DD3B067B4C081F6C5DE744301D30D268DAAC51C78041040B7340FE5157
3,702,874,094 UART: [art] SIG.S = 11ADD7EDFFBDD70295B5DACCBA89EA8A0BD7BA96550C16C518758EC1563437BBC1B95ED877290236D2E6E149A5C5B20D
3,704,178,823 UART: Caliptra RT
3,704,179,540 UART: [state] CFI Enabled
3,704,516,122 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 400.29s
Truncated 716409 bytes from beginning
8A51FFC0682777783158EEC9834D84C
3,704,520,346 UART: [art] SIG.R = 7017D16E8D1131DC20F6AFFF387EF79257CA25A17744B62086C14C83271250E626DEBFEEE486E55D4637751D99F7966C
3,704,527,723 UART: [art] SIG.S = A94B18584DD6DAF9DAD229AA5850C98CA1E43E61CD1F392B61ADB1D4F55D64408E70005DDCDD9243927E8730A8B34809
3,705,832,455 UART: Caliptra RT
3,705,833,150 UART: [state] CFI Enabled
3,706,164,467 UART: [rt] RT listening for mailbox commands...
3,706,166,334 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,714,882,135 >>> mbox cmd response: success
3,714,918,662 UART:
3,714,918,963 UART: Running Caliptra FMC ...
3,714,920,082 UART:
3,714,920,250 UART: [state] CFI Enabled
3,715,009,768 UART: [art] Extend RT PCRs Done
3,715,010,955 UART: [art] Lock RT PCRs Done
3,715,012,299 UART: [art] Populate DV Done
3,715,017,978 UART: [fht] FMC Alias Private Key: 7
3,715,019,461 UART: [art] Derive CDI
3,715,020,222 UART: [art] Store in in slot 0x4
3,715,079,097 UART: [art] Derive Key Pair
3,715,080,151 UART: [art] Store priv key in slot 0x5
3,718,372,972 UART: [art] Derive Key Pair - Done
3,718,386,027 UART: [art] Signing Cert with AUTHO
3,718,387,332 UART: RITY.KEYID = 7
3,720,674,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,720,676,494 UART: [art] PUB.X = AF90474B3EB367B6D88D28ABDD1412779579B44A95151D64114EF5367080C22ED16D9D3011F7978D57DBEC02A5D7E0CF
3,720,683,774 UART: [art] PUB.Y = A1BB3FBEF10D7493F13C918C2D571406293488E8373A8C42E6C4A24D45E45457F9162A5BDF5194DC9F11C1BF05838AFD
3,720,690,941 UART: [art] SIG.R = F0659269AEAE48AA92E36A512DCD9030019DB112C6418F22756E94764F689D6F29C7C95887BFFDE3842717CC83584EA5
3,720,698,318 UART: [art] SIG.S = 67BFD13A43F699C5EC7D4A37129C1AAAE077F8B33D4B6AF3AD239C4F60CDF663044F55B405238DB1CA88D75B24905B47
3,722,003,911 UART: Caliptra RT
3,722,004,632 UART: [state] CFI Enabled
3,722,335,657 UART: [rt] RT listening for mailbox commands...
3,722,337,523 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,731,078,989 >>> mbox cmd response: success
3,731,113,165 UART:
3,731,113,433 UART: Running Caliptra FMC ...
3,731,114,462 UART:
3,731,114,607 UART: [state] CFI Enabled
3,731,201,503 UART: [art] Extend RT PCRs Done
3,731,202,686 UART: [art] Lock RT PCRs Done
3,731,204,113 UART: [art] Populate DV Done
3,731,209,861 UART: [fht] FMC Alias Private Key: 7
3,731,211,398 UART: [art] Derive CDI
3,731,212,158 UART: [art] Store in in slot 0x4
3,731,271,019 UART: [art] Derive Key Pair
3,731,272,075 UART: [art] Store priv key in slot 0x5
3,734,564,627 UART: [art] Derive Key Pair - Done
3,734,577,408 UART: [art] Signing Cert with AUTHO
3,734,578,704 UART: RITY.KEYID = 7
3,736,867,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,868,594 UART: [art] PUB.X = 7E36DD709D800A6361F1C093ACB589591A63EFFF48E97519A62B388AD34A01F4C7AFE934D35438A84F9F9AEF4819EBA5
3,736,875,869 UART: [art] PUB.Y = 81A7CA3C3921554EF6054FCE7C6F74AC0D35862FA7891CBC3B5D0DF2B2B395E9A8A51FFC0682777783158EEC9834D84C
3,736,883,120 UART: [art] SIG.R = 7017D16E8D1131DC20F6AFFF387EF79257CA25A17744B62086C14C83271250E626DEBFEEE486E55D4637751D99F7966C
3,736,890,435 UART: [art] SIG.S = A94B18584DD6DAF9DAD229AA5850C98CA1E43E61CD1F392B61ADB1D4F55D64408E70005DDCDD9243927E8730A8B34809
3,738,195,755 UART: Caliptra RT
3,738,196,465 UART: [state] CFI Enabled
3,738,528,692 UART: [rt] RT listening for mailbox commands...
3,738,530,580 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,747,253,137 >>> mbox cmd response: success
3,747,289,901 UART:
3,747,290,170 UART: Running Caliptra FMC ...
3,747,291,285 UART:
3,747,291,446 UART: [state] CFI Enabled
3,747,394,273 UART: [art] Extend RT PCRs Done
3,747,395,456 UART: [art] Lock RT PCRs Done
3,747,396,742 UART: [art] Populate DV Done
3,747,401,879 UART: [fht] FMC Alias Private Key: 7
3,747,403,506 UART: [art] Derive CDI
3,747,404,326 UART: [art] Store in in slot 0x4
3,747,463,636 UART: [art] Derive Key Pair
3,747,464,628 UART: [art] Store priv key in slot 0x5
3,750,757,443 UART: [art] Derive Key Pair - Done
3,750,770,150 UART: [art] Signing Cert with AUTHO
3,750,771,483 UART: RITY.KEYID = 7
3,753,059,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,753,060,815 UART: [art] PUB.X = AF90474B3EB367B6D88D28ABDD1412779579B44A95151D64114EF5367080C22ED16D9D3011F7978D57DBEC02A5D7E0CF
3,753,068,039 UART: [art] PUB.Y = A1BB3FBEF10D7493F13C918C2D571406293488E8373A8C42E6C4A24D45E45457F9162A5BDF5194DC9F11C1BF05838AFD
3,753,075,304 UART: [art] SIG.R = F0659269AEAE48AA92E36A512DCD9030019DB112C6418F22756E94764F689D6F29C7C95887BFFDE3842717CC83584EA5
3,753,082,711 UART: [art] SIG.S = 67BFD13A43F699C5EC7D4A37129C1AAAE077F8B33D4B6AF3AD239C4F60CDF663044F55B405238DB1CA88D75B24905B47
3,754,387,786 UART: Caliptra RT
3,754,388,500 UART: [state] CFI Enabled
3,754,720,717 UART: [rt] RT listening for mailbox commands...
3,754,722,589 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,763,457,179 >>> mbox cmd response: success
3,763,492,655 UART:
3,763,492,991 UART: Running Caliptra FMC ...
3,763,494,057 UART:
3,763,494,224 UART: [state] CFI Enabled
3,763,581,339 UART: [art] Extend RT PCRs Done
3,763,582,556 UART: [art] Lock RT PCRs Done
3,763,584,068 UART: [art] Populate DV Done
3,763,589,696 UART: [fht] FMC Alias Private Key: 7
3,763,591,334 UART: [art] Derive CDI
3,763,592,148 UART: [art] Store in in slot 0x4
3,763,650,161 UART: [art] Derive Key Pair
3,763,651,201 UART: [art] Store priv key in slot 0x5
3,766,944,534 UART: [art] Derive Key Pair - Done
3,766,957,324 UART: [art] Signing Cert with AUTHO
3,766,958,628 UART: RITY.KEYID = 7
3,769,245,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,769,247,243 UART: [art] PUB.X = 7E36DD709D800A6361F1C093ACB589591A63EFFF48E97519A62B388AD34A01F4C7AFE934D35438A84F9F9AEF4819EBA5
3,769,254,521 UART: [art] PUB.Y = 81A7CA3C3921554EF6054FCE7C6F74AC0D35862FA7891CBC3B5D0DF2B2B395E9A8A51FFC0682777783158EEC9834D84C
3,769,261,727 UART: [art] SIG.R = 7017D16E8D1131DC20F6AFFF387EF79257CA25A17744B62086C14C83271250E626DEBFEEE486E55D4637751D99F7966C
3,769,269,098 UART: [art] SIG.S = A94B18584DD6DAF9DAD229AA5850C98CA1E43E61CD1F392B61ADB1D4F55D64408E70005DDCDD9243927E8730A8B34809
3,770,574,469 UART: Caliptra RT
3,770,575,178 UART: [state] CFI Enabled
3,770,908,460 UART: [rt] RT listening for mailbox commands...
3,770,910,354 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,779,649,166 >>> mbox cmd response: success
3,779,683,124 UART:
3,779,683,391 UART: Running Caliptra FMC ...
3,779,684,500 UART:
3,779,684,666 UART: [state] CFI Enabled
3,779,772,730 UART: [art] Extend RT PCRs Done
3,779,773,920 UART: [art] Lock RT PCRs Done
3,779,775,321 UART: [art] Populate DV Done
3,779,780,998 UART: [fht] FMC Alias Private Key: 7
3,779,782,636 UART: [art] Derive CDI
3,779,783,447 UART: [art] Store in in slot 0x4
3,779,842,060 UART: [art] Derive Key Pair
3,779,843,108 UART: [art] Store priv key in slot 0x5
3,783,136,013 UART: [art] Derive Key Pair - Done
3,783,149,059 UART: [art] Signing Cert with AUTHO
3,783,150,371 UART: RITY.KEYID = 7
3,785,438,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,785,439,771 UART: [art] PUB.X = AF90474B3EB367B6D88D28ABDD1412779579B44A95151D64114EF5367080C22ED16D9D3011F7978D57DBEC02A5D7E0CF
3,785,447,000 UART: [art] PUB.Y = A1BB3FBEF10D7493F13C918C2D571406293488E8373A8C42E6C4A24D45E45457F9162A5BDF5194DC9F11C1BF05838AFD
3,785,454,264 UART: [art] SIG.R = F0659269AEAE48AA92E36A512DCD9030019DB112C6418F22756E94764F689D6F29C7C95887BFFDE3842717CC83584EA5
3,785,461,636 UART: [art] SIG.S = 67BFD13A43F699C5EC7D4A37129C1AAAE077F8B33D4B6AF3AD239C4F60CDF663044F55B405238DB1CA88D75B24905B47
3,786,767,037 UART: Caliptra RT
3,786,767,761 UART: [state] CFI Enabled
3,787,100,081 UART: [rt] RT listening for mailbox commands...
3,787,101,956 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,795,845,587 >>> mbox cmd response: success
3,795,880,070 UART:
3,795,880,362 UART: Running Caliptra FMC ...
3,795,881,395 UART:
3,795,881,561 UART: [state] CFI Enabled
3,795,984,482 UART: [art] Extend RT PCRs Done
3,795,985,696 UART: [art] Lock RT PCRs Done
3,795,986,853 UART: [art] Populate DV Done
3,795,992,168 UART: [fht] FMC Alias Private Key: 7
3,795,993,817 UART: [art] Derive CDI
3,795,994,550 UART: [art] Store in in slot 0x4
3,796,053,439 UART: [art] Derive Key Pair
3,796,054,484 UART: [art] Store priv key in slot 0x5
3,799,347,218 UART: [art] Derive Key Pair - Done
3,799,360,431 UART: [art] Signing Cert with AUTHO
3,799,361,734 UART: RITY.KEYID = 7
3,801,647,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,801,649,369 UART: [art] PUB.X = 7E36DD709D800A6361F1C093ACB589591A63EFFF48E97519A62B388AD34A01F4C7AFE934D35438A84F9F9AEF4819EBA5
3,801,656,589 UART: [art] PUB.Y = 81A7CA3C3921554EF6054FCE7C6F74AC0D35862FA7891CBC3B5D0DF2B2B395E9A8A51FFC0682777783158EEC9834D84C
3,801,663,852 UART: [art] SIG.R = 7017D16E8D1131DC20F6AFFF387EF79257CA25A17744B62086C14C83271250E626DEBFEEE486E55D4637751D99F7966C
3,801,671,253 UART: [art] SIG.S = A94B18584DD6DAF9DAD229AA5850C98CA1E43E61CD1F392B61ADB1D4F55D64408E70005DDCDD9243927E8730A8B34809
3,802,976,187 UART: Caliptra RT
3,802,976,903 UART: [state] CFI Enabled
3,803,304,791 UART: [rt] RT listening for mailbox commands...
3,803,306,674 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,812,033,357 >>> mbox cmd response: success
3,812,068,793 UART:
3,812,069,099 UART: Running Caliptra FMC ...
3,812,070,144 UART:
3,812,070,295 UART: [state] CFI Enabled
3,812,173,442 UART: [art] Extend RT PCRs Done
3,812,174,627 UART: [art] Lock RT PCRs Done
3,812,176,027 UART: [art] Populate DV Done
3,812,181,597 UART: [fht] FMC Alias Private Key: 7
3,812,183,234 UART: [art] Derive CDI
3,812,184,044 UART: [art] Store in in slot 0x4
3,812,242,184 UART: [art] Derive Key Pair
3,812,243,232 UART: [art] Store priv key in slot 0x5
3,815,536,249 UART: [art] Derive Key Pair - Done
3,815,549,573 UART: [art] Signing Cert with AUTHO
3,815,550,872 UART: RITY.KEYID = 7
3,817,837,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,817,839,459 UART: [art] PUB.X = AF90474B3EB367B6D88D28ABDD1412779579B44A95151D64114EF5367080C22ED16D9D3011F7978D57DBEC02A5D7E0CF
3,817,846,724 UART: [art] PUB.Y = A1BB3FBEF10D7493F13C918C2D571406293488E8373A8C42E6C4A24D45E45457F9162A5BDF5194DC9F11C1BF05838AFD
3,817,853,981 UART: [art] SIG.R = F0659269AEAE48AA92E36A512DCD9030019DB112C6418F22756E94764F689D6F29C7C95887BFFDE3842717CC83584EA5
3,817,861,350 UART: [art] SIG.S = 67BFD13A43F699C5EC7D4A37129C1AAAE077F8B33D4B6AF3AD239C4F60CDF663044F55B405238DB1CA88D75B24905B47
3,819,166,762 UART: Caliptra RT
3,819,167,479 UART: [state] CFI Enabled
3,819,496,126 UART: [rt] RT listening for mailbox commands...
3,819,498,004 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,828,225,115 >>> mbox cmd response: success
3,828,261,557 UART:
3,828,261,852 UART: Running Caliptra FMC ...
3,828,262,970 UART:
3,828,263,153 UART: [state] CFI Enabled
3,828,365,851 UART: [art] Extend RT PCRs Done
3,828,367,049 UART: [art] Lock RT PCRs Done
3,828,368,351 UART: [art] Populate DV Done
3,828,373,871 UART: [fht] FMC Alias Private Key: 7
3,828,375,514 UART: [art] Derive CDI
3,828,376,328 UART: [art] Store in in slot 0x4
3,828,434,232 UART: [art] Derive Key Pair
3,828,435,228 UART: [art] Store priv key in slot 0x5
3,831,728,287 UART: [art] Derive Key Pair - Done
3,831,741,559 UART: [art] Signing Cert with AUTHO
3,831,742,871 UART: RITY.KEYID = 7
3,834,030,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,834,031,597 UART: [art] PUB.X = 7E36DD709D800A6361F1C093ACB589591A63EFFF48E97519A62B388AD34A01F4C7AFE934D35438A84F9F9AEF4819EBA5
3,834,038,852 UART: [art] PUB.Y = 81A7CA3C3921554EF6054FCE7C6F74AC0D35862FA7891CBC3B5D0DF2B2B395E9A8A51FFC0682777783158EEC9834D84C
3,834,046,045 UART: [art] SIG.R = 7017D16E8D1131DC20F6AFFF387EF79257CA25A17744B62086C14C83271250E626DEBFEEE486E55D4637751D99F7966C
3,834,053,441 UART: [art] SIG.S = A94B18584DD6DAF9DAD229AA5850C98CA1E43E61CD1F392B61ADB1D4F55D64408E70005DDCDD9243927E8730A8B34809
3,835,359,026 UART: Caliptra RT
3,835,359,722 UART: [state] CFI Enabled
3,835,688,380 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 406.85s
Truncated 1347769 bytes from beginning
UART: [art] Extend RT PCRs Done
3,518,184,858 UART: [art] Lock RT PCRs Done
3,518,186,154 UART: [art] Populate DV Done
3,518,191,674 UART: [fht] FMC Alias Private Key: 7
3,518,193,318 UART: [art] Derive CDI
3,518,194,133 UART: [art] Store in in slot 0x4
3,518,236,782 UART: [art] Derive Key Pair
3,518,237,785 UART: [art] Store priv key in slot 0x5
3,521,479,811 UART: [art] Derive Key Pair - Done
3,521,493,133 UART: [art] Signing Cert with AUTHO
3,521,494,441 UART: RITY.KEYID = 7
3,523,773,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,523,775,218 UART: [art] PUB.X = B55915A10C981266953B1E98091638362D83D51689AF15860184A7DABCEC4EDEDC131A59FBF7A6E5CA6E7CD6BB33E29A
3,523,782,517 UART: [art] PUB.Y = A75E04295815C378EA87F09CFA525A35A417C2F074C2C608D45726B8B248CEE4887FA5380691A134637462B2E0917E4A
3,523,789,737 UART: [art] SIG.R = DE9ECB452A20769BD68A52857542BE3B81948B745EB1F50AFECAD67ADD53675C2FDA345FACDBEE800E84E50100A60FBB
3,523,797,122 UART: [art] SIG.S = 22EC3BD27CE8C65D58BD3EA2F815F4D867803608AF0DE857F7F1C3E9B3D7903ACF2A043056C3C2575BA74F4B855AD7AB
3,525,102,922 UART: Caliptra RT
3,525,103,613 UART: [state] CFI Enabled
3,525,396,041 UART: [rt] RT listening for mailbox commands...
3,525,397,943 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,525,542,222 UART:
3,525,542,540 UART: Running Caliptra ROM ...
3,525,543,579 UART:
3,525,543,893 UART: [state] CFI Enabled
3,525,559,839 UART: [state] LifecycleState = Unprovisioned
3,525,561,732 UART: [state] DebugLocked = No
3,525,563,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,525,567,653 UART: [kat] SHA2-256
3,525,737,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,525,747,930 UART: [kat] ++
3,525,748,390 UART: [kat] sha1
3,525,759,461 UART: [kat] SHA2-256
3,525,762,160 UART: [kat] SHA2-384
3,525,768,256 UART: [kat] SHA2-512-ACC
3,525,770,605 UART: [kat] ECC-384
3,528,053,937 UART: [kat] HMAC-384Kdf
3,528,065,678 UART: [kat] LMS
3,529,255,756 UART: [kat] --
3,529,260,663 UART: [update-reset] ++
3,533,399,254 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,533,403,602 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,533,785,591 >>> mbox cmd response: success
3,533,786,083 UART: [update-reset] Copying MAN_2 To MAN_1
3,533,808,288 UART: [update-reset Success] --
3,533,812,040 UART: [state] Locking Datavault
3,533,814,490 UART: [state] Locking PCR0, PCR1 and PCR31
3,533,816,194 UART: [state] Locking ICCM
3,533,818,864 UART: [exit] Launching FMC @ 0x40000130
3,533,827,317 UART:
3,533,827,564 UART: Running Caliptra FMC ...
3,533,828,669 UART:
3,533,828,849 UART: [state] CFI Enabled
3,533,872,605 UART: [art] Extend RT PCRs Done
3,533,873,795 UART: [art] Lock RT PCRs Done
3,533,875,411 UART: [art] Populate DV Done
3,533,880,823 UART: [fht] FMC Alias Private Key: 7
3,533,882,469 UART: [art] Derive CDI
3,533,883,286 UART: [art] Store in in slot 0x4
3,533,925,876 UART: [art] Derive Key Pair
3,533,926,870 UART: [art] Store priv key in slot 0x5
3,537,169,056 UART: [art] Derive Key Pair - Done
3,537,181,947 UART: [art] Signing Cert with AUTHO
3,537,183,274 UART: RITY.KEYID = 7
3,539,462,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,539,464,642 UART: [art] PUB.X = BE9D116F026626DC39D8C2D7A0D25202525CAE08EAE956DF0AB00DB854A671D774A7300C16994A07D8F74034187D8821
3,539,471,513 UART: [art] PUB.Y = 77DBCC20091F750A37CD69083874990A6BFB0F29D09DDD4FEBF669296D7E3361613C328D0F9B35D59F483FE41D83165E
3,539,478,679 UART: [art] SIG.R = 5892E343FB6F7386005AAC7181992A3F9BF11803657CC8EE5F120300D3B1FEF84B90EA5C171A8A0743FD41145F8B03A1
3,539,486,071 UART: [art] SIG.S = 6D5A651CDAB981ACC4A589836787514BEADBDC5FADFB4518FBC10F7CFEC1400CF37338933A5D3F828035B4F8B666DEFB
3,540,790,950 UART: Caliptra RT
3,540,792,088 UART: [state] CFI Enabled
3,541,078,450 UART: [rt] RT listening for mailbox commands...
3,541,080,502 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,541,224,804 UART:
3,541,225,212 UART: Running Caliptra ROM ...
3,541,226,259 UART:
3,541,226,415 UART: [state] CFI Enabled
3,541,241,388 UART: [state] LifecycleState = Unprovisioned
3,541,243,277 UART: [state] DebugLocked = No
3,541,244,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,541,250,229 UART: [kat] SHA2-256
3,541,419,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,541,430,486 UART: [kat] ++
3,541,430,960 UART: [kat] sha1
3,541,442,499 UART: [kat] SHA2-256
3,541,445,204 UART: [kat] SHA2-384
3,541,450,176 UART: [kat] SHA2-512-ACC
3,541,452,527 UART: [kat] ECC-384
3,543,738,088 UART: [kat] HMAC-384Kdf
3,543,749,152 UART: [kat] LMS
3,544,939,224 UART: [kat] --
3,544,942,686 UART: [update-reset] ++
3,549,077,583 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,549,081,282 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,549,463,220 >>> mbox cmd response: success
3,549,464,346 UART: [update-reset] Copying MAN_2 To MAN_1
3,549,486,759 UART: [update-reset Success] --
3,549,491,121 UART: [state] Locking Datavault
3,549,493,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,549,495,010 UART: [state] Locking ICCM
3,549,496,415 UART: [exit] Launching FMC @ 0x40000130
3,549,504,829 UART:
3,549,505,070 UART: Running Caliptra FMC ...
3,549,506,180 UART:
3,549,506,348 UART: [state] CFI Enabled
3,549,551,064 UART: [art] Extend RT PCRs Done
3,549,552,365 UART: [art] Lock RT PCRs Done
3,549,553,698 UART: [art] Populate DV Done
3,549,558,891 UART: [fht] FMC Alias Private Key: 7
3,549,560,376 UART: [art] Derive CDI
3,549,561,142 UART: [art] Store in in slot 0x4
3,549,603,740 UART: [art] Derive Key Pair
3,549,604,766 UART: [art] Store priv key in slot 0x5
3,552,846,792 UART: [art] Derive Key Pair - Done
3,552,859,720 UART: [art] Signing Cert with AUTHO
3,552,861,089 UART: RITY.KEYID = 7
3,555,140,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,142,170 UART: [art] PUB.X = B55915A10C981266953B1E98091638362D83D51689AF15860184A7DABCEC4EDEDC131A59FBF7A6E5CA6E7CD6BB33E29A
3,555,149,089 UART: [art] PUB.Y = A75E04295815C378EA87F09CFA525A35A417C2F074C2C608D45726B8B248CEE4887FA5380691A134637462B2E0917E4A
3,555,156,341 UART: [art] SIG.R = DE9ECB452A20769BD68A52857542BE3B81948B745EB1F50AFECAD67ADD53675C2FDA345FACDBEE800E84E50100A60FBB
3,555,163,709 UART: [art] SIG.S = 22EC3BD27CE8C65D58BD3EA2F815F4D867803608AF0DE857F7F1C3E9B3D7903ACF2A043056C3C2575BA74F4B855AD7AB
3,556,468,220 UART: Caliptra RT
3,556,469,245 UART: [state] CFI Enabled
3,556,758,330 UART: [rt] RT listening for mailbox commands...
3,556,760,439 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,556,905,549 UART:
3,556,906,106 UART: Running Caliptra ROM ...
3,556,907,155 UART:
3,556,907,351 UART: [state] CFI Enabled
3,556,922,018 UART: [state] LifecycleState = Unprovisioned
3,556,923,936 UART: [state] DebugLocked = No
3,556,925,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,556,930,122 UART: [kat] SHA2-256
3,557,099,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,557,110,387 UART: [kat] ++
3,557,110,910 UART: [kat] sha1
3,557,121,095 UART: [kat] SHA2-256
3,557,123,790 UART: [kat] SHA2-384
3,557,128,594 UART: [kat] SHA2-512-ACC
3,557,130,945 UART: [kat] ECC-384
3,559,416,382 UART: [kat] HMAC-384Kdf
3,559,429,176 UART: [kat] LMS
3,560,619,236 UART: [kat] --
3,560,623,750 UART: [update-reset] ++
3,564,763,201 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,564,766,855 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,565,148,805 >>> mbox cmd response: success
3,565,149,303 UART: [update-reset] Copying MAN_2 To MAN_1
3,565,171,722 UART: [update-reset Success] --
3,565,175,904 UART: [state] Locking Datavault
3,565,179,540 UART: [state] Locking PCR0, PCR1 and PCR31
3,565,181,291 UART: [state] Locking ICCM
3,565,183,908 UART: [exit] Launching FMC @ 0x40000130
3,565,192,357 UART:
3,565,192,592 UART: Running Caliptra FMC ...
3,565,193,623 UART:
3,565,193,776 UART: [state] CFI Enabled
3,565,237,593 UART: [art] Extend RT PCRs Done
3,565,238,785 UART: [art] Lock RT PCRs Done
3,565,240,011 UART: [art] Populate DV Done
3,565,245,450 UART: [fht] FMC Alias Private Key: 7
3,565,247,150 UART: [art] Derive CDI
3,565,247,889 UART: [art] Store in in slot 0x4
3,565,290,753 UART: [art] Derive Key Pair
3,565,291,754 UART: [art] Store priv key in slot 0x5
3,568,533,315 UART: [art] Derive Key Pair - Done
3,568,546,609 UART: [art] Signing Cert with AUTHO
3,568,547,920 UART: RITY.KEYID = 7
3,570,827,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,829,392 UART: [art] PUB.X = BE9D116F026626DC39D8C2D7A0D25202525CAE08EAE956DF0AB00DB854A671D774A7300C16994A07D8F74034187D8821
3,570,836,565 UART: [art] PUB.Y = 77DBCC20091F750A37CD69083874990A6BFB0F29D09DDD4FEBF669296D7E3361613C328D0F9B35D59F483FE41D83165E
3,570,843,830 UART: [art] SIG.R = 5892E343FB6F7386005AAC7181992A3F9BF11803657CC8EE5F120300D3B1FEF84B90EA5C171A8A0743FD41145F8B03A1
3,570,851,203 UART: [art] SIG.S = 6D5A651CDAB981ACC4A589836787514BEADBDC5FADFB4518FBC10F7CFEC1400CF37338933A5D3F828035B4F8B666DEFB
3,572,156,693 UART: Caliptra RT
3,572,157,398 UART: [state] CFI Enabled
3,572,443,577 UART: [rt] RT listening for mailbox commands...
3,572,445,501 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,572,589,808 UART:
3,572,590,133 UART: Running Caliptra ROM ...
3,572,591,255 UART:
3,572,591,425 UART: [state] CFI Enabled
3,572,606,017 UART: [state] LifecycleState = Unprovisioned
3,572,607,920 UART: [state] DebugLocked = No
3,572,609,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,572,614,310 UART: [kat] SHA2-256
3,572,784,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,572,794,559 UART: [kat] ++
3,572,795,048 UART: [kat] sha1
3,572,806,100 UART: [kat] SHA2-256
3,572,808,791 UART: [kat] SHA2-384
3,572,814,354 UART: [kat] SHA2-512-ACC
3,572,816,711 UART: [kat] ECC-384
3,575,100,636 UART: [kat] HMAC-384Kdf
3,575,111,907 UART: [kat] LMS
3,576,302,014 UART: [kat] --
3,576,307,650 UART: [update-reset] ++
3,580,449,765 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,580,453,923 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
3,580,835,900 >>> mbox cmd response: success
3,580,837,913 UART: [update-reset] Copying MAN_2 To MAN_1
3,580,860,297 UART: [update-reset Success] --
3,580,864,371 UART: [state] Locking Datavault
3,580,868,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,580,869,972 UART: [state] Locking ICCM
3,580,872,177 UART: [exit] Launching FMC @ 0x40000130
3,580,880,572 UART:
3,580,880,810 UART: Running Caliptra FMC ...
3,580,881,912 UART:
3,580,882,090 UART: [state] CFI Enabled
3,580,926,283 UART: [art] Extend RT PCRs Done
3,580,927,473 UART: [art] Lock RT PCRs Done
3,580,928,979 UART: [art] Populate DV Done
3,580,934,120 UART: [fht] FMC Alias Private Key: 7
3,580,935,819 UART: [art] Derive CDI
3,580,936,634 UART: [art] Store in in slot 0x4
3,580,979,065 UART: [art] Derive Key Pair
3,580,980,110 UART: [art] Store priv key in slot 0x5
3,584,222,326 UART: [art] Derive Key Pair - Done
3,584,235,352 UART: [art] Signing Cert with AUTHO
3,584,236,651 UART: RITY.KEYID = 7
3,586,516,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,586,517,543 UART: [art] PUB.X = B55915A10C981266953B1E98091638362D83D51689AF15860184A7DABCEC4EDEDC131A59FBF7A6E5CA6E7CD6BB33E29A
3,586,524,781 UART: [art] PUB.Y = A75E04295815C378EA87F09CFA525A35A417C2F074C2C608D45726B8B248CEE4887FA5380691A134637462B2E0917E4A
3,586,531,992 UART: [art] SIG.R = DE9ECB452A20769BD68A52857542BE3B81948B745EB1F50AFECAD67ADD53675C2FDA345FACDBEE800E84E50100A60FBB
3,586,539,386 UART: [art] SIG.S = 22EC3BD27CE8C65D58BD3EA2F815F4D867803608AF0DE857F7F1C3E9B3D7903ACF2A043056C3C2575BA74F4B855AD7AB
3,587,844,928 UART: Caliptra RT
3,587,845,654 UART: [state] CFI Enabled
3,588,128,650 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 394.47s
Truncated 716351 bytes from beginning
3B863615C8EE0C11B1889A0DCB82B7D
3,630,844,759 UART: [art] SIG.R = A0B88055E14FEBF26F0BE03A737A4FB3F37B131E36AEAD74A38B2A78229A9C90A1F9D6546D5025C75A85C7348383AF3A
3,630,852,130 UART: [art] SIG.S = 2F54A716E991BAE37CD8C696AF889B892FC19EDE2714661832937A02C54ABF9DCEF763378B4E8DCC23C77B225DEADF05
3,632,157,391 UART: Caliptra RT
3,632,158,112 UART: [state] CFI Enabled
3,632,449,591 UART: [rt] RT listening for mailbox commands...
3,632,451,481 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,641,111,773 >>> mbox cmd response: success
3,641,146,324 UART:
3,641,146,597 UART: Running Caliptra FMC ...
3,641,147,633 UART:
3,641,147,788 UART: [state] CFI Enabled
3,641,192,241 UART: [art] Extend RT PCRs Done
3,641,193,428 UART: [art] Lock RT PCRs Done
3,641,195,023 UART: [art] Populate DV Done
3,641,200,601 UART: [fht] FMC Alias Private Key: 7
3,641,202,191 UART: [art] Derive CDI
3,641,202,953 UART: [art] Store in in slot 0x4
3,641,245,558 UART: [art] Derive Key Pair
3,641,246,600 UART: [art] Store priv key in slot 0x5
3,644,488,308 UART: [art] Derive Key Pair - Done
3,644,501,366 UART: [art] Signing Cert with AUTHO
3,644,502,671 UART: RITY.KEYID = 7
3,646,781,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,646,783,206 UART: [art] PUB.X = 389D6958756F7B3B0ADAB30DB314C1211B2569DA1FBA18CAC43226F77B6A5688EE2A31E51CC1D1E85C2DBCCB159CEAD4
3,646,790,518 UART: [art] PUB.Y = 6BA442BAE9D458331D4DFD591B69BF66291F586E287E54F0904ACDBEFACA58D548AA934F45245F4788919788FE75EBA1
3,646,797,811 UART: [art] SIG.R = 4C993DA65D382409E9DF1DEFDCEC256CBED8D1D6C7C5700C07C4F5C18B528E3ABD473DCC566757E8E26B366EA97794F0
3,646,805,128 UART: [art] SIG.S = 590F9938F5902B057D8C9EB0C5E363415364711DD087656E29614978D6C93D71EB37F927B22F8C4049825AF38EA90FEA
3,648,110,488 UART: Caliptra RT
3,648,111,198 UART: [state] CFI Enabled
3,648,400,174 UART: [rt] RT listening for mailbox commands...
3,648,402,053 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,657,565,890 >>> mbox cmd response: success
3,657,601,545 UART:
3,657,601,826 UART: Running Caliptra FMC ...
3,657,602,945 UART:
3,657,603,113 UART: [state] CFI Enabled
3,657,647,524 UART: [art] Extend RT PCRs Done
3,657,648,713 UART: [art] Lock RT PCRs Done
3,657,650,287 UART: [art] Populate DV Done
3,657,655,762 UART: [fht] FMC Alias Private Key: 7
3,657,657,309 UART: [art] Derive CDI
3,657,658,046 UART: [art] Store in in slot 0x4
3,657,700,425 UART: [art] Derive Key Pair
3,657,701,424 UART: [art] Store priv key in slot 0x5
3,660,943,606 UART: [art] Derive Key Pair - Done
3,660,956,438 UART: [art] Signing Cert with AUTHO
3,660,957,747 UART: RITY.KEYID = 7
3,663,237,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,238,948 UART: [art] PUB.X = 9EB9B7356FEB7EB05ECB4257AE77926F475DAB7974A239C47E9BFB66EDF7C4418107CA945E54574E993A3A3681CE7C98
3,663,246,164 UART: [art] PUB.Y = 440BDC721B6B55E7AA3CAA29D6B06D304D39949DD753EA048A1C7B2BA9EFE75693B863615C8EE0C11B1889A0DCB82B7D
3,663,253,417 UART: [art] SIG.R = A0B88055E14FEBF26F0BE03A737A4FB3F37B131E36AEAD74A38B2A78229A9C90A1F9D6546D5025C75A85C7348383AF3A
3,663,260,775 UART: [art] SIG.S = 2F54A716E991BAE37CD8C696AF889B892FC19EDE2714661832937A02C54ABF9DCEF763378B4E8DCC23C77B225DEADF05
3,664,565,908 UART: Caliptra RT
3,664,566,627 UART: [state] CFI Enabled
3,664,856,933 UART: [rt] RT listening for mailbox commands...
3,664,858,803 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,673,504,376 >>> mbox cmd response: success
3,673,538,260 UART:
3,673,538,555 UART: Running Caliptra FMC ...
3,673,539,603 UART:
3,673,539,756 UART: [state] CFI Enabled
3,673,583,877 UART: [art] Extend RT PCRs Done
3,673,585,104 UART: [art] Lock RT PCRs Done
3,673,586,463 UART: [art] Populate DV Done
3,673,592,065 UART: [fht] FMC Alias Private Key: 7
3,673,593,680 UART: [art] Derive CDI
3,673,594,502 UART: [art] Store in in slot 0x4
3,673,637,103 UART: [art] Derive Key Pair
3,673,638,165 UART: [art] Store priv key in slot 0x5
3,676,880,006 UART: [art] Derive Key Pair - Done
3,676,893,169 UART: [art] Signing Cert with AUTHO
3,676,894,475 UART: RITY.KEYID = 7
3,679,174,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,175,759 UART: [art] PUB.X = 389D6958756F7B3B0ADAB30DB314C1211B2569DA1FBA18CAC43226F77B6A5688EE2A31E51CC1D1E85C2DBCCB159CEAD4
3,679,183,029 UART: [art] PUB.Y = 6BA442BAE9D458331D4DFD591B69BF66291F586E287E54F0904ACDBEFACA58D548AA934F45245F4788919788FE75EBA1
3,679,190,290 UART: [art] SIG.R = 4C993DA65D382409E9DF1DEFDCEC256CBED8D1D6C7C5700C07C4F5C18B528E3ABD473DCC566757E8E26B366EA97794F0
3,679,197,658 UART: [art] SIG.S = 590F9938F5902B057D8C9EB0C5E363415364711DD087656E29614978D6C93D71EB37F927B22F8C4049825AF38EA90FEA
3,680,502,963 UART: Caliptra RT
3,680,503,689 UART: [state] CFI Enabled
3,680,792,797 UART: [rt] RT listening for mailbox commands...
3,680,794,723 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,689,450,291 >>> mbox cmd response: success
3,689,483,944 UART:
3,689,484,253 UART: Running Caliptra FMC ...
3,689,485,291 UART:
3,689,485,443 UART: [state] CFI Enabled
3,689,529,525 UART: [art] Extend RT PCRs Done
3,689,530,676 UART: [art] Lock RT PCRs Done
3,689,532,320 UART: [art] Populate DV Done
3,689,537,731 UART: [fht] FMC Alias Private Key: 7
3,689,539,216 UART: [art] Derive CDI
3,689,539,980 UART: [art] Store in in slot 0x4
3,689,582,397 UART: [art] Derive Key Pair
3,689,583,443 UART: [art] Store priv key in slot 0x5
3,692,825,845 UART: [art] Derive Key Pair - Done
3,692,838,786 UART: [art] Signing Cert with AUTHO
3,692,840,140 UART: RITY.KEYID = 7
3,695,119,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,695,121,275 UART: [art] PUB.X = 9EB9B7356FEB7EB05ECB4257AE77926F475DAB7974A239C47E9BFB66EDF7C4418107CA945E54574E993A3A3681CE7C98
3,695,128,549 UART: [art] PUB.Y = 440BDC721B6B55E7AA3CAA29D6B06D304D39949DD753EA048A1C7B2BA9EFE75693B863615C8EE0C11B1889A0DCB82B7D
3,695,135,799 UART: [art] SIG.R = A0B88055E14FEBF26F0BE03A737A4FB3F37B131E36AEAD74A38B2A78229A9C90A1F9D6546D5025C75A85C7348383AF3A
3,695,143,155 UART: [art] SIG.S = 2F54A716E991BAE37CD8C696AF889B892FC19EDE2714661832937A02C54ABF9DCEF763378B4E8DCC23C77B225DEADF05
3,696,448,039 UART: Caliptra RT
3,696,448,755 UART: [state] CFI Enabled
3,696,739,564 UART: [rt] RT listening for mailbox commands...
3,696,741,452 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,705,392,299 >>> mbox cmd response: success
3,705,426,473 UART:
3,705,426,771 UART: Running Caliptra FMC ...
3,705,427,892 UART:
3,705,428,067 UART: [state] CFI Enabled
3,705,472,026 UART: [art] Extend RT PCRs Done
3,705,473,210 UART: [art] Lock RT PCRs Done
3,705,474,543 UART: [art] Populate DV Done
3,705,480,136 UART: [fht] FMC Alias Private Key: 7
3,705,481,786 UART: [art] Derive CDI
3,705,482,600 UART: [art] Store in in slot 0x4
3,705,524,873 UART: [art] Derive Key Pair
3,705,525,878 UART: [art] Store priv key in slot 0x5
3,708,768,408 UART: [art] Derive Key Pair - Done
3,708,780,931 UART: [art] Signing Cert with AUTHO
3,708,782,234 UART: RITY.KEYID = 7
3,711,061,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,711,063,268 UART: [art] PUB.X = 389D6958756F7B3B0ADAB30DB314C1211B2569DA1FBA18CAC43226F77B6A5688EE2A31E51CC1D1E85C2DBCCB159CEAD4
3,711,070,549 UART: [art] PUB.Y = 6BA442BAE9D458331D4DFD591B69BF66291F586E287E54F0904ACDBEFACA58D548AA934F45245F4788919788FE75EBA1
3,711,077,749 UART: [art] SIG.R = 4C993DA65D382409E9DF1DEFDCEC256CBED8D1D6C7C5700C07C4F5C18B528E3ABD473DCC566757E8E26B366EA97794F0
3,711,085,179 UART: [art] SIG.S = 590F9938F5902B057D8C9EB0C5E363415364711DD087656E29614978D6C93D71EB37F927B22F8C4049825AF38EA90FEA
3,712,391,247 UART: Caliptra RT
3,712,391,975 UART: [state] CFI Enabled
3,712,683,234 UART: [rt] RT listening for mailbox commands...
3,712,685,113 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,721,337,936 >>> mbox cmd response: success
3,721,371,782 UART:
3,721,372,056 UART: Running Caliptra FMC ...
3,721,373,094 UART:
3,721,373,247 UART: [state] CFI Enabled
3,721,418,146 UART: [art] Extend RT PCRs Done
3,721,419,354 UART: [art] Lock RT PCRs Done
3,721,420,635 UART: [art] Populate DV Done
3,721,426,025 UART: [fht] FMC Alias Private Key: 7
3,721,427,686 UART: [art] Derive CDI
3,721,428,429 UART: [art] Store in in slot 0x4
3,721,470,601 UART: [art] Derive Key Pair
3,721,471,608 UART: [art] Store priv key in slot 0x5
3,724,713,630 UART: [art] Derive Key Pair - Done
3,724,727,017 UART: [art] Signing Cert with AUTHO
3,724,728,334 UART: RITY.KEYID = 7
3,727,008,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,009,570 UART: [art] PUB.X = 9EB9B7356FEB7EB05ECB4257AE77926F475DAB7974A239C47E9BFB66EDF7C4418107CA945E54574E993A3A3681CE7C98
3,727,016,800 UART: [art] PUB.Y = 440BDC721B6B55E7AA3CAA29D6B06D304D39949DD753EA048A1C7B2BA9EFE75693B863615C8EE0C11B1889A0DCB82B7D
3,727,024,058 UART: [art] SIG.R = A0B88055E14FEBF26F0BE03A737A4FB3F37B131E36AEAD74A38B2A78229A9C90A1F9D6546D5025C75A85C7348383AF3A
3,727,031,438 UART: [art] SIG.S = 2F54A716E991BAE37CD8C696AF889B892FC19EDE2714661832937A02C54ABF9DCEF763378B4E8DCC23C77B225DEADF05
3,728,336,329 UART: Caliptra RT
3,728,337,044 UART: [state] CFI Enabled
3,728,625,975 UART: [rt] RT listening for mailbox commands...
3,728,627,855 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,737,803,204 >>> mbox cmd response: success
3,737,838,088 UART:
3,737,838,371 UART: Running Caliptra FMC ...
3,737,839,411 UART:
3,737,839,582 UART: [state] CFI Enabled
3,737,883,808 UART: [art] Extend RT PCRs Done
3,737,885,004 UART: [art] Lock RT PCRs Done
3,737,886,417 UART: [art] Populate DV Done
3,737,891,681 UART: [fht] FMC Alias Private Key: 7
3,737,893,282 UART: [art] Derive CDI
3,737,894,107 UART: [art] Store in in slot 0x4
3,737,936,441 UART: [art] Derive Key Pair
3,737,937,441 UART: [art] Store priv key in slot 0x5
3,741,179,242 UART: [art] Derive Key Pair - Done
3,741,191,761 UART: [art] Signing Cert with AUTHO
3,741,193,075 UART: RITY.KEYID = 7
3,743,472,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,743,474,114 UART: [art] PUB.X = 389D6958756F7B3B0ADAB30DB314C1211B2569DA1FBA18CAC43226F77B6A5688EE2A31E51CC1D1E85C2DBCCB159CEAD4
3,743,481,248 UART: [art] PUB.Y = 6BA442BAE9D458331D4DFD591B69BF66291F586E287E54F0904ACDBEFACA58D548AA934F45245F4788919788FE75EBA1
3,743,488,511 UART: [art] SIG.R = 4C993DA65D382409E9DF1DEFDCEC256CBED8D1D6C7C5700C07C4F5C18B528E3ABD473DCC566757E8E26B366EA97794F0
3,743,495,904 UART: [art] SIG.S = 590F9938F5902B057D8C9EB0C5E363415364711DD087656E29614978D6C93D71EB37F927B22F8C4049825AF38EA90FEA
3,744,801,568 UART: Caliptra RT
3,744,802,297 UART: [state] CFI Enabled
3,745,086,218 UART: [rt] RT listening for mailbox commands...
3,745,088,109 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,753,746,502 >>> mbox cmd response: success
3,753,782,092 UART:
3,753,782,370 UART: Running Caliptra FMC ...
3,753,783,486 UART:
3,753,783,656 UART: [state] CFI Enabled
3,753,827,687 UART: [art] Extend RT PCRs Done
3,753,828,885 UART: [art] Lock RT PCRs Done
3,753,830,188 UART: [art] Populate DV Done
3,753,835,764 UART: [fht] FMC Alias Private Key: 7
3,753,837,301 UART: [art] Derive CDI
3,753,838,116 UART: [art] Store in in slot 0x4
3,753,881,052 UART: [art] Derive Key Pair
3,753,882,098 UART: [art] Store priv key in slot 0x5
3,757,123,663 UART: [art] Derive Key Pair - Done
3,757,136,831 UART: [art] Signing Cert with AUTHO
3,757,138,135 UART: RITY.KEYID = 7
3,759,417,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,759,418,940 UART: [art] PUB.X = 9EB9B7356FEB7EB05ECB4257AE77926F475DAB7974A239C47E9BFB66EDF7C4418107CA945E54574E993A3A3681CE7C98
3,759,426,223 UART: [art] PUB.Y = 440BDC721B6B55E7AA3CAA29D6B06D304D39949DD753EA048A1C7B2BA9EFE75693B863615C8EE0C11B1889A0DCB82B7D
3,759,433,484 UART: [art] SIG.R = A0B88055E14FEBF26F0BE03A737A4FB3F37B131E36AEAD74A38B2A78229A9C90A1F9D6546D5025C75A85C7348383AF3A
3,759,440,846 UART: [art] SIG.S = 2F54A716E991BAE37CD8C696AF889B892FC19EDE2714661832937A02C54ABF9DCEF763378B4E8DCC23C77B225DEADF05
3,760,746,376 UART: Caliptra RT
3,760,747,072 UART: [state] CFI Enabled
3,761,036,425 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 403.12s
Truncated 1329478 bytes from beginning
RT:
2,177,684,987 UART: Running Caliptra FMC ...
2,177,686,019 UART:
2,177,686,176 UART: [state] CFI Enabled
2,177,782,188 UART: [art] Extend RT PCRs Done
2,177,783,367 UART: [art] Lock RT PCRs Done
2,177,784,749 UART: [art] Populate DV Done
2,177,790,161 UART: [fht] FMC Alias Private Key: 7
2,177,791,862 UART: [art] Derive CDI
2,177,792,599 UART: [art] Store in in slot 0x4
2,177,850,937 UART: [art] Derive Key Pair
2,177,851,972 UART: [art] Store priv key in slot 0x5
2,180,315,033 UART: [art] Derive Key Pair - Done
2,180,327,970 UART: [art] Signing Cert with AUTHO
2,180,329,321 UART: RITY.KEYID = 7
2,182,040,566 UART: [art] Erasing AUTHORITY.KEYID = 7
2,182,042,103 UART: [art] PUB.X = 107F3EBBDC27E4C208AF52C5EE46E8C1C3108E7283DF1FC086907647E269768A1BDFC69076BAD2C58DF92E6FF95A8DA6
2,182,049,346 UART: [art] PUB.Y = 74C84682F866CB34895F17FF85426926B56D62D0145252BF1B8CE924FDB53642F9F58DD17A1C96DA175F1CA938122569
2,182,056,566 UART: [art] SIG.R = 386BAC19596F94D2E9BA683D4C8F6543ADBFFCA47A5C145B5532FF93CCBAF08BB3641EEA3CE2FC9221C9085707049FB7
2,182,063,992 UART: [art] SIG.S = 314607FC36FD552953381ED64D20D6CFAFD057943589BC7D1C9585711587392CFEF8B1F6E0EC6CD3F8F086729CF184AF
2,183,042,851 UART: Caliptra RT
2,183,043,571 UART: [state] CFI Enabled
2,183,375,640 UART: [rt] RT listening for mailbox commands...
2,183,377,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,183,522,130 UART:
2,183,522,437 UART: Running Caliptra ROM ...
2,183,523,562 UART:
2,183,523,727 UART: [state] CFI Enabled
2,183,594,476 UART: [state] LifecycleState = Unprovisioned
2,183,596,317 UART: [state] DebugLocked = No
2,183,597,966 UART: [state] WD Timer not started. Device not locked for debugging
2,183,602,147 UART: [kat] SHA2-256
2,183,781,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,792,840 UART: [kat] ++
2,183,793,395 UART: [kat] sha1
2,183,803,486 UART: [kat] SHA2-256
2,183,806,496 UART: [kat] SHA2-384
2,183,811,350 UART: [kat] SHA2-512-ACC
2,183,814,294 UART: [kat] ECC-384
2,186,258,872 UART: [kat] HMAC-384Kdf
2,186,280,815 UART: [kat] LMS
2,186,810,245 UART: [kat] --
2,186,812,789 UART: [update-reset] ++
2,190,236,952 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,190,240,157 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,190,623,149 >>> mbox cmd response: success
2,190,625,145 UART: [update-reset] Copying MAN_2 To MAN_1
2,190,647,475 UART: [update-reset Success] --
2,190,652,084 UART: [state] Locking Datavault
2,190,654,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,190,655,993 UART: [state] Locking ICCM
2,190,657,555 UART: [exit] Launching FMC @ 0x40000130
2,190,666,006 UART:
2,190,666,255 UART: Running Caliptra FMC ...
2,190,667,359 UART:
2,190,667,523 UART: [state] CFI Enabled
2,190,770,119 UART: [art] Extend RT PCRs Done
2,190,771,324 UART: [art] Lock RT PCRs Done
2,190,772,735 UART: [art] Populate DV Done
2,190,778,306 UART: [fht] FMC Alias Private Key: 7
2,190,779,912 UART: [art] Derive CDI
2,190,780,732 UART: [art] Store in in slot 0x4
2,190,839,682 UART: [art] Derive Key Pair
2,190,840,728 UART: [art] Store priv key in slot 0x5
2,193,303,594 UART: [art] Derive Key Pair - Done
2,193,316,587 UART: [art] Signing Cert with AUTHO
2,193,317,895 UART: RITY.KEYID = 7
2,195,029,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,195,031,044 UART: [art] PUB.X = 0EC379B84D28BAD2E2DE10CF7CCC35419CEF275366E90E2F7B83696261D9B382239203A0EDF9D414BD226DD65098535A
2,195,038,280 UART: [art] PUB.Y = 62A29BCDB53D6A65E61B0CE8C8F95397D0D974BA36C400D8DD87FC0207C5F65B205733C14D8CA1075690453B46444D9E
2,195,045,532 UART: [art] SIG.R = 62555E1AE42123855913CC3892F323839532BD3D372AAD4266CADC3F1A22D37F84244CCC00649B25793EFAFFF5AA4963
2,195,052,919 UART: [art] SIG.S = E41F23EA0CEF66F705A9C3005A5A20152580AE905A9DE4504600F1C89219C28B0C4A485A2D32FD259C9A884B4D773C26
2,196,031,739 UART: Caliptra RT
2,196,032,434 UART: [state] CFI Enabled
2,196,364,705 UART: [rt] RT listening for mailbox commands...
2,196,366,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,196,511,401 UART:
2,196,511,708 UART: Running Caliptra ROM ...
2,196,512,833 UART:
2,196,513,004 UART: [state] CFI Enabled
2,196,584,986 UART: [state] LifecycleState = Unprovisioned
2,196,586,867 UART: [state] DebugLocked = No
2,196,588,854 UART: [state] WD Timer not started. Device not locked for debugging
2,196,592,004 UART: [kat] SHA2-256
2,196,771,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,196,782,695 UART: [kat] ++
2,196,783,154 UART: [kat] sha1
2,196,793,930 UART: [kat] SHA2-256
2,196,796,940 UART: [kat] SHA2-384
2,196,803,892 UART: [kat] SHA2-512-ACC
2,196,806,816 UART: [kat] ECC-384
2,199,268,776 UART: [kat] HMAC-384Kdf
2,199,291,906 UART: [kat] LMS
2,199,821,365 UART: [kat] --
2,199,825,085 UART: [update-reset] ++
2,203,248,717 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,203,251,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,203,634,680 >>> mbox cmd response: success
2,203,636,000 UART: [update-reset] Copying MAN_2 To MAN_1
2,203,658,346 UART: [update-reset Success] --
2,203,661,502 UART: [state] Locking Datavault
2,203,664,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,203,665,664 UART: [state] Locking ICCM
2,203,668,362 UART: [exit] Launching FMC @ 0x40000130
2,203,676,761 UART:
2,203,677,012 UART: Running Caliptra FMC ...
2,203,678,124 UART:
2,203,678,285 UART: [state] CFI Enabled
2,203,781,430 UART: [art] Extend RT PCRs Done
2,203,782,626 UART: [art] Lock RT PCRs Done
2,203,783,980 UART: [art] Populate DV Done
2,203,789,395 UART: [fht] FMC Alias Private Key: 7
2,203,791,004 UART: [art] Derive CDI
2,203,791,831 UART: [art] Store in in slot 0x4
2,203,850,337 UART: [art] Derive Key Pair
2,203,851,371 UART: [art] Store priv key in slot 0x5
2,206,313,798 UART: [art] Derive Key Pair - Done
2,206,326,790 UART: [art] Signing Cert with AUTHO
2,206,328,128 UART: RITY.KEYID = 7
2,208,039,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,208,040,996 UART: [art] PUB.X = 107F3EBBDC27E4C208AF52C5EE46E8C1C3108E7283DF1FC086907647E269768A1BDFC69076BAD2C58DF92E6FF95A8DA6
2,208,048,275 UART: [art] PUB.Y = 74C84682F866CB34895F17FF85426926B56D62D0145252BF1B8CE924FDB53642F9F58DD17A1C96DA175F1CA938122569
2,208,055,541 UART: [art] SIG.R = 386BAC19596F94D2E9BA683D4C8F6543ADBFFCA47A5C145B5532FF93CCBAF08BB3641EEA3CE2FC9221C9085707049FB7
2,208,062,972 UART: [art] SIG.S = 314607FC36FD552953381ED64D20D6CFAFD057943589BC7D1C9585711587392CFEF8B1F6E0EC6CD3F8F086729CF184AF
2,209,041,766 UART: Caliptra RT
2,209,042,474 UART: [state] CFI Enabled
2,209,379,165 UART: [rt] RT listening for mailbox commands...
2,209,381,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,209,526,046 UART:
2,209,526,369 UART: Running Caliptra ROM ...
2,209,527,414 UART:
2,209,527,565 UART: [state] CFI Enabled
2,209,595,516 UART: [state] LifecycleState = Unprovisioned
2,209,597,354 UART: [state] DebugLocked = No
2,209,599,301 UART: [state] WD Timer not started. Device not locked for debugging
2,209,603,620 UART: [kat] SHA2-256
2,209,782,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,794,295 UART: [kat] ++
2,209,794,758 UART: [kat] sha1
2,209,806,233 UART: [kat] SHA2-256
2,209,809,249 UART: [kat] SHA2-384
2,209,815,720 UART: [kat] SHA2-512-ACC
2,209,818,666 UART: [kat] ECC-384
2,212,280,807 UART: [kat] HMAC-384Kdf
2,212,301,467 UART: [kat] LMS
2,212,830,922 UART: [kat] --
2,212,835,284 UART: [update-reset] ++
2,216,258,617 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,216,262,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,216,645,511 >>> mbox cmd response: success
2,216,647,458 UART: [update-reset] Copying MAN_2 To MAN_1
2,216,669,740 UART: [update-reset Success] --
2,216,674,842 UART: [state] Locking Datavault
2,216,678,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,216,680,343 UART: [state] Locking ICCM
2,216,682,906 UART: [exit] Launching FMC @ 0x40000130
2,216,691,303 UART:
2,216,691,543 UART: Running Caliptra FMC ...
2,216,692,571 UART:
2,216,692,720 UART: [state] CFI Enabled
2,216,791,773 UART: [art] Extend RT PCRs Done
2,216,792,960 UART: [art] Lock RT PCRs Done
2,216,794,336 UART: [art] Populate DV Done
2,216,799,803 UART: [fht] FMC Alias Private Key: 7
2,216,801,344 UART: [art] Derive CDI
2,216,802,272 UART: [art] Store in in slot 0x4
2,216,860,736 UART: [art] Derive Key Pair
2,216,861,748 UART: [art] Store priv key in slot 0x5
2,219,324,848 UART: [art] Derive Key Pair - Done
2,219,337,849 UART: [art] Signing Cert with AUTHO
2,219,339,154 UART: RITY.KEYID = 7
2,221,050,783 UART: [art] Erasing AUTHORITY.KEYID = 7
2,221,052,299 UART: [art] PUB.X = 0EC379B84D28BAD2E2DE10CF7CCC35419CEF275366E90E2F7B83696261D9B382239203A0EDF9D414BD226DD65098535A
2,221,059,583 UART: [art] PUB.Y = 62A29BCDB53D6A65E61B0CE8C8F95397D0D974BA36C400D8DD87FC0207C5F65B205733C14D8CA1075690453B46444D9E
2,221,066,803 UART: [art] SIG.R = 62555E1AE42123855913CC3892F323839532BD3D372AAD4266CADC3F1A22D37F84244CCC00649B25793EFAFFF5AA4963
2,221,074,171 UART: [art] SIG.S = E41F23EA0CEF66F705A9C3005A5A20152580AE905A9DE4504600F1C89219C28B0C4A485A2D32FD259C9A884B4D773C26
2,222,052,870 UART: Caliptra RT
2,222,053,598 UART: [state] CFI Enabled
2,222,391,559 UART: [rt] RT listening for mailbox commands...
2,222,393,430 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,222,538,069 UART:
2,222,538,375 UART: Running Caliptra ROM ...
2,222,539,501 UART:
2,222,539,669 UART: [state] CFI Enabled
2,222,607,145 UART: [state] LifecycleState = Unprovisioned
2,222,609,021 UART: [state] DebugLocked = No
2,222,610,793 UART: [state] WD Timer not started. Device not locked for debugging
2,222,613,889 UART: [kat] SHA2-256
2,222,793,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,222,804,620 UART: [kat] ++
2,222,805,081 UART: [kat] sha1
2,222,816,566 UART: [kat] SHA2-256
2,222,819,596 UART: [kat] SHA2-384
2,222,826,396 UART: [kat] SHA2-512-ACC
2,222,829,341 UART: [kat] ECC-384
2,225,289,853 UART: [kat] HMAC-384Kdf
2,225,314,115 UART: [kat] LMS
2,225,843,545 UART: [kat] --
2,225,848,396 UART: [update-reset] ++
2,229,270,075 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,229,273,512 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,229,656,524 >>> mbox cmd response: success
2,229,657,161 UART: [update-reset] Copying MAN_2 To MAN_1
2,229,679,500 UART: [update-reset Success] --
2,229,685,256 UART: [state] Locking Datavault
2,229,688,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,229,690,160 UART: [state] Locking ICCM
2,229,691,290 UART: [exit] Launching FMC @ 0x40000130
2,229,699,705 UART:
2,229,699,957 UART: Running Caliptra FMC ...
2,229,701,067 UART:
2,229,701,236 UART: [state] CFI Enabled
2,229,803,776 UART: [art] Extend RT PCRs Done
2,229,804,964 UART: [art] Lock RT PCRs Done
2,229,806,587 UART: [art] Populate DV Done
2,229,812,056 UART: [fht] FMC Alias Private Key: 7
2,229,813,656 UART: [art] Derive CDI
2,229,814,479 UART: [art] Store in in slot 0x4
2,229,872,713 UART: [art] Derive Key Pair
2,229,873,751 UART: [art] Store priv key in slot 0x5
2,232,336,638 UART: [art] Derive Key Pair - Done
2,232,349,634 UART: [art] Signing Cert with AUTHO
2,232,350,949 UART: RITY.KEYID = 7
2,234,061,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,234,063,255 UART: [art] PUB.X = 107F3EBBDC27E4C208AF52C5EE46E8C1C3108E7283DF1FC086907647E269768A1BDFC69076BAD2C58DF92E6FF95A8DA6
2,234,070,493 UART: [art] PUB.Y = 74C84682F866CB34895F17FF85426926B56D62D0145252BF1B8CE924FDB53642F9F58DD17A1C96DA175F1CA938122569
2,234,077,761 UART: [art] SIG.R = 386BAC19596F94D2E9BA683D4C8F6543ADBFFCA47A5C145B5532FF93CCBAF08BB3641EEA3CE2FC9221C9085707049FB7
2,234,085,209 UART: [art] SIG.S = 314607FC36FD552953381ED64D20D6CFAFD057943589BC7D1C9585711587392CFEF8B1F6E0EC6CD3F8F086729CF184AF
2,235,063,959 UART: Caliptra RT
2,235,064,673 UART: [state] CFI Enabled
2,235,416,813 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 326.84s
Truncated 1329838 bytes from beginning
RT:
2,316,291,100 UART: Running Caliptra FMC ...
2,316,292,222 UART:
2,316,292,387 UART: [state] CFI Enabled
2,316,397,155 UART: [art] Extend RT PCRs Done
2,316,398,346 UART: [art] Lock RT PCRs Done
2,316,399,752 UART: [art] Populate DV Done
2,316,405,136 UART: [fht] FMC Alias Private Key: 7
2,316,406,788 UART: [art] Derive CDI
2,316,407,614 UART: [art] Store in in slot 0x4
2,316,465,640 UART: [art] Derive Key Pair
2,316,466,680 UART: [art] Store priv key in slot 0x5
2,318,929,848 UART: [art] Derive Key Pair - Done
2,318,942,591 UART: [art] Signing Cert with AUTHO
2,318,943,914 UART: RITY.KEYID = 7
2,320,655,945 UART: [art] Erasing AUTHORITY.KEYID = 7
2,320,657,458 UART: [art] PUB.X = 20E95D4D3B5878B66FDF5ED6FF0711002009CF5BD27D312AE700CA5E3E68D4A7C56D215E5879EEB6ECBF87D4D934EE35
2,320,664,700 UART: [art] PUB.Y = 4D9DC4EB2A22AE1021ACA6FFEBF2D3E100C5C67C289F8072C24CB8EC4310B0EB02CBE255C652968A07274FA9EAAC08E9
2,320,671,978 UART: [art] SIG.R = 729E43266DB3CF5F0E35C5027728BF62ADE6AA9F9326CCFA7F9E639E690558F335CDF4A827A98AB8A1667DB3B916CA47
2,320,679,372 UART: [art] SIG.S = 11E5BCFDA032E629694D319F66423A1C3FE4CD72E89FF75EDE74600CE3EECE41964EA7A0B69F156E67D727A587ABC38E
2,321,658,977 UART: Caliptra RT
2,321,659,695 UART: [state] CFI Enabled
2,321,994,133 UART: [rt] RT listening for mailbox commands...
2,321,996,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,322,140,443 UART:
2,322,140,743 UART: Running Caliptra ROM ...
2,322,141,872 UART:
2,322,142,042 UART: [state] CFI Enabled
2,322,212,929 UART: [state] LifecycleState = Unprovisioned
2,322,215,032 UART: [state] DebugLocked = No
2,322,217,128 UART: [state] WD Timer not started. Device not locked for debugging
2,322,221,054 UART: [kat] SHA2-256
2,322,410,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,322,421,703 UART: [kat] ++
2,322,422,165 UART: [kat] sha1
2,322,434,517 UART: [kat] SHA2-256
2,322,437,532 UART: [kat] SHA2-384
2,322,443,313 UART: [kat] SHA2-512-ACC
2,322,445,940 UART: [kat] ECC-384
2,324,892,508 UART: [kat] HMAC-384Kdf
2,324,917,591 UART: [kat] LMS
2,325,449,159 UART: [kat] --
2,325,453,485 UART: [update-reset] ++
2,328,917,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,328,920,547 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,329,528,256 >>> mbox cmd response: success
2,329,530,204 UART: [update-reset] Copying MAN_2 To MAN_1
2,329,567,775 UART: [update-reset Success] --
2,329,571,860 UART: [state] Locking Datavault
2,329,575,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,329,577,913 UART: [state] Locking ICCM
2,329,580,965 UART: [exit] Launching FMC @ 0x40000130
2,329,589,638 UART:
2,329,589,888 UART: Running Caliptra FMC ...
2,329,590,918 UART:
2,329,591,066 UART: [state] CFI Enabled
2,329,684,996 UART: [art] Extend RT PCRs Done
2,329,686,206 UART: [art] Lock RT PCRs Done
2,329,687,922 UART: [art] Populate DV Done
2,329,693,390 UART: [fht] FMC Alias Private Key: 7
2,329,695,068 UART: [art] Derive CDI
2,329,695,899 UART: [art] Store in in slot 0x4
2,329,754,095 UART: [art] Derive Key Pair
2,329,755,143 UART: [art] Store priv key in slot 0x5
2,332,217,990 UART: [art] Derive Key Pair - Done
2,332,231,161 UART: [art] Signing Cert with AUTHO
2,332,232,477 UART: RITY.KEYID = 7
2,333,943,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,333,944,778 UART: [art] PUB.X = 89E18F8A6701257412ABFBA64CC0420BD5998E3FD0CD41959BD1FFEA7F264DA9747F3B8E35CBAD93849A0B5367A4B9E9
2,333,952,074 UART: [art] PUB.Y = 8DF9E0CAA689F2AE67321E7B479EE29C857E378EF669C5AC3B0C8BCB2A41F0E9C887C88EA0FC8E462779A1D982A5B196
2,333,959,359 UART: [art] SIG.R = 31CD1041EDD8B1DE7AFAF06F9F90B27C8A76053C202B3B8FBD1B3B31EA841C41BD5F0B3A04475C32E0979D98334C17EF
2,333,966,747 UART: [art] SIG.S = 079DA5F1C139A84E066ADEC24A229949126B877E6E28399DAD1F65E063BE2E85B9DF6246996A2D662C28E606F3394AA7
2,334,945,764 UART: Caliptra RT
2,334,946,459 UART: [state] CFI Enabled
2,335,280,615 UART: [rt] RT listening for mailbox commands...
2,335,282,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,335,427,474 UART:
2,335,427,783 UART: Running Caliptra ROM ...
2,335,428,825 UART:
2,335,428,978 UART: [state] CFI Enabled
2,335,499,032 UART: [state] LifecycleState = Unprovisioned
2,335,501,135 UART: [state] DebugLocked = No
2,335,503,900 UART: [state] WD Timer not started. Device not locked for debugging
2,335,507,819 UART: [kat] SHA2-256
2,335,697,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,335,708,454 UART: [kat] ++
2,335,708,920 UART: [kat] sha1
2,335,720,029 UART: [kat] SHA2-256
2,335,723,001 UART: [kat] SHA2-384
2,335,728,198 UART: [kat] SHA2-512-ACC
2,335,730,771 UART: [kat] ECC-384
2,338,183,143 UART: [kat] HMAC-384Kdf
2,338,206,791 UART: [kat] LMS
2,338,738,382 UART: [kat] --
2,338,742,426 UART: [update-reset] ++
2,342,194,980 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,342,199,170 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,342,806,883 >>> mbox cmd response: success
2,342,807,510 UART: [update-reset] Copying MAN_2 To MAN_1
2,342,845,035 UART: [update-reset Success] --
2,342,850,305 UART: [state] Locking Datavault
2,342,852,352 UART: [state] Locking PCR0, PCR1 and PCR31
2,342,854,515 UART: [state] Locking ICCM
2,342,855,813 UART: [exit] Launching FMC @ 0x40000130
2,342,864,440 UART:
2,342,864,688 UART: Running Caliptra FMC ...
2,342,865,804 UART:
2,342,865,967 UART: [state] CFI Enabled
2,342,952,926 UART: [art] Extend RT PCRs Done
2,342,954,121 UART: [art] Lock RT PCRs Done
2,342,955,480 UART: [art] Populate DV Done
2,342,961,108 UART: [fht] FMC Alias Private Key: 7
2,342,962,595 UART: [art] Derive CDI
2,342,963,366 UART: [art] Store in in slot 0x4
2,343,022,142 UART: [art] Derive Key Pair
2,343,023,186 UART: [art] Store priv key in slot 0x5
2,345,486,110 UART: [art] Derive Key Pair - Done
2,345,499,014 UART: [art] Signing Cert with AUTHO
2,345,500,353 UART: RITY.KEYID = 7
2,347,211,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,347,213,141 UART: [art] PUB.X = 20E95D4D3B5878B66FDF5ED6FF0711002009CF5BD27D312AE700CA5E3E68D4A7C56D215E5879EEB6ECBF87D4D934EE35
2,347,220,383 UART: [art] PUB.Y = 4D9DC4EB2A22AE1021ACA6FFEBF2D3E100C5C67C289F8072C24CB8EC4310B0EB02CBE255C652968A07274FA9EAAC08E9
2,347,227,675 UART: [art] SIG.R = 729E43266DB3CF5F0E35C5027728BF62ADE6AA9F9326CCFA7F9E639E690558F335CDF4A827A98AB8A1667DB3B916CA47
2,347,235,059 UART: [art] SIG.S = 11E5BCFDA032E629694D319F66423A1C3FE4CD72E89FF75EDE74600CE3EECE41964EA7A0B69F156E67D727A587ABC38E
2,348,213,316 UART: Caliptra RT
2,348,214,034 UART: [state] CFI Enabled
2,348,553,545 UART: [rt] RT listening for mailbox commands...
2,348,555,450 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,348,699,895 UART:
2,348,700,204 UART: Running Caliptra ROM ...
2,348,701,337 UART:
2,348,701,504 UART: [state] CFI Enabled
2,348,765,456 UART: [state] LifecycleState = Unprovisioned
2,348,767,468 UART: [state] DebugLocked = No
2,348,768,852 UART: [state] WD Timer not started. Device not locked for debugging
2,348,773,839 UART: [kat] SHA2-256
2,348,963,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,348,974,476 UART: [kat] ++
2,348,975,017 UART: [kat] sha1
2,348,985,322 UART: [kat] SHA2-256
2,348,988,361 UART: [kat] SHA2-384
2,348,994,358 UART: [kat] SHA2-512-ACC
2,348,996,936 UART: [kat] ECC-384
2,351,451,480 UART: [kat] HMAC-384Kdf
2,351,474,129 UART: [kat] LMS
2,352,005,693 UART: [kat] --
2,352,010,013 UART: [update-reset] ++
2,355,473,132 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,355,477,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,356,084,984 >>> mbox cmd response: success
2,356,086,728 UART: [update-reset] Copying MAN_2 To MAN_1
2,356,124,307 UART: [update-reset Success] --
2,356,128,010 UART: [state] Locking Datavault
2,356,131,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,356,133,744 UART: [state] Locking ICCM
2,356,136,190 UART: [exit] Launching FMC @ 0x40000130
2,356,144,845 UART:
2,356,145,091 UART: Running Caliptra FMC ...
2,356,146,212 UART:
2,356,146,384 UART: [state] CFI Enabled
2,356,243,529 UART: [art] Extend RT PCRs Done
2,356,244,718 UART: [art] Lock RT PCRs Done
2,356,246,129 UART: [art] Populate DV Done
2,356,251,553 UART: [fht] FMC Alias Private Key: 7
2,356,253,255 UART: [art] Derive CDI
2,356,254,000 UART: [art] Store in in slot 0x4
2,356,313,055 UART: [art] Derive Key Pair
2,356,314,126 UART: [art] Store priv key in slot 0x5
2,358,776,497 UART: [art] Derive Key Pair - Done
2,358,789,396 UART: [art] Signing Cert with AUTHO
2,358,790,712 UART: RITY.KEYID = 7
2,360,502,682 UART: [art] Erasing AUTHORITY.KEYID = 7
2,360,504,204 UART: [art] PUB.X = 89E18F8A6701257412ABFBA64CC0420BD5998E3FD0CD41959BD1FFEA7F264DA9747F3B8E35CBAD93849A0B5367A4B9E9
2,360,511,493 UART: [art] PUB.Y = 8DF9E0CAA689F2AE67321E7B479EE29C857E378EF669C5AC3B0C8BCB2A41F0E9C887C88EA0FC8E462779A1D982A5B196
2,360,518,728 UART: [art] SIG.R = 31CD1041EDD8B1DE7AFAF06F9F90B27C8A76053C202B3B8FBD1B3B31EA841C41BD5F0B3A04475C32E0979D98334C17EF
2,360,526,180 UART: [art] SIG.S = 079DA5F1C139A84E066ADEC24A229949126B877E6E28399DAD1F65E063BE2E85B9DF6246996A2D662C28E606F3394AA7
2,361,505,068 UART: Caliptra RT
2,361,505,792 UART: [state] CFI Enabled
2,361,843,509 UART: [rt] RT listening for mailbox commands...
2,361,845,384 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,361,990,167 UART:
2,361,990,477 UART: Running Caliptra ROM ...
2,361,991,519 UART:
2,361,991,675 UART: [state] CFI Enabled
2,362,055,529 UART: [state] LifecycleState = Unprovisioned
2,362,057,637 UART: [state] DebugLocked = No
2,362,058,899 UART: [state] WD Timer not started. Device not locked for debugging
2,362,064,176 UART: [kat] SHA2-256
2,362,254,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,362,264,828 UART: [kat] ++
2,362,265,291 UART: [kat] sha1
2,362,275,965 UART: [kat] SHA2-256
2,362,278,984 UART: [kat] SHA2-384
2,362,284,116 UART: [kat] SHA2-512-ACC
2,362,286,700 UART: [kat] ECC-384
2,364,743,851 UART: [kat] HMAC-384Kdf
2,364,765,422 UART: [kat] LMS
2,365,297,007 UART: [kat] --
2,365,300,432 UART: [update-reset] ++
2,368,761,434 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,368,765,301 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,369,373,035 >>> mbox cmd response: success
2,369,374,953 UART: [update-reset] Copying MAN_2 To MAN_1
2,369,412,484 UART: [update-reset Success] --
2,369,417,152 UART: [state] Locking Datavault
2,369,421,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,369,424,034 UART: [state] Locking ICCM
2,369,425,529 UART: [exit] Launching FMC @ 0x40000130
2,369,434,200 UART:
2,369,434,448 UART: Running Caliptra FMC ...
2,369,435,508 UART:
2,369,435,664 UART: [state] CFI Enabled
2,369,534,645 UART: [art] Extend RT PCRs Done
2,369,535,834 UART: [art] Lock RT PCRs Done
2,369,537,216 UART: [art] Populate DV Done
2,369,542,843 UART: [fht] FMC Alias Private Key: 7
2,369,544,387 UART: [art] Derive CDI
2,369,545,212 UART: [art] Store in in slot 0x4
2,369,603,558 UART: [art] Derive Key Pair
2,369,604,599 UART: [art] Store priv key in slot 0x5
2,372,067,696 UART: [art] Derive Key Pair - Done
2,372,080,542 UART: [art] Signing Cert with AUTHO
2,372,081,862 UART: RITY.KEYID = 7
2,373,793,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,373,795,252 UART: [art] PUB.X = 20E95D4D3B5878B66FDF5ED6FF0711002009CF5BD27D312AE700CA5E3E68D4A7C56D215E5879EEB6ECBF87D4D934EE35
2,373,802,492 UART: [art] PUB.Y = 4D9DC4EB2A22AE1021ACA6FFEBF2D3E100C5C67C289F8072C24CB8EC4310B0EB02CBE255C652968A07274FA9EAAC08E9
2,373,809,771 UART: [art] SIG.R = 729E43266DB3CF5F0E35C5027728BF62ADE6AA9F9326CCFA7F9E639E690558F335CDF4A827A98AB8A1667DB3B916CA47
2,373,817,194 UART: [art] SIG.S = 11E5BCFDA032E629694D319F66423A1C3FE4CD72E89FF75EDE74600CE3EECE41964EA7A0B69F156E67D727A587ABC38E
2,374,796,039 UART: Caliptra RT
2,374,796,748 UART: [state] CFI Enabled
2,375,136,453 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 333.83s
Truncated 715203 bytes from beginning
9D74EAA1CD2D34CA529582C847E186C
2,396,054,728 UART: [art] SIG.R = 7FF9057B403478B2229133B1A6790AACB0E6C8BE41CCCF29FD1D5E72E0136246374B22DE2E9C68EF382A2FD4B44E2FF2
2,396,062,164 UART: [art] SIG.S = B40065FCCCB096ADEA9BF62DB2EAFFCB9E28E2907203164E64BAC061C36B95637B78D1431CF22C7F5339D5E5E90B128E
2,397,041,309 UART: Caliptra RT
2,397,042,024 UART: [state] CFI Enabled
2,397,375,972 UART: [rt] RT listening for mailbox commands...
2,397,377,857 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,405,199,593 >>> mbox cmd response: success
2,405,234,558 UART:
2,405,234,855 UART: Running Caliptra FMC ...
2,405,236,094 UART:
2,405,236,259 UART: [state] CFI Enabled
2,405,326,924 UART: [art] Extend RT PCRs Done
2,405,328,112 UART: [art] Lock RT PCRs Done
2,405,329,734 UART: [art] Populate DV Done
2,405,335,256 UART: [fht] FMC Alias Private Key: 7
2,405,336,908 UART: [art] Derive CDI
2,405,337,722 UART: [art] Store in in slot 0x4
2,405,395,421 UART: [art] Derive Key Pair
2,405,396,459 UART: [art] Store priv key in slot 0x5
2,407,859,962 UART: [art] Derive Key Pair - Done
2,407,872,908 UART: [art] Signing Cert with AUTHO
2,407,874,216 UART: RITY.KEYID = 7
2,409,585,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,587,443 UART: [art] PUB.X = 0EF01EAA91BD645B88F0FBB4A4D301362AD4F9A8B08B6E272707887E9B81F58FECF9AAE19AF06C5E8961974E2C762B36
2,409,594,734 UART: [art] PUB.Y = 5059FE1F38BF12DCAD94B17B442C3E845E0DA37365FE2ECFF10974DBDA25F6C207CD5E284B52B2DFF669E5D2E5F310C9
2,409,602,012 UART: [art] SIG.R = ED48062D58C440DBE21437ED010CC56DAE5C21ADEAFBB6FBFC75BC041B723D0598912F2F49A29A53BBF8700116086B07
2,409,609,403 UART: [art] SIG.S = 6A562429CBCE986EE7E231FA33B52AB58B0A139C50C3FC9316BB14148DCBB67B9A0AB35127E624E20450885241DE8F54
2,410,588,516 UART: Caliptra RT
2,410,589,204 UART: [state] CFI Enabled
2,410,928,340 UART: [rt] RT listening for mailbox commands...
2,410,930,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,418,726,550 >>> mbox cmd response: success
2,418,760,628 UART:
2,418,760,934 UART: Running Caliptra FMC ...
2,418,762,066 UART:
2,418,762,240 UART: [state] CFI Enabled
2,418,852,138 UART: [art] Extend RT PCRs Done
2,418,853,329 UART: [art] Lock RT PCRs Done
2,418,854,894 UART: [art] Populate DV Done
2,418,860,518 UART: [fht] FMC Alias Private Key: 7
2,418,862,131 UART: [art] Derive CDI
2,418,862,949 UART: [art] Store in in slot 0x4
2,418,921,069 UART: [art] Derive Key Pair
2,418,922,116 UART: [art] Store priv key in slot 0x5
2,421,385,270 UART: [art] Derive Key Pair - Done
2,421,397,894 UART: [art] Signing Cert with AUTHO
2,421,399,251 UART: RITY.KEYID = 7
2,423,110,843 UART: [art] Erasing AUTHORITY.KEYID = 7
2,423,112,345 UART: [art] PUB.X = 5935A05A3526F5AED867212A170EB1AEEB0C726EF92C196414973417CB7905F4818644350787FB30F8602C9FE3372B40
2,423,119,577 UART: [art] PUB.Y = 5D7A42F6CF36A0835547501A5C00E9D9B0C9821662D2FA81C2AA83983F8AB43809D74EAA1CD2D34CA529582C847E186C
2,423,126,836 UART: [art] SIG.R = 7FF9057B403478B2229133B1A6790AACB0E6C8BE41CCCF29FD1D5E72E0136246374B22DE2E9C68EF382A2FD4B44E2FF2
2,423,134,224 UART: [art] SIG.S = B40065FCCCB096ADEA9BF62DB2EAFFCB9E28E2907203164E64BAC061C36B95637B78D1431CF22C7F5339D5E5E90B128E
2,424,113,633 UART: Caliptra RT
2,424,114,349 UART: [state] CFI Enabled
2,424,453,013 UART: [rt] RT listening for mailbox commands...
2,424,454,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,277,389 >>> mbox cmd response: success
2,432,312,325 UART:
2,432,312,603 UART: Running Caliptra FMC ...
2,432,313,724 UART:
2,432,313,892 UART: [state] CFI Enabled
2,432,417,805 UART: [art] Extend RT PCRs Done
2,432,418,998 UART: [art] Lock RT PCRs Done
2,432,420,434 UART: [art] Populate DV Done
2,432,426,121 UART: [fht] FMC Alias Private Key: 7
2,432,427,717 UART: [art] Derive CDI
2,432,428,456 UART: [art] Store in in slot 0x4
2,432,486,687 UART: [art] Derive Key Pair
2,432,487,729 UART: [art] Store priv key in slot 0x5
2,434,950,628 UART: [art] Derive Key Pair - Done
2,434,963,514 UART: [art] Signing Cert with AUTHO
2,434,964,832 UART: RITY.KEYID = 7
2,436,676,035 UART: [art] Erasing AUTHORITY.KEYID = 7
2,436,677,545 UART: [art] PUB.X = 0EF01EAA91BD645B88F0FBB4A4D301362AD4F9A8B08B6E272707887E9B81F58FECF9AAE19AF06C5E8961974E2C762B36
2,436,684,841 UART: [art] PUB.Y = 5059FE1F38BF12DCAD94B17B442C3E845E0DA37365FE2ECFF10974DBDA25F6C207CD5E284B52B2DFF669E5D2E5F310C9
2,436,692,106 UART: [art] SIG.R = ED48062D58C440DBE21437ED010CC56DAE5C21ADEAFBB6FBFC75BC041B723D0598912F2F49A29A53BBF8700116086B07
2,436,699,477 UART: [art] SIG.S = 6A562429CBCE986EE7E231FA33B52AB58B0A139C50C3FC9316BB14148DCBB67B9A0AB35127E624E20450885241DE8F54
2,437,678,375 UART: Caliptra RT
2,437,679,075 UART: [state] CFI Enabled
2,438,012,043 UART: [rt] RT listening for mailbox commands...
2,438,013,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,445,834,352 >>> mbox cmd response: success
2,445,870,048 UART:
2,445,870,329 UART: Running Caliptra FMC ...
2,445,871,450 UART:
2,445,871,615 UART: [state] CFI Enabled
2,445,959,849 UART: [art] Extend RT PCRs Done
2,445,961,047 UART: [art] Lock RT PCRs Done
2,445,962,373 UART: [art] Populate DV Done
2,445,968,063 UART: [fht] FMC Alias Private Key: 7
2,445,969,609 UART: [art] Derive CDI
2,445,970,431 UART: [art] Store in in slot 0x4
2,446,029,054 UART: [art] Derive Key Pair
2,446,030,066 UART: [art] Store priv key in slot 0x5
2,448,492,822 UART: [art] Derive Key Pair - Done
2,448,505,986 UART: [art] Signing Cert with AUTHO
2,448,507,288 UART: RITY.KEYID = 7
2,450,217,708 UART: [art] Erasing AUTHORITY.KEYID = 7
2,450,219,226 UART: [art] PUB.X = 5935A05A3526F5AED867212A170EB1AEEB0C726EF92C196414973417CB7905F4818644350787FB30F8602C9FE3372B40
2,450,226,459 UART: [art] PUB.Y = 5D7A42F6CF36A0835547501A5C00E9D9B0C9821662D2FA81C2AA83983F8AB43809D74EAA1CD2D34CA529582C847E186C
2,450,233,674 UART: [art] SIG.R = 7FF9057B403478B2229133B1A6790AACB0E6C8BE41CCCF29FD1D5E72E0136246374B22DE2E9C68EF382A2FD4B44E2FF2
2,450,241,051 UART: [art] SIG.S = B40065FCCCB096ADEA9BF62DB2EAFFCB9E28E2907203164E64BAC061C36B95637B78D1431CF22C7F5339D5E5E90B128E
2,451,220,253 UART: Caliptra RT
2,451,220,968 UART: [state] CFI Enabled
2,451,556,847 UART: [rt] RT listening for mailbox commands...
2,451,558,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,459,375,984 >>> mbox cmd response: success
2,459,411,728 UART:
2,459,412,040 UART: Running Caliptra FMC ...
2,459,413,173 UART:
2,459,413,347 UART: [state] CFI Enabled
2,459,500,975 UART: [art] Extend RT PCRs Done
2,459,502,164 UART: [art] Lock RT PCRs Done
2,459,503,465 UART: [art] Populate DV Done
2,459,508,939 UART: [fht] FMC Alias Private Key: 7
2,459,510,587 UART: [art] Derive CDI
2,459,511,413 UART: [art] Store in in slot 0x4
2,459,569,607 UART: [art] Derive Key Pair
2,459,570,649 UART: [art] Store priv key in slot 0x5
2,462,032,965 UART: [art] Derive Key Pair - Done
2,462,045,765 UART: [art] Signing Cert with AUTHO
2,462,047,108 UART: RITY.KEYID = 7
2,463,758,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,463,759,788 UART: [art] PUB.X = 0EF01EAA91BD645B88F0FBB4A4D301362AD4F9A8B08B6E272707887E9B81F58FECF9AAE19AF06C5E8961974E2C762B36
2,463,767,119 UART: [art] PUB.Y = 5059FE1F38BF12DCAD94B17B442C3E845E0DA37365FE2ECFF10974DBDA25F6C207CD5E284B52B2DFF669E5D2E5F310C9
2,463,774,378 UART: [art] SIG.R = ED48062D58C440DBE21437ED010CC56DAE5C21ADEAFBB6FBFC75BC041B723D0598912F2F49A29A53BBF8700116086B07
2,463,781,799 UART: [art] SIG.S = 6A562429CBCE986EE7E231FA33B52AB58B0A139C50C3FC9316BB14148DCBB67B9A0AB35127E624E20450885241DE8F54
2,464,760,530 UART: Caliptra RT
2,464,761,237 UART: [state] CFI Enabled
2,465,101,708 UART: [rt] RT listening for mailbox commands...
2,465,103,596 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,472,909,756 >>> mbox cmd response: success
2,472,944,136 UART:
2,472,944,442 UART: Running Caliptra FMC ...
2,472,945,488 UART:
2,472,945,642 UART: [state] CFI Enabled
2,473,044,593 UART: [art] Extend RT PCRs Done
2,473,045,789 UART: [art] Lock RT PCRs Done
2,473,047,175 UART: [art] Populate DV Done
2,473,052,720 UART: [fht] FMC Alias Private Key: 7
2,473,054,218 UART: [art] Derive CDI
2,473,054,966 UART: [art] Store in in slot 0x4
2,473,113,695 UART: [art] Derive Key Pair
2,473,114,743 UART: [art] Store priv key in slot 0x5
2,475,577,470 UART: [art] Derive Key Pair - Done
2,475,590,364 UART: [art] Signing Cert with AUTHO
2,475,591,676 UART: RITY.KEYID = 7
2,477,303,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,477,304,959 UART: [art] PUB.X = 5935A05A3526F5AED867212A170EB1AEEB0C726EF92C196414973417CB7905F4818644350787FB30F8602C9FE3372B40
2,477,312,186 UART: [art] PUB.Y = 5D7A42F6CF36A0835547501A5C00E9D9B0C9821662D2FA81C2AA83983F8AB43809D74EAA1CD2D34CA529582C847E186C
2,477,319,432 UART: [art] SIG.R = 7FF9057B403478B2229133B1A6790AACB0E6C8BE41CCCF29FD1D5E72E0136246374B22DE2E9C68EF382A2FD4B44E2FF2
2,477,326,834 UART: [art] SIG.S = B40065FCCCB096ADEA9BF62DB2EAFFCB9E28E2907203164E64BAC061C36B95637B78D1431CF22C7F5339D5E5E90B128E
2,478,305,674 UART: Caliptra RT
2,478,306,384 UART: [state] CFI Enabled
2,478,642,810 UART: [rt] RT listening for mailbox commands...
2,478,644,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,486,457,733 >>> mbox cmd response: success
2,486,493,200 UART:
2,486,493,479 UART: Running Caliptra FMC ...
2,486,494,518 UART:
2,486,494,670 UART: [state] CFI Enabled
2,486,589,446 UART: [art] Extend RT PCRs Done
2,486,590,636 UART: [art] Lock RT PCRs Done
2,486,592,044 UART: [art] Populate DV Done
2,486,597,457 UART: [fht] FMC Alias Private Key: 7
2,486,599,087 UART: [art] Derive CDI
2,486,599,924 UART: [art] Store in in slot 0x4
2,486,658,970 UART: [art] Derive Key Pair
2,486,659,999 UART: [art] Store priv key in slot 0x5
2,489,123,009 UART: [art] Derive Key Pair - Done
2,489,136,015 UART: [art] Signing Cert with AUTHO
2,489,137,332 UART: RITY.KEYID = 7
2,490,848,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,849,569 UART: [art] PUB.X = 0EF01EAA91BD645B88F0FBB4A4D301362AD4F9A8B08B6E272707887E9B81F58FECF9AAE19AF06C5E8961974E2C762B36
2,490,856,845 UART: [art] PUB.Y = 5059FE1F38BF12DCAD94B17B442C3E845E0DA37365FE2ECFF10974DBDA25F6C207CD5E284B52B2DFF669E5D2E5F310C9
2,490,864,168 UART: [art] SIG.R = ED48062D58C440DBE21437ED010CC56DAE5C21ADEAFBB6FBFC75BC041B723D0598912F2F49A29A53BBF8700116086B07
2,490,871,549 UART: [art] SIG.S = 6A562429CBCE986EE7E231FA33B52AB58B0A139C50C3FC9316BB14148DCBB67B9A0AB35127E624E20450885241DE8F54
2,491,850,471 UART: Caliptra RT
2,491,851,170 UART: [state] CFI Enabled
2,492,185,284 UART: [rt] RT listening for mailbox commands...
2,492,187,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,500,015,273 >>> mbox cmd response: success
2,500,050,130 UART:
2,500,050,442 UART: Running Caliptra FMC ...
2,500,051,511 UART:
2,500,051,668 UART: [state] CFI Enabled
2,500,152,941 UART: [art] Extend RT PCRs Done
2,500,154,136 UART: [art] Lock RT PCRs Done
2,500,155,630 UART: [art] Populate DV Done
2,500,161,163 UART: [fht] FMC Alias Private Key: 7
2,500,162,766 UART: [art] Derive CDI
2,500,163,514 UART: [art] Store in in slot 0x4
2,500,222,172 UART: [art] Derive Key Pair
2,500,223,217 UART: [art] Store priv key in slot 0x5
2,502,685,911 UART: [art] Derive Key Pair - Done
2,502,699,073 UART: [art] Signing Cert with AUTHO
2,502,700,389 UART: RITY.KEYID = 7
2,504,411,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,504,412,507 UART: [art] PUB.X = 5935A05A3526F5AED867212A170EB1AEEB0C726EF92C196414973417CB7905F4818644350787FB30F8602C9FE3372B40
2,504,419,796 UART: [art] PUB.Y = 5D7A42F6CF36A0835547501A5C00E9D9B0C9821662D2FA81C2AA83983F8AB43809D74EAA1CD2D34CA529582C847E186C
2,504,427,013 UART: [art] SIG.R = 7FF9057B403478B2229133B1A6790AACB0E6C8BE41CCCF29FD1D5E72E0136246374B22DE2E9C68EF382A2FD4B44E2FF2
2,504,434,388 UART: [art] SIG.S = B40065FCCCB096ADEA9BF62DB2EAFFCB9E28E2907203164E64BAC061C36B95637B78D1431CF22C7F5339D5E5E90B128E
2,505,413,118 UART: Caliptra RT
2,505,413,839 UART: [state] CFI Enabled
2,505,747,414 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 340.36s
Truncated 1329928 bytes from beginning
RT:
2,358,767,121 UART: Running Caliptra FMC ...
2,358,768,221 UART:
2,358,768,376 UART: [state] CFI Enabled
2,358,812,278 UART: [art] Extend RT PCRs Done
2,358,813,423 UART: [art] Lock RT PCRs Done
2,358,814,888 UART: [art] Populate DV Done
2,358,820,242 UART: [fht] FMC Alias Private Key: 7
2,358,821,776 UART: [art] Derive CDI
2,358,822,591 UART: [art] Store in in slot 0x4
2,358,865,070 UART: [art] Derive Key Pair
2,358,866,115 UART: [art] Store priv key in slot 0x5
2,361,292,521 UART: [art] Derive Key Pair - Done
2,361,305,247 UART: [art] Signing Cert with AUTHO
2,361,306,546 UART: RITY.KEYID = 7
2,363,012,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,013,673 UART: [art] PUB.X = 176893C465E5A470E10FB2CB486A7D0719D2843415187003123B68E7235D796D26A089534B69BD9B7D8197AE8223D75A
2,363,020,882 UART: [art] PUB.Y = 6F48174F30E9B0D090231CE142E4BCC498A9F98763267DC6467A5EE5155725976A465FFFEF4308CB4BECF111FB392319
2,363,028,120 UART: [art] SIG.R = 0C8C2580E311DB9323C4FA586FF1EA6CEEF80BB629DA50D3CD59565018A51FFA0BD35CB8845407E80E9E92E598CBF370
2,363,035,527 UART: [art] SIG.S = 567F478C172F01E64E443835882B92A90FFB52A0586FDB24B2AAA228556679041E328E913B6AC8E66F3CC12DA22BE1DF
2,364,014,265 UART: Caliptra RT
2,364,014,960 UART: [state] CFI Enabled
2,364,301,456 UART: [rt] RT listening for mailbox commands...
2,364,303,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,364,447,649 UART:
2,364,447,951 UART: Running Caliptra ROM ...
2,364,448,986 UART:
2,364,449,246 UART: [state] CFI Enabled
2,365,431,122 UART: [state] LifecycleState = Unprovisioned
2,365,433,092 UART: [state] DebugLocked = No
2,365,434,949 UART: [state] WD Timer not started. Device not locked for debugging
2,365,439,771 UART: [kat] SHA2-256
2,365,629,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,640,389 UART: [kat] ++
2,365,640,913 UART: [kat] sha1
2,365,652,556 UART: [kat] SHA2-256
2,365,655,523 UART: [kat] SHA2-384
2,365,661,238 UART: [kat] SHA2-512-ACC
2,365,663,821 UART: [kat] ECC-384
2,368,106,286 UART: [kat] HMAC-384Kdf
2,368,118,844 UART: [kat] LMS
2,368,650,453 UART: [kat] --
2,368,654,609 UART: [update-reset] ++
2,372,123,495 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,126,706 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,372,734,419 >>> mbox cmd response: success
2,372,735,789 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,773,348 UART: [update-reset Success] --
2,372,777,732 UART: [state] Locking Datavault
2,372,781,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,784,161 UART: [state] Locking ICCM
2,372,787,016 UART: [exit] Launching FMC @ 0x40000130
2,372,795,689 UART:
2,372,795,924 UART: Running Caliptra FMC ...
2,372,797,044 UART:
2,372,797,211 UART: [state] CFI Enabled
2,372,841,710 UART: [art] Extend RT PCRs Done
2,372,842,897 UART: [art] Lock RT PCRs Done
2,372,844,350 UART: [art] Populate DV Done
2,372,849,759 UART: [fht] FMC Alias Private Key: 7
2,372,851,346 UART: [art] Derive CDI
2,372,852,163 UART: [art] Store in in slot 0x4
2,372,894,704 UART: [art] Derive Key Pair
2,372,895,707 UART: [art] Store priv key in slot 0x5
2,375,322,815 UART: [art] Derive Key Pair - Done
2,375,336,043 UART: [art] Signing Cert with AUTHO
2,375,337,354 UART: RITY.KEYID = 7
2,377,042,703 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,044,191 UART: [art] PUB.X = E8D4F23EAB5A730D533152ADDA2797DF0C4C5FD131B8D91FE520E088BF292678701C8BA8B48FD95556D1C10C21AF9713
2,377,051,495 UART: [art] PUB.Y = B3E37EC4BB3802D034B8E44468C66CC99EC2F1407BD062F6A85D16F40D04E4BEB1494707E4EA24705C0470B7DDB707FE
2,377,058,753 UART: [art] SIG.R = 9EBCA45ACB343EABEEF33645F9B2252FF9CC85B03BDDAFFF7B09D08B56C8135D56D1F1230BD3BB62E3A9928493F353E3
2,377,066,153 UART: [art] SIG.S = 15DA560946572B9A0AA485B847DE9D67B20604638EC9CF86C34D637205AD50BD1CEC6F5DBD4724AA106BED91F6131E68
2,378,045,184 UART: Caliptra RT
2,378,045,908 UART: [state] CFI Enabled
2,378,335,853 UART: [rt] RT listening for mailbox commands...
2,378,337,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,378,482,067 UART:
2,378,482,374 UART: Running Caliptra ROM ...
2,378,483,446 UART:
2,378,483,706 UART: [state] CFI Enabled
2,378,495,649 UART: [state] LifecycleState = Unprovisioned
2,378,497,477 UART: [state] DebugLocked = No
2,378,498,964 UART: [state] WD Timer not started. Device not locked for debugging
2,378,503,240 UART: [kat] SHA2-256
2,378,693,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,703,898 UART: [kat] ++
2,378,704,513 UART: [kat] sha1
2,378,717,301 UART: [kat] SHA2-256
2,378,720,269 UART: [kat] SHA2-384
2,378,727,770 UART: [kat] SHA2-512-ACC
2,378,730,388 UART: [kat] ECC-384
2,381,171,634 UART: [kat] HMAC-384Kdf
2,381,184,784 UART: [kat] LMS
2,381,716,392 UART: [kat] --
2,381,721,650 UART: [update-reset] ++
2,385,180,992 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,184,317 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,385,792,034 >>> mbox cmd response: success
2,385,792,804 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,830,345 UART: [update-reset Success] --
2,385,834,749 UART: [state] Locking Datavault
2,385,837,520 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,839,671 UART: [state] Locking ICCM
2,385,842,688 UART: [exit] Launching FMC @ 0x40000130
2,385,851,354 UART:
2,385,851,597 UART: Running Caliptra FMC ...
2,385,852,700 UART:
2,385,852,859 UART: [state] CFI Enabled
2,385,897,031 UART: [art] Extend RT PCRs Done
2,385,898,223 UART: [art] Lock RT PCRs Done
2,385,899,518 UART: [art] Populate DV Done
2,385,905,035 UART: [fht] FMC Alias Private Key: 7
2,385,906,790 UART: [art] Derive CDI
2,385,907,601 UART: [art] Store in in slot 0x4
2,385,949,978 UART: [art] Derive Key Pair
2,385,950,977 UART: [art] Store priv key in slot 0x5
2,388,377,878 UART: [art] Derive Key Pair - Done
2,388,390,722 UART: [art] Signing Cert with AUTHO
2,388,392,050 UART: RITY.KEYID = 7
2,390,097,569 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,099,077 UART: [art] PUB.X = 176893C465E5A470E10FB2CB486A7D0719D2843415187003123B68E7235D796D26A089534B69BD9B7D8197AE8223D75A
2,390,106,351 UART: [art] PUB.Y = 6F48174F30E9B0D090231CE142E4BCC498A9F98763267DC6467A5EE5155725976A465FFFEF4308CB4BECF111FB392319
2,390,113,559 UART: [art] SIG.R = 0C8C2580E311DB9323C4FA586FF1EA6CEEF80BB629DA50D3CD59565018A51FFA0BD35CB8845407E80E9E92E598CBF370
2,390,120,968 UART: [art] SIG.S = 567F478C172F01E64E443835882B92A90FFB52A0586FDB24B2AAA228556679041E328E913B6AC8E66F3CC12DA22BE1DF
2,391,099,523 UART: Caliptra RT
2,391,100,218 UART: [state] CFI Enabled
2,391,389,183 UART: [rt] RT listening for mailbox commands...
2,391,391,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,391,536,001 UART:
2,391,536,307 UART: Running Caliptra ROM ...
2,391,537,425 UART:
2,391,537,590 UART: [state] CFI Enabled
2,391,551,053 UART: [state] LifecycleState = Unprovisioned
2,391,553,106 UART: [state] DebugLocked = No
2,391,555,817 UART: [state] WD Timer not started. Device not locked for debugging
2,391,560,320 UART: [kat] SHA2-256
2,391,750,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,391,760,972 UART: [kat] ++
2,391,761,491 UART: [kat] sha1
2,391,772,973 UART: [kat] SHA2-256
2,391,775,983 UART: [kat] SHA2-384
2,391,782,783 UART: [kat] SHA2-512-ACC
2,391,785,353 UART: [kat] ECC-384
2,394,228,280 UART: [kat] HMAC-384Kdf
2,394,242,131 UART: [kat] LMS
2,394,773,742 UART: [kat] --
2,394,775,580 UART: [update-reset] ++
2,398,234,842 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,238,923 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,398,846,621 >>> mbox cmd response: success
2,398,847,078 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,884,648 UART: [update-reset Success] --
2,398,888,668 UART: [state] Locking Datavault
2,398,892,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,894,922 UART: [state] Locking ICCM
2,398,896,586 UART: [exit] Launching FMC @ 0x40000130
2,398,905,205 UART:
2,398,905,440 UART: Running Caliptra FMC ...
2,398,906,540 UART:
2,398,906,701 UART: [state] CFI Enabled
2,398,951,199 UART: [art] Extend RT PCRs Done
2,398,952,377 UART: [art] Lock RT PCRs Done
2,398,953,784 UART: [art] Populate DV Done
2,398,959,574 UART: [fht] FMC Alias Private Key: 7
2,398,961,054 UART: [art] Derive CDI
2,398,961,825 UART: [art] Store in in slot 0x4
2,399,004,653 UART: [art] Derive Key Pair
2,399,005,694 UART: [art] Store priv key in slot 0x5
2,401,432,670 UART: [art] Derive Key Pair - Done
2,401,445,827 UART: [art] Signing Cert with AUTHO
2,401,447,126 UART: RITY.KEYID = 7
2,403,152,878 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,154,389 UART: [art] PUB.X = E8D4F23EAB5A730D533152ADDA2797DF0C4C5FD131B8D91FE520E088BF292678701C8BA8B48FD95556D1C10C21AF9713
2,403,161,702 UART: [art] PUB.Y = B3E37EC4BB3802D034B8E44468C66CC99EC2F1407BD062F6A85D16F40D04E4BEB1494707E4EA24705C0470B7DDB707FE
2,403,168,907 UART: [art] SIG.R = 9EBCA45ACB343EABEEF33645F9B2252FF9CC85B03BDDAFFF7B09D08B56C8135D56D1F1230BD3BB62E3A9928493F353E3
2,403,176,300 UART: [art] SIG.S = 15DA560946572B9A0AA485B847DE9D67B20604638EC9CF86C34D637205AD50BD1CEC6F5DBD4724AA106BED91F6131E68
2,404,154,883 UART: Caliptra RT
2,404,155,576 UART: [state] CFI Enabled
2,404,445,352 UART: [rt] RT listening for mailbox commands...
2,404,447,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,404,591,795 UART:
2,404,592,096 UART: Running Caliptra ROM ...
2,404,593,528 UART:
2,404,593,706 UART: [state] CFI Enabled
2,405,546,816 UART: [state] LifecycleState = Unprovisioned
2,405,548,705 UART: [state] DebugLocked = No
2,405,550,099 UART: [state] WD Timer not started. Device not locked for debugging
2,405,553,776 UART: [kat] SHA2-256
2,405,743,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,405,754,387 UART: [kat] ++
2,405,754,908 UART: [kat] sha1
2,405,765,418 UART: [kat] SHA2-256
2,405,768,374 UART: [kat] SHA2-384
2,405,774,154 UART: [kat] SHA2-512-ACC
2,405,776,713 UART: [kat] ECC-384
2,408,219,329 UART: [kat] HMAC-384Kdf
2,408,231,568 UART: [kat] LMS
2,408,763,178 UART: [kat] --
2,408,766,938 UART: [update-reset] ++
2,412,228,370 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,232,238 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
2,412,839,990 >>> mbox cmd response: success
2,412,842,009 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,879,583 UART: [update-reset Success] --
2,412,884,847 UART: [state] Locking Datavault
2,412,888,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,890,507 UART: [state] Locking ICCM
2,412,892,010 UART: [exit] Launching FMC @ 0x40000130
2,412,900,633 UART:
2,412,900,874 UART: Running Caliptra FMC ...
2,412,901,904 UART:
2,412,902,055 UART: [state] CFI Enabled
2,412,945,862 UART: [art] Extend RT PCRs Done
2,412,947,053 UART: [art] Lock RT PCRs Done
2,412,948,611 UART: [art] Populate DV Done
2,412,953,859 UART: [fht] FMC Alias Private Key: 7
2,412,955,610 UART: [art] Derive CDI
2,412,956,348 UART: [art] Store in in slot 0x4
2,412,999,211 UART: [art] Derive Key Pair
2,413,000,248 UART: [art] Store priv key in slot 0x5
2,415,427,101 UART: [art] Derive Key Pair - Done
2,415,440,101 UART: [art] Signing Cert with AUTHO
2,415,441,407 UART: RITY.KEYID = 7
2,417,146,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,148,237 UART: [art] PUB.X = 176893C465E5A470E10FB2CB486A7D0719D2843415187003123B68E7235D796D26A089534B69BD9B7D8197AE8223D75A
2,417,155,502 UART: [art] PUB.Y = 6F48174F30E9B0D090231CE142E4BCC498A9F98763267DC6467A5EE5155725976A465FFFEF4308CB4BECF111FB392319
2,417,162,698 UART: [art] SIG.R = 0C8C2580E311DB9323C4FA586FF1EA6CEEF80BB629DA50D3CD59565018A51FFA0BD35CB8845407E80E9E92E598CBF370
2,417,170,149 UART: [art] SIG.S = 567F478C172F01E64E443835882B92A90FFB52A0586FDB24B2AAA228556679041E328E913B6AC8E66F3CC12DA22BE1DF
2,418,148,782 UART: Caliptra RT
2,418,149,475 UART: [state] CFI Enabled
2,418,438,766 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 335.99s
Truncated 715099 bytes from beginning
FBFC93267E8B16645F8BE9EBEA62E19
2,310,768,919 UART: [art] SIG.R = 56321FE80377272923B56271D6B651547D044C8E60ABC59442C6B2602D5831B1E184296AC2DA11C36E5E3C90AB19722A
2,310,776,287 UART: [art] SIG.S = 902128B1F321D443AF7756730423E043883D2C979606A0BB98A054BBB79787E19150F243E572F1CDAA1CB5398437BCCF
2,311,755,261 UART: Caliptra RT
2,311,755,993 UART: [state] CFI Enabled
2,312,045,718 UART: [rt] RT listening for mailbox commands...
2,312,047,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,319,778,983 >>> mbox cmd response: success
2,319,812,293 UART:
2,319,812,594 UART: Running Caliptra FMC ...
2,319,813,720 UART:
2,319,813,880 UART: [state] CFI Enabled
2,319,857,735 UART: [art] Extend RT PCRs Done
2,319,858,882 UART: [art] Lock RT PCRs Done
2,319,860,332 UART: [art] Populate DV Done
2,319,865,793 UART: [fht] FMC Alias Private Key: 7
2,319,867,379 UART: [art] Derive CDI
2,319,868,194 UART: [art] Store in in slot 0x4
2,319,910,733 UART: [art] Derive Key Pair
2,319,911,786 UART: [art] Store priv key in slot 0x5
2,322,338,416 UART: [art] Derive Key Pair - Done
2,322,351,686 UART: [art] Signing Cert with AUTHO
2,322,352,992 UART: RITY.KEYID = 7
2,324,058,462 UART: [art] Erasing AUTHORITY.KEYID = 7
2,324,059,968 UART: [art] PUB.X = 20F46B47B3327E4AAB6538CCA7BB48B8240D52251C0FA96EB08937BDC403B0E81F608EF47EE2ECA5E17E91ECDEA4088D
2,324,067,271 UART: [art] PUB.Y = 4EEC2AD39DDF1FFFCBFCA21F5882CDC77BD61451220A253D98D1DAABC1A1912E38AE8EF6C1CA212F7B001FEDDF231A2C
2,324,074,555 UART: [art] SIG.R = 1189DD0125939B048ED5B9174B2F27DF5DFBC5AC8F56E81B8B27815CEE0292982E822E89C6B6D576A4EC02F83782A297
2,324,081,926 UART: [art] SIG.S = 99060F32153C807749AAB7DF7F8F85231E41986EFE1726C89D07E1890ED36432A9E8A950ECBB9F1CFA90F9E7B3EC4AEA
2,325,061,372 UART: Caliptra RT
2,325,062,092 UART: [state] CFI Enabled
2,325,353,028 UART: [rt] RT listening for mailbox commands...
2,325,354,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,333,289,965 >>> mbox cmd response: success
2,333,327,099 UART:
2,333,327,409 UART: Running Caliptra FMC ...
2,333,328,446 UART:
2,333,328,614 UART: [state] CFI Enabled
2,333,372,102 UART: [art] Extend RT PCRs Done
2,333,373,252 UART: [art] Lock RT PCRs Done
2,333,374,462 UART: [art] Populate DV Done
2,333,380,083 UART: [fht] FMC Alias Private Key: 7
2,333,381,620 UART: [art] Derive CDI
2,333,382,356 UART: [art] Store in in slot 0x4
2,333,425,061 UART: [art] Derive Key Pair
2,333,426,108 UART: [art] Store priv key in slot 0x5
2,335,853,068 UART: [art] Derive Key Pair - Done
2,335,866,014 UART: [art] Signing Cert with AUTHO
2,335,867,324 UART: RITY.KEYID = 7
2,337,572,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,337,574,316 UART: [art] PUB.X = BD06CACC92DF71519DC4131A7178307B385215201B491F973F2450705CDB53DE5B6A734028988E3FFB4AC39B4D7CA7EA
2,337,581,598 UART: [art] PUB.Y = BD0616902F57DCBD82B0684E149A2EB8A95A4592688EEB707B620A1896FFCE0C9FBFC93267E8B16645F8BE9EBEA62E19
2,337,588,860 UART: [art] SIG.R = 56321FE80377272923B56271D6B651547D044C8E60ABC59442C6B2602D5831B1E184296AC2DA11C36E5E3C90AB19722A
2,337,596,255 UART: [art] SIG.S = 902128B1F321D443AF7756730423E043883D2C979606A0BB98A054BBB79787E19150F243E572F1CDAA1CB5398437BCCF
2,338,575,169 UART: Caliptra RT
2,338,575,860 UART: [state] CFI Enabled
2,338,866,991 UART: [rt] RT listening for mailbox commands...
2,338,868,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,346,598,619 >>> mbox cmd response: success
2,346,631,436 UART:
2,346,631,708 UART: Running Caliptra FMC ...
2,346,632,823 UART:
2,346,632,981 UART: [state] CFI Enabled
2,346,677,111 UART: [art] Extend RT PCRs Done
2,346,678,307 UART: [art] Lock RT PCRs Done
2,346,679,761 UART: [art] Populate DV Done
2,346,685,128 UART: [fht] FMC Alias Private Key: 7
2,346,686,774 UART: [art] Derive CDI
2,346,687,589 UART: [art] Store in in slot 0x4
2,346,730,311 UART: [art] Derive Key Pair
2,346,731,317 UART: [art] Store priv key in slot 0x5
2,349,158,816 UART: [art] Derive Key Pair - Done
2,349,171,385 UART: [art] Signing Cert with AUTHO
2,349,172,688 UART: RITY.KEYID = 7
2,350,877,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,350,879,141 UART: [art] PUB.X = 20F46B47B3327E4AAB6538CCA7BB48B8240D52251C0FA96EB08937BDC403B0E81F608EF47EE2ECA5E17E91ECDEA4088D
2,350,886,470 UART: [art] PUB.Y = 4EEC2AD39DDF1FFFCBFCA21F5882CDC77BD61451220A253D98D1DAABC1A1912E38AE8EF6C1CA212F7B001FEDDF231A2C
2,350,893,787 UART: [art] SIG.R = 1189DD0125939B048ED5B9174B2F27DF5DFBC5AC8F56E81B8B27815CEE0292982E822E89C6B6D576A4EC02F83782A297
2,350,901,169 UART: [art] SIG.S = 99060F32153C807749AAB7DF7F8F85231E41986EFE1726C89D07E1890ED36432A9E8A950ECBB9F1CFA90F9E7B3EC4AEA
2,351,880,254 UART: Caliptra RT
2,351,880,968 UART: [state] CFI Enabled
2,352,168,923 UART: [rt] RT listening for mailbox commands...
2,352,170,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,359,902,751 >>> mbox cmd response: success
2,359,939,405 UART:
2,359,939,700 UART: Running Caliptra FMC ...
2,359,940,819 UART:
2,359,940,988 UART: [state] CFI Enabled
2,359,984,911 UART: [art] Extend RT PCRs Done
2,359,986,106 UART: [art] Lock RT PCRs Done
2,359,987,432 UART: [art] Populate DV Done
2,359,993,167 UART: [fht] FMC Alias Private Key: 7
2,359,994,814 UART: [art] Derive CDI
2,359,995,633 UART: [art] Store in in slot 0x4
2,360,037,856 UART: [art] Derive Key Pair
2,360,038,901 UART: [art] Store priv key in slot 0x5
2,362,465,384 UART: [art] Derive Key Pair - Done
2,362,478,282 UART: [art] Signing Cert with AUTHO
2,362,479,610 UART: RITY.KEYID = 7
2,364,185,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,364,186,824 UART: [art] PUB.X = BD06CACC92DF71519DC4131A7178307B385215201B491F973F2450705CDB53DE5B6A734028988E3FFB4AC39B4D7CA7EA
2,364,194,031 UART: [art] PUB.Y = BD0616902F57DCBD82B0684E149A2EB8A95A4592688EEB707B620A1896FFCE0C9FBFC93267E8B16645F8BE9EBEA62E19
2,364,201,344 UART: [art] SIG.R = 56321FE80377272923B56271D6B651547D044C8E60ABC59442C6B2602D5831B1E184296AC2DA11C36E5E3C90AB19722A
2,364,208,718 UART: [art] SIG.S = 902128B1F321D443AF7756730423E043883D2C979606A0BB98A054BBB79787E19150F243E572F1CDAA1CB5398437BCCF
2,365,187,529 UART: Caliptra RT
2,365,188,235 UART: [state] CFI Enabled
2,365,478,186 UART: [rt] RT listening for mailbox commands...
2,365,480,091 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,373,401,769 >>> mbox cmd response: success
2,373,436,641 UART:
2,373,436,911 UART: Running Caliptra FMC ...
2,373,438,029 UART:
2,373,438,198 UART: [state] CFI Enabled
2,373,481,852 UART: [art] Extend RT PCRs Done
2,373,483,039 UART: [art] Lock RT PCRs Done
2,373,484,612 UART: [art] Populate DV Done
2,373,490,072 UART: [fht] FMC Alias Private Key: 7
2,373,491,577 UART: [art] Derive CDI
2,373,492,342 UART: [art] Store in in slot 0x4
2,373,535,048 UART: [art] Derive Key Pair
2,373,536,043 UART: [art] Store priv key in slot 0x5
2,375,962,784 UART: [art] Derive Key Pair - Done
2,375,975,780 UART: [art] Signing Cert with AUTHO
2,375,977,085 UART: RITY.KEYID = 7
2,377,682,103 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,683,614 UART: [art] PUB.X = 20F46B47B3327E4AAB6538CCA7BB48B8240D52251C0FA96EB08937BDC403B0E81F608EF47EE2ECA5E17E91ECDEA4088D
2,377,690,885 UART: [art] PUB.Y = 4EEC2AD39DDF1FFFCBFCA21F5882CDC77BD61451220A253D98D1DAABC1A1912E38AE8EF6C1CA212F7B001FEDDF231A2C
2,377,698,208 UART: [art] SIG.R = 1189DD0125939B048ED5B9174B2F27DF5DFBC5AC8F56E81B8B27815CEE0292982E822E89C6B6D576A4EC02F83782A297
2,377,705,574 UART: [art] SIG.S = 99060F32153C807749AAB7DF7F8F85231E41986EFE1726C89D07E1890ED36432A9E8A950ECBB9F1CFA90F9E7B3EC4AEA
2,378,684,797 UART: Caliptra RT
2,378,685,511 UART: [state] CFI Enabled
2,378,972,374 UART: [rt] RT listening for mailbox commands...
2,378,974,249 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,386,695,721 >>> mbox cmd response: success
2,386,731,187 UART:
2,386,731,464 UART: Running Caliptra FMC ...
2,386,732,525 UART:
2,386,732,677 UART: [state] CFI Enabled
2,386,776,482 UART: [art] Extend RT PCRs Done
2,386,777,676 UART: [art] Lock RT PCRs Done
2,386,779,300 UART: [art] Populate DV Done
2,386,784,528 UART: [fht] FMC Alias Private Key: 7
2,386,786,178 UART: [art] Derive CDI
2,386,786,995 UART: [art] Store in in slot 0x4
2,386,829,915 UART: [art] Derive Key Pair
2,386,830,919 UART: [art] Store priv key in slot 0x5
2,389,257,587 UART: [art] Derive Key Pair - Done
2,389,270,423 UART: [art] Signing Cert with AUTHO
2,389,271,729 UART: RITY.KEYID = 7
2,390,977,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,978,553 UART: [art] PUB.X = BD06CACC92DF71519DC4131A7178307B385215201B491F973F2450705CDB53DE5B6A734028988E3FFB4AC39B4D7CA7EA
2,390,985,772 UART: [art] PUB.Y = BD0616902F57DCBD82B0684E149A2EB8A95A4592688EEB707B620A1896FFCE0C9FBFC93267E8B16645F8BE9EBEA62E19
2,390,993,094 UART: [art] SIG.R = 56321FE80377272923B56271D6B651547D044C8E60ABC59442C6B2602D5831B1E184296AC2DA11C36E5E3C90AB19722A
2,391,000,467 UART: [art] SIG.S = 902128B1F321D443AF7756730423E043883D2C979606A0BB98A054BBB79787E19150F243E572F1CDAA1CB5398437BCCF
2,391,979,497 UART: Caliptra RT
2,391,980,193 UART: [state] CFI Enabled
2,392,272,184 UART: [rt] RT listening for mailbox commands...
2,392,274,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,399,998,462 >>> mbox cmd response: success
2,400,032,849 UART:
2,400,033,126 UART: Running Caliptra FMC ...
2,400,034,245 UART:
2,400,034,409 UART: [state] CFI Enabled
2,400,078,653 UART: [art] Extend RT PCRs Done
2,400,079,849 UART: [art] Lock RT PCRs Done
2,400,081,489 UART: [art] Populate DV Done
2,400,086,745 UART: [fht] FMC Alias Private Key: 7
2,400,088,286 UART: [art] Derive CDI
2,400,089,104 UART: [art] Store in in slot 0x4
2,400,131,483 UART: [art] Derive Key Pair
2,400,132,521 UART: [art] Store priv key in slot 0x5
2,402,559,442 UART: [art] Derive Key Pair - Done
2,402,572,439 UART: [art] Signing Cert with AUTHO
2,402,573,747 UART: RITY.KEYID = 7
2,404,279,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,404,280,846 UART: [art] PUB.X = 20F46B47B3327E4AAB6538CCA7BB48B8240D52251C0FA96EB08937BDC403B0E81F608EF47EE2ECA5E17E91ECDEA4088D
2,404,288,141 UART: [art] PUB.Y = 4EEC2AD39DDF1FFFCBFCA21F5882CDC77BD61451220A253D98D1DAABC1A1912E38AE8EF6C1CA212F7B001FEDDF231A2C
2,404,295,467 UART: [art] SIG.R = 1189DD0125939B048ED5B9174B2F27DF5DFBC5AC8F56E81B8B27815CEE0292982E822E89C6B6D576A4EC02F83782A297
2,404,302,836 UART: [art] SIG.S = 99060F32153C807749AAB7DF7F8F85231E41986EFE1726C89D07E1890ED36432A9E8A950ECBB9F1CFA90F9E7B3EC4AEA
2,405,281,782 UART: Caliptra RT
2,405,282,490 UART: [state] CFI Enabled
2,405,575,083 UART: [rt] RT listening for mailbox commands...
2,405,576,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,413,530,642 >>> mbox cmd response: success
2,413,565,825 UART:
2,413,566,121 UART: Running Caliptra FMC ...
2,413,567,243 UART:
2,413,567,411 UART: [state] CFI Enabled
2,413,611,861 UART: [art] Extend RT PCRs Done
2,413,613,012 UART: [art] Lock RT PCRs Done
2,413,614,438 UART: [art] Populate DV Done
2,413,619,843 UART: [fht] FMC Alias Private Key: 7
2,413,621,486 UART: [art] Derive CDI
2,413,622,300 UART: [art] Store in in slot 0x4
2,413,664,919 UART: [art] Derive Key Pair
2,413,665,991 UART: [art] Store priv key in slot 0x5
2,416,091,994 UART: [art] Derive Key Pair - Done
2,416,104,908 UART: [art] Signing Cert with AUTHO
2,416,106,219 UART: RITY.KEYID = 7
2,417,811,055 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,812,570 UART: [art] PUB.X = BD06CACC92DF71519DC4131A7178307B385215201B491F973F2450705CDB53DE5B6A734028988E3FFB4AC39B4D7CA7EA
2,417,819,811 UART: [art] PUB.Y = BD0616902F57DCBD82B0684E149A2EB8A95A4592688EEB707B620A1896FFCE0C9FBFC93267E8B16645F8BE9EBEA62E19
2,417,827,090 UART: [art] SIG.R = 56321FE80377272923B56271D6B651547D044C8E60ABC59442C6B2602D5831B1E184296AC2DA11C36E5E3C90AB19722A
2,417,834,458 UART: [art] SIG.S = 902128B1F321D443AF7756730423E043883D2C979606A0BB98A054BBB79787E19150F243E572F1CDAA1CB5398437BCCF
2,418,813,159 UART: Caliptra RT
2,418,813,852 UART: [state] CFI Enabled
2,419,100,332 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 336.02s
Truncated 1358290 bytes from beginning
0 UART: [art] Store in in slot 0x4
1,717,368,371 UART: [art] Derive Key Pair
1,717,368,731 UART: [art] Store priv key in slot 0x5
1,717,382,187 UART: [art] Derive Key Pair - Done
1,717,396,642 UART: [art] Signing Cert with AUTHO
1,717,397,122 UART: RITY.KEYID = 7
1,717,412,580 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,413,345 UART: [art] PUB.X = 0840CE7BB9C5CE8B55638BC9FDF636FDBEA6A9F82E1E6B3E61413007392F50710DDD28392C1D7442DA54D36E6C4FFDA3
1,717,420,122 UART: [art] PUB.Y = 5C91A72F0D8EEC2651F2E6FFC31CE72C21E7ACC33C2D83AFD952A44DF6BFD233C6A9E618DA01D41E7F884AC15107608F
1,717,427,083 UART: [art] SIG.R = D3336C71CD26E807CFDE8DD32004D9348E5A80F73BABDF02C58F3D0A77CB1CA31FC605343FCCB6DF481F8512EE820E28
1,717,433,853 UART: [art] SIG.S = B10903F01147ACE5E6D08252FAAACA83C23CCF6371CD804108094F25D757F291D7ED63BD5ABF3B10D5218C86C3AA5A95
1,717,457,096 UART: Caliptra RT
1,717,457,350 UART: [state] CFI Enabled
1,717,736,664 UART: [rt] RT listening for mailbox commands...
1,717,737,334 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,717,738,301 UART:
1,717,738,317 UART: Running Caliptra ROM ...
1,717,738,725 UART:
1,717,738,779 UART: [state] CFI Enabled
1,717,741,387 UART: [state] LifecycleState = Unprovisioned
1,717,742,042 UART: [state] DebugLocked = No
1,717,742,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,717,744,193 UART: [kat] SHA2-256
1,718,538,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,718,542,239 UART: [kat] ++
1,718,542,391 UART: [kat] sha1
1,718,546,759 UART: [kat] SHA2-256
1,718,548,697 UART: [kat] SHA2-384
1,718,551,392 UART: [kat] SHA2-512-ACC
1,718,553,292 UART: [kat] ECC-384
1,718,558,851 UART: [kat] HMAC-384Kdf
1,718,563,381 UART: [kat] LMS
1,719,131,577 UART: [kat] --
1,719,132,370 UART: [update-reset] ++
1,720,466,931 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,720,468,111 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,720,618,029 >>> mbox cmd response: success
1,720,618,312 UART: [update-reset] Copying MAN_2 To MAN_1
1,720,626,326 UART: [update-reset Success] --
1,720,627,281 UART: [state] Locking Datavault
1,720,628,087 UART: [state] Locking PCR0, PCR1 and PCR31
1,720,628,691 UART: [state] Locking ICCM
1,720,629,237 UART: [exit] Launching FMC @ 0x40000130
1,720,634,566 UART:
1,720,634,582 UART: Running Caliptra FMC ...
1,720,634,990 UART:
1,720,635,044 UART: [state] CFI Enabled
1,720,723,247 UART: [art] Extend RT PCRs Done
1,720,723,675 UART: [art] Lock RT PCRs Done
1,720,724,862 UART: [art] Populate DV Done
1,720,732,949 UART: [fht] FMC Alias Private Key: 7
1,720,734,107 UART: [art] Derive CDI
1,720,734,387 UART: [art] Store in in slot 0x4
1,720,820,328 UART: [art] Derive Key Pair
1,720,820,688 UART: [art] Store priv key in slot 0x5
1,720,834,446 UART: [art] Derive Key Pair - Done
1,720,849,412 UART: [art] Signing Cert with AUTHO
1,720,849,892 UART: RITY.KEYID = 7
1,720,865,390 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,866,155 UART: [art] PUB.X = 9DC9A78842B29AA48B6C83FD85C55C98AAB4B0DA793477863AB9FAC913F5B532BC6EC97BB726B5B558EBD6A529418146
1,720,872,937 UART: [art] PUB.Y = 51B5E089FBCF4B56FC78132AD4968761AA5F4465A6DE1844B4B7F197CD8E8AFDE23CD0C3A2EDEA9A8074BAF76261AD7A
1,720,879,909 UART: [art] SIG.R = CF1F80CB65D1B3E216CF40DB41FA894739388679D5B0F0617D423FFBFF6BAA31D858B95ED9B3A9386D82F04C4EA6F672
1,720,886,693 UART: [art] SIG.S = 44F5158A2439125603F9F38F00B6F4249FC74D85B4FD11C5CAB35F3D7F12A63BAA42BB38C7B2E98B020AF986009FF7CF
1,720,910,587 UART: Caliptra RT
1,720,910,841 UART: [state] CFI Enabled
1,721,194,246 UART: [rt] RT listening for mailbox commands...
1,721,194,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,195,839 UART:
1,721,195,855 UART: Running Caliptra ROM ...
1,721,196,263 UART:
1,721,196,317 UART: [state] CFI Enabled
1,721,199,313 UART: [state] LifecycleState = Unprovisioned
1,721,199,968 UART: [state] DebugLocked = No
1,721,200,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,202,179 UART: [kat] SHA2-256
1,721,996,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,000,225 UART: [kat] ++
1,722,000,377 UART: [kat] sha1
1,722,004,583 UART: [kat] SHA2-256
1,722,006,521 UART: [kat] SHA2-384
1,722,009,234 UART: [kat] SHA2-512-ACC
1,722,011,134 UART: [kat] ECC-384
1,722,016,733 UART: [kat] HMAC-384Kdf
1,722,021,535 UART: [kat] LMS
1,722,589,731 UART: [kat] --
1,722,590,586 UART: [update-reset] ++
1,723,924,441 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,723,925,483 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,724,075,401 >>> mbox cmd response: success
1,724,075,564 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,083,578 UART: [update-reset Success] --
1,724,084,517 UART: [state] Locking Datavault
1,724,085,315 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,085,919 UART: [state] Locking ICCM
1,724,086,359 UART: [exit] Launching FMC @ 0x40000130
1,724,091,688 UART:
1,724,091,704 UART: Running Caliptra FMC ...
1,724,092,112 UART:
1,724,092,166 UART: [state] CFI Enabled
1,724,180,673 UART: [art] Extend RT PCRs Done
1,724,181,101 UART: [art] Lock RT PCRs Done
1,724,182,490 UART: [art] Populate DV Done
1,724,190,887 UART: [fht] FMC Alias Private Key: 7
1,724,191,991 UART: [art] Derive CDI
1,724,192,271 UART: [art] Store in in slot 0x4
1,724,277,688 UART: [art] Derive Key Pair
1,724,278,048 UART: [art] Store priv key in slot 0x5
1,724,291,446 UART: [art] Derive Key Pair - Done
1,724,306,039 UART: [art] Signing Cert with AUTHO
1,724,306,519 UART: RITY.KEYID = 7
1,724,321,631 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,322,396 UART: [art] PUB.X = 0840CE7BB9C5CE8B55638BC9FDF636FDBEA6A9F82E1E6B3E61413007392F50710DDD28392C1D7442DA54D36E6C4FFDA3
1,724,329,173 UART: [art] PUB.Y = 5C91A72F0D8EEC2651F2E6FFC31CE72C21E7ACC33C2D83AFD952A44DF6BFD233C6A9E618DA01D41E7F884AC15107608F
1,724,336,134 UART: [art] SIG.R = D3336C71CD26E807CFDE8DD32004D9348E5A80F73BABDF02C58F3D0A77CB1CA31FC605343FCCB6DF481F8512EE820E28
1,724,342,904 UART: [art] SIG.S = B10903F01147ACE5E6D08252FAAACA83C23CCF6371CD804108094F25D757F291D7ED63BD5ABF3B10D5218C86C3AA5A95
1,724,366,867 UART: Caliptra RT
1,724,367,121 UART: [state] CFI Enabled
1,724,647,537 UART: [rt] RT listening for mailbox commands...
1,724,648,207 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,724,649,048 UART:
1,724,649,064 UART: Running Caliptra ROM ...
1,724,649,472 UART:
1,724,649,526 UART: [state] CFI Enabled
1,724,651,902 UART: [state] LifecycleState = Unprovisioned
1,724,652,557 UART: [state] DebugLocked = No
1,724,653,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,724,654,916 UART: [kat] SHA2-256
1,725,448,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,725,452,962 UART: [kat] ++
1,725,453,114 UART: [kat] sha1
1,725,457,250 UART: [kat] SHA2-256
1,725,459,188 UART: [kat] SHA2-384
1,725,462,163 UART: [kat] SHA2-512-ACC
1,725,464,063 UART: [kat] ECC-384
1,725,469,644 UART: [kat] HMAC-384Kdf
1,725,474,320 UART: [kat] LMS
1,726,042,516 UART: [kat] --
1,726,043,223 UART: [update-reset] ++
1,727,378,208 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,727,379,400 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,727,529,318 >>> mbox cmd response: success
1,727,529,561 UART: [update-reset] Copying MAN_2 To MAN_1
1,727,537,575 UART: [update-reset Success] --
1,727,538,492 UART: [state] Locking Datavault
1,727,539,276 UART: [state] Locking PCR0, PCR1 and PCR31
1,727,539,880 UART: [state] Locking ICCM
1,727,540,442 UART: [exit] Launching FMC @ 0x40000130
1,727,545,771 UART:
1,727,545,787 UART: Running Caliptra FMC ...
1,727,546,195 UART:
1,727,546,249 UART: [state] CFI Enabled
1,727,635,274 UART: [art] Extend RT PCRs Done
1,727,635,702 UART: [art] Lock RT PCRs Done
1,727,637,043 UART: [art] Populate DV Done
1,727,645,480 UART: [fht] FMC Alias Private Key: 7
1,727,646,530 UART: [art] Derive CDI
1,727,646,810 UART: [art] Store in in slot 0x4
1,727,732,271 UART: [art] Derive Key Pair
1,727,732,631 UART: [art] Store priv key in slot 0x5
1,727,746,227 UART: [art] Derive Key Pair - Done
1,727,760,879 UART: [art] Signing Cert with AUTHO
1,727,761,359 UART: RITY.KEYID = 7
1,727,776,783 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,777,548 UART: [art] PUB.X = 9DC9A78842B29AA48B6C83FD85C55C98AAB4B0DA793477863AB9FAC913F5B532BC6EC97BB726B5B558EBD6A529418146
1,727,784,330 UART: [art] PUB.Y = 51B5E089FBCF4B56FC78132AD4968761AA5F4465A6DE1844B4B7F197CD8E8AFDE23CD0C3A2EDEA9A8074BAF76261AD7A
1,727,791,302 UART: [art] SIG.R = CF1F80CB65D1B3E216CF40DB41FA894739388679D5B0F0617D423FFBFF6BAA31D858B95ED9B3A9386D82F04C4EA6F672
1,727,798,086 UART: [art] SIG.S = 44F5158A2439125603F9F38F00B6F4249FC74D85B4FD11C5CAB35F3D7F12A63BAA42BB38C7B2E98B020AF986009FF7CF
1,727,821,962 UART: Caliptra RT
1,727,822,216 UART: [state] CFI Enabled
1,728,105,691 UART: [rt] RT listening for mailbox commands...
1,728,106,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,107,404 UART:
1,728,107,420 UART: Running Caliptra ROM ...
1,728,107,828 UART:
1,728,107,882 UART: [state] CFI Enabled
1,728,111,156 UART: [state] LifecycleState = Unprovisioned
1,728,111,811 UART: [state] DebugLocked = No
1,728,112,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,114,218 UART: [kat] SHA2-256
1,728,908,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,728,912,264 UART: [kat] ++
1,728,912,416 UART: [kat] sha1
1,728,916,576 UART: [kat] SHA2-256
1,728,918,514 UART: [kat] SHA2-384
1,728,921,173 UART: [kat] SHA2-512-ACC
1,728,923,073 UART: [kat] ECC-384
1,728,928,842 UART: [kat] HMAC-384Kdf
1,728,933,498 UART: [kat] LMS
1,729,501,694 UART: [kat] --
1,729,502,801 UART: [update-reset] ++
1,730,838,452 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,730,839,604 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,730,989,522 >>> mbox cmd response: success
1,730,989,639 UART: [update-reset] Copying MAN_2 To MAN_1
1,730,997,653 UART: [update-reset Success] --
1,730,998,584 UART: [state] Locking Datavault
1,730,999,362 UART: [state] Locking PCR0, PCR1 and PCR31
1,730,999,966 UART: [state] Locking ICCM
1,731,000,466 UART: [exit] Launching FMC @ 0x40000130
1,731,005,795 UART:
1,731,005,811 UART: Running Caliptra FMC ...
1,731,006,219 UART:
1,731,006,273 UART: [state] CFI Enabled
1,731,095,354 UART: [art] Extend RT PCRs Done
1,731,095,782 UART: [art] Lock RT PCRs Done
1,731,097,183 UART: [art] Populate DV Done
1,731,105,602 UART: [fht] FMC Alias Private Key: 7
1,731,106,750 UART: [art] Derive CDI
1,731,107,030 UART: [art] Store in in slot 0x4
1,731,192,753 UART: [art] Derive Key Pair
1,731,193,113 UART: [art] Store priv key in slot 0x5
1,731,206,295 UART: [art] Derive Key Pair - Done
1,731,221,152 UART: [art] Signing Cert with AUTHO
1,731,221,632 UART: RITY.KEYID = 7
1,731,237,130 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,237,895 UART: [art] PUB.X = 0840CE7BB9C5CE8B55638BC9FDF636FDBEA6A9F82E1E6B3E61413007392F50710DDD28392C1D7442DA54D36E6C4FFDA3
1,731,244,672 UART: [art] PUB.Y = 5C91A72F0D8EEC2651F2E6FFC31CE72C21E7ACC33C2D83AFD952A44DF6BFD233C6A9E618DA01D41E7F884AC15107608F
1,731,251,633 UART: [art] SIG.R = D3336C71CD26E807CFDE8DD32004D9348E5A80F73BABDF02C58F3D0A77CB1CA31FC605343FCCB6DF481F8512EE820E28
1,731,258,403 UART: [art] SIG.S = B10903F01147ACE5E6D08252FAAACA83C23CCF6371CD804108094F25D757F291D7ED63BD5ABF3B10D5218C86C3AA5A95
1,731,281,978 UART: Caliptra RT
1,731,282,232 UART: [state] CFI Enabled
1,731,567,014 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 335.09s
Truncated 734956 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,646,495,329 >>> mbox cmd response: success
1,646,508,812 UART:
1,646,508,828 UART: Running Caliptra FMC ...
1,646,509,236 UART:
1,646,509,290 UART: [state] CFI Enabled
1,646,597,939 UART: [art] Extend RT PCRs Done
1,646,598,367 UART: [art] Lock RT PCRs Done
1,646,599,782 UART: [art] Populate DV Done
1,646,607,829 UART: [fht] FMC Alias Private Key: 7
1,646,608,813 UART: [art] Derive CDI
1,646,609,093 UART: [art] Store in in slot 0x4
1,646,695,016 UART: [art] Derive Key Pair
1,646,695,376 UART: [art] Store priv key in slot 0x5
1,646,707,964 UART: [art] Derive Key Pair - Done
1,646,722,378 UART: [art] Signing Cert with AUTHO
1,646,722,858 UART: RITY.KEYID = 7
1,646,737,792 UART: [art] Erasing AUTHORITY.KEYID = 7
1,646,738,557 UART: [art] PUB.X = 73BB81326240AA66A389A36A62593B15F595FEC87DBBBE0C42BDC92897FB88696CCB35FD0CC0C863495A8B62DAC8C864
1,646,745,333 UART: [art] PUB.Y = BA4C187767ECC4629DBCACB4A70AF8CB1E0F7CB51C68D15A8D6FD3516121E835B39FD1F6B95AAF5EB2C71C110C14D12F
1,646,752,298 UART: [art] SIG.R = 827CB7E17996ED04A79C03AE86ABE0DFBC4817A05D45776A684C60DE458058A9654BB0DC39FFA1C04510CD002A44F9D6
1,646,759,050 UART: [art] SIG.S = AA70931B431827EB8B0A8526773DFD3E9046E96A9FA668EAA15B0D453FAD6FB9E8FC123FA9B12FB5A765E79CC37EFD72
1,646,782,775 UART: Caliptra RT
1,646,783,029 UART: [state] CFI Enabled
1,647,065,629 UART: [rt] RT listening for mailbox commands...
1,647,066,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,649,830,238 >>> mbox cmd response: success
1,649,843,375 UART:
1,649,843,391 UART: Running Caliptra FMC ...
1,649,843,799 UART:
1,649,843,853 UART: [state] CFI Enabled
1,649,933,038 UART: [art] Extend RT PCRs Done
1,649,933,466 UART: [art] Lock RT PCRs Done
1,649,934,855 UART: [art] Populate DV Done
1,649,943,034 UART: [fht] FMC Alias Private Key: 7
1,649,943,974 UART: [art] Derive CDI
1,649,944,254 UART: [art] Store in in slot 0x4
1,650,030,069 UART: [art] Derive Key Pair
1,650,030,429 UART: [art] Store priv key in slot 0x5
1,650,043,525 UART: [art] Derive Key Pair - Done
1,650,058,493 UART: [art] Signing Cert with AUTHO
1,650,058,973 UART: RITY.KEYID = 7
1,650,074,043 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,074,808 UART: [art] PUB.X = 19F7A866C8F888BC1C40FA7A5B008D103C66823537EA39E2D880AFFD34BEAB6F2C9147ED1C6F88773AEEA25364FAB961
1,650,081,570 UART: [art] PUB.Y = 486C3B04799713016309253B62D767711C0120150AFEF638866E1C84A5F8C48E99C6A9B41FB8DD13C8F18B9EAEB478F5
1,650,088,503 UART: [art] SIG.R = FCC53C2B412C127BA78512D07D0FFBC05E348EFA931CA3E34A3178D7A6165D53CE06C825D5383118108FCEB50A7019F9
1,650,095,272 UART: [art] SIG.S = 48FD8367AEFFC0B20DC5845BA893AF6E32558BA6E10C5B98ED2961A0FDE003CB38E03791E3CEB884464DBF892282C781
1,650,119,044 UART: Caliptra RT
1,650,119,298 UART: [state] CFI Enabled
1,650,397,649 UART: [rt] RT listening for mailbox commands...
1,650,398,319 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,160,148 >>> mbox cmd response: success
1,653,173,155 UART:
1,653,173,171 UART: Running Caliptra FMC ...
1,653,173,579 UART:
1,653,173,633 UART: [state] CFI Enabled
1,653,261,986 UART: [art] Extend RT PCRs Done
1,653,262,414 UART: [art] Lock RT PCRs Done
1,653,263,673 UART: [art] Populate DV Done
1,653,271,982 UART: [fht] FMC Alias Private Key: 7
1,653,273,022 UART: [art] Derive CDI
1,653,273,302 UART: [art] Store in in slot 0x4
1,653,359,111 UART: [art] Derive Key Pair
1,653,359,471 UART: [art] Store priv key in slot 0x5
1,653,372,931 UART: [art] Derive Key Pair - Done
1,653,387,505 UART: [art] Signing Cert with AUTHO
1,653,387,985 UART: RITY.KEYID = 7
1,653,402,677 UART: [art] Erasing AUTHORITY.KEYID = 7
1,653,403,442 UART: [art] PUB.X = 73BB81326240AA66A389A36A62593B15F595FEC87DBBBE0C42BDC92897FB88696CCB35FD0CC0C863495A8B62DAC8C864
1,653,410,218 UART: [art] PUB.Y = BA4C187767ECC4629DBCACB4A70AF8CB1E0F7CB51C68D15A8D6FD3516121E835B39FD1F6B95AAF5EB2C71C110C14D12F
1,653,417,183 UART: [art] SIG.R = 827CB7E17996ED04A79C03AE86ABE0DFBC4817A05D45776A684C60DE458058A9654BB0DC39FFA1C04510CD002A44F9D6
1,653,423,935 UART: [art] SIG.S = AA70931B431827EB8B0A8526773DFD3E9046E96A9FA668EAA15B0D453FAD6FB9E8FC123FA9B12FB5A765E79CC37EFD72
1,653,447,676 UART: Caliptra RT
1,653,447,930 UART: [state] CFI Enabled
1,653,733,544 UART: [rt] RT listening for mailbox commands...
1,653,734,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,656,498,533 >>> mbox cmd response: success
1,656,511,924 UART:
1,656,511,940 UART: Running Caliptra FMC ...
1,656,512,348 UART:
1,656,512,402 UART: [state] CFI Enabled
1,656,601,121 UART: [art] Extend RT PCRs Done
1,656,601,549 UART: [art] Lock RT PCRs Done
1,656,602,826 UART: [art] Populate DV Done
1,656,611,171 UART: [fht] FMC Alias Private Key: 7
1,656,612,307 UART: [art] Derive CDI
1,656,612,587 UART: [art] Store in in slot 0x4
1,656,698,384 UART: [art] Derive Key Pair
1,656,698,744 UART: [art] Store priv key in slot 0x5
1,656,712,138 UART: [art] Derive Key Pair - Done
1,656,726,844 UART: [art] Signing Cert with AUTHO
1,656,727,324 UART: RITY.KEYID = 7
1,656,742,478 UART: [art] Erasing AUTHORITY.KEYID = 7
1,656,743,243 UART: [art] PUB.X = 19F7A866C8F888BC1C40FA7A5B008D103C66823537EA39E2D880AFFD34BEAB6F2C9147ED1C6F88773AEEA25364FAB961
1,656,750,005 UART: [art] PUB.Y = 486C3B04799713016309253B62D767711C0120150AFEF638866E1C84A5F8C48E99C6A9B41FB8DD13C8F18B9EAEB478F5
1,656,756,938 UART: [art] SIG.R = FCC53C2B412C127BA78512D07D0FFBC05E348EFA931CA3E34A3178D7A6165D53CE06C825D5383118108FCEB50A7019F9
1,656,763,707 UART: [art] SIG.S = 48FD8367AEFFC0B20DC5845BA893AF6E32558BA6E10C5B98ED2961A0FDE003CB38E03791E3CEB884464DBF892282C781
1,656,787,159 UART: Caliptra RT
1,656,787,413 UART: [state] CFI Enabled
1,657,067,252 UART: [rt] RT listening for mailbox commands...
1,657,067,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,659,829,673 >>> mbox cmd response: success
1,659,843,154 UART:
1,659,843,170 UART: Running Caliptra FMC ...
1,659,843,578 UART:
1,659,843,632 UART: [state] CFI Enabled
1,659,932,059 UART: [art] Extend RT PCRs Done
1,659,932,487 UART: [art] Lock RT PCRs Done
1,659,933,858 UART: [art] Populate DV Done
1,659,942,173 UART: [fht] FMC Alias Private Key: 7
1,659,943,169 UART: [art] Derive CDI
1,659,943,449 UART: [art] Store in in slot 0x4
1,660,029,424 UART: [art] Derive Key Pair
1,660,029,784 UART: [art] Store priv key in slot 0x5
1,660,043,192 UART: [art] Derive Key Pair - Done
1,660,058,074 UART: [art] Signing Cert with AUTHO
1,660,058,554 UART: RITY.KEYID = 7
1,660,074,224 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,074,989 UART: [art] PUB.X = 73BB81326240AA66A389A36A62593B15F595FEC87DBBBE0C42BDC92897FB88696CCB35FD0CC0C863495A8B62DAC8C864
1,660,081,765 UART: [art] PUB.Y = BA4C187767ECC4629DBCACB4A70AF8CB1E0F7CB51C68D15A8D6FD3516121E835B39FD1F6B95AAF5EB2C71C110C14D12F
1,660,088,730 UART: [art] SIG.R = 827CB7E17996ED04A79C03AE86ABE0DFBC4817A05D45776A684C60DE458058A9654BB0DC39FFA1C04510CD002A44F9D6
1,660,095,482 UART: [art] SIG.S = AA70931B431827EB8B0A8526773DFD3E9046E96A9FA668EAA15B0D453FAD6FB9E8FC123FA9B12FB5A765E79CC37EFD72
1,660,119,817 UART: Caliptra RT
1,660,120,071 UART: [state] CFI Enabled
1,660,402,371 UART: [rt] RT listening for mailbox commands...
1,660,403,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,166,208 >>> mbox cmd response: success
1,663,179,563 UART:
1,663,179,579 UART: Running Caliptra FMC ...
1,663,179,987 UART:
1,663,180,041 UART: [state] CFI Enabled
1,663,269,142 UART: [art] Extend RT PCRs Done
1,663,269,570 UART: [art] Lock RT PCRs Done
1,663,271,131 UART: [art] Populate DV Done
1,663,279,360 UART: [fht] FMC Alias Private Key: 7
1,663,280,384 UART: [art] Derive CDI
1,663,280,664 UART: [art] Store in in slot 0x4
1,663,366,057 UART: [art] Derive Key Pair
1,663,366,417 UART: [art] Store priv key in slot 0x5
1,663,379,509 UART: [art] Derive Key Pair - Done
1,663,394,423 UART: [art] Signing Cert with AUTHO
1,663,394,903 UART: RITY.KEYID = 7
1,663,410,105 UART: [art] Erasing AUTHORITY.KEYID = 7
1,663,410,870 UART: [art] PUB.X = 19F7A866C8F888BC1C40FA7A5B008D103C66823537EA39E2D880AFFD34BEAB6F2C9147ED1C6F88773AEEA25364FAB961
1,663,417,632 UART: [art] PUB.Y = 486C3B04799713016309253B62D767711C0120150AFEF638866E1C84A5F8C48E99C6A9B41FB8DD13C8F18B9EAEB478F5
1,663,424,565 UART: [art] SIG.R = FCC53C2B412C127BA78512D07D0FFBC05E348EFA931CA3E34A3178D7A6165D53CE06C825D5383118108FCEB50A7019F9
1,663,431,334 UART: [art] SIG.S = 48FD8367AEFFC0B20DC5845BA893AF6E32558BA6E10C5B98ED2961A0FDE003CB38E03791E3CEB884464DBF892282C781
1,663,454,736 UART: Caliptra RT
1,663,454,990 UART: [state] CFI Enabled
1,663,739,163 UART: [rt] RT listening for mailbox commands...
1,663,739,833 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,666,502,856 >>> mbox cmd response: success
1,666,516,029 UART:
1,666,516,045 UART: Running Caliptra FMC ...
1,666,516,453 UART:
1,666,516,507 UART: [state] CFI Enabled
1,666,605,642 UART: [art] Extend RT PCRs Done
1,666,606,070 UART: [art] Lock RT PCRs Done
1,666,607,235 UART: [art] Populate DV Done
1,666,615,244 UART: [fht] FMC Alias Private Key: 7
1,666,616,178 UART: [art] Derive CDI
1,666,616,458 UART: [art] Store in in slot 0x4
1,666,701,823 UART: [art] Derive Key Pair
1,666,702,183 UART: [art] Store priv key in slot 0x5
1,666,715,097 UART: [art] Derive Key Pair - Done
1,666,729,817 UART: [art] Signing Cert with AUTHO
1,666,730,297 UART: RITY.KEYID = 7
1,666,745,317 UART: [art] Erasing AUTHORITY.KEYID = 7
1,666,746,082 UART: [art] PUB.X = 73BB81326240AA66A389A36A62593B15F595FEC87DBBBE0C42BDC92897FB88696CCB35FD0CC0C863495A8B62DAC8C864
1,666,752,858 UART: [art] PUB.Y = BA4C187767ECC4629DBCACB4A70AF8CB1E0F7CB51C68D15A8D6FD3516121E835B39FD1F6B95AAF5EB2C71C110C14D12F
1,666,759,823 UART: [art] SIG.R = 827CB7E17996ED04A79C03AE86ABE0DFBC4817A05D45776A684C60DE458058A9654BB0DC39FFA1C04510CD002A44F9D6
1,666,766,575 UART: [art] SIG.S = AA70931B431827EB8B0A8526773DFD3E9046E96A9FA668EAA15B0D453FAD6FB9E8FC123FA9B12FB5A765E79CC37EFD72
1,666,790,980 UART: Caliptra RT
1,666,791,234 UART: [state] CFI Enabled
1,667,071,932 UART: [rt] RT listening for mailbox commands...
1,667,072,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,669,834,125 >>> mbox cmd response: success
1,669,847,754 UART:
1,669,847,770 UART: Running Caliptra FMC ...
1,669,848,178 UART:
1,669,848,232 UART: [state] CFI Enabled
1,669,937,643 UART: [art] Extend RT PCRs Done
1,669,938,071 UART: [art] Lock RT PCRs Done
1,669,939,572 UART: [art] Populate DV Done
1,669,947,739 UART: [fht] FMC Alias Private Key: 7
1,669,948,803 UART: [art] Derive CDI
1,669,949,083 UART: [art] Store in in slot 0x4
1,670,034,758 UART: [art] Derive Key Pair
1,670,035,118 UART: [art] Store priv key in slot 0x5
1,670,048,774 UART: [art] Derive Key Pair - Done
1,670,063,764 UART: [art] Signing Cert with AUTHO
1,670,064,244 UART: RITY.KEYID = 7
1,670,079,758 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,080,523 UART: [art] PUB.X = 19F7A866C8F888BC1C40FA7A5B008D103C66823537EA39E2D880AFFD34BEAB6F2C9147ED1C6F88773AEEA25364FAB961
1,670,087,285 UART: [art] PUB.Y = 486C3B04799713016309253B62D767711C0120150AFEF638866E1C84A5F8C48E99C6A9B41FB8DD13C8F18B9EAEB478F5
1,670,094,218 UART: [art] SIG.R = FCC53C2B412C127BA78512D07D0FFBC05E348EFA931CA3E34A3178D7A6165D53CE06C825D5383118108FCEB50A7019F9
1,670,100,987 UART: [art] SIG.S = 48FD8367AEFFC0B20DC5845BA893AF6E32558BA6E10C5B98ED2961A0FDE003CB38E03791E3CEB884464DBF892282C781
1,670,124,773 UART: Caliptra RT
1,670,125,027 UART: [state] CFI Enabled
1,670,407,222 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 329.50s
Truncated 1358290 bytes from beginning
1 UART: [art] Store in in slot 0x4
1,717,787,838 UART: [art] Derive Key Pair
1,717,788,198 UART: [art] Store priv key in slot 0x5
1,717,800,964 UART: [art] Derive Key Pair - Done
1,717,815,702 UART: [art] Signing Cert with AUTHO
1,717,816,182 UART: RITY.KEYID = 7
1,717,831,514 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,832,279 UART: [art] PUB.X = EE34EE4C43A0EC5AE9131B489102B3CED931DAFF8FF9A3420FD9CE23DA0453ACF80421AE8EC93CE377C1DD5D7F8B1357
1,717,839,061 UART: [art] PUB.Y = A7C5190D0E66FF26614846C05DABE2BEB0E3044D0A16BD7D92B9D7EE9FF570BB1D30FACE0DE069D695D57B1DA8A46A3E
1,717,846,020 UART: [art] SIG.R = 98DD0D516DEBD049706502F9C61AB5C7CEC5A8EDCDB209DE7D918DC61AD4A94C32EE027D83C3D3384AA9D6C334CEDED0
1,717,852,804 UART: [art] SIG.S = 023776653F1682282F75AC5ACB92C42614BD3DB1830719A70EB56C4FF75730F7E5E4FD3E10A896E9919B1C780EBC77FD
1,717,876,849 UART: Caliptra RT
1,717,877,195 UART: [state] CFI Enabled
1,718,155,924 UART: [rt] RT listening for mailbox commands...
1,718,156,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,718,157,291 UART:
1,718,157,307 UART: Running Caliptra ROM ...
1,718,157,715 UART:
1,718,157,856 UART: [state] CFI Enabled
1,718,160,338 UART: [state] LifecycleState = Unprovisioned
1,718,160,993 UART: [state] DebugLocked = No
1,718,161,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,718,163,410 UART: [kat] SHA2-256
1,718,957,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,718,961,456 UART: [kat] ++
1,718,961,608 UART: [kat] sha1
1,718,965,858 UART: [kat] SHA2-256
1,718,967,796 UART: [kat] SHA2-384
1,718,970,457 UART: [kat] SHA2-512-ACC
1,718,972,357 UART: [kat] ECC-384
1,718,978,224 UART: [kat] HMAC-384Kdf
1,718,982,766 UART: [kat] LMS
1,719,550,962 UART: [kat] --
1,719,551,989 UART: [update-reset] ++
1,720,887,784 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,720,888,900 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,721,038,818 >>> mbox cmd response: success
1,721,039,107 UART: [update-reset] Copying MAN_2 To MAN_1
1,721,047,121 UART: [update-reset Success] --
1,721,048,064 UART: [state] Locking Datavault
1,721,048,934 UART: [state] Locking PCR0, PCR1 and PCR31
1,721,049,538 UART: [state] Locking ICCM
1,721,049,968 UART: [exit] Launching FMC @ 0x40000130
1,721,055,297 UART:
1,721,055,313 UART: Running Caliptra FMC ...
1,721,055,721 UART:
1,721,055,864 UART: [state] CFI Enabled
1,721,144,897 UART: [art] Extend RT PCRs Done
1,721,145,325 UART: [art] Lock RT PCRs Done
1,721,146,562 UART: [art] Populate DV Done
1,721,154,765 UART: [fht] FMC Alias Private Key: 7
1,721,155,813 UART: [art] Derive CDI
1,721,156,093 UART: [art] Store in in slot 0x4
1,721,241,334 UART: [art] Derive Key Pair
1,721,241,694 UART: [art] Store priv key in slot 0x5
1,721,255,206 UART: [art] Derive Key Pair - Done
1,721,270,257 UART: [art] Signing Cert with AUTHO
1,721,270,737 UART: RITY.KEYID = 7
1,721,286,579 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,287,344 UART: [art] PUB.X = D5EB10B3CDB35E17756066C09C0FC9040009CDAEA4E70BFA7BDBF0E0016AA5CE9BD9FA4EAEA36949D570B2269522421A
1,721,294,097 UART: [art] PUB.Y = 8EC6796ED1A6A0F7D96B3F3CFAC4697907E54061C3E341F75B177D055F7F100E3366BD72BC31603207AEBD20D3F6DC40
1,721,301,043 UART: [art] SIG.R = DDB03BF011C8E707AC7B93CD3BA761004A1DC07FB4B001E27CF693ACC82F10AF819F0833F2BF15504C2B2152120659B1
1,721,307,789 UART: [art] SIG.S = E8FC404662A4C5BAA771E0B1E919513CED8EF33B633316B78112004359F62DDA6A84CAD0BF8C655CDBF9D022D5096EB2
1,721,331,531 UART: Caliptra RT
1,721,331,877 UART: [state] CFI Enabled
1,721,615,391 UART: [rt] RT listening for mailbox commands...
1,721,616,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,721,617,018 UART:
1,721,617,034 UART: Running Caliptra ROM ...
1,721,617,442 UART:
1,721,617,583 UART: [state] CFI Enabled
1,721,620,203 UART: [state] LifecycleState = Unprovisioned
1,721,620,858 UART: [state] DebugLocked = No
1,721,621,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,721,623,221 UART: [kat] SHA2-256
1,722,417,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,722,421,267 UART: [kat] ++
1,722,421,419 UART: [kat] sha1
1,722,425,513 UART: [kat] SHA2-256
1,722,427,451 UART: [kat] SHA2-384
1,722,430,132 UART: [kat] SHA2-512-ACC
1,722,432,032 UART: [kat] ECC-384
1,722,437,651 UART: [kat] HMAC-384Kdf
1,722,442,191 UART: [kat] LMS
1,723,010,387 UART: [kat] --
1,723,011,408 UART: [update-reset] ++
1,724,346,413 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,724,347,547 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,724,497,465 >>> mbox cmd response: success
1,724,497,778 UART: [update-reset] Copying MAN_2 To MAN_1
1,724,505,792 UART: [update-reset Success] --
1,724,506,771 UART: [state] Locking Datavault
1,724,507,657 UART: [state] Locking PCR0, PCR1 and PCR31
1,724,508,261 UART: [state] Locking ICCM
1,724,508,795 UART: [exit] Launching FMC @ 0x40000130
1,724,514,124 UART:
1,724,514,140 UART: Running Caliptra FMC ...
1,724,514,548 UART:
1,724,514,691 UART: [state] CFI Enabled
1,724,603,936 UART: [art] Extend RT PCRs Done
1,724,604,364 UART: [art] Lock RT PCRs Done
1,724,605,537 UART: [art] Populate DV Done
1,724,613,850 UART: [fht] FMC Alias Private Key: 7
1,724,614,838 UART: [art] Derive CDI
1,724,615,118 UART: [art] Store in in slot 0x4
1,724,700,521 UART: [art] Derive Key Pair
1,724,700,881 UART: [art] Store priv key in slot 0x5
1,724,714,267 UART: [art] Derive Key Pair - Done
1,724,728,871 UART: [art] Signing Cert with AUTHO
1,724,729,351 UART: RITY.KEYID = 7
1,724,744,719 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,745,484 UART: [art] PUB.X = EE34EE4C43A0EC5AE9131B489102B3CED931DAFF8FF9A3420FD9CE23DA0453ACF80421AE8EC93CE377C1DD5D7F8B1357
1,724,752,266 UART: [art] PUB.Y = A7C5190D0E66FF26614846C05DABE2BEB0E3044D0A16BD7D92B9D7EE9FF570BB1D30FACE0DE069D695D57B1DA8A46A3E
1,724,759,225 UART: [art] SIG.R = 98DD0D516DEBD049706502F9C61AB5C7CEC5A8EDCDB209DE7D918DC61AD4A94C32EE027D83C3D3384AA9D6C334CEDED0
1,724,766,009 UART: [art] SIG.S = 023776653F1682282F75AC5ACB92C42614BD3DB1830719A70EB56C4FF75730F7E5E4FD3E10A896E9919B1C780EBC77FD
1,724,790,172 UART: Caliptra RT
1,724,790,518 UART: [state] CFI Enabled
1,725,072,629 UART: [rt] RT listening for mailbox commands...
1,725,073,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,725,074,020 UART:
1,725,074,036 UART: Running Caliptra ROM ...
1,725,074,444 UART:
1,725,074,585 UART: [state] CFI Enabled
1,725,077,435 UART: [state] LifecycleState = Unprovisioned
1,725,078,090 UART: [state] DebugLocked = No
1,725,078,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,725,080,217 UART: [kat] SHA2-256
1,725,874,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,725,878,263 UART: [kat] ++
1,725,878,415 UART: [kat] sha1
1,725,882,739 UART: [kat] SHA2-256
1,725,884,677 UART: [kat] SHA2-384
1,725,887,298 UART: [kat] SHA2-512-ACC
1,725,889,198 UART: [kat] ECC-384
1,725,895,169 UART: [kat] HMAC-384Kdf
1,725,899,713 UART: [kat] LMS
1,726,467,909 UART: [kat] --
1,726,468,718 UART: [update-reset] ++
1,727,804,101 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,727,805,209 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,727,955,127 >>> mbox cmd response: success
1,727,955,440 UART: [update-reset] Copying MAN_2 To MAN_1
1,727,963,454 UART: [update-reset Success] --
1,727,964,399 UART: [state] Locking Datavault
1,727,965,211 UART: [state] Locking PCR0, PCR1 and PCR31
1,727,965,815 UART: [state] Locking ICCM
1,727,966,281 UART: [exit] Launching FMC @ 0x40000130
1,727,971,610 UART:
1,727,971,626 UART: Running Caliptra FMC ...
1,727,972,034 UART:
1,727,972,177 UART: [state] CFI Enabled
1,728,061,732 UART: [art] Extend RT PCRs Done
1,728,062,160 UART: [art] Lock RT PCRs Done
1,728,063,281 UART: [art] Populate DV Done
1,728,071,496 UART: [fht] FMC Alias Private Key: 7
1,728,072,478 UART: [art] Derive CDI
1,728,072,758 UART: [art] Store in in slot 0x4
1,728,158,477 UART: [art] Derive Key Pair
1,728,158,837 UART: [art] Store priv key in slot 0x5
1,728,172,555 UART: [art] Derive Key Pair - Done
1,728,187,514 UART: [art] Signing Cert with AUTHO
1,728,187,994 UART: RITY.KEYID = 7
1,728,203,458 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,204,223 UART: [art] PUB.X = D5EB10B3CDB35E17756066C09C0FC9040009CDAEA4E70BFA7BDBF0E0016AA5CE9BD9FA4EAEA36949D570B2269522421A
1,728,210,976 UART: [art] PUB.Y = 8EC6796ED1A6A0F7D96B3F3CFAC4697907E54061C3E341F75B177D055F7F100E3366BD72BC31603207AEBD20D3F6DC40
1,728,217,922 UART: [art] SIG.R = DDB03BF011C8E707AC7B93CD3BA761004A1DC07FB4B001E27CF693ACC82F10AF819F0833F2BF15504C2B2152120659B1
1,728,224,668 UART: [art] SIG.S = E8FC404662A4C5BAA771E0B1E919513CED8EF33B633316B78112004359F62DDA6A84CAD0BF8C655CDBF9D022D5096EB2
1,728,248,586 UART: Caliptra RT
1,728,248,932 UART: [state] CFI Enabled
1,728,533,134 UART: [rt] RT listening for mailbox commands...
1,728,533,804 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,728,534,905 UART:
1,728,534,921 UART: Running Caliptra ROM ...
1,728,535,329 UART:
1,728,535,470 UART: [state] CFI Enabled
1,728,538,358 UART: [state] LifecycleState = Unprovisioned
1,728,539,013 UART: [state] DebugLocked = No
1,728,539,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,728,541,282 UART: [kat] SHA2-256
1,729,335,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,729,339,328 UART: [kat] ++
1,729,339,480 UART: [kat] sha1
1,729,343,800 UART: [kat] SHA2-256
1,729,345,738 UART: [kat] SHA2-384
1,729,348,433 UART: [kat] SHA2-512-ACC
1,729,350,333 UART: [kat] ECC-384
1,729,355,804 UART: [kat] HMAC-384Kdf
1,729,360,564 UART: [kat] LMS
1,729,928,760 UART: [kat] --
1,729,929,809 UART: [update-reset] ++
1,731,265,162 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,731,266,342 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
1,731,416,260 >>> mbox cmd response: success
1,731,416,593 UART: [update-reset] Copying MAN_2 To MAN_1
1,731,424,607 UART: [update-reset Success] --
1,731,425,458 UART: [state] Locking Datavault
1,731,426,444 UART: [state] Locking PCR0, PCR1 and PCR31
1,731,427,048 UART: [state] Locking ICCM
1,731,427,530 UART: [exit] Launching FMC @ 0x40000130
1,731,432,859 UART:
1,731,432,875 UART: Running Caliptra FMC ...
1,731,433,283 UART:
1,731,433,426 UART: [state] CFI Enabled
1,731,521,973 UART: [art] Extend RT PCRs Done
1,731,522,401 UART: [art] Lock RT PCRs Done
1,731,523,874 UART: [art] Populate DV Done
1,731,532,001 UART: [fht] FMC Alias Private Key: 7
1,731,533,159 UART: [art] Derive CDI
1,731,533,439 UART: [art] Store in in slot 0x4
1,731,619,300 UART: [art] Derive Key Pair
1,731,619,660 UART: [art] Store priv key in slot 0x5
1,731,633,416 UART: [art] Derive Key Pair - Done
1,731,648,024 UART: [art] Signing Cert with AUTHO
1,731,648,504 UART: RITY.KEYID = 7
1,731,663,648 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,664,413 UART: [art] PUB.X = EE34EE4C43A0EC5AE9131B489102B3CED931DAFF8FF9A3420FD9CE23DA0453ACF80421AE8EC93CE377C1DD5D7F8B1357
1,731,671,195 UART: [art] PUB.Y = A7C5190D0E66FF26614846C05DABE2BEB0E3044D0A16BD7D92B9D7EE9FF570BB1D30FACE0DE069D695D57B1DA8A46A3E
1,731,678,154 UART: [art] SIG.R = 98DD0D516DEBD049706502F9C61AB5C7CEC5A8EDCDB209DE7D918DC61AD4A94C32EE027D83C3D3384AA9D6C334CEDED0
1,731,684,938 UART: [art] SIG.S = 023776653F1682282F75AC5ACB92C42614BD3DB1830719A70EB56C4FF75730F7E5E4FD3E10A896E9919B1C780EBC77FD
1,731,708,961 UART: Caliptra RT
1,731,709,307 UART: [state] CFI Enabled
1,731,994,288 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 333.33s
Truncated 735002 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,647,046,356 >>> mbox cmd response: success
1,647,059,957 UART:
1,647,059,973 UART: Running Caliptra FMC ...
1,647,060,381 UART:
1,647,060,524 UART: [state] CFI Enabled
1,647,149,857 UART: [art] Extend RT PCRs Done
1,647,150,285 UART: [art] Lock RT PCRs Done
1,647,151,800 UART: [art] Populate DV Done
1,647,160,091 UART: [fht] FMC Alias Private Key: 7
1,647,161,187 UART: [art] Derive CDI
1,647,161,467 UART: [art] Store in in slot 0x4
1,647,246,996 UART: [art] Derive Key Pair
1,647,247,356 UART: [art] Store priv key in slot 0x5
1,647,260,444 UART: [art] Derive Key Pair - Done
1,647,275,394 UART: [art] Signing Cert with AUTHO
1,647,275,874 UART: RITY.KEYID = 7
1,647,291,208 UART: [art] Erasing AUTHORITY.KEYID = 7
1,647,291,973 UART: [art] PUB.X = 0D96C9D4457998C34FE17A7001A03DBB4F0C484364272578A3FCE813BFE2F1480C895AA1C5397FA032CBEF0011BED499
1,647,298,715 UART: [art] PUB.Y = D11F14E135ECC670A59B56F7A52C19DFFA05E4188E2A95651E8CFCE009F8265E4A5FC16797C6B22EE1C5B211DCF907E4
1,647,305,670 UART: [art] SIG.R = 2397E194212868D22028F5153FADF60F573EA9FB37767CD6EE9638FD400CF1AAD6881F0E82B033335D2251DB04A93645
1,647,312,426 UART: [art] SIG.S = 0A9267E25CD3B387D85E826E973C12DA7C1A403A202B84221676D4EE1B6B601204A6C564BC2D866B83F69536DBDB5FD0
1,647,336,113 UART: Caliptra RT
1,647,336,459 UART: [state] CFI Enabled
1,647,622,225 UART: [rt] RT listening for mailbox commands...
1,647,622,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,650,385,697 >>> mbox cmd response: success
1,650,399,318 UART:
1,650,399,334 UART: Running Caliptra FMC ...
1,650,399,742 UART:
1,650,399,885 UART: [state] CFI Enabled
1,650,489,416 UART: [art] Extend RT PCRs Done
1,650,489,844 UART: [art] Lock RT PCRs Done
1,650,491,289 UART: [art] Populate DV Done
1,650,499,300 UART: [fht] FMC Alias Private Key: 7
1,650,500,278 UART: [art] Derive CDI
1,650,500,558 UART: [art] Store in in slot 0x4
1,650,586,463 UART: [art] Derive Key Pair
1,650,586,823 UART: [art] Store priv key in slot 0x5
1,650,600,347 UART: [art] Derive Key Pair - Done
1,650,615,164 UART: [art] Signing Cert with AUTHO
1,650,615,644 UART: RITY.KEYID = 7
1,650,631,088 UART: [art] Erasing AUTHORITY.KEYID = 7
1,650,631,853 UART: [art] PUB.X = CA12284F2F3786BE96E69A51C72CA9DB6B6E5FA1BF74ABD84AD07FE8853C86EE0D111624B16593157B40CD2623C8F7C7
1,650,638,632 UART: [art] PUB.Y = BC5FE675870F6448EE4F4863A60D378E6F57A05E8A609DFA1BD62FF9EEE669134858ADAEF0E82438EBEF913AD68CED53
1,650,645,594 UART: [art] SIG.R = 2DDAE89CB72ABE5D226D462BBCA0A6355EE00CBDBA88B612A014067EBD11EB3A0E449E4345AEB85C08C432D155107F0C
1,650,652,369 UART: [art] SIG.S = 78BA700CBE94CCE01F44DF384601153974A5CC9C6903D8D5556751D416BA6EF1455266B8C5EE87F8FB10A0A60AEEF8B9
1,650,676,558 UART: Caliptra RT
1,650,676,904 UART: [state] CFI Enabled
1,650,961,158 UART: [rt] RT listening for mailbox commands...
1,650,961,828 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,653,724,758 >>> mbox cmd response: success
1,653,738,145 UART:
1,653,738,161 UART: Running Caliptra FMC ...
1,653,738,569 UART:
1,653,738,712 UART: [state] CFI Enabled
1,653,827,927 UART: [art] Extend RT PCRs Done
1,653,828,355 UART: [art] Lock RT PCRs Done
1,653,829,754 UART: [art] Populate DV Done
1,653,837,965 UART: [fht] FMC Alias Private Key: 7
1,653,838,999 UART: [art] Derive CDI
1,653,839,279 UART: [art] Store in in slot 0x4
1,653,924,450 UART: [art] Derive Key Pair
1,653,924,810 UART: [art] Store priv key in slot 0x5
1,653,938,166 UART: [art] Derive Key Pair - Done
1,653,952,778 UART: [art] Signing Cert with AUTHO
1,653,953,258 UART: RITY.KEYID = 7
1,653,968,422 UART: [art] Erasing AUTHORITY.KEYID = 7
1,653,969,187 UART: [art] PUB.X = 0D96C9D4457998C34FE17A7001A03DBB4F0C484364272578A3FCE813BFE2F1480C895AA1C5397FA032CBEF0011BED499
1,653,975,929 UART: [art] PUB.Y = D11F14E135ECC670A59B56F7A52C19DFFA05E4188E2A95651E8CFCE009F8265E4A5FC16797C6B22EE1C5B211DCF907E4
1,653,982,884 UART: [art] SIG.R = 2397E194212868D22028F5153FADF60F573EA9FB37767CD6EE9638FD400CF1AAD6881F0E82B033335D2251DB04A93645
1,653,989,640 UART: [art] SIG.S = 0A9267E25CD3B387D85E826E973C12DA7C1A403A202B84221676D4EE1B6B601204A6C564BC2D866B83F69536DBDB5FD0
1,654,013,195 UART: Caliptra RT
1,654,013,541 UART: [state] CFI Enabled
1,654,299,545 UART: [rt] RT listening for mailbox commands...
1,654,300,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,657,062,451 >>> mbox cmd response: success
1,657,075,774 UART:
1,657,075,790 UART: Running Caliptra FMC ...
1,657,076,198 UART:
1,657,076,341 UART: [state] CFI Enabled
1,657,165,842 UART: [art] Extend RT PCRs Done
1,657,166,270 UART: [art] Lock RT PCRs Done
1,657,167,643 UART: [art] Populate DV Done
1,657,175,996 UART: [fht] FMC Alias Private Key: 7
1,657,177,080 UART: [art] Derive CDI
1,657,177,360 UART: [art] Store in in slot 0x4
1,657,262,817 UART: [art] Derive Key Pair
1,657,263,177 UART: [art] Store priv key in slot 0x5
1,657,276,811 UART: [art] Derive Key Pair - Done
1,657,291,454 UART: [art] Signing Cert with AUTHO
1,657,291,934 UART: RITY.KEYID = 7
1,657,307,266 UART: [art] Erasing AUTHORITY.KEYID = 7
1,657,308,031 UART: [art] PUB.X = CA12284F2F3786BE96E69A51C72CA9DB6B6E5FA1BF74ABD84AD07FE8853C86EE0D111624B16593157B40CD2623C8F7C7
1,657,314,810 UART: [art] PUB.Y = BC5FE675870F6448EE4F4863A60D378E6F57A05E8A609DFA1BD62FF9EEE669134858ADAEF0E82438EBEF913AD68CED53
1,657,321,772 UART: [art] SIG.R = 2DDAE89CB72ABE5D226D462BBCA0A6355EE00CBDBA88B612A014067EBD11EB3A0E449E4345AEB85C08C432D155107F0C
1,657,328,547 UART: [art] SIG.S = 78BA700CBE94CCE01F44DF384601153974A5CC9C6903D8D5556751D416BA6EF1455266B8C5EE87F8FB10A0A60AEEF8B9
1,657,352,320 UART: Caliptra RT
1,657,352,666 UART: [state] CFI Enabled
1,657,635,252 UART: [rt] RT listening for mailbox commands...
1,657,635,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,660,399,778 >>> mbox cmd response: success
1,660,413,093 UART:
1,660,413,109 UART: Running Caliptra FMC ...
1,660,413,517 UART:
1,660,413,660 UART: [state] CFI Enabled
1,660,503,225 UART: [art] Extend RT PCRs Done
1,660,503,653 UART: [art] Lock RT PCRs Done
1,660,504,906 UART: [art] Populate DV Done
1,660,513,185 UART: [fht] FMC Alias Private Key: 7
1,660,514,193 UART: [art] Derive CDI
1,660,514,473 UART: [art] Store in in slot 0x4
1,660,600,242 UART: [art] Derive Key Pair
1,660,600,602 UART: [art] Store priv key in slot 0x5
1,660,613,830 UART: [art] Derive Key Pair - Done
1,660,628,982 UART: [art] Signing Cert with AUTHO
1,660,629,462 UART: RITY.KEYID = 7
1,660,644,362 UART: [art] Erasing AUTHORITY.KEYID = 7
1,660,645,127 UART: [art] PUB.X = 0D96C9D4457998C34FE17A7001A03DBB4F0C484364272578A3FCE813BFE2F1480C895AA1C5397FA032CBEF0011BED499
1,660,651,869 UART: [art] PUB.Y = D11F14E135ECC670A59B56F7A52C19DFFA05E4188E2A95651E8CFCE009F8265E4A5FC16797C6B22EE1C5B211DCF907E4
1,660,658,824 UART: [art] SIG.R = 2397E194212868D22028F5153FADF60F573EA9FB37767CD6EE9638FD400CF1AAD6881F0E82B033335D2251DB04A93645
1,660,665,580 UART: [art] SIG.S = 0A9267E25CD3B387D85E826E973C12DA7C1A403A202B84221676D4EE1B6B601204A6C564BC2D866B83F69536DBDB5FD0
1,660,689,055 UART: Caliptra RT
1,660,689,401 UART: [state] CFI Enabled
1,660,973,301 UART: [rt] RT listening for mailbox commands...
1,660,973,971 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,663,736,033 >>> mbox cmd response: success
1,663,749,476 UART:
1,663,749,492 UART: Running Caliptra FMC ...
1,663,749,900 UART:
1,663,750,043 UART: [state] CFI Enabled
1,663,839,254 UART: [art] Extend RT PCRs Done
1,663,839,682 UART: [art] Lock RT PCRs Done
1,663,841,109 UART: [art] Populate DV Done
1,663,849,480 UART: [fht] FMC Alias Private Key: 7
1,663,850,422 UART: [art] Derive CDI
1,663,850,702 UART: [art] Store in in slot 0x4
1,663,936,561 UART: [art] Derive Key Pair
1,663,936,921 UART: [art] Store priv key in slot 0x5
1,663,950,129 UART: [art] Derive Key Pair - Done
1,663,964,608 UART: [art] Signing Cert with AUTHO
1,663,965,088 UART: RITY.KEYID = 7
1,663,980,232 UART: [art] Erasing AUTHORITY.KEYID = 7
1,663,980,997 UART: [art] PUB.X = CA12284F2F3786BE96E69A51C72CA9DB6B6E5FA1BF74ABD84AD07FE8853C86EE0D111624B16593157B40CD2623C8F7C7
1,663,987,776 UART: [art] PUB.Y = BC5FE675870F6448EE4F4863A60D378E6F57A05E8A609DFA1BD62FF9EEE669134858ADAEF0E82438EBEF913AD68CED53
1,663,994,738 UART: [art] SIG.R = 2DDAE89CB72ABE5D226D462BBCA0A6355EE00CBDBA88B612A014067EBD11EB3A0E449E4345AEB85C08C432D155107F0C
1,664,001,513 UART: [art] SIG.S = 78BA700CBE94CCE01F44DF384601153974A5CC9C6903D8D5556751D416BA6EF1455266B8C5EE87F8FB10A0A60AEEF8B9
1,664,026,252 UART: Caliptra RT
1,664,026,598 UART: [state] CFI Enabled
1,664,308,990 UART: [rt] RT listening for mailbox commands...
1,664,309,660 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,667,072,906 >>> mbox cmd response: success
1,667,086,339 UART:
1,667,086,355 UART: Running Caliptra FMC ...
1,667,086,763 UART:
1,667,086,906 UART: [state] CFI Enabled
1,667,175,795 UART: [art] Extend RT PCRs Done
1,667,176,223 UART: [art] Lock RT PCRs Done
1,667,177,280 UART: [art] Populate DV Done
1,667,185,365 UART: [fht] FMC Alias Private Key: 7
1,667,186,411 UART: [art] Derive CDI
1,667,186,691 UART: [art] Store in in slot 0x4
1,667,272,024 UART: [art] Derive Key Pair
1,667,272,384 UART: [art] Store priv key in slot 0x5
1,667,286,050 UART: [art] Derive Key Pair - Done
1,667,301,006 UART: [art] Signing Cert with AUTHO
1,667,301,486 UART: RITY.KEYID = 7
1,667,316,976 UART: [art] Erasing AUTHORITY.KEYID = 7
1,667,317,741 UART: [art] PUB.X = 0D96C9D4457998C34FE17A7001A03DBB4F0C484364272578A3FCE813BFE2F1480C895AA1C5397FA032CBEF0011BED499
1,667,324,483 UART: [art] PUB.Y = D11F14E135ECC670A59B56F7A52C19DFFA05E4188E2A95651E8CFCE009F8265E4A5FC16797C6B22EE1C5B211DCF907E4
1,667,331,438 UART: [art] SIG.R = 2397E194212868D22028F5153FADF60F573EA9FB37767CD6EE9638FD400CF1AAD6881F0E82B033335D2251DB04A93645
1,667,338,194 UART: [art] SIG.S = 0A9267E25CD3B387D85E826E973C12DA7C1A403A202B84221676D4EE1B6B601204A6C564BC2D866B83F69536DBDB5FD0
1,667,361,839 UART: Caliptra RT
1,667,362,185 UART: [state] CFI Enabled
1,667,648,153 UART: [rt] RT listening for mailbox commands...
1,667,648,823 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,670,411,863 >>> mbox cmd response: success
1,670,425,400 UART:
1,670,425,416 UART: Running Caliptra FMC ...
1,670,425,824 UART:
1,670,425,967 UART: [state] CFI Enabled
1,670,515,102 UART: [art] Extend RT PCRs Done
1,670,515,530 UART: [art] Lock RT PCRs Done
1,670,516,639 UART: [art] Populate DV Done
1,670,525,034 UART: [fht] FMC Alias Private Key: 7
1,670,526,008 UART: [art] Derive CDI
1,670,526,288 UART: [art] Store in in slot 0x4
1,670,611,993 UART: [art] Derive Key Pair
1,670,612,353 UART: [art] Store priv key in slot 0x5
1,670,626,209 UART: [art] Derive Key Pair - Done
1,670,641,120 UART: [art] Signing Cert with AUTHO
1,670,641,600 UART: RITY.KEYID = 7
1,670,657,190 UART: [art] Erasing AUTHORITY.KEYID = 7
1,670,657,955 UART: [art] PUB.X = CA12284F2F3786BE96E69A51C72CA9DB6B6E5FA1BF74ABD84AD07FE8853C86EE0D111624B16593157B40CD2623C8F7C7
1,670,664,734 UART: [art] PUB.Y = BC5FE675870F6448EE4F4863A60D378E6F57A05E8A609DFA1BD62FF9EEE669134858ADAEF0E82438EBEF913AD68CED53
1,670,671,696 UART: [art] SIG.R = 2DDAE89CB72ABE5D226D462BBCA0A6355EE00CBDBA88B612A014067EBD11EB3A0E449E4345AEB85C08C432D155107F0C
1,670,678,471 UART: [art] SIG.S = 78BA700CBE94CCE01F44DF384601153974A5CC9C6903D8D5556751D416BA6EF1455266B8C5EE87F8FB10A0A60AEEF8B9
1,670,702,194 UART: Caliptra RT
1,670,702,540 UART: [state] CFI Enabled
1,670,985,510 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 324.46s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,734,763 UART: [fht] FMC Alias Private Key: 7
1,554,735,851 UART: [art] Derive CDI
1,554,736,131 UART: [art] Store in in slot 0x4
1,554,821,628 UART: [art] Derive Key Pair
1,554,821,988 UART: [art] Store priv key in slot 0x5
1,554,834,950 UART: [art] Derive Key Pair - Done
1,554,849,930 UART: [art] Signing Cert with AUTHO
1,554,850,410 UART: RITY.KEYID = 7
1,554,865,426 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,866,191 UART: [art] PUB.X = 9029527851F393DBEB960B8A6D81AA8ED0EE61C6137A2393F0BB97CFE79080EA9B4629DF304E8C320690844317C1ADCD
1,554,872,961 UART: [art] PUB.Y = 1EAFA765644463814DBC99C4CA7723B9BD33E894A9AEAA8A6BBA2EC531955066ACEEDFCBF4BCB4DE13B77929F8288EF6
1,554,879,935 UART: [art] SIG.R = F1CFBA9FAF30E89B70461606D2372F11EAD17ACCA80C5E7CBA207C9633F34304A2DF5040B96F2948E17443C7EA81A07C
1,554,886,708 UART: [art] SIG.S = 26ADE4D2DF8AB54C27C3C9CF3764D0603E6EF19CF22338E1B156F06BB1614A3B6019E304877AF2FC7876FCB20AA1078C
1,554,910,040 UART: Caliptra RT
1,554,910,294 UART: [state] CFI Enabled
1,555,190,959 UART: [rt] RT listening for mailbox commands...
1,555,191,629 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,192,509 UART:
1,555,192,525 UART: Running Caliptra ROM ...
1,555,192,933 UART:
1,555,192,988 UART: [state] CFI Enabled
1,555,195,426 UART: [state] LifecycleState = Unprovisioned
1,555,196,081 UART: [state] DebugLocked = No
1,555,196,715 UART: [state] WD Timer not started. Device not locked for debugging
1,555,197,861 UART: [kat] SHA2-256
1,556,003,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,007,636 UART: [kat] ++
1,556,007,788 UART: [kat] sha1
1,556,012,124 UART: [kat] SHA2-256
1,556,014,064 UART: [kat] SHA2-384
1,556,016,787 UART: [kat] SHA2-512-ACC
1,556,018,687 UART: [kat] ECC-384
1,556,028,284 UART: [kat] HMAC-384Kdf
1,556,032,820 UART: [kat] LMS
1,556,281,148 UART: [kat] --
1,556,282,166 UART: [update-reset] ++
1,557,593,839 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,594,844 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,557,744,710 >>> mbox cmd response: success
1,557,744,973 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,752,987 UART: [update-reset Success] --
1,557,753,932 UART: [state] Locking Datavault
1,557,754,844 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,755,448 UART: [state] Locking ICCM
1,557,755,902 UART: [exit] Launching FMC @ 0x40000130
1,557,761,231 UART:
1,557,761,247 UART: Running Caliptra FMC ...
1,557,761,655 UART:
1,557,761,709 UART: [state] CFI Enabled
1,557,850,430 UART: [art] Extend RT PCRs Done
1,557,850,858 UART: [art] Lock RT PCRs Done
1,557,852,197 UART: [art] Populate DV Done
1,557,860,316 UART: [fht] FMC Alias Private Key: 7
1,557,861,264 UART: [art] Derive CDI
1,557,861,544 UART: [art] Store in in slot 0x4
1,557,947,081 UART: [art] Derive Key Pair
1,557,947,441 UART: [art] Store priv key in slot 0x5
1,557,960,841 UART: [art] Derive Key Pair - Done
1,557,975,707 UART: [art] Signing Cert with AUTHO
1,557,976,187 UART: RITY.KEYID = 7
1,557,991,291 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,992,056 UART: [art] PUB.X = F1D413F3A07F82E97691F238165971B2F2050B827644C037D923CB61F91BE12B7EFC511023E475BDCD140DC2058979A4
1,557,998,810 UART: [art] PUB.Y = 1B74839AC3090A85289D62F5ACE379BA7B579777A3E928C24A5FD3D1D7F0372D8A57C7696B8571E450E32FAB33B2E213
1,558,005,756 UART: [art] SIG.R = 8736799CFC5B94DFC6FF1F566100F2EE1393AB1917CD974BE7B773BEDF1A1C4C54D3BBC52CC17F1E7A8FC9CBBBC216C5
1,558,012,530 UART: [art] SIG.S = 1E76EE997E4DCB4D524F8C09A8F857D3AAEF9AEA34454A4226DA0C36712134232AA2D1926EFC307F7A53066A3012B95A
1,558,036,488 UART: Caliptra RT
1,558,036,742 UART: [state] CFI Enabled
1,558,315,631 UART: [rt] RT listening for mailbox commands...
1,558,316,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,316,943 UART:
1,558,316,959 UART: Running Caliptra ROM ...
1,558,317,367 UART:
1,558,317,422 UART: [state] CFI Enabled
1,558,320,314 UART: [state] LifecycleState = Unprovisioned
1,558,320,969 UART: [state] DebugLocked = No
1,558,321,575 UART: [state] WD Timer not started. Device not locked for debugging
1,558,322,683 UART: [kat] SHA2-256
1,559,128,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,132,458 UART: [kat] ++
1,559,132,610 UART: [kat] sha1
1,559,136,832 UART: [kat] SHA2-256
1,559,138,772 UART: [kat] SHA2-384
1,559,141,521 UART: [kat] SHA2-512-ACC
1,559,143,421 UART: [kat] ECC-384
1,559,153,140 UART: [kat] HMAC-384Kdf
1,559,157,790 UART: [kat] LMS
1,559,406,118 UART: [kat] --
1,559,407,004 UART: [update-reset] ++
1,560,720,681 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,721,684 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,560,871,550 >>> mbox cmd response: success
1,560,871,743 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,879,757 UART: [update-reset Success] --
1,560,880,912 UART: [state] Locking Datavault
1,560,881,598 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,882,202 UART: [state] Locking ICCM
1,560,882,798 UART: [exit] Launching FMC @ 0x40000130
1,560,888,127 UART:
1,560,888,143 UART: Running Caliptra FMC ...
1,560,888,551 UART:
1,560,888,605 UART: [state] CFI Enabled
1,560,977,090 UART: [art] Extend RT PCRs Done
1,560,977,518 UART: [art] Lock RT PCRs Done
1,560,978,913 UART: [art] Populate DV Done
1,560,987,266 UART: [fht] FMC Alias Private Key: 7
1,560,988,446 UART: [art] Derive CDI
1,560,988,726 UART: [art] Store in in slot 0x4
1,561,074,331 UART: [art] Derive Key Pair
1,561,074,691 UART: [art] Store priv key in slot 0x5
1,561,088,169 UART: [art] Derive Key Pair - Done
1,561,102,903 UART: [art] Signing Cert with AUTHO
1,561,103,383 UART: RITY.KEYID = 7
1,561,118,523 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,119,288 UART: [art] PUB.X = 9029527851F393DBEB960B8A6D81AA8ED0EE61C6137A2393F0BB97CFE79080EA9B4629DF304E8C320690844317C1ADCD
1,561,126,058 UART: [art] PUB.Y = 1EAFA765644463814DBC99C4CA7723B9BD33E894A9AEAA8A6BBA2EC531955066ACEEDFCBF4BCB4DE13B77929F8288EF6
1,561,133,032 UART: [art] SIG.R = F1CFBA9FAF30E89B70461606D2372F11EAD17ACCA80C5E7CBA207C9633F34304A2DF5040B96F2948E17443C7EA81A07C
1,561,139,805 UART: [art] SIG.S = 26ADE4D2DF8AB54C27C3C9CF3764D0603E6EF19CF22338E1B156F06BB1614A3B6019E304877AF2FC7876FCB20AA1078C
1,561,163,635 UART: Caliptra RT
1,561,163,889 UART: [state] CFI Enabled
1,561,445,524 UART: [rt] RT listening for mailbox commands...
1,561,446,194 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,446,982 UART:
1,561,446,998 UART: Running Caliptra ROM ...
1,561,447,406 UART:
1,561,447,461 UART: [state] CFI Enabled
1,561,450,277 UART: [state] LifecycleState = Unprovisioned
1,561,450,932 UART: [state] DebugLocked = No
1,561,451,646 UART: [state] WD Timer not started. Device not locked for debugging
1,561,452,906 UART: [kat] SHA2-256
1,562,258,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,262,681 UART: [kat] ++
1,562,262,833 UART: [kat] sha1
1,562,266,931 UART: [kat] SHA2-256
1,562,268,871 UART: [kat] SHA2-384
1,562,271,428 UART: [kat] SHA2-512-ACC
1,562,273,328 UART: [kat] ECC-384
1,562,283,507 UART: [kat] HMAC-384Kdf
1,562,288,263 UART: [kat] LMS
1,562,536,591 UART: [kat] --
1,562,537,705 UART: [update-reset] ++
1,563,849,842 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,850,995 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,564,000,861 >>> mbox cmd response: success
1,564,000,978 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,008,992 UART: [update-reset Success] --
1,564,010,003 UART: [state] Locking Datavault
1,564,010,765 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,011,369 UART: [state] Locking ICCM
1,564,011,909 UART: [exit] Launching FMC @ 0x40000130
1,564,017,238 UART:
1,564,017,254 UART: Running Caliptra FMC ...
1,564,017,662 UART:
1,564,017,716 UART: [state] CFI Enabled
1,564,106,609 UART: [art] Extend RT PCRs Done
1,564,107,037 UART: [art] Lock RT PCRs Done
1,564,108,248 UART: [art] Populate DV Done
1,564,116,569 UART: [fht] FMC Alias Private Key: 7
1,564,117,723 UART: [art] Derive CDI
1,564,118,003 UART: [art] Store in in slot 0x4
1,564,203,702 UART: [art] Derive Key Pair
1,564,204,062 UART: [art] Store priv key in slot 0x5
1,564,217,684 UART: [art] Derive Key Pair - Done
1,564,232,116 UART: [art] Signing Cert with AUTHO
1,564,232,596 UART: RITY.KEYID = 7
1,564,247,794 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,248,559 UART: [art] PUB.X = F1D413F3A07F82E97691F238165971B2F2050B827644C037D923CB61F91BE12B7EFC511023E475BDCD140DC2058979A4
1,564,255,313 UART: [art] PUB.Y = 1B74839AC3090A85289D62F5ACE379BA7B579777A3E928C24A5FD3D1D7F0372D8A57C7696B8571E450E32FAB33B2E213
1,564,262,259 UART: [art] SIG.R = 8736799CFC5B94DFC6FF1F566100F2EE1393AB1917CD974BE7B773BEDF1A1C4C54D3BBC52CC17F1E7A8FC9CBBBC216C5
1,564,269,033 UART: [art] SIG.S = 1E76EE997E4DCB4D524F8C09A8F857D3AAEF9AEA34454A4226DA0C36712134232AA2D1926EFC307F7A53066A3012B95A
1,564,292,343 UART: Caliptra RT
1,564,292,597 UART: [state] CFI Enabled
1,564,572,880 UART: [rt] RT listening for mailbox commands...
1,564,573,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,574,542 UART:
1,564,574,558 UART: Running Caliptra ROM ...
1,564,574,966 UART:
1,564,575,021 UART: [state] CFI Enabled
1,564,577,767 UART: [state] LifecycleState = Unprovisioned
1,564,578,422 UART: [state] DebugLocked = No
1,564,579,070 UART: [state] WD Timer not started. Device not locked for debugging
1,564,580,276 UART: [kat] SHA2-256
1,565,385,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,390,051 UART: [kat] ++
1,565,390,203 UART: [kat] sha1
1,565,394,409 UART: [kat] SHA2-256
1,565,396,349 UART: [kat] SHA2-384
1,565,399,046 UART: [kat] SHA2-512-ACC
1,565,400,946 UART: [kat] ECC-384
1,565,410,955 UART: [kat] HMAC-384Kdf
1,565,415,539 UART: [kat] LMS
1,565,663,867 UART: [kat] --
1,565,664,773 UART: [update-reset] ++
1,566,977,476 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,978,657 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,567,128,523 >>> mbox cmd response: success
1,567,128,674 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,136,688 UART: [update-reset Success] --
1,567,137,775 UART: [state] Locking Datavault
1,567,138,627 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,139,231 UART: [state] Locking ICCM
1,567,139,715 UART: [exit] Launching FMC @ 0x40000130
1,567,145,044 UART:
1,567,145,060 UART: Running Caliptra FMC ...
1,567,145,468 UART:
1,567,145,522 UART: [state] CFI Enabled
1,567,234,515 UART: [art] Extend RT PCRs Done
1,567,234,943 UART: [art] Lock RT PCRs Done
1,567,236,262 UART: [art] Populate DV Done
1,567,244,389 UART: [fht] FMC Alias Private Key: 7
1,567,245,363 UART: [art] Derive CDI
1,567,245,643 UART: [art] Store in in slot 0x4
1,567,331,360 UART: [art] Derive Key Pair
1,567,331,720 UART: [art] Store priv key in slot 0x5
1,567,344,962 UART: [art] Derive Key Pair - Done
1,567,359,726 UART: [art] Signing Cert with AUTHO
1,567,360,206 UART: RITY.KEYID = 7
1,567,375,466 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,376,231 UART: [art] PUB.X = 9029527851F393DBEB960B8A6D81AA8ED0EE61C6137A2393F0BB97CFE79080EA9B4629DF304E8C320690844317C1ADCD
1,567,383,001 UART: [art] PUB.Y = 1EAFA765644463814DBC99C4CA7723B9BD33E894A9AEAA8A6BBA2EC531955066ACEEDFCBF4BCB4DE13B77929F8288EF6
1,567,389,975 UART: [art] SIG.R = F1CFBA9FAF30E89B70461606D2372F11EAD17ACCA80C5E7CBA207C9633F34304A2DF5040B96F2948E17443C7EA81A07C
1,567,396,748 UART: [art] SIG.S = 26ADE4D2DF8AB54C27C3C9CF3764D0603E6EF19CF22338E1B156F06BB1614A3B6019E304877AF2FC7876FCB20AA1078C
1,567,420,180 UART: Caliptra RT
1,567,420,434 UART: [state] CFI Enabled
1,567,703,425 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 314.41s
Truncated 733352 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,996,462 >>> mbox cmd response: success
1,486,009,370 UART:
1,486,009,386 UART: Running Caliptra FMC ...
1,486,009,794 UART:
1,486,009,848 UART: [state] CFI Enabled
1,486,098,749 UART: [art] Extend RT PCRs Done
1,486,099,177 UART: [art] Lock RT PCRs Done
1,486,100,544 UART: [art] Populate DV Done
1,486,108,635 UART: [fht] FMC Alias Private Key: 7
1,486,109,605 UART: [art] Derive CDI
1,486,109,885 UART: [art] Store in in slot 0x4
1,486,194,990 UART: [art] Derive Key Pair
1,486,195,350 UART: [art] Store priv key in slot 0x5
1,486,208,460 UART: [art] Derive Key Pair - Done
1,486,223,128 UART: [art] Signing Cert with AUTHO
1,486,223,608 UART: RITY.KEYID = 7
1,486,239,102 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,239,867 UART: [art] PUB.X = 76FB13E6AC0D692318AA72C2ABBB0A4DC82D4F74E2205B34DC49B32F2520534C45614E44240A5D8F253FE1BDC8A58EE3
1,486,246,640 UART: [art] PUB.Y = C6BF2FB0AFF11DB575E2C922717543F2785A7FBCB27E36AB2812EF91121265F0F454A78FBCB76E0D90C5DCAAB51017F5
1,486,253,603 UART: [art] SIG.R = AFE8867098DE419AD764644990FBAD5A04C346B66C9F869CEE3B265B2E2E29FC75B8DC18EA1A83E17CF19984B0C640D8
1,486,260,382 UART: [art] SIG.S = 647508EF610FCE5700BBAB2352165F64E60D10348197BD7885294B4B72FCCC11B5006B8BFF4C550256C4D527ED767C1E
1,486,283,989 UART: Caliptra RT
1,486,284,243 UART: [state] CFI Enabled
1,486,563,998 UART: [rt] RT listening for mailbox commands...
1,486,564,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,001,666 >>> mbox cmd response: success
1,489,015,124 UART:
1,489,015,140 UART: Running Caliptra FMC ...
1,489,015,548 UART:
1,489,015,602 UART: [state] CFI Enabled
1,489,104,909 UART: [art] Extend RT PCRs Done
1,489,105,337 UART: [art] Lock RT PCRs Done
1,489,106,718 UART: [art] Populate DV Done
1,489,114,695 UART: [fht] FMC Alias Private Key: 7
1,489,115,723 UART: [art] Derive CDI
1,489,116,003 UART: [art] Store in in slot 0x4
1,489,201,768 UART: [art] Derive Key Pair
1,489,202,128 UART: [art] Store priv key in slot 0x5
1,489,215,596 UART: [art] Derive Key Pair - Done
1,489,230,373 UART: [art] Signing Cert with AUTHO
1,489,230,853 UART: RITY.KEYID = 7
1,489,246,321 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,247,086 UART: [art] PUB.X = 237DC5650D1EDB5525C48124D2A1E0CE42742DF1AD3B2FDD134EDF21689448C1D91F397547B7367841F5F2816A2088FC
1,489,253,855 UART: [art] PUB.Y = F18D4E61CF7618D119A995D904F8D2D6FC7C0798A19C8B8662EED6B86F0E4F040644F17030AB35F4361BC8A9AA911556
1,489,260,794 UART: [art] SIG.R = BB6157BE1BC046CC3D98C0E17A29A1E60FEDA232B22973FA14B731D831D25FF87ADE0D50824DAED97A34B02BD78D9873
1,489,267,574 UART: [art] SIG.S = AF0A9084CCBA6D06C2429314EC17A9185D7C90ABA15191119CF068B1370871F92A4673FEBC0C1DA06C3A3F7EF407B4E5
1,489,291,086 UART: Caliptra RT
1,489,291,340 UART: [state] CFI Enabled
1,489,569,254 UART: [rt] RT listening for mailbox commands...
1,489,569,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,006,810 >>> mbox cmd response: success
1,492,020,314 UART:
1,492,020,330 UART: Running Caliptra FMC ...
1,492,020,738 UART:
1,492,020,792 UART: [state] CFI Enabled
1,492,109,877 UART: [art] Extend RT PCRs Done
1,492,110,305 UART: [art] Lock RT PCRs Done
1,492,111,404 UART: [art] Populate DV Done
1,492,119,359 UART: [fht] FMC Alias Private Key: 7
1,492,120,441 UART: [art] Derive CDI
1,492,120,721 UART: [art] Store in in slot 0x4
1,492,206,502 UART: [art] Derive Key Pair
1,492,206,862 UART: [art] Store priv key in slot 0x5
1,492,219,622 UART: [art] Derive Key Pair - Done
1,492,234,230 UART: [art] Signing Cert with AUTHO
1,492,234,710 UART: RITY.KEYID = 7
1,492,249,822 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,250,587 UART: [art] PUB.X = 76FB13E6AC0D692318AA72C2ABBB0A4DC82D4F74E2205B34DC49B32F2520534C45614E44240A5D8F253FE1BDC8A58EE3
1,492,257,360 UART: [art] PUB.Y = C6BF2FB0AFF11DB575E2C922717543F2785A7FBCB27E36AB2812EF91121265F0F454A78FBCB76E0D90C5DCAAB51017F5
1,492,264,323 UART: [art] SIG.R = AFE8867098DE419AD764644990FBAD5A04C346B66C9F869CEE3B265B2E2E29FC75B8DC18EA1A83E17CF19984B0C640D8
1,492,271,102 UART: [art] SIG.S = 647508EF610FCE5700BBAB2352165F64E60D10348197BD7885294B4B72FCCC11B5006B8BFF4C550256C4D527ED767C1E
1,492,294,809 UART: Caliptra RT
1,492,295,063 UART: [state] CFI Enabled
1,492,583,336 UART: [rt] RT listening for mailbox commands...
1,492,584,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,021,770 >>> mbox cmd response: success
1,495,034,808 UART:
1,495,034,824 UART: Running Caliptra FMC ...
1,495,035,232 UART:
1,495,035,286 UART: [state] CFI Enabled
1,495,124,653 UART: [art] Extend RT PCRs Done
1,495,125,081 UART: [art] Lock RT PCRs Done
1,495,126,380 UART: [art] Populate DV Done
1,495,134,597 UART: [fht] FMC Alias Private Key: 7
1,495,135,643 UART: [art] Derive CDI
1,495,135,923 UART: [art] Store in in slot 0x4
1,495,221,558 UART: [art] Derive Key Pair
1,495,221,918 UART: [art] Store priv key in slot 0x5
1,495,235,152 UART: [art] Derive Key Pair - Done
1,495,249,905 UART: [art] Signing Cert with AUTHO
1,495,250,385 UART: RITY.KEYID = 7
1,495,265,629 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,266,394 UART: [art] PUB.X = 237DC5650D1EDB5525C48124D2A1E0CE42742DF1AD3B2FDD134EDF21689448C1D91F397547B7367841F5F2816A2088FC
1,495,273,163 UART: [art] PUB.Y = F18D4E61CF7618D119A995D904F8D2D6FC7C0798A19C8B8662EED6B86F0E4F040644F17030AB35F4361BC8A9AA911556
1,495,280,102 UART: [art] SIG.R = BB6157BE1BC046CC3D98C0E17A29A1E60FEDA232B22973FA14B731D831D25FF87ADE0D50824DAED97A34B02BD78D9873
1,495,286,882 UART: [art] SIG.S = AF0A9084CCBA6D06C2429314EC17A9185D7C90ABA15191119CF068B1370871F92A4673FEBC0C1DA06C3A3F7EF407B4E5
1,495,310,322 UART: Caliptra RT
1,495,310,576 UART: [state] CFI Enabled
1,495,593,036 UART: [rt] RT listening for mailbox commands...
1,495,593,706 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,031,330 >>> mbox cmd response: success
1,498,044,852 UART:
1,498,044,868 UART: Running Caliptra FMC ...
1,498,045,276 UART:
1,498,045,330 UART: [state] CFI Enabled
1,498,134,295 UART: [art] Extend RT PCRs Done
1,498,134,723 UART: [art] Lock RT PCRs Done
1,498,135,932 UART: [art] Populate DV Done
1,498,144,411 UART: [fht] FMC Alias Private Key: 7
1,498,145,455 UART: [art] Derive CDI
1,498,145,735 UART: [art] Store in in slot 0x4
1,498,231,442 UART: [art] Derive Key Pair
1,498,231,802 UART: [art] Store priv key in slot 0x5
1,498,244,586 UART: [art] Derive Key Pair - Done
1,498,259,854 UART: [art] Signing Cert with AUTHO
1,498,260,334 UART: RITY.KEYID = 7
1,498,275,364 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,276,129 UART: [art] PUB.X = 76FB13E6AC0D692318AA72C2ABBB0A4DC82D4F74E2205B34DC49B32F2520534C45614E44240A5D8F253FE1BDC8A58EE3
1,498,282,902 UART: [art] PUB.Y = C6BF2FB0AFF11DB575E2C922717543F2785A7FBCB27E36AB2812EF91121265F0F454A78FBCB76E0D90C5DCAAB51017F5
1,498,289,865 UART: [art] SIG.R = AFE8867098DE419AD764644990FBAD5A04C346B66C9F869CEE3B265B2E2E29FC75B8DC18EA1A83E17CF19984B0C640D8
1,498,296,644 UART: [art] SIG.S = 647508EF610FCE5700BBAB2352165F64E60D10348197BD7885294B4B72FCCC11B5006B8BFF4C550256C4D527ED767C1E
1,498,320,545 UART: Caliptra RT
1,498,320,799 UART: [state] CFI Enabled
1,498,605,298 UART: [rt] RT listening for mailbox commands...
1,498,605,968 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,044,158 >>> mbox cmd response: success
1,501,057,462 UART:
1,501,057,478 UART: Running Caliptra FMC ...
1,501,057,886 UART:
1,501,057,940 UART: [state] CFI Enabled
1,501,146,777 UART: [art] Extend RT PCRs Done
1,501,147,205 UART: [art] Lock RT PCRs Done
1,501,148,254 UART: [art] Populate DV Done
1,501,156,465 UART: [fht] FMC Alias Private Key: 7
1,501,157,581 UART: [art] Derive CDI
1,501,157,861 UART: [art] Store in in slot 0x4
1,501,243,446 UART: [art] Derive Key Pair
1,501,243,806 UART: [art] Store priv key in slot 0x5
1,501,256,800 UART: [art] Derive Key Pair - Done
1,501,271,567 UART: [art] Signing Cert with AUTHO
1,501,272,047 UART: RITY.KEYID = 7
1,501,287,159 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,287,924 UART: [art] PUB.X = 237DC5650D1EDB5525C48124D2A1E0CE42742DF1AD3B2FDD134EDF21689448C1D91F397547B7367841F5F2816A2088FC
1,501,294,693 UART: [art] PUB.Y = F18D4E61CF7618D119A995D904F8D2D6FC7C0798A19C8B8662EED6B86F0E4F040644F17030AB35F4361BC8A9AA911556
1,501,301,632 UART: [art] SIG.R = BB6157BE1BC046CC3D98C0E17A29A1E60FEDA232B22973FA14B731D831D25FF87ADE0D50824DAED97A34B02BD78D9873
1,501,308,412 UART: [art] SIG.S = AF0A9084CCBA6D06C2429314EC17A9185D7C90ABA15191119CF068B1370871F92A4673FEBC0C1DA06C3A3F7EF407B4E5
1,501,332,204 UART: Caliptra RT
1,501,332,458 UART: [state] CFI Enabled
1,501,612,328 UART: [rt] RT listening for mailbox commands...
1,501,612,998 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,050,270 >>> mbox cmd response: success
1,504,063,862 UART:
1,504,063,878 UART: Running Caliptra FMC ...
1,504,064,286 UART:
1,504,064,340 UART: [state] CFI Enabled
1,504,153,155 UART: [art] Extend RT PCRs Done
1,504,153,583 UART: [art] Lock RT PCRs Done
1,504,154,770 UART: [art] Populate DV Done
1,504,162,995 UART: [fht] FMC Alias Private Key: 7
1,504,164,085 UART: [art] Derive CDI
1,504,164,365 UART: [art] Store in in slot 0x4
1,504,250,076 UART: [art] Derive Key Pair
1,504,250,436 UART: [art] Store priv key in slot 0x5
1,504,264,092 UART: [art] Derive Key Pair - Done
1,504,279,278 UART: [art] Signing Cert with AUTHO
1,504,279,758 UART: RITY.KEYID = 7
1,504,294,380 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,295,145 UART: [art] PUB.X = 76FB13E6AC0D692318AA72C2ABBB0A4DC82D4F74E2205B34DC49B32F2520534C45614E44240A5D8F253FE1BDC8A58EE3
1,504,301,918 UART: [art] PUB.Y = C6BF2FB0AFF11DB575E2C922717543F2785A7FBCB27E36AB2812EF91121265F0F454A78FBCB76E0D90C5DCAAB51017F5
1,504,308,881 UART: [art] SIG.R = AFE8867098DE419AD764644990FBAD5A04C346B66C9F869CEE3B265B2E2E29FC75B8DC18EA1A83E17CF19984B0C640D8
1,504,315,660 UART: [art] SIG.S = 647508EF610FCE5700BBAB2352165F64E60D10348197BD7885294B4B72FCCC11B5006B8BFF4C550256C4D527ED767C1E
1,504,339,283 UART: Caliptra RT
1,504,339,537 UART: [state] CFI Enabled
1,504,620,240 UART: [rt] RT listening for mailbox commands...
1,504,620,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,058,662 >>> mbox cmd response: success
1,507,071,792 UART:
1,507,071,808 UART: Running Caliptra FMC ...
1,507,072,216 UART:
1,507,072,270 UART: [state] CFI Enabled
1,507,161,451 UART: [art] Extend RT PCRs Done
1,507,161,879 UART: [art] Lock RT PCRs Done
1,507,163,106 UART: [art] Populate DV Done
1,507,171,513 UART: [fht] FMC Alias Private Key: 7
1,507,172,675 UART: [art] Derive CDI
1,507,172,955 UART: [art] Store in in slot 0x4
1,507,258,690 UART: [art] Derive Key Pair
1,507,259,050 UART: [art] Store priv key in slot 0x5
1,507,271,706 UART: [art] Derive Key Pair - Done
1,507,286,811 UART: [art] Signing Cert with AUTHO
1,507,287,291 UART: RITY.KEYID = 7
1,507,302,649 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,303,414 UART: [art] PUB.X = 237DC5650D1EDB5525C48124D2A1E0CE42742DF1AD3B2FDD134EDF21689448C1D91F397547B7367841F5F2816A2088FC
1,507,310,183 UART: [art] PUB.Y = F18D4E61CF7618D119A995D904F8D2D6FC7C0798A19C8B8662EED6B86F0E4F040644F17030AB35F4361BC8A9AA911556
1,507,317,122 UART: [art] SIG.R = BB6157BE1BC046CC3D98C0E17A29A1E60FEDA232B22973FA14B731D831D25FF87ADE0D50824DAED97A34B02BD78D9873
1,507,323,902 UART: [art] SIG.S = AF0A9084CCBA6D06C2429314EC17A9185D7C90ABA15191119CF068B1370871F92A4673FEBC0C1DA06C3A3F7EF407B4E5
1,507,348,044 UART: Caliptra RT
1,507,348,298 UART: [state] CFI Enabled
1,507,623,298 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 309.93s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,555,245,602 UART: [fht] FMC Alias Private Key: 7
1,555,246,754 UART: [art] Derive CDI
1,555,247,034 UART: [art] Store in in slot 0x4
1,555,332,759 UART: [art] Derive Key Pair
1,555,333,119 UART: [art] Store priv key in slot 0x5
1,555,347,321 UART: [art] Derive Key Pair - Done
1,555,362,152 UART: [art] Signing Cert with AUTHO
1,555,362,632 UART: RITY.KEYID = 7
1,555,377,892 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,378,657 UART: [art] PUB.X = 0DF528EE544B25531214B584BAC5986ECCF8E77B7E9A96A3EE31BDF3933ECEF74271AAF74FAE01E1943363586E284F3B
1,555,385,433 UART: [art] PUB.Y = D215058061FC1158C7B8EC7F04D7F6080470BA91EDB0D42A7D332833F333059E5800ECFDE5ADA3EFECEBB0DDF3818F96
1,555,392,362 UART: [art] SIG.R = 4559792BC13C8B81771D5B9D8EF121AC910EB1D04DB0530AD8A6CD4C151D43FBFD63A0C66B0C09E008ACA6C4753B5CDC
1,555,399,135 UART: [art] SIG.S = 25F1CCB68341D5255ED656FFAE8114A1DB3913696EAD1891361413C14E5FD1E052140185BEFA3EC08CEAF6DD8CE8B90A
1,555,422,572 UART: Caliptra RT
1,555,422,918 UART: [state] CFI Enabled
1,555,704,379 UART: [rt] RT listening for mailbox commands...
1,555,705,049 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,706,139 UART:
1,555,706,155 UART: Running Caliptra ROM ...
1,555,706,563 UART:
1,555,706,705 UART: [state] CFI Enabled
1,555,709,721 UART: [state] LifecycleState = Unprovisioned
1,555,710,376 UART: [state] DebugLocked = No
1,555,710,860 UART: [state] WD Timer not started. Device not locked for debugging
1,555,712,080 UART: [kat] SHA2-256
1,556,517,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,556,521,855 UART: [kat] ++
1,556,522,007 UART: [kat] sha1
1,556,526,145 UART: [kat] SHA2-256
1,556,528,085 UART: [kat] SHA2-384
1,556,530,866 UART: [kat] SHA2-512-ACC
1,556,532,766 UART: [kat] ECC-384
1,556,542,661 UART: [kat] HMAC-384Kdf
1,556,547,217 UART: [kat] LMS
1,556,795,545 UART: [kat] --
1,556,796,589 UART: [update-reset] ++
1,558,108,906 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,110,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,558,259,899 >>> mbox cmd response: success
1,558,260,232 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,268,246 UART: [update-reset Success] --
1,558,269,149 UART: [state] Locking Datavault
1,558,269,837 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,270,441 UART: [state] Locking ICCM
1,558,270,923 UART: [exit] Launching FMC @ 0x40000130
1,558,276,252 UART:
1,558,276,268 UART: Running Caliptra FMC ...
1,558,276,676 UART:
1,558,276,819 UART: [state] CFI Enabled
1,558,366,108 UART: [art] Extend RT PCRs Done
1,558,366,536 UART: [art] Lock RT PCRs Done
1,558,367,781 UART: [art] Populate DV Done
1,558,376,258 UART: [fht] FMC Alias Private Key: 7
1,558,377,312 UART: [art] Derive CDI
1,558,377,592 UART: [art] Store in in slot 0x4
1,558,463,291 UART: [art] Derive Key Pair
1,558,463,651 UART: [art] Store priv key in slot 0x5
1,558,477,117 UART: [art] Derive Key Pair - Done
1,558,492,083 UART: [art] Signing Cert with AUTHO
1,558,492,563 UART: RITY.KEYID = 7
1,558,507,711 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,508,476 UART: [art] PUB.X = 5DE6504C63DD956D05D10AD986B0C0D687F3D001959AA11BFD23694C6DAD9595802CE8410F4A1148FA2D727F040B5CEF
1,558,515,236 UART: [art] PUB.Y = 8E2B1EA19C3FE8914836C3714FBF2341AF0648ABE600C702AD9A14626783CE81F5754D8071579BE99ED4DA166978A95F
1,558,522,160 UART: [art] SIG.R = 716942B9D74A4866C8E31612D5E796E4854A130B4F0E907A26D4B30EF5AD7B8C4F7ADFDC570CA38ABD912911082F252B
1,558,528,921 UART: [art] SIG.S = AC2EA57E9D21A67C803EDD52103C16F428B8DB1320724051FAFB95FEE13FC89C30265A51DCE2BB24634339F7C5CB6E7D
1,558,552,782 UART: Caliptra RT
1,558,553,128 UART: [state] CFI Enabled
1,558,835,749 UART: [rt] RT listening for mailbox commands...
1,558,836,419 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,837,235 UART:
1,558,837,251 UART: Running Caliptra ROM ...
1,558,837,659 UART:
1,558,837,801 UART: [state] CFI Enabled
1,558,840,945 UART: [state] LifecycleState = Unprovisioned
1,558,841,600 UART: [state] DebugLocked = No
1,558,842,306 UART: [state] WD Timer not started. Device not locked for debugging
1,558,843,512 UART: [kat] SHA2-256
1,559,649,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,559,653,287 UART: [kat] ++
1,559,653,439 UART: [kat] sha1
1,559,657,615 UART: [kat] SHA2-256
1,559,659,555 UART: [kat] SHA2-384
1,559,662,222 UART: [kat] SHA2-512-ACC
1,559,664,122 UART: [kat] ECC-384
1,559,673,971 UART: [kat] HMAC-384Kdf
1,559,678,635 UART: [kat] LMS
1,559,926,963 UART: [kat] --
1,559,927,795 UART: [update-reset] ++
1,561,240,254 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,241,225 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,561,391,091 >>> mbox cmd response: success
1,561,391,304 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,399,318 UART: [update-reset Success] --
1,561,400,215 UART: [state] Locking Datavault
1,561,400,939 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,401,543 UART: [state] Locking ICCM
1,561,402,103 UART: [exit] Launching FMC @ 0x40000130
1,561,407,432 UART:
1,561,407,448 UART: Running Caliptra FMC ...
1,561,407,856 UART:
1,561,407,999 UART: [state] CFI Enabled
1,561,497,926 UART: [art] Extend RT PCRs Done
1,561,498,354 UART: [art] Lock RT PCRs Done
1,561,499,501 UART: [art] Populate DV Done
1,561,507,718 UART: [fht] FMC Alias Private Key: 7
1,561,508,718 UART: [art] Derive CDI
1,561,508,998 UART: [art] Store in in slot 0x4
1,561,594,791 UART: [art] Derive Key Pair
1,561,595,151 UART: [art] Store priv key in slot 0x5
1,561,608,535 UART: [art] Derive Key Pair - Done
1,561,623,256 UART: [art] Signing Cert with AUTHO
1,561,623,736 UART: RITY.KEYID = 7
1,561,638,842 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,639,607 UART: [art] PUB.X = 0DF528EE544B25531214B584BAC5986ECCF8E77B7E9A96A3EE31BDF3933ECEF74271AAF74FAE01E1943363586E284F3B
1,561,646,383 UART: [art] PUB.Y = D215058061FC1158C7B8EC7F04D7F6080470BA91EDB0D42A7D332833F333059E5800ECFDE5ADA3EFECEBB0DDF3818F96
1,561,653,312 UART: [art] SIG.R = 4559792BC13C8B81771D5B9D8EF121AC910EB1D04DB0530AD8A6CD4C151D43FBFD63A0C66B0C09E008ACA6C4753B5CDC
1,561,660,085 UART: [art] SIG.S = 25F1CCB68341D5255ED656FFAE8114A1DB3913696EAD1891361413C14E5FD1E052140185BEFA3EC08CEAF6DD8CE8B90A
1,561,683,594 UART: Caliptra RT
1,561,683,940 UART: [state] CFI Enabled
1,561,966,971 UART: [rt] RT listening for mailbox commands...
1,561,967,641 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,968,407 UART:
1,561,968,423 UART: Running Caliptra ROM ...
1,561,968,831 UART:
1,561,968,973 UART: [state] CFI Enabled
1,561,971,579 UART: [state] LifecycleState = Unprovisioned
1,561,972,234 UART: [state] DebugLocked = No
1,561,972,716 UART: [state] WD Timer not started. Device not locked for debugging
1,561,974,068 UART: [kat] SHA2-256
1,562,779,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,562,783,843 UART: [kat] ++
1,562,783,995 UART: [kat] sha1
1,562,788,307 UART: [kat] SHA2-256
1,562,790,247 UART: [kat] SHA2-384
1,562,792,958 UART: [kat] SHA2-512-ACC
1,562,794,858 UART: [kat] ECC-384
1,562,804,553 UART: [kat] HMAC-384Kdf
1,562,809,089 UART: [kat] LMS
1,563,057,417 UART: [kat] --
1,563,058,497 UART: [update-reset] ++
1,564,371,942 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,373,043 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,564,522,909 >>> mbox cmd response: success
1,564,523,194 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,531,208 UART: [update-reset Success] --
1,564,532,051 UART: [state] Locking Datavault
1,564,532,773 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,533,377 UART: [state] Locking ICCM
1,564,533,971 UART: [exit] Launching FMC @ 0x40000130
1,564,539,300 UART:
1,564,539,316 UART: Running Caliptra FMC ...
1,564,539,724 UART:
1,564,539,867 UART: [state] CFI Enabled
1,564,628,988 UART: [art] Extend RT PCRs Done
1,564,629,416 UART: [art] Lock RT PCRs Done
1,564,630,801 UART: [art] Populate DV Done
1,564,639,088 UART: [fht] FMC Alias Private Key: 7
1,564,640,062 UART: [art] Derive CDI
1,564,640,342 UART: [art] Store in in slot 0x4
1,564,725,951 UART: [art] Derive Key Pair
1,564,726,311 UART: [art] Store priv key in slot 0x5
1,564,739,629 UART: [art] Derive Key Pair - Done
1,564,754,459 UART: [art] Signing Cert with AUTHO
1,564,754,939 UART: RITY.KEYID = 7
1,564,770,355 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,771,120 UART: [art] PUB.X = 5DE6504C63DD956D05D10AD986B0C0D687F3D001959AA11BFD23694C6DAD9595802CE8410F4A1148FA2D727F040B5CEF
1,564,777,880 UART: [art] PUB.Y = 8E2B1EA19C3FE8914836C3714FBF2341AF0648ABE600C702AD9A14626783CE81F5754D8071579BE99ED4DA166978A95F
1,564,784,804 UART: [art] SIG.R = 716942B9D74A4866C8E31612D5E796E4854A130B4F0E907A26D4B30EF5AD7B8C4F7ADFDC570CA38ABD912911082F252B
1,564,791,565 UART: [art] SIG.S = AC2EA57E9D21A67C803EDD52103C16F428B8DB1320724051FAFB95FEE13FC89C30265A51DCE2BB24634339F7C5CB6E7D
1,564,816,118 UART: Caliptra RT
1,564,816,464 UART: [state] CFI Enabled
1,565,098,857 UART: [rt] RT listening for mailbox commands...
1,565,099,527 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,100,681 UART:
1,565,100,697 UART: Running Caliptra ROM ...
1,565,101,105 UART:
1,565,101,247 UART: [state] CFI Enabled
1,565,104,229 UART: [state] LifecycleState = Unprovisioned
1,565,104,884 UART: [state] DebugLocked = No
1,565,105,532 UART: [state] WD Timer not started. Device not locked for debugging
1,565,106,838 UART: [kat] SHA2-256
1,565,912,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,916,613 UART: [kat] ++
1,565,916,765 UART: [kat] sha1
1,565,921,065 UART: [kat] SHA2-256
1,565,923,005 UART: [kat] SHA2-384
1,565,925,698 UART: [kat] SHA2-512-ACC
1,565,927,598 UART: [kat] ECC-384
1,565,937,263 UART: [kat] HMAC-384Kdf
1,565,942,095 UART: [kat] LMS
1,566,190,423 UART: [kat] --
1,566,191,493 UART: [update-reset] ++
1,567,503,792 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,567,504,839 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,567,654,705 >>> mbox cmd response: success
1,567,654,872 UART: [update-reset] Copying MAN_2 To MAN_1
1,567,662,886 UART: [update-reset Success] --
1,567,663,905 UART: [state] Locking Datavault
1,567,664,861 UART: [state] Locking PCR0, PCR1 and PCR31
1,567,665,465 UART: [state] Locking ICCM
1,567,665,947 UART: [exit] Launching FMC @ 0x40000130
1,567,671,276 UART:
1,567,671,292 UART: Running Caliptra FMC ...
1,567,671,700 UART:
1,567,671,843 UART: [state] CFI Enabled
1,567,761,116 UART: [art] Extend RT PCRs Done
1,567,761,544 UART: [art] Lock RT PCRs Done
1,567,762,915 UART: [art] Populate DV Done
1,567,771,112 UART: [fht] FMC Alias Private Key: 7
1,567,772,082 UART: [art] Derive CDI
1,567,772,362 UART: [art] Store in in slot 0x4
1,567,858,203 UART: [art] Derive Key Pair
1,567,858,563 UART: [art] Store priv key in slot 0x5
1,567,871,677 UART: [art] Derive Key Pair - Done
1,567,886,512 UART: [art] Signing Cert with AUTHO
1,567,886,992 UART: RITY.KEYID = 7
1,567,901,798 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,902,563 UART: [art] PUB.X = 0DF528EE544B25531214B584BAC5986ECCF8E77B7E9A96A3EE31BDF3933ECEF74271AAF74FAE01E1943363586E284F3B
1,567,909,339 UART: [art] PUB.Y = D215058061FC1158C7B8EC7F04D7F6080470BA91EDB0D42A7D332833F333059E5800ECFDE5ADA3EFECEBB0DDF3818F96
1,567,916,268 UART: [art] SIG.R = 4559792BC13C8B81771D5B9D8EF121AC910EB1D04DB0530AD8A6CD4C151D43FBFD63A0C66B0C09E008ACA6C4753B5CDC
1,567,923,041 UART: [art] SIG.S = 25F1CCB68341D5255ED656FFAE8114A1DB3913696EAD1891361413C14E5FD1E052140185BEFA3EC08CEAF6DD8CE8B90A
1,567,946,444 UART: Caliptra RT
1,567,946,790 UART: [state] CFI Enabled
1,568,226,075 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 331.71s
Truncated 733352 bytes from beginning
9 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,629,468 >>> mbox cmd response: success
1,486,643,270 UART:
1,486,643,286 UART: Running Caliptra FMC ...
1,486,643,694 UART:
1,486,643,837 UART: [state] CFI Enabled
1,486,732,618 UART: [art] Extend RT PCRs Done
1,486,733,046 UART: [art] Lock RT PCRs Done
1,486,734,279 UART: [art] Populate DV Done
1,486,742,638 UART: [fht] FMC Alias Private Key: 7
1,486,743,818 UART: [art] Derive CDI
1,486,744,098 UART: [art] Store in in slot 0x4
1,486,829,623 UART: [art] Derive Key Pair
1,486,829,983 UART: [art] Store priv key in slot 0x5
1,486,843,905 UART: [art] Derive Key Pair - Done
1,486,858,662 UART: [art] Signing Cert with AUTHO
1,486,859,142 UART: RITY.KEYID = 7
1,486,873,940 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,874,705 UART: [art] PUB.X = E9796C26B5A6B6C24D016A798F1433D6063A15BFAA462E2646F1FB52C42C0CB94C30C7D3BF1CE98518C16F061B35BCC6
1,486,881,473 UART: [art] PUB.Y = BF6637F8D27C254C800DFA6B71735A79BC668C54394E0C2B115686F30C0B7E87E05A3698C7A010E753841545A62DAC74
1,486,888,409 UART: [art] SIG.R = 49DF84409EC9319AAAEACE55EF107EAF5BF425FA76DDAB293697AAB22C0A66FF5B4E51F1B896023E6BC8690C99B03F88
1,486,895,190 UART: [art] SIG.S = EF87D3788CFFD4310677ED1932491A8A909A03132E7656C2CA95D5F64A70E36A6C6D01241B0F089ACF0384BA5BF4D5B1
1,486,919,193 UART: Caliptra RT
1,486,919,539 UART: [state] CFI Enabled
1,487,202,508 UART: [rt] RT listening for mailbox commands...
1,487,203,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,641,805 >>> mbox cmd response: success
1,489,655,139 UART:
1,489,655,155 UART: Running Caliptra FMC ...
1,489,655,563 UART:
1,489,655,706 UART: [state] CFI Enabled
1,489,745,431 UART: [art] Extend RT PCRs Done
1,489,745,859 UART: [art] Lock RT PCRs Done
1,489,747,002 UART: [art] Populate DV Done
1,489,755,315 UART: [fht] FMC Alias Private Key: 7
1,489,756,493 UART: [art] Derive CDI
1,489,756,773 UART: [art] Store in in slot 0x4
1,489,842,332 UART: [art] Derive Key Pair
1,489,842,692 UART: [art] Store priv key in slot 0x5
1,489,856,130 UART: [art] Derive Key Pair - Done
1,489,870,741 UART: [art] Signing Cert with AUTHO
1,489,871,221 UART: RITY.KEYID = 7
1,489,886,309 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,887,074 UART: [art] PUB.X = 52CE2B641A10CD816F017E774FA4820DD15DCF49BCB3E94F6FC458F0F479E96F6C6B4056A024D6FB71A35EC67634422B
1,489,893,848 UART: [art] PUB.Y = 4180F19AC7A6A5E808C1EAA5242A9E48119578656F2CA73514BC7173F3FA7F3E0F0CD0AE7C59DE8D70DAF08FCE65CFA6
1,489,900,807 UART: [art] SIG.R = 57B205603F37E125D108D7940C537177413D4234E273645F67DD410D699C8737EDFE0897ED3D6CF621E14369111D0F89
1,489,907,547 UART: [art] SIG.S = 37B36E0D779D44F1C564530144319D8890A9D3396D5457DAFE0D74483025E09CBC2C3FFC92ABEEB6BE7A28A9A1A7655A
1,489,931,399 UART: Caliptra RT
1,489,931,745 UART: [state] CFI Enabled
1,490,211,876 UART: [rt] RT listening for mailbox commands...
1,490,212,546 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,651,135 >>> mbox cmd response: success
1,492,664,485 UART:
1,492,664,501 UART: Running Caliptra FMC ...
1,492,664,909 UART:
1,492,665,052 UART: [state] CFI Enabled
1,492,754,173 UART: [art] Extend RT PCRs Done
1,492,754,601 UART: [art] Lock RT PCRs Done
1,492,755,702 UART: [art] Populate DV Done
1,492,764,157 UART: [fht] FMC Alias Private Key: 7
1,492,765,093 UART: [art] Derive CDI
1,492,765,373 UART: [art] Store in in slot 0x4
1,492,851,154 UART: [art] Derive Key Pair
1,492,851,514 UART: [art] Store priv key in slot 0x5
1,492,864,426 UART: [art] Derive Key Pair - Done
1,492,879,059 UART: [art] Signing Cert with AUTHO
1,492,879,539 UART: RITY.KEYID = 7
1,492,894,773 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,895,538 UART: [art] PUB.X = E9796C26B5A6B6C24D016A798F1433D6063A15BFAA462E2646F1FB52C42C0CB94C30C7D3BF1CE98518C16F061B35BCC6
1,492,902,306 UART: [art] PUB.Y = BF6637F8D27C254C800DFA6B71735A79BC668C54394E0C2B115686F30C0B7E87E05A3698C7A010E753841545A62DAC74
1,492,909,242 UART: [art] SIG.R = 49DF84409EC9319AAAEACE55EF107EAF5BF425FA76DDAB293697AAB22C0A66FF5B4E51F1B896023E6BC8690C99B03F88
1,492,916,023 UART: [art] SIG.S = EF87D3788CFFD4310677ED1932491A8A909A03132E7656C2CA95D5F64A70E36A6C6D01241B0F089ACF0384BA5BF4D5B1
1,492,940,248 UART: Caliptra RT
1,492,940,594 UART: [state] CFI Enabled
1,493,223,781 UART: [rt] RT listening for mailbox commands...
1,493,224,451 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,662,532 >>> mbox cmd response: success
1,495,675,788 UART:
1,495,675,804 UART: Running Caliptra FMC ...
1,495,676,212 UART:
1,495,676,355 UART: [state] CFI Enabled
1,495,765,584 UART: [art] Extend RT PCRs Done
1,495,766,012 UART: [art] Lock RT PCRs Done
1,495,767,525 UART: [art] Populate DV Done
1,495,775,648 UART: [fht] FMC Alias Private Key: 7
1,495,776,612 UART: [art] Derive CDI
1,495,776,892 UART: [art] Store in in slot 0x4
1,495,862,427 UART: [art] Derive Key Pair
1,495,862,787 UART: [art] Store priv key in slot 0x5
1,495,876,401 UART: [art] Derive Key Pair - Done
1,495,890,956 UART: [art] Signing Cert with AUTHO
1,495,891,436 UART: RITY.KEYID = 7
1,495,906,522 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,907,287 UART: [art] PUB.X = 52CE2B641A10CD816F017E774FA4820DD15DCF49BCB3E94F6FC458F0F479E96F6C6B4056A024D6FB71A35EC67634422B
1,495,914,061 UART: [art] PUB.Y = 4180F19AC7A6A5E808C1EAA5242A9E48119578656F2CA73514BC7173F3FA7F3E0F0CD0AE7C59DE8D70DAF08FCE65CFA6
1,495,921,020 UART: [art] SIG.R = 57B205603F37E125D108D7940C537177413D4234E273645F67DD410D699C8737EDFE0897ED3D6CF621E14369111D0F89
1,495,927,760 UART: [art] SIG.S = 37B36E0D779D44F1C564530144319D8890A9D3396D5457DAFE0D74483025E09CBC2C3FFC92ABEEB6BE7A28A9A1A7655A
1,495,951,478 UART: Caliptra RT
1,495,951,824 UART: [state] CFI Enabled
1,496,234,185 UART: [rt] RT listening for mailbox commands...
1,496,234,855 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,671,400 >>> mbox cmd response: success
1,498,684,880 UART:
1,498,684,896 UART: Running Caliptra FMC ...
1,498,685,304 UART:
1,498,685,447 UART: [state] CFI Enabled
1,498,774,576 UART: [art] Extend RT PCRs Done
1,498,775,004 UART: [art] Lock RT PCRs Done
1,498,776,305 UART: [art] Populate DV Done
1,498,784,562 UART: [fht] FMC Alias Private Key: 7
1,498,785,634 UART: [art] Derive CDI
1,498,785,914 UART: [art] Store in in slot 0x4
1,498,871,659 UART: [art] Derive Key Pair
1,498,872,019 UART: [art] Store priv key in slot 0x5
1,498,885,613 UART: [art] Derive Key Pair - Done
1,498,900,164 UART: [art] Signing Cert with AUTHO
1,498,900,644 UART: RITY.KEYID = 7
1,498,916,002 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,916,767 UART: [art] PUB.X = E9796C26B5A6B6C24D016A798F1433D6063A15BFAA462E2646F1FB52C42C0CB94C30C7D3BF1CE98518C16F061B35BCC6
1,498,923,535 UART: [art] PUB.Y = BF6637F8D27C254C800DFA6B71735A79BC668C54394E0C2B115686F30C0B7E87E05A3698C7A010E753841545A62DAC74
1,498,930,471 UART: [art] SIG.R = 49DF84409EC9319AAAEACE55EF107EAF5BF425FA76DDAB293697AAB22C0A66FF5B4E51F1B896023E6BC8690C99B03F88
1,498,937,252 UART: [art] SIG.S = EF87D3788CFFD4310677ED1932491A8A909A03132E7656C2CA95D5F64A70E36A6C6D01241B0F089ACF0384BA5BF4D5B1
1,498,960,875 UART: Caliptra RT
1,498,961,221 UART: [state] CFI Enabled
1,499,248,660 UART: [rt] RT listening for mailbox commands...
1,499,249,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,687,615 >>> mbox cmd response: success
1,501,701,019 UART:
1,501,701,035 UART: Running Caliptra FMC ...
1,501,701,443 UART:
1,501,701,586 UART: [state] CFI Enabled
1,501,790,707 UART: [art] Extend RT PCRs Done
1,501,791,135 UART: [art] Lock RT PCRs Done
1,501,792,592 UART: [art] Populate DV Done
1,501,801,065 UART: [fht] FMC Alias Private Key: 7
1,501,802,083 UART: [art] Derive CDI
1,501,802,363 UART: [art] Store in in slot 0x4
1,501,887,826 UART: [art] Derive Key Pair
1,501,888,186 UART: [art] Store priv key in slot 0x5
1,501,901,400 UART: [art] Derive Key Pair - Done
1,501,916,413 UART: [art] Signing Cert with AUTHO
1,501,916,893 UART: RITY.KEYID = 7
1,501,931,785 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,932,550 UART: [art] PUB.X = 52CE2B641A10CD816F017E774FA4820DD15DCF49BCB3E94F6FC458F0F479E96F6C6B4056A024D6FB71A35EC67634422B
1,501,939,324 UART: [art] PUB.Y = 4180F19AC7A6A5E808C1EAA5242A9E48119578656F2CA73514BC7173F3FA7F3E0F0CD0AE7C59DE8D70DAF08FCE65CFA6
1,501,946,283 UART: [art] SIG.R = 57B205603F37E125D108D7940C537177413D4234E273645F67DD410D699C8737EDFE0897ED3D6CF621E14369111D0F89
1,501,953,023 UART: [art] SIG.S = 37B36E0D779D44F1C564530144319D8890A9D3396D5457DAFE0D74483025E09CBC2C3FFC92ABEEB6BE7A28A9A1A7655A
1,501,976,399 UART: Caliptra RT
1,501,976,745 UART: [state] CFI Enabled
1,502,255,584 UART: [rt] RT listening for mailbox commands...
1,502,256,254 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,694,177 >>> mbox cmd response: success
1,504,707,945 UART:
1,504,707,961 UART: Running Caliptra FMC ...
1,504,708,369 UART:
1,504,708,512 UART: [state] CFI Enabled
1,504,797,453 UART: [art] Extend RT PCRs Done
1,504,797,881 UART: [art] Lock RT PCRs Done
1,504,799,142 UART: [art] Populate DV Done
1,504,807,309 UART: [fht] FMC Alias Private Key: 7
1,504,808,359 UART: [art] Derive CDI
1,504,808,639 UART: [art] Store in in slot 0x4
1,504,894,288 UART: [art] Derive Key Pair
1,504,894,648 UART: [art] Store priv key in slot 0x5
1,504,907,704 UART: [art] Derive Key Pair - Done
1,504,922,173 UART: [art] Signing Cert with AUTHO
1,504,922,653 UART: RITY.KEYID = 7
1,504,937,795 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,938,560 UART: [art] PUB.X = E9796C26B5A6B6C24D016A798F1433D6063A15BFAA462E2646F1FB52C42C0CB94C30C7D3BF1CE98518C16F061B35BCC6
1,504,945,328 UART: [art] PUB.Y = BF6637F8D27C254C800DFA6B71735A79BC668C54394E0C2B115686F30C0B7E87E05A3698C7A010E753841545A62DAC74
1,504,952,264 UART: [art] SIG.R = 49DF84409EC9319AAAEACE55EF107EAF5BF425FA76DDAB293697AAB22C0A66FF5B4E51F1B896023E6BC8690C99B03F88
1,504,959,045 UART: [art] SIG.S = EF87D3788CFFD4310677ED1932491A8A909A03132E7656C2CA95D5F64A70E36A6C6D01241B0F089ACF0384BA5BF4D5B1
1,504,982,896 UART: Caliptra RT
1,504,983,242 UART: [state] CFI Enabled
1,505,263,425 UART: [rt] RT listening for mailbox commands...
1,505,264,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,507,702,976 >>> mbox cmd response: success
1,507,716,506 UART:
1,507,716,522 UART: Running Caliptra FMC ...
1,507,716,930 UART:
1,507,717,073 UART: [state] CFI Enabled
1,507,806,582 UART: [art] Extend RT PCRs Done
1,507,807,010 UART: [art] Lock RT PCRs Done
1,507,808,191 UART: [art] Populate DV Done
1,507,816,292 UART: [fht] FMC Alias Private Key: 7
1,507,817,260 UART: [art] Derive CDI
1,507,817,540 UART: [art] Store in in slot 0x4
1,507,903,001 UART: [art] Derive Key Pair
1,507,903,361 UART: [art] Store priv key in slot 0x5
1,507,916,405 UART: [art] Derive Key Pair - Done
1,507,931,354 UART: [art] Signing Cert with AUTHO
1,507,931,834 UART: RITY.KEYID = 7
1,507,947,254 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,948,019 UART: [art] PUB.X = 52CE2B641A10CD816F017E774FA4820DD15DCF49BCB3E94F6FC458F0F479E96F6C6B4056A024D6FB71A35EC67634422B
1,507,954,793 UART: [art] PUB.Y = 4180F19AC7A6A5E808C1EAA5242A9E48119578656F2CA73514BC7173F3FA7F3E0F0CD0AE7C59DE8D70DAF08FCE65CFA6
1,507,961,752 UART: [art] SIG.R = 57B205603F37E125D108D7940C537177413D4234E273645F67DD410D699C8737EDFE0897ED3D6CF621E14369111D0F89
1,507,968,492 UART: [art] SIG.S = 37B36E0D779D44F1C564530144319D8890A9D3396D5457DAFE0D74483025E09CBC2C3FFC92ABEEB6BE7A28A9A1A7655A
1,507,992,064 UART: Caliptra RT
1,507,992,410 UART: [state] CFI Enabled
1,508,275,473 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 311.38s
Truncated 1339589 bytes from beginning
[art] Populate DV Done
1,553,483,074 UART: [fht] FMC Alias Private Key: 7
1,553,484,222 UART: [art] Derive CDI
1,553,484,502 UART: [art] Store in in slot 0x4
1,553,570,253 UART: [art] Derive Key Pair
1,553,570,613 UART: [art] Store priv key in slot 0x5
1,553,583,773 UART: [art] Derive Key Pair - Done
1,553,598,542 UART: [art] Signing Cert with AUTHO
1,553,599,022 UART: RITY.KEYID = 7
1,553,614,440 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,615,205 UART: [art] PUB.X = FD8B4756B727398D108A81DCD0130383E48BDFE42134C1AC0E5572E0D1F2CC5FCAA22107CEEB204C6CF6BB9D915A20DE
1,553,621,984 UART: [art] PUB.Y = 9C699A841C64B869E56F0E28C72AF3AF18CA77ECEC4D9B693C91195755DD2529CFAC60C0AEEE10CE5F6EC9EC1AAA212A
1,553,628,955 UART: [art] SIG.R = FDBA65D8AD82D74C0017B9287D1D3739C626C5FDAF50DB49BF24F1C3C158E9616C90B34E7EA37EA9CFD3499FA93F4812
1,553,635,719 UART: [art] SIG.S = 095533AC2BC0E376764B827D783EE1E25088BA06C4D8F74E3644929B492BABEA95848BBEDC2FABBC354DE06DF7B9460E
1,553,659,623 UART: Caliptra RT
1,553,659,877 UART: [state] CFI Enabled
1,553,939,318 UART: [rt] RT listening for mailbox commands...
1,553,939,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,553,941,016 UART:
1,553,941,032 UART: Running Caliptra ROM ...
1,553,941,440 UART:
1,553,941,495 UART: [state] CFI Enabled
1,553,944,075 UART: [state] LifecycleState = Unprovisioned
1,553,944,730 UART: [state] DebugLocked = No
1,553,945,280 UART: [state] WD Timer not started. Device not locked for debugging
1,553,946,394 UART: [kat] SHA2-256
1,554,749,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,554,754,073 UART: [kat] ++
1,554,754,225 UART: [kat] sha1
1,554,758,433 UART: [kat] SHA2-256
1,554,760,373 UART: [kat] SHA2-384
1,554,763,044 UART: [kat] SHA2-512-ACC
1,554,764,944 UART: [kat] ECC-384
1,554,774,695 UART: [kat] HMAC-384Kdf
1,554,779,233 UART: [kat] LMS
1,555,027,545 UART: [kat] --
1,555,028,291 UART: [update-reset] ++
1,556,340,513 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,341,588 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,556,491,454 >>> mbox cmd response: success
1,556,491,715 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,499,729 UART: [update-reset Success] --
1,556,500,778 UART: [state] Locking Datavault
1,556,501,680 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,502,284 UART: [state] Locking ICCM
1,556,502,814 UART: [exit] Launching FMC @ 0x40000130
1,556,508,143 UART:
1,556,508,159 UART: Running Caliptra FMC ...
1,556,508,567 UART:
1,556,508,621 UART: [state] CFI Enabled
1,556,597,538 UART: [art] Extend RT PCRs Done
1,556,597,966 UART: [art] Lock RT PCRs Done
1,556,599,007 UART: [art] Populate DV Done
1,556,607,182 UART: [fht] FMC Alias Private Key: 7
1,556,608,202 UART: [art] Derive CDI
1,556,608,482 UART: [art] Store in in slot 0x4
1,556,694,433 UART: [art] Derive Key Pair
1,556,694,793 UART: [art] Store priv key in slot 0x5
1,556,707,517 UART: [art] Derive Key Pair - Done
1,556,722,122 UART: [art] Signing Cert with AUTHO
1,556,722,602 UART: RITY.KEYID = 7
1,556,737,774 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,738,539 UART: [art] PUB.X = 58528659DDF9999253C843CB66F0D934AB4B7CB19C4A352FAE9FB6D01A63D02D20DBE9D6918C2CCF66A380091D743043
1,556,745,312 UART: [art] PUB.Y = 81F4BB2F78F710A76C7F134B851750AA0D423CF7B4B43A4651A143933F8B98EA67BA0B34EE6F5CE5F39505100A2202E9
1,556,752,251 UART: [art] SIG.R = 7ABCF23101307B235B6BE96A2890DE130216A7D3E3CF91C08DA6A75AB84676D5C0683E03C51DF565EE14E6BA8350C968
1,556,759,018 UART: [art] SIG.S = 15CB352B16F948F703346F7754A5021443C334A5122C0F1F39F75A41C81816C6EE79067F6E0C01AC85F29CBBF3E225B4
1,556,782,663 UART: Caliptra RT
1,556,782,917 UART: [state] CFI Enabled
1,557,063,218 UART: [rt] RT listening for mailbox commands...
1,557,063,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,064,680 UART:
1,557,064,696 UART: Running Caliptra ROM ...
1,557,065,104 UART:
1,557,065,159 UART: [state] CFI Enabled
1,557,068,059 UART: [state] LifecycleState = Unprovisioned
1,557,068,714 UART: [state] DebugLocked = No
1,557,069,198 UART: [state] WD Timer not started. Device not locked for debugging
1,557,070,454 UART: [kat] SHA2-256
1,557,874,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,557,878,133 UART: [kat] ++
1,557,878,285 UART: [kat] sha1
1,557,882,597 UART: [kat] SHA2-256
1,557,884,537 UART: [kat] SHA2-384
1,557,887,306 UART: [kat] SHA2-512-ACC
1,557,889,206 UART: [kat] ECC-384
1,557,898,513 UART: [kat] HMAC-384Kdf
1,557,903,045 UART: [kat] LMS
1,558,151,357 UART: [kat] --
1,558,152,255 UART: [update-reset] ++
1,559,463,953 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,465,010 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,559,614,876 >>> mbox cmd response: success
1,559,615,049 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,623,063 UART: [update-reset Success] --
1,559,623,956 UART: [state] Locking Datavault
1,559,624,860 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,625,464 UART: [state] Locking ICCM
1,559,625,930 UART: [exit] Launching FMC @ 0x40000130
1,559,631,259 UART:
1,559,631,275 UART: Running Caliptra FMC ...
1,559,631,683 UART:
1,559,631,737 UART: [state] CFI Enabled
1,559,720,806 UART: [art] Extend RT PCRs Done
1,559,721,234 UART: [art] Lock RT PCRs Done
1,559,722,249 UART: [art] Populate DV Done
1,559,730,432 UART: [fht] FMC Alias Private Key: 7
1,559,731,368 UART: [art] Derive CDI
1,559,731,648 UART: [art] Store in in slot 0x4
1,559,817,203 UART: [art] Derive Key Pair
1,559,817,563 UART: [art] Store priv key in slot 0x5
1,559,830,953 UART: [art] Derive Key Pair - Done
1,559,845,720 UART: [art] Signing Cert with AUTHO
1,559,846,200 UART: RITY.KEYID = 7
1,559,861,902 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,862,667 UART: [art] PUB.X = FD8B4756B727398D108A81DCD0130383E48BDFE42134C1AC0E5572E0D1F2CC5FCAA22107CEEB204C6CF6BB9D915A20DE
1,559,869,446 UART: [art] PUB.Y = 9C699A841C64B869E56F0E28C72AF3AF18CA77ECEC4D9B693C91195755DD2529CFAC60C0AEEE10CE5F6EC9EC1AAA212A
1,559,876,417 UART: [art] SIG.R = FDBA65D8AD82D74C0017B9287D1D3739C626C5FDAF50DB49BF24F1C3C158E9616C90B34E7EA37EA9CFD3499FA93F4812
1,559,883,181 UART: [art] SIG.S = 095533AC2BC0E376764B827D783EE1E25088BA06C4D8F74E3644929B492BABEA95848BBEDC2FABBC354DE06DF7B9460E
1,559,906,859 UART: Caliptra RT
1,559,907,113 UART: [state] CFI Enabled
1,560,191,046 UART: [rt] RT listening for mailbox commands...
1,560,191,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,192,844 UART:
1,560,192,860 UART: Running Caliptra ROM ...
1,560,193,268 UART:
1,560,193,323 UART: [state] CFI Enabled
1,560,195,651 UART: [state] LifecycleState = Unprovisioned
1,560,196,306 UART: [state] DebugLocked = No
1,560,196,948 UART: [state] WD Timer not started. Device not locked for debugging
1,560,198,122 UART: [kat] SHA2-256
1,561,001,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,005,801 UART: [kat] ++
1,561,005,953 UART: [kat] sha1
1,561,010,329 UART: [kat] SHA2-256
1,561,012,269 UART: [kat] SHA2-384
1,561,015,128 UART: [kat] SHA2-512-ACC
1,561,017,028 UART: [kat] ECC-384
1,561,026,329 UART: [kat] HMAC-384Kdf
1,561,030,807 UART: [kat] LMS
1,561,279,119 UART: [kat] --
1,561,279,963 UART: [update-reset] ++
1,562,592,157 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,593,158 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,562,743,024 >>> mbox cmd response: success
1,562,743,377 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,751,391 UART: [update-reset Success] --
1,562,752,326 UART: [state] Locking Datavault
1,562,752,926 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,753,530 UART: [state] Locking ICCM
1,562,754,100 UART: [exit] Launching FMC @ 0x40000130
1,562,759,429 UART:
1,562,759,445 UART: Running Caliptra FMC ...
1,562,759,853 UART:
1,562,759,907 UART: [state] CFI Enabled
1,562,849,056 UART: [art] Extend RT PCRs Done
1,562,849,484 UART: [art] Lock RT PCRs Done
1,562,850,479 UART: [art] Populate DV Done
1,562,858,446 UART: [fht] FMC Alias Private Key: 7
1,562,859,452 UART: [art] Derive CDI
1,562,859,732 UART: [art] Store in in slot 0x4
1,562,945,167 UART: [art] Derive Key Pair
1,562,945,527 UART: [art] Store priv key in slot 0x5
1,562,958,507 UART: [art] Derive Key Pair - Done
1,562,973,526 UART: [art] Signing Cert with AUTHO
1,562,974,006 UART: RITY.KEYID = 7
1,562,989,302 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,990,067 UART: [art] PUB.X = 58528659DDF9999253C843CB66F0D934AB4B7CB19C4A352FAE9FB6D01A63D02D20DBE9D6918C2CCF66A380091D743043
1,562,996,840 UART: [art] PUB.Y = 81F4BB2F78F710A76C7F134B851750AA0D423CF7B4B43A4651A143933F8B98EA67BA0B34EE6F5CE5F39505100A2202E9
1,563,003,779 UART: [art] SIG.R = 7ABCF23101307B235B6BE96A2890DE130216A7D3E3CF91C08DA6A75AB84676D5C0683E03C51DF565EE14E6BA8350C968
1,563,010,546 UART: [art] SIG.S = 15CB352B16F948F703346F7754A5021443C334A5122C0F1F39F75A41C81816C6EE79067F6E0C01AC85F29CBBF3E225B4
1,563,033,967 UART: Caliptra RT
1,563,034,221 UART: [state] CFI Enabled
1,563,313,652 UART: [rt] RT listening for mailbox commands...
1,563,314,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,315,138 UART:
1,563,315,154 UART: Running Caliptra ROM ...
1,563,315,562 UART:
1,563,315,617 UART: [state] CFI Enabled
1,563,318,237 UART: [state] LifecycleState = Unprovisioned
1,563,318,892 UART: [state] DebugLocked = No
1,563,319,482 UART: [state] WD Timer not started. Device not locked for debugging
1,563,320,626 UART: [kat] SHA2-256
1,564,124,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,128,305 UART: [kat] ++
1,564,128,457 UART: [kat] sha1
1,564,132,763 UART: [kat] SHA2-256
1,564,134,703 UART: [kat] SHA2-384
1,564,137,364 UART: [kat] SHA2-512-ACC
1,564,139,264 UART: [kat] ECC-384
1,564,148,931 UART: [kat] HMAC-384Kdf
1,564,153,591 UART: [kat] LMS
1,564,401,903 UART: [kat] --
1,564,402,843 UART: [update-reset] ++
1,565,714,625 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,715,620 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,565,865,486 >>> mbox cmd response: success
1,565,865,787 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,873,801 UART: [update-reset Success] --
1,565,874,752 UART: [state] Locking Datavault
1,565,875,494 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,876,098 UART: [state] Locking ICCM
1,565,876,670 UART: [exit] Launching FMC @ 0x40000130
1,565,881,999 UART:
1,565,882,015 UART: Running Caliptra FMC ...
1,565,882,423 UART:
1,565,882,477 UART: [state] CFI Enabled
1,565,971,102 UART: [art] Extend RT PCRs Done
1,565,971,530 UART: [art] Lock RT PCRs Done
1,565,972,709 UART: [art] Populate DV Done
1,565,980,846 UART: [fht] FMC Alias Private Key: 7
1,565,981,984 UART: [art] Derive CDI
1,565,982,264 UART: [art] Store in in slot 0x4
1,566,067,957 UART: [art] Derive Key Pair
1,566,068,317 UART: [art] Store priv key in slot 0x5
1,566,081,959 UART: [art] Derive Key Pair - Done
1,566,096,528 UART: [art] Signing Cert with AUTHO
1,566,097,008 UART: RITY.KEYID = 7
1,566,111,928 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,112,693 UART: [art] PUB.X = FD8B4756B727398D108A81DCD0130383E48BDFE42134C1AC0E5572E0D1F2CC5FCAA22107CEEB204C6CF6BB9D915A20DE
1,566,119,472 UART: [art] PUB.Y = 9C699A841C64B869E56F0E28C72AF3AF18CA77ECEC4D9B693C91195755DD2529CFAC60C0AEEE10CE5F6EC9EC1AAA212A
1,566,126,443 UART: [art] SIG.R = FDBA65D8AD82D74C0017B9287D1D3739C626C5FDAF50DB49BF24F1C3C158E9616C90B34E7EA37EA9CFD3499FA93F4812
1,566,133,207 UART: [art] SIG.S = 095533AC2BC0E376764B827D783EE1E25088BA06C4D8F74E3644929B492BABEA95848BBEDC2FABBC354DE06DF7B9460E
1,566,157,145 UART: Caliptra RT
1,566,157,399 UART: [state] CFI Enabled
1,566,439,216 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 314.47s
Truncated 733352 bytes from beginning
4 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,483,890,483 >>> mbox cmd response: success
1,483,903,827 UART:
1,483,903,843 UART: Running Caliptra FMC ...
1,483,904,251 UART:
1,483,904,305 UART: [state] CFI Enabled
1,483,992,678 UART: [art] Extend RT PCRs Done
1,483,993,106 UART: [art] Lock RT PCRs Done
1,483,994,359 UART: [art] Populate DV Done
1,484,002,588 UART: [fht] FMC Alias Private Key: 7
1,484,003,756 UART: [art] Derive CDI
1,484,004,036 UART: [art] Store in in slot 0x4
1,484,089,449 UART: [art] Derive Key Pair
1,484,089,809 UART: [art] Store priv key in slot 0x5
1,484,102,879 UART: [art] Derive Key Pair - Done
1,484,117,778 UART: [art] Signing Cert with AUTHO
1,484,118,258 UART: RITY.KEYID = 7
1,484,132,922 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,133,687 UART: [art] PUB.X = C9CAD79648B2B93EBA6FE3072968D5C4CB651F7ACB623B864222F5C27DD210F966919B316862FF1161A885D98B3FBB9A
1,484,140,462 UART: [art] PUB.Y = B9571E3265728C4E4A70B170966E067F4F8F1B839B2D431E4BB598D693AB865DEF093EDBB31244721090D2EB910DB477
1,484,147,403 UART: [art] SIG.R = 134E68CF82C6DB697E255B134BA6C242B0C8D1229A533FC031D0C2BCDF5C6220B4453D56C5B8153761EDE4A77AFA0586
1,484,154,178 UART: [art] SIG.S = 11929954C4C396E334E0E3AB6351C0EF7AD9D844313C4C45B955272AF5E1D6614765BA2158B844757CA37DD1CA4911E5
1,484,178,145 UART: Caliptra RT
1,484,178,399 UART: [state] CFI Enabled
1,484,460,226 UART: [rt] RT listening for mailbox commands...
1,484,460,896 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,894,908 >>> mbox cmd response: success
1,486,908,064 UART:
1,486,908,080 UART: Running Caliptra FMC ...
1,486,908,488 UART:
1,486,908,542 UART: [state] CFI Enabled
1,486,997,643 UART: [art] Extend RT PCRs Done
1,486,998,071 UART: [art] Lock RT PCRs Done
1,486,999,494 UART: [art] Populate DV Done
1,487,007,673 UART: [fht] FMC Alias Private Key: 7
1,487,008,607 UART: [art] Derive CDI
1,487,008,887 UART: [art] Store in in slot 0x4
1,487,094,704 UART: [art] Derive Key Pair
1,487,095,064 UART: [art] Store priv key in slot 0x5
1,487,108,270 UART: [art] Derive Key Pair - Done
1,487,123,095 UART: [art] Signing Cert with AUTHO
1,487,123,575 UART: RITY.KEYID = 7
1,487,138,427 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,139,192 UART: [art] PUB.X = F2E50FECA69DFE3297E000DC304AE42D726C0A4CCFB4955280A4BE3A32FAA40EB9855268563A5CFA1C6A381A56DA6AEF
1,487,145,953 UART: [art] PUB.Y = DD8F795342894EAFFACF669590FC70FC600C5950EC497CC68D6DD10D99FFA3C7B1ABEB5D95E80228E9B610BB71BDC618
1,487,152,914 UART: [art] SIG.R = 4F18E6FE7A123B5DC39C6A3B523157E6D7C1A5A1E1183CC9D1A2C28BCC8C0CD66C76A3BE3F5A2634F1593728E2B83584
1,487,159,693 UART: [art] SIG.S = B7A86D4D7C387A34BB21C32195BE2B0D8F9A3A31B8F358B1DE4FD1717290EDB2A7423CA0199450B4456ACCDAEEC0FFE2
1,487,183,085 UART: Caliptra RT
1,487,183,339 UART: [state] CFI Enabled
1,487,463,912 UART: [rt] RT listening for mailbox commands...
1,487,464,582 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,899,513 >>> mbox cmd response: success
1,489,912,961 UART:
1,489,912,977 UART: Running Caliptra FMC ...
1,489,913,385 UART:
1,489,913,439 UART: [state] CFI Enabled
1,490,002,572 UART: [art] Extend RT PCRs Done
1,490,003,000 UART: [art] Lock RT PCRs Done
1,490,004,119 UART: [art] Populate DV Done
1,490,012,300 UART: [fht] FMC Alias Private Key: 7
1,490,013,372 UART: [art] Derive CDI
1,490,013,652 UART: [art] Store in in slot 0x4
1,490,099,127 UART: [art] Derive Key Pair
1,490,099,487 UART: [art] Store priv key in slot 0x5
1,490,112,009 UART: [art] Derive Key Pair - Done
1,490,126,704 UART: [art] Signing Cert with AUTHO
1,490,127,184 UART: RITY.KEYID = 7
1,490,142,434 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,143,199 UART: [art] PUB.X = C9CAD79648B2B93EBA6FE3072968D5C4CB651F7ACB623B864222F5C27DD210F966919B316862FF1161A885D98B3FBB9A
1,490,149,974 UART: [art] PUB.Y = B9571E3265728C4E4A70B170966E067F4F8F1B839B2D431E4BB598D693AB865DEF093EDBB31244721090D2EB910DB477
1,490,156,915 UART: [art] SIG.R = 134E68CF82C6DB697E255B134BA6C242B0C8D1229A533FC031D0C2BCDF5C6220B4453D56C5B8153761EDE4A77AFA0586
1,490,163,690 UART: [art] SIG.S = 11929954C4C396E334E0E3AB6351C0EF7AD9D844313C4C45B955272AF5E1D6614765BA2158B844757CA37DD1CA4911E5
1,490,187,065 UART: Caliptra RT
1,490,187,319 UART: [state] CFI Enabled
1,490,471,722 UART: [rt] RT listening for mailbox commands...
1,490,472,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,905,240 >>> mbox cmd response: success
1,492,918,604 UART:
1,492,918,620 UART: Running Caliptra FMC ...
1,492,919,028 UART:
1,492,919,082 UART: [state] CFI Enabled
1,493,008,275 UART: [art] Extend RT PCRs Done
1,493,008,703 UART: [art] Lock RT PCRs Done
1,493,009,886 UART: [art] Populate DV Done
1,493,018,083 UART: [fht] FMC Alias Private Key: 7
1,493,019,087 UART: [art] Derive CDI
1,493,019,367 UART: [art] Store in in slot 0x4
1,493,105,440 UART: [art] Derive Key Pair
1,493,105,800 UART: [art] Store priv key in slot 0x5
1,493,118,640 UART: [art] Derive Key Pair - Done
1,493,133,395 UART: [art] Signing Cert with AUTHO
1,493,133,875 UART: RITY.KEYID = 7
1,493,149,087 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,149,852 UART: [art] PUB.X = F2E50FECA69DFE3297E000DC304AE42D726C0A4CCFB4955280A4BE3A32FAA40EB9855268563A5CFA1C6A381A56DA6AEF
1,493,156,613 UART: [art] PUB.Y = DD8F795342894EAFFACF669590FC70FC600C5950EC497CC68D6DD10D99FFA3C7B1ABEB5D95E80228E9B610BB71BDC618
1,493,163,574 UART: [art] SIG.R = 4F18E6FE7A123B5DC39C6A3B523157E6D7C1A5A1E1183CC9D1A2C28BCC8C0CD66C76A3BE3F5A2634F1593728E2B83584
1,493,170,353 UART: [art] SIG.S = B7A86D4D7C387A34BB21C32195BE2B0D8F9A3A31B8F358B1DE4FD1717290EDB2A7423CA0199450B4456ACCDAEEC0FFE2
1,493,193,879 UART: Caliptra RT
1,493,194,133 UART: [state] CFI Enabled
1,493,474,454 UART: [rt] RT listening for mailbox commands...
1,493,475,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,908,619 >>> mbox cmd response: success
1,495,921,593 UART:
1,495,921,609 UART: Running Caliptra FMC ...
1,495,922,017 UART:
1,495,922,071 UART: [state] CFI Enabled
1,496,011,292 UART: [art] Extend RT PCRs Done
1,496,011,720 UART: [art] Lock RT PCRs Done
1,496,012,959 UART: [art] Populate DV Done
1,496,021,178 UART: [fht] FMC Alias Private Key: 7
1,496,022,234 UART: [art] Derive CDI
1,496,022,514 UART: [art] Store in in slot 0x4
1,496,108,353 UART: [art] Derive Key Pair
1,496,108,713 UART: [art] Store priv key in slot 0x5
1,496,121,329 UART: [art] Derive Key Pair - Done
1,496,136,186 UART: [art] Signing Cert with AUTHO
1,496,136,666 UART: RITY.KEYID = 7
1,496,151,542 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,152,307 UART: [art] PUB.X = C9CAD79648B2B93EBA6FE3072968D5C4CB651F7ACB623B864222F5C27DD210F966919B316862FF1161A885D98B3FBB9A
1,496,159,082 UART: [art] PUB.Y = B9571E3265728C4E4A70B170966E067F4F8F1B839B2D431E4BB598D693AB865DEF093EDBB31244721090D2EB910DB477
1,496,166,023 UART: [art] SIG.R = 134E68CF82C6DB697E255B134BA6C242B0C8D1229A533FC031D0C2BCDF5C6220B4453D56C5B8153761EDE4A77AFA0586
1,496,172,798 UART: [art] SIG.S = 11929954C4C396E334E0E3AB6351C0EF7AD9D844313C4C45B955272AF5E1D6614765BA2158B844757CA37DD1CA4911E5
1,496,197,057 UART: Caliptra RT
1,496,197,311 UART: [state] CFI Enabled
1,496,481,872 UART: [rt] RT listening for mailbox commands...
1,496,482,542 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,915,370 >>> mbox cmd response: success
1,498,928,666 UART:
1,498,928,682 UART: Running Caliptra FMC ...
1,498,929,090 UART:
1,498,929,144 UART: [state] CFI Enabled
1,499,017,975 UART: [art] Extend RT PCRs Done
1,499,018,403 UART: [art] Lock RT PCRs Done
1,499,019,664 UART: [art] Populate DV Done
1,499,027,935 UART: [fht] FMC Alias Private Key: 7
1,499,029,043 UART: [art] Derive CDI
1,499,029,323 UART: [art] Store in in slot 0x4
1,499,115,276 UART: [art] Derive Key Pair
1,499,115,636 UART: [art] Store priv key in slot 0x5
1,499,128,220 UART: [art] Derive Key Pair - Done
1,499,143,007 UART: [art] Signing Cert with AUTHO
1,499,143,487 UART: RITY.KEYID = 7
1,499,158,509 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,159,274 UART: [art] PUB.X = F2E50FECA69DFE3297E000DC304AE42D726C0A4CCFB4955280A4BE3A32FAA40EB9855268563A5CFA1C6A381A56DA6AEF
1,499,166,035 UART: [art] PUB.Y = DD8F795342894EAFFACF669590FC70FC600C5950EC497CC68D6DD10D99FFA3C7B1ABEB5D95E80228E9B610BB71BDC618
1,499,172,996 UART: [art] SIG.R = 4F18E6FE7A123B5DC39C6A3B523157E6D7C1A5A1E1183CC9D1A2C28BCC8C0CD66C76A3BE3F5A2634F1593728E2B83584
1,499,179,775 UART: [art] SIG.S = B7A86D4D7C387A34BB21C32195BE2B0D8F9A3A31B8F358B1DE4FD1717290EDB2A7423CA0199450B4456ACCDAEEC0FFE2
1,499,203,541 UART: Caliptra RT
1,499,203,795 UART: [state] CFI Enabled
1,499,483,430 UART: [rt] RT listening for mailbox commands...
1,499,484,100 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,915,569 >>> mbox cmd response: success
1,501,928,709 UART:
1,501,928,725 UART: Running Caliptra FMC ...
1,501,929,133 UART:
1,501,929,187 UART: [state] CFI Enabled
1,502,018,304 UART: [art] Extend RT PCRs Done
1,502,018,732 UART: [art] Lock RT PCRs Done
1,502,019,969 UART: [art] Populate DV Done
1,502,027,872 UART: [fht] FMC Alias Private Key: 7
1,502,028,988 UART: [art] Derive CDI
1,502,029,268 UART: [art] Store in in slot 0x4
1,502,114,727 UART: [art] Derive Key Pair
1,502,115,087 UART: [art] Store priv key in slot 0x5
1,502,128,575 UART: [art] Derive Key Pair - Done
1,502,143,182 UART: [art] Signing Cert with AUTHO
1,502,143,662 UART: RITY.KEYID = 7
1,502,158,584 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,159,349 UART: [art] PUB.X = C9CAD79648B2B93EBA6FE3072968D5C4CB651F7ACB623B864222F5C27DD210F966919B316862FF1161A885D98B3FBB9A
1,502,166,124 UART: [art] PUB.Y = B9571E3265728C4E4A70B170966E067F4F8F1B839B2D431E4BB598D693AB865DEF093EDBB31244721090D2EB910DB477
1,502,173,065 UART: [art] SIG.R = 134E68CF82C6DB697E255B134BA6C242B0C8D1229A533FC031D0C2BCDF5C6220B4453D56C5B8153761EDE4A77AFA0586
1,502,179,840 UART: [art] SIG.S = 11929954C4C396E334E0E3AB6351C0EF7AD9D844313C4C45B955272AF5E1D6614765BA2158B844757CA37DD1CA4911E5
1,502,203,241 UART: Caliptra RT
1,502,203,495 UART: [state] CFI Enabled
1,502,487,736 UART: [rt] RT listening for mailbox commands...
1,502,488,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,921,652 >>> mbox cmd response: success
1,504,935,562 UART:
1,504,935,578 UART: Running Caliptra FMC ...
1,504,935,986 UART:
1,504,936,040 UART: [state] CFI Enabled
1,505,025,127 UART: [art] Extend RT PCRs Done
1,505,025,555 UART: [art] Lock RT PCRs Done
1,505,026,872 UART: [art] Populate DV Done
1,505,035,301 UART: [fht] FMC Alias Private Key: 7
1,505,036,419 UART: [art] Derive CDI
1,505,036,699 UART: [art] Store in in slot 0x4
1,505,122,672 UART: [art] Derive Key Pair
1,505,123,032 UART: [art] Store priv key in slot 0x5
1,505,136,036 UART: [art] Derive Key Pair - Done
1,505,150,935 UART: [art] Signing Cert with AUTHO
1,505,151,415 UART: RITY.KEYID = 7
1,505,166,381 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,167,146 UART: [art] PUB.X = F2E50FECA69DFE3297E000DC304AE42D726C0A4CCFB4955280A4BE3A32FAA40EB9855268563A5CFA1C6A381A56DA6AEF
1,505,173,907 UART: [art] PUB.Y = DD8F795342894EAFFACF669590FC70FC600C5950EC497CC68D6DD10D99FFA3C7B1ABEB5D95E80228E9B610BB71BDC618
1,505,180,868 UART: [art] SIG.R = 4F18E6FE7A123B5DC39C6A3B523157E6D7C1A5A1E1183CC9D1A2C28BCC8C0CD66C76A3BE3F5A2634F1593728E2B83584
1,505,187,647 UART: [art] SIG.S = B7A86D4D7C387A34BB21C32195BE2B0D8F9A3A31B8F358B1DE4FD1717290EDB2A7423CA0199450B4456ACCDAEEC0FFE2
1,505,211,245 UART: Caliptra RT
1,505,211,499 UART: [state] CFI Enabled
1,505,492,744 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 305.87s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,102,030 UART: [fht] FMC Alias Private Key: 7
1,554,102,974 UART: [art] Derive CDI
1,554,103,254 UART: [art] Store in in slot 0x4
1,554,189,209 UART: [art] Derive Key Pair
1,554,189,569 UART: [art] Store priv key in slot 0x5
1,554,202,893 UART: [art] Derive Key Pair - Done
1,554,217,803 UART: [art] Signing Cert with AUTHO
1,554,218,283 UART: RITY.KEYID = 7
1,554,233,705 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,234,470 UART: [art] PUB.X = 967DBFDBEB8891D6F7B70193492E4DFBDF1FAD420720F579EF4BD3FC3943F31B6010F8125463A1216E20495B82712ADF
1,554,241,242 UART: [art] PUB.Y = 3EDFC0F81C6937BB61EC32BD896B1ACB21D45D10110054FCD7727A9FA4D1B05C72C64FEAD1E19AAEFBC42AF8756314D9
1,554,248,192 UART: [art] SIG.R = 25D3C2546EFF651DB791B5627B7D4C5F4BE0045BA34DD4071FA13A67F5E043FFDBC2397058903B698F6A594D086BCDBA
1,554,254,965 UART: [art] SIG.S = 7CD3DFB3A727E07DBB03DA0B3036A519C4CDF0236C8A8B80AE6B006A537B06B3229B09D2E876AA9ED72D9660A20CBB24
1,554,278,581 UART: Caliptra RT
1,554,278,927 UART: [state] CFI Enabled
1,554,560,740 UART: [rt] RT listening for mailbox commands...
1,554,561,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,562,232 UART:
1,554,562,248 UART: Running Caliptra ROM ...
1,554,562,656 UART:
1,554,562,798 UART: [state] CFI Enabled
1,554,565,680 UART: [state] LifecycleState = Unprovisioned
1,554,566,335 UART: [state] DebugLocked = No
1,554,566,931 UART: [state] WD Timer not started. Device not locked for debugging
1,554,568,229 UART: [kat] SHA2-256
1,555,371,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,555,375,908 UART: [kat] ++
1,555,376,060 UART: [kat] sha1
1,555,380,330 UART: [kat] SHA2-256
1,555,382,270 UART: [kat] SHA2-384
1,555,385,085 UART: [kat] SHA2-512-ACC
1,555,386,985 UART: [kat] ECC-384
1,555,396,784 UART: [kat] HMAC-384Kdf
1,555,401,576 UART: [kat] LMS
1,555,649,888 UART: [kat] --
1,555,650,584 UART: [update-reset] ++
1,556,962,762 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,963,785 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,557,113,651 >>> mbox cmd response: success
1,557,113,772 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,121,786 UART: [update-reset Success] --
1,557,122,599 UART: [state] Locking Datavault
1,557,123,549 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,124,153 UART: [state] Locking ICCM
1,557,124,623 UART: [exit] Launching FMC @ 0x40000130
1,557,129,952 UART:
1,557,129,968 UART: Running Caliptra FMC ...
1,557,130,376 UART:
1,557,130,519 UART: [state] CFI Enabled
1,557,219,704 UART: [art] Extend RT PCRs Done
1,557,220,132 UART: [art] Lock RT PCRs Done
1,557,221,405 UART: [art] Populate DV Done
1,557,229,816 UART: [fht] FMC Alias Private Key: 7
1,557,230,846 UART: [art] Derive CDI
1,557,231,126 UART: [art] Store in in slot 0x4
1,557,316,887 UART: [art] Derive Key Pair
1,557,317,247 UART: [art] Store priv key in slot 0x5
1,557,331,043 UART: [art] Derive Key Pair - Done
1,557,346,178 UART: [art] Signing Cert with AUTHO
1,557,346,658 UART: RITY.KEYID = 7
1,557,361,826 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,362,591 UART: [art] PUB.X = 6F335805DE5699FD0D40E22F4A9821793D0A6B45262304D80B74EB5F4C4A5F3CEA0EADE482CEC1FBE917BE0796D92570
1,557,369,350 UART: [art] PUB.Y = 9578116C18C5FE3B44224AFA38D0AB32FB40110F4D758F4A7D0BD920A8590D44C9F2002115982690F1CB8A1EF075B28F
1,557,376,271 UART: [art] SIG.R = 20A840AD32E0894987F209BAA83720789AFC90E880DF79EA7855D5A1A3AF645D54C21560310E5C7CC3F4E0F3BEB72299
1,557,383,039 UART: [art] SIG.S = CF842E78DF0307DC88BB0ECAF7F323ADD452DF278D74F2FEAF49756CBF234CA0950953EE8D66E0119D9FCD221290C0D3
1,557,406,594 UART: Caliptra RT
1,557,406,940 UART: [state] CFI Enabled
1,557,685,193 UART: [rt] RT listening for mailbox commands...
1,557,685,863 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,686,689 UART:
1,557,686,705 UART: Running Caliptra ROM ...
1,557,687,113 UART:
1,557,687,255 UART: [state] CFI Enabled
1,557,690,061 UART: [state] LifecycleState = Unprovisioned
1,557,690,716 UART: [state] DebugLocked = No
1,557,691,424 UART: [state] WD Timer not started. Device not locked for debugging
1,557,692,672 UART: [kat] SHA2-256
1,558,496,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,558,500,351 UART: [kat] ++
1,558,500,503 UART: [kat] sha1
1,558,504,541 UART: [kat] SHA2-256
1,558,506,481 UART: [kat] SHA2-384
1,558,509,056 UART: [kat] SHA2-512-ACC
1,558,510,956 UART: [kat] ECC-384
1,558,520,957 UART: [kat] HMAC-384Kdf
1,558,525,551 UART: [kat] LMS
1,558,773,863 UART: [kat] --
1,558,774,699 UART: [update-reset] ++
1,560,086,969 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,088,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,560,238,042 >>> mbox cmd response: success
1,560,238,393 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,246,407 UART: [update-reset Success] --
1,560,247,568 UART: [state] Locking Datavault
1,560,248,202 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,248,806 UART: [state] Locking ICCM
1,560,249,464 UART: [exit] Launching FMC @ 0x40000130
1,560,254,793 UART:
1,560,254,809 UART: Running Caliptra FMC ...
1,560,255,217 UART:
1,560,255,360 UART: [state] CFI Enabled
1,560,344,375 UART: [art] Extend RT PCRs Done
1,560,344,803 UART: [art] Lock RT PCRs Done
1,560,346,178 UART: [art] Populate DV Done
1,560,354,237 UART: [fht] FMC Alias Private Key: 7
1,560,355,219 UART: [art] Derive CDI
1,560,355,499 UART: [art] Store in in slot 0x4
1,560,441,514 UART: [art] Derive Key Pair
1,560,441,874 UART: [art] Store priv key in slot 0x5
1,560,455,094 UART: [art] Derive Key Pair - Done
1,560,469,872 UART: [art] Signing Cert with AUTHO
1,560,470,352 UART: RITY.KEYID = 7
1,560,485,604 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,486,369 UART: [art] PUB.X = 967DBFDBEB8891D6F7B70193492E4DFBDF1FAD420720F579EF4BD3FC3943F31B6010F8125463A1216E20495B82712ADF
1,560,493,141 UART: [art] PUB.Y = 3EDFC0F81C6937BB61EC32BD896B1ACB21D45D10110054FCD7727A9FA4D1B05C72C64FEAD1E19AAEFBC42AF8756314D9
1,560,500,091 UART: [art] SIG.R = 25D3C2546EFF651DB791B5627B7D4C5F4BE0045BA34DD4071FA13A67F5E043FFDBC2397058903B698F6A594D086BCDBA
1,560,506,864 UART: [art] SIG.S = 7CD3DFB3A727E07DBB03DA0B3036A519C4CDF0236C8A8B80AE6B006A537B06B3229B09D2E876AA9ED72D9660A20CBB24
1,560,531,050 UART: Caliptra RT
1,560,531,396 UART: [state] CFI Enabled
1,560,816,063 UART: [rt] RT listening for mailbox commands...
1,560,816,733 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,817,503 UART:
1,560,817,519 UART: Running Caliptra ROM ...
1,560,817,927 UART:
1,560,818,069 UART: [state] CFI Enabled
1,560,820,633 UART: [state] LifecycleState = Unprovisioned
1,560,821,288 UART: [state] DebugLocked = No
1,560,821,796 UART: [state] WD Timer not started. Device not locked for debugging
1,560,823,078 UART: [kat] SHA2-256
1,561,626,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,561,630,757 UART: [kat] ++
1,561,630,909 UART: [kat] sha1
1,561,635,177 UART: [kat] SHA2-256
1,561,637,117 UART: [kat] SHA2-384
1,561,639,764 UART: [kat] SHA2-512-ACC
1,561,641,664 UART: [kat] ECC-384
1,561,651,467 UART: [kat] HMAC-384Kdf
1,561,656,193 UART: [kat] LMS
1,561,904,505 UART: [kat] --
1,561,905,491 UART: [update-reset] ++
1,563,218,703 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,219,902 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,563,369,768 >>> mbox cmd response: success
1,563,369,989 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,378,003 UART: [update-reset Success] --
1,563,378,814 UART: [state] Locking Datavault
1,563,379,666 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,380,270 UART: [state] Locking ICCM
1,563,380,880 UART: [exit] Launching FMC @ 0x40000130
1,563,386,209 UART:
1,563,386,225 UART: Running Caliptra FMC ...
1,563,386,633 UART:
1,563,386,776 UART: [state] CFI Enabled
1,563,475,653 UART: [art] Extend RT PCRs Done
1,563,476,081 UART: [art] Lock RT PCRs Done
1,563,477,378 UART: [art] Populate DV Done
1,563,485,725 UART: [fht] FMC Alias Private Key: 7
1,563,486,759 UART: [art] Derive CDI
1,563,487,039 UART: [art] Store in in slot 0x4
1,563,572,704 UART: [art] Derive Key Pair
1,563,573,064 UART: [art] Store priv key in slot 0x5
1,563,586,694 UART: [art] Derive Key Pair - Done
1,563,601,569 UART: [art] Signing Cert with AUTHO
1,563,602,049 UART: RITY.KEYID = 7
1,563,617,025 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,617,790 UART: [art] PUB.X = 6F335805DE5699FD0D40E22F4A9821793D0A6B45262304D80B74EB5F4C4A5F3CEA0EADE482CEC1FBE917BE0796D92570
1,563,624,549 UART: [art] PUB.Y = 9578116C18C5FE3B44224AFA38D0AB32FB40110F4D758F4A7D0BD920A8590D44C9F2002115982690F1CB8A1EF075B28F
1,563,631,470 UART: [art] SIG.R = 20A840AD32E0894987F209BAA83720789AFC90E880DF79EA7855D5A1A3AF645D54C21560310E5C7CC3F4E0F3BEB72299
1,563,638,238 UART: [art] SIG.S = CF842E78DF0307DC88BB0ECAF7F323ADD452DF278D74F2FEAF49756CBF234CA0950953EE8D66E0119D9FCD221290C0D3
1,563,661,763 UART: Caliptra RT
1,563,662,109 UART: [state] CFI Enabled
1,563,943,674 UART: [rt] RT listening for mailbox commands...
1,563,944,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,945,012 UART:
1,563,945,028 UART: Running Caliptra ROM ...
1,563,945,436 UART:
1,563,945,578 UART: [state] CFI Enabled
1,563,948,446 UART: [state] LifecycleState = Unprovisioned
1,563,949,101 UART: [state] DebugLocked = No
1,563,949,813 UART: [state] WD Timer not started. Device not locked for debugging
1,563,951,109 UART: [kat] SHA2-256
1,564,754,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,564,758,788 UART: [kat] ++
1,564,758,940 UART: [kat] sha1
1,564,763,152 UART: [kat] SHA2-256
1,564,765,092 UART: [kat] SHA2-384
1,564,767,817 UART: [kat] SHA2-512-ACC
1,564,769,717 UART: [kat] ECC-384
1,564,779,648 UART: [kat] HMAC-384Kdf
1,564,784,186 UART: [kat] LMS
1,565,032,498 UART: [kat] --
1,565,033,608 UART: [update-reset] ++
1,566,346,836 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,348,021 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
1,566,497,887 >>> mbox cmd response: success
1,566,497,992 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,506,006 UART: [update-reset Success] --
1,566,507,023 UART: [state] Locking Datavault
1,566,507,781 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,508,385 UART: [state] Locking ICCM
1,566,508,857 UART: [exit] Launching FMC @ 0x40000130
1,566,514,186 UART:
1,566,514,202 UART: Running Caliptra FMC ...
1,566,514,610 UART:
1,566,514,753 UART: [state] CFI Enabled
1,566,603,980 UART: [art] Extend RT PCRs Done
1,566,604,408 UART: [art] Lock RT PCRs Done
1,566,605,825 UART: [art] Populate DV Done
1,566,614,014 UART: [fht] FMC Alias Private Key: 7
1,566,615,032 UART: [art] Derive CDI
1,566,615,312 UART: [art] Store in in slot 0x4
1,566,700,363 UART: [art] Derive Key Pair
1,566,700,723 UART: [art] Store priv key in slot 0x5
1,566,714,289 UART: [art] Derive Key Pair - Done
1,566,729,349 UART: [art] Signing Cert with AUTHO
1,566,729,829 UART: RITY.KEYID = 7
1,566,744,745 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,745,510 UART: [art] PUB.X = 967DBFDBEB8891D6F7B70193492E4DFBDF1FAD420720F579EF4BD3FC3943F31B6010F8125463A1216E20495B82712ADF
1,566,752,282 UART: [art] PUB.Y = 3EDFC0F81C6937BB61EC32BD896B1ACB21D45D10110054FCD7727A9FA4D1B05C72C64FEAD1E19AAEFBC42AF8756314D9
1,566,759,232 UART: [art] SIG.R = 25D3C2546EFF651DB791B5627B7D4C5F4BE0045BA34DD4071FA13A67F5E043FFDBC2397058903B698F6A594D086BCDBA
1,566,766,005 UART: [art] SIG.S = 7CD3DFB3A727E07DBB03DA0B3036A519C4CDF0236C8A8B80AE6B006A537B06B3229B09D2E876AA9ED72D9660A20CBB24
1,566,789,699 UART: Caliptra RT
1,566,790,045 UART: [state] CFI Enabled
1,567,072,622 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 333.28s
Truncated 733352 bytes from beginning
0 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,435,550 >>> mbox cmd response: success
1,484,448,880 UART:
1,484,448,896 UART: Running Caliptra FMC ...
1,484,449,304 UART:
1,484,449,447 UART: [state] CFI Enabled
1,484,538,860 UART: [art] Extend RT PCRs Done
1,484,539,288 UART: [art] Lock RT PCRs Done
1,484,540,845 UART: [art] Populate DV Done
1,484,549,440 UART: [fht] FMC Alias Private Key: 7
1,484,550,496 UART: [art] Derive CDI
1,484,550,776 UART: [art] Store in in slot 0x4
1,484,636,271 UART: [art] Derive Key Pair
1,484,636,631 UART: [art] Store priv key in slot 0x5
1,484,649,675 UART: [art] Derive Key Pair - Done
1,484,664,459 UART: [art] Signing Cert with AUTHO
1,484,664,939 UART: RITY.KEYID = 7
1,484,680,099 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,680,864 UART: [art] PUB.X = 0D754A10FE4329E9E10BBD7935058BE66662E20296A5E7208BC0D0AD6602E64C879796D88907F8F4221CC76569886005
1,484,687,603 UART: [art] PUB.Y = 2D70855CEDC5C40A5AE3A803886DB2135E61ED9159BAA8CF563F3D350B311E833C8CE12E038A3A331BEAD1783FCF8001
1,484,694,550 UART: [art] SIG.R = BED5578E452DDD13B8DEA62D19A2B2B383D6BB29B20F2A8847DD9361EDA6E050B28E54F6C28B4F3AEE1A89D9AB581B23
1,484,701,337 UART: [art] SIG.S = E182FC56E205A365ABF2B1FBD49C5757F9A3620D861BF9BF3F329214BEB06E4B43B6D831A534FCBC7F5E7C7703927476
1,484,724,877 UART: Caliptra RT
1,484,725,223 UART: [state] CFI Enabled
1,485,006,273 UART: [rt] RT listening for mailbox commands...
1,485,006,943 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,439,855 >>> mbox cmd response: success
1,487,453,127 UART:
1,487,453,143 UART: Running Caliptra FMC ...
1,487,453,551 UART:
1,487,453,694 UART: [state] CFI Enabled
1,487,543,105 UART: [art] Extend RT PCRs Done
1,487,543,533 UART: [art] Lock RT PCRs Done
1,487,544,828 UART: [art] Populate DV Done
1,487,552,863 UART: [fht] FMC Alias Private Key: 7
1,487,553,849 UART: [art] Derive CDI
1,487,554,129 UART: [art] Store in in slot 0x4
1,487,639,528 UART: [art] Derive Key Pair
1,487,639,888 UART: [art] Store priv key in slot 0x5
1,487,653,944 UART: [art] Derive Key Pair - Done
1,487,668,379 UART: [art] Signing Cert with AUTHO
1,487,668,859 UART: RITY.KEYID = 7
1,487,684,185 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,684,950 UART: [art] PUB.X = 730D35A6334D221E553927839CFB9E171AA0489335981B42E755199BA9261EBFCC46A475A8D843E50CCE6C5A8B38B90A
1,487,691,711 UART: [art] PUB.Y = 526B8E1E6107B105D735C32F6D1B8221A38BCF6E49290CC162D82E8E183402A0AC4CDC8C0DAA86F2ADE1C1739082998E
1,487,698,654 UART: [art] SIG.R = 5F8D6ED662A9A785C03FE383B305F609FC1D999E1CD1044183C43F61032F6D7F56434E80A5EB49A1F9CC0846636B6EF0
1,487,705,413 UART: [art] SIG.S = E519068B24E117C559EE0B2F2267AE7CE040D2D276E41E2AE367F34F376BFDC208997C9AE405DA9504DEB5A89A8F1141
1,487,729,703 UART: Caliptra RT
1,487,730,049 UART: [state] CFI Enabled
1,488,010,476 UART: [rt] RT listening for mailbox commands...
1,488,011,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,445,588 >>> mbox cmd response: success
1,490,459,196 UART:
1,490,459,212 UART: Running Caliptra FMC ...
1,490,459,620 UART:
1,490,459,763 UART: [state] CFI Enabled
1,490,548,420 UART: [art] Extend RT PCRs Done
1,490,548,848 UART: [art] Lock RT PCRs Done
1,490,550,103 UART: [art] Populate DV Done
1,490,558,460 UART: [fht] FMC Alias Private Key: 7
1,490,559,588 UART: [art] Derive CDI
1,490,559,868 UART: [art] Store in in slot 0x4
1,490,646,041 UART: [art] Derive Key Pair
1,490,646,401 UART: [art] Store priv key in slot 0x5
1,490,659,231 UART: [art] Derive Key Pair - Done
1,490,674,365 UART: [art] Signing Cert with AUTHO
1,490,674,845 UART: RITY.KEYID = 7
1,490,690,173 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,690,938 UART: [art] PUB.X = 0D754A10FE4329E9E10BBD7935058BE66662E20296A5E7208BC0D0AD6602E64C879796D88907F8F4221CC76569886005
1,490,697,677 UART: [art] PUB.Y = 2D70855CEDC5C40A5AE3A803886DB2135E61ED9159BAA8CF563F3D350B311E833C8CE12E038A3A331BEAD1783FCF8001
1,490,704,624 UART: [art] SIG.R = BED5578E452DDD13B8DEA62D19A2B2B383D6BB29B20F2A8847DD9361EDA6E050B28E54F6C28B4F3AEE1A89D9AB581B23
1,490,711,411 UART: [art] SIG.S = E182FC56E205A365ABF2B1FBD49C5757F9A3620D861BF9BF3F329214BEB06E4B43B6D831A534FCBC7F5E7C7703927476
1,490,735,983 UART: Caliptra RT
1,490,736,329 UART: [state] CFI Enabled
1,491,020,935 UART: [rt] RT listening for mailbox commands...
1,491,021,605 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,455,677 >>> mbox cmd response: success
1,493,469,107 UART:
1,493,469,123 UART: Running Caliptra FMC ...
1,493,469,531 UART:
1,493,469,674 UART: [state] CFI Enabled
1,493,558,687 UART: [art] Extend RT PCRs Done
1,493,559,115 UART: [art] Lock RT PCRs Done
1,493,560,380 UART: [art] Populate DV Done
1,493,568,753 UART: [fht] FMC Alias Private Key: 7
1,493,569,777 UART: [art] Derive CDI
1,493,570,057 UART: [art] Store in in slot 0x4
1,493,656,126 UART: [art] Derive Key Pair
1,493,656,486 UART: [art] Store priv key in slot 0x5
1,493,669,472 UART: [art] Derive Key Pair - Done
1,493,684,119 UART: [art] Signing Cert with AUTHO
1,493,684,599 UART: RITY.KEYID = 7
1,493,699,629 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,700,394 UART: [art] PUB.X = 730D35A6334D221E553927839CFB9E171AA0489335981B42E755199BA9261EBFCC46A475A8D843E50CCE6C5A8B38B90A
1,493,707,155 UART: [art] PUB.Y = 526B8E1E6107B105D735C32F6D1B8221A38BCF6E49290CC162D82E8E183402A0AC4CDC8C0DAA86F2ADE1C1739082998E
1,493,714,098 UART: [art] SIG.R = 5F8D6ED662A9A785C03FE383B305F609FC1D999E1CD1044183C43F61032F6D7F56434E80A5EB49A1F9CC0846636B6EF0
1,493,720,857 UART: [art] SIG.S = E519068B24E117C559EE0B2F2267AE7CE040D2D276E41E2AE367F34F376BFDC208997C9AE405DA9504DEB5A89A8F1141
1,493,744,279 UART: Caliptra RT
1,493,744,625 UART: [state] CFI Enabled
1,494,025,764 UART: [rt] RT listening for mailbox commands...
1,494,026,434 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,461,010 >>> mbox cmd response: success
1,496,474,322 UART:
1,496,474,338 UART: Running Caliptra FMC ...
1,496,474,746 UART:
1,496,474,889 UART: [state] CFI Enabled
1,496,563,168 UART: [art] Extend RT PCRs Done
1,496,563,596 UART: [art] Lock RT PCRs Done
1,496,564,861 UART: [art] Populate DV Done
1,496,572,948 UART: [fht] FMC Alias Private Key: 7
1,496,574,126 UART: [art] Derive CDI
1,496,574,406 UART: [art] Store in in slot 0x4
1,496,659,953 UART: [art] Derive Key Pair
1,496,660,313 UART: [art] Store priv key in slot 0x5
1,496,673,715 UART: [art] Derive Key Pair - Done
1,496,688,359 UART: [art] Signing Cert with AUTHO
1,496,688,839 UART: RITY.KEYID = 7
1,496,704,207 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,704,972 UART: [art] PUB.X = 0D754A10FE4329E9E10BBD7935058BE66662E20296A5E7208BC0D0AD6602E64C879796D88907F8F4221CC76569886005
1,496,711,711 UART: [art] PUB.Y = 2D70855CEDC5C40A5AE3A803886DB2135E61ED9159BAA8CF563F3D350B311E833C8CE12E038A3A331BEAD1783FCF8001
1,496,718,658 UART: [art] SIG.R = BED5578E452DDD13B8DEA62D19A2B2B383D6BB29B20F2A8847DD9361EDA6E050B28E54F6C28B4F3AEE1A89D9AB581B23
1,496,725,445 UART: [art] SIG.S = E182FC56E205A365ABF2B1FBD49C5757F9A3620D861BF9BF3F329214BEB06E4B43B6D831A534FCBC7F5E7C7703927476
1,496,749,213 UART: Caliptra RT
1,496,749,559 UART: [state] CFI Enabled
1,497,033,073 UART: [rt] RT listening for mailbox commands...
1,497,033,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,467,611 >>> mbox cmd response: success
1,499,480,947 UART:
1,499,480,963 UART: Running Caliptra FMC ...
1,499,481,371 UART:
1,499,481,514 UART: [state] CFI Enabled
1,499,570,539 UART: [art] Extend RT PCRs Done
1,499,570,967 UART: [art] Lock RT PCRs Done
1,499,572,240 UART: [art] Populate DV Done
1,499,580,391 UART: [fht] FMC Alias Private Key: 7
1,499,581,523 UART: [art] Derive CDI
1,499,581,803 UART: [art] Store in in slot 0x4
1,499,667,144 UART: [art] Derive Key Pair
1,499,667,504 UART: [art] Store priv key in slot 0x5
1,499,680,728 UART: [art] Derive Key Pair - Done
1,499,695,179 UART: [art] Signing Cert with AUTHO
1,499,695,659 UART: RITY.KEYID = 7
1,499,711,073 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,711,838 UART: [art] PUB.X = 730D35A6334D221E553927839CFB9E171AA0489335981B42E755199BA9261EBFCC46A475A8D843E50CCE6C5A8B38B90A
1,499,718,599 UART: [art] PUB.Y = 526B8E1E6107B105D735C32F6D1B8221A38BCF6E49290CC162D82E8E183402A0AC4CDC8C0DAA86F2ADE1C1739082998E
1,499,725,542 UART: [art] SIG.R = 5F8D6ED662A9A785C03FE383B305F609FC1D999E1CD1044183C43F61032F6D7F56434E80A5EB49A1F9CC0846636B6EF0
1,499,732,301 UART: [art] SIG.S = E519068B24E117C559EE0B2F2267AE7CE040D2D276E41E2AE367F34F376BFDC208997C9AE405DA9504DEB5A89A8F1141
1,499,755,711 UART: Caliptra RT
1,499,756,057 UART: [state] CFI Enabled
1,500,036,702 UART: [rt] RT listening for mailbox commands...
1,500,037,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,470,908 >>> mbox cmd response: success
1,502,484,380 UART:
1,502,484,396 UART: Running Caliptra FMC ...
1,502,484,804 UART:
1,502,484,947 UART: [state] CFI Enabled
1,502,573,778 UART: [art] Extend RT PCRs Done
1,502,574,206 UART: [art] Lock RT PCRs Done
1,502,575,593 UART: [art] Populate DV Done
1,502,583,956 UART: [fht] FMC Alias Private Key: 7
1,502,584,968 UART: [art] Derive CDI
1,502,585,248 UART: [art] Store in in slot 0x4
1,502,670,687 UART: [art] Derive Key Pair
1,502,671,047 UART: [art] Store priv key in slot 0x5
1,502,684,257 UART: [art] Derive Key Pair - Done
1,502,698,915 UART: [art] Signing Cert with AUTHO
1,502,699,395 UART: RITY.KEYID = 7
1,502,714,457 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,715,222 UART: [art] PUB.X = 0D754A10FE4329E9E10BBD7935058BE66662E20296A5E7208BC0D0AD6602E64C879796D88907F8F4221CC76569886005
1,502,721,961 UART: [art] PUB.Y = 2D70855CEDC5C40A5AE3A803886DB2135E61ED9159BAA8CF563F3D350B311E833C8CE12E038A3A331BEAD1783FCF8001
1,502,728,908 UART: [art] SIG.R = BED5578E452DDD13B8DEA62D19A2B2B383D6BB29B20F2A8847DD9361EDA6E050B28E54F6C28B4F3AEE1A89D9AB581B23
1,502,735,695 UART: [art] SIG.S = E182FC56E205A365ABF2B1FBD49C5757F9A3620D861BF9BF3F329214BEB06E4B43B6D831A534FCBC7F5E7C7703927476
1,502,759,539 UART: Caliptra RT
1,502,759,885 UART: [state] CFI Enabled
1,503,043,929 UART: [rt] RT listening for mailbox commands...
1,503,044,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,478,235 >>> mbox cmd response: success
1,505,491,319 UART:
1,505,491,335 UART: Running Caliptra FMC ...
1,505,491,743 UART:
1,505,491,886 UART: [state] CFI Enabled
1,505,581,599 UART: [art] Extend RT PCRs Done
1,505,582,027 UART: [art] Lock RT PCRs Done
1,505,583,304 UART: [art] Populate DV Done
1,505,591,849 UART: [fht] FMC Alias Private Key: 7
1,505,592,825 UART: [art] Derive CDI
1,505,593,105 UART: [art] Store in in slot 0x4
1,505,679,086 UART: [art] Derive Key Pair
1,505,679,446 UART: [art] Store priv key in slot 0x5
1,505,692,516 UART: [art] Derive Key Pair - Done
1,505,707,355 UART: [art] Signing Cert with AUTHO
1,505,707,835 UART: RITY.KEYID = 7
1,505,723,091 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,723,856 UART: [art] PUB.X = 730D35A6334D221E553927839CFB9E171AA0489335981B42E755199BA9261EBFCC46A475A8D843E50CCE6C5A8B38B90A
1,505,730,617 UART: [art] PUB.Y = 526B8E1E6107B105D735C32F6D1B8221A38BCF6E49290CC162D82E8E183402A0AC4CDC8C0DAA86F2ADE1C1739082998E
1,505,737,560 UART: [art] SIG.R = 5F8D6ED662A9A785C03FE383B305F609FC1D999E1CD1044183C43F61032F6D7F56434E80A5EB49A1F9CC0846636B6EF0
1,505,744,319 UART: [art] SIG.S = E519068B24E117C559EE0B2F2267AE7CE040D2D276E41E2AE367F34F376BFDC208997C9AE405DA9504DEB5A89A8F1141
1,505,767,755 UART: Caliptra RT
1,505,768,101 UART: [state] CFI Enabled
1,506,050,670 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 312.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
192,582 UART:
192,983 UART: Running Caliptra ROM ...
194,099 UART:
194,244 UART: [state] CFI Enabled
265,351 UART: [state] LifecycleState = Unprovisioned
267,322 UART: [state] DebugLocked = No
269,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,999 UART: [kat] SHA2-256
443,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,216 UART: [kat] ++
454,684 UART: [kat] sha1
466,047 UART: [kat] SHA2-256
468,692 UART: [kat] SHA2-384
475,032 UART: [kat] SHA2-512-ACC
477,395 UART: [kat] ECC-384
2,768,081 UART: [kat] HMAC-384Kdf
2,794,008 UART: [kat] LMS
3,984,271 UART: [kat] --
3,987,775 UART: [cold-reset] ++
3,990,339 UART: [fht] Storing FHT @ 0x50003400
4,000,457 UART: [idev] ++
4,001,016 UART: [idev] CDI.KEYID = 6
4,001,974 UART: [idev] SUBJECT.KEYID = 7
4,003,208 UART: [idev] UDS.KEYID = 0
4,004,292 ready_for_fw is high
4,004,512 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,148,614 UART: [idev] Erasing UDS.KEYID = 0
7,342,993 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,623 UART: [idev] --
7,367,073 UART: [ldev] ++
7,367,642 UART: [ldev] CDI.KEYID = 6
7,368,569 UART: [ldev] SUBJECT.KEYID = 5
7,369,825 UART: [ldev] AUTHORITY.KEYID = 7
7,371,325 UART: [ldev] FE.KEYID = 1
7,417,490 UART: [ldev] Erasing FE.KEYID = 1
10,745,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,668 UART: [ldev] --
13,110,987 UART: [fwproc] Waiting for Commands...
13,113,019 UART: [fwproc] Received command 0x46574c44
13,115,196 UART: [fwproc] Received Image of size 114036 bytes
17,170,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,016 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,636,636 >>> mbox cmd response: success
17,637,183 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,780,618 UART: [afmc] ++
17,781,254 UART: [afmc] CDI.KEYID = 6
17,782,140 UART: [afmc] SUBJECT.KEYID = 7
17,783,150 UART: [afmc] AUTHORITY.KEYID = 5
21,003,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,542 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,954 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,776 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,227 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,215 UART: [afmc] --
23,373,279 UART: [cold-reset] --
23,377,777 UART: [state] Locking Datavault
23,381,084 UART: [state] Locking PCR0, PCR1 and PCR31
23,382,785 UART: [state] Locking ICCM
23,384,822 UART: [exit] Launching FMC @ 0x40000130
23,393,218 UART:
23,393,457 UART: Running Caliptra FMC ...
23,394,595 UART:
23,394,753 UART: [state] CFI Enabled
23,451,819 UART: [fht] FMC Alias Private Key: 7
25,790,717 UART: [art] Extend RT PCRs Done
25,791,961 UART: [art] Lock RT PCRs Done
25,793,686 UART: [art] Populate DV Done
25,799,317 UART: [fht] FMC Alias Private Key: 7
25,800,904 UART: [art] Derive CDI
25,801,719 UART: [art] Store in in slot 0x4
25,860,679 UART: [art] Derive Key Pair
25,861,715 UART: [art] Store priv key in slot 0x5
29,154,734 UART: [art] Derive Key Pair - Done
29,167,577 UART: [art] Signing Cert with AUTHO
29,168,873 UART: RITY.KEYID = 7
31,456,094 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,625 UART: [art] PUB.X = 8F4643BBDBC91F2B46B2E8D4D3C08AF19C54908810299FD677C72502F35286309814CB7E2679EB82313CE8D5ACFE2217
31,464,864 UART: [art] PUB.Y = 80D2FDC5621B76269119423020E2C5D73D6AB390F3873854432C5F3D8357D0512E1737A7F371A27B65B0B993088AE11B
31,472,080 UART: [art] SIG.R = B808693F1505149ECE8E1C75439BB7E6CCBAE4BF88209F1B5DBEB059F50AC0A330EC217707C0A4943AB4B942682986DA
31,479,475 UART: [art] SIG.S = 0CD70DC2A63868B872A44B580D47E4555B60A949E408FD80A59F7E2AFB7697C91820340AC69D326384004E946A72A938
32,784,169 UART: Caliptra RT
32,784,859 UART: [state] CFI Enabled
32,947,467 UART: [rt] RT listening for mailbox commands...
32,950,050 UART:
32,950,221 UART: Running Caliptra ROM ...
32,951,263 UART:
32,951,402 UART: [state] CFI Enabled
33,015,717 UART: [state] LifecycleState = Unprovisioned
33,017,648 UART: [state] DebugLocked = No
33,019,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,024,335 UART: [kat] SHA2-256
33,194,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,204,502 UART: [kat] ++
33,205,088 UART: [kat] sha1
33,216,193 UART: [kat] SHA2-256
33,218,865 UART: [kat] SHA2-384
33,224,102 UART: [kat] SHA2-512-ACC
33,226,499 UART: [kat] ECC-384
35,516,451 UART: [kat] HMAC-384Kdf
35,529,053 UART: [kat] LMS
36,719,346 UART: [kat] --
36,724,251 UART: [update-reset] ++
40,860,250 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,864,734 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
41,246,684 >>> mbox cmd response: success
41,247,416 UART: [update-reset] Copying MAN_2 To MAN_1
41,269,859 UART: [update-reset Success] --
41,273,179 UART: [state] Locking Datavault
41,277,339 UART: [state] Locking PCR0, PCR1 and PCR31
41,279,089 UART: [state] Locking ICCM
41,280,183 UART: [exit] Launching FMC @ 0x40000130
41,288,568 UART:
41,288,796 UART: Running Caliptra FMC ...
41,289,891 UART:
41,290,044 UART: [state] CFI Enabled
41,385,722 UART: [art] Extend RT PCRs Done
41,386,914 UART: [art] Lock RT PCRs Done
41,388,316 UART: [art] Populate DV Done
41,393,665 UART: [fht] FMC Alias Private Key: 7
41,395,301 UART: [art] Derive CDI
41,396,110 UART: [art] Store in in slot 0x4
41,454,978 UART: [art] Derive Key Pair
41,456,018 UART: [art] Store priv key in slot 0x5
44,748,388 UART: [art] Derive Key Pair - Done
44,761,494 UART: [art] Signing Cert with AUTHO
44,762,796 UART: RITY.KEYID = 7
47,049,925 UART: [art] Erasing AUTHORITY.KEYID = 7
47,051,573 UART: [art] PUB.X = 09AF45EDEBD036C1BFE43287C36C508FE8557B9220A7972F78F6FDD57177D5C3ED911F444AF2C27C209BE8335F8AE47B
47,058,632 UART: [art] PUB.Y = 774963A29A8C7720516B4CE11E2A54BC1574ABE7B97AC0D819ECF78DE14CEB5D5F185ED9181CB122EDD883864C14A837
47,065,900 UART: [art] SIG.R = 8DEC797C5891FA9BB2B4E8F9389458116B37551D497B41FB70E2BED7132F57C04EA223F570B447D455B889511AB31CAE
47,073,271 UART: [art] SIG.S = 817A7AB768869F552C85F947EFC438E1943877AA2165127F1B57675836A935233D69EAACB3FD065CD5472674E459FC34
48,378,484 UART: Caliptra RT
48,379,196 UART: [state] CFI Enabled
48,708,430 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,784,823 ready_for_fw is high
3,785,266 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,856,395 >>> mbox cmd response: success
17,856,993 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,543,496 UART:
23,543,883 UART: Running Caliptra FMC ...
23,545,033 UART:
23,545,186 UART: [state] CFI Enabled
23,595,679 UART: [fht] FMC Alias Private Key: 7
25,933,523 UART: [art] Extend RT PCRs Done
25,934,752 UART: [art] Lock RT PCRs Done
25,936,347 UART: [art] Populate DV Done
25,941,698 UART: [fht] FMC Alias Private Key: 7
25,943,231 UART: [art] Derive CDI
25,944,041 UART: [art] Store in in slot 0x4
26,003,557 UART: [art] Derive Key Pair
26,004,608 UART: [art] Store priv key in slot 0x5
29,296,865 UART: [art] Derive Key Pair - Done
29,309,813 UART: [art] Signing Cert with AUTHO
29,311,121 UART: RITY.KEYID = 7
31,599,319 UART: [art] Erasing AUTHORITY.KEYID = 7
31,600,819 UART: [art] PUB.X = EDD75C21A88BC992CB3B39F18B7AA485DEF21BFB10E13F5B0998012347964343172D996B0EB7DBDE2FBDC42C8FEA821E
31,608,151 UART: [art] PUB.Y = D9BFFB6C8236D50B1CAD2EB74F53C92B5BBCF6E83D71A0A943557C60A4061B812857692079EB0C330C24A09AFE3F5CB2
31,615,363 UART: [art] SIG.R = 70712710A9EE1EF53AC38111540101AB3BD784783F85F4B52219331E0AC6FF85B9DDF6D5EA99EC77D8FE5C549A18D47D
31,622,759 UART: [art] SIG.S = 5EDCDBA30E97EAF31960AF4126B8F093EF55297FC5DFA5B6A05DA4CEAAA0592888C78BC6D9DCEA9C4ECD2AD3C123F3AF
32,927,713 UART: Caliptra RT
32,928,428 UART: [state] CFI Enabled
33,089,370 UART: [rt] RT listening for mailbox commands...
41,663,304 >>> mbox cmd response: success
41,699,565 UART:
41,699,835 UART: Running Caliptra FMC ...
41,700,886 UART:
41,701,031 UART: [state] CFI Enabled
41,802,935 UART: [art] Extend RT PCRs Done
41,804,111 UART: [art] Lock RT PCRs Done
41,805,367 UART: [art] Populate DV Done
41,810,997 UART: [fht] FMC Alias Private Key: 7
41,812,627 UART: [art] Derive CDI
41,813,380 UART: [art] Store in in slot 0x4
41,871,874 UART: [art] Derive Key Pair
41,872,865 UART: [art] Store priv key in slot 0x5
45,165,720 UART: [art] Derive Key Pair - Done
45,178,712 UART: [art] Signing Cert with AUTHO
45,180,039 UART: RITY.KEYID = 7
47,466,909 UART: [art] Erasing AUTHORITY.KEYID = 7
47,468,412 UART: [art] PUB.X = 4B58CB91C01918035209C58964C72F0C3EF4833406E487C8176E4F083B97CDBA78B12D418223F7F413A8C8391C6676D8
47,475,595 UART: [art] PUB.Y = 49E49685E40A63A97BFABC97137806660B6D41864036BB9A5A9DEDE3C82B0FFD1C1CB8A46D50E970B3F96B5AFA5EB262
47,482,870 UART: [art] SIG.R = 0045D96F49FB0AF076F6E3DDECFE23BF7E6462F5A11177E2C1A01E60D360835E6F07CB6BAD3BAD05AF00949D6B01ADB7
47,490,282 UART: [art] SIG.S = 0EFF27810907F3FECF63CFDAE16A86231C33A3441869C2E92B99E2A41A393B1CE71B29465E54F42ECD6B9ACB4215DF20
48,795,491 UART: Caliptra RT
48,796,184 UART: [state] CFI Enabled
49,124,958 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,325 UART:
192,676 UART: Running Caliptra ROM ...
193,796 UART:
603,496 UART: [state] CFI Enabled
617,461 UART: [state] LifecycleState = Unprovisioned
619,370 UART: [state] DebugLocked = No
621,749 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,895 UART: [kat] SHA2-256
796,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,158 UART: [kat] ++
807,631 UART: [kat] sha1
817,937 UART: [kat] SHA2-256
820,664 UART: [kat] SHA2-384
826,672 UART: [kat] SHA2-512-ACC
829,046 UART: [kat] ECC-384
3,112,372 UART: [kat] HMAC-384Kdf
3,124,254 UART: [kat] LMS
4,314,365 UART: [kat] --
4,318,582 UART: [cold-reset] ++
4,320,261 UART: [fht] Storing FHT @ 0x50003400
4,333,165 UART: [idev] ++
4,333,729 UART: [idev] CDI.KEYID = 6
4,334,759 UART: [idev] SUBJECT.KEYID = 7
4,335,927 UART: [idev] UDS.KEYID = 0
4,337,067 ready_for_fw is high
4,337,305 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,631 UART: [idev] Erasing UDS.KEYID = 0
7,629,346 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,500 UART: [idev] --
7,654,832 UART: [ldev] ++
7,655,405 UART: [ldev] CDI.KEYID = 6
7,656,420 UART: [ldev] SUBJECT.KEYID = 5
7,657,580 UART: [ldev] AUTHORITY.KEYID = 7
7,658,864 UART: [ldev] FE.KEYID = 1
7,669,670 UART: [ldev] Erasing FE.KEYID = 1
10,956,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,762 UART: [ldev] --
13,316,248 UART: [fwproc] Waiting for Commands...
13,318,622 UART: [fwproc] Received command 0x46574c44
13,320,804 UART: [fwproc] Received Image of size 114036 bytes
17,367,465 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,230 >>> mbox cmd response: success
17,833,811 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,977,142 UART: [afmc] ++
17,977,787 UART: [afmc] CDI.KEYID = 6
17,978,672 UART: [afmc] SUBJECT.KEYID = 7
17,979,690 UART: [afmc] AUTHORITY.KEYID = 5
21,155,617 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,856 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,257 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,092 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,532 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,027 UART: [afmc] --
23,518,898 UART: [cold-reset] --
23,523,301 UART: [state] Locking Datavault
23,527,203 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,966 UART: [state] Locking ICCM
23,530,310 UART: [exit] Launching FMC @ 0x40000130
23,538,707 UART:
23,538,940 UART: Running Caliptra FMC ...
23,540,044 UART:
23,540,203 UART: [state] CFI Enabled
23,548,304 UART: [fht] FMC Alias Private Key: 7
25,878,995 UART: [art] Extend RT PCRs Done
25,880,214 UART: [art] Lock RT PCRs Done
25,882,080 UART: [art] Populate DV Done
25,887,549 UART: [fht] FMC Alias Private Key: 7
25,889,085 UART: [art] Derive CDI
25,889,850 UART: [art] Store in in slot 0x4
25,932,561 UART: [art] Derive Key Pair
25,933,618 UART: [art] Store priv key in slot 0x5
29,176,117 UART: [art] Derive Key Pair - Done
29,189,110 UART: [art] Signing Cert with AUTHO
29,190,406 UART: RITY.KEYID = 7
31,469,751 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,256 UART: [art] PUB.X = D1FA67DE287A1F164F882DE8FA2D98D86D64F782E361409AAE2C7E964ECB923E51E5B7118F6A950FD30EE654DA8C9B73
31,478,498 UART: [art] PUB.Y = 74E1C15BFEB6DCE08F9F47563BD4FC41215BD61FC663FDA0B77369E68BEEE9114E37DB7D17E6F254451C84A9E992CB5C
31,485,727 UART: [art] SIG.R = F2CF13CA78F9648DD1E3D9C12842E36146905D8C7F811A828F92980D570694CAA3D3C6BE633CBEB67DD490E6EDCF95E8
31,493,118 UART: [art] SIG.S = 25EEB07989ED7FB4C26360709FAD86F1913DAD7BA5EA5F0BD2B2C684946B370A7A3827B0322C50C1943B61F826AA8AA0
32,799,157 UART: Caliptra RT
32,799,877 UART: [state] CFI Enabled
32,916,689 UART: [rt] RT listening for mailbox commands...
32,919,490 UART:
32,919,685 UART: Running Caliptra ROM ...
32,920,731 UART:
32,921,150 UART: [state] CFI Enabled
32,933,708 UART: [state] LifecycleState = Unprovisioned
32,935,589 UART: [state] DebugLocked = No
32,937,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,941,939 UART: [kat] SHA2-256
33,111,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,122,178 UART: [kat] ++
33,122,638 UART: [kat] sha1
33,134,978 UART: [kat] SHA2-256
33,137,674 UART: [kat] SHA2-384
33,142,903 UART: [kat] SHA2-512-ACC
33,145,301 UART: [kat] ECC-384
35,429,919 UART: [kat] HMAC-384Kdf
35,442,023 UART: [kat] LMS
36,632,086 UART: [kat] --
36,637,008 UART: [update-reset] ++
40,771,885 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,776,333 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
41,158,298 >>> mbox cmd response: success
41,158,697 UART: [update-reset] Copying MAN_2 To MAN_1
41,181,131 UART: [update-reset Success] --
41,184,282 UART: [state] Locking Datavault
41,186,774 UART: [state] Locking PCR0, PCR1 and PCR31
41,188,532 UART: [state] Locking ICCM
41,189,600 UART: [exit] Launching FMC @ 0x40000130
41,198,048 UART:
41,198,285 UART: Running Caliptra FMC ...
41,199,590 UART:
41,199,767 UART: [state] CFI Enabled
41,244,159 UART: [art] Extend RT PCRs Done
41,245,305 UART: [art] Lock RT PCRs Done
41,246,589 UART: [art] Populate DV Done
41,251,937 UART: [fht] FMC Alias Private Key: 7
41,253,495 UART: [art] Derive CDI
41,254,308 UART: [art] Store in in slot 0x4
41,296,692 UART: [art] Derive Key Pair
41,297,730 UART: [art] Store priv key in slot 0x5
44,539,829 UART: [art] Derive Key Pair - Done
44,552,607 UART: [art] Signing Cert with AUTHO
44,553,903 UART: RITY.KEYID = 7
46,833,609 UART: [art] Erasing AUTHORITY.KEYID = 7
46,835,117 UART: [art] PUB.X = 540A4B1855C1CD72816706DA5151D4D58FF714E0F0F6B6720657435F15CCD6F2D282B71F47475DB044119843F54F6AB9
46,842,342 UART: [art] PUB.Y = EE7F15E7C4F7A0973CF0A3C63D11A0B58E5D7CFB583115D2A15D32BD0898D5CD625E8CBAADC30C92B31D721982FF7DD5
46,849,609 UART: [art] SIG.R = 290FF3CCB7E77254A0C5290B922FF6B4E6CEB42A0FF0AD9E80A88E4DC525F676970BF0C87C9434CC62AAE9A2CB61CA9D
46,857,031 UART: [art] SIG.S = CC2F14B1F7061CCDACBD09FE0E7C94A31DA1898B79F386023E49B2CB5AB9E3FAE6E234C890C4A6281423583930A9036D
48,162,678 UART: Caliptra RT
48,163,381 UART: [state] CFI Enabled
48,452,167 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,121,834 ready_for_fw is high
4,122,445 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,066,808 >>> mbox cmd response: success
18,067,499 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,709,408 UART:
23,709,812 UART: Running Caliptra FMC ...
23,710,974 UART:
23,711,128 UART: [state] CFI Enabled
23,718,799 UART: [fht] FMC Alias Private Key: 7
26,049,473 UART: [art] Extend RT PCRs Done
26,050,703 UART: [art] Lock RT PCRs Done
26,052,168 UART: [art] Populate DV Done
26,057,647 UART: [fht] FMC Alias Private Key: 7
26,059,216 UART: [art] Derive CDI
26,060,037 UART: [art] Store in in slot 0x4
26,102,570 UART: [art] Derive Key Pair
26,103,612 UART: [art] Store priv key in slot 0x5
29,345,792 UART: [art] Derive Key Pair - Done
29,358,675 UART: [art] Signing Cert with AUTHO
29,360,019 UART: RITY.KEYID = 7
31,639,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,243 UART: [art] PUB.X = 7E508FB23A36FB35BA1C6E5FD38205E6E0AED4A9535B6C0EF09C28B9A9B07DF910A7C6D724AD75AE9CC8E548A6994B1A
31,648,465 UART: [art] PUB.Y = 858E07A0C34C1AB22A7A5CB2623CFBC1206F93F16D2A363A57C91A65651D6F60B99C99F60D76F1AD6E238F7B749E676C
31,655,731 UART: [art] SIG.R = 5E5BF830AA4BA091503D00F5853E8892361EBE0007A032C60C859EA246FE5C9EA7FC07EEA980F180EC3E4FFD0FE32AA0
31,663,118 UART: [art] SIG.S = 06996F9B246FD5B5A5040159167DBB076EF645F1E17B86379CA431BCE2EB40DB151762548BC760A2C0709D3DAC1B2BA3
32,968,343 UART: Caliptra RT
32,969,055 UART: [state] CFI Enabled
33,086,015 UART: [rt] RT listening for mailbox commands...
41,596,798 >>> mbox cmd response: success
41,631,431 UART:
41,631,704 UART: Running Caliptra FMC ...
41,632,820 UART:
41,632,980 UART: [state] CFI Enabled
41,676,679 UART: [art] Extend RT PCRs Done
41,677,868 UART: [art] Lock RT PCRs Done
41,679,435 UART: [art] Populate DV Done
41,684,799 UART: [fht] FMC Alias Private Key: 7
41,686,285 UART: [art] Derive CDI
41,687,049 UART: [art] Store in in slot 0x4
41,729,967 UART: [art] Derive Key Pair
41,730,965 UART: [art] Store priv key in slot 0x5
44,972,594 UART: [art] Derive Key Pair - Done
44,985,758 UART: [art] Signing Cert with AUTHO
44,987,066 UART: RITY.KEYID = 7
47,266,931 UART: [art] Erasing AUTHORITY.KEYID = 7
47,268,455 UART: [art] PUB.X = 99A6DE094EC4239AE5C46777ED96C912ACDD05397DF5736494E3AF4DB61ED8CF70863212B728FC9B4859BE2D8C9ED5E3
47,275,696 UART: [art] PUB.Y = 0A0916094C4E418754F081A93586D385274A2269EF43D990C2F3E1FB03D4CB0F803224FA246FFA886FD3889C5979C663
47,282,907 UART: [art] SIG.R = D2CAE766014190A324862D2731055090E93D837EA192E702661711D82B89894A1598E84CBE970103508B53A68CDAC47D
47,290,221 UART: [art] SIG.S = 297B5D88E7EB94CE630930A3546EC06EC206AEE1A468F15BBAA3533E02B79593385F3CBA3AA48041CC6D7072DD0F6B40
48,594,913 UART: Caliptra RT
48,595,635 UART: [state] CFI Enabled
48,885,104 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
10,775 writing to cptra_bootfsm_go
201,315 UART:
202,294 UART: Running Caliptra ROM ...
203,432 UART:
203,581 UART: [state] CFI Enabled
261,899 UART: [state] LifecycleState = Unprovisioned
263,927 UART: [state] DebugLocked = No
266,092 UART: [state] WD Timer not started. Device not locked for debugging
269,291 UART: [kat] SHA2-256
448,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,997 UART: [kat] ++
460,467 UART: [kat] sha1
471,265 UART: [kat] SHA2-256
474,287 UART: [kat] SHA2-384
479,008 UART: [kat] SHA2-512-ACC
481,967 UART: [kat] ECC-384
2,959,280 UART: [kat] HMAC-384Kdf
2,981,894 UART: [kat] LMS
3,511,363 UART: [kat] --
3,515,687 UART: [cold-reset] ++
3,517,774 UART: [fht] FHT @ 0x50003400
3,528,275 UART: [idev] ++
3,528,882 UART: [idev] CDI.KEYID = 6
3,529,823 UART: [idev] SUBJECT.KEYID = 7
3,530,875 UART: [idev] UDS.KEYID = 0
3,531,840 ready_for_fw is high
3,532,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,675,899 UART: [idev] Erasing UDS.KEYID = 0
6,035,167 UART: [idev] Sha1 KeyId Algorithm
6,059,773 UART: [idev] --
6,062,934 UART: [ldev] ++
6,063,513 UART: [ldev] CDI.KEYID = 6
6,064,439 UART: [ldev] SUBJECT.KEYID = 5
6,065,601 UART: [ldev] AUTHORITY.KEYID = 7
6,066,840 UART: [ldev] FE.KEYID = 1
6,111,721 UART: [ldev] Erasing FE.KEYID = 1
8,615,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,368,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,752 UART: [ldev] --
10,423,465 UART: [fwproc] Wait for Commands...
10,425,833 UART: [fwproc] Recv command 0x46574c44
10,427,874 UART: [fwproc] Recv'd Img size: 114360 bytes
13,836,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,984,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,301,398 >>> mbox cmd response: success
14,305,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,449,758 UART: [afmc] ++
14,450,437 UART: [afmc] CDI.KEYID = 6
14,451,369 UART: [afmc] SUBJECT.KEYID = 7
14,452,483 UART: [afmc] AUTHORITY.KEYID = 5
16,840,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,562,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,564,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,580,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,596,423 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,612,286 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,636,029 UART: [afmc] --
18,639,682 UART: [cold-reset] --
18,643,167 UART: [state] Locking Datavault
18,647,867 UART: [state] Locking PCR0, PCR1 and PCR31
18,649,588 UART: [state] Locking ICCM
18,651,474 UART: [exit] Launching FMC @ 0x40000130
18,659,871 UART:
18,660,131 UART: Running Caliptra FMC ...
18,661,240 UART:
18,661,407 UART: [state] CFI Enabled
18,722,109 UART: [fht] FMC Alias Private Key: 7
20,485,806 UART: [art] Extend RT PCRs Done
20,487,035 UART: [art] Lock RT PCRs Done
20,488,880 UART: [art] Populate DV Done
20,494,509 UART: [fht] FMC Alias Private Key: 7
20,496,221 UART: [art] Derive CDI
20,497,043 UART: [art] Store in in slot 0x4
20,554,885 UART: [art] Derive Key Pair
20,555,884 UART: [art] Store priv key in slot 0x5
23,018,705 UART: [art] Derive Key Pair - Done
23,031,772 UART: [art] Signing Cert with AUTHO
23,033,086 UART: RITY.KEYID = 7
24,743,611 UART: [art] Erasing AUTHORITY.KEYID = 7
24,745,135 UART: [art] PUB.X = B660EFEDAB081AB3BDCB87B770F2E8F612EEF6B15B7C6D017D5908B5368E31D1715052824EF2FF22C2E7FC1553E8CE84
24,752,438 UART: [art] PUB.Y = DB2DC907E337C161086440ED70BEA3769C270AD10D0E6E505A0687D11038F4B8066C320A81EC287A0B7F49438CA6616D
24,759,660 UART: [art] SIG.R = A6048DF7B0AB32FD521218C495C84F4D89E37F9DE297F423EB74533103F5E7AB3AD4A44C167C3C0D9E601E497062F2B0
24,767,038 UART: [art] SIG.S = 46C14B78E34AE3E5B6A193C696ECC7E490F137370FB9F22CA64965996088FE148E0E2F39507AC33F57A3EBC6841A3EDE
25,745,667 UART: Caliptra RT
25,746,379 UART: [state] CFI Enabled
25,912,941 UART: [rt] RT listening for mailbox commands...
25,915,737 UART:
25,915,989 UART: Running Caliptra ROM ...
25,917,096 UART:
25,917,256 UART: [state] CFI Enabled
25,978,393 UART: [state] LifecycleState = Unprovisioned
25,980,265 UART: [state] DebugLocked = No
25,982,512 UART: [state] WD Timer not started. Device not locked for debugging
25,985,598 UART: [kat] SHA2-256
26,164,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,176,314 UART: [kat] ++
26,176,854 UART: [kat] sha1
26,187,961 UART: [kat] SHA2-256
26,190,965 UART: [kat] SHA2-384
26,196,458 UART: [kat] SHA2-512-ACC
26,199,449 UART: [kat] ECC-384
28,662,394 UART: [kat] HMAC-384Kdf
28,686,390 UART: [kat] LMS
29,215,820 UART: [kat] --
29,221,476 UART: [update-reset] ++
32,658,941 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,661,938 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
33,044,923 >>> mbox cmd response: success
33,045,594 UART: [update-reset] Copying MAN_2 To MAN_1
33,067,927 UART: [update-reset Success] --
33,072,917 UART: [state] Locking Datavault
33,076,348 UART: [state] Locking PCR0, PCR1 and PCR31
33,078,004 UART: [state] Locking ICCM
33,080,082 UART: [exit] Launching FMC @ 0x40000130
33,088,530 UART:
33,088,763 UART: Running Caliptra FMC ...
33,089,804 UART:
33,089,952 UART: [state] CFI Enabled
33,176,321 UART: [art] Extend RT PCRs Done
33,177,503 UART: [art] Lock RT PCRs Done
33,178,929 UART: [art] Populate DV Done
33,184,442 UART: [fht] FMC Alias Private Key: 7
33,185,931 UART: [art] Derive CDI
33,186,667 UART: [art] Store in in slot 0x4
33,245,481 UART: [art] Derive Key Pair
33,246,516 UART: [art] Store priv key in slot 0x5
35,709,151 UART: [art] Derive Key Pair - Done
35,722,099 UART: [art] Signing Cert with AUTHO
35,723,406 UART: RITY.KEYID = 7
37,434,139 UART: [art] Erasing AUTHORITY.KEYID = 7
37,435,640 UART: [art] PUB.X = 39E6F89C4634C1B5FB66AD1322C6F66827502A9C383E46D896B1100C65B7123F08739EC3F88BA60E79CEE0451DB9CA0B
37,442,915 UART: [art] PUB.Y = D6B87EB55AC80684F44AC4429B6A2CC15890889532697F646327CD3B3722B79B1050AD298A17833652471166497D7935
37,450,107 UART: [art] SIG.R = B9A8ABAEFF3E4918187AFC4C87B4605E7EECC9182D78FFCB6098A9E6FA309891AB49A1D35A5B43D3B3093A9D1C3AFA8E
37,457,534 UART: [art] SIG.S = 4FF7DF347D447C6CECAEB1F77326BA35AA6FB38088E923DA55330AF64F8E53675FE600398C3A446CA340199D4AE92E05
38,436,900 UART: Caliptra RT
38,437,610 UART: [state] CFI Enabled
38,778,180 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
192,720 UART:
193,094 UART: Running Caliptra ROM ...
194,287 UART:
194,441 UART: [state] CFI Enabled
264,989 UART: [state] LifecycleState = Unprovisioned
267,406 UART: [state] DebugLocked = No
270,362 UART: [state] WD Timer not started. Device not locked for debugging
275,457 UART: [kat] SHA2-256
465,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,136 UART: [kat] ++
476,615 UART: [kat] sha1
487,440 UART: [kat] SHA2-256
490,457 UART: [kat] SHA2-384
497,804 UART: [kat] SHA2-512-ACC
500,390 UART: [kat] ECC-384
2,947,742 UART: [kat] HMAC-384Kdf
2,971,949 UART: [kat] LMS
3,503,733 UART: [kat] --
3,507,801 UART: [cold-reset] ++
3,508,678 UART: [fht] FHT @ 0x50003400
3,519,015 UART: [idev] ++
3,519,729 UART: [idev] CDI.KEYID = 6
3,520,766 UART: [idev] SUBJECT.KEYID = 7
3,521,870 UART: [idev] UDS.KEYID = 0
3,522,809 ready_for_fw is high
3,523,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,481 UART: [idev] Erasing UDS.KEYID = 0
6,028,572 UART: [idev] Sha1 KeyId Algorithm
6,050,563 UART: [idev] --
6,055,156 UART: [ldev] ++
6,055,838 UART: [ldev] CDI.KEYID = 6
6,056,750 UART: [ldev] SUBJECT.KEYID = 5
6,057,963 UART: [ldev] AUTHORITY.KEYID = 7
6,059,144 UART: [ldev] FE.KEYID = 1
6,100,857 UART: [ldev] Erasing FE.KEYID = 1
8,608,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,661 UART: [ldev] --
10,418,769 UART: [fwproc] Wait for Commands...
10,420,385 UART: [fwproc] Recv command 0x46574c44
10,422,712 UART: [fwproc] Recv'd Img size: 114360 bytes
13,871,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,192 >>> mbox cmd response: success
14,605,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,749,591 UART: [afmc] ++
14,750,244 UART: [afmc] CDI.KEYID = 6
14,751,175 UART: [afmc] SUBJECT.KEYID = 7
14,752,287 UART: [afmc] AUTHORITY.KEYID = 5
17,155,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,898,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,915,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,930,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,611 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,297 UART: [afmc] --
18,972,153 UART: [cold-reset] --
18,975,050 UART: [state] Locking Datavault
18,983,171 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,364 UART: [state] Locking ICCM
18,988,005 UART: [exit] Launching FMC @ 0x40000130
18,996,696 UART:
18,996,935 UART: Running Caliptra FMC ...
18,997,964 UART:
18,998,113 UART: [state] CFI Enabled
19,054,797 UART: [fht] FMC Alias Private Key: 7
20,818,324 UART: [art] Extend RT PCRs Done
20,819,545 UART: [art] Lock RT PCRs Done
20,821,283 UART: [art] Populate DV Done
20,826,858 UART: [fht] FMC Alias Private Key: 7
20,828,554 UART: [art] Derive CDI
20,829,313 UART: [art] Store in in slot 0x4
20,887,037 UART: [art] Derive Key Pair
20,888,080 UART: [art] Store priv key in slot 0x5
23,350,963 UART: [art] Derive Key Pair - Done
23,364,172 UART: [art] Signing Cert with AUTHO
23,365,477 UART: RITY.KEYID = 7
25,076,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,126 UART: [art] PUB.X = B29C92BF311DA82522CFFB47D031B13EE445FDA805DF24786DFC4A14611BD2786059F842B970F556533A9CE75A827115
25,085,368 UART: [art] PUB.Y = 3004A83DB341FC74AC44904D22FA08CB5A8706BB11C00F289BE37B201B0E7C6A5232296AC48362527413314AC6E0467D
25,092,596 UART: [art] SIG.R = 6BD5B6B0781ECFFBEF4234DEDF927B4B007F0EACD5E09B4B21C8449C6002C637A0B147D2ED75A37706510779F4307F76
25,099,981 UART: [art] SIG.S = BDA0059E99020E8CEF2476D478C2B79F6C5F30246343F77CD033CF848A981E1D0A12B082498AF8A7182C4AA92C07922A
26,079,110 UART: Caliptra RT
26,079,813 UART: [state] CFI Enabled
26,243,635 UART: [rt] RT listening for mailbox commands...
26,246,489 UART:
26,246,740 UART: Running Caliptra ROM ...
26,247,788 UART:
26,247,943 UART: [state] CFI Enabled
26,308,814 UART: [state] LifecycleState = Unprovisioned
26,310,908 UART: [state] DebugLocked = No
26,312,943 UART: [state] WD Timer not started. Device not locked for debugging
26,317,403 UART: [kat] SHA2-256
26,507,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,518,020 UART: [kat] ++
26,518,507 UART: [kat] sha1
26,529,720 UART: [kat] SHA2-256
26,532,738 UART: [kat] SHA2-384
26,538,405 UART: [kat] SHA2-512-ACC
26,540,982 UART: [kat] ECC-384
28,993,236 UART: [kat] HMAC-384Kdf
29,018,909 UART: [kat] LMS
29,550,476 UART: [kat] --
29,555,130 UART: [update-reset] ++
33,010,621 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,014,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
33,622,351 >>> mbox cmd response: success
33,623,114 UART: [update-reset] Copying MAN_2 To MAN_1
33,660,686 UART: [update-reset Success] --
33,664,273 UART: [state] Locking Datavault
33,666,867 UART: [state] Locking PCR0, PCR1 and PCR31
33,669,082 UART: [state] Locking ICCM
33,671,352 UART: [exit] Launching FMC @ 0x40000130
33,679,979 UART:
33,680,216 UART: Running Caliptra FMC ...
33,681,323 UART:
33,681,484 UART: [state] CFI Enabled
33,785,817 UART: [art] Extend RT PCRs Done
33,787,001 UART: [art] Lock RT PCRs Done
33,788,263 UART: [art] Populate DV Done
33,793,674 UART: [fht] FMC Alias Private Key: 7
33,795,384 UART: [art] Derive CDI
33,796,203 UART: [art] Store in in slot 0x4
33,855,839 UART: [art] Derive Key Pair
33,856,879 UART: [art] Store priv key in slot 0x5
36,319,425 UART: [art] Derive Key Pair - Done
36,332,413 UART: [art] Signing Cert with AUTHO
36,333,725 UART: RITY.KEYID = 7
38,044,779 UART: [art] Erasing AUTHORITY.KEYID = 7
38,046,290 UART: [art] PUB.X = 358841D6D71BFC9EF54A0B182281187BD498FC846759121C57B650E0BDA1E70531398AAA3F303154EAEB8ADFEBFB8D41
38,053,535 UART: [art] PUB.Y = E364AC8CF671388A3905C6BC43092B6FFA751BC4B04D1BFE9A92D9B291F0FE1554342BE00DA6F648627AB2757752BC82
38,060,816 UART: [art] SIG.R = EE8B75EFC2ACB430FC5D60228E6DDDF7796D62110E6E4C663C27C18C8C6C92796AC843494E1D2AE1756737CA66645D35
38,068,238 UART: [art] SIG.S = C33C54DEE437F3D02FF16CC1C83C450C8A74406DF52E6DCF4EDA84A5C00E2FEEEFCDEACBC99532E994428074552139F1
39,047,040 UART: Caliptra RT
39,047,763 UART: [state] CFI Enabled
39,385,392 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
3,438,602 ready_for_fw is high
3,439,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,740,852 >>> mbox cmd response: success
14,741,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
19,025,819 UART:
19,026,220 UART: Running Caliptra FMC ...
19,027,428 UART:
19,027,597 UART: [state] CFI Enabled
19,094,501 UART: [fht] FMC Alias Private Key: 7
20,858,776 UART: [art] Extend RT PCRs Done
20,859,999 UART: [art] Lock RT PCRs Done
20,861,900 UART: [art] Populate DV Done
20,867,249 UART: [fht] FMC Alias Private Key: 7
20,868,923 UART: [art] Derive CDI
20,869,744 UART: [art] Store in in slot 0x4
20,927,730 UART: [art] Derive Key Pair
20,928,771 UART: [art] Store priv key in slot 0x5
23,391,348 UART: [art] Derive Key Pair - Done
23,404,188 UART: [art] Signing Cert with AUTHO
23,405,493 UART: RITY.KEYID = 7
25,117,656 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,164 UART: [art] PUB.X = F6BAC102EDBDF280DD018BCFAD5FDA64B7C75B508846647D1774BE5E05DBE39E043B4B79C40FB05D7E7584CC535F2216
25,126,458 UART: [art] PUB.Y = FF250174F6073891C4DE24838BE52FC89091A0D833D5C97BD78B7D0DB418099E894FD901EBA4AF00A5C9080681B5BE9D
25,133,655 UART: [art] SIG.R = D84AD14E0F22CFF81BF22E4E36A772382F01F786AA120CEEE56C69EA392E6DFC4036C607DB2317EA0AA21224570D1170
25,141,105 UART: [art] SIG.S = C1815799F66DB0BD7FFB594E9A4CDF6A288C06CFA3C8A713B73023542057B10E32EA1BFDB273C68D346AB1DFEDF7F7C1
26,119,607 UART: Caliptra RT
26,120,310 UART: [state] CFI Enabled
26,285,667 UART: [rt] RT listening for mailbox commands...
33,971,040 >>> mbox cmd response: success
34,006,628 UART:
34,006,936 UART: Running Caliptra FMC ...
34,007,979 UART:
34,008,135 UART: [state] CFI Enabled
34,105,056 UART: [art] Extend RT PCRs Done
34,106,241 UART: [art] Lock RT PCRs Done
34,107,508 UART: [art] Populate DV Done
34,112,639 UART: [fht] FMC Alias Private Key: 7
34,114,179 UART: [art] Derive CDI
34,114,911 UART: [art] Store in in slot 0x4
34,174,221 UART: [art] Derive Key Pair
34,175,258 UART: [art] Store priv key in slot 0x5
36,638,157 UART: [art] Derive Key Pair - Done
36,650,729 UART: [art] Signing Cert with AUTHO
36,652,034 UART: RITY.KEYID = 7
38,363,847 UART: [art] Erasing AUTHORITY.KEYID = 7
38,365,376 UART: [art] PUB.X = C1008A9C6CE44D985402FC0C57B151F3457F65CCB2CEFDAD7BD4461C673D6578C22903E0B3A755167343DD729DDB1C1D
38,372,609 UART: [art] PUB.Y = 9F116DAECB2057D5A3EF6AE3B9B631780A21AAEBDBF6ACACB853556B8F40591A931B7D51519BE04FADFC1C33A72034CD
38,379,876 UART: [art] SIG.R = 5CE23890A465861FA1D621479D11E0DB730B8671E08828CF9143E942BB9BD577A1581083DB2378A8472CF40B8ADDF064
38,387,242 UART: [art] SIG.S = 401CB10627C842DD41B7BBACBCC78963F6003B2C0556359E8A37BBE057A899C194CFA5B6F47529DFEB5DC868E1E8F6AE
39,366,032 UART: Caliptra RT
39,366,751 UART: [state] CFI Enabled
39,699,586 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,376 UART:
192,746 UART: Running Caliptra ROM ...
194,027 UART:
603,380 UART: [state] CFI Enabled
617,212 UART: [state] LifecycleState = Unprovisioned
619,585 UART: [state] DebugLocked = No
622,531 UART: [state] WD Timer not started. Device not locked for debugging
627,774 UART: [kat] SHA2-256
817,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,410 UART: [kat] ++
828,929 UART: [kat] sha1
841,506 UART: [kat] SHA2-256
844,491 UART: [kat] SHA2-384
851,193 UART: [kat] SHA2-512-ACC
853,780 UART: [kat] ECC-384
3,296,325 UART: [kat] HMAC-384Kdf
3,308,904 UART: [kat] LMS
3,840,731 UART: [kat] --
3,847,847 UART: [cold-reset] ++
3,848,995 UART: [fht] FHT @ 0x50003400
3,861,391 UART: [idev] ++
3,862,093 UART: [idev] CDI.KEYID = 6
3,863,125 UART: [idev] SUBJECT.KEYID = 7
3,864,223 UART: [idev] UDS.KEYID = 0
3,865,180 ready_for_fw is high
3,865,415 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,009,227 UART: [idev] Erasing UDS.KEYID = 0
6,340,212 UART: [idev] Sha1 KeyId Algorithm
6,362,374 UART: [idev] --
6,368,071 UART: [ldev] ++
6,368,763 UART: [ldev] CDI.KEYID = 6
6,369,688 UART: [ldev] SUBJECT.KEYID = 5
6,370,846 UART: [ldev] AUTHORITY.KEYID = 7
6,372,073 UART: [ldev] FE.KEYID = 1
6,383,580 UART: [ldev] Erasing FE.KEYID = 1
8,861,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,155 UART: [ldev] --
10,654,798 UART: [fwproc] Wait for Commands...
10,657,642 UART: [fwproc] Recv command 0x46574c44
10,659,946 UART: [fwproc] Recv'd Img size: 114360 bytes
14,108,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,029 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,846,455 >>> mbox cmd response: success
14,847,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,990,497 UART: [afmc] ++
14,991,132 UART: [afmc] CDI.KEYID = 6
14,992,031 UART: [afmc] SUBJECT.KEYID = 7
14,993,083 UART: [afmc] AUTHORITY.KEYID = 5
17,354,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,323 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,387 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,235 UART: [afmc] --
19,149,482 UART: [cold-reset] --
19,154,809 UART: [state] Locking Datavault
19,161,824 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,021 UART: [state] Locking ICCM
19,165,991 UART: [exit] Launching FMC @ 0x40000130
19,174,650 UART:
19,174,881 UART: Running Caliptra FMC ...
19,175,903 UART:
19,176,048 UART: [state] CFI Enabled
19,184,391 UART: [fht] FMC Alias Private Key: 7
20,941,508 UART: [art] Extend RT PCRs Done
20,942,711 UART: [art] Lock RT PCRs Done
20,944,320 UART: [art] Populate DV Done
20,949,670 UART: [fht] FMC Alias Private Key: 7
20,951,310 UART: [art] Derive CDI
20,952,041 UART: [art] Store in in slot 0x4
20,994,579 UART: [art] Derive Key Pair
20,995,615 UART: [art] Store priv key in slot 0x5
23,422,396 UART: [art] Derive Key Pair - Done
23,435,390 UART: [art] Signing Cert with AUTHO
23,436,692 UART: RITY.KEYID = 7
25,141,626 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,117 UART: [art] PUB.X = EA876755270636DB00363F1856F3BCA36836D1AF4491321ACC3B237C91C99D43B26EAC73920A22088E8E3D61650CB7BD
25,150,365 UART: [art] PUB.Y = 00291B805379DABD860C61739394F14272A53B16950AF7C017170B3E143283DE1B85D3F67D6798FB8699D2B90E586276
25,157,577 UART: [art] SIG.R = C43829CC58C9E5138FC2C6A1164E75E569396F492AD684EAEA16C9330FAD33A1B82F19BAC89C49121A68D790A0DD6157
25,164,983 UART: [art] SIG.S = A4F8B979EB7632442EE0759CCFEDC8880C97399CCD00424B70DF5B7B196F74676647CCE7A67C783E2FC35D66F4B67A23
26,144,144 UART: Caliptra RT
26,144,864 UART: [state] CFI Enabled
26,262,482 UART: [rt] RT listening for mailbox commands...
26,265,269 UART:
26,265,516 UART: Running Caliptra ROM ...
26,266,620 UART:
26,266,883 UART: [state] CFI Enabled
26,283,684 UART: [state] LifecycleState = Unprovisioned
26,285,600 UART: [state] DebugLocked = No
26,288,171 UART: [state] WD Timer not started. Device not locked for debugging
26,292,188 UART: [kat] SHA2-256
26,482,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,492,829 UART: [kat] ++
26,493,371 UART: [kat] sha1
26,506,466 UART: [kat] SHA2-256
26,509,481 UART: [kat] SHA2-384
26,515,523 UART: [kat] SHA2-512-ACC
26,518,125 UART: [kat] ECC-384
28,960,829 UART: [kat] HMAC-384Kdf
28,973,915 UART: [kat] LMS
29,505,494 UART: [kat] --
29,509,125 UART: [update-reset] ++
32,973,467 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,977,268 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
33,585,008 >>> mbox cmd response: success
33,586,462 UART: [update-reset] Copying MAN_2 To MAN_1
33,624,025 UART: [update-reset Success] --
33,630,197 UART: [state] Locking Datavault
33,634,248 UART: [state] Locking PCR0, PCR1 and PCR31
33,636,467 UART: [state] Locking ICCM
33,638,565 UART: [exit] Launching FMC @ 0x40000130
33,647,234 UART:
33,647,467 UART: Running Caliptra FMC ...
33,648,566 UART:
33,648,742 UART: [state] CFI Enabled
33,693,134 UART: [art] Extend RT PCRs Done
33,694,276 UART: [art] Lock RT PCRs Done
33,695,718 UART: [art] Populate DV Done
33,701,012 UART: [fht] FMC Alias Private Key: 7
33,702,708 UART: [art] Derive CDI
33,703,519 UART: [art] Store in in slot 0x4
33,746,287 UART: [art] Derive Key Pair
33,747,329 UART: [art] Store priv key in slot 0x5
36,174,359 UART: [art] Derive Key Pair - Done
36,187,713 UART: [art] Signing Cert with AUTHO
36,189,010 UART: RITY.KEYID = 7
37,894,578 UART: [art] Erasing AUTHORITY.KEYID = 7
37,896,073 UART: [art] PUB.X = 610127EA4CB686ED13706D80D9061E95131E7B290F7C98F934B16E12CD2E5AC582F26C248292F843C0B40DC016EBB07F
37,903,323 UART: [art] PUB.Y = FB3BACBFD7F8D3C87D614E0A98F70E3C914AC03F35E0181BCC2DED5291E88E587FCED8279C788E3998DF112C2CD19D9C
37,910,619 UART: [art] SIG.R = 2B519DC53A99F9C2CEDDD72279DC224DA19B7F44CC16A27CD78EA71A1642221FF799450CC29569328AB7BFEFFB50BDC6
37,918,029 UART: [art] SIG.S = D1F2A693CA71611DCC7FF45BF04AE5B5A484826EB41D4FBF9834F92A3C3FB8492A199F05AF89E3214FD82D5611B8B25A
38,897,188 UART: Caliptra RT
38,897,876 UART: [state] CFI Enabled
39,189,113 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,756,494 ready_for_fw is high
3,756,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,776 >>> mbox cmd response: success
14,957,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
19,205,207 UART:
19,205,777 UART: Running Caliptra FMC ...
19,206,904 UART:
19,207,061 UART: [state] CFI Enabled
19,214,898 UART: [fht] FMC Alias Private Key: 7
20,971,467 UART: [art] Extend RT PCRs Done
20,972,681 UART: [art] Lock RT PCRs Done
20,974,131 UART: [art] Populate DV Done
20,979,336 UART: [fht] FMC Alias Private Key: 7
20,980,920 UART: [art] Derive CDI
20,981,744 UART: [art] Store in in slot 0x4
21,023,742 UART: [art] Derive Key Pair
21,024,742 UART: [art] Store priv key in slot 0x5
23,451,608 UART: [art] Derive Key Pair - Done
23,464,600 UART: [art] Signing Cert with AUTHO
23,465,939 UART: RITY.KEYID = 7
25,171,618 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,102 UART: [art] PUB.X = 20FA639FD29C0E49DECEEC10BCD31DB5F6D66E9AEE1907FC9C8B537FFEC25BD6828D622894F7358C5B34034EAE50BA2B
25,180,397 UART: [art] PUB.Y = 262FB6E0D0FCD419678D5EF2E6F010575484D0D534B99728A2FEE7FD02C5C4B4429A9496F6192450F7AB1CB9B42BC9EC
25,187,648 UART: [art] SIG.R = 6A52E0215C53675508BF44BC1F6476674B86DF0200860D19EC0849F893D98541815A4E2E7A194BBA2544CDDD0F850443
25,195,032 UART: [art] SIG.S = CBE9845BC92BF90265400498044737ED8B08C754D5B8CE922E31E8D6B5B284715E96706BE0479B9E591923B7A59E7EA3
26,173,785 UART: Caliptra RT
26,174,498 UART: [state] CFI Enabled
26,291,917 UART: [rt] RT listening for mailbox commands...
33,875,700 >>> mbox cmd response: success
33,909,313 UART:
33,909,581 UART: Running Caliptra FMC ...
33,910,611 UART:
33,910,757 UART: [state] CFI Enabled
33,954,722 UART: [art] Extend RT PCRs Done
33,955,906 UART: [art] Lock RT PCRs Done
33,957,330 UART: [art] Populate DV Done
33,962,720 UART: [fht] FMC Alias Private Key: 7
33,964,318 UART: [art] Derive CDI
33,965,057 UART: [art] Store in in slot 0x4
34,007,324 UART: [art] Derive Key Pair
34,008,330 UART: [art] Store priv key in slot 0x5
36,435,128 UART: [art] Derive Key Pair - Done
36,448,235 UART: [art] Signing Cert with AUTHO
36,449,560 UART: RITY.KEYID = 7
38,154,704 UART: [art] Erasing AUTHORITY.KEYID = 7
38,156,209 UART: [art] PUB.X = C1DE16D65F97F9EFCF0BC217F33A753E994F873045D28D4036117471CABE8AB8BF762FC5349252AB3854637C15BDC710
38,163,493 UART: [art] PUB.Y = 88F1CFFBADA65582A378DEF34DB7A19FB77BF027A17A15BB028AA58935C63416BFFED72DE1ECA8488FB52CEF3195F639
38,170,803 UART: [art] SIG.R = C2CD1DEBE3398700CC2A45DA1CD7B0581B5CF6EB16C1549B2BC8DE0AFE453D5BFC362005513BE4B54D00C350453B5EE7
38,178,194 UART: [art] SIG.S = 730FB8CEEFB7FA5C1D0D556DE7AFFF5096D6079A45D355493D19B231A95039BF6004B83D12EDF75BDFBF0D45ABB9F51B
39,157,196 UART: Caliptra RT
39,157,884 UART: [state] CFI Enabled
39,446,889 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,409 UART: [kat] SHA2-256
892,347 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,434 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,289 UART: [cold-reset] ++
1,476,649 UART: [fht] Storing FHT @ 0x50003400
1,479,598 UART: [idev] ++
1,479,766 UART: [idev] CDI.KEYID = 6
1,480,126 UART: [idev] SUBJECT.KEYID = 7
1,480,550 UART: [idev] UDS.KEYID = 0
1,480,895 ready_for_fw is high
1,480,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,644 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,954 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,172 UART: [ldev] --
1,586,579 UART: [fwproc] Waiting for Commands...
1,587,248 UART: [fwproc] Received command 0x46574c44
1,588,039 UART: [fwproc] Received Image of size 114360 bytes
2,885,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,878 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,107 >>> mbox cmd response: success
3,078,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,079,143 UART: [afmc] ++
3,079,311 UART: [afmc] CDI.KEYID = 6
3,079,673 UART: [afmc] SUBJECT.KEYID = 7
3,080,098 UART: [afmc] AUTHORITY.KEYID = 5
3,115,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,272 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,962 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,697 UART: [afmc] --
3,158,819 UART: [cold-reset] --
3,159,561 UART: [state] Locking Datavault
3,160,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,088 UART: [state] Locking ICCM
3,161,752 UART: [exit] Launching FMC @ 0x40000130
3,167,081 UART:
3,167,097 UART: Running Caliptra FMC ...
3,167,505 UART:
3,167,559 UART: [state] CFI Enabled
3,178,398 UART: [fht] FMC Alias Private Key: 7
3,286,889 UART: [art] Extend RT PCRs Done
3,287,317 UART: [art] Lock RT PCRs Done
3,288,879 UART: [art] Populate DV Done
3,297,282 UART: [fht] FMC Alias Private Key: 7
3,298,258 UART: [art] Derive CDI
3,298,538 UART: [art] Store in in slot 0x4
3,384,017 UART: [art] Derive Key Pair
3,384,377 UART: [art] Store priv key in slot 0x5
3,397,667 UART: [art] Derive Key Pair - Done
3,412,520 UART: [art] Signing Cert with AUTHO
3,413,000 UART: RITY.KEYID = 7
3,428,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,007 UART: [art] PUB.X = 296DC0F343EB45C69CC289204C945EA6CB801064A26023FA8B9E8036B0C31852528190ADAA931A5471DA41CAA96DE511
3,435,779 UART: [art] PUB.Y = 9480D9905375ADCA7EDBE3F7B0B3CB92C91E72A8D124E2069CC321516D3E703BEF93EE464C4670F88B3DF239B7B234F9
3,442,736 UART: [art] SIG.R = 084BE9F22B79AC95EECD8F96C8937354F071539095CC3CE60143ED3C4C70D931D1960C3A15C7137294C276DD80B15CA8
3,449,499 UART: [art] SIG.S = A71BF305B221EA1882076C9421A6A1C0F7EA74862F2EF6591A04C06D50EB161FF4DB5B5A0C5F4C98781A845429C077A6
3,473,758 UART: Caliptra RT
3,474,012 UART: [state] CFI Enabled
3,581,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,575 UART:
3,583,591 UART: Running Caliptra ROM ...
3,583,999 UART:
3,584,053 UART: [state] CFI Enabled
3,586,991 UART: [state] LifecycleState = Unprovisioned
3,587,646 UART: [state] DebugLocked = No
3,588,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,943 UART: [kat] SHA2-256
4,383,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,989 UART: [kat] ++
4,388,141 UART: [kat] sha1
4,392,443 UART: [kat] SHA2-256
4,394,381 UART: [kat] SHA2-384
4,397,074 UART: [kat] SHA2-512-ACC
4,398,974 UART: [kat] ECC-384
4,404,575 UART: [kat] HMAC-384Kdf
4,409,269 UART: [kat] LMS
4,977,465 UART: [kat] --
4,978,486 UART: [update-reset] ++
6,312,145 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,313,313 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,463,231 >>> mbox cmd response: success
6,463,414 UART: [update-reset] Copying MAN_2 To MAN_1
6,471,428 UART: [update-reset Success] --
6,472,309 UART: [state] Locking Datavault
6,473,309 UART: [state] Locking PCR0, PCR1 and PCR31
6,473,913 UART: [state] Locking ICCM
6,474,505 UART: [exit] Launching FMC @ 0x40000130
6,479,834 UART:
6,479,850 UART: Running Caliptra FMC ...
6,480,258 UART:
6,480,312 UART: [state] CFI Enabled
6,569,635 UART: [art] Extend RT PCRs Done
6,570,063 UART: [art] Lock RT PCRs Done
6,571,354 UART: [art] Populate DV Done
6,579,827 UART: [fht] FMC Alias Private Key: 7
6,580,869 UART: [art] Derive CDI
6,581,149 UART: [art] Store in in slot 0x4
6,666,926 UART: [art] Derive Key Pair
6,667,286 UART: [art] Store priv key in slot 0x5
6,680,298 UART: [art] Derive Key Pair - Done
6,695,133 UART: [art] Signing Cert with AUTHO
6,695,613 UART: RITY.KEYID = 7
6,711,063 UART: [art] Erasing AUTHORITY.KEYID = 7
6,711,828 UART: [art] PUB.X = E129A5B548089368406F345D76EBAA72AC305E0785768DEE6A4A3F03383B4E96B3A772D11D84765F40861FAA7068D709
6,718,582 UART: [art] PUB.Y = 63E4C124C72D688B192C6FCF18E9AD119E96D3E03061D2DD46C910E13CED98857FEDC6F9778047D39A02E7DBD1EF9BCD
6,725,545 UART: [art] SIG.R = E39C04CD82A4048FB79F1B0339814CDCA21D80038D3ADC9D4391D3F2F2B56A355BE3F39DA426A795CE9E22307004E891
6,732,306 UART: [art] SIG.S = 711DE2F6A82FECE9E72E42507BED14FD7C9E80588FF2255FB0FB0474EAD14858420273B133EF78688F0CF34E7F45C5DB
6,756,354 UART: Caliptra RT
6,756,608 UART: [state] CFI Enabled
7,038,793 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,839 ready_for_fw is high
1,361,839 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,577 >>> mbox cmd response: success
2,928,577 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,989,527 UART:
2,989,543 UART: Running Caliptra FMC ...
2,989,951 UART:
2,990,005 UART: [state] CFI Enabled
3,000,394 UART: [fht] FMC Alias Private Key: 7
3,108,517 UART: [art] Extend RT PCRs Done
3,108,945 UART: [art] Lock RT PCRs Done
3,110,367 UART: [art] Populate DV Done
3,118,550 UART: [fht] FMC Alias Private Key: 7
3,119,698 UART: [art] Derive CDI
3,119,978 UART: [art] Store in in slot 0x4
3,205,567 UART: [art] Derive Key Pair
3,205,927 UART: [art] Store priv key in slot 0x5
3,219,121 UART: [art] Derive Key Pair - Done
3,233,670 UART: [art] Signing Cert with AUTHO
3,234,150 UART: RITY.KEYID = 7
3,249,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,905 UART: [art] PUB.X = B732DE90BD7F385F6747172E3712A1B1D04EE61353B1A7BBA39F86A93E8BD5CC781AE64F24C097834F300F146070A704
3,256,671 UART: [art] PUB.Y = 936622ED2869D79CE6F9A04A5D8129A6EBD747324EF3D74BC80964B595FCF38791609EF822B0C2DA5CECFEEA02692674
3,263,623 UART: [art] SIG.R = 68E72DC4486C1D0D827D393C4F167C7CA90259FD0410CEC4EDC0598DEBEA1AF1397140F3EE0EE987867BED3FCD043C87
3,270,394 UART: [art] SIG.S = C5CF7D3D44C9A86B424FD8367AF4C9DF9265331F91A74D69C95812A42B0F8E78653C510874833BC828D9D2EAC9A9EC4F
3,294,685 UART: Caliptra RT
3,294,939 UART: [state] CFI Enabled
3,402,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,498 >>> mbox cmd response: success
6,179,051 UART:
6,179,067 UART: Running Caliptra FMC ...
6,179,475 UART:
6,179,529 UART: [state] CFI Enabled
6,268,144 UART: [art] Extend RT PCRs Done
6,268,572 UART: [art] Lock RT PCRs Done
6,269,925 UART: [art] Populate DV Done
6,278,120 UART: [fht] FMC Alias Private Key: 7
6,279,094 UART: [art] Derive CDI
6,279,374 UART: [art] Store in in slot 0x4
6,365,417 UART: [art] Derive Key Pair
6,365,777 UART: [art] Store priv key in slot 0x5
6,379,123 UART: [art] Derive Key Pair - Done
6,394,009 UART: [art] Signing Cert with AUTHO
6,394,489 UART: RITY.KEYID = 7
6,409,613 UART: [art] Erasing AUTHORITY.KEYID = 7
6,410,378 UART: [art] PUB.X = 90C4EA69B0F735CF5999F8E30723C55A97AF17AAA002CA6798B03126E9CAEBB7F049A7AAAD7B210D1EFA8E195DF55967
6,417,155 UART: [art] PUB.Y = 8AD2C7725ED81170738FE2B316E3072EDA8B4D92BA5897DE1AC50215951DB26813AE273C232918EA77E3CC03D1D1FBB9
6,424,104 UART: [art] SIG.R = D69D7EF767E2750006795C41CC6843EC8F7ACEE2DE47960C72293ACFE6448EF5322562FA2B59A6728C2D9D7DE5644910
6,430,850 UART: [art] SIG.S = 6CB29CA08F566532F3362EAEFF9248F35C9FFD8D4E54F7E26736A10B3499953794CB11666B434ED7443D477EC3418603
6,454,057 UART: Caliptra RT
6,454,311 UART: [state] CFI Enabled
6,738,948 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,700 UART: [kat] SHA2-256
882,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,746 UART: [kat] ++
886,898 UART: [kat] sha1
891,298 UART: [kat] SHA2-256
893,236 UART: [kat] SHA2-384
896,001 UART: [kat] SHA2-512-ACC
897,902 UART: [kat] ECC-384
903,697 UART: [kat] HMAC-384Kdf
908,501 UART: [kat] LMS
1,476,697 UART: [kat] --
1,477,522 UART: [cold-reset] ++
1,478,086 UART: [fht] Storing FHT @ 0x50003400
1,480,743 UART: [idev] ++
1,480,911 UART: [idev] CDI.KEYID = 6
1,481,271 UART: [idev] SUBJECT.KEYID = 7
1,481,695 UART: [idev] UDS.KEYID = 0
1,482,040 ready_for_fw is high
1,482,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,835 UART: [idev] Erasing UDS.KEYID = 0
1,507,603 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,987 UART: [idev] --
1,517,118 UART: [ldev] ++
1,517,286 UART: [ldev] CDI.KEYID = 6
1,517,649 UART: [ldev] SUBJECT.KEYID = 5
1,518,075 UART: [ldev] AUTHORITY.KEYID = 7
1,518,538 UART: [ldev] FE.KEYID = 1
1,523,846 UART: [ldev] Erasing FE.KEYID = 1
1,548,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,581 UART: [ldev] --
1,588,004 UART: [fwproc] Waiting for Commands...
1,588,623 UART: [fwproc] Received command 0x46574c44
1,589,414 UART: [fwproc] Received Image of size 114360 bytes
2,886,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,602 >>> mbox cmd response: success
3,079,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,080,712 UART: [afmc] ++
3,080,880 UART: [afmc] CDI.KEYID = 6
3,081,242 UART: [afmc] SUBJECT.KEYID = 7
3,081,667 UART: [afmc] AUTHORITY.KEYID = 5
3,117,042 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,708 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,593 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,283 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,050 UART: [afmc] --
3,160,048 UART: [cold-reset] --
3,160,700 UART: [state] Locking Datavault
3,162,047 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,651 UART: [state] Locking ICCM
3,163,163 UART: [exit] Launching FMC @ 0x40000130
3,168,492 UART:
3,168,508 UART: Running Caliptra FMC ...
3,168,916 UART:
3,169,059 UART: [state] CFI Enabled
3,179,870 UART: [fht] FMC Alias Private Key: 7
3,287,453 UART: [art] Extend RT PCRs Done
3,287,881 UART: [art] Lock RT PCRs Done
3,289,625 UART: [art] Populate DV Done
3,297,814 UART: [fht] FMC Alias Private Key: 7
3,298,766 UART: [art] Derive CDI
3,299,046 UART: [art] Store in in slot 0x4
3,384,649 UART: [art] Derive Key Pair
3,385,009 UART: [art] Store priv key in slot 0x5
3,398,349 UART: [art] Derive Key Pair - Done
3,413,130 UART: [art] Signing Cert with AUTHO
3,413,610 UART: RITY.KEYID = 7
3,428,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,625 UART: [art] PUB.X = 2E6399D9F7E5D5EA03F62B3ED7E448B8EAE55B3175E801C6844762E39D141042982614818C5C3AFE6111752927A4C4DB
3,436,387 UART: [art] PUB.Y = E7449F11D7B23D015FFEB43E7B72962904777890A41A85E97D543010C83821B98CA639DD05EA5D7A85854314B7A44B4C
3,443,324 UART: [art] SIG.R = 0A3DD9014CA67BC7A65D26663F1C63075CE6852AA4DF9B4E28D9F51DAC7033292CF1E0D0659B8184F6586C16DB112165
3,450,089 UART: [art] SIG.S = 3627B3CB59465D424CEFF7B04333D46CC257FCCEB5715B042C0E1FFA576A02D5F34A606CBB429CF5B35AEFB087FE97B4
3,473,617 UART: Caliptra RT
3,473,963 UART: [state] CFI Enabled
3,582,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,149 UART:
3,584,165 UART: Running Caliptra ROM ...
3,584,573 UART:
3,584,714 UART: [state] CFI Enabled
3,587,866 UART: [state] LifecycleState = Unprovisioned
3,588,521 UART: [state] DebugLocked = No
3,589,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,662 UART: [kat] SHA2-256
4,384,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,708 UART: [kat] ++
4,388,860 UART: [kat] sha1
4,393,026 UART: [kat] SHA2-256
4,394,964 UART: [kat] SHA2-384
4,397,667 UART: [kat] SHA2-512-ACC
4,399,567 UART: [kat] ECC-384
4,405,246 UART: [kat] HMAC-384Kdf
4,409,738 UART: [kat] LMS
4,977,934 UART: [kat] --
4,978,661 UART: [update-reset] ++
6,313,172 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,314,352 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,464,270 >>> mbox cmd response: success
6,464,561 UART: [update-reset] Copying MAN_2 To MAN_1
6,472,575 UART: [update-reset Success] --
6,473,400 UART: [state] Locking Datavault
6,474,206 UART: [state] Locking PCR0, PCR1 and PCR31
6,474,810 UART: [state] Locking ICCM
6,475,350 UART: [exit] Launching FMC @ 0x40000130
6,480,679 UART:
6,480,695 UART: Running Caliptra FMC ...
6,481,103 UART:
6,481,246 UART: [state] CFI Enabled
6,570,931 UART: [art] Extend RT PCRs Done
6,571,359 UART: [art] Lock RT PCRs Done
6,572,314 UART: [art] Populate DV Done
6,580,465 UART: [fht] FMC Alias Private Key: 7
6,581,479 UART: [art] Derive CDI
6,581,759 UART: [art] Store in in slot 0x4
6,667,322 UART: [art] Derive Key Pair
6,667,682 UART: [art] Store priv key in slot 0x5
6,680,616 UART: [art] Derive Key Pair - Done
6,695,407 UART: [art] Signing Cert with AUTHO
6,695,887 UART: RITY.KEYID = 7
6,711,371 UART: [art] Erasing AUTHORITY.KEYID = 7
6,712,136 UART: [art] PUB.X = 59165BBFD3AF4FFE1702610EB263C28223C3CFD0FD23C74024274C7EEBEAE1A85731845A738DF43FE839B6E70627F881
6,718,905 UART: [art] PUB.Y = 5BD17E9ED0FF6056A0407DC5F4306DFED40D6F7240C734ADEA8E5C9F1A35C99B09795935ED981C6D73600290C6758F08
6,725,849 UART: [art] SIG.R = CAD54E59A6F4E7A825F549576190C0052BDFCF28E77BA492A5FFF89B276179727E070F074AF535A3A354B6E4B84FEFE8
6,732,617 UART: [art] SIG.S = 3EA9CA63E15D1E7DC08A5C6538BC2DEB41CD9A387286D82A5F8916A32998532D4D12F34A0D93787E73438DD04D275631
6,756,485 UART: Caliptra RT
6,756,831 UART: [state] CFI Enabled
7,039,390 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,136 ready_for_fw is high
1,363,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,850 >>> mbox cmd response: success
2,927,850 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,990,046 UART:
2,990,062 UART: Running Caliptra FMC ...
2,990,470 UART:
2,990,613 UART: [state] CFI Enabled
3,001,326 UART: [fht] FMC Alias Private Key: 7
3,109,263 UART: [art] Extend RT PCRs Done
3,109,691 UART: [art] Lock RT PCRs Done
3,110,915 UART: [art] Populate DV Done
3,119,332 UART: [fht] FMC Alias Private Key: 7
3,120,316 UART: [art] Derive CDI
3,120,596 UART: [art] Store in in slot 0x4
3,206,399 UART: [art] Derive Key Pair
3,206,759 UART: [art] Store priv key in slot 0x5
3,219,909 UART: [art] Derive Key Pair - Done
3,234,586 UART: [art] Signing Cert with AUTHO
3,235,066 UART: RITY.KEYID = 7
3,250,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,053 UART: [art] PUB.X = 22075B191458C2D1D99126D69D836424C0D4145209B10A5184ED453F2BEF895075D5711A1A465FA287EB5C5BC8E3AD99
3,257,810 UART: [art] PUB.Y = 031BB9FA2D76E44D1513DA53EC3DC94CD7028575FEB93753D3F5842802C638E9E1AF599C561DAEEE51B24BB629CEBFAC
3,264,769 UART: [art] SIG.R = E460186A7642EF0535A51083F12DFD5DC4B67CC3AA116ED473DDEF449E8684710D2F3FC78A7E97C93E62587D1414FE61
3,271,539 UART: [art] SIG.S = E511322722CCBD247C9F7DF983912E674CF427034D02DAC872677E920FD25961660374A6809EC8D2F4D8B436985F433C
3,296,340 UART: Caliptra RT
3,296,686 UART: [state] CFI Enabled
3,404,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,687 >>> mbox cmd response: success
6,181,242 UART:
6,181,258 UART: Running Caliptra FMC ...
6,181,666 UART:
6,181,809 UART: [state] CFI Enabled
6,270,200 UART: [art] Extend RT PCRs Done
6,270,628 UART: [art] Lock RT PCRs Done
6,271,699 UART: [art] Populate DV Done
6,279,648 UART: [fht] FMC Alias Private Key: 7
6,280,658 UART: [art] Derive CDI
6,280,938 UART: [art] Store in in slot 0x4
6,366,951 UART: [art] Derive Key Pair
6,367,311 UART: [art] Store priv key in slot 0x5
6,380,731 UART: [art] Derive Key Pair - Done
6,395,422 UART: [art] Signing Cert with AUTHO
6,395,902 UART: RITY.KEYID = 7
6,411,248 UART: [art] Erasing AUTHORITY.KEYID = 7
6,412,013 UART: [art] PUB.X = ECE0DB48970B0BABF64FF32D1D8F4EA073C486DB3F568023E2F0A2F49854E2E7F11E64A9EDC37503F7B83BBB477C23CC
6,418,794 UART: [art] PUB.Y = BBB6E116EA5D49D0912FB37B5F20962565D30E94E8E7A8EC6A25A7871C4281CBE1BD13162B0B5D28169A69FDDAA9AEDC
6,425,756 UART: [art] SIG.R = 4E73EF2D4E10AF8A0417D72728B3DE6948D810A0C68FB90706A0D850859927D93E2EEB781052333A0DDC67C82C77A5F5
6,432,516 UART: [art] SIG.S = 6FF53B8EAD14D81BB5FB1FFB09DF0302EA8698BA29ABCBD18593932D30FDA3D9C5204FE11705C54BF5588A99D09E7815
6,456,605 UART: Caliptra RT
6,456,951 UART: [state] CFI Enabled
6,738,459 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,638 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,883 UART: [state] WD Timer not started. Device not locked for debugging
87,030 UART: [kat] SHA2-256
892,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,805 UART: [kat] ++
896,957 UART: [kat] sha1
901,361 UART: [kat] SHA2-256
903,301 UART: [kat] SHA2-384
906,126 UART: [kat] SHA2-512-ACC
908,027 UART: [kat] ECC-384
917,436 UART: [kat] HMAC-384Kdf
922,064 UART: [kat] LMS
1,170,392 UART: [kat] --
1,171,083 UART: [cold-reset] ++
1,171,467 UART: [fht] FHT @ 0x50003400
1,174,314 UART: [idev] ++
1,174,482 UART: [idev] CDI.KEYID = 6
1,174,842 UART: [idev] SUBJECT.KEYID = 7
1,175,266 UART: [idev] UDS.KEYID = 0
1,175,611 ready_for_fw is high
1,175,611 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,242 UART: [idev] Erasing UDS.KEYID = 0
1,200,099 UART: [idev] Sha1 KeyId Algorithm
1,208,771 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,374 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,433 UART: [ldev] Erasing FE.KEYID = 1
1,242,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,048 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,706 >>> mbox cmd response: success
2,774,706 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,775,936 UART: [afmc] ++
2,776,104 UART: [afmc] CDI.KEYID = 6
2,776,466 UART: [afmc] SUBJECT.KEYID = 7
2,776,891 UART: [afmc] AUTHORITY.KEYID = 5
2,812,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,435 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,048 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,767 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,471 UART: [afmc] --
2,856,469 UART: [cold-reset] --
2,857,353 UART: [state] Locking Datavault
2,858,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,346 UART: [state] Locking ICCM
2,859,928 UART: [exit] Launching FMC @ 0x40000130
2,865,257 UART:
2,865,273 UART: Running Caliptra FMC ...
2,865,681 UART:
2,865,735 UART: [state] CFI Enabled
2,875,972 UART: [fht] FMC Alias Private Key: 7
2,983,567 UART: [art] Extend RT PCRs Done
2,983,995 UART: [art] Lock RT PCRs Done
2,985,729 UART: [art] Populate DV Done
2,993,672 UART: [fht] FMC Alias Private Key: 7
2,994,726 UART: [art] Derive CDI
2,995,006 UART: [art] Store in in slot 0x4
3,080,653 UART: [art] Derive Key Pair
3,081,013 UART: [art] Store priv key in slot 0x5
3,094,089 UART: [art] Derive Key Pair - Done
3,108,892 UART: [art] Signing Cert with AUTHO
3,109,372 UART: RITY.KEYID = 7
3,124,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,381 UART: [art] PUB.X = 65BAEB41CB48A0E726CDA7CEDA31C4B6EEAE5F2F8A173A6EB1D8E1AF742131D0F151A4C91AA80765BD3D07D840EAA67E
3,132,173 UART: [art] PUB.Y = F432CC2EB892741F08535D8D5D5C086408CB724A17C66A008CAE4CF1A6CB32C21FCFA85C5D8C804E1BD7837BFC4B1B7E
3,139,110 UART: [art] SIG.R = 97E407CB6719CA14B0A5137EC6CB6F28AF94617043B9F2853AE6140810006FFB86CA19D49A65E0A96DECB92E135CC6DF
3,145,862 UART: [art] SIG.S = 2C4989EAE75FC26856ACC0255B28AD07F3EFEA8CE179C5C5D82668F7DFE947AFD27FD82CD8DCA641C11655AC99EA3CAB
3,169,656 UART: Caliptra RT
3,169,910 UART: [state] CFI Enabled
3,277,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,864 UART:
3,278,880 UART: Running Caliptra ROM ...
3,279,288 UART:
3,279,343 UART: [state] CFI Enabled
3,282,117 UART: [state] LifecycleState = Unprovisioned
3,282,772 UART: [state] DebugLocked = No
3,283,452 UART: [state] WD Timer not started. Device not locked for debugging
3,284,606 UART: [kat] SHA2-256
4,090,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,381 UART: [kat] ++
4,094,533 UART: [kat] sha1
4,098,841 UART: [kat] SHA2-256
4,100,781 UART: [kat] SHA2-384
4,103,596 UART: [kat] SHA2-512-ACC
4,105,496 UART: [kat] ECC-384
4,115,247 UART: [kat] HMAC-384Kdf
4,119,745 UART: [kat] LMS
4,368,073 UART: [kat] --
4,368,887 UART: [update-reset] ++
5,680,972 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,682,081 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,831,947 >>> mbox cmd response: success
5,832,148 UART: [update-reset] Copying MAN_2 To MAN_1
5,840,162 UART: [update-reset Success] --
5,840,965 UART: [state] Locking Datavault
5,841,641 UART: [state] Locking PCR0, PCR1 and PCR31
5,842,245 UART: [state] Locking ICCM
5,842,773 UART: [exit] Launching FMC @ 0x40000130
5,848,102 UART:
5,848,118 UART: Running Caliptra FMC ...
5,848,526 UART:
5,848,580 UART: [state] CFI Enabled
5,937,387 UART: [art] Extend RT PCRs Done
5,937,815 UART: [art] Lock RT PCRs Done
5,939,318 UART: [art] Populate DV Done
5,947,419 UART: [fht] FMC Alias Private Key: 7
5,948,405 UART: [art] Derive CDI
5,948,685 UART: [art] Store in in slot 0x4
6,034,428 UART: [art] Derive Key Pair
6,034,788 UART: [art] Store priv key in slot 0x5
6,048,002 UART: [art] Derive Key Pair - Done
6,063,065 UART: [art] Signing Cert with AUTHO
6,063,545 UART: RITY.KEYID = 7
6,078,933 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,698 UART: [art] PUB.X = 9DD78AE3EB92932C6EC3FDCBF04D29C419AE68B74CF38B79EEBDF719BB138689C386B12423C3E926502BE9C2232998F6
6,086,480 UART: [art] PUB.Y = A792038C9A8FE6457ED3C001DFF698ACEFAD82BFB8292B4FBEB2A9E40B5FFA0B1FD116F8E17444E58DE17268C20E7ABD
6,093,441 UART: [art] SIG.R = C5CCE98DF692F9A13A8AE8EDFD74B72D8A0B904F5A7490AC1ED858C98D1E0970F1B72C5EB3F31F23F66BC9EB44B6B8A0
6,100,229 UART: [art] SIG.S = F4D63999D841A869712FB71E53894D8C486882161DDEA1C53FACA1BDDBE94BFC68AD6D197699F0FBFBBC0507F13DD275
6,123,858 UART: Caliptra RT
6,124,112 UART: [state] CFI Enabled
6,403,526 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 ready_for_fw is high
1,060,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,451 >>> mbox cmd response: success
2,624,451 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,687,153 UART:
2,687,169 UART: Running Caliptra FMC ...
2,687,577 UART:
2,687,631 UART: [state] CFI Enabled
2,698,244 UART: [fht] FMC Alias Private Key: 7
2,806,049 UART: [art] Extend RT PCRs Done
2,806,477 UART: [art] Lock RT PCRs Done
2,807,887 UART: [art] Populate DV Done
2,815,878 UART: [fht] FMC Alias Private Key: 7
2,816,900 UART: [art] Derive CDI
2,817,180 UART: [art] Store in in slot 0x4
2,903,087 UART: [art] Derive Key Pair
2,903,447 UART: [art] Store priv key in slot 0x5
2,916,539 UART: [art] Derive Key Pair - Done
2,931,036 UART: [art] Signing Cert with AUTHO
2,931,516 UART: RITY.KEYID = 7
2,946,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,667 UART: [art] PUB.X = 1BEC4BDA76DC3F393223E56A55C74E9707DADABA5C60C68E702480A685F661453704811D2504FF49D68BA4854688E527
2,954,428 UART: [art] PUB.Y = 811F092D86C8D60998A25AEAE65CC59ACD9E0134109C4B8CE753EFB343FEE541E3567442A09466BBA521F7D6329DC4BB
2,961,379 UART: [art] SIG.R = 3A97FAE06268D37CA5B71562D04AE1716F5A6E9AE42EACB35EC2A5F4C3DAB286E3E552F0817D163F668967242DE3485D
2,968,159 UART: [art] SIG.S = CF47180C3E00D41C9963E2D18B6B1BEA6CA25AD857ED3DE26408D0B3D495A500CEC3B1355C83872BBD005149B8BA9B42
2,991,578 UART: Caliptra RT
2,991,832 UART: [state] CFI Enabled
3,099,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,539,224 >>> mbox cmd response: success
5,552,646 UART:
5,552,662 UART: Running Caliptra FMC ...
5,553,070 UART:
5,553,124 UART: [state] CFI Enabled
5,642,307 UART: [art] Extend RT PCRs Done
5,642,735 UART: [art] Lock RT PCRs Done
5,643,720 UART: [art] Populate DV Done
5,651,617 UART: [fht] FMC Alias Private Key: 7
5,652,695 UART: [art] Derive CDI
5,652,975 UART: [art] Store in in slot 0x4
5,738,700 UART: [art] Derive Key Pair
5,739,060 UART: [art] Store priv key in slot 0x5
5,751,952 UART: [art] Derive Key Pair - Done
5,766,693 UART: [art] Signing Cert with AUTHO
5,767,173 UART: RITY.KEYID = 7
5,782,135 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,900 UART: [art] PUB.X = D4EE9318090ABD99D9FDA9DF1E53F814D99FDCBCB4FDA902E866FCE6DB428F96498D4CD0D1F692B857B7400CCFB8AF8A
5,789,686 UART: [art] PUB.Y = 3CEE2F39532673F47D23AC46E759C2ECCF6106C6A50628A458589CD1255705A36DEF47F8C6128DFBD2C8D479470A4C61
5,796,628 UART: [art] SIG.R = 77F76B6021A11428E9CEA209647650356C87F42872676552DF5B66B378E5F4063FF395F74FB6742E4CFC3E8ABDDF490B
5,803,389 UART: [art] SIG.S = 85715A54F4382E5E7760A7B2EF543CCBAE73E336A7CB9882606C43F478637126CAF13C6260D30DDC0210CB8DEE578326
5,827,916 UART: Caliptra RT
5,828,170 UART: [state] CFI Enabled
6,111,573 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,350 UART: [kat] SHA2-256
904,290 UART: [kat] SHA2-384
906,967 UART: [kat] SHA2-512-ACC
908,868 UART: [kat] ECC-384
918,663 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,414 UART: [cold-reset] ++
1,172,820 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 ready_for_fw is high
1,176,714 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,193 UART: [idev] Erasing UDS.KEYID = 0
1,201,500 UART: [idev] Sha1 KeyId Algorithm
1,210,136 UART: [idev] --
1,211,246 UART: [ldev] ++
1,211,414 UART: [ldev] CDI.KEYID = 6
1,211,777 UART: [ldev] SUBJECT.KEYID = 5
1,212,203 UART: [ldev] AUTHORITY.KEYID = 7
1,212,666 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,334 UART: [ldev] --
1,283,833 UART: [fwproc] Wait for Commands...
1,284,529 UART: [fwproc] Recv command 0x46574c44
1,285,257 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,935 >>> mbox cmd response: success
2,774,935 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,776,119 UART: [afmc] ++
2,776,287 UART: [afmc] CDI.KEYID = 6
2,776,649 UART: [afmc] SUBJECT.KEYID = 7
2,777,074 UART: [afmc] AUTHORITY.KEYID = 5
2,812,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,712 UART: [afmc] --
2,855,690 UART: [cold-reset] --
2,856,394 UART: [state] Locking Datavault
2,857,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,359 UART: [state] Locking ICCM
2,858,889 UART: [exit] Launching FMC @ 0x40000130
2,864,218 UART:
2,864,234 UART: Running Caliptra FMC ...
2,864,642 UART:
2,864,785 UART: [state] CFI Enabled
2,875,332 UART: [fht] FMC Alias Private Key: 7
2,983,725 UART: [art] Extend RT PCRs Done
2,984,153 UART: [art] Lock RT PCRs Done
2,985,631 UART: [art] Populate DV Done
2,993,930 UART: [fht] FMC Alias Private Key: 7
2,995,106 UART: [art] Derive CDI
2,995,386 UART: [art] Store in in slot 0x4
3,081,393 UART: [art] Derive Key Pair
3,081,753 UART: [art] Store priv key in slot 0x5
3,095,139 UART: [art] Derive Key Pair - Done
3,109,902 UART: [art] Signing Cert with AUTHO
3,110,382 UART: RITY.KEYID = 7
3,125,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,233 UART: [art] PUB.X = FE60455082A7826CFCF5A44182CEDECAA9BA1DFFC6BD31F254BD49F1A6EEEEE665ADFF85DF9FD77CDF06A3682C55079A
3,133,029 UART: [art] PUB.Y = 43EB03B5F7F5224B92621E85E3A8BC952F9FE76AA1AB48E700D9EEB35AE4CFF2C01AD4E781410057555E4AFAFC0F905C
3,139,947 UART: [art] SIG.R = 7D900F7FB84056B4240F91E732BB6D87B5FFB33C82FB0148010C27E055C1831BBCB71D4DBAB71E1839F97C1A2F4F49FF
3,146,714 UART: [art] SIG.S = 830E3AF2216B62268172588D989EEEA55E42B2405983C7115FBEB256F5723494EED8C25CF4395CD323B0976328180D87
3,171,315 UART: Caliptra RT
3,171,661 UART: [state] CFI Enabled
3,279,915 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,417 UART:
3,281,433 UART: Running Caliptra ROM ...
3,281,841 UART:
3,281,983 UART: [state] CFI Enabled
3,284,961 UART: [state] LifecycleState = Unprovisioned
3,285,616 UART: [state] DebugLocked = No
3,286,154 UART: [state] WD Timer not started. Device not locked for debugging
3,287,362 UART: [kat] SHA2-256
4,093,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,097,137 UART: [kat] ++
4,097,289 UART: [kat] sha1
4,101,661 UART: [kat] SHA2-256
4,103,601 UART: [kat] SHA2-384
4,106,280 UART: [kat] SHA2-512-ACC
4,108,180 UART: [kat] ECC-384
4,117,751 UART: [kat] HMAC-384Kdf
4,122,375 UART: [kat] LMS
4,370,703 UART: [kat] --
4,371,589 UART: [update-reset] ++
5,684,768 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,685,885 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,835,751 >>> mbox cmd response: success
5,836,008 UART: [update-reset] Copying MAN_2 To MAN_1
5,844,022 UART: [update-reset Success] --
5,845,029 UART: [state] Locking Datavault
5,845,873 UART: [state] Locking PCR0, PCR1 and PCR31
5,846,477 UART: [state] Locking ICCM
5,847,141 UART: [exit] Launching FMC @ 0x40000130
5,852,470 UART:
5,852,486 UART: Running Caliptra FMC ...
5,852,894 UART:
5,853,037 UART: [state] CFI Enabled
5,942,554 UART: [art] Extend RT PCRs Done
5,942,982 UART: [art] Lock RT PCRs Done
5,944,327 UART: [art] Populate DV Done
5,952,764 UART: [fht] FMC Alias Private Key: 7
5,953,754 UART: [art] Derive CDI
5,954,034 UART: [art] Store in in slot 0x4
6,039,609 UART: [art] Derive Key Pair
6,039,969 UART: [art] Store priv key in slot 0x5
6,053,301 UART: [art] Derive Key Pair - Done
6,067,633 UART: [art] Signing Cert with AUTHO
6,068,113 UART: RITY.KEYID = 7
6,082,919 UART: [art] Erasing AUTHORITY.KEYID = 7
6,083,684 UART: [art] PUB.X = 08759B1A56814856D753E749403C423D88E1B430C3DA0991F71C6E0DB6C8126B996D680B25B467DB61F69E970141F1E4
6,090,431 UART: [art] PUB.Y = BCF3BC47E05C1138DBD8AD36E6FA19A20729246A477A4A68691269C16C36564FF067DA8621CEF7221BD74330E8E70174
6,097,377 UART: [art] SIG.R = F168CD0126C2AF90F0A4A797F209F5F607807EEE2354AA0B5C00E15907FE0CBE9720D7E8A212B9C1DC153CACCD96AE0B
6,104,122 UART: [art] SIG.S = E55BE721DF8A8A258646A409468298D77C96C32386B08BB8F8AECF6D1DB2AC641ADEAB4D9FA687E8310953F334D97325
6,127,915 UART: Caliptra RT
6,128,261 UART: [state] CFI Enabled
6,407,603 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 ready_for_fw is high
1,060,434 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,384 >>> mbox cmd response: success
2,627,384 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,689,840 UART:
2,689,856 UART: Running Caliptra FMC ...
2,690,264 UART:
2,690,407 UART: [state] CFI Enabled
2,700,978 UART: [fht] FMC Alias Private Key: 7
2,809,083 UART: [art] Extend RT PCRs Done
2,809,511 UART: [art] Lock RT PCRs Done
2,810,803 UART: [art] Populate DV Done
2,818,848 UART: [fht] FMC Alias Private Key: 7
2,819,958 UART: [art] Derive CDI
2,820,238 UART: [art] Store in in slot 0x4
2,905,597 UART: [art] Derive Key Pair
2,905,957 UART: [art] Store priv key in slot 0x5
2,918,997 UART: [art] Derive Key Pair - Done
2,933,575 UART: [art] Signing Cert with AUTHO
2,934,055 UART: RITY.KEYID = 7
2,949,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,914 UART: [art] PUB.X = 5932808FB440D64F7D57ED3F288146DDBFD91518D0BD03634817761A56128D373F86F524FC04044B3A459B195245DF82
2,956,667 UART: [art] PUB.Y = 54D909A7A41B884AC807474A9F930B1610F8400D7A79D6E943FA27906D106BCBBC61A755F34C01B6E978735F538E1F70
2,963,600 UART: [art] SIG.R = F8CB4BAA336FD684AE18888C8C55492002110B70F9F80EF8281271BF11142ADF9F447065A0176C5597BB166DF8C357E0
2,970,361 UART: [art] SIG.S = E155826BBB46AC5BB3C581D27E13C3F76C0D38467F2A6C52D56F69922EAEFEF4B9A557D1513F2961995EE7BE47571E88
2,994,309 UART: Caliptra RT
2,994,655 UART: [state] CFI Enabled
3,103,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,541,367 >>> mbox cmd response: success
5,554,545 UART:
5,554,561 UART: Running Caliptra FMC ...
5,554,969 UART:
5,555,112 UART: [state] CFI Enabled
5,644,425 UART: [art] Extend RT PCRs Done
5,644,853 UART: [art] Lock RT PCRs Done
5,646,270 UART: [art] Populate DV Done
5,654,603 UART: [fht] FMC Alias Private Key: 7
5,655,597 UART: [art] Derive CDI
5,655,877 UART: [art] Store in in slot 0x4
5,741,532 UART: [art] Derive Key Pair
5,741,892 UART: [art] Store priv key in slot 0x5
5,754,910 UART: [art] Derive Key Pair - Done
5,769,960 UART: [art] Signing Cert with AUTHO
5,770,440 UART: RITY.KEYID = 7
5,786,026 UART: [art] Erasing AUTHORITY.KEYID = 7
5,786,791 UART: [art] PUB.X = 8C8BA8466D71BAE9C3E855230F4835908D4D593CEF6A5C32B2D783D2A26DD844F9FD9DD8ED49DF286118AC37C5D0C7D7
5,793,572 UART: [art] PUB.Y = 3F9F92ACEA5CCBEC3A181F93DDD7E8F5824D9F23FEE965A08B19A6D79E8204FC354FA8B6674186E9657168B81504330E
5,800,523 UART: [art] SIG.R = 2D587538F927EC518FC3258CC044D8C145A727FFC7996E1D91D40F28AE028E25F161A16A9D40F62AAA4316CB98F41581
5,807,289 UART: [art] SIG.S = AB267A357426A2B68267E223D6D23A684296E074FB88E3E5142A98A0FEA81361AAFE085593CB4FD6EFBB2905F534B118
5,831,004 UART: Caliptra RT
5,831,350 UART: [state] CFI Enabled
6,118,481 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
1,173,769 ready_for_fw is high
1,173,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,291 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,108 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,177 UART: [fwproc] Recv command 0x46574c44
1,281,910 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,545 >>> mbox cmd response: success
2,772,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,773,704 UART: [afmc] ++
2,773,872 UART: [afmc] CDI.KEYID = 6
2,774,235 UART: [afmc] SUBJECT.KEYID = 7
2,774,661 UART: [afmc] AUTHORITY.KEYID = 5
2,810,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,091 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,810 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,673 UART: [afmc] --
2,853,703 UART: [cold-reset] --
2,854,651 UART: [state] Locking Datavault
2,855,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,402 UART: [state] Locking ICCM
2,857,046 UART: [exit] Launching FMC @ 0x40000130
2,862,375 UART:
2,862,391 UART: Running Caliptra FMC ...
2,862,799 UART:
2,862,853 UART: [state] CFI Enabled
2,873,368 UART: [fht] FMC Alias Private Key: 7
2,981,581 UART: [art] Extend RT PCRs Done
2,982,009 UART: [art] Lock RT PCRs Done
2,983,627 UART: [art] Populate DV Done
2,991,990 UART: [fht] FMC Alias Private Key: 7
2,992,928 UART: [art] Derive CDI
2,993,208 UART: [art] Store in in slot 0x4
3,078,849 UART: [art] Derive Key Pair
3,079,209 UART: [art] Store priv key in slot 0x5
3,092,891 UART: [art] Derive Key Pair - Done
3,107,806 UART: [art] Signing Cert with AUTHO
3,108,286 UART: RITY.KEYID = 7
3,123,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,455 UART: [art] PUB.X = 5735B21668CF44A5A8BC864077F17EC6D9404D9A0886E53F69956140CD49567F74E7489CD5E07A0B0D485C75A6AED1EF
3,131,218 UART: [art] PUB.Y = AD8192F2A1167FDD107BE668134868C67CC284CF285A0C12DE26FE5A65B7DD9AECF1F623836558ACE851C4DC350FEBA2
3,138,178 UART: [art] SIG.R = DDC49524EF0B69EEAE4CD77CD872BF796C44DC0ED69D31FE6CA6277E376B767DEF36DCD946357AECE4A0DF1FF4BBD646
3,144,972 UART: [art] SIG.S = 2D1404D9D2041659E6C6B01C65EC4DF92C589E875630FA5D0B06B73A07EDADE209B4E894E4F2807ED9EF2639A79037A2
3,168,729 UART: Caliptra RT
3,168,983 UART: [state] CFI Enabled
3,276,207 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,991 UART:
3,278,007 UART: Running Caliptra ROM ...
3,278,415 UART:
3,278,470 UART: [state] CFI Enabled
3,281,016 UART: [state] LifecycleState = Unprovisioned
3,281,671 UART: [state] DebugLocked = No
3,282,341 UART: [state] WD Timer not started. Device not locked for debugging
3,283,629 UART: [kat] SHA2-256
4,087,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,308 UART: [kat] ++
4,091,460 UART: [kat] sha1
4,095,802 UART: [kat] SHA2-256
4,097,742 UART: [kat] SHA2-384
4,100,417 UART: [kat] SHA2-512-ACC
4,102,317 UART: [kat] ECC-384
4,111,800 UART: [kat] HMAC-384Kdf
4,116,430 UART: [kat] LMS
4,364,742 UART: [kat] --
4,365,654 UART: [update-reset] ++
5,677,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,678,353 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,828,219 >>> mbox cmd response: success
5,828,398 UART: [update-reset] Copying MAN_2 To MAN_1
5,836,412 UART: [update-reset Success] --
5,837,393 UART: [state] Locking Datavault
5,838,185 UART: [state] Locking PCR0, PCR1 and PCR31
5,838,789 UART: [state] Locking ICCM
5,839,421 UART: [exit] Launching FMC @ 0x40000130
5,844,750 UART:
5,844,766 UART: Running Caliptra FMC ...
5,845,174 UART:
5,845,228 UART: [state] CFI Enabled
5,933,977 UART: [art] Extend RT PCRs Done
5,934,405 UART: [art] Lock RT PCRs Done
5,935,444 UART: [art] Populate DV Done
5,943,817 UART: [fht] FMC Alias Private Key: 7
5,944,773 UART: [art] Derive CDI
5,945,053 UART: [art] Store in in slot 0x4
6,030,842 UART: [art] Derive Key Pair
6,031,202 UART: [art] Store priv key in slot 0x5
6,044,558 UART: [art] Derive Key Pair - Done
6,059,232 UART: [art] Signing Cert with AUTHO
6,059,712 UART: RITY.KEYID = 7
6,075,092 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,857 UART: [art] PUB.X = BF599D852A61260E0C0328754D8ACC6F7D28CDCA5952C9DEEAD96E12C9C7D9E7175991F6F0EF00049BC43EED559EA627
6,082,607 UART: [art] PUB.Y = D0E7F522ECB3B7AEC9D1D40442AA7EAC40BBF859598CA737A9061B78769AF10540F252CB03113FB25C04D952FD379EA7
6,089,554 UART: [art] SIG.R = F0748C9B7B33B79356C7C4FDD3C4B771B2C7200CE3A827307543D8609755EE1B6DE208691A4B00EFD49750C95B4ED070
6,096,298 UART: [art] SIG.S = 17E6BDBE28FA3F606798E3BB91E55356F4830E1B9CAC426305E9D43BCC15414502578F642DA83316C41354584EF78645
6,119,722 UART: Caliptra RT
6,119,976 UART: [state] CFI Enabled
6,403,511 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,372 ready_for_fw is high
1,056,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,704 >>> mbox cmd response: success
2,622,704 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,586 UART:
2,684,602 UART: Running Caliptra FMC ...
2,685,010 UART:
2,685,064 UART: [state] CFI Enabled
2,695,421 UART: [fht] FMC Alias Private Key: 7
2,803,002 UART: [art] Extend RT PCRs Done
2,803,430 UART: [art] Lock RT PCRs Done
2,804,734 UART: [art] Populate DV Done
2,812,911 UART: [fht] FMC Alias Private Key: 7
2,813,993 UART: [art] Derive CDI
2,814,273 UART: [art] Store in in slot 0x4
2,900,010 UART: [art] Derive Key Pair
2,900,370 UART: [art] Store priv key in slot 0x5
2,913,376 UART: [art] Derive Key Pair - Done
2,928,433 UART: [art] Signing Cert with AUTHO
2,928,913 UART: RITY.KEYID = 7
2,944,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,928 UART: [art] PUB.X = B0357DD7D1B3BB020E14E15565446D91DCC3CD9BF4F735EDCB46B99E33DC31DA04873AFC8200BF6B9CDF00CFE2B1B754
2,951,667 UART: [art] PUB.Y = B4C325FB7D3F196C1D3FD0D54186A021613FFECD4545E076FF7AF3A7273D320DD4B48E9D287767982F0663DB6DFD3AB1
2,958,623 UART: [art] SIG.R = D9CCE39C3DF83331A454F227675F95523029BC646C498BAFD2E9A67D808BF83326378DC1D37983D59B1584B8E8108376
2,965,389 UART: [art] SIG.S = 2816C1BCB61646D9BD7946FD3D07670CFB4F793D26EE560E525784B40A13E8022CE0D799BA9B7BB1A10C7DC91861AB9A
2,988,742 UART: Caliptra RT
2,988,996 UART: [state] CFI Enabled
3,095,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,530,039 >>> mbox cmd response: success
5,543,341 UART:
5,543,357 UART: Running Caliptra FMC ...
5,543,765 UART:
5,543,819 UART: [state] CFI Enabled
5,632,450 UART: [art] Extend RT PCRs Done
5,632,878 UART: [art] Lock RT PCRs Done
5,634,253 UART: [art] Populate DV Done
5,642,202 UART: [fht] FMC Alias Private Key: 7
5,643,328 UART: [art] Derive CDI
5,643,608 UART: [art] Store in in slot 0x4
5,728,859 UART: [art] Derive Key Pair
5,729,219 UART: [art] Store priv key in slot 0x5
5,743,119 UART: [art] Derive Key Pair - Done
5,757,874 UART: [art] Signing Cert with AUTHO
5,758,354 UART: RITY.KEYID = 7
5,773,636 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,401 UART: [art] PUB.X = AF65AEAA1D68A23D657247601F350F25C921B11B2D7C9BB735584F818D711F6904545C7F76F8ABDD33B8984EB8A37D04
5,781,166 UART: [art] PUB.Y = 8F08060375570F79A58583203B9C4EEC9A2ECF042F64D4318629CC9093CA937ADF8A93C4E63929DEF3B083A77829F218
5,788,099 UART: [art] SIG.R = 4310BC4F4ED04F9B809C4AF8D3E4A4E669873C110659DD9AEDBE4C36767D47E07B243287C495C90926986732A8B0456D
5,794,863 UART: [art] SIG.S = C9B4D7668741559993394132FC96EFFC2FA9B3D385741787903CB8437148F57B7252CA389B6A6DFF2B9BE344B81E2C75
5,818,936 UART: Caliptra RT
5,819,190 UART: [state] CFI Enabled
6,097,689 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,078 UART: [state] WD Timer not started. Device not locked for debugging
87,401 UART: [kat] SHA2-256
890,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 ready_for_fw is high
1,174,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,866 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,325 UART: [ldev] ++
1,209,493 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,284 UART: [ldev] AUTHORITY.KEYID = 7
1,210,747 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,423 >>> mbox cmd response: success
2,772,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,773,538 UART: [afmc] ++
2,773,706 UART: [afmc] CDI.KEYID = 6
2,774,069 UART: [afmc] SUBJECT.KEYID = 7
2,774,495 UART: [afmc] AUTHORITY.KEYID = 5
2,810,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,887 UART: [afmc] --
2,853,897 UART: [cold-reset] --
2,854,687 UART: [state] Locking Datavault
2,855,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,492 UART: [state] Locking ICCM
2,857,134 UART: [exit] Launching FMC @ 0x40000130
2,862,463 UART:
2,862,479 UART: Running Caliptra FMC ...
2,862,887 UART:
2,863,030 UART: [state] CFI Enabled
2,873,645 UART: [fht] FMC Alias Private Key: 7
2,981,726 UART: [art] Extend RT PCRs Done
2,982,154 UART: [art] Lock RT PCRs Done
2,983,770 UART: [art] Populate DV Done
2,992,091 UART: [fht] FMC Alias Private Key: 7
2,993,023 UART: [art] Derive CDI
2,993,303 UART: [art] Store in in slot 0x4
3,078,986 UART: [art] Derive Key Pair
3,079,346 UART: [art] Store priv key in slot 0x5
3,092,832 UART: [art] Derive Key Pair - Done
3,107,751 UART: [art] Signing Cert with AUTHO
3,108,231 UART: RITY.KEYID = 7
3,122,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,656 UART: [art] PUB.X = 295E8E97E403EBE649CEA781127F9AB2DAD99660C0E8A1C7D589EAF9BFE64E7FF74C249C63B5614B217D94CE798C7D00
3,130,415 UART: [art] PUB.Y = 37BC73129EE2D02A395F186A2888C9D181D8F70988C309133F7FB629A13BEA70389CBE3520F704621697ACC291F3F867
3,137,352 UART: [art] SIG.R = 3EC76BF7FA87FA19CA0B82D1177B5009F66DB953000F951B434F035CA9355A8B9B9DB252652F99482E56B572A0986102
3,144,083 UART: [art] SIG.S = 4872E70B7ACB04D61E112D7F8E69DFA5CE47AF5C9E401DB3E87A2C94DDCDA35C6FC5B248CEC602A4A83F12A28860CD6C
3,168,257 UART: Caliptra RT
3,168,603 UART: [state] CFI Enabled
3,275,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,585 UART:
3,277,601 UART: Running Caliptra ROM ...
3,278,009 UART:
3,278,151 UART: [state] CFI Enabled
3,281,049 UART: [state] LifecycleState = Unprovisioned
3,281,704 UART: [state] DebugLocked = No
3,282,206 UART: [state] WD Timer not started. Device not locked for debugging
3,283,320 UART: [kat] SHA2-256
4,086,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,999 UART: [kat] ++
4,091,151 UART: [kat] sha1
4,095,201 UART: [kat] SHA2-256
4,097,141 UART: [kat] SHA2-384
4,100,040 UART: [kat] SHA2-512-ACC
4,101,940 UART: [kat] ECC-384
4,111,633 UART: [kat] HMAC-384Kdf
4,116,295 UART: [kat] LMS
4,364,607 UART: [kat] --
4,365,439 UART: [update-reset] ++
5,677,493 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,678,572 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,828,438 >>> mbox cmd response: success
5,828,645 UART: [update-reset] Copying MAN_2 To MAN_1
5,836,659 UART: [update-reset Success] --
5,837,784 UART: [state] Locking Datavault
5,838,666 UART: [state] Locking PCR0, PCR1 and PCR31
5,839,270 UART: [state] Locking ICCM
5,839,732 UART: [exit] Launching FMC @ 0x40000130
5,845,061 UART:
5,845,077 UART: Running Caliptra FMC ...
5,845,485 UART:
5,845,628 UART: [state] CFI Enabled
5,934,881 UART: [art] Extend RT PCRs Done
5,935,309 UART: [art] Lock RT PCRs Done
5,936,478 UART: [art] Populate DV Done
5,944,579 UART: [fht] FMC Alias Private Key: 7
5,945,583 UART: [art] Derive CDI
5,945,863 UART: [art] Store in in slot 0x4
6,031,638 UART: [art] Derive Key Pair
6,031,998 UART: [art] Store priv key in slot 0x5
6,045,390 UART: [art] Derive Key Pair - Done
6,060,107 UART: [art] Signing Cert with AUTHO
6,060,587 UART: RITY.KEYID = 7
6,075,767 UART: [art] Erasing AUTHORITY.KEYID = 7
6,076,532 UART: [art] PUB.X = 11BCE381931B9A3BEF989D42C72ED263B4E3BF50AFFE9344820955FEA0935164121BD382713A7EFA33E1C73E22178EA2
6,083,305 UART: [art] PUB.Y = ABA6AA8B2B5A2358E4413B27AE3BB81F8343F6363A579ADFE0DDB9DFE1C24433331636F686A4CFFF48922A01329A83EB
6,090,266 UART: [art] SIG.R = 310482065286873086E5D84971B8D8155ED0B66F1C490B5004A66168DF55BF4E7547285C0B8F2D3D9FFE6290ACD6BD63
6,097,017 UART: [art] SIG.S = 0F36A86AB5A4B21DAC755DF0C2D70ACC713C99A4D646966094A01C2FE900415191BBDDB1D3DCABC826499C9ACA886785
6,121,118 UART: Caliptra RT
6,121,464 UART: [state] CFI Enabled
6,404,793 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,257 ready_for_fw is high
1,056,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,653 >>> mbox cmd response: success
2,622,653 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,863 UART:
2,684,879 UART: Running Caliptra FMC ...
2,685,287 UART:
2,685,430 UART: [state] CFI Enabled
2,696,321 UART: [fht] FMC Alias Private Key: 7
2,804,364 UART: [art] Extend RT PCRs Done
2,804,792 UART: [art] Lock RT PCRs Done
2,806,282 UART: [art] Populate DV Done
2,814,291 UART: [fht] FMC Alias Private Key: 7
2,815,259 UART: [art] Derive CDI
2,815,539 UART: [art] Store in in slot 0x4
2,901,374 UART: [art] Derive Key Pair
2,901,734 UART: [art] Store priv key in slot 0x5
2,915,230 UART: [art] Derive Key Pair - Done
2,930,118 UART: [art] Signing Cert with AUTHO
2,930,598 UART: RITY.KEYID = 7
2,946,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,835 UART: [art] PUB.X = D157B5EAD9C332A2B6AB61BF0FD238CEE5AE05A9171C9BEA9F31C93A397AE06896048A8E5D1DD71D4C827E81064CFCAD
2,953,615 UART: [art] PUB.Y = 5428E222CA0442A4CBB75AD31867A003FDAB631E488A626E6D4079E123B0E137117EF9B86B4A965ABB99B9F587280D51
2,960,558 UART: [art] SIG.R = 9BBDEFAACCFACC39724D05FAC85CB37461A7E8DD0AAD761A09F2909AA627EC1228F3EBD145E9CAC628A4C4E97857DBBA
2,967,351 UART: [art] SIG.S = 37EF2E557481FBA5A2F144A2661690F9AD14F0CC2A21A6D02E6B6C5081F3D8A70B6BFE4311610008E753A2914FC750B5
2,990,736 UART: Caliptra RT
2,991,082 UART: [state] CFI Enabled
3,099,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,534,052 >>> mbox cmd response: success
5,547,214 UART:
5,547,230 UART: Running Caliptra FMC ...
5,547,638 UART:
5,547,781 UART: [state] CFI Enabled
5,637,286 UART: [art] Extend RT PCRs Done
5,637,714 UART: [art] Lock RT PCRs Done
5,639,017 UART: [art] Populate DV Done
5,647,236 UART: [fht] FMC Alias Private Key: 7
5,648,246 UART: [art] Derive CDI
5,648,526 UART: [art] Store in in slot 0x4
5,733,939 UART: [art] Derive Key Pair
5,734,299 UART: [art] Store priv key in slot 0x5
5,747,649 UART: [art] Derive Key Pair - Done
5,762,281 UART: [art] Signing Cert with AUTHO
5,762,761 UART: RITY.KEYID = 7
5,777,971 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,736 UART: [art] PUB.X = 5540ED11CC364098C27684A794C34A6EFB2D6693741A5146E3B971986E6C2F95E2F862C0BD06077EADC0FD3C265C204E
5,785,502 UART: [art] PUB.Y = 404EF888B7C8EA9BE66B36CCFA7A495298EDED54BC5F9F3FC5CDECAAD104B90E4B6DF9A566BA9D00C48A7323525D7D8E
5,792,452 UART: [art] SIG.R = 24C50457684F6AD67B8335BAF5433F81A44B39A9CE086AF01F413E3A9F036258856B6AB00BD9FBC2895EE0BDF4C1D574
5,799,218 UART: [art] SIG.S = D6298FCDB62E493CE7EDEA94C1851A915C89314336E53EAA6DE924556A6E8C8498F7C674591FBA900A90F1BF4C836663
5,822,902 UART: Caliptra RT
5,823,248 UART: [state] CFI Enabled
6,105,355 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,377 UART:
192,735 UART: Running Caliptra ROM ...
193,820 UART:
193,955 UART: [state] CFI Enabled
264,971 UART: [state] LifecycleState = Unprovisioned
266,952 UART: [state] DebugLocked = No
268,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,198 UART: [kat] SHA2-256
442,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,378 UART: [kat] ++
453,819 UART: [kat] sha1
464,545 UART: [kat] SHA2-256
467,184 UART: [kat] SHA2-384
472,450 UART: [kat] SHA2-512-ACC
474,827 UART: [kat] ECC-384
2,767,695 UART: [kat] HMAC-384Kdf
2,799,413 UART: [kat] LMS
3,989,765 UART: [kat] --
3,993,212 UART: [cold-reset] ++
3,994,570 UART: [fht] Storing FHT @ 0x50003400
4,004,834 UART: [idev] ++
4,005,393 UART: [idev] CDI.KEYID = 6
4,006,346 UART: [idev] SUBJECT.KEYID = 7
4,007,581 UART: [idev] UDS.KEYID = 0
4,008,588 ready_for_fw is high
4,008,794 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,152,294 UART: [idev] Erasing UDS.KEYID = 0
7,344,405 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,048 UART: [idev] --
7,369,826 UART: [ldev] ++
7,370,411 UART: [ldev] CDI.KEYID = 6
7,371,382 UART: [ldev] SUBJECT.KEYID = 5
7,372,590 UART: [ldev] AUTHORITY.KEYID = 7
7,373,817 UART: [ldev] FE.KEYID = 1
7,401,147 UART: [ldev] Erasing FE.KEYID = 1
10,731,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,224 UART: [ldev] --
13,094,200 UART: [fwproc] Waiting for Commands...
13,096,448 UART: [fwproc] Received command 0x46574c44
13,098,676 UART: [fwproc] Received Image of size 114036 bytes
17,149,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,209 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,611,280 >>> mbox cmd response: success
17,615,639 UART: [afmc] ++
17,616,229 UART: [afmc] CDI.KEYID = 6
17,617,131 UART: [afmc] SUBJECT.KEYID = 7
17,618,392 UART: [afmc] AUTHORITY.KEYID = 5
20,985,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,947 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,351 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,196 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,635 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,928 UART: [afmc] --
23,359,191 UART: [cold-reset] --
23,362,610 UART: [state] Locking Datavault
23,366,930 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,700 UART: [state] Locking ICCM
23,370,088 UART: [exit] Launching FMC @ 0x40000130
23,378,481 UART:
23,378,708 UART: Running Caliptra FMC ...
23,379,798 UART:
23,379,951 UART: [state] CFI Enabled
23,446,880 UART: [fht] FMC Alias Private Key: 7
25,785,155 UART: [art] Extend RT PCRs Done
25,786,383 UART: [art] Lock RT PCRs Done
25,787,891 UART: [art] Populate DV Done
25,793,348 UART: [fht] FMC Alias Private Key: 7
25,795,040 UART: [art] Derive CDI
25,795,850 UART: [art] Store in in slot 0x4
25,855,972 UART: [art] Derive Key Pair
25,856,981 UART: [art] Store priv key in slot 0x5
29,149,689 UART: [art] Derive Key Pair - Done
29,162,698 UART: [art] Signing Cert with AUTHO
29,164,033 UART: RITY.KEYID = 7
31,452,036 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,543 UART: [art] PUB.X = CA8EB6364F4A44A79938DD1C23C4369E5F58D855DEB1851B3D72A4D5A4435817733B288AFCBAE96E5AB15B244BF8D69B
31,460,798 UART: [art] PUB.Y = EA904008477EB0ED23BFF40DDC419814AC2632CEFD7E37547F9329586BAB9FDC2D83AE5242C4F3B2678C3FCED7FA7386
31,468,048 UART: [art] SIG.R = DE5A745AFB9E5F8BE2BE1206BAEFF7E1919F1010EBAE52426606E09D279B68B73B16D2AB180050069E57C68C1B690DD3
31,475,463 UART: [art] SIG.S = 3B999B796434BA2297373F7ED0309E3648E5493A9B42A891673B2493A5CA047B108A8502AE3BF4317203FE82E0E209C6
32,781,370 UART: Caliptra RT
32,782,100 UART: [state] CFI Enabled
32,942,629 UART: [rt] RT listening for mailbox commands...
32,944,532 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,974,811 UART: [rt]cmd =0x434b4558, len=80
38,706,822 >>> mbox cmd response data (6280 bytes)
38,740,586 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,770,847 UART: [rt]cmd =0x414c544e, len=41
38,773,071 >>> mbox cmd response data (8 bytes)
38,773,679 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,803,825 UART: [rt]cmd =0x434b4558, len=80
44,552,282 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
3,802,718 ready_for_fw is high
3,803,118 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,850,696 >>> mbox cmd response: success
23,549,767 UART:
23,550,165 UART: Running Caliptra FMC ...
23,551,305 UART:
23,551,461 UART: [state] CFI Enabled
23,618,916 UART: [fht] FMC Alias Private Key: 7
25,957,064 UART: [art] Extend RT PCRs Done
25,958,322 UART: [art] Lock RT PCRs Done
25,959,916 UART: [art] Populate DV Done
25,965,360 UART: [fht] FMC Alias Private Key: 7
25,966,841 UART: [art] Derive CDI
25,967,776 UART: [art] Store in in slot 0x4
26,026,612 UART: [art] Derive Key Pair
26,027,610 UART: [art] Store priv key in slot 0x5
29,321,745 UART: [art] Derive Key Pair - Done
29,334,743 UART: [art] Signing Cert with AUTHO
29,336,076 UART: RITY.KEYID = 7
31,622,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,131 UART: [art] PUB.X = E85D6ECE83BC48D66732061A1F5E86E3F87630FC95A52E29B77D275E82A2265A9C25C7AE015CD7CF0057C5B3DE5814F6
31,631,352 UART: [art] PUB.Y = 2F6221D41887639DBD27507EC2BEB5C572E3FADDE50D389A0DD5393DC74DFAC6E578F421F477E28B58E8AE97E84B897E
31,638,627 UART: [art] SIG.R = 4405D9759D925E3F6B3B5D171BAB1DBE2AC9A341AF7F34DEECD05C7900DFF774E8B2688747B25E9EA7951FA0EFBC78DB
31,646,039 UART: [art] SIG.S = 10057B2D9B5479D13F6A3FBB83477DDAA9805A50264F1EB23C7FFC3AA1045F550B2E2026F7BE504BCA409D0BAE2C95DD
32,951,040 UART: Caliptra RT
32,951,753 UART: [state] CFI Enabled
33,113,667 UART: [rt] RT listening for mailbox commands...
33,115,583 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,146,227 UART: [rt]cmd =0x434b4558, len=80
38,898,948 >>> mbox cmd response data (6280 bytes)
38,933,000 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,963,191 UART: [rt]cmd =0x414c544e, len=41
38,965,746 >>> mbox cmd response data (8 bytes)
38,966,309 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,996,877 UART: [rt]cmd =0x434b4558, len=80
44,741,470 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,355 UART:
192,711 UART: Running Caliptra ROM ...
193,811 UART:
603,718 UART: [state] CFI Enabled
617,417 UART: [state] LifecycleState = Unprovisioned
619,390 UART: [state] DebugLocked = No
621,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,412 UART: [kat] SHA2-256
796,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,705 UART: [kat] ++
807,150 UART: [kat] sha1
817,472 UART: [kat] SHA2-256
820,200 UART: [kat] SHA2-384
825,335 UART: [kat] SHA2-512-ACC
827,701 UART: [kat] ECC-384
3,113,341 UART: [kat] HMAC-384Kdf
3,124,442 UART: [kat] LMS
4,314,521 UART: [kat] --
4,318,474 UART: [cold-reset] ++
4,320,335 UART: [fht] Storing FHT @ 0x50003400
4,331,671 UART: [idev] ++
4,332,231 UART: [idev] CDI.KEYID = 6
4,333,183 UART: [idev] SUBJECT.KEYID = 7
4,334,427 UART: [idev] UDS.KEYID = 0
4,335,409 ready_for_fw is high
4,335,642 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,920 UART: [idev] Erasing UDS.KEYID = 0
7,625,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,716 UART: [idev] --
7,652,948 UART: [ldev] ++
7,653,573 UART: [ldev] CDI.KEYID = 6
7,654,493 UART: [ldev] SUBJECT.KEYID = 5
7,655,708 UART: [ldev] AUTHORITY.KEYID = 7
7,656,940 UART: [ldev] FE.KEYID = 1
7,669,201 UART: [ldev] Erasing FE.KEYID = 1
10,956,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,358 UART: [ldev] --
13,316,432 UART: [fwproc] Waiting for Commands...
13,319,381 UART: [fwproc] Received command 0x46574c44
13,321,576 UART: [fwproc] Received Image of size 114036 bytes
17,372,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,904 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,804 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,829,115 >>> mbox cmd response: success
17,833,466 UART: [afmc] ++
17,834,058 UART: [afmc] CDI.KEYID = 6
17,835,028 UART: [afmc] SUBJECT.KEYID = 7
17,836,247 UART: [afmc] AUTHORITY.KEYID = 5
21,150,295 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,769 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,152 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,947 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,427 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,613 UART: [afmc] --
23,516,206 UART: [cold-reset] --
23,518,716 UART: [state] Locking Datavault
23,524,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,924 UART: [state] Locking ICCM
23,527,021 UART: [exit] Launching FMC @ 0x40000130
23,535,363 UART:
23,535,593 UART: Running Caliptra FMC ...
23,536,611 UART:
23,536,757 UART: [state] CFI Enabled
23,545,042 UART: [fht] FMC Alias Private Key: 7
25,876,095 UART: [art] Extend RT PCRs Done
25,877,318 UART: [art] Lock RT PCRs Done
25,878,970 UART: [art] Populate DV Done
25,884,382 UART: [fht] FMC Alias Private Key: 7
25,885,915 UART: [art] Derive CDI
25,886,647 UART: [art] Store in in slot 0x4
25,929,629 UART: [art] Derive Key Pair
25,930,673 UART: [art] Store priv key in slot 0x5
29,172,514 UART: [art] Derive Key Pair - Done
29,185,617 UART: [art] Signing Cert with AUTHO
29,186,914 UART: RITY.KEYID = 7
31,465,839 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,340 UART: [art] PUB.X = 85966B5C7C719CCA942DDB8EC8023E5BEACFE24D63E5ADD5C8809BD8DC04990A6AC1F6DFCAD14F2994DDA01C8DC49F96
31,474,629 UART: [art] PUB.Y = 4390EB7988232CB85657D5F65889D0216210FA9BE3400A415A0E32FD03BA445FA4E1D1693EA14ED2662920F9F01A291C
31,481,886 UART: [art] SIG.R = 0B16F8E770972481D26FCDEEE15CCAD3F11EA7FB8CE8E6865F2B27892647F6C11C583098CB948891BB1307149BF0BA3B
31,489,253 UART: [art] SIG.S = 0988B497D760C3D51B305542D506AFBB810BD1FB3F534A0416D7F37A9CBEEF08B50D592C65AA8AB1794D2784B55A2239
32,794,013 UART: Caliptra RT
32,794,714 UART: [state] CFI Enabled
32,911,657 UART: [rt] RT listening for mailbox commands...
32,913,545 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,943,737 UART: [rt]cmd =0x434b4558, len=80
38,602,730 >>> mbox cmd response data (6280 bytes)
38,636,631 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,667,250 UART: [rt]cmd =0x414c544e, len=41
38,669,695 >>> mbox cmd response data (8 bytes)
38,670,334 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,700,568 UART: [rt]cmd =0x434b4558, len=80
44,360,625 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
4,127,136 ready_for_fw is high
4,127,540 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,065,363 >>> mbox cmd response: success
23,706,574 UART:
23,706,962 UART: Running Caliptra FMC ...
23,708,074 UART:
23,708,231 UART: [state] CFI Enabled
23,716,138 UART: [fht] FMC Alias Private Key: 7
26,046,763 UART: [art] Extend RT PCRs Done
26,047,987 UART: [art] Lock RT PCRs Done
26,049,460 UART: [art] Populate DV Done
26,054,776 UART: [fht] FMC Alias Private Key: 7
26,056,330 UART: [art] Derive CDI
26,057,152 UART: [art] Store in in slot 0x4
26,099,761 UART: [art] Derive Key Pair
26,100,813 UART: [art] Store priv key in slot 0x5
29,342,262 UART: [art] Derive Key Pair - Done
29,355,232 UART: [art] Signing Cert with AUTHO
29,356,733 UART: RITY.KEYID = 7
31,635,719 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,226 UART: [art] PUB.X = 838E29F7E142F289B3789946EF249ACF13B11A1B0D245B92D8F390BC7A4C183B94C3F21D6095B4218795F9BC750D1598
31,644,443 UART: [art] PUB.Y = 2839623EBF1D8FF730E1583B87B3305FB9544FCF484F580461F22E4E6D959CD4B1D5926FC49AEC912DC4A7443DF9BA85
31,651,705 UART: [art] SIG.R = DBDCA8B729D5E606A94E294BC18A0ACAFBA27A5A0CEAFA383966338A41B64E3AADB2BD324905EECC27BE838C14F6BD4D
31,659,124 UART: [art] SIG.S = E4E564F4D097F69F2D5B4F03F1DCA78DD13B90A1A7AB96EFB6FD5558EE9063814BA0E8F930D821601769092A4D5AD602
32,964,612 UART: Caliptra RT
32,965,322 UART: [state] CFI Enabled
33,084,169 UART: [rt] RT listening for mailbox commands...
33,086,076 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,116,541 UART: [rt]cmd =0x434b4558, len=80
38,775,394 >>> mbox cmd response data (6280 bytes)
38,809,457 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,839,636 UART: [rt]cmd =0x414c544e, len=41
38,841,998 >>> mbox cmd response data (8 bytes)
38,842,578 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,873,119 UART: [rt]cmd =0x434b4558, len=80
44,532,030 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,475 UART:
192,834 UART: Running Caliptra ROM ...
194,025 UART:
194,209 UART: [state] CFI Enabled
263,249 UART: [state] LifecycleState = Unprovisioned
265,162 UART: [state] DebugLocked = No
267,194 UART: [state] WD Timer not started. Device not locked for debugging
270,166 UART: [kat] SHA2-256
449,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,883 UART: [kat] ++
461,415 UART: [kat] sha1
472,932 UART: [kat] SHA2-256
476,006 UART: [kat] SHA2-384
482,641 UART: [kat] SHA2-512-ACC
485,586 UART: [kat] ECC-384
2,949,966 UART: [kat] HMAC-384Kdf
2,972,732 UART: [kat] LMS
3,502,225 UART: [kat] --
3,506,438 UART: [cold-reset] ++
3,508,601 UART: [fht] FHT @ 0x50003400
3,518,446 UART: [idev] ++
3,519,014 UART: [idev] CDI.KEYID = 6
3,519,929 UART: [idev] SUBJECT.KEYID = 7
3,521,104 UART: [idev] UDS.KEYID = 0
3,522,156 ready_for_fw is high
3,522,358 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,537 UART: [idev] Erasing UDS.KEYID = 0
6,027,506 UART: [idev] Sha1 KeyId Algorithm
6,050,403 UART: [idev] --
6,055,049 UART: [ldev] ++
6,055,623 UART: [ldev] CDI.KEYID = 6
6,056,515 UART: [ldev] SUBJECT.KEYID = 5
6,057,729 UART: [ldev] AUTHORITY.KEYID = 7
6,058,964 UART: [ldev] FE.KEYID = 1
6,100,993 UART: [ldev] Erasing FE.KEYID = 1
8,602,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,143 UART: [ldev] --
10,413,971 UART: [fwproc] Wait for Commands...
10,416,011 UART: [fwproc] Recv command 0x46574c44
10,418,147 UART: [fwproc] Recv'd Img size: 114360 bytes
13,817,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,275,228 >>> mbox cmd response: success
14,280,168 UART: [afmc] ++
14,280,769 UART: [afmc] CDI.KEYID = 6
14,281,681 UART: [afmc] SUBJECT.KEYID = 7
14,282,859 UART: [afmc] AUTHORITY.KEYID = 5
16,809,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,140 UART: [afmc] --
18,609,273 UART: [cold-reset] --
18,613,728 UART: [state] Locking Datavault
18,620,160 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,808 UART: [state] Locking ICCM
18,623,013 UART: [exit] Launching FMC @ 0x40000130
18,631,407 UART:
18,631,643 UART: Running Caliptra FMC ...
18,632,669 UART:
18,632,835 UART: [state] CFI Enabled
18,688,705 UART: [fht] FMC Alias Private Key: 7
20,453,115 UART: [art] Extend RT PCRs Done
20,454,353 UART: [art] Lock RT PCRs Done
20,455,899 UART: [art] Populate DV Done
20,461,638 UART: [fht] FMC Alias Private Key: 7
20,463,288 UART: [art] Derive CDI
20,464,104 UART: [art] Store in in slot 0x4
20,521,099 UART: [art] Derive Key Pair
20,522,142 UART: [art] Store priv key in slot 0x5
22,985,338 UART: [art] Derive Key Pair - Done
22,998,112 UART: [art] Signing Cert with AUTHO
22,999,406 UART: RITY.KEYID = 7
24,710,474 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,979 UART: [art] PUB.X = 60BE7DA1166606E088AD3E699C67FD650F480CD3C6FED3BCE1063D693F35932961AA8981A8262C6F95F4664E7681CDAB
24,719,254 UART: [art] PUB.Y = 2A37B9016534291AC1DE5E6127536F54457B3C8A14D9FC9B305AA40F320400823020E05F05EFD16E2AFF481C9E8E5F17
24,726,482 UART: [art] SIG.R = 52C22408B87DE51FF05F366ABC33705D680F2D5B3352D8D40BA59F0CBA3BAD50DB4755AE408BE16E1A15F0D870074871
24,733,906 UART: [art] SIG.S = 3AD355D9E0D82425C2890839386CDC36BB774891961280003F57C9A6CA65C693DE6910309889999C248C57C30E0C8AF9
25,712,622 UART: Caliptra RT
25,713,319 UART: [state] CFI Enabled
25,878,378 UART: [rt] RT listening for mailbox commands...
25,880,270 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,910,939 UART: [rt]cmd =0x434b4558, len=80
30,235,740 >>> mbox cmd response data (6280 bytes)
30,269,448 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,299,576 UART: [rt]cmd =0x414c544e, len=41
30,302,137 >>> mbox cmd response data (8 bytes)
30,302,723 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,333,331 UART: [rt]cmd =0x434b4558, len=80
34,672,625 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,477 UART:
192,860 UART: Running Caliptra ROM ...
193,967 UART:
194,112 UART: [state] CFI Enabled
263,942 UART: [state] LifecycleState = Unprovisioned
266,364 UART: [state] DebugLocked = No
268,850 UART: [state] WD Timer not started. Device not locked for debugging
272,815 UART: [kat] SHA2-256
462,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,450 UART: [kat] ++
474,103 UART: [kat] sha1
485,629 UART: [kat] SHA2-256
488,629 UART: [kat] SHA2-384
494,193 UART: [kat] SHA2-512-ACC
496,781 UART: [kat] ECC-384
2,945,938 UART: [kat] HMAC-384Kdf
2,970,613 UART: [kat] LMS
3,502,356 UART: [kat] --
3,507,219 UART: [cold-reset] ++
3,509,221 UART: [fht] FHT @ 0x50003400
3,520,918 UART: [idev] ++
3,521,555 UART: [idev] CDI.KEYID = 6
3,522,509 UART: [idev] SUBJECT.KEYID = 7
3,523,757 UART: [idev] UDS.KEYID = 0
3,524,659 ready_for_fw is high
3,524,841 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,680 UART: [idev] Erasing UDS.KEYID = 0
6,050,652 UART: [idev] Sha1 KeyId Algorithm
6,072,834 UART: [idev] --
6,078,643 UART: [ldev] ++
6,079,333 UART: [ldev] CDI.KEYID = 6
6,080,222 UART: [ldev] SUBJECT.KEYID = 5
6,081,443 UART: [ldev] AUTHORITY.KEYID = 7
6,082,607 UART: [ldev] FE.KEYID = 1
6,119,746 UART: [ldev] Erasing FE.KEYID = 1
8,624,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,376,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,363 UART: [ldev] --
10,434,273 UART: [fwproc] Wait for Commands...
10,436,748 UART: [fwproc] Recv command 0x46574c44
10,439,055 UART: [fwproc] Recv'd Img size: 114360 bytes
13,882,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,621,863 >>> mbox cmd response: success
14,625,089 UART: [afmc] ++
14,625,832 UART: [afmc] CDI.KEYID = 6
14,627,036 UART: [afmc] SUBJECT.KEYID = 7
14,628,479 UART: [afmc] AUTHORITY.KEYID = 5
17,170,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,390 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,451 UART: [afmc] --
18,969,188 UART: [cold-reset] --
18,973,277 UART: [state] Locking Datavault
18,976,483 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,690 UART: [state] Locking ICCM
18,980,794 UART: [exit] Launching FMC @ 0x40000130
18,989,481 UART:
18,989,747 UART: Running Caliptra FMC ...
18,990,857 UART:
18,991,019 UART: [state] CFI Enabled
19,053,071 UART: [fht] FMC Alias Private Key: 7
20,817,162 UART: [art] Extend RT PCRs Done
20,818,387 UART: [art] Lock RT PCRs Done
20,819,972 UART: [art] Populate DV Done
20,825,118 UART: [fht] FMC Alias Private Key: 7
20,826,656 UART: [art] Derive CDI
20,827,470 UART: [art] Store in in slot 0x4
20,885,703 UART: [art] Derive Key Pair
20,886,750 UART: [art] Store priv key in slot 0x5
23,349,532 UART: [art] Derive Key Pair - Done
23,362,479 UART: [art] Signing Cert with AUTHO
23,363,784 UART: RITY.KEYID = 7
25,075,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,817 UART: [art] PUB.X = 09ABF554F88CE933342BA55975BD46407B34A1FEF9E455EFE396ECD252FC77344759A7EB8CBC024F692723DB417F1C9C
25,084,051 UART: [art] PUB.Y = D0D7589F09043E039053BC26F8136157DDC1CC1AD7C352CF94E6E0AE32379598489A2788BD1B2F0B6CC793FAD2CB8AF6
25,091,326 UART: [art] SIG.R = 7D811256CA58A8E8C2675AB28EF3AEFAD9385C4FA8523C3243AC5E08BC539C9AFCBACED01301509B6B2090429117B9FC
25,098,784 UART: [art] SIG.S = 1AACB54B964F738A6B6E56256E4AA3E6A7412F3E609DEC8DFA096B9959B1B2F1482D9E9F8B06A0837B8BF7EEA3D59708
26,078,054 UART: Caliptra RT
26,078,750 UART: [state] CFI Enabled
26,242,168 UART: [rt] RT listening for mailbox commands...
26,244,056 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,274,565 UART: [rt]cmd =0x434b4558, len=80
30,602,180 >>> mbox cmd response data (6280 bytes)
30,636,139 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,666,462 UART: [rt]cmd =0x414c544e, len=41
30,668,970 >>> mbox cmd response data (8 bytes)
30,669,558 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,700,122 UART: [rt]cmd =0x434b4558, len=80
35,039,684 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
3,438,011 ready_for_fw is high
3,438,389 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,741,831 >>> mbox cmd response: success
19,023,896 UART:
19,024,284 UART: Running Caliptra FMC ...
19,025,402 UART:
19,025,556 UART: [state] CFI Enabled
19,076,043 UART: [fht] FMC Alias Private Key: 7
20,839,761 UART: [art] Extend RT PCRs Done
20,840,981 UART: [art] Lock RT PCRs Done
20,842,792 UART: [art] Populate DV Done
20,848,166 UART: [fht] FMC Alias Private Key: 7
20,849,604 UART: [art] Derive CDI
20,850,343 UART: [art] Store in in slot 0x4
20,908,899 UART: [art] Derive Key Pair
20,909,941 UART: [art] Store priv key in slot 0x5
23,372,944 UART: [art] Derive Key Pair - Done
23,386,262 UART: [art] Signing Cert with AUTHO
23,387,562 UART: RITY.KEYID = 7
25,098,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,325 UART: [art] PUB.X = 9C244FB0C3DF4240B2C17FA82D488F6B5647D48F395A66914A3554830FD95A7D6FAA468179BB03ABD9D36B10A8405DAC
25,107,605 UART: [art] PUB.Y = 174E0ED5AAAD1FB4F8B084A6557744AC545D0C373F0EB20CD2287E5E3DB74C29564FF0C8DA7B3806579C3733ED4D77EB
25,114,859 UART: [art] SIG.R = 4B97793901092A90220E30180983B2045DA3404FBAC8CEDA511A34BEA0DB79F0144398C050DF7376E8BEE452A2CA3F09
25,122,233 UART: [art] SIG.S = 94DB0A27CC410FE1CB69BBC4249575F7EDFAE6DF91D82090BD4FEDA39B22223C1251447C69E1CA81E7C0B97D5A34BD6E
26,101,437 UART: Caliptra RT
26,102,146 UART: [state] CFI Enabled
26,267,533 UART: [rt] RT listening for mailbox commands...
26,269,443 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,300,008 UART: [rt]cmd =0x434b4558, len=80
30,647,109 >>> mbox cmd response data (6280 bytes)
30,680,647 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,711,217 UART: [rt]cmd =0x414c544e, len=41
30,713,417 >>> mbox cmd response data (8 bytes)
30,713,904 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,744,363 UART: [rt]cmd =0x434b4558, len=80
35,083,642 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,437 UART:
192,797 UART: Running Caliptra ROM ...
193,936 UART:
603,567 UART: [state] CFI Enabled
616,800 UART: [state] LifecycleState = Unprovisioned
619,163 UART: [state] DebugLocked = No
620,679 UART: [state] WD Timer not started. Device not locked for debugging
625,350 UART: [kat] SHA2-256
815,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,971 UART: [kat] ++
826,492 UART: [kat] sha1
838,921 UART: [kat] SHA2-256
841,928 UART: [kat] SHA2-384
846,925 UART: [kat] SHA2-512-ACC
849,576 UART: [kat] ECC-384
3,290,721 UART: [kat] HMAC-384Kdf
3,303,259 UART: [kat] LMS
3,835,104 UART: [kat] --
3,838,123 UART: [cold-reset] ++
3,839,629 UART: [fht] FHT @ 0x50003400
3,851,529 UART: [idev] ++
3,852,172 UART: [idev] CDI.KEYID = 6
3,853,163 UART: [idev] SUBJECT.KEYID = 7
3,854,279 UART: [idev] UDS.KEYID = 0
3,855,262 ready_for_fw is high
3,855,476 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,157 UART: [idev] Erasing UDS.KEYID = 0
6,330,034 UART: [idev] Sha1 KeyId Algorithm
6,353,055 UART: [idev] --
6,357,428 UART: [ldev] ++
6,358,103 UART: [ldev] CDI.KEYID = 6
6,359,034 UART: [ldev] SUBJECT.KEYID = 5
6,360,187 UART: [ldev] AUTHORITY.KEYID = 7
6,361,412 UART: [ldev] FE.KEYID = 1
6,374,404 UART: [ldev] Erasing FE.KEYID = 1
8,850,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,972 UART: [ldev] --
10,643,168 UART: [fwproc] Wait for Commands...
10,646,138 UART: [fwproc] Recv command 0x46574c44
10,648,444 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,837,801 >>> mbox cmd response: success
14,841,255 UART: [afmc] ++
14,841,955 UART: [afmc] CDI.KEYID = 6
14,843,062 UART: [afmc] SUBJECT.KEYID = 7
14,844,599 UART: [afmc] AUTHORITY.KEYID = 5
17,350,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,162 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,777 UART: [afmc] --
19,148,563 UART: [cold-reset] --
19,153,289 UART: [state] Locking Datavault
19,157,074 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,220 UART: [state] Locking ICCM
19,161,048 UART: [exit] Launching FMC @ 0x40000130
19,169,715 UART:
19,169,946 UART: Running Caliptra FMC ...
19,171,043 UART:
19,171,201 UART: [state] CFI Enabled
19,178,815 UART: [fht] FMC Alias Private Key: 7
20,935,416 UART: [art] Extend RT PCRs Done
20,936,633 UART: [art] Lock RT PCRs Done
20,938,173 UART: [art] Populate DV Done
20,943,233 UART: [fht] FMC Alias Private Key: 7
20,944,771 UART: [art] Derive CDI
20,945,530 UART: [art] Store in in slot 0x4
20,988,876 UART: [art] Derive Key Pair
20,989,914 UART: [art] Store priv key in slot 0x5
23,416,175 UART: [art] Derive Key Pair - Done
23,429,227 UART: [art] Signing Cert with AUTHO
23,430,525 UART: RITY.KEYID = 7
25,135,745 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,251 UART: [art] PUB.X = 14F64ACBE770D31228FDED79830F86AE9D2DD08840E3C6D557165A043B7B20AF7EC399A42F8671D783E1535D4F283656
25,144,496 UART: [art] PUB.Y = 121233343A44068FE73A03AFDEE64B3304AA1948DB03B967AC23EFE6C85F52B08BD0AE13D6DEF3688749DC7320590706
25,151,784 UART: [art] SIG.R = 37568F12D6AD536113CB992C669C2930C108E147DF882902F38ED4A8B792FF4824507B0EDD83771F4D52D61A2998206A
25,159,123 UART: [art] SIG.S = A2EE8771CCD45B1454C7DE0AA3150C67258C9C0970EDC3BB7BCDE10F07E7EAFBCF6663D0C108E5757E5A255E74253DFA
26,137,720 UART: Caliptra RT
26,138,431 UART: [state] CFI Enabled
26,256,383 UART: [rt] RT listening for mailbox commands...
26,258,307 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,288,873 UART: [rt]cmd =0x434b4558, len=80
30,558,804 >>> mbox cmd response data (6280 bytes)
30,592,473 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,622,692 UART: [rt]cmd =0x414c544e, len=41
30,625,138 >>> mbox cmd response data (8 bytes)
30,625,715 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,656,114 UART: [rt]cmd =0x434b4558, len=80
34,926,051 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,755,144 ready_for_fw is high
3,755,737 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,726 >>> mbox cmd response: success
19,210,432 UART:
19,210,820 UART: Running Caliptra FMC ...
19,211,921 UART:
19,212,071 UART: [state] CFI Enabled
19,220,020 UART: [fht] FMC Alias Private Key: 7
20,977,073 UART: [art] Extend RT PCRs Done
20,978,298 UART: [art] Lock RT PCRs Done
20,980,112 UART: [art] Populate DV Done
20,985,567 UART: [fht] FMC Alias Private Key: 7
20,987,155 UART: [art] Derive CDI
20,987,894 UART: [art] Store in in slot 0x4
21,030,328 UART: [art] Derive Key Pair
21,031,443 UART: [art] Store priv key in slot 0x5
23,457,995 UART: [art] Derive Key Pair - Done
23,471,201 UART: [art] Signing Cert with AUTHO
23,472,508 UART: RITY.KEYID = 7
25,177,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,405 UART: [art] PUB.X = 46969466FA6B85F1508E62818373276835F00383846F3354858F883919ECDEE313CCA0880CD7E628AF7CD23D2664ECDA
25,186,617 UART: [art] PUB.Y = EE885C8EE66843475143F0ED8E848584BAA871E8C2FDB5650EA50CF1DAF532BBB26C9CA773FF2E87B0037BDD1ABE9538
25,193,933 UART: [art] SIG.R = 5851DD167F0FC40869FB90AB83228AE5E63AD7A7DAEC3649F720902BE39579278D897ACDC942732B6720848ADDCABE23
25,201,283 UART: [art] SIG.S = DC875D91B1ADE3A048C46F80087C2CB65FBACE7205E5EE71B30DA9DD887622F7173B1BFCEC2E77C261395AE05C4543AE
26,180,714 UART: Caliptra RT
26,181,405 UART: [state] CFI Enabled
26,297,611 UART: [rt] RT listening for mailbox commands...
26,299,506 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,329,751 UART: [rt]cmd =0x434b4558, len=80
30,600,106 >>> mbox cmd response data (6280 bytes)
30,634,058 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,664,296 UART: [rt]cmd =0x414c544e, len=41
30,666,850 >>> mbox cmd response data (8 bytes)
30,667,406 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,697,857 UART: [rt]cmd =0x434b4558, len=80
34,967,967 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,481 UART: [kat] SHA2-256
882,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,527 UART: [kat] ++
886,679 UART: [kat] sha1
891,135 UART: [kat] SHA2-256
893,073 UART: [kat] SHA2-384
895,696 UART: [kat] SHA2-512-ACC
897,597 UART: [kat] ECC-384
903,058 UART: [kat] HMAC-384Kdf
907,826 UART: [kat] LMS
1,476,022 UART: [kat] --
1,476,995 UART: [cold-reset] ++
1,477,543 UART: [fht] Storing FHT @ 0x50003400
1,480,320 UART: [idev] ++
1,480,488 UART: [idev] CDI.KEYID = 6
1,480,848 UART: [idev] SUBJECT.KEYID = 7
1,481,272 UART: [idev] UDS.KEYID = 0
1,481,617 ready_for_fw is high
1,481,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,996 UART: [idev] Erasing UDS.KEYID = 0
1,505,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,314 UART: [idev] --
1,515,511 UART: [ldev] ++
1,515,679 UART: [ldev] CDI.KEYID = 6
1,516,042 UART: [ldev] SUBJECT.KEYID = 5
1,516,468 UART: [ldev] AUTHORITY.KEYID = 7
1,516,931 UART: [ldev] FE.KEYID = 1
1,522,085 UART: [ldev] Erasing FE.KEYID = 1
1,547,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,746 UART: [ldev] --
1,586,157 UART: [fwproc] Waiting for Commands...
1,586,966 UART: [fwproc] Received command 0x46574c44
1,587,757 UART: [fwproc] Received Image of size 114360 bytes
2,885,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,673 >>> mbox cmd response: success
3,078,831 UART: [afmc] ++
3,078,999 UART: [afmc] CDI.KEYID = 6
3,079,361 UART: [afmc] SUBJECT.KEYID = 7
3,079,786 UART: [afmc] AUTHORITY.KEYID = 5
3,115,075 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,546 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,236 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,285 UART: [afmc] --
3,158,369 UART: [cold-reset] --
3,159,257 UART: [state] Locking Datavault
3,160,338 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,942 UART: [state] Locking ICCM
3,161,590 UART: [exit] Launching FMC @ 0x40000130
3,166,919 UART:
3,166,935 UART: Running Caliptra FMC ...
3,167,343 UART:
3,167,397 UART: [state] CFI Enabled
3,177,830 UART: [fht] FMC Alias Private Key: 7
3,284,813 UART: [art] Extend RT PCRs Done
3,285,241 UART: [art] Lock RT PCRs Done
3,287,013 UART: [art] Populate DV Done
3,295,200 UART: [fht] FMC Alias Private Key: 7
3,296,158 UART: [art] Derive CDI
3,296,438 UART: [art] Store in in slot 0x4
3,382,265 UART: [art] Derive Key Pair
3,382,625 UART: [art] Store priv key in slot 0x5
3,396,207 UART: [art] Derive Key Pair - Done
3,410,967 UART: [art] Signing Cert with AUTHO
3,411,447 UART: RITY.KEYID = 7
3,426,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,326 UART: [art] PUB.X = D36BF25EDBF48EDC04CD319CED4B2DFBE0ABB017CD464DD2FB21B96B9D10CBFE4E27D824F1D2041122A738CA2A5AC65D
3,434,122 UART: [art] PUB.Y = 55360CE839B930EA793E486C4740F55C4F60A7240288A3300B7E558B1E552FCFA91A2011C099D0CE69E886DCD5A53D18
3,441,063 UART: [art] SIG.R = 7133B2135F177F7401EB5E37D03AE4E305043F33951B8640D07EC4D1DBF8D289F633FBB5E83095AF31317B33249193E9
3,447,820 UART: [art] SIG.S = 95B87C58CD15466ACBE0EC5B22719AB5105D03088B8378D6EA5F16755FE2A6004D09DFA7A6F98CCE8E1703EFE65621D8
3,471,937 UART: Caliptra RT
3,472,191 UART: [state] CFI Enabled
3,580,971 UART: [rt] RT listening for mailbox commands...
3,581,641 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,364 UART: [rt]cmd =0x434b4558, len=80
3,779,907 >>> mbox cmd response data (6280 bytes)
3,779,908 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,450 UART: [rt]cmd =0x414c544e, len=41
3,811,399 >>> mbox cmd response data (8 bytes)
3,811,400 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,353 UART: [rt]cmd =0x434b4558, len=80
4,010,020 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,051 ready_for_fw is high
1,362,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,392 >>> mbox cmd response: success
2,987,164 UART:
2,987,180 UART: Running Caliptra FMC ...
2,987,588 UART:
2,987,642 UART: [state] CFI Enabled
2,998,191 UART: [fht] FMC Alias Private Key: 7
3,106,618 UART: [art] Extend RT PCRs Done
3,107,046 UART: [art] Lock RT PCRs Done
3,108,434 UART: [art] Populate DV Done
3,116,579 UART: [fht] FMC Alias Private Key: 7
3,117,537 UART: [art] Derive CDI
3,117,817 UART: [art] Store in in slot 0x4
3,203,414 UART: [art] Derive Key Pair
3,203,774 UART: [art] Store priv key in slot 0x5
3,216,726 UART: [art] Derive Key Pair - Done
3,231,950 UART: [art] Signing Cert with AUTHO
3,232,430 UART: RITY.KEYID = 7
3,247,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,211 UART: [art] PUB.X = 164E924F0B48D2B8B4FB2C0FAA20805F4340746D4D74911A1BBF64AA7F125E607A0F38A0A53C1ED7D98EC1CE7C6F85DD
3,254,988 UART: [art] PUB.Y = 806F0F70F41EDB03B1F978B4E0A94CF3999B775716CCF4892D8B83A0E0EDCE99E0B11136DAD7B86E3BAA24824795AF03
3,261,941 UART: [art] SIG.R = 54FE592479311086A6F204F8528946DD60BC17B4D3FF9CAABA1E1D3D7B9B2ED49C80A04B32EF68331B0A0E0DF4AFD495
3,268,713 UART: [art] SIG.S = 4CC83C57BB243B063D9DEF1B4A90C3AF2EDAA856AD42C6CD1C77052B287BBFAC40FDA329214671991D427F9F9897EB7A
3,292,558 UART: Caliptra RT
3,292,812 UART: [state] CFI Enabled
3,400,569 UART: [rt] RT listening for mailbox commands...
3,401,239 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,402 UART: [rt]cmd =0x434b4558, len=80
3,599,648 >>> mbox cmd response data (6280 bytes)
3,599,649 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,223 UART: [rt]cmd =0x414c544e, len=41
3,631,166 >>> mbox cmd response data (8 bytes)
3,631,167 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,086 UART: [rt]cmd =0x434b4558, len=80
3,830,620 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,648 UART: [kat] SHA2-256
882,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,694 UART: [kat] ++
886,846 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,699 UART: [kat] SHA2-512-ACC
897,600 UART: [kat] ECC-384
903,225 UART: [kat] HMAC-384Kdf
908,003 UART: [kat] LMS
1,476,199 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,434 UART: [fht] Storing FHT @ 0x50003400
1,480,325 UART: [idev] ++
1,480,493 UART: [idev] CDI.KEYID = 6
1,480,853 UART: [idev] SUBJECT.KEYID = 7
1,481,277 UART: [idev] UDS.KEYID = 0
1,481,622 ready_for_fw is high
1,481,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,029 UART: [idev] Erasing UDS.KEYID = 0
1,505,765 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,386 UART: [ldev] ++
1,515,554 UART: [ldev] CDI.KEYID = 6
1,515,917 UART: [ldev] SUBJECT.KEYID = 5
1,516,343 UART: [ldev] AUTHORITY.KEYID = 7
1,516,806 UART: [ldev] FE.KEYID = 1
1,522,126 UART: [ldev] Erasing FE.KEYID = 1
1,547,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,215 UART: [ldev] --
1,586,540 UART: [fwproc] Waiting for Commands...
1,587,287 UART: [fwproc] Received command 0x46574c44
1,588,078 UART: [fwproc] Received Image of size 114360 bytes
2,886,935 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,364 >>> mbox cmd response: success
3,080,414 UART: [afmc] ++
3,080,582 UART: [afmc] CDI.KEYID = 6
3,080,944 UART: [afmc] SUBJECT.KEYID = 7
3,081,369 UART: [afmc] AUTHORITY.KEYID = 5
3,116,914 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,122 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,735 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,425 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,192 UART: [afmc] --
3,160,276 UART: [cold-reset] --
3,161,090 UART: [state] Locking Datavault
3,162,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,825 UART: [state] Locking ICCM
3,163,277 UART: [exit] Launching FMC @ 0x40000130
3,168,606 UART:
3,168,622 UART: Running Caliptra FMC ...
3,169,030 UART:
3,169,173 UART: [state] CFI Enabled
3,179,376 UART: [fht] FMC Alias Private Key: 7
3,287,467 UART: [art] Extend RT PCRs Done
3,287,895 UART: [art] Lock RT PCRs Done
3,289,679 UART: [art] Populate DV Done
3,298,096 UART: [fht] FMC Alias Private Key: 7
3,299,170 UART: [art] Derive CDI
3,299,450 UART: [art] Store in in slot 0x4
3,385,147 UART: [art] Derive Key Pair
3,385,507 UART: [art] Store priv key in slot 0x5
3,398,543 UART: [art] Derive Key Pair - Done
3,413,362 UART: [art] Signing Cert with AUTHO
3,413,842 UART: RITY.KEYID = 7
3,428,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,317 UART: [art] PUB.X = 0584EB845D231C705928C56D7DCFC489D07E95986BDC22BBE69459E43EFB47258EDA01BF36B71FC83318C2BC8E7428F5
3,436,089 UART: [art] PUB.Y = A8977D843217E85D5A8F088962D72523363EE9628CF3D8C90779B8CBC0E18722F1884EF547455EC6B46183C25944CC06
3,443,022 UART: [art] SIG.R = 811FB45B1557A6632DBEE5875E28465CD14D28622106CD2DEBAACC3478E169D79D93EEFF50F26C2E232ED293F47B10BC
3,449,801 UART: [art] SIG.S = BBB8025FF995A3629C117D124A7176F8B410FB3F7CE62B0F39EA74E1F980AB3D73F58A9D226FE1EE4CFB7BEF4205B4F5
3,474,251 UART: Caliptra RT
3,474,597 UART: [state] CFI Enabled
3,583,436 UART: [rt] RT listening for mailbox commands...
3,584,106 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,199 UART: [rt]cmd =0x434b4558, len=80
3,782,544 >>> mbox cmd response data (6280 bytes)
3,782,545 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,113 UART: [rt]cmd =0x414c544e, len=41
3,813,968 >>> mbox cmd response data (8 bytes)
3,813,969 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,920 UART: [rt]cmd =0x434b4558, len=80
4,012,365 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 ready_for_fw is high
1,363,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,498 >>> mbox cmd response: success
2,989,940 UART:
2,989,956 UART: Running Caliptra FMC ...
2,990,364 UART:
2,990,507 UART: [state] CFI Enabled
3,000,926 UART: [fht] FMC Alias Private Key: 7
3,108,879 UART: [art] Extend RT PCRs Done
3,109,307 UART: [art] Lock RT PCRs Done
3,110,889 UART: [art] Populate DV Done
3,119,048 UART: [fht] FMC Alias Private Key: 7
3,120,034 UART: [art] Derive CDI
3,120,314 UART: [art] Store in in slot 0x4
3,206,227 UART: [art] Derive Key Pair
3,206,587 UART: [art] Store priv key in slot 0x5
3,219,841 UART: [art] Derive Key Pair - Done
3,234,817 UART: [art] Signing Cert with AUTHO
3,235,297 UART: RITY.KEYID = 7
3,250,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,114 UART: [art] PUB.X = 662DACCBB250C537F4D559301BA013B6232229393B4139F0B588CD5B370C3D29BF666887A374AC2A513E2A39F9F9E00B
3,257,880 UART: [art] PUB.Y = 46A3BA100ECE1ADE2D148CB75B0CF2EC7EA86EEBB029FA937811C79CE9E9E980203CC0D1E568313499D62BE8E30DBE73
3,264,841 UART: [art] SIG.R = E923EB799FE10549CC694F6B723E255E0B336AF126DEB9836062BD33855826E09429FBD2DE5005E3E49787192E1863ED
3,271,600 UART: [art] SIG.S = F55D1CCC7DD95383FCFE970C47337AFAE25EAF4DB4ABA5AD5965AA3CD103944FE7E7BF3444039EBF1F7AD74B3EF88037
3,295,204 UART: Caliptra RT
3,295,550 UART: [state] CFI Enabled
3,404,209 UART: [rt] RT listening for mailbox commands...
3,404,879 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,002 UART: [rt]cmd =0x434b4558, len=80
3,603,881 >>> mbox cmd response data (6280 bytes)
3,603,882 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,440 UART: [rt]cmd =0x414c544e, len=41
3,635,383 >>> mbox cmd response data (8 bytes)
3,635,384 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,187 UART: [rt]cmd =0x434b4558, len=80
3,834,090 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,338 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,834 UART: [idev] ++
1,175,002 UART: [idev] CDI.KEYID = 6
1,175,362 UART: [idev] SUBJECT.KEYID = 7
1,175,786 UART: [idev] UDS.KEYID = 0
1,176,131 ready_for_fw is high
1,176,131 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,808 UART: [idev] Erasing UDS.KEYID = 0
1,200,465 UART: [idev] Sha1 KeyId Algorithm
1,208,871 UART: [idev] --
1,209,795 UART: [ldev] ++
1,209,963 UART: [ldev] CDI.KEYID = 6
1,210,326 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,815 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,732 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,506 >>> mbox cmd response: success
2,773,548 UART: [afmc] ++
2,773,716 UART: [afmc] CDI.KEYID = 6
2,774,078 UART: [afmc] SUBJECT.KEYID = 7
2,774,503 UART: [afmc] AUTHORITY.KEYID = 5
2,809,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,511 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,115 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,031 UART: [afmc] --
2,852,983 UART: [cold-reset] --
2,853,709 UART: [state] Locking Datavault
2,855,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,700 UART: [state] Locking ICCM
2,856,198 UART: [exit] Launching FMC @ 0x40000130
2,861,527 UART:
2,861,543 UART: Running Caliptra FMC ...
2,861,951 UART:
2,862,005 UART: [state] CFI Enabled
2,872,512 UART: [fht] FMC Alias Private Key: 7
2,980,451 UART: [art] Extend RT PCRs Done
2,980,879 UART: [art] Lock RT PCRs Done
2,982,449 UART: [art] Populate DV Done
2,990,738 UART: [fht] FMC Alias Private Key: 7
2,991,752 UART: [art] Derive CDI
2,992,032 UART: [art] Store in in slot 0x4
3,077,785 UART: [art] Derive Key Pair
3,078,145 UART: [art] Store priv key in slot 0x5
3,091,133 UART: [art] Derive Key Pair - Done
3,106,037 UART: [art] Signing Cert with AUTHO
3,106,517 UART: RITY.KEYID = 7
3,121,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,326 UART: [art] PUB.X = 91FBBA1BB5A120094DF67867584B492AD3A3FEC0B7028F0FE64A9A03831EC6E55B55CE7783CF7EC534C85A9A1B2821F0
3,129,096 UART: [art] PUB.Y = B24315210D927B09E2AFE5F27C4220418EAC2DD3733B0216ED4B756CE5CA4BB746C00ED9B28C93DEFD34F273D46F84F6
3,136,046 UART: [art] SIG.R = A19BA24C3918F4A77567A963D6E6BB317AA93BFE7E47F3B94150052C90B355642BF119B3C608A851E4D6BBCECF758C30
3,142,818 UART: [art] SIG.S = BE75156FF992E315822C65F1D3F4C9785BB312452D68750F40F4879F17C9921B1EFFBF4EAD8E1ED005ADDC73D67D032C
3,165,798 UART: Caliptra RT
3,166,052 UART: [state] CFI Enabled
3,274,073 UART: [rt] RT listening for mailbox commands...
3,274,743 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,520 UART: [rt]cmd =0x434b4558, len=80
3,472,995 >>> mbox cmd response data (6280 bytes)
3,472,996 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,502 UART: [rt]cmd =0x414c544e, len=41
3,504,269 >>> mbox cmd response data (8 bytes)
3,504,270 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,939 UART: [rt]cmd =0x434b4558, len=80
3,702,522 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,533 ready_for_fw is high
1,060,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,415 >>> mbox cmd response: success
2,686,691 UART:
2,686,707 UART: Running Caliptra FMC ...
2,687,115 UART:
2,687,169 UART: [state] CFI Enabled
2,697,486 UART: [fht] FMC Alias Private Key: 7
2,805,117 UART: [art] Extend RT PCRs Done
2,805,545 UART: [art] Lock RT PCRs Done
2,807,105 UART: [art] Populate DV Done
2,815,288 UART: [fht] FMC Alias Private Key: 7
2,816,244 UART: [art] Derive CDI
2,816,524 UART: [art] Store in in slot 0x4
2,902,345 UART: [art] Derive Key Pair
2,902,705 UART: [art] Store priv key in slot 0x5
2,916,141 UART: [art] Derive Key Pair - Done
2,930,643 UART: [art] Signing Cert with AUTHO
2,931,123 UART: RITY.KEYID = 7
2,946,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,302 UART: [art] PUB.X = FB7414947288BA10D67F983B03A8F978E6DF923BACA3BD576935FAD3A1E24C21081AE3EB2B90F7503F038D86A73B87D5
2,954,071 UART: [art] PUB.Y = 74A5C25A3866BA4B4774D0CF2B5C1A056418F410EF4BC4EAA60626A0F66FD38B11EAABFFFDC2E741AF743B9BC330E145
2,961,035 UART: [art] SIG.R = C7898B6A30EEF9959279C6A09CBFD2DA6D04624E2A6092D8480ED36774E26E1BA00BDD534E4CE5AF43920EB64D412E67
2,967,803 UART: [art] SIG.S = 43B3E1EB4BFEEEDDA0482B77DA3D78561E0B671CC7F46B03DA644734BA9F85446643667F76F51391C97FF2A876D02C1E
2,991,240 UART: Caliptra RT
2,991,494 UART: [state] CFI Enabled
3,098,946 UART: [rt] RT listening for mailbox commands...
3,099,616 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,477 UART: [rt]cmd =0x434b4558, len=80
3,298,379 >>> mbox cmd response data (6280 bytes)
3,298,380 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,868 UART: [rt]cmd =0x414c544e, len=41
3,329,687 >>> mbox cmd response data (8 bytes)
3,329,688 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,583 UART: [rt]cmd =0x434b4558, len=80
3,528,061 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
893,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,622 UART: [kat] ++
897,774 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,787 UART: [kat] LMS
1,171,115 UART: [kat] --
1,171,998 UART: [cold-reset] ++
1,172,366 UART: [fht] FHT @ 0x50003400
1,175,125 UART: [idev] ++
1,175,293 UART: [idev] CDI.KEYID = 6
1,175,653 UART: [idev] SUBJECT.KEYID = 7
1,176,077 UART: [idev] UDS.KEYID = 0
1,176,422 ready_for_fw is high
1,176,422 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,684 UART: [idev] Sha1 KeyId Algorithm
1,210,250 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,824 UART: [ldev] Erasing FE.KEYID = 1
1,244,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,190 UART: [ldev] --
1,283,491 UART: [fwproc] Wait for Commands...
1,284,155 UART: [fwproc] Recv command 0x46574c44
1,284,883 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,768 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,817 >>> mbox cmd response: success
2,777,053 UART: [afmc] ++
2,777,221 UART: [afmc] CDI.KEYID = 6
2,777,583 UART: [afmc] SUBJECT.KEYID = 7
2,778,008 UART: [afmc] AUTHORITY.KEYID = 5
2,814,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,512 UART: [afmc] --
2,857,528 UART: [cold-reset] --
2,858,202 UART: [state] Locking Datavault
2,859,031 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,635 UART: [state] Locking ICCM
2,860,059 UART: [exit] Launching FMC @ 0x40000130
2,865,388 UART:
2,865,404 UART: Running Caliptra FMC ...
2,865,812 UART:
2,865,955 UART: [state] CFI Enabled
2,876,258 UART: [fht] FMC Alias Private Key: 7
2,984,011 UART: [art] Extend RT PCRs Done
2,984,439 UART: [art] Lock RT PCRs Done
2,985,883 UART: [art] Populate DV Done
2,994,008 UART: [fht] FMC Alias Private Key: 7
2,995,036 UART: [art] Derive CDI
2,995,316 UART: [art] Store in in slot 0x4
3,080,553 UART: [art] Derive Key Pair
3,080,913 UART: [art] Store priv key in slot 0x5
3,094,095 UART: [art] Derive Key Pair - Done
3,108,943 UART: [art] Signing Cert with AUTHO
3,109,423 UART: RITY.KEYID = 7
3,124,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,828 UART: [art] PUB.X = 191E8771EC34B9A91A91DA2E481753F8813AF3CA0302CCF7807C1F01EC4C61BB10AD03080F88ADC25E7EF9B718532514
3,131,586 UART: [art] PUB.Y = 758799D9277353362029D45D336E56BC4956DAF391C3C02A0C2ADEBD8E48955FD50E077D05C67973AF60AD74A1D02DD8
3,138,526 UART: [art] SIG.R = B70402BF1E65DF3B2A0AB615970D88376BD72544C805CA3EE55265669A90AF082F4B8E2F3398925EF72E6B7CB22317DF
3,145,282 UART: [art] SIG.S = 5DE6DF12D20F02B3B3E965663BF03DB6C8DE6F9EAC2E2F0582D9CCAACC76C3846CBF6F235DA78CB14F22901445D76D26
3,169,020 UART: Caliptra RT
3,169,366 UART: [state] CFI Enabled
3,276,560 UART: [rt] RT listening for mailbox commands...
3,277,230 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,333 UART: [rt]cmd =0x434b4558, len=80
3,477,212 >>> mbox cmd response data (6280 bytes)
3,477,213 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,007 UART: [rt]cmd =0x414c544e, len=41
3,509,106 >>> mbox cmd response data (8 bytes)
3,509,107 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,936 UART: [rt]cmd =0x434b4558, len=80
3,708,905 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,424 >>> mbox cmd response: success
2,690,352 UART:
2,690,368 UART: Running Caliptra FMC ...
2,690,776 UART:
2,690,919 UART: [state] CFI Enabled
2,701,200 UART: [fht] FMC Alias Private Key: 7
2,810,111 UART: [art] Extend RT PCRs Done
2,810,539 UART: [art] Lock RT PCRs Done
2,812,201 UART: [art] Populate DV Done
2,820,154 UART: [fht] FMC Alias Private Key: 7
2,821,126 UART: [art] Derive CDI
2,821,406 UART: [art] Store in in slot 0x4
2,907,407 UART: [art] Derive Key Pair
2,907,767 UART: [art] Store priv key in slot 0x5
2,920,853 UART: [art] Derive Key Pair - Done
2,935,638 UART: [art] Signing Cert with AUTHO
2,936,118 UART: RITY.KEYID = 7
2,951,430 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,195 UART: [art] PUB.X = 8667E5488B5FA264590FD8715D182AE6C3ECED21386C03443BD2D643C53212FDCDB35C73BA09CAD12F5D781DCAD60B5E
2,958,967 UART: [art] PUB.Y = F4790F9F44630C87969BDEAFA51B8356EF31B3E8B4E55E86465CFC450AFD52A5F47529AD5B074AA5DBF8BB97FE1741C4
2,965,921 UART: [art] SIG.R = D27F6E273E2A71696D547576490D855E885D99A7C616247D1DC8BA02BAE5E84F43CBA2BF23AD8AF89F3A3DE42238CD66
2,972,695 UART: [art] SIG.S = 754E8AEAB272D227E7C0373EC040C7BCB6B679FDDB16914AFA57374E58CE76D5720D461A2220AA926AC14D8FD2964848
2,996,477 UART: Caliptra RT
2,996,823 UART: [state] CFI Enabled
3,105,065 UART: [rt] RT listening for mailbox commands...
3,105,735 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,726 UART: [rt]cmd =0x434b4558, len=80
3,305,228 >>> mbox cmd response data (6280 bytes)
3,305,229 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,861 UART: [rt]cmd =0x414c544e, len=41
3,336,756 >>> mbox cmd response data (8 bytes)
3,336,757 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,910 UART: [rt]cmd =0x434b4558, len=80
3,535,946 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,823 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
891,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,193 UART: [kat] SHA2-256
902,133 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,170,277 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,499 UART: [idev] ++
1,173,667 UART: [idev] CDI.KEYID = 6
1,174,028 UART: [idev] SUBJECT.KEYID = 7
1,174,453 UART: [idev] UDS.KEYID = 0
1,174,799 ready_for_fw is high
1,174,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,276 UART: [ldev] ++
1,209,444 UART: [ldev] CDI.KEYID = 6
1,209,808 UART: [ldev] SUBJECT.KEYID = 5
1,210,235 UART: [ldev] AUTHORITY.KEYID = 7
1,210,698 UART: [ldev] FE.KEYID = 1
1,216,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,012 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,125 UART: [fwproc] Recv command 0x46574c44
1,281,858 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,136 >>> mbox cmd response: success
2,772,327 UART: [afmc] ++
2,772,495 UART: [afmc] CDI.KEYID = 6
2,772,858 UART: [afmc] SUBJECT.KEYID = 7
2,773,284 UART: [afmc] AUTHORITY.KEYID = 5
2,809,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,004 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,448 UART: [afmc] --
2,852,406 UART: [cold-reset] --
2,853,202 UART: [state] Locking Datavault
2,854,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,065 UART: [state] Locking ICCM
2,855,603 UART: [exit] Launching FMC @ 0x40000130
2,860,932 UART:
2,860,948 UART: Running Caliptra FMC ...
2,861,356 UART:
2,861,410 UART: [state] CFI Enabled
2,872,045 UART: [fht] FMC Alias Private Key: 7
2,980,384 UART: [art] Extend RT PCRs Done
2,980,812 UART: [art] Lock RT PCRs Done
2,982,230 UART: [art] Populate DV Done
2,990,729 UART: [fht] FMC Alias Private Key: 7
2,991,857 UART: [art] Derive CDI
2,992,137 UART: [art] Store in in slot 0x4
3,077,796 UART: [art] Derive Key Pair
3,078,156 UART: [art] Store priv key in slot 0x5
3,091,694 UART: [art] Derive Key Pair - Done
3,106,567 UART: [art] Signing Cert with AUTHO
3,107,047 UART: RITY.KEYID = 7
3,122,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,174 UART: [art] PUB.X = 360AB606A5E0D1850358E6AD27EF45B09FCC71C8648ADE6DB13ABD15777CA60463EF14FF0203EA8CF7C0A1864E8F28CB
3,129,942 UART: [art] PUB.Y = 748875435DAEC4A937330D5714723BAA49EEBB5F4C44B1ADE97ABFFE83FE38BB660C119A2DAB909225BCFC0CCE193B03
3,136,900 UART: [art] SIG.R = F4B3CBE88DA3DD33BDDCF3C543AD668B4B672A7FC2B512698ACFC8C33C665D503182B8AD85ABB8EB152432521CE0B70E
3,143,689 UART: [art] SIG.S = 8A4858E0034898AC00A77ECA039E4C456DCDF31B67139C44AA7FD4FA9325E4E57750976529F4E0D1A6627ACE9F2C0397
3,167,273 UART: Caliptra RT
3,167,527 UART: [state] CFI Enabled
3,275,640 UART: [rt] RT listening for mailbox commands...
3,276,310 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,341 UART: [rt]cmd =0x434b4558, len=80
3,475,144 >>> mbox cmd response data (6280 bytes)
3,475,145 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,965 UART: [rt]cmd =0x414c544e, len=41
3,506,844 >>> mbox cmd response data (8 bytes)
3,506,845 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,692 UART: [rt]cmd =0x434b4558, len=80
3,706,089 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,392 ready_for_fw is high
1,055,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,894 >>> mbox cmd response: success
2,682,978 UART:
2,682,994 UART: Running Caliptra FMC ...
2,683,402 UART:
2,683,456 UART: [state] CFI Enabled
2,693,625 UART: [fht] FMC Alias Private Key: 7
2,801,892 UART: [art] Extend RT PCRs Done
2,802,320 UART: [art] Lock RT PCRs Done
2,803,814 UART: [art] Populate DV Done
2,812,277 UART: [fht] FMC Alias Private Key: 7
2,813,235 UART: [art] Derive CDI
2,813,515 UART: [art] Store in in slot 0x4
2,899,326 UART: [art] Derive Key Pair
2,899,686 UART: [art] Store priv key in slot 0x5
2,912,738 UART: [art] Derive Key Pair - Done
2,927,495 UART: [art] Signing Cert with AUTHO
2,927,975 UART: RITY.KEYID = 7
2,943,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,450 UART: [art] PUB.X = 646BCA9CD84A2014A326E5CB0DBEE664C666EC158F1EE2AA48236FD3A0915757004F4E83DC72DF40129B138DBDB97FF0
2,951,209 UART: [art] PUB.Y = AA556C5E93CCB6C52639D0522C16C8F0B9F56E2B33D97FC400D5E983ADBBF041C030DC2F42BC1924E554A13D095E1BC8
2,958,148 UART: [art] SIG.R = AF458A2346BDEFAFED25B6817126885306883EDBF210AED5EF236CC52C8D512116FE321F9D4A9B4AA0939509D2E1F17E
2,964,924 UART: [art] SIG.S = 1CDDA0EE7B0631B9A2AA70FF5796E2E098714BBD8A2A5C5D72958B4C56B867879B815386699179603F9A749CA8D8EED9
2,988,420 UART: Caliptra RT
2,988,674 UART: [state] CFI Enabled
3,097,346 UART: [rt] RT listening for mailbox commands...
3,098,016 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,169 UART: [rt]cmd =0x434b4558, len=80
3,296,882 >>> mbox cmd response data (6280 bytes)
3,296,883 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,671 UART: [rt]cmd =0x414c544e, len=41
3,328,664 >>> mbox cmd response data (8 bytes)
3,328,665 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,324 UART: [rt]cmd =0x434b4558, len=80
3,527,159 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,295 UART: [kat] LMS
1,169,607 UART: [kat] --
1,170,586 UART: [cold-reset] ++
1,171,142 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,175,074 ready_for_fw is high
1,175,074 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,684 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,617 UART: [ldev] ++
1,210,785 UART: [ldev] CDI.KEYID = 6
1,211,149 UART: [ldev] SUBJECT.KEYID = 5
1,211,576 UART: [ldev] AUTHORITY.KEYID = 7
1,212,039 UART: [ldev] FE.KEYID = 1
1,217,329 UART: [ldev] Erasing FE.KEYID = 1
1,243,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,455 UART: [ldev] --
1,282,895 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,391 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,725 >>> mbox cmd response: success
2,775,882 UART: [afmc] ++
2,776,050 UART: [afmc] CDI.KEYID = 6
2,776,413 UART: [afmc] SUBJECT.KEYID = 7
2,776,839 UART: [afmc] AUTHORITY.KEYID = 5
2,812,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,597 UART: [afmc] --
2,855,693 UART: [cold-reset] --
2,856,437 UART: [state] Locking Datavault
2,857,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,004 UART: [state] Locking ICCM
2,858,428 UART: [exit] Launching FMC @ 0x40000130
2,863,757 UART:
2,863,773 UART: Running Caliptra FMC ...
2,864,181 UART:
2,864,324 UART: [state] CFI Enabled
2,875,049 UART: [fht] FMC Alias Private Key: 7
2,983,178 UART: [art] Extend RT PCRs Done
2,983,606 UART: [art] Lock RT PCRs Done
2,985,240 UART: [art] Populate DV Done
2,993,265 UART: [fht] FMC Alias Private Key: 7
2,994,433 UART: [art] Derive CDI
2,994,713 UART: [art] Store in in slot 0x4
3,080,356 UART: [art] Derive Key Pair
3,080,716 UART: [art] Store priv key in slot 0x5
3,093,836 UART: [art] Derive Key Pair - Done
3,108,579 UART: [art] Signing Cert with AUTHO
3,109,059 UART: RITY.KEYID = 7
3,124,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,130 UART: [art] PUB.X = C5503C72A9D786D0E2E56F7B3CE9ECD5CF4F6DC1FD202830402A00D91BFE22A6E9CEB1F49E1FFA07A869ED9D34C339FD
3,131,899 UART: [art] PUB.Y = 78A11700B5D173C0E1AC5025435C3DC9FB1F5BEE459D6F8A3DAC58D8D9D5E326EA2A3EF728B863F272E12070079E010A
3,138,828 UART: [art] SIG.R = 60D4E304F8EAB2468100DAB583AD1213872B8FD7D63F2B4F98885F6D774E96724BBB36D32177171D065A85DFB32BB823
3,145,572 UART: [art] SIG.S = 6A103FBC6B4C4044B7CEF6FC450B6C84EBE8DE7FA01F9AF95AC08027C0FACB4D5C90FDD60DF8D59F81B1A8C4CED80997
3,169,464 UART: Caliptra RT
3,169,810 UART: [state] CFI Enabled
3,277,314 UART: [rt] RT listening for mailbox commands...
3,277,984 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,233 UART: [rt]cmd =0x434b4558, len=80
3,476,864 >>> mbox cmd response data (6280 bytes)
3,476,865 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,405 UART: [rt]cmd =0x414c544e, len=41
3,508,388 >>> mbox cmd response data (8 bytes)
3,508,389 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,104 UART: [rt]cmd =0x434b4558, len=80
3,706,737 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,967 ready_for_fw is high
1,056,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,131 >>> mbox cmd response: success
2,684,967 UART:
2,684,983 UART: Running Caliptra FMC ...
2,685,391 UART:
2,685,534 UART: [state] CFI Enabled
2,696,301 UART: [fht] FMC Alias Private Key: 7
2,803,962 UART: [art] Extend RT PCRs Done
2,804,390 UART: [art] Lock RT PCRs Done
2,805,910 UART: [art] Populate DV Done
2,813,893 UART: [fht] FMC Alias Private Key: 7
2,814,899 UART: [art] Derive CDI
2,815,179 UART: [art] Store in in slot 0x4
2,901,146 UART: [art] Derive Key Pair
2,901,506 UART: [art] Store priv key in slot 0x5
2,914,848 UART: [art] Derive Key Pair - Done
2,929,724 UART: [art] Signing Cert with AUTHO
2,930,204 UART: RITY.KEYID = 7
2,945,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,007 UART: [art] PUB.X = FC49EFCA434878721FFD0AF494AFF1D39B5E21E7FE0EE04085B058511F689325AE2AFDA64686908C941ECCB83971AC6C
2,952,785 UART: [art] PUB.Y = B9C5ABE1AF4D0A526E4D39F862923F6EB0B6979B4A84315FDA7D6970A3857CB7FF91C625AD99308758B2DC382F0A4BBE
2,959,743 UART: [art] SIG.R = 67FB6C2D80DB0187F42BBFA225E27939A1599EEF38C0CA83A8F7C4B42B1E0960FCD751124ED455652C80DE40F7302995
2,966,513 UART: [art] SIG.S = 75633ACFB98823190684854EF6A02128DDE6E54427DAAAB94C645ECF59F2EB0710883BF65284823E3D49EF964ACAE905
2,990,277 UART: Caliptra RT
2,990,623 UART: [state] CFI Enabled
3,098,123 UART: [rt] RT listening for mailbox commands...
3,098,793 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,768 UART: [rt]cmd =0x434b4558, len=80
3,296,589 >>> mbox cmd response data (6280 bytes)
3,296,590 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,080 UART: [rt]cmd =0x414c544e, len=41
3,328,127 >>> mbox cmd response data (8 bytes)
3,328,128 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,935 UART: [rt]cmd =0x434b4558, len=80
3,526,800 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,308 UART:
192,677 UART: Running Caliptra ROM ...
193,781 UART:
193,915 UART: [state] CFI Enabled
265,472 UART: [state] LifecycleState = Unprovisioned
267,833 UART: [state] DebugLocked = No
269,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,510 UART: [kat] SHA2-256
443,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,742 UART: [kat] ++
454,200 UART: [kat] sha1
465,708 UART: [kat] SHA2-256
468,434 UART: [kat] SHA2-384
473,999 UART: [kat] SHA2-512-ACC
476,359 UART: [kat] ECC-384
2,768,151 UART: [kat] HMAC-384Kdf
2,779,319 UART: [kat] LMS
3,969,653 UART: [kat] --
3,972,182 UART: [cold-reset] ++
3,974,103 UART: [fht] Storing FHT @ 0x50003400
3,984,959 UART: [idev] ++
3,985,525 UART: [idev] CDI.KEYID = 6
3,986,470 UART: [idev] SUBJECT.KEYID = 7
3,987,707 UART: [idev] UDS.KEYID = 0
3,988,657 ready_for_fw is high
3,988,844 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,132,268 UART: [idev] Erasing UDS.KEYID = 0
7,326,261 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,582 UART: [idev] --
7,351,193 UART: [ldev] ++
7,351,755 UART: [ldev] CDI.KEYID = 6
7,352,734 UART: [ldev] SUBJECT.KEYID = 5
7,353,938 UART: [ldev] AUTHORITY.KEYID = 7
7,355,158 UART: [ldev] FE.KEYID = 1
7,402,966 UART: [ldev] Erasing FE.KEYID = 1
10,737,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,031 UART: [ldev] --
13,117,961 UART: [fwproc] Waiting for Commands...
13,119,634 UART: [fwproc] Received command 0x46574c44
13,121,815 UART: [fwproc] Received Image of size 114036 bytes
17,169,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,886 >>> mbox cmd response: success
17,634,289 UART: [afmc] ++
17,634,877 UART: [afmc] CDI.KEYID = 6
17,635,778 UART: [afmc] SUBJECT.KEYID = 7
17,637,038 UART: [afmc] AUTHORITY.KEYID = 5
21,004,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,125 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,527 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,389 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,794 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,215 UART: [afmc] --
23,377,964 UART: [cold-reset] --
23,380,193 UART: [state] Locking Datavault
23,385,595 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,449 UART: [state] Locking ICCM
23,389,631 UART: [exit] Launching FMC @ 0x40000130
23,398,027 UART:
23,398,259 UART: Running Caliptra FMC ...
23,399,351 UART:
23,399,498 UART: [state] CFI Enabled
23,468,284 UART: [fht] FMC Alias Private Key: 7
25,807,150 UART: [art] Extend RT PCRs Done
25,808,381 UART: [art] Lock RT PCRs Done
25,809,808 UART: [art] Populate DV Done
25,815,385 UART: [fht] FMC Alias Private Key: 7
25,817,023 UART: [art] Derive CDI
25,817,772 UART: [art] Store in in slot 0x4
25,877,892 UART: [art] Derive Key Pair
25,878,924 UART: [art] Store priv key in slot 0x5
29,171,538 UART: [art] Derive Key Pair - Done
29,184,704 UART: [art] Signing Cert with AUTHO
29,186,002 UART: RITY.KEYID = 7
31,473,829 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,337 UART: [art] PUB.X = DC3C46DBD872B6716044156C528BC0D7920157276A3B6554E7B11B53A28A6D5B9C2F77A27EB782BEDCBA4D9A6D23AAA8
31,482,582 UART: [art] PUB.Y = E5860140F70632CF111E05D2A728B55E87EE7B91B6ED2989BFD04B5AC538C489D245281BCD6A9483688E9BF3F53843F0
31,489,836 UART: [art] SIG.R = 0C8B03506F5651022E167B6601545287C4E8022E86FBF507971A8095FDC17C341E6C0A12B4EB942358B1487852F9F11F
31,497,194 UART: [art] SIG.S = D96F790A739963A1A37EDE13C4915E499CD0515EE94E7368E365CDC6F5445F1615D9D2E526DD9F654867F958131D6006
32,801,923 UART: Caliptra RT
32,802,618 UART: [state] CFI Enabled
32,964,383 UART: [rt] RT listening for mailbox commands...
32,966,294 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,996,489 UART: [rt]cmd =0x414c544e, len=41
32,998,862 >>> mbox cmd response data (8 bytes)
32,999,756 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,030,163 UART: [rt]cmd =0x434b4558, len=80
38,770,053 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,784,393 ready_for_fw is high
3,784,917 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,870,210 >>> mbox cmd response: success
23,568,828 UART:
23,569,216 UART: Running Caliptra FMC ...
23,570,404 UART:
23,570,575 UART: [state] CFI Enabled
23,639,328 UART: [fht] FMC Alias Private Key: 7
25,977,242 UART: [art] Extend RT PCRs Done
25,978,455 UART: [art] Lock RT PCRs Done
25,980,030 UART: [art] Populate DV Done
25,985,287 UART: [fht] FMC Alias Private Key: 7
25,986,876 UART: [art] Derive CDI
25,987,688 UART: [art] Store in in slot 0x4
26,050,146 UART: [art] Derive Key Pair
26,051,186 UART: [art] Store priv key in slot 0x5
29,344,101 UART: [art] Derive Key Pair - Done
29,357,095 UART: [art] Signing Cert with AUTHO
29,358,452 UART: RITY.KEYID = 7
31,645,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,079 UART: [art] PUB.X = 2F75473076286C802CBF1DA3AD8E17C00DFB4ECC550EFD8177017F5EB1AC6CB51AFA6826EF2AC5F5E36E78511DB131DF
31,654,371 UART: [art] PUB.Y = 1CCCD87F944B2EB5D4B50A3953490D7DCB17F7672783B65DB4491024067936CFE53D4A708A5809C2D6A7E3C8665A92B2
31,661,581 UART: [art] SIG.R = 70E0A078E81BE231F275A83AA78EFDA6AA97D5FE2CECB9805D5E7B61136C93C2E1B9CC9BF5157F624D3ED66446A85D65
31,668,949 UART: [art] SIG.S = 98F09E32266E2E5F34DFBC6D0EEC163EBB5570252D44DFFBF6A5AA80C4B5299789358C41870E7F6EFB35D4EEBFB14A14
32,974,170 UART: Caliptra RT
32,974,872 UART: [state] CFI Enabled
33,136,537 UART: [rt] RT listening for mailbox commands...
33,138,438 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,168,523 UART: [rt]cmd =0x414c544e, len=41
33,171,109 >>> mbox cmd response data (8 bytes)
33,172,062 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,202,477 UART: [rt]cmd =0x434b4558, len=80
38,943,330 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,436 UART:
192,821 UART: Running Caliptra ROM ...
193,930 UART:
603,769 UART: [state] CFI Enabled
618,722 UART: [state] LifecycleState = Unprovisioned
620,667 UART: [state] DebugLocked = No
622,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,913 UART: [kat] SHA2-256
797,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,272 UART: [kat] ++
808,802 UART: [kat] sha1
820,132 UART: [kat] SHA2-256
822,828 UART: [kat] SHA2-384
827,971 UART: [kat] SHA2-512-ACC
830,340 UART: [kat] ECC-384
3,113,333 UART: [kat] HMAC-384Kdf
3,126,134 UART: [kat] LMS
4,316,228 UART: [kat] --
4,320,324 UART: [cold-reset] ++
4,322,472 UART: [fht] Storing FHT @ 0x50003400
4,332,456 UART: [idev] ++
4,333,088 UART: [idev] CDI.KEYID = 6
4,334,144 UART: [idev] SUBJECT.KEYID = 7
4,335,288 UART: [idev] UDS.KEYID = 0
4,336,293 ready_for_fw is high
4,336,499 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,598 UART: [idev] Erasing UDS.KEYID = 0
7,620,413 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,795 UART: [idev] --
7,645,075 UART: [ldev] ++
7,645,648 UART: [ldev] CDI.KEYID = 6
7,646,615 UART: [ldev] SUBJECT.KEYID = 5
7,647,827 UART: [ldev] AUTHORITY.KEYID = 7
7,649,056 UART: [ldev] FE.KEYID = 1
7,658,893 UART: [ldev] Erasing FE.KEYID = 1
10,948,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,954 UART: [ldev] --
13,306,205 UART: [fwproc] Waiting for Commands...
13,308,298 UART: [fwproc] Received command 0x46574c44
13,310,475 UART: [fwproc] Received Image of size 114036 bytes
17,363,043 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,296 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,826,409 >>> mbox cmd response: success
17,829,733 UART: [afmc] ++
17,830,333 UART: [afmc] CDI.KEYID = 6
17,831,243 UART: [afmc] SUBJECT.KEYID = 7
17,832,404 UART: [afmc] AUTHORITY.KEYID = 5
21,146,117 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,640 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,899 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,284 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,122 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,561 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,129 UART: [afmc] --
23,511,949 UART: [cold-reset] --
23,515,162 UART: [state] Locking Datavault
23,521,111 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,811 UART: [state] Locking ICCM
23,524,879 UART: [exit] Launching FMC @ 0x40000130
23,533,286 UART:
23,533,523 UART: Running Caliptra FMC ...
23,534,728 UART:
23,534,899 UART: [state] CFI Enabled
23,542,745 UART: [fht] FMC Alias Private Key: 7
25,873,506 UART: [art] Extend RT PCRs Done
25,874,726 UART: [art] Lock RT PCRs Done
25,876,561 UART: [art] Populate DV Done
25,881,889 UART: [fht] FMC Alias Private Key: 7
25,883,587 UART: [art] Derive CDI
25,884,325 UART: [art] Store in in slot 0x4
25,926,756 UART: [art] Derive Key Pair
25,927,753 UART: [art] Store priv key in slot 0x5
29,169,634 UART: [art] Derive Key Pair - Done
29,182,306 UART: [art] Signing Cert with AUTHO
29,183,605 UART: RITY.KEYID = 7
31,463,172 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,671 UART: [art] PUB.X = AE592B8A383AF20545374BA598E1183BD01E3425003F95C97E9506E671A1FD977DEB901C20F313FC26BE0BDD8CB664D1
31,471,880 UART: [art] PUB.Y = A081C01C64E3FAF9A2E66628BE8EE185042B2E533D1E387574A67F332AE88E31F5B301A865D19F639B7969069215C8C0
31,479,132 UART: [art] SIG.R = 02F54071D42123D772AC40914749CCF3181655116D063D9BAB4DD91FDDF82485AA15404E21F404093D28D810ACA82A18
31,486,480 UART: [art] SIG.S = BFADF7D420A986DE14C244AF6B58AE7D87F2F4408EB2D1FABD86BF14B1ACE5B5F4708479223112D0D201CA01CD373DC1
32,791,724 UART: Caliptra RT
32,792,423 UART: [state] CFI Enabled
32,910,961 UART: [rt] RT listening for mailbox commands...
32,912,884 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,942,992 UART: [rt]cmd =0x414c544e, len=41
32,945,588 >>> mbox cmd response data (8 bytes)
32,946,514 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,976,915 UART: [rt]cmd =0x434b4558, len=80
38,639,234 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,130,942 ready_for_fw is high
4,131,576 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,073,740 >>> mbox cmd response: success
23,710,925 UART:
23,711,334 UART: Running Caliptra FMC ...
23,712,431 UART:
23,712,585 UART: [state] CFI Enabled
23,720,325 UART: [fht] FMC Alias Private Key: 7
26,051,965 UART: [art] Extend RT PCRs Done
26,053,188 UART: [art] Lock RT PCRs Done
26,054,795 UART: [art] Populate DV Done
26,060,332 UART: [fht] FMC Alias Private Key: 7
26,061,986 UART: [art] Derive CDI
26,062,727 UART: [art] Store in in slot 0x4
26,105,030 UART: [art] Derive Key Pair
26,106,082 UART: [art] Store priv key in slot 0x5
29,348,740 UART: [art] Derive Key Pair - Done
29,361,421 UART: [art] Signing Cert with AUTHO
29,362,722 UART: RITY.KEYID = 7
31,642,563 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,069 UART: [art] PUB.X = 245361A2AF6AA8B612501985A00829D6A4BDA7A7B02E8761BE81271FACF803107E780FE6CEF2E8EE3C15FA2B6268CB51
31,651,335 UART: [art] PUB.Y = E4D40615D6E4C331CD945E08A885DA2EE8780ABD08E2204495741DBD2D9518F27A33CA814CC58C171103AF0440200746
31,658,600 UART: [art] SIG.R = F9AFA6F5715157992D09A0378E1B04B9F37C23D0F36035ABC97B494EE5015F888339C57242D8B273F8C2AFBF4A65ABB5
31,665,964 UART: [art] SIG.S = 3E56BFA92ED8078DB43DE5D4DEE3902CA7893C1371AF299DEC569F101C0963C5B2A7D8AAA85AB40ABAC6C4E1C03E3336
32,971,128 UART: Caliptra RT
32,971,828 UART: [state] CFI Enabled
33,089,432 UART: [rt] RT listening for mailbox commands...
33,091,328 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,121,425 UART: [rt]cmd =0x414c544e, len=41
33,123,851 >>> mbox cmd response data (8 bytes)
33,124,900 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,155,172 UART: [rt]cmd =0x434b4558, len=80
38,816,528 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,453 UART:
192,826 UART: Running Caliptra ROM ...
193,945 UART:
194,108 UART: [state] CFI Enabled
263,619 UART: [state] LifecycleState = Unprovisioned
265,485 UART: [state] DebugLocked = No
268,286 UART: [state] WD Timer not started. Device not locked for debugging
271,533 UART: [kat] SHA2-256
450,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,222 UART: [kat] ++
462,672 UART: [kat] sha1
473,750 UART: [kat] SHA2-256
476,756 UART: [kat] SHA2-384
483,744 UART: [kat] SHA2-512-ACC
486,680 UART: [kat] ECC-384
2,946,679 UART: [kat] HMAC-384Kdf
2,971,167 UART: [kat] LMS
3,500,591 UART: [kat] --
3,506,014 UART: [cold-reset] ++
3,507,401 UART: [fht] FHT @ 0x50003400
3,517,032 UART: [idev] ++
3,517,611 UART: [idev] CDI.KEYID = 6
3,518,545 UART: [idev] SUBJECT.KEYID = 7
3,519,720 UART: [idev] UDS.KEYID = 0
3,520,642 ready_for_fw is high
3,520,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,777 UART: [idev] Erasing UDS.KEYID = 0
6,022,247 UART: [idev] Sha1 KeyId Algorithm
6,045,369 UART: [idev] --
6,049,472 UART: [ldev] ++
6,050,047 UART: [ldev] CDI.KEYID = 6
6,050,964 UART: [ldev] SUBJECT.KEYID = 5
6,052,180 UART: [ldev] AUTHORITY.KEYID = 7
6,053,413 UART: [ldev] FE.KEYID = 1
6,099,178 UART: [ldev] Erasing FE.KEYID = 1
8,603,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,054 UART: [ldev] --
10,411,967 UART: [fwproc] Wait for Commands...
10,414,550 UART: [fwproc] Recv command 0x46574c44
10,416,588 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,273 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,272,513 >>> mbox cmd response: success
14,275,939 UART: [afmc] ++
14,276,539 UART: [afmc] CDI.KEYID = 6
14,277,456 UART: [afmc] SUBJECT.KEYID = 7
14,278,635 UART: [afmc] AUTHORITY.KEYID = 5
16,804,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,137 UART: [afmc] --
18,606,540 UART: [cold-reset] --
18,610,398 UART: [state] Locking Datavault
18,613,599 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,251 UART: [state] Locking ICCM
18,616,483 UART: [exit] Launching FMC @ 0x40000130
18,624,880 UART:
18,625,117 UART: Running Caliptra FMC ...
18,626,215 UART:
18,626,390 UART: [state] CFI Enabled
18,688,809 UART: [fht] FMC Alias Private Key: 7
20,453,188 UART: [art] Extend RT PCRs Done
20,454,403 UART: [art] Lock RT PCRs Done
20,456,159 UART: [art] Populate DV Done
20,461,845 UART: [fht] FMC Alias Private Key: 7
20,463,276 UART: [art] Derive CDI
20,464,011 UART: [art] Store in in slot 0x4
20,521,642 UART: [art] Derive Key Pair
20,522,678 UART: [art] Store priv key in slot 0x5
22,986,074 UART: [art] Derive Key Pair - Done
22,999,083 UART: [art] Signing Cert with AUTHO
23,000,396 UART: RITY.KEYID = 7
24,710,890 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,390 UART: [art] PUB.X = 65B693898DD7D6A4D861BF641C6252B260DCAF798E544C5EAA3F0660FFAB484B755F5BC3AB34A46F21FC98AD3913C191
24,719,715 UART: [art] PUB.Y = 81496581119AC81442C10D57BCBBAE1D8C54EDA5FCF09DA9436678C5D9B3103FCC443DE2A409D2AA21EA24EC1F570EC3
24,726,990 UART: [art] SIG.R = AC23EFACD4F93C301676045E19D01A8A22E74311FB5BFB943463F113590A3F12350832B4C4D09414C5B74F6DF3A68EE2
24,734,354 UART: [art] SIG.S = 033B7F04DAF08E766AA213270BB5A25C073510BF5555A7D727A5A0047B053E5CAFBB9D0ECFAD72DD8452DE501A8348C7
25,713,269 UART: Caliptra RT
25,713,981 UART: [state] CFI Enabled
25,879,974 UART: [rt] RT listening for mailbox commands...
25,881,874 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,911,969 UART: [rt]cmd =0x414c544e, len=41
25,914,446 >>> mbox cmd response data (8 bytes)
25,915,303 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,945,936 UART: [rt]cmd =0x434b4558, len=80
30,279,937 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,525 UART:
192,907 UART: Running Caliptra ROM ...
194,101 UART:
194,260 UART: [state] CFI Enabled
264,215 UART: [state] LifecycleState = Unprovisioned
266,628 UART: [state] DebugLocked = No
268,662 UART: [state] WD Timer not started. Device not locked for debugging
273,765 UART: [kat] SHA2-256
463,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,411 UART: [kat] ++
474,904 UART: [kat] sha1
485,180 UART: [kat] SHA2-256
488,191 UART: [kat] SHA2-384
493,188 UART: [kat] SHA2-512-ACC
495,772 UART: [kat] ECC-384
2,949,509 UART: [kat] HMAC-384Kdf
2,971,693 UART: [kat] LMS
3,503,434 UART: [kat] --
3,509,367 UART: [cold-reset] ++
3,511,874 UART: [fht] FHT @ 0x50003400
3,522,424 UART: [idev] ++
3,523,135 UART: [idev] CDI.KEYID = 6
3,524,169 UART: [idev] SUBJECT.KEYID = 7
3,525,347 UART: [idev] UDS.KEYID = 0
3,526,538 ready_for_fw is high
3,526,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,590 UART: [idev] Erasing UDS.KEYID = 0
6,028,547 UART: [idev] Sha1 KeyId Algorithm
6,050,745 UART: [idev] --
6,056,282 UART: [ldev] ++
6,056,967 UART: [ldev] CDI.KEYID = 6
6,057,889 UART: [ldev] SUBJECT.KEYID = 5
6,059,049 UART: [ldev] AUTHORITY.KEYID = 7
6,060,286 UART: [ldev] FE.KEYID = 1
6,099,942 UART: [ldev] Erasing FE.KEYID = 1
8,607,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,894 UART: [ldev] --
10,412,291 UART: [fwproc] Wait for Commands...
10,415,037 UART: [fwproc] Recv command 0x46574c44
10,417,349 UART: [fwproc] Recv'd Img size: 114360 bytes
13,873,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,608,111 >>> mbox cmd response: success
14,611,661 UART: [afmc] ++
14,612,374 UART: [afmc] CDI.KEYID = 6
14,613,566 UART: [afmc] SUBJECT.KEYID = 7
14,615,009 UART: [afmc] AUTHORITY.KEYID = 5
17,150,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,267 UART: [afmc] --
18,950,039 UART: [cold-reset] --
18,953,481 UART: [state] Locking Datavault
18,960,411 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,622 UART: [state] Locking ICCM
18,964,562 UART: [exit] Launching FMC @ 0x40000130
18,973,243 UART:
18,973,479 UART: Running Caliptra FMC ...
18,974,582 UART:
18,974,745 UART: [state] CFI Enabled
19,031,168 UART: [fht] FMC Alias Private Key: 7
20,794,302 UART: [art] Extend RT PCRs Done
20,795,521 UART: [art] Lock RT PCRs Done
20,796,953 UART: [art] Populate DV Done
20,802,420 UART: [fht] FMC Alias Private Key: 7
20,803,923 UART: [art] Derive CDI
20,804,687 UART: [art] Store in in slot 0x4
20,863,402 UART: [art] Derive Key Pair
20,864,440 UART: [art] Store priv key in slot 0x5
23,327,426 UART: [art] Derive Key Pair - Done
23,340,094 UART: [art] Signing Cert with AUTHO
23,341,398 UART: RITY.KEYID = 7
25,052,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,193 UART: [art] PUB.X = CBFD65CAE8AFBCDCDEE1653F4E2E728FF8994FBCEF2A62CFAD936545D92092F557D5234015B38257378397131A30AA62
25,061,424 UART: [art] PUB.Y = 7AABAB3B282932900AE473145A853E9A7318B40B42C9600D0EE288B40F9B7863312E1F5ACAF5569B3FD95BD11B0F2546
25,068,697 UART: [art] SIG.R = 3313C33A97DE7F81A46C58E6520F5E21E73E61410D5C74B34B7691CEEB5D5ECF1FA762D1365D779D3B05F7D940ACCF85
25,076,071 UART: [art] SIG.S = 70586A2E308302E03103B28E0A83186A1CDB3689EB8BEB13F8BA392859697A44179407D10C3A3A362DDB1DBDDD35749D
26,054,918 UART: Caliptra RT
26,055,633 UART: [state] CFI Enabled
26,219,358 UART: [rt] RT listening for mailbox commands...
26,221,255 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,251,369 UART: [rt]cmd =0x414c544e, len=41
26,253,903 >>> mbox cmd response data (8 bytes)
26,254,876 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,285,342 UART: [rt]cmd =0x434b4558, len=80
30,621,012 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,440,558 ready_for_fw is high
3,441,180 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,723,849 >>> mbox cmd response: success
19,009,230 UART:
19,009,642 UART: Running Caliptra FMC ...
19,010,786 UART:
19,010,949 UART: [state] CFI Enabled
19,076,423 UART: [fht] FMC Alias Private Key: 7
20,840,782 UART: [art] Extend RT PCRs Done
20,842,015 UART: [art] Lock RT PCRs Done
20,843,613 UART: [art] Populate DV Done
20,849,291 UART: [fht] FMC Alias Private Key: 7
20,850,944 UART: [art] Derive CDI
20,851,758 UART: [art] Store in in slot 0x4
20,909,352 UART: [art] Derive Key Pair
20,910,392 UART: [art] Store priv key in slot 0x5
23,373,317 UART: [art] Derive Key Pair - Done
23,385,934 UART: [art] Signing Cert with AUTHO
23,387,270 UART: RITY.KEYID = 7
25,099,737 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,253 UART: [art] PUB.X = 38E131051E0D28D5BEA7534F08F33EC3A1528938588FCD10FE1D131484C51D8B6DBD37A94ACDE674544A94FA87164ECB
25,108,480 UART: [art] PUB.Y = 0FC0B43C74212BA77CB0701D838B1B8EA2B54D01186DC91A4C1CB3DB791512A65C3BD9EF61F6961E11AE9DB6260013BB
25,115,776 UART: [art] SIG.R = 75E1129AE6C645F926E6919FB6B34E4A3643F0CC9EAA1750093DF4DB17E6DB72AD48E8E8BDE3A878A5BCCD44B4028410
25,123,144 UART: [art] SIG.S = 1DBEBCC98E89B60C7E1BB6CDCD8F7981B234302F7B13E9882B4E6BE522B654259108632F1E449C60FDA5456A2087BFB7
26,102,539 UART: Caliptra RT
26,103,260 UART: [state] CFI Enabled
26,268,052 UART: [rt] RT listening for mailbox commands...
26,269,950 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,299,762 UART: [rt]cmd =0x414c544e, len=41
26,302,190 >>> mbox cmd response data (8 bytes)
26,303,103 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,333,560 UART: [rt]cmd =0x434b4558, len=80
30,668,303 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,448 UART:
192,807 UART: Running Caliptra ROM ...
193,989 UART:
603,645 UART: [state] CFI Enabled
618,803 UART: [state] LifecycleState = Unprovisioned
621,177 UART: [state] DebugLocked = No
623,624 UART: [state] WD Timer not started. Device not locked for debugging
628,080 UART: [kat] SHA2-256
817,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,770 UART: [kat] ++
829,371 UART: [kat] sha1
841,079 UART: [kat] SHA2-256
844,127 UART: [kat] SHA2-384
849,275 UART: [kat] SHA2-512-ACC
851,857 UART: [kat] ECC-384
3,292,771 UART: [kat] HMAC-384Kdf
3,305,556 UART: [kat] LMS
3,837,367 UART: [kat] --
3,841,707 UART: [cold-reset] ++
3,843,114 UART: [fht] FHT @ 0x50003400
3,855,733 UART: [idev] ++
3,856,437 UART: [idev] CDI.KEYID = 6
3,857,417 UART: [idev] SUBJECT.KEYID = 7
3,858,585 UART: [idev] UDS.KEYID = 0
3,859,508 ready_for_fw is high
3,859,711 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,345 UART: [idev] Erasing UDS.KEYID = 0
6,334,276 UART: [idev] Sha1 KeyId Algorithm
6,356,986 UART: [idev] --
6,361,881 UART: [ldev] ++
6,362,575 UART: [ldev] CDI.KEYID = 6
6,363,493 UART: [ldev] SUBJECT.KEYID = 5
6,364,655 UART: [ldev] AUTHORITY.KEYID = 7
6,365,882 UART: [ldev] FE.KEYID = 1
6,377,169 UART: [ldev] Erasing FE.KEYID = 1
8,860,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,554 UART: [ldev] --
10,649,976 UART: [fwproc] Wait for Commands...
10,652,388 UART: [fwproc] Recv command 0x46574c44
10,654,659 UART: [fwproc] Recv'd Img size: 114360 bytes
14,102,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,841,504 >>> mbox cmd response: success
14,845,167 UART: [afmc] ++
14,845,874 UART: [afmc] CDI.KEYID = 6
14,847,030 UART: [afmc] SUBJECT.KEYID = 7
14,848,562 UART: [afmc] AUTHORITY.KEYID = 5
17,356,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,654 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,409 UART: [afmc] --
19,154,849 UART: [cold-reset] --
19,159,637 UART: [state] Locking Datavault
19,164,990 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,167 UART: [state] Locking ICCM
19,169,511 UART: [exit] Launching FMC @ 0x40000130
19,178,173 UART:
19,178,404 UART: Running Caliptra FMC ...
19,179,502 UART:
19,179,657 UART: [state] CFI Enabled
19,187,808 UART: [fht] FMC Alias Private Key: 7
20,944,689 UART: [art] Extend RT PCRs Done
20,945,911 UART: [art] Lock RT PCRs Done
20,947,582 UART: [art] Populate DV Done
20,952,937 UART: [fht] FMC Alias Private Key: 7
20,954,522 UART: [art] Derive CDI
20,955,333 UART: [art] Store in in slot 0x4
20,997,845 UART: [art] Derive Key Pair
20,998,888 UART: [art] Store priv key in slot 0x5
23,425,068 UART: [art] Derive Key Pair - Done
23,438,007 UART: [art] Signing Cert with AUTHO
23,439,312 UART: RITY.KEYID = 7
25,144,430 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,945 UART: [art] PUB.X = 6CEA518565201EC66E4A7CD190B545E05778DCFBC4446E81F7C0EF1910BE70127122AE2D93E791264E332BD4ACCBC572
25,153,238 UART: [art] PUB.Y = 9E7A95D906851B7A12888C571B6E79A2A206F17F7FCD4902C951415308FB9E42F6567F7E629F6D304CA056D1E1D14A2F
25,160,483 UART: [art] SIG.R = C361ACF663F4F1B2AD0AA199CDF946C78500841401D3E5B045E2D48486060E088F7A68B2A6B5A50AF20D23333D2BB9A9
25,167,825 UART: [art] SIG.S = 6B0AC60B4A03F1FEABEA7578038244482ED48FA315978B168DB0359C74F6DE3C44E5B7134A6BF595BD7719F05959BA67
26,146,236 UART: Caliptra RT
26,146,932 UART: [state] CFI Enabled
26,264,258 UART: [rt] RT listening for mailbox commands...
26,266,151 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,296,495 UART: [rt]cmd =0x414c544e, len=41
26,298,841 >>> mbox cmd response data (8 bytes)
26,299,874 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,330,223 UART: [rt]cmd =0x434b4558, len=80
30,603,864 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,761,546 ready_for_fw is high
3,761,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,963,835 >>> mbox cmd response: success
19,219,699 UART:
19,220,118 UART: Running Caliptra FMC ...
19,221,319 UART:
19,221,484 UART: [state] CFI Enabled
19,229,171 UART: [fht] FMC Alias Private Key: 7
20,986,350 UART: [art] Extend RT PCRs Done
20,987,618 UART: [art] Lock RT PCRs Done
20,989,221 UART: [art] Populate DV Done
20,994,382 UART: [fht] FMC Alias Private Key: 7
20,995,978 UART: [art] Derive CDI
20,996,815 UART: [art] Store in in slot 0x4
21,039,579 UART: [art] Derive Key Pair
21,040,587 UART: [art] Store priv key in slot 0x5
23,466,577 UART: [art] Derive Key Pair - Done
23,479,463 UART: [art] Signing Cert with AUTHO
23,480,771 UART: RITY.KEYID = 7
25,186,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,863 UART: [art] PUB.X = 56519E48AD103C1E6361BFF1584102781560D84D1CDDAA50D24D84EB5B4B3AF0E7A186D48557C1893E29A7422F177C8D
25,195,124 UART: [art] PUB.Y = 4E628FBFF9DD4D00FEA148522C3095D93C0F3A37DE9BA5C76B1F983176C68A49CB6C567BA33DF96C3086CB28D4759CFB
25,202,390 UART: [art] SIG.R = F5C9A8E29E1C36162619CA917BE41805C08AB551EC12C14CD0F9C2C63589B193F43A921F50194F9781853DA9E4C0E244
25,209,788 UART: [art] SIG.S = BBFBFE2A26F12ED85FB7D0C7393AB31E3F45447FEB62E90940CDBCC18B152FD4125116FF927C98169A8923B026347128
26,188,632 UART: Caliptra RT
26,189,324 UART: [state] CFI Enabled
26,307,304 UART: [rt] RT listening for mailbox commands...
26,309,196 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,339,298 UART: [rt]cmd =0x414c544e, len=41
26,341,904 >>> mbox cmd response data (8 bytes)
26,342,874 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,373,232 UART: [rt]cmd =0x434b4558, len=80
30,646,456 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,967 UART: [kat] SHA2-256
881,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,013 UART: [kat] ++
886,165 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,356 UART: [kat] LMS
1,475,552 UART: [kat] --
1,476,273 UART: [cold-reset] ++
1,476,749 UART: [fht] Storing FHT @ 0x50003400
1,479,642 UART: [idev] ++
1,479,810 UART: [idev] CDI.KEYID = 6
1,480,170 UART: [idev] SUBJECT.KEYID = 7
1,480,594 UART: [idev] UDS.KEYID = 0
1,480,939 ready_for_fw is high
1,480,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,520 UART: [idev] Erasing UDS.KEYID = 0
1,505,068 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,831 UART: [ldev] ++
1,514,999 UART: [ldev] CDI.KEYID = 6
1,515,362 UART: [ldev] SUBJECT.KEYID = 5
1,515,788 UART: [ldev] AUTHORITY.KEYID = 7
1,516,251 UART: [ldev] FE.KEYID = 1
1,521,331 UART: [ldev] Erasing FE.KEYID = 1
1,546,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,764 UART: [ldev] --
1,585,277 UART: [fwproc] Waiting for Commands...
1,586,068 UART: [fwproc] Received command 0x46574c44
1,586,859 UART: [fwproc] Received Image of size 114360 bytes
2,884,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,800 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,939 >>> mbox cmd response: success
3,079,101 UART: [afmc] ++
3,079,269 UART: [afmc] CDI.KEYID = 6
3,079,631 UART: [afmc] SUBJECT.KEYID = 7
3,080,056 UART: [afmc] AUTHORITY.KEYID = 5
3,114,767 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,151 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,931 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,544 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,234 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,083 UART: [afmc] --
3,157,979 UART: [cold-reset] --
3,158,747 UART: [state] Locking Datavault
3,159,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,516 UART: [state] Locking ICCM
3,160,982 UART: [exit] Launching FMC @ 0x40000130
3,166,311 UART:
3,166,327 UART: Running Caliptra FMC ...
3,166,735 UART:
3,166,789 UART: [state] CFI Enabled
3,177,186 UART: [fht] FMC Alias Private Key: 7
3,285,077 UART: [art] Extend RT PCRs Done
3,285,505 UART: [art] Lock RT PCRs Done
3,287,105 UART: [art] Populate DV Done
3,295,502 UART: [fht] FMC Alias Private Key: 7
3,296,506 UART: [art] Derive CDI
3,296,786 UART: [art] Store in in slot 0x4
3,382,181 UART: [art] Derive Key Pair
3,382,541 UART: [art] Store priv key in slot 0x5
3,395,457 UART: [art] Derive Key Pair - Done
3,410,031 UART: [art] Signing Cert with AUTHO
3,410,511 UART: RITY.KEYID = 7
3,425,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,392 UART: [art] PUB.X = FE2393AD208897F447C0180C953A81DD9AFE5FE24F17C934D8A5CCDB62D14F689E4F77ABECEE17B7041BE36D27CD7190
3,433,172 UART: [art] PUB.Y = B1D2B2965D391058D96E5AFEE2E554BF7F6071CC1674495238044D909363B412072BA974EE16132A080347834FCAA3C7
3,440,104 UART: [art] SIG.R = BE3FC3B908262ED9095F368A8F0B7442158A6BE04C30E99E440337A705C298E59BD86CF2904B9E245B115491E362F93A
3,446,857 UART: [art] SIG.S = 1AE3068F56844CFEC53045D707BF0320E00DDE651A1B38809CA3004B9BF1194555DDF0E46651EA787F7EA47C5B7EFCE5
3,470,662 UART: Caliptra RT
3,470,916 UART: [state] CFI Enabled
3,578,436 UART: [rt] RT listening for mailbox commands...
3,579,106 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,790 UART: [rt]cmd =0x414c544e, len=41
3,610,885 >>> mbox cmd response data (8 bytes)
3,610,886 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,661 UART: [rt]cmd =0x434b4558, len=80
3,811,900 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,397 ready_for_fw is high
1,362,397 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,461 >>> mbox cmd response: success
2,989,125 UART:
2,989,141 UART: Running Caliptra FMC ...
2,989,549 UART:
2,989,603 UART: [state] CFI Enabled
2,999,850 UART: [fht] FMC Alias Private Key: 7
3,107,681 UART: [art] Extend RT PCRs Done
3,108,109 UART: [art] Lock RT PCRs Done
3,109,603 UART: [art] Populate DV Done
3,117,868 UART: [fht] FMC Alias Private Key: 7
3,118,888 UART: [art] Derive CDI
3,119,168 UART: [art] Store in in slot 0x4
3,205,281 UART: [art] Derive Key Pair
3,205,641 UART: [art] Store priv key in slot 0x5
3,218,679 UART: [art] Derive Key Pair - Done
3,233,494 UART: [art] Signing Cert with AUTHO
3,233,974 UART: RITY.KEYID = 7
3,249,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,133 UART: [art] PUB.X = 32D2F109554809252D2AB475DB0F8E10513730D9190C20E84FBCAEEF31AB87AB69B4B07E6A6D87E76EFD091F38B87534
3,256,894 UART: [art] PUB.Y = A490B57A2E8287D3BE86B23BBBBCAE7C8A8E6FD118DFA376ECF164B04FF116393815CF52FA2DCF53224DE41E82E9E6F6
3,263,866 UART: [art] SIG.R = DBEEFB7AD497E851B91883F0D2E1D7CB08B1D2C80AAA889EBCCF57024043F9564A926D9A4A1479573A544BEE9227EA60
3,270,641 UART: [art] SIG.S = 483F12366B1478CF56E0EC063ED9E4C054CC5CAAB03DE1CA5CA9C4B3603422B718898D32547C71AFCD607195D8562374
3,294,405 UART: Caliptra RT
3,294,659 UART: [state] CFI Enabled
3,403,375 UART: [rt] RT listening for mailbox commands...
3,404,045 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,707 UART: [rt]cmd =0x414c544e, len=41
3,435,524 >>> mbox cmd response data (8 bytes)
3,435,525 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,160 UART: [rt]cmd =0x434b4558, len=80
3,635,052 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,374 UART: [kat] SHA2-256
892,312 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,437 UART: [kat] HMAC-384Kdf
907,091 UART: [kat] LMS
1,475,287 UART: [kat] --
1,476,028 UART: [cold-reset] ++
1,476,430 UART: [fht] Storing FHT @ 0x50003400
1,479,283 UART: [idev] ++
1,479,451 UART: [idev] CDI.KEYID = 6
1,479,811 UART: [idev] SUBJECT.KEYID = 7
1,480,235 UART: [idev] UDS.KEYID = 0
1,480,580 ready_for_fw is high
1,480,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,821 UART: [idev] Erasing UDS.KEYID = 0
1,504,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,779 UART: [idev] --
1,513,598 UART: [ldev] ++
1,513,766 UART: [ldev] CDI.KEYID = 6
1,514,129 UART: [ldev] SUBJECT.KEYID = 5
1,514,555 UART: [ldev] AUTHORITY.KEYID = 7
1,515,018 UART: [ldev] FE.KEYID = 1
1,520,028 UART: [ldev] Erasing FE.KEYID = 1
1,545,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,135 UART: [ldev] --
1,584,548 UART: [fwproc] Waiting for Commands...
1,585,295 UART: [fwproc] Received command 0x46574c44
1,586,086 UART: [fwproc] Received Image of size 114360 bytes
2,884,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,642 >>> mbox cmd response: success
3,078,678 UART: [afmc] ++
3,078,846 UART: [afmc] CDI.KEYID = 6
3,079,208 UART: [afmc] SUBJECT.KEYID = 7
3,079,633 UART: [afmc] AUTHORITY.KEYID = 5
3,114,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,986 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,379 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,069 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,830 UART: [afmc] --
3,157,742 UART: [cold-reset] --
3,158,580 UART: [state] Locking Datavault
3,159,607 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,211 UART: [state] Locking ICCM
3,160,715 UART: [exit] Launching FMC @ 0x40000130
3,166,044 UART:
3,166,060 UART: Running Caliptra FMC ...
3,166,468 UART:
3,166,611 UART: [state] CFI Enabled
3,177,484 UART: [fht] FMC Alias Private Key: 7
3,285,523 UART: [art] Extend RT PCRs Done
3,285,951 UART: [art] Lock RT PCRs Done
3,287,533 UART: [art] Populate DV Done
3,295,838 UART: [fht] FMC Alias Private Key: 7
3,296,774 UART: [art] Derive CDI
3,297,054 UART: [art] Store in in slot 0x4
3,382,889 UART: [art] Derive Key Pair
3,383,249 UART: [art] Store priv key in slot 0x5
3,396,543 UART: [art] Derive Key Pair - Done
3,411,699 UART: [art] Signing Cert with AUTHO
3,412,179 UART: RITY.KEYID = 7
3,427,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,996 UART: [art] PUB.X = A33ECF31632C9A226BC7DCCE7E4125A6B1E2A909822227E79C94B5CC506305D028BFD3E4269909B5F4D83708012B057E
3,434,750 UART: [art] PUB.Y = 83AD665402698C8AB7602DC061B28994DA84A403C4048DC9DD02F545BE46B95A3D2E80F1B875962AA56077FFF98FBDC4
3,441,694 UART: [art] SIG.R = B0E62EDB41ED8F0B8AEFD33E56DD7C9D74362A9F9CAD5B42837F21D5F46B319C25533691C88EBB333B20E7B210016564
3,448,468 UART: [art] SIG.S = 7616681CEA835DC20CD8B411C561987D2D170DABDFC4D062AB4502599DBF9B89ABD760EBA91CC2DFD672F14968CD2A84
3,472,144 UART: Caliptra RT
3,472,490 UART: [state] CFI Enabled
3,580,104 UART: [rt] RT listening for mailbox commands...
3,580,774 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,620 UART: [rt]cmd =0x414c544e, len=41
3,612,565 >>> mbox cmd response data (8 bytes)
3,612,566 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,475 UART: [rt]cmd =0x434b4558, len=80
3,813,752 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 ready_for_fw is high
1,362,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,366 >>> mbox cmd response: success
2,989,180 UART:
2,989,196 UART: Running Caliptra FMC ...
2,989,604 UART:
2,989,747 UART: [state] CFI Enabled
3,000,622 UART: [fht] FMC Alias Private Key: 7
3,109,281 UART: [art] Extend RT PCRs Done
3,109,709 UART: [art] Lock RT PCRs Done
3,111,601 UART: [art] Populate DV Done
3,119,680 UART: [fht] FMC Alias Private Key: 7
3,120,680 UART: [art] Derive CDI
3,120,960 UART: [art] Store in in slot 0x4
3,206,735 UART: [art] Derive Key Pair
3,207,095 UART: [art] Store priv key in slot 0x5
3,220,821 UART: [art] Derive Key Pair - Done
3,235,725 UART: [art] Signing Cert with AUTHO
3,236,205 UART: RITY.KEYID = 7
3,251,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,306 UART: [art] PUB.X = DE9310BB2F0B0726F15CED66058098ADF4F4703FE5934B8FE8ED2A6F6BF5C1FF235BC0B7C7E28C1884272447B76E87F6
3,259,079 UART: [art] PUB.Y = 5D277D287AB364BA12D26506017FDE6B1E97DA25E4E72BCC1A0E99D1C50360E6BF349D0036364CD2507B77F9B298AA76
3,266,001 UART: [art] SIG.R = 4C192AC2AC841B3FD07BF813A616BE4669FA62B0F6BA121C304EA9BA6D3456B5536DBC00E5A79662D9253D277F43A255
3,272,757 UART: [art] SIG.S = D9E45B2D0409C41472494A6F9520DC75E1B8EE0959B3489A65A231073E850F2D39A670BE26F61A8023D7708E3242D8B6
3,296,317 UART: Caliptra RT
3,296,663 UART: [state] CFI Enabled
3,405,041 UART: [rt] RT listening for mailbox commands...
3,405,711 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,391 UART: [rt]cmd =0x414c544e, len=41
3,437,400 >>> mbox cmd response data (8 bytes)
3,437,401 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,512 UART: [rt]cmd =0x434b4558, len=80
3,639,241 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
893,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,235 UART: [kat] ++
897,387 UART: [kat] sha1
901,529 UART: [kat] SHA2-256
903,469 UART: [kat] SHA2-384
906,128 UART: [kat] SHA2-512-ACC
908,029 UART: [kat] ECC-384
917,216 UART: [kat] HMAC-384Kdf
921,832 UART: [kat] LMS
1,170,160 UART: [kat] --
1,171,075 UART: [cold-reset] ++
1,171,529 UART: [fht] FHT @ 0x50003400
1,174,198 UART: [idev] ++
1,174,366 UART: [idev] CDI.KEYID = 6
1,174,726 UART: [idev] SUBJECT.KEYID = 7
1,175,150 UART: [idev] UDS.KEYID = 0
1,175,495 ready_for_fw is high
1,175,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,200,371 UART: [idev] Sha1 KeyId Algorithm
1,208,729 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,338 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,200 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,868 >>> mbox cmd response: success
2,773,906 UART: [afmc] ++
2,774,074 UART: [afmc] CDI.KEYID = 6
2,774,436 UART: [afmc] SUBJECT.KEYID = 7
2,774,861 UART: [afmc] AUTHORITY.KEYID = 5
2,810,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,813 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,559 UART: [afmc] --
2,853,449 UART: [cold-reset] --
2,854,353 UART: [state] Locking Datavault
2,855,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,952 UART: [state] Locking ICCM
2,856,408 UART: [exit] Launching FMC @ 0x40000130
2,861,737 UART:
2,861,753 UART: Running Caliptra FMC ...
2,862,161 UART:
2,862,215 UART: [state] CFI Enabled
2,873,054 UART: [fht] FMC Alias Private Key: 7
2,981,369 UART: [art] Extend RT PCRs Done
2,981,797 UART: [art] Lock RT PCRs Done
2,983,527 UART: [art] Populate DV Done
2,991,800 UART: [fht] FMC Alias Private Key: 7
2,992,950 UART: [art] Derive CDI
2,993,230 UART: [art] Store in in slot 0x4
3,078,949 UART: [art] Derive Key Pair
3,079,309 UART: [art] Store priv key in slot 0x5
3,092,391 UART: [art] Derive Key Pair - Done
3,106,820 UART: [art] Signing Cert with AUTHO
3,107,300 UART: RITY.KEYID = 7
3,122,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,007 UART: [art] PUB.X = 0091C04A661BCC6E5FCF0B917FDAAC592A1C51578FC113AE098DE8ED50AE5C0B5C4CC2763E6EDB3539E3A24E13B0928B
3,129,766 UART: [art] PUB.Y = 703B165B8FFE2BFD931ED78956AF7D1FF7E2656B430EA234E373B4628DC90A8F0C89FB473A4159A13E347174F0BE4F05
3,136,712 UART: [art] SIG.R = BC297C9F4A74BB69F9D9B460408A5C614A31F97896E6AEB05A38B531591FF713ED1E5238B68B6AFF077DFC1224E52949
3,143,485 UART: [art] SIG.S = 4CBDA5784BC748E98D2D544D9C1DACA5BF745616AADC0934E775190F10C0CD7B797E6119DF551D3D7C7163D5AF54C046
3,167,324 UART: Caliptra RT
3,167,578 UART: [state] CFI Enabled
3,273,910 UART: [rt] RT listening for mailbox commands...
3,274,580 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,486 UART: [rt]cmd =0x414c544e, len=41
3,306,413 >>> mbox cmd response data (8 bytes)
3,306,414 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,497 UART: [rt]cmd =0x434b4558, len=80
3,507,583 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,675 ready_for_fw is high
1,059,675 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,627 >>> mbox cmd response: success
2,686,077 UART:
2,686,093 UART: Running Caliptra FMC ...
2,686,501 UART:
2,686,555 UART: [state] CFI Enabled
2,697,110 UART: [fht] FMC Alias Private Key: 7
2,804,731 UART: [art] Extend RT PCRs Done
2,805,159 UART: [art] Lock RT PCRs Done
2,806,401 UART: [art] Populate DV Done
2,814,626 UART: [fht] FMC Alias Private Key: 7
2,815,618 UART: [art] Derive CDI
2,815,898 UART: [art] Store in in slot 0x4
2,901,279 UART: [art] Derive Key Pair
2,901,639 UART: [art] Store priv key in slot 0x5
2,915,543 UART: [art] Derive Key Pair - Done
2,930,730 UART: [art] Signing Cert with AUTHO
2,931,210 UART: RITY.KEYID = 7
2,946,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,053 UART: [art] PUB.X = B06B3AE779DFE6F46E20A875ED988D020C301DAB16C3571947A5984483FE54F769CE999861EBE1F97E84F87381195FEC
2,953,821 UART: [art] PUB.Y = 347CE26632E0DC043A3C7EEDAD03A1960994CCF2496CCE2A09837A445DDB9C8845B319B053DAA34CD53A23438E3B10D3
2,960,769 UART: [art] SIG.R = BF9D88786EE73BBEB3E6082D2951B3ECEE6A2033795B109784E9682EDF8CAD07EE428199BDAE3175AFD5C90F0D25C503
2,967,538 UART: [art] SIG.S = 9E90D8674BECA80CA0ED13287B1205894F85072DB49DD5CC558B3DDA14457EB512493ABC8633D09C36D2100CCB860E1C
2,991,736 UART: Caliptra RT
2,991,990 UART: [state] CFI Enabled
3,100,031 UART: [rt] RT listening for mailbox commands...
3,100,701 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,573 UART: [rt]cmd =0x414c544e, len=41
3,132,620 >>> mbox cmd response data (8 bytes)
3,132,621 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,524 UART: [rt]cmd =0x434b4558, len=80
3,333,998 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
893,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,798 UART: [kat] ++
897,950 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,569 UART: [idev] ++
1,175,737 UART: [idev] CDI.KEYID = 6
1,176,097 UART: [idev] SUBJECT.KEYID = 7
1,176,521 UART: [idev] UDS.KEYID = 0
1,176,866 ready_for_fw is high
1,176,866 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,353 UART: [idev] Erasing UDS.KEYID = 0
1,201,608 UART: [idev] Sha1 KeyId Algorithm
1,210,122 UART: [idev] --
1,211,340 UART: [ldev] ++
1,211,508 UART: [ldev] CDI.KEYID = 6
1,211,871 UART: [ldev] SUBJECT.KEYID = 5
1,212,297 UART: [ldev] AUTHORITY.KEYID = 7
1,212,760 UART: [ldev] FE.KEYID = 1
1,218,410 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,012 UART: [ldev] --
1,284,323 UART: [fwproc] Wait for Commands...
1,284,965 UART: [fwproc] Recv command 0x46574c44
1,285,693 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,573 >>> mbox cmd response: success
2,776,701 UART: [afmc] ++
2,776,869 UART: [afmc] CDI.KEYID = 6
2,777,231 UART: [afmc] SUBJECT.KEYID = 7
2,777,656 UART: [afmc] AUTHORITY.KEYID = 5
2,814,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,552 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,156 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,938 UART: [afmc] --
2,858,056 UART: [cold-reset] --
2,859,064 UART: [state] Locking Datavault
2,860,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,681 UART: [state] Locking ICCM
2,861,333 UART: [exit] Launching FMC @ 0x40000130
2,866,662 UART:
2,866,678 UART: Running Caliptra FMC ...
2,867,086 UART:
2,867,229 UART: [state] CFI Enabled
2,877,752 UART: [fht] FMC Alias Private Key: 7
2,986,027 UART: [art] Extend RT PCRs Done
2,986,455 UART: [art] Lock RT PCRs Done
2,988,269 UART: [art] Populate DV Done
2,996,382 UART: [fht] FMC Alias Private Key: 7
2,997,506 UART: [art] Derive CDI
2,997,786 UART: [art] Store in in slot 0x4
3,083,597 UART: [art] Derive Key Pair
3,083,957 UART: [art] Store priv key in slot 0x5
3,097,009 UART: [art] Derive Key Pair - Done
3,111,842 UART: [art] Signing Cert with AUTHO
3,112,322 UART: RITY.KEYID = 7
3,127,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,967 UART: [art] PUB.X = 0FCA846FFBB8B2586F46EFBCBB0064F3DA469A2C0075D2198E0E64E4D88A475D96599B186D6A0577A406ADAECE8A1BF5
3,134,699 UART: [art] PUB.Y = 2B41210E164795FEDC986C9B2C47B0D79F8C79553C37E7C133FE0B4ADD09A233578058A6BABDD45C667A7F8F40A7CDA3
3,141,652 UART: [art] SIG.R = B422118FE6BCD910F28697BFDB98AA7E28BEDEBB5258CF218601E4F5BC8F9D1A623D15480A496D8A01D6FF78C7521834
3,148,425 UART: [art] SIG.S = 971DD9E8CE9CF987FC60E072E0DF763683AB4BE52A2E32E5FC8FCE1FF53DAF928F0A34C0B72CD46189DBD17538020329
3,171,653 UART: Caliptra RT
3,171,999 UART: [state] CFI Enabled
3,280,032 UART: [rt] RT listening for mailbox commands...
3,280,702 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,428 UART: [rt]cmd =0x414c544e, len=41
3,312,229 >>> mbox cmd response data (8 bytes)
3,312,230 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,967 UART: [rt]cmd =0x434b4558, len=80
3,513,252 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,978 ready_for_fw is high
1,059,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,658 >>> mbox cmd response: success
2,689,166 UART:
2,689,182 UART: Running Caliptra FMC ...
2,689,590 UART:
2,689,733 UART: [state] CFI Enabled
2,700,882 UART: [fht] FMC Alias Private Key: 7
2,809,263 UART: [art] Extend RT PCRs Done
2,809,691 UART: [art] Lock RT PCRs Done
2,810,977 UART: [art] Populate DV Done
2,819,156 UART: [fht] FMC Alias Private Key: 7
2,820,204 UART: [art] Derive CDI
2,820,484 UART: [art] Store in in slot 0x4
2,906,449 UART: [art] Derive Key Pair
2,906,809 UART: [art] Store priv key in slot 0x5
2,920,617 UART: [art] Derive Key Pair - Done
2,935,468 UART: [art] Signing Cert with AUTHO
2,935,948 UART: RITY.KEYID = 7
2,951,278 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,043 UART: [art] PUB.X = E5D366235659930BFA7645E68F206FEA7157A57C28B6415D1AB87301EBF413A8AD35FACC3D2F00633C6713E1322420DF
2,958,787 UART: [art] PUB.Y = D3C4CBD7A6604091583981B3D541BBFC8FBCB99D918F3132D047F80B85CB915368E883D9DB3FC4DD56FD1304D62171BC
2,965,741 UART: [art] SIG.R = 86865B06ACD1E4ABBED1EA2D102C17DC11041752B08CA420C6949547326F29A3B3C61BFF0C7FABA48A02A1295A8EF0B7
2,972,513 UART: [art] SIG.S = 2C6BCE85E59DF1724DD0525B038583D030B06F13C022699100F8E7A0B33E91BEC9D93B1552338EB33919E6DF94D79F9C
2,996,289 UART: Caliptra RT
2,996,635 UART: [state] CFI Enabled
3,104,575 UART: [rt] RT listening for mailbox commands...
3,105,245 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,181 UART: [rt]cmd =0x414c544e, len=41
3,137,236 >>> mbox cmd response data (8 bytes)
3,137,237 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,082 UART: [rt]cmd =0x434b4558, len=80
3,337,778 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,214,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,310 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,301 UART: [fwproc] Recv command 0x46574c44
1,282,034 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,498 >>> mbox cmd response: success
2,772,685 UART: [afmc] ++
2,772,853 UART: [afmc] CDI.KEYID = 6
2,773,216 UART: [afmc] SUBJECT.KEYID = 7
2,773,642 UART: [afmc] AUTHORITY.KEYID = 5
2,809,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,592 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,204 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,686 UART: [afmc] --
2,852,572 UART: [cold-reset] --
2,853,234 UART: [state] Locking Datavault
2,854,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,131 UART: [state] Locking ICCM
2,855,677 UART: [exit] Launching FMC @ 0x40000130
2,861,006 UART:
2,861,022 UART: Running Caliptra FMC ...
2,861,430 UART:
2,861,484 UART: [state] CFI Enabled
2,871,997 UART: [fht] FMC Alias Private Key: 7
2,980,194 UART: [art] Extend RT PCRs Done
2,980,622 UART: [art] Lock RT PCRs Done
2,982,228 UART: [art] Populate DV Done
2,990,617 UART: [fht] FMC Alias Private Key: 7
2,991,769 UART: [art] Derive CDI
2,992,049 UART: [art] Store in in slot 0x4
3,077,288 UART: [art] Derive Key Pair
3,077,648 UART: [art] Store priv key in slot 0x5
3,090,886 UART: [art] Derive Key Pair - Done
3,105,885 UART: [art] Signing Cert with AUTHO
3,106,365 UART: RITY.KEYID = 7
3,121,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,468 UART: [art] PUB.X = F3B6D7BF90920FB8F5F09E276A36404F105D227A562B36757D5E637B4EE350ACBABCDD6CFB44B8C3A7B28777E05B5035
3,129,247 UART: [art] PUB.Y = 1CF9073D2477EF9B9B9C70CB0B9281C31D54FC4472C430AA6DDECE7A544F0AD6C712E8E0BA8D0B82E863EE82521B639B
3,136,201 UART: [art] SIG.R = BFB63D19C487B3354E7B2E5FB9A61FC54688438F5A20CBC3F916B393CDCE1C4058E45BA19EFBE638AFBFE49677EBEFA9
3,142,995 UART: [art] SIG.S = 737A8E01C9B8FA7ECF84859B793280E82949A870E2F3429DB408AD16DF36B929D59E86781420B09F3036CBFC36801513
3,166,508 UART: Caliptra RT
3,166,762 UART: [state] CFI Enabled
3,274,238 UART: [rt] RT listening for mailbox commands...
3,274,908 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,568 UART: [rt]cmd =0x414c544e, len=41
3,306,533 >>> mbox cmd response data (8 bytes)
3,306,534 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,435 UART: [rt]cmd =0x434b4558, len=80
3,508,299 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,412 ready_for_fw is high
1,056,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,892 >>> mbox cmd response: success
2,686,332 UART:
2,686,348 UART: Running Caliptra FMC ...
2,686,756 UART:
2,686,810 UART: [state] CFI Enabled
2,697,253 UART: [fht] FMC Alias Private Key: 7
2,805,538 UART: [art] Extend RT PCRs Done
2,805,966 UART: [art] Lock RT PCRs Done
2,807,366 UART: [art] Populate DV Done
2,815,709 UART: [fht] FMC Alias Private Key: 7
2,816,737 UART: [art] Derive CDI
2,817,017 UART: [art] Store in in slot 0x4
2,902,420 UART: [art] Derive Key Pair
2,902,780 UART: [art] Store priv key in slot 0x5
2,916,140 UART: [art] Derive Key Pair - Done
2,931,340 UART: [art] Signing Cert with AUTHO
2,931,820 UART: RITY.KEYID = 7
2,947,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,883 UART: [art] PUB.X = 6A7601EE2B4E62FDC0433D96A745112B1DC6B8D774FD5BC1D27AA8A50B928015AAA7DAB9C3189B437EC84BF3D44CA70A
2,954,662 UART: [art] PUB.Y = 3471E5B16BFBC6AB73621454CABAD5D95383772530C3AAAA228A69AA2E9E8F8C70D3828A026E168E25C7065FC6BBAF4D
2,961,620 UART: [art] SIG.R = 75027FDCB7361E71ACEC18C790B6710F275EE56D2A65F97EDBEABB016B9527390305A1DB8A3850F0E07CEF2BC7285415
2,968,385 UART: [art] SIG.S = F9AA1D70F3778351AFD2D1BAB172F452F6F0A411B6556AF053B8F60EBC944C65C74A8F09E82638F858A9A0D21D1F80EB
2,991,490 UART: Caliptra RT
2,991,744 UART: [state] CFI Enabled
3,098,654 UART: [rt] RT listening for mailbox commands...
3,099,324 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,852 UART: [rt]cmd =0x414c544e, len=41
3,130,837 >>> mbox cmd response data (8 bytes)
3,130,838 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,531 UART: [rt]cmd =0x434b4558, len=80
3,331,301 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 ready_for_fw is high
1,174,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,374 UART: [idev] Sha1 KeyId Algorithm
1,209,138 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,781 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,217,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,463 UART: [ldev] --
1,282,753 UART: [fwproc] Wait for Commands...
1,283,360 UART: [fwproc] Recv command 0x46574c44
1,284,093 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,639 >>> mbox cmd response: success
2,774,858 UART: [afmc] ++
2,775,026 UART: [afmc] CDI.KEYID = 6
2,775,389 UART: [afmc] SUBJECT.KEYID = 7
2,775,815 UART: [afmc] AUTHORITY.KEYID = 5
2,811,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,663 UART: [afmc] --
2,854,689 UART: [cold-reset] --
2,855,697 UART: [state] Locking Datavault
2,856,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,590 UART: [state] Locking ICCM
2,858,020 UART: [exit] Launching FMC @ 0x40000130
2,863,349 UART:
2,863,365 UART: Running Caliptra FMC ...
2,863,773 UART:
2,863,916 UART: [state] CFI Enabled
2,875,007 UART: [fht] FMC Alias Private Key: 7
2,983,160 UART: [art] Extend RT PCRs Done
2,983,588 UART: [art] Lock RT PCRs Done
2,985,044 UART: [art] Populate DV Done
2,993,119 UART: [fht] FMC Alias Private Key: 7
2,994,121 UART: [art] Derive CDI
2,994,401 UART: [art] Store in in slot 0x4
3,079,952 UART: [art] Derive Key Pair
3,080,312 UART: [art] Store priv key in slot 0x5
3,092,996 UART: [art] Derive Key Pair - Done
3,107,553 UART: [art] Signing Cert with AUTHO
3,108,033 UART: RITY.KEYID = 7
3,123,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,800 UART: [art] PUB.X = 803D4714798D5E644224335375D2282EADC79D3E9328FCF353400E03D2368B1726E5F5FB51A861FC4CDB39FD01CBA3E3
3,130,563 UART: [art] PUB.Y = FE6B9B45FBBD448E26E27F136BC47768E71E890B0C141965BB85B767458E163DEB590B70EDC676EFFA1093E6B8DA327B
3,137,516 UART: [art] SIG.R = 113BC30D7697141B33712B751F4268FFE3EC30AFA99E7D15A3B93AFF6E5CDCFD2774E6A64E44D7EB17E94412ECD17863
3,144,295 UART: [art] SIG.S = 3EAC0DC580A352D0063F3E8B5A6EC49419029DC5B2E467DB52CCED1859EF9F9A31B45F0DD0D353A92F3EBCD82FEE551A
3,168,178 UART: Caliptra RT
3,168,524 UART: [state] CFI Enabled
3,277,360 UART: [rt] RT listening for mailbox commands...
3,278,030 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,730 UART: [rt]cmd =0x414c544e, len=41
3,309,509 >>> mbox cmd response data (8 bytes)
3,309,510 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,363 UART: [rt]cmd =0x434b4558, len=80
3,511,081 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,239 ready_for_fw is high
1,056,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,139 >>> mbox cmd response: success
2,684,765 UART:
2,684,781 UART: Running Caliptra FMC ...
2,685,189 UART:
2,685,332 UART: [state] CFI Enabled
2,696,093 UART: [fht] FMC Alias Private Key: 7
2,804,664 UART: [art] Extend RT PCRs Done
2,805,092 UART: [art] Lock RT PCRs Done
2,806,598 UART: [art] Populate DV Done
2,814,863 UART: [fht] FMC Alias Private Key: 7
2,815,911 UART: [art] Derive CDI
2,816,191 UART: [art] Store in in slot 0x4
2,902,082 UART: [art] Derive Key Pair
2,902,442 UART: [art] Store priv key in slot 0x5
2,915,826 UART: [art] Derive Key Pair - Done
2,930,453 UART: [art] Signing Cert with AUTHO
2,930,933 UART: RITY.KEYID = 7
2,946,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,466 UART: [art] PUB.X = 584D2C94E059CA666168F2B2EF281446BCA57C0CAC986442FD726130B40A9071094E42C4A58AEB14EF0874DE3735E61B
2,954,226 UART: [art] PUB.Y = 011D063E6DCBDA39947714F5EB09934BF9E00F1C56B13E858114CFF82E788E55AA2F9376CA41725C59AFB5343AA67443
2,961,168 UART: [art] SIG.R = DCDD1B278189686075FABDC57F54001FDA958F244DF1711CF84C2A6922A2D323C956EFA045C651259AB6CC4896EA9AAE
2,967,928 UART: [art] SIG.S = 0FE0242B8BA53347FA3B4A0E4421AED9DBFE9135D3BEC558D751881BF180C76ED5A13BC3E7BA1501CD17DED12F0B3968
2,991,715 UART: Caliptra RT
2,992,061 UART: [state] CFI Enabled
3,099,551 UART: [rt] RT listening for mailbox commands...
3,100,221 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,863 UART: [rt]cmd =0x414c544e, len=41
3,131,806 >>> mbox cmd response data (8 bytes)
3,131,807 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,774 UART: [rt]cmd =0x434b4558, len=80
3,333,290 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,426 UART:
192,794 UART: Running Caliptra ROM ...
193,978 UART:
194,131 UART: [state] CFI Enabled
265,533 UART: [state] LifecycleState = Unprovisioned
267,442 UART: [state] DebugLocked = No
269,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,114 UART: [kat] SHA2-256
443,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,311 UART: [kat] ++
454,758 UART: [kat] sha1
466,191 UART: [kat] SHA2-256
468,859 UART: [kat] SHA2-384
474,419 UART: [kat] SHA2-512-ACC
476,782 UART: [kat] ECC-384
2,767,063 UART: [kat] HMAC-384Kdf
2,779,725 UART: [kat] LMS
3,969,984 UART: [kat] --
3,973,251 UART: [cold-reset] ++
3,975,179 UART: [fht] Storing FHT @ 0x50003400
3,986,510 UART: [idev] ++
3,987,131 UART: [idev] CDI.KEYID = 6
3,988,007 UART: [idev] SUBJECT.KEYID = 7
3,989,319 UART: [idev] UDS.KEYID = 0
3,990,290 ready_for_fw is high
3,990,503 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,999 UART: [idev] Erasing UDS.KEYID = 0
7,328,316 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,088 UART: [idev] --
7,355,057 UART: [ldev] ++
7,355,684 UART: [ldev] CDI.KEYID = 6
7,356,599 UART: [ldev] SUBJECT.KEYID = 5
7,357,800 UART: [ldev] AUTHORITY.KEYID = 7
7,359,081 UART: [ldev] FE.KEYID = 1
7,400,831 UART: [ldev] Erasing FE.KEYID = 1
10,735,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,419 UART: [ldev] --
13,116,030 UART: [fwproc] Waiting for Commands...
13,117,847 UART: [fwproc] Received command 0x46574c44
13,120,075 UART: [fwproc] Received Image of size 114036 bytes
17,177,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,644,773 >>> mbox cmd response: success
17,648,257 UART: [afmc] ++
17,648,846 UART: [afmc] CDI.KEYID = 6
17,649,783 UART: [afmc] SUBJECT.KEYID = 7
17,651,045 UART: [afmc] AUTHORITY.KEYID = 5
21,004,422 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,559 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,829 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,254 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,040 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,472 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,273 UART: [afmc] --
23,377,541 UART: [cold-reset] --
23,382,285 UART: [state] Locking Datavault
23,387,204 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,900 UART: [state] Locking ICCM
23,390,855 UART: [exit] Launching FMC @ 0x40000130
23,399,237 UART:
23,399,476 UART: Running Caliptra FMC ...
23,400,572 UART:
23,400,721 UART: [state] CFI Enabled
23,467,195 UART: [fht] FMC Alias Private Key: 7
25,805,218 UART: [art] Extend RT PCRs Done
25,806,451 UART: [art] Lock RT PCRs Done
25,808,016 UART: [art] Populate DV Done
25,813,322 UART: [fht] FMC Alias Private Key: 7
25,815,026 UART: [art] Derive CDI
25,815,840 UART: [art] Store in in slot 0x4
25,875,895 UART: [art] Derive Key Pair
25,876,909 UART: [art] Store priv key in slot 0x5
29,169,595 UART: [art] Derive Key Pair - Done
29,182,546 UART: [art] Signing Cert with AUTHO
29,183,843 UART: RITY.KEYID = 7
31,472,424 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,928 UART: [art] PUB.X = AB94590DEF830AF5C480FFE0D81EE8DB46CD9FC509A13FA9797265A78283FCDCB3A6107CC183A62EA1E6405A99A4EC44
31,481,405 UART: [art] PUB.Y = 31B91BEEC0C1864C0D12E4AB023F3B8AFA3682E460DCA4A6EEEEE566A2395E2A76FEC10578137490906BE14C05395797
31,488,438 UART: [art] SIG.R = D1327FA295D05A333551BE6876F26BA349BC2CD4C1B79FFDD150A06F509C27CDC15B00A5BC8D5F7660F6ABE0B658D368
31,495,789 UART: [art] SIG.S = 940B8668ACEC72746E7BDC0D85D13F392A736EEE949A22E6014810FAD78FB2F60AB31F7FBE397F1D40BC20DDE82FC21D
32,801,290 UART: Caliptra RT
32,801,985 UART: [state] CFI Enabled
32,963,631 UART: [rt] RT listening for mailbox commands...
32,965,514 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
32,995,357 UART: [rt]cmd =0x414c544e, len=20
32,997,105 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,597 writing to cptra_bootfsm_go
3,782,778 ready_for_fw is high
3,783,155 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,847,100 >>> mbox cmd response: success
23,541,364 UART:
23,541,750 UART: Running Caliptra FMC ...
23,542,838 UART:
23,542,995 UART: [state] CFI Enabled
23,614,284 UART: [fht] FMC Alias Private Key: 7
25,951,815 UART: [art] Extend RT PCRs Done
25,953,040 UART: [art] Lock RT PCRs Done
25,954,636 UART: [art] Populate DV Done
25,960,052 UART: [fht] FMC Alias Private Key: 7
25,961,754 UART: [art] Derive CDI
25,962,487 UART: [art] Store in in slot 0x4
26,022,283 UART: [art] Derive Key Pair
26,023,322 UART: [art] Store priv key in slot 0x5
29,316,422 UART: [art] Derive Key Pair - Done
29,329,204 UART: [art] Signing Cert with AUTHO
29,330,506 UART: RITY.KEYID = 7
31,617,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,237 UART: [art] PUB.X = F50483ECD54FBB06E389721989F54C93D19E3E296E6C3E629017E86A111241AC092631F4B8A573BD281413873522E414
31,626,463 UART: [art] PUB.Y = 492AA497111CC39A86DA3ACA43007428CE7BEE880EC6BACD5B1DC9E2514BF31DFB515BF651CF03B782A0FF1F4FE9AE83
31,633,773 UART: [art] SIG.R = C9AE558C11FF7AD1F5A871C7E1C5F9BCEAC241DD5A859566E38C6AEC4CB21F05D4FE9B0FC53E322913FA53D0E1FB27CE
31,641,189 UART: [art] SIG.S = BB27721BADCA95D560665519CD88401DB586720E8DCA892C91C5A6FCFBDEFC8BBC64797BFD064371EB8664AC5B1250AB
32,946,433 UART: Caliptra RT
32,947,136 UART: [state] CFI Enabled
33,106,767 UART: [rt] RT listening for mailbox commands...
33,108,663 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,138,532 UART: [rt]cmd =0x414c544e, len=20
33,140,317 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,330 UART:
192,709 UART: Running Caliptra ROM ...
193,854 UART:
603,649 UART: [state] CFI Enabled
619,571 UART: [state] LifecycleState = Unprovisioned
621,513 UART: [state] DebugLocked = No
624,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,853 UART: [kat] SHA2-256
799,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,105 UART: [kat] ++
810,638 UART: [kat] sha1
820,868 UART: [kat] SHA2-256
823,594 UART: [kat] SHA2-384
828,874 UART: [kat] SHA2-512-ACC
831,236 UART: [kat] ECC-384
3,115,744 UART: [kat] HMAC-384Kdf
3,128,344 UART: [kat] LMS
4,318,464 UART: [kat] --
4,324,788 UART: [cold-reset] ++
4,327,225 UART: [fht] Storing FHT @ 0x50003400
4,337,632 UART: [idev] ++
4,338,200 UART: [idev] CDI.KEYID = 6
4,339,207 UART: [idev] SUBJECT.KEYID = 7
4,340,381 UART: [idev] UDS.KEYID = 0
4,341,441 ready_for_fw is high
4,341,673 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,804 UART: [idev] Erasing UDS.KEYID = 0
7,626,724 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,342 UART: [idev] --
7,654,576 UART: [ldev] ++
7,655,198 UART: [ldev] CDI.KEYID = 6
7,656,132 UART: [ldev] SUBJECT.KEYID = 5
7,657,341 UART: [ldev] AUTHORITY.KEYID = 7
7,658,544 UART: [ldev] FE.KEYID = 1
7,670,076 UART: [ldev] Erasing FE.KEYID = 1
10,958,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,822 UART: [ldev] --
13,316,110 UART: [fwproc] Waiting for Commands...
13,319,228 UART: [fwproc] Received command 0x46574c44
13,321,411 UART: [fwproc] Received Image of size 114036 bytes
17,371,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,837,439 >>> mbox cmd response: success
17,841,588 UART: [afmc] ++
17,842,178 UART: [afmc] CDI.KEYID = 6
17,843,059 UART: [afmc] SUBJECT.KEYID = 7
17,844,333 UART: [afmc] AUTHORITY.KEYID = 5
21,157,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,453 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,779 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,644 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,064 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,713 UART: [afmc] --
23,520,151 UART: [cold-reset] --
23,524,011 UART: [state] Locking Datavault
23,528,785 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,579 UART: [state] Locking ICCM
23,531,653 UART: [exit] Launching FMC @ 0x40000130
23,540,053 UART:
23,540,297 UART: Running Caliptra FMC ...
23,541,397 UART:
23,541,556 UART: [state] CFI Enabled
23,549,792 UART: [fht] FMC Alias Private Key: 7
25,880,905 UART: [art] Extend RT PCRs Done
25,882,141 UART: [art] Lock RT PCRs Done
25,883,872 UART: [art] Populate DV Done
25,889,343 UART: [fht] FMC Alias Private Key: 7
25,890,991 UART: [art] Derive CDI
25,891,803 UART: [art] Store in in slot 0x4
25,934,427 UART: [art] Derive Key Pair
25,935,481 UART: [art] Store priv key in slot 0x5
29,177,177 UART: [art] Derive Key Pair - Done
29,190,408 UART: [art] Signing Cert with AUTHO
29,191,714 UART: RITY.KEYID = 7
31,470,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,499 UART: [art] PUB.X = 4314C96E353A6A33D24F681E26E4F627147D64F3C9A658E1E7818A59CA00C84F416A9B963E59262B7E201B7ADE781A4D
31,479,710 UART: [art] PUB.Y = 53D41D52EEDE44D4AE941104BC0A3CF5D36DC09B6F97E5E5CC485F8C89CB6619FCCA3DE08B972435DF041106BFB182A5
31,487,007 UART: [art] SIG.R = B34340CB3355274E28FF7C3F0EB49BBE9097BADB21FE56CD04B26A5819972F566F21BC36DB818842FA4BD4735FB47E04
31,494,414 UART: [art] SIG.S = 3C2A64AC131504C688C17CCA7DD8A93F02AFCE98652D9954AD6D8D231C9C66890FBB7D634DA20B694A38DEC56EFFFE0A
32,799,692 UART: Caliptra RT
32,800,415 UART: [state] CFI Enabled
32,917,977 UART: [rt] RT listening for mailbox commands...
32,919,893 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
32,949,700 UART: [rt]cmd =0x414c544e, len=20
32,951,405 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
4,126,948 ready_for_fw is high
4,127,490 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,261 >>> mbox cmd response: success
23,712,408 UART:
23,712,806 UART: Running Caliptra FMC ...
23,713,948 UART:
23,714,106 UART: [state] CFI Enabled
23,722,066 UART: [fht] FMC Alias Private Key: 7
26,053,000 UART: [art] Extend RT PCRs Done
26,054,242 UART: [art] Lock RT PCRs Done
26,056,040 UART: [art] Populate DV Done
26,061,420 UART: [fht] FMC Alias Private Key: 7
26,063,130 UART: [art] Derive CDI
26,064,179 UART: [art] Store in in slot 0x4
26,106,602 UART: [art] Derive Key Pair
26,107,607 UART: [art] Store priv key in slot 0x5
29,349,140 UART: [art] Derive Key Pair - Done
29,362,251 UART: [art] Signing Cert with AUTHO
29,363,551 UART: RITY.KEYID = 7
31,643,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,586 UART: [art] PUB.X = FFF26EE53A93C4D3BD7C5495378C5324A6DFDD4C9C31FF19335EA77269297D890583BC4E66524B2CE7E088332E33A568
31,651,803 UART: [art] PUB.Y = EFED099DF96E0A3CCD877333A3D334F87B507CAB59F3283EFA1E7979486A6BB1AE10F1A303DBF1A21C46BFCD938A37A6
31,659,111 UART: [art] SIG.R = 13A339250A931937E68DD19A5D666D987DBD46EBA6C47EC8F56980D4F474F6000193B239838D1993825640EFEA467BA9
31,666,455 UART: [art] SIG.S = BA7F82F18C9D86DF170AF7E43BE7601875F88972A823E45553C9EFC6557A40E18AAB9D79AAC5760E8BB652FABE48307A
32,971,597 UART: Caliptra RT
32,972,308 UART: [state] CFI Enabled
33,089,803 UART: [rt] RT listening for mailbox commands...
33,091,697 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,121,654 UART: [rt]cmd =0x414c544e, len=20
33,123,335 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,367 writing to cptra_bootfsm_go
193,581 UART:
193,942 UART: Running Caliptra ROM ...
195,138 UART:
195,295 UART: [state] CFI Enabled
263,553 UART: [state] LifecycleState = Unprovisioned
265,393 UART: [state] DebugLocked = No
266,773 UART: [state] WD Timer not started. Device not locked for debugging
270,025 UART: [kat] SHA2-256
449,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,729 UART: [kat] ++
461,179 UART: [kat] sha1
471,907 UART: [kat] SHA2-256
474,918 UART: [kat] SHA2-384
481,267 UART: [kat] SHA2-512-ACC
484,228 UART: [kat] ECC-384
2,926,294 UART: [kat] HMAC-384Kdf
2,950,182 UART: [kat] LMS
3,479,651 UART: [kat] --
3,485,135 UART: [cold-reset] ++
3,486,218 UART: [fht] FHT @ 0x50003400
3,496,368 UART: [idev] ++
3,496,940 UART: [idev] CDI.KEYID = 6
3,497,855 UART: [idev] SUBJECT.KEYID = 7
3,499,104 UART: [idev] UDS.KEYID = 0
3,500,029 ready_for_fw is high
3,500,226 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,644,061 UART: [idev] Erasing UDS.KEYID = 0
6,006,191 UART: [idev] Sha1 KeyId Algorithm
6,028,940 UART: [idev] --
6,034,396 UART: [ldev] ++
6,034,973 UART: [ldev] CDI.KEYID = 6
6,035,886 UART: [ldev] SUBJECT.KEYID = 5
6,037,102 UART: [ldev] AUTHORITY.KEYID = 7
6,038,340 UART: [ldev] FE.KEYID = 1
6,079,718 UART: [ldev] Erasing FE.KEYID = 1
8,585,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,665 UART: [ldev] --
10,391,848 UART: [fwproc] Wait for Commands...
10,393,616 UART: [fwproc] Recv command 0x46574c44
10,395,654 UART: [fwproc] Recv'd Img size: 114360 bytes
13,796,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,253,766 >>> mbox cmd response: success
14,257,487 UART: [afmc] ++
14,258,085 UART: [afmc] CDI.KEYID = 6
14,259,001 UART: [afmc] SUBJECT.KEYID = 7
14,260,169 UART: [afmc] AUTHORITY.KEYID = 5
16,783,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,880 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,849 UART: [afmc] --
18,584,467 UART: [cold-reset] --
18,588,885 UART: [state] Locking Datavault
18,595,645 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,294 UART: [state] Locking ICCM
18,598,418 UART: [exit] Launching FMC @ 0x40000130
18,606,878 UART:
18,607,123 UART: Running Caliptra FMC ...
18,608,228 UART:
18,608,391 UART: [state] CFI Enabled
18,666,731 UART: [fht] FMC Alias Private Key: 7
20,430,350 UART: [art] Extend RT PCRs Done
20,431,558 UART: [art] Lock RT PCRs Done
20,433,289 UART: [art] Populate DV Done
20,438,705 UART: [fht] FMC Alias Private Key: 7
20,440,297 UART: [art] Derive CDI
20,441,113 UART: [art] Store in in slot 0x4
20,499,240 UART: [art] Derive Key Pair
20,500,279 UART: [art] Store priv key in slot 0x5
22,963,794 UART: [art] Derive Key Pair - Done
22,976,805 UART: [art] Signing Cert with AUTHO
22,978,113 UART: RITY.KEYID = 7
24,689,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,066 UART: [art] PUB.X = 36AA4A4F9ED19E66223391DA2B7A84B7B0178D0CCFE8E2909159A2EA1F322CAC5687C17C433ED204F8C037243E0B9166
24,698,343 UART: [art] PUB.Y = 5B9F9A9F68949FD2870E96E97EB3DF51173AEC7F5947D36E3F2A17C8F05EE3B9B5F9DBDDDB85595D37D9D07118F81869
24,705,602 UART: [art] SIG.R = 6545F0C8D3EE79D9580DAC082C8D9C6ADAC68F23091C42207EB45307BBE8FD3C0445316AF6220BCD89880B751A98E57A
24,713,041 UART: [art] SIG.S = 5E5E645E7A3C79C6B337EFE18B4741C595344959B415A5DB133D834EC28E77400DBA7C7794ED1FD682BBF04DEF9097BD
25,692,077 UART: Caliptra RT
25,692,797 UART: [state] CFI Enabled
25,857,808 UART: [rt] RT listening for mailbox commands...
25,859,707 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,889,333 UART: [rt]cmd =0x414c544e, len=20
25,891,147 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,703 writing to cptra_bootfsm_go
192,780 UART:
193,142 UART: Running Caliptra ROM ...
194,339 UART:
194,496 UART: [state] CFI Enabled
268,341 UART: [state] LifecycleState = Unprovisioned
270,747 UART: [state] DebugLocked = No
272,523 UART: [state] WD Timer not started. Device not locked for debugging
277,642 UART: [kat] SHA2-256
467,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,263 UART: [kat] ++
478,748 UART: [kat] sha1
489,555 UART: [kat] SHA2-256
492,568 UART: [kat] SHA2-384
497,363 UART: [kat] SHA2-512-ACC
499,949 UART: [kat] ECC-384
2,946,539 UART: [kat] HMAC-384Kdf
2,972,693 UART: [kat] LMS
3,504,498 UART: [kat] --
3,508,920 UART: [cold-reset] ++
3,511,347 UART: [fht] FHT @ 0x50003400
3,522,753 UART: [idev] ++
3,523,463 UART: [idev] CDI.KEYID = 6
3,524,518 UART: [idev] SUBJECT.KEYID = 7
3,525,626 UART: [idev] UDS.KEYID = 0
3,526,564 ready_for_fw is high
3,526,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,618 UART: [idev] Erasing UDS.KEYID = 0
6,027,900 UART: [idev] Sha1 KeyId Algorithm
6,051,356 UART: [idev] --
6,057,084 UART: [ldev] ++
6,057,815 UART: [ldev] CDI.KEYID = 6
6,058,739 UART: [ldev] SUBJECT.KEYID = 5
6,059,787 UART: [ldev] AUTHORITY.KEYID = 7
6,061,075 UART: [ldev] FE.KEYID = 1
6,100,730 UART: [ldev] Erasing FE.KEYID = 1
8,607,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,793 UART: [ldev] --
10,413,602 UART: [fwproc] Wait for Commands...
10,415,213 UART: [fwproc] Recv command 0x46574c44
10,417,523 UART: [fwproc] Recv'd Img size: 114360 bytes
13,866,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,350 >>> mbox cmd response: success
14,607,925 UART: [afmc] ++
14,608,642 UART: [afmc] CDI.KEYID = 6
14,609,889 UART: [afmc] SUBJECT.KEYID = 7
14,611,329 UART: [afmc] AUTHORITY.KEYID = 5
17,148,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,373 UART: [afmc] --
18,949,273 UART: [cold-reset] --
18,952,611 UART: [state] Locking Datavault
18,956,737 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,891 UART: [state] Locking ICCM
18,961,589 UART: [exit] Launching FMC @ 0x40000130
18,970,272 UART:
18,970,517 UART: Running Caliptra FMC ...
18,971,623 UART:
18,971,790 UART: [state] CFI Enabled
19,032,067 UART: [fht] FMC Alias Private Key: 7
20,796,347 UART: [art] Extend RT PCRs Done
20,797,579 UART: [art] Lock RT PCRs Done
20,799,093 UART: [art] Populate DV Done
20,804,560 UART: [fht] FMC Alias Private Key: 7
20,806,259 UART: [art] Derive CDI
20,807,081 UART: [art] Store in in slot 0x4
20,864,888 UART: [art] Derive Key Pair
20,865,926 UART: [art] Store priv key in slot 0x5
23,329,042 UART: [art] Derive Key Pair - Done
23,342,339 UART: [art] Signing Cert with AUTHO
23,343,668 UART: RITY.KEYID = 7
25,055,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,680 UART: [art] PUB.X = E2CC5434C592DD0FBD7CDF47711B3BC029EA9367A03167AD985F66C2CE9B77D733AC8B1C3B1A35F2C2F5F84D6D97B808
25,063,959 UART: [art] PUB.Y = C4479C529854E3633F443866B1B80CD33F2D7A157DDA1ABD9EF6690F940B9C45EC299EA2954057317BBA672D70E7D2AC
25,071,227 UART: [art] SIG.R = C760194A975CA4C6CE34B0DFD56F884CC576ADE4430535339C2B0C91187E79D3070C0D797E57BBC094A803B17D4557A3
25,078,656 UART: [art] SIG.S = 846536FD079CB9BCFA0F1410FE6C4AF449CEBEA17D3B19A7D1033BE52297FF79E69F864DCFD65457B97E69D691303CB8
26,057,641 UART: Caliptra RT
26,058,386 UART: [state] CFI Enabled
26,224,032 UART: [rt] RT listening for mailbox commands...
26,225,919 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,256,089 UART: [rt]cmd =0x414c544e, len=20
26,257,797 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
3,437,804 ready_for_fw is high
3,438,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,740,896 >>> mbox cmd response: success
19,024,816 UART:
19,025,209 UART: Running Caliptra FMC ...
19,026,447 UART:
19,026,618 UART: [state] CFI Enabled
19,093,477 UART: [fht] FMC Alias Private Key: 7
20,857,826 UART: [art] Extend RT PCRs Done
20,859,059 UART: [art] Lock RT PCRs Done
20,861,124 UART: [art] Populate DV Done
20,866,441 UART: [fht] FMC Alias Private Key: 7
20,868,040 UART: [art] Derive CDI
20,868,863 UART: [art] Store in in slot 0x4
20,926,550 UART: [art] Derive Key Pair
20,927,543 UART: [art] Store priv key in slot 0x5
23,390,797 UART: [art] Derive Key Pair - Done
23,403,900 UART: [art] Signing Cert with AUTHO
23,405,206 UART: RITY.KEYID = 7
25,116,527 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,034 UART: [art] PUB.X = 6EA0441BD119F02F7F24BE8F7FE0AE5DBDA86567E9CF750F36C6FBC604FEF4ED8400C0AC31A27A16A4CA17A77803AE93
25,125,285 UART: [art] PUB.Y = 626524088E02E28E719CABF25DDD1C51DA4EE584B8DA230459ED15AEF743FB3BD1FB1F8D30386BE241A0166489DF2584
25,132,576 UART: [art] SIG.R = 4EB732D997B8E21CC04D0EFA8A421E0D4E69076C2D51EA94C564B58517749CA28D176609048B44B79B1FB56CE99991B8
25,139,943 UART: [art] SIG.S = A65644EC2FD90D17D96C504FDE83213EBE31C98DE0DEA1AB7DFF0A5FEB2DDB91BD6C6E9E18C82ED39E60FA66537C0534
26,118,471 UART: Caliptra RT
26,119,182 UART: [state] CFI Enabled
26,285,518 UART: [rt] RT listening for mailbox commands...
26,287,400 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,317,352 UART: [rt]cmd =0x414c544e, len=20
26,319,086 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,492 UART:
192,834 UART: Running Caliptra ROM ...
194,012 UART:
603,639 UART: [state] CFI Enabled
616,451 UART: [state] LifecycleState = Unprovisioned
618,820 UART: [state] DebugLocked = No
620,558 UART: [state] WD Timer not started. Device not locked for debugging
625,374 UART: [kat] SHA2-256
815,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,006 UART: [kat] ++
826,616 UART: [kat] sha1
838,987 UART: [kat] SHA2-256
841,997 UART: [kat] SHA2-384
847,061 UART: [kat] SHA2-512-ACC
849,638 UART: [kat] ECC-384
3,292,916 UART: [kat] HMAC-384Kdf
3,305,183 UART: [kat] LMS
3,836,979 UART: [kat] --
3,840,125 UART: [cold-reset] ++
3,841,627 UART: [fht] FHT @ 0x50003400
3,852,112 UART: [idev] ++
3,852,814 UART: [idev] CDI.KEYID = 6
3,853,775 UART: [idev] SUBJECT.KEYID = 7
3,855,019 UART: [idev] UDS.KEYID = 0
3,855,919 ready_for_fw is high
3,856,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,127 UART: [idev] Erasing UDS.KEYID = 0
6,331,545 UART: [idev] Sha1 KeyId Algorithm
6,353,469 UART: [idev] --
6,358,535 UART: [ldev] ++
6,359,208 UART: [ldev] CDI.KEYID = 6
6,360,089 UART: [ldev] SUBJECT.KEYID = 5
6,361,321 UART: [ldev] AUTHORITY.KEYID = 7
6,362,501 UART: [ldev] FE.KEYID = 1
6,374,898 UART: [ldev] Erasing FE.KEYID = 1
8,853,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,661 UART: [ldev] --
10,643,767 UART: [fwproc] Wait for Commands...
10,646,721 UART: [fwproc] Recv command 0x46574c44
10,648,974 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,882 >>> mbox cmd response: success
14,846,928 UART: [afmc] ++
14,847,632 UART: [afmc] CDI.KEYID = 6
14,848,736 UART: [afmc] SUBJECT.KEYID = 7
14,850,268 UART: [afmc] AUTHORITY.KEYID = 5
17,357,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,402 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,419 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,040 UART: [afmc] --
19,153,098 UART: [cold-reset] --
19,157,013 UART: [state] Locking Datavault
19,163,554 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,733 UART: [state] Locking ICCM
19,167,614 UART: [exit] Launching FMC @ 0x40000130
19,176,252 UART:
19,176,488 UART: Running Caliptra FMC ...
19,177,587 UART:
19,177,742 UART: [state] CFI Enabled
19,185,729 UART: [fht] FMC Alias Private Key: 7
20,942,692 UART: [art] Extend RT PCRs Done
20,943,908 UART: [art] Lock RT PCRs Done
20,945,503 UART: [art] Populate DV Done
20,951,022 UART: [fht] FMC Alias Private Key: 7
20,952,609 UART: [art] Derive CDI
20,953,345 UART: [art] Store in in slot 0x4
20,996,366 UART: [art] Derive Key Pair
20,997,360 UART: [art] Store priv key in slot 0x5
23,423,991 UART: [art] Derive Key Pair - Done
23,437,092 UART: [art] Signing Cert with AUTHO
23,438,426 UART: RITY.KEYID = 7
25,143,910 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,418 UART: [art] PUB.X = 1DEB397CABF226A3A68AE23A7B145ECEFFA079DE714AB8E3A75694E3950AF1A103416F11DB0144F63D10736D1F3B34E1
25,152,664 UART: [art] PUB.Y = 4D129EF9BC895BB0AED5616F5087E3CEC6C676EB729F088D63B79D3186C2CD0FC1F78B40FD6AA0C04BCD4AEDBA1718FD
25,159,957 UART: [art] SIG.R = 6A556673040D72865E755C0F5A91F0CCF59E3E9D65C6C0E60017888482B4A32CFD0C8B2610DCE7F63B218F95678884EF
25,167,351 UART: [art] SIG.S = F3221C971EF73B7E03B7CE02F3ACD861EDA39CF8EE222531EB035194F68F5589D393B469CE51616E1EE3A13AFB64BF20
26,146,004 UART: Caliptra RT
26,146,702 UART: [state] CFI Enabled
26,264,259 UART: [rt] RT listening for mailbox commands...
26,266,148 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,296,374 UART: [rt]cmd =0x414c544e, len=20
26,298,075 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,758,217 ready_for_fw is high
3,758,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,957,540 >>> mbox cmd response: success
19,213,735 UART:
19,214,124 UART: Running Caliptra FMC ...
19,215,311 UART:
19,215,485 UART: [state] CFI Enabled
19,223,703 UART: [fht] FMC Alias Private Key: 7
20,980,432 UART: [art] Extend RT PCRs Done
20,981,655 UART: [art] Lock RT PCRs Done
20,983,521 UART: [art] Populate DV Done
20,988,989 UART: [fht] FMC Alias Private Key: 7
20,990,743 UART: [art] Derive CDI
20,991,560 UART: [art] Store in in slot 0x4
21,033,694 UART: [art] Derive Key Pair
21,034,697 UART: [art] Store priv key in slot 0x5
23,461,148 UART: [art] Derive Key Pair - Done
23,474,303 UART: [art] Signing Cert with AUTHO
23,475,601 UART: RITY.KEYID = 7
25,181,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,760 UART: [art] PUB.X = F9AD56CD50180C66D7CB53707D6C97D51C991A3337FE817204A62A7C610929E3909B596F95D81A98FB9C4ED6B605F96C
25,190,023 UART: [art] PUB.Y = BE24818C470E837A8A0A72AEBEF2D23CEE88213AD1FE288D0D2A9EEAE135AB5CEC996FB1E6EF4EBABAC1B424A798BB02
25,197,343 UART: [art] SIG.R = DDAD160FA536F52DEF3E3BCB03FF1576EA625E0250DFB893BCD44EA8BB367C6A95BB5DF5829687F15D11D6F465134398
25,204,781 UART: [art] SIG.S = D1B150B903759030CB91D8F42FE308741239AB59F184B0E1DBDAC734F8E86BA9DC98A110041F706CD4C534B2AF2DBAB1
26,183,560 UART: Caliptra RT
26,184,247 UART: [state] CFI Enabled
26,301,731 UART: [rt] RT listening for mailbox commands...
26,303,602 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,333,558 UART: [rt]cmd =0x414c544e, len=20
26,335,507 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,759 UART: [kat] SHA2-256
892,697 UART: [kat] SHA2-384
895,554 UART: [kat] SHA2-512-ACC
897,455 UART: [kat] ECC-384
903,068 UART: [kat] HMAC-384Kdf
907,536 UART: [kat] LMS
1,475,732 UART: [kat] --
1,476,699 UART: [cold-reset] ++
1,477,123 UART: [fht] Storing FHT @ 0x50003400
1,479,970 UART: [idev] ++
1,480,138 UART: [idev] CDI.KEYID = 6
1,480,498 UART: [idev] SUBJECT.KEYID = 7
1,480,922 UART: [idev] UDS.KEYID = 0
1,481,267 ready_for_fw is high
1,481,267 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,002 UART: [idev] Erasing UDS.KEYID = 0
1,505,740 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,296 UART: [idev] --
1,515,189 UART: [ldev] ++
1,515,357 UART: [ldev] CDI.KEYID = 6
1,515,720 UART: [ldev] SUBJECT.KEYID = 5
1,516,146 UART: [ldev] AUTHORITY.KEYID = 7
1,516,609 UART: [ldev] FE.KEYID = 1
1,521,695 UART: [ldev] Erasing FE.KEYID = 1
1,546,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,706 UART: [ldev] --
1,586,019 UART: [fwproc] Waiting for Commands...
1,586,800 UART: [fwproc] Received command 0x46574c44
1,587,591 UART: [fwproc] Received Image of size 114360 bytes
2,884,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,140 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,271 >>> mbox cmd response: success
3,077,413 UART: [afmc] ++
3,077,581 UART: [afmc] CDI.KEYID = 6
3,077,943 UART: [afmc] SUBJECT.KEYID = 7
3,078,368 UART: [afmc] AUTHORITY.KEYID = 5
3,112,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,134 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,824 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,811 UART: [afmc] --
3,155,729 UART: [cold-reset] --
3,156,679 UART: [state] Locking Datavault
3,158,048 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,652 UART: [state] Locking ICCM
3,159,106 UART: [exit] Launching FMC @ 0x40000130
3,164,435 UART:
3,164,451 UART: Running Caliptra FMC ...
3,164,859 UART:
3,164,913 UART: [state] CFI Enabled
3,175,680 UART: [fht] FMC Alias Private Key: 7
3,283,491 UART: [art] Extend RT PCRs Done
3,283,919 UART: [art] Lock RT PCRs Done
3,285,091 UART: [art] Populate DV Done
3,293,332 UART: [fht] FMC Alias Private Key: 7
3,294,368 UART: [art] Derive CDI
3,294,648 UART: [art] Store in in slot 0x4
3,380,295 UART: [art] Derive Key Pair
3,380,655 UART: [art] Store priv key in slot 0x5
3,393,749 UART: [art] Derive Key Pair - Done
3,408,812 UART: [art] Signing Cert with AUTHO
3,409,292 UART: RITY.KEYID = 7
3,424,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,223 UART: [art] PUB.X = 802DDACBC3318133C721DADFE828D397A6A8EE666C240B44FC32DC729F923841C6D3EA4C19A915E4A0BA698D25AE60F7
3,432,004 UART: [art] PUB.Y = 41AFBA2221FDFEFE9840B47F68E8ECDB29F1494363CCBE56FDABD6034C5C2C0F92899FD33C5650D787684B255E2C1A85
3,438,964 UART: [art] SIG.R = 28BD4EE8B578DCE2F51CBBE43C5208C523F6FD3C9A747D84A8782A3795B0E632A8BE37CB37A851762F5333D158485BC5
3,445,739 UART: [art] SIG.S = 83E09178E8F36A1F985691B80B0CDCD18240493BBC288630F3D01CFD49292CB0C523144D65821419B9336CE00CA1949F
3,469,097 UART: Caliptra RT
3,469,351 UART: [state] CFI Enabled
3,576,689 UART: [rt] RT listening for mailbox commands...
3,577,359 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,128 UART: [rt]cmd =0x414c544e, len=20
3,608,526 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,337 ready_for_fw is high
1,363,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,575 >>> mbox cmd response: success
2,990,583 UART:
2,990,599 UART: Running Caliptra FMC ...
2,991,007 UART:
2,991,061 UART: [state] CFI Enabled
3,001,938 UART: [fht] FMC Alias Private Key: 7
3,110,173 UART: [art] Extend RT PCRs Done
3,110,601 UART: [art] Lock RT PCRs Done
3,111,831 UART: [art] Populate DV Done
3,120,074 UART: [fht] FMC Alias Private Key: 7
3,121,050 UART: [art] Derive CDI
3,121,330 UART: [art] Store in in slot 0x4
3,207,481 UART: [art] Derive Key Pair
3,207,841 UART: [art] Store priv key in slot 0x5
3,221,265 UART: [art] Derive Key Pair - Done
3,235,957 UART: [art] Signing Cert with AUTHO
3,236,437 UART: RITY.KEYID = 7
3,251,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,158 UART: [art] PUB.X = 9B249FF77FC674F472E2EB9B221D56048D34147D209A82345397D647DAFF177524A4566C4A56BF49CB24D504A11192E8
3,258,918 UART: [art] PUB.Y = 9B2EF307A4425807759E045BC77E625BE1AEDA74F51910D4AECF1911BD42E03266E0B17E6CB2BA0D07FF8CF2746476C0
3,265,863 UART: [art] SIG.R = 9990D4E2265C92846E27B2A0B4D309DFD3677339A30BAF81F0F8A1824A5D26A1A3954F45982BCBE15CF80201E741C8B0
3,272,623 UART: [art] SIG.S = B27055D7548015760035232B5FA4BDE645E14ED505481925D58EE7A3444AA47D448F27F8215DDE452033028FF8243EA7
3,296,340 UART: Caliptra RT
3,296,594 UART: [state] CFI Enabled
3,405,361 UART: [rt] RT listening for mailbox commands...
3,406,031 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,636 UART: [rt]cmd =0x414c544e, len=20
3,436,972 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
902,879 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,631 UART: [idev] ++
1,479,799 UART: [idev] CDI.KEYID = 6
1,480,159 UART: [idev] SUBJECT.KEYID = 7
1,480,583 UART: [idev] UDS.KEYID = 0
1,480,928 ready_for_fw is high
1,480,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,767 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,379 UART: [idev] --
1,515,416 UART: [ldev] ++
1,515,584 UART: [ldev] CDI.KEYID = 6
1,515,947 UART: [ldev] SUBJECT.KEYID = 5
1,516,373 UART: [ldev] AUTHORITY.KEYID = 7
1,516,836 UART: [ldev] FE.KEYID = 1
1,522,050 UART: [ldev] Erasing FE.KEYID = 1
1,547,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,963 UART: [ldev] --
1,586,224 UART: [fwproc] Waiting for Commands...
1,587,013 UART: [fwproc] Received command 0x46574c44
1,587,804 UART: [fwproc] Received Image of size 114360 bytes
2,885,964 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,063 >>> mbox cmd response: success
3,079,235 UART: [afmc] ++
3,079,403 UART: [afmc] CDI.KEYID = 6
3,079,765 UART: [afmc] SUBJECT.KEYID = 7
3,080,190 UART: [afmc] AUTHORITY.KEYID = 5
3,115,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,082 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,772 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,619 UART: [afmc] --
3,158,731 UART: [cold-reset] --
3,159,461 UART: [state] Locking Datavault
3,160,424 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,028 UART: [state] Locking ICCM
3,161,514 UART: [exit] Launching FMC @ 0x40000130
3,166,843 UART:
3,166,859 UART: Running Caliptra FMC ...
3,167,267 UART:
3,167,410 UART: [state] CFI Enabled
3,178,281 UART: [fht] FMC Alias Private Key: 7
3,286,424 UART: [art] Extend RT PCRs Done
3,286,852 UART: [art] Lock RT PCRs Done
3,288,302 UART: [art] Populate DV Done
3,296,571 UART: [fht] FMC Alias Private Key: 7
3,297,687 UART: [art] Derive CDI
3,297,967 UART: [art] Store in in slot 0x4
3,383,214 UART: [art] Derive Key Pair
3,383,574 UART: [art] Store priv key in slot 0x5
3,396,574 UART: [art] Derive Key Pair - Done
3,411,060 UART: [art] Signing Cert with AUTHO
3,411,540 UART: RITY.KEYID = 7
3,426,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,263 UART: [art] PUB.X = 20AA7C67121471A84DF51D8965183152E8A2EABC976A48A4789BB4239848CC543C626F79190723730D1DF77E9E7D78E0
3,434,021 UART: [art] PUB.Y = 5E678B3BF3D103270B587F91FBDACE9E0B3BC95EA8B7174ED9BF171F898B83A9F9213E209FEBEAA3BC33879488D03B9C
3,440,980 UART: [art] SIG.R = F7573A1B62C51AA4FAFD41615B28BFC50EDC5D2267D2E23BAC782CB69CE5DB3114D4E635679935FE58EDCF194954A3BA
3,447,765 UART: [art] SIG.S = 840CB9C14FB5D66FF8FF3F977A84463EFFA32CA3EF66635B84836A389C37F7570E4574882B5B6F042562CA51E7B8662D
3,470,937 UART: Caliptra RT
3,471,283 UART: [state] CFI Enabled
3,580,034 UART: [rt] RT listening for mailbox commands...
3,580,704 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,225 UART: [rt]cmd =0x414c544e, len=20
3,611,547 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 ready_for_fw is high
1,362,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,872 >>> mbox cmd response: success
2,989,626 UART:
2,989,642 UART: Running Caliptra FMC ...
2,990,050 UART:
2,990,193 UART: [state] CFI Enabled
3,000,832 UART: [fht] FMC Alias Private Key: 7
3,109,307 UART: [art] Extend RT PCRs Done
3,109,735 UART: [art] Lock RT PCRs Done
3,111,193 UART: [art] Populate DV Done
3,119,564 UART: [fht] FMC Alias Private Key: 7
3,120,618 UART: [art] Derive CDI
3,120,898 UART: [art] Store in in slot 0x4
3,206,423 UART: [art] Derive Key Pair
3,206,783 UART: [art] Store priv key in slot 0x5
3,220,371 UART: [art] Derive Key Pair - Done
3,235,438 UART: [art] Signing Cert with AUTHO
3,235,918 UART: RITY.KEYID = 7
3,251,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,819 UART: [art] PUB.X = 75273976D950A485D18F68EAE981CE81A0B3820F30ECAA1FD9A032CDC83B519EED02040B574D45885781A91CADA03EE3
3,258,585 UART: [art] PUB.Y = F25495361E25B1B2AD24BC2BE45FD5DA2369B839B8A8FDEC6B20C0E6DC3C51E0CF5E6C55DA9A18DAD5899383B1FEACF3
3,265,561 UART: [art] SIG.R = 365F33A28C55F4474DF67ABAA6250637FFF462280F093AE914E02A4BEE5A70A4B87787821A197B2DA16888CE6DB0C355
3,272,326 UART: [art] SIG.S = 47A1A5B5FB88EBBA1B8B009A6CE32BCAD0260171310302ECE21524072565FA23510DF9D70F553047DE24AECF40BB582A
3,296,093 UART: Caliptra RT
3,296,439 UART: [state] CFI Enabled
3,405,238 UART: [rt] RT listening for mailbox commands...
3,405,908 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,535 UART: [rt]cmd =0x414c544e, len=20
3,436,827 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
893,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,829 UART: [kat] ++
897,981 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
907,122 UART: [kat] SHA2-512-ACC
909,023 UART: [kat] ECC-384
918,902 UART: [kat] HMAC-384Kdf
923,416 UART: [kat] LMS
1,171,744 UART: [kat] --
1,172,619 UART: [cold-reset] ++
1,173,161 UART: [fht] FHT @ 0x50003400
1,175,830 UART: [idev] ++
1,175,998 UART: [idev] CDI.KEYID = 6
1,176,358 UART: [idev] SUBJECT.KEYID = 7
1,176,782 UART: [idev] UDS.KEYID = 0
1,177,127 ready_for_fw is high
1,177,127 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,970 UART: [idev] Erasing UDS.KEYID = 0
1,201,779 UART: [idev] Sha1 KeyId Algorithm
1,210,377 UART: [idev] --
1,211,397 UART: [ldev] ++
1,211,565 UART: [ldev] CDI.KEYID = 6
1,211,928 UART: [ldev] SUBJECT.KEYID = 5
1,212,354 UART: [ldev] AUTHORITY.KEYID = 7
1,212,817 UART: [ldev] FE.KEYID = 1
1,218,151 UART: [ldev] Erasing FE.KEYID = 1
1,244,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,187 UART: [ldev] --
1,283,528 UART: [fwproc] Wait for Commands...
1,284,164 UART: [fwproc] Recv command 0x46574c44
1,284,892 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,357 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,206 >>> mbox cmd response: success
2,775,296 UART: [afmc] ++
2,775,464 UART: [afmc] CDI.KEYID = 6
2,775,826 UART: [afmc] SUBJECT.KEYID = 7
2,776,251 UART: [afmc] AUTHORITY.KEYID = 5
2,812,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,249 UART: [afmc] --
2,855,239 UART: [cold-reset] --
2,856,347 UART: [state] Locking Datavault
2,857,426 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,030 UART: [state] Locking ICCM
2,858,554 UART: [exit] Launching FMC @ 0x40000130
2,863,883 UART:
2,863,899 UART: Running Caliptra FMC ...
2,864,307 UART:
2,864,361 UART: [state] CFI Enabled
2,874,884 UART: [fht] FMC Alias Private Key: 7
2,982,933 UART: [art] Extend RT PCRs Done
2,983,361 UART: [art] Lock RT PCRs Done
2,984,965 UART: [art] Populate DV Done
2,993,076 UART: [fht] FMC Alias Private Key: 7
2,994,170 UART: [art] Derive CDI
2,994,450 UART: [art] Store in in slot 0x4
3,080,259 UART: [art] Derive Key Pair
3,080,619 UART: [art] Store priv key in slot 0x5
3,093,617 UART: [art] Derive Key Pair - Done
3,107,868 UART: [art] Signing Cert with AUTHO
3,108,348 UART: RITY.KEYID = 7
3,123,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,015 UART: [art] PUB.X = 601F293808E3B5DAF18800AA1BBB9D6B392282EE7987792ED0D194C655D8D9FD635FACDB9CCA5D9B280FDC83172E8707
3,130,766 UART: [art] PUB.Y = 491057320C6AE341E0358AF03B68B8448BDBC819028CBBCF71D7C8A446E0782BD202112C5DCE8A08B5D28B65DE3B9DBB
3,137,716 UART: [art] SIG.R = 4AC0A2DC370C2B54C4E371FE28D6C62956CB4929D83AD3F328F677196F1917A8DB94FFDB59CEE790ACFC5288DA167A17
3,144,497 UART: [art] SIG.S = 1C0FEA2514BE290393029D4F0658E2777356DC722101CDEB9E3E8F3B0FDF1A358CDE01B3E04AC0609CD79651FB265D3D
3,168,871 UART: Caliptra RT
3,169,125 UART: [state] CFI Enabled
3,276,747 UART: [rt] RT listening for mailbox commands...
3,277,417 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,920 UART: [rt]cmd =0x414c544e, len=20
3,308,200 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 ready_for_fw is high
1,060,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,717 >>> mbox cmd response: success
2,689,091 UART:
2,689,107 UART: Running Caliptra FMC ...
2,689,515 UART:
2,689,569 UART: [state] CFI Enabled
2,699,768 UART: [fht] FMC Alias Private Key: 7
2,807,977 UART: [art] Extend RT PCRs Done
2,808,405 UART: [art] Lock RT PCRs Done
2,809,995 UART: [art] Populate DV Done
2,818,160 UART: [fht] FMC Alias Private Key: 7
2,819,134 UART: [art] Derive CDI
2,819,414 UART: [art] Store in in slot 0x4
2,905,041 UART: [art] Derive Key Pair
2,905,401 UART: [art] Store priv key in slot 0x5
2,918,955 UART: [art] Derive Key Pair - Done
2,933,592 UART: [art] Signing Cert with AUTHO
2,934,072 UART: RITY.KEYID = 7
2,949,252 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,017 UART: [art] PUB.X = D8D169DFBEBFABF0B605A688754B6ACD538D4F1779C8E96C4680B445692D1139616D19F50C8D679B98FFC040C13B21A0
2,956,789 UART: [art] PUB.Y = 610852ED48BD75B1C22B9E9EA50A25D938EDDDD4D45FF2DB0B8DE935FC0625D2F6985918A28B682A9582503A57C6AF8F
2,963,739 UART: [art] SIG.R = 8FF87D1DA1B7E4A0836B9A339E5DD9FF204ACC0AC3DFEC494F2FC03027C6CD251753F03B9804A6123971C968549644F3
2,970,511 UART: [art] SIG.S = 58694C30B299828E0F03C8229527A9C19A13BCB7AD10BA7A49C67B9F0E05581CBD6D8A2F29ECC70CF6D9A723381B960D
2,994,754 UART: Caliptra RT
2,995,008 UART: [state] CFI Enabled
3,102,842 UART: [rt] RT listening for mailbox commands...
3,103,512 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,039 UART: [rt]cmd =0x414c544e, len=20
3,134,393 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Unprovisioned
85,626 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,395 UART: [kat] HMAC-384Kdf
922,809 UART: [kat] LMS
1,171,137 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,548 UART: [fht] FHT @ 0x50003400
1,175,307 UART: [idev] ++
1,175,475 UART: [idev] CDI.KEYID = 6
1,175,835 UART: [idev] SUBJECT.KEYID = 7
1,176,259 UART: [idev] UDS.KEYID = 0
1,176,604 ready_for_fw is high
1,176,604 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,211 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,836 UART: [ldev] ++
1,211,004 UART: [ldev] CDI.KEYID = 6
1,211,367 UART: [ldev] SUBJECT.KEYID = 5
1,211,793 UART: [ldev] AUTHORITY.KEYID = 7
1,212,256 UART: [ldev] FE.KEYID = 1
1,217,584 UART: [ldev] Erasing FE.KEYID = 1
1,243,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,716 UART: [ldev] --
1,283,081 UART: [fwproc] Wait for Commands...
1,283,665 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,817 >>> mbox cmd response: success
2,774,957 UART: [afmc] ++
2,775,125 UART: [afmc] CDI.KEYID = 6
2,775,487 UART: [afmc] SUBJECT.KEYID = 7
2,775,912 UART: [afmc] AUTHORITY.KEYID = 5
2,811,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,096 UART: [afmc] --
2,855,150 UART: [cold-reset] --
2,856,144 UART: [state] Locking Datavault
2,857,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,009 UART: [state] Locking ICCM
2,858,551 UART: [exit] Launching FMC @ 0x40000130
2,863,880 UART:
2,863,896 UART: Running Caliptra FMC ...
2,864,304 UART:
2,864,447 UART: [state] CFI Enabled
2,875,134 UART: [fht] FMC Alias Private Key: 7
2,983,575 UART: [art] Extend RT PCRs Done
2,984,003 UART: [art] Lock RT PCRs Done
2,985,575 UART: [art] Populate DV Done
2,993,846 UART: [fht] FMC Alias Private Key: 7
2,994,904 UART: [art] Derive CDI
2,995,184 UART: [art] Store in in slot 0x4
3,080,977 UART: [art] Derive Key Pair
3,081,337 UART: [art] Store priv key in slot 0x5
3,095,095 UART: [art] Derive Key Pair - Done
3,110,031 UART: [art] Signing Cert with AUTHO
3,110,511 UART: RITY.KEYID = 7
3,125,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,380 UART: [art] PUB.X = F044D378774671A3E7C11A5A1864454C480AB3591A56DB4A64170FC11B171E8EB19424ABB89C1FD015DBB3DF73CE04E9
3,133,147 UART: [art] PUB.Y = F77E50F581FFA7238108AED1F171AB735380FD735B6AC15A6A523F6F7FDB6BDA222EE89F9F2A68F92B848EAC8E1C6BDD
3,140,116 UART: [art] SIG.R = D17FBAD93AB8ECD3AB8C60BFFE63E22F021381A998D10582BC155A71E3D6B1A14802BEFE6B53A7D4E6AFF475E08AEAF4
3,146,903 UART: [art] SIG.S = 97C05AD806E67AC31713F4A77EBD3BD138DF84BF660F6066E2D835CB7BD31C4B452CE99A84C45E6B2BD99F169D18AE06
3,171,157 UART: Caliptra RT
3,171,503 UART: [state] CFI Enabled
3,279,688 UART: [rt] RT listening for mailbox commands...
3,280,358 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,815 UART: [rt]cmd =0x414c544e, len=20
3,310,879 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 ready_for_fw is high
1,060,714 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,406 >>> mbox cmd response: success
2,688,186 UART:
2,688,202 UART: Running Caliptra FMC ...
2,688,610 UART:
2,688,753 UART: [state] CFI Enabled
2,699,054 UART: [fht] FMC Alias Private Key: 7
2,807,041 UART: [art] Extend RT PCRs Done
2,807,469 UART: [art] Lock RT PCRs Done
2,809,397 UART: [art] Populate DV Done
2,817,490 UART: [fht] FMC Alias Private Key: 7
2,818,450 UART: [art] Derive CDI
2,818,730 UART: [art] Store in in slot 0x4
2,904,519 UART: [art] Derive Key Pair
2,904,879 UART: [art] Store priv key in slot 0x5
2,918,041 UART: [art] Derive Key Pair - Done
2,933,091 UART: [art] Signing Cert with AUTHO
2,933,571 UART: RITY.KEYID = 7
2,948,733 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,498 UART: [art] PUB.X = F65DF564EAA673E399C83E6BDBE988E9E868B2F33B7732F36D679DC361F9019A6BDE385BA2EC71518CCDB28170B47231
2,956,275 UART: [art] PUB.Y = F56EB7AD934CD3E5CA59EF71E7DAFFFDFA66EE3FF7F5632FF12A5116E8D0786173002E495420045728133514B7247DBB
2,963,210 UART: [art] SIG.R = 68447135972DC2DC7371F7DF40C9CF9F538874CE7448A046A98DAAF51D7F1D90DF5CF37E957EA166976FE8290484AE1B
2,969,983 UART: [art] SIG.S = 57635EE3CE0F00BBF528EE854AF5E6328E94E54CDFE8F3B0C00118EB004518EC2ED2AD2B8B820BF33937AE8889AF6532
2,994,027 UART: Caliptra RT
2,994,373 UART: [state] CFI Enabled
3,102,185 UART: [rt] RT listening for mailbox commands...
3,102,855 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,290 UART: [rt]cmd =0x414c544e, len=20
3,133,744 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,127 UART: [kat] SHA2-256
901,067 UART: [kat] SHA2-384
903,886 UART: [kat] SHA2-512-ACC
905,787 UART: [kat] ECC-384
915,460 UART: [kat] HMAC-384Kdf
919,930 UART: [kat] LMS
1,168,242 UART: [kat] --
1,169,175 UART: [cold-reset] ++
1,169,503 UART: [fht] FHT @ 0x50003400
1,172,233 UART: [idev] ++
1,172,401 UART: [idev] CDI.KEYID = 6
1,172,762 UART: [idev] SUBJECT.KEYID = 7
1,173,187 UART: [idev] UDS.KEYID = 0
1,173,533 ready_for_fw is high
1,173,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,331 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,193 UART: [idev] --
1,208,100 UART: [ldev] ++
1,208,268 UART: [ldev] CDI.KEYID = 6
1,208,632 UART: [ldev] SUBJECT.KEYID = 5
1,209,059 UART: [ldev] AUTHORITY.KEYID = 7
1,209,522 UART: [ldev] FE.KEYID = 1
1,214,482 UART: [ldev] Erasing FE.KEYID = 1
1,240,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,544 UART: [ldev] --
1,279,894 UART: [fwproc] Wait for Commands...
1,280,719 UART: [fwproc] Recv command 0x46574c44
1,281,452 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,106 >>> mbox cmd response: success
2,772,265 UART: [afmc] ++
2,772,433 UART: [afmc] CDI.KEYID = 6
2,772,796 UART: [afmc] SUBJECT.KEYID = 7
2,773,222 UART: [afmc] AUTHORITY.KEYID = 5
2,808,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,526 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,245 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,112 UART: [afmc] --
2,852,194 UART: [cold-reset] --
2,853,154 UART: [state] Locking Datavault
2,854,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,203 UART: [state] Locking ICCM
2,855,697 UART: [exit] Launching FMC @ 0x40000130
2,861,026 UART:
2,861,042 UART: Running Caliptra FMC ...
2,861,450 UART:
2,861,504 UART: [state] CFI Enabled
2,871,827 UART: [fht] FMC Alias Private Key: 7
2,979,256 UART: [art] Extend RT PCRs Done
2,979,684 UART: [art] Lock RT PCRs Done
2,981,440 UART: [art] Populate DV Done
2,989,655 UART: [fht] FMC Alias Private Key: 7
2,990,773 UART: [art] Derive CDI
2,991,053 UART: [art] Store in in slot 0x4
3,076,454 UART: [art] Derive Key Pair
3,076,814 UART: [art] Store priv key in slot 0x5
3,090,078 UART: [art] Derive Key Pair - Done
3,104,818 UART: [art] Signing Cert with AUTHO
3,105,298 UART: RITY.KEYID = 7
3,120,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,361 UART: [art] PUB.X = 0F99BDD858D5AC7DA16FC13987D196AADEBC418293566863181BA5885AC21D8836BF954A321BCC25C527887B963C1497
3,128,130 UART: [art] PUB.Y = B793981CAF5A22B8BE3214C4E77F6CD5F1E31C227360F5D39316696FEAEFDBBC95F09484BFCA2B3DF4A3D06CDDD7D184
3,135,102 UART: [art] SIG.R = 54D65AD90FACF44DB07EEF46F43B744BA36482164F69EF8A41AB75E59548B62AF073D2955C63DDC39C65B199272547BC
3,141,877 UART: [art] SIG.S = 309601C1AAF1AF9C553C7155E2BCD65D4D6D6B054B27602D4E2C99CCE60D593971551CFBA927566478EC8A19FE5F18E1
3,165,935 UART: Caliptra RT
3,166,189 UART: [state] CFI Enabled
3,274,159 UART: [rt] RT listening for mailbox commands...
3,274,829 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,458 UART: [rt]cmd =0x414c544e, len=20
3,305,818 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,176 ready_for_fw is high
1,056,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,456 >>> mbox cmd response: success
2,683,796 UART:
2,683,812 UART: Running Caliptra FMC ...
2,684,220 UART:
2,684,274 UART: [state] CFI Enabled
2,695,007 UART: [fht] FMC Alias Private Key: 7
2,802,736 UART: [art] Extend RT PCRs Done
2,803,164 UART: [art] Lock RT PCRs Done
2,804,562 UART: [art] Populate DV Done
2,812,515 UART: [fht] FMC Alias Private Key: 7
2,813,595 UART: [art] Derive CDI
2,813,875 UART: [art] Store in in slot 0x4
2,899,652 UART: [art] Derive Key Pair
2,900,012 UART: [art] Store priv key in slot 0x5
2,913,536 UART: [art] Derive Key Pair - Done
2,928,453 UART: [art] Signing Cert with AUTHO
2,928,933 UART: RITY.KEYID = 7
2,944,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,318 UART: [art] PUB.X = 804044E4F28C5625906581705F8F16AFB55B822119B9348FBCF1DCC14CB098773446AB600B4E119FE85FC17289653027
2,952,077 UART: [art] PUB.Y = 5FE67AD76E753DF2D1396DB87D00FFEA88FAAB73AC178A7BB0018578862F10AB406892C00BD5C9E833F7BA4F9A5159BD
2,959,015 UART: [art] SIG.R = DA98AE4FD6F62EDE507A2BB2214613A0ED765C42A41F1427ED1929F156C98E4AF648D76B442BB2CC8D12EDE19A712FE8
2,965,801 UART: [art] SIG.S = F996990C2E06EE33EDEB28830D3251CFBD8BDA0218E9A656388ADB7B5A6D5E2C2B6BD9324E6474EE48FAAD5632E5B276
2,989,442 UART: Caliptra RT
2,989,696 UART: [state] CFI Enabled
3,096,855 UART: [rt] RT listening for mailbox commands...
3,097,525 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,958 UART: [rt]cmd =0x414c544e, len=20
3,128,364 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,169,964 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,209,007 UART: [ldev] ++
1,209,175 UART: [ldev] CDI.KEYID = 6
1,209,539 UART: [ldev] SUBJECT.KEYID = 5
1,209,966 UART: [ldev] AUTHORITY.KEYID = 7
1,210,429 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,241,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,177 UART: [fwproc] Wait for Commands...
1,281,784 UART: [fwproc] Recv command 0x46574c44
1,282,517 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,887 >>> mbox cmd response: success
2,774,140 UART: [afmc] ++
2,774,308 UART: [afmc] CDI.KEYID = 6
2,774,671 UART: [afmc] SUBJECT.KEYID = 7
2,775,097 UART: [afmc] AUTHORITY.KEYID = 5
2,810,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,145 UART: [afmc] --
2,854,275 UART: [cold-reset] --
2,855,225 UART: [state] Locking Datavault
2,856,424 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,028 UART: [state] Locking ICCM
2,857,546 UART: [exit] Launching FMC @ 0x40000130
2,862,875 UART:
2,862,891 UART: Running Caliptra FMC ...
2,863,299 UART:
2,863,442 UART: [state] CFI Enabled
2,874,033 UART: [fht] FMC Alias Private Key: 7
2,982,382 UART: [art] Extend RT PCRs Done
2,982,810 UART: [art] Lock RT PCRs Done
2,983,960 UART: [art] Populate DV Done
2,992,131 UART: [fht] FMC Alias Private Key: 7
2,993,251 UART: [art] Derive CDI
2,993,531 UART: [art] Store in in slot 0x4
3,079,188 UART: [art] Derive Key Pair
3,079,548 UART: [art] Store priv key in slot 0x5
3,092,588 UART: [art] Derive Key Pair - Done
3,107,144 UART: [art] Signing Cert with AUTHO
3,107,624 UART: RITY.KEYID = 7
3,122,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,587 UART: [art] PUB.X = 042B24C3CA74F9658EA2EE726CAC729C637F6DA0195E4D2CC42E42795C72267C4337809C47DDF962AB05BA86150926AE
3,130,352 UART: [art] PUB.Y = 6710C152808B98D8ED5B8F73DCED0BB527D424DF18F0661BA0ECC97C13E1957094915F881864DD15643F014A74C5A164
3,137,296 UART: [art] SIG.R = D440B271A152FEC3A836F96A140ABA8CA51CA21710DBEF0BB0E1EFEEF226DED4F8AA77E8FCA286950973003B66C8B83C
3,144,057 UART: [art] SIG.S = 568365021F1392E1A1991B234B2FBC42CB4B25069CB6C14570513314C524FEFF1CAEF4EC93B7B04C1784379C7ACF48AF
3,167,862 UART: Caliptra RT
3,168,208 UART: [state] CFI Enabled
3,275,936 UART: [rt] RT listening for mailbox commands...
3,276,606 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,255 UART: [rt]cmd =0x414c544e, len=20
3,307,535 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,035 ready_for_fw is high
1,056,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,475 >>> mbox cmd response: success
2,684,355 UART:
2,684,371 UART: Running Caliptra FMC ...
2,684,779 UART:
2,684,922 UART: [state] CFI Enabled
2,695,433 UART: [fht] FMC Alias Private Key: 7
2,804,156 UART: [art] Extend RT PCRs Done
2,804,584 UART: [art] Lock RT PCRs Done
2,805,968 UART: [art] Populate DV Done
2,814,259 UART: [fht] FMC Alias Private Key: 7
2,815,405 UART: [art] Derive CDI
2,815,685 UART: [art] Store in in slot 0x4
2,901,372 UART: [art] Derive Key Pair
2,901,732 UART: [art] Store priv key in slot 0x5
2,914,454 UART: [art] Derive Key Pair - Done
2,929,311 UART: [art] Signing Cert with AUTHO
2,929,791 UART: RITY.KEYID = 7
2,945,183 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,948 UART: [art] PUB.X = FD6D2E22B7F3CEACFA025FFC1F266B210B08085F740BCD649C4ADE29AE6B2AF3F94B60BAFC2017F5067DDA5677A46175
2,952,722 UART: [art] PUB.Y = 3258DE11E362F84ADC2F8434F39F7032527B070CD6530602FB4B429114AA2D24492A534FB86A36EA6AC3413AC20A54FB
2,959,659 UART: [art] SIG.R = D0842B7EE92C9052FA7C21EF3C9D378E150FCE1AD90ED9828D6594D41A9605837B7D68B897510E094423F29919165D21
2,966,410 UART: [art] SIG.S = 3CDFDD687D22BF6F2AF500FDB37735828CEBB660539763089BD81DD6E0E0C880A8FBE09A330926F8F03D5F78A3BDF5B4
2,990,363 UART: Caliptra RT
2,990,709 UART: [state] CFI Enabled
3,098,949 UART: [rt] RT listening for mailbox commands...
3,099,619 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,242 UART: [rt]cmd =0x414c544e, len=20
3,130,462 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,562,317 UART: [state] Locking PCR0, PCR1 and PCR31
23,564,067 UART: [state] Locking ICCM
23,565,460 UART: [exit] Launching FMC @ 0x40000130
23,573,851 UART:
23,574,090 UART: Running Caliptra FMC ...
23,575,187 UART:
23,575,360 UART: [state] CFI Enabled
23,636,879 UART: [fht] FMC Alias Private Key: 7
25,975,369 UART: [art] Extend RT PCRs Done
25,976,595 UART: [art] Lock RT PCRs Done
25,978,326 UART: [art] Populate DV Done
25,983,682 UART: [fht] FMC Alias Private Key: 7
25,985,385 UART: [art] Derive CDI
25,986,198 UART: [art] Store in in slot 0x4
26,045,813 UART: [art] Derive Key Pair
26,046,857 UART: [art] Store priv key in slot 0x5
29,340,123 UART: [art] Derive Key Pair - Done
29,353,084 UART: [art] Signing Cert with AUTHO
29,354,384 UART: RITY.KEYID = 7
31,642,119 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,630 UART: [art] PUB.X = E9DAF39073BD1F7B09041A9AB419A5F710D06FA0D9899EA7A1B2F2ADC209F3BAB76001D4298521FCBEE4B469ABE7290E
31,650,869 UART: [art] PUB.Y = F7EA3D65684E83F2B67D0A365F7E3855E6F3E69DCD2847FF3D90A286D4A27D78A7FA91483089A142A190A09E9BB403FB
31,658,108 UART: [art] SIG.R = A091ABA2F68629A6D71261D70660F4141F5C8961A01DB53FC61AAE094FC409830ABF65B8C3A69B1F5C6534342AC10F04
31,665,499 UART: [art] SIG.S = 56A12B9F790128942EFD3EE236D54EFC0F39F959CFD0B63BA5DD80804A47C121412B302ED626F34820F577E38B40BB5D
32,970,479 UART: Caliptra RT
32,971,189 UART: [state] CFI Enabled
33,142,348 UART: [rt] RT listening for mailbox commands...
33,174,032 UART: [rt]cmd =0x44504543, len=92
38,937,233 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,101 writing to cptra_bootfsm_go
190,208 UART:
190,504 UART: Running Caliptra ROM ...
191,553 UART:
191,699 UART: [state] CFI Enabled
245,500 UART: [state] LifecycleState = Unprovisioned
247,526 UART: [state] DebugLocked = No
249,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
254,028 UART: [kat] SHA2-256
423,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
434,223 UART: [kat] ++
434,658 UART: [kat] sha1
445,385 UART: [kat] SHA2-256
448,105 UART: [kat] SHA2-384
453,880 UART: [kat] SHA2-512-ACC
456,249 UART: [kat] ECC-384
2,751,732 UART: [kat] HMAC-384Kdf
2,782,138 UART: [kat] LMS
3,972,431 UART: [kat] --
3,977,649 UART: [cold-reset] ++
3,979,011 UART: [fht] Storing FHT @ 0x50003400
3,991,140 UART: [idev] ++
3,991,697 UART: [idev] CDI.KEYID = 6
3,992,724 UART: [idev] SUBJECT.KEYID = 7
3,993,914 UART: [idev] UDS.KEYID = 0
3,994,833 ready_for_fw is high
3,995,015 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,138,349 UART: [idev] Erasing UDS.KEYID = 0
7,329,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,294 UART: [idev] --
7,355,986 UART: [ldev] ++
7,356,549 UART: [ldev] CDI.KEYID = 6
7,357,480 UART: [ldev] SUBJECT.KEYID = 5
7,358,740 UART: [ldev] AUTHORITY.KEYID = 7
7,360,019 UART: [ldev] FE.KEYID = 1
7,403,319 UART: [ldev] Erasing FE.KEYID = 1
10,740,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,437 UART: [ldev] --
13,117,451 UART: [fwproc] Waiting for Commands...
13,120,729 UART: [fwproc] Received command 0x46574c44
13,122,910 UART: [fwproc] Received Image of size 114036 bytes
17,179,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,640,652 >>> mbox cmd response: success
17,641,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,645,084 UART: [afmc] ++
17,645,660 UART: [afmc] CDI.KEYID = 6
17,646,535 UART: [afmc] SUBJECT.KEYID = 7
17,647,797 UART: [afmc] AUTHORITY.KEYID = 5
21,011,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,766 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,189 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,019 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,461 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,365 UART: [afmc] --
23,378,479 UART: [cold-reset] --
23,382,347 UART: [state] Locking Datavault
23,387,912 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,658 UART: [state] Locking ICCM
23,391,881 UART: [exit] Launching FMC @ 0x40000130
23,400,291 UART:
23,400,534 UART: Running Caliptra FMC ...
23,401,555 UART:
23,401,698 UART: [state] CFI Enabled
23,467,212 UART: [fht] FMC Alias Private Key: 7
25,805,646 UART: [art] Extend RT PCRs Done
25,806,880 UART: [art] Lock RT PCRs Done
25,808,470 UART: [art] Populate DV Done
25,813,776 UART: [fht] FMC Alias Private Key: 7
25,815,318 UART: [art] Derive CDI
25,816,050 UART: [art] Store in in slot 0x4
25,875,648 UART: [art] Derive Key Pair
25,876,684 UART: [art] Store priv key in slot 0x5
29,168,528 UART: [art] Derive Key Pair - Done
29,181,808 UART: [art] Signing Cert with AUTHO
29,183,112 UART: RITY.KEYID = 7
31,465,918 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,426 UART: [art] PUB.X = E9DAF39073BD1F7B09041A9AB419A5F710D06FA0D9899EA7A1B2F2ADC209F3BAB76001D4298521FCBEE4B469ABE7290E
31,474,664 UART: [art] PUB.Y = F7EA3D65684E83F2B67D0A365F7E3855E6F3E69DCD2847FF3D90A286D4A27D78A7FA91483089A142A190A09E9BB403FB
31,481,935 UART: [art] SIG.R = A091ABA2F68629A6D71261D70660F4141F5C8961A01DB53FC61AAE094FC409830ABF65B8C3A69B1F5C6534342AC10F04
31,489,320 UART: [art] SIG.S = 56A12B9F790128942EFD3EE236D54EFC0F39F959CFD0B63BA5DD80804A47C121412B302ED626F34820F577E38B40BB5D
32,793,979 UART: Caliptra RT
32,794,702 UART: [state] CFI Enabled
32,954,877 UART: [rt] RT listening for mailbox commands...
32,986,836 UART: [rt]cmd =0x4d454153, len=108
33,006,139 >>> mbox cmd response data (12 bytes)
33,006,752 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,037,300 UART: [rt]cmd =0x44504543, len=92
38,805,490 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,102 writing to cptra_bootfsm_go
190,231 UART:
190,528 UART: Running Caliptra ROM ...
191,632 UART:
191,779 UART: [state] CFI Enabled
268,643 UART: [state] LifecycleState = Unprovisioned
270,574 UART: [state] DebugLocked = No
271,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,579 UART: [kat] SHA2-256
446,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,812 UART: [kat] ++
457,257 UART: [kat] sha1
467,702 UART: [kat] SHA2-256
470,356 UART: [kat] SHA2-384
476,064 UART: [kat] SHA2-512-ACC
478,437 UART: [kat] ECC-384
2,773,089 UART: [kat] HMAC-384Kdf
2,802,650 UART: [kat] LMS
3,992,939 UART: [kat] --
3,998,984 UART: [cold-reset] ++
4,000,908 UART: [fht] Storing FHT @ 0x50003400
4,012,107 UART: [idev] ++
4,012,674 UART: [idev] CDI.KEYID = 6
4,013,704 UART: [idev] SUBJECT.KEYID = 7
4,014,896 UART: [idev] UDS.KEYID = 0
4,015,818 ready_for_fw is high
4,016,002 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,436 UART: [idev] Erasing UDS.KEYID = 0
7,351,700 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,998 UART: [idev] --
7,375,726 UART: [ldev] ++
7,376,285 UART: [ldev] CDI.KEYID = 6
7,377,239 UART: [ldev] SUBJECT.KEYID = 5
7,378,447 UART: [ldev] AUTHORITY.KEYID = 7
7,379,730 UART: [ldev] FE.KEYID = 1
7,425,133 UART: [ldev] Erasing FE.KEYID = 1
10,759,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,098 UART: [ldev] --
13,138,225 UART: [fwproc] Waiting for Commands...
13,141,613 UART: [fwproc] Received command 0x46574c44
13,143,789 UART: [fwproc] Received Image of size 114036 bytes
17,197,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,896 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,656,366 >>> mbox cmd response: success
17,656,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,659,778 UART: [afmc] ++
17,660,346 UART: [afmc] CDI.KEYID = 6
17,661,274 UART: [afmc] SUBJECT.KEYID = 7
17,662,531 UART: [afmc] AUTHORITY.KEYID = 5
21,037,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,333,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,335,378 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,349,746 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,364,576 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,379,011 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,400,537 UART: [afmc] --
23,404,819 UART: [cold-reset] --
23,407,870 UART: [state] Locking Datavault
23,412,039 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,782 UART: [state] Locking ICCM
23,415,821 UART: [exit] Launching FMC @ 0x40000130
23,424,208 UART:
23,424,434 UART: Running Caliptra FMC ...
23,425,523 UART:
23,425,676 UART: [state] CFI Enabled
23,493,719 UART: [fht] FMC Alias Private Key: 7
25,831,615 UART: [art] Extend RT PCRs Done
25,832,896 UART: [art] Lock RT PCRs Done
25,834,490 UART: [art] Populate DV Done
25,839,904 UART: [fht] FMC Alias Private Key: 7
25,841,554 UART: [art] Derive CDI
25,842,368 UART: [art] Store in in slot 0x4
25,902,039 UART: [art] Derive Key Pair
25,903,076 UART: [art] Store priv key in slot 0x5
29,196,484 UART: [art] Derive Key Pair - Done
29,209,208 UART: [art] Signing Cert with AUTHO
29,210,507 UART: RITY.KEYID = 7
31,498,557 UART: [art] Erasing AUTHORITY.KEYID = 7
31,500,073 UART: [art] PUB.X = E9DAF39073BD1F7B09041A9AB419A5F710D06FA0D9899EA7A1B2F2ADC209F3BAB76001D4298521FCBEE4B469ABE7290E
31,507,393 UART: [art] PUB.Y = F7EA3D65684E83F2B67D0A365F7E3855E6F3E69DCD2847FF3D90A286D4A27D78A7FA91483089A142A190A09E9BB403FB
31,514,619 UART: [art] SIG.R = A091ABA2F68629A6D71261D70660F4141F5C8961A01DB53FC61AAE094FC409830ABF65B8C3A69B1F5C6534342AC10F04
31,521,953 UART: [art] SIG.S = 56A12B9F790128942EFD3EE236D54EFC0F39F959CFD0B63BA5DD80804A47C121412B302ED626F34820F577E38B40BB5D
32,827,647 UART: Caliptra RT
32,828,379 UART: [state] CFI Enabled
32,988,865 UART: [rt] RT listening for mailbox commands...
33,020,752 UART: [rt]cmd =0x44504543, len=96
33,059,500 >>> mbox cmd response data (56 bytes)
33,060,295 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,090,892 UART: [rt]cmd =0x44504543, len=92
38,859,716 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,852,650 >>> mbox cmd response data (12 bytes)
12,854,201 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,018,883 >>> mbox cmd response: success
18,019,385 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,714,564 UART:
23,714,945 UART: Running Caliptra FMC ...
23,716,211 UART:
23,716,377 UART: [state] CFI Enabled
23,784,694 UART: [fht] FMC Alias Private Key: 7
26,122,690 UART: [art] Extend RT PCRs Done
26,123,910 UART: [art] Lock RT PCRs Done
26,125,588 UART: [art] Populate DV Done
26,131,323 UART: [fht] FMC Alias Private Key: 7
26,132,865 UART: [art] Derive CDI
26,133,621 UART: [art] Store in in slot 0x4
26,193,063 UART: [art] Derive Key Pair
26,194,105 UART: [art] Store priv key in slot 0x5
29,487,188 UART: [art] Derive Key Pair - Done
29,500,082 UART: [art] Signing Cert with AUTHO
29,501,418 UART: RITY.KEYID = 7
31,788,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,790,025 UART: [art] PUB.X = B1BBF35A9F0339796C9C23DB675650E39200104A45EB3A430AE8434D7E8612AE4A2F1F827B7938FD0661D5992799DE90
31,797,281 UART: [art] PUB.Y = B640B19F60100F5357072906805C499B6CA4861A0E73E600B7717C8B011F1B168AE7F7C61FB3C03D1C0F5A970A816C74
31,804,447 UART: [art] SIG.R = B0328A8EC3BC4DFF852461D5407007125284A1ABF03390A3533BB527F55C6576ED61D3B80D3BFD702CFD59181CC939FE
31,811,834 UART: [art] SIG.S = 32A44911CAD11D73E677C1813C61BC0DE2CB47C83548804F792034986DFF6C9B6D062A6EA2DF2D03F1F9A4E09C1D2667
33,117,355 UART: Caliptra RT
33,118,057 UART: [state] CFI Enabled
33,288,765 UART: [rt] RT listening for mailbox commands...
33,320,502 UART: [rt]cmd =0x44504543, len=92
39,084,781 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,120 writing to cptra_bootfsm_go
3,766,068 ready_for_fw is high
3,766,425 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,855,178 >>> mbox cmd response: success
17,855,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,548,895 UART:
23,549,224 UART: Running Caliptra FMC ...
23,550,283 UART:
23,550,425 UART: [state] CFI Enabled
23,618,874 UART: [fht] FMC Alias Private Key: 7
25,957,553 UART: [art] Extend RT PCRs Done
25,958,815 UART: [art] Lock RT PCRs Done
25,960,405 UART: [art] Populate DV Done
25,965,546 UART: [fht] FMC Alias Private Key: 7
25,967,075 UART: [art] Derive CDI
25,967,884 UART: [art] Store in in slot 0x4
26,027,599 UART: [art] Derive Key Pair
26,028,639 UART: [art] Store priv key in slot 0x5
29,321,385 UART: [art] Derive Key Pair - Done
29,334,394 UART: [art] Signing Cert with AUTHO
29,335,697 UART: RITY.KEYID = 7
31,622,264 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,765 UART: [art] PUB.X = B1BBF35A9F0339796C9C23DB675650E39200104A45EB3A430AE8434D7E8612AE4A2F1F827B7938FD0661D5992799DE90
31,631,011 UART: [art] PUB.Y = B640B19F60100F5357072906805C499B6CA4861A0E73E600B7717C8B011F1B168AE7F7C61FB3C03D1C0F5A970A816C74
31,638,178 UART: [art] SIG.R = B0328A8EC3BC4DFF852461D5407007125284A1ABF03390A3533BB527F55C6576ED61D3B80D3BFD702CFD59181CC939FE
31,645,559 UART: [art] SIG.S = 32A44911CAD11D73E677C1813C61BC0DE2CB47C83548804F792034986DFF6C9B6D062A6EA2DF2D03F1F9A4E09C1D2667
32,950,565 UART: Caliptra RT
32,951,280 UART: [state] CFI Enabled
33,112,741 UART: [rt] RT listening for mailbox commands...
33,144,640 UART: [rt]cmd =0x4d454153, len=108
33,162,697 >>> mbox cmd response data (12 bytes)
33,163,217 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,193,659 UART: [rt]cmd =0x44504543, len=92
38,962,071 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,067 writing to cptra_bootfsm_go
3,767,977 ready_for_fw is high
3,768,338 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,837,811 >>> mbox cmd response: success
17,838,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,532,997 UART:
23,533,318 UART: Running Caliptra FMC ...
23,534,358 UART:
23,534,500 UART: [state] CFI Enabled
23,601,381 UART: [fht] FMC Alias Private Key: 7
25,939,144 UART: [art] Extend RT PCRs Done
25,940,359 UART: [art] Lock RT PCRs Done
25,941,802 UART: [art] Populate DV Done
25,947,480 UART: [fht] FMC Alias Private Key: 7
25,949,173 UART: [art] Derive CDI
25,949,979 UART: [art] Store in in slot 0x4
26,011,295 UART: [art] Derive Key Pair
26,012,349 UART: [art] Store priv key in slot 0x5
29,304,653 UART: [art] Derive Key Pair - Done
29,317,432 UART: [art] Signing Cert with AUTHO
29,318,784 UART: RITY.KEYID = 7
31,606,482 UART: [art] Erasing AUTHORITY.KEYID = 7
31,607,986 UART: [art] PUB.X = B1BBF35A9F0339796C9C23DB675650E39200104A45EB3A430AE8434D7E8612AE4A2F1F827B7938FD0661D5992799DE90
31,615,218 UART: [art] PUB.Y = B640B19F60100F5357072906805C499B6CA4861A0E73E600B7717C8B011F1B168AE7F7C61FB3C03D1C0F5A970A816C74
31,622,394 UART: [art] SIG.R = B0328A8EC3BC4DFF852461D5407007125284A1ABF03390A3533BB527F55C6576ED61D3B80D3BFD702CFD59181CC939FE
31,629,821 UART: [art] SIG.S = 32A44911CAD11D73E677C1813C61BC0DE2CB47C83548804F792034986DFF6C9B6D062A6EA2DF2D03F1F9A4E09C1D2667
32,934,485 UART: Caliptra RT
32,935,191 UART: [state] CFI Enabled
33,095,901 UART: [rt] RT listening for mailbox commands...
33,127,633 UART: [rt]cmd =0x44504543, len=96
33,167,466 >>> mbox cmd response data (56 bytes)
33,168,312 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,199,006 UART: [rt]cmd =0x44504543, len=92
38,967,959 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.97s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,690,139 UART: [state] Locking PCR0, PCR1 and PCR31
23,691,835 UART: [state] Locking ICCM
23,693,124 UART: [exit] Launching FMC @ 0x40000130
23,701,518 UART:
23,701,775 UART: Running Caliptra FMC ...
23,702,885 UART:
23,703,046 UART: [state] CFI Enabled
23,710,884 UART: [fht] FMC Alias Private Key: 7
26,042,016 UART: [art] Extend RT PCRs Done
26,043,231 UART: [art] Lock RT PCRs Done
26,045,182 UART: [art] Populate DV Done
26,050,484 UART: [fht] FMC Alias Private Key: 7
26,052,031 UART: [art] Derive CDI
26,052,851 UART: [art] Store in in slot 0x4
26,095,395 UART: [art] Derive Key Pair
26,096,391 UART: [art] Store priv key in slot 0x5
29,338,730 UART: [art] Derive Key Pair - Done
29,351,884 UART: [art] Signing Cert with AUTHO
29,353,181 UART: RITY.KEYID = 7
31,632,483 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,009 UART: [art] PUB.X = A6A2AD79F33F30BDFF44287C09AC143197BFC9C2FD45314D8B91C4B69CABADA4CC1D64E0E7C717AA9718F97D8A2D37F4
31,641,274 UART: [art] PUB.Y = BA16DEC1595126E2CD1974B3EDC9C6D1A1E969AAC95F358278AEBE8F71516F31031D8F448DEB7689246AE595EBE6AA58
31,648,521 UART: [art] SIG.R = 11370441618011697AA74EBBBC8944F95C32F951F504FB349EFFE57F9560F05D409366B4853A620C4DE963CDC5A936A1
31,655,856 UART: [art] SIG.S = 489DFAB35342240A1F48C8AB4969C4DC04D54DB5EB1A6CAAE3CEE6F25170FA78625576EECD6BBD531AF61F8C586E50E8
32,961,276 UART: Caliptra RT
32,961,990 UART: [state] CFI Enabled
33,091,758 UART: [rt] RT listening for mailbox commands...
33,123,395 UART: [rt]cmd =0x44504543, len=92
38,810,780 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,139 writing to cptra_bootfsm_go
190,276 UART:
190,573 UART: Running Caliptra ROM ...
191,602 UART:
1,689,844 UART: [state] CFI Enabled
1,701,645 UART: [state] LifecycleState = Unprovisioned
1,703,580 UART: [state] DebugLocked = No
1,705,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,709,871 UART: [kat] SHA2-256
1,879,601 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,890,159 UART: [kat] ++
1,890,616 UART: [kat] sha1
1,901,781 UART: [kat] SHA2-256
1,904,439 UART: [kat] SHA2-384
1,911,008 UART: [kat] SHA2-512-ACC
1,913,396 UART: [kat] ECC-384
4,198,047 UART: [kat] HMAC-384Kdf
4,209,853 UART: [kat] LMS
5,399,929 UART: [kat] --
5,404,205 UART: [cold-reset] ++
5,405,708 UART: [fht] Storing FHT @ 0x50003400
5,416,405 UART: [idev] ++
5,416,993 UART: [idev] CDI.KEYID = 6
5,418,030 UART: [idev] SUBJECT.KEYID = 7
5,419,210 UART: [idev] UDS.KEYID = 0
5,420,136 ready_for_fw is high
5,420,330 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,563,803 UART: [idev] Erasing UDS.KEYID = 0
8,707,162 UART: [idev] Using Sha1 for KeyId Algorithm
8,729,721 UART: [idev] --
8,734,230 UART: [ldev] ++
8,734,810 UART: [ldev] CDI.KEYID = 6
8,735,775 UART: [ldev] SUBJECT.KEYID = 5
8,736,989 UART: [ldev] AUTHORITY.KEYID = 7
8,738,280 UART: [ldev] FE.KEYID = 1
8,748,710 UART: [ldev] Erasing FE.KEYID = 1
12,037,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,332,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,347,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,361,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,376,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,395,487 UART: [ldev] --
14,399,721 UART: [fwproc] Waiting for Commands...
14,402,726 UART: [fwproc] Received command 0x46574c44
14,404,918 UART: [fwproc] Received Image of size 114036 bytes
18,458,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,535,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,603,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
18,921,407 >>> mbox cmd response: success
18,921,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,925,646 UART: [afmc] ++
18,926,225 UART: [afmc] CDI.KEYID = 6
18,927,193 UART: [afmc] SUBJECT.KEYID = 7
18,928,405 UART: [afmc] AUTHORITY.KEYID = 5
22,242,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,537,486 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,539,740 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,554,154 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,568,971 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,583,432 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,604,794 UART: [afmc] --
24,608,656 UART: [cold-reset] --
24,612,623 UART: [state] Locking Datavault
24,617,274 UART: [state] Locking PCR0, PCR1 and PCR31
24,619,024 UART: [state] Locking ICCM
24,621,579 UART: [exit] Launching FMC @ 0x40000130
24,629,973 UART:
24,630,208 UART: Running Caliptra FMC ...
24,631,310 UART:
24,631,469 UART: [state] CFI Enabled
24,639,489 UART: [fht] FMC Alias Private Key: 7
26,969,985 UART: [art] Extend RT PCRs Done
26,971,210 UART: [art] Lock RT PCRs Done
26,972,829 UART: [art] Populate DV Done
26,977,970 UART: [fht] FMC Alias Private Key: 7
26,979,453 UART: [art] Derive CDI
26,980,213 UART: [art] Store in in slot 0x4
27,022,964 UART: [art] Derive Key Pair
27,023,965 UART: [art] Store priv key in slot 0x5
30,265,677 UART: [art] Derive Key Pair - Done
30,278,726 UART: [art] Signing Cert with AUTHO
30,280,031 UART: RITY.KEYID = 7
32,559,324 UART: [art] Erasing AUTHORITY.KEYID = 7
32,560,831 UART: [art] PUB.X = A6A2AD79F33F30BDFF44287C09AC143197BFC9C2FD45314D8B91C4B69CABADA4CC1D64E0E7C717AA9718F97D8A2D37F4
32,568,138 UART: [art] PUB.Y = BA16DEC1595126E2CD1974B3EDC9C6D1A1E969AAC95F358278AEBE8F71516F31031D8F448DEB7689246AE595EBE6AA58
32,575,371 UART: [art] SIG.R = 11370441618011697AA74EBBBC8944F95C32F951F504FB349EFFE57F9560F05D409366B4853A620C4DE963CDC5A936A1
32,582,729 UART: [art] SIG.S = 489DFAB35342240A1F48C8AB4969C4DC04D54DB5EB1A6CAAE3CEE6F25170FA78625576EECD6BBD531AF61F8C586E50E8
33,888,474 UART: Caliptra RT
33,889,171 UART: [state] CFI Enabled
34,004,945 UART: [rt] RT listening for mailbox commands...
34,036,949 UART: [rt]cmd =0x4d454153, len=108
34,055,555 >>> mbox cmd response data (12 bytes)
34,056,108 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,086,424 UART: [rt]cmd =0x44504543, len=92
39,775,055 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,056 writing to cptra_bootfsm_go
190,185 UART:
190,487 UART: Running Caliptra ROM ...
191,599 UART:
1,998,963 UART: [state] CFI Enabled
2,011,044 UART: [state] LifecycleState = Unprovisioned
2,012,979 UART: [state] DebugLocked = No
2,014,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,020,142 UART: [kat] SHA2-256
2,189,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,200,416 UART: [kat] ++
2,200,902 UART: [kat] sha1
2,211,788 UART: [kat] SHA2-256
2,214,461 UART: [kat] SHA2-384
2,221,600 UART: [kat] SHA2-512-ACC
2,223,979 UART: [kat] ECC-384
4,507,241 UART: [kat] HMAC-384Kdf
4,519,620 UART: [kat] LMS
5,709,701 UART: [kat] --
5,713,140 UART: [cold-reset] ++
5,714,220 UART: [fht] Storing FHT @ 0x50003400
5,725,557 UART: [idev] ++
5,726,230 UART: [idev] CDI.KEYID = 6
5,727,142 UART: [idev] SUBJECT.KEYID = 7
5,728,323 UART: [idev] UDS.KEYID = 0
5,729,374 ready_for_fw is high
5,729,570 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,872,574 UART: [idev] Erasing UDS.KEYID = 0
9,013,591 UART: [idev] Using Sha1 for KeyId Algorithm
9,036,375 UART: [idev] --
9,040,153 UART: [ldev] ++
9,040,735 UART: [ldev] CDI.KEYID = 6
9,041,702 UART: [ldev] SUBJECT.KEYID = 5
9,042,838 UART: [ldev] AUTHORITY.KEYID = 7
9,044,096 UART: [ldev] FE.KEYID = 1
9,053,392 UART: [ldev] Erasing FE.KEYID = 1
12,343,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,638,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,653,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,667,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,682,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,702,493 UART: [ldev] --
14,706,896 UART: [fwproc] Waiting for Commands...
14,708,939 UART: [fwproc] Received command 0x46574c44
14,711,123 UART: [fwproc] Received Image of size 114036 bytes
18,765,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,841,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,910,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,227,007 >>> mbox cmd response: success
19,227,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,231,711 UART: [afmc] ++
19,232,354 UART: [afmc] CDI.KEYID = 6
19,233,262 UART: [afmc] SUBJECT.KEYID = 7
19,234,680 UART: [afmc] AUTHORITY.KEYID = 5
22,543,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,836,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,839,263 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,853,616 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,868,433 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,882,864 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,903,446 UART: [afmc] --
24,907,736 UART: [cold-reset] --
24,911,483 UART: [state] Locking Datavault
24,917,329 UART: [state] Locking PCR0, PCR1 and PCR31
24,919,123 UART: [state] Locking ICCM
24,920,817 UART: [exit] Launching FMC @ 0x40000130
24,929,211 UART:
24,929,449 UART: Running Caliptra FMC ...
24,930,547 UART:
24,930,699 UART: [state] CFI Enabled
24,938,599 UART: [fht] FMC Alias Private Key: 7
27,269,125 UART: [art] Extend RT PCRs Done
27,270,345 UART: [art] Lock RT PCRs Done
27,271,823 UART: [art] Populate DV Done
27,277,285 UART: [fht] FMC Alias Private Key: 7
27,278,979 UART: [art] Derive CDI
27,279,711 UART: [art] Store in in slot 0x4
27,322,304 UART: [art] Derive Key Pair
27,323,345 UART: [art] Store priv key in slot 0x5
30,565,796 UART: [art] Derive Key Pair - Done
30,578,896 UART: [art] Signing Cert with AUTHO
30,580,205 UART: RITY.KEYID = 7
32,859,421 UART: [art] Erasing AUTHORITY.KEYID = 7
32,860,921 UART: [art] PUB.X = A6A2AD79F33F30BDFF44287C09AC143197BFC9C2FD45314D8B91C4B69CABADA4CC1D64E0E7C717AA9718F97D8A2D37F4
32,868,209 UART: [art] PUB.Y = BA16DEC1595126E2CD1974B3EDC9C6D1A1E969AAC95F358278AEBE8F71516F31031D8F448DEB7689246AE595EBE6AA58
32,875,428 UART: [art] SIG.R = 11370441618011697AA74EBBBC8944F95C32F951F504FB349EFFE57F9560F05D409366B4853A620C4DE963CDC5A936A1
32,882,823 UART: [art] SIG.S = 489DFAB35342240A1F48C8AB4969C4DC04D54DB5EB1A6CAAE3CEE6F25170FA78625576EECD6BBD531AF61F8C586E50E8
34,188,236 UART: Caliptra RT
34,188,966 UART: [state] CFI Enabled
34,306,402 UART: [rt] RT listening for mailbox commands...
34,338,154 UART: [rt]cmd =0x44504543, len=96
34,377,687 >>> mbox cmd response data (56 bytes)
34,378,563 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,409,048 UART: [rt]cmd =0x44504543, len=92
40,096,453 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 6.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
5,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,058,115 >>> mbox cmd response data (12 bytes)
13,059,817 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,241,474 >>> mbox cmd response: success
18,241,946 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,881,908 UART:
23,882,291 UART: Running Caliptra FMC ...
23,883,539 UART:
23,883,698 UART: [state] CFI Enabled
23,891,396 UART: [fht] FMC Alias Private Key: 7
26,222,232 UART: [art] Extend RT PCRs Done
26,223,455 UART: [art] Lock RT PCRs Done
26,224,864 UART: [art] Populate DV Done
26,230,475 UART: [fht] FMC Alias Private Key: 7
26,232,122 UART: [art] Derive CDI
26,232,938 UART: [art] Store in in slot 0x4
26,275,919 UART: [art] Derive Key Pair
26,276,961 UART: [art] Store priv key in slot 0x5
29,518,671 UART: [art] Derive Key Pair - Done
29,531,128 UART: [art] Signing Cert with AUTHO
29,532,463 UART: RITY.KEYID = 7
31,811,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,813,126 UART: [art] PUB.X = C37F7B990C5307EE707F636E1869AEC0FC00E1B67096688DDB0DD2D7E4C93AA5754FA02ECFF6F3AEEBF4B316AEB00B3B
31,820,400 UART: [art] PUB.Y = F5E5C2FCA1844CD66A174B21533CE5039F4A6396745BB4E6353A1E8B1E8F5BB4CE4BC2F5DE86BDE723C392F1AC74B3A9
31,827,641 UART: [art] SIG.R = 3B53B0287E79018AD6C94674266852522310F971C53733E5E3A942E5C88BE63546CE35B362238DD74C869DEA1CEE5232
31,835,010 UART: [art] SIG.S = D6DCF157DDE92BC380174F17062671A2F1BE8A7AD15A26F23B00A8ACD7E1D3A4B4171822A4138B610B0EDEEE0676E209
33,139,720 UART: Caliptra RT
33,140,421 UART: [state] CFI Enabled
33,269,271 UART: [rt] RT listening for mailbox commands...
33,301,067 UART: [rt]cmd =0x44504543, len=92
38,989,843 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,130 writing to cptra_bootfsm_go
5,024,739 ready_for_fw is high
5,025,111 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,953,405 >>> mbox cmd response: success
18,953,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,591,189 UART:
24,591,521 UART: Running Caliptra FMC ...
24,592,591 UART:
24,592,745 UART: [state] CFI Enabled
24,600,854 UART: [fht] FMC Alias Private Key: 7
26,931,206 UART: [art] Extend RT PCRs Done
26,932,418 UART: [art] Lock RT PCRs Done
26,934,201 UART: [art] Populate DV Done
26,939,488 UART: [fht] FMC Alias Private Key: 7
26,941,195 UART: [art] Derive CDI
26,942,011 UART: [art] Store in in slot 0x4
26,984,674 UART: [art] Derive Key Pair
26,985,711 UART: [art] Store priv key in slot 0x5
30,227,072 UART: [art] Derive Key Pair - Done
30,240,234 UART: [art] Signing Cert with AUTHO
30,241,534 UART: RITY.KEYID = 7
32,520,610 UART: [art] Erasing AUTHORITY.KEYID = 7
32,522,116 UART: [art] PUB.X = C37F7B990C5307EE707F636E1869AEC0FC00E1B67096688DDB0DD2D7E4C93AA5754FA02ECFF6F3AEEBF4B316AEB00B3B
32,529,380 UART: [art] PUB.Y = F5E5C2FCA1844CD66A174B21533CE5039F4A6396745BB4E6353A1E8B1E8F5BB4CE4BC2F5DE86BDE723C392F1AC74B3A9
32,536,659 UART: [art] SIG.R = 3B53B0287E79018AD6C94674266852522310F971C53733E5E3A942E5C88BE63546CE35B362238DD74C869DEA1CEE5232
32,544,025 UART: [art] SIG.S = D6DCF157DDE92BC380174F17062671A2F1BE8A7AD15A26F23B00A8ACD7E1D3A4B4171822A4138B610B0EDEEE0676E209
33,849,302 UART: Caliptra RT
33,850,015 UART: [state] CFI Enabled
33,967,590 UART: [rt] RT listening for mailbox commands...
33,999,405 UART: [rt]cmd =0x4d454153, len=108
34,017,520 >>> mbox cmd response data (12 bytes)
34,017,995 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,048,421 UART: [rt]cmd =0x44504543, len=92
39,737,008 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,063 writing to cptra_bootfsm_go
5,379,488 ready_for_fw is high
5,379,907 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,313,292 >>> mbox cmd response: success
19,313,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,956,277 UART:
24,956,621 UART: Running Caliptra FMC ...
24,957,666 UART:
24,957,821 UART: [state] CFI Enabled
24,966,004 UART: [fht] FMC Alias Private Key: 7
27,296,928 UART: [art] Extend RT PCRs Done
27,298,328 UART: [art] Lock RT PCRs Done
27,299,767 UART: [art] Populate DV Done
27,305,304 UART: [fht] FMC Alias Private Key: 7
27,306,894 UART: [art] Derive CDI
27,307,708 UART: [art] Store in in slot 0x4
27,350,619 UART: [art] Derive Key Pair
27,351,621 UART: [art] Store priv key in slot 0x5
30,594,129 UART: [art] Derive Key Pair - Done
30,607,123 UART: [art] Signing Cert with AUTHO
30,608,435 UART: RITY.KEYID = 7
32,888,061 UART: [art] Erasing AUTHORITY.KEYID = 7
32,889,569 UART: [art] PUB.X = C37F7B990C5307EE707F636E1869AEC0FC00E1B67096688DDB0DD2D7E4C93AA5754FA02ECFF6F3AEEBF4B316AEB00B3B
32,896,847 UART: [art] PUB.Y = F5E5C2FCA1844CD66A174B21533CE5039F4A6396745BB4E6353A1E8B1E8F5BB4CE4BC2F5DE86BDE723C392F1AC74B3A9
32,904,111 UART: [art] SIG.R = 3B53B0287E79018AD6C94674266852522310F971C53733E5E3A942E5C88BE63546CE35B362238DD74C869DEA1CEE5232
32,911,502 UART: [art] SIG.S = D6DCF157DDE92BC380174F17062671A2F1BE8A7AD15A26F23B00A8ACD7E1D3A4B4171822A4138B610B0EDEEE0676E209
34,216,768 UART: Caliptra RT
34,217,480 UART: [state] CFI Enabled
34,335,030 UART: [rt] RT listening for mailbox commands...
34,366,825 UART: [rt]cmd =0x44504543, len=96
34,406,864 >>> mbox cmd response data (56 bytes)
34,407,763 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,438,159 UART: [rt]cmd =0x44504543, len=92
40,126,437 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 6.06s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,313 UART: [afmc] --
18,774,774 UART: [cold-reset] --
18,779,392 UART: [state] Locking Datavault
18,784,379 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,028 UART: [state] Locking ICCM
18,788,103 UART: [exit] Launching FMC @ 0x40000130
18,796,551 UART:
18,796,803 UART: Running Caliptra FMC ...
18,797,907 UART:
18,798,067 UART: [state] CFI Enabled
18,858,070 UART: [fht] FMC Alias Private Key: 7
20,622,166 UART: [art] Extend RT PCRs Done
20,623,390 UART: [art] Lock RT PCRs Done
20,625,160 UART: [art] Populate DV Done
20,630,682 UART: [fht] FMC Alias Private Key: 7
20,632,219 UART: [art] Derive CDI
20,632,952 UART: [art] Store in in slot 0x4
20,690,840 UART: [art] Derive Key Pair
20,691,879 UART: [art] Store priv key in slot 0x5
23,154,645 UART: [art] Derive Key Pair - Done
23,168,029 UART: [art] Signing Cert with AUTHO
23,169,341 UART: RITY.KEYID = 7
24,880,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,882,521 UART: [art] PUB.X = 29C5531200E9E785016E1ECD13B4DA3BD14F66FC341515BE163D380607440BF941C552E2A649E6ED1892C920AFDB1AAD
24,889,751 UART: [art] PUB.Y = 4B434A57261255F0C08BDC2E56E4D138A3B9262CE332D80D1A4D6C5A1691E01A8A6A93D41918E1A3650E44249F068394
24,896,982 UART: [art] SIG.R = E748A02A89EB649509EC9D34AA65BC974DB29FFA2E53382EB2F3E611E3FD8A8FE248BD0C8B71A517D022FBDEE0400BC2
24,904,430 UART: [art] SIG.S = DCB81FA159A1C63D2ABA26F8227AE77C1773681BC5F18187935F71F5F1C85022361C8200F51625FE3CFCA5649097D862
25,883,078 UART: Caliptra RT
25,883,770 UART: [state] CFI Enabled
26,060,313 UART: [rt] RT listening for mailbox commands...
26,091,883 UART: [rt]cmd =0x44504543, len=92
30,447,859 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,119 writing to cptra_bootfsm_go
190,236 UART:
190,535 UART: Running Caliptra ROM ...
191,648 UART:
191,805 UART: [state] CFI Enabled
264,976 UART: [state] LifecycleState = Unprovisioned
266,881 UART: [state] DebugLocked = No
269,200 UART: [state] WD Timer not started. Device not locked for debugging
272,133 UART: [kat] SHA2-256
451,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,818 UART: [kat] ++
463,357 UART: [kat] sha1
473,743 UART: [kat] SHA2-256
476,824 UART: [kat] SHA2-384
483,738 UART: [kat] SHA2-512-ACC
486,678 UART: [kat] ECC-384
2,947,320 UART: [kat] HMAC-384Kdf
2,969,493 UART: [kat] LMS
3,498,991 UART: [kat] --
3,503,552 UART: [cold-reset] ++
3,505,060 UART: [fht] FHT @ 0x50003400
3,516,903 UART: [idev] ++
3,517,491 UART: [idev] CDI.KEYID = 6
3,518,403 UART: [idev] SUBJECT.KEYID = 7
3,519,580 UART: [idev] UDS.KEYID = 0
3,520,509 ready_for_fw is high
3,520,701 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,441 UART: [idev] Erasing UDS.KEYID = 0
6,021,663 UART: [idev] Sha1 KeyId Algorithm
6,045,272 UART: [idev] --
6,048,671 UART: [ldev] ++
6,049,243 UART: [ldev] CDI.KEYID = 6
6,050,155 UART: [ldev] SUBJECT.KEYID = 5
6,051,374 UART: [ldev] AUTHORITY.KEYID = 7
6,052,616 UART: [ldev] FE.KEYID = 1
6,097,945 UART: [ldev] Erasing FE.KEYID = 1
8,602,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,234 UART: [ldev] --
10,412,291 UART: [fwproc] Wait for Commands...
10,414,912 UART: [fwproc] Recv command 0x46574c44
10,417,017 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,292,155 >>> mbox cmd response: success
14,292,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,296,224 UART: [afmc] ++
14,296,801 UART: [afmc] CDI.KEYID = 6
14,297,712 UART: [afmc] SUBJECT.KEYID = 7
14,298,927 UART: [afmc] AUTHORITY.KEYID = 5
16,824,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,574 UART: [afmc] --
18,621,517 UART: [cold-reset] --
18,624,297 UART: [state] Locking Datavault
18,627,705 UART: [state] Locking PCR0, PCR1 and PCR31
18,629,350 UART: [state] Locking ICCM
18,631,363 UART: [exit] Launching FMC @ 0x40000130
18,639,759 UART:
18,639,999 UART: Running Caliptra FMC ...
18,641,105 UART:
18,641,265 UART: [state] CFI Enabled
18,706,209 UART: [fht] FMC Alias Private Key: 7
20,470,309 UART: [art] Extend RT PCRs Done
20,471,527 UART: [art] Lock RT PCRs Done
20,473,072 UART: [art] Populate DV Done
20,478,698 UART: [fht] FMC Alias Private Key: 7
20,480,127 UART: [art] Derive CDI
20,480,867 UART: [art] Store in in slot 0x4
20,538,901 UART: [art] Derive Key Pair
20,539,943 UART: [art] Store priv key in slot 0x5
23,002,843 UART: [art] Derive Key Pair - Done
23,015,571 UART: [art] Signing Cert with AUTHO
23,016,877 UART: RITY.KEYID = 7
24,728,217 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,730 UART: [art] PUB.X = 29C5531200E9E785016E1ECD13B4DA3BD14F66FC341515BE163D380607440BF941C552E2A649E6ED1892C920AFDB1AAD
24,736,986 UART: [art] PUB.Y = 4B434A57261255F0C08BDC2E56E4D138A3B9262CE332D80D1A4D6C5A1691E01A8A6A93D41918E1A3650E44249F068394
24,744,218 UART: [art] SIG.R = E748A02A89EB649509EC9D34AA65BC974DB29FFA2E53382EB2F3E611E3FD8A8FE248BD0C8B71A517D022FBDEE0400BC2
24,751,684 UART: [art] SIG.S = DCB81FA159A1C63D2ABA26F8227AE77C1773681BC5F18187935F71F5F1C85022361C8200F51625FE3CFCA5649097D862
25,730,946 UART: Caliptra RT
25,731,660 UART: [state] CFI Enabled
25,895,451 UART: [rt] RT listening for mailbox commands...
25,927,355 UART: [rt]cmd =0x4d454153, len=108
25,945,633 >>> mbox cmd response data (12 bytes)
25,946,202 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,976,626 UART: [rt]cmd =0x44504543, len=92
30,338,257 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,047 writing to cptra_bootfsm_go
190,132 UART:
190,441 UART: Running Caliptra ROM ...
191,471 UART:
191,610 UART: [state] CFI Enabled
266,249 UART: [state] LifecycleState = Unprovisioned
268,135 UART: [state] DebugLocked = No
270,723 UART: [state] WD Timer not started. Device not locked for debugging
273,868 UART: [kat] SHA2-256
452,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,551 UART: [kat] ++
465,001 UART: [kat] sha1
475,739 UART: [kat] SHA2-256
478,743 UART: [kat] SHA2-384
484,806 UART: [kat] SHA2-512-ACC
487,751 UART: [kat] ECC-384
2,946,559 UART: [kat] HMAC-384Kdf
2,971,219 UART: [kat] LMS
3,500,654 UART: [kat] --
3,503,105 UART: [cold-reset] ++
3,505,464 UART: [fht] FHT @ 0x50003400
3,516,026 UART: [idev] ++
3,516,614 UART: [idev] CDI.KEYID = 6
3,517,526 UART: [idev] SUBJECT.KEYID = 7
3,518,776 UART: [idev] UDS.KEYID = 0
3,519,862 ready_for_fw is high
3,520,055 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,892 UART: [idev] Erasing UDS.KEYID = 0
6,025,380 UART: [idev] Sha1 KeyId Algorithm
6,048,759 UART: [idev] --
6,052,729 UART: [ldev] ++
6,053,308 UART: [ldev] CDI.KEYID = 6
6,054,224 UART: [ldev] SUBJECT.KEYID = 5
6,055,386 UART: [ldev] AUTHORITY.KEYID = 7
6,056,623 UART: [ldev] FE.KEYID = 1
6,099,246 UART: [ldev] Erasing FE.KEYID = 1
8,601,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,221 UART: [ldev] --
10,394,212 UART: [fwproc] Wait for Commands...
10,396,635 UART: [fwproc] Recv command 0x46574c44
10,398,733 UART: [fwproc] Recv'd Img size: 114360 bytes
13,792,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,248,596 >>> mbox cmd response: success
14,248,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,253,052 UART: [afmc] ++
14,253,635 UART: [afmc] CDI.KEYID = 6
14,254,551 UART: [afmc] SUBJECT.KEYID = 7
14,255,713 UART: [afmc] AUTHORITY.KEYID = 5
16,786,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,528,281 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,544,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,560,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,787 UART: [afmc] --
18,587,279 UART: [cold-reset] --
18,590,382 UART: [state] Locking Datavault
18,596,442 UART: [state] Locking PCR0, PCR1 and PCR31
18,598,142 UART: [state] Locking ICCM
18,600,183 UART: [exit] Launching FMC @ 0x40000130
18,608,593 UART:
18,608,882 UART: Running Caliptra FMC ...
18,610,003 UART:
18,610,170 UART: [state] CFI Enabled
18,667,057 UART: [fht] FMC Alias Private Key: 7
20,430,618 UART: [art] Extend RT PCRs Done
20,431,827 UART: [art] Lock RT PCRs Done
20,433,511 UART: [art] Populate DV Done
20,439,139 UART: [fht] FMC Alias Private Key: 7
20,440,676 UART: [art] Derive CDI
20,441,493 UART: [art] Store in in slot 0x4
20,499,970 UART: [art] Derive Key Pair
20,501,004 UART: [art] Store priv key in slot 0x5
22,963,838 UART: [art] Derive Key Pair - Done
22,976,679 UART: [art] Signing Cert with AUTHO
22,977,996 UART: RITY.KEYID = 7
24,689,240 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,748 UART: [art] PUB.X = 29C5531200E9E785016E1ECD13B4DA3BD14F66FC341515BE163D380607440BF941C552E2A649E6ED1892C920AFDB1AAD
24,697,982 UART: [art] PUB.Y = 4B434A57261255F0C08BDC2E56E4D138A3B9262CE332D80D1A4D6C5A1691E01A8A6A93D41918E1A3650E44249F068394
24,705,258 UART: [art] SIG.R = E748A02A89EB649509EC9D34AA65BC974DB29FFA2E53382EB2F3E611E3FD8A8FE248BD0C8B71A517D022FBDEE0400BC2
24,712,663 UART: [art] SIG.S = DCB81FA159A1C63D2ABA26F8227AE77C1773681BC5F18187935F71F5F1C85022361C8200F51625FE3CFCA5649097D862
25,692,062 UART: Caliptra RT
25,692,759 UART: [state] CFI Enabled
25,856,867 UART: [rt] RT listening for mailbox commands...
25,888,647 UART: [rt]cmd =0x44504543, len=96
25,928,248 >>> mbox cmd response data (56 bytes)
25,929,008 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,959,436 UART: [rt]cmd =0x44504543, len=92
30,321,187 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.68s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,097,835 UART: [afmc] --
19,101,308 UART: [cold-reset] --
19,105,253 UART: [state] Locking Datavault
19,109,701 UART: [state] Locking PCR0, PCR1 and PCR31
19,111,907 UART: [state] Locking ICCM
19,114,337 UART: [exit] Launching FMC @ 0x40000130
19,123,011 UART:
19,123,251 UART: Running Caliptra FMC ...
19,124,355 UART:
19,124,512 UART: [state] CFI Enabled
19,182,355 UART: [fht] FMC Alias Private Key: 7
20,946,088 UART: [art] Extend RT PCRs Done
20,947,310 UART: [art] Lock RT PCRs Done
20,948,885 UART: [art] Populate DV Done
20,954,406 UART: [fht] FMC Alias Private Key: 7
20,956,111 UART: [art] Derive CDI
20,956,925 UART: [art] Store in in slot 0x4
21,014,824 UART: [art] Derive Key Pair
21,015,878 UART: [art] Store priv key in slot 0x5
23,481,311 UART: [art] Derive Key Pair - Done
23,494,478 UART: [art] Signing Cert with AUTHO
23,495,820 UART: RITY.KEYID = 7
25,206,446 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,964 UART: [art] PUB.X = 2A049CB5318A0C33069AFD77BD783A082A3BD94ABED550A9F5A86399BF43CDA3398C947BA0317FEBD17F667C99722055
25,215,265 UART: [art] PUB.Y = 0CF2BEFFE58D159EBC629C9E3DA9668DCE698A5BB5D29F7E92D8B8B86B47DDAB0D4281A5E6E0DE7B21A277595496EB7E
25,222,543 UART: [art] SIG.R = 7A2CB5E831B8F9ABF98B1C816512F709495993CBBA1C7D1B197E240C0C4E556AC9CC85EEBF106989F67B67D16D40A02C
25,229,923 UART: [art] SIG.S = 211EB2C906C3353F144C26946311468C8D2834D4F289650BE00D302A74DC5AC1E907B196745B5FCA97B8FFA72CFE6C27
26,208,799 UART: Caliptra RT
26,209,603 UART: [state] CFI Enabled
26,386,445 UART: [rt] RT listening for mailbox commands...
26,418,157 UART: [rt]cmd =0x44504543, len=92
30,774,743 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,117 writing to cptra_bootfsm_go
190,207 UART:
190,496 UART: Running Caliptra ROM ...
191,610 UART:
191,767 UART: [state] CFI Enabled
265,228 UART: [state] LifecycleState = Unprovisioned
267,652 UART: [state] DebugLocked = No
269,756 UART: [state] WD Timer not started. Device not locked for debugging
274,174 UART: [kat] SHA2-256
464,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,866 UART: [kat] ++
475,397 UART: [kat] sha1
486,850 UART: [kat] SHA2-256
489,860 UART: [kat] SHA2-384
495,210 UART: [kat] SHA2-512-ACC
497,795 UART: [kat] ECC-384
2,949,910 UART: [kat] HMAC-384Kdf
2,973,389 UART: [kat] LMS
3,505,166 UART: [kat] --
3,511,642 UART: [cold-reset] ++
3,514,085 UART: [fht] FHT @ 0x50003400
3,524,645 UART: [idev] ++
3,525,285 UART: [idev] CDI.KEYID = 6
3,526,269 UART: [idev] SUBJECT.KEYID = 7
3,527,444 UART: [idev] UDS.KEYID = 0
3,528,372 ready_for_fw is high
3,528,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,306 UART: [idev] Erasing UDS.KEYID = 0
6,032,186 UART: [idev] Sha1 KeyId Algorithm
6,054,362 UART: [idev] --
6,058,559 UART: [ldev] ++
6,059,247 UART: [ldev] CDI.KEYID = 6
6,060,134 UART: [ldev] SUBJECT.KEYID = 5
6,061,367 UART: [ldev] AUTHORITY.KEYID = 7
6,062,500 UART: [ldev] FE.KEYID = 1
6,103,767 UART: [ldev] Erasing FE.KEYID = 1
8,609,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,305 UART: [ldev] --
10,417,339 UART: [fwproc] Wait for Commands...
10,420,354 UART: [fwproc] Recv command 0x46574c44
10,422,676 UART: [fwproc] Recv'd Img size: 114360 bytes
13,873,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,639 >>> mbox cmd response: success
14,606,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,610,515 UART: [afmc] ++
14,611,260 UART: [afmc] CDI.KEYID = 6
14,612,447 UART: [afmc] SUBJECT.KEYID = 7
14,613,937 UART: [afmc] AUTHORITY.KEYID = 5
17,150,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,912 UART: [afmc] --
18,950,954 UART: [cold-reset] --
18,955,525 UART: [state] Locking Datavault
18,959,643 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,785 UART: [state] Locking ICCM
18,963,718 UART: [exit] Launching FMC @ 0x40000130
18,972,401 UART:
18,972,639 UART: Running Caliptra FMC ...
18,973,664 UART:
18,973,811 UART: [state] CFI Enabled
19,033,605 UART: [fht] FMC Alias Private Key: 7
20,797,179 UART: [art] Extend RT PCRs Done
20,798,404 UART: [art] Lock RT PCRs Done
20,800,047 UART: [art] Populate DV Done
20,805,737 UART: [fht] FMC Alias Private Key: 7
20,807,385 UART: [art] Derive CDI
20,808,202 UART: [art] Store in in slot 0x4
20,866,090 UART: [art] Derive Key Pair
20,867,135 UART: [art] Store priv key in slot 0x5
23,329,827 UART: [art] Derive Key Pair - Done
23,342,987 UART: [art] Signing Cert with AUTHO
23,344,305 UART: RITY.KEYID = 7
25,055,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,638 UART: [art] PUB.X = 2A049CB5318A0C33069AFD77BD783A082A3BD94ABED550A9F5A86399BF43CDA3398C947BA0317FEBD17F667C99722055
25,063,929 UART: [art] PUB.Y = 0CF2BEFFE58D159EBC629C9E3DA9668DCE698A5BB5D29F7E92D8B8B86B47DDAB0D4281A5E6E0DE7B21A277595496EB7E
25,071,216 UART: [art] SIG.R = 7A2CB5E831B8F9ABF98B1C816512F709495993CBBA1C7D1B197E240C0C4E556AC9CC85EEBF106989F67B67D16D40A02C
25,078,605 UART: [art] SIG.S = 211EB2C906C3353F144C26946311468C8D2834D4F289650BE00D302A74DC5AC1E907B196745B5FCA97B8FFA72CFE6C27
26,057,521 UART: Caliptra RT
26,058,212 UART: [state] CFI Enabled
26,222,822 UART: [rt] RT listening for mailbox commands...
26,254,396 UART: [rt]cmd =0x4d454153, len=108
26,272,625 >>> mbox cmd response data (12 bytes)
26,273,145 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,303,411 UART: [rt]cmd =0x44504543, len=92
30,665,563 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,073 writing to cptra_bootfsm_go
190,229 UART:
190,520 UART: Running Caliptra ROM ...
191,575 UART:
191,720 UART: [state] CFI Enabled
266,663 UART: [state] LifecycleState = Unprovisioned
269,046 UART: [state] DebugLocked = No
270,453 UART: [state] WD Timer not started. Device not locked for debugging
275,644 UART: [kat] SHA2-256
465,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,269 UART: [kat] ++
476,720 UART: [kat] sha1
487,809 UART: [kat] SHA2-256
490,815 UART: [kat] SHA2-384
496,025 UART: [kat] SHA2-512-ACC
498,620 UART: [kat] ECC-384
2,946,882 UART: [kat] HMAC-384Kdf
2,972,301 UART: [kat] LMS
3,504,089 UART: [kat] --
3,509,806 UART: [cold-reset] ++
3,512,499 UART: [fht] FHT @ 0x50003400
3,524,342 UART: [idev] ++
3,524,984 UART: [idev] CDI.KEYID = 6
3,526,017 UART: [idev] SUBJECT.KEYID = 7
3,527,130 UART: [idev] UDS.KEYID = 0
3,528,061 ready_for_fw is high
3,528,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,001 UART: [idev] Erasing UDS.KEYID = 0
6,027,446 UART: [idev] Sha1 KeyId Algorithm
6,049,227 UART: [idev] --
6,055,714 UART: [ldev] ++
6,056,406 UART: [ldev] CDI.KEYID = 6
6,057,315 UART: [ldev] SUBJECT.KEYID = 5
6,058,497 UART: [ldev] AUTHORITY.KEYID = 7
6,059,734 UART: [ldev] FE.KEYID = 1
6,099,390 UART: [ldev] Erasing FE.KEYID = 1
8,605,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,192 UART: [ldev] --
10,411,797 UART: [fwproc] Wait for Commands...
10,414,763 UART: [fwproc] Recv command 0x46574c44
10,417,035 UART: [fwproc] Recv'd Img size: 114360 bytes
13,864,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,595,481 >>> mbox cmd response: success
14,595,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,600,088 UART: [afmc] ++
14,600,785 UART: [afmc] CDI.KEYID = 6
14,602,024 UART: [afmc] SUBJECT.KEYID = 7
14,603,461 UART: [afmc] AUTHORITY.KEYID = 5
17,129,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,152 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,142 UART: [afmc] --
18,929,331 UART: [cold-reset] --
18,934,659 UART: [state] Locking Datavault
18,940,778 UART: [state] Locking PCR0, PCR1 and PCR31
18,942,923 UART: [state] Locking ICCM
18,944,289 UART: [exit] Launching FMC @ 0x40000130
18,952,949 UART:
18,953,256 UART: Running Caliptra FMC ...
18,954,293 UART:
18,954,442 UART: [state] CFI Enabled
19,008,785 UART: [fht] FMC Alias Private Key: 7
20,773,236 UART: [art] Extend RT PCRs Done
20,774,444 UART: [art] Lock RT PCRs Done
20,776,258 UART: [art] Populate DV Done
20,781,721 UART: [fht] FMC Alias Private Key: 7
20,783,204 UART: [art] Derive CDI
20,783,966 UART: [art] Store in in slot 0x4
20,841,302 UART: [art] Derive Key Pair
20,842,340 UART: [art] Store priv key in slot 0x5
23,305,233 UART: [art] Derive Key Pair - Done
23,317,954 UART: [art] Signing Cert with AUTHO
23,319,282 UART: RITY.KEYID = 7
25,030,292 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,891 UART: [art] PUB.X = 2A049CB5318A0C33069AFD77BD783A082A3BD94ABED550A9F5A86399BF43CDA3398C947BA0317FEBD17F667C99722055
25,039,070 UART: [art] PUB.Y = 0CF2BEFFE58D159EBC629C9E3DA9668DCE698A5BB5D29F7E92D8B8B86B47DDAB0D4281A5E6E0DE7B21A277595496EB7E
25,046,346 UART: [art] SIG.R = 7A2CB5E831B8F9ABF98B1C816512F709495993CBBA1C7D1B197E240C0C4E556AC9CC85EEBF106989F67B67D16D40A02C
25,053,790 UART: [art] SIG.S = 211EB2C906C3353F144C26946311468C8D2834D4F289650BE00D302A74DC5AC1E907B196745B5FCA97B8FFA72CFE6C27
26,033,053 UART: Caliptra RT
26,033,777 UART: [state] CFI Enabled
26,197,940 UART: [rt] RT listening for mailbox commands...
26,229,904 UART: [rt]cmd =0x44504543, len=96
26,268,956 >>> mbox cmd response data (56 bytes)
26,269,749 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,300,066 UART: [rt]cmd =0x44504543, len=92
30,663,278 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
4,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,251,191 >>> mbox cmd response data (12 bytes)
10,252,279 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,879,068 >>> mbox cmd response: success
14,879,555 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,198,962 UART:
19,199,356 UART: Running Caliptra FMC ...
19,200,551 UART:
19,200,709 UART: [state] CFI Enabled
19,266,368 UART: [fht] FMC Alias Private Key: 7
21,029,913 UART: [art] Extend RT PCRs Done
21,031,274 UART: [art] Lock RT PCRs Done
21,032,701 UART: [art] Populate DV Done
21,038,067 UART: [fht] FMC Alias Private Key: 7
21,039,731 UART: [art] Derive CDI
21,040,555 UART: [art] Store in in slot 0x4
21,098,923 UART: [art] Derive Key Pair
21,099,924 UART: [art] Store priv key in slot 0x5
23,562,791 UART: [art] Derive Key Pair - Done
23,576,112 UART: [art] Signing Cert with AUTHO
23,577,419 UART: RITY.KEYID = 7
25,288,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,802 UART: [art] PUB.X = 75052983D6D02CC463A0A53D439681AB5CFB027A6CDE5FD177C3C46B11ADE03B9E32408724A3A366BBF842659B85CBB7
25,297,043 UART: [art] PUB.Y = 46F3BA124A0CB815451E438AA4DF992C7542225D4C7A59125F21B285E1C59448961EA8DC86A13E3C31B86CE87E50B441
25,304,321 UART: [art] SIG.R = 9132C16D0FB76431E000E9DC21825B162444B9D05C696B8C86AFD6563B4F77689CA34FBDB695E7B91A2B629EA256C9DC
25,311,705 UART: [art] SIG.S = 89F82C6C92564740D2C81BADEBA5D07D9B840E099E512FEB652D5CC1CFAF58B387D859F744D5501943632872BDFA89E1
26,289,995 UART: Caliptra RT
26,290,711 UART: [state] CFI Enabled
26,466,582 UART: [rt] RT listening for mailbox commands...
26,498,369 UART: [rt]cmd =0x44504543, len=92
30,857,185 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,121 writing to cptra_bootfsm_go
3,431,838 ready_for_fw is high
3,432,191 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,754,610 >>> mbox cmd response: success
14,755,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
19,042,687 UART:
19,043,017 UART: Running Caliptra FMC ...
19,044,096 UART:
19,044,258 UART: [state] CFI Enabled
19,108,670 UART: [fht] FMC Alias Private Key: 7
20,872,239 UART: [art] Extend RT PCRs Done
20,873,467 UART: [art] Lock RT PCRs Done
20,875,005 UART: [art] Populate DV Done
20,880,432 UART: [fht] FMC Alias Private Key: 7
20,882,026 UART: [art] Derive CDI
20,882,848 UART: [art] Store in in slot 0x4
20,940,722 UART: [art] Derive Key Pair
20,941,722 UART: [art] Store priv key in slot 0x5
23,404,699 UART: [art] Derive Key Pair - Done
23,417,740 UART: [art] Signing Cert with AUTHO
23,419,046 UART: RITY.KEYID = 7
25,130,516 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,023 UART: [art] PUB.X = 75052983D6D02CC463A0A53D439681AB5CFB027A6CDE5FD177C3C46B11ADE03B9E32408724A3A366BBF842659B85CBB7
25,139,316 UART: [art] PUB.Y = 46F3BA124A0CB815451E438AA4DF992C7542225D4C7A59125F21B285E1C59448961EA8DC86A13E3C31B86CE87E50B441
25,146,538 UART: [art] SIG.R = 9132C16D0FB76431E000E9DC21825B162444B9D05C696B8C86AFD6563B4F77689CA34FBDB695E7B91A2B629EA256C9DC
25,153,922 UART: [art] SIG.S = 89F82C6C92564740D2C81BADEBA5D07D9B840E099E512FEB652D5CC1CFAF58B387D859F744D5501943632872BDFA89E1
26,132,868 UART: Caliptra RT
26,133,556 UART: [state] CFI Enabled
26,297,447 UART: [rt] RT listening for mailbox commands...
26,329,140 UART: [rt]cmd =0x4d454153, len=108
26,347,479 >>> mbox cmd response data (12 bytes)
26,348,051 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,378,693 UART: [rt]cmd =0x44504543, len=92
30,742,218 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,069 writing to cptra_bootfsm_go
3,443,152 ready_for_fw is high
3,443,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,730,920 >>> mbox cmd response: success
14,731,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,026,390 UART:
19,026,726 UART: Running Caliptra FMC ...
19,027,774 UART:
19,027,928 UART: [state] CFI Enabled
19,095,833 UART: [fht] FMC Alias Private Key: 7
20,860,385 UART: [art] Extend RT PCRs Done
20,861,606 UART: [art] Lock RT PCRs Done
20,863,357 UART: [art] Populate DV Done
20,868,884 UART: [fht] FMC Alias Private Key: 7
20,870,537 UART: [art] Derive CDI
20,871,274 UART: [art] Store in in slot 0x4
20,928,083 UART: [art] Derive Key Pair
20,929,126 UART: [art] Store priv key in slot 0x5
23,391,983 UART: [art] Derive Key Pair - Done
23,404,927 UART: [art] Signing Cert with AUTHO
23,406,237 UART: RITY.KEYID = 7
25,117,046 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,553 UART: [art] PUB.X = 75052983D6D02CC463A0A53D439681AB5CFB027A6CDE5FD177C3C46B11ADE03B9E32408724A3A366BBF842659B85CBB7
25,125,856 UART: [art] PUB.Y = 46F3BA124A0CB815451E438AA4DF992C7542225D4C7A59125F21B285E1C59448961EA8DC86A13E3C31B86CE87E50B441
25,133,238 UART: [art] SIG.R = 9132C16D0FB76431E000E9DC21825B162444B9D05C696B8C86AFD6563B4F77689CA34FBDB695E7B91A2B629EA256C9DC
25,140,496 UART: [art] SIG.S = 89F82C6C92564740D2C81BADEBA5D07D9B840E099E512FEB652D5CC1CFAF58B387D859F744D5501943632872BDFA89E1
26,119,436 UART: Caliptra RT
26,120,138 UART: [state] CFI Enabled
26,284,947 UART: [rt] RT listening for mailbox commands...
26,316,580 UART: [rt]cmd =0x44504543, len=96
26,356,582 >>> mbox cmd response data (56 bytes)
26,357,372 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,387,853 UART: [rt]cmd =0x44504543, len=92
30,749,440 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.74s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,262,599 UART: [afmc] --
19,265,384 UART: [cold-reset] --
19,268,159 UART: [state] Locking Datavault
19,273,723 UART: [state] Locking PCR0, PCR1 and PCR31
19,275,849 UART: [state] Locking ICCM
19,277,314 UART: [exit] Launching FMC @ 0x40000130
19,285,975 UART:
19,286,215 UART: Running Caliptra FMC ...
19,287,317 UART:
19,287,467 UART: [state] CFI Enabled
19,295,780 UART: [fht] FMC Alias Private Key: 7
21,052,558 UART: [art] Extend RT PCRs Done
21,053,781 UART: [art] Lock RT PCRs Done
21,055,590 UART: [art] Populate DV Done
21,061,109 UART: [fht] FMC Alias Private Key: 7
21,062,700 UART: [art] Derive CDI
21,063,513 UART: [art] Store in in slot 0x4
21,105,883 UART: [art] Derive Key Pair
21,106,922 UART: [art] Store priv key in slot 0x5
23,533,487 UART: [art] Derive Key Pair - Done
23,546,755 UART: [art] Signing Cert with AUTHO
23,548,085 UART: RITY.KEYID = 7
25,253,372 UART: [art] Erasing AUTHORITY.KEYID = 7
25,254,874 UART: [art] PUB.X = 1501552399E154157CC26EEE25C2D970FA95F9E2E5F6A9DD60D2F24F7265271B461CC6EAE9A8BB6B93793A5B45011F06
25,262,183 UART: [art] PUB.Y = 6114D31E78CBC48038EDAD146AF2E67B4D9FCC772E1F61239BC2240BE78FC4AD81871E4A9AB76D8D0D270561EF9CB937
25,269,413 UART: [art] SIG.R = 93331BFEFF27DD9F1B392ECE3E267B0A58076D1FCA04ED1E553F1792206FCAEB8F4EA517C332B0325F52E7353D5D3BD6
25,276,804 UART: [art] SIG.S = BFEE573AC3BB31F22199ACEEF536FF95C87E45B3FDFA5B49C04550D1B66CE1EE22D2663E2F0522C0FD357817E1C421DC
26,255,719 UART: Caliptra RT
26,256,407 UART: [state] CFI Enabled
26,385,309 UART: [rt] RT listening for mailbox commands...
26,416,874 UART: [rt]cmd =0x44504543, len=92
30,715,321 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,123 writing to cptra_bootfsm_go
190,243 UART:
190,538 UART: Running Caliptra ROM ...
191,562 UART:
9,783,919 UART: [state] CFI Enabled
9,799,419 UART: [state] LifecycleState = Unprovisioned
9,801,831 UART: [state] DebugLocked = No
9,804,075 UART: [state] WD Timer not started. Device not locked for debugging
9,807,795 UART: [kat] SHA2-256
9,997,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,008,273 UART: [kat] ++
10,008,889 UART: [kat] sha1
10,019,512 UART: [kat] SHA2-256
10,022,506 UART: [kat] SHA2-384
10,028,801 UART: [kat] SHA2-512-ACC
10,031,395 UART: [kat] ECC-384
12,470,611 UART: [kat] HMAC-384Kdf
12,484,481 UART: [kat] LMS
13,016,271 UART: [kat] --
13,022,201 UART: [cold-reset] ++
13,023,937 UART: [fht] FHT @ 0x50003400
13,035,272 UART: [idev] ++
13,035,919 UART: [idev] CDI.KEYID = 6
13,036,948 UART: [idev] SUBJECT.KEYID = 7
13,038,118 UART: [idev] UDS.KEYID = 0
13,039,043 ready_for_fw is high
13,039,237 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,182,810 UART: [idev] Erasing UDS.KEYID = 0
15,518,950 UART: [idev] Sha1 KeyId Algorithm
15,542,387 UART: [idev] --
15,547,266 UART: [ldev] ++
15,547,946 UART: [ldev] CDI.KEYID = 6
15,548,822 UART: [ldev] SUBJECT.KEYID = 5
15,550,030 UART: [ldev] AUTHORITY.KEYID = 7
15,551,259 UART: [ldev] FE.KEYID = 1
15,562,252 UART: [ldev] Erasing FE.KEYID = 1
18,044,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,766,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,781,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,796,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,811,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,831,180 UART: [ldev] --
19,835,952 UART: [fwproc] Wait for Commands...
19,838,364 UART: [fwproc] Recv command 0x46574c44
19,840,612 UART: [fwproc] Recv'd Img size: 114360 bytes
23,286,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,365,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,481,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
24,023,391 >>> mbox cmd response: success
24,023,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,027,537 UART: [afmc] ++
24,028,225 UART: [afmc] CDI.KEYID = 6
24,029,475 UART: [afmc] SUBJECT.KEYID = 7
24,030,907 UART: [afmc] AUTHORITY.KEYID = 5
26,529,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,250,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,252,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,267,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,283,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,298,019 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,322,954 UART: [afmc] --
28,326,380 UART: [cold-reset] --
28,329,860 UART: [state] Locking Datavault
28,337,369 UART: [state] Locking PCR0, PCR1 and PCR31
28,339,534 UART: [state] Locking ICCM
28,341,119 UART: [exit] Launching FMC @ 0x40000130
28,349,776 UART:
28,350,007 UART: Running Caliptra FMC ...
28,351,126 UART:
28,351,282 UART: [state] CFI Enabled
28,359,644 UART: [fht] FMC Alias Private Key: 7
30,116,364 UART: [art] Extend RT PCRs Done
30,117,579 UART: [art] Lock RT PCRs Done
30,119,226 UART: [art] Populate DV Done
30,124,687 UART: [fht] FMC Alias Private Key: 7
30,126,391 UART: [art] Derive CDI
30,127,208 UART: [art] Store in in slot 0x4
30,170,289 UART: [art] Derive Key Pair
30,171,282 UART: [art] Store priv key in slot 0x5
32,598,468 UART: [art] Derive Key Pair - Done
32,611,310 UART: [art] Signing Cert with AUTHO
32,612,610 UART: RITY.KEYID = 7
34,317,688 UART: [art] Erasing AUTHORITY.KEYID = 7
34,319,197 UART: [art] PUB.X = 1501552399E154157CC26EEE25C2D970FA95F9E2E5F6A9DD60D2F24F7265271B461CC6EAE9A8BB6B93793A5B45011F06
34,326,469 UART: [art] PUB.Y = 6114D31E78CBC48038EDAD146AF2E67B4D9FCC772E1F61239BC2240BE78FC4AD81871E4A9AB76D8D0D270561EF9CB937
34,333,736 UART: [art] SIG.R = 93331BFEFF27DD9F1B392ECE3E267B0A58076D1FCA04ED1E553F1792206FCAEB8F4EA517C332B0325F52E7353D5D3BD6
34,341,096 UART: [art] SIG.S = BFEE573AC3BB31F22199ACEEF536FF95C87E45B3FDFA5B49C04550D1B66CE1EE22D2663E2F0522C0FD357817E1C421DC
35,319,949 UART: Caliptra RT
35,320,642 UART: [state] CFI Enabled
35,438,396 UART: [rt] RT listening for mailbox commands...
35,470,363 UART: [rt]cmd =0x4d454153, len=108
35,488,936 >>> mbox cmd response data (12 bytes)
35,489,568 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,519,894 UART: [rt]cmd =0x44504543, len=92
39,818,733 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,092 writing to cptra_bootfsm_go
190,171 UART:
190,476 UART: Running Caliptra ROM ...
191,499 UART:
10,053,609 UART: [state] CFI Enabled
10,066,698 UART: [state] LifecycleState = Unprovisioned
10,069,113 UART: [state] DebugLocked = No
10,072,002 UART: [state] WD Timer not started. Device not locked for debugging
10,077,346 UART: [kat] SHA2-256
10,267,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,278,019 UART: [kat] ++
10,278,552 UART: [kat] sha1
10,289,290 UART: [kat] SHA2-256
10,292,307 UART: [kat] SHA2-384
10,298,450 UART: [kat] SHA2-512-ACC
10,300,971 UART: [kat] ECC-384
12,743,194 UART: [kat] HMAC-384Kdf
12,757,128 UART: [kat] LMS
13,288,942 UART: [kat] --
13,294,644 UART: [cold-reset] ++
13,296,947 UART: [fht] FHT @ 0x50003400
13,307,216 UART: [idev] ++
13,307,936 UART: [idev] CDI.KEYID = 6
13,308,919 UART: [idev] SUBJECT.KEYID = 7
13,310,090 UART: [idev] UDS.KEYID = 0
13,311,015 ready_for_fw is high
13,311,211 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,454,748 UART: [idev] Erasing UDS.KEYID = 0
15,783,290 UART: [idev] Sha1 KeyId Algorithm
15,805,927 UART: [idev] --
15,811,266 UART: [ldev] ++
15,811,941 UART: [ldev] CDI.KEYID = 6
15,812,843 UART: [ldev] SUBJECT.KEYID = 5
15,814,049 UART: [ldev] AUTHORITY.KEYID = 7
15,815,223 UART: [ldev] FE.KEYID = 1
15,825,570 UART: [ldev] Erasing FE.KEYID = 1
18,302,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,019,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,035,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,050,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,065,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,086,120 UART: [ldev] --
20,091,048 UART: [fwproc] Wait for Commands...
20,094,286 UART: [fwproc] Recv command 0x46574c44
20,096,544 UART: [fwproc] Recv'd Img size: 114360 bytes
23,533,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,607,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,723,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
24,266,811 >>> mbox cmd response: success
24,267,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,271,108 UART: [afmc] ++
24,271,806 UART: [afmc] CDI.KEYID = 6
24,273,060 UART: [afmc] SUBJECT.KEYID = 7
24,274,494 UART: [afmc] AUTHORITY.KEYID = 5
26,778,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,502,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,504,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,520,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,535,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,550,202 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,573,193 UART: [afmc] --
28,576,962 UART: [cold-reset] --
28,580,881 UART: [state] Locking Datavault
28,586,828 UART: [state] Locking PCR0, PCR1 and PCR31
28,589,013 UART: [state] Locking ICCM
28,590,683 UART: [exit] Launching FMC @ 0x40000130
28,599,350 UART:
28,599,583 UART: Running Caliptra FMC ...
28,600,699 UART:
28,600,860 UART: [state] CFI Enabled
28,608,634 UART: [fht] FMC Alias Private Key: 7
30,365,803 UART: [art] Extend RT PCRs Done
30,367,024 UART: [art] Lock RT PCRs Done
30,368,704 UART: [art] Populate DV Done
30,374,221 UART: [fht] FMC Alias Private Key: 7
30,375,761 UART: [art] Derive CDI
30,376,520 UART: [art] Store in in slot 0x4
30,419,164 UART: [art] Derive Key Pair
30,420,207 UART: [art] Store priv key in slot 0x5
32,846,283 UART: [art] Derive Key Pair - Done
32,859,121 UART: [art] Signing Cert with AUTHO
32,860,416 UART: RITY.KEYID = 7
34,565,963 UART: [art] Erasing AUTHORITY.KEYID = 7
34,567,467 UART: [art] PUB.X = 1501552399E154157CC26EEE25C2D970FA95F9E2E5F6A9DD60D2F24F7265271B461CC6EAE9A8BB6B93793A5B45011F06
34,574,781 UART: [art] PUB.Y = 6114D31E78CBC48038EDAD146AF2E67B4D9FCC772E1F61239BC2240BE78FC4AD81871E4A9AB76D8D0D270561EF9CB937
34,582,009 UART: [art] SIG.R = 93331BFEFF27DD9F1B392ECE3E267B0A58076D1FCA04ED1E553F1792206FCAEB8F4EA517C332B0325F52E7353D5D3BD6
34,589,416 UART: [art] SIG.S = BFEE573AC3BB31F22199ACEEF536FF95C87E45B3FDFA5B49C04550D1B66CE1EE22D2663E2F0522C0FD357817E1C421DC
35,568,347 UART: Caliptra RT
35,569,051 UART: [state] CFI Enabled
35,685,602 UART: [rt] RT listening for mailbox commands...
35,717,179 UART: [rt]cmd =0x44504543, len=96
35,757,012 >>> mbox cmd response data (56 bytes)
35,757,826 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,788,207 UART: [rt]cmd =0x44504543, len=92
40,087,448 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,480,114 >>> mbox cmd response data (12 bytes)
10,481,428 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,115,695 >>> mbox cmd response: success
15,116,219 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,374,350 UART:
19,374,743 UART: Running Caliptra FMC ...
19,375,903 UART:
19,376,054 UART: [state] CFI Enabled
19,383,990 UART: [fht] FMC Alias Private Key: 7
21,140,378 UART: [art] Extend RT PCRs Done
21,141,660 UART: [art] Lock RT PCRs Done
21,143,157 UART: [art] Populate DV Done
21,148,639 UART: [fht] FMC Alias Private Key: 7
21,150,287 UART: [art] Derive CDI
21,151,099 UART: [art] Store in in slot 0x4
21,193,693 UART: [art] Derive Key Pair
21,194,715 UART: [art] Store priv key in slot 0x5
23,621,117 UART: [art] Derive Key Pair - Done
23,634,382 UART: [art] Signing Cert with AUTHO
23,635,685 UART: RITY.KEYID = 7
25,341,152 UART: [art] Erasing AUTHORITY.KEYID = 7
25,342,650 UART: [art] PUB.X = AE4C46866B8302E9D5C712FBCB4EABC6D85BE1A0DFCBDC2E63FF0D1C968BEDF943F18C1846330782CD6122A23FC655FC
25,349,945 UART: [art] PUB.Y = 4F6D3DFC1860B94570D0014F467D5796DA0CAE5D15C3B0ABA8FD86C1DD55ECDD899076543965401B7F115795AD2FAC7E
25,357,229 UART: [art] SIG.R = 0FD8279AD2822BC393CBC4F4B4D2C69CD34CB2BCFC18B1FC410DFDCBC95BBA97D4180C4B81AC83678CAE99806A920E65
25,364,613 UART: [art] SIG.S = BDBCEE66B2072E1FBAF80D9760F61F565C44CDF57ACDCB43D8D59A959EE12320A5D01A591F2E28838FA9D302AACFA437
26,343,265 UART: Caliptra RT
26,343,980 UART: [state] CFI Enabled
26,471,895 UART: [rt] RT listening for mailbox commands...
26,503,411 UART: [rt]cmd =0x44504543, len=92
30,802,687 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,115 writing to cptra_bootfsm_go
12,852,050 ready_for_fw is high
12,852,425 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,054,232 >>> mbox cmd response: success
24,054,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,306,978 UART:
28,307,312 UART: Running Caliptra FMC ...
28,308,380 UART:
28,308,532 UART: [state] CFI Enabled
28,316,759 UART: [fht] FMC Alias Private Key: 7
30,072,966 UART: [art] Extend RT PCRs Done
30,074,191 UART: [art] Lock RT PCRs Done
30,076,250 UART: [art] Populate DV Done
30,081,450 UART: [fht] FMC Alias Private Key: 7
30,083,092 UART: [art] Derive CDI
30,083,910 UART: [art] Store in in slot 0x4
30,126,893 UART: [art] Derive Key Pair
30,127,907 UART: [art] Store priv key in slot 0x5
32,554,667 UART: [art] Derive Key Pair - Done
32,567,507 UART: [art] Signing Cert with AUTHO
32,568,814 UART: RITY.KEYID = 7
34,274,571 UART: [art] Erasing AUTHORITY.KEYID = 7
34,276,080 UART: [art] PUB.X = AE4C46866B8302E9D5C712FBCB4EABC6D85BE1A0DFCBDC2E63FF0D1C968BEDF943F18C1846330782CD6122A23FC655FC
34,283,384 UART: [art] PUB.Y = 4F6D3DFC1860B94570D0014F467D5796DA0CAE5D15C3B0ABA8FD86C1DD55ECDD899076543965401B7F115795AD2FAC7E
34,290,656 UART: [art] SIG.R = 0FD8279AD2822BC393CBC4F4B4D2C69CD34CB2BCFC18B1FC410DFDCBC95BBA97D4180C4B81AC83678CAE99806A920E65
34,298,036 UART: [art] SIG.S = BDBCEE66B2072E1FBAF80D9760F61F565C44CDF57ACDCB43D8D59A959EE12320A5D01A591F2E28838FA9D302AACFA437
35,277,010 UART: Caliptra RT
35,277,727 UART: [state] CFI Enabled
35,394,679 UART: [rt] RT listening for mailbox commands...
35,426,460 UART: [rt]cmd =0x4d454153, len=108
35,444,988 >>> mbox cmd response data (12 bytes)
35,445,513 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,475,984 UART: [rt]cmd =0x44504543, len=92
39,774,598 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,057 writing to cptra_bootfsm_go
13,158,898 ready_for_fw is high
13,159,385 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,350,386 >>> mbox cmd response: success
24,350,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,609,369 UART:
28,609,711 UART: Running Caliptra FMC ...
28,610,754 UART:
28,610,906 UART: [state] CFI Enabled
28,618,968 UART: [fht] FMC Alias Private Key: 7
30,375,332 UART: [art] Extend RT PCRs Done
30,376,540 UART: [art] Lock RT PCRs Done
30,378,239 UART: [art] Populate DV Done
30,383,444 UART: [fht] FMC Alias Private Key: 7
30,384,997 UART: [art] Derive CDI
30,385,811 UART: [art] Store in in slot 0x4
30,428,609 UART: [art] Derive Key Pair
30,429,660 UART: [art] Store priv key in slot 0x5
32,856,064 UART: [art] Derive Key Pair - Done
32,868,899 UART: [art] Signing Cert with AUTHO
32,870,193 UART: RITY.KEYID = 7
34,575,692 UART: [art] Erasing AUTHORITY.KEYID = 7
34,577,333 UART: [art] PUB.X = AE4C46866B8302E9D5C712FBCB4EABC6D85BE1A0DFCBDC2E63FF0D1C968BEDF943F18C1846330782CD6122A23FC655FC
34,584,463 UART: [art] PUB.Y = 4F6D3DFC1860B94570D0014F467D5796DA0CAE5D15C3B0ABA8FD86C1DD55ECDD899076543965401B7F115795AD2FAC7E
34,591,741 UART: [art] SIG.R = 0FD8279AD2822BC393CBC4F4B4D2C69CD34CB2BCFC18B1FC410DFDCBC95BBA97D4180C4B81AC83678CAE99806A920E65
34,599,184 UART: [art] SIG.S = BDBCEE66B2072E1FBAF80D9760F61F565C44CDF57ACDCB43D8D59A959EE12320A5D01A591F2E28838FA9D302AACFA437
35,578,347 UART: Caliptra RT
35,579,055 UART: [state] CFI Enabled
35,695,974 UART: [rt] RT listening for mailbox commands...
35,727,661 UART: [rt]cmd =0x44504543, len=96
35,766,876 >>> mbox cmd response data (56 bytes)
35,767,718 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,798,214 UART: [rt]cmd =0x44504543, len=92
40,096,969 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.65s
Truncated 5006 bytes from beginning
330D7EE3CC4995714D513FA7E8FA46161C342
3,439,220 UART: [art] PUB.Y = 3B0E496132A231FA968ECEBD3FAA2921D6F5486D29C14A8007E94F4C12554E3BBEB83C0F70BB83F8311D760CC76906B9
3,446,163 UART: [art] SIG.R = C4EF03038FDC31B66C4A9D92ABFA0D0B26DF189A6FCC59102E66479F723147D997B278E42E2AFD901055DD58F3957140
3,452,927 UART: [art] SIG.S = 286E52B34E9D3FDF834273DDD4D9D4BA13A8061922154AB367DE07187CA82FC9ECFD422DDB816BC496533113344D4255
3,476,996 UART: Caliptra RT
3,477,250 UART: [state] CFI Enabled
3,597,684 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,407 UART: [rt]cmd =0x44504543, len=92
3,828,863 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
894,876 UART: [kat] SHA2-512-ACC
896,777 UART: [kat] ECC-384
902,494 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,215 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,614 UART: [idev] ++
1,479,782 UART: [idev] CDI.KEYID = 6
1,480,142 UART: [idev] SUBJECT.KEYID = 7
1,480,566 UART: [idev] UDS.KEYID = 0
1,480,911 ready_for_fw is high
1,480,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,278 UART: [idev] Erasing UDS.KEYID = 0
1,505,778 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,378 UART: [idev] --
1,515,439 UART: [ldev] ++
1,515,607 UART: [ldev] CDI.KEYID = 6
1,515,970 UART: [ldev] SUBJECT.KEYID = 5
1,516,396 UART: [ldev] AUTHORITY.KEYID = 7
1,516,859 UART: [ldev] FE.KEYID = 1
1,521,933 UART: [ldev] Erasing FE.KEYID = 1
1,547,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,154 UART: [ldev] --
1,586,583 UART: [fwproc] Waiting for Commands...
1,587,316 UART: [fwproc] Received command 0x46574c44
1,588,107 UART: [fwproc] Received Image of size 114360 bytes
2,886,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,101 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,320 >>> mbox cmd response: success
3,079,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,080,514 UART: [afmc] ++
3,080,682 UART: [afmc] CDI.KEYID = 6
3,081,044 UART: [afmc] SUBJECT.KEYID = 7
3,081,469 UART: [afmc] AUTHORITY.KEYID = 5
3,116,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,881 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,571 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,376 UART: [afmc] --
3,159,466 UART: [cold-reset] --
3,160,226 UART: [state] Locking Datavault
3,161,457 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,061 UART: [state] Locking ICCM
3,162,555 UART: [exit] Launching FMC @ 0x40000130
3,167,884 UART:
3,167,900 UART: Running Caliptra FMC ...
3,168,308 UART:
3,168,362 UART: [state] CFI Enabled
3,178,875 UART: [fht] FMC Alias Private Key: 7
3,287,380 UART: [art] Extend RT PCRs Done
3,287,808 UART: [art] Lock RT PCRs Done
3,289,562 UART: [art] Populate DV Done
3,297,841 UART: [fht] FMC Alias Private Key: 7
3,299,011 UART: [art] Derive CDI
3,299,291 UART: [art] Store in in slot 0x4
3,385,484 UART: [art] Derive Key Pair
3,385,844 UART: [art] Store priv key in slot 0x5
3,399,436 UART: [art] Derive Key Pair - Done
3,414,315 UART: [art] Signing Cert with AUTHO
3,414,795 UART: RITY.KEYID = 7
3,429,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,674 UART: [art] PUB.X = 08C810CFDF143FDA0B5B092DB5EF64FE73689998B9A3CB1E3BBE8B54D3C330D7EE3CC4995714D513FA7E8FA46161C342
3,437,451 UART: [art] PUB.Y = 3B0E496132A231FA968ECEBD3FAA2921D6F5486D29C14A8007E94F4C12554E3BBEB83C0F70BB83F8311D760CC76906B9
3,444,394 UART: [art] SIG.R = C4EF03038FDC31B66C4A9D92ABFA0D0B26DF189A6FCC59102E66479F723147D997B278E42E2AFD901055DD58F3957140
3,451,158 UART: [art] SIG.S = 286E52B34E9D3FDF834273DDD4D9D4BA13A8061922154AB367DE07187CA82FC9ECFD422DDB816BC496533113344D4255
3,475,065 UART: Caliptra RT
3,475,319 UART: [state] CFI Enabled
3,583,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,056 UART: [rt]cmd =0x4d454153, len=108
3,634,375 >>> mbox cmd response data (12 bytes)
3,634,376 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,505 UART: [rt]cmd =0x44504543, len=92
3,863,719 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,319 UART: [kat] SHA2-256
892,257 UART: [kat] SHA2-384
895,124 UART: [kat] SHA2-512-ACC
897,025 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,661 UART: [cold-reset] ++
1,477,133 UART: [fht] Storing FHT @ 0x50003400
1,480,040 UART: [idev] ++
1,480,208 UART: [idev] CDI.KEYID = 6
1,480,568 UART: [idev] SUBJECT.KEYID = 7
1,480,992 UART: [idev] UDS.KEYID = 0
1,481,337 ready_for_fw is high
1,481,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,564 UART: [idev] Erasing UDS.KEYID = 0
1,504,754 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,329 UART: [ldev] ++
1,514,497 UART: [ldev] CDI.KEYID = 6
1,514,860 UART: [ldev] SUBJECT.KEYID = 5
1,515,286 UART: [ldev] AUTHORITY.KEYID = 7
1,515,749 UART: [ldev] FE.KEYID = 1
1,521,113 UART: [ldev] Erasing FE.KEYID = 1
1,546,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,736 UART: [ldev] --
1,586,119 UART: [fwproc] Waiting for Commands...
1,586,798 UART: [fwproc] Received command 0x46574c44
1,587,589 UART: [fwproc] Received Image of size 114360 bytes
2,885,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,250 >>> mbox cmd response: success
3,078,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,368 UART: [afmc] ++
3,079,536 UART: [afmc] CDI.KEYID = 6
3,079,898 UART: [afmc] SUBJECT.KEYID = 7
3,080,323 UART: [afmc] AUTHORITY.KEYID = 5
3,115,612 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,213 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,903 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,816 UART: [afmc] --
3,158,784 UART: [cold-reset] --
3,159,572 UART: [state] Locking Datavault
3,160,787 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,391 UART: [state] Locking ICCM
3,162,049 UART: [exit] Launching FMC @ 0x40000130
3,167,378 UART:
3,167,394 UART: Running Caliptra FMC ...
3,167,802 UART:
3,167,856 UART: [state] CFI Enabled
3,178,399 UART: [fht] FMC Alias Private Key: 7
3,286,896 UART: [art] Extend RT PCRs Done
3,287,324 UART: [art] Lock RT PCRs Done
3,288,662 UART: [art] Populate DV Done
3,296,973 UART: [fht] FMC Alias Private Key: 7
3,297,983 UART: [art] Derive CDI
3,298,263 UART: [art] Store in in slot 0x4
3,383,674 UART: [art] Derive Key Pair
3,384,034 UART: [art] Store priv key in slot 0x5
3,397,298 UART: [art] Derive Key Pair - Done
3,411,793 UART: [art] Signing Cert with AUTHO
3,412,273 UART: RITY.KEYID = 7
3,427,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,246 UART: [art] PUB.X = 08C810CFDF143FDA0B5B092DB5EF64FE73689998B9A3CB1E3BBE8B54D3C330D7EE3CC4995714D513FA7E8FA46161C342
3,435,023 UART: [art] PUB.Y = 3B0E496132A231FA968ECEBD3FAA2921D6F5486D29C14A8007E94F4C12554E3BBEB83C0F70BB83F8311D760CC76906B9
3,441,966 UART: [art] SIG.R = C4EF03038FDC31B66C4A9D92ABFA0D0B26DF189A6FCC59102E66479F723147D997B278E42E2AFD901055DD58F3957140
3,448,730 UART: [art] SIG.S = 286E52B34E9D3FDF834273DDD4D9D4BA13A8061922154AB367DE07187CA82FC9ECFD422DDB816BC496533113344D4255
3,472,439 UART: Caliptra RT
3,472,693 UART: [state] CFI Enabled
3,580,161 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,686 UART: [rt]cmd =0x44504543, len=96
3,651,451 >>> mbox cmd response data (56 bytes)
3,651,452 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,437 UART: [rt]cmd =0x44504543, len=92
3,881,369 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,115 >>> mbox cmd response data (12 bytes)
1,445,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,931,966 >>> mbox cmd response: success
2,931,966 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,993,172 UART:
2,993,188 UART: Running Caliptra FMC ...
2,993,596 UART:
2,993,650 UART: [state] CFI Enabled
3,004,005 UART: [fht] FMC Alias Private Key: 7
3,111,700 UART: [art] Extend RT PCRs Done
3,112,128 UART: [art] Lock RT PCRs Done
3,113,628 UART: [art] Populate DV Done
3,121,955 UART: [fht] FMC Alias Private Key: 7
3,123,037 UART: [art] Derive CDI
3,123,317 UART: [art] Store in in slot 0x4
3,209,200 UART: [art] Derive Key Pair
3,209,560 UART: [art] Store priv key in slot 0x5
3,222,800 UART: [art] Derive Key Pair - Done
3,237,798 UART: [art] Signing Cert with AUTHO
3,238,278 UART: RITY.KEYID = 7
3,253,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,147 UART: [art] PUB.X = 71E29C73DD2A04E9A88382CDF608EB5BFB3E3E4C8B35D636D65654E46E0907B33488CAF0540004BAA5FBCF42A56410E2
3,260,890 UART: [art] PUB.Y = C41FDCD23175E3F5D70771BF5441040A4F84F158B54DBF74A86A6F6FC51E8D0A61451EAD67BA58C4788874E23ADE4D7F
3,267,840 UART: [art] SIG.R = EBE9C50D28342CE9E8002659EC8CEA9AA0F485C2DBD8CF4239B0EAA83FEA653B20CD768699B017D5350B9C5602B849AD
3,274,595 UART: [art] SIG.S = 406FC0AC0F1F789294BD87642D828442C186097B1E5E0AA8F3DF77EB9910683D7460A972DAAB1FE5548BF463114C2CCB
3,298,557 UART: Caliptra RT
3,298,811 UART: [state] CFI Enabled
3,419,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,176 UART: [rt]cmd =0x44504543, len=92
3,649,454 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,667 ready_for_fw is high
1,362,667 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,169 >>> mbox cmd response: success
2,927,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,988,183 UART:
2,988,199 UART: Running Caliptra FMC ...
2,988,607 UART:
2,988,661 UART: [state] CFI Enabled
2,999,332 UART: [fht] FMC Alias Private Key: 7
3,107,087 UART: [art] Extend RT PCRs Done
3,107,515 UART: [art] Lock RT PCRs Done
3,108,945 UART: [art] Populate DV Done
3,116,774 UART: [fht] FMC Alias Private Key: 7
3,117,904 UART: [art] Derive CDI
3,118,184 UART: [art] Store in in slot 0x4
3,203,905 UART: [art] Derive Key Pair
3,204,265 UART: [art] Store priv key in slot 0x5
3,217,123 UART: [art] Derive Key Pair - Done
3,232,119 UART: [art] Signing Cert with AUTHO
3,232,599 UART: RITY.KEYID = 7
3,247,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,350 UART: [art] PUB.X = 71E29C73DD2A04E9A88382CDF608EB5BFB3E3E4C8B35D636D65654E46E0907B33488CAF0540004BAA5FBCF42A56410E2
3,255,093 UART: [art] PUB.Y = C41FDCD23175E3F5D70771BF5441040A4F84F158B54DBF74A86A6F6FC51E8D0A61451EAD67BA58C4788874E23ADE4D7F
3,262,043 UART: [art] SIG.R = EBE9C50D28342CE9E8002659EC8CEA9AA0F485C2DBD8CF4239B0EAA83FEA653B20CD768699B017D5350B9C5602B849AD
3,268,798 UART: [art] SIG.S = 406FC0AC0F1F789294BD87642D828442C186097B1E5E0AA8F3DF77EB9910683D7460A972DAAB1FE5548BF463114C2CCB
3,292,718 UART: Caliptra RT
3,292,972 UART: [state] CFI Enabled
3,400,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,661 UART: [rt]cmd =0x4d454153, len=108
3,453,016 >>> mbox cmd response data (12 bytes)
3,453,017 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,084 UART: [rt]cmd =0x44504543, len=92
3,682,016 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,005 ready_for_fw is high
1,363,005 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,711 >>> mbox cmd response: success
2,925,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,986,821 UART:
2,986,837 UART: Running Caliptra FMC ...
2,987,245 UART:
2,987,299 UART: [state] CFI Enabled
2,997,562 UART: [fht] FMC Alias Private Key: 7
3,105,531 UART: [art] Extend RT PCRs Done
3,105,959 UART: [art] Lock RT PCRs Done
3,107,609 UART: [art] Populate DV Done
3,116,050 UART: [fht] FMC Alias Private Key: 7
3,117,108 UART: [art] Derive CDI
3,117,388 UART: [art] Store in in slot 0x4
3,203,187 UART: [art] Derive Key Pair
3,203,547 UART: [art] Store priv key in slot 0x5
3,216,933 UART: [art] Derive Key Pair - Done
3,231,495 UART: [art] Signing Cert with AUTHO
3,231,975 UART: RITY.KEYID = 7
3,247,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,806 UART: [art] PUB.X = 71E29C73DD2A04E9A88382CDF608EB5BFB3E3E4C8B35D636D65654E46E0907B33488CAF0540004BAA5FBCF42A56410E2
3,254,549 UART: [art] PUB.Y = C41FDCD23175E3F5D70771BF5441040A4F84F158B54DBF74A86A6F6FC51E8D0A61451EAD67BA58C4788874E23ADE4D7F
3,261,499 UART: [art] SIG.R = EBE9C50D28342CE9E8002659EC8CEA9AA0F485C2DBD8CF4239B0EAA83FEA653B20CD768699B017D5350B9C5602B849AD
3,268,254 UART: [art] SIG.S = 406FC0AC0F1F789294BD87642D828442C186097B1E5E0AA8F3DF77EB9910683D7460A972DAAB1FE5548BF463114C2CCB
3,291,862 UART: Caliptra RT
3,292,116 UART: [state] CFI Enabled
3,400,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,173 UART: [rt]cmd =0x44504543, len=96
3,471,466 >>> mbox cmd response data (56 bytes)
3,471,467 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,434 UART: [rt]cmd =0x44504543, len=92
3,700,266 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.01s
Truncated 5006 bytes from beginning
16A047583E303168081339C909F420E7FA01F
3,440,712 UART: [art] PUB.Y = 200367D794361A640C41E90344A0D9B94191FD3DCCBFADF9069FEF9813E101A31D1061A19D5CCF46B836B4045B4A2D6C
3,447,650 UART: [art] SIG.R = 80FC719483F6FA8DCDD3E4F24AA0533D5544DAA13C55E65F704FE9C37289B505CB4DC6F8F4F632EC52BAC55AA4AE9D8C
3,454,439 UART: [art] SIG.S = C9718FD56C0600E5278025C2E296D92461506C32E4C6B1B9D8E6BA8F27A7249F597ECB255D099436686B360D045A0057
3,478,058 UART: Caliptra RT
3,478,404 UART: [state] CFI Enabled
3,597,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,576 UART: [rt]cmd =0x44504543, len=92
3,828,317 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,357 UART: [kat] SHA2-512-ACC
897,258 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,775 UART: [kat] LMS
1,475,971 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 ready_for_fw is high
1,481,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,349 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,541 UART: [idev] --
1,515,702 UART: [ldev] ++
1,515,870 UART: [ldev] CDI.KEYID = 6
1,516,233 UART: [ldev] SUBJECT.KEYID = 5
1,516,659 UART: [ldev] AUTHORITY.KEYID = 7
1,517,122 UART: [ldev] FE.KEYID = 1
1,522,256 UART: [ldev] Erasing FE.KEYID = 1
1,547,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,635 UART: [ldev] --
1,587,090 UART: [fwproc] Waiting for Commands...
1,587,855 UART: [fwproc] Received command 0x46574c44
1,588,646 UART: [fwproc] Received Image of size 114360 bytes
2,886,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,670 >>> mbox cmd response: success
3,079,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,080,808 UART: [afmc] ++
3,080,976 UART: [afmc] CDI.KEYID = 6
3,081,338 UART: [afmc] SUBJECT.KEYID = 7
3,081,763 UART: [afmc] AUTHORITY.KEYID = 5
3,117,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,253 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,943 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,780 UART: [afmc] --
3,160,780 UART: [cold-reset] --
3,161,890 UART: [state] Locking Datavault
3,162,745 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,349 UART: [state] Locking ICCM
3,163,891 UART: [exit] Launching FMC @ 0x40000130
3,169,220 UART:
3,169,236 UART: Running Caliptra FMC ...
3,169,644 UART:
3,169,787 UART: [state] CFI Enabled
3,180,418 UART: [fht] FMC Alias Private Key: 7
3,287,979 UART: [art] Extend RT PCRs Done
3,288,407 UART: [art] Lock RT PCRs Done
3,289,737 UART: [art] Populate DV Done
3,297,976 UART: [fht] FMC Alias Private Key: 7
3,299,134 UART: [art] Derive CDI
3,299,414 UART: [art] Store in in slot 0x4
3,384,997 UART: [art] Derive Key Pair
3,385,357 UART: [art] Store priv key in slot 0x5
3,398,145 UART: [art] Derive Key Pair - Done
3,413,293 UART: [art] Signing Cert with AUTHO
3,413,773 UART: RITY.KEYID = 7
3,429,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,164 UART: [art] PUB.X = 083F3EA33E644B04CE2CBAF3D92DB0EE2B533A731D81ADE37FE267D1DD816A047583E303168081339C909F420E7FA01F
3,436,927 UART: [art] PUB.Y = 200367D794361A640C41E90344A0D9B94191FD3DCCBFADF9069FEF9813E101A31D1061A19D5CCF46B836B4045B4A2D6C
3,443,865 UART: [art] SIG.R = 80FC719483F6FA8DCDD3E4F24AA0533D5544DAA13C55E65F704FE9C37289B505CB4DC6F8F4F632EC52BAC55AA4AE9D8C
3,450,654 UART: [art] SIG.S = C9718FD56C0600E5278025C2E296D92461506C32E4C6B1B9D8E6BA8F27A7249F597ECB255D099436686B360D045A0057
3,474,019 UART: Caliptra RT
3,474,365 UART: [state] CFI Enabled
3,583,044 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,787 UART: [rt]cmd =0x4d454153, len=108
3,634,256 >>> mbox cmd response data (12 bytes)
3,634,257 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,098 UART: [rt]cmd =0x44504543, len=92
3,863,705 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,874 UART: [kat] SHA2-256
892,812 UART: [kat] SHA2-384
895,431 UART: [kat] SHA2-512-ACC
897,332 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,486 UART: [cold-reset] ++
1,477,014 UART: [fht] Storing FHT @ 0x50003400
1,479,797 UART: [idev] ++
1,479,965 UART: [idev] CDI.KEYID = 6
1,480,325 UART: [idev] SUBJECT.KEYID = 7
1,480,749 UART: [idev] UDS.KEYID = 0
1,481,094 ready_for_fw is high
1,481,094 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,505,631 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,417 UART: [idev] --
1,515,584 UART: [ldev] ++
1,515,752 UART: [ldev] CDI.KEYID = 6
1,516,115 UART: [ldev] SUBJECT.KEYID = 5
1,516,541 UART: [ldev] AUTHORITY.KEYID = 7
1,517,004 UART: [ldev] FE.KEYID = 1
1,522,316 UART: [ldev] Erasing FE.KEYID = 1
1,548,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,113 UART: [ldev] --
1,587,376 UART: [fwproc] Waiting for Commands...
1,588,167 UART: [fwproc] Received command 0x46574c44
1,588,958 UART: [fwproc] Received Image of size 114360 bytes
2,887,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,187 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,404 >>> mbox cmd response: success
3,079,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,080,648 UART: [afmc] ++
3,080,816 UART: [afmc] CDI.KEYID = 6
3,081,178 UART: [afmc] SUBJECT.KEYID = 7
3,081,603 UART: [afmc] AUTHORITY.KEYID = 5
3,116,346 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,791 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,481 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,394 UART: [afmc] --
3,159,380 UART: [cold-reset] --
3,160,296 UART: [state] Locking Datavault
3,161,651 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,255 UART: [state] Locking ICCM
3,162,763 UART: [exit] Launching FMC @ 0x40000130
3,168,092 UART:
3,168,108 UART: Running Caliptra FMC ...
3,168,516 UART:
3,168,659 UART: [state] CFI Enabled
3,179,586 UART: [fht] FMC Alias Private Key: 7
3,287,671 UART: [art] Extend RT PCRs Done
3,288,099 UART: [art] Lock RT PCRs Done
3,289,839 UART: [art] Populate DV Done
3,298,350 UART: [fht] FMC Alias Private Key: 7
3,299,454 UART: [art] Derive CDI
3,299,734 UART: [art] Store in in slot 0x4
3,385,413 UART: [art] Derive Key Pair
3,385,773 UART: [art] Store priv key in slot 0x5
3,398,809 UART: [art] Derive Key Pair - Done
3,413,621 UART: [art] Signing Cert with AUTHO
3,414,101 UART: RITY.KEYID = 7
3,429,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,480 UART: [art] PUB.X = 083F3EA33E644B04CE2CBAF3D92DB0EE2B533A731D81ADE37FE267D1DD816A047583E303168081339C909F420E7FA01F
3,437,243 UART: [art] PUB.Y = 200367D794361A640C41E90344A0D9B94191FD3DCCBFADF9069FEF9813E101A31D1061A19D5CCF46B836B4045B4A2D6C
3,444,181 UART: [art] SIG.R = 80FC719483F6FA8DCDD3E4F24AA0533D5544DAA13C55E65F704FE9C37289B505CB4DC6F8F4F632EC52BAC55AA4AE9D8C
3,450,970 UART: [art] SIG.S = C9718FD56C0600E5278025C2E296D92461506C32E4C6B1B9D8E6BA8F27A7249F597ECB255D099436686B360D045A0057
3,474,765 UART: Caliptra RT
3,475,111 UART: [state] CFI Enabled
3,582,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,567 UART: [rt]cmd =0x44504543, len=96
3,654,180 >>> mbox cmd response data (56 bytes)
3,654,181 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,034 UART: [rt]cmd =0x44504543, len=92
3,882,937 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,430 >>> mbox cmd response data (12 bytes)
1,445,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,932,343 >>> mbox cmd response: success
2,932,343 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,994,175 UART:
2,994,191 UART: Running Caliptra FMC ...
2,994,599 UART:
2,994,742 UART: [state] CFI Enabled
3,005,115 UART: [fht] FMC Alias Private Key: 7
3,113,320 UART: [art] Extend RT PCRs Done
3,113,748 UART: [art] Lock RT PCRs Done
3,115,368 UART: [art] Populate DV Done
3,123,699 UART: [fht] FMC Alias Private Key: 7
3,124,637 UART: [art] Derive CDI
3,124,917 UART: [art] Store in in slot 0x4
3,210,366 UART: [art] Derive Key Pair
3,210,726 UART: [art] Store priv key in slot 0x5
3,224,124 UART: [art] Derive Key Pair - Done
3,238,967 UART: [art] Signing Cert with AUTHO
3,239,447 UART: RITY.KEYID = 7
3,254,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,150 UART: [art] PUB.X = B76331B7313BA47FCCFBD5CF84A98448FAE9298513C11DD4DC287695056D4C5EADD4C40BD504992D9AA07A1AA36F2F11
3,261,925 UART: [art] PUB.Y = 152706687E71D13CB0733961CF48BAA3AF7DCBC2AC87A669E60E082FDCE1F0E6BD996D841AAF5F2E2E59DFD93496EE5F
3,268,886 UART: [art] SIG.R = 302553F006848AD11EF596A5578B01683F485E3B372EE2715E42FC924219EBCE19C2209EC1EE5A23375C40A31006CBF7
3,275,645 UART: [art] SIG.S = B369EBA762DFC0D4D01B36BF8FA68AF46DBF806B640B129835C13410EC51F5F348FC22F2A96508A16F684D3C87CBF7BD
3,299,342 UART: Caliptra RT
3,299,688 UART: [state] CFI Enabled
3,419,174 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,955 UART: [rt]cmd =0x44504543, len=92
3,649,251 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,772 ready_for_fw is high
1,362,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,950 >>> mbox cmd response: success
2,926,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,988,914 UART:
2,988,930 UART: Running Caliptra FMC ...
2,989,338 UART:
2,989,481 UART: [state] CFI Enabled
3,000,076 UART: [fht] FMC Alias Private Key: 7
3,108,103 UART: [art] Extend RT PCRs Done
3,108,531 UART: [art] Lock RT PCRs Done
3,109,585 UART: [art] Populate DV Done
3,117,594 UART: [fht] FMC Alias Private Key: 7
3,118,580 UART: [art] Derive CDI
3,118,860 UART: [art] Store in in slot 0x4
3,204,329 UART: [art] Derive Key Pair
3,204,689 UART: [art] Store priv key in slot 0x5
3,218,049 UART: [art] Derive Key Pair - Done
3,232,898 UART: [art] Signing Cert with AUTHO
3,233,378 UART: RITY.KEYID = 7
3,248,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,233 UART: [art] PUB.X = B76331B7313BA47FCCFBD5CF84A98448FAE9298513C11DD4DC287695056D4C5EADD4C40BD504992D9AA07A1AA36F2F11
3,256,008 UART: [art] PUB.Y = 152706687E71D13CB0733961CF48BAA3AF7DCBC2AC87A669E60E082FDCE1F0E6BD996D841AAF5F2E2E59DFD93496EE5F
3,262,969 UART: [art] SIG.R = 302553F006848AD11EF596A5578B01683F485E3B372EE2715E42FC924219EBCE19C2209EC1EE5A23375C40A31006CBF7
3,269,728 UART: [art] SIG.S = B369EBA762DFC0D4D01B36BF8FA68AF46DBF806B640B129835C13410EC51F5F348FC22F2A96508A16F684D3C87CBF7BD
3,293,041 UART: Caliptra RT
3,293,387 UART: [state] CFI Enabled
3,402,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,796 UART: [rt]cmd =0x4d454153, len=108
3,454,187 >>> mbox cmd response data (12 bytes)
3,454,188 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,095 UART: [rt]cmd =0x44504543, len=92
3,683,347 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,078 ready_for_fw is high
1,362,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,362 >>> mbox cmd response: success
2,928,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,990,998 UART:
2,991,014 UART: Running Caliptra FMC ...
2,991,422 UART:
2,991,565 UART: [state] CFI Enabled
3,001,998 UART: [fht] FMC Alias Private Key: 7
3,109,377 UART: [art] Extend RT PCRs Done
3,109,805 UART: [art] Lock RT PCRs Done
3,111,239 UART: [art] Populate DV Done
3,119,288 UART: [fht] FMC Alias Private Key: 7
3,120,312 UART: [art] Derive CDI
3,120,592 UART: [art] Store in in slot 0x4
3,206,481 UART: [art] Derive Key Pair
3,206,841 UART: [art] Store priv key in slot 0x5
3,220,481 UART: [art] Derive Key Pair - Done
3,235,464 UART: [art] Signing Cert with AUTHO
3,235,944 UART: RITY.KEYID = 7
3,251,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,871 UART: [art] PUB.X = B76331B7313BA47FCCFBD5CF84A98448FAE9298513C11DD4DC287695056D4C5EADD4C40BD504992D9AA07A1AA36F2F11
3,258,646 UART: [art] PUB.Y = 152706687E71D13CB0733961CF48BAA3AF7DCBC2AC87A669E60E082FDCE1F0E6BD996D841AAF5F2E2E59DFD93496EE5F
3,265,607 UART: [art] SIG.R = 302553F006848AD11EF596A5578B01683F485E3B372EE2715E42FC924219EBCE19C2209EC1EE5A23375C40A31006CBF7
3,272,366 UART: [art] SIG.S = B369EBA762DFC0D4D01B36BF8FA68AF46DBF806B640B129835C13410EC51F5F348FC22F2A96508A16F684D3C87CBF7BD
3,296,123 UART: Caliptra RT
3,296,469 UART: [state] CFI Enabled
3,405,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,446 UART: [rt]cmd =0x44504543, len=96
3,476,949 >>> mbox cmd response data (56 bytes)
3,476,950 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,921 UART: [rt]cmd =0x44504543, len=92
3,705,529 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.82s
Truncated 4783 bytes from beginning
7
3,125,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,254 UART: [art] PUB.X = 91611DB270302247EB5B90FDA0B819042A5F305950975249C15B521166E4B13BB8EF13FBCAF95ECA4E8C400FCC673A3A
3,133,024 UART: [art] PUB.Y = 496CD430F8EE0464B265E84D28E1D973DEEBE49FCC33ADA0087D5ADB3C20FABEED0982AFF0FD6C9FEF67DEDF3126AA98
3,139,997 UART: [art] SIG.R = 27BBA3BE8E4647EDFC5BA3C6777E84556ED507279A7F020A390579D34526EBEA1948A4C6904C34021EB8F7C29440ECFA
3,146,760 UART: [art] SIG.S = 58BD5E81A5E9C24F2548B3FDBF18A4A842F5F016D38844682B9DF76A38EA00FB1097E737AA37ECC710C21A9DC62A06CD
3,170,638 UART: Caliptra RT
3,170,892 UART: [state] CFI Enabled
3,290,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,939 UART: [rt]cmd =0x44504543, len=92
3,519,904 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,946 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,171,715 UART: [cold-reset] ++
1,172,163 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 ready_for_fw is high
1,176,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,048 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,743 UART: [idev] --
1,210,837 UART: [ldev] ++
1,211,005 UART: [ldev] CDI.KEYID = 6
1,211,368 UART: [ldev] SUBJECT.KEYID = 5
1,211,794 UART: [ldev] AUTHORITY.KEYID = 7
1,212,257 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,831 UART: [ldev] --
1,283,118 UART: [fwproc] Wait for Commands...
1,283,882 UART: [fwproc] Recv command 0x46574c44
1,284,610 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,292 >>> mbox cmd response: success
2,775,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,776,436 UART: [afmc] ++
2,776,604 UART: [afmc] CDI.KEYID = 6
2,776,966 UART: [afmc] SUBJECT.KEYID = 7
2,777,391 UART: [afmc] AUTHORITY.KEYID = 5
2,812,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,911 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,763 UART: [afmc] --
2,855,857 UART: [cold-reset] --
2,856,661 UART: [state] Locking Datavault
2,857,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,552 UART: [state] Locking ICCM
2,859,044 UART: [exit] Launching FMC @ 0x40000130
2,864,373 UART:
2,864,389 UART: Running Caliptra FMC ...
2,864,797 UART:
2,864,851 UART: [state] CFI Enabled
2,875,194 UART: [fht] FMC Alias Private Key: 7
2,982,681 UART: [art] Extend RT PCRs Done
2,983,109 UART: [art] Lock RT PCRs Done
2,984,859 UART: [art] Populate DV Done
2,993,010 UART: [fht] FMC Alias Private Key: 7
2,993,956 UART: [art] Derive CDI
2,994,236 UART: [art] Store in in slot 0x4
3,080,207 UART: [art] Derive Key Pair
3,080,567 UART: [art] Store priv key in slot 0x5
3,093,853 UART: [art] Derive Key Pair - Done
3,108,774 UART: [art] Signing Cert with AUTHO
3,109,254 UART: RITY.KEYID = 7
3,124,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,083 UART: [art] PUB.X = 91611DB270302247EB5B90FDA0B819042A5F305950975249C15B521166E4B13BB8EF13FBCAF95ECA4E8C400FCC673A3A
3,131,853 UART: [art] PUB.Y = 496CD430F8EE0464B265E84D28E1D973DEEBE49FCC33ADA0087D5ADB3C20FABEED0982AFF0FD6C9FEF67DEDF3126AA98
3,138,826 UART: [art] SIG.R = 27BBA3BE8E4647EDFC5BA3C6777E84556ED507279A7F020A390579D34526EBEA1948A4C6904C34021EB8F7C29440ECFA
3,145,589 UART: [art] SIG.S = 58BD5E81A5E9C24F2548B3FDBF18A4A842F5F016D38844682B9DF76A38EA00FB1097E737AA37ECC710C21A9DC62A06CD
3,169,225 UART: Caliptra RT
3,169,479 UART: [state] CFI Enabled
3,276,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,628 UART: [rt]cmd =0x4d454153, len=108
3,329,035 >>> mbox cmd response data (12 bytes)
3,329,036 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,051 UART: [rt]cmd =0x44504543, len=92
3,557,798 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,987 UART: [kat] SHA2-256
903,927 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,662 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,389 UART: [cold-reset] ++
1,172,833 UART: [fht] FHT @ 0x50003400
1,175,488 UART: [idev] ++
1,175,656 UART: [idev] CDI.KEYID = 6
1,176,016 UART: [idev] SUBJECT.KEYID = 7
1,176,440 UART: [idev] UDS.KEYID = 0
1,176,785 ready_for_fw is high
1,176,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,502 UART: [idev] Erasing UDS.KEYID = 0
1,201,441 UART: [idev] Sha1 KeyId Algorithm
1,209,919 UART: [idev] --
1,210,931 UART: [ldev] ++
1,211,099 UART: [ldev] CDI.KEYID = 6
1,211,462 UART: [ldev] SUBJECT.KEYID = 5
1,211,888 UART: [ldev] AUTHORITY.KEYID = 7
1,212,351 UART: [ldev] FE.KEYID = 1
1,217,779 UART: [ldev] Erasing FE.KEYID = 1
1,243,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,282,942 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,286 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,070 >>> mbox cmd response: success
2,774,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,775,318 UART: [afmc] ++
2,775,486 UART: [afmc] CDI.KEYID = 6
2,775,848 UART: [afmc] SUBJECT.KEYID = 7
2,776,273 UART: [afmc] AUTHORITY.KEYID = 5
2,811,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,993 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,801 UART: [afmc] --
2,854,793 UART: [cold-reset] --
2,855,473 UART: [state] Locking Datavault
2,856,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,260 UART: [state] Locking ICCM
2,857,710 UART: [exit] Launching FMC @ 0x40000130
2,863,039 UART:
2,863,055 UART: Running Caliptra FMC ...
2,863,463 UART:
2,863,517 UART: [state] CFI Enabled
2,874,392 UART: [fht] FMC Alias Private Key: 7
2,983,019 UART: [art] Extend RT PCRs Done
2,983,447 UART: [art] Lock RT PCRs Done
2,984,909 UART: [art] Populate DV Done
2,993,136 UART: [fht] FMC Alias Private Key: 7
2,994,300 UART: [art] Derive CDI
2,994,580 UART: [art] Store in in slot 0x4
3,079,897 UART: [art] Derive Key Pair
3,080,257 UART: [art] Store priv key in slot 0x5
3,093,397 UART: [art] Derive Key Pair - Done
3,108,392 UART: [art] Signing Cert with AUTHO
3,108,872 UART: RITY.KEYID = 7
3,123,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,713 UART: [art] PUB.X = 91611DB270302247EB5B90FDA0B819042A5F305950975249C15B521166E4B13BB8EF13FBCAF95ECA4E8C400FCC673A3A
3,131,483 UART: [art] PUB.Y = 496CD430F8EE0464B265E84D28E1D973DEEBE49FCC33ADA0087D5ADB3C20FABEED0982AFF0FD6C9FEF67DEDF3126AA98
3,138,456 UART: [art] SIG.R = 27BBA3BE8E4647EDFC5BA3C6777E84556ED507279A7F020A390579D34526EBEA1948A4C6904C34021EB8F7C29440ECFA
3,145,219 UART: [art] SIG.S = 58BD5E81A5E9C24F2548B3FDBF18A4A842F5F016D38844682B9DF76A38EA00FB1097E737AA37ECC710C21A9DC62A06CD
3,168,809 UART: Caliptra RT
3,169,063 UART: [state] CFI Enabled
3,277,189 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,056 UART: [rt]cmd =0x44504543, len=96
3,348,369 >>> mbox cmd response data (56 bytes)
3,348,370 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,367 UART: [rt]cmd =0x44504543, len=92
3,578,132 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,221 >>> mbox cmd response data (12 bytes)
1,143,222 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,629,184 >>> mbox cmd response: success
2,629,184 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,826 UART:
2,691,842 UART: Running Caliptra FMC ...
2,692,250 UART:
2,692,304 UART: [state] CFI Enabled
2,702,831 UART: [fht] FMC Alias Private Key: 7
2,811,450 UART: [art] Extend RT PCRs Done
2,811,878 UART: [art] Lock RT PCRs Done
2,813,568 UART: [art] Populate DV Done
2,821,777 UART: [fht] FMC Alias Private Key: 7
2,822,767 UART: [art] Derive CDI
2,823,047 UART: [art] Store in in slot 0x4
2,908,982 UART: [art] Derive Key Pair
2,909,342 UART: [art] Store priv key in slot 0x5
2,921,808 UART: [art] Derive Key Pair - Done
2,936,689 UART: [art] Signing Cert with AUTHO
2,937,169 UART: RITY.KEYID = 7
2,952,211 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,976 UART: [art] PUB.X = 908A07C854C0562512C756C4F8BC04745202AB9D64FA7EAD3315E1F491ABF66BDBC2416B57FBBDC98E2193DBCEB31E67
2,959,751 UART: [art] PUB.Y = 2EAED9B042530A457A3AEDAAE1B352210F16F669B28036B47D1ABE817AD28B1698D978F9980F3061749FD4CA8231BBDC
2,966,702 UART: [art] SIG.R = C8019BD6A4801B74DB0977DC8F9F7B281322CA287DC2D4C518CF49725956909168E1597433BB99163210945FE9D73D89
2,973,458 UART: [art] SIG.S = F5EDB4C3F3FBFB6A4C6D3A31A23AD228820668E7D9385723A80485CADCD23B8B3A05CC9FF6B16FDEC9C50479C1606D6A
2,997,419 UART: Caliptra RT
2,997,673 UART: [state] CFI Enabled
3,117,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,115 UART: [rt]cmd =0x44504543, len=92
3,347,302 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,263 >>> mbox cmd response: success
2,626,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,688,305 UART:
2,688,321 UART: Running Caliptra FMC ...
2,688,729 UART:
2,688,783 UART: [state] CFI Enabled
2,699,274 UART: [fht] FMC Alias Private Key: 7
2,807,859 UART: [art] Extend RT PCRs Done
2,808,287 UART: [art] Lock RT PCRs Done
2,809,733 UART: [art] Populate DV Done
2,817,806 UART: [fht] FMC Alias Private Key: 7
2,818,860 UART: [art] Derive CDI
2,819,140 UART: [art] Store in in slot 0x4
2,904,959 UART: [art] Derive Key Pair
2,905,319 UART: [art] Store priv key in slot 0x5
2,918,549 UART: [art] Derive Key Pair - Done
2,933,506 UART: [art] Signing Cert with AUTHO
2,933,986 UART: RITY.KEYID = 7
2,948,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,659 UART: [art] PUB.X = 908A07C854C0562512C756C4F8BC04745202AB9D64FA7EAD3315E1F491ABF66BDBC2416B57FBBDC98E2193DBCEB31E67
2,956,434 UART: [art] PUB.Y = 2EAED9B042530A457A3AEDAAE1B352210F16F669B28036B47D1ABE817AD28B1698D978F9980F3061749FD4CA8231BBDC
2,963,385 UART: [art] SIG.R = C8019BD6A4801B74DB0977DC8F9F7B281322CA287DC2D4C518CF49725956909168E1597433BB99163210945FE9D73D89
2,970,141 UART: [art] SIG.S = F5EDB4C3F3FBFB6A4C6D3A31A23AD228820668E7D9385723A80485CADCD23B8B3A05CC9FF6B16FDEC9C50479C1606D6A
2,993,824 UART: Caliptra RT
2,994,078 UART: [state] CFI Enabled
3,101,203 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,932 UART: [rt]cmd =0x4d454153, len=108
3,152,499 >>> mbox cmd response data (12 bytes)
3,152,500 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,613 UART: [rt]cmd =0x44504543, len=92
3,381,940 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,595 ready_for_fw is high
1,059,595 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,513 >>> mbox cmd response: success
2,625,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,687,245 UART:
2,687,261 UART: Running Caliptra FMC ...
2,687,669 UART:
2,687,723 UART: [state] CFI Enabled
2,698,594 UART: [fht] FMC Alias Private Key: 7
2,806,283 UART: [art] Extend RT PCRs Done
2,806,711 UART: [art] Lock RT PCRs Done
2,808,271 UART: [art] Populate DV Done
2,816,398 UART: [fht] FMC Alias Private Key: 7
2,817,396 UART: [art] Derive CDI
2,817,676 UART: [art] Store in in slot 0x4
2,902,937 UART: [art] Derive Key Pair
2,903,297 UART: [art] Store priv key in slot 0x5
2,916,017 UART: [art] Derive Key Pair - Done
2,931,042 UART: [art] Signing Cert with AUTHO
2,931,522 UART: RITY.KEYID = 7
2,946,788 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,553 UART: [art] PUB.X = 908A07C854C0562512C756C4F8BC04745202AB9D64FA7EAD3315E1F491ABF66BDBC2416B57FBBDC98E2193DBCEB31E67
2,954,328 UART: [art] PUB.Y = 2EAED9B042530A457A3AEDAAE1B352210F16F669B28036B47D1ABE817AD28B1698D978F9980F3061749FD4CA8231BBDC
2,961,279 UART: [art] SIG.R = C8019BD6A4801B74DB0977DC8F9F7B281322CA287DC2D4C518CF49725956909168E1597433BB99163210945FE9D73D89
2,968,035 UART: [art] SIG.S = F5EDB4C3F3FBFB6A4C6D3A31A23AD228820668E7D9385723A80485CADCD23B8B3A05CC9FF6B16FDEC9C50479C1606D6A
2,991,468 UART: Caliptra RT
2,991,722 UART: [state] CFI Enabled
3,098,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,520 UART: [rt]cmd =0x44504543, len=96
3,170,423 >>> mbox cmd response data (56 bytes)
3,170,424 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,519 UART: [rt]cmd =0x44504543, len=92
3,398,544 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.62s
Truncated 4783 bytes from beginning
7
3,128,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,633 UART: [art] PUB.X = D1BF7CA1C2159D58894CC69DF446253CD6988C62F54D2EB59CBF46C9B7D4D451D49136570A507F431D98B1A762CBD9A5
3,136,408 UART: [art] PUB.Y = 6C35EBFF1C279D67C3F578FE9449241121D4D361ABCF38480EEE010241337A5D708A5499AD3C50AE7696127137CF2C22
3,143,349 UART: [art] SIG.R = 15DA5E73A7E11C2F82C2553041AA42D734B7F3B874109FDD1DE46ED4099BD774232C56ECDD763AB2A296EBA4AB2F72B1
3,150,130 UART: [art] SIG.S = C8AC6BF8ECD4CAF051FFAE6B7ED082D3CD2B0BE844DCC07DBF1C4DC0374AEB1CD86EE8FCB65A3D3597C40543668A04F1
3,173,992 UART: Caliptra RT
3,174,338 UART: [state] CFI Enabled
3,294,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,131 UART: [rt]cmd =0x44504543, len=92
3,524,768 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
893,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,668 UART: [kat] ++
897,820 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,359 UART: [kat] SHA2-512-ACC
908,260 UART: [kat] ECC-384
918,053 UART: [kat] HMAC-384Kdf
922,529 UART: [kat] LMS
1,170,857 UART: [kat] --
1,171,600 UART: [cold-reset] ++
1,172,110 UART: [fht] FHT @ 0x50003400
1,174,869 UART: [idev] ++
1,175,037 UART: [idev] CDI.KEYID = 6
1,175,397 UART: [idev] SUBJECT.KEYID = 7
1,175,821 UART: [idev] UDS.KEYID = 0
1,176,166 ready_for_fw is high
1,176,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,775 UART: [idev] Erasing UDS.KEYID = 0
1,201,378 UART: [idev] Sha1 KeyId Algorithm
1,209,846 UART: [idev] --
1,211,086 UART: [ldev] ++
1,211,254 UART: [ldev] CDI.KEYID = 6
1,211,617 UART: [ldev] SUBJECT.KEYID = 5
1,212,043 UART: [ldev] AUTHORITY.KEYID = 7
1,212,506 UART: [ldev] FE.KEYID = 1
1,217,962 UART: [ldev] Erasing FE.KEYID = 1
1,244,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,478 UART: [ldev] --
1,283,795 UART: [fwproc] Wait for Commands...
1,284,611 UART: [fwproc] Recv command 0x46574c44
1,285,339 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,747 >>> mbox cmd response: success
2,775,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,776,933 UART: [afmc] ++
2,777,101 UART: [afmc] CDI.KEYID = 6
2,777,463 UART: [afmc] SUBJECT.KEYID = 7
2,777,888 UART: [afmc] AUTHORITY.KEYID = 5
2,813,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,240 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,125 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,844 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,822 UART: [afmc] --
2,856,940 UART: [cold-reset] --
2,857,636 UART: [state] Locking Datavault
2,859,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,619 UART: [state] Locking ICCM
2,860,243 UART: [exit] Launching FMC @ 0x40000130
2,865,572 UART:
2,865,588 UART: Running Caliptra FMC ...
2,865,996 UART:
2,866,139 UART: [state] CFI Enabled
2,876,870 UART: [fht] FMC Alias Private Key: 7
2,985,067 UART: [art] Extend RT PCRs Done
2,985,495 UART: [art] Lock RT PCRs Done
2,987,201 UART: [art] Populate DV Done
2,995,442 UART: [fht] FMC Alias Private Key: 7
2,996,600 UART: [art] Derive CDI
2,996,880 UART: [art] Store in in slot 0x4
3,082,847 UART: [art] Derive Key Pair
3,083,207 UART: [art] Store priv key in slot 0x5
3,096,551 UART: [art] Derive Key Pair - Done
3,111,209 UART: [art] Signing Cert with AUTHO
3,111,689 UART: RITY.KEYID = 7
3,126,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,676 UART: [art] PUB.X = D1BF7CA1C2159D58894CC69DF446253CD6988C62F54D2EB59CBF46C9B7D4D451D49136570A507F431D98B1A762CBD9A5
3,134,451 UART: [art] PUB.Y = 6C35EBFF1C279D67C3F578FE9449241121D4D361ABCF38480EEE010241337A5D708A5499AD3C50AE7696127137CF2C22
3,141,392 UART: [art] SIG.R = 15DA5E73A7E11C2F82C2553041AA42D734B7F3B874109FDD1DE46ED4099BD774232C56ECDD763AB2A296EBA4AB2F72B1
3,148,173 UART: [art] SIG.S = C8AC6BF8ECD4CAF051FFAE6B7ED082D3CD2B0BE844DCC07DBF1C4DC0374AEB1CD86EE8FCB65A3D3597C40543668A04F1
3,171,861 UART: Caliptra RT
3,172,207 UART: [state] CFI Enabled
3,280,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,030 UART: [rt]cmd =0x4d454153, len=108
3,332,301 >>> mbox cmd response data (12 bytes)
3,332,302 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,337 UART: [rt]cmd =0x44504543, len=92
3,560,536 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,795 UART: [kat] HMAC-384Kdf
923,509 UART: [kat] LMS
1,171,837 UART: [kat] --
1,172,848 UART: [cold-reset] ++
1,173,270 UART: [fht] FHT @ 0x50003400
1,176,049 UART: [idev] ++
1,176,217 UART: [idev] CDI.KEYID = 6
1,176,577 UART: [idev] SUBJECT.KEYID = 7
1,177,001 UART: [idev] UDS.KEYID = 0
1,177,346 ready_for_fw is high
1,177,346 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,119 UART: [idev] Erasing UDS.KEYID = 0
1,202,438 UART: [idev] Sha1 KeyId Algorithm
1,210,950 UART: [idev] --
1,211,930 UART: [ldev] ++
1,212,098 UART: [ldev] CDI.KEYID = 6
1,212,461 UART: [ldev] SUBJECT.KEYID = 5
1,212,887 UART: [ldev] AUTHORITY.KEYID = 7
1,213,350 UART: [ldev] FE.KEYID = 1
1,218,716 UART: [ldev] Erasing FE.KEYID = 1
1,245,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,392 UART: [ldev] --
1,284,809 UART: [fwproc] Wait for Commands...
1,285,441 UART: [fwproc] Recv command 0x46574c44
1,286,169 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,777,037 >>> mbox cmd response: success
2,777,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,778,265 UART: [afmc] ++
2,778,433 UART: [afmc] CDI.KEYID = 6
2,778,795 UART: [afmc] SUBJECT.KEYID = 7
2,779,220 UART: [afmc] AUTHORITY.KEYID = 5
2,815,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,650 UART: [afmc] --
2,858,682 UART: [cold-reset] --
2,859,496 UART: [state] Locking Datavault
2,860,763 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,367 UART: [state] Locking ICCM
2,862,005 UART: [exit] Launching FMC @ 0x40000130
2,867,334 UART:
2,867,350 UART: Running Caliptra FMC ...
2,867,758 UART:
2,867,901 UART: [state] CFI Enabled
2,878,512 UART: [fht] FMC Alias Private Key: 7
2,986,347 UART: [art] Extend RT PCRs Done
2,986,775 UART: [art] Lock RT PCRs Done
2,988,365 UART: [art] Populate DV Done
2,996,662 UART: [fht] FMC Alias Private Key: 7
2,997,728 UART: [art] Derive CDI
2,998,008 UART: [art] Store in in slot 0x4
3,084,101 UART: [art] Derive Key Pair
3,084,461 UART: [art] Store priv key in slot 0x5
3,097,935 UART: [art] Derive Key Pair - Done
3,112,297 UART: [art] Signing Cert with AUTHO
3,112,777 UART: RITY.KEYID = 7
3,127,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,474 UART: [art] PUB.X = D1BF7CA1C2159D58894CC69DF446253CD6988C62F54D2EB59CBF46C9B7D4D451D49136570A507F431D98B1A762CBD9A5
3,135,249 UART: [art] PUB.Y = 6C35EBFF1C279D67C3F578FE9449241121D4D361ABCF38480EEE010241337A5D708A5499AD3C50AE7696127137CF2C22
3,142,190 UART: [art] SIG.R = 15DA5E73A7E11C2F82C2553041AA42D734B7F3B874109FDD1DE46ED4099BD774232C56ECDD763AB2A296EBA4AB2F72B1
3,148,971 UART: [art] SIG.S = C8AC6BF8ECD4CAF051FFAE6B7ED082D3CD2B0BE844DCC07DBF1C4DC0374AEB1CD86EE8FCB65A3D3597C40543668A04F1
3,172,529 UART: Caliptra RT
3,172,875 UART: [state] CFI Enabled
3,280,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,956 UART: [rt]cmd =0x44504543, len=96
3,351,765 >>> mbox cmd response data (56 bytes)
3,351,766 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,531 UART: [rt]cmd =0x44504543, len=92
3,581,476 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,108 >>> mbox cmd response data (12 bytes)
1,145,109 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,631,401 >>> mbox cmd response: success
2,631,401 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,693,803 UART:
2,693,819 UART: Running Caliptra FMC ...
2,694,227 UART:
2,694,370 UART: [state] CFI Enabled
2,705,345 UART: [fht] FMC Alias Private Key: 7
2,813,364 UART: [art] Extend RT PCRs Done
2,813,792 UART: [art] Lock RT PCRs Done
2,815,194 UART: [art] Populate DV Done
2,823,479 UART: [fht] FMC Alias Private Key: 7
2,824,629 UART: [art] Derive CDI
2,824,909 UART: [art] Store in in slot 0x4
2,910,360 UART: [art] Derive Key Pair
2,910,720 UART: [art] Store priv key in slot 0x5
2,924,758 UART: [art] Derive Key Pair - Done
2,939,657 UART: [art] Signing Cert with AUTHO
2,940,137 UART: RITY.KEYID = 7
2,954,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,754 UART: [art] PUB.X = 896BDF8528B51D5D0C8500AB488BF7BEF909733E9B902F5E5707F0E1107BB96984C845350F07A6865CE65B65FEC40498
2,962,484 UART: [art] PUB.Y = 57F2BF0B5291694D1A33D5CF76CFAB64E5B1FDDA74FC41E72A69D6180BFD92E414D2C20B8C84FFB108D64B8567DB9A17
2,969,440 UART: [art] SIG.R = FB4926A8B4934E0D079486191BCB057ED531571DC21317BE9D07587BE89F62CE96CD23D95D59C89196E905F4928E65AF
2,976,195 UART: [art] SIG.S = 1A46ABDAD3E152535ABE244012BC9F62613BAE30A8AFB8F2111B7058980AF1832D090985047A646A02A1B40D09D35894
2,999,195 UART: Caliptra RT
2,999,541 UART: [state] CFI Enabled
3,118,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,230 UART: [rt]cmd =0x44504543, len=92
3,348,670 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,614 ready_for_fw is high
1,060,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,352 >>> mbox cmd response: success
2,626,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,688,844 UART:
2,688,860 UART: Running Caliptra FMC ...
2,689,268 UART:
2,689,411 UART: [state] CFI Enabled
2,699,882 UART: [fht] FMC Alias Private Key: 7
2,808,113 UART: [art] Extend RT PCRs Done
2,808,541 UART: [art] Lock RT PCRs Done
2,810,151 UART: [art] Populate DV Done
2,818,586 UART: [fht] FMC Alias Private Key: 7
2,819,526 UART: [art] Derive CDI
2,819,806 UART: [art] Store in in slot 0x4
2,905,061 UART: [art] Derive Key Pair
2,905,421 UART: [art] Store priv key in slot 0x5
2,918,257 UART: [art] Derive Key Pair - Done
2,933,048 UART: [art] Signing Cert with AUTHO
2,933,528 UART: RITY.KEYID = 7
2,948,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,393 UART: [art] PUB.X = 896BDF8528B51D5D0C8500AB488BF7BEF909733E9B902F5E5707F0E1107BB96984C845350F07A6865CE65B65FEC40498
2,956,123 UART: [art] PUB.Y = 57F2BF0B5291694D1A33D5CF76CFAB64E5B1FDDA74FC41E72A69D6180BFD92E414D2C20B8C84FFB108D64B8567DB9A17
2,963,079 UART: [art] SIG.R = FB4926A8B4934E0D079486191BCB057ED531571DC21317BE9D07587BE89F62CE96CD23D95D59C89196E905F4928E65AF
2,969,834 UART: [art] SIG.S = 1A46ABDAD3E152535ABE244012BC9F62613BAE30A8AFB8F2111B7058980AF1832D090985047A646A02A1B40D09D35894
2,992,804 UART: Caliptra RT
2,993,150 UART: [state] CFI Enabled
3,100,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,591 UART: [rt]cmd =0x4d454153, len=108
3,152,476 >>> mbox cmd response data (12 bytes)
3,152,477 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,464 UART: [rt]cmd =0x44504543, len=92
3,382,226 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 ready_for_fw is high
1,060,768 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,629,608 >>> mbox cmd response: success
2,629,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,692,284 UART:
2,692,300 UART: Running Caliptra FMC ...
2,692,708 UART:
2,692,851 UART: [state] CFI Enabled
2,703,282 UART: [fht] FMC Alias Private Key: 7
2,811,459 UART: [art] Extend RT PCRs Done
2,811,887 UART: [art] Lock RT PCRs Done
2,813,459 UART: [art] Populate DV Done
2,821,446 UART: [fht] FMC Alias Private Key: 7
2,822,412 UART: [art] Derive CDI
2,822,692 UART: [art] Store in in slot 0x4
2,908,137 UART: [art] Derive Key Pair
2,908,497 UART: [art] Store priv key in slot 0x5
2,922,009 UART: [art] Derive Key Pair - Done
2,936,776 UART: [art] Signing Cert with AUTHO
2,937,256 UART: RITY.KEYID = 7
2,952,208 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,973 UART: [art] PUB.X = 896BDF8528B51D5D0C8500AB488BF7BEF909733E9B902F5E5707F0E1107BB96984C845350F07A6865CE65B65FEC40498
2,959,703 UART: [art] PUB.Y = 57F2BF0B5291694D1A33D5CF76CFAB64E5B1FDDA74FC41E72A69D6180BFD92E414D2C20B8C84FFB108D64B8567DB9A17
2,966,659 UART: [art] SIG.R = FB4926A8B4934E0D079486191BCB057ED531571DC21317BE9D07587BE89F62CE96CD23D95D59C89196E905F4928E65AF
2,973,414 UART: [art] SIG.S = 1A46ABDAD3E152535ABE244012BC9F62613BAE30A8AFB8F2111B7058980AF1832D090985047A646A02A1B40D09D35894
2,997,334 UART: Caliptra RT
2,997,680 UART: [state] CFI Enabled
3,105,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,575 UART: [rt]cmd =0x44504543, len=96
3,176,840 >>> mbox cmd response data (56 bytes)
3,176,841 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,207,004 UART: [rt]cmd =0x44504543, len=92
3,405,348 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.83s
Truncated 4783 bytes from beginning
7
3,126,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,796 UART: [art] PUB.X = 2ADF77893DD04203F5E72F98F9AD3B9AC1830A212238EB491B737C39E6C6649412CAE7E2ED78FF183FE194AD96DFB99F
3,133,572 UART: [art] PUB.Y = 52EF2C773A20D3527A428CEB6CA50CE55A0AD30750C33F7EAC212BC826C1EB2C1533F54D43FB9F217A313A16F6DC099F
3,140,524 UART: [art] SIG.R = 80CF82758004C8FAEFD1E9DE1E6F686E925AC5FC829FDC6D43F8E7BC1240A639E1C828F16AD319DE94BF81DF363A9F20
3,147,309 UART: [art] SIG.S = 76DE2C2BF255B9B70ABD078CDA247CD84DE98C82580119E20266B3E476CCA27B0FE3143ECD49B98D88ED01D54BE2686D
3,171,290 UART: Caliptra RT
3,171,544 UART: [state] CFI Enabled
3,291,740 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,269 UART: [rt]cmd =0x44504543, len=92
3,521,619 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 ready_for_fw is high
1,174,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,128 UART: [ldev] ++
1,209,296 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,087 UART: [ldev] AUTHORITY.KEYID = 7
1,210,550 UART: [ldev] FE.KEYID = 1
1,215,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,756 UART: [fwproc] Wait for Commands...
1,281,473 UART: [fwproc] Recv command 0x46574c44
1,282,206 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,514 >>> mbox cmd response: success
2,772,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,773,611 UART: [afmc] ++
2,773,779 UART: [afmc] CDI.KEYID = 6
2,774,142 UART: [afmc] SUBJECT.KEYID = 7
2,774,568 UART: [afmc] AUTHORITY.KEYID = 5
2,810,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,993 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,722 UART: [afmc] --
2,853,804 UART: [cold-reset] --
2,854,764 UART: [state] Locking Datavault
2,856,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,667 UART: [state] Locking ICCM
2,857,137 UART: [exit] Launching FMC @ 0x40000130
2,862,466 UART:
2,862,482 UART: Running Caliptra FMC ...
2,862,890 UART:
2,862,944 UART: [state] CFI Enabled
2,873,327 UART: [fht] FMC Alias Private Key: 7
2,980,920 UART: [art] Extend RT PCRs Done
2,981,348 UART: [art] Lock RT PCRs Done
2,982,956 UART: [art] Populate DV Done
2,990,895 UART: [fht] FMC Alias Private Key: 7
2,991,897 UART: [art] Derive CDI
2,992,177 UART: [art] Store in in slot 0x4
3,077,664 UART: [art] Derive Key Pair
3,078,024 UART: [art] Store priv key in slot 0x5
3,091,402 UART: [art] Derive Key Pair - Done
3,106,408 UART: [art] Signing Cert with AUTHO
3,106,888 UART: RITY.KEYID = 7
3,121,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,523 UART: [art] PUB.X = 2ADF77893DD04203F5E72F98F9AD3B9AC1830A212238EB491B737C39E6C6649412CAE7E2ED78FF183FE194AD96DFB99F
3,129,299 UART: [art] PUB.Y = 52EF2C773A20D3527A428CEB6CA50CE55A0AD30750C33F7EAC212BC826C1EB2C1533F54D43FB9F217A313A16F6DC099F
3,136,251 UART: [art] SIG.R = 80CF82758004C8FAEFD1E9DE1E6F686E925AC5FC829FDC6D43F8E7BC1240A639E1C828F16AD319DE94BF81DF363A9F20
3,143,036 UART: [art] SIG.S = 76DE2C2BF255B9B70ABD078CDA247CD84DE98C82580119E20266B3E476CCA27B0FE3143ECD49B98D88ED01D54BE2686D
3,166,727 UART: Caliptra RT
3,166,981 UART: [state] CFI Enabled
3,274,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,676 UART: [rt]cmd =0x4d454153, len=108
3,326,481 >>> mbox cmd response data (12 bytes)
3,326,482 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,595 UART: [rt]cmd =0x44504543, len=92
3,555,033 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,546 UART: [kat] LMS
1,168,858 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,174,329 ready_for_fw is high
1,174,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,821 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,654 UART: [ldev] --
1,280,940 UART: [fwproc] Wait for Commands...
1,281,721 UART: [fwproc] Recv command 0x46574c44
1,282,454 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,444 >>> mbox cmd response: success
2,773,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,659 UART: [afmc] ++
2,774,827 UART: [afmc] CDI.KEYID = 6
2,775,190 UART: [afmc] SUBJECT.KEYID = 7
2,775,616 UART: [afmc] AUTHORITY.KEYID = 5
2,811,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,028 UART: [afmc] --
2,855,120 UART: [cold-reset] --
2,856,102 UART: [state] Locking Datavault
2,857,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,087 UART: [state] Locking ICCM
2,858,655 UART: [exit] Launching FMC @ 0x40000130
2,863,984 UART:
2,864,000 UART: Running Caliptra FMC ...
2,864,408 UART:
2,864,462 UART: [state] CFI Enabled
2,875,087 UART: [fht] FMC Alias Private Key: 7
2,983,646 UART: [art] Extend RT PCRs Done
2,984,074 UART: [art] Lock RT PCRs Done
2,985,454 UART: [art] Populate DV Done
2,993,655 UART: [fht] FMC Alias Private Key: 7
2,994,799 UART: [art] Derive CDI
2,995,079 UART: [art] Store in in slot 0x4
3,080,550 UART: [art] Derive Key Pair
3,080,910 UART: [art] Store priv key in slot 0x5
3,093,870 UART: [art] Derive Key Pair - Done
3,108,432 UART: [art] Signing Cert with AUTHO
3,108,912 UART: RITY.KEYID = 7
3,124,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,427 UART: [art] PUB.X = 2ADF77893DD04203F5E72F98F9AD3B9AC1830A212238EB491B737C39E6C6649412CAE7E2ED78FF183FE194AD96DFB99F
3,132,203 UART: [art] PUB.Y = 52EF2C773A20D3527A428CEB6CA50CE55A0AD30750C33F7EAC212BC826C1EB2C1533F54D43FB9F217A313A16F6DC099F
3,139,155 UART: [art] SIG.R = 80CF82758004C8FAEFD1E9DE1E6F686E925AC5FC829FDC6D43F8E7BC1240A639E1C828F16AD319DE94BF81DF363A9F20
3,145,940 UART: [art] SIG.S = 76DE2C2BF255B9B70ABD078CDA247CD84DE98C82580119E20266B3E476CCA27B0FE3143ECD49B98D88ED01D54BE2686D
3,169,641 UART: Caliptra RT
3,169,895 UART: [state] CFI Enabled
3,277,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,270 UART: [rt]cmd =0x44504543, len=96
3,348,883 >>> mbox cmd response data (56 bytes)
3,348,884 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,703 UART: [rt]cmd =0x44504543, len=92
3,577,043 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,006 >>> mbox cmd response data (12 bytes)
1,139,007 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,932 >>> mbox cmd response: success
2,625,932 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,688,414 UART:
2,688,430 UART: Running Caliptra FMC ...
2,688,838 UART:
2,688,892 UART: [state] CFI Enabled
2,699,445 UART: [fht] FMC Alias Private Key: 7
2,807,644 UART: [art] Extend RT PCRs Done
2,808,072 UART: [art] Lock RT PCRs Done
2,809,750 UART: [art] Populate DV Done
2,817,887 UART: [fht] FMC Alias Private Key: 7
2,818,979 UART: [art] Derive CDI
2,819,259 UART: [art] Store in in slot 0x4
2,904,966 UART: [art] Derive Key Pair
2,905,326 UART: [art] Store priv key in slot 0x5
2,918,158 UART: [art] Derive Key Pair - Done
2,933,054 UART: [art] Signing Cert with AUTHO
2,933,534 UART: RITY.KEYID = 7
2,948,876 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,641 UART: [art] PUB.X = A451CF7DD742DE1ECB44722B3C194B4C082BE42F871B3BC32FBB15B93E7153F386C426072218C5289B9081179BAC3BAF
2,956,413 UART: [art] PUB.Y = EBADDCD3DEC004B60C9D7A316B4CC45FF3FBB7096ED2D5CA2678102663E67A2C3007762FB3946BAED32D6EE965CBE20A
2,963,372 UART: [art] SIG.R = DEB7F2EA040174ED5759B677FB4EAF8286F04D5216EBAE04A0DEEFF624B27B7CAB1FFEA790C3BA141BDAB1F87D02849F
2,970,158 UART: [art] SIG.S = 96B7384D4EE10DA5FB00A4AE5B15C547921BFE6E54326AFD52CF914AB1E80281184023240439B65A5C735ACA57145AF6
2,993,668 UART: Caliptra RT
2,993,922 UART: [state] CFI Enabled
3,113,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,248 UART: [rt]cmd =0x44504543, len=92
3,343,074 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,446 ready_for_fw is high
1,056,446 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,820 >>> mbox cmd response: success
2,621,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,684,250 UART:
2,684,266 UART: Running Caliptra FMC ...
2,684,674 UART:
2,684,728 UART: [state] CFI Enabled
2,694,925 UART: [fht] FMC Alias Private Key: 7
2,802,850 UART: [art] Extend RT PCRs Done
2,803,278 UART: [art] Lock RT PCRs Done
2,804,412 UART: [art] Populate DV Done
2,812,597 UART: [fht] FMC Alias Private Key: 7
2,813,579 UART: [art] Derive CDI
2,813,859 UART: [art] Store in in slot 0x4
2,899,304 UART: [art] Derive Key Pair
2,899,664 UART: [art] Store priv key in slot 0x5
2,912,798 UART: [art] Derive Key Pair - Done
2,927,370 UART: [art] Signing Cert with AUTHO
2,927,850 UART: RITY.KEYID = 7
2,942,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,757 UART: [art] PUB.X = A451CF7DD742DE1ECB44722B3C194B4C082BE42F871B3BC32FBB15B93E7153F386C426072218C5289B9081179BAC3BAF
2,950,529 UART: [art] PUB.Y = EBADDCD3DEC004B60C9D7A316B4CC45FF3FBB7096ED2D5CA2678102663E67A2C3007762FB3946BAED32D6EE965CBE20A
2,957,488 UART: [art] SIG.R = DEB7F2EA040174ED5759B677FB4EAF8286F04D5216EBAE04A0DEEFF624B27B7CAB1FFEA790C3BA141BDAB1F87D02849F
2,964,274 UART: [art] SIG.S = 96B7384D4EE10DA5FB00A4AE5B15C547921BFE6E54326AFD52CF914AB1E80281184023240439B65A5C735ACA57145AF6
2,988,088 UART: Caliptra RT
2,988,342 UART: [state] CFI Enabled
3,097,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,088 UART: [rt]cmd =0x4d454153, len=108
3,148,387 >>> mbox cmd response data (12 bytes)
3,148,388 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,451 UART: [rt]cmd =0x44504543, len=92
3,378,115 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,212 ready_for_fw is high
1,056,212 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,184 >>> mbox cmd response: success
2,622,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,684,080 UART:
2,684,096 UART: Running Caliptra FMC ...
2,684,504 UART:
2,684,558 UART: [state] CFI Enabled
2,694,767 UART: [fht] FMC Alias Private Key: 7
2,802,790 UART: [art] Extend RT PCRs Done
2,803,218 UART: [art] Lock RT PCRs Done
2,804,456 UART: [art] Populate DV Done
2,812,749 UART: [fht] FMC Alias Private Key: 7
2,813,677 UART: [art] Derive CDI
2,813,957 UART: [art] Store in in slot 0x4
2,900,122 UART: [art] Derive Key Pair
2,900,482 UART: [art] Store priv key in slot 0x5
2,913,748 UART: [art] Derive Key Pair - Done
2,928,488 UART: [art] Signing Cert with AUTHO
2,928,968 UART: RITY.KEYID = 7
2,944,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,183 UART: [art] PUB.X = A451CF7DD742DE1ECB44722B3C194B4C082BE42F871B3BC32FBB15B93E7153F386C426072218C5289B9081179BAC3BAF
2,951,955 UART: [art] PUB.Y = EBADDCD3DEC004B60C9D7A316B4CC45FF3FBB7096ED2D5CA2678102663E67A2C3007762FB3946BAED32D6EE965CBE20A
2,958,914 UART: [art] SIG.R = DEB7F2EA040174ED5759B677FB4EAF8286F04D5216EBAE04A0DEEFF624B27B7CAB1FFEA790C3BA141BDAB1F87D02849F
2,965,700 UART: [art] SIG.S = 96B7384D4EE10DA5FB00A4AE5B15C547921BFE6E54326AFD52CF914AB1E80281184023240439B65A5C735ACA57145AF6
2,989,536 UART: Caliptra RT
2,989,790 UART: [state] CFI Enabled
3,097,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,046 UART: [rt]cmd =0x44504543, len=96
3,169,155 >>> mbox cmd response data (56 bytes)
3,169,156 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,135 UART: [rt]cmd =0x44504543, len=92
3,397,897 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.66s
Truncated 4783 bytes from beginning
7
3,130,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,303 UART: [art] PUB.X = 0914099B5004F3154AC42D0762796A24A96064D041EF02FD573AD827833E95A4398B934D2A6DB9800020E8416B25E3D3
3,138,024 UART: [art] PUB.Y = 861D524D4A23E30438824E74F4D87779CB63AAD26940F2D2F23AE0D062D0118D333391CD10682B25E77799BF34FE1251
3,144,965 UART: [art] SIG.R = 1BF8100C6AA184B319C9C077BF952FE822331D863AEF15AD9C2AEE8921C6408E306E822AFA5F5416B9F3FD64025D909B
3,151,737 UART: [art] SIG.S = B6AE998538BF4A32B5995C62D913E9DFA26710FCBEA09E06CD215946BF760499F1DC1F555045BE676136EED307F17F7C
3,175,445 UART: Caliptra RT
3,175,791 UART: [state] CFI Enabled
3,295,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,352 UART: [rt]cmd =0x44504543, len=92
3,525,647 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,174,240 ready_for_fw is high
1,174,240 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,558 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,131 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,377 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,237 UART: [ldev] --
1,282,557 UART: [fwproc] Wait for Commands...
1,283,148 UART: [fwproc] Recv command 0x46574c44
1,283,881 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,097 >>> mbox cmd response: success
2,774,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,775,306 UART: [afmc] ++
2,775,474 UART: [afmc] CDI.KEYID = 6
2,775,837 UART: [afmc] SUBJECT.KEYID = 7
2,776,263 UART: [afmc] AUTHORITY.KEYID = 5
2,811,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,153 UART: [afmc] --
2,855,093 UART: [cold-reset] --
2,855,789 UART: [state] Locking Datavault
2,856,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,590 UART: [state] Locking ICCM
2,858,118 UART: [exit] Launching FMC @ 0x40000130
2,863,447 UART:
2,863,463 UART: Running Caliptra FMC ...
2,863,871 UART:
2,864,014 UART: [state] CFI Enabled
2,874,503 UART: [fht] FMC Alias Private Key: 7
2,982,114 UART: [art] Extend RT PCRs Done
2,982,542 UART: [art] Lock RT PCRs Done
2,984,036 UART: [art] Populate DV Done
2,992,277 UART: [fht] FMC Alias Private Key: 7
2,993,417 UART: [art] Derive CDI
2,993,697 UART: [art] Store in in slot 0x4
3,079,426 UART: [art] Derive Key Pair
3,079,786 UART: [art] Store priv key in slot 0x5
3,093,162 UART: [art] Derive Key Pair - Done
3,107,997 UART: [art] Signing Cert with AUTHO
3,108,477 UART: RITY.KEYID = 7
3,123,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,536 UART: [art] PUB.X = 0914099B5004F3154AC42D0762796A24A96064D041EF02FD573AD827833E95A4398B934D2A6DB9800020E8416B25E3D3
3,131,257 UART: [art] PUB.Y = 861D524D4A23E30438824E74F4D87779CB63AAD26940F2D2F23AE0D062D0118D333391CD10682B25E77799BF34FE1251
3,138,198 UART: [art] SIG.R = 1BF8100C6AA184B319C9C077BF952FE822331D863AEF15AD9C2AEE8921C6408E306E822AFA5F5416B9F3FD64025D909B
3,144,970 UART: [art] SIG.S = B6AE998538BF4A32B5995C62D913E9DFA26710FCBEA09E06CD215946BF760499F1DC1F555045BE676136EED307F17F7C
3,168,440 UART: Caliptra RT
3,168,786 UART: [state] CFI Enabled
3,277,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,373 UART: [rt]cmd =0x4d454153, len=108
3,328,946 >>> mbox cmd response data (12 bytes)
3,328,947 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,868 UART: [rt]cmd =0x44504543, len=92
3,558,081 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
905,117 UART: [kat] SHA2-512-ACC
907,018 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,560 UART: [idev] ++
1,173,728 UART: [idev] CDI.KEYID = 6
1,174,089 UART: [idev] SUBJECT.KEYID = 7
1,174,514 UART: [idev] UDS.KEYID = 0
1,174,860 ready_for_fw is high
1,174,860 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,296 UART: [idev] --
1,208,371 UART: [ldev] ++
1,208,539 UART: [ldev] CDI.KEYID = 6
1,208,903 UART: [ldev] SUBJECT.KEYID = 5
1,209,330 UART: [ldev] AUTHORITY.KEYID = 7
1,209,793 UART: [ldev] FE.KEYID = 1
1,215,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,901 UART: [ldev] --
1,281,201 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,485 >>> mbox cmd response: success
2,772,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,554 UART: [afmc] ++
2,773,722 UART: [afmc] CDI.KEYID = 6
2,774,085 UART: [afmc] SUBJECT.KEYID = 7
2,774,511 UART: [afmc] AUTHORITY.KEYID = 5
2,810,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,425 UART: [afmc] --
2,853,483 UART: [cold-reset] --
2,854,375 UART: [state] Locking Datavault
2,855,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,000 UART: [state] Locking ICCM
2,856,638 UART: [exit] Launching FMC @ 0x40000130
2,861,967 UART:
2,861,983 UART: Running Caliptra FMC ...
2,862,391 UART:
2,862,534 UART: [state] CFI Enabled
2,873,267 UART: [fht] FMC Alias Private Key: 7
2,981,592 UART: [art] Extend RT PCRs Done
2,982,020 UART: [art] Lock RT PCRs Done
2,983,420 UART: [art] Populate DV Done
2,991,831 UART: [fht] FMC Alias Private Key: 7
2,992,995 UART: [art] Derive CDI
2,993,275 UART: [art] Store in in slot 0x4
3,078,404 UART: [art] Derive Key Pair
3,078,764 UART: [art] Store priv key in slot 0x5
3,092,162 UART: [art] Derive Key Pair - Done
3,107,101 UART: [art] Signing Cert with AUTHO
3,107,581 UART: RITY.KEYID = 7
3,122,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,548 UART: [art] PUB.X = 0914099B5004F3154AC42D0762796A24A96064D041EF02FD573AD827833E95A4398B934D2A6DB9800020E8416B25E3D3
3,130,269 UART: [art] PUB.Y = 861D524D4A23E30438824E74F4D87779CB63AAD26940F2D2F23AE0D062D0118D333391CD10682B25E77799BF34FE1251
3,137,210 UART: [art] SIG.R = 1BF8100C6AA184B319C9C077BF952FE822331D863AEF15AD9C2AEE8921C6408E306E822AFA5F5416B9F3FD64025D909B
3,143,982 UART: [art] SIG.S = B6AE998538BF4A32B5995C62D913E9DFA26710FCBEA09E06CD215946BF760499F1DC1F555045BE676136EED307F17F7C
3,167,656 UART: Caliptra RT
3,168,002 UART: [state] CFI Enabled
3,275,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,613 UART: [rt]cmd =0x44504543, len=96
3,347,766 >>> mbox cmd response data (56 bytes)
3,347,767 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,518 UART: [rt]cmd =0x44504543, len=92
3,577,191 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,107 >>> mbox cmd response data (12 bytes)
1,141,108 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,175 >>> mbox cmd response: success
2,627,175 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,771 UART:
2,689,787 UART: Running Caliptra FMC ...
2,690,195 UART:
2,690,338 UART: [state] CFI Enabled
2,701,171 UART: [fht] FMC Alias Private Key: 7
2,809,432 UART: [art] Extend RT PCRs Done
2,809,860 UART: [art] Lock RT PCRs Done
2,811,510 UART: [art] Populate DV Done
2,819,647 UART: [fht] FMC Alias Private Key: 7
2,820,761 UART: [art] Derive CDI
2,821,041 UART: [art] Store in in slot 0x4
2,907,108 UART: [art] Derive Key Pair
2,907,468 UART: [art] Store priv key in slot 0x5
2,920,786 UART: [art] Derive Key Pair - Done
2,935,465 UART: [art] Signing Cert with AUTHO
2,935,945 UART: RITY.KEYID = 7
2,951,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,104 UART: [art] PUB.X = 2C2C9E619DAFCD4AC91F45D3776BD737DF61624CD332BD19CAFBA2AA0F0C31AD3813B3F9523C88947D3C52E308C3E1F6
2,958,883 UART: [art] PUB.Y = 279598782314258133C1BF73CFBFAFF60887D4ACC918686377B489CEC1C9B98777A17FD9E2E2CD4B29E2275F3A0B9432
2,965,829 UART: [art] SIG.R = 5E24BC28BCE4260D62C984AAD5F7A0D9648577EBF9314611DE0B416B84DDF8F8AD804C8301DA0587623DE602693F258E
2,972,590 UART: [art] SIG.S = 82BEB8E4848D6823D09B9A3A9B40BFE6B8C6AD5A0D58D12543AF3CA99404ECEEB6DC79CA73A93B5F5321E1F037C4B017
2,995,615 UART: Caliptra RT
2,995,961 UART: [state] CFI Enabled
3,116,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,184 UART: [rt]cmd =0x44504543, len=92
3,345,701 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,655 ready_for_fw is high
1,056,655 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,817 >>> mbox cmd response: success
2,623,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,685,589 UART:
2,685,605 UART: Running Caliptra FMC ...
2,686,013 UART:
2,686,156 UART: [state] CFI Enabled
2,696,533 UART: [fht] FMC Alias Private Key: 7
2,804,600 UART: [art] Extend RT PCRs Done
2,805,028 UART: [art] Lock RT PCRs Done
2,806,718 UART: [art] Populate DV Done
2,815,051 UART: [fht] FMC Alias Private Key: 7
2,816,079 UART: [art] Derive CDI
2,816,359 UART: [art] Store in in slot 0x4
2,902,238 UART: [art] Derive Key Pair
2,902,598 UART: [art] Store priv key in slot 0x5
2,916,278 UART: [art] Derive Key Pair - Done
2,931,127 UART: [art] Signing Cert with AUTHO
2,931,607 UART: RITY.KEYID = 7
2,946,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,530 UART: [art] PUB.X = 2C2C9E619DAFCD4AC91F45D3776BD737DF61624CD332BD19CAFBA2AA0F0C31AD3813B3F9523C88947D3C52E308C3E1F6
2,954,309 UART: [art] PUB.Y = 279598782314258133C1BF73CFBFAFF60887D4ACC918686377B489CEC1C9B98777A17FD9E2E2CD4B29E2275F3A0B9432
2,961,255 UART: [art] SIG.R = 5E24BC28BCE4260D62C984AAD5F7A0D9648577EBF9314611DE0B416B84DDF8F8AD804C8301DA0587623DE602693F258E
2,968,016 UART: [art] SIG.S = 82BEB8E4848D6823D09B9A3A9B40BFE6B8C6AD5A0D58D12543AF3CA99404ECEEB6DC79CA73A93B5F5321E1F037C4B017
2,991,961 UART: Caliptra RT
2,992,307 UART: [state] CFI Enabled
3,100,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,212 UART: [rt]cmd =0x4d454153, len=108
3,152,057 >>> mbox cmd response data (12 bytes)
3,152,058 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,133 UART: [rt]cmd =0x44504543, len=92
3,380,542 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,447 ready_for_fw is high
1,056,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,913 >>> mbox cmd response: success
2,622,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,249 UART:
2,685,265 UART: Running Caliptra FMC ...
2,685,673 UART:
2,685,816 UART: [state] CFI Enabled
2,696,249 UART: [fht] FMC Alias Private Key: 7
2,804,080 UART: [art] Extend RT PCRs Done
2,804,508 UART: [art] Lock RT PCRs Done
2,806,116 UART: [art] Populate DV Done
2,814,369 UART: [fht] FMC Alias Private Key: 7
2,815,361 UART: [art] Derive CDI
2,815,641 UART: [art] Store in in slot 0x4
2,901,376 UART: [art] Derive Key Pair
2,901,736 UART: [art] Store priv key in slot 0x5
2,914,930 UART: [art] Derive Key Pair - Done
2,929,389 UART: [art] Signing Cert with AUTHO
2,929,869 UART: RITY.KEYID = 7
2,945,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,182 UART: [art] PUB.X = 2C2C9E619DAFCD4AC91F45D3776BD737DF61624CD332BD19CAFBA2AA0F0C31AD3813B3F9523C88947D3C52E308C3E1F6
2,952,961 UART: [art] PUB.Y = 279598782314258133C1BF73CFBFAFF60887D4ACC918686377B489CEC1C9B98777A17FD9E2E2CD4B29E2275F3A0B9432
2,959,907 UART: [art] SIG.R = 5E24BC28BCE4260D62C984AAD5F7A0D9648577EBF9314611DE0B416B84DDF8F8AD804C8301DA0587623DE602693F258E
2,966,668 UART: [art] SIG.S = 82BEB8E4848D6823D09B9A3A9B40BFE6B8C6AD5A0D58D12543AF3CA99404ECEEB6DC79CA73A93B5F5321E1F037C4B017
2,990,071 UART: Caliptra RT
2,990,417 UART: [state] CFI Enabled
3,098,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,290 UART: [rt]cmd =0x44504543, len=96
3,170,565 >>> mbox cmd response data (56 bytes)
3,170,566 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,415 UART: [rt]cmd =0x44504543, len=92
3,399,784 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,619 UART:
192,999 UART: Running Caliptra ROM ...
194,087 UART:
194,226 UART: [state] CFI Enabled
266,166 UART: [state] LifecycleState = Unprovisioned
268,147 UART: [state] DebugLocked = No
271,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,592 UART: [kat] SHA2-256
445,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,855 UART: [kat] ++
456,303 UART: [kat] sha1
467,170 UART: [kat] SHA2-256
469,821 UART: [kat] SHA2-384
474,103 UART: [kat] SHA2-512-ACC
476,534 UART: [kat] ECC-384
2,766,331 UART: [kat] HMAC-384Kdf
2,778,689 UART: [kat] LMS
3,969,124 UART: [kat] --
3,974,135 UART: [cold-reset] ++
3,975,217 UART: [fht] Storing FHT @ 0x50003400
3,986,189 UART: [idev] ++
3,986,752 UART: [idev] CDI.KEYID = 6
3,987,777 UART: [idev] SUBJECT.KEYID = 7
3,988,938 UART: [idev] UDS.KEYID = 0
3,989,966 ready_for_fw is high
3,990,183 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,592 UART: [idev] Erasing UDS.KEYID = 0
7,324,280 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,587 UART: [idev] --
7,350,523 UART: [ldev] ++
7,351,092 UART: [ldev] CDI.KEYID = 6
7,352,054 UART: [ldev] SUBJECT.KEYID = 5
7,353,262 UART: [ldev] AUTHORITY.KEYID = 7
7,354,538 UART: [ldev] FE.KEYID = 1
7,401,255 UART: [ldev] Erasing FE.KEYID = 1
10,735,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,325 UART: [ldev] --
13,117,684 UART: [fwproc] Waiting for Commands...
13,120,903 UART: [fwproc] Received command 0x46574c44
13,123,072 UART: [fwproc] Received Image of size 114036 bytes
17,170,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,507 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,628,644 >>> mbox cmd response: success
17,629,167 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,633,571 UART: [afmc] ++
17,634,152 UART: [afmc] CDI.KEYID = 6
17,635,119 UART: [afmc] SUBJECT.KEYID = 7
17,636,329 UART: [afmc] AUTHORITY.KEYID = 5
20,986,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,556 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,972 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,814 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,300 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,307 UART: [afmc] --
23,360,409 UART: [cold-reset] --
23,363,182 UART: [state] Locking Datavault
23,368,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,611 UART: [state] Locking ICCM
23,371,832 UART: [exit] Launching FMC @ 0x40000130
23,380,216 UART:
23,380,447 UART: Running Caliptra FMC ...
23,381,542 UART:
23,381,691 UART: [state] CFI Enabled
23,448,992 UART: [fht] FMC Alias Private Key: 7
25,787,047 UART: [art] Extend RT PCRs Done
25,788,272 UART: [art] Lock RT PCRs Done
25,789,603 UART: [art] Populate DV Done
25,795,030 UART: [fht] FMC Alias Private Key: 7
25,796,511 UART: [art] Derive CDI
25,797,266 UART: [art] Store in in slot 0x4
25,857,455 UART: [art] Derive Key Pair
25,858,488 UART: [art] Store priv key in slot 0x5
29,151,496 UART: [art] Derive Key Pair - Done
29,164,824 UART: [art] Signing Cert with AUTHO
29,166,120 UART: RITY.KEYID = 7
31,453,526 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,037 UART: [art] PUB.X = 7CC2A50D5B0692679A95035FF0E64F90214DC567858055DE7F01A7F66B1A313AB30605C964001C0B7C11B2F1C8F3006F
31,462,226 UART: [art] PUB.Y = 16509AF793DE1D149099A93822B30FD8E54E3880D54C4D61811D19CE9654A52F55F82507CFB5135BABAD3E864C4F62B3
31,469,501 UART: [art] SIG.R = 444FA6C8D730CDCD4AB83A70EF794451C0A1843A6D5B0FEB0D9BF613046C4FCD6B13EBF705BE15268E6E3C2FA328F3A1
31,476,873 UART: [art] SIG.S = DBD514B41F44DAB5B294392884A8EFA23D884C26EE5D60A0CCD460C80AA2C6F3FD4E07A33260DA69A73CC6EA46B79B76
32,781,671 UART: Caliptra RT
32,782,394 UART: [state] CFI Enabled
32,943,509 UART: [rt] RT listening for mailbox commands...
32,974,409 UART: [rt]cmd =0x43455252, len=4
32,985,709 >>> mbox cmd response data (783 bytes)
33,028,211 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,058,887 UART: [rt]cmd =0x44504543, len=92
38,812,977 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,337 writing to cptra_bootfsm_go
3,809,961 ready_for_fw is high
3,810,507 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,888,022 >>> mbox cmd response: success
17,888,682 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,571,367 UART:
23,571,756 UART: Running Caliptra FMC ...
23,572,889 UART:
23,573,041 UART: [state] CFI Enabled
23,641,900 UART: [fht] FMC Alias Private Key: 7
25,979,771 UART: [art] Extend RT PCRs Done
25,980,990 UART: [art] Lock RT PCRs Done
25,983,070 UART: [art] Populate DV Done
25,988,598 UART: [fht] FMC Alias Private Key: 7
25,990,083 UART: [art] Derive CDI
25,990,843 UART: [art] Store in in slot 0x4
26,052,075 UART: [art] Derive Key Pair
26,053,122 UART: [art] Store priv key in slot 0x5
29,346,160 UART: [art] Derive Key Pair - Done
29,359,224 UART: [art] Signing Cert with AUTHO
29,360,531 UART: RITY.KEYID = 7
31,647,882 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,394 UART: [art] PUB.X = A23DEB5CB5B5585D0F348B364D7A12BF16D961D3E3D0A457C5606B4E647E7EF69FF87218919DE4A772E1DEE2A2C8D44C
31,656,636 UART: [art] PUB.Y = 4AD4C635CFC2749936FBE5E3EACB253641EE2F917792BC1AA559E3FFE9DE933D8C512BD9B4E3785DEA90CFF9771EF363
31,663,912 UART: [art] SIG.R = 621093161937B60531755412F306C1D63C506A64B0A6C6A43A76DBAA5F25C36DF7A062BC31C1D76FCD962A4CFADF9CC7
31,671,287 UART: [art] SIG.S = F9F5290F645578E338FF284FFBADFA1276EDACDF110673C3F0F0EF41DB4A296389179A8AAB7D7F3DF2F588F7C3C09BAF
32,976,176 UART: Caliptra RT
32,976,889 UART: [state] CFI Enabled
33,137,502 UART: [rt] RT listening for mailbox commands...
33,168,484 UART: [rt]cmd =0x43455252, len=4
33,179,833 >>> mbox cmd response data (783 bytes)
33,222,227 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,253,028 UART: [rt]cmd =0x44504543, len=92
39,008,912 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,486 UART:
192,852 UART: Running Caliptra ROM ...
193,998 UART:
603,545 UART: [state] CFI Enabled
616,933 UART: [state] LifecycleState = Unprovisioned
618,879 UART: [state] DebugLocked = No
621,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,129 UART: [kat] SHA2-256
795,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,451 UART: [kat] ++
806,898 UART: [kat] sha1
817,876 UART: [kat] SHA2-256
820,569 UART: [kat] SHA2-384
826,206 UART: [kat] SHA2-512-ACC
828,571 UART: [kat] ECC-384
3,114,244 UART: [kat] HMAC-384Kdf
3,124,632 UART: [kat] LMS
4,314,735 UART: [kat] --
4,320,797 UART: [cold-reset] ++
4,322,295 UART: [fht] Storing FHT @ 0x50003400
4,334,123 UART: [idev] ++
4,334,683 UART: [idev] CDI.KEYID = 6
4,335,564 UART: [idev] SUBJECT.KEYID = 7
4,337,469 UART: [idev] UDS.KEYID = 0
4,338,435 ready_for_fw is high
4,338,631 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,698 UART: [idev] Erasing UDS.KEYID = 0
7,624,245 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,342 UART: [idev] --
7,650,303 UART: [ldev] ++
7,650,868 UART: [ldev] CDI.KEYID = 6
7,651,883 UART: [ldev] SUBJECT.KEYID = 5
7,653,038 UART: [ldev] AUTHORITY.KEYID = 7
7,654,323 UART: [ldev] FE.KEYID = 1
7,665,900 UART: [ldev] Erasing FE.KEYID = 1
10,952,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,086 UART: [ldev] --
13,311,142 UART: [fwproc] Waiting for Commands...
13,312,749 UART: [fwproc] Received command 0x46574c44
13,314,923 UART: [fwproc] Received Image of size 114036 bytes
17,366,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,818 >>> mbox cmd response: success
17,834,353 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,838,379 UART: [afmc] ++
17,838,959 UART: [afmc] CDI.KEYID = 6
17,839,890 UART: [afmc] SUBJECT.KEYID = 7
17,841,156 UART: [afmc] AUTHORITY.KEYID = 5
21,151,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,471 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,725 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,121 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,963 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,354 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,251 UART: [afmc] --
23,515,280 UART: [cold-reset] --
23,520,058 UART: [state] Locking Datavault
23,525,739 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,489 UART: [state] Locking ICCM
23,528,665 UART: [exit] Launching FMC @ 0x40000130
23,537,065 UART:
23,537,356 UART: Running Caliptra FMC ...
23,538,463 UART:
23,538,626 UART: [state] CFI Enabled
23,546,831 UART: [fht] FMC Alias Private Key: 7
25,877,448 UART: [art] Extend RT PCRs Done
25,878,677 UART: [art] Lock RT PCRs Done
25,880,238 UART: [art] Populate DV Done
25,885,660 UART: [fht] FMC Alias Private Key: 7
25,887,358 UART: [art] Derive CDI
25,888,170 UART: [art] Store in in slot 0x4
25,930,922 UART: [art] Derive Key Pair
25,931,919 UART: [art] Store priv key in slot 0x5
29,173,840 UART: [art] Derive Key Pair - Done
29,187,163 UART: [art] Signing Cert with AUTHO
29,188,457 UART: RITY.KEYID = 7
31,468,098 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,610 UART: [art] PUB.X = 4082E696D8891F75740DF8DC25B84863CA6A6FC44B324D2D2FF942D5A5625A48C5E9EC5BA95DD82BFCDCC895CDE7323A
31,476,840 UART: [art] PUB.Y = CA6B844253AB9D42036083938B2B16A594090A273EB588972F2DF6337D14FC5D6E77FEFD762C5F760CAE4F30CD0560DC
31,484,116 UART: [art] SIG.R = A25293880B02238C85DD2E439D3DDC8B0905A944EEC0534C66FA5EC92D64B2AED9A9AC556DB5F1A1E8A58DC0D21C1F06
31,491,489 UART: [art] SIG.S = D0CC15584BC9CB41AAA8EEC6F5D9A4EA800C28460EB7C12A6F3D752E0B94693DC72757A63FB040DD5F3D626DA52DE9FD
32,796,389 UART: Caliptra RT
32,797,106 UART: [state] CFI Enabled
32,914,652 UART: [rt] RT listening for mailbox commands...
32,945,788 UART: [rt]cmd =0x43455252, len=4
32,956,925 >>> mbox cmd response data (784 bytes)
33,000,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,030,472 UART: [rt]cmd =0x44504543, len=92
38,712,027 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,130,945 ready_for_fw is high
4,131,561 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,403 >>> mbox cmd response: success
18,069,044 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,711,780 UART:
23,712,167 UART: Running Caliptra FMC ...
23,713,301 UART:
23,713,453 UART: [state] CFI Enabled
23,721,413 UART: [fht] FMC Alias Private Key: 7
26,051,563 UART: [art] Extend RT PCRs Done
26,052,791 UART: [art] Lock RT PCRs Done
26,054,427 UART: [art] Populate DV Done
26,059,576 UART: [fht] FMC Alias Private Key: 7
26,061,282 UART: [art] Derive CDI
26,062,104 UART: [art] Store in in slot 0x4
26,104,867 UART: [art] Derive Key Pair
26,105,868 UART: [art] Store priv key in slot 0x5
29,347,877 UART: [art] Derive Key Pair - Done
29,360,879 UART: [art] Signing Cert with AUTHO
29,362,182 UART: RITY.KEYID = 7
31,641,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,213 UART: [art] PUB.X = EA65EE47343BB41A19C105A2DA897CAAFB4DBCF09971DF5E604DB40E51D04984614261A977BCA944A6B47F06A00F0153
31,650,446 UART: [art] PUB.Y = BB32E106079837B375DAB4C6350DF235618F19924A830613242C757DA5DFE2B2EF6A1F0AD501908844F143CA8D11D43A
31,657,702 UART: [art] SIG.R = 5EDCC61D0575BA63D8A90AB8402EDBA0631E384D52E2CD266AA8492E7B566DFEC0A7818FA1E15811C9B16741D3FF9354
31,665,060 UART: [art] SIG.S = 8C2BC94D449F0CA8758DD115318C6942872F40D6B59D35DFC4443B1F494CE46790C076DF86D9950CFFD7ABEFC9708150
32,970,064 UART: Caliptra RT
32,970,780 UART: [state] CFI Enabled
33,088,570 UART: [rt] RT listening for mailbox commands...
33,119,551 UART: [rt]cmd =0x43455252, len=4
33,130,804 >>> mbox cmd response data (783 bytes)
33,174,030 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,204,586 UART: [rt]cmd =0x44504543, len=92
38,887,190 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,525 writing to cptra_bootfsm_go
192,827 UART:
193,196 UART: Running Caliptra ROM ...
194,308 UART:
194,451 UART: [state] CFI Enabled
261,009 UART: [state] LifecycleState = Unprovisioned
262,940 UART: [state] DebugLocked = No
264,961 UART: [state] WD Timer not started. Device not locked for debugging
268,144 UART: [kat] SHA2-256
447,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,814 UART: [kat] ++
459,354 UART: [kat] sha1
470,690 UART: [kat] SHA2-256
473,660 UART: [kat] SHA2-384
480,296 UART: [kat] SHA2-512-ACC
483,265 UART: [kat] ECC-384
2,944,366 UART: [kat] HMAC-384Kdf
2,969,756 UART: [kat] LMS
3,499,202 UART: [kat] --
3,503,329 UART: [cold-reset] ++
3,504,827 UART: [fht] FHT @ 0x50003400
3,514,828 UART: [idev] ++
3,515,436 UART: [idev] CDI.KEYID = 6
3,516,320 UART: [idev] SUBJECT.KEYID = 7
3,517,564 UART: [idev] UDS.KEYID = 0
3,518,506 ready_for_fw is high
3,518,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,399 UART: [idev] Erasing UDS.KEYID = 0
6,026,652 UART: [idev] Sha1 KeyId Algorithm
6,049,331 UART: [idev] --
6,052,194 UART: [ldev] ++
6,052,790 UART: [ldev] CDI.KEYID = 6
6,053,705 UART: [ldev] SUBJECT.KEYID = 5
6,054,804 UART: [ldev] AUTHORITY.KEYID = 7
6,056,090 UART: [ldev] FE.KEYID = 1
6,100,933 UART: [ldev] Erasing FE.KEYID = 1
8,598,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,624 UART: [ldev] --
10,392,154 UART: [fwproc] Wait for Commands...
10,395,155 UART: [fwproc] Recv command 0x46574c44
10,397,258 UART: [fwproc] Recv'd Img size: 114360 bytes
13,788,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,859,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,927,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,245,317 >>> mbox cmd response: success
14,245,855 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,249,776 UART: [afmc] ++
14,250,358 UART: [afmc] CDI.KEYID = 6
14,251,270 UART: [afmc] SUBJECT.KEYID = 7
14,252,428 UART: [afmc] AUTHORITY.KEYID = 5
16,784,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,528,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,544,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,560,354 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,582,141 UART: [afmc] --
18,585,472 UART: [cold-reset] --
18,590,897 UART: [state] Locking Datavault
18,594,542 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,186 UART: [state] Locking ICCM
18,597,907 UART: [exit] Launching FMC @ 0x40000130
18,606,362 UART:
18,606,602 UART: Running Caliptra FMC ...
18,607,705 UART:
18,607,868 UART: [state] CFI Enabled
18,668,406 UART: [fht] FMC Alias Private Key: 7
20,432,391 UART: [art] Extend RT PCRs Done
20,433,615 UART: [art] Lock RT PCRs Done
20,435,240 UART: [art] Populate DV Done
20,440,812 UART: [fht] FMC Alias Private Key: 7
20,442,299 UART: [art] Derive CDI
20,443,061 UART: [art] Store in in slot 0x4
20,501,422 UART: [art] Derive Key Pair
20,502,458 UART: [art] Store priv key in slot 0x5
22,965,180 UART: [art] Derive Key Pair - Done
22,977,797 UART: [art] Signing Cert with AUTHO
22,979,097 UART: RITY.KEYID = 7
24,691,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,771 UART: [art] PUB.X = 4121F1409D0F3D239F0FFDEDCC644CAA7B65BF69FEFDAC30BA0BCC1EF0EF24877B98ADD0101743CF2AF88A627483B7DC
24,700,062 UART: [art] PUB.Y = 225F68D9F497FA7C6D4497BC1FB3E278064DF282B9F20AD420644877ABC9DEDBB88AC2278E5ADE568ED2289BDB74A3CF
24,707,402 UART: [art] SIG.R = 370D1F4AB1D39E684472B9B8E87AC2B6C5610832035AAD5FE5859E765F2768A202B22BA08CDD47AA5DE36DC41120FAE6
24,714,812 UART: [art] SIG.S = C03A72BB52F3297BC7E588067A1A9D0EEE789C38288193A40683966378DEB4F94000FD6D4EB442CBB734DEF222EB72B8
25,693,865 UART: Caliptra RT
25,694,574 UART: [state] CFI Enabled
25,860,544 UART: [rt] RT listening for mailbox commands...
25,891,526 UART: [rt]cmd =0x43455252, len=4
25,902,885 >>> mbox cmd response data (783 bytes)
25,946,167 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,977,282 UART: [rt]cmd =0x44504543, len=92
30,346,700 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
192,532 UART:
192,911 UART: Running Caliptra ROM ...
194,281 UART:
194,435 UART: [state] CFI Enabled
261,456 UART: [state] LifecycleState = Unprovisioned
263,821 UART: [state] DebugLocked = No
266,703 UART: [state] WD Timer not started. Device not locked for debugging
271,455 UART: [kat] SHA2-256
461,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,113 UART: [kat] ++
472,594 UART: [kat] sha1
484,319 UART: [kat] SHA2-256
487,334 UART: [kat] SHA2-384
493,897 UART: [kat] SHA2-512-ACC
496,480 UART: [kat] ECC-384
2,950,447 UART: [kat] HMAC-384Kdf
2,972,353 UART: [kat] LMS
3,504,087 UART: [kat] --
3,508,442 UART: [cold-reset] ++
3,510,158 UART: [fht] FHT @ 0x50003400
3,521,063 UART: [idev] ++
3,521,771 UART: [idev] CDI.KEYID = 6
3,522,722 UART: [idev] SUBJECT.KEYID = 7
3,523,963 UART: [idev] UDS.KEYID = 0
3,524,868 ready_for_fw is high
3,525,075 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,930 UART: [idev] Erasing UDS.KEYID = 0
6,031,566 UART: [idev] Sha1 KeyId Algorithm
6,053,704 UART: [idev] --
6,058,140 UART: [ldev] ++
6,058,826 UART: [ldev] CDI.KEYID = 6
6,059,739 UART: [ldev] SUBJECT.KEYID = 5
6,060,901 UART: [ldev] AUTHORITY.KEYID = 7
6,062,137 UART: [ldev] FE.KEYID = 1
6,099,906 UART: [ldev] Erasing FE.KEYID = 1
8,605,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,344 UART: [ldev] --
10,415,630 UART: [fwproc] Wait for Commands...
10,417,617 UART: [fwproc] Recv command 0x46574c44
10,419,926 UART: [fwproc] Recv'd Img size: 114360 bytes
13,861,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,598,893 >>> mbox cmd response: success
14,599,426 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,603,560 UART: [afmc] ++
14,604,316 UART: [afmc] CDI.KEYID = 6
14,605,507 UART: [afmc] SUBJECT.KEYID = 7
14,606,943 UART: [afmc] AUTHORITY.KEYID = 5
17,151,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,697 UART: [afmc] --
18,949,759 UART: [cold-reset] --
18,953,570 UART: [state] Locking Datavault
18,958,386 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,595 UART: [state] Locking ICCM
18,963,290 UART: [exit] Launching FMC @ 0x40000130
18,971,964 UART:
18,972,200 UART: Running Caliptra FMC ...
18,973,303 UART:
18,973,469 UART: [state] CFI Enabled
19,031,315 UART: [fht] FMC Alias Private Key: 7
20,795,980 UART: [art] Extend RT PCRs Done
20,797,204 UART: [art] Lock RT PCRs Done
20,798,854 UART: [art] Populate DV Done
20,804,122 UART: [fht] FMC Alias Private Key: 7
20,805,832 UART: [art] Derive CDI
20,806,648 UART: [art] Store in in slot 0x4
20,864,257 UART: [art] Derive Key Pair
20,865,296 UART: [art] Store priv key in slot 0x5
23,327,640 UART: [art] Derive Key Pair - Done
23,340,371 UART: [art] Signing Cert with AUTHO
23,341,680 UART: RITY.KEYID = 7
25,053,470 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,979 UART: [art] PUB.X = BE32BA745F0FFDE3A9E1CA9A7B78E0C37A0DEAE5014FE7A5A8180D8762E3BF100E3803C71D77BB9598EE6E8B1C8ED5F3
25,062,278 UART: [art] PUB.Y = CE2F3213AEB451A30A493690B0AFA5DC14694B0C79F7F582EE71BBC0E75219B41B0D85AC7E0065460EA23C533099715D
25,069,501 UART: [art] SIG.R = FDA6CA550C202471FA031D756F6CB4453513E68E28DED2876EE30E47E73B19AA3DFB158E548938B8C740F3FBC7E6DA33
25,076,920 UART: [art] SIG.S = ED49E9BD0001ACFF8BD4DBC1B676BBBCC8A655C627E8F17154BBE70E673B6E31424C8505AD179B637D8932D037A75907
26,055,270 UART: Caliptra RT
26,055,959 UART: [state] CFI Enabled
26,221,269 UART: [rt] RT listening for mailbox commands...
26,252,537 UART: [rt]cmd =0x43455252, len=4
26,264,057 >>> mbox cmd response data (784 bytes)
26,307,458 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,338,332 UART: [rt]cmd =0x44504543, len=92
30,707,028 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,440,199 ready_for_fw is high
3,440,744 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,734,067 >>> mbox cmd response: success
14,734,847 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,028,610 UART:
19,029,003 UART: Running Caliptra FMC ...
19,030,115 UART:
19,030,267 UART: [state] CFI Enabled
19,099,637 UART: [fht] FMC Alias Private Key: 7
20,863,354 UART: [art] Extend RT PCRs Done
20,864,583 UART: [art] Lock RT PCRs Done
20,866,453 UART: [art] Populate DV Done
20,871,812 UART: [fht] FMC Alias Private Key: 7
20,873,407 UART: [art] Derive CDI
20,874,167 UART: [art] Store in in slot 0x4
20,932,108 UART: [art] Derive Key Pair
20,933,152 UART: [art] Store priv key in slot 0x5
23,396,107 UART: [art] Derive Key Pair - Done
23,409,435 UART: [art] Signing Cert with AUTHO
23,410,778 UART: RITY.KEYID = 7
25,121,979 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,492 UART: [art] PUB.X = 4C23BD2F90EDD06CC48A3A9FDE934C7A0EFB9DECEBB7BB0E410A7CAB929D6F6DB734811616386B9F8085DBBA16DA4361
25,130,742 UART: [art] PUB.Y = 3299BF9941E36FA7161F9D8E9D5FCDA6698D1A592273BCA818F9C0BF336543ECE3ED98985AC4840037B4F02F63315B09
25,137,987 UART: [art] SIG.R = 382CC959CCC2F2F8AD6565D21DE7B8A54FA1A29B2226A39CA3C68529E060E675241C6FEC54F6F06238935EFA4375A6B7
25,145,373 UART: [art] SIG.S = 07D953EE5F062E3289C740985D187955518A71B79AEAC4EE1D50CB443F6D8C6809D0E9C678435D218F2D0C1C2B816E3F
26,124,870 UART: Caliptra RT
26,125,556 UART: [state] CFI Enabled
26,290,674 UART: [rt] RT listening for mailbox commands...
26,321,766 UART: [rt]cmd =0x43455252, len=4
26,333,075 >>> mbox cmd response data (782 bytes)
26,376,285 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,406,977 UART: [rt]cmd =0x44504543, len=92
30,756,182 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,582 UART:
193,007 UART: Running Caliptra ROM ...
194,193 UART:
603,792 UART: [state] CFI Enabled
616,824 UART: [state] LifecycleState = Unprovisioned
619,199 UART: [state] DebugLocked = No
621,440 UART: [state] WD Timer not started. Device not locked for debugging
625,831 UART: [kat] SHA2-256
815,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,457 UART: [kat] ++
827,063 UART: [kat] sha1
838,939 UART: [kat] SHA2-256
841,973 UART: [kat] SHA2-384
847,184 UART: [kat] SHA2-512-ACC
849,834 UART: [kat] ECC-384
3,291,968 UART: [kat] HMAC-384Kdf
3,305,708 UART: [kat] LMS
3,837,525 UART: [kat] --
3,841,756 UART: [cold-reset] ++
3,844,397 UART: [fht] FHT @ 0x50003400
3,856,222 UART: [idev] ++
3,856,931 UART: [idev] CDI.KEYID = 6
3,857,961 UART: [idev] SUBJECT.KEYID = 7
3,859,063 UART: [idev] UDS.KEYID = 0
3,860,003 ready_for_fw is high
3,860,211 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,870 UART: [idev] Erasing UDS.KEYID = 0
6,335,512 UART: [idev] Sha1 KeyId Algorithm
6,358,055 UART: [idev] --
6,362,484 UART: [ldev] ++
6,363,159 UART: [ldev] CDI.KEYID = 6
6,364,066 UART: [ldev] SUBJECT.KEYID = 5
6,365,280 UART: [ldev] AUTHORITY.KEYID = 7
6,366,510 UART: [ldev] FE.KEYID = 1
6,378,932 UART: [ldev] Erasing FE.KEYID = 1
8,861,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,303 UART: [ldev] --
10,650,908 UART: [fwproc] Wait for Commands...
10,654,080 UART: [fwproc] Recv command 0x46574c44
10,656,334 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,833,952 >>> mbox cmd response: success
14,834,462 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,837,453 UART: [afmc] ++
14,838,139 UART: [afmc] CDI.KEYID = 6
14,839,374 UART: [afmc] SUBJECT.KEYID = 7
14,840,753 UART: [afmc] AUTHORITY.KEYID = 5
17,342,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,363 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,447 UART: [afmc] --
19,139,004 UART: [cold-reset] --
19,142,875 UART: [state] Locking Datavault
19,147,744 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,874 UART: [state] Locking ICCM
19,151,911 UART: [exit] Launching FMC @ 0x40000130
19,160,575 UART:
19,160,818 UART: Running Caliptra FMC ...
19,161,918 UART:
19,162,072 UART: [state] CFI Enabled
19,170,038 UART: [fht] FMC Alias Private Key: 7
20,927,689 UART: [art] Extend RT PCRs Done
20,928,906 UART: [art] Lock RT PCRs Done
20,930,557 UART: [art] Populate DV Done
20,935,859 UART: [fht] FMC Alias Private Key: 7
20,937,499 UART: [art] Derive CDI
20,938,230 UART: [art] Store in in slot 0x4
20,980,570 UART: [art] Derive Key Pair
20,981,611 UART: [art] Store priv key in slot 0x5
23,407,733 UART: [art] Derive Key Pair - Done
23,421,157 UART: [art] Signing Cert with AUTHO
23,422,459 UART: RITY.KEYID = 7
25,127,973 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,481 UART: [art] PUB.X = 2619ACC756CA19AED613346E8FA6862212BFA08131A3FE19085FFB87A71BD4B201DFAC7C16F05672270C0FDD3F9A72FB
25,136,735 UART: [art] PUB.Y = B838B97F84FEE14A2804DBF9BBDB91DD8755866D1D81E389139FCAB9C7ABC9FD64D04A6A53C585D457B390FE6939D418
25,144,025 UART: [art] SIG.R = FF04E1031A91E5581E3A61798E67D704891E7517C1CAD7FFC22F7BB00AF0A941BC7C071442195C4A5B41617B2A9F0D33
25,151,415 UART: [art] SIG.S = 918A49387881B591B27C15D9D769A900E6A7D98CD1FDF63284E4C2AE460C8A20E81CBA89C62868EB7DAB63EF90A28CF1
26,130,937 UART: Caliptra RT
26,131,624 UART: [state] CFI Enabled
26,249,080 UART: [rt] RT listening for mailbox commands...
26,280,071 UART: [rt]cmd =0x43455252, len=4
26,291,645 >>> mbox cmd response data (784 bytes)
26,335,121 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,365,651 UART: [rt]cmd =0x44504543, len=92
30,658,456 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,753,609 ready_for_fw is high
3,754,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,228 >>> mbox cmd response: success
14,951,212 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,201,767 UART:
19,202,180 UART: Running Caliptra FMC ...
19,203,308 UART:
19,203,462 UART: [state] CFI Enabled
19,211,682 UART: [fht] FMC Alias Private Key: 7
20,968,621 UART: [art] Extend RT PCRs Done
20,970,113 UART: [art] Lock RT PCRs Done
20,971,723 UART: [art] Populate DV Done
20,977,279 UART: [fht] FMC Alias Private Key: 7
20,978,928 UART: [art] Derive CDI
20,979,664 UART: [art] Store in in slot 0x4
21,022,488 UART: [art] Derive Key Pair
21,023,534 UART: [art] Store priv key in slot 0x5
23,449,869 UART: [art] Derive Key Pair - Done
23,462,622 UART: [art] Signing Cert with AUTHO
23,464,017 UART: RITY.KEYID = 7
25,169,601 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,125 UART: [art] PUB.X = 0752D41FD08417F58122F5B8BC01CCC184AFC41BEBDB78BAA424132DAB58A84AC7A618E93390A7E4521893BE432C8B8C
25,178,386 UART: [art] PUB.Y = 64AF87D05323B52E13EC04C32B805615F7D24C6CF3353A109A776593815B2EBCA1ECAE30DF37759500DB037403C1AF87
25,185,603 UART: [art] SIG.R = 17743C5573CF3846264141051380C6D0FADB11E6C30B9BA8FAFBF9C0AF9378FF65075A30F51F94BD39FDDAB7F7F6A9D8
25,192,999 UART: [art] SIG.S = 711DF2AEA196820651043C89A1426E464EACE3B6F3D79A27C91D6EBD0C4A4B277CECB63AF6E5CD13620C8C4B2EA13F65
26,171,877 UART: Caliptra RT
26,172,587 UART: [state] CFI Enabled
26,289,216 UART: [rt] RT listening for mailbox commands...
26,320,240 UART: [rt]cmd =0x43455252, len=4
26,331,621 >>> mbox cmd response data (782 bytes)
26,374,872 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,405,677 UART: [rt]cmd =0x44504543, len=92
30,698,472 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,749 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
902,920 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,494 UART: [idev] ++
1,479,662 UART: [idev] CDI.KEYID = 6
1,480,022 UART: [idev] SUBJECT.KEYID = 7
1,480,446 UART: [idev] UDS.KEYID = 0
1,480,791 ready_for_fw is high
1,480,791 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,602 UART: [idev] Erasing UDS.KEYID = 0
1,505,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,520,945 UART: [ldev] Erasing FE.KEYID = 1
1,546,318 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,024 UART: [ldev] --
1,585,411 UART: [fwproc] Waiting for Commands...
1,586,104 UART: [fwproc] Received command 0x46574c44
1,586,895 UART: [fwproc] Received Image of size 114360 bytes
2,885,284 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,164 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,469 >>> mbox cmd response: success
3,077,469 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,711 UART: [afmc] ++
3,078,879 UART: [afmc] CDI.KEYID = 6
3,079,241 UART: [afmc] SUBJECT.KEYID = 7
3,079,666 UART: [afmc] AUTHORITY.KEYID = 5
3,114,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,529 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,037 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,922 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,612 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,297 UART: [afmc] --
3,157,357 UART: [cold-reset] --
3,158,099 UART: [state] Locking Datavault
3,159,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,772 UART: [state] Locking ICCM
3,160,222 UART: [exit] Launching FMC @ 0x40000130
3,165,551 UART:
3,165,567 UART: Running Caliptra FMC ...
3,165,975 UART:
3,166,029 UART: [state] CFI Enabled
3,176,034 UART: [fht] FMC Alias Private Key: 7
3,283,785 UART: [art] Extend RT PCRs Done
3,284,213 UART: [art] Lock RT PCRs Done
3,285,735 UART: [art] Populate DV Done
3,294,118 UART: [fht] FMC Alias Private Key: 7
3,295,152 UART: [art] Derive CDI
3,295,432 UART: [art] Store in in slot 0x4
3,381,401 UART: [art] Derive Key Pair
3,381,761 UART: [art] Store priv key in slot 0x5
3,394,929 UART: [art] Derive Key Pair - Done
3,409,640 UART: [art] Signing Cert with AUTHO
3,410,120 UART: RITY.KEYID = 7
3,425,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,927 UART: [art] PUB.X = 6B3F143BCA4523B2BCAD1AF129E8C411AB8F78F64DFD6259CD3B8C7E4E695399749F3610D4A3E0775EDCEB68270F799F
3,432,708 UART: [art] PUB.Y = F691AFA344115532731804474AFEEC4C598EE422F4A99D6A454D43B5DF5B009D86FFAE9A14932192ECEA5CC6D297CFC0
3,439,645 UART: [art] SIG.R = 184C2E07406D6CA76A830FCD32CFC86F7D461E2DE3D0239E1B298449D58F19F82398AF206BD6B89291E4700FE556F5D5
3,446,410 UART: [art] SIG.S = AD08D4352249BDF31A283D65BEB2B6C8DF04BCC633A7E1DA9605E8A5228339E3585C4C232ECB2C97417276ECE5AE1F0F
3,470,601 UART: Caliptra RT
3,470,855 UART: [state] CFI Enabled
3,579,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,354 UART: [rt]cmd =0x43455252, len=4
3,620,130 >>> mbox cmd response data (783 bytes)
3,620,131 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,194 UART: [rt]cmd =0x44504543, len=92
3,841,033 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,593 >>> mbox cmd response: success
2,928,593 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,989,439 UART:
2,989,455 UART: Running Caliptra FMC ...
2,989,863 UART:
2,989,917 UART: [state] CFI Enabled
3,000,194 UART: [fht] FMC Alias Private Key: 7
3,108,461 UART: [art] Extend RT PCRs Done
3,108,889 UART: [art] Lock RT PCRs Done
3,110,643 UART: [art] Populate DV Done
3,118,884 UART: [fht] FMC Alias Private Key: 7
3,119,950 UART: [art] Derive CDI
3,120,230 UART: [art] Store in in slot 0x4
3,205,805 UART: [art] Derive Key Pair
3,206,165 UART: [art] Store priv key in slot 0x5
3,219,565 UART: [art] Derive Key Pair - Done
3,234,248 UART: [art] Signing Cert with AUTHO
3,234,728 UART: RITY.KEYID = 7
3,249,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,757 UART: [art] PUB.X = AA0FB6B92FA24AEFB18FF29B5207A2B7EEA4E17D446BF46BA0E9A61D82F5FD828A68D915759C7C238D577D16D5A07AF0
3,257,541 UART: [art] PUB.Y = E90C50F3A2F433C50743EBD113AFE8DBD954930147CFAE85D8D18BEAECD765CFF18D0BF5477370AD7A20E0B3EE2DF27E
3,264,503 UART: [art] SIG.R = 000FF5F7F60626480583EA1B0F2F7824CC8217D202E7814030FA617BAE113CFA739D9EC1B3A00BC20F7A566C511E53CF
3,271,236 UART: [art] SIG.S = F5794573DD5B2B3A3897CEB3399B558B275D99EA8C80177B8106B5E72C37EA87B9D07861209765A360AA028FAA3A0B24
3,295,308 UART: Caliptra RT
3,295,562 UART: [state] CFI Enabled
3,404,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,205 UART: [rt]cmd =0x43455252, len=4
3,445,054 >>> mbox cmd response data (782 bytes)
3,445,055 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,810 UART: [rt]cmd =0x44504543, len=92
3,665,901 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,251 UART: [kat] SHA2-512-ACC
897,152 UART: [kat] ECC-384
902,853 UART: [kat] HMAC-384Kdf
907,579 UART: [kat] LMS
1,475,775 UART: [kat] --
1,476,468 UART: [cold-reset] ++
1,476,882 UART: [fht] Storing FHT @ 0x50003400
1,479,689 UART: [idev] ++
1,479,857 UART: [idev] CDI.KEYID = 6
1,480,217 UART: [idev] SUBJECT.KEYID = 7
1,480,641 UART: [idev] UDS.KEYID = 0
1,480,986 ready_for_fw is high
1,480,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,357 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,878 UART: [ldev] ++
1,515,046 UART: [ldev] CDI.KEYID = 6
1,515,409 UART: [ldev] SUBJECT.KEYID = 5
1,515,835 UART: [ldev] AUTHORITY.KEYID = 7
1,516,298 UART: [ldev] FE.KEYID = 1
1,521,260 UART: [ldev] Erasing FE.KEYID = 1
1,546,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,173 UART: [ldev] --
1,585,668 UART: [fwproc] Waiting for Commands...
1,586,523 UART: [fwproc] Received command 0x46574c44
1,587,314 UART: [fwproc] Received Image of size 114360 bytes
2,886,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,851 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,203 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,196 >>> mbox cmd response: success
3,079,196 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,390 UART: [afmc] ++
3,080,558 UART: [afmc] CDI.KEYID = 6
3,080,920 UART: [afmc] SUBJECT.KEYID = 7
3,081,345 UART: [afmc] AUTHORITY.KEYID = 5
3,116,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,219 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,909 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,872 UART: [afmc] --
3,159,790 UART: [cold-reset] --
3,160,614 UART: [state] Locking Datavault
3,161,903 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,507 UART: [state] Locking ICCM
3,162,957 UART: [exit] Launching FMC @ 0x40000130
3,168,286 UART:
3,168,302 UART: Running Caliptra FMC ...
3,168,710 UART:
3,168,853 UART: [state] CFI Enabled
3,179,640 UART: [fht] FMC Alias Private Key: 7
3,288,029 UART: [art] Extend RT PCRs Done
3,288,457 UART: [art] Lock RT PCRs Done
3,289,949 UART: [art] Populate DV Done
3,298,388 UART: [fht] FMC Alias Private Key: 7
3,299,498 UART: [art] Derive CDI
3,299,778 UART: [art] Store in in slot 0x4
3,385,173 UART: [art] Derive Key Pair
3,385,533 UART: [art] Store priv key in slot 0x5
3,398,979 UART: [art] Derive Key Pair - Done
3,413,957 UART: [art] Signing Cert with AUTHO
3,414,437 UART: RITY.KEYID = 7
3,429,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,322 UART: [art] PUB.X = 4A44EA5A1ED5EB75CE6595D8A367FD504DE92A1BEFEDADC8F49CAED4C761AE56601C2F87C225B02E75C50DAD06DCE608
3,437,111 UART: [art] PUB.Y = 401DA1A5AD6211CEB246C693C3ABA0313CE900AC06C9922D94E74707AE273188681EAF311E453B2009C2061E9139236D
3,444,025 UART: [art] SIG.R = 9C2E1C9A206B0E3CFB35D14FD4A33D62FED3EDEA5DC20733AEECBEF6F1E5136E323C70E31127C8A393A6DC521A16EF27
3,450,813 UART: [art] SIG.S = 5D568D5691A800D5D10B46D163186B58C8C98BFBD511E4CFC30F43CF29C073DCAAFD4155C776C1ED5FAD20A419B15E75
3,474,668 UART: Caliptra RT
3,475,014 UART: [state] CFI Enabled
3,581,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,317 UART: [rt]cmd =0x43455252, len=4
3,623,081 >>> mbox cmd response data (783 bytes)
3,623,082 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,897 UART: [rt]cmd =0x44504543, len=92
3,843,971 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,610 ready_for_fw is high
1,362,610 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,556 >>> mbox cmd response: success
2,927,556 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,988,850 UART:
2,988,866 UART: Running Caliptra FMC ...
2,989,274 UART:
2,989,417 UART: [state] CFI Enabled
2,999,978 UART: [fht] FMC Alias Private Key: 7
3,107,803 UART: [art] Extend RT PCRs Done
3,108,231 UART: [art] Lock RT PCRs Done
3,109,745 UART: [art] Populate DV Done
3,118,114 UART: [fht] FMC Alias Private Key: 7
3,119,190 UART: [art] Derive CDI
3,119,470 UART: [art] Store in in slot 0x4
3,205,241 UART: [art] Derive Key Pair
3,205,601 UART: [art] Store priv key in slot 0x5
3,219,241 UART: [art] Derive Key Pair - Done
3,233,957 UART: [art] Signing Cert with AUTHO
3,234,437 UART: RITY.KEYID = 7
3,250,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,896 UART: [art] PUB.X = 704E73581478673E7463641EBD33EBAFE826432AE8A667AD1D2B13FC9D36BA7C8AEB5ED472EA13A4114901824F9F5CAD
3,257,673 UART: [art] PUB.Y = 321F055A72E591D71DD4D3AB1BCD200BB7FF86820285CF871974567825E605191D0F77EA53B59F127EC98E0259F03CF0
3,264,605 UART: [art] SIG.R = CF4FC3D1440CAA4869753E0CB5D2133DC797E257A4C696C0EBE89A325790E0044D851D5C6F032F6557E8E4BCB0E0FD35
3,271,373 UART: [art] SIG.S = 4B09624A042AD47104B63BA2330AA0F81E4DE6B009E523575443EDD4E5A1463450420EE6A87E87C4DBEF0DFF6D32A0A7
3,295,771 UART: Caliptra RT
3,296,117 UART: [state] CFI Enabled
3,404,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,824 UART: [rt]cmd =0x43455252, len=4
3,445,576 >>> mbox cmd response data (783 bytes)
3,445,577 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,598 UART: [rt]cmd =0x44504543, len=92
3,665,646 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,150 UART: [kat] SHA2-512-ACC
908,051 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,278 UART: [kat] LMS
1,170,606 UART: [kat] --
1,171,577 UART: [cold-reset] ++
1,172,003 UART: [fht] FHT @ 0x50003400
1,174,566 UART: [idev] ++
1,174,734 UART: [idev] CDI.KEYID = 6
1,175,094 UART: [idev] SUBJECT.KEYID = 7
1,175,518 UART: [idev] UDS.KEYID = 0
1,175,863 ready_for_fw is high
1,175,863 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,416 UART: [idev] Erasing UDS.KEYID = 0
1,200,435 UART: [idev] Sha1 KeyId Algorithm
1,208,701 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,260 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,822 UART: [fwproc] Recv command 0x46574c44
1,282,550 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,202 >>> mbox cmd response: success
2,772,202 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,220 UART: [afmc] ++
2,773,388 UART: [afmc] CDI.KEYID = 6
2,773,750 UART: [afmc] SUBJECT.KEYID = 7
2,774,175 UART: [afmc] AUTHORITY.KEYID = 5
2,809,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,717 UART: [afmc] --
2,852,637 UART: [cold-reset] --
2,853,207 UART: [state] Locking Datavault
2,854,458 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,062 UART: [state] Locking ICCM
2,855,576 UART: [exit] Launching FMC @ 0x40000130
2,860,905 UART:
2,860,921 UART: Running Caliptra FMC ...
2,861,329 UART:
2,861,383 UART: [state] CFI Enabled
2,871,718 UART: [fht] FMC Alias Private Key: 7
2,979,911 UART: [art] Extend RT PCRs Done
2,980,339 UART: [art] Lock RT PCRs Done
2,981,869 UART: [art] Populate DV Done
2,990,396 UART: [fht] FMC Alias Private Key: 7
2,991,558 UART: [art] Derive CDI
2,991,838 UART: [art] Store in in slot 0x4
3,077,327 UART: [art] Derive Key Pair
3,077,687 UART: [art] Store priv key in slot 0x5
3,091,177 UART: [art] Derive Key Pair - Done
3,106,133 UART: [art] Signing Cert with AUTHO
3,106,613 UART: RITY.KEYID = 7
3,121,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,398 UART: [art] PUB.X = 777FC499D18F76B130CB181522AD41AF295A12FF6FC8495B426AC27790126DBC571B33A84F6A7FA023E8D7807F041241
3,129,165 UART: [art] PUB.Y = 9AD87E77C1082A24CFF701FF65C14ED7A7024AEF76D82DFED16677DB0BEB48E59A9C13161B231E5EEDB96D37A8A9D024
3,136,121 UART: [art] SIG.R = CADB8A56670901FF7EBD9C3EB00F242DFE42E65B624EE25DA5D3B28A08763B65F4E990C9F1279C8D161FF4F9939BCA8E
3,142,897 UART: [art] SIG.S = 7285EB53D2FFE50816DB013EA8A58E16EB566215A82F872184CC6ED79171989F9EC9025165EBD1E29E527126C04B7C7D
3,166,597 UART: Caliptra RT
3,166,851 UART: [state] CFI Enabled
3,273,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,786 UART: [rt]cmd =0x43455252, len=4
3,314,822 >>> mbox cmd response data (783 bytes)
3,314,823 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,694 UART: [rt]cmd =0x44504543, len=92
3,535,407 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,133 ready_for_fw is high
1,061,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,625 >>> mbox cmd response: success
2,627,625 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,689,733 UART:
2,689,749 UART: Running Caliptra FMC ...
2,690,157 UART:
2,690,211 UART: [state] CFI Enabled
2,700,774 UART: [fht] FMC Alias Private Key: 7
2,808,563 UART: [art] Extend RT PCRs Done
2,808,991 UART: [art] Lock RT PCRs Done
2,810,431 UART: [art] Populate DV Done
2,818,946 UART: [fht] FMC Alias Private Key: 7
2,820,122 UART: [art] Derive CDI
2,820,402 UART: [art] Store in in slot 0x4
2,905,999 UART: [art] Derive Key Pair
2,906,359 UART: [art] Store priv key in slot 0x5
2,919,457 UART: [art] Derive Key Pair - Done
2,934,213 UART: [art] Signing Cert with AUTHO
2,934,693 UART: RITY.KEYID = 7
2,949,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,394 UART: [art] PUB.X = D6CDB6DCE73DF7BBC8E8F2145F01BEB121BABE2421C5B3DF91E31AF92B789549A8C887729C0A9B79DF9D844FACA4E5C0
2,957,184 UART: [art] PUB.Y = 7F5C2807AD836EDF18F915DA07DC85EB6E70D14AA09A49CA4DB1AF396F221B5C12E28AB63D283E70E99745D2862D0F5D
2,964,139 UART: [art] SIG.R = 96E18921CB40854E78CCE0100A16F206F8E9B85FAE30CB54544DEF14AB5C7C9602726C1C989C56622B91D3FDC588D04F
2,970,906 UART: [art] SIG.S = 4C3E50A1D34156DC7C70D70E666B4A536A6DD1B42D6EC5B2B33B344D48F105910D2BD43526DCF16F46EB4F110563782C
2,994,241 UART: Caliptra RT
2,994,495 UART: [state] CFI Enabled
3,102,171 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,276 UART: [rt]cmd =0x43455252, len=4
3,143,012 >>> mbox cmd response data (783 bytes)
3,143,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,990 UART: [rt]cmd =0x44504543, len=92
3,364,372 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
893,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,346 UART: [kat] ++
897,498 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,555 UART: [kat] SHA2-512-ACC
908,456 UART: [kat] ECC-384
918,007 UART: [kat] HMAC-384Kdf
922,633 UART: [kat] LMS
1,170,961 UART: [kat] --
1,171,760 UART: [cold-reset] ++
1,172,268 UART: [fht] FHT @ 0x50003400
1,174,865 UART: [idev] ++
1,175,033 UART: [idev] CDI.KEYID = 6
1,175,393 UART: [idev] SUBJECT.KEYID = 7
1,175,817 UART: [idev] UDS.KEYID = 0
1,176,162 ready_for_fw is high
1,176,162 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,076 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,742 UART: [ldev] ++
1,210,910 UART: [ldev] CDI.KEYID = 6
1,211,273 UART: [ldev] SUBJECT.KEYID = 5
1,211,699 UART: [ldev] AUTHORITY.KEYID = 7
1,212,162 UART: [ldev] FE.KEYID = 1
1,217,054 UART: [ldev] Erasing FE.KEYID = 1
1,243,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,152 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,199 UART: [fwproc] Recv command 0x46574c44
1,283,927 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,213 >>> mbox cmd response: success
2,774,213 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,309 UART: [afmc] ++
2,775,477 UART: [afmc] CDI.KEYID = 6
2,775,839 UART: [afmc] SUBJECT.KEYID = 7
2,776,264 UART: [afmc] AUTHORITY.KEYID = 5
2,811,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,243 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,768 UART: [afmc] --
2,854,734 UART: [cold-reset] --
2,855,630 UART: [state] Locking Datavault
2,856,619 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,223 UART: [state] Locking ICCM
2,857,779 UART: [exit] Launching FMC @ 0x40000130
2,863,108 UART:
2,863,124 UART: Running Caliptra FMC ...
2,863,532 UART:
2,863,675 UART: [state] CFI Enabled
2,874,442 UART: [fht] FMC Alias Private Key: 7
2,981,927 UART: [art] Extend RT PCRs Done
2,982,355 UART: [art] Lock RT PCRs Done
2,983,995 UART: [art] Populate DV Done
2,992,106 UART: [fht] FMC Alias Private Key: 7
2,993,060 UART: [art] Derive CDI
2,993,340 UART: [art] Store in in slot 0x4
3,079,019 UART: [art] Derive Key Pair
3,079,379 UART: [art] Store priv key in slot 0x5
3,093,089 UART: [art] Derive Key Pair - Done
3,107,741 UART: [art] Signing Cert with AUTHO
3,108,221 UART: RITY.KEYID = 7
3,123,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,218 UART: [art] PUB.X = E3E7554CB47EE5FB2F764B9531EF46D1C2259085FB826D1B8D19756F4B8539708B83E642FF1C02BA3319DEBEF3D98FB9
3,130,995 UART: [art] PUB.Y = 8AB31E1D98F5D92972E7AAC272B3172A8F051EEB8509C897754AD1EDEC56ACD8A35F581E00CC370A6487BF4263C03D0D
3,137,923 UART: [art] SIG.R = 5D9F625C076C3CC7F622E459A251969F52AD488DD7876F7B21EAEACF34D823773F0E872D481C9ACFFE211CD611A2B769
3,144,697 UART: [art] SIG.S = A5EBB30D9ABF151F632A42EDCC182D869DD1C79B9787BDEDFBB8D56DB4FFF633A99466335BE6C420650DAEF5DCBA3E15
3,168,898 UART: Caliptra RT
3,169,244 UART: [state] CFI Enabled
3,277,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,697 UART: [rt]cmd =0x43455252, len=4
3,318,699 >>> mbox cmd response data (783 bytes)
3,318,700 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,799 UART: [rt]cmd =0x44504543, len=92
3,539,941 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,182 ready_for_fw is high
1,061,182 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,410 >>> mbox cmd response: success
2,627,410 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,808 UART:
2,688,824 UART: Running Caliptra FMC ...
2,689,232 UART:
2,689,375 UART: [state] CFI Enabled
2,700,196 UART: [fht] FMC Alias Private Key: 7
2,808,587 UART: [art] Extend RT PCRs Done
2,809,015 UART: [art] Lock RT PCRs Done
2,810,417 UART: [art] Populate DV Done
2,818,742 UART: [fht] FMC Alias Private Key: 7
2,819,888 UART: [art] Derive CDI
2,820,168 UART: [art] Store in in slot 0x4
2,905,911 UART: [art] Derive Key Pair
2,906,271 UART: [art] Store priv key in slot 0x5
2,919,547 UART: [art] Derive Key Pair - Done
2,934,364 UART: [art] Signing Cert with AUTHO
2,934,844 UART: RITY.KEYID = 7
2,950,086 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,851 UART: [art] PUB.X = 83A9C1E8AA1BF1EB0A0A48C3D8EED9DF702FD907F30926FA7B46F483B0ED3F0EF9DB27C5214EFEC28F38C87BEE1EE592
2,957,634 UART: [art] PUB.Y = FD729581F388425A6FF960872272CD527509125DB76F6296A5E827E73B4E1892839106F993693E9CC24BA923F1A41470
2,964,564 UART: [art] SIG.R = 8990CC3F4C2161676EBC816B60F29FE6E769EAA5C53B50AF95731005E6F26DA4FF9AFD1772720E01FB131C2F54805EC0
2,971,333 UART: [art] SIG.S = EC0C09C87BB35974011B379FA11E9734C78DACD17DEF03469B0D0287CD7F6B2010A4D551361EA89029A93B9710DB0B79
2,994,951 UART: Caliptra RT
2,995,297 UART: [state] CFI Enabled
3,103,608 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,795 UART: [rt]cmd =0x43455252, len=4
3,144,680 >>> mbox cmd response data (784 bytes)
3,144,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,820 UART: [rt]cmd =0x44504543, len=92
3,366,941 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,846 UART: [state] LifecycleState = Unprovisioned
86,501 UART: [state] DebugLocked = No
87,197 UART: [state] WD Timer not started. Device not locked for debugging
88,414 UART: [kat] SHA2-256
891,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,093 UART: [kat] ++
896,245 UART: [kat] sha1
900,577 UART: [kat] SHA2-256
902,517 UART: [kat] SHA2-384
905,390 UART: [kat] SHA2-512-ACC
907,291 UART: [kat] ECC-384
916,994 UART: [kat] HMAC-384Kdf
921,544 UART: [kat] LMS
1,169,856 UART: [kat] --
1,170,789 UART: [cold-reset] ++
1,171,337 UART: [fht] FHT @ 0x50003400
1,174,037 UART: [idev] ++
1,174,205 UART: [idev] CDI.KEYID = 6
1,174,566 UART: [idev] SUBJECT.KEYID = 7
1,174,991 UART: [idev] UDS.KEYID = 0
1,175,337 ready_for_fw is high
1,175,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,219 UART: [idev] Erasing UDS.KEYID = 0
1,200,029 UART: [idev] Sha1 KeyId Algorithm
1,209,035 UART: [idev] --
1,209,926 UART: [ldev] ++
1,210,094 UART: [ldev] CDI.KEYID = 6
1,210,458 UART: [ldev] SUBJECT.KEYID = 5
1,210,885 UART: [ldev] AUTHORITY.KEYID = 7
1,211,348 UART: [ldev] FE.KEYID = 1
1,216,414 UART: [ldev] Erasing FE.KEYID = 1
1,242,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,382 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,754 >>> mbox cmd response: success
2,773,754 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,775 UART: [afmc] ++
2,774,943 UART: [afmc] CDI.KEYID = 6
2,775,306 UART: [afmc] SUBJECT.KEYID = 7
2,775,732 UART: [afmc] AUTHORITY.KEYID = 5
2,810,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,014 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,094 UART: [afmc] --
2,854,018 UART: [cold-reset] --
2,855,016 UART: [state] Locking Datavault
2,856,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,637 UART: [state] Locking ICCM
2,857,259 UART: [exit] Launching FMC @ 0x40000130
2,862,588 UART:
2,862,604 UART: Running Caliptra FMC ...
2,863,012 UART:
2,863,066 UART: [state] CFI Enabled
2,873,443 UART: [fht] FMC Alias Private Key: 7
2,981,950 UART: [art] Extend RT PCRs Done
2,982,378 UART: [art] Lock RT PCRs Done
2,983,792 UART: [art] Populate DV Done
2,992,159 UART: [fht] FMC Alias Private Key: 7
2,993,197 UART: [art] Derive CDI
2,993,477 UART: [art] Store in in slot 0x4
3,079,404 UART: [art] Derive Key Pair
3,079,764 UART: [art] Store priv key in slot 0x5
3,092,926 UART: [art] Derive Key Pair - Done
3,107,784 UART: [art] Signing Cert with AUTHO
3,108,264 UART: RITY.KEYID = 7
3,123,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,149 UART: [art] PUB.X = 227BCF91EFA604BF25546293DBFE25086501D321CE131DDA6B2C4B65DD5C1C9DF19184A45BBDAA6D02700840A14DC68A
3,130,918 UART: [art] PUB.Y = 0AEDC70EE0E17983E0339193D47A968994462991EDEAE9DDC732F4A9D0B25F11B2204C7286472D93AE2FCD5F2CBB845E
3,137,872 UART: [art] SIG.R = 18AAD6E89EB3FA6C6450CD6EF82EF9DD6864B1DFB47EEA1D2F3201A26A611A9FDD485C317470EA0EB669D680A8B177EF
3,144,658 UART: [art] SIG.S = 1E4802886CBB28F377BB99700624CD6BEF6323B430B59BE01DE45D92AB6C7194A6F1372FB4AB2DB0A365346FB7EF6CB3
3,168,607 UART: Caliptra RT
3,168,861 UART: [state] CFI Enabled
3,276,027 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,254 UART: [rt]cmd =0x43455252, len=4
3,317,162 >>> mbox cmd response data (782 bytes)
3,317,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,266 UART: [rt]cmd =0x44504543, len=92
3,538,231 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,602 ready_for_fw is high
1,055,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,080 >>> mbox cmd response: success
2,623,080 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,672 UART:
2,684,688 UART: Running Caliptra FMC ...
2,685,096 UART:
2,685,150 UART: [state] CFI Enabled
2,695,815 UART: [fht] FMC Alias Private Key: 7
2,803,740 UART: [art] Extend RT PCRs Done
2,804,168 UART: [art] Lock RT PCRs Done
2,805,818 UART: [art] Populate DV Done
2,814,019 UART: [fht] FMC Alias Private Key: 7
2,815,075 UART: [art] Derive CDI
2,815,355 UART: [art] Store in in slot 0x4
2,901,230 UART: [art] Derive Key Pair
2,901,590 UART: [art] Store priv key in slot 0x5
2,914,792 UART: [art] Derive Key Pair - Done
2,930,267 UART: [art] Signing Cert with AUTHO
2,930,747 UART: RITY.KEYID = 7
2,945,859 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,624 UART: [art] PUB.X = E097EA8AE1DE6908B81CBB679922EC120D580C857F9689021566398BE4A88361C27D66AB0FB9980E96984C7E74CC3901
2,953,371 UART: [art] PUB.Y = 889B27B0FF7CDDDEB7FF3F640FD44F3CDF9D6FBE26BBC43E66FE18C220CFA763E4F90E9C466A17DBEEF959DE7AB6DCAE
2,960,355 UART: [art] SIG.R = 519A198739F39BACA94EDC6994535495707A93BBDCCE1592803C8B9521371DF10158405F6DD4B99D09DB80EDA640ED6A
2,967,123 UART: [art] SIG.S = F6B0D3C64C34F7F328C55A8147732BE001C438F025B3BEABDEF4860D083C7BD9D7D40BAFFD4210233905D1ECC771D12E
2,991,059 UART: Caliptra RT
2,991,313 UART: [state] CFI Enabled
3,099,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,498 UART: [rt]cmd =0x43455252, len=4
3,140,486 >>> mbox cmd response data (783 bytes)
3,140,487 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,520 UART: [rt]cmd =0x44504543, len=92
3,362,045 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,174,232 ready_for_fw is high
1,174,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Sha1 KeyId Algorithm
1,207,348 UART: [idev] --
1,208,425 UART: [ldev] ++
1,208,593 UART: [ldev] CDI.KEYID = 6
1,208,957 UART: [ldev] SUBJECT.KEYID = 5
1,209,384 UART: [ldev] AUTHORITY.KEYID = 7
1,209,847 UART: [ldev] FE.KEYID = 1
1,215,091 UART: [ldev] Erasing FE.KEYID = 1
1,241,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,695 UART: [ldev] --
1,280,193 UART: [fwproc] Wait for Commands...
1,280,788 UART: [fwproc] Recv command 0x46574c44
1,281,521 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,289 >>> mbox cmd response: success
2,771,289 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,772,392 UART: [afmc] ++
2,772,560 UART: [afmc] CDI.KEYID = 6
2,772,923 UART: [afmc] SUBJECT.KEYID = 7
2,773,349 UART: [afmc] AUTHORITY.KEYID = 5
2,809,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,582 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,405 UART: [afmc] --
2,852,439 UART: [cold-reset] --
2,853,025 UART: [state] Locking Datavault
2,854,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,784 UART: [state] Locking ICCM
2,855,264 UART: [exit] Launching FMC @ 0x40000130
2,860,593 UART:
2,860,609 UART: Running Caliptra FMC ...
2,861,017 UART:
2,861,160 UART: [state] CFI Enabled
2,871,709 UART: [fht] FMC Alias Private Key: 7
2,979,950 UART: [art] Extend RT PCRs Done
2,980,378 UART: [art] Lock RT PCRs Done
2,981,900 UART: [art] Populate DV Done
2,990,119 UART: [fht] FMC Alias Private Key: 7
2,991,153 UART: [art] Derive CDI
2,991,433 UART: [art] Store in in slot 0x4
3,076,878 UART: [art] Derive Key Pair
3,077,238 UART: [art] Store priv key in slot 0x5
3,090,270 UART: [art] Derive Key Pair - Done
3,104,818 UART: [art] Signing Cert with AUTHO
3,105,298 UART: RITY.KEYID = 7
3,120,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,173 UART: [art] PUB.X = 17DC47693FF7F08BAF85A21D72542229D2E929D9590ED0391003FCF7CAE86ACBD303878F43AAF565BFCBF79437DDB83A
3,127,948 UART: [art] PUB.Y = 45C8D0245937CD1117498F75157E02C8E0186EE6D50FCCC9BB1BDB619CF350E10494FCEB3B1F5D576FA99E105D6DF3BC
3,134,903 UART: [art] SIG.R = FE1B99409F9F717B1C183EF471316F5A57998C46587F2ED91CAA6E4A87A062E9DCB3CFEC925E79892CB8B1F16CE88CBD
3,141,689 UART: [art] SIG.S = 1AE176AA112E19B2017333C4D4A67F754054197D05AE4D988C777055013081E10920943DA902FF111AF523A0BF296769
3,165,935 UART: Caliptra RT
3,166,281 UART: [state] CFI Enabled
3,273,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,948 UART: [rt]cmd =0x43455252, len=4
3,314,818 >>> mbox cmd response data (783 bytes)
3,314,819 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,760 UART: [rt]cmd =0x44504543, len=92
3,536,561 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,961 ready_for_fw is high
1,055,961 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,305 >>> mbox cmd response: success
2,623,305 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,685,807 UART:
2,685,823 UART: Running Caliptra FMC ...
2,686,231 UART:
2,686,374 UART: [state] CFI Enabled
2,696,691 UART: [fht] FMC Alias Private Key: 7
2,804,752 UART: [art] Extend RT PCRs Done
2,805,180 UART: [art] Lock RT PCRs Done
2,806,586 UART: [art] Populate DV Done
2,814,667 UART: [fht] FMC Alias Private Key: 7
2,815,731 UART: [art] Derive CDI
2,816,011 UART: [art] Store in in slot 0x4
2,901,652 UART: [art] Derive Key Pair
2,902,012 UART: [art] Store priv key in slot 0x5
2,915,172 UART: [art] Derive Key Pair - Done
2,930,159 UART: [art] Signing Cert with AUTHO
2,930,639 UART: RITY.KEYID = 7
2,946,117 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,882 UART: [art] PUB.X = BDE4455B31D4808878E2E7BAD65E281EDFFEB13DB1BCB4C2FCB282D6284D2F37C955F4D19A3BEC3DF8BD77B0AB4CF27D
2,953,682 UART: [art] PUB.Y = C69E11EBC936F200B85EB3774E46BE3A1D6AE1FCAF8A10C873E1AABD05F4A8A426F5DDCFD8DD85155A02FFDC0C5F25F6
2,960,631 UART: [art] SIG.R = 51694930CCC7E275587919CA92B7EBDADD26BCF6CE371B61D0A62FE3A3417A16F1454E3B80C93DB819E6E6D9D7C7FAD5
2,967,417 UART: [art] SIG.S = 74B4909F7E848BDDE585D3308CB4EA6024DC653F3490EC6113313BFBCED8EC092A9883D6769CCD4D38A2BFDADFCB5C67
2,990,307 UART: Caliptra RT
2,990,653 UART: [state] CFI Enabled
3,098,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,862 UART: [rt]cmd =0x43455252, len=4
3,139,786 >>> mbox cmd response data (782 bytes)
3,139,787 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,590 UART: [rt]cmd =0x44504543, len=92
3,361,095 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,400 UART:
192,767 UART: Running Caliptra ROM ...
193,902 UART:
194,043 UART: [state] CFI Enabled
262,453 UART: [state] LifecycleState = Unprovisioned
264,443 UART: [state] DebugLocked = No
266,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,491 UART: [kat] SHA2-256
440,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,727 UART: [kat] ++
451,389 UART: [kat] sha1
462,117 UART: [kat] SHA2-256
464,765 UART: [kat] SHA2-384
469,897 UART: [kat] SHA2-512-ACC
472,258 UART: [kat] ECC-384
2,769,698 UART: [kat] HMAC-384Kdf
2,800,913 UART: [kat] LMS
3,991,222 UART: [kat] --
3,995,088 UART: [cold-reset] ++
3,996,603 UART: [fht] Storing FHT @ 0x50003400
4,007,649 UART: [idev] ++
4,008,206 UART: [idev] CDI.KEYID = 6
4,009,116 UART: [idev] SUBJECT.KEYID = 7
4,010,358 UART: [idev] UDS.KEYID = 0
4,011,326 ready_for_fw is high
4,011,515 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,955 UART: [idev] Erasing UDS.KEYID = 0
7,349,767 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,448 UART: [idev] --
7,374,265 UART: [ldev] ++
7,374,877 UART: [ldev] CDI.KEYID = 6
7,375,809 UART: [ldev] SUBJECT.KEYID = 5
7,377,008 UART: [ldev] AUTHORITY.KEYID = 7
7,378,293 UART: [ldev] FE.KEYID = 1
7,424,779 UART: [ldev] Erasing FE.KEYID = 1
10,756,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,929 UART: [ldev] --
13,138,753 UART: [fwproc] Waiting for Commands...
13,142,054 UART: [fwproc] Received command 0x46574c44
13,144,237 UART: [fwproc] Received Image of size 114036 bytes
17,201,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,968 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,346,843 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,663,440 >>> mbox cmd response: success
17,663,995 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,667,904 UART: [afmc] ++
17,668,534 UART: [afmc] CDI.KEYID = 6
17,669,439 UART: [afmc] SUBJECT.KEYID = 7
17,670,703 UART: [afmc] AUTHORITY.KEYID = 5
21,033,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,078 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,336 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,748 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,576 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,032 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,399,996 UART: [afmc] --
23,403,918 UART: [cold-reset] --
23,409,387 UART: [state] Locking Datavault
23,415,440 UART: [state] Locking PCR0, PCR1 and PCR31
23,417,236 UART: [state] Locking ICCM
23,419,712 UART: [exit] Launching FMC @ 0x40000130
23,428,102 UART:
23,428,330 UART: Running Caliptra FMC ...
23,429,421 UART:
23,429,572 UART: [state] CFI Enabled
23,491,733 UART: [fht] FMC Alias Private Key: 7
25,829,694 UART: [art] Extend RT PCRs Done
25,830,918 UART: [art] Lock RT PCRs Done
25,832,323 UART: [art] Populate DV Done
25,837,894 UART: [fht] FMC Alias Private Key: 7
25,839,616 UART: [art] Derive CDI
25,840,430 UART: [art] Store in in slot 0x4
25,902,537 UART: [art] Derive Key Pair
25,903,598 UART: [art] Store priv key in slot 0x5
29,196,487 UART: [art] Derive Key Pair - Done
29,209,430 UART: [art] Signing Cert with AUTHO
29,210,731 UART: RITY.KEYID = 7
31,497,569 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,066 UART: [art] PUB.X = 3CC3ABAC0753B7B15DC3BCBDE721672B582AF661AE2BB5B04479CD40EA646F233C78B6EA155768D38ABC96168961B33B
31,506,358 UART: [art] PUB.Y = 34B928348B5B3B4DA059F256FE0D7962A01B6DC112BD19C44D01DAB85D5EED67BFCB4340E1D91D903C8323CE9166D795
31,513,581 UART: [art] SIG.R = E3B2C492E2A1979C5D1E570F8BB155D19A662D47DB938D61CB550277395D0A27EF96F37266C45E0788AECEB80B574AA8
31,520,965 UART: [art] SIG.S = 869B21A6E7BF7417E530CD533CA436D9A905E540726715F37F1BC5B6F57998CD5DB29E34CEFEF2D4FF150ED39478E0F4
32,826,183 UART: Caliptra RT
32,826,900 UART: [state] CFI Enabled
33,007,534 UART: [rt] RT listening for mailbox commands...
33,038,517 UART: [rt]cmd =0x4c444556, len=4
33,049,807 >>> mbox cmd response data (687 bytes)
33,090,829 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,120,856 UART: [rt]cmd =0x43455246, len=4
33,133,812 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,786,430 ready_for_fw is high
3,786,984 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,875,258 >>> mbox cmd response: success
17,875,898 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,569,720 UART:
23,570,101 UART: Running Caliptra FMC ...
23,571,201 UART:
23,571,346 UART: [state] CFI Enabled
23,640,269 UART: [fht] FMC Alias Private Key: 7
25,978,416 UART: [art] Extend RT PCRs Done
25,979,650 UART: [art] Lock RT PCRs Done
25,981,332 UART: [art] Populate DV Done
25,986,745 UART: [fht] FMC Alias Private Key: 7
25,988,437 UART: [art] Derive CDI
25,989,242 UART: [art] Store in in slot 0x4
26,051,149 UART: [art] Derive Key Pair
26,052,185 UART: [art] Store priv key in slot 0x5
29,345,082 UART: [art] Derive Key Pair - Done
29,358,024 UART: [art] Signing Cert with AUTHO
29,359,318 UART: RITY.KEYID = 7
31,646,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,750 UART: [art] PUB.X = B440F801411E2E976EBB8EE42D67DEA74B5F88A6045276D2F9F94EF62B65B5A497492D84216F96B6324B0A858E5C8317
31,654,994 UART: [art] PUB.Y = B1CCD2D1A64F2FBB88F2E941D1A15B7B364A01834DD048E5BDE39756810FF5E12E65AB1F4F4DA5DD4229F8DE36526D5D
31,662,266 UART: [art] SIG.R = 8E9A0E90AEE7C49C609E81D1273F0090CF318DC49F84949685AC88C22E44BDCFCA902444AA4C3D19CEDC4B7CEBAA455F
31,669,642 UART: [art] SIG.S = 11720AFF7B1D69761945F1DE8E5844676C4C8C019AB8C63924836C9EE0D5516E8CBD689D294962BB153C976696570417
32,975,074 UART: Caliptra RT
32,975,793 UART: [state] CFI Enabled
33,137,590 UART: [rt] RT listening for mailbox commands...
33,168,507 UART: [rt]cmd =0x4c444556, len=4
33,179,672 >>> mbox cmd response data (687 bytes)
33,220,669 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,250,483 UART: [rt]cmd =0x43455246, len=4
33,263,364 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
192,554 UART:
192,902 UART: Running Caliptra ROM ...
194,015 UART:
603,699 UART: [state] CFI Enabled
616,104 UART: [state] LifecycleState = Unprovisioned
618,053 UART: [state] DebugLocked = No
620,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,370 UART: [kat] SHA2-256
796,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,702 UART: [kat] ++
807,173 UART: [kat] sha1
817,122 UART: [kat] SHA2-256
819,850 UART: [kat] SHA2-384
825,273 UART: [kat] SHA2-512-ACC
827,637 UART: [kat] ECC-384
3,113,791 UART: [kat] HMAC-384Kdf
3,126,304 UART: [kat] LMS
4,316,454 UART: [kat] --
4,322,438 UART: [cold-reset] ++
4,324,655 UART: [fht] Storing FHT @ 0x50003400
4,335,918 UART: [idev] ++
4,336,481 UART: [idev] CDI.KEYID = 6
4,337,458 UART: [idev] SUBJECT.KEYID = 7
4,338,705 UART: [idev] UDS.KEYID = 0
4,339,676 ready_for_fw is high
4,339,883 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,435 UART: [idev] Erasing UDS.KEYID = 0
7,625,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,111 UART: [idev] --
7,652,457 UART: [ldev] ++
7,653,038 UART: [ldev] CDI.KEYID = 6
7,654,029 UART: [ldev] SUBJECT.KEYID = 5
7,655,194 UART: [ldev] AUTHORITY.KEYID = 7
7,656,481 UART: [ldev] FE.KEYID = 1
7,666,883 UART: [ldev] Erasing FE.KEYID = 1
10,953,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,636 UART: [ldev] --
13,315,014 UART: [fwproc] Waiting for Commands...
13,316,742 UART: [fwproc] Received command 0x46574c44
13,318,927 UART: [fwproc] Received Image of size 114036 bytes
17,370,841 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,960 >>> mbox cmd response: success
17,834,516 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,837,896 UART: [afmc] ++
17,838,484 UART: [afmc] CDI.KEYID = 6
17,839,367 UART: [afmc] SUBJECT.KEYID = 7
17,840,638 UART: [afmc] AUTHORITY.KEYID = 5
21,157,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,745 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,157 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,944 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,382 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,776 UART: [afmc] --
23,523,038 UART: [cold-reset] --
23,526,410 UART: [state] Locking Datavault
23,530,090 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,808 UART: [state] Locking ICCM
23,532,903 UART: [exit] Launching FMC @ 0x40000130
23,541,294 UART:
23,541,528 UART: Running Caliptra FMC ...
23,542,549 UART:
23,542,693 UART: [state] CFI Enabled
23,550,744 UART: [fht] FMC Alias Private Key: 7
25,882,263 UART: [art] Extend RT PCRs Done
25,883,480 UART: [art] Lock RT PCRs Done
25,885,141 UART: [art] Populate DV Done
25,890,440 UART: [fht] FMC Alias Private Key: 7
25,892,135 UART: [art] Derive CDI
25,892,871 UART: [art] Store in in slot 0x4
25,935,623 UART: [art] Derive Key Pair
25,936,619 UART: [art] Store priv key in slot 0x5
29,178,930 UART: [art] Derive Key Pair - Done
29,191,941 UART: [art] Signing Cert with AUTHO
29,193,247 UART: RITY.KEYID = 7
31,472,681 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,188 UART: [art] PUB.X = 83B226608BAB0757D0AFC05E63C0281B300068AF3B6A7CB0BAFAF6F07F9E94138531878BA7DA9513A1C0F2B667451090
31,481,437 UART: [art] PUB.Y = 6A2232DF696E55B5980FAD3488E14CDAE0244F8EC19E4EB675C9298D566D7BE46431614891CF37336BEA4F1E7AEBDC6F
31,488,721 UART: [art] SIG.R = 9AB7BCBA8F992FE6D0A03B7755E12E332736C2248CFE5E559E09E52E6FBD7A57606B25B9F194943F8A20BE56E5C470E3
31,496,114 UART: [art] SIG.S = 14608A3DE9A34CCFDEAB3B37DC50B61585EB4A5689CF62652DDD3BDE657517CDD44A326D279CDB21458D95C2C169ED6A
32,801,610 UART: Caliptra RT
32,802,318 UART: [state] CFI Enabled
32,919,665 UART: [rt] RT listening for mailbox commands...
32,950,860 UART: [rt]cmd =0x4c444556, len=4
32,962,156 >>> mbox cmd response data (687 bytes)
33,003,496 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,033,583 UART: [rt]cmd =0x43455246, len=4
33,046,412 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
4,127,610 ready_for_fw is high
4,128,205 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,838 >>> mbox cmd response: success
18,069,438 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,709,144 UART:
23,709,562 UART: Running Caliptra FMC ...
23,710,671 UART:
23,710,827 UART: [state] CFI Enabled
23,718,520 UART: [fht] FMC Alias Private Key: 7
26,048,938 UART: [art] Extend RT PCRs Done
26,050,165 UART: [art] Lock RT PCRs Done
26,051,958 UART: [art] Populate DV Done
26,057,485 UART: [fht] FMC Alias Private Key: 7
26,059,211 UART: [art] Derive CDI
26,060,034 UART: [art] Store in in slot 0x4
26,102,855 UART: [art] Derive Key Pair
26,103,855 UART: [art] Store priv key in slot 0x5
29,346,178 UART: [art] Derive Key Pair - Done
29,359,560 UART: [art] Signing Cert with AUTHO
29,360,862 UART: RITY.KEYID = 7
31,639,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,467 UART: [art] PUB.X = FF2CA536A3939084E53745CF4C3A038093573E3CB865613C7593C095FAD1EB7EBD3976A31EB53B14A09D5893CCE0F0B8
31,648,687 UART: [art] PUB.Y = 27028E473035FDD436D25F12A064246AA042B90E1C289BF81A1A427C6848557CFEE0B22F0BE82A183849D91A94E0D2C3
31,655,947 UART: [art] SIG.R = 01DF03BAFCC951CC0B270447E6067EFA10E91C0CE5501D26F43A37C3F6E43AE743FF2AAD99116724849B1082C7BED444
31,663,307 UART: [art] SIG.S = 9A25D01F52F9B60A54A685F2B8572A40A499234F383082F1CF31E6E5C9E570D3253B27E959C86160E42CE6EEC2739B97
32,968,837 UART: Caliptra RT
32,969,540 UART: [state] CFI Enabled
33,086,401 UART: [rt] RT listening for mailbox commands...
33,117,335 UART: [rt]cmd =0x4c444556, len=4
33,128,498 >>> mbox cmd response data (687 bytes)
33,169,867 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,199,975 UART: [rt]cmd =0x43455246, len=4
33,212,777 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,553 UART:
192,938 UART: Running Caliptra ROM ...
194,145 UART:
194,300 UART: [state] CFI Enabled
264,145 UART: [state] LifecycleState = Unprovisioned
266,074 UART: [state] DebugLocked = No
267,472 UART: [state] WD Timer not started. Device not locked for debugging
270,537 UART: [kat] SHA2-256
449,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,295 UART: [kat] ++
461,834 UART: [kat] sha1
472,079 UART: [kat] SHA2-256
475,095 UART: [kat] SHA2-384
481,442 UART: [kat] SHA2-512-ACC
484,375 UART: [kat] ECC-384
2,928,976 UART: [kat] HMAC-384Kdf
2,951,722 UART: [kat] LMS
3,481,149 UART: [kat] --
3,485,150 UART: [cold-reset] ++
3,487,292 UART: [fht] FHT @ 0x50003400
3,498,629 UART: [idev] ++
3,499,194 UART: [idev] CDI.KEYID = 6
3,500,229 UART: [idev] SUBJECT.KEYID = 7
3,501,356 UART: [idev] UDS.KEYID = 0
3,502,462 ready_for_fw is high
3,502,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,646,577 UART: [idev] Erasing UDS.KEYID = 0
6,003,639 UART: [idev] Sha1 KeyId Algorithm
6,026,377 UART: [idev] --
6,030,080 UART: [ldev] ++
6,030,661 UART: [ldev] CDI.KEYID = 6
6,031,546 UART: [ldev] SUBJECT.KEYID = 5
6,032,760 UART: [ldev] AUTHORITY.KEYID = 7
6,033,998 UART: [ldev] FE.KEYID = 1
6,079,945 UART: [ldev] Erasing FE.KEYID = 1
8,585,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,596 UART: [ldev] --
10,396,017 UART: [fwproc] Wait for Commands...
10,398,276 UART: [fwproc] Recv command 0x46574c44
10,400,363 UART: [fwproc] Recv'd Img size: 114360 bytes
13,798,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,258,125 >>> mbox cmd response: success
14,258,661 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,262,150 UART: [afmc] ++
14,262,768 UART: [afmc] CDI.KEYID = 6
14,263,686 UART: [afmc] SUBJECT.KEYID = 7
14,264,849 UART: [afmc] AUTHORITY.KEYID = 5
16,807,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,105 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,365 UART: [afmc] --
18,606,938 UART: [cold-reset] --
18,612,201 UART: [state] Locking Datavault
18,618,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,393 UART: [state] Locking ICCM
18,622,058 UART: [exit] Launching FMC @ 0x40000130
18,630,458 UART:
18,630,703 UART: Running Caliptra FMC ...
18,631,810 UART:
18,631,966 UART: [state] CFI Enabled
18,688,732 UART: [fht] FMC Alias Private Key: 7
20,452,620 UART: [art] Extend RT PCRs Done
20,453,857 UART: [art] Lock RT PCRs Done
20,455,696 UART: [art] Populate DV Done
20,461,217 UART: [fht] FMC Alias Private Key: 7
20,462,807 UART: [art] Derive CDI
20,463,624 UART: [art] Store in in slot 0x4
20,521,186 UART: [art] Derive Key Pair
20,522,224 UART: [art] Store priv key in slot 0x5
22,985,000 UART: [art] Derive Key Pair - Done
22,998,484 UART: [art] Signing Cert with AUTHO
22,999,794 UART: RITY.KEYID = 7
24,710,885 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,386 UART: [art] PUB.X = B659DC1642538B6BCD98B49341E60B03786751A86CCD93366DC0F232BF475913148D43248506D051346920E2F9E94D3B
24,719,566 UART: [art] PUB.Y = FD0B839B86B84B017D6119C128109E8713954A296C2C9584F43DC5D0129E8D227531DAE7CDE6663D0B67DFBE4E98AE89
24,726,834 UART: [art] SIG.R = 4E383D6C92ED824A2EA9DE39EB2132C2988F115C72CDB0DE0B3A865DF61405CC87121266D2EDC83364E8D14EFDEFC178
24,734,275 UART: [art] SIG.S = BB59B1B118504EFE1247845D5C77C0494708BFCD341148B3702069991365AAB01ECE7E4E355127599B215ABEB2D883F6
25,713,204 UART: Caliptra RT
25,713,917 UART: [state] CFI Enabled
25,878,096 UART: [rt] RT listening for mailbox commands...
25,909,313 UART: [rt]cmd =0x4c444556, len=4
25,920,566 >>> mbox cmd response data (687 bytes)
25,961,907 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,991,841 UART: [rt]cmd =0x43455246, len=4
26,004,701 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,464 UART:
192,823 UART: Running Caliptra ROM ...
194,019 UART:
194,183 UART: [state] CFI Enabled
263,839 UART: [state] LifecycleState = Unprovisioned
266,249 UART: [state] DebugLocked = No
269,132 UART: [state] WD Timer not started. Device not locked for debugging
273,087 UART: [kat] SHA2-256
462,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,712 UART: [kat] ++
474,186 UART: [kat] sha1
485,554 UART: [kat] SHA2-256
488,572 UART: [kat] SHA2-384
495,133 UART: [kat] SHA2-512-ACC
497,715 UART: [kat] ECC-384
2,947,280 UART: [kat] HMAC-384Kdf
2,971,449 UART: [kat] LMS
3,503,172 UART: [kat] --
3,507,043 UART: [cold-reset] ++
3,509,268 UART: [fht] FHT @ 0x50003400
3,521,167 UART: [idev] ++
3,521,802 UART: [idev] CDI.KEYID = 6
3,522,836 UART: [idev] SUBJECT.KEYID = 7
3,524,010 UART: [idev] UDS.KEYID = 0
3,524,940 ready_for_fw is high
3,525,131 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,981 UART: [idev] Erasing UDS.KEYID = 0
6,030,097 UART: [idev] Sha1 KeyId Algorithm
6,052,232 UART: [idev] --
6,056,905 UART: [ldev] ++
6,057,597 UART: [ldev] CDI.KEYID = 6
6,058,667 UART: [ldev] SUBJECT.KEYID = 5
6,059,776 UART: [ldev] AUTHORITY.KEYID = 7
6,060,963 UART: [ldev] FE.KEYID = 1
6,098,758 UART: [ldev] Erasing FE.KEYID = 1
8,605,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,017 UART: [ldev] --
10,412,261 UART: [fwproc] Wait for Commands...
10,415,293 UART: [fwproc] Recv command 0x46574c44
10,417,604 UART: [fwproc] Recv'd Img size: 114360 bytes
13,871,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,612,291 >>> mbox cmd response: success
14,612,815 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,615,770 UART: [afmc] ++
14,616,470 UART: [afmc] CDI.KEYID = 6
14,617,631 UART: [afmc] SUBJECT.KEYID = 7
14,619,173 UART: [afmc] AUTHORITY.KEYID = 5
17,152,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,438 UART: [afmc] --
18,947,686 UART: [cold-reset] --
18,952,308 UART: [state] Locking Datavault
18,958,422 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,559 UART: [state] Locking ICCM
18,961,957 UART: [exit] Launching FMC @ 0x40000130
18,970,626 UART:
18,970,862 UART: Running Caliptra FMC ...
18,971,964 UART:
18,972,127 UART: [state] CFI Enabled
19,031,604 UART: [fht] FMC Alias Private Key: 7
20,795,464 UART: [art] Extend RT PCRs Done
20,796,685 UART: [art] Lock RT PCRs Done
20,798,201 UART: [art] Populate DV Done
20,803,609 UART: [fht] FMC Alias Private Key: 7
20,805,176 UART: [art] Derive CDI
20,805,999 UART: [art] Store in in slot 0x4
20,864,478 UART: [art] Derive Key Pair
20,865,513 UART: [art] Store priv key in slot 0x5
23,328,445 UART: [art] Derive Key Pair - Done
23,341,759 UART: [art] Signing Cert with AUTHO
23,343,069 UART: RITY.KEYID = 7
25,054,095 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,608 UART: [art] PUB.X = 224BAA1850FD678263112E4048D2EA64EFDDE155603A29D2A0F24EDB636455F75266D30E2B97EC433A7C65721F2D55F4
25,062,854 UART: [art] PUB.Y = B32E27EF5F3054F485AF895D1E6545F792BB0E794FF0048296EC7A52AAA82872DD9CC85053B6D3C62C002033FA2EFF89
25,070,078 UART: [art] SIG.R = 94B0B45F3FE2DCFCF93D81FB0F424C75236AE165CB38DBAEADFC7BD50E7F38BA876AA4F3D03AF46A6B7C05C1E9B6CF65
25,077,523 UART: [art] SIG.S = C27CF335C61ED0746F8171E1B73B44A811076C1F40A9C4D4BB0129AFC1474E4DEB0F98EDDF089E384EA7B5D3253A1E0B
26,056,771 UART: Caliptra RT
26,057,466 UART: [state] CFI Enabled
26,222,821 UART: [rt] RT listening for mailbox commands...
26,253,905 UART: [rt]cmd =0x4c444556, len=4
26,265,007 >>> mbox cmd response data (687 bytes)
26,306,631 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,336,571 UART: [rt]cmd =0x43455246, len=4
26,349,323 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,418,777 ready_for_fw is high
3,419,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,697,941 >>> mbox cmd response: success
14,698,601 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,985,414 UART:
18,985,796 UART: Running Caliptra FMC ...
18,986,927 UART:
18,987,084 UART: [state] CFI Enabled
19,052,025 UART: [fht] FMC Alias Private Key: 7
20,815,596 UART: [art] Extend RT PCRs Done
20,816,810 UART: [art] Lock RT PCRs Done
20,818,266 UART: [art] Populate DV Done
20,823,581 UART: [fht] FMC Alias Private Key: 7
20,825,127 UART: [art] Derive CDI
20,825,968 UART: [art] Store in in slot 0x4
20,884,502 UART: [art] Derive Key Pair
20,885,547 UART: [art] Store priv key in slot 0x5
23,348,010 UART: [art] Derive Key Pair - Done
23,361,503 UART: [art] Signing Cert with AUTHO
23,362,813 UART: RITY.KEYID = 7
25,075,127 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,935 UART: [art] PUB.X = 04438E761CED02CE6481DE5382C812D8D6D6FC68D10CF0FB74652BFBC9994719A125DDE94A95B0A0E8D28CBDE12A7044
25,083,915 UART: [art] PUB.Y = 271158A18A303102DC3C235191654902B30D9BA012B120476B37494468EFDAB3CC72F05A6B1C97429836B8E9BDD5B5BA
25,091,146 UART: [art] SIG.R = 19113E2415C19C42480C0FA23682FC1B651D63BEC61C9C13AEB5194F08F7035A8781C0AAD162A98CBB25560329B11874
25,098,548 UART: [art] SIG.S = A339964D772912285987EB6ED609E7F6A1CC0009EF9B1FE5E47675B1E9B96B28467042EBF5323287C6EBC7F3486C57EF
26,077,569 UART: Caliptra RT
26,078,273 UART: [state] CFI Enabled
26,242,175 UART: [rt] RT listening for mailbox commands...
26,273,111 UART: [rt]cmd =0x4c444556, len=4
26,284,045 >>> mbox cmd response data (687 bytes)
26,326,401 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,356,347 UART: [rt]cmd =0x43455246, len=4
26,369,000 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,447 UART:
192,820 UART: Running Caliptra ROM ...
194,010 UART:
603,700 UART: [state] CFI Enabled
616,960 UART: [state] LifecycleState = Unprovisioned
619,338 UART: [state] DebugLocked = No
620,811 UART: [state] WD Timer not started. Device not locked for debugging
625,146 UART: [kat] SHA2-256
815,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,815 UART: [kat] ++
826,423 UART: [kat] sha1
837,796 UART: [kat] SHA2-256
840,798 UART: [kat] SHA2-384
846,499 UART: [kat] SHA2-512-ACC
849,076 UART: [kat] ECC-384
3,290,015 UART: [kat] HMAC-384Kdf
3,302,252 UART: [kat] LMS
3,834,104 UART: [kat] --
3,839,518 UART: [cold-reset] ++
3,842,085 UART: [fht] FHT @ 0x50003400
3,852,705 UART: [idev] ++
3,853,345 UART: [idev] CDI.KEYID = 6
3,854,377 UART: [idev] SUBJECT.KEYID = 7
3,855,481 UART: [idev] UDS.KEYID = 0
3,856,404 ready_for_fw is high
3,856,608 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,218 UART: [idev] Erasing UDS.KEYID = 0
6,337,217 UART: [idev] Sha1 KeyId Algorithm
6,360,934 UART: [idev] --
6,365,945 UART: [ldev] ++
6,366,627 UART: [ldev] CDI.KEYID = 6
6,367,504 UART: [ldev] SUBJECT.KEYID = 5
6,368,714 UART: [ldev] AUTHORITY.KEYID = 7
6,369,946 UART: [ldev] FE.KEYID = 1
6,381,913 UART: [ldev] Erasing FE.KEYID = 1
8,858,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,756 UART: [ldev] --
10,645,577 UART: [fwproc] Wait for Commands...
10,648,588 UART: [fwproc] Recv command 0x46574c44
10,650,885 UART: [fwproc] Recv'd Img size: 114360 bytes
14,094,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,834,907 >>> mbox cmd response: success
14,835,426 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,838,961 UART: [afmc] ++
14,839,656 UART: [afmc] CDI.KEYID = 6
14,840,892 UART: [afmc] SUBJECT.KEYID = 7
14,842,328 UART: [afmc] AUTHORITY.KEYID = 5
17,345,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,780 UART: [afmc] --
19,142,753 UART: [cold-reset] --
19,146,721 UART: [state] Locking Datavault
19,151,584 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,715 UART: [state] Locking ICCM
19,156,076 UART: [exit] Launching FMC @ 0x40000130
19,164,749 UART:
19,164,982 UART: Running Caliptra FMC ...
19,166,080 UART:
19,166,236 UART: [state] CFI Enabled
19,174,390 UART: [fht] FMC Alias Private Key: 7
20,931,544 UART: [art] Extend RT PCRs Done
20,932,776 UART: [art] Lock RT PCRs Done
20,934,676 UART: [art] Populate DV Done
20,939,939 UART: [fht] FMC Alias Private Key: 7
20,941,466 UART: [art] Derive CDI
20,942,211 UART: [art] Store in in slot 0x4
20,984,800 UART: [art] Derive Key Pair
20,985,797 UART: [art] Store priv key in slot 0x5
23,413,016 UART: [art] Derive Key Pair - Done
23,425,858 UART: [art] Signing Cert with AUTHO
23,427,192 UART: RITY.KEYID = 7
25,132,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,387 UART: [art] PUB.X = 662B239D3F10CD8F842F7C633A6EDA856DA4AFF6A9867D40548F40C3E8A7D73ECBB6A7D8F52941A32BEE3538AC4567CC
25,141,682 UART: [art] PUB.Y = 89B3DE746BAC8F2D0832FF75556332B00120DCD7C3598C48F2E15E723C815C0F367BD375B00A7C09124C3F0C2D045921
25,148,968 UART: [art] SIG.R = EDA2DC9F2A8CE9F95D0D2DC0E7CA8460338C9B5EE5ABC0E5DD0B50DED2C4D7C8BF5D3659EA2B8EFDF1BC5995F4CF8FD2
25,156,419 UART: [art] SIG.S = 5DDA95FEECE0B41659B25524654343F66C8508CD30C0EDC05F90C77F2BF7C868FCD9D8FDB6C2FA2CF2D09F696690809B
26,135,707 UART: Caliptra RT
26,136,419 UART: [state] CFI Enabled
26,253,560 UART: [rt] RT listening for mailbox commands...
26,284,727 UART: [rt]cmd =0x4c444556, len=4
26,295,759 >>> mbox cmd response data (687 bytes)
26,337,287 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,367,534 UART: [rt]cmd =0x43455246, len=4
26,380,426 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,807 writing to cptra_bootfsm_go
3,768,013 ready_for_fw is high
3,768,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,052 >>> mbox cmd response: success
14,956,959 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,208,968 UART:
19,209,348 UART: Running Caliptra FMC ...
19,210,478 UART:
19,210,632 UART: [state] CFI Enabled
19,218,633 UART: [fht] FMC Alias Private Key: 7
20,976,031 UART: [art] Extend RT PCRs Done
20,977,259 UART: [art] Lock RT PCRs Done
20,979,198 UART: [art] Populate DV Done
20,984,504 UART: [fht] FMC Alias Private Key: 7
20,986,097 UART: [art] Derive CDI
20,986,835 UART: [art] Store in in slot 0x4
21,029,639 UART: [art] Derive Key Pair
21,030,639 UART: [art] Store priv key in slot 0x5
23,457,193 UART: [art] Derive Key Pair - Done
23,470,199 UART: [art] Signing Cert with AUTHO
23,471,498 UART: RITY.KEYID = 7
25,176,880 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,386 UART: [art] PUB.X = 905CE09D9BE1372633C1BE6B6460B0D01C1666277610239AB03BAFDBD13B37881DAE55E35EC7695D694EE8CBAD2E5F92
25,185,625 UART: [art] PUB.Y = 65D3F4858EA246C1FD901AC07E139250C60886D052BE3BD9640C85289616B04AE6853B6E017D1DDDB10E718E1B7C105D
25,192,918 UART: [art] SIG.R = F7FAC7F133A9F7132726B580EA51D2D1FA068D8D5D6428CD527738AFE38EB40C19E7C75F7CDD9D01598531CD6810A195
25,200,313 UART: [art] SIG.S = 0525F1DA4D0EDC9D6C8B1BBE987829583A37E7840DA46EAD1FB76100455596A0DBFC74D512E6705F7158A500E429E24D
26,178,894 UART: Caliptra RT
26,179,608 UART: [state] CFI Enabled
26,296,042 UART: [rt] RT listening for mailbox commands...
26,327,048 UART: [rt]cmd =0x4c444556, len=4
26,338,063 >>> mbox cmd response data (687 bytes)
26,379,363 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,409,194 UART: [rt]cmd =0x43455246, len=4
26,421,710 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,650 UART: [state] LifecycleState = Unprovisioned
85,305 UART: [state] DebugLocked = No
85,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,439 UART: [kat] SHA2-256
881,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,485 UART: [kat] ++
885,637 UART: [kat] sha1
889,839 UART: [kat] SHA2-256
891,777 UART: [kat] SHA2-384
894,656 UART: [kat] SHA2-512-ACC
896,557 UART: [kat] ECC-384
901,948 UART: [kat] HMAC-384Kdf
906,486 UART: [kat] LMS
1,474,682 UART: [kat] --
1,475,491 UART: [cold-reset] ++
1,475,851 UART: [fht] Storing FHT @ 0x50003400
1,478,562 UART: [idev] ++
1,478,730 UART: [idev] CDI.KEYID = 6
1,479,090 UART: [idev] SUBJECT.KEYID = 7
1,479,514 UART: [idev] UDS.KEYID = 0
1,479,859 ready_for_fw is high
1,479,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,312 UART: [idev] Erasing UDS.KEYID = 0
1,504,082 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,650 UART: [idev] --
1,513,747 UART: [ldev] ++
1,513,915 UART: [ldev] CDI.KEYID = 6
1,514,278 UART: [ldev] SUBJECT.KEYID = 5
1,514,704 UART: [ldev] AUTHORITY.KEYID = 7
1,515,167 UART: [ldev] FE.KEYID = 1
1,520,407 UART: [ldev] Erasing FE.KEYID = 1
1,545,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,642 UART: [ldev] --
1,584,953 UART: [fwproc] Waiting for Commands...
1,585,590 UART: [fwproc] Received command 0x46574c44
1,586,381 UART: [fwproc] Received Image of size 114360 bytes
2,883,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,930 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,282 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,161 >>> mbox cmd response: success
3,076,161 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,077,223 UART: [afmc] ++
3,077,391 UART: [afmc] CDI.KEYID = 6
3,077,753 UART: [afmc] SUBJECT.KEYID = 7
3,078,178 UART: [afmc] AUTHORITY.KEYID = 5
3,113,369 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,082 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,772 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,811 UART: [afmc] --
3,156,785 UART: [cold-reset] --
3,157,731 UART: [state] Locking Datavault
3,158,916 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,520 UART: [state] Locking ICCM
3,159,980 UART: [exit] Launching FMC @ 0x40000130
3,165,309 UART:
3,165,325 UART: Running Caliptra FMC ...
3,165,733 UART:
3,165,787 UART: [state] CFI Enabled
3,175,880 UART: [fht] FMC Alias Private Key: 7
3,284,149 UART: [art] Extend RT PCRs Done
3,284,577 UART: [art] Lock RT PCRs Done
3,286,029 UART: [art] Populate DV Done
3,294,254 UART: [fht] FMC Alias Private Key: 7
3,295,296 UART: [art] Derive CDI
3,295,576 UART: [art] Store in in slot 0x4
3,381,507 UART: [art] Derive Key Pair
3,381,867 UART: [art] Store priv key in slot 0x5
3,394,679 UART: [art] Derive Key Pair - Done
3,409,783 UART: [art] Signing Cert with AUTHO
3,410,263 UART: RITY.KEYID = 7
3,425,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,092 UART: [art] PUB.X = 32161FB6F46729D5531AA5AB98C09A74E61A2D25B08033252F6C495ABB0079F81CBE3FA553DD9296FD72453039699472
3,432,836 UART: [art] PUB.Y = 3B256763E17AC072CF82BCF4EA9E0C368ACA71E93BB6BAACE68C4958DE3DCE66E2AA1073C38581FBDF3729930D71A64D
3,439,800 UART: [art] SIG.R = 267D555135A9F475F7C62CFF9B56808434EB5C5202FDA484318F9DB0867636CB02D09612D03A0AABDB8E976BDFF19734
3,446,565 UART: [art] SIG.S = 3F81B1A527F3D71B3DC2B997C7089FF1254061F1F0FD30B4796E4CF864D3555C627917E34310865EC0842FC12BA676BA
3,470,435 UART: Caliptra RT
3,470,689 UART: [state] CFI Enabled
3,579,842 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,029 UART: [rt]cmd =0x4c444556, len=4
3,620,522 >>> mbox cmd response data (687 bytes)
3,620,523 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,720 UART: [rt]cmd =0x43455246, len=4
3,661,973 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,331 ready_for_fw is high
1,362,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,838 >>> mbox cmd response: success
2,927,838 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,872 UART:
2,988,888 UART: Running Caliptra FMC ...
2,989,296 UART:
2,989,350 UART: [state] CFI Enabled
2,999,785 UART: [fht] FMC Alias Private Key: 7
3,108,184 UART: [art] Extend RT PCRs Done
3,108,612 UART: [art] Lock RT PCRs Done
3,109,848 UART: [art] Populate DV Done
3,117,877 UART: [fht] FMC Alias Private Key: 7
3,118,869 UART: [art] Derive CDI
3,119,149 UART: [art] Store in in slot 0x4
3,204,816 UART: [art] Derive Key Pair
3,205,176 UART: [art] Store priv key in slot 0x5
3,217,822 UART: [art] Derive Key Pair - Done
3,232,776 UART: [art] Signing Cert with AUTHO
3,233,256 UART: RITY.KEYID = 7
3,248,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,241 UART: [art] PUB.X = 345D050DD2A5D57523DB06527D0ECEE7FF22405820CAA011C1701733E6AB5A791C2B0ACEFF94EBB68C5636513DB0EDBB
3,256,012 UART: [art] PUB.Y = 0B030951D878A41060109C8985D44DF14DF83FDADD7608AB2E6855713672B7A58F3019743EA7D8D64E74169D9954F5C0
3,262,944 UART: [art] SIG.R = C4D1B5B7897CB15C355015642E0ECD37ACA84549F6E7959FF5AD97CAE5346D89B1599D7E79598C78B0E323310386FDF3
3,269,712 UART: [art] SIG.S = 2CE08037BE64CE24F62A803496DF985A29081FB293D2124A321B4EAFD9690215AADCB94F2B8153F88A066A5CB6D6BF2C
3,293,300 UART: Caliptra RT
3,293,554 UART: [state] CFI Enabled
3,402,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,873 UART: [rt]cmd =0x4c444556, len=4
3,443,146 >>> mbox cmd response data (687 bytes)
3,443,147 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,506 UART: [rt]cmd =0x43455246, len=4
3,484,699 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,794 UART: [kat] SHA2-256
892,732 UART: [kat] SHA2-384
895,351 UART: [kat] SHA2-512-ACC
897,252 UART: [kat] ECC-384
902,901 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,479,843 UART: [idev] ++
1,480,011 UART: [idev] CDI.KEYID = 6
1,480,371 UART: [idev] SUBJECT.KEYID = 7
1,480,795 UART: [idev] UDS.KEYID = 0
1,481,140 ready_for_fw is high
1,481,140 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,419 UART: [idev] Erasing UDS.KEYID = 0
1,504,863 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,664 UART: [ldev] ++
1,514,832 UART: [ldev] CDI.KEYID = 6
1,515,195 UART: [ldev] SUBJECT.KEYID = 5
1,515,621 UART: [ldev] AUTHORITY.KEYID = 7
1,516,084 UART: [ldev] FE.KEYID = 1
1,521,388 UART: [ldev] Erasing FE.KEYID = 1
1,546,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,627 UART: [ldev] --
1,585,926 UART: [fwproc] Waiting for Commands...
1,586,713 UART: [fwproc] Received command 0x46574c44
1,587,504 UART: [fwproc] Received Image of size 114360 bytes
2,885,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,706 >>> mbox cmd response: success
3,078,706 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,728 UART: [afmc] ++
3,079,896 UART: [afmc] CDI.KEYID = 6
3,080,258 UART: [afmc] SUBJECT.KEYID = 7
3,080,683 UART: [afmc] AUTHORITY.KEYID = 5
3,116,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,434 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,214 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,942 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,827 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,517 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,478 UART: [afmc] --
3,159,542 UART: [cold-reset] --
3,160,528 UART: [state] Locking Datavault
3,161,835 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,439 UART: [state] Locking ICCM
3,163,087 UART: [exit] Launching FMC @ 0x40000130
3,168,416 UART:
3,168,432 UART: Running Caliptra FMC ...
3,168,840 UART:
3,168,983 UART: [state] CFI Enabled
3,179,366 UART: [fht] FMC Alias Private Key: 7
3,287,211 UART: [art] Extend RT PCRs Done
3,287,639 UART: [art] Lock RT PCRs Done
3,289,173 UART: [art] Populate DV Done
3,297,698 UART: [fht] FMC Alias Private Key: 7
3,298,764 UART: [art] Derive CDI
3,299,044 UART: [art] Store in in slot 0x4
3,384,615 UART: [art] Derive Key Pair
3,384,975 UART: [art] Store priv key in slot 0x5
3,397,749 UART: [art] Derive Key Pair - Done
3,412,248 UART: [art] Signing Cert with AUTHO
3,412,728 UART: RITY.KEYID = 7
3,428,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,105 UART: [art] PUB.X = 8AE9CC5F0A77E443B6D2ED87A7FDE1C30362666193F316BABA7047BB983336D5EA18F6ABFF546CD02551706A5ADBD1C2
3,435,885 UART: [art] PUB.Y = 5312B5E7E727130020EA8CEE64D03F5A48419EA84A6D8146F880CDCDC94F026D61A16C4F59106E410BE8502655A32020
3,442,805 UART: [art] SIG.R = 55861391FC38BFDEB7F7338C90193B08588258F5A7D7CCE396717B02AB4D45A73A4B7588BB43023EEB60914E11987AB8
3,449,566 UART: [art] SIG.S = DAD5983C514E5207CE100DECB3FA6B32A9BB2328385CB140CCEE3C3F4B9F47A220B85728BA6A65A7B2450882870E2F10
3,473,031 UART: Caliptra RT
3,473,377 UART: [state] CFI Enabled
3,581,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,496 UART: [rt]cmd =0x4c444556, len=4
3,622,163 >>> mbox cmd response data (687 bytes)
3,622,164 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,505 UART: [rt]cmd =0x43455246, len=4
3,663,844 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,464 ready_for_fw is high
1,362,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,992 >>> mbox cmd response: success
2,927,992 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,989,786 UART:
2,989,802 UART: Running Caliptra FMC ...
2,990,210 UART:
2,990,353 UART: [state] CFI Enabled
3,001,184 UART: [fht] FMC Alias Private Key: 7
3,108,829 UART: [art] Extend RT PCRs Done
3,109,257 UART: [art] Lock RT PCRs Done
3,111,071 UART: [art] Populate DV Done
3,119,214 UART: [fht] FMC Alias Private Key: 7
3,120,232 UART: [art] Derive CDI
3,120,512 UART: [art] Store in in slot 0x4
3,206,187 UART: [art] Derive Key Pair
3,206,547 UART: [art] Store priv key in slot 0x5
3,219,519 UART: [art] Derive Key Pair - Done
3,234,503 UART: [art] Signing Cert with AUTHO
3,234,983 UART: RITY.KEYID = 7
3,250,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,000 UART: [art] PUB.X = F79D843DD571A18A92B463716AEB85FF8A6C9ECE59FA9608344DB10FE9978112789345495A7546083C26E7041B06D16A
3,257,751 UART: [art] PUB.Y = F06330D2691E47FBD2F6E85D9A93F78AED4BEB2C77E6DA773F44AF7AEA4F7E502EF9CB97683BC075BB736AE18AE69F3A
3,264,725 UART: [art] SIG.R = F95F7F51E00A99841B473A5E0C94ED96DFDC3C7CB2ACA24CB8C71BF67AEE526D1E2E3A20F0A68AA3C2F3C9A7C1D0B667
3,271,515 UART: [art] SIG.S = 0A7ADF4A3E251E02D1A5981BD4852FB1C74E2B017E9F6DCB5C980CEE0523684C5066D60831F55E42BC739A18D5F533A2
3,295,128 UART: Caliptra RT
3,295,474 UART: [state] CFI Enabled
3,404,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,929 UART: [rt]cmd =0x4c444556, len=4
3,444,360 >>> mbox cmd response data (687 bytes)
3,444,361 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,542 UART: [rt]cmd =0x43455246, len=4
3,485,809 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
86,949 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
893,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,919 UART: [kat] ++
898,071 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
907,030 UART: [kat] SHA2-512-ACC
908,931 UART: [kat] ECC-384
918,602 UART: [kat] HMAC-384Kdf
923,060 UART: [kat] LMS
1,171,388 UART: [kat] --
1,172,469 UART: [cold-reset] ++
1,172,835 UART: [fht] FHT @ 0x50003400
1,175,452 UART: [idev] ++
1,175,620 UART: [idev] CDI.KEYID = 6
1,175,980 UART: [idev] SUBJECT.KEYID = 7
1,176,404 UART: [idev] UDS.KEYID = 0
1,176,749 ready_for_fw is high
1,176,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,508 UART: [idev] Erasing UDS.KEYID = 0
1,201,611 UART: [idev] Sha1 KeyId Algorithm
1,210,201 UART: [idev] --
1,211,269 UART: [ldev] ++
1,211,437 UART: [ldev] CDI.KEYID = 6
1,211,800 UART: [ldev] SUBJECT.KEYID = 5
1,212,226 UART: [ldev] AUTHORITY.KEYID = 7
1,212,689 UART: [ldev] FE.KEYID = 1
1,217,541 UART: [ldev] Erasing FE.KEYID = 1
1,243,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,643 UART: [ldev] --
1,283,152 UART: [fwproc] Wait for Commands...
1,283,818 UART: [fwproc] Recv command 0x46574c44
1,284,546 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,714 >>> mbox cmd response: success
2,774,714 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,788 UART: [afmc] ++
2,775,956 UART: [afmc] CDI.KEYID = 6
2,776,318 UART: [afmc] SUBJECT.KEYID = 7
2,776,743 UART: [afmc] AUTHORITY.KEYID = 5
2,812,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,892 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,611 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,449 UART: [afmc] --
2,855,489 UART: [cold-reset] --
2,856,089 UART: [state] Locking Datavault
2,857,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,920 UART: [state] Locking ICCM
2,858,536 UART: [exit] Launching FMC @ 0x40000130
2,863,865 UART:
2,863,881 UART: Running Caliptra FMC ...
2,864,289 UART:
2,864,343 UART: [state] CFI Enabled
2,874,980 UART: [fht] FMC Alias Private Key: 7
2,983,201 UART: [art] Extend RT PCRs Done
2,983,629 UART: [art] Lock RT PCRs Done
2,985,361 UART: [art] Populate DV Done
2,993,678 UART: [fht] FMC Alias Private Key: 7
2,994,662 UART: [art] Derive CDI
2,994,942 UART: [art] Store in in slot 0x4
3,080,765 UART: [art] Derive Key Pair
3,081,125 UART: [art] Store priv key in slot 0x5
3,093,909 UART: [art] Derive Key Pair - Done
3,108,540 UART: [art] Signing Cert with AUTHO
3,109,020 UART: RITY.KEYID = 7
3,124,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,097 UART: [art] PUB.X = 87E363027F54636AE683FC4FBDED5CD89523FC17C0284D660AED906CE5951D86660E2A0445040388B26C8BE706E05619
3,131,844 UART: [art] PUB.Y = 182F5EA6916855E5C75836E3E2FF98E19FC9E00C9742D4320FD60CBD0C144775B1040F204F9BD426FB22AA6F1E4C5868
3,138,780 UART: [art] SIG.R = 7EA67FC3B63BF36D0FBF5FD634EFE890C06CA8A3EBFF2B8AB762CFB5EF04B38F0BDC7C323377065FB0CA6E80EA8EB573
3,145,570 UART: [art] SIG.S = A64DED8885F84A4CA95D43AC66C1B52E0526309B0E6DD51C64C812F0ECBBB4BFFFC0C4DDD3B66D0F7B8282F86DEAEC80
3,169,872 UART: Caliptra RT
3,170,126 UART: [state] CFI Enabled
3,277,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,233 UART: [rt]cmd =0x4c444556, len=4
3,318,552 >>> mbox cmd response data (687 bytes)
3,318,553 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,046 UART: [rt]cmd =0x43455246, len=4
3,360,191 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 ready_for_fw is high
1,060,713 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,745 >>> mbox cmd response: success
2,628,745 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,690,555 UART:
2,690,571 UART: Running Caliptra FMC ...
2,690,979 UART:
2,691,033 UART: [state] CFI Enabled
2,701,578 UART: [fht] FMC Alias Private Key: 7
2,809,111 UART: [art] Extend RT PCRs Done
2,809,539 UART: [art] Lock RT PCRs Done
2,811,367 UART: [art] Populate DV Done
2,819,602 UART: [fht] FMC Alias Private Key: 7
2,820,700 UART: [art] Derive CDI
2,820,980 UART: [art] Store in in slot 0x4
2,906,485 UART: [art] Derive Key Pair
2,906,845 UART: [art] Store priv key in slot 0x5
2,919,949 UART: [art] Derive Key Pair - Done
2,934,809 UART: [art] Signing Cert with AUTHO
2,935,289 UART: RITY.KEYID = 7
2,950,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,036 UART: [art] PUB.X = A3C7B896BC5A1F77A7E69B17E458EA382078519E605955953DE0CB8A37A7BF0E4538FA861052F4EF5B3348F9FB987B85
2,957,807 UART: [art] PUB.Y = FB847BE96191A28CB5981F8672C7CAB4B5CD3E269220E66B642E58EE56368AA59584624AEB957E3D47E9DFCC6DD7B0E4
2,964,769 UART: [art] SIG.R = 137467E98D5BFF56F365B87C475F8416504FA35947B2EA164E2CB8E3D80E0CC868A6F3E08D0AB5503B6C8BE54F2748A6
2,971,536 UART: [art] SIG.S = CAF746D50E4A25B5ED5A9C10319845D9753C9C1C7E8F7CE40E1879DB61776404F91AFD7AD54ABD883AB9843277842EDB
2,995,646 UART: Caliptra RT
2,995,900 UART: [state] CFI Enabled
3,104,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,131 UART: [rt]cmd =0x4c444556, len=4
3,144,602 >>> mbox cmd response data (687 bytes)
3,144,603 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,964 UART: [rt]cmd =0x43455246, len=4
3,185,987 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,981 UART: [kat] HMAC-384Kdf
923,695 UART: [kat] LMS
1,172,023 UART: [kat] --
1,172,932 UART: [cold-reset] ++
1,173,490 UART: [fht] FHT @ 0x50003400
1,176,279 UART: [idev] ++
1,176,447 UART: [idev] CDI.KEYID = 6
1,176,807 UART: [idev] SUBJECT.KEYID = 7
1,177,231 UART: [idev] UDS.KEYID = 0
1,177,576 ready_for_fw is high
1,177,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,019 UART: [idev] Erasing UDS.KEYID = 0
1,202,174 UART: [idev] Sha1 KeyId Algorithm
1,210,842 UART: [idev] --
1,211,912 UART: [ldev] ++
1,212,080 UART: [ldev] CDI.KEYID = 6
1,212,443 UART: [ldev] SUBJECT.KEYID = 5
1,212,869 UART: [ldev] AUTHORITY.KEYID = 7
1,213,332 UART: [ldev] FE.KEYID = 1
1,218,788 UART: [ldev] Erasing FE.KEYID = 1
1,245,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,738 UART: [ldev] --
1,285,197 UART: [fwproc] Wait for Commands...
1,285,859 UART: [fwproc] Recv command 0x46574c44
1,286,587 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,777,093 >>> mbox cmd response: success
2,777,093 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,778,155 UART: [afmc] ++
2,778,323 UART: [afmc] CDI.KEYID = 6
2,778,685 UART: [afmc] SUBJECT.KEYID = 7
2,779,110 UART: [afmc] AUTHORITY.KEYID = 5
2,814,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,432 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,317 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,036 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,078 UART: [afmc] --
2,858,044 UART: [cold-reset] --
2,858,802 UART: [state] Locking Datavault
2,859,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,523 UART: [state] Locking ICCM
2,860,961 UART: [exit] Launching FMC @ 0x40000130
2,866,290 UART:
2,866,306 UART: Running Caliptra FMC ...
2,866,714 UART:
2,866,857 UART: [state] CFI Enabled
2,877,584 UART: [fht] FMC Alias Private Key: 7
2,986,157 UART: [art] Extend RT PCRs Done
2,986,585 UART: [art] Lock RT PCRs Done
2,988,153 UART: [art] Populate DV Done
2,996,538 UART: [fht] FMC Alias Private Key: 7
2,997,692 UART: [art] Derive CDI
2,997,972 UART: [art] Store in in slot 0x4
3,083,661 UART: [art] Derive Key Pair
3,084,021 UART: [art] Store priv key in slot 0x5
3,097,611 UART: [art] Derive Key Pair - Done
3,112,069 UART: [art] Signing Cert with AUTHO
3,112,549 UART: RITY.KEYID = 7
3,127,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,404 UART: [art] PUB.X = CC48D502583C65F7939F0600170A329407219F596B9B946AE274E0B3635DD1EC2AFD171B793AA6FC8409AF8AAB7C8FFB
3,135,145 UART: [art] PUB.Y = 52D197B6AB7BE1827B4FACF2A10CCEF30F1DAFEA351908F2E4106E60482EAC5A385E41E7E5277C7990AAE363A0D39CBD
3,142,106 UART: [art] SIG.R = EE0D77FA098DB0910071836119A23545CCF035AA96E80C18DFE024FF778560B0FEEF727645D77A1E9DBCDB7D6862F318
3,148,853 UART: [art] SIG.S = F61CE9604494B1F7CC63B86B1FE54A152FDB5710CCBDE05CC984427F838F384655D45B783F7CA80B44E41590BB9535C4
3,172,733 UART: Caliptra RT
3,173,079 UART: [state] CFI Enabled
3,279,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,621 UART: [rt]cmd =0x4c444556, len=4
3,319,966 >>> mbox cmd response data (687 bytes)
3,319,967 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,240 UART: [rt]cmd =0x43455246, len=4
3,361,367 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,040 ready_for_fw is high
1,060,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,914 >>> mbox cmd response: success
2,625,914 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,688,646 UART:
2,688,662 UART: Running Caliptra FMC ...
2,689,070 UART:
2,689,213 UART: [state] CFI Enabled
2,699,726 UART: [fht] FMC Alias Private Key: 7
2,807,887 UART: [art] Extend RT PCRs Done
2,808,315 UART: [art] Lock RT PCRs Done
2,809,817 UART: [art] Populate DV Done
2,817,948 UART: [fht] FMC Alias Private Key: 7
2,818,890 UART: [art] Derive CDI
2,819,170 UART: [art] Store in in slot 0x4
2,904,939 UART: [art] Derive Key Pair
2,905,299 UART: [art] Store priv key in slot 0x5
2,919,047 UART: [art] Derive Key Pair - Done
2,934,052 UART: [art] Signing Cert with AUTHO
2,934,532 UART: RITY.KEYID = 7
2,949,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,205 UART: [art] PUB.X = 1534868328BCECBF9C8F3C5E379B5E58FC5AE0010DADA5F56E8D299EF70DDDF8000A8E8183FCBB671A8E0DA4C4A2F01D
2,956,962 UART: [art] PUB.Y = ACB7D9D4F6AFFAEC746856B161CDD31ECA01AE6F9ECF9EC405F7D6C626FE06D2BE9E5B97A5F27C66B8C5C62F31982CCC
2,963,935 UART: [art] SIG.R = 3F9D19CE6749432F1CCBFD8A2633B577CC76398E55C3E76CE2C555B9B94BC256898CF5F005CA599E5CCD87DC839D0B3A
2,970,713 UART: [art] SIG.S = B0A1F9C2B5A9D46C45DD63935C2F6087ACB05578BFD04FFCB65ACB9EC50EBE198257B651245047F97ADFC7066188A662
2,994,394 UART: Caliptra RT
2,994,740 UART: [state] CFI Enabled
3,101,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,097 UART: [rt]cmd =0x4c444556, len=4
3,142,642 >>> mbox cmd response data (687 bytes)
3,142,643 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,004 UART: [rt]cmd =0x43455246, len=4
3,184,181 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,839 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,199,229 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,102 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,067 UART: [fwproc] Recv command 0x46574c44
1,282,800 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,942 >>> mbox cmd response: success
2,773,942 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,179 UART: [afmc] ++
2,775,347 UART: [afmc] CDI.KEYID = 6
2,775,710 UART: [afmc] SUBJECT.KEYID = 7
2,776,136 UART: [afmc] AUTHORITY.KEYID = 5
2,810,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,304 UART: [afmc] --
2,854,338 UART: [cold-reset] --
2,855,172 UART: [state] Locking Datavault
2,856,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,945 UART: [state] Locking ICCM
2,857,429 UART: [exit] Launching FMC @ 0x40000130
2,862,758 UART:
2,862,774 UART: Running Caliptra FMC ...
2,863,182 UART:
2,863,236 UART: [state] CFI Enabled
2,874,057 UART: [fht] FMC Alias Private Key: 7
2,982,190 UART: [art] Extend RT PCRs Done
2,982,618 UART: [art] Lock RT PCRs Done
2,984,134 UART: [art] Populate DV Done
2,992,243 UART: [fht] FMC Alias Private Key: 7
2,993,265 UART: [art] Derive CDI
2,993,545 UART: [art] Store in in slot 0x4
3,078,930 UART: [art] Derive Key Pair
3,079,290 UART: [art] Store priv key in slot 0x5
3,092,832 UART: [art] Derive Key Pair - Done
3,107,528 UART: [art] Signing Cert with AUTHO
3,108,008 UART: RITY.KEYID = 7
3,123,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,141 UART: [art] PUB.X = 04E6A9B5D6A4DE6478898F17DB3968539C52073709489FA07C4731F7615A4BDDE7F87535327E78E488FE42B210D1B20C
3,130,895 UART: [art] PUB.Y = B005FD5FBEC7FA4293392ADADAA11E14BB7F27B4FD70C40350962786F0E20AA675C70F5682032D76228B1C3280B82446
3,137,834 UART: [art] SIG.R = 5F9870377813F170CB629E20BF40C83A12F55A3F9F3B6C00E62B0CFDD0A1FC0A249B3B43DBE8737B09D67FBDC2E55B11
3,144,587 UART: [art] SIG.S = 9E2C65AC75593B8EC17FF4269E58D32FA22ACEC4B165ED89511F8B26B19AE92140F9B79843BFCF1FD4CE20DEEF2D0388
3,168,189 UART: Caliptra RT
3,168,443 UART: [state] CFI Enabled
3,276,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,736 UART: [rt]cmd =0x4c444556, len=4
3,317,035 >>> mbox cmd response data (687 bytes)
3,317,036 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,399 UART: [rt]cmd =0x43455246, len=4
3,358,508 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,824 ready_for_fw is high
1,055,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,158 >>> mbox cmd response: success
2,623,158 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,188 UART:
2,686,204 UART: Running Caliptra FMC ...
2,686,612 UART:
2,686,666 UART: [state] CFI Enabled
2,697,033 UART: [fht] FMC Alias Private Key: 7
2,804,688 UART: [art] Extend RT PCRs Done
2,805,116 UART: [art] Lock RT PCRs Done
2,806,990 UART: [art] Populate DV Done
2,815,337 UART: [fht] FMC Alias Private Key: 7
2,816,495 UART: [art] Derive CDI
2,816,775 UART: [art] Store in in slot 0x4
2,902,188 UART: [art] Derive Key Pair
2,902,548 UART: [art] Store priv key in slot 0x5
2,915,602 UART: [art] Derive Key Pair - Done
2,930,492 UART: [art] Signing Cert with AUTHO
2,930,972 UART: RITY.KEYID = 7
2,946,266 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,031 UART: [art] PUB.X = 952A0EA4FE1DDB138C0644B4506FE2D62B4C497C9B3BC1357193EEA346B6091F25963741F0D706DC9A74B1A96A5A837C
2,953,795 UART: [art] PUB.Y = 2B8A5382F433507281846BBA4712F1D14DCCF74EA46294ACB3AE8390ED40143642DE629E5E9AA390A64C988C1A237098
2,960,745 UART: [art] SIG.R = 4B8FE7E76B494857E4938D8C3DE4B93DEA7A53B675924A0EA3BB4CFC53FBE1B0D54724D4F0B9F14877066B5F43812FE3
2,967,521 UART: [art] SIG.S = DB3F00F86CA453160336077554A38C98D8FB47519DEA058CE2878D783372FB4929EA8D7C71893F8519817A72678A2407
2,991,402 UART: Caliptra RT
2,991,656 UART: [state] CFI Enabled
3,099,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,849 UART: [rt]cmd =0x4c444556, len=4
3,140,282 >>> mbox cmd response data (687 bytes)
3,140,283 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,592 UART: [rt]cmd =0x43455246, len=4
3,181,609 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
915,927 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,580 UART: [idev] ++
1,172,748 UART: [idev] CDI.KEYID = 6
1,173,109 UART: [idev] SUBJECT.KEYID = 7
1,173,534 UART: [idev] UDS.KEYID = 0
1,173,880 ready_for_fw is high
1,173,880 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,406 UART: [idev] --
1,208,681 UART: [ldev] ++
1,208,849 UART: [ldev] CDI.KEYID = 6
1,209,213 UART: [ldev] SUBJECT.KEYID = 5
1,209,640 UART: [ldev] AUTHORITY.KEYID = 7
1,210,103 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,281,157 UART: [fwproc] Wait for Commands...
1,281,774 UART: [fwproc] Recv command 0x46574c44
1,282,507 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,863 >>> mbox cmd response: success
2,772,863 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,024 UART: [afmc] ++
2,774,192 UART: [afmc] CDI.KEYID = 6
2,774,555 UART: [afmc] SUBJECT.KEYID = 7
2,774,981 UART: [afmc] AUTHORITY.KEYID = 5
2,810,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,013 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,732 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,653 UART: [afmc] --
2,853,741 UART: [cold-reset] --
2,854,653 UART: [state] Locking Datavault
2,855,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,370 UART: [state] Locking ICCM
2,857,018 UART: [exit] Launching FMC @ 0x40000130
2,862,347 UART:
2,862,363 UART: Running Caliptra FMC ...
2,862,771 UART:
2,862,914 UART: [state] CFI Enabled
2,873,417 UART: [fht] FMC Alias Private Key: 7
2,981,812 UART: [art] Extend RT PCRs Done
2,982,240 UART: [art] Lock RT PCRs Done
2,984,000 UART: [art] Populate DV Done
2,992,273 UART: [fht] FMC Alias Private Key: 7
2,993,447 UART: [art] Derive CDI
2,993,727 UART: [art] Store in in slot 0x4
3,079,530 UART: [art] Derive Key Pair
3,079,890 UART: [art] Store priv key in slot 0x5
3,093,776 UART: [art] Derive Key Pair - Done
3,108,204 UART: [art] Signing Cert with AUTHO
3,108,684 UART: RITY.KEYID = 7
3,124,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,089 UART: [art] PUB.X = 97E706A33154DEED9242A5835384318F144FF7FC523C5249FD76507616C250A38FBC628D3198729368E0971C640BF5C7
3,131,843 UART: [art] PUB.Y = B43B1CC44A00D64B375ECEB3A2D789B5CF25500C5651E3AB0B032F624D58E23B0DFA5C7BAAC819A26FC5E3F9524E1E8E
3,138,779 UART: [art] SIG.R = 8D427F5F9BB2F47954A40F3511E12DB0DA7A6F63207E97503070D411EDB0BCA40E0549DFC0A9BA244F5B5684CFA8969D
3,145,550 UART: [art] SIG.S = 70E1F6F3A6D9AFB73365BB8F753C3D1D9E2F7971FD17B104A1A70F95683714DB5C5B66A6590D8B405E0935655E25033A
3,169,278 UART: Caliptra RT
3,169,624 UART: [state] CFI Enabled
3,277,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,865 UART: [rt]cmd =0x4c444556, len=4
3,318,310 >>> mbox cmd response data (687 bytes)
3,318,311 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,692 UART: [rt]cmd =0x43455246, len=4
3,359,633 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,001 ready_for_fw is high
1,057,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,249 >>> mbox cmd response: success
2,624,249 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,371 UART:
2,686,387 UART: Running Caliptra FMC ...
2,686,795 UART:
2,686,938 UART: [state] CFI Enabled
2,697,623 UART: [fht] FMC Alias Private Key: 7
2,805,094 UART: [art] Extend RT PCRs Done
2,805,522 UART: [art] Lock RT PCRs Done
2,807,138 UART: [art] Populate DV Done
2,815,513 UART: [fht] FMC Alias Private Key: 7
2,816,615 UART: [art] Derive CDI
2,816,895 UART: [art] Store in in slot 0x4
2,902,450 UART: [art] Derive Key Pair
2,902,810 UART: [art] Store priv key in slot 0x5
2,916,132 UART: [art] Derive Key Pair - Done
2,931,347 UART: [art] Signing Cert with AUTHO
2,931,827 UART: RITY.KEYID = 7
2,947,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,938 UART: [art] PUB.X = F68133DE9A0036DB7734B7A7C5AB27AB7F7764EDB78FBAE17494FCE1A436631E187B19E6658FA5E558C1F3E6D5969CEB
2,954,700 UART: [art] PUB.Y = F6AACE571BFB4ED4EB9E4C350834C38633B77189BACEE199A0CF2BA36DF7B115943BD2E22A5C2C6653FDD9EC02652854
2,961,662 UART: [art] SIG.R = 2EAFF56691540A63B76487B8421D40A4FD0C16DDE38798E79A68B315010664B66D4786172CAFE24C342258B3F3DC7748
2,968,416 UART: [art] SIG.S = 5976043C180E9DB2DDDFD0DE72EDA03F108F5D68A5E43D7873868B0A3B6BC4E4E2612A577DC6B31D629AD0715277AC5B
2,992,508 UART: Caliptra RT
2,992,854 UART: [state] CFI Enabled
3,101,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,409 UART: [rt]cmd =0x4c444556, len=4
3,142,008 >>> mbox cmd response data (687 bytes)
3,142,009 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,468 UART: [rt]cmd =0x43455246, len=4
3,183,503 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
192,625 UART:
192,985 UART: Running Caliptra ROM ...
194,170 UART:
194,315 UART: [state] CFI Enabled
261,602 UART: [state] LifecycleState = Unprovisioned
263,511 UART: [state] DebugLocked = No
264,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,599 UART: [kat] SHA2-256
440,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,807 UART: [kat] ++
451,293 UART: [kat] sha1
461,239 UART: [kat] SHA2-256
463,882 UART: [kat] SHA2-384
469,578 UART: [kat] SHA2-512-ACC
471,908 UART: [kat] ECC-384
2,766,795 UART: [kat] HMAC-384Kdf
2,798,818 UART: [kat] LMS
3,989,109 UART: [kat] --
3,993,020 UART: [cold-reset] ++
3,995,445 UART: [fht] Storing FHT @ 0x50003400
4,007,210 UART: [idev] ++
4,007,772 UART: [idev] CDI.KEYID = 6
4,008,755 UART: [idev] SUBJECT.KEYID = 7
4,009,995 UART: [idev] UDS.KEYID = 0
4,011,070 ready_for_fw is high
4,011,305 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,841 UART: [idev] Erasing UDS.KEYID = 0
7,345,672 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,811 UART: [idev] --
7,371,636 UART: [ldev] ++
7,372,210 UART: [ldev] CDI.KEYID = 6
7,373,169 UART: [ldev] SUBJECT.KEYID = 5
7,374,373 UART: [ldev] AUTHORITY.KEYID = 7
7,375,690 UART: [ldev] FE.KEYID = 1
7,420,817 UART: [ldev] Erasing FE.KEYID = 1
10,750,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,552 UART: [ldev] --
13,115,120 UART: [fwproc] Waiting for Commands...
13,117,429 UART: [fwproc] Received command 0x46574c44
13,119,611 UART: [fwproc] Received Image of size 114036 bytes
17,167,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,666 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,804 >>> mbox cmd response: success
17,631,318 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,635,816 UART: [afmc] ++
17,636,392 UART: [afmc] CDI.KEYID = 6
17,637,263 UART: [afmc] SUBJECT.KEYID = 7
17,638,576 UART: [afmc] AUTHORITY.KEYID = 5
21,004,228 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,693 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,939 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,374 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,205 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,647 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,624 UART: [afmc] --
23,376,180 UART: [cold-reset] --
23,380,692 UART: [state] Locking Datavault
23,386,094 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,844 UART: [state] Locking ICCM
23,390,362 UART: [exit] Launching FMC @ 0x40000130
23,398,748 UART:
23,398,980 UART: Running Caliptra FMC ...
23,400,073 UART:
23,400,228 UART: [state] CFI Enabled
23,463,896 UART: [fht] FMC Alias Private Key: 7
25,801,852 UART: [art] Extend RT PCRs Done
25,803,068 UART: [art] Lock RT PCRs Done
25,804,756 UART: [art] Populate DV Done
25,810,267 UART: [fht] FMC Alias Private Key: 7
25,812,020 UART: [art] Derive CDI
25,812,832 UART: [art] Store in in slot 0x4
25,871,787 UART: [art] Derive Key Pair
25,872,823 UART: [art] Store priv key in slot 0x5
29,165,399 UART: [art] Derive Key Pair - Done
29,178,394 UART: [art] Signing Cert with AUTHO
29,179,687 UART: RITY.KEYID = 7
31,467,795 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,312 UART: [art] PUB.X = 617C2B46525EB32A1D44091B7E17835979790211FC064DCEED9A7A5BC978B68BAC2D3198F0683953796A0D1B59C348A8
31,476,492 UART: [art] PUB.Y = 073DFFA7003C70F466BA25641EE8ADBE63315D375527E8760C0B154B2DE3EFDE54F66042456985A8CDFEDF33F212ABAB
31,483,763 UART: [art] SIG.R = 8C59DC1BAF41D5AC7C750674B24CEAE3BA333EB07EE8C755D1D0C291BF7B7CC314F72D8FCC53DD4A0C79461B5D078A9F
31,491,199 UART: [art] SIG.S = 1712BEFFCD5C5D367BEE78020F081B257117D9CB43E35546209334CF6F3409E7BA3FAA2DF12892A9F0192E160123E8D0
32,796,376 UART: Caliptra RT
32,797,090 UART: [state] CFI Enabled
32,959,336 UART: [rt] RT listening for mailbox commands...
32,990,206 UART: [rt]cmd =0x4c444556, len=4
33,001,177 >>> mbox cmd response data (687 bytes)
33,042,474 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,072,492 UART: [rt]cmd =0x43455246, len=4
33,085,235 >>> mbox cmd response data (920 bytes)
33,102,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,131,972 UART: [rt]cmd =0x43455252, len=4
33,143,167 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,806,519 ready_for_fw is high
3,806,953 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,881,576 >>> mbox cmd response: success
17,882,387 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,567,606 UART:
23,567,983 UART: Running Caliptra FMC ...
23,569,080 UART:
23,569,224 UART: [state] CFI Enabled
23,640,635 UART: [fht] FMC Alias Private Key: 7
25,978,063 UART: [art] Extend RT PCRs Done
25,979,292 UART: [art] Lock RT PCRs Done
25,980,899 UART: [art] Populate DV Done
25,986,386 UART: [fht] FMC Alias Private Key: 7
25,987,917 UART: [art] Derive CDI
25,988,644 UART: [art] Store in in slot 0x4
26,048,729 UART: [art] Derive Key Pair
26,049,766 UART: [art] Store priv key in slot 0x5
29,342,725 UART: [art] Derive Key Pair - Done
29,355,882 UART: [art] Signing Cert with AUTHO
29,357,180 UART: RITY.KEYID = 7
31,643,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,086 UART: [art] PUB.X = 02EF4EE339614C651EF8A864FE06DE55C052EF2E77B34B3CE1610FFE64A07E5DC1AE341F8BC487ADE9C42E90FDBAE2AA
31,652,388 UART: [art] PUB.Y = 8A588D6105CE52567B14DB2278D58A908BB63D79FAAF6E92FB4AFDF2E9DC88F894640D134920E2E8F4366F7F306FA365
31,659,607 UART: [art] SIG.R = CFD4D4E2AC0CE8006140969538B723C677421E3489F8F68051C160CE67A61E6B731C4291B82F64E4C018FF5882F230B6
31,666,984 UART: [art] SIG.S = 604B4C87C19B3080FBFD59BE489FD2A60352526C2C062A7812605B91D178968180600B7870C9A6660FE5613BC6444460
32,972,053 UART: Caliptra RT
32,972,765 UART: [state] CFI Enabled
33,133,267 UART: [rt] RT listening for mailbox commands...
33,164,322 UART: [rt]cmd =0x4c444556, len=4
33,175,296 >>> mbox cmd response data (687 bytes)
33,216,654 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,246,501 UART: [rt]cmd =0x43455246, len=4
33,259,346 >>> mbox cmd response data (920 bytes)
33,276,259 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,306,121 UART: [rt]cmd =0x43455252, len=4
33,317,433 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,420 UART:
192,772 UART: Running Caliptra ROM ...
193,920 UART:
603,480 UART: [state] CFI Enabled
617,002 UART: [state] LifecycleState = Unprovisioned
619,649 UART: [state] DebugLocked = No
621,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,261 UART: [kat] SHA2-256
796,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,605 UART: [kat] ++
807,135 UART: [kat] sha1
819,788 UART: [kat] SHA2-256
822,503 UART: [kat] SHA2-384
827,919 UART: [kat] SHA2-512-ACC
830,284 UART: [kat] ECC-384
3,113,158 UART: [kat] HMAC-384Kdf
3,126,317 UART: [kat] LMS
4,316,368 UART: [kat] --
4,323,149 UART: [cold-reset] ++
4,325,576 UART: [fht] Storing FHT @ 0x50003400
4,336,917 UART: [idev] ++
4,337,550 UART: [idev] CDI.KEYID = 6
4,338,429 UART: [idev] SUBJECT.KEYID = 7
4,339,741 UART: [idev] UDS.KEYID = 0
4,340,690 ready_for_fw is high
4,340,881 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,105 UART: [idev] Erasing UDS.KEYID = 0
7,626,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,656 UART: [idev] --
7,652,486 UART: [ldev] ++
7,653,053 UART: [ldev] CDI.KEYID = 6
7,654,037 UART: [ldev] SUBJECT.KEYID = 5
7,655,252 UART: [ldev] AUTHORITY.KEYID = 7
7,656,479 UART: [ldev] FE.KEYID = 1
7,664,002 UART: [ldev] Erasing FE.KEYID = 1
10,952,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,140 UART: [ldev] --
13,312,396 UART: [fwproc] Waiting for Commands...
13,315,670 UART: [fwproc] Received command 0x46574c44
13,317,846 UART: [fwproc] Received Image of size 114036 bytes
17,373,793 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,804 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,554 >>> mbox cmd response: success
17,834,088 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,836,868 UART: [afmc] ++
17,837,504 UART: [afmc] CDI.KEYID = 6
17,838,412 UART: [afmc] SUBJECT.KEYID = 7
17,839,679 UART: [afmc] AUTHORITY.KEYID = 5
21,158,829 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,883 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,241 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,104 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,960 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,325 UART: [afmc] --
23,525,359 UART: [cold-reset] --
23,529,221 UART: [state] Locking Datavault
23,534,412 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,187 UART: [state] Locking ICCM
23,537,420 UART: [exit] Launching FMC @ 0x40000130
23,545,819 UART:
23,546,051 UART: Running Caliptra FMC ...
23,547,153 UART:
23,547,313 UART: [state] CFI Enabled
23,555,627 UART: [fht] FMC Alias Private Key: 7
25,886,463 UART: [art] Extend RT PCRs Done
25,887,680 UART: [art] Lock RT PCRs Done
25,889,058 UART: [art] Populate DV Done
25,894,418 UART: [fht] FMC Alias Private Key: 7
25,895,892 UART: [art] Derive CDI
25,896,623 UART: [art] Store in in slot 0x4
25,939,322 UART: [art] Derive Key Pair
25,940,360 UART: [art] Store priv key in slot 0x5
29,182,611 UART: [art] Derive Key Pair - Done
29,195,454 UART: [art] Signing Cert with AUTHO
29,196,747 UART: RITY.KEYID = 7
31,476,595 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,107 UART: [art] PUB.X = 251F772A338D8D0D9019FA27B68B8C480F2C6D44C1F1D2CF0DFB31218F6B56568E4365AF80539F5A868BAFA204EC4DDE
31,485,362 UART: [art] PUB.Y = 913F1237FA8E736C7D86E2400ECE49831787D6376922F940D4F63BECAC36D708D295FCE9D3A5CBD80187175B2ED9227F
31,492,600 UART: [art] SIG.R = 5806CBAB43C8AA0E83E303E8232DB5E05DAEFFFE9301F7857C0571B501C6A48B902876F88A8CF187006E961B4062E277
31,500,017 UART: [art] SIG.S = 2FD58B9BBE8429E37A4CA3241AAAEAA37BFC44AF33680C51C191E820594207F950481B559AEA08F8EF805CB9726B75AF
32,804,994 UART: Caliptra RT
32,805,715 UART: [state] CFI Enabled
32,923,806 UART: [rt] RT listening for mailbox commands...
32,954,885 UART: [rt]cmd =0x4c444556, len=4
32,965,936 >>> mbox cmd response data (687 bytes)
33,007,130 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,036,864 UART: [rt]cmd =0x43455246, len=4
33,049,887 >>> mbox cmd response data (920 bytes)
33,066,737 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,096,387 UART: [rt]cmd =0x43455252, len=4
33,107,792 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
4,129,802 ready_for_fw is high
4,130,195 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,079,857 >>> mbox cmd response: success
18,080,636 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,717,620 UART:
23,717,998 UART: Running Caliptra FMC ...
23,719,109 UART:
23,719,258 UART: [state] CFI Enabled
23,727,307 UART: [fht] FMC Alias Private Key: 7
26,058,633 UART: [art] Extend RT PCRs Done
26,059,861 UART: [art] Lock RT PCRs Done
26,061,303 UART: [art] Populate DV Done
26,066,786 UART: [fht] FMC Alias Private Key: 7
26,068,438 UART: [art] Derive CDI
26,069,187 UART: [art] Store in in slot 0x4
26,111,786 UART: [art] Derive Key Pair
26,112,791 UART: [art] Store priv key in slot 0x5
29,355,209 UART: [art] Derive Key Pair - Done
29,368,046 UART: [art] Signing Cert with AUTHO
29,369,343 UART: RITY.KEYID = 7
31,648,890 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,394 UART: [art] PUB.X = 1BBBF888088FA692630BD3C7320138375F07FB5D84959F397D0B8B637B286C26079F32DF1C4D25E1BF22EA5C9E62242E
31,657,611 UART: [art] PUB.Y = 7F89ADF5F9510AB40CA26BD95F7B6BD6E02D7ED0F8B75B88039CD82123B70B1A8BB88CB36DE0E0F07294B3D2E54D619E
31,664,914 UART: [art] SIG.R = 620F2829755D20A2E7A1CF223444C2555C41E27276D0DE27FC3CE06F336A590BACD02E8ADFE754057431F7DAC229B6D6
31,672,310 UART: [art] SIG.S = D975DC7473CAAF2B39F056F1E12605195B7E4C92CCAF8FB1A5F31F9A7D1CDD5BF61D2380406D7C85391A5A91033230C5
32,977,665 UART: Caliptra RT
32,978,371 UART: [state] CFI Enabled
33,095,922 UART: [rt] RT listening for mailbox commands...
33,126,793 UART: [rt]cmd =0x4c444556, len=4
33,137,981 >>> mbox cmd response data (687 bytes)
33,178,975 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,209,087 UART: [rt]cmd =0x43455246, len=4
33,222,203 >>> mbox cmd response data (920 bytes)
33,238,962 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,268,875 UART: [rt]cmd =0x43455252, len=4
33,280,301 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,469 UART:
192,849 UART: Running Caliptra ROM ...
193,950 UART:
194,089 UART: [state] CFI Enabled
266,880 UART: [state] LifecycleState = Unprovisioned
268,722 UART: [state] DebugLocked = No
270,140 UART: [state] WD Timer not started. Device not locked for debugging
273,187 UART: [kat] SHA2-256
452,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,836 UART: [kat] ++
464,375 UART: [kat] sha1
475,611 UART: [kat] SHA2-256
478,620 UART: [kat] SHA2-384
484,678 UART: [kat] SHA2-512-ACC
487,609 UART: [kat] ECC-384
2,947,852 UART: [kat] HMAC-384Kdf
2,972,330 UART: [kat] LMS
3,501,819 UART: [kat] --
3,506,625 UART: [cold-reset] ++
3,508,342 UART: [fht] FHT @ 0x50003400
3,520,747 UART: [idev] ++
3,521,320 UART: [idev] CDI.KEYID = 6
3,522,261 UART: [idev] SUBJECT.KEYID = 7
3,523,434 UART: [idev] UDS.KEYID = 0
3,524,361 ready_for_fw is high
3,524,582 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,483 UART: [idev] Erasing UDS.KEYID = 0
6,026,577 UART: [idev] Sha1 KeyId Algorithm
6,049,384 UART: [idev] --
6,054,072 UART: [ldev] ++
6,054,642 UART: [ldev] CDI.KEYID = 6
6,055,526 UART: [ldev] SUBJECT.KEYID = 5
6,056,741 UART: [ldev] AUTHORITY.KEYID = 7
6,057,931 UART: [ldev] FE.KEYID = 1
6,101,322 UART: [ldev] Erasing FE.KEYID = 1
8,604,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,699 UART: [ldev] --
10,415,068 UART: [fwproc] Wait for Commands...
10,417,643 UART: [fwproc] Recv command 0x46574c44
10,419,745 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,284,844 >>> mbox cmd response: success
14,285,362 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,289,483 UART: [afmc] ++
14,290,069 UART: [afmc] CDI.KEYID = 6
14,290,958 UART: [afmc] SUBJECT.KEYID = 7
14,292,114 UART: [afmc] AUTHORITY.KEYID = 5
16,829,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,232 UART: [afmc] --
18,628,288 UART: [cold-reset] --
18,631,440 UART: [state] Locking Datavault
18,636,520 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,173 UART: [state] Locking ICCM
18,639,759 UART: [exit] Launching FMC @ 0x40000130
18,648,156 UART:
18,648,391 UART: Running Caliptra FMC ...
18,649,493 UART:
18,649,656 UART: [state] CFI Enabled
18,710,924 UART: [fht] FMC Alias Private Key: 7
20,474,893 UART: [art] Extend RT PCRs Done
20,476,117 UART: [art] Lock RT PCRs Done
20,477,850 UART: [art] Populate DV Done
20,483,588 UART: [fht] FMC Alias Private Key: 7
20,485,179 UART: [art] Derive CDI
20,485,994 UART: [art] Store in in slot 0x4
20,543,499 UART: [art] Derive Key Pair
20,544,543 UART: [art] Store priv key in slot 0x5
23,007,056 UART: [art] Derive Key Pair - Done
23,019,948 UART: [art] Signing Cert with AUTHO
23,021,258 UART: RITY.KEYID = 7
24,732,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,912 UART: [art] PUB.X = ABE0C7C43FC8C2B76C56A01EEBAB747B4F319C2E8AA18A47F74D177EF0083C2C7C3F83CB7FC3B514C842C59F6AF612F2
24,741,213 UART: [art] PUB.Y = 408B9FF758795554DA5F0CF33CFE10F9295C45CAD13811C84895F7D2A4B86B4D0F1914733A50C945857116730F67B7C1
24,748,435 UART: [art] SIG.R = B384CB76807975D0F4EE72E60D83022B5F8A40B8958FF8BDDC341FD83875C451C04236632AFF949D48E0AB3E8D49E238
24,755,814 UART: [art] SIG.S = DDE76A8569B3F1AAE40CEFE6236EF0DAD57F89273347FE60B906A102482422E55543DB68B6345F49F82B6E43F984F953
25,734,734 UART: Caliptra RT
25,735,454 UART: [state] CFI Enabled
25,899,465 UART: [rt] RT listening for mailbox commands...
25,930,650 UART: [rt]cmd =0x4c444556, len=4
25,941,867 >>> mbox cmd response data (687 bytes)
25,982,923 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,013,106 UART: [rt]cmd =0x43455246, len=4
26,025,789 >>> mbox cmd response data (887 bytes)
26,042,599 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,072,401 UART: [rt]cmd =0x43455252, len=4
26,083,630 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,385 UART:
192,761 UART: Running Caliptra ROM ...
193,905 UART:
194,051 UART: [state] CFI Enabled
262,206 UART: [state] LifecycleState = Unprovisioned
264,553 UART: [state] DebugLocked = No
266,184 UART: [state] WD Timer not started. Device not locked for debugging
270,367 UART: [kat] SHA2-256
460,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,027 UART: [kat] ++
471,483 UART: [kat] sha1
483,491 UART: [kat] SHA2-256
486,568 UART: [kat] SHA2-384
491,933 UART: [kat] SHA2-512-ACC
494,517 UART: [kat] ECC-384
2,949,713 UART: [kat] HMAC-384Kdf
2,972,748 UART: [kat] LMS
3,504,482 UART: [kat] --
3,510,774 UART: [cold-reset] ++
3,512,643 UART: [fht] FHT @ 0x50003400
3,523,060 UART: [idev] ++
3,523,771 UART: [idev] CDI.KEYID = 6
3,524,747 UART: [idev] SUBJECT.KEYID = 7
3,525,924 UART: [idev] UDS.KEYID = 0
3,526,827 ready_for_fw is high
3,527,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,853 UART: [idev] Erasing UDS.KEYID = 0
6,027,278 UART: [idev] Sha1 KeyId Algorithm
6,049,039 UART: [idev] --
6,053,605 UART: [ldev] ++
6,054,297 UART: [ldev] CDI.KEYID = 6
6,055,214 UART: [ldev] SUBJECT.KEYID = 5
6,056,381 UART: [ldev] AUTHORITY.KEYID = 7
6,057,614 UART: [ldev] FE.KEYID = 1
6,102,607 UART: [ldev] Erasing FE.KEYID = 1
8,610,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,125 UART: [ldev] --
10,414,234 UART: [fwproc] Wait for Commands...
10,417,031 UART: [fwproc] Recv command 0x46574c44
10,419,339 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,163 >>> mbox cmd response: success
14,605,672 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,609,812 UART: [afmc] ++
14,610,512 UART: [afmc] CDI.KEYID = 6
14,611,752 UART: [afmc] SUBJECT.KEYID = 7
14,613,191 UART: [afmc] AUTHORITY.KEYID = 5
17,149,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,949 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,034 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,094 UART: [afmc] --
18,951,347 UART: [cold-reset] --
18,955,535 UART: [state] Locking Datavault
18,959,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,951 UART: [state] Locking ICCM
18,963,563 UART: [exit] Launching FMC @ 0x40000130
18,972,235 UART:
18,972,472 UART: Running Caliptra FMC ...
18,973,574 UART:
18,973,754 UART: [state] CFI Enabled
19,032,137 UART: [fht] FMC Alias Private Key: 7
20,797,059 UART: [art] Extend RT PCRs Done
20,798,294 UART: [art] Lock RT PCRs Done
20,800,052 UART: [art] Populate DV Done
20,805,469 UART: [fht] FMC Alias Private Key: 7
20,806,954 UART: [art] Derive CDI
20,807,724 UART: [art] Store in in slot 0x4
20,864,587 UART: [art] Derive Key Pair
20,865,634 UART: [art] Store priv key in slot 0x5
23,328,924 UART: [art] Derive Key Pair - Done
23,341,918 UART: [art] Signing Cert with AUTHO
23,343,218 UART: RITY.KEYID = 7
25,054,436 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,948 UART: [art] PUB.X = D36F9034EDEAB9F187BF596F83EB556B35494DEDC6F3C8D780D3448BEBFF4910C1321FDB32C3379065994907D411143E
25,063,244 UART: [art] PUB.Y = 684DB171909294DEF9561C7AADA2BDEB0FDDB20BCDFD767B9E772ADD81F3A2ED310A8092A25A9CEDADD464FA8695E00C
25,070,525 UART: [art] SIG.R = 0B92BCD6B5FCE3103ECC43A35711AF8059999FADA54A4457BEE8EC8BCDFE6AE227DE2B8789D6D7C9BDE8A8CC02EA1F02
25,078,198 UART: [art] SIG.S = A3F0849DEA04D171245F774365006371FF70C26E505C64D730CD6372453C86337E5FC69E790A2D04C6D826A55FBA3F77
26,056,882 UART: Caliptra RT
26,057,575 UART: [state] CFI Enabled
26,224,532 UART: [rt] RT listening for mailbox commands...
26,255,460 UART: [rt]cmd =0x4c444556, len=4
26,266,654 >>> mbox cmd response data (687 bytes)
26,308,227 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,338,046 UART: [rt]cmd =0x43455246, len=4
26,350,961 >>> mbox cmd response data (887 bytes)
26,368,194 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,398,176 UART: [rt]cmd =0x43455252, len=4
26,409,567 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,439,380 ready_for_fw is high
3,439,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,739,568 >>> mbox cmd response: success
14,740,188 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,025,470 UART:
19,025,861 UART: Running Caliptra FMC ...
19,027,003 UART:
19,027,168 UART: [state] CFI Enabled
19,095,454 UART: [fht] FMC Alias Private Key: 7
20,859,604 UART: [art] Extend RT PCRs Done
20,860,830 UART: [art] Lock RT PCRs Done
20,862,407 UART: [art] Populate DV Done
20,868,043 UART: [fht] FMC Alias Private Key: 7
20,869,682 UART: [art] Derive CDI
20,870,513 UART: [art] Store in in slot 0x4
20,927,583 UART: [art] Derive Key Pair
20,928,585 UART: [art] Store priv key in slot 0x5
23,391,853 UART: [art] Derive Key Pair - Done
23,404,686 UART: [art] Signing Cert with AUTHO
23,405,986 UART: RITY.KEYID = 7
25,117,155 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,661 UART: [art] PUB.X = 2E5BDFB8CED4DE989E11399BEBDD7BB4B680FAF6A40AB6406BEE336CC7028ACB3C00BA2357BC6B70DE100CA7F17E4C16
25,125,953 UART: [art] PUB.Y = A9B13C17900EF46EABF3BEF3481752BB419E39AADA5E982D81B20C81DA40C9FB1D0107E41699E28964CB6D2BA62713D2
25,133,259 UART: [art] SIG.R = BDEAF3ACC9657A4E65A90D08D86E74B7A33D399307B92C7735E59E2D9D34DC71D9D6903BB4A72CB4C2D6A9E9D66B75FA
25,140,637 UART: [art] SIG.S = 673BE39CF538D944E75FD14BC88BD753F475680B0E6849960033A12FE562B8E844B18E97F812FC0BE36D6FF347A75C36
26,119,184 UART: Caliptra RT
26,119,874 UART: [state] CFI Enabled
26,285,023 UART: [rt] RT listening for mailbox commands...
26,316,100 UART: [rt]cmd =0x4c444556, len=4
26,327,269 >>> mbox cmd response data (687 bytes)
26,368,339 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,398,432 UART: [rt]cmd =0x43455246, len=4
26,411,222 >>> mbox cmd response data (887 bytes)
26,428,002 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,457,865 UART: [rt]cmd =0x43455252, len=4
26,469,310 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,541 UART:
192,905 UART: Running Caliptra ROM ...
194,026 UART:
603,663 UART: [state] CFI Enabled
616,847 UART: [state] LifecycleState = Unprovisioned
619,233 UART: [state] DebugLocked = No
620,475 UART: [state] WD Timer not started. Device not locked for debugging
625,716 UART: [kat] SHA2-256
815,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,428 UART: [kat] ++
826,899 UART: [kat] sha1
836,728 UART: [kat] SHA2-256
839,783 UART: [kat] SHA2-384
846,558 UART: [kat] SHA2-512-ACC
849,158 UART: [kat] ECC-384
3,291,081 UART: [kat] HMAC-384Kdf
3,303,663 UART: [kat] LMS
3,835,468 UART: [kat] --
3,840,381 UART: [cold-reset] ++
3,842,452 UART: [fht] FHT @ 0x50003400
3,854,416 UART: [idev] ++
3,855,121 UART: [idev] CDI.KEYID = 6
3,856,075 UART: [idev] SUBJECT.KEYID = 7
3,857,244 UART: [idev] UDS.KEYID = 0
3,858,143 ready_for_fw is high
3,858,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,011 UART: [idev] Erasing UDS.KEYID = 0
6,331,480 UART: [idev] Sha1 KeyId Algorithm
6,353,779 UART: [idev] --
6,359,038 UART: [ldev] ++
6,359,741 UART: [ldev] CDI.KEYID = 6
6,360,650 UART: [ldev] SUBJECT.KEYID = 5
6,361,804 UART: [ldev] AUTHORITY.KEYID = 7
6,363,030 UART: [ldev] FE.KEYID = 1
6,372,700 UART: [ldev] Erasing FE.KEYID = 1
8,850,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,685 UART: [ldev] --
10,641,648 UART: [fwproc] Wait for Commands...
10,644,611 UART: [fwproc] Recv command 0x46574c44
10,646,861 UART: [fwproc] Recv'd Img size: 114360 bytes
14,095,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,833,140 >>> mbox cmd response: success
14,833,634 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,837,334 UART: [afmc] ++
14,838,031 UART: [afmc] CDI.KEYID = 6
14,839,270 UART: [afmc] SUBJECT.KEYID = 7
14,840,697 UART: [afmc] AUTHORITY.KEYID = 5
17,339,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,894 UART: [afmc] --
19,135,996 UART: [cold-reset] --
19,138,943 UART: [state] Locking Datavault
19,143,561 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,690 UART: [state] Locking ICCM
19,148,760 UART: [exit] Launching FMC @ 0x40000130
19,157,439 UART:
19,157,702 UART: Running Caliptra FMC ...
19,158,805 UART:
19,158,959 UART: [state] CFI Enabled
19,167,080 UART: [fht] FMC Alias Private Key: 7
20,924,023 UART: [art] Extend RT PCRs Done
20,925,231 UART: [art] Lock RT PCRs Done
20,926,657 UART: [art] Populate DV Done
20,931,955 UART: [fht] FMC Alias Private Key: 7
20,933,648 UART: [art] Derive CDI
20,934,383 UART: [art] Store in in slot 0x4
20,976,914 UART: [art] Derive Key Pair
20,977,915 UART: [art] Store priv key in slot 0x5
23,404,585 UART: [art] Derive Key Pair - Done
23,417,472 UART: [art] Signing Cert with AUTHO
23,418,772 UART: RITY.KEYID = 7
25,124,083 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,570 UART: [art] PUB.X = 3CCD0D28B90AA1DD570934FA72C987F8FF2260DDCE666C768BC54756DE65C6844442EACC5A16EFDDCC384D5C7C25E62B
25,132,865 UART: [art] PUB.Y = E8AD8B46D5246859E0217D6FD69E2FF767D9750B91AC2E0C29D0191BCA7783DDEAC56882EB98FC9991A20B67F0E49D46
25,140,150 UART: [art] SIG.R = 570FB4B23A96660C9A6EA23F29814C8401486C70DE3DD1A232BDC7B91120B58EB4B244C342D715B6200452E1BBE8FE1F
25,147,544 UART: [art] SIG.S = 6F5BECBC169585DC282AC7BAC6BD546EAF917D1367DE12B901C1F58B2F30636C142AA6317423E026DE3D74DDCF69FA84
26,126,813 UART: Caliptra RT
26,127,521 UART: [state] CFI Enabled
26,244,909 UART: [rt] RT listening for mailbox commands...
26,275,926 UART: [rt]cmd =0x4c444556, len=4
26,287,032 >>> mbox cmd response data (687 bytes)
26,328,282 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,358,354 UART: [rt]cmd =0x43455246, len=4
26,371,077 >>> mbox cmd response data (887 bytes)
26,388,109 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,418,014 UART: [rt]cmd =0x43455252, len=4
26,429,398 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,753,569 ready_for_fw is high
3,754,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,708 >>> mbox cmd response: success
14,961,593 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,212,623 UART:
19,213,029 UART: Running Caliptra FMC ...
19,214,179 UART:
19,214,339 UART: [state] CFI Enabled
19,222,188 UART: [fht] FMC Alias Private Key: 7
20,979,399 UART: [art] Extend RT PCRs Done
20,980,645 UART: [art] Lock RT PCRs Done
20,982,296 UART: [art] Populate DV Done
20,987,817 UART: [fht] FMC Alias Private Key: 7
20,989,414 UART: [art] Derive CDI
20,990,172 UART: [art] Store in in slot 0x4
21,033,144 UART: [art] Derive Key Pair
21,034,148 UART: [art] Store priv key in slot 0x5
23,460,523 UART: [art] Derive Key Pair - Done
23,474,002 UART: [art] Signing Cert with AUTHO
23,475,318 UART: RITY.KEYID = 7
25,180,785 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,290 UART: [art] PUB.X = 67D013C046A33B7E2BC43761E7AA25D28BE79D566FC4F6B3929C947AB9ABC1ACB8AEAED7FF439DBEC57A241B0C8CCEC7
25,189,590 UART: [art] PUB.Y = 0540368B8E1851EEC2ADCF1157E9390293DB4AF4A0BD57306D4F15515E826F87EF92A8A463AE187607A9246B8DF3F0DF
25,196,841 UART: [art] SIG.R = 0B5ABB3B0F50EB7BE1812EFF548C8797754DB1F45CD8F81F9753A48DE75DC7D2A729D46CBEE8E70A5B6A7D92257FA05A
25,204,283 UART: [art] SIG.S = D2CBDB4C861E06F2D8384C574D8058E69B5D53E5F19A0F2BA2BC77755072CD082AD756D03FB064557E31AFEDF548EFAC
26,183,725 UART: Caliptra RT
26,184,472 UART: [state] CFI Enabled
26,302,742 UART: [rt] RT listening for mailbox commands...
26,333,834 UART: [rt]cmd =0x4c444556, len=4
26,344,950 >>> mbox cmd response data (687 bytes)
26,386,328 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,416,077 UART: [rt]cmd =0x43455246, len=4
26,428,641 >>> mbox cmd response data (887 bytes)
26,445,388 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,475,337 UART: [rt]cmd =0x43455252, len=4
26,486,730 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,645 UART: [kat] SHA2-256
881,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,691 UART: [kat] ++
885,843 UART: [kat] sha1
889,935 UART: [kat] SHA2-256
891,873 UART: [kat] SHA2-384
894,668 UART: [kat] SHA2-512-ACC
896,569 UART: [kat] ECC-384
902,310 UART: [kat] HMAC-384Kdf
907,046 UART: [kat] LMS
1,475,242 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,649 UART: [fht] Storing FHT @ 0x50003400
1,479,368 UART: [idev] ++
1,479,536 UART: [idev] CDI.KEYID = 6
1,479,896 UART: [idev] SUBJECT.KEYID = 7
1,480,320 UART: [idev] UDS.KEYID = 0
1,480,665 ready_for_fw is high
1,480,665 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,416 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,054 UART: [idev] --
1,513,997 UART: [ldev] ++
1,514,165 UART: [ldev] CDI.KEYID = 6
1,514,528 UART: [ldev] SUBJECT.KEYID = 5
1,514,954 UART: [ldev] AUTHORITY.KEYID = 7
1,515,417 UART: [ldev] FE.KEYID = 1
1,520,535 UART: [ldev] Erasing FE.KEYID = 1
1,546,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,670 UART: [ldev] --
1,586,157 UART: [fwproc] Waiting for Commands...
1,586,858 UART: [fwproc] Received command 0x46574c44
1,587,649 UART: [fwproc] Received Image of size 114360 bytes
2,886,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,777 >>> mbox cmd response: success
3,078,777 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,827 UART: [afmc] ++
3,079,995 UART: [afmc] CDI.KEYID = 6
3,080,357 UART: [afmc] SUBJECT.KEYID = 7
3,080,782 UART: [afmc] AUTHORITY.KEYID = 5
3,116,001 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,704 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,394 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,255 UART: [afmc] --
3,159,305 UART: [cold-reset] --
3,160,089 UART: [state] Locking Datavault
3,161,118 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,722 UART: [state] Locking ICCM
3,162,368 UART: [exit] Launching FMC @ 0x40000130
3,167,697 UART:
3,167,713 UART: Running Caliptra FMC ...
3,168,121 UART:
3,168,175 UART: [state] CFI Enabled
3,178,302 UART: [fht] FMC Alias Private Key: 7
3,285,729 UART: [art] Extend RT PCRs Done
3,286,157 UART: [art] Lock RT PCRs Done
3,287,675 UART: [art] Populate DV Done
3,295,790 UART: [fht] FMC Alias Private Key: 7
3,296,736 UART: [art] Derive CDI
3,297,016 UART: [art] Store in in slot 0x4
3,382,583 UART: [art] Derive Key Pair
3,382,943 UART: [art] Store priv key in slot 0x5
3,396,065 UART: [art] Derive Key Pair - Done
3,410,914 UART: [art] Signing Cert with AUTHO
3,411,394 UART: RITY.KEYID = 7
3,427,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,925 UART: [art] PUB.X = 1A74F784B9987D8AC2D9358161007EF76AE96E8ACA7FEFEB4489BC39045961FA2F398500BC337AC0494AE81AF442286B
3,434,654 UART: [art] PUB.Y = 680FB77C810504A2FB14225E3047FB783CE6C4A9639CF49B6378A61F4C38825EBE1AB5FB726D00A4C30ED784778D0DF2
3,441,573 UART: [art] SIG.R = 974C52A3E9DB1F37FE53005E3D6C956CFB9FEE29D7E12C5D047AE8425EE197EF5D052E4F341B6242EDD8E2EBCB24274D
3,448,333 UART: [art] SIG.S = C88D8836B6D7C020F1B2CFCEAFA40350E2F0BA7E2CE46F1F5A9B8BEF59D1B48D643E99D2B03D50657F6A5628F9C838AB
3,472,441 UART: Caliptra RT
3,472,695 UART: [state] CFI Enabled
3,580,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,943 UART: [rt]cmd =0x4c444556, len=4
3,621,330 >>> mbox cmd response data (687 bytes)
3,621,331 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,622 UART: [rt]cmd =0x43455246, len=4
3,663,067 >>> mbox cmd response data (920 bytes)
3,663,068 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,353 UART: [rt]cmd =0x43455252, len=4
3,703,244 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,063 ready_for_fw is high
1,363,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,153 >>> mbox cmd response: success
2,930,153 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,991,761 UART:
2,991,777 UART: Running Caliptra FMC ...
2,992,185 UART:
2,992,239 UART: [state] CFI Enabled
3,002,706 UART: [fht] FMC Alias Private Key: 7
3,110,457 UART: [art] Extend RT PCRs Done
3,110,885 UART: [art] Lock RT PCRs Done
3,112,657 UART: [art] Populate DV Done
3,120,856 UART: [fht] FMC Alias Private Key: 7
3,121,824 UART: [art] Derive CDI
3,122,104 UART: [art] Store in in slot 0x4
3,207,831 UART: [art] Derive Key Pair
3,208,191 UART: [art] Store priv key in slot 0x5
3,221,101 UART: [art] Derive Key Pair - Done
3,235,685 UART: [art] Signing Cert with AUTHO
3,236,165 UART: RITY.KEYID = 7
3,251,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,146 UART: [art] PUB.X = 5F642938D8F4686922E238F47FEFE07F3DBAF1908DECFB4E64C2398DDA7E434949D1CACFE7405FF32342F20C084CCB47
3,258,924 UART: [art] PUB.Y = DCE697BC560DE6B15389800E5FB6AC7AC8E4E23B8884A685E2C6B8ED8DC131AAC977FACE664D26BB17D83EDBE19E9C7D
3,265,894 UART: [art] SIG.R = 33CB031B6965843AC4D628AC498150C82270A1AB456E7CDFB2ACDBFEF788B2EB5B21FC945D9C4FBC33EEBAB60A193269
3,272,678 UART: [art] SIG.S = D7DEAC035200862282F1236BCD6B38C3678F23C0A04E730C12AC34878B9EDBB2457F8F7E8580425261B62BE345F80C87
3,296,744 UART: Caliptra RT
3,296,998 UART: [state] CFI Enabled
3,405,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,745 UART: [rt]cmd =0x4c444556, len=4
3,446,156 >>> mbox cmd response data (687 bytes)
3,446,157 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,518 UART: [rt]cmd =0x43455246, len=4
3,487,753 >>> mbox cmd response data (920 bytes)
3,487,754 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,983 UART: [rt]cmd =0x43455252, len=4
3,528,067 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
86,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,686 UART: [kat] SHA2-256
882,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,732 UART: [kat] ++
886,884 UART: [kat] sha1
891,272 UART: [kat] SHA2-256
893,210 UART: [kat] SHA2-384
896,063 UART: [kat] SHA2-512-ACC
897,964 UART: [kat] ECC-384
903,355 UART: [kat] HMAC-384Kdf
908,053 UART: [kat] LMS
1,476,249 UART: [kat] --
1,477,268 UART: [cold-reset] ++
1,477,594 UART: [fht] Storing FHT @ 0x50003400
1,480,425 UART: [idev] ++
1,480,593 UART: [idev] CDI.KEYID = 6
1,480,953 UART: [idev] SUBJECT.KEYID = 7
1,481,377 UART: [idev] UDS.KEYID = 0
1,481,722 ready_for_fw is high
1,481,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,577 UART: [idev] Erasing UDS.KEYID = 0
1,506,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,859 UART: [idev] --
1,516,116 UART: [ldev] ++
1,516,284 UART: [ldev] CDI.KEYID = 6
1,516,647 UART: [ldev] SUBJECT.KEYID = 5
1,517,073 UART: [ldev] AUTHORITY.KEYID = 7
1,517,536 UART: [ldev] FE.KEYID = 1
1,522,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,693 UART: [ldev] --
1,587,138 UART: [fwproc] Waiting for Commands...
1,587,913 UART: [fwproc] Received command 0x46574c44
1,588,704 UART: [fwproc] Received Image of size 114360 bytes
2,886,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,749 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,958 >>> mbox cmd response: success
3,078,958 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,080,116 UART: [afmc] ++
3,080,284 UART: [afmc] CDI.KEYID = 6
3,080,646 UART: [afmc] SUBJECT.KEYID = 7
3,081,071 UART: [afmc] AUTHORITY.KEYID = 5
3,116,090 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,937 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,627 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,528 UART: [afmc] --
3,159,620 UART: [cold-reset] --
3,160,500 UART: [state] Locking Datavault
3,161,857 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,461 UART: [state] Locking ICCM
3,163,083 UART: [exit] Launching FMC @ 0x40000130
3,168,412 UART:
3,168,428 UART: Running Caliptra FMC ...
3,168,836 UART:
3,168,979 UART: [state] CFI Enabled
3,179,428 UART: [fht] FMC Alias Private Key: 7
3,288,089 UART: [art] Extend RT PCRs Done
3,288,517 UART: [art] Lock RT PCRs Done
3,290,019 UART: [art] Populate DV Done
3,298,430 UART: [fht] FMC Alias Private Key: 7
3,299,592 UART: [art] Derive CDI
3,299,872 UART: [art] Store in in slot 0x4
3,384,867 UART: [art] Derive Key Pair
3,385,227 UART: [art] Store priv key in slot 0x5
3,398,395 UART: [art] Derive Key Pair - Done
3,412,714 UART: [art] Signing Cert with AUTHO
3,413,194 UART: RITY.KEYID = 7
3,429,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,781 UART: [art] PUB.X = 965A7A4C1A626A793D80B039363C36859BB39BAD6920040FFD21E64D21343DFF7AD008CFC5E8F7B1E2EDDDE524B9EAF0
3,436,558 UART: [art] PUB.Y = AB53011DCA8DB7CD807BAE3CA3FA9FD7D9569E9750CA84E241CEA1AA4FE7846F44FACCDF292811B871BEC00E321BEC97
3,443,530 UART: [art] SIG.R = FBF8B096DE76E94C83EDE24F71DD81956DB7F4F6B2DC4BEFD5537699DA047F7C0699C50854066430B91C1E96130A15CD
3,450,295 UART: [art] SIG.S = ADE49CE39A8A36F5578D83E052FCAEB3D47FDABF6762EB8ADBF5ECC4AE5CFACA70704FF8358993EA287B8421AA4FF40E
3,474,411 UART: Caliptra RT
3,474,757 UART: [state] CFI Enabled
3,582,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,877 UART: [rt]cmd =0x4c444556, len=4
3,623,284 >>> mbox cmd response data (687 bytes)
3,623,285 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,414 UART: [rt]cmd =0x43455246, len=4
3,664,821 >>> mbox cmd response data (920 bytes)
3,664,822 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,365 UART: [rt]cmd =0x43455252, len=4
3,705,048 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,766 ready_for_fw is high
1,362,766 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,950 >>> mbox cmd response: success
2,929,950 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,990,996 UART:
2,991,012 UART: Running Caliptra FMC ...
2,991,420 UART:
2,991,563 UART: [state] CFI Enabled
3,002,300 UART: [fht] FMC Alias Private Key: 7
3,109,711 UART: [art] Extend RT PCRs Done
3,110,139 UART: [art] Lock RT PCRs Done
3,111,579 UART: [art] Populate DV Done
3,119,700 UART: [fht] FMC Alias Private Key: 7
3,120,734 UART: [art] Derive CDI
3,121,014 UART: [art] Store in in slot 0x4
3,206,405 UART: [art] Derive Key Pair
3,206,765 UART: [art] Store priv key in slot 0x5
3,219,763 UART: [art] Derive Key Pair - Done
3,234,532 UART: [art] Signing Cert with AUTHO
3,235,012 UART: RITY.KEYID = 7
3,250,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,407 UART: [art] PUB.X = 2BD1DB7B9A8CAFA158BFF457910CCA53617AA25657062B5546A8662F1ECF1973580BDB8D52B0499FD85B68408219CD33
3,258,174 UART: [art] PUB.Y = 2F1D43096611F6D01712CAC32BC36B266B35C5A97EDFE147A872250E1705AD97E5760EBF1368CDB70EFC25E4535971BC
3,265,115 UART: [art] SIG.R = C6FD722F3EB5CC01A6A5136CDC9378455755CC41D981268BA00FC55701CB635CAA9E7514AC0D5A7A38543DA5D97D7F34
3,271,883 UART: [art] SIG.S = 3B1F0D9912B2800979B349D20279433DE71E50444C27A4E87ECB21D2E64D9BC21CDAAF5976EB97E63020DB619A7E74FD
3,295,453 UART: Caliptra RT
3,295,799 UART: [state] CFI Enabled
3,404,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,798 UART: [rt]cmd =0x4c444556, len=4
3,445,157 >>> mbox cmd response data (687 bytes)
3,445,158 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,763 UART: [rt]cmd =0x43455246, len=4
3,487,258 >>> mbox cmd response data (920 bytes)
3,487,259 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,618 UART: [rt]cmd =0x43455252, len=4
3,527,442 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
893,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,253 UART: [kat] ++
897,405 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,266 UART: [kat] SHA2-512-ACC
908,167 UART: [kat] ECC-384
917,714 UART: [kat] HMAC-384Kdf
922,238 UART: [kat] LMS
1,170,566 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,172,151 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 ready_for_fw is high
1,176,289 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,201,087 UART: [idev] Sha1 KeyId Algorithm
1,209,511 UART: [idev] --
1,210,659 UART: [ldev] ++
1,210,827 UART: [ldev] CDI.KEYID = 6
1,211,190 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,244,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,231 UART: [ldev] --
1,283,656 UART: [fwproc] Wait for Commands...
1,284,266 UART: [fwproc] Recv command 0x46574c44
1,284,994 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,224 >>> mbox cmd response: success
2,776,224 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,777,336 UART: [afmc] ++
2,777,504 UART: [afmc] CDI.KEYID = 6
2,777,866 UART: [afmc] SUBJECT.KEYID = 7
2,778,291 UART: [afmc] AUTHORITY.KEYID = 5
2,813,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,077 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,805 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,690 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,409 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,333 UART: [afmc] --
2,857,329 UART: [cold-reset] --
2,858,161 UART: [state] Locking Datavault
2,859,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,002 UART: [state] Locking ICCM
2,860,524 UART: [exit] Launching FMC @ 0x40000130
2,865,853 UART:
2,865,869 UART: Running Caliptra FMC ...
2,866,277 UART:
2,866,331 UART: [state] CFI Enabled
2,876,986 UART: [fht] FMC Alias Private Key: 7
2,984,363 UART: [art] Extend RT PCRs Done
2,984,791 UART: [art] Lock RT PCRs Done
2,986,563 UART: [art] Populate DV Done
2,994,782 UART: [fht] FMC Alias Private Key: 7
2,995,812 UART: [art] Derive CDI
2,996,092 UART: [art] Store in in slot 0x4
3,081,893 UART: [art] Derive Key Pair
3,082,253 UART: [art] Store priv key in slot 0x5
3,095,967 UART: [art] Derive Key Pair - Done
3,110,626 UART: [art] Signing Cert with AUTHO
3,111,106 UART: RITY.KEYID = 7
3,126,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,931 UART: [art] PUB.X = E0A6178DDD9C60FF18DEE5DF0F26710E6AE89ED8DDE91669E8B55766DEF4D803E28F4C4485CA7F04FDF48A9BC2B7D58D
3,133,713 UART: [art] PUB.Y = 9B67D31BBBE36E6634FA8E1F0E26124A2449410D97866E99EDC303B76D2C43223E2DEBE8E531BA668AC0A870BC47E8C6
3,140,664 UART: [art] SIG.R = DC5796638A32E8E2A2DBC6ACF06BECE665DD4B44C60F334CCD45859434264D2E973087B8AA793F4CD3F6D7E74BA0B7A5
3,147,447 UART: [art] SIG.S = 366321C1E32EAD8129CAE1951E2085A3F92891783C11E0BADE6F7023D004453E964B1E4789434E55A78B3AD2355783C6
3,171,157 UART: Caliptra RT
3,171,411 UART: [state] CFI Enabled
3,279,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,652 UART: [rt]cmd =0x4c444556, len=4
3,320,169 >>> mbox cmd response data (687 bytes)
3,320,170 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,327 UART: [rt]cmd =0x43455246, len=4
3,361,244 >>> mbox cmd response data (887 bytes)
3,361,245 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,492 UART: [rt]cmd =0x43455252, len=4
3,401,272 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,641 ready_for_fw is high
1,060,641 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,723 >>> mbox cmd response: success
2,625,723 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,463 UART:
2,687,479 UART: Running Caliptra FMC ...
2,687,887 UART:
2,687,941 UART: [state] CFI Enabled
2,698,458 UART: [fht] FMC Alias Private Key: 7
2,806,573 UART: [art] Extend RT PCRs Done
2,807,001 UART: [art] Lock RT PCRs Done
2,808,359 UART: [art] Populate DV Done
2,816,320 UART: [fht] FMC Alias Private Key: 7
2,817,346 UART: [art] Derive CDI
2,817,626 UART: [art] Store in in slot 0x4
2,903,131 UART: [art] Derive Key Pair
2,903,491 UART: [art] Store priv key in slot 0x5
2,916,551 UART: [art] Derive Key Pair - Done
2,931,401 UART: [art] Signing Cert with AUTHO
2,931,881 UART: RITY.KEYID = 7
2,947,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,064 UART: [art] PUB.X = 79577004DE65B25E1AE2ABAE96808F11B270E26C587C4A7828BB70D6B54AEC524F634B7CF468D661FD459A84416B3378
2,954,833 UART: [art] PUB.Y = D8D96280696A6EA5CBA902EAFD355EDACB91FD8E0CDB2C2372F0DE0E72EEA9BECCADA99900B0437BC1A59B600CEE0427
2,961,776 UART: [art] SIG.R = 06CFE69BF0DD422068594F3044CCDF0DD528618CBB1EE351622826DB2DA7AABD17F63AD791832F61B74F930CB0C6EB7E
2,968,553 UART: [art] SIG.S = 172C2AF3DD9D028E4B9201FDB53C6F9D6F469A84D7F08E035417063508A625B2F890E9688C1F1C987508A85F38FB4E25
2,992,714 UART: Caliptra RT
2,992,968 UART: [state] CFI Enabled
3,100,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,921 UART: [rt]cmd =0x4c444556, len=4
3,141,370 >>> mbox cmd response data (687 bytes)
3,141,371 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,630 UART: [rt]cmd =0x43455246, len=4
3,182,683 >>> mbox cmd response data (887 bytes)
3,182,684 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,211,987 UART: [rt]cmd =0x43455252, len=4
3,222,903 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,655 UART: [kat] SHA2-512-ACC
908,556 UART: [kat] ECC-384
918,865 UART: [kat] HMAC-384Kdf
923,279 UART: [kat] LMS
1,171,607 UART: [kat] --
1,172,520 UART: [cold-reset] ++
1,172,870 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 ready_for_fw is high
1,176,968 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,167 UART: [idev] Erasing UDS.KEYID = 0
1,201,996 UART: [idev] Sha1 KeyId Algorithm
1,210,492 UART: [idev] --
1,211,604 UART: [ldev] ++
1,211,772 UART: [ldev] CDI.KEYID = 6
1,212,135 UART: [ldev] SUBJECT.KEYID = 5
1,212,561 UART: [ldev] AUTHORITY.KEYID = 7
1,213,024 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,262 UART: [ldev] --
1,283,653 UART: [fwproc] Wait for Commands...
1,284,473 UART: [fwproc] Recv command 0x46574c44
1,285,201 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,259 >>> mbox cmd response: success
2,775,259 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,435 UART: [afmc] ++
2,776,603 UART: [afmc] CDI.KEYID = 6
2,776,965 UART: [afmc] SUBJECT.KEYID = 7
2,777,390 UART: [afmc] AUTHORITY.KEYID = 5
2,812,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,839 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,486 UART: [afmc] --
2,856,512 UART: [cold-reset] --
2,857,348 UART: [state] Locking Datavault
2,858,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,331 UART: [state] Locking ICCM
2,859,923 UART: [exit] Launching FMC @ 0x40000130
2,865,252 UART:
2,865,268 UART: Running Caliptra FMC ...
2,865,676 UART:
2,865,819 UART: [state] CFI Enabled
2,876,024 UART: [fht] FMC Alias Private Key: 7
2,983,901 UART: [art] Extend RT PCRs Done
2,984,329 UART: [art] Lock RT PCRs Done
2,985,771 UART: [art] Populate DV Done
2,994,194 UART: [fht] FMC Alias Private Key: 7
2,995,272 UART: [art] Derive CDI
2,995,552 UART: [art] Store in in slot 0x4
3,081,179 UART: [art] Derive Key Pair
3,081,539 UART: [art] Store priv key in slot 0x5
3,095,789 UART: [art] Derive Key Pair - Done
3,110,425 UART: [art] Signing Cert with AUTHO
3,110,905 UART: RITY.KEYID = 7
3,126,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,106 UART: [art] PUB.X = ADEC10339DCBFC6E2DF7F1DFE7EAEE3806A67BCA23FAF98857A4D93D9C69EB7587655E16C3FDB7326BD325EA34DA5713
3,133,899 UART: [art] PUB.Y = DA333CD2A9A94DD2D1078A9B045369E9BC97AC7BC9857B5C417F2940A66C868F13353834B06AE655DC992C48307AD431
3,140,845 UART: [art] SIG.R = E795E1FE1E00119759C76A63B60835EE4F0D7EB90D1FD4FBE84095643B3914492F536AF74637270EDAE95DD359DEC89E
3,147,587 UART: [art] SIG.S = 7888DAEACAFC2AC5299BD3462A389D4ECD7506041F52E70F4E4CD7F54BC7FE93266472DD2E9BA8452F7415026070AB43
3,171,322 UART: Caliptra RT
3,171,668 UART: [state] CFI Enabled
3,280,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,489 UART: [rt]cmd =0x4c444556, len=4
3,321,076 >>> mbox cmd response data (687 bytes)
3,321,077 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,624 UART: [rt]cmd =0x43455246, len=4
3,362,789 >>> mbox cmd response data (887 bytes)
3,362,790 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,133 UART: [rt]cmd =0x43455252, len=4
3,403,031 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,996 ready_for_fw is high
1,059,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,840 >>> mbox cmd response: success
2,625,840 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,946 UART:
2,687,962 UART: Running Caliptra FMC ...
2,688,370 UART:
2,688,513 UART: [state] CFI Enabled
2,699,182 UART: [fht] FMC Alias Private Key: 7
2,807,553 UART: [art] Extend RT PCRs Done
2,807,981 UART: [art] Lock RT PCRs Done
2,809,499 UART: [art] Populate DV Done
2,817,526 UART: [fht] FMC Alias Private Key: 7
2,818,696 UART: [art] Derive CDI
2,818,976 UART: [art] Store in in slot 0x4
2,904,523 UART: [art] Derive Key Pair
2,904,883 UART: [art] Store priv key in slot 0x5
2,918,439 UART: [art] Derive Key Pair - Done
2,933,359 UART: [art] Signing Cert with AUTHO
2,933,839 UART: RITY.KEYID = 7
2,948,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,600 UART: [art] PUB.X = C1762D57406A49153F0CF031B4084A63C9727865DEA7D65EE7DF07185251A7747109E6EB47652B9C880297AD34F78523
2,956,345 UART: [art] PUB.Y = 0BA2012CED8FD9C107E7E124B0FC620E6CCD767245BF6AC07990AAC96B491317FD5D0B4E19C4A953CAE6545AB9E94E82
2,963,296 UART: [art] SIG.R = 7E1BBBB9329480FE8FFD5A7CCA689E7AF6D2608B3CC4935F626FB862B77B6FA19F5158632FACD0027B12B01D200CF8CF
2,970,078 UART: [art] SIG.S = DDD369A3F2BF204EBCFB80D6F92091AB0E72F262E2ABA3366C621CE47E51AE85334134F9B3FBF500F5BDC6039C9BCD1B
2,994,387 UART: Caliptra RT
2,994,733 UART: [state] CFI Enabled
3,102,599 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,780 UART: [rt]cmd =0x4c444556, len=4
3,143,223 >>> mbox cmd response data (687 bytes)
3,143,224 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,261 UART: [rt]cmd =0x43455246, len=4
3,184,354 >>> mbox cmd response data (887 bytes)
3,184,355 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,213,748 UART: [rt]cmd =0x43455252, len=4
3,224,702 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,407 UART: [kat] SHA2-256
901,347 UART: [kat] SHA2-384
904,002 UART: [kat] SHA2-512-ACC
905,903 UART: [kat] ECC-384
915,286 UART: [kat] HMAC-384Kdf
919,942 UART: [kat] LMS
1,168,254 UART: [kat] --
1,169,091 UART: [cold-reset] ++
1,169,631 UART: [fht] FHT @ 0x50003400
1,172,449 UART: [idev] ++
1,172,617 UART: [idev] CDI.KEYID = 6
1,172,978 UART: [idev] SUBJECT.KEYID = 7
1,173,403 UART: [idev] UDS.KEYID = 0
1,173,749 ready_for_fw is high
1,173,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,135 UART: [idev] Sha1 KeyId Algorithm
1,207,935 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,549 UART: [fwproc] Recv command 0x46574c44
1,282,282 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,206 >>> mbox cmd response: success
2,772,206 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,773,373 UART: [afmc] ++
2,773,541 UART: [afmc] CDI.KEYID = 6
2,773,904 UART: [afmc] SUBJECT.KEYID = 7
2,774,330 UART: [afmc] AUTHORITY.KEYID = 5
2,809,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,838 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,342 UART: [afmc] --
2,852,420 UART: [cold-reset] --
2,853,290 UART: [state] Locking Datavault
2,854,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,893 UART: [state] Locking ICCM
2,855,383 UART: [exit] Launching FMC @ 0x40000130
2,860,712 UART:
2,860,728 UART: Running Caliptra FMC ...
2,861,136 UART:
2,861,190 UART: [state] CFI Enabled
2,871,407 UART: [fht] FMC Alias Private Key: 7
2,979,532 UART: [art] Extend RT PCRs Done
2,979,960 UART: [art] Lock RT PCRs Done
2,981,776 UART: [art] Populate DV Done
2,989,809 UART: [fht] FMC Alias Private Key: 7
2,990,937 UART: [art] Derive CDI
2,991,217 UART: [art] Store in in slot 0x4
3,076,918 UART: [art] Derive Key Pair
3,077,278 UART: [art] Store priv key in slot 0x5
3,090,164 UART: [art] Derive Key Pair - Done
3,105,107 UART: [art] Signing Cert with AUTHO
3,105,587 UART: RITY.KEYID = 7
3,121,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,888 UART: [art] PUB.X = C116AF4D871D0CD93C2438276F003E5EB614BCB339576162D11DF89C12CFE4F386BE50AFEEF6928C2E1B08D4C3FBF611
3,128,644 UART: [art] PUB.Y = CBEFBBF3C636DD4F555938EBED452DA8F7DDE857EAE177F30B6F2346F43E5C6EF4C046B7A73F2E69A6F6C480A59AB653
3,135,615 UART: [art] SIG.R = B6916B8D9EAE86C32A96CA8AFD11F0EA63B2C95086749EB9ED587BF8E741F1AF139955B47CAE8BA9DBFEB2F9FAD93F68
3,142,411 UART: [art] SIG.S = B22FC14FD2227B55887E6E34FC51B99EBFB5E93785894127BF40BAA92E79698F579299EFBA630552D0797F7E77B827E4
3,166,319 UART: Caliptra RT
3,166,573 UART: [state] CFI Enabled
3,274,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,991 UART: [rt]cmd =0x4c444556, len=4
3,315,654 >>> mbox cmd response data (687 bytes)
3,315,655 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,890 UART: [rt]cmd =0x43455246, len=4
3,357,069 >>> mbox cmd response data (887 bytes)
3,357,070 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,257 UART: [rt]cmd =0x43455252, len=4
3,397,026 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,252 ready_for_fw is high
1,056,252 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,770 >>> mbox cmd response: success
2,622,770 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,846 UART:
2,684,862 UART: Running Caliptra FMC ...
2,685,270 UART:
2,685,324 UART: [state] CFI Enabled
2,695,953 UART: [fht] FMC Alias Private Key: 7
2,803,676 UART: [art] Extend RT PCRs Done
2,804,104 UART: [art] Lock RT PCRs Done
2,805,604 UART: [art] Populate DV Done
2,813,773 UART: [fht] FMC Alias Private Key: 7
2,814,717 UART: [art] Derive CDI
2,814,997 UART: [art] Store in in slot 0x4
2,900,680 UART: [art] Derive Key Pair
2,901,040 UART: [art] Store priv key in slot 0x5
2,913,328 UART: [art] Derive Key Pair - Done
2,928,230 UART: [art] Signing Cert with AUTHO
2,928,710 UART: RITY.KEYID = 7
2,944,460 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,225 UART: [art] PUB.X = 9DA4E78B5B4A3328BA4C7482770EFD81D2F27ED05FC893E844D84B50C582A83165E9F7203F1E4A2EB5CEE00368B69737
2,951,995 UART: [art] PUB.Y = C1789C5F823CAC80133F9E8DA6A36E699B4FD73EB7F3C8A599239FB6B697FC3187A2D7825F9B4D8878735F75177A2D81
2,958,949 UART: [art] SIG.R = 36C6C522CB22CADEDA13517386A4109A781C5B133E7D485C0B68B1043B393AC12DB48DDD4BAAC87F3248AE0B48ED2F46
2,965,724 UART: [art] SIG.S = BD6D9DCF6FCDD6C2D63ACB968995A6D1755E3E3BE729C6E307E5943D7BDAD531C1C7BB6AFCD29D044D62AAD7D63AB6C2
2,990,133 UART: Caliptra RT
2,990,387 UART: [state] CFI Enabled
3,097,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,174 UART: [rt]cmd =0x4c444556, len=4
3,138,437 >>> mbox cmd response data (687 bytes)
3,138,438 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,763 UART: [rt]cmd =0x43455246, len=4
3,179,822 >>> mbox cmd response data (887 bytes)
3,179,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,209,250 UART: [rt]cmd =0x43455252, len=4
3,220,014 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,174,448 ready_for_fw is high
1,174,448 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,198,844 UART: [idev] Sha1 KeyId Algorithm
1,207,642 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,835 >>> mbox cmd response: success
2,773,835 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,940 UART: [afmc] ++
2,775,108 UART: [afmc] CDI.KEYID = 6
2,775,471 UART: [afmc] SUBJECT.KEYID = 7
2,775,897 UART: [afmc] AUTHORITY.KEYID = 5
2,811,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,325 UART: [afmc] --
2,855,329 UART: [cold-reset] --
2,856,071 UART: [state] Locking Datavault
2,857,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,026 UART: [state] Locking ICCM
2,858,558 UART: [exit] Launching FMC @ 0x40000130
2,863,887 UART:
2,863,903 UART: Running Caliptra FMC ...
2,864,311 UART:
2,864,454 UART: [state] CFI Enabled
2,874,865 UART: [fht] FMC Alias Private Key: 7
2,983,150 UART: [art] Extend RT PCRs Done
2,983,578 UART: [art] Lock RT PCRs Done
2,985,194 UART: [art] Populate DV Done
2,993,469 UART: [fht] FMC Alias Private Key: 7
2,994,431 UART: [art] Derive CDI
2,994,711 UART: [art] Store in in slot 0x4
3,080,654 UART: [art] Derive Key Pair
3,081,014 UART: [art] Store priv key in slot 0x5
3,094,234 UART: [art] Derive Key Pair - Done
3,108,885 UART: [art] Signing Cert with AUTHO
3,109,365 UART: RITY.KEYID = 7
3,124,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,300 UART: [art] PUB.X = 34B1F107317D2ECDA4C209FB6051B02E78809DBF618892032F1A7385679178C463EA9FB749DC933D1C784E26F4B7841D
3,132,059 UART: [art] PUB.Y = 244A89DF105D526AE8B34549081ED05F0AAC8E4CC0684D5EC78817812C98A2469267E4601ADD5BA3F83D6BA20EA76C0B
3,139,005 UART: [art] SIG.R = DFE9698694FFAD9D312C7B4432A3C5C6BF817EAE2A47B0DFEC9FAB2808B368107F426CDF892BEB15D789CF13F380B448
3,145,790 UART: [art] SIG.S = 73E70822CB5DE0AB80267764C20C4C74A273112149C0A8679965A4F0F6BAC8197555F9E632AD6AFC8FB9000F61A0E6EE
3,169,366 UART: Caliptra RT
3,169,712 UART: [state] CFI Enabled
3,278,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,465 UART: [rt]cmd =0x4c444556, len=4
3,318,738 >>> mbox cmd response data (687 bytes)
3,318,739 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,840 UART: [rt]cmd =0x43455246, len=4
3,359,797 >>> mbox cmd response data (887 bytes)
3,359,798 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,999 UART: [rt]cmd =0x43455252, len=4
3,399,895 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,965 ready_for_fw is high
1,055,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,447 >>> mbox cmd response: success
2,623,447 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,685,083 UART:
2,685,099 UART: Running Caliptra FMC ...
2,685,507 UART:
2,685,650 UART: [state] CFI Enabled
2,696,119 UART: [fht] FMC Alias Private Key: 7
2,803,276 UART: [art] Extend RT PCRs Done
2,803,704 UART: [art] Lock RT PCRs Done
2,805,094 UART: [art] Populate DV Done
2,813,233 UART: [fht] FMC Alias Private Key: 7
2,814,193 UART: [art] Derive CDI
2,814,473 UART: [art] Store in in slot 0x4
2,900,266 UART: [art] Derive Key Pair
2,900,626 UART: [art] Store priv key in slot 0x5
2,913,842 UART: [art] Derive Key Pair - Done
2,928,639 UART: [art] Signing Cert with AUTHO
2,929,119 UART: RITY.KEYID = 7
2,944,487 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,252 UART: [art] PUB.X = 9545665EE973FE32F5FBF4F85ACBAF36DCA0B2362ACA710FF0F8C71E074C0CD56F3509B8787D60A58FD74168F83A4DCF
2,952,028 UART: [art] PUB.Y = 4C440C54B8DF0BB39351507268A3D108C9A1950E646C32EBFE099176ABB5F41F172C81AEFCBE79897788AD42A99712D2
2,958,967 UART: [art] SIG.R = BAE1452DA36C476F82D3AA85E37B09054A0E0F22A85AD49DE8B538737142588E2C0BDA18491BA50C85339A7DD2A22D51
2,965,725 UART: [art] SIG.S = 5487371D50B71CB0F84BAF409E9B5FAC047EAF5C008B47156B8979677BE961740F254EB36DEB0AAE2205C3AF8A974CE7
2,989,686 UART: Caliptra RT
2,990,032 UART: [state] CFI Enabled
3,097,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,483 UART: [rt]cmd =0x4c444556, len=4
3,138,054 >>> mbox cmd response data (687 bytes)
3,138,055 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,362 UART: [rt]cmd =0x43455246, len=4
3,179,599 >>> mbox cmd response data (887 bytes)
3,179,600 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,209,121 UART: [rt]cmd =0x43455252, len=4
3,219,929 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,498 UART:
192,870 UART: Running Caliptra ROM ...
194,063 UART:
194,217 UART: [state] CFI Enabled
262,922 UART: [state] LifecycleState = Unprovisioned
264,834 UART: [state] DebugLocked = No
267,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,361 UART: [kat] SHA2-256
442,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,485 UART: [kat] ++
453,089 UART: [kat] sha1
462,546 UART: [kat] SHA2-256
465,255 UART: [kat] SHA2-384
470,456 UART: [kat] SHA2-512-ACC
472,813 UART: [kat] ECC-384
2,768,037 UART: [kat] HMAC-384Kdf
2,779,495 UART: [kat] LMS
3,969,821 UART: [kat] --
3,972,703 UART: [cold-reset] ++
3,974,771 UART: [fht] Storing FHT @ 0x50003400
3,987,237 UART: [idev] ++
3,987,861 UART: [idev] CDI.KEYID = 6
3,988,735 UART: [idev] SUBJECT.KEYID = 7
3,990,038 UART: [idev] UDS.KEYID = 0
3,990,980 ready_for_fw is high
3,991,176 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,594 UART: [idev] Erasing UDS.KEYID = 0
7,323,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,506 UART: [idev] --
7,350,012 UART: [ldev] ++
7,350,575 UART: [ldev] CDI.KEYID = 6
7,351,509 UART: [ldev] SUBJECT.KEYID = 5
7,352,764 UART: [ldev] AUTHORITY.KEYID = 7
7,353,988 UART: [ldev] FE.KEYID = 1
7,402,950 UART: [ldev] Erasing FE.KEYID = 1
10,735,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,073 UART: [ldev] --
13,096,331 UART: [fwproc] Waiting for Commands...
13,098,368 UART: [fwproc] Received command 0x46574c44
13,100,600 UART: [fwproc] Received Image of size 114036 bytes
17,153,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,295,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,612,779 >>> mbox cmd response: success
18,074,078 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,075,116 UART: [afmc] ++
18,075,637 UART: [afmc] CDI.KEYID = 6
18,076,521 UART: [afmc] SUBJECT.KEYID = 7
18,077,535 UART: [afmc] AUTHORITY.KEYID = 5
20,988,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,780 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,021 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,477 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,274 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,725 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,940 UART: [afmc] --
23,361,091 UART: [cold-reset] --
23,365,813 UART: [state] Locking Datavault
23,370,408 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,098 UART: [state] Locking ICCM
23,374,165 UART: [exit] Launching FMC @ 0x40000130
23,382,525 UART:
23,382,801 UART: Running Caliptra FMC ...
23,383,906 UART:
23,384,054 UART: [state] CFI Enabled
23,449,614 UART: [fht] FMC Alias Private Key: 7
25,787,277 UART: [art] Extend RT PCRs Done
25,788,502 UART: [art] Lock RT PCRs Done
25,789,991 UART: [art] Populate DV Done
25,795,614 UART: [fht] FMC Alias Private Key: 7
25,797,198 UART: [art] Derive CDI
25,797,971 UART: [art] Store in in slot 0x4
25,858,488 UART: [art] Derive Key Pair
25,859,526 UART: [art] Store priv key in slot 0x5
29,152,299 UART: [art] Derive Key Pair - Done
29,165,347 UART: [art] Signing Cert with AUTHO
29,166,651 UART: RITY.KEYID = 7
31,454,301 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,805 UART: [art] PUB.X = C6F871C549B2456BC8551A45ABBD09DB9C5F717F0C145C0AAED31C3B161A55C178B179D10E4E3AAA0B2B2D142D0E3887
31,463,060 UART: [art] PUB.Y = 05359C23BA9C8348A84DC2E7B6C6331BDC2F9B306EC354551D861722EE7BFA841313404ED6DB9C32EB71C7CE799E356C
31,470,295 UART: [art] SIG.R = 682B2CC32D45944B103C366943D5BFE1B360A1411E91A0FFADD64F77C6BB27BC65CFAB522CEACEC27B7DF840CA500EAA
31,477,730 UART: [art] SIG.S = 7F68606E98A86B2F71BB5682F381EF6D0EE8091F32D854C9C924E614C7A521F9DB35607D5CB9DB53CB49B3F7BF2BEB64
32,782,266 UART: Caliptra RT
32,782,961 UART: [state] CFI Enabled
32,944,675 UART: [rt] RT listening for mailbox commands...
32,978,365 UART: [rt]cmd =0x49444543, len=327
32,987,353 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,807,515 ready_for_fw is high
3,807,914 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,895,864 >>> mbox cmd response: success
18,357,915 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,591,211 UART:
23,591,652 UART: Running Caliptra FMC ...
23,592,753 UART:
23,592,898 UART: [state] CFI Enabled
23,657,496 UART: [fht] FMC Alias Private Key: 7
25,994,780 UART: [art] Extend RT PCRs Done
25,996,025 UART: [art] Lock RT PCRs Done
25,997,626 UART: [art] Populate DV Done
26,003,181 UART: [fht] FMC Alias Private Key: 7
26,004,722 UART: [art] Derive CDI
26,005,538 UART: [art] Store in in slot 0x4
26,066,550 UART: [art] Derive Key Pair
26,067,589 UART: [art] Store priv key in slot 0x5
29,360,638 UART: [art] Derive Key Pair - Done
29,373,522 UART: [art] Signing Cert with AUTHO
29,374,820 UART: RITY.KEYID = 7
31,662,951 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,493 UART: [art] PUB.X = A1D28E941445F44903A4B1D969B55B0B61145E3CF5691ADF9FEC4C4FF49538F941509637BF813FC797D1229E1FD8C573
31,671,730 UART: [art] PUB.Y = DFB581C8E1CA372D3CB0BF4E5CA698CB1D6584A39A2674B6036AAE947A1A37CD432270C73F8D2DBF0380B9DA6A89ED20
31,678,991 UART: [art] SIG.R = E311CAB93C8C53146D119A7D68342E51C98F6C034FC522FB5455C18BCF8F658AFB56A520E1E95426AEB9A4B8B48AD0D6
31,686,372 UART: [art] SIG.S = 44DDCCF9BB409967E7922E26530217D076D5B8069B3E2E5F8EEBC1A0D13F01A57879880C07963F949D1591E416DF7C62
32,991,631 UART: Caliptra RT
32,992,375 UART: [state] CFI Enabled
33,154,621 UART: [rt] RT listening for mailbox commands...
33,188,256 UART: [rt]cmd =0x49444543, len=327
33,197,190 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,503 UART:
192,872 UART: Running Caliptra ROM ...
194,062 UART:
603,591 UART: [state] CFI Enabled
619,329 UART: [state] LifecycleState = Unprovisioned
621,305 UART: [state] DebugLocked = No
622,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,057 UART: [kat] SHA2-256
797,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,308 UART: [kat] ++
808,785 UART: [kat] sha1
820,722 UART: [kat] SHA2-256
823,446 UART: [kat] SHA2-384
829,430 UART: [kat] SHA2-512-ACC
831,792 UART: [kat] ECC-384
3,114,345 UART: [kat] HMAC-384Kdf
3,125,301 UART: [kat] LMS
4,315,392 UART: [kat] --
4,321,878 UART: [cold-reset] ++
4,324,239 UART: [fht] Storing FHT @ 0x50003400
4,335,290 UART: [idev] ++
4,335,855 UART: [idev] CDI.KEYID = 6
4,336,842 UART: [idev] SUBJECT.KEYID = 7
4,338,085 UART: [idev] UDS.KEYID = 0
4,339,170 ready_for_fw is high
4,339,399 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,669 UART: [idev] Erasing UDS.KEYID = 0
7,623,670 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,264 UART: [idev] --
7,649,043 UART: [ldev] ++
7,649,672 UART: [ldev] CDI.KEYID = 6
7,650,584 UART: [ldev] SUBJECT.KEYID = 5
7,651,793 UART: [ldev] AUTHORITY.KEYID = 7
7,653,303 UART: [ldev] FE.KEYID = 1
7,665,361 UART: [ldev] Erasing FE.KEYID = 1
10,957,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,566 UART: [ldev] --
13,318,181 UART: [fwproc] Waiting for Commands...
13,321,459 UART: [fwproc] Received command 0x46574c44
13,323,636 UART: [fwproc] Received Image of size 114036 bytes
17,377,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,002 >>> mbox cmd response: success
18,295,333 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,296,355 UART: [afmc] ++
18,296,876 UART: [afmc] CDI.KEYID = 6
18,297,782 UART: [afmc] SUBJECT.KEYID = 7
18,298,802 UART: [afmc] AUTHORITY.KEYID = 5
21,149,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,931 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,328 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,159 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,603 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,475 UART: [afmc] --
23,516,164 UART: [cold-reset] --
23,520,409 UART: [state] Locking Datavault
23,525,276 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,031 UART: [state] Locking ICCM
23,528,860 UART: [exit] Launching FMC @ 0x40000130
23,537,253 UART:
23,537,486 UART: Running Caliptra FMC ...
23,538,605 UART:
23,538,771 UART: [state] CFI Enabled
23,547,034 UART: [fht] FMC Alias Private Key: 7
25,877,547 UART: [art] Extend RT PCRs Done
25,878,769 UART: [art] Lock RT PCRs Done
25,880,443 UART: [art] Populate DV Done
25,885,959 UART: [fht] FMC Alias Private Key: 7
25,887,500 UART: [art] Derive CDI
25,888,259 UART: [art] Store in in slot 0x4
25,930,701 UART: [art] Derive Key Pair
25,931,736 UART: [art] Store priv key in slot 0x5
29,173,690 UART: [art] Derive Key Pair - Done
29,186,952 UART: [art] Signing Cert with AUTHO
29,188,252 UART: RITY.KEYID = 7
31,467,553 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,052 UART: [art] PUB.X = 4CCB810365785DBA6017B491F2A5DB4078FFAA93A7F51EF39C38EEF2A3BA5A16361AB6B4F766AE0042B2FCAA7FFC421D
31,476,358 UART: [art] PUB.Y = 2A331E61BCB4130740EBB0B40D217D5145E3F2A48B015E4F07811A1AB03C34D8947F30A96EBDD677D9F320F407FFB097
31,483,574 UART: [art] SIG.R = 46B6C1C91C4F9D727C08FA4FE6340F16FFE986301696720470731AC968B838E426164347FF048FD75F74A9EA2B24CB85
31,490,962 UART: [art] SIG.S = 4E6C7B07BAC66E94A46589F0132B0050531981EB5F27E2CA78D9D52AFD668C78D2B4A2B2C4CDB5CF5E1766D208A5D301
32,796,100 UART: Caliptra RT
32,796,810 UART: [state] CFI Enabled
32,913,442 UART: [rt] RT listening for mailbox commands...
32,947,067 UART: [rt]cmd =0x49444543, len=327
32,956,156 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,127,758 ready_for_fw is high
4,128,349 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,062,735 >>> mbox cmd response: success
18,524,677 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,702,862 UART:
23,703,259 UART: Running Caliptra FMC ...
23,704,354 UART:
23,704,515 UART: [state] CFI Enabled
23,712,510 UART: [fht] FMC Alias Private Key: 7
26,043,718 UART: [art] Extend RT PCRs Done
26,044,957 UART: [art] Lock RT PCRs Done
26,046,428 UART: [art] Populate DV Done
26,051,930 UART: [fht] FMC Alias Private Key: 7
26,053,483 UART: [art] Derive CDI
26,054,323 UART: [art] Store in in slot 0x4
26,096,977 UART: [art] Derive Key Pair
26,097,979 UART: [art] Store priv key in slot 0x5
29,339,702 UART: [art] Derive Key Pair - Done
29,352,542 UART: [art] Signing Cert with AUTHO
29,353,844 UART: RITY.KEYID = 7
31,633,134 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,646 UART: [art] PUB.X = 202EB88FFBFAFE96E33D065EFB9D76E04FF6F3E575DA945FF2F805DFBC70144A4433E4AAE8E84E13A7E3DE6944372D78
31,642,037 UART: [art] PUB.Y = 9E853AEC884B78343B63D9FAD6CCA36A41B55657E2CD6949E901445C370CACFB284781D94D2E1AA24E679D78D2F9549D
31,649,172 UART: [art] SIG.R = 449888AE0A5ACC6F0E36122D967C6AAB1027590743A99A791FE2B9ECBD4FCDFEFEE38900936DFFB37032CB538C14293F
31,656,527 UART: [art] SIG.S = D9F7CC669BD60A891195620B6492F59F539A6835D11FA63E4BEABEE784C1358DAE60A07029C8776AFDD083825322FDF4
32,962,133 UART: Caliptra RT
32,962,848 UART: [state] CFI Enabled
33,079,755 UART: [rt] RT listening for mailbox commands...
33,113,271 UART: [rt]cmd =0x49444543, len=327
33,122,346 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
192,542 UART:
192,913 UART: Running Caliptra ROM ...
194,051 UART:
194,208 UART: [state] CFI Enabled
263,080 UART: [state] LifecycleState = Unprovisioned
264,953 UART: [state] DebugLocked = No
266,930 UART: [state] WD Timer not started. Device not locked for debugging
270,939 UART: [kat] SHA2-256
450,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,604 UART: [kat] ++
462,086 UART: [kat] sha1
472,754 UART: [kat] SHA2-256
475,768 UART: [kat] SHA2-384
481,760 UART: [kat] SHA2-512-ACC
484,698 UART: [kat] ECC-384
2,948,539 UART: [kat] HMAC-384Kdf
2,972,210 UART: [kat] LMS
3,501,604 UART: [kat] --
3,508,103 UART: [cold-reset] ++
3,510,538 UART: [fht] FHT @ 0x50003400
3,521,160 UART: [idev] ++
3,521,730 UART: [idev] CDI.KEYID = 6
3,522,639 UART: [idev] SUBJECT.KEYID = 7
3,523,808 UART: [idev] UDS.KEYID = 0
3,524,876 ready_for_fw is high
3,525,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,931 UART: [idev] Erasing UDS.KEYID = 0
6,028,404 UART: [idev] Sha1 KeyId Algorithm
6,050,933 UART: [idev] --
6,056,386 UART: [ldev] ++
6,056,960 UART: [ldev] CDI.KEYID = 6
6,057,876 UART: [ldev] SUBJECT.KEYID = 5
6,059,038 UART: [ldev] AUTHORITY.KEYID = 7
6,060,327 UART: [ldev] FE.KEYID = 1
6,101,705 UART: [ldev] Erasing FE.KEYID = 1
8,603,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,984 UART: [ldev] --
10,395,230 UART: [fwproc] Wait for Commands...
10,397,974 UART: [fwproc] Recv command 0x46574c44
10,400,065 UART: [fwproc] Recv'd Img size: 114360 bytes
13,804,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,270,346 >>> mbox cmd response: success
14,731,858 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,732,905 UART: [afmc] ++
14,733,436 UART: [afmc] CDI.KEYID = 6
14,734,359 UART: [afmc] SUBJECT.KEYID = 7
14,735,486 UART: [afmc] AUTHORITY.KEYID = 5
16,807,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,441 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,123 UART: [afmc] --
18,608,786 UART: [cold-reset] --
18,612,494 UART: [state] Locking Datavault
18,616,995 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,641 UART: [state] Locking ICCM
18,620,533 UART: [exit] Launching FMC @ 0x40000130
18,628,929 UART:
18,629,168 UART: Running Caliptra FMC ...
18,630,272 UART:
18,630,434 UART: [state] CFI Enabled
18,689,987 UART: [fht] FMC Alias Private Key: 7
20,454,773 UART: [art] Extend RT PCRs Done
20,455,993 UART: [art] Lock RT PCRs Done
20,457,779 UART: [art] Populate DV Done
20,462,926 UART: [fht] FMC Alias Private Key: 7
20,464,539 UART: [art] Derive CDI
20,465,355 UART: [art] Store in in slot 0x4
20,523,717 UART: [art] Derive Key Pair
20,524,757 UART: [art] Store priv key in slot 0x5
22,988,692 UART: [art] Derive Key Pair - Done
23,001,680 UART: [art] Signing Cert with AUTHO
23,002,995 UART: RITY.KEYID = 7
24,713,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,434 UART: [art] PUB.X = 914C6B7F823F1625E7329335159A1EC6FE7B000CF439E838466E99DD31892FF906EC009D3AC813FD72793864099F1FBF
24,722,666 UART: [art] PUB.Y = 1D3A3B3A5484B736ABFB10FBE695EC1281728F3C4B0ABFA83F76E5BA6A606A8A48F3A4FD0C3CB55BEB4D31C789E27C75
24,729,940 UART: [art] SIG.R = 317D468C4295356A52888FEFD26731A860F20A793E543ECE9D595C7DC9E06BFA37313D3F90B9A169976BA2B22D86084D
24,737,330 UART: [art] SIG.S = 89E7982B89860FD22072BCF0E158B5A71ED29924FCF7A0409BE5EAA94A9CB31A0BCF11FA04DFA7AC0AE146854C584C7A
25,716,128 UART: Caliptra RT
25,716,824 UART: [state] CFI Enabled
25,881,329 UART: [rt] RT listening for mailbox commands...
25,914,636 UART: [rt]cmd =0x49444543, len=327
25,923,490 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,513 UART:
192,899 UART: Running Caliptra ROM ...
194,007 UART:
194,158 UART: [state] CFI Enabled
263,616 UART: [state] LifecycleState = Unprovisioned
265,972 UART: [state] DebugLocked = No
268,350 UART: [state] WD Timer not started. Device not locked for debugging
273,329 UART: [kat] SHA2-256
463,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,988 UART: [kat] ++
474,439 UART: [kat] sha1
486,251 UART: [kat] SHA2-256
489,238 UART: [kat] SHA2-384
496,798 UART: [kat] SHA2-512-ACC
499,389 UART: [kat] ECC-384
2,948,719 UART: [kat] HMAC-384Kdf
2,973,411 UART: [kat] LMS
3,505,211 UART: [kat] --
3,508,142 UART: [cold-reset] ++
3,510,078 UART: [fht] FHT @ 0x50003400
3,521,778 UART: [idev] ++
3,522,486 UART: [idev] CDI.KEYID = 6
3,523,523 UART: [idev] SUBJECT.KEYID = 7
3,524,811 UART: [idev] UDS.KEYID = 0
3,525,823 ready_for_fw is high
3,526,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,771 UART: [idev] Erasing UDS.KEYID = 0
6,030,146 UART: [idev] Sha1 KeyId Algorithm
6,051,606 UART: [idev] --
6,057,231 UART: [ldev] ++
6,057,917 UART: [ldev] CDI.KEYID = 6
6,058,845 UART: [ldev] SUBJECT.KEYID = 5
6,060,008 UART: [ldev] AUTHORITY.KEYID = 7
6,061,196 UART: [ldev] FE.KEYID = 1
6,100,965 UART: [ldev] Erasing FE.KEYID = 1
8,606,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,632 UART: [ldev] --
10,413,505 UART: [fwproc] Wait for Commands...
10,415,128 UART: [fwproc] Recv command 0x46574c44
10,417,444 UART: [fwproc] Recv'd Img size: 114360 bytes
13,855,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,594,509 >>> mbox cmd response: success
15,054,947 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,056,024 UART: [afmc] ++
15,056,561 UART: [afmc] CDI.KEYID = 6
15,057,451 UART: [afmc] SUBJECT.KEYID = 7
15,058,473 UART: [afmc] AUTHORITY.KEYID = 5
17,128,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,090 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,579 UART: [afmc] --
18,926,211 UART: [cold-reset] --
18,930,255 UART: [state] Locking Datavault
18,936,327 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,475 UART: [state] Locking ICCM
18,941,439 UART: [exit] Launching FMC @ 0x40000130
18,950,116 UART:
18,950,361 UART: Running Caliptra FMC ...
18,951,392 UART:
18,951,538 UART: [state] CFI Enabled
19,009,726 UART: [fht] FMC Alias Private Key: 7
20,774,049 UART: [art] Extend RT PCRs Done
20,775,266 UART: [art] Lock RT PCRs Done
20,776,917 UART: [art] Populate DV Done
20,782,186 UART: [fht] FMC Alias Private Key: 7
20,783,726 UART: [art] Derive CDI
20,784,547 UART: [art] Store in in slot 0x4
20,842,432 UART: [art] Derive Key Pair
20,843,478 UART: [art] Store priv key in slot 0x5
23,306,490 UART: [art] Derive Key Pair - Done
23,319,488 UART: [art] Signing Cert with AUTHO
23,320,792 UART: RITY.KEYID = 7
25,032,511 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,035 UART: [art] PUB.X = ED3C816D179C97EEDF606A8B34EAACD5A004EA401F24B4A596BF0D67F704770C2D11EA23FC662C8AB4756BB299551263
25,041,338 UART: [art] PUB.Y = 91E80FEFF545F46189636ED2D5E74B54755D958C071326F92082B2783509685B8CCEEC4CC1E4CE8F6378CE907F191EA7
25,048,567 UART: [art] SIG.R = E889199A7836BF9909BAADFF04BA538BDD524C1F35F154B5EE283D1690FB2F4E250727B726BE8E0D215CDF60EBA6F16D
25,055,970 UART: [art] SIG.S = 1217DC90DCC0D422359D49B89D2F40500EF861274798AF55C87B2383E13BDCD33BDDBFBD3FDB5F6FAFEC3F968881037B
26,034,667 UART: Caliptra RT
26,035,364 UART: [state] CFI Enabled
26,201,651 UART: [rt] RT listening for mailbox commands...
26,234,977 UART: [rt]cmd =0x49444543, len=327
26,244,087 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
3,437,685 ready_for_fw is high
3,438,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,752,347 >>> mbox cmd response: success
15,214,751 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,037,727 UART:
19,038,149 UART: Running Caliptra FMC ...
19,039,287 UART:
19,039,454 UART: [state] CFI Enabled
19,106,021 UART: [fht] FMC Alias Private Key: 7
20,869,916 UART: [art] Extend RT PCRs Done
20,871,143 UART: [art] Lock RT PCRs Done
20,872,674 UART: [art] Populate DV Done
20,878,011 UART: [fht] FMC Alias Private Key: 7
20,879,662 UART: [art] Derive CDI
20,880,487 UART: [art] Store in in slot 0x4
20,938,529 UART: [art] Derive Key Pair
20,939,566 UART: [art] Store priv key in slot 0x5
23,402,477 UART: [art] Derive Key Pair - Done
23,415,544 UART: [art] Signing Cert with AUTHO
23,416,880 UART: RITY.KEYID = 7
25,128,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,393 UART: [art] PUB.X = 7C3B6DB817FE5A50A0D0D71A29FCF7A3C0312AC9A506B4662B7EC25058427368EE2C1D9691A458C2767D5B554956BBD4
25,137,602 UART: [art] PUB.Y = 828577462043AEC632B2846F5B073B03B951476E173F021E860C2ED98956B4CE28CE93EA3F9C66289095DED519EF08B4
25,144,810 UART: [art] SIG.R = AED91E5EA0EF64C422F65EDFEA43F80D38D509BAB66AD21A507C5C3A8D14441C6431CCF42F6532062FB3CCDE2CFAB2D2
25,152,254 UART: [art] SIG.S = E26FC4B99EB8813B04F6D6587E2D73E7A8D6B33760C9F152E6258900FFFE64F8A64DA5157097C7FA0E26A1C5BA827361
26,131,367 UART: Caliptra RT
26,132,078 UART: [state] CFI Enabled
26,295,804 UART: [rt] RT listening for mailbox commands...
26,329,390 UART: [rt]cmd =0x49444543, len=327
26,338,329 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,445 UART:
192,797 UART: Running Caliptra ROM ...
193,893 UART:
603,493 UART: [state] CFI Enabled
618,306 UART: [state] LifecycleState = Unprovisioned
620,710 UART: [state] DebugLocked = No
622,231 UART: [state] WD Timer not started. Device not locked for debugging
626,468 UART: [kat] SHA2-256
816,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,153 UART: [kat] ++
827,672 UART: [kat] sha1
840,604 UART: [kat] SHA2-256
843,636 UART: [kat] SHA2-384
849,393 UART: [kat] SHA2-512-ACC
851,950 UART: [kat] ECC-384
3,293,668 UART: [kat] HMAC-384Kdf
3,305,963 UART: [kat] LMS
3,837,838 UART: [kat] --
3,842,185 UART: [cold-reset] ++
3,843,196 UART: [fht] FHT @ 0x50003400
3,855,237 UART: [idev] ++
3,855,865 UART: [idev] CDI.KEYID = 6
3,856,893 UART: [idev] SUBJECT.KEYID = 7
3,858,068 UART: [idev] UDS.KEYID = 0
3,858,994 ready_for_fw is high
3,859,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,786 UART: [idev] Erasing UDS.KEYID = 0
6,328,522 UART: [idev] Sha1 KeyId Algorithm
6,351,012 UART: [idev] --
6,355,443 UART: [ldev] ++
6,356,127 UART: [ldev] CDI.KEYID = 6
6,357,012 UART: [ldev] SUBJECT.KEYID = 5
6,358,173 UART: [ldev] AUTHORITY.KEYID = 7
6,359,459 UART: [ldev] FE.KEYID = 1
6,370,379 UART: [ldev] Erasing FE.KEYID = 1
8,848,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,039 UART: [ldev] --
10,640,900 UART: [fwproc] Wait for Commands...
10,643,787 UART: [fwproc] Recv command 0x46574c44
10,646,102 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,832,884 >>> mbox cmd response: success
15,294,895 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,295,932 UART: [afmc] ++
15,296,459 UART: [afmc] CDI.KEYID = 6
15,297,339 UART: [afmc] SUBJECT.KEYID = 7
15,298,400 UART: [afmc] AUTHORITY.KEYID = 5
17,344,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,130 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,789 UART: [afmc] --
19,141,469 UART: [cold-reset] --
19,144,090 UART: [state] Locking Datavault
19,149,738 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,879 UART: [state] Locking ICCM
19,154,081 UART: [exit] Launching FMC @ 0x40000130
19,162,752 UART:
19,162,985 UART: Running Caliptra FMC ...
19,164,010 UART:
19,164,158 UART: [state] CFI Enabled
19,172,515 UART: [fht] FMC Alias Private Key: 7
20,929,149 UART: [art] Extend RT PCRs Done
20,930,375 UART: [art] Lock RT PCRs Done
20,932,132 UART: [art] Populate DV Done
20,937,435 UART: [fht] FMC Alias Private Key: 7
20,938,975 UART: [art] Derive CDI
20,939,787 UART: [art] Store in in slot 0x4
20,982,591 UART: [art] Derive Key Pair
20,983,594 UART: [art] Store priv key in slot 0x5
23,410,573 UART: [art] Derive Key Pair - Done
23,423,574 UART: [art] Signing Cert with AUTHO
23,424,871 UART: RITY.KEYID = 7
25,130,380 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,884 UART: [art] PUB.X = ED908846015BDEF47A473B7AE1A97C1E044852403BAC548BF1D62169CEC904E57269E764EB41F4EA7495C49EE2BFCB4E
25,139,132 UART: [art] PUB.Y = 1EECF31772A69A1D2179739D223E42B6D23136EF428A860A4020B1F0C3408713D35FB0226C89D2C04A9CAB8EE3325DAF
25,146,424 UART: [art] SIG.R = 1EEDF606DE744DE5077E403EFA44110C8C84DA2AA7CDF78BBBCC5654F09701BF108B0C62E1B04026BE2C3482530E36F7
25,153,819 UART: [art] SIG.S = FA5FA3F6B571B066FE347404458C3F5F4D3C5C75DF1F1B7931185CD5596872BE993CC5BF8CCBC4F981502CFDF106429B
26,132,861 UART: Caliptra RT
26,133,566 UART: [state] CFI Enabled
26,250,954 UART: [rt] RT listening for mailbox commands...
26,284,457 UART: [rt]cmd =0x49444543, len=327
26,293,301 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,763,027 ready_for_fw is high
3,763,432 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,972,982 >>> mbox cmd response: success
15,436,071 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,231,781 UART:
19,232,179 UART: Running Caliptra FMC ...
19,233,322 UART:
19,233,486 UART: [state] CFI Enabled
19,241,464 UART: [fht] FMC Alias Private Key: 7
20,998,166 UART: [art] Extend RT PCRs Done
20,999,418 UART: [art] Lock RT PCRs Done
21,001,041 UART: [art] Populate DV Done
21,006,493 UART: [fht] FMC Alias Private Key: 7
21,008,089 UART: [art] Derive CDI
21,008,909 UART: [art] Store in in slot 0x4
21,051,621 UART: [art] Derive Key Pair
21,052,655 UART: [art] Store priv key in slot 0x5
23,479,147 UART: [art] Derive Key Pair - Done
23,491,989 UART: [art] Signing Cert with AUTHO
23,493,293 UART: RITY.KEYID = 7
25,198,800 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,327 UART: [art] PUB.X = E5296967A3680C320180691B54BBBC686B0C83B0D8E32C1549BAC95F65051E80629898766AC80E912502E30109369E36
25,207,512 UART: [art] PUB.Y = BC704A17D2D5984B3CD0F0C28F04928B73B89E5916150F7324EA27BDAD1E4193AECA2C4D7E3ED541D32E8F39913F68A0
25,214,760 UART: [art] SIG.R = 34DBA25085C50436D0118F795CC30F672B4BA90A8622E7B7AD84C41EDA5CBF3CA7B20A112AE7DAD76EB0F2459FFCA434
25,222,144 UART: [art] SIG.S = 97A0AC8EC707B6E5F9885450D150D21F6C0D6AE63773273C1C25171EB4E7A3A8EE66F463E62D8B9CEBEDB8B6E54EC34E
26,200,824 UART: Caliptra RT
26,201,556 UART: [state] CFI Enabled
26,318,256 UART: [rt] RT listening for mailbox commands...
26,351,778 UART: [rt]cmd =0x49444543, len=327
26,360,994 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,659 UART: [kat] SHA2-256
881,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,705 UART: [kat] ++
885,857 UART: [kat] sha1
890,117 UART: [kat] SHA2-256
892,055 UART: [kat] SHA2-384
894,882 UART: [kat] SHA2-512-ACC
896,783 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
907,122 UART: [kat] LMS
1,475,318 UART: [kat] --
1,476,067 UART: [cold-reset] ++
1,476,503 UART: [fht] Storing FHT @ 0x50003400
1,479,176 UART: [idev] ++
1,479,344 UART: [idev] CDI.KEYID = 6
1,479,704 UART: [idev] SUBJECT.KEYID = 7
1,480,128 UART: [idev] UDS.KEYID = 0
1,480,473 ready_for_fw is high
1,480,473 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,836 UART: [idev] Erasing UDS.KEYID = 0
1,504,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,160 UART: [idev] --
1,514,177 UART: [ldev] ++
1,514,345 UART: [ldev] CDI.KEYID = 6
1,514,708 UART: [ldev] SUBJECT.KEYID = 5
1,515,134 UART: [ldev] AUTHORITY.KEYID = 7
1,515,597 UART: [ldev] FE.KEYID = 1
1,520,741 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,126 UART: [ldev] --
1,585,545 UART: [fwproc] Waiting for Commands...
1,586,258 UART: [fwproc] Received command 0x46574c44
1,587,049 UART: [fwproc] Received Image of size 114360 bytes
2,885,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,203 >>> mbox cmd response: success
3,078,203 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,079,431 UART: [afmc] ++
3,079,599 UART: [afmc] CDI.KEYID = 6
3,079,961 UART: [afmc] SUBJECT.KEYID = 7
3,080,386 UART: [afmc] AUTHORITY.KEYID = 5
3,115,655 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,855 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,248 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,938 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,635 UART: [afmc] --
3,158,701 UART: [cold-reset] --
3,159,437 UART: [state] Locking Datavault
3,160,530 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,134 UART: [state] Locking ICCM
3,161,776 UART: [exit] Launching FMC @ 0x40000130
3,167,105 UART:
3,167,121 UART: Running Caliptra FMC ...
3,167,529 UART:
3,167,583 UART: [state] CFI Enabled
3,177,932 UART: [fht] FMC Alias Private Key: 7
3,285,723 UART: [art] Extend RT PCRs Done
3,286,151 UART: [art] Lock RT PCRs Done
3,287,643 UART: [art] Populate DV Done
3,295,990 UART: [fht] FMC Alias Private Key: 7
3,297,124 UART: [art] Derive CDI
3,297,404 UART: [art] Store in in slot 0x4
3,382,847 UART: [art] Derive Key Pair
3,383,207 UART: [art] Store priv key in slot 0x5
3,396,045 UART: [art] Derive Key Pair - Done
3,410,941 UART: [art] Signing Cert with AUTHO
3,411,421 UART: RITY.KEYID = 7
3,426,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,266 UART: [art] PUB.X = 7F82F63838EF80FB8B15EB007443F9A267AD64C38717A59A40BBBEC953241DB14BFEE5B91E83368988FE11B03DDD80D0
3,434,024 UART: [art] PUB.Y = FEA15B3170963408CEA00EE200CDBCB5ACF4BFA0339C6FCB6EA14C74632A3279B6367B93C7BB497076273CC6BB9C455E
3,440,962 UART: [art] SIG.R = 91F724009F0E5732A2C986F0BC1657B45A584E9081F7A146A154490EBEB7B24173A4421F560DED12DD6B69DDE2F53695
3,447,701 UART: [art] SIG.S = 074A71C9FD3FA27F2C16890A0CD3F2B68D62B501B5854B3491FABE37C009D1C761E55711B08EDFC6675175CD39CE6326
3,471,457 UART: Caliptra RT
3,471,711 UART: [state] CFI Enabled
3,579,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,163 UART: [rt]cmd =0x49444543, len=327
3,619,619 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,271 ready_for_fw is high
1,362,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,979 >>> mbox cmd response: success
2,925,979 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,987,097 UART:
2,987,113 UART: Running Caliptra FMC ...
2,987,521 UART:
2,987,575 UART: [state] CFI Enabled
2,998,028 UART: [fht] FMC Alias Private Key: 7
3,105,129 UART: [art] Extend RT PCRs Done
3,105,557 UART: [art] Lock RT PCRs Done
3,107,317 UART: [art] Populate DV Done
3,115,712 UART: [fht] FMC Alias Private Key: 7
3,116,774 UART: [art] Derive CDI
3,117,054 UART: [art] Store in in slot 0x4
3,202,771 UART: [art] Derive Key Pair
3,203,131 UART: [art] Store priv key in slot 0x5
3,216,513 UART: [art] Derive Key Pair - Done
3,231,160 UART: [art] Signing Cert with AUTHO
3,231,640 UART: RITY.KEYID = 7
3,247,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,941 UART: [art] PUB.X = D6156CFB0599F078B480411BA425AF539460B5E719D06F453634F2AED6649F64C2D755AEB3FBEEA482714F62B428FBF4
3,254,714 UART: [art] PUB.Y = DC360782C3DD643568FCDA40EDA3E066C984E130707FA393062DF7643E2F3D49C84BC678D9CFAC39173A17C0046584EB
3,261,661 UART: [art] SIG.R = E2F15EB2CCB9BD441F346ECABA270D6B7D1B246E1C49C68919B3F9B16DE03DE07364E95377B3607D14BC12AB35ADA4E0
3,268,446 UART: [art] SIG.S = 6F5BF7B32CFAC3E14C08CAAD77C6B566665A2CC55482A6EBFC35376E3CE6336D36BEE0D3C02FCB8EEC5477AA3CB6DD14
3,292,126 UART: Caliptra RT
3,292,380 UART: [state] CFI Enabled
3,400,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,258 UART: [rt]cmd =0x49444543, len=327
3,440,688 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,604 UART: [kat] SHA2-256
892,542 UART: [kat] SHA2-384
895,359 UART: [kat] SHA2-512-ACC
897,260 UART: [kat] ECC-384
902,657 UART: [kat] HMAC-384Kdf
907,501 UART: [kat] LMS
1,475,697 UART: [kat] --
1,476,488 UART: [cold-reset] ++
1,477,040 UART: [fht] Storing FHT @ 0x50003400
1,479,703 UART: [idev] ++
1,479,871 UART: [idev] CDI.KEYID = 6
1,480,231 UART: [idev] SUBJECT.KEYID = 7
1,480,655 UART: [idev] UDS.KEYID = 0
1,481,000 ready_for_fw is high
1,481,000 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,493 UART: [idev] Erasing UDS.KEYID = 0
1,504,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,559 UART: [idev] --
1,514,634 UART: [ldev] ++
1,514,802 UART: [ldev] CDI.KEYID = 6
1,515,165 UART: [ldev] SUBJECT.KEYID = 5
1,515,591 UART: [ldev] AUTHORITY.KEYID = 7
1,516,054 UART: [ldev] FE.KEYID = 1
1,521,118 UART: [ldev] Erasing FE.KEYID = 1
1,547,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,167 UART: [ldev] --
1,586,580 UART: [fwproc] Waiting for Commands...
1,587,295 UART: [fwproc] Received command 0x46574c44
1,588,086 UART: [fwproc] Received Image of size 114360 bytes
2,885,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,735 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,112 >>> mbox cmd response: success
3,079,112 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,080,140 UART: [afmc] ++
3,080,308 UART: [afmc] CDI.KEYID = 6
3,080,670 UART: [afmc] SUBJECT.KEYID = 7
3,081,095 UART: [afmc] AUTHORITY.KEYID = 5
3,116,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,639 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,329 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,024 UART: [afmc] --
3,159,918 UART: [cold-reset] --
3,160,788 UART: [state] Locking Datavault
3,161,869 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,473 UART: [state] Locking ICCM
3,162,933 UART: [exit] Launching FMC @ 0x40000130
3,168,262 UART:
3,168,278 UART: Running Caliptra FMC ...
3,168,686 UART:
3,168,829 UART: [state] CFI Enabled
3,179,316 UART: [fht] FMC Alias Private Key: 7
3,287,693 UART: [art] Extend RT PCRs Done
3,288,121 UART: [art] Lock RT PCRs Done
3,289,327 UART: [art] Populate DV Done
3,297,380 UART: [fht] FMC Alias Private Key: 7
3,298,552 UART: [art] Derive CDI
3,298,832 UART: [art] Store in in slot 0x4
3,384,929 UART: [art] Derive Key Pair
3,385,289 UART: [art] Store priv key in slot 0x5
3,398,601 UART: [art] Derive Key Pair - Done
3,413,379 UART: [art] Signing Cert with AUTHO
3,413,859 UART: RITY.KEYID = 7
3,428,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,656 UART: [art] PUB.X = F9CDCFEA989D025560B1434AB42DAF22C4F3E372BE46B0A4FC16A51EEFA66828202F270919920B8B4DB938F6E25C78B5
3,436,429 UART: [art] PUB.Y = BE73F52F8FE167307174AB72E3C5D2FB6A7D5BAABFA6273F7B1AC4C03885F556A914F6EA3481ED3682CEEF49FDFCED4C
3,443,405 UART: [art] SIG.R = B1D05E398649D5ECABB111810A6A2D82BC3669EC146C400E50FAC14C142409BDCEFCCA9911F191398390AE9BB393887C
3,450,176 UART: [art] SIG.S = 99449C60F4AE7A923EF505A932EF0CCF4EE25D4831756F683F2411C715DBA7D61FC61D9A6842497E6ED0729459005867
3,473,869 UART: Caliptra RT
3,474,215 UART: [state] CFI Enabled
3,583,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,568 UART: [rt]cmd =0x49444543, len=327
3,623,895 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,240 ready_for_fw is high
1,363,240 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,374 >>> mbox cmd response: success
2,928,374 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,990,194 UART:
2,990,210 UART: Running Caliptra FMC ...
2,990,618 UART:
2,990,761 UART: [state] CFI Enabled
3,002,032 UART: [fht] FMC Alias Private Key: 7
3,110,029 UART: [art] Extend RT PCRs Done
3,110,457 UART: [art] Lock RT PCRs Done
3,111,903 UART: [art] Populate DV Done
3,120,030 UART: [fht] FMC Alias Private Key: 7
3,121,096 UART: [art] Derive CDI
3,121,376 UART: [art] Store in in slot 0x4
3,206,841 UART: [art] Derive Key Pair
3,207,201 UART: [art] Store priv key in slot 0x5
3,220,403 UART: [art] Derive Key Pair - Done
3,235,376 UART: [art] Signing Cert with AUTHO
3,235,856 UART: RITY.KEYID = 7
3,251,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,429 UART: [art] PUB.X = 0944FA56AFBB04E6D83456F1135C39290F907BFA4BE3398F6BE8800EF350772F5B6D1057824378F9B8F0ECD78BBF1E50
3,259,193 UART: [art] PUB.Y = 496E55D2E6CF9D6B6C066FB713D51E79C3B2E8D0032F1E365C9FA84F57BFF7754FB02D5823AFA39A0DBC4B1706743E9F
3,266,145 UART: [art] SIG.R = 9A357FA0903B7F86B14038A5CB93FCD09FCD40C5629C8F07C3BE5631439BFA6E7B842632CD730C4C7632AA6B99FB808C
3,272,919 UART: [art] SIG.S = EC3102783A4B5F1917D713F46D106034B3D2929E3E3B1D54FDF1F371FCF6B6DFF5F8630F8E22531041F1953D6BD6A2A0
3,296,510 UART: Caliptra RT
3,296,856 UART: [state] CFI Enabled
3,404,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,279 UART: [rt]cmd =0x49444543, len=327
3,445,567 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,110 UART: [kat] SHA2-256
893,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,885 UART: [kat] ++
898,037 UART: [kat] sha1
902,173 UART: [kat] SHA2-256
904,113 UART: [kat] SHA2-384
906,924 UART: [kat] SHA2-512-ACC
908,825 UART: [kat] ECC-384
919,070 UART: [kat] HMAC-384Kdf
923,682 UART: [kat] LMS
1,172,010 UART: [kat] --
1,172,877 UART: [cold-reset] ++
1,173,417 UART: [fht] FHT @ 0x50003400
1,176,250 UART: [idev] ++
1,176,418 UART: [idev] CDI.KEYID = 6
1,176,778 UART: [idev] SUBJECT.KEYID = 7
1,177,202 UART: [idev] UDS.KEYID = 0
1,177,547 ready_for_fw is high
1,177,547 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,364 UART: [idev] Erasing UDS.KEYID = 0
1,202,011 UART: [idev] Sha1 KeyId Algorithm
1,210,553 UART: [idev] --
1,211,407 UART: [ldev] ++
1,211,575 UART: [ldev] CDI.KEYID = 6
1,211,938 UART: [ldev] SUBJECT.KEYID = 5
1,212,364 UART: [ldev] AUTHORITY.KEYID = 7
1,212,827 UART: [ldev] FE.KEYID = 1
1,217,851 UART: [ldev] Erasing FE.KEYID = 1
1,244,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,215 UART: [ldev] --
1,283,670 UART: [fwproc] Wait for Commands...
1,284,370 UART: [fwproc] Recv command 0x46574c44
1,285,098 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,600 >>> mbox cmd response: success
2,773,600 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,764 UART: [afmc] ++
2,774,932 UART: [afmc] CDI.KEYID = 6
2,775,294 UART: [afmc] SUBJECT.KEYID = 7
2,775,719 UART: [afmc] AUTHORITY.KEYID = 5
2,810,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,335 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,299 UART: [afmc] --
2,854,367 UART: [cold-reset] --
2,855,313 UART: [state] Locking Datavault
2,856,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,154 UART: [state] Locking ICCM
2,857,764 UART: [exit] Launching FMC @ 0x40000130
2,863,093 UART:
2,863,109 UART: Running Caliptra FMC ...
2,863,517 UART:
2,863,571 UART: [state] CFI Enabled
2,873,898 UART: [fht] FMC Alias Private Key: 7
2,981,877 UART: [art] Extend RT PCRs Done
2,982,305 UART: [art] Lock RT PCRs Done
2,983,789 UART: [art] Populate DV Done
2,992,008 UART: [fht] FMC Alias Private Key: 7
2,993,184 UART: [art] Derive CDI
2,993,464 UART: [art] Store in in slot 0x4
3,079,111 UART: [art] Derive Key Pair
3,079,471 UART: [art] Store priv key in slot 0x5
3,092,439 UART: [art] Derive Key Pair - Done
3,106,983 UART: [art] Signing Cert with AUTHO
3,107,463 UART: RITY.KEYID = 7
3,122,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,724 UART: [art] PUB.X = 7A5F74834985DEA37F6BECE7DF94F3E33B16BFF602852E7A9F2FE3B5D60CC7635375EECB4CCA35A0A0104C2A3F9C9EB0
3,130,510 UART: [art] PUB.Y = F3D477E8D4D0692126CE0CE4B11C24B6C7DD6D18E81CDE4B6746057B9E08BBDE513914556E584E70F90F89A7741CE0E3
3,137,456 UART: [art] SIG.R = 2CCCBBC4C2238B01BC4C61656604A464A378D11839DD5C759A5C332CA851D0B3183920ADD04069A15CEFFFBA3193261D
3,144,228 UART: [art] SIG.S = B92F5E4B47938F9352F239BD1C1FF2A63DD84298A3D3906E663A197B86AC65254A9B2795F84644C2EC1DF086267311DA
3,167,647 UART: Caliptra RT
3,167,901 UART: [state] CFI Enabled
3,275,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,393 UART: [rt]cmd =0x49444543, len=327
3,316,743 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,513 ready_for_fw is high
1,059,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,581 >>> mbox cmd response: success
2,624,581 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,686,795 UART:
2,686,811 UART: Running Caliptra FMC ...
2,687,219 UART:
2,687,273 UART: [state] CFI Enabled
2,697,580 UART: [fht] FMC Alias Private Key: 7
2,805,947 UART: [art] Extend RT PCRs Done
2,806,375 UART: [art] Lock RT PCRs Done
2,807,923 UART: [art] Populate DV Done
2,816,030 UART: [fht] FMC Alias Private Key: 7
2,817,156 UART: [art] Derive CDI
2,817,436 UART: [art] Store in in slot 0x4
2,902,885 UART: [art] Derive Key Pair
2,903,245 UART: [art] Store priv key in slot 0x5
2,916,755 UART: [art] Derive Key Pair - Done
2,931,624 UART: [art] Signing Cert with AUTHO
2,932,104 UART: RITY.KEYID = 7
2,947,408 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,173 UART: [art] PUB.X = 906624263041EF52542A29B0E5AF076D90303213D6035D9814796AC41FB1BAD9EA6AD9E3AEC46835263CD392E7C4799B
2,954,935 UART: [art] PUB.Y = 1B084509183CC269FCD235B85C60F38B6E26C7D90A8B94F566D2EF646EE70F828DB7425F0B79F654533B3B9DEC90B39C
2,961,876 UART: [art] SIG.R = 9411D3633A94C55D96E1FFBD306E39185C408BF9D7247BD00DF747ECB165EB325DF3EBAD5FCEC88A3C96D2C40435F2FC
2,968,658 UART: [art] SIG.S = ED6923FE3B67B1039C99E783688DAE18ADB8A3D0B3E2931741C6E03596263D8A7CAF47536ECAEF04993BAC4AE8117043
2,992,189 UART: Caliptra RT
2,992,443 UART: [state] CFI Enabled
3,099,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,862 UART: [rt]cmd =0x49444543, len=327
3,140,520 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
918,571 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,666 UART: [cold-reset] ++
1,173,240 UART: [fht] FHT @ 0x50003400
1,176,059 UART: [idev] ++
1,176,227 UART: [idev] CDI.KEYID = 6
1,176,587 UART: [idev] SUBJECT.KEYID = 7
1,177,011 UART: [idev] UDS.KEYID = 0
1,177,356 ready_for_fw is high
1,177,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,977 UART: [idev] Erasing UDS.KEYID = 0
1,202,598 UART: [idev] Sha1 KeyId Algorithm
1,211,078 UART: [idev] --
1,212,034 UART: [ldev] ++
1,212,202 UART: [ldev] CDI.KEYID = 6
1,212,565 UART: [ldev] SUBJECT.KEYID = 5
1,212,991 UART: [ldev] AUTHORITY.KEYID = 7
1,213,454 UART: [ldev] FE.KEYID = 1
1,218,664 UART: [ldev] Erasing FE.KEYID = 1
1,244,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,734 UART: [ldev] --
1,284,173 UART: [fwproc] Wait for Commands...
1,284,791 UART: [fwproc] Recv command 0x46574c44
1,285,519 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,181 >>> mbox cmd response: success
2,776,181 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,777,369 UART: [afmc] ++
2,777,537 UART: [afmc] CDI.KEYID = 6
2,777,899 UART: [afmc] SUBJECT.KEYID = 7
2,778,324 UART: [afmc] AUTHORITY.KEYID = 5
2,813,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,704 UART: [afmc] --
2,857,788 UART: [cold-reset] --
2,858,414 UART: [state] Locking Datavault
2,859,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,127 UART: [state] Locking ICCM
2,860,589 UART: [exit] Launching FMC @ 0x40000130
2,865,918 UART:
2,865,934 UART: Running Caliptra FMC ...
2,866,342 UART:
2,866,485 UART: [state] CFI Enabled
2,876,940 UART: [fht] FMC Alias Private Key: 7
2,986,039 UART: [art] Extend RT PCRs Done
2,986,467 UART: [art] Lock RT PCRs Done
2,987,793 UART: [art] Populate DV Done
2,996,072 UART: [fht] FMC Alias Private Key: 7
2,997,214 UART: [art] Derive CDI
2,997,494 UART: [art] Store in in slot 0x4
3,083,071 UART: [art] Derive Key Pair
3,083,431 UART: [art] Store priv key in slot 0x5
3,096,789 UART: [art] Derive Key Pair - Done
3,111,453 UART: [art] Signing Cert with AUTHO
3,111,933 UART: RITY.KEYID = 7
3,127,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,012 UART: [art] PUB.X = FDE2F673B28B6A0DABEBC62901BDF5EE664654F22FF0C73662E48FB647859FE181F82FB5FE9E725C3FB3F0AD75166AD3
3,134,796 UART: [art] PUB.Y = CAF075C0845567B127203FAAC3521A881E983508C8FCC68075A6FCC3F720D48581782BC5DACEBFE42E3F87947E157D22
3,141,749 UART: [art] SIG.R = 3F18F0379D211B18DAEC17894F57E2A41C6A1CB91BB80A1EB46B795BF282A934F2DD487C29C9B4CAC092BD92EC3EDA46
3,148,534 UART: [art] SIG.S = 9F9283A01D3EF34B984D890451ADBD2999CFAE1E5636DA3CA5DDB67997FE0AA78ACF43D559453C915EE6A4B426AAC0CB
3,171,927 UART: Caliptra RT
3,172,273 UART: [state] CFI Enabled
3,279,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,309 UART: [rt]cmd =0x49444543, len=327
3,320,761 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,328 ready_for_fw is high
1,061,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,830 >>> mbox cmd response: success
2,625,830 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,688,512 UART:
2,688,528 UART: Running Caliptra FMC ...
2,688,936 UART:
2,689,079 UART: [state] CFI Enabled
2,699,662 UART: [fht] FMC Alias Private Key: 7
2,807,777 UART: [art] Extend RT PCRs Done
2,808,205 UART: [art] Lock RT PCRs Done
2,809,659 UART: [art] Populate DV Done
2,817,818 UART: [fht] FMC Alias Private Key: 7
2,818,776 UART: [art] Derive CDI
2,819,056 UART: [art] Store in in slot 0x4
2,904,921 UART: [art] Derive Key Pair
2,905,281 UART: [art] Store priv key in slot 0x5
2,918,029 UART: [art] Derive Key Pair - Done
2,932,931 UART: [art] Signing Cert with AUTHO
2,933,411 UART: RITY.KEYID = 7
2,948,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,048 UART: [art] PUB.X = CC5C8C919D7152F7D5A78113E44F8C5EC628FF59149BF65FE99B4DD74D55F730910FF1B45F810931613E0F5159DC1464
2,955,811 UART: [art] PUB.Y = F86357B7A45E8485989229602350098B0031EF4762672AF962606DB568175892E109AC17834E8B65C15C999BE4A24D6B
2,962,717 UART: [art] SIG.R = 39FA3329C0D1BF66BD335EFE5B2C88B29EE77F197313B6374BB45D403056295469D84B60D6224DEB10EA48CFFFFA51B0
2,969,497 UART: [art] SIG.S = 1855A4386AB48E9D63B930DB0A1B3B0DAE76AC48EA6E0B664402E186E1ACF0B59A9159CBEB2D6E2A2F0D94037858671F
2,993,364 UART: Caliptra RT
2,993,710 UART: [state] CFI Enabled
3,100,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,886 UART: [rt]cmd =0x49444543, len=327
3,141,368 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,174,095 ready_for_fw is high
1,174,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,471 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,214,984 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,942 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,634 >>> mbox cmd response: success
2,772,634 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,773,763 UART: [afmc] ++
2,773,931 UART: [afmc] CDI.KEYID = 6
2,774,294 UART: [afmc] SUBJECT.KEYID = 7
2,774,720 UART: [afmc] AUTHORITY.KEYID = 5
2,810,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,286 UART: [afmc] --
2,854,316 UART: [cold-reset] --
2,855,166 UART: [state] Locking Datavault
2,856,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,755 UART: [state] Locking ICCM
2,857,329 UART: [exit] Launching FMC @ 0x40000130
2,862,658 UART:
2,862,674 UART: Running Caliptra FMC ...
2,863,082 UART:
2,863,136 UART: [state] CFI Enabled
2,873,539 UART: [fht] FMC Alias Private Key: 7
2,981,328 UART: [art] Extend RT PCRs Done
2,981,756 UART: [art] Lock RT PCRs Done
2,983,206 UART: [art] Populate DV Done
2,991,661 UART: [fht] FMC Alias Private Key: 7
2,992,627 UART: [art] Derive CDI
2,992,907 UART: [art] Store in in slot 0x4
3,078,688 UART: [art] Derive Key Pair
3,079,048 UART: [art] Store priv key in slot 0x5
3,092,696 UART: [art] Derive Key Pair - Done
3,107,515 UART: [art] Signing Cert with AUTHO
3,107,995 UART: RITY.KEYID = 7
3,123,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,020 UART: [art] PUB.X = D300E44BB437ED9743C4381C92F7B3C0EE2BBAE50371A8B23647580932A1A860CB40CAF64964F086B8F0451E8C146EFE
3,130,768 UART: [art] PUB.Y = 094642C54B12D543B4E8527C8DABF7D1F1B56E1BB12D81232BF78FE4627714391567453A0E30CCCAE26BAE9DC154CAEA
3,137,724 UART: [art] SIG.R = 2A37C13C48D93DF6286CA20C94B9D78291EA6620583F3C1C1F1D218395DFD1468EF5CFD5C4C465A0A6178D6568F2B974
3,144,495 UART: [art] SIG.S = F9C24818D8009DE7D605330004C23CADFB251D2A932CC931A10FD2E5515A60CA3C38D89797D686E08CA622E5C9504856
3,168,905 UART: Caliptra RT
3,169,159 UART: [state] CFI Enabled
3,275,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,249 UART: [rt]cmd =0x49444543, len=327
3,316,689 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 ready_for_fw is high
1,056,156 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,434 >>> mbox cmd response: success
2,622,434 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,683,376 UART:
2,683,392 UART: Running Caliptra FMC ...
2,683,800 UART:
2,683,854 UART: [state] CFI Enabled
2,694,507 UART: [fht] FMC Alias Private Key: 7
2,802,240 UART: [art] Extend RT PCRs Done
2,802,668 UART: [art] Lock RT PCRs Done
2,804,444 UART: [art] Populate DV Done
2,812,691 UART: [fht] FMC Alias Private Key: 7
2,813,739 UART: [art] Derive CDI
2,814,019 UART: [art] Store in in slot 0x4
2,899,474 UART: [art] Derive Key Pair
2,899,834 UART: [art] Store priv key in slot 0x5
2,912,970 UART: [art] Derive Key Pair - Done
2,927,432 UART: [art] Signing Cert with AUTHO
2,927,912 UART: RITY.KEYID = 7
2,943,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,949 UART: [art] PUB.X = 5C5A7BFA82667D0C359C1ECFB8677FFEF18EF4C33CF052CF3844CA82407CB01B4EDE1ACF5E98D28D88AB959DC5075621
2,950,733 UART: [art] PUB.Y = A07B031D6881CD6B0698B35995B790B59C75CEDEC87D714167721D64632FEB3F02EB3A702286AED5160EDBD3A4741AD9
2,957,677 UART: [art] SIG.R = 8E8CDE24847E3C5D67C36B27A7C8080F482F87D298902A563CFB6AD585A3019803B6729CA5CB74D6C1E70618E6DA5FA9
2,964,438 UART: [art] SIG.S = C8B91A411B9EC3CE8AE68DDCA7324722D7B136653C820DF6B8906DF8999B96045FD756B2B29F02312665DCEE3B44A999
2,988,280 UART: Caliptra RT
2,988,534 UART: [state] CFI Enabled
3,095,369 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,621 UART: [rt]cmd =0x49444543, len=327
3,136,103 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,650 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,174,554 ready_for_fw is high
1,174,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,863 UART: [fwproc] Wait for Commands...
1,282,552 UART: [fwproc] Recv command 0x46574c44
1,283,285 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,199 >>> mbox cmd response: success
2,773,199 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,774,416 UART: [afmc] ++
2,774,584 UART: [afmc] CDI.KEYID = 6
2,774,947 UART: [afmc] SUBJECT.KEYID = 7
2,775,373 UART: [afmc] AUTHORITY.KEYID = 5
2,811,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,671 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,283 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,002 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,847 UART: [afmc] --
2,854,973 UART: [cold-reset] --
2,855,919 UART: [state] Locking Datavault
2,857,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,740 UART: [state] Locking ICCM
2,858,282 UART: [exit] Launching FMC @ 0x40000130
2,863,611 UART:
2,863,627 UART: Running Caliptra FMC ...
2,864,035 UART:
2,864,178 UART: [state] CFI Enabled
2,875,283 UART: [fht] FMC Alias Private Key: 7
2,984,128 UART: [art] Extend RT PCRs Done
2,984,556 UART: [art] Lock RT PCRs Done
2,986,224 UART: [art] Populate DV Done
2,994,421 UART: [fht] FMC Alias Private Key: 7
2,995,357 UART: [art] Derive CDI
2,995,637 UART: [art] Store in in slot 0x4
3,081,186 UART: [art] Derive Key Pair
3,081,546 UART: [art] Store priv key in slot 0x5
3,094,926 UART: [art] Derive Key Pair - Done
3,109,778 UART: [art] Signing Cert with AUTHO
3,110,258 UART: RITY.KEYID = 7
3,125,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,253 UART: [art] PUB.X = D8FAFB99EED3606BE63DA3C127CFDE7BEB3C3CDEE31C4B292B06C78899C921715D97F3BC2B6F663E2058695A65E13090
3,133,036 UART: [art] PUB.Y = F62AE493B73D37FE27DB255A8CC34E2A2180E8EC9F3C2BDB2C5F3344CD7981BFFEDBF27CA1506AD721E3C72F945E23A7
3,140,008 UART: [art] SIG.R = E4B2313A1FAED6B811B3EAB5B40B2E3FD64F8799BE5A67DCCE8481A793767864EB748EB16C24A5FEED30255CD97EE1E0
3,146,795 UART: [art] SIG.S = DFBC2ED888FAFD088A4C55316814D45FC6467E8BD1C8D8A16940242FAC5A18E559DAC23D7E96250254030AABB8C226A3
3,171,090 UART: Caliptra RT
3,171,436 UART: [state] CFI Enabled
3,279,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,153 UART: [rt]cmd =0x49444543, len=327
3,320,841 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,743 ready_for_fw is high
1,055,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,235 >>> mbox cmd response: success
2,622,235 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,684,501 UART:
2,684,517 UART: Running Caliptra FMC ...
2,684,925 UART:
2,685,068 UART: [state] CFI Enabled
2,696,011 UART: [fht] FMC Alias Private Key: 7
2,804,754 UART: [art] Extend RT PCRs Done
2,805,182 UART: [art] Lock RT PCRs Done
2,806,956 UART: [art] Populate DV Done
2,815,049 UART: [fht] FMC Alias Private Key: 7
2,816,099 UART: [art] Derive CDI
2,816,379 UART: [art] Store in in slot 0x4
2,902,142 UART: [art] Derive Key Pair
2,902,502 UART: [art] Store priv key in slot 0x5
2,915,762 UART: [art] Derive Key Pair - Done
2,930,609 UART: [art] Signing Cert with AUTHO
2,931,089 UART: RITY.KEYID = 7
2,946,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,856 UART: [art] PUB.X = 1CF42A926074D13B5F16A447165BFE9135B25A5286251878F547FA7C853F33F5ADBE37023CD5B7766D17AD10EDEA8B2A
2,953,629 UART: [art] PUB.Y = 1570ACDEEF289C70415720474D3805F67151EC936631400D2CED7528BDB9F87A15FC157DEFD38B9804B9B1EF0197BBE3
2,960,573 UART: [art] SIG.R = 118D5ACAD131326A38F8DC84C354F0E134B978A6FF720CAA97BAE7AAD530C4E8B642EDA86C1787B561C2EBE035636213
2,967,352 UART: [art] SIG.S = CB36BD8F610E6AD9989AF026795F676A13C0DA1E3F6D8FEE4DFB1A254E29B822C4DDC4DAACF4FA5C81B54F322396EC52
2,991,796 UART: Caliptra RT
2,992,142 UART: [state] CFI Enabled
3,099,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,882 UART: [rt]cmd =0x49444543, len=327
3,140,153 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,412 UART:
192,785 UART: Running Caliptra ROM ...
193,980 UART:
194,163 UART: [state] CFI Enabled
261,853 UART: [state] LifecycleState = Unprovisioned
263,824 UART: [state] DebugLocked = No
266,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,708 UART: [kat] SHA2-256
440,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,982 UART: [kat] ++
451,422 UART: [kat] sha1
462,712 UART: [kat] SHA2-256
465,426 UART: [kat] SHA2-384
471,487 UART: [kat] SHA2-512-ACC
473,846 UART: [kat] ECC-384
2,766,353 UART: [kat] HMAC-384Kdf
2,779,088 UART: [kat] LMS
3,969,377 UART: [kat] --
3,973,959 UART: [cold-reset] ++
3,976,262 UART: [fht] Storing FHT @ 0x50003400
3,988,295 UART: [idev] ++
3,988,854 UART: [idev] CDI.KEYID = 6
3,989,802 UART: [idev] SUBJECT.KEYID = 7
3,991,037 UART: [idev] UDS.KEYID = 0
3,992,000 ready_for_fw is high
3,992,191 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,602 UART: [idev] Erasing UDS.KEYID = 0
7,324,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,960 UART: [idev] --
7,348,977 UART: [ldev] ++
7,349,540 UART: [ldev] CDI.KEYID = 6
7,350,467 UART: [ldev] SUBJECT.KEYID = 5
7,351,682 UART: [ldev] AUTHORITY.KEYID = 7
7,352,873 UART: [ldev] FE.KEYID = 1
7,401,364 UART: [ldev] Erasing FE.KEYID = 1
10,733,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,305 UART: [ldev] --
13,095,137 UART: [fwproc] Waiting for Commands...
13,098,087 UART: [fwproc] Received command 0x46574c44
13,100,259 UART: [fwproc] Received Image of size 114036 bytes
17,149,305 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,223,196 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,608,491 >>> mbox cmd response: success
17,609,002 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,611,834 UART: [afmc] ++
17,612,410 UART: [afmc] CDI.KEYID = 6
17,613,338 UART: [afmc] SUBJECT.KEYID = 7
17,614,544 UART: [afmc] AUTHORITY.KEYID = 5
20,998,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,298,021 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,300,315 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,314,734 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,329,568 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,950 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,364,419 UART: [afmc] --
23,368,881 UART: [cold-reset] --
23,372,363 UART: [state] Locking Datavault
23,376,251 UART: [state] Locking PCR0, PCR1 and PCR31
23,377,996 UART: [state] Locking ICCM
23,380,297 UART: [exit] Launching FMC @ 0x40000130
23,388,677 UART:
23,388,916 UART: Running Caliptra FMC ...
23,390,028 UART:
23,390,184 UART: [state] CFI Enabled
23,456,247 UART: [fht] FMC Alias Private Key: 7
25,794,755 UART: [art] Extend RT PCRs Done
25,795,975 UART: [art] Lock RT PCRs Done
25,797,427 UART: [art] Populate DV Done
25,802,880 UART: [fht] FMC Alias Private Key: 7
25,804,515 UART: [art] Derive CDI
25,805,318 UART: [art] Store in in slot 0x4
25,864,928 UART: [art] Derive Key Pair
25,865,961 UART: [art] Store priv key in slot 0x5
29,158,716 UART: [art] Derive Key Pair - Done
29,171,439 UART: [art] Signing Cert with AUTHO
29,172,732 UART: RITY.KEYID = 7
31,460,847 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,356 UART: [art] PUB.X = 5312B3DACDE0013CEE837BCF18DE0B5ECF7B880CF1DA39E76076ACF341CE20D3C8BB0BFDE3D3D2B3673A3818FDD3146E
31,469,612 UART: [art] PUB.Y = 5DB6C734C490CC36672BB82A173094750CA454127D4AD7263DD8E75D473EBC1FCEF46BDFBF7805E5D63458734A7CACBE
31,476,890 UART: [art] SIG.R = AA1173DE57D1FDABA461BD562DCC84AEACB2D789094D06C7B96D727BA129C3F97271E0B8C61FAD99CF62D846F5E4A9DE
31,484,278 UART: [art] SIG.S = A8EB86494E3EED39B41D57C8F178D9E8666C3D1EDFCD16009A1D063E0656430F1DF14C93792602907C23F6D73AB2C5E1
32,789,385 UART: Caliptra RT
32,790,099 UART: [state] CFI Enabled
32,952,819 UART: [rt] RT listening for mailbox commands...
32,983,787 UART: [rt]cmd =0x4c444556, len=4
32,994,740 >>> mbox cmd response data (687 bytes)
33,035,488 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,065,756 UART: [rt]cmd =0x49444549, len=4
33,068,591 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,808,692 ready_for_fw is high
3,809,238 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,896,017 >>> mbox cmd response: success
17,896,663 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,584,726 UART:
23,585,107 UART: Running Caliptra FMC ...
23,586,195 UART:
23,586,341 UART: [state] CFI Enabled
23,655,704 UART: [fht] FMC Alias Private Key: 7
25,993,683 UART: [art] Extend RT PCRs Done
25,994,898 UART: [art] Lock RT PCRs Done
25,996,690 UART: [art] Populate DV Done
26,002,212 UART: [fht] FMC Alias Private Key: 7
26,003,803 UART: [art] Derive CDI
26,004,541 UART: [art] Store in in slot 0x4
26,064,794 UART: [art] Derive Key Pair
26,065,826 UART: [art] Store priv key in slot 0x5
29,358,366 UART: [art] Derive Key Pair - Done
29,371,631 UART: [art] Signing Cert with AUTHO
29,372,935 UART: RITY.KEYID = 7
31,660,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,842 UART: [art] PUB.X = 80991583EE44DFEBD5D7A9D4A7EE2BBBD9698D4D1BE555538BC1102E48FEC536350B8B5B49ACC14F647CDE1DDF837480
31,669,070 UART: [art] PUB.Y = E80F9FBDC866B413FCF8D5217BB223E1D9B03C4151CEED3D00589D378AD6C1AA08B01EC7EB49CC22FF706BD4C0C51EB3
31,676,351 UART: [art] SIG.R = 30BEDB3E39922875A26F79F693FF69FAC90DB46AEFEACE5A018EBA3CB035ED3F50685123BAAAE66D1AB93A605C3B4880
31,683,780 UART: [art] SIG.S = D98B25583DB35A8B1022A6E9BA06648BD3A575AB0593B3DA3E3BE29016DFEB8150E4365B7528116B29653F7F4CFE284B
32,989,013 UART: Caliptra RT
32,989,723 UART: [state] CFI Enabled
33,151,459 UART: [rt] RT listening for mailbox commands...
33,182,700 UART: [rt]cmd =0x4c444556, len=4
33,193,814 >>> mbox cmd response data (687 bytes)
33,234,742 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,264,681 UART: [rt]cmd =0x49444549, len=4
33,267,299 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,424 UART:
192,786 UART: Running Caliptra ROM ...
193,975 UART:
603,623 UART: [state] CFI Enabled
618,782 UART: [state] LifecycleState = Unprovisioned
620,726 UART: [state] DebugLocked = No
622,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,620 UART: [kat] SHA2-256
797,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,963 UART: [kat] ++
808,415 UART: [kat] sha1
820,566 UART: [kat] SHA2-256
823,289 UART: [kat] SHA2-384
829,508 UART: [kat] SHA2-512-ACC
831,877 UART: [kat] ECC-384
3,116,252 UART: [kat] HMAC-384Kdf
3,129,471 UART: [kat] LMS
4,319,556 UART: [kat] --
4,323,072 UART: [cold-reset] ++
4,325,432 UART: [fht] Storing FHT @ 0x50003400
4,337,263 UART: [idev] ++
4,337,903 UART: [idev] CDI.KEYID = 6
4,338,963 UART: [idev] SUBJECT.KEYID = 7
4,340,073 UART: [idev] UDS.KEYID = 0
4,341,118 ready_for_fw is high
4,341,318 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,544 UART: [idev] Erasing UDS.KEYID = 0
7,623,265 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,616 UART: [idev] --
7,649,844 UART: [ldev] ++
7,650,416 UART: [ldev] CDI.KEYID = 6
7,651,385 UART: [ldev] SUBJECT.KEYID = 5
7,652,595 UART: [ldev] AUTHORITY.KEYID = 7
7,653,880 UART: [ldev] FE.KEYID = 1
7,664,178 UART: [ldev] Erasing FE.KEYID = 1
10,953,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,122 UART: [ldev] --
13,316,060 UART: [fwproc] Waiting for Commands...
13,317,830 UART: [fwproc] Received command 0x46574c44
13,320,010 UART: [fwproc] Received Image of size 114036 bytes
17,367,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,470 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,917 >>> mbox cmd response: success
17,832,450 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,835,244 UART: [afmc] ++
17,835,825 UART: [afmc] CDI.KEYID = 6
17,836,788 UART: [afmc] SUBJECT.KEYID = 7
17,837,999 UART: [afmc] AUTHORITY.KEYID = 5
21,151,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,468 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,823 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,698 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,088 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,060 UART: [afmc] --
23,516,208 UART: [cold-reset] --
23,519,551 UART: [state] Locking Datavault
23,526,094 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,855 UART: [state] Locking ICCM
23,529,191 UART: [exit] Launching FMC @ 0x40000130
23,537,584 UART:
23,537,818 UART: Running Caliptra FMC ...
23,538,977 UART:
23,539,142 UART: [state] CFI Enabled
23,546,871 UART: [fht] FMC Alias Private Key: 7
25,877,519 UART: [art] Extend RT PCRs Done
25,878,740 UART: [art] Lock RT PCRs Done
25,880,144 UART: [art] Populate DV Done
25,885,390 UART: [fht] FMC Alias Private Key: 7
25,886,869 UART: [art] Derive CDI
25,887,604 UART: [art] Store in in slot 0x4
25,930,196 UART: [art] Derive Key Pair
25,931,251 UART: [art] Store priv key in slot 0x5
29,173,597 UART: [art] Derive Key Pair - Done
29,186,872 UART: [art] Signing Cert with AUTHO
29,188,176 UART: RITY.KEYID = 7
31,467,526 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,036 UART: [art] PUB.X = BE9B42696D42319C390DDBCD7D3CC6FA5867857A3455F8BB93A46DA638711473205A4BC72F711FC17D69DA16C5E7ED2E
31,476,283 UART: [art] PUB.Y = AF694F7BD08AC30675B4F8BD401CE4D1533C49D5998FF7EDBF550991BC6B1C9E35D3ABED063119495BD5E271B6DC170B
31,483,502 UART: [art] SIG.R = D3E80509FF7EFD67C361EF46B8A8C36B1937C781D083BCC3049909B438022E4027B0324EC4D19DAF8303E94961FBBD5F
31,490,879 UART: [art] SIG.S = 2B0B0138056AF0EF95DB0FAC66BDF2592548CC89166406C097DBA0BC1783B34817BB3282CE0E8E0F6023F54DD407FA47
32,796,514 UART: Caliptra RT
32,797,216 UART: [state] CFI Enabled
32,915,140 UART: [rt] RT listening for mailbox commands...
32,946,387 UART: [rt]cmd =0x4c444556, len=4
32,957,626 >>> mbox cmd response data (687 bytes)
32,998,827 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,028,609 UART: [rt]cmd =0x49444549, len=4
33,031,517 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
4,125,922 ready_for_fw is high
4,126,448 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,542 >>> mbox cmd response: success
18,072,394 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,705,714 UART:
23,706,119 UART: Running Caliptra FMC ...
23,707,229 UART:
23,707,376 UART: [state] CFI Enabled
23,715,271 UART: [fht] FMC Alias Private Key: 7
26,046,730 UART: [art] Extend RT PCRs Done
26,047,952 UART: [art] Lock RT PCRs Done
26,049,636 UART: [art] Populate DV Done
26,055,277 UART: [fht] FMC Alias Private Key: 7
26,056,822 UART: [art] Derive CDI
26,057,639 UART: [art] Store in in slot 0x4
26,100,119 UART: [art] Derive Key Pair
26,101,129 UART: [art] Store priv key in slot 0x5
29,342,934 UART: [art] Derive Key Pair - Done
29,356,198 UART: [art] Signing Cert with AUTHO
29,357,504 UART: RITY.KEYID = 7
31,636,946 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,464 UART: [art] PUB.X = CD99C30A9B3FDE6E39911C83A6776E0EB09A11E769BFAB3836AF8526F371EBB7D2AAE240B3240E2E1002B8FE90B454BC
31,645,741 UART: [art] PUB.Y = BC9993ED02F1CECD1C62EE192CE3E106D81CEC9933AD9818621F8A3D4CCCEA90B268166DF550BFA8E5012556392FBE60
31,652,997 UART: [art] SIG.R = 69EBF99D05634DEFA70AFA5F6638EC40DA39081BA1D31598C66A2F54EDE83070A37FC13E58ADC674A24FAC6234C3B950
31,660,397 UART: [art] SIG.S = 1691C8CCEBED7B9F14B68D5EA5B43732E2281D64035F85AFAA570EA68B1CCEEEABDC05F96AB8396B6E551F81F4C8800E
32,965,383 UART: Caliptra RT
32,966,085 UART: [state] CFI Enabled
33,084,445 UART: [rt] RT listening for mailbox commands...
33,115,636 UART: [rt]cmd =0x4c444556, len=4
33,126,912 >>> mbox cmd response data (687 bytes)
33,167,946 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,197,987 UART: [rt]cmd =0x49444549, len=4
33,200,818 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,597 writing to cptra_bootfsm_go
192,681 UART:
193,072 UART: Running Caliptra ROM ...
194,248 UART:
194,402 UART: [state] CFI Enabled
261,464 UART: [state] LifecycleState = Unprovisioned
263,314 UART: [state] DebugLocked = No
265,635 UART: [state] WD Timer not started. Device not locked for debugging
269,182 UART: [kat] SHA2-256
448,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,884 UART: [kat] ++
460,333 UART: [kat] sha1
472,408 UART: [kat] SHA2-256
475,419 UART: [kat] SHA2-384
482,719 UART: [kat] SHA2-512-ACC
485,699 UART: [kat] ECC-384
2,945,309 UART: [kat] HMAC-384Kdf
2,969,662 UART: [kat] LMS
3,499,134 UART: [kat] --
3,502,152 UART: [cold-reset] ++
3,504,652 UART: [fht] FHT @ 0x50003400
3,515,706 UART: [idev] ++
3,516,282 UART: [idev] CDI.KEYID = 6
3,517,463 UART: [idev] SUBJECT.KEYID = 7
3,518,523 UART: [idev] UDS.KEYID = 0
3,519,444 ready_for_fw is high
3,519,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,394 UART: [idev] Erasing UDS.KEYID = 0
6,025,943 UART: [idev] Sha1 KeyId Algorithm
6,048,273 UART: [idev] --
6,052,430 UART: [ldev] ++
6,053,006 UART: [ldev] CDI.KEYID = 6
6,053,897 UART: [ldev] SUBJECT.KEYID = 5
6,055,006 UART: [ldev] AUTHORITY.KEYID = 7
6,056,293 UART: [ldev] FE.KEYID = 1
6,097,416 UART: [ldev] Erasing FE.KEYID = 1
8,606,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,213 UART: [ldev] --
10,411,590 UART: [fwproc] Wait for Commands...
10,414,718 UART: [fwproc] Recv command 0x46574c44
10,416,763 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,275,692 >>> mbox cmd response: success
14,276,230 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,279,921 UART: [afmc] ++
14,280,504 UART: [afmc] CDI.KEYID = 6
14,281,386 UART: [afmc] SUBJECT.KEYID = 7
14,282,599 UART: [afmc] AUTHORITY.KEYID = 5
16,826,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,775 UART: [afmc] --
18,627,040 UART: [cold-reset] --
18,629,764 UART: [state] Locking Datavault
18,635,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,657 UART: [state] Locking ICCM
18,638,892 UART: [exit] Launching FMC @ 0x40000130
18,647,303 UART:
18,647,544 UART: Running Caliptra FMC ...
18,648,646 UART:
18,648,800 UART: [state] CFI Enabled
18,708,987 UART: [fht] FMC Alias Private Key: 7
20,473,915 UART: [art] Extend RT PCRs Done
20,475,137 UART: [art] Lock RT PCRs Done
20,476,762 UART: [art] Populate DV Done
20,481,804 UART: [fht] FMC Alias Private Key: 7
20,483,519 UART: [art] Derive CDI
20,484,341 UART: [art] Store in in slot 0x4
20,541,729 UART: [art] Derive Key Pair
20,542,731 UART: [art] Store priv key in slot 0x5
23,006,114 UART: [art] Derive Key Pair - Done
23,019,276 UART: [art] Signing Cert with AUTHO
23,020,584 UART: RITY.KEYID = 7
24,731,961 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,460 UART: [art] PUB.X = BA0F0785B9467A875DE35F072826DC6A0B6CC0013886445F4AB0D428A395CDB15A5351877A25D83CC3FB684F4F9801D2
24,740,690 UART: [art] PUB.Y = 5BE3881EB23E26B8DD0622F01397A7D9B1B14E54E687CE068DEFF1EE4B937CA7C42B71A0B97735C9DC9D087EF2E8361E
24,747,959 UART: [art] SIG.R = 3E31EC7163E4C9E7286DE08B125470C2400859C773707BAA952E5DF5E42804B8320D7C29D0951870F016B66770238DAD
24,755,345 UART: [art] SIG.S = 94AE957F2BE436E383F99CB09E0780FA9597CA7B124E23FC7DA01651430B05C1041F523B94EFA86C8934395CEE3EDFB3
25,734,535 UART: Caliptra RT
25,735,237 UART: [state] CFI Enabled
25,898,380 UART: [rt] RT listening for mailbox commands...
25,929,301 UART: [rt]cmd =0x4c444556, len=4
25,940,586 >>> mbox cmd response data (687 bytes)
25,981,819 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,012,024 UART: [rt]cmd =0x49444549, len=4
26,014,759 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,544 UART:
192,921 UART: Running Caliptra ROM ...
194,030 UART:
194,176 UART: [state] CFI Enabled
263,491 UART: [state] LifecycleState = Unprovisioned
265,540 UART: [state] DebugLocked = No
266,776 UART: [state] WD Timer not started. Device not locked for debugging
272,308 UART: [kat] SHA2-256
462,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,887 UART: [kat] ++
473,338 UART: [kat] sha1
484,277 UART: [kat] SHA2-256
487,289 UART: [kat] SHA2-384
493,640 UART: [kat] SHA2-512-ACC
496,220 UART: [kat] ECC-384
2,948,713 UART: [kat] HMAC-384Kdf
2,972,186 UART: [kat] LMS
3,503,984 UART: [kat] --
3,507,222 UART: [cold-reset] ++
3,509,588 UART: [fht] FHT @ 0x50003400
3,521,352 UART: [idev] ++
3,522,064 UART: [idev] CDI.KEYID = 6
3,523,103 UART: [idev] SUBJECT.KEYID = 7
3,524,208 UART: [idev] UDS.KEYID = 0
3,525,134 ready_for_fw is high
3,525,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,171 UART: [idev] Erasing UDS.KEYID = 0
6,030,456 UART: [idev] Sha1 KeyId Algorithm
6,053,006 UART: [idev] --
6,057,900 UART: [ldev] ++
6,058,592 UART: [ldev] CDI.KEYID = 6
6,059,532 UART: [ldev] SUBJECT.KEYID = 5
6,060,696 UART: [ldev] AUTHORITY.KEYID = 7
6,061,875 UART: [ldev] FE.KEYID = 1
6,101,248 UART: [ldev] Erasing FE.KEYID = 1
8,608,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,548 UART: [ldev] --
10,416,620 UART: [fwproc] Wait for Commands...
10,418,869 UART: [fwproc] Recv command 0x46574c44
10,421,124 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,606,568 >>> mbox cmd response: success
14,607,079 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,611,425 UART: [afmc] ++
14,612,120 UART: [afmc] CDI.KEYID = 6
14,613,229 UART: [afmc] SUBJECT.KEYID = 7
14,614,770 UART: [afmc] AUTHORITY.KEYID = 5
17,155,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,899,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,901,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,916,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,931,822 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,946,873 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,787 UART: [afmc] --
18,974,134 UART: [cold-reset] --
18,979,563 UART: [state] Locking Datavault
18,986,275 UART: [state] Locking PCR0, PCR1 and PCR31
18,988,488 UART: [state] Locking ICCM
18,989,809 UART: [exit] Launching FMC @ 0x40000130
18,998,480 UART:
18,998,753 UART: Running Caliptra FMC ...
18,999,786 UART:
18,999,933 UART: [state] CFI Enabled
19,056,912 UART: [fht] FMC Alias Private Key: 7
20,821,278 UART: [art] Extend RT PCRs Done
20,822,500 UART: [art] Lock RT PCRs Done
20,824,477 UART: [art] Populate DV Done
20,829,941 UART: [fht] FMC Alias Private Key: 7
20,831,535 UART: [art] Derive CDI
20,832,274 UART: [art] Store in in slot 0x4
20,889,722 UART: [art] Derive Key Pair
20,890,790 UART: [art] Store priv key in slot 0x5
23,353,311 UART: [art] Derive Key Pair - Done
23,366,114 UART: [art] Signing Cert with AUTHO
23,367,427 UART: RITY.KEYID = 7
25,079,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,081,215 UART: [art] PUB.X = 76E3033CBC73F61B57F2D4A634DD8A3610D5A450B876D80E2EBA1128D087D4B82B46C7CFAB4823C06807258419F2052B
25,088,451 UART: [art] PUB.Y = D3C261F6AB80EE1C7134AC7DFFFCBBB65BA924DF9B069995D46516297E2C248EAEEE311CA513345A2E90F022D9489B25
25,095,726 UART: [art] SIG.R = AA2757490C7D52558B6EC2628528B8118A48737369C68652C6413954E93E6307AB0E70F100FF1EB196C6B3C96F2C95FB
25,103,113 UART: [art] SIG.S = 4BA3FC3D5AAA533FC9122B155500EA6BAFA34410B431C89D39763B6FC234C517A911C578BF3E23DA84F80B888BEBC39F
26,081,772 UART: Caliptra RT
26,082,485 UART: [state] CFI Enabled
26,249,144 UART: [rt] RT listening for mailbox commands...
26,280,013 UART: [rt]cmd =0x4c444556, len=4
26,291,130 >>> mbox cmd response data (687 bytes)
26,332,108 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,361,991 UART: [rt]cmd =0x49444549, len=4
26,364,849 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,440,339 ready_for_fw is high
3,440,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,731,950 >>> mbox cmd response: success
14,732,628 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,047,167 UART:
19,047,559 UART: Running Caliptra FMC ...
19,048,672 UART:
19,048,828 UART: [state] CFI Enabled
19,117,526 UART: [fht] FMC Alias Private Key: 7
20,881,496 UART: [art] Extend RT PCRs Done
20,882,720 UART: [art] Lock RT PCRs Done
20,884,373 UART: [art] Populate DV Done
20,889,839 UART: [fht] FMC Alias Private Key: 7
20,891,377 UART: [art] Derive CDI
20,892,114 UART: [art] Store in in slot 0x4
20,950,532 UART: [art] Derive Key Pair
20,951,569 UART: [art] Store priv key in slot 0x5
23,415,042 UART: [art] Derive Key Pair - Done
23,427,744 UART: [art] Signing Cert with AUTHO
23,429,074 UART: RITY.KEYID = 7
25,141,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,663 UART: [art] PUB.X = 8A059D4FFAC2F77E3BED5A76B089D3BC249917963B919B43212886BA6004DC2D9E24D18A8457CEDBDA7CBE169E8B9551
25,149,948 UART: [art] PUB.Y = B3B3CE213CADCBA18E61C36A9A12A0BEDB4F330B9C91842AA4BFFD8B3CD4D01587E380EE42685355A6D3A19986B05B37
25,157,245 UART: [art] SIG.R = E92CE4861C97E589398E7944C09904705A6649163ED7FA9EA05EFA28FE719F52DBFEB42B3E5FC1D314A31EB4E188D88D
25,164,645 UART: [art] SIG.S = D46EECD60EBBA7B753624702034294DEF22290F709EB35E45441E9811E8E4CEAE5E0D224F44C66A65F75B835B2E9893A
26,143,737 UART: Caliptra RT
26,144,448 UART: [state] CFI Enabled
26,309,932 UART: [rt] RT listening for mailbox commands...
26,340,970 UART: [rt]cmd =0x4c444556, len=4
26,351,905 >>> mbox cmd response data (687 bytes)
26,393,168 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,423,358 UART: [rt]cmd =0x49444549, len=4
26,426,278 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,484 UART:
192,850 UART: Running Caliptra ROM ...
193,954 UART:
603,589 UART: [state] CFI Enabled
614,900 UART: [state] LifecycleState = Unprovisioned
616,904 UART: [state] DebugLocked = No
618,499 UART: [state] WD Timer not started. Device not locked for debugging
623,455 UART: [kat] SHA2-256
813,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,086 UART: [kat] ++
824,612 UART: [kat] sha1
835,699 UART: [kat] SHA2-256
838,716 UART: [kat] SHA2-384
844,492 UART: [kat] SHA2-512-ACC
847,068 UART: [kat] ECC-384
3,287,007 UART: [kat] HMAC-384Kdf
3,299,818 UART: [kat] LMS
3,831,663 UART: [kat] --
3,834,444 UART: [cold-reset] ++
3,835,312 UART: [fht] FHT @ 0x50003400
3,846,005 UART: [idev] ++
3,846,716 UART: [idev] CDI.KEYID = 6
3,847,745 UART: [idev] SUBJECT.KEYID = 7
3,848,844 UART: [idev] UDS.KEYID = 0
3,849,790 ready_for_fw is high
3,849,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,993,606 UART: [idev] Erasing UDS.KEYID = 0
6,331,134 UART: [idev] Sha1 KeyId Algorithm
6,352,136 UART: [idev] --
6,355,614 UART: [ldev] ++
6,356,295 UART: [ldev] CDI.KEYID = 6
6,357,358 UART: [ldev] SUBJECT.KEYID = 5
6,358,463 UART: [ldev] AUTHORITY.KEYID = 7
6,359,640 UART: [ldev] FE.KEYID = 1
6,369,849 UART: [ldev] Erasing FE.KEYID = 1
8,849,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,571 UART: [ldev] --
10,638,784 UART: [fwproc] Wait for Commands...
10,640,659 UART: [fwproc] Recv command 0x46574c44
10,642,964 UART: [fwproc] Recv'd Img size: 114360 bytes
14,086,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,275,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,818,040 >>> mbox cmd response: success
14,818,544 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,822,023 UART: [afmc] ++
14,822,718 UART: [afmc] CDI.KEYID = 6
14,823,871 UART: [afmc] SUBJECT.KEYID = 7
14,825,408 UART: [afmc] AUTHORITY.KEYID = 5
17,333,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,070,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,085,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,100,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,124,736 UART: [afmc] --
19,128,820 UART: [cold-reset] --
19,133,378 UART: [state] Locking Datavault
19,139,546 UART: [state] Locking PCR0, PCR1 and PCR31
19,141,717 UART: [state] Locking ICCM
19,143,711 UART: [exit] Launching FMC @ 0x40000130
19,152,377 UART:
19,152,609 UART: Running Caliptra FMC ...
19,153,704 UART:
19,153,856 UART: [state] CFI Enabled
19,162,032 UART: [fht] FMC Alias Private Key: 7
20,918,313 UART: [art] Extend RT PCRs Done
20,919,532 UART: [art] Lock RT PCRs Done
20,920,770 UART: [art] Populate DV Done
20,926,240 UART: [fht] FMC Alias Private Key: 7
20,927,784 UART: [art] Derive CDI
20,928,516 UART: [art] Store in in slot 0x4
20,971,433 UART: [art] Derive Key Pair
20,972,427 UART: [art] Store priv key in slot 0x5
23,399,051 UART: [art] Derive Key Pair - Done
23,411,990 UART: [art] Signing Cert with AUTHO
23,413,285 UART: RITY.KEYID = 7
25,118,970 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,474 UART: [art] PUB.X = B0179ABBDA58CCBD807C7D1C48574FBC6D47F7A801A814B96BD4638F4CF54D7064F6F77C17A18896351BC3D81E91B87A
25,127,727 UART: [art] PUB.Y = 1F2D98B04E86474503B26FB1C15717509C224C37C7514403ECEA5B53DCED813371D63FA66C70E43881C4FB722217C2FA
25,135,013 UART: [art] SIG.R = D95D351103BF4EC160D8A24C93F24ED51E913190B47A2FD73D69ABB91CEF38CB14CB82CABE14C85C0C35982C24E957CE
25,142,454 UART: [art] SIG.S = C61AD5BB737783336A0A06D739904AB85E75A82325DC3746622E52140038997FA4B3AC6A314248790527D9724C4D9C85
26,121,258 UART: Caliptra RT
26,121,960 UART: [state] CFI Enabled
26,239,145 UART: [rt] RT listening for mailbox commands...
26,270,439 UART: [rt]cmd =0x4c444556, len=4
26,281,439 >>> mbox cmd response data (687 bytes)
26,322,592 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,352,503 UART: [rt]cmd =0x49444549, len=4
26,355,292 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,755,460 ready_for_fw is high
3,755,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,368 >>> mbox cmd response: success
14,957,151 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,209,297 UART:
19,209,685 UART: Running Caliptra FMC ...
19,210,799 UART:
19,210,966 UART: [state] CFI Enabled
19,218,919 UART: [fht] FMC Alias Private Key: 7
20,975,673 UART: [art] Extend RT PCRs Done
20,976,878 UART: [art] Lock RT PCRs Done
20,978,496 UART: [art] Populate DV Done
20,984,060 UART: [fht] FMC Alias Private Key: 7
20,985,559 UART: [art] Derive CDI
20,986,318 UART: [art] Store in in slot 0x4
21,029,078 UART: [art] Derive Key Pair
21,030,131 UART: [art] Store priv key in slot 0x5
23,456,615 UART: [art] Derive Key Pair - Done
23,469,448 UART: [art] Signing Cert with AUTHO
23,470,755 UART: RITY.KEYID = 7
25,176,067 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,564 UART: [art] PUB.X = D3C48FDB2D4B12FCCF14FE9424D762C2C7FE070673CE56C019173D5856BB5AB001DBEAFF4557C26BA40BA71A3499130C
25,184,856 UART: [art] PUB.Y = 51C8F99067FB8716596F495830EBE58D5DD43241CAAC27046FC266D30AAFE6F8C1623BF9D63E6D764BC5B90A2FE479DC
25,192,116 UART: [art] SIG.R = 91F3364D7261EED983F50F80110F8CFC220CE66F7EE38C1414E5F55F8213CFA7EEF22AD6A2206A2B4EF6E3D553054A8C
25,199,502 UART: [art] SIG.S = FB5CE5BE0E80DC3FB7E44DAF9C57326595FCB705157DDC64D246EB9BFBA93CAAA495414A41417CCB85F090CCD82B4279
26,177,910 UART: Caliptra RT
26,178,622 UART: [state] CFI Enabled
26,294,783 UART: [rt] RT listening for mailbox commands...
26,325,655 UART: [rt]cmd =0x4c444556, len=4
26,336,574 >>> mbox cmd response data (687 bytes)
26,378,047 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,407,925 UART: [rt]cmd =0x49444549, len=4
26,410,624 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
86,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,519 UART: [kat] SHA2-256
881,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,565 UART: [kat] ++
885,717 UART: [kat] sha1
889,859 UART: [kat] SHA2-256
891,797 UART: [kat] SHA2-384
894,454 UART: [kat] SHA2-512-ACC
896,355 UART: [kat] ECC-384
901,708 UART: [kat] HMAC-384Kdf
906,382 UART: [kat] LMS
1,474,578 UART: [kat] --
1,475,417 UART: [cold-reset] ++
1,475,843 UART: [fht] Storing FHT @ 0x50003400
1,478,564 UART: [idev] ++
1,478,732 UART: [idev] CDI.KEYID = 6
1,479,092 UART: [idev] SUBJECT.KEYID = 7
1,479,516 UART: [idev] UDS.KEYID = 0
1,479,861 ready_for_fw is high
1,479,861 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,810 UART: [idev] Erasing UDS.KEYID = 0
1,504,762 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,386 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,520,987 UART: [ldev] Erasing FE.KEYID = 1
1,545,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,718 UART: [ldev] --
1,584,991 UART: [fwproc] Waiting for Commands...
1,585,618 UART: [fwproc] Received command 0x46574c44
1,586,409 UART: [fwproc] Received Image of size 114360 bytes
2,885,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,896 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,235 >>> mbox cmd response: success
3,077,235 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,078,377 UART: [afmc] ++
3,078,545 UART: [afmc] CDI.KEYID = 6
3,078,907 UART: [afmc] SUBJECT.KEYID = 7
3,079,332 UART: [afmc] AUTHORITY.KEYID = 5
3,114,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,725 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,118 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,808 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,685 UART: [afmc] --
3,157,785 UART: [cold-reset] --
3,158,489 UART: [state] Locking Datavault
3,159,586 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,190 UART: [state] Locking ICCM
3,160,622 UART: [exit] Launching FMC @ 0x40000130
3,165,951 UART:
3,165,967 UART: Running Caliptra FMC ...
3,166,375 UART:
3,166,429 UART: [state] CFI Enabled
3,176,650 UART: [fht] FMC Alias Private Key: 7
3,284,563 UART: [art] Extend RT PCRs Done
3,284,991 UART: [art] Lock RT PCRs Done
3,286,279 UART: [art] Populate DV Done
3,294,702 UART: [fht] FMC Alias Private Key: 7
3,295,654 UART: [art] Derive CDI
3,295,934 UART: [art] Store in in slot 0x4
3,381,511 UART: [art] Derive Key Pair
3,381,871 UART: [art] Store priv key in slot 0x5
3,395,481 UART: [art] Derive Key Pair - Done
3,410,359 UART: [art] Signing Cert with AUTHO
3,410,839 UART: RITY.KEYID = 7
3,426,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,928 UART: [art] PUB.X = F7C608A800AEE27FA28CB9F67C4C0495574501736D4D829C6B6BF20C36D83329E5338DA93B61CD4E4FC1DBFAA36A07D0
3,433,673 UART: [art] PUB.Y = BA43A78E76D21A4FD80D56A5DD6A547106F32485494A1A3E200B384135A66B6D9FC04F94899D701280C82D9E09231807
3,440,602 UART: [art] SIG.R = 2AB446BAC73BF7A790F4114FEFE9F1315FEA5CE7AB101AC5910F478C41BE076D76817EA424535FA33AEF77574BF17E83
3,447,380 UART: [art] SIG.S = F1C1D0D74F8902F88C6E9F0C3F504874497E7169441549B39A024A943DFB7551CEA2D425CD683F84A417FA7F998BCE07
3,471,679 UART: Caliptra RT
3,471,933 UART: [state] CFI Enabled
3,579,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,448 UART: [rt]cmd =0x4c444556, len=4
3,619,971 >>> mbox cmd response data (687 bytes)
3,619,972 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,245 UART: [rt]cmd =0x49444549, len=4
3,651,692 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 ready_for_fw is high
1,362,549 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,011 >>> mbox cmd response: success
2,929,011 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,990,699 UART:
2,990,715 UART: Running Caliptra FMC ...
2,991,123 UART:
2,991,177 UART: [state] CFI Enabled
3,001,718 UART: [fht] FMC Alias Private Key: 7
3,109,653 UART: [art] Extend RT PCRs Done
3,110,081 UART: [art] Lock RT PCRs Done
3,111,945 UART: [art] Populate DV Done
3,120,432 UART: [fht] FMC Alias Private Key: 7
3,121,360 UART: [art] Derive CDI
3,121,640 UART: [art] Store in in slot 0x4
3,206,803 UART: [art] Derive Key Pair
3,207,163 UART: [art] Store priv key in slot 0x5
3,220,293 UART: [art] Derive Key Pair - Done
3,235,099 UART: [art] Signing Cert with AUTHO
3,235,579 UART: RITY.KEYID = 7
3,250,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,744 UART: [art] PUB.X = 874E91A3DE023FAF4AAC1F58EF98345E2724C1460CA4C6038D16BFB81A6FEA251914FEE62D05A83EFE82B9EF44F17CFE
3,258,522 UART: [art] PUB.Y = B56DC5A3AB11E49D5582BF857773EAE4D888FCEEE88DE311F399641B8BD0642959BD25F5F78A91F4CA513EAC51720D63
3,265,481 UART: [art] SIG.R = 049C9D9C6A280AAEAD9F105AA3A7469F0B99A0449152A29141B9CB862A8E998B629ECCB59089E64FC2C5B081592604AF
3,272,245 UART: [art] SIG.S = 12666FD1E9BA03C4834B9F0FF31101147A8705F9FAAC0130C6FBA8AE7DC4C84AF4B066F9BCF5135733203944DF618038
3,296,715 UART: Caliptra RT
3,296,969 UART: [state] CFI Enabled
3,404,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,945 UART: [rt]cmd =0x4c444556, len=4
3,445,466 >>> mbox cmd response data (687 bytes)
3,445,467 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,966 UART: [rt]cmd =0x49444549, len=4
3,477,185 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,451 UART: [kat] HMAC-384Kdf
907,029 UART: [kat] LMS
1,475,225 UART: [kat] --
1,476,024 UART: [cold-reset] ++
1,476,480 UART: [fht] Storing FHT @ 0x50003400
1,479,345 UART: [idev] ++
1,479,513 UART: [idev] CDI.KEYID = 6
1,479,873 UART: [idev] SUBJECT.KEYID = 7
1,480,297 UART: [idev] UDS.KEYID = 0
1,480,642 ready_for_fw is high
1,480,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,307 UART: [idev] Erasing UDS.KEYID = 0
1,504,765 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,417 UART: [idev] --
1,514,516 UART: [ldev] ++
1,514,684 UART: [ldev] CDI.KEYID = 6
1,515,047 UART: [ldev] SUBJECT.KEYID = 5
1,515,473 UART: [ldev] AUTHORITY.KEYID = 7
1,515,936 UART: [ldev] FE.KEYID = 1
1,521,160 UART: [ldev] Erasing FE.KEYID = 1
1,546,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,437 UART: [ldev] --
1,585,762 UART: [fwproc] Waiting for Commands...
1,586,497 UART: [fwproc] Received command 0x46574c44
1,587,288 UART: [fwproc] Received Image of size 114360 bytes
2,884,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,069 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,421 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,258 >>> mbox cmd response: success
3,076,258 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,077,444 UART: [afmc] ++
3,077,612 UART: [afmc] CDI.KEYID = 6
3,077,974 UART: [afmc] SUBJECT.KEYID = 7
3,078,399 UART: [afmc] AUTHORITY.KEYID = 5
3,113,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,824 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,217 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,907 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,662 UART: [afmc] --
3,156,682 UART: [cold-reset] --
3,157,340 UART: [state] Locking Datavault
3,158,387 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,991 UART: [state] Locking ICCM
3,159,609 UART: [exit] Launching FMC @ 0x40000130
3,164,938 UART:
3,164,954 UART: Running Caliptra FMC ...
3,165,362 UART:
3,165,505 UART: [state] CFI Enabled
3,176,180 UART: [fht] FMC Alias Private Key: 7
3,284,593 UART: [art] Extend RT PCRs Done
3,285,021 UART: [art] Lock RT PCRs Done
3,286,471 UART: [art] Populate DV Done
3,294,618 UART: [fht] FMC Alias Private Key: 7
3,295,664 UART: [art] Derive CDI
3,295,944 UART: [art] Store in in slot 0x4
3,381,547 UART: [art] Derive Key Pair
3,381,907 UART: [art] Store priv key in slot 0x5
3,395,169 UART: [art] Derive Key Pair - Done
3,409,831 UART: [art] Signing Cert with AUTHO
3,410,311 UART: RITY.KEYID = 7
3,425,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,316 UART: [art] PUB.X = 73B947CF668BA68CEFB595B6D8CA52281E7E74D83E0010E64089578FD25E6546CF972DA94AA6FE7B03F20AD90B49D322
3,433,063 UART: [art] PUB.Y = C905E01694983FD28BBAEAE1DB3C2E02F0FC01477E096E78EF74A36E4650664AA26FAFE3703A2DCE0C69562600A9E95B
3,439,988 UART: [art] SIG.R = 8E866F0C7D031AFE1D0E3BF6E5A5BD8931ED1B8490D65F43C016035A9E0A52668FD725D0A780F0C5BBA796C985E93913
3,446,751 UART: [art] SIG.S = 5280BEB0774B552365CDFBEB1F36A967330A299E6D941EB082AE1553B509871E87447850470A5273BD0AF029928AFD2B
3,470,250 UART: Caliptra RT
3,470,596 UART: [state] CFI Enabled
3,578,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,181 UART: [rt]cmd =0x4c444556, len=4
3,619,636 >>> mbox cmd response data (687 bytes)
3,619,637 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,730 UART: [rt]cmd =0x49444549, len=4
3,651,211 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,420 ready_for_fw is high
1,362,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,862 >>> mbox cmd response: success
2,926,862 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,644 UART:
2,988,660 UART: Running Caliptra FMC ...
2,989,068 UART:
2,989,211 UART: [state] CFI Enabled
2,999,748 UART: [fht] FMC Alias Private Key: 7
3,107,493 UART: [art] Extend RT PCRs Done
3,107,921 UART: [art] Lock RT PCRs Done
3,109,611 UART: [art] Populate DV Done
3,117,752 UART: [fht] FMC Alias Private Key: 7
3,118,910 UART: [art] Derive CDI
3,119,190 UART: [art] Store in in slot 0x4
3,204,615 UART: [art] Derive Key Pair
3,204,975 UART: [art] Store priv key in slot 0x5
3,217,653 UART: [art] Derive Key Pair - Done
3,232,357 UART: [art] Signing Cert with AUTHO
3,232,837 UART: RITY.KEYID = 7
3,247,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,108 UART: [art] PUB.X = 627099DC54B00BF8BF9E5AAA41DCE1D4ECC5D7D1E847738385FEB2C5193427A0F4C09358DC71AF2C11EDE8A0EF052D5B
3,254,892 UART: [art] PUB.Y = 84B10F634B2F5CC0DEC148DBECBC5DD2AA410D4DE7FAFD51C31FF25C288AF87AD6626099DAA1BD0C8988B439EB93078C
3,261,856 UART: [art] SIG.R = DB06B86D278AE60445A6DD63933335A832FDF35276C57E3B1E3B475DFD751051FC7382D363B367D1D1B0259B4CA74E71
3,268,622 UART: [art] SIG.S = 1B4C58783393DEC0D19CE9C0482ABC1B990FC21DFA5DDACC7917EB41C23549B6B4F59B7D2110F09A197EB19094DE939A
3,292,868 UART: Caliptra RT
3,293,214 UART: [state] CFI Enabled
3,402,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,015 UART: [rt]cmd =0x4c444556, len=4
3,443,466 >>> mbox cmd response data (687 bytes)
3,443,467 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,654 UART: [rt]cmd =0x49444549, len=4
3,474,921 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,895 UART: [kat] SHA2-256
903,835 UART: [kat] SHA2-384
906,686 UART: [kat] SHA2-512-ACC
908,587 UART: [kat] ECC-384
918,410 UART: [kat] HMAC-384Kdf
923,152 UART: [kat] LMS
1,171,480 UART: [kat] --
1,172,371 UART: [cold-reset] ++
1,172,833 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 ready_for_fw is high
1,176,737 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,548 UART: [idev] Erasing UDS.KEYID = 0
1,201,517 UART: [idev] Sha1 KeyId Algorithm
1,210,027 UART: [idev] --
1,211,043 UART: [ldev] ++
1,211,211 UART: [ldev] CDI.KEYID = 6
1,211,574 UART: [ldev] SUBJECT.KEYID = 5
1,212,000 UART: [ldev] AUTHORITY.KEYID = 7
1,212,463 UART: [ldev] FE.KEYID = 1
1,217,359 UART: [ldev] Erasing FE.KEYID = 1
1,243,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,634 UART: [fwproc] Wait for Commands...
1,283,420 UART: [fwproc] Recv command 0x46574c44
1,284,148 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,298 >>> mbox cmd response: success
2,773,298 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,332 UART: [afmc] ++
2,774,500 UART: [afmc] CDI.KEYID = 6
2,774,862 UART: [afmc] SUBJECT.KEYID = 7
2,775,287 UART: [afmc] AUTHORITY.KEYID = 5
2,810,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,611 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,121 UART: [afmc] --
2,854,157 UART: [cold-reset] --
2,855,023 UART: [state] Locking Datavault
2,856,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,862 UART: [state] Locking ICCM
2,857,386 UART: [exit] Launching FMC @ 0x40000130
2,862,715 UART:
2,862,731 UART: Running Caliptra FMC ...
2,863,139 UART:
2,863,193 UART: [state] CFI Enabled
2,873,798 UART: [fht] FMC Alias Private Key: 7
2,981,913 UART: [art] Extend RT PCRs Done
2,982,341 UART: [art] Lock RT PCRs Done
2,983,733 UART: [art] Populate DV Done
2,992,062 UART: [fht] FMC Alias Private Key: 7
2,992,994 UART: [art] Derive CDI
2,993,274 UART: [art] Store in in slot 0x4
3,079,277 UART: [art] Derive Key Pair
3,079,637 UART: [art] Store priv key in slot 0x5
3,093,265 UART: [art] Derive Key Pair - Done
3,107,921 UART: [art] Signing Cert with AUTHO
3,108,401 UART: RITY.KEYID = 7
3,123,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,162 UART: [art] PUB.X = 71BA9468B2AD5E14E4D614257F6B853840886CB42131303C8CD03C8C30A7D809E0CFE936C1FF5C78C5BDBFCB4F7F6BE8
3,130,943 UART: [art] PUB.Y = CFDF19ABF430343167C419AEFF4C5FBF64BA8F094B9532B4EF98C5121A5050FEAE1B0C21EFF8719D0E54BB918230B5DE
3,137,904 UART: [art] SIG.R = 80D7BAFE903E365D261AEC4FA45A8FA4F5592EE25EB2B1BB614C14D1E288815BA0A1B2182292B8E6FD0F4C0F1DC040B4
3,144,686 UART: [art] SIG.S = 6684A954F5042CA22428DBDBD47E9711953211B99E71B773985238D647F5EDA45C3055A9FB0B17ACA327657C211086DD
3,167,991 UART: Caliptra RT
3,168,245 UART: [state] CFI Enabled
3,275,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,040 UART: [rt]cmd =0x4c444556, len=4
3,316,487 >>> mbox cmd response data (687 bytes)
3,316,488 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,843 UART: [rt]cmd =0x49444549, len=4
3,348,158 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,647 ready_for_fw is high
1,060,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,731 >>> mbox cmd response: success
2,625,731 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,521 UART:
2,687,537 UART: Running Caliptra FMC ...
2,687,945 UART:
2,687,999 UART: [state] CFI Enabled
2,697,990 UART: [fht] FMC Alias Private Key: 7
2,806,637 UART: [art] Extend RT PCRs Done
2,807,065 UART: [art] Lock RT PCRs Done
2,808,707 UART: [art] Populate DV Done
2,817,178 UART: [fht] FMC Alias Private Key: 7
2,818,172 UART: [art] Derive CDI
2,818,452 UART: [art] Store in in slot 0x4
2,904,163 UART: [art] Derive Key Pair
2,904,523 UART: [art] Store priv key in slot 0x5
2,917,495 UART: [art] Derive Key Pair - Done
2,932,280 UART: [art] Signing Cert with AUTHO
2,932,760 UART: RITY.KEYID = 7
2,948,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,907 UART: [art] PUB.X = 33D5C15C8CED32AE3401D0660F1BB4B241BB9FBBB3C7D852A2CCFC311D0ADB3B15F0733D3A68B9033EC6DC6439934373
2,955,681 UART: [art] PUB.Y = 575CFB87A75B11D1BD8B3A791021819A1040EB3C744469625F125D34759B818C4FB14AEE5BF8FC139A23B532F7023A7A
2,962,630 UART: [art] SIG.R = BDBDD09C2CEB32A6D47C061584B3DEBBF4EA86A0E302C0FD514BF03DA238DABFE3E29A2AEC39D27DCFB8DD7145898F05
2,969,423 UART: [art] SIG.S = 666FBEB17E209293E7433B206F48C566139D9CED7630B858274AFF753B47962518B7DF9D0FDA6A173E59FB7F8CA634E7
2,993,229 UART: Caliptra RT
2,993,483 UART: [state] CFI Enabled
3,100,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,836 UART: [rt]cmd =0x4c444556, len=4
3,141,129 >>> mbox cmd response data (687 bytes)
3,141,130 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,413 UART: [rt]cmd =0x49444549, len=4
3,172,734 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
917,981 UART: [kat] HMAC-384Kdf
922,675 UART: [kat] LMS
1,171,003 UART: [kat] --
1,171,922 UART: [cold-reset] ++
1,172,492 UART: [fht] FHT @ 0x50003400
1,175,089 UART: [idev] ++
1,175,257 UART: [idev] CDI.KEYID = 6
1,175,617 UART: [idev] SUBJECT.KEYID = 7
1,176,041 UART: [idev] UDS.KEYID = 0
1,176,386 ready_for_fw is high
1,176,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,229 UART: [idev] Erasing UDS.KEYID = 0
1,200,722 UART: [idev] Sha1 KeyId Algorithm
1,209,350 UART: [idev] --
1,210,342 UART: [ldev] ++
1,210,510 UART: [ldev] CDI.KEYID = 6
1,210,873 UART: [ldev] SUBJECT.KEYID = 5
1,211,299 UART: [ldev] AUTHORITY.KEYID = 7
1,211,762 UART: [ldev] FE.KEYID = 1
1,217,022 UART: [ldev] Erasing FE.KEYID = 1
1,243,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,770 UART: [ldev] --
1,283,239 UART: [fwproc] Wait for Commands...
1,283,989 UART: [fwproc] Recv command 0x46574c44
1,284,717 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,529 >>> mbox cmd response: success
2,775,529 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,776,639 UART: [afmc] ++
2,776,807 UART: [afmc] CDI.KEYID = 6
2,777,169 UART: [afmc] SUBJECT.KEYID = 7
2,777,594 UART: [afmc] AUTHORITY.KEYID = 5
2,813,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,108 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,896 UART: [afmc] --
2,856,814 UART: [cold-reset] --
2,857,882 UART: [state] Locking Datavault
2,859,001 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,605 UART: [state] Locking ICCM
2,860,135 UART: [exit] Launching FMC @ 0x40000130
2,865,464 UART:
2,865,480 UART: Running Caliptra FMC ...
2,865,888 UART:
2,866,031 UART: [state] CFI Enabled
2,877,064 UART: [fht] FMC Alias Private Key: 7
2,985,679 UART: [art] Extend RT PCRs Done
2,986,107 UART: [art] Lock RT PCRs Done
2,987,421 UART: [art] Populate DV Done
2,995,722 UART: [fht] FMC Alias Private Key: 7
2,996,838 UART: [art] Derive CDI
2,997,118 UART: [art] Store in in slot 0x4
3,082,915 UART: [art] Derive Key Pair
3,083,275 UART: [art] Store priv key in slot 0x5
3,097,329 UART: [art] Derive Key Pair - Done
3,112,287 UART: [art] Signing Cert with AUTHO
3,112,767 UART: RITY.KEYID = 7
3,128,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,004 UART: [art] PUB.X = CC99DAE9CE2F16EC859D31A7DFEBD549A6AD9FA11B5ECF1FA8286B5F3B5C13513D5000FAB4D26EB32C6824EE88B4EAFB
3,135,784 UART: [art] PUB.Y = 5A29694182BE91A2E325549168E86FB0AFCFAF2A3C2B2C21E645178E8480232C1D8CDBAC47518E72820237FBF45B3DC3
3,142,737 UART: [art] SIG.R = 9F5F1D9C675996F8E0AAA8345DEACD8B58955FCFF0F97A2EA285BAA24DE1557B5B1703204C8562627033DA96D49BAA3B
3,149,518 UART: [art] SIG.S = 9FE16D09C3C2B0452E0F92E8F2805B355508C92314167D4A94DFDDECC73E099B63B9B3B4894EF8A08108019DDDBE4731
3,173,457 UART: Caliptra RT
3,173,803 UART: [state] CFI Enabled
3,280,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,893 UART: [rt]cmd =0x4c444556, len=4
3,321,434 >>> mbox cmd response data (687 bytes)
3,321,435 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,864 UART: [rt]cmd =0x49444549, len=4
3,353,217 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,962 ready_for_fw is high
1,060,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,148 >>> mbox cmd response: success
2,626,148 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,950 UART:
2,687,966 UART: Running Caliptra FMC ...
2,688,374 UART:
2,688,517 UART: [state] CFI Enabled
2,699,134 UART: [fht] FMC Alias Private Key: 7
2,806,923 UART: [art] Extend RT PCRs Done
2,807,351 UART: [art] Lock RT PCRs Done
2,808,931 UART: [art] Populate DV Done
2,816,970 UART: [fht] FMC Alias Private Key: 7
2,818,056 UART: [art] Derive CDI
2,818,336 UART: [art] Store in in slot 0x4
2,903,565 UART: [art] Derive Key Pair
2,903,925 UART: [art] Store priv key in slot 0x5
2,917,273 UART: [art] Derive Key Pair - Done
2,931,956 UART: [art] Signing Cert with AUTHO
2,932,436 UART: RITY.KEYID = 7
2,947,540 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,305 UART: [art] PUB.X = CC2DE70A5B1D02B7CA6F974086828F86981CB46505D5986F0F5FC3848A5EA699BE95913A401C9018EF45E26BD9A9DC14
2,955,069 UART: [art] PUB.Y = F5F9C2BE66C125A83FE4973B29BED3B0549B785AEDD65BED006567AF082DD0B5BFFCB4EE20CE4AC89CD2FFABAC3FA73D
2,962,030 UART: [art] SIG.R = D611C291D58C986480CA8B441BA1BACDDF98A0CBA8A1C98D84B7F07AFBCD2ABF715580A094894315E5C03647440D0ADF
2,968,810 UART: [art] SIG.S = E193E6E59BC4B1B6FFE7AC56974CE9093AE1FB596DFCC6E1C03689D8B3ACACA1122B22904303B0306C1229F782023A82
2,992,996 UART: Caliptra RT
2,993,342 UART: [state] CFI Enabled
3,101,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,678 UART: [rt]cmd =0x4c444556, len=4
3,142,037 >>> mbox cmd response data (687 bytes)
3,142,038 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,293 UART: [rt]cmd =0x49444549, len=4
3,173,612 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,150 UART: [kat] LMS
1,168,462 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,174,053 ready_for_fw is high
1,174,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,215,280 UART: [ldev] Erasing FE.KEYID = 1
1,242,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,102 UART: [ldev] --
1,281,600 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,656 >>> mbox cmd response: success
2,771,656 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,853 UART: [afmc] ++
2,773,021 UART: [afmc] CDI.KEYID = 6
2,773,384 UART: [afmc] SUBJECT.KEYID = 7
2,773,810 UART: [afmc] AUTHORITY.KEYID = 5
2,809,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,066 UART: [afmc] --
2,852,992 UART: [cold-reset] --
2,853,846 UART: [state] Locking Datavault
2,855,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,853 UART: [state] Locking ICCM
2,856,507 UART: [exit] Launching FMC @ 0x40000130
2,861,836 UART:
2,861,852 UART: Running Caliptra FMC ...
2,862,260 UART:
2,862,314 UART: [state] CFI Enabled
2,872,927 UART: [fht] FMC Alias Private Key: 7
2,981,116 UART: [art] Extend RT PCRs Done
2,981,544 UART: [art] Lock RT PCRs Done
2,982,956 UART: [art] Populate DV Done
2,991,303 UART: [fht] FMC Alias Private Key: 7
2,992,373 UART: [art] Derive CDI
2,992,653 UART: [art] Store in in slot 0x4
3,078,616 UART: [art] Derive Key Pair
3,078,976 UART: [art] Store priv key in slot 0x5
3,092,310 UART: [art] Derive Key Pair - Done
3,107,389 UART: [art] Signing Cert with AUTHO
3,107,869 UART: RITY.KEYID = 7
3,123,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,948 UART: [art] PUB.X = 7756B9C46C243CED4DCF33387D80EF432ABFE7153C12ACC37369DCF3191F19565EA864E4F626265378B0680C1A52D58C
3,130,719 UART: [art] PUB.Y = 190B68C7D1FC014B52079555900DF23C8F516F4AB937622FE9DDBA8A9CA552D03398F3058608E3A637472C75C59B936E
3,137,649 UART: [art] SIG.R = 4EEE6774897E07A37E027708A27520F3C39AE965760E2E56CC1A863D61656190DECEAD57BD3CF942CF01353AE5E2262E
3,144,408 UART: [art] SIG.S = 71F1C6D5A3A0F03674559EE3490249D7BA431A54C83DAC5A1255BDD04B96AF541B1CD606C7B9E0A32C0CE0E4D0B04383
3,168,374 UART: Caliptra RT
3,168,628 UART: [state] CFI Enabled
3,276,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,423 UART: [rt]cmd =0x4c444556, len=4
3,317,018 >>> mbox cmd response data (687 bytes)
3,317,019 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,204 UART: [rt]cmd =0x49444549, len=4
3,348,465 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,294 ready_for_fw is high
1,055,294 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,536 >>> mbox cmd response: success
2,622,536 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,685,054 UART:
2,685,070 UART: Running Caliptra FMC ...
2,685,478 UART:
2,685,532 UART: [state] CFI Enabled
2,695,989 UART: [fht] FMC Alias Private Key: 7
2,803,904 UART: [art] Extend RT PCRs Done
2,804,332 UART: [art] Lock RT PCRs Done
2,805,848 UART: [art] Populate DV Done
2,814,263 UART: [fht] FMC Alias Private Key: 7
2,815,299 UART: [art] Derive CDI
2,815,579 UART: [art] Store in in slot 0x4
2,901,106 UART: [art] Derive Key Pair
2,901,466 UART: [art] Store priv key in slot 0x5
2,914,510 UART: [art] Derive Key Pair - Done
2,929,234 UART: [art] Signing Cert with AUTHO
2,929,714 UART: RITY.KEYID = 7
2,945,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,803 UART: [art] PUB.X = CC1CC8FB7E47C2D60B1924E5A762F9A37898BCBFC6212AE8F4C25130B76E3173DE16A39C8FE986232101E0852A6A7B02
2,952,572 UART: [art] PUB.Y = A5678F9034FB6CA0E3D1C61F742E5391F135E1C20AC00E923A0D9646EBF294DCBEDA829B2069EEED88C9008C086008DE
2,959,497 UART: [art] SIG.R = 67FE5C4F5302A8389E0AA32CAD892EA7502D80E7F0AF93DF12E6D8BE9DA0C789654265F2B22A711FF440D943956E0451
2,966,264 UART: [art] SIG.S = 6E487D7429455D6B50116CE73796E6CF9F2B506586139D3A5D594755D3AE510CFFBDBD069F5D50285532D3BF7A127DBB
2,989,943 UART: Caliptra RT
2,990,197 UART: [state] CFI Enabled
3,097,387 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,512 UART: [rt]cmd =0x4c444556, len=4
3,137,857 >>> mbox cmd response data (687 bytes)
3,137,858 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,053 UART: [rt]cmd =0x49444549, len=4
3,169,286 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,877 UART: [state] LifecycleState = Unprovisioned
86,532 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,026 UART: [kat] ++
896,178 UART: [kat] sha1
900,334 UART: [kat] SHA2-256
902,274 UART: [kat] SHA2-384
904,981 UART: [kat] SHA2-512-ACC
906,882 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,174,764 ready_for_fw is high
1,174,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,076 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,210,077 UART: [ldev] ++
1,210,245 UART: [ldev] CDI.KEYID = 6
1,210,609 UART: [ldev] SUBJECT.KEYID = 5
1,211,036 UART: [ldev] AUTHORITY.KEYID = 7
1,211,499 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,897 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,747 >>> mbox cmd response: success
2,774,747 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,775,952 UART: [afmc] ++
2,776,120 UART: [afmc] CDI.KEYID = 6
2,776,483 UART: [afmc] SUBJECT.KEYID = 7
2,776,909 UART: [afmc] AUTHORITY.KEYID = 5
2,812,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,541 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,260 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,085 UART: [afmc] --
2,856,083 UART: [cold-reset] --
2,856,937 UART: [state] Locking Datavault
2,858,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,638 UART: [state] Locking ICCM
2,859,254 UART: [exit] Launching FMC @ 0x40000130
2,864,583 UART:
2,864,599 UART: Running Caliptra FMC ...
2,865,007 UART:
2,865,150 UART: [state] CFI Enabled
2,876,099 UART: [fht] FMC Alias Private Key: 7
2,983,902 UART: [art] Extend RT PCRs Done
2,984,330 UART: [art] Lock RT PCRs Done
2,985,874 UART: [art] Populate DV Done
2,994,113 UART: [fht] FMC Alias Private Key: 7
2,995,167 UART: [art] Derive CDI
2,995,447 UART: [art] Store in in slot 0x4
3,081,116 UART: [art] Derive Key Pair
3,081,476 UART: [art] Store priv key in slot 0x5
3,095,006 UART: [art] Derive Key Pair - Done
3,109,477 UART: [art] Signing Cert with AUTHO
3,109,957 UART: RITY.KEYID = 7
3,125,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,152 UART: [art] PUB.X = DE20735727A7CCB0121BD0F768EAFF278FA33ED90DDB70AF9C45081EAFAACCC4B9B232ABE1E3568F2A7471A6D6219371
3,132,936 UART: [art] PUB.Y = A90BACAF685B792668D3021BFDC9CDF5E349A4908DD645D2D7C25F4E2766F40DAFD4F8606A09B219D86A0DD1A759A775
3,139,885 UART: [art] SIG.R = 148A88E3D0F7D7669C7DCC5814C7F1CD0B4CB9D60E9844F1A28A1B638C8BAD3EAD5D1445171EC070CF2E24CB69CB9F2E
3,146,669 UART: [art] SIG.S = BA6B54467441E20D9257244C62C73E9D5F2C3E1B28F250B3D598A9CFEB2331C17677843B18D1F4C75131D16F782D7F9C
3,170,817 UART: Caliptra RT
3,171,163 UART: [state] CFI Enabled
3,278,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,470 UART: [rt]cmd =0x4c444556, len=4
3,319,127 >>> mbox cmd response data (687 bytes)
3,319,128 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,471 UART: [rt]cmd =0x49444549, len=4
3,350,932 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,925 ready_for_fw is high
1,057,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,031 >>> mbox cmd response: success
2,625,031 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,323 UART:
2,687,339 UART: Running Caliptra FMC ...
2,687,747 UART:
2,687,890 UART: [state] CFI Enabled
2,698,575 UART: [fht] FMC Alias Private Key: 7
2,806,476 UART: [art] Extend RT PCRs Done
2,806,904 UART: [art] Lock RT PCRs Done
2,808,536 UART: [art] Populate DV Done
2,816,827 UART: [fht] FMC Alias Private Key: 7
2,817,767 UART: [art] Derive CDI
2,818,047 UART: [art] Store in in slot 0x4
2,903,798 UART: [art] Derive Key Pair
2,904,158 UART: [art] Store priv key in slot 0x5
2,917,180 UART: [art] Derive Key Pair - Done
2,932,108 UART: [art] Signing Cert with AUTHO
2,932,588 UART: RITY.KEYID = 7
2,947,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,361 UART: [art] PUB.X = 9D2A0CEACF2C8985999B7B80F46479D42113DAF3BABEFB3FF71F8E373724E4B5AF011B72320AF6EA20D817E4FE3AFAD6
2,955,144 UART: [art] PUB.Y = AD499B969FAF9F1B56A5574FA68BCB1BD90E412F2BABAE37DF58EC08BC47A7E75E26E2415E5D9293C3DD22900B6BE3EE
2,962,109 UART: [art] SIG.R = BC984D437818BCAAAB361E4C6928D27385ED23FC947CECBD0DC83AF78DB36B3B51C10242A39D8F660445DD5043941B75
2,968,880 UART: [art] SIG.S = 431C6596B3C028306E5DD06BCE9B9F28076A07B4BA832208AF2E8420047BE3CC54CEEBCD1D06B504D43691BACF3BAB03
2,991,822 UART: Caliptra RT
2,992,168 UART: [state] CFI Enabled
3,099,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,979 UART: [rt]cmd =0x4c444556, len=4
3,140,422 >>> mbox cmd response data (687 bytes)
3,140,423 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,982 UART: [rt]cmd =0x49444549, len=4
3,172,139 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,384 UART:
192,759 UART: Running Caliptra ROM ...
193,846 UART:
193,980 UART: [state] CFI Enabled
262,560 UART: [state] LifecycleState = Unprovisioned
264,556 UART: [state] DebugLocked = No
267,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,778 UART: [kat] SHA2-256
442,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,975 UART: [kat] ++
453,419 UART: [kat] sha1
464,641 UART: [kat] SHA2-256
467,285 UART: [kat] SHA2-384
474,117 UART: [kat] SHA2-512-ACC
476,472 UART: [kat] ECC-384
2,768,541 UART: [kat] HMAC-384Kdf
2,781,216 UART: [kat] LMS
3,971,526 UART: [kat] --
3,975,630 UART: [cold-reset] ++
3,976,929 UART: [fht] Storing FHT @ 0x50003400
3,987,124 UART: [idev] ++
3,987,773 UART: [idev] CDI.KEYID = 6
3,988,686 UART: [idev] SUBJECT.KEYID = 7
3,989,920 UART: [idev] UDS.KEYID = 0
3,990,996 ready_for_fw is high
3,991,213 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,710 UART: [idev] Erasing UDS.KEYID = 0
7,329,072 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,663 UART: [idev] --
7,353,225 UART: [ldev] ++
7,353,846 UART: [ldev] CDI.KEYID = 6
7,354,801 UART: [ldev] SUBJECT.KEYID = 5
7,356,006 UART: [ldev] AUTHORITY.KEYID = 7
7,357,243 UART: [ldev] FE.KEYID = 1
7,394,363 UART: [ldev] Erasing FE.KEYID = 1
10,728,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,035,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,050,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,083,691 UART: [ldev] --
13,088,356 UART: [fwproc] Waiting for Commands...
13,089,957 UART: [fwproc] Received command 0x46574c44
13,092,133 UART: [fwproc] Received Image of size 114036 bytes
17,144,532 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,616 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,606,975 >>> mbox cmd response: success
17,607,961 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,610,937 UART: [afmc] ++
17,611,527 UART: [afmc] CDI.KEYID = 6
17,612,452 UART: [afmc] SUBJECT.KEYID = 7
17,613,710 UART: [afmc] AUTHORITY.KEYID = 5
20,984,526 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,442 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,868 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,681 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,111 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,318 UART: [afmc] --
23,352,585 UART: [cold-reset] --
23,355,949 UART: [state] Locking Datavault
23,361,247 UART: [state] Locking PCR0, PCR1 and PCR31
23,362,990 UART: [state] Locking ICCM
23,364,748 UART: [exit] Launching FMC @ 0x40000130
23,373,105 UART:
23,373,337 UART: Running Caliptra FMC ...
23,374,431 UART:
23,374,582 UART: [state] CFI Enabled
23,442,533 UART: [fht] FMC Alias Private Key: 7
25,779,640 UART: [art] Extend RT PCRs Done
25,780,859 UART: [art] Lock RT PCRs Done
25,782,593 UART: [art] Populate DV Done
25,788,218 UART: [fht] FMC Alias Private Key: 7
25,789,918 UART: [art] Derive CDI
25,790,733 UART: [art] Store in in slot 0x4
25,850,503 UART: [art] Derive Key Pair
25,851,535 UART: [art] Store priv key in slot 0x5
29,144,414 UART: [art] Derive Key Pair - Done
29,157,250 UART: [art] Signing Cert with AUTHO
29,158,546 UART: RITY.KEYID = 7
31,445,854 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,357 UART: [art] PUB.X = 8319FF64CFD7C5F64B91561C5D6D720A63F7394300B2F9D42872691E82E6DC268B6F4A722018DAF3D3D3AFBD4E1AEA8E
31,454,594 UART: [art] PUB.Y = 71BE3F5C8DD116EBEC0CA808E96AED26F2FFFC4D99B164664D1949AF3D5312F000DD4DB4C954DC62AD54F117715DF670
31,461,864 UART: [art] SIG.R = 6888A75DBD42D57B58151238E73BBF5F9DE93D8D1D9325C1BB8D185E44C2FAB893AB6A30B92EE1DD26F7535B898253E7
31,469,315 UART: [art] SIG.S = 8FE7F40220A1ECBD9CC2F0B9573EBF4F247281F442B3187A826BDABEBE7E79B14AA24AB6D6784191B3BDD0469DE9F500
32,775,082 UART: Caliptra RT
32,775,804 UART: [state] CFI Enabled
32,936,179 UART: [rt] RT listening for mailbox commands...
32,967,142 UART: [rt]cmd =0x43455246, len=4
32,980,141 >>> mbox cmd response data (920 bytes)
33,022,397 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,052,382 UART: [rt]cmd =0x43455252, len=4
33,063,909 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,783,836 ready_for_fw is high
3,784,259 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,862,695 >>> mbox cmd response: success
17,863,453 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,548,368 UART:
23,548,749 UART: Running Caliptra FMC ...
23,549,872 UART:
23,550,023 UART: [state] CFI Enabled
23,614,903 UART: [fht] FMC Alias Private Key: 7
25,952,764 UART: [art] Extend RT PCRs Done
25,953,990 UART: [art] Lock RT PCRs Done
25,955,717 UART: [art] Populate DV Done
25,960,975 UART: [fht] FMC Alias Private Key: 7
25,962,513 UART: [art] Derive CDI
25,963,239 UART: [art] Store in in slot 0x4
26,022,793 UART: [art] Derive Key Pair
26,023,839 UART: [art] Store priv key in slot 0x5
29,316,200 UART: [art] Derive Key Pair - Done
29,329,037 UART: [art] Signing Cert with AUTHO
29,330,338 UART: RITY.KEYID = 7
31,617,172 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,669 UART: [art] PUB.X = 9F7169260425EDD142A77016734095CCFCA5937A8CBB6D463890C468A46F05B04588A7216B7128FDBDF4A3637D4B4586
31,625,903 UART: [art] PUB.Y = 5092835CCE927F3B5F25E4A9DD64DB91FD9C6F192135FC98A137D34358CB5005EBE957B683279440B2F74FD46C2C50B2
31,633,119 UART: [art] SIG.R = 9DD0CFE566D484D8E85CBEDF5313FADDE69809D00F782F43C412D7D65B90958E980DC1C1B4A4BAAF05FE5856C9AD3626
31,640,577 UART: [art] SIG.S = 1B3C88B6B880B7A289AA9990507D8E2D076703ED27B33A84D8F6064CC00503CA2DD811A3D816798B5019CD35B197ED8D
32,946,255 UART: Caliptra RT
32,946,961 UART: [state] CFI Enabled
33,109,336 UART: [rt] RT listening for mailbox commands...
33,140,421 UART: [rt]cmd =0x43455246, len=4
33,153,367 >>> mbox cmd response data (920 bytes)
33,195,445 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,225,560 UART: [rt]cmd =0x43455252, len=4
33,237,035 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,522 UART:
192,904 UART: Running Caliptra ROM ...
194,083 UART:
603,810 UART: [state] CFI Enabled
616,906 UART: [state] LifecycleState = Unprovisioned
618,853 UART: [state] DebugLocked = No
621,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,313 UART: [kat] SHA2-256
796,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,625 UART: [kat] ++
807,070 UART: [kat] sha1
818,303 UART: [kat] SHA2-256
821,028 UART: [kat] SHA2-384
826,950 UART: [kat] SHA2-512-ACC
829,318 UART: [kat] ECC-384
3,112,980 UART: [kat] HMAC-384Kdf
3,125,879 UART: [kat] LMS
4,316,006 UART: [kat] --
4,319,076 UART: [cold-reset] ++
4,320,439 UART: [fht] Storing FHT @ 0x50003400
4,332,629 UART: [idev] ++
4,333,273 UART: [idev] CDI.KEYID = 6
4,334,181 UART: [idev] SUBJECT.KEYID = 7
4,335,447 UART: [idev] UDS.KEYID = 0
4,336,514 ready_for_fw is high
4,336,741 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,391 UART: [idev] Erasing UDS.KEYID = 0
7,620,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,254 UART: [idev] --
7,644,812 UART: [ldev] ++
7,645,424 UART: [ldev] CDI.KEYID = 6
7,646,333 UART: [ldev] SUBJECT.KEYID = 5
7,647,547 UART: [ldev] AUTHORITY.KEYID = 7
7,648,778 UART: [ldev] FE.KEYID = 1
7,660,502 UART: [ldev] Erasing FE.KEYID = 1
10,949,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,104 UART: [ldev] --
13,310,200 UART: [fwproc] Waiting for Commands...
13,313,374 UART: [fwproc] Received command 0x46574c44
13,315,608 UART: [fwproc] Received Image of size 114036 bytes
17,373,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,652 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,837,430 >>> mbox cmd response: success
17,837,937 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,841,517 UART: [afmc] ++
17,842,160 UART: [afmc] CDI.KEYID = 6
17,843,067 UART: [afmc] SUBJECT.KEYID = 7
17,844,281 UART: [afmc] AUTHORITY.KEYID = 5
21,155,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,994 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,267 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,683 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,505 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,938 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,618 UART: [afmc] --
23,524,016 UART: [cold-reset] --
23,528,092 UART: [state] Locking Datavault
23,533,930 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,627 UART: [state] Locking ICCM
23,537,938 UART: [exit] Launching FMC @ 0x40000130
23,546,333 UART:
23,546,573 UART: Running Caliptra FMC ...
23,547,673 UART:
23,547,834 UART: [state] CFI Enabled
23,555,343 UART: [fht] FMC Alias Private Key: 7
25,887,021 UART: [art] Extend RT PCRs Done
25,888,256 UART: [art] Lock RT PCRs Done
25,889,929 UART: [art] Populate DV Done
25,895,607 UART: [fht] FMC Alias Private Key: 7
25,897,251 UART: [art] Derive CDI
25,898,064 UART: [art] Store in in slot 0x4
25,940,389 UART: [art] Derive Key Pair
25,941,389 UART: [art] Store priv key in slot 0x5
29,183,551 UART: [art] Derive Key Pair - Done
29,196,595 UART: [art] Signing Cert with AUTHO
29,197,892 UART: RITY.KEYID = 7
31,477,089 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,601 UART: [art] PUB.X = 0486A8A7CBB30B8D8802801AB86B4C21CE61ED8841CD661A439B3290FF9A12152D1B8605DC6A475082902C8736C1D9C9
31,485,817 UART: [art] PUB.Y = 6482C0BE59A39DFF9EEF21125DC184C8BAC95C83E75AB6332E9569287E721A2B29F21601B41E01F056B59A62CE5BBFBD
31,493,067 UART: [art] SIG.R = 3C02FD1C3B6F1189E6CBB1172415B5DE2861E5B628B1E5DEC784FE84100811858EE9B5F3B6B21F90C36408DA317CC128
31,500,407 UART: [art] SIG.S = 6081BDDDCBF876CE4638FFAE40946C65DCB8EB263E091D2645ACA7C66001076670307BE56F313B2F4C1CD04914B4FF43
32,805,094 UART: Caliptra RT
32,805,832 UART: [state] CFI Enabled
32,923,325 UART: [rt] RT listening for mailbox commands...
32,954,227 UART: [rt]cmd =0x43455246, len=4
32,967,204 >>> mbox cmd response data (920 bytes)
33,009,615 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,039,728 UART: [rt]cmd =0x43455252, len=4
33,051,176 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,129,691 ready_for_fw is high
4,130,090 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,379 >>> mbox cmd response: success
18,075,033 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,710,094 UART:
23,710,489 UART: Running Caliptra FMC ...
23,711,589 UART:
23,711,763 UART: [state] CFI Enabled
23,719,764 UART: [fht] FMC Alias Private Key: 7
26,051,507 UART: [art] Extend RT PCRs Done
26,052,734 UART: [art] Lock RT PCRs Done
26,054,605 UART: [art] Populate DV Done
26,060,132 UART: [fht] FMC Alias Private Key: 7
26,061,616 UART: [art] Derive CDI
26,062,349 UART: [art] Store in in slot 0x4
26,105,113 UART: [art] Derive Key Pair
26,106,152 UART: [art] Store priv key in slot 0x5
29,347,916 UART: [art] Derive Key Pair - Done
29,361,240 UART: [art] Signing Cert with AUTHO
29,362,545 UART: RITY.KEYID = 7
31,641,966 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,463 UART: [art] PUB.X = 5556501FF85C25512349F27640C2D5B286216EECEB477AE93CDF7C57969409DB9529410B5C6B5012CDBD98F7C5E353F9
31,650,739 UART: [art] PUB.Y = 63D077E14BE271E93F1A5CB953DD491336A45A8225D7AB31F91913D4FE0B073FD26375B25BA17E22D59A7EAAB79C291B
31,657,954 UART: [art] SIG.R = 0A061317C1FA4A9827D776BEE6F47C8E243AFFD133E234A03C5B5063404DE9A3B4E9EC3B752610428FE62658F6BAF1BD
31,665,369 UART: [art] SIG.S = 147F1CE8A9FF1B7F0C0E3907541E47BFEE688D09AF9E5FDC1DDBC69E21E9D4AA72DD1FD0CFF11B00ABBD33CBF3E3884A
32,970,571 UART: Caliptra RT
32,971,282 UART: [state] CFI Enabled
33,087,763 UART: [rt] RT listening for mailbox commands...
33,118,692 UART: [rt]cmd =0x43455246, len=4
33,131,724 >>> mbox cmd response data (920 bytes)
33,173,848 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,203,906 UART: [rt]cmd =0x43455252, len=4
33,215,272 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,457 UART:
192,828 UART: Running Caliptra ROM ...
193,920 UART:
194,060 UART: [state] CFI Enabled
261,312 UART: [state] LifecycleState = Unprovisioned
263,164 UART: [state] DebugLocked = No
265,682 UART: [state] WD Timer not started. Device not locked for debugging
268,506 UART: [kat] SHA2-256
447,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,225 UART: [kat] ++
459,677 UART: [kat] sha1
470,709 UART: [kat] SHA2-256
473,724 UART: [kat] SHA2-384
480,073 UART: [kat] SHA2-512-ACC
483,016 UART: [kat] ECC-384
2,949,227 UART: [kat] HMAC-384Kdf
2,970,699 UART: [kat] LMS
3,500,134 UART: [kat] --
3,506,202 UART: [cold-reset] ++
3,508,281 UART: [fht] FHT @ 0x50003400
3,519,697 UART: [idev] ++
3,520,266 UART: [idev] CDI.KEYID = 6
3,521,176 UART: [idev] SUBJECT.KEYID = 7
3,522,425 UART: [idev] UDS.KEYID = 0
3,523,353 ready_for_fw is high
3,523,542 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,380 UART: [idev] Erasing UDS.KEYID = 0
6,025,445 UART: [idev] Sha1 KeyId Algorithm
6,049,368 UART: [idev] --
6,053,364 UART: [ldev] ++
6,053,995 UART: [ldev] CDI.KEYID = 6
6,054,892 UART: [ldev] SUBJECT.KEYID = 5
6,056,062 UART: [ldev] AUTHORITY.KEYID = 7
6,057,462 UART: [ldev] FE.KEYID = 1
6,098,913 UART: [ldev] Erasing FE.KEYID = 1
8,602,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,342 UART: [ldev] --
10,411,744 UART: [fwproc] Wait for Commands...
10,413,512 UART: [fwproc] Recv command 0x46574c44
10,415,622 UART: [fwproc] Recv'd Img size: 114360 bytes
13,817,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,276,740 >>> mbox cmd response: success
14,277,271 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,280,853 UART: [afmc] ++
14,281,439 UART: [afmc] CDI.KEYID = 6
14,282,358 UART: [afmc] SUBJECT.KEYID = 7
14,283,523 UART: [afmc] AUTHORITY.KEYID = 5
16,824,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,236 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,087 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,232 UART: [afmc] --
18,628,674 UART: [cold-reset] --
18,630,766 UART: [state] Locking Datavault
18,634,938 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,583 UART: [state] Locking ICCM
18,637,981 UART: [exit] Launching FMC @ 0x40000130
18,646,384 UART:
18,646,624 UART: Running Caliptra FMC ...
18,647,729 UART:
18,647,887 UART: [state] CFI Enabled
18,710,416 UART: [fht] FMC Alias Private Key: 7
20,474,712 UART: [art] Extend RT PCRs Done
20,475,934 UART: [art] Lock RT PCRs Done
20,477,884 UART: [art] Populate DV Done
20,483,188 UART: [fht] FMC Alias Private Key: 7
20,484,726 UART: [art] Derive CDI
20,485,564 UART: [art] Store in in slot 0x4
20,542,644 UART: [art] Derive Key Pair
20,543,686 UART: [art] Store priv key in slot 0x5
23,006,301 UART: [art] Derive Key Pair - Done
23,019,245 UART: [art] Signing Cert with AUTHO
23,020,582 UART: RITY.KEYID = 7
24,731,913 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,414 UART: [art] PUB.X = F4227DDFC28BFAB46E6D8BA67C4F5E65D5E07ADB22B81751828C48A14BAAF04B131D75884464CC9C5100D20A2108A838
24,740,655 UART: [art] PUB.Y = 62AEAEAC181C484BE3723DF468DF66500CED1B10448678518AAEA6C3987539E673CE10CC15C4DDECAFFC8E7541B274B7
24,747,933 UART: [art] SIG.R = 0886DE6874C19B13E2649B281E861B65E270B073725AC9A354A7CFAC3102A9EDA01EEECCF9DF262B8D622FF4228061F2
24,755,321 UART: [art] SIG.S = CD13E34C27AAC596EAFC30E4C281788178469964CA32C76A3A3E19B64BA32A9F0587850C7EB72D3C5F3A919EBA7EFE07
25,733,685 UART: Caliptra RT
25,734,387 UART: [state] CFI Enabled
25,898,730 UART: [rt] RT listening for mailbox commands...
25,929,815 UART: [rt]cmd =0x43455246, len=4
25,942,468 >>> mbox cmd response data (887 bytes)
25,984,837 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,014,814 UART: [rt]cmd =0x43455252, len=4
26,026,263 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,439 UART:
192,820 UART: Running Caliptra ROM ...
193,990 UART:
194,139 UART: [state] CFI Enabled
264,786 UART: [state] LifecycleState = Unprovisioned
267,222 UART: [state] DebugLocked = No
270,039 UART: [state] WD Timer not started. Device not locked for debugging
274,722 UART: [kat] SHA2-256
464,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,394 UART: [kat] ++
475,878 UART: [kat] sha1
487,279 UART: [kat] SHA2-256
490,361 UART: [kat] SHA2-384
495,786 UART: [kat] SHA2-512-ACC
498,369 UART: [kat] ECC-384
2,950,101 UART: [kat] HMAC-384Kdf
2,971,502 UART: [kat] LMS
3,503,290 UART: [kat] --
3,509,091 UART: [cold-reset] ++
3,510,967 UART: [fht] FHT @ 0x50003400
3,522,515 UART: [idev] ++
3,523,152 UART: [idev] CDI.KEYID = 6
3,524,133 UART: [idev] SUBJECT.KEYID = 7
3,525,378 UART: [idev] UDS.KEYID = 0
3,526,304 ready_for_fw is high
3,526,494 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,336 UART: [idev] Erasing UDS.KEYID = 0
6,030,951 UART: [idev] Sha1 KeyId Algorithm
6,053,143 UART: [idev] --
6,057,199 UART: [ldev] ++
6,057,889 UART: [ldev] CDI.KEYID = 6
6,058,807 UART: [ldev] SUBJECT.KEYID = 5
6,059,966 UART: [ldev] AUTHORITY.KEYID = 7
6,061,198 UART: [ldev] FE.KEYID = 1
6,100,594 UART: [ldev] Erasing FE.KEYID = 1
8,606,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,930 UART: [ldev] --
10,411,738 UART: [fwproc] Wait for Commands...
10,413,934 UART: [fwproc] Recv command 0x46574c44
10,416,242 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,612,862 >>> mbox cmd response: success
14,613,354 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,616,776 UART: [afmc] ++
14,617,502 UART: [afmc] CDI.KEYID = 6
14,618,610 UART: [afmc] SUBJECT.KEYID = 7
14,620,159 UART: [afmc] AUTHORITY.KEYID = 5
17,151,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,260 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,806 UART: [afmc] --
18,950,111 UART: [cold-reset] --
18,954,465 UART: [state] Locking Datavault
18,960,149 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,348 UART: [state] Locking ICCM
18,964,422 UART: [exit] Launching FMC @ 0x40000130
18,973,092 UART:
18,973,349 UART: Running Caliptra FMC ...
18,974,375 UART:
18,974,523 UART: [state] CFI Enabled
19,031,634 UART: [fht] FMC Alias Private Key: 7
20,795,203 UART: [art] Extend RT PCRs Done
20,796,425 UART: [art] Lock RT PCRs Done
20,798,507 UART: [art] Populate DV Done
20,804,078 UART: [fht] FMC Alias Private Key: 7
20,805,563 UART: [art] Derive CDI
20,806,294 UART: [art] Store in in slot 0x4
20,864,490 UART: [art] Derive Key Pair
20,865,521 UART: [art] Store priv key in slot 0x5
23,329,499 UART: [art] Derive Key Pair - Done
23,342,446 UART: [art] Signing Cert with AUTHO
23,343,745 UART: RITY.KEYID = 7
25,054,939 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,485 UART: [art] PUB.X = EE13BBEE2BD2A5451719C535D7657B87B716101BA85C40BAD01157EFD25078774D6F96E994A60C6A75B25DC75A267E22
25,063,676 UART: [art] PUB.Y = 86EE6B1D976D57C090F837157D56580B5252C461A29F97D5E918FCB2DAFF7B8342BB86C6AD456D48DC2A20109F6456A7
25,070,936 UART: [art] SIG.R = C723CC9BF7B8E01E238BA181EA9C8C89D9F550592EB140587A7CB63245C7E6CDC09A95894C579F36684FF4C253549FEE
25,078,335 UART: [art] SIG.S = 67C667571570EF61F2FEBFE0D823393D460A26C367FB58E0911BE4AB3048907DE13DDA8CC82AF027631513C36B5D022F
26,057,652 UART: Caliptra RT
26,058,364 UART: [state] CFI Enabled
26,222,728 UART: [rt] RT listening for mailbox commands...
26,253,874 UART: [rt]cmd =0x43455246, len=4
26,266,482 >>> mbox cmd response data (887 bytes)
26,308,502 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,338,471 UART: [rt]cmd =0x43455252, len=4
26,349,809 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
3,436,097 ready_for_fw is high
3,436,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,732,971 >>> mbox cmd response: success
14,733,624 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,019,148 UART:
19,019,542 UART: Running Caliptra FMC ...
19,020,652 UART:
19,020,807 UART: [state] CFI Enabled
19,090,067 UART: [fht] FMC Alias Private Key: 7
20,853,985 UART: [art] Extend RT PCRs Done
20,855,214 UART: [art] Lock RT PCRs Done
20,856,852 UART: [art] Populate DV Done
20,862,375 UART: [fht] FMC Alias Private Key: 7
20,863,918 UART: [art] Derive CDI
20,864,734 UART: [art] Store in in slot 0x4
20,922,406 UART: [art] Derive Key Pair
20,923,452 UART: [art] Store priv key in slot 0x5
23,386,729 UART: [art] Derive Key Pair - Done
23,399,943 UART: [art] Signing Cert with AUTHO
23,401,253 UART: RITY.KEYID = 7
25,111,306 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,812 UART: [art] PUB.X = 965C1293EC47D45F840A1DF305AAFA625ED6192D4C31057ABFFC32FCF38CE7408C89C2517517EEA6622EC8D493C07301
25,120,084 UART: [art] PUB.Y = 6BAFF4F69FFACB7CF96D0C0BAC307E2D32E155DCA02EDBE07726EF39BC837483F664248345A8DF3724024B29FBF98268
25,127,339 UART: [art] SIG.R = 24A0F29022D76EC2B6710F274837D8BE489CAA79CD3D22D191BBFF669956FA666A8CCA802E77CC17E470F5A232200E91
25,134,728 UART: [art] SIG.S = CD2BD902A27F433E15F1EB0C98FAA617AAE5CB03BEB2E1973221D1C29528A2714FD435EA48BB642C7218AF70CBEE796F
26,113,815 UART: Caliptra RT
26,114,534 UART: [state] CFI Enabled
26,280,503 UART: [rt] RT listening for mailbox commands...
26,311,762 UART: [rt]cmd =0x43455246, len=4
26,324,317 >>> mbox cmd response data (887 bytes)
26,366,400 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,396,294 UART: [rt]cmd =0x43455252, len=4
26,407,613 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,399 UART:
192,763 UART: Running Caliptra ROM ...
193,962 UART:
603,499 UART: [state] CFI Enabled
616,742 UART: [state] LifecycleState = Unprovisioned
619,113 UART: [state] DebugLocked = No
620,848 UART: [state] WD Timer not started. Device not locked for debugging
626,227 UART: [kat] SHA2-256
816,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,896 UART: [kat] ++
827,346 UART: [kat] sha1
837,859 UART: [kat] SHA2-256
840,864 UART: [kat] SHA2-384
847,136 UART: [kat] SHA2-512-ACC
849,713 UART: [kat] ECC-384
3,292,658 UART: [kat] HMAC-384Kdf
3,305,980 UART: [kat] LMS
3,837,837 UART: [kat] --
3,843,463 UART: [cold-reset] ++
3,845,038 UART: [fht] FHT @ 0x50003400
3,856,654 UART: [idev] ++
3,857,293 UART: [idev] CDI.KEYID = 6
3,858,325 UART: [idev] SUBJECT.KEYID = 7
3,859,496 UART: [idev] UDS.KEYID = 0
3,860,564 ready_for_fw is high
3,860,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,256 UART: [idev] Erasing UDS.KEYID = 0
6,341,189 UART: [idev] Sha1 KeyId Algorithm
6,363,710 UART: [idev] --
6,368,667 UART: [ldev] ++
6,369,402 UART: [ldev] CDI.KEYID = 6
6,370,467 UART: [ldev] SUBJECT.KEYID = 5
6,371,572 UART: [ldev] AUTHORITY.KEYID = 7
6,372,743 UART: [ldev] FE.KEYID = 1
6,383,658 UART: [ldev] Erasing FE.KEYID = 1
8,859,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,032 UART: [ldev] --
10,651,158 UART: [fwproc] Wait for Commands...
10,654,218 UART: [fwproc] Recv command 0x46574c44
10,656,522 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,832,346 >>> mbox cmd response: success
14,832,849 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,836,539 UART: [afmc] ++
14,837,235 UART: [afmc] CDI.KEYID = 6
14,838,469 UART: [afmc] SUBJECT.KEYID = 7
14,839,899 UART: [afmc] AUTHORITY.KEYID = 5
17,343,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,646 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,527 UART: [afmc] --
19,141,129 UART: [cold-reset] --
19,146,598 UART: [state] Locking Datavault
19,153,255 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,443 UART: [state] Locking ICCM
19,158,400 UART: [exit] Launching FMC @ 0x40000130
19,167,074 UART:
19,167,311 UART: Running Caliptra FMC ...
19,168,361 UART:
19,168,505 UART: [state] CFI Enabled
19,176,578 UART: [fht] FMC Alias Private Key: 7
20,932,873 UART: [art] Extend RT PCRs Done
20,934,091 UART: [art] Lock RT PCRs Done
20,935,982 UART: [art] Populate DV Done
20,941,298 UART: [fht] FMC Alias Private Key: 7
20,942,899 UART: [art] Derive CDI
20,943,648 UART: [art] Store in in slot 0x4
20,986,567 UART: [art] Derive Key Pair
20,987,607 UART: [art] Store priv key in slot 0x5
23,414,357 UART: [art] Derive Key Pair - Done
23,427,453 UART: [art] Signing Cert with AUTHO
23,428,753 UART: RITY.KEYID = 7
25,134,079 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,586 UART: [art] PUB.X = E566A63095338933F0CC0E24FBF83696B09BA8F2E6F954C2491F9B91935972CA663E9E78661432DA8931CEBDF065B1D4
25,142,820 UART: [art] PUB.Y = 984710C9387EA4923D8D986B2152E7F6F5EB8C392198018DFB0CB9031A6052A6ED97A5C022C0896BDBEEEF3C94E75E17
25,150,073 UART: [art] SIG.R = EC50F3E11C84A7A2B024556907A00863C93D87D4867D4E7D8D372DF51D47FAACB21B2F9E76A77552D216F3326CE43D4F
25,157,485 UART: [art] SIG.S = 93C9F87C39B900CEBD2A66D4D45BDEA0667BCBF385A492AF11D7589B8D319EB0A5FB7774021FBC8E3F7F8289EB586348
26,136,380 UART: Caliptra RT
26,137,064 UART: [state] CFI Enabled
26,256,114 UART: [rt] RT listening for mailbox commands...
26,287,258 UART: [rt]cmd =0x43455246, len=4
26,299,989 >>> mbox cmd response data (887 bytes)
26,342,146 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,372,119 UART: [rt]cmd =0x43455252, len=4
26,383,293 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,758,493 ready_for_fw is high
3,758,885 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,780 >>> mbox cmd response: success
14,959,444 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,205,074 UART:
19,205,471 UART: Running Caliptra FMC ...
19,206,593 UART:
19,206,752 UART: [state] CFI Enabled
19,215,094 UART: [fht] FMC Alias Private Key: 7
20,972,400 UART: [art] Extend RT PCRs Done
20,973,617 UART: [art] Lock RT PCRs Done
20,974,942 UART: [art] Populate DV Done
20,980,136 UART: [fht] FMC Alias Private Key: 7
20,981,683 UART: [art] Derive CDI
20,982,504 UART: [art] Store in in slot 0x4
21,025,362 UART: [art] Derive Key Pair
21,026,364 UART: [art] Store priv key in slot 0x5
23,452,845 UART: [art] Derive Key Pair - Done
23,465,783 UART: [art] Signing Cert with AUTHO
23,467,077 UART: RITY.KEYID = 7
25,172,228 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,742 UART: [art] PUB.X = 888AC489EF780B83EC4EF7022B54F23D55F1D724E3E04A398C0A0418CC22203D201192AE8564E64909FC6D949348B4FD
25,181,000 UART: [art] PUB.Y = 13359AD35CE3CB293D17CF5E9ABBEEC4B401D7A1A415C026A6E6942A74C759078388899204E348A04512532CB68E9120
25,188,446 UART: [art] SIG.R = F12F79A26BCBDE89A9411976CFA7DF39506AAA2F06A48BE932A28281CCF8707FCA533AE8D329FE1633DDE04C0FF50080
25,195,636 UART: [art] SIG.S = 61F9723B64EEF8192EB0C7295BA797A05A121DC93CC56B61F246CE673F9664DFF46FA02CAB476B361FAB6C0F45CEE12E
26,174,447 UART: Caliptra RT
26,175,140 UART: [state] CFI Enabled
26,291,335 UART: [rt] RT listening for mailbox commands...
26,322,406 UART: [rt]cmd =0x43455246, len=4
26,334,976 >>> mbox cmd response data (887 bytes)
26,377,121 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,407,218 UART: [rt]cmd =0x43455252, len=4
26,418,425 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,583 UART: [kat] SHA2-256
892,521 UART: [kat] SHA2-384
895,472 UART: [kat] SHA2-512-ACC
897,373 UART: [kat] ECC-384
902,952 UART: [kat] HMAC-384Kdf
907,468 UART: [kat] LMS
1,475,664 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,476,845 UART: [fht] Storing FHT @ 0x50003400
1,479,446 UART: [idev] ++
1,479,614 UART: [idev] CDI.KEYID = 6
1,479,974 UART: [idev] SUBJECT.KEYID = 7
1,480,398 UART: [idev] UDS.KEYID = 0
1,480,743 ready_for_fw is high
1,480,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,584 UART: [idev] Erasing UDS.KEYID = 0
1,504,568 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,034 UART: [idev] --
1,514,133 UART: [ldev] ++
1,514,301 UART: [ldev] CDI.KEYID = 6
1,514,664 UART: [ldev] SUBJECT.KEYID = 5
1,515,090 UART: [ldev] AUTHORITY.KEYID = 7
1,515,553 UART: [ldev] FE.KEYID = 1
1,520,787 UART: [ldev] Erasing FE.KEYID = 1
1,546,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,820 UART: [ldev] --
1,585,099 UART: [fwproc] Waiting for Commands...
1,585,934 UART: [fwproc] Received command 0x46574c44
1,586,725 UART: [fwproc] Received Image of size 114360 bytes
2,884,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,052 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,433 >>> mbox cmd response: success
3,077,433 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,527 UART: [afmc] ++
3,078,695 UART: [afmc] CDI.KEYID = 6
3,079,057 UART: [afmc] SUBJECT.KEYID = 7
3,079,482 UART: [afmc] AUTHORITY.KEYID = 5
3,114,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,147 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,540 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,230 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,983 UART: [afmc] --
3,157,879 UART: [cold-reset] --
3,158,689 UART: [state] Locking Datavault
3,159,916 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,520 UART: [state] Locking ICCM
3,161,176 UART: [exit] Launching FMC @ 0x40000130
3,166,505 UART:
3,166,521 UART: Running Caliptra FMC ...
3,166,929 UART:
3,166,983 UART: [state] CFI Enabled
3,177,372 UART: [fht] FMC Alias Private Key: 7
3,285,701 UART: [art] Extend RT PCRs Done
3,286,129 UART: [art] Lock RT PCRs Done
3,287,627 UART: [art] Populate DV Done
3,295,768 UART: [fht] FMC Alias Private Key: 7
3,296,790 UART: [art] Derive CDI
3,297,070 UART: [art] Store in in slot 0x4
3,382,581 UART: [art] Derive Key Pair
3,382,941 UART: [art] Store priv key in slot 0x5
3,395,821 UART: [art] Derive Key Pair - Done
3,410,666 UART: [art] Signing Cert with AUTHO
3,411,146 UART: RITY.KEYID = 7
3,426,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,033 UART: [art] PUB.X = E1AF4E8B38A2EB7675BB1F25E4EAAD3255C288E727A7DCDBA4B331B86CE833184115D3E02FE16F349A2FC4BCDFBD01E9
3,433,824 UART: [art] PUB.Y = 3DF8F0CBB863AA8C36156D36BCAE8B76CDAC7064B5BC3BFE1DB670C756EBF7E85AAC712BF44CEE113C8A3FA628007639
3,440,778 UART: [art] SIG.R = 6C49AD0DA6A0BDA4B1D26BB9CBE1C9E292F0B4E371E59B0DBB7883D3F8745216280A6CBC25464F4C920BAF004ADA006C
3,447,512 UART: [art] SIG.S = 35F71C1C1DD54D181DD904D7884908FB877A15CC97C503758137DDD8FF9ABDBB6237DDDC10A5B1565794951DA57D1078
3,471,408 UART: Caliptra RT
3,471,662 UART: [state] CFI Enabled
3,579,171 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,128 UART: [rt]cmd =0x43455246, len=4
3,621,619 >>> mbox cmd response data (920 bytes)
3,621,620 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,125 UART: [rt]cmd =0x43455252, len=4
3,662,037 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,761 ready_for_fw is high
1,361,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,609 >>> mbox cmd response: success
2,926,609 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,987,555 UART:
2,987,571 UART: Running Caliptra FMC ...
2,987,979 UART:
2,988,033 UART: [state] CFI Enabled
2,998,332 UART: [fht] FMC Alias Private Key: 7
3,105,657 UART: [art] Extend RT PCRs Done
3,106,085 UART: [art] Lock RT PCRs Done
3,107,697 UART: [art] Populate DV Done
3,116,050 UART: [fht] FMC Alias Private Key: 7
3,117,176 UART: [art] Derive CDI
3,117,456 UART: [art] Store in in slot 0x4
3,203,173 UART: [art] Derive Key Pair
3,203,533 UART: [art] Store priv key in slot 0x5
3,217,001 UART: [art] Derive Key Pair - Done
3,231,924 UART: [art] Signing Cert with AUTHO
3,232,404 UART: RITY.KEYID = 7
3,247,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,327 UART: [art] PUB.X = 7814CAD1089FCFF34E83E01D07D38B08ABE7D564F071154682376C4F6BFAD746B35AE35921B9E4BF4EB215F2440D8A2D
3,255,095 UART: [art] PUB.Y = 705396D500DFDAD7EE0BEF8CA8752701DF1A1BE1C1B53CB6BABFC9C94B0DEE91B64DB1C7FDF4B971BEABCBC6690E39C0
3,262,047 UART: [art] SIG.R = 9C3E45EF545B1D4F4FB58B66FB64F2021060D55B9CFD6CB287FEEB3A38BD346C8E21D25F59BEBF64AD9A7A069FA63788
3,268,831 UART: [art] SIG.S = 8145661426D3FC0EF794A51B12E370CC87159A61BA92CA27058083DB998E3D3C546686F839A04CBB10E6CB47B6200A6B
3,292,229 UART: Caliptra RT
3,292,483 UART: [state] CFI Enabled
3,400,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,893 UART: [rt]cmd =0x43455246, len=4
3,443,428 >>> mbox cmd response data (920 bytes)
3,443,429 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,670 UART: [rt]cmd =0x43455252, len=4
3,483,277 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,299 UART: [kat] SHA2-512-ACC
897,200 UART: [kat] ECC-384
902,533 UART: [kat] HMAC-384Kdf
907,309 UART: [kat] LMS
1,475,505 UART: [kat] --
1,476,612 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,479,783 UART: [idev] ++
1,479,951 UART: [idev] CDI.KEYID = 6
1,480,311 UART: [idev] SUBJECT.KEYID = 7
1,480,735 UART: [idev] UDS.KEYID = 0
1,481,080 ready_for_fw is high
1,481,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,871 UART: [idev] Erasing UDS.KEYID = 0
1,505,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,469 UART: [idev] --
1,515,482 UART: [ldev] ++
1,515,650 UART: [ldev] CDI.KEYID = 6
1,516,013 UART: [ldev] SUBJECT.KEYID = 5
1,516,439 UART: [ldev] AUTHORITY.KEYID = 7
1,516,902 UART: [ldev] FE.KEYID = 1
1,522,280 UART: [ldev] Erasing FE.KEYID = 1
1,547,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,527 UART: [ldev] --
1,586,916 UART: [fwproc] Waiting for Commands...
1,587,727 UART: [fwproc] Received command 0x46574c44
1,588,518 UART: [fwproc] Received Image of size 114360 bytes
2,885,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,493 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,638 >>> mbox cmd response: success
3,077,638 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,858 UART: [afmc] ++
3,079,026 UART: [afmc] CDI.KEYID = 6
3,079,388 UART: [afmc] SUBJECT.KEYID = 7
3,079,813 UART: [afmc] AUTHORITY.KEYID = 5
3,114,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,708 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,593 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,283 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,042 UART: [afmc] --
3,157,934 UART: [cold-reset] --
3,158,764 UART: [state] Locking Datavault
3,160,147 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,751 UART: [state] Locking ICCM
3,161,233 UART: [exit] Launching FMC @ 0x40000130
3,166,562 UART:
3,166,578 UART: Running Caliptra FMC ...
3,166,986 UART:
3,167,129 UART: [state] CFI Enabled
3,178,142 UART: [fht] FMC Alias Private Key: 7
3,286,123 UART: [art] Extend RT PCRs Done
3,286,551 UART: [art] Lock RT PCRs Done
3,288,315 UART: [art] Populate DV Done
3,296,484 UART: [fht] FMC Alias Private Key: 7
3,297,646 UART: [art] Derive CDI
3,297,926 UART: [art] Store in in slot 0x4
3,383,597 UART: [art] Derive Key Pair
3,383,957 UART: [art] Store priv key in slot 0x5
3,397,629 UART: [art] Derive Key Pair - Done
3,412,433 UART: [art] Signing Cert with AUTHO
3,412,913 UART: RITY.KEYID = 7
3,428,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,028 UART: [art] PUB.X = 08A0C1A1C52E910BEAAA98D26E2F700460ED02135765D59F02319C3386C578B85021CA3EDFADFCB85667DB63D7C42E49
3,435,791 UART: [art] PUB.Y = 1F34D81889321FE051F8E1A39FFBC489BC429DA99D1BDAA2B6F68FD3229A0F430E12F62196CB5F9A96CE30EE652F1570
3,442,747 UART: [art] SIG.R = 57EE122C69EDFF38DD4693DD228BBD87A5E62F6ECA5399D7B0E803E94693951BC7DD1FBC2A3E578EFFB26F3A21519D3D
3,449,534 UART: [art] SIG.S = F7FD12745A6C5D0DE75CF57C0E7954C93D66088F9D1C90D71E26F433F0FBF30496D519FB433A2B3F9EDB7E5354940C3B
3,473,338 UART: Caliptra RT
3,473,684 UART: [state] CFI Enabled
3,581,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,721 UART: [rt]cmd =0x43455246, len=4
3,624,166 >>> mbox cmd response data (920 bytes)
3,624,167 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,622 UART: [rt]cmd =0x43455252, len=4
3,664,380 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,002 ready_for_fw is high
1,363,002 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,108 >>> mbox cmd response: success
2,929,108 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,990,676 UART:
2,990,692 UART: Running Caliptra FMC ...
2,991,100 UART:
2,991,243 UART: [state] CFI Enabled
3,001,578 UART: [fht] FMC Alias Private Key: 7
3,109,333 UART: [art] Extend RT PCRs Done
3,109,761 UART: [art] Lock RT PCRs Done
3,111,413 UART: [art] Populate DV Done
3,119,534 UART: [fht] FMC Alias Private Key: 7
3,120,530 UART: [art] Derive CDI
3,120,810 UART: [art] Store in in slot 0x4
3,206,503 UART: [art] Derive Key Pair
3,206,863 UART: [art] Store priv key in slot 0x5
3,220,923 UART: [art] Derive Key Pair - Done
3,235,878 UART: [art] Signing Cert with AUTHO
3,236,358 UART: RITY.KEYID = 7
3,251,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,853 UART: [art] PUB.X = 4D1D6EC5ED925DAD943A509A684FDBFCCB631CB470F60875299B1361B86D54B59743D0BD6640330FE7F14CBBAA47F095
3,258,629 UART: [art] PUB.Y = FADD265A52AC979970AD373779DEF31A298AB7A557DCFBBA5D0F2DCE8ECE986E4C46E2D8347412D29C5C7BE1F8A07366
3,265,596 UART: [art] SIG.R = 307FDA61C569CA5B529DFF0DCA14A38E23C7A76D7EB86248E83765F2FF18577F2FAEC85082EE32AE662E16429EE8F500
3,272,353 UART: [art] SIG.S = 289ED285EE56AC9B2A508A72AB0E3137F1723E5946CE9309BEA62C4779F33197526ADF4251E70310EBFB49CD02139F43
3,296,666 UART: Caliptra RT
3,297,012 UART: [state] CFI Enabled
3,405,139 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,298 UART: [rt]cmd =0x43455246, len=4
3,447,633 >>> mbox cmd response data (920 bytes)
3,447,634 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,939 UART: [rt]cmd =0x43455252, len=4
3,487,831 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
893,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,853 UART: [kat] ++
898,005 UART: [kat] sha1
902,283 UART: [kat] SHA2-256
904,223 UART: [kat] SHA2-384
907,068 UART: [kat] SHA2-512-ACC
908,969 UART: [kat] ECC-384
918,648 UART: [kat] HMAC-384Kdf
923,266 UART: [kat] LMS
1,171,594 UART: [kat] --
1,172,709 UART: [cold-reset] ++
1,173,223 UART: [fht] FHT @ 0x50003400
1,175,762 UART: [idev] ++
1,175,930 UART: [idev] CDI.KEYID = 6
1,176,290 UART: [idev] SUBJECT.KEYID = 7
1,176,714 UART: [idev] UDS.KEYID = 0
1,177,059 ready_for_fw is high
1,177,059 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,372 UART: [idev] Erasing UDS.KEYID = 0
1,201,601 UART: [idev] Sha1 KeyId Algorithm
1,210,031 UART: [idev] --
1,210,967 UART: [ldev] ++
1,211,135 UART: [ldev] CDI.KEYID = 6
1,211,498 UART: [ldev] SUBJECT.KEYID = 5
1,211,924 UART: [ldev] AUTHORITY.KEYID = 7
1,212,387 UART: [ldev] FE.KEYID = 1
1,217,703 UART: [ldev] Erasing FE.KEYID = 1
1,243,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,777 UART: [ldev] --
1,283,276 UART: [fwproc] Wait for Commands...
1,283,930 UART: [fwproc] Recv command 0x46574c44
1,284,658 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,628 >>> mbox cmd response: success
2,774,628 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,678 UART: [afmc] ++
2,775,846 UART: [afmc] CDI.KEYID = 6
2,776,208 UART: [afmc] SUBJECT.KEYID = 7
2,776,633 UART: [afmc] AUTHORITY.KEYID = 5
2,812,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,625 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,155 UART: [afmc] --
2,856,221 UART: [cold-reset] --
2,857,283 UART: [state] Locking Datavault
2,858,688 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,292 UART: [state] Locking ICCM
2,859,714 UART: [exit] Launching FMC @ 0x40000130
2,865,043 UART:
2,865,059 UART: Running Caliptra FMC ...
2,865,467 UART:
2,865,521 UART: [state] CFI Enabled
2,875,826 UART: [fht] FMC Alias Private Key: 7
2,984,109 UART: [art] Extend RT PCRs Done
2,984,537 UART: [art] Lock RT PCRs Done
2,986,211 UART: [art] Populate DV Done
2,994,628 UART: [fht] FMC Alias Private Key: 7
2,995,782 UART: [art] Derive CDI
2,996,062 UART: [art] Store in in slot 0x4
3,081,771 UART: [art] Derive Key Pair
3,082,131 UART: [art] Store priv key in slot 0x5
3,094,877 UART: [art] Derive Key Pair - Done
3,109,870 UART: [art] Signing Cert with AUTHO
3,110,350 UART: RITY.KEYID = 7
3,125,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,255 UART: [art] PUB.X = 7417CB38AE5906D7261CD5048B9641A746EE005069A7F465B44D95563B013A2E39F93CF4950B357C2E16E8E9E822A088
3,132,985 UART: [art] PUB.Y = BCC621F36A4C8AE42039964A3017CE9547DBA1E6C2C413B036B5E811A5217D4AFF5BEB0CC825727089B6A1A62C5284B0
3,139,940 UART: [art] SIG.R = DED38D479FEF79E231889E0E0A980AF77A1F0883318529711C9E81ACF9B5FFC95E4D33155955145AA5E65EBE89EA2CCB
3,146,710 UART: [art] SIG.S = 3F0778858261A0452684896D908AABF2693B57F548A1266740AD5BAA12D7B047E20154F5E755895244D7E35F384B3F46
3,170,651 UART: Caliptra RT
3,170,905 UART: [state] CFI Enabled
3,279,703 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,752 UART: [rt]cmd =0x43455246, len=4
3,321,915 >>> mbox cmd response data (887 bytes)
3,321,916 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,319 UART: [rt]cmd =0x43455252, len=4
3,361,995 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,743 >>> mbox cmd response: success
2,624,743 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,687,065 UART:
2,687,081 UART: Running Caliptra FMC ...
2,687,489 UART:
2,687,543 UART: [state] CFI Enabled
2,697,850 UART: [fht] FMC Alias Private Key: 7
2,806,317 UART: [art] Extend RT PCRs Done
2,806,745 UART: [art] Lock RT PCRs Done
2,808,495 UART: [art] Populate DV Done
2,816,760 UART: [fht] FMC Alias Private Key: 7
2,817,784 UART: [art] Derive CDI
2,818,064 UART: [art] Store in in slot 0x4
2,903,499 UART: [art] Derive Key Pair
2,903,859 UART: [art] Store priv key in slot 0x5
2,916,829 UART: [art] Derive Key Pair - Done
2,931,397 UART: [art] Signing Cert with AUTHO
2,931,877 UART: RITY.KEYID = 7
2,947,285 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,050 UART: [art] PUB.X = CCF6F0F92567C695FF0E91F785F37DEC3B67FCB4ACB9A4201C94BBD13A91BA4C3B15DCDD36702D8A699A48F608F2C2BC
2,954,838 UART: [art] PUB.Y = F015E25533E8ECF7771126F3797F35A04106E59AF6B4B9A1CD7250E70A8844A06FA5425F353CCF4A184A0C23D829E04E
2,961,781 UART: [art] SIG.R = 9B790E38CF5D87958A1699A91D00D93D9B70002EC250AA663A2EA958F0A2CB3DA28514461E1E9C18E293175453551F78
2,968,500 UART: [art] SIG.S = D645A0EF92DBAD1C5FFB3D6531DB44BB3711953A7AD2D7648EF8EFC333A011010C0DE8E063A5A67803AE50D1A8B571AA
2,992,335 UART: Caliptra RT
2,992,589 UART: [state] CFI Enabled
3,099,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,045 UART: [rt]cmd =0x43455246, len=4
3,142,086 >>> mbox cmd response data (887 bytes)
3,142,087 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,396 UART: [rt]cmd =0x43455252, len=4
3,182,053 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,169 UART: [kat] HMAC-384Kdf
922,935 UART: [kat] LMS
1,171,263 UART: [kat] --
1,172,030 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,253 UART: [idev] ++
1,175,421 UART: [idev] CDI.KEYID = 6
1,175,781 UART: [idev] SUBJECT.KEYID = 7
1,176,205 UART: [idev] UDS.KEYID = 0
1,176,550 ready_for_fw is high
1,176,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,649 UART: [idev] Erasing UDS.KEYID = 0
1,202,230 UART: [idev] Sha1 KeyId Algorithm
1,210,906 UART: [idev] --
1,211,814 UART: [ldev] ++
1,211,982 UART: [ldev] CDI.KEYID = 6
1,212,345 UART: [ldev] SUBJECT.KEYID = 5
1,212,771 UART: [ldev] AUTHORITY.KEYID = 7
1,213,234 UART: [ldev] FE.KEYID = 1
1,218,584 UART: [ldev] Erasing FE.KEYID = 1
1,245,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,270 UART: [ldev] --
1,284,743 UART: [fwproc] Wait for Commands...
1,285,437 UART: [fwproc] Recv command 0x46574c44
1,286,165 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,205 >>> mbox cmd response: success
2,776,205 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,777,353 UART: [afmc] ++
2,777,521 UART: [afmc] CDI.KEYID = 6
2,777,883 UART: [afmc] SUBJECT.KEYID = 7
2,778,308 UART: [afmc] AUTHORITY.KEYID = 5
2,813,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,189 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,908 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,902 UART: [afmc] --
2,856,796 UART: [cold-reset] --
2,857,700 UART: [state] Locking Datavault
2,858,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,315 UART: [state] Locking ICCM
2,859,895 UART: [exit] Launching FMC @ 0x40000130
2,865,224 UART:
2,865,240 UART: Running Caliptra FMC ...
2,865,648 UART:
2,865,791 UART: [state] CFI Enabled
2,876,540 UART: [fht] FMC Alias Private Key: 7
2,984,637 UART: [art] Extend RT PCRs Done
2,985,065 UART: [art] Lock RT PCRs Done
2,986,975 UART: [art] Populate DV Done
2,995,134 UART: [fht] FMC Alias Private Key: 7
2,996,144 UART: [art] Derive CDI
2,996,424 UART: [art] Store in in slot 0x4
3,082,025 UART: [art] Derive Key Pair
3,082,385 UART: [art] Store priv key in slot 0x5
3,095,587 UART: [art] Derive Key Pair - Done
3,110,348 UART: [art] Signing Cert with AUTHO
3,110,828 UART: RITY.KEYID = 7
3,126,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,537 UART: [art] PUB.X = 9E60B8629DA6E55ACB8C3EC5E58A23D2BB168165CF8B19511A5C1574FE99F3DA0BA11E9BA3DAB7F3A28823C1932D27A1
3,134,320 UART: [art] PUB.Y = E0BBF12EF41335869548182C8DA246B1E313B065FFD13EB60B3591A7F0B5E2F7D90E3C64D336BAA86D0B2CB898696CB6
3,141,271 UART: [art] SIG.R = BB7336305A6DC4B269A3654DD408B4C23275FB7F4B133FE8B8E9F93E7FDB698C679EC734DF2D7B563F07874E40C08974
3,148,041 UART: [art] SIG.S = CC73665F682A29F363E89617AD47B52B11DC63FAC0A2F0A7AA16D195F8D143F39F0E198E2964E02259BB033471D1478E
3,171,352 UART: Caliptra RT
3,171,698 UART: [state] CFI Enabled
3,279,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,472 UART: [rt]cmd =0x43455246, len=4
3,321,437 >>> mbox cmd response data (887 bytes)
3,321,438 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,749 UART: [rt]cmd =0x43455252, len=4
3,361,640 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,294 ready_for_fw is high
1,061,294 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,836 >>> mbox cmd response: success
2,626,836 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,689,160 UART:
2,689,176 UART: Running Caliptra FMC ...
2,689,584 UART:
2,689,727 UART: [state] CFI Enabled
2,700,556 UART: [fht] FMC Alias Private Key: 7
2,808,581 UART: [art] Extend RT PCRs Done
2,809,009 UART: [art] Lock RT PCRs Done
2,810,713 UART: [art] Populate DV Done
2,818,908 UART: [fht] FMC Alias Private Key: 7
2,819,894 UART: [art] Derive CDI
2,820,174 UART: [art] Store in in slot 0x4
2,905,907 UART: [art] Derive Key Pair
2,906,267 UART: [art] Store priv key in slot 0x5
2,919,555 UART: [art] Derive Key Pair - Done
2,934,263 UART: [art] Signing Cert with AUTHO
2,934,743 UART: RITY.KEYID = 7
2,949,771 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,536 UART: [art] PUB.X = 2AD8B57BA28408E3BF6464CF991B6394F48B3673416EC6CFCB7A99005D648A543E52C2F284427AA062B1ED68D7A22425
2,957,283 UART: [art] PUB.Y = CCA1CDD6082BCA09A31328F42E397A784105C9A4EF57B36C5D736F5A406C75CBF055B333DE76A7431D8435F326ECD053
2,964,232 UART: [art] SIG.R = FD07633513A020661944ACB19A2D72EECF36101C5D77E418718ACA8B67F081DA8E4049CC0C60E5E8A3ADFDBE5D307872
2,971,006 UART: [art] SIG.S = B36F994A6AB94DEDB66CF4809FA989A0268A0E39621496E766179C40F554FAFAFD6A1ADF1691373825228CB29A7932B0
2,994,884 UART: Caliptra RT
2,995,230 UART: [state] CFI Enabled
3,103,593 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,528 UART: [rt]cmd =0x43455246, len=4
3,145,629 >>> mbox cmd response data (887 bytes)
3,145,630 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,889 UART: [rt]cmd =0x43455252, len=4
3,185,908 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,333 UART: [kat] SHA2-256
901,273 UART: [kat] SHA2-384
903,956 UART: [kat] SHA2-512-ACC
905,857 UART: [kat] ECC-384
915,424 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,405 UART: [cold-reset] ++
1,169,811 UART: [fht] FHT @ 0x50003400
1,172,489 UART: [idev] ++
1,172,657 UART: [idev] CDI.KEYID = 6
1,173,018 UART: [idev] SUBJECT.KEYID = 7
1,173,443 UART: [idev] UDS.KEYID = 0
1,173,789 ready_for_fw is high
1,173,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,247 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,842 UART: [ldev] --
1,280,338 UART: [fwproc] Wait for Commands...
1,280,993 UART: [fwproc] Recv command 0x46574c44
1,281,726 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,494 >>> mbox cmd response: success
2,770,494 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,771,583 UART: [afmc] ++
2,771,751 UART: [afmc] CDI.KEYID = 6
2,772,114 UART: [afmc] SUBJECT.KEYID = 7
2,772,540 UART: [afmc] AUTHORITY.KEYID = 5
2,807,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,440 UART: [afmc] --
2,850,498 UART: [cold-reset] --
2,851,464 UART: [state] Locking Datavault
2,852,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,155 UART: [state] Locking ICCM
2,853,759 UART: [exit] Launching FMC @ 0x40000130
2,859,088 UART:
2,859,104 UART: Running Caliptra FMC ...
2,859,512 UART:
2,859,566 UART: [state] CFI Enabled
2,869,981 UART: [fht] FMC Alias Private Key: 7
2,978,042 UART: [art] Extend RT PCRs Done
2,978,470 UART: [art] Lock RT PCRs Done
2,979,950 UART: [art] Populate DV Done
2,988,339 UART: [fht] FMC Alias Private Key: 7
2,989,459 UART: [art] Derive CDI
2,989,739 UART: [art] Store in in slot 0x4
3,075,576 UART: [art] Derive Key Pair
3,075,936 UART: [art] Store priv key in slot 0x5
3,089,368 UART: [art] Derive Key Pair - Done
3,103,928 UART: [art] Signing Cert with AUTHO
3,104,408 UART: RITY.KEYID = 7
3,119,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,431 UART: [art] PUB.X = DD37ECBD29C18D72411679021BA2C2082C244F72D0F1408FA87BB8F85951057341B81C7175FD831A4F749D69F90F121A
3,127,187 UART: [art] PUB.Y = 28967BE836DD5CF35A1D5222D38A2D328883B0A74D4F4B5AF4981D7E56520437562E159B2CAC350A182C9AF4F866A56F
3,134,133 UART: [art] SIG.R = CBCD4D97B32B39EE0CD801B11952720083F0AD5C42537C0557E198D88DF60BFC04CA79E6EA1D59C608633C1ECF6CFA80
3,140,877 UART: [art] SIG.S = 0792AAF3C1A1511A4297F8223DB340F4795750BE1B96C036186276A62D02B1F364955834372FA96CF8BFE095D4C6140E
3,164,845 UART: Caliptra RT
3,165,099 UART: [state] CFI Enabled
3,273,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,546 UART: [rt]cmd =0x43455246, len=4
3,315,389 >>> mbox cmd response data (887 bytes)
3,315,390 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,719 UART: [rt]cmd =0x43455252, len=4
3,355,601 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,300 ready_for_fw is high
1,056,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,614 >>> mbox cmd response: success
2,622,614 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,246 UART:
2,684,262 UART: Running Caliptra FMC ...
2,684,670 UART:
2,684,724 UART: [state] CFI Enabled
2,694,871 UART: [fht] FMC Alias Private Key: 7
2,802,722 UART: [art] Extend RT PCRs Done
2,803,150 UART: [art] Lock RT PCRs Done
2,804,580 UART: [art] Populate DV Done
2,812,907 UART: [fht] FMC Alias Private Key: 7
2,814,001 UART: [art] Derive CDI
2,814,281 UART: [art] Store in in slot 0x4
2,900,332 UART: [art] Derive Key Pair
2,900,692 UART: [art] Store priv key in slot 0x5
2,913,508 UART: [art] Derive Key Pair - Done
2,928,265 UART: [art] Signing Cert with AUTHO
2,928,745 UART: RITY.KEYID = 7
2,944,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,016 UART: [art] PUB.X = B1670F5F4E4C2F8392F4A6CC3E9F6362541A764FEB94D6469C7B3229679455C135299494290E688B161B2E83858B3A44
2,951,770 UART: [art] PUB.Y = A4968C016940401E35286A7E6241D52F0F6667731F08F666069BC192877C0506E223450163503DDDD5D9C54A89CD2AA0
2,958,687 UART: [art] SIG.R = E4EA9E5510EDD900516F37C2AA1890E9B1ED5C0265FD677D75B4B420AE774DB1C8671CDE18912B0E4A096D8733778FFC
2,965,436 UART: [art] SIG.S = FC10F6B92C8800BEAB0705055AFED4111B1FFA86880B4A1BB39736D42688C9B7010B53B0B9C97407CA9BE3B89AF658F4
2,989,008 UART: Caliptra RT
2,989,262 UART: [state] CFI Enabled
3,097,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,144 UART: [rt]cmd =0x43455246, len=4
3,139,071 >>> mbox cmd response data (887 bytes)
3,139,072 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,701 UART: [rt]cmd =0x43455252, len=4
3,179,522 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,556 UART: [kat] ++
895,708 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,174,566 ready_for_fw is high
1,174,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,355 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,091 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,415 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,065 >>> mbox cmd response: success
2,773,065 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,774,234 UART: [afmc] ++
2,774,402 UART: [afmc] CDI.KEYID = 6
2,774,765 UART: [afmc] SUBJECT.KEYID = 7
2,775,191 UART: [afmc] AUTHORITY.KEYID = 5
2,811,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,007 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,567 UART: [afmc] --
2,854,575 UART: [cold-reset] --
2,855,611 UART: [state] Locking Datavault
2,857,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,786 UART: [state] Locking ICCM
2,858,248 UART: [exit] Launching FMC @ 0x40000130
2,863,577 UART:
2,863,593 UART: Running Caliptra FMC ...
2,864,001 UART:
2,864,144 UART: [state] CFI Enabled
2,874,273 UART: [fht] FMC Alias Private Key: 7
2,982,842 UART: [art] Extend RT PCRs Done
2,983,270 UART: [art] Lock RT PCRs Done
2,985,100 UART: [art] Populate DV Done
2,993,305 UART: [fht] FMC Alias Private Key: 7
2,994,381 UART: [art] Derive CDI
2,994,661 UART: [art] Store in in slot 0x4
3,080,688 UART: [art] Derive Key Pair
3,081,048 UART: [art] Store priv key in slot 0x5
3,094,646 UART: [art] Derive Key Pair - Done
3,109,465 UART: [art] Signing Cert with AUTHO
3,109,945 UART: RITY.KEYID = 7
3,125,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,034 UART: [art] PUB.X = 007BE8281A61EDC285F60E3036E0A94884CD93FB180B8C9BF7CCC1546FC332B0A8B36A485DF1D4FA160DB9D4AFF6D90D
3,132,788 UART: [art] PUB.Y = B369B69BFE09358E6816EA585EAF38594703F637BE5E0171061E058F8282D1AF79D54C612723C10E512A9283A7EE89AC
3,139,718 UART: [art] SIG.R = F181C9E3C60CB0715759B1100AB2ADFC13944471F4C9CE0826E010CF4763FC3E7A50AC88AC4E90B43927D358D66A7FCB
3,146,489 UART: [art] SIG.S = DB863B52BBB944D9855C9F6AC409F74386A315654BF447F105DAD0B34BE0BA0FD58E4DF4FBFA867BA8D47E03295AEF42
3,170,464 UART: Caliptra RT
3,170,810 UART: [state] CFI Enabled
3,278,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,246 UART: [rt]cmd =0x43455246, len=4
3,321,191 >>> mbox cmd response data (887 bytes)
3,321,192 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,591 UART: [rt]cmd =0x43455252, len=4
3,361,400 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,951 ready_for_fw is high
1,056,951 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,045 >>> mbox cmd response: success
2,624,045 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,687,013 UART:
2,687,029 UART: Running Caliptra FMC ...
2,687,437 UART:
2,687,580 UART: [state] CFI Enabled
2,698,179 UART: [fht] FMC Alias Private Key: 7
2,806,504 UART: [art] Extend RT PCRs Done
2,806,932 UART: [art] Lock RT PCRs Done
2,808,494 UART: [art] Populate DV Done
2,816,583 UART: [fht] FMC Alias Private Key: 7
2,817,679 UART: [art] Derive CDI
2,817,959 UART: [art] Store in in slot 0x4
2,903,420 UART: [art] Derive Key Pair
2,903,780 UART: [art] Store priv key in slot 0x5
2,917,020 UART: [art] Derive Key Pair - Done
2,931,987 UART: [art] Signing Cert with AUTHO
2,932,467 UART: RITY.KEYID = 7
2,947,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,582 UART: [art] PUB.X = 7C123A156B89A732747DA8A86D1F7BF618A5028B416F64D276A912F9262826FC00543C40246EDAA7FE39ACE3A75600E8
2,955,305 UART: [art] PUB.Y = D53FF131861A8FC7373CAE16A02DFD6D07347915D8FB746E1F15803D26734302303F2B6C33102C669255CDECB44889B2
2,962,247 UART: [art] SIG.R = AC9711EFC82D808EB4B93CA786D815B0493BE66406E96DE2290A8E02CFA885D723791DC54668557C4EEFE4DE9F1DBD85
2,969,020 UART: [art] SIG.S = 9E57D7AD5A3B78BA6DC864E2506182ED556841181996222DC537915C88D12C839483CD3E20ED223621F3322431A22541
2,992,861 UART: Caliptra RT
2,993,207 UART: [state] CFI Enabled
3,101,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,391 UART: [rt]cmd =0x43455246, len=4
3,143,366 >>> mbox cmd response data (887 bytes)
3,143,367 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,844 UART: [rt]cmd =0x43455252, len=4
3,183,585 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,416 UART:
192,787 UART: Running Caliptra ROM ...
193,988 UART:
194,139 UART: [state] CFI Enabled
262,120 UART: [state] LifecycleState = Unprovisioned
264,107 UART: [state] DebugLocked = No
266,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,200 UART: [kat] SHA2-256
439,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,452 UART: [kat] ++
450,894 UART: [kat] sha1
461,017 UART: [kat] SHA2-256
463,668 UART: [kat] SHA2-384
469,647 UART: [kat] SHA2-512-ACC
472,004 UART: [kat] ECC-384
2,768,596 UART: [kat] HMAC-384Kdf
2,800,871 UART: [kat] LMS
3,991,180 UART: [kat] --
3,994,192 UART: [cold-reset] ++
3,996,612 UART: [fht] Storing FHT @ 0x50003400
4,008,225 UART: [idev] ++
4,008,783 UART: [idev] CDI.KEYID = 6
4,009,774 UART: [idev] SUBJECT.KEYID = 7
4,011,013 UART: [idev] UDS.KEYID = 0
4,012,200 ready_for_fw is high
4,012,399 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,034 UART: [idev] Erasing UDS.KEYID = 0
7,348,458 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,683 UART: [idev] --
7,375,056 UART: [ldev] ++
7,375,668 UART: [ldev] CDI.KEYID = 6
7,376,630 UART: [ldev] SUBJECT.KEYID = 5
7,377,841 UART: [ldev] AUTHORITY.KEYID = 7
7,379,071 UART: [ldev] FE.KEYID = 1
7,425,541 UART: [ldev] Erasing FE.KEYID = 1
10,754,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,992 UART: [ldev] --
13,117,379 UART: [fwproc] Waiting for Commands...
13,119,785 UART: [fwproc] Received command 0x46574c44
13,121,958 UART: [fwproc] Received Image of size 114036 bytes
17,170,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,173 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,632,350 >>> mbox cmd response: success
17,632,872 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,637,856 UART: [afmc] ++
17,638,450 UART: [afmc] CDI.KEYID = 6
17,639,394 UART: [afmc] SUBJECT.KEYID = 7
17,640,608 UART: [afmc] AUTHORITY.KEYID = 5
21,009,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,403 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,658 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,069 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,890 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,355,281 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,376,475 UART: [afmc] --
23,379,726 UART: [cold-reset] --
23,384,668 UART: [state] Locking Datavault
23,390,028 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,720 UART: [state] Locking ICCM
23,392,922 UART: [exit] Launching FMC @ 0x40000130
23,401,302 UART:
23,401,547 UART: Running Caliptra FMC ...
23,402,568 UART:
23,402,706 UART: [state] CFI Enabled
23,471,131 UART: [fht] FMC Alias Private Key: 7
25,809,456 UART: [art] Extend RT PCRs Done
25,810,675 UART: [art] Lock RT PCRs Done
25,812,372 UART: [art] Populate DV Done
25,817,988 UART: [fht] FMC Alias Private Key: 7
25,819,531 UART: [art] Derive CDI
25,820,259 UART: [art] Store in in slot 0x4
25,879,308 UART: [art] Derive Key Pair
25,880,340 UART: [art] Store priv key in slot 0x5
29,173,580 UART: [art] Derive Key Pair - Done
29,186,932 UART: [art] Signing Cert with AUTHO
29,188,238 UART: RITY.KEYID = 7
31,475,478 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,551 UART: [art] PUB.X = 9870B9C122A03D20B450BF7201139BD9A68ED39B6B6E7391770DC16BFF9641F9BE90ADEA90401E72BFD12872D1D2E6EA
31,484,204 UART: [art] PUB.Y = 6401B62F5E9C7D8F86940FC2258ECF98D87030319791A7199879EA314DBB4D5B70BC21F71A357144AC28B93E182F2E70
31,491,421 UART: [art] SIG.R = 29212D60D6195C504ED343E1A09C40B00E4E0C624DF00334EC8C3F77CEA82670727ECD612531184E9485C195CF1AAA98
31,498,798 UART: [art] SIG.S = 29190A9888AE516ADDC0A9CAE79087D36AC7EE71EF5118794EB42590352FC7FF286505F32CD1DAD6B7C8F148DC0970C2
32,804,161 UART: Caliptra RT
32,804,871 UART: [state] CFI Enabled
32,972,615 UART: [rt] RT listening for mailbox commands...
33,003,779 UART: [rt]cmd =0x43455252, len=4
33,015,271 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,481 writing to cptra_bootfsm_go
3,783,761 ready_for_fw is high
3,784,387 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,868,454 >>> mbox cmd response: success
17,869,095 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,587,412 UART:
23,587,799 UART: Running Caliptra FMC ...
23,588,929 UART:
23,589,076 UART: [state] CFI Enabled
23,657,338 UART: [fht] FMC Alias Private Key: 7
25,994,362 UART: [art] Extend RT PCRs Done
25,995,592 UART: [art] Lock RT PCRs Done
25,997,154 UART: [art] Populate DV Done
26,002,483 UART: [fht] FMC Alias Private Key: 7
26,004,192 UART: [art] Derive CDI
26,005,005 UART: [art] Store in in slot 0x4
26,067,316 UART: [art] Derive Key Pair
26,068,316 UART: [art] Store priv key in slot 0x5
29,361,303 UART: [art] Derive Key Pair - Done
29,374,626 UART: [art] Signing Cert with AUTHO
29,375,930 UART: RITY.KEYID = 7
31,662,346 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,855 UART: [art] PUB.X = EF2FB7BD89F34B16480065F98D20AF3A1AE65AFD0F164119C6B8D332E850690D8BAC0A99C91BADEE30D722BB31A0D6FE
31,671,084 UART: [art] PUB.Y = 1E1D6F5AAEBFC158EA216A0F34EEAEFC4F4CD953420CDF6519BE48CC116D87C53614D08C97410228064EC9FBAAA8FD4E
31,678,403 UART: [art] SIG.R = 8104BD8ED0C2AA6D5B4391EC730CA614F6E168B2DB7F218F3B436EE7775212D1CAC7CAEE457ADC17D5E8F9BFED5C03D6
31,685,796 UART: [art] SIG.S = BB5227312F7A73E2A87D47B607772CE2F95CEEF89DEC3FC44B1A6ED244208C8EC25314F8DAB9B9B35A4C807674303166
32,991,502 UART: Caliptra RT
32,992,217 UART: [state] CFI Enabled
33,152,298 UART: [rt] RT listening for mailbox commands...
33,183,282 UART: [rt]cmd =0x43455252, len=4
33,194,467 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,589 UART:
192,934 UART: Running Caliptra ROM ...
194,030 UART:
603,562 UART: [state] CFI Enabled
616,176 UART: [state] LifecycleState = Unprovisioned
618,146 UART: [state] DebugLocked = No
620,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,489 UART: [kat] SHA2-256
795,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,731 UART: [kat] ++
806,181 UART: [kat] sha1
816,698 UART: [kat] SHA2-256
819,415 UART: [kat] SHA2-384
825,115 UART: [kat] SHA2-512-ACC
827,487 UART: [kat] ECC-384
3,111,596 UART: [kat] HMAC-384Kdf
3,125,108 UART: [kat] LMS
4,315,251 UART: [kat] --
4,318,541 UART: [cold-reset] ++
4,321,106 UART: [fht] Storing FHT @ 0x50003400
4,332,721 UART: [idev] ++
4,333,310 UART: [idev] CDI.KEYID = 6
4,334,218 UART: [idev] SUBJECT.KEYID = 7
4,335,469 UART: [idev] UDS.KEYID = 0
4,336,452 ready_for_fw is high
4,336,648 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,868 UART: [idev] Erasing UDS.KEYID = 0
7,624,037 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,759 UART: [idev] --
7,651,614 UART: [ldev] ++
7,652,234 UART: [ldev] CDI.KEYID = 6
7,653,114 UART: [ldev] SUBJECT.KEYID = 5
7,654,372 UART: [ldev] AUTHORITY.KEYID = 7
7,655,655 UART: [ldev] FE.KEYID = 1
7,668,538 UART: [ldev] Erasing FE.KEYID = 1
10,957,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,719 UART: [ldev] --
13,318,191 UART: [fwproc] Waiting for Commands...
13,320,654 UART: [fwproc] Received command 0x46574c44
13,322,884 UART: [fwproc] Received Image of size 114036 bytes
17,375,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,836,352 >>> mbox cmd response: success
17,836,888 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,840,649 UART: [afmc] ++
17,841,282 UART: [afmc] CDI.KEYID = 6
17,842,162 UART: [afmc] SUBJECT.KEYID = 7
17,843,429 UART: [afmc] AUTHORITY.KEYID = 5
21,159,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,111 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,470 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,303 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,499,696 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,521,565 UART: [afmc] --
23,525,547 UART: [cold-reset] --
23,528,814 UART: [state] Locking Datavault
23,533,410 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,162 UART: [state] Locking ICCM
23,537,498 UART: [exit] Launching FMC @ 0x40000130
23,545,835 UART:
23,546,070 UART: Running Caliptra FMC ...
23,547,170 UART:
23,547,323 UART: [state] CFI Enabled
23,555,495 UART: [fht] FMC Alias Private Key: 7
25,886,165 UART: [art] Extend RT PCRs Done
25,887,382 UART: [art] Lock RT PCRs Done
25,889,111 UART: [art] Populate DV Done
25,894,413 UART: [fht] FMC Alias Private Key: 7
25,895,949 UART: [art] Derive CDI
25,896,758 UART: [art] Store in in slot 0x4
25,938,812 UART: [art] Derive Key Pair
25,939,854 UART: [art] Store priv key in slot 0x5
29,181,924 UART: [art] Derive Key Pair - Done
29,195,020 UART: [art] Signing Cert with AUTHO
29,196,320 UART: RITY.KEYID = 7
31,475,781 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,287 UART: [art] PUB.X = 6784734F086145FE1FACD49060B97DA0E1FCEDB14135A3B8BA3D34DB21DE2251753A88F28A59803CD3667E519D08212A
31,484,515 UART: [art] PUB.Y = 746B0EE5F091B2550273BD7CEAE8FEAA23FE83529A08D12F47B18027DC898BB57BEB63343D6223801C1B01A7CBB7F44C
31,491,786 UART: [art] SIG.R = C91BE15D1D2C3048238FBE051B52755DE7BE859EA437492149A808775A863762207D14126ED62FAAF0ECDA287B3CF7A8
31,499,182 UART: [art] SIG.S = 0FAFA7C6F91EB14195DBCC3F0BB8E5FA8C2028AB2199AC41DCF4923F90D4B2CF797B353A6B1F30D6C6DE82C60A0B52C9
32,804,915 UART: Caliptra RT
32,805,628 UART: [state] CFI Enabled
32,922,585 UART: [rt] RT listening for mailbox commands...
32,953,718 UART: [rt]cmd =0x43455252, len=4
32,965,163 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,124,908 ready_for_fw is high
4,125,478 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,075,320 >>> mbox cmd response: success
18,075,944 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,715,272 UART:
23,715,656 UART: Running Caliptra FMC ...
23,716,857 UART:
23,717,027 UART: [state] CFI Enabled
23,725,035 UART: [fht] FMC Alias Private Key: 7
26,056,435 UART: [art] Extend RT PCRs Done
26,057,683 UART: [art] Lock RT PCRs Done
26,059,319 UART: [art] Populate DV Done
26,064,689 UART: [fht] FMC Alias Private Key: 7
26,066,226 UART: [art] Derive CDI
26,067,044 UART: [art] Store in in slot 0x4
26,109,383 UART: [art] Derive Key Pair
26,110,429 UART: [art] Store priv key in slot 0x5
29,352,135 UART: [art] Derive Key Pair - Done
29,365,349 UART: [art] Signing Cert with AUTHO
29,366,658 UART: RITY.KEYID = 7
31,646,274 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,780 UART: [art] PUB.X = 6D0ADCD5A800002F389D662A87E0E86E41A65D3F3E161C31133BABA70BB96E9C66A4A1052114DCB8BA3C82F916084374
31,654,992 UART: [art] PUB.Y = 50A148FCDEC4F01C8788B3F3E9DF53BF513388D59B9764630F55BA57C0C05DEE4C75CF92B47601BE124D5E38098FBA80
31,662,245 UART: [art] SIG.R = 8C94EDB7D93BA6CC57EF789624E38FEA588A31C96B2BE5E78453D8DFBFD259FB7C22535959B308D1CC3811F2F0AE594F
31,669,664 UART: [art] SIG.S = C13DD8A3042DF567F2CBCC17E5F1F607BED762086475B46998D64496FE177830C5DE9676F684E8FF0942A6CAF66C6FAC
32,974,660 UART: Caliptra RT
32,975,392 UART: [state] CFI Enabled
33,093,621 UART: [rt] RT listening for mailbox commands...
33,124,772 UART: [rt]cmd =0x43455252, len=4
33,136,070 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
192,610 UART:
192,978 UART: Running Caliptra ROM ...
194,182 UART:
194,336 UART: [state] CFI Enabled
264,287 UART: [state] LifecycleState = Unprovisioned
266,133 UART: [state] DebugLocked = No
268,034 UART: [state] WD Timer not started. Device not locked for debugging
271,364 UART: [kat] SHA2-256
450,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,081 UART: [kat] ++
462,532 UART: [kat] sha1
473,684 UART: [kat] SHA2-256
476,763 UART: [kat] SHA2-384
483,675 UART: [kat] SHA2-512-ACC
486,677 UART: [kat] ECC-384
2,948,285 UART: [kat] HMAC-384Kdf
2,972,032 UART: [kat] LMS
3,501,461 UART: [kat] --
3,505,281 UART: [cold-reset] ++
3,507,008 UART: [fht] FHT @ 0x50003400
3,518,134 UART: [idev] ++
3,518,697 UART: [idev] CDI.KEYID = 6
3,519,617 UART: [idev] SUBJECT.KEYID = 7
3,520,790 UART: [idev] UDS.KEYID = 0
3,521,708 ready_for_fw is high
3,521,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,744 UART: [idev] Erasing UDS.KEYID = 0
6,026,051 UART: [idev] Sha1 KeyId Algorithm
6,047,940 UART: [idev] --
6,051,618 UART: [ldev] ++
6,052,193 UART: [ldev] CDI.KEYID = 6
6,053,109 UART: [ldev] SUBJECT.KEYID = 5
6,054,273 UART: [ldev] AUTHORITY.KEYID = 7
6,055,565 UART: [ldev] FE.KEYID = 1
6,100,073 UART: [ldev] Erasing FE.KEYID = 1
8,606,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,841 UART: [ldev] --
10,413,196 UART: [fwproc] Wait for Commands...
10,415,400 UART: [fwproc] Recv command 0x46574c44
10,417,494 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,279,140 >>> mbox cmd response: success
14,279,619 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,284,329 UART: [afmc] ++
14,284,916 UART: [afmc] CDI.KEYID = 6
14,285,826 UART: [afmc] SUBJECT.KEYID = 7
14,287,045 UART: [afmc] AUTHORITY.KEYID = 5
16,827,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,914 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,601,774 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,623,826 UART: [afmc] --
18,627,206 UART: [cold-reset] --
18,630,471 UART: [state] Locking Datavault
18,635,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,879 UART: [state] Locking ICCM
18,638,757 UART: [exit] Launching FMC @ 0x40000130
18,647,153 UART:
18,647,389 UART: Running Caliptra FMC ...
18,648,493 UART:
18,648,654 UART: [state] CFI Enabled
18,711,429 UART: [fht] FMC Alias Private Key: 7
20,475,637 UART: [art] Extend RT PCRs Done
20,476,853 UART: [art] Lock RT PCRs Done
20,478,440 UART: [art] Populate DV Done
20,483,798 UART: [fht] FMC Alias Private Key: 7
20,485,338 UART: [art] Derive CDI
20,486,154 UART: [art] Store in in slot 0x4
20,544,247 UART: [art] Derive Key Pair
20,545,288 UART: [art] Store priv key in slot 0x5
23,008,137 UART: [art] Derive Key Pair - Done
23,021,784 UART: [art] Signing Cert with AUTHO
23,023,099 UART: RITY.KEYID = 7
24,733,969 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,473 UART: [art] PUB.X = F93E371A79570E964623FEDF0B6A56FBD8D2BAF695165CFE243C9AF618157439FB64A80E36F225F762EAC733FCC940EB
24,742,784 UART: [art] PUB.Y = AE8023C57F83875959C3DB953F47E1C6079B744C4D89A6375086D2EF322BCE1E1356B04330FCE7D7C7D28F599F7D2BDC
24,750,009 UART: [art] SIG.R = 01889D6A03092D061E9A592DEF1E967ED870BDE508505F9C56A6ED7D3C7E6D1A63F561CEED49B07B2115E72F61AE7DA4
24,757,398 UART: [art] SIG.S = 2B4147E1023DE5339BEF67113EFD09D25983F7ADD5D5E32AD3C7093FC33CED716C7CC86340B078D32CBB37A168F7CDE9
25,736,396 UART: Caliptra RT
25,737,108 UART: [state] CFI Enabled
25,903,030 UART: [rt] RT listening for mailbox commands...
25,934,339 UART: [rt]cmd =0x43455252, len=4
25,945,689 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,439 UART:
192,812 UART: Running Caliptra ROM ...
194,023 UART:
194,185 UART: [state] CFI Enabled
270,623 UART: [state] LifecycleState = Unprovisioned
272,598 UART: [state] DebugLocked = No
274,844 UART: [state] WD Timer not started. Device not locked for debugging
279,594 UART: [kat] SHA2-256
469,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
480,250 UART: [kat] ++
480,736 UART: [kat] sha1
491,256 UART: [kat] SHA2-256
494,262 UART: [kat] SHA2-384
500,822 UART: [kat] SHA2-512-ACC
503,413 UART: [kat] ECC-384
2,950,118 UART: [kat] HMAC-384Kdf
2,975,375 UART: [kat] LMS
3,507,128 UART: [kat] --
3,511,925 UART: [cold-reset] ++
3,514,218 UART: [fht] FHT @ 0x50003400
3,526,616 UART: [idev] ++
3,527,264 UART: [idev] CDI.KEYID = 6
3,528,302 UART: [idev] SUBJECT.KEYID = 7
3,529,408 UART: [idev] UDS.KEYID = 0
3,530,338 ready_for_fw is high
3,530,547 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,674,475 UART: [idev] Erasing UDS.KEYID = 0
6,050,186 UART: [idev] Sha1 KeyId Algorithm
6,073,095 UART: [idev] --
6,077,361 UART: [ldev] ++
6,078,050 UART: [ldev] CDI.KEYID = 6
6,078,941 UART: [ldev] SUBJECT.KEYID = 5
6,080,154 UART: [ldev] AUTHORITY.KEYID = 7
6,081,391 UART: [ldev] FE.KEYID = 1
6,123,833 UART: [ldev] Erasing FE.KEYID = 1
8,632,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,366,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,382,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,397,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,412,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,859 UART: [ldev] --
10,437,998 UART: [fwproc] Wait for Commands...
10,440,054 UART: [fwproc] Recv command 0x46574c44
10,442,318 UART: [fwproc] Recv'd Img size: 114360 bytes
13,887,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,622,953 >>> mbox cmd response: success
14,623,459 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,626,995 UART: [afmc] ++
14,627,707 UART: [afmc] CDI.KEYID = 6
14,628,867 UART: [afmc] SUBJECT.KEYID = 7
14,630,350 UART: [afmc] AUTHORITY.KEYID = 5
17,176,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,920,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,922,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,937,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,953,036 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,968,071 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,992,827 UART: [afmc] --
18,996,135 UART: [cold-reset] --
19,001,302 UART: [state] Locking Datavault
19,006,507 UART: [state] Locking PCR0, PCR1 and PCR31
19,008,654 UART: [state] Locking ICCM
19,010,755 UART: [exit] Launching FMC @ 0x40000130
19,019,428 UART:
19,019,696 UART: Running Caliptra FMC ...
19,020,806 UART:
19,020,969 UART: [state] CFI Enabled
19,078,005 UART: [fht] FMC Alias Private Key: 7
20,842,195 UART: [art] Extend RT PCRs Done
20,843,419 UART: [art] Lock RT PCRs Done
20,844,795 UART: [art] Populate DV Done
20,850,540 UART: [fht] FMC Alias Private Key: 7
20,852,183 UART: [art] Derive CDI
20,852,920 UART: [art] Store in in slot 0x4
20,910,745 UART: [art] Derive Key Pair
20,911,780 UART: [art] Store priv key in slot 0x5
23,374,694 UART: [art] Derive Key Pair - Done
23,387,754 UART: [art] Signing Cert with AUTHO
23,389,066 UART: RITY.KEYID = 7
25,100,852 UART: [art] Erasing AUTHORITY.KEYID = 7
25,102,382 UART: [art] PUB.X = 5A8905E75932DDE601116D389C25CD4A885E571CBDC6BA53686BE1A532F6F3EB31427105DF6B06D43C34D8C0B2102ACB
25,109,677 UART: [art] PUB.Y = DFD007E37D04D620385AA96FA607BC178EBF3295D0518BE3FBA604BF0960D94D17DA395D056740D448891374F6CAB5A2
25,116,897 UART: [art] SIG.R = C2C268A0F3592E746250A3498D17E7E0C7BCD170F997121D8EF7A98B112449A07F6CBE9BADE6AA9A3C4E67389680E8F2
25,124,272 UART: [art] SIG.S = E2609FB2BA4027608019F1429E467855273BC83361710F622464189043845468A9D84FCD22E1C1D459E8D9D83DBDCB84
26,103,191 UART: Caliptra RT
26,103,884 UART: [state] CFI Enabled
26,269,995 UART: [rt] RT listening for mailbox commands...
26,301,051 UART: [rt]cmd =0x43455252, len=4
26,312,315 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,440,162 ready_for_fw is high
3,440,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,743,031 >>> mbox cmd response: success
14,743,777 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,029,729 UART:
19,030,123 UART: Running Caliptra FMC ...
19,031,238 UART:
19,031,394 UART: [state] CFI Enabled
19,093,992 UART: [fht] FMC Alias Private Key: 7
20,858,430 UART: [art] Extend RT PCRs Done
20,859,645 UART: [art] Lock RT PCRs Done
20,861,561 UART: [art] Populate DV Done
20,867,082 UART: [fht] FMC Alias Private Key: 7
20,868,738 UART: [art] Derive CDI
20,869,479 UART: [art] Store in in slot 0x4
20,926,085 UART: [art] Derive Key Pair
20,927,134 UART: [art] Store priv key in slot 0x5
23,389,251 UART: [art] Derive Key Pair - Done
23,402,316 UART: [art] Signing Cert with AUTHO
23,403,630 UART: RITY.KEYID = 7
25,114,996 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,494 UART: [art] PUB.X = 28B729C8C53FF7B0DDACA95A5FBB8C1A915D2D004C3995A26CDF341E94EAC87EC5F291DD06B57A50A3476AF2771CD7AF
25,123,786 UART: [art] PUB.Y = 6EF857084589C85C389BB44B5D4AF75B11F266378F99169B5592429D7A03F12AE58202D086D0AD7E67A16198481EBAD2
25,131,046 UART: [art] SIG.R = 748CBE0D6937AF106D9F477A285C0714C64246D9ED9B2F6100AE2E28A4C04122616048D88982C764160C96743C1E11A7
25,138,384 UART: [art] SIG.S = 066DEC170C327B3C710C946CDDD46AF9AE4D3CAE30AA0BB7B27A63E3A88E83C07999FE59D263E070376C69F1DB01B024
26,117,631 UART: Caliptra RT
26,118,348 UART: [state] CFI Enabled
26,281,771 UART: [rt] RT listening for mailbox commands...
26,312,645 UART: [rt]cmd =0x43455252, len=4
26,324,060 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,447 UART:
192,807 UART: Running Caliptra ROM ...
193,919 UART:
603,865 UART: [state] CFI Enabled
617,185 UART: [state] LifecycleState = Unprovisioned
619,568 UART: [state] DebugLocked = No
621,089 UART: [state] WD Timer not started. Device not locked for debugging
626,116 UART: [kat] SHA2-256
815,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,762 UART: [kat] ++
827,278 UART: [kat] sha1
838,149 UART: [kat] SHA2-256
841,151 UART: [kat] SHA2-384
847,633 UART: [kat] SHA2-512-ACC
850,220 UART: [kat] ECC-384
3,291,946 UART: [kat] HMAC-384Kdf
3,305,034 UART: [kat] LMS
3,836,855 UART: [kat] --
3,841,441 UART: [cold-reset] ++
3,842,944 UART: [fht] FHT @ 0x50003400
3,855,123 UART: [idev] ++
3,855,761 UART: [idev] CDI.KEYID = 6
3,856,755 UART: [idev] SUBJECT.KEYID = 7
3,857,929 UART: [idev] UDS.KEYID = 0
3,858,852 ready_for_fw is high
3,859,059 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,713 UART: [idev] Erasing UDS.KEYID = 0
6,336,484 UART: [idev] Sha1 KeyId Algorithm
6,358,852 UART: [idev] --
6,364,187 UART: [ldev] ++
6,364,873 UART: [ldev] CDI.KEYID = 6
6,365,782 UART: [ldev] SUBJECT.KEYID = 5
6,366,938 UART: [ldev] AUTHORITY.KEYID = 7
6,368,167 UART: [ldev] FE.KEYID = 1
6,379,641 UART: [ldev] Erasing FE.KEYID = 1
8,858,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,268 UART: [ldev] --
10,650,390 UART: [fwproc] Wait for Commands...
10,652,430 UART: [fwproc] Recv command 0x46574c44
10,654,685 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,836,327 >>> mbox cmd response: success
14,836,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,841,124 UART: [afmc] ++
14,841,840 UART: [afmc] CDI.KEYID = 6
14,843,029 UART: [afmc] SUBJECT.KEYID = 7
14,844,467 UART: [afmc] AUTHORITY.KEYID = 5
17,350,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,585 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
19,118,691 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
19,143,242 UART: [afmc] --
19,147,060 UART: [cold-reset] --
19,151,083 UART: [state] Locking Datavault
19,156,760 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,947 UART: [state] Locking ICCM
19,160,562 UART: [exit] Launching FMC @ 0x40000130
19,169,229 UART:
19,169,479 UART: Running Caliptra FMC ...
19,170,583 UART:
19,170,738 UART: [state] CFI Enabled
19,178,841 UART: [fht] FMC Alias Private Key: 7
20,935,379 UART: [art] Extend RT PCRs Done
20,936,600 UART: [art] Lock RT PCRs Done
20,938,192 UART: [art] Populate DV Done
20,943,767 UART: [fht] FMC Alias Private Key: 7
20,945,460 UART: [art] Derive CDI
20,946,192 UART: [art] Store in in slot 0x4
20,989,055 UART: [art] Derive Key Pair
20,990,090 UART: [art] Store priv key in slot 0x5
23,416,682 UART: [art] Derive Key Pair - Done
23,429,600 UART: [art] Signing Cert with AUTHO
23,430,941 UART: RITY.KEYID = 7
25,136,121 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,644 UART: [art] PUB.X = 9BE525343184AC7846A0492D9AF34E0CDBE642F8144E3CA44634A0E243C780FB967663DBFBE22E17943E6C328518AA4E
25,144,898 UART: [art] PUB.Y = D65F2E0120BBAB503F20564AA4F5368E401084214A3760FC101728E9F4220D323F92B863665B666DC654687D35C4DA4C
25,152,132 UART: [art] SIG.R = 4BB18E5719714C15F338B6536EDEBAB110D9BA8F1D23323BC642195B04C1F1396916AAB936C09361827DAF518CEA10E7
25,159,524 UART: [art] SIG.S = 7A832DB5C1D306738244C8C8A8EB110C8AA16E14A4CA47A67BCE659F12DC7BD3376D6721542ED0FE21530913914658CE
26,138,480 UART: Caliptra RT
26,139,188 UART: [state] CFI Enabled
26,256,753 UART: [rt] RT listening for mailbox commands...
26,287,780 UART: [rt]cmd =0x43455252, len=4
26,299,126 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,303 writing to cptra_bootfsm_go
3,748,571 ready_for_fw is high
3,748,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,940,328 >>> mbox cmd response: success
14,940,907 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,197,121 UART:
19,197,505 UART: Running Caliptra FMC ...
19,198,701 UART:
19,198,864 UART: [state] CFI Enabled
19,206,598 UART: [fht] FMC Alias Private Key: 7
20,963,624 UART: [art] Extend RT PCRs Done
20,964,847 UART: [art] Lock RT PCRs Done
20,966,739 UART: [art] Populate DV Done
20,972,142 UART: [fht] FMC Alias Private Key: 7
20,973,677 UART: [art] Derive CDI
20,974,451 UART: [art] Store in in slot 0x4
21,017,097 UART: [art] Derive Key Pair
21,018,101 UART: [art] Store priv key in slot 0x5
23,445,320 UART: [art] Derive Key Pair - Done
23,458,154 UART: [art] Signing Cert with AUTHO
23,459,460 UART: RITY.KEYID = 7
25,165,334 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,835 UART: [art] PUB.X = 3FEBAFDA499CD5FB28571E9C76E0816FF3FA226E683B8CE0B6008A874EB9EFD1ED70C0FC26605746DA0BFCD5E4C459CD
25,174,129 UART: [art] PUB.Y = 210BEF44CC28C2A9D1C8847B945C2F114602DD82F59969C4B8794E52685B80964AEFCA88C407339D2E5F0AFADAA609D7
25,181,378 UART: [art] SIG.R = 2D4B721BFB76E19DEA95A4C8562557CD5DC5BE6AF93DD0F95DB97F4E68621503352593A468B5B99B3653D1BF87CE004B
25,188,760 UART: [art] SIG.S = 780817D9E8B0E681B835A2F28020CA4F5B6EB737B373FF6B6E89C1E962D1D50C6C387683080EFDBEF57AAFEACAF2D9E9
26,167,835 UART: Caliptra RT
26,168,530 UART: [state] CFI Enabled
26,285,366 UART: [rt] RT listening for mailbox commands...
26,316,500 UART: [rt]cmd =0x43455252, len=4
26,327,794 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,758 UART: [state] LifecycleState = Unprovisioned
86,413 UART: [state] DebugLocked = No
87,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,861 UART: [kat] SHA2-256
882,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,907 UART: [kat] ++
887,059 UART: [kat] sha1
891,291 UART: [kat] SHA2-256
893,229 UART: [kat] SHA2-384
895,898 UART: [kat] SHA2-512-ACC
897,799 UART: [kat] ECC-384
903,488 UART: [kat] HMAC-384Kdf
908,116 UART: [kat] LMS
1,476,312 UART: [kat] --
1,477,331 UART: [cold-reset] ++
1,477,783 UART: [fht] Storing FHT @ 0x50003400
1,480,464 UART: [idev] ++
1,480,632 UART: [idev] CDI.KEYID = 6
1,480,992 UART: [idev] SUBJECT.KEYID = 7
1,481,416 UART: [idev] UDS.KEYID = 0
1,481,761 ready_for_fw is high
1,481,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,460 UART: [idev] Erasing UDS.KEYID = 0
1,505,882 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,418 UART: [idev] --
1,515,285 UART: [ldev] ++
1,515,453 UART: [ldev] CDI.KEYID = 6
1,515,816 UART: [ldev] SUBJECT.KEYID = 5
1,516,242 UART: [ldev] AUTHORITY.KEYID = 7
1,516,705 UART: [ldev] FE.KEYID = 1
1,521,863 UART: [ldev] Erasing FE.KEYID = 1
1,546,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,388 UART: [ldev] --
1,585,671 UART: [fwproc] Waiting for Commands...
1,586,516 UART: [fwproc] Received command 0x46574c44
1,587,307 UART: [fwproc] Received Image of size 114360 bytes
2,884,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,662 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,819 >>> mbox cmd response: success
3,077,819 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,079,177 UART: [afmc] ++
3,079,345 UART: [afmc] CDI.KEYID = 6
3,079,707 UART: [afmc] SUBJECT.KEYID = 7
3,080,132 UART: [afmc] AUTHORITY.KEYID = 5
3,115,193 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,739 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,132 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,149,844 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,157,700 UART: [afmc] --
3,158,606 UART: [cold-reset] --
3,159,586 UART: [state] Locking Datavault
3,160,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,483 UART: [state] Locking ICCM
3,161,995 UART: [exit] Launching FMC @ 0x40000130
3,167,324 UART:
3,167,340 UART: Running Caliptra FMC ...
3,167,748 UART:
3,167,802 UART: [state] CFI Enabled
3,178,413 UART: [fht] FMC Alias Private Key: 7
3,286,640 UART: [art] Extend RT PCRs Done
3,287,068 UART: [art] Lock RT PCRs Done
3,288,656 UART: [art] Populate DV Done
3,296,959 UART: [fht] FMC Alias Private Key: 7
3,298,117 UART: [art] Derive CDI
3,298,397 UART: [art] Store in in slot 0x4
3,384,196 UART: [art] Derive Key Pair
3,384,556 UART: [art] Store priv key in slot 0x5
3,397,940 UART: [art] Derive Key Pair - Done
3,412,822 UART: [art] Signing Cert with AUTHO
3,413,302 UART: RITY.KEYID = 7
3,428,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,035 UART: [art] PUB.X = 6BCE5277E8F182CF779D8D02DF43D2261A86FA3281F58C50662957829CF5BDDAE2E0D38B93D75D8985FE234E3DF89D30
3,435,810 UART: [art] PUB.Y = 87DB0A56FE5F2E9F90F0A359389A180FF8057CC812591EDDE6F7BAC294701FDEF8E898DDA8C4E9B96A1564487327100F
3,442,758 UART: [art] SIG.R = 30F5FBC839F2004616609597F22E1AC1A6D1680E9D30A0ADFDF6E533B265A2661C46820914D7B974D43E00ED5E35D1ED
3,449,482 UART: [art] SIG.S = F78A6AD8FEA67027BB55281D1239D774C48E34066082664A39AB882D45E247FEA2F1D36BFCD4DD29A99FA55084597BA6
3,473,508 UART: Caliptra RT
3,473,762 UART: [state] CFI Enabled
3,583,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,934 UART: [rt]cmd =0x43455252, len=4
3,624,804 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,007 ready_for_fw is high
1,363,007 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,421 >>> mbox cmd response: success
2,926,421 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,988,225 UART:
2,988,241 UART: Running Caliptra FMC ...
2,988,649 UART:
2,988,703 UART: [state] CFI Enabled
2,999,218 UART: [fht] FMC Alias Private Key: 7
3,106,819 UART: [art] Extend RT PCRs Done
3,107,247 UART: [art] Lock RT PCRs Done
3,108,627 UART: [art] Populate DV Done
3,116,946 UART: [fht] FMC Alias Private Key: 7
3,117,998 UART: [art] Derive CDI
3,118,278 UART: [art] Store in in slot 0x4
3,204,451 UART: [art] Derive Key Pair
3,204,811 UART: [art] Store priv key in slot 0x5
3,218,005 UART: [art] Derive Key Pair - Done
3,232,605 UART: [art] Signing Cert with AUTHO
3,233,085 UART: RITY.KEYID = 7
3,248,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,304 UART: [art] PUB.X = 56ABD3992BB717314E82A3DC5F820D87BCD9B3D5C877E4D00E7FC6B9BCF9ED40E33A57E0869618E23152F5D5803A04C8
3,256,075 UART: [art] PUB.Y = 7E12345EA87E8239E24DDF5EA7407E9AD38300A03C1854EB5F2221F0CFBB3C0E1F9BC24B7CD45FFFB70E6FC1175FD96B
3,263,017 UART: [art] SIG.R = 94F187F3EE762DBD422CA1742D3D9E3FAC337B67936DE276FB9DF3E447E1411DB2C118701109F4088F1FD1D468BB231C
3,269,789 UART: [art] SIG.S = D7FB24FF7A2AB9CB2D1D40F6AB79A472467432D3608F8EA52E934BE4A12D5258B3F8E1B9661CD4DE338A0C84D3074E73
3,294,294 UART: Caliptra RT
3,294,548 UART: [state] CFI Enabled
3,401,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,183 UART: [rt]cmd =0x43455252, len=4
3,442,860 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
891,020 UART: [kat] SHA2-256
892,958 UART: [kat] SHA2-384
895,685 UART: [kat] SHA2-512-ACC
897,586 UART: [kat] ECC-384
903,213 UART: [kat] HMAC-384Kdf
907,931 UART: [kat] LMS
1,476,127 UART: [kat] --
1,477,342 UART: [cold-reset] ++
1,477,882 UART: [fht] Storing FHT @ 0x50003400
1,480,699 UART: [idev] ++
1,480,867 UART: [idev] CDI.KEYID = 6
1,481,227 UART: [idev] SUBJECT.KEYID = 7
1,481,651 UART: [idev] UDS.KEYID = 0
1,481,996 ready_for_fw is high
1,481,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,621 UART: [idev] Erasing UDS.KEYID = 0
1,506,393 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,133 UART: [idev] --
1,516,368 UART: [ldev] ++
1,516,536 UART: [ldev] CDI.KEYID = 6
1,516,899 UART: [ldev] SUBJECT.KEYID = 5
1,517,325 UART: [ldev] AUTHORITY.KEYID = 7
1,517,788 UART: [ldev] FE.KEYID = 1
1,523,082 UART: [ldev] Erasing FE.KEYID = 1
1,548,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,733 UART: [ldev] --
1,588,144 UART: [fwproc] Waiting for Commands...
1,588,803 UART: [fwproc] Received command 0x46574c44
1,589,594 UART: [fwproc] Received Image of size 114360 bytes
2,887,131 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,221 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,573 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,490 >>> mbox cmd response: success
3,079,490 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,080,734 UART: [afmc] ++
3,080,902 UART: [afmc] CDI.KEYID = 6
3,081,264 UART: [afmc] SUBJECT.KEYID = 7
3,081,689 UART: [afmc] AUTHORITY.KEYID = 5
3,116,772 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,451 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,151,163 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,159,133 UART: [afmc] --
3,160,095 UART: [cold-reset] --
3,161,007 UART: [state] Locking Datavault
3,162,056 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,660 UART: [state] Locking ICCM
3,163,334 UART: [exit] Launching FMC @ 0x40000130
3,168,663 UART:
3,168,679 UART: Running Caliptra FMC ...
3,169,087 UART:
3,169,230 UART: [state] CFI Enabled
3,179,885 UART: [fht] FMC Alias Private Key: 7
3,287,792 UART: [art] Extend RT PCRs Done
3,288,220 UART: [art] Lock RT PCRs Done
3,289,920 UART: [art] Populate DV Done
3,298,209 UART: [fht] FMC Alias Private Key: 7
3,299,387 UART: [art] Derive CDI
3,299,667 UART: [art] Store in in slot 0x4
3,385,364 UART: [art] Derive Key Pair
3,385,724 UART: [art] Store priv key in slot 0x5
3,399,342 UART: [art] Derive Key Pair - Done
3,414,402 UART: [art] Signing Cert with AUTHO
3,414,882 UART: RITY.KEYID = 7
3,430,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,863 UART: [art] PUB.X = 2CAA95156A91ECDC76AC69EC780DFE3FF9DEC83906AEFE763A28ADB7DF24C067BF82D50FFB4471EE8F636508A8BAB190
3,437,647 UART: [art] PUB.Y = 6EAEF8B18A9237A961DCE0A8D1B8602061DB60783C7C91E22204EFDD4F6F3374A971E6606A12D8D238AF8CAEC83C0D2B
3,444,605 UART: [art] SIG.R = D7E1DD4D1B5890DC4697085FE8059739B027E35FFC2792DF01E5C884E6A2D2ACB28122A3E42A79358C842A7F30B4BE4B
3,451,374 UART: [art] SIG.S = 02824CA19521715D7F47E4C99C671808699C94FFC7A84ADB7048BE257C8FAAB7D1C6E26AB84303D6BB6B4D20AC7BBE8F
3,475,704 UART: Caliptra RT
3,476,050 UART: [state] CFI Enabled
3,584,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,910 UART: [rt]cmd =0x43455252, len=4
3,625,694 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,784 >>> mbox cmd response: success
2,927,784 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,988,890 UART:
2,988,906 UART: Running Caliptra FMC ...
2,989,314 UART:
2,989,457 UART: [state] CFI Enabled
3,000,420 UART: [fht] FMC Alias Private Key: 7
3,108,837 UART: [art] Extend RT PCRs Done
3,109,265 UART: [art] Lock RT PCRs Done
3,110,943 UART: [art] Populate DV Done
3,119,040 UART: [fht] FMC Alias Private Key: 7
3,120,118 UART: [art] Derive CDI
3,120,398 UART: [art] Store in in slot 0x4
3,206,033 UART: [art] Derive Key Pair
3,206,393 UART: [art] Store priv key in slot 0x5
3,219,675 UART: [art] Derive Key Pair - Done
3,234,627 UART: [art] Signing Cert with AUTHO
3,235,107 UART: RITY.KEYID = 7
3,250,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,204 UART: [art] PUB.X = B862C47C3EE48F7C3E11C4C9750B75FAB2279680848B07DA1CB850FC41E8D563E3183884C5720C82E32847CF8BB3903B
3,257,967 UART: [art] PUB.Y = C09C11E3AE5B8F6E37FBDC2E676CF45B57A28877F5EBA8510EA7B37443EE41CEC1BF845F33D9846F9E458C5E499FA20A
3,264,929 UART: [art] SIG.R = F180BD2C082D001B08E3BD2192D5FE508224D2B8647C2D3E29773C6DB44E8D8F77CF3C98758A9579CD2F4EC2C5546F54
3,271,677 UART: [art] SIG.S = 30539766D02BA2C55F85FB504C5B72E212866117465FAF014B43FFB59F00793C7D2459062D84C399FC1998A1AF0EB03A
3,295,333 UART: Caliptra RT
3,295,679 UART: [state] CFI Enabled
3,404,380 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,629 UART: [rt]cmd =0x43455252, len=4
3,445,601 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,172,165 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 ready_for_fw is high
1,176,323 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,976 UART: [idev] Erasing UDS.KEYID = 0
1,201,179 UART: [idev] Sha1 KeyId Algorithm
1,209,483 UART: [idev] --
1,210,473 UART: [ldev] ++
1,210,641 UART: [ldev] CDI.KEYID = 6
1,211,004 UART: [ldev] SUBJECT.KEYID = 5
1,211,430 UART: [ldev] AUTHORITY.KEYID = 7
1,211,893 UART: [ldev] FE.KEYID = 1
1,217,335 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,314 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,708 >>> mbox cmd response: success
2,773,708 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,946 UART: [afmc] ++
2,775,114 UART: [afmc] CDI.KEYID = 6
2,775,476 UART: [afmc] SUBJECT.KEYID = 7
2,775,901 UART: [afmc] AUTHORITY.KEYID = 5
2,811,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,170 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,845,880 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,853,574 UART: [afmc] --
2,854,634 UART: [cold-reset] --
2,855,572 UART: [state] Locking Datavault
2,856,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,369 UART: [state] Locking ICCM
2,858,027 UART: [exit] Launching FMC @ 0x40000130
2,863,356 UART:
2,863,372 UART: Running Caliptra FMC ...
2,863,780 UART:
2,863,834 UART: [state] CFI Enabled
2,874,281 UART: [fht] FMC Alias Private Key: 7
2,981,948 UART: [art] Extend RT PCRs Done
2,982,376 UART: [art] Lock RT PCRs Done
2,983,718 UART: [art] Populate DV Done
2,991,729 UART: [fht] FMC Alias Private Key: 7
2,992,689 UART: [art] Derive CDI
2,992,969 UART: [art] Store in in slot 0x4
3,078,460 UART: [art] Derive Key Pair
3,078,820 UART: [art] Store priv key in slot 0x5
3,091,366 UART: [art] Derive Key Pair - Done
3,106,249 UART: [art] Signing Cert with AUTHO
3,106,729 UART: RITY.KEYID = 7
3,121,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,204 UART: [art] PUB.X = 51BD53C3A51B1F89E27AEA029DD47E11FEBFAB25C286D3EEB0A181C392F55B088A97BC9EA74151C965E99B73298E5E94
3,128,982 UART: [art] PUB.Y = 1ED37CA2F69CB2A7DC16C3357C26E012A45A3EA8B78FD0CBC7ABE3343931DEBCFF7BF9320CBC4C2913841323CBA08F69
3,135,951 UART: [art] SIG.R = FFE216D128620AEBF1FF736D2DF106E69CC96B6C58F035F854F77552C5B595858598295F16D97C8F0408C571B88A0B77
3,142,706 UART: [art] SIG.S = 4EC04323968C4A6FB21510C2DB4A7AC05B6ABDB92F7C6B91BF33FBE86984C4FC3BE6DA4AD3433E9DD19C48883CDB9A3F
3,167,403 UART: Caliptra RT
3,167,657 UART: [state] CFI Enabled
3,276,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,265 UART: [rt]cmd =0x43455252, len=4
3,317,297 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,919 ready_for_fw is high
1,059,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,541 >>> mbox cmd response: success
2,626,541 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,679 UART:
2,688,695 UART: Running Caliptra FMC ...
2,689,103 UART:
2,689,157 UART: [state] CFI Enabled
2,699,424 UART: [fht] FMC Alias Private Key: 7
2,808,079 UART: [art] Extend RT PCRs Done
2,808,507 UART: [art] Lock RT PCRs Done
2,810,257 UART: [art] Populate DV Done
2,818,428 UART: [fht] FMC Alias Private Key: 7
2,819,506 UART: [art] Derive CDI
2,819,786 UART: [art] Store in in slot 0x4
2,905,301 UART: [art] Derive Key Pair
2,905,661 UART: [art] Store priv key in slot 0x5
2,918,507 UART: [art] Derive Key Pair - Done
2,933,898 UART: [art] Signing Cert with AUTHO
2,934,378 UART: RITY.KEYID = 7
2,949,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,961 UART: [art] PUB.X = 339142191DECE1ED357901BD17CE0BEF420F9B6F750EABF70794B8DC158EB1F594E9AE51942193750DBDFFBF967B601E
2,956,727 UART: [art] PUB.Y = FBB45C60FC5F5E2A08EAF2E56E5B87BAB0D4D79A8B12FA74F3615A605D62109A8CE0E7B9B05530675220BBA434991057
2,963,684 UART: [art] SIG.R = 5C517B803B04C4DB412DDFC75BCFA1E1AA1DA2055FE1734EE0F45807811AAB65F4F81EBBACB16A9E9D41C0A9C6224935
2,970,465 UART: [art] SIG.S = 14BAB08D1E150A06F86D81C8CCA95DEA4A08ABE7E29BF459E2A15A9336E06D054D4BC463C1EF67454B020F1104412548
2,994,529 UART: Caliptra RT
2,994,783 UART: [state] CFI Enabled
3,102,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,011 UART: [rt]cmd =0x43455252, len=4
3,143,771 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,316 UART: [kat] SHA2-256
904,256 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,613 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,754 UART: [cold-reset] ++
1,173,106 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 ready_for_fw is high
1,177,190 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,992 UART: [idev] Sha1 KeyId Algorithm
1,210,534 UART: [idev] --
1,211,488 UART: [ldev] ++
1,211,656 UART: [ldev] CDI.KEYID = 6
1,212,019 UART: [ldev] SUBJECT.KEYID = 5
1,212,445 UART: [ldev] AUTHORITY.KEYID = 7
1,212,908 UART: [ldev] FE.KEYID = 1
1,218,126 UART: [ldev] Erasing FE.KEYID = 1
1,244,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,050 UART: [ldev] --
1,284,481 UART: [fwproc] Wait for Commands...
1,285,129 UART: [fwproc] Recv command 0x46574c44
1,285,857 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,211 >>> mbox cmd response: success
2,775,211 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,776,423 UART: [afmc] ++
2,776,591 UART: [afmc] CDI.KEYID = 6
2,776,953 UART: [afmc] SUBJECT.KEYID = 7
2,777,378 UART: [afmc] AUTHORITY.KEYID = 5
2,813,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,141 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,847,851 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,855,615 UART: [afmc] --
2,856,683 UART: [cold-reset] --
2,857,295 UART: [state] Locking Datavault
2,858,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,144 UART: [state] Locking ICCM
2,859,642 UART: [exit] Launching FMC @ 0x40000130
2,864,971 UART:
2,864,987 UART: Running Caliptra FMC ...
2,865,395 UART:
2,865,538 UART: [state] CFI Enabled
2,876,307 UART: [fht] FMC Alias Private Key: 7
2,984,306 UART: [art] Extend RT PCRs Done
2,984,734 UART: [art] Lock RT PCRs Done
2,986,210 UART: [art] Populate DV Done
2,994,371 UART: [fht] FMC Alias Private Key: 7
2,995,459 UART: [art] Derive CDI
2,995,739 UART: [art] Store in in slot 0x4
3,081,226 UART: [art] Derive Key Pair
3,081,586 UART: [art] Store priv key in slot 0x5
3,094,972 UART: [art] Derive Key Pair - Done
3,110,057 UART: [art] Signing Cert with AUTHO
3,110,537 UART: RITY.KEYID = 7
3,125,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,274 UART: [art] PUB.X = 66F2EFB840B9521CDDDECA909622F2A0119D3232EF3181E9615AAA9DED0D0E25740D1D745FFCC471B23DDA32CC73AC9C
3,133,055 UART: [art] PUB.Y = 6754D4DC8531DDC23AAFCEB93B7FFED4937FFE3E34F97D2158FC8BEDA33B5E8901637760751CA676376D14799BA6CB15
3,140,016 UART: [art] SIG.R = 20AED5039592D660B97C430BFC85AB9920900FD2B24F5AF98BE38A6CED38EF5A7FD4EE56A26C8DA91AF6654FBB5CEFF0
3,146,801 UART: [art] SIG.S = E9D97E229029686EC5B9E57681BE35C9C7DFBFE9943743FC6FB6F6BA09A85727ABEA7E06EA35374F5541931D3F243238
3,170,634 UART: Caliptra RT
3,170,980 UART: [state] CFI Enabled
3,278,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,198 UART: [rt]cmd =0x43455252, len=4
3,320,012 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,544 ready_for_fw is high
1,060,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,624 >>> mbox cmd response: success
2,627,624 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,689,416 UART:
2,689,432 UART: Running Caliptra FMC ...
2,689,840 UART:
2,689,983 UART: [state] CFI Enabled
2,700,928 UART: [fht] FMC Alias Private Key: 7
2,809,103 UART: [art] Extend RT PCRs Done
2,809,531 UART: [art] Lock RT PCRs Done
2,811,039 UART: [art] Populate DV Done
2,819,444 UART: [fht] FMC Alias Private Key: 7
2,820,588 UART: [art] Derive CDI
2,820,868 UART: [art] Store in in slot 0x4
2,906,597 UART: [art] Derive Key Pair
2,906,957 UART: [art] Store priv key in slot 0x5
2,920,027 UART: [art] Derive Key Pair - Done
2,935,113 UART: [art] Signing Cert with AUTHO
2,935,593 UART: RITY.KEYID = 7
2,950,617 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,382 UART: [art] PUB.X = 6225FC3FF224149443957D973D56E36795E840E7F6B18FEB03E5554219B6D0488F8D9CCE072885A2C3A60FB49DDE183A
2,958,143 UART: [art] PUB.Y = C8B57058411C496AA4E5AB0F2D9DD6B11BE88274C79949E9786621FBB8939A838C7636FF8053EEF6EB8314C368BF40D6
2,965,094 UART: [art] SIG.R = 2F38640D17617039E22C3F139E59521F8D59D7C1B3D1072F6B09F9F6DBB53FD86E37FE98AEF2778BF3E571C406057559
2,971,849 UART: [art] SIG.S = B37D97FFF7ACCA1E5CE83685E210E955B34BCD62323E373650414503E5C787518D553FBA23ABA1E83A917383B96B0B85
2,995,208 UART: Caliptra RT
2,995,554 UART: [state] CFI Enabled
3,103,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,686 UART: [rt]cmd =0x43455252, len=4
3,144,502 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,180 UART: [kat] LMS
1,169,492 UART: [kat] --
1,170,435 UART: [cold-reset] ++
1,170,885 UART: [fht] FHT @ 0x50003400
1,173,607 UART: [idev] ++
1,173,775 UART: [idev] CDI.KEYID = 6
1,174,136 UART: [idev] SUBJECT.KEYID = 7
1,174,561 UART: [idev] UDS.KEYID = 0
1,174,907 ready_for_fw is high
1,174,907 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,431 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,584 UART: [fwproc] Wait for Commands...
1,281,301 UART: [fwproc] Recv command 0x46574c44
1,282,034 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,232 >>> mbox cmd response: success
2,772,232 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,671 UART: [afmc] ++
2,773,839 UART: [afmc] CDI.KEYID = 6
2,774,202 UART: [afmc] SUBJECT.KEYID = 7
2,774,628 UART: [afmc] AUTHORITY.KEYID = 5
2,809,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,396 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,844,106 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,851,817 UART: [afmc] --
2,852,895 UART: [cold-reset] --
2,853,565 UART: [state] Locking Datavault
2,854,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,152 UART: [state] Locking ICCM
2,855,648 UART: [exit] Launching FMC @ 0x40000130
2,860,977 UART:
2,860,993 UART: Running Caliptra FMC ...
2,861,401 UART:
2,861,455 UART: [state] CFI Enabled
2,872,050 UART: [fht] FMC Alias Private Key: 7
2,980,927 UART: [art] Extend RT PCRs Done
2,981,355 UART: [art] Lock RT PCRs Done
2,982,773 UART: [art] Populate DV Done
2,990,902 UART: [fht] FMC Alias Private Key: 7
2,992,058 UART: [art] Derive CDI
2,992,338 UART: [art] Store in in slot 0x4
3,077,895 UART: [art] Derive Key Pair
3,078,255 UART: [art] Store priv key in slot 0x5
3,090,985 UART: [art] Derive Key Pair - Done
3,105,857 UART: [art] Signing Cert with AUTHO
3,106,337 UART: RITY.KEYID = 7
3,121,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,918 UART: [art] PUB.X = 74FBF4BC2613F75031B30C2F2DB34EC21D97752F2377FFABA65239871FE523A30C489572BCE1463E7031045949FEEC08
3,128,678 UART: [art] PUB.Y = E882334C17E9C20A78E5F58BEAB06BF8F47113E5831D5F1312BB063872BAB52B2C4E663A471BD37BE907C1AB093EF304
3,135,621 UART: [art] SIG.R = 9748CA9ED3601E081D70B5228A8D01CFD441C03333219511F0A3AE50B5F598C72B74B8D824733A5EA68F7D48500BCCF9
3,142,384 UART: [art] SIG.S = DF29D309B9FFAE77DF66D9662670B2C0080373163FB299A9F02A52A0DAD3761D9BCD1F72D81E98D616FBA639B605EF4C
3,166,025 UART: Caliptra RT
3,166,279 UART: [state] CFI Enabled
3,275,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,320 UART: [rt]cmd =0x43455252, len=4
3,315,909 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,538 ready_for_fw is high
1,056,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,248 >>> mbox cmd response: success
2,622,248 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,683,738 UART:
2,683,754 UART: Running Caliptra FMC ...
2,684,162 UART:
2,684,216 UART: [state] CFI Enabled
2,694,661 UART: [fht] FMC Alias Private Key: 7
2,802,876 UART: [art] Extend RT PCRs Done
2,803,304 UART: [art] Lock RT PCRs Done
2,804,558 UART: [art] Populate DV Done
2,812,749 UART: [fht] FMC Alias Private Key: 7
2,813,855 UART: [art] Derive CDI
2,814,135 UART: [art] Store in in slot 0x4
2,899,744 UART: [art] Derive Key Pair
2,900,104 UART: [art] Store priv key in slot 0x5
2,913,928 UART: [art] Derive Key Pair - Done
2,928,998 UART: [art] Signing Cert with AUTHO
2,929,478 UART: RITY.KEYID = 7
2,944,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,565 UART: [art] PUB.X = C874F043ACA22E9FA5A8B787F4305A670B86D02348424CDF8CE80E7A9464193947AD210447C51D8AA6618F967AAAD70B
2,952,327 UART: [art] PUB.Y = CF9A17F3C28B208200B3A8B5814FE69D354E0529C8AA0F8E12420A780DF7C39CE9C81A513FF634C28CEB71725D81B7FB
2,959,253 UART: [art] SIG.R = 7F298B91923D3B0A8B48E454A59B1E39D94C8C8F483E7DE4706C461068CE11713FD2CA03D1BA6F38DEE22EF5D4035D63
2,966,022 UART: [art] SIG.S = 1CA742E1E5ABB130D7BFAEEDE6463AD98F9999EF3C60D72BF4B0714BADACFAC382FB31ED4CDD97AEBA40BA927A35DB85
2,989,743 UART: Caliptra RT
2,989,997 UART: [state] CFI Enabled
3,098,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,355 UART: [rt]cmd =0x43455252, len=4
3,139,297 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
905,065 UART: [kat] SHA2-512-ACC
906,966 UART: [kat] ECC-384
916,879 UART: [kat] HMAC-384Kdf
921,625 UART: [kat] LMS
1,169,937 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,976 UART: [idev] ++
1,174,144 UART: [idev] CDI.KEYID = 6
1,174,505 UART: [idev] SUBJECT.KEYID = 7
1,174,930 UART: [idev] UDS.KEYID = 0
1,175,276 ready_for_fw is high
1,175,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,778 UART: [idev] Sha1 KeyId Algorithm
1,208,628 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,413 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,567 >>> mbox cmd response: success
2,774,567 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,870 UART: [afmc] ++
2,776,038 UART: [afmc] CDI.KEYID = 6
2,776,401 UART: [afmc] SUBJECT.KEYID = 7
2,776,827 UART: [afmc] AUTHORITY.KEYID = 5
2,812,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,611 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,223 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,846,933 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,854,936 UART: [afmc] --
2,855,872 UART: [cold-reset] --
2,856,804 UART: [state] Locking Datavault
2,857,823 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,427 UART: [state] Locking ICCM
2,858,937 UART: [exit] Launching FMC @ 0x40000130
2,864,266 UART:
2,864,282 UART: Running Caliptra FMC ...
2,864,690 UART:
2,864,833 UART: [state] CFI Enabled
2,875,092 UART: [fht] FMC Alias Private Key: 7
2,982,409 UART: [art] Extend RT PCRs Done
2,982,837 UART: [art] Lock RT PCRs Done
2,984,343 UART: [art] Populate DV Done
2,992,726 UART: [fht] FMC Alias Private Key: 7
2,993,712 UART: [art] Derive CDI
2,993,992 UART: [art] Store in in slot 0x4
3,079,511 UART: [art] Derive Key Pair
3,079,871 UART: [art] Store priv key in slot 0x5
3,093,305 UART: [art] Derive Key Pair - Done
3,108,630 UART: [art] Signing Cert with AUTHO
3,109,110 UART: RITY.KEYID = 7
3,124,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,373 UART: [art] PUB.X = 7725BE80BE3251886ED62999FC24988AA60928C035CB9A0097ECE13DD081AD5B66DD0D8E51D70CCC0DDAD213ABE3FFF3
3,132,127 UART: [art] PUB.Y = F53CE5A4F4033DF0FA2FA6D3C15DF2BDD1E021C6E668E216C2BB105129EC616C5DECD240051844C2D626ECD53D98F89C
3,139,089 UART: [art] SIG.R = 542D38F3F63C6D2B53E2A4C3A2E6890299ECE0DD6D60EB2BE75DA9E6162D672CDE106139CFB3C862FBC1A9BA5C1E09F0
3,145,873 UART: [art] SIG.S = 21DA161A64F917B122F46514891553016AD80361ECF72651428CC711EAB7943CF0420CE3FFD7EFCF0ED475B3B8E9BF76
3,169,768 UART: Caliptra RT
3,170,114 UART: [state] CFI Enabled
3,278,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,622 UART: [rt]cmd =0x43455252, len=4
3,319,536 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 ready_for_fw is high
1,056,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,963 >>> mbox cmd response: success
2,623,963 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,686,627 UART:
2,686,643 UART: Running Caliptra FMC ...
2,687,051 UART:
2,687,194 UART: [state] CFI Enabled
2,697,655 UART: [fht] FMC Alias Private Key: 7
2,805,282 UART: [art] Extend RT PCRs Done
2,805,710 UART: [art] Lock RT PCRs Done
2,807,306 UART: [art] Populate DV Done
2,815,743 UART: [fht] FMC Alias Private Key: 7
2,816,757 UART: [art] Derive CDI
2,817,037 UART: [art] Store in in slot 0x4
2,902,612 UART: [art] Derive Key Pair
2,902,972 UART: [art] Store priv key in slot 0x5
2,915,798 UART: [art] Derive Key Pair - Done
2,930,922 UART: [art] Signing Cert with AUTHO
2,931,402 UART: RITY.KEYID = 7
2,946,336 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,101 UART: [art] PUB.X = EB0FC8FBEB4B73756BA6B52AFC835C200F021B5392AEF9838415C57B2634F59EF8F5244DE88D12A43687CC8FB79ED4F1
2,953,876 UART: [art] PUB.Y = 2254B687E6B0DD54A70FFDA6B00638BBB6883890A278C1F02FFD9BC262C5B59B2B4FBCB9CABBF989D04C109146EF7E6E
2,960,840 UART: [art] SIG.R = 1ACD2BDB0E1FE50C02099B634C189A7919F0B9F327D683EF630DFA21730ED785697B936931053DD897872F9EA58376A6
2,967,589 UART: [art] SIG.S = 89D3E5CAF49A2E52CF5B5ADA3D25947CC26E58B5C989A44542EC72D153B341A76248344EBBC65B71ED7826DC4D767ECE
2,991,604 UART: Caliptra RT
2,991,950 UART: [state] CFI Enabled
3,099,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,020 UART: [rt]cmd =0x43455252, len=4
3,140,792 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,379 UART:
192,792 UART: Running Caliptra ROM ...
193,925 UART:
194,073 UART: [state] CFI Enabled
265,317 UART: [state] LifecycleState = Unprovisioned
267,235 UART: [state] DebugLocked = No
268,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,334 UART: [kat] SHA2-256
444,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,558 UART: [kat] ++
455,025 UART: [kat] sha1
465,275 UART: [kat] SHA2-256
467,990 UART: [kat] SHA2-384
473,615 UART: [kat] SHA2-512-ACC
475,974 UART: [kat] ECC-384
2,770,451 UART: [kat] HMAC-384Kdf
2,802,868 UART: [kat] LMS
3,993,185 UART: [kat] --
3,997,456 UART: [cold-reset] ++
3,999,587 UART: [fht] Storing FHT @ 0x50003400
4,011,929 UART: [idev] ++
4,012,534 UART: [idev] CDI.KEYID = 6
4,013,453 UART: [idev] SUBJECT.KEYID = 7
4,014,698 UART: [idev] UDS.KEYID = 0
4,015,754 ready_for_fw is high
4,015,984 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,359 UART: [idev] Erasing UDS.KEYID = 0
7,349,990 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,975 UART: [idev] --
7,376,236 UART: [ldev] ++
7,376,818 UART: [ldev] CDI.KEYID = 6
7,377,777 UART: [ldev] SUBJECT.KEYID = 5
7,378,924 UART: [ldev] AUTHORITY.KEYID = 7
7,380,258 UART: [ldev] FE.KEYID = 1
7,425,384 UART: [ldev] Erasing FE.KEYID = 1
10,758,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,153 UART: [ldev] --
13,139,268 UART: [fwproc] Waiting for Commands...
13,140,877 UART: [fwproc] Received command 0x46574c44
13,143,143 UART: [fwproc] Received Image of size 114036 bytes
17,198,108 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,160 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,658,204 >>> mbox cmd response: success
17,658,713 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,662,194 UART: [afmc] ++
17,662,826 UART: [afmc] CDI.KEYID = 6
17,663,723 UART: [afmc] SUBJECT.KEYID = 7
17,664,984 UART: [afmc] AUTHORITY.KEYID = 5
21,031,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,097 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,453 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,332 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,769 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,541 UART: [afmc] --
23,402,091 UART: [cold-reset] --
23,404,923 UART: [state] Locking Datavault
23,408,055 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,802 UART: [state] Locking ICCM
23,411,136 UART: [exit] Launching FMC @ 0x40000130
23,419,523 UART:
23,419,759 UART: Running Caliptra FMC ...
23,420,851 UART:
23,421,002 UART: [state] CFI Enabled
23,489,729 UART: [fht] FMC Alias Private Key: 7
25,828,628 UART: [art] Extend RT PCRs Done
25,829,848 UART: [art] Lock RT PCRs Done
25,831,355 UART: [art] Populate DV Done
25,836,486 UART: [fht] FMC Alias Private Key: 7
25,838,178 UART: [art] Derive CDI
25,839,003 UART: [art] Store in in slot 0x4
25,899,048 UART: [art] Derive Key Pair
25,900,092 UART: [art] Store priv key in slot 0x5
29,193,166 UART: [art] Derive Key Pair - Done
29,206,107 UART: [art] Signing Cert with AUTHO
29,207,413 UART: RITY.KEYID = 7
31,495,630 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,138 UART: [art] PUB.X = 35128BD43A4B95C98DA5C2114EF467F7A3E1142BCEBDC52C530C0F889B9034F4CB1E84489565B48E0D898C8A0A3DC455
31,504,432 UART: [art] PUB.Y = 40810561B84C17CD73A401AB26DC43C584FFA8147A14691B09981202EBAFCBA00D97B2AD782E7D3A167CF94801B0294C
31,511,648 UART: [art] SIG.R = B3C007D652E1C4FFB3CA0778ECDF20493C46192A29F73684E6407E920A0C05D9BC753486656C8444E53325D2413E4AB5
31,519,032 UART: [art] SIG.S = CF3B05D7188A8182984FD124D2FB424973D89A64003897462401CFDF01888A15CC89C88D609F676AA37950D3DE9F3B2E
32,824,602 UART: Caliptra RT
32,825,317 UART: [state] CFI Enabled
32,987,324 UART: [rt] RT listening for mailbox commands...
33,018,412 UART: [rt]cmd =0x4453424c, len=4
36,320,127 >>> mbox cmd response data (8 bytes)
38,379,961 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
38,525,008 UART:
38,525,397 UART: Running Caliptra ROM ...
38,526,522 UART:
38,526,703 UART: [state] CFI Enabled
38,603,027 UART: [state] LifecycleState = Unprovisioned
38,604,961 UART: [state] DebugLocked = No
38,606,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,612,216 UART: [kat] SHA2-256
38,781,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,792,386 UART: [kat] ++
38,792,886 UART: [kat] sha1
38,803,868 UART: [kat] SHA2-256
38,806,608 UART: [kat] SHA2-384
38,812,315 UART: [kat] SHA2-512-ACC
38,814,708 UART: [kat] ECC-384
41,103,485 UART: [kat] HMAC-384Kdf
41,114,867 UART: [kat] LMS
42,305,191 UART: [kat] --
42,310,715 UART: [update-reset] ++
46,449,647 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,453,207 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
46,835,164 >>> mbox cmd response: success
46,835,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,835,825 UART: [update-reset] Copying MAN_2 To MAN_1
46,857,979 UART: [update-reset Success] --
46,862,530 UART: [state] Locking Datavault
46,865,257 UART: [state] Locking PCR0, PCR1 and PCR31
46,867,022 UART: [state] Locking ICCM
46,868,197 UART: [exit] Launching FMC @ 0x40000130
46,876,641 UART:
46,876,870 UART: Running Caliptra FMC ...
46,877,962 UART:
46,878,111 UART: [state] CFI Enabled
46,971,847 UART: [art] Extend RT PCRs Done
46,973,027 UART: [art] Lock RT PCRs Done
46,974,211 UART: [art] Populate DV Done
46,979,769 UART: [fht] FMC Alias Private Key: 7
46,981,418 UART: [art] Derive CDI
46,982,225 UART: [art] Store in in slot 0x4
47,040,691 UART: [art] Derive Key Pair
47,041,687 UART: [art] Store priv key in slot 0x5
50,334,627 UART: [art] Derive Key Pair - Done
50,347,695 UART: [art] Signing Cert with AUTHO
50,349,001 UART: RITY.KEYID = 7
52,636,718 UART: [art] Erasing AUTHORITY.KEYID = 7
52,638,232 UART: [art] PUB.X = 2E0AC2149D336FD3A4B769970AB0190E0381C2DEBA84FACAB06BF625108208328C9231DBF9D8D990072F410A737A128D
52,645,507 UART: [art] PUB.Y = 6882F83C7A7481C5CB5C4DE7B493C8C09FFA40967DA8108591A0427C4C180502FD22000AFBF1F0C3CD7371AD19EE57E3
52,652,662 UART: [art] SIG.R = 5FC0C9578BE2100E5A9AFAB1EB641F863FCB86977D5F0043762B170BCDF1C876BC35762B7C5AC1B2150C6C2051FBF655
52,660,054 UART: [art] SIG.S = 7EF590D08B99ED3E279B552FC9479C5A2D82AEB4B66B03326C9844EDDB38E29C2287ACA4EDB879988A7268EFBCCA8C23
53,965,520 UART: Caliptra RT
53,966,202 UART: [state] CFI Enabled
57,580,431 UART: [rt] RT listening for mailbox commands...
57,611,337 UART: [rt]cmd =0x494e464f, len=4
57,615,276 >>> mbox cmd response data (264 bytes)
57,616,944 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,646,847 UART: [rt]cmd =0x43455252, len=4
57,658,302 >>> mbox cmd response data (782 bytes)
57,699,231 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,729,903 UART: [rt]cmd =0x44504543, len=92
63,497,165 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
3,803,207 ready_for_fw is high
3,803,568 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,868,174 >>> mbox cmd response: success
17,869,042 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,568,323 UART:
23,568,692 UART: Running Caliptra FMC ...
23,569,829 UART:
23,569,979 UART: [state] CFI Enabled
23,637,130 UART: [fht] FMC Alias Private Key: 7
25,974,998 UART: [art] Extend RT PCRs Done
25,976,673 UART: [art] Lock RT PCRs Done
25,978,139 UART: [art] Populate DV Done
25,983,728 UART: [fht] FMC Alias Private Key: 7
25,985,270 UART: [art] Derive CDI
25,986,078 UART: [art] Store in in slot 0x4
26,045,734 UART: [art] Derive Key Pair
26,046,735 UART: [art] Store priv key in slot 0x5
29,338,904 UART: [art] Derive Key Pair - Done
29,351,697 UART: [art] Signing Cert with AUTHO
29,353,004 UART: RITY.KEYID = 7
31,640,337 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,845 UART: [art] PUB.X = 0F2DE64EAC45E9B67595030913E4460E93A8C04A04C74E74FCC4DD20BC8E23743F8FA8AF1519CE28614B9FB302197A40
31,649,083 UART: [art] PUB.Y = 0E95FD2328F4AB2FAFC0FE9B272F584A6264ECC0CBCDE665638525B46EB48D1F9DB846577D95C7F9DF0EF84655FDE824
31,656,361 UART: [art] SIG.R = F0C75643549A2D62CA5953340C8195B2BD57AD11739225F4EB9DBD40E9CBF958EC16B7ECC9E06D4B10BB4DAC03818CC3
31,663,781 UART: [art] SIG.S = D9D59E8A2B5FB5ADACB863E2B229551C8322F8A63D95964445B318BCFED6323C7220E78FBD6EAF8236E3B7D834920424
32,969,127 UART: Caliptra RT
32,969,861 UART: [state] CFI Enabled
33,130,267 UART: [rt] RT listening for mailbox commands...
33,161,250 UART: [rt]cmd =0x4453424c, len=4
36,462,285 >>> mbox cmd response data (8 bytes)
38,526,871 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
47,243,631 >>> mbox cmd response: success
47,244,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,278,309 UART:
47,278,628 UART: Running Caliptra FMC ...
47,279,744 UART:
47,279,895 UART: [state] CFI Enabled
47,366,765 UART: [art] Extend RT PCRs Done
47,367,989 UART: [art] Lock RT PCRs Done
47,369,443 UART: [art] Populate DV Done
47,375,183 UART: [fht] FMC Alias Private Key: 7
47,376,660 UART: [art] Derive CDI
47,377,416 UART: [art] Store in in slot 0x4
47,436,160 UART: [art] Derive Key Pair
47,437,190 UART: [art] Store priv key in slot 0x5
50,730,419 UART: [art] Derive Key Pair - Done
50,743,206 UART: [art] Signing Cert with AUTHO
50,744,516 UART: RITY.KEYID = 7
53,031,713 UART: [art] Erasing AUTHORITY.KEYID = 7
53,033,223 UART: [art] PUB.X = A60C103BB972CAA0695295934147E860D76A53985D583B5F825E31DF20DCC3D9B27AD9A19896D2FF38853AEE28BBAFDA
53,040,463 UART: [art] PUB.Y = F3A456E2E85A333D8DE5EBD6FB66F370F02AB6A014FAC8D6A8B34AF9E6711D3533ACA9AB0EB2D0215B6878EBEC999F7B
53,047,732 UART: [art] SIG.R = C600A5899A00B3AA8BAFA97DAC20F76CAFB6E11E95E50CC2FF2B40486DDBFA9C3097FCD9BDF826710480A95D03194C2D
53,055,105 UART: [art] SIG.S = AEA6C7AF8D8E40690ECB3AC5EEC7B8909FF5BE6513703589248F26AF5EDDAD1F6420837FF79D9E201FBA7234936ED4CB
54,360,405 UART: Caliptra RT
54,361,089 UART: [state] CFI Enabled
57,971,923 UART: [rt] RT listening for mailbox commands...
58,003,037 UART: [rt]cmd =0x494e464f, len=4
58,006,927 >>> mbox cmd response data (264 bytes)
58,008,559 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,038,308 UART: [rt]cmd =0x43455252, len=4
58,049,598 >>> mbox cmd response data (784 bytes)
58,090,907 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,121,490 UART: [rt]cmd =0x44504543, len=92
63,889,524 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.32s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,479 UART:
192,847 UART: Running Caliptra ROM ...
194,034 UART:
603,774 UART: [state] CFI Enabled
616,470 UART: [state] LifecycleState = Unprovisioned
618,435 UART: [state] DebugLocked = No
620,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,676 UART: [kat] SHA2-256
795,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,928 UART: [kat] ++
806,449 UART: [kat] sha1
818,312 UART: [kat] SHA2-256
821,036 UART: [kat] SHA2-384
826,604 UART: [kat] SHA2-512-ACC
828,969 UART: [kat] ECC-384
3,113,233 UART: [kat] HMAC-384Kdf
3,125,036 UART: [kat] LMS
4,315,188 UART: [kat] --
4,320,101 UART: [cold-reset] ++
4,322,384 UART: [fht] Storing FHT @ 0x50003400
4,333,217 UART: [idev] ++
4,333,808 UART: [idev] CDI.KEYID = 6
4,334,718 UART: [idev] SUBJECT.KEYID = 7
4,335,962 UART: [idev] UDS.KEYID = 0
4,336,940 ready_for_fw is high
4,337,149 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,788 UART: [idev] Erasing UDS.KEYID = 0
7,622,525 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,409 UART: [idev] --
7,647,732 UART: [ldev] ++
7,648,359 UART: [ldev] CDI.KEYID = 6
7,649,271 UART: [ldev] SUBJECT.KEYID = 5
7,650,487 UART: [ldev] AUTHORITY.KEYID = 7
7,651,768 UART: [ldev] FE.KEYID = 1
7,663,413 UART: [ldev] Erasing FE.KEYID = 1
10,947,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,870 UART: [ldev] --
13,308,235 UART: [fwproc] Waiting for Commands...
13,311,146 UART: [fwproc] Received command 0x46574c44
13,313,330 UART: [fwproc] Received Image of size 114036 bytes
17,359,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,169 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,820,178 >>> mbox cmd response: success
17,820,686 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,824,429 UART: [afmc] ++
17,825,013 UART: [afmc] CDI.KEYID = 6
17,825,955 UART: [afmc] SUBJECT.KEYID = 7
17,827,225 UART: [afmc] AUTHORITY.KEYID = 5
21,139,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,521 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,451,920 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,736 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,215 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,703 UART: [afmc] --
23,508,006 UART: [cold-reset] --
23,511,656 UART: [state] Locking Datavault
23,515,768 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,518 UART: [state] Locking ICCM
23,519,341 UART: [exit] Launching FMC @ 0x40000130
23,527,744 UART:
23,527,981 UART: Running Caliptra FMC ...
23,529,078 UART:
23,529,240 UART: [state] CFI Enabled
23,537,252 UART: [fht] FMC Alias Private Key: 7
25,868,436 UART: [art] Extend RT PCRs Done
25,869,650 UART: [art] Lock RT PCRs Done
25,871,214 UART: [art] Populate DV Done
25,876,956 UART: [fht] FMC Alias Private Key: 7
25,878,589 UART: [art] Derive CDI
25,879,415 UART: [art] Store in in slot 0x4
25,922,176 UART: [art] Derive Key Pair
25,923,174 UART: [art] Store priv key in slot 0x5
29,165,255 UART: [art] Derive Key Pair - Done
29,178,138 UART: [art] Signing Cert with AUTHO
29,179,436 UART: RITY.KEYID = 7
31,459,282 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,788 UART: [art] PUB.X = EC4F2D700F5E985084C66199D1A5EE26F5C0A87C57325EAEB5FEF66293D8B4CFE6880723C069DE483E92E425D55FB472
31,468,027 UART: [art] PUB.Y = 946F40F64C6E0C3D0AA0E7299F6625CBAD89A9068621BD8AC62D3FF23BABF751D68ED667FE277D1D92D997A22426BE53
31,475,321 UART: [art] SIG.R = 255CA8CC5613099459BB94FC187B23DB60019407634CFF1C49658D8A081C50F480ED8479FA18012536C906149A5ED05A
31,482,692 UART: [art] SIG.S = EF536DFEC65CA72F58CE8392B3A2C1A2CFE0A9E6AB2CF603E5D02704D496AAF1A379FDDE2F206FE37F96EC794E1F7CAB
32,787,922 UART: Caliptra RT
32,788,620 UART: [state] CFI Enabled
32,906,003 UART: [rt] RT listening for mailbox commands...
32,936,973 UART: [rt]cmd =0x4453424c, len=4
36,179,391 >>> mbox cmd response data (8 bytes)
38,234,766 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
38,379,997 UART:
38,380,359 UART: Running Caliptra ROM ...
38,381,440 UART:
38,381,597 UART: [state] CFI Enabled
38,399,727 UART: [state] LifecycleState = Unprovisioned
38,401,626 UART: [state] DebugLocked = No
38,403,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,408,067 UART: [kat] SHA2-256
38,577,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,588,291 UART: [kat] ++
38,588,773 UART: [kat] sha1
38,599,905 UART: [kat] SHA2-256
38,602,630 UART: [kat] SHA2-384
38,608,515 UART: [kat] SHA2-512-ACC
38,610,866 UART: [kat] ECC-384
40,893,978 UART: [kat] HMAC-384Kdf
40,904,977 UART: [kat] LMS
42,095,070 UART: [kat] --
42,096,712 UART: [update-reset] ++
46,236,123 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,239,753 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
46,621,745 >>> mbox cmd response: success
46,622,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,622,823 UART: [update-reset] Copying MAN_2 To MAN_1
46,645,257 UART: [update-reset Success] --
46,648,735 UART: [state] Locking Datavault
46,651,931 UART: [state] Locking PCR0, PCR1 and PCR31
46,653,692 UART: [state] Locking ICCM
46,655,358 UART: [exit] Launching FMC @ 0x40000130
46,663,754 UART:
46,663,985 UART: Running Caliptra FMC ...
46,665,081 UART:
46,665,237 UART: [state] CFI Enabled
46,709,746 UART: [art] Extend RT PCRs Done
46,710,928 UART: [art] Lock RT PCRs Done
46,712,323 UART: [art] Populate DV Done
46,717,909 UART: [fht] FMC Alias Private Key: 7
46,719,444 UART: [art] Derive CDI
46,720,207 UART: [art] Store in in slot 0x4
46,763,171 UART: [art] Derive Key Pair
46,764,213 UART: [art] Store priv key in slot 0x5
50,006,614 UART: [art] Derive Key Pair - Done
50,019,344 UART: [art] Signing Cert with AUTHO
50,020,641 UART: RITY.KEYID = 7
52,299,693 UART: [art] Erasing AUTHORITY.KEYID = 7
52,301,201 UART: [art] PUB.X = 4C734E57BFBC8D0C7E915A66116505AEB8983C872EF6AB79586F29D647946FAF3A02E772C5DD15D7B29F2E170B7B97FB
52,308,441 UART: [art] PUB.Y = 2816D87AFC27A7C4E4B69A1948521E50229A36B987A749120C5427DE46CC75FD4D040A88F36B7A4FA335A6BBF172DF2E
52,315,682 UART: [art] SIG.R = CD4F2217CD600A9C16B4D0FEED18A83227FDBF5097DC5A28EC4562268A11E711CB0260DFE3126F8DC5770E1C81C9C765
52,323,077 UART: [art] SIG.S = 02DFF7CD32E413C82852B69D7A82F8C6D0FFA2DA60543E9BECEA1F7F69DA63A1B8C27C8AEF9B664C810C1E9E6C049109
53,628,753 UART: Caliptra RT
53,629,463 UART: [state] CFI Enabled
57,159,223 UART: [rt] RT listening for mailbox commands...
57,190,361 UART: [rt]cmd =0x494e464f, len=4
57,194,209 >>> mbox cmd response data (264 bytes)
57,195,894 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,225,694 UART: [rt]cmd =0x43455252, len=4
57,237,031 >>> mbox cmd response data (783 bytes)
57,278,064 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,308,596 UART: [rt]cmd =0x44504543, len=92
62,989,842 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
4,127,277 ready_for_fw is high
4,127,649 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,073,070 >>> mbox cmd response: success
18,073,951 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,719,398 UART:
23,719,814 UART: Running Caliptra FMC ...
23,720,921 UART:
23,721,074 UART: [state] CFI Enabled
23,729,342 UART: [fht] FMC Alias Private Key: 7
26,060,112 UART: [art] Extend RT PCRs Done
26,061,346 UART: [art] Lock RT PCRs Done
26,062,736 UART: [art] Populate DV Done
26,068,222 UART: [fht] FMC Alias Private Key: 7
26,069,971 UART: [art] Derive CDI
26,070,774 UART: [art] Store in in slot 0x4
26,113,594 UART: [art] Derive Key Pair
26,114,600 UART: [art] Store priv key in slot 0x5
29,356,751 UART: [art] Derive Key Pair - Done
29,369,706 UART: [art] Signing Cert with AUTHO
29,371,021 UART: RITY.KEYID = 7
31,650,241 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,748 UART: [art] PUB.X = C7A31E5EC886E33DF351DBECD9318C813C206F55609516DCEB37317138CC369925FE166662D6411938910DB275A81810
31,658,966 UART: [art] PUB.Y = 512B303BC5338AA0907A0C71C174B640E9FF6C73E72E807A7D8564C9E5C47A05DCB36FC37A55EBDCF0B2910C3E4E829A
31,666,275 UART: [art] SIG.R = 2F0E8CECAE89AC37EA749A3CCB8B737685F72A32B60430E06812E89D64BE0A91C24F0192EBEA108F1EE2746810E47729
31,673,648 UART: [art] SIG.S = FECB5F0E6652009987C1476693208832CFB56F00F45D6F930F9A1B9F1FBF308BB0C04F8F5FFF743DA32650FB6C42691E
32,978,755 UART: Caliptra RT
32,979,454 UART: [state] CFI Enabled
33,096,842 UART: [rt] RT listening for mailbox commands...
33,127,811 UART: [rt]cmd =0x4453424c, len=4
36,370,957 >>> mbox cmd response data (8 bytes)
38,425,230 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
47,083,187 >>> mbox cmd response: success
47,083,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,116,663 UART:
47,116,981 UART: Running Caliptra FMC ...
47,118,021 UART:
47,118,172 UART: [state] CFI Enabled
47,162,463 UART: [art] Extend RT PCRs Done
47,163,610 UART: [art] Lock RT PCRs Done
47,164,979 UART: [art] Populate DV Done
47,170,611 UART: [fht] FMC Alias Private Key: 7
47,172,230 UART: [art] Derive CDI
47,172,977 UART: [art] Store in in slot 0x4
47,215,737 UART: [art] Derive Key Pair
47,216,781 UART: [art] Store priv key in slot 0x5
50,458,799 UART: [art] Derive Key Pair - Done
50,471,740 UART: [art] Signing Cert with AUTHO
50,473,081 UART: RITY.KEYID = 7
52,752,787 UART: [art] Erasing AUTHORITY.KEYID = 7
52,754,295 UART: [art] PUB.X = 9BBFEA7E2264A763470B00CE39B393A91531BAFFB5F346D302A10C73FE03455EA310688E617321ADAF3D0940F92375A6
52,761,513 UART: [art] PUB.Y = FFFB2D4CFE199469625EAB26D6227433C00838E256CCE4380D5B0784AB4BA889BA99062315BD2B153C912EEC94650B61
52,768,798 UART: [art] SIG.R = 5B79BF99D83B34DA40E1141EA1FCD36052433E0FCEC6A20A7A82A0D150083DB4AEEA53CC0D318BC00D47FE3D3A21CE28
52,776,229 UART: [art] SIG.S = E39E1E49787A2A260967189FEB8EF909A7924EB52724A84F46534ADD9F85B5EE87C1801CA7337E71281A81FE0F27AF55
54,081,902 UART: Caliptra RT
54,082,598 UART: [state] CFI Enabled
57,610,279 UART: [rt] RT listening for mailbox commands...
57,641,076 UART: [rt]cmd =0x494e464f, len=4
57,645,112 >>> mbox cmd response data (264 bytes)
57,646,732 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,676,515 UART: [rt]cmd =0x43455252, len=4
57,687,854 >>> mbox cmd response data (783 bytes)
57,729,038 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,759,923 UART: [rt]cmd =0x44504543, len=92
63,441,329 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,514 UART:
192,887 UART: Running Caliptra ROM ...
194,076 UART:
194,242 UART: [state] CFI Enabled
263,848 UART: [state] LifecycleState = Unprovisioned
265,764 UART: [state] DebugLocked = No
268,580 UART: [state] WD Timer not started. Device not locked for debugging
272,607 UART: [kat] SHA2-256
451,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,302 UART: [kat] ++
463,859 UART: [kat] sha1
475,453 UART: [kat] SHA2-256
478,469 UART: [kat] SHA2-384
485,809 UART: [kat] SHA2-512-ACC
488,815 UART: [kat] ECC-384
2,947,382 UART: [kat] HMAC-384Kdf
2,971,145 UART: [kat] LMS
3,500,632 UART: [kat] --
3,505,755 UART: [cold-reset] ++
3,508,039 UART: [fht] FHT @ 0x50003400
3,518,308 UART: [idev] ++
3,518,872 UART: [idev] CDI.KEYID = 6
3,519,783 UART: [idev] SUBJECT.KEYID = 7
3,521,031 UART: [idev] UDS.KEYID = 0
3,521,961 ready_for_fw is high
3,522,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,050 UART: [idev] Erasing UDS.KEYID = 0
6,023,168 UART: [idev] Sha1 KeyId Algorithm
6,045,530 UART: [idev] --
6,051,030 UART: [ldev] ++
6,051,599 UART: [ldev] CDI.KEYID = 6
6,052,511 UART: [ldev] SUBJECT.KEYID = 5
6,053,725 UART: [ldev] AUTHORITY.KEYID = 7
6,054,965 UART: [ldev] FE.KEYID = 1
6,100,814 UART: [ldev] Erasing FE.KEYID = 1
8,602,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,878 UART: [ldev] --
10,394,976 UART: [fwproc] Wait for Commands...
10,396,445 UART: [fwproc] Recv command 0x46574c44
10,398,539 UART: [fwproc] Recv'd Img size: 114360 bytes
13,801,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,262,640 >>> mbox cmd response: success
14,263,140 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,266,670 UART: [afmc] ++
14,267,257 UART: [afmc] CDI.KEYID = 6
14,268,146 UART: [afmc] SUBJECT.KEYID = 7
14,269,362 UART: [afmc] AUTHORITY.KEYID = 5
16,805,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,381 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,392 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,632 UART: [afmc] --
18,605,698 UART: [cold-reset] --
18,609,394 UART: [state] Locking Datavault
18,616,585 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,242 UART: [state] Locking ICCM
18,620,066 UART: [exit] Launching FMC @ 0x40000130
18,628,465 UART:
18,628,701 UART: Running Caliptra FMC ...
18,629,807 UART:
18,629,962 UART: [state] CFI Enabled
18,688,169 UART: [fht] FMC Alias Private Key: 7
20,452,525 UART: [art] Extend RT PCRs Done
20,453,732 UART: [art] Lock RT PCRs Done
20,455,727 UART: [art] Populate DV Done
20,461,079 UART: [fht] FMC Alias Private Key: 7
20,462,643 UART: [art] Derive CDI
20,463,466 UART: [art] Store in in slot 0x4
20,521,011 UART: [art] Derive Key Pair
20,522,084 UART: [art] Store priv key in slot 0x5
22,985,847 UART: [art] Derive Key Pair - Done
22,998,897 UART: [art] Signing Cert with AUTHO
23,000,206 UART: RITY.KEYID = 7
24,711,274 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,772 UART: [art] PUB.X = 9C1F1085B0C4966FA55253758E828358A52D95CA19BD99C89770410DE5A18866266C47FC8D28E8AE17160CCCC4BE923D
24,720,014 UART: [art] PUB.Y = DAF323B41D7288D00025CA5FBA000639BAB2E2CE3A9B0492F6FDB103A170A707CA433F546A976D7C2EDEDD08AFC49FBB
24,727,234 UART: [art] SIG.R = A3FB5E5EFF800FED4D6DF08EEADECFC68C4174301AE1E1501C9DF743CB226B26D69B7D38DE8CB33517A4F48E5C469D3B
24,734,668 UART: [art] SIG.S = 524A47007C5A3FC012DD2E05359D19EEBDAE50B86B980C0D2E1195434B2F692023F5C872037285D08899C412E98FE0BD
25,713,789 UART: Caliptra RT
25,714,487 UART: [state] CFI Enabled
25,879,148 UART: [rt] RT listening for mailbox commands...
25,910,453 UART: [rt]cmd =0x4453424c, len=4
28,360,596 >>> mbox cmd response data (8 bytes)
30,414,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,560,464 UART:
30,560,826 UART: Running Caliptra ROM ...
30,561,878 UART:
30,562,027 UART: [state] CFI Enabled
30,640,144 UART: [state] LifecycleState = Unprovisioned
30,642,025 UART: [state] DebugLocked = No
30,644,521 UART: [state] WD Timer not started. Device not locked for debugging
30,649,124 UART: [kat] SHA2-256
30,828,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,839,813 UART: [kat] ++
30,840,286 UART: [kat] sha1
30,851,548 UART: [kat] SHA2-256
30,854,616 UART: [kat] SHA2-384
30,860,977 UART: [kat] SHA2-512-ACC
30,863,928 UART: [kat] ECC-384
33,320,965 UART: [kat] HMAC-384Kdf
33,344,753 UART: [kat] LMS
33,874,217 UART: [kat] --
33,877,231 UART: [update-reset] ++
37,303,115 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,306,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
37,689,454 >>> mbox cmd response: success
37,689,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,690,102 UART: [update-reset] Copying MAN_2 To MAN_1
37,712,426 UART: [update-reset Success] --
37,716,533 UART: [state] Locking Datavault
37,720,782 UART: [state] Locking PCR0, PCR1 and PCR31
37,722,441 UART: [state] Locking ICCM
37,724,159 UART: [exit] Launching FMC @ 0x40000130
37,732,553 UART:
37,732,790 UART: Running Caliptra FMC ...
37,733,892 UART:
37,734,051 UART: [state] CFI Enabled
37,834,680 UART: [art] Extend RT PCRs Done
37,835,860 UART: [art] Lock RT PCRs Done
37,837,370 UART: [art] Populate DV Done
37,842,780 UART: [fht] FMC Alias Private Key: 7
37,844,474 UART: [art] Derive CDI
37,845,286 UART: [art] Store in in slot 0x4
37,903,764 UART: [art] Derive Key Pair
37,904,804 UART: [art] Store priv key in slot 0x5
40,367,633 UART: [art] Derive Key Pair - Done
40,380,484 UART: [art] Signing Cert with AUTHO
40,381,789 UART: RITY.KEYID = 7
42,093,562 UART: [art] Erasing AUTHORITY.KEYID = 7
42,095,072 UART: [art] PUB.X = D091F100ABF66A37C065407AE0E5EDC0C9F6BF502E54B9E5B661A5868E8BB1AFADA1A7E9C88B6CAF5D09A26F4FC92996
42,102,352 UART: [art] PUB.Y = 5AD98BFF6D3352B42D1275DB281E186D87B72349A60ED3E0164771EBB4949E2BA53E82CFDA91D6C95CC32673EA3F932E
42,109,588 UART: [art] SIG.R = B581D9F8AF97FAF3BB5919EC2664DEA8F1A4CDCFEC1E83C87D480E78E51E894F43AE6990D5326CCD46428B209A8B14D9
42,116,972 UART: [art] SIG.S = 72A9946B4471AAA6BD3E3F05A1A3E449483EFEC478811B87EC9404004092534C5FB9170B1EA0AE6871773F1101BF9C4C
43,095,761 UART: Caliptra RT
43,096,466 UART: [state] CFI Enabled
45,883,766 UART: [rt] RT listening for mailbox commands...
45,914,734 UART: [rt]cmd =0x494e464f, len=4
45,918,536 >>> mbox cmd response data (264 bytes)
45,920,210 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,950,080 UART: [rt]cmd =0x43455252, len=4
45,961,582 >>> mbox cmd response data (783 bytes)
46,002,914 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,033,655 UART: [rt]cmd =0x44504543, len=92
50,393,065 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,426 UART:
192,797 UART: Running Caliptra ROM ...
193,978 UART:
194,138 UART: [state] CFI Enabled
262,483 UART: [state] LifecycleState = Unprovisioned
264,850 UART: [state] DebugLocked = No
266,396 UART: [state] WD Timer not started. Device not locked for debugging
271,568 UART: [kat] SHA2-256
461,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,225 UART: [kat] ++
472,710 UART: [kat] sha1
484,650 UART: [kat] SHA2-256
487,660 UART: [kat] SHA2-384
494,726 UART: [kat] SHA2-512-ACC
497,311 UART: [kat] ECC-384
2,947,770 UART: [kat] HMAC-384Kdf
2,971,080 UART: [kat] LMS
3,502,840 UART: [kat] --
3,509,173 UART: [cold-reset] ++
3,511,186 UART: [fht] FHT @ 0x50003400
3,523,589 UART: [idev] ++
3,524,245 UART: [idev] CDI.KEYID = 6
3,525,238 UART: [idev] SUBJECT.KEYID = 7
3,526,412 UART: [idev] UDS.KEYID = 0
3,527,338 ready_for_fw is high
3,527,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,475 UART: [idev] Erasing UDS.KEYID = 0
6,028,925 UART: [idev] Sha1 KeyId Algorithm
6,050,375 UART: [idev] --
6,055,406 UART: [ldev] ++
6,056,088 UART: [ldev] CDI.KEYID = 6
6,057,007 UART: [ldev] SUBJECT.KEYID = 5
6,058,177 UART: [ldev] AUTHORITY.KEYID = 7
6,059,413 UART: [ldev] FE.KEYID = 1
6,100,650 UART: [ldev] Erasing FE.KEYID = 1
8,605,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,076 UART: [ldev] --
10,414,374 UART: [fwproc] Wait for Commands...
10,416,523 UART: [fwproc] Recv command 0x46574c44
10,418,831 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,631 >>> mbox cmd response: success
14,604,170 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,607,505 UART: [afmc] ++
14,608,201 UART: [afmc] CDI.KEYID = 6
14,609,363 UART: [afmc] SUBJECT.KEYID = 7
14,610,904 UART: [afmc] AUTHORITY.KEYID = 5
17,153,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,659 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,007 UART: [afmc] --
18,967,961 UART: [cold-reset] --
18,971,717 UART: [state] Locking Datavault
18,976,968 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,157 UART: [state] Locking ICCM
18,981,890 UART: [exit] Launching FMC @ 0x40000130
18,990,576 UART:
18,990,822 UART: Running Caliptra FMC ...
18,991,929 UART:
18,992,086 UART: [state] CFI Enabled
19,062,964 UART: [fht] FMC Alias Private Key: 7
20,826,589 UART: [art] Extend RT PCRs Done
20,827,800 UART: [art] Lock RT PCRs Done
20,829,500 UART: [art] Populate DV Done
20,834,590 UART: [fht] FMC Alias Private Key: 7
20,836,129 UART: [art] Derive CDI
20,836,941 UART: [art] Store in in slot 0x4
20,895,143 UART: [art] Derive Key Pair
20,896,145 UART: [art] Store priv key in slot 0x5
23,359,584 UART: [art] Derive Key Pair - Done
23,372,599 UART: [art] Signing Cert with AUTHO
23,373,903 UART: RITY.KEYID = 7
25,085,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,086,725 UART: [art] PUB.X = E3B04833F460D517E968743545CD5DDC822778535A08C481B862CBA366F5339399271B94169C02F543238A6E8619B97C
25,093,971 UART: [art] PUB.Y = 266759F39A7BA4BF6E7F80B201F8CB9C852445D105283A579A456CD6B138EC9B9CCD93201629F2CCE8D448E1677FF1A3
25,101,246 UART: [art] SIG.R = CCFAE2668994442F43C0AA0BDA8BE4A592B0EE987D060FBCF01DCC6818834EA6FB4D07EB33306B595A622FCCB3AF830E
25,108,641 UART: [art] SIG.S = 4565F00D10E8D7FF4748ECD7D5F25A1CD4F390BD592E63DA183AB6809A5EAA34517286A296E9EC770A008A1E7C76FB2A
26,087,848 UART: Caliptra RT
26,088,541 UART: [state] CFI Enabled
26,253,478 UART: [rt] RT listening for mailbox commands...
26,284,561 UART: [rt]cmd =0x4453424c, len=4
28,755,990 >>> mbox cmd response data (8 bytes)
30,811,066 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,956,303 UART:
30,956,683 UART: Running Caliptra ROM ...
30,957,811 UART:
30,957,983 UART: [state] CFI Enabled
31,010,914 UART: [state] LifecycleState = Unprovisioned
31,013,017 UART: [state] DebugLocked = No
31,014,789 UART: [state] WD Timer not started. Device not locked for debugging
31,018,981 UART: [kat] SHA2-256
31,208,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,219,689 UART: [kat] ++
31,220,176 UART: [kat] sha1
31,230,957 UART: [kat] SHA2-256
31,233,937 UART: [kat] SHA2-384
31,239,825 UART: [kat] SHA2-512-ACC
31,242,396 UART: [kat] ECC-384
33,697,228 UART: [kat] HMAC-384Kdf
33,721,066 UART: [kat] LMS
34,252,604 UART: [kat] --
34,258,375 UART: [update-reset] ++
37,726,855 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,730,247 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
38,337,929 >>> mbox cmd response: success
38,338,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,338,582 UART: [update-reset] Copying MAN_2 To MAN_1
38,376,114 UART: [update-reset Success] --
38,380,137 UART: [state] Locking Datavault
38,383,394 UART: [state] Locking PCR0, PCR1 and PCR31
38,385,596 UART: [state] Locking ICCM
38,388,397 UART: [exit] Launching FMC @ 0x40000130
38,397,072 UART:
38,397,312 UART: Running Caliptra FMC ...
38,398,408 UART:
38,398,562 UART: [state] CFI Enabled
38,490,368 UART: [art] Extend RT PCRs Done
38,491,551 UART: [art] Lock RT PCRs Done
38,493,278 UART: [art] Populate DV Done
38,498,869 UART: [fht] FMC Alias Private Key: 7
38,500,435 UART: [art] Derive CDI
38,501,180 UART: [art] Store in in slot 0x4
38,559,869 UART: [art] Derive Key Pair
38,560,873 UART: [art] Store priv key in slot 0x5
41,024,160 UART: [art] Derive Key Pair - Done
41,037,162 UART: [art] Signing Cert with AUTHO
41,038,474 UART: RITY.KEYID = 7
42,749,289 UART: [art] Erasing AUTHORITY.KEYID = 7
42,750,804 UART: [art] PUB.X = 86097A43A3D677740240DF0C40C7E80A0A3E0E27BAA5BF5565B91222F82920900F1760BB1D9E3C12638D9C1E3AAFE712
42,758,045 UART: [art] PUB.Y = C6EFDBF8116177278AE02FF773B41FD89624474594848E37CFA34875FA4F249C23982320C35032B0B1E0B783D6DEF3F2
42,765,266 UART: [art] SIG.R = 1AA0F80325EF346E8283F9937433F8DBE8B02CAD283ABE9BEAAC895B160072B37321568CCB7D5E8687F7FEA4061BFB99
42,772,652 UART: [art] SIG.S = 09FB933C757D0B2165CE80EE2C373AB2F88CD03E7EC7B7043D262A510F415936EE58E41C0693143E22E00BD2E64853F2
43,751,412 UART: Caliptra RT
43,752,182 UART: [state] CFI Enabled
46,540,256 UART: [rt] RT listening for mailbox commands...
46,571,116 UART: [rt]cmd =0x494e464f, len=4
46,574,819 >>> mbox cmd response data (264 bytes)
46,576,628 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,606,510 UART: [rt]cmd =0x43455252, len=4
46,617,956 >>> mbox cmd response data (782 bytes)
46,658,959 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,689,948 UART: [rt]cmd =0x44504543, len=92
51,048,227 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
3,435,251 ready_for_fw is high
3,435,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,738,081 >>> mbox cmd response: success
14,738,855 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,025,547 UART:
19,025,925 UART: Running Caliptra FMC ...
19,027,030 UART:
19,027,187 UART: [state] CFI Enabled
19,092,121 UART: [fht] FMC Alias Private Key: 7
20,855,618 UART: [art] Extend RT PCRs Done
20,856,844 UART: [art] Lock RT PCRs Done
20,858,367 UART: [art] Populate DV Done
20,863,883 UART: [fht] FMC Alias Private Key: 7
20,865,479 UART: [art] Derive CDI
20,866,299 UART: [art] Store in in slot 0x4
20,924,999 UART: [art] Derive Key Pair
20,926,038 UART: [art] Store priv key in slot 0x5
23,389,064 UART: [art] Derive Key Pair - Done
23,402,117 UART: [art] Signing Cert with AUTHO
23,403,420 UART: RITY.KEYID = 7
25,115,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,746 UART: [art] PUB.X = E99B5357AAA5F4C39E14449A1C154CF0AA7807F8971DCECE888832339956A494AC7993CC50B679D17093707CD22FBF16
25,123,986 UART: [art] PUB.Y = 0213DF6558A815BECC9C147605AC2F22AAA103E89F933EFC9017BD19483BF0C007245FB8D0050C3E34B23EB9A1367384
25,131,234 UART: [art] SIG.R = 0EC1CAFABB67986EC5B3B06E9A9696AE3FA2024776E299D3060C8C00B5F293ACE0B0FDA32C41D920ABC60B280894EED6
25,138,619 UART: [art] SIG.S = E7FF38D7305D5731FD4A219112DEF606A7A845C1A80849CE09ADFAED042580292A150D3BBADD011CC701492FBA87CFA9
26,117,644 UART: Caliptra RT
26,118,350 UART: [state] CFI Enabled
26,282,021 UART: [rt] RT listening for mailbox commands...
26,313,220 UART: [rt]cmd =0x4453424c, len=4
28,765,373 >>> mbox cmd response data (8 bytes)
30,826,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
38,654,687 >>> mbox cmd response: success
38,655,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,689,126 UART:
38,689,415 UART: Running Caliptra FMC ...
38,690,454 UART:
38,690,604 UART: [state] CFI Enabled
38,797,784 UART: [art] Extend RT PCRs Done
38,798,984 UART: [art] Lock RT PCRs Done
38,800,445 UART: [art] Populate DV Done
38,806,132 UART: [fht] FMC Alias Private Key: 7
38,807,837 UART: [art] Derive CDI
38,808,573 UART: [art] Store in in slot 0x4
38,866,893 UART: [art] Derive Key Pair
38,867,914 UART: [art] Store priv key in slot 0x5
41,330,978 UART: [art] Derive Key Pair - Done
41,343,809 UART: [art] Signing Cert with AUTHO
41,345,117 UART: RITY.KEYID = 7
43,056,712 UART: [art] Erasing AUTHORITY.KEYID = 7
43,058,217 UART: [art] PUB.X = 4D6BA2952E9F12B10049007FF97D02FACD4C4DE3BD1DC2BE8230152DE6104662BAB53C0EBC85037BBC70F2E6A81B6638
43,065,463 UART: [art] PUB.Y = E40984099C1509BCA9064A0A30CB772B18F30108A447FC49A08A9DB63D55AE54C24A950FA358DE8063CEBC8766316972
43,072,739 UART: [art] SIG.R = 29A3B6F108CC1B60AF094B83540B5F5DE9C2F543B46A6001438A6BD72477C5C73E2BFD97A69D4CE6CC7A7AF3D053304E
43,080,130 UART: [art] SIG.S = 6C8B2F8DFBD37963D5BBD6D7F83172E9E1D3C6D0CC5E7345A1042B70F87217E68D11ACD9B859472623BB605E7A2B5159
44,059,478 UART: Caliptra RT
44,060,169 UART: [state] CFI Enabled
46,849,891 UART: [rt] RT listening for mailbox commands...
46,880,909 UART: [rt]cmd =0x494e464f, len=4
46,884,795 >>> mbox cmd response data (264 bytes)
46,886,469 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,916,437 UART: [rt]cmd =0x43455252, len=4
46,927,759 >>> mbox cmd response data (782 bytes)
46,969,537 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,000,380 UART: [rt]cmd =0x44504543, len=92
51,356,752 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,291 UART:
192,651 UART: Running Caliptra ROM ...
193,834 UART:
603,588 UART: [state] CFI Enabled
618,242 UART: [state] LifecycleState = Unprovisioned
620,615 UART: [state] DebugLocked = No
622,710 UART: [state] WD Timer not started. Device not locked for debugging
627,527 UART: [kat] SHA2-256
817,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,219 UART: [kat] ++
828,821 UART: [kat] sha1
840,483 UART: [kat] SHA2-256
843,568 UART: [kat] SHA2-384
850,338 UART: [kat] SHA2-512-ACC
852,921 UART: [kat] ECC-384
3,297,167 UART: [kat] HMAC-384Kdf
3,310,230 UART: [kat] LMS
3,842,123 UART: [kat] --
3,845,969 UART: [cold-reset] ++
3,847,558 UART: [fht] FHT @ 0x50003400
3,860,314 UART: [idev] ++
3,861,029 UART: [idev] CDI.KEYID = 6
3,861,947 UART: [idev] SUBJECT.KEYID = 7
3,863,192 UART: [idev] UDS.KEYID = 0
3,864,119 ready_for_fw is high
3,864,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,004 UART: [idev] Erasing UDS.KEYID = 0
6,340,528 UART: [idev] Sha1 KeyId Algorithm
6,362,626 UART: [idev] --
6,368,124 UART: [ldev] ++
6,368,810 UART: [ldev] CDI.KEYID = 6
6,369,776 UART: [ldev] SUBJECT.KEYID = 5
6,370,929 UART: [ldev] AUTHORITY.KEYID = 7
6,372,158 UART: [ldev] FE.KEYID = 1
6,382,478 UART: [ldev] Erasing FE.KEYID = 1
8,859,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,729 UART: [ldev] --
10,648,513 UART: [fwproc] Wait for Commands...
10,651,477 UART: [fwproc] Recv command 0x46574c44
10,653,781 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,115 >>> mbox cmd response: success
14,835,634 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,838,731 UART: [afmc] ++
14,839,421 UART: [afmc] CDI.KEYID = 6
14,840,683 UART: [afmc] SUBJECT.KEYID = 7
14,842,132 UART: [afmc] AUTHORITY.KEYID = 5
17,345,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,074 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,695 UART: [afmc] --
19,140,424 UART: [cold-reset] --
19,143,964 UART: [state] Locking Datavault
19,149,424 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,604 UART: [state] Locking ICCM
19,153,696 UART: [exit] Launching FMC @ 0x40000130
19,162,363 UART:
19,162,606 UART: Running Caliptra FMC ...
19,163,728 UART:
19,163,886 UART: [state] CFI Enabled
19,172,202 UART: [fht] FMC Alias Private Key: 7
20,928,658 UART: [art] Extend RT PCRs Done
20,929,886 UART: [art] Lock RT PCRs Done
20,931,153 UART: [art] Populate DV Done
20,936,564 UART: [fht] FMC Alias Private Key: 7
20,938,259 UART: [art] Derive CDI
20,938,994 UART: [art] Store in in slot 0x4
20,981,208 UART: [art] Derive Key Pair
20,982,254 UART: [art] Store priv key in slot 0x5
23,408,834 UART: [art] Derive Key Pair - Done
23,422,204 UART: [art] Signing Cert with AUTHO
23,423,508 UART: RITY.KEYID = 7
25,129,197 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,701 UART: [art] PUB.X = 4F130133CC3D7222CF16B0C65C576630C837229CD95060291DD5610F49545516D6B2E55C8C332B2219EA1205D5BEC06F
25,137,963 UART: [art] PUB.Y = 0EEC0D278721784D84125B06903C5146B22C1E0FF9C047970AE8F514489E9A7605C06C98D7F3B7072B2AC75CA11DC4FC
25,145,196 UART: [art] SIG.R = 02F6F8865163081743C73673E1DCEFECE87E5AB1110BCDC9C5B8C97726F9E8065CEAF12C90E81CB169A2BE8C8E30A202
25,152,591 UART: [art] SIG.S = 9E8A53DAB1E2AE312222FD373CEBA8C97D38168C35BA99711FA489D1432842DAF244393F281A90EC43C7C59EE8CA25AE
26,131,539 UART: Caliptra RT
26,132,222 UART: [state] CFI Enabled
26,249,023 UART: [rt] RT listening for mailbox commands...
26,280,115 UART: [rt]cmd =0x4453424c, len=4
28,707,593 >>> mbox cmd response data (8 bytes)
30,762,453 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,907,900 UART:
30,908,275 UART: Running Caliptra ROM ...
30,909,339 UART:
30,909,546 UART: [state] CFI Enabled
30,920,797 UART: [state] LifecycleState = Unprovisioned
30,922,628 UART: [state] DebugLocked = No
30,925,117 UART: [state] WD Timer not started. Device not locked for debugging
30,929,071 UART: [kat] SHA2-256
31,118,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,129,672 UART: [kat] ++
31,130,181 UART: [kat] sha1
31,141,876 UART: [kat] SHA2-256
31,144,835 UART: [kat] SHA2-384
31,150,280 UART: [kat] SHA2-512-ACC
31,152,839 UART: [kat] ECC-384
33,593,830 UART: [kat] HMAC-384Kdf
33,607,369 UART: [kat] LMS
34,138,981 UART: [kat] --
34,143,369 UART: [update-reset] ++
37,603,910 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,607,119 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
38,214,812 >>> mbox cmd response: success
38,215,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,215,462 UART: [update-reset] Copying MAN_2 To MAN_1
38,252,909 UART: [update-reset Success] --
38,258,354 UART: [state] Locking Datavault
38,261,664 UART: [state] Locking PCR0, PCR1 and PCR31
38,263,850 UART: [state] Locking ICCM
38,266,487 UART: [exit] Launching FMC @ 0x40000130
38,275,103 UART:
38,275,336 UART: Running Caliptra FMC ...
38,276,433 UART:
38,276,588 UART: [state] CFI Enabled
38,320,819 UART: [art] Extend RT PCRs Done
38,322,017 UART: [art] Lock RT PCRs Done
38,323,366 UART: [art] Populate DV Done
38,328,715 UART: [fht] FMC Alias Private Key: 7
38,330,252 UART: [art] Derive CDI
38,331,063 UART: [art] Store in in slot 0x4
38,374,029 UART: [art] Derive Key Pair
38,375,027 UART: [art] Store priv key in slot 0x5
40,801,909 UART: [art] Derive Key Pair - Done
40,814,805 UART: [art] Signing Cert with AUTHO
40,816,106 UART: RITY.KEYID = 7
42,521,679 UART: [art] Erasing AUTHORITY.KEYID = 7
42,523,182 UART: [art] PUB.X = 1C1AD913B88863FB06322B3364FD1285B936A5CE40EA482F9198065E9071393828FC2C0F349A4AD929B7CB8ADEF8E97F
42,530,433 UART: [art] PUB.Y = 60BD59B9020FE09DF074502340440834EFBAF30478C53FB7DBB713B53A120412658FEFA837D991E3447E0C103C8C1C18
42,537,711 UART: [art] SIG.R = D2A08FF6D760D2667D2D572669BD8A456D6576DABFE62AB1BB91905005E34897B7444C16F84F56D77FDA39251D1DD64F
42,545,105 UART: [art] SIG.S = 8850236A2A4BB59D6C3500DF46E1B37D065B421A04B4659F718A8B7151104C73747E529DC4581B31BE306A5DE165F660
43,523,355 UART: Caliptra RT
43,524,065 UART: [state] CFI Enabled
46,240,322 UART: [rt] RT listening for mailbox commands...
46,271,498 UART: [rt]cmd =0x494e464f, len=4
46,275,356 >>> mbox cmd response data (264 bytes)
46,276,999 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,306,636 UART: [rt]cmd =0x43455252, len=4
46,317,834 >>> mbox cmd response data (784 bytes)
46,358,539 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,389,397 UART: [rt]cmd =0x44504543, len=92
50,682,606 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,752,227 ready_for_fw is high
3,752,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,954,157 >>> mbox cmd response: success
14,954,745 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,207,626 UART:
19,207,998 UART: Running Caliptra FMC ...
19,209,097 UART:
19,209,252 UART: [state] CFI Enabled
19,217,363 UART: [fht] FMC Alias Private Key: 7
20,974,041 UART: [art] Extend RT PCRs Done
20,975,256 UART: [art] Lock RT PCRs Done
20,976,926 UART: [art] Populate DV Done
20,982,667 UART: [fht] FMC Alias Private Key: 7
20,984,205 UART: [art] Derive CDI
20,984,965 UART: [art] Store in in slot 0x4
21,027,770 UART: [art] Derive Key Pair
21,028,837 UART: [art] Store priv key in slot 0x5
23,455,602 UART: [art] Derive Key Pair - Done
23,468,645 UART: [art] Signing Cert with AUTHO
23,469,938 UART: RITY.KEYID = 7
25,175,210 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,721 UART: [art] PUB.X = BFAB0CF008BF278C195C2F0E2D9945EF9CAFB577F46D0B7F18C47CAB5E5B2801F91EC2938E6425B55ADAABB9F89C49B3
25,183,959 UART: [art] PUB.Y = AE10BB3AA06A2263EDA63BAFFEF16AC0FA0FF114CD6AFB57B0652FCE5C7E5350B1AD503412C44EFE1C694C7FC3603521
25,191,308 UART: [art] SIG.R = 753CA7BDE75CCEF6BA28016F34A479B9AA7BFB3275C2A6F815E0A09AED1EBDD6D9FAE029326BFDA78E35404869FF92D8
25,198,689 UART: [art] SIG.S = 5D6FAEF8EF2A4C93F564B9832387043F8A95737B60BB0E83EB02BC5AA6CBB5DA41B8EB7678C5AB316FD0DB481B567796
26,177,553 UART: Caliptra RT
26,178,246 UART: [state] CFI Enabled
26,295,444 UART: [rt] RT listening for mailbox commands...
26,326,584 UART: [rt]cmd =0x4453424c, len=4
28,754,272 >>> mbox cmd response data (8 bytes)
30,807,729 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
38,547,619 >>> mbox cmd response: success
38,548,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,581,995 UART:
38,582,290 UART: Running Caliptra FMC ...
38,583,320 UART:
38,583,463 UART: [state] CFI Enabled
38,627,668 UART: [art] Extend RT PCRs Done
38,628,884 UART: [art] Lock RT PCRs Done
38,630,143 UART: [art] Populate DV Done
38,635,622 UART: [fht] FMC Alias Private Key: 7
38,637,167 UART: [art] Derive CDI
38,637,897 UART: [art] Store in in slot 0x4
38,680,591 UART: [art] Derive Key Pair
38,681,584 UART: [art] Store priv key in slot 0x5
41,108,173 UART: [art] Derive Key Pair - Done
41,121,222 UART: [art] Signing Cert with AUTHO
41,122,525 UART: RITY.KEYID = 7
42,827,777 UART: [art] Erasing AUTHORITY.KEYID = 7
42,829,285 UART: [art] PUB.X = F6CA3F23A36674218693EC5D8E480AA151E9C8254DEBEB624E8D6B253C70975DDCE88A2DD462CD52E27612E2A7F4ED21
42,836,577 UART: [art] PUB.Y = 9C8849D903E7DAEA24C26937CC65B379580036CDCB974189BA03132BCE126493BFD02F684E27B3B77D95F53B5EB6B4D7
42,843,801 UART: [art] SIG.R = 12C93CCD0A0275F31C15B435645A7930C4695400331530F9F66C2260758D7D3E80286A72D4B0DB309BC9E1454881BEC5
42,851,130 UART: [art] SIG.S = 744435F72E9EDB2FD441120B91E26CC49219F50B6D60832487161636A1EA540D9E1B0A50A923D83FC2DF489180220E47
43,830,107 UART: Caliptra RT
43,830,815 UART: [state] CFI Enabled
46,548,537 UART: [rt] RT listening for mailbox commands...
46,579,607 UART: [rt]cmd =0x494e464f, len=4
46,583,511 >>> mbox cmd response data (264 bytes)
46,585,157 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,614,806 UART: [rt]cmd =0x43455252, len=4
46,626,361 >>> mbox cmd response data (782 bytes)
46,667,436 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,698,076 UART: [rt]cmd =0x44504543, len=92
50,990,502 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,132 UART: [kat] LMS
1,475,328 UART: [kat] --
1,476,085 UART: [cold-reset] ++
1,476,595 UART: [fht] Storing FHT @ 0x50003400
1,479,452 UART: [idev] ++
1,479,620 UART: [idev] CDI.KEYID = 6
1,479,980 UART: [idev] SUBJECT.KEYID = 7
1,480,404 UART: [idev] UDS.KEYID = 0
1,480,749 ready_for_fw is high
1,480,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,228 UART: [idev] Erasing UDS.KEYID = 0
1,504,620 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,144 UART: [idev] --
1,514,289 UART: [ldev] ++
1,514,457 UART: [ldev] CDI.KEYID = 6
1,514,820 UART: [ldev] SUBJECT.KEYID = 5
1,515,246 UART: [ldev] AUTHORITY.KEYID = 7
1,515,709 UART: [ldev] FE.KEYID = 1
1,520,977 UART: [ldev] Erasing FE.KEYID = 1
1,546,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,752 UART: [ldev] --
1,585,083 UART: [fwproc] Waiting for Commands...
1,585,740 UART: [fwproc] Received command 0x46574c44
1,586,531 UART: [fwproc] Received Image of size 114360 bytes
2,884,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,543 >>> mbox cmd response: success
3,077,543 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,078,795 UART: [afmc] ++
3,078,963 UART: [afmc] CDI.KEYID = 6
3,079,325 UART: [afmc] SUBJECT.KEYID = 7
3,079,750 UART: [afmc] AUTHORITY.KEYID = 5
3,114,983 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,010 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,700 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,407 UART: [afmc] --
3,158,503 UART: [cold-reset] --
3,159,663 UART: [state] Locking Datavault
3,160,878 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,482 UART: [state] Locking ICCM
3,162,102 UART: [exit] Launching FMC @ 0x40000130
3,167,431 UART:
3,167,447 UART: Running Caliptra FMC ...
3,167,855 UART:
3,167,909 UART: [state] CFI Enabled
3,178,220 UART: [fht] FMC Alias Private Key: 7
3,286,075 UART: [art] Extend RT PCRs Done
3,286,503 UART: [art] Lock RT PCRs Done
3,287,833 UART: [art] Populate DV Done
3,296,068 UART: [fht] FMC Alias Private Key: 7
3,297,150 UART: [art] Derive CDI
3,297,430 UART: [art] Store in in slot 0x4
3,382,909 UART: [art] Derive Key Pair
3,383,269 UART: [art] Store priv key in slot 0x5
3,396,271 UART: [art] Derive Key Pair - Done
3,411,143 UART: [art] Signing Cert with AUTHO
3,411,623 UART: RITY.KEYID = 7
3,426,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,658 UART: [art] PUB.X = 11DEB6CC5A2A42768D4EE88568C5FA022FF202394677CF1C18E0D0CAA65BB2C8209D552F6435152C9578D3FB170251FC
3,434,425 UART: [art] PUB.Y = 8B508487D5E8DA695D111E9DE075867E7C21A5AC6F4905E7B6634D2322279164A10F2EAA7CC633B7D601CB239C8359CE
3,441,368 UART: [art] SIG.R = EB71F298E65572E9863ED08922FAB5FC195517F01560AA5DACC6FEE453E84D7082C9A6C70BC0FDC0553281BABD5AD741
3,448,149 UART: [art] SIG.S = E60A92C124FB5646691A0AE6201717C26EB30A6A9C86D27D09B4F036B614BE3D2EAE6922389971E4BEF234E31F21C0BF
3,472,154 UART: Caliptra RT
3,472,408 UART: [state] CFI Enabled
3,580,557 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,690 UART: [rt]cmd =0x4453424c, len=4
3,624,851 >>> mbox cmd response data (8 bytes)
3,624,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,577 UART:
3,625,593 UART: Running Caliptra ROM ...
3,626,001 UART:
3,626,055 UART: [state] CFI Enabled
3,628,631 UART: [state] LifecycleState = Unprovisioned
3,629,286 UART: [state] DebugLocked = No
3,630,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,631,723 UART: [kat] SHA2-256
4,425,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,429,769 UART: [kat] ++
4,429,921 UART: [kat] sha1
4,434,173 UART: [kat] SHA2-256
4,436,111 UART: [kat] SHA2-384
4,438,902 UART: [kat] SHA2-512-ACC
4,440,802 UART: [kat] ECC-384
4,446,573 UART: [kat] HMAC-384Kdf
4,451,121 UART: [kat] LMS
5,019,317 UART: [kat] --
5,020,364 UART: [update-reset] ++
6,353,705 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,354,833 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,504,751 >>> mbox cmd response: success
6,504,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,504,938 UART: [update-reset] Copying MAN_2 To MAN_1
6,512,952 UART: [update-reset Success] --
6,513,859 UART: [state] Locking Datavault
6,514,753 UART: [state] Locking PCR0, PCR1 and PCR31
6,515,357 UART: [state] Locking ICCM
6,516,003 UART: [exit] Launching FMC @ 0x40000130
6,521,332 UART:
6,521,348 UART: Running Caliptra FMC ...
6,521,756 UART:
6,521,810 UART: [state] CFI Enabled
6,611,159 UART: [art] Extend RT PCRs Done
6,611,587 UART: [art] Lock RT PCRs Done
6,612,950 UART: [art] Populate DV Done
6,621,345 UART: [fht] FMC Alias Private Key: 7
6,622,387 UART: [art] Derive CDI
6,622,667 UART: [art] Store in in slot 0x4
6,708,292 UART: [art] Derive Key Pair
6,708,652 UART: [art] Store priv key in slot 0x5
6,721,590 UART: [art] Derive Key Pair - Done
6,736,277 UART: [art] Signing Cert with AUTHO
6,736,757 UART: RITY.KEYID = 7
6,752,161 UART: [art] Erasing AUTHORITY.KEYID = 7
6,752,926 UART: [art] PUB.X = 1D68333117F2B24BD661456F57900AB5666FE2E2A64E62F8C93A1D216B936B7049AC8A96F12FA0052DE825284778D978
6,759,684 UART: [art] PUB.Y = 85260038E38C2D94E84DC643A10CD4A4ABEEEBE87FE50E5FA93FCAF50AB1A8540E8D5CED725A392C476DF3003109AC36
6,766,593 UART: [art] SIG.R = 1AC2B6C750B98E585CF94E7F50F6600E150A7BEE968D4B78E68C7A5CD84E057EE2854955C28D4EA4066D507715A7F17C
6,773,357 UART: [art] SIG.S = 4FA375EEE82036A5BE503E66C27DBDC8EC9788B712AC995D5AD5386A6DCB42D56BA7A858371249AC5D22F41102669AA1
6,797,447 UART: Caliptra RT
6,797,701 UART: [state] CFI Enabled
7,091,917 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,121,856 UART: [rt]cmd =0x494e464f, len=4
7,125,018 >>> mbox cmd response data (264 bytes)
7,125,019 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,154,120 UART: [rt]cmd =0x43455252, len=4
7,165,182 >>> mbox cmd response data (782 bytes)
7,165,183 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,195,218 UART: [rt]cmd =0x44504543, len=92
7,386,099 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,659 ready_for_fw is high
1,362,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,531 >>> mbox cmd response: success
2,928,531 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,989,405 UART:
2,989,421 UART: Running Caliptra FMC ...
2,989,829 UART:
2,989,883 UART: [state] CFI Enabled
3,000,358 UART: [fht] FMC Alias Private Key: 7
3,108,331 UART: [art] Extend RT PCRs Done
3,108,759 UART: [art] Lock RT PCRs Done
3,109,803 UART: [art] Populate DV Done
3,117,636 UART: [fht] FMC Alias Private Key: 7
3,118,734 UART: [art] Derive CDI
3,119,014 UART: [art] Store in in slot 0x4
3,204,767 UART: [art] Derive Key Pair
3,205,127 UART: [art] Store priv key in slot 0x5
3,218,289 UART: [art] Derive Key Pair - Done
3,232,922 UART: [art] Signing Cert with AUTHO
3,233,402 UART: RITY.KEYID = 7
3,248,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,227 UART: [art] PUB.X = A2D2B0AEC0CFCFBAB1DD021C7C52F806655D53BFA1BD11A3479B18B94F8BD795858B8CADCC36736BF08E777CD0A34787
3,256,013 UART: [art] PUB.Y = 95E0DC6B359627C08DD5F8D5D3CDDEC8C0D01B9FCED8C4B014D2927F359D95A903050E94A2686C9BD6D8D50DF84D95E7
3,262,967 UART: [art] SIG.R = B9100EB988DFD1E1B35A22AC7AC3BB0635A3B0A6539DF179DDF8CB440A37D2BB4907FE02EAD1F964EEEDCCA7FEA7C86A
3,269,754 UART: [art] SIG.S = EEB36C4201AFFB884F9D83658B6C532DAF6FC7C2D63D79D543922F955AF8FA79B9380C676410DBAA6E9A28C519DB89E6
3,293,951 UART: Caliptra RT
3,294,205 UART: [state] CFI Enabled
3,401,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,127 UART: [rt]cmd =0x4453424c, len=4
3,445,412 >>> mbox cmd response data (8 bytes)
3,445,413 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,207,948 >>> mbox cmd response: success
6,207,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,221,337 UART:
6,221,353 UART: Running Caliptra FMC ...
6,221,761 UART:
6,221,815 UART: [state] CFI Enabled
6,310,690 UART: [art] Extend RT PCRs Done
6,311,118 UART: [art] Lock RT PCRs Done
6,312,243 UART: [art] Populate DV Done
6,320,664 UART: [fht] FMC Alias Private Key: 7
6,321,724 UART: [art] Derive CDI
6,322,004 UART: [art] Store in in slot 0x4
6,408,137 UART: [art] Derive Key Pair
6,408,497 UART: [art] Store priv key in slot 0x5
6,421,545 UART: [art] Derive Key Pair - Done
6,436,076 UART: [art] Signing Cert with AUTHO
6,436,556 UART: RITY.KEYID = 7
6,452,270 UART: [art] Erasing AUTHORITY.KEYID = 7
6,453,035 UART: [art] PUB.X = 5293C917AF490AE74D4F9143F1096ED8693D1648EC4DB96E349A4095A1E50C30A749902C8D152BD140F77D820AE00233
6,459,786 UART: [art] PUB.Y = 640A641A8B624FE318068113D5408553621E52BE37BB3BFA839AABAB9E01D5864848CBC4D1AA33AA06098500EBAE8112
6,466,703 UART: [art] SIG.R = B82BDCE06B31AADED415DBC257F5281E9B0A91E31844FF8B32AAD9EEB4442B1F4F75E0177094635217DC836A591A3536
6,473,480 UART: [art] SIG.S = E8521487EE38C0F4FB3D9B032FE4F27BAC55F223AE36A49FE027F5CB59B69BB7BB6EF5332734DA134D69D36DD3FEA318
6,497,318 UART: Caliptra RT
6,497,572 UART: [state] CFI Enabled
6,793,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,823,383 UART: [rt]cmd =0x494e464f, len=4
6,826,897 >>> mbox cmd response data (264 bytes)
6,826,898 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,856,097 UART: [rt]cmd =0x43455252, len=4
6,866,746 >>> mbox cmd response data (784 bytes)
6,866,747 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,622 UART: [rt]cmd =0x44504543, len=92
7,088,330 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
891,126 UART: [kat] SHA2-256
893,064 UART: [kat] SHA2-384
895,947 UART: [kat] SHA2-512-ACC
897,848 UART: [kat] ECC-384
904,027 UART: [kat] HMAC-384Kdf
908,627 UART: [kat] LMS
1,476,823 UART: [kat] --
1,477,634 UART: [cold-reset] ++
1,478,092 UART: [fht] Storing FHT @ 0x50003400
1,480,969 UART: [idev] ++
1,481,137 UART: [idev] CDI.KEYID = 6
1,481,497 UART: [idev] SUBJECT.KEYID = 7
1,481,921 UART: [idev] UDS.KEYID = 0
1,482,266 ready_for_fw is high
1,482,266 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,889 UART: [idev] Erasing UDS.KEYID = 0
1,506,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,337 UART: [idev] --
1,516,564 UART: [ldev] ++
1,516,732 UART: [ldev] CDI.KEYID = 6
1,517,095 UART: [ldev] SUBJECT.KEYID = 5
1,517,521 UART: [ldev] AUTHORITY.KEYID = 7
1,517,984 UART: [ldev] FE.KEYID = 1
1,523,060 UART: [ldev] Erasing FE.KEYID = 1
1,548,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,333 UART: [ldev] --
1,587,778 UART: [fwproc] Waiting for Commands...
1,588,517 UART: [fwproc] Received command 0x46574c44
1,589,308 UART: [fwproc] Received Image of size 114360 bytes
2,887,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,472 >>> mbox cmd response: success
3,079,472 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,080,698 UART: [afmc] ++
3,080,866 UART: [afmc] CDI.KEYID = 6
3,081,228 UART: [afmc] SUBJECT.KEYID = 7
3,081,653 UART: [afmc] AUTHORITY.KEYID = 5
3,117,168 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,501 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,191 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,884 UART: [afmc] --
3,159,960 UART: [cold-reset] --
3,160,928 UART: [state] Locking Datavault
3,162,185 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,789 UART: [state] Locking ICCM
3,163,381 UART: [exit] Launching FMC @ 0x40000130
3,168,710 UART:
3,168,726 UART: Running Caliptra FMC ...
3,169,134 UART:
3,169,277 UART: [state] CFI Enabled
3,180,112 UART: [fht] FMC Alias Private Key: 7
3,288,089 UART: [art] Extend RT PCRs Done
3,288,517 UART: [art] Lock RT PCRs Done
3,289,477 UART: [art] Populate DV Done
3,297,794 UART: [fht] FMC Alias Private Key: 7
3,298,746 UART: [art] Derive CDI
3,299,026 UART: [art] Store in in slot 0x4
3,384,329 UART: [art] Derive Key Pair
3,384,689 UART: [art] Store priv key in slot 0x5
3,398,533 UART: [art] Derive Key Pair - Done
3,413,218 UART: [art] Signing Cert with AUTHO
3,413,698 UART: RITY.KEYID = 7
3,429,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,881 UART: [art] PUB.X = 99897F0C18FFEC0325F8DEAA58FC94AEA100426688EACB107F2BF9A9F50D19CCD6112A3B75A52A8C0D39DD5F2C5EB104
3,436,634 UART: [art] PUB.Y = 2EC3798D4D1252FCFCAC57FEB8F660A3FFC08DD9C0BA05C6FF16AAC6FD1BD695ED2749D3660FF3F0543B0DC369AB4E47
3,443,603 UART: [art] SIG.R = 795BD620CCF314FF69C17533F3276CF55EA39A8D89A4B2EAD7139868F82372CC6BD6C05B221C5085171888EE4A94713F
3,450,375 UART: [art] SIG.S = BD598810F2428E7F0BAE51374535BDF84A2BAB992B94F9E1E39A1486BC72FCAB62E69A6FDD1D9091368FB6951D666C1A
3,473,881 UART: Caliptra RT
3,474,227 UART: [state] CFI Enabled
3,582,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,620 UART: [rt]cmd =0x4453424c, len=4
3,626,401 >>> mbox cmd response data (8 bytes)
3,626,402 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,169 UART:
3,627,185 UART: Running Caliptra ROM ...
3,627,593 UART:
3,627,734 UART: [state] CFI Enabled
3,630,974 UART: [state] LifecycleState = Unprovisioned
3,631,629 UART: [state] DebugLocked = No
3,632,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,633,840 UART: [kat] SHA2-256
4,427,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,431,886 UART: [kat] ++
4,432,038 UART: [kat] sha1
4,436,196 UART: [kat] SHA2-256
4,438,134 UART: [kat] SHA2-384
4,441,017 UART: [kat] SHA2-512-ACC
4,442,917 UART: [kat] ECC-384
4,448,536 UART: [kat] HMAC-384Kdf
4,453,196 UART: [kat] LMS
5,021,392 UART: [kat] --
5,022,111 UART: [update-reset] ++
6,357,972 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,359,106 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,509,024 >>> mbox cmd response: success
6,509,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,509,265 UART: [update-reset] Copying MAN_2 To MAN_1
6,517,279 UART: [update-reset Success] --
6,518,294 UART: [state] Locking Datavault
6,519,130 UART: [state] Locking PCR0, PCR1 and PCR31
6,519,734 UART: [state] Locking ICCM
6,520,244 UART: [exit] Launching FMC @ 0x40000130
6,525,573 UART:
6,525,589 UART: Running Caliptra FMC ...
6,525,997 UART:
6,526,140 UART: [state] CFI Enabled
6,615,081 UART: [art] Extend RT PCRs Done
6,615,509 UART: [art] Lock RT PCRs Done
6,616,536 UART: [art] Populate DV Done
6,624,971 UART: [fht] FMC Alias Private Key: 7
6,625,945 UART: [art] Derive CDI
6,626,225 UART: [art] Store in in slot 0x4
6,711,824 UART: [art] Derive Key Pair
6,712,184 UART: [art] Store priv key in slot 0x5
6,725,130 UART: [art] Derive Key Pair - Done
6,739,554 UART: [art] Signing Cert with AUTHO
6,740,034 UART: RITY.KEYID = 7
6,755,556 UART: [art] Erasing AUTHORITY.KEYID = 7
6,756,321 UART: [art] PUB.X = 94A0B674499393D50EF0A0FF3941D8D56D4E0004723BCA9200EC4BB6DF37CFC9DA2C1268B9857C866DB72C36C5D4A402
6,763,046 UART: [art] PUB.Y = 7FB197D0096D86AC52C2BCB99EF143507AC7960676416C859485ACBB098A6201B1B8D9726EE7269B4D6D0A718139F455
6,769,979 UART: [art] SIG.R = DD87C764CE2C543AD838CF11CE795340EE6A81B28A9760C6744FF6B2984256A0F34B79A0E741A416435122B72E13225F
6,776,747 UART: [art] SIG.S = 185CBF2562A894AA0EFFE30BA79F46EF539960A85B40925283593234758399360730155B22637DA7BF93DBE8AA016E7F
6,800,194 UART: Caliptra RT
6,800,540 UART: [state] CFI Enabled
7,093,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,123,322 UART: [rt]cmd =0x494e464f, len=4
7,126,414 >>> mbox cmd response data (264 bytes)
7,126,415 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,155,512 UART: [rt]cmd =0x43455252, len=4
7,166,494 >>> mbox cmd response data (783 bytes)
7,166,495 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,196,414 UART: [rt]cmd =0x44504543, len=92
7,388,059 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,064 ready_for_fw is high
1,362,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,650 >>> mbox cmd response: success
2,928,650 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,990,114 UART:
2,990,130 UART: Running Caliptra FMC ...
2,990,538 UART:
2,990,681 UART: [state] CFI Enabled
3,001,424 UART: [fht] FMC Alias Private Key: 7
3,109,751 UART: [art] Extend RT PCRs Done
3,110,179 UART: [art] Lock RT PCRs Done
3,111,649 UART: [art] Populate DV Done
3,119,886 UART: [fht] FMC Alias Private Key: 7
3,121,002 UART: [art] Derive CDI
3,121,282 UART: [art] Store in in slot 0x4
3,207,497 UART: [art] Derive Key Pair
3,207,857 UART: [art] Store priv key in slot 0x5
3,221,363 UART: [art] Derive Key Pair - Done
3,235,784 UART: [art] Signing Cert with AUTHO
3,236,264 UART: RITY.KEYID = 7
3,251,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,315 UART: [art] PUB.X = F8499D3D3FE9DD2D7AC4A1143BA1D45A7E0F2394F28260D8841F60870F87F7FDECF28F29538E223F4D2D1A3801C76F24
3,259,084 UART: [art] PUB.Y = 41873EA5748767A9236DC28219F7FCFBCDD3DADE614CEA639A3D8AEB4B772E43E8291DA22DE4B82EA3212CB27EBD5B7A
3,266,056 UART: [art] SIG.R = E3531033925CA8219138E9A716742C4F642E4524080A329D2EF55EA8639583E0030799029DAA9FD4C93D0399ED267182
3,272,794 UART: [art] SIG.S = F08398EAA7BC6FC08BC757CA9B998BEAC7C3290C39DBF140BD50FD9A81685CA160F6839365D175F994A97658B16ABD37
3,296,880 UART: Caliptra RT
3,297,226 UART: [state] CFI Enabled
3,405,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,582 UART: [rt]cmd =0x4453424c, len=4
3,449,583 >>> mbox cmd response data (8 bytes)
3,449,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,213,410 >>> mbox cmd response: success
6,213,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,226,639 UART:
6,226,655 UART: Running Caliptra FMC ...
6,227,063 UART:
6,227,206 UART: [state] CFI Enabled
6,316,341 UART: [art] Extend RT PCRs Done
6,316,769 UART: [art] Lock RT PCRs Done
6,318,118 UART: [art] Populate DV Done
6,326,631 UART: [fht] FMC Alias Private Key: 7
6,327,791 UART: [art] Derive CDI
6,328,071 UART: [art] Store in in slot 0x4
6,413,366 UART: [art] Derive Key Pair
6,413,726 UART: [art] Store priv key in slot 0x5
6,426,884 UART: [art] Derive Key Pair - Done
6,441,672 UART: [art] Signing Cert with AUTHO
6,442,152 UART: RITY.KEYID = 7
6,457,260 UART: [art] Erasing AUTHORITY.KEYID = 7
6,458,025 UART: [art] PUB.X = 069973AAD0CA2240F82F10A658CAA81B2EE841AE28264C9E55C0ABF1A379CDFF1414526D9562A50C211BFC9261EC52D4
6,464,799 UART: [art] PUB.Y = F24EA6F59C265047239D8BC3F3ADE4781C48C83025C91EF0D2AF924CE66C600625971EADFC3DC7CD94FB4EE92A41F175
6,471,760 UART: [art] SIG.R = 7ED187E4E1A8F7CBBE536B0D4A2322DEDD7499143CC703490F453805FF1408AB8B28A4E0E920F6058E1436030157D8A4
6,478,508 UART: [art] SIG.S = D8764250BB88058620FE25B8456490E7232ABE20A7AD99986051E378AE9EC4300A1D6C242CEBC91220EE409916CBBC68
6,502,655 UART: Caliptra RT
6,503,001 UART: [state] CFI Enabled
6,796,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,826,993 UART: [rt]cmd =0x494e464f, len=4
6,830,247 >>> mbox cmd response data (264 bytes)
6,830,248 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,859,471 UART: [rt]cmd =0x43455252, len=4
6,870,459 >>> mbox cmd response data (783 bytes)
6,870,460 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,900,387 UART: [rt]cmd =0x44504543, len=92
7,091,832 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
893,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,615 UART: [kat] ++
897,767 UART: [kat] sha1
901,957 UART: [kat] SHA2-256
903,897 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,934 UART: [kat] LMS
1,171,262 UART: [kat] --
1,171,889 UART: [cold-reset] ++
1,172,437 UART: [fht] FHT @ 0x50003400
1,175,042 UART: [idev] ++
1,175,210 UART: [idev] CDI.KEYID = 6
1,175,570 UART: [idev] SUBJECT.KEYID = 7
1,175,994 UART: [idev] UDS.KEYID = 0
1,176,339 ready_for_fw is high
1,176,339 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,004 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,403 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,988 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,244,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,015 UART: [ldev] --
1,283,310 UART: [fwproc] Wait for Commands...
1,284,016 UART: [fwproc] Recv command 0x46574c44
1,284,744 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,316 >>> mbox cmd response: success
2,774,316 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,775,448 UART: [afmc] ++
2,775,616 UART: [afmc] CDI.KEYID = 6
2,775,978 UART: [afmc] SUBJECT.KEYID = 7
2,776,403 UART: [afmc] AUTHORITY.KEYID = 5
2,811,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,461 UART: [afmc] --
2,855,461 UART: [cold-reset] --
2,856,431 UART: [state] Locking Datavault
2,857,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,996 UART: [state] Locking ICCM
2,858,562 UART: [exit] Launching FMC @ 0x40000130
2,863,891 UART:
2,863,907 UART: Running Caliptra FMC ...
2,864,315 UART:
2,864,369 UART: [state] CFI Enabled
2,875,164 UART: [fht] FMC Alias Private Key: 7
2,982,559 UART: [art] Extend RT PCRs Done
2,982,987 UART: [art] Lock RT PCRs Done
2,984,469 UART: [art] Populate DV Done
2,992,662 UART: [fht] FMC Alias Private Key: 7
2,993,754 UART: [art] Derive CDI
2,994,034 UART: [art] Store in in slot 0x4
3,079,695 UART: [art] Derive Key Pair
3,080,055 UART: [art] Store priv key in slot 0x5
3,093,367 UART: [art] Derive Key Pair - Done
3,108,247 UART: [art] Signing Cert with AUTHO
3,108,727 UART: RITY.KEYID = 7
3,123,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,678 UART: [art] PUB.X = 7F2D01E26829F3288AC2080000BADC4EE2662B2E37090DF84F09AFB8166244DB9E6FD6DD1E7127622D6DD2014871F117
3,131,388 UART: [art] PUB.Y = 472B52273ED91EFC4F671D6CCCBB9C6BF960E3333B75A531DFC73029C9BC6BAC56A9B2EAD29F6067FFF3CFA398DC2305
3,138,357 UART: [art] SIG.R = F6AFF105F1FE572A1222961AFC11359803122F92694F3C6E93FDD6FD981E9DCF5DD07015BF4D73D122ED468526752766
3,145,123 UART: [art] SIG.S = 75EB00A90B427B698648ECF71BF46262D7BEEEBFB2352C7D1536E8291FF1D684AC8A314A2CFD69B29084F5FAA821D6EF
3,168,581 UART: Caliptra RT
3,168,835 UART: [state] CFI Enabled
3,276,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,108 UART: [rt]cmd =0x4453424c, len=4
3,319,833 >>> mbox cmd response data (8 bytes)
3,319,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,298 UART:
3,320,314 UART: Running Caliptra ROM ...
3,320,722 UART:
3,320,777 UART: [state] CFI Enabled
3,323,229 UART: [state] LifecycleState = Unprovisioned
3,323,884 UART: [state] DebugLocked = No
3,324,480 UART: [state] WD Timer not started. Device not locked for debugging
3,325,610 UART: [kat] SHA2-256
4,131,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,135,385 UART: [kat] ++
4,135,537 UART: [kat] sha1
4,139,717 UART: [kat] SHA2-256
4,141,657 UART: [kat] SHA2-384
4,144,432 UART: [kat] SHA2-512-ACC
4,146,332 UART: [kat] ECC-384
4,155,757 UART: [kat] HMAC-384Kdf
4,160,207 UART: [kat] LMS
4,408,535 UART: [kat] --
4,409,497 UART: [update-reset] ++
5,722,620 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,723,745 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,873,611 >>> mbox cmd response: success
5,873,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,873,722 UART: [update-reset] Copying MAN_2 To MAN_1
5,881,736 UART: [update-reset Success] --
5,882,907 UART: [state] Locking Datavault
5,883,673 UART: [state] Locking PCR0, PCR1 and PCR31
5,884,277 UART: [state] Locking ICCM
5,884,731 UART: [exit] Launching FMC @ 0x40000130
5,890,060 UART:
5,890,076 UART: Running Caliptra FMC ...
5,890,484 UART:
5,890,538 UART: [state] CFI Enabled
5,979,415 UART: [art] Extend RT PCRs Done
5,979,843 UART: [art] Lock RT PCRs Done
5,981,454 UART: [art] Populate DV Done
5,989,751 UART: [fht] FMC Alias Private Key: 7
5,990,741 UART: [art] Derive CDI
5,991,021 UART: [art] Store in in slot 0x4
6,076,998 UART: [art] Derive Key Pair
6,077,358 UART: [art] Store priv key in slot 0x5
6,090,790 UART: [art] Derive Key Pair - Done
6,105,774 UART: [art] Signing Cert with AUTHO
6,106,254 UART: RITY.KEYID = 7
6,121,224 UART: [art] Erasing AUTHORITY.KEYID = 7
6,121,989 UART: [art] PUB.X = 19E33A8AE89B470BD423DE7EC9B33A84732A98042D968EBB9490D84E79A4C0C4CC399B35412643E109DED0E26A09ADEE
6,128,757 UART: [art] PUB.Y = 70CC29CF1B0C5EBD2C4ED2D151DECD138C9534D99ED31D5F76A3651CECF4B2E121F68FB79EF7B499EEC677F03C360C08
6,135,720 UART: [art] SIG.R = 85D15681AFFA67D515EEA9205E37B38DE02B0F2907B4829FBA61821D8C8FBF9ADE312415949C6B5F33BD6F977EC24E90
6,142,494 UART: [art] SIG.S = 1BFFC61B29119181B97B2A8AF9563ADAA75DDF479B5B455367389C9B0FF60491FE9C548F77A22F2AA0D6EE6094A80881
6,166,374 UART: Caliptra RT
6,166,628 UART: [state] CFI Enabled
6,458,837 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,488,946 UART: [rt]cmd =0x494e464f, len=4
6,492,372 >>> mbox cmd response data (264 bytes)
6,492,373 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,521,610 UART: [rt]cmd =0x43455252, len=4
6,532,250 >>> mbox cmd response data (783 bytes)
6,532,251 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,562,144 UART: [rt]cmd =0x44504543, len=92
6,753,397 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,469 ready_for_fw is high
1,060,469 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,467 >>> mbox cmd response: success
2,626,467 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,687,633 UART:
2,687,649 UART: Running Caliptra FMC ...
2,688,057 UART:
2,688,111 UART: [state] CFI Enabled
2,698,772 UART: [fht] FMC Alias Private Key: 7
2,806,437 UART: [art] Extend RT PCRs Done
2,806,865 UART: [art] Lock RT PCRs Done
2,808,507 UART: [art] Populate DV Done
2,816,874 UART: [fht] FMC Alias Private Key: 7
2,817,994 UART: [art] Derive CDI
2,818,274 UART: [art] Store in in slot 0x4
2,903,715 UART: [art] Derive Key Pair
2,904,075 UART: [art] Store priv key in slot 0x5
2,917,175 UART: [art] Derive Key Pair - Done
2,931,788 UART: [art] Signing Cert with AUTHO
2,932,268 UART: RITY.KEYID = 7
2,947,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,001 UART: [art] PUB.X = 0D8E3A752C0B73021C7AFDD05CC083C1D3175F53B6187043403A6F9D982628D06196388932056A9AF3CD5CB8F1787097
2,954,753 UART: [art] PUB.Y = 728AF0EFA7D1914EB39358F626384BDB34FCDF4D1785EABDF6740BDA30D7FB60DB8530CB51CE691CD46F656E887FD7C8
2,961,720 UART: [art] SIG.R = 6181E6C24679981732C3DA131DAAAAE2466C2C25CC1B2FD6A8F3014919EB5036516132F1A70E8C6BAC6F41DB07DE3361
2,968,487 UART: [art] SIG.S = 5753EA0214102CFEE26884141339CD952BFD44CF72BE42B6BEA41EF89C540B1733F8732B27E09FF986B68513234B6455
2,992,764 UART: Caliptra RT
2,993,018 UART: [state] CFI Enabled
3,100,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,629 UART: [rt]cmd =0x4453424c, len=4
3,144,268 >>> mbox cmd response data (8 bytes)
3,144,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,581,799 >>> mbox cmd response: success
5,581,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,595,171 UART:
5,595,187 UART: Running Caliptra FMC ...
5,595,595 UART:
5,595,649 UART: [state] CFI Enabled
5,684,956 UART: [art] Extend RT PCRs Done
5,685,384 UART: [art] Lock RT PCRs Done
5,686,747 UART: [art] Populate DV Done
5,695,182 UART: [fht] FMC Alias Private Key: 7
5,696,280 UART: [art] Derive CDI
5,696,560 UART: [art] Store in in slot 0x4
5,782,325 UART: [art] Derive Key Pair
5,782,685 UART: [art] Store priv key in slot 0x5
5,795,737 UART: [art] Derive Key Pair - Done
5,810,746 UART: [art] Signing Cert with AUTHO
5,811,226 UART: RITY.KEYID = 7
5,826,158 UART: [art] Erasing AUTHORITY.KEYID = 7
5,826,923 UART: [art] PUB.X = 8DB0F9FE8DC034EDA9F27C871009A868FFD237DF89618ADDE387337A8827FDE701BD2F9594E096ABDF2C47ACA43F15BC
5,833,707 UART: [art] PUB.Y = 56A40AD75EDE8BA030B63E487C47626C1FFB1813BF22DEC8351824E22D3B204DCE94073A14E0AA81630979D4CA1FF59A
5,840,658 UART: [art] SIG.R = A4FB319EA9EACDEACDBC43FEF56815732925124C646519025733F6B270D05319A81CB5C8558AC454A0F3133F91657AD1
5,847,429 UART: [art] SIG.S = 8AB2F46C90EDFBC2FFA02028B43DE10DE28DBD7A664F0CF30D5BB980B90624D742E26C60D36F92C0F02126CBE4F3F0FE
5,871,302 UART: Caliptra RT
5,871,556 UART: [state] CFI Enabled
6,164,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,194,735 UART: [rt]cmd =0x494e464f, len=4
6,197,907 >>> mbox cmd response data (264 bytes)
6,197,908 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,227,067 UART: [rt]cmd =0x43455252, len=4
6,237,782 >>> mbox cmd response data (784 bytes)
6,237,783 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,267,712 UART: [rt]cmd =0x44504543, len=92
6,459,013 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,635 UART: [kat] SHA2-512-ACC
908,536 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,781 UART: [kat] LMS
1,171,109 UART: [kat] --
1,171,878 UART: [cold-reset] ++
1,172,298 UART: [fht] FHT @ 0x50003400
1,174,903 UART: [idev] ++
1,175,071 UART: [idev] CDI.KEYID = 6
1,175,431 UART: [idev] SUBJECT.KEYID = 7
1,175,855 UART: [idev] UDS.KEYID = 0
1,176,200 ready_for_fw is high
1,176,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,101 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,898 UART: [idev] --
1,210,726 UART: [ldev] ++
1,210,894 UART: [ldev] CDI.KEYID = 6
1,211,257 UART: [ldev] SUBJECT.KEYID = 5
1,211,683 UART: [ldev] AUTHORITY.KEYID = 7
1,212,146 UART: [ldev] FE.KEYID = 1
1,217,618 UART: [ldev] Erasing FE.KEYID = 1
1,244,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,600 UART: [ldev] --
1,283,917 UART: [fwproc] Wait for Commands...
1,284,665 UART: [fwproc] Recv command 0x46574c44
1,285,393 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,737 >>> mbox cmd response: success
2,774,737 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,775,991 UART: [afmc] ++
2,776,159 UART: [afmc] CDI.KEYID = 6
2,776,521 UART: [afmc] SUBJECT.KEYID = 7
2,776,946 UART: [afmc] AUTHORITY.KEYID = 5
2,812,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,384 UART: [afmc] --
2,856,430 UART: [cold-reset] --
2,857,488 UART: [state] Locking Datavault
2,858,611 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,215 UART: [state] Locking ICCM
2,859,879 UART: [exit] Launching FMC @ 0x40000130
2,865,208 UART:
2,865,224 UART: Running Caliptra FMC ...
2,865,632 UART:
2,865,775 UART: [state] CFI Enabled
2,876,170 UART: [fht] FMC Alias Private Key: 7
2,984,963 UART: [art] Extend RT PCRs Done
2,985,391 UART: [art] Lock RT PCRs Done
2,987,031 UART: [art] Populate DV Done
2,995,020 UART: [fht] FMC Alias Private Key: 7
2,996,032 UART: [art] Derive CDI
2,996,312 UART: [art] Store in in slot 0x4
3,082,357 UART: [art] Derive Key Pair
3,082,717 UART: [art] Store priv key in slot 0x5
3,095,933 UART: [art] Derive Key Pair - Done
3,110,675 UART: [art] Signing Cert with AUTHO
3,111,155 UART: RITY.KEYID = 7
3,126,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,026 UART: [art] PUB.X = 10A6D1F9AD83A312F112DE832B972A869E141CED7C588BEDAA0BA5BC19881EB5304DEBCD1BEBD46D79919DCA96B943AB
3,133,817 UART: [art] PUB.Y = CB33888CD80BB7CB384632BCE2804F835FE230FB974B35EB7A1DA7AD26AB78570367DE435AB7004E7C0E8046D824D95D
3,140,746 UART: [art] SIG.R = 243DA3919250DB58C9A2239404F4D5414C0335C714F9A334E43C2849BDA83956FEC367B6E9E990ED6641B1665CB08218
3,147,504 UART: [art] SIG.S = 65F17A9643E88C89DE15A978A6B9C8EE8BDEEC0CCD8348228C48D2977B1A646873F99E235277EE399870A2C3418D434B
3,171,376 UART: Caliptra RT
3,171,722 UART: [state] CFI Enabled
3,279,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,591 UART: [rt]cmd =0x4453424c, len=4
3,323,656 >>> mbox cmd response data (8 bytes)
3,323,657 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,507 UART:
3,324,523 UART: Running Caliptra ROM ...
3,324,931 UART:
3,325,073 UART: [state] CFI Enabled
3,327,681 UART: [state] LifecycleState = Unprovisioned
3,328,336 UART: [state] DebugLocked = No
3,329,018 UART: [state] WD Timer not started. Device not locked for debugging
3,330,136 UART: [kat] SHA2-256
4,135,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,139,911 UART: [kat] ++
4,140,063 UART: [kat] sha1
4,144,253 UART: [kat] SHA2-256
4,146,193 UART: [kat] SHA2-384
4,148,976 UART: [kat] SHA2-512-ACC
4,150,876 UART: [kat] ECC-384
4,160,991 UART: [kat] HMAC-384Kdf
4,165,649 UART: [kat] LMS
4,413,977 UART: [kat] --
4,414,803 UART: [update-reset] ++
5,726,696 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,727,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,877,675 >>> mbox cmd response: success
5,877,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,877,830 UART: [update-reset] Copying MAN_2 To MAN_1
5,885,844 UART: [update-reset Success] --
5,886,565 UART: [state] Locking Datavault
5,887,329 UART: [state] Locking PCR0, PCR1 and PCR31
5,887,933 UART: [state] Locking ICCM
5,888,553 UART: [exit] Launching FMC @ 0x40000130
5,893,882 UART:
5,893,898 UART: Running Caliptra FMC ...
5,894,306 UART:
5,894,449 UART: [state] CFI Enabled
5,983,198 UART: [art] Extend RT PCRs Done
5,983,626 UART: [art] Lock RT PCRs Done
5,984,941 UART: [art] Populate DV Done
5,993,258 UART: [fht] FMC Alias Private Key: 7
5,994,206 UART: [art] Derive CDI
5,994,486 UART: [art] Store in in slot 0x4
6,080,069 UART: [art] Derive Key Pair
6,080,429 UART: [art] Store priv key in slot 0x5
6,093,159 UART: [art] Derive Key Pair - Done
6,107,845 UART: [art] Signing Cert with AUTHO
6,108,325 UART: RITY.KEYID = 7
6,123,359 UART: [art] Erasing AUTHORITY.KEYID = 7
6,124,124 UART: [art] PUB.X = D44323C3E633755DBFE7F3DAD5D380ECBCE767E5F32685184B629130A59E40FD769F7DE500719D442FD2B7F5421503E9
6,130,873 UART: [art] PUB.Y = FD76CA4699A3D6F34CFE5C531C2DF54475304BD7B97D0C71D7675ED71238EE9C227F00B0BA7AD62CC567001096EDB20B
6,137,785 UART: [art] SIG.R = BAF9819A9498F56456A7012EBEF3C16BA839908F54C6BFA655C1B9F040CA54FFE971F2D64F07FFAEF0B9F22DF73F4FCC
6,144,571 UART: [art] SIG.S = BF88971D1474A5E9407C0C8C815D8ED386D371C38D743E780DD9FE0249B0FC920FA747B0EF76E1B8BC5256381CA93DA2
6,168,180 UART: Caliptra RT
6,168,526 UART: [state] CFI Enabled
6,462,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,493,031 UART: [rt]cmd =0x494e464f, len=4
6,496,577 >>> mbox cmd response data (264 bytes)
6,496,578 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,526,237 UART: [rt]cmd =0x43455252, len=4
6,536,836 >>> mbox cmd response data (784 bytes)
6,536,837 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,566,858 UART: [rt]cmd =0x44504543, len=92
6,758,371 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,596 ready_for_fw is high
1,060,596 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,782 >>> mbox cmd response: success
2,627,782 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,690,004 UART:
2,690,020 UART: Running Caliptra FMC ...
2,690,428 UART:
2,690,571 UART: [state] CFI Enabled
2,701,244 UART: [fht] FMC Alias Private Key: 7
2,808,893 UART: [art] Extend RT PCRs Done
2,809,321 UART: [art] Lock RT PCRs Done
2,811,009 UART: [art] Populate DV Done
2,819,078 UART: [fht] FMC Alias Private Key: 7
2,820,222 UART: [art] Derive CDI
2,820,502 UART: [art] Store in in slot 0x4
2,906,395 UART: [art] Derive Key Pair
2,906,755 UART: [art] Store priv key in slot 0x5
2,919,903 UART: [art] Derive Key Pair - Done
2,934,644 UART: [art] Signing Cert with AUTHO
2,935,124 UART: RITY.KEYID = 7
2,950,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,829 UART: [art] PUB.X = CED3E8C7E474E727FCA443FC5B846489583140501624D6324EB2B2A3B69E170934CF93FDD7F6FDD061B2598A773A4FF7
2,957,602 UART: [art] PUB.Y = D3A5252A59432304A424733EC9D9F975B0156772F8D9C59A49AAEA126E06C98D728E0705A10A5662516AA9034DF12E42
2,964,528 UART: [art] SIG.R = EE238850F3FDFDD58571B870A9CC11C712009D576CDDBCB5320D06AEEAC55ECBDBAF62A0848FE79CAC836215DB38A56E
2,971,294 UART: [art] SIG.S = BA471BAC8E6CB2320240B9430BFB84F1887BFFDCAB3B4D1749B2D686CCE02978E1D9C460C9E8681ECDE220DF771E262C
2,994,527 UART: Caliptra RT
2,994,873 UART: [state] CFI Enabled
3,102,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,887 UART: [rt]cmd =0x4453424c, len=4
3,147,112 >>> mbox cmd response data (8 bytes)
3,147,113 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,538 >>> mbox cmd response: success
5,584,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,598,126 UART:
5,598,142 UART: Running Caliptra FMC ...
5,598,550 UART:
5,598,693 UART: [state] CFI Enabled
5,687,570 UART: [art] Extend RT PCRs Done
5,687,998 UART: [art] Lock RT PCRs Done
5,689,345 UART: [art] Populate DV Done
5,697,728 UART: [fht] FMC Alias Private Key: 7
5,698,694 UART: [art] Derive CDI
5,698,974 UART: [art] Store in in slot 0x4
5,785,017 UART: [art] Derive Key Pair
5,785,377 UART: [art] Store priv key in slot 0x5
5,798,029 UART: [art] Derive Key Pair - Done
5,812,873 UART: [art] Signing Cert with AUTHO
5,813,353 UART: RITY.KEYID = 7
5,827,925 UART: [art] Erasing AUTHORITY.KEYID = 7
5,828,690 UART: [art] PUB.X = AD10EBBCA3FD20BF9E95C0BBC87D37AAEE3C214A12054AD5FD22A329E53AB3C8C9A4352653F90F4EA935E572F3F78B34
5,835,476 UART: [art] PUB.Y = 994F1A44C12825CF473F6BE3224DF28D8DDDAEED20F21770F1163A20A1F541C77A3E6229118ECBE44D2DD4A223053366
5,842,429 UART: [art] SIG.R = C4D66544B6BE46B046D406A296C559D9DE80B435AFA906798475C5BFD2CE5212658286CF5C9CA152BF9D050197833634
5,849,185 UART: [art] SIG.S = 4087376FAEC9EB76A622538709B14767764BDD1CCA1E07B429BF40A7A26C9475620F921C860DD97AC85B4262B2831C71
5,872,368 UART: Caliptra RT
5,872,714 UART: [state] CFI Enabled
6,165,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,195,714 UART: [rt]cmd =0x494e464f, len=4
6,199,010 >>> mbox cmd response data (264 bytes)
6,199,011 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,228,112 UART: [rt]cmd =0x43455252, len=4
6,238,932 >>> mbox cmd response data (783 bytes)
6,238,933 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,269,070 UART: [rt]cmd =0x44504543, len=92
6,461,157 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,389 UART: [cold-reset] ++
1,169,825 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,173,743 ready_for_fw is high
1,173,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,197,807 UART: [idev] Sha1 KeyId Algorithm
1,206,799 UART: [idev] --
1,207,840 UART: [ldev] ++
1,208,008 UART: [ldev] CDI.KEYID = 6
1,208,372 UART: [ldev] SUBJECT.KEYID = 5
1,208,799 UART: [ldev] AUTHORITY.KEYID = 7
1,209,262 UART: [ldev] FE.KEYID = 1
1,214,378 UART: [ldev] Erasing FE.KEYID = 1
1,240,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,440 UART: [ldev] --
1,279,764 UART: [fwproc] Wait for Commands...
1,280,405 UART: [fwproc] Recv command 0x46574c44
1,281,138 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,234 >>> mbox cmd response: success
2,771,234 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,772,301 UART: [afmc] ++
2,772,469 UART: [afmc] CDI.KEYID = 6
2,772,832 UART: [afmc] SUBJECT.KEYID = 7
2,773,258 UART: [afmc] AUTHORITY.KEYID = 5
2,808,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,551 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,484 UART: [afmc] --
2,852,456 UART: [cold-reset] --
2,853,320 UART: [state] Locking Datavault
2,854,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,293 UART: [state] Locking ICCM
2,855,885 UART: [exit] Launching FMC @ 0x40000130
2,861,214 UART:
2,861,230 UART: Running Caliptra FMC ...
2,861,638 UART:
2,861,692 UART: [state] CFI Enabled
2,871,845 UART: [fht] FMC Alias Private Key: 7
2,980,186 UART: [art] Extend RT PCRs Done
2,980,614 UART: [art] Lock RT PCRs Done
2,981,998 UART: [art] Populate DV Done
2,990,239 UART: [fht] FMC Alias Private Key: 7
2,991,231 UART: [art] Derive CDI
2,991,511 UART: [art] Store in in slot 0x4
3,076,960 UART: [art] Derive Key Pair
3,077,320 UART: [art] Store priv key in slot 0x5
3,090,470 UART: [art] Derive Key Pair - Done
3,105,105 UART: [art] Signing Cert with AUTHO
3,105,585 UART: RITY.KEYID = 7
3,120,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,584 UART: [art] PUB.X = 9ED4644C30AF7417231B0E9B08307EB690AB404ECE278F04ADB45A20B9EB91F8EDA1CAD615F81563FCDAE94554528751
3,128,355 UART: [art] PUB.Y = D664508DD4FFF2551FE275536506D15B57F2655381B5A28D9135820BE8545D2F67C4648D5EF2A55E6742F71E697A4A8F
3,135,295 UART: [art] SIG.R = 93CD4EFC3758ACDD16D47621E410C5960370C6E9C6DF7540404B775A8780DFB3E350134CA8C43560EA0DB040C72A399D
3,142,063 UART: [art] SIG.S = 80370C7B36C104998CEF6B437B5093B3C9E5D0CF527C32E1EE3EBCA455509C34792A402C114F86BB4FDF694FF901309A
3,165,689 UART: Caliptra RT
3,165,943 UART: [state] CFI Enabled
3,274,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,541 UART: [rt]cmd =0x4453424c, len=4
3,318,066 >>> mbox cmd response data (8 bytes)
3,318,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,911 UART:
3,318,927 UART: Running Caliptra ROM ...
3,319,335 UART:
3,319,390 UART: [state] CFI Enabled
3,321,642 UART: [state] LifecycleState = Unprovisioned
3,322,297 UART: [state] DebugLocked = No
3,322,877 UART: [state] WD Timer not started. Device not locked for debugging
3,324,183 UART: [kat] SHA2-256
4,127,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,131,862 UART: [kat] ++
4,132,014 UART: [kat] sha1
4,136,248 UART: [kat] SHA2-256
4,138,188 UART: [kat] SHA2-384
4,141,067 UART: [kat] SHA2-512-ACC
4,142,967 UART: [kat] ECC-384
4,152,902 UART: [kat] HMAC-384Kdf
4,157,532 UART: [kat] LMS
4,405,844 UART: [kat] --
4,406,796 UART: [update-reset] ++
5,719,138 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,720,335 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,870,201 >>> mbox cmd response: success
5,870,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,870,428 UART: [update-reset] Copying MAN_2 To MAN_1
5,878,442 UART: [update-reset Success] --
5,879,427 UART: [state] Locking Datavault
5,880,207 UART: [state] Locking PCR0, PCR1 and PCR31
5,880,811 UART: [state] Locking ICCM
5,881,267 UART: [exit] Launching FMC @ 0x40000130
5,886,596 UART:
5,886,612 UART: Running Caliptra FMC ...
5,887,020 UART:
5,887,074 UART: [state] CFI Enabled
5,976,083 UART: [art] Extend RT PCRs Done
5,976,511 UART: [art] Lock RT PCRs Done
5,977,766 UART: [art] Populate DV Done
5,985,897 UART: [fht] FMC Alias Private Key: 7
5,986,949 UART: [art] Derive CDI
5,987,229 UART: [art] Store in in slot 0x4
6,072,928 UART: [art] Derive Key Pair
6,073,288 UART: [art] Store priv key in slot 0x5
6,086,656 UART: [art] Derive Key Pair - Done
6,101,510 UART: [art] Signing Cert with AUTHO
6,101,990 UART: RITY.KEYID = 7
6,117,292 UART: [art] Erasing AUTHORITY.KEYID = 7
6,118,057 UART: [art] PUB.X = BB4B700CD766D811E76979F50DA7CFC4D879F6FFBCA7BDC5D0F8BE4BEE5685F885018D70E8E090C1EBDD49252BAD79DC
6,124,844 UART: [art] PUB.Y = F31B80485A97722E5E37BCFB155FD0B5DE7A2E1C199A24970C87B977D162E4AC1D3673D3314AC0A041304F3DCAD17905
6,131,794 UART: [art] SIG.R = ED4F315CF96F0CC283D78FE23AF149502365E23DF2B8CA6B07A16C18FC22A758039B8CAD40887A05EA548EB61B0E13F0
6,138,561 UART: [art] SIG.S = 46D0A57FD0CAFA5365BA922F0A21780FB7FF4A9A59765B1764BBBEE8546D0276651A27C6001C19D66456CCF95EABD8D9
6,161,843 UART: Caliptra RT
6,162,097 UART: [state] CFI Enabled
6,456,452 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,486,703 UART: [rt]cmd =0x494e464f, len=4
6,490,131 >>> mbox cmd response data (264 bytes)
6,490,132 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,519,535 UART: [rt]cmd =0x43455252, len=4
6,530,165 >>> mbox cmd response data (783 bytes)
6,530,166 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,560,181 UART: [rt]cmd =0x44504543, len=92
6,750,606 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,282 ready_for_fw is high
1,055,282 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,058 >>> mbox cmd response: success
2,620,058 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,682,086 UART:
2,682,102 UART: Running Caliptra FMC ...
2,682,510 UART:
2,682,564 UART: [state] CFI Enabled
2,693,203 UART: [fht] FMC Alias Private Key: 7
2,801,476 UART: [art] Extend RT PCRs Done
2,801,904 UART: [art] Lock RT PCRs Done
2,803,492 UART: [art] Populate DV Done
2,811,867 UART: [fht] FMC Alias Private Key: 7
2,812,931 UART: [art] Derive CDI
2,813,211 UART: [art] Store in in slot 0x4
2,898,524 UART: [art] Derive Key Pair
2,898,884 UART: [art] Store priv key in slot 0x5
2,912,582 UART: [art] Derive Key Pair - Done
2,927,339 UART: [art] Signing Cert with AUTHO
2,927,819 UART: RITY.KEYID = 7
2,943,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,802 UART: [art] PUB.X = D48789D3D7A65C8E1D28AB4DF4CC802B44728C8D7AAA5BA10A41E78E25CB77438409782B450842A8045C84580A1D2257
2,950,557 UART: [art] PUB.Y = 4CDB19D2B6D49D7F400DFEFE9A166EEF04AF61C1485947B196856FE4F36555F8B7693E3707E4E45A2C97288850C1BA7B
2,957,506 UART: [art] SIG.R = 9020C05D4AC238E855D8BBFEA09719EC717AFFE57A55FD0286A68915A5D29257B3862F6CED970FEA2157CA64AF9495DD
2,964,282 UART: [art] SIG.S = 49B9A6056D16803831B90CD80372E2D2EBF97E26739ACECDAC1A57F03FDE5A4C3FE5FC96F8BF21D19C0875C48428AD03
2,988,266 UART: Caliptra RT
2,988,520 UART: [state] CFI Enabled
3,096,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,399 UART: [rt]cmd =0x4453424c, len=4
3,139,824 >>> mbox cmd response data (8 bytes)
3,139,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,572,908 >>> mbox cmd response: success
5,572,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,586,486 UART:
5,586,502 UART: Running Caliptra FMC ...
5,586,910 UART:
5,586,964 UART: [state] CFI Enabled
5,676,533 UART: [art] Extend RT PCRs Done
5,676,961 UART: [art] Lock RT PCRs Done
5,678,306 UART: [art] Populate DV Done
5,686,415 UART: [fht] FMC Alias Private Key: 7
5,687,477 UART: [art] Derive CDI
5,687,757 UART: [art] Store in in slot 0x4
5,773,844 UART: [art] Derive Key Pair
5,774,204 UART: [art] Store priv key in slot 0x5
5,787,696 UART: [art] Derive Key Pair - Done
5,802,493 UART: [art] Signing Cert with AUTHO
5,802,973 UART: RITY.KEYID = 7
5,818,281 UART: [art] Erasing AUTHORITY.KEYID = 7
5,819,046 UART: [art] PUB.X = 4FC7600D5C89AF0F3AC6F39674F29B15508C029DF1940DD33F9745B8F60A94B4EC3B798959FF7636E4D4329D1DC622C1
5,825,805 UART: [art] PUB.Y = 1578584CEE26B2E3BDB4EEF490CDEC375BF095CCF9EB88637E64F494BC2000B72400B25FD8FE4ABC3708A705E5882205
5,832,714 UART: [art] SIG.R = BC38AC00B570A69306023718DCD66250DD8C6047F1FE5F1342ED94EF1FDEB82F42BAA584EDF1E099AC0DDD7760AB8174
5,839,469 UART: [art] SIG.S = 82CB4B4D2D637F8661B5261D71B0F632B3C61240584ADFBB5109772A2213FE89BD5F580928021E230A09D00E0AE1FB5F
5,863,613 UART: Caliptra RT
5,863,867 UART: [state] CFI Enabled
6,158,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,802 UART: [rt]cmd =0x494e464f, len=4
6,192,268 >>> mbox cmd response data (264 bytes)
6,192,269 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,221,638 UART: [rt]cmd =0x43455252, len=4
6,232,627 >>> mbox cmd response data (784 bytes)
6,232,628 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,262,521 UART: [rt]cmd =0x44504543, len=92
6,453,881 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,697 UART: [state] LifecycleState = Unprovisioned
85,352 UART: [state] DebugLocked = No
85,924 UART: [state] WD Timer not started. Device not locked for debugging
87,141 UART: [kat] SHA2-256
890,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,820 UART: [kat] ++
894,972 UART: [kat] sha1
899,418 UART: [kat] SHA2-256
901,358 UART: [kat] SHA2-384
903,931 UART: [kat] SHA2-512-ACC
905,832 UART: [kat] ECC-384
915,605 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,174,324 ready_for_fw is high
1,174,324 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,779 UART: [ldev] SUBJECT.KEYID = 5
1,210,206 UART: [ldev] AUTHORITY.KEYID = 7
1,210,669 UART: [ldev] FE.KEYID = 1
1,216,033 UART: [ldev] Erasing FE.KEYID = 1
1,241,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,929 UART: [fwproc] Wait for Commands...
1,281,732 UART: [fwproc] Recv command 0x46574c44
1,282,465 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,569 >>> mbox cmd response: success
2,772,569 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,773,640 UART: [afmc] ++
2,773,808 UART: [afmc] CDI.KEYID = 6
2,774,171 UART: [afmc] SUBJECT.KEYID = 7
2,774,597 UART: [afmc] AUTHORITY.KEYID = 5
2,809,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,083 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,802 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,687 UART: [afmc] --
2,852,669 UART: [cold-reset] --
2,853,749 UART: [state] Locking Datavault
2,855,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,730 UART: [state] Locking ICCM
2,856,188 UART: [exit] Launching FMC @ 0x40000130
2,861,517 UART:
2,861,533 UART: Running Caliptra FMC ...
2,861,941 UART:
2,862,084 UART: [state] CFI Enabled
2,872,641 UART: [fht] FMC Alias Private Key: 7
2,980,638 UART: [art] Extend RT PCRs Done
2,981,066 UART: [art] Lock RT PCRs Done
2,982,726 UART: [art] Populate DV Done
2,990,895 UART: [fht] FMC Alias Private Key: 7
2,991,857 UART: [art] Derive CDI
2,992,137 UART: [art] Store in in slot 0x4
3,077,716 UART: [art] Derive Key Pair
3,078,076 UART: [art] Store priv key in slot 0x5
3,091,050 UART: [art] Derive Key Pair - Done
3,105,812 UART: [art] Signing Cert with AUTHO
3,106,292 UART: RITY.KEYID = 7
3,121,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,115 UART: [art] PUB.X = 5E8B2A7460622BE4CB6AA82D7ECA69BA5B195F8C6E3D15EA5B466E49D86C59CDF1212200B7D4DDCD88C7072C4CCB000E
3,128,855 UART: [art] PUB.Y = 263200C58DCB0B49287BCE72F155A0DCCED1C3F20035DF963FFEFE704366348D7F54AFD0E716F93EC35A6880139FA7ED
3,135,772 UART: [art] SIG.R = B66161F21D7188A6AA707AE93AE5F1228A150CAC1D4C98A6584809EDE5EE58C99AEB33DACC647AC7711C7D597F0E4500
3,142,523 UART: [art] SIG.S = C05BCA0870ED3A377CB004E134369ED66DF10D8DC1DE9019111130CE59D1F266820FF92752547108A9F2BEC8DF76DDDB
3,166,649 UART: Caliptra RT
3,166,995 UART: [state] CFI Enabled
3,275,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,185 UART: [rt]cmd =0x4453424c, len=4
3,319,106 >>> mbox cmd response data (8 bytes)
3,319,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,227 UART:
3,320,243 UART: Running Caliptra ROM ...
3,320,651 UART:
3,320,793 UART: [state] CFI Enabled
3,323,603 UART: [state] LifecycleState = Unprovisioned
3,324,258 UART: [state] DebugLocked = No
3,324,926 UART: [state] WD Timer not started. Device not locked for debugging
3,326,084 UART: [kat] SHA2-256
4,129,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,133,763 UART: [kat] ++
4,133,915 UART: [kat] sha1
4,138,163 UART: [kat] SHA2-256
4,140,103 UART: [kat] SHA2-384
4,142,898 UART: [kat] SHA2-512-ACC
4,144,798 UART: [kat] ECC-384
4,154,381 UART: [kat] HMAC-384Kdf
4,158,917 UART: [kat] LMS
4,407,229 UART: [kat] --
4,407,855 UART: [update-reset] ++
5,719,635 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,720,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,870,526 >>> mbox cmd response: success
5,870,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,870,831 UART: [update-reset] Copying MAN_2 To MAN_1
5,878,845 UART: [update-reset Success] --
5,879,710 UART: [state] Locking Datavault
5,880,506 UART: [state] Locking PCR0, PCR1 and PCR31
5,881,110 UART: [state] Locking ICCM
5,881,782 UART: [exit] Launching FMC @ 0x40000130
5,887,111 UART:
5,887,127 UART: Running Caliptra FMC ...
5,887,535 UART:
5,887,678 UART: [state] CFI Enabled
5,977,387 UART: [art] Extend RT PCRs Done
5,977,815 UART: [art] Lock RT PCRs Done
5,979,198 UART: [art] Populate DV Done
5,987,799 UART: [fht] FMC Alias Private Key: 7
5,988,747 UART: [art] Derive CDI
5,989,027 UART: [art] Store in in slot 0x4
6,074,646 UART: [art] Derive Key Pair
6,075,006 UART: [art] Store priv key in slot 0x5
6,087,952 UART: [art] Derive Key Pair - Done
6,102,647 UART: [art] Signing Cert with AUTHO
6,103,127 UART: RITY.KEYID = 7
6,118,067 UART: [art] Erasing AUTHORITY.KEYID = 7
6,118,832 UART: [art] PUB.X = 4356864DF6BDEFDA8580EF0C111BBA913DBECCAC7A3BC432DBA5B526C5939BA714B2E10BF871D213C0166DE01B40AD3E
6,125,620 UART: [art] PUB.Y = 172238F0D095E94EB8A48C4AC6C01269495647A32CD9F1C54592B9F52AE5C8EC70437188F5018073F300B0B555126408
6,132,532 UART: [art] SIG.R = C26B3026ED9915D904172F622D797FADAE213D5DC9F8E7FF4AFD91D3DD4990FA46F98CB0F291DAEF536624F496B611C7
6,139,313 UART: [art] SIG.S = FBA429FD26C32B73C599FC610FD8F8E684B58D6C341E604E99951B8B440EAB15ABBF6CF0E5FE633D545A5E0052769C12
6,163,340 UART: Caliptra RT
6,163,686 UART: [state] CFI Enabled
6,459,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,490,047 UART: [rt]cmd =0x494e464f, len=4
6,493,373 >>> mbox cmd response data (264 bytes)
6,493,374 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,522,743 UART: [rt]cmd =0x43455252, len=4
6,533,694 >>> mbox cmd response data (784 bytes)
6,533,695 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,563,692 UART: [rt]cmd =0x44504543, len=92
6,755,271 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,465 ready_for_fw is high
1,056,465 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,007 >>> mbox cmd response: success
2,623,007 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,685,735 UART:
2,685,751 UART: Running Caliptra FMC ...
2,686,159 UART:
2,686,302 UART: [state] CFI Enabled
2,696,961 UART: [fht] FMC Alias Private Key: 7
2,803,948 UART: [art] Extend RT PCRs Done
2,804,376 UART: [art] Lock RT PCRs Done
2,805,736 UART: [art] Populate DV Done
2,813,857 UART: [fht] FMC Alias Private Key: 7
2,814,987 UART: [art] Derive CDI
2,815,267 UART: [art] Store in in slot 0x4
2,900,718 UART: [art] Derive Key Pair
2,901,078 UART: [art] Store priv key in slot 0x5
2,913,908 UART: [art] Derive Key Pair - Done
2,928,655 UART: [art] Signing Cert with AUTHO
2,929,135 UART: RITY.KEYID = 7
2,944,107 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,872 UART: [art] PUB.X = 7C05AF323EA702BDBA6D30BF329C54FBB2495DEA599F935B78745E198937A1FED16F49AA4CE0EE0DE14149BE7DB5B798
2,951,651 UART: [art] PUB.Y = 70B2A8BAD44BB7EE0B24E616A099558CF13A8C93A68CEA409A7BABFDFDB05281A89E754D05D90A5DDF469AC18F3DC22B
2,958,616 UART: [art] SIG.R = 013AF8394E686500F3D982F597DC22D05C58ADB92F4AD13F1308B1FDFD37A16D6C772B44F638B0368F1CF1095CD2356B
2,965,361 UART: [art] SIG.S = 9E002AA087FB650419B04D7D0E5F971CC2FE9BDDF7F735182E56C29394B41196622E4FF66DA21A5AE6C759606F1024BE
2,989,610 UART: Caliptra RT
2,989,956 UART: [state] CFI Enabled
3,097,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,523 UART: [rt]cmd =0x4453424c, len=4
3,141,034 >>> mbox cmd response data (8 bytes)
3,141,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,574,107 >>> mbox cmd response: success
5,574,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,587,761 UART:
5,587,777 UART: Running Caliptra FMC ...
5,588,185 UART:
5,588,328 UART: [state] CFI Enabled
5,677,409 UART: [art] Extend RT PCRs Done
5,677,837 UART: [art] Lock RT PCRs Done
5,679,236 UART: [art] Populate DV Done
5,687,141 UART: [fht] FMC Alias Private Key: 7
5,688,295 UART: [art] Derive CDI
5,688,575 UART: [art] Store in in slot 0x4
5,774,170 UART: [art] Derive Key Pair
5,774,530 UART: [art] Store priv key in slot 0x5
5,787,956 UART: [art] Derive Key Pair - Done
5,802,790 UART: [art] Signing Cert with AUTHO
5,803,270 UART: RITY.KEYID = 7
5,818,316 UART: [art] Erasing AUTHORITY.KEYID = 7
5,819,081 UART: [art] PUB.X = 81539DDCC67C8F12ACBCFFC3C03DB6E7309D2D9FD4EB2150EBBC9C0BD84983286D1D91FDF67AD396155D34B76F51599E
5,825,868 UART: [art] PUB.Y = 534D12D8014A3E93C9FE1DF85C0EB5E0947B7235A3EA59DE31F71FA9B7A76D2DDF619DE358302FE68C8CAB5AB1F25904
5,832,825 UART: [art] SIG.R = 9AB36F3DF88AA6684645D29BAD0B29F73B4065EB7A193D6324EB7A2E1AA57178F97D81901AD089B0C927FABCEA441386
5,839,602 UART: [art] SIG.S = 24265378343F97478525A8A5EB7BAAB011B2DA88F14C4A8390883F8F4BB20A940A14C95D71ED9D529539CF9987F23AD2
5,863,797 UART: Caliptra RT
5,864,143 UART: [state] CFI Enabled
6,160,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,190,865 UART: [rt]cmd =0x494e464f, len=4
6,194,261 >>> mbox cmd response data (264 bytes)
6,194,262 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,223,473 UART: [rt]cmd =0x43455252, len=4
6,234,469 >>> mbox cmd response data (783 bytes)
6,234,470 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,264,539 UART: [rt]cmd =0x44504543, len=92
6,456,856 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,346 UART:
192,724 UART: Running Caliptra ROM ...
193,863 UART:
194,006 UART: [state] CFI Enabled
264,363 UART: [state] LifecycleState = Unprovisioned
266,222 UART: [state] DebugLocked = No
268,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,126 UART: [kat] SHA2-256
442,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,317 UART: [kat] ++
453,914 UART: [kat] sha1
465,070 UART: [kat] SHA2-256
467,719 UART: [kat] SHA2-384
472,916 UART: [kat] SHA2-512-ACC
475,277 UART: [kat] ECC-384
2,768,843 UART: [kat] HMAC-384Kdf
2,780,651 UART: [kat] LMS
3,970,950 UART: [kat] --
3,975,797 UART: [cold-reset] ++
3,977,858 UART: [fht] Storing FHT @ 0x50003400
3,990,104 UART: [idev] ++
3,990,674 UART: [idev] CDI.KEYID = 6
3,991,600 UART: [idev] SUBJECT.KEYID = 7
3,992,843 UART: [idev] UDS.KEYID = 0
3,993,884 ready_for_fw is high
3,994,081 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,914 UART: [idev] Erasing UDS.KEYID = 0
7,324,910 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,969 UART: [idev] --
7,351,015 UART: [ldev] ++
7,351,635 UART: [ldev] CDI.KEYID = 6
7,352,595 UART: [ldev] SUBJECT.KEYID = 5
7,353,802 UART: [ldev] AUTHORITY.KEYID = 7
7,355,026 UART: [ldev] FE.KEYID = 1
7,383,381 UART: [ldev] Erasing FE.KEYID = 1
10,716,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,009,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,024,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,038,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,053,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,072,440 UART: [ldev] --
13,077,927 UART: [fwproc] Waiting for Commands...
13,080,387 UART: [fwproc] Received command 0x46574c44
13,082,562 UART: [fwproc] Received Image of size 114036 bytes
17,136,788 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,214,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,283,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,601,401 >>> mbox cmd response: success
17,602,044 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,605,309 UART: [afmc] ++
17,605,893 UART: [afmc] CDI.KEYID = 6
17,606,774 UART: [afmc] SUBJECT.KEYID = 7
17,608,039 UART: [afmc] AUTHORITY.KEYID = 5
20,970,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,272,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,274,872 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,289,290 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,304,117 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,318,593 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,339,466 UART: [afmc] --
23,343,811 UART: [cold-reset] --
23,348,104 UART: [state] Locking Datavault
23,352,641 UART: [state] Locking PCR0, PCR1 and PCR31
23,354,385 UART: [state] Locking ICCM
23,356,206 UART: [exit] Launching FMC @ 0x40000130
23,364,592 UART:
23,364,829 UART: Running Caliptra FMC ...
23,365,921 UART:
23,366,085 UART: [state] CFI Enabled
23,431,808 UART: [fht] FMC Alias Private Key: 7
25,770,656 UART: [art] Extend RT PCRs Done
25,771,879 UART: [art] Lock RT PCRs Done
25,773,444 UART: [art] Populate DV Done
25,778,791 UART: [fht] FMC Alias Private Key: 7
25,780,372 UART: [art] Derive CDI
25,781,176 UART: [art] Store in in slot 0x4
25,840,996 UART: [art] Derive Key Pair
25,842,026 UART: [art] Store priv key in slot 0x5
29,134,785 UART: [art] Derive Key Pair - Done
29,147,949 UART: [art] Signing Cert with AUTHO
29,149,278 UART: RITY.KEYID = 7
31,437,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,438,776 UART: [art] PUB.X = CD45F77EA60CF2C6A80A94CDA33C8B09088D2CA4DFDC56438235D4D679B5E83670ED8D5656EE3664280D5BB34B2E2351
31,446,081 UART: [art] PUB.Y = FE686259BBCAF49A9B571517D881F5EA0B050FE556D459F66BEA00E9206D2217ED10127D09BB58135FB04F89950C1B6B
31,453,259 UART: [art] SIG.R = 9DF8B3AE7780B7F0C47FD506F03E7EE9FE3611D6880E9B0FDA2F748CC911417A2432D5FE54F4898904CA776404103C21
31,460,654 UART: [art] SIG.S = 0B19AA3097F8DAEA3BC7C509C013F8797EE8826FBC36FF7C88B416164211B3449DEA59725EA60BAE46F19EF8B2D374FF
32,766,227 UART: Caliptra RT
32,766,928 UART: [state] CFI Enabled
32,927,156 UART: [rt] RT listening for mailbox commands...
32,959,159 UART: [rt]cmd =0x44504543, len=136
38,590,814 >>> mbox cmd response data (136 bytes)
38,592,201 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,622,084 UART: [rt]cmd =0x4453424c, len=4
41,912,543 >>> mbox cmd response data (8 bytes)
41,913,085 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,943,622 UART: [rt]cmd =0x44504543, len=92
47,712,394 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,806,610 ready_for_fw is high
3,807,063 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,898,429 >>> mbox cmd response: success
17,899,129 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,582,646 UART:
23,583,122 UART: Running Caliptra FMC ...
23,584,222 UART:
23,584,375 UART: [state] CFI Enabled
23,654,513 UART: [fht] FMC Alias Private Key: 7
25,992,385 UART: [art] Extend RT PCRs Done
25,993,607 UART: [art] Lock RT PCRs Done
25,995,144 UART: [art] Populate DV Done
26,000,817 UART: [fht] FMC Alias Private Key: 7
26,002,359 UART: [art] Derive CDI
26,003,093 UART: [art] Store in in slot 0x4
26,063,316 UART: [art] Derive Key Pair
26,064,346 UART: [art] Store priv key in slot 0x5
29,357,370 UART: [art] Derive Key Pair - Done
29,370,425 UART: [art] Signing Cert with AUTHO
29,371,745 UART: RITY.KEYID = 7
31,659,794 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,301 UART: [art] PUB.X = 9F6983CD98D18E1F305254FE2663BD845AF135784BDA642AB9285CA230FEEB0875A759973A0F5C0AC0D9CA3B9A9CBAC2
31,668,547 UART: [art] PUB.Y = 690F356440F87DC05BADA100B070DA6EC373B4A4A8C3E8005E9DDC3032FB813D469A66A73BA7009B3582AC6CBAB2BB52
31,675,757 UART: [art] SIG.R = 2C69963DD7A3E5DDFEEBD2655D0918638C422540B3DBAC51379A4BA8CB82B52F85205C6056D9F2986571A31E77ECC9B1
31,683,200 UART: [art] SIG.S = 7C442FC65553B6EA41D7481BAA25D8B67578644E06EDF89ADCC5B0C77700189B241854D4E3CD7CB859D38803F3D8DDC1
32,988,269 UART: Caliptra RT
32,988,971 UART: [state] CFI Enabled
33,150,017 UART: [rt] RT listening for mailbox commands...
33,182,081 UART: [rt]cmd =0x44504543, len=136
38,814,348 >>> mbox cmd response data (136 bytes)
38,815,845 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,845,447 UART: [rt]cmd =0x4453424c, len=4
42,136,180 >>> mbox cmd response data (8 bytes)
42,136,714 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,167,356 UART: [rt]cmd =0x44504543, len=92
47,938,484 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,335 UART:
192,700 UART: Running Caliptra ROM ...
193,876 UART:
603,675 UART: [state] CFI Enabled
616,003 UART: [state] LifecycleState = Unprovisioned
617,951 UART: [state] DebugLocked = No
620,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,422 UART: [kat] SHA2-256
794,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,674 UART: [kat] ++
805,122 UART: [kat] sha1
817,053 UART: [kat] SHA2-256
819,752 UART: [kat] SHA2-384
826,031 UART: [kat] SHA2-512-ACC
828,404 UART: [kat] ECC-384
3,112,471 UART: [kat] HMAC-384Kdf
3,124,340 UART: [kat] LMS
4,314,451 UART: [kat] --
4,320,218 UART: [cold-reset] ++
4,322,788 UART: [fht] Storing FHT @ 0x50003400
4,333,149 UART: [idev] ++
4,333,749 UART: [idev] CDI.KEYID = 6
4,334,672 UART: [idev] SUBJECT.KEYID = 7
4,335,918 UART: [idev] UDS.KEYID = 0
4,336,934 ready_for_fw is high
4,337,153 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,698 UART: [idev] Erasing UDS.KEYID = 0
7,621,114 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,377 UART: [idev] --
7,648,237 UART: [ldev] ++
7,648,807 UART: [ldev] CDI.KEYID = 6
7,649,768 UART: [ldev] SUBJECT.KEYID = 5
7,650,977 UART: [ldev] AUTHORITY.KEYID = 7
7,652,262 UART: [ldev] FE.KEYID = 1
7,661,879 UART: [ldev] Erasing FE.KEYID = 1
10,948,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,754 UART: [ldev] --
13,309,133 UART: [fwproc] Waiting for Commands...
13,310,958 UART: [fwproc] Received command 0x46574c44
13,313,136 UART: [fwproc] Received Image of size 114036 bytes
17,366,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,827,023 >>> mbox cmd response: success
17,827,656 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,831,086 UART: [afmc] ++
17,831,672 UART: [afmc] CDI.KEYID = 6
17,832,584 UART: [afmc] SUBJECT.KEYID = 7
17,833,854 UART: [afmc] AUTHORITY.KEYID = 5
21,149,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,213 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,619 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,401 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,850 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,990 UART: [afmc] --
23,514,928 UART: [cold-reset] --
23,517,704 UART: [state] Locking Datavault
23,522,735 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,493 UART: [state] Locking ICCM
23,527,018 UART: [exit] Launching FMC @ 0x40000130
23,535,418 UART:
23,535,700 UART: Running Caliptra FMC ...
23,536,807 UART:
23,536,966 UART: [state] CFI Enabled
23,544,799 UART: [fht] FMC Alias Private Key: 7
25,875,636 UART: [art] Extend RT PCRs Done
25,876,862 UART: [art] Lock RT PCRs Done
25,878,363 UART: [art] Populate DV Done
25,883,827 UART: [fht] FMC Alias Private Key: 7
25,885,414 UART: [art] Derive CDI
25,886,149 UART: [art] Store in in slot 0x4
25,928,629 UART: [art] Derive Key Pair
25,929,623 UART: [art] Store priv key in slot 0x5
29,171,960 UART: [art] Derive Key Pair - Done
29,184,790 UART: [art] Signing Cert with AUTHO
29,186,094 UART: RITY.KEYID = 7
31,464,895 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,399 UART: [art] PUB.X = 9841F948F32F31172613AC68A50E52995ED2D42D6F4B118F9E4FA74E22567FBC0D31AAA3FFC48D386E170D3E02A13BFF
31,473,638 UART: [art] PUB.Y = 6BFE77414D08BF407DD2DC90CB78B01B879D0AC6609D7535BC3D3C18ED86EAADCAFD39B7A5B9AC9153B05F58F164B98A
31,480,909 UART: [art] SIG.R = 41EDF3300C925CE7453102D01A7AA608FFED5278478F9A6133500C114F184CFF6BEDCCA9647F994334FA000D6A59378F
31,488,283 UART: [art] SIG.S = 4FA80AC1DA7A2E81A386AD5BCF084C3902A866E8A4BE9B49AC9901678A51C6E59C189E3BDC7CDE4A9BD026F77DB1E366
32,793,041 UART: Caliptra RT
32,793,744 UART: [state] CFI Enabled
32,910,886 UART: [rt] RT listening for mailbox commands...
32,942,844 UART: [rt]cmd =0x44504543, len=136
38,510,099 >>> mbox cmd response data (136 bytes)
38,511,414 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,541,137 UART: [rt]cmd =0x4453424c, len=4
41,783,959 >>> mbox cmd response data (8 bytes)
41,784,484 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,815,123 UART: [rt]cmd =0x44504543, len=92
47,496,656 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
4,129,687 ready_for_fw is high
4,130,058 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,059,250 >>> mbox cmd response: success
18,059,890 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,705,741 UART:
23,706,118 UART: Running Caliptra FMC ...
23,707,303 UART:
23,707,469 UART: [state] CFI Enabled
23,715,460 UART: [fht] FMC Alias Private Key: 7
26,046,490 UART: [art] Extend RT PCRs Done
26,047,718 UART: [art] Lock RT PCRs Done
26,049,318 UART: [art] Populate DV Done
26,054,626 UART: [fht] FMC Alias Private Key: 7
26,056,332 UART: [art] Derive CDI
26,057,147 UART: [art] Store in in slot 0x4
26,099,448 UART: [art] Derive Key Pair
26,100,497 UART: [art] Store priv key in slot 0x5
29,342,349 UART: [art] Derive Key Pair - Done
29,355,512 UART: [art] Signing Cert with AUTHO
29,356,815 UART: RITY.KEYID = 7
31,636,372 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,876 UART: [art] PUB.X = CA1049077F3AFC03DBC764BE02CD5FF3773CFBB180F39F576C11B696266F45BFA8C4D32DF378F4C5BDF77D26013C6FAE
31,645,143 UART: [art] PUB.Y = 849AF0A0D3A4B0C1CC1C5DB3C3F409937214B5CD6C4E06AE6CAC3EC093D0B1695727CA3F778E39B8EFD87631230EA5B4
31,652,399 UART: [art] SIG.R = DE23A4824ABC297321D33C5E527D50A4C7D7E683BFFAB091B8D7DD911FB7043480E014982B7878CCDF133319EF888ABE
31,659,766 UART: [art] SIG.S = 653C57CC8C9AF2BB415EBB9E4E89F09004D48ED91E692E06FC185373D4D60724B4F4D73A3CAE856195611729454E62CF
32,964,681 UART: Caliptra RT
32,965,392 UART: [state] CFI Enabled
33,083,326 UART: [rt] RT listening for mailbox commands...
33,115,433 UART: [rt]cmd =0x44504543, len=136
38,682,274 >>> mbox cmd response data (136 bytes)
38,683,779 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,713,392 UART: [rt]cmd =0x4453424c, len=4
41,956,020 >>> mbox cmd response data (8 bytes)
41,956,605 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,987,211 UART: [rt]cmd =0x44504543, len=92
47,669,336 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
193,483 UART:
193,859 UART: Running Caliptra ROM ...
195,044 UART:
195,209 UART: [state] CFI Enabled
264,248 UART: [state] LifecycleState = Unprovisioned
266,157 UART: [state] DebugLocked = No
268,052 UART: [state] WD Timer not started. Device not locked for debugging
272,374 UART: [kat] SHA2-256
451,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,074 UART: [kat] ++
463,612 UART: [kat] sha1
474,919 UART: [kat] SHA2-256
477,945 UART: [kat] SHA2-384
484,100 UART: [kat] SHA2-512-ACC
487,011 UART: [kat] ECC-384
2,949,332 UART: [kat] HMAC-384Kdf
2,970,332 UART: [kat] LMS
3,499,819 UART: [kat] --
3,503,745 UART: [cold-reset] ++
3,505,115 UART: [fht] FHT @ 0x50003400
3,515,173 UART: [idev] ++
3,515,742 UART: [idev] CDI.KEYID = 6
3,516,653 UART: [idev] SUBJECT.KEYID = 7
3,517,828 UART: [idev] UDS.KEYID = 0
3,518,877 ready_for_fw is high
3,519,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,923 UART: [idev] Erasing UDS.KEYID = 0
6,022,637 UART: [idev] Sha1 KeyId Algorithm
6,045,150 UART: [idev] --
6,048,884 UART: [ldev] ++
6,049,467 UART: [ldev] CDI.KEYID = 6
6,050,383 UART: [ldev] SUBJECT.KEYID = 5
6,051,545 UART: [ldev] AUTHORITY.KEYID = 7
6,052,785 UART: [ldev] FE.KEYID = 1
6,099,474 UART: [ldev] Erasing FE.KEYID = 1
8,602,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,093 UART: [ldev] --
10,412,540 UART: [fwproc] Wait for Commands...
10,414,320 UART: [fwproc] Recv command 0x46574c44
10,416,413 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,272,964 >>> mbox cmd response: success
14,273,583 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,278,162 UART: [afmc] ++
14,278,752 UART: [afmc] CDI.KEYID = 6
14,279,667 UART: [afmc] SUBJECT.KEYID = 7
14,280,831 UART: [afmc] AUTHORITY.KEYID = 5
16,807,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,276 UART: [afmc] --
18,605,788 UART: [cold-reset] --
18,609,004 UART: [state] Locking Datavault
18,614,741 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,438 UART: [state] Locking ICCM
18,617,993 UART: [exit] Launching FMC @ 0x40000130
18,626,441 UART:
18,626,685 UART: Running Caliptra FMC ...
18,627,790 UART:
18,627,952 UART: [state] CFI Enabled
18,689,766 UART: [fht] FMC Alias Private Key: 7
20,453,446 UART: [art] Extend RT PCRs Done
20,454,669 UART: [art] Lock RT PCRs Done
20,456,239 UART: [art] Populate DV Done
20,461,601 UART: [fht] FMC Alias Private Key: 7
20,463,248 UART: [art] Derive CDI
20,464,063 UART: [art] Store in in slot 0x4
20,522,072 UART: [art] Derive Key Pair
20,523,116 UART: [art] Store priv key in slot 0x5
22,985,827 UART: [art] Derive Key Pair - Done
22,998,390 UART: [art] Signing Cert with AUTHO
22,999,690 UART: RITY.KEYID = 7
24,711,692 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,199 UART: [art] PUB.X = 9C8AED1B89EF6C0CB5FA1F48313A9A0B56320B7EA818563523E2C7E4C5EDF950FF4A32F2112FBD418FB27CDF36CA9ABA
24,720,484 UART: [art] PUB.Y = B4304170141ABC0C4282792661157A1C126FE1CE356FE4848527C4A6A9EDCB1E305A5E0A50ABE041409BB9474A382003
24,727,746 UART: [art] SIG.R = F5AA0F5BA1CEF418F301EDFCBF956A40E80028D6893F93459282E21FD4BDA595CD4F28E0145ADD3299F7FCF8A36D7E02
24,735,136 UART: [art] SIG.S = 745290FB3003B76563C4FF9C7455CE77A714F6B488BC7DE237895B3F9FE6036A7D1135BA6491425E6D33F2C2D082066C
25,714,582 UART: Caliptra RT
25,715,296 UART: [state] CFI Enabled
25,880,202 UART: [rt] RT listening for mailbox commands...
25,912,317 UART: [rt]cmd =0x44504543, len=136
30,138,792 >>> mbox cmd response data (136 bytes)
30,140,171 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,170,247 UART: [rt]cmd =0x4453424c, len=4
32,627,879 >>> mbox cmd response data (8 bytes)
32,628,413 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,659,014 UART: [rt]cmd =0x44504543, len=92
37,019,709 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,480 UART:
192,867 UART: Running Caliptra ROM ...
194,080 UART:
194,254 UART: [state] CFI Enabled
262,314 UART: [state] LifecycleState = Unprovisioned
264,745 UART: [state] DebugLocked = No
267,493 UART: [state] WD Timer not started. Device not locked for debugging
272,885 UART: [kat] SHA2-256
462,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,514 UART: [kat] ++
474,005 UART: [kat] sha1
486,329 UART: [kat] SHA2-256
489,378 UART: [kat] SHA2-384
496,122 UART: [kat] SHA2-512-ACC
498,720 UART: [kat] ECC-384
2,948,108 UART: [kat] HMAC-384Kdf
2,971,940 UART: [kat] LMS
3,503,667 UART: [kat] --
3,509,652 UART: [cold-reset] ++
3,510,731 UART: [fht] FHT @ 0x50003400
3,523,360 UART: [idev] ++
3,524,062 UART: [idev] CDI.KEYID = 6
3,525,017 UART: [idev] SUBJECT.KEYID = 7
3,526,260 UART: [idev] UDS.KEYID = 0
3,527,179 ready_for_fw is high
3,527,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,209 UART: [idev] Erasing UDS.KEYID = 0
6,026,886 UART: [idev] Sha1 KeyId Algorithm
6,049,575 UART: [idev] --
6,055,514 UART: [ldev] ++
6,056,252 UART: [ldev] CDI.KEYID = 6
6,057,170 UART: [ldev] SUBJECT.KEYID = 5
6,058,332 UART: [ldev] AUTHORITY.KEYID = 7
6,059,515 UART: [ldev] FE.KEYID = 1
6,101,066 UART: [ldev] Erasing FE.KEYID = 1
8,606,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,661 UART: [ldev] --
10,416,185 UART: [fwproc] Wait for Commands...
10,419,376 UART: [fwproc] Recv command 0x46574c44
10,421,690 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,598,005 >>> mbox cmd response: success
14,598,636 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,601,389 UART: [afmc] ++
14,602,091 UART: [afmc] CDI.KEYID = 6
14,603,345 UART: [afmc] SUBJECT.KEYID = 7
14,604,794 UART: [afmc] AUTHORITY.KEYID = 5
17,130,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,778 UART: [afmc] --
18,925,864 UART: [cold-reset] --
18,930,543 UART: [state] Locking Datavault
18,935,582 UART: [state] Locking PCR0, PCR1 and PCR31
18,937,780 UART: [state] Locking ICCM
18,939,178 UART: [exit] Launching FMC @ 0x40000130
18,947,852 UART:
18,948,096 UART: Running Caliptra FMC ...
18,949,207 UART:
18,949,364 UART: [state] CFI Enabled
19,010,409 UART: [fht] FMC Alias Private Key: 7
20,774,375 UART: [art] Extend RT PCRs Done
20,775,604 UART: [art] Lock RT PCRs Done
20,777,309 UART: [art] Populate DV Done
20,782,561 UART: [fht] FMC Alias Private Key: 7
20,784,210 UART: [art] Derive CDI
20,784,948 UART: [art] Store in in slot 0x4
20,843,422 UART: [art] Derive Key Pair
20,844,460 UART: [art] Store priv key in slot 0x5
23,307,189 UART: [art] Derive Key Pair - Done
23,320,183 UART: [art] Signing Cert with AUTHO
23,321,493 UART: RITY.KEYID = 7
25,033,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,567 UART: [art] PUB.X = E4E4F3DC35D70B7CA1750ADE7837601B9F0C97FF02C2096A1FD1CE2422CC06FDD69768BAFC3010F5B1BE4C52DB8E780B
25,041,864 UART: [art] PUB.Y = F12C0F52358025A7F191F1676899F1D8E77F0566BB2CE6FA005E8798A556FAF704A958B5ED4E7F0205224620C138939D
25,049,091 UART: [art] SIG.R = E90E04D09F108842C472CE2159FEB63E52A9315E9769E61F625D082A6C57ED301DBD91DE67D4DCA5EDFEE08D7F2E10B4
25,056,522 UART: [art] SIG.S = D0390C488D3845AC7C3376B24DBDA314C68A2BADD975328E7AB1236098EB645B3F4EA9B44A00D2CCB91F85ACE5F27B13
26,035,432 UART: Caliptra RT
26,036,158 UART: [state] CFI Enabled
26,201,230 UART: [rt] RT listening for mailbox commands...
26,233,514 UART: [rt]cmd =0x44504543, len=136
30,458,551 >>> mbox cmd response data (136 bytes)
30,459,909 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,489,703 UART: [rt]cmd =0x4453424c, len=4
32,948,426 >>> mbox cmd response data (8 bytes)
32,948,936 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,979,527 UART: [rt]cmd =0x44504543, len=92
37,343,341 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,420,055 ready_for_fw is high
3,420,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,725,727 >>> mbox cmd response: success
14,726,409 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,007,224 UART:
19,007,624 UART: Running Caliptra FMC ...
19,008,730 UART:
19,008,887 UART: [state] CFI Enabled
19,073,399 UART: [fht] FMC Alias Private Key: 7
20,836,625 UART: [art] Extend RT PCRs Done
20,837,848 UART: [art] Lock RT PCRs Done
20,839,585 UART: [art] Populate DV Done
20,844,901 UART: [fht] FMC Alias Private Key: 7
20,846,551 UART: [art] Derive CDI
20,847,366 UART: [art] Store in in slot 0x4
20,906,765 UART: [art] Derive Key Pair
20,907,819 UART: [art] Store priv key in slot 0x5
23,370,936 UART: [art] Derive Key Pair - Done
23,384,090 UART: [art] Signing Cert with AUTHO
23,385,393 UART: RITY.KEYID = 7
25,097,122 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,633 UART: [art] PUB.X = 1DE01F2270EA17E35426A6EBAD081C497F705DED8973C38DE90E68661094065B6125EB80CB4C22BE9E60F0D8A8561998
25,105,931 UART: [art] PUB.Y = 17D5B44A636ED1E459411E1838BF2AAE526C0B86C0E85B2517D9BC38038B6D315D4CC282300E3FBA85748396763230C2
25,113,167 UART: [art] SIG.R = E2B7F68C7D9326C73BC22A39031964D51FFC604F60E67236403A96E97434F4DC1E1267E24D478E9C85BE36F969F31989
25,120,556 UART: [art] SIG.S = 6901F01839EADC084A19541946E17EEDCADD76F1412CFFBEB27EC88523BB6D719C2C0ABE113DF65B30A0C918B4628450
26,100,094 UART: Caliptra RT
26,100,788 UART: [state] CFI Enabled
26,264,690 UART: [rt] RT listening for mailbox commands...
26,296,537 UART: [rt]cmd =0x44504543, len=136
30,523,912 >>> mbox cmd response data (136 bytes)
30,525,201 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,555,297 UART: [rt]cmd =0x4453424c, len=4
33,013,650 >>> mbox cmd response data (8 bytes)
33,014,164 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,044,695 UART: [rt]cmd =0x44504543, len=92
37,407,826 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,556 UART:
192,921 UART: Running Caliptra ROM ...
194,052 UART:
603,795 UART: [state] CFI Enabled
616,890 UART: [state] LifecycleState = Unprovisioned
619,247 UART: [state] DebugLocked = No
622,143 UART: [state] WD Timer not started. Device not locked for debugging
626,111 UART: [kat] SHA2-256
816,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,759 UART: [kat] ++
827,276 UART: [kat] sha1
839,375 UART: [kat] SHA2-256
842,351 UART: [kat] SHA2-384
848,917 UART: [kat] SHA2-512-ACC
851,494 UART: [kat] ECC-384
3,291,206 UART: [kat] HMAC-384Kdf
3,304,929 UART: [kat] LMS
3,836,791 UART: [kat] --
3,839,530 UART: [cold-reset] ++
3,841,675 UART: [fht] FHT @ 0x50003400
3,853,003 UART: [idev] ++
3,853,714 UART: [idev] CDI.KEYID = 6
3,854,644 UART: [idev] SUBJECT.KEYID = 7
3,855,815 UART: [idev] UDS.KEYID = 0
3,856,740 ready_for_fw is high
3,856,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,547 UART: [idev] Erasing UDS.KEYID = 0
6,329,592 UART: [idev] Sha1 KeyId Algorithm
6,350,937 UART: [idev] --
6,355,522 UART: [ldev] ++
6,356,200 UART: [ldev] CDI.KEYID = 6
6,357,085 UART: [ldev] SUBJECT.KEYID = 5
6,358,406 UART: [ldev] AUTHORITY.KEYID = 7
6,359,595 UART: [ldev] FE.KEYID = 1
6,368,733 UART: [ldev] Erasing FE.KEYID = 1
8,847,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,996 UART: [ldev] --
10,637,074 UART: [fwproc] Wait for Commands...
10,639,221 UART: [fwproc] Recv command 0x46574c44
10,641,523 UART: [fwproc] Recv'd Img size: 114360 bytes
14,092,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,832,612 >>> mbox cmd response: success
14,833,190 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,837,116 UART: [afmc] ++
14,837,809 UART: [afmc] CDI.KEYID = 6
14,839,008 UART: [afmc] SUBJECT.KEYID = 7
14,840,510 UART: [afmc] AUTHORITY.KEYID = 5
17,345,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,578 UART: [afmc] --
19,140,714 UART: [cold-reset] --
19,144,083 UART: [state] Locking Datavault
19,148,691 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,871 UART: [state] Locking ICCM
19,153,826 UART: [exit] Launching FMC @ 0x40000130
19,162,498 UART:
19,162,770 UART: Running Caliptra FMC ...
19,163,876 UART:
19,164,033 UART: [state] CFI Enabled
19,171,921 UART: [fht] FMC Alias Private Key: 7
20,929,184 UART: [art] Extend RT PCRs Done
20,930,403 UART: [art] Lock RT PCRs Done
20,932,052 UART: [art] Populate DV Done
20,937,471 UART: [fht] FMC Alias Private Key: 7
20,939,165 UART: [art] Derive CDI
20,939,978 UART: [art] Store in in slot 0x4
20,982,677 UART: [art] Derive Key Pair
20,983,677 UART: [art] Store priv key in slot 0x5
23,410,210 UART: [art] Derive Key Pair - Done
23,423,735 UART: [art] Signing Cert with AUTHO
23,425,040 UART: RITY.KEYID = 7
25,130,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,344 UART: [art] PUB.X = 4BA348531B6BB0ED2E54D9812109C35A12852FF9311D548E6CC275EE64215F58A86FC136D17A307825E04C1C98980684
25,139,601 UART: [art] PUB.Y = F1B1A048CBF42A7DD4C21B15B04726AA555A008441C35942AF10B410618110B94B3C059990EC1F5B66AFA846F40AE512
25,146,849 UART: [art] SIG.R = E51A2F1EF7A1C48560E4ADA24D22E562B06CF014FB472A62038B28F275F0C819940CE648DCBB8588851CD3944D12820F
25,154,245 UART: [art] SIG.S = FEA76D3550738762A6DB065D36149BA9995128782928B2E819DFE5BD6A6B134194A0EF6FFBD6C7E29C7D2A8EDAE3D3F3
26,132,766 UART: Caliptra RT
26,133,455 UART: [state] CFI Enabled
26,250,024 UART: [rt] RT listening for mailbox commands...
26,282,241 UART: [rt]cmd =0x44504543, len=136
30,459,925 >>> mbox cmd response data (136 bytes)
30,461,227 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,491,182 UART: [rt]cmd =0x4453424c, len=4
32,918,484 >>> mbox cmd response data (8 bytes)
32,919,024 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,949,783 UART: [rt]cmd =0x44504543, len=92
37,242,222 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,760,832 ready_for_fw is high
3,761,249 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,968,339 >>> mbox cmd response: success
14,969,281 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,218,110 UART:
19,218,495 UART: Running Caliptra FMC ...
19,219,698 UART:
19,219,863 UART: [state] CFI Enabled
19,227,483 UART: [fht] FMC Alias Private Key: 7
20,984,767 UART: [art] Extend RT PCRs Done
20,985,991 UART: [art] Lock RT PCRs Done
20,987,667 UART: [art] Populate DV Done
20,993,352 UART: [fht] FMC Alias Private Key: 7
20,994,813 UART: [art] Derive CDI
20,995,580 UART: [art] Store in in slot 0x4
21,038,078 UART: [art] Derive Key Pair
21,039,134 UART: [art] Store priv key in slot 0x5
23,465,868 UART: [art] Derive Key Pair - Done
23,478,729 UART: [art] Signing Cert with AUTHO
23,480,053 UART: RITY.KEYID = 7
25,185,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,262 UART: [art] PUB.X = 53D5CA7562B0E6C278D80BD86CA79C95D6A3063AE9908FA09C95CCD266A5B0A2EDA14927562775E666131BEF12FC7BBD
25,194,497 UART: [art] PUB.Y = 51FF6B961103B052F71FFE96D5D408045D220B68AEBC30A87CD0A1EB87FE436FE508DA16962C35DEFE482D6788004497
25,201,743 UART: [art] SIG.R = 8B9E903F83D6349A794402B6D4532B132DE79707F463BF2479B8E306C5F71014A49BCEBD43B31CBCC777DC898B98B22D
25,209,135 UART: [art] SIG.S = 09B957C1A63E2E00EEE74A472C517F309322D7359E332C7C7855C6639F5CA84D39951F9026279C83CEEB3049C420A043
26,188,271 UART: Caliptra RT
26,188,967 UART: [state] CFI Enabled
26,306,797 UART: [rt] RT listening for mailbox commands...
26,339,077 UART: [rt]cmd =0x44504543, len=136
30,516,864 >>> mbox cmd response data (136 bytes)
30,518,293 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,547,973 UART: [rt]cmd =0x4453424c, len=4
32,976,133 >>> mbox cmd response data (8 bytes)
32,976,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,007,129 UART: [rt]cmd =0x44504543, len=92
37,300,435 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,349 UART: [kat] SHA2-256
882,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,395 UART: [kat] ++
886,547 UART: [kat] sha1
890,779 UART: [kat] SHA2-256
892,717 UART: [kat] SHA2-384
895,542 UART: [kat] SHA2-512-ACC
897,443 UART: [kat] ECC-384
903,040 UART: [kat] HMAC-384Kdf
907,782 UART: [kat] LMS
1,475,978 UART: [kat] --
1,476,723 UART: [cold-reset] ++
1,477,281 UART: [fht] Storing FHT @ 0x50003400
1,480,124 UART: [idev] ++
1,480,292 UART: [idev] CDI.KEYID = 6
1,480,652 UART: [idev] SUBJECT.KEYID = 7
1,481,076 UART: [idev] UDS.KEYID = 0
1,481,421 ready_for_fw is high
1,481,421 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,956 UART: [idev] Erasing UDS.KEYID = 0
1,505,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,374 UART: [idev] --
1,515,329 UART: [ldev] ++
1,515,497 UART: [ldev] CDI.KEYID = 6
1,515,860 UART: [ldev] SUBJECT.KEYID = 5
1,516,286 UART: [ldev] AUTHORITY.KEYID = 7
1,516,749 UART: [ldev] FE.KEYID = 1
1,521,737 UART: [ldev] Erasing FE.KEYID = 1
1,547,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,328 UART: [ldev] --
1,586,661 UART: [fwproc] Waiting for Commands...
1,587,430 UART: [fwproc] Received command 0x46574c44
1,588,221 UART: [fwproc] Received Image of size 114360 bytes
2,885,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,906 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,099 >>> mbox cmd response: success
3,078,099 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,113 UART: [afmc] ++
3,079,281 UART: [afmc] CDI.KEYID = 6
3,079,643 UART: [afmc] SUBJECT.KEYID = 7
3,080,068 UART: [afmc] AUTHORITY.KEYID = 5
3,115,255 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,606 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,296 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,373 UART: [afmc] --
3,158,293 UART: [cold-reset] --
3,159,061 UART: [state] Locking Datavault
3,160,274 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,878 UART: [state] Locking ICCM
3,161,420 UART: [exit] Launching FMC @ 0x40000130
3,166,749 UART:
3,166,765 UART: Running Caliptra FMC ...
3,167,173 UART:
3,167,227 UART: [state] CFI Enabled
3,177,992 UART: [fht] FMC Alias Private Key: 7
3,286,267 UART: [art] Extend RT PCRs Done
3,286,695 UART: [art] Lock RT PCRs Done
3,288,181 UART: [art] Populate DV Done
3,296,232 UART: [fht] FMC Alias Private Key: 7
3,297,258 UART: [art] Derive CDI
3,297,538 UART: [art] Store in in slot 0x4
3,383,329 UART: [art] Derive Key Pair
3,383,689 UART: [art] Store priv key in slot 0x5
3,396,681 UART: [art] Derive Key Pair - Done
3,411,250 UART: [art] Signing Cert with AUTHO
3,411,730 UART: RITY.KEYID = 7
3,427,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,811 UART: [art] PUB.X = 255B188031DBAF3415DF5644CABB4DEE71D371D7B82B4CBB88586942575F026728B9C25B741D57A35CF1CF505B31D122
3,434,582 UART: [art] PUB.Y = EDFD0510876F7A1A27A4F5584A5C5881FF560F55643EBBA3AF16A7B8A5C64B5172E696B638DEBD3116DE010A946B8652
3,441,528 UART: [art] SIG.R = E52F3221CA48F9F2A476F68D4D611D942A471C6783FEA7F8134B69A15CB4CB919F466E3ABF539D8B451374824D28A33E
3,448,302 UART: [art] SIG.S = C344D9A5D67A2C222426A3F3BEDB46C3DBB3366DF608D12A543B38C2311B52963C9AF32F5BF3FCC431A269639B21385D
3,472,778 UART: Caliptra RT
3,473,032 UART: [state] CFI Enabled
3,581,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,308 UART: [rt]cmd =0x44504543, len=136
3,684,078 >>> mbox cmd response data (136 bytes)
3,684,079 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,694 UART: [rt]cmd =0x4453424c, len=4
3,727,657 >>> mbox cmd response data (8 bytes)
3,727,658 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,629 UART: [rt]cmd =0x44504543, len=92
3,948,840 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 ready_for_fw is high
1,362,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,351 >>> mbox cmd response: success
2,928,351 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,989,645 UART:
2,989,661 UART: Running Caliptra FMC ...
2,990,069 UART:
2,990,123 UART: [state] CFI Enabled
3,001,008 UART: [fht] FMC Alias Private Key: 7
3,108,847 UART: [art] Extend RT PCRs Done
3,109,275 UART: [art] Lock RT PCRs Done
3,110,763 UART: [art] Populate DV Done
3,119,092 UART: [fht] FMC Alias Private Key: 7
3,120,258 UART: [art] Derive CDI
3,120,538 UART: [art] Store in in slot 0x4
3,206,199 UART: [art] Derive Key Pair
3,206,559 UART: [art] Store priv key in slot 0x5
3,219,597 UART: [art] Derive Key Pair - Done
3,234,091 UART: [art] Signing Cert with AUTHO
3,234,571 UART: RITY.KEYID = 7
3,249,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,558 UART: [art] PUB.X = 1193E0C44B544041D3ECD2B03106C7F17BEA1F7AB3C6D6D7F96B0F8215DA3FE2A1D1EECBD151E0449E9F025DB52735F9
3,257,335 UART: [art] PUB.Y = 9123E3299F616FA4B2C5610D25C4FA4C3BCCE4AE5BB634DC7AB1E168DE072DD3E43E77FFF4CEE32EEED8B2532915417D
3,264,301 UART: [art] SIG.R = E6AF40A8849B23488BB27FA3355CA1E4E8E51BDC9E60DEBAE9BBBFC2436395EBA57FB3904D70271B02063EB3ABE44FC5
3,271,087 UART: [art] SIG.S = AC670AE6D21491A6D68A2C2AAA932268E26D268367CC9D5B341A03952F556907E2A195DEB3536974CE88D731377DC9C1
3,295,755 UART: Caliptra RT
3,296,009 UART: [state] CFI Enabled
3,403,510 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,441 UART: [rt]cmd =0x44504543, len=136
3,505,805 >>> mbox cmd response data (136 bytes)
3,505,806 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,051 UART: [rt]cmd =0x4453424c, len=4
3,548,570 >>> mbox cmd response data (8 bytes)
3,548,571 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,664 UART: [rt]cmd =0x44504543, len=92
3,770,022 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
902,803 UART: [kat] HMAC-384Kdf
907,417 UART: [kat] LMS
1,475,613 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,038 UART: [fht] Storing FHT @ 0x50003400
1,479,765 UART: [idev] ++
1,479,933 UART: [idev] CDI.KEYID = 6
1,480,293 UART: [idev] SUBJECT.KEYID = 7
1,480,717 UART: [idev] UDS.KEYID = 0
1,481,062 ready_for_fw is high
1,481,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,783 UART: [idev] Erasing UDS.KEYID = 0
1,505,669 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,522,076 UART: [ldev] Erasing FE.KEYID = 1
1,546,933 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,513 UART: [ldev] --
1,585,902 UART: [fwproc] Waiting for Commands...
1,586,629 UART: [fwproc] Received command 0x46574c44
1,587,420 UART: [fwproc] Received Image of size 114360 bytes
2,885,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,737 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,054 >>> mbox cmd response: success
3,078,054 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,186 UART: [afmc] ++
3,079,354 UART: [afmc] CDI.KEYID = 6
3,079,716 UART: [afmc] SUBJECT.KEYID = 7
3,080,141 UART: [afmc] AUTHORITY.KEYID = 5
3,115,674 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,692 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,085 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,775 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,828 UART: [afmc] --
3,158,790 UART: [cold-reset] --
3,159,670 UART: [state] Locking Datavault
3,160,575 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,179 UART: [state] Locking ICCM
3,161,679 UART: [exit] Launching FMC @ 0x40000130
3,167,008 UART:
3,167,024 UART: Running Caliptra FMC ...
3,167,432 UART:
3,167,575 UART: [state] CFI Enabled
3,178,296 UART: [fht] FMC Alias Private Key: 7
3,286,799 UART: [art] Extend RT PCRs Done
3,287,227 UART: [art] Lock RT PCRs Done
3,288,973 UART: [art] Populate DV Done
3,297,282 UART: [fht] FMC Alias Private Key: 7
3,298,216 UART: [art] Derive CDI
3,298,496 UART: [art] Store in in slot 0x4
3,384,157 UART: [art] Derive Key Pair
3,384,517 UART: [art] Store priv key in slot 0x5
3,397,817 UART: [art] Derive Key Pair - Done
3,412,653 UART: [art] Signing Cert with AUTHO
3,413,133 UART: RITY.KEYID = 7
3,428,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,154 UART: [art] PUB.X = 1C2CC61616E053311CF1EBDE4204E53F5CED0569A4931A45FA93F29AC4BA44A6F681F76D78F1018076A9C9A5246FF90C
3,435,920 UART: [art] PUB.Y = 50387320E151EC1EAB41129D9BF2E621632D1D866F4F6B494D453C91914B02DF732BC7F6455DD730F3ADABB69222C84F
3,442,871 UART: [art] SIG.R = 0F0323B44F51D75F03F1AAFA9B6B93369ABAFD3928BD659A558C52356A3BF2053A83A8F24225673CBE4F75B38A59A25F
3,449,637 UART: [art] SIG.S = 66F641B38CA11301295304AAAE9DAB4C7F391248CF501FCE64A6A027B7675D92B6BF48BC5719E2D0188A6B8024959C9E
3,473,646 UART: Caliptra RT
3,473,992 UART: [state] CFI Enabled
3,581,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,858 UART: [rt]cmd =0x44504543, len=136
3,684,470 >>> mbox cmd response data (136 bytes)
3,684,471 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,812 UART: [rt]cmd =0x4453424c, len=4
3,727,961 >>> mbox cmd response data (8 bytes)
3,727,962 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,801 UART: [rt]cmd =0x44504543, len=92
3,948,557 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,602 ready_for_fw is high
1,362,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,418 >>> mbox cmd response: success
2,927,418 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,570 UART:
2,988,586 UART: Running Caliptra FMC ...
2,988,994 UART:
2,989,137 UART: [state] CFI Enabled
2,999,604 UART: [fht] FMC Alias Private Key: 7
3,107,423 UART: [art] Extend RT PCRs Done
3,107,851 UART: [art] Lock RT PCRs Done
3,109,491 UART: [art] Populate DV Done
3,117,460 UART: [fht] FMC Alias Private Key: 7
3,118,626 UART: [art] Derive CDI
3,118,906 UART: [art] Store in in slot 0x4
3,204,561 UART: [art] Derive Key Pair
3,204,921 UART: [art] Store priv key in slot 0x5
3,217,991 UART: [art] Derive Key Pair - Done
3,232,946 UART: [art] Signing Cert with AUTHO
3,233,426 UART: RITY.KEYID = 7
3,248,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,593 UART: [art] PUB.X = AC77F78500FD0D811B60B8CAA6F4B27ACA1525B2893ADDF9940821CCAA8578F9624278A17016A7A7E1F5750F884EC52D
3,256,340 UART: [art] PUB.Y = 0942C9F24751D80F7682414D633139CD9A34E37B9C5BDA8DDC4369771E3F0CEC84248188A6386D3158BE8DD9562B2DCE
3,263,283 UART: [art] SIG.R = CDEEBA78B976E0E65F8AE0307E6057E6DB103084A03A0AE7874FDAAABDE316D6A603DF7F7C32F87E849924383A0D7C46
3,270,060 UART: [art] SIG.S = C3C9AF2ACCA6B6808500CE872BACBFBD414F047D51771492E8EDBF50FE8574734380641144B30C716A397C3DE697BB5C
3,294,323 UART: Caliptra RT
3,294,669 UART: [state] CFI Enabled
3,402,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,055 UART: [rt]cmd =0x44504543, len=136
3,504,247 >>> mbox cmd response data (136 bytes)
3,504,248 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,497 UART: [rt]cmd =0x4453424c, len=4
3,547,952 >>> mbox cmd response data (8 bytes)
3,547,953 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,934 UART: [rt]cmd =0x44504543, len=92
3,769,398 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,654 UART: [kat] LMS
1,170,982 UART: [kat] --
1,171,963 UART: [cold-reset] ++
1,172,461 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 ready_for_fw is high
1,176,507 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,921 UART: [idev] Sha1 KeyId Algorithm
1,209,245 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,932 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,217,195 UART: [ldev] Erasing FE.KEYID = 1
1,243,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,137 UART: [ldev] --
1,283,562 UART: [fwproc] Wait for Commands...
1,284,306 UART: [fwproc] Recv command 0x46574c44
1,285,034 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,982 >>> mbox cmd response: success
2,775,982 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,777,042 UART: [afmc] ++
2,777,210 UART: [afmc] CDI.KEYID = 6
2,777,572 UART: [afmc] SUBJECT.KEYID = 7
2,777,997 UART: [afmc] AUTHORITY.KEYID = 5
2,813,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,807 UART: [afmc] --
2,856,685 UART: [cold-reset] --
2,857,609 UART: [state] Locking Datavault
2,858,886 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,490 UART: [state] Locking ICCM
2,860,112 UART: [exit] Launching FMC @ 0x40000130
2,865,441 UART:
2,865,457 UART: Running Caliptra FMC ...
2,865,865 UART:
2,865,919 UART: [state] CFI Enabled
2,876,386 UART: [fht] FMC Alias Private Key: 7
2,983,827 UART: [art] Extend RT PCRs Done
2,984,255 UART: [art] Lock RT PCRs Done
2,985,613 UART: [art] Populate DV Done
2,993,946 UART: [fht] FMC Alias Private Key: 7
2,994,992 UART: [art] Derive CDI
2,995,272 UART: [art] Store in in slot 0x4
3,080,841 UART: [art] Derive Key Pair
3,081,201 UART: [art] Store priv key in slot 0x5
3,094,841 UART: [art] Derive Key Pair - Done
3,109,531 UART: [art] Signing Cert with AUTHO
3,110,011 UART: RITY.KEYID = 7
3,124,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,604 UART: [art] PUB.X = 3332F5A74E39ADBE0547150E56C464ABFA3BF7E367194C62E4283D7269FEB777F6FC610D91722AEBEFA95EEC9D362139
3,132,375 UART: [art] PUB.Y = 52C09FB43FEEACBC4EAD83D7166013E2B9E422D143773AF6305AE4399ADD6294E264FCE5086ED80C56888FDD33957ACE
3,139,333 UART: [art] SIG.R = 4D7A770543F03B3CE1F4A4FB9FF8EF1356046381D40620258CB8CBDB7750EAA675CA14531379B40354C381A59221BDF3
3,146,093 UART: [art] SIG.S = 17ADABF3F2056AC466240CB8895823102DE378592D98D60828D85E9C38504FBBAC5BEC5AD88792036CA99CEDD00C22A8
3,169,879 UART: Caliptra RT
3,170,133 UART: [state] CFI Enabled
3,277,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,036 UART: [rt]cmd =0x44504543, len=136
3,378,928 >>> mbox cmd response data (136 bytes)
3,378,929 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,270 UART: [rt]cmd =0x4453424c, len=4
3,422,229 >>> mbox cmd response data (8 bytes)
3,422,230 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,919 UART: [rt]cmd =0x44504543, len=92
3,642,990 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 ready_for_fw is high
1,060,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,443 >>> mbox cmd response: success
2,627,443 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,689,581 UART:
2,689,597 UART: Running Caliptra FMC ...
2,690,005 UART:
2,690,059 UART: [state] CFI Enabled
2,700,740 UART: [fht] FMC Alias Private Key: 7
2,808,749 UART: [art] Extend RT PCRs Done
2,809,177 UART: [art] Lock RT PCRs Done
2,811,041 UART: [art] Populate DV Done
2,819,124 UART: [fht] FMC Alias Private Key: 7
2,820,202 UART: [art] Derive CDI
2,820,482 UART: [art] Store in in slot 0x4
2,906,595 UART: [art] Derive Key Pair
2,906,955 UART: [art] Store priv key in slot 0x5
2,920,403 UART: [art] Derive Key Pair - Done
2,935,220 UART: [art] Signing Cert with AUTHO
2,935,700 UART: RITY.KEYID = 7
2,951,042 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,807 UART: [art] PUB.X = E68B88C44EC16DA4A05EFE62309DEACE49CC3890E726B214D6D9EC08392B788110BF998848CBF6F828B6505ADA8727B7
2,958,584 UART: [art] PUB.Y = 6C1633947A8944E06D0E9D15400704C62010A3E37A482FF89AD813DCF9552CA9A0A4481FE036EABD2CCDE81B6CF2FD50
2,965,535 UART: [art] SIG.R = EB5CF381F2FCB6E8F47FAD729618CEFCD62EB47A731BD5C20C9D23FC419008FB00A58C410105C5CE5ABFABB3DCACB088
2,972,301 UART: [art] SIG.S = 607DA3B3AFBE942AB1A430B743D478DB1BBD62DF9C0C6B50DE0D32B37D18869849B17C39301F9284D25FB2FB2F89F010
2,996,126 UART: Caliptra RT
2,996,380 UART: [state] CFI Enabled
3,103,492 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,501 UART: [rt]cmd =0x44504543, len=136
3,205,647 >>> mbox cmd response data (136 bytes)
3,205,648 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,861 UART: [rt]cmd =0x4453424c, len=4
3,248,478 >>> mbox cmd response data (8 bytes)
3,248,479 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,628 UART: [rt]cmd =0x44504543, len=92
3,469,304 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,693 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,706 UART: [cold-reset] ++
1,173,268 UART: [fht] FHT @ 0x50003400
1,175,719 UART: [idev] ++
1,175,887 UART: [idev] CDI.KEYID = 6
1,176,247 UART: [idev] SUBJECT.KEYID = 7
1,176,671 UART: [idev] UDS.KEYID = 0
1,177,016 ready_for_fw is high
1,177,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,623 UART: [idev] Erasing UDS.KEYID = 0
1,201,666 UART: [idev] Sha1 KeyId Algorithm
1,210,234 UART: [idev] --
1,211,396 UART: [ldev] ++
1,211,564 UART: [ldev] CDI.KEYID = 6
1,211,927 UART: [ldev] SUBJECT.KEYID = 5
1,212,353 UART: [ldev] AUTHORITY.KEYID = 7
1,212,816 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,243,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,884 UART: [ldev] --
1,283,243 UART: [fwproc] Wait for Commands...
1,284,057 UART: [fwproc] Recv command 0x46574c44
1,284,785 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,913 >>> mbox cmd response: success
2,774,913 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,981 UART: [afmc] ++
2,776,149 UART: [afmc] CDI.KEYID = 6
2,776,511 UART: [afmc] SUBJECT.KEYID = 7
2,776,936 UART: [afmc] AUTHORITY.KEYID = 5
2,812,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,351 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,870 UART: [afmc] --
2,855,852 UART: [cold-reset] --
2,856,790 UART: [state] Locking Datavault
2,857,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,347 UART: [state] Locking ICCM
2,858,791 UART: [exit] Launching FMC @ 0x40000130
2,864,120 UART:
2,864,136 UART: Running Caliptra FMC ...
2,864,544 UART:
2,864,687 UART: [state] CFI Enabled
2,875,228 UART: [fht] FMC Alias Private Key: 7
2,983,609 UART: [art] Extend RT PCRs Done
2,984,037 UART: [art] Lock RT PCRs Done
2,985,775 UART: [art] Populate DV Done
2,993,838 UART: [fht] FMC Alias Private Key: 7
2,995,012 UART: [art] Derive CDI
2,995,292 UART: [art] Store in in slot 0x4
3,080,659 UART: [art] Derive Key Pair
3,081,019 UART: [art] Store priv key in slot 0x5
3,094,567 UART: [art] Derive Key Pair - Done
3,109,328 UART: [art] Signing Cert with AUTHO
3,109,808 UART: RITY.KEYID = 7
3,124,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,475 UART: [art] PUB.X = C29F2F8962412F54B556E896E577C65EB7688E435207467496D61142F0BAC8A281B4A006AB5BB6E0FCB8E35E276AE81D
3,132,241 UART: [art] PUB.Y = BB1371BDBF63B8A54030348D49313884E98EB215FE6EEF7FD8AA647BE52B4AAB6E2EA7282A57B9E3A0F3D800B62A40D0
3,139,185 UART: [art] SIG.R = F6345E896916BF211FB2865F3728A0CF32B10A08A4179DB463A13AA2AD38ABDE916013255DFD30A03B8CD0957E339C5B
3,145,955 UART: [art] SIG.S = 2EEB4DE858484AA1FC696CE3452F8D01414EC62D396667770058077831C4F0EAA162975C26BE1968501BEABB548F6176
3,169,452 UART: Caliptra RT
3,169,798 UART: [state] CFI Enabled
3,278,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,363 UART: [rt]cmd =0x44504543, len=136
3,380,413 >>> mbox cmd response data (136 bytes)
3,380,414 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,847 UART: [rt]cmd =0x4453424c, len=4
3,423,884 >>> mbox cmd response data (8 bytes)
3,423,885 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,706 UART: [rt]cmd =0x44504543, len=92
3,645,070 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 ready_for_fw is high
1,060,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,080 >>> mbox cmd response: success
2,626,080 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,772 UART:
2,687,788 UART: Running Caliptra FMC ...
2,688,196 UART:
2,688,339 UART: [state] CFI Enabled
2,699,256 UART: [fht] FMC Alias Private Key: 7
2,808,003 UART: [art] Extend RT PCRs Done
2,808,431 UART: [art] Lock RT PCRs Done
2,810,009 UART: [art] Populate DV Done
2,818,120 UART: [fht] FMC Alias Private Key: 7
2,819,186 UART: [art] Derive CDI
2,819,466 UART: [art] Store in in slot 0x4
2,905,195 UART: [art] Derive Key Pair
2,905,555 UART: [art] Store priv key in slot 0x5
2,918,985 UART: [art] Derive Key Pair - Done
2,933,654 UART: [art] Signing Cert with AUTHO
2,934,134 UART: RITY.KEYID = 7
2,949,376 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,141 UART: [art] PUB.X = 2F422184EE9A4808D511D1003AE8A0A3282CDF0390C9332103B317F359DFF3DEACCF67FF9710D169776BC944F7DEE479
2,956,886 UART: [art] PUB.Y = 7AEF895E640EAF62BBFF805690E09B1205B7DCB8333657A1AD2A543A4DABAFF5C0DEB60E46A1D83A205D2F0FF6049219
2,963,839 UART: [art] SIG.R = 7F0FF3B39BDDB15B1EA19116FA0812087453DB3D364AF82259BA9A62E9A1409D2C6BBA3DB156222D5AC25661FA800420
2,970,605 UART: [art] SIG.S = F69F674176365B60EC37590051B553CAB3A76E2F051E32709561181F31B80AB93F0DC8AF892195BFEF98BE248E18C4EA
2,994,527 UART: Caliptra RT
2,994,873 UART: [state] CFI Enabled
3,102,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,018 UART: [rt]cmd =0x44504543, len=136
3,206,020 >>> mbox cmd response data (136 bytes)
3,206,021 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,462 UART: [rt]cmd =0x4453424c, len=4
3,249,043 >>> mbox cmd response data (8 bytes)
3,249,044 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,089 UART: [rt]cmd =0x44504543, len=92
3,470,341 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,083 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,174,459 ready_for_fw is high
1,174,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,332 UART: [ldev] ++
1,209,500 UART: [ldev] CDI.KEYID = 6
1,209,864 UART: [ldev] SUBJECT.KEYID = 5
1,210,291 UART: [ldev] AUTHORITY.KEYID = 7
1,210,754 UART: [ldev] FE.KEYID = 1
1,215,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,606 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,090 >>> mbox cmd response: success
2,772,090 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,151 UART: [afmc] ++
2,773,319 UART: [afmc] CDI.KEYID = 6
2,773,682 UART: [afmc] SUBJECT.KEYID = 7
2,774,108 UART: [afmc] AUTHORITY.KEYID = 5
2,810,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,740 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,352 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,071 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,792 UART: [afmc] --
2,853,872 UART: [cold-reset] --
2,854,708 UART: [state] Locking Datavault
2,855,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,563 UART: [state] Locking ICCM
2,856,997 UART: [exit] Launching FMC @ 0x40000130
2,862,326 UART:
2,862,342 UART: Running Caliptra FMC ...
2,862,750 UART:
2,862,804 UART: [state] CFI Enabled
2,872,993 UART: [fht] FMC Alias Private Key: 7
2,980,556 UART: [art] Extend RT PCRs Done
2,980,984 UART: [art] Lock RT PCRs Done
2,982,246 UART: [art] Populate DV Done
2,990,491 UART: [fht] FMC Alias Private Key: 7
2,991,533 UART: [art] Derive CDI
2,991,813 UART: [art] Store in in slot 0x4
3,077,326 UART: [art] Derive Key Pair
3,077,686 UART: [art] Store priv key in slot 0x5
3,090,774 UART: [art] Derive Key Pair - Done
3,105,621 UART: [art] Signing Cert with AUTHO
3,106,101 UART: RITY.KEYID = 7
3,121,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,268 UART: [art] PUB.X = CFA32B7BFD7A9F35DE97BD4221FCDBE1BB62878432B79B8E8D0A65C75144C28645C51A744C79C834BEAF43BEF7C04FE7
3,129,055 UART: [art] PUB.Y = 57C2E53D2206B22DAF06065AE4E976902AF7D2FCB97A682D478E29014A95FB764EC64353E72AEE88226F6DCBCDEA4098
3,136,003 UART: [art] SIG.R = 67A53203D607EBF433DF62AE3D2C142E98C3212C373FB1A76D148F95F4425ADA41FADE2B4A7128C0B8465E559F37F5E1
3,142,775 UART: [art] SIG.S = 4C9E3933A9A1209CA58A5A6705264198A4F702CD0D79BC999E57F84E63877A72A541A69A6F468AC3DBA587042622B0B9
3,166,546 UART: Caliptra RT
3,166,800 UART: [state] CFI Enabled
3,274,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,511 UART: [rt]cmd =0x44504543, len=136
3,377,139 >>> mbox cmd response data (136 bytes)
3,377,140 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,299 UART: [rt]cmd =0x4453424c, len=4
3,419,534 >>> mbox cmd response data (8 bytes)
3,419,535 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,374 UART: [rt]cmd =0x44504543, len=92
3,640,576 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,864 ready_for_fw is high
1,055,864 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,168 >>> mbox cmd response: success
2,623,168 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,685,900 UART:
2,685,916 UART: Running Caliptra FMC ...
2,686,324 UART:
2,686,378 UART: [state] CFI Enabled
2,697,045 UART: [fht] FMC Alias Private Key: 7
2,805,522 UART: [art] Extend RT PCRs Done
2,805,950 UART: [art] Lock RT PCRs Done
2,807,564 UART: [art] Populate DV Done
2,815,747 UART: [fht] FMC Alias Private Key: 7
2,816,773 UART: [art] Derive CDI
2,817,053 UART: [art] Store in in slot 0x4
2,902,640 UART: [art] Derive Key Pair
2,903,000 UART: [art] Store priv key in slot 0x5
2,916,002 UART: [art] Derive Key Pair - Done
2,930,859 UART: [art] Signing Cert with AUTHO
2,931,339 UART: RITY.KEYID = 7
2,946,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,214 UART: [art] PUB.X = 5C1323E3D7331F9CABCA6D07016A91A676365EB42F15C0B94A78B3F4A9CC75A32FF2FA976F0C0F99E52FEF875B90B027
2,953,984 UART: [art] PUB.Y = 88C7CC7CCDAB002EDD925B7D6E380D50F97416283484344F767F5168F6250EE98EF2F00C64A890250BEB5E2B7D316AF6
2,960,906 UART: [art] SIG.R = 88DDF6CD7D036950FA2036543314411F6BA5B8428E49552F44A692FF6EA745C25F69610AB81E47B03FC6BEC650AE0FFD
2,967,675 UART: [art] SIG.S = 82EF9EEA3D7EB3E10C6FF3B8158775D3D88CD5A1A15FE2F3E482E32421FDA93CD60F8764282437BCB51ABABEBA0579E4
2,991,851 UART: Caliptra RT
2,992,105 UART: [state] CFI Enabled
3,099,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,919 UART: [rt]cmd =0x44504543, len=136
3,202,491 >>> mbox cmd response data (136 bytes)
3,202,492 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,087 UART: [rt]cmd =0x4453424c, len=4
3,245,586 >>> mbox cmd response data (8 bytes)
3,245,587 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,390 UART: [rt]cmd =0x44504543, len=92
3,466,452 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,174,628 ready_for_fw is high
1,174,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,400 UART: [idev] Sha1 KeyId Algorithm
1,209,262 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,191 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,715 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,207 >>> mbox cmd response: success
2,774,207 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,462 UART: [afmc] ++
2,775,630 UART: [afmc] CDI.KEYID = 6
2,775,993 UART: [afmc] SUBJECT.KEYID = 7
2,776,419 UART: [afmc] AUTHORITY.KEYID = 5
2,811,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,763 UART: [afmc] --
2,855,653 UART: [cold-reset] --
2,856,619 UART: [state] Locking Datavault
2,857,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,378 UART: [state] Locking ICCM
2,858,880 UART: [exit] Launching FMC @ 0x40000130
2,864,209 UART:
2,864,225 UART: Running Caliptra FMC ...
2,864,633 UART:
2,864,776 UART: [state] CFI Enabled
2,875,883 UART: [fht] FMC Alias Private Key: 7
2,983,520 UART: [art] Extend RT PCRs Done
2,983,948 UART: [art] Lock RT PCRs Done
2,985,590 UART: [art] Populate DV Done
2,994,015 UART: [fht] FMC Alias Private Key: 7
2,994,969 UART: [art] Derive CDI
2,995,249 UART: [art] Store in in slot 0x4
3,081,076 UART: [art] Derive Key Pair
3,081,436 UART: [art] Store priv key in slot 0x5
3,093,948 UART: [art] Derive Key Pair - Done
3,108,439 UART: [art] Signing Cert with AUTHO
3,108,919 UART: RITY.KEYID = 7
3,124,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,142 UART: [art] PUB.X = 936EC969D806C317DFEFC312BDCFBED2CEABE42985158F0E158B045D6475CD796AC6CF5DAE3D7226629716D50FBB20DF
3,131,920 UART: [art] PUB.Y = BDAF968817FA0A03DDE0220F818E3CC526968AF6EB276B1CE008FB07DD7F5F56503C867535457449E2AADA78DCE887FB
3,138,869 UART: [art] SIG.R = E621C63CE42C14D7B3D009D972B283D24E5436C4095630AA80D6095A01B1E96A55DC54E21A9304CDA953FDB16A94C0A5
3,145,628 UART: [art] SIG.S = 87CCAC1C70D783722EA4F753A95190CF4D1B044ED8A44BE8747A3A5C9B79B8C77D8B319853E9F51A85F2836AA3AFE821
3,169,892 UART: Caliptra RT
3,170,238 UART: [state] CFI Enabled
3,279,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,748 UART: [rt]cmd =0x44504543, len=136
3,382,478 >>> mbox cmd response data (136 bytes)
3,382,479 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,834 UART: [rt]cmd =0x4453424c, len=4
3,425,753 >>> mbox cmd response data (8 bytes)
3,425,754 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,601 UART: [rt]cmd =0x44504543, len=92
3,646,282 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,619 ready_for_fw is high
1,056,619 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,305 >>> mbox cmd response: success
2,622,305 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,517 UART:
2,684,533 UART: Running Caliptra FMC ...
2,684,941 UART:
2,685,084 UART: [state] CFI Enabled
2,695,949 UART: [fht] FMC Alias Private Key: 7
2,803,890 UART: [art] Extend RT PCRs Done
2,804,318 UART: [art] Lock RT PCRs Done
2,806,102 UART: [art] Populate DV Done
2,814,257 UART: [fht] FMC Alias Private Key: 7
2,815,271 UART: [art] Derive CDI
2,815,551 UART: [art] Store in in slot 0x4
2,901,070 UART: [art] Derive Key Pair
2,901,430 UART: [art] Store priv key in slot 0x5
2,914,844 UART: [art] Derive Key Pair - Done
2,929,945 UART: [art] Signing Cert with AUTHO
2,930,425 UART: RITY.KEYID = 7
2,945,623 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,388 UART: [art] PUB.X = 14E3BC46A80101A94ACBFEE270120463058A13F5BD5221B4A3500937B771FEFDA3665B9EEE40ED75AB7A19A23E37D945
2,953,151 UART: [art] PUB.Y = F84F310B9B6BC44746D543B9668A2B12AE7362AB6C1A7B655AD6679676D5CECD50670BFBAE5DA32F167CE1E8281FC73C
2,960,109 UART: [art] SIG.R = A47B99CDF244CD6DA12D61CA44A850454A2E5011A4149DFED2C77B2DBB874693F2536F04ADA4078A6CBAFAC48A90B56E
2,966,891 UART: [art] SIG.S = 999E75993C76C3F54A7B8443337BFDF850AA0FF3704F724E345876B0641DE3C111F21DBAB05EBCD8797285BA6F3BB99F
2,990,745 UART: Caliptra RT
2,991,091 UART: [state] CFI Enabled
3,099,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,037 UART: [rt]cmd =0x44504543, len=136
3,201,145 >>> mbox cmd response data (136 bytes)
3,201,146 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,539 UART: [rt]cmd =0x4453424c, len=4
3,244,394 >>> mbox cmd response data (8 bytes)
3,244,395 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,408 UART: [rt]cmd =0x44504543, len=92
3,465,522 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 10.29s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.86s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.87s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 7.88s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.43s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.40s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.53s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.60s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.38s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.60s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.55s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.53s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.41s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.48s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,630 UART:
193,016 UART: Running Caliptra ROM ...
194,139 UART:
194,283 UART: [state] CFI Enabled
267,303 UART: [state] LifecycleState = Unprovisioned
269,219 UART: [state] DebugLocked = No
270,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,277 UART: [kat] SHA2-256
446,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,532 UART: [kat] ++
457,006 UART: [kat] sha1
466,669 UART: [kat] SHA2-256
469,383 UART: [kat] SHA2-384
474,733 UART: [kat] SHA2-512-ACC
477,090 UART: [kat] ECC-384
2,767,223 UART: [kat] HMAC-384Kdf
2,800,060 UART: [kat] LMS
3,990,386 UART: [kat] --
3,995,453 UART: [cold-reset] ++
3,996,892 UART: [fht] Storing FHT @ 0x50003400
4,008,670 UART: [idev] ++
4,009,276 UART: [idev] CDI.KEYID = 6
4,010,192 UART: [idev] SUBJECT.KEYID = 7
4,011,452 UART: [idev] UDS.KEYID = 0
4,012,499 ready_for_fw is high
4,012,706 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,054 UART: [idev] Erasing UDS.KEYID = 0
7,347,713 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,733 UART: [idev] --
7,375,430 UART: [ldev] ++
7,376,053 UART: [ldev] CDI.KEYID = 6
7,376,959 UART: [ldev] SUBJECT.KEYID = 5
7,378,161 UART: [ldev] AUTHORITY.KEYID = 7
7,379,433 UART: [ldev] FE.KEYID = 1
7,421,721 UART: [ldev] Erasing FE.KEYID = 1
10,755,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,851 UART: [ldev] --
13,135,875 UART: [fwproc] Waiting for Commands...
13,138,132 UART: [fwproc] Received command 0x46574c44
13,140,312 UART: [fwproc] Received Image of size 114036 bytes
17,199,006 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,480 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,346,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,664,029 >>> mbox cmd response: success
17,664,587 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,668,352 UART: [afmc] ++
17,668,938 UART: [afmc] CDI.KEYID = 6
17,669,843 UART: [afmc] SUBJECT.KEYID = 7
17,671,102 UART: [afmc] AUTHORITY.KEYID = 5
21,028,437 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,839 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,242 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,061 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,550 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,931 UART: [afmc] --
23,397,690 UART: [cold-reset] --
23,401,170 UART: [state] Locking Datavault
23,406,460 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,205 UART: [state] Locking ICCM
23,410,345 UART: [exit] Launching FMC @ 0x40000130
23,418,733 UART:
23,419,017 UART: Running Caliptra FMC ...
23,420,052 UART:
23,420,197 UART: [state] CFI Enabled
23,490,461 UART: [fht] FMC Alias Private Key: 7
25,829,092 UART: [art] Extend RT PCRs Done
25,830,336 UART: [art] Lock RT PCRs Done
25,831,931 UART: [art] Populate DV Done
25,837,497 UART: [fht] FMC Alias Private Key: 7
25,839,135 UART: [art] Derive CDI
25,839,865 UART: [art] Store in in slot 0x4
25,898,922 UART: [art] Derive Key Pair
25,899,956 UART: [art] Store priv key in slot 0x5
29,192,826 UART: [art] Derive Key Pair - Done
29,205,575 UART: [art] Signing Cert with AUTHO
29,206,900 UART: RITY.KEYID = 7
31,495,136 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,638 UART: [art] PUB.X = 76634A79C69B25DDBB7D65F836F4F7E6F7F2AAD0776AA94B4AD29AD23A5D1531242939D70FC6487A53FC03C2B2B9FEB3
31,503,867 UART: [art] PUB.Y = B9F9244FE224971E590563C9518B7242280B4D68C9A4C4AFFF19E29136678F35F071221CEB5FE3705607527038867A0C
31,511,104 UART: [art] SIG.R = 2297C173CB30D8C263ED7859E67A35E781F83534ED6F5EBF0A1EA4DDC44068D2DD47BD856A6A8226B5031EBD2B3177C0
31,518,480 UART: [art] SIG.S = 36B99F58F7FD3DB6800499E4ED5F9C2C5355F95CAA9A0106A3EABEB50C07C54571720D4A3F3C927BBF7DBF0E401E1A4A
32,823,323 UART: Caliptra RT
32,824,058 UART: [state] CFI Enabled
32,986,348 UART: [rt] RT listening for mailbox commands...
33,019,060 UART: [rt]cmd =0x53494756, len=196
33,024,097 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,782,610 ready_for_fw is high
3,783,177 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,835,261 >>> mbox cmd response: success
17,835,937 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,523,555 UART:
23,523,932 UART: Running Caliptra FMC ...
23,525,119 UART:
23,525,278 UART: [state] CFI Enabled
23,575,420 UART: [fht] FMC Alias Private Key: 7
25,913,988 UART: [art] Extend RT PCRs Done
25,915,217 UART: [art] Lock RT PCRs Done
25,916,804 UART: [art] Populate DV Done
25,921,999 UART: [fht] FMC Alias Private Key: 7
25,923,551 UART: [art] Derive CDI
25,924,284 UART: [art] Store in in slot 0x4
25,985,074 UART: [art] Derive Key Pair
25,986,121 UART: [art] Store priv key in slot 0x5
29,278,455 UART: [art] Derive Key Pair - Done
29,291,675 UART: [art] Signing Cert with AUTHO
29,292,976 UART: RITY.KEYID = 7
31,579,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,581,046 UART: [art] PUB.X = 0412558FAD3877AB1C3091AF0611BA30D211477806E7B197465AA4F1D945EBA5A83225AFF1463D46F03345370F66A679
31,588,232 UART: [art] PUB.Y = EABB770430338ADA9D237D73E5840E21D6FA8AF9068B7E878CEC646B1E9872C6C58FAC06E8B4F9B55DED1856FD0AB930
31,595,515 UART: [art] SIG.R = 1B744840BB351B4C81FC60113B7B24BE1495092F08363D6551E304F73E20AFDFFC466B67FCF6592FECA476F3EF9061CD
31,602,890 UART: [art] SIG.S = 318F9C4111194A3ADA6E73EC47CB7080B94DA3862C71F975881FFCF6301FE7388FAAD81E6BDC61E9E3AEF50C0974F35D
32,908,272 UART: Caliptra RT
32,908,965 UART: [state] CFI Enabled
33,068,741 UART: [rt] RT listening for mailbox commands...
33,101,359 UART: [rt]cmd =0x53494756, len=196
33,105,820 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,400 UART:
192,753 UART: Running Caliptra ROM ...
193,879 UART:
603,517 UART: [state] CFI Enabled
618,110 UART: [state] LifecycleState = Unprovisioned
619,987 UART: [state] DebugLocked = No
622,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,653 UART: [kat] SHA2-256
796,394 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,980 UART: [kat] ++
807,429 UART: [kat] sha1
818,797 UART: [kat] SHA2-256
821,520 UART: [kat] SHA2-384
826,728 UART: [kat] SHA2-512-ACC
829,093 UART: [kat] ECC-384
3,111,644 UART: [kat] HMAC-384Kdf
3,124,612 UART: [kat] LMS
4,314,712 UART: [kat] --
4,319,342 UART: [cold-reset] ++
4,321,572 UART: [fht] Storing FHT @ 0x50003400
4,332,435 UART: [idev] ++
4,333,003 UART: [idev] CDI.KEYID = 6
4,334,039 UART: [idev] SUBJECT.KEYID = 7
4,335,217 UART: [idev] UDS.KEYID = 0
4,336,338 ready_for_fw is high
4,336,572 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,973 UART: [idev] Erasing UDS.KEYID = 0
7,622,193 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,140 UART: [idev] --
7,647,145 UART: [ldev] ++
7,647,720 UART: [ldev] CDI.KEYID = 6
7,648,685 UART: [ldev] SUBJECT.KEYID = 5
7,649,897 UART: [ldev] AUTHORITY.KEYID = 7
7,651,129 UART: [ldev] FE.KEYID = 1
7,663,932 UART: [ldev] Erasing FE.KEYID = 1
10,952,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,297 UART: [ldev] --
13,316,660 UART: [fwproc] Waiting for Commands...
13,318,862 UART: [fwproc] Received command 0x46574c44
13,321,038 UART: [fwproc] Received Image of size 114036 bytes
17,371,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,578 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,763 >>> mbox cmd response: success
17,832,347 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,835,370 UART: [afmc] ++
17,835,959 UART: [afmc] CDI.KEYID = 6
17,836,844 UART: [afmc] SUBJECT.KEYID = 7
17,838,130 UART: [afmc] AUTHORITY.KEYID = 5
21,153,645 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,258 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,605 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,477 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,969 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,966 UART: [afmc] --
23,521,719 UART: [cold-reset] --
23,525,741 UART: [state] Locking Datavault
23,530,453 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,151 UART: [state] Locking ICCM
23,533,790 UART: [exit] Launching FMC @ 0x40000130
23,542,178 UART:
23,542,407 UART: Running Caliptra FMC ...
23,543,428 UART:
23,543,595 UART: [state] CFI Enabled
23,551,428 UART: [fht] FMC Alias Private Key: 7
25,882,280 UART: [art] Extend RT PCRs Done
25,883,502 UART: [art] Lock RT PCRs Done
25,885,126 UART: [art] Populate DV Done
25,890,445 UART: [fht] FMC Alias Private Key: 7
25,892,034 UART: [art] Derive CDI
25,892,770 UART: [art] Store in in slot 0x4
25,935,354 UART: [art] Derive Key Pair
25,936,353 UART: [art] Store priv key in slot 0x5
29,178,283 UART: [art] Derive Key Pair - Done
29,191,327 UART: [art] Signing Cert with AUTHO
29,192,632 UART: RITY.KEYID = 7
31,471,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,499 UART: [art] PUB.X = 2B27A3867C19AF3E2F38E432D257F82B8C08FBED00B072B18E5578CAFDD9D1355CAEF0427C34381364E52BA691C36F57
31,480,746 UART: [art] PUB.Y = 4FF07471859A7312BEFF9F6F08C48D33111409C2EF941EA6A2A69607EDDCC48265FAFFD309A5188B2F7447725B5726FC
31,488,028 UART: [art] SIG.R = FBFDB38BB2DE37506B886B4C4224A54456D4A3ABE4C0D57A914C464EBA70846B5C5EF6DFA18E2FB8D1E4D854D7371B95
31,495,387 UART: [art] SIG.S = 57A9F69E209CDB2D5C388E2A7FB4693C8B706914D68D813D5610807679548F8121170D5B8734692A52AF1424F92F6B3F
32,799,993 UART: Caliptra RT
32,800,706 UART: [state] CFI Enabled
32,918,206 UART: [rt] RT listening for mailbox commands...
32,950,750 UART: [rt]cmd =0x53494756, len=196
32,955,380 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,127,874 ready_for_fw is high
4,128,450 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,852 >>> mbox cmd response: success
18,069,519 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,712,614 UART:
23,713,011 UART: Running Caliptra FMC ...
23,714,115 UART:
23,714,268 UART: [state] CFI Enabled
23,722,435 UART: [fht] FMC Alias Private Key: 7
26,053,316 UART: [art] Extend RT PCRs Done
26,054,548 UART: [art] Lock RT PCRs Done
26,056,055 UART: [art] Populate DV Done
26,061,686 UART: [fht] FMC Alias Private Key: 7
26,063,334 UART: [art] Derive CDI
26,064,073 UART: [art] Store in in slot 0x4
26,106,944 UART: [art] Derive Key Pair
26,107,983 UART: [art] Store priv key in slot 0x5
29,350,106 UART: [art] Derive Key Pair - Done
29,362,551 UART: [art] Signing Cert with AUTHO
29,363,903 UART: RITY.KEYID = 7
31,643,212 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,717 UART: [art] PUB.X = BE5D52E2B56C9763DB9C16B044C962DD7F87DFBF1B141E2F82003F04393455416779CCA930A6CD8C45E40042651A3EAF
31,651,922 UART: [art] PUB.Y = 2797F12C4D92E7860D0A5A59B60ACBAA4944BBDD1D1CD339A074810AE00AD855C0317445517074B9FFFC481BC9F16C8A
31,659,167 UART: [art] SIG.R = A0AC66F5E16AD2EB5EDDB7EB85DF63A06E36311136F6605BCF6C64CDEE05932B0478EE3DDEB7C51F91BC8798F224F845
31,666,633 UART: [art] SIG.S = F4FC5DCFE854E215EAD8246E46EB51E0C3B7D49C8C10A3BAA06E45CF96D17F9CBE9D8723ABC5B717D359FE67229B2717
32,971,706 UART: Caliptra RT
32,972,415 UART: [state] CFI Enabled
33,090,072 UART: [rt] RT listening for mailbox commands...
33,122,563 UART: [rt]cmd =0x53494756, len=196
33,127,349 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
192,689 UART:
193,047 UART: Running Caliptra ROM ...
194,248 UART:
194,402 UART: [state] CFI Enabled
266,126 UART: [state] LifecycleState = Unprovisioned
267,972 UART: [state] DebugLocked = No
269,435 UART: [state] WD Timer not started. Device not locked for debugging
272,681 UART: [kat] SHA2-256
451,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,500 UART: [kat] ++
464,102 UART: [kat] sha1
473,857 UART: [kat] SHA2-256
476,872 UART: [kat] SHA2-384
482,870 UART: [kat] SHA2-512-ACC
485,882 UART: [kat] ECC-384
2,948,590 UART: [kat] HMAC-384Kdf
2,970,558 UART: [kat] LMS
3,500,024 UART: [kat] --
3,504,265 UART: [cold-reset] ++
3,506,019 UART: [fht] FHT @ 0x50003400
3,517,158 UART: [idev] ++
3,517,734 UART: [idev] CDI.KEYID = 6
3,518,646 UART: [idev] SUBJECT.KEYID = 7
3,519,892 UART: [idev] UDS.KEYID = 0
3,520,819 ready_for_fw is high
3,521,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,843 UART: [idev] Erasing UDS.KEYID = 0
6,024,866 UART: [idev] Sha1 KeyId Algorithm
6,048,636 UART: [idev] --
6,053,606 UART: [ldev] ++
6,054,183 UART: [ldev] CDI.KEYID = 6
6,055,094 UART: [ldev] SUBJECT.KEYID = 5
6,056,255 UART: [ldev] AUTHORITY.KEYID = 7
6,057,541 UART: [ldev] FE.KEYID = 1
6,099,732 UART: [ldev] Erasing FE.KEYID = 1
8,600,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,924 UART: [ldev] --
10,412,959 UART: [fwproc] Wait for Commands...
10,415,938 UART: [fwproc] Recv command 0x46574c44
10,418,040 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,274,366 >>> mbox cmd response: success
14,274,895 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,278,666 UART: [afmc] ++
14,279,255 UART: [afmc] CDI.KEYID = 6
14,280,166 UART: [afmc] SUBJECT.KEYID = 7
14,281,387 UART: [afmc] AUTHORITY.KEYID = 5
16,807,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,735 UART: [afmc] --
18,608,847 UART: [cold-reset] --
18,613,684 UART: [state] Locking Datavault
18,621,632 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,278 UART: [state] Locking ICCM
18,625,038 UART: [exit] Launching FMC @ 0x40000130
18,633,448 UART:
18,633,697 UART: Running Caliptra FMC ...
18,634,802 UART:
18,634,962 UART: [state] CFI Enabled
18,689,704 UART: [fht] FMC Alias Private Key: 7
20,453,406 UART: [art] Extend RT PCRs Done
20,454,642 UART: [art] Lock RT PCRs Done
20,456,165 UART: [art] Populate DV Done
20,461,632 UART: [fht] FMC Alias Private Key: 7
20,463,460 UART: [art] Derive CDI
20,464,328 UART: [art] Store in in slot 0x4
20,522,493 UART: [art] Derive Key Pair
20,523,496 UART: [art] Store priv key in slot 0x5
22,987,441 UART: [art] Derive Key Pair - Done
23,000,386 UART: [art] Signing Cert with AUTHO
23,001,706 UART: RITY.KEYID = 7
24,713,569 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,074 UART: [art] PUB.X = 73126FEC91C4F456B9A17B0D63DA4A2390EF8C734E548D60256E63AA1057450E91E6D7784DDAA635520B0F55B5EEA8F3
24,722,372 UART: [art] PUB.Y = 12B8CC4E778E38B83474ECF20094DFB8B54814AA5418CC0D44ED4F34A8C5724C2AE7AA05854AE8213A24B31A54CF2739
24,729,597 UART: [art] SIG.R = 87063A81EF3EB961D3EDA2B75755E83B3B2C88D9C12724F370B3414635DA5C1C945471B445E2437C3598B72DF006C7F4
24,736,989 UART: [art] SIG.S = 80CE1A55B9202756F0C4ACF52261405449B3726809C309C3C6A5B8B9FCD7FD32436A3848AB35C4E8635CA5FCB1C721ED
25,715,812 UART: Caliptra RT
25,716,506 UART: [state] CFI Enabled
25,881,351 UART: [rt] RT listening for mailbox commands...
25,913,780 UART: [rt]cmd =0x53494756, len=196
25,918,217 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
192,579 UART:
192,952 UART: Running Caliptra ROM ...
194,162 UART:
194,315 UART: [state] CFI Enabled
263,528 UART: [state] LifecycleState = Unprovisioned
265,933 UART: [state] DebugLocked = No
268,605 UART: [state] WD Timer not started. Device not locked for debugging
274,020 UART: [kat] SHA2-256
463,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,712 UART: [kat] ++
475,164 UART: [kat] sha1
486,888 UART: [kat] SHA2-256
489,971 UART: [kat] SHA2-384
495,469 UART: [kat] SHA2-512-ACC
498,048 UART: [kat] ECC-384
2,945,227 UART: [kat] HMAC-384Kdf
2,970,341 UART: [kat] LMS
3,502,124 UART: [kat] --
3,507,620 UART: [cold-reset] ++
3,510,079 UART: [fht] FHT @ 0x50003400
3,521,635 UART: [idev] ++
3,522,352 UART: [idev] CDI.KEYID = 6
3,523,239 UART: [idev] SUBJECT.KEYID = 7
3,524,503 UART: [idev] UDS.KEYID = 0
3,525,432 ready_for_fw is high
3,525,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,658 UART: [idev] Erasing UDS.KEYID = 0
6,029,222 UART: [idev] Sha1 KeyId Algorithm
6,052,019 UART: [idev] --
6,057,745 UART: [ldev] ++
6,058,435 UART: [ldev] CDI.KEYID = 6
6,059,321 UART: [ldev] SUBJECT.KEYID = 5
6,060,423 UART: [ldev] AUTHORITY.KEYID = 7
6,061,709 UART: [ldev] FE.KEYID = 1
6,098,898 UART: [ldev] Erasing FE.KEYID = 1
8,602,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,575 UART: [ldev] --
10,392,364 UART: [fwproc] Wait for Commands...
10,394,196 UART: [fwproc] Recv command 0x46574c44
10,396,453 UART: [fwproc] Recv'd Img size: 114360 bytes
13,838,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,031,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,574,123 >>> mbox cmd response: success
14,574,667 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,578,018 UART: [afmc] ++
14,578,721 UART: [afmc] CDI.KEYID = 6
14,579,967 UART: [afmc] SUBJECT.KEYID = 7
14,581,404 UART: [afmc] AUTHORITY.KEYID = 5
17,105,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,832,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,834,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,849,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,864,533 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,879,588 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,902,339 UART: [afmc] --
18,906,091 UART: [cold-reset] --
18,908,667 UART: [state] Locking Datavault
18,914,675 UART: [state] Locking PCR0, PCR1 and PCR31
18,916,878 UART: [state] Locking ICCM
18,918,598 UART: [exit] Launching FMC @ 0x40000130
18,927,277 UART:
18,927,514 UART: Running Caliptra FMC ...
18,928,618 UART:
18,928,780 UART: [state] CFI Enabled
18,987,546 UART: [fht] FMC Alias Private Key: 7
20,751,471 UART: [art] Extend RT PCRs Done
20,752,708 UART: [art] Lock RT PCRs Done
20,753,984 UART: [art] Populate DV Done
20,759,233 UART: [fht] FMC Alias Private Key: 7
20,760,725 UART: [art] Derive CDI
20,761,487 UART: [art] Store in in slot 0x4
20,820,136 UART: [art] Derive Key Pair
20,821,174 UART: [art] Store priv key in slot 0x5
23,284,011 UART: [art] Derive Key Pair - Done
23,296,906 UART: [art] Signing Cert with AUTHO
23,298,214 UART: RITY.KEYID = 7
25,009,488 UART: [art] Erasing AUTHORITY.KEYID = 7
25,010,999 UART: [art] PUB.X = A2F89395EE451F2F274B1024D0B8C98A4B3BEE82D42CC07DF2402CB10A34C3D580C365B1DF9C648E674076313F2D44D5
25,018,298 UART: [art] PUB.Y = 94D7DD794C170644DA2C9D700ABE46B885B19B2A921B2B400FE2BBF6AB885538BC7A8202564DA3AB51E54C13F824B734
25,025,562 UART: [art] SIG.R = C8467BE9D1C5B0119B5FBE3D40A5CA710888AD83C55F639553F70CFA2FC8C0FA7F6017B2342C113A9D1B2892ED4D2F8D
25,032,951 UART: [art] SIG.S = A8A6A3B451F2363FC332FC6015715E8B583CACD4B6333649458CD54C0200CD25032937131AC182CF249F56F3A2E2A183
26,012,269 UART: Caliptra RT
26,012,977 UART: [state] CFI Enabled
26,177,435 UART: [rt] RT listening for mailbox commands...
26,209,881 UART: [rt]cmd =0x53494756, len=196
26,213,946 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
3,408,375 ready_for_fw is high
3,409,031 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,716,183 >>> mbox cmd response: success
14,716,842 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,020,606 UART:
19,020,989 UART: Running Caliptra FMC ...
19,022,189 UART:
19,022,360 UART: [state] CFI Enabled
19,086,711 UART: [fht] FMC Alias Private Key: 7
20,850,604 UART: [art] Extend RT PCRs Done
20,851,814 UART: [art] Lock RT PCRs Done
20,853,821 UART: [art] Populate DV Done
20,859,013 UART: [fht] FMC Alias Private Key: 7
20,860,662 UART: [art] Derive CDI
20,861,401 UART: [art] Store in in slot 0x4
20,919,654 UART: [art] Derive Key Pair
20,920,713 UART: [art] Store priv key in slot 0x5
23,383,880 UART: [art] Derive Key Pair - Done
23,396,820 UART: [art] Signing Cert with AUTHO
23,398,161 UART: RITY.KEYID = 7
25,109,607 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,098 UART: [art] PUB.X = D46CCD2D3D514B33193EDA53CF92A229B703130FED2D9D0EE6796BC34F29CCA0617B203C414F93A06BECF6322953215B
25,118,401 UART: [art] PUB.Y = 771DA66068A38E667A0AFD458C3DF1CE88D40F23CD70AC339D13951B2EEAEE88697DB440AB1C815A5B2B833F766BAECB
25,125,699 UART: [art] SIG.R = 368B9FE215687D20F80A5A51E76BE5025C9DC7226AC130AB9BDFAC297109297F9A32F44D0AE4BDD4FEF505B88FA6739C
25,133,077 UART: [art] SIG.S = 438CFB015AC8731B24AEDC04716F1F9107676A7E62F752376219181AB164A39D93BC4813859410CD06CC91A20AEBAA01
26,112,562 UART: Caliptra RT
26,113,278 UART: [state] CFI Enabled
26,277,456 UART: [rt] RT listening for mailbox commands...
26,310,060 UART: [rt]cmd =0x53494756, len=196
26,314,453 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,365 UART:
192,723 UART: Running Caliptra ROM ...
194,207 UART:
603,490 UART: [state] CFI Enabled
617,573 UART: [state] LifecycleState = Unprovisioned
619,943 UART: [state] DebugLocked = No
622,956 UART: [state] WD Timer not started. Device not locked for debugging
626,718 UART: [kat] SHA2-256
816,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,412 UART: [kat] ++
827,931 UART: [kat] sha1
838,560 UART: [kat] SHA2-256
841,622 UART: [kat] SHA2-384
848,404 UART: [kat] SHA2-512-ACC
850,987 UART: [kat] ECC-384
3,294,545 UART: [kat] HMAC-384Kdf
3,307,500 UART: [kat] LMS
3,839,347 UART: [kat] --
3,842,371 UART: [cold-reset] ++
3,843,662 UART: [fht] FHT @ 0x50003400
3,854,781 UART: [idev] ++
3,855,421 UART: [idev] CDI.KEYID = 6
3,856,451 UART: [idev] SUBJECT.KEYID = 7
3,857,627 UART: [idev] UDS.KEYID = 0
3,858,551 ready_for_fw is high
3,858,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,452 UART: [idev] Erasing UDS.KEYID = 0
6,337,561 UART: [idev] Sha1 KeyId Algorithm
6,359,864 UART: [idev] --
6,365,182 UART: [ldev] ++
6,365,863 UART: [ldev] CDI.KEYID = 6
6,366,744 UART: [ldev] SUBJECT.KEYID = 5
6,367,952 UART: [ldev] AUTHORITY.KEYID = 7
6,369,179 UART: [ldev] FE.KEYID = 1
6,378,122 UART: [ldev] Erasing FE.KEYID = 1
8,861,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,187 UART: [ldev] --
10,653,360 UART: [fwproc] Wait for Commands...
10,656,371 UART: [fwproc] Recv command 0x46574c44
10,658,695 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,620 >>> mbox cmd response: success
14,843,149 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,846,275 UART: [afmc] ++
14,846,979 UART: [afmc] CDI.KEYID = 6
14,848,218 UART: [afmc] SUBJECT.KEYID = 7
14,849,646 UART: [afmc] AUTHORITY.KEYID = 5
17,350,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,724 UART: [afmc] --
19,146,514 UART: [cold-reset] --
19,149,457 UART: [state] Locking Datavault
19,154,825 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,047 UART: [state] Locking ICCM
19,158,986 UART: [exit] Launching FMC @ 0x40000130
19,167,655 UART:
19,167,897 UART: Running Caliptra FMC ...
19,168,996 UART:
19,169,152 UART: [state] CFI Enabled
19,177,171 UART: [fht] FMC Alias Private Key: 7
20,933,892 UART: [art] Extend RT PCRs Done
20,935,107 UART: [art] Lock RT PCRs Done
20,936,644 UART: [art] Populate DV Done
20,942,103 UART: [fht] FMC Alias Private Key: 7
20,943,745 UART: [art] Derive CDI
20,944,499 UART: [art] Store in in slot 0x4
20,987,256 UART: [art] Derive Key Pair
20,988,253 UART: [art] Store priv key in slot 0x5
23,415,441 UART: [art] Derive Key Pair - Done
23,428,706 UART: [art] Signing Cert with AUTHO
23,430,008 UART: RITY.KEYID = 7
25,135,509 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,013 UART: [art] PUB.X = 44903CEAF3813EDA36DC798136890126782A8E8CE5D14BF7953D51AD0992312AB4EE6FADE41CEC251E3A3452B941D44A
25,144,275 UART: [art] PUB.Y = D2D27738F6ED1E9EC90A6CD012D2D49A980CE482ACA20B16240D236DBDA67DFE1DF32E8C85FBE982944A2A6B27CFF6D1
25,151,565 UART: [art] SIG.R = 698764913507B653858ACDDFD885C29AA8BE975EC2A5DF105D2CEFDC0CC7C2EF6460793D9436A0CF8AC72D38A72FF602
25,158,991 UART: [art] SIG.S = EEA573FB68134027033C6D952B6088E1E80792F3DF4AE32F978A72F27B26B4B8496F52D50F63A61ED6464C8F0475282E
26,138,265 UART: Caliptra RT
26,138,982 UART: [state] CFI Enabled
26,255,557 UART: [rt] RT listening for mailbox commands...
26,288,036 UART: [rt]cmd =0x53494756, len=196
26,292,829 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,076 writing to cptra_bootfsm_go
3,757,149 ready_for_fw is high
3,757,564 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,948 >>> mbox cmd response: success
14,961,577 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,215,717 UART:
19,216,106 UART: Running Caliptra FMC ...
19,217,236 UART:
19,217,398 UART: [state] CFI Enabled
19,225,280 UART: [fht] FMC Alias Private Key: 7
20,982,090 UART: [art] Extend RT PCRs Done
20,983,314 UART: [art] Lock RT PCRs Done
20,984,962 UART: [art] Populate DV Done
20,990,207 UART: [fht] FMC Alias Private Key: 7
20,991,700 UART: [art] Derive CDI
20,992,464 UART: [art] Store in in slot 0x4
21,034,623 UART: [art] Derive Key Pair
21,035,624 UART: [art] Store priv key in slot 0x5
23,461,770 UART: [art] Derive Key Pair - Done
23,474,766 UART: [art] Signing Cert with AUTHO
23,476,072 UART: RITY.KEYID = 7
25,181,709 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,220 UART: [art] PUB.X = ECB73E130AA151026E98189A124C4723CB5C3C6211FB3D214DC902E3B3C6BF2C4D601E8518CA784B2615EE7F961B847F
25,190,456 UART: [art] PUB.Y = E004BA61B8657D762501877EBE9C92FAB903210A7FBE27136DA3D78ABF8D7D128F3159CE072C811CC8F72871E012EF6E
25,197,750 UART: [art] SIG.R = ADB710BB641DA7EB88298EB4688B7F2A7872908DD8527B34110CACCC885D7D0B031DBDD228AE7375A9408BDD8643A149
25,205,126 UART: [art] SIG.S = 88625E23193556FD48504135B65BAE5E1DEF7823168B500C6ECD925199E8EB1238A86CA210A172D005F97B5772F3244D
26,184,077 UART: Caliptra RT
26,184,785 UART: [state] CFI Enabled
26,301,324 UART: [rt] RT listening for mailbox commands...
26,333,867 UART: [rt]cmd =0x53494756, len=196
26,338,226 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,435 UART:
192,790 UART: Running Caliptra ROM ...
193,881 UART:
194,017 UART: [state] CFI Enabled
263,939 UART: [state] LifecycleState = Unprovisioned
265,918 UART: [state] DebugLocked = No
267,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,222 UART: [kat] SHA2-256
441,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,441 UART: [kat] ++
452,887 UART: [kat] sha1
463,472 UART: [kat] SHA2-256
466,186 UART: [kat] SHA2-384
471,903 UART: [kat] SHA2-512-ACC
474,265 UART: [kat] ECC-384
2,768,320 UART: [kat] HMAC-384Kdf
2,800,168 UART: [kat] LMS
3,990,546 UART: [kat] --
3,995,324 UART: [cold-reset] ++
3,997,040 UART: [fht] Storing FHT @ 0x50003400
4,009,724 UART: [idev] ++
4,010,285 UART: [idev] CDI.KEYID = 6
4,011,232 UART: [idev] SUBJECT.KEYID = 7
4,012,463 UART: [idev] UDS.KEYID = 0
4,013,443 ready_for_fw is high
4,013,657 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,185 UART: [idev] Erasing UDS.KEYID = 0
7,344,396 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,009 UART: [idev] --
7,370,074 UART: [ldev] ++
7,370,643 UART: [ldev] CDI.KEYID = 6
7,371,603 UART: [ldev] SUBJECT.KEYID = 5
7,372,806 UART: [ldev] AUTHORITY.KEYID = 7
7,374,084 UART: [ldev] FE.KEYID = 1
7,420,974 UART: [ldev] Erasing FE.KEYID = 1
10,755,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,810 UART: [ldev] --
13,134,284 UART: [fwproc] Waiting for Commands...
13,135,936 UART: [fwproc] Received command 0x46574c44
13,138,109 UART: [fwproc] Received Image of size 114036 bytes
17,191,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,173 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,651,712 >>> mbox cmd response: success
17,652,237 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,655,579 UART: [afmc] ++
17,656,217 UART: [afmc] CDI.KEYID = 6
17,657,106 UART: [afmc] SUBJECT.KEYID = 7
17,658,326 UART: [afmc] AUTHORITY.KEYID = 5
21,025,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,405 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,818 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,641 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,077 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,209 UART: [afmc] --
23,397,441 UART: [cold-reset] --
23,401,879 UART: [state] Locking Datavault
23,407,491 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,242 UART: [state] Locking ICCM
23,411,684 UART: [exit] Launching FMC @ 0x40000130
23,420,065 UART:
23,420,304 UART: Running Caliptra FMC ...
23,421,333 UART:
23,421,471 UART: [state] CFI Enabled
23,486,590 UART: [fht] FMC Alias Private Key: 7
25,824,786 UART: [art] Extend RT PCRs Done
25,826,000 UART: [art] Lock RT PCRs Done
25,827,918 UART: [art] Populate DV Done
25,833,265 UART: [fht] FMC Alias Private Key: 7
25,834,795 UART: [art] Derive CDI
25,835,520 UART: [art] Store in in slot 0x4
25,894,736 UART: [art] Derive Key Pair
25,895,790 UART: [art] Store priv key in slot 0x5
29,188,998 UART: [art] Derive Key Pair - Done
29,202,044 UART: [art] Signing Cert with AUTHO
29,203,341 UART: RITY.KEYID = 7
31,491,678 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,180 UART: [art] PUB.X = DA8FE3D1964AB481E26C41CEBA901AA529D5D5FC7061E5F165A3EAFCA0106A5CA0732333B4336C10088ED43B00A82D62
31,500,499 UART: [art] PUB.Y = 761E158D591F42136C55CAA3D10E50071448204B8E4959609FF969826ADB49C848689196C3BDD93A80014C8EBE92624A
31,507,664 UART: [art] SIG.R = AEB1C2B3335A7E874175014F3072C796CC0EDBD79C2B33393D246013C3C62434AFE07370CFE368E93859E649EDFDDE86
31,515,057 UART: [art] SIG.S = 2E4C0EF17095D7DE33C6B7DF2DF316CDF40832788930D48A53581E69EA60EDB6B86357F0091AF477342BF9F7BE1F818C
32,820,573 UART: Caliptra RT
32,821,271 UART: [state] CFI Enabled
32,982,748 UART: [rt] RT listening for mailbox commands...
32,997,403 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,804,463 ready_for_fw is high
3,804,834 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,885,721 >>> mbox cmd response: success
17,886,573 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,571,505 UART:
23,571,909 UART: Running Caliptra FMC ...
23,573,003 UART:
23,573,151 UART: [state] CFI Enabled
23,638,789 UART: [fht] FMC Alias Private Key: 7
25,976,627 UART: [art] Extend RT PCRs Done
25,978,008 UART: [art] Lock RT PCRs Done
25,979,442 UART: [art] Populate DV Done
25,984,870 UART: [fht] FMC Alias Private Key: 7
25,986,510 UART: [art] Derive CDI
25,987,242 UART: [art] Store in in slot 0x4
26,047,434 UART: [art] Derive Key Pair
26,048,430 UART: [art] Store priv key in slot 0x5
29,341,380 UART: [art] Derive Key Pair - Done
29,354,165 UART: [art] Signing Cert with AUTHO
29,355,463 UART: RITY.KEYID = 7
31,643,357 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,860 UART: [art] PUB.X = 0CF55356C25ABD2E9566AD767D8A554D69D9C3BAB9C45EC7CF848B9C6E679DBFABF3ABC83B9A226B11359F0CCDA5401C
31,652,094 UART: [art] PUB.Y = AAD7BAEC8931F29DEC8A8C958254CBC6ADECD8B38B34B8A23182E9E31507BBC09F790B8157D2FE7AEDBD4819B2A35E0E
31,659,418 UART: [art] SIG.R = E8B36A1BC4A6872E3500A865CE523CBEC1B414CE9743CF7C301C85C5FC5ED2AF643EC69C22D71594B3904ABB943FD970
31,666,812 UART: [art] SIG.S = 92596B519B4863A6338658703E6477BECDA0066B4C5C957439BFA4A599C00046B362450D817368531ABA9C1FF87CA3D6
32,971,853 UART: Caliptra RT
32,972,565 UART: [state] CFI Enabled
33,135,212 UART: [rt] RT listening for mailbox commands...
33,150,300 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,558 UART:
192,909 UART: Running Caliptra ROM ...
194,098 UART:
603,894 UART: [state] CFI Enabled
616,842 UART: [state] LifecycleState = Unprovisioned
618,780 UART: [state] DebugLocked = No
620,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,316 UART: [kat] SHA2-256
795,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,598 UART: [kat] ++
806,045 UART: [kat] sha1
816,493 UART: [kat] SHA2-256
819,216 UART: [kat] SHA2-384
823,780 UART: [kat] SHA2-512-ACC
826,147 UART: [kat] ECC-384
3,111,045 UART: [kat] HMAC-384Kdf
3,123,958 UART: [kat] LMS
4,314,104 UART: [kat] --
4,319,851 UART: [cold-reset] ++
4,320,837 UART: [fht] Storing FHT @ 0x50003400
4,331,829 UART: [idev] ++
4,332,396 UART: [idev] CDI.KEYID = 6
4,333,450 UART: [idev] SUBJECT.KEYID = 7
4,334,553 UART: [idev] UDS.KEYID = 0
4,335,638 ready_for_fw is high
4,335,866 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,131 UART: [idev] Erasing UDS.KEYID = 0
7,617,000 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,139 UART: [idev] --
7,643,444 UART: [ldev] ++
7,644,008 UART: [ldev] CDI.KEYID = 6
7,644,977 UART: [ldev] SUBJECT.KEYID = 5
7,646,189 UART: [ldev] AUTHORITY.KEYID = 7
7,647,474 UART: [ldev] FE.KEYID = 1
7,660,276 UART: [ldev] Erasing FE.KEYID = 1
10,949,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,844 UART: [ldev] --
13,308,510 UART: [fwproc] Waiting for Commands...
13,310,706 UART: [fwproc] Received command 0x46574c44
13,312,886 UART: [fwproc] Received Image of size 114036 bytes
17,366,198 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,862 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,828,619 >>> mbox cmd response: success
17,829,136 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,832,058 UART: [afmc] ++
17,832,640 UART: [afmc] CDI.KEYID = 6
17,833,550 UART: [afmc] SUBJECT.KEYID = 7
17,834,813 UART: [afmc] AUTHORITY.KEYID = 5
21,147,358 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,050 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,312 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,723 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,590 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,022 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,523 UART: [afmc] --
23,511,579 UART: [cold-reset] --
23,517,005 UART: [state] Locking Datavault
23,521,755 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,513 UART: [state] Locking ICCM
23,525,104 UART: [exit] Launching FMC @ 0x40000130
23,533,448 UART:
23,533,681 UART: Running Caliptra FMC ...
23,534,707 UART:
23,534,853 UART: [state] CFI Enabled
23,542,740 UART: [fht] FMC Alias Private Key: 7
25,873,665 UART: [art] Extend RT PCRs Done
25,874,883 UART: [art] Lock RT PCRs Done
25,876,399 UART: [art] Populate DV Done
25,881,753 UART: [fht] FMC Alias Private Key: 7
25,883,343 UART: [art] Derive CDI
25,884,154 UART: [art] Store in in slot 0x4
25,926,744 UART: [art] Derive Key Pair
25,927,788 UART: [art] Store priv key in slot 0x5
29,170,426 UART: [art] Derive Key Pair - Done
29,183,645 UART: [art] Signing Cert with AUTHO
29,184,944 UART: RITY.KEYID = 7
31,463,933 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,438 UART: [art] PUB.X = D861CCB39ECDAC674FAC5ADFC6488251A596D5BBEB9C6224EC16C85BE1E992A1A74363FC0F8E717556A8034082C807EA
31,472,721 UART: [art] PUB.Y = CD4EA17E685DC67359F5149DB9B074D61A384F5269DA31CC7B2D3B562BBB37BD6DEC7EE282EEDB4401A1BDAE0F09F5D1
31,479,955 UART: [art] SIG.R = 6D0B796D91368B4CAE2D282D8081E79FAB55B26716C0D62156E221163B9E4A858B1BEFF044D1B228B1CF53CF2837D9C9
31,487,372 UART: [art] SIG.S = EF090B70833ACE72B508D27C462DCEC3283C574717EC9A32862FDC35E0393A34B5850F6683169A62B6AC4DEA6008E16E
32,792,528 UART: Caliptra RT
32,793,229 UART: [state] CFI Enabled
32,911,944 UART: [rt] RT listening for mailbox commands...
32,926,825 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,128,727 ready_for_fw is high
4,129,137 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,062,896 >>> mbox cmd response: success
18,063,719 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,701,767 UART:
23,702,151 UART: Running Caliptra FMC ...
23,703,283 UART:
23,703,443 UART: [state] CFI Enabled
23,711,285 UART: [fht] FMC Alias Private Key: 7
26,042,093 UART: [art] Extend RT PCRs Done
26,043,328 UART: [art] Lock RT PCRs Done
26,045,205 UART: [art] Populate DV Done
26,050,517 UART: [fht] FMC Alias Private Key: 7
26,052,181 UART: [art] Derive CDI
26,053,002 UART: [art] Store in in slot 0x4
26,095,946 UART: [art] Derive Key Pair
26,096,988 UART: [art] Store priv key in slot 0x5
29,338,780 UART: [art] Derive Key Pair - Done
29,351,779 UART: [art] Signing Cert with AUTHO
29,353,079 UART: RITY.KEYID = 7
31,632,573 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,081 UART: [art] PUB.X = D7BEDEAAD6EDF90FFD633F7C793CB1717B6D666ADBEFC7BED010BF87F2254555C52088020C867B96B1575D8D774414CD
31,641,371 UART: [art] PUB.Y = 4769AC5C365F015AF1D4C600476AFC7CF0A77CBFB8BCC537D4920C377F59288EFC592AD2FDA4E6768CDC0610A2F0661C
31,648,639 UART: [art] SIG.R = 2F71FC6956D9AE675F591B7B1592312ADB82E3DA30487B71256C46E654D5518415439243EE8CC6896B7E9CB379E2E5F8
31,656,012 UART: [art] SIG.S = 38125D88673A657FB6823E337EC9C96435CED1AFF66A373B292F0DB969A6CC3FA8C1ED32200BDDE5DFDA92BE6A8892EB
32,961,744 UART: Caliptra RT
32,962,443 UART: [state] CFI Enabled
33,080,864 UART: [rt] RT listening for mailbox commands...
33,095,631 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
192,590 UART:
192,966 UART: Running Caliptra ROM ...
194,171 UART:
194,325 UART: [state] CFI Enabled
267,871 UART: [state] LifecycleState = Unprovisioned
269,780 UART: [state] DebugLocked = No
271,597 UART: [state] WD Timer not started. Device not locked for debugging
275,981 UART: [kat] SHA2-256
455,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,691 UART: [kat] ++
467,225 UART: [kat] sha1
479,029 UART: [kat] SHA2-256
482,112 UART: [kat] SHA2-384
488,761 UART: [kat] SHA2-512-ACC
491,697 UART: [kat] ECC-384
2,949,977 UART: [kat] HMAC-384Kdf
2,971,454 UART: [kat] LMS
3,500,917 UART: [kat] --
3,503,916 UART: [cold-reset] ++
3,504,779 UART: [fht] FHT @ 0x50003400
3,515,472 UART: [idev] ++
3,516,042 UART: [idev] CDI.KEYID = 6
3,516,956 UART: [idev] SUBJECT.KEYID = 7
3,518,127 UART: [idev] UDS.KEYID = 0
3,519,173 ready_for_fw is high
3,519,368 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,171 UART: [idev] Erasing UDS.KEYID = 0
6,025,218 UART: [idev] Sha1 KeyId Algorithm
6,049,303 UART: [idev] --
6,052,750 UART: [ldev] ++
6,053,333 UART: [ldev] CDI.KEYID = 6
6,054,252 UART: [ldev] SUBJECT.KEYID = 5
6,055,407 UART: [ldev] AUTHORITY.KEYID = 7
6,056,695 UART: [ldev] FE.KEYID = 1
6,101,567 UART: [ldev] Erasing FE.KEYID = 1
8,599,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,187 UART: [ldev] --
10,396,624 UART: [fwproc] Wait for Commands...
10,399,207 UART: [fwproc] Recv command 0x46574c44
10,401,297 UART: [fwproc] Recv'd Img size: 114360 bytes
13,798,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,261,885 >>> mbox cmd response: success
14,262,391 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,265,251 UART: [afmc] ++
14,265,829 UART: [afmc] CDI.KEYID = 6
14,266,712 UART: [afmc] SUBJECT.KEYID = 7
14,267,974 UART: [afmc] AUTHORITY.KEYID = 5
16,807,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,502 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,280 UART: [afmc] --
18,609,717 UART: [cold-reset] --
18,614,573 UART: [state] Locking Datavault
18,621,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,930 UART: [state] Locking ICCM
18,625,591 UART: [exit] Launching FMC @ 0x40000130
18,633,980 UART:
18,634,227 UART: Running Caliptra FMC ...
18,635,334 UART:
18,635,495 UART: [state] CFI Enabled
18,689,747 UART: [fht] FMC Alias Private Key: 7
20,452,993 UART: [art] Extend RT PCRs Done
20,454,214 UART: [art] Lock RT PCRs Done
20,455,823 UART: [art] Populate DV Done
20,460,959 UART: [fht] FMC Alias Private Key: 7
20,462,547 UART: [art] Derive CDI
20,463,285 UART: [art] Store in in slot 0x4
20,522,504 UART: [art] Derive Key Pair
20,523,563 UART: [art] Store priv key in slot 0x5
22,986,479 UART: [art] Derive Key Pair - Done
22,999,536 UART: [art] Signing Cert with AUTHO
23,000,844 UART: RITY.KEYID = 7
24,712,507 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,993 UART: [art] PUB.X = 28FAD188AD95B4522617ED6427462B02155B4D4483AAA18B0D21265084F359CFCAC29255BFB95A7060F873CD28B92AA6
24,721,227 UART: [art] PUB.Y = B21BF6E0ADA8294D73B571735FD0E74A0B62DECA40B35F453EAF373B793E8682DFEDE4F4114908095FA8EAE867875EE3
24,728,555 UART: [art] SIG.R = 1BBAD6F547602A3566AE3DD34CD12E42A090FD46D6831E38B56E29133ED048543A0E3C558488C237FED93CC4A1B46C57
24,735,945 UART: [art] SIG.S = 92A114D33BBC0A0944BDA871EA4F2D8A792A811C949589F9653B7A4BB96A0531C016D274BAA6BC88C484E9D31E575B93
25,714,822 UART: Caliptra RT
25,715,540 UART: [state] CFI Enabled
25,881,722 UART: [rt] RT listening for mailbox commands...
25,896,675 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,530 UART:
192,899 UART: Running Caliptra ROM ...
194,034 UART:
194,187 UART: [state] CFI Enabled
260,559 UART: [state] LifecycleState = Unprovisioned
262,939 UART: [state] DebugLocked = No
265,044 UART: [state] WD Timer not started. Device not locked for debugging
268,945 UART: [kat] SHA2-256
458,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,588 UART: [kat] ++
470,037 UART: [kat] sha1
481,767 UART: [kat] SHA2-256
484,779 UART: [kat] SHA2-384
491,408 UART: [kat] SHA2-512-ACC
493,991 UART: [kat] ECC-384
2,948,542 UART: [kat] HMAC-384Kdf
2,972,801 UART: [kat] LMS
3,504,563 UART: [kat] --
3,508,345 UART: [cold-reset] ++
3,510,278 UART: [fht] FHT @ 0x50003400
3,521,256 UART: [idev] ++
3,521,990 UART: [idev] CDI.KEYID = 6
3,522,871 UART: [idev] SUBJECT.KEYID = 7
3,524,113 UART: [idev] UDS.KEYID = 0
3,525,012 ready_for_fw is high
3,525,216 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,517 UART: [idev] Erasing UDS.KEYID = 0
6,032,776 UART: [idev] Sha1 KeyId Algorithm
6,054,982 UART: [idev] --
6,059,848 UART: [ldev] ++
6,060,539 UART: [ldev] CDI.KEYID = 6
6,061,454 UART: [ldev] SUBJECT.KEYID = 5
6,062,612 UART: [ldev] AUTHORITY.KEYID = 7
6,063,847 UART: [ldev] FE.KEYID = 1
6,100,638 UART: [ldev] Erasing FE.KEYID = 1
8,604,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,440 UART: [ldev] --
10,413,435 UART: [fwproc] Wait for Commands...
10,415,689 UART: [fwproc] Recv command 0x46574c44
10,417,999 UART: [fwproc] Recv'd Img size: 114360 bytes
13,861,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,602,014 >>> mbox cmd response: success
14,602,527 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,605,664 UART: [afmc] ++
14,606,356 UART: [afmc] CDI.KEYID = 6
14,607,516 UART: [afmc] SUBJECT.KEYID = 7
14,609,056 UART: [afmc] AUTHORITY.KEYID = 5
17,156,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,095 UART: [afmc] --
18,970,638 UART: [cold-reset] --
18,975,097 UART: [state] Locking Datavault
18,981,435 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,576 UART: [state] Locking ICCM
18,986,646 UART: [exit] Launching FMC @ 0x40000130
18,995,303 UART:
18,995,551 UART: Running Caliptra FMC ...
18,996,660 UART:
18,996,818 UART: [state] CFI Enabled
19,053,598 UART: [fht] FMC Alias Private Key: 7
20,817,448 UART: [art] Extend RT PCRs Done
20,818,674 UART: [art] Lock RT PCRs Done
20,820,542 UART: [art] Populate DV Done
20,825,743 UART: [fht] FMC Alias Private Key: 7
20,827,447 UART: [art] Derive CDI
20,828,461 UART: [art] Store in in slot 0x4
20,886,996 UART: [art] Derive Key Pair
20,887,999 UART: [art] Store priv key in slot 0x5
23,352,080 UART: [art] Derive Key Pair - Done
23,365,171 UART: [art] Signing Cert with AUTHO
23,366,480 UART: RITY.KEYID = 7
25,078,611 UART: [art] Erasing AUTHORITY.KEYID = 7
25,080,511 UART: [art] PUB.X = 1E707BC7587E35EDF19EAA14E5A1478F394A7FCECC33B121CDA707575726E8E701AF2F18EC15EF3149C12D3DFFC5E79D
25,087,433 UART: [art] PUB.Y = 0E6CBE97A4B85956CA58407AF025ED7B0E4C9CDE2520F8D3365EA7B41FA2B40D5CE11C4C6784E5E1541D1F83670C3013
25,094,660 UART: [art] SIG.R = CDF9B88D3F4B6757B9C54F9A20A820BBC931FFEC292A56FA54D3666AB7E2D25B4FB77BC34B489D2DE293B0D2D30D6F29
25,102,128 UART: [art] SIG.S = 58A5F3C6D7715161229617AF75712796482171E4F8B3FAF78BBEEEF677E32953B0F49B5C68D52EF76E648D9C4F54A669
26,080,839 UART: Caliptra RT
26,081,530 UART: [state] CFI Enabled
26,246,406 UART: [rt] RT listening for mailbox commands...
26,261,608 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,440,485 ready_for_fw is high
3,441,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,739,671 >>> mbox cmd response: success
14,740,730 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,046,335 UART:
19,046,739 UART: Running Caliptra FMC ...
19,047,941 UART:
19,048,116 UART: [state] CFI Enabled
19,116,184 UART: [fht] FMC Alias Private Key: 7
20,880,059 UART: [art] Extend RT PCRs Done
20,881,276 UART: [art] Lock RT PCRs Done
20,882,954 UART: [art] Populate DV Done
20,888,483 UART: [fht] FMC Alias Private Key: 7
20,890,086 UART: [art] Derive CDI
20,890,830 UART: [art] Store in in slot 0x4
20,949,357 UART: [art] Derive Key Pair
20,950,402 UART: [art] Store priv key in slot 0x5
23,412,748 UART: [art] Derive Key Pair - Done
23,425,471 UART: [art] Signing Cert with AUTHO
23,426,810 UART: RITY.KEYID = 7
25,139,496 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,026 UART: [art] PUB.X = E9B93257BCEA860508D32D44078D97C269BD6083D94939E5E721E2302EDF9D0D9613A55C14761EFD253520012E0C5CCC
25,148,215 UART: [art] PUB.Y = AB8FDEE7180100E2EE34E3CB4EFA1ED26D6A9867DC85871C8C5C12C1EC1D3254C172DCD408E5F0C3290D86F86B5C81C0
25,155,518 UART: [art] SIG.R = 1F9C6D665E6338467B3DCB6CC72B3BE326ACFC6EA27124496480D1266727E31EC4813EA866D9B08C55F5A0BB45C4BC27
25,162,908 UART: [art] SIG.S = 5EE4160C5C9C015425D5631E3C76060022EC6507CA84779C14DE78BDBDC29F34E61452C0ADC2E83957E67DE14AE14F2A
26,141,397 UART: Caliptra RT
26,142,083 UART: [state] CFI Enabled
26,308,322 UART: [rt] RT listening for mailbox commands...
26,322,847 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,538 UART:
192,911 UART: Running Caliptra ROM ...
194,106 UART:
603,859 UART: [state] CFI Enabled
617,401 UART: [state] LifecycleState = Unprovisioned
619,775 UART: [state] DebugLocked = No
622,355 UART: [state] WD Timer not started. Device not locked for debugging
626,376 UART: [kat] SHA2-256
816,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,107 UART: [kat] ++
827,555 UART: [kat] sha1
839,283 UART: [kat] SHA2-256
842,302 UART: [kat] SHA2-384
848,503 UART: [kat] SHA2-512-ACC
851,080 UART: [kat] ECC-384
3,292,673 UART: [kat] HMAC-384Kdf
3,305,472 UART: [kat] LMS
3,837,303 UART: [kat] --
3,841,316 UART: [cold-reset] ++
3,842,496 UART: [fht] FHT @ 0x50003400
3,854,043 UART: [idev] ++
3,854,680 UART: [idev] CDI.KEYID = 6
3,855,808 UART: [idev] SUBJECT.KEYID = 7
3,856,913 UART: [idev] UDS.KEYID = 0
3,857,859 ready_for_fw is high
3,858,075 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,753 UART: [idev] Erasing UDS.KEYID = 0
6,333,454 UART: [idev] Sha1 KeyId Algorithm
6,355,331 UART: [idev] --
6,360,084 UART: [ldev] ++
6,360,765 UART: [ldev] CDI.KEYID = 6
6,361,725 UART: [ldev] SUBJECT.KEYID = 5
6,362,874 UART: [ldev] AUTHORITY.KEYID = 7
6,364,105 UART: [ldev] FE.KEYID = 1
6,377,069 UART: [ldev] Erasing FE.KEYID = 1
8,858,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,514 UART: [ldev] --
10,647,327 UART: [fwproc] Wait for Commands...
10,648,934 UART: [fwproc] Recv command 0x46574c44
10,651,234 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,837,364 >>> mbox cmd response: success
14,837,871 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,840,617 UART: [afmc] ++
14,841,316 UART: [afmc] CDI.KEYID = 6
14,842,501 UART: [afmc] SUBJECT.KEYID = 7
14,843,983 UART: [afmc] AUTHORITY.KEYID = 5
17,348,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,275 UART: [afmc] --
19,145,221 UART: [cold-reset] --
19,149,619 UART: [state] Locking Datavault
19,156,380 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,565 UART: [state] Locking ICCM
19,160,284 UART: [exit] Launching FMC @ 0x40000130
19,168,950 UART:
19,169,193 UART: Running Caliptra FMC ...
19,170,291 UART:
19,170,449 UART: [state] CFI Enabled
19,178,712 UART: [fht] FMC Alias Private Key: 7
20,935,096 UART: [art] Extend RT PCRs Done
20,936,329 UART: [art] Lock RT PCRs Done
20,937,871 UART: [art] Populate DV Done
20,943,232 UART: [fht] FMC Alias Private Key: 7
20,944,927 UART: [art] Derive CDI
20,945,734 UART: [art] Store in in slot 0x4
20,988,756 UART: [art] Derive Key Pair
20,989,796 UART: [art] Store priv key in slot 0x5
23,417,040 UART: [art] Derive Key Pair - Done
23,430,256 UART: [art] Signing Cert with AUTHO
23,431,569 UART: RITY.KEYID = 7
25,137,252 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,757 UART: [art] PUB.X = 4E5B851D9B05144D48D0EE903A03E53480B2F36B9195187E34849C7915B50E5CE9BAC1E992EB51D31FCB7E0F78DD68B1
25,146,069 UART: [art] PUB.Y = 9F9FCFBB7212AE23CCA81CA2FF41AFE60D96D602676AC24126E92F25A85FDCC016FE3AC2FB2B32CAADF90331674E399B
25,153,358 UART: [art] SIG.R = 8BA0499FDDA549DAAC1E0E21122D15518856D58C49B4D11A126F0238D610CB7239B7DFCE4C89AA8360312E434290FA2A
25,160,748 UART: [art] SIG.S = 5E5AB3A29109774A91B97301283DEC5F06587D1A2AA152F2CCF13A1C181F84FFFB1F6CBF3B6E9BDB6AA85B87E0A5CF0B
26,140,000 UART: Caliptra RT
26,140,719 UART: [state] CFI Enabled
26,257,845 UART: [rt] RT listening for mailbox commands...
26,272,668 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,756,900 ready_for_fw is high
3,757,340 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,865 >>> mbox cmd response: success
14,951,439 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,199,755 UART:
19,200,128 UART: Running Caliptra FMC ...
19,201,309 UART:
19,201,492 UART: [state] CFI Enabled
19,209,705 UART: [fht] FMC Alias Private Key: 7
20,966,537 UART: [art] Extend RT PCRs Done
20,967,748 UART: [art] Lock RT PCRs Done
20,969,643 UART: [art] Populate DV Done
20,975,088 UART: [fht] FMC Alias Private Key: 7
20,976,754 UART: [art] Derive CDI
20,977,573 UART: [art] Store in in slot 0x4
21,019,799 UART: [art] Derive Key Pair
21,020,795 UART: [art] Store priv key in slot 0x5
23,447,531 UART: [art] Derive Key Pair - Done
23,460,504 UART: [art] Signing Cert with AUTHO
23,461,830 UART: RITY.KEYID = 7
25,167,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,723 UART: [art] PUB.X = 5963E9FFFA4F836EFAF0EF9BB074A178AE4A0BFA0B78356D60DF1C6CD7D3A5497A84CC5D53DED87AA463486437EE8C93
25,176,019 UART: [art] PUB.Y = 362D2507F0BEB50956FBB6716D914D4240AD39D914CE9499608FAD978AB2CDF73F96339E8591F0D56CD397D980D3CACD
25,183,337 UART: [art] SIG.R = E539AA0B21681813F381AAA0D823AC9B7D467D4A0B949468C8FB62E311AB387DCC03542B13F9A2EE04663805BFA2035F
25,190,734 UART: [art] SIG.S = 89D119764877E1712BD406B03E445DF1B3272157B2102E46AD187E468681C9ED2CB5C7D947C9E57C81331F385480874C
26,169,213 UART: Caliptra RT
26,169,921 UART: [state] CFI Enabled
26,287,362 UART: [rt] RT listening for mailbox commands...
26,302,500 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,167 UART: [kat] SHA2-256
882,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,213 UART: [kat] ++
886,365 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,324 UART: [kat] SHA2-512-ACC
897,225 UART: [kat] ECC-384
902,974 UART: [kat] HMAC-384Kdf
907,756 UART: [kat] LMS
1,475,952 UART: [kat] --
1,476,875 UART: [cold-reset] ++
1,477,397 UART: [fht] Storing FHT @ 0x50003400
1,480,324 UART: [idev] ++
1,480,492 UART: [idev] CDI.KEYID = 6
1,480,852 UART: [idev] SUBJECT.KEYID = 7
1,481,276 UART: [idev] UDS.KEYID = 0
1,481,621 ready_for_fw is high
1,481,621 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,148 UART: [idev] Erasing UDS.KEYID = 0
1,505,164 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,514,973 UART: [ldev] ++
1,515,141 UART: [ldev] CDI.KEYID = 6
1,515,504 UART: [ldev] SUBJECT.KEYID = 5
1,515,930 UART: [ldev] AUTHORITY.KEYID = 7
1,516,393 UART: [ldev] FE.KEYID = 1
1,521,529 UART: [ldev] Erasing FE.KEYID = 1
1,546,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,880 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,832 UART: [fwproc] Received command 0x46574c44
1,587,623 UART: [fwproc] Received Image of size 114360 bytes
2,884,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,140 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,517 >>> mbox cmd response: success
3,077,517 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,078,723 UART: [afmc] ++
3,078,891 UART: [afmc] CDI.KEYID = 6
3,079,253 UART: [afmc] SUBJECT.KEYID = 7
3,079,678 UART: [afmc] AUTHORITY.KEYID = 5
3,114,173 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,678 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,368 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,215 UART: [afmc] --
3,157,145 UART: [cold-reset] --
3,157,991 UART: [state] Locking Datavault
3,158,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,458 UART: [state] Locking ICCM
3,160,018 UART: [exit] Launching FMC @ 0x40000130
3,165,347 UART:
3,165,363 UART: Running Caliptra FMC ...
3,165,771 UART:
3,165,825 UART: [state] CFI Enabled
3,176,126 UART: [fht] FMC Alias Private Key: 7
3,284,355 UART: [art] Extend RT PCRs Done
3,284,783 UART: [art] Lock RT PCRs Done
3,286,623 UART: [art] Populate DV Done
3,295,108 UART: [fht] FMC Alias Private Key: 7
3,296,204 UART: [art] Derive CDI
3,296,484 UART: [art] Store in in slot 0x4
3,381,853 UART: [art] Derive Key Pair
3,382,213 UART: [art] Store priv key in slot 0x5
3,395,569 UART: [art] Derive Key Pair - Done
3,410,031 UART: [art] Signing Cert with AUTHO
3,410,511 UART: RITY.KEYID = 7
3,425,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,548 UART: [art] PUB.X = ADC7A2A1CDAFE011FD41B5C9360DC2459BBD4B5DB0DCE262567D550EBB899040B17EA7400D9F01CF32798D07FD0BD8DE
3,433,324 UART: [art] PUB.Y = 591E5BCC61BE861D3C262E2A39663BB560FE9DB1AD211FEE41E046E57149A77FA239F853CEE1D06C8B02BB9A10C13FDF
3,440,289 UART: [art] SIG.R = 670A2CA880CBFB147AAFE299664F5E862FB6C520E33E4B69FDDBEBF8272611278C6FE862DB3D861885166EC3642613A5
3,447,064 UART: [art] SIG.S = 1D1548EBC23AAA3C4E67697B8B3826739E241D415F584C4CB97BFDECA1E2C7DCB745A76E76AC8FDA544EFFC4821B4641
3,470,769 UART: Caliptra RT
3,471,023 UART: [state] CFI Enabled
3,578,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,907 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,293 ready_for_fw is high
1,362,293 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,833 >>> mbox cmd response: success
2,928,833 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,989,747 UART:
2,989,763 UART: Running Caliptra FMC ...
2,990,171 UART:
2,990,225 UART: [state] CFI Enabled
3,001,000 UART: [fht] FMC Alias Private Key: 7
3,108,629 UART: [art] Extend RT PCRs Done
3,109,057 UART: [art] Lock RT PCRs Done
3,110,515 UART: [art] Populate DV Done
3,118,606 UART: [fht] FMC Alias Private Key: 7
3,119,734 UART: [art] Derive CDI
3,120,014 UART: [art] Store in in slot 0x4
3,205,819 UART: [art] Derive Key Pair
3,206,179 UART: [art] Store priv key in slot 0x5
3,219,531 UART: [art] Derive Key Pair - Done
3,233,821 UART: [art] Signing Cert with AUTHO
3,234,301 UART: RITY.KEYID = 7
3,249,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,144 UART: [art] PUB.X = 7CAC896DA7E47AB8FF0D356219C6EEE1664EC5A48B90C13DE2BF8230066A743802138BAD10FD7D9D4E18ADA346AE951D
3,256,921 UART: [art] PUB.Y = 1AABEE03D4FB570A4359559192AD3C87AABAFA6936D5B4348CA024395317676B80CE8C6FF367B42459866D4CBD0F1DB3
3,263,872 UART: [art] SIG.R = 96CCED10DCE225520EF21D3DC489B03B1765B3408492A6775867C63DED8238CCD2D2496E8AC0D41F0A6E8A0B4E7ADE67
3,270,645 UART: [art] SIG.S = 584A2E6B44EE71B482180056D0393D1DDAC87BB529C4555B32233520A8D04A799983B5DA5D076CC9F419039E578DFD38
3,294,084 UART: Caliptra RT
3,294,338 UART: [state] CFI Enabled
3,402,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,963 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,019 UART: [kat] HMAC-384Kdf
907,837 UART: [kat] LMS
1,476,033 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,813 UART: [idev] ++
1,479,981 UART: [idev] CDI.KEYID = 6
1,480,341 UART: [idev] SUBJECT.KEYID = 7
1,480,765 UART: [idev] UDS.KEYID = 0
1,481,110 ready_for_fw is high
1,481,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,543 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,999 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,547,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,209 UART: [ldev] --
1,586,494 UART: [fwproc] Waiting for Commands...
1,587,233 UART: [fwproc] Received command 0x46574c44
1,588,024 UART: [fwproc] Received Image of size 114360 bytes
2,884,245 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,950 >>> mbox cmd response: success
3,076,950 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,078,122 UART: [afmc] ++
3,078,290 UART: [afmc] CDI.KEYID = 6
3,078,652 UART: [afmc] SUBJECT.KEYID = 7
3,079,077 UART: [afmc] AUTHORITY.KEYID = 5
3,114,518 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,728 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,121 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,811 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,616 UART: [afmc] --
3,157,690 UART: [cold-reset] --
3,158,626 UART: [state] Locking Datavault
3,159,705 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,309 UART: [state] Locking ICCM
3,160,955 UART: [exit] Launching FMC @ 0x40000130
3,166,284 UART:
3,166,300 UART: Running Caliptra FMC ...
3,166,708 UART:
3,166,851 UART: [state] CFI Enabled
3,177,512 UART: [fht] FMC Alias Private Key: 7
3,286,407 UART: [art] Extend RT PCRs Done
3,286,835 UART: [art] Lock RT PCRs Done
3,288,451 UART: [art] Populate DV Done
3,296,670 UART: [fht] FMC Alias Private Key: 7
3,297,814 UART: [art] Derive CDI
3,298,094 UART: [art] Store in in slot 0x4
3,383,995 UART: [art] Derive Key Pair
3,384,355 UART: [art] Store priv key in slot 0x5
3,397,839 UART: [art] Derive Key Pair - Done
3,412,476 UART: [art] Signing Cert with AUTHO
3,412,956 UART: RITY.KEYID = 7
3,428,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,963 UART: [art] PUB.X = 444208CD0B51662EF8992BDDFE9DD4E59033C63452EBE9C861B0FA60EC430E34BE6A0A8C4BEAC62438F84C6722797FB2
3,435,733 UART: [art] PUB.Y = B6F87C8051AE55CF4F66C2E8FE79D43FFFA3488B1C9E5A22D209CAC020347AB1AD9FF41B13B778112EEA65663688534B
3,442,692 UART: [art] SIG.R = 0932FB82FA036A828E8F577F862A100C2BB492EA0B9921869C4E192FBF9F303AF6C2DAAC0B2203BAB9B7C071F67ED411
3,449,456 UART: [art] SIG.S = EC06FFEC46845EFFD9E0F75439287925BF8949BE294864FBBE97F8A98424ED5BAE855E5D0C7C66078211C5D6BEC11B9E
3,472,986 UART: Caliptra RT
3,473,332 UART: [state] CFI Enabled
3,581,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,595,057 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,790 ready_for_fw is high
1,362,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,110 >>> mbox cmd response: success
2,927,110 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,988,934 UART:
2,988,950 UART: Running Caliptra FMC ...
2,989,358 UART:
2,989,501 UART: [state] CFI Enabled
2,999,954 UART: [fht] FMC Alias Private Key: 7
3,108,255 UART: [art] Extend RT PCRs Done
3,108,683 UART: [art] Lock RT PCRs Done
3,110,181 UART: [art] Populate DV Done
3,118,246 UART: [fht] FMC Alias Private Key: 7
3,119,296 UART: [art] Derive CDI
3,119,576 UART: [art] Store in in slot 0x4
3,205,649 UART: [art] Derive Key Pair
3,206,009 UART: [art] Store priv key in slot 0x5
3,219,527 UART: [art] Derive Key Pair - Done
3,234,265 UART: [art] Signing Cert with AUTHO
3,234,745 UART: RITY.KEYID = 7
3,250,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,870 UART: [art] PUB.X = 92DD5443857852D6AD97087AF1FA7F3D372C11FDE3B465834D3EEE4277A6796F83D48B7766F7D25EC65E1FD9A490EEC3
3,257,645 UART: [art] PUB.Y = 38E5400502A1F7C6F28A14DFF085859AD1581C9694CE50A02EB04D88A9A226AC0E168368A35E47257D003A4C52A50B73
3,264,559 UART: [art] SIG.R = 02A5ABBDAF5F03C99C13D29FED27E4B66FA49F21350053BCC5A69C23920924803DE13FE14D31E8893249518781974182
3,271,296 UART: [art] SIG.S = D197BBDED602EA83B7622B332739AF6BEDE2066AB0273CEA8057853B387BC7CC63C515A472AA9E6862A3FF6FD24E2292
3,295,317 UART: Caliptra RT
3,295,663 UART: [state] CFI Enabled
3,403,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,602 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
893,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,221 UART: [kat] ++
897,373 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,026 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,983 UART: [cold-reset] ++
1,172,349 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 ready_for_fw is high
1,176,421 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,670 UART: [idev] Erasing UDS.KEYID = 0
1,201,107 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,152 UART: [ldev] SUBJECT.KEYID = 5
1,211,578 UART: [ldev] AUTHORITY.KEYID = 7
1,212,041 UART: [ldev] FE.KEYID = 1
1,217,099 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,932 >>> mbox cmd response: success
2,772,932 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,773,956 UART: [afmc] ++
2,774,124 UART: [afmc] CDI.KEYID = 6
2,774,486 UART: [afmc] SUBJECT.KEYID = 7
2,774,911 UART: [afmc] AUTHORITY.KEYID = 5
2,810,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,270 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,989 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,975 UART: [afmc] --
2,853,903 UART: [cold-reset] --
2,854,903 UART: [state] Locking Datavault
2,856,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,904 UART: [state] Locking ICCM
2,857,576 UART: [exit] Launching FMC @ 0x40000130
2,862,905 UART:
2,862,921 UART: Running Caliptra FMC ...
2,863,329 UART:
2,863,383 UART: [state] CFI Enabled
2,873,674 UART: [fht] FMC Alias Private Key: 7
2,981,593 UART: [art] Extend RT PCRs Done
2,982,021 UART: [art] Lock RT PCRs Done
2,983,413 UART: [art] Populate DV Done
2,992,020 UART: [fht] FMC Alias Private Key: 7
2,993,172 UART: [art] Derive CDI
2,993,452 UART: [art] Store in in slot 0x4
3,079,611 UART: [art] Derive Key Pair
3,079,971 UART: [art] Store priv key in slot 0x5
3,093,233 UART: [art] Derive Key Pair - Done
3,107,922 UART: [art] Signing Cert with AUTHO
3,108,402 UART: RITY.KEYID = 7
3,123,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,461 UART: [art] PUB.X = 8A9C537FFCA6A438B7FB1D7E6E0C2B055570E46443BACA5755A7E800924BA4C55262B2E73884B5696D31A3D7221F4726
3,131,205 UART: [art] PUB.Y = 611D7EF43FF53DE6E1BC31D30F80E2128D202E7CE4AA6EC7E19E9BA323FB636ACFF7A464932F7C4F0A835039595087E3
3,138,161 UART: [art] SIG.R = 56EE129980F304AC79A485F12FBD8179FF6D83268BF98A0F3DEE97E1668DA25387AE635DA4D9C1538CA37D0DCC4E3210
3,144,932 UART: [art] SIG.S = 5EB66F058E0732E0B7C86EE8D63DF262ECDC0861008E0E3D8DA5ECFEAB2C35FD20951AB2144B30871BE78F6E7ED0EB23
3,168,987 UART: Caliptra RT
3,169,241 UART: [state] CFI Enabled
3,276,343 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,022 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 ready_for_fw is high
1,060,113 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,929 >>> mbox cmd response: success
2,625,929 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,688,367 UART:
2,688,383 UART: Running Caliptra FMC ...
2,688,791 UART:
2,688,845 UART: [state] CFI Enabled
2,699,524 UART: [fht] FMC Alias Private Key: 7
2,807,103 UART: [art] Extend RT PCRs Done
2,807,531 UART: [art] Lock RT PCRs Done
2,809,129 UART: [art] Populate DV Done
2,817,314 UART: [fht] FMC Alias Private Key: 7
2,818,374 UART: [art] Derive CDI
2,818,654 UART: [art] Store in in slot 0x4
2,904,267 UART: [art] Derive Key Pair
2,904,627 UART: [art] Store priv key in slot 0x5
2,917,965 UART: [art] Derive Key Pair - Done
2,932,497 UART: [art] Signing Cert with AUTHO
2,932,977 UART: RITY.KEYID = 7
2,948,213 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,978 UART: [art] PUB.X = EB0B096CDF8B874EDDDE2778DD131B4A9840866A705E3F23DEBF07C1FBC66C8C7C4D8ADAD361B669B7B0A39001A2A5C6
2,955,758 UART: [art] PUB.Y = 0EB39CE3E78E0426D6DDA1D88423E19EBC7064C27EF5D1BF47517419AC19AF2B9BF909B8DE426D7B3FC294393146AE4B
2,962,713 UART: [art] SIG.R = EE483C504940271B357C91EBC48FE6B80E281AC76F0CD5E4896B55696E3EB26173A9DE90FF2B4DCA1CB7556B9E4C3338
2,969,487 UART: [art] SIG.S = 88728EF3344BE020D3E875F78C00CCB30032AF9F012A9DFB82D71BAE87C8DFE216854837598A0FF4F2D8C9E7D5125911
2,993,132 UART: Caliptra RT
2,993,386 UART: [state] CFI Enabled
3,100,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,114,270 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
893,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,646 UART: [kat] ++
897,798 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,679 UART: [kat] SHA2-512-ACC
908,580 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,738 UART: [cold-reset] ++
1,173,202 UART: [fht] FHT @ 0x50003400
1,176,041 UART: [idev] ++
1,176,209 UART: [idev] CDI.KEYID = 6
1,176,569 UART: [idev] SUBJECT.KEYID = 7
1,176,993 UART: [idev] UDS.KEYID = 0
1,177,338 ready_for_fw is high
1,177,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,143 UART: [idev] Erasing UDS.KEYID = 0
1,202,714 UART: [idev] Sha1 KeyId Algorithm
1,211,242 UART: [idev] --
1,212,210 UART: [ldev] ++
1,212,378 UART: [ldev] CDI.KEYID = 6
1,212,741 UART: [ldev] SUBJECT.KEYID = 5
1,213,167 UART: [ldev] AUTHORITY.KEYID = 7
1,213,630 UART: [ldev] FE.KEYID = 1
1,218,840 UART: [ldev] Erasing FE.KEYID = 1
1,245,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,988 UART: [ldev] --
1,284,381 UART: [fwproc] Wait for Commands...
1,285,125 UART: [fwproc] Recv command 0x46574c44
1,285,853 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,989 >>> mbox cmd response: success
2,773,989 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,775,057 UART: [afmc] ++
2,775,225 UART: [afmc] CDI.KEYID = 6
2,775,587 UART: [afmc] SUBJECT.KEYID = 7
2,776,012 UART: [afmc] AUTHORITY.KEYID = 5
2,811,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,935 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,654 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,566 UART: [afmc] --
2,854,628 UART: [cold-reset] --
2,855,518 UART: [state] Locking Datavault
2,856,397 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,001 UART: [state] Locking ICCM
2,857,613 UART: [exit] Launching FMC @ 0x40000130
2,862,942 UART:
2,862,958 UART: Running Caliptra FMC ...
2,863,366 UART:
2,863,509 UART: [state] CFI Enabled
2,874,112 UART: [fht] FMC Alias Private Key: 7
2,981,555 UART: [art] Extend RT PCRs Done
2,981,983 UART: [art] Lock RT PCRs Done
2,983,525 UART: [art] Populate DV Done
2,991,890 UART: [fht] FMC Alias Private Key: 7
2,992,832 UART: [art] Derive CDI
2,993,112 UART: [art] Store in in slot 0x4
3,078,681 UART: [art] Derive Key Pair
3,079,041 UART: [art] Store priv key in slot 0x5
3,092,353 UART: [art] Derive Key Pair - Done
3,106,967 UART: [art] Signing Cert with AUTHO
3,107,447 UART: RITY.KEYID = 7
3,122,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,548 UART: [art] PUB.X = EFBDCD3BE3649637AFF7E90E37F90442A66A1726C24185C1BCA30B4912CF96A26EB00C6D84D51E4A7B9B2D8D15C115D5
3,130,320 UART: [art] PUB.Y = 91216D28D0D5F2BFDBF466F382BEA4D70DF4AA9F12DDE73277AFE94692EBE0DF0456C86348C407635407F3880BDA5643
3,137,265 UART: [art] SIG.R = 9BFE7795DCA0C6BFC6A57E165E9E15B8E91A4FA80031491F8E9531E556E1E284FAD95147639177DCB1C97247EB69E7A7
3,144,021 UART: [art] SIG.S = A511E6E0F907DD489AD230E9DBC5017382E86228C47D92C224B92C38CB1AAC42DC70AE52B5CF4C694C56E76A81835583
3,167,884 UART: Caliptra RT
3,168,230 UART: [state] CFI Enabled
3,276,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,534 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,844 ready_for_fw is high
1,060,844 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,602 >>> mbox cmd response: success
2,627,602 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,690,294 UART:
2,690,310 UART: Running Caliptra FMC ...
2,690,718 UART:
2,690,861 UART: [state] CFI Enabled
2,701,806 UART: [fht] FMC Alias Private Key: 7
2,810,107 UART: [art] Extend RT PCRs Done
2,810,535 UART: [art] Lock RT PCRs Done
2,812,125 UART: [art] Populate DV Done
2,820,222 UART: [fht] FMC Alias Private Key: 7
2,821,204 UART: [art] Derive CDI
2,821,484 UART: [art] Store in in slot 0x4
2,907,321 UART: [art] Derive Key Pair
2,907,681 UART: [art] Store priv key in slot 0x5
2,921,113 UART: [art] Derive Key Pair - Done
2,936,128 UART: [art] Signing Cert with AUTHO
2,936,608 UART: RITY.KEYID = 7
2,952,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,187 UART: [art] PUB.X = 7817807D85186C80B3727C5F2BB7E135DAA16B764CB681529414CD0A57E3965493D259395D1C046D5CCBFF5686C9D4BB
2,959,951 UART: [art] PUB.Y = 986E8B4FCA8AADCD63A21DE7A6C830D4F29F05B92EEF382139C660D88B138E96D45BCDF0CD2122C37ECBC813AE58A091
2,966,918 UART: [art] SIG.R = F727E58FEC04BC44C73DFC43BB07DCD6C5D3D3A9A694312B40BBAB64833DC8A3AA3C622BB29868ECB5D453DEDF1FE1CB
2,973,712 UART: [art] SIG.S = 4BA5E9A10123BF2E1D03CC90E23CDD5E2437E15549923E9520ED2390A2CC03E27CFAF8C0B6C6015834691303262BC304
2,997,741 UART: Caliptra RT
2,998,087 UART: [state] CFI Enabled
3,105,089 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,118,932 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,402 UART: [kat] HMAC-384Kdf
919,936 UART: [kat] LMS
1,168,248 UART: [kat] --
1,169,003 UART: [cold-reset] ++
1,169,423 UART: [fht] FHT @ 0x50003400
1,172,089 UART: [idev] ++
1,172,257 UART: [idev] CDI.KEYID = 6
1,172,618 UART: [idev] SUBJECT.KEYID = 7
1,173,043 UART: [idev] UDS.KEYID = 0
1,173,389 ready_for_fw is high
1,173,389 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,369 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,207,952 UART: [ldev] ++
1,208,120 UART: [ldev] CDI.KEYID = 6
1,208,484 UART: [ldev] SUBJECT.KEYID = 5
1,208,911 UART: [ldev] AUTHORITY.KEYID = 7
1,209,374 UART: [ldev] FE.KEYID = 1
1,214,368 UART: [ldev] Erasing FE.KEYID = 1
1,240,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,320 UART: [ldev] --
1,279,606 UART: [fwproc] Wait for Commands...
1,280,397 UART: [fwproc] Recv command 0x46574c44
1,281,130 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,072 >>> mbox cmd response: success
2,770,072 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,771,117 UART: [afmc] ++
2,771,285 UART: [afmc] CDI.KEYID = 6
2,771,648 UART: [afmc] SUBJECT.KEYID = 7
2,772,074 UART: [afmc] AUTHORITY.KEYID = 5
2,806,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,662 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,381 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,132 UART: [afmc] --
2,850,160 UART: [cold-reset] --
2,850,998 UART: [state] Locking Datavault
2,852,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,997 UART: [state] Locking ICCM
2,853,627 UART: [exit] Launching FMC @ 0x40000130
2,858,956 UART:
2,858,972 UART: Running Caliptra FMC ...
2,859,380 UART:
2,859,434 UART: [state] CFI Enabled
2,869,991 UART: [fht] FMC Alias Private Key: 7
2,977,898 UART: [art] Extend RT PCRs Done
2,978,326 UART: [art] Lock RT PCRs Done
2,979,968 UART: [art] Populate DV Done
2,988,175 UART: [fht] FMC Alias Private Key: 7
2,989,191 UART: [art] Derive CDI
2,989,471 UART: [art] Store in in slot 0x4
3,074,934 UART: [art] Derive Key Pair
3,075,294 UART: [art] Store priv key in slot 0x5
3,087,980 UART: [art] Derive Key Pair - Done
3,102,630 UART: [art] Signing Cert with AUTHO
3,103,110 UART: RITY.KEYID = 7
3,118,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,437 UART: [art] PUB.X = 797B4132A51F6A455B541E009AF24DA4022B5609F6A3FD6BA4928A1AADCCA29C3DC7231297B59A112828D84369AC74A9
3,126,183 UART: [art] PUB.Y = A67A86B8C18676738B6D593D01A3B0CB203019B40074D916CAABA7B70F3C096E9B7CE9929D0A3DA7B2806CB6E148B7B5
3,133,107 UART: [art] SIG.R = 4EC429183177B3334A3FD73E3365C701946DD7D482937466D70E2970F9375F941E48AD375D39FDDFBA2D9434333F7583
3,139,863 UART: [art] SIG.S = FB41C0BD62D7C46F00C526A44C1B99E86A56ABDFE6AF465144377BD120C81C14F7D60C6271FE85EC1D3011ADBDBBE3DF
3,163,423 UART: Caliptra RT
3,163,677 UART: [state] CFI Enabled
3,271,711 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,260 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,668 >>> mbox cmd response: success
2,621,668 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,138 UART:
2,684,154 UART: Running Caliptra FMC ...
2,684,562 UART:
2,684,616 UART: [state] CFI Enabled
2,695,127 UART: [fht] FMC Alias Private Key: 7
2,803,184 UART: [art] Extend RT PCRs Done
2,803,612 UART: [art] Lock RT PCRs Done
2,804,856 UART: [art] Populate DV Done
2,813,353 UART: [fht] FMC Alias Private Key: 7
2,814,475 UART: [art] Derive CDI
2,814,755 UART: [art] Store in in slot 0x4
2,900,388 UART: [art] Derive Key Pair
2,900,748 UART: [art] Store priv key in slot 0x5
2,914,010 UART: [art] Derive Key Pair - Done
2,928,475 UART: [art] Signing Cert with AUTHO
2,928,955 UART: RITY.KEYID = 7
2,944,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,034 UART: [art] PUB.X = 662BA9B9FD1506A5E8EBCD4CB2C3CF47FA3646EFAC4BEF7F1DABCE4690C1DEA97369C735D2D484D42D3E72881FDDB534
2,951,829 UART: [art] PUB.Y = 5F93E6EF87F59B47BCF376CA60528EF6B85981970F72DDB8590D12F8E7358C73FF3E8C0B921817064718DE382A41982D
2,958,767 UART: [art] SIG.R = 84AFE40F155291EAABCC6EEF1D3A323F02D752EA747F5D04C32C69CE9FA807E3B3E12CC30081C8AF96C67619120C1256
2,965,512 UART: [art] SIG.S = 3AD4398FB02509EFE19197F44FAE97AF1F37087BBB051E5B8C2C94C8256E086C4B504BD7B41BA3A975D1721E592828E5
2,989,823 UART: Caliptra RT
2,990,077 UART: [state] CFI Enabled
3,097,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,111,364 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,848 UART: [kat] ++
896,000 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,732 UART: [cold-reset] ++
1,171,090 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 ready_for_fw is high
1,174,844 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,781 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,668 UART: [fwproc] Recv command 0x46574c44
1,282,401 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,049 >>> mbox cmd response: success
2,772,049 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,773,206 UART: [afmc] ++
2,773,374 UART: [afmc] CDI.KEYID = 6
2,773,737 UART: [afmc] SUBJECT.KEYID = 7
2,774,163 UART: [afmc] AUTHORITY.KEYID = 5
2,809,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,772 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,457 UART: [afmc] --
2,853,493 UART: [cold-reset] --
2,854,339 UART: [state] Locking Datavault
2,855,482 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,086 UART: [state] Locking ICCM
2,856,672 UART: [exit] Launching FMC @ 0x40000130
2,862,001 UART:
2,862,017 UART: Running Caliptra FMC ...
2,862,425 UART:
2,862,568 UART: [state] CFI Enabled
2,873,115 UART: [fht] FMC Alias Private Key: 7
2,980,536 UART: [art] Extend RT PCRs Done
2,980,964 UART: [art] Lock RT PCRs Done
2,982,516 UART: [art] Populate DV Done
2,990,567 UART: [fht] FMC Alias Private Key: 7
2,991,649 UART: [art] Derive CDI
2,991,929 UART: [art] Store in in slot 0x4
3,077,708 UART: [art] Derive Key Pair
3,078,068 UART: [art] Store priv key in slot 0x5
3,091,560 UART: [art] Derive Key Pair - Done
3,106,218 UART: [art] Signing Cert with AUTHO
3,106,698 UART: RITY.KEYID = 7
3,122,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,201 UART: [art] PUB.X = 16DC3F2A5F213C65946A98AA691674B7BEF6ED2E264867F17B4951F4304B9A48E80D1AF7CBF5EAE11230B05D2FF4B19D
3,129,980 UART: [art] PUB.Y = C87E54ECF1B307A4E6C538B4812631031A948672607EAC84C3C4990AECC5230B68B2BA212BB44A3D8B0D86906C44EF2B
3,136,921 UART: [art] SIG.R = F41969EDE64263AD75B70C801F63C762872651C2830DDCD076724DB75A2E1C86B4769379FAFCF781137D2BBC5CDDC3D1
3,143,693 UART: [art] SIG.S = 02DE9494AF514E6B7DB6F99377007B7E796660F6DF6C656154FDE9F8110838C069D5A402369184CBB16D19482171BD44
3,167,303 UART: Caliptra RT
3,167,649 UART: [state] CFI Enabled
3,275,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,032 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,093 ready_for_fw is high
1,056,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,983 >>> mbox cmd response: success
2,622,983 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,967 UART:
2,684,983 UART: Running Caliptra FMC ...
2,685,391 UART:
2,685,534 UART: [state] CFI Enabled
2,696,451 UART: [fht] FMC Alias Private Key: 7
2,804,630 UART: [art] Extend RT PCRs Done
2,805,058 UART: [art] Lock RT PCRs Done
2,806,538 UART: [art] Populate DV Done
2,814,815 UART: [fht] FMC Alias Private Key: 7
2,815,989 UART: [art] Derive CDI
2,816,269 UART: [art] Store in in slot 0x4
2,901,826 UART: [art] Derive Key Pair
2,902,186 UART: [art] Store priv key in slot 0x5
2,915,314 UART: [art] Derive Key Pair - Done
2,929,791 UART: [art] Signing Cert with AUTHO
2,930,271 UART: RITY.KEYID = 7
2,945,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,060 UART: [art] PUB.X = 8C1028341A1A01FA772087BFA7AE2CE156F0963B54F9A78D6B8B4E1F189DD63704C4504E5F92073AA538DAC282DEDDF4
2,952,831 UART: [art] PUB.Y = 73D25758F85F006640226574C66AF5E66100C386A37A68EAB8204E95A3EA38540DDFC3599894A02FD62C8101C16D54B2
2,959,725 UART: [art] SIG.R = 70A218201EB9DC71A2A8B30F8F06D70975CA582943FD02FA08AC84782262ABAB2C2119D0CACAF54DD4B6131188653FEB
2,966,490 UART: [art] SIG.S = 670E119EDB6E06C968B4A4703B6443D93D9D3C54575088459EC463C45224E3069C8DD958CE362292DC8EAB3DB44E99BC
2,990,688 UART: Caliptra RT
2,991,034 UART: [state] CFI Enabled
3,099,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,779 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,351 UART:
192,752 UART: Running Caliptra ROM ...
193,952 UART:
194,103 UART: [state] CFI Enabled
268,183 UART: [state] LifecycleState = Unprovisioned
270,175 UART: [state] DebugLocked = No
272,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,341 UART: [kat] SHA2-256
448,081 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,594 UART: [kat] ++
459,075 UART: [kat] sha1
469,379 UART: [kat] SHA2-256
472,097 UART: [kat] SHA2-384
477,796 UART: [kat] SHA2-512-ACC
480,160 UART: [kat] ECC-384
2,767,818 UART: [kat] HMAC-384Kdf
2,780,407 UART: [kat] LMS
3,970,709 UART: [kat] --
3,975,483 UART: [cold-reset] ++
3,978,113 UART: [fht] Storing FHT @ 0x50003400
3,989,231 UART: [idev] ++
3,989,784 UART: [idev] CDI.KEYID = 6
3,990,724 UART: [idev] SUBJECT.KEYID = 7
3,991,953 UART: [idev] UDS.KEYID = 0
3,992,992 ready_for_fw is high
3,993,189 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,604 UART: [idev] Erasing UDS.KEYID = 0
7,325,556 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,237 UART: [idev] --
7,350,147 UART: [ldev] ++
7,350,715 UART: [ldev] CDI.KEYID = 6
7,351,671 UART: [ldev] SUBJECT.KEYID = 5
7,352,874 UART: [ldev] AUTHORITY.KEYID = 7
7,354,168 UART: [ldev] FE.KEYID = 1
7,401,605 UART: [ldev] Erasing FE.KEYID = 1
10,732,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,681 UART: [ldev] --
13,119,314 UART: [fwproc] Waiting for Commands...
13,122,424 UART: [fwproc] Received command 0x46574c44
13,124,600 UART: [fwproc] Received Image of size 114036 bytes
17,171,679 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,969 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,637,392 >>> mbox cmd response: success
17,641,643 UART: [afmc] ++
17,642,258 UART: [afmc] CDI.KEYID = 6
17,643,174 UART: [afmc] SUBJECT.KEYID = 7
17,644,384 UART: [afmc] AUTHORITY.KEYID = 5
21,007,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,439 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,713 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,112 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,933 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,366 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,386 UART: [afmc] --
23,376,535 UART: [cold-reset] --
23,380,993 UART: [state] Locking Datavault
23,385,372 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,066 UART: [state] Locking ICCM
23,389,426 UART: [exit] Launching FMC @ 0x40000130
23,397,819 UART:
23,398,066 UART: Running Caliptra FMC ...
23,399,168 UART:
23,399,329 UART: [state] CFI Enabled
23,465,965 UART: [fht] FMC Alias Private Key: 7
25,804,473 UART: [art] Extend RT PCRs Done
25,805,695 UART: [art] Lock RT PCRs Done
25,807,555 UART: [art] Populate DV Done
25,813,119 UART: [fht] FMC Alias Private Key: 7
25,814,700 UART: [art] Derive CDI
25,815,426 UART: [art] Store in in slot 0x4
25,873,909 UART: [art] Derive Key Pair
25,874,940 UART: [art] Store priv key in slot 0x5
29,167,711 UART: [art] Derive Key Pair - Done
29,180,538 UART: [art] Signing Cert with AUTHO
29,181,835 UART: RITY.KEYID = 7
31,468,940 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,456 UART: [art] PUB.X = 40129A31E388FD75016B10204D96A157D8EFD523D3C3943B489FE7BE2473DDFEEF32AA2008167582E23F802A5B0482B0
31,477,672 UART: [art] PUB.Y = D01F63455378061518FD04A4DADF4956DCF5D0324532DA213BBCF0BF3C8A30D8AF44B6911B4D189A6AD7354563277CB4
31,484,928 UART: [art] SIG.R = 845B368981EF71E103511A693332A73A73C39E986164559359C60FD1E1AB9BE7BBF7267422681D05D12F3F8AE4FE7A17
31,492,281 UART: [art] SIG.S = 3D2761B9C8E196F1B7D07520745CE6972A7B7EB8880B8AC1E52EEBE262875BD73875DC701595BB4145290B68989DE1EB
32,797,641 UART: Caliptra RT
32,798,335 UART: [state] CFI Enabled
32,957,931 UART: [rt] RT listening for mailbox commands...
32,960,778 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,992,371 UART: [rt]cmd =0x53494756, len=196
34,284,362 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,786,545 ready_for_fw is high
3,787,109 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,114 >>> mbox cmd response: success
23,569,376 UART:
23,569,777 UART: Running Caliptra FMC ...
23,570,911 UART:
23,571,065 UART: [state] CFI Enabled
23,637,168 UART: [fht] FMC Alias Private Key: 7
25,975,003 UART: [art] Extend RT PCRs Done
25,976,232 UART: [art] Lock RT PCRs Done
25,978,023 UART: [art] Populate DV Done
25,983,611 UART: [fht] FMC Alias Private Key: 7
25,985,180 UART: [art] Derive CDI
25,985,995 UART: [art] Store in in slot 0x4
26,048,460 UART: [art] Derive Key Pair
26,049,505 UART: [art] Store priv key in slot 0x5
29,342,391 UART: [art] Derive Key Pair - Done
29,355,389 UART: [art] Signing Cert with AUTHO
29,356,689 UART: RITY.KEYID = 7
31,643,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,100 UART: [art] PUB.X = E285B962185EF8D04C04E1C27F305C04DE2AB9883DEB70E760F81DFC504EC6C3D3295206FC9162DABD3AABAAC6003F9A
31,652,341 UART: [art] PUB.Y = 0A05B4957F757FBF82DABCDD2C3C2C5539A8D57A74CBF97D57BCADA6225143951C0017F4340C99517CBB3DBECC51F9CA
31,659,594 UART: [art] SIG.R = EE92FCB804C2D612999FCD70D2C122D3A8117457D13126BBEEFD5E32708A08A1546FB940B2D9699AC53198DDAFFA207C
31,667,015 UART: [art] SIG.S = 37622CDFFAEB924A42A7B09CC43BC396E8B55B39D1E15155BDADD153DEFE8409626AB5911A9ADD8A23566D3715137891
32,972,710 UART: Caliptra RT
32,973,423 UART: [state] CFI Enabled
33,134,445 UART: [rt] RT listening for mailbox commands...
33,137,238 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,168,751 UART: [rt]cmd =0x53494756, len=196
34,460,457 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,464 UART:
192,813 UART: Running Caliptra ROM ...
193,960 UART:
603,664 UART: [state] CFI Enabled
619,548 UART: [state] LifecycleState = Unprovisioned
621,457 UART: [state] DebugLocked = No
622,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,281 UART: [kat] SHA2-256
796,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,588 UART: [kat] ++
808,054 UART: [kat] sha1
819,645 UART: [kat] SHA2-256
822,308 UART: [kat] SHA2-384
828,652 UART: [kat] SHA2-512-ACC
831,016 UART: [kat] ECC-384
3,113,792 UART: [kat] HMAC-384Kdf
3,125,381 UART: [kat] LMS
4,315,503 UART: [kat] --
4,319,445 UART: [cold-reset] ++
4,321,377 UART: [fht] Storing FHT @ 0x50003400
4,331,864 UART: [idev] ++
4,332,431 UART: [idev] CDI.KEYID = 6
4,333,460 UART: [idev] SUBJECT.KEYID = 7
4,334,632 UART: [idev] UDS.KEYID = 0
4,335,611 ready_for_fw is high
4,335,811 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,230 UART: [idev] Erasing UDS.KEYID = 0
7,624,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,958 UART: [idev] --
7,650,534 UART: [ldev] ++
7,651,100 UART: [ldev] CDI.KEYID = 6
7,652,067 UART: [ldev] SUBJECT.KEYID = 5
7,654,243 UART: [ldev] AUTHORITY.KEYID = 7
7,655,472 UART: [ldev] FE.KEYID = 1
7,665,158 UART: [ldev] Erasing FE.KEYID = 1
10,956,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,776 UART: [ldev] --
13,315,138 UART: [fwproc] Waiting for Commands...
13,318,488 UART: [fwproc] Received command 0x46574c44
13,320,678 UART: [fwproc] Received Image of size 114036 bytes
17,366,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,026 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,826,889 >>> mbox cmd response: success
17,830,826 UART: [afmc] ++
17,831,421 UART: [afmc] CDI.KEYID = 6
17,832,330 UART: [afmc] SUBJECT.KEYID = 7
17,833,545 UART: [afmc] AUTHORITY.KEYID = 5
21,150,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,415 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,784 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,626 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,035 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,132 UART: [afmc] --
23,515,691 UART: [cold-reset] --
23,519,178 UART: [state] Locking Datavault
23,523,887 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,638 UART: [state] Locking ICCM
23,527,141 UART: [exit] Launching FMC @ 0x40000130
23,535,538 UART:
23,535,777 UART: Running Caliptra FMC ...
23,536,881 UART:
23,537,043 UART: [state] CFI Enabled
23,545,199 UART: [fht] FMC Alias Private Key: 7
25,876,247 UART: [art] Extend RT PCRs Done
25,877,460 UART: [art] Lock RT PCRs Done
25,879,241 UART: [art] Populate DV Done
25,884,507 UART: [fht] FMC Alias Private Key: 7
25,886,210 UART: [art] Derive CDI
25,886,968 UART: [art] Store in in slot 0x4
25,929,728 UART: [art] Derive Key Pair
25,930,763 UART: [art] Store priv key in slot 0x5
29,173,585 UART: [art] Derive Key Pair - Done
29,186,485 UART: [art] Signing Cert with AUTHO
29,187,789 UART: RITY.KEYID = 7
31,467,868 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,619 UART: [art] PUB.X = 3E6B0CF1CE43571E37F8F1815AD435ECFD247CF293B49FC47D0A6056F049DECF27256BBB02D15D14854A1FC827FBD246
31,476,646 UART: [art] PUB.Y = 0F9F150E42AE8A97ECBA17DC37270BB2C8E017401A8B13658B6FBE2F97585A064DD9A05A44AA379F22B12EAB021EC7CD
31,483,923 UART: [art] SIG.R = 891C3A9829FB03B7081F2F3F68952C9125F8FBA26CD7EE3AF7F82B6A0256E88456EE4BBA8D65C7600208CFF4FF8B0E6E
31,491,298 UART: [art] SIG.S = C9CB395A74F643CA03A4A6280D4C6E4E6E0580622BB7844366C93B5A857ADC3F24037664BEE5986712C8E17847D8CA9E
32,796,125 UART: Caliptra RT
32,796,837 UART: [state] CFI Enabled
32,914,670 UART: [rt] RT listening for mailbox commands...
32,917,563 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,949,283 UART: [rt]cmd =0x53494756, len=196
34,241,622 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
4,128,198 ready_for_fw is high
4,128,765 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,063,388 >>> mbox cmd response: success
23,706,097 UART:
23,706,509 UART: Running Caliptra FMC ...
23,707,641 UART:
23,707,796 UART: [state] CFI Enabled
23,716,071 UART: [fht] FMC Alias Private Key: 7
26,047,046 UART: [art] Extend RT PCRs Done
26,048,276 UART: [art] Lock RT PCRs Done
26,049,988 UART: [art] Populate DV Done
26,055,480 UART: [fht] FMC Alias Private Key: 7
26,057,138 UART: [art] Derive CDI
26,057,966 UART: [art] Store in in slot 0x4
26,100,956 UART: [art] Derive Key Pair
26,102,002 UART: [art] Store priv key in slot 0x5
29,343,761 UART: [art] Derive Key Pair - Done
29,356,993 UART: [art] Signing Cert with AUTHO
29,358,300 UART: RITY.KEYID = 7
31,637,983 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,488 UART: [art] PUB.X = 3FCACD43F1325FD7297FE65695F1C1907531EFE84CEA7557A9CED74A7A912CC83A868F68636696C70FB892C13D899F95
31,646,731 UART: [art] PUB.Y = 4775E7122F9A3E13E65FCA64F9396BE1F69CF880B5D7651DAD41CEFD7119CC809A621B1F2C0AF2B6E520A1B77DE0B3E6
31,654,001 UART: [art] SIG.R = EDB5641B5542CF76AB0502C5F89B54CAC993DE267FB628074255120FCB046A0388E29C69EB981415B0DF282950413681
31,661,324 UART: [art] SIG.S = 0D51F950CB4977260FFF7335F0D610BF1EBA6C5D7FED8EE64763314F920E2D30D4DF47D82F3340B6C0C4580EA63BD711
32,966,438 UART: Caliptra RT
32,967,163 UART: [state] CFI Enabled
33,084,667 UART: [rt] RT listening for mailbox commands...
33,087,505 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,119,344 UART: [rt]cmd =0x53494756, len=196
34,411,495 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,437 UART:
192,814 UART: Running Caliptra ROM ...
194,008 UART:
194,170 UART: [state] CFI Enabled
264,979 UART: [state] LifecycleState = Unprovisioned
266,878 UART: [state] DebugLocked = No
269,692 UART: [state] WD Timer not started. Device not locked for debugging
273,368 UART: [kat] SHA2-256
452,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,088 UART: [kat] ++
464,624 UART: [kat] sha1
475,934 UART: [kat] SHA2-256
479,004 UART: [kat] SHA2-384
485,439 UART: [kat] SHA2-512-ACC
488,385 UART: [kat] ECC-384
2,949,035 UART: [kat] HMAC-384Kdf
2,971,253 UART: [kat] LMS
3,500,673 UART: [kat] --
3,505,100 UART: [cold-reset] ++
3,507,111 UART: [fht] FHT @ 0x50003400
3,518,232 UART: [idev] ++
3,518,799 UART: [idev] CDI.KEYID = 6
3,519,831 UART: [idev] SUBJECT.KEYID = 7
3,520,934 UART: [idev] UDS.KEYID = 0
3,521,864 ready_for_fw is high
3,522,076 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,982 UART: [idev] Erasing UDS.KEYID = 0
6,026,817 UART: [idev] Sha1 KeyId Algorithm
6,050,329 UART: [idev] --
6,054,268 UART: [ldev] ++
6,054,854 UART: [ldev] CDI.KEYID = 6
6,055,773 UART: [ldev] SUBJECT.KEYID = 5
6,056,935 UART: [ldev] AUTHORITY.KEYID = 7
6,058,172 UART: [ldev] FE.KEYID = 1
6,101,382 UART: [ldev] Erasing FE.KEYID = 1
8,603,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,572 UART: [ldev] --
10,412,914 UART: [fwproc] Wait for Commands...
10,415,062 UART: [fwproc] Recv command 0x46574c44
10,417,099 UART: [fwproc] Recv'd Img size: 114360 bytes
13,826,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,288,410 >>> mbox cmd response: success
14,292,340 UART: [afmc] ++
14,292,978 UART: [afmc] CDI.KEYID = 6
14,293,872 UART: [afmc] SUBJECT.KEYID = 7
14,294,976 UART: [afmc] AUTHORITY.KEYID = 5
16,825,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,530 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,401 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,360 UART: [afmc] --
18,627,653 UART: [cold-reset] --
18,632,326 UART: [state] Locking Datavault
18,639,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,707 UART: [state] Locking ICCM
18,642,644 UART: [exit] Launching FMC @ 0x40000130
18,651,101 UART:
18,651,338 UART: Running Caliptra FMC ...
18,652,443 UART:
18,652,603 UART: [state] CFI Enabled
18,710,596 UART: [fht] FMC Alias Private Key: 7
20,474,970 UART: [art] Extend RT PCRs Done
20,476,179 UART: [art] Lock RT PCRs Done
20,477,584 UART: [art] Populate DV Done
20,482,887 UART: [fht] FMC Alias Private Key: 7
20,484,533 UART: [art] Derive CDI
20,485,350 UART: [art] Store in in slot 0x4
20,543,746 UART: [art] Derive Key Pair
20,544,810 UART: [art] Store priv key in slot 0x5
23,007,627 UART: [art] Derive Key Pair - Done
23,020,679 UART: [art] Signing Cert with AUTHO
23,022,013 UART: RITY.KEYID = 7
24,733,145 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,645 UART: [art] PUB.X = 1C882266DB279F177FC7F5D9E29AE8E997EC3F9919C6677E6EC5479FB74CA61BD64EC71DEE83807484286A6E20BF4F0B
24,741,914 UART: [art] PUB.Y = 50CA30C944294D6ED2492F53C781D03787A39F3C697A378A9E79B4A57E001267C8F25E7A9565D81DB5636BEE03FF958A
24,749,179 UART: [art] SIG.R = 136EEA06E706957F2C669EB447C9BE2D25A1FF117F3A8E200D05215A3119DB4742FDA81B8D731640E90F90C4FA3E1E0C
24,756,545 UART: [art] SIG.S = 65624EEBA7BE488A3FA1AD0266BADB4BBC433EC684D5BE511E5DEC6315675309465E17E31471A7AA7C8E6FC5D94984B4
25,736,028 UART: Caliptra RT
25,736,731 UART: [state] CFI Enabled
25,901,680 UART: [rt] RT listening for mailbox commands...
25,904,438 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,936,059 UART: [rt]cmd =0x53494756, len=196
26,901,695 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,433 UART:
192,803 UART: Running Caliptra ROM ...
193,897 UART:
194,041 UART: [state] CFI Enabled
263,699 UART: [state] LifecycleState = Unprovisioned
266,071 UART: [state] DebugLocked = No
268,024 UART: [state] WD Timer not started. Device not locked for debugging
272,095 UART: [kat] SHA2-256
461,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,739 UART: [kat] ++
473,190 UART: [kat] sha1
483,370 UART: [kat] SHA2-256
486,383 UART: [kat] SHA2-384
491,882 UART: [kat] SHA2-512-ACC
494,466 UART: [kat] ECC-384
2,949,677 UART: [kat] HMAC-384Kdf
2,964,903 UART: [kat] LMS
3,496,695 UART: [kat] --
3,499,443 UART: [cold-reset] ++
3,501,735 UART: [fht] FHT @ 0x50003400
3,513,494 UART: [idev] ++
3,514,197 UART: [idev] CDI.KEYID = 6
3,515,074 UART: [idev] SUBJECT.KEYID = 7
3,516,318 UART: [idev] UDS.KEYID = 0
3,517,220 ready_for_fw is high
3,517,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,661,370 UART: [idev] Erasing UDS.KEYID = 0
6,023,238 UART: [idev] Sha1 KeyId Algorithm
6,046,090 UART: [idev] --
6,051,473 UART: [ldev] ++
6,052,162 UART: [ldev] CDI.KEYID = 6
6,053,051 UART: [ldev] SUBJECT.KEYID = 5
6,054,268 UART: [ldev] AUTHORITY.KEYID = 7
6,055,451 UART: [ldev] FE.KEYID = 1
6,094,216 UART: [ldev] Erasing FE.KEYID = 1
8,598,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,070 UART: [ldev] --
10,403,775 UART: [fwproc] Wait for Commands...
10,406,623 UART: [fwproc] Recv command 0x46574c44
10,408,950 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,596,473 >>> mbox cmd response: success
14,599,959 UART: [afmc] ++
14,600,674 UART: [afmc] CDI.KEYID = 6
14,601,872 UART: [afmc] SUBJECT.KEYID = 7
14,603,309 UART: [afmc] AUTHORITY.KEYID = 5
17,143,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,865,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,867,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,882,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,897,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,912,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,936,615 UART: [afmc] --
18,940,295 UART: [cold-reset] --
18,944,705 UART: [state] Locking Datavault
18,950,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,821 UART: [state] Locking ICCM
18,954,219 UART: [exit] Launching FMC @ 0x40000130
18,962,904 UART:
18,963,138 UART: Running Caliptra FMC ...
18,964,244 UART:
18,964,405 UART: [state] CFI Enabled
19,022,554 UART: [fht] FMC Alias Private Key: 7
20,786,820 UART: [art] Extend RT PCRs Done
20,788,037 UART: [art] Lock RT PCRs Done
20,790,096 UART: [art] Populate DV Done
20,795,562 UART: [fht] FMC Alias Private Key: 7
20,797,261 UART: [art] Derive CDI
20,798,084 UART: [art] Store in in slot 0x4
20,855,625 UART: [art] Derive Key Pair
20,856,666 UART: [art] Store priv key in slot 0x5
23,319,426 UART: [art] Derive Key Pair - Done
23,332,687 UART: [art] Signing Cert with AUTHO
23,333,988 UART: RITY.KEYID = 7
25,045,702 UART: [art] Erasing AUTHORITY.KEYID = 7
25,047,227 UART: [art] PUB.X = 1F5FE45990F78BB22F0E62443CD13EA62536F4999FAFFF3478CCFFD18196DFD653D73D33F21C4AEA79D0AF3CF5D8B6A8
25,054,514 UART: [art] PUB.Y = 08B590E3ADBBBBA1B0A49C2589784A89E08282A8EA3BD6D1E18C8D2D1312CCEA9AF64E334BC8595D03ADD6DFFA6C7208
25,061,842 UART: [art] SIG.R = 50B152C1CC64B5310D9A8EE5A14AB4F1672574F87D08A4FA3B42119FF2A4D495F98ED6AC18EA7BC132A76E576A36F286
25,069,262 UART: [art] SIG.S = F2018A0CA4296CF19B034C2C1F4DE9EE815E87874941188DDE8EF0D632490766C8B8AFB41987759AA9844CEB8B0251B3
26,048,317 UART: Caliptra RT
26,049,006 UART: [state] CFI Enabled
26,214,222 UART: [rt] RT listening for mailbox commands...
26,217,026 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,248,449 UART: [rt]cmd =0x53494756, len=196
27,214,175 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,439,023 ready_for_fw is high
3,439,425 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,741,487 >>> mbox cmd response: success
19,026,188 UART:
19,026,588 UART: Running Caliptra FMC ...
19,027,700 UART:
19,027,856 UART: [state] CFI Enabled
19,095,497 UART: [fht] FMC Alias Private Key: 7
20,859,680 UART: [art] Extend RT PCRs Done
20,860,908 UART: [art] Lock RT PCRs Done
20,862,648 UART: [art] Populate DV Done
20,867,956 UART: [fht] FMC Alias Private Key: 7
20,869,551 UART: [art] Derive CDI
20,870,371 UART: [art] Store in in slot 0x4
20,928,649 UART: [art] Derive Key Pair
20,929,678 UART: [art] Store priv key in slot 0x5
23,393,231 UART: [art] Derive Key Pair - Done
23,406,028 UART: [art] Signing Cert with AUTHO
23,407,334 UART: RITY.KEYID = 7
25,118,392 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,906 UART: [art] PUB.X = 94D4D91DF4F09D53AAD21AB25CF6B1AAB65E84432001A3990E7D8EDEE7D208E06A43759163131DBE9687EA271415AD66
25,127,130 UART: [art] PUB.Y = 834F876CD84CFFEEAECE3B8F7A6438A43D14E8B1DAB4E07EF53C3366BF684BD7B19842B636327A77EFE7ACB6B81CD0C5
25,134,409 UART: [art] SIG.R = 166A9C8EDEE32F7D68CDC1ADBCE66D354E54DFE492EA505A2EE708AA074D414DC79D907056A5682548401C623222475D
25,141,844 UART: [art] SIG.S = 6A3C34A9EA14F85859EFADA68B4DC20D2BE7083E3570C14F60AF5B1BA5CEE7B2CE1C7D156A4C247B10501D7DEACDD090
26,120,945 UART: Caliptra RT
26,121,652 UART: [state] CFI Enabled
26,285,802 UART: [rt] RT listening for mailbox commands...
26,288,632 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,320,432 UART: [rt]cmd =0x53494756, len=196
27,285,785 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,457 UART:
192,820 UART: Running Caliptra ROM ...
193,923 UART:
603,537 UART: [state] CFI Enabled
617,421 UART: [state] LifecycleState = Unprovisioned
619,798 UART: [state] DebugLocked = No
621,246 UART: [state] WD Timer not started. Device not locked for debugging
624,917 UART: [kat] SHA2-256
814,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,366 UART: [kat] ++
825,884 UART: [kat] sha1
837,387 UART: [kat] SHA2-256
840,397 UART: [kat] SHA2-384
847,732 UART: [kat] SHA2-512-ACC
850,319 UART: [kat] ECC-384
3,291,843 UART: [kat] HMAC-384Kdf
3,304,509 UART: [kat] LMS
3,836,326 UART: [kat] --
3,841,949 UART: [cold-reset] ++
3,843,735 UART: [fht] FHT @ 0x50003400
3,855,864 UART: [idev] ++
3,856,570 UART: [idev] CDI.KEYID = 6
3,857,456 UART: [idev] SUBJECT.KEYID = 7
3,858,699 UART: [idev] UDS.KEYID = 0
3,859,600 ready_for_fw is high
3,859,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,908 UART: [idev] Erasing UDS.KEYID = 0
6,337,414 UART: [idev] Sha1 KeyId Algorithm
6,361,288 UART: [idev] --
6,365,593 UART: [ldev] ++
6,366,279 UART: [ldev] CDI.KEYID = 6
6,367,341 UART: [ldev] SUBJECT.KEYID = 5
6,368,447 UART: [ldev] AUTHORITY.KEYID = 7
6,369,619 UART: [ldev] FE.KEYID = 1
6,381,181 UART: [ldev] Erasing FE.KEYID = 1
8,855,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,641 UART: [ldev] --
10,647,596 UART: [fwproc] Wait for Commands...
10,650,175 UART: [fwproc] Recv command 0x46574c44
10,652,428 UART: [fwproc] Recv'd Img size: 114360 bytes
14,094,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,833,979 >>> mbox cmd response: success
14,837,786 UART: [afmc] ++
14,838,499 UART: [afmc] CDI.KEYID = 6
14,839,683 UART: [afmc] SUBJECT.KEYID = 7
14,841,164 UART: [afmc] AUTHORITY.KEYID = 5
17,347,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,286 UART: [afmc] --
19,144,554 UART: [cold-reset] --
19,147,490 UART: [state] Locking Datavault
19,152,840 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,018 UART: [state] Locking ICCM
19,157,952 UART: [exit] Launching FMC @ 0x40000130
19,166,663 UART:
19,166,892 UART: Running Caliptra FMC ...
19,167,914 UART:
19,168,060 UART: [state] CFI Enabled
19,176,182 UART: [fht] FMC Alias Private Key: 7
20,933,295 UART: [art] Extend RT PCRs Done
20,934,506 UART: [art] Lock RT PCRs Done
20,936,530 UART: [art] Populate DV Done
20,942,042 UART: [fht] FMC Alias Private Key: 7
20,943,791 UART: [art] Derive CDI
20,944,522 UART: [art] Store in in slot 0x4
20,987,329 UART: [art] Derive Key Pair
20,988,363 UART: [art] Store priv key in slot 0x5
23,414,768 UART: [art] Derive Key Pair - Done
23,427,601 UART: [art] Signing Cert with AUTHO
23,428,895 UART: RITY.KEYID = 7
25,134,185 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,684 UART: [art] PUB.X = DF7E1C9E5A92FFEF43DEBB77A149563C2A2F019B1A271017BE476C1213ADE106C00B9796F5B18F07D636A16266A3665F
25,142,929 UART: [art] PUB.Y = 4039930DBDFFF251283F1737BA33B9ACB762F89F1664D0A521E7CD91824019C10169C5684842694898D5220B92420AAB
25,150,155 UART: [art] SIG.R = C1B0DD348EA952D163910B601A83E31C253BAE47B8CF052684BF36375FFA4A4AD58B9B38A0A1A0D8592CAD452C84D6F4
25,157,575 UART: [art] SIG.S = 35D5409B737E3F25359CEB0E11623E0DFF351FA0EC92555A2AE3F1A78B119B812C676CD9075FA0C93742A3799C0A8EA2
26,136,329 UART: Caliptra RT
26,137,017 UART: [state] CFI Enabled
26,252,681 UART: [rt] RT listening for mailbox commands...
26,255,438 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,286,691 UART: [rt]cmd =0x53494756, len=196
27,252,343 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,760,098 ready_for_fw is high
3,760,676 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,089 >>> mbox cmd response: success
19,203,999 UART:
19,204,393 UART: Running Caliptra FMC ...
19,205,588 UART:
19,205,780 UART: [state] CFI Enabled
19,213,469 UART: [fht] FMC Alias Private Key: 7
20,970,956 UART: [art] Extend RT PCRs Done
20,972,182 UART: [art] Lock RT PCRs Done
20,973,968 UART: [art] Populate DV Done
20,979,172 UART: [fht] FMC Alias Private Key: 7
20,980,655 UART: [art] Derive CDI
20,981,420 UART: [art] Store in in slot 0x4
21,023,861 UART: [art] Derive Key Pair
21,024,907 UART: [art] Store priv key in slot 0x5
23,451,071 UART: [art] Derive Key Pair - Done
23,463,643 UART: [art] Signing Cert with AUTHO
23,464,948 UART: RITY.KEYID = 7
25,170,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,970 UART: [art] PUB.X = 43FAAC8905A1E59C6E623E7A1290EFBC91C898F5BBBFA22292AC43096E04925120F3B9E85DEDA12D44A5B5E7C1ABED65
25,179,312 UART: [art] PUB.Y = BF925C7FF25F14CC0460B4FBA6A280FA47ADFA5587CD6E59543E074DF2C720C1E541731F7831A461E9AC1AB149FC201E
25,186,592 UART: [art] SIG.R = 5D3EBE37A3E3C56F09EF94F4E0BEC0AA359050015CA82E72E630535834EF8A3F738FFEB2C06E324EDEFF090B373122EB
25,193,944 UART: [art] SIG.S = BC360BCCC18F6AD002C6EC34F262CD444D9779D89F0C086D569441A0BE29B3BDA12F04AFB89B65C003B43592CC6BAB8C
26,172,723 UART: Caliptra RT
26,173,429 UART: [state] CFI Enabled
26,290,782 UART: [rt] RT listening for mailbox commands...
26,293,512 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,325,314 UART: [rt]cmd =0x53494756, len=196
27,290,867 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,180 UART: [kat] SHA2-512-ACC
897,081 UART: [kat] ECC-384
902,952 UART: [kat] HMAC-384Kdf
907,484 UART: [kat] LMS
1,475,680 UART: [kat] --
1,476,525 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,718 UART: [idev] ++
1,479,886 UART: [idev] CDI.KEYID = 6
1,480,246 UART: [idev] SUBJECT.KEYID = 7
1,480,670 UART: [idev] UDS.KEYID = 0
1,481,015 ready_for_fw is high
1,481,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,334 UART: [idev] --
1,514,441 UART: [ldev] ++
1,514,609 UART: [ldev] CDI.KEYID = 6
1,514,972 UART: [ldev] SUBJECT.KEYID = 5
1,515,398 UART: [ldev] AUTHORITY.KEYID = 7
1,515,861 UART: [ldev] FE.KEYID = 1
1,521,219 UART: [ldev] Erasing FE.KEYID = 1
1,546,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,545 UART: [fwproc] Waiting for Commands...
1,586,330 UART: [fwproc] Received command 0x46574c44
1,587,121 UART: [fwproc] Received Image of size 114360 bytes
2,883,592 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,486 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,829 >>> mbox cmd response: success
3,077,871 UART: [afmc] ++
3,078,039 UART: [afmc] CDI.KEYID = 6
3,078,401 UART: [afmc] SUBJECT.KEYID = 7
3,078,826 UART: [afmc] AUTHORITY.KEYID = 5
3,114,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,569 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,349 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,962 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,652 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,551 UART: [afmc] --
3,157,631 UART: [cold-reset] --
3,158,605 UART: [state] Locking Datavault
3,159,960 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,564 UART: [state] Locking ICCM
3,161,166 UART: [exit] Launching FMC @ 0x40000130
3,166,495 UART:
3,166,511 UART: Running Caliptra FMC ...
3,166,919 UART:
3,166,973 UART: [state] CFI Enabled
3,177,504 UART: [fht] FMC Alias Private Key: 7
3,285,307 UART: [art] Extend RT PCRs Done
3,285,735 UART: [art] Lock RT PCRs Done
3,287,111 UART: [art] Populate DV Done
3,295,314 UART: [fht] FMC Alias Private Key: 7
3,296,278 UART: [art] Derive CDI
3,296,558 UART: [art] Store in in slot 0x4
3,382,191 UART: [art] Derive Key Pair
3,382,551 UART: [art] Store priv key in slot 0x5
3,395,827 UART: [art] Derive Key Pair - Done
3,410,751 UART: [art] Signing Cert with AUTHO
3,411,231 UART: RITY.KEYID = 7
3,426,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,286 UART: [art] PUB.X = D423881CFFD2FFC5166ABCCE7B1B97D78D1B5077002991B0BCDD09F3B26BB34996B9F57990EF405654460D8B314C1006
3,434,031 UART: [art] PUB.Y = 48FDB0700272D4332E3145E4D524FB2289B93878BF6F0C200807409B13E027B3B2192AF1D3D40B967144F1FBA1408E51
3,440,960 UART: [art] SIG.R = A716B2CE383CBD0DD58B427276F8A68663C39B78AC3FD0B668137EC4CEE2CD437C0CCCBF93765294F9D925BA6A0537AF
3,447,737 UART: [art] SIG.S = 236006AF6EA4B2491520399C23FA0DB7B439C40923D9C7209FA7B6E3CC0E2B830D87C5FC922948CB7D3A5F967BCE5B24
3,472,167 UART: Caliptra RT
3,472,421 UART: [state] CFI Enabled
3,580,197 UART: [rt] RT listening for mailbox commands...
3,580,867 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,716 UART: [rt]cmd =0x53494756, len=196
3,617,104 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,525 ready_for_fw is high
1,362,525 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,167 >>> mbox cmd response: success
2,989,429 UART:
2,989,445 UART: Running Caliptra FMC ...
2,989,853 UART:
2,989,907 UART: [state] CFI Enabled
3,000,526 UART: [fht] FMC Alias Private Key: 7
3,108,139 UART: [art] Extend RT PCRs Done
3,108,567 UART: [art] Lock RT PCRs Done
3,110,347 UART: [art] Populate DV Done
3,118,554 UART: [fht] FMC Alias Private Key: 7
3,119,596 UART: [art] Derive CDI
3,119,876 UART: [art] Store in in slot 0x4
3,205,259 UART: [art] Derive Key Pair
3,205,619 UART: [art] Store priv key in slot 0x5
3,219,571 UART: [art] Derive Key Pair - Done
3,234,169 UART: [art] Signing Cert with AUTHO
3,234,649 UART: RITY.KEYID = 7
3,249,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,292 UART: [art] PUB.X = 33F63A3FF3A2ACE1890B10FDA70E7EDDF94FF6E999D3DDC230407810F22D8F8CEB1A0F1B441F68EE07C1D03493CE6D93
3,257,070 UART: [art] PUB.Y = 1DE40B5A0B792C06A3EAFD46E5FA1E128B7C5EE08E38A9DFFD6CDB077D593771079459069C69019D0C6F4DB4B70DF153
3,264,007 UART: [art] SIG.R = 2C31873CAAFAF2F982AA788EAF961B1080955547A8648A5142144600184D58E59C98B22F564556D4A061A061FC21A52B
3,270,749 UART: [art] SIG.S = 089754B12179E121366B9F0D3BCCC7DB3E3A230A6BBFC4E54E4F904A5A3BAEFCC025C1E8E64CB446F7543B8F4E342626
3,294,345 UART: Caliptra RT
3,294,599 UART: [state] CFI Enabled
3,402,158 UART: [rt] RT listening for mailbox commands...
3,402,828 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,563 UART: [rt]cmd =0x53494756, len=196
3,438,935 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,096 UART: [kat] SHA2-256
882,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,142 UART: [kat] ++
886,294 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,804 UART: [cold-reset] ++
1,477,264 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 ready_for_fw is high
1,481,108 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,823 UART: [idev] Erasing UDS.KEYID = 0
1,505,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,481 UART: [idev] --
1,515,596 UART: [ldev] ++
1,515,764 UART: [ldev] CDI.KEYID = 6
1,516,127 UART: [ldev] SUBJECT.KEYID = 5
1,516,553 UART: [ldev] AUTHORITY.KEYID = 7
1,517,016 UART: [ldev] FE.KEYID = 1
1,522,414 UART: [ldev] Erasing FE.KEYID = 1
1,547,383 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,149 UART: [ldev] --
1,586,462 UART: [fwproc] Waiting for Commands...
1,587,151 UART: [fwproc] Received command 0x46574c44
1,587,942 UART: [fwproc] Received Image of size 114360 bytes
2,886,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,903 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,252 >>> mbox cmd response: success
3,080,372 UART: [afmc] ++
3,080,540 UART: [afmc] CDI.KEYID = 6
3,080,902 UART: [afmc] SUBJECT.KEYID = 7
3,081,327 UART: [afmc] AUTHORITY.KEYID = 5
3,116,470 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,501 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,191 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,012 UART: [afmc] --
3,159,898 UART: [cold-reset] --
3,160,598 UART: [state] Locking Datavault
3,161,743 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,347 UART: [state] Locking ICCM
3,162,979 UART: [exit] Launching FMC @ 0x40000130
3,168,308 UART:
3,168,324 UART: Running Caliptra FMC ...
3,168,732 UART:
3,168,875 UART: [state] CFI Enabled
3,179,332 UART: [fht] FMC Alias Private Key: 7
3,287,551 UART: [art] Extend RT PCRs Done
3,287,979 UART: [art] Lock RT PCRs Done
3,289,351 UART: [art] Populate DV Done
3,297,738 UART: [fht] FMC Alias Private Key: 7
3,298,918 UART: [art] Derive CDI
3,299,198 UART: [art] Store in in slot 0x4
3,384,525 UART: [art] Derive Key Pair
3,384,885 UART: [art] Store priv key in slot 0x5
3,398,475 UART: [art] Derive Key Pair - Done
3,413,438 UART: [art] Signing Cert with AUTHO
3,413,918 UART: RITY.KEYID = 7
3,429,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,791 UART: [art] PUB.X = 16301065D8EAD963C8EA3F1F37160EDFEF25E270FC28B8CFB4D574CE102E752D20EF46FB1AE0235D9E1107B2F5F25704
3,436,564 UART: [art] PUB.Y = 6C373DEFE8D5AF1B428D805A40BC06F9428D70453254CD80BA8C0A7860C3AF381C01F498F5D12E8996491727D7E25E02
3,443,504 UART: [art] SIG.R = 8C743422E6B8800B38A2CA483A474F7865FF59A9D0F8459471DA0650297D757D834B9AECCB86C04D658AF772B6C8BAA0
3,450,272 UART: [art] SIG.S = 32211DBD89EEC08527B3915763778EDE1A300D8043EB51DC64DA0BCFF4E95D77C6BF5588103DEAAA057D90F52D06F3ED
3,474,431 UART: Caliptra RT
3,474,777 UART: [state] CFI Enabled
3,583,097 UART: [rt] RT listening for mailbox commands...
3,583,767 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,432 UART: [rt]cmd =0x53494756, len=196
3,620,058 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,132 >>> mbox cmd response: success
2,988,452 UART:
2,988,468 UART: Running Caliptra FMC ...
2,988,876 UART:
2,989,019 UART: [state] CFI Enabled
2,999,486 UART: [fht] FMC Alias Private Key: 7
3,107,623 UART: [art] Extend RT PCRs Done
3,108,051 UART: [art] Lock RT PCRs Done
3,109,527 UART: [art] Populate DV Done
3,117,732 UART: [fht] FMC Alias Private Key: 7
3,118,722 UART: [art] Derive CDI
3,119,002 UART: [art] Store in in slot 0x4
3,205,033 UART: [art] Derive Key Pair
3,205,393 UART: [art] Store priv key in slot 0x5
3,219,343 UART: [art] Derive Key Pair - Done
3,233,952 UART: [art] Signing Cert with AUTHO
3,234,432 UART: RITY.KEYID = 7
3,249,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,445 UART: [art] PUB.X = B6E21F48EE05152993C3ECE20785EE820C5919EABB1077F6F6607CE115ADDC168A4D58B932EFAE0F98534FCFB1E1088F
3,257,214 UART: [art] PUB.Y = 72E7AAACBBC3B2A05DA3ACABE3C825EAAD5BE399D9251AE6F84F5DEF81C4274115664C44C3350828C3BC66EBBB25229F
3,264,185 UART: [art] SIG.R = 8B5D0B5862C5EC618FC5494F44900984DDF2E0FD1EAFE7AB1351BF4391C89E013023E1CE45A313F1679D6BEEBE55DA50
3,270,960 UART: [art] SIG.S = 091A0CBE77920524FC2629E5C4CA55A801F3EABE7BEDF06772C5EFAB0886A423BDE60DC4913C39A97458BB57D9B1BA35
3,295,083 UART: Caliptra RT
3,295,429 UART: [state] CFI Enabled
3,403,229 UART: [rt] RT listening for mailbox commands...
3,403,899 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,578 UART: [rt]cmd =0x53494756, len=196
3,439,720 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,129 UART: [kat] SHA2-256
904,069 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,728 UART: [kat] HMAC-384Kdf
923,182 UART: [kat] LMS
1,171,510 UART: [kat] --
1,172,577 UART: [cold-reset] ++
1,173,007 UART: [fht] FHT @ 0x50003400
1,175,724 UART: [idev] ++
1,175,892 UART: [idev] CDI.KEYID = 6
1,176,252 UART: [idev] SUBJECT.KEYID = 7
1,176,676 UART: [idev] UDS.KEYID = 0
1,177,021 ready_for_fw is high
1,177,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,866 UART: [idev] Erasing UDS.KEYID = 0
1,201,237 UART: [idev] Sha1 KeyId Algorithm
1,209,599 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,108 UART: [ldev] SUBJECT.KEYID = 5
1,211,534 UART: [ldev] AUTHORITY.KEYID = 7
1,211,997 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,908 UART: [fwproc] Wait for Commands...
1,283,722 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,914 >>> mbox cmd response: success
2,775,142 UART: [afmc] ++
2,775,310 UART: [afmc] CDI.KEYID = 6
2,775,672 UART: [afmc] SUBJECT.KEYID = 7
2,776,097 UART: [afmc] AUTHORITY.KEYID = 5
2,812,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,467 UART: [afmc] --
2,855,539 UART: [cold-reset] --
2,856,345 UART: [state] Locking Datavault
2,857,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,298 UART: [state] Locking ICCM
2,858,886 UART: [exit] Launching FMC @ 0x40000130
2,864,215 UART:
2,864,231 UART: Running Caliptra FMC ...
2,864,639 UART:
2,864,693 UART: [state] CFI Enabled
2,874,890 UART: [fht] FMC Alias Private Key: 7
2,983,575 UART: [art] Extend RT PCRs Done
2,984,003 UART: [art] Lock RT PCRs Done
2,985,435 UART: [art] Populate DV Done
2,993,460 UART: [fht] FMC Alias Private Key: 7
2,994,518 UART: [art] Derive CDI
2,994,798 UART: [art] Store in in slot 0x4
3,080,377 UART: [art] Derive Key Pair
3,080,737 UART: [art] Store priv key in slot 0x5
3,093,437 UART: [art] Derive Key Pair - Done
3,108,117 UART: [art] Signing Cert with AUTHO
3,108,597 UART: RITY.KEYID = 7
3,123,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,454 UART: [art] PUB.X = 5EDECB2EE05AB56985C6F4E94425DA94A6C0843C33C1DD9B6661930DDE343F7F0F4C922F682E989E7735E9E922883630
3,131,222 UART: [art] PUB.Y = 43577A04EB85BAC3430279B31E1C5A59D2E9001FE7674D9B6D38CFD5F710E538613D661252394BE2DBB1304D087B5EA8
3,138,143 UART: [art] SIG.R = 1129A2FE3D2BB3921B0F23A7906340314E8AEA4C2C0C800D46F3A1CAD18B3C4593F5233F78CDA7B58D661FEF4C08327C
3,144,911 UART: [art] SIG.S = 295DBE83B6ED0D1CBA97628B41226BE7674B4B6A6181B9B25839C35C83AE97BB226F0334A68C629517A4216B6B34AEED
3,168,528 UART: Caliptra RT
3,168,782 UART: [state] CFI Enabled
3,276,310 UART: [rt] RT listening for mailbox commands...
3,276,980 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,789 UART: [rt]cmd =0x53494756, len=196
3,313,061 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 ready_for_fw is high
1,059,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,869 >>> mbox cmd response: success
2,689,209 UART:
2,689,225 UART: Running Caliptra FMC ...
2,689,633 UART:
2,689,687 UART: [state] CFI Enabled
2,699,812 UART: [fht] FMC Alias Private Key: 7
2,808,887 UART: [art] Extend RT PCRs Done
2,809,315 UART: [art] Lock RT PCRs Done
2,810,809 UART: [art] Populate DV Done
2,818,838 UART: [fht] FMC Alias Private Key: 7
2,819,774 UART: [art] Derive CDI
2,820,054 UART: [art] Store in in slot 0x4
2,905,921 UART: [art] Derive Key Pair
2,906,281 UART: [art] Store priv key in slot 0x5
2,919,649 UART: [art] Derive Key Pair - Done
2,934,324 UART: [art] Signing Cert with AUTHO
2,934,804 UART: RITY.KEYID = 7
2,950,254 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,019 UART: [art] PUB.X = C2D1891C06B545FF5C5477E0DBF378F4769F2A38C02B809E2966693A9FA43DB11A5EC81BC91960F318C4C8FADBB8E697
2,957,796 UART: [art] PUB.Y = 1070A12B51B25F4BC536248E7E86A7844C676ACC6CB6E0389D495721E77EEC4B72E49B3667443869BA7CD7E27979ABF1
2,964,748 UART: [art] SIG.R = C806BBD0BD1B9570391483A02E09135F9D62E4C19599A1DB899574E886CE09E0DEBF0D8CB9A265DA15114FCCDFB02242
2,971,516 UART: [art] SIG.S = 2DF232BE3CCCF8742BA4F94B7FBD40DED18FC66128EA10BB4E7E66247BB015444A8A4BEC1BF3390C155ED3BC644B3E67
2,995,582 UART: Caliptra RT
2,995,836 UART: [state] CFI Enabled
3,104,262 UART: [rt] RT listening for mailbox commands...
3,104,932 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,547 UART: [rt]cmd =0x53494756, len=196
3,141,187 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,376 UART: [kat] SHA2-256
904,316 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
919,065 UART: [kat] HMAC-384Kdf
923,703 UART: [kat] LMS
1,172,031 UART: [kat] --
1,172,766 UART: [cold-reset] ++
1,173,110 UART: [fht] FHT @ 0x50003400
1,175,633 UART: [idev] ++
1,175,801 UART: [idev] CDI.KEYID = 6
1,176,161 UART: [idev] SUBJECT.KEYID = 7
1,176,585 UART: [idev] UDS.KEYID = 0
1,176,930 ready_for_fw is high
1,176,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,319 UART: [idev] Erasing UDS.KEYID = 0
1,201,982 UART: [idev] Sha1 KeyId Algorithm
1,210,516 UART: [idev] --
1,211,476 UART: [ldev] ++
1,211,644 UART: [ldev] CDI.KEYID = 6
1,212,007 UART: [ldev] SUBJECT.KEYID = 5
1,212,433 UART: [ldev] AUTHORITY.KEYID = 7
1,212,896 UART: [ldev] FE.KEYID = 1
1,218,094 UART: [ldev] Erasing FE.KEYID = 1
1,244,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,560 UART: [ldev] --
1,284,069 UART: [fwproc] Wait for Commands...
1,284,717 UART: [fwproc] Recv command 0x46574c44
1,285,445 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,956 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,893 >>> mbox cmd response: success
2,777,141 UART: [afmc] ++
2,777,309 UART: [afmc] CDI.KEYID = 6
2,777,671 UART: [afmc] SUBJECT.KEYID = 7
2,778,096 UART: [afmc] AUTHORITY.KEYID = 5
2,814,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,808 UART: [afmc] --
2,857,710 UART: [cold-reset] --
2,858,766 UART: [state] Locking Datavault
2,859,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,289 UART: [state] Locking ICCM
2,860,863 UART: [exit] Launching FMC @ 0x40000130
2,866,192 UART:
2,866,208 UART: Running Caliptra FMC ...
2,866,616 UART:
2,866,759 UART: [state] CFI Enabled
2,877,660 UART: [fht] FMC Alias Private Key: 7
2,986,503 UART: [art] Extend RT PCRs Done
2,986,931 UART: [art] Lock RT PCRs Done
2,988,727 UART: [art] Populate DV Done
2,996,788 UART: [fht] FMC Alias Private Key: 7
2,997,878 UART: [art] Derive CDI
2,998,158 UART: [art] Store in in slot 0x4
3,083,603 UART: [art] Derive Key Pair
3,083,963 UART: [art] Store priv key in slot 0x5
3,097,571 UART: [art] Derive Key Pair - Done
3,112,035 UART: [art] Signing Cert with AUTHO
3,112,515 UART: RITY.KEYID = 7
3,128,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,780 UART: [art] PUB.X = 82385A5C04654491A3B8DDBC9FCDC0D94CE4B1D84FA9A274119C2FC529E70454225DC21B213F211AB2D12248C471BA68
3,135,550 UART: [art] PUB.Y = FB314F86C80C6C58A0959DC0222C3357CB2FEF2D3974184F0EE4F9F24E6814FDEE71AEA46A07A6C183B2CFC10DBD2C9D
3,142,508 UART: [art] SIG.R = 08E3CA298B13A883ACD64DFFDBAE035C7775FB173F3306482628F07597F6DB0A953F6C5E87CB22153924FF5503899677
3,149,263 UART: [art] SIG.S = 718BD59FF78732D2667C39D701F14ABE775B849BBE348717AE5BE1F7823F8CD92BD37BB9F3051BDF1B4C46A92C5D62C2
3,172,594 UART: Caliptra RT
3,172,940 UART: [state] CFI Enabled
3,281,292 UART: [rt] RT listening for mailbox commands...
3,281,962 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,703 UART: [rt]cmd =0x53494756, len=196
3,318,319 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 ready_for_fw is high
1,060,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,932 >>> mbox cmd response: success
2,689,124 UART:
2,689,140 UART: Running Caliptra FMC ...
2,689,548 UART:
2,689,691 UART: [state] CFI Enabled
2,699,980 UART: [fht] FMC Alias Private Key: 7
2,808,191 UART: [art] Extend RT PCRs Done
2,808,619 UART: [art] Lock RT PCRs Done
2,810,305 UART: [art] Populate DV Done
2,818,464 UART: [fht] FMC Alias Private Key: 7
2,819,510 UART: [art] Derive CDI
2,819,790 UART: [art] Store in in slot 0x4
2,905,509 UART: [art] Derive Key Pair
2,905,869 UART: [art] Store priv key in slot 0x5
2,919,281 UART: [art] Derive Key Pair - Done
2,934,457 UART: [art] Signing Cert with AUTHO
2,934,937 UART: RITY.KEYID = 7
2,949,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,398 UART: [art] PUB.X = 7A59C58814737A47AC349467F8F87712263A7B2628B4DD0111ECF743CF624745B1B56FF2F2EAB9D186E0B602978937E2
2,957,158 UART: [art] PUB.Y = 4F2781FE6531B797E4ECA912CFDECAB93BA4DF83625F8D2CE84F4C30F77CAB9F6A23CD292B2B9EA26162EEB8A6357A40
2,964,130 UART: [art] SIG.R = 6C72726A28FC6CBD937A177039C59E593116A7E7A258CA89133F150F1B9C6F29EAC8F180155B310DD01476F4DDB57522
2,970,894 UART: [art] SIG.S = 176334E5E966F8135829AA38C379FF98375CCA854B2D1D1E83D02FFD2DB0611A806ACBA4D0B7D651C3E853389DF2A61F
2,994,837 UART: Caliptra RT
2,995,183 UART: [state] CFI Enabled
3,103,741 UART: [rt] RT listening for mailbox commands...
3,104,411 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,222 UART: [rt]cmd =0x53494756, len=196
3,140,746 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,174,039 ready_for_fw is high
1,174,039 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,503 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,338 UART: [ldev] ++
1,208,506 UART: [ldev] CDI.KEYID = 6
1,208,870 UART: [ldev] SUBJECT.KEYID = 5
1,209,297 UART: [ldev] AUTHORITY.KEYID = 7
1,209,760 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,218 UART: [ldev] --
1,280,540 UART: [fwproc] Wait for Commands...
1,281,151 UART: [fwproc] Recv command 0x46574c44
1,281,884 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,118 >>> mbox cmd response: success
2,773,295 UART: [afmc] ++
2,773,463 UART: [afmc] CDI.KEYID = 6
2,773,826 UART: [afmc] SUBJECT.KEYID = 7
2,774,252 UART: [afmc] AUTHORITY.KEYID = 5
2,810,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,698 UART: [afmc] --
2,853,580 UART: [cold-reset] --
2,854,476 UART: [state] Locking Datavault
2,855,601 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,205 UART: [state] Locking ICCM
2,856,785 UART: [exit] Launching FMC @ 0x40000130
2,862,114 UART:
2,862,130 UART: Running Caliptra FMC ...
2,862,538 UART:
2,862,592 UART: [state] CFI Enabled
2,873,201 UART: [fht] FMC Alias Private Key: 7
2,981,566 UART: [art] Extend RT PCRs Done
2,981,994 UART: [art] Lock RT PCRs Done
2,983,464 UART: [art] Populate DV Done
2,991,523 UART: [fht] FMC Alias Private Key: 7
2,992,557 UART: [art] Derive CDI
2,992,837 UART: [art] Store in in slot 0x4
3,078,690 UART: [art] Derive Key Pair
3,079,050 UART: [art] Store priv key in slot 0x5
3,092,006 UART: [art] Derive Key Pair - Done
3,106,980 UART: [art] Signing Cert with AUTHO
3,107,460 UART: RITY.KEYID = 7
3,122,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,621 UART: [art] PUB.X = E599306B34723BD5D4EAF9DA87D8B9A39BBB8EC59C231C777B312755CE2940AE7F61816F5DC87247EF05B599F8160116
3,130,389 UART: [art] PUB.Y = E13614ABFA38D3D639587A1BB965D38E5A06AF1B1EB3D762C2EF0DF62AF7756A776695FBDB3931120AD86B97ECACCF82
3,137,348 UART: [art] SIG.R = 7543CD5ECDD32699BBC34C3F9CB71AF7F5A05E6876E81625A0E2750E6CEC1DFE00FD0B3E8AD4775FE359876BF721288C
3,144,106 UART: [art] SIG.S = 19277F930922B3BD49B61EB58B022E56A46CB5E83AEB949967984CAC1C4EE4D70B833C0268FDA6A70F7BB0CA52444326
3,167,620 UART: Caliptra RT
3,167,874 UART: [state] CFI Enabled
3,275,940 UART: [rt] RT listening for mailbox commands...
3,276,610 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,353 UART: [rt]cmd =0x53494756, len=196
3,312,821 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,572 ready_for_fw is high
1,056,572 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,192 >>> mbox cmd response: success
2,684,022 UART:
2,684,038 UART: Running Caliptra FMC ...
2,684,446 UART:
2,684,500 UART: [state] CFI Enabled
2,694,975 UART: [fht] FMC Alias Private Key: 7
2,802,816 UART: [art] Extend RT PCRs Done
2,803,244 UART: [art] Lock RT PCRs Done
2,804,430 UART: [art] Populate DV Done
2,812,519 UART: [fht] FMC Alias Private Key: 7
2,813,457 UART: [art] Derive CDI
2,813,737 UART: [art] Store in in slot 0x4
2,899,256 UART: [art] Derive Key Pair
2,899,616 UART: [art] Store priv key in slot 0x5
2,912,470 UART: [art] Derive Key Pair - Done
2,927,182 UART: [art] Signing Cert with AUTHO
2,927,662 UART: RITY.KEYID = 7
2,942,680 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,445 UART: [art] PUB.X = 5830A2BF45374ECE1D056179009D69DB6D5AAAB931A6F133A90AC08374417F35BBA846A55997EC30343AD40BB8C02EA2
2,950,190 UART: [art] PUB.Y = 5FBD2383DA138C496CFF24294F075240449BB0D2F5133699C5E956B9239F1C7012A076C716C12C4D8A61B77D73EC96A5
2,957,135 UART: [art] SIG.R = 34A0E3453EE0273408AADF153DEA7753783BD7121E7E9B876A22A1EB2DC43470D02A9D816DB5005A044B7D21D4269ED8
2,963,881 UART: [art] SIG.S = 46425F4B98D91D5097F25EFB89267D2B1C7CE6B0930909A24990180B17DFAA2AEE4ED817B3028258ED7F09D56DC08375
2,986,405 UART: Caliptra RT
2,986,659 UART: [state] CFI Enabled
3,094,413 UART: [rt] RT listening for mailbox commands...
3,095,083 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,776 UART: [rt]cmd =0x53494756, len=196
3,131,542 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,387 UART: [kat] LMS
1,168,699 UART: [kat] --
1,169,416 UART: [cold-reset] ++
1,169,844 UART: [fht] FHT @ 0x50003400
1,172,416 UART: [idev] ++
1,172,584 UART: [idev] CDI.KEYID = 6
1,172,945 UART: [idev] SUBJECT.KEYID = 7
1,173,370 UART: [idev] UDS.KEYID = 0
1,173,716 ready_for_fw is high
1,173,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,406 UART: [idev] Erasing UDS.KEYID = 0
1,198,148 UART: [idev] Sha1 KeyId Algorithm
1,207,046 UART: [idev] --
1,208,119 UART: [ldev] ++
1,208,287 UART: [ldev] CDI.KEYID = 6
1,208,651 UART: [ldev] SUBJECT.KEYID = 5
1,209,078 UART: [ldev] AUTHORITY.KEYID = 7
1,209,541 UART: [ldev] FE.KEYID = 1
1,214,743 UART: [ldev] Erasing FE.KEYID = 1
1,241,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,291 UART: [ldev] --
1,280,591 UART: [fwproc] Wait for Commands...
1,281,242 UART: [fwproc] Recv command 0x46574c44
1,281,975 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,129 >>> mbox cmd response: success
2,773,146 UART: [afmc] ++
2,773,314 UART: [afmc] CDI.KEYID = 6
2,773,677 UART: [afmc] SUBJECT.KEYID = 7
2,774,103 UART: [afmc] AUTHORITY.KEYID = 5
2,810,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,267 UART: [afmc] --
2,853,307 UART: [cold-reset] --
2,854,265 UART: [state] Locking Datavault
2,855,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,716 UART: [state] Locking ICCM
2,856,350 UART: [exit] Launching FMC @ 0x40000130
2,861,679 UART:
2,861,695 UART: Running Caliptra FMC ...
2,862,103 UART:
2,862,246 UART: [state] CFI Enabled
2,873,161 UART: [fht] FMC Alias Private Key: 7
2,981,244 UART: [art] Extend RT PCRs Done
2,981,672 UART: [art] Lock RT PCRs Done
2,983,274 UART: [art] Populate DV Done
2,991,595 UART: [fht] FMC Alias Private Key: 7
2,992,725 UART: [art] Derive CDI
2,993,005 UART: [art] Store in in slot 0x4
3,078,680 UART: [art] Derive Key Pair
3,079,040 UART: [art] Store priv key in slot 0x5
3,092,114 UART: [art] Derive Key Pair - Done
3,107,120 UART: [art] Signing Cert with AUTHO
3,107,600 UART: RITY.KEYID = 7
3,123,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,047 UART: [art] PUB.X = FA362B995D503DFCBEC9BBE802202C0577993B24B5C65406A7BAAE2D4E38C3D4D43BA9F413819C614793222D618867F1
3,130,812 UART: [art] PUB.Y = 0079541EE0E421D2FF308A58A4F9DB0F395FCFA7F732DF6BE5A0CC88B29DC116E93D6D5A047E58DB4571DAEFC47C47E4
3,137,754 UART: [art] SIG.R = 91B39F4C9A4DF3C1D2490FFF77A8DC68BD72A5549CF64D949358A81141A3350412ED1D333B614BF91FC26D5971FF11B3
3,144,524 UART: [art] SIG.S = E8097104E0170CEDFB35AFE1D3AF58DF7D1E674F0ABE893E81767EFD2FFD3FC30C1F6C85A2C9AD1E320A46C5FF825A15
3,168,415 UART: Caliptra RT
3,168,761 UART: [state] CFI Enabled
3,275,920 UART: [rt] RT listening for mailbox commands...
3,276,590 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,463 UART: [rt]cmd =0x53494756, len=196
3,313,101 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,423 ready_for_fw is high
1,056,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,273 >>> mbox cmd response: success
2,685,819 UART:
2,685,835 UART: Running Caliptra FMC ...
2,686,243 UART:
2,686,386 UART: [state] CFI Enabled
2,696,919 UART: [fht] FMC Alias Private Key: 7
2,804,468 UART: [art] Extend RT PCRs Done
2,804,896 UART: [art] Lock RT PCRs Done
2,806,240 UART: [art] Populate DV Done
2,814,467 UART: [fht] FMC Alias Private Key: 7
2,815,435 UART: [art] Derive CDI
2,815,715 UART: [art] Store in in slot 0x4
2,901,258 UART: [art] Derive Key Pair
2,901,618 UART: [art] Store priv key in slot 0x5
2,914,372 UART: [art] Derive Key Pair - Done
2,928,926 UART: [art] Signing Cert with AUTHO
2,929,406 UART: RITY.KEYID = 7
2,944,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,595 UART: [art] PUB.X = 5AFD16B22A78FCDC2ED62D584F5BD212F96858C6A0408D95A764AE6B297253AF9FE6DBA52EAB2B65D40A8985345CDF79
2,952,378 UART: [art] PUB.Y = EABAD0A51A7C29D8D030E9DCE71D8A321F61DC89D396F6BFFE3050817A166E6BB6232FDA0A75A2BC3F05630A6296BC0A
2,959,336 UART: [art] SIG.R = 1C6A5A140812B06D0EAA755ACD6EB2C82E2EFC099C15F8746A0676E23C3EB47006489AD49D911D975E5AD52EF955C41D
2,966,101 UART: [art] SIG.S = D99ABF0742636B734F094DF68FD8884FD5202CFF59E883C7C10551ED08BD14B7080CC26E9A6A8989B758D5CC7388B977
2,989,504 UART: Caliptra RT
2,989,850 UART: [state] CFI Enabled
3,099,218 UART: [rt] RT listening for mailbox commands...
3,099,888 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,527 UART: [rt]cmd =0x53494756, len=196
3,135,959 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,553 UART:
192,922 UART: Running Caliptra ROM ...
194,094 UART:
194,245 UART: [state] CFI Enabled
266,823 UART: [state] LifecycleState = Unprovisioned
268,723 UART: [state] DebugLocked = No
270,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,884 UART: [kat] SHA2-256
445,603 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,119 UART: [kat] ++
456,566 UART: [kat] sha1
467,930 UART: [kat] SHA2-256
470,581 UART: [kat] SHA2-384
475,131 UART: [kat] SHA2-512-ACC
477,504 UART: [kat] ECC-384
2,766,239 UART: [kat] HMAC-384Kdf
2,799,387 UART: [kat] LMS
3,989,653 UART: [kat] --
3,994,402 UART: [cold-reset] ++
3,996,350 UART: [fht] Storing FHT @ 0x50003400
4,008,110 UART: [idev] ++
4,008,672 UART: [idev] CDI.KEYID = 6
4,009,701 UART: [idev] SUBJECT.KEYID = 7
4,010,867 UART: [idev] UDS.KEYID = 0
4,011,910 ready_for_fw is high
4,012,118 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,635 UART: [idev] Erasing UDS.KEYID = 0
7,344,841 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,657 UART: [idev] --
7,372,156 UART: [ldev] ++
7,372,726 UART: [ldev] CDI.KEYID = 6
7,373,659 UART: [ldev] SUBJECT.KEYID = 5
7,374,863 UART: [ldev] AUTHORITY.KEYID = 7
7,376,141 UART: [ldev] FE.KEYID = 1
7,421,108 UART: [ldev] Erasing FE.KEYID = 1
10,754,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,669 UART: [ldev] --
13,132,549 UART: [fwproc] Waiting for Commands...
13,134,915 UART: [fwproc] Received command 0x46574c44
13,137,159 UART: [fwproc] Received Image of size 114036 bytes
17,190,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,716 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,652,887 >>> mbox cmd response: success
17,653,400 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,657,410 UART: [afmc] ++
17,657,989 UART: [afmc] CDI.KEYID = 6
17,658,867 UART: [afmc] SUBJECT.KEYID = 7
17,660,127 UART: [afmc] AUTHORITY.KEYID = 5
21,025,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,878 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,142 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,495 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,364 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,826 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,806 UART: [afmc] --
23,397,941 UART: [cold-reset] --
23,400,551 UART: [state] Locking Datavault
23,405,683 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,434 UART: [state] Locking ICCM
23,410,117 UART: [exit] Launching FMC @ 0x40000130
23,418,506 UART:
23,418,734 UART: Running Caliptra FMC ...
23,419,827 UART:
23,419,976 UART: [state] CFI Enabled
23,485,622 UART: [fht] FMC Alias Private Key: 7
25,823,019 UART: [art] Extend RT PCRs Done
25,824,243 UART: [art] Lock RT PCRs Done
25,825,863 UART: [art] Populate DV Done
25,831,162 UART: [fht] FMC Alias Private Key: 7
25,832,840 UART: [art] Derive CDI
25,833,673 UART: [art] Store in in slot 0x4
25,894,737 UART: [art] Derive Key Pair
25,895,732 UART: [art] Store priv key in slot 0x5
29,188,210 UART: [art] Derive Key Pair - Done
29,201,103 UART: [art] Signing Cert with AUTHO
29,202,436 UART: RITY.KEYID = 7
31,490,579 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,087 UART: [art] PUB.X = BDA7E0230B63E8AC7558BFF02F1BBE33E1F3A625CCDA97AC85D34696A7E61B0C9274A092CD7FE7FADEFA2827D6966CBC
31,499,330 UART: [art] PUB.Y = BA89D8E323A4203F6B9865AAB30EE24CAB2DFA530A2D9CF6BFA25AA63DD926601F8F72507564F120086AEFF388F70EC4
31,506,613 UART: [art] SIG.R = 7A211DBCF25411029006A694531255297A9303027B80B434FCF34DD765B8C4CD922B1C7051F82E1D5F69EF69D7A9AA82
31,514,031 UART: [art] SIG.S = E28258D386F3E68F97105A313722E5D5D43586FCF077CB25D9C87835B0A84E13CFBCCE198F2D7106F1FDBADEA34A62DE
32,819,019 UART: Caliptra RT
32,819,737 UART: [state] CFI Enabled
32,981,045 UART: [rt] RT listening for mailbox commands...
33,012,081 UART: [rt]cmd =0x46505344, len=4
33,122,003 >>> mbox cmd response data (8 bytes)
33,122,562 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,122,845 UART: Fatal Error: 0x000E0008
33,123,979 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,781,498 ready_for_fw is high
3,782,111 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,835,362 >>> mbox cmd response: success
17,836,046 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,526,837 UART:
23,527,226 UART: Running Caliptra FMC ...
23,528,354 UART:
23,528,507 UART: [state] CFI Enabled
23,596,129 UART: [fht] FMC Alias Private Key: 7
25,934,241 UART: [art] Extend RT PCRs Done
25,935,879 UART: [art] Lock RT PCRs Done
25,936,892 UART: [art] Populate DV Done
25,942,151 UART: [fht] FMC Alias Private Key: 7
25,943,644 UART: [art] Derive CDI
25,944,409 UART: [art] Store in in slot 0x4
26,006,104 UART: [art] Derive Key Pair
26,007,163 UART: [art] Store priv key in slot 0x5
29,300,204 UART: [art] Derive Key Pair - Done
29,313,259 UART: [art] Signing Cert with AUTHO
29,314,557 UART: RITY.KEYID = 7
31,601,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,109 UART: [art] PUB.X = 9A01582662ECAD7C482D678D96A33C524DE086AA3004FDBFD627051472AD9893CF6F374A6608D13C1D0449FD2BC3B24C
31,610,370 UART: [art] PUB.Y = 8333EB8A032D9CD62F607B0C9F279426FB85890742177951282F035AB4E1B569E44207A08488D8196EC7A39A5F573BE2
31,617,556 UART: [art] SIG.R = AFA605E3658B5B83FFFB6F97D338D053B273B904BF829E5A65FFA6528CBCE3C4896BDF681EEFE9E084A3B2B73C628750
31,624,997 UART: [art] SIG.S = F38E6D575ADB091E5FEFC68EE7EE84D98659B3A25B097D7064A07F14C81DA80E7DC360E6DAD1971A8CC5CA8C5A0C8369
32,930,413 UART: Caliptra RT
32,931,122 UART: [state] CFI Enabled
33,091,512 UART: [rt] RT listening for mailbox commands...
33,122,551 UART: [rt]cmd =0x46505344, len=4
33,232,578 >>> mbox cmd response data (8 bytes)
33,233,141 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,233,453 UART: Fatal Error: 0x000E0008
33,234,567 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,331 UART:
192,702 UART: Running Caliptra ROM ...
193,894 UART:
603,478 UART: [state] CFI Enabled
622,195 UART: [state] LifecycleState = Unprovisioned
624,073 UART: [state] DebugLocked = No
626,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,753 UART: [kat] SHA2-256
801,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,069 UART: [kat] ++
812,548 UART: [kat] sha1
823,800 UART: [kat] SHA2-256
826,461 UART: [kat] SHA2-384
833,231 UART: [kat] SHA2-512-ACC
835,596 UART: [kat] ECC-384
3,121,275 UART: [kat] HMAC-384Kdf
3,133,253 UART: [kat] LMS
4,323,294 UART: [kat] --
4,328,922 UART: [cold-reset] ++
4,330,952 UART: [fht] Storing FHT @ 0x50003400
4,342,718 UART: [idev] ++
4,343,281 UART: [idev] CDI.KEYID = 6
4,344,230 UART: [idev] SUBJECT.KEYID = 7
4,345,414 UART: [idev] UDS.KEYID = 0
4,346,649 ready_for_fw is high
4,346,865 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,490,107 UART: [idev] Erasing UDS.KEYID = 0
7,635,726 UART: [idev] Using Sha1 for KeyId Algorithm
7,657,149 UART: [idev] --
7,662,110 UART: [ldev] ++
7,662,674 UART: [ldev] CDI.KEYID = 6
7,663,610 UART: [ldev] SUBJECT.KEYID = 5
7,664,871 UART: [ldev] AUTHORITY.KEYID = 7
7,666,019 UART: [ldev] FE.KEYID = 1
7,676,740 UART: [ldev] Erasing FE.KEYID = 1
10,964,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,898 UART: [ldev] --
13,321,749 UART: [fwproc] Waiting for Commands...
13,324,664 UART: [fwproc] Received command 0x46574c44
13,326,863 UART: [fwproc] Received Image of size 114036 bytes
17,382,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,844,958 >>> mbox cmd response: success
17,845,505 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,849,320 UART: [afmc] ++
17,849,941 UART: [afmc] CDI.KEYID = 6
17,850,823 UART: [afmc] SUBJECT.KEYID = 7
17,852,094 UART: [afmc] AUTHORITY.KEYID = 5
21,164,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,365 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,731 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,561 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,005 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,233 UART: [afmc] --
23,530,864 UART: [cold-reset] --
23,534,174 UART: [state] Locking Datavault
23,538,517 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,271 UART: [state] Locking ICCM
23,542,585 UART: [exit] Launching FMC @ 0x40000130
23,550,981 UART:
23,551,214 UART: Running Caliptra FMC ...
23,552,310 UART:
23,552,464 UART: [state] CFI Enabled
23,560,239 UART: [fht] FMC Alias Private Key: 7
25,891,028 UART: [art] Extend RT PCRs Done
25,892,248 UART: [art] Lock RT PCRs Done
25,893,898 UART: [art] Populate DV Done
25,899,357 UART: [fht] FMC Alias Private Key: 7
25,900,840 UART: [art] Derive CDI
25,901,620 UART: [art] Store in in slot 0x4
25,944,145 UART: [art] Derive Key Pair
25,945,179 UART: [art] Store priv key in slot 0x5
29,187,340 UART: [art] Derive Key Pair - Done
29,200,437 UART: [art] Signing Cert with AUTHO
29,201,735 UART: RITY.KEYID = 7
31,480,934 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,444 UART: [art] PUB.X = 9CC6E9275BB9B4D5F03033CA4E27295C76281A90A46F6D629DE1AC0A647123ECC822C8E17CF95F438741EB57A4A70CCA
31,489,681 UART: [art] PUB.Y = C519D87251E51D1A6954F820928F15CE090EA060E0DE136E5AB94B32C0A3F592B6118C92CBDBF7D786EEE5354B45B50A
31,496,952 UART: [art] SIG.R = 4BB1088991931325DAE807B3E9BD62F66A90467C219E15458DE112D68BFC3029D2311E4D7D0353E5E662745777B8CF34
31,504,336 UART: [art] SIG.S = 1C0D0AE446167D691FC6B18028ED1AA8CA048B4D89F5F2AA047E8F87351AEF4F1026A187229DF7E92C3DFD2251D88087
32,809,799 UART: Caliptra RT
32,810,510 UART: [state] CFI Enabled
32,929,029 UART: [rt] RT listening for mailbox commands...
32,960,173 UART: [rt]cmd =0x46505344, len=4
33,069,975 >>> mbox cmd response data (8 bytes)
33,070,545 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,070,842 UART: Fatal Error: 0x000E0008
33,071,980 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,125,513 ready_for_fw is high
4,125,901 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,064,975 >>> mbox cmd response: success
18,065,768 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,707,004 UART:
23,707,393 UART: Running Caliptra FMC ...
23,708,520 UART:
23,708,675 UART: [state] CFI Enabled
23,716,416 UART: [fht] FMC Alias Private Key: 7
26,047,210 UART: [art] Extend RT PCRs Done
26,048,433 UART: [art] Lock RT PCRs Done
26,049,982 UART: [art] Populate DV Done
26,055,458 UART: [fht] FMC Alias Private Key: 7
26,057,172 UART: [art] Derive CDI
26,057,996 UART: [art] Store in in slot 0x4
26,100,481 UART: [art] Derive Key Pair
26,101,525 UART: [art] Store priv key in slot 0x5
29,343,287 UART: [art] Derive Key Pair - Done
29,356,223 UART: [art] Signing Cert with AUTHO
29,357,567 UART: RITY.KEYID = 7
31,637,320 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,833 UART: [art] PUB.X = E85FF17EDCB727169513D2FA3861782707E2D17A9DC5C593D426305F386AF080B70C6F0F082AACF847567C1257F3851E
31,646,062 UART: [art] PUB.Y = 2DB9CAEF23FBD332C3AFA886EE3BB9CCEE2BF0267550F05AE4270C8C6DA53C1FADEDDC2404B85C34AB879785E5D1D183
31,653,326 UART: [art] SIG.R = ECD895ACD5AF9F5B00AD81BA5D95EAA131368A732D3C9845622D16E431FED3E25D7DFB9BB4F161E9FC686C69667ED793
31,660,687 UART: [art] SIG.S = 7EA64BC415BE164D92B0F3D03641C03F9ADD63B374BC950FE0BFB6CE1B9CE110CE1388D3E2881DB53144D791D4FF0938
32,965,968 UART: Caliptra RT
32,966,682 UART: [state] CFI Enabled
33,084,720 UART: [rt] RT listening for mailbox commands...
33,115,971 UART: [rt]cmd =0x46505344, len=4
33,226,062 >>> mbox cmd response data (8 bytes)
33,226,580 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,226,863 UART: Fatal Error: 0x000E0008
33,228,058 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,641 UART:
193,005 UART: Running Caliptra ROM ...
194,158 UART:
194,306 UART: [state] CFI Enabled
265,550 UART: [state] LifecycleState = Unprovisioned
267,454 UART: [state] DebugLocked = No
269,486 UART: [state] WD Timer not started. Device not locked for debugging
274,088 UART: [kat] SHA2-256
453,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,842 UART: [kat] ++
465,297 UART: [kat] sha1
476,167 UART: [kat] SHA2-256
479,248 UART: [kat] SHA2-384
485,520 UART: [kat] SHA2-512-ACC
488,456 UART: [kat] ECC-384
2,947,865 UART: [kat] HMAC-384Kdf
2,971,265 UART: [kat] LMS
3,500,711 UART: [kat] --
3,504,667 UART: [cold-reset] ++
3,506,674 UART: [fht] FHT @ 0x50003400
3,518,574 UART: [idev] ++
3,519,139 UART: [idev] CDI.KEYID = 6
3,520,024 UART: [idev] SUBJECT.KEYID = 7
3,521,278 UART: [idev] UDS.KEYID = 0
3,522,213 ready_for_fw is high
3,522,454 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,368 UART: [idev] Erasing UDS.KEYID = 0
6,025,396 UART: [idev] Sha1 KeyId Algorithm
6,047,162 UART: [idev] --
6,050,996 UART: [ldev] ++
6,051,571 UART: [ldev] CDI.KEYID = 6
6,052,456 UART: [ldev] SUBJECT.KEYID = 5
6,053,671 UART: [ldev] AUTHORITY.KEYID = 7
6,054,919 UART: [ldev] FE.KEYID = 1
6,100,547 UART: [ldev] Erasing FE.KEYID = 1
8,604,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,570 UART: [ldev] --
10,411,750 UART: [fwproc] Wait for Commands...
10,414,378 UART: [fwproc] Recv command 0x46574c44
10,416,425 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,720 >>> mbox cmd response: success
14,284,258 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,288,826 UART: [afmc] ++
14,289,406 UART: [afmc] CDI.KEYID = 6
14,290,288 UART: [afmc] SUBJECT.KEYID = 7
14,291,500 UART: [afmc] AUTHORITY.KEYID = 5
16,825,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,766 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,847 UART: [afmc] --
18,628,358 UART: [cold-reset] --
18,632,272 UART: [state] Locking Datavault
18,637,794 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,435 UART: [state] Locking ICCM
18,641,341 UART: [exit] Launching FMC @ 0x40000130
18,649,734 UART:
18,650,156 UART: Running Caliptra FMC ...
18,651,291 UART:
18,651,450 UART: [state] CFI Enabled
18,710,837 UART: [fht] FMC Alias Private Key: 7
20,475,215 UART: [art] Extend RT PCRs Done
20,476,418 UART: [art] Lock RT PCRs Done
20,478,296 UART: [art] Populate DV Done
20,483,728 UART: [fht] FMC Alias Private Key: 7
20,485,375 UART: [art] Derive CDI
20,486,112 UART: [art] Store in in slot 0x4
20,543,560 UART: [art] Derive Key Pair
20,544,594 UART: [art] Store priv key in slot 0x5
23,007,580 UART: [art] Derive Key Pair - Done
23,020,853 UART: [art] Signing Cert with AUTHO
23,022,168 UART: RITY.KEYID = 7
24,734,232 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,729 UART: [art] PUB.X = 19A4B2B2363568375433222F76D68613A89D134852541D77BDA86E04CCCA32B3307F2986D5331DD8694596B4785EBE65
24,742,961 UART: [art] PUB.Y = AC433933E977B7E6A4EA453DFB7F45217170467A68404FF860B25CC0497D620072CA2F8C55911B7289B2336B61A5C307
24,750,186 UART: [art] SIG.R = CA95631388FB30E6229B6077961F9B941705574D30F915C88BA63261A67EEF0F7925D473E743257034003564842E51AD
24,757,521 UART: [art] SIG.S = 4F6A8E84CF277F4F4787CE5D103DEA5B45AEC1902A6239AA1D54BB4E636647C2DED84C5EABD01CFBCAF1CAE58E000ACD
25,736,043 UART: Caliptra RT
25,736,764 UART: [state] CFI Enabled
25,901,926 UART: [rt] RT listening for mailbox commands...
25,933,080 UART: [rt]cmd =0x46505344, len=4
26,043,280 >>> mbox cmd response data (8 bytes)
26,043,819 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,044,106 UART: Fatal Error: 0x000E0008
26,045,275 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,466 UART:
192,825 UART: Running Caliptra ROM ...
194,020 UART:
194,181 UART: [state] CFI Enabled
266,478 UART: [state] LifecycleState = Unprovisioned
268,893 UART: [state] DebugLocked = No
271,141 UART: [state] WD Timer not started. Device not locked for debugging
275,346 UART: [kat] SHA2-256
465,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,835 UART: [kat] ++
476,311 UART: [kat] sha1
488,318 UART: [kat] SHA2-256
491,337 UART: [kat] SHA2-384
497,545 UART: [kat] SHA2-512-ACC
500,143 UART: [kat] ECC-384
2,947,133 UART: [kat] HMAC-384Kdf
2,973,206 UART: [kat] LMS
3,504,940 UART: [kat] --
3,507,527 UART: [cold-reset] ++
3,509,395 UART: [fht] FHT @ 0x50003400
3,520,300 UART: [idev] ++
3,521,008 UART: [idev] CDI.KEYID = 6
3,522,001 UART: [idev] SUBJECT.KEYID = 7
3,523,182 UART: [idev] UDS.KEYID = 0
3,524,081 ready_for_fw is high
3,524,293 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,424 UART: [idev] Erasing UDS.KEYID = 0
6,032,085 UART: [idev] Sha1 KeyId Algorithm
6,055,812 UART: [idev] --
6,060,185 UART: [ldev] ++
6,060,903 UART: [ldev] CDI.KEYID = 6
6,061,876 UART: [ldev] SUBJECT.KEYID = 5
6,062,987 UART: [ldev] AUTHORITY.KEYID = 7
6,064,179 UART: [ldev] FE.KEYID = 1
6,099,946 UART: [ldev] Erasing FE.KEYID = 1
8,607,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,271 UART: [ldev] --
10,413,706 UART: [fwproc] Wait for Commands...
10,416,885 UART: [fwproc] Recv command 0x46574c44
10,419,142 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,290 >>> mbox cmd response: success
14,605,817 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,608,539 UART: [afmc] ++
14,609,240 UART: [afmc] CDI.KEYID = 6
14,610,487 UART: [afmc] SUBJECT.KEYID = 7
14,611,923 UART: [afmc] AUTHORITY.KEYID = 5
17,149,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,832 UART: [afmc] --
18,948,434 UART: [cold-reset] --
18,952,135 UART: [state] Locking Datavault
18,957,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,602 UART: [state] Locking ICCM
18,961,947 UART: [exit] Launching FMC @ 0x40000130
18,970,614 UART:
18,970,850 UART: Running Caliptra FMC ...
18,971,874 UART:
18,972,019 UART: [state] CFI Enabled
19,030,878 UART: [fht] FMC Alias Private Key: 7
20,794,887 UART: [art] Extend RT PCRs Done
20,796,106 UART: [art] Lock RT PCRs Done
20,797,972 UART: [art] Populate DV Done
20,803,110 UART: [fht] FMC Alias Private Key: 7
20,804,758 UART: [art] Derive CDI
20,805,578 UART: [art] Store in in slot 0x4
20,863,514 UART: [art] Derive Key Pair
20,864,553 UART: [art] Store priv key in slot 0x5
23,327,264 UART: [art] Derive Key Pair - Done
23,340,094 UART: [art] Signing Cert with AUTHO
23,341,402 UART: RITY.KEYID = 7
25,053,156 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,668 UART: [art] PUB.X = E5D57BBCFFEBCF26DC7C466E8A5830D63C88B674EDED3CFB096BDA9BD232E8F4DAE3D582DB372F9A419F99F816AE445E
25,061,961 UART: [art] PUB.Y = 937C64F58CBE773F7267B7726C0F88E73B362E1935F3AE0CB48DC0A4855A3B56D61847574BEDB70508EE871AD9F8C4CC
25,069,244 UART: [art] SIG.R = 86617A8B67FA5F07E0404D7C83094B9B105664EB95FC787C18F802B1405833B9865474CE0DA2F1EFFF460761E071AAB6
25,076,613 UART: [art] SIG.S = CB48A7F2A47635B3510656BA74EAEE8CC1403A45BB36497F973FF3F792D92995181E7CFFC7E185CB216097B1749F5D42
26,055,227 UART: Caliptra RT
26,055,921 UART: [state] CFI Enabled
26,219,766 UART: [rt] RT listening for mailbox commands...
26,250,803 UART: [rt]cmd =0x46505344, len=4
26,360,450 >>> mbox cmd response data (8 bytes)
26,360,990 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,361,276 UART: Fatal Error: 0x000E0008
26,362,412 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,438,058 ready_for_fw is high
3,438,445 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,733,826 >>> mbox cmd response: success
14,734,628 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,019,189 UART:
19,019,581 UART: Running Caliptra FMC ...
19,020,727 UART:
19,020,887 UART: [state] CFI Enabled
19,089,534 UART: [fht] FMC Alias Private Key: 7
20,852,784 UART: [art] Extend RT PCRs Done
20,854,027 UART: [art] Lock RT PCRs Done
20,855,833 UART: [art] Populate DV Done
20,861,194 UART: [fht] FMC Alias Private Key: 7
20,862,851 UART: [art] Derive CDI
20,863,674 UART: [art] Store in in slot 0x4
20,922,264 UART: [art] Derive Key Pair
20,923,301 UART: [art] Store priv key in slot 0x5
23,386,658 UART: [art] Derive Key Pair - Done
23,399,491 UART: [art] Signing Cert with AUTHO
23,400,800 UART: RITY.KEYID = 7
25,111,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,292 UART: [art] PUB.X = 4241CB9A034E16A50FDF8B7B0DFF0E785188F940D7D9B57387047EC9087DE1DE0A14BB45C4490D658DAD603A02223875
25,120,592 UART: [art] PUB.Y = EB7D1F7901DDB3A911D28251B5D393F3AD4ED31A47E5AE928868E3697D1D0DEFC14BE9A9C8639AC34A9720BD76A0F518
25,127,835 UART: [art] SIG.R = D8A21F1F9F0FB1652AF3050EF35B01BB986050D97947C6E8B2ECB9FA889B8F9FA23E5F08CCF326C1E00938B216122F78
25,135,262 UART: [art] SIG.S = 6B2CBD7BAC959EF7ED1C9C58DA46BFFBC48CB68304E3A2C165C10CDB50147DA4C8CCED6F9D2D77F47EEEDF177C3903DE
26,113,848 UART: Caliptra RT
26,114,557 UART: [state] CFI Enabled
26,279,109 UART: [rt] RT listening for mailbox commands...
26,310,087 UART: [rt]cmd =0x46505344, len=4
26,420,418 >>> mbox cmd response data (8 bytes)
26,420,977 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,421,270 UART: Fatal Error: 0x000E0008
26,422,384 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,474 UART:
192,836 UART: Running Caliptra ROM ...
193,929 UART:
603,711 UART: [state] CFI Enabled
618,453 UART: [state] LifecycleState = Unprovisioned
620,834 UART: [state] DebugLocked = No
622,793 UART: [state] WD Timer not started. Device not locked for debugging
627,567 UART: [kat] SHA2-256
817,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,204 UART: [kat] ++
828,721 UART: [kat] sha1
839,043 UART: [kat] SHA2-256
842,097 UART: [kat] SHA2-384
848,380 UART: [kat] SHA2-512-ACC
850,964 UART: [kat] ECC-384
3,294,060 UART: [kat] HMAC-384Kdf
3,308,453 UART: [kat] LMS
3,840,310 UART: [kat] --
3,844,569 UART: [cold-reset] ++
3,846,781 UART: [fht] FHT @ 0x50003400
3,859,384 UART: [idev] ++
3,860,099 UART: [idev] CDI.KEYID = 6
3,861,010 UART: [idev] SUBJECT.KEYID = 7
3,862,277 UART: [idev] UDS.KEYID = 0
3,863,257 ready_for_fw is high
3,863,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,233 UART: [idev] Erasing UDS.KEYID = 0
6,337,402 UART: [idev] Sha1 KeyId Algorithm
6,359,041 UART: [idev] --
6,364,210 UART: [ldev] ++
6,364,895 UART: [ldev] CDI.KEYID = 6
6,365,778 UART: [ldev] SUBJECT.KEYID = 5
6,366,930 UART: [ldev] AUTHORITY.KEYID = 7
6,368,214 UART: [ldev] FE.KEYID = 1
6,378,557 UART: [ldev] Erasing FE.KEYID = 1
8,859,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,272 UART: [ldev] --
10,648,050 UART: [fwproc] Wait for Commands...
10,650,627 UART: [fwproc] Recv command 0x46574c44
10,652,929 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,848,025 >>> mbox cmd response: success
14,848,606 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,852,312 UART: [afmc] ++
14,853,002 UART: [afmc] CDI.KEYID = 6
14,854,243 UART: [afmc] SUBJECT.KEYID = 7
14,855,730 UART: [afmc] AUTHORITY.KEYID = 5
17,356,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,547 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,111 UART: [afmc] --
19,153,062 UART: [cold-reset] --
19,158,012 UART: [state] Locking Datavault
19,164,326 UART: [state] Locking PCR0, PCR1 and PCR31
19,166,516 UART: [state] Locking ICCM
19,169,536 UART: [exit] Launching FMC @ 0x40000130
19,178,199 UART:
19,178,432 UART: Running Caliptra FMC ...
19,179,527 UART:
19,179,688 UART: [state] CFI Enabled
19,187,678 UART: [fht] FMC Alias Private Key: 7
20,943,975 UART: [art] Extend RT PCRs Done
20,945,196 UART: [art] Lock RT PCRs Done
20,946,784 UART: [art] Populate DV Done
20,952,458 UART: [fht] FMC Alias Private Key: 7
20,954,041 UART: [art] Derive CDI
20,954,772 UART: [art] Store in in slot 0x4
20,997,691 UART: [art] Derive Key Pair
20,998,751 UART: [art] Store priv key in slot 0x5
23,425,793 UART: [art] Derive Key Pair - Done
23,439,009 UART: [art] Signing Cert with AUTHO
23,440,311 UART: RITY.KEYID = 7
25,146,106 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,592 UART: [art] PUB.X = 0A500EC5714164EA3FEFA7AD34E22A5ADA8E924CB3D2A86B01DC2315D92F920EE7EA718CA01F49FCCFD5C9E55EB91A63
25,154,892 UART: [art] PUB.Y = EBDCCA3824BEA0691140149AF8963201C275C37BA903FD5B46FB80222443059B81C85330648E03ADDE8F18617F972FAA
25,162,176 UART: [art] SIG.R = C7D1884101E81BB3A4937FCA6B3C590B3E22DB81BB591BF5FD9165F3D7DBEB400DCAE594EBC73F7ECA7533229CDE41F6
25,169,598 UART: [art] SIG.S = EC3F0C43711497BCCE8E8B2A435A74C8DF73CD4227CD6EA6E405EBA235352EFF1B37A7D7A8575A97A474F8A8417C4F95
26,148,371 UART: Caliptra RT
26,149,079 UART: [state] CFI Enabled
26,265,927 UART: [rt] RT listening for mailbox commands...
26,296,615 UART: [rt]cmd =0x46505344, len=4
26,406,424 >>> mbox cmd response data (8 bytes)
26,406,949 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,407,240 UART: Fatal Error: 0x000E0008
26,408,377 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,759,907 ready_for_fw is high
3,760,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,965,168 >>> mbox cmd response: success
14,965,902 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,214,418 UART:
19,214,816 UART: Running Caliptra FMC ...
19,216,120 UART:
19,216,289 UART: [state] CFI Enabled
19,224,151 UART: [fht] FMC Alias Private Key: 7
20,980,940 UART: [art] Extend RT PCRs Done
20,982,160 UART: [art] Lock RT PCRs Done
20,984,112 UART: [art] Populate DV Done
20,989,417 UART: [fht] FMC Alias Private Key: 7
20,990,908 UART: [art] Derive CDI
20,991,669 UART: [art] Store in in slot 0x4
21,034,494 UART: [art] Derive Key Pair
21,035,542 UART: [art] Store priv key in slot 0x5
23,462,251 UART: [art] Derive Key Pair - Done
23,475,079 UART: [art] Signing Cert with AUTHO
23,476,388 UART: RITY.KEYID = 7
25,181,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,260 UART: [art] PUB.X = CF950CD3E8BBD9EF7C0A4C3C13EA01DCA3DCAB64064E000A024456E1399B9A8028322B501FD9743331A4BBB50DDE82DF
25,190,601 UART: [art] PUB.Y = A944F149766DDDA3320F02B443AD7B5439634EDBD500509FF9026AFF004F6D8911F5FBA139B9FD17A2E40A29639B9294
25,197,746 UART: [art] SIG.R = 583518284146BB6FA3FF751D4865821FD88D39B145C946B9FC6E73ACFB5C10D75BEBBADD6BAFA16F7CD51A5781B2F750
25,205,207 UART: [art] SIG.S = 83CF5564E5AB42E18EDD9F4D5E3C68282290780B9629CE5CAB2D97ECC152B172AC1313D05CB1B2F2D2A5E0727DF7593A
26,183,642 UART: Caliptra RT
26,184,327 UART: [state] CFI Enabled
26,301,163 UART: [rt] RT listening for mailbox commands...
26,332,398 UART: [rt]cmd =0x46505344, len=4
26,442,371 >>> mbox cmd response data (8 bytes)
26,442,869 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,443,159 UART: Fatal Error: 0x000E0008
26,444,385 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,647 UART: [kat] SHA2-256
892,585 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,853 UART: [cold-reset] ++
1,477,345 UART: [fht] Storing FHT @ 0x50003400
1,480,218 UART: [idev] ++
1,480,386 UART: [idev] CDI.KEYID = 6
1,480,746 UART: [idev] SUBJECT.KEYID = 7
1,481,170 UART: [idev] UDS.KEYID = 0
1,481,515 ready_for_fw is high
1,481,515 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,470 UART: [idev] Erasing UDS.KEYID = 0
1,506,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,666 UART: [idev] --
1,515,903 UART: [ldev] ++
1,516,071 UART: [ldev] CDI.KEYID = 6
1,516,434 UART: [ldev] SUBJECT.KEYID = 5
1,516,860 UART: [ldev] AUTHORITY.KEYID = 7
1,517,323 UART: [ldev] FE.KEYID = 1
1,522,341 UART: [ldev] Erasing FE.KEYID = 1
1,547,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,100 UART: [ldev] --
1,586,387 UART: [fwproc] Waiting for Commands...
1,587,024 UART: [fwproc] Received command 0x46574c44
1,587,815 UART: [fwproc] Received Image of size 114360 bytes
2,884,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,110 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,379 >>> mbox cmd response: success
3,077,379 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,078,559 UART: [afmc] ++
3,078,727 UART: [afmc] CDI.KEYID = 6
3,079,089 UART: [afmc] SUBJECT.KEYID = 7
3,079,514 UART: [afmc] AUTHORITY.KEYID = 5
3,114,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,101 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,494 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,184 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,929 UART: [afmc] --
3,157,939 UART: [cold-reset] --
3,158,741 UART: [state] Locking Datavault
3,160,196 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,800 UART: [state] Locking ICCM
3,161,320 UART: [exit] Launching FMC @ 0x40000130
3,166,649 UART:
3,166,665 UART: Running Caliptra FMC ...
3,167,073 UART:
3,167,127 UART: [state] CFI Enabled
3,177,442 UART: [fht] FMC Alias Private Key: 7
3,286,133 UART: [art] Extend RT PCRs Done
3,286,561 UART: [art] Lock RT PCRs Done
3,287,991 UART: [art] Populate DV Done
3,296,530 UART: [fht] FMC Alias Private Key: 7
3,297,672 UART: [art] Derive CDI
3,297,952 UART: [art] Store in in slot 0x4
3,383,703 UART: [art] Derive Key Pair
3,384,063 UART: [art] Store priv key in slot 0x5
3,397,471 UART: [art] Derive Key Pair - Done
3,412,153 UART: [art] Signing Cert with AUTHO
3,412,633 UART: RITY.KEYID = 7
3,427,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,628 UART: [art] PUB.X = 49FE613CD4811E51A18B63F3ADDE309BA1F18EDA8681A58AF5A621BB253D36DD52702F5F1172645E046E87179E33A53D
3,435,401 UART: [art] PUB.Y = D6541228243FE859BC11F672E066EDF23850CE8A3A6F7AD22F46368E1CABF28E834C74DD1DA487C48D4986047AFAFD00
3,442,336 UART: [art] SIG.R = 0B2EB27BECD428C685F24123E9C7846DE5F0CE077E90EADDAD2DCB0772FECC4DBA16D7FDDAA3E0B9EA4F9608E1AAA982
3,449,128 UART: [art] SIG.S = 3884165BB60FD3AB4D38D3B0188BA7987CAA83B8ED228622BEB77FF4B8BFE2F7261BBEAB537DD5206BB9D5522AB36450
3,472,852 UART: Caliptra RT
3,473,106 UART: [state] CFI Enabled
3,580,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,452 UART: [rt]cmd =0x46505344, len=4
3,718,758 >>> mbox cmd response data (8 bytes)
3,718,759 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,718,796 UART: Fatal Error: 0x000E0008
3,719,930 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,481 ready_for_fw is high
1,362,481 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,795 >>> mbox cmd response: success
2,926,795 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,989,141 UART:
2,989,157 UART: Running Caliptra FMC ...
2,989,565 UART:
2,989,619 UART: [state] CFI Enabled
2,999,862 UART: [fht] FMC Alias Private Key: 7
3,107,697 UART: [art] Extend RT PCRs Done
3,108,125 UART: [art] Lock RT PCRs Done
3,109,727 UART: [art] Populate DV Done
3,117,944 UART: [fht] FMC Alias Private Key: 7
3,118,900 UART: [art] Derive CDI
3,119,180 UART: [art] Store in in slot 0x4
3,204,587 UART: [art] Derive Key Pair
3,204,947 UART: [art] Store priv key in slot 0x5
3,218,467 UART: [art] Derive Key Pair - Done
3,233,117 UART: [art] Signing Cert with AUTHO
3,233,597 UART: RITY.KEYID = 7
3,248,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,348 UART: [art] PUB.X = D909BAE7ED766C1C479471A80F2AAA22D64451CCC8A196622915D19315FCB591CEE91B1754C3F33630A87423A9724E45
3,256,112 UART: [art] PUB.Y = FFB3242BDCB87913DCA85535BDE14B6E3213B10579D6CDDC5AE82D6C78BFF5AD4BA033097AF9945FF08AA0508A630573
3,263,069 UART: [art] SIG.R = 52E139819197BB3E893C979529C3CA1F92B910FDA3E721A8EF00FEB0F7D320E38144F7ADBFDDEAC743DB7B1587314EA3
3,269,831 UART: [art] SIG.S = 448A59D79BF3892E1E7CFEB8E0A443EFD671FE88FC7F5F4D89906D68F89894C441DDB1795191046ACC5550BC24AA3501
3,293,582 UART: Caliptra RT
3,293,836 UART: [state] CFI Enabled
3,401,127 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,474 UART: [rt]cmd =0x46505344, len=4
3,539,622 >>> mbox cmd response data (8 bytes)
3,539,623 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,539,660 UART: Fatal Error: 0x000E0008
3,540,794 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,518 UART: [kat] SHA2-256
892,456 UART: [kat] SHA2-384
895,283 UART: [kat] SHA2-512-ACC
897,184 UART: [kat] ECC-384
902,541 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,492 UART: [cold-reset] ++
1,476,892 UART: [fht] Storing FHT @ 0x50003400
1,479,521 UART: [idev] ++
1,479,689 UART: [idev] CDI.KEYID = 6
1,480,049 UART: [idev] SUBJECT.KEYID = 7
1,480,473 UART: [idev] UDS.KEYID = 0
1,480,818 ready_for_fw is high
1,480,818 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,525 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,289 UART: [idev] --
1,515,380 UART: [ldev] ++
1,515,548 UART: [ldev] CDI.KEYID = 6
1,515,911 UART: [ldev] SUBJECT.KEYID = 5
1,516,337 UART: [ldev] AUTHORITY.KEYID = 7
1,516,800 UART: [ldev] FE.KEYID = 1
1,522,214 UART: [ldev] Erasing FE.KEYID = 1
1,547,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,727 UART: [ldev] --
1,587,152 UART: [fwproc] Waiting for Commands...
1,587,969 UART: [fwproc] Received command 0x46574c44
1,588,760 UART: [fwproc] Received Image of size 114360 bytes
2,886,725 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,474 >>> mbox cmd response: success
3,079,474 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,080,676 UART: [afmc] ++
3,080,844 UART: [afmc] CDI.KEYID = 6
3,081,206 UART: [afmc] SUBJECT.KEYID = 7
3,081,631 UART: [afmc] AUTHORITY.KEYID = 5
3,117,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,253 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,943 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,744 UART: [afmc] --
3,160,666 UART: [cold-reset] --
3,161,398 UART: [state] Locking Datavault
3,162,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,075 UART: [state] Locking ICCM
3,163,621 UART: [exit] Launching FMC @ 0x40000130
3,168,950 UART:
3,168,966 UART: Running Caliptra FMC ...
3,169,374 UART:
3,169,517 UART: [state] CFI Enabled
3,180,312 UART: [fht] FMC Alias Private Key: 7
3,288,195 UART: [art] Extend RT PCRs Done
3,288,623 UART: [art] Lock RT PCRs Done
3,290,345 UART: [art] Populate DV Done
3,298,494 UART: [fht] FMC Alias Private Key: 7
3,299,484 UART: [art] Derive CDI
3,299,764 UART: [art] Store in in slot 0x4
3,385,313 UART: [art] Derive Key Pair
3,385,673 UART: [art] Store priv key in slot 0x5
3,398,395 UART: [art] Derive Key Pair - Done
3,412,990 UART: [art] Signing Cert with AUTHO
3,413,470 UART: RITY.KEYID = 7
3,428,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,369 UART: [art] PUB.X = A3BE155B695FFD854800B7EDB648EC14734470976A551E2998E69913AA611A96450D3FDD01AF9A2DCD307909A61ED3DA
3,436,114 UART: [art] PUB.Y = BB334C50AAC5E17BB8247F4BE06B7EB71E5C7C959FFA2E93C5388B385D6DE0E80BED543D382C568444D8D100A933AE3B
3,443,055 UART: [art] SIG.R = C831B33CF5AD11877A0FEEEB79267E8F65F525CB0C38453AF95A9F31906D0CF5B95E9D5E90062B3AD7A3E56A273B2151
3,449,823 UART: [art] SIG.S = D54FDF755532D4E203E89339E37CF702B44B5AA233844EBEFE5C9B2B7739C7F1FDC11B6F8DE5BA16DFCA3DAC74B4228A
3,473,792 UART: Caliptra RT
3,474,138 UART: [state] CFI Enabled
3,582,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,954 UART: [rt]cmd =0x46505344, len=4
3,721,138 >>> mbox cmd response data (8 bytes)
3,721,139 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,721,176 UART: Fatal Error: 0x000E0008
3,722,310 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,832 ready_for_fw is high
1,362,832 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,671 >>> mbox cmd response: success
2,928,671 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,990,979 UART:
2,990,995 UART: Running Caliptra FMC ...
2,991,403 UART:
2,991,546 UART: [state] CFI Enabled
3,002,083 UART: [fht] FMC Alias Private Key: 7
3,109,790 UART: [art] Extend RT PCRs Done
3,110,218 UART: [art] Lock RT PCRs Done
3,111,940 UART: [art] Populate DV Done
3,120,045 UART: [fht] FMC Alias Private Key: 7
3,121,123 UART: [art] Derive CDI
3,121,403 UART: [art] Store in in slot 0x4
3,207,516 UART: [art] Derive Key Pair
3,207,876 UART: [art] Store priv key in slot 0x5
3,221,102 UART: [art] Derive Key Pair - Done
3,235,774 UART: [art] Signing Cert with AUTHO
3,236,254 UART: RITY.KEYID = 7
3,251,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,907 UART: [art] PUB.X = B288A619C294A5BAC8F5E82F3468119356E9EC421FBED1DA49D4BCD6C457EEDEC1856789B80E77980BE6C9E431E0DB28
3,258,685 UART: [art] PUB.Y = A1FD867A0C387CF87A17A44C349E7D19BF79E0CCC5319A2E367BCE2CD3C8FA59235C0BED99363D196098793970B8C393
3,265,637 UART: [art] SIG.R = CBD5D169BF73503819E2534D82711639DB0A26EEF0F15B2310C4032E9D6FC1176D9DFBAFCD393BA2DAA7004488E43957
3,272,387 UART: [art] SIG.S = 1498BFB7D3FB8CBE6CC86A110F6B8BEF0ABD4B69A7777D934476D6ED08237C19866F64DC5C21330A98FF27EC5471AADC
3,295,862 UART: Caliptra RT
3,296,208 UART: [state] CFI Enabled
3,404,676 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,827 UART: [rt]cmd =0x46505344, len=4
3,543,285 >>> mbox cmd response data (8 bytes)
3,543,286 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,323 UART: Fatal Error: 0x000E0008
3,544,457 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,374 UART: [kat] SHA2-512-ACC
908,275 UART: [kat] ECC-384
917,732 UART: [kat] HMAC-384Kdf
922,336 UART: [kat] LMS
1,170,664 UART: [kat] --
1,171,521 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,562 UART: [idev] ++
1,174,730 UART: [idev] CDI.KEYID = 6
1,175,090 UART: [idev] SUBJECT.KEYID = 7
1,175,514 UART: [idev] UDS.KEYID = 0
1,175,859 ready_for_fw is high
1,175,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,812 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,307 UART: [idev] --
1,210,415 UART: [ldev] ++
1,210,583 UART: [ldev] CDI.KEYID = 6
1,210,946 UART: [ldev] SUBJECT.KEYID = 5
1,211,372 UART: [ldev] AUTHORITY.KEYID = 7
1,211,835 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,561 UART: [ldev] --
1,283,010 UART: [fwproc] Wait for Commands...
1,283,738 UART: [fwproc] Recv command 0x46574c44
1,284,466 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,166 >>> mbox cmd response: success
2,775,166 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,776,242 UART: [afmc] ++
2,776,410 UART: [afmc] CDI.KEYID = 6
2,776,772 UART: [afmc] SUBJECT.KEYID = 7
2,777,197 UART: [afmc] AUTHORITY.KEYID = 5
2,812,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,789 UART: [afmc] --
2,855,879 UART: [cold-reset] --
2,856,817 UART: [state] Locking Datavault
2,858,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,644 UART: [state] Locking ICCM
2,859,300 UART: [exit] Launching FMC @ 0x40000130
2,864,629 UART:
2,864,645 UART: Running Caliptra FMC ...
2,865,053 UART:
2,865,107 UART: [state] CFI Enabled
2,875,610 UART: [fht] FMC Alias Private Key: 7
2,983,417 UART: [art] Extend RT PCRs Done
2,983,845 UART: [art] Lock RT PCRs Done
2,985,455 UART: [art] Populate DV Done
2,993,554 UART: [fht] FMC Alias Private Key: 7
2,994,532 UART: [art] Derive CDI
2,994,812 UART: [art] Store in in slot 0x4
3,080,457 UART: [art] Derive Key Pair
3,080,817 UART: [art] Store priv key in slot 0x5
3,093,727 UART: [art] Derive Key Pair - Done
3,108,509 UART: [art] Signing Cert with AUTHO
3,108,989 UART: RITY.KEYID = 7
3,124,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,946 UART: [art] PUB.X = B64351805D809F52DA0E43E948A7C1A54CDA86E2D51DA6670600362433E72128EBB64AC8C20E2E9B778286D411ACECDE
3,131,691 UART: [art] PUB.Y = 1583E05E88779F67A99D78AE6E52C4B81FEA92B3A302CE01A7A7C5839FEC66E1462D0D0AB6777A5631C4E0550EABC244
3,138,634 UART: [art] SIG.R = 6EB3977DF804308F9A7C0FC892C8D98AE914B45AE4877F68E1D177ACA249633EEBEA6CD7C3E789153BC34AF51460BE2C
3,145,412 UART: [art] SIG.S = 9DA533A259492360436D070DF7ADEB9E133C9527F16E02340DDC609CC2B500198CA52FBBB335D9FC8EEF3F4A0BBCDAF6
3,169,168 UART: Caliptra RT
3,169,422 UART: [state] CFI Enabled
3,277,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,523 UART: [rt]cmd =0x46505344, len=4
3,416,209 >>> mbox cmd response data (8 bytes)
3,416,210 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,416,247 UART: Fatal Error: 0x000E0008
3,417,381 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,363 ready_for_fw is high
1,060,363 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,906 >>> mbox cmd response: success
2,626,906 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,688,010 UART:
2,688,026 UART: Running Caliptra FMC ...
2,688,434 UART:
2,688,488 UART: [state] CFI Enabled
2,698,815 UART: [fht] FMC Alias Private Key: 7
2,807,120 UART: [art] Extend RT PCRs Done
2,807,548 UART: [art] Lock RT PCRs Done
2,809,190 UART: [art] Populate DV Done
2,817,443 UART: [fht] FMC Alias Private Key: 7
2,818,537 UART: [art] Derive CDI
2,818,817 UART: [art] Store in in slot 0x4
2,904,034 UART: [art] Derive Key Pair
2,904,394 UART: [art] Store priv key in slot 0x5
2,918,188 UART: [art] Derive Key Pair - Done
2,932,591 UART: [art] Signing Cert with AUTHO
2,933,071 UART: RITY.KEYID = 7
2,948,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,090 UART: [art] PUB.X = BA7B97AB157FA4C495B1273CA2773B9486CC47C810398C0224D061879D8590A184CD0EBBDFAFC67ADFA6F4F063464BDB
2,955,868 UART: [art] PUB.Y = 47838C980DC528EB6F364F3F691AF8BC815B7F15BB7B3471C3DBB0C881C57CB069274E4DEDAD5D9AEDDB1D8AD1B88764
2,962,835 UART: [art] SIG.R = 1C011251BAD1F521A345AE74038E342C0A077FDF6B438EDF24AA01FC6917C9613696AAC88252C76FE53702EEACB43036
2,969,593 UART: [art] SIG.S = 2E4B9FF5BAB0903D6E3D6C0E95CA473C552AE218FA9164A993ED4658E3310D87C3B113BD92FDD54D68EC1C9C1A41E7F5
2,992,974 UART: Caliptra RT
2,993,228 UART: [state] CFI Enabled
3,101,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,789 UART: [rt]cmd =0x46505344, len=4
3,240,051 >>> mbox cmd response data (8 bytes)
3,240,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,240,089 UART: Fatal Error: 0x000E0008
3,241,223 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
893,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,598 UART: [kat] ++
897,750 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,441 UART: [kat] SHA2-512-ACC
908,342 UART: [kat] ECC-384
918,029 UART: [kat] HMAC-384Kdf
922,805 UART: [kat] LMS
1,171,133 UART: [kat] --
1,172,116 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,345 UART: [idev] ++
1,175,513 UART: [idev] CDI.KEYID = 6
1,175,873 UART: [idev] SUBJECT.KEYID = 7
1,176,297 UART: [idev] UDS.KEYID = 0
1,176,642 ready_for_fw is high
1,176,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,238 UART: [idev] Sha1 KeyId Algorithm
1,209,584 UART: [idev] --
1,210,692 UART: [ldev] ++
1,210,860 UART: [ldev] CDI.KEYID = 6
1,211,223 UART: [ldev] SUBJECT.KEYID = 5
1,211,649 UART: [ldev] AUTHORITY.KEYID = 7
1,212,112 UART: [ldev] FE.KEYID = 1
1,217,262 UART: [ldev] Erasing FE.KEYID = 1
1,243,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,990 UART: [ldev] --
1,283,385 UART: [fwproc] Wait for Commands...
1,283,969 UART: [fwproc] Recv command 0x46574c44
1,284,697 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,859 >>> mbox cmd response: success
2,773,859 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,775,061 UART: [afmc] ++
2,775,229 UART: [afmc] CDI.KEYID = 6
2,775,591 UART: [afmc] SUBJECT.KEYID = 7
2,776,016 UART: [afmc] AUTHORITY.KEYID = 5
2,811,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,836 UART: [afmc] --
2,854,870 UART: [cold-reset] --
2,855,844 UART: [state] Locking Datavault
2,856,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,541 UART: [state] Locking ICCM
2,858,081 UART: [exit] Launching FMC @ 0x40000130
2,863,410 UART:
2,863,426 UART: Running Caliptra FMC ...
2,863,834 UART:
2,863,977 UART: [state] CFI Enabled
2,874,578 UART: [fht] FMC Alias Private Key: 7
2,981,901 UART: [art] Extend RT PCRs Done
2,982,329 UART: [art] Lock RT PCRs Done
2,983,811 UART: [art] Populate DV Done
2,992,138 UART: [fht] FMC Alias Private Key: 7
2,993,152 UART: [art] Derive CDI
2,993,432 UART: [art] Store in in slot 0x4
3,079,137 UART: [art] Derive Key Pair
3,079,497 UART: [art] Store priv key in slot 0x5
3,092,505 UART: [art] Derive Key Pair - Done
3,107,151 UART: [art] Signing Cert with AUTHO
3,107,631 UART: RITY.KEYID = 7
3,122,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,250 UART: [art] PUB.X = EBB335838E3CAC381AA5662E2BB4132CD0DD7D28F2AA333B7C49352E81CC0C5DDDC27095AAAAAAB8007A8B9B2FB9070E
3,130,013 UART: [art] PUB.Y = 2C948CE48F7B13F6447DD39C5284581E6BA604858CEE12A10C24CFD6FC1817067B409083092C62B6BB329009AF549BCA
3,136,950 UART: [art] SIG.R = AA3F3694043B6F77ECBF24F40D3A2A8F1A143FFFDD2FB5076B4F8AEB43CB0E46D94167C1691FECE5BAF8AFB270C5E276
3,143,734 UART: [art] SIG.S = 3CB04F4EBC5A117F529C4FF18214D4080DD587C880EEF05FFA74B291990B34756DDA2ABDBFCCD13B8AD370D92B7EE770
3,166,960 UART: Caliptra RT
3,167,306 UART: [state] CFI Enabled
3,274,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,969 UART: [rt]cmd =0x46505344, len=4
3,413,655 >>> mbox cmd response data (8 bytes)
3,413,656 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,413,693 UART: Fatal Error: 0x000E0008
3,414,827 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 ready_for_fw is high
1,060,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,206 >>> mbox cmd response: success
2,626,206 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,689,386 UART:
2,689,402 UART: Running Caliptra FMC ...
2,689,810 UART:
2,689,953 UART: [state] CFI Enabled
2,700,320 UART: [fht] FMC Alias Private Key: 7
2,808,271 UART: [art] Extend RT PCRs Done
2,808,699 UART: [art] Lock RT PCRs Done
2,810,119 UART: [art] Populate DV Done
2,818,350 UART: [fht] FMC Alias Private Key: 7
2,819,318 UART: [art] Derive CDI
2,819,598 UART: [art] Store in in slot 0x4
2,905,261 UART: [art] Derive Key Pair
2,905,621 UART: [art] Store priv key in slot 0x5
2,918,641 UART: [art] Derive Key Pair - Done
2,933,715 UART: [art] Signing Cert with AUTHO
2,934,195 UART: RITY.KEYID = 7
2,949,905 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,670 UART: [art] PUB.X = FF86DBB8C935DBE0E12CE83E3D712EDA191527FE871ED3B0756F3369A00478C6DDD09CD5B1A2CD0065F1B9FDAF665907
2,957,430 UART: [art] PUB.Y = 2744D817CBF0B089CD8D261FDC10A0D9C366B8B17BB32B2A5AD016929AE46A1CE82B0B26B7BEC662B7661E67DA5EEB4A
2,964,397 UART: [art] SIG.R = CBCB60311EF5870D45496C84497B264DB299292DDAF80951244CA85E9F12E46A1C0AD6B18F418926F02F8BC72FDCF53A
2,971,166 UART: [art] SIG.S = A59C4D806BB85E629465F5DAA6904B1E847271DD52C6DC680E9573B5E95D19798FF232CE23BAA6E5DBDF2389C7CAB230
2,995,168 UART: Caliptra RT
2,995,514 UART: [state] CFI Enabled
3,103,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,282 UART: [rt]cmd =0x46505344, len=4
3,242,930 >>> mbox cmd response data (8 bytes)
3,242,931 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,242,968 UART: Fatal Error: 0x000E0008
3,244,102 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Unprovisioned
86,245 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [kat] SHA2-256
891,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,197 UART: [kat] SHA2-256
902,137 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,170,039 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,174,437 ready_for_fw is high
1,174,437 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,157 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,242,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,016 UART: [ldev] --
1,281,310 UART: [fwproc] Wait for Commands...
1,281,987 UART: [fwproc] Recv command 0x46574c44
1,282,720 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,398 >>> mbox cmd response: success
2,772,398 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,773,639 UART: [afmc] ++
2,773,807 UART: [afmc] CDI.KEYID = 6
2,774,170 UART: [afmc] SUBJECT.KEYID = 7
2,774,596 UART: [afmc] AUTHORITY.KEYID = 5
2,809,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,042 UART: [afmc] --
2,853,142 UART: [cold-reset] --
2,853,938 UART: [state] Locking Datavault
2,855,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,789 UART: [state] Locking ICCM
2,856,255 UART: [exit] Launching FMC @ 0x40000130
2,861,584 UART:
2,861,600 UART: Running Caliptra FMC ...
2,862,008 UART:
2,862,062 UART: [state] CFI Enabled
2,872,713 UART: [fht] FMC Alias Private Key: 7
2,980,220 UART: [art] Extend RT PCRs Done
2,980,648 UART: [art] Lock RT PCRs Done
2,982,126 UART: [art] Populate DV Done
2,990,363 UART: [fht] FMC Alias Private Key: 7
2,991,365 UART: [art] Derive CDI
2,991,645 UART: [art] Store in in slot 0x4
3,077,316 UART: [art] Derive Key Pair
3,077,676 UART: [art] Store priv key in slot 0x5
3,091,342 UART: [art] Derive Key Pair - Done
3,105,965 UART: [art] Signing Cert with AUTHO
3,106,445 UART: RITY.KEYID = 7
3,121,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,150 UART: [art] PUB.X = 8CD8818BAF14C93BDC6F99B0D5FABC8A988ABEB23152BFF512B8CD4F8E6D62AAE8728EFAA95956E8480372706C52ADED
3,128,941 UART: [art] PUB.Y = 9E54BE7A1FC91671E6924F32C09D9004400F812FF23C0D41E700C2966288D39202108ED04AE63EC810D5DB7150453D0C
3,135,850 UART: [art] SIG.R = 07640CE627D5B7C0C8627653C2D6FE7444CD9418248D3419DE44AB0C393C2CF5F847C2657162A0C4164A76BB5226A7D9
3,142,609 UART: [art] SIG.S = 805E4C6CA6270E64245402DCE379E47ACD796DFA5D5152DF6DC3FD9120D8C5CE3DA1933E755CE2EFC71DA3EE303FAB4D
3,166,658 UART: Caliptra RT
3,166,912 UART: [state] CFI Enabled
3,274,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,045 UART: [rt]cmd =0x46505344, len=4
3,413,247 >>> mbox cmd response data (8 bytes)
3,413,248 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,413,285 UART: Fatal Error: 0x000E0008
3,414,419 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,868 ready_for_fw is high
1,056,868 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,506 >>> mbox cmd response: success
2,623,506 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,686,794 UART:
2,686,810 UART: Running Caliptra FMC ...
2,687,218 UART:
2,687,272 UART: [state] CFI Enabled
2,697,793 UART: [fht] FMC Alias Private Key: 7
2,805,836 UART: [art] Extend RT PCRs Done
2,806,264 UART: [art] Lock RT PCRs Done
2,807,766 UART: [art] Populate DV Done
2,816,253 UART: [fht] FMC Alias Private Key: 7
2,817,347 UART: [art] Derive CDI
2,817,627 UART: [art] Store in in slot 0x4
2,903,598 UART: [art] Derive Key Pair
2,903,958 UART: [art] Store priv key in slot 0x5
2,917,006 UART: [art] Derive Key Pair - Done
2,931,927 UART: [art] Signing Cert with AUTHO
2,932,407 UART: RITY.KEYID = 7
2,947,501 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,266 UART: [art] PUB.X = 889296B9936E47A8A076DDA7F5EF87DDD7D6B3786D4A20D671087002E32B3613D839612F4F6BA27C0433839A1CA36B31
2,955,025 UART: [art] PUB.Y = 10B210752AA5891E346C5A01CB88B944389308040B6B138B19FEEA2871960767BEA37A832420A8976BC4409831FFF3D8
2,961,952 UART: [art] SIG.R = 97A9808FE67D412CCA476321AF31EA373D8A46635B44509057C86A709220A543BD6B67A5B6BB91AF94E627934AFCACEA
2,968,728 UART: [art] SIG.S = 327B34944148E5FA206A6BFB6E4FB691BBD736ABD3A761C10960A118219EC06B22A7C1528A4BF843D88B2212ABA01E46
2,992,720 UART: Caliptra RT
2,992,974 UART: [state] CFI Enabled
3,100,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,445 UART: [rt]cmd =0x46505344, len=4
3,239,131 >>> mbox cmd response data (8 bytes)
3,239,132 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,239,169 UART: Fatal Error: 0x000E0008
3,240,303 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = No
87,118 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
905,053 UART: [kat] SHA2-512-ACC
906,954 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,174,734 ready_for_fw is high
1,174,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,363 UART: [ldev] --
1,280,833 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,541 >>> mbox cmd response: success
2,772,541 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,773,672 UART: [afmc] ++
2,773,840 UART: [afmc] CDI.KEYID = 6
2,774,203 UART: [afmc] SUBJECT.KEYID = 7
2,774,629 UART: [afmc] AUTHORITY.KEYID = 5
2,811,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,711 UART: [afmc] --
2,854,635 UART: [cold-reset] --
2,855,481 UART: [state] Locking Datavault
2,856,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,284 UART: [state] Locking ICCM
2,857,752 UART: [exit] Launching FMC @ 0x40000130
2,863,081 UART:
2,863,097 UART: Running Caliptra FMC ...
2,863,505 UART:
2,863,648 UART: [state] CFI Enabled
2,873,845 UART: [fht] FMC Alias Private Key: 7
2,982,082 UART: [art] Extend RT PCRs Done
2,982,510 UART: [art] Lock RT PCRs Done
2,984,074 UART: [art] Populate DV Done
2,992,503 UART: [fht] FMC Alias Private Key: 7
2,993,545 UART: [art] Derive CDI
2,993,825 UART: [art] Store in in slot 0x4
3,079,242 UART: [art] Derive Key Pair
3,079,602 UART: [art] Store priv key in slot 0x5
3,092,618 UART: [art] Derive Key Pair - Done
3,107,585 UART: [art] Signing Cert with AUTHO
3,108,065 UART: RITY.KEYID = 7
3,123,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,080 UART: [art] PUB.X = 920D09642458DA0C06010F37D9E4D0F4CE9320FD4333B2F0CF155266A88DFB01BDB641EB8476E1DB0273562FA1C08DA2
3,130,832 UART: [art] PUB.Y = 18C96A517C37F6FF493D8B2BF0432F7C2221EEAC308B9460522EA7A6BB25F3997D239F1C05753019A4C6266108B53F12
3,137,774 UART: [art] SIG.R = 2660E6DCD533A59FEDE4089F2D58E87F1C641B83757EAE1B9753B3F279ADE8E419828E647062F59FBE82CC23DAF478DD
3,144,553 UART: [art] SIG.S = 3C3264654816D6A244A36085559EE077D1AEC4BC668BAAFA2D26C1C5B8881D34C68F678C76F6F9BD87229E00513B0FB0
3,168,817 UART: Caliptra RT
3,169,163 UART: [state] CFI Enabled
3,276,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,098 UART: [rt]cmd =0x46505344, len=4
3,415,212 >>> mbox cmd response data (8 bytes)
3,415,213 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,415,250 UART: Fatal Error: 0x000E0008
3,416,384 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,295 ready_for_fw is high
1,056,295 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,485 >>> mbox cmd response: success
2,623,485 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,684,801 UART:
2,684,817 UART: Running Caliptra FMC ...
2,685,225 UART:
2,685,368 UART: [state] CFI Enabled
2,695,765 UART: [fht] FMC Alias Private Key: 7
2,803,858 UART: [art] Extend RT PCRs Done
2,804,286 UART: [art] Lock RT PCRs Done
2,806,190 UART: [art] Populate DV Done
2,814,337 UART: [fht] FMC Alias Private Key: 7
2,815,413 UART: [art] Derive CDI
2,815,693 UART: [art] Store in in slot 0x4
2,901,216 UART: [art] Derive Key Pair
2,901,576 UART: [art] Store priv key in slot 0x5
2,915,126 UART: [art] Derive Key Pair - Done
2,929,786 UART: [art] Signing Cert with AUTHO
2,930,266 UART: RITY.KEYID = 7
2,945,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,373 UART: [art] PUB.X = 33132B040A313F8EE41B6DC0ED9679A9F7E01FCEF36716C8103E7A8CAFE2D50C626B10160AD0D7F591924EBDEC06E767
2,953,140 UART: [art] PUB.Y = 84728D0A23959BB86D3BC6334037AA75C34707BBB2C30E8F3A72DC1FB26D9F3DC1133E247C5399E69642ECB5EDF0D63F
2,960,091 UART: [art] SIG.R = E3F61AC64874FC787E1AEA50ECF6BE5DAFD039DF48281EBEE19433401D8B2F7C29D90EA645234A6DB9CA19A219D9A7D9
2,966,878 UART: [art] SIG.S = A45B07E140AE221E19C064628502D4710C9440C128EC84367BD69E88FE6CA5B47888C6BABF5AD7800F88A09966F6B4AA
2,990,719 UART: Caliptra RT
2,991,065 UART: [state] CFI Enabled
3,099,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,361 UART: [rt]cmd =0x46505344, len=4
3,237,601 >>> mbox cmd response data (8 bytes)
3,237,602 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,237,639 UART: Fatal Error: 0x000E0008
3,238,773 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,468 UART:
192,834 UART: Running Caliptra ROM ...
194,022 UART:
194,178 UART: [state] CFI Enabled
261,374 UART: [state] LifecycleState = Unprovisioned
263,359 UART: [state] DebugLocked = No
266,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,666 UART: [kat] SHA2-256
441,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,880 UART: [kat] ++
452,343 UART: [kat] sha1
462,997 UART: [kat] SHA2-256
465,715 UART: [kat] SHA2-384
472,616 UART: [kat] SHA2-512-ACC
474,982 UART: [kat] ECC-384
2,765,968 UART: [kat] HMAC-384Kdf
2,778,205 UART: [kat] LMS
3,968,508 UART: [kat] --
3,974,158 UART: [cold-reset] ++
3,975,242 UART: [fht] Storing FHT @ 0x50003400
3,987,709 UART: [idev] ++
3,988,263 UART: [idev] CDI.KEYID = 6
3,989,234 UART: [idev] SUBJECT.KEYID = 7
3,990,472 UART: [idev] UDS.KEYID = 0
3,991,500 ready_for_fw is high
3,991,694 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,116 UART: [idev] Erasing UDS.KEYID = 0
7,325,176 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,503 UART: [idev] --
7,348,974 UART: [ldev] ++
7,349,546 UART: [ldev] CDI.KEYID = 6
7,350,483 UART: [ldev] SUBJECT.KEYID = 5
7,351,657 UART: [ldev] AUTHORITY.KEYID = 7
7,352,981 UART: [ldev] FE.KEYID = 1
7,379,920 UART: [ldev] Erasing FE.KEYID = 1
10,714,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,814 UART: [ldev] --
13,094,447 UART: [fwproc] Waiting for Commands...
13,096,937 UART: [fwproc] Received command 0x46574c44
13,099,113 UART: [fwproc] Received Image of size 114036 bytes
17,153,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,768 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,665 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,617,198 >>> mbox cmd response: success
17,617,743 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,620,912 UART: [afmc] ++
17,621,543 UART: [afmc] CDI.KEYID = 6
17,622,416 UART: [afmc] SUBJECT.KEYID = 7
17,623,676 UART: [afmc] AUTHORITY.KEYID = 5
20,986,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,247 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,599 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,477 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,941 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,149 UART: [afmc] --
23,358,431 UART: [cold-reset] --
23,360,979 UART: [state] Locking Datavault
23,365,637 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,381 UART: [state] Locking ICCM
23,369,388 UART: [exit] Launching FMC @ 0x40000130
23,377,779 UART:
23,378,008 UART: Running Caliptra FMC ...
23,379,105 UART:
23,379,257 UART: [state] CFI Enabled
23,444,280 UART: [fht] FMC Alias Private Key: 7
25,782,138 UART: [art] Extend RT PCRs Done
25,783,369 UART: [art] Lock RT PCRs Done
25,785,124 UART: [art] Populate DV Done
25,790,899 UART: [fht] FMC Alias Private Key: 7
25,792,549 UART: [art] Derive CDI
25,793,281 UART: [art] Store in in slot 0x4
25,852,671 UART: [art] Derive Key Pair
25,853,702 UART: [art] Store priv key in slot 0x5
29,146,097 UART: [art] Derive Key Pair - Done
29,158,613 UART: [art] Signing Cert with AUTHO
29,159,916 UART: RITY.KEYID = 7
31,447,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,754 UART: [art] PUB.X = AEE16C0151CA53B59DEF1CFA44190B2DE1836A8B3490174FF3789A69F0C3DD8EA5A19C9BC8EA3D3540A459BDC7915F17
31,455,996 UART: [art] PUB.Y = B7D0EBF1E978D087F3AB6DBE72A5DDB8C046F1DD829A1EF0EDD3175059E52FEE5E35221DDCEFF607FD24327DB2E9A7C5
31,463,329 UART: [art] SIG.R = 246FBC102A3F42E14BA6CD5589BF15606100FB0E2D7813B9919B0C2891F2D7D81A6B86CBC422D7AADE850F05DE305429
31,470,713 UART: [art] SIG.S = 4F3594699F348D0D05D777D8FDFCD3C578F5210F97DAD08DCFB5EB6E21087697C196CF55CBEAB8E746D5B57B03AAE2EF
32,776,043 UART: Caliptra RT
32,776,741 UART: [state] CFI Enabled
32,956,602 UART: [rt] RT listening for mailbox commands...
32,987,536 UART: [rt]cmd =0x46505652, len=4
32,988,863 UART: [rt] FIPS Version
32,990,068 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
3,784,543 ready_for_fw is high
3,784,941 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,850,009 >>> mbox cmd response: success
17,850,799 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,550,706 UART:
23,551,132 UART: Running Caliptra FMC ...
23,552,238 UART:
23,552,395 UART: [state] CFI Enabled
23,619,234 UART: [fht] FMC Alias Private Key: 7
25,956,738 UART: [art] Extend RT PCRs Done
25,957,964 UART: [art] Lock RT PCRs Done
25,959,533 UART: [art] Populate DV Done
25,965,157 UART: [fht] FMC Alias Private Key: 7
25,966,749 UART: [art] Derive CDI
25,967,555 UART: [art] Store in in slot 0x4
26,027,914 UART: [art] Derive Key Pair
26,028,956 UART: [art] Store priv key in slot 0x5
29,321,753 UART: [art] Derive Key Pair - Done
29,334,549 UART: [art] Signing Cert with AUTHO
29,335,856 UART: RITY.KEYID = 7
31,623,612 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,124 UART: [art] PUB.X = 06EE560F86E2AF51FEE79271523A5A4CD679F23D37BCCEFD3EA05F3C4CD4D3C529FBC24E39ECD516BA76E4501477DE1D
31,632,416 UART: [art] PUB.Y = 800446757FB249A194649EE26635477002A405E18BDAECDCFDAF84E1F6A5888B07915C3A85B3EBA33B5296D747212A5E
31,639,631 UART: [art] SIG.R = 5D5B1DB3E2FF1BC01599FB83D0C3F519489D6FC9D0C482B90B3F0689035A179BB598BBC03EB1523DB43ACE6381C008EB
31,647,013 UART: [art] SIG.S = 1AFD6227808940FD69C88F3DEED86F9A020FF78B86BD18B320C5A57357EA987362A65CB0FEFE1F27D4E4EA5085DF47FE
32,952,004 UART: Caliptra RT
32,952,707 UART: [state] CFI Enabled
33,114,650 UART: [rt] RT listening for mailbox commands...
33,145,901 UART: [rt]cmd =0x46505652, len=4
33,147,142 UART: [rt] FIPS Version
33,148,354 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,362 UART:
192,735 UART: Running Caliptra ROM ...
193,897 UART:
603,430 UART: [state] CFI Enabled
620,569 UART: [state] LifecycleState = Unprovisioned
622,511 UART: [state] DebugLocked = No
623,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,108 UART: [kat] SHA2-256
797,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,401 UART: [kat] ++
808,870 UART: [kat] sha1
820,097 UART: [kat] SHA2-256
822,824 UART: [kat] SHA2-384
828,457 UART: [kat] SHA2-512-ACC
830,829 UART: [kat] ECC-384
3,114,870 UART: [kat] HMAC-384Kdf
3,127,110 UART: [kat] LMS
4,317,247 UART: [kat] --
4,323,355 UART: [cold-reset] ++
4,325,603 UART: [fht] Storing FHT @ 0x50003400
4,337,228 UART: [idev] ++
4,337,790 UART: [idev] CDI.KEYID = 6
4,338,817 UART: [idev] SUBJECT.KEYID = 7
4,339,988 UART: [idev] UDS.KEYID = 0
4,341,038 ready_for_fw is high
4,341,277 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,598 UART: [idev] Erasing UDS.KEYID = 0
7,627,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,281 UART: [idev] --
7,652,270 UART: [ldev] ++
7,652,832 UART: [ldev] CDI.KEYID = 6
7,653,797 UART: [ldev] SUBJECT.KEYID = 5
7,655,008 UART: [ldev] AUTHORITY.KEYID = 7
7,656,241 UART: [ldev] FE.KEYID = 1
7,670,011 UART: [ldev] Erasing FE.KEYID = 1
10,960,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,454 UART: [ldev] --
13,322,711 UART: [fwproc] Waiting for Commands...
13,325,895 UART: [fwproc] Received command 0x46574c44
13,328,074 UART: [fwproc] Received Image of size 114036 bytes
17,386,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,470,236 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,539,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,856,856 >>> mbox cmd response: success
17,857,389 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,861,148 UART: [afmc] ++
17,861,725 UART: [afmc] CDI.KEYID = 6
17,862,629 UART: [afmc] SUBJECT.KEYID = 7
17,863,898 UART: [afmc] AUTHORITY.KEYID = 5
21,179,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,475,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,477,744 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,492,127 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,506,940 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,521,428 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,543,037 UART: [afmc] --
23,546,042 UART: [cold-reset] --
23,551,576 UART: [state] Locking Datavault
23,556,926 UART: [state] Locking PCR0, PCR1 and PCR31
23,558,676 UART: [state] Locking ICCM
23,560,067 UART: [exit] Launching FMC @ 0x40000130
23,568,462 UART:
23,568,693 UART: Running Caliptra FMC ...
23,569,788 UART:
23,569,945 UART: [state] CFI Enabled
23,577,883 UART: [fht] FMC Alias Private Key: 7
25,909,129 UART: [art] Extend RT PCRs Done
25,910,352 UART: [art] Lock RT PCRs Done
25,912,080 UART: [art] Populate DV Done
25,917,332 UART: [fht] FMC Alias Private Key: 7
25,919,104 UART: [art] Derive CDI
25,919,903 UART: [art] Store in in slot 0x4
25,962,204 UART: [art] Derive Key Pair
25,963,212 UART: [art] Store priv key in slot 0x5
29,205,692 UART: [art] Derive Key Pair - Done
29,218,580 UART: [art] Signing Cert with AUTHO
29,219,874 UART: RITY.KEYID = 7
31,499,787 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,290 UART: [art] PUB.X = 397B2DBF4441E198B4CA3B5DC36B0CB946E33CA30837E314459173F823B299A78CBBFB8640F2EB6CCE1E362400A9B8F6
31,508,539 UART: [art] PUB.Y = 87468F748E496BC3B3F6FA40EFE030197F9D0343A813DC65B7278398BAD333BEF15F3BCD3B2A7A64F67BABDCAA393287
31,515,830 UART: [art] SIG.R = 013EC525570A9088A32F8E3EBFFB2CD1A432AEF9BB00F3099057CCB9DDDDFF8BB1D94E3798293D6B7D1EA0C7BDCB96D9
31,523,207 UART: [art] SIG.S = 56210D15B6F087C211BCAC891C64964AA902E78604277DA537E70DE519B0A49F9D1AFCAC0BD148D4F842017121B1F8F2
32,828,364 UART: Caliptra RT
32,829,059 UART: [state] CFI Enabled
32,945,629 UART: [rt] RT listening for mailbox commands...
32,976,553 UART: [rt]cmd =0x46505652, len=4
32,977,863 UART: [rt] FIPS Version
32,978,974 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
4,127,326 ready_for_fw is high
4,127,713 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,063,217 >>> mbox cmd response: success
18,063,935 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,708,602 UART:
23,708,998 UART: Running Caliptra FMC ...
23,710,129 UART:
23,710,286 UART: [state] CFI Enabled
23,718,021 UART: [fht] FMC Alias Private Key: 7
26,048,805 UART: [art] Extend RT PCRs Done
26,050,034 UART: [art] Lock RT PCRs Done
26,051,936 UART: [art] Populate DV Done
26,057,251 UART: [fht] FMC Alias Private Key: 7
26,058,801 UART: [art] Derive CDI
26,059,564 UART: [art] Store in in slot 0x4
26,102,771 UART: [art] Derive Key Pair
26,103,840 UART: [art] Store priv key in slot 0x5
29,345,695 UART: [art] Derive Key Pair - Done
29,358,583 UART: [art] Signing Cert with AUTHO
29,359,932 UART: RITY.KEYID = 7
31,639,262 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,765 UART: [art] PUB.X = A2C0994CE817ED31B396577B5445F8176DCB50F0E954333611388E1D60C552D3A8F2D81240D19206DEB618A680CA6D0D
31,647,979 UART: [art] PUB.Y = 68DE9E00AB211B8FF5407FBF9D39EDC49EEF4B6DFD2DC19FB584FEFA058807D04C0C0BC7C8854589708FFE5289C3CAFF
31,655,241 UART: [art] SIG.R = A93C3AF7B8064791F049677FFB0CBAE8766FE5F360D386C636D4AA877E7DFDB731E6EF4EA24DDF1E48ED778B03CCF9B0
31,662,710 UART: [art] SIG.S = 86C76E53C39F1E29AD9E528320265B8D5C031999DF7163B5FA3051EB77108A625B29032DF7636B6EE85410F170E4FDD3
32,968,228 UART: Caliptra RT
32,968,932 UART: [state] CFI Enabled
33,086,588 UART: [rt] RT listening for mailbox commands...
33,117,718 UART: [rt]cmd =0x46505652, len=4
33,118,995 UART: [rt] FIPS Version
33,120,272 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,522 UART:
192,884 UART: Running Caliptra ROM ...
194,075 UART:
194,233 UART: [state] CFI Enabled
266,964 UART: [state] LifecycleState = Unprovisioned
268,871 UART: [state] DebugLocked = No
270,548 UART: [state] WD Timer not started. Device not locked for debugging
274,081 UART: [kat] SHA2-256
453,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,757 UART: [kat] ++
465,207 UART: [kat] sha1
476,287 UART: [kat] SHA2-256
479,296 UART: [kat] SHA2-384
485,219 UART: [kat] SHA2-512-ACC
488,157 UART: [kat] ECC-384
2,950,012 UART: [kat] HMAC-384Kdf
2,972,131 UART: [kat] LMS
3,501,548 UART: [kat] --
3,507,958 UART: [cold-reset] ++
3,509,394 UART: [fht] FHT @ 0x50003400
3,519,595 UART: [idev] ++
3,520,165 UART: [idev] CDI.KEYID = 6
3,521,081 UART: [idev] SUBJECT.KEYID = 7
3,522,327 UART: [idev] UDS.KEYID = 0
3,523,271 ready_for_fw is high
3,523,496 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,418 UART: [idev] Erasing UDS.KEYID = 0
6,028,016 UART: [idev] Sha1 KeyId Algorithm
6,051,100 UART: [idev] --
6,054,946 UART: [ldev] ++
6,055,526 UART: [ldev] CDI.KEYID = 6
6,056,440 UART: [ldev] SUBJECT.KEYID = 5
6,057,602 UART: [ldev] AUTHORITY.KEYID = 7
6,058,888 UART: [ldev] FE.KEYID = 1
6,099,022 UART: [ldev] Erasing FE.KEYID = 1
8,603,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,494 UART: [ldev] --
10,411,329 UART: [fwproc] Wait for Commands...
10,413,104 UART: [fwproc] Recv command 0x46574c44
10,415,201 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,275,551 >>> mbox cmd response: success
14,276,084 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,280,333 UART: [afmc] ++
14,280,918 UART: [afmc] CDI.KEYID = 6
14,281,828 UART: [afmc] SUBJECT.KEYID = 7
14,283,045 UART: [afmc] AUTHORITY.KEYID = 5
16,803,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,490 UART: [afmc] --
18,606,011 UART: [cold-reset] --
18,611,393 UART: [state] Locking Datavault
18,617,464 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,112 UART: [state] Locking ICCM
18,620,129 UART: [exit] Launching FMC @ 0x40000130
18,628,582 UART:
18,628,820 UART: Running Caliptra FMC ...
18,629,924 UART:
18,630,084 UART: [state] CFI Enabled
18,686,906 UART: [fht] FMC Alias Private Key: 7
20,450,158 UART: [art] Extend RT PCRs Done
20,451,360 UART: [art] Lock RT PCRs Done
20,452,781 UART: [art] Populate DV Done
20,458,201 UART: [fht] FMC Alias Private Key: 7
20,459,851 UART: [art] Derive CDI
20,460,671 UART: [art] Store in in slot 0x4
20,518,884 UART: [art] Derive Key Pair
20,519,916 UART: [art] Store priv key in slot 0x5
22,982,485 UART: [art] Derive Key Pair - Done
22,995,266 UART: [art] Signing Cert with AUTHO
22,996,577 UART: RITY.KEYID = 7
24,707,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,879 UART: [art] PUB.X = 5FAF8122B2BB6690DFC48DE2A60A52F872C85231B45AA3D7EEEF174A2522805B3E5EA8E2C34C9DB77E2FC9DF7EAF7A33
24,716,219 UART: [art] PUB.Y = 6B6ECA63693763DDB28026B9891DEB21C5341E8F455C96DE41C3BDD5FBC4AC8A8EA0A5E22DD364428365CB09D56DB3C4
24,723,490 UART: [art] SIG.R = 9469ED5B39B6B0756505FE7C2C4E09039062452BAFF40505CAE298652EACBA96455462DBA453B65424DD1B97772A1E2E
24,730,867 UART: [art] SIG.S = 02E359753487E4C3C5C775D1A1B5E79047A36B6DA0A85F4A9349C1D7F4E5C1C67FE30F1E4A52BF40BE1FB67A7AF4DB12
25,709,516 UART: Caliptra RT
25,710,224 UART: [state] CFI Enabled
25,875,122 UART: [rt] RT listening for mailbox commands...
25,906,107 UART: [rt]cmd =0x46505652, len=4
25,907,407 UART: [rt] FIPS Version
25,908,725 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,339 UART:
192,722 UART: Running Caliptra ROM ...
193,930 UART:
194,090 UART: [state] CFI Enabled
262,965 UART: [state] LifecycleState = Unprovisioned
265,379 UART: [state] DebugLocked = No
267,560 UART: [state] WD Timer not started. Device not locked for debugging
272,019 UART: [kat] SHA2-256
461,902 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,732 UART: [kat] ++
473,228 UART: [kat] sha1
483,602 UART: [kat] SHA2-256
486,620 UART: [kat] SHA2-384
493,576 UART: [kat] SHA2-512-ACC
496,135 UART: [kat] ECC-384
2,948,696 UART: [kat] HMAC-384Kdf
2,971,965 UART: [kat] LMS
3,503,748 UART: [kat] --
3,508,091 UART: [cold-reset] ++
3,509,534 UART: [fht] FHT @ 0x50003400
3,521,936 UART: [idev] ++
3,522,676 UART: [idev] CDI.KEYID = 6
3,523,600 UART: [idev] SUBJECT.KEYID = 7
3,524,778 UART: [idev] UDS.KEYID = 0
3,525,703 ready_for_fw is high
3,525,906 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,875 UART: [idev] Erasing UDS.KEYID = 0
6,029,214 UART: [idev] Sha1 KeyId Algorithm
6,051,874 UART: [idev] --
6,056,849 UART: [ldev] ++
6,057,588 UART: [ldev] CDI.KEYID = 6
6,058,504 UART: [ldev] SUBJECT.KEYID = 5
6,059,665 UART: [ldev] AUTHORITY.KEYID = 7
6,060,902 UART: [ldev] FE.KEYID = 1
6,102,074 UART: [ldev] Erasing FE.KEYID = 1
8,609,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,186 UART: [ldev] --
10,419,373 UART: [fwproc] Wait for Commands...
10,421,639 UART: [fwproc] Recv command 0x46574c44
10,423,894 UART: [fwproc] Recv'd Img size: 114360 bytes
13,866,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,597,837 >>> mbox cmd response: success
14,598,372 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,602,076 UART: [afmc] ++
14,602,775 UART: [afmc] CDI.KEYID = 6
14,604,019 UART: [afmc] SUBJECT.KEYID = 7
14,605,457 UART: [afmc] AUTHORITY.KEYID = 5
17,132,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,873,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,888,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,903,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,928,368 UART: [afmc] --
18,931,749 UART: [cold-reset] --
18,934,753 UART: [state] Locking Datavault
18,939,961 UART: [state] Locking PCR0, PCR1 and PCR31
18,942,109 UART: [state] Locking ICCM
18,944,539 UART: [exit] Launching FMC @ 0x40000130
18,953,213 UART:
18,953,452 UART: Running Caliptra FMC ...
18,954,555 UART:
18,954,711 UART: [state] CFI Enabled
19,013,017 UART: [fht] FMC Alias Private Key: 7
20,777,554 UART: [art] Extend RT PCRs Done
20,778,788 UART: [art] Lock RT PCRs Done
20,780,501 UART: [art] Populate DV Done
20,785,923 UART: [fht] FMC Alias Private Key: 7
20,787,412 UART: [art] Derive CDI
20,788,177 UART: [art] Store in in slot 0x4
20,845,194 UART: [art] Derive Key Pair
20,846,241 UART: [art] Store priv key in slot 0x5
23,309,500 UART: [art] Derive Key Pair - Done
23,322,711 UART: [art] Signing Cert with AUTHO
23,324,016 UART: RITY.KEYID = 7
25,034,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,036,496 UART: [art] PUB.X = 69BAD519D6D9A5C6E4E997DDC885CA4DD4065E68F93DE099EB8EE37D75AF64F9A1794F7151A8C85C606D2963566F4787
25,043,746 UART: [art] PUB.Y = AE5417F90F18C39EA20300EF06938AAF90E4D0CD4E23119040C3BB99C9BC609B7DC65A001D79F3F971A48D995301A45B
25,051,005 UART: [art] SIG.R = 528E8CA082F5364121D97F3F7DC5C0DA263D88D3BF791542BAB946628F7ADA340D8F15C735BEA5DBB39F828FDAA7BF70
25,058,423 UART: [art] SIG.S = 4F93AAFFC12D79BC2E320645ECA88A85DBC17184185D1ADBD5BC49330D26E417FE03B459AD13D032FC7B8BDE95445542
26,036,761 UART: Caliptra RT
26,037,490 UART: [state] CFI Enabled
26,202,327 UART: [rt] RT listening for mailbox commands...
26,233,261 UART: [rt]cmd =0x46505652, len=4
26,234,567 UART: [rt] FIPS Version
26,235,888 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,418,108 ready_for_fw is high
3,418,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,712,373 >>> mbox cmd response: success
14,713,132 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,025,051 UART:
19,025,443 UART: Running Caliptra FMC ...
19,026,585 UART:
19,026,747 UART: [state] CFI Enabled
19,092,807 UART: [fht] FMC Alias Private Key: 7
20,857,493 UART: [art] Extend RT PCRs Done
20,858,721 UART: [art] Lock RT PCRs Done
20,860,268 UART: [art] Populate DV Done
20,865,690 UART: [fht] FMC Alias Private Key: 7
20,867,279 UART: [art] Derive CDI
20,868,015 UART: [art] Store in in slot 0x4
20,925,361 UART: [art] Derive Key Pair
20,926,402 UART: [art] Store priv key in slot 0x5
23,388,308 UART: [art] Derive Key Pair - Done
23,401,298 UART: [art] Signing Cert with AUTHO
23,402,606 UART: RITY.KEYID = 7
25,113,381 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,895 UART: [art] PUB.X = 968763669E86E39ED2D87244AB28D7C35042377EC742325B34936ABF325ED198397ED8839CF93A42DB896F1CC3346DB2
25,122,142 UART: [art] PUB.Y = FAF619DC1BC8CCB94A77824C256BE1DC85974BF66CC1FBCDC89F2518A1E41104520D20FE1AD2F3F4670650D17DA4B941
25,129,427 UART: [art] SIG.R = AD7624112AD22CCD715F1EA168CF5B956A587F7CC4E04AD0FE3C526260972AF2015716F3BB8B6231137FC4799B6889D0
25,136,820 UART: [art] SIG.S = 7D4D63C41A1120C91AEDED2A15EE4B48D4D67B888D06C77178EAE645360C3F305B614B9DEE7212825F1ECE9BDEF9B6A8
26,115,955 UART: Caliptra RT
26,116,664 UART: [state] CFI Enabled
26,281,394 UART: [rt] RT listening for mailbox commands...
26,312,379 UART: [rt]cmd =0x46505652, len=4
26,313,682 UART: [rt] FIPS Version
26,314,737 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,547 UART:
192,904 UART: Running Caliptra ROM ...
194,101 UART:
603,770 UART: [state] CFI Enabled
615,393 UART: [state] LifecycleState = Unprovisioned
617,795 UART: [state] DebugLocked = No
620,540 UART: [state] WD Timer not started. Device not locked for debugging
625,847 UART: [kat] SHA2-256
815,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,534 UART: [kat] ++
827,136 UART: [kat] sha1
838,510 UART: [kat] SHA2-256
841,589 UART: [kat] SHA2-384
847,716 UART: [kat] SHA2-512-ACC
850,292 UART: [kat] ECC-384
3,295,370 UART: [kat] HMAC-384Kdf
3,309,592 UART: [kat] LMS
3,841,406 UART: [kat] --
3,845,855 UART: [cold-reset] ++
3,847,728 UART: [fht] FHT @ 0x50003400
3,858,987 UART: [idev] ++
3,859,698 UART: [idev] CDI.KEYID = 6
3,860,652 UART: [idev] SUBJECT.KEYID = 7
3,861,893 UART: [idev] UDS.KEYID = 0
3,862,792 ready_for_fw is high
3,862,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,138 UART: [idev] Erasing UDS.KEYID = 0
6,339,388 UART: [idev] Sha1 KeyId Algorithm
6,362,025 UART: [idev] --
6,366,720 UART: [ldev] ++
6,367,398 UART: [ldev] CDI.KEYID = 6
6,368,306 UART: [ldev] SUBJECT.KEYID = 5
6,369,519 UART: [ldev] AUTHORITY.KEYID = 7
6,370,743 UART: [ldev] FE.KEYID = 1
6,381,344 UART: [ldev] Erasing FE.KEYID = 1
8,862,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,811 UART: [ldev] --
10,652,590 UART: [fwproc] Wait for Commands...
10,655,493 UART: [fwproc] Recv command 0x46574c44
10,657,796 UART: [fwproc] Recv'd Img size: 114360 bytes
14,102,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,145 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,840,356 >>> mbox cmd response: success
14,840,907 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,844,973 UART: [afmc] ++
14,845,725 UART: [afmc] CDI.KEYID = 6
14,846,925 UART: [afmc] SUBJECT.KEYID = 7
14,848,364 UART: [afmc] AUTHORITY.KEYID = 5
17,352,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,307 UART: [afmc] --
19,148,523 UART: [cold-reset] --
19,151,314 UART: [state] Locking Datavault
19,156,885 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,008 UART: [state] Locking ICCM
19,161,159 UART: [exit] Launching FMC @ 0x40000130
19,169,825 UART:
19,170,065 UART: Running Caliptra FMC ...
19,171,188 UART:
19,171,352 UART: [state] CFI Enabled
19,179,412 UART: [fht] FMC Alias Private Key: 7
20,936,757 UART: [art] Extend RT PCRs Done
20,938,154 UART: [art] Lock RT PCRs Done
20,939,703 UART: [art] Populate DV Done
20,945,165 UART: [fht] FMC Alias Private Key: 7
20,946,639 UART: [art] Derive CDI
20,947,409 UART: [art] Store in in slot 0x4
20,990,106 UART: [art] Derive Key Pair
20,991,105 UART: [art] Store priv key in slot 0x5
23,417,937 UART: [art] Derive Key Pair - Done
23,430,824 UART: [art] Signing Cert with AUTHO
23,432,124 UART: RITY.KEYID = 7
25,137,669 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,172 UART: [art] PUB.X = 4FEFEFBD3A7E7C0790006ED062647555A38BEA66BE55FCC36F6888ED53A6952D455568EDAF2A530E0EA6BA8BDB2282CD
25,146,451 UART: [art] PUB.Y = C2F8534432EED76A149E373CD0C1F146FBEA1EE102D4BCFFF382BDA6B1FC4C55867736F421D045EF91A7F06C2762921D
25,153,747 UART: [art] SIG.R = F9367CFE97732101B2430491C1D17C07CCACCB289EF252E52E2CDB5042C81EAEDD33F019EA6E3F702AEDE79E891DE5AB
25,161,141 UART: [art] SIG.S = 868D382441B28A8EAC91C96A17A1E14761B750B140B5BD036719DDCFFDEB0C32DD0219C28A1904417AA3394B4476E35C
26,140,009 UART: Caliptra RT
26,140,711 UART: [state] CFI Enabled
26,258,207 UART: [rt] RT listening for mailbox commands...
26,289,395 UART: [rt]cmd =0x46505652, len=4
26,290,632 UART: [rt] FIPS Version
26,291,790 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,755,004 ready_for_fw is high
3,755,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,957,188 >>> mbox cmd response: success
14,957,835 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,213,196 UART:
19,213,588 UART: Running Caliptra FMC ...
19,214,788 UART:
19,214,968 UART: [state] CFI Enabled
19,222,856 UART: [fht] FMC Alias Private Key: 7
20,979,533 UART: [art] Extend RT PCRs Done
20,980,758 UART: [art] Lock RT PCRs Done
20,982,409 UART: [art] Populate DV Done
20,987,705 UART: [fht] FMC Alias Private Key: 7
20,989,187 UART: [art] Derive CDI
20,989,948 UART: [art] Store in in slot 0x4
21,032,682 UART: [art] Derive Key Pair
21,033,714 UART: [art] Store priv key in slot 0x5
23,460,447 UART: [art] Derive Key Pair - Done
23,473,492 UART: [art] Signing Cert with AUTHO
23,474,798 UART: RITY.KEYID = 7
25,180,226 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,728 UART: [art] PUB.X = A8E57B263420BD3D45AF76AB1E8491F826B80F043DFB9E8FA0913F180BB830948D0190E8798A4A5505BD009FD4CDD006
25,188,967 UART: [art] PUB.Y = 38733230BF091871219E563D27046A2FE740BC9925ED198E99BCE2C54C5711BCB961630239DF5CE26CCFDE1EFF9BEDED
25,196,235 UART: [art] SIG.R = 085288AFF899E018AD5A799CC09A3C1F6A90E308ADB0393BB77EEE1834A514DE44816E959BDB4157D511F9B88D49E4B8
25,203,620 UART: [art] SIG.S = C5CA48BC8F2D7EE7C47DC98BC42FB47B90401DFB0CF9DB6F71E7CED5282E48778DEEF36CB34156DA1B0D57B851E85699
26,182,416 UART: Caliptra RT
26,183,104 UART: [state] CFI Enabled
26,300,445 UART: [rt] RT listening for mailbox commands...
26,331,742 UART: [rt]cmd =0x46505652, len=4
26,333,036 UART: [rt] FIPS Version
26,334,137 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,269 UART: [kat] SHA2-256
882,200 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,315 UART: [kat] ++
886,467 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 ready_for_fw is high
1,480,669 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,812 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,521 UART: [ldev] Erasing FE.KEYID = 1
1,546,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,178 UART: [ldev] --
1,586,687 UART: [fwproc] Waiting for Commands...
1,587,350 UART: [fwproc] Received command 0x46574c44
1,588,141 UART: [fwproc] Received Image of size 114360 bytes
2,886,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,626 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,863 >>> mbox cmd response: success
3,079,863 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,111 UART: [afmc] ++
3,081,279 UART: [afmc] CDI.KEYID = 6
3,081,641 UART: [afmc] SUBJECT.KEYID = 7
3,082,066 UART: [afmc] AUTHORITY.KEYID = 5
3,117,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,276 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,966 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,947 UART: [afmc] --
3,161,029 UART: [cold-reset] --
3,161,757 UART: [state] Locking Datavault
3,162,932 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,536 UART: [state] Locking ICCM
3,164,076 UART: [exit] Launching FMC @ 0x40000130
3,169,405 UART:
3,169,421 UART: Running Caliptra FMC ...
3,169,829 UART:
3,169,883 UART: [state] CFI Enabled
3,180,170 UART: [fht] FMC Alias Private Key: 7
3,288,381 UART: [art] Extend RT PCRs Done
3,288,809 UART: [art] Lock RT PCRs Done
3,290,081 UART: [art] Populate DV Done
3,298,528 UART: [fht] FMC Alias Private Key: 7
3,299,560 UART: [art] Derive CDI
3,299,840 UART: [art] Store in in slot 0x4
3,385,283 UART: [art] Derive Key Pair
3,385,643 UART: [art] Store priv key in slot 0x5
3,398,825 UART: [art] Derive Key Pair - Done
3,413,500 UART: [art] Signing Cert with AUTHO
3,413,980 UART: RITY.KEYID = 7
3,429,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,277 UART: [art] PUB.X = 5521AD1DEF33895CF73A3B3A1D0F85D5A7EE1F045332BD5C6AA2B09B64D23C82186A4F0BBBA09669C48ADB3C26A5C2D4
3,437,056 UART: [art] PUB.Y = B8C42828E2C42E3122D19A8EE7434584CDBBB3AA25A5D144388B2B6706295A438D5C1AC0150DFF7FBD023272CF7FBB07
3,444,004 UART: [art] SIG.R = F4285216FC3C310A7B6E59AD57FB4F9FBEA1EB039EDFBEE5FF403712ECA2B8E4436FA906F8FC284593F2B48D8DA70776
3,450,782 UART: [art] SIG.S = AF53FB34B80A65DA16E835BCCAC2BBB46635A3A649F9BB73D23FF8B95D0A68BE4BC746C20834BBA26DC5407C9CBAAFC0
3,474,330 UART: Caliptra RT
3,474,584 UART: [state] CFI Enabled
3,582,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,744 UART: [rt]cmd =0x46505652, len=4
3,613,415 UART: [rt] FIPS Version
3,614,647 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,825 ready_for_fw is high
1,362,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,125 >>> mbox cmd response: success
2,930,125 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,295 UART:
2,991,311 UART: Running Caliptra FMC ...
2,991,719 UART:
2,991,773 UART: [state] CFI Enabled
3,002,544 UART: [fht] FMC Alias Private Key: 7
3,110,737 UART: [art] Extend RT PCRs Done
3,111,165 UART: [art] Lock RT PCRs Done
3,112,683 UART: [art] Populate DV Done
3,121,050 UART: [fht] FMC Alias Private Key: 7
3,122,026 UART: [art] Derive CDI
3,122,306 UART: [art] Store in in slot 0x4
3,207,551 UART: [art] Derive Key Pair
3,207,911 UART: [art] Store priv key in slot 0x5
3,221,067 UART: [art] Derive Key Pair - Done
3,235,734 UART: [art] Signing Cert with AUTHO
3,236,214 UART: RITY.KEYID = 7
3,251,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,565 UART: [art] PUB.X = 4966AC353E41EB59942E11B3EF1BAA68360E66AD6E701764C225C81107E3D9CFC4082C680762AF1522A1BB7995256DCA
3,259,325 UART: [art] PUB.Y = 8900371E61264F3C35B8512FE68D1AAA1523D0C77F9D8E57BA8CFA7A2F48069839AA01851A91E77007A9325C9C5E7FF5
3,266,246 UART: [art] SIG.R = 9FD30E62764079DBB6D9C78DF308EEA8345D94C27901AB3C9FC2AB33D2CA390B5E7B55A968649019FA48D340DFD89764
3,273,012 UART: [art] SIG.S = 8BFB966750E981349C1018D8E283179CD539C0CF9B32C14963E79B4469DAC7434EE584C18739424856671A3118159727
3,296,233 UART: Caliptra RT
3,296,487 UART: [state] CFI Enabled
3,404,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,119 UART: [rt]cmd =0x46505652, len=4
3,435,790 UART: [rt] FIPS Version
3,436,664 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,099 UART: [state] LifecycleState = Unprovisioned
86,754 UART: [state] DebugLocked = No
87,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,936 UART: [kat] SHA2-256
882,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,982 UART: [kat] ++
887,134 UART: [kat] sha1
891,412 UART: [kat] SHA2-256
893,350 UART: [kat] SHA2-384
896,059 UART: [kat] SHA2-512-ACC
897,960 UART: [kat] ECC-384
903,265 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,584 UART: [cold-reset] ++
1,476,988 UART: [fht] Storing FHT @ 0x50003400
1,479,789 UART: [idev] ++
1,479,957 UART: [idev] CDI.KEYID = 6
1,480,317 UART: [idev] SUBJECT.KEYID = 7
1,480,741 UART: [idev] UDS.KEYID = 0
1,481,086 ready_for_fw is high
1,481,086 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,891 UART: [idev] Erasing UDS.KEYID = 0
1,506,125 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,795 UART: [idev] --
1,515,860 UART: [ldev] ++
1,516,028 UART: [ldev] CDI.KEYID = 6
1,516,391 UART: [ldev] SUBJECT.KEYID = 5
1,516,817 UART: [ldev] AUTHORITY.KEYID = 7
1,517,280 UART: [ldev] FE.KEYID = 1
1,522,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,097 UART: [ldev] --
1,587,456 UART: [fwproc] Waiting for Commands...
1,588,303 UART: [fwproc] Received command 0x46574c44
1,589,094 UART: [fwproc] Received Image of size 114360 bytes
2,886,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,666 >>> mbox cmd response: success
3,079,666 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,814 UART: [afmc] ++
3,080,982 UART: [afmc] CDI.KEYID = 6
3,081,344 UART: [afmc] SUBJECT.KEYID = 7
3,081,769 UART: [afmc] AUTHORITY.KEYID = 5
3,117,048 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,679 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,369 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,224 UART: [afmc] --
3,160,228 UART: [cold-reset] --
3,161,230 UART: [state] Locking Datavault
3,162,593 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,197 UART: [state] Locking ICCM
3,163,801 UART: [exit] Launching FMC @ 0x40000130
3,169,130 UART:
3,169,146 UART: Running Caliptra FMC ...
3,169,554 UART:
3,169,697 UART: [state] CFI Enabled
3,180,330 UART: [fht] FMC Alias Private Key: 7
3,288,079 UART: [art] Extend RT PCRs Done
3,288,507 UART: [art] Lock RT PCRs Done
3,289,727 UART: [art] Populate DV Done
3,298,194 UART: [fht] FMC Alias Private Key: 7
3,299,234 UART: [art] Derive CDI
3,299,514 UART: [art] Store in in slot 0x4
3,385,197 UART: [art] Derive Key Pair
3,385,557 UART: [art] Store priv key in slot 0x5
3,398,937 UART: [art] Derive Key Pair - Done
3,413,694 UART: [art] Signing Cert with AUTHO
3,414,174 UART: RITY.KEYID = 7
3,429,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,009 UART: [art] PUB.X = DB52A6B234703E04793654805E5742FB932CFEFF63DB3A040374C56EAA3705A4C4CBDD19FAD486F0934AA004649ED3C7
3,436,772 UART: [art] PUB.Y = 894E92D2D151930D9D568AE84DF56BAA0C7776842BBAD68039D8C46BB3C2B8BD74FE516CBCB3A42C04F6AC8F4DCAB00C
3,443,732 UART: [art] SIG.R = 69AFB802E2FD8343D37C430F46FD82BBDDFF5FA0E773AC1D37E052BE1B4288F4685A19B81B0E66359EF0A1FFF3FA3204
3,450,508 UART: [art] SIG.S = F5A185CAB7B1BC2CB081803665DB2E4F808EB770CFF3DB64E50B770659DE39A749EFF3355A24809F8E0642AEF4A274F9
3,474,786 UART: Caliptra RT
3,475,132 UART: [state] CFI Enabled
3,583,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,605 UART: [rt]cmd =0x46505652, len=4
3,614,276 UART: [rt] FIPS Version
3,615,378 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,056 ready_for_fw is high
1,363,056 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,364 >>> mbox cmd response: success
2,929,364 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,058 UART:
2,991,074 UART: Running Caliptra FMC ...
2,991,482 UART:
2,991,625 UART: [state] CFI Enabled
3,002,552 UART: [fht] FMC Alias Private Key: 7
3,110,523 UART: [art] Extend RT PCRs Done
3,110,951 UART: [art] Lock RT PCRs Done
3,112,295 UART: [art] Populate DV Done
3,120,280 UART: [fht] FMC Alias Private Key: 7
3,121,446 UART: [art] Derive CDI
3,121,726 UART: [art] Store in in slot 0x4
3,207,551 UART: [art] Derive Key Pair
3,207,911 UART: [art] Store priv key in slot 0x5
3,221,551 UART: [art] Derive Key Pair - Done
3,236,325 UART: [art] Signing Cert with AUTHO
3,236,805 UART: RITY.KEYID = 7
3,251,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,446 UART: [art] PUB.X = 1F1B0503A7E97A9668D402A93DE0EF0906F9D788C4ED99CCDCFA89635F0AF74C769A0A19C0349CDC3A939FA3C741842B
3,259,207 UART: [art] PUB.Y = 02804913B91607EC3C6FEDAF3D806F903394B521C3E8C82B5132FAA1F1A15F48A97F0AE0DFDB94BB1DB5C5F0A0A1254B
3,266,164 UART: [art] SIG.R = 7FB7B88CE9E10896CB9CDD167CD2B4E3FA2D38B6793BD70AFB0340733B2BEE6AB2E16C313EF068C438D623056114339B
3,272,934 UART: [art] SIG.S = 2D92A47E4FA794EBC69E3615C3BEDE4ABF8E661F832B490ED7034E5E61DB0A1B5863974422568C1148BF98DBAE3F0B70
3,297,067 UART: Caliptra RT
3,297,413 UART: [state] CFI Enabled
3,406,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,627 UART: [rt]cmd =0x46505652, len=4
3,437,298 UART: [rt] FIPS Version
3,438,278 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,451 UART: [kat] SHA2-256
903,391 UART: [kat] SHA2-384
906,088 UART: [kat] SHA2-512-ACC
907,989 UART: [kat] ECC-384
917,616 UART: [kat] HMAC-384Kdf
922,154 UART: [kat] LMS
1,170,482 UART: [kat] --
1,171,269 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,552 UART: [idev] ++
1,174,720 UART: [idev] CDI.KEYID = 6
1,175,080 UART: [idev] SUBJECT.KEYID = 7
1,175,504 UART: [idev] UDS.KEYID = 0
1,175,849 ready_for_fw is high
1,175,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,227 UART: [idev] --
1,210,303 UART: [ldev] ++
1,210,471 UART: [ldev] CDI.KEYID = 6
1,210,834 UART: [ldev] SUBJECT.KEYID = 5
1,211,260 UART: [ldev] AUTHORITY.KEYID = 7
1,211,723 UART: [ldev] FE.KEYID = 1
1,216,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,282,064 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,460 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,146 >>> mbox cmd response: success
2,773,146 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,362 UART: [afmc] ++
2,774,530 UART: [afmc] CDI.KEYID = 6
2,774,892 UART: [afmc] SUBJECT.KEYID = 7
2,775,317 UART: [afmc] AUTHORITY.KEYID = 5
2,811,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,799 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,567 UART: [afmc] --
2,854,695 UART: [cold-reset] --
2,855,657 UART: [state] Locking Datavault
2,856,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,352 UART: [state] Locking ICCM
2,858,022 UART: [exit] Launching FMC @ 0x40000130
2,863,351 UART:
2,863,367 UART: Running Caliptra FMC ...
2,863,775 UART:
2,863,829 UART: [state] CFI Enabled
2,874,476 UART: [fht] FMC Alias Private Key: 7
2,982,663 UART: [art] Extend RT PCRs Done
2,983,091 UART: [art] Lock RT PCRs Done
2,984,501 UART: [art] Populate DV Done
2,992,846 UART: [fht] FMC Alias Private Key: 7
2,993,898 UART: [art] Derive CDI
2,994,178 UART: [art] Store in in slot 0x4
3,079,395 UART: [art] Derive Key Pair
3,079,755 UART: [art] Store priv key in slot 0x5
3,092,979 UART: [art] Derive Key Pair - Done
3,108,088 UART: [art] Signing Cert with AUTHO
3,108,568 UART: RITY.KEYID = 7
3,123,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,597 UART: [art] PUB.X = 42987D7634135D966B15162E730D5AB714D02C45DA8BF5326F6B6B3121DFA043A62979B9CE9DB87652275369C54518A2
3,131,356 UART: [art] PUB.Y = 611A03D7A760233BC69FC412109CF6D5006E385F13418C6A90DAF81E42E95AD67E3916FBBE8449046C22000A625B86EC
3,138,253 UART: [art] SIG.R = 09A67F4A3FF76842D3791B45D2BECE758060F2A7FA7119BE7BEF48423A781C6D1608207227DC94786D7E20EDFA3BE5F6
3,145,025 UART: [art] SIG.S = A0038C63470A56860BF47F9E5FB674BFBBE4F4A79CC3FC5EB8AE11A7126DF9D09AEAC769571F2D38DE5BCBE2E57E5F6E
3,168,505 UART: Caliptra RT
3,168,759 UART: [state] CFI Enabled
3,276,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,888 UART: [rt]cmd =0x46505652, len=4
3,307,559 UART: [rt] FIPS Version
3,308,615 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 ready_for_fw is high
1,060,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,577 >>> mbox cmd response: success
2,626,577 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,881 UART:
2,688,897 UART: Running Caliptra FMC ...
2,689,305 UART:
2,689,359 UART: [state] CFI Enabled
2,699,592 UART: [fht] FMC Alias Private Key: 7
2,807,333 UART: [art] Extend RT PCRs Done
2,807,761 UART: [art] Lock RT PCRs Done
2,809,375 UART: [art] Populate DV Done
2,817,434 UART: [fht] FMC Alias Private Key: 7
2,818,396 UART: [art] Derive CDI
2,818,676 UART: [art] Store in in slot 0x4
2,903,889 UART: [art] Derive Key Pair
2,904,249 UART: [art] Store priv key in slot 0x5
2,917,567 UART: [art] Derive Key Pair - Done
2,932,241 UART: [art] Signing Cert with AUTHO
2,932,721 UART: RITY.KEYID = 7
2,947,595 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,360 UART: [art] PUB.X = 4E28EFBC9CDDE614984503A2FFC59A0EE48ABA6719CAA01C611C35EE4D9FB0045DC934B2314CA3F9B0C12BC9EE5F81A5
2,955,145 UART: [art] PUB.Y = 74498AB8A6E9DFA49DB6EC6F325C0537342B29204BFDADBA7E8101913CB8F7313C28E315718312D7530D41B3892A461A
2,962,088 UART: [art] SIG.R = 1954C85BE62C711BE6F4B82B4D884D887FC8F8322427A4A8108D671DD208F80BC7C27CD23C9AA566935F6E801E9BE04A
2,968,858 UART: [art] SIG.S = 8588517237A7BF74607ED5C04BF5D968C8F82D9ABA5CB5CE92D051B63F0F9666E0B0414C67013B86D24C63A3FD8FB987
2,992,459 UART: Caliptra RT
2,992,713 UART: [state] CFI Enabled
3,100,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,104 UART: [rt]cmd =0x46505652, len=4
3,130,775 UART: [rt] FIPS Version
3,131,785 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
893,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,054 UART: [kat] ++
898,206 UART: [kat] sha1
902,402 UART: [kat] SHA2-256
904,342 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,413 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,184 UART: [cold-reset] ++
1,172,596 UART: [fht] FHT @ 0x50003400
1,175,409 UART: [idev] ++
1,175,577 UART: [idev] CDI.KEYID = 6
1,175,937 UART: [idev] SUBJECT.KEYID = 7
1,176,361 UART: [idev] UDS.KEYID = 0
1,176,706 ready_for_fw is high
1,176,706 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,277 UART: [idev] Erasing UDS.KEYID = 0
1,201,132 UART: [idev] Sha1 KeyId Algorithm
1,209,514 UART: [idev] --
1,210,596 UART: [ldev] ++
1,210,764 UART: [ldev] CDI.KEYID = 6
1,211,127 UART: [ldev] SUBJECT.KEYID = 5
1,211,553 UART: [ldev] AUTHORITY.KEYID = 7
1,212,016 UART: [ldev] FE.KEYID = 1
1,216,860 UART: [ldev] Erasing FE.KEYID = 1
1,243,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,718 UART: [ldev] --
1,283,153 UART: [fwproc] Wait for Commands...
1,283,813 UART: [fwproc] Recv command 0x46574c44
1,284,541 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,525 >>> mbox cmd response: success
2,775,525 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,723 UART: [afmc] ++
2,776,891 UART: [afmc] CDI.KEYID = 6
2,777,253 UART: [afmc] SUBJECT.KEYID = 7
2,777,678 UART: [afmc] AUTHORITY.KEYID = 5
2,813,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,150 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,035 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,636 UART: [afmc] --
2,856,764 UART: [cold-reset] --
2,857,652 UART: [state] Locking Datavault
2,858,879 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,483 UART: [state] Locking ICCM
2,860,051 UART: [exit] Launching FMC @ 0x40000130
2,865,380 UART:
2,865,396 UART: Running Caliptra FMC ...
2,865,804 UART:
2,865,947 UART: [state] CFI Enabled
2,876,456 UART: [fht] FMC Alias Private Key: 7
2,984,939 UART: [art] Extend RT PCRs Done
2,985,367 UART: [art] Lock RT PCRs Done
2,987,385 UART: [art] Populate DV Done
2,995,822 UART: [fht] FMC Alias Private Key: 7
2,996,800 UART: [art] Derive CDI
2,997,080 UART: [art] Store in in slot 0x4
3,083,177 UART: [art] Derive Key Pair
3,083,537 UART: [art] Store priv key in slot 0x5
3,097,279 UART: [art] Derive Key Pair - Done
3,112,090 UART: [art] Signing Cert with AUTHO
3,112,570 UART: RITY.KEYID = 7
3,127,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,595 UART: [art] PUB.X = 185F0F7AC966F8B6084CB3A69D7913E6142B9F35CA9C68991CE4FF151F7B93C1F9C305C612C0BEC1E5FB08AF67682739
3,135,361 UART: [art] PUB.Y = D26DF31535481E9572D1F442567B7C8299416A20937FD723B7E16714256FF931C40A3B7E4BAA6DD4B18A919CB22056CD
3,142,306 UART: [art] SIG.R = E1FA1545B78B05DE30E9A772790F28AB0EF9B06245F2CFE4385317E088D87030F2259F613B7B66F71A01924BD917FE12
3,149,064 UART: [art] SIG.S = 588411809B40234DA3280A165B440B05122ADA21DF1B32247830E385496C16E7F0C46C29E6F352D667C02AA2133F0117
3,172,719 UART: Caliptra RT
3,173,065 UART: [state] CFI Enabled
3,281,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,506 UART: [rt]cmd =0x46505652, len=4
3,312,177 UART: [rt] FIPS Version
3,313,477 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,890 ready_for_fw is high
1,060,890 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,310 >>> mbox cmd response: success
2,628,310 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,726 UART:
2,690,742 UART: Running Caliptra FMC ...
2,691,150 UART:
2,691,293 UART: [state] CFI Enabled
2,701,926 UART: [fht] FMC Alias Private Key: 7
2,810,123 UART: [art] Extend RT PCRs Done
2,810,551 UART: [art] Lock RT PCRs Done
2,812,261 UART: [art] Populate DV Done
2,820,608 UART: [fht] FMC Alias Private Key: 7
2,821,728 UART: [art] Derive CDI
2,822,008 UART: [art] Store in in slot 0x4
2,907,647 UART: [art] Derive Key Pair
2,908,007 UART: [art] Store priv key in slot 0x5
2,920,777 UART: [art] Derive Key Pair - Done
2,935,270 UART: [art] Signing Cert with AUTHO
2,935,750 UART: RITY.KEYID = 7
2,950,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,543 UART: [art] PUB.X = 6569596CF065733D355AC8773F6D7605C1B41FD90AEC2F750BF548A0E643786952A3183B8B1AC17449D6A0EFD56791A0
2,958,302 UART: [art] PUB.Y = 16C4FEE942CDEDF4F47CD8B804333734832596C041F324A5D7CCA84C1AA7029F70370DD01FAD2D660DDE3FDDC2908166
2,965,252 UART: [art] SIG.R = 89F8DB320930FC9595C82E352A6EA6AEEF191A2D0B2F96BFE9EDA0058A55CCA546DABC0685C3E64B61A46A05631A37BE
2,972,025 UART: [art] SIG.S = EF6DF40CD08B8E2966B6DEFA5DB925215DDFEB8F851C34BA84C2AB70705BD52DD518EF4DB43A9BB82287BF4F9B984174
2,996,159 UART: Caliptra RT
2,996,505 UART: [state] CFI Enabled
3,104,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,965 UART: [rt]cmd =0x46505652, len=4
3,135,636 UART: [rt] FIPS Version
3,136,608 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,170,005 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,285 UART: [idev] ++
1,173,453 UART: [idev] CDI.KEYID = 6
1,173,814 UART: [idev] SUBJECT.KEYID = 7
1,174,239 UART: [idev] UDS.KEYID = 0
1,174,585 ready_for_fw is high
1,174,585 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,543 UART: [idev] Erasing UDS.KEYID = 0
1,199,373 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,500 UART: [ldev] ++
1,209,668 UART: [ldev] CDI.KEYID = 6
1,210,032 UART: [ldev] SUBJECT.KEYID = 5
1,210,459 UART: [ldev] AUTHORITY.KEYID = 7
1,210,922 UART: [ldev] FE.KEYID = 1
1,215,946 UART: [ldev] Erasing FE.KEYID = 1
1,242,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,616 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,781 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,140 >>> mbox cmd response: success
2,773,140 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,163 UART: [afmc] ++
2,774,331 UART: [afmc] CDI.KEYID = 6
2,774,694 UART: [afmc] SUBJECT.KEYID = 7
2,775,120 UART: [afmc] AUTHORITY.KEYID = 5
2,810,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,458 UART: [afmc] --
2,854,370 UART: [cold-reset] --
2,855,238 UART: [state] Locking Datavault
2,856,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,985 UART: [state] Locking ICCM
2,857,527 UART: [exit] Launching FMC @ 0x40000130
2,862,856 UART:
2,862,872 UART: Running Caliptra FMC ...
2,863,280 UART:
2,863,334 UART: [state] CFI Enabled
2,873,853 UART: [fht] FMC Alias Private Key: 7
2,981,968 UART: [art] Extend RT PCRs Done
2,982,396 UART: [art] Lock RT PCRs Done
2,983,706 UART: [art] Populate DV Done
2,991,735 UART: [fht] FMC Alias Private Key: 7
2,992,765 UART: [art] Derive CDI
2,993,045 UART: [art] Store in in slot 0x4
3,078,996 UART: [art] Derive Key Pair
3,079,356 UART: [art] Store priv key in slot 0x5
3,092,954 UART: [art] Derive Key Pair - Done
3,108,115 UART: [art] Signing Cert with AUTHO
3,108,595 UART: RITY.KEYID = 7
3,123,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,420 UART: [art] PUB.X = 73059F0B4DE91CAABEB39680418BE1B4CEE06ECFE1283686C6908F5BFFD0E26E9BC224539E24472813B1CBDE278BA439
3,131,198 UART: [art] PUB.Y = 38B62D7540401BA465FF41A4821C4F6354C6BEDE659610140CCE64A05A84889E73F328B16E013FEEC1F08EB10573AFA2
3,138,143 UART: [art] SIG.R = DF629CA3FC4091B7D6DCD5E2DCE5453AA3760BEA0B8322C93C6593084F04723581E3918007FB383231836F45022C0A9E
3,144,892 UART: [art] SIG.S = 8955A4D907561628546D93501AC1AD2A341C68AB0F7A6F74B23D4DC72BA781741704A740C9204425D65B055B012CACB2
3,168,388 UART: Caliptra RT
3,168,642 UART: [state] CFI Enabled
3,276,027 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,200 UART: [rt]cmd =0x46505652, len=4
3,306,871 UART: [rt] FIPS Version
3,307,911 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,942 ready_for_fw is high
1,054,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,380 >>> mbox cmd response: success
2,621,380 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,660 UART:
2,683,676 UART: Running Caliptra FMC ...
2,684,084 UART:
2,684,138 UART: [state] CFI Enabled
2,694,683 UART: [fht] FMC Alias Private Key: 7
2,803,048 UART: [art] Extend RT PCRs Done
2,803,476 UART: [art] Lock RT PCRs Done
2,805,058 UART: [art] Populate DV Done
2,813,391 UART: [fht] FMC Alias Private Key: 7
2,814,551 UART: [art] Derive CDI
2,814,831 UART: [art] Store in in slot 0x4
2,901,034 UART: [art] Derive Key Pair
2,901,394 UART: [art] Store priv key in slot 0x5
2,914,732 UART: [art] Derive Key Pair - Done
2,929,745 UART: [art] Signing Cert with AUTHO
2,930,225 UART: RITY.KEYID = 7
2,945,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,182 UART: [art] PUB.X = BC711F9C4FA4011D8C42B3191C6D28ECE0D3DB680659819B870CE3F37F6B78BDC7702581FCBCDD8593D0488EDB7C0847
2,952,952 UART: [art] PUB.Y = 9211DDFDA58B09EE160FCE5B13789DF71BB1F147F69BBB744FF7DC054CF204FB209277A3FD90A6F80D319131C97A32A7
2,959,901 UART: [art] SIG.R = 0B4AE378C830481ACE38218CB19AFE5693020E7CD235A253750F1E978E4FD45EDB3F737E2BC5E2FB45129F8A3D2424EC
2,966,669 UART: [art] SIG.S = FB24FC4BE4EB46C3B0DF0B507B67FD77D2CBAA30D0245B3EEBE0F5CF694681B3100395A2FFA91D4A66A7EBB9455E0921
2,989,613 UART: Caliptra RT
2,989,867 UART: [state] CFI Enabled
3,097,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,194 UART: [rt]cmd =0x46505652, len=4
3,127,865 UART: [rt] FIPS Version
3,129,117 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,812 UART: [kat] ++
895,964 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,174,366 ready_for_fw is high
1,174,366 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,198,736 UART: [idev] Sha1 KeyId Algorithm
1,207,574 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,195 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,113 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,282,200 UART: [fwproc] Recv command 0x46574c44
1,282,933 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,569 >>> mbox cmd response: success
2,772,569 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,830 UART: [afmc] ++
2,773,998 UART: [afmc] CDI.KEYID = 6
2,774,361 UART: [afmc] SUBJECT.KEYID = 7
2,774,787 UART: [afmc] AUTHORITY.KEYID = 5
2,811,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,543 UART: [afmc] --
2,854,523 UART: [cold-reset] --
2,855,421 UART: [state] Locking Datavault
2,856,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,942 UART: [state] Locking ICCM
2,857,614 UART: [exit] Launching FMC @ 0x40000130
2,862,943 UART:
2,862,959 UART: Running Caliptra FMC ...
2,863,367 UART:
2,863,510 UART: [state] CFI Enabled
2,874,127 UART: [fht] FMC Alias Private Key: 7
2,982,692 UART: [art] Extend RT PCRs Done
2,983,120 UART: [art] Lock RT PCRs Done
2,984,900 UART: [art] Populate DV Done
2,993,511 UART: [fht] FMC Alias Private Key: 7
2,994,643 UART: [art] Derive CDI
2,994,923 UART: [art] Store in in slot 0x4
3,080,288 UART: [art] Derive Key Pair
3,080,648 UART: [art] Store priv key in slot 0x5
3,093,424 UART: [art] Derive Key Pair - Done
3,108,296 UART: [art] Signing Cert with AUTHO
3,108,776 UART: RITY.KEYID = 7
3,123,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,623 UART: [art] PUB.X = A29A6D79CCC8A998ADAE51D96A6DAC41F8196A22FD5B18FFF542DF2D1892409C24A74A7163A1DA2DA61FD4E6BFE8BD0B
3,131,416 UART: [art] PUB.Y = F68ABC419692AAF74B3948F3A8C9FB86F0802C156C2EE8E1E218BA07D2D4348BE62798D381044952F098E18C0C24E825
3,138,359 UART: [art] SIG.R = 14878C2AF374006EAE9F7CA38F05F393F2DC889B50F53AE1E92D4DC124F51F2B659B61CCF559DDE8251EB949DE52B638
3,145,116 UART: [art] SIG.S = 6DC2705783F5D9AF9ACF79643983E252A69485708BC8E6737D1BCF9DDB0A024CC3D57F90DD4A5766E920FB3D51088255
3,168,824 UART: Caliptra RT
3,169,170 UART: [state] CFI Enabled
3,277,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,029 UART: [rt]cmd =0x46505652, len=4
3,308,700 UART: [rt] FIPS Version
3,309,958 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,625 ready_for_fw is high
1,056,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,705 >>> mbox cmd response: success
2,624,705 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,459 UART:
2,687,475 UART: Running Caliptra FMC ...
2,687,883 UART:
2,688,026 UART: [state] CFI Enabled
2,698,401 UART: [fht] FMC Alias Private Key: 7
2,806,074 UART: [art] Extend RT PCRs Done
2,806,502 UART: [art] Lock RT PCRs Done
2,808,118 UART: [art] Populate DV Done
2,816,633 UART: [fht] FMC Alias Private Key: 7
2,817,571 UART: [art] Derive CDI
2,817,851 UART: [art] Store in in slot 0x4
2,903,590 UART: [art] Derive Key Pair
2,903,950 UART: [art] Store priv key in slot 0x5
2,916,988 UART: [art] Derive Key Pair - Done
2,931,614 UART: [art] Signing Cert with AUTHO
2,932,094 UART: RITY.KEYID = 7
2,947,444 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,209 UART: [art] PUB.X = A3DF3C05F966005DDB15AE37A6B1187326617987332D960355E89BA6A02AF87ECFA9747063B1031DFE5C3C277E6BCCAC
2,954,956 UART: [art] PUB.Y = BCDB37188DE16BF15276EF6217CE12712C1AC907E8706F5FB1319F490ECCE4EC5BA7BF7D82D9B8CD008D67FD2ED3CAA6
2,961,902 UART: [art] SIG.R = FDB92F9096ACBCF34A89BF05FC8E6EE83A570903F1E79AEB6401B66E0ABEC27558C5D633E927D9F310CFBBEA68F1614C
2,968,679 UART: [art] SIG.S = 88D20FFF3D2BC9F6879E5B736ADE1D0422BAAB80858074745FA04DD5199D1B7A0C169A1CDB659287C8BDC3D178DB8DE7
2,992,443 UART: Caliptra RT
2,992,789 UART: [state] CFI Enabled
3,100,404 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,707 UART: [rt]cmd =0x46505652, len=4
3,131,378 UART: [rt] FIPS Version
3,132,462 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,616 UART:
192,982 UART: Running Caliptra ROM ...
194,167 UART:
194,317 UART: [state] CFI Enabled
266,890 UART: [state] LifecycleState = Unprovisioned
268,860 UART: [state] DebugLocked = No
270,230 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,373 UART: [kat] SHA2-256
444,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,574 UART: [kat] ++
455,013 UART: [kat] sha1
466,481 UART: [kat] SHA2-256
469,178 UART: [kat] SHA2-384
473,463 UART: [kat] SHA2-512-ACC
475,844 UART: [kat] ECC-384
2,764,481 UART: [kat] HMAC-384Kdf
2,779,284 UART: [kat] LMS
3,969,547 UART: [kat] --
3,974,483 UART: [cold-reset] ++
3,976,923 UART: [fht] Storing FHT @ 0x50003400
3,989,285 UART: [idev] ++
3,989,930 UART: [idev] CDI.KEYID = 6
3,990,842 UART: [idev] SUBJECT.KEYID = 7
3,992,082 UART: [idev] UDS.KEYID = 0
3,993,115 ready_for_fw is high
3,993,307 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,719 UART: [idev] Erasing UDS.KEYID = 0
7,326,042 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,673 UART: [idev] --
7,350,341 UART: [ldev] ++
7,350,933 UART: [ldev] CDI.KEYID = 6
7,351,897 UART: [ldev] SUBJECT.KEYID = 5
7,353,099 UART: [ldev] AUTHORITY.KEYID = 7
7,354,381 UART: [ldev] FE.KEYID = 1
7,401,637 UART: [ldev] Erasing FE.KEYID = 1
10,734,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,200 UART: [ldev] --
13,095,700 UART: [fwproc] Waiting for Commands...
13,097,892 UART: [fwproc] Received command 0x46574c44
13,100,081 UART: [fwproc] Received Image of size 114036 bytes
17,157,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,620,878 >>> mbox cmd response: success
17,621,366 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,625,169 UART: [afmc] ++
17,625,743 UART: [afmc] CDI.KEYID = 6
17,626,699 UART: [afmc] SUBJECT.KEYID = 7
17,627,905 UART: [afmc] AUTHORITY.KEYID = 5
20,986,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,762 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,126 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,000 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,394 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,345 UART: [afmc] --
23,356,948 UART: [cold-reset] --
23,361,934 UART: [state] Locking Datavault
23,369,523 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,280 UART: [state] Locking ICCM
23,373,295 UART: [exit] Launching FMC @ 0x40000130
23,381,679 UART:
23,381,918 UART: Running Caliptra FMC ...
23,383,010 UART:
23,383,161 UART: [state] CFI Enabled
23,444,923 UART: [fht] FMC Alias Private Key: 7
25,782,565 UART: [art] Extend RT PCRs Done
25,783,783 UART: [art] Lock RT PCRs Done
25,785,551 UART: [art] Populate DV Done
25,790,957 UART: [fht] FMC Alias Private Key: 7
25,792,607 UART: [art] Derive CDI
25,793,415 UART: [art] Store in in slot 0x4
25,853,749 UART: [art] Derive Key Pair
25,854,774 UART: [art] Store priv key in slot 0x5
29,147,224 UART: [art] Derive Key Pair - Done
29,160,275 UART: [art] Signing Cert with AUTHO
29,161,573 UART: RITY.KEYID = 7
31,450,061 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,566 UART: [art] PUB.X = 29F62D3FD1606A43EF4E725032E9023DEFFD1214940C4C2BBE20273AB8E0B585D87E4ABBC463664F9188A0B5852B3FAC
31,458,810 UART: [art] PUB.Y = 5769E9C61E66863D107DBD18C8054D8C7FD05E6F1D78909C6A3A0961A7E864B2C77AF256F8556225A7B4F6D01A544414
31,466,023 UART: [art] SIG.R = 74D77703BC180286F869C24713790C189F1F04DC731A3A9B5BD63228E95D6CE39110AC67726F8132ADA7CB4167B677AA
31,473,403 UART: [art] SIG.S = 2D2DA1B7957CD8E9EB88C46A272D3CD6F1147A65E5ED4AE2968DBC2FA4871D6256C5080B3904A11C47D14B85EEBD8594
32,778,548 UART: Caliptra RT
32,779,255 UART: [state] CFI Enabled
32,941,759 UART: [rt] RT listening for mailbox commands...
32,972,742 UART: [rt]cmd =0x464d4352, len=4
32,980,472 >>> mbox cmd response data (524 bytes)
33,148,524 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,178,372 UART: [rt]cmd =0x43455252, len=4
33,189,849 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,807,852 ready_for_fw is high
3,808,429 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,878,571 >>> mbox cmd response: success
17,879,208 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,571,800 UART:
23,572,181 UART: Running Caliptra FMC ...
23,573,369 UART:
23,573,533 UART: [state] CFI Enabled
23,640,306 UART: [fht] FMC Alias Private Key: 7
25,977,537 UART: [art] Extend RT PCRs Done
25,978,786 UART: [art] Lock RT PCRs Done
25,980,333 UART: [art] Populate DV Done
25,985,750 UART: [fht] FMC Alias Private Key: 7
25,987,234 UART: [art] Derive CDI
25,987,993 UART: [art] Store in in slot 0x4
26,049,814 UART: [art] Derive Key Pair
26,050,846 UART: [art] Store priv key in slot 0x5
29,343,641 UART: [art] Derive Key Pair - Done
29,356,530 UART: [art] Signing Cert with AUTHO
29,357,837 UART: RITY.KEYID = 7
31,644,788 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,288 UART: [art] PUB.X = 275E36B247A03DC199A0FA8BFDC4A87813DE40C523B41032D429D318B0DC4695E3267D5ECC5D4E113C446D7CB56652EC
31,653,523 UART: [art] PUB.Y = 87E92D729B895B2E69D0D2A5AFBC07B6EF74F6D94675AD6517C2B0486FA7842B9F16C786F2EFB221299DF56990CB6598
31,660,808 UART: [art] SIG.R = F36F7579565F91357BE404F9CAF241DA6C1976089711FFB7598ABEAB96478585673696A5783DB6706B3AEDF6B5AA4AAC
31,668,186 UART: [art] SIG.S = B9288F4CF54AA3A552CB66E28B89E9494737311F15EF543E0238F1E88EFC5E4527A7461731733A94333A9532B73009A2
32,973,542 UART: Caliptra RT
32,974,279 UART: [state] CFI Enabled
33,134,949 UART: [rt] RT listening for mailbox commands...
33,165,876 UART: [rt]cmd =0x464d4352, len=4
33,173,588 >>> mbox cmd response data (524 bytes)
33,341,655 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,371,542 UART: [rt]cmd =0x43455252, len=4
33,382,829 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,385 UART:
192,754 UART: Running Caliptra ROM ...
193,938 UART:
603,397 UART: [state] CFI Enabled
616,371 UART: [state] LifecycleState = Unprovisioned
618,249 UART: [state] DebugLocked = No
620,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,798 UART: [kat] SHA2-256
794,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,067 UART: [kat] ++
805,549 UART: [kat] sha1
817,724 UART: [kat] SHA2-256
820,412 UART: [kat] SHA2-384
825,977 UART: [kat] SHA2-512-ACC
828,354 UART: [kat] ECC-384
3,110,355 UART: [kat] HMAC-384Kdf
3,122,014 UART: [kat] LMS
4,312,162 UART: [kat] --
4,317,313 UART: [cold-reset] ++
4,318,392 UART: [fht] Storing FHT @ 0x50003400
4,329,085 UART: [idev] ++
4,329,658 UART: [idev] CDI.KEYID = 6
4,330,892 UART: [idev] SUBJECT.KEYID = 7
4,332,014 UART: [idev] UDS.KEYID = 0
4,333,079 ready_for_fw is high
4,333,283 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,476,369 UART: [idev] Erasing UDS.KEYID = 0
7,623,473 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,286 UART: [idev] --
7,649,762 UART: [ldev] ++
7,650,326 UART: [ldev] CDI.KEYID = 6
7,651,286 UART: [ldev] SUBJECT.KEYID = 5
7,652,498 UART: [ldev] AUTHORITY.KEYID = 7
7,653,726 UART: [ldev] FE.KEYID = 1
7,664,204 UART: [ldev] Erasing FE.KEYID = 1
10,954,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,835 UART: [ldev] --
13,314,444 UART: [fwproc] Waiting for Commands...
13,316,586 UART: [fwproc] Received command 0x46574c44
13,318,764 UART: [fwproc] Received Image of size 114036 bytes
17,371,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,510 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,392 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,096 >>> mbox cmd response: success
17,833,617 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,837,637 UART: [afmc] ++
17,838,223 UART: [afmc] CDI.KEYID = 6
17,839,241 UART: [afmc] SUBJECT.KEYID = 7
17,840,397 UART: [afmc] AUTHORITY.KEYID = 5
21,158,080 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,535 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,845 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,224 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,056 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,487 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,789 UART: [afmc] --
23,523,599 UART: [cold-reset] --
23,527,836 UART: [state] Locking Datavault
23,532,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,018 UART: [state] Locking ICCM
23,535,178 UART: [exit] Launching FMC @ 0x40000130
23,543,569 UART:
23,543,798 UART: Running Caliptra FMC ...
23,544,833 UART:
23,544,979 UART: [state] CFI Enabled
23,553,406 UART: [fht] FMC Alias Private Key: 7
25,884,067 UART: [art] Extend RT PCRs Done
25,885,282 UART: [art] Lock RT PCRs Done
25,887,161 UART: [art] Populate DV Done
25,892,623 UART: [fht] FMC Alias Private Key: 7
25,894,312 UART: [art] Derive CDI
25,895,045 UART: [art] Store in in slot 0x4
25,938,018 UART: [art] Derive Key Pair
25,939,055 UART: [art] Store priv key in slot 0x5
29,181,339 UART: [art] Derive Key Pair - Done
29,194,491 UART: [art] Signing Cert with AUTHO
29,195,792 UART: RITY.KEYID = 7
31,475,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,122 UART: [art] PUB.X = EDFAE774E50EEEF636AFA7C3F57A58D00D624B331AF21D77CA62CE4A81E8540F371575AB4D0462E9D78B2C97BE9B9DDC
31,484,378 UART: [art] PUB.Y = 3DD5992B73F427D7843B016AE95E83B45424840A5C88C7AA5EE83B59F95B7A1C7C7F59E04AF00F1663141636921ED8E9
31,491,614 UART: [art] SIG.R = 2EBBB2AD566E5D96F09C3DFF9DC13259C7917A84A3CA44AD7B00E2922DB18103ADFB4E9DA42B4D42371988EEF6FEF794
31,499,005 UART: [art] SIG.S = AA36263EC253DB4A56542782F590B3EDC2C9E3CD7AD0DF07E992A073798D5E8BF6866A5B383F5DC3C029112DC92230F8
32,804,071 UART: Caliptra RT
32,804,784 UART: [state] CFI Enabled
32,923,184 UART: [rt] RT listening for mailbox commands...
32,954,328 UART: [rt]cmd =0x464d4352, len=4
32,961,899 >>> mbox cmd response data (524 bytes)
33,130,548 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,160,798 UART: [rt]cmd =0x43455252, len=4
33,172,089 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,123,103 ready_for_fw is high
4,123,780 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,067,599 >>> mbox cmd response: success
18,068,297 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,706,897 UART:
23,707,279 UART: Running Caliptra FMC ...
23,708,418 UART:
23,708,572 UART: [state] CFI Enabled
23,716,186 UART: [fht] FMC Alias Private Key: 7
26,047,502 UART: [art] Extend RT PCRs Done
26,048,723 UART: [art] Lock RT PCRs Done
26,050,191 UART: [art] Populate DV Done
26,055,830 UART: [fht] FMC Alias Private Key: 7
26,057,475 UART: [art] Derive CDI
26,058,304 UART: [art] Store in in slot 0x4
26,101,036 UART: [art] Derive Key Pair
26,102,085 UART: [art] Store priv key in slot 0x5
29,344,131 UART: [art] Derive Key Pair - Done
29,357,074 UART: [art] Signing Cert with AUTHO
29,358,384 UART: RITY.KEYID = 7
31,637,926 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,434 UART: [art] PUB.X = 7007B1A41DB09AF5B644B92F523854511E09FFB0C116C7C883F5519A2619B6E7F778D08636C0DEB1778F43BA9E3DE623
31,646,653 UART: [art] PUB.Y = 3D6D6D918F466A9FC63A178A400BAA31FBB04BF9FBD09A298D97EFF50F129C090879B55BB37681EF4B712141B52EAE7D
31,653,914 UART: [art] SIG.R = 8D8B57F57C67A2935C3BEA94C080767698D27DF3820C621F3AC2A6D689E06E35A37B7F7C0C61283660EC21E55C83DEAA
31,661,292 UART: [art] SIG.S = 39627BE2C08691ED628BE15296BAE23C17D79827420393CA3642B208EB8E39143D00828EBA9161AEF550BDA6B5DC739B
32,966,813 UART: Caliptra RT
32,967,526 UART: [state] CFI Enabled
33,084,402 UART: [rt] RT listening for mailbox commands...
33,115,549 UART: [rt]cmd =0x464d4352, len=4
33,123,061 >>> mbox cmd response data (524 bytes)
33,292,041 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,322,266 UART: [rt]cmd =0x43455252, len=4
33,333,686 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,516 UART:
192,908 UART: Running Caliptra ROM ...
194,060 UART:
194,218 UART: [state] CFI Enabled
262,997 UART: [state] LifecycleState = Unprovisioned
264,923 UART: [state] DebugLocked = No
267,443 UART: [state] WD Timer not started. Device not locked for debugging
270,844 UART: [kat] SHA2-256
449,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,552 UART: [kat] ++
462,017 UART: [kat] sha1
471,761 UART: [kat] SHA2-256
474,765 UART: [kat] SHA2-384
482,471 UART: [kat] SHA2-512-ACC
485,419 UART: [kat] ECC-384
2,949,029 UART: [kat] HMAC-384Kdf
2,971,944 UART: [kat] LMS
3,501,392 UART: [kat] --
3,504,749 UART: [cold-reset] ++
3,507,388 UART: [fht] FHT @ 0x50003400
3,518,162 UART: [idev] ++
3,518,730 UART: [idev] CDI.KEYID = 6
3,519,612 UART: [idev] SUBJECT.KEYID = 7
3,520,859 UART: [idev] UDS.KEYID = 0
3,521,763 ready_for_fw is high
3,521,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,827 UART: [idev] Erasing UDS.KEYID = 0
6,025,840 UART: [idev] Sha1 KeyId Algorithm
6,050,369 UART: [idev] --
6,053,505 UART: [ldev] ++
6,054,077 UART: [ldev] CDI.KEYID = 6
6,054,965 UART: [ldev] SUBJECT.KEYID = 5
6,056,177 UART: [ldev] AUTHORITY.KEYID = 7
6,057,412 UART: [ldev] FE.KEYID = 1
6,099,950 UART: [ldev] Erasing FE.KEYID = 1
8,605,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,324 UART: [ldev] --
10,413,279 UART: [fwproc] Wait for Commands...
10,416,158 UART: [fwproc] Recv command 0x46574c44
10,418,254 UART: [fwproc] Recv'd Img size: 114360 bytes
13,829,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,287,983 >>> mbox cmd response: success
14,288,507 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,292,373 UART: [afmc] ++
14,292,958 UART: [afmc] CDI.KEYID = 6
14,293,869 UART: [afmc] SUBJECT.KEYID = 7
14,295,034 UART: [afmc] AUTHORITY.KEYID = 5
16,830,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,669 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,749 UART: [afmc] --
18,630,213 UART: [cold-reset] --
18,632,725 UART: [state] Locking Datavault
18,637,970 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,671 UART: [state] Locking ICCM
18,641,601 UART: [exit] Launching FMC @ 0x40000130
18,650,060 UART:
18,650,338 UART: Running Caliptra FMC ...
18,651,453 UART:
18,651,614 UART: [state] CFI Enabled
18,711,103 UART: [fht] FMC Alias Private Key: 7
20,475,246 UART: [art] Extend RT PCRs Done
20,476,479 UART: [art] Lock RT PCRs Done
20,478,266 UART: [art] Populate DV Done
20,483,624 UART: [fht] FMC Alias Private Key: 7
20,485,344 UART: [art] Derive CDI
20,486,163 UART: [art] Store in in slot 0x4
20,543,461 UART: [art] Derive Key Pair
20,544,474 UART: [art] Store priv key in slot 0x5
23,007,072 UART: [art] Derive Key Pair - Done
23,020,399 UART: [art] Signing Cert with AUTHO
23,021,709 UART: RITY.KEYID = 7
24,732,954 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,456 UART: [art] PUB.X = 826F3A5B3F22106C6229235761757D8841EF396D72E7B7DFD04895C2E48013D87999CCF2CBC776C8A789A717CDA1F819
24,741,743 UART: [art] PUB.Y = 955CDE747AA25755E906D3AA457CF3216242158A489BEDD79084A6DBAA3D22A5BFBC74BC5AE4AEBD8741A67C07D1F03E
24,749,022 UART: [art] SIG.R = 807CA8F267DDEECB78C59AC3D71DF67D50E95BFEFCACD0D77AD158810B225A05C410B220DF549773E25CE820014904FF
24,756,404 UART: [art] SIG.S = D395114EEA0ADEC6503EBCB740854DDD57F8018EB85A60B872F2735F58F4FB9EB20EEBAD0BA83C747775CECB0E9773A4
25,735,379 UART: Caliptra RT
25,736,097 UART: [state] CFI Enabled
25,912,569 UART: [rt] RT listening for mailbox commands...
25,943,631 UART: [rt]cmd =0x464d4352, len=4
25,951,154 >>> mbox cmd response data (524 bytes)
26,120,243 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,150,229 UART: [rt]cmd =0x43455252, len=4
26,161,581 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,386 UART:
192,761 UART: Running Caliptra ROM ...
193,870 UART:
194,016 UART: [state] CFI Enabled
262,740 UART: [state] LifecycleState = Unprovisioned
265,109 UART: [state] DebugLocked = No
267,356 UART: [state] WD Timer not started. Device not locked for debugging
271,460 UART: [kat] SHA2-256
461,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,178 UART: [kat] ++
472,716 UART: [kat] sha1
482,678 UART: [kat] SHA2-256
485,681 UART: [kat] SHA2-384
491,622 UART: [kat] SHA2-512-ACC
494,208 UART: [kat] ECC-384
2,947,873 UART: [kat] HMAC-384Kdf
2,971,063 UART: [kat] LMS
3,502,818 UART: [kat] --
3,508,514 UART: [cold-reset] ++
3,510,377 UART: [fht] FHT @ 0x50003400
3,522,138 UART: [idev] ++
3,522,844 UART: [idev] CDI.KEYID = 6
3,523,798 UART: [idev] SUBJECT.KEYID = 7
3,524,970 UART: [idev] UDS.KEYID = 0
3,525,870 ready_for_fw is high
3,526,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,918 UART: [idev] Erasing UDS.KEYID = 0
6,026,959 UART: [idev] Sha1 KeyId Algorithm
6,050,196 UART: [idev] --
6,054,874 UART: [ldev] ++
6,055,563 UART: [ldev] CDI.KEYID = 6
6,056,478 UART: [ldev] SUBJECT.KEYID = 5
6,057,642 UART: [ldev] AUTHORITY.KEYID = 7
6,058,878 UART: [ldev] FE.KEYID = 1
6,100,476 UART: [ldev] Erasing FE.KEYID = 1
8,607,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,875 UART: [ldev] --
10,410,814 UART: [fwproc] Wait for Commands...
10,412,528 UART: [fwproc] Recv command 0x46574c44
10,414,783 UART: [fwproc] Recv'd Img size: 114360 bytes
13,860,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,594,461 >>> mbox cmd response: success
14,594,984 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,599,387 UART: [afmc] ++
14,600,087 UART: [afmc] CDI.KEYID = 6
14,601,343 UART: [afmc] SUBJECT.KEYID = 7
14,602,793 UART: [afmc] AUTHORITY.KEYID = 5
17,128,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,200 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,753 UART: [afmc] --
18,947,051 UART: [cold-reset] --
18,951,044 UART: [state] Locking Datavault
18,956,906 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,048 UART: [state] Locking ICCM
18,960,456 UART: [exit] Launching FMC @ 0x40000130
18,969,131 UART:
18,969,367 UART: Running Caliptra FMC ...
18,970,472 UART:
18,970,633 UART: [state] CFI Enabled
19,028,486 UART: [fht] FMC Alias Private Key: 7
20,792,337 UART: [art] Extend RT PCRs Done
20,793,563 UART: [art] Lock RT PCRs Done
20,795,166 UART: [art] Populate DV Done
20,800,525 UART: [fht] FMC Alias Private Key: 7
20,802,169 UART: [art] Derive CDI
20,802,910 UART: [art] Store in in slot 0x4
20,861,595 UART: [art] Derive Key Pair
20,862,653 UART: [art] Store priv key in slot 0x5
23,326,085 UART: [art] Derive Key Pair - Done
23,339,138 UART: [art] Signing Cert with AUTHO
23,340,448 UART: RITY.KEYID = 7
25,051,641 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,159 UART: [art] PUB.X = 14E497744AAF9B45F41CAB7A772C5335EA93E6D1FD8B6C92DD7299A92E265AF6F390313675B5084FBD68EAD938F51F0F
25,060,401 UART: [art] PUB.Y = 19A8A25BFB238B41F881D1BB1339406EFEED67C5B568552C48E0DEE98B23E92BDE089200CA77B478265BBC60814CDDC9
25,067,719 UART: [art] SIG.R = AD29F9697ECD3121B3A097796618BB8C0B8430FB091772FD3B59172F36CD7AD1B40DEC6C1F758B044CC0343DED386A4E
25,075,130 UART: [art] SIG.S = BD421819470FD5D7717602AFDAA06D5A15015A1FA36B9007B7065AE735C2FDA1C087AFDA8BB4B847FD3EA68D91B4EC8D
26,053,528 UART: Caliptra RT
26,054,234 UART: [state] CFI Enabled
26,221,978 UART: [rt] RT listening for mailbox commands...
26,252,969 UART: [rt]cmd =0x464d4352, len=4
26,260,555 >>> mbox cmd response data (524 bytes)
26,429,553 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,459,373 UART: [rt]cmd =0x43455252, len=4
26,470,718 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,440,734 ready_for_fw is high
3,441,121 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,730,305 >>> mbox cmd response: success
14,731,100 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,047,646 UART:
19,048,063 UART: Running Caliptra FMC ...
19,049,215 UART:
19,049,374 UART: [state] CFI Enabled
19,116,215 UART: [fht] FMC Alias Private Key: 7
20,879,447 UART: [art] Extend RT PCRs Done
20,880,668 UART: [art] Lock RT PCRs Done
20,882,513 UART: [art] Populate DV Done
20,888,150 UART: [fht] FMC Alias Private Key: 7
20,889,801 UART: [art] Derive CDI
20,890,617 UART: [art] Store in in slot 0x4
20,948,883 UART: [art] Derive Key Pair
20,949,926 UART: [art] Store priv key in slot 0x5
23,412,391 UART: [art] Derive Key Pair - Done
23,424,900 UART: [art] Signing Cert with AUTHO
23,426,199 UART: RITY.KEYID = 7
25,139,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,720 UART: [art] PUB.X = 34ED0E5487677A8628B9D1942995DAAF0A264966424E62CCE187717A506135711D9B336FA544E0CB8DCB766ACAA38711
25,147,964 UART: [art] PUB.Y = 24140B4413FEC413CDC669A7CC6A349A99C47D6CA778896EB2FA1A27E3A86DE24E5877EC8C583625A58FE6CE0FF1CF99
25,155,258 UART: [art] SIG.R = DF7866F957B6D21CED1F0D75FD5C8767694B13A2299E63B1256BB6B770F557BEB42E5646E392651CB6C53C7B8CBC9841
25,162,675 UART: [art] SIG.S = 49AF25C49A79434F4EA4B4792D4F128CF73020C5824D8C1BE8B46362816E8C3CD0B4551B8ADF996E1AB96033E9165397
26,141,418 UART: Caliptra RT
26,142,104 UART: [state] CFI Enabled
26,307,389 UART: [rt] RT listening for mailbox commands...
26,338,553 UART: [rt]cmd =0x464d4352, len=4
26,346,241 >>> mbox cmd response data (524 bytes)
26,514,973 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,544,840 UART: [rt]cmd =0x43455252, len=4
26,556,222 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,514 writing to cptra_bootfsm_go
192,653 UART:
193,024 UART: Running Caliptra ROM ...
194,236 UART:
604,029 UART: [state] CFI Enabled
618,327 UART: [state] LifecycleState = Unprovisioned
620,700 UART: [state] DebugLocked = No
622,931 UART: [state] WD Timer not started. Device not locked for debugging
627,667 UART: [kat] SHA2-256
817,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,335 UART: [kat] ++
828,856 UART: [kat] sha1
839,657 UART: [kat] SHA2-256
842,659 UART: [kat] SHA2-384
847,728 UART: [kat] SHA2-512-ACC
850,307 UART: [kat] ECC-384
3,292,527 UART: [kat] HMAC-384Kdf
3,305,623 UART: [kat] LMS
3,837,479 UART: [kat] --
3,842,606 UART: [cold-reset] ++
3,845,267 UART: [fht] FHT @ 0x50003400
3,855,751 UART: [idev] ++
3,856,452 UART: [idev] CDI.KEYID = 6
3,858,049 UART: [idev] SUBJECT.KEYID = 7
3,859,653 UART: [idev] UDS.KEYID = 0
3,860,566 ready_for_fw is high
3,860,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,253 UART: [idev] Erasing UDS.KEYID = 0
6,332,679 UART: [idev] Sha1 KeyId Algorithm
6,355,272 UART: [idev] --
6,360,101 UART: [ldev] ++
6,360,798 UART: [ldev] CDI.KEYID = 6
6,361,716 UART: [ldev] SUBJECT.KEYID = 5
6,362,923 UART: [ldev] AUTHORITY.KEYID = 7
6,364,096 UART: [ldev] FE.KEYID = 1
6,373,498 UART: [ldev] Erasing FE.KEYID = 1
8,853,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,053 UART: [ldev] --
10,644,863 UART: [fwproc] Wait for Commands...
10,647,926 UART: [fwproc] Recv command 0x46574c44
10,650,230 UART: [fwproc] Recv'd Img size: 114360 bytes
14,092,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,147 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,830,011 >>> mbox cmd response: success
14,830,529 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,833,641 UART: [afmc] ++
14,834,334 UART: [afmc] CDI.KEYID = 6
14,835,589 UART: [afmc] SUBJECT.KEYID = 7
14,837,020 UART: [afmc] AUTHORITY.KEYID = 5
17,346,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,010 UART: [afmc] --
19,141,829 UART: [cold-reset] --
19,145,422 UART: [state] Locking Datavault
19,151,098 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,292 UART: [state] Locking ICCM
19,154,683 UART: [exit] Launching FMC @ 0x40000130
19,163,345 UART:
19,163,580 UART: Running Caliptra FMC ...
19,164,696 UART:
19,164,857 UART: [state] CFI Enabled
19,172,581 UART: [fht] FMC Alias Private Key: 7
20,928,463 UART: [art] Extend RT PCRs Done
20,929,676 UART: [art] Lock RT PCRs Done
20,931,513 UART: [art] Populate DV Done
20,936,973 UART: [fht] FMC Alias Private Key: 7
20,938,513 UART: [art] Derive CDI
20,939,325 UART: [art] Store in in slot 0x4
20,982,244 UART: [art] Derive Key Pair
20,983,282 UART: [art] Store priv key in slot 0x5
23,409,975 UART: [art] Derive Key Pair - Done
23,422,923 UART: [art] Signing Cert with AUTHO
23,424,228 UART: RITY.KEYID = 7
25,129,711 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,221 UART: [art] PUB.X = E20AE9FF9A02B58BC2FFB3102C54C41AAABC947B74E731EDF5E6BB406C00B7EF86E8DE7E54EE2C6CF1834A04D483053B
25,138,566 UART: [art] PUB.Y = EA2201648E58478637B142B4573B7BC65FF6747101D35882309A7D0CB65C1F8EF574A2D21E969C91DEB650488AB10215
25,145,762 UART: [art] SIG.R = E8B4A352AA217BDFAC147A8DEB2F0DBAD6B6E7A46035A1833D69C7B9F349E74DB68A4D9240340433D66EDE63CADFCD3B
25,153,163 UART: [art] SIG.S = 2AA4CE886953E51EEB339582D5D32C07A982E78AFD178CD701DDDCB1B9306D50C1683964232DCA76747F8A135D403C3E
26,132,020 UART: Caliptra RT
26,132,704 UART: [state] CFI Enabled
26,249,753 UART: [rt] RT listening for mailbox commands...
26,280,982 UART: [rt]cmd =0x464d4352, len=4
26,288,586 >>> mbox cmd response data (524 bytes)
26,456,741 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,486,600 UART: [rt]cmd =0x43455252, len=4
26,497,912 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,752,766 ready_for_fw is high
3,753,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,946,300 >>> mbox cmd response: success
14,946,980 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,198,479 UART:
19,198,860 UART: Running Caliptra FMC ...
19,200,018 UART:
19,200,178 UART: [state] CFI Enabled
19,207,860 UART: [fht] FMC Alias Private Key: 7
20,965,006 UART: [art] Extend RT PCRs Done
20,966,224 UART: [art] Lock RT PCRs Done
20,968,335 UART: [art] Populate DV Done
20,973,738 UART: [fht] FMC Alias Private Key: 7
20,975,437 UART: [art] Derive CDI
20,976,247 UART: [art] Store in in slot 0x4
21,018,466 UART: [art] Derive Key Pair
21,019,500 UART: [art] Store priv key in slot 0x5
23,446,825 UART: [art] Derive Key Pair - Done
23,459,718 UART: [art] Signing Cert with AUTHO
23,461,026 UART: RITY.KEYID = 7
25,166,934 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,416 UART: [art] PUB.X = E295B57ED95F04AD977ABCFE6CB6F208488FC1CA07927743E5283FA108E41260ABD157BAA8F2DC193A84235D2825BCFB
25,175,746 UART: [art] PUB.Y = C389A86E644715147FBF35C0E61828C9BA00D7BB650436744C0B68F023F96E7BA2542E9F839A6126CCDC15C24983FE5D
25,182,947 UART: [art] SIG.R = F0EB10FDEA0EBA95FB78BAF1AEE887AD842A366C57C8BD91250F71FF84A80C07400FADB8270B5C9F8907A723A140D5F3
25,190,332 UART: [art] SIG.S = 4153C157A4403F2452B62274CBDF16C081E940AC341DD03352115B86954743FBAD9435CCDCE58AC980E0D5AD9E679B95
26,169,241 UART: Caliptra RT
26,169,951 UART: [state] CFI Enabled
26,286,798 UART: [rt] RT listening for mailbox commands...
26,317,831 UART: [rt]cmd =0x464d4352, len=4
26,325,495 >>> mbox cmd response data (524 bytes)
26,493,805 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,523,503 UART: [rt]cmd =0x43455252, len=4
26,534,980 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,451 UART: [kat] SHA2-256
882,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,497 UART: [kat] ++
886,649 UART: [kat] sha1
890,945 UART: [kat] SHA2-256
892,883 UART: [kat] SHA2-384
895,714 UART: [kat] SHA2-512-ACC
897,615 UART: [kat] ECC-384
903,428 UART: [kat] HMAC-384Kdf
908,068 UART: [kat] LMS
1,476,264 UART: [kat] --
1,477,311 UART: [cold-reset] ++
1,477,701 UART: [fht] Storing FHT @ 0x50003400
1,480,528 UART: [idev] ++
1,480,696 UART: [idev] CDI.KEYID = 6
1,481,056 UART: [idev] SUBJECT.KEYID = 7
1,481,480 UART: [idev] UDS.KEYID = 0
1,481,825 ready_for_fw is high
1,481,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,534 UART: [idev] Erasing UDS.KEYID = 0
1,505,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,512 UART: [idev] --
1,515,627 UART: [ldev] ++
1,515,795 UART: [ldev] CDI.KEYID = 6
1,516,158 UART: [ldev] SUBJECT.KEYID = 5
1,516,584 UART: [ldev] AUTHORITY.KEYID = 7
1,517,047 UART: [ldev] FE.KEYID = 1
1,522,225 UART: [ldev] Erasing FE.KEYID = 1
1,547,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,124 UART: [ldev] --
1,586,581 UART: [fwproc] Waiting for Commands...
1,587,388 UART: [fwproc] Received command 0x46574c44
1,588,179 UART: [fwproc] Received Image of size 114360 bytes
2,886,096 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,549 >>> mbox cmd response: success
3,078,549 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,079,571 UART: [afmc] ++
3,079,739 UART: [afmc] CDI.KEYID = 6
3,080,101 UART: [afmc] SUBJECT.KEYID = 7
3,080,526 UART: [afmc] AUTHORITY.KEYID = 5
3,115,645 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,839 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,347 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,232 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,922 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,655 UART: [afmc] --
3,158,625 UART: [cold-reset] --
3,159,235 UART: [state] Locking Datavault
3,160,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,978 UART: [state] Locking ICCM
3,161,610 UART: [exit] Launching FMC @ 0x40000130
3,166,939 UART:
3,166,955 UART: Running Caliptra FMC ...
3,167,363 UART:
3,167,417 UART: [state] CFI Enabled
3,177,780 UART: [fht] FMC Alias Private Key: 7
3,286,157 UART: [art] Extend RT PCRs Done
3,286,585 UART: [art] Lock RT PCRs Done
3,287,925 UART: [art] Populate DV Done
3,296,114 UART: [fht] FMC Alias Private Key: 7
3,297,142 UART: [art] Derive CDI
3,297,422 UART: [art] Store in in slot 0x4
3,382,973 UART: [art] Derive Key Pair
3,383,333 UART: [art] Store priv key in slot 0x5
3,395,881 UART: [art] Derive Key Pair - Done
3,410,540 UART: [art] Signing Cert with AUTHO
3,411,020 UART: RITY.KEYID = 7
3,426,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,923 UART: [art] PUB.X = 1C8E2CDEFF385AF105C4DCE26F9B4E903841E9C390DD45E6881A02E5A731D3131FAF419C2DF317E7845520802A00D4E4
3,433,673 UART: [art] PUB.Y = 07CB5950140B0B1C89E3839D824DF708ACF164B4206A24D11FF7FBEB775C432B563F308E90D693529908261947E84A1F
3,440,604 UART: [art] SIG.R = B5DF7C7452B484E166EDAE378808341C72E7E07E8132A26EEDBA7C912F7BBE518194546E02079546D37BA6EE189196BA
3,447,369 UART: [art] SIG.S = 5D8D13AB6A01710E9CC3788872EC9218E0993C9F529DB5A36CCEC336E691EDDE9F8B2A7225081C08718E23129E4E006C
3,470,960 UART: Caliptra RT
3,471,214 UART: [state] CFI Enabled
3,578,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,151 UART: [rt]cmd =0x464d4352, len=4
3,616,328 >>> mbox cmd response data (524 bytes)
3,616,329 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,970 UART: [rt]cmd =0x43455252, len=4
3,656,770 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,555 ready_for_fw is high
1,362,555 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,007 >>> mbox cmd response: success
2,930,007 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,991,287 UART:
2,991,303 UART: Running Caliptra FMC ...
2,991,711 UART:
2,991,765 UART: [state] CFI Enabled
3,001,850 UART: [fht] FMC Alias Private Key: 7
3,110,503 UART: [art] Extend RT PCRs Done
3,110,931 UART: [art] Lock RT PCRs Done
3,112,667 UART: [art] Populate DV Done
3,120,862 UART: [fht] FMC Alias Private Key: 7
3,121,848 UART: [art] Derive CDI
3,122,128 UART: [art] Store in in slot 0x4
3,207,807 UART: [art] Derive Key Pair
3,208,167 UART: [art] Store priv key in slot 0x5
3,221,065 UART: [art] Derive Key Pair - Done
3,235,647 UART: [art] Signing Cert with AUTHO
3,236,127 UART: RITY.KEYID = 7
3,251,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,974 UART: [art] PUB.X = B4F7E50B2D267F1BD8AE3FFEBFC6F557E64FE5A73E6A2B714AA83EF546E3B8EDE17479C57A4181EFEBA696FBCC17D5FA
3,258,773 UART: [art] PUB.Y = 374BD49773732BEDAA0A8F934845689D7DDBA51EFFC937AEDCFAA5424CA4625DF14C4CC8885D89ECE2C16ECF62D3504D
3,265,742 UART: [art] SIG.R = 8BD4BA4FC2A4579B342C6E8E185837F7199EEAE5B6CFB259D7D2067D0AD7FC08FA5654212873B6375A08DF1368FC5887
3,272,508 UART: [art] SIG.S = F67073384A485B2FA143BB363CD3DA7C30EDEF8405B0DB250EE692C824F9D676249EF07C0E131FD23D6A5FF9CCCFAE56
3,296,136 UART: Caliptra RT
3,296,390 UART: [state] CFI Enabled
3,405,595 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,672 UART: [rt]cmd =0x464d4352, len=4
3,442,759 >>> mbox cmd response data (524 bytes)
3,442,760 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,101 UART: [rt]cmd =0x43455252, len=4
3,482,784 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,587 UART: [kat] SHA2-512-ACC
897,488 UART: [kat] ECC-384
903,401 UART: [kat] HMAC-384Kdf
907,963 UART: [kat] LMS
1,476,159 UART: [kat] --
1,477,178 UART: [cold-reset] ++
1,477,752 UART: [fht] Storing FHT @ 0x50003400
1,480,569 UART: [idev] ++
1,480,737 UART: [idev] CDI.KEYID = 6
1,481,097 UART: [idev] SUBJECT.KEYID = 7
1,481,521 UART: [idev] UDS.KEYID = 0
1,481,866 ready_for_fw is high
1,481,866 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,793 UART: [idev] Erasing UDS.KEYID = 0
1,506,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,361 UART: [idev] --
1,516,326 UART: [ldev] ++
1,516,494 UART: [ldev] CDI.KEYID = 6
1,516,857 UART: [ldev] SUBJECT.KEYID = 5
1,517,283 UART: [ldev] AUTHORITY.KEYID = 7
1,517,746 UART: [ldev] FE.KEYID = 1
1,522,892 UART: [ldev] Erasing FE.KEYID = 1
1,547,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,203 UART: [ldev] --
1,586,508 UART: [fwproc] Waiting for Commands...
1,587,209 UART: [fwproc] Received command 0x46574c44
1,588,000 UART: [fwproc] Received Image of size 114360 bytes
2,885,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,650 >>> mbox cmd response: success
3,078,650 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,079,706 UART: [afmc] ++
3,079,874 UART: [afmc] CDI.KEYID = 6
3,080,236 UART: [afmc] SUBJECT.KEYID = 7
3,080,661 UART: [afmc] AUTHORITY.KEYID = 5
3,115,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,697 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,387 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,202 UART: [afmc] --
3,159,132 UART: [cold-reset] --
3,160,104 UART: [state] Locking Datavault
3,161,115 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,719 UART: [state] Locking ICCM
3,162,285 UART: [exit] Launching FMC @ 0x40000130
3,167,614 UART:
3,167,630 UART: Running Caliptra FMC ...
3,168,038 UART:
3,168,181 UART: [state] CFI Enabled
3,178,768 UART: [fht] FMC Alias Private Key: 7
3,287,297 UART: [art] Extend RT PCRs Done
3,287,725 UART: [art] Lock RT PCRs Done
3,289,329 UART: [art] Populate DV Done
3,297,786 UART: [fht] FMC Alias Private Key: 7
3,298,824 UART: [art] Derive CDI
3,299,104 UART: [art] Store in in slot 0x4
3,384,561 UART: [art] Derive Key Pair
3,384,921 UART: [art] Store priv key in slot 0x5
3,398,801 UART: [art] Derive Key Pair - Done
3,413,634 UART: [art] Signing Cert with AUTHO
3,414,114 UART: RITY.KEYID = 7
3,429,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,503 UART: [art] PUB.X = FD178D60720E82E4D36D371B3DB953D13511F457747265191EB899ED4C254E55CA683E92659C406CA981ED84E65FB697
3,437,266 UART: [art] PUB.Y = 9CA18B2EB9D4EAFEC25BD171E6C8D646CCA2B99F9C836E505D3DA000936643548CB181F00F7055461E038D95354F295F
3,444,194 UART: [art] SIG.R = 9F0D0AF7D8B2940EF654DF07DD19BD99966B63A19494B07A79EEC30917CB5CDB34CFAAF8373699C6A42E7D3A66BB6203
3,450,960 UART: [art] SIG.S = EB1E389E7F402F36E5718BEA27115F07C8586764A31A237AB883100139D47302437129A071355CE368DCF542EAEE9372
3,474,498 UART: Caliptra RT
3,474,844 UART: [state] CFI Enabled
3,582,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,634 UART: [rt]cmd =0x464d4352, len=4
3,619,727 >>> mbox cmd response data (524 bytes)
3,619,728 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,115 UART: [rt]cmd =0x43455252, len=4
3,659,898 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 ready_for_fw is high
1,362,946 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,076 >>> mbox cmd response: success
2,929,076 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,989,962 UART:
2,989,978 UART: Running Caliptra FMC ...
2,990,386 UART:
2,990,529 UART: [state] CFI Enabled
3,001,160 UART: [fht] FMC Alias Private Key: 7
3,108,931 UART: [art] Extend RT PCRs Done
3,109,359 UART: [art] Lock RT PCRs Done
3,110,807 UART: [art] Populate DV Done
3,119,296 UART: [fht] FMC Alias Private Key: 7
3,120,422 UART: [art] Derive CDI
3,120,702 UART: [art] Store in in slot 0x4
3,206,109 UART: [art] Derive Key Pair
3,206,469 UART: [art] Store priv key in slot 0x5
3,219,651 UART: [art] Derive Key Pair - Done
3,234,188 UART: [art] Signing Cert with AUTHO
3,234,668 UART: RITY.KEYID = 7
3,249,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,735 UART: [art] PUB.X = 5598CC9E2343E3E3777C3F1F0A24CA6E8B425E221FCD063349FD132FC146179778622CE936BE3FAB649BC8865BC6AFDD
3,257,509 UART: [art] PUB.Y = 95F406CC1EE536C7B8B013B47FB6FCBF93F24E070D7B8D75B89424DD8AAFCAF856262B014E0C759923B0FD3D7760895D
3,264,456 UART: [art] SIG.R = 55FFC55CBECDD384536CAC53B94656306221568532BF5671C82117C7286475C7D850B1A7998D4F8B28BB25DDB8816B62
3,271,224 UART: [art] SIG.S = 4AA4DDE3790CF0946EF2A292FD4E5E10A3B3BC4C966449F7D1EA1885B2558A7C951EC051588EA3C98A3039EFFAF3F744
3,294,860 UART: Caliptra RT
3,295,206 UART: [state] CFI Enabled
3,403,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,518 UART: [rt]cmd =0x464d4352, len=4
3,440,491 >>> mbox cmd response data (524 bytes)
3,440,492 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,821 UART: [rt]cmd =0x43455252, len=4
3,480,605 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,823 UART: [kat] SHA2-256
903,763 UART: [kat] SHA2-384
906,762 UART: [kat] SHA2-512-ACC
908,663 UART: [kat] ECC-384
918,774 UART: [kat] HMAC-384Kdf
923,302 UART: [kat] LMS
1,171,630 UART: [kat] --
1,172,299 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,406 UART: [idev] ++
1,175,574 UART: [idev] CDI.KEYID = 6
1,175,934 UART: [idev] SUBJECT.KEYID = 7
1,176,358 UART: [idev] UDS.KEYID = 0
1,176,703 ready_for_fw is high
1,176,703 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,612 UART: [idev] Erasing UDS.KEYID = 0
1,201,701 UART: [idev] Sha1 KeyId Algorithm
1,210,301 UART: [idev] --
1,211,379 UART: [ldev] ++
1,211,547 UART: [ldev] CDI.KEYID = 6
1,211,910 UART: [ldev] SUBJECT.KEYID = 5
1,212,336 UART: [ldev] AUTHORITY.KEYID = 7
1,212,799 UART: [ldev] FE.KEYID = 1
1,217,985 UART: [ldev] Erasing FE.KEYID = 1
1,244,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,177 UART: [ldev] --
1,283,658 UART: [fwproc] Wait for Commands...
1,284,318 UART: [fwproc] Recv command 0x46574c44
1,285,046 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,112 >>> mbox cmd response: success
2,775,112 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,776,246 UART: [afmc] ++
2,776,414 UART: [afmc] CDI.KEYID = 6
2,776,776 UART: [afmc] SUBJECT.KEYID = 7
2,777,201 UART: [afmc] AUTHORITY.KEYID = 5
2,812,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,911 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,524 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,243 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,113 UART: [afmc] --
2,856,039 UART: [cold-reset] --
2,856,943 UART: [state] Locking Datavault
2,857,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,456 UART: [state] Locking ICCM
2,858,880 UART: [exit] Launching FMC @ 0x40000130
2,864,209 UART:
2,864,225 UART: Running Caliptra FMC ...
2,864,633 UART:
2,864,687 UART: [state] CFI Enabled
2,874,944 UART: [fht] FMC Alias Private Key: 7
2,982,311 UART: [art] Extend RT PCRs Done
2,982,739 UART: [art] Lock RT PCRs Done
2,984,291 UART: [art] Populate DV Done
2,992,596 UART: [fht] FMC Alias Private Key: 7
2,993,734 UART: [art] Derive CDI
2,994,014 UART: [art] Store in in slot 0x4
3,079,543 UART: [art] Derive Key Pair
3,079,903 UART: [art] Store priv key in slot 0x5
3,093,043 UART: [art] Derive Key Pair - Done
3,107,614 UART: [art] Signing Cert with AUTHO
3,108,094 UART: RITY.KEYID = 7
3,123,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,981 UART: [art] PUB.X = 6EA4855564440180C492B868CCEA1F269AF8162FA2EB6A606B3628B26FB8E949CC42FE4531F6CADE492078F38BF3E4AA
3,130,758 UART: [art] PUB.Y = 2D3DEB8DAB4FEFCAF803CC00E7ADD1666BC7E929CE8BA3367F2F37D0C6B629BEF46F6FE2B8244245A0F286C54A058C85
3,137,704 UART: [art] SIG.R = 5B634F33B333F7C9C82FF4F406F84EA19730AFCF94526E60080FD304D7122BD2B555DB5B842B10A2C70DE114CCEBA785
3,144,469 UART: [art] SIG.S = 8C1E7D9831F6A9F93350B969883B11890F65499F5395D615248693C3028B8A5C8F78084E2273C7791C05ED684E08B6A2
3,168,703 UART: Caliptra RT
3,168,957 UART: [state] CFI Enabled
3,276,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,930 UART: [rt]cmd =0x464d4352, len=4
3,313,795 >>> mbox cmd response data (524 bytes)
3,313,796 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,239 UART: [rt]cmd =0x43455252, len=4
3,354,143 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,431 ready_for_fw is high
1,060,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,423 >>> mbox cmd response: success
2,627,423 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,689,613 UART:
2,689,629 UART: Running Caliptra FMC ...
2,690,037 UART:
2,690,091 UART: [state] CFI Enabled
2,700,510 UART: [fht] FMC Alias Private Key: 7
2,807,929 UART: [art] Extend RT PCRs Done
2,808,357 UART: [art] Lock RT PCRs Done
2,809,547 UART: [art] Populate DV Done
2,817,476 UART: [fht] FMC Alias Private Key: 7
2,818,628 UART: [art] Derive CDI
2,818,908 UART: [art] Store in in slot 0x4
2,904,623 UART: [art] Derive Key Pair
2,904,983 UART: [art] Store priv key in slot 0x5
2,917,959 UART: [art] Derive Key Pair - Done
2,932,961 UART: [art] Signing Cert with AUTHO
2,933,441 UART: RITY.KEYID = 7
2,948,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,404 UART: [art] PUB.X = F12BA1BD5CDF7128CC3FF8AC05B8C37269C93A22AD45306C6A5F1D3211E544773E84EC980ED9B455E57B1833B9B4C707
2,956,175 UART: [art] PUB.Y = CB640ACF2D3FFCCFCDEB90AB8F09627BA37D1D36F99A307DC2B6C4C6DBE4183DA6F2CCBC441DBA99F7489C6A6E3C29E6
2,963,153 UART: [art] SIG.R = 3A21723C190B71B979DA158236D7E31DBAF412363EB032E0B3AB88F86B05DD0EBACFF44C64ED90F2FEC6FA5E1AD5955D
2,969,934 UART: [art] SIG.S = 66F6E4CFCAC07F14BEE905D40396E11C53706F169D8C5AF9E070EEBBE859ACCDC146937567787F7D1AAA236FE6505C63
2,993,323 UART: Caliptra RT
2,993,577 UART: [state] CFI Enabled
3,100,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,886 UART: [rt]cmd =0x464d4352, len=4
3,138,203 >>> mbox cmd response data (524 bytes)
3,138,204 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,447 UART: [rt]cmd =0x43455252, len=4
3,178,327 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
902,096 UART: [kat] SHA2-256
904,036 UART: [kat] SHA2-384
906,867 UART: [kat] SHA2-512-ACC
908,768 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
923,125 UART: [kat] LMS
1,171,453 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,173,022 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 ready_for_fw is high
1,176,912 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,001 UART: [idev] Erasing UDS.KEYID = 0
1,202,108 UART: [idev] Sha1 KeyId Algorithm
1,210,468 UART: [idev] --
1,211,634 UART: [ldev] ++
1,211,802 UART: [ldev] CDI.KEYID = 6
1,212,165 UART: [ldev] SUBJECT.KEYID = 5
1,212,591 UART: [ldev] AUTHORITY.KEYID = 7
1,213,054 UART: [ldev] FE.KEYID = 1
1,218,182 UART: [ldev] Erasing FE.KEYID = 1
1,244,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,864 UART: [ldev] --
1,284,203 UART: [fwproc] Wait for Commands...
1,285,017 UART: [fwproc] Recv command 0x46574c44
1,285,745 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,853 >>> mbox cmd response: success
2,775,853 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,776,955 UART: [afmc] ++
2,777,123 UART: [afmc] CDI.KEYID = 6
2,777,485 UART: [afmc] SUBJECT.KEYID = 7
2,777,910 UART: [afmc] AUTHORITY.KEYID = 5
2,813,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,516 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,402 UART: [afmc] --
2,857,366 UART: [cold-reset] --
2,858,412 UART: [state] Locking Datavault
2,859,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,027 UART: [state] Locking ICCM
2,860,587 UART: [exit] Launching FMC @ 0x40000130
2,865,916 UART:
2,865,932 UART: Running Caliptra FMC ...
2,866,340 UART:
2,866,483 UART: [state] CFI Enabled
2,877,326 UART: [fht] FMC Alias Private Key: 7
2,984,913 UART: [art] Extend RT PCRs Done
2,985,341 UART: [art] Lock RT PCRs Done
2,986,647 UART: [art] Populate DV Done
2,994,842 UART: [fht] FMC Alias Private Key: 7
2,995,892 UART: [art] Derive CDI
2,996,172 UART: [art] Store in in slot 0x4
3,081,395 UART: [art] Derive Key Pair
3,081,755 UART: [art] Store priv key in slot 0x5
3,094,759 UART: [art] Derive Key Pair - Done
3,109,360 UART: [art] Signing Cert with AUTHO
3,109,840 UART: RITY.KEYID = 7
3,124,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,739 UART: [art] PUB.X = E8998AD51092C23A4BD3FC85CBB15C76F149DF264FF966133B3165CBC28AA93070B12CCA503B1CD75A618DADD59F97D4
3,132,523 UART: [art] PUB.Y = 0D9F1E9067B8297478F24084138FADE0DCAF9B26B65DA6DBE06C0C3EA143220D5CA1508A1FEBBCFF1F367378E49632F9
3,139,478 UART: [art] SIG.R = BE9C5829866D9331C5AFF28EABE673ED6316148B675DFF79396F914A61A158A551E7BD910406657A35879E213199601E
3,146,236 UART: [art] SIG.S = 1BB2317D50F7FF0651CF6C184ACCBB83111138F1FAB145C1BCBECD1F0BA3F098708AB61469517D37DA126826FFFEA931
3,170,607 UART: Caliptra RT
3,170,953 UART: [state] CFI Enabled
3,279,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,650 UART: [rt]cmd =0x464d4352, len=4
3,316,529 >>> mbox cmd response data (524 bytes)
3,316,530 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,933 UART: [rt]cmd =0x43455252, len=4
3,356,653 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,988 ready_for_fw is high
1,060,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,850 >>> mbox cmd response: success
2,627,850 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,691,164 UART:
2,691,180 UART: Running Caliptra FMC ...
2,691,588 UART:
2,691,731 UART: [state] CFI Enabled
2,702,108 UART: [fht] FMC Alias Private Key: 7
2,809,701 UART: [art] Extend RT PCRs Done
2,810,129 UART: [art] Lock RT PCRs Done
2,811,705 UART: [art] Populate DV Done
2,819,958 UART: [fht] FMC Alias Private Key: 7
2,820,994 UART: [art] Derive CDI
2,821,274 UART: [art] Store in in slot 0x4
2,906,859 UART: [art] Derive Key Pair
2,907,219 UART: [art] Store priv key in slot 0x5
2,920,547 UART: [art] Derive Key Pair - Done
2,935,704 UART: [art] Signing Cert with AUTHO
2,936,184 UART: RITY.KEYID = 7
2,951,276 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,041 UART: [art] PUB.X = DFC05888370F1CCE1EC5C3C34783AC4ACAC85A847131728D2033C2666940606E324592E52A884D6229D64EDEC7DED6D8
2,958,812 UART: [art] PUB.Y = 5E0BC33C849C9727DA0422B490E3EC802A9B8D838FB592812436810834865C68E451030A273B7AFB3DFDFE2DD8CB3976
2,965,749 UART: [art] SIG.R = 6A4FD195E00445B23D2855B6641821577A33087A664D2FEFD897EA77152F990054740F5EA50E9A27768AB869EE924275
2,972,475 UART: [art] SIG.S = CA9CD803BC424CD5261D2BAC164F938784E0BFDD908FD8268607F021DB426EB2F95805F3107952D87AE9D523B2A2420B
2,996,534 UART: Caliptra RT
2,996,880 UART: [state] CFI Enabled
3,104,674 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,677 UART: [rt]cmd =0x464d4352, len=4
3,141,670 >>> mbox cmd response data (524 bytes)
3,141,671 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,024 UART: [rt]cmd =0x43455252, len=4
3,182,008 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,128 UART: [kat] LMS
1,169,440 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,174,639 ready_for_fw is high
1,174,639 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,589 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,868 UART: [ldev] ++
1,210,036 UART: [ldev] CDI.KEYID = 6
1,210,400 UART: [ldev] SUBJECT.KEYID = 5
1,210,827 UART: [ldev] AUTHORITY.KEYID = 7
1,211,290 UART: [ldev] FE.KEYID = 1
1,216,704 UART: [ldev] Erasing FE.KEYID = 1
1,242,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,648 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,853 UART: [fwproc] Recv command 0x46574c44
1,283,586 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,076 >>> mbox cmd response: success
2,774,076 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,775,181 UART: [afmc] ++
2,775,349 UART: [afmc] CDI.KEYID = 6
2,775,712 UART: [afmc] SUBJECT.KEYID = 7
2,776,138 UART: [afmc] AUTHORITY.KEYID = 5
2,811,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,192 UART: [afmc] --
2,855,282 UART: [cold-reset] --
2,855,938 UART: [state] Locking Datavault
2,856,925 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,529 UART: [state] Locking ICCM
2,858,091 UART: [exit] Launching FMC @ 0x40000130
2,863,420 UART:
2,863,436 UART: Running Caliptra FMC ...
2,863,844 UART:
2,863,898 UART: [state] CFI Enabled
2,874,103 UART: [fht] FMC Alias Private Key: 7
2,982,126 UART: [art] Extend RT PCRs Done
2,982,554 UART: [art] Lock RT PCRs Done
2,984,060 UART: [art] Populate DV Done
2,992,289 UART: [fht] FMC Alias Private Key: 7
2,993,289 UART: [art] Derive CDI
2,993,569 UART: [art] Store in in slot 0x4
3,079,160 UART: [art] Derive Key Pair
3,079,520 UART: [art] Store priv key in slot 0x5
3,092,334 UART: [art] Derive Key Pair - Done
3,107,188 UART: [art] Signing Cert with AUTHO
3,107,668 UART: RITY.KEYID = 7
3,123,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,055 UART: [art] PUB.X = 37ECEA95F8FC31C197384E9F7EFBF24847BC39353D24CA1E142F22047729C040A56F0846F4A797FAF3390EE79932F371
3,130,818 UART: [art] PUB.Y = 5A211295B2305DF1755EFFAE6164204230CA1F658BEA6DC787F7EF9AC2A75CBBBFCF7DF5D3C3BF4444CCADAE0559C1B4
3,137,791 UART: [art] SIG.R = E166C6A1905C9849EFDD7A41E25B50B39ED70B479A5AA04C138D0831D37507D1C64153BABEFF66D828EC8B7CC8977A8C
3,144,564 UART: [art] SIG.S = E20FA9CC1215C1643E413B2FC985BC9B3D581FA96A4C9966646D4CAFFEBCB01A2A9D26A0ADD35D95D5034E0A84B8DDCF
3,168,414 UART: Caliptra RT
3,168,668 UART: [state] CFI Enabled
3,276,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,344 UART: [rt]cmd =0x464d4352, len=4
3,313,297 >>> mbox cmd response data (524 bytes)
3,313,298 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,489 UART: [rt]cmd =0x43455252, len=4
3,353,124 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,060 ready_for_fw is high
1,056,060 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,790 >>> mbox cmd response: success
2,622,790 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,685,492 UART:
2,685,508 UART: Running Caliptra FMC ...
2,685,916 UART:
2,685,970 UART: [state] CFI Enabled
2,696,277 UART: [fht] FMC Alias Private Key: 7
2,803,790 UART: [art] Extend RT PCRs Done
2,804,218 UART: [art] Lock RT PCRs Done
2,805,742 UART: [art] Populate DV Done
2,813,955 UART: [fht] FMC Alias Private Key: 7
2,814,987 UART: [art] Derive CDI
2,815,267 UART: [art] Store in in slot 0x4
2,900,642 UART: [art] Derive Key Pair
2,901,002 UART: [art] Store priv key in slot 0x5
2,913,978 UART: [art] Derive Key Pair - Done
2,928,476 UART: [art] Signing Cert with AUTHO
2,928,956 UART: RITY.KEYID = 7
2,943,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,717 UART: [art] PUB.X = 205AECD074374251DB71DA4091DDEB971B214F7169997DB739D8CCCFA1BE35623B26F88311E79DB2551E67378F85EB28
2,951,491 UART: [art] PUB.Y = EE08176AB6EC81A53CB2F904E7F0D44C95366A528FBA3DDBE0C76B785673E713DEA35166AE17881D012854F52B9371CA
2,958,440 UART: [art] SIG.R = BD330787CFD414FAF7430B89DB080B1F5C9A42626B2DD0B044ECFCD2A751533BEB88F083D339F22A00C8F144FEECA215
2,965,192 UART: [art] SIG.S = B955FE51CD258AE1C194A7862E66C9BCF4933B427C42A5CA01AE4E5CAF1F957C7A055FE4F2D6113AF7D71E3115DDD2D1
2,989,297 UART: Caliptra RT
2,989,551 UART: [state] CFI Enabled
3,096,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,963 UART: [rt]cmd =0x464d4352, len=4
3,134,080 >>> mbox cmd response data (524 bytes)
3,134,081 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,522 UART: [rt]cmd =0x43455252, len=4
3,174,289 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,198,594 UART: [idev] Sha1 KeyId Algorithm
1,207,540 UART: [idev] --
1,208,725 UART: [ldev] ++
1,208,893 UART: [ldev] CDI.KEYID = 6
1,209,257 UART: [ldev] SUBJECT.KEYID = 5
1,209,684 UART: [ldev] AUTHORITY.KEYID = 7
1,210,147 UART: [ldev] FE.KEYID = 1
1,215,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,441 >>> mbox cmd response: success
2,772,441 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,773,528 UART: [afmc] ++
2,773,696 UART: [afmc] CDI.KEYID = 6
2,774,059 UART: [afmc] SUBJECT.KEYID = 7
2,774,485 UART: [afmc] AUTHORITY.KEYID = 5
2,810,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,465 UART: [afmc] --
2,853,531 UART: [cold-reset] --
2,854,451 UART: [state] Locking Datavault
2,855,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,154 UART: [state] Locking ICCM
2,856,798 UART: [exit] Launching FMC @ 0x40000130
2,862,127 UART:
2,862,143 UART: Running Caliptra FMC ...
2,862,551 UART:
2,862,694 UART: [state] CFI Enabled
2,873,431 UART: [fht] FMC Alias Private Key: 7
2,981,034 UART: [art] Extend RT PCRs Done
2,981,462 UART: [art] Lock RT PCRs Done
2,983,082 UART: [art] Populate DV Done
2,991,355 UART: [fht] FMC Alias Private Key: 7
2,992,311 UART: [art] Derive CDI
2,992,591 UART: [art] Store in in slot 0x4
3,078,396 UART: [art] Derive Key Pair
3,078,756 UART: [art] Store priv key in slot 0x5
3,091,798 UART: [art] Derive Key Pair - Done
3,106,385 UART: [art] Signing Cert with AUTHO
3,106,865 UART: RITY.KEYID = 7
3,122,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,352 UART: [art] PUB.X = 08D29D9E489D57A4DFC5EB8AE53DFBE5B6F5D646326208B4935546360893E432DBDC2843ECCF629FB8FEB4E2B7C9E2B4
3,130,129 UART: [art] PUB.Y = 0F2A42687AAC64039D89F4A0A1466ED6FC4E529A17185196243B345EFC961225C0FF3600E63AFBEE83BF528239C22A4C
3,137,055 UART: [art] SIG.R = F5E496F289EABAD2FC6B27FBCC2A66130808719C4667222D1385FB406336BD3062073360EC0D8B9397F1165765856746
3,143,805 UART: [art] SIG.S = 2F1D79CDFE9F27F2617FCE39DF6A99D19A27E6C07A924203A3458DFA21A9FA1C450347B72AFA380A1A9C5CAFE6450C38
3,167,558 UART: Caliptra RT
3,167,904 UART: [state] CFI Enabled
3,276,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,283 UART: [rt]cmd =0x464d4352, len=4
3,314,356 >>> mbox cmd response data (524 bytes)
3,314,357 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,832 UART: [rt]cmd =0x43455252, len=4
3,354,596 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,291 ready_for_fw is high
1,056,291 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,987 >>> mbox cmd response: success
2,621,987 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,684,891 UART:
2,684,907 UART: Running Caliptra FMC ...
2,685,315 UART:
2,685,458 UART: [state] CFI Enabled
2,695,799 UART: [fht] FMC Alias Private Key: 7
2,803,674 UART: [art] Extend RT PCRs Done
2,804,102 UART: [art] Lock RT PCRs Done
2,805,456 UART: [art] Populate DV Done
2,813,431 UART: [fht] FMC Alias Private Key: 7
2,814,483 UART: [art] Derive CDI
2,814,763 UART: [art] Store in in slot 0x4
2,900,428 UART: [art] Derive Key Pair
2,900,788 UART: [art] Store priv key in slot 0x5
2,914,136 UART: [art] Derive Key Pair - Done
2,929,034 UART: [art] Signing Cert with AUTHO
2,929,514 UART: RITY.KEYID = 7
2,944,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,319 UART: [art] PUB.X = 5D770B018E7405AEDF7D520D18445308401C61DE562FC4931957F6B65302051A294E7E0B2CAC7FF414F852FFC5E27675
2,952,063 UART: [art] PUB.Y = 30FB28EB8C576BC043A3D842F905F019AE0791CAC5113FC060BB9C1FD03AFFFA8228F71669050538B8FFE873CC4BDDF4
2,959,017 UART: [art] SIG.R = 54BAE2D5AD35C47245B9A293BA86A908884BC5D8B477C9853ACFF4359278A0C6056D4A6F550CE8031FFDB57253AD22E6
2,965,783 UART: [art] SIG.S = D028BF632B146387D6A33BB44C1B9A8C5008D96A347F86B7D5BCC2543E63296BBFDFBC8A0EC0D1709CF71EC85A8A6941
2,989,468 UART: Caliptra RT
2,989,814 UART: [state] CFI Enabled
3,097,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,359 UART: [rt]cmd =0x464d4352, len=4
3,134,380 >>> mbox cmd response data (524 bytes)
3,134,381 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,544 UART: [rt]cmd =0x43455252, len=4
3,174,390 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,473 UART:
192,846 UART: Running Caliptra ROM ...
194,036 UART:
194,192 UART: [state] CFI Enabled
263,539 UART: [state] LifecycleState = Unprovisioned
265,465 UART: [state] DebugLocked = No
267,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,508 UART: [kat] SHA2-256
442,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,698 UART: [kat] ++
453,164 UART: [kat] sha1
464,737 UART: [kat] SHA2-256
467,387 UART: [kat] SHA2-384
473,583 UART: [kat] SHA2-512-ACC
475,944 UART: [kat] ECC-384
2,768,685 UART: [kat] HMAC-384Kdf
2,800,463 UART: [kat] LMS
3,990,766 UART: [kat] --
3,994,265 UART: [cold-reset] ++
3,996,264 UART: [fht] Storing FHT @ 0x50003400
4,007,594 UART: [idev] ++
4,008,163 UART: [idev] CDI.KEYID = 6
4,009,095 UART: [idev] SUBJECT.KEYID = 7
4,010,339 UART: [idev] UDS.KEYID = 0
4,035,487 UART: [idev] Erasing UDS.KEYID = 0
7,349,185 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,517 UART: [idev] CSR upload requested
7,376,653 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,681,622 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,696,308 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,710,860 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,725,241 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,748,176 UART: [idev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
9,872,081 UART: [idev] CSR uploaded
9,885,263 ready_for_fw is high
9,885,576 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,029,004 UART: [idev] --
10,029,679 UART: [ldev] ++
10,030,192 UART: [ldev] CDI.KEYID = 6
10,031,093 UART: [ldev] SUBJECT.KEYID = 5
10,032,320 UART: [ldev] AUTHORITY.KEYID = 7
10,033,415 UART: [ldev] FE.KEYID = 1
10,034,275 UART: [ldev] Erasing FE.KEYID = 1
13,267,848 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,565,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,579,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,594,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,608,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,627,584 UART: [ldev] --
15,632,735 UART: [fwproc] Waiting for Commands...
15,635,674 UART: [fwproc] Received command 0x46574c44
15,637,917 UART: [fwproc] Received Image of size 114036 bytes
19,686,023 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,763,609 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,832,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,149,724 >>> mbox cmd response: success
20,150,227 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,153,880 UART: [afmc] ++
20,154,520 UART: [afmc] CDI.KEYID = 6
20,155,400 UART: [afmc] SUBJECT.KEYID = 7
20,156,667 UART: [afmc] AUTHORITY.KEYID = 5
23,523,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,825,201 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,827,456 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,841,859 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,856,682 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,871,119 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,892,228 UART: [afmc] --
25,895,521 UART: [cold-reset] --
25,900,350 UART: [state] Locking Datavault
25,905,994 UART: [state] Locking PCR0, PCR1 and PCR31
25,907,688 UART: [state] Locking ICCM
25,909,614 UART: [exit] Launching FMC @ 0x40000130
25,918,002 UART:
25,918,234 UART: Running Caliptra FMC ...
25,919,326 UART:
25,919,479 UART: [state] CFI Enabled
25,985,648 UART: [fht] FMC Alias Private Key: 7
28,323,991 UART: [art] Extend RT PCRs Done
28,325,212 UART: [art] Lock RT PCRs Done
28,326,827 UART: [art] Populate DV Done
28,332,498 UART: [fht] FMC Alias Private Key: 7
28,334,199 UART: [art] Derive CDI
28,335,006 UART: [art] Store in in slot 0x4
28,394,551 UART: [art] Derive Key Pair
28,395,591 UART: [art] Store priv key in slot 0x5
31,688,245 UART: [art] Derive Key Pair - Done
31,701,242 UART: [art] Signing Cert with AUTHO
31,702,536 UART: RITY.KEYID = 7
33,990,629 UART: [art] Erasing AUTHORITY.KEYID = 7
33,992,211 UART: [art] PUB.X = BB6E12B17F90F4736804021704AA495A2727B378B1CF64D161808BB46D2DB71F3E8DD3BBFFB68409B47FAC18DE5EF904
33,999,398 UART: [art] PUB.Y = 4F4DFA40BAC957EF3BB75C87D34F1E778732A507B7D88F291457D9680FF734A1C665468E959E0FD2727310E537DE9642
34,006,667 UART: [art] SIG.R = 9FFBA5A0FBD73F168D31604DA5960B58432C66E50A52E67ECAFB4FAF382A4C35AF9158B9A56FB65F9A97105C1B5E6BAD
34,014,060 UART: [art] SIG.S = 905D77C330D82D69785708A657B4A0493C966707B00FF1A360C491E6F4508AFA520E5E2B66D1233BDAAEF8F6821A4187
35,319,514 UART: Caliptra RT
35,320,231 UART: [state] CFI Enabled
35,494,721 UART: [rt] RT listening for mailbox commands...
35,525,536 UART: [rt]cmd =0x49444352, len=4
35,527,198 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
9,478,997 ready_for_fw is high
9,479,562 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,177,817 >>> mbox cmd response: success
20,178,440 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,876,107 UART:
25,877,031 UART: Running Caliptra FMC ...
25,878,149 UART:
25,878,300 UART: [state] CFI Enabled
25,945,616 UART: [fht] FMC Alias Private Key: 7
28,283,504 UART: [art] Extend RT PCRs Done
28,285,057 UART: [art] Lock RT PCRs Done
28,286,622 UART: [art] Populate DV Done
28,292,149 UART: [fht] FMC Alias Private Key: 7
28,293,752 UART: [art] Derive CDI
28,294,502 UART: [art] Store in in slot 0x4
28,354,701 UART: [art] Derive Key Pair
28,355,772 UART: [art] Store priv key in slot 0x5
31,648,880 UART: [art] Derive Key Pair - Done
31,661,879 UART: [art] Signing Cert with AUTHO
31,663,212 UART: RITY.KEYID = 7
33,950,150 UART: [art] Erasing AUTHORITY.KEYID = 7
33,951,655 UART: [art] PUB.X = 0485A6F3AFEF5A559638C5163C285117347EE22A728548BE2651D46B5AE7D6C8432C591D2CE99CC2E2E86D7C948BA719
33,958,892 UART: [art] PUB.Y = 65B12744D0F9529925CB70ED6BAE048E5BBC10284B4DADC1A65EA69E4455401CC5E71CB5ECFF588CFDE013CDC8A5E008
33,966,167 UART: [art] SIG.R = 14528D8B5A473A20EF585B322BD7752494EA0BDFC8FC316324FAC54977C33F056A54DEEA54E0BEC66269C1F690D74ACE
33,973,542 UART: [art] SIG.S = 32CD18173CDF74688076EA43A5C1F2ACA21056AE5318E1BE8164F20E99270364B4325807953009B4C040736A270130E1
35,278,661 UART: Caliptra RT
35,279,446 UART: [state] CFI Enabled
35,440,501 UART: [rt] RT listening for mailbox commands...
35,471,391 UART: [rt]cmd =0x49444352, len=4
35,473,003 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
193,569 UART:
193,946 UART: Running Caliptra ROM ...
195,052 UART:
604,891 UART: [state] CFI Enabled
621,180 UART: [state] LifecycleState = Unprovisioned
623,149 UART: [state] DebugLocked = No
626,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,621 UART: [kat] SHA2-256
801,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,853 UART: [kat] ++
812,459 UART: [kat] sha1
823,486 UART: [kat] SHA2-256
826,211 UART: [kat] SHA2-384
831,348 UART: [kat] SHA2-512-ACC
833,718 UART: [kat] ECC-384
3,117,822 UART: [kat] HMAC-384Kdf
3,130,683 UART: [kat] LMS
4,320,841 UART: [kat] --
4,325,738 UART: [cold-reset] ++
4,328,210 UART: [fht] Storing FHT @ 0x50003400
4,340,624 UART: [idev] ++
4,341,209 UART: [idev] CDI.KEYID = 6
4,342,098 UART: [idev] SUBJECT.KEYID = 7
4,343,341 UART: [idev] UDS.KEYID = 0
4,361,929 UART: [idev] Erasing UDS.KEYID = 0
7,633,135 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,326 UART: [idev] CSR upload requested
7,660,468 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,949,640 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,964,254 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,978,873 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,993,202 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,016,139 UART: [idev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
10,140,106 UART: [idev] CSR uploaded
10,153,342 ready_for_fw is high
10,153,650 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,296,965 UART: [idev] --
10,297,676 UART: [ldev] ++
10,298,173 UART: [ldev] CDI.KEYID = 6
10,299,052 UART: [ldev] SUBJECT.KEYID = 5
10,300,069 UART: [ldev] AUTHORITY.KEYID = 7
10,301,244 UART: [ldev] FE.KEYID = 1
10,302,079 UART: [ldev] Erasing FE.KEYID = 1
13,458,206 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,750,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,764,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,779,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,794,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,813,775 UART: [ldev] --
15,819,143 UART: [fwproc] Waiting for Commands...
15,822,264 UART: [fwproc] Received command 0x46574c44
15,824,441 UART: [fwproc] Received Image of size 114036 bytes
19,880,293 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,956,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,025,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,342,027 >>> mbox cmd response: success
20,342,514 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,345,656 UART: [afmc] ++
20,346,232 UART: [afmc] CDI.KEYID = 6
20,347,143 UART: [afmc] SUBJECT.KEYID = 7
20,348,410 UART: [afmc] AUTHORITY.KEYID = 5
23,663,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,959,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,961,352 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,975,808 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,990,573 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
26,005,039 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
26,026,742 UART: [afmc] --
26,030,609 UART: [cold-reset] --
26,034,499 UART: [state] Locking Datavault
26,038,515 UART: [state] Locking PCR0, PCR1 and PCR31
26,040,217 UART: [state] Locking ICCM
26,042,151 UART: [exit] Launching FMC @ 0x40000130
26,050,551 UART:
26,050,790 UART: Running Caliptra FMC ...
26,051,892 UART:
26,052,053 UART: [state] CFI Enabled
26,059,617 UART: [fht] FMC Alias Private Key: 7
28,391,130 UART: [art] Extend RT PCRs Done
28,392,352 UART: [art] Lock RT PCRs Done
28,393,974 UART: [art] Populate DV Done
28,399,495 UART: [fht] FMC Alias Private Key: 7
28,401,202 UART: [art] Derive CDI
28,402,023 UART: [art] Store in in slot 0x4
28,444,259 UART: [art] Derive Key Pair
28,445,318 UART: [art] Store priv key in slot 0x5
31,687,738 UART: [art] Derive Key Pair - Done
31,700,838 UART: [art] Signing Cert with AUTHO
31,702,145 UART: RITY.KEYID = 7
33,981,231 UART: [art] Erasing AUTHORITY.KEYID = 7
33,982,770 UART: [art] PUB.X = 11ED6F4A1B2A6165F353D648AEEA72A9289E7E8FF5CD5B5F5B21DBF1D0747F7C71D5488FA73DB9EDC91CA3C32A6175AF
33,990,021 UART: [art] PUB.Y = 8D0ECAAF30CFF075D365AB3878A016A7FD137E046AC85B9364F60B17018E6723AB283A3397AA887226317E0941127C62
33,997,245 UART: [art] SIG.R = 324BFDE3AD44B4A5ADD38778EBE416A89AE617AB84A3E819DCEB1EE2656677D86A595AF13E2DF47558BC9A3E9DFF0BF0
34,004,670 UART: [art] SIG.S = 157960340112BAE4613ECEDFBC4AE8483E2D46669E8DD9A8A2A8E6C2ECE3EC0D3E550EF97D5067E9B818267839DCD3D3
35,310,274 UART: Caliptra RT
35,310,975 UART: [state] CFI Enabled
35,428,917 UART: [rt] RT listening for mailbox commands...
35,459,899 UART: [rt]cmd =0x49444352, len=4
35,461,862 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
9,745,326 ready_for_fw is high
9,746,031 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,376,983 >>> mbox cmd response: success
20,378,075 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,016,800 UART:
26,017,197 UART: Running Caliptra FMC ...
26,018,347 UART:
26,018,509 UART: [state] CFI Enabled
26,026,996 UART: [fht] FMC Alias Private Key: 7
28,357,718 UART: [art] Extend RT PCRs Done
28,358,947 UART: [art] Lock RT PCRs Done
28,360,695 UART: [art] Populate DV Done
28,365,901 UART: [fht] FMC Alias Private Key: 7
28,367,497 UART: [art] Derive CDI
28,368,310 UART: [art] Store in in slot 0x4
28,410,846 UART: [art] Derive Key Pair
28,412,073 UART: [art] Store priv key in slot 0x5
31,653,712 UART: [art] Derive Key Pair - Done
31,666,815 UART: [art] Signing Cert with AUTHO
31,668,114 UART: RITY.KEYID = 7
33,947,843 UART: [art] Erasing AUTHORITY.KEYID = 7
33,949,351 UART: [art] PUB.X = C71CC460A58037B6B9535296D0E1861A65B168DEC865661A3ABB2544ECBA3DE23F4B726FAEEB60A00D6A94B330378BA9
33,956,567 UART: [art] PUB.Y = 81422EDF2E52E15C706FE62515EBCEF5812CF01AFC04E6C494B2E7F65F9FF0AD9A84DD96DA06A13C4CBE7316BDA44105
33,963,876 UART: [art] SIG.R = 4DA5B57A2F65273620CBFE763B76BD5702706CC7015C6EAA3280EC53B7B1D01D61E5B6FA42AD3E1B87288A532BD2DD65
33,971,251 UART: [art] SIG.S = C49F9E9E36676F95EB6B97626C500F387AABAB94F780CC66A6ABA9D083A481EEC644E64B6C3A0666A044B72A6D95E267
35,276,471 UART: Caliptra RT
35,277,175 UART: [state] CFI Enabled
35,394,301 UART: [rt] RT listening for mailbox commands...
35,425,442 UART: [rt]cmd =0x49444352, len=4
35,427,160 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,516 UART:
192,901 UART: Running Caliptra ROM ...
194,018 UART:
194,168 UART: [state] CFI Enabled
265,362 UART: [state] LifecycleState = Unprovisioned
267,216 UART: [state] DebugLocked = No
269,096 UART: [state] WD Timer not started. Device not locked for debugging
273,486 UART: [kat] SHA2-256
452,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,197 UART: [kat] ++
464,646 UART: [kat] sha1
475,873 UART: [kat] SHA2-256
478,882 UART: [kat] SHA2-384
483,592 UART: [kat] SHA2-512-ACC
486,598 UART: [kat] ECC-384
2,950,388 UART: [kat] HMAC-384Kdf
2,973,796 UART: [kat] LMS
3,503,225 UART: [kat] --
3,507,160 UART: [cold-reset] ++
3,508,527 UART: [fht] FHT @ 0x50003400
3,519,996 UART: [idev] ++
3,520,557 UART: [idev] CDI.KEYID = 6
3,521,466 UART: [idev] SUBJECT.KEYID = 7
3,522,708 UART: [idev] UDS.KEYID = 0
3,544,961 UART: [idev] Erasing UDS.KEYID = 0
6,028,829 UART: [idev] Sha1 KeyId Algorithm
6,050,621 UART: [idev] CSR upload begun
6,055,273 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,784,024 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,800,052 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,816,027 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,831,853 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,855,683 UART: [idev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
7,997,883 UART: [idev] CSR uploaded
8,013,952 ready_for_fw is high
8,014,281 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,158,140 UART: [idev] --
8,158,774 UART: [ldev] ++
8,159,269 UART: [ldev] CDI.KEYID = 6
8,160,142 UART: [ldev] SUBJECT.KEYID = 5
8,161,280 UART: [ldev] AUTHORITY.KEYID = 7
8,162,459 UART: [ldev] FE.KEYID = 1
8,163,336 UART: [ldev] Erasing FE.KEYID = 1
10,568,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,287,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,303,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,318,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,334,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,355,538 UART: [ldev] --
12,359,286 UART: [fwproc] Wait for Commands...
12,362,206 UART: [fwproc] Recv command 0x46574c44
12,364,301 UART: [fwproc] Recv'd Img size: 114360 bytes
15,763,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,840,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,908,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,227,733 >>> mbox cmd response: success
16,228,241 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,231,988 UART: [afmc] ++
16,232,572 UART: [afmc] CDI.KEYID = 6
16,233,453 UART: [afmc] SUBJECT.KEYID = 7
16,234,666 UART: [afmc] AUTHORITY.KEYID = 5
18,771,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,494,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,496,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,512,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,528,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,544,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,567,001 UART: [afmc] --
20,570,107 UART: [cold-reset] --
20,575,154 UART: [state] Locking Datavault
20,581,521 UART: [state] Locking PCR0, PCR1 and PCR31
20,583,186 UART: [state] Locking ICCM
20,584,639 UART: [exit] Launching FMC @ 0x40000130
20,593,087 UART:
20,593,328 UART: Running Caliptra FMC ...
20,594,430 UART:
20,594,586 UART: [state] CFI Enabled
20,652,910 UART: [fht] FMC Alias Private Key: 7
22,417,150 UART: [art] Extend RT PCRs Done
22,418,378 UART: [art] Lock RT PCRs Done
22,420,035 UART: [art] Populate DV Done
22,425,609 UART: [fht] FMC Alias Private Key: 7
22,427,171 UART: [art] Derive CDI
22,427,909 UART: [art] Store in in slot 0x4
22,485,408 UART: [art] Derive Key Pair
22,486,406 UART: [art] Store priv key in slot 0x5
24,949,061 UART: [art] Derive Key Pair - Done
24,962,272 UART: [art] Signing Cert with AUTHO
24,963,571 UART: RITY.KEYID = 7
26,674,262 UART: [art] Erasing AUTHORITY.KEYID = 7
26,675,762 UART: [art] PUB.X = 84E5568CE0EE5957DFE494FE5E77213E5CB0709F8B0FF8CA927B812A4908424957ED7D3BC520BBAD515D9B05D0A924C9
26,683,039 UART: [art] PUB.Y = C3E02BC77A3892A678507AA6E937FA3E41BC219A48AF5EC8B529953284062C378A15D3B38850E5556B44E295F033E71C
26,690,269 UART: [art] SIG.R = 73C2B8E0954618983C6C910CDAA67969CAEB192A91C4FCD434125AB560040DDC4BB773FE3DC1E7E40EC722187086C5DC
26,697,702 UART: [art] SIG.S = 265A7867A42CA8087DDAC32843BAFC5F90359D35669C66EEF5D63E7DCC6FD0142DA498C4C1B8C279B665149A2C20430E
27,676,554 UART: Caliptra RT
27,677,251 UART: [state] CFI Enabled
27,841,702 UART: [rt] RT listening for mailbox commands...
27,872,838 UART: [rt]cmd =0x49444352, len=4
27,880,617 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
193,412 UART:
193,790 UART: Running Caliptra ROM ...
194,898 UART:
195,037 UART: [state] CFI Enabled
264,804 UART: [state] LifecycleState = Unprovisioned
267,151 UART: [state] DebugLocked = No
269,327 UART: [state] WD Timer not started. Device not locked for debugging
273,718 UART: [kat] SHA2-256
463,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,369 UART: [kat] ++
474,847 UART: [kat] sha1
486,659 UART: [kat] SHA2-256
489,714 UART: [kat] SHA2-384
495,788 UART: [kat] SHA2-512-ACC
498,375 UART: [kat] ECC-384
2,947,745 UART: [kat] HMAC-384Kdf
2,972,060 UART: [kat] LMS
3,503,833 UART: [kat] --
3,508,982 UART: [cold-reset] ++
3,510,853 UART: [fht] FHT @ 0x50003400
3,521,923 UART: [idev] ++
3,522,629 UART: [idev] CDI.KEYID = 6
3,523,782 UART: [idev] SUBJECT.KEYID = 7
3,524,930 UART: [idev] UDS.KEYID = 0
3,544,992 UART: [idev] Erasing UDS.KEYID = 0
6,031,266 UART: [idev] Sha1 KeyId Algorithm
6,053,540 UART: [idev] CSR upload begun
6,058,255 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,785,508 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,800,773 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,815,764 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,830,803 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,855,951 UART: [idev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
7,985,602 UART: [idev] CSR uploaded
7,993,725 ready_for_fw is high
7,994,013 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,138,038 UART: [idev] --
8,138,678 UART: [ldev] ++
8,139,177 UART: [ldev] CDI.KEYID = 6
8,140,054 UART: [ldev] SUBJECT.KEYID = 5
8,141,112 UART: [ldev] AUTHORITY.KEYID = 7
8,142,201 UART: [ldev] FE.KEYID = 1
8,143,064 UART: [ldev] Erasing FE.KEYID = 1
10,545,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,282,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,297,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,312,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,327,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,349,097 UART: [ldev] --
12,354,631 UART: [fwproc] Wait for Commands...
12,357,799 UART: [fwproc] Recv command 0x46574c44
12,360,104 UART: [fwproc] Recv'd Img size: 114360 bytes
15,806,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,886,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,002,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,545,449 >>> mbox cmd response: success
16,545,920 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,549,183 UART: [afmc] ++
16,549,928 UART: [afmc] CDI.KEYID = 6
16,551,031 UART: [afmc] SUBJECT.KEYID = 7
16,552,574 UART: [afmc] AUTHORITY.KEYID = 5
19,087,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,811,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,813,507 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,828,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,843,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,858,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,882,777 UART: [afmc] --
20,885,578 UART: [cold-reset] --
20,890,128 UART: [state] Locking Datavault
20,895,656 UART: [state] Locking PCR0, PCR1 and PCR31
20,897,850 UART: [state] Locking ICCM
20,900,813 UART: [exit] Launching FMC @ 0x40000130
20,909,488 UART:
20,909,725 UART: Running Caliptra FMC ...
20,910,830 UART:
20,910,986 UART: [state] CFI Enabled
20,971,363 UART: [fht] FMC Alias Private Key: 7
22,734,882 UART: [art] Extend RT PCRs Done
22,736,103 UART: [art] Lock RT PCRs Done
22,737,671 UART: [art] Populate DV Done
22,742,971 UART: [fht] FMC Alias Private Key: 7
22,744,454 UART: [art] Derive CDI
22,745,215 UART: [art] Store in in slot 0x4
22,804,028 UART: [art] Derive Key Pair
22,805,073 UART: [art] Store priv key in slot 0x5
25,268,087 UART: [art] Derive Key Pair - Done
25,280,918 UART: [art] Signing Cert with AUTHO
25,282,225 UART: RITY.KEYID = 7
26,994,386 UART: [art] Erasing AUTHORITY.KEYID = 7
26,995,898 UART: [art] PUB.X = 6B0929251B0D581E3D9C3644F10FAEA90D9690C631E613A5DDEB6FBE5CF3E03CE35FAF1899929C3D6619F1CAD8A7FFC7
27,003,199 UART: [art] PUB.Y = CB5CA1E160CA8752804817F92D4BB033DE18A66E359C5B8FCC92FFE00B45EAA35892A9CB35D7BA33FD0ABE0189CE92DE
27,010,480 UART: [art] SIG.R = E59FB8941D3BD74988ED732F5F3A7A57920C9C554AF3EAA848423C695C5A8EA1874D0F27537CB88A7282560C9AEA198C
27,017,871 UART: [art] SIG.S = F4B804A528D23AEC58DE64A0B6908082C991F90336164250A27943F3C0EBC1D82D0A2423E1D200D4478BC61EE8233778
27,996,050 UART: Caliptra RT
27,996,748 UART: [state] CFI Enabled
28,162,682 UART: [rt] RT listening for mailbox commands...
28,193,900 UART: [rt]cmd =0x49444352, len=4
28,195,617 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
7,713,335 ready_for_fw is high
7,713,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,504,928 >>> mbox cmd response: success
16,505,511 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,803,000 UART:
20,803,391 UART: Running Caliptra FMC ...
20,804,533 UART:
20,804,694 UART: [state] CFI Enabled
20,865,091 UART: [fht] FMC Alias Private Key: 7
22,629,470 UART: [art] Extend RT PCRs Done
22,630,698 UART: [art] Lock RT PCRs Done
22,632,322 UART: [art] Populate DV Done
22,637,679 UART: [fht] FMC Alias Private Key: 7
22,639,277 UART: [art] Derive CDI
22,640,096 UART: [art] Store in in slot 0x4
22,697,844 UART: [art] Derive Key Pair
22,698,891 UART: [art] Store priv key in slot 0x5
25,161,858 UART: [art] Derive Key Pair - Done
25,174,921 UART: [art] Signing Cert with AUTHO
25,176,230 UART: RITY.KEYID = 7
26,887,494 UART: [art] Erasing AUTHORITY.KEYID = 7
26,889,004 UART: [art] PUB.X = 56809EEE3672E1FBCB78620B257198AD871EEBCA5F0F9F10F7007DBBD6ED1FC23381AA4F0D683395BB18B3CD93B745E2
26,896,257 UART: [art] PUB.Y = 700711767EB1254DDAF678BDAFA3F8FC64C58F4D0560FA17384CBCBDC191A75960D939A2AFEF1B479A9FAC36310CD5CE
26,903,519 UART: [art] SIG.R = 9CEAB005AE96FDA0CE2E062F33253934C51AE5F5F00C4892FFB08207F9122671709752E10E0C47A9977413C876B9F9DD
26,910,907 UART: [art] SIG.S = 3EC58B43078C431A072F2759CDB6634F3E4DE54491D395ADA39EFE5A684B120843E27674E584858E1C1ED9BFFD14CCC4
27,889,644 UART: Caliptra RT
27,890,365 UART: [state] CFI Enabled
28,053,846 UART: [rt] RT listening for mailbox commands...
28,085,055 UART: [rt]cmd =0x49444352, len=4
28,086,945 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,532 UART:
192,886 UART: Running Caliptra ROM ...
194,026 UART:
603,662 UART: [state] CFI Enabled
616,280 UART: [state] LifecycleState = Unprovisioned
618,323 UART: [state] DebugLocked = No
619,915 UART: [state] WD Timer not started. Device not locked for debugging
624,226 UART: [kat] SHA2-256
814,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,840 UART: [kat] ++
825,374 UART: [kat] sha1
836,618 UART: [kat] SHA2-256
839,622 UART: [kat] SHA2-384
844,899 UART: [kat] SHA2-512-ACC
847,574 UART: [kat] ECC-384
3,290,947 UART: [kat] HMAC-384Kdf
3,303,956 UART: [kat] LMS
3,835,762 UART: [kat] --
3,841,817 UART: [cold-reset] ++
3,843,106 UART: [fht] FHT @ 0x50003400
3,855,288 UART: [idev] ++
3,855,998 UART: [idev] CDI.KEYID = 6
3,856,905 UART: [idev] SUBJECT.KEYID = 7
3,858,146 UART: [idev] UDS.KEYID = 0
3,874,032 UART: [idev] Erasing UDS.KEYID = 0
6,331,583 UART: [idev] Sha1 KeyId Algorithm
6,354,217 UART: [idev] CSR upload begun
6,358,951 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,075,434 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,090,677 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,105,725 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,120,686 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,145,874 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,275,587 UART: [idev] CSR uploaded
8,283,715 ready_for_fw is high
8,284,010 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
8,428,116 UART: [idev] --
8,428,775 UART: [ldev] ++
8,429,278 UART: [ldev] CDI.KEYID = 6
8,430,152 UART: [ldev] SUBJECT.KEYID = 5
8,431,243 UART: [ldev] AUTHORITY.KEYID = 7
8,432,361 UART: [ldev] FE.KEYID = 1
8,433,197 UART: [ldev] Erasing FE.KEYID = 1
10,776,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,494,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,509,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,524,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,540,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,560,305 UART: [ldev] --
12,566,646 UART: [fwproc] Wait for Commands...
12,568,571 UART: [fwproc] Recv command 0x46574c44
12,570,874 UART: [fwproc] Recv'd Img size: 114360 bytes
16,020,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,099,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,215,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,758,669 >>> mbox cmd response: success
16,759,178 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,762,556 UART: [afmc] ++
16,763,249 UART: [afmc] CDI.KEYID = 6
16,764,505 UART: [afmc] SUBJECT.KEYID = 7
16,765,932 UART: [afmc] AUTHORITY.KEYID = 5
19,269,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,991,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,992,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,008,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,023,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,038,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,061,295 UART: [afmc] --
21,064,668 UART: [cold-reset] --
21,070,154 UART: [state] Locking Datavault
21,075,671 UART: [state] Locking PCR0, PCR1 and PCR31
21,077,855 UART: [state] Locking ICCM
21,080,221 UART: [exit] Launching FMC @ 0x40000130
21,088,888 UART:
21,089,170 UART: Running Caliptra FMC ...
21,090,304 UART:
21,090,471 UART: [state] CFI Enabled
21,098,246 UART: [fht] FMC Alias Private Key: 7
22,854,912 UART: [art] Extend RT PCRs Done
22,856,124 UART: [art] Lock RT PCRs Done
22,857,795 UART: [art] Populate DV Done
22,862,878 UART: [fht] FMC Alias Private Key: 7
22,864,353 UART: [art] Derive CDI
22,865,111 UART: [art] Store in in slot 0x4
22,907,535 UART: [art] Derive Key Pair
22,908,531 UART: [art] Store priv key in slot 0x5
25,335,001 UART: [art] Derive Key Pair - Done
25,348,163 UART: [art] Signing Cert with AUTHO
25,349,469 UART: RITY.KEYID = 7
27,054,637 UART: [art] Erasing AUTHORITY.KEYID = 7
27,056,134 UART: [art] PUB.X = 26E1AD965D1758C0FFA9F4195A5F1B595BD8D51050BFCFF6A109DA7E49188121CCB7E996CB77A3955F0E156BB359ACEA
27,063,496 UART: [art] PUB.Y = DD02FD3EE4C083CD932FC7AEEE2B9BC464F9468E6192DE47F95DCCC5E5C8F91A1F110A9159E7B8D82FD2C4964C1BF631
27,070,731 UART: [art] SIG.R = F9C55BF14AFFF6204FD81477D93B559B36E669A3F68A03961AD7C4D6643D29DF5A9380D85CF6BD3F520002532D4288C2
27,078,127 UART: [art] SIG.S = 07A1E0FB223F5DE22E969C6D7F13558E119E3E0EC31450D5E8B989C3570485B669783860AAAD75214344B459CB0D53C8
28,056,942 UART: Caliptra RT
28,057,641 UART: [state] CFI Enabled
28,174,162 UART: [rt] RT listening for mailbox commands...
28,205,139 UART: [rt]cmd =0x49444352, len=4
28,207,126 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
7,978,233 ready_for_fw is high
7,978,918 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,686,663 >>> mbox cmd response: success
16,687,257 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,944,555 UART:
20,944,940 UART: Running Caliptra FMC ...
20,946,045 UART:
20,946,219 UART: [state] CFI Enabled
20,954,059 UART: [fht] FMC Alias Private Key: 7
22,710,830 UART: [art] Extend RT PCRs Done
22,712,054 UART: [art] Lock RT PCRs Done
22,713,548 UART: [art] Populate DV Done
22,718,796 UART: [fht] FMC Alias Private Key: 7
22,720,436 UART: [art] Derive CDI
22,721,172 UART: [art] Store in in slot 0x4
22,763,823 UART: [art] Derive Key Pair
22,764,858 UART: [art] Store priv key in slot 0x5
25,191,871 UART: [art] Derive Key Pair - Done
25,204,595 UART: [art] Signing Cert with AUTHO
25,205,899 UART: RITY.KEYID = 7
26,911,500 UART: [art] Erasing AUTHORITY.KEYID = 7
26,912,987 UART: [art] PUB.X = AE78E31624681D05B9874B37F04565991B58135F5B772FACBCE655947CE9C9B40D6447E0283A2222060372CB2D14330C
26,920,293 UART: [art] PUB.Y = AE7F543C28AA632E9044919AC39815E52774E4F3D3FCF1E5EECFC5462500E55AD5E86566D1FB15BCACC8531C6FF607BB
26,927,517 UART: [art] SIG.R = F0EA0030246C2AC45834FF39A1543BB98C52234F77B3CB191532558AB6B38BCC41EF1B0E02A3158294028C081EFA865F
26,934,907 UART: [art] SIG.S = 9622955055BC3A720A3C69C8CE565F2D1E8560EB177C603CF22A35DF9411DF11483CF983AAA32322649FC9FA17F06690
27,913,910 UART: Caliptra RT
27,914,621 UART: [state] CFI Enabled
28,031,999 UART: [rt] RT listening for mailbox commands...
28,063,027 UART: [rt]cmd =0x49444352, len=4
28,064,671 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,375 UART: [kat] SHA2-256
882,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,421 UART: [kat] ++
886,573 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,486 UART: [kat] SHA2-512-ACC
897,387 UART: [kat] ECC-384
903,108 UART: [kat] HMAC-384Kdf
907,684 UART: [kat] LMS
1,475,880 UART: [kat] --
1,476,711 UART: [cold-reset] ++
1,477,047 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,674 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] CSR upload requested
1,515,973 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,056 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,763 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,645 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,350 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,770 UART: [idev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
1,602,918 UART: [idev] CSR uploaded
1,605,299 ready_for_fw is high
1,605,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,605,470 UART: [idev] --
1,606,515 UART: [ldev] ++
1,606,683 UART: [ldev] CDI.KEYID = 6
1,607,046 UART: [ldev] SUBJECT.KEYID = 5
1,607,472 UART: [ldev] AUTHORITY.KEYID = 7
1,607,935 UART: [ldev] FE.KEYID = 1
1,613,117 UART: [ldev] Erasing FE.KEYID = 1
1,638,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,657,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,310 UART: [ldev] --
1,677,647 UART: [fwproc] Waiting for Commands...
1,678,422 UART: [fwproc] Received command 0x46574c44
1,679,213 UART: [fwproc] Received Image of size 114360 bytes
2,976,910 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,003,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,033,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,169,069 >>> mbox cmd response: success
3,169,069 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,170,131 UART: [afmc] ++
3,170,299 UART: [afmc] CDI.KEYID = 6
3,170,661 UART: [afmc] SUBJECT.KEYID = 7
3,171,086 UART: [afmc] AUTHORITY.KEYID = 5
3,205,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,222,171 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,222,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,228,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,234,564 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,240,254 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,248,231 UART: [afmc] --
3,249,323 UART: [cold-reset] --
3,250,203 UART: [state] Locking Datavault
3,251,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,251,698 UART: [state] Locking ICCM
3,252,218 UART: [exit] Launching FMC @ 0x40000130
3,257,547 UART:
3,257,563 UART: Running Caliptra FMC ...
3,257,971 UART:
3,258,025 UART: [state] CFI Enabled
3,268,792 UART: [fht] FMC Alias Private Key: 7
3,376,917 UART: [art] Extend RT PCRs Done
3,377,345 UART: [art] Lock RT PCRs Done
3,378,949 UART: [art] Populate DV Done
3,387,096 UART: [fht] FMC Alias Private Key: 7
3,388,192 UART: [art] Derive CDI
3,388,472 UART: [art] Store in in slot 0x4
3,474,039 UART: [art] Derive Key Pair
3,474,399 UART: [art] Store priv key in slot 0x5
3,487,023 UART: [art] Derive Key Pair - Done
3,501,489 UART: [art] Signing Cert with AUTHO
3,501,969 UART: RITY.KEYID = 7
3,517,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,934 UART: [art] PUB.X = 13BD4819399E633FCBC1483B77591AABE3573F31964CF998C1B7E39F49B1C078B3F3CBC10C278292B2746A871A15D111
3,524,701 UART: [art] PUB.Y = 781138CD19D6FB52981AA1EB93F34D4654061615804835249BDE9EB9A8558837F4A3F6D27E3A0C8E1BE31B2DEE9A5EA7
3,531,651 UART: [art] SIG.R = 633CC8F5119E813EDF65439140D2F7ED986E9BC2E1C57420F15E1A82E9A745EBB01EB4B9AC1C979AABEF891E8AEA99F0
3,538,439 UART: [art] SIG.S = A405525A92DEEF5FB3E508F8D2A340FD6CC56C0158BA25D37D42443198EBF6CC797FCF62444849DC87CD7268B2629C17
3,562,047 UART: Caliptra RT
3,562,301 UART: [state] CFI Enabled
3,669,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,026 UART: [rt]cmd =0x49444352, len=4
3,701,273 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,568 ready_for_fw is high
1,411,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,944,156 >>> mbox cmd response: success
2,944,156 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,005,578 UART:
3,005,594 UART: Running Caliptra FMC ...
3,006,002 UART:
3,006,056 UART: [state] CFI Enabled
3,016,523 UART: [fht] FMC Alias Private Key: 7
3,124,354 UART: [art] Extend RT PCRs Done
3,124,782 UART: [art] Lock RT PCRs Done
3,126,350 UART: [art] Populate DV Done
3,134,683 UART: [fht] FMC Alias Private Key: 7
3,135,805 UART: [art] Derive CDI
3,136,085 UART: [art] Store in in slot 0x4
3,221,566 UART: [art] Derive Key Pair
3,221,926 UART: [art] Store priv key in slot 0x5
3,235,306 UART: [art] Derive Key Pair - Done
3,250,146 UART: [art] Signing Cert with AUTHO
3,250,626 UART: RITY.KEYID = 7
3,265,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,395 UART: [art] PUB.X = 3204EDF6F31BC1C21EF1638D7BEA3D5FE64FC83DCBAB569387AFF6BAC51D68AE2D3CC11F1A20FBA89B5A8A05DDEAA0AA
3,273,197 UART: [art] PUB.Y = 803A131A1FD9E66A6E73628E72312D42226AD2C6DA2822E13A3215B3008CED94E845904FF8D88E61EEEB21AA9F2668F0
3,280,129 UART: [art] SIG.R = 907382CA6496815FD9F5184ECC503A514C6833B44757E544F79C9A44233B5232744EF17C6A662354D591003B2AFBE017
3,286,867 UART: [art] SIG.S = BC903CA9DA988DDA40DC3537E50338ADB4C80FA964D7B632EBF491F53CC6E5E5661D0D8933734F831F7F4C9FFA7B44F6
3,310,745 UART: Caliptra RT
3,310,999 UART: [state] CFI Enabled
3,419,608 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,785 UART: [rt]cmd =0x49444352, len=4
3,451,130 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,194 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,776 UART: [kat] SHA2-256
882,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,822 UART: [kat] ++
886,974 UART: [kat] sha1
891,044 UART: [kat] SHA2-256
892,982 UART: [kat] SHA2-384
895,853 UART: [kat] SHA2-512-ACC
897,754 UART: [kat] ECC-384
903,613 UART: [kat] HMAC-384Kdf
908,307 UART: [kat] LMS
1,476,503 UART: [kat] --
1,477,432 UART: [cold-reset] ++
1,477,930 UART: [fht] Storing FHT @ 0x50003400
1,480,759 UART: [idev] ++
1,480,927 UART: [idev] CDI.KEYID = 6
1,481,287 UART: [idev] SUBJECT.KEYID = 7
1,481,711 UART: [idev] UDS.KEYID = 0
1,489,573 UART: [idev] Erasing UDS.KEYID = 0
1,506,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,998 UART: [idev] CSR upload requested
1,516,844 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,457 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,533,164 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,539,046 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,751 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,553,171 UART: [idev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
1,603,319 UART: [idev] CSR uploaded
1,605,700 ready_for_fw is high
1,605,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,605,871 UART: [idev] --
1,606,994 UART: [ldev] ++
1,607,162 UART: [ldev] CDI.KEYID = 6
1,607,525 UART: [ldev] SUBJECT.KEYID = 5
1,607,951 UART: [ldev] AUTHORITY.KEYID = 7
1,608,414 UART: [ldev] FE.KEYID = 1
1,613,606 UART: [ldev] Erasing FE.KEYID = 1
1,639,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,652,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,658,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,664,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,677,059 UART: [ldev] --
1,678,410 UART: [fwproc] Waiting for Commands...
1,679,259 UART: [fwproc] Received command 0x46574c44
1,680,050 UART: [fwproc] Received Image of size 114360 bytes
2,978,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,006,379 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,035,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,171,712 >>> mbox cmd response: success
3,171,712 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,172,828 UART: [afmc] ++
3,172,996 UART: [afmc] CDI.KEYID = 6
3,173,358 UART: [afmc] SUBJECT.KEYID = 7
3,173,783 UART: [afmc] AUTHORITY.KEYID = 5
3,209,236 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,225,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,226,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,231,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,237,657 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,243,347 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,251,326 UART: [afmc] --
3,252,432 UART: [cold-reset] --
3,253,448 UART: [state] Locking Datavault
3,254,583 UART: [state] Locking PCR0, PCR1 and PCR31
3,255,187 UART: [state] Locking ICCM
3,255,719 UART: [exit] Launching FMC @ 0x40000130
3,261,048 UART:
3,261,064 UART: Running Caliptra FMC ...
3,261,472 UART:
3,261,615 UART: [state] CFI Enabled
3,272,528 UART: [fht] FMC Alias Private Key: 7
3,380,465 UART: [art] Extend RT PCRs Done
3,380,893 UART: [art] Lock RT PCRs Done
3,382,267 UART: [art] Populate DV Done
3,390,380 UART: [fht] FMC Alias Private Key: 7
3,391,504 UART: [art] Derive CDI
3,391,784 UART: [art] Store in in slot 0x4
3,477,605 UART: [art] Derive Key Pair
3,477,965 UART: [art] Store priv key in slot 0x5
3,490,959 UART: [art] Derive Key Pair - Done
3,505,600 UART: [art] Signing Cert with AUTHO
3,506,080 UART: RITY.KEYID = 7
3,521,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,522,189 UART: [art] PUB.X = 273C6E84242E757280BCEE84D5B3F4B6DFDC4D96FF155EB93F3DE06F003366AA1CD93C1877D1FEF5EB3775E35E09ABE8
3,528,952 UART: [art] PUB.Y = CF5C73BF28EA5FFDF9341999BEF0ECABF135A3BF74493DE628A31738637B2737E012D57DD47B7CB40C772493D51951DA
3,535,911 UART: [art] SIG.R = 8C78DAAD3CC08334E1CD4B85B34F438B9EFBC06551D9F8F24AC29984C8803373D74BC7CACB0D689F4E2A514C62F0AEA6
3,542,696 UART: [art] SIG.S = FBE56C5994B999FF9B328B1F27DE64A00FE05338141B202F096C89C255437A725172AB893022A122FA80A5F07047A308
3,566,412 UART: Caliptra RT
3,566,758 UART: [state] CFI Enabled
3,675,207 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,360 UART: [rt]cmd =0x49444352, len=4
3,706,935 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,483 ready_for_fw is high
1,410,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,944,079 >>> mbox cmd response: success
2,944,079 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,005,423 UART:
3,005,439 UART: Running Caliptra FMC ...
3,005,847 UART:
3,005,990 UART: [state] CFI Enabled
3,016,843 UART: [fht] FMC Alias Private Key: 7
3,124,520 UART: [art] Extend RT PCRs Done
3,124,948 UART: [art] Lock RT PCRs Done
3,126,266 UART: [art] Populate DV Done
3,134,519 UART: [fht] FMC Alias Private Key: 7
3,135,511 UART: [art] Derive CDI
3,135,791 UART: [art] Store in in slot 0x4
3,221,240 UART: [art] Derive Key Pair
3,221,600 UART: [art] Store priv key in slot 0x5
3,235,346 UART: [art] Derive Key Pair - Done
3,250,153 UART: [art] Signing Cert with AUTHO
3,250,633 UART: RITY.KEYID = 7
3,266,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,870 UART: [art] PUB.X = 001C967C6435CBDB6F4071DDB7299A48C123059FCADA587BA2F8EF894DFA37F5945E9B1A5033FA7968CD0AA57570DEDB
3,273,628 UART: [art] PUB.Y = 77380751976B39BF54884661FB261F9FB6D25A66C0B62CE3A19F8823612B9769CC9419F5B6E32ABB4BC628EFB6539478
3,280,573 UART: [art] SIG.R = 7AE8B3698CB5A5BE8A9F4409451519077D03F055CE636747F5CB16B21A809E5419B732626B3C508A8D12081D222EC8AC
3,287,329 UART: [art] SIG.S = 0A4D46A5D36C8F0272FE17350B4AF8AA124B289655ABF9EB722DCC539C1748F0C4EBD731525BA6DBD8A75F0119E2E316
3,311,306 UART: Caliptra RT
3,311,652 UART: [state] CFI Enabled
3,420,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,352 UART: [rt]cmd =0x49444352, len=4
3,451,829 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,735 UART: [kat] SHA2-256
903,675 UART: [kat] SHA2-384
906,192 UART: [kat] SHA2-512-ACC
908,093 UART: [kat] ECC-384
917,626 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,395 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,308 UART: [idev] ++
1,174,476 UART: [idev] CDI.KEYID = 6
1,174,836 UART: [idev] SUBJECT.KEYID = 7
1,175,260 UART: [idev] UDS.KEYID = 0
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,975 UART: [idev] Sha1 KeyId Algorithm
1,208,271 UART: [idev] CSR upload begun
1,210,052 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,944 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,651 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,533 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,238 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,658 UART: [idev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
1,296,806 UART: [idev] CSR uploaded
1,299,185 ready_for_fw is high
1,299,185 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,299,356 UART: [idev] --
1,300,470 UART: [ldev] ++
1,300,638 UART: [ldev] CDI.KEYID = 6
1,301,001 UART: [ldev] SUBJECT.KEYID = 5
1,301,427 UART: [ldev] AUTHORITY.KEYID = 7
1,301,890 UART: [ldev] FE.KEYID = 1
1,307,230 UART: [ldev] Erasing FE.KEYID = 1
1,333,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,224 UART: [ldev] --
1,372,733 UART: [fwproc] Wait for Commands...
1,373,315 UART: [fwproc] Recv command 0x46574c44
1,374,043 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,273 >>> mbox cmd response: success
2,865,273 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,866,379 UART: [afmc] ++
2,866,547 UART: [afmc] CDI.KEYID = 6
2,866,909 UART: [afmc] SUBJECT.KEYID = 7
2,867,334 UART: [afmc] AUTHORITY.KEYID = 5
2,902,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,928 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,884 UART: [afmc] --
2,945,800 UART: [cold-reset] --
2,946,618 UART: [state] Locking Datavault
2,947,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,387 UART: [state] Locking ICCM
2,949,017 UART: [exit] Launching FMC @ 0x40000130
2,954,346 UART:
2,954,362 UART: Running Caliptra FMC ...
2,954,770 UART:
2,954,824 UART: [state] CFI Enabled
2,965,233 UART: [fht] FMC Alias Private Key: 7
3,073,056 UART: [art] Extend RT PCRs Done
3,073,484 UART: [art] Lock RT PCRs Done
3,074,876 UART: [art] Populate DV Done
3,083,185 UART: [fht] FMC Alias Private Key: 7
3,084,357 UART: [art] Derive CDI
3,084,637 UART: [art] Store in in slot 0x4
3,170,342 UART: [art] Derive Key Pair
3,170,702 UART: [art] Store priv key in slot 0x5
3,184,420 UART: [art] Derive Key Pair - Done
3,198,685 UART: [art] Signing Cert with AUTHO
3,199,165 UART: RITY.KEYID = 7
3,214,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,094 UART: [art] PUB.X = 3B2522493F255572C90E0C41692CB89923F604C967317A615EE36B4170289C0E366AD03A5B71BE2CB64F37D66F2BC339
3,221,846 UART: [art] PUB.Y = 2D300EA0939C54336EF4128DDF90D71DF8BDA5DA6F474755BADE6A8471C9BBCE907D758781449E21F226A5BBF867C3B7
3,228,805 UART: [art] SIG.R = E53C5AF67ABBA7D27C0565E4A8AA1BE6A0B317558ABA3121E365E79FD41EF973124A40159EA567376E51463D204AB507
3,235,575 UART: [art] SIG.S = F8954382FB5CE730F4B334A7F1EBFA8A13C6383C203B5F00C8F3B58D8CB17CBA92AF4014691F9FD3532DF352DE875710
3,259,988 UART: Caliptra RT
3,260,242 UART: [state] CFI Enabled
3,368,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,588 UART: [rt]cmd =0x49444352, len=4
3,399,995 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,296 ready_for_fw is high
1,109,296 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,643,983 >>> mbox cmd response: success
2,643,983 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,706,101 UART:
2,706,117 UART: Running Caliptra FMC ...
2,706,525 UART:
2,706,579 UART: [state] CFI Enabled
2,717,036 UART: [fht] FMC Alias Private Key: 7
2,824,797 UART: [art] Extend RT PCRs Done
2,825,225 UART: [art] Lock RT PCRs Done
2,827,069 UART: [art] Populate DV Done
2,835,134 UART: [fht] FMC Alias Private Key: 7
2,836,208 UART: [art] Derive CDI
2,836,488 UART: [art] Store in in slot 0x4
2,921,923 UART: [art] Derive Key Pair
2,922,283 UART: [art] Store priv key in slot 0x5
2,935,695 UART: [art] Derive Key Pair - Done
2,950,396 UART: [art] Signing Cert with AUTHO
2,950,876 UART: RITY.KEYID = 7
2,965,904 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,669 UART: [art] PUB.X = BCEF4483A37E1F441D2C08AC4FFBDC06E98852B4C0F24098666D4446670BEFF0F27B997B4E0195D8BE7629144F230081
2,973,409 UART: [art] PUB.Y = 22B762E429F012F68D8F8BEA166DF13FA5B720A8C9198518EB617BF75CCD56680AEDD4F4F49C7C9C0058B758D7730C2A
2,980,341 UART: [art] SIG.R = 9BEE40995299F66006EFB378BC77A9B84C2A926CC1D4D34DB74937A492B5583EE5A722CA2450EEAFB500E9A4BD48DA63
2,987,098 UART: [art] SIG.S = 8C409BB9FCCF7A1D3C3D5AF58025A5FB4720BF35DD2B62A1BD3503CA11B52D09B5A1BF155528C43D64B041A9D67426CD
3,010,891 UART: Caliptra RT
3,011,145 UART: [state] CFI Enabled
3,118,088 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,337 UART: [rt]cmd =0x49444352, len=4
3,149,560 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
906,981 UART: [kat] SHA2-512-ACC
908,882 UART: [kat] ECC-384
919,019 UART: [kat] HMAC-384Kdf
923,655 UART: [kat] LMS
1,171,983 UART: [kat] --
1,172,794 UART: [cold-reset] ++
1,173,288 UART: [fht] FHT @ 0x50003400
1,175,793 UART: [idev] ++
1,175,961 UART: [idev] CDI.KEYID = 6
1,176,321 UART: [idev] SUBJECT.KEYID = 7
1,176,745 UART: [idev] UDS.KEYID = 0
1,184,973 UART: [idev] Erasing UDS.KEYID = 0
1,202,098 UART: [idev] Sha1 KeyId Algorithm
1,210,338 UART: [idev] CSR upload begun
1,212,119 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,821 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,528 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,410 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,240,115 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,535 UART: [idev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
1,298,683 UART: [idev] CSR uploaded
1,301,062 ready_for_fw is high
1,301,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,301,233 UART: [idev] --
1,302,281 UART: [ldev] ++
1,302,449 UART: [ldev] CDI.KEYID = 6
1,302,812 UART: [ldev] SUBJECT.KEYID = 5
1,303,238 UART: [ldev] AUTHORITY.KEYID = 7
1,303,701 UART: [ldev] FE.KEYID = 1
1,308,819 UART: [ldev] Erasing FE.KEYID = 1
1,335,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,959 UART: [ldev] --
1,374,402 UART: [fwproc] Wait for Commands...
1,375,022 UART: [fwproc] Recv command 0x46574c44
1,375,750 UART: [fwproc] Recv'd Img size: 114360 bytes
2,673,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,865,546 >>> mbox cmd response: success
2,865,546 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,866,582 UART: [afmc] ++
2,866,750 UART: [afmc] CDI.KEYID = 6
2,867,112 UART: [afmc] SUBJECT.KEYID = 7
2,867,537 UART: [afmc] AUTHORITY.KEYID = 5
2,903,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,920,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,141 UART: [afmc] --
2,947,111 UART: [cold-reset] --
2,947,993 UART: [state] Locking Datavault
2,949,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,810 UART: [state] Locking ICCM
2,950,376 UART: [exit] Launching FMC @ 0x40000130
2,955,705 UART:
2,955,721 UART: Running Caliptra FMC ...
2,956,129 UART:
2,956,272 UART: [state] CFI Enabled
2,966,843 UART: [fht] FMC Alias Private Key: 7
3,075,388 UART: [art] Extend RT PCRs Done
3,075,816 UART: [art] Lock RT PCRs Done
3,077,448 UART: [art] Populate DV Done
3,085,627 UART: [fht] FMC Alias Private Key: 7
3,086,615 UART: [art] Derive CDI
3,086,895 UART: [art] Store in in slot 0x4
3,172,580 UART: [art] Derive Key Pair
3,172,940 UART: [art] Store priv key in slot 0x5
3,186,010 UART: [art] Derive Key Pair - Done
3,200,594 UART: [art] Signing Cert with AUTHO
3,201,074 UART: RITY.KEYID = 7
3,216,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,217,461 UART: [art] PUB.X = 59179A96451C085A013E46C488904F31CB4C79F0BEB3D71B9A8C2F64A4224E3811761FE58EC295B8C3125646675B7064
3,224,217 UART: [art] PUB.Y = 2107554618CD9ACFCD4CC6ECE03FA5C81E67BD8C053E0C2B69D934FA3A0946E21DF1EF040ACB6B766C3C382E358FCD01
3,231,166 UART: [art] SIG.R = C1D270564B8C6BFD493DF5385AFCD444B6F505E8746527E6AD798280349AC66B171FAB524FB87FE1CC3FFD2B7D593032
3,237,943 UART: [art] SIG.S = 978CC522FF74AB04A78D6196EDE10C7CCA623C1AA3849BB97F9919F78C324D8741A92B00D2BA7DAE1A65D5429898F7AA
3,261,848 UART: Caliptra RT
3,262,194 UART: [state] CFI Enabled
3,370,581 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,638 UART: [rt]cmd =0x49444352, len=4
3,401,691 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,253 ready_for_fw is high
1,110,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,950 >>> mbox cmd response: success
2,644,950 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,707,252 UART:
2,707,268 UART: Running Caliptra FMC ...
2,707,676 UART:
2,707,819 UART: [state] CFI Enabled
2,718,340 UART: [fht] FMC Alias Private Key: 7
2,825,781 UART: [art] Extend RT PCRs Done
2,826,209 UART: [art] Lock RT PCRs Done
2,827,859 UART: [art] Populate DV Done
2,835,808 UART: [fht] FMC Alias Private Key: 7
2,836,858 UART: [art] Derive CDI
2,837,138 UART: [art] Store in in slot 0x4
2,922,979 UART: [art] Derive Key Pair
2,923,339 UART: [art] Store priv key in slot 0x5
2,936,495 UART: [art] Derive Key Pair - Done
2,951,272 UART: [art] Signing Cert with AUTHO
2,951,752 UART: RITY.KEYID = 7
2,966,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,739 UART: [art] PUB.X = AB38F726623A7632FE26AA7279526F54A537167A23A917FF379319C33264203C1FFDDBCF1A51C15B78C6DDCB08423B57
2,974,508 UART: [art] PUB.Y = FC5C36D3571B7EF844CB85DD20C7E3F5F56A8E669F177E20D3EC3878C9141C5B074971A4ADB90840BAE7756A50EBA0A9
2,981,464 UART: [art] SIG.R = 0B7C7BC2429AC9AF39661CBEC99B3340DE4DB3D8BAFB69ADB3372339D0E6DEE5514BCCD30A6300DDFEE2B4FFFF3DD59D
2,988,240 UART: [art] SIG.S = E7A7BAAB9CD1E12DDED0A7D13F24583C0B19EB59690DFBC94BCDE81F63F5049241CB9F47936BD9E833DDD25BE5045620
3,012,369 UART: Caliptra RT
3,012,715 UART: [state] CFI Enabled
3,120,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,151,056 UART: [rt]cmd =0x49444352, len=4
3,152,307 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
903,930 UART: [kat] SHA2-512-ACC
905,831 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
920,158 UART: [kat] LMS
1,168,470 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] CSR upload begun
1,209,216 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,853 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,561 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,446 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,152 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,581 UART: [idev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
1,297,075 UART: [idev] CSR uploaded
1,300,120 ready_for_fw is high
1,300,120 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,300,289 UART: [idev] --
1,301,262 UART: [ldev] ++
1,301,430 UART: [ldev] CDI.KEYID = 6
1,301,794 UART: [ldev] SUBJECT.KEYID = 5
1,302,221 UART: [ldev] AUTHORITY.KEYID = 7
1,302,684 UART: [ldev] FE.KEYID = 1
1,308,040 UART: [ldev] Erasing FE.KEYID = 1
1,334,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,366 UART: [ldev] --
1,373,806 UART: [fwproc] Wait for Commands...
1,374,601 UART: [fwproc] Recv command 0x46574c44
1,375,334 UART: [fwproc] Recv'd Img size: 114360 bytes
2,671,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,674 >>> mbox cmd response: success
2,864,674 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,821 UART: [afmc] ++
2,865,989 UART: [afmc] CDI.KEYID = 6
2,866,352 UART: [afmc] SUBJECT.KEYID = 7
2,866,778 UART: [afmc] AUTHORITY.KEYID = 5
2,902,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,830 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,434 UART: [afmc] --
2,945,444 UART: [cold-reset] --
2,946,262 UART: [state] Locking Datavault
2,947,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,937 UART: [state] Locking ICCM
2,948,607 UART: [exit] Launching FMC @ 0x40000130
2,953,936 UART:
2,953,952 UART: Running Caliptra FMC ...
2,954,360 UART:
2,954,414 UART: [state] CFI Enabled
2,964,899 UART: [fht] FMC Alias Private Key: 7
3,072,808 UART: [art] Extend RT PCRs Done
3,073,236 UART: [art] Lock RT PCRs Done
3,074,882 UART: [art] Populate DV Done
3,083,059 UART: [fht] FMC Alias Private Key: 7
3,084,171 UART: [art] Derive CDI
3,084,451 UART: [art] Store in in slot 0x4
3,169,876 UART: [art] Derive Key Pair
3,170,236 UART: [art] Store priv key in slot 0x5
3,183,684 UART: [art] Derive Key Pair - Done
3,198,531 UART: [art] Signing Cert with AUTHO
3,199,011 UART: RITY.KEYID = 7
3,214,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,918 UART: [art] PUB.X = 2BB9EA1F31A98176DA77B43668D59E44CB50D155EEFC14F7D414CDEAA63EAE17DE27CCF50069FCE09C6BBB2193D0E7E2
3,221,690 UART: [art] PUB.Y = 902087BF36B7B3A5C274C33E08DB18E7FC478B75A29A9D29D196E23C92FEA82A3E105A518B270C042D94CB4E5A4D1C1A
3,228,641 UART: [art] SIG.R = 59205D5A63CD16E30E6BB3E39BC8397CB71FFE831FFDFB37FD6AA239899384C1E8018034397F8B37348C5DA938B8008E
3,235,389 UART: [art] SIG.S = 3820D24B651B38534C19AD610C60DF80ED7744FA25054C60459538F191DDB73D662DDBEA7F436CE11576283DE0DD00A0
3,259,202 UART: Caliptra RT
3,259,456 UART: [state] CFI Enabled
3,366,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,083 UART: [rt]cmd =0x49444352, len=4
3,404,225 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,103 ready_for_fw is high
1,107,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,642,661 >>> mbox cmd response: success
2,642,661 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,704,653 UART:
2,704,669 UART: Running Caliptra FMC ...
2,705,077 UART:
2,705,131 UART: [state] CFI Enabled
2,715,660 UART: [fht] FMC Alias Private Key: 7
2,823,253 UART: [art] Extend RT PCRs Done
2,823,681 UART: [art] Lock RT PCRs Done
2,825,329 UART: [art] Populate DV Done
2,833,624 UART: [fht] FMC Alias Private Key: 7
2,834,698 UART: [art] Derive CDI
2,834,978 UART: [art] Store in in slot 0x4
2,921,005 UART: [art] Derive Key Pair
2,921,365 UART: [art] Store priv key in slot 0x5
2,935,077 UART: [art] Derive Key Pair - Done
2,949,915 UART: [art] Signing Cert with AUTHO
2,950,395 UART: RITY.KEYID = 7
2,965,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,392 UART: [art] PUB.X = D13439D11249C1FF6A273C2199F625151A9A70CBE9F34CD225855892B64A8F9F28AA3F80480923E2C7C7838873E54786
2,973,151 UART: [art] PUB.Y = 3AEF19EDF38E7E33F8FBDD974CCD6E536BF7CD5E54650478577AFE167165C03622A9B2D564E91E56C07D3E13FFF8F75C
2,980,114 UART: [art] SIG.R = EB4CB51D060B8402B24220864FFC3EE481C7EB89297A304D595025AAF8B8BD05E340DECAE04C7860C8B39D17051D410D
2,986,874 UART: [art] SIG.S = 493502F47384C3B83284DFB9C9FDCE1194F51E3A3954B8633BB57196CC2EEA9AFD16CB66AFC9EEF8F01B42EF4BF4A199
3,010,674 UART: Caliptra RT
3,010,928 UART: [state] CFI Enabled
3,118,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,149,347 UART: [rt]cmd =0x49444352, len=4
3,156,459 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,181,654 UART: [idev] Erasing UDS.KEYID = 0
1,198,120 UART: [idev] Sha1 KeyId Algorithm
1,206,366 UART: [idev] CSR upload begun
1,208,145 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,064 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,772 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,657 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,363 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,792 UART: [idev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
1,296,286 UART: [idev] CSR uploaded
1,299,331 ready_for_fw is high
1,299,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,299,500 UART: [idev] --
1,300,761 UART: [ldev] ++
1,300,929 UART: [ldev] CDI.KEYID = 6
1,301,293 UART: [ldev] SUBJECT.KEYID = 5
1,301,720 UART: [ldev] AUTHORITY.KEYID = 7
1,302,183 UART: [ldev] FE.KEYID = 1
1,307,451 UART: [ldev] Erasing FE.KEYID = 1
1,333,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,185 UART: [ldev] --
1,373,595 UART: [fwproc] Wait for Commands...
1,374,234 UART: [fwproc] Recv command 0x46574c44
1,374,967 UART: [fwproc] Recv'd Img size: 114360 bytes
2,672,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,864,461 >>> mbox cmd response: success
2,864,461 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,712 UART: [afmc] ++
2,865,880 UART: [afmc] CDI.KEYID = 6
2,866,243 UART: [afmc] SUBJECT.KEYID = 7
2,866,669 UART: [afmc] AUTHORITY.KEYID = 5
2,902,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,651 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,699 UART: [afmc] --
2,945,591 UART: [cold-reset] --
2,946,275 UART: [state] Locking Datavault
2,947,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,954 UART: [state] Locking ICCM
2,948,540 UART: [exit] Launching FMC @ 0x40000130
2,953,869 UART:
2,953,885 UART: Running Caliptra FMC ...
2,954,293 UART:
2,954,436 UART: [state] CFI Enabled
2,965,325 UART: [fht] FMC Alias Private Key: 7
3,073,544 UART: [art] Extend RT PCRs Done
3,073,972 UART: [art] Lock RT PCRs Done
3,075,510 UART: [art] Populate DV Done
3,083,891 UART: [fht] FMC Alias Private Key: 7
3,084,911 UART: [art] Derive CDI
3,085,191 UART: [art] Store in in slot 0x4
3,170,776 UART: [art] Derive Key Pair
3,171,136 UART: [art] Store priv key in slot 0x5
3,184,224 UART: [art] Derive Key Pair - Done
3,198,944 UART: [art] Signing Cert with AUTHO
3,199,424 UART: RITY.KEYID = 7
3,214,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,241 UART: [art] PUB.X = DC4FD7628B40D73619831C4D045889DDD55AC1D1C1D53D42107206258AFF46DFD3196415842569330BD75979C1D947C1
3,221,996 UART: [art] PUB.Y = DBBA4DB22F05935A0F95368F59E318456C47C80E39D578D4ED8F3478A5ADEEF35D22397CD60BC0B4A967AFAD9EC4F930
3,228,950 UART: [art] SIG.R = 0792D6AC6860F420951E329C8B17BFBD593E8370E0EF5B4AF3064B559C1C23EF87C570139844CB199E07D65A2DBD2DAF
3,235,719 UART: [art] SIG.S = A863CFC41825C0B682DC3C1F44D4215E4F196597766FBCCBA4858CD4154AB493E7496019B88E5766E4E1931D9BB525CE
3,260,446 UART: Caliptra RT
3,260,792 UART: [state] CFI Enabled
3,368,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,797 UART: [rt]cmd =0x49444352, len=4
3,405,649 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,042 ready_for_fw is high
1,107,042 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,640,602 >>> mbox cmd response: success
2,640,602 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,703,868 UART:
2,703,884 UART: Running Caliptra FMC ...
2,704,292 UART:
2,704,435 UART: [state] CFI Enabled
2,715,078 UART: [fht] FMC Alias Private Key: 7
2,822,259 UART: [art] Extend RT PCRs Done
2,822,687 UART: [art] Lock RT PCRs Done
2,824,315 UART: [art] Populate DV Done
2,832,416 UART: [fht] FMC Alias Private Key: 7
2,833,562 UART: [art] Derive CDI
2,833,842 UART: [art] Store in in slot 0x4
2,919,433 UART: [art] Derive Key Pair
2,919,793 UART: [art] Store priv key in slot 0x5
2,933,725 UART: [art] Derive Key Pair - Done
2,948,567 UART: [art] Signing Cert with AUTHO
2,949,047 UART: RITY.KEYID = 7
2,964,495 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,260 UART: [art] PUB.X = 9F5B45B70A226F0517FA56E4D44B499CF807793A812CF096EF8DE7FDD0C324F7ECFB867A8BC1A67BED16B605A34B2A47
2,972,034 UART: [art] PUB.Y = EDFEB2595C15C203623B7A60F8ED711E2F14014D3E6D8AD788C74A79C4D629F4FB93646D3A3C597B4A3A38E0F9992B61
2,978,986 UART: [art] SIG.R = 79EA0B7B3283D22161C5728F62C2FF88492FDFDCEC0A231C0530D1CAAD10ABE2E4F5269C0781D6D37EC61B410E110ADB
2,985,754 UART: [art] SIG.S = ED2812CDA9528152666CD2CC0DC9EC4D9CD2D1610514975EC9C6E0DAC119AC818D82E93439CC015A43D2CB6B57CD4DF4
3,009,470 UART: Caliptra RT
3,009,816 UART: [state] CFI Enabled
3,117,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,671 UART: [rt]cmd =0x49444352, len=4
3,155,031 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
193,111 UART:
193,492 UART: Running Caliptra ROM ...
194,628 UART:
194,769 UART: [state] CFI Enabled
262,281 UART: [state] LifecycleState = Unprovisioned
264,201 UART: [state] DebugLocked = No
266,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,716 UART: [kat] SHA2-256
441,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,977 UART: [kat] ++
452,424 UART: [kat] sha1
463,431 UART: [kat] SHA2-256
466,142 UART: [kat] SHA2-384
471,339 UART: [kat] SHA2-512-ACC
473,694 UART: [kat] ECC-384
2,767,240 UART: [kat] HMAC-384Kdf
2,799,663 UART: [kat] LMS
3,989,927 UART: [kat] --
3,995,409 UART: [cold-reset] ++
3,997,053 UART: [fht] Storing FHT @ 0x50003400
4,007,895 UART: [idev] ++
4,008,459 UART: [idev] CDI.KEYID = 6
4,009,434 UART: [idev] SUBJECT.KEYID = 7
4,010,679 UART: [idev] UDS.KEYID = 0
4,011,655 ready_for_fw is high
4,011,847 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,257 UART: [idev] Erasing UDS.KEYID = 0
7,346,905 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,234 UART: [idev] --
7,372,282 UART: [ldev] ++
7,372,846 UART: [ldev] CDI.KEYID = 6
7,373,804 UART: [ldev] SUBJECT.KEYID = 5
7,375,029 UART: [ldev] AUTHORITY.KEYID = 7
7,376,312 UART: [ldev] FE.KEYID = 1
7,422,225 UART: [ldev] Erasing FE.KEYID = 1
10,753,157 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,466 UART: [ldev] --
13,115,318 UART: [fwproc] Waiting for Commands...
13,118,654 UART: [fwproc] Received command 0x46574c44
13,120,831 UART: [fwproc] Received Image of size 114036 bytes
17,176,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,924 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,633,106 >>> mbox cmd response: success
17,636,420 UART: [afmc] ++
17,637,014 UART: [afmc] CDI.KEYID = 6
17,637,899 UART: [afmc] SUBJECT.KEYID = 7
17,639,163 UART: [afmc] AUTHORITY.KEYID = 5
21,009,394 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,645 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,074 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,847 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,289 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,523 UART: [afmc] --
23,381,755 UART: [cold-reset] --
23,385,877 UART: [state] Locking Datavault
23,391,334 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,180 UART: [state] Locking ICCM
23,394,688 UART: [exit] Launching FMC @ 0x40000130
23,403,108 UART:
23,403,341 UART: Running Caliptra FMC ...
23,404,387 UART:
23,404,532 UART: [state] CFI Enabled
23,468,965 UART: [fht] FMC Alias Private Key: 7
25,807,583 UART: [art] Extend RT PCRs Done
25,808,820 UART: [art] Lock RT PCRs Done
25,810,466 UART: [art] Populate DV Done
25,815,870 UART: [fht] FMC Alias Private Key: 7
25,817,396 UART: [art] Derive CDI
25,818,203 UART: [art] Store in in slot 0x4
25,877,926 UART: [art] Derive Key Pair
25,878,961 UART: [art] Store priv key in slot 0x5
29,172,057 UART: [art] Derive Key Pair - Done
29,185,052 UART: [art] Signing Cert with AUTHO
29,186,358 UART: RITY.KEYID = 7
31,473,043 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,555 UART: [art] PUB.X = 02DA3248B980071606251F155EC8DCA219C9BCB80F044B0AF2750404F08C39D5CEBC48ED0B9B75C8841D747F0E51C36C
31,481,771 UART: [art] PUB.Y = 5625DFF2A465392085C501473ADC5D7D2A8ABA88EE82F2E891DF587D41E0C689E7B414A2805DF6A88CD6E1D30003C172
31,489,034 UART: [art] SIG.R = 93FC0C262151E3F3A70AF40D45CB1BA880513636746E9CF297C5249CDAD6FE792A636EF02D6348AF14E4970E22EB8F75
31,496,398 UART: [art] SIG.S = DD8233012D8F30DEEA270EED9998840860FB82F3CFF69418C9384D8F267B9B407E74BFDC345598E39BEC1D499DF9E156
32,800,805 UART: Caliptra RT
32,801,502 UART: [state] CFI Enabled
32,963,080 UART: [rt] RT listening for mailbox commands...
32,964,927 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,994,707 UART: [rt]cmd =0x49444352, len=4
32,996,515 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
3,804,954 ready_for_fw is high
3,805,390 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,868 >>> mbox cmd response: success
23,563,515 UART:
23,563,907 UART: Running Caliptra FMC ...
23,565,027 UART:
23,565,176 UART: [state] CFI Enabled
23,632,914 UART: [fht] FMC Alias Private Key: 7
25,970,987 UART: [art] Extend RT PCRs Done
25,972,348 UART: [art] Lock RT PCRs Done
25,973,697 UART: [art] Populate DV Done
25,978,954 UART: [fht] FMC Alias Private Key: 7
25,980,439 UART: [art] Derive CDI
25,981,171 UART: [art] Store in in slot 0x4
26,042,148 UART: [art] Derive Key Pair
26,043,148 UART: [art] Store priv key in slot 0x5
29,335,779 UART: [art] Derive Key Pair - Done
29,348,669 UART: [art] Signing Cert with AUTHO
29,349,968 UART: RITY.KEYID = 7
31,637,950 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,475 UART: [art] PUB.X = 9DD922AA703BA52248F5F739C4E45C4BA42A13BB594876C589F88C640895AA01F5C80A0BC333F2070306E48BDE46AA19
31,646,718 UART: [art] PUB.Y = 643B17E59870F128C69C7B5A2C1CD998A7F4CEDDF6DE3472C446ED2674C7FD82DF2429EB59B2ACEB8103FB80F94C8093
31,653,969 UART: [art] SIG.R = 14D1F509C76F6E94815BB4408AA333A7C4546ABFF3903E001B56E7F56FDBD5B11DF77EB087DBDE1A081BC651F2BB2050
31,661,343 UART: [art] SIG.S = D1762ACCBE29CFBFA48458AEF94C7C01F13CA7894F9C90614D621ED1D95AF59FCD1C2EEE4F0E8ECC4CABF833C7DFEE48
32,966,813 UART: Caliptra RT
32,967,529 UART: [state] CFI Enabled
33,128,767 UART: [rt] RT listening for mailbox commands...
33,130,621 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,160,445 UART: [rt]cmd =0x49444352, len=4
33,161,994 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,387 UART:
192,747 UART: Running Caliptra ROM ...
193,864 UART:
603,686 UART: [state] CFI Enabled
613,593 UART: [state] LifecycleState = Unprovisioned
615,526 UART: [state] DebugLocked = No
617,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,111 UART: [kat] SHA2-256
792,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,422 UART: [kat] ++
803,890 UART: [kat] sha1
815,232 UART: [kat] SHA2-256
817,934 UART: [kat] SHA2-384
824,643 UART: [kat] SHA2-512-ACC
827,009 UART: [kat] ECC-384
3,110,032 UART: [kat] HMAC-384Kdf
3,121,194 UART: [kat] LMS
4,311,365 UART: [kat] --
4,316,077 UART: [cold-reset] ++
4,317,083 UART: [fht] Storing FHT @ 0x50003400
4,329,855 UART: [idev] ++
4,330,457 UART: [idev] CDI.KEYID = 6
4,331,374 UART: [idev] SUBJECT.KEYID = 7
4,332,620 UART: [idev] UDS.KEYID = 0
4,333,659 ready_for_fw is high
4,333,863 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,476,950 UART: [idev] Erasing UDS.KEYID = 0
7,619,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,452 UART: [idev] --
7,645,870 UART: [ldev] ++
7,646,444 UART: [ldev] CDI.KEYID = 6
7,647,381 UART: [ldev] SUBJECT.KEYID = 5
7,648,590 UART: [ldev] AUTHORITY.KEYID = 7
7,649,872 UART: [ldev] FE.KEYID = 1
7,659,923 UART: [ldev] Erasing FE.KEYID = 1
10,945,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,018 UART: [ldev] --
13,304,756 UART: [fwproc] Waiting for Commands...
13,306,975 UART: [fwproc] Received command 0x46574c44
13,309,154 UART: [fwproc] Received Image of size 114036 bytes
17,361,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,433,541 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,502,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,818,687 >>> mbox cmd response: success
17,823,279 UART: [afmc] ++
17,823,875 UART: [afmc] CDI.KEYID = 6
17,824,816 UART: [afmc] SUBJECT.KEYID = 7
17,826,028 UART: [afmc] AUTHORITY.KEYID = 5
21,140,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,689 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,104 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,924 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,352 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,502,637 UART: [afmc] --
23,506,069 UART: [cold-reset] --
23,509,449 UART: [state] Locking Datavault
23,512,968 UART: [state] Locking PCR0, PCR1 and PCR31
23,514,664 UART: [state] Locking ICCM
23,516,001 UART: [exit] Launching FMC @ 0x40000130
23,524,400 UART:
23,524,645 UART: Running Caliptra FMC ...
23,525,745 UART:
23,525,899 UART: [state] CFI Enabled
23,533,826 UART: [fht] FMC Alias Private Key: 7
25,865,289 UART: [art] Extend RT PCRs Done
25,866,518 UART: [art] Lock RT PCRs Done
25,868,256 UART: [art] Populate DV Done
25,873,784 UART: [fht] FMC Alias Private Key: 7
25,875,381 UART: [art] Derive CDI
25,876,217 UART: [art] Store in in slot 0x4
25,918,434 UART: [art] Derive Key Pair
25,919,430 UART: [art] Store priv key in slot 0x5
29,161,658 UART: [art] Derive Key Pair - Done
29,174,766 UART: [art] Signing Cert with AUTHO
29,176,071 UART: RITY.KEYID = 7
31,455,664 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,166 UART: [art] PUB.X = AC41AB17A7DFB077AB8E614E907E5CFC29F49BE6A45D0CC3E474A81D2232E2140FF1C51A88BE3756D5450753FBC47FE9
31,464,430 UART: [art] PUB.Y = 647B1B9C1F12A6620E1177EFBAF1419C53D667B598EB765374968B0C2959F6609E5AB7D10EF01CFADFE57B472867F761
31,471,679 UART: [art] SIG.R = 80E77DB04895355BF0676040DAB947190A3E1241BAA3CEFF2BA9BEDA09BA15F330B51E61CC38A8DE36D900497F913EB3
31,479,035 UART: [art] SIG.S = 70097F6D60B85A342CADCF77868546194625A171F3259CA32C918439ECCC60AF6BF72CE01395F7DFB140DEDAD27AFF3A
32,784,495 UART: Caliptra RT
32,785,198 UART: [state] CFI Enabled
32,903,134 UART: [rt] RT listening for mailbox commands...
32,904,992 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,934,664 UART: [rt]cmd =0x49444352, len=4
32,936,671 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,127,401 ready_for_fw is high
4,127,793 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,081,191 >>> mbox cmd response: success
23,717,081 UART:
23,717,470 UART: Running Caliptra FMC ...
23,718,622 UART:
23,718,783 UART: [state] CFI Enabled
23,726,952 UART: [fht] FMC Alias Private Key: 7
26,057,281 UART: [art] Extend RT PCRs Done
26,058,510 UART: [art] Lock RT PCRs Done
26,059,988 UART: [art] Populate DV Done
26,065,458 UART: [fht] FMC Alias Private Key: 7
26,066,960 UART: [art] Derive CDI
26,067,724 UART: [art] Store in in slot 0x4
26,110,266 UART: [art] Derive Key Pair
26,111,265 UART: [art] Store priv key in slot 0x5
29,353,679 UART: [art] Derive Key Pair - Done
29,366,741 UART: [art] Signing Cert with AUTHO
29,368,052 UART: RITY.KEYID = 7
31,647,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,675 UART: [art] PUB.X = 54B02AA64171C3E3D59D29C852A2D74FBD2BC829A2B2055DA73EE32760ED4D60F777A10AC58F8FE29B9824AD126311A2
31,655,992 UART: [art] PUB.Y = D77A800271629EEAC545825CF46F35AD8D832072B17CCFFC603D767ABB031132AF3ED6118F1B7CD9A84334CF0104ACDE
31,663,194 UART: [art] SIG.R = DF90F8862B93799A281DD3EF975EB2F9342E228A0D5AA3E52ADA4A3D11F5C650812B7E3AB68CC1CC70FEF2ECFF398611
31,670,610 UART: [art] SIG.S = 390B51EF3C06B3123B9216477135D7592528FAF54E933AF305742DF7451A203A42B698074EC00E1F81647417225269B7
32,975,516 UART: Caliptra RT
32,976,240 UART: [state] CFI Enabled
33,093,436 UART: [rt] RT listening for mailbox commands...
33,095,287 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,125,006 UART: [rt]cmd =0x49444352, len=4
33,126,629 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,530 writing to cptra_bootfsm_go
192,768 UART:
193,131 UART: Running Caliptra ROM ...
194,333 UART:
194,486 UART: [state] CFI Enabled
260,512 UART: [state] LifecycleState = Unprovisioned
262,433 UART: [state] DebugLocked = No
263,836 UART: [state] WD Timer not started. Device not locked for debugging
267,870 UART: [kat] SHA2-256
446,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,553 UART: [kat] ++
459,090 UART: [kat] sha1
469,577 UART: [kat] SHA2-256
472,354 UART: [kat] SHA2-384
477,784 UART: [kat] SHA2-512-ACC
480,716 UART: [kat] ECC-384
2,948,169 UART: [kat] HMAC-384Kdf
2,969,233 UART: [kat] LMS
3,498,734 UART: [kat] --
3,501,511 UART: [cold-reset] ++
3,502,442 UART: [fht] FHT @ 0x50003400
3,514,684 UART: [idev] ++
3,515,286 UART: [idev] CDI.KEYID = 6
3,516,179 UART: [idev] SUBJECT.KEYID = 7
3,517,353 UART: [idev] UDS.KEYID = 0
3,518,306 ready_for_fw is high
3,518,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,154 UART: [idev] Erasing UDS.KEYID = 0
6,022,820 UART: [idev] Sha1 KeyId Algorithm
6,044,966 UART: [idev] --
6,049,294 UART: [ldev] ++
6,049,870 UART: [ldev] CDI.KEYID = 6
6,050,762 UART: [ldev] SUBJECT.KEYID = 5
6,051,973 UART: [ldev] AUTHORITY.KEYID = 7
6,053,262 UART: [ldev] FE.KEYID = 1
6,098,312 UART: [ldev] Erasing FE.KEYID = 1
8,601,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,919 UART: [ldev] --
10,411,365 UART: [fwproc] Wait for Commands...
10,414,274 UART: [fwproc] Recv command 0x46574c44
10,416,311 UART: [fwproc] Recv'd Img size: 114360 bytes
13,811,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,265,281 >>> mbox cmd response: success
14,268,980 UART: [afmc] ++
14,269,580 UART: [afmc] CDI.KEYID = 6
14,270,498 UART: [afmc] SUBJECT.KEYID = 7
14,271,660 UART: [afmc] AUTHORITY.KEYID = 5
16,807,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,631 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,436 UART: [afmc] --
18,603,493 UART: [cold-reset] --
18,605,631 UART: [state] Locking Datavault
18,610,175 UART: [state] Locking PCR0, PCR1 and PCR31
18,611,878 UART: [state] Locking ICCM
18,613,382 UART: [exit] Launching FMC @ 0x40000130
18,621,780 UART:
18,622,016 UART: Running Caliptra FMC ...
18,623,044 UART:
18,623,195 UART: [state] CFI Enabled
18,686,962 UART: [fht] FMC Alias Private Key: 7
20,450,863 UART: [art] Extend RT PCRs Done
20,452,084 UART: [art] Lock RT PCRs Done
20,453,679 UART: [art] Populate DV Done
20,459,163 UART: [fht] FMC Alias Private Key: 7
20,460,758 UART: [art] Derive CDI
20,461,574 UART: [art] Store in in slot 0x4
20,519,468 UART: [art] Derive Key Pair
20,520,501 UART: [art] Store priv key in slot 0x5
22,997,725 UART: [art] Derive Key Pair - Done
23,010,563 UART: [art] Signing Cert with AUTHO
23,011,877 UART: RITY.KEYID = 7
24,724,152 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,634 UART: [art] PUB.X = 5BB15176F74510A425E9279DB44F883203C1B3B798D702477784884D7486A7E844A73EDD5322E38944608610D74835FB
24,732,899 UART: [art] PUB.Y = 4EA03ADB2086E518BC7332499EA01D14B62CA42F970BF5699413FF482FCF13C979CD0B25C9C289B51F78F25B90280F1D
24,740,157 UART: [art] SIG.R = E5E416165620BB5328A059C1ED8C59F096D4A2108D035E11D3F683C036DC87703558C2811E07241E524CEFC58F6EC4EC
24,747,528 UART: [art] SIG.S = 6F82B80CCEBB890062273C571F7EFC5382B9825D8A42BDAE800C0680110BC462069A4BD41A0490445B6D4FFF9D9A20E7
25,726,186 UART: Caliptra RT
25,726,907 UART: [state] CFI Enabled
25,892,609 UART: [rt] RT listening for mailbox commands...
25,894,502 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,924,067 UART: [rt]cmd =0x49444352, len=4
25,925,883 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,308 writing to cptra_bootfsm_go
193,447 UART:
193,821 UART: Running Caliptra ROM ...
194,958 UART:
195,108 UART: [state] CFI Enabled
267,208 UART: [state] LifecycleState = Unprovisioned
269,611 UART: [state] DebugLocked = No
271,930 UART: [state] WD Timer not started. Device not locked for debugging
275,901 UART: [kat] SHA2-256
465,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,586 UART: [kat] ++
477,064 UART: [kat] sha1
489,036 UART: [kat] SHA2-256
492,107 UART: [kat] SHA2-384
499,043 UART: [kat] SHA2-512-ACC
501,634 UART: [kat] ECC-384
2,948,728 UART: [kat] HMAC-384Kdf
2,972,489 UART: [kat] LMS
3,504,245 UART: [kat] --
3,509,885 UART: [cold-reset] ++
3,511,605 UART: [fht] FHT @ 0x50003400
3,523,311 UART: [idev] ++
3,523,985 UART: [idev] CDI.KEYID = 6
3,524,905 UART: [idev] SUBJECT.KEYID = 7
3,526,153 UART: [idev] UDS.KEYID = 0
3,527,084 ready_for_fw is high
3,527,279 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,983 UART: [idev] Erasing UDS.KEYID = 0
6,030,412 UART: [idev] Sha1 KeyId Algorithm
6,053,561 UART: [idev] --
6,058,438 UART: [ldev] ++
6,059,124 UART: [ldev] CDI.KEYID = 6
6,060,067 UART: [ldev] SUBJECT.KEYID = 5
6,061,232 UART: [ldev] AUTHORITY.KEYID = 7
6,062,471 UART: [ldev] FE.KEYID = 1
6,100,543 UART: [ldev] Erasing FE.KEYID = 1
8,607,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,424 UART: [ldev] --
10,412,912 UART: [fwproc] Wait for Commands...
10,414,415 UART: [fwproc] Recv command 0x46574c44
10,416,679 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,601,377 >>> mbox cmd response: success
14,604,772 UART: [afmc] ++
14,605,493 UART: [afmc] CDI.KEYID = 6
14,606,604 UART: [afmc] SUBJECT.KEYID = 7
14,608,161 UART: [afmc] AUTHORITY.KEYID = 5
17,154,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,536 UART: [afmc] --
18,970,929 UART: [cold-reset] --
18,973,906 UART: [state] Locking Datavault
18,980,736 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,883 UART: [state] Locking ICCM
18,984,715 UART: [exit] Launching FMC @ 0x40000130
18,993,393 UART:
18,993,641 UART: Running Caliptra FMC ...
18,994,745 UART:
18,994,905 UART: [state] CFI Enabled
19,051,046 UART: [fht] FMC Alias Private Key: 7
20,814,258 UART: [art] Extend RT PCRs Done
20,815,496 UART: [art] Lock RT PCRs Done
20,817,151 UART: [art] Populate DV Done
20,822,568 UART: [fht] FMC Alias Private Key: 7
20,824,109 UART: [art] Derive CDI
20,824,875 UART: [art] Store in in slot 0x4
20,882,939 UART: [art] Derive Key Pair
20,884,002 UART: [art] Store priv key in slot 0x5
23,346,985 UART: [art] Derive Key Pair - Done
23,360,211 UART: [art] Signing Cert with AUTHO
23,361,690 UART: RITY.KEYID = 7
25,072,001 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,521 UART: [art] PUB.X = BF1568A11FF509FADB600E38AAD83DC124141A1C13419A05AB725BAADA2407806CF8211016F34832E83FE4C714CD6529
25,080,806 UART: [art] PUB.Y = 2CB997FB7C6D6C9C43DD307FEB9C53815F24EB31C7D6B53A0810459628A8E094E780912D5BC96200DAFBB8AF590445D3
25,088,079 UART: [art] SIG.R = 26D528EF9E3CB76F872387B634EEA5DD263B2ACFCAC1F44190C7BC67B30AB01CD696216E8E3DC420D773787180072A04
25,095,495 UART: [art] SIG.S = E9B1F8CDE28227095AB3E64C0A6C36D59E0E716D8E93525898DFE8A1B61F015786D1490D6D2781BF8791DD4226C653D5
26,074,333 UART: Caliptra RT
26,075,046 UART: [state] CFI Enabled
26,240,319 UART: [rt] RT listening for mailbox commands...
26,242,300 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,271,957 UART: [rt]cmd =0x49444352, len=4
26,273,947 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,417,169 ready_for_fw is high
3,417,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,715,549 >>> mbox cmd response: success
19,008,082 UART:
19,008,509 UART: Running Caliptra FMC ...
19,009,631 UART:
19,009,799 UART: [state] CFI Enabled
19,071,577 UART: [fht] FMC Alias Private Key: 7
20,835,659 UART: [art] Extend RT PCRs Done
20,836,878 UART: [art] Lock RT PCRs Done
20,838,676 UART: [art] Populate DV Done
20,843,843 UART: [fht] FMC Alias Private Key: 7
20,845,387 UART: [art] Derive CDI
20,846,203 UART: [art] Store in in slot 0x4
20,904,167 UART: [art] Derive Key Pair
20,905,168 UART: [art] Store priv key in slot 0x5
23,368,318 UART: [art] Derive Key Pair - Done
23,381,154 UART: [art] Signing Cert with AUTHO
23,382,461 UART: RITY.KEYID = 7
25,093,392 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,906 UART: [art] PUB.X = 69A6CC6F48742639385879C7B11664DDDF2E5C7C748A2225DC5A6FF3701FC15AD0F2E1E94D63B156BFF821DE784DC237
25,102,190 UART: [art] PUB.Y = 21A2A3FF6443548A19AAC7ED1B671B8AC9E0B1D71244EEE5DB4375C4DEEEBA4690A6BCC1B52D731A5239B8C708D9A67E
25,109,478 UART: [art] SIG.R = 2266317E9E7740D23EC6B2C0D9F3688794D918C1F641D1B1EDF5694BA9E51DCE2E497B7096EF260391B66CE41BAF3939
25,116,843 UART: [art] SIG.S = CF553E98D1069B8460F37D5677A3001D7DF39A708A112E018C80DE02AE76A7D3E09E0E8DBDE738046116ACDCB2A52F86
26,095,631 UART: Caliptra RT
26,096,330 UART: [state] CFI Enabled
26,260,699 UART: [rt] RT listening for mailbox commands...
26,262,560 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,292,228 UART: [rt]cmd =0x49444352, len=4
26,294,037 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,557 UART:
192,925 UART: Running Caliptra ROM ...
194,058 UART:
603,626 UART: [state] CFI Enabled
619,936 UART: [state] LifecycleState = Unprovisioned
622,311 UART: [state] DebugLocked = No
623,971 UART: [state] WD Timer not started. Device not locked for debugging
628,213 UART: [kat] SHA2-256
818,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,925 UART: [kat] ++
829,370 UART: [kat] sha1
841,112 UART: [kat] SHA2-256
844,122 UART: [kat] SHA2-384
849,258 UART: [kat] SHA2-512-ACC
851,834 UART: [kat] ECC-384
3,297,095 UART: [kat] HMAC-384Kdf
3,310,470 UART: [kat] LMS
3,842,339 UART: [kat] --
3,847,264 UART: [cold-reset] ++
3,848,196 UART: [fht] FHT @ 0x50003400
3,860,258 UART: [idev] ++
3,860,929 UART: [idev] CDI.KEYID = 6
3,861,968 UART: [idev] SUBJECT.KEYID = 7
3,863,071 UART: [idev] UDS.KEYID = 0
3,864,002 ready_for_fw is high
3,864,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,726 UART: [idev] Erasing UDS.KEYID = 0
6,340,318 UART: [idev] Sha1 KeyId Algorithm
6,363,304 UART: [idev] --
6,368,376 UART: [ldev] ++
6,369,108 UART: [ldev] CDI.KEYID = 6
6,370,171 UART: [ldev] SUBJECT.KEYID = 5
6,371,278 UART: [ldev] AUTHORITY.KEYID = 7
6,372,446 UART: [ldev] FE.KEYID = 1
6,384,826 UART: [ldev] Erasing FE.KEYID = 1
8,865,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,308 UART: [ldev] --
10,657,544 UART: [fwproc] Wait for Commands...
10,660,705 UART: [fwproc] Recv command 0x46574c44
10,663,036 UART: [fwproc] Recv'd Img size: 114360 bytes
14,113,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,852,558 >>> mbox cmd response: success
14,856,354 UART: [afmc] ++
14,857,061 UART: [afmc] CDI.KEYID = 6
14,858,305 UART: [afmc] SUBJECT.KEYID = 7
14,859,734 UART: [afmc] AUTHORITY.KEYID = 5
17,362,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,086,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,088,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,103,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,118,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,133,605 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,008 UART: [afmc] --
19,160,476 UART: [cold-reset] --
19,166,603 UART: [state] Locking Datavault
19,172,704 UART: [state] Locking PCR0, PCR1 and PCR31
19,174,892 UART: [state] Locking ICCM
19,177,878 UART: [exit] Launching FMC @ 0x40000130
19,186,534 UART:
19,186,763 UART: Running Caliptra FMC ...
19,187,785 UART:
19,187,928 UART: [state] CFI Enabled
19,196,563 UART: [fht] FMC Alias Private Key: 7
20,953,480 UART: [art] Extend RT PCRs Done
20,954,685 UART: [art] Lock RT PCRs Done
20,956,110 UART: [art] Populate DV Done
20,961,302 UART: [fht] FMC Alias Private Key: 7
20,962,834 UART: [art] Derive CDI
20,963,562 UART: [art] Store in in slot 0x4
21,005,897 UART: [art] Derive Key Pair
21,006,943 UART: [art] Store priv key in slot 0x5
23,433,712 UART: [art] Derive Key Pair - Done
23,446,928 UART: [art] Signing Cert with AUTHO
23,448,225 UART: RITY.KEYID = 7
25,153,661 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,182 UART: [art] PUB.X = 1C71E71881CE0460CEEE4515B89839FC7E78A533A265087A3040418FC06A605455B2A6E7EE7B855A5448924FFE77CF1F
25,162,433 UART: [art] PUB.Y = A4D558590E9277C224B98E2D665DDCE51255F73765572B30946595A42377BC021BAFFDCDD1628916922CB8AD25515EEB
25,169,674 UART: [art] SIG.R = 31D847D0042F0C1A99071ECEC9CAE9BC13CAB5EB46240D90102ECAD7E7BEE885E3FA9A6495683F7A679ABD3925119117
25,177,120 UART: [art] SIG.S = FCB71B770BDA5A8A83F58F381CA9E9C5FF15C436183FEDF3DD4A64648A60F5C2ED8CA5459ED9226EA1EEF32816CEB3D2
26,156,368 UART: Caliptra RT
26,157,071 UART: [state] CFI Enabled
26,274,906 UART: [rt] RT listening for mailbox commands...
26,276,755 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,306,371 UART: [rt]cmd =0x49444352, len=4
26,308,037 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,749,044 ready_for_fw is high
3,749,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,111 >>> mbox cmd response: success
19,203,336 UART:
19,203,751 UART: Running Caliptra FMC ...
19,204,885 UART:
19,205,046 UART: [state] CFI Enabled
19,212,927 UART: [fht] FMC Alias Private Key: 7
20,969,640 UART: [art] Extend RT PCRs Done
20,970,862 UART: [art] Lock RT PCRs Done
20,972,622 UART: [art] Populate DV Done
20,978,113 UART: [fht] FMC Alias Private Key: 7
20,979,768 UART: [art] Derive CDI
20,980,586 UART: [art] Store in in slot 0x4
21,023,020 UART: [art] Derive Key Pair
21,024,030 UART: [art] Store priv key in slot 0x5
23,451,288 UART: [art] Derive Key Pair - Done
23,464,232 UART: [art] Signing Cert with AUTHO
23,465,544 UART: RITY.KEYID = 7
25,170,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,285 UART: [art] PUB.X = CF50B088AAF981EF14B01C28F79D5DB5100059DA9B272E68486E1BED39FCE364C159AFD0CECDACEB019FFD16E619E154
25,179,563 UART: [art] PUB.Y = 9E6B01EEC92A5411B26214740FF7E1AA3DF0302CC7A82855AB21AACB674F70BBCDD38689DD302B763E889B7781E23CE5
25,186,831 UART: [art] SIG.R = DD46430C409B17A72777EE66135932202073AF42F0DA09C3C10BFD06A9C1575DEFDF3580B927DB0B3D7A4B7A0F9909D2
25,194,209 UART: [art] SIG.S = CA1000740E12F35E8F04B0A75A67761D312396FBD52343EE05BFB8AE497040C2D0FDBD5F8C2081222EF83BFCC6AC268E
26,172,831 UART: Caliptra RT
26,173,539 UART: [state] CFI Enabled
26,291,237 UART: [rt] RT listening for mailbox commands...
26,293,099 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,322,882 UART: [rt]cmd =0x49444352, len=4
26,324,634 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,549 UART: [kat] SHA2-256
881,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,595 UART: [kat] ++
885,747 UART: [kat] sha1
890,009 UART: [kat] SHA2-256
891,947 UART: [kat] SHA2-384
894,600 UART: [kat] SHA2-512-ACC
896,501 UART: [kat] ECC-384
901,892 UART: [kat] HMAC-384Kdf
906,580 UART: [kat] LMS
1,474,776 UART: [kat] --
1,475,415 UART: [cold-reset] ++
1,475,775 UART: [fht] Storing FHT @ 0x50003400
1,478,582 UART: [idev] ++
1,478,750 UART: [idev] CDI.KEYID = 6
1,479,110 UART: [idev] SUBJECT.KEYID = 7
1,479,534 UART: [idev] UDS.KEYID = 0
1,479,879 ready_for_fw is high
1,479,879 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,564 UART: [idev] Erasing UDS.KEYID = 0
1,503,906 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,504 UART: [idev] --
1,513,539 UART: [ldev] ++
1,513,707 UART: [ldev] CDI.KEYID = 6
1,514,070 UART: [ldev] SUBJECT.KEYID = 5
1,514,496 UART: [ldev] AUTHORITY.KEYID = 7
1,514,959 UART: [ldev] FE.KEYID = 1
1,520,167 UART: [ldev] Erasing FE.KEYID = 1
1,546,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,118 UART: [ldev] --
1,585,483 UART: [fwproc] Waiting for Commands...
1,586,214 UART: [fwproc] Received command 0x46574c44
1,587,005 UART: [fwproc] Received Image of size 114360 bytes
2,884,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,569 >>> mbox cmd response: success
3,077,637 UART: [afmc] ++
3,077,805 UART: [afmc] CDI.KEYID = 6
3,078,167 UART: [afmc] SUBJECT.KEYID = 7
3,078,592 UART: [afmc] AUTHORITY.KEYID = 5
3,113,385 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,357 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,242 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,932 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,897 UART: [afmc] --
3,156,913 UART: [cold-reset] --
3,157,731 UART: [state] Locking Datavault
3,158,856 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,460 UART: [state] Locking ICCM
3,159,890 UART: [exit] Launching FMC @ 0x40000130
3,165,219 UART:
3,165,235 UART: Running Caliptra FMC ...
3,165,643 UART:
3,165,697 UART: [state] CFI Enabled
3,176,600 UART: [fht] FMC Alias Private Key: 7
3,284,843 UART: [art] Extend RT PCRs Done
3,285,271 UART: [art] Lock RT PCRs Done
3,286,173 UART: [art] Populate DV Done
3,294,300 UART: [fht] FMC Alias Private Key: 7
3,295,250 UART: [art] Derive CDI
3,295,530 UART: [art] Store in in slot 0x4
3,380,785 UART: [art] Derive Key Pair
3,381,145 UART: [art] Store priv key in slot 0x5
3,394,533 UART: [art] Derive Key Pair - Done
3,409,246 UART: [art] Signing Cert with AUTHO
3,409,726 UART: RITY.KEYID = 7
3,425,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,901 UART: [art] PUB.X = 06FE72A37182EF9A551456DFBBEAD9A4D6505646459DA280772729066B594CC643B9F969D8A0B0A2BA343148130AFFDF
3,432,666 UART: [art] PUB.Y = 1E44BB6564BCEF03B09BF435A6986483D569CD9D344AB3DDF50E843A202BB38F1D39C07ED7665040275668A029CF1932
3,439,612 UART: [art] SIG.R = 65CB7C71A667463267A8D1ABFA30020D1C854566F1F1517B05D928B59BCE38997B4E1F876106A7B2EC355BCD7284926C
3,446,370 UART: [art] SIG.S = CE30268E04079581BB954009A6BB72C44D4D40AB13C6202666C25D99C8A49B5A742953E361FFB72790D6B9984F394730
3,470,116 UART: Caliptra RT
3,470,370 UART: [state] CFI Enabled
3,578,292 UART: [rt] RT listening for mailbox commands...
3,578,962 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,711 UART: [rt]cmd =0x49444352, len=4
3,610,228 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,487 ready_for_fw is high
1,362,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,083 >>> mbox cmd response: success
2,989,839 UART:
2,989,855 UART: Running Caliptra FMC ...
2,990,263 UART:
2,990,317 UART: [state] CFI Enabled
3,000,746 UART: [fht] FMC Alias Private Key: 7
3,108,631 UART: [art] Extend RT PCRs Done
3,109,059 UART: [art] Lock RT PCRs Done
3,110,833 UART: [art] Populate DV Done
3,119,222 UART: [fht] FMC Alias Private Key: 7
3,120,154 UART: [art] Derive CDI
3,120,434 UART: [art] Store in in slot 0x4
3,206,343 UART: [art] Derive Key Pair
3,206,703 UART: [art] Store priv key in slot 0x5
3,219,797 UART: [art] Derive Key Pair - Done
3,234,469 UART: [art] Signing Cert with AUTHO
3,234,949 UART: RITY.KEYID = 7
3,250,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,314 UART: [art] PUB.X = 17A396C8BCB9EDC6D7F93F0500D01F7111971E0A7BAE7BCBC84D33D52F8AE8992BDF44B86217E6257164BF8758D65BE7
3,258,068 UART: [art] PUB.Y = 05B55ACF5C8B0D4F79292E3B0ED6173C5D700F2259742C27187DFE2759587E0C20B3845284E02B2B5BA914273A6646E1
3,264,999 UART: [art] SIG.R = 1BB41183D6088B2ACCF52BC8FF0DBBBEFE485E6A04BECA607C4BD6FC92A26B84A523BCABD07C30B00C532805B1A0DC58
3,271,782 UART: [art] SIG.S = 2095BD4B93DC397518DE3D9D2B50AE04769158ADDD688568934A939E350735FA5480615B7CFFFB22AD171DFD75122130
3,295,319 UART: Caliptra RT
3,295,573 UART: [state] CFI Enabled
3,404,190 UART: [rt] RT listening for mailbox commands...
3,404,860 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,337 UART: [rt]cmd =0x49444352, len=4
3,435,726 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,984 UART: [kat] SHA2-256
881,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,030 UART: [kat] ++
886,182 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,097 UART: [kat] SHA2-512-ACC
896,998 UART: [kat] ECC-384
902,767 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,480 UART: [cold-reset] ++
1,476,896 UART: [fht] Storing FHT @ 0x50003400
1,479,749 UART: [idev] ++
1,479,917 UART: [idev] CDI.KEYID = 6
1,480,277 UART: [idev] SUBJECT.KEYID = 7
1,480,701 UART: [idev] UDS.KEYID = 0
1,481,046 ready_for_fw is high
1,481,046 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,775 UART: [idev] Erasing UDS.KEYID = 0
1,505,621 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,305 UART: [idev] --
1,515,446 UART: [ldev] ++
1,515,614 UART: [ldev] CDI.KEYID = 6
1,515,977 UART: [ldev] SUBJECT.KEYID = 5
1,516,403 UART: [ldev] AUTHORITY.KEYID = 7
1,516,866 UART: [ldev] FE.KEYID = 1
1,522,078 UART: [ldev] Erasing FE.KEYID = 1
1,547,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,577 UART: [ldev] --
1,587,092 UART: [fwproc] Waiting for Commands...
1,587,949 UART: [fwproc] Received command 0x46574c44
1,588,740 UART: [fwproc] Received Image of size 114360 bytes
2,886,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,552 >>> mbox cmd response: success
3,080,734 UART: [afmc] ++
3,080,902 UART: [afmc] CDI.KEYID = 6
3,081,264 UART: [afmc] SUBJECT.KEYID = 7
3,081,689 UART: [afmc] AUTHORITY.KEYID = 5
3,117,040 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,444 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,837 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,527 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,212 UART: [afmc] --
3,160,168 UART: [cold-reset] --
3,161,088 UART: [state] Locking Datavault
3,162,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,607 UART: [state] Locking ICCM
3,163,141 UART: [exit] Launching FMC @ 0x40000130
3,168,470 UART:
3,168,486 UART: Running Caliptra FMC ...
3,168,894 UART:
3,169,037 UART: [state] CFI Enabled
3,179,646 UART: [fht] FMC Alias Private Key: 7
3,287,325 UART: [art] Extend RT PCRs Done
3,287,753 UART: [art] Lock RT PCRs Done
3,289,085 UART: [art] Populate DV Done
3,297,278 UART: [fht] FMC Alias Private Key: 7
3,298,240 UART: [art] Derive CDI
3,298,520 UART: [art] Store in in slot 0x4
3,384,245 UART: [art] Derive Key Pair
3,384,605 UART: [art] Store priv key in slot 0x5
3,397,593 UART: [art] Derive Key Pair - Done
3,412,211 UART: [art] Signing Cert with AUTHO
3,412,691 UART: RITY.KEYID = 7
3,427,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,524 UART: [art] PUB.X = 4941827F4851E6472DEF254F3289487E84213BEA19693A2FD06B24389B0297AAFEBA081B303BE6AF9F8C343C802A48A5
3,435,288 UART: [art] PUB.Y = D4DDE9442399E3B06E9C9C42EB2402FA04AED7204BB7EB131A233BE2BBA608BBA16430791C9C6D93ED1EC80AD4C259B0
3,442,244 UART: [art] SIG.R = EFE7BBDAE4E656BA3FF7AF634FD9354ED5C675EF762B4C02F9DBF0D8A090D489DEC93AD34FB864E57495E11962B2F219
3,449,033 UART: [art] SIG.S = 11514E03476201866469C68BF28E0E8CCD7DA794198956036B32453D9E12E8EC4E3F1C5CE8C77159E550D0363DAB2640
3,472,536 UART: Caliptra RT
3,472,882 UART: [state] CFI Enabled
3,581,276 UART: [rt] RT listening for mailbox commands...
3,581,946 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,537 UART: [rt]cmd =0x49444352, len=4
3,612,820 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,626 ready_for_fw is high
1,362,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,998 >>> mbox cmd response: success
2,989,032 UART:
2,989,048 UART: Running Caliptra FMC ...
2,989,456 UART:
2,989,599 UART: [state] CFI Enabled
3,000,258 UART: [fht] FMC Alias Private Key: 7
3,108,743 UART: [art] Extend RT PCRs Done
3,109,171 UART: [art] Lock RT PCRs Done
3,110,749 UART: [art] Populate DV Done
3,118,834 UART: [fht] FMC Alias Private Key: 7
3,119,996 UART: [art] Derive CDI
3,120,276 UART: [art] Store in in slot 0x4
3,206,111 UART: [art] Derive Key Pair
3,206,471 UART: [art] Store priv key in slot 0x5
3,219,431 UART: [art] Derive Key Pair - Done
3,234,100 UART: [art] Signing Cert with AUTHO
3,234,580 UART: RITY.KEYID = 7
3,250,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,911 UART: [art] PUB.X = 8E7B03717D00957469374D6EA98E8E2B2E1E858AFF2206CDDC2E41AA77D95F07E855F49C42881DE4EC15E1D419906A9B
3,257,656 UART: [art] PUB.Y = DF82039DD5BEF2BD45E3DB618CA04283A7DFCD105FD562ED73726882004568BD6A4FD3D574CA72D8DB4C614347B65216
3,264,591 UART: [art] SIG.R = E97F647E5A3CF250D001DE3FAB3E49DC59528527E2140A34AEFD6CDB07DD315A6C86846E520B7199E47990913DD20C14
3,271,352 UART: [art] SIG.S = 72109B35E8334AEEE3B3EF7C82C844D51A374067977A89D82DD4C610F2989953270ABE426B64661D3BAC4BAABE1D3162
3,295,110 UART: Caliptra RT
3,295,456 UART: [state] CFI Enabled
3,403,852 UART: [rt] RT listening for mailbox commands...
3,404,522 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,007 UART: [rt]cmd =0x49444352, len=4
3,435,490 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
902,067 UART: [kat] SHA2-256
904,007 UART: [kat] SHA2-384
906,934 UART: [kat] SHA2-512-ACC
908,835 UART: [kat] ECC-384
918,502 UART: [kat] HMAC-384Kdf
923,052 UART: [kat] LMS
1,171,380 UART: [kat] --
1,172,337 UART: [cold-reset] ++
1,172,715 UART: [fht] FHT @ 0x50003400
1,175,238 UART: [idev] ++
1,175,406 UART: [idev] CDI.KEYID = 6
1,175,766 UART: [idev] SUBJECT.KEYID = 7
1,176,190 UART: [idev] UDS.KEYID = 0
1,176,535 ready_for_fw is high
1,176,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,310 UART: [idev] Erasing UDS.KEYID = 0
1,201,497 UART: [idev] Sha1 KeyId Algorithm
1,209,879 UART: [idev] --
1,210,811 UART: [ldev] ++
1,210,979 UART: [ldev] CDI.KEYID = 6
1,211,342 UART: [ldev] SUBJECT.KEYID = 5
1,211,768 UART: [ldev] AUTHORITY.KEYID = 7
1,212,231 UART: [ldev] FE.KEYID = 1
1,217,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,959 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,282,968 UART: [fwproc] Recv command 0x46574c44
1,283,696 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,874 >>> mbox cmd response: success
2,775,940 UART: [afmc] ++
2,776,108 UART: [afmc] CDI.KEYID = 6
2,776,470 UART: [afmc] SUBJECT.KEYID = 7
2,776,895 UART: [afmc] AUTHORITY.KEYID = 5
2,812,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,744 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,463 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,175 UART: [afmc] --
2,855,255 UART: [cold-reset] --
2,856,079 UART: [state] Locking Datavault
2,857,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,778 UART: [state] Locking ICCM
2,858,206 UART: [exit] Launching FMC @ 0x40000130
2,863,535 UART:
2,863,551 UART: Running Caliptra FMC ...
2,863,959 UART:
2,864,013 UART: [state] CFI Enabled
2,874,640 UART: [fht] FMC Alias Private Key: 7
2,982,619 UART: [art] Extend RT PCRs Done
2,983,047 UART: [art] Lock RT PCRs Done
2,984,647 UART: [art] Populate DV Done
2,992,740 UART: [fht] FMC Alias Private Key: 7
2,993,720 UART: [art] Derive CDI
2,994,000 UART: [art] Store in in slot 0x4
3,080,013 UART: [art] Derive Key Pair
3,080,373 UART: [art] Store priv key in slot 0x5
3,093,279 UART: [art] Derive Key Pair - Done
3,108,076 UART: [art] Signing Cert with AUTHO
3,108,556 UART: RITY.KEYID = 7
3,124,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,849 UART: [art] PUB.X = 2B5362AD06F8517237161933FE45AC4A714C88BBF839B24C0C8A9DDA3281434C452E5F91DD21C456172D7AD52E4223FB
3,131,615 UART: [art] PUB.Y = 4940FEFAA84FD71741082736E4F6AC66A56177D05ECC98A1D29FB8CAA542562749EEB88D8CC3B697FD38C3C6B3891777
3,138,570 UART: [art] SIG.R = 38EBFF9CFC4C81CC637A8AC8C3A515C4F5C3B6FFAF8232A4C6B79202DD43193F94CBC635DDA9A751CF3B4A2E53877376
3,145,357 UART: [art] SIG.S = F5FA70D8BA3ED8699BB8D2278E82CFB7171F7ADEF36F8215A71BD20ADD8265C25F3AAAE882D6CCD4B418029EBEA8B7C2
3,168,936 UART: Caliptra RT
3,169,190 UART: [state] CFI Enabled
3,277,670 UART: [rt] RT listening for mailbox commands...
3,278,340 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,791 UART: [rt]cmd =0x49444352, len=4
3,309,254 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,577 ready_for_fw is high
1,059,577 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,457 >>> mbox cmd response: success
2,687,545 UART:
2,687,561 UART: Running Caliptra FMC ...
2,687,969 UART:
2,688,023 UART: [state] CFI Enabled
2,698,602 UART: [fht] FMC Alias Private Key: 7
2,806,935 UART: [art] Extend RT PCRs Done
2,807,363 UART: [art] Lock RT PCRs Done
2,808,843 UART: [art] Populate DV Done
2,816,940 UART: [fht] FMC Alias Private Key: 7
2,817,922 UART: [art] Derive CDI
2,818,202 UART: [art] Store in in slot 0x4
2,903,927 UART: [art] Derive Key Pair
2,904,287 UART: [art] Store priv key in slot 0x5
2,917,413 UART: [art] Derive Key Pair - Done
2,932,239 UART: [art] Signing Cert with AUTHO
2,932,719 UART: RITY.KEYID = 7
2,947,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,666 UART: [art] PUB.X = A2E44233073281B406F9811FADA04254BE46526D8CF4F78696686CB1055F307A193014D6748FFAFCE7C2C6F16BD883A3
2,955,427 UART: [art] PUB.Y = 1DC91351F7A6BBABFED71DA0B7696A427BA303F25133161CB4C235FD23D518A091CF64D8F4DD09CBD84BE6FB2E1DE04E
2,962,393 UART: [art] SIG.R = D61CA215DC7D34BB025A14272BCA749ABD518E916367E1D27165D41E5EBBE09C39CDB540A158F354389D9E4BE4E53D1D
2,969,172 UART: [art] SIG.S = E11715D41E46BC1777C811280804B9425A4B5CE8F06EAE95E5DD351E7E5F2FB6CAEF4F4D2597423B8A4795154EDA9C0F
2,993,256 UART: Caliptra RT
2,993,510 UART: [state] CFI Enabled
3,100,443 UART: [rt] RT listening for mailbox commands...
3,101,113 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,668 UART: [rt]cmd =0x49444352, len=4
3,132,017 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,223 UART: [kat] HMAC-384Kdf
922,851 UART: [kat] LMS
1,171,179 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,594 UART: [fht] FHT @ 0x50003400
1,175,191 UART: [idev] ++
1,175,359 UART: [idev] CDI.KEYID = 6
1,175,719 UART: [idev] SUBJECT.KEYID = 7
1,176,143 UART: [idev] UDS.KEYID = 0
1,176,488 ready_for_fw is high
1,176,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,033 UART: [idev] Erasing UDS.KEYID = 0
1,200,848 UART: [idev] Sha1 KeyId Algorithm
1,209,294 UART: [idev] --
1,210,296 UART: [ldev] ++
1,210,464 UART: [ldev] CDI.KEYID = 6
1,210,827 UART: [ldev] SUBJECT.KEYID = 5
1,211,253 UART: [ldev] AUTHORITY.KEYID = 7
1,211,716 UART: [ldev] FE.KEYID = 1
1,216,784 UART: [ldev] Erasing FE.KEYID = 1
1,242,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,218 UART: [ldev] --
1,282,515 UART: [fwproc] Wait for Commands...
1,283,211 UART: [fwproc] Recv command 0x46574c44
1,283,939 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,811 >>> mbox cmd response: success
2,774,869 UART: [afmc] ++
2,775,037 UART: [afmc] CDI.KEYID = 6
2,775,399 UART: [afmc] SUBJECT.KEYID = 7
2,775,824 UART: [afmc] AUTHORITY.KEYID = 5
2,811,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,528 UART: [afmc] --
2,855,654 UART: [cold-reset] --
2,856,230 UART: [state] Locking Datavault
2,857,673 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,277 UART: [state] Locking ICCM
2,858,881 UART: [exit] Launching FMC @ 0x40000130
2,864,210 UART:
2,864,226 UART: Running Caliptra FMC ...
2,864,634 UART:
2,864,777 UART: [state] CFI Enabled
2,875,698 UART: [fht] FMC Alias Private Key: 7
2,983,385 UART: [art] Extend RT PCRs Done
2,983,813 UART: [art] Lock RT PCRs Done
2,985,313 UART: [art] Populate DV Done
2,993,798 UART: [fht] FMC Alias Private Key: 7
2,994,886 UART: [art] Derive CDI
2,995,166 UART: [art] Store in in slot 0x4
3,080,713 UART: [art] Derive Key Pair
3,081,073 UART: [art] Store priv key in slot 0x5
3,094,431 UART: [art] Derive Key Pair - Done
3,109,173 UART: [art] Signing Cert with AUTHO
3,109,653 UART: RITY.KEYID = 7
3,124,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,610 UART: [art] PUB.X = BE60F8159047883F715714351C42FB2713BF29F3191E2EC51EECA3FB5E8D0EE31241314A996C21EEEA69A5508EC290D8
3,132,381 UART: [art] PUB.Y = D5395CC05449E2ED2DC7D146A9B716D2133D296922028C4B80EFDEA8ABA5D05D85E78BF8023B55C9E209DA4030C02FEF
3,139,334 UART: [art] SIG.R = 59DE2898647A5C33F3C8C21BF66E5C13C7A3498678759DA5831357ACA0C988C3BE4F1A6A4AC94A5ACDB33B151B136AEE
3,146,116 UART: [art] SIG.S = EDC170B91C84D4E19D53B8E92F12295D0749F7718D290D448E24B283FDA0FFB7D542771C56F565BD3FFF3DC597E03EC2
3,169,885 UART: Caliptra RT
3,170,231 UART: [state] CFI Enabled
3,277,961 UART: [rt] RT listening for mailbox commands...
3,278,631 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,020 UART: [rt]cmd =0x49444352, len=4
3,309,315 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,648 ready_for_fw is high
1,060,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,578 >>> mbox cmd response: success
2,690,784 UART:
2,690,800 UART: Running Caliptra FMC ...
2,691,208 UART:
2,691,351 UART: [state] CFI Enabled
2,702,056 UART: [fht] FMC Alias Private Key: 7
2,809,809 UART: [art] Extend RT PCRs Done
2,810,237 UART: [art] Lock RT PCRs Done
2,811,789 UART: [art] Populate DV Done
2,820,160 UART: [fht] FMC Alias Private Key: 7
2,821,328 UART: [art] Derive CDI
2,821,608 UART: [art] Store in in slot 0x4
2,907,679 UART: [art] Derive Key Pair
2,908,039 UART: [art] Store priv key in slot 0x5
2,921,723 UART: [art] Derive Key Pair - Done
2,936,725 UART: [art] Signing Cert with AUTHO
2,937,205 UART: RITY.KEYID = 7
2,952,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,288 UART: [art] PUB.X = CA00E368B6EBD1A526E0AE0CC7F87E54EF1FA7B4BE7A9BE42A75C1FCD50DFFEC401F7011144CE4E2E9486BF014AFB211
2,960,058 UART: [art] PUB.Y = D21A5BDDBE08E8638863E9FE22222D0A6A2CF05A1723E9A5EAA0FF0707185771B1DE373297D7DA42AFDCBF4D94EE31F9
2,967,014 UART: [art] SIG.R = DA472B0C8977F589DF784C5A49945527328908F1FC9A4BE039AD42CE6026B315ACF6C59BBE7B5BD1CED0DE014A7356F8
2,973,787 UART: [art] SIG.S = 19C7836988B798E18FAAED541E055B26821E733BDFB4720542E3FA5562F25229AF6282DA0F5289AC44DAAF22230007E7
2,997,142 UART: Caliptra RT
2,997,488 UART: [state] CFI Enabled
3,106,492 UART: [rt] RT listening for mailbox commands...
3,107,162 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,847 UART: [rt]cmd =0x49444352, len=4
3,138,260 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
891,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,851 UART: [kat] ++
896,003 UART: [kat] sha1
900,209 UART: [kat] SHA2-256
902,149 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,825 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,174,703 ready_for_fw is high
1,174,703 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,199,879 UART: [idev] Sha1 KeyId Algorithm
1,208,941 UART: [idev] --
1,210,000 UART: [ldev] ++
1,210,168 UART: [ldev] CDI.KEYID = 6
1,210,532 UART: [ldev] SUBJECT.KEYID = 5
1,210,959 UART: [ldev] AUTHORITY.KEYID = 7
1,211,422 UART: [ldev] FE.KEYID = 1
1,216,652 UART: [ldev] Erasing FE.KEYID = 1
1,242,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,540 UART: [ldev] --
1,282,038 UART: [fwproc] Wait for Commands...
1,282,833 UART: [fwproc] Recv command 0x46574c44
1,283,566 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,182 >>> mbox cmd response: success
2,773,227 UART: [afmc] ++
2,773,395 UART: [afmc] CDI.KEYID = 6
2,773,758 UART: [afmc] SUBJECT.KEYID = 7
2,774,184 UART: [afmc] AUTHORITY.KEYID = 5
2,809,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,978 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,697 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,668 UART: [afmc] --
2,852,782 UART: [cold-reset] --
2,853,628 UART: [state] Locking Datavault
2,854,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,543 UART: [state] Locking ICCM
2,856,073 UART: [exit] Launching FMC @ 0x40000130
2,861,402 UART:
2,861,418 UART: Running Caliptra FMC ...
2,861,826 UART:
2,861,880 UART: [state] CFI Enabled
2,872,761 UART: [fht] FMC Alias Private Key: 7
2,981,260 UART: [art] Extend RT PCRs Done
2,981,688 UART: [art] Lock RT PCRs Done
2,982,988 UART: [art] Populate DV Done
2,991,149 UART: [fht] FMC Alias Private Key: 7
2,992,273 UART: [art] Derive CDI
2,992,553 UART: [art] Store in in slot 0x4
3,077,590 UART: [art] Derive Key Pair
3,077,950 UART: [art] Store priv key in slot 0x5
3,090,784 UART: [art] Derive Key Pair - Done
3,105,352 UART: [art] Signing Cert with AUTHO
3,105,832 UART: RITY.KEYID = 7
3,120,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,659 UART: [art] PUB.X = AD3B6FF22705B8A3729E801297B8FB0A9CBBA88623B93C5DCA5C53744E878D61C7399D70119F0E09F82A71C07ABBD7E9
3,128,427 UART: [art] PUB.Y = 421E53953EB07CDB408E99E007B8C1456B4D53B71AAA7C9901F63AA0C79730F19FA11AE3CC189ACB6572E1CE282D2E08
3,135,378 UART: [art] SIG.R = CAACC17C66E4521572F09A7C4E3224F2E8486208D3C54C19036BE3A8516E82A835F2B4B92391E2EA012189737E7CA80E
3,142,136 UART: [art] SIG.S = E60B0287B3D6F21ED7288173C9EE7C785E85BF71ED0AB88935546949AE19E02A278284E9F8A3DBF5C9A9F2A5B1C915E6
3,165,796 UART: Caliptra RT
3,166,050 UART: [state] CFI Enabled
3,274,685 UART: [rt] RT listening for mailbox commands...
3,275,355 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,998 UART: [rt]cmd =0x49444352, len=4
3,306,129 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,598 ready_for_fw is high
1,055,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,613 >>> mbox cmd response: success
2,683,715 UART:
2,683,731 UART: Running Caliptra FMC ...
2,684,139 UART:
2,684,193 UART: [state] CFI Enabled
2,694,950 UART: [fht] FMC Alias Private Key: 7
2,802,805 UART: [art] Extend RT PCRs Done
2,803,233 UART: [art] Lock RT PCRs Done
2,804,671 UART: [art] Populate DV Done
2,813,086 UART: [fht] FMC Alias Private Key: 7
2,814,130 UART: [art] Derive CDI
2,814,410 UART: [art] Store in in slot 0x4
2,899,655 UART: [art] Derive Key Pair
2,900,015 UART: [art] Store priv key in slot 0x5
2,913,633 UART: [art] Derive Key Pair - Done
2,928,438 UART: [art] Signing Cert with AUTHO
2,928,918 UART: RITY.KEYID = 7
2,944,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,065 UART: [art] PUB.X = D96B61CBFC0F448E7754ACE3316BF9F97DE5625524B1C6594B6FE800FA341A3C5F22FE4B52CAD5A9287D5B4FBBAE9971
2,951,828 UART: [art] PUB.Y = BA23E177E4D81D084902EC2B4B438CE869444156A56D9D553366D76E30B2D2DAA59F659E29DCD3A106C76BADBFBA8779
2,958,779 UART: [art] SIG.R = 1ECA9B3F80517AB8DAD22A31A1CB28CAAF4648D46FE46B098086CD147A11917459B77F53E6F74B24F561420EAD01F45A
2,965,550 UART: [art] SIG.S = A3BCF6F0645A1A0DF32CA63C65ED8690BE2A196DE3CF7054BFF89002D263FA8B7B1598F4AD8809B03378F68E4B2F634B
2,989,630 UART: Caliptra RT
2,989,884 UART: [state] CFI Enabled
3,097,486 UART: [rt] RT listening for mailbox commands...
3,098,156 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,623 UART: [rt]cmd =0x49444352, len=4
3,128,906 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
904,871 UART: [kat] SHA2-512-ACC
906,772 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,174,572 ready_for_fw is high
1,174,572 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,199,752 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,943 UART: [ldev] --
1,282,233 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,595 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,499 >>> mbox cmd response: success
2,775,758 UART: [afmc] ++
2,775,926 UART: [afmc] CDI.KEYID = 6
2,776,289 UART: [afmc] SUBJECT.KEYID = 7
2,776,715 UART: [afmc] AUTHORITY.KEYID = 5
2,812,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,072 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,757 UART: [afmc] --
2,855,835 UART: [cold-reset] --
2,856,839 UART: [state] Locking Datavault
2,858,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,722 UART: [state] Locking ICCM
2,859,352 UART: [exit] Launching FMC @ 0x40000130
2,864,681 UART:
2,864,697 UART: Running Caliptra FMC ...
2,865,105 UART:
2,865,248 UART: [state] CFI Enabled
2,876,123 UART: [fht] FMC Alias Private Key: 7
2,983,910 UART: [art] Extend RT PCRs Done
2,984,338 UART: [art] Lock RT PCRs Done
2,986,132 UART: [art] Populate DV Done
2,994,349 UART: [fht] FMC Alias Private Key: 7
2,995,475 UART: [art] Derive CDI
2,995,755 UART: [art] Store in in slot 0x4
3,081,620 UART: [art] Derive Key Pair
3,081,980 UART: [art] Store priv key in slot 0x5
3,095,166 UART: [art] Derive Key Pair - Done
3,109,948 UART: [art] Signing Cert with AUTHO
3,110,428 UART: RITY.KEYID = 7
3,125,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,879 UART: [art] PUB.X = D1A937E516EF7D904352BFF2157D6E79027B3D880C32910A2825A3AEE4D7BA9DDCEBB31129FAB9751E673EA06C4AA9B4
3,132,654 UART: [art] PUB.Y = BB810F4E3C3949F10693D459D951915301A7AD963ED88E4BDA78788446FBAE84132F1556A3A3CC80D3C5BDE7E3E039F2
3,139,601 UART: [art] SIG.R = 69A02EE6E63640E022B32CFB886C49C41034B3AEE598020F51C5E7A7EB5752820AA734BEDF0F9782BA198EEE5FF8E206
3,146,366 UART: [art] SIG.S = 6EA58D7670E67E5EC752CE7101E7D4AAB0E9D813A39436B6526C74E4E6CF7202A5A497D00A888CABB0FA8AFF859CD760
3,169,666 UART: Caliptra RT
3,170,012 UART: [state] CFI Enabled
3,277,222 UART: [rt] RT listening for mailbox commands...
3,277,892 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,235 UART: [rt]cmd =0x49444352, len=4
3,308,336 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,907 ready_for_fw is high
1,056,907 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,093 >>> mbox cmd response: success
2,685,393 UART:
2,685,409 UART: Running Caliptra FMC ...
2,685,817 UART:
2,685,960 UART: [state] CFI Enabled
2,696,405 UART: [fht] FMC Alias Private Key: 7
2,804,460 UART: [art] Extend RT PCRs Done
2,804,888 UART: [art] Lock RT PCRs Done
2,806,634 UART: [art] Populate DV Done
2,815,009 UART: [fht] FMC Alias Private Key: 7
2,816,045 UART: [art] Derive CDI
2,816,325 UART: [art] Store in in slot 0x4
2,901,890 UART: [art] Derive Key Pair
2,902,250 UART: [art] Store priv key in slot 0x5
2,916,002 UART: [art] Derive Key Pair - Done
2,930,695 UART: [art] Signing Cert with AUTHO
2,931,175 UART: RITY.KEYID = 7
2,946,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,132 UART: [art] PUB.X = 1589A856248054AD2F221561CBBFA5A5AC77A544D395478025BF19C1513EDA62061BA1E66278F348EC1E1255E3A6A2AB
2,953,901 UART: [art] PUB.Y = A1CD9F773101CD214FC911090775EB303C2E751F1B51699E2A41083BC6183EB7BFC0F98DF4C551C07A098BA9FB6C664B
2,960,844 UART: [art] SIG.R = 536C25917C439F11CA54348B04E36D9AC7B9787819630561B9FBA18E4CB8CE0083F4ACBF50454BB67F81661F2F932610
2,967,584 UART: [art] SIG.S = 9104A9FC55BBFA3BE16D3FA16EF8328858398EA06F80B40BE8741097137A013B5D28FC0AEC8B21CEC125675A3CF1B929
2,991,849 UART: Caliptra RT
2,992,195 UART: [state] CFI Enabled
3,100,023 UART: [rt] RT listening for mailbox commands...
3,100,693 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,264 UART: [rt]cmd =0x49444352, len=4
3,131,805 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,544 UART:
192,912 UART: Running Caliptra ROM ...
194,091 UART:
194,245 UART: [state] CFI Enabled
263,064 UART: [state] LifecycleState = Unprovisioned
265,036 UART: [state] DebugLocked = No
266,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,986 UART: [kat] SHA2-256
441,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,229 UART: [kat] ++
452,710 UART: [kat] sha1
464,070 UART: [kat] SHA2-256
466,799 UART: [kat] SHA2-384
472,803 UART: [kat] SHA2-512-ACC
475,163 UART: [kat] ECC-384
2,766,829 UART: [kat] HMAC-384Kdf
2,779,507 UART: [kat] LMS
3,969,831 UART: [kat] --
3,973,782 UART: [cold-reset] ++
3,975,142 UART: [fht] Storing FHT @ 0x50003400
3,986,752 UART: [idev] ++
3,987,313 UART: [idev] CDI.KEYID = 6
3,988,213 UART: [idev] SUBJECT.KEYID = 7
3,989,449 UART: [idev] UDS.KEYID = 0
3,990,424 ready_for_fw is high
3,990,607 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,989 UART: [idev] Erasing UDS.KEYID = 0
7,322,555 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,124 UART: [idev] --
7,349,566 UART: [ldev] ++
7,350,187 UART: [ldev] CDI.KEYID = 6
7,351,143 UART: [ldev] SUBJECT.KEYID = 5
7,352,348 UART: [ldev] AUTHORITY.KEYID = 7
7,353,772 UART: [ldev] FE.KEYID = 1
7,401,073 UART: [ldev] Erasing FE.KEYID = 1
10,735,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,350 UART: [ldev] --
13,114,243 UART: [fwproc] Waiting for Commands...
13,115,881 UART: [fwproc] Received command 0x46574c44
13,118,066 UART: [fwproc] Received Image of size 114036 bytes
17,177,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,640,776 >>> mbox cmd response: success
17,641,262 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,644,790 UART: [afmc] ++
17,645,364 UART: [afmc] CDI.KEYID = 6
17,646,379 UART: [afmc] SUBJECT.KEYID = 7
17,647,532 UART: [afmc] AUTHORITY.KEYID = 5
21,005,096 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,241 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,648 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,469 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,916 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,871 UART: [afmc] --
23,376,976 UART: [cold-reset] --
23,379,927 UART: [state] Locking Datavault
23,384,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,493 UART: [state] Locking ICCM
23,388,581 UART: [exit] Launching FMC @ 0x40000130
23,396,969 UART:
23,397,196 UART: Running Caliptra FMC ...
23,398,288 UART:
23,398,439 UART: [state] CFI Enabled
23,467,576 UART: [fht] FMC Alias Private Key: 7
25,804,911 UART: [art] Extend RT PCRs Done
25,806,138 UART: [art] Lock RT PCRs Done
25,807,809 UART: [art] Populate DV Done
25,813,163 UART: [fht] FMC Alias Private Key: 7
25,814,852 UART: [art] Derive CDI
25,815,657 UART: [art] Store in in slot 0x4
25,876,504 UART: [art] Derive Key Pair
25,877,559 UART: [art] Store priv key in slot 0x5
29,170,175 UART: [art] Derive Key Pair - Done
29,183,172 UART: [art] Signing Cert with AUTHO
29,184,465 UART: RITY.KEYID = 7
31,472,108 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,609 UART: [art] PUB.X = 80B186742A1A6C0200657872B8617FC9BBB71851BCF15A46A734F7A448478B8F97365088370A80156EC45739A2035B30
31,480,796 UART: [art] PUB.Y = 3FDCD69BD5A6DC3C6F1FF9365D702F9ABDFFDD00FA75509BEC436D5878C998ABA79ACA277A2DB37C51AFA51CE51CF117
31,488,084 UART: [art] SIG.R = F667EDAC42B3E1200263A14B212D3B6CFA64D6A34C132A0C9563E9B15844B3D5588BEA0F7766106E577D808BC42E1240
31,495,463 UART: [art] SIG.S = B25A497426F84D424B5BCEE77225498DD54E9224E8EC2CA66EE8786238A461D2B2D3C346518B894A4CBA25E8C3559148
32,800,529 UART: Caliptra RT
32,801,243 UART: [state] CFI Enabled
32,963,742 UART: [rt] RT listening for mailbox commands...
32,994,881 UART: [rt]cmd =0x43415053, len=4
32,996,611 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,808,932 ready_for_fw is high
3,809,574 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,878,839 >>> mbox cmd response: success
17,880,050 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,568,402 UART:
23,568,847 UART: Running Caliptra FMC ...
23,569,954 UART:
23,570,108 UART: [state] CFI Enabled
23,639,541 UART: [fht] FMC Alias Private Key: 7
25,977,789 UART: [art] Extend RT PCRs Done
25,979,065 UART: [art] Lock RT PCRs Done
25,980,776 UART: [art] Populate DV Done
25,986,133 UART: [fht] FMC Alias Private Key: 7
25,987,720 UART: [art] Derive CDI
25,988,449 UART: [art] Store in in slot 0x4
26,048,435 UART: [art] Derive Key Pair
26,049,481 UART: [art] Store priv key in slot 0x5
29,342,385 UART: [art] Derive Key Pair - Done
29,355,379 UART: [art] Signing Cert with AUTHO
29,356,681 UART: RITY.KEYID = 7
31,644,437 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,963 UART: [art] PUB.X = 53DCBAFDC5EC92B6E827A77A48194E838E041FC0672DA1167DF2E2EBCCF65571410A8035E3540DC01FF9A01ADA1C6BB9
31,653,201 UART: [art] PUB.Y = 123D9563F43507B531980B00A99A5A3A7625B96C59A0E908D861DFDDD6BA8F29A90A7DF89BD6AC30278E3D104EE60AC6
31,660,483 UART: [art] SIG.R = FEFAE0BB77E10FD8EE0690DCD238ED27E951A50DE940F6A71AC2282DACFB82807619E4661200B22560CCFDB76CCCD11D
31,667,861 UART: [art] SIG.S = 2D0C0B1A1F4C6F1A263C8F7401DE2E173C376D452AC53E239FAF401CB563A4086EF8FCF3EB4E3E53A0E3395C7EAB88F2
32,972,954 UART: Caliptra RT
32,973,651 UART: [state] CFI Enabled
33,135,923 UART: [rt] RT listening for mailbox commands...
33,167,156 UART: [rt]cmd =0x43415053, len=4
33,168,977 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
192,590 UART:
192,948 UART: Running Caliptra ROM ...
194,039 UART:
603,617 UART: [state] CFI Enabled
617,461 UART: [state] LifecycleState = Unprovisioned
619,436 UART: [state] DebugLocked = No
621,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,241 UART: [kat] SHA2-256
795,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,547 UART: [kat] ++
807,082 UART: [kat] sha1
817,752 UART: [kat] SHA2-256
820,470 UART: [kat] SHA2-384
827,236 UART: [kat] SHA2-512-ACC
829,559 UART: [kat] ECC-384
3,115,683 UART: [kat] HMAC-384Kdf
3,127,480 UART: [kat] LMS
4,317,611 UART: [kat] --
4,320,614 UART: [cold-reset] ++
4,322,824 UART: [fht] Storing FHT @ 0x50003400
4,334,229 UART: [idev] ++
4,334,793 UART: [idev] CDI.KEYID = 6
4,335,748 UART: [idev] SUBJECT.KEYID = 7
4,336,986 UART: [idev] UDS.KEYID = 0
4,337,935 ready_for_fw is high
4,338,121 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,319 UART: [idev] Erasing UDS.KEYID = 0
7,626,891 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,924 UART: [idev] --
7,653,292 UART: [ldev] ++
7,653,877 UART: [ldev] CDI.KEYID = 6
7,654,931 UART: [ldev] SUBJECT.KEYID = 5
7,656,051 UART: [ldev] AUTHORITY.KEYID = 7
7,657,237 UART: [ldev] FE.KEYID = 1
7,670,254 UART: [ldev] Erasing FE.KEYID = 1
10,958,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,586 UART: [ldev] --
13,322,168 UART: [fwproc] Waiting for Commands...
13,325,235 UART: [fwproc] Received command 0x46574c44
13,327,469 UART: [fwproc] Received Image of size 114036 bytes
17,380,272 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,239 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,837,428 >>> mbox cmd response: success
17,837,930 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,842,483 UART: [afmc] ++
17,843,119 UART: [afmc] CDI.KEYID = 6
17,843,998 UART: [afmc] SUBJECT.KEYID = 7
17,845,267 UART: [afmc] AUTHORITY.KEYID = 5
21,163,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,025 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,442 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,261 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,757 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,331 UART: [afmc] --
23,529,979 UART: [cold-reset] --
23,533,511 UART: [state] Locking Datavault
23,538,935 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,697 UART: [state] Locking ICCM
23,543,442 UART: [exit] Launching FMC @ 0x40000130
23,551,837 UART:
23,552,071 UART: Running Caliptra FMC ...
23,553,173 UART:
23,553,330 UART: [state] CFI Enabled
23,561,105 UART: [fht] FMC Alias Private Key: 7
25,891,815 UART: [art] Extend RT PCRs Done
25,893,029 UART: [art] Lock RT PCRs Done
25,894,847 UART: [art] Populate DV Done
25,900,304 UART: [fht] FMC Alias Private Key: 7
25,901,846 UART: [art] Derive CDI
25,902,608 UART: [art] Store in in slot 0x4
25,945,311 UART: [art] Derive Key Pair
25,946,310 UART: [art] Store priv key in slot 0x5
29,188,088 UART: [art] Derive Key Pair - Done
29,201,319 UART: [art] Signing Cert with AUTHO
29,202,624 UART: RITY.KEYID = 7
31,481,595 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,112 UART: [art] PUB.X = 3A766EFEC0F5CB796F27CED0A197021BFFF85F799B54F1B3D57296E020396985C491B2D27F5384A395D6FF81C066A23A
31,490,356 UART: [art] PUB.Y = 6D4008448D91C57E7FB25DD3963ECDB8B00831064CE0905D46EA2A2A7D3A975813B45D4242679264AAF57C578FE151A0
31,497,557 UART: [art] SIG.R = F847FD9F01BCBEBCAED495CC15C0E4684DAECAEB24FBC8A96CC916AF3F1E96D6B8B8C33AF46D9B149C45B9B9B2333035
31,505,004 UART: [art] SIG.S = 26267312A47EFC059F0C4F0B6A544519004BE82702F3457C6F5A4896E67DD7A459984F2937D5501F31FC5D296138AC6D
32,810,081 UART: Caliptra RT
32,810,808 UART: [state] CFI Enabled
32,927,984 UART: [rt] RT listening for mailbox commands...
32,958,800 UART: [rt]cmd =0x43415053, len=4
32,960,408 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
4,122,994 ready_for_fw is high
4,123,540 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,057,577 >>> mbox cmd response: success
18,058,813 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,696,512 UART:
23,697,422 UART: Running Caliptra FMC ...
23,698,548 UART:
23,698,697 UART: [state] CFI Enabled
23,706,094 UART: [fht] FMC Alias Private Key: 7
26,037,072 UART: [art] Extend RT PCRs Done
26,038,321 UART: [art] Lock RT PCRs Done
26,039,983 UART: [art] Populate DV Done
26,045,356 UART: [fht] FMC Alias Private Key: 7
26,046,910 UART: [art] Derive CDI
26,047,645 UART: [art] Store in in slot 0x4
26,089,982 UART: [art] Derive Key Pair
26,091,030 UART: [art] Store priv key in slot 0x5
29,333,560 UART: [art] Derive Key Pair - Done
29,346,453 UART: [art] Signing Cert with AUTHO
29,347,753 UART: RITY.KEYID = 7
31,627,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,823 UART: [art] PUB.X = 88C083F3D890CCCD3DFDDB7FD6D1DA746004783087819F7E26AF1741B7CAB0FDCA1E4CD86B4FDA67E4563B9384D3D2FE
31,636,103 UART: [art] PUB.Y = EEEBFC112669D6A65CDCE62CE038E1898A44B94270E3009A66F467B8C605BFC2A3413163D3F255D7734BCE9E3E4A850C
31,643,327 UART: [art] SIG.R = 0983CD8A01480BD350FC3F602EDD38ADD18D468028CA3B3C392F8B922865019ACB0891A8C1B5F871491AF3B279971EFB
31,650,772 UART: [art] SIG.S = 88234A4C6EA0A8CA4E7FE118A646D03C1E9B8930309674222F6FBA1750BECA131F6ED6BE6C4BB4FD17FE5A245A37717D
32,956,046 UART: Caliptra RT
32,956,765 UART: [state] CFI Enabled
33,074,110 UART: [rt] RT listening for mailbox commands...
33,105,262 UART: [rt]cmd =0x43415053, len=4
33,106,897 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,463 UART:
192,829 UART: Running Caliptra ROM ...
194,033 UART:
194,214 UART: [state] CFI Enabled
265,348 UART: [state] LifecycleState = Unprovisioned
267,271 UART: [state] DebugLocked = No
269,715 UART: [state] WD Timer not started. Device not locked for debugging
273,254 UART: [kat] SHA2-256
452,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,980 UART: [kat] ++
464,431 UART: [kat] sha1
474,025 UART: [kat] SHA2-256
477,034 UART: [kat] SHA2-384
482,389 UART: [kat] SHA2-512-ACC
485,337 UART: [kat] ECC-384
2,953,427 UART: [kat] HMAC-384Kdf
2,973,051 UART: [kat] LMS
3,502,514 UART: [kat] --
3,507,147 UART: [cold-reset] ++
3,509,286 UART: [fht] FHT @ 0x50003400
3,520,354 UART: [idev] ++
3,520,925 UART: [idev] CDI.KEYID = 6
3,521,850 UART: [idev] SUBJECT.KEYID = 7
3,523,025 UART: [idev] UDS.KEYID = 0
3,523,952 ready_for_fw is high
3,524,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,979 UART: [idev] Erasing UDS.KEYID = 0
6,025,857 UART: [idev] Sha1 KeyId Algorithm
6,047,630 UART: [idev] --
6,050,736 UART: [ldev] ++
6,051,317 UART: [ldev] CDI.KEYID = 6
6,052,232 UART: [ldev] SUBJECT.KEYID = 5
6,053,393 UART: [ldev] AUTHORITY.KEYID = 7
6,054,623 UART: [ldev] FE.KEYID = 1
6,101,739 UART: [ldev] Erasing FE.KEYID = 1
8,602,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,498 UART: [ldev] --
10,392,598 UART: [fwproc] Wait for Commands...
10,395,501 UART: [fwproc] Recv command 0x46574c44
10,397,592 UART: [fwproc] Recv'd Img size: 114360 bytes
13,798,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,511 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,254,190 >>> mbox cmd response: success
14,254,728 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,258,493 UART: [afmc] ++
14,259,084 UART: [afmc] CDI.KEYID = 6
14,259,999 UART: [afmc] SUBJECT.KEYID = 7
14,261,181 UART: [afmc] AUTHORITY.KEYID = 5
16,785,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,530,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,546,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,562,089 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,585,055 UART: [afmc] --
18,589,673 UART: [cold-reset] --
18,595,045 UART: [state] Locking Datavault
18,600,023 UART: [state] Locking PCR0, PCR1 and PCR31
18,601,677 UART: [state] Locking ICCM
18,603,321 UART: [exit] Launching FMC @ 0x40000130
18,611,692 UART:
18,611,935 UART: Running Caliptra FMC ...
18,613,037 UART:
18,613,218 UART: [state] CFI Enabled
18,667,279 UART: [fht] FMC Alias Private Key: 7
20,431,200 UART: [art] Extend RT PCRs Done
20,432,398 UART: [art] Lock RT PCRs Done
20,434,015 UART: [art] Populate DV Done
20,439,259 UART: [fht] FMC Alias Private Key: 7
20,440,905 UART: [art] Derive CDI
20,441,719 UART: [art] Store in in slot 0x4
20,499,826 UART: [art] Derive Key Pair
20,500,837 UART: [art] Store priv key in slot 0x5
22,963,868 UART: [art] Derive Key Pair - Done
22,976,697 UART: [art] Signing Cert with AUTHO
22,977,993 UART: RITY.KEYID = 7
24,689,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,668 UART: [art] PUB.X = 2B866CB169F9556A2ADD3006EAB6D827DAFFC8118F35E1951B415F5D7711BB618845E6D8BA5F37B3F568AF625CE5D13A
24,697,956 UART: [art] PUB.Y = 27C69BF8EB30AD3361E6980F51FB6DC51546B24FCD804FB27AFF119C251511DA3C37C5D3B0A3A00DB47FA55C9A03AE79
24,705,202 UART: [art] SIG.R = 3F6B69184253971EA2EE71A0AF8862C727F1F8ECC093B92F970E9BFD5EE942E5072363473C6D752EF5B8B4697BCD03D3
24,712,585 UART: [art] SIG.S = 28B186ACD39E75C4FA93590291D02EA9E6F1087C2339D1FEA9E6B61250E200F4BBE852D42B03309A0B075C6CF6E02ACB
25,692,094 UART: Caliptra RT
25,692,796 UART: [state] CFI Enabled
25,856,588 UART: [rt] RT listening for mailbox commands...
25,887,559 UART: [rt]cmd =0x43415053, len=4
25,889,273 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,515 UART:
192,891 UART: Running Caliptra ROM ...
194,092 UART:
194,259 UART: [state] CFI Enabled
261,718 UART: [state] LifecycleState = Unprovisioned
264,075 UART: [state] DebugLocked = No
266,974 UART: [state] WD Timer not started. Device not locked for debugging
272,286 UART: [kat] SHA2-256
462,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,951 UART: [kat] ++
473,402 UART: [kat] sha1
484,599 UART: [kat] SHA2-256
487,560 UART: [kat] SHA2-384
493,412 UART: [kat] SHA2-512-ACC
495,995 UART: [kat] ECC-384
2,944,906 UART: [kat] HMAC-384Kdf
2,970,858 UART: [kat] LMS
3,502,639 UART: [kat] --
3,507,978 UART: [cold-reset] ++
3,510,477 UART: [fht] FHT @ 0x50003400
3,522,447 UART: [idev] ++
3,523,152 UART: [idev] CDI.KEYID = 6
3,524,035 UART: [idev] SUBJECT.KEYID = 7
3,525,284 UART: [idev] UDS.KEYID = 0
3,526,183 ready_for_fw is high
3,526,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,178 UART: [idev] Erasing UDS.KEYID = 0
6,026,607 UART: [idev] Sha1 KeyId Algorithm
6,049,662 UART: [idev] --
6,054,211 UART: [ldev] ++
6,054,894 UART: [ldev] CDI.KEYID = 6
6,055,823 UART: [ldev] SUBJECT.KEYID = 5
6,056,985 UART: [ldev] AUTHORITY.KEYID = 7
6,058,221 UART: [ldev] FE.KEYID = 1
6,099,757 UART: [ldev] Erasing FE.KEYID = 1
8,600,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,169 UART: [ldev] --
10,411,326 UART: [fwproc] Wait for Commands...
10,413,157 UART: [fwproc] Recv command 0x46574c44
10,415,464 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,594,840 >>> mbox cmd response: success
14,595,428 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,598,389 UART: [afmc] ++
14,599,090 UART: [afmc] CDI.KEYID = 6
14,600,340 UART: [afmc] SUBJECT.KEYID = 7
14,601,784 UART: [afmc] AUTHORITY.KEYID = 5
17,153,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,394 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,725 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,745 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,169 UART: [afmc] --
18,970,544 UART: [cold-reset] --
18,975,064 UART: [state] Locking Datavault
18,979,459 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,657 UART: [state] Locking ICCM
18,982,979 UART: [exit] Launching FMC @ 0x40000130
18,991,646 UART:
18,991,885 UART: Running Caliptra FMC ...
18,992,986 UART:
18,993,146 UART: [state] CFI Enabled
19,051,546 UART: [fht] FMC Alias Private Key: 7
20,815,964 UART: [art] Extend RT PCRs Done
20,817,188 UART: [art] Lock RT PCRs Done
20,818,785 UART: [art] Populate DV Done
20,824,090 UART: [fht] FMC Alias Private Key: 7
20,825,738 UART: [art] Derive CDI
20,826,476 UART: [art] Store in in slot 0x4
20,883,944 UART: [art] Derive Key Pair
20,884,991 UART: [art] Store priv key in slot 0x5
23,348,176 UART: [art] Derive Key Pair - Done
23,360,795 UART: [art] Signing Cert with AUTHO
23,362,100 UART: RITY.KEYID = 7
25,075,555 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,064 UART: [art] PUB.X = 844D83AF8E09A5CE30F4AC1734E0C4FF04B56334A90B479F921E768B855765CE4BCC2FBB4C7644ACA9972A72198216E8
25,084,366 UART: [art] PUB.Y = 479277523665795C8D27FB1F854851E1AC64B7B3A8CEBA9B446B6E2899129B213A383ABD72AB9D695CA1F612DFDC4E9C
25,091,608 UART: [art] SIG.R = EEA4FBC68A059214E691F9C008D8E6315B000A75F6D941CF540EF70716164A8737E66C16DC9360D48E2C3622C580E948
25,098,950 UART: [art] SIG.S = 069C41FCABDF84967A2316B9EE88483D06F62357014453B4F4EFB1DEA7EE6663E5081510034E8A1EEFC9E82AD7683C0A
26,078,213 UART: Caliptra RT
26,078,904 UART: [state] CFI Enabled
26,243,787 UART: [rt] RT listening for mailbox commands...
26,274,710 UART: [rt]cmd =0x43415053, len=4
26,276,564 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
3,437,964 ready_for_fw is high
3,438,359 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,740,212 >>> mbox cmd response: success
14,740,978 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,033,778 UART:
19,034,164 UART: Running Caliptra FMC ...
19,035,371 UART:
19,035,539 UART: [state] CFI Enabled
19,103,766 UART: [fht] FMC Alias Private Key: 7
20,866,981 UART: [art] Extend RT PCRs Done
20,868,210 UART: [art] Lock RT PCRs Done
20,870,005 UART: [art] Populate DV Done
20,875,269 UART: [fht] FMC Alias Private Key: 7
20,876,798 UART: [art] Derive CDI
20,877,576 UART: [art] Store in in slot 0x4
20,936,072 UART: [art] Derive Key Pair
20,937,087 UART: [art] Store priv key in slot 0x5
23,400,074 UART: [art] Derive Key Pair - Done
23,413,137 UART: [art] Signing Cert with AUTHO
23,414,449 UART: RITY.KEYID = 7
25,126,213 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,725 UART: [art] PUB.X = ADEB164EEFFF39252C61AE019A76F53C09F3F571209D8423F394669F03EB0F9A6F570A507AE70F4FC2A7F56F6C50E19B
25,134,989 UART: [art] PUB.Y = 3F4FB399B9BD963A242DB2CDD3D178D5BD7727DC02471ACD4089580A0E53E04AB48DA60226F54054C6E1B746D09B04EA
25,142,234 UART: [art] SIG.R = 553FE807F001107791AE476FBD4AB221E92FC0B71AEC27EAB054289941D456B00EA951EB5C9D032AA5302E907595A986
25,149,635 UART: [art] SIG.S = 5B0D862556D1ABD6260DC4183688329A40E31A70F1D9B1F9D4B0B2516A96B1489E61FD3DA6B7AC3A915AFF217788E45A
26,128,689 UART: Caliptra RT
26,129,401 UART: [state] CFI Enabled
26,294,978 UART: [rt] RT listening for mailbox commands...
26,326,166 UART: [rt]cmd =0x43415053, len=4
26,327,930 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,466 UART:
192,819 UART: Running Caliptra ROM ...
194,001 UART:
603,567 UART: [state] CFI Enabled
616,523 UART: [state] LifecycleState = Unprovisioned
618,949 UART: [state] DebugLocked = No
621,119 UART: [state] WD Timer not started. Device not locked for debugging
625,135 UART: [kat] SHA2-256
815,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,793 UART: [kat] ++
826,312 UART: [kat] sha1
837,818 UART: [kat] SHA2-256
840,827 UART: [kat] SHA2-384
847,032 UART: [kat] SHA2-512-ACC
849,610 UART: [kat] ECC-384
3,292,314 UART: [kat] HMAC-384Kdf
3,305,683 UART: [kat] LMS
3,837,471 UART: [kat] --
3,841,033 UART: [cold-reset] ++
3,842,817 UART: [fht] FHT @ 0x50003400
3,853,222 UART: [idev] ++
3,853,931 UART: [idev] CDI.KEYID = 6
3,854,847 UART: [idev] SUBJECT.KEYID = 7
3,856,085 UART: [idev] UDS.KEYID = 0
3,857,012 ready_for_fw is high
3,857,219 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,238 UART: [idev] Erasing UDS.KEYID = 0
6,334,035 UART: [idev] Sha1 KeyId Algorithm
6,357,293 UART: [idev] --
6,362,042 UART: [ldev] ++
6,362,721 UART: [ldev] CDI.KEYID = 6
6,363,684 UART: [ldev] SUBJECT.KEYID = 5
6,364,781 UART: [ldev] AUTHORITY.KEYID = 7
6,366,072 UART: [ldev] FE.KEYID = 1
6,376,501 UART: [ldev] Erasing FE.KEYID = 1
8,854,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,654 UART: [ldev] --
10,645,428 UART: [fwproc] Wait for Commands...
10,647,640 UART: [fwproc] Recv command 0x46574c44
10,649,949 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,840,814 >>> mbox cmd response: success
14,841,344 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,844,930 UART: [afmc] ++
14,845,681 UART: [afmc] CDI.KEYID = 6
14,846,863 UART: [afmc] SUBJECT.KEYID = 7
14,848,349 UART: [afmc] AUTHORITY.KEYID = 5
17,349,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,785 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,838 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,441 UART: [afmc] --
19,148,907 UART: [cold-reset] --
19,152,339 UART: [state] Locking Datavault
19,160,232 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,424 UART: [state] Locking ICCM
19,165,005 UART: [exit] Launching FMC @ 0x40000130
19,173,675 UART:
19,173,908 UART: Running Caliptra FMC ...
19,175,006 UART:
19,175,163 UART: [state] CFI Enabled
19,183,744 UART: [fht] FMC Alias Private Key: 7
20,940,351 UART: [art] Extend RT PCRs Done
20,941,569 UART: [art] Lock RT PCRs Done
20,943,493 UART: [art] Populate DV Done
20,948,902 UART: [fht] FMC Alias Private Key: 7
20,950,452 UART: [art] Derive CDI
20,951,268 UART: [art] Store in in slot 0x4
20,993,751 UART: [art] Derive Key Pair
20,994,748 UART: [art] Store priv key in slot 0x5
23,421,350 UART: [art] Derive Key Pair - Done
23,433,906 UART: [art] Signing Cert with AUTHO
23,435,233 UART: RITY.KEYID = 7
25,140,215 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,720 UART: [art] PUB.X = A838543398CD8714BC345BA967DF6A5264013D6A9275622610E1A0912C8E4AC0DFD3CEC937DCE3B946CD556A4002B1EE
25,148,978 UART: [art] PUB.Y = 99DE6C6CF6400CDB9F90315E1DDD1B135C7B50D05652D7F9750B576E7793796ADE63A81F959F9BB9A59FDAB346901DEF
25,156,267 UART: [art] SIG.R = FEF634D9423E9FB9F43E7FDDBFDCB0D564FA90FF411ACB07A6CA09C6B6B597FF001FA0520458AE7AD602DFD51E27B2E1
25,163,663 UART: [art] SIG.S = 9854510833ED53D288D8B222DFEFB96C3ED951A5B3648770E51D7E537712467C1A668FB115644451EA1DD10D13BEF279
26,142,572 UART: Caliptra RT
26,143,262 UART: [state] CFI Enabled
26,260,069 UART: [rt] RT listening for mailbox commands...
26,291,121 UART: [rt]cmd =0x43415053, len=4
26,292,862 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,757,268 ready_for_fw is high
3,757,891 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,964,564 >>> mbox cmd response: success
14,965,202 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,217,493 UART:
19,217,878 UART: Running Caliptra FMC ...
19,219,074 UART:
19,219,243 UART: [state] CFI Enabled
19,227,026 UART: [fht] FMC Alias Private Key: 7
20,984,145 UART: [art] Extend RT PCRs Done
20,985,382 UART: [art] Lock RT PCRs Done
20,986,980 UART: [art] Populate DV Done
20,992,294 UART: [fht] FMC Alias Private Key: 7
20,993,867 UART: [art] Derive CDI
20,994,686 UART: [art] Store in in slot 0x4
21,037,169 UART: [art] Derive Key Pair
21,038,169 UART: [art] Store priv key in slot 0x5
23,465,305 UART: [art] Derive Key Pair - Done
23,478,199 UART: [art] Signing Cert with AUTHO
23,479,500 UART: RITY.KEYID = 7
25,184,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,334 UART: [art] PUB.X = 36608FD48ABE40A3DD298ACA3BFF97F2E0B57A72E69946A82DCA9E63FEE5BC128CD004C63032C10EC80FFF4A7D6BF0CF
25,193,624 UART: [art] PUB.Y = 5D5D2B4BD1D4B9B0007F8E09544C39A944D26B73CC2A7E431260BD6AB0E970379FCDF62DA6D62CDA5074207741FF4EFD
25,200,867 UART: [art] SIG.R = 2541EA3E15C91189F1E9C3B87B413FF092F0B47BF2C9116158A8D67250411107DA151F691F3A1FCAD28EFDE98F60B09D
25,208,264 UART: [art] SIG.S = E9D67EB270DE121F3D2E036F3ED370DB818C2A6188C9EAB5772FDD46028A29E0DAE228209B07DB1F9A68122790D31CF7
26,187,178 UART: Caliptra RT
26,187,885 UART: [state] CFI Enabled
26,306,631 UART: [rt] RT listening for mailbox commands...
26,337,501 UART: [rt]cmd =0x43415053, len=4
26,339,151 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,405 UART: [kat] SHA2-256
892,343 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,524 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,450 UART: [idev] ++
1,479,618 UART: [idev] CDI.KEYID = 6
1,479,978 UART: [idev] SUBJECT.KEYID = 7
1,480,402 UART: [idev] UDS.KEYID = 0
1,480,747 ready_for_fw is high
1,480,747 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,710 UART: [idev] --
1,514,699 UART: [ldev] ++
1,514,867 UART: [ldev] CDI.KEYID = 6
1,515,230 UART: [ldev] SUBJECT.KEYID = 5
1,515,656 UART: [ldev] AUTHORITY.KEYID = 7
1,516,119 UART: [ldev] FE.KEYID = 1
1,521,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,880 UART: [ldev] --
1,586,213 UART: [fwproc] Waiting for Commands...
1,586,892 UART: [fwproc] Received command 0x46574c44
1,587,683 UART: [fwproc] Received Image of size 114360 bytes
2,884,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,215 >>> mbox cmd response: success
3,077,215 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,078,371 UART: [afmc] ++
3,078,539 UART: [afmc] CDI.KEYID = 6
3,078,901 UART: [afmc] SUBJECT.KEYID = 7
3,079,326 UART: [afmc] AUTHORITY.KEYID = 5
3,114,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,237 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,017 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,630 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,320 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,437 UART: [afmc] --
3,157,357 UART: [cold-reset] --
3,158,047 UART: [state] Locking Datavault
3,159,394 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,998 UART: [state] Locking ICCM
3,160,438 UART: [exit] Launching FMC @ 0x40000130
3,165,767 UART:
3,165,783 UART: Running Caliptra FMC ...
3,166,191 UART:
3,166,245 UART: [state] CFI Enabled
3,176,512 UART: [fht] FMC Alias Private Key: 7
3,284,887 UART: [art] Extend RT PCRs Done
3,285,315 UART: [art] Lock RT PCRs Done
3,286,615 UART: [art] Populate DV Done
3,294,800 UART: [fht] FMC Alias Private Key: 7
3,295,850 UART: [art] Derive CDI
3,296,130 UART: [art] Store in in slot 0x4
3,381,539 UART: [art] Derive Key Pair
3,381,899 UART: [art] Store priv key in slot 0x5
3,395,009 UART: [art] Derive Key Pair - Done
3,409,694 UART: [art] Signing Cert with AUTHO
3,410,174 UART: RITY.KEYID = 7
3,425,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,851 UART: [art] PUB.X = 0AB3E88DBE82BE3C1018339B441D815255DE66C62920FF7A553C2DBB3B573C0D7E216F6AC859337BE771C9A424FFFD37
3,432,625 UART: [art] PUB.Y = 260DD13875403DE39433700E0F1342D7DFB17A2A99E1B059059F6928821F7CCF0C77F65C28CD90134E3954ECF042E1F3
3,439,558 UART: [art] SIG.R = E7E1E129A0E40DD6599871676F5B44D18537354F78516C30BCEAA2A3D47AFA59EEBEAE86B125187B445A654568298BAE
3,446,331 UART: [art] SIG.S = 9B671DF04A297F4DFADCE11355B16F81EE7C6AF5BE2C3EA3B9E583F381DDAF25F5B0C6E0E7598DD18DBF1B10F26E8E2C
3,469,870 UART: Caliptra RT
3,470,124 UART: [state] CFI Enabled
3,579,303 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,466 UART: [rt]cmd =0x43415053, len=4
3,610,719 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,673 ready_for_fw is high
1,361,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,835 >>> mbox cmd response: success
2,926,835 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,988,433 UART:
2,988,449 UART: Running Caliptra FMC ...
2,988,857 UART:
2,988,911 UART: [state] CFI Enabled
2,999,270 UART: [fht] FMC Alias Private Key: 7
3,107,743 UART: [art] Extend RT PCRs Done
3,108,171 UART: [art] Lock RT PCRs Done
3,109,569 UART: [art] Populate DV Done
3,117,770 UART: [fht] FMC Alias Private Key: 7
3,118,824 UART: [art] Derive CDI
3,119,104 UART: [art] Store in in slot 0x4
3,204,291 UART: [art] Derive Key Pair
3,204,651 UART: [art] Store priv key in slot 0x5
3,217,791 UART: [art] Derive Key Pair - Done
3,232,396 UART: [art] Signing Cert with AUTHO
3,232,876 UART: RITY.KEYID = 7
3,247,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,659 UART: [art] PUB.X = 52D340740317DC2E07D628678DCEAFDD99B0F38E72B818F585408A274802648FAA0411297B35D4C8223992F50A222C60
3,255,406 UART: [art] PUB.Y = E41B491FA0D5BC678B72AB0AC635C7C907CF05FE98D863DFF30A12982C0FCDDACF8E64237E03B3E6206EC9783828D188
3,262,352 UART: [art] SIG.R = 7530A2D0AD3130AF040112551570CE7A59EA5E26B722D4599705B2D572A44751559760329D6CA33910836E71140A433B
3,269,094 UART: [art] SIG.S = A55B9AD19735925BCBE09A6454DFFCE0AA013AE8C21AE76C4D346A08B87E0131D2A0E8A7640ECB442097E2C8A4CACAB8
3,293,239 UART: Caliptra RT
3,293,493 UART: [state] CFI Enabled
3,401,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,596 UART: [rt]cmd =0x43415053, len=4
3,433,057 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,592 UART: [kat] SHA2-256
892,530 UART: [kat] SHA2-384
895,109 UART: [kat] SHA2-512-ACC
897,010 UART: [kat] ECC-384
902,777 UART: [kat] HMAC-384Kdf
907,311 UART: [kat] LMS
1,475,507 UART: [kat] --
1,476,380 UART: [cold-reset] ++
1,476,822 UART: [fht] Storing FHT @ 0x50003400
1,479,455 UART: [idev] ++
1,479,623 UART: [idev] CDI.KEYID = 6
1,479,983 UART: [idev] SUBJECT.KEYID = 7
1,480,407 UART: [idev] UDS.KEYID = 0
1,480,752 ready_for_fw is high
1,480,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,359 UART: [idev] Erasing UDS.KEYID = 0
1,505,551 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,221 UART: [idev] --
1,515,224 UART: [ldev] ++
1,515,392 UART: [ldev] CDI.KEYID = 6
1,515,755 UART: [ldev] SUBJECT.KEYID = 5
1,516,181 UART: [ldev] AUTHORITY.KEYID = 7
1,516,644 UART: [ldev] FE.KEYID = 1
1,522,144 UART: [ldev] Erasing FE.KEYID = 1
1,547,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,145 UART: [ldev] --
1,586,522 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 114360 bytes
2,885,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,320 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,617 >>> mbox cmd response: success
3,078,617 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,079,733 UART: [afmc] ++
3,079,901 UART: [afmc] CDI.KEYID = 6
3,080,263 UART: [afmc] SUBJECT.KEYID = 7
3,080,688 UART: [afmc] AUTHORITY.KEYID = 5
3,116,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,784 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,474 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,477 UART: [afmc] --
3,159,483 UART: [cold-reset] --
3,160,475 UART: [state] Locking Datavault
3,161,674 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,278 UART: [state] Locking ICCM
3,162,716 UART: [exit] Launching FMC @ 0x40000130
3,168,045 UART:
3,168,061 UART: Running Caliptra FMC ...
3,168,469 UART:
3,168,612 UART: [state] CFI Enabled
3,179,271 UART: [fht] FMC Alias Private Key: 7
3,287,206 UART: [art] Extend RT PCRs Done
3,287,634 UART: [art] Lock RT PCRs Done
3,289,392 UART: [art] Populate DV Done
3,297,583 UART: [fht] FMC Alias Private Key: 7
3,298,529 UART: [art] Derive CDI
3,298,809 UART: [art] Store in in slot 0x4
3,384,738 UART: [art] Derive Key Pair
3,385,098 UART: [art] Store priv key in slot 0x5
3,398,874 UART: [art] Derive Key Pair - Done
3,413,396 UART: [art] Signing Cert with AUTHO
3,413,876 UART: RITY.KEYID = 7
3,429,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,949 UART: [art] PUB.X = 7134A537AF3F031A634EA5746E314C68145B320D01DF851872E01A31E69E5BB2D18EAB8DECAB0A5CC72B01E22D763197
3,436,710 UART: [art] PUB.Y = F001ADBC5519C65BEEB41490251B8F7FC1E0D155C2D239495DDC1A0965A8BE925DFDF557A32EEB8B9CEBC9AF2048B2FD
3,443,678 UART: [art] SIG.R = 9E020E218357737480082A44B313562E4E63A5574105CEB2FFAEDBB5AB913364D714698F4E2218706CEAC0A181E6895E
3,450,432 UART: [art] SIG.S = 41BCD66E807F0F9D4DA78BCD368A617A23DC223986E0F9EF228FBF52D7E08ECF1ABEC334C5094A69EE3DA9DBA0CD265F
3,474,325 UART: Caliptra RT
3,474,671 UART: [state] CFI Enabled
3,583,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,796 UART: [rt]cmd =0x43415053, len=4
3,615,043 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,034 ready_for_fw is high
1,363,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,738 >>> mbox cmd response: success
2,926,738 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,988,004 UART:
2,988,020 UART: Running Caliptra FMC ...
2,988,428 UART:
2,988,571 UART: [state] CFI Enabled
2,999,068 UART: [fht] FMC Alias Private Key: 7
3,107,499 UART: [art] Extend RT PCRs Done
3,107,927 UART: [art] Lock RT PCRs Done
3,109,487 UART: [art] Populate DV Done
3,117,440 UART: [fht] FMC Alias Private Key: 7
3,118,514 UART: [art] Derive CDI
3,118,794 UART: [art] Store in in slot 0x4
3,203,881 UART: [art] Derive Key Pair
3,204,241 UART: [art] Store priv key in slot 0x5
3,217,101 UART: [art] Derive Key Pair - Done
3,231,965 UART: [art] Signing Cert with AUTHO
3,232,445 UART: RITY.KEYID = 7
3,248,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,786 UART: [art] PUB.X = 8DED1D9C1BC8805E2E7349DAF31F33E9039B1A03670C88EDCCD03ED10C7C3A03247C4950ABD66364AB5A2BD519344EF8
3,255,555 UART: [art] PUB.Y = 32BE0D8D64F197CDCEE02FF879973623219850CD3BFEB77B72C816C9C693F2D17CDBB028BA52CBC3CACFAC8A680932CA
3,262,521 UART: [art] SIG.R = 0D033C9D08B4300AAA4FFA89CFDCFBACEE35A71EA6737D6E737E1D2D1C41025036E2EAFC7439FE11F7F846556C68F99F
3,269,296 UART: [art] SIG.S = 4C9BE6D574DE1DF63B6E2AFF9C9A4BAEF4BCB9B67C71C192663BC81B00C2C93CE98811AF1A80E84709A63142418B375A
3,292,854 UART: Caliptra RT
3,293,200 UART: [state] CFI Enabled
3,401,703 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,756 UART: [rt]cmd =0x43415053, len=4
3,432,977 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,316 UART: [kat] SHA2-512-ACC
908,217 UART: [kat] ECC-384
917,410 UART: [kat] HMAC-384Kdf
921,850 UART: [kat] LMS
1,170,178 UART: [kat] --
1,171,185 UART: [cold-reset] ++
1,171,643 UART: [fht] FHT @ 0x50003400
1,174,318 UART: [idev] ++
1,174,486 UART: [idev] CDI.KEYID = 6
1,174,846 UART: [idev] SUBJECT.KEYID = 7
1,175,270 UART: [idev] UDS.KEYID = 0
1,175,615 ready_for_fw is high
1,175,615 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,326 UART: [idev] Erasing UDS.KEYID = 0
1,200,351 UART: [idev] Sha1 KeyId Algorithm
1,208,979 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,442 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,773 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,281,866 UART: [fwproc] Recv command 0x46574c44
1,282,594 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,964 >>> mbox cmd response: success
2,772,964 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,774,104 UART: [afmc] ++
2,774,272 UART: [afmc] CDI.KEYID = 6
2,774,634 UART: [afmc] SUBJECT.KEYID = 7
2,775,059 UART: [afmc] AUTHORITY.KEYID = 5
2,810,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,891 UART: [afmc] --
2,853,967 UART: [cold-reset] --
2,854,919 UART: [state] Locking Datavault
2,856,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,694 UART: [state] Locking ICCM
2,857,362 UART: [exit] Launching FMC @ 0x40000130
2,862,691 UART:
2,862,707 UART: Running Caliptra FMC ...
2,863,115 UART:
2,863,169 UART: [state] CFI Enabled
2,873,586 UART: [fht] FMC Alias Private Key: 7
2,981,023 UART: [art] Extend RT PCRs Done
2,981,451 UART: [art] Lock RT PCRs Done
2,982,779 UART: [art] Populate DV Done
2,990,890 UART: [fht] FMC Alias Private Key: 7
2,992,026 UART: [art] Derive CDI
2,992,306 UART: [art] Store in in slot 0x4
3,077,369 UART: [art] Derive Key Pair
3,077,729 UART: [art] Store priv key in slot 0x5
3,090,703 UART: [art] Derive Key Pair - Done
3,105,614 UART: [art] Signing Cert with AUTHO
3,106,094 UART: RITY.KEYID = 7
3,121,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,879 UART: [art] PUB.X = 358AECC83E445BE42F9055DBD91E64118AAE7A5AC607BD06817B878BE50306C7F2837AF4114088C160C8D38ED890D60D
3,128,640 UART: [art] PUB.Y = 13CFA089B79FB9DC2F394FB650A88B6CC4369849ECECD5218D4F3F59F895721227063514C3967383FD6753F1CAE22A20
3,135,589 UART: [art] SIG.R = BDEBF88B0862D65FED141E242B560FE7326D97ED5F907B2978FB5EAD9CF0865519AF4377FDB357C1DAE1E6AEB8614C3A
3,142,373 UART: [art] SIG.S = B62121F3CC0EC9A2051D449AEBDFCF928595B27BF099B6CB872E1EE56E0A11A9D5975E528AE5EB1521C3654DF5E973A1
3,165,861 UART: Caliptra RT
3,166,115 UART: [state] CFI Enabled
3,273,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,279 UART: [rt]cmd =0x43415053, len=4
3,305,554 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,877 ready_for_fw is high
1,060,877 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,521 >>> mbox cmd response: success
2,626,521 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,688,659 UART:
2,688,675 UART: Running Caliptra FMC ...
2,689,083 UART:
2,689,137 UART: [state] CFI Enabled
2,699,564 UART: [fht] FMC Alias Private Key: 7
2,807,133 UART: [art] Extend RT PCRs Done
2,807,561 UART: [art] Lock RT PCRs Done
2,809,133 UART: [art] Populate DV Done
2,817,116 UART: [fht] FMC Alias Private Key: 7
2,818,164 UART: [art] Derive CDI
2,818,444 UART: [art] Store in in slot 0x4
2,904,057 UART: [art] Derive Key Pair
2,904,417 UART: [art] Store priv key in slot 0x5
2,917,527 UART: [art] Derive Key Pair - Done
2,932,390 UART: [art] Signing Cert with AUTHO
2,932,870 UART: RITY.KEYID = 7
2,948,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,783 UART: [art] PUB.X = E735414EB21B29261E970EBEE2352733F29B6144C3B152E1D9748436DF164A9B6266CBD12910FD1AF593177D7C7CCE30
2,955,550 UART: [art] PUB.Y = 1D3FD4BF05B5D873D93227C84AADA6363EAB0E309255970F83471ECAD1739EA5FABA57642A6B2570E934A53D65CBB774
2,962,501 UART: [art] SIG.R = ECB2AE24EA3A504852714363D3C9B4F48DE4B46D51C3012EAD9E2C3015F9FE03D6E5BA7320845D0565B22228F324E63D
2,969,268 UART: [art] SIG.S = 4791CA2685A2F54C9A5A073AA6C39F0F957059B3EB61BC1F41EA0ABCB579AEAA4A5FABE90592BBA446474BFF5176F42D
2,993,657 UART: Caliptra RT
2,993,911 UART: [state] CFI Enabled
3,101,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,798 UART: [rt]cmd =0x43415053, len=4
3,132,833 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
901,788 UART: [kat] SHA2-256
903,728 UART: [kat] SHA2-384
906,365 UART: [kat] SHA2-512-ACC
908,266 UART: [kat] ECC-384
918,159 UART: [kat] HMAC-384Kdf
922,981 UART: [kat] LMS
1,171,309 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,449 UART: [idev] ++
1,175,617 UART: [idev] CDI.KEYID = 6
1,175,977 UART: [idev] SUBJECT.KEYID = 7
1,176,401 UART: [idev] UDS.KEYID = 0
1,176,746 ready_for_fw is high
1,176,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,759 UART: [idev] Erasing UDS.KEYID = 0
1,201,494 UART: [idev] Sha1 KeyId Algorithm
1,209,778 UART: [idev] --
1,210,858 UART: [ldev] ++
1,211,026 UART: [ldev] CDI.KEYID = 6
1,211,389 UART: [ldev] SUBJECT.KEYID = 5
1,211,815 UART: [ldev] AUTHORITY.KEYID = 7
1,212,278 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,776 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,945 UART: [fwproc] Recv command 0x46574c44
1,284,673 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,988 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,931 >>> mbox cmd response: success
2,773,931 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,091 UART: [afmc] ++
2,775,259 UART: [afmc] CDI.KEYID = 6
2,775,621 UART: [afmc] SUBJECT.KEYID = 7
2,776,046 UART: [afmc] AUTHORITY.KEYID = 5
2,811,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,072 UART: [afmc] --
2,855,128 UART: [cold-reset] --
2,855,922 UART: [state] Locking Datavault
2,857,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,741 UART: [state] Locking ICCM
2,858,377 UART: [exit] Launching FMC @ 0x40000130
2,863,706 UART:
2,863,722 UART: Running Caliptra FMC ...
2,864,130 UART:
2,864,273 UART: [state] CFI Enabled
2,875,188 UART: [fht] FMC Alias Private Key: 7
2,983,681 UART: [art] Extend RT PCRs Done
2,984,109 UART: [art] Lock RT PCRs Done
2,985,935 UART: [art] Populate DV Done
2,994,022 UART: [fht] FMC Alias Private Key: 7
2,995,204 UART: [art] Derive CDI
2,995,484 UART: [art] Store in in slot 0x4
3,081,347 UART: [art] Derive Key Pair
3,081,707 UART: [art] Store priv key in slot 0x5
3,094,889 UART: [art] Derive Key Pair - Done
3,109,997 UART: [art] Signing Cert with AUTHO
3,110,477 UART: RITY.KEYID = 7
3,125,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,296 UART: [art] PUB.X = B63BC7EE5AB1C89CE3F6BD4D715B2C58CE08B7FC8C4CDD60CC46DE3A5EE084B28624F06487D6E9642C14860199B47031
3,133,074 UART: [art] PUB.Y = 7AAF0D4E6FB6B7262198D7EFBA0499F4EE7B9A8C3017E26C734219B417BD7FCD7001B564CC12CFA0E715BC731DBBB410
3,140,033 UART: [art] SIG.R = A6CDDB3A788D06EF2DAB6BFA98257E9B1767789160D38A3BDB6C41E74A60F7EFCAEC223EF5D52FCC5BEADD861539C8E1
3,146,828 UART: [art] SIG.S = C42459E17F2C9F9530B0CF8C96233DCF1A144323A683C079E9C0C4D2935E932CD6AD87A735206DBCE7F9EE4C4726122D
3,170,021 UART: Caliptra RT
3,170,367 UART: [state] CFI Enabled
3,278,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,259 UART: [rt]cmd =0x43415053, len=4
3,309,650 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,092 ready_for_fw is high
1,061,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,106 >>> mbox cmd response: success
2,628,106 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,690,134 UART:
2,690,150 UART: Running Caliptra FMC ...
2,690,558 UART:
2,690,701 UART: [state] CFI Enabled
2,700,964 UART: [fht] FMC Alias Private Key: 7
2,809,241 UART: [art] Extend RT PCRs Done
2,809,669 UART: [art] Lock RT PCRs Done
2,811,075 UART: [art] Populate DV Done
2,819,320 UART: [fht] FMC Alias Private Key: 7
2,820,424 UART: [art] Derive CDI
2,820,704 UART: [art] Store in in slot 0x4
2,906,501 UART: [art] Derive Key Pair
2,906,861 UART: [art] Store priv key in slot 0x5
2,919,915 UART: [art] Derive Key Pair - Done
2,934,489 UART: [art] Signing Cert with AUTHO
2,934,969 UART: RITY.KEYID = 7
2,950,287 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,052 UART: [art] PUB.X = 165BB5FE406436F636DF78D5C33FC2F4A423FF0515B945FA08D76000B77E14DF5256C3943C805F0413DECEB1F67347BB
2,957,797 UART: [art] PUB.Y = 6BD03DF7DF7BAD244DC91A91AE9947124D0995ABAACA4D1652D2F33641CF966EE6949CDFFAD8BF14866E98E01F24DBD8
2,964,766 UART: [art] SIG.R = 8FAC595C6DAC498E87EED4A6A2BEA1E6086A241A91620C4F95B9AB7EF7E2DCD506CEB813ACC2ADE349211052400B8902
2,971,539 UART: [art] SIG.S = 874E4487F619D25F8240A6C15A8B9C821D4755BF749F58CF75A9CE6C3BFF27F4BE27DB60E67159A159FB34879C983C81
2,995,164 UART: Caliptra RT
2,995,510 UART: [state] CFI Enabled
3,102,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,170 UART: [rt]cmd =0x43415053, len=4
3,134,569 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,174,041 ready_for_fw is high
1,174,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,178 UART: [ldev] --
1,280,692 UART: [fwproc] Wait for Commands...
1,281,281 UART: [fwproc] Recv command 0x46574c44
1,282,014 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,444 >>> mbox cmd response: success
2,771,444 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,772,551 UART: [afmc] ++
2,772,719 UART: [afmc] CDI.KEYID = 6
2,773,082 UART: [afmc] SUBJECT.KEYID = 7
2,773,508 UART: [afmc] AUTHORITY.KEYID = 5
2,809,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,038 UART: [afmc] --
2,853,114 UART: [cold-reset] --
2,854,218 UART: [state] Locking Datavault
2,855,439 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,043 UART: [state] Locking ICCM
2,856,571 UART: [exit] Launching FMC @ 0x40000130
2,861,900 UART:
2,861,916 UART: Running Caliptra FMC ...
2,862,324 UART:
2,862,378 UART: [state] CFI Enabled
2,872,981 UART: [fht] FMC Alias Private Key: 7
2,981,190 UART: [art] Extend RT PCRs Done
2,981,618 UART: [art] Lock RT PCRs Done
2,982,882 UART: [art] Populate DV Done
2,991,069 UART: [fht] FMC Alias Private Key: 7
2,992,033 UART: [art] Derive CDI
2,992,313 UART: [art] Store in in slot 0x4
3,078,106 UART: [art] Derive Key Pair
3,078,466 UART: [art] Store priv key in slot 0x5
3,091,060 UART: [art] Derive Key Pair - Done
3,106,113 UART: [art] Signing Cert with AUTHO
3,106,593 UART: RITY.KEYID = 7
3,121,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,592 UART: [art] PUB.X = 8C1AF27C31ACF9B8AC703C0BC58980292D6D6B84960ED4F269ED9D6B7D936B317EF5A7DFF7C84DA651A9B5D7C5A94949
3,129,372 UART: [art] PUB.Y = 253A98B5CBD66B4433F3275F728AAB9BEF974564438EE205F9978C013F3AE61493DD55D9BDACA3CB1A167737D2028C81
3,136,319 UART: [art] SIG.R = B8EE53AD062CAA2C29A006B2E01CBEE267676BEE466317A2817C38DAC628073A05FC89CA87BBEA3BB286A7A054EC19C1
3,143,095 UART: [art] SIG.S = E017809808C3F8FBC1BFE642B12B0C65D945D44CD850931405ACBB3B15000D28C2D47A7C0C44EB92B9C04C63E8396EF2
3,166,577 UART: Caliptra RT
3,166,831 UART: [state] CFI Enabled
3,275,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,379 UART: [rt]cmd =0x43415053, len=4
3,306,776 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,844 ready_for_fw is high
1,055,844 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,023 >>> mbox cmd response: success
2,623,023 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,685,611 UART:
2,685,627 UART: Running Caliptra FMC ...
2,686,035 UART:
2,686,089 UART: [state] CFI Enabled
2,696,726 UART: [fht] FMC Alias Private Key: 7
2,804,565 UART: [art] Extend RT PCRs Done
2,804,993 UART: [art] Lock RT PCRs Done
2,806,649 UART: [art] Populate DV Done
2,814,882 UART: [fht] FMC Alias Private Key: 7
2,816,056 UART: [art] Derive CDI
2,816,336 UART: [art] Store in in slot 0x4
2,902,337 UART: [art] Derive Key Pair
2,902,697 UART: [art] Store priv key in slot 0x5
2,916,715 UART: [art] Derive Key Pair - Done
2,932,005 UART: [art] Signing Cert with AUTHO
2,932,485 UART: RITY.KEYID = 7
2,947,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,362 UART: [art] PUB.X = EBD79231DD3A00ACEEBADBD483DDF07B0FCBEC6D126A0C89A163D3A0C192519C8173DB68FC4E52CAD96D7F1233103E6F
2,955,130 UART: [art] PUB.Y = 9A6F842FE0308DDDFFE7110171263F643D2EDE472572F0CF353654F52BC446F2C5CF1EFC4C5DCC2838D8C6F61D679FF4
2,962,091 UART: [art] SIG.R = 797ECC3F00738AD24087C00C74B8269CE5DD82E6DC259E60B81C43AFD8F6570115F221DE510C840D04358B2952BA81D4
2,968,826 UART: [art] SIG.S = FCDC6FF1D4682FFCFF6AF1BD2A7433338C47DF0C6EF86C5076EDA876761481E8E73A455F910637C81EAAEDF6D0ABCA2E
2,992,363 UART: Caliptra RT
2,992,617 UART: [state] CFI Enabled
3,100,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,812 UART: [rt]cmd =0x43415053, len=4
3,132,119 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,097 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,174,520 ready_for_fw is high
1,174,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,131 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,380 UART: [fwproc] Recv command 0x46574c44
1,283,113 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,991 >>> mbox cmd response: success
2,771,991 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,773,086 UART: [afmc] ++
2,773,254 UART: [afmc] CDI.KEYID = 6
2,773,617 UART: [afmc] SUBJECT.KEYID = 7
2,774,043 UART: [afmc] AUTHORITY.KEYID = 5
2,809,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,253 UART: [afmc] --
2,853,147 UART: [cold-reset] --
2,853,759 UART: [state] Locking Datavault
2,855,052 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,656 UART: [state] Locking ICCM
2,856,084 UART: [exit] Launching FMC @ 0x40000130
2,861,413 UART:
2,861,429 UART: Running Caliptra FMC ...
2,861,837 UART:
2,861,980 UART: [state] CFI Enabled
2,872,753 UART: [fht] FMC Alias Private Key: 7
2,980,562 UART: [art] Extend RT PCRs Done
2,980,990 UART: [art] Lock RT PCRs Done
2,982,396 UART: [art] Populate DV Done
2,990,539 UART: [fht] FMC Alias Private Key: 7
2,991,667 UART: [art] Derive CDI
2,991,947 UART: [art] Store in in slot 0x4
3,077,548 UART: [art] Derive Key Pair
3,077,908 UART: [art] Store priv key in slot 0x5
3,092,164 UART: [art] Derive Key Pair - Done
3,106,673 UART: [art] Signing Cert with AUTHO
3,107,153 UART: RITY.KEYID = 7
3,121,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,712 UART: [art] PUB.X = D26F3F217DDEE9E95111CEBC368A557DB5A09BF733370C733FE106DB6C0A8E6FB644365F4BA47A9F9FF59741AB586C36
3,129,487 UART: [art] PUB.Y = 6133B3A39C1F5A197FF1DFED4D1B4125ECA20821BE36FD028CB3930C180F0AEA663846A9308E2399527E51E0EF645065
3,136,426 UART: [art] SIG.R = 4EB587B8E9C041E94A9DCA4C94956E57A58877FAF477C35E591E0849C56FE165F4194C1AB2407898FF491DB7338C6971
3,143,193 UART: [art] SIG.S = 184522E466C89E41711A076C856F6AF5F762669AB3183EAE91EF3467137B97C19E05DAB75C21586004E95DD668D39EDB
3,167,605 UART: Caliptra RT
3,167,951 UART: [state] CFI Enabled
3,275,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,916 UART: [rt]cmd =0x43415053, len=4
3,307,289 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,501 ready_for_fw is high
1,056,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,569 >>> mbox cmd response: success
2,623,569 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,686,307 UART:
2,686,323 UART: Running Caliptra FMC ...
2,686,731 UART:
2,686,874 UART: [state] CFI Enabled
2,697,475 UART: [fht] FMC Alias Private Key: 7
2,806,060 UART: [art] Extend RT PCRs Done
2,806,488 UART: [art] Lock RT PCRs Done
2,808,404 UART: [art] Populate DV Done
2,816,527 UART: [fht] FMC Alias Private Key: 7
2,817,683 UART: [art] Derive CDI
2,817,963 UART: [art] Store in in slot 0x4
2,904,188 UART: [art] Derive Key Pair
2,904,548 UART: [art] Store priv key in slot 0x5
2,918,310 UART: [art] Derive Key Pair - Done
2,932,866 UART: [art] Signing Cert with AUTHO
2,933,346 UART: RITY.KEYID = 7
2,948,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,717 UART: [art] PUB.X = 7D361E40F7A62D212A1D6A153BF986361484FF81BA3E3F5561C9EEA9F45E5ABE2E478DD6EB3746513B5A5C12EEDA624D
2,956,501 UART: [art] PUB.Y = F3C3BA8A04CCC39EB23436F2B6C63593DEDF4D581352BC1FB28D5E31251936EAD064A031559E3A4AB9EF2981FC03D26B
2,963,459 UART: [art] SIG.R = 5CE5571BE830D81F086331F68FA00B6AAEE0B47675FD6FE904DF9EAFFBCCBCCBDD7AC22D7BA772E04C83AFA749A3328B
2,970,250 UART: [art] SIG.S = D1CD2DD048F6B138019F71468743F1DEB2F06F655C13CCE1B74AF10E84CFF39AA170BCCC4B9990F77331FC8E05A77842
2,993,756 UART: Caliptra RT
2,994,102 UART: [state] CFI Enabled
3,102,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,081 UART: [rt]cmd =0x43415053, len=4
3,133,192 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,372,991 UART: [ldev] SUBJECT.KEYID = 5
7,374,246 UART: [ldev] AUTHORITY.KEYID = 7
7,375,467 UART: [ldev] FE.KEYID = 1
7,420,950 UART: [ldev] Erasing FE.KEYID = 1
10,754,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,162 UART: [ldev] --
13,114,180 UART: [fwproc] Waiting for Commands...
13,116,805 UART: [fwproc] Received command 0x46574c44
13,119,030 UART: [fwproc] Received Image of size 114036 bytes
17,167,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,203 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,626,904 >>> mbox cmd response: success
17,627,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,630,548 UART: [afmc] ++
17,631,119 UART: [afmc] CDI.KEYID = 6
17,632,078 UART: [afmc] SUBJECT.KEYID = 7
17,633,289 UART: [afmc] AUTHORITY.KEYID = 5
20,988,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,645 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,304,239 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,319,012 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,333,536 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,355,270 UART: [afmc] --
23,359,882 UART: [cold-reset] --
23,363,788 UART: [state] Locking Datavault
23,370,428 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,178 UART: [state] Locking ICCM
23,374,912 UART: [exit] Launching FMC @ 0x40000130
23,383,300 UART:
23,383,526 UART: Running Caliptra FMC ...
23,384,617 UART:
23,384,767 UART: [state] CFI Enabled
23,447,407 UART: [fht] FMC Alias Private Key: 7
25,784,988 UART: [art] Extend RT PCRs Done
25,786,210 UART: [art] Lock RT PCRs Done
25,787,683 UART: [art] Populate DV Done
25,792,872 UART: [fht] FMC Alias Private Key: 7
25,794,514 UART: [art] Derive CDI
25,795,322 UART: [art] Store in in slot 0x4
25,856,142 UART: [art] Derive Key Pair
25,857,174 UART: [art] Store priv key in slot 0x5
29,150,245 UART: [art] Derive Key Pair - Done
29,163,190 UART: [art] Signing Cert with AUTHO
29,164,492 UART: RITY.KEYID = 7
31,451,106 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,628 UART: [art] PUB.X = A08C3A256817E8423EF18137B39F94A31D49E8F81A71FCF164B309BB1274E257C233B5963E3FF5DAE255C68450441A98
31,459,859 UART: [art] PUB.Y = 6F3477EB6F2DFF473A8B3F5A0CD01C4950BBEFEACD7C5CA00E52FFE88A744C278B6739A8ED00017250608AD825DDD7CF
31,467,082 UART: [art] SIG.R = 48B79AFE4E226ECF759C72393B7E4DABFED2F4D67A804E2A3A37422536FAEB552EE9AD29628811022CE3F9EBE5E1E075
31,474,516 UART: [art] SIG.S = 071DAE01071793F02103B3195993B03BCE7987F2B7C93F7DAC85C562A33D5EC4B9587C7E56FD7F19BE0D5B5E2DBD6007
32,779,386 UART: Caliptra RT
32,780,093 UART: [state] CFI Enabled
32,941,491 UART: [rt] RT listening for mailbox commands...
32,972,695 UART: [rt]cmd =0x494e464f, len=4
32,976,750 >>> mbox cmd response data (264 bytes)
35,037,010 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,181,964 UART:
35,182,342 UART: Running Caliptra ROM ...
35,183,382 UART:
35,183,526 UART: [state] CFI Enabled
35,251,815 UART: [state] LifecycleState = Unprovisioned
35,253,773 UART: [state] DebugLocked = No
35,255,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,259,774 UART: [kat] SHA2-256
35,429,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,439,957 UART: [kat] ++
35,440,434 UART: [kat] sha1
35,451,905 UART: [kat] SHA2-256
35,454,645 UART: [kat] SHA2-384
35,460,081 UART: [kat] SHA2-512-ACC
35,462,430 UART: [kat] ECC-384
37,748,967 UART: [kat] HMAC-384Kdf
37,761,210 UART: [kat] LMS
38,951,540 UART: [kat] --
38,955,922 UART: [update-reset] ++
43,096,403 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,099,579 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
43,481,499 >>> mbox cmd response: success
43,483,069 UART: [update-reset] Copying MAN_2 To MAN_1
43,505,454 UART: [update-reset Success] --
43,509,886 UART: [state] Locking Datavault
43,514,707 UART: [state] Locking PCR0, PCR1 and PCR31
43,516,453 UART: [state] Locking ICCM
43,517,518 UART: [exit] Launching FMC @ 0x40000130
43,525,958 UART:
43,526,182 UART: Running Caliptra FMC ...
43,527,274 UART:
43,527,420 UART: [state] CFI Enabled
43,618,029 UART: [art] Extend RT PCRs Done
43,619,249 UART: [art] Lock RT PCRs Done
43,620,842 UART: [art] Populate DV Done
43,626,138 UART: [fht] FMC Alias Private Key: 7
43,627,679 UART: [art] Derive CDI
43,628,458 UART: [art] Store in in slot 0x4
43,686,866 UART: [art] Derive Key Pair
43,687,904 UART: [art] Store priv key in slot 0x5
46,980,785 UART: [art] Derive Key Pair - Done
46,993,726 UART: [art] Signing Cert with AUTHO
46,995,018 UART: RITY.KEYID = 7
49,282,191 UART: [art] Erasing AUTHORITY.KEYID = 7
49,283,690 UART: [art] PUB.X = 0AFDA482C485156ABA65AE9D101C3C1F1663F7B32F0740404ABA2AE23B81E5912642C27FAF814D9DC63B402259FEE084
49,290,948 UART: [art] PUB.Y = 3267E1762E9DE541C3B2DB5C84D3E0DFC2C06D108BAD3ED722B66FE375B9C9DDF1143D1F3931D4BA6140FB64A06613B2
49,298,166 UART: [art] SIG.R = E9603833777D1D5195EBC131ADD9C21B14A05CFCEAE98DFEB86B5C1D3DDD538CB7BE1DE52A3BE3FAD4626C8CA1644FC8
49,305,583 UART: [art] SIG.S = 865921538957FA75D990544224B3F7985A2F4923F97BFD98E40CFD6F1AB8DCAA2CBB4066B182C51072565272F2E5CDCC
50,610,787 UART: Caliptra RT
50,611,485 UART: [state] CFI Enabled
50,941,205 UART: [rt] RT listening for mailbox commands...
50,943,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,972,776 UART: [rt]cmd =0x494e464f, len=4
50,976,684 >>> mbox cmd response data (264 bytes)
53,032,799 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
53,178,194 UART:
53,178,592 UART: Running Caliptra ROM ...
53,179,686 UART:
53,179,844 UART: [state] CFI Enabled
53,247,429 UART: [state] LifecycleState = Unprovisioned
53,249,383 UART: [state] DebugLocked = No
53,251,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,255,508 UART: [kat] SHA2-256
53,425,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,435,716 UART: [kat] ++
53,436,187 UART: [kat] sha1
53,447,285 UART: [kat] SHA2-256
53,449,978 UART: [kat] SHA2-384
53,456,119 UART: [kat] SHA2-512-ACC
53,458,517 UART: [kat] ECC-384
55,753,379 UART: [kat] HMAC-384Kdf
55,784,719 UART: [kat] LMS
56,975,049 UART: [kat] --
56,979,252 UART: [update-reset] ++
61,119,349 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,123,818 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
61,505,767 >>> mbox cmd response: success
61,507,138 UART: [update-reset] Copying MAN_2 To MAN_1
61,529,526 UART: [update-reset Success] --
61,535,694 UART: [state] Locking Datavault
61,538,296 UART: [state] Locking PCR0, PCR1 and PCR31
61,540,060 UART: [state] Locking ICCM
61,542,778 UART: [exit] Launching FMC @ 0x40000130
61,551,219 UART:
61,551,447 UART: Running Caliptra FMC ...
61,552,537 UART:
61,552,685 UART: [state] CFI Enabled
61,643,114 UART: [art] Extend RT PCRs Done
61,644,298 UART: [art] Lock RT PCRs Done
61,645,372 UART: [art] Populate DV Done
61,650,562 UART: [fht] FMC Alias Private Key: 7
61,652,239 UART: [art] Derive CDI
61,653,057 UART: [art] Store in in slot 0x4
61,712,254 UART: [art] Derive Key Pair
61,713,249 UART: [art] Store priv key in slot 0x5
65,005,996 UART: [art] Derive Key Pair - Done
65,018,951 UART: [art] Signing Cert with AUTHO
65,020,310 UART: RITY.KEYID = 7
67,308,179 UART: [art] Erasing AUTHORITY.KEYID = 7
67,309,690 UART: [art] PUB.X = 78022BEEEE9C4CF9586DBD5D4F4717E2B310C932B1C9CC02C8A3392D74CB34C3F63894789C4C2C20797D68F710BE709C
67,316,914 UART: [art] PUB.Y = 5C048BED2E0EE1EDC2EBE142E65AF9DF5CA17D0F5D852EBCEC043C8AEDC904D9208D1AA6CACA7893E1AD764CBE5E7F6F
67,324,228 UART: [art] SIG.R = DA5989469C0D38058C07379D2F5EC63EB789CE9BD766BE1DF07D9928E9BC1A5C7A10E37D905FCD7B1AE9D3A868655DC9
67,331,621 UART: [art] SIG.S = 9A9C91548244E5AB7F14A330297704DBAAC08FFA0B0DAB7081823B718364BD277E8F637DC29EA34A6F51498AF852C282
68,637,472 UART: Caliptra RT
68,638,181 UART: [state] CFI Enabled
68,973,888 UART: [rt] RT listening for mailbox commands...
68,975,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,005,346 UART: [rt]cmd =0x494e464f, len=4
69,009,244 >>> mbox cmd response data (264 bytes)
69,010,949 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
69,155,045 UART:
69,155,341 UART: Running Caliptra ROM ...
69,156,367 UART:
69,156,531 UART: [state] CFI Enabled
69,228,793 UART: [state] LifecycleState = Unprovisioned
69,230,716 UART: [state] DebugLocked = No
69,232,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,236,850 UART: [kat] SHA2-256
69,406,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,417,088 UART: [kat] ++
69,417,541 UART: [kat] sha1
69,427,712 UART: [kat] SHA2-256
69,430,394 UART: [kat] SHA2-384
69,435,940 UART: [kat] SHA2-512-ACC
69,438,333 UART: [kat] ECC-384
71,729,668 UART: [kat] HMAC-384Kdf
71,742,104 UART: [kat] LMS
72,932,467 UART: [kat] --
72,937,606 UART: [update-reset] ++
77,076,548 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,079,404 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
77,461,299 >>> mbox cmd response: success
77,462,648 UART: [update-reset] Copying MAN_2 To MAN_1
77,485,084 UART: [update-reset Success] --
77,488,541 UART: [state] Locking Datavault
77,491,443 UART: [state] Locking PCR0, PCR1 and PCR31
77,493,144 UART: [state] Locking ICCM
77,494,857 UART: [exit] Launching FMC @ 0x40000130
77,503,242 UART:
77,503,470 UART: Running Caliptra FMC ...
77,504,563 UART:
77,504,711 UART: [state] CFI Enabled
77,600,536 UART: [art] Extend RT PCRs Done
77,601,712 UART: [art] Lock RT PCRs Done
77,603,160 UART: [art] Populate DV Done
77,608,791 UART: [fht] FMC Alias Private Key: 7
77,610,317 UART: [art] Derive CDI
77,611,071 UART: [art] Store in in slot 0x4
77,669,403 UART: [art] Derive Key Pair
77,670,435 UART: [art] Store priv key in slot 0x5
80,963,261 UART: [art] Derive Key Pair - Done
80,975,931 UART: [art] Signing Cert with AUTHO
80,977,243 UART: RITY.KEYID = 7
83,265,477 UART: [art] Erasing AUTHORITY.KEYID = 7
83,266,984 UART: [art] PUB.X = 0AFDA482C485156ABA65AE9D101C3C1F1663F7B32F0740404ABA2AE23B81E5912642C27FAF814D9DC63B402259FEE084
83,274,213 UART: [art] PUB.Y = 3267E1762E9DE541C3B2DB5C84D3E0DFC2C06D108BAD3ED722B66FE375B9C9DDF1143D1F3931D4BA6140FB64A06613B2
83,281,473 UART: [art] SIG.R = E9603833777D1D5195EBC131ADD9C21B14A05CFCEAE98DFEB86B5C1D3DDD538CB7BE1DE52A3BE3FAD4626C8CA1644FC8
83,288,884 UART: [art] SIG.S = 865921538957FA75D990544224B3F7985A2F4923F97BFD98E40CFD6F1AB8DCAA2CBB4066B182C51072565272F2E5CDCC
84,594,512 UART: Caliptra RT
84,595,225 UART: [state] CFI Enabled
84,930,082 UART: [rt] RT listening for mailbox commands...
84,931,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,961,872 UART: [rt]cmd =0x494e464f, len=4
84,965,976 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,783,244 ready_for_fw is high
3,783,622 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,847,476 >>> mbox cmd response: success
17,849,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,544,280 UART:
23,544,691 UART: Running Caliptra FMC ...
23,545,802 UART:
23,545,959 UART: [state] CFI Enabled
23,615,761 UART: [fht] FMC Alias Private Key: 7
25,953,364 UART: [art] Extend RT PCRs Done
25,954,614 UART: [art] Lock RT PCRs Done
25,956,153 UART: [art] Populate DV Done
25,961,399 UART: [fht] FMC Alias Private Key: 7
25,963,038 UART: [art] Derive CDI
25,963,847 UART: [art] Store in in slot 0x4
26,024,175 UART: [art] Derive Key Pair
26,025,215 UART: [art] Store priv key in slot 0x5
29,317,945 UART: [art] Derive Key Pair - Done
29,331,285 UART: [art] Signing Cert with AUTHO
29,332,587 UART: RITY.KEYID = 7
31,618,812 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,317 UART: [art] PUB.X = 164CFC5A954FB96A771DD21C0B884CEE71EED647A9ADFE67BE5B5814538A9F5632F0A34874D1CC9E7CEF8D37EC19B028
31,627,553 UART: [art] PUB.Y = 5A0B13CA1B00BAC003BA5F2D6804073FF2C507C482721279D53EC21FCEAD831576CBF2B2A8B92FAC23B47FD6F2BF5DDC
31,634,832 UART: [art] SIG.R = 9D276DB892C5E154AE83A1FB385C0451D09B6D1B0BD1849D92544BD1F2DC671C49C3D882A04A70B4FA6DB56D744D243E
31,642,205 UART: [art] SIG.S = 1C2A3C2A4C8A8DE38A6527FCBB3A8EAC30DACE501581CFF75DC2804EF392FC0411D20C37952BB0ADFFA481CC01965208
32,947,152 UART: Caliptra RT
32,947,858 UART: [state] CFI Enabled
33,109,048 UART: [rt] RT listening for mailbox commands...
33,140,244 UART: [rt]cmd =0x494e464f, len=4
33,144,187 >>> mbox cmd response data (264 bytes)
35,203,922 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,946,476 >>> mbox cmd response: success
43,981,033 UART:
43,981,377 UART: Running Caliptra FMC ...
43,982,417 UART:
43,982,563 UART: [state] CFI Enabled
44,087,170 UART: [art] Extend RT PCRs Done
44,088,362 UART: [art] Lock RT PCRs Done
44,089,761 UART: [art] Populate DV Done
44,095,388 UART: [fht] FMC Alias Private Key: 7
44,096,866 UART: [art] Derive CDI
44,097,597 UART: [art] Store in in slot 0x4
44,156,304 UART: [art] Derive Key Pair
44,157,388 UART: [art] Store priv key in slot 0x5
47,450,194 UART: [art] Derive Key Pair - Done
47,463,078 UART: [art] Signing Cert with AUTHO
47,464,385 UART: RITY.KEYID = 7
49,752,073 UART: [art] Erasing AUTHORITY.KEYID = 7
49,753,589 UART: [art] PUB.X = 75BB2ECA7B1DC3C5793A8DF939F591A85784552358FB09E20CB21E23332F8A9A4B7AF667B9F0AC01384A91CE01EB7BBA
49,760,802 UART: [art] PUB.Y = BB9DEE5A8C3CA33B5CDC87E151B271AC19CDFA69728E5E0FC31064C399B08338B304CA856C755EFE3EF0CB9704B0280D
49,768,079 UART: [art] SIG.R = 0DAA558AE59C145FA5FE22DC06D5A8D0966EFC9E219943CFF51127110DDD5CB3F9A3E37A9276106AB9A9AA4A81A8B141
49,775,446 UART: [art] SIG.S = 0540403C84821B2C312F01AF496599C30869F59E2924D56B27B471E622490C552346F5F39A24DC6BC6E9544DF6C03497
51,080,976 UART: Caliptra RT
51,081,690 UART: [state] CFI Enabled
51,417,632 UART: [rt] RT listening for mailbox commands...
51,419,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,449,213 UART: [rt]cmd =0x494e464f, len=4
51,452,997 >>> mbox cmd response data (264 bytes)
53,509,477 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
62,242,311 >>> mbox cmd response: success
62,276,158 UART:
62,276,460 UART: Running Caliptra FMC ...
62,277,496 UART:
62,277,638 UART: [state] CFI Enabled
62,369,537 UART: [art] Extend RT PCRs Done
62,370,730 UART: [art] Lock RT PCRs Done
62,372,156 UART: [art] Populate DV Done
62,377,890 UART: [fht] FMC Alias Private Key: 7
62,379,463 UART: [art] Derive CDI
62,380,196 UART: [art] Store in in slot 0x4
62,438,858 UART: [art] Derive Key Pair
62,439,860 UART: [art] Store priv key in slot 0x5
65,732,544 UART: [art] Derive Key Pair - Done
65,745,844 UART: [art] Signing Cert with AUTHO
65,747,183 UART: RITY.KEYID = 7
68,034,604 UART: [art] Erasing AUTHORITY.KEYID = 7
68,036,111 UART: [art] PUB.X = 35C9D857A04A87A44C6CC35B6299BE02BFACF08B7E8677028A5614031FAB92288F776940FC8487F2DB6B1B7F0D3B38D7
68,043,342 UART: [art] PUB.Y = 38BF1EA9D8617C1285219E7DD00EBD402242DA0911DEA0BA8FF913738D39CBA004B94798B1BBE96C8C84180454F63B10
68,050,593 UART: [art] SIG.R = 4CD5F02237144B8DBE03F2894EAC0C3AC25CA943EA315BB8FA0A00B0812ADD0AD48BE31F7344CDD1B1BDDB038471C28D
68,058,055 UART: [art] SIG.S = 7AE2A2BD0B5F2B111A62AD60964E72D5C21DB1FD4DDEE6B0C0F85202DF9C0B9BBEDA25974347EC433C8DAB800103329D
69,362,947 UART: Caliptra RT
69,363,656 UART: [state] CFI Enabled
69,694,892 UART: [rt] RT listening for mailbox commands...
69,696,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,726,576 UART: [rt]cmd =0x494e464f, len=4
69,730,628 >>> mbox cmd response data (264 bytes)
69,732,323 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
78,463,488 >>> mbox cmd response: success
78,496,953 UART:
78,497,226 UART: Running Caliptra FMC ...
78,498,333 UART:
78,498,489 UART: [state] CFI Enabled
78,603,253 UART: [art] Extend RT PCRs Done
78,604,441 UART: [art] Lock RT PCRs Done
78,606,054 UART: [art] Populate DV Done
78,611,620 UART: [fht] FMC Alias Private Key: 7
78,613,092 UART: [art] Derive CDI
78,613,851 UART: [art] Store in in slot 0x4
78,672,329 UART: [art] Derive Key Pair
78,673,334 UART: [art] Store priv key in slot 0x5
81,965,969 UART: [art] Derive Key Pair - Done
81,978,857 UART: [art] Signing Cert with AUTHO
81,980,196 UART: RITY.KEYID = 7
84,267,612 UART: [art] Erasing AUTHORITY.KEYID = 7
84,269,140 UART: [art] PUB.X = 75BB2ECA7B1DC3C5793A8DF939F591A85784552358FB09E20CB21E23332F8A9A4B7AF667B9F0AC01384A91CE01EB7BBA
84,276,361 UART: [art] PUB.Y = BB9DEE5A8C3CA33B5CDC87E151B271AC19CDFA69728E5E0FC31064C399B08338B304CA856C755EFE3EF0CB9704B0280D
84,283,621 UART: [art] SIG.R = 0DAA558AE59C145FA5FE22DC06D5A8D0966EFC9E219943CFF51127110DDD5CB3F9A3E37A9276106AB9A9AA4A81A8B141
84,290,987 UART: [art] SIG.S = 0540403C84821B2C312F01AF496599C30869F59E2924D56B27B471E622490C552346F5F39A24DC6BC6E9544DF6C03497
85,595,751 UART: Caliptra RT
85,596,440 UART: [state] CFI Enabled
85,930,880 UART: [rt] RT listening for mailbox commands...
85,932,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,962,404 UART: [rt]cmd =0x494e464f, len=4
85,966,404 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.41s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,653,503 UART: [ldev] SUBJECT.KEYID = 5
7,654,713 UART: [ldev] AUTHORITY.KEYID = 7
7,655,993 UART: [ldev] FE.KEYID = 1
7,669,403 UART: [ldev] Erasing FE.KEYID = 1
10,956,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,453 UART: [ldev] --
13,317,225 UART: [fwproc] Waiting for Commands...
13,318,879 UART: [fwproc] Received command 0x46574c44
13,321,114 UART: [fwproc] Received Image of size 114036 bytes
17,368,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,826,921 >>> mbox cmd response: success
17,828,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,830,796 UART: [afmc] ++
17,831,379 UART: [afmc] CDI.KEYID = 6
17,832,343 UART: [afmc] SUBJECT.KEYID = 7
17,833,551 UART: [afmc] AUTHORITY.KEYID = 5
21,148,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,996 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,458,505 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,473,312 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,487,791 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,510,036 UART: [afmc] --
23,514,152 UART: [cold-reset] --
23,518,396 UART: [state] Locking Datavault
23,524,782 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,479 UART: [state] Locking ICCM
23,528,226 UART: [exit] Launching FMC @ 0x40000130
23,536,614 UART:
23,536,844 UART: Running Caliptra FMC ...
23,537,868 UART:
23,538,014 UART: [state] CFI Enabled
23,546,081 UART: [fht] FMC Alias Private Key: 7
25,877,206 UART: [art] Extend RT PCRs Done
25,878,429 UART: [art] Lock RT PCRs Done
25,880,077 UART: [art] Populate DV Done
25,885,379 UART: [fht] FMC Alias Private Key: 7
25,887,022 UART: [art] Derive CDI
25,887,835 UART: [art] Store in in slot 0x4
25,930,439 UART: [art] Derive Key Pair
25,931,481 UART: [art] Store priv key in slot 0x5
29,173,033 UART: [art] Derive Key Pair - Done
29,185,862 UART: [art] Signing Cert with AUTHO
29,187,162 UART: RITY.KEYID = 7
31,466,503 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,004 UART: [art] PUB.X = C35491905E29F11D164849C5AAE5D6B4FD27D93F2846A0885F71F323F5C03F49C675D4EFA24E309BA8492BEABEE445C4
31,475,255 UART: [art] PUB.Y = 3C4EBC5A73568460DDF6194FD05E14B204776B69761C0986D51878024FF0688E10970656D1E5739BB8956E178A9BF323
31,482,478 UART: [art] SIG.R = 9746E3A4661DFDA78504ACB2F1F789CF1136724D57384F56E7D449E87BA335F9DE70BC0AA8D9C062BB4514F7AE63EE51
31,489,894 UART: [art] SIG.S = 1CCC5801DDAE0C0B466A2D9AA9ED6BA4936F8A7E82289D828567413A1E5C496121E2F1B76F78D971F5BB2DAF769A3D80
32,794,805 UART: Caliptra RT
32,795,520 UART: [state] CFI Enabled
32,911,550 UART: [rt] RT listening for mailbox commands...
32,942,581 UART: [rt]cmd =0x494e464f, len=4
32,946,800 >>> mbox cmd response data (264 bytes)
35,005,668 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,150,564 UART:
35,150,963 UART: Running Caliptra ROM ...
35,152,039 UART:
35,152,193 UART: [state] CFI Enabled
35,169,386 UART: [state] LifecycleState = Unprovisioned
35,171,283 UART: [state] DebugLocked = No
35,172,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,176,785 UART: [kat] SHA2-256
35,346,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,357,065 UART: [kat] ++
35,357,527 UART: [kat] sha1
35,367,436 UART: [kat] SHA2-256
35,370,138 UART: [kat] SHA2-384
35,375,371 UART: [kat] SHA2-512-ACC
35,377,716 UART: [kat] ECC-384
37,661,765 UART: [kat] HMAC-384Kdf
37,673,669 UART: [kat] LMS
38,863,697 UART: [kat] --
38,868,166 UART: [update-reset] ++
43,004,101 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,008,477 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
43,390,444 >>> mbox cmd response: success
43,391,056 UART: [update-reset] Copying MAN_2 To MAN_1
43,413,495 UART: [update-reset Success] --
43,417,345 UART: [state] Locking Datavault
43,421,784 UART: [state] Locking PCR0, PCR1 and PCR31
43,423,534 UART: [state] Locking ICCM
43,425,089 UART: [exit] Launching FMC @ 0x40000130
43,433,490 UART:
43,433,764 UART: Running Caliptra FMC ...
43,434,873 UART:
43,435,031 UART: [state] CFI Enabled
43,478,828 UART: [art] Extend RT PCRs Done
43,479,970 UART: [art] Lock RT PCRs Done
43,481,219 UART: [art] Populate DV Done
43,486,676 UART: [fht] FMC Alias Private Key: 7
43,488,335 UART: [art] Derive CDI
43,489,154 UART: [art] Store in in slot 0x4
43,531,641 UART: [art] Derive Key Pair
43,532,678 UART: [art] Store priv key in slot 0x5
46,774,400 UART: [art] Derive Key Pair - Done
46,787,236 UART: [art] Signing Cert with AUTHO
46,788,724 UART: RITY.KEYID = 7
49,068,339 UART: [art] Erasing AUTHORITY.KEYID = 7
49,069,847 UART: [art] PUB.X = F9BC1BA20516469D172C8FC77C18F818B8F117C18453E1A125511FBE5926FDE08DF950A86705DF9565469B2B20ACD28C
49,077,126 UART: [art] PUB.Y = AF2245C0E6AFE3445F1ABA2669A8A2A8026B82D2F2B34E12787F6D7D2DBF25F3D1750B82D3A80D527AF3C0AAB7CE904D
49,084,392 UART: [art] SIG.R = 3E81772416C9923ED92EEDF475E5E33BC5C9A32580729FACF19EC7F272D7A1859D91965CAB856A0E0BB374A50BF5C27E
49,091,762 UART: [art] SIG.S = CD0F369DE03792166728AB3064C7B4C335A52CA920A9CB557373A3983A01DDF003FCCDA85CC894E137F47A857C84D9E2
50,397,406 UART: Caliptra RT
50,398,108 UART: [state] CFI Enabled
50,687,111 UART: [rt] RT listening for mailbox commands...
50,688,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,718,671 UART: [rt]cmd =0x494e464f, len=4
50,722,397 >>> mbox cmd response data (264 bytes)
52,777,794 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
52,922,800 UART:
52,923,167 UART: Running Caliptra ROM ...
52,924,293 UART:
52,924,466 UART: [state] CFI Enabled
52,940,786 UART: [state] LifecycleState = Unprovisioned
52,942,681 UART: [state] DebugLocked = No
52,944,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,948,875 UART: [kat] SHA2-256
53,118,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,129,120 UART: [kat] ++
53,129,574 UART: [kat] sha1
53,139,758 UART: [kat] SHA2-256
53,142,443 UART: [kat] SHA2-384
53,147,618 UART: [kat] SHA2-512-ACC
53,149,961 UART: [kat] ECC-384
55,432,421 UART: [kat] HMAC-384Kdf
55,442,792 UART: [kat] LMS
56,632,820 UART: [kat] --
56,637,614 UART: [update-reset] ++
60,774,971 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,779,036 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
61,161,020 >>> mbox cmd response: success
61,161,563 UART: [update-reset] Copying MAN_2 To MAN_1
61,183,969 UART: [update-reset Success] --
61,189,831 UART: [state] Locking Datavault
61,193,119 UART: [state] Locking PCR0, PCR1 and PCR31
61,194,823 UART: [state] Locking ICCM
61,197,269 UART: [exit] Launching FMC @ 0x40000130
61,205,657 UART:
61,205,897 UART: Running Caliptra FMC ...
61,206,930 UART:
61,207,077 UART: [state] CFI Enabled
61,251,416 UART: [art] Extend RT PCRs Done
61,252,555 UART: [art] Lock RT PCRs Done
61,254,029 UART: [art] Populate DV Done
61,259,375 UART: [fht] FMC Alias Private Key: 7
61,260,907 UART: [art] Derive CDI
61,261,637 UART: [art] Store in in slot 0x4
61,304,070 UART: [art] Derive Key Pair
61,305,129 UART: [art] Store priv key in slot 0x5
64,546,702 UART: [art] Derive Key Pair - Done
64,560,115 UART: [art] Signing Cert with AUTHO
64,561,430 UART: RITY.KEYID = 7
66,841,039 UART: [art] Erasing AUTHORITY.KEYID = 7
66,842,551 UART: [art] PUB.X = DA60E632D47BD867CA3808BE735088694C87E2C2C7FEA6D1D38BAAA1B9B931EB9E756B626852A508B0D7C016B864A56D
66,849,784 UART: [art] PUB.Y = 382323A7C83CF6CBAB241E20BD7C6AE2FAB5AAC3706C4136113292690F6503F46574F6B902D1F4B99A08F3D77A49254B
66,857,038 UART: [art] SIG.R = DEE6EFD692B6BA209B629E535EB85B26609CED3C4EF72680AEC046D0F4EFD68A199B0AB7823D651F90665F8000A2C390
66,864,400 UART: [art] SIG.S = 75D09919ADD7533F3F311DD2210D8EEBFC82F1D3B9339BD834EDF619BD746EE485E4F8A0DBCA18B7A0D3937CD9850706
68,169,748 UART: Caliptra RT
68,170,463 UART: [state] CFI Enabled
68,458,653 UART: [rt] RT listening for mailbox commands...
68,460,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,490,403 UART: [rt]cmd =0x494e464f, len=4
68,494,336 >>> mbox cmd response data (264 bytes)
68,496,022 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
68,640,530 UART:
68,640,834 UART: Running Caliptra ROM ...
68,641,950 UART:
68,642,166 UART: [state] CFI Enabled
68,658,485 UART: [state] LifecycleState = Unprovisioned
68,660,371 UART: [state] DebugLocked = No
68,662,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,668,421 UART: [kat] SHA2-256
68,838,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,848,659 UART: [kat] ++
68,849,195 UART: [kat] sha1
68,859,923 UART: [kat] SHA2-256
68,862,612 UART: [kat] SHA2-384
68,867,830 UART: [kat] SHA2-512-ACC
68,870,217 UART: [kat] ECC-384
71,155,371 UART: [kat] HMAC-384Kdf
71,168,422 UART: [kat] LMS
72,358,505 UART: [kat] --
72,363,814 UART: [update-reset] ++
76,505,119 UART: [update-reset] Image verified using Vendor ECC Key Index 0
76,508,200 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
76,890,136 >>> mbox cmd response: success
76,891,055 UART: [update-reset] Copying MAN_2 To MAN_1
76,913,447 UART: [update-reset Success] --
76,916,814 UART: [state] Locking Datavault
76,920,380 UART: [state] Locking PCR0, PCR1 and PCR31
76,922,133 UART: [state] Locking ICCM
76,924,225 UART: [exit] Launching FMC @ 0x40000130
76,932,673 UART:
76,932,916 UART: Running Caliptra FMC ...
76,934,014 UART:
76,934,173 UART: [state] CFI Enabled
76,978,536 UART: [art] Extend RT PCRs Done
76,979,721 UART: [art] Lock RT PCRs Done
76,981,069 UART: [art] Populate DV Done
76,986,530 UART: [fht] FMC Alias Private Key: 7
76,988,282 UART: [art] Derive CDI
76,989,092 UART: [art] Store in in slot 0x4
77,031,564 UART: [art] Derive Key Pair
77,032,616 UART: [art] Store priv key in slot 0x5
80,274,688 UART: [art] Derive Key Pair - Done
80,287,780 UART: [art] Signing Cert with AUTHO
80,289,085 UART: RITY.KEYID = 7
82,568,651 UART: [art] Erasing AUTHORITY.KEYID = 7
82,570,157 UART: [art] PUB.X = F9BC1BA20516469D172C8FC77C18F818B8F117C18453E1A125511FBE5926FDE08DF950A86705DF9565469B2B20ACD28C
82,577,395 UART: [art] PUB.Y = AF2245C0E6AFE3445F1ABA2669A8A2A8026B82D2F2B34E12787F6D7D2DBF25F3D1750B82D3A80D527AF3C0AAB7CE904D
82,584,699 UART: [art] SIG.R = 3E81772416C9923ED92EEDF475E5E33BC5C9A32580729FACF19EC7F272D7A1859D91965CAB856A0E0BB374A50BF5C27E
82,592,063 UART: [art] SIG.S = CD0F369DE03792166728AB3064C7B4C335A52CA920A9CB557373A3983A01DDF003FCCDA85CC894E137F47A857C84D9E2
83,897,742 UART: Caliptra RT
83,898,457 UART: [state] CFI Enabled
84,187,801 UART: [rt] RT listening for mailbox commands...
84,189,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,219,375 UART: [rt]cmd =0x494e464f, len=4
84,223,221 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,125,634 ready_for_fw is high
4,126,057 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,070,569 >>> mbox cmd response: success
18,071,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,707,365 UART:
23,707,754 UART: Running Caliptra FMC ...
23,708,941 UART:
23,709,110 UART: [state] CFI Enabled
23,716,852 UART: [fht] FMC Alias Private Key: 7
26,047,606 UART: [art] Extend RT PCRs Done
26,048,853 UART: [art] Lock RT PCRs Done
26,050,277 UART: [art] Populate DV Done
26,055,809 UART: [fht] FMC Alias Private Key: 7
26,057,350 UART: [art] Derive CDI
26,058,116 UART: [art] Store in in slot 0x4
26,100,603 UART: [art] Derive Key Pair
26,101,608 UART: [art] Store priv key in slot 0x5
29,343,682 UART: [art] Derive Key Pair - Done
29,356,687 UART: [art] Signing Cert with AUTHO
29,357,995 UART: RITY.KEYID = 7
31,637,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,165 UART: [art] PUB.X = 19F425DD01D92F852FBB68EB1D0A9DE451327F7BCA7F6E9F02B3549670A23A53806CBF1344136245C4AA74DB771678EB
31,646,431 UART: [art] PUB.Y = 09EE6EDF4497518A80090C0BD758DB6F2226CE1B35434CAD5570A8A8ED980B190E2363102C0E08DB96201A1432CD8D0B
31,653,697 UART: [art] SIG.R = 5DF999B558D14BF4B895C6E5AA995F2CF8782A8762463836653E1E106B34EBE8FCED0A2DC1AF284735461051127A9166
31,661,061 UART: [art] SIG.S = 1FBE61788C2F5AAAECA903FF03F026134268BDA4971EAEED25E993A852FC124A8965229449D080B90F8BA66EFB67EAB1
32,965,888 UART: Caliptra RT
32,966,622 UART: [state] CFI Enabled
33,083,925 UART: [rt] RT listening for mailbox commands...
33,114,971 UART: [rt]cmd =0x494e464f, len=4
33,118,927 >>> mbox cmd response data (264 bytes)
35,178,655 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,830,091 >>> mbox cmd response: success
43,864,244 UART:
43,864,536 UART: Running Caliptra FMC ...
43,865,570 UART:
43,865,740 UART: [state] CFI Enabled
43,909,902 UART: [art] Extend RT PCRs Done
43,911,096 UART: [art] Lock RT PCRs Done
43,912,543 UART: [art] Populate DV Done
43,918,124 UART: [fht] FMC Alias Private Key: 7
43,919,658 UART: [art] Derive CDI
43,920,395 UART: [art] Store in in slot 0x4
43,962,995 UART: [art] Derive Key Pair
43,964,036 UART: [art] Store priv key in slot 0x5
47,206,278 UART: [art] Derive Key Pair - Done
47,219,436 UART: [art] Signing Cert with AUTHO
47,220,733 UART: RITY.KEYID = 7
49,500,026 UART: [art] Erasing AUTHORITY.KEYID = 7
49,501,534 UART: [art] PUB.X = 72AC855AE572720FB0D263A431A035D7389BEF96F49FCB68E0C31A1087D9B7D71C85CBC15F766D2FEAEEFE2483399FEF
49,508,803 UART: [art] PUB.Y = 7BDA2FC8531BD8AF0144026FA698EA272062189259D1FFF6B9B2BDDA55630F18766CCBA4EBD88F3B31952417D2D0F474
49,516,044 UART: [art] SIG.R = 7E438AD9251862AAC70E5012714332461DFC603FAF5359B8DEA30CD507A3DDFF8A378762D6EEA19725426C7A99143B42
49,523,418 UART: [art] SIG.S = 64E75C6DB48ABF89D4799B167DC2084A622008C58ED3F1563DF8F56078BC83DE34CC6AA80E3D2F00D1C737985E207FBD
50,828,452 UART: Caliptra RT
50,829,162 UART: [state] CFI Enabled
51,121,052 UART: [rt] RT listening for mailbox commands...
51,122,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,152,844 UART: [rt]cmd =0x494e464f, len=4
51,156,795 >>> mbox cmd response data (264 bytes)
53,211,951 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
61,876,310 >>> mbox cmd response: success
61,912,967 UART:
61,913,264 UART: Running Caliptra FMC ...
61,914,308 UART:
61,914,459 UART: [state] CFI Enabled
61,958,609 UART: [art] Extend RT PCRs Done
61,959,804 UART: [art] Lock RT PCRs Done
61,961,508 UART: [art] Populate DV Done
61,967,084 UART: [fht] FMC Alias Private Key: 7
61,968,580 UART: [art] Derive CDI
61,969,319 UART: [art] Store in in slot 0x4
62,011,988 UART: [art] Derive Key Pair
62,012,992 UART: [art] Store priv key in slot 0x5
65,254,968 UART: [art] Derive Key Pair - Done
65,267,919 UART: [art] Signing Cert with AUTHO
65,269,222 UART: RITY.KEYID = 7
67,548,498 UART: [art] Erasing AUTHORITY.KEYID = 7
67,550,006 UART: [art] PUB.X = F464EE924C0329DD4BBCA3842C9CE04BB51B51CDE91ACA9381CEDED7E2920FF80B269CDD815131D3D2FC1DAB560E5D9A
67,557,295 UART: [art] PUB.Y = 52E43C5AAF91AAEA9EAFE06EBB21D81EFA98EA32A500EC5E64639A631BBEF2593C872160DCD0F5504F3B5B64ACE6F9B8
67,564,563 UART: [art] SIG.R = 6453B0A0F2E8B844E5FF8B2AF6F4FC33A2C9BEE987F31A0D218FF79135DF54C2D26F668DD91AC8A33984D26FAF9FF1DD
67,571,974 UART: [art] SIG.S = 20EFEC50CB9E38B4B64D68BA46EF7DF21CDFF7487743A2F2E7EF0204F94FFBB572AEE463B5DB3955C830BA2ABA1CD04A
68,876,889 UART: Caliptra RT
68,877,575 UART: [state] CFI Enabled
69,162,220 UART: [rt] RT listening for mailbox commands...
69,164,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,193,701 UART: [rt]cmd =0x494e464f, len=4
69,197,641 >>> mbox cmd response data (264 bytes)
69,199,378 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
77,861,839 >>> mbox cmd response: success
77,897,216 UART:
77,897,507 UART: Running Caliptra FMC ...
77,898,621 UART:
77,898,787 UART: [state] CFI Enabled
77,942,965 UART: [art] Extend RT PCRs Done
77,944,099 UART: [art] Lock RT PCRs Done
77,945,599 UART: [art] Populate DV Done
77,951,107 UART: [fht] FMC Alias Private Key: 7
77,952,606 UART: [art] Derive CDI
77,953,374 UART: [art] Store in in slot 0x4
77,996,296 UART: [art] Derive Key Pair
77,997,337 UART: [art] Store priv key in slot 0x5
81,239,486 UART: [art] Derive Key Pair - Done
81,252,422 UART: [art] Signing Cert with AUTHO
81,253,721 UART: RITY.KEYID = 7
83,532,824 UART: [art] Erasing AUTHORITY.KEYID = 7
83,534,331 UART: [art] PUB.X = 72AC855AE572720FB0D263A431A035D7389BEF96F49FCB68E0C31A1087D9B7D71C85CBC15F766D2FEAEEFE2483399FEF
83,541,532 UART: [art] PUB.Y = 7BDA2FC8531BD8AF0144026FA698EA272062189259D1FFF6B9B2BDDA55630F18766CCBA4EBD88F3B31952417D2D0F474
83,548,786 UART: [art] SIG.R = 7E438AD9251862AAC70E5012714332461DFC603FAF5359B8DEA30CD507A3DDFF8A378762D6EEA19725426C7A99143B42
83,556,195 UART: [art] SIG.S = 64E75C6DB48ABF89D4799B167DC2084A622008C58ED3F1563DF8F56078BC83DE34CC6AA80E3D2F00D1C737985E207FBD
84,861,286 UART: Caliptra RT
84,861,990 UART: [state] CFI Enabled
85,152,903 UART: [rt] RT listening for mailbox commands...
85,154,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,184,468 UART: [rt]cmd =0x494e464f, len=4
85,188,351 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.37s
Truncated 1634 bytes from beginning
,018,318 UART: [idev] Sha1 KeyId Algorithm
6,041,497 UART: [idev] --
6,046,572 UART: [ldev] ++
6,047,144 UART: [ldev] CDI.KEYID = 6
6,048,031 UART: [ldev] SUBJECT.KEYID = 5
6,049,248 UART: [ldev] AUTHORITY.KEYID = 7
6,050,484 UART: [ldev] FE.KEYID = 1
6,092,059 UART: [ldev] Erasing FE.KEYID = 1
8,593,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,317 UART: [ldev] --
10,403,527 UART: [fwproc] Wait for Commands...
10,405,689 UART: [fwproc] Recv command 0x46574c44
10,407,778 UART: [fwproc] Recv'd Img size: 114360 bytes
13,809,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,269,198 >>> mbox cmd response: success
14,270,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,274,055 UART: [afmc] ++
14,274,652 UART: [afmc] CDI.KEYID = 6
14,275,537 UART: [afmc] SUBJECT.KEYID = 7
14,276,750 UART: [afmc] AUTHORITY.KEYID = 5
16,809,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,830 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,552,832 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,568,890 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,584,853 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,608,097 UART: [afmc] --
18,612,407 UART: [cold-reset] --
18,617,508 UART: [state] Locking Datavault
18,624,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,626,627 UART: [state] Locking ICCM
18,627,747 UART: [exit] Launching FMC @ 0x40000130
18,636,156 UART:
18,636,400 UART: Running Caliptra FMC ...
18,637,507 UART:
18,637,666 UART: [state] CFI Enabled
18,692,713 UART: [fht] FMC Alias Private Key: 7
20,457,134 UART: [art] Extend RT PCRs Done
20,458,348 UART: [art] Lock RT PCRs Done
20,459,913 UART: [art] Populate DV Done
20,465,289 UART: [fht] FMC Alias Private Key: 7
20,466,976 UART: [art] Derive CDI
20,467,744 UART: [art] Store in in slot 0x4
20,525,617 UART: [art] Derive Key Pair
20,526,616 UART: [art] Store priv key in slot 0x5
22,989,650 UART: [art] Derive Key Pair - Done
23,002,745 UART: [art] Signing Cert with AUTHO
23,004,049 UART: RITY.KEYID = 7
24,715,643 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,146 UART: [art] PUB.X = 0C0BB712262E0BFEF1C89B6B82AA40BBD31982704BF3D8EA9F6A9663B755E6C81AD502B0A509E8E20815A610739FC740
24,724,432 UART: [art] PUB.Y = 669B1C847A1A05234557A5D6A968842863F3EBD6BAD948E4A7ADE6345645217315DF173EE554AC3CA1881BA5AC9DDA77
24,731,657 UART: [art] SIG.R = 425F9C88CF32D769476A8482AD58254F4E83C081A438A1BEFF8AF973D19E1D14797C1878E848518A1F12C8BA016491BF
24,739,038 UART: [art] SIG.S = 54D7140809EB3835A8F4C36BC16767BFE1D8B7C5A1E042134FC2D855754C405A526D00F795A09A99DA352012BBB42409
25,718,126 UART: Caliptra RT
25,718,838 UART: [state] CFI Enabled
25,883,460 UART: [rt] RT listening for mailbox commands...
25,914,502 UART: [rt]cmd =0x494e464f, len=4
25,918,541 >>> mbox cmd response data (264 bytes)
27,978,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,124,887 UART:
28,125,265 UART: Running Caliptra ROM ...
28,126,401 UART:
28,126,573 UART: [state] CFI Enabled
28,191,761 UART: [state] LifecycleState = Unprovisioned
28,193,641 UART: [state] DebugLocked = No
28,196,023 UART: [state] WD Timer not started. Device not locked for debugging
28,200,374 UART: [kat] SHA2-256
28,379,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,391,063 UART: [kat] ++
28,391,616 UART: [kat] sha1
28,403,859 UART: [kat] SHA2-256
28,406,880 UART: [kat] SHA2-384
28,413,460 UART: [kat] SHA2-512-ACC
28,416,395 UART: [kat] ECC-384
30,875,041 UART: [kat] HMAC-384Kdf
30,898,675 UART: [kat] LMS
31,428,145 UART: [kat] --
31,432,184 UART: [update-reset] ++
34,858,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,862,152 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,245,144 >>> mbox cmd response: success
35,245,557 UART: [update-reset] Copying MAN_2 To MAN_1
35,267,885 UART: [update-reset Success] --
35,272,363 UART: [state] Locking Datavault
35,276,645 UART: [state] Locking PCR0, PCR1 and PCR31
35,278,355 UART: [state] Locking ICCM
35,279,537 UART: [exit] Launching FMC @ 0x40000130
35,287,991 UART:
35,288,229 UART: Running Caliptra FMC ...
35,289,335 UART:
35,289,491 UART: [state] CFI Enabled
35,390,085 UART: [art] Extend RT PCRs Done
35,391,273 UART: [art] Lock RT PCRs Done
35,392,461 UART: [art] Populate DV Done
35,397,710 UART: [fht] FMC Alias Private Key: 7
35,399,409 UART: [art] Derive CDI
35,400,223 UART: [art] Store in in slot 0x4
35,459,225 UART: [art] Derive Key Pair
35,460,266 UART: [art] Store priv key in slot 0x5
37,923,334 UART: [art] Derive Key Pair - Done
37,936,111 UART: [art] Signing Cert with AUTHO
37,937,406 UART: RITY.KEYID = 7
39,648,482 UART: [art] Erasing AUTHORITY.KEYID = 7
39,649,984 UART: [art] PUB.X = 0FE34D026A1ECC95003DBD10162DAD6D54120D3646D69204A33CDF8B6E8A275BB6837332777788030230C3BAE3CA357D
39,657,204 UART: [art] PUB.Y = 9D39836A8184EF4640B11DE4F7022A6E043A5E368D592B4D82A5AE415423C5AB63CA6954A1740E230538ED51F543561F
39,664,476 UART: [art] SIG.R = 48504521EADA67E5E75C64BD375819E00708E3ABC9B8C64D981312BCAFD8069F467793F2FDCBE75EEAD463C8A540B924
39,671,883 UART: [art] SIG.S = 53CC1BEFDD04798ECB623AE8762E260EC7CD5A98F4CBAC77AD7F4E072660819337491EE8FF5C6ED0BA58C1980A7A76ED
40,651,013 UART: Caliptra RT
40,651,734 UART: [state] CFI Enabled
40,987,465 UART: [rt] RT listening for mailbox commands...
40,989,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,018,928 UART: [rt]cmd =0x494e464f, len=4
41,023,037 >>> mbox cmd response data (264 bytes)
43,078,981 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
43,224,523 UART:
43,224,898 UART: Running Caliptra ROM ...
43,225,980 UART:
43,226,137 UART: [state] CFI Enabled
43,293,507 UART: [state] LifecycleState = Unprovisioned
43,295,393 UART: [state] DebugLocked = No
43,297,975 UART: [state] WD Timer not started. Device not locked for debugging
43,301,661 UART: [kat] SHA2-256
43,480,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,492,339 UART: [kat] ++
43,492,878 UART: [kat] sha1
43,505,193 UART: [kat] SHA2-256
43,508,241 UART: [kat] SHA2-384
43,513,963 UART: [kat] SHA2-512-ACC
43,516,909 UART: [kat] ECC-384
45,976,812 UART: [kat] HMAC-384Kdf
46,001,898 UART: [kat] LMS
46,531,350 UART: [kat] --
46,537,765 UART: [update-reset] ++
49,959,391 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,963,099 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
50,346,079 >>> mbox cmd response: success
50,347,012 UART: [update-reset] Copying MAN_2 To MAN_1
50,369,296 UART: [update-reset Success] --
50,372,829 UART: [state] Locking Datavault
50,375,972 UART: [state] Locking PCR0, PCR1 and PCR31
50,377,625 UART: [state] Locking ICCM
50,379,638 UART: [exit] Launching FMC @ 0x40000130
50,388,083 UART:
50,388,358 UART: Running Caliptra FMC ...
50,389,417 UART:
50,389,569 UART: [state] CFI Enabled
50,492,489 UART: [art] Extend RT PCRs Done
50,493,670 UART: [art] Lock RT PCRs Done
50,495,046 UART: [art] Populate DV Done
50,500,570 UART: [fht] FMC Alias Private Key: 7
50,502,216 UART: [art] Derive CDI
50,502,954 UART: [art] Store in in slot 0x4
50,561,611 UART: [art] Derive Key Pair
50,562,650 UART: [art] Store priv key in slot 0x5
53,025,268 UART: [art] Derive Key Pair - Done
53,038,133 UART: [art] Signing Cert with AUTHO
53,039,440 UART: RITY.KEYID = 7
54,750,697 UART: [art] Erasing AUTHORITY.KEYID = 7
54,752,192 UART: [art] PUB.X = FBBE9FC871E7D1EB899BA07672CDCA3123D50C9FF842648C463AB2C30C92454BCC5299CBFA4BDB108627329523ED1813
54,759,429 UART: [art] PUB.Y = E916F41F1201CBEE4BB312F14FCE48292CFF6F01E179CA56E4371DEC65914FCC3D62063FCD09204557D367DAFE01758D
54,766,747 UART: [art] SIG.R = 643D4144749320D3DBBDA3556AE59B77676FF3D7780F5F83E910A707C8180278C4BEF7DC8E62780F1F2D80B9A595DE07
54,774,106 UART: [art] SIG.S = D38EE488092FA2E3A8CD3597C13BC2EBBE8B93EDDC5EF0A6DBC09F690588A3A5A78590B00AD98F4465CBFEBF09A46531
55,753,189 UART: Caliptra RT
55,754,184 UART: [state] CFI Enabled
56,087,490 UART: [rt] RT listening for mailbox commands...
56,089,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,119,005 UART: [rt]cmd =0x494e464f, len=4
56,122,960 >>> mbox cmd response data (264 bytes)
56,124,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
56,269,484 UART:
56,269,798 UART: Running Caliptra ROM ...
56,270,916 UART:
56,271,074 UART: [state] CFI Enabled
56,343,007 UART: [state] LifecycleState = Unprovisioned
56,344,888 UART: [state] DebugLocked = No
56,347,298 UART: [state] WD Timer not started. Device not locked for debugging
56,351,529 UART: [kat] SHA2-256
56,530,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,542,193 UART: [kat] ++
56,542,729 UART: [kat] sha1
56,553,596 UART: [kat] SHA2-256
56,556,583 UART: [kat] SHA2-384
56,562,193 UART: [kat] SHA2-512-ACC
56,565,139 UART: [kat] ECC-384
59,009,947 UART: [kat] HMAC-384Kdf
59,032,500 UART: [kat] LMS
59,561,950 UART: [kat] --
59,567,741 UART: [update-reset] ++
62,997,866 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,002,009 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
63,385,041 >>> mbox cmd response: success
63,386,329 UART: [update-reset] Copying MAN_2 To MAN_1
63,408,659 UART: [update-reset Success] --
63,412,037 UART: [state] Locking Datavault
63,414,969 UART: [state] Locking PCR0, PCR1 and PCR31
63,416,618 UART: [state] Locking ICCM
63,418,447 UART: [exit] Launching FMC @ 0x40000130
63,426,857 UART:
63,427,155 UART: Running Caliptra FMC ...
63,428,273 UART:
63,428,436 UART: [state] CFI Enabled
63,522,605 UART: [art] Extend RT PCRs Done
63,523,788 UART: [art] Lock RT PCRs Done
63,525,297 UART: [art] Populate DV Done
63,530,705 UART: [fht] FMC Alias Private Key: 7
63,532,425 UART: [art] Derive CDI
63,533,242 UART: [art] Store in in slot 0x4
63,591,436 UART: [art] Derive Key Pair
63,592,472 UART: [art] Store priv key in slot 0x5
66,055,614 UART: [art] Derive Key Pair - Done
66,068,818 UART: [art] Signing Cert with AUTHO
66,070,155 UART: RITY.KEYID = 7
67,781,537 UART: [art] Erasing AUTHORITY.KEYID = 7
67,783,037 UART: [art] PUB.X = 0FE34D026A1ECC95003DBD10162DAD6D54120D3646D69204A33CDF8B6E8A275BB6837332777788030230C3BAE3CA357D
67,790,261 UART: [art] PUB.Y = 9D39836A8184EF4640B11DE4F7022A6E043A5E368D592B4D82A5AE415423C5AB63CA6954A1740E230538ED51F543561F
67,797,507 UART: [art] SIG.R = 48504521EADA67E5E75C64BD375819E00708E3ABC9B8C64D981312BCAFD8069F467793F2FDCBE75EEAD463C8A540B924
67,804,883 UART: [art] SIG.S = 53CC1BEFDD04798ECB623AE8762E260EC7CD5A98F4CBAC77AD7F4E072660819337491EE8FF5C6ED0BA58C1980A7A76ED
68,784,049 UART: Caliptra RT
68,784,740 UART: [state] CFI Enabled
69,121,354 UART: [rt] RT listening for mailbox commands...
69,123,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,153,167 UART: [rt]cmd =0x494e464f, len=4
69,157,063 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.58s
Truncated 1634 bytes from beginning
,027,301 UART: [idev] Sha1 KeyId Algorithm
6,050,205 UART: [idev] --
6,055,663 UART: [ldev] ++
6,056,350 UART: [ldev] CDI.KEYID = 6
6,057,264 UART: [ldev] SUBJECT.KEYID = 5
6,058,427 UART: [ldev] AUTHORITY.KEYID = 7
6,059,669 UART: [ldev] FE.KEYID = 1
6,099,157 UART: [ldev] Erasing FE.KEYID = 1
8,605,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,055 UART: [ldev] --
10,414,974 UART: [fwproc] Wait for Commands...
10,417,944 UART: [fwproc] Recv command 0x46574c44
10,420,200 UART: [fwproc] Recv'd Img size: 114360 bytes
13,874,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,615,301 >>> mbox cmd response: success
14,616,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,618,787 UART: [afmc] ++
14,619,493 UART: [afmc] CDI.KEYID = 6
14,620,738 UART: [afmc] SUBJECT.KEYID = 7
14,622,168 UART: [afmc] AUTHORITY.KEYID = 5
17,148,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,033 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,891,102 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,906,263 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,921,216 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,943,231 UART: [afmc] --
18,946,934 UART: [cold-reset] --
18,950,738 UART: [state] Locking Datavault
18,955,889 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,084 UART: [state] Locking ICCM
18,959,186 UART: [exit] Launching FMC @ 0x40000130
18,967,852 UART:
18,968,087 UART: Running Caliptra FMC ...
18,969,115 UART:
18,969,260 UART: [state] CFI Enabled
19,031,162 UART: [fht] FMC Alias Private Key: 7
20,795,095 UART: [art] Extend RT PCRs Done
20,796,313 UART: [art] Lock RT PCRs Done
20,798,074 UART: [art] Populate DV Done
20,803,492 UART: [fht] FMC Alias Private Key: 7
20,805,029 UART: [art] Derive CDI
20,805,789 UART: [art] Store in in slot 0x4
20,863,720 UART: [art] Derive Key Pair
20,864,763 UART: [art] Store priv key in slot 0x5
23,327,662 UART: [art] Derive Key Pair - Done
23,340,762 UART: [art] Signing Cert with AUTHO
23,342,065 UART: RITY.KEYID = 7
25,053,263 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,778 UART: [art] PUB.X = D27EB811187BA136D3254E1C36C4BEC99A8FFAA95E48C2B7E0C515256D263C0BA2F5B526049837FE3F22A6490C66F9EF
25,062,068 UART: [art] PUB.Y = 181FC0AF8371C3314A916F80A4108D1EF3F678EFDC1A10B2FF5755063A8196277FF59EFBAAF4FAAD1873CFF1A5303791
25,069,329 UART: [art] SIG.R = CCF8D02439EF5B286F60E334A58173DB9BC3C20629D80DAF6311C367F1B706DAB3C6B363CFA6646D685AFF1A9EFA257F
25,076,733 UART: [art] SIG.S = 0000E1E1F50EDCC884C05723501892AB8055DDC331243206EEDB51602B1AB86CBA71E4FB5160D981BC7746825F19919D
26,055,758 UART: Caliptra RT
26,056,451 UART: [state] CFI Enabled
26,219,816 UART: [rt] RT listening for mailbox commands...
26,251,070 UART: [rt]cmd =0x494e464f, len=4
26,254,863 >>> mbox cmd response data (264 bytes)
28,317,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,463,668 UART:
28,464,071 UART: Running Caliptra ROM ...
28,465,216 UART:
28,465,406 UART: [state] CFI Enabled
28,528,197 UART: [state] LifecycleState = Unprovisioned
28,530,251 UART: [state] DebugLocked = No
28,532,512 UART: [state] WD Timer not started. Device not locked for debugging
28,536,928 UART: [kat] SHA2-256
28,726,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,737,516 UART: [kat] ++
28,738,057 UART: [kat] sha1
28,750,903 UART: [kat] SHA2-256
28,753,909 UART: [kat] SHA2-384
28,759,854 UART: [kat] SHA2-512-ACC
28,762,428 UART: [kat] ECC-384
31,213,008 UART: [kat] HMAC-384Kdf
31,233,058 UART: [kat] LMS
31,764,635 UART: [kat] --
31,768,406 UART: [update-reset] ++
35,221,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,225,591 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,833,285 >>> mbox cmd response: success
35,833,999 UART: [update-reset] Copying MAN_2 To MAN_1
35,871,616 UART: [update-reset Success] --
35,876,319 UART: [state] Locking Datavault
35,879,744 UART: [state] Locking PCR0, PCR1 and PCR31
35,881,888 UART: [state] Locking ICCM
35,884,290 UART: [exit] Launching FMC @ 0x40000130
35,892,955 UART:
35,893,188 UART: Running Caliptra FMC ...
35,894,214 UART:
35,894,362 UART: [state] CFI Enabled
36,001,188 UART: [art] Extend RT PCRs Done
36,002,377 UART: [art] Lock RT PCRs Done
36,003,978 UART: [art] Populate DV Done
36,009,355 UART: [fht] FMC Alias Private Key: 7
36,011,058 UART: [art] Derive CDI
36,011,797 UART: [art] Store in in slot 0x4
36,069,917 UART: [art] Derive Key Pair
36,070,957 UART: [art] Store priv key in slot 0x5
38,534,117 UART: [art] Derive Key Pair - Done
38,547,121 UART: [art] Signing Cert with AUTHO
38,548,431 UART: RITY.KEYID = 7
40,260,241 UART: [art] Erasing AUTHORITY.KEYID = 7
40,261,745 UART: [art] PUB.X = 1F3ECC70A933755639FBABD61591D3B0F368275269E81A2EAD8F971BB6E4566D21C6615FD46693F31DBDEF8966AE9261
40,268,999 UART: [art] PUB.Y = 913DA7A7340B1B447283CB88E488AC555A1B9170878FB1CAA7B9580D08B269C8831034848BA92CC7AE7D958DA8D74E85
40,276,283 UART: [art] SIG.R = 3894737C09A5FB23723FE435BE1D1D19F5618F34D59F399F3C252DCB12D66A25E7F8CED11D0D016F7BA13E917F346993
40,283,673 UART: [art] SIG.S = 022CF84B1278F76C9A5E981F8EC843992107809A349436BFF8E8FAF0B4973E571ABBD39504238948A4B10F3E3AEBCD86
41,262,613 UART: Caliptra RT
41,263,321 UART: [state] CFI Enabled
41,599,323 UART: [rt] RT listening for mailbox commands...
41,601,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,631,072 UART: [rt]cmd =0x494e464f, len=4
41,635,015 >>> mbox cmd response data (264 bytes)
43,690,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
43,836,138 UART:
43,836,510 UART: Running Caliptra ROM ...
43,837,644 UART:
43,837,812 UART: [state] CFI Enabled
43,906,792 UART: [state] LifecycleState = Unprovisioned
43,908,884 UART: [state] DebugLocked = No
43,910,380 UART: [state] WD Timer not started. Device not locked for debugging
43,914,518 UART: [kat] SHA2-256
44,104,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,115,159 UART: [kat] ++
44,115,647 UART: [kat] sha1
44,127,456 UART: [kat] SHA2-256
44,130,475 UART: [kat] SHA2-384
44,136,202 UART: [kat] SHA2-512-ACC
44,138,781 UART: [kat] ECC-384
46,590,300 UART: [kat] HMAC-384Kdf
46,612,520 UART: [kat] LMS
47,144,052 UART: [kat] --
47,147,936 UART: [update-reset] ++
50,607,519 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,610,545 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
51,218,241 >>> mbox cmd response: success
51,219,094 UART: [update-reset] Copying MAN_2 To MAN_1
51,256,670 UART: [update-reset Success] --
51,260,496 UART: [state] Locking Datavault
51,264,796 UART: [state] Locking PCR0, PCR1 and PCR31
51,266,942 UART: [state] Locking ICCM
51,268,865 UART: [exit] Launching FMC @ 0x40000130
51,277,534 UART:
51,277,772 UART: Running Caliptra FMC ...
51,278,795 UART:
51,278,941 UART: [state] CFI Enabled
51,380,245 UART: [art] Extend RT PCRs Done
51,381,426 UART: [art] Lock RT PCRs Done
51,383,173 UART: [art] Populate DV Done
51,388,314 UART: [fht] FMC Alias Private Key: 7
51,389,990 UART: [art] Derive CDI
51,390,732 UART: [art] Store in in slot 0x4
51,449,233 UART: [art] Derive Key Pair
51,450,234 UART: [art] Store priv key in slot 0x5
53,912,788 UART: [art] Derive Key Pair - Done
53,925,822 UART: [art] Signing Cert with AUTHO
53,927,132 UART: RITY.KEYID = 7
55,638,076 UART: [art] Erasing AUTHORITY.KEYID = 7
55,639,583 UART: [art] PUB.X = 3F705112EE2359841CE04A552290F7E0EB186E869F02B52E4C2EA9589917756541AB6B6A8360DE635893D2126824F173
55,646,826 UART: [art] PUB.Y = C2FE905682E1D7816BB77D3325363D8B17EC1E6BF1C8C079AA0446BE3BEC81F85FF373F0CAB03FBADE582CFEAF2ACD0C
55,654,110 UART: [art] SIG.R = 723BDEBB2B25C0A391B2AD60A366F071E099C5ED9CA9CB3C679BBA40A11D6A97BC3016BE826EFA87374EC60D4BE31BC7
55,661,550 UART: [art] SIG.S = AC1653A9C17A38B6F98E993E259CD08DB1264FCD4879B8FB057D4A7AFB5A63EC55082BDD8DC4D8F6B5E88BBC348B9244
56,640,933 UART: Caliptra RT
56,641,623 UART: [state] CFI Enabled
56,977,059 UART: [rt] RT listening for mailbox commands...
56,978,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,008,935 UART: [rt]cmd =0x494e464f, len=4
57,012,981 >>> mbox cmd response data (264 bytes)
57,014,762 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
57,159,732 UART:
57,160,057 UART: Running Caliptra ROM ...
57,161,098 UART:
57,161,252 UART: [state] CFI Enabled
57,237,838 UART: [state] LifecycleState = Unprovisioned
57,239,940 UART: [state] DebugLocked = No
57,241,138 UART: [state] WD Timer not started. Device not locked for debugging
57,244,877 UART: [kat] SHA2-256
57,434,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,445,500 UART: [kat] ++
57,446,037 UART: [kat] sha1
57,458,444 UART: [kat] SHA2-256
57,461,463 UART: [kat] SHA2-384
57,467,234 UART: [kat] SHA2-512-ACC
57,469,815 UART: [kat] ECC-384
59,922,588 UART: [kat] HMAC-384Kdf
59,943,841 UART: [kat] LMS
60,475,384 UART: [kat] --
60,479,916 UART: [update-reset] ++
63,937,907 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,940,740 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
64,548,452 >>> mbox cmd response: success
64,550,349 UART: [update-reset] Copying MAN_2 To MAN_1
64,587,920 UART: [update-reset Success] --
64,592,294 UART: [state] Locking Datavault
64,595,668 UART: [state] Locking PCR0, PCR1 and PCR31
64,597,866 UART: [state] Locking ICCM
64,599,270 UART: [exit] Launching FMC @ 0x40000130
64,607,899 UART:
64,608,142 UART: Running Caliptra FMC ...
64,609,171 UART:
64,609,319 UART: [state] CFI Enabled
64,711,168 UART: [art] Extend RT PCRs Done
64,712,381 UART: [art] Lock RT PCRs Done
64,713,972 UART: [art] Populate DV Done
64,719,276 UART: [fht] FMC Alias Private Key: 7
64,721,031 UART: [art] Derive CDI
64,721,850 UART: [art] Store in in slot 0x4
64,780,199 UART: [art] Derive Key Pair
64,781,240 UART: [art] Store priv key in slot 0x5
67,244,360 UART: [art] Derive Key Pair - Done
67,257,520 UART: [art] Signing Cert with AUTHO
67,258,875 UART: RITY.KEYID = 7
68,970,029 UART: [art] Erasing AUTHORITY.KEYID = 7
68,971,536 UART: [art] PUB.X = 1F3ECC70A933755639FBABD61591D3B0F368275269E81A2EAD8F971BB6E4566D21C6615FD46693F31DBDEF8966AE9261
68,978,773 UART: [art] PUB.Y = 913DA7A7340B1B447283CB88E488AC555A1B9170878FB1CAA7B9580D08B269C8831034848BA92CC7AE7D958DA8D74E85
68,986,050 UART: [art] SIG.R = 3894737C09A5FB23723FE435BE1D1D19F5618F34D59F399F3C252DCB12D66A25E7F8CED11D0D016F7BA13E917F346993
68,993,479 UART: [art] SIG.S = 022CF84B1278F76C9A5E981F8EC843992107809A349436BFF8E8FAF0B4973E571ABBD39504238948A4B10F3E3AEBCD86
69,972,641 UART: Caliptra RT
69,973,363 UART: [state] CFI Enabled
70,308,978 UART: [rt] RT listening for mailbox commands...
70,310,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,340,475 UART: [rt]cmd =0x494e464f, len=4
70,344,261 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
3,436,409 ready_for_fw is high
3,436,841 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,761,254 >>> mbox cmd response: success
14,762,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,048,984 UART:
19,049,411 UART: Running Caliptra FMC ...
19,050,553 UART:
19,050,713 UART: [state] CFI Enabled
19,112,144 UART: [fht] FMC Alias Private Key: 7
20,876,078 UART: [art] Extend RT PCRs Done
20,877,302 UART: [art] Lock RT PCRs Done
20,879,248 UART: [art] Populate DV Done
20,884,499 UART: [fht] FMC Alias Private Key: 7
20,886,047 UART: [art] Derive CDI
20,886,867 UART: [art] Store in in slot 0x4
20,945,457 UART: [art] Derive Key Pair
20,946,452 UART: [art] Store priv key in slot 0x5
23,409,634 UART: [art] Derive Key Pair - Done
23,422,525 UART: [art] Signing Cert with AUTHO
23,423,831 UART: RITY.KEYID = 7
25,135,400 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,914 UART: [art] PUB.X = F1C5811817A50AD0ED2932F66B4CB79E282727141481D5527AC64989DEABF95C390B74D7E408CB347C37857850773A34
25,144,154 UART: [art] PUB.Y = 9DEA0723DB22893CC800708151FA1E5798BA903EC2315E4BEFBC151CF65AFC3B873940925860BF7ACC61ADCEF175464B
25,151,405 UART: [art] SIG.R = 6C722AAE5C1E63CF5C15D7DCA5F514301CEE6687C71A7CB6C4C99BA8E2622BC182FF1BB94E148081259C5F7AD86790F1
25,158,788 UART: [art] SIG.S = 5D5EF83B6AD491A2A1EA3588DEA093578B25ECF1FCD29E79D7E2D3E5649F33E9BB3C879D778023C2B7C9F2618AE2F3C3
26,137,524 UART: Caliptra RT
26,138,237 UART: [state] CFI Enabled
26,303,821 UART: [rt] RT listening for mailbox commands...
26,334,957 UART: [rt]cmd =0x494e464f, len=4
26,338,888 >>> mbox cmd response data (264 bytes)
28,397,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
36,216,679 >>> mbox cmd response: success
36,252,206 UART:
36,252,532 UART: Running Caliptra FMC ...
36,253,666 UART:
36,253,837 UART: [state] CFI Enabled
36,341,527 UART: [art] Extend RT PCRs Done
36,342,713 UART: [art] Lock RT PCRs Done
36,343,970 UART: [art] Populate DV Done
36,349,281 UART: [fht] FMC Alias Private Key: 7
36,350,978 UART: [art] Derive CDI
36,351,795 UART: [art] Store in in slot 0x4
36,410,752 UART: [art] Derive Key Pair
36,411,793 UART: [art] Store priv key in slot 0x5
38,874,520 UART: [art] Derive Key Pair - Done
38,887,482 UART: [art] Signing Cert with AUTHO
38,888,793 UART: RITY.KEYID = 7
40,601,399 UART: [art] Erasing AUTHORITY.KEYID = 7
40,602,909 UART: [art] PUB.X = 324FE49817D1EA386EA6189D26CCB72E5D188C63392FC6BADF8C1317F182423A178A7DDEB1D8135FAEDE217F3B6CA9D1
40,610,198 UART: [art] PUB.Y = 8D730F6D5956F365EEC05CE6FA29ADC9D1FCA4F1A692623EED007FEF8218F5A3DFA6EDB3FF8B7DF1E176201AEA3E3427
40,617,451 UART: [art] SIG.R = 96D0E80CE5E742D4025A5026913B499C16DF5472D973F113611C829253D9E6B322D48F031CAAF260413F5BC7D336F06C
40,624,809 UART: [art] SIG.S = 8FB3C88F94D14F30003AF985EEDE48B1DA384D29213FA811B39A0C4E667DB764C618AF29F9790CD638F9ADAE69098975
41,603,649 UART: Caliptra RT
41,604,334 UART: [state] CFI Enabled
41,939,455 UART: [rt] RT listening for mailbox commands...
41,941,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,970,909 UART: [rt]cmd =0x494e464f, len=4
41,974,969 >>> mbox cmd response data (264 bytes)
44,032,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
51,851,790 >>> mbox cmd response: success
51,887,798 UART:
51,888,102 UART: Running Caliptra FMC ...
51,889,225 UART:
51,889,396 UART: [state] CFI Enabled
51,978,191 UART: [art] Extend RT PCRs Done
51,979,377 UART: [art] Lock RT PCRs Done
51,980,727 UART: [art] Populate DV Done
51,985,866 UART: [fht] FMC Alias Private Key: 7
51,987,568 UART: [art] Derive CDI
51,988,384 UART: [art] Store in in slot 0x4
52,047,209 UART: [art] Derive Key Pair
52,048,260 UART: [art] Store priv key in slot 0x5
54,511,386 UART: [art] Derive Key Pair - Done
54,524,449 UART: [art] Signing Cert with AUTHO
54,525,775 UART: RITY.KEYID = 7
56,236,522 UART: [art] Erasing AUTHORITY.KEYID = 7
56,238,035 UART: [art] PUB.X = B8F4C5EDF3686E4372B81EE9D4A4ED8BC68CA698FFAD2749B8639FB72417ABCACC447BAD9F5F68D37FF5B1D942FE0B55
56,245,324 UART: [art] PUB.Y = DC1ADAB955EDB5FF59D44D8C17ED494AB345EF6C11647B148EE2CFB993CB77B3681B743F9ED860DDC1BA8DC4C14CB6C2
56,252,632 UART: [art] SIG.R = 69B126CCC2ED98FE7A7A3201BE16ACA3830D4B546B51DB86AC4590DA3C546715A8FD84258341FB1ACD43B535B91F94DA
56,260,056 UART: [art] SIG.S = C59C68674596305EC464894F4513CCC11CDD7E8B5FCD5A6C56830159C152A651E5CB49301460F4C263BA9B15878A1A98
57,238,838 UART: Caliptra RT
57,239,553 UART: [state] CFI Enabled
57,571,553 UART: [rt] RT listening for mailbox commands...
57,573,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,603,189 UART: [rt]cmd =0x494e464f, len=4
57,607,123 >>> mbox cmd response data (264 bytes)
57,608,818 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
65,413,022 >>> mbox cmd response: success
65,448,615 UART:
65,448,913 UART: Running Caliptra FMC ...
65,450,055 UART:
65,450,218 UART: [state] CFI Enabled
65,536,316 UART: [art] Extend RT PCRs Done
65,537,501 UART: [art] Lock RT PCRs Done
65,538,796 UART: [art] Populate DV Done
65,544,160 UART: [fht] FMC Alias Private Key: 7
65,545,916 UART: [art] Derive CDI
65,546,731 UART: [art] Store in in slot 0x4
65,605,567 UART: [art] Derive Key Pair
65,606,606 UART: [art] Store priv key in slot 0x5
68,069,298 UART: [art] Derive Key Pair - Done
68,082,450 UART: [art] Signing Cert with AUTHO
68,083,790 UART: RITY.KEYID = 7
69,795,254 UART: [art] Erasing AUTHORITY.KEYID = 7
69,796,758 UART: [art] PUB.X = 324FE49817D1EA386EA6189D26CCB72E5D188C63392FC6BADF8C1317F182423A178A7DDEB1D8135FAEDE217F3B6CA9D1
69,804,039 UART: [art] PUB.Y = 8D730F6D5956F365EEC05CE6FA29ADC9D1FCA4F1A692623EED007FEF8218F5A3DFA6EDB3FF8B7DF1E176201AEA3E3427
69,811,323 UART: [art] SIG.R = 96D0E80CE5E742D4025A5026913B499C16DF5472D973F113611C829253D9E6B322D48F031CAAF260413F5BC7D336F06C
69,818,689 UART: [art] SIG.S = 8FB3C88F94D14F30003AF985EEDE48B1DA384D29213FA811B39A0C4E667DB764C618AF29F9790CD638F9ADAE69098975
70,797,812 UART: Caliptra RT
70,798,501 UART: [state] CFI Enabled
71,134,903 UART: [rt] RT listening for mailbox commands...
71,136,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,166,617 UART: [rt]cmd =0x494e464f, len=4
71,170,403 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.67s
Truncated 1634 bytes from beginning
,329,860 UART: [idev] Sha1 KeyId Algorithm
6,350,988 UART: [idev] --
6,355,091 UART: [ldev] ++
6,355,810 UART: [ldev] CDI.KEYID = 6
6,356,695 UART: [ldev] SUBJECT.KEYID = 5
6,357,791 UART: [ldev] AUTHORITY.KEYID = 7
6,359,072 UART: [ldev] FE.KEYID = 1
6,368,070 UART: [ldev] Erasing FE.KEYID = 1
8,845,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,309 UART: [ldev] --
10,635,415 UART: [fwproc] Wait for Commands...
10,638,368 UART: [fwproc] Recv command 0x46574c44
10,640,671 UART: [fwproc] Recv'd Img size: 114360 bytes
14,084,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,276,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,818,673 >>> mbox cmd response: success
14,819,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,823,563 UART: [afmc] ++
14,824,258 UART: [afmc] CDI.KEYID = 6
14,825,434 UART: [afmc] SUBJECT.KEYID = 7
14,826,967 UART: [afmc] AUTHORITY.KEYID = 5
17,328,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,051,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,053,939 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
19,068,969 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
19,084,127 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
19,099,045 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
19,124,321 UART: [afmc] --
19,127,051 UART: [cold-reset] --
19,130,537 UART: [state] Locking Datavault
19,135,511 UART: [state] Locking PCR0, PCR1 and PCR31
19,137,687 UART: [state] Locking ICCM
19,140,293 UART: [exit] Launching FMC @ 0x40000130
19,148,949 UART:
19,149,188 UART: Running Caliptra FMC ...
19,150,226 UART:
19,150,370 UART: [state] CFI Enabled
19,158,717 UART: [fht] FMC Alias Private Key: 7
20,915,692 UART: [art] Extend RT PCRs Done
20,916,910 UART: [art] Lock RT PCRs Done
20,918,504 UART: [art] Populate DV Done
20,924,024 UART: [fht] FMC Alias Private Key: 7
20,925,670 UART: [art] Derive CDI
20,926,481 UART: [art] Store in in slot 0x4
20,969,241 UART: [art] Derive Key Pair
20,970,235 UART: [art] Store priv key in slot 0x5
23,397,257 UART: [art] Derive Key Pair - Done
23,410,358 UART: [art] Signing Cert with AUTHO
23,411,656 UART: RITY.KEYID = 7
25,117,256 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,770 UART: [art] PUB.X = E520808F3BFAD0AB1A033A4713BC8ACB1FB87E84304A37AC3193B217B5B54E61234C3F099AB0602EC2A6C8E72AEE5B85
25,126,049 UART: [art] PUB.Y = 0C0D7C0FFE4B4DE82247E6FBA7A07ACEE7B83B01055E8D35F1E1C5F04860D2785658D505E2E9FAEA830E7D4AE2FE9379
25,133,275 UART: [art] SIG.R = 5C790BAA3872EB70FCDCE53F4EDDE20B07C375B9F38498FA4AD833C3C4B5AD8500843287D0D614482DA5268A4CFB9B58
25,140,678 UART: [art] SIG.S = DC2C3DAC92A5EAF2A0CB4911653C83438D70E7D2B9D5E018D33B1D1BE82A960832F42416EFF7E77B7EF5D9E178B1AE59
26,119,856 UART: Caliptra RT
26,120,965 UART: [state] CFI Enabled
26,238,428 UART: [rt] RT listening for mailbox commands...
26,269,679 UART: [rt]cmd =0x494e464f, len=4
26,273,574 >>> mbox cmd response data (264 bytes)
28,332,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,478,198 UART:
28,478,585 UART: Running Caliptra ROM ...
28,479,641 UART:
28,479,844 UART: [state] CFI Enabled
28,492,225 UART: [state] LifecycleState = Unprovisioned
28,494,053 UART: [state] DebugLocked = No
28,496,322 UART: [state] WD Timer not started. Device not locked for debugging
28,501,529 UART: [kat] SHA2-256
28,691,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,702,152 UART: [kat] ++
28,702,664 UART: [kat] sha1
28,713,821 UART: [kat] SHA2-256
28,716,834 UART: [kat] SHA2-384
28,723,361 UART: [kat] SHA2-512-ACC
28,725,923 UART: [kat] ECC-384
31,169,762 UART: [kat] HMAC-384Kdf
31,183,683 UART: [kat] LMS
31,715,312 UART: [kat] --
31,720,436 UART: [update-reset] ++
35,179,940 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,182,941 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,790,706 >>> mbox cmd response: success
35,792,660 UART: [update-reset] Copying MAN_2 To MAN_1
35,830,239 UART: [update-reset Success] --
35,835,391 UART: [state] Locking Datavault
35,839,123 UART: [state] Locking PCR0, PCR1 and PCR31
35,841,312 UART: [state] Locking ICCM
35,843,782 UART: [exit] Launching FMC @ 0x40000130
35,852,443 UART:
35,852,671 UART: Running Caliptra FMC ...
35,853,769 UART:
35,853,920 UART: [state] CFI Enabled
35,898,275 UART: [art] Extend RT PCRs Done
35,899,459 UART: [art] Lock RT PCRs Done
35,900,861 UART: [art] Populate DV Done
35,906,426 UART: [fht] FMC Alias Private Key: 7
35,907,900 UART: [art] Derive CDI
35,908,664 UART: [art] Store in in slot 0x4
35,951,248 UART: [art] Derive Key Pair
35,952,433 UART: [art] Store priv key in slot 0x5
38,378,814 UART: [art] Derive Key Pair - Done
38,391,816 UART: [art] Signing Cert with AUTHO
38,393,116 UART: RITY.KEYID = 7
40,098,529 UART: [art] Erasing AUTHORITY.KEYID = 7
40,100,028 UART: [art] PUB.X = 6C5944F41E65EE8952EFBDCCE89BDED09195F23C23CF60D1EF2F7BC1878D767FEE3F91EB3D62B7CBABC7BC34C7614E53
40,107,330 UART: [art] PUB.Y = 3661FC6A0CE242EA10198FCDFBD75257698915C6B5C7F511F35612A7CD598B80E570480D609DE7331078DF2F59A6B46F
40,114,594 UART: [art] SIG.R = 57422B3A1F135BF91DB50AED608AE84E27F5428D2086423304CA3BD18C79D88793A9C217BB14FBC248700E83CF77B373
40,122,046 UART: [art] SIG.S = A190255057307D9B80C2B74E6C58033FA061C14EB2F044984EA35ABC8E63F02CCC9F19B50BA8985FB5C9E4A1243704E6
41,100,945 UART: Caliptra RT
41,101,666 UART: [state] CFI Enabled
41,391,712 UART: [rt] RT listening for mailbox commands...
41,393,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,423,739 UART: [rt]cmd =0x494e464f, len=4
41,427,802 >>> mbox cmd response data (264 bytes)
43,482,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
43,628,087 UART:
43,628,472 UART: Running Caliptra ROM ...
43,629,524 UART:
43,629,672 UART: [state] CFI Enabled
43,642,234 UART: [state] LifecycleState = Unprovisioned
43,644,140 UART: [state] DebugLocked = No
43,645,695 UART: [state] WD Timer not started. Device not locked for debugging
43,649,604 UART: [kat] SHA2-256
43,839,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,850,222 UART: [kat] ++
43,850,815 UART: [kat] sha1
43,862,678 UART: [kat] SHA2-256
43,865,696 UART: [kat] SHA2-384
43,871,142 UART: [kat] SHA2-512-ACC
43,873,709 UART: [kat] ECC-384
46,315,283 UART: [kat] HMAC-384Kdf
46,328,714 UART: [kat] LMS
46,860,325 UART: [kat] --
46,864,436 UART: [update-reset] ++
50,321,678 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,324,735 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
50,932,490 >>> mbox cmd response: success
50,934,166 UART: [update-reset] Copying MAN_2 To MAN_1
50,971,727 UART: [update-reset Success] --
50,976,385 UART: [state] Locking Datavault
50,979,791 UART: [state] Locking PCR0, PCR1 and PCR31
50,981,975 UART: [state] Locking ICCM
50,984,173 UART: [exit] Launching FMC @ 0x40000130
50,992,841 UART:
50,993,116 UART: Running Caliptra FMC ...
50,994,224 UART:
50,994,386 UART: [state] CFI Enabled
51,039,260 UART: [art] Extend RT PCRs Done
51,040,405 UART: [art] Lock RT PCRs Done
51,041,963 UART: [art] Populate DV Done
51,047,427 UART: [fht] FMC Alias Private Key: 7
51,049,177 UART: [art] Derive CDI
51,050,006 UART: [art] Store in in slot 0x4
51,092,772 UART: [art] Derive Key Pair
51,093,810 UART: [art] Store priv key in slot 0x5
53,521,368 UART: [art] Derive Key Pair - Done
53,534,199 UART: [art] Signing Cert with AUTHO
53,535,499 UART: RITY.KEYID = 7
55,240,840 UART: [art] Erasing AUTHORITY.KEYID = 7
55,242,348 UART: [art] PUB.X = 2AE94C99C42AC62060B7B16FDC567B75059D04E7DF802A330C56A6918871B30C85F8BBC21791B52884995BFD135AEBB1
55,249,603 UART: [art] PUB.Y = 9A98AEEF51167F90E2F209BD4A8FBD41E0053E8AB302A1741AA98F278EDD52F746845993068EBFA5ACBA930F664BA030
55,256,892 UART: [art] SIG.R = 9BFC05E7D6FF8E4CE986220694E0790375B18E26B2F568F109E22E4C75C0FDBD26C9506DF42648B9B2AC1CE935AAC43F
55,264,291 UART: [art] SIG.S = 09215C6B771A7283AD5FE393AC3751A32DAAD793CDD75E2329C9E176A03504BC345CDAB9EBCE4F1B041632E154E65A4B
56,243,520 UART: Caliptra RT
56,244,207 UART: [state] CFI Enabled
56,531,499 UART: [rt] RT listening for mailbox commands...
56,533,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,563,180 UART: [rt]cmd =0x494e464f, len=4
56,567,043 >>> mbox cmd response data (264 bytes)
56,568,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
56,713,494 UART:
56,713,837 UART: Running Caliptra ROM ...
56,714,905 UART:
56,715,112 UART: [state] CFI Enabled
56,722,842 UART: [state] LifecycleState = Unprovisioned
56,724,725 UART: [state] DebugLocked = No
56,726,793 UART: [state] WD Timer not started. Device not locked for debugging
56,730,799 UART: [kat] SHA2-256
56,920,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,931,404 UART: [kat] ++
56,931,916 UART: [kat] sha1
56,943,123 UART: [kat] SHA2-256
56,946,084 UART: [kat] SHA2-384
56,951,260 UART: [kat] SHA2-512-ACC
56,953,833 UART: [kat] ECC-384
59,396,213 UART: [kat] HMAC-384Kdf
59,408,711 UART: [kat] LMS
59,940,324 UART: [kat] --
59,946,209 UART: [update-reset] ++
63,402,653 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,406,184 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
64,013,885 >>> mbox cmd response: success
64,014,478 UART: [update-reset] Copying MAN_2 To MAN_1
64,052,037 UART: [update-reset Success] --
64,057,278 UART: [state] Locking Datavault
64,061,608 UART: [state] Locking PCR0, PCR1 and PCR31
64,063,739 UART: [state] Locking ICCM
64,065,402 UART: [exit] Launching FMC @ 0x40000130
64,074,082 UART:
64,074,320 UART: Running Caliptra FMC ...
64,075,362 UART:
64,075,515 UART: [state] CFI Enabled
64,119,581 UART: [art] Extend RT PCRs Done
64,120,761 UART: [art] Lock RT PCRs Done
64,122,023 UART: [art] Populate DV Done
64,127,431 UART: [fht] FMC Alias Private Key: 7
64,129,126 UART: [art] Derive CDI
64,129,932 UART: [art] Store in in slot 0x4
64,172,413 UART: [art] Derive Key Pair
64,173,414 UART: [art] Store priv key in slot 0x5
66,599,977 UART: [art] Derive Key Pair - Done
66,612,543 UART: [art] Signing Cert with AUTHO
66,613,852 UART: RITY.KEYID = 7
68,319,520 UART: [art] Erasing AUTHORITY.KEYID = 7
68,321,025 UART: [art] PUB.X = 6C5944F41E65EE8952EFBDCCE89BDED09195F23C23CF60D1EF2F7BC1878D767FEE3F91EB3D62B7CBABC7BC34C7614E53
68,328,341 UART: [art] PUB.Y = 3661FC6A0CE242EA10198FCDFBD75257698915C6B5C7F511F35612A7CD598B80E570480D609DE7331078DF2F59A6B46F
68,335,592 UART: [art] SIG.R = 57422B3A1F135BF91DB50AED608AE84E27F5428D2086423304CA3BD18C79D88793A9C217BB14FBC248700E83CF77B373
68,342,984 UART: [art] SIG.S = A190255057307D9B80C2B74E6C58033FA061C14EB2F044984EA35ABC8E63F02CCC9F19B50BA8985FB5C9E4A1243704E6
69,321,628 UART: Caliptra RT
69,322,319 UART: [state] CFI Enabled
69,608,348 UART: [rt] RT listening for mailbox commands...
69,610,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,639,877 UART: [rt]cmd =0x494e464f, len=4
69,644,036 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,753,413 ready_for_fw is high
3,753,830 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,962,532 >>> mbox cmd response: success
14,964,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,215,118 UART:
19,215,513 UART: Running Caliptra FMC ...
19,216,628 UART:
19,216,779 UART: [state] CFI Enabled
19,225,003 UART: [fht] FMC Alias Private Key: 7
20,981,327 UART: [art] Extend RT PCRs Done
20,982,704 UART: [art] Lock RT PCRs Done
20,984,255 UART: [art] Populate DV Done
20,989,617 UART: [fht] FMC Alias Private Key: 7
20,991,220 UART: [art] Derive CDI
20,991,961 UART: [art] Store in in slot 0x4
21,034,714 UART: [art] Derive Key Pair
21,035,718 UART: [art] Store priv key in slot 0x5
23,462,675 UART: [art] Derive Key Pair - Done
23,475,640 UART: [art] Signing Cert with AUTHO
23,476,951 UART: RITY.KEYID = 7
25,181,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,370 UART: [art] PUB.X = 7D927A0EE9B8F144645C18A88498BC956A19AF9D2AC50EC9201B0B3D9803C7D22FB883BDF1E005FF5C1CF19F5495589A
25,190,670 UART: [art] PUB.Y = FC07F5C737D5949F3E94939F63C654B8E5A1E0BCD78BCDB75BDA697C211F943397E27946E09BE073B6BAAA4C8C066E9F
25,197,912 UART: [art] SIG.R = 0AF4145B7112DAB885600C7A3A5E0A5DA7F95E27D09647585956A36B2A6A8C20290A6FE81F5AFB84FC659BDF767AF4A9
25,205,293 UART: [art] SIG.S = 0586395B712104932230E03E5C7F55D51B14036C064B8EF2674559B9BE2C430C00DE8EE52FAD48D9151CF6A2A74A556E
26,183,907 UART: Caliptra RT
26,184,597 UART: [state] CFI Enabled
26,302,461 UART: [rt] RT listening for mailbox commands...
26,333,330 UART: [rt]cmd =0x494e464f, len=4
26,337,392 >>> mbox cmd response data (264 bytes)
28,396,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
36,132,063 >>> mbox cmd response: success
36,167,818 UART:
36,168,128 UART: Running Caliptra FMC ...
36,169,249 UART:
36,169,410 UART: [state] CFI Enabled
36,213,917 UART: [art] Extend RT PCRs Done
36,215,102 UART: [art] Lock RT PCRs Done
36,216,388 UART: [art] Populate DV Done
36,221,964 UART: [fht] FMC Alias Private Key: 7
36,223,618 UART: [art] Derive CDI
36,224,425 UART: [art] Store in in slot 0x4
36,266,882 UART: [art] Derive Key Pair
36,267,925 UART: [art] Store priv key in slot 0x5
38,694,968 UART: [art] Derive Key Pair - Done
38,708,068 UART: [art] Signing Cert with AUTHO
38,709,370 UART: RITY.KEYID = 7
40,414,728 UART: [art] Erasing AUTHORITY.KEYID = 7
40,416,275 UART: [art] PUB.X = C404532AF52B420E8CF28196C0D2F94B74A83AE16B0364AF962F0D8EA6141C7AF6BF907D5D2773D42928C4E964445BF8
40,423,538 UART: [art] PUB.Y = F5CFE1F54DF4BA0FC15F5733B7A8137943D04C9FFF5B2C3C4E29095B4B9268B95FDEBCC4090606BEF29B275695741542
40,430,802 UART: [art] SIG.R = 7258071EC352703A2847033B81BF02C1A3BBDFBF000FAE65C08977BCBE06C13E6044E385579AD96B25FCB52EEBAD1A80
40,438,174 UART: [art] SIG.S = E265ABD34DF9E3B4423C28F45B87CB5B725A60D0C7946BC054B9898B9E0919167B5D9C7562AE3B957A633152A2B6EAEF
41,417,284 UART: Caliptra RT
41,417,998 UART: [state] CFI Enabled
41,704,324 UART: [rt] RT listening for mailbox commands...
41,706,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,735,816 UART: [rt]cmd =0x494e464f, len=4
41,739,873 >>> mbox cmd response data (264 bytes)
43,797,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
51,523,092 >>> mbox cmd response: success
51,557,570 UART:
51,557,923 UART: Running Caliptra FMC ...
51,559,054 UART:
51,559,231 UART: [state] CFI Enabled
51,603,573 UART: [art] Extend RT PCRs Done
51,604,718 UART: [art] Lock RT PCRs Done
51,606,218 UART: [art] Populate DV Done
51,611,516 UART: [fht] FMC Alias Private Key: 7
51,613,049 UART: [art] Derive CDI
51,613,865 UART: [art] Store in in slot 0x4
51,656,299 UART: [art] Derive Key Pair
51,657,364 UART: [art] Store priv key in slot 0x5
54,083,920 UART: [art] Derive Key Pair - Done
54,097,024 UART: [art] Signing Cert with AUTHO
54,098,341 UART: RITY.KEYID = 7
55,803,419 UART: [art] Erasing AUTHORITY.KEYID = 7
55,804,944 UART: [art] PUB.X = E6FDC111C6D552CCD166A7A59A3C94EE4DFF3CF585DB3648F90D41AC56E60AF75BB2983317EC53CE3A062A15C8AB38A1
55,812,178 UART: [art] PUB.Y = 0EC7A07AB32A9BFFC498E9B106380FA451FE66AC5BD745B6248BFC336FEB06BFF4602A49733789B970FA300459FDBA83
55,819,492 UART: [art] SIG.R = 823B204A8EBDD875D05EA84D7949D847F5CBFE9A31E97EA21AD74159E6167E586B5B91FB48FE0C200EEB517C0ABB5928
55,826,864 UART: [art] SIG.S = 1446CEE34D1B545D41EB0393C240EFFABA33FF02C4C75E175D525FD079F215103143D4B861990F9D0C053462DADB2799
56,806,480 UART: Caliptra RT
56,807,172 UART: [state] CFI Enabled
57,096,287 UART: [rt] RT listening for mailbox commands...
57,098,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,127,892 UART: [rt]cmd =0x494e464f, len=4
57,131,847 >>> mbox cmd response data (264 bytes)
57,133,515 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
64,860,865 >>> mbox cmd response: success
64,894,441 UART:
64,894,704 UART: Running Caliptra FMC ...
64,895,811 UART:
64,895,976 UART: [state] CFI Enabled
64,940,268 UART: [art] Extend RT PCRs Done
64,941,456 UART: [art] Lock RT PCRs Done
64,942,886 UART: [art] Populate DV Done
64,948,347 UART: [fht] FMC Alias Private Key: 7
64,949,883 UART: [art] Derive CDI
64,950,697 UART: [art] Store in in slot 0x4
64,993,134 UART: [art] Derive Key Pair
64,994,163 UART: [art] Store priv key in slot 0x5
67,421,049 UART: [art] Derive Key Pair - Done
67,434,314 UART: [art] Signing Cert with AUTHO
67,435,620 UART: RITY.KEYID = 7
69,140,890 UART: [art] Erasing AUTHORITY.KEYID = 7
69,142,390 UART: [art] PUB.X = C404532AF52B420E8CF28196C0D2F94B74A83AE16B0364AF962F0D8EA6141C7AF6BF907D5D2773D42928C4E964445BF8
69,149,692 UART: [art] PUB.Y = F5CFE1F54DF4BA0FC15F5733B7A8137943D04C9FFF5B2C3C4E29095B4B9268B95FDEBCC4090606BEF29B275695741542
69,156,968 UART: [art] SIG.R = 7258071EC352703A2847033B81BF02C1A3BBDFBF000FAE65C08977BCBE06C13E6044E385579AD96B25FCB52EEBAD1A80
69,164,290 UART: [art] SIG.S = E265ABD34DF9E3B4423C28F45B87CB5B725A60D0C7946BC054B9898B9E0919167B5D9C7562AE3B957A633152A2B6EAEF
70,142,965 UART: Caliptra RT
70,143,661 UART: [state] CFI Enabled
70,427,998 UART: [rt] RT listening for mailbox commands...
70,429,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,459,723 UART: [rt]cmd =0x494e464f, len=4
70,463,674 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
Truncated 2120 bytes from beginning
,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,818 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,586,972 UART: [fwproc] Received command 0x46574c44
1,587,763 UART: [fwproc] Received Image of size 114360 bytes
2,885,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,484 >>> mbox cmd response: success
3,077,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,078,724 UART: [afmc] ++
3,078,892 UART: [afmc] CDI.KEYID = 6
3,079,254 UART: [afmc] SUBJECT.KEYID = 7
3,079,679 UART: [afmc] AUTHORITY.KEYID = 5
3,114,929 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,125 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,905 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,137,597 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,143,470 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,149,184 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,156,943 UART: [afmc] --
3,158,031 UART: [cold-reset] --
3,158,823 UART: [state] Locking Datavault
3,160,012 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,616 UART: [state] Locking ICCM
3,161,084 UART: [exit] Launching FMC @ 0x40000130
3,166,413 UART:
3,166,429 UART: Running Caliptra FMC ...
3,166,837 UART:
3,166,891 UART: [state] CFI Enabled
3,177,547 UART: [fht] FMC Alias Private Key: 7
3,284,778 UART: [art] Extend RT PCRs Done
3,285,206 UART: [art] Lock RT PCRs Done
3,286,316 UART: [art] Populate DV Done
3,294,500 UART: [fht] FMC Alias Private Key: 7
3,295,642 UART: [art] Derive CDI
3,295,922 UART: [art] Store in in slot 0x4
3,381,763 UART: [art] Derive Key Pair
3,382,123 UART: [art] Store priv key in slot 0x5
3,395,543 UART: [art] Derive Key Pair - Done
3,410,212 UART: [art] Signing Cert with AUTHO
3,410,692 UART: RITY.KEYID = 7
3,426,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,879 UART: [art] PUB.X = 8BA97EB7546C412FBEF01E50C47B605E6391342BEAC599B16A7426FE265B3F064C266A12BE29CE2842F665594E8F680F
3,433,647 UART: [art] PUB.Y = 5F80A2167EA842754FF198A1448CC351780A15F5C88FC9C640D2011E1AE44D9A90F5CA2C4BF2E21AD865978E90D6DAC4
3,440,599 UART: [art] SIG.R = 71F2B1A52913AC70625541F298E78D7C2A155E0D5F366C6912BCC87CF6B251325814450CD2DE1E4A9EDF2DBF60CF9C56
3,447,371 UART: [art] SIG.S = D0B678C20A8E7C6E3C58EA43B71583912F8B77E6836191B194E47DEE6F5E1E4DABC526E050352187325F196414959CEE
3,470,717 UART: Caliptra RT
3,470,971 UART: [state] CFI Enabled
3,578,939 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,052 UART: [rt]cmd =0x494e464f, len=4
3,612,336 >>> mbox cmd response data (264 bytes)
3,612,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,416 UART:
3,613,432 UART: Running Caliptra ROM ...
3,613,840 UART:
3,613,894 UART: [state] CFI Enabled
3,616,764 UART: [state] LifecycleState = Unprovisioned
3,617,419 UART: [state] DebugLocked = No
3,618,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,600 UART: [kat] SHA2-256
4,413,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,646 UART: [kat] ++
4,417,798 UART: [kat] sha1
4,422,060 UART: [kat] SHA2-256
4,423,998 UART: [kat] SHA2-384
4,426,733 UART: [kat] SHA2-512-ACC
4,428,633 UART: [kat] ECC-384
4,434,166 UART: [kat] HMAC-384Kdf
4,438,610 UART: [kat] LMS
5,006,806 UART: [kat] --
5,007,731 UART: [update-reset] ++
6,341,257 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,342,483 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,492,401 >>> mbox cmd response: success
6,492,730 UART: [update-reset] Copying MAN_2 To MAN_1
6,500,744 UART: [update-reset Success] --
6,501,741 UART: [state] Locking Datavault
6,502,519 UART: [state] Locking PCR0, PCR1 and PCR31
6,503,123 UART: [state] Locking ICCM
6,503,573 UART: [exit] Launching FMC @ 0x40000130
6,508,902 UART:
6,508,918 UART: Running Caliptra FMC ...
6,509,326 UART:
6,509,380 UART: [state] CFI Enabled
6,598,483 UART: [art] Extend RT PCRs Done
6,598,911 UART: [art] Lock RT PCRs Done
6,600,304 UART: [art] Populate DV Done
6,608,376 UART: [fht] FMC Alias Private Key: 7
6,609,456 UART: [art] Derive CDI
6,609,736 UART: [art] Store in in slot 0x4
6,695,061 UART: [art] Derive Key Pair
6,695,421 UART: [art] Store priv key in slot 0x5
6,708,851 UART: [art] Derive Key Pair - Done
6,723,429 UART: [art] Signing Cert with AUTHO
6,723,909 UART: RITY.KEYID = 7
6,739,295 UART: [art] Erasing AUTHORITY.KEYID = 7
6,740,060 UART: [art] PUB.X = B3D25063570EB850686446B81ABE2AD31A0BA4AFC205DE97854667C8441046BAF560D73610F3DF854ABFB3F51235AC07
6,746,822 UART: [art] PUB.Y = 38E72439E4F5225A7A19DF5BE5BF28EE96F38AD04D492A4B8AFC0C8F04CD39E9DBB13B9756C415E5176CDF94F0BEE4E1
6,753,786 UART: [art] SIG.R = 9242FBDEF543F2E6131655E71215493359B25023780ED9EDA512751C8A802E615B9064B46F253A2116AD1F022040E8A5
6,760,540 UART: [art] SIG.S = D268ADE426D45F3BB92344FCD7D073FC100253571E639910DDCCCB3FC56FF20C60121BFD0A1C50908B23F975AB1F57C3
6,784,164 UART: Caliptra RT
6,784,418 UART: [state] CFI Enabled
7,067,360 UART: [rt] RT listening for mailbox commands...
7,068,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,467 UART: [rt]cmd =0x494e464f, len=4
7,100,795 >>> mbox cmd response data (264 bytes)
7,100,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,101,689 UART:
7,101,705 UART: Running Caliptra ROM ...
7,102,113 UART:
7,102,167 UART: [state] CFI Enabled
7,105,077 UART: [state] LifecycleState = Unprovisioned
7,105,732 UART: [state] DebugLocked = No
7,106,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,108,009 UART: [kat] SHA2-256
7,901,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,906,055 UART: [kat] ++
7,906,207 UART: [kat] sha1
7,910,385 UART: [kat] SHA2-256
7,912,323 UART: [kat] SHA2-384
7,915,228 UART: [kat] SHA2-512-ACC
7,917,128 UART: [kat] ECC-384
7,922,899 UART: [kat] HMAC-384Kdf
7,927,385 UART: [kat] LMS
8,495,581 UART: [kat] --
8,496,210 UART: [update-reset] ++
9,830,436 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,831,542 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
9,981,460 >>> mbox cmd response: success
9,981,697 UART: [update-reset] Copying MAN_2 To MAN_1
9,989,711 UART: [update-reset Success] --
9,990,534 UART: [state] Locking Datavault
9,991,136 UART: [state] Locking PCR0, PCR1 and PCR31
9,991,740 UART: [state] Locking ICCM
9,992,162 UART: [exit] Launching FMC @ 0x40000130
9,997,491 UART:
9,997,507 UART: Running Caliptra FMC ...
9,997,915 UART:
9,997,969 UART: [state] CFI Enabled
10,086,398 UART: [art] Extend RT PCRs Done
10,086,826 UART: [art] Lock RT PCRs Done
10,088,083 UART: [art] Populate DV Done
10,096,361 UART: [fht] FMC Alias Private Key: 7
10,097,515 UART: [art] Derive CDI
10,097,795 UART: [art] Store in in slot 0x4
10,183,816 UART: [art] Derive Key Pair
10,184,176 UART: [art] Store priv key in slot 0x5
10,197,512 UART: [art] Derive Key Pair - Done
10,212,217 UART: [art] Signing Cert with AUTHO
10,212,697 UART: RITY.KEYID = 7
10,228,061 UART: [art] Erasing AUTHORITY.KEYID = 7
10,228,826 UART: [art] PUB.X = 2365D4BB645D3409B7F8BEB2B1D3235D15457D92A8CBE67FF00AA789324635D01E54E4B89C4AE0B619A2F11A186601FC
10,235,593 UART: [art] PUB.Y = C76CF687D05DF03003A29AF5361C10C43E35B3F76CCA2484C6C63C17FC2D8CED4A6994DDA1159FBC11EA28F706744FBF
10,242,553 UART: [art] SIG.R = 51DD865F2B37458374FB466AE4FFB521BDD1D0EDEAD43EFBBE82CABC5B37654C852E603BAC5A27E82651638F36805E9C
10,249,341 UART: [art] SIG.S = 57368286E458EE761A70CC69997FB73901D202DEEA680CB5473EAE1D628FD98EE3C61738A6D356F3B89CD2CF809A38C6
10,272,803 UART: Caliptra RT
10,273,057 UART: [state] CFI Enabled
10,558,197 UART: [rt] RT listening for mailbox commands...
10,558,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,588,318 UART: [rt]cmd =0x494e464f, len=4
10,591,838 >>> mbox cmd response data (264 bytes)
10,591,839 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,592,846 UART:
10,592,862 UART: Running Caliptra ROM ...
10,593,270 UART:
10,593,324 UART: [state] CFI Enabled
10,595,990 UART: [state] LifecycleState = Unprovisioned
10,596,645 UART: [state] DebugLocked = No
10,597,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,598,854 UART: [kat] SHA2-256
11,392,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,396,900 UART: [kat] ++
11,397,052 UART: [kat] sha1
11,401,074 UART: [kat] SHA2-256
11,403,012 UART: [kat] SHA2-384
11,405,967 UART: [kat] SHA2-512-ACC
11,407,867 UART: [kat] ECC-384
11,413,390 UART: [kat] HMAC-384Kdf
11,417,912 UART: [kat] LMS
11,986,108 UART: [kat] --
11,986,899 UART: [update-reset] ++
13,322,351 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,323,527 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
13,473,445 >>> mbox cmd response: success
13,473,794 UART: [update-reset] Copying MAN_2 To MAN_1
13,481,808 UART: [update-reset Success] --
13,482,875 UART: [state] Locking Datavault
13,483,781 UART: [state] Locking PCR0, PCR1 and PCR31
13,484,385 UART: [state] Locking ICCM
13,484,919 UART: [exit] Launching FMC @ 0x40000130
13,490,248 UART:
13,490,264 UART: Running Caliptra FMC ...
13,490,672 UART:
13,490,726 UART: [state] CFI Enabled
13,579,897 UART: [art] Extend RT PCRs Done
13,580,325 UART: [art] Lock RT PCRs Done
13,581,502 UART: [art] Populate DV Done
13,590,010 UART: [fht] FMC Alias Private Key: 7
13,591,054 UART: [art] Derive CDI
13,591,334 UART: [art] Store in in slot 0x4
13,676,295 UART: [art] Derive Key Pair
13,676,655 UART: [art] Store priv key in slot 0x5
13,689,547 UART: [art] Derive Key Pair - Done
13,704,081 UART: [art] Signing Cert with AUTHO
13,704,561 UART: RITY.KEYID = 7
13,719,609 UART: [art] Erasing AUTHORITY.KEYID = 7
13,720,374 UART: [art] PUB.X = B3D25063570EB850686446B81ABE2AD31A0BA4AFC205DE97854667C8441046BAF560D73610F3DF854ABFB3F51235AC07
13,727,136 UART: [art] PUB.Y = 38E72439E4F5225A7A19DF5BE5BF28EE96F38AD04D492A4B8AFC0C8F04CD39E9DBB13B9756C415E5176CDF94F0BEE4E1
13,734,100 UART: [art] SIG.R = 9242FBDEF543F2E6131655E71215493359B25023780ED9EDA512751C8A802E615B9064B46F253A2116AD1F022040E8A5
13,740,854 UART: [art] SIG.S = D268ADE426D45F3BB92344FCD7D073FC100253571E639910DDCCCB3FC56FF20C60121BFD0A1C50908B23F975AB1F57C3
13,764,782 UART: Caliptra RT
13,765,036 UART: [state] CFI Enabled
14,047,190 UART: [rt] RT listening for mailbox commands...
14,047,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,077,371 UART: [rt]cmd =0x494e464f, len=4
14,080,625 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,413 ready_for_fw is high
1,362,413 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,654 >>> mbox cmd response: success
2,928,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,990,447 UART:
2,990,463 UART: Running Caliptra FMC ...
2,990,871 UART:
2,990,925 UART: [state] CFI Enabled
3,001,565 UART: [fht] FMC Alias Private Key: 7
3,109,192 UART: [art] Extend RT PCRs Done
3,109,620 UART: [art] Lock RT PCRs Done
3,111,342 UART: [art] Populate DV Done
3,119,564 UART: [fht] FMC Alias Private Key: 7
3,120,506 UART: [art] Derive CDI
3,120,786 UART: [art] Store in in slot 0x4
3,206,465 UART: [art] Derive Key Pair
3,206,825 UART: [art] Store priv key in slot 0x5
3,219,761 UART: [art] Derive Key Pair - Done
3,234,467 UART: [art] Signing Cert with AUTHO
3,234,947 UART: RITY.KEYID = 7
3,250,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,928 UART: [art] PUB.X = C4A7FAE67ECBE0D3D690589C9CBC0C438FAED3B9CCD6D02DD695D0C07663AD3231744F4D843FE363D8AF6C389DE58007
3,257,712 UART: [art] PUB.Y = 4E4CEE04559F5DB19CFECBDF74709EFF62C9C741A96A84F4721C30A8C81939A7580FCC02C0212A0C48E75FA295B95F60
3,264,662 UART: [art] SIG.R = C4D691359CC65F7DD05DB1BE2D45B723472BD217F11FD2D0CE52CC5507E9D212964E09E6F8A44F9AFB07C43E948D5C08
3,271,432 UART: [art] SIG.S = FC1F319613D2536659776E13EF23B7906A35CD40002493CDFC6F7572DDF6FE61D4D0B84B3B2F9A03499A641F8934584F
3,295,238 UART: Caliptra RT
3,295,492 UART: [state] CFI Enabled
3,404,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,478 UART: [rt]cmd =0x494e464f, len=4
3,437,966 >>> mbox cmd response data (264 bytes)
3,437,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,199,445 >>> mbox cmd response: success
6,212,848 UART:
6,212,864 UART: Running Caliptra FMC ...
6,213,272 UART:
6,213,326 UART: [state] CFI Enabled
6,302,617 UART: [art] Extend RT PCRs Done
6,303,045 UART: [art] Lock RT PCRs Done
6,304,156 UART: [art] Populate DV Done
6,312,526 UART: [fht] FMC Alias Private Key: 7
6,313,576 UART: [art] Derive CDI
6,313,856 UART: [art] Store in in slot 0x4
6,400,189 UART: [art] Derive Key Pair
6,400,549 UART: [art] Store priv key in slot 0x5
6,413,755 UART: [art] Derive Key Pair - Done
6,428,609 UART: [art] Signing Cert with AUTHO
6,429,089 UART: RITY.KEYID = 7
6,444,451 UART: [art] Erasing AUTHORITY.KEYID = 7
6,445,216 UART: [art] PUB.X = BDB4D93978BBD7C52D601666C66675B8C4683B0C6321E1A0A04B779B0BB3ABC77BAEDFA8F011CDCCF8254338BB46B6CF
6,452,000 UART: [art] PUB.Y = D29634671AEB76829F598475546AE63B3EB2C03BBDF62B21DC7DF335464229EACD67905041973661B3E2CB1B9B2B74C0
6,458,952 UART: [art] SIG.R = 6DF6A7B34062BABA986D42EAA19CD011CB8E8D593510E6DFE5BBD9AF68456990BA8913CC919F5131CEDA65482C2E4383
6,465,736 UART: [art] SIG.S = 68CBD0B0330DEEF60C9251E9F22E805D61E2007E374DA97AE2A98E4FEC94AD6621C3C76DE78DD6ADBB86D1BF68B2CB06
6,489,670 UART: Caliptra RT
6,489,924 UART: [state] CFI Enabled
6,773,186 UART: [rt] RT listening for mailbox commands...
6,773,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,803,485 UART: [rt]cmd =0x494e464f, len=4
6,807,007 >>> mbox cmd response data (264 bytes)
6,807,008 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,569,180 >>> mbox cmd response: success
9,582,665 UART:
9,582,681 UART: Running Caliptra FMC ...
9,583,089 UART:
9,583,143 UART: [state] CFI Enabled
9,672,088 UART: [art] Extend RT PCRs Done
9,672,516 UART: [art] Lock RT PCRs Done
9,673,627 UART: [art] Populate DV Done
9,681,851 UART: [fht] FMC Alias Private Key: 7
9,682,987 UART: [art] Derive CDI
9,683,267 UART: [art] Store in in slot 0x4
9,768,888 UART: [art] Derive Key Pair
9,769,248 UART: [art] Store priv key in slot 0x5
9,782,684 UART: [art] Derive Key Pair - Done
9,797,390 UART: [art] Signing Cert with AUTHO
9,797,870 UART: RITY.KEYID = 7
9,812,938 UART: [art] Erasing AUTHORITY.KEYID = 7
9,813,703 UART: [art] PUB.X = 01DC1F344C63D1857AC0A16B0ACD0A39457240FFC1EFAE1E04DE7F96107603147A8DDF403B29CAF310BF8CC254F8DB1E
9,820,476 UART: [art] PUB.Y = 48648BA6B5A5673989C6AE0EF67AD2577C2188407EF3F9B2A4CE8F138FA7949BAB8AA2E41A48476A11E39BE8361F7F08
9,827,428 UART: [art] SIG.R = 2352DBBF30E0CE1EDEB9EF7336C9124CF9D82785376C85B4F3BA8A207A7107EA203C0DF15A3FBC11007CC869B4EE884E
9,834,186 UART: [art] SIG.S = 0988A195C5B7CEA83DB6FC6F4CD1D6F6F90891B21C3C794704463F7F11F2EBFE6628B89908383121292F522B3B5FF743
9,857,589 UART: Caliptra RT
9,857,843 UART: [state] CFI Enabled
10,139,945 UART: [rt] RT listening for mailbox commands...
10,140,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,170,020 UART: [rt]cmd =0x494e464f, len=4
10,173,202 >>> mbox cmd response data (264 bytes)
10,173,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,934,471 >>> mbox cmd response: success
12,947,694 UART:
12,947,710 UART: Running Caliptra FMC ...
12,948,118 UART:
12,948,172 UART: [state] CFI Enabled
13,037,059 UART: [art] Extend RT PCRs Done
13,037,487 UART: [art] Lock RT PCRs Done
13,038,520 UART: [art] Populate DV Done
13,046,744 UART: [fht] FMC Alias Private Key: 7
13,047,822 UART: [art] Derive CDI
13,048,102 UART: [art] Store in in slot 0x4
13,133,495 UART: [art] Derive Key Pair
13,133,855 UART: [art] Store priv key in slot 0x5
13,147,181 UART: [art] Derive Key Pair - Done
13,161,707 UART: [art] Signing Cert with AUTHO
13,162,187 UART: RITY.KEYID = 7
13,177,329 UART: [art] Erasing AUTHORITY.KEYID = 7
13,178,094 UART: [art] PUB.X = BDB4D93978BBD7C52D601666C66675B8C4683B0C6321E1A0A04B779B0BB3ABC77BAEDFA8F011CDCCF8254338BB46B6CF
13,184,878 UART: [art] PUB.Y = D29634671AEB76829F598475546AE63B3EB2C03BBDF62B21DC7DF335464229EACD67905041973661B3E2CB1B9B2B74C0
13,191,830 UART: [art] SIG.R = 6DF6A7B34062BABA986D42EAA19CD011CB8E8D593510E6DFE5BBD9AF68456990BA8913CC919F5131CEDA65482C2E4383
13,198,614 UART: [art] SIG.S = 68CBD0B0330DEEF60C9251E9F22E805D61E2007E374DA97AE2A98E4FEC94AD6621C3C76DE78DD6ADBB86D1BF68B2CB06
13,222,076 UART: Caliptra RT
13,222,330 UART: [state] CFI Enabled
13,504,276 UART: [rt] RT listening for mailbox commands...
13,504,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,534,221 UART: [rt]cmd =0x494e464f, len=4
13,537,631 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.69s
Truncated 2120 bytes from beginning
,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,621 UART: [ldev] --
1,587,120 UART: [fwproc] Waiting for Commands...
1,587,815 UART: [fwproc] Received command 0x46574c44
1,588,606 UART: [fwproc] Received Image of size 114360 bytes
2,886,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,525 >>> mbox cmd response: success
3,078,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,079,743 UART: [afmc] ++
3,079,911 UART: [afmc] CDI.KEYID = 6
3,080,273 UART: [afmc] SUBJECT.KEYID = 7
3,080,698 UART: [afmc] AUTHORITY.KEYID = 5
3,115,410 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,448 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,138,140 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,144,013 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,149,727 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,157,464 UART: [afmc] --
3,158,344 UART: [cold-reset] --
3,159,016 UART: [state] Locking Datavault
3,160,045 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,649 UART: [state] Locking ICCM
3,161,217 UART: [exit] Launching FMC @ 0x40000130
3,166,546 UART:
3,166,562 UART: Running Caliptra FMC ...
3,166,970 UART:
3,167,113 UART: [state] CFI Enabled
3,178,049 UART: [fht] FMC Alias Private Key: 7
3,285,766 UART: [art] Extend RT PCRs Done
3,286,194 UART: [art] Lock RT PCRs Done
3,287,628 UART: [art] Populate DV Done
3,295,582 UART: [fht] FMC Alias Private Key: 7
3,296,594 UART: [art] Derive CDI
3,296,874 UART: [art] Store in in slot 0x4
3,382,505 UART: [art] Derive Key Pair
3,382,865 UART: [art] Store priv key in slot 0x5
3,395,917 UART: [art] Derive Key Pair - Done
3,410,624 UART: [art] Signing Cert with AUTHO
3,411,104 UART: RITY.KEYID = 7
3,426,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,977 UART: [art] PUB.X = D1B17BFD84B4452C9023638B3C3208C1F1EDEBE088E076CD1B8610B6371F2AE35E9E6A67A3B0EC70FE84F230159A8051
3,433,752 UART: [art] PUB.Y = B51CC6000343FB030928B28B8739B701822F6700202BD3A6FD7F080D8B63D40523F2AAA928730CBE1F7BF1CB37FE1D4E
3,440,640 UART: [art] SIG.R = 2FCAD613BEA13AB56B8186B4016B6D9EBBCB9F9FE2F406841119BC53769EE457642E5DF65A0A064E1E57747009E075CE
3,447,405 UART: [art] SIG.S = B09D4B5B31DA13C2AAC5BD321399D5DB733C3E5293D8997C42CFE92E6DED378C7938832579530400F4EBEE55CAA3E2D7
3,470,935 UART: Caliptra RT
3,471,281 UART: [state] CFI Enabled
3,578,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,440 UART: [rt]cmd =0x494e464f, len=4
3,611,772 >>> mbox cmd response data (264 bytes)
3,611,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,256 UART:
3,612,272 UART: Running Caliptra ROM ...
3,612,680 UART:
3,612,821 UART: [state] CFI Enabled
3,615,775 UART: [state] LifecycleState = Unprovisioned
3,616,430 UART: [state] DebugLocked = No
3,617,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,791 UART: [kat] SHA2-256
4,412,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,837 UART: [kat] ++
4,416,989 UART: [kat] sha1
4,421,249 UART: [kat] SHA2-256
4,423,187 UART: [kat] SHA2-384
4,425,802 UART: [kat] SHA2-512-ACC
4,427,702 UART: [kat] ECC-384
4,433,265 UART: [kat] HMAC-384Kdf
4,437,813 UART: [kat] LMS
5,006,009 UART: [kat] --
5,007,184 UART: [update-reset] ++
6,341,918 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,343,110 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,493,028 >>> mbox cmd response: success
6,493,141 UART: [update-reset] Copying MAN_2 To MAN_1
6,501,155 UART: [update-reset Success] --
6,502,134 UART: [state] Locking Datavault
6,502,780 UART: [state] Locking PCR0, PCR1 and PCR31
6,503,384 UART: [state] Locking ICCM
6,503,904 UART: [exit] Launching FMC @ 0x40000130
6,509,233 UART:
6,509,249 UART: Running Caliptra FMC ...
6,509,657 UART:
6,509,800 UART: [state] CFI Enabled
6,599,231 UART: [art] Extend RT PCRs Done
6,599,659 UART: [art] Lock RT PCRs Done
6,600,786 UART: [art] Populate DV Done
6,608,910 UART: [fht] FMC Alias Private Key: 7
6,609,938 UART: [art] Derive CDI
6,610,218 UART: [art] Store in in slot 0x4
6,696,235 UART: [art] Derive Key Pair
6,696,595 UART: [art] Store priv key in slot 0x5
6,709,923 UART: [art] Derive Key Pair - Done
6,724,899 UART: [art] Signing Cert with AUTHO
6,725,379 UART: RITY.KEYID = 7
6,740,467 UART: [art] Erasing AUTHORITY.KEYID = 7
6,741,232 UART: [art] PUB.X = 6BDFD297E584F364E22AD6BA538293A35ED041154EDC2FCF2DBF2C836FD1229D1C4DB837A141DA1A1922D6E6279671AA
6,748,016 UART: [art] PUB.Y = 107C839D3145B00EFE6F2F3488F9C39F7171D693C3D5A3DA6BFCE71ECA75797137CDEBC681487C3651DEDB3E2150CEB3
6,754,977 UART: [art] SIG.R = 4EEC6D39CE526F6C8EE079822E9841A69055E773442C2FDF28D31C0E3DBE42E9DE08ADCA33FB7BAF92313E4703209779
6,761,748 UART: [art] SIG.S = 55B3396907432C18C06E3C103A6BE33486622453D24CB10E1584DD8AE43CF65E2C0ED9B3AD82B6098F121E40F7A2D591
6,785,317 UART: Caliptra RT
6,785,663 UART: [state] CFI Enabled
7,064,787 UART: [rt] RT listening for mailbox commands...
7,065,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,094,900 UART: [rt]cmd =0x494e464f, len=4
7,098,076 >>> mbox cmd response data (264 bytes)
7,098,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,098,714 UART:
7,098,730 UART: Running Caliptra ROM ...
7,099,138 UART:
7,099,279 UART: [state] CFI Enabled
7,102,093 UART: [state] LifecycleState = Unprovisioned
7,102,748 UART: [state] DebugLocked = No
7,103,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,104,963 UART: [kat] SHA2-256
7,898,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,903,009 UART: [kat] ++
7,903,161 UART: [kat] sha1
7,907,309 UART: [kat] SHA2-256
7,909,247 UART: [kat] SHA2-384
7,912,096 UART: [kat] SHA2-512-ACC
7,913,996 UART: [kat] ECC-384
7,919,557 UART: [kat] HMAC-384Kdf
7,924,121 UART: [kat] LMS
8,492,317 UART: [kat] --
8,492,980 UART: [update-reset] ++
9,827,256 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,828,306 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
9,978,224 >>> mbox cmd response: success
9,978,431 UART: [update-reset] Copying MAN_2 To MAN_1
9,986,445 UART: [update-reset Success] --
9,987,464 UART: [state] Locking Datavault
9,988,278 UART: [state] Locking PCR0, PCR1 and PCR31
9,988,882 UART: [state] Locking ICCM
9,989,542 UART: [exit] Launching FMC @ 0x40000130
9,994,871 UART:
9,994,887 UART: Running Caliptra FMC ...
9,995,295 UART:
9,995,438 UART: [state] CFI Enabled
10,084,725 UART: [art] Extend RT PCRs Done
10,085,153 UART: [art] Lock RT PCRs Done
10,086,562 UART: [art] Populate DV Done
10,095,018 UART: [fht] FMC Alias Private Key: 7
10,096,006 UART: [art] Derive CDI
10,096,286 UART: [art] Store in in slot 0x4
10,182,187 UART: [art] Derive Key Pair
10,182,547 UART: [art] Store priv key in slot 0x5
10,196,293 UART: [art] Derive Key Pair - Done
10,211,137 UART: [art] Signing Cert with AUTHO
10,211,617 UART: RITY.KEYID = 7
10,226,923 UART: [art] Erasing AUTHORITY.KEYID = 7
10,227,688 UART: [art] PUB.X = C0A19BE7DCFF69D75BA955B1A70634544995AFCA1BB5BE882DBE276F96A172ED4C60A11186AAB87F6A7BF73C35D04F7B
10,234,475 UART: [art] PUB.Y = 03EE48D75154B21D09A2459DA3B8F962AF6911B86F584366D827C76F8190C3A55B74C8C47E1CA4E449B157F469E57586
10,241,415 UART: [art] SIG.R = 2E5417C36BD45619DFBC9464B4DCA3BA1BBC79C45B596B9D67ED9D94884000A845D0D0015CB2B9D418D8B574A8BC652F
10,248,172 UART: [art] SIG.S = 3E82F387F2C800E604817060A990887928F2AFA6F610BE836E7FDC56542D441B772C070EFB8D3C59128EDC5A85F2D744
10,271,818 UART: Caliptra RT
10,272,164 UART: [state] CFI Enabled
10,557,140 UART: [rt] RT listening for mailbox commands...
10,557,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,587,239 UART: [rt]cmd =0x494e464f, len=4
10,590,465 >>> mbox cmd response data (264 bytes)
10,590,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,591,331 UART:
10,591,347 UART: Running Caliptra ROM ...
10,591,755 UART:
10,591,896 UART: [state] CFI Enabled
10,594,944 UART: [state] LifecycleState = Unprovisioned
10,595,599 UART: [state] DebugLocked = No
10,596,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,597,630 UART: [kat] SHA2-256
11,391,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,395,676 UART: [kat] ++
11,395,828 UART: [kat] sha1
11,400,032 UART: [kat] SHA2-256
11,401,970 UART: [kat] SHA2-384
11,404,575 UART: [kat] SHA2-512-ACC
11,406,475 UART: [kat] ECC-384
11,411,918 UART: [kat] HMAC-384Kdf
11,416,466 UART: [kat] LMS
11,984,662 UART: [kat] --
11,985,361 UART: [update-reset] ++
13,320,259 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,321,495 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
13,471,413 >>> mbox cmd response: success
13,471,668 UART: [update-reset] Copying MAN_2 To MAN_1
13,479,682 UART: [update-reset Success] --
13,480,787 UART: [state] Locking Datavault
13,481,709 UART: [state] Locking PCR0, PCR1 and PCR31
13,482,313 UART: [state] Locking ICCM
13,482,789 UART: [exit] Launching FMC @ 0x40000130
13,488,118 UART:
13,488,134 UART: Running Caliptra FMC ...
13,488,542 UART:
13,488,685 UART: [state] CFI Enabled
13,577,410 UART: [art] Extend RT PCRs Done
13,577,838 UART: [art] Lock RT PCRs Done
13,579,237 UART: [art] Populate DV Done
13,587,237 UART: [fht] FMC Alias Private Key: 7
13,588,237 UART: [art] Derive CDI
13,588,517 UART: [art] Store in in slot 0x4
13,674,146 UART: [art] Derive Key Pair
13,674,506 UART: [art] Store priv key in slot 0x5
13,687,758 UART: [art] Derive Key Pair - Done
13,702,318 UART: [art] Signing Cert with AUTHO
13,702,798 UART: RITY.KEYID = 7
13,717,876 UART: [art] Erasing AUTHORITY.KEYID = 7
13,718,641 UART: [art] PUB.X = 6BDFD297E584F364E22AD6BA538293A35ED041154EDC2FCF2DBF2C836FD1229D1C4DB837A141DA1A1922D6E6279671AA
13,725,425 UART: [art] PUB.Y = 107C839D3145B00EFE6F2F3488F9C39F7171D693C3D5A3DA6BFCE71ECA75797137CDEBC681487C3651DEDB3E2150CEB3
13,732,386 UART: [art] SIG.R = 4EEC6D39CE526F6C8EE079822E9841A69055E773442C2FDF28D31C0E3DBE42E9DE08ADCA33FB7BAF92313E4703209779
13,739,157 UART: [art] SIG.S = 55B3396907432C18C06E3C103A6BE33486622453D24CB10E1584DD8AE43CF65E2C0ED9B3AD82B6098F121E40F7A2D591
13,763,422 UART: Caliptra RT
13,763,768 UART: [state] CFI Enabled
14,048,824 UART: [rt] RT listening for mailbox commands...
14,049,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,079,185 UART: [rt]cmd =0x494e464f, len=4
14,082,691 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 ready_for_fw is high
1,362,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,037 >>> mbox cmd response: success
2,928,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,989,708 UART:
2,989,724 UART: Running Caliptra FMC ...
2,990,132 UART:
2,990,275 UART: [state] CFI Enabled
3,000,919 UART: [fht] FMC Alias Private Key: 7
3,109,180 UART: [art] Extend RT PCRs Done
3,109,608 UART: [art] Lock RT PCRs Done
3,111,674 UART: [art] Populate DV Done
3,119,968 UART: [fht] FMC Alias Private Key: 7
3,121,062 UART: [art] Derive CDI
3,121,342 UART: [art] Store in in slot 0x4
3,206,725 UART: [art] Derive Key Pair
3,207,085 UART: [art] Store priv key in slot 0x5
3,220,251 UART: [art] Derive Key Pair - Done
3,234,832 UART: [art] Signing Cert with AUTHO
3,235,312 UART: RITY.KEYID = 7
3,250,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,999 UART: [art] PUB.X = 2FEF85DDF543364ED6C977A897034FA7C88EABE707C8E45627FD496666297EF95C5418450D227AF8E738ECF3A69FEF97
3,257,768 UART: [art] PUB.Y = B6A4C636693A86037992CC1ECBD96857991D3227C2DA12644C2107C173439E71A675A5C963AF80842845889006974B65
3,264,693 UART: [art] SIG.R = F20088CCE59CEE45EAF03FCEE29899D007C61C4BA76EFD115ADD463F53140DBAE9D31894FEAB2664D99D7ACE4786F461
3,271,455 UART: [art] SIG.S = F6A9C6693E1BFD618AC80E9D5AE70DC50EC965BA889040F2B11F9D4C1650039D18AA4D32E39A0F1DC0C81EF33615CF27
3,294,923 UART: Caliptra RT
3,295,269 UART: [state] CFI Enabled
3,404,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,493 UART: [rt]cmd =0x494e464f, len=4
3,438,029 >>> mbox cmd response data (264 bytes)
3,438,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,199,729 >>> mbox cmd response: success
6,213,352 UART:
6,213,368 UART: Running Caliptra FMC ...
6,213,776 UART:
6,213,919 UART: [state] CFI Enabled
6,302,956 UART: [art] Extend RT PCRs Done
6,303,384 UART: [art] Lock RT PCRs Done
6,304,717 UART: [art] Populate DV Done
6,312,829 UART: [fht] FMC Alias Private Key: 7
6,313,759 UART: [art] Derive CDI
6,314,039 UART: [art] Store in in slot 0x4
6,399,756 UART: [art] Derive Key Pair
6,400,116 UART: [art] Store priv key in slot 0x5
6,413,454 UART: [art] Derive Key Pair - Done
6,428,058 UART: [art] Signing Cert with AUTHO
6,428,538 UART: RITY.KEYID = 7
6,443,614 UART: [art] Erasing AUTHORITY.KEYID = 7
6,444,379 UART: [art] PUB.X = 1A2F36A81FBFFF8DF045762915BEE6CC59EDC79B6B06EFDFE1EBDD44A338520EF31CD0C6BE649D4D9FB443E04D6602F3
6,451,166 UART: [art] PUB.Y = E75AE7192C66E2CD10DC256C6524A19A61491DD7924538A19B974AD6F6D7ABE4CFB4C842098C0506612BA542FAD0E930
6,458,113 UART: [art] SIG.R = C9F3783671F0C6A7654C9B844A097D595D431680C69A257A1C50215D162FCFB3824196F5D93F9D2F0314B63A022DDA5F
6,464,872 UART: [art] SIG.S = B45777DBCD3DACF2FFDEDC49695BEE804A1AD5B2B53C4A450C386BFCFEBB125BECEFD05BAC5C80B7B367CC9181D97AD1
6,488,718 UART: Caliptra RT
6,489,064 UART: [state] CFI Enabled
6,776,934 UART: [rt] RT listening for mailbox commands...
6,777,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,807,089 UART: [rt]cmd =0x494e464f, len=4
6,810,547 >>> mbox cmd response data (264 bytes)
6,810,548 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,572,187 >>> mbox cmd response: success
9,585,572 UART:
9,585,588 UART: Running Caliptra FMC ...
9,585,996 UART:
9,586,139 UART: [state] CFI Enabled
9,675,320 UART: [art] Extend RT PCRs Done
9,675,748 UART: [art] Lock RT PCRs Done
9,676,947 UART: [art] Populate DV Done
9,685,495 UART: [fht] FMC Alias Private Key: 7
9,686,545 UART: [art] Derive CDI
9,686,825 UART: [art] Store in in slot 0x4
9,772,542 UART: [art] Derive Key Pair
9,772,902 UART: [art] Store priv key in slot 0x5
9,786,520 UART: [art] Derive Key Pair - Done
9,801,304 UART: [art] Signing Cert with AUTHO
9,801,784 UART: RITY.KEYID = 7
9,816,906 UART: [art] Erasing AUTHORITY.KEYID = 7
9,817,671 UART: [art] PUB.X = 263E236B154C758EEB8DFD1A46DEFC2CAB218F29D9AA1B49949A48EBD09009B171F24265330383191DF21B21EEC60BBB
9,824,444 UART: [art] PUB.Y = 0E9FCAD6782E335EF60725C6934E87BBFCFC0390B378B8EF5C5C54E018EA3616349531C704CAA0A964D0CE6953955321
9,831,386 UART: [art] SIG.R = E2DF4956136761515B23BF4C52C9CF692260382AC002FEC8AB7B89CFB67919ACBFF969BF9C5BE4766815B6E6FBB6240B
9,838,162 UART: [art] SIG.S = 04B30AAAB1F37A80B81C6BD14B5CDE24FD1ABAE1842FCC1373D5CEEDFEADB45D6BFF337261139E34E463233D0DD8FC7D
9,861,808 UART: Caliptra RT
9,862,154 UART: [state] CFI Enabled
10,144,007 UART: [rt] RT listening for mailbox commands...
10,144,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,174,162 UART: [rt]cmd =0x494e464f, len=4
10,177,538 >>> mbox cmd response data (264 bytes)
10,177,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,940,388 >>> mbox cmd response: success
12,953,595 UART:
12,953,611 UART: Running Caliptra FMC ...
12,954,019 UART:
12,954,162 UART: [state] CFI Enabled
13,043,283 UART: [art] Extend RT PCRs Done
13,043,711 UART: [art] Lock RT PCRs Done
13,044,918 UART: [art] Populate DV Done
13,052,986 UART: [fht] FMC Alias Private Key: 7
13,053,944 UART: [art] Derive CDI
13,054,224 UART: [art] Store in in slot 0x4
13,139,923 UART: [art] Derive Key Pair
13,140,283 UART: [art] Store priv key in slot 0x5
13,153,571 UART: [art] Derive Key Pair - Done
13,168,239 UART: [art] Signing Cert with AUTHO
13,168,719 UART: RITY.KEYID = 7
13,183,745 UART: [art] Erasing AUTHORITY.KEYID = 7
13,184,510 UART: [art] PUB.X = 1A2F36A81FBFFF8DF045762915BEE6CC59EDC79B6B06EFDFE1EBDD44A338520EF31CD0C6BE649D4D9FB443E04D6602F3
13,191,297 UART: [art] PUB.Y = E75AE7192C66E2CD10DC256C6524A19A61491DD7924538A19B974AD6F6D7ABE4CFB4C842098C0506612BA542FAD0E930
13,198,244 UART: [art] SIG.R = C9F3783671F0C6A7654C9B844A097D595D431680C69A257A1C50215D162FCFB3824196F5D93F9D2F0314B63A022DDA5F
13,205,003 UART: [art] SIG.S = B45777DBCD3DACF2FFDEDC49695BEE804A1AD5B2B53C4A450C386BFCFEBB125BECEFD05BAC5C80B7B367CC9181D97AD1
13,228,751 UART: Caliptra RT
13,229,097 UART: [state] CFI Enabled
13,516,295 UART: [rt] RT listening for mailbox commands...
13,516,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,546,394 UART: [rt]cmd =0x494e464f, len=4
13,549,714 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.74s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,077 UART: [ldev] --
1,283,506 UART: [fwproc] Wait for Commands...
1,284,272 UART: [fwproc] Recv command 0x46574c44
1,285,000 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,451 >>> mbox cmd response: success
2,775,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,776,643 UART: [afmc] ++
2,776,811 UART: [afmc] CDI.KEYID = 6
2,777,173 UART: [afmc] SUBJECT.KEYID = 7
2,777,598 UART: [afmc] AUTHORITY.KEYID = 5
2,812,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,957 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,835,649 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,841,522 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,847,224 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,855,093 UART: [afmc] --
2,856,131 UART: [cold-reset] --
2,857,101 UART: [state] Locking Datavault
2,858,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,680 UART: [state] Locking ICCM
2,859,354 UART: [exit] Launching FMC @ 0x40000130
2,864,683 UART:
2,864,699 UART: Running Caliptra FMC ...
2,865,107 UART:
2,865,161 UART: [state] CFI Enabled
2,875,339 UART: [fht] FMC Alias Private Key: 7
2,983,772 UART: [art] Extend RT PCRs Done
2,984,200 UART: [art] Lock RT PCRs Done
2,986,062 UART: [art] Populate DV Done
2,994,350 UART: [fht] FMC Alias Private Key: 7
2,995,306 UART: [art] Derive CDI
2,995,586 UART: [art] Store in in slot 0x4
3,081,019 UART: [art] Derive Key Pair
3,081,379 UART: [art] Store priv key in slot 0x5
3,094,123 UART: [art] Derive Key Pair - Done
3,109,008 UART: [art] Signing Cert with AUTHO
3,109,488 UART: RITY.KEYID = 7
3,124,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,363 UART: [art] PUB.X = E55883410F9C71A97AB335C3C0772FF67A8DC42DA0D5479D90CBB1BF8AD961BDCD421FA721BC2BA213C1786F6009ABED
3,132,145 UART: [art] PUB.Y = 054E7F5F700747FF6E5DFCB3BD8C41EF6E67BFB41BD1F16D3D9FEFFABB7603080C38717DE4EC20AC06D33D3B28953F2F
3,139,101 UART: [art] SIG.R = E9705FC05A0A9659BE11D6B8F15194A216F8E456574BAE5F39EA5EC247FB5486C7D7E32CBB735642A21E645458DC77F7
3,145,874 UART: [art] SIG.S = 4F653955132723D5A1749E994683C4CE5EBA3A33625F229AB1A8DBEAD2CAD3000B6BB1B1236C02232D611C2370BFCA0D
3,169,286 UART: Caliptra RT
3,169,540 UART: [state] CFI Enabled
3,276,862 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,135 UART: [rt]cmd =0x494e464f, len=4
3,310,621 >>> mbox cmd response data (264 bytes)
3,310,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,240 UART:
3,311,256 UART: Running Caliptra ROM ...
3,311,664 UART:
3,311,719 UART: [state] CFI Enabled
3,313,865 UART: [state] LifecycleState = Unprovisioned
3,314,520 UART: [state] DebugLocked = No
3,315,056 UART: [state] WD Timer not started. Device not locked for debugging
3,316,330 UART: [kat] SHA2-256
4,121,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,105 UART: [kat] ++
4,126,257 UART: [kat] sha1
4,130,621 UART: [kat] SHA2-256
4,132,561 UART: [kat] SHA2-384
4,135,398 UART: [kat] SHA2-512-ACC
4,137,298 UART: [kat] ECC-384
4,146,599 UART: [kat] HMAC-384Kdf
4,151,325 UART: [kat] LMS
4,399,653 UART: [kat] --
4,400,503 UART: [update-reset] ++
5,711,114 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,712,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,862,107 >>> mbox cmd response: success
5,862,462 UART: [update-reset] Copying MAN_2 To MAN_1
5,870,476 UART: [update-reset Success] --
5,871,619 UART: [state] Locking Datavault
5,872,523 UART: [state] Locking PCR0, PCR1 and PCR31
5,873,127 UART: [state] Locking ICCM
5,873,651 UART: [exit] Launching FMC @ 0x40000130
5,878,980 UART:
5,878,996 UART: Running Caliptra FMC ...
5,879,404 UART:
5,879,458 UART: [state] CFI Enabled
5,968,401 UART: [art] Extend RT PCRs Done
5,968,829 UART: [art] Lock RT PCRs Done
5,970,222 UART: [art] Populate DV Done
5,978,382 UART: [fht] FMC Alias Private Key: 7
5,979,404 UART: [art] Derive CDI
5,979,684 UART: [art] Store in in slot 0x4
6,065,581 UART: [art] Derive Key Pair
6,065,941 UART: [art] Store priv key in slot 0x5
6,079,163 UART: [art] Derive Key Pair - Done
6,094,159 UART: [art] Signing Cert with AUTHO
6,094,639 UART: RITY.KEYID = 7
6,109,751 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,516 UART: [art] PUB.X = D1E8CCAA4314FEA85450217D3F4AC7A25B85444D38D6849504EF3C148E7320344B3F971D9A7B77EBB01FDBE37F61CB05
6,117,290 UART: [art] PUB.Y = 502453E92B205758ADA514B8A7870267AF8FED48D4359D2A579729F5486AF4A900AA54AE396145A456634C11FA00999B
6,124,187 UART: [art] SIG.R = 9B446FC6DA97C321DA1FDC2CDC6A9305A1C9C53D90812DEFBB9B65B61FABF4EE774EB403CFDCBE64B96617B26CBE2A73
6,130,981 UART: [art] SIG.S = C4DF9B1EA0B3E52B4456832B1D8A9E044026DA1071152889B0CE56A36AD8DAE3E3A18A75C43022B138B8D13B86F1CC70
6,154,791 UART: Caliptra RT
6,155,045 UART: [state] CFI Enabled
6,439,604 UART: [rt] RT listening for mailbox commands...
6,440,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,469,653 UART: [rt]cmd =0x494e464f, len=4
6,472,883 >>> mbox cmd response data (264 bytes)
6,472,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,473,648 UART:
6,473,664 UART: Running Caliptra ROM ...
6,474,072 UART:
6,474,127 UART: [state] CFI Enabled
6,476,275 UART: [state] LifecycleState = Unprovisioned
6,476,930 UART: [state] DebugLocked = No
6,477,586 UART: [state] WD Timer not started. Device not locked for debugging
6,478,808 UART: [kat] SHA2-256
7,284,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,288,583 UART: [kat] ++
7,288,735 UART: [kat] sha1
7,292,997 UART: [kat] SHA2-256
7,294,937 UART: [kat] SHA2-384
7,297,862 UART: [kat] SHA2-512-ACC
7,299,762 UART: [kat] ECC-384
7,309,645 UART: [kat] HMAC-384Kdf
7,314,219 UART: [kat] LMS
7,562,547 UART: [kat] --
7,563,371 UART: [update-reset] ++
8,875,099 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,876,214 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
9,026,080 >>> mbox cmd response: success
9,026,361 UART: [update-reset] Copying MAN_2 To MAN_1
9,034,375 UART: [update-reset Success] --
9,035,438 UART: [state] Locking Datavault
9,036,186 UART: [state] Locking PCR0, PCR1 and PCR31
9,036,790 UART: [state] Locking ICCM
9,037,382 UART: [exit] Launching FMC @ 0x40000130
9,042,711 UART:
9,042,727 UART: Running Caliptra FMC ...
9,043,135 UART:
9,043,189 UART: [state] CFI Enabled
9,132,072 UART: [art] Extend RT PCRs Done
9,132,500 UART: [art] Lock RT PCRs Done
9,133,557 UART: [art] Populate DV Done
9,141,645 UART: [fht] FMC Alias Private Key: 7
9,142,637 UART: [art] Derive CDI
9,142,917 UART: [art] Store in in slot 0x4
9,228,616 UART: [art] Derive Key Pair
9,228,976 UART: [art] Store priv key in slot 0x5
9,242,558 UART: [art] Derive Key Pair - Done
9,257,382 UART: [art] Signing Cert with AUTHO
9,257,862 UART: RITY.KEYID = 7
9,272,500 UART: [art] Erasing AUTHORITY.KEYID = 7
9,273,265 UART: [art] PUB.X = F99FE3212D83E9B99252D3364DA30DBF1DF13B880BA35AD75C70DC2D55BF7A8B1A02C9C1E74385CEC5FF4025442FB1CA
9,280,044 UART: [art] PUB.Y = 3A5E096F202B94CFDA88A08659F3DAA45DB0E6B3A9C59CE124F89C4E05F3802B8860C5D72D1668456279C3C9F7BE3932
9,286,994 UART: [art] SIG.R = 80FD7024DBD9D4C0A47EAD5B36EB69A8B0F037B696E7EA30172401AAA5E1F37AE7C32B4CB5068E7D08E907B422688FF6
9,293,766 UART: [art] SIG.S = E5002EBB8244CBEE796451417D53A101D4512E05BF65223A93F28CF5B662FCBAA5B303D75EA008F1692AE758CCD81C56
9,317,273 UART: Caliptra RT
9,317,527 UART: [state] CFI Enabled
9,600,090 UART: [rt] RT listening for mailbox commands...
9,600,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,630,093 UART: [rt]cmd =0x494e464f, len=4
9,633,243 >>> mbox cmd response data (264 bytes)
9,633,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,634,012 UART:
9,634,028 UART: Running Caliptra ROM ...
9,634,436 UART:
9,634,491 UART: [state] CFI Enabled
9,637,389 UART: [state] LifecycleState = Unprovisioned
9,638,044 UART: [state] DebugLocked = No
9,638,748 UART: [state] WD Timer not started. Device not locked for debugging
9,640,068 UART: [kat] SHA2-256
10,445,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,449,843 UART: [kat] ++
10,449,995 UART: [kat] sha1
10,454,255 UART: [kat] SHA2-256
10,456,195 UART: [kat] SHA2-384
10,458,756 UART: [kat] SHA2-512-ACC
10,460,656 UART: [kat] ECC-384
10,470,199 UART: [kat] HMAC-384Kdf
10,474,795 UART: [kat] LMS
10,723,123 UART: [kat] --
10,723,795 UART: [update-reset] ++
12,035,310 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,036,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
12,186,221 >>> mbox cmd response: success
12,186,502 UART: [update-reset] Copying MAN_2 To MAN_1
12,194,516 UART: [update-reset Success] --
12,195,681 UART: [state] Locking Datavault
12,196,611 UART: [state] Locking PCR0, PCR1 and PCR31
12,197,215 UART: [state] Locking ICCM
12,197,871 UART: [exit] Launching FMC @ 0x40000130
12,203,200 UART:
12,203,216 UART: Running Caliptra FMC ...
12,203,624 UART:
12,203,678 UART: [state] CFI Enabled
12,292,557 UART: [art] Extend RT PCRs Done
12,292,985 UART: [art] Lock RT PCRs Done
12,294,458 UART: [art] Populate DV Done
12,302,670 UART: [fht] FMC Alias Private Key: 7
12,303,732 UART: [art] Derive CDI
12,304,012 UART: [art] Store in in slot 0x4
12,390,057 UART: [art] Derive Key Pair
12,390,417 UART: [art] Store priv key in slot 0x5
12,403,767 UART: [art] Derive Key Pair - Done
12,418,329 UART: [art] Signing Cert with AUTHO
12,418,809 UART: RITY.KEYID = 7
12,434,603 UART: [art] Erasing AUTHORITY.KEYID = 7
12,435,368 UART: [art] PUB.X = D1E8CCAA4314FEA85450217D3F4AC7A25B85444D38D6849504EF3C148E7320344B3F971D9A7B77EBB01FDBE37F61CB05
12,442,142 UART: [art] PUB.Y = 502453E92B205758ADA514B8A7870267AF8FED48D4359D2A579729F5486AF4A900AA54AE396145A456634C11FA00999B
12,449,039 UART: [art] SIG.R = 9B446FC6DA97C321DA1FDC2CDC6A9305A1C9C53D90812DEFBB9B65B61FABF4EE774EB403CFDCBE64B96617B26CBE2A73
12,455,833 UART: [art] SIG.S = C4DF9B1EA0B3E52B4456832B1D8A9E044026DA1071152889B0CE56A36AD8DAE3E3A18A75C43022B138B8D13B86F1CC70
12,479,617 UART: Caliptra RT
12,479,871 UART: [state] CFI Enabled
12,764,740 UART: [rt] RT listening for mailbox commands...
12,765,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,794,871 UART: [rt]cmd =0x494e464f, len=4
12,798,159 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,703 ready_for_fw is high
1,059,703 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,734 >>> mbox cmd response: success
2,624,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,299 UART:
2,687,315 UART: Running Caliptra FMC ...
2,687,723 UART:
2,687,777 UART: [state] CFI Enabled
2,698,291 UART: [fht] FMC Alias Private Key: 7
2,806,120 UART: [art] Extend RT PCRs Done
2,806,548 UART: [art] Lock RT PCRs Done
2,808,026 UART: [art] Populate DV Done
2,815,996 UART: [fht] FMC Alias Private Key: 7
2,816,974 UART: [art] Derive CDI
2,817,254 UART: [art] Store in in slot 0x4
2,902,917 UART: [art] Derive Key Pair
2,903,277 UART: [art] Store priv key in slot 0x5
2,916,195 UART: [art] Derive Key Pair - Done
2,930,934 UART: [art] Signing Cert with AUTHO
2,931,414 UART: RITY.KEYID = 7
2,946,720 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,485 UART: [art] PUB.X = 047815A4D79A0EBF7B9D0B865FA3BB11F76998D7E9232FB99F814CEB839E34D39E86AE283998956B3FD42E717E997781
2,954,248 UART: [art] PUB.Y = 54FB228B656C87201C0C694154ABDE8A38C1E563C313C1A2DF2919B2AC9604E47AB9EF3FC6B46A80126B0E2BAF9D274E
2,961,201 UART: [art] SIG.R = B69EF9AC444FAB5D2741F84601DD8F59170A63C54BCC4657F260DFBD9340A1F58515A0D98A1FB5F418270A1D680F6CD2
2,967,969 UART: [art] SIG.S = FDCBCCD51AE79BAB28DC219F6D5B1E29FC52086F46DA8A41E2A19529687F5FC452957ED60D72470DE0A03E032C51ACFC
2,992,302 UART: Caliptra RT
2,992,556 UART: [state] CFI Enabled
3,100,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,955 UART: [rt]cmd =0x494e464f, len=4
3,134,295 >>> mbox cmd response data (264 bytes)
3,134,296 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,571,257 >>> mbox cmd response: success
5,585,021 UART:
5,585,037 UART: Running Caliptra FMC ...
5,585,445 UART:
5,585,499 UART: [state] CFI Enabled
5,675,144 UART: [art] Extend RT PCRs Done
5,675,572 UART: [art] Lock RT PCRs Done
5,676,847 UART: [art] Populate DV Done
5,685,097 UART: [fht] FMC Alias Private Key: 7
5,686,131 UART: [art] Derive CDI
5,686,411 UART: [art] Store in in slot 0x4
5,772,204 UART: [art] Derive Key Pair
5,772,564 UART: [art] Store priv key in slot 0x5
5,786,614 UART: [art] Derive Key Pair - Done
5,801,379 UART: [art] Signing Cert with AUTHO
5,801,859 UART: RITY.KEYID = 7
5,817,415 UART: [art] Erasing AUTHORITY.KEYID = 7
5,818,180 UART: [art] PUB.X = 2237986B8625DA82C58196864501F3C1A189F0340B0B7D54266EA0CD1177C5B526829A40C501C902E66D710261E61834
5,824,916 UART: [art] PUB.Y = BD666997EDCC1E3BAF4D1C8E91CB00994338545DE008B9D9A711A226F4C9BB3168613EB6E6A56BA02FA1612142905A2B
5,831,849 UART: [art] SIG.R = 754A79A05EE5213FB4076C0439B3FBD476B78BB56AF78CF83B51CA29FBE8C106C69494D6FF5672F742392F65CF3A8B52
5,838,618 UART: [art] SIG.S = 6E9DE225FF87912ADEA87BDA90E80A1A25A375550D18F300A6B786E22592B9F5F6184495AFA7662F5C097F741A86D7DA
5,862,118 UART: Caliptra RT
5,862,372 UART: [state] CFI Enabled
6,139,960 UART: [rt] RT listening for mailbox commands...
6,140,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,155 UART: [rt]cmd =0x494e464f, len=4
6,173,459 >>> mbox cmd response data (264 bytes)
6,173,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,612,687 >>> mbox cmd response: success
8,626,339 UART:
8,626,355 UART: Running Caliptra FMC ...
8,626,763 UART:
8,626,817 UART: [state] CFI Enabled
8,716,092 UART: [art] Extend RT PCRs Done
8,716,520 UART: [art] Lock RT PCRs Done
8,717,611 UART: [art] Populate DV Done
8,725,721 UART: [fht] FMC Alias Private Key: 7
8,726,725 UART: [art] Derive CDI
8,727,005 UART: [art] Store in in slot 0x4
8,812,520 UART: [art] Derive Key Pair
8,812,880 UART: [art] Store priv key in slot 0x5
8,825,628 UART: [art] Derive Key Pair - Done
8,840,605 UART: [art] Signing Cert with AUTHO
8,841,085 UART: RITY.KEYID = 7
8,856,255 UART: [art] Erasing AUTHORITY.KEYID = 7
8,857,020 UART: [art] PUB.X = A2A6D8EDD39CC15B4FBAF689E199EB023032CF4BF44A2C4670D733E9B8028F8A1CA002C474BF08DC76F115D084CED61E
8,863,796 UART: [art] PUB.Y = 2B61611972CB8567A9C195381B6B27C5360AF3623ABF193CD52E5A3291C314B71F6C964B82450D1EE739BAB8E035CDE5
8,870,742 UART: [art] SIG.R = BA412FEA715DFE0C2D016869882BE2C2398FA96FD6966DE9C7F516BD8538061509DE650F56A613E40B30AE444753CC7B
8,877,500 UART: [art] SIG.S = B8ACE3B1C1291AEC8ACB167A08DAF7DCF7E722DE7ECA753E08912A870C366DA9E97A55A9F93C2D1DCD019A1BC6C8A383
8,901,243 UART: Caliptra RT
8,901,497 UART: [state] CFI Enabled
9,182,814 UART: [rt] RT listening for mailbox commands...
9,183,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,213,091 UART: [rt]cmd =0x494e464f, len=4
9,216,549 >>> mbox cmd response data (264 bytes)
9,216,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,654,621 >>> mbox cmd response: success
11,668,101 UART:
11,668,117 UART: Running Caliptra FMC ...
11,668,525 UART:
11,668,579 UART: [state] CFI Enabled
11,757,706 UART: [art] Extend RT PCRs Done
11,758,134 UART: [art] Lock RT PCRs Done
11,759,459 UART: [art] Populate DV Done
11,767,993 UART: [fht] FMC Alias Private Key: 7
11,768,947 UART: [art] Derive CDI
11,769,227 UART: [art] Store in in slot 0x4
11,855,070 UART: [art] Derive Key Pair
11,855,430 UART: [art] Store priv key in slot 0x5
11,868,290 UART: [art] Derive Key Pair - Done
11,883,261 UART: [art] Signing Cert with AUTHO
11,883,741 UART: RITY.KEYID = 7
11,898,487 UART: [art] Erasing AUTHORITY.KEYID = 7
11,899,252 UART: [art] PUB.X = 2237986B8625DA82C58196864501F3C1A189F0340B0B7D54266EA0CD1177C5B526829A40C501C902E66D710261E61834
11,905,988 UART: [art] PUB.Y = BD666997EDCC1E3BAF4D1C8E91CB00994338545DE008B9D9A711A226F4C9BB3168613EB6E6A56BA02FA1612142905A2B
11,912,921 UART: [art] SIG.R = 754A79A05EE5213FB4076C0439B3FBD476B78BB56AF78CF83B51CA29FBE8C106C69494D6FF5672F742392F65CF3A8B52
11,919,690 UART: [art] SIG.S = 6E9DE225FF87912ADEA87BDA90E80A1A25A375550D18F300A6B786E22592B9F5F6184495AFA7662F5C097F741A86D7DA
11,943,218 UART: Caliptra RT
11,943,472 UART: [state] CFI Enabled
12,223,052 UART: [rt] RT listening for mailbox commands...
12,223,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,253,507 UART: [rt]cmd =0x494e464f, len=4
12,256,601 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.53s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,896 UART: [ldev] --
1,283,177 UART: [fwproc] Wait for Commands...
1,283,943 UART: [fwproc] Recv command 0x46574c44
1,284,671 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,302 >>> mbox cmd response: success
2,774,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,775,458 UART: [afmc] ++
2,775,626 UART: [afmc] CDI.KEYID = 6
2,775,988 UART: [afmc] SUBJECT.KEYID = 7
2,776,413 UART: [afmc] AUTHORITY.KEYID = 5
2,811,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,090 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,834,782 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,840,655 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,846,357 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,854,366 UART: [afmc] --
2,855,358 UART: [cold-reset] --
2,856,354 UART: [state] Locking Datavault
2,857,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,087 UART: [state] Locking ICCM
2,858,587 UART: [exit] Launching FMC @ 0x40000130
2,863,916 UART:
2,863,932 UART: Running Caliptra FMC ...
2,864,340 UART:
2,864,483 UART: [state] CFI Enabled
2,875,073 UART: [fht] FMC Alias Private Key: 7
2,982,898 UART: [art] Extend RT PCRs Done
2,983,326 UART: [art] Lock RT PCRs Done
2,985,132 UART: [art] Populate DV Done
2,993,172 UART: [fht] FMC Alias Private Key: 7
2,994,184 UART: [art] Derive CDI
2,994,464 UART: [art] Store in in slot 0x4
3,080,237 UART: [art] Derive Key Pair
3,080,597 UART: [art] Store priv key in slot 0x5
3,093,837 UART: [art] Derive Key Pair - Done
3,108,681 UART: [art] Signing Cert with AUTHO
3,109,161 UART: RITY.KEYID = 7
3,124,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,828 UART: [art] PUB.X = F568E41C415267B3F15FC077EBA842F70626462726D8019281734B55D48BB30D4018D0FEF1B09E15C56E0704FE955056
3,131,575 UART: [art] PUB.Y = 8DDB89E69D3EA145966220A3338175A5531D54D592C1D3453CEBB2C3431B93056B3D1ED7EC2C1541AD7A4B951687E112
3,138,522 UART: [art] SIG.R = A51DF53995F9B97E9F39618EE8FE58A26AE0F6CC04A1C284D403A010B61B513103626647F7E0E5369016999A9F98B501
3,145,276 UART: [art] SIG.S = 89AA77B358CE149EA59036D1550F1DFCE9414AEA633D62325187470FF572B424FA6B5196B3B25AECC3B659AB43C937F7
3,168,567 UART: Caliptra RT
3,168,913 UART: [state] CFI Enabled
3,276,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,340 UART: [rt]cmd =0x494e464f, len=4
3,309,700 >>> mbox cmd response data (264 bytes)
3,309,701 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,399 UART:
3,310,415 UART: Running Caliptra ROM ...
3,310,823 UART:
3,310,965 UART: [state] CFI Enabled
3,313,439 UART: [state] LifecycleState = Unprovisioned
3,314,094 UART: [state] DebugLocked = No
3,314,808 UART: [state] WD Timer not started. Device not locked for debugging
3,316,044 UART: [kat] SHA2-256
4,121,694 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,819 UART: [kat] ++
4,125,971 UART: [kat] sha1
4,130,237 UART: [kat] SHA2-256
4,132,177 UART: [kat] SHA2-384
4,134,956 UART: [kat] SHA2-512-ACC
4,136,856 UART: [kat] ECC-384
4,146,603 UART: [kat] HMAC-384Kdf
4,151,089 UART: [kat] LMS
4,399,417 UART: [kat] --
4,400,397 UART: [update-reset] ++
5,713,283 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,714,358 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,864,224 >>> mbox cmd response: success
5,864,473 UART: [update-reset] Copying MAN_2 To MAN_1
5,872,487 UART: [update-reset Success] --
5,873,374 UART: [state] Locking Datavault
5,873,946 UART: [state] Locking PCR0, PCR1 and PCR31
5,874,550 UART: [state] Locking ICCM
5,875,062 UART: [exit] Launching FMC @ 0x40000130
5,880,391 UART:
5,880,407 UART: Running Caliptra FMC ...
5,880,815 UART:
5,880,958 UART: [state] CFI Enabled
5,969,953 UART: [art] Extend RT PCRs Done
5,970,381 UART: [art] Lock RT PCRs Done
5,971,702 UART: [art] Populate DV Done
5,980,102 UART: [fht] FMC Alias Private Key: 7
5,981,080 UART: [art] Derive CDI
5,981,360 UART: [art] Store in in slot 0x4
6,067,211 UART: [art] Derive Key Pair
6,067,571 UART: [art] Store priv key in slot 0x5
6,081,491 UART: [art] Derive Key Pair - Done
6,095,847 UART: [art] Signing Cert with AUTHO
6,096,327 UART: RITY.KEYID = 7
6,111,725 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,490 UART: [art] PUB.X = 80387AF1574BC4B9A59DC5A15B9041A0F15A80342862E29A359FEEB2BAD6094FFC907DBE9D9356F302D80121A3B3E252
6,119,257 UART: [art] PUB.Y = E86948929B8218333AA4F41249FABC7E0DD2CB633A40102BAEFCBBE92F2573BE8896F8B174C4870E5E148FD696EF8DE0
6,126,213 UART: [art] SIG.R = F922198CCB2E042A4916DC0E437C3C6CF6E103F940525F5B3D8F804CAC8069092DFFEFC6BF668B473D3DB31A5337A449
6,132,981 UART: [art] SIG.S = B0D93DD36BA3F02D173D4A7B1DDCDBE2C18B5134C7D296519F905E463804866ED9BCD854F1BE91BEA5B7D14F05B93747
6,156,818 UART: Caliptra RT
6,157,164 UART: [state] CFI Enabled
6,440,729 UART: [rt] RT listening for mailbox commands...
6,441,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,822 UART: [rt]cmd =0x494e464f, len=4
6,473,908 >>> mbox cmd response data (264 bytes)
6,473,909 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,474,551 UART:
6,474,567 UART: Running Caliptra ROM ...
6,474,975 UART:
6,475,117 UART: [state] CFI Enabled
6,478,113 UART: [state] LifecycleState = Unprovisioned
6,478,768 UART: [state] DebugLocked = No
6,479,432 UART: [state] WD Timer not started. Device not locked for debugging
6,480,680 UART: [kat] SHA2-256
7,286,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,290,455 UART: [kat] ++
7,290,607 UART: [kat] sha1
7,294,653 UART: [kat] SHA2-256
7,296,593 UART: [kat] SHA2-384
7,299,514 UART: [kat] SHA2-512-ACC
7,301,414 UART: [kat] ECC-384
7,311,091 UART: [kat] HMAC-384Kdf
7,315,699 UART: [kat] LMS
7,564,027 UART: [kat] --
7,565,091 UART: [update-reset] ++
8,876,501 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,877,672 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
9,027,538 >>> mbox cmd response: success
9,027,773 UART: [update-reset] Copying MAN_2 To MAN_1
9,035,787 UART: [update-reset Success] --
9,036,910 UART: [state] Locking Datavault
9,037,594 UART: [state] Locking PCR0, PCR1 and PCR31
9,038,198 UART: [state] Locking ICCM
9,038,744 UART: [exit] Launching FMC @ 0x40000130
9,044,073 UART:
9,044,089 UART: Running Caliptra FMC ...
9,044,497 UART:
9,044,640 UART: [state] CFI Enabled
9,133,529 UART: [art] Extend RT PCRs Done
9,133,957 UART: [art] Lock RT PCRs Done
9,135,294 UART: [art] Populate DV Done
9,143,300 UART: [fht] FMC Alias Private Key: 7
9,144,246 UART: [art] Derive CDI
9,144,526 UART: [art] Store in in slot 0x4
9,230,033 UART: [art] Derive Key Pair
9,230,393 UART: [art] Store priv key in slot 0x5
9,243,157 UART: [art] Derive Key Pair - Done
9,258,280 UART: [art] Signing Cert with AUTHO
9,258,760 UART: RITY.KEYID = 7
9,274,050 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,815 UART: [art] PUB.X = B3ED96D582AD8D7E247131254BBD6DE1B0FF10CFF8C53E8D1AC2FB6FC608123E38F97D8BCE4527102688F0603BA39DF5
9,281,598 UART: [art] PUB.Y = 847836C55A9A40BB070EB50A7B351EDB96FB071D29FA6A63CB246ECF625E290DD28364FBE483F4B357669834626CAEA6
9,288,541 UART: [art] SIG.R = CFB7602A50EB4A4087A366356757239A320922EFBD040E80D632DDF5E3AD6D93AA1155630892F18AEA31E80B48ACB745
9,295,300 UART: [art] SIG.S = 118F3BD1AD9A3B3C2CF53888785120D8120E5780BD90938FEA7CD58616C7BDEB75B07FA4F16894B138E07EF1831801D1
9,319,091 UART: Caliptra RT
9,319,437 UART: [state] CFI Enabled
9,603,358 UART: [rt] RT listening for mailbox commands...
9,604,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,633,529 UART: [rt]cmd =0x494e464f, len=4
9,637,043 >>> mbox cmd response data (264 bytes)
9,637,044 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,637,918 UART:
9,637,934 UART: Running Caliptra ROM ...
9,638,342 UART:
9,638,484 UART: [state] CFI Enabled
9,641,518 UART: [state] LifecycleState = Unprovisioned
9,642,173 UART: [state] DebugLocked = No
9,642,857 UART: [state] WD Timer not started. Device not locked for debugging
9,644,183 UART: [kat] SHA2-256
10,449,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,453,958 UART: [kat] ++
10,454,110 UART: [kat] sha1
10,458,378 UART: [kat] SHA2-256
10,460,318 UART: [kat] SHA2-384
10,462,963 UART: [kat] SHA2-512-ACC
10,464,863 UART: [kat] ECC-384
10,474,366 UART: [kat] HMAC-384Kdf
10,479,128 UART: [kat] LMS
10,727,456 UART: [kat] --
10,728,390 UART: [update-reset] ++
12,040,446 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,041,519 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
12,191,385 >>> mbox cmd response: success
12,191,538 UART: [update-reset] Copying MAN_2 To MAN_1
12,199,552 UART: [update-reset Success] --
12,200,515 UART: [state] Locking Datavault
12,201,355 UART: [state] Locking PCR0, PCR1 and PCR31
12,201,959 UART: [state] Locking ICCM
12,202,559 UART: [exit] Launching FMC @ 0x40000130
12,207,888 UART:
12,207,904 UART: Running Caliptra FMC ...
12,208,312 UART:
12,208,455 UART: [state] CFI Enabled
12,297,624 UART: [art] Extend RT PCRs Done
12,298,052 UART: [art] Lock RT PCRs Done
12,299,341 UART: [art] Populate DV Done
12,307,541 UART: [fht] FMC Alias Private Key: 7
12,308,723 UART: [art] Derive CDI
12,309,003 UART: [art] Store in in slot 0x4
12,394,728 UART: [art] Derive Key Pair
12,395,088 UART: [art] Store priv key in slot 0x5
12,408,154 UART: [art] Derive Key Pair - Done
12,422,908 UART: [art] Signing Cert with AUTHO
12,423,388 UART: RITY.KEYID = 7
12,438,308 UART: [art] Erasing AUTHORITY.KEYID = 7
12,439,073 UART: [art] PUB.X = 80387AF1574BC4B9A59DC5A15B9041A0F15A80342862E29A359FEEB2BAD6094FFC907DBE9D9356F302D80121A3B3E252
12,445,840 UART: [art] PUB.Y = E86948929B8218333AA4F41249FABC7E0DD2CB633A40102BAEFCBBE92F2573BE8896F8B174C4870E5E148FD696EF8DE0
12,452,796 UART: [art] SIG.R = F922198CCB2E042A4916DC0E437C3C6CF6E103F940525F5B3D8F804CAC8069092DFFEFC6BF668B473D3DB31A5337A449
12,459,564 UART: [art] SIG.S = B0D93DD36BA3F02D173D4A7B1DDCDBE2C18B5134C7D296519F905E463804866ED9BCD854F1BE91BEA5B7D14F05B93747
12,483,189 UART: Caliptra RT
12,483,535 UART: [state] CFI Enabled
12,765,186 UART: [rt] RT listening for mailbox commands...
12,765,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,795,563 UART: [rt]cmd =0x494e464f, len=4
12,799,059 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,058 ready_for_fw is high
1,060,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,469 >>> mbox cmd response: success
2,624,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,686,418 UART:
2,686,434 UART: Running Caliptra FMC ...
2,686,842 UART:
2,686,985 UART: [state] CFI Enabled
2,697,253 UART: [fht] FMC Alias Private Key: 7
2,804,894 UART: [art] Extend RT PCRs Done
2,805,322 UART: [art] Lock RT PCRs Done
2,806,728 UART: [art] Populate DV Done
2,815,000 UART: [fht] FMC Alias Private Key: 7
2,816,158 UART: [art] Derive CDI
2,816,438 UART: [art] Store in in slot 0x4
2,901,815 UART: [art] Derive Key Pair
2,902,175 UART: [art] Store priv key in slot 0x5
2,915,239 UART: [art] Derive Key Pair - Done
2,929,879 UART: [art] Signing Cert with AUTHO
2,930,359 UART: RITY.KEYID = 7
2,945,435 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,200 UART: [art] PUB.X = 09FF269227464859A972B76D3E29CFF10089035BB8A0C711480A39C99397E17D18394FE2531C68724DC929A2ED03D4F9
2,952,928 UART: [art] PUB.Y = 8C683FC4A4D64612C2FEA5AD0154733BAA8A72179968271867B2C0698C28CFD63F380D1E98BEA427BCC3B163F33AE4F6
2,959,880 UART: [art] SIG.R = 60202AAEAC12498B6BF42A7A2C302E9B4A6F3F06EFCC348FF9AE533A906D9235E8DB2C8F635799173B07D09B828EED27
2,966,656 UART: [art] SIG.S = 9B0B53788D99186B417D685C55F6D3DF92EC84B91667FB57FBE8E1D2D237C356CCCB21DB550893C9D6502749BC085DED
2,989,972 UART: Caliptra RT
2,990,318 UART: [state] CFI Enabled
3,098,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,521 UART: [rt]cmd =0x494e464f, len=4
3,131,675 >>> mbox cmd response data (264 bytes)
3,131,676 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,568,948 >>> mbox cmd response: success
5,582,150 UART:
5,582,166 UART: Running Caliptra FMC ...
5,582,574 UART:
5,582,717 UART: [state] CFI Enabled
5,671,516 UART: [art] Extend RT PCRs Done
5,671,944 UART: [art] Lock RT PCRs Done
5,673,279 UART: [art] Populate DV Done
5,681,483 UART: [fht] FMC Alias Private Key: 7
5,682,621 UART: [art] Derive CDI
5,682,901 UART: [art] Store in in slot 0x4
5,768,530 UART: [art] Derive Key Pair
5,768,890 UART: [art] Store priv key in slot 0x5
5,782,338 UART: [art] Derive Key Pair - Done
5,796,983 UART: [art] Signing Cert with AUTHO
5,797,463 UART: RITY.KEYID = 7
5,812,395 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,160 UART: [art] PUB.X = 1CD3F70C4EE98E92371510A0FCB866174BF5A3B05A06B517EF1583912328E4C450A6EE1056D5AA3EC2968D63E5D4B2A8
5,819,930 UART: [art] PUB.Y = 4BB9E330ADFF8C1F625F82853CB579D9DFDC2BC09F5FF4927EC9A34A796F6FC6FB187F1863C27DE831A63E366AC6FA5F
5,826,902 UART: [art] SIG.R = 9467E4CC82B19D289E30FD20905FE0BC481B9E29B25510CA70761CC3929FD4BFCDEFDC55EB01ED4EF568E7E27E7754EB
5,833,687 UART: [art] SIG.S = BF47233C7F488AEE3887588A5C0FD49A4394BFACDD0688FE6827DDD6F64B476E8BAA5A9C17B039F4655E85B158A28E09
5,857,377 UART: Caliptra RT
5,857,723 UART: [state] CFI Enabled
6,138,850 UART: [rt] RT listening for mailbox commands...
6,139,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,951 UART: [rt]cmd =0x494e464f, len=4
6,172,301 >>> mbox cmd response data (264 bytes)
6,172,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,610,308 >>> mbox cmd response: success
8,623,724 UART:
8,623,740 UART: Running Caliptra FMC ...
8,624,148 UART:
8,624,291 UART: [state] CFI Enabled
8,713,598 UART: [art] Extend RT PCRs Done
8,714,026 UART: [art] Lock RT PCRs Done
8,715,361 UART: [art] Populate DV Done
8,723,431 UART: [fht] FMC Alias Private Key: 7
8,724,435 UART: [art] Derive CDI
8,724,715 UART: [art] Store in in slot 0x4
8,810,480 UART: [art] Derive Key Pair
8,810,840 UART: [art] Store priv key in slot 0x5
8,824,454 UART: [art] Derive Key Pair - Done
8,839,425 UART: [art] Signing Cert with AUTHO
8,839,905 UART: RITY.KEYID = 7
8,855,099 UART: [art] Erasing AUTHORITY.KEYID = 7
8,855,864 UART: [art] PUB.X = 0B475D544BA25C1C11266BBDAE273C176EBC8013C6EE2F236C541E294A54265B7DCCF1FFC3B758203A420C023225CE12
8,862,633 UART: [art] PUB.Y = B9F088427B074A12E7E0EA0C938E5835136215E7320BA65E031C214BD803BC143218C20E8EC65387A9E75E44F9F538CA
8,869,563 UART: [art] SIG.R = DFA38035EE92DD4565B9190ACBE77484AFDBDB6FDBD84CBA8FBC96EF85BCDCABE10444D44EBA7D82FFA19C34D80B5191
8,876,358 UART: [art] SIG.S = A7F7ABA57D2948BE0D40D27083F1CA6A62AA2C262A3A51EC41104C01A8100A971E48CDDF0F86C972AFEE20C04C88A8C1
8,899,643 UART: Caliptra RT
8,899,989 UART: [state] CFI Enabled
9,181,142 UART: [rt] RT listening for mailbox commands...
9,181,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,211,279 UART: [rt]cmd =0x494e464f, len=4
9,214,647 >>> mbox cmd response data (264 bytes)
9,214,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,652,884 >>> mbox cmd response: success
11,666,162 UART:
11,666,178 UART: Running Caliptra FMC ...
11,666,586 UART:
11,666,729 UART: [state] CFI Enabled
11,755,528 UART: [art] Extend RT PCRs Done
11,755,956 UART: [art] Lock RT PCRs Done
11,757,141 UART: [art] Populate DV Done
11,765,515 UART: [fht] FMC Alias Private Key: 7
11,766,579 UART: [art] Derive CDI
11,766,859 UART: [art] Store in in slot 0x4
11,852,536 UART: [art] Derive Key Pair
11,852,896 UART: [art] Store priv key in slot 0x5
11,866,440 UART: [art] Derive Key Pair - Done
11,881,211 UART: [art] Signing Cert with AUTHO
11,881,691 UART: RITY.KEYID = 7
11,896,889 UART: [art] Erasing AUTHORITY.KEYID = 7
11,897,654 UART: [art] PUB.X = 1CD3F70C4EE98E92371510A0FCB866174BF5A3B05A06B517EF1583912328E4C450A6EE1056D5AA3EC2968D63E5D4B2A8
11,904,424 UART: [art] PUB.Y = 4BB9E330ADFF8C1F625F82853CB579D9DFDC2BC09F5FF4927EC9A34A796F6FC6FB187F1863C27DE831A63E366AC6FA5F
11,911,396 UART: [art] SIG.R = 9467E4CC82B19D289E30FD20905FE0BC481B9E29B25510CA70761CC3929FD4BFCDEFDC55EB01ED4EF568E7E27E7754EB
11,918,181 UART: [art] SIG.S = BF47233C7F488AEE3887588A5C0FD49A4394BFACDD0688FE6827DDD6F64B476E8BAA5A9C17B039F4655E85B158A28E09
11,942,577 UART: Caliptra RT
11,942,923 UART: [state] CFI Enabled
12,224,302 UART: [rt] RT listening for mailbox commands...
12,224,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,254,767 UART: [rt]cmd =0x494e464f, len=4
12,258,263 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.52s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,036 UART: [ldev] --
1,280,358 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,019 >>> mbox cmd response: success
2,771,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,772,168 UART: [afmc] ++
2,772,336 UART: [afmc] CDI.KEYID = 6
2,772,699 UART: [afmc] SUBJECT.KEYID = 7
2,773,125 UART: [afmc] AUTHORITY.KEYID = 5
2,808,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,486 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,179 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,837,050 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,842,752 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,850,488 UART: [afmc] --
2,851,408 UART: [cold-reset] --
2,852,128 UART: [state] Locking Datavault
2,853,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,023 UART: [state] Locking ICCM
2,854,655 UART: [exit] Launching FMC @ 0x40000130
2,859,984 UART:
2,860,000 UART: Running Caliptra FMC ...
2,860,408 UART:
2,860,462 UART: [state] CFI Enabled
2,870,894 UART: [fht] FMC Alias Private Key: 7
2,979,615 UART: [art] Extend RT PCRs Done
2,980,043 UART: [art] Lock RT PCRs Done
2,981,377 UART: [art] Populate DV Done
2,989,503 UART: [fht] FMC Alias Private Key: 7
2,990,677 UART: [art] Derive CDI
2,990,957 UART: [art] Store in in slot 0x4
3,076,880 UART: [art] Derive Key Pair
3,077,240 UART: [art] Store priv key in slot 0x5
3,091,030 UART: [art] Derive Key Pair - Done
3,105,839 UART: [art] Signing Cert with AUTHO
3,106,319 UART: RITY.KEYID = 7
3,121,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,040 UART: [art] PUB.X = 3FE15069E418C58985985B79AC8F022E7A45BF5079393E0AF0BDE2DC625FC0C995404179153A354DC3913ACA1946A8CA
3,128,806 UART: [art] PUB.Y = 39C7B487E24733DF4EA16F9A31EB133ABA98B15BBA83B2A25D7F9096310DBBBF994EF87698682531CB94525ED52C7D36
3,135,761 UART: [art] SIG.R = F77B6BD29E3DE86B5714CC59FA3011A7CBD7274D167F892C406545BF41CB100CAF7061A23BD4EF54587E306954CDA7F6
3,142,538 UART: [art] SIG.S = 54F35ABBBEDC1FAD723A6A45FA30FDA8CDD412B1220B9621FA97F4E7789CC0EFACE61C533B87390742A0E65588BF4E76
3,166,649 UART: Caliptra RT
3,166,903 UART: [state] CFI Enabled
3,273,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,154 UART: [rt]cmd =0x494e464f, len=4
3,307,554 >>> mbox cmd response data (264 bytes)
3,307,555 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,439 UART:
3,308,455 UART: Running Caliptra ROM ...
3,308,863 UART:
3,308,918 UART: [state] CFI Enabled
3,311,624 UART: [state] LifecycleState = Unprovisioned
3,312,279 UART: [state] DebugLocked = No
3,312,903 UART: [state] WD Timer not started. Device not locked for debugging
3,314,107 UART: [kat] SHA2-256
4,117,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,121,786 UART: [kat] ++
4,121,938 UART: [kat] sha1
4,126,066 UART: [kat] SHA2-256
4,128,006 UART: [kat] SHA2-384
4,130,589 UART: [kat] SHA2-512-ACC
4,132,489 UART: [kat] ECC-384
4,142,400 UART: [kat] HMAC-384Kdf
4,146,864 UART: [kat] LMS
4,395,176 UART: [kat] --
4,396,102 UART: [update-reset] ++
5,708,323 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,709,468 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,859,334 >>> mbox cmd response: success
5,859,619 UART: [update-reset] Copying MAN_2 To MAN_1
5,867,633 UART: [update-reset Success] --
5,868,886 UART: [state] Locking Datavault
5,869,830 UART: [state] Locking PCR0, PCR1 and PCR31
5,870,434 UART: [state] Locking ICCM
5,870,896 UART: [exit] Launching FMC @ 0x40000130
5,876,225 UART:
5,876,241 UART: Running Caliptra FMC ...
5,876,649 UART:
5,876,703 UART: [state] CFI Enabled
5,965,632 UART: [art] Extend RT PCRs Done
5,966,060 UART: [art] Lock RT PCRs Done
5,967,529 UART: [art] Populate DV Done
5,975,765 UART: [fht] FMC Alias Private Key: 7
5,976,711 UART: [art] Derive CDI
5,976,991 UART: [art] Store in in slot 0x4
6,062,484 UART: [art] Derive Key Pair
6,062,844 UART: [art] Store priv key in slot 0x5
6,076,398 UART: [art] Derive Key Pair - Done
6,091,262 UART: [art] Signing Cert with AUTHO
6,091,742 UART: RITY.KEYID = 7
6,106,764 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,529 UART: [art] PUB.X = EF194A06F06F9056CD4BF259DE531547A770111E65CEF8B7ACF7FF435CEA346B2F56846E1CE8E68B61D5C2F1302B88C4
6,114,308 UART: [art] PUB.Y = 29AC3D1A4363301C299C402C58C518ED0E9D8209E08EAE7942337C79FD244927E43049D125A22AAFCDD9182E9719CE0A
6,121,251 UART: [art] SIG.R = 2D5523DC67658B8A312463CF3C96C601578E2EE583E4E81666E6DBA1BDD1F9E939977512AECC97EF17FCD701BA9EC513
6,128,025 UART: [art] SIG.S = 8A306403C728FEC13E822CC01D566C153FC0D91B005C2AE4B2A7C90514138E1AB3B0F76AF845170F6F1DD91EB5F5FC98
6,151,843 UART: Caliptra RT
6,152,097 UART: [state] CFI Enabled
6,435,076 UART: [rt] RT listening for mailbox commands...
6,435,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,465,305 UART: [rt]cmd =0x494e464f, len=4
6,468,613 >>> mbox cmd response data (264 bytes)
6,468,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,469,534 UART:
6,469,550 UART: Running Caliptra ROM ...
6,469,958 UART:
6,470,013 UART: [state] CFI Enabled
6,472,653 UART: [state] LifecycleState = Unprovisioned
6,473,308 UART: [state] DebugLocked = No
6,473,904 UART: [state] WD Timer not started. Device not locked for debugging
6,475,220 UART: [kat] SHA2-256
7,278,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,282,899 UART: [kat] ++
7,283,051 UART: [kat] sha1
7,287,305 UART: [kat] SHA2-256
7,289,245 UART: [kat] SHA2-384
7,291,864 UART: [kat] SHA2-512-ACC
7,293,764 UART: [kat] ECC-384
7,303,609 UART: [kat] HMAC-384Kdf
7,308,221 UART: [kat] LMS
7,556,533 UART: [kat] --
7,557,423 UART: [update-reset] ++
8,870,236 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,871,399 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
9,021,265 >>> mbox cmd response: success
9,021,544 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,558 UART: [update-reset Success] --
9,030,589 UART: [state] Locking Datavault
9,031,307 UART: [state] Locking PCR0, PCR1 and PCR31
9,031,911 UART: [state] Locking ICCM
9,032,491 UART: [exit] Launching FMC @ 0x40000130
9,037,820 UART:
9,037,836 UART: Running Caliptra FMC ...
9,038,244 UART:
9,038,298 UART: [state] CFI Enabled
9,127,415 UART: [art] Extend RT PCRs Done
9,127,843 UART: [art] Lock RT PCRs Done
9,129,044 UART: [art] Populate DV Done
9,137,124 UART: [fht] FMC Alias Private Key: 7
9,138,058 UART: [art] Derive CDI
9,138,338 UART: [art] Store in in slot 0x4
9,223,751 UART: [art] Derive Key Pair
9,224,111 UART: [art] Store priv key in slot 0x5
9,237,217 UART: [art] Derive Key Pair - Done
9,252,047 UART: [art] Signing Cert with AUTHO
9,252,527 UART: RITY.KEYID = 7
9,268,039 UART: [art] Erasing AUTHORITY.KEYID = 7
9,268,804 UART: [art] PUB.X = 6922A0C3A945217D03B09EAF088FAC43FE2984B58E51ED73BA97C126409458C94324DAC924F0AD134301BE9CA17487E7
9,275,567 UART: [art] PUB.Y = 00A42ECAB3222C02DACDE6D9815C7083A7E394E9F4F1925319126990179002FFA6565F0C0897E01D40BD868C5879AC2C
9,282,483 UART: [art] SIG.R = 22620F3B86761D4DF7BD6A44B9EB7BB0789C57D7927A18C69EB92126C831DA4890D5DAFFE7DC84D9DCAEC2428150072D
9,289,259 UART: [art] SIG.S = E338A97EB2570DE69B8894A073038602342E102D436A3EF1B3969347DBB989992EBF8CAC7D6DE17E7300A807688B3E91
9,313,358 UART: Caliptra RT
9,313,612 UART: [state] CFI Enabled
9,592,989 UART: [rt] RT listening for mailbox commands...
9,593,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,623,276 UART: [rt]cmd =0x494e464f, len=4
9,626,704 >>> mbox cmd response data (264 bytes)
9,626,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,627,701 UART:
9,627,717 UART: Running Caliptra ROM ...
9,628,125 UART:
9,628,180 UART: [state] CFI Enabled
9,630,736 UART: [state] LifecycleState = Unprovisioned
9,631,391 UART: [state] DebugLocked = No
9,632,033 UART: [state] WD Timer not started. Device not locked for debugging
9,633,367 UART: [kat] SHA2-256
10,436,917 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,441,046 UART: [kat] ++
10,441,198 UART: [kat] sha1
10,445,314 UART: [kat] SHA2-256
10,447,254 UART: [kat] SHA2-384
10,450,175 UART: [kat] SHA2-512-ACC
10,452,075 UART: [kat] ECC-384
10,461,712 UART: [kat] HMAC-384Kdf
10,466,206 UART: [kat] LMS
10,714,518 UART: [kat] --
10,715,342 UART: [update-reset] ++
12,028,323 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,029,476 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
12,179,342 >>> mbox cmd response: success
12,179,561 UART: [update-reset] Copying MAN_2 To MAN_1
12,187,575 UART: [update-reset Success] --
12,188,456 UART: [state] Locking Datavault
12,189,212 UART: [state] Locking PCR0, PCR1 and PCR31
12,189,816 UART: [state] Locking ICCM
12,190,302 UART: [exit] Launching FMC @ 0x40000130
12,195,631 UART:
12,195,647 UART: Running Caliptra FMC ...
12,196,055 UART:
12,196,109 UART: [state] CFI Enabled
12,285,450 UART: [art] Extend RT PCRs Done
12,285,878 UART: [art] Lock RT PCRs Done
12,287,103 UART: [art] Populate DV Done
12,295,391 UART: [fht] FMC Alias Private Key: 7
12,296,565 UART: [art] Derive CDI
12,296,845 UART: [art] Store in in slot 0x4
12,382,860 UART: [art] Derive Key Pair
12,383,220 UART: [art] Store priv key in slot 0x5
12,396,524 UART: [art] Derive Key Pair - Done
12,411,048 UART: [art] Signing Cert with AUTHO
12,411,528 UART: RITY.KEYID = 7
12,427,140 UART: [art] Erasing AUTHORITY.KEYID = 7
12,427,905 UART: [art] PUB.X = EF194A06F06F9056CD4BF259DE531547A770111E65CEF8B7ACF7FF435CEA346B2F56846E1CE8E68B61D5C2F1302B88C4
12,434,684 UART: [art] PUB.Y = 29AC3D1A4363301C299C402C58C518ED0E9D8209E08EAE7942337C79FD244927E43049D125A22AAFCDD9182E9719CE0A
12,441,627 UART: [art] SIG.R = 2D5523DC67658B8A312463CF3C96C601578E2EE583E4E81666E6DBA1BDD1F9E939977512AECC97EF17FCD701BA9EC513
12,448,401 UART: [art] SIG.S = 8A306403C728FEC13E822CC01D566C153FC0D91B005C2AE4B2A7C90514138E1AB3B0F76AF845170F6F1DD91EB5F5FC98
12,472,647 UART: Caliptra RT
12,472,901 UART: [state] CFI Enabled
12,757,624 UART: [rt] RT listening for mailbox commands...
12,758,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,788,007 UART: [rt]cmd =0x494e464f, len=4
12,791,481 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,402 ready_for_fw is high
1,055,402 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,773 >>> mbox cmd response: success
2,621,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,684,196 UART:
2,684,212 UART: Running Caliptra FMC ...
2,684,620 UART:
2,684,674 UART: [state] CFI Enabled
2,695,312 UART: [fht] FMC Alias Private Key: 7
2,803,831 UART: [art] Extend RT PCRs Done
2,804,259 UART: [art] Lock RT PCRs Done
2,805,913 UART: [art] Populate DV Done
2,814,287 UART: [fht] FMC Alias Private Key: 7
2,815,361 UART: [art] Derive CDI
2,815,641 UART: [art] Store in in slot 0x4
2,901,220 UART: [art] Derive Key Pair
2,901,580 UART: [art] Store priv key in slot 0x5
2,914,246 UART: [art] Derive Key Pair - Done
2,928,852 UART: [art] Signing Cert with AUTHO
2,929,332 UART: RITY.KEYID = 7
2,944,820 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,585 UART: [art] PUB.X = 9A74A436ADD49DD2F2CC476ECB24625A336B6D3A2F5D6499A03E5FF05E605166768F673FF5C911A03EBA7EF4B6D16928
2,952,365 UART: [art] PUB.Y = 8AECB6A422AFC30834FC509AC6C8B7366E0393F09205965F02AC8AE896E39EB043B4B8C9205A65DD35ACB8A4C6A7EEBC
2,959,321 UART: [art] SIG.R = A7B0FBED37E1AF3F627D6108D1BAE74E052226F6BFC54C918C04C7D2A1D5EF479D796C614014FD24C32F1FB98989353C
2,966,094 UART: [art] SIG.S = 15DFE4EF75E87FC88AF34551B7BFD21EBD877E32023D299EC2F1436290579638FC48C7589EABDBBF4BB663B06AD02BD8
2,989,990 UART: Caliptra RT
2,990,244 UART: [state] CFI Enabled
3,098,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,715 UART: [rt]cmd =0x494e464f, len=4
3,132,081 >>> mbox cmd response data (264 bytes)
3,132,082 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,564,494 >>> mbox cmd response: success
5,578,112 UART:
5,578,128 UART: Running Caliptra FMC ...
5,578,536 UART:
5,578,590 UART: [state] CFI Enabled
5,667,907 UART: [art] Extend RT PCRs Done
5,668,335 UART: [art] Lock RT PCRs Done
5,669,428 UART: [art] Populate DV Done
5,677,840 UART: [fht] FMC Alias Private Key: 7
5,678,968 UART: [art] Derive CDI
5,679,248 UART: [art] Store in in slot 0x4
5,764,667 UART: [art] Derive Key Pair
5,765,027 UART: [art] Store priv key in slot 0x5
5,778,013 UART: [art] Derive Key Pair - Done
5,792,841 UART: [art] Signing Cert with AUTHO
5,793,321 UART: RITY.KEYID = 7
5,808,447 UART: [art] Erasing AUTHORITY.KEYID = 7
5,809,212 UART: [art] PUB.X = BC2F44E319873840425C62510FB0A24A9D0236BC7EADAFAD23A8A8E2148A55896EE7267076E2B4B3C73338136DC9A622
5,815,978 UART: [art] PUB.Y = A6A5D2CBC7C47ADB1DF78023CC78C803115FAA0369C29D87E90D8A89AB3F9CEAFA623340E05C51812CE75BCD307921E3
5,822,935 UART: [art] SIG.R = 41846F1749135738793163283B3741EFD2157B65DB83B85E32A3CCED0BDF27BF78DE7B400FFFA0CFB10EE8D82757E56F
5,829,704 UART: [art] SIG.S = 25A731816C01FE55A4286BB2FBD2CED441698F1AB880F5A64A85721ABCBB4532976873FA1D49E3F49580428A9BF7F12C
5,853,548 UART: Caliptra RT
5,853,802 UART: [state] CFI Enabled
6,137,624 UART: [rt] RT listening for mailbox commands...
6,138,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,757 UART: [rt]cmd =0x494e464f, len=4
6,170,985 >>> mbox cmd response data (264 bytes)
6,170,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,603,868 >>> mbox cmd response: success
8,617,258 UART:
8,617,274 UART: Running Caliptra FMC ...
8,617,682 UART:
8,617,736 UART: [state] CFI Enabled
8,706,757 UART: [art] Extend RT PCRs Done
8,707,185 UART: [art] Lock RT PCRs Done
8,708,416 UART: [art] Populate DV Done
8,716,764 UART: [fht] FMC Alias Private Key: 7
8,717,798 UART: [art] Derive CDI
8,718,078 UART: [art] Store in in slot 0x4
8,803,789 UART: [art] Derive Key Pair
8,804,149 UART: [art] Store priv key in slot 0x5
8,817,087 UART: [art] Derive Key Pair - Done
8,831,820 UART: [art] Signing Cert with AUTHO
8,832,300 UART: RITY.KEYID = 7
8,847,426 UART: [art] Erasing AUTHORITY.KEYID = 7
8,848,191 UART: [art] PUB.X = 2CFCF26B4E56AF7B5685507C53B752A5B0F0C705F0C7CA5AAE3050743A9AD8468F804118EE2162C684486EFBB68C0DE9
8,854,965 UART: [art] PUB.Y = BD246A9A192B609E41BC44D864CCCFA86115EA542744DDAAC122AE23E2246681423CD7E4A6301880EC3B2B75345C774A
8,861,921 UART: [art] SIG.R = 073BF673B18ACFC8A7DF0B56AD5F7A8E5F2634B53F32B084AF17DD0C46C7A256439381B11D2D2898C606544751B9390D
8,868,680 UART: [art] SIG.S = 404B8EFB8DBFD8525BAB912E8B7B8817D0F9B2CBEBE624892E7EBF8987A9927105F5D7A59E8A4A8BAD0D331FFE69A5E0
8,891,963 UART: Caliptra RT
8,892,217 UART: [state] CFI Enabled
9,173,675 UART: [rt] RT listening for mailbox commands...
9,174,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,203,794 UART: [rt]cmd =0x494e464f, len=4
9,207,224 >>> mbox cmd response data (264 bytes)
9,207,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,639,833 >>> mbox cmd response: success
11,653,143 UART:
11,653,159 UART: Running Caliptra FMC ...
11,653,567 UART:
11,653,621 UART: [state] CFI Enabled
11,742,518 UART: [art] Extend RT PCRs Done
11,742,946 UART: [art] Lock RT PCRs Done
11,744,245 UART: [art] Populate DV Done
11,752,673 UART: [fht] FMC Alias Private Key: 7
11,753,687 UART: [art] Derive CDI
11,753,967 UART: [art] Store in in slot 0x4
11,839,726 UART: [art] Derive Key Pair
11,840,086 UART: [art] Store priv key in slot 0x5
11,852,980 UART: [art] Derive Key Pair - Done
11,867,844 UART: [art] Signing Cert with AUTHO
11,868,324 UART: RITY.KEYID = 7
11,883,092 UART: [art] Erasing AUTHORITY.KEYID = 7
11,883,857 UART: [art] PUB.X = BC2F44E319873840425C62510FB0A24A9D0236BC7EADAFAD23A8A8E2148A55896EE7267076E2B4B3C73338136DC9A622
11,890,623 UART: [art] PUB.Y = A6A5D2CBC7C47ADB1DF78023CC78C803115FAA0369C29D87E90D8A89AB3F9CEAFA623340E05C51812CE75BCD307921E3
11,897,580 UART: [art] SIG.R = 41846F1749135738793163283B3741EFD2157B65DB83B85E32A3CCED0BDF27BF78DE7B400FFFA0CFB10EE8D82757E56F
11,904,349 UART: [art] SIG.S = 25A731816C01FE55A4286BB2FBD2CED441698F1AB880F5A64A85721ABCBB4532976873FA1D49E3F49580428A9BF7F12C
11,928,727 UART: Caliptra RT
11,928,981 UART: [state] CFI Enabled
12,208,309 UART: [rt] RT listening for mailbox commands...
12,208,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,238,298 UART: [rt]cmd =0x494e464f, len=4
12,241,762 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.53s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,471 UART: [fwproc] Wait for Commands...
1,282,198 UART: [fwproc] Recv command 0x46574c44
1,282,931 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,544 >>> mbox cmd response: success
2,771,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,772,767 UART: [afmc] ++
2,772,935 UART: [afmc] CDI.KEYID = 6
2,773,298 UART: [afmc] SUBJECT.KEYID = 7
2,773,724 UART: [afmc] AUTHORITY.KEYID = 5
2,808,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,477 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,832,170 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,838,041 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,843,743 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,851,567 UART: [afmc] --
2,852,489 UART: [cold-reset] --
2,853,341 UART: [state] Locking Datavault
2,854,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,132 UART: [state] Locking ICCM
2,855,690 UART: [exit] Launching FMC @ 0x40000130
2,861,019 UART:
2,861,035 UART: Running Caliptra FMC ...
2,861,443 UART:
2,861,586 UART: [state] CFI Enabled
2,872,196 UART: [fht] FMC Alias Private Key: 7
2,979,431 UART: [art] Extend RT PCRs Done
2,979,859 UART: [art] Lock RT PCRs Done
2,981,417 UART: [art] Populate DV Done
2,989,529 UART: [fht] FMC Alias Private Key: 7
2,990,627 UART: [art] Derive CDI
2,990,907 UART: [art] Store in in slot 0x4
3,076,674 UART: [art] Derive Key Pair
3,077,034 UART: [art] Store priv key in slot 0x5
3,090,580 UART: [art] Derive Key Pair - Done
3,105,318 UART: [art] Signing Cert with AUTHO
3,105,798 UART: RITY.KEYID = 7
3,120,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,733 UART: [art] PUB.X = EB565F6B4A2F71DEFEE4A95C0460AB47ADDB791B2004AE480B55EB259644BB892278B6CB2A4085347F080E949D13A20F
3,128,495 UART: [art] PUB.Y = 4BC914189FC52249F9D15DDE0A5BA2205300CBD9FF90AF83EF74BE315B3F2F3A3092718FFF315319C9212CCD585D6D29
3,135,430 UART: [art] SIG.R = BECC065D8AA916EFAAA9C3F0D8236F9FDAFF4FB1B8472D8DF119DC7A92B6FC828D5E44A50BA55745D0C3017A04285BDD
3,142,214 UART: [art] SIG.S = EB8308B1DE0529E423206981149F78880E734EDE8C64741BD00BCDAF881C59E4283D7DAE14A10095613E8071362294F1
3,166,229 UART: Caliptra RT
3,166,575 UART: [state] CFI Enabled
3,273,861 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,046 UART: [rt]cmd =0x494e464f, len=4
3,307,588 >>> mbox cmd response data (264 bytes)
3,307,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,381 UART:
3,308,397 UART: Running Caliptra ROM ...
3,308,805 UART:
3,308,947 UART: [state] CFI Enabled
3,311,835 UART: [state] LifecycleState = Unprovisioned
3,312,490 UART: [state] DebugLocked = No
3,313,124 UART: [state] WD Timer not started. Device not locked for debugging
3,314,416 UART: [kat] SHA2-256
4,117,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,095 UART: [kat] ++
4,122,247 UART: [kat] sha1
4,126,671 UART: [kat] SHA2-256
4,128,611 UART: [kat] SHA2-384
4,131,414 UART: [kat] SHA2-512-ACC
4,133,314 UART: [kat] ECC-384
4,143,379 UART: [kat] HMAC-384Kdf
4,147,911 UART: [kat] LMS
4,396,223 UART: [kat] --
4,397,159 UART: [update-reset] ++
5,708,632 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,709,765 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,859,631 >>> mbox cmd response: success
5,859,840 UART: [update-reset] Copying MAN_2 To MAN_1
5,867,854 UART: [update-reset Success] --
5,868,727 UART: [state] Locking Datavault
5,869,615 UART: [state] Locking PCR0, PCR1 and PCR31
5,870,219 UART: [state] Locking ICCM
5,870,869 UART: [exit] Launching FMC @ 0x40000130
5,876,198 UART:
5,876,214 UART: Running Caliptra FMC ...
5,876,622 UART:
5,876,765 UART: [state] CFI Enabled
5,965,844 UART: [art] Extend RT PCRs Done
5,966,272 UART: [art] Lock RT PCRs Done
5,967,695 UART: [art] Populate DV Done
5,975,801 UART: [fht] FMC Alias Private Key: 7
5,976,785 UART: [art] Derive CDI
5,977,065 UART: [art] Store in in slot 0x4
6,062,774 UART: [art] Derive Key Pair
6,063,134 UART: [art] Store priv key in slot 0x5
6,076,592 UART: [art] Derive Key Pair - Done
6,091,258 UART: [art] Signing Cert with AUTHO
6,091,738 UART: RITY.KEYID = 7
6,107,286 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,051 UART: [art] PUB.X = FC2E8492DD0CF13AEE4FC548FDDC43BBE2DE35C19C8E94CC0BA70BAD237C4C92B12BD227E5BE8365C62D016E38CC3B68
6,114,837 UART: [art] PUB.Y = 465B15CB111B53B4AFE92B66193DE5B747EC247D60CA3C4FC4FD08A4DC4D579FA4C86CE7DF377A4864AD9273549B9CB7
6,121,800 UART: [art] SIG.R = ECC5DBAB6FE02A349379FEBAD2601834B2CBBAD38A4D9D61D77E3BD0432247B8952477F9B5E42D7FB5D62AAAC13F8119
6,128,590 UART: [art] SIG.S = 06DDC7395BAEF57035444E8BFC09B0FEF7AD5355EEE302B3DEAFAF2854D2E8AAEA314ED706F805CE733212509E3B7B13
6,152,928 UART: Caliptra RT
6,153,274 UART: [state] CFI Enabled
6,436,165 UART: [rt] RT listening for mailbox commands...
6,436,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,466,384 UART: [rt]cmd =0x494e464f, len=4
6,469,918 >>> mbox cmd response data (264 bytes)
6,469,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,675 UART:
6,470,691 UART: Running Caliptra ROM ...
6,471,099 UART:
6,471,241 UART: [state] CFI Enabled
6,474,003 UART: [state] LifecycleState = Unprovisioned
6,474,658 UART: [state] DebugLocked = No
6,475,142 UART: [state] WD Timer not started. Device not locked for debugging
6,476,292 UART: [kat] SHA2-256
7,279,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,283,971 UART: [kat] ++
7,284,123 UART: [kat] sha1
7,288,295 UART: [kat] SHA2-256
7,290,235 UART: [kat] SHA2-384
7,292,894 UART: [kat] SHA2-512-ACC
7,294,794 UART: [kat] ECC-384
7,304,947 UART: [kat] HMAC-384Kdf
7,309,635 UART: [kat] LMS
7,557,947 UART: [kat] --
7,558,913 UART: [update-reset] ++
8,870,208 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,871,255 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
9,021,121 >>> mbox cmd response: success
9,021,230 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,244 UART: [update-reset Success] --
9,030,149 UART: [state] Locking Datavault
9,030,957 UART: [state] Locking PCR0, PCR1 and PCR31
9,031,561 UART: [state] Locking ICCM
9,032,115 UART: [exit] Launching FMC @ 0x40000130
9,037,444 UART:
9,037,460 UART: Running Caliptra FMC ...
9,037,868 UART:
9,038,011 UART: [state] CFI Enabled
9,127,006 UART: [art] Extend RT PCRs Done
9,127,434 UART: [art] Lock RT PCRs Done
9,128,795 UART: [art] Populate DV Done
9,136,885 UART: [fht] FMC Alias Private Key: 7
9,137,879 UART: [art] Derive CDI
9,138,159 UART: [art] Store in in slot 0x4
9,223,816 UART: [art] Derive Key Pair
9,224,176 UART: [art] Store priv key in slot 0x5
9,236,938 UART: [art] Derive Key Pair - Done
9,251,589 UART: [art] Signing Cert with AUTHO
9,252,069 UART: RITY.KEYID = 7
9,267,829 UART: [art] Erasing AUTHORITY.KEYID = 7
9,268,594 UART: [art] PUB.X = A20705A03BE580887FC3D8A17D7C2271255328BF92A3F0C8BAB3DC2824550EA233DF303D2F462B880A7B847B244CACAF
9,275,360 UART: [art] PUB.Y = E85AC7635BF2E2935076315F5714D134432A679D15E6A78A7CF9E50242A4363B4BDDA88A1E90C56051BCAE2914FC9FD1
9,282,311 UART: [art] SIG.R = BB2DA40AE5FC2E93B5E39515FC7036F03ED2C4F81EE2B6DE4C492DD716E043BD70482736136242ADAB6AF9A23FEE40C1
9,289,096 UART: [art] SIG.S = E9681B047D6E187DC69BCA1E85854086CA01453BA71EFD6D62E7C4C23A365B27004A5E3DF6830A2A17C7BE2EA4BC6867
9,312,866 UART: Caliptra RT
9,313,212 UART: [state] CFI Enabled
9,594,679 UART: [rt] RT listening for mailbox commands...
9,595,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,624,704 UART: [rt]cmd =0x494e464f, len=4
9,628,078 >>> mbox cmd response data (264 bytes)
9,628,079 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,628,885 UART:
9,628,901 UART: Running Caliptra ROM ...
9,629,309 UART:
9,629,451 UART: [state] CFI Enabled
9,632,161 UART: [state] LifecycleState = Unprovisioned
9,632,816 UART: [state] DebugLocked = No
9,633,342 UART: [state] WD Timer not started. Device not locked for debugging
9,634,620 UART: [kat] SHA2-256
10,438,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,442,299 UART: [kat] ++
10,442,451 UART: [kat] sha1
10,446,777 UART: [kat] SHA2-256
10,448,717 UART: [kat] SHA2-384
10,451,400 UART: [kat] SHA2-512-ACC
10,453,300 UART: [kat] ECC-384
10,463,201 UART: [kat] HMAC-384Kdf
10,467,835 UART: [kat] LMS
10,716,147 UART: [kat] --
10,717,221 UART: [update-reset] ++
12,029,512 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,030,523 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
12,180,389 >>> mbox cmd response: success
12,180,560 UART: [update-reset] Copying MAN_2 To MAN_1
12,188,574 UART: [update-reset Success] --
12,189,713 UART: [state] Locking Datavault
12,190,709 UART: [state] Locking PCR0, PCR1 and PCR31
12,191,313 UART: [state] Locking ICCM
12,191,961 UART: [exit] Launching FMC @ 0x40000130
12,197,290 UART:
12,197,306 UART: Running Caliptra FMC ...
12,197,714 UART:
12,197,857 UART: [state] CFI Enabled
12,286,568 UART: [art] Extend RT PCRs Done
12,286,996 UART: [art] Lock RT PCRs Done
12,288,327 UART: [art] Populate DV Done
12,296,529 UART: [fht] FMC Alias Private Key: 7
12,297,699 UART: [art] Derive CDI
12,297,979 UART: [art] Store in in slot 0x4
12,383,714 UART: [art] Derive Key Pair
12,384,074 UART: [art] Store priv key in slot 0x5
12,398,042 UART: [art] Derive Key Pair - Done
12,412,606 UART: [art] Signing Cert with AUTHO
12,413,086 UART: RITY.KEYID = 7
12,428,232 UART: [art] Erasing AUTHORITY.KEYID = 7
12,428,997 UART: [art] PUB.X = FC2E8492DD0CF13AEE4FC548FDDC43BBE2DE35C19C8E94CC0BA70BAD237C4C92B12BD227E5BE8365C62D016E38CC3B68
12,435,783 UART: [art] PUB.Y = 465B15CB111B53B4AFE92B66193DE5B747EC247D60CA3C4FC4FD08A4DC4D579FA4C86CE7DF377A4864AD9273549B9CB7
12,442,746 UART: [art] SIG.R = ECC5DBAB6FE02A349379FEBAD2601834B2CBBAD38A4D9D61D77E3BD0432247B8952477F9B5E42D7FB5D62AAAC13F8119
12,449,536 UART: [art] SIG.S = 06DDC7395BAEF57035444E8BFC09B0FEF7AD5355EEE302B3DEAFAF2854D2E8AAEA314ED706F805CE733212509E3B7B13
12,473,352 UART: Caliptra RT
12,473,698 UART: [state] CFI Enabled
12,756,255 UART: [rt] RT listening for mailbox commands...
12,756,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,786,374 UART: [rt]cmd =0x494e464f, len=4
12,789,758 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,851 ready_for_fw is high
1,056,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,838 >>> mbox cmd response: success
2,623,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,801 UART:
2,685,817 UART: Running Caliptra FMC ...
2,686,225 UART:
2,686,368 UART: [state] CFI Enabled
2,696,960 UART: [fht] FMC Alias Private Key: 7
2,805,493 UART: [art] Extend RT PCRs Done
2,805,921 UART: [art] Lock RT PCRs Done
2,807,495 UART: [art] Populate DV Done
2,815,913 UART: [fht] FMC Alias Private Key: 7
2,817,083 UART: [art] Derive CDI
2,817,363 UART: [art] Store in in slot 0x4
2,902,998 UART: [art] Derive Key Pair
2,903,358 UART: [art] Store priv key in slot 0x5
2,916,930 UART: [art] Derive Key Pair - Done
2,931,411 UART: [art] Signing Cert with AUTHO
2,931,891 UART: RITY.KEYID = 7
2,946,881 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,646 UART: [art] PUB.X = 1A04409F5912390B41FA3F1BDB0248031DBFE6EA428AFFB112FD9284F345A1920D07E5BE578F26B649633191DFD5041F
2,954,399 UART: [art] PUB.Y = 24713F782FA2606489D4D214AD1FF4A2BEB935989E88845B0063F42CE39DE7E0E697CC072858C187D7B01E5C0AB07EF0
2,961,325 UART: [art] SIG.R = 976A67015FFCF2835EA5BDAB810B285FCFC16EE6ED4E6F0E42F599B6236BA58395097049978F5B6D5D23559F9968B5EC
2,968,091 UART: [art] SIG.S = DC5DCC12DBD9A33C7141EEF4AB03929D473DFE55CA49F92541E7D87331F980D3930FF0B830042C3872387044B2419547
2,991,727 UART: Caliptra RT
2,992,073 UART: [state] CFI Enabled
3,099,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,538 UART: [rt]cmd =0x494e464f, len=4
3,132,964 >>> mbox cmd response data (264 bytes)
3,132,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,565,860 >>> mbox cmd response: success
5,579,380 UART:
5,579,396 UART: Running Caliptra FMC ...
5,579,804 UART:
5,579,947 UART: [state] CFI Enabled
5,669,474 UART: [art] Extend RT PCRs Done
5,669,902 UART: [art] Lock RT PCRs Done
5,670,909 UART: [art] Populate DV Done
5,679,037 UART: [fht] FMC Alias Private Key: 7
5,680,109 UART: [art] Derive CDI
5,680,389 UART: [art] Store in in slot 0x4
5,765,806 UART: [art] Derive Key Pair
5,766,166 UART: [art] Store priv key in slot 0x5
5,779,560 UART: [art] Derive Key Pair - Done
5,794,268 UART: [art] Signing Cert with AUTHO
5,794,748 UART: RITY.KEYID = 7
5,809,834 UART: [art] Erasing AUTHORITY.KEYID = 7
5,810,599 UART: [art] PUB.X = 49A8BC23A1E20574EB8EF8902EC1DB76F7A96E1A4FC9BCA5F3994255457B4D9640C8BF992654426D5815C9BDAA16D567
5,817,374 UART: [art] PUB.Y = 44B563AA2E94670B2D76645269B0A1D36F1072F74F0F30F1DF9230C5F17355D82D648D4CA3A7FEBCF041902506CE0A84
5,824,314 UART: [art] SIG.R = 149909FCFC73232737B3E94D160BF49A2D22DA60541E4CDF2B6527A628C7B637C1FAECC664FDC91FEB5A48AD35F02BA6
5,831,094 UART: [art] SIG.S = 06DC4CAF32F09F22D54D577EE9460FE3C74673C675CCAB79841B5424BCFC573DE8C70BC9CF4D70935EAFFC6B94AAD02E
5,854,998 UART: Caliptra RT
5,855,344 UART: [state] CFI Enabled
6,133,424 UART: [rt] RT listening for mailbox commands...
6,134,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,163,529 UART: [rt]cmd =0x494e464f, len=4
6,166,881 >>> mbox cmd response data (264 bytes)
6,166,882 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,600,605 >>> mbox cmd response: success
8,614,067 UART:
8,614,083 UART: Running Caliptra FMC ...
8,614,491 UART:
8,614,634 UART: [state] CFI Enabled
8,703,887 UART: [art] Extend RT PCRs Done
8,704,315 UART: [art] Lock RT PCRs Done
8,705,720 UART: [art] Populate DV Done
8,713,878 UART: [fht] FMC Alias Private Key: 7
8,715,024 UART: [art] Derive CDI
8,715,304 UART: [art] Store in in slot 0x4
8,801,139 UART: [art] Derive Key Pair
8,801,499 UART: [art] Store priv key in slot 0x5
8,815,159 UART: [art] Derive Key Pair - Done
8,829,888 UART: [art] Signing Cert with AUTHO
8,830,368 UART: RITY.KEYID = 7
8,845,702 UART: [art] Erasing AUTHORITY.KEYID = 7
8,846,467 UART: [art] PUB.X = D68C5FD4980215D24674E25E19F46FD638C0F45E5994C781BE4045E4BD20964E984753467A3D9E5BA69148C5F5A5EBCA
8,853,236 UART: [art] PUB.Y = 79BF87AF606ACBBE73EC6FF32326553102DE8C903630D59FF82A019E4860991E9282301455E0DAA1C5D7118CE919A875
8,860,180 UART: [art] SIG.R = E8E2C94B88708842267051DF378B750C525B8C604F118125F67923A773DE6384B3966BFC972AB6F858ED31D606791295
8,866,932 UART: [art] SIG.S = 95DFE7AF47B35CD57C7AB724D361169E008028D51B339086D61C5FB33910C6E49AFA2E294840E61BF1D4DDC7EE129329
8,890,881 UART: Caliptra RT
8,891,227 UART: [state] CFI Enabled
9,168,942 UART: [rt] RT listening for mailbox commands...
9,169,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,199,235 UART: [rt]cmd =0x494e464f, len=4
9,202,543 >>> mbox cmd response data (264 bytes)
9,202,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,635,905 >>> mbox cmd response: success
11,649,225 UART:
11,649,241 UART: Running Caliptra FMC ...
11,649,649 UART:
11,649,792 UART: [state] CFI Enabled
11,738,927 UART: [art] Extend RT PCRs Done
11,739,355 UART: [art] Lock RT PCRs Done
11,740,752 UART: [art] Populate DV Done
11,748,954 UART: [fht] FMC Alias Private Key: 7
11,749,930 UART: [art] Derive CDI
11,750,210 UART: [art] Store in in slot 0x4
11,836,149 UART: [art] Derive Key Pair
11,836,509 UART: [art] Store priv key in slot 0x5
11,849,629 UART: [art] Derive Key Pair - Done
11,864,203 UART: [art] Signing Cert with AUTHO
11,864,683 UART: RITY.KEYID = 7
11,879,871 UART: [art] Erasing AUTHORITY.KEYID = 7
11,880,636 UART: [art] PUB.X = 49A8BC23A1E20574EB8EF8902EC1DB76F7A96E1A4FC9BCA5F3994255457B4D9640C8BF992654426D5815C9BDAA16D567
11,887,411 UART: [art] PUB.Y = 44B563AA2E94670B2D76645269B0A1D36F1072F74F0F30F1DF9230C5F17355D82D648D4CA3A7FEBCF041902506CE0A84
11,894,351 UART: [art] SIG.R = 149909FCFC73232737B3E94D160BF49A2D22DA60541E4CDF2B6527A628C7B637C1FAECC664FDC91FEB5A48AD35F02BA6
11,901,131 UART: [art] SIG.S = 06DC4CAF32F09F22D54D577EE9460FE3C74673C675CCAB79841B5424BCFC573DE8C70BC9CF4D70935EAFFC6B94AAD02E
11,924,939 UART: Caliptra RT
11,925,285 UART: [state] CFI Enabled
12,206,385 UART: [rt] RT listening for mailbox commands...
12,207,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,236,460 UART: [rt]cmd =0x494e464f, len=4
12,239,632 >>> mbox cmd response data (264 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,474 UART:
192,850 UART: Running Caliptra ROM ...
193,938 UART:
194,075 UART: [state] CFI Enabled
260,075 UART: [state] LifecycleState = Unprovisioned
262,048 UART: [state] DebugLocked = No
264,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,709 UART: [kat] SHA2-256
438,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,874 UART: [kat] ++
449,389 UART: [kat] sha1
458,985 UART: [kat] SHA2-256
461,693 UART: [kat] SHA2-384
467,832 UART: [kat] SHA2-512-ACC
470,194 UART: [kat] ECC-384
2,766,237 UART: [kat] HMAC-384Kdf
2,799,021 UART: [kat] LMS
3,989,339 UART: [kat] --
3,994,817 UART: [cold-reset] ++
3,995,820 UART: [fht] Storing FHT @ 0x50003400
4,008,303 UART: [idev] ++
4,008,875 UART: [idev] CDI.KEYID = 6
4,009,902 UART: [idev] SUBJECT.KEYID = 7
4,011,077 UART: [idev] UDS.KEYID = 0
4,012,056 ready_for_fw is high
4,012,246 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,663 UART: [idev] Erasing UDS.KEYID = 0
7,343,624 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,532 UART: [idev] --
7,370,623 UART: [ldev] ++
7,371,241 UART: [ldev] CDI.KEYID = 6
7,372,205 UART: [ldev] SUBJECT.KEYID = 5
7,373,409 UART: [ldev] AUTHORITY.KEYID = 7
7,374,629 UART: [ldev] FE.KEYID = 1
7,421,342 UART: [ldev] Erasing FE.KEYID = 1
10,754,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,131 UART: [ldev] --
13,116,642 UART: [fwproc] Waiting for Commands...
13,118,525 UART: [fwproc] Received command 0x46574c44
13,120,700 UART: [fwproc] Received Image of size 114036 bytes
17,169,155 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,634,297 >>> mbox cmd response: success
17,634,837 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,638,802 UART: [afmc] ++
17,639,377 UART: [afmc] CDI.KEYID = 6
17,640,256 UART: [afmc] SUBJECT.KEYID = 7
17,641,454 UART: [afmc] AUTHORITY.KEYID = 5
21,006,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,426 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,685 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,095 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,917 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,375 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,636 UART: [afmc] --
23,379,930 UART: [cold-reset] --
23,383,621 UART: [state] Locking Datavault
23,388,856 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,601 UART: [state] Locking ICCM
23,392,311 UART: [exit] Launching FMC @ 0x40000130
23,400,701 UART:
23,400,929 UART: Running Caliptra FMC ...
23,402,022 UART:
23,402,195 UART: [state] CFI Enabled
23,466,678 UART: [fht] FMC Alias Private Key: 7
25,805,148 UART: [art] Extend RT PCRs Done
25,806,810 UART: [art] Lock RT PCRs Done
25,808,304 UART: [art] Populate DV Done
25,813,462 UART: [fht] FMC Alias Private Key: 7
25,815,102 UART: [art] Derive CDI
25,816,352 UART: [art] Store in in slot 0x4
25,867,549 UART: [art] Derive Key Pair
25,868,553 UART: [art] Store priv key in slot 0x5
29,142,451 UART: [art] Derive Key Pair - Done
29,155,463 UART: [art] Signing Cert with AUTHO
29,156,761 UART: RITY.KEYID = 7
31,442,232 UART: [art] Erasing AUTHORITY.KEYID = 7
31,443,747 UART: [art] PUB.X = E3E7D1609E8ADAD8AB60981E08F5174ED3FEEDDC19154352A7F8B8F564A6F5E7B3132D80030B4239489AFDDF6ED4A0DC
31,450,983 UART: [art] PUB.Y = CB7D4D54A113F08645C997D1616749304B42ABB658E49DECA63499DDF93CF174B59D2A4D74E0C38E06CAEBDC383A664E
31,458,273 UART: [art] SIG.R = 4C33993E606F3F18BC4D5A89921FA6E8589E6394DE4D6F19D8ABD23D03B26A215530376718EDE45E5FC6D0A58C88EF6F
31,465,601 UART: [art] SIG.S = BCC66D3BAB142D8E963781191E2368D66AD4EA2FBA7D6891E33E1CF34DAABD05A3ADE7823198F8E0C4D3DCCD73208A0E
32,771,197 UART: Caliptra RT
32,771,891 UART: [state] CFI Enabled
32,932,597 UART: [rt] RT listening for mailbox commands...
32,963,465 UART: [rt]cmd =0x49444549, len=4
32,966,482 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,785,994 ready_for_fw is high
3,786,455 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,868,245 >>> mbox cmd response: success
17,869,031 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,565,799 UART:
23,566,182 UART: Running Caliptra FMC ...
23,567,288 UART:
23,567,433 UART: [state] CFI Enabled
23,637,433 UART: [fht] FMC Alias Private Key: 7
25,974,882 UART: [art] Extend RT PCRs Done
25,976,105 UART: [art] Lock RT PCRs Done
25,977,867 UART: [art] Populate DV Done
25,983,389 UART: [fht] FMC Alias Private Key: 7
25,984,871 UART: [art] Derive CDI
25,985,624 UART: [art] Store in in slot 0x4
26,046,300 UART: [art] Derive Key Pair
26,047,345 UART: [art] Store priv key in slot 0x5
29,340,369 UART: [art] Derive Key Pair - Done
29,353,145 UART: [art] Signing Cert with AUTHO
29,354,442 UART: RITY.KEYID = 7
31,642,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,732 UART: [art] PUB.X = 28821A8203CC6CB816D295006A5B8CEA6C95D43986E3CAD8F4E07530EA67BF2C8E642E6A09394D10766C5FA98D75C5E5
31,650,967 UART: [art] PUB.Y = 6B88FC6D2BE3890537F8942B4DF4DCF1D40C42308D7ACF64717FD97BC2F29E66D9846FE9B7DC68A48E6741F43AC6992F
31,658,252 UART: [art] SIG.R = 03924A2F551AAE2EF7C8CC0A2D7DAECF34C1534E22E3A0A99E8F9FB1BF91C779F526520C5DC42F7983455C5457A1F854
31,665,627 UART: [art] SIG.S = 6C82FCEA32B64E670801245B77B3484DC17AF5AB80354C9BB25919DD8A0A5BB9F21DEE0B5086715E83DA84C99B154BB3
32,971,047 UART: Caliptra RT
32,971,766 UART: [state] CFI Enabled
33,133,233 UART: [rt] RT listening for mailbox commands...
33,164,096 UART: [rt]cmd =0x49444549, len=4
33,167,054 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,463 UART:
192,850 UART: Running Caliptra ROM ...
194,046 UART:
603,711 UART: [state] CFI Enabled
616,800 UART: [state] LifecycleState = Unprovisioned
618,737 UART: [state] DebugLocked = No
621,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,332 UART: [kat] SHA2-256
796,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,655 UART: [kat] ++
807,132 UART: [kat] sha1
817,863 UART: [kat] SHA2-256
820,586 UART: [kat] SHA2-384
826,596 UART: [kat] SHA2-512-ACC
828,937 UART: [kat] ECC-384
3,113,829 UART: [kat] HMAC-384Kdf
3,125,845 UART: [kat] LMS
4,315,957 UART: [kat] --
4,321,178 UART: [cold-reset] ++
4,322,969 UART: [fht] Storing FHT @ 0x50003400
4,335,515 UART: [idev] ++
4,336,073 UART: [idev] CDI.KEYID = 6
4,337,104 UART: [idev] SUBJECT.KEYID = 7
4,338,282 UART: [idev] UDS.KEYID = 0
4,339,260 ready_for_fw is high
4,339,460 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,703 UART: [idev] Erasing UDS.KEYID = 0
7,623,306 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,607 UART: [idev] --
7,649,626 UART: [ldev] ++
7,650,198 UART: [ldev] CDI.KEYID = 6
7,651,145 UART: [ldev] SUBJECT.KEYID = 5
7,652,357 UART: [ldev] AUTHORITY.KEYID = 7
7,653,663 UART: [ldev] FE.KEYID = 1
7,664,662 UART: [ldev] Erasing FE.KEYID = 1
10,953,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,258 UART: [ldev] --
13,313,363 UART: [fwproc] Waiting for Commands...
13,315,072 UART: [fwproc] Received command 0x46574c44
13,317,251 UART: [fwproc] Received Image of size 114036 bytes
17,365,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,828,810 >>> mbox cmd response: success
17,829,361 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,833,780 UART: [afmc] ++
17,834,369 UART: [afmc] CDI.KEYID = 6
17,835,338 UART: [afmc] SUBJECT.KEYID = 7
17,836,562 UART: [afmc] AUTHORITY.KEYID = 5
21,151,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,541 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,839 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,185 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,036 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,471 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,727 UART: [afmc] --
23,515,998 UART: [cold-reset] --
23,520,614 UART: [state] Locking Datavault
23,524,989 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,739 UART: [state] Locking ICCM
23,528,594 UART: [exit] Launching FMC @ 0x40000130
23,536,949 UART:
23,537,190 UART: Running Caliptra FMC ...
23,538,291 UART:
23,538,447 UART: [state] CFI Enabled
23,546,661 UART: [fht] FMC Alias Private Key: 7
25,877,252 UART: [art] Extend RT PCRs Done
25,878,463 UART: [art] Lock RT PCRs Done
25,879,732 UART: [art] Populate DV Done
25,885,268 UART: [fht] FMC Alias Private Key: 7
25,886,754 UART: [art] Derive CDI
25,887,516 UART: [art] Store in in slot 0x4
25,929,998 UART: [art] Derive Key Pair
25,930,999 UART: [art] Store priv key in slot 0x5
29,173,352 UART: [art] Derive Key Pair - Done
29,186,358 UART: [art] Signing Cert with AUTHO
29,187,670 UART: RITY.KEYID = 7
31,467,294 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,800 UART: [art] PUB.X = D00329E54F1E4363FC5ECC733028288065EA6E09990A0FF0052B4E848097AF9A5242DB4A4A045E7DD4973DF0280A156B
31,476,041 UART: [art] PUB.Y = 7D129A59EAA187D72184931F2BCB338ACF97B8719BB2162650407DD3B00DABFCA2292D5233EE4BC14674C70547DE5BF7
31,483,285 UART: [art] SIG.R = 3002E388D11E9742D49B8223BF216A183607D6A28B47865D3D84DACDF564FA9EE1F1FB9D16531B19C6DBA41DC8AB2448
31,490,671 UART: [art] SIG.S = 1E82DB5668052C263A83643B93B9D93C84A190FC13AD0C1F7D08429467E5B7BA42CACD6EEF37E06A297CB158D923C83B
32,796,462 UART: Caliptra RT
32,797,176 UART: [state] CFI Enabled
32,914,029 UART: [rt] RT listening for mailbox commands...
32,945,127 UART: [rt]cmd =0x49444549, len=4
32,947,894 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
4,125,741 ready_for_fw is high
4,126,132 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,060,087 >>> mbox cmd response: success
18,060,771 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,702,602 UART:
23,702,991 UART: Running Caliptra FMC ...
23,704,091 UART:
23,704,252 UART: [state] CFI Enabled
23,712,041 UART: [fht] FMC Alias Private Key: 7
26,041,883 UART: [art] Extend RT PCRs Done
26,043,129 UART: [art] Lock RT PCRs Done
26,044,920 UART: [art] Populate DV Done
26,050,504 UART: [fht] FMC Alias Private Key: 7
26,051,996 UART: [art] Derive CDI
26,052,759 UART: [art] Store in in slot 0x4
26,095,643 UART: [art] Derive Key Pair
26,096,691 UART: [art] Store priv key in slot 0x5
29,338,107 UART: [art] Derive Key Pair - Done
29,351,152 UART: [art] Signing Cert with AUTHO
29,352,480 UART: RITY.KEYID = 7
31,631,703 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,204 UART: [art] PUB.X = 2297BF3274DBE2E1A9B733F38E55A1EE469C7F11AAA05E2F791BCFD320AF72318790A63839C5C04933A0B245D7F2BCE8
31,640,486 UART: [art] PUB.Y = 60AEEC248C93B2F919742BFDA78970AAA3F6FF2F2A171AD9193CD3DB8536E384407AF92F17C3208ED735416A8CAA5A02
31,647,736 UART: [art] SIG.R = D35F37122B1B1AC49277AF2920C1A6B0DC5F2A42765C8FBF420BF94D9EB2C049CE93DFAA3A10E56C83320DA06F7537FB
31,655,145 UART: [art] SIG.S = 71CCF6D15BB9D1CF91F09FC491FF534A879FA48E44405E08E0C4BCE519AD9648262912BEFA371A9C4D0742FA57E4658A
32,959,612 UART: Caliptra RT
32,960,318 UART: [state] CFI Enabled
33,078,139 UART: [rt] RT listening for mailbox commands...
33,109,007 UART: [rt]cmd =0x49444549, len=4
33,111,695 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,528 UART:
192,899 UART: Running Caliptra ROM ...
194,108 UART:
194,267 UART: [state] CFI Enabled
265,488 UART: [state] LifecycleState = Unprovisioned
267,357 UART: [state] DebugLocked = No
268,763 UART: [state] WD Timer not started. Device not locked for debugging
272,304 UART: [kat] SHA2-256
451,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,005 UART: [kat] ++
463,462 UART: [kat] sha1
473,906 UART: [kat] SHA2-256
476,988 UART: [kat] SHA2-384
482,197 UART: [kat] SHA2-512-ACC
485,202 UART: [kat] ECC-384
2,948,636 UART: [kat] HMAC-384Kdf
2,973,244 UART: [kat] LMS
3,502,680 UART: [kat] --
3,506,384 UART: [cold-reset] ++
3,507,962 UART: [fht] FHT @ 0x50003400
3,520,216 UART: [idev] ++
3,520,784 UART: [idev] CDI.KEYID = 6
3,521,864 UART: [idev] SUBJECT.KEYID = 7
3,522,972 UART: [idev] UDS.KEYID = 0
3,523,904 ready_for_fw is high
3,524,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,946 UART: [idev] Erasing UDS.KEYID = 0
6,025,504 UART: [idev] Sha1 KeyId Algorithm
6,048,678 UART: [idev] --
6,053,483 UART: [ldev] ++
6,054,064 UART: [ldev] CDI.KEYID = 6
6,054,988 UART: [ldev] SUBJECT.KEYID = 5
6,056,152 UART: [ldev] AUTHORITY.KEYID = 7
6,057,390 UART: [ldev] FE.KEYID = 1
6,102,778 UART: [ldev] Erasing FE.KEYID = 1
8,606,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,223 UART: [ldev] --
10,416,158 UART: [fwproc] Wait for Commands...
10,418,309 UART: [fwproc] Recv command 0x46574c44
10,420,398 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,620 >>> mbox cmd response: success
14,284,165 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,287,994 UART: [afmc] ++
14,288,580 UART: [afmc] CDI.KEYID = 6
14,289,466 UART: [afmc] SUBJECT.KEYID = 7
14,290,681 UART: [afmc] AUTHORITY.KEYID = 5
16,833,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,679 UART: [afmc] --
18,629,788 UART: [cold-reset] --
18,633,602 UART: [state] Locking Datavault
18,636,846 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,542 UART: [state] Locking ICCM
18,639,994 UART: [exit] Launching FMC @ 0x40000130
18,648,451 UART:
18,648,722 UART: Running Caliptra FMC ...
18,649,832 UART:
18,650,000 UART: [state] CFI Enabled
18,714,271 UART: [fht] FMC Alias Private Key: 7
20,478,290 UART: [art] Extend RT PCRs Done
20,479,517 UART: [art] Lock RT PCRs Done
20,481,038 UART: [art] Populate DV Done
20,486,668 UART: [fht] FMC Alias Private Key: 7
20,488,299 UART: [art] Derive CDI
20,489,232 UART: [art] Store in in slot 0x4
20,546,846 UART: [art] Derive Key Pair
20,547,850 UART: [art] Store priv key in slot 0x5
23,010,384 UART: [art] Derive Key Pair - Done
23,023,281 UART: [art] Signing Cert with AUTHO
23,024,597 UART: RITY.KEYID = 7
24,737,031 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,545 UART: [art] PUB.X = 3769EBF58CCEA4E7745E80E222065F34676229BD8D57135D41B2DDD9ED07E5277F30BFC8328A9134FC21475CC6774A02
24,745,777 UART: [art] PUB.Y = 3FA701FFA54F6E9BFAE0AB193C85D381C4C9FA34CFD26F3F7DA51C70DE3CBDF19506C73A4D83A5791675C5860997E29E
24,753,055 UART: [art] SIG.R = 82CE93DAD966A74F0E725D5E15FE7606994D53448D3F7B3F9A97248DED8379A82B10E44E0AC080653E7F8AEAE828D39D
24,760,448 UART: [art] SIG.S = E9D0DE64CBD14A7DF0A1F756ADE34DD88E33107AA8213986F2FCA94046EFFFA4619011817663D6E28B9C6FFD637B0255
25,739,442 UART: Caliptra RT
25,740,152 UART: [state] CFI Enabled
25,904,712 UART: [rt] RT listening for mailbox commands...
25,935,952 UART: [rt]cmd =0x49444549, len=4
25,938,745 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,433 UART:
192,820 UART: Running Caliptra ROM ...
194,014 UART:
194,178 UART: [state] CFI Enabled
262,302 UART: [state] LifecycleState = Unprovisioned
264,720 UART: [state] DebugLocked = No
267,256 UART: [state] WD Timer not started. Device not locked for debugging
272,566 UART: [kat] SHA2-256
462,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,220 UART: [kat] ++
473,708 UART: [kat] sha1
484,512 UART: [kat] SHA2-256
487,523 UART: [kat] SHA2-384
493,513 UART: [kat] SHA2-512-ACC
496,113 UART: [kat] ECC-384
2,949,442 UART: [kat] HMAC-384Kdf
2,971,402 UART: [kat] LMS
3,503,197 UART: [kat] --
3,507,025 UART: [cold-reset] ++
3,508,253 UART: [fht] FHT @ 0x50003400
3,519,557 UART: [idev] ++
3,520,260 UART: [idev] CDI.KEYID = 6
3,521,211 UART: [idev] SUBJECT.KEYID = 7
3,522,380 UART: [idev] UDS.KEYID = 0
3,523,285 ready_for_fw is high
3,523,491 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,395 UART: [idev] Erasing UDS.KEYID = 0
6,028,150 UART: [idev] Sha1 KeyId Algorithm
6,051,343 UART: [idev] --
6,057,180 UART: [ldev] ++
6,057,885 UART: [ldev] CDI.KEYID = 6
6,058,802 UART: [ldev] SUBJECT.KEYID = 5
6,059,963 UART: [ldev] AUTHORITY.KEYID = 7
6,061,145 UART: [ldev] FE.KEYID = 1
6,099,288 UART: [ldev] Erasing FE.KEYID = 1
8,602,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,147 UART: [ldev] --
10,415,958 UART: [fwproc] Wait for Commands...
10,418,701 UART: [fwproc] Recv command 0x46574c44
10,421,045 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,107 >>> mbox cmd response: success
14,603,635 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,607,017 UART: [afmc] ++
14,607,720 UART: [afmc] CDI.KEYID = 6
14,608,909 UART: [afmc] SUBJECT.KEYID = 7
14,610,343 UART: [afmc] AUTHORITY.KEYID = 5
17,148,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,763 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,791 UART: [afmc] --
18,950,087 UART: [cold-reset] --
18,955,086 UART: [state] Locking Datavault
18,962,894 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,041 UART: [state] Locking ICCM
18,966,686 UART: [exit] Launching FMC @ 0x40000130
18,975,349 UART:
18,975,585 UART: Running Caliptra FMC ...
18,976,685 UART:
18,976,842 UART: [state] CFI Enabled
19,029,913 UART: [fht] FMC Alias Private Key: 7
20,794,219 UART: [art] Extend RT PCRs Done
20,795,422 UART: [art] Lock RT PCRs Done
20,796,826 UART: [art] Populate DV Done
20,802,232 UART: [fht] FMC Alias Private Key: 7
20,803,710 UART: [art] Derive CDI
20,804,443 UART: [art] Store in in slot 0x4
20,862,956 UART: [art] Derive Key Pair
20,863,988 UART: [art] Store priv key in slot 0x5
23,327,328 UART: [art] Derive Key Pair - Done
23,340,243 UART: [art] Signing Cert with AUTHO
23,341,542 UART: RITY.KEYID = 7
25,055,856 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,357 UART: [art] PUB.X = 3D4C8069D0A5B50E1C20CBEA295120248063D02C6400124B2F7DB8A90B73AF7EA174E6F114B86F2A7E331B11C5959ECF
25,064,686 UART: [art] PUB.Y = 653BC8F0E170EE00249C8AF4C292F0C5EF996FD0EB55B7DDD37BEA6FEDCFAB9E575EAF077668D62AD757F7B26AC042A8
25,071,935 UART: [art] SIG.R = 8CFF525EC5C86BC534B960DBAB8135667DEE34BFC3F2A53A4655B762F0C302B9F1FA42D8B7CA77529F615944FFC27EEB
25,079,318 UART: [art] SIG.S = 7730FF5544C0A9E68BE587D96886FE4EF0E059B36D7C35D0C469888E909DD9CFEE3512F92EA15462A6CE17D5C57F3436
26,058,175 UART: Caliptra RT
26,058,890 UART: [state] CFI Enabled
26,223,780 UART: [rt] RT listening for mailbox commands...
26,254,978 UART: [rt]cmd =0x49444549, len=4
26,257,747 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,438,145 ready_for_fw is high
3,438,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,728,140 >>> mbox cmd response: success
14,729,015 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,004,584 UART:
19,004,982 UART: Running Caliptra FMC ...
19,006,196 UART:
19,006,372 UART: [state] CFI Enabled
19,072,766 UART: [fht] FMC Alias Private Key: 7
20,836,750 UART: [art] Extend RT PCRs Done
20,837,973 UART: [art] Lock RT PCRs Done
20,839,710 UART: [art] Populate DV Done
20,845,018 UART: [fht] FMC Alias Private Key: 7
20,846,580 UART: [art] Derive CDI
20,847,399 UART: [art] Store in in slot 0x4
20,905,225 UART: [art] Derive Key Pair
20,906,223 UART: [art] Store priv key in slot 0x5
23,369,237 UART: [art] Derive Key Pair - Done
23,382,568 UART: [art] Signing Cert with AUTHO
23,383,876 UART: RITY.KEYID = 7
25,095,333 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,849 UART: [art] PUB.X = 08BD3F23F085794F8D37D911B552CB99ACFE64D76420B5E820B1136015429A637C5687914211698413BDFEB925DE567C
25,104,097 UART: [art] PUB.Y = F6565A7D875BD82765E75C7D6CDDAD855417CF8344118A574DAD409AB8BDB57865B8C833E80616669B6123BBF099C4BD
25,111,361 UART: [art] SIG.R = F3078EBFE11ECE174F1B70142586E847FD96D047D8F24C6ABC7F618F229CCE09D281E1A00F6B5A42747BF48C7A2E6682
25,118,752 UART: [art] SIG.S = 55F942A599DA6A3F1F6E8B9808EEEDD02B57DEA2634D4D00E21BF4A0B38E4BBB49BE4048DF0C282812426D7275387151
26,097,324 UART: Caliptra RT
26,098,034 UART: [state] CFI Enabled
26,264,281 UART: [rt] RT listening for mailbox commands...
26,295,192 UART: [rt]cmd =0x49444549, len=4
26,297,842 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,467 UART:
192,846 UART: Running Caliptra ROM ...
194,010 UART:
603,518 UART: [state] CFI Enabled
613,771 UART: [state] LifecycleState = Unprovisioned
616,135 UART: [state] DebugLocked = No
617,875 UART: [state] WD Timer not started. Device not locked for debugging
621,834 UART: [kat] SHA2-256
811,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,481 UART: [kat] ++
823,006 UART: [kat] sha1
833,456 UART: [kat] SHA2-256
836,463 UART: [kat] SHA2-384
841,883 UART: [kat] SHA2-512-ACC
844,530 UART: [kat] ECC-384
3,288,439 UART: [kat] HMAC-384Kdf
3,300,845 UART: [kat] LMS
3,832,633 UART: [kat] --
3,837,448 UART: [cold-reset] ++
3,840,025 UART: [fht] FHT @ 0x50003400
3,852,037 UART: [idev] ++
3,852,758 UART: [idev] CDI.KEYID = 6
3,853,737 UART: [idev] SUBJECT.KEYID = 7
3,854,913 UART: [idev] UDS.KEYID = 0
3,855,833 ready_for_fw is high
3,856,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,645 UART: [idev] Erasing UDS.KEYID = 0
6,329,989 UART: [idev] Sha1 KeyId Algorithm
6,352,063 UART: [idev] --
6,356,626 UART: [ldev] ++
6,357,311 UART: [ldev] CDI.KEYID = 6
6,358,228 UART: [ldev] SUBJECT.KEYID = 5
6,359,440 UART: [ldev] AUTHORITY.KEYID = 7
6,360,617 UART: [ldev] FE.KEYID = 1
6,371,657 UART: [ldev] Erasing FE.KEYID = 1
8,849,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,291 UART: [ldev] --
10,641,145 UART: [fwproc] Wait for Commands...
10,642,912 UART: [fwproc] Recv command 0x46574c44
10,645,223 UART: [fwproc] Recv'd Img size: 114360 bytes
14,085,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,278,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,820,896 >>> mbox cmd response: success
14,821,398 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,824,067 UART: [afmc] ++
14,824,780 UART: [afmc] CDI.KEYID = 6
14,826,018 UART: [afmc] SUBJECT.KEYID = 7
14,827,448 UART: [afmc] AUTHORITY.KEYID = 5
17,338,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,092,951 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,107,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,518 UART: [afmc] --
19,134,759 UART: [cold-reset] --
19,140,086 UART: [state] Locking Datavault
19,145,756 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,947 UART: [state] Locking ICCM
19,149,341 UART: [exit] Launching FMC @ 0x40000130
19,158,010 UART:
19,158,265 UART: Running Caliptra FMC ...
19,159,366 UART:
19,159,523 UART: [state] CFI Enabled
19,167,671 UART: [fht] FMC Alias Private Key: 7
20,924,890 UART: [art] Extend RT PCRs Done
20,926,105 UART: [art] Lock RT PCRs Done
20,927,619 UART: [art] Populate DV Done
20,932,916 UART: [fht] FMC Alias Private Key: 7
20,934,557 UART: [art] Derive CDI
20,935,369 UART: [art] Store in in slot 0x4
20,978,174 UART: [art] Derive Key Pair
20,979,171 UART: [art] Store priv key in slot 0x5
23,405,788 UART: [art] Derive Key Pair - Done
23,418,670 UART: [art] Signing Cert with AUTHO
23,419,974 UART: RITY.KEYID = 7
25,125,260 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,788 UART: [art] PUB.X = AADBC76CE58086AEB1D9FF00E2723821A7BC77C782435D5EFE7C04E0B6DDA6DDDE9B7F03AE415BB6316F8C55021FA21A
25,134,047 UART: [art] PUB.Y = 72300ED9102A7159AB4802DA18BBCD646195575CA0D6D3757A06ABFAC5D9AD3A3374F21FEB192CB72CFBC7E7611C1CBD
25,141,332 UART: [art] SIG.R = 5D82E5C97791B45068D6C67A567CD12C9A1307715AD5216D4507E62DF39654B2CF455DD5D155078D234ED9BC4AED7CB6
25,148,732 UART: [art] SIG.S = B638B52324660958F30507AFFA221E6BA6B89F1BA6F1C0E0F28AD146A1E9E44F804EE444787391D896BAE725AB20CC2F
26,128,251 UART: Caliptra RT
26,128,940 UART: [state] CFI Enabled
26,246,356 UART: [rt] RT listening for mailbox commands...
26,277,110 UART: [rt]cmd =0x49444549, len=4
26,280,009 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,752,367 ready_for_fw is high
3,752,900 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,955,185 >>> mbox cmd response: success
14,955,785 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,203,831 UART:
19,204,234 UART: Running Caliptra FMC ...
19,205,324 UART:
19,205,473 UART: [state] CFI Enabled
19,213,529 UART: [fht] FMC Alias Private Key: 7
20,970,244 UART: [art] Extend RT PCRs Done
20,971,463 UART: [art] Lock RT PCRs Done
20,972,627 UART: [art] Populate DV Done
20,977,826 UART: [fht] FMC Alias Private Key: 7
20,979,419 UART: [art] Derive CDI
20,980,157 UART: [art] Store in in slot 0x4
21,022,937 UART: [art] Derive Key Pair
21,023,982 UART: [art] Store priv key in slot 0x5
23,450,847 UART: [art] Derive Key Pair - Done
23,464,002 UART: [art] Signing Cert with AUTHO
23,465,300 UART: RITY.KEYID = 7
25,170,935 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,442 UART: [art] PUB.X = 72CC13A3429764BBC43F23B9BDBE25C24283293D261570FA3B24BE1CDBC783A045AEEF3C81BECD28696F66E2B2B528B1
25,179,700 UART: [art] PUB.Y = E6F61245D04BAD508DA79A0D31D20209993E9D6C5A14DF20BFAE9D351CE48A85D29037DD1ACCA2668CD763B37D5C4BF6
25,186,962 UART: [art] SIG.R = A7231DC26329C5BD280F01B33576EBC44A245E472932D63DA47FC312824637EA7CB0857A0DA454F69D71A1F518AA0D5F
25,194,357 UART: [art] SIG.S = 1D16228C1320A2192B4D9FCB1856F81749329091EFE1FE6EDC598906A1211A160CC9959B07B1C6B93BC23F14294C2D7D
26,173,617 UART: Caliptra RT
26,174,327 UART: [state] CFI Enabled
26,290,414 UART: [rt] RT listening for mailbox commands...
26,321,441 UART: [rt]cmd =0x49444549, len=4
26,324,183 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,274 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,751 UART: [fht] Storing FHT @ 0x50003400
1,479,456 UART: [idev] ++
1,479,624 UART: [idev] CDI.KEYID = 6
1,479,984 UART: [idev] SUBJECT.KEYID = 7
1,480,408 UART: [idev] UDS.KEYID = 0
1,480,753 ready_for_fw is high
1,480,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,668 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,514,875 UART: [ldev] ++
1,515,043 UART: [ldev] CDI.KEYID = 6
1,515,406 UART: [ldev] SUBJECT.KEYID = 5
1,515,832 UART: [ldev] AUTHORITY.KEYID = 7
1,516,295 UART: [ldev] FE.KEYID = 1
1,521,551 UART: [ldev] Erasing FE.KEYID = 1
1,546,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,964 UART: [ldev] --
1,586,389 UART: [fwproc] Waiting for Commands...
1,587,016 UART: [fwproc] Received command 0x46574c44
1,587,807 UART: [fwproc] Received Image of size 114360 bytes
2,886,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,607 >>> mbox cmd response: success
3,079,607 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,080,757 UART: [afmc] ++
3,080,925 UART: [afmc] CDI.KEYID = 6
3,081,287 UART: [afmc] SUBJECT.KEYID = 7
3,081,712 UART: [afmc] AUTHORITY.KEYID = 5
3,116,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,100 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,790 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,915 UART: [afmc] --
3,159,867 UART: [cold-reset] --
3,160,869 UART: [state] Locking Datavault
3,162,030 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,634 UART: [state] Locking ICCM
3,163,212 UART: [exit] Launching FMC @ 0x40000130
3,168,541 UART:
3,168,557 UART: Running Caliptra FMC ...
3,168,965 UART:
3,169,019 UART: [state] CFI Enabled
3,179,562 UART: [fht] FMC Alias Private Key: 7
3,286,595 UART: [art] Extend RT PCRs Done
3,287,023 UART: [art] Lock RT PCRs Done
3,288,357 UART: [art] Populate DV Done
3,296,506 UART: [fht] FMC Alias Private Key: 7
3,297,478 UART: [art] Derive CDI
3,297,758 UART: [art] Store in in slot 0x4
3,384,069 UART: [art] Derive Key Pair
3,384,429 UART: [art] Store priv key in slot 0x5
3,397,303 UART: [art] Derive Key Pair - Done
3,411,940 UART: [art] Signing Cert with AUTHO
3,412,420 UART: RITY.KEYID = 7
3,427,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,399 UART: [art] PUB.X = 4E0C64C1EEBF02D2CD3E2DA1569CCDE172B58747422B9B00056DD54F92CA7378393DE9104A1AA8AD223B83F481EE5AE7
3,435,152 UART: [art] PUB.Y = AAF24BCB51C70F27B874B2ED95D4582162576294545C5F478CA8FA6B86125117B86EB08F870D2734687F0FDAE925DCB0
3,442,097 UART: [art] SIG.R = 3C1E5F5BFDE3F1DB7CA5F8CEAE4A8BC8885B82A88FF2D0198AAACF7DB770E32755A890208E4E03F9B5E937DD5B101B0E
3,448,887 UART: [art] SIG.S = 558F035B9EAE4E653ECF2DA6EB9F5C43B0212F2490397664A101FDCB1FBCE9B66D9541E8C7BE3CA6B74DE8049D735DBD
3,472,577 UART: Caliptra RT
3,472,831 UART: [state] CFI Enabled
3,580,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,185 UART: [rt]cmd =0x49444549, len=4
3,613,606 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,703 ready_for_fw is high
1,362,703 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,757 >>> mbox cmd response: success
2,928,757 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,990,383 UART:
2,990,399 UART: Running Caliptra FMC ...
2,990,807 UART:
2,990,861 UART: [state] CFI Enabled
3,001,602 UART: [fht] FMC Alias Private Key: 7
3,109,511 UART: [art] Extend RT PCRs Done
3,109,939 UART: [art] Lock RT PCRs Done
3,111,397 UART: [art] Populate DV Done
3,119,670 UART: [fht] FMC Alias Private Key: 7
3,120,632 UART: [art] Derive CDI
3,120,912 UART: [art] Store in in slot 0x4
3,206,459 UART: [art] Derive Key Pair
3,206,819 UART: [art] Store priv key in slot 0x5
3,220,191 UART: [art] Derive Key Pair - Done
3,234,692 UART: [art] Signing Cert with AUTHO
3,235,172 UART: RITY.KEYID = 7
3,250,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,367 UART: [art] PUB.X = A2EB6E6537341F9C9820160CA7AD01F2735D2B3820E12FD84D6BD9A1D250656D68659386C7D56E95CA3332295B5F4D52
3,258,129 UART: [art] PUB.Y = 6D6E6CFD53F805C5302998C4050546821AB121374B9C403E8C7EFD9B73E3F80CD5A51C560A4F1984503B6581E8AEE99B
3,265,066 UART: [art] SIG.R = 8A929E3B623FEA1E1867E2F215E56C2EADA3F93B903CC176DC19C1F89DA928ADABABFA700CC45850AE3F0C10A2BFCF94
3,271,856 UART: [art] SIG.S = 89E4798DF6AF690B347E1E7A76B1D6DF2A08BBF3277CADB3FA245D639D0B49906517E94393CE99B76E9366B7A33FD05B
3,295,218 UART: Caliptra RT
3,295,472 UART: [state] CFI Enabled
3,404,045 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,052 UART: [rt]cmd =0x49444549, len=4
3,436,469 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,820 UART: [kat] SHA2-256
882,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,866 UART: [kat] ++
887,018 UART: [kat] sha1
891,302 UART: [kat] SHA2-256
893,240 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,321 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,476,908 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,055 UART: [idev] ++
1,480,223 UART: [idev] CDI.KEYID = 6
1,480,583 UART: [idev] SUBJECT.KEYID = 7
1,481,007 UART: [idev] UDS.KEYID = 0
1,481,352 ready_for_fw is high
1,481,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,105 UART: [idev] Erasing UDS.KEYID = 0
1,505,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,939 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,521,626 UART: [ldev] Erasing FE.KEYID = 1
1,546,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,605 UART: [ldev] --
1,586,106 UART: [fwproc] Waiting for Commands...
1,586,759 UART: [fwproc] Received command 0x46574c44
1,587,550 UART: [fwproc] Received Image of size 114360 bytes
2,885,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,235 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,528 >>> mbox cmd response: success
3,078,528 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,079,550 UART: [afmc] ++
3,079,718 UART: [afmc] CDI.KEYID = 6
3,080,080 UART: [afmc] SUBJECT.KEYID = 7
3,080,505 UART: [afmc] AUTHORITY.KEYID = 5
3,115,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,764 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,157 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,847 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,712 UART: [afmc] --
3,158,654 UART: [cold-reset] --
3,159,690 UART: [state] Locking Datavault
3,160,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,547 UART: [state] Locking ICCM
3,161,969 UART: [exit] Launching FMC @ 0x40000130
3,167,298 UART:
3,167,314 UART: Running Caliptra FMC ...
3,167,722 UART:
3,167,865 UART: [state] CFI Enabled
3,178,882 UART: [fht] FMC Alias Private Key: 7
3,287,187 UART: [art] Extend RT PCRs Done
3,287,615 UART: [art] Lock RT PCRs Done
3,289,141 UART: [art] Populate DV Done
3,297,424 UART: [fht] FMC Alias Private Key: 7
3,298,424 UART: [art] Derive CDI
3,298,704 UART: [art] Store in in slot 0x4
3,383,957 UART: [art] Derive Key Pair
3,384,317 UART: [art] Store priv key in slot 0x5
3,397,931 UART: [art] Derive Key Pair - Done
3,412,570 UART: [art] Signing Cert with AUTHO
3,413,050 UART: RITY.KEYID = 7
3,428,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,509 UART: [art] PUB.X = 0AE3E24D0DB41EA8BCA223828987D424722609E91EAED6B263CE1A94D3CEA860E38677A5AB3F54BF1CF62F0A8BDECA99
3,436,287 UART: [art] PUB.Y = 457EF62839A0202CFD40E582FBE62D69AEDB4CA759880989CC83F33D4DBA93C5AB7A0D60FFB581779703F6F3A707CE83
3,443,237 UART: [art] SIG.R = 0A13F8AFD9A25E01E4D4416E2E3581CB139DA72083FA19A1624905428CD346CD0110AB1A59274B18EC192B6CA8314BCC
3,450,001 UART: [art] SIG.S = 4B7F554E3387FFED939CC2E8E2EB291C9932BBFB22F3C4E83C29EB2D8522AFE99268BA6C976C46D1173ECB94890174B2
3,473,697 UART: Caliptra RT
3,474,043 UART: [state] CFI Enabled
3,583,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,723 UART: [rt]cmd =0x49444549, len=4
3,616,160 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 ready_for_fw is high
1,362,894 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,618 >>> mbox cmd response: success
2,928,618 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,989,728 UART:
2,989,744 UART: Running Caliptra FMC ...
2,990,152 UART:
2,990,295 UART: [state] CFI Enabled
3,000,944 UART: [fht] FMC Alias Private Key: 7
3,108,939 UART: [art] Extend RT PCRs Done
3,109,367 UART: [art] Lock RT PCRs Done
3,110,763 UART: [art] Populate DV Done
3,118,944 UART: [fht] FMC Alias Private Key: 7
3,120,034 UART: [art] Derive CDI
3,120,314 UART: [art] Store in in slot 0x4
3,206,181 UART: [art] Derive Key Pair
3,206,541 UART: [art] Store priv key in slot 0x5
3,220,041 UART: [art] Derive Key Pair - Done
3,235,108 UART: [art] Signing Cert with AUTHO
3,235,588 UART: RITY.KEYID = 7
3,250,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,633 UART: [art] PUB.X = 5094371BCCFC43360686ED0C5BC004252395B5BA9B775824081E815691094CE066C06F064ED190EE878FF2FCA8BE6337
3,258,383 UART: [art] PUB.Y = 3BEC73FF9E172D492A98AA6F146B809AC3D9F1AF8C9E7B29237BEBA9B363FD744C2F6549D0F7853B54BC50B18EF99850
3,265,347 UART: [art] SIG.R = 2D3BDA265B774BF0CCEAD40726E106EAF4DB08C5E65488C3F71481C9FF73C3024F6DD4F10FFC5442E169C46D5FCE9879
3,272,118 UART: [art] SIG.S = D6274853B66A29702ED987CA83D2D28075EA44D6FC747C2A423D7D9FF99DA13AEA05ED3D6C8F536CC5EF889E4FD20F70
3,296,017 UART: Caliptra RT
3,296,363 UART: [state] CFI Enabled
3,404,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,344 UART: [rt]cmd =0x49444549, len=4
3,437,725 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,613 UART: [kat] SHA2-256
903,553 UART: [kat] SHA2-384
906,290 UART: [kat] SHA2-512-ACC
908,191 UART: [kat] ECC-384
917,724 UART: [kat] HMAC-384Kdf
922,502 UART: [kat] LMS
1,170,830 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,171,989 UART: [fht] FHT @ 0x50003400
1,174,622 UART: [idev] ++
1,174,790 UART: [idev] CDI.KEYID = 6
1,175,150 UART: [idev] SUBJECT.KEYID = 7
1,175,574 UART: [idev] UDS.KEYID = 0
1,175,919 ready_for_fw is high
1,175,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,199 UART: [idev] Sha1 KeyId Algorithm
1,208,743 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,366 UART: [ldev] SUBJECT.KEYID = 5
1,210,792 UART: [ldev] AUTHORITY.KEYID = 7
1,211,255 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,339 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,362 UART: [fwproc] Recv command 0x46574c44
1,283,090 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,102 >>> mbox cmd response: success
2,772,102 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,182 UART: [afmc] ++
2,773,350 UART: [afmc] CDI.KEYID = 6
2,773,712 UART: [afmc] SUBJECT.KEYID = 7
2,774,137 UART: [afmc] AUTHORITY.KEYID = 5
2,809,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,302 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,021 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,807 UART: [afmc] --
2,852,841 UART: [cold-reset] --
2,853,443 UART: [state] Locking Datavault
2,854,552 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,156 UART: [state] Locking ICCM
2,855,772 UART: [exit] Launching FMC @ 0x40000130
2,861,101 UART:
2,861,117 UART: Running Caliptra FMC ...
2,861,525 UART:
2,861,579 UART: [state] CFI Enabled
2,872,050 UART: [fht] FMC Alias Private Key: 7
2,979,293 UART: [art] Extend RT PCRs Done
2,979,721 UART: [art] Lock RT PCRs Done
2,981,495 UART: [art] Populate DV Done
2,989,980 UART: [fht] FMC Alias Private Key: 7
2,991,116 UART: [art] Derive CDI
2,991,396 UART: [art] Store in in slot 0x4
3,076,961 UART: [art] Derive Key Pair
3,077,321 UART: [art] Store priv key in slot 0x5
3,090,611 UART: [art] Derive Key Pair - Done
3,105,124 UART: [art] Signing Cert with AUTHO
3,105,604 UART: RITY.KEYID = 7
3,121,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,045 UART: [art] PUB.X = C32A88554A344C4582493B4169B63EF0C1D60C11782A7506F8086C7EADB022E94E7BF745EA52735F62013189306990F0
3,128,793 UART: [art] PUB.Y = A2ABE624C9568047AB54F5EF4474A95FA55D0056C9E6B89155758B8BD45FF4D5B2EB02DBBB746DD2AE3B451B9E328338
3,135,730 UART: [art] SIG.R = 5778D5C27865B23624E395788EE7F6A53EE57D0CB101912686451F4FFEA9E6B93E64A02CEE17AE162822FBBE32D35B07
3,142,495 UART: [art] SIG.S = 625BEC54AAC9B1D38C55F16880FCE4DD949B136A84E91CDA1A80B0B3DFC79D53ED56906A20BCC6AFB957C96C28CDEAA3
3,166,566 UART: Caliptra RT
3,166,820 UART: [state] CFI Enabled
3,275,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,251 UART: [rt]cmd =0x49444549, len=4
3,307,748 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,763 ready_for_fw is high
1,059,763 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,957 >>> mbox cmd response: success
2,627,957 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,690,585 UART:
2,690,601 UART: Running Caliptra FMC ...
2,691,009 UART:
2,691,063 UART: [state] CFI Enabled
2,701,464 UART: [fht] FMC Alias Private Key: 7
2,809,269 UART: [art] Extend RT PCRs Done
2,809,697 UART: [art] Lock RT PCRs Done
2,811,491 UART: [art] Populate DV Done
2,819,630 UART: [fht] FMC Alias Private Key: 7
2,820,778 UART: [art] Derive CDI
2,821,058 UART: [art] Store in in slot 0x4
2,906,715 UART: [art] Derive Key Pair
2,907,075 UART: [art] Store priv key in slot 0x5
2,920,813 UART: [art] Derive Key Pair - Done
2,935,481 UART: [art] Signing Cert with AUTHO
2,935,961 UART: RITY.KEYID = 7
2,951,047 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,812 UART: [art] PUB.X = 50603946016AF59EF72D1742CC17BD8B4FF4AEEA8F867ED7F2A96125E7B517EC49024F862B0DE5C5756A7396DB3A6AC8
2,958,583 UART: [art] PUB.Y = 3168200032857224C775B04260A6BBBE451DC5827FFC2599F8DE4BFECF2DA00186EC4D683E5AB3869CCCAFA9EEFC7FEF
2,965,528 UART: [art] SIG.R = 68B7344484A8E0851AC29A625ABA3C4BDB53C4FE009FAE014A776DA1BB84F016C5E18077C67CAD6F7CA05745C2E78606
2,972,280 UART: [art] SIG.S = 569736C7B376A5EDC168BFD458B74CAF02A26FAFEDD291292DE541EB56B61299A9616AA3C65EE3DCF5BD9D8E98A3F370
2,996,748 UART: Caliptra RT
2,997,002 UART: [state] CFI Enabled
3,104,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,423 UART: [rt]cmd =0x49444549, len=4
3,136,664 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
893,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,832 UART: [kat] ++
897,984 UART: [kat] sha1
902,096 UART: [kat] SHA2-256
904,036 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
922,841 UART: [kat] LMS
1,171,169 UART: [kat] --
1,172,026 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,271 UART: [idev] ++
1,175,439 UART: [idev] CDI.KEYID = 6
1,175,799 UART: [idev] SUBJECT.KEYID = 7
1,176,223 UART: [idev] UDS.KEYID = 0
1,176,568 ready_for_fw is high
1,176,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,119 UART: [idev] Erasing UDS.KEYID = 0
1,201,104 UART: [idev] Sha1 KeyId Algorithm
1,209,722 UART: [idev] --
1,210,738 UART: [ldev] ++
1,210,906 UART: [ldev] CDI.KEYID = 6
1,211,269 UART: [ldev] SUBJECT.KEYID = 5
1,211,695 UART: [ldev] AUTHORITY.KEYID = 7
1,212,158 UART: [ldev] FE.KEYID = 1
1,217,482 UART: [ldev] Erasing FE.KEYID = 1
1,243,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,572 UART: [ldev] --
1,282,983 UART: [fwproc] Wait for Commands...
1,283,697 UART: [fwproc] Recv command 0x46574c44
1,284,425 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,257 >>> mbox cmd response: success
2,775,257 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,776,481 UART: [afmc] ++
2,776,649 UART: [afmc] CDI.KEYID = 6
2,777,011 UART: [afmc] SUBJECT.KEYID = 7
2,777,436 UART: [afmc] AUTHORITY.KEYID = 5
2,812,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,134 UART: [afmc] --
2,856,108 UART: [cold-reset] --
2,856,970 UART: [state] Locking Datavault
2,858,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,829 UART: [state] Locking ICCM
2,859,471 UART: [exit] Launching FMC @ 0x40000130
2,864,800 UART:
2,864,816 UART: Running Caliptra FMC ...
2,865,224 UART:
2,865,367 UART: [state] CFI Enabled
2,876,038 UART: [fht] FMC Alias Private Key: 7
2,984,185 UART: [art] Extend RT PCRs Done
2,984,613 UART: [art] Lock RT PCRs Done
2,986,011 UART: [art] Populate DV Done
2,994,130 UART: [fht] FMC Alias Private Key: 7
2,995,242 UART: [art] Derive CDI
2,995,522 UART: [art] Store in in slot 0x4
3,081,337 UART: [art] Derive Key Pair
3,081,697 UART: [art] Store priv key in slot 0x5
3,095,505 UART: [art] Derive Key Pair - Done
3,110,290 UART: [art] Signing Cert with AUTHO
3,110,770 UART: RITY.KEYID = 7
3,126,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,989 UART: [art] PUB.X = B577801367382DABD3E999FA12D6A44F272548D6247B126FACD57987FED3CF0ABF5490D8324D8437A5790E5C373A11AA
3,133,757 UART: [art] PUB.Y = 62B6B9DCAF568063E54B694D165E3A1362AC66360BA03F891A4E8770BE808D446A2AAF74A55D5BAD5DC0BEAE32A55800
3,140,694 UART: [art] SIG.R = D6CBDDFBEEBAB83D480FA201DAC77AD74BCCDABA983C41061A1EF78E17ECBEEE5145DD6CFDDE8CA1F45AA8B6E8714016
3,147,497 UART: [art] SIG.S = 1D829D056A6B49906E0CA7B04E7ADDA13A6EB6F5EBE3BAC609A98183F2990AA382EC9D4472BB62355767F55FDDE10E8E
3,171,249 UART: Caliptra RT
3,171,595 UART: [state] CFI Enabled
3,279,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,470 UART: [rt]cmd =0x49444549, len=4
3,312,003 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,634 ready_for_fw is high
1,059,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,968 >>> mbox cmd response: success
2,624,968 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,687,698 UART:
2,687,714 UART: Running Caliptra FMC ...
2,688,122 UART:
2,688,265 UART: [state] CFI Enabled
2,699,022 UART: [fht] FMC Alias Private Key: 7
2,807,217 UART: [art] Extend RT PCRs Done
2,807,645 UART: [art] Lock RT PCRs Done
2,809,303 UART: [art] Populate DV Done
2,817,476 UART: [fht] FMC Alias Private Key: 7
2,818,636 UART: [art] Derive CDI
2,818,916 UART: [art] Store in in slot 0x4
2,904,577 UART: [art] Derive Key Pair
2,904,937 UART: [art] Store priv key in slot 0x5
2,918,327 UART: [art] Derive Key Pair - Done
2,933,063 UART: [art] Signing Cert with AUTHO
2,933,543 UART: RITY.KEYID = 7
2,948,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,036 UART: [art] PUB.X = DA9EA18E1951AD2C3EEFA97F2351F4A2327E982CC46DC323AF13D0BF870F10408BDCC7BC0479D8727A1EA3560E30407F
2,955,811 UART: [art] PUB.Y = 0A1E7535D1B7A13878CC36099ED110C67FE8A319395D19D953BAF719AF97681E82BE50EEF97BB11CA7FBE30D1471143B
2,962,760 UART: [art] SIG.R = 1CD7C66D1A78B4B9F9E1A0CE053F2E811AC5B67D8DF8362A7B0C9741CD6593FEC2BE9F470B3051BBF56D15C95A2E0154
2,969,534 UART: [art] SIG.S = 6190188A9242A9B06AE3FDCCDDC3BB3A83A760E02CCBC4218676ECED815CD7AFF4186E0C186371A9C538935741734410
2,992,954 UART: Caliptra RT
2,993,300 UART: [state] CFI Enabled
3,100,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,893 UART: [rt]cmd =0x49444549, len=4
3,133,220 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,205 UART: [kat] SHA2-256
901,145 UART: [kat] SHA2-384
903,884 UART: [kat] SHA2-512-ACC
905,785 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,192 UART: [kat] LMS
1,168,504 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,174,499 ready_for_fw is high
1,174,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,198,967 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,209,000 UART: [ldev] ++
1,209,168 UART: [ldev] CDI.KEYID = 6
1,209,532 UART: [ldev] SUBJECT.KEYID = 5
1,209,959 UART: [ldev] AUTHORITY.KEYID = 7
1,210,422 UART: [ldev] FE.KEYID = 1
1,215,534 UART: [ldev] Erasing FE.KEYID = 1
1,242,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,378 UART: [ldev] --
1,281,726 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,262 >>> mbox cmd response: success
2,773,262 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,774,287 UART: [afmc] ++
2,774,455 UART: [afmc] CDI.KEYID = 6
2,774,818 UART: [afmc] SUBJECT.KEYID = 7
2,775,244 UART: [afmc] AUTHORITY.KEYID = 5
2,811,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,604 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,323 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,198 UART: [afmc] --
2,854,244 UART: [cold-reset] --
2,855,130 UART: [state] Locking Datavault
2,856,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,839 UART: [state] Locking ICCM
2,857,277 UART: [exit] Launching FMC @ 0x40000130
2,862,606 UART:
2,862,622 UART: Running Caliptra FMC ...
2,863,030 UART:
2,863,084 UART: [state] CFI Enabled
2,873,625 UART: [fht] FMC Alias Private Key: 7
2,981,826 UART: [art] Extend RT PCRs Done
2,982,254 UART: [art] Lock RT PCRs Done
2,983,652 UART: [art] Populate DV Done
2,992,089 UART: [fht] FMC Alias Private Key: 7
2,993,199 UART: [art] Derive CDI
2,993,479 UART: [art] Store in in slot 0x4
3,079,376 UART: [art] Derive Key Pair
3,079,736 UART: [art] Store priv key in slot 0x5
3,092,872 UART: [art] Derive Key Pair - Done
3,107,682 UART: [art] Signing Cert with AUTHO
3,108,162 UART: RITY.KEYID = 7
3,123,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,403 UART: [art] PUB.X = F003EE2D429E1C388260097DC567E0A18652BC15814E42A71C67C49480C2F76A6D09BE0813269167E44540B979FC750E
3,131,150 UART: [art] PUB.Y = 5F269B78BE52C78C652995F23AA184531222F8E519F158A381F787BB0E02CB7FBEA726B895A7CF635B4BB86FF35804A3
3,138,095 UART: [art] SIG.R = DED474C5E0FFAD42077F2436083DC87FED855D87DF1A2BAF7D82F0D49E81B4D10286490182251CB6E40C41572951B268
3,144,854 UART: [art] SIG.S = 27FDA9CA94F183C523E859B5CDF95F9DA4F45D78570590986D76A32FA7BB9099BDF168028AE5D5B475B33A39C546400D
3,168,234 UART: Caliptra RT
3,168,488 UART: [state] CFI Enabled
3,276,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,389 UART: [rt]cmd =0x49444549, len=4
3,308,820 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,552 ready_for_fw is high
1,056,552 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,824 >>> mbox cmd response: success
2,623,824 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,686,498 UART:
2,686,514 UART: Running Caliptra FMC ...
2,686,922 UART:
2,686,976 UART: [state] CFI Enabled
2,697,537 UART: [fht] FMC Alias Private Key: 7
2,806,164 UART: [art] Extend RT PCRs Done
2,806,592 UART: [art] Lock RT PCRs Done
2,808,222 UART: [art] Populate DV Done
2,816,473 UART: [fht] FMC Alias Private Key: 7
2,817,433 UART: [art] Derive CDI
2,817,713 UART: [art] Store in in slot 0x4
2,903,152 UART: [art] Derive Key Pair
2,903,512 UART: [art] Store priv key in slot 0x5
2,917,324 UART: [art] Derive Key Pair - Done
2,931,840 UART: [art] Signing Cert with AUTHO
2,932,320 UART: RITY.KEYID = 7
2,947,566 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,331 UART: [art] PUB.X = 30379590451A8E97C66B63FFC30C07EF391714025E2F2764472AF2BCEBC430C7324D08D04A670D3CABDA8FEBDC9D299F
2,955,096 UART: [art] PUB.Y = A0C44155F9BDF016AA61184191BA5154E45900C8ACD3FED0167EFDA4A0B24082692EC694E137B44D01E870FC0D6B7310
2,962,024 UART: [art] SIG.R = 381B21F50D678CD0F27473862CE27A85EBE53C9B225D9D78F633524A9801F850C2C7F0FB9ACD4B12C9EE78C31227D346
2,968,792 UART: [art] SIG.S = 77823E0B78929EA7E1E549D05736F2A477133AD52218692F5FAB24A9BE004E33ACAC2526667438A71FEE2ED981883741
2,992,840 UART: Caliptra RT
2,993,094 UART: [state] CFI Enabled
3,101,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,101 UART: [rt]cmd =0x49444549, len=4
3,133,534 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,856 UART: [kat] ++
896,008 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,174,500 ready_for_fw is high
1,174,500 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,814 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,769 UART: [ldev] --
1,281,191 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,673 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,603 >>> mbox cmd response: success
2,772,603 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,850 UART: [afmc] ++
2,774,018 UART: [afmc] CDI.KEYID = 6
2,774,381 UART: [afmc] SUBJECT.KEYID = 7
2,774,807 UART: [afmc] AUTHORITY.KEYID = 5
2,810,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,225 UART: [afmc] --
2,854,185 UART: [cold-reset] --
2,855,157 UART: [state] Locking Datavault
2,856,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,998 UART: [state] Locking ICCM
2,857,608 UART: [exit] Launching FMC @ 0x40000130
2,862,937 UART:
2,862,953 UART: Running Caliptra FMC ...
2,863,361 UART:
2,863,504 UART: [state] CFI Enabled
2,874,087 UART: [fht] FMC Alias Private Key: 7
2,982,222 UART: [art] Extend RT PCRs Done
2,982,650 UART: [art] Lock RT PCRs Done
2,984,184 UART: [art] Populate DV Done
2,992,635 UART: [fht] FMC Alias Private Key: 7
2,993,689 UART: [art] Derive CDI
2,993,969 UART: [art] Store in in slot 0x4
3,079,416 UART: [art] Derive Key Pair
3,079,776 UART: [art] Store priv key in slot 0x5
3,093,148 UART: [art] Derive Key Pair - Done
3,107,799 UART: [art] Signing Cert with AUTHO
3,108,279 UART: RITY.KEYID = 7
3,123,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,750 UART: [art] PUB.X = C4AF06B12200BE15780FF57B669C824F3E4FB82CF383B75EA3C3AB0E3F18B4BD35C1EBC9390C1B783282D5B163D58D1E
3,131,500 UART: [art] PUB.Y = 0F5B25740CC4CE1EB6095F4A09FC6D7B90B39502EBE93A2701B85EE4048219DE8F789673B0ADD7A7117F5131AA5388E9
3,138,435 UART: [art] SIG.R = 075DA0D314129076AFB175D0E8A932BE97AD22C0843A4107E82D75F303DFFF601F280403CE073EB79C7510208854603B
3,145,183 UART: [art] SIG.S = 000D54FC5564F45E5B8CB6DFE05D3BBE4A214CC5BA796D8FABC2960FE5B211491B7592FE0FB338D45F4CAD8D90E4A751
3,169,137 UART: Caliptra RT
3,169,483 UART: [state] CFI Enabled
3,277,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,067 UART: [rt]cmd =0x49444549, len=4
3,310,364 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,637 ready_for_fw is high
1,056,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,887 >>> mbox cmd response: success
2,622,887 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,684,785 UART:
2,684,801 UART: Running Caliptra FMC ...
2,685,209 UART:
2,685,352 UART: [state] CFI Enabled
2,696,511 UART: [fht] FMC Alias Private Key: 7
2,804,672 UART: [art] Extend RT PCRs Done
2,805,100 UART: [art] Lock RT PCRs Done
2,806,504 UART: [art] Populate DV Done
2,815,037 UART: [fht] FMC Alias Private Key: 7
2,816,169 UART: [art] Derive CDI
2,816,449 UART: [art] Store in in slot 0x4
2,901,960 UART: [art] Derive Key Pair
2,902,320 UART: [art] Store priv key in slot 0x5
2,916,364 UART: [art] Derive Key Pair - Done
2,931,086 UART: [art] Signing Cert with AUTHO
2,931,566 UART: RITY.KEYID = 7
2,946,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,625 UART: [art] PUB.X = AE985761A421440234FF2207E3B445E95C7D362F9C56501F0DFDE375ECDD11EB6E2F9B6BFC28934FFC6F98FDADA5C8E8
2,954,404 UART: [art] PUB.Y = AB38A074462C6AFAC6FECEF080261494DE3924D2EC2EEF1EFE14CB31D07F8FAE119C7115C0990520E912E6963F7C6C1F
2,961,367 UART: [art] SIG.R = 6076DB7A1412B50AFDE5F256CEBB2CC579CE56C8B6F498B786B4297DDB29A73ABE2C12FFD442FECBE93F1E4F8D841EAD
2,968,162 UART: [art] SIG.S = 251CCB8C8C75969A3F2FC294480F20ED5012345807F902FF91E1DC08EDC33D445938B2516EE3D365419B670803261D7B
2,991,747 UART: Caliptra RT
2,992,093 UART: [state] CFI Enabled
3,100,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,948 UART: [rt]cmd =0x49444549, len=4
3,133,407 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,425 UART:
192,796 UART: Running Caliptra ROM ...
193,884 UART:
194,018 UART: [state] CFI Enabled
261,716 UART: [state] LifecycleState = Unprovisioned
263,678 UART: [state] DebugLocked = No
266,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,046 UART: [kat] SHA2-256
440,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,270 UART: [kat] ++
451,713 UART: [kat] sha1
463,238 UART: [kat] SHA2-256
465,932 UART: [kat] SHA2-384
470,432 UART: [kat] SHA2-512-ACC
472,792 UART: [kat] ECC-384
2,765,804 UART: [kat] HMAC-384Kdf
2,776,710 UART: [kat] LMS
3,967,026 UART: [kat] --
3,971,171 UART: [cold-reset] ++
3,972,743 UART: [fht] Storing FHT @ 0x50003400
3,983,805 UART: [idev] ++
3,984,483 UART: [idev] CDI.KEYID = 6
3,985,392 UART: [idev] SUBJECT.KEYID = 7
3,986,562 UART: [idev] UDS.KEYID = 0
3,987,591 ready_for_fw is high
3,987,781 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,131,036 UART: [idev] Erasing UDS.KEYID = 0
7,319,804 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,201 UART: [idev] --
7,345,301 UART: [ldev] ++
7,345,898 UART: [ldev] CDI.KEYID = 6
7,346,787 UART: [ldev] SUBJECT.KEYID = 5
7,348,069 UART: [ldev] AUTHORITY.KEYID = 7
7,349,303 UART: [ldev] FE.KEYID = 1
7,377,251 UART: [ldev] Erasing FE.KEYID = 1
10,707,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,002,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,017,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,032,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,046,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,065,723 UART: [ldev] --
13,069,572 UART: [fwproc] Waiting for Commands...
13,071,445 UART: [fwproc] Received command 0x46574c44
13,073,620 UART: [fwproc] Received Image of size 114036 bytes
17,123,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,197,070 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,265,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,583,041 >>> mbox cmd response: success
17,586,445 UART: [afmc] ++
17,587,037 UART: [afmc] CDI.KEYID = 6
17,587,985 UART: [afmc] SUBJECT.KEYID = 7
17,589,194 UART: [afmc] AUTHORITY.KEYID = 5
20,940,385 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,243,989 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,246,247 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,260,651 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,275,491 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,289,935 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,310,193 UART: [afmc] --
23,313,777 UART: [cold-reset] --
23,318,765 UART: [state] Locking Datavault
23,323,852 UART: [state] Locking PCR0, PCR1 and PCR31
23,325,600 UART: [state] Locking ICCM
23,326,770 UART: [exit] Launching FMC @ 0x40000130
23,335,180 UART:
23,335,409 UART: Running Caliptra FMC ...
23,336,501 UART:
23,336,665 UART: [state] CFI Enabled
23,402,925 UART: [fht] FMC Alias Private Key: 7
25,741,140 UART: [art] Extend RT PCRs Done
25,742,512 UART: [art] Lock RT PCRs Done
25,744,063 UART: [art] Populate DV Done
25,749,647 UART: [fht] FMC Alias Private Key: 7
25,751,139 UART: [art] Derive CDI
25,751,893 UART: [art] Store in in slot 0x4
25,812,119 UART: [art] Derive Key Pair
25,813,113 UART: [art] Store priv key in slot 0x5
29,106,174 UART: [art] Derive Key Pair - Done
29,119,109 UART: [art] Signing Cert with AUTHO
29,120,406 UART: RITY.KEYID = 7
31,408,199 UART: [art] Erasing AUTHORITY.KEYID = 7
31,409,706 UART: [art] PUB.X = D227AB8FC4069B3769A8304A8E594D5C248D6B9E654EB012717A215524A60899E45EB0EA4C23047F5E49B5D9C9DBE83A
31,416,917 UART: [art] PUB.Y = DBD6AB95ECC3AE18EC3AF8EE2956EBE84B8A1233B5CBA90A0E86827792587BFD44DFCF62BA60A6BDC0AE23826AD1C3FF
31,424,239 UART: [art] SIG.R = 5C198158EE8E3D5919049E2288D5496CE92F7C9A35B39B7B3AC502A0E11FF3D9FD685D4550AC89EB10103BF6065EE4B7
31,431,613 UART: [art] SIG.S = 9A0056E4490338C2FE29A31378036261F3E7D061E7611DA98B4C97C103E91AE7B3A2EF66C39F3913D5C27E0A0FFC42AF
32,736,159 UART: Caliptra RT
32,736,872 UART: [state] CFI Enabled
32,898,243 UART: [rt] RT listening for mailbox commands...
32,900,171 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,931,245 UART: [rt]cmd =0x44504543, len=136
38,562,538 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,803,850 ready_for_fw is high
3,804,232 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,873,322 >>> mbox cmd response: success
23,565,184 UART:
23,565,584 UART: Running Caliptra FMC ...
23,566,773 UART:
23,566,937 UART: [state] CFI Enabled
23,634,189 UART: [fht] FMC Alias Private Key: 7
25,972,392 UART: [art] Extend RT PCRs Done
25,973,614 UART: [art] Lock RT PCRs Done
25,975,422 UART: [art] Populate DV Done
25,981,047 UART: [fht] FMC Alias Private Key: 7
25,982,583 UART: [art] Derive CDI
25,983,412 UART: [art] Store in in slot 0x4
26,042,833 UART: [art] Derive Key Pair
26,043,874 UART: [art] Store priv key in slot 0x5
29,336,065 UART: [art] Derive Key Pair - Done
29,349,130 UART: [art] Signing Cert with AUTHO
29,350,434 UART: RITY.KEYID = 7
31,637,906 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,418 UART: [art] PUB.X = CA43F31C2158BC28CE4244B5DA1B5954A6EEAD313FA989605E4649D2C28EB2419617D64C77F93BB7EB74895AB1F8E6A7
31,646,630 UART: [art] PUB.Y = 2CF579FF279DD78C30800EB6DAB0AF78CEAFEB7D726957EC62981936EBA18097986314876AB71552306CC3C8B3BA130B
31,653,887 UART: [art] SIG.R = 40974FBB27035CB9C5A18E80B7F613858160C81A0B68C628916B905885EB41BFE89B4F18FF52A072B198A919F4B3E9CC
31,661,255 UART: [art] SIG.S = 1D29F468B814F2E3FB9C711ECF5D25F0C193ED6630C6D54DCEBBD1508814EF309382C485F3B768F7D25ED8802507CBD8
32,966,520 UART: Caliptra RT
32,967,218 UART: [state] CFI Enabled
33,129,142 UART: [rt] RT listening for mailbox commands...
33,131,062 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,162,030 UART: [rt]cmd =0x44504543, len=136
38,792,359 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,542 UART:
192,921 UART: Running Caliptra ROM ...
194,129 UART:
603,683 UART: [state] CFI Enabled
616,704 UART: [state] LifecycleState = Unprovisioned
618,586 UART: [state] DebugLocked = No
621,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,823 UART: [kat] SHA2-256
796,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,134 UART: [kat] ++
807,667 UART: [kat] sha1
818,781 UART: [kat] SHA2-256
821,468 UART: [kat] SHA2-384
827,904 UART: [kat] SHA2-512-ACC
830,283 UART: [kat] ECC-384
3,116,102 UART: [kat] HMAC-384Kdf
3,128,488 UART: [kat] LMS
4,318,611 UART: [kat] --
4,321,063 UART: [cold-reset] ++
4,322,718 UART: [fht] Storing FHT @ 0x50003400
4,333,433 UART: [idev] ++
4,334,042 UART: [idev] CDI.KEYID = 6
4,334,960 UART: [idev] SUBJECT.KEYID = 7
4,336,132 UART: [idev] UDS.KEYID = 0
4,337,116 ready_for_fw is high
4,337,314 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,377 UART: [idev] Erasing UDS.KEYID = 0
7,625,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,670 UART: [idev] --
7,650,489 UART: [ldev] ++
7,651,055 UART: [ldev] CDI.KEYID = 6
7,652,003 UART: [ldev] SUBJECT.KEYID = 5
7,653,271 UART: [ldev] AUTHORITY.KEYID = 7
7,654,417 UART: [ldev] FE.KEYID = 1
7,665,996 UART: [ldev] Erasing FE.KEYID = 1
10,950,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,911 UART: [ldev] --
13,311,490 UART: [fwproc] Waiting for Commands...
13,313,905 UART: [fwproc] Received command 0x46574c44
13,316,081 UART: [fwproc] Received Image of size 114036 bytes
17,372,825 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,835,421 >>> mbox cmd response: success
17,840,256 UART: [afmc] ++
17,840,854 UART: [afmc] CDI.KEYID = 6
17,841,797 UART: [afmc] SUBJECT.KEYID = 7
17,843,017 UART: [afmc] AUTHORITY.KEYID = 5
21,157,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,479 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,735 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,125 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,937 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,417 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,164 UART: [afmc] --
23,524,870 UART: [cold-reset] --
23,529,658 UART: [state] Locking Datavault
23,534,371 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,134 UART: [state] Locking ICCM
23,537,638 UART: [exit] Launching FMC @ 0x40000130
23,546,032 UART:
23,546,270 UART: Running Caliptra FMC ...
23,547,371 UART:
23,547,533 UART: [state] CFI Enabled
23,555,635 UART: [fht] FMC Alias Private Key: 7
25,886,044 UART: [art] Extend RT PCRs Done
25,887,264 UART: [art] Lock RT PCRs Done
25,889,260 UART: [art] Populate DV Done
25,894,672 UART: [fht] FMC Alias Private Key: 7
25,896,262 UART: [art] Derive CDI
25,897,077 UART: [art] Store in in slot 0x4
25,940,003 UART: [art] Derive Key Pair
25,941,054 UART: [art] Store priv key in slot 0x5
29,182,741 UART: [art] Derive Key Pair - Done
29,195,593 UART: [art] Signing Cert with AUTHO
29,196,896 UART: RITY.KEYID = 7
31,476,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,085 UART: [art] PUB.X = D7A00A15292CF127769221DCD1C1239CFF5703289737BD6E3AC42C21A67F99FF9E8352449172CB1207D1EAFE57CDBC1F
31,485,318 UART: [art] PUB.Y = A7245BAB4900944D095D4CA1A93081C0FD10BBE2F0C8AAF0CD9444062EC534B7412AEF3459DE43C9727EAEEE500213BE
31,492,586 UART: [art] SIG.R = 5AA8E308FD9C3C244BC79E347EE4BB3DEC783EB7806B2BF6904E4D2B216DC5AE65E13C8AE2C4376CBBABCF54676D131D
31,500,013 UART: [art] SIG.S = 708CC94118A40E26D1EF03A891580432F03C667CAC79E0342EB2F1AE60E3A0858645ED284ADFC33D42FC926EADDDEC0F
32,805,409 UART: Caliptra RT
32,806,119 UART: [state] CFI Enabled
32,923,803 UART: [rt] RT listening for mailbox commands...
32,925,748 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,956,599 UART: [rt]cmd =0x44504543, len=136
38,523,079 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
4,123,816 ready_for_fw is high
4,124,202 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,075,892 >>> mbox cmd response: success
23,715,647 UART:
23,716,039 UART: Running Caliptra FMC ...
23,717,174 UART:
23,717,330 UART: [state] CFI Enabled
23,725,478 UART: [fht] FMC Alias Private Key: 7
26,055,439 UART: [art] Extend RT PCRs Done
26,056,662 UART: [art] Lock RT PCRs Done
26,058,427 UART: [art] Populate DV Done
26,063,735 UART: [fht] FMC Alias Private Key: 7
26,065,387 UART: [art] Derive CDI
26,066,129 UART: [art] Store in in slot 0x4
26,108,583 UART: [art] Derive Key Pair
26,109,628 UART: [art] Store priv key in slot 0x5
29,352,004 UART: [art] Derive Key Pair - Done
29,365,002 UART: [art] Signing Cert with AUTHO
29,366,346 UART: RITY.KEYID = 7
31,646,129 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,631 UART: [art] PUB.X = 55CD9207505124E6D823D14B04BD5FA73E63282BE17B29B6EF2DAEF7FD6773DF9F4674DFA95D22BC18266D6F9530AFF5
31,654,899 UART: [art] PUB.Y = C6BE28071DE25BA3B095187B9F90B5C16923A3392F7C84761EF77B177345B8254967DA4348C42ED8548B20647EC93DBB
31,662,100 UART: [art] SIG.R = 4262A19279536F215094C82E27A1B8A28141DE8794C4C5D096E3035C66FF0C2470F9ACEED007DBB8A169D0643D40FDD4
31,669,471 UART: [art] SIG.S = BB6CE771C9E51CEF3FC5B65FB9CC48C5106461EC46B3F580D3858C31DF2D5DF67061223BC0B1954657C783C35E192F4E
32,974,669 UART: Caliptra RT
32,975,380 UART: [state] CFI Enabled
33,093,041 UART: [rt] RT listening for mailbox commands...
33,094,984 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,125,842 UART: [rt]cmd =0x44504543, len=136
38,691,711 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
192,746 UART:
193,098 UART: Running Caliptra ROM ...
194,301 UART:
194,454 UART: [state] CFI Enabled
261,402 UART: [state] LifecycleState = Unprovisioned
263,332 UART: [state] DebugLocked = No
264,587 UART: [state] WD Timer not started. Device not locked for debugging
268,489 UART: [kat] SHA2-256
447,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,178 UART: [kat] ++
459,625 UART: [kat] sha1
470,527 UART: [kat] SHA2-256
473,582 UART: [kat] SHA2-384
480,099 UART: [kat] SHA2-512-ACC
483,059 UART: [kat] ECC-384
2,949,827 UART: [kat] HMAC-384Kdf
2,971,941 UART: [kat] LMS
3,501,359 UART: [kat] --
3,505,328 UART: [cold-reset] ++
3,506,729 UART: [fht] FHT @ 0x50003400
3,518,582 UART: [idev] ++
3,519,150 UART: [idev] CDI.KEYID = 6
3,520,032 UART: [idev] SUBJECT.KEYID = 7
3,521,284 UART: [idev] UDS.KEYID = 0
3,522,189 ready_for_fw is high
3,522,375 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,202 UART: [idev] Erasing UDS.KEYID = 0
6,025,673 UART: [idev] Sha1 KeyId Algorithm
6,048,740 UART: [idev] --
6,051,353 UART: [ldev] ++
6,051,931 UART: [ldev] CDI.KEYID = 6
6,052,818 UART: [ldev] SUBJECT.KEYID = 5
6,053,949 UART: [ldev] AUTHORITY.KEYID = 7
6,055,283 UART: [ldev] FE.KEYID = 1
6,100,044 UART: [ldev] Erasing FE.KEYID = 1
8,605,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,028 UART: [ldev] --
10,413,056 UART: [fwproc] Wait for Commands...
10,414,502 UART: [fwproc] Recv command 0x46574c44
10,416,596 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,099 >>> mbox cmd response: success
14,286,027 UART: [afmc] ++
14,286,628 UART: [afmc] CDI.KEYID = 6
14,287,512 UART: [afmc] SUBJECT.KEYID = 7
14,288,728 UART: [afmc] AUTHORITY.KEYID = 5
16,826,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,893 UART: [afmc] --
18,623,721 UART: [cold-reset] --
18,626,599 UART: [state] Locking Datavault
18,632,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,290 UART: [state] Locking ICCM
18,635,953 UART: [exit] Launching FMC @ 0x40000130
18,644,405 UART:
18,644,647 UART: Running Caliptra FMC ...
18,645,754 UART:
18,645,914 UART: [state] CFI Enabled
18,707,137 UART: [fht] FMC Alias Private Key: 7
20,471,146 UART: [art] Extend RT PCRs Done
20,472,376 UART: [art] Lock RT PCRs Done
20,474,330 UART: [art] Populate DV Done
20,479,738 UART: [fht] FMC Alias Private Key: 7
20,481,489 UART: [art] Derive CDI
20,482,306 UART: [art] Store in in slot 0x4
20,538,921 UART: [art] Derive Key Pair
20,539,924 UART: [art] Store priv key in slot 0x5
23,002,834 UART: [art] Derive Key Pair - Done
23,015,729 UART: [art] Signing Cert with AUTHO
23,017,033 UART: RITY.KEYID = 7
24,727,976 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,478 UART: [art] PUB.X = 1099431DD3A0B4E67B40D367EF0D52E779067850F6263298314D1E1192407A37663591A016C2B9110F79517B9E6E7F62
24,736,690 UART: [art] PUB.Y = B9F4BE968767618EA17D0D5B1A18EEDCC26D93451DD09EF906C3C41E7B2B03715A3BEC0CAF457112A239531A93095AB3
24,743,951 UART: [art] SIG.R = 780D7583FBD515D07CEE3E8B90FDF2E01033CF6654F156F5463287D9DF6D63CF40B52B905D8687753FE1F328651FF3F6
24,751,372 UART: [art] SIG.S = D77969F4747E658F5FFDCE57E4A8291BD3039B360B96736A82B46796A425D3E78B0F9F83E8BD2CD2018116A2195040A2
25,729,829 UART: Caliptra RT
25,730,526 UART: [state] CFI Enabled
25,894,714 UART: [rt] RT listening for mailbox commands...
25,896,638 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,927,480 UART: [rt]cmd =0x44504543, len=136
30,152,793 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,306 writing to cptra_bootfsm_go
193,440 UART:
193,835 UART: Running Caliptra ROM ...
194,934 UART:
195,073 UART: [state] CFI Enabled
265,402 UART: [state] LifecycleState = Unprovisioned
267,821 UART: [state] DebugLocked = No
270,211 UART: [state] WD Timer not started. Device not locked for debugging
274,455 UART: [kat] SHA2-256
464,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,158 UART: [kat] ++
475,696 UART: [kat] sha1
486,176 UART: [kat] SHA2-256
489,230 UART: [kat] SHA2-384
494,377 UART: [kat] SHA2-512-ACC
496,961 UART: [kat] ECC-384
2,950,858 UART: [kat] HMAC-384Kdf
2,972,912 UART: [kat] LMS
3,504,651 UART: [kat] --
3,507,502 UART: [cold-reset] ++
3,509,574 UART: [fht] FHT @ 0x50003400
3,521,496 UART: [idev] ++
3,522,249 UART: [idev] CDI.KEYID = 6
3,523,139 UART: [idev] SUBJECT.KEYID = 7
3,524,386 UART: [idev] UDS.KEYID = 0
3,525,325 ready_for_fw is high
3,525,507 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,177 UART: [idev] Erasing UDS.KEYID = 0
6,031,327 UART: [idev] Sha1 KeyId Algorithm
6,053,506 UART: [idev] --
6,058,422 UART: [ldev] ++
6,059,106 UART: [ldev] CDI.KEYID = 6
6,059,989 UART: [ldev] SUBJECT.KEYID = 5
6,061,198 UART: [ldev] AUTHORITY.KEYID = 7
6,062,457 UART: [ldev] FE.KEYID = 1
6,103,682 UART: [ldev] Erasing FE.KEYID = 1
8,609,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,529 UART: [ldev] --
10,416,479 UART: [fwproc] Wait for Commands...
10,419,224 UART: [fwproc] Recv command 0x46574c44
10,421,532 UART: [fwproc] Recv'd Img size: 114360 bytes
13,870,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,722 >>> mbox cmd response: success
14,608,821 UART: [afmc] ++
14,609,559 UART: [afmc] CDI.KEYID = 6
14,610,758 UART: [afmc] SUBJECT.KEYID = 7
14,612,162 UART: [afmc] AUTHORITY.KEYID = 5
17,150,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,674 UART: [afmc] --
18,953,756 UART: [cold-reset] --
18,958,436 UART: [state] Locking Datavault
18,963,170 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,358 UART: [state] Locking ICCM
18,968,009 UART: [exit] Launching FMC @ 0x40000130
18,976,698 UART:
18,976,955 UART: Running Caliptra FMC ...
18,978,057 UART:
18,978,225 UART: [state] CFI Enabled
19,033,663 UART: [fht] FMC Alias Private Key: 7
20,798,113 UART: [art] Extend RT PCRs Done
20,799,332 UART: [art] Lock RT PCRs Done
20,801,399 UART: [art] Populate DV Done
20,806,776 UART: [fht] FMC Alias Private Key: 7
20,808,270 UART: [art] Derive CDI
20,809,036 UART: [art] Store in in slot 0x4
20,866,509 UART: [art] Derive Key Pair
20,867,510 UART: [art] Store priv key in slot 0x5
23,330,761 UART: [art] Derive Key Pair - Done
23,343,644 UART: [art] Signing Cert with AUTHO
23,344,949 UART: RITY.KEYID = 7
25,056,124 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,652 UART: [art] PUB.X = 04588CB224396F7135A2000259530F716067C63EC681FAE7E28D2A600418044D3AAAF15B80F6CE548BA508213E534918
25,064,842 UART: [art] PUB.Y = 774917BFEE77AC51E464101FFEC36884FCE99BA67CC59E8FACFF7367C59B48F58A4D60A63150F3C4E6E296168C51EDAD
25,072,113 UART: [art] SIG.R = DF88AB460D11286E8B404B39454DE9DECC3A4F03DDF053CE60B9EBEC0EDAAED1E49096F4476DB6B55F18E0F7716714AF
25,079,549 UART: [art] SIG.S = 87B54715ED831BF12F639A03B8059FCF701CEC8D29DFD8C4B76D1C16FC9804AE87172C5179CE60550DC4C31DF33E869A
26,058,105 UART: Caliptra RT
26,058,799 UART: [state] CFI Enabled
26,225,037 UART: [rt] RT listening for mailbox commands...
26,226,974 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,258,053 UART: [rt]cmd =0x44504543, len=136
30,482,325 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,441,068 ready_for_fw is high
3,441,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,741,465 >>> mbox cmd response: success
19,028,742 UART:
19,029,130 UART: Running Caliptra FMC ...
19,030,325 UART:
19,030,496 UART: [state] CFI Enabled
19,097,467 UART: [fht] FMC Alias Private Key: 7
20,861,507 UART: [art] Extend RT PCRs Done
20,862,725 UART: [art] Lock RT PCRs Done
20,864,248 UART: [art] Populate DV Done
20,869,727 UART: [fht] FMC Alias Private Key: 7
20,871,327 UART: [art] Derive CDI
20,872,145 UART: [art] Store in in slot 0x4
20,930,542 UART: [art] Derive Key Pair
20,931,622 UART: [art] Store priv key in slot 0x5
23,394,359 UART: [art] Derive Key Pair - Done
23,407,570 UART: [art] Signing Cert with AUTHO
23,408,872 UART: RITY.KEYID = 7
25,120,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,747 UART: [art] PUB.X = 3D667634AF90F1FE75FE8E83134B6F6393430AE05D0AFC0520605D60205D001C765B4BA0503BF7A5194120324BBEEC55
25,128,960 UART: [art] PUB.Y = D02951F6DD984F4F5F1C61A928033875F459AAEB359C9B41754BA20AE5871A803EEEDAB97D5D07F0EE917E4FB5830897
25,136,280 UART: [art] SIG.R = 299FE59E525748E6AC09E1BD493E540994E2B08F35F17C57C1E08896BB4DB4BBE4D5D5977B0CCBF8D5EF9E61C009A9C3
25,143,792 UART: [art] SIG.S = 91180E5FAB7C1E8091BD0F00F66B64D8A57DCB508E8A70670CA7EE1AA5CD4A57DF4CB2DC9C69D77618C2056DC50B9DDD
26,122,570 UART: Caliptra RT
26,123,288 UART: [state] CFI Enabled
26,287,106 UART: [rt] RT listening for mailbox commands...
26,289,060 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,319,795 UART: [rt]cmd =0x44504543, len=136
30,545,905 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,479 UART:
192,845 UART: Running Caliptra ROM ...
193,977 UART:
603,800 UART: [state] CFI Enabled
616,192 UART: [state] LifecycleState = Unprovisioned
618,282 UART: [state] DebugLocked = No
619,744 UART: [state] WD Timer not started. Device not locked for debugging
624,000 UART: [kat] SHA2-256
813,842 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,651 UART: [kat] ++
825,252 UART: [kat] sha1
836,131 UART: [kat] SHA2-256
839,141 UART: [kat] SHA2-384
844,438 UART: [kat] SHA2-512-ACC
846,980 UART: [kat] ECC-384
3,287,879 UART: [kat] HMAC-384Kdf
3,299,608 UART: [kat] LMS
3,831,408 UART: [kat] --
3,835,471 UART: [cold-reset] ++
3,836,967 UART: [fht] FHT @ 0x50003400
3,849,074 UART: [idev] ++
3,849,709 UART: [idev] CDI.KEYID = 6
3,850,683 UART: [idev] SUBJECT.KEYID = 7
3,851,925 UART: [idev] UDS.KEYID = 0
3,853,121 ready_for_fw is high
3,853,317 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,996,939 UART: [idev] Erasing UDS.KEYID = 0
6,331,244 UART: [idev] Sha1 KeyId Algorithm
6,354,472 UART: [idev] --
6,358,623 UART: [ldev] ++
6,359,295 UART: [ldev] CDI.KEYID = 6
6,360,277 UART: [ldev] SUBJECT.KEYID = 5
6,361,437 UART: [ldev] AUTHORITY.KEYID = 7
6,362,617 UART: [ldev] FE.KEYID = 1
6,373,424 UART: [ldev] Erasing FE.KEYID = 1
8,849,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,536 UART: [ldev] --
10,639,259 UART: [fwproc] Wait for Commands...
10,642,209 UART: [fwproc] Recv command 0x46574c44
10,644,456 UART: [fwproc] Recv'd Img size: 114360 bytes
14,084,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,823,995 >>> mbox cmd response: success
14,827,946 UART: [afmc] ++
14,828,654 UART: [afmc] CDI.KEYID = 6
14,829,843 UART: [afmc] SUBJECT.KEYID = 7
14,831,279 UART: [afmc] AUTHORITY.KEYID = 5
17,333,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,073,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,088,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,104,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,128,078 UART: [afmc] --
19,131,777 UART: [cold-reset] --
19,137,360 UART: [state] Locking Datavault
19,143,144 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,330 UART: [state] Locking ICCM
19,147,745 UART: [exit] Launching FMC @ 0x40000130
19,156,409 UART:
19,156,643 UART: Running Caliptra FMC ...
19,157,738 UART:
19,157,890 UART: [state] CFI Enabled
19,166,044 UART: [fht] FMC Alias Private Key: 7
20,922,730 UART: [art] Extend RT PCRs Done
20,923,938 UART: [art] Lock RT PCRs Done
20,925,492 UART: [art] Populate DV Done
20,930,856 UART: [fht] FMC Alias Private Key: 7
20,932,498 UART: [art] Derive CDI
20,933,230 UART: [art] Store in in slot 0x4
20,975,976 UART: [art] Derive Key Pair
20,976,969 UART: [art] Store priv key in slot 0x5
23,403,441 UART: [art] Derive Key Pair - Done
23,416,048 UART: [art] Signing Cert with AUTHO
23,417,382 UART: RITY.KEYID = 7
25,123,481 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,970 UART: [art] PUB.X = 18AAF0D5AC4786DEBF7C4B0A704BA83AB4F5340171281112BA2BF15CFD2D05FC80AC03C14378C2E5ADDF60AB34E4B8EB
25,132,270 UART: [art] PUB.Y = EDFCF83D7BC7F970AF173A23B54752C332A4D432BAB645CCA2FC48A32581CCDA21A1218F728F1087D28648E87AB53C77
25,139,565 UART: [art] SIG.R = 715522DDE06DDC6693AF373893E12479909C74483E1A67EA4CB2CD0F713C0AF3B61F80AFB8471CD8697F64AE7E622F59
25,146,952 UART: [art] SIG.S = 77D303578FA044A45DCDB725A99B06380850AD8D2E557EA775461BE53EA1E847A29D30F779AD5DD75EBB1265E89AE1BF
26,125,919 UART: Caliptra RT
26,126,629 UART: [state] CFI Enabled
26,244,009 UART: [rt] RT listening for mailbox commands...
26,245,945 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,277,016 UART: [rt]cmd =0x44504543, len=136
30,454,767 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,751,924 ready_for_fw is high
3,752,540 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,946,442 >>> mbox cmd response: success
19,203,070 UART:
19,203,458 UART: Running Caliptra FMC ...
19,204,650 UART:
19,204,822 UART: [state] CFI Enabled
19,212,770 UART: [fht] FMC Alias Private Key: 7
20,969,127 UART: [art] Extend RT PCRs Done
20,970,355 UART: [art] Lock RT PCRs Done
20,972,419 UART: [art] Populate DV Done
20,977,892 UART: [fht] FMC Alias Private Key: 7
20,979,488 UART: [art] Derive CDI
20,980,305 UART: [art] Store in in slot 0x4
21,022,904 UART: [art] Derive Key Pair
21,023,933 UART: [art] Store priv key in slot 0x5
23,451,115 UART: [art] Derive Key Pair - Done
23,464,435 UART: [art] Signing Cert with AUTHO
23,465,737 UART: RITY.KEYID = 7
25,171,146 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,653 UART: [art] PUB.X = 1FC8499027416C911917D98C2B3C022E5353CAD54F0878BEE35D175A15C2C73E9AC8E3E01D15ED15E4A5668040F6DC22
25,179,916 UART: [art] PUB.Y = 23E48646B6456F544523AE6977D283BF6AE1D87623A2E1C3A9A1A9FFB5FBD4F1F6B5BA962197F9C8E0E3827AC6758283
25,187,126 UART: [art] SIG.R = 21086AF1F9D9635C8FDA403F0944EEEC94BEF9E5EF0EC6EDF9E644AB5982E24E620573C3C6A8D9A494746A38FBFE0E20
25,194,527 UART: [art] SIG.S = 4F24D71EAE8AF11AB3B12AE9C571595B5B94C9A01714F91C9561E657F8143CC17C9E1845FF38D5932ABC3CF2AFC01315
26,173,674 UART: Caliptra RT
26,174,368 UART: [state] CFI Enabled
26,292,665 UART: [rt] RT listening for mailbox commands...
26,294,588 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,325,443 UART: [rt]cmd =0x44504543, len=136
30,503,919 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,505 UART: [kat] SHA2-256
881,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,551 UART: [kat] ++
885,703 UART: [kat] sha1
890,031 UART: [kat] SHA2-256
891,969 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
901,974 UART: [kat] HMAC-384Kdf
906,592 UART: [kat] LMS
1,474,788 UART: [kat] --
1,475,731 UART: [cold-reset] ++
1,476,267 UART: [fht] Storing FHT @ 0x50003400
1,478,950 UART: [idev] ++
1,479,118 UART: [idev] CDI.KEYID = 6
1,479,478 UART: [idev] SUBJECT.KEYID = 7
1,479,902 UART: [idev] UDS.KEYID = 0
1,480,247 ready_for_fw is high
1,480,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,766 UART: [idev] Erasing UDS.KEYID = 0
1,504,922 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,477 UART: [ldev] ++
1,514,645 UART: [ldev] CDI.KEYID = 6
1,515,008 UART: [ldev] SUBJECT.KEYID = 5
1,515,434 UART: [ldev] AUTHORITY.KEYID = 7
1,515,897 UART: [ldev] FE.KEYID = 1
1,520,819 UART: [ldev] Erasing FE.KEYID = 1
1,547,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,886 UART: [ldev] --
1,586,245 UART: [fwproc] Waiting for Commands...
1,586,974 UART: [fwproc] Received command 0x46574c44
1,587,765 UART: [fwproc] Received Image of size 114360 bytes
2,885,516 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,868 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,029 >>> mbox cmd response: success
3,079,097 UART: [afmc] ++
3,079,265 UART: [afmc] CDI.KEYID = 6
3,079,627 UART: [afmc] SUBJECT.KEYID = 7
3,080,052 UART: [afmc] AUTHORITY.KEYID = 5
3,114,791 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,486 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,176 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,831 UART: [afmc] --
3,157,957 UART: [cold-reset] --
3,158,613 UART: [state] Locking Datavault
3,159,520 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,124 UART: [state] Locking ICCM
3,160,682 UART: [exit] Launching FMC @ 0x40000130
3,166,011 UART:
3,166,027 UART: Running Caliptra FMC ...
3,166,435 UART:
3,166,489 UART: [state] CFI Enabled
3,177,236 UART: [fht] FMC Alias Private Key: 7
3,284,727 UART: [art] Extend RT PCRs Done
3,285,155 UART: [art] Lock RT PCRs Done
3,286,801 UART: [art] Populate DV Done
3,294,886 UART: [fht] FMC Alias Private Key: 7
3,295,822 UART: [art] Derive CDI
3,296,102 UART: [art] Store in in slot 0x4
3,382,401 UART: [art] Derive Key Pair
3,382,761 UART: [art] Store priv key in slot 0x5
3,395,819 UART: [art] Derive Key Pair - Done
3,410,955 UART: [art] Signing Cert with AUTHO
3,411,435 UART: RITY.KEYID = 7
3,426,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,470 UART: [art] PUB.X = 3762B7A2B3D02E50C0308521F24AEC478296D340F8A4AD7F82913F0A5850CB6A48AA9FE9685BA44F494E561ACFE01738
3,434,241 UART: [art] PUB.Y = A07310093CCF766EC99534FAFB147E25B3A32AE6B88C8793C5CFEB39F3412483A30AADC2B459C7374BDEEC6986DD30B3
3,441,199 UART: [art] SIG.R = 1D83FC5E1575EDE82A7A0AA490D8E4DF384FD740265935CDB5B13C648089A36F66FABDADB83C0B2A8B2EEB3FC9F8B4F7
3,447,987 UART: [art] SIG.S = 190B749DE8CB2BF2BE8B7F3ED1E544474DE49AEF759B413D15E81F1A57FE79A2A1C1A1A7F04842C7563F45FF32C48B6F
3,472,043 UART: Caliptra RT
3,472,297 UART: [state] CFI Enabled
3,580,454 UART: [rt] RT listening for mailbox commands...
3,581,124 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,367 UART: [rt]cmd =0x44504543, len=136
3,682,555 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,369 ready_for_fw is high
1,362,369 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,939 >>> mbox cmd response: success
2,989,421 UART:
2,989,437 UART: Running Caliptra FMC ...
2,989,845 UART:
2,989,899 UART: [state] CFI Enabled
3,000,250 UART: [fht] FMC Alias Private Key: 7
3,108,115 UART: [art] Extend RT PCRs Done
3,108,543 UART: [art] Lock RT PCRs Done
3,110,057 UART: [art] Populate DV Done
3,118,218 UART: [fht] FMC Alias Private Key: 7
3,119,244 UART: [art] Derive CDI
3,119,524 UART: [art] Store in in slot 0x4
3,205,223 UART: [art] Derive Key Pair
3,205,583 UART: [art] Store priv key in slot 0x5
3,218,315 UART: [art] Derive Key Pair - Done
3,233,243 UART: [art] Signing Cert with AUTHO
3,233,723 UART: RITY.KEYID = 7
3,248,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,718 UART: [art] PUB.X = 701CD9E0DC95810D8D3EF60D45CAC51567A1F6851D10605998ED9F5F22A7976B7FCD67CDFCF5FBA1C376D4212224D9DC
3,256,496 UART: [art] PUB.Y = AA4DF57B225B176A195C24397CC4DF4367D830C8459132026F45381B56F65B0BECAD613E6C03E08F55F75929D4F107A8
3,263,434 UART: [art] SIG.R = F611CD1670AF4F7D270B0D00CC16585E3ED7F624D7E1FAE01733BEB884056A74891DA7325DA684FA4C5A392F1D94BE59
3,270,183 UART: [art] SIG.S = 272FEE045FC23DBCBD709DCFB4842CB00FB1BA7EE79F03C9DD3964BF26D534B635392208F64F736EA5FC9B984A9AA519
3,294,042 UART: Caliptra RT
3,294,296 UART: [state] CFI Enabled
3,402,558 UART: [rt] RT listening for mailbox commands...
3,403,228 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,577 UART: [rt]cmd =0x44504543, len=136
3,504,981 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,535 UART: [kat] SHA2-512-ACC
897,436 UART: [kat] ECC-384
903,515 UART: [kat] HMAC-384Kdf
908,213 UART: [kat] LMS
1,476,409 UART: [kat] --
1,477,278 UART: [cold-reset] ++
1,477,686 UART: [fht] Storing FHT @ 0x50003400
1,480,459 UART: [idev] ++
1,480,627 UART: [idev] CDI.KEYID = 6
1,480,987 UART: [idev] SUBJECT.KEYID = 7
1,481,411 UART: [idev] UDS.KEYID = 0
1,481,756 ready_for_fw is high
1,481,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,619 UART: [idev] Erasing UDS.KEYID = 0
1,505,849 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,651 UART: [idev] --
1,515,648 UART: [ldev] ++
1,515,816 UART: [ldev] CDI.KEYID = 6
1,516,179 UART: [ldev] SUBJECT.KEYID = 5
1,516,605 UART: [ldev] AUTHORITY.KEYID = 7
1,517,068 UART: [ldev] FE.KEYID = 1
1,522,170 UART: [ldev] Erasing FE.KEYID = 1
1,547,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,185 UART: [ldev] --
1,586,686 UART: [fwproc] Waiting for Commands...
1,587,339 UART: [fwproc] Received command 0x46574c44
1,588,130 UART: [fwproc] Received Image of size 114360 bytes
2,886,281 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,283 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,635 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,428 >>> mbox cmd response: success
3,079,668 UART: [afmc] ++
3,079,836 UART: [afmc] CDI.KEYID = 6
3,080,198 UART: [afmc] SUBJECT.KEYID = 7
3,080,623 UART: [afmc] AUTHORITY.KEYID = 5
3,116,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,292 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,685 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,375 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,226 UART: [afmc] --
3,159,260 UART: [cold-reset] --
3,160,180 UART: [state] Locking Datavault
3,161,375 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,979 UART: [state] Locking ICCM
3,162,559 UART: [exit] Launching FMC @ 0x40000130
3,167,888 UART:
3,167,904 UART: Running Caliptra FMC ...
3,168,312 UART:
3,168,455 UART: [state] CFI Enabled
3,179,062 UART: [fht] FMC Alias Private Key: 7
3,286,823 UART: [art] Extend RT PCRs Done
3,287,251 UART: [art] Lock RT PCRs Done
3,288,895 UART: [art] Populate DV Done
3,297,390 UART: [fht] FMC Alias Private Key: 7
3,298,438 UART: [art] Derive CDI
3,298,718 UART: [art] Store in in slot 0x4
3,384,595 UART: [art] Derive Key Pair
3,384,955 UART: [art] Store priv key in slot 0x5
3,398,245 UART: [art] Derive Key Pair - Done
3,413,034 UART: [art] Signing Cert with AUTHO
3,413,514 UART: RITY.KEYID = 7
3,429,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,891 UART: [art] PUB.X = 6E9705FBDC4C8F2A19732F709EFD311170C1DDDABB4A7333075B295A3C55417EC7BD8C1EBD1331249ADE866449AA100A
3,436,664 UART: [art] PUB.Y = CAFC9E3FAF907F9152B6D7AD49EDCFFA3960630AC664955874112F12AC18E76E3FED4F11E725F32A4009D5F3C858E831
3,443,620 UART: [art] SIG.R = A9A93B8DED43985CC4DD328D0A647B7642B522E6942E4F89658ABB60D99B9DFBE43EA005D985A0F17125C84C611D3700
3,450,368 UART: [art] SIG.S = 8C28640189953561F391D4B937ACC73947CD537A24115353F7E821EAD65404B2E4FB528F9A1DDCA0BEB7E181FD4AA897
3,474,119 UART: Caliptra RT
3,474,465 UART: [state] CFI Enabled
3,582,948 UART: [rt] RT listening for mailbox commands...
3,583,618 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,871 UART: [rt]cmd =0x44504543, len=136
3,685,483 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,022 ready_for_fw is high
1,363,022 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,668 >>> mbox cmd response: success
2,990,648 UART:
2,990,664 UART: Running Caliptra FMC ...
2,991,072 UART:
2,991,215 UART: [state] CFI Enabled
3,001,692 UART: [fht] FMC Alias Private Key: 7
3,109,403 UART: [art] Extend RT PCRs Done
3,109,831 UART: [art] Lock RT PCRs Done
3,111,397 UART: [art] Populate DV Done
3,119,538 UART: [fht] FMC Alias Private Key: 7
3,120,632 UART: [art] Derive CDI
3,120,912 UART: [art] Store in in slot 0x4
3,206,273 UART: [art] Derive Key Pair
3,206,633 UART: [art] Store priv key in slot 0x5
3,219,943 UART: [art] Derive Key Pair - Done
3,234,534 UART: [art] Signing Cert with AUTHO
3,235,014 UART: RITY.KEYID = 7
3,249,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,699 UART: [art] PUB.X = 4A16E84452D9393663C5A9C66E719E914FD95B21D2D3C951EB2C889582AE697AC0EB289ABF81E76233CBE7CBB4E172AA
3,257,479 UART: [art] PUB.Y = 746F9063C1232F5A0EDCC09D895384EEC69DD3EC6778B6A17954C19A5A7A9562F7AEF15F2824CB34F0DD267686FAC8C5
3,264,436 UART: [art] SIG.R = 69479A01D872436D1296B29C1F848BE820BEA27E684102A82267A36811C66E37126F3C99F9BAAE8F59BA85292DA35573
3,271,194 UART: [art] SIG.S = F6D1EEEF4A0D5211CED44C26AC546E0391E110375A595DE0FE0E4CF131E56AE8C5A6F7ABAF1DCE5A6E9B4723320B9267
3,294,933 UART: Caliptra RT
3,295,279 UART: [state] CFI Enabled
3,403,673 UART: [rt] RT listening for mailbox commands...
3,404,343 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,536 UART: [rt]cmd =0x44504543, len=136
3,505,714 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
893,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,661 UART: [kat] ++
897,813 UART: [kat] sha1
901,997 UART: [kat] SHA2-256
903,937 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
922,840 UART: [kat] LMS
1,171,168 UART: [kat] --
1,172,129 UART: [cold-reset] ++
1,172,549 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,578 UART: [idev] Erasing UDS.KEYID = 0
1,201,251 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,210,851 UART: [ldev] ++
1,211,019 UART: [ldev] CDI.KEYID = 6
1,211,382 UART: [ldev] SUBJECT.KEYID = 5
1,211,808 UART: [ldev] AUTHORITY.KEYID = 7
1,212,271 UART: [ldev] FE.KEYID = 1
1,217,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,196 UART: [fwproc] Wait for Commands...
1,283,850 UART: [fwproc] Recv command 0x46574c44
1,284,578 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,930 >>> mbox cmd response: success
2,776,154 UART: [afmc] ++
2,776,322 UART: [afmc] CDI.KEYID = 6
2,776,684 UART: [afmc] SUBJECT.KEYID = 7
2,777,109 UART: [afmc] AUTHORITY.KEYID = 5
2,812,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,739 UART: [afmc] --
2,855,807 UART: [cold-reset] --
2,856,669 UART: [state] Locking Datavault
2,857,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,428 UART: [state] Locking ICCM
2,859,078 UART: [exit] Launching FMC @ 0x40000130
2,864,407 UART:
2,864,423 UART: Running Caliptra FMC ...
2,864,831 UART:
2,864,885 UART: [state] CFI Enabled
2,875,184 UART: [fht] FMC Alias Private Key: 7
2,983,169 UART: [art] Extend RT PCRs Done
2,983,597 UART: [art] Lock RT PCRs Done
2,985,117 UART: [art] Populate DV Done
2,993,266 UART: [fht] FMC Alias Private Key: 7
2,994,342 UART: [art] Derive CDI
2,994,622 UART: [art] Store in in slot 0x4
3,080,427 UART: [art] Derive Key Pair
3,080,787 UART: [art] Store priv key in slot 0x5
3,093,505 UART: [art] Derive Key Pair - Done
3,108,207 UART: [art] Signing Cert with AUTHO
3,108,687 UART: RITY.KEYID = 7
3,123,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,406 UART: [art] PUB.X = 2BB146C41EBE2276D094F26A2925EC6A4DBF8E5425CB5CBE96194F10614422A9091F34AAECA8E8C82C29A6CEEC013AB2
3,131,186 UART: [art] PUB.Y = 0A536DB2B4E607A145FD0814689CC04C320895016C6E7116DF21E677E59750A8351BFF3B0E5E54468449638421978CA3
3,138,108 UART: [art] SIG.R = 777214B248D658C24A63AC7FA0D35582103C9FE68C8D90C8E89893BB04681F1DF61B33301F58728C268517D040310232
3,144,860 UART: [art] SIG.S = BB80F03066DD361F78AC0C0C7100BD5C114CE0947482CE70E416D246D59F134C4157923D3DBFE08C8E00EBD17E33E342
3,168,501 UART: Caliptra RT
3,168,755 UART: [state] CFI Enabled
3,275,779 UART: [rt] RT listening for mailbox commands...
3,276,449 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,972 UART: [rt]cmd =0x44504543, len=136
3,377,464 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,943 >>> mbox cmd response: success
2,688,459 UART:
2,688,475 UART: Running Caliptra FMC ...
2,688,883 UART:
2,688,937 UART: [state] CFI Enabled
2,699,252 UART: [fht] FMC Alias Private Key: 7
2,806,993 UART: [art] Extend RT PCRs Done
2,807,421 UART: [art] Lock RT PCRs Done
2,809,075 UART: [art] Populate DV Done
2,817,346 UART: [fht] FMC Alias Private Key: 7
2,818,298 UART: [art] Derive CDI
2,818,578 UART: [art] Store in in slot 0x4
2,904,161 UART: [art] Derive Key Pair
2,904,521 UART: [art] Store priv key in slot 0x5
2,917,373 UART: [art] Derive Key Pair - Done
2,932,148 UART: [art] Signing Cert with AUTHO
2,932,628 UART: RITY.KEYID = 7
2,947,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,565 UART: [art] PUB.X = 1B0A2C01348E94BFF3861F1339BD980FDEA874DCDDF4BCC03B1D94C722E4E4775273D9B4F2BB2D9849AB3B251D1D3045
2,955,340 UART: [art] PUB.Y = D9C58384DD6B57992B433ED74B29ED2B0F2AB12907EAD5F690057257CB8D3F289ACDD3303790A0623729E3210FD46438
2,962,278 UART: [art] SIG.R = EFABDBB337398682B556DCB0B9D9F170FB6D3A3D08C7F5A7D2E580409B9C5A337DCC42BF4CF94C27A9141F84AE7EAC02
2,969,064 UART: [art] SIG.S = 14E626BC5B0F6B7C9A9C4D817D2F4950DD51B179060EA7238088DF65FD0FF7424A971B383304B0B2A630D3298DD52A4A
2,992,290 UART: Caliptra RT
2,992,544 UART: [state] CFI Enabled
3,100,322 UART: [rt] RT listening for mailbox commands...
3,100,992 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,343 UART: [rt]cmd =0x44504543, len=136
3,202,035 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
893,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,064 UART: [kat] ++
898,216 UART: [kat] sha1
902,514 UART: [kat] SHA2-256
904,454 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,757 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,508 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,483 UART: [idev] ++
1,175,651 UART: [idev] CDI.KEYID = 6
1,176,011 UART: [idev] SUBJECT.KEYID = 7
1,176,435 UART: [idev] UDS.KEYID = 0
1,176,780 ready_for_fw is high
1,176,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,210,926 UART: [ldev] ++
1,211,094 UART: [ldev] CDI.KEYID = 6
1,211,457 UART: [ldev] SUBJECT.KEYID = 5
1,211,883 UART: [ldev] AUTHORITY.KEYID = 7
1,212,346 UART: [ldev] FE.KEYID = 1
1,217,646 UART: [ldev] Erasing FE.KEYID = 1
1,243,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,740 UART: [ldev] --
1,283,045 UART: [fwproc] Wait for Commands...
1,283,709 UART: [fwproc] Recv command 0x46574c44
1,284,437 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,801 >>> mbox cmd response: success
2,774,907 UART: [afmc] ++
2,775,075 UART: [afmc] CDI.KEYID = 6
2,775,437 UART: [afmc] SUBJECT.KEYID = 7
2,775,862 UART: [afmc] AUTHORITY.KEYID = 5
2,811,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,221 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,940 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,570 UART: [afmc] --
2,854,618 UART: [cold-reset] --
2,855,546 UART: [state] Locking Datavault
2,856,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,439 UART: [state] Locking ICCM
2,858,031 UART: [exit] Launching FMC @ 0x40000130
2,863,360 UART:
2,863,376 UART: Running Caliptra FMC ...
2,863,784 UART:
2,863,927 UART: [state] CFI Enabled
2,874,566 UART: [fht] FMC Alias Private Key: 7
2,982,583 UART: [art] Extend RT PCRs Done
2,983,011 UART: [art] Lock RT PCRs Done
2,984,457 UART: [art] Populate DV Done
2,992,912 UART: [fht] FMC Alias Private Key: 7
2,993,842 UART: [art] Derive CDI
2,994,122 UART: [art] Store in in slot 0x4
3,080,155 UART: [art] Derive Key Pair
3,080,515 UART: [art] Store priv key in slot 0x5
3,093,821 UART: [art] Derive Key Pair - Done
3,108,802 UART: [art] Signing Cert with AUTHO
3,109,282 UART: RITY.KEYID = 7
3,124,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,303 UART: [art] PUB.X = B3A7B821947088AC9311862354C8C224F76D729498DDCBB164F26B9A4B80953C05D487213CC1F5D9DBC2BC516B884D05
3,132,067 UART: [art] PUB.Y = 7A515E542D6F9B6177397248937ACDB61E20FAE7C3E242EA5A7AFD9D4ABCB68EEF3D727E101917FB050FD948CF320816
3,139,020 UART: [art] SIG.R = 40BD1662CFE46743CA53B9CBEDA17696927A1FFD3F1E0BA52220D63B60550EC4045F8D032AD11DB7FBC5CC7447793704
3,145,785 UART: [art] SIG.S = 2875C1D6FF7D9FE70A964D565B6F38FB17429F32978BA1602C047BCF858E67E31176627DDBD969F465BFA2715BA852D8
3,170,290 UART: Caliptra RT
3,170,636 UART: [state] CFI Enabled
3,278,846 UART: [rt] RT listening for mailbox commands...
3,279,516 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,669 UART: [rt]cmd =0x44504543, len=136
3,380,755 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,666 ready_for_fw is high
1,060,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,564 >>> mbox cmd response: success
2,687,476 UART:
2,687,492 UART: Running Caliptra FMC ...
2,687,900 UART:
2,688,043 UART: [state] CFI Enabled
2,698,682 UART: [fht] FMC Alias Private Key: 7
2,806,697 UART: [art] Extend RT PCRs Done
2,807,125 UART: [art] Lock RT PCRs Done
2,808,361 UART: [art] Populate DV Done
2,816,472 UART: [fht] FMC Alias Private Key: 7
2,817,584 UART: [art] Derive CDI
2,817,864 UART: [art] Store in in slot 0x4
2,903,749 UART: [art] Derive Key Pair
2,904,109 UART: [art] Store priv key in slot 0x5
2,917,907 UART: [art] Derive Key Pair - Done
2,932,728 UART: [art] Signing Cert with AUTHO
2,933,208 UART: RITY.KEYID = 7
2,948,000 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,765 UART: [art] PUB.X = A72316482A5CB0257EC07FA872F79D58D6A8D499964B29982824981B943607DEBBB021B0B0D2AAD90E11BB3A200193A0
2,955,526 UART: [art] PUB.Y = CB2D9606AB8746385E6C54D7FD4AF1DADB2BACEB63A21ABEEEC065A2417B171F28612C080C76C0BCAA5345AD9536403E
2,962,487 UART: [art] SIG.R = D0F0BD81A1E15BCF66C27A35C349841FB342B75799C17141E49FCD8A9A2B74F4AEF5F116F0D342C82D259E0E743C00C5
2,969,242 UART: [art] SIG.S = 5EC153F36A221F63CAA32788B3E15BE7C22CB0CD9FB87568D826CD6077EE29110E12C5C9E27B558EE7FEB8042EC1729B
2,993,261 UART: Caliptra RT
2,993,607 UART: [state] CFI Enabled
3,101,985 UART: [rt] RT listening for mailbox commands...
3,102,655 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,856 UART: [rt]cmd =0x44504543, len=136
3,203,392 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,170,121 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 ready_for_fw is high
1,174,449 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,991 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,207,847 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,242,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,114 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,197 UART: [fwproc] Recv command 0x46574c44
1,282,930 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,990 >>> mbox cmd response: success
2,774,113 UART: [afmc] ++
2,774,281 UART: [afmc] CDI.KEYID = 6
2,774,644 UART: [afmc] SUBJECT.KEYID = 7
2,775,070 UART: [afmc] AUTHORITY.KEYID = 5
2,810,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,506 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,118 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,824 UART: [afmc] --
2,853,824 UART: [cold-reset] --
2,854,514 UART: [state] Locking Datavault
2,855,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,299 UART: [state] Locking ICCM
2,856,783 UART: [exit] Launching FMC @ 0x40000130
2,862,112 UART:
2,862,128 UART: Running Caliptra FMC ...
2,862,536 UART:
2,862,590 UART: [state] CFI Enabled
2,872,903 UART: [fht] FMC Alias Private Key: 7
2,981,534 UART: [art] Extend RT PCRs Done
2,981,962 UART: [art] Lock RT PCRs Done
2,983,830 UART: [art] Populate DV Done
2,992,261 UART: [fht] FMC Alias Private Key: 7
2,993,317 UART: [art] Derive CDI
2,993,597 UART: [art] Store in in slot 0x4
3,079,114 UART: [art] Derive Key Pair
3,079,474 UART: [art] Store priv key in slot 0x5
3,092,406 UART: [art] Derive Key Pair - Done
3,107,070 UART: [art] Signing Cert with AUTHO
3,107,550 UART: RITY.KEYID = 7
3,122,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,225 UART: [art] PUB.X = 2EA15310603AE0C7023050CF78AEC358E9E413F5DA4EFE64928D97A3D47AD11C737FA9711A4671182D0F6CF7B5848E2D
3,129,995 UART: [art] PUB.Y = 3EFB6F5307297E9CE353270AB3F7F3E8B017CBBB3942B30E9BFBBB41B7752CEEC3A31B411AD5879570970116A2534B6D
3,136,943 UART: [art] SIG.R = 30BB2694B7BDF2A09709C55C47010A2291E21F03C4CA7D1EE6E202D25ECDFC4DD4D8FCC3CD8C4CACB8F2111F002C713F
3,143,698 UART: [art] SIG.S = 5C94D684BF1FE770F70DBC19D603885424013F8F28EC8551AE17853E6706D6D1EB7BCEDE62AC972D51DEA970045F5FBA
3,167,264 UART: Caliptra RT
3,167,518 UART: [state] CFI Enabled
3,275,642 UART: [rt] RT listening for mailbox commands...
3,276,312 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,723 UART: [rt]cmd =0x44504543, len=136
3,377,895 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,932 ready_for_fw is high
1,055,932 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,854 >>> mbox cmd response: success
2,684,120 UART:
2,684,136 UART: Running Caliptra FMC ...
2,684,544 UART:
2,684,598 UART: [state] CFI Enabled
2,694,909 UART: [fht] FMC Alias Private Key: 7
2,803,420 UART: [art] Extend RT PCRs Done
2,803,848 UART: [art] Lock RT PCRs Done
2,805,328 UART: [art] Populate DV Done
2,813,569 UART: [fht] FMC Alias Private Key: 7
2,814,685 UART: [art] Derive CDI
2,814,965 UART: [art] Store in in slot 0x4
2,900,618 UART: [art] Derive Key Pair
2,900,978 UART: [art] Store priv key in slot 0x5
2,914,206 UART: [art] Derive Key Pair - Done
2,929,032 UART: [art] Signing Cert with AUTHO
2,929,512 UART: RITY.KEYID = 7
2,944,504 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,269 UART: [art] PUB.X = 7A9A6405D9782831D472EDA625BF4F7C1464EFEBC9FEAFB397CACEE2C2E4B813CFD3F1F3A474B11E021506100592B62F
2,952,043 UART: [art] PUB.Y = 484636F2731EFBDB1552FA83AC769057B20B2938289C750E53A68C8440C6D63E05E8944184975885A34CB9C77BD5C9F1
2,958,978 UART: [art] SIG.R = FF3537ABB34C9ECAB5142B742C9AA6C421AB457AF9F80F7E4D9249EE1F96E72F9E50DC2588BBF95F13B342B1BFB41D4E
2,965,767 UART: [art] SIG.S = C139097D3BCECB01C87B3D7018896B895599D5D38CEF085376422BF4F6764BE9F5E525EE474DE1CF03B0761B2C86C705
2,989,705 UART: Caliptra RT
2,989,959 UART: [state] CFI Enabled
3,097,320 UART: [rt] RT listening for mailbox commands...
3,097,990 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,493 UART: [rt]cmd =0x44504543, len=136
3,200,417 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,174,792 ready_for_fw is high
1,174,792 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,675 UART: [ldev] Erasing FE.KEYID = 1
1,242,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,733 >>> mbox cmd response: success
2,774,832 UART: [afmc] ++
2,775,000 UART: [afmc] CDI.KEYID = 6
2,775,363 UART: [afmc] SUBJECT.KEYID = 7
2,775,789 UART: [afmc] AUTHORITY.KEYID = 5
2,812,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,229 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,560 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,449 UART: [afmc] --
2,855,497 UART: [cold-reset] --
2,856,215 UART: [state] Locking Datavault
2,857,648 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,252 UART: [state] Locking ICCM
2,858,838 UART: [exit] Launching FMC @ 0x40000130
2,864,167 UART:
2,864,183 UART: Running Caliptra FMC ...
2,864,591 UART:
2,864,734 UART: [state] CFI Enabled
2,875,349 UART: [fht] FMC Alias Private Key: 7
2,983,568 UART: [art] Extend RT PCRs Done
2,983,996 UART: [art] Lock RT PCRs Done
2,985,336 UART: [art] Populate DV Done
2,993,535 UART: [fht] FMC Alias Private Key: 7
2,994,671 UART: [art] Derive CDI
2,994,951 UART: [art] Store in in slot 0x4
3,081,144 UART: [art] Derive Key Pair
3,081,504 UART: [art] Store priv key in slot 0x5
3,094,830 UART: [art] Derive Key Pair - Done
3,109,424 UART: [art] Signing Cert with AUTHO
3,109,904 UART: RITY.KEYID = 7
3,124,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,731 UART: [art] PUB.X = BC2C447648308AC0E6775337FDBA44DF601AEB5BFA36799D0E684CF1E2159318553569D00F3A813D54580BFC4C6510F8
3,132,494 UART: [art] PUB.Y = 7DE9E6EE3E73376E5D81AA5A032E9C00E7F24E0048844AB36C35C66094903EFDBC72954FC6E1B42F4449A168CDD20F29
3,139,402 UART: [art] SIG.R = 29D8A7CEFE40E9E33D388711DC8D477582B3FCAD21EBA81593F0E84DCE106349C31B8DEF702C40BC773BB7D5539F1DC4
3,146,188 UART: [art] SIG.S = 6240E6F1DF9138630F50F7F0274EF414EFFDF9346E5C6ACA1269F8B2B561FFACFE52775EA959963386122660AEB381F1
3,170,322 UART: Caliptra RT
3,170,668 UART: [state] CFI Enabled
3,278,614 UART: [rt] RT listening for mailbox commands...
3,279,284 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,739 UART: [rt]cmd =0x44504543, len=136
3,381,833 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,441 ready_for_fw is high
1,055,441 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,883 >>> mbox cmd response: success
2,683,753 UART:
2,683,769 UART: Running Caliptra FMC ...
2,684,177 UART:
2,684,320 UART: [state] CFI Enabled
2,694,907 UART: [fht] FMC Alias Private Key: 7
2,802,654 UART: [art] Extend RT PCRs Done
2,803,082 UART: [art] Lock RT PCRs Done
2,805,004 UART: [art] Populate DV Done
2,813,343 UART: [fht] FMC Alias Private Key: 7
2,814,359 UART: [art] Derive CDI
2,814,639 UART: [art] Store in in slot 0x4
2,900,576 UART: [art] Derive Key Pair
2,900,936 UART: [art] Store priv key in slot 0x5
2,914,232 UART: [art] Derive Key Pair - Done
2,929,211 UART: [art] Signing Cert with AUTHO
2,929,691 UART: RITY.KEYID = 7
2,945,061 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,826 UART: [art] PUB.X = 3590E9FB61FFCE85A87B1DD9E80CF72B106E437A39CBEA417795B6434123C2106AFCA1D9C649EB0ADB74D7E3C1D5BABB
2,952,612 UART: [art] PUB.Y = 620D8EE9E8995049A9800F20B3E2421EC8FABC2B0FFF218E7465166A1970BE1F82DF50FA63EFB263813A054FB8C75F36
2,959,558 UART: [art] SIG.R = 360F9D788D775A6A70FAD0FFFBB7463875CC6E41EBE0B810E398E0622EFD776F4C2D54DC2700B77C6202540AB0100A5E
2,966,304 UART: [art] SIG.S = E24FF85B9A97F0465D83945FB51E34B4768EE8FB24949DFFD767E103C23F94BDEBD45B5DBDA498DEEBBDE9D5075E56CA
2,990,535 UART: Caliptra RT
2,990,881 UART: [state] CFI Enabled
3,098,213 UART: [rt] RT listening for mailbox commands...
3,098,883 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,162 UART: [rt]cmd =0x44504543, len=136
3,200,894 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,455 UART:
192,836 UART: Running Caliptra ROM ...
193,934 UART:
194,070 UART: [state] CFI Enabled
267,450 UART: [state] LifecycleState = Unprovisioned
269,359 UART: [state] DebugLocked = No
270,811 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,310 UART: [kat] SHA2-256
445,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,557 UART: [kat] ++
456,035 UART: [kat] sha1
467,259 UART: [kat] SHA2-256
469,974 UART: [kat] SHA2-384
475,394 UART: [kat] SHA2-512-ACC
477,753 UART: [kat] ECC-384
2,767,557 UART: [kat] HMAC-384Kdf
2,780,101 UART: [kat] LMS
3,970,392 UART: [kat] --
3,975,095 UART: [cold-reset] ++
3,976,899 UART: [fht] Storing FHT @ 0x50003400
3,988,869 UART: [idev] ++
3,989,423 UART: [idev] CDI.KEYID = 6
3,990,413 UART: [idev] SUBJECT.KEYID = 7
3,991,646 UART: [idev] UDS.KEYID = 0
3,992,725 ready_for_fw is high
3,992,936 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,412 UART: [idev] Erasing UDS.KEYID = 0
7,328,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,131 UART: [idev] --
7,354,497 UART: [ldev] ++
7,355,063 UART: [ldev] CDI.KEYID = 6
7,356,021 UART: [ldev] SUBJECT.KEYID = 5
7,357,247 UART: [ldev] AUTHORITY.KEYID = 7
7,358,533 UART: [ldev] FE.KEYID = 1
7,404,640 UART: [ldev] Erasing FE.KEYID = 1
10,735,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,162 UART: [ldev] --
13,097,526 UART: [fwproc] Waiting for Commands...
13,099,775 UART: [fwproc] Received command 0x46574c44
13,101,953 UART: [fwproc] Received Image of size 114036 bytes
17,158,812 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,008 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,866 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,621,422 >>> mbox cmd response: success
17,625,584 UART: [afmc] ++
17,626,187 UART: [afmc] CDI.KEYID = 6
17,627,088 UART: [afmc] SUBJECT.KEYID = 7
17,628,356 UART: [afmc] AUTHORITY.KEYID = 5
20,989,585 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,878 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,190 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,532 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,424 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,828 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,478 UART: [afmc] --
23,359,531 UART: [cold-reset] --
23,362,896 UART: [state] Locking Datavault
23,368,787 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,548 UART: [state] Locking ICCM
23,373,186 UART: [exit] Launching FMC @ 0x40000130
23,381,552 UART:
23,381,786 UART: Running Caliptra FMC ...
23,382,882 UART:
23,383,036 UART: [state] CFI Enabled
23,449,462 UART: [fht] FMC Alias Private Key: 7
25,787,248 UART: [art] Extend RT PCRs Done
25,788,473 UART: [art] Lock RT PCRs Done
25,789,932 UART: [art] Populate DV Done
25,795,505 UART: [fht] FMC Alias Private Key: 7
25,796,982 UART: [art] Derive CDI
25,797,734 UART: [art] Store in in slot 0x4
25,858,657 UART: [art] Derive Key Pair
25,859,698 UART: [art] Store priv key in slot 0x5
29,152,086 UART: [art] Derive Key Pair - Done
29,165,089 UART: [art] Signing Cert with AUTHO
29,166,397 UART: RITY.KEYID = 7
31,454,555 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,091 UART: [art] PUB.X = A215B4F45E0826CDCB7466CB7D6B6FA4ED884697E52406F3331A47DCF1626C9F55C92E69F6561A2F1D544154D34FDA1F
31,463,309 UART: [art] PUB.Y = 8DA3DE15C7976FEE823421C9230229A456281C95211DDA234B47A697572925EF9736584DD8825F4813E127813FB7A328
31,470,518 UART: [art] SIG.R = 17BB2932A084B52ACFF3421D8D01BFF49A72F0D5CE64A3EC0D3468CF7BFA9C90F714E60DFB097C7280F89707AE86E12F
31,477,929 UART: [art] SIG.S = DC763EFCF9BC4A2EEB30A5481E6B1203B44C69FF9152E4439D623F512C7336C3703D56295ABB3FDDEB7681059CB5B018
32,783,269 UART: Caliptra RT
32,783,983 UART: [state] CFI Enabled
32,945,691 UART: [rt] RT listening for mailbox commands...
32,948,128 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,978,749 UART: [rt]cmd =0x44504543, len=92
41,038,452 >>> mbox cmd response data (6284 bytes)
41,067,939 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,097,703 UART: [rt]cmd =0x43455252, len=4
41,109,132 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,802,215 ready_for_fw is high
3,802,617 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,878,229 >>> mbox cmd response: success
23,566,776 UART:
23,567,159 UART: Running Caliptra FMC ...
23,568,255 UART:
23,568,400 UART: [state] CFI Enabled
23,618,592 UART: [fht] FMC Alias Private Key: 7
25,956,088 UART: [art] Extend RT PCRs Done
25,957,319 UART: [art] Lock RT PCRs Done
25,958,664 UART: [art] Populate DV Done
25,963,878 UART: [fht] FMC Alias Private Key: 7
25,965,581 UART: [art] Derive CDI
25,966,311 UART: [art] Store in in slot 0x4
26,027,641 UART: [art] Derive Key Pair
26,028,646 UART: [art] Store priv key in slot 0x5
29,321,564 UART: [art] Derive Key Pair - Done
29,334,670 UART: [art] Signing Cert with AUTHO
29,335,968 UART: RITY.KEYID = 7
31,623,288 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,796 UART: [art] PUB.X = AE9502E936CD3EA537BD75408D5EC1CE8F631F9C2CA3D728BB865FA3BB3749CD7EBF6B13189C3A9D15BC21C526A126B4
31,632,018 UART: [art] PUB.Y = 899552E25760E16C609F9A77D47240BE9D45327ED1195747CCEF7D1C06CFD5CFCEF40B894C1ED77D650DEF44C168D178
31,639,309 UART: [art] SIG.R = 883A726AF8D08528BF165CC644DCDD895B103A4F7652CEF95A5B919AEDAD0EA225612DE006FFB1409E98B94E4E6E879D
31,646,667 UART: [art] SIG.S = E9EDCE6DB903FE3D06D8945E3770BD9111A6CBC6C9114FD1E1AEEA8573CFF80F0586CC582838D9F3CA0CBDBB92EB34A2
32,951,865 UART: Caliptra RT
32,952,580 UART: [state] CFI Enabled
33,115,147 UART: [rt] RT listening for mailbox commands...
33,117,531 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,148,111 UART: [rt]cmd =0x44504543, len=92
41,209,511 >>> mbox cmd response data (6284 bytes)
41,239,177 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,269,179 UART: [rt]cmd =0x43455252, len=4
41,280,549 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,357 UART:
192,733 UART: Running Caliptra ROM ...
193,839 UART:
603,421 UART: [state] CFI Enabled
617,642 UART: [state] LifecycleState = Unprovisioned
619,588 UART: [state] DebugLocked = No
621,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,609 UART: [kat] SHA2-256
795,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,917 UART: [kat] ++
806,366 UART: [kat] sha1
818,112 UART: [kat] SHA2-256
820,837 UART: [kat] SHA2-384
827,960 UART: [kat] SHA2-512-ACC
830,335 UART: [kat] ECC-384
3,114,015 UART: [kat] HMAC-384Kdf
3,126,842 UART: [kat] LMS
4,316,998 UART: [kat] --
4,319,875 UART: [cold-reset] ++
4,322,446 UART: [fht] Storing FHT @ 0x50003400
4,333,346 UART: [idev] ++
4,333,931 UART: [idev] CDI.KEYID = 6
4,334,966 UART: [idev] SUBJECT.KEYID = 7
4,336,145 UART: [idev] UDS.KEYID = 0
4,337,144 ready_for_fw is high
4,337,344 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,443 UART: [idev] Erasing UDS.KEYID = 0
7,627,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,319 UART: [idev] --
7,652,576 UART: [ldev] ++
7,653,138 UART: [ldev] CDI.KEYID = 6
7,654,076 UART: [ldev] SUBJECT.KEYID = 5
7,655,343 UART: [ldev] AUTHORITY.KEYID = 7
7,656,542 UART: [ldev] FE.KEYID = 1
7,667,908 UART: [ldev] Erasing FE.KEYID = 1
10,960,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,496 UART: [ldev] --
13,321,700 UART: [fwproc] Waiting for Commands...
13,324,922 UART: [fwproc] Received command 0x46574c44
13,327,117 UART: [fwproc] Received Image of size 114036 bytes
17,385,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,261 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,842,790 >>> mbox cmd response: success
17,846,448 UART: [afmc] ++
17,847,072 UART: [afmc] CDI.KEYID = 6
17,847,990 UART: [afmc] SUBJECT.KEYID = 7
17,849,214 UART: [afmc] AUTHORITY.KEYID = 5
21,160,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,610 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,983 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,839 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,268 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,719 UART: [afmc] --
23,522,932 UART: [cold-reset] --
23,525,727 UART: [state] Locking Datavault
23,531,767 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,529 UART: [state] Locking ICCM
23,535,355 UART: [exit] Launching FMC @ 0x40000130
23,543,763 UART:
23,544,000 UART: Running Caliptra FMC ...
23,545,105 UART:
23,545,259 UART: [state] CFI Enabled
23,553,247 UART: [fht] FMC Alias Private Key: 7
25,884,024 UART: [art] Extend RT PCRs Done
25,885,248 UART: [art] Lock RT PCRs Done
25,886,680 UART: [art] Populate DV Done
25,892,102 UART: [fht] FMC Alias Private Key: 7
25,893,637 UART: [art] Derive CDI
25,894,373 UART: [art] Store in in slot 0x4
25,937,147 UART: [art] Derive Key Pair
25,938,185 UART: [art] Store priv key in slot 0x5
29,180,616 UART: [art] Derive Key Pair - Done
29,193,339 UART: [art] Signing Cert with AUTHO
29,194,634 UART: RITY.KEYID = 7
31,473,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,236 UART: [art] PUB.X = E07B0C770F5593DF9BFF67FC958BA5B01A8F19A64E11B9B4696F80068A2A6118326E542B81BDEE5D7A1BC1EE19B56429
31,482,492 UART: [art] PUB.Y = 75D9AE66A2CF6200533BB629BA3B488D105E1ED42DE4A80E38F2F5CD2263EC631CB0A54C3A8570D7C27E98969218D89D
31,489,736 UART: [art] SIG.R = BD84B29E9F0E1FABA785955BBEFDEF2D4A3282195B365D0593A5BCFC8147CCA964E9AF718E610829E723E28D4238F6BB
31,497,140 UART: [art] SIG.S = 1FB49397C6581896C08C8BC9EA40520F7235DAB35B04430C6840EE52902512950320ED7ABAFAFD17EE45FDA1428769FC
32,802,765 UART: Caliptra RT
32,803,478 UART: [state] CFI Enabled
32,920,868 UART: [rt] RT listening for mailbox commands...
32,923,292 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,953,879 UART: [rt]cmd =0x44504543, len=92
40,934,241 >>> mbox cmd response data (6284 bytes)
40,963,535 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
40,993,308 UART: [rt]cmd =0x43455252, len=4
41,004,660 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,125,991 ready_for_fw is high
4,126,398 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,092,926 >>> mbox cmd response: success
23,735,615 UART:
23,735,993 UART: Running Caliptra FMC ...
23,737,189 UART:
23,737,359 UART: [state] CFI Enabled
23,745,263 UART: [fht] FMC Alias Private Key: 7
26,075,589 UART: [art] Extend RT PCRs Done
26,076,820 UART: [art] Lock RT PCRs Done
26,078,565 UART: [art] Populate DV Done
26,083,799 UART: [fht] FMC Alias Private Key: 7
26,085,292 UART: [art] Derive CDI
26,086,061 UART: [art] Store in in slot 0x4
26,129,157 UART: [art] Derive Key Pair
26,130,194 UART: [art] Store priv key in slot 0x5
29,371,882 UART: [art] Derive Key Pair - Done
29,384,880 UART: [art] Signing Cert with AUTHO
29,386,194 UART: RITY.KEYID = 7
31,665,713 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,216 UART: [art] PUB.X = CD0DCC44BF9735B474A6457CF30221946C42A1FBC97A0CD36F4DA3C3A08B518689547A2BEFBE8BD4235FD37B6C594ADC
31,674,486 UART: [art] PUB.Y = 2D8D0EB9448A9369573252882B2BB4C6720B03538681755162E555AA1A6AE87252129817F0CD6C4BFCE841184289B5B0
31,681,737 UART: [art] SIG.R = C0FFC2B2C3B09E1A7FB842A556EBC303D2D5D84BC58397D711442F9143537DE4822131E9D31121B3BA4EDE62047CC7CA
31,689,117 UART: [art] SIG.S = 565D1A707BA7E5A8457B73520502AF4BBAB1A5EAB3DBEA9879B103EAFC6256C1FC04757E3B81D687477EB014C622AC91
32,994,154 UART: Caliptra RT
32,994,870 UART: [state] CFI Enabled
33,112,744 UART: [rt] RT listening for mailbox commands...
33,115,194 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,145,776 UART: [rt]cmd =0x44504543, len=92
41,125,504 >>> mbox cmd response data (6284 bytes)
41,154,810 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,184,577 UART: [rt]cmd =0x43455252, len=4
41,196,035 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,444 UART:
192,807 UART: Running Caliptra ROM ...
193,916 UART:
194,060 UART: [state] CFI Enabled
265,458 UART: [state] LifecycleState = Unprovisioned
267,365 UART: [state] DebugLocked = No
268,672 UART: [state] WD Timer not started. Device not locked for debugging
271,781 UART: [kat] SHA2-256
450,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,511 UART: [kat] ++
462,965 UART: [kat] sha1
473,831 UART: [kat] SHA2-256
476,842 UART: [kat] SHA2-384
483,328 UART: [kat] SHA2-512-ACC
486,265 UART: [kat] ECC-384
2,946,969 UART: [kat] HMAC-384Kdf
2,970,090 UART: [kat] LMS
3,499,592 UART: [kat] --
3,504,582 UART: [cold-reset] ++
3,507,155 UART: [fht] FHT @ 0x50003400
3,516,854 UART: [idev] ++
3,517,417 UART: [idev] CDI.KEYID = 6
3,518,333 UART: [idev] SUBJECT.KEYID = 7
3,519,446 UART: [idev] UDS.KEYID = 0
3,520,432 ready_for_fw is high
3,520,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,437 UART: [idev] Erasing UDS.KEYID = 0
6,023,588 UART: [idev] Sha1 KeyId Algorithm
6,047,045 UART: [idev] --
6,051,639 UART: [ldev] ++
6,052,413 UART: [ldev] CDI.KEYID = 6
6,053,336 UART: [ldev] SUBJECT.KEYID = 5
6,054,466 UART: [ldev] AUTHORITY.KEYID = 7
6,055,653 UART: [ldev] FE.KEYID = 1
6,099,136 UART: [ldev] Erasing FE.KEYID = 1
8,600,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,708 UART: [ldev] --
10,411,892 UART: [fwproc] Wait for Commands...
10,414,198 UART: [fwproc] Recv command 0x46574c44
10,416,292 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,275,165 >>> mbox cmd response: success
14,278,688 UART: [afmc] ++
14,279,290 UART: [afmc] CDI.KEYID = 6
14,280,204 UART: [afmc] SUBJECT.KEYID = 7
14,281,368 UART: [afmc] AUTHORITY.KEYID = 5
16,806,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,315 UART: [afmc] --
18,607,370 UART: [cold-reset] --
18,611,988 UART: [state] Locking Datavault
18,615,871 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,529 UART: [state] Locking ICCM
18,619,514 UART: [exit] Launching FMC @ 0x40000130
18,627,928 UART:
18,628,167 UART: Running Caliptra FMC ...
18,629,267 UART:
18,629,431 UART: [state] CFI Enabled
18,688,488 UART: [fht] FMC Alias Private Key: 7
20,452,330 UART: [art] Extend RT PCRs Done
20,453,547 UART: [art] Lock RT PCRs Done
20,455,220 UART: [art] Populate DV Done
20,460,465 UART: [fht] FMC Alias Private Key: 7
20,462,056 UART: [art] Derive CDI
20,462,875 UART: [art] Store in in slot 0x4
20,521,538 UART: [art] Derive Key Pair
20,522,541 UART: [art] Store priv key in slot 0x5
22,985,435 UART: [art] Derive Key Pair - Done
22,998,426 UART: [art] Signing Cert with AUTHO
22,999,737 UART: RITY.KEYID = 7
24,712,285 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,786 UART: [art] PUB.X = A93E3FA475A2AC78BA0F2C408542BBFA9CD3DA67AA69FC2E9E20F24BB86FCA3F126858FCD90B33EDD56AC1C2800F52B0
24,721,119 UART: [art] PUB.Y = 69417246621E95AECAC8FCD023B2A6CC3D5CB80F420F3A41D71555AB1DD6D8CE3FA86CE8D348EE42A7087199DBC13D4B
24,728,371 UART: [art] SIG.R = 96210E2B77A3ED238F443722858D75DCA06D346E7788E957D9F998213156AC2C7AA0C27BFAB02C6A100ACA3FBB95F0C4
24,735,799 UART: [art] SIG.S = 7B7D44EEF1FDB17D13B02927026D2AB885FB0B6D7AD8FBED4F7E828BF8E046F9ECC61E8D69F3B410602E8FAB5E6E14AA
25,714,439 UART: Caliptra RT
25,715,139 UART: [state] CFI Enabled
25,880,001 UART: [rt] RT listening for mailbox commands...
25,882,434 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,912,980 UART: [rt]cmd =0x44504543, len=92
31,992,985 >>> mbox cmd response data (6284 bytes)
32,022,274 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,052,492 UART: [rt]cmd =0x43455252, len=4
32,063,907 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,393 UART:
192,785 UART: Running Caliptra ROM ...
193,985 UART:
194,144 UART: [state] CFI Enabled
266,866 UART: [state] LifecycleState = Unprovisioned
269,263 UART: [state] DebugLocked = No
270,541 UART: [state] WD Timer not started. Device not locked for debugging
275,710 UART: [kat] SHA2-256
465,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,368 UART: [kat] ++
476,813 UART: [kat] sha1
487,474 UART: [kat] SHA2-256
490,480 UART: [kat] SHA2-384
495,120 UART: [kat] SHA2-512-ACC
497,705 UART: [kat] ECC-384
2,947,658 UART: [kat] HMAC-384Kdf
2,964,776 UART: [kat] LMS
3,496,501 UART: [kat] --
3,501,782 UART: [cold-reset] ++
3,504,140 UART: [fht] FHT @ 0x50003400
3,516,531 UART: [idev] ++
3,517,248 UART: [idev] CDI.KEYID = 6
3,518,199 UART: [idev] SUBJECT.KEYID = 7
3,519,370 UART: [idev] UDS.KEYID = 0
3,520,312 ready_for_fw is high
3,520,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,433 UART: [idev] Erasing UDS.KEYID = 0
6,023,995 UART: [idev] Sha1 KeyId Algorithm
6,046,154 UART: [idev] --
6,051,340 UART: [ldev] ++
6,052,023 UART: [ldev] CDI.KEYID = 6
6,052,941 UART: [ldev] SUBJECT.KEYID = 5
6,054,101 UART: [ldev] AUTHORITY.KEYID = 7
6,055,352 UART: [ldev] FE.KEYID = 1
6,093,336 UART: [ldev] Erasing FE.KEYID = 1
8,597,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,080 UART: [ldev] --
10,406,376 UART: [fwproc] Wait for Commands...
10,409,225 UART: [fwproc] Recv command 0x46574c44
10,411,480 UART: [fwproc] Recv'd Img size: 114360 bytes
13,856,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,596,640 >>> mbox cmd response: success
14,600,766 UART: [afmc] ++
14,601,504 UART: [afmc] CDI.KEYID = 6
14,602,700 UART: [afmc] SUBJECT.KEYID = 7
14,604,138 UART: [afmc] AUTHORITY.KEYID = 5
17,142,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,866,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,868,850 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,883,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,899,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,914,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,938,045 UART: [afmc] --
18,942,192 UART: [cold-reset] --
18,944,552 UART: [state] Locking Datavault
18,949,054 UART: [state] Locking PCR0, PCR1 and PCR31
18,951,213 UART: [state] Locking ICCM
18,952,669 UART: [exit] Launching FMC @ 0x40000130
18,961,304 UART:
18,961,564 UART: Running Caliptra FMC ...
18,962,672 UART:
18,962,836 UART: [state] CFI Enabled
19,023,691 UART: [fht] FMC Alias Private Key: 7
20,788,679 UART: [art] Extend RT PCRs Done
20,789,903 UART: [art] Lock RT PCRs Done
20,791,557 UART: [art] Populate DV Done
20,796,967 UART: [fht] FMC Alias Private Key: 7
20,798,462 UART: [art] Derive CDI
20,799,229 UART: [art] Store in in slot 0x4
20,856,541 UART: [art] Derive Key Pair
20,857,580 UART: [art] Store priv key in slot 0x5
23,320,570 UART: [art] Derive Key Pair - Done
23,333,355 UART: [art] Signing Cert with AUTHO
23,334,663 UART: RITY.KEYID = 7
25,046,103 UART: [art] Erasing AUTHORITY.KEYID = 7
25,047,636 UART: [art] PUB.X = F857502E68C19D31C81658C026F3B69FBB6FA98D2559305843A261C74B6C084E42400E75A27FDB40CEDEC9314EFA5E97
25,054,880 UART: [art] PUB.Y = 5CE0579D3709480A74B9E7866695AC7C28B31033E56EE9D9205F7F245DDA308DEAD9313D9C3DCA6D6638F16F833A419E
25,062,133 UART: [art] SIG.R = 95AC1219E55AA36916646E5E215D6CDA8215A28960DB10794BE5217ECF2DA787142F611434F11C34EE72CB8D45A09603
25,069,527 UART: [art] SIG.S = E6247492A7599F69BA3182989D95ED061350F71D20B0470F1A4B956092A9EE12DF8E265AED21656DADC1881F30A7A527
26,048,644 UART: Caliptra RT
26,049,358 UART: [state] CFI Enabled
26,213,073 UART: [rt] RT listening for mailbox commands...
26,215,460 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,246,223 UART: [rt]cmd =0x44504543, len=92
32,337,769 >>> mbox cmd response data (6284 bytes)
32,367,318 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,397,253 UART: [rt]cmd =0x43455252, len=4
32,408,625 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
3,440,351 ready_for_fw is high
3,440,727 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,735,249 >>> mbox cmd response: success
19,027,631 UART:
19,028,028 UART: Running Caliptra FMC ...
19,029,233 UART:
19,029,410 UART: [state] CFI Enabled
19,096,450 UART: [fht] FMC Alias Private Key: 7
20,860,799 UART: [art] Extend RT PCRs Done
20,862,020 UART: [art] Lock RT PCRs Done
20,863,888 UART: [art] Populate DV Done
20,869,355 UART: [fht] FMC Alias Private Key: 7
20,870,954 UART: [art] Derive CDI
20,871,774 UART: [art] Store in in slot 0x4
20,929,410 UART: [art] Derive Key Pair
20,930,406 UART: [art] Store priv key in slot 0x5
23,393,324 UART: [art] Derive Key Pair - Done
23,406,219 UART: [art] Signing Cert with AUTHO
23,407,528 UART: RITY.KEYID = 7
25,119,234 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,744 UART: [art] PUB.X = B97364EBD5EFC0AF3204D5E3B7B1AADCB7BAAA1DDA8713846D7A9146D3DBF28DB5FEF2EC3107120B258AEEF6593F91BA
25,128,022 UART: [art] PUB.Y = 6C82208995CD2167FAC133B4748871D6C2BA2B7B3E9449C3C933B25940956E6FFF546BC6EB8D165D934EAC20E9A91E17
25,135,309 UART: [art] SIG.R = A486FE10AD52CF2B1C83894C249AC6F91974A180D781BDCE8853DC5EB20CD8EBBDA0023AA19BA7D86C3F9A143B4C00E2
25,142,679 UART: [art] SIG.S = 144B412527DE7B3BC111B7CBBDBA0D9F7F1977CA704C8C84D9119B92A372FCBBD96AB1837E5399FE10AA478FBE564B29
26,121,854 UART: Caliptra RT
26,122,548 UART: [state] CFI Enabled
26,287,079 UART: [rt] RT listening for mailbox commands...
26,289,486 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,320,035 UART: [rt]cmd =0x44504543, len=92
32,398,673 >>> mbox cmd response data (6284 bytes)
32,427,922 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,457,798 UART: [rt]cmd =0x43455252, len=4
32,469,144 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,326 UART:
192,693 UART: Running Caliptra ROM ...
193,889 UART:
603,731 UART: [state] CFI Enabled
616,696 UART: [state] LifecycleState = Unprovisioned
619,067 UART: [state] DebugLocked = No
621,529 UART: [state] WD Timer not started. Device not locked for debugging
626,977 UART: [kat] SHA2-256
816,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,671 UART: [kat] ++
828,147 UART: [kat] sha1
838,805 UART: [kat] SHA2-256
841,818 UART: [kat] SHA2-384
848,800 UART: [kat] SHA2-512-ACC
851,374 UART: [kat] ECC-384
3,292,793 UART: [kat] HMAC-384Kdf
3,306,405 UART: [kat] LMS
3,838,240 UART: [kat] --
3,843,579 UART: [cold-reset] ++
3,845,302 UART: [fht] FHT @ 0x50003400
3,856,916 UART: [idev] ++
3,857,548 UART: [idev] CDI.KEYID = 6
3,858,658 UART: [idev] SUBJECT.KEYID = 7
3,859,773 UART: [idev] UDS.KEYID = 0
3,860,699 ready_for_fw is high
3,860,913 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,472 UART: [idev] Erasing UDS.KEYID = 0
6,336,800 UART: [idev] Sha1 KeyId Algorithm
6,358,263 UART: [idev] --
6,364,205 UART: [ldev] ++
6,364,879 UART: [ldev] CDI.KEYID = 6
6,365,784 UART: [ldev] SUBJECT.KEYID = 5
6,366,940 UART: [ldev] AUTHORITY.KEYID = 7
6,368,166 UART: [ldev] FE.KEYID = 1
6,380,286 UART: [ldev] Erasing FE.KEYID = 1
8,858,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,041 UART: [ldev] --
10,648,143 UART: [fwproc] Wait for Commands...
10,650,287 UART: [fwproc] Recv command 0x46574c44
10,652,539 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,790 >>> mbox cmd response: success
14,847,062 UART: [afmc] ++
14,847,774 UART: [afmc] CDI.KEYID = 6
14,848,983 UART: [afmc] SUBJECT.KEYID = 7
14,850,409 UART: [afmc] AUTHORITY.KEYID = 5
17,357,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,101 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,926 UART: [afmc] --
19,152,318 UART: [cold-reset] --
19,157,044 UART: [state] Locking Datavault
19,161,645 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,826 UART: [state] Locking ICCM
19,165,214 UART: [exit] Launching FMC @ 0x40000130
19,173,880 UART:
19,174,113 UART: Running Caliptra FMC ...
19,175,229 UART:
19,175,388 UART: [state] CFI Enabled
19,183,382 UART: [fht] FMC Alias Private Key: 7
20,941,239 UART: [art] Extend RT PCRs Done
20,942,459 UART: [art] Lock RT PCRs Done
20,944,133 UART: [art] Populate DV Done
20,949,704 UART: [fht] FMC Alias Private Key: 7
20,951,244 UART: [art] Derive CDI
20,952,002 UART: [art] Store in in slot 0x4
20,994,704 UART: [art] Derive Key Pair
20,995,744 UART: [art] Store priv key in slot 0x5
23,422,261 UART: [art] Derive Key Pair - Done
23,435,578 UART: [art] Signing Cert with AUTHO
23,436,879 UART: RITY.KEYID = 7
25,142,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,166 UART: [art] PUB.X = 7AE7059F40196C76F680BEB91DD6AE9F5F0618AC08AFF1F30BF462B834AEFFB00D238F407EBF1F098026B388F726F865
25,151,482 UART: [art] PUB.Y = B7DBAE09C835828AAC46CA057A0208A9130363C8924C56AA7D852940AFDC1E4A00FFB79F55CF4611261401AE330F1638
25,158,713 UART: [art] SIG.R = CA2A0987796AFC2C8E9D2D57A84AC4EAC45437017CF296DAB2AD444FF9BD8E81881E86F30DB05E060EDF58757F19E98D
25,166,102 UART: [art] SIG.S = FE0559D8371A9EE89DC975E7A673FA85F934A74CE17641557BCEE6F9A7BCD49E490A58C5E8C123F1A81A455E3A24B068
26,145,353 UART: Caliptra RT
26,146,062 UART: [state] CFI Enabled
26,262,936 UART: [rt] RT listening for mailbox commands...
26,265,329 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,295,813 UART: [rt]cmd =0x44504543, len=92
32,313,037 >>> mbox cmd response data (6284 bytes)
32,342,482 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,372,351 UART: [rt]cmd =0x43455252, len=4
32,383,771 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,757,848 ready_for_fw is high
3,758,445 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,964,250 >>> mbox cmd response: success
19,219,076 UART:
19,219,471 UART: Running Caliptra FMC ...
19,220,568 UART:
19,220,727 UART: [state] CFI Enabled
19,228,901 UART: [fht] FMC Alias Private Key: 7
20,985,861 UART: [art] Extend RT PCRs Done
20,987,082 UART: [art] Lock RT PCRs Done
20,988,798 UART: [art] Populate DV Done
20,994,262 UART: [fht] FMC Alias Private Key: 7
20,995,906 UART: [art] Derive CDI
20,996,640 UART: [art] Store in in slot 0x4
21,039,197 UART: [art] Derive Key Pair
21,040,198 UART: [art] Store priv key in slot 0x5
23,467,936 UART: [art] Derive Key Pair - Done
23,481,143 UART: [art] Signing Cert with AUTHO
23,482,442 UART: RITY.KEYID = 7
25,188,222 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,731 UART: [art] PUB.X = 221F6221F184BDC1455A11AE8355D9C09F2177C73DFBEC585BD1A6E431F138CBBA693D536C398EA6B187F271BC695DC9
25,196,992 UART: [art] PUB.Y = 93A600EE70BDEFA7B24724EBC98F448FD5A8374CBF9DED91FB2B0A404CED57491D542F17A8F86F8896CD56981E4DFD5D
25,204,267 UART: [art] SIG.R = 05EF2EAF965712CBE82C974CCC5949F0AAACF86720EECB3A63CF5946CE872303AC2104E5D465B0989A58DD35CDD57DB8
25,211,667 UART: [art] SIG.S = 4A2AFE5170DC9F210EBA6EC326D97DE8A3EFE073C21C6980D7DE35E230FE8305381182C3C01544B568790EB4DD1DD216
26,190,842 UART: Caliptra RT
26,191,551 UART: [state] CFI Enabled
26,307,907 UART: [rt] RT listening for mailbox commands...
26,310,242 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,340,893 UART: [rt]cmd =0x44504543, len=92
32,357,087 >>> mbox cmd response data (6284 bytes)
32,386,353 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,416,390 UART: [rt]cmd =0x43455252, len=4
32,427,743 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,475,911 UART: [cold-reset] ++
1,476,413 UART: [fht] Storing FHT @ 0x50003400
1,479,238 UART: [idev] ++
1,479,406 UART: [idev] CDI.KEYID = 6
1,479,766 UART: [idev] SUBJECT.KEYID = 7
1,480,190 UART: [idev] UDS.KEYID = 0
1,480,535 ready_for_fw is high
1,480,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,156 UART: [idev] Erasing UDS.KEYID = 0
1,504,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,322 UART: [idev] --
1,514,271 UART: [ldev] ++
1,514,439 UART: [ldev] CDI.KEYID = 6
1,514,802 UART: [ldev] SUBJECT.KEYID = 5
1,515,228 UART: [ldev] AUTHORITY.KEYID = 7
1,515,691 UART: [ldev] FE.KEYID = 1
1,521,079 UART: [ldev] Erasing FE.KEYID = 1
1,545,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,860 UART: [ldev] --
1,585,201 UART: [fwproc] Waiting for Commands...
1,585,966 UART: [fwproc] Received command 0x46574c44
1,586,757 UART: [fwproc] Received Image of size 114360 bytes
2,884,052 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,279 >>> mbox cmd response: success
3,077,453 UART: [afmc] ++
3,077,621 UART: [afmc] CDI.KEYID = 6
3,077,983 UART: [afmc] SUBJECT.KEYID = 7
3,078,408 UART: [afmc] AUTHORITY.KEYID = 5
3,112,949 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,969 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,697 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,582 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,272 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,321 UART: [afmc] --
3,156,249 UART: [cold-reset] --
3,157,113 UART: [state] Locking Datavault
3,158,204 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,808 UART: [state] Locking ICCM
3,159,376 UART: [exit] Launching FMC @ 0x40000130
3,164,705 UART:
3,164,721 UART: Running Caliptra FMC ...
3,165,129 UART:
3,165,183 UART: [state] CFI Enabled
3,175,850 UART: [fht] FMC Alias Private Key: 7
3,284,371 UART: [art] Extend RT PCRs Done
3,284,799 UART: [art] Lock RT PCRs Done
3,286,275 UART: [art] Populate DV Done
3,294,440 UART: [fht] FMC Alias Private Key: 7
3,295,456 UART: [art] Derive CDI
3,295,736 UART: [art] Store in in slot 0x4
3,381,367 UART: [art] Derive Key Pair
3,381,727 UART: [art] Store priv key in slot 0x5
3,394,999 UART: [art] Derive Key Pair - Done
3,409,717 UART: [art] Signing Cert with AUTHO
3,410,197 UART: RITY.KEYID = 7
3,425,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,408 UART: [art] PUB.X = 2B00DDC0491CF5BB4C994087014860D4B0186B84811A798F597938A9EEA44527E39A7632F90C0C1DBD0DB4B21DE846C1
3,433,146 UART: [art] PUB.Y = AA8885942CC209D76511A7E3CC600A3AB1EB35ADE80AC76D5FE6289B9CD22DCEB08C25D22F6BDCE6063BB8A261893853
3,440,100 UART: [art] SIG.R = 1FFE1DA3D7CE98B9E4A7405EB0300C290FD018FDFD25866A70A3289D1452B358475B9B17F3589FEBD7F8C467DB53EA85
3,446,876 UART: [art] SIG.S = 883C4DBF9E5AA4ED8531B86FE0C414BC6B43366BCDA3FCE4D5BF5C7984A6B173E04356B9D4EB47D55CF6142F420E0178
3,470,333 UART: Caliptra RT
3,470,587 UART: [state] CFI Enabled
3,578,697 UART: [rt] RT listening for mailbox commands...
3,579,367 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,414 UART: [rt]cmd =0x44504543, len=92
3,832,637 >>> mbox cmd response data (6284 bytes)
3,832,638 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,901 UART: [rt]cmd =0x43455252, len=4
3,872,751 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,747 ready_for_fw is high
1,362,747 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,799 >>> mbox cmd response: success
2,988,307 UART:
2,988,323 UART: Running Caliptra FMC ...
2,988,731 UART:
2,988,785 UART: [state] CFI Enabled
2,999,308 UART: [fht] FMC Alias Private Key: 7
3,107,383 UART: [art] Extend RT PCRs Done
3,107,811 UART: [art] Lock RT PCRs Done
3,108,965 UART: [art] Populate DV Done
3,117,206 UART: [fht] FMC Alias Private Key: 7
3,118,206 UART: [art] Derive CDI
3,118,486 UART: [art] Store in in slot 0x4
3,203,909 UART: [art] Derive Key Pair
3,204,269 UART: [art] Store priv key in slot 0x5
3,217,447 UART: [art] Derive Key Pair - Done
3,232,429 UART: [art] Signing Cert with AUTHO
3,232,909 UART: RITY.KEYID = 7
3,248,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,314 UART: [art] PUB.X = A2B03FB99C7E6D8DA5469EB3D1B0D76F62C30B589D0F02952CC0D1E0213FE0714523D42BB608E05EF12AFF88E2BFB3A4
3,256,088 UART: [art] PUB.Y = 4F2CCCD818C127DEB6EF7DBE3B6B4D5F663E5D12F6044381AE370BD4F0451DEBFE3A9B6A08EFB2B2440CE44DC2566F94
3,263,050 UART: [art] SIG.R = 6D2CEA8031514D33534274634B8782EAB27F1A50333857A205A62F9FE4091ADC79DC1D43E52666F3699D9B2CF2B8D77E
3,269,814 UART: [art] SIG.S = 4AB75839441038C49EEA0A8CB45E15A54D7BFC986D25E151871D0F21C88CD4A3684517FAEB876409CA308DBAD248AF9D
3,293,688 UART: Caliptra RT
3,293,942 UART: [state] CFI Enabled
3,402,765 UART: [rt] RT listening for mailbox commands...
3,403,435 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,336 UART: [rt]cmd =0x44504543, len=92
3,657,169 >>> mbox cmd response data (6284 bytes)
3,657,170 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,535 UART: [rt]cmd =0x43455252, len=4
3,697,309 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,644 UART: [kat] SHA2-256
892,582 UART: [kat] SHA2-384
895,229 UART: [kat] SHA2-512-ACC
897,130 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,700 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,947 UART: [idev] ++
1,480,115 UART: [idev] CDI.KEYID = 6
1,480,475 UART: [idev] SUBJECT.KEYID = 7
1,480,899 UART: [idev] UDS.KEYID = 0
1,481,244 ready_for_fw is high
1,481,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,325 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,521,974 UART: [ldev] Erasing FE.KEYID = 1
1,547,271 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,171 UART: [ldev] --
1,586,450 UART: [fwproc] Waiting for Commands...
1,587,093 UART: [fwproc] Received command 0x46574c44
1,587,884 UART: [fwproc] Received Image of size 114360 bytes
2,886,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,466 >>> mbox cmd response: success
3,079,514 UART: [afmc] ++
3,079,682 UART: [afmc] CDI.KEYID = 6
3,080,044 UART: [afmc] SUBJECT.KEYID = 7
3,080,469 UART: [afmc] AUTHORITY.KEYID = 5
3,116,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,733 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,423 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,284 UART: [afmc] --
3,159,410 UART: [cold-reset] --
3,160,344 UART: [state] Locking Datavault
3,161,453 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,057 UART: [state] Locking ICCM
3,162,647 UART: [exit] Launching FMC @ 0x40000130
3,167,976 UART:
3,167,992 UART: Running Caliptra FMC ...
3,168,400 UART:
3,168,543 UART: [state] CFI Enabled
3,179,442 UART: [fht] FMC Alias Private Key: 7
3,288,043 UART: [art] Extend RT PCRs Done
3,288,471 UART: [art] Lock RT PCRs Done
3,289,651 UART: [art] Populate DV Done
3,297,742 UART: [fht] FMC Alias Private Key: 7
3,298,706 UART: [art] Derive CDI
3,298,986 UART: [art] Store in in slot 0x4
3,384,297 UART: [art] Derive Key Pair
3,384,657 UART: [art] Store priv key in slot 0x5
3,398,107 UART: [art] Derive Key Pair - Done
3,413,030 UART: [art] Signing Cert with AUTHO
3,413,510 UART: RITY.KEYID = 7
3,429,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,919 UART: [art] PUB.X = 022AB4D83DB6E235560EFBCF413C0DF83F231906CD253A0D67B50FC5201441EE91835AC34B83258168BDE2FD2D398E9A
3,436,679 UART: [art] PUB.Y = 51987B1E622E7E3FE4D2A5C2C9D1860F38BBFCDE83FBD2F13EC7DEFAD9AAD46BA99F1874D8D621FA24171AACB41C6B49
3,443,654 UART: [art] SIG.R = 248A49DE043DA240C8184E045844851856C6918CAFA954521F128C53A656D0E6A7A965617B1BB346EA81BE46FC9D8C8E
3,450,418 UART: [art] SIG.S = 5768F1408C94F8729F5440E80EBF11B22EB1DCD9DD01BB68CC482CC840BA7438F47321983CD3D39FF14AD1FD2DCC865D
3,473,969 UART: Caliptra RT
3,474,315 UART: [state] CFI Enabled
3,581,774 UART: [rt] RT listening for mailbox commands...
3,582,444 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,539 UART: [rt]cmd =0x44504543, len=92
3,836,672 >>> mbox cmd response data (6284 bytes)
3,836,673 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,908 UART: [rt]cmd =0x43455252, len=4
3,876,852 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,436 ready_for_fw is high
1,362,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,448 >>> mbox cmd response: success
2,988,460 UART:
2,988,476 UART: Running Caliptra FMC ...
2,988,884 UART:
2,989,027 UART: [state] CFI Enabled
2,999,660 UART: [fht] FMC Alias Private Key: 7
3,107,015 UART: [art] Extend RT PCRs Done
3,107,443 UART: [art] Lock RT PCRs Done
3,109,177 UART: [art] Populate DV Done
3,117,266 UART: [fht] FMC Alias Private Key: 7
3,118,224 UART: [art] Derive CDI
3,118,504 UART: [art] Store in in slot 0x4
3,204,037 UART: [art] Derive Key Pair
3,204,397 UART: [art] Store priv key in slot 0x5
3,217,795 UART: [art] Derive Key Pair - Done
3,232,652 UART: [art] Signing Cert with AUTHO
3,233,132 UART: RITY.KEYID = 7
3,248,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,203 UART: [art] PUB.X = 0BEB2FFA3CADACF52B8EC49A895ABB3F1DE9B0577E275B7DC9283D09D091062589466696D1CE5AE9E19F52DF21430938
3,255,975 UART: [art] PUB.Y = B111B5E01082C063B44E32E62FECFCFA20C7B539704D1333B06B10344155531FB87B7202E90825C3A99F860193E2C323
3,262,910 UART: [art] SIG.R = C6BCCEF8D01E0ED6A444B810D2E691264159510E7A17787D74021F0F3672DBCC826731CF6AE27E9750B75E6CAE187C7F
3,269,676 UART: [art] SIG.S = 184C80A6553BEA3D919B54B07F6641F896FA1F9C63E9224306B265FAA7086A7068A9BE445A5D36832131ED82C818B142
3,293,783 UART: Caliptra RT
3,294,129 UART: [state] CFI Enabled
3,402,187 UART: [rt] RT listening for mailbox commands...
3,402,857 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,920 UART: [rt]cmd =0x44504543, len=92
3,656,820 >>> mbox cmd response data (6284 bytes)
3,656,821 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,348 UART: [rt]cmd =0x43455252, len=4
3,697,146 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,409 UART: [kat] SHA2-256
903,349 UART: [kat] SHA2-384
906,092 UART: [kat] SHA2-512-ACC
907,993 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,526 UART: [kat] LMS
1,170,854 UART: [kat] --
1,171,563 UART: [cold-reset] ++
1,171,963 UART: [fht] FHT @ 0x50003400
1,174,646 UART: [idev] ++
1,174,814 UART: [idev] CDI.KEYID = 6
1,175,174 UART: [idev] SUBJECT.KEYID = 7
1,175,598 UART: [idev] UDS.KEYID = 0
1,175,943 ready_for_fw is high
1,175,943 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,738 UART: [idev] Erasing UDS.KEYID = 0
1,200,519 UART: [idev] Sha1 KeyId Algorithm
1,209,007 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,520 UART: [ldev] SUBJECT.KEYID = 5
1,210,946 UART: [ldev] AUTHORITY.KEYID = 7
1,211,409 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,380 UART: [fwproc] Wait for Commands...
1,283,142 UART: [fwproc] Recv command 0x46574c44
1,283,870 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,984 >>> mbox cmd response: success
2,775,016 UART: [afmc] ++
2,775,184 UART: [afmc] CDI.KEYID = 6
2,775,546 UART: [afmc] SUBJECT.KEYID = 7
2,775,971 UART: [afmc] AUTHORITY.KEYID = 5
2,811,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,761 UART: [afmc] --
2,854,677 UART: [cold-reset] --
2,855,651 UART: [state] Locking Datavault
2,856,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,272 UART: [state] Locking ICCM
2,857,824 UART: [exit] Launching FMC @ 0x40000130
2,863,153 UART:
2,863,169 UART: Running Caliptra FMC ...
2,863,577 UART:
2,863,631 UART: [state] CFI Enabled
2,873,976 UART: [fht] FMC Alias Private Key: 7
2,981,871 UART: [art] Extend RT PCRs Done
2,982,299 UART: [art] Lock RT PCRs Done
2,983,607 UART: [art] Populate DV Done
2,991,494 UART: [fht] FMC Alias Private Key: 7
2,992,572 UART: [art] Derive CDI
2,992,852 UART: [art] Store in in slot 0x4
3,078,643 UART: [art] Derive Key Pair
3,079,003 UART: [art] Store priv key in slot 0x5
3,092,253 UART: [art] Derive Key Pair - Done
3,107,009 UART: [art] Signing Cert with AUTHO
3,107,489 UART: RITY.KEYID = 7
3,122,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,540 UART: [art] PUB.X = 1A8F98F0548AFAF8675F1387F4074D622E517B7D587EE4EF56A336C42819442CE1BDB981C9D73ABC07C77D04809C354E
3,130,305 UART: [art] PUB.Y = 80B56D632F6A84A842484149BE62612D264FD1D7377401EB6D6744C85013689EF20CD2D05C75C85EEF9B7A9F54FA59CA
3,137,251 UART: [art] SIG.R = 02A3228F2C6AB64B2842AA0A2ED2576BA62F5E29AD8ACAFF5130AC0F11410204B1C80E97990DFC30BA19A396FC93632F
3,144,012 UART: [art] SIG.S = 0D51E9FA00787B3743DEF7CFC4423619F5CD28C8179D36DBF80BB8AE2DFC992155B25195804E12657D9557924E6E8652
3,167,419 UART: Caliptra RT
3,167,673 UART: [state] CFI Enabled
3,275,525 UART: [rt] RT listening for mailbox commands...
3,276,195 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,040 UART: [rt]cmd =0x44504543, len=92
3,529,925 >>> mbox cmd response data (6284 bytes)
3,529,926 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,441 UART: [rt]cmd =0x43455252, len=4
3,570,185 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 ready_for_fw is high
1,059,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,383 >>> mbox cmd response: success
2,688,901 UART:
2,688,917 UART: Running Caliptra FMC ...
2,689,325 UART:
2,689,379 UART: [state] CFI Enabled
2,699,510 UART: [fht] FMC Alias Private Key: 7
2,807,487 UART: [art] Extend RT PCRs Done
2,807,915 UART: [art] Lock RT PCRs Done
2,809,581 UART: [art] Populate DV Done
2,817,738 UART: [fht] FMC Alias Private Key: 7
2,818,710 UART: [art] Derive CDI
2,818,990 UART: [art] Store in in slot 0x4
2,904,731 UART: [art] Derive Key Pair
2,905,091 UART: [art] Store priv key in slot 0x5
2,918,717 UART: [art] Derive Key Pair - Done
2,933,413 UART: [art] Signing Cert with AUTHO
2,933,893 UART: RITY.KEYID = 7
2,949,399 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,164 UART: [art] PUB.X = 02A05D840649E1AA08AA59EF84F8B2B507B38EC5DB54FCF05605FEC94B44748D7CC53D55090E2A258EC47208DF7EAFAE
2,956,926 UART: [art] PUB.Y = 2F54A3B55271F27481085A4728CF6C0452D37F687B448903F5C9046CB597FCC12B5ED7901855396B07837610C17E8196
2,963,847 UART: [art] SIG.R = 91CEA8CC95C4945D17727F06E881CE3D14B609022BEC1822628F51389A20F10DAC636A8F30DE36700245D53879B570A2
2,970,598 UART: [art] SIG.S = 289785971FE558509D3022B0CDE09C1506B2CE16817BF2DFEE32CAD5DF80B0CA2ADF922C6C9AD1651825D8D3D9160BCF
2,994,237 UART: Caliptra RT
2,994,491 UART: [state] CFI Enabled
3,101,945 UART: [rt] RT listening for mailbox commands...
3,102,615 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,790 UART: [rt]cmd =0x44504543, len=92
3,356,499 >>> mbox cmd response data (6284 bytes)
3,356,500 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,993 UART: [rt]cmd =0x43455252, len=4
3,396,743 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
893,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,354 UART: [kat] ++
897,506 UART: [kat] sha1
901,776 UART: [kat] SHA2-256
903,716 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
918,237 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,172,134 UART: [cold-reset] ++
1,172,530 UART: [fht] FHT @ 0x50003400
1,175,373 UART: [idev] ++
1,175,541 UART: [idev] CDI.KEYID = 6
1,175,901 UART: [idev] SUBJECT.KEYID = 7
1,176,325 UART: [idev] UDS.KEYID = 0
1,176,670 ready_for_fw is high
1,176,670 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,905 UART: [idev] Erasing UDS.KEYID = 0
1,201,080 UART: [idev] Sha1 KeyId Algorithm
1,209,482 UART: [idev] --
1,210,616 UART: [ldev] ++
1,210,784 UART: [ldev] CDI.KEYID = 6
1,211,147 UART: [ldev] SUBJECT.KEYID = 5
1,211,573 UART: [ldev] AUTHORITY.KEYID = 7
1,212,036 UART: [ldev] FE.KEYID = 1
1,217,260 UART: [ldev] Erasing FE.KEYID = 1
1,243,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,582 UART: [ldev] --
1,283,013 UART: [fwproc] Wait for Commands...
1,283,783 UART: [fwproc] Recv command 0x46574c44
1,284,511 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,929 >>> mbox cmd response: success
2,775,025 UART: [afmc] ++
2,775,193 UART: [afmc] CDI.KEYID = 6
2,775,555 UART: [afmc] SUBJECT.KEYID = 7
2,775,980 UART: [afmc] AUTHORITY.KEYID = 5
2,811,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,250 UART: [afmc] --
2,854,150 UART: [cold-reset] --
2,854,818 UART: [state] Locking Datavault
2,856,351 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,955 UART: [state] Locking ICCM
2,857,491 UART: [exit] Launching FMC @ 0x40000130
2,862,820 UART:
2,862,836 UART: Running Caliptra FMC ...
2,863,244 UART:
2,863,387 UART: [state] CFI Enabled
2,874,484 UART: [fht] FMC Alias Private Key: 7
2,982,469 UART: [art] Extend RT PCRs Done
2,982,897 UART: [art] Lock RT PCRs Done
2,984,503 UART: [art] Populate DV Done
2,992,546 UART: [fht] FMC Alias Private Key: 7
2,993,660 UART: [art] Derive CDI
2,993,940 UART: [art] Store in in slot 0x4
3,079,603 UART: [art] Derive Key Pair
3,079,963 UART: [art] Store priv key in slot 0x5
3,092,727 UART: [art] Derive Key Pair - Done
3,107,477 UART: [art] Signing Cert with AUTHO
3,107,957 UART: RITY.KEYID = 7
3,122,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,696 UART: [art] PUB.X = 4398C427ED045915CF9376F07E1D617AAE3853910BC8BC2FC20981F66DEB9216BD57D7F3C9F14400A8511739DCAC0A94
3,130,436 UART: [art] PUB.Y = 5BC4F28421162B823A966D74C5F24E4C073A2DA294301E6596BEA6F12CBB92C09E0908C2270D9D7B5F299791F1CDDD70
3,137,378 UART: [art] SIG.R = B89570297D83293C963FA64141AD5D166A144A4A9402ABFA98D1E302A1076EE8031CF3E17941CD47076947C45E36D62F
3,144,129 UART: [art] SIG.S = 10664ED135C5998A5661EB2A8C06AE890B2BABFDF44704494138D1043A89C3BBEF3654535A088D6072BB0F5CD3E58B5D
3,167,620 UART: Caliptra RT
3,167,966 UART: [state] CFI Enabled
3,275,146 UART: [rt] RT listening for mailbox commands...
3,275,816 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,959 UART: [rt]cmd =0x44504543, len=92
3,530,353 >>> mbox cmd response data (6284 bytes)
3,530,354 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,751 UART: [rt]cmd =0x43455252, len=4
3,570,563 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,400 ready_for_fw is high
1,060,400 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,626 >>> mbox cmd response: success
2,688,120 UART:
2,688,136 UART: Running Caliptra FMC ...
2,688,544 UART:
2,688,687 UART: [state] CFI Enabled
2,699,106 UART: [fht] FMC Alias Private Key: 7
2,807,279 UART: [art] Extend RT PCRs Done
2,807,707 UART: [art] Lock RT PCRs Done
2,809,147 UART: [art] Populate DV Done
2,817,228 UART: [fht] FMC Alias Private Key: 7
2,818,390 UART: [art] Derive CDI
2,818,670 UART: [art] Store in in slot 0x4
2,904,003 UART: [art] Derive Key Pair
2,904,363 UART: [art] Store priv key in slot 0x5
2,917,479 UART: [art] Derive Key Pair - Done
2,932,407 UART: [art] Signing Cert with AUTHO
2,932,887 UART: RITY.KEYID = 7
2,948,135 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,900 UART: [art] PUB.X = 004C34905DBB2B01BAB6FE71F0EB644DCE3D0C34DEC21043B441E22CCD59C61B0B1B1D4132F8B3522A51E63AC4713CB0
2,955,655 UART: [art] PUB.Y = C83AFB6639101A168310EFACD931562DE83725FA862D2C6E9875B051192E5E68B36B58DD87A1DE4C57C1BF7820519D5F
2,962,609 UART: [art] SIG.R = 7C88C09C2C8BE238B24C75754209D4331AEA72BE0F7DC32CE4E5819F53EE2FFC16EC82009000DF32E869AA719DD6B2AC
2,969,343 UART: [art] SIG.S = 69E7BC30C2F38B52108336244017CFDC83B8F00BBEFEED4111B1805578CD5604812318451F6B8D1987C4FD1BF5EA31D1
2,993,424 UART: Caliptra RT
2,993,770 UART: [state] CFI Enabled
3,102,236 UART: [rt] RT listening for mailbox commands...
3,102,906 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,957 UART: [rt]cmd =0x44504543, len=92
3,357,189 >>> mbox cmd response data (6284 bytes)
3,357,190 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,651 UART: [rt]cmd =0x43455252, len=4
3,397,545 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,682 UART: [state] LifecycleState = Unprovisioned
85,337 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,156 UART: [kat] SHA2-256
890,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,835 UART: [kat] ++
894,987 UART: [kat] sha1
899,089 UART: [kat] SHA2-256
901,029 UART: [kat] SHA2-384
903,846 UART: [kat] SHA2-512-ACC
905,747 UART: [kat] ECC-384
915,494 UART: [kat] HMAC-384Kdf
919,936 UART: [kat] LMS
1,168,248 UART: [kat] --
1,168,895 UART: [cold-reset] ++
1,169,347 UART: [fht] FHT @ 0x50003400
1,172,101 UART: [idev] ++
1,172,269 UART: [idev] CDI.KEYID = 6
1,172,630 UART: [idev] SUBJECT.KEYID = 7
1,173,055 UART: [idev] UDS.KEYID = 0
1,173,401 ready_for_fw is high
1,173,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,943 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,206 UART: [ldev] ++
1,208,374 UART: [ldev] CDI.KEYID = 6
1,208,738 UART: [ldev] SUBJECT.KEYID = 5
1,209,165 UART: [ldev] AUTHORITY.KEYID = 7
1,209,628 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,674 UART: [fwproc] Wait for Commands...
1,281,463 UART: [fwproc] Recv command 0x46574c44
1,282,196 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,418 >>> mbox cmd response: success
2,774,477 UART: [afmc] ++
2,774,645 UART: [afmc] CDI.KEYID = 6
2,775,008 UART: [afmc] SUBJECT.KEYID = 7
2,775,434 UART: [afmc] AUTHORITY.KEYID = 5
2,810,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,042 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,771 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,654 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,373 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,086 UART: [afmc] --
2,854,032 UART: [cold-reset] --
2,855,030 UART: [state] Locking Datavault
2,856,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,821 UART: [state] Locking ICCM
2,857,471 UART: [exit] Launching FMC @ 0x40000130
2,862,800 UART:
2,862,816 UART: Running Caliptra FMC ...
2,863,224 UART:
2,863,278 UART: [state] CFI Enabled
2,873,101 UART: [fht] FMC Alias Private Key: 7
2,981,120 UART: [art] Extend RT PCRs Done
2,981,548 UART: [art] Lock RT PCRs Done
2,983,176 UART: [art] Populate DV Done
2,991,297 UART: [fht] FMC Alias Private Key: 7
2,992,297 UART: [art] Derive CDI
2,992,577 UART: [art] Store in in slot 0x4
3,078,120 UART: [art] Derive Key Pair
3,078,480 UART: [art] Store priv key in slot 0x5
3,091,500 UART: [art] Derive Key Pair - Done
3,106,403 UART: [art] Signing Cert with AUTHO
3,106,883 UART: RITY.KEYID = 7
3,122,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,862 UART: [art] PUB.X = 546AF426553975EBB54F86B1DA7F857446C26F8079BA2DBF753740865C111C866AA37CFF1A8D4C91F86EA525CE657025
3,129,634 UART: [art] PUB.Y = AC3F7DCB34BA7BC44971FDDBA64CC71BCA000C77D3EF11011487BF02C8CAD9C239869687E2E6795CBE78B9006A3F207A
3,136,549 UART: [art] SIG.R = D06ECFD05A6DD97BF4175AAD22D3D2BCA48E8BAA96A5786834FDC2BC82ADF49C6364A1DE40915F4A77229E9F315905B8
3,143,334 UART: [art] SIG.S = 500CBF7B413C3D162D39E7742F11E7665C375B5127729EACBC5C32051F782EC2335DA8DF971DE3585DFD3F30AF5488C7
3,166,843 UART: Caliptra RT
3,167,097 UART: [state] CFI Enabled
3,275,271 UART: [rt] RT listening for mailbox commands...
3,275,941 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,938 UART: [rt]cmd =0x44504543, len=92
3,529,859 >>> mbox cmd response data (6284 bytes)
3,529,860 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,987 UART: [rt]cmd =0x43455252, len=4
3,569,945 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,722 ready_for_fw is high
1,056,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,828 >>> mbox cmd response: success
2,685,790 UART:
2,685,806 UART: Running Caliptra FMC ...
2,686,214 UART:
2,686,268 UART: [state] CFI Enabled
2,696,861 UART: [fht] FMC Alias Private Key: 7
2,805,252 UART: [art] Extend RT PCRs Done
2,805,680 UART: [art] Lock RT PCRs Done
2,807,302 UART: [art] Populate DV Done
2,815,557 UART: [fht] FMC Alias Private Key: 7
2,816,611 UART: [art] Derive CDI
2,816,891 UART: [art] Store in in slot 0x4
2,902,296 UART: [art] Derive Key Pair
2,902,656 UART: [art] Store priv key in slot 0x5
2,915,304 UART: [art] Derive Key Pair - Done
2,930,135 UART: [art] Signing Cert with AUTHO
2,930,615 UART: RITY.KEYID = 7
2,945,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,688 UART: [art] PUB.X = CDB688AF06A0E8F1B24686BF9B8E18641ABE42662914B3C64DEFC1CCCB3FBBD2B170C70BAA213020A9AD6AE3A5C73876
2,953,474 UART: [art] PUB.Y = 41CD03BBEB77E2CF60EF88E2ADEC9F0E0DAA8BC629E600513041EB9F875820DD407B927500976C6E68D4B2814E2AE3C2
2,960,385 UART: [art] SIG.R = 5F340C4DDAD50A5A03F5B14F3B107C4CE053E10E9909AC3AEF4C65CE1FCC7FBED4EA82C35C5651CFC1ACF6ADC0640E74
2,967,167 UART: [art] SIG.S = 225ABB227D324D81F89F065B5B2C7CBB53F51836FD9F1E79B32CCB2AD0674A4C9BF2372EDB34A33C5D2AE9734568834C
2,991,453 UART: Caliptra RT
2,991,707 UART: [state] CFI Enabled
3,099,629 UART: [rt] RT listening for mailbox commands...
3,100,299 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,434 UART: [rt]cmd =0x44504543, len=92
3,355,285 >>> mbox cmd response data (6284 bytes)
3,355,286 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,449 UART: [rt]cmd =0x43455252, len=4
3,395,343 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,174,768 ready_for_fw is high
1,174,768 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,610 UART: [idev] Erasing UDS.KEYID = 0
1,199,694 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,973 UART: [fwproc] Wait for Commands...
1,282,740 UART: [fwproc] Recv command 0x46574c44
1,283,473 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,045 >>> mbox cmd response: success
2,772,256 UART: [afmc] ++
2,772,424 UART: [afmc] CDI.KEYID = 6
2,772,787 UART: [afmc] SUBJECT.KEYID = 7
2,773,213 UART: [afmc] AUTHORITY.KEYID = 5
2,809,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,925 UART: [afmc] --
2,852,845 UART: [cold-reset] --
2,853,695 UART: [state] Locking Datavault
2,854,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,544 UART: [state] Locking ICCM
2,856,190 UART: [exit] Launching FMC @ 0x40000130
2,861,519 UART:
2,861,535 UART: Running Caliptra FMC ...
2,861,943 UART:
2,862,086 UART: [state] CFI Enabled
2,872,951 UART: [fht] FMC Alias Private Key: 7
2,981,452 UART: [art] Extend RT PCRs Done
2,981,880 UART: [art] Lock RT PCRs Done
2,983,198 UART: [art] Populate DV Done
2,991,393 UART: [fht] FMC Alias Private Key: 7
2,992,487 UART: [art] Derive CDI
2,992,767 UART: [art] Store in in slot 0x4
3,078,522 UART: [art] Derive Key Pair
3,078,882 UART: [art] Store priv key in slot 0x5
3,091,930 UART: [art] Derive Key Pair - Done
3,106,758 UART: [art] Signing Cert with AUTHO
3,107,238 UART: RITY.KEYID = 7
3,122,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,175 UART: [art] PUB.X = E84240C959A30B9945F79429BD24F40866517F900DC0440DC4706CA4CFAAE61E66205109B7023AE9B65EBC165E173FDD
3,129,929 UART: [art] PUB.Y = 2D4BB465877B769DA6E94D55814E3D60F46A8FA57198693A7EC0AD0310C500A3BA239FC345F684FF74052B35F80E948D
3,136,850 UART: [art] SIG.R = 48E31CA7ED1E83938E482ADC2CF37E9EBD7EFE3B263EA33AB6645D74720251374D75F76DDC09B03E291BBAA048E85F42
3,143,628 UART: [art] SIG.S = 9342FC7E3EC18054AE3199101C7B2BE3313CD4FC102D6DB9D7DDD645D529FC59C15132319E2A15471FB5F5EFFDA2C39A
3,167,669 UART: Caliptra RT
3,168,015 UART: [state] CFI Enabled
3,274,731 UART: [rt] RT listening for mailbox commands...
3,275,401 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,556 UART: [rt]cmd =0x44504543, len=92
3,529,979 >>> mbox cmd response data (6284 bytes)
3,529,980 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,559 UART: [rt]cmd =0x43455252, len=4
3,570,621 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,643 ready_for_fw is high
1,056,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,201 >>> mbox cmd response: success
2,687,231 UART:
2,687,247 UART: Running Caliptra FMC ...
2,687,655 UART:
2,687,798 UART: [state] CFI Enabled
2,698,375 UART: [fht] FMC Alias Private Key: 7
2,805,668 UART: [art] Extend RT PCRs Done
2,806,096 UART: [art] Lock RT PCRs Done
2,807,464 UART: [art] Populate DV Done
2,815,749 UART: [fht] FMC Alias Private Key: 7
2,816,893 UART: [art] Derive CDI
2,817,173 UART: [art] Store in in slot 0x4
2,902,870 UART: [art] Derive Key Pair
2,903,230 UART: [art] Store priv key in slot 0x5
2,917,210 UART: [art] Derive Key Pair - Done
2,931,994 UART: [art] Signing Cert with AUTHO
2,932,474 UART: RITY.KEYID = 7
2,947,636 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,401 UART: [art] PUB.X = D9F4C5BC0FECFD76337B9EA7167F169927B8A3EE55296AD3670EA61EBBA3B083A17A53A6FAD5C7F0C86A05890A134949
2,955,173 UART: [art] PUB.Y = 14789D1630F01F3653E41F78A198903E77D3259813C76888B65626D54B9A206E622FCA0B7B6017C792C2BF0DDEEAFB5F
2,962,117 UART: [art] SIG.R = 8465D9FF0089C409C0513F8BA26DE59A1F194FF48B9C4202AD5DEAFADB7E34FF5927953A8A1689794472A5979230C9CF
2,968,865 UART: [art] SIG.S = 03D7703671253F760C045C9255A23B9183073D70293BC115B9D5E2F3D5EED3DB611FB7AB89181A503AF4FF62DAAC105E
2,992,090 UART: Caliptra RT
2,992,436 UART: [state] CFI Enabled
3,100,486 UART: [rt] RT listening for mailbox commands...
3,101,156 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,217 UART: [rt]cmd =0x44504543, len=92
3,355,287 >>> mbox cmd response data (6284 bytes)
3,355,288 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,583 UART: [rt]cmd =0x43455252, len=4
3,395,391 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,401 UART:
192,794 UART: Running Caliptra ROM ...
193,994 UART:
194,144 UART: [state] CFI Enabled
262,144 UART: [state] LifecycleState = Unprovisioned
264,070 UART: [state] DebugLocked = No
266,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,807 UART: [kat] SHA2-256
440,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,029 UART: [kat] ++
451,509 UART: [kat] sha1
463,227 UART: [kat] SHA2-256
465,946 UART: [kat] SHA2-384
472,141 UART: [kat] SHA2-512-ACC
474,522 UART: [kat] ECC-384
2,766,232 UART: [kat] HMAC-384Kdf
2,799,495 UART: [kat] LMS
3,989,793 UART: [kat] --
3,995,095 UART: [cold-reset] ++
3,997,380 UART: [fht] Storing FHT @ 0x50003400
4,008,421 UART: [idev] ++
4,008,991 UART: [idev] CDI.KEYID = 6
4,009,871 UART: [idev] SUBJECT.KEYID = 7
4,011,108 UART: [idev] UDS.KEYID = 0
4,012,085 ready_for_fw is high
4,012,277 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,686 UART: [idev] Erasing UDS.KEYID = 0
7,343,765 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,525 UART: [idev] --
7,369,400 UART: [ldev] ++
7,370,036 UART: [ldev] CDI.KEYID = 6
7,370,917 UART: [ldev] SUBJECT.KEYID = 5
7,372,173 UART: [ldev] AUTHORITY.KEYID = 7
7,373,451 UART: [ldev] FE.KEYID = 1
7,401,145 UART: [ldev] Erasing FE.KEYID = 1
10,733,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,004 UART: [ldev] --
13,114,787 UART: [fwproc] Waiting for Commands...
13,116,927 UART: [fwproc] Received command 0x46574c44
13,119,103 UART: [fwproc] Received Image of size 114036 bytes
17,174,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,638,572 >>> mbox cmd response: success
17,639,149 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,642,256 UART: [afmc] ++
17,642,891 UART: [afmc] CDI.KEYID = 6
17,643,798 UART: [afmc] SUBJECT.KEYID = 7
17,645,005 UART: [afmc] AUTHORITY.KEYID = 5
21,007,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,118 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,537 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,409 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,800 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,247 UART: [afmc] --
23,375,838 UART: [cold-reset] --
23,380,716 UART: [state] Locking Datavault
23,385,178 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,972 UART: [state] Locking ICCM
23,388,797 UART: [exit] Launching FMC @ 0x40000130
23,397,183 UART:
23,397,409 UART: Running Caliptra FMC ...
23,398,503 UART:
23,398,657 UART: [state] CFI Enabled
23,465,890 UART: [fht] FMC Alias Private Key: 7
25,804,260 UART: [art] Extend RT PCRs Done
25,805,472 UART: [art] Lock RT PCRs Done
25,807,285 UART: [art] Populate DV Done
25,812,793 UART: [fht] FMC Alias Private Key: 7
25,814,319 UART: [art] Derive CDI
25,815,042 UART: [art] Store in in slot 0x4
25,874,156 UART: [art] Derive Key Pair
25,875,192 UART: [art] Store priv key in slot 0x5
29,168,052 UART: [art] Derive Key Pair - Done
29,180,938 UART: [art] Signing Cert with AUTHO
29,182,236 UART: RITY.KEYID = 7
31,468,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,506 UART: [art] PUB.X = F981A580BA81B06B4D7D56009E827E0193EDBE8DD1090C26B84210C2EA54F8AC8E5CFF5B754DB6829403397685C95F43
31,477,752 UART: [art] PUB.Y = C38384132932D8829C42990645DC5ECB4701A6287DA0EF2FF4C5B9AE0D1C3BA2852BF23CA3D38F2D1235E6F3446AB26F
31,485,021 UART: [art] SIG.R = 0D53352A36E0F67377D4714E73C6715ADDFD61F2BE71E2E694705FDE6FD7DCDDC3B7A54D204FDF867934E84D4FC704B2
31,492,403 UART: [art] SIG.S = 94A0EB4B038CE754D2CA4F644F2A356EB82A99EAA6587BF3C7AC23B47DDBDEABBA28B4D7ACE7160056A81D16989A63BD
32,797,957 UART: Caliptra RT
32,798,660 UART: [state] CFI Enabled
32,958,842 UART: [rt] RT listening for mailbox commands...
32,990,511 UART: [rt]cmd =0x44504543, len=92
38,764,297 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,784,929 ready_for_fw is high
3,785,346 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,868,145 >>> mbox cmd response: success
17,868,857 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,566,474 UART:
23,566,851 UART: Running Caliptra FMC ...
23,568,143 UART:
23,568,308 UART: [state] CFI Enabled
23,636,843 UART: [fht] FMC Alias Private Key: 7
25,974,126 UART: [art] Extend RT PCRs Done
25,975,453 UART: [art] Lock RT PCRs Done
25,977,264 UART: [art] Populate DV Done
25,982,605 UART: [fht] FMC Alias Private Key: 7
25,984,299 UART: [art] Derive CDI
25,985,106 UART: [art] Store in in slot 0x4
26,044,771 UART: [art] Derive Key Pair
26,045,815 UART: [art] Store priv key in slot 0x5
29,339,279 UART: [art] Derive Key Pair - Done
29,352,386 UART: [art] Signing Cert with AUTHO
29,353,692 UART: RITY.KEYID = 7
31,641,337 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,831 UART: [art] PUB.X = 4B52610734021C07DFFC977463C674173EC76135D3FBC4CBF59D0369947F2C02C5BBFB2E8B6EE56495E15816AD894411
31,650,072 UART: [art] PUB.Y = FFD5A6E0DAAC95832B4D46D35FEA723A85D86427EDEA7A7DF6A1DCDC124E5CF73804637069AB0625458245797F084B58
31,657,360 UART: [art] SIG.R = 433B5F8047F6C847FF302A7AAAB21353941246FD70623A98CB58618E501AFE3460EFC565F67423110963448843DAC9CD
31,664,687 UART: [art] SIG.S = 9BD52B07EA203CB616EF16D9F47D18294C7089BD7C9F28087A6D3CADB943F1842993B93D4724F2806261134D32F723A7
32,969,691 UART: Caliptra RT
32,970,392 UART: [state] CFI Enabled
33,131,650 UART: [rt] RT listening for mailbox commands...
33,163,432 UART: [rt]cmd =0x44504543, len=92
38,938,956 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,309 UART:
192,678 UART: Running Caliptra ROM ...
193,866 UART:
603,690 UART: [state] CFI Enabled
619,125 UART: [state] LifecycleState = Unprovisioned
621,054 UART: [state] DebugLocked = No
623,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,130 UART: [kat] SHA2-256
798,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,455 UART: [kat] ++
810,090 UART: [kat] sha1
821,544 UART: [kat] SHA2-256
824,197 UART: [kat] SHA2-384
830,990 UART: [kat] SHA2-512-ACC
833,357 UART: [kat] ECC-384
3,116,782 UART: [kat] HMAC-384Kdf
3,128,172 UART: [kat] LMS
4,318,291 UART: [kat] --
4,322,589 UART: [cold-reset] ++
4,324,173 UART: [fht] Storing FHT @ 0x50003400
4,335,013 UART: [idev] ++
4,335,580 UART: [idev] CDI.KEYID = 6
4,336,539 UART: [idev] SUBJECT.KEYID = 7
4,337,778 UART: [idev] UDS.KEYID = 0
4,338,764 ready_for_fw is high
4,338,973 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,254 UART: [idev] Erasing UDS.KEYID = 0
7,630,655 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,653 UART: [idev] --
7,655,373 UART: [ldev] ++
7,655,954 UART: [ldev] CDI.KEYID = 6
7,656,895 UART: [ldev] SUBJECT.KEYID = 5
7,658,101 UART: [ldev] AUTHORITY.KEYID = 7
7,659,384 UART: [ldev] FE.KEYID = 1
7,668,600 UART: [ldev] Erasing FE.KEYID = 1
10,952,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,415 UART: [ldev] --
13,310,998 UART: [fwproc] Waiting for Commands...
13,313,300 UART: [fwproc] Received command 0x46574c44
13,315,476 UART: [fwproc] Received Image of size 114036 bytes
17,369,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,829,059 >>> mbox cmd response: success
17,829,659 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,833,206 UART: [afmc] ++
17,833,794 UART: [afmc] CDI.KEYID = 6
17,834,751 UART: [afmc] SUBJECT.KEYID = 7
17,835,965 UART: [afmc] AUTHORITY.KEYID = 5
21,153,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,045 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,403 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,265 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,729 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,450 UART: [afmc] --
23,521,075 UART: [cold-reset] --
23,524,576 UART: [state] Locking Datavault
23,529,658 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,354 UART: [state] Locking ICCM
23,533,391 UART: [exit] Launching FMC @ 0x40000130
23,541,784 UART:
23,542,015 UART: Running Caliptra FMC ...
23,543,120 UART:
23,543,277 UART: [state] CFI Enabled
23,551,703 UART: [fht] FMC Alias Private Key: 7
25,882,402 UART: [art] Extend RT PCRs Done
25,883,624 UART: [art] Lock RT PCRs Done
25,885,573 UART: [art] Populate DV Done
25,891,046 UART: [fht] FMC Alias Private Key: 7
25,892,625 UART: [art] Derive CDI
25,893,393 UART: [art] Store in in slot 0x4
25,936,307 UART: [art] Derive Key Pair
25,937,327 UART: [art] Store priv key in slot 0x5
29,179,650 UART: [art] Derive Key Pair - Done
29,192,485 UART: [art] Signing Cert with AUTHO
29,193,779 UART: RITY.KEYID = 7
31,473,363 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,872 UART: [art] PUB.X = 8A767EF67D8ECED6EE47A962D617B2DCDD331291F20E1BA29A75B93BBB3391FC3DEE938CE6DC9B4BB2221D4423EDA132
31,482,171 UART: [art] PUB.Y = 355D1E2A711B3D2B269D03A37E5ACADC065AC8D4388ACF7D154032E69A4B9AB7319555D0E23A321800E92952E42D0FEC
31,489,408 UART: [art] SIG.R = 6D9D038EA34C0AEF0B93457FC86BE2775819E5FCA2178C32A3E522725455E64DC88ACF495C1CB757A57260F46F44850C
31,496,795 UART: [art] SIG.S = 692511FA06572375B1B466B027A6BD0B3680CEF5D7085F10C604FF9956F74F75416D633827DE658DCCE781766D488342
32,802,117 UART: Caliptra RT
32,802,825 UART: [state] CFI Enabled
32,919,730 UART: [rt] RT listening for mailbox commands...
32,951,560 UART: [rt]cmd =0x44504543, len=92
38,633,339 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,134,829 ready_for_fw is high
4,135,353 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,079,997 >>> mbox cmd response: success
18,080,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,719,927 UART:
23,720,318 UART: Running Caliptra FMC ...
23,721,444 UART:
23,721,599 UART: [state] CFI Enabled
23,729,589 UART: [fht] FMC Alias Private Key: 7
26,060,886 UART: [art] Extend RT PCRs Done
26,062,302 UART: [art] Lock RT PCRs Done
26,063,840 UART: [art] Populate DV Done
26,069,364 UART: [fht] FMC Alias Private Key: 7
26,070,904 UART: [art] Derive CDI
26,071,722 UART: [art] Store in in slot 0x4
26,114,262 UART: [art] Derive Key Pair
26,115,261 UART: [art] Store priv key in slot 0x5
29,357,697 UART: [art] Derive Key Pair - Done
29,370,315 UART: [art] Signing Cert with AUTHO
29,371,623 UART: RITY.KEYID = 7
31,650,726 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,237 UART: [art] PUB.X = 9CD2959B699B5E994765EA50F26B30F43AE411F65A0CD5052E882C6F9B88D39E0146A3A9F1F42A6DB9E8E3FAA14865F7
31,659,456 UART: [art] PUB.Y = EA01DD1572FF103281761E48A6DB36A53BE6FD137BCDAB1EE9126A2D7C056A97B55D5EA237A130142EAA9ECFA1BF63F6
31,666,755 UART: [art] SIG.R = C0F8AB6B2A365065AEA58EDBF3EEF3F489D1D834AEF308BC22DE52FE0307AE46AAA88E168F6D7010717C97EA7E7BDA7D
31,674,137 UART: [art] SIG.S = 580BD15F87C026EAE02C889768874DFD1B801BBB94AE02F2627B2F8E30B957CB5B06AC0773B0A1B78FC04B65D52FAA0D
32,979,588 UART: Caliptra RT
32,980,323 UART: [state] CFI Enabled
33,097,183 UART: [rt] RT listening for mailbox commands...
33,128,816 UART: [rt]cmd =0x44504543, len=92
38,810,379 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,458 UART:
192,827 UART: Running Caliptra ROM ...
194,028 UART:
194,187 UART: [state] CFI Enabled
268,792 UART: [state] LifecycleState = Unprovisioned
270,722 UART: [state] DebugLocked = No
272,194 UART: [state] WD Timer not started. Device not locked for debugging
275,592 UART: [kat] SHA2-256
454,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,323 UART: [kat] ++
466,867 UART: [kat] sha1
477,748 UART: [kat] SHA2-256
480,758 UART: [kat] SHA2-384
487,173 UART: [kat] SHA2-512-ACC
490,109 UART: [kat] ECC-384
2,948,422 UART: [kat] HMAC-384Kdf
2,970,904 UART: [kat] LMS
3,500,376 UART: [kat] --
3,503,374 UART: [cold-reset] ++
3,504,591 UART: [fht] FHT @ 0x50003400
3,515,707 UART: [idev] ++
3,516,288 UART: [idev] CDI.KEYID = 6
3,517,206 UART: [idev] SUBJECT.KEYID = 7
3,518,383 UART: [idev] UDS.KEYID = 0
3,519,309 ready_for_fw is high
3,519,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,770 UART: [idev] Erasing UDS.KEYID = 0
6,029,981 UART: [idev] Sha1 KeyId Algorithm
6,051,918 UART: [idev] --
6,055,459 UART: [ldev] ++
6,056,040 UART: [ldev] CDI.KEYID = 6
6,056,932 UART: [ldev] SUBJECT.KEYID = 5
6,058,147 UART: [ldev] AUTHORITY.KEYID = 7
6,059,380 UART: [ldev] FE.KEYID = 1
6,103,511 UART: [ldev] Erasing FE.KEYID = 1
8,605,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,295 UART: [ldev] --
10,397,730 UART: [fwproc] Wait for Commands...
10,399,282 UART: [fwproc] Recv command 0x46574c44
10,401,381 UART: [fwproc] Recv'd Img size: 114360 bytes
13,810,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,266,676 >>> mbox cmd response: success
14,267,313 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,270,531 UART: [afmc] ++
14,271,116 UART: [afmc] CDI.KEYID = 6
14,271,996 UART: [afmc] SUBJECT.KEYID = 7
14,273,205 UART: [afmc] AUTHORITY.KEYID = 5
16,804,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,581 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,724 UART: [afmc] --
18,612,186 UART: [cold-reset] --
18,615,246 UART: [state] Locking Datavault
18,619,259 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,906 UART: [state] Locking ICCM
18,623,494 UART: [exit] Launching FMC @ 0x40000130
18,631,888 UART:
18,632,121 UART: Running Caliptra FMC ...
18,633,223 UART:
18,633,381 UART: [state] CFI Enabled
18,692,236 UART: [fht] FMC Alias Private Key: 7
20,456,706 UART: [art] Extend RT PCRs Done
20,457,926 UART: [art] Lock RT PCRs Done
20,459,819 UART: [art] Populate DV Done
20,465,340 UART: [fht] FMC Alias Private Key: 7
20,466,827 UART: [art] Derive CDI
20,467,642 UART: [art] Store in in slot 0x4
20,525,305 UART: [art] Derive Key Pair
20,526,342 UART: [art] Store priv key in slot 0x5
22,989,315 UART: [art] Derive Key Pair - Done
23,002,136 UART: [art] Signing Cert with AUTHO
23,003,476 UART: RITY.KEYID = 7
24,715,152 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,648 UART: [art] PUB.X = 483114FBB8B3C9EC19B9F838FAE9DFED107A38FB68B2D02A945242BE3E4B95D584B37BD7A0F2C9BD063C213B34004B55
24,723,888 UART: [art] PUB.Y = 9289FF770DBDF461020B515A1099B69D590CF64775BC47A2E7C80CE8D17AA9178429DC56715E4A92F257AF9421DE729E
24,731,170 UART: [art] SIG.R = 9DD40C2092922A8632F5DD0EC2AB7004CF8B988C80B79E59BDA1FADB31B18B77191B098C0A2FDA823B01B729313BA4FC
24,738,586 UART: [art] SIG.S = 17A0AFBB1E9F6FCCC80BFBF8D55B5ECF4F3B992E3780087BBF733E29E75D0FBE77D46997512F333CE0893B38CA67AC39
25,717,152 UART: Caliptra RT
25,717,852 UART: [state] CFI Enabled
25,882,381 UART: [rt] RT listening for mailbox commands...
25,914,066 UART: [rt]cmd =0x44504543, len=92
30,260,129 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,528 UART:
192,894 UART: Running Caliptra ROM ...
193,996 UART:
194,140 UART: [state] CFI Enabled
263,538 UART: [state] LifecycleState = Unprovisioned
265,963 UART: [state] DebugLocked = No
267,696 UART: [state] WD Timer not started. Device not locked for debugging
271,650 UART: [kat] SHA2-256
461,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,310 UART: [kat] ++
472,757 UART: [kat] sha1
484,618 UART: [kat] SHA2-256
487,624 UART: [kat] SHA2-384
493,834 UART: [kat] SHA2-512-ACC
496,486 UART: [kat] ECC-384
2,948,214 UART: [kat] HMAC-384Kdf
2,971,326 UART: [kat] LMS
3,503,100 UART: [kat] --
3,507,182 UART: [cold-reset] ++
3,508,275 UART: [fht] FHT @ 0x50003400
3,519,394 UART: [idev] ++
3,520,103 UART: [idev] CDI.KEYID = 6
3,521,095 UART: [idev] SUBJECT.KEYID = 7
3,522,274 UART: [idev] UDS.KEYID = 0
3,523,223 ready_for_fw is high
3,523,413 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,254 UART: [idev] Erasing UDS.KEYID = 0
6,031,008 UART: [idev] Sha1 KeyId Algorithm
6,052,707 UART: [idev] --
6,057,462 UART: [ldev] ++
6,058,145 UART: [ldev] CDI.KEYID = 6
6,059,056 UART: [ldev] SUBJECT.KEYID = 5
6,060,213 UART: [ldev] AUTHORITY.KEYID = 7
6,061,449 UART: [ldev] FE.KEYID = 1
6,100,271 UART: [ldev] Erasing FE.KEYID = 1
8,606,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,420 UART: [ldev] --
10,413,426 UART: [fwproc] Wait for Commands...
10,416,381 UART: [fwproc] Recv command 0x46574c44
10,418,633 UART: [fwproc] Recv'd Img size: 114360 bytes
13,870,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,613,976 >>> mbox cmd response: success
14,614,585 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,618,400 UART: [afmc] ++
14,619,105 UART: [afmc] CDI.KEYID = 6
14,620,296 UART: [afmc] SUBJECT.KEYID = 7
14,621,795 UART: [afmc] AUTHORITY.KEYID = 5
17,148,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,854 UART: [afmc] --
18,945,889 UART: [cold-reset] --
18,949,971 UART: [state] Locking Datavault
18,956,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,796 UART: [state] Locking ICCM
18,961,341 UART: [exit] Launching FMC @ 0x40000130
18,969,966 UART:
18,970,208 UART: Running Caliptra FMC ...
18,971,312 UART:
18,971,476 UART: [state] CFI Enabled
19,030,251 UART: [fht] FMC Alias Private Key: 7
20,793,641 UART: [art] Extend RT PCRs Done
20,794,859 UART: [art] Lock RT PCRs Done
20,796,260 UART: [art] Populate DV Done
20,801,566 UART: [fht] FMC Alias Private Key: 7
20,803,214 UART: [art] Derive CDI
20,804,031 UART: [art] Store in in slot 0x4
20,862,410 UART: [art] Derive Key Pair
20,863,455 UART: [art] Store priv key in slot 0x5
23,326,901 UART: [art] Derive Key Pair - Done
23,339,886 UART: [art] Signing Cert with AUTHO
23,341,184 UART: RITY.KEYID = 7
25,052,603 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,116 UART: [art] PUB.X = CD61C8E66B4D7A3B3482E6D3AD006F777CF4CA60B07C57309B6C96FE57E7DCB21D4765A55E74D90C620DB2D6351905B2
25,061,366 UART: [art] PUB.Y = D574B05F40A6D77B1AE5E4D5898AAF70B0324380FF09607AE2C696FBBBDD5B08E6BD798BDE68CFD290973EC787C7D3EE
25,068,678 UART: [art] SIG.R = 53D685AD837A483001CED70C9DD55BDBF4330AC0F17AB5AA5B602DBD5A772B77A6C83C5BFB1A49C47FC4AB86163E89B0
25,076,077 UART: [art] SIG.S = 1C5CD135874793DF9E98808125538277525B50E6795C7B7AE9DD40FBD399013981450BD4A8976E9B7F23543FCB7F2D8A
26,055,148 UART: Caliptra RT
26,055,835 UART: [state] CFI Enabled
26,220,841 UART: [rt] RT listening for mailbox commands...
26,252,581 UART: [rt]cmd =0x44504543, len=92
30,622,212 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,435,069 ready_for_fw is high
3,435,458 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,732,227 >>> mbox cmd response: success
14,732,866 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,023,659 UART:
19,024,056 UART: Running Caliptra FMC ...
19,025,171 UART:
19,025,327 UART: [state] CFI Enabled
19,091,831 UART: [fht] FMC Alias Private Key: 7
20,855,682 UART: [art] Extend RT PCRs Done
20,856,907 UART: [art] Lock RT PCRs Done
20,858,753 UART: [art] Populate DV Done
20,864,274 UART: [fht] FMC Alias Private Key: 7
20,865,925 UART: [art] Derive CDI
20,866,763 UART: [art] Store in in slot 0x4
20,924,173 UART: [art] Derive Key Pair
20,925,218 UART: [art] Store priv key in slot 0x5
23,387,939 UART: [art] Derive Key Pair - Done
23,400,769 UART: [art] Signing Cert with AUTHO
23,402,085 UART: RITY.KEYID = 7
25,113,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,144 UART: [art] PUB.X = E12183380409A62526DAEC60232FD62E8C23297B5B18174E82C960628F0DD842D6680DB7DF05B818470CE3A42C05A761
25,122,276 UART: [art] PUB.Y = BC97EF36B6B86D2F840753F9CC92595B0573FEC62180C705ECEA82458B0FE550D8A8BE9946D2E49558F2929C69CB820B
25,129,522 UART: [art] SIG.R = F46F4F13EDB15C89AC64FE420C869A420D95875BD8A6B8390A78033D4EA2C74A9E278F3A45FABA718D764D3982D9D338
25,136,907 UART: [art] SIG.S = 1D959BBB95DEB69E62B2138BD744690851C062A0B9A2058382C72F64E572ED5793E81F936828140901B00421FB31BE3A
26,116,555 UART: Caliptra RT
26,117,246 UART: [state] CFI Enabled
26,280,763 UART: [rt] RT listening for mailbox commands...
26,312,507 UART: [rt]cmd =0x44504543, len=92
30,660,191 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,477 UART:
192,848 UART: Running Caliptra ROM ...
194,044 UART:
603,673 UART: [state] CFI Enabled
617,996 UART: [state] LifecycleState = Unprovisioned
620,400 UART: [state] DebugLocked = No
622,082 UART: [state] WD Timer not started. Device not locked for debugging
627,275 UART: [kat] SHA2-256
817,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,905 UART: [kat] ++
828,504 UART: [kat] sha1
840,733 UART: [kat] SHA2-256
843,736 UART: [kat] SHA2-384
851,140 UART: [kat] SHA2-512-ACC
853,716 UART: [kat] ECC-384
3,296,204 UART: [kat] HMAC-384Kdf
3,309,789 UART: [kat] LMS
3,841,638 UART: [kat] --
3,845,938 UART: [cold-reset] ++
3,848,295 UART: [fht] FHT @ 0x50003400
3,859,052 UART: [idev] ++
3,859,762 UART: [idev] CDI.KEYID = 6
3,860,789 UART: [idev] SUBJECT.KEYID = 7
3,861,913 UART: [idev] UDS.KEYID = 0
3,862,843 ready_for_fw is high
3,863,032 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,664 UART: [idev] Erasing UDS.KEYID = 0
6,341,791 UART: [idev] Sha1 KeyId Algorithm
6,365,394 UART: [idev] --
6,369,439 UART: [ldev] ++
6,370,118 UART: [ldev] CDI.KEYID = 6
6,371,025 UART: [ldev] SUBJECT.KEYID = 5
6,372,181 UART: [ldev] AUTHORITY.KEYID = 7
6,373,407 UART: [ldev] FE.KEYID = 1
6,386,198 UART: [ldev] Erasing FE.KEYID = 1
8,865,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,022 UART: [ldev] --
10,652,074 UART: [fwproc] Wait for Commands...
10,653,735 UART: [fwproc] Recv command 0x46574c44
10,656,042 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,409 >>> mbox cmd response: success
14,842,968 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,845,811 UART: [afmc] ++
14,846,510 UART: [afmc] CDI.KEYID = 6
14,847,692 UART: [afmc] SUBJECT.KEYID = 7
14,849,172 UART: [afmc] AUTHORITY.KEYID = 5
17,353,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,423 UART: [afmc] --
19,151,636 UART: [cold-reset] --
19,156,149 UART: [state] Locking Datavault
19,161,072 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,262 UART: [state] Locking ICCM
19,165,010 UART: [exit] Launching FMC @ 0x40000130
19,173,671 UART:
19,173,910 UART: Running Caliptra FMC ...
19,174,931 UART:
19,175,076 UART: [state] CFI Enabled
19,183,089 UART: [fht] FMC Alias Private Key: 7
20,939,617 UART: [art] Extend RT PCRs Done
20,940,850 UART: [art] Lock RT PCRs Done
20,942,554 UART: [art] Populate DV Done
20,948,174 UART: [fht] FMC Alias Private Key: 7
20,949,762 UART: [art] Derive CDI
20,950,573 UART: [art] Store in in slot 0x4
20,992,998 UART: [art] Derive Key Pair
20,993,994 UART: [art] Store priv key in slot 0x5
23,420,449 UART: [art] Derive Key Pair - Done
23,433,064 UART: [art] Signing Cert with AUTHO
23,434,366 UART: RITY.KEYID = 7
25,140,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,559 UART: [art] PUB.X = E795BE57B018EC27AF6CA892AAE0F30D155A3C52057BDDA33E7FDB92F089BBEDBF2D38DD22F99EA3B2F77C644CCBEFCD
25,148,870 UART: [art] PUB.Y = 84D62BD07848CB7837C9BDE3F7E98A0A77B0489B2DF7E425084B5DC9BB12B20AEF993FE8177E8CA32CE9963E0630E409
25,156,163 UART: [art] SIG.R = 00B6FE7022A2E15CCC8408DFF1F51809C70DACD43326B50E835AE1AF044ED1D20969E0DFCA1FB5E3E9A04BB1E19EC3EC
25,163,557 UART: [art] SIG.S = 6A09084F2B10266100E3985FC3FF6BE0EF016A0121CBFB2B1E38E975FA35026504AC6E8D7294FECA7E69D2591A9FE3B8
26,142,214 UART: Caliptra RT
26,142,924 UART: [state] CFI Enabled
26,260,247 UART: [rt] RT listening for mailbox commands...
26,291,978 UART: [rt]cmd =0x44504543, len=92
30,584,768 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
3,755,232 ready_for_fw is high
3,755,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,975,558 >>> mbox cmd response: success
14,976,383 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,228,218 UART:
19,228,601 UART: Running Caliptra FMC ...
19,229,710 UART:
19,229,869 UART: [state] CFI Enabled
19,237,980 UART: [fht] FMC Alias Private Key: 7
20,993,805 UART: [art] Extend RT PCRs Done
20,995,023 UART: [art] Lock RT PCRs Done
20,996,595 UART: [art] Populate DV Done
21,001,896 UART: [fht] FMC Alias Private Key: 7
21,003,408 UART: [art] Derive CDI
21,004,178 UART: [art] Store in in slot 0x4
21,046,517 UART: [art] Derive Key Pair
21,047,558 UART: [art] Store priv key in slot 0x5
23,474,182 UART: [art] Derive Key Pair - Done
23,487,287 UART: [art] Signing Cert with AUTHO
23,488,591 UART: RITY.KEYID = 7
25,194,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,748 UART: [art] PUB.X = 0EFA4E7C080865F43EEE9F89E1E221B2CC81E1B2B27366497334887A502247057C05A8A59FE5268406C04D3E96212F41
25,202,996 UART: [art] PUB.Y = 3EB43D559399A981B33B42C24DF9FCF8D29B97EF3908C474666EECED131AFBB94FC1F4370A56031084590620A9C17C4D
25,210,197 UART: [art] SIG.R = 35DFECD78097F89A9CE3E7D09C98B31730EBA048F564F87C6992D3DF09F625E1C74F7E40B85DFBBE7690BEB7256ED4CC
25,217,641 UART: [art] SIG.S = EF1336FB36F3013B53B685BB60DCD001F5745986D15C9E220E57FAB80FF9CFF709BDA7307D3387A4131906FF3B904D74
26,196,721 UART: Caliptra RT
26,197,405 UART: [state] CFI Enabled
26,315,228 UART: [rt] RT listening for mailbox commands...
26,346,803 UART: [rt]cmd =0x44504543, len=92
30,638,190 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,450 UART: [kat] HMAC-384Kdf
907,042 UART: [kat] LMS
1,475,238 UART: [kat] --
1,476,143 UART: [cold-reset] ++
1,476,559 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 ready_for_fw is high
1,480,875 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,050 UART: [idev] Erasing UDS.KEYID = 0
1,504,234 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,768 UART: [idev] --
1,513,871 UART: [ldev] ++
1,514,039 UART: [ldev] CDI.KEYID = 6
1,514,402 UART: [ldev] SUBJECT.KEYID = 5
1,514,828 UART: [ldev] AUTHORITY.KEYID = 7
1,515,291 UART: [ldev] FE.KEYID = 1
1,520,433 UART: [ldev] Erasing FE.KEYID = 1
1,546,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,198 UART: [ldev] --
1,585,597 UART: [fwproc] Waiting for Commands...
1,586,336 UART: [fwproc] Received command 0x46574c44
1,587,127 UART: [fwproc] Received Image of size 114360 bytes
2,885,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,552 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,771 >>> mbox cmd response: success
3,077,771 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,078,801 UART: [afmc] ++
3,078,969 UART: [afmc] CDI.KEYID = 6
3,079,331 UART: [afmc] SUBJECT.KEYID = 7
3,079,756 UART: [afmc] AUTHORITY.KEYID = 5
3,114,477 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,270 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,960 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,837 UART: [afmc] --
3,157,739 UART: [cold-reset] --
3,158,631 UART: [state] Locking Datavault
3,159,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,344 UART: [state] Locking ICCM
3,160,840 UART: [exit] Launching FMC @ 0x40000130
3,166,169 UART:
3,166,185 UART: Running Caliptra FMC ...
3,166,593 UART:
3,166,647 UART: [state] CFI Enabled
3,176,996 UART: [fht] FMC Alias Private Key: 7
3,284,919 UART: [art] Extend RT PCRs Done
3,285,347 UART: [art] Lock RT PCRs Done
3,286,791 UART: [art] Populate DV Done
3,295,002 UART: [fht] FMC Alias Private Key: 7
3,296,094 UART: [art] Derive CDI
3,296,374 UART: [art] Store in in slot 0x4
3,381,533 UART: [art] Derive Key Pair
3,381,893 UART: [art] Store priv key in slot 0x5
3,395,271 UART: [art] Derive Key Pair - Done
3,409,939 UART: [art] Signing Cert with AUTHO
3,410,419 UART: RITY.KEYID = 7
3,425,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,830 UART: [art] PUB.X = 9A6648DCC7CF8203BFB0FB3E0F629C2B65271DA3F09C08DAF71092DB1A5C85A787D3B7F18D096F7DAB4EC22D92E10EAB
3,432,607 UART: [art] PUB.Y = 6BF7460B22CDE7A03269A334473C485892EC96AB05A82D5C82D5045E1A18FCCB61D662F18113E61A0EE56DF059DB6EBD
3,439,555 UART: [art] SIG.R = ABE125B023B2D694DB499E8B30094BA963BE195361D3D45D4BCC67E53AB413CACE12D9D4C11BD319362FDE7FC1C2F47B
3,446,340 UART: [art] SIG.S = D6DD03B77E629FA65BE89CB24E5B5D11EFAA84DEE34786021EE4693AB39C7A603CC85E53E341D4B33BE798DE2756C919
3,470,261 UART: Caliptra RT
3,470,515 UART: [state] CFI Enabled
3,579,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,319 UART: [rt]cmd =0x44504543, len=92
3,800,939 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,203 ready_for_fw is high
1,363,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,143 >>> mbox cmd response: success
2,928,143 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,989,053 UART:
2,989,069 UART: Running Caliptra FMC ...
2,989,477 UART:
2,989,531 UART: [state] CFI Enabled
2,999,882 UART: [fht] FMC Alias Private Key: 7
3,107,669 UART: [art] Extend RT PCRs Done
3,108,097 UART: [art] Lock RT PCRs Done
3,109,885 UART: [art] Populate DV Done
3,118,226 UART: [fht] FMC Alias Private Key: 7
3,119,250 UART: [art] Derive CDI
3,119,530 UART: [art] Store in in slot 0x4
3,204,917 UART: [art] Derive Key Pair
3,205,277 UART: [art] Store priv key in slot 0x5
3,218,341 UART: [art] Derive Key Pair - Done
3,232,945 UART: [art] Signing Cert with AUTHO
3,233,425 UART: RITY.KEYID = 7
3,248,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,982 UART: [art] PUB.X = E8F2B10CB38B4A5BEFE06F919496C038874413945627C8785A42E64045D43C91568B7B705E1F496CBCCAA036E710F232
3,255,747 UART: [art] PUB.Y = 59788EE90363A72CC76D664347EC9182F3486F38B252F60DD3F174B77FD704D1112FEBBD09142D5187B30CAA57B2F9E8
3,262,684 UART: [art] SIG.R = 2C11CE63E51DD9D0DAF983EAD21D2F9447A8205AB67616FAA51FBAF58F0923E4E2952AAB0A7AA410321A8C348A72E0B7
3,269,464 UART: [art] SIG.S = 3172111119D4C27A6D69EB5AC5092373E067F1E0084095B10499716739D8B61E743BD5EFD7009441DE01B6D222BA8AED
3,293,751 UART: Caliptra RT
3,294,005 UART: [state] CFI Enabled
3,401,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,357 UART: [rt]cmd =0x44504543, len=92
3,622,927 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,476,932 UART: [fht] Storing FHT @ 0x50003400
1,479,681 UART: [idev] ++
1,479,849 UART: [idev] CDI.KEYID = 6
1,480,209 UART: [idev] SUBJECT.KEYID = 7
1,480,633 UART: [idev] UDS.KEYID = 0
1,480,978 ready_for_fw is high
1,480,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,571 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,065 UART: [idev] --
1,514,896 UART: [ldev] ++
1,515,064 UART: [ldev] CDI.KEYID = 6
1,515,427 UART: [ldev] SUBJECT.KEYID = 5
1,515,853 UART: [ldev] AUTHORITY.KEYID = 7
1,516,316 UART: [ldev] FE.KEYID = 1
1,521,562 UART: [ldev] Erasing FE.KEYID = 1
1,546,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,113 UART: [ldev] --
1,586,478 UART: [fwproc] Waiting for Commands...
1,587,155 UART: [fwproc] Received command 0x46574c44
1,587,946 UART: [fwproc] Received Image of size 114360 bytes
2,885,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,147 >>> mbox cmd response: success
3,078,147 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,079,205 UART: [afmc] ++
3,079,373 UART: [afmc] CDI.KEYID = 6
3,079,735 UART: [afmc] SUBJECT.KEYID = 7
3,080,160 UART: [afmc] AUTHORITY.KEYID = 5
3,115,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,056 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,746 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,791 UART: [afmc] --
3,158,891 UART: [cold-reset] --
3,159,705 UART: [state] Locking Datavault
3,160,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,342 UART: [state] Locking ICCM
3,161,910 UART: [exit] Launching FMC @ 0x40000130
3,167,239 UART:
3,167,255 UART: Running Caliptra FMC ...
3,167,663 UART:
3,167,806 UART: [state] CFI Enabled
3,178,571 UART: [fht] FMC Alias Private Key: 7
3,285,794 UART: [art] Extend RT PCRs Done
3,286,222 UART: [art] Lock RT PCRs Done
3,287,610 UART: [art] Populate DV Done
3,295,737 UART: [fht] FMC Alias Private Key: 7
3,296,691 UART: [art] Derive CDI
3,296,971 UART: [art] Store in in slot 0x4
3,382,796 UART: [art] Derive Key Pair
3,383,156 UART: [art] Store priv key in slot 0x5
3,396,122 UART: [art] Derive Key Pair - Done
3,411,054 UART: [art] Signing Cert with AUTHO
3,411,534 UART: RITY.KEYID = 7
3,427,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,045 UART: [art] PUB.X = DF3CCD4F8B15EB7038C7068904A8EE179B0648481057F22E0EB0687E6E8D1B4FE9445B8CC6BCA70F930528AD4A92A553
3,434,805 UART: [art] PUB.Y = E45EA6823C663CDD5F27E3A8A3474A8EA250CECFF6EB38D8B3156CEC63AF64FCC37D3C07760DAFFE93944C0A21BC362D
3,441,770 UART: [art] SIG.R = 9C0210A6224A0A747231B532807963E8EC758180AD4A10B84D654B1B357C8B47846C47C357E6E396B83AB32D31A3A8AB
3,448,530 UART: [art] SIG.S = BC25A9CA44CEC3D2AC7794D3677EFDF0F89C8FA63A0B2045B31231202AB1A05C3B94D56CFD62B5A3A41E23E7A4F5A196
3,472,866 UART: Caliptra RT
3,473,212 UART: [state] CFI Enabled
3,582,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,902 UART: [rt]cmd =0x44504543, len=92
3,805,234 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 ready_for_fw is high
1,362,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,368 >>> mbox cmd response: success
2,926,368 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,988,134 UART:
2,988,150 UART: Running Caliptra FMC ...
2,988,558 UART:
2,988,701 UART: [state] CFI Enabled
2,999,174 UART: [fht] FMC Alias Private Key: 7
3,107,335 UART: [art] Extend RT PCRs Done
3,107,763 UART: [art] Lock RT PCRs Done
3,109,307 UART: [art] Populate DV Done
3,117,820 UART: [fht] FMC Alias Private Key: 7
3,118,968 UART: [art] Derive CDI
3,119,248 UART: [art] Store in in slot 0x4
3,205,067 UART: [art] Derive Key Pair
3,205,427 UART: [art] Store priv key in slot 0x5
3,218,339 UART: [art] Derive Key Pair - Done
3,233,323 UART: [art] Signing Cert with AUTHO
3,233,803 UART: RITY.KEYID = 7
3,248,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,710 UART: [art] PUB.X = 626DAC5E77EFFD0C4F28D945130FDEB2EF8653F76FB8E4A0CC58CFF2E84815922A3E9130F38E71A9A7C8C4FC2E9C2621
3,256,492 UART: [art] PUB.Y = 0572CEC4EF712689B262B2E1656FD5F6F90352F58BB34DD6F83370B3B4702448484F2BC41FC0A6F65AD5C6644A37E704
3,263,435 UART: [art] SIG.R = 7C16AEFAFB6B168D72A078DD13A279DA972B5AD7CC3A65CC9FC2BCA0790A2B5A5EE5651D473A76EC6ADE0D896D1E0E2C
3,270,224 UART: [art] SIG.S = 2095B4E29C92210528B9B57CFC79F3D1C1A79EC245F9A34BA6A1CC79DB7E9DD448A206FE7FC21E65F804AE7F47CE3B9C
3,294,226 UART: Caliptra RT
3,294,572 UART: [state] CFI Enabled
3,402,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,310 UART: [rt]cmd =0x44504543, len=92
3,625,206 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,394 UART: [kat] HMAC-384Kdf
923,038 UART: [kat] LMS
1,171,366 UART: [kat] --
1,172,257 UART: [cold-reset] ++
1,172,795 UART: [fht] FHT @ 0x50003400
1,175,382 UART: [idev] ++
1,175,550 UART: [idev] CDI.KEYID = 6
1,175,910 UART: [idev] SUBJECT.KEYID = 7
1,176,334 UART: [idev] UDS.KEYID = 0
1,176,679 ready_for_fw is high
1,176,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,201,515 UART: [idev] Sha1 KeyId Algorithm
1,209,953 UART: [idev] --
1,211,005 UART: [ldev] ++
1,211,173 UART: [ldev] CDI.KEYID = 6
1,211,536 UART: [ldev] SUBJECT.KEYID = 5
1,211,962 UART: [ldev] AUTHORITY.KEYID = 7
1,212,425 UART: [ldev] FE.KEYID = 1
1,217,565 UART: [ldev] Erasing FE.KEYID = 1
1,244,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,037 UART: [ldev] --
1,283,436 UART: [fwproc] Wait for Commands...
1,284,238 UART: [fwproc] Recv command 0x46574c44
1,284,966 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,782 >>> mbox cmd response: success
2,773,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,924 UART: [afmc] ++
2,775,092 UART: [afmc] CDI.KEYID = 6
2,775,454 UART: [afmc] SUBJECT.KEYID = 7
2,775,879 UART: [afmc] AUTHORITY.KEYID = 5
2,811,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,731 UART: [afmc] --
2,854,621 UART: [cold-reset] --
2,855,547 UART: [state] Locking Datavault
2,856,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,510 UART: [state] Locking ICCM
2,858,164 UART: [exit] Launching FMC @ 0x40000130
2,863,493 UART:
2,863,509 UART: Running Caliptra FMC ...
2,863,917 UART:
2,863,971 UART: [state] CFI Enabled
2,874,460 UART: [fht] FMC Alias Private Key: 7
2,982,745 UART: [art] Extend RT PCRs Done
2,983,173 UART: [art] Lock RT PCRs Done
2,984,671 UART: [art] Populate DV Done
2,992,814 UART: [fht] FMC Alias Private Key: 7
2,993,958 UART: [art] Derive CDI
2,994,238 UART: [art] Store in in slot 0x4
3,079,531 UART: [art] Derive Key Pair
3,079,891 UART: [art] Store priv key in slot 0x5
3,092,481 UART: [art] Derive Key Pair - Done
3,106,839 UART: [art] Signing Cert with AUTHO
3,107,319 UART: RITY.KEYID = 7
3,122,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,610 UART: [art] PUB.X = 72871B845214D8ADED6AC81302F72BA8775F0DB098BE451CC4A34D76F5B5849F5873D87A19E878401653C68778471A9D
3,130,370 UART: [art] PUB.Y = 6FC1C73665AF52AB83C1C712C86BD5CF0AE1D08EC1B40642904381E858A7F71B220B536BD2C0848ACCB4F0287C2A66FD
3,137,323 UART: [art] SIG.R = 25E57877A53EFF7935470C8967F31D91D45D42C44D70773DE6EA42D0C7BCB375C2472B0E20C0051BD951943912D72FF3
3,144,082 UART: [art] SIG.S = B4BF34AE3004D436319FAD070AA575279D7E0A7712B8A0F1BA338D07B440967D6E679B1803A439ED2DCF40B47D09E110
3,167,972 UART: Caliptra RT
3,168,226 UART: [state] CFI Enabled
3,277,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,137 UART: [rt]cmd =0x44504543, len=92
3,499,987 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,063 ready_for_fw is high
1,060,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,851 >>> mbox cmd response: success
2,626,851 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,505 UART:
2,689,521 UART: Running Caliptra FMC ...
2,689,929 UART:
2,689,983 UART: [state] CFI Enabled
2,700,322 UART: [fht] FMC Alias Private Key: 7
2,807,775 UART: [art] Extend RT PCRs Done
2,808,203 UART: [art] Lock RT PCRs Done
2,809,455 UART: [art] Populate DV Done
2,817,618 UART: [fht] FMC Alias Private Key: 7
2,818,660 UART: [art] Derive CDI
2,818,940 UART: [art] Store in in slot 0x4
2,904,589 UART: [art] Derive Key Pair
2,904,949 UART: [art] Store priv key in slot 0x5
2,918,005 UART: [art] Derive Key Pair - Done
2,933,124 UART: [art] Signing Cert with AUTHO
2,933,604 UART: RITY.KEYID = 7
2,949,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,829 UART: [art] PUB.X = F692F5DF2A7FA2BC0A5317C22100F79A729F8E76FD69CDA30B066302E3E32E99519D74BFC96E43BC6B0DC232C3CCDB89
2,956,578 UART: [art] PUB.Y = FCDF2BE3BED9892DE9A6F5B50554237914736595F851795C351838000CC7C95D22B92DF797CCD990AAA5904E77BF7FCA
2,963,508 UART: [art] SIG.R = 9A4FCCB0896C0364584DB9C16CA6CE97F1F84993537F9478DC0FB96845AC018119F2974419F8BD37EFAE7B2262C07A63
2,970,273 UART: [art] SIG.S = 3BF2DF559EFCC4729BF2802B3CDDE07FFA4E01B3F84C2A562D58573E8A2077646F545C82E72230B5D9EC75349E226AE5
2,993,801 UART: Caliptra RT
2,994,055 UART: [state] CFI Enabled
3,101,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,172 UART: [rt]cmd =0x44504543, len=92
3,322,633 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
893,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,068 UART: [kat] ++
898,220 UART: [kat] sha1
902,528 UART: [kat] SHA2-256
904,468 UART: [kat] SHA2-384
907,309 UART: [kat] SHA2-512-ACC
909,210 UART: [kat] ECC-384
918,797 UART: [kat] HMAC-384Kdf
923,509 UART: [kat] LMS
1,171,837 UART: [kat] --
1,173,102 UART: [cold-reset] ++
1,173,480 UART: [fht] FHT @ 0x50003400
1,176,043 UART: [idev] ++
1,176,211 UART: [idev] CDI.KEYID = 6
1,176,571 UART: [idev] SUBJECT.KEYID = 7
1,176,995 UART: [idev] UDS.KEYID = 0
1,177,340 ready_for_fw is high
1,177,340 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,013 UART: [idev] Erasing UDS.KEYID = 0
1,202,634 UART: [idev] Sha1 KeyId Algorithm
1,211,098 UART: [idev] --
1,211,978 UART: [ldev] ++
1,212,146 UART: [ldev] CDI.KEYID = 6
1,212,509 UART: [ldev] SUBJECT.KEYID = 5
1,212,935 UART: [ldev] AUTHORITY.KEYID = 7
1,213,398 UART: [ldev] FE.KEYID = 1
1,218,562 UART: [ldev] Erasing FE.KEYID = 1
1,244,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,578 UART: [ldev] --
1,284,037 UART: [fwproc] Wait for Commands...
1,284,673 UART: [fwproc] Recv command 0x46574c44
1,285,401 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,973 >>> mbox cmd response: success
2,775,973 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,777,091 UART: [afmc] ++
2,777,259 UART: [afmc] CDI.KEYID = 6
2,777,621 UART: [afmc] SUBJECT.KEYID = 7
2,778,046 UART: [afmc] AUTHORITY.KEYID = 5
2,813,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,134 UART: [afmc] --
2,857,260 UART: [cold-reset] --
2,858,024 UART: [state] Locking Datavault
2,859,069 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,673 UART: [state] Locking ICCM
2,860,299 UART: [exit] Launching FMC @ 0x40000130
2,865,628 UART:
2,865,644 UART: Running Caliptra FMC ...
2,866,052 UART:
2,866,195 UART: [state] CFI Enabled
2,877,166 UART: [fht] FMC Alias Private Key: 7
2,985,461 UART: [art] Extend RT PCRs Done
2,985,889 UART: [art] Lock RT PCRs Done
2,987,607 UART: [art] Populate DV Done
2,995,850 UART: [fht] FMC Alias Private Key: 7
2,996,794 UART: [art] Derive CDI
2,997,074 UART: [art] Store in in slot 0x4
3,082,677 UART: [art] Derive Key Pair
3,083,037 UART: [art] Store priv key in slot 0x5
3,096,575 UART: [art] Derive Key Pair - Done
3,111,183 UART: [art] Signing Cert with AUTHO
3,111,663 UART: RITY.KEYID = 7
3,126,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,176 UART: [art] PUB.X = A692197707F55191F7BC76527F5A134DAD8821F7A177156A3DC0D1669E3359498D17CE25D5AC2CB6BEBFDD9A0B0B8CEA
3,133,949 UART: [art] PUB.Y = 9E8B351CFF7F5F097D62E0B9A6572D016B91A4BE2A7775C4D5E5705AE83DD060D2FA847C9083E687FB794B7D0D293C34
3,140,898 UART: [art] SIG.R = B997A11F514ACB8AEC5B987C9089DC98F5302ABD887BF8410C0F4357DA17BE9A304EEC7A3D01FDA3EC5654AE545A92D9
3,147,677 UART: [art] SIG.S = 96C6B5C64B12FFD05D85ED7FC867C1C75A9F4DB2CA7B821BB00C5F82A2AD9E0DE64998D73ABF81E63EC7D0171BB4FD0B
3,171,645 UART: Caliptra RT
3,171,991 UART: [state] CFI Enabled
3,279,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,259 UART: [rt]cmd =0x44504543, len=92
3,502,366 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,006 ready_for_fw is high
1,061,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,200 >>> mbox cmd response: success
2,628,200 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,690,386 UART:
2,690,402 UART: Running Caliptra FMC ...
2,690,810 UART:
2,690,953 UART: [state] CFI Enabled
2,701,574 UART: [fht] FMC Alias Private Key: 7
2,809,699 UART: [art] Extend RT PCRs Done
2,810,127 UART: [art] Lock RT PCRs Done
2,811,533 UART: [art] Populate DV Done
2,819,530 UART: [fht] FMC Alias Private Key: 7
2,820,636 UART: [art] Derive CDI
2,820,916 UART: [art] Store in in slot 0x4
2,906,571 UART: [art] Derive Key Pair
2,906,931 UART: [art] Store priv key in slot 0x5
2,919,433 UART: [art] Derive Key Pair - Done
2,934,170 UART: [art] Signing Cert with AUTHO
2,934,650 UART: RITY.KEYID = 7
2,949,612 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,377 UART: [art] PUB.X = B179F3F3587BFD740DBBD3CA9B12D2136CB14C7E5EDB2452982271A9684E7C1002C2E3969EEC15969EC024CF54F968A8
2,957,149 UART: [art] PUB.Y = 41BFFCFD88876AC7ADDBEEC9673D3857BFA16FAE0724A75248C82570FF559A67A95C54E295DAD46507442B19FFA343C5
2,964,107 UART: [art] SIG.R = 022A5FEC57036143B8253E45A2D1F6CF0CB6FF63AD074CAF0B4D7EE3EE45622DEA251921631D4B07A8A5FE904F235AB6
2,970,873 UART: [art] SIG.S = DA7F13CCFA81177D99C7ED6352811C6DD9C40C4717A3B83F7F23DDCB807161BC371A4BB286B39ECA38EB771AC6428374
2,994,145 UART: Caliptra RT
2,994,491 UART: [state] CFI Enabled
3,102,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,104 UART: [rt]cmd =0x44504543, len=92
3,324,752 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,348 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,313 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,216,102 UART: [ldev] Erasing FE.KEYID = 1
1,242,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,968 UART: [ldev] --
1,282,372 UART: [fwproc] Wait for Commands...
1,283,155 UART: [fwproc] Recv command 0x46574c44
1,283,888 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,450 >>> mbox cmd response: success
2,773,450 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,553 UART: [afmc] ++
2,774,721 UART: [afmc] CDI.KEYID = 6
2,775,084 UART: [afmc] SUBJECT.KEYID = 7
2,775,510 UART: [afmc] AUTHORITY.KEYID = 5
2,810,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,051 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,890 UART: [afmc] --
2,853,852 UART: [cold-reset] --
2,854,546 UART: [state] Locking Datavault
2,855,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,425 UART: [state] Locking ICCM
2,856,857 UART: [exit] Launching FMC @ 0x40000130
2,862,186 UART:
2,862,202 UART: Running Caliptra FMC ...
2,862,610 UART:
2,862,664 UART: [state] CFI Enabled
2,873,101 UART: [fht] FMC Alias Private Key: 7
2,980,870 UART: [art] Extend RT PCRs Done
2,981,298 UART: [art] Lock RT PCRs Done
2,983,006 UART: [art] Populate DV Done
2,990,989 UART: [fht] FMC Alias Private Key: 7
2,992,105 UART: [art] Derive CDI
2,992,385 UART: [art] Store in in slot 0x4
3,077,992 UART: [art] Derive Key Pair
3,078,352 UART: [art] Store priv key in slot 0x5
3,091,940 UART: [art] Derive Key Pair - Done
3,106,918 UART: [art] Signing Cert with AUTHO
3,107,398 UART: RITY.KEYID = 7
3,122,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,103 UART: [art] PUB.X = EB81E26DF9FBBC13E2FE30987259CDB7DFBBF172FB74F667D61B1C85C1740ED744E5DEFE892968ADD1BEE116A42449F4
3,129,892 UART: [art] PUB.Y = 05491A8D141C21D5DCDC08584423D20ABCA1118BD33F5F34444BA7FFBFE04E09F302BAED30820E6FCD2A46EEC3A7B5C9
3,136,844 UART: [art] SIG.R = C84D0040573C888F294AE4DC658B895265BDC81ECDD0DC5E5871C911BA2B143859E683C402AD3BF1784ECE4E1E572FD5
3,143,599 UART: [art] SIG.S = 2355F81E524ECC210BD981AF498DB9E72A059BA4A0D78A4BE05687C8B9181681EDB2114895BB497ADCF284D96089D395
3,167,436 UART: Caliptra RT
3,167,690 UART: [state] CFI Enabled
3,276,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,929 UART: [rt]cmd =0x44504543, len=92
3,498,360 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 ready_for_fw is high
1,056,090 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,754 >>> mbox cmd response: success
2,623,754 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,686,034 UART:
2,686,050 UART: Running Caliptra FMC ...
2,686,458 UART:
2,686,512 UART: [state] CFI Enabled
2,696,847 UART: [fht] FMC Alias Private Key: 7
2,804,928 UART: [art] Extend RT PCRs Done
2,805,356 UART: [art] Lock RT PCRs Done
2,806,792 UART: [art] Populate DV Done
2,815,021 UART: [fht] FMC Alias Private Key: 7
2,816,027 UART: [art] Derive CDI
2,816,307 UART: [art] Store in in slot 0x4
2,901,744 UART: [art] Derive Key Pair
2,902,104 UART: [art] Store priv key in slot 0x5
2,915,232 UART: [art] Derive Key Pair - Done
2,929,860 UART: [art] Signing Cert with AUTHO
2,930,340 UART: RITY.KEYID = 7
2,945,422 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,187 UART: [art] PUB.X = 3422134B2B4EF8033C45EC6550F1A50F0117E0D71EEF695654C670EB6C38C5B415A4590FE3A0A7AC1F559B484652C200
2,952,923 UART: [art] PUB.Y = 71D145E6D91FEEDBD2EA709A77C630B9ADF4F3C8614A4550F29AC8D8E6BB546E7EEA084657F09A74119CE03A636C1EC4
2,959,886 UART: [art] SIG.R = 1D962F92F5CE8950133A33CF0803B525C5435D1777835ADAD1AAD6C4D3F85791B46CA5AFC693F4B69F626EB1DCCAA4D1
2,966,664 UART: [art] SIG.S = F996F71569C33E1AFBB3859D3E003B40E742409DFFCAF29C0DD6A5C5A25717FF89F63B5DB98401331A4E4A8F981DC2EA
2,990,217 UART: Caliptra RT
2,990,471 UART: [state] CFI Enabled
3,097,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,414 UART: [rt]cmd =0x44504543, len=92
3,319,674 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,179 UART: [kat] LMS
1,169,491 UART: [kat] --
1,170,536 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,175,066 ready_for_fw is high
1,175,066 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,873 UART: [ldev] ++
1,210,041 UART: [ldev] CDI.KEYID = 6
1,210,405 UART: [ldev] SUBJECT.KEYID = 5
1,210,832 UART: [ldev] AUTHORITY.KEYID = 7
1,211,295 UART: [ldev] FE.KEYID = 1
1,216,615 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,525 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,539 >>> mbox cmd response: success
2,774,539 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,775,750 UART: [afmc] ++
2,775,918 UART: [afmc] CDI.KEYID = 6
2,776,281 UART: [afmc] SUBJECT.KEYID = 7
2,776,707 UART: [afmc] AUTHORITY.KEYID = 5
2,812,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,797 UART: [afmc] --
2,855,851 UART: [cold-reset] --
2,856,825 UART: [state] Locking Datavault
2,857,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,570 UART: [state] Locking ICCM
2,859,208 UART: [exit] Launching FMC @ 0x40000130
2,864,537 UART:
2,864,553 UART: Running Caliptra FMC ...
2,864,961 UART:
2,865,104 UART: [state] CFI Enabled
2,876,047 UART: [fht] FMC Alias Private Key: 7
2,984,036 UART: [art] Extend RT PCRs Done
2,984,464 UART: [art] Lock RT PCRs Done
2,985,916 UART: [art] Populate DV Done
2,994,015 UART: [fht] FMC Alias Private Key: 7
2,995,157 UART: [art] Derive CDI
2,995,437 UART: [art] Store in in slot 0x4
3,081,112 UART: [art] Derive Key Pair
3,081,472 UART: [art] Store priv key in slot 0x5
3,095,646 UART: [art] Derive Key Pair - Done
3,110,103 UART: [art] Signing Cert with AUTHO
3,110,583 UART: RITY.KEYID = 7
3,125,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,586 UART: [art] PUB.X = C9E5016F9CF15DE92FE0959762608A8E4D6C4DE7E47E72A5E6E8F4FB1A670581AD889022258AEB86F2F41E2FAE23F6A1
3,133,362 UART: [art] PUB.Y = AF72E6F85F4FD104C6A1C638CF46C16ECE9E07D0C36E63543C573CAB8653178BBAD17DEC361AD23E13EF18CF67A3EFB2
3,140,328 UART: [art] SIG.R = 1646EDA33DAB513048EE54C596CD5D9EAAC1C8A54F7A23BA257AA2FB7016D4D12B55D32C97CE005DE863CFFE06779227
3,147,089 UART: [art] SIG.S = 8315E62CDA8EFED13B955B25CD0B534A3E2C721AF95B029A43538D05E9B05FA6E28E1B80D32495992ED806034F3B3447
3,170,773 UART: Caliptra RT
3,171,119 UART: [state] CFI Enabled
3,279,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,902 UART: [rt]cmd =0x44504543, len=92
3,501,943 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,913 ready_for_fw is high
1,055,913 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,133 >>> mbox cmd response: success
2,623,133 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,849 UART:
2,685,865 UART: Running Caliptra FMC ...
2,686,273 UART:
2,686,416 UART: [state] CFI Enabled
2,696,649 UART: [fht] FMC Alias Private Key: 7
2,804,204 UART: [art] Extend RT PCRs Done
2,804,632 UART: [art] Lock RT PCRs Done
2,806,526 UART: [art] Populate DV Done
2,814,485 UART: [fht] FMC Alias Private Key: 7
2,815,425 UART: [art] Derive CDI
2,815,705 UART: [art] Store in in slot 0x4
2,901,356 UART: [art] Derive Key Pair
2,901,716 UART: [art] Store priv key in slot 0x5
2,914,738 UART: [art] Derive Key Pair - Done
2,929,630 UART: [art] Signing Cert with AUTHO
2,930,110 UART: RITY.KEYID = 7
2,945,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,329 UART: [art] PUB.X = 53DBB1EE00BDC1EA855CCAC9CF3A6E7938E033DCF878EDFDFA34904BE3E1E2EB6D4D6512216F9DCFB541E5F5C2882B97
2,953,105 UART: [art] PUB.Y = 14E70D33AB9510A43D85104CB174170675D1F76A0084E3596923F4E937AEFAD5F91E1346A06C7BB28A0DD1B0DFB66D42
2,960,028 UART: [art] SIG.R = E83F91E09B00FA0426F36F6FE9CD812AA87EC9B368F6BA186AA1F0D816708F918C9BF6C9D4427A5B551AA44655C448A0
2,966,783 UART: [art] SIG.S = 5041E7CA901C7DC3EC5F6E05807B523C58F801DFB8C403FF80D92980C2A2758E9E8EA902D83A6AEC4BACC657B6E5C51E
2,990,400 UART: Caliptra RT
2,990,746 UART: [state] CFI Enabled
3,098,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,601 UART: [rt]cmd =0x44504543, len=92
3,321,342 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,387 UART:
192,763 UART: Running Caliptra ROM ...
193,896 UART:
194,035 UART: [state] CFI Enabled
265,378 UART: [state] LifecycleState = Unprovisioned
267,358 UART: [state] DebugLocked = No
269,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,103 UART: [kat] SHA2-256
443,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,313 UART: [kat] ++
454,753 UART: [kat] sha1
466,325 UART: [kat] SHA2-256
468,966 UART: [kat] SHA2-384
475,299 UART: [kat] SHA2-512-ACC
477,663 UART: [kat] ECC-384
2,765,806 UART: [kat] HMAC-384Kdf
2,778,388 UART: [kat] LMS
3,968,737 UART: [kat] --
3,972,819 UART: [cold-reset] ++
3,974,317 UART: [fht] Storing FHT @ 0x50003400
3,984,670 UART: [idev] ++
3,985,237 UART: [idev] CDI.KEYID = 6
3,986,262 UART: [idev] SUBJECT.KEYID = 7
3,987,430 UART: [idev] UDS.KEYID = 0
3,988,452 ready_for_fw is high
3,988,649 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,132,064 UART: [idev] Erasing UDS.KEYID = 0
7,326,370 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,417 UART: [idev] --
7,353,779 UART: [ldev] ++
7,354,341 UART: [ldev] CDI.KEYID = 6
7,355,274 UART: [ldev] SUBJECT.KEYID = 5
7,356,531 UART: [ldev] AUTHORITY.KEYID = 7
7,357,757 UART: [ldev] FE.KEYID = 1
7,400,678 UART: [ldev] Erasing FE.KEYID = 1
10,735,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,339 UART: [ldev] --
13,114,846 UART: [fwproc] Waiting for Commands...
13,116,718 UART: [fwproc] Received command 0x46574c44
13,118,944 UART: [fwproc] Received Image of size 114036 bytes
17,169,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,883 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,428 >>> mbox cmd response: success
17,634,539 UART: [afmc] ++
17,635,128 UART: [afmc] CDI.KEYID = 6
17,636,144 UART: [afmc] SUBJECT.KEYID = 7
17,637,300 UART: [afmc] AUTHORITY.KEYID = 5
21,002,397 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,874 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,301 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,110 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,554 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,310 UART: [afmc] --
23,374,490 UART: [cold-reset] --
23,379,208 UART: [state] Locking Datavault
23,384,567 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,262 UART: [state] Locking ICCM
23,388,678 UART: [exit] Launching FMC @ 0x40000130
23,397,071 UART:
23,397,311 UART: Running Caliptra FMC ...
23,398,407 UART:
23,398,561 UART: [state] CFI Enabled
23,465,977 UART: [fht] FMC Alias Private Key: 7
25,803,916 UART: [art] Extend RT PCRs Done
25,805,139 UART: [art] Lock RT PCRs Done
25,806,867 UART: [art] Populate DV Done
25,812,010 UART: [fht] FMC Alias Private Key: 7
25,813,659 UART: [art] Derive CDI
25,814,470 UART: [art] Store in in slot 0x4
25,874,530 UART: [art] Derive Key Pair
25,875,521 UART: [art] Store priv key in slot 0x5
29,168,289 UART: [art] Derive Key Pair - Done
29,181,611 UART: [art] Signing Cert with AUTHO
29,182,903 UART: RITY.KEYID = 7
31,470,484 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,988 UART: [art] PUB.X = 2395D28A48D345EDE90E0E081EC4746230CA78A2B9FC14AD6FE8FA97E958F213822E32D003E5B5DF5B350CCD05C09290
31,479,446 UART: [art] PUB.Y = 1183D801FFA80FF2312447A4BF91F0E0EE3086B7AB2F76AEF67C9A05E4969F7B43996A5264A689858BFE552EE9C45F0F
31,486,543 UART: [art] SIG.R = DD8828D88F128982AA50F2107BA5446F96A0ACE630B23826D4E979E3D4325DD9F455AE2AABE534D390E0D7D130F9A7F3
31,493,929 UART: [art] SIG.S = 47BAEE16A86AB52AD8660F1C7FE71BDBCE1FC4B7A19906A71E22D6943A05749F8F5F7A4BD9F6EC53EB2614A7FB3DCB5B
32,799,664 UART: Caliptra RT
32,800,383 UART: [state] CFI Enabled
32,979,778 UART: [rt] RT listening for mailbox commands...
32,981,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,012,014 UART: [rt]cmd =0x44504543, len=96
38,783,884 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,805,136 ready_for_fw is high
3,805,528 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,875,062 >>> mbox cmd response: success
23,567,878 UART:
23,568,258 UART: Running Caliptra FMC ...
23,569,448 UART:
23,569,608 UART: [state] CFI Enabled
23,637,419 UART: [fht] FMC Alias Private Key: 7
25,976,067 UART: [art] Extend RT PCRs Done
25,977,292 UART: [art] Lock RT PCRs Done
25,978,853 UART: [art] Populate DV Done
25,984,305 UART: [fht] FMC Alias Private Key: 7
25,985,893 UART: [art] Derive CDI
25,986,698 UART: [art] Store in in slot 0x4
26,046,331 UART: [art] Derive Key Pair
26,047,369 UART: [art] Store priv key in slot 0x5
29,340,177 UART: [art] Derive Key Pair - Done
29,352,956 UART: [art] Signing Cert with AUTHO
29,354,258 UART: RITY.KEYID = 7
31,641,344 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,854 UART: [art] PUB.X = 8B20862B6E8B971079BC34EA1B7123E137A577671973C5C9E16489F1D7FFDF6C20436E3B2B4BB70E49FBEE55E0F05C6D
31,650,125 UART: [art] PUB.Y = 5E781E334D636DDF4291B94B4C4103E9C9B584DE33AB5154121421F0413B7F1D620144D171771A31D9D4A0DC60F49356
31,657,317 UART: [art] SIG.R = F75F7684B0DB3777881A4D87E00DFB2D1FED72E16EABDCAFEE5F9BAA27B6B961EF01A8D5EE4FD81657A00681AB497773
31,664,738 UART: [art] SIG.S = 978448283BB9EE01377CD01704EC8BDD271810D657D07FA52CE8B2128201541173A4501D84A3F6401ADA8C09094F8FBC
32,969,844 UART: Caliptra RT
32,970,544 UART: [state] CFI Enabled
33,130,745 UART: [rt] RT listening for mailbox commands...
33,132,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,163,271 UART: [rt]cmd =0x44504543, len=96
38,935,310 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,677 UART:
193,034 UART: Running Caliptra ROM ...
194,228 UART:
603,754 UART: [state] CFI Enabled
618,495 UART: [state] LifecycleState = Unprovisioned
620,477 UART: [state] DebugLocked = No
621,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,530 UART: [kat] SHA2-256
796,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,861 UART: [kat] ++
807,341 UART: [kat] sha1
818,998 UART: [kat] SHA2-256
821,724 UART: [kat] SHA2-384
826,506 UART: [kat] SHA2-512-ACC
828,876 UART: [kat] ECC-384
3,112,516 UART: [kat] HMAC-384Kdf
3,124,389 UART: [kat] LMS
4,314,550 UART: [kat] --
4,318,146 UART: [cold-reset] ++
4,319,311 UART: [fht] Storing FHT @ 0x50003400
4,331,290 UART: [idev] ++
4,331,851 UART: [idev] CDI.KEYID = 6
4,332,830 UART: [idev] SUBJECT.KEYID = 7
4,334,072 UART: [idev] UDS.KEYID = 0
4,335,081 ready_for_fw is high
4,335,281 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,502 UART: [idev] Erasing UDS.KEYID = 0
7,622,858 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,179 UART: [idev] --
7,648,815 UART: [ldev] ++
7,649,381 UART: [ldev] CDI.KEYID = 6
7,650,317 UART: [ldev] SUBJECT.KEYID = 5
7,651,522 UART: [ldev] AUTHORITY.KEYID = 7
7,652,801 UART: [ldev] FE.KEYID = 1
7,662,676 UART: [ldev] Erasing FE.KEYID = 1
10,952,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,879 UART: [ldev] --
13,310,928 UART: [fwproc] Waiting for Commands...
13,312,910 UART: [fwproc] Received command 0x46574c44
13,315,097 UART: [fwproc] Received Image of size 114036 bytes
17,370,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,609 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,495 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,832,069 >>> mbox cmd response: success
17,835,596 UART: [afmc] ++
17,836,188 UART: [afmc] CDI.KEYID = 6
17,837,100 UART: [afmc] SUBJECT.KEYID = 7
17,838,379 UART: [afmc] AUTHORITY.KEYID = 5
21,153,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,906 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,292 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,119 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,586 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,508 UART: [afmc] --
23,519,616 UART: [cold-reset] --
23,522,829 UART: [state] Locking Datavault
23,527,643 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,401 UART: [state] Locking ICCM
23,530,734 UART: [exit] Launching FMC @ 0x40000130
23,539,130 UART:
23,539,363 UART: Running Caliptra FMC ...
23,540,463 UART:
23,540,620 UART: [state] CFI Enabled
23,548,531 UART: [fht] FMC Alias Private Key: 7
25,879,263 UART: [art] Extend RT PCRs Done
25,880,480 UART: [art] Lock RT PCRs Done
25,881,942 UART: [art] Populate DV Done
25,887,318 UART: [fht] FMC Alias Private Key: 7
25,888,859 UART: [art] Derive CDI
25,889,624 UART: [art] Store in in slot 0x4
25,932,054 UART: [art] Derive Key Pair
25,933,090 UART: [art] Store priv key in slot 0x5
29,174,922 UART: [art] Derive Key Pair - Done
29,187,813 UART: [art] Signing Cert with AUTHO
29,189,115 UART: RITY.KEYID = 7
31,468,515 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,016 UART: [art] PUB.X = A97B80C56F1C129DD4C6D363A67C1C8A18E22211177D894CA6458E7D0EC507D4B94064CEE93B583A13729EDEC01C3578
31,477,259 UART: [art] PUB.Y = 699AD094DC036B998B038ACC51CC647254988992A5E42526D11255CE269B960250391D79C9C9516F35063BE71493B225
31,484,468 UART: [art] SIG.R = 6AA688A90231C9997BCB62C206FB01DE24EB8CFC553FECD5B4914EC6B998A28022408B95D2DA17EC7BACD737FF03E89E
31,491,863 UART: [art] SIG.S = 30AA2C4D954E9282B9B3B284CFAF15CB3C991BDF1E045C6A41A02E950B16DFEAC61B407FCEC50D5172C774AE642C1A8E
32,796,730 UART: Caliptra RT
32,797,443 UART: [state] CFI Enabled
32,914,670 UART: [rt] RT listening for mailbox commands...
32,916,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,947,286 UART: [rt]cmd =0x44504543, len=96
38,628,022 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
4,128,831 ready_for_fw is high
4,129,488 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,080,348 >>> mbox cmd response: success
23,720,716 UART:
23,721,183 UART: Running Caliptra FMC ...
23,722,292 UART:
23,722,463 UART: [state] CFI Enabled
23,730,275 UART: [fht] FMC Alias Private Key: 7
26,060,276 UART: [art] Extend RT PCRs Done
26,061,500 UART: [art] Lock RT PCRs Done
26,063,186 UART: [art] Populate DV Done
26,068,553 UART: [fht] FMC Alias Private Key: 7
26,070,213 UART: [art] Derive CDI
26,071,047 UART: [art] Store in in slot 0x4
26,113,493 UART: [art] Derive Key Pair
26,114,493 UART: [art] Store priv key in slot 0x5
29,356,754 UART: [art] Derive Key Pair - Done
29,369,759 UART: [art] Signing Cert with AUTHO
29,371,059 UART: RITY.KEYID = 7
31,650,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,007 UART: [art] PUB.X = 683E0566FDE5F734997AA0665755D7A74C3BB892C0B9CCEBB22A35BBFE4EC59A4987BA140E0DE6EEEA3B511061F137B1
31,659,296 UART: [art] PUB.Y = F9FC652DD065B2752501BFCF80D59F6AFC0F25D8E003FC8090392473CC440025728313024945E52C414BB46E1F0C7C1B
31,666,495 UART: [art] SIG.R = A697C1B93E83325EB1573823D6608A1AE6DFA2CDDFF90ADD7FCE35BD52EEBE312EEC71CDB2B33B9C0C5BD54A440675ED
31,673,918 UART: [art] SIG.S = F1C9CF9161F2B1C6521731885D5745A26CB25CD03B34BEDACB898E8BBCFD3E74A7533E122C917396DCE758B4920523B0
32,979,175 UART: Caliptra RT
32,979,885 UART: [state] CFI Enabled
33,097,413 UART: [rt] RT listening for mailbox commands...
33,099,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,130,001 UART: [rt]cmd =0x44504543, len=96
38,809,315 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,455 UART:
192,853 UART: Running Caliptra ROM ...
194,005 UART:
194,162 UART: [state] CFI Enabled
264,398 UART: [state] LifecycleState = Unprovisioned
266,315 UART: [state] DebugLocked = No
268,140 UART: [state] WD Timer not started. Device not locked for debugging
271,890 UART: [kat] SHA2-256
450,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,568 UART: [kat] ++
463,106 UART: [kat] sha1
472,789 UART: [kat] SHA2-256
475,814 UART: [kat] SHA2-384
480,813 UART: [kat] SHA2-512-ACC
483,751 UART: [kat] ECC-384
2,924,986 UART: [kat] HMAC-384Kdf
2,949,938 UART: [kat] LMS
3,479,380 UART: [kat] --
3,483,955 UART: [cold-reset] ++
3,484,855 UART: [fht] FHT @ 0x50003400
3,496,201 UART: [idev] ++
3,496,771 UART: [idev] CDI.KEYID = 6
3,497,679 UART: [idev] SUBJECT.KEYID = 7
3,498,854 UART: [idev] UDS.KEYID = 0
3,499,902 ready_for_fw is high
3,500,096 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,643,919 UART: [idev] Erasing UDS.KEYID = 0
6,004,775 UART: [idev] Sha1 KeyId Algorithm
6,027,918 UART: [idev] --
6,030,622 UART: [ldev] ++
6,031,200 UART: [ldev] CDI.KEYID = 6
6,032,116 UART: [ldev] SUBJECT.KEYID = 5
6,033,277 UART: [ldev] AUTHORITY.KEYID = 7
6,034,565 UART: [ldev] FE.KEYID = 1
6,077,795 UART: [ldev] Erasing FE.KEYID = 1
8,583,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,491 UART: [ldev] --
10,392,028 UART: [fwproc] Wait for Commands...
10,394,504 UART: [fwproc] Recv command 0x46574c44
10,396,545 UART: [fwproc] Recv'd Img size: 114360 bytes
13,799,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,264,997 >>> mbox cmd response: success
14,270,097 UART: [afmc] ++
14,270,702 UART: [afmc] CDI.KEYID = 6
14,271,589 UART: [afmc] SUBJECT.KEYID = 7
14,272,807 UART: [afmc] AUTHORITY.KEYID = 5
16,810,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,665 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,465 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,585,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,508 UART: [afmc] --
18,611,470 UART: [cold-reset] --
18,616,220 UART: [state] Locking Datavault
18,622,549 UART: [state] Locking PCR0, PCR1 and PCR31
18,624,204 UART: [state] Locking ICCM
18,625,759 UART: [exit] Launching FMC @ 0x40000130
18,634,215 UART:
18,634,452 UART: Running Caliptra FMC ...
18,635,556 UART:
18,635,718 UART: [state] CFI Enabled
18,693,120 UART: [fht] FMC Alias Private Key: 7
20,457,222 UART: [art] Extend RT PCRs Done
20,458,632 UART: [art] Lock RT PCRs Done
20,459,908 UART: [art] Populate DV Done
20,465,399 UART: [fht] FMC Alias Private Key: 7
20,467,052 UART: [art] Derive CDI
20,467,796 UART: [art] Store in in slot 0x4
20,525,774 UART: [art] Derive Key Pair
20,526,839 UART: [art] Store priv key in slot 0x5
22,989,586 UART: [art] Derive Key Pair - Done
23,002,582 UART: [art] Signing Cert with AUTHO
23,004,072 UART: RITY.KEYID = 7
24,715,547 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,062 UART: [art] PUB.X = DA96A74A90E73CCE7861870E7BE9F49BCAA7F84551FE05FE6B72E1DC2FA294FB0948CFEA38F6D8595C0ADB242EF1CE62
24,724,320 UART: [art] PUB.Y = 97E2301A2EC06A95D33EA6603378F5F6580605DC79637A26D4E0454CD999E8B2D37870B3ECC184534B17C09E8A6DCD0D
24,731,590 UART: [art] SIG.R = 6E7AFF6379AAFD72919061690320BE3E0BC9E5B5FFB301735F9D87936B42B92C128F32A3A43CD660BDB9A90278F6B748
24,738,979 UART: [art] SIG.S = 1E4D99C6EA91116C6692C6B731344CDE2CD8994890A262B85CE53C255C69380F1572555DD34754683141FED19C7C9A51
25,717,845 UART: Caliptra RT
25,718,552 UART: [state] CFI Enabled
25,883,399 UART: [rt] RT listening for mailbox commands...
25,885,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,916,079 UART: [rt]cmd =0x44504543, len=96
30,282,578 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,452 UART:
192,826 UART: Running Caliptra ROM ...
193,977 UART:
194,130 UART: [state] CFI Enabled
267,009 UART: [state] LifecycleState = Unprovisioned
269,434 UART: [state] DebugLocked = No
272,110 UART: [state] WD Timer not started. Device not locked for debugging
277,001 UART: [kat] SHA2-256
466,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,659 UART: [kat] ++
478,148 UART: [kat] sha1
488,242 UART: [kat] SHA2-256
491,317 UART: [kat] SHA2-384
495,813 UART: [kat] SHA2-512-ACC
498,394 UART: [kat] ECC-384
2,948,670 UART: [kat] HMAC-384Kdf
2,970,498 UART: [kat] LMS
3,502,251 UART: [kat] --
3,504,892 UART: [cold-reset] ++
3,506,465 UART: [fht] FHT @ 0x50003400
3,518,231 UART: [idev] ++
3,518,932 UART: [idev] CDI.KEYID = 6
3,519,881 UART: [idev] SUBJECT.KEYID = 7
3,521,050 UART: [idev] UDS.KEYID = 0
3,521,955 ready_for_fw is high
3,522,140 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,977 UART: [idev] Erasing UDS.KEYID = 0
6,031,176 UART: [idev] Sha1 KeyId Algorithm
6,053,694 UART: [idev] --
6,057,641 UART: [ldev] ++
6,058,328 UART: [ldev] CDI.KEYID = 6
6,059,277 UART: [ldev] SUBJECT.KEYID = 5
6,060,382 UART: [ldev] AUTHORITY.KEYID = 7
6,061,614 UART: [ldev] FE.KEYID = 1
6,099,702 UART: [ldev] Erasing FE.KEYID = 1
8,606,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,722 UART: [ldev] --
10,415,205 UART: [fwproc] Wait for Commands...
10,417,458 UART: [fwproc] Recv command 0x46574c44
10,419,768 UART: [fwproc] Recv'd Img size: 114360 bytes
13,866,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,313 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,599,650 >>> mbox cmd response: success
14,603,210 UART: [afmc] ++
14,603,936 UART: [afmc] CDI.KEYID = 6
14,605,128 UART: [afmc] SUBJECT.KEYID = 7
14,606,568 UART: [afmc] AUTHORITY.KEYID = 5
17,146,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,618 UART: [afmc] --
18,948,809 UART: [cold-reset] --
18,953,270 UART: [state] Locking Datavault
18,958,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,619 UART: [state] Locking ICCM
18,963,173 UART: [exit] Launching FMC @ 0x40000130
18,971,851 UART:
18,972,088 UART: Running Caliptra FMC ...
18,973,194 UART:
18,973,355 UART: [state] CFI Enabled
19,031,578 UART: [fht] FMC Alias Private Key: 7
20,795,403 UART: [art] Extend RT PCRs Done
20,796,676 UART: [art] Lock RT PCRs Done
20,798,220 UART: [art] Populate DV Done
20,803,737 UART: [fht] FMC Alias Private Key: 7
20,805,279 UART: [art] Derive CDI
20,806,093 UART: [art] Store in in slot 0x4
20,864,987 UART: [art] Derive Key Pair
20,866,029 UART: [art] Store priv key in slot 0x5
23,329,421 UART: [art] Derive Key Pair - Done
23,342,356 UART: [art] Signing Cert with AUTHO
23,343,673 UART: RITY.KEYID = 7
25,055,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,625 UART: [art] PUB.X = E29171AB64172DEE24F6E33D9C55BC74A1C15F5B9C735F7A1288BB991912869BFA4143812C2D2DF3100D479E422626FC
25,063,879 UART: [art] PUB.Y = 61AC274058E369CF46F135D807C4D1DE58765B279630F17F7DE357741DE6C6D8CC3864C4C5FF69C80EFF737A68D18158
25,071,114 UART: [art] SIG.R = 55C2DC907946B29D78A9A4DD4BEDF597FBDE1BFAAA96CAEB04708748C1B909F079EEE551AB56F83290D337E6DD4EDC35
25,078,548 UART: [art] SIG.S = 81F57D0D009212CE3C39A54369BA77FBFD68249CFE3623BB989EAED50938BBE10C61638A26A8C29635525961A9EC84AE
26,058,196 UART: Caliptra RT
26,058,909 UART: [state] CFI Enabled
26,223,109 UART: [rt] RT listening for mailbox commands...
26,225,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,659 UART: [rt]cmd =0x44504543, len=96
30,621,992 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,440,264 ready_for_fw is high
3,440,669 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,760,960 >>> mbox cmd response: success
19,045,519 UART:
19,045,940 UART: Running Caliptra FMC ...
19,047,086 UART:
19,047,254 UART: [state] CFI Enabled
19,115,412 UART: [fht] FMC Alias Private Key: 7
20,878,942 UART: [art] Extend RT PCRs Done
20,880,147 UART: [art] Lock RT PCRs Done
20,882,092 UART: [art] Populate DV Done
20,887,515 UART: [fht] FMC Alias Private Key: 7
20,889,122 UART: [art] Derive CDI
20,889,944 UART: [art] Store in in slot 0x4
20,947,849 UART: [art] Derive Key Pair
20,948,883 UART: [art] Store priv key in slot 0x5
23,412,090 UART: [art] Derive Key Pair - Done
23,425,103 UART: [art] Signing Cert with AUTHO
23,426,417 UART: RITY.KEYID = 7
25,137,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,345 UART: [art] PUB.X = AD785E6BAC1DB0BA06D6B88F0C2D34680DC02038E02E1543CB2FF95FEB782948A8C60ACA77CB76D5BAC5D66DB27496D4
25,146,633 UART: [art] PUB.Y = 175BEB20D47F3F7CA626E163D26E4921D615E203CDDE1E56E368BA1FFDE999CE171236A7F67CFA54B2BF889AC5B3AB16
25,153,911 UART: [art] SIG.R = 08F3E45E9E9345A55CAE57338CC8816C8AA287F16414B63B02314F360C5FC8F76B34EB08DDED08FDFB3E0E161E57462E
25,161,601 UART: [art] SIG.S = E2D4A959E48F9F0F9365ECC1556442C2ECB37D9CCA689EF18A8866868B10BCCF9D55475B9EA0DB4F39E613DDB8390C6E
26,140,142 UART: Caliptra RT
26,140,839 UART: [state] CFI Enabled
26,306,384 UART: [rt] RT listening for mailbox commands...
26,308,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,133 UART: [rt]cmd =0x44504543, len=96
30,705,032 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,374 UART:
192,733 UART: Running Caliptra ROM ...
193,872 UART:
603,679 UART: [state] CFI Enabled
618,409 UART: [state] LifecycleState = Unprovisioned
620,781 UART: [state] DebugLocked = No
623,018 UART: [state] WD Timer not started. Device not locked for debugging
628,195 UART: [kat] SHA2-256
818,087 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,891 UART: [kat] ++
829,367 UART: [kat] sha1
842,387 UART: [kat] SHA2-256
845,471 UART: [kat] SHA2-384
850,106 UART: [kat] SHA2-512-ACC
852,686 UART: [kat] ECC-384
3,294,693 UART: [kat] HMAC-384Kdf
3,307,077 UART: [kat] LMS
3,838,867 UART: [kat] --
3,843,708 UART: [cold-reset] ++
3,845,563 UART: [fht] FHT @ 0x50003400
3,857,033 UART: [idev] ++
3,857,740 UART: [idev] CDI.KEYID = 6
3,858,644 UART: [idev] SUBJECT.KEYID = 7
3,860,327 UART: [idev] UDS.KEYID = 0
3,861,273 ready_for_fw is high
3,861,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,935 UART: [idev] Erasing UDS.KEYID = 0
6,336,805 UART: [idev] Sha1 KeyId Algorithm
6,359,081 UART: [idev] --
6,364,667 UART: [ldev] ++
6,365,411 UART: [ldev] CDI.KEYID = 6
6,366,321 UART: [ldev] SUBJECT.KEYID = 5
6,367,473 UART: [ldev] AUTHORITY.KEYID = 7
6,368,699 UART: [ldev] FE.KEYID = 1
6,379,181 UART: [ldev] Erasing FE.KEYID = 1
8,858,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,978 UART: [ldev] --
10,647,053 UART: [fwproc] Wait for Commands...
10,649,522 UART: [fwproc] Recv command 0x46574c44
10,651,841 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,831,753 >>> mbox cmd response: success
14,835,764 UART: [afmc] ++
14,836,474 UART: [afmc] CDI.KEYID = 6
14,837,711 UART: [afmc] SUBJECT.KEYID = 7
14,839,138 UART: [afmc] AUTHORITY.KEYID = 5
17,347,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,043 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,903 UART: [afmc] --
19,144,927 UART: [cold-reset] --
19,149,710 UART: [state] Locking Datavault
19,156,947 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,133 UART: [state] Locking ICCM
19,161,638 UART: [exit] Launching FMC @ 0x40000130
19,170,295 UART:
19,170,530 UART: Running Caliptra FMC ...
19,171,554 UART:
19,171,697 UART: [state] CFI Enabled
19,179,848 UART: [fht] FMC Alias Private Key: 7
20,937,013 UART: [art] Extend RT PCRs Done
20,938,233 UART: [art] Lock RT PCRs Done
20,940,158 UART: [art] Populate DV Done
20,945,350 UART: [fht] FMC Alias Private Key: 7
20,946,936 UART: [art] Derive CDI
20,947,747 UART: [art] Store in in slot 0x4
20,990,608 UART: [art] Derive Key Pair
20,991,641 UART: [art] Store priv key in slot 0x5
23,418,479 UART: [art] Derive Key Pair - Done
23,431,688 UART: [art] Signing Cert with AUTHO
23,432,987 UART: RITY.KEYID = 7
25,138,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,315 UART: [art] PUB.X = CC40E5D5BDE6E526A1797204CB478951A90C8432F478C732F98FCA2C491E30A5756BAC8021A1AC7B5ED9803CF5C17E5E
25,147,459 UART: [art] PUB.Y = BCF717BE6EE048A1E95F77ADFE86C4DAD7BCB01B7058B54545375038C76C81986C5472D2623D23050BEE4D3E76EDA16E
25,154,752 UART: [art] SIG.R = 6667D1F16FA16F51BDED6097C689839B33E41A8161F868CB22C35CB0AF9B4F6D7173DA37F40473FD8CA414F215E94C35
25,162,196 UART: [art] SIG.S = B4D613B0F246B8D58E61824A549D4F237AA93F928536B7A9FEB59FF8990FA5573D2873EB95E9EDA27A2056050A3DEEBE
26,141,115 UART: Caliptra RT
26,141,804 UART: [state] CFI Enabled
26,259,183 UART: [rt] RT listening for mailbox commands...
26,261,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,291,931 UART: [rt]cmd =0x44504543, len=96
30,583,044 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,750,697 ready_for_fw is high
3,751,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,957,202 >>> mbox cmd response: success
19,210,493 UART:
19,210,932 UART: Running Caliptra FMC ...
19,212,052 UART:
19,212,204 UART: [state] CFI Enabled
19,219,946 UART: [fht] FMC Alias Private Key: 7
20,976,577 UART: [art] Extend RT PCRs Done
20,977,804 UART: [art] Lock RT PCRs Done
20,979,295 UART: [art] Populate DV Done
20,984,759 UART: [fht] FMC Alias Private Key: 7
20,986,244 UART: [art] Derive CDI
20,986,978 UART: [art] Store in in slot 0x4
21,029,578 UART: [art] Derive Key Pair
21,030,623 UART: [art] Store priv key in slot 0x5
23,457,279 UART: [art] Derive Key Pair - Done
23,470,119 UART: [art] Signing Cert with AUTHO
23,471,424 UART: RITY.KEYID = 7
25,176,898 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,410 UART: [art] PUB.X = C2EEBCA8AE9AC119B488C2A3299D8A3D3DC59C92060156FD88549BAB89F2F36F3BEC3FA348CD458B40DF3C2F9DEF994B
25,185,723 UART: [art] PUB.Y = C25C51F06696E787236AC778B361BAF364B3C90AD2CF7F5981D9A6192F98B624C219889BEE9FA08005898E49ADE22DA4
25,192,948 UART: [art] SIG.R = 6C3BF2E97FC87CFDD7795BC7634CF443AF6BDC7DE36DC91D28AB91499ADD1F69BB99DEC237361CBA50378E90706C3E28
25,200,351 UART: [art] SIG.S = FF24C755F8B5C41840DAF837259D7F196A92889DBE82EC722B6F7DAC91549668AF37C8C058A8461D3483713FDFF1692D
26,179,131 UART: Caliptra RT
26,179,826 UART: [state] CFI Enabled
26,297,388 UART: [rt] RT listening for mailbox commands...
26,299,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,017 UART: [rt]cmd =0x44504543, len=96
30,621,194 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,436 UART: [kat] SHA2-512-ACC
897,337 UART: [kat] ECC-384
902,932 UART: [kat] HMAC-384Kdf
907,446 UART: [kat] LMS
1,475,642 UART: [kat] --
1,476,799 UART: [cold-reset] ++
1,477,373 UART: [fht] Storing FHT @ 0x50003400
1,480,226 UART: [idev] ++
1,480,394 UART: [idev] CDI.KEYID = 6
1,480,754 UART: [idev] SUBJECT.KEYID = 7
1,481,178 UART: [idev] UDS.KEYID = 0
1,481,523 ready_for_fw is high
1,481,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,492 UART: [idev] Erasing UDS.KEYID = 0
1,505,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,472 UART: [idev] --
1,515,421 UART: [ldev] ++
1,515,589 UART: [ldev] CDI.KEYID = 6
1,515,952 UART: [ldev] SUBJECT.KEYID = 5
1,516,378 UART: [ldev] AUTHORITY.KEYID = 7
1,516,841 UART: [ldev] FE.KEYID = 1
1,521,951 UART: [ldev] Erasing FE.KEYID = 1
1,547,382 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,040 UART: [ldev] --
1,586,399 UART: [fwproc] Waiting for Commands...
1,587,032 UART: [fwproc] Received command 0x46574c44
1,587,823 UART: [fwproc] Received Image of size 114360 bytes
2,885,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,729 >>> mbox cmd response: success
3,079,753 UART: [afmc] ++
3,079,921 UART: [afmc] CDI.KEYID = 6
3,080,283 UART: [afmc] SUBJECT.KEYID = 7
3,080,708 UART: [afmc] AUTHORITY.KEYID = 5
3,115,793 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,522 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,212 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,167 UART: [afmc] --
3,159,097 UART: [cold-reset] --
3,159,657 UART: [state] Locking Datavault
3,160,466 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,070 UART: [state] Locking ICCM
3,161,534 UART: [exit] Launching FMC @ 0x40000130
3,166,863 UART:
3,166,879 UART: Running Caliptra FMC ...
3,167,287 UART:
3,167,341 UART: [state] CFI Enabled
3,177,446 UART: [fht] FMC Alias Private Key: 7
3,285,407 UART: [art] Extend RT PCRs Done
3,285,835 UART: [art] Lock RT PCRs Done
3,287,287 UART: [art] Populate DV Done
3,295,540 UART: [fht] FMC Alias Private Key: 7
3,296,636 UART: [art] Derive CDI
3,296,916 UART: [art] Store in in slot 0x4
3,382,523 UART: [art] Derive Key Pair
3,382,883 UART: [art] Store priv key in slot 0x5
3,395,895 UART: [art] Derive Key Pair - Done
3,411,099 UART: [art] Signing Cert with AUTHO
3,411,579 UART: RITY.KEYID = 7
3,426,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,144 UART: [art] PUB.X = 75E8DEFDC9CA507D772D22AE57146F072DCD2FB0CBBDA1F41FF8C87060A3A6CEAFFDAF522AC5B27CEE48BAF72CE9405E
3,433,947 UART: [art] PUB.Y = 30A6DD9409D1711F3D0399E83EB0D1F9EBEFA0A84FC83A945A9E26816EFB8E7EE9874FB6BE06338ED6684032A5A4026C
3,440,897 UART: [art] SIG.R = 75245152FCE84E147478DE8F8729CC03A0A96D59E5CC572CF3D4402D1051F67BAAD6034406B4BA246AEE70681811B19B
3,447,660 UART: [art] SIG.S = C29D857FC3F4CFF939E9D38DDDE2F913892D67E4CFD12AD209B86195754EF6AC9590A5D505AD11FD1230C16AE304DC27
3,471,608 UART: Caliptra RT
3,471,862 UART: [state] CFI Enabled
3,580,088 UART: [rt] RT listening for mailbox commands...
3,580,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,129 UART: [rt]cmd =0x44504543, len=96
3,799,013 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,099 ready_for_fw is high
1,363,099 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,105 >>> mbox cmd response: success
2,990,089 UART:
2,990,105 UART: Running Caliptra FMC ...
2,990,513 UART:
2,990,567 UART: [state] CFI Enabled
3,001,106 UART: [fht] FMC Alias Private Key: 7
3,109,729 UART: [art] Extend RT PCRs Done
3,110,157 UART: [art] Lock RT PCRs Done
3,111,861 UART: [art] Populate DV Done
3,120,094 UART: [fht] FMC Alias Private Key: 7
3,121,116 UART: [art] Derive CDI
3,121,396 UART: [art] Store in in slot 0x4
3,206,727 UART: [art] Derive Key Pair
3,207,087 UART: [art] Store priv key in slot 0x5
3,220,257 UART: [art] Derive Key Pair - Done
3,235,234 UART: [art] Signing Cert with AUTHO
3,235,714 UART: RITY.KEYID = 7
3,251,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,867 UART: [art] PUB.X = B23245379323E3EA62747287E500C033D4731719DD8F17EE5CE65038AF0544C9BBE9EAECA49F53EA6ECD21866FEA28E7
3,258,620 UART: [art] PUB.Y = 5501969778A3AFB5FDFF41FDCFCB992A5E1FA9E48A3D5EA0CA55A6A4ABA97F6817C09E4338CD2C8B5021DCA3A7BEAC5E
3,265,597 UART: [art] SIG.R = FF5FA9CB36A203073D6D84591622BAAB0CDAE80249426CBB566F5F80540E603A5B378E4BE3F389FF4F3460BB5E47DAF2
3,272,366 UART: [art] SIG.S = B12B56203A3ADA74F67E5358C4728B5D98D7340E8FF14C52A5E80C9C1107CADBA614E666A06EC1E916164E041809436E
3,295,708 UART: Caliptra RT
3,295,962 UART: [state] CFI Enabled
3,404,977 UART: [rt] RT listening for mailbox commands...
3,405,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,696 UART: [rt]cmd =0x44504543, len=96
3,623,999 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,940 UART: [kat] SHA2-256
881,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,986 UART: [kat] ++
886,138 UART: [kat] sha1
890,342 UART: [kat] SHA2-256
892,280 UART: [kat] SHA2-384
895,053 UART: [kat] SHA2-512-ACC
896,954 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,329 UART: [kat] LMS
1,475,525 UART: [kat] --
1,476,494 UART: [cold-reset] ++
1,476,830 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 ready_for_fw is high
1,480,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,905 UART: [idev] Erasing UDS.KEYID = 0
1,505,711 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,417 UART: [idev] --
1,515,564 UART: [ldev] ++
1,515,732 UART: [ldev] CDI.KEYID = 6
1,516,095 UART: [ldev] SUBJECT.KEYID = 5
1,516,521 UART: [ldev] AUTHORITY.KEYID = 7
1,516,984 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,548,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,069 UART: [ldev] --
1,587,380 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 114360 bytes
2,887,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,270 >>> mbox cmd response: success
3,081,366 UART: [afmc] ++
3,081,534 UART: [afmc] CDI.KEYID = 6
3,081,896 UART: [afmc] SUBJECT.KEYID = 7
3,082,321 UART: [afmc] AUTHORITY.KEYID = 5
3,117,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,968 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,361 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,051 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,876 UART: [afmc] --
3,160,858 UART: [cold-reset] --
3,161,656 UART: [state] Locking Datavault
3,162,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,431 UART: [state] Locking ICCM
3,164,087 UART: [exit] Launching FMC @ 0x40000130
3,169,416 UART:
3,169,432 UART: Running Caliptra FMC ...
3,169,840 UART:
3,169,983 UART: [state] CFI Enabled
3,181,078 UART: [fht] FMC Alias Private Key: 7
3,289,059 UART: [art] Extend RT PCRs Done
3,289,487 UART: [art] Lock RT PCRs Done
3,290,811 UART: [art] Populate DV Done
3,299,010 UART: [fht] FMC Alias Private Key: 7
3,300,158 UART: [art] Derive CDI
3,300,438 UART: [art] Store in in slot 0x4
3,386,123 UART: [art] Derive Key Pair
3,386,483 UART: [art] Store priv key in slot 0x5
3,399,881 UART: [art] Derive Key Pair - Done
3,414,143 UART: [art] Signing Cert with AUTHO
3,414,623 UART: RITY.KEYID = 7
3,429,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,668 UART: [art] PUB.X = 39B4394809416091369C8631F684AB07D57D84B7860786D19A0D11369C5C6F7B3B5117605550E5D8DC229EF8920B6022
3,437,407 UART: [art] PUB.Y = B8A15238220425E75835CBB67E60D3A9D90728F37E584805B548565B4CFB8BF90B8AE6D555F3FD46720B066497FFAF0D
3,444,338 UART: [art] SIG.R = 3AD68A3C48A8013061F35A1B70765E3E2D095C28B2EB0F3D972C6C0EF9B791345AC078D43AD16E072E6672CDF9C3BD04
3,451,098 UART: [art] SIG.S = 1882C1EBFFEC840903908A75E2372317319232F4EA05613E427C413C4DB5A1355F9A245359A06D181942C0835768AA4A
3,475,504 UART: Caliptra RT
3,475,850 UART: [state] CFI Enabled
3,584,307 UART: [rt] RT listening for mailbox commands...
3,584,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,060 UART: [rt]cmd =0x44504543, len=96
3,803,615 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,720 ready_for_fw is high
1,362,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,316 >>> mbox cmd response: success
2,991,354 UART:
2,991,370 UART: Running Caliptra FMC ...
2,991,778 UART:
2,991,921 UART: [state] CFI Enabled
3,002,476 UART: [fht] FMC Alias Private Key: 7
3,111,267 UART: [art] Extend RT PCRs Done
3,111,695 UART: [art] Lock RT PCRs Done
3,113,221 UART: [art] Populate DV Done
3,121,562 UART: [fht] FMC Alias Private Key: 7
3,122,504 UART: [art] Derive CDI
3,122,784 UART: [art] Store in in slot 0x4
3,208,529 UART: [art] Derive Key Pair
3,208,889 UART: [art] Store priv key in slot 0x5
3,222,617 UART: [art] Derive Key Pair - Done
3,237,180 UART: [art] Signing Cert with AUTHO
3,237,660 UART: RITY.KEYID = 7
3,253,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,047 UART: [art] PUB.X = 52B9EB5BD94246AA02D420E4E1718D9F4CD4ACA83CF772D6A5AC74417963DA118FBE7ABD90E8291D9F4B46D945FFF578
3,260,830 UART: [art] PUB.Y = 9394B7CD6F03474956EC39837BB6C80FEA144361D019B5A501BAF9445990DD4129E4E7BC49ECD5C717C6F21DEADE516C
3,267,781 UART: [art] SIG.R = 29C3F2E099E54CA222CFA70E5200A156DB60675056362301C6966D4326328CDEA4E164994F32B9726534C8CA3D13B5BF
3,274,519 UART: [art] SIG.S = BD39FA94E8A6C763B21E724DCDE2492B51484FDC9F3A9930C340E0A1EDE20110BAD31161DF136ED3286B76F5F04D2436
3,298,451 UART: Caliptra RT
3,298,797 UART: [state] CFI Enabled
3,407,873 UART: [rt] RT listening for mailbox commands...
3,408,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,742 UART: [rt]cmd =0x44504543, len=96
3,626,852 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
893,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,591 UART: [kat] ++
897,743 UART: [kat] sha1
902,185 UART: [kat] SHA2-256
904,125 UART: [kat] SHA2-384
906,988 UART: [kat] SHA2-512-ACC
908,889 UART: [kat] ECC-384
918,406 UART: [kat] HMAC-384Kdf
922,828 UART: [kat] LMS
1,171,156 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,266 UART: [idev] ++
1,175,434 UART: [idev] CDI.KEYID = 6
1,175,794 UART: [idev] SUBJECT.KEYID = 7
1,176,218 UART: [idev] UDS.KEYID = 0
1,176,563 ready_for_fw is high
1,176,563 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,155 UART: [idev] Sha1 KeyId Algorithm
1,209,585 UART: [idev] --
1,210,803 UART: [ldev] ++
1,210,971 UART: [ldev] CDI.KEYID = 6
1,211,334 UART: [ldev] SUBJECT.KEYID = 5
1,211,760 UART: [ldev] AUTHORITY.KEYID = 7
1,212,223 UART: [ldev] FE.KEYID = 1
1,217,493 UART: [ldev] Erasing FE.KEYID = 1
1,244,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,029 UART: [ldev] --
1,283,374 UART: [fwproc] Wait for Commands...
1,284,184 UART: [fwproc] Recv command 0x46574c44
1,284,912 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,518 >>> mbox cmd response: success
2,776,734 UART: [afmc] ++
2,776,902 UART: [afmc] CDI.KEYID = 6
2,777,264 UART: [afmc] SUBJECT.KEYID = 7
2,777,689 UART: [afmc] AUTHORITY.KEYID = 5
2,813,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,705 UART: [afmc] --
2,856,589 UART: [cold-reset] --
2,857,353 UART: [state] Locking Datavault
2,858,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,424 UART: [state] Locking ICCM
2,860,054 UART: [exit] Launching FMC @ 0x40000130
2,865,383 UART:
2,865,399 UART: Running Caliptra FMC ...
2,865,807 UART:
2,865,861 UART: [state] CFI Enabled
2,876,348 UART: [fht] FMC Alias Private Key: 7
2,983,907 UART: [art] Extend RT PCRs Done
2,984,335 UART: [art] Lock RT PCRs Done
2,986,049 UART: [art] Populate DV Done
2,994,284 UART: [fht] FMC Alias Private Key: 7
2,995,222 UART: [art] Derive CDI
2,995,502 UART: [art] Store in in slot 0x4
3,081,425 UART: [art] Derive Key Pair
3,081,785 UART: [art] Store priv key in slot 0x5
3,095,057 UART: [art] Derive Key Pair - Done
3,109,679 UART: [art] Signing Cert with AUTHO
3,110,159 UART: RITY.KEYID = 7
3,125,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,994 UART: [art] PUB.X = F4B38BC05FD09543DBE8CD5B397A91A59EE9B3051A1312C2D551F9D6158E584B9BFD1AD479D7123847227375D76DD3F8
3,132,767 UART: [art] PUB.Y = 075E792563FF8A4C565F1DEBF83B48A8DEB051B1E7D9D6233A8B020706C340573797D474C7E573BC7328C0AE67549302
3,139,700 UART: [art] SIG.R = F799E1ADC94FD8D255AD4AED916F99951F71D92B520E7B234AD7217EBF226D80BDAA2A964991534B1D59B68E0C668F0A
3,146,473 UART: [art] SIG.S = 57052C803B68D94B348F2CC46C24BFEFAC6FE75658A438EF8D6C0003C1F99489B4C34866B66C59D8B7AF9CD359FC6F38
3,169,896 UART: Caliptra RT
3,170,150 UART: [state] CFI Enabled
3,277,588 UART: [rt] RT listening for mailbox commands...
3,278,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,481 UART: [rt]cmd =0x44504543, len=96
3,496,558 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,061 ready_for_fw is high
1,059,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,205 >>> mbox cmd response: success
2,686,381 UART:
2,686,397 UART: Running Caliptra FMC ...
2,686,805 UART:
2,686,859 UART: [state] CFI Enabled
2,697,348 UART: [fht] FMC Alias Private Key: 7
2,805,363 UART: [art] Extend RT PCRs Done
2,805,791 UART: [art] Lock RT PCRs Done
2,807,501 UART: [art] Populate DV Done
2,815,650 UART: [fht] FMC Alias Private Key: 7
2,816,594 UART: [art] Derive CDI
2,816,874 UART: [art] Store in in slot 0x4
2,902,403 UART: [art] Derive Key Pair
2,902,763 UART: [art] Store priv key in slot 0x5
2,915,499 UART: [art] Derive Key Pair - Done
2,930,287 UART: [art] Signing Cert with AUTHO
2,930,767 UART: RITY.KEYID = 7
2,945,831 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,596 UART: [art] PUB.X = E827528807A163F046E0FABCACD8B967ACF99481932B897AB22D164931308589374B60B4F78D8278B861EC6659DDAF1E
2,953,363 UART: [art] PUB.Y = 7C98774EB9D96198609E968B5006D713B7F3BE4754E21E67408F2D79B2198B65CAC4DDC9F8D778F721F08FA66B87A2F8
2,960,312 UART: [art] SIG.R = 450E844ACA0E3EFD9ECFE7A32B178CD522A4165E07CF2AD64B10E97A1126126DFAA8EAFF7C4ADDB42EB41D6AA893B8E8
2,967,101 UART: [art] SIG.S = 4BF056DEE9A0E0D7C46F188427116C5C145E1F20EC39D99C3C4D286B33AB5F850186095E28613D7BD15B3FC8E067FC58
2,990,634 UART: Caliptra RT
2,990,888 UART: [state] CFI Enabled
3,098,586 UART: [rt] RT listening for mailbox commands...
3,099,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,271 UART: [rt]cmd =0x44504543, len=96
3,317,815 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,454 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
893,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,108 UART: [kat] ++
898,260 UART: [kat] sha1
902,554 UART: [kat] SHA2-256
904,494 UART: [kat] SHA2-384
907,367 UART: [kat] SHA2-512-ACC
909,268 UART: [kat] ECC-384
918,981 UART: [kat] HMAC-384Kdf
923,667 UART: [kat] LMS
1,171,995 UART: [kat] --
1,172,786 UART: [cold-reset] ++
1,173,356 UART: [fht] FHT @ 0x50003400
1,176,091 UART: [idev] ++
1,176,259 UART: [idev] CDI.KEYID = 6
1,176,619 UART: [idev] SUBJECT.KEYID = 7
1,177,043 UART: [idev] UDS.KEYID = 0
1,177,388 ready_for_fw is high
1,177,388 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,023 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,492 UART: [idev] --
1,211,472 UART: [ldev] ++
1,211,640 UART: [ldev] CDI.KEYID = 6
1,212,003 UART: [ldev] SUBJECT.KEYID = 5
1,212,429 UART: [ldev] AUTHORITY.KEYID = 7
1,212,892 UART: [ldev] FE.KEYID = 1
1,218,362 UART: [ldev] Erasing FE.KEYID = 1
1,244,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,952 UART: [ldev] --
1,284,255 UART: [fwproc] Wait for Commands...
1,284,933 UART: [fwproc] Recv command 0x46574c44
1,285,661 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,185 >>> mbox cmd response: success
2,777,323 UART: [afmc] ++
2,777,491 UART: [afmc] CDI.KEYID = 6
2,777,853 UART: [afmc] SUBJECT.KEYID = 7
2,778,278 UART: [afmc] AUTHORITY.KEYID = 5
2,814,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,068 UART: [afmc] --
2,858,158 UART: [cold-reset] --
2,858,922 UART: [state] Locking Datavault
2,859,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,447 UART: [state] Locking ICCM
2,860,927 UART: [exit] Launching FMC @ 0x40000130
2,866,256 UART:
2,866,272 UART: Running Caliptra FMC ...
2,866,680 UART:
2,866,823 UART: [state] CFI Enabled
2,877,724 UART: [fht] FMC Alias Private Key: 7
2,985,295 UART: [art] Extend RT PCRs Done
2,985,723 UART: [art] Lock RT PCRs Done
2,987,071 UART: [art] Populate DV Done
2,995,386 UART: [fht] FMC Alias Private Key: 7
2,996,426 UART: [art] Derive CDI
2,996,706 UART: [art] Store in in slot 0x4
3,082,569 UART: [art] Derive Key Pair
3,082,929 UART: [art] Store priv key in slot 0x5
3,096,069 UART: [art] Derive Key Pair - Done
3,110,859 UART: [art] Signing Cert with AUTHO
3,111,339 UART: RITY.KEYID = 7
3,126,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,252 UART: [art] PUB.X = F9BA88801F4935CC9E86089FC9EB1F38426F81032A5F53DD750E852B2D2015C364BD88B9848A04E0C09103593582361E
3,134,001 UART: [art] PUB.Y = B90FF964588FAA95885F5869AD2BB8B497E80F892FA2C035F4AE3200616E9D8556E8C836930987B4C0BE95636AC22724
3,140,918 UART: [art] SIG.R = 37462A289DD4117217570D43D0400FDFA67601FFC7D20D2337FC43940FC1354D7D132DA22A186650ED84BA4B3B0F452B
3,147,670 UART: [art] SIG.S = FB52EA1D512F7777BC4CDCAC1BEA17626B0CBB408680A8A0C8DC5B4562324301AF673DE1A6BD43F964488FCDEF484920
3,171,561 UART: Caliptra RT
3,171,907 UART: [state] CFI Enabled
3,278,895 UART: [rt] RT listening for mailbox commands...
3,279,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,552 UART: [rt]cmd =0x44504543, len=96
3,497,962 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 ready_for_fw is high
1,060,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,138 >>> mbox cmd response: success
2,688,638 UART:
2,688,654 UART: Running Caliptra FMC ...
2,689,062 UART:
2,689,205 UART: [state] CFI Enabled
2,699,412 UART: [fht] FMC Alias Private Key: 7
2,807,837 UART: [art] Extend RT PCRs Done
2,808,265 UART: [art] Lock RT PCRs Done
2,809,795 UART: [art] Populate DV Done
2,818,062 UART: [fht] FMC Alias Private Key: 7
2,819,202 UART: [art] Derive CDI
2,819,482 UART: [art] Store in in slot 0x4
2,905,459 UART: [art] Derive Key Pair
2,905,819 UART: [art] Store priv key in slot 0x5
2,919,859 UART: [art] Derive Key Pair - Done
2,934,904 UART: [art] Signing Cert with AUTHO
2,935,384 UART: RITY.KEYID = 7
2,950,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,555 UART: [art] PUB.X = 82AC5F67611046E058FEF877AD668E1EE43BDFBD20A41CA69E9586405EA0D4B81D29675B85BD035BD8896A6B1B977815
2,958,328 UART: [art] PUB.Y = 54EBF8BB9A40B9B1B3C025584151B067B852120D2DD980FF18052491A5E4C21BB8477B1BF1EF244FE95713D82F205EE5
2,965,276 UART: [art] SIG.R = 47459F8F21519CA515B19F15CB4FAC64F750020B0B2F24C62939BFABA7F84D791CAA8A1E207404E01B1EEFB9E0603A2B
2,972,046 UART: [art] SIG.S = 0E6943C94C56BCB17D0D25EB630A2FDC90768BB1BFC738DE9A6CF6BC4F90FD1572DFD43D02F32D45D377C40C6F94CE2B
2,995,506 UART: Caliptra RT
2,995,852 UART: [state] CFI Enabled
3,103,684 UART: [rt] RT listening for mailbox commands...
3,104,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,463 UART: [rt]cmd =0x44504543, len=96
3,323,096 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,621 UART: [idev] ++
1,172,789 UART: [idev] CDI.KEYID = 6
1,173,150 UART: [idev] SUBJECT.KEYID = 7
1,173,575 UART: [idev] UDS.KEYID = 0
1,173,921 ready_for_fw is high
1,173,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,185 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,216 UART: [ldev] ++
1,208,384 UART: [ldev] CDI.KEYID = 6
1,208,748 UART: [ldev] SUBJECT.KEYID = 5
1,209,175 UART: [ldev] AUTHORITY.KEYID = 7
1,209,638 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,240,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,318 UART: [ldev] --
1,279,760 UART: [fwproc] Wait for Commands...
1,280,341 UART: [fwproc] Recv command 0x46574c44
1,281,074 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,110 >>> mbox cmd response: success
2,772,223 UART: [afmc] ++
2,772,391 UART: [afmc] CDI.KEYID = 6
2,772,754 UART: [afmc] SUBJECT.KEYID = 7
2,773,180 UART: [afmc] AUTHORITY.KEYID = 5
2,808,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,172 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,891 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,924 UART: [afmc] --
2,851,812 UART: [cold-reset] --
2,852,728 UART: [state] Locking Datavault
2,853,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,499 UART: [state] Locking ICCM
2,855,101 UART: [exit] Launching FMC @ 0x40000130
2,860,430 UART:
2,860,446 UART: Running Caliptra FMC ...
2,860,854 UART:
2,860,908 UART: [state] CFI Enabled
2,871,353 UART: [fht] FMC Alias Private Key: 7
2,979,786 UART: [art] Extend RT PCRs Done
2,980,214 UART: [art] Lock RT PCRs Done
2,981,452 UART: [art] Populate DV Done
2,989,751 UART: [fht] FMC Alias Private Key: 7
2,990,879 UART: [art] Derive CDI
2,991,159 UART: [art] Store in in slot 0x4
3,076,324 UART: [art] Derive Key Pair
3,076,684 UART: [art] Store priv key in slot 0x5
3,090,128 UART: [art] Derive Key Pair - Done
3,104,852 UART: [art] Signing Cert with AUTHO
3,105,332 UART: RITY.KEYID = 7
3,120,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,679 UART: [art] PUB.X = C9FC16AF0C776A10D059BE60B25AA47D122AC4D306325E822631DA31D85CA0209355DF33F291CC78516807D52EA8667C
3,128,442 UART: [art] PUB.Y = E368C90767BF2E70665BB2F97198F3CFD9484B41680E192A27B63698367855E94F570AABF496BF01EF2E7CC0DCBA6C4C
3,135,388 UART: [art] SIG.R = 792CCB1D4B5375E80C1B2EAE6FE969FE7E075A940D8F486C5DDE612BA559CE81504B24231B0E66EE968BFCB4E9A65B6B
3,142,164 UART: [art] SIG.S = 25AC039826909F9D1AED2E70E4DE2B4B264A776B1B6DEE7F89229C67639C321C0ADA4B46AECB8101427508F079FD44C5
3,165,741 UART: Caliptra RT
3,165,995 UART: [state] CFI Enabled
3,273,177 UART: [rt] RT listening for mailbox commands...
3,273,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,022 UART: [rt]cmd =0x44504543, len=96
3,492,065 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,026 ready_for_fw is high
1,056,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,280 >>> mbox cmd response: success
2,682,900 UART:
2,682,916 UART: Running Caliptra FMC ...
2,683,324 UART:
2,683,378 UART: [state] CFI Enabled
2,693,645 UART: [fht] FMC Alias Private Key: 7
2,801,252 UART: [art] Extend RT PCRs Done
2,801,680 UART: [art] Lock RT PCRs Done
2,803,464 UART: [art] Populate DV Done
2,811,723 UART: [fht] FMC Alias Private Key: 7
2,812,863 UART: [art] Derive CDI
2,813,143 UART: [art] Store in in slot 0x4
2,898,524 UART: [art] Derive Key Pair
2,898,884 UART: [art] Store priv key in slot 0x5
2,911,974 UART: [art] Derive Key Pair - Done
2,926,920 UART: [art] Signing Cert with AUTHO
2,927,400 UART: RITY.KEYID = 7
2,942,364 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,129 UART: [art] PUB.X = EE41591983A448E08F167BEA5BD01CB8D24DDA68B1F13D71234B37EF76E87DFA5C94E499E4CCEED63D92FA96818E8C2D
2,949,917 UART: [art] PUB.Y = EEFF151A02245E435178EA4BF4152B6219C5A6496CE612A6EDC3CADAEB4BF9B68816A6BBE6F23261D977F240C0E16F8E
2,956,880 UART: [art] SIG.R = D9A6A66456DF6CE6CFA49CB3288286B9FF0A6987F03204A79CB4FCC0558C3DBD4B18E86D44601689393DB360000F98F0
2,963,625 UART: [art] SIG.S = E2B4B6FC548D6FF7950CE891EA3BCC7E3DA54801DB1B115AADB1BAE170ADC754541975E880B2B156779BE976CDA0311D
2,987,340 UART: Caliptra RT
2,987,594 UART: [state] CFI Enabled
3,095,419 UART: [rt] RT listening for mailbox commands...
3,096,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,096 UART: [rt]cmd =0x44504543, len=96
3,314,682 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
915,765 UART: [kat] HMAC-384Kdf
920,533 UART: [kat] LMS
1,168,845 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,174,284 ready_for_fw is high
1,174,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,685 UART: [fwproc] Wait for Commands...
1,282,488 UART: [fwproc] Recv command 0x46574c44
1,283,221 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,709 >>> mbox cmd response: success
2,773,880 UART: [afmc] ++
2,774,048 UART: [afmc] CDI.KEYID = 6
2,774,411 UART: [afmc] SUBJECT.KEYID = 7
2,774,837 UART: [afmc] AUTHORITY.KEYID = 5
2,810,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,994 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,596 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,419 UART: [afmc] --
2,854,337 UART: [cold-reset] --
2,855,299 UART: [state] Locking Datavault
2,856,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,026 UART: [state] Locking ICCM
2,857,572 UART: [exit] Launching FMC @ 0x40000130
2,862,901 UART:
2,862,917 UART: Running Caliptra FMC ...
2,863,325 UART:
2,863,468 UART: [state] CFI Enabled
2,874,211 UART: [fht] FMC Alias Private Key: 7
2,982,566 UART: [art] Extend RT PCRs Done
2,982,994 UART: [art] Lock RT PCRs Done
2,984,678 UART: [art] Populate DV Done
2,992,995 UART: [fht] FMC Alias Private Key: 7
2,994,007 UART: [art] Derive CDI
2,994,287 UART: [art] Store in in slot 0x4
3,080,186 UART: [art] Derive Key Pair
3,080,546 UART: [art] Store priv key in slot 0x5
3,093,518 UART: [art] Derive Key Pair - Done
3,108,231 UART: [art] Signing Cert with AUTHO
3,108,711 UART: RITY.KEYID = 7
3,124,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,884 UART: [art] PUB.X = DCCAA723B11793E2EEC853693361E07B6E35DCDCD96E3374F8B7DBADD841276A2B3692C7A3683A84C18AFA6114FD3849
3,131,666 UART: [art] PUB.Y = BD04961B22FC2B76D1611AB776AD642A4DD2493AECDD9DF93951829C3C56D6C1A8A5BE11FCD5AEBBDD4323B2925C652A
3,138,633 UART: [art] SIG.R = 7DE4EE97859F9F81EEB3323C7F538D3F7B5CA3F39E0A9B87D3BB92B346E11A14B05ECD2A96112B4909EBB36CAA566069
3,145,411 UART: [art] SIG.S = 98733FCDD654D31F532E988B493FB0C41BFF76A637F59600E19174176F031AFF6F5AA9F529A0EAAA7BB43D508F7E9FCE
3,169,203 UART: Caliptra RT
3,169,549 UART: [state] CFI Enabled
3,277,567 UART: [rt] RT listening for mailbox commands...
3,278,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,080 UART: [rt]cmd =0x44504543, len=96
3,495,859 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,161 ready_for_fw is high
1,056,161 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,443 >>> mbox cmd response: success
2,686,215 UART:
2,686,231 UART: Running Caliptra FMC ...
2,686,639 UART:
2,686,782 UART: [state] CFI Enabled
2,697,567 UART: [fht] FMC Alias Private Key: 7
2,805,790 UART: [art] Extend RT PCRs Done
2,806,218 UART: [art] Lock RT PCRs Done
2,807,886 UART: [art] Populate DV Done
2,816,063 UART: [fht] FMC Alias Private Key: 7
2,817,227 UART: [art] Derive CDI
2,817,507 UART: [art] Store in in slot 0x4
2,903,394 UART: [art] Derive Key Pair
2,903,754 UART: [art] Store priv key in slot 0x5
2,917,376 UART: [art] Derive Key Pair - Done
2,932,374 UART: [art] Signing Cert with AUTHO
2,932,854 UART: RITY.KEYID = 7
2,947,816 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,581 UART: [art] PUB.X = 5069DEA794F8C14D656F30A54894872F519513C9993984D14D4455B3DA7084189F3F23FEE6B1464F33071FF13F6933AB
2,955,340 UART: [art] PUB.Y = 7026891402F56A82FCEF09776A904B7ED33C167F567AA65BC7B327F801FF38771A5A18287B80BB2CA0A8DFCC254F7443
2,962,285 UART: [art] SIG.R = 2426B9B5D504D2590DCA3D0ACEE6C9FF60E7912589D278667F3EFF916FB1F63D1287AC73E064FBECA518882A8C3EBF6A
2,969,062 UART: [art] SIG.S = BEA382B54F60E637FEB4C27756CAEF1C37C43ED4422ECAD39A44F1FF727C66B270CE2CB1575BFC3A0F5E0B9495B09776
2,992,997 UART: Caliptra RT
2,993,343 UART: [state] CFI Enabled
3,101,359 UART: [rt] RT listening for mailbox commands...
3,102,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,038 UART: [rt]cmd =0x44504543, len=96
3,320,279 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,342 UART:
192,708 UART: Running Caliptra ROM ...
193,805 UART:
193,941 UART: [state] CFI Enabled
263,187 UART: [state] LifecycleState = Unprovisioned
265,166 UART: [state] DebugLocked = No
267,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,605 UART: [kat] SHA2-256
443,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,759 UART: [kat] ++
454,319 UART: [kat] sha1
466,394 UART: [kat] SHA2-256
469,045 UART: [kat] SHA2-384
473,472 UART: [kat] SHA2-512-ACC
475,840 UART: [kat] ECC-384
2,769,674 UART: [kat] HMAC-384Kdf
2,801,029 UART: [kat] LMS
3,991,345 UART: [kat] --
3,997,539 UART: [cold-reset] ++
3,999,109 UART: [fht] Storing FHT @ 0x50003400
4,012,137 UART: [idev] ++
4,012,701 UART: [idev] CDI.KEYID = 6
4,013,682 UART: [idev] SUBJECT.KEYID = 7
4,014,847 UART: [idev] UDS.KEYID = 0
4,015,821 ready_for_fw is high
4,016,039 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,836 UART: [idev] Erasing UDS.KEYID = 0
7,348,305 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,123 UART: [idev] --
7,372,750 UART: [ldev] ++
7,373,307 UART: [ldev] CDI.KEYID = 6
7,374,239 UART: [ldev] SUBJECT.KEYID = 5
7,375,413 UART: [ldev] AUTHORITY.KEYID = 7
7,376,739 UART: [ldev] FE.KEYID = 1
7,402,837 UART: [ldev] Erasing FE.KEYID = 1
10,737,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,483 UART: [ldev] --
13,095,854 UART: [fwproc] Waiting for Commands...
13,098,120 UART: [fwproc] Received command 0x46574c44
13,100,297 UART: [fwproc] Received Image of size 114036 bytes
17,152,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,498 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,295,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,612,429 >>> mbox cmd response: success
17,616,693 UART: [afmc] ++
17,617,281 UART: [afmc] CDI.KEYID = 6
17,618,156 UART: [afmc] SUBJECT.KEYID = 7
17,619,418 UART: [afmc] AUTHORITY.KEYID = 5
20,987,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,325 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,307,718 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,570 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,042 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,359,088 UART: [afmc] --
23,363,160 UART: [cold-reset] --
23,367,766 UART: [state] Locking Datavault
23,373,110 UART: [state] Locking PCR0, PCR1 and PCR31
23,374,865 UART: [state] Locking ICCM
23,376,143 UART: [exit] Launching FMC @ 0x40000130
23,384,532 UART:
23,384,759 UART: Running Caliptra FMC ...
23,385,849 UART:
23,385,998 UART: [state] CFI Enabled
23,448,927 UART: [fht] FMC Alias Private Key: 7
25,786,884 UART: [art] Extend RT PCRs Done
25,788,106 UART: [art] Lock RT PCRs Done
25,789,556 UART: [art] Populate DV Done
25,794,756 UART: [fht] FMC Alias Private Key: 7
25,796,284 UART: [art] Derive CDI
25,797,023 UART: [art] Store in in slot 0x4
25,857,035 UART: [art] Derive Key Pair
25,858,035 UART: [art] Store priv key in slot 0x5
29,132,054 UART: [art] Derive Key Pair - Done
29,144,678 UART: [art] Signing Cert with AUTHO
29,145,991 UART: RITY.KEYID = 7
31,432,865 UART: [art] Erasing AUTHORITY.KEYID = 7
31,434,810 UART: [art] PUB.X = 61787061F514589E38769DF4106646F284C756569006979009B019312117D79A28E43394C4F29BFE282C3CB4A6262E53
31,441,582 UART: [art] PUB.Y = E5B5346DA490C6EBB68EDEE778966F993A8B0F83BDA70AC0C0D538616F1904D9F79C28B59319150E9F5AFF47BA8C16E5
31,448,865 UART: [art] SIG.R = 565B2F84FECEE545195E00A649029D067A2EE8947B8EE83D9B70AD9BE0BBDC80E474733E053D1C3B125736DFCF1CB71E
31,456,220 UART: [art] SIG.S = 2F89D22C4E77B8FA2C4E631DE2533449AC73860F79DE262D9CE2B457DAD55CA8CAC623DB433CD9A95FA33261E57EC6D2
32,761,327 UART: Caliptra RT
32,762,028 UART: [state] CFI Enabled
32,925,571 UART: [rt] RT listening for mailbox commands...
32,927,498 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,957,332 UART: [rt]cmd =0x44504543, len=28
33,008,157 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,786,524 ready_for_fw is high
3,786,936 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,867,916 >>> mbox cmd response: success
23,569,284 UART:
23,569,674 UART: Running Caliptra FMC ...
23,570,809 UART:
23,570,961 UART: [state] CFI Enabled
23,637,816 UART: [fht] FMC Alias Private Key: 7
25,975,769 UART: [art] Extend RT PCRs Done
25,977,030 UART: [art] Lock RT PCRs Done
25,978,744 UART: [art] Populate DV Done
25,984,123 UART: [fht] FMC Alias Private Key: 7
25,985,826 UART: [art] Derive CDI
25,986,639 UART: [art] Store in in slot 0x4
26,046,563 UART: [art] Derive Key Pair
26,047,607 UART: [art] Store priv key in slot 0x5
29,340,908 UART: [art] Derive Key Pair - Done
29,354,023 UART: [art] Signing Cert with AUTHO
29,355,328 UART: RITY.KEYID = 7
31,642,901 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,406 UART: [art] PUB.X = C6AFD696FC44FA6B395DFD36E0A8AAF9D4C9524B154EDC3BCF3C4E01F8EC6A814DA697273AF5E3FF89623DF59DAFB4DA
31,651,738 UART: [art] PUB.Y = EC61D25D859A6523FA80A4D065AFADE66A88338D925429D292F7B2EDBA8C200AC24A1BC4CB0779DCFB34B544098FA40D
31,658,995 UART: [art] SIG.R = 3AE9658E22D2D42405068C44D1B261E0AD534AB1C87F1F9E374C7DBBBE8E0FA16A57DCE4566D1DF803762B2307773352
31,666,351 UART: [art] SIG.S = 08E1224C46C1B06D11A761D34CE48BCEFFCCD33C161F240D7F05D4D0C89533D383D268AC116349BA45CAED0D80B39CAA
32,971,654 UART: Caliptra RT
32,972,356 UART: [state] CFI Enabled
33,133,717 UART: [rt] RT listening for mailbox commands...
33,135,681 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,165,606 UART: [rt]cmd =0x44504543, len=28
33,216,297 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,448 UART:
192,804 UART: Running Caliptra ROM ...
193,992 UART:
603,833 UART: [state] CFI Enabled
620,291 UART: [state] LifecycleState = Unprovisioned
622,263 UART: [state] DebugLocked = No
624,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,222 UART: [kat] SHA2-256
799,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,536 UART: [kat] ++
811,017 UART: [kat] sha1
822,674 UART: [kat] SHA2-256
825,395 UART: [kat] SHA2-384
831,755 UART: [kat] SHA2-512-ACC
834,121 UART: [kat] ECC-384
3,117,670 UART: [kat] HMAC-384Kdf
3,129,397 UART: [kat] LMS
4,319,471 UART: [kat] --
4,325,614 UART: [cold-reset] ++
4,328,045 UART: [fht] Storing FHT @ 0x50003400
4,338,679 UART: [idev] ++
4,339,245 UART: [idev] CDI.KEYID = 6
4,340,275 UART: [idev] SUBJECT.KEYID = 7
4,341,452 UART: [idev] UDS.KEYID = 0
4,342,427 ready_for_fw is high
4,342,620 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,485,826 UART: [idev] Erasing UDS.KEYID = 0
7,628,002 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,732 UART: [idev] --
7,653,557 UART: [ldev] ++
7,654,168 UART: [ldev] CDI.KEYID = 6
7,655,134 UART: [ldev] SUBJECT.KEYID = 5
7,656,341 UART: [ldev] AUTHORITY.KEYID = 7
7,657,566 UART: [ldev] FE.KEYID = 1
7,668,314 UART: [ldev] Erasing FE.KEYID = 1
10,956,373 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,543 UART: [ldev] --
13,316,122 UART: [fwproc] Waiting for Commands...
13,318,857 UART: [fwproc] Received command 0x46574c44
13,321,089 UART: [fwproc] Received Image of size 114036 bytes
17,380,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,757 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,838,877 >>> mbox cmd response: success
17,842,932 UART: [afmc] ++
17,843,583 UART: [afmc] CDI.KEYID = 6
17,844,489 UART: [afmc] SUBJECT.KEYID = 7
17,845,705 UART: [afmc] AUTHORITY.KEYID = 5
21,159,550 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,565 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,819 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,211 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,018 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,494 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,335 UART: [afmc] --
23,524,504 UART: [cold-reset] --
23,528,962 UART: [state] Locking Datavault
23,535,144 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,841 UART: [state] Locking ICCM
23,538,614 UART: [exit] Launching FMC @ 0x40000130
23,547,018 UART:
23,547,252 UART: Running Caliptra FMC ...
23,548,353 UART:
23,548,512 UART: [state] CFI Enabled
23,556,401 UART: [fht] FMC Alias Private Key: 7
25,887,293 UART: [art] Extend RT PCRs Done
25,888,511 UART: [art] Lock RT PCRs Done
25,890,569 UART: [art] Populate DV Done
25,895,775 UART: [fht] FMC Alias Private Key: 7
25,897,406 UART: [art] Derive CDI
25,898,228 UART: [art] Store in in slot 0x4
25,940,822 UART: [art] Derive Key Pair
25,941,818 UART: [art] Store priv key in slot 0x5
29,183,348 UART: [art] Derive Key Pair - Done
29,196,296 UART: [art] Signing Cert with AUTHO
29,197,601 UART: RITY.KEYID = 7
31,477,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,670 UART: [art] PUB.X = 1F9E9A05CC068C7A7EC1F0A992062E9409FE300B9CF0C50650CB7DA55F98BAE856A9E74F3A8C8481695F0085D456BD3C
31,485,875 UART: [art] PUB.Y = 88E9F50637BF256EE76BB852DCFC37A3A56675804F80C162F095F803AC3A5A93F2DA397697A2EEE6E09CD3912428D7E1
31,493,289 UART: [art] SIG.R = 3341704D0F1ABD8ECAE0561F2ADFF38B2F46AA924D973E4EA4EFC957207CA387F20613A2029A287274B6FC4F72295D23
31,500,560 UART: [art] SIG.S = 3264C3943597280AF2EFFCD9679217E2DF8CED64DE837030726F49DB1AFDA3386E4160A5629EA50293CB45DC6BC418F4
32,805,724 UART: Caliptra RT
32,806,422 UART: [state] CFI Enabled
32,923,431 UART: [rt] RT listening for mailbox commands...
32,925,359 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,955,465 UART: [rt]cmd =0x44504543, len=28
33,005,992 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,125,288 ready_for_fw is high
4,125,876 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,064,589 >>> mbox cmd response: success
23,696,859 UART:
23,697,259 UART: Running Caliptra FMC ...
23,698,386 UART:
23,698,541 UART: [state] CFI Enabled
23,706,615 UART: [fht] FMC Alias Private Key: 7
26,037,019 UART: [art] Extend RT PCRs Done
26,038,250 UART: [art] Lock RT PCRs Done
26,040,257 UART: [art] Populate DV Done
26,045,399 UART: [fht] FMC Alias Private Key: 7
26,046,942 UART: [art] Derive CDI
26,047,763 UART: [art] Store in in slot 0x4
26,090,270 UART: [art] Derive Key Pair
26,091,277 UART: [art] Store priv key in slot 0x5
29,333,265 UART: [art] Derive Key Pair - Done
29,346,502 UART: [art] Signing Cert with AUTHO
29,347,811 UART: RITY.KEYID = 7
31,627,307 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,813 UART: [art] PUB.X = DB095680A77A9B5299BB7519467E3776FCCB6F4803B4A8E0119081FDF1755DEFCA19DDD15A38287E3E2C95C751841092
31,636,044 UART: [art] PUB.Y = 87DF30E686084EFD4E86117402EDB939CEF2106FD044E4EFC47A519805E735E1DF9E0DAB9A7738A811666D2828234443
31,643,322 UART: [art] SIG.R = 1EF7766A8E834D7A972FC83417CA74E3345F2C260522769F7B39481A0D2ED01FAD9DF88737E8F3A0B6812BC3C05038EE
31,650,636 UART: [art] SIG.S = 0145392A932386A2A80DD788477D7DE127B056812B74595EF58DE0374F086B65DCA16F72DBB33EF530F4F8745A367EF9
32,956,255 UART: Caliptra RT
32,956,949 UART: [state] CFI Enabled
33,074,205 UART: [rt] RT listening for mailbox commands...
33,076,166 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,106,360 UART: [rt]cmd =0x44504543, len=28
33,157,303 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,481 UART:
192,853 UART: Running Caliptra ROM ...
194,060 UART:
194,231 UART: [state] CFI Enabled
266,169 UART: [state] LifecycleState = Unprovisioned
268,007 UART: [state] DebugLocked = No
270,260 UART: [state] WD Timer not started. Device not locked for debugging
274,173 UART: [kat] SHA2-256
453,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,879 UART: [kat] ++
465,411 UART: [kat] sha1
476,149 UART: [kat] SHA2-256
479,161 UART: [kat] SHA2-384
484,798 UART: [kat] SHA2-512-ACC
487,807 UART: [kat] ECC-384
2,949,988 UART: [kat] HMAC-384Kdf
2,964,573 UART: [kat] LMS
3,494,042 UART: [kat] --
3,497,192 UART: [cold-reset] ++
3,498,985 UART: [fht] FHT @ 0x50003400
3,509,899 UART: [idev] ++
3,510,463 UART: [idev] CDI.KEYID = 6
3,511,379 UART: [idev] SUBJECT.KEYID = 7
3,512,642 UART: [idev] UDS.KEYID = 0
3,513,567 ready_for_fw is high
3,513,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,657,603 UART: [idev] Erasing UDS.KEYID = 0
6,022,441 UART: [idev] Sha1 KeyId Algorithm
6,046,652 UART: [idev] --
6,050,546 UART: [ldev] ++
6,051,116 UART: [ldev] CDI.KEYID = 6
6,052,001 UART: [ldev] SUBJECT.KEYID = 5
6,053,219 UART: [ldev] AUTHORITY.KEYID = 7
6,054,458 UART: [ldev] FE.KEYID = 1
6,094,269 UART: [ldev] Erasing FE.KEYID = 1
8,598,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,705 UART: [ldev] --
10,405,890 UART: [fwproc] Wait for Commands...
10,408,798 UART: [fwproc] Recv command 0x46574c44
10,410,899 UART: [fwproc] Recv'd Img size: 114360 bytes
13,809,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,263,368 >>> mbox cmd response: success
14,268,216 UART: [afmc] ++
14,268,816 UART: [afmc] CDI.KEYID = 6
14,269,732 UART: [afmc] SUBJECT.KEYID = 7
14,270,895 UART: [afmc] AUTHORITY.KEYID = 5
16,797,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,523,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,525,384 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,541,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,557,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,573,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,594,109 UART: [afmc] --
18,598,407 UART: [cold-reset] --
18,601,990 UART: [state] Locking Datavault
18,608,314 UART: [state] Locking PCR0, PCR1 and PCR31
18,610,012 UART: [state] Locking ICCM
18,612,323 UART: [exit] Launching FMC @ 0x40000130
18,620,718 UART:
18,620,953 UART: Running Caliptra FMC ...
18,622,052 UART:
18,622,214 UART: [state] CFI Enabled
18,682,097 UART: [fht] FMC Alias Private Key: 7
20,446,554 UART: [art] Extend RT PCRs Done
20,447,773 UART: [art] Lock RT PCRs Done
20,449,387 UART: [art] Populate DV Done
20,454,689 UART: [fht] FMC Alias Private Key: 7
20,456,238 UART: [art] Derive CDI
20,456,973 UART: [art] Store in in slot 0x4
20,514,558 UART: [art] Derive Key Pair
20,515,595 UART: [art] Store priv key in slot 0x5
22,978,351 UART: [art] Derive Key Pair - Done
22,991,462 UART: [art] Signing Cert with AUTHO
22,992,812 UART: RITY.KEYID = 7
24,704,491 UART: [art] Erasing AUTHORITY.KEYID = 7
24,705,982 UART: [art] PUB.X = 60D012E2CC815246D3DC7C1A41281AE1865EBDE89D02DD01D46E1DEC93F9F88333022B81169AF184C0F8EA839399423C
24,713,309 UART: [art] PUB.Y = 87D77E2627C7F3FD9B09E0A2DAF7F4163C23F3C0030DA280FD40659164BDECAB06F93B8DE73FB23EE25BFFAC84DD0B44
24,720,568 UART: [art] SIG.R = 120EF10A37617731013BBA607BCFCE7AAAD8ABE3ED036EA0FE1AF9D3F22770867D18F89B33DBB89691A79325A1996C15
24,727,929 UART: [art] SIG.S = 0408078DE5D15D5B095C6CF580D0AF77BD4C1C521B16506FE5CA8B586FA28E1CA39C23BB86D27143AD4A7C80F99FD21C
25,706,674 UART: Caliptra RT
25,707,392 UART: [state] CFI Enabled
25,873,855 UART: [rt] RT listening for mailbox commands...
25,875,785 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,905,758 UART: [rt]cmd =0x44504543, len=28
25,956,585 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,559 UART:
192,932 UART: Running Caliptra ROM ...
194,128 UART:
194,290 UART: [state] CFI Enabled
264,612 UART: [state] LifecycleState = Unprovisioned
267,014 UART: [state] DebugLocked = No
269,484 UART: [state] WD Timer not started. Device not locked for debugging
274,585 UART: [kat] SHA2-256
464,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,262 UART: [kat] ++
475,748 UART: [kat] sha1
488,327 UART: [kat] SHA2-256
491,333 UART: [kat] SHA2-384
497,751 UART: [kat] SHA2-512-ACC
500,332 UART: [kat] ECC-384
2,950,683 UART: [kat] HMAC-384Kdf
2,972,268 UART: [kat] LMS
3,504,058 UART: [kat] --
3,506,449 UART: [cold-reset] ++
3,507,393 UART: [fht] FHT @ 0x50003400
3,518,300 UART: [idev] ++
3,519,008 UART: [idev] CDI.KEYID = 6
3,519,897 UART: [idev] SUBJECT.KEYID = 7
3,521,142 UART: [idev] UDS.KEYID = 0
3,522,042 ready_for_fw is high
3,522,252 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,184 UART: [idev] Erasing UDS.KEYID = 0
6,026,827 UART: [idev] Sha1 KeyId Algorithm
6,048,917 UART: [idev] --
6,054,257 UART: [ldev] ++
6,054,939 UART: [ldev] CDI.KEYID = 6
6,055,841 UART: [ldev] SUBJECT.KEYID = 5
6,057,057 UART: [ldev] AUTHORITY.KEYID = 7
6,058,187 UART: [ldev] FE.KEYID = 1
6,100,744 UART: [ldev] Erasing FE.KEYID = 1
8,602,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,962 UART: [ldev] --
10,391,740 UART: [fwproc] Wait for Commands...
10,393,353 UART: [fwproc] Recv command 0x46574c44
10,395,664 UART: [fwproc] Recv'd Img size: 114360 bytes
13,843,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,033,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,575,384 >>> mbox cmd response: success
14,579,336 UART: [afmc] ++
14,580,046 UART: [afmc] CDI.KEYID = 6
14,581,213 UART: [afmc] SUBJECT.KEYID = 7
14,582,705 UART: [afmc] AUTHORITY.KEYID = 5
17,110,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,834,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,836,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,851,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,866,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,881,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,905,782 UART: [afmc] --
18,909,908 UART: [cold-reset] --
18,914,762 UART: [state] Locking Datavault
18,920,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,922,502 UART: [state] Locking ICCM
18,924,350 UART: [exit] Launching FMC @ 0x40000130
18,932,983 UART:
18,933,221 UART: Running Caliptra FMC ...
18,934,323 UART:
18,934,484 UART: [state] CFI Enabled
18,990,462 UART: [fht] FMC Alias Private Key: 7
20,754,280 UART: [art] Extend RT PCRs Done
20,755,502 UART: [art] Lock RT PCRs Done
20,757,213 UART: [art] Populate DV Done
20,762,786 UART: [fht] FMC Alias Private Key: 7
20,764,325 UART: [art] Derive CDI
20,765,140 UART: [art] Store in in slot 0x4
20,823,326 UART: [art] Derive Key Pair
20,824,362 UART: [art] Store priv key in slot 0x5
23,287,299 UART: [art] Derive Key Pair - Done
23,300,504 UART: [art] Signing Cert with AUTHO
23,301,832 UART: RITY.KEYID = 7
25,013,502 UART: [art] Erasing AUTHORITY.KEYID = 7
25,015,017 UART: [art] PUB.X = 8C5F8068B268CD7F55B6B381AD5DF983BC28CB6BC2309068144F1797E715FEA05E446EF7DF847D738E7610E716AF712D
25,022,298 UART: [art] PUB.Y = 7F5717D1670E2C92DF4137D758549B1AF722E396C44089F13BE1FFEF48A19D417D0689C9A54C2DA3C27B587CE8A09C3A
25,029,562 UART: [art] SIG.R = BADDFED53DE4368018A079620763B36F1D8762AD2CE85EF2F950B3E22EDC591E60B8A0D0B8D2AF650D37D197817F884E
25,036,935 UART: [art] SIG.S = 469B7890E2BEBBD6D3C9399DCF82534DAE2D667571C3FDEECDA021430FF9B59E1D5CB5AEAC099CE4BF5BEE2295F71E22
26,015,724 UART: Caliptra RT
26,016,434 UART: [state] CFI Enabled
26,181,249 UART: [rt] RT listening for mailbox commands...
26,183,340 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,213,290 UART: [rt]cmd =0x44504543, len=28
26,263,624 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,438,267 ready_for_fw is high
3,438,841 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,729,290 >>> mbox cmd response: success
19,046,282 UART:
19,046,716 UART: Running Caliptra FMC ...
19,047,927 UART:
19,048,104 UART: [state] CFI Enabled
19,113,517 UART: [fht] FMC Alias Private Key: 7
20,877,818 UART: [art] Extend RT PCRs Done
20,879,041 UART: [art] Lock RT PCRs Done
20,880,588 UART: [art] Populate DV Done
20,886,378 UART: [fht] FMC Alias Private Key: 7
20,888,026 UART: [art] Derive CDI
20,888,769 UART: [art] Store in in slot 0x4
20,945,760 UART: [art] Derive Key Pair
20,946,800 UART: [art] Store priv key in slot 0x5
23,409,252 UART: [art] Derive Key Pair - Done
23,421,829 UART: [art] Signing Cert with AUTHO
23,423,137 UART: RITY.KEYID = 7
25,134,586 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,113 UART: [art] PUB.X = C3C98298E0FDD54C61E04F96EF2E770A34DE65D048D9C77DA1E2E85C6910A8453334BB57A3046FD4F34F20AAFAFFFE9A
25,143,394 UART: [art] PUB.Y = 8C537EA1DCA14E159C0AB61DD6B7C889B32F031B5C91BB5B4B88687C4130E11B5172813E1B3CEDAE1F1DA166A7CBCF8A
25,150,672 UART: [art] SIG.R = D8947C3DBC489FD004E0EF83BB10F93361D1541EFE2DB0D899D315F3BC28EFFCFEE1C98982C1CCABE465B032469546A8
25,158,089 UART: [art] SIG.S = 9B37713E6C26149A0B09AA73D245233F809A2429442E780D7CD1BF1AAE089A89728AEDC7321C41AD6218F658272C7BD4
26,136,954 UART: Caliptra RT
26,137,678 UART: [state] CFI Enabled
26,301,612 UART: [rt] RT listening for mailbox commands...
26,303,540 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,333,445 UART: [rt]cmd =0x44504543, len=28
26,383,799 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,513 UART:
192,882 UART: Running Caliptra ROM ...
194,082 UART:
603,486 UART: [state] CFI Enabled
619,438 UART: [state] LifecycleState = Unprovisioned
621,808 UART: [state] DebugLocked = No
623,824 UART: [state] WD Timer not started. Device not locked for debugging
628,429 UART: [kat] SHA2-256
818,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,075 UART: [kat] ++
829,607 UART: [kat] sha1
841,118 UART: [kat] SHA2-256
844,194 UART: [kat] SHA2-384
850,323 UART: [kat] SHA2-512-ACC
852,899 UART: [kat] ECC-384
3,294,868 UART: [kat] HMAC-384Kdf
3,307,903 UART: [kat] LMS
3,839,763 UART: [kat] --
3,842,277 UART: [cold-reset] ++
3,844,772 UART: [fht] FHT @ 0x50003400
3,856,029 UART: [idev] ++
3,856,672 UART: [idev] CDI.KEYID = 6
3,857,703 UART: [idev] SUBJECT.KEYID = 7
3,858,876 UART: [idev] UDS.KEYID = 0
3,860,065 ready_for_fw is high
3,860,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,989 UART: [idev] Erasing UDS.KEYID = 0
6,336,341 UART: [idev] Sha1 KeyId Algorithm
6,359,516 UART: [idev] --
6,363,666 UART: [ldev] ++
6,364,338 UART: [ldev] CDI.KEYID = 6
6,365,289 UART: [ldev] SUBJECT.KEYID = 5
6,366,444 UART: [ldev] AUTHORITY.KEYID = 7
6,367,629 UART: [ldev] FE.KEYID = 1
6,378,640 UART: [ldev] Erasing FE.KEYID = 1
8,857,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,533 UART: [ldev] --
10,646,328 UART: [fwproc] Wait for Commands...
10,648,373 UART: [fwproc] Recv command 0x46574c44
10,650,622 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,021 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,839,311 >>> mbox cmd response: success
14,842,465 UART: [afmc] ++
14,843,226 UART: [afmc] CDI.KEYID = 6
14,844,328 UART: [afmc] SUBJECT.KEYID = 7
14,845,859 UART: [afmc] AUTHORITY.KEYID = 5
17,350,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,749 UART: [afmc] --
19,146,246 UART: [cold-reset] --
19,150,161 UART: [state] Locking Datavault
19,156,321 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,501 UART: [state] Locking ICCM
19,160,427 UART: [exit] Launching FMC @ 0x40000130
19,169,096 UART:
19,169,339 UART: Running Caliptra FMC ...
19,170,439 UART:
19,170,593 UART: [state] CFI Enabled
19,179,175 UART: [fht] FMC Alias Private Key: 7
20,935,666 UART: [art] Extend RT PCRs Done
20,936,896 UART: [art] Lock RT PCRs Done
20,938,774 UART: [art] Populate DV Done
20,944,072 UART: [fht] FMC Alias Private Key: 7
20,945,563 UART: [art] Derive CDI
20,946,295 UART: [art] Store in in slot 0x4
20,989,415 UART: [art] Derive Key Pair
20,990,427 UART: [art] Store priv key in slot 0x5
23,417,156 UART: [art] Derive Key Pair - Done
23,430,144 UART: [art] Signing Cert with AUTHO
23,431,493 UART: RITY.KEYID = 7
25,136,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,453 UART: [art] PUB.X = C880F522996ADFC67E2EE7712578636EA8D911BA358DBC81E24A41B905851062BC6E70868654A207B3867054860125BC
25,145,651 UART: [art] PUB.Y = 00EE309AC900A879073FF0161A1CD50A07280C94640039260D6DC3EF30575BE58A769E49E6914E033B5DBC312B1E0F39
25,152,828 UART: [art] SIG.R = 3BE6205C42C80E97293CDD7CD975536A21AF129E35F1642029B8374EA23608FDF47504E9C22D925134EA97FD385C3A90
25,160,228 UART: [art] SIG.S = 5CAEC4CB1A4899CF827F42C48F81F8ED94D9103F8B7465F13B212027737B92B8A2B36069C2479AF555EC40F74EB47FC6
26,139,504 UART: Caliptra RT
26,140,211 UART: [state] CFI Enabled
26,258,207 UART: [rt] RT listening for mailbox commands...
26,260,133 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,290,049 UART: [rt]cmd =0x44504543, len=28
26,340,717 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,756,687 ready_for_fw is high
3,757,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,961,748 >>> mbox cmd response: success
19,216,358 UART:
19,216,742 UART: Running Caliptra FMC ...
19,217,833 UART:
19,217,983 UART: [state] CFI Enabled
19,225,872 UART: [fht] FMC Alias Private Key: 7
20,982,746 UART: [art] Extend RT PCRs Done
20,983,967 UART: [art] Lock RT PCRs Done
20,985,535 UART: [art] Populate DV Done
20,990,792 UART: [fht] FMC Alias Private Key: 7
20,992,503 UART: [art] Derive CDI
20,993,320 UART: [art] Store in in slot 0x4
21,035,871 UART: [art] Derive Key Pair
21,036,916 UART: [art] Store priv key in slot 0x5
23,463,584 UART: [art] Derive Key Pair - Done
23,476,474 UART: [art] Signing Cert with AUTHO
23,477,790 UART: RITY.KEYID = 7
25,183,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,760 UART: [art] PUB.X = 4FC38FD6A58CB7605171BBA51CD3E1B99DB4DE03D42B2A8E923C66AB0642CCD9F9087472DE8E34D4DE04F9E24DB982BC
25,192,041 UART: [art] PUB.Y = 3A835F072C1BED29ABAC10CB0EE0DA0B36B4D284841FD163FB35BBCC4C762735F8266C506DFAC17A8FF62A21399A7499
25,199,317 UART: [art] SIG.R = E74C900BC40A8D8632675752EAC31E0E35DE2F6812131762340163EE3A8A3972FDB0E377ACFD19E9BD0DA196DAD75128
25,206,672 UART: [art] SIG.S = F5D470DF4FE648DF3482236A5F1F6F9D4308421A474969E7930031A829DF31B4072799C52B89A6B9C372502A8CE32EC0
26,185,637 UART: Caliptra RT
26,186,359 UART: [state] CFI Enabled
26,303,858 UART: [rt] RT listening for mailbox commands...
26,305,920 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,335,875 UART: [rt]cmd =0x44504543, len=28
26,386,594 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,137 UART: [kat] SHA2-256
882,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,183 UART: [kat] ++
886,335 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,380 UART: [kat] LMS
1,475,576 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,692 UART: [idev] ++
1,479,860 UART: [idev] CDI.KEYID = 6
1,480,220 UART: [idev] SUBJECT.KEYID = 7
1,480,644 UART: [idev] UDS.KEYID = 0
1,480,989 ready_for_fw is high
1,480,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,750 UART: [idev] Erasing UDS.KEYID = 0
1,505,920 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,652 UART: [idev] --
1,515,669 UART: [ldev] ++
1,515,837 UART: [ldev] CDI.KEYID = 6
1,516,200 UART: [ldev] SUBJECT.KEYID = 5
1,516,626 UART: [ldev] AUTHORITY.KEYID = 7
1,517,089 UART: [ldev] FE.KEYID = 1
1,522,221 UART: [ldev] Erasing FE.KEYID = 1
1,547,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,184 UART: [ldev] --
1,586,485 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 114360 bytes
2,887,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,382 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,735 >>> mbox cmd response: success
3,080,767 UART: [afmc] ++
3,080,935 UART: [afmc] CDI.KEYID = 6
3,081,297 UART: [afmc] SUBJECT.KEYID = 7
3,081,722 UART: [afmc] AUTHORITY.KEYID = 5
3,116,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,402 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,092 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,177 UART: [afmc] --
3,160,147 UART: [cold-reset] --
3,161,049 UART: [state] Locking Datavault
3,162,284 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,888 UART: [state] Locking ICCM
3,163,538 UART: [exit] Launching FMC @ 0x40000130
3,168,867 UART:
3,168,883 UART: Running Caliptra FMC ...
3,169,291 UART:
3,169,345 UART: [state] CFI Enabled
3,179,644 UART: [fht] FMC Alias Private Key: 7
3,287,795 UART: [art] Extend RT PCRs Done
3,288,223 UART: [art] Lock RT PCRs Done
3,289,867 UART: [art] Populate DV Done
3,298,180 UART: [fht] FMC Alias Private Key: 7
3,299,358 UART: [art] Derive CDI
3,299,638 UART: [art] Store in in slot 0x4
3,385,293 UART: [art] Derive Key Pair
3,385,653 UART: [art] Store priv key in slot 0x5
3,398,083 UART: [art] Derive Key Pair - Done
3,412,852 UART: [art] Signing Cert with AUTHO
3,413,332 UART: RITY.KEYID = 7
3,428,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,777 UART: [art] PUB.X = 63F28058BFC5E2EAC4C62CCFB1AD8FBC04DDB6D030839A367B08B0D562817AD4F3056F576B8740D63B10893E5A6801AB
3,435,547 UART: [art] PUB.Y = A9B2592A9B0392847F21351A7DAF149DE3D2F6258ED387CB2937ECC18DDF5D9B8D87ED99237ADFC19B0A827FD4A25A5D
3,442,507 UART: [art] SIG.R = C47C3B7853FFBC2DBECB305F1702A85BF1EAB64AFC6B4830C00E49A6A63E13DBEA2AE5662A727BDE91F240FF57C7CF1B
3,449,299 UART: [art] SIG.S = D60793DA92A3C5260EF1C517AADC7E3F8E5437F4B6795514BEEB18887E04884574A8EA9948AF7C13833110141BD450F7
3,473,193 UART: Caliptra RT
3,473,447 UART: [state] CFI Enabled
3,581,606 UART: [rt] RT listening for mailbox commands...
3,582,276 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,903 UART: [rt]cmd =0x44504543, len=28
3,662,701 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,645 ready_for_fw is high
1,362,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,977 >>> mbox cmd response: success
2,987,749 UART:
2,987,765 UART: Running Caliptra FMC ...
2,988,173 UART:
2,988,227 UART: [state] CFI Enabled
2,998,802 UART: [fht] FMC Alias Private Key: 7
3,106,645 UART: [art] Extend RT PCRs Done
3,107,073 UART: [art] Lock RT PCRs Done
3,108,541 UART: [art] Populate DV Done
3,116,702 UART: [fht] FMC Alias Private Key: 7
3,117,774 UART: [art] Derive CDI
3,118,054 UART: [art] Store in in slot 0x4
3,203,773 UART: [art] Derive Key Pair
3,204,133 UART: [art] Store priv key in slot 0x5
3,217,411 UART: [art] Derive Key Pair - Done
3,232,089 UART: [art] Signing Cert with AUTHO
3,232,569 UART: RITY.KEYID = 7
3,247,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,716 UART: [art] PUB.X = BAD834867EA93C9B3693025A5AB2EFC9F3D58E5E2B5B1EBF888866B4B0F73D05B82C43391A27D79772719AC1604DF5D9
3,255,488 UART: [art] PUB.Y = 404975150E3FB156E0FE1CF1BEB13DD97DD853A7F3A2A42A31DDAA141AF93FD585D1AFC7242C0B2DB15A97CFBBBCED13
3,262,460 UART: [art] SIG.R = A737C12959BD428728750DDC7B8A42E7F30C74A56ADE4558B2E0C762DEDE266ACCE2B03F27FF808B32EE017707EB0F49
3,269,227 UART: [art] SIG.S = 3CF297C654EBD7FBC3F7E299431468DCE3DD1CCFFCCA7E51DF71680270EBF939909FE6F3640E6681790B7D5A0DE49EF3
3,292,336 UART: Caliptra RT
3,292,590 UART: [state] CFI Enabled
3,401,620 UART: [rt] RT listening for mailbox commands...
3,402,290 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,147 UART: [rt]cmd =0x44504543, len=28
3,483,551 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,636 UART: [kat] SHA2-256
882,567 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,682 UART: [kat] ++
886,834 UART: [kat] sha1
890,936 UART: [kat] SHA2-256
892,874 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
903,043 UART: [kat] HMAC-384Kdf
907,749 UART: [kat] LMS
1,475,945 UART: [kat] --
1,476,528 UART: [cold-reset] ++
1,476,944 UART: [fht] Storing FHT @ 0x50003400
1,479,611 UART: [idev] ++
1,479,779 UART: [idev] CDI.KEYID = 6
1,480,139 UART: [idev] SUBJECT.KEYID = 7
1,480,563 UART: [idev] UDS.KEYID = 0
1,480,908 ready_for_fw is high
1,480,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,707 UART: [idev] Erasing UDS.KEYID = 0
1,505,641 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,161 UART: [idev] --
1,515,214 UART: [ldev] ++
1,515,382 UART: [ldev] CDI.KEYID = 6
1,515,745 UART: [ldev] SUBJECT.KEYID = 5
1,516,171 UART: [ldev] AUTHORITY.KEYID = 7
1,516,634 UART: [ldev] FE.KEYID = 1
1,521,832 UART: [ldev] Erasing FE.KEYID = 1
1,547,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,407 UART: [ldev] --
1,586,772 UART: [fwproc] Waiting for Commands...
1,587,461 UART: [fwproc] Received command 0x46574c44
1,588,252 UART: [fwproc] Received Image of size 114360 bytes
2,885,269 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,964 >>> mbox cmd response: success
3,079,134 UART: [afmc] ++
3,079,302 UART: [afmc] CDI.KEYID = 6
3,079,664 UART: [afmc] SUBJECT.KEYID = 7
3,080,089 UART: [afmc] AUTHORITY.KEYID = 5
3,114,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,138 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,531 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,221 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,122 UART: [afmc] --
3,158,208 UART: [cold-reset] --
3,159,032 UART: [state] Locking Datavault
3,160,031 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,635 UART: [state] Locking ICCM
3,161,303 UART: [exit] Launching FMC @ 0x40000130
3,166,632 UART:
3,166,648 UART: Running Caliptra FMC ...
3,167,056 UART:
3,167,199 UART: [state] CFI Enabled
3,177,974 UART: [fht] FMC Alias Private Key: 7
3,286,215 UART: [art] Extend RT PCRs Done
3,286,643 UART: [art] Lock RT PCRs Done
3,288,089 UART: [art] Populate DV Done
3,296,338 UART: [fht] FMC Alias Private Key: 7
3,297,480 UART: [art] Derive CDI
3,297,760 UART: [art] Store in in slot 0x4
3,383,865 UART: [art] Derive Key Pair
3,384,225 UART: [art] Store priv key in slot 0x5
3,397,415 UART: [art] Derive Key Pair - Done
3,412,256 UART: [art] Signing Cert with AUTHO
3,412,736 UART: RITY.KEYID = 7
3,427,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,605 UART: [art] PUB.X = D2786FF2A7F4804152A05E4DCF734F78B3C80BAE7A25D76C0695BEB2E9D55D052CB6B77A76291F4AEB30FBDB881570D1
3,435,380 UART: [art] PUB.Y = 218585CBB121493185A1765618065464CD4325450E51ADCAD8508BE567DE180589419BEE9D3C7C5BF915A52C828E0ED1
3,442,314 UART: [art] SIG.R = B7338A47EEBDB9020D76F43BDA93CF8189AE3D3AE41C4E991E67DDE2CA1DFB12BFF089686161DB3A9C45C61CB1B9B5C0
3,449,102 UART: [art] SIG.S = 8317033754C75C823281A360C9F72F792CA07FC5A28E96730ADA6151DC67489B9844D53B849D44B6DA6EE392F206EAE4
3,473,426 UART: Caliptra RT
3,473,772 UART: [state] CFI Enabled
3,581,267 UART: [rt] RT listening for mailbox commands...
3,581,937 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,622 UART: [rt]cmd =0x44504543, len=28
3,662,910 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 ready_for_fw is high
1,363,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,824 >>> mbox cmd response: success
2,988,814 UART:
2,988,830 UART: Running Caliptra FMC ...
2,989,238 UART:
2,989,381 UART: [state] CFI Enabled
3,000,126 UART: [fht] FMC Alias Private Key: 7
3,108,305 UART: [art] Extend RT PCRs Done
3,108,733 UART: [art] Lock RT PCRs Done
3,110,203 UART: [art] Populate DV Done
3,118,308 UART: [fht] FMC Alias Private Key: 7
3,119,450 UART: [art] Derive CDI
3,119,730 UART: [art] Store in in slot 0x4
3,205,487 UART: [art] Derive Key Pair
3,205,847 UART: [art] Store priv key in slot 0x5
3,218,821 UART: [art] Derive Key Pair - Done
3,233,899 UART: [art] Signing Cert with AUTHO
3,234,379 UART: RITY.KEYID = 7
3,249,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,644 UART: [art] PUB.X = 861054E6D9F3B1A1120741C4C05A88EBA464EC7CCEC5CCEE431C16BC77372E338561243B7B70728BC5025B35117A3F0F
3,257,409 UART: [art] PUB.Y = BCA465F151DE7D1F09177C1B3329F20CDF3D03A2BD544B3262AFB665231BA32DAAEC87778B9B75453BFC23278B797D51
3,264,360 UART: [art] SIG.R = 8A866D507FCBC79F33B56C8317D4B91770C08E39581A10E31493B4E906210AB655A07B494B9D65EDAE9E6E4969F48999
3,271,122 UART: [art] SIG.S = 5A5791A0AA1B65C745FDB3417E5A5B37DAAFFB956168CA369A321F7B8655905D983AF88109169A9FE44724B700EA0525
3,294,761 UART: Caliptra RT
3,295,107 UART: [state] CFI Enabled
3,403,495 UART: [rt] RT listening for mailbox commands...
3,404,165 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,988 UART: [rt]cmd =0x44504543, len=28
3,485,002 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,502 UART: [kat] SHA2-512-ACC
908,403 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,171,875 UART: [cold-reset] ++
1,172,339 UART: [fht] FHT @ 0x50003400
1,174,970 UART: [idev] ++
1,175,138 UART: [idev] CDI.KEYID = 6
1,175,498 UART: [idev] SUBJECT.KEYID = 7
1,175,922 UART: [idev] UDS.KEYID = 0
1,176,267 ready_for_fw is high
1,176,267 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,578 UART: [idev] Erasing UDS.KEYID = 0
1,201,155 UART: [idev] Sha1 KeyId Algorithm
1,209,541 UART: [idev] --
1,210,521 UART: [ldev] ++
1,210,689 UART: [ldev] CDI.KEYID = 6
1,211,052 UART: [ldev] SUBJECT.KEYID = 5
1,211,478 UART: [ldev] AUTHORITY.KEYID = 7
1,211,941 UART: [ldev] FE.KEYID = 1
1,217,027 UART: [ldev] Erasing FE.KEYID = 1
1,243,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,282,904 UART: [fwproc] Recv command 0x46574c44
1,283,632 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,838 >>> mbox cmd response: success
2,774,962 UART: [afmc] ++
2,775,130 UART: [afmc] CDI.KEYID = 6
2,775,492 UART: [afmc] SUBJECT.KEYID = 7
2,775,917 UART: [afmc] AUTHORITY.KEYID = 5
2,811,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,201 UART: [afmc] --
2,855,175 UART: [cold-reset] --
2,856,175 UART: [state] Locking Datavault
2,857,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,162 UART: [state] Locking ICCM
2,858,684 UART: [exit] Launching FMC @ 0x40000130
2,864,013 UART:
2,864,029 UART: Running Caliptra FMC ...
2,864,437 UART:
2,864,491 UART: [state] CFI Enabled
2,875,000 UART: [fht] FMC Alias Private Key: 7
2,983,537 UART: [art] Extend RT PCRs Done
2,983,965 UART: [art] Lock RT PCRs Done
2,985,503 UART: [art] Populate DV Done
2,993,648 UART: [fht] FMC Alias Private Key: 7
2,994,750 UART: [art] Derive CDI
2,995,030 UART: [art] Store in in slot 0x4
3,080,743 UART: [art] Derive Key Pair
3,081,103 UART: [art] Store priv key in slot 0x5
3,094,403 UART: [art] Derive Key Pair - Done
3,109,284 UART: [art] Signing Cert with AUTHO
3,109,764 UART: RITY.KEYID = 7
3,125,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,847 UART: [art] PUB.X = B4B934A7138A6696D6285BF12B9A13CDA939CB90C7701CDD60820643CA2FAFE53C5B0416A965377A3AE06540D550920D
3,132,610 UART: [art] PUB.Y = F82F87EF2552FCA20AE6F0AE0893005A69B5F7EBE390EDD104EE43C5272A1712986B391A8982E71749170F05D007BEE3
3,139,524 UART: [art] SIG.R = F5CF7249654EE01CF97B8DBD2A963921C740864BCCD7910EEEC7ABEAD9E6E10EA5382E254B7D9582D50713DA1515309A
3,146,297 UART: [art] SIG.S = 31DA44DE0B984DD6794D4BB5B1B6C5860991716CFE2FCA365F1F0A1E319590C40CD9C2027ED8F821688C5A0DD99F2637
3,170,038 UART: Caliptra RT
3,170,292 UART: [state] CFI Enabled
3,278,474 UART: [rt] RT listening for mailbox commands...
3,279,144 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,647 UART: [rt]cmd =0x44504543, len=28
3,359,963 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,601 ready_for_fw is high
1,060,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,029 >>> mbox cmd response: success
2,688,943 UART:
2,688,959 UART: Running Caliptra FMC ...
2,689,367 UART:
2,689,421 UART: [state] CFI Enabled
2,699,538 UART: [fht] FMC Alias Private Key: 7
2,807,483 UART: [art] Extend RT PCRs Done
2,807,911 UART: [art] Lock RT PCRs Done
2,809,545 UART: [art] Populate DV Done
2,817,756 UART: [fht] FMC Alias Private Key: 7
2,818,936 UART: [art] Derive CDI
2,819,216 UART: [art] Store in in slot 0x4
2,905,059 UART: [art] Derive Key Pair
2,905,419 UART: [art] Store priv key in slot 0x5
2,918,183 UART: [art] Derive Key Pair - Done
2,932,840 UART: [art] Signing Cert with AUTHO
2,933,320 UART: RITY.KEYID = 7
2,948,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,393 UART: [art] PUB.X = 263DF0D3C72CA816FEBF3289508B810DBBE3EBAEA2872CC004BAC080FF179D7F726189E56DAC9E8303E5EF78C7F2D1DB
2,956,176 UART: [art] PUB.Y = 8B928D89E1F70265F3EE58AE79D04F89C5ADB7F19DB536FDFFF9E664E63F62F2CB6C414B96D150A75AC50B821796FDFD
2,963,138 UART: [art] SIG.R = 1737AFF2CDB5FBAA575CF51322796EA32747F9F3583BBF440A5516D455C33B8C4033C8FD0EB3F07B20E290D161BA1E77
2,969,912 UART: [art] SIG.S = 959A54CCFF5E6362FCEE5583839D71FB1A4E192A473D961AA457AF8CA7B57A861539204AEFB250DC5CC7F18B0CCD22D1
2,993,880 UART: Caliptra RT
2,994,134 UART: [state] CFI Enabled
3,101,842 UART: [rt] RT listening for mailbox commands...
3,102,512 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,101 UART: [rt]cmd =0x44504543, len=28
3,183,111 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
893,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,992 UART: [kat] ++
898,144 UART: [kat] sha1
902,294 UART: [kat] SHA2-256
904,234 UART: [kat] SHA2-384
907,051 UART: [kat] SHA2-512-ACC
908,952 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,527 UART: [kat] LMS
1,171,855 UART: [kat] --
1,172,610 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,653 UART: [idev] ++
1,175,821 UART: [idev] CDI.KEYID = 6
1,176,181 UART: [idev] SUBJECT.KEYID = 7
1,176,605 UART: [idev] UDS.KEYID = 0
1,176,950 ready_for_fw is high
1,176,950 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,172 UART: [idev] Sha1 KeyId Algorithm
1,209,632 UART: [idev] --
1,210,900 UART: [ldev] ++
1,211,068 UART: [ldev] CDI.KEYID = 6
1,211,431 UART: [ldev] SUBJECT.KEYID = 5
1,211,857 UART: [ldev] AUTHORITY.KEYID = 7
1,212,320 UART: [ldev] FE.KEYID = 1
1,217,736 UART: [ldev] Erasing FE.KEYID = 1
1,244,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,040 UART: [ldev] --
1,283,501 UART: [fwproc] Wait for Commands...
1,284,205 UART: [fwproc] Recv command 0x46574c44
1,284,933 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,336 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,111 >>> mbox cmd response: success
2,777,307 UART: [afmc] ++
2,777,475 UART: [afmc] CDI.KEYID = 6
2,777,837 UART: [afmc] SUBJECT.KEYID = 7
2,778,262 UART: [afmc] AUTHORITY.KEYID = 5
2,814,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,682 UART: [afmc] --
2,857,640 UART: [cold-reset] --
2,858,630 UART: [state] Locking Datavault
2,859,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,413 UART: [state] Locking ICCM
2,861,049 UART: [exit] Launching FMC @ 0x40000130
2,866,378 UART:
2,866,394 UART: Running Caliptra FMC ...
2,866,802 UART:
2,866,945 UART: [state] CFI Enabled
2,877,244 UART: [fht] FMC Alias Private Key: 7
2,985,605 UART: [art] Extend RT PCRs Done
2,986,033 UART: [art] Lock RT PCRs Done
2,987,479 UART: [art] Populate DV Done
2,995,494 UART: [fht] FMC Alias Private Key: 7
2,996,532 UART: [art] Derive CDI
2,996,812 UART: [art] Store in in slot 0x4
3,082,745 UART: [art] Derive Key Pair
3,083,105 UART: [art] Store priv key in slot 0x5
3,096,509 UART: [art] Derive Key Pair - Done
3,111,496 UART: [art] Signing Cert with AUTHO
3,111,976 UART: RITY.KEYID = 7
3,126,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,611 UART: [art] PUB.X = A6B43C204F1C7586E9907EE78F2ED55DE580999E27A0BF57470EA756FF61CCA62C57E0C3D1F57E2A6C9A728FAF4825CD
3,134,392 UART: [art] PUB.Y = DF23E1988549E77FEC2EED34FE3CEA95D13A51BDFBC24073BAF66B7E3A6B5766841BED82C9304987316EB82542A9C6D3
3,141,356 UART: [art] SIG.R = 16B3236EBDA4B420FC75B8005A4C205214A6E797A78326171BB01C3A189BDE64F10560597C79E0A4B71036BF2E660E47
3,148,096 UART: [art] SIG.S = 9318225C7EDE3E79D9B1D87B7321C1CEC836049A5CFF828E3FB6CC62558E5A6905CFC3361DD1952E282F74D2F72C2DF1
3,172,251 UART: Caliptra RT
3,172,597 UART: [state] CFI Enabled
3,279,807 UART: [rt] RT listening for mailbox commands...
3,280,477 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,332 UART: [rt]cmd =0x44504543, len=28
3,361,204 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,368 ready_for_fw is high
1,060,368 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,718 >>> mbox cmd response: success
2,690,156 UART:
2,690,172 UART: Running Caliptra FMC ...
2,690,580 UART:
2,690,723 UART: [state] CFI Enabled
2,701,314 UART: [fht] FMC Alias Private Key: 7
2,808,767 UART: [art] Extend RT PCRs Done
2,809,195 UART: [art] Lock RT PCRs Done
2,810,455 UART: [art] Populate DV Done
2,818,734 UART: [fht] FMC Alias Private Key: 7
2,819,676 UART: [art] Derive CDI
2,819,956 UART: [art] Store in in slot 0x4
2,905,769 UART: [art] Derive Key Pair
2,906,129 UART: [art] Store priv key in slot 0x5
2,919,553 UART: [art] Derive Key Pair - Done
2,934,230 UART: [art] Signing Cert with AUTHO
2,934,710 UART: RITY.KEYID = 7
2,949,660 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,425 UART: [art] PUB.X = AC9074098F248070B7F7B4DB6A6B87D3E270C2D0875ECCB55F2A6560604F9584C2B0858F831151285FBB2478D71004E5
2,957,185 UART: [art] PUB.Y = E1E0A2633A9284B0965B3E5CE4A18C730A88E22A1C8D8678DEDB21C61F991D9C8EC5FCEFDC52FFFEA9F6D67592DBDB11
2,964,156 UART: [art] SIG.R = 2606BBD575A3A65CADA8DAFEC941DA747AC03AA0684935F89D6805F929BA7BB3BBD6CA91957265376C89E2ED3C51BCDC
2,970,940 UART: [art] SIG.S = FBA68571E517A8F7FB40C36E80BB3AB11BB44F8E9BBC3141551529E2ED58F3E87609897C70F4809599B2AA6D539E2166
2,994,484 UART: Caliptra RT
2,994,830 UART: [state] CFI Enabled
3,102,818 UART: [rt] RT listening for mailbox commands...
3,103,488 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,997 UART: [rt]cmd =0x44504543, len=28
3,184,111 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,300 UART: [kat] HMAC-384Kdf
919,830 UART: [kat] LMS
1,168,142 UART: [kat] --
1,169,035 UART: [cold-reset] ++
1,169,497 UART: [fht] FHT @ 0x50003400
1,172,057 UART: [idev] ++
1,172,225 UART: [idev] CDI.KEYID = 6
1,172,586 UART: [idev] SUBJECT.KEYID = 7
1,173,011 UART: [idev] UDS.KEYID = 0
1,173,357 ready_for_fw is high
1,173,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,197 UART: [idev] Erasing UDS.KEYID = 0
1,197,763 UART: [idev] Sha1 KeyId Algorithm
1,206,485 UART: [idev] --
1,207,590 UART: [ldev] ++
1,207,758 UART: [ldev] CDI.KEYID = 6
1,208,122 UART: [ldev] SUBJECT.KEYID = 5
1,208,549 UART: [ldev] AUTHORITY.KEYID = 7
1,209,012 UART: [ldev] FE.KEYID = 1
1,214,170 UART: [ldev] Erasing FE.KEYID = 1
1,240,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,378 UART: [ldev] --
1,279,692 UART: [fwproc] Wait for Commands...
1,280,451 UART: [fwproc] Recv command 0x46574c44
1,281,184 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,376 >>> mbox cmd response: success
2,772,629 UART: [afmc] ++
2,772,797 UART: [afmc] CDI.KEYID = 6
2,773,160 UART: [afmc] SUBJECT.KEYID = 7
2,773,586 UART: [afmc] AUTHORITY.KEYID = 5
2,808,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,486 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,942 UART: [afmc] --
2,851,866 UART: [cold-reset] --
2,852,988 UART: [state] Locking Datavault
2,853,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,585 UART: [state] Locking ICCM
2,855,015 UART: [exit] Launching FMC @ 0x40000130
2,860,344 UART:
2,860,360 UART: Running Caliptra FMC ...
2,860,768 UART:
2,860,822 UART: [state] CFI Enabled
2,871,537 UART: [fht] FMC Alias Private Key: 7
2,979,922 UART: [art] Extend RT PCRs Done
2,980,350 UART: [art] Lock RT PCRs Done
2,981,700 UART: [art] Populate DV Done
2,990,037 UART: [fht] FMC Alias Private Key: 7
2,991,115 UART: [art] Derive CDI
2,991,395 UART: [art] Store in in slot 0x4
3,077,598 UART: [art] Derive Key Pair
3,077,958 UART: [art] Store priv key in slot 0x5
3,091,088 UART: [art] Derive Key Pair - Done
3,106,016 UART: [art] Signing Cert with AUTHO
3,106,496 UART: RITY.KEYID = 7
3,121,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,547 UART: [art] PUB.X = 04DCCBC3820A41BCECB6561FF0599F790281B24CAEDECE32572BBCF5117014FEE60D01CE0AF2A4F9C2A78BEAC6A15898
3,129,323 UART: [art] PUB.Y = C52890FF2D3F54A9C96BFE517ECD734D857A7A060F242EA72E39DF73B10F0EBEC3E2D00DF004CC19CD77C7F59CDBDDC1
3,136,281 UART: [art] SIG.R = 60CE80202D29E8B47B71D91921EC46816449467CC44C954E31142E194EE2EE75652D732BD882AC10C17D0C8DD428F157
3,143,044 UART: [art] SIG.S = E40DB73C35C016231D0DAF4F9E584BBB8B5BD067B282A6664A822FC7C775931DCE8CF7DF28434F09AE8D4492C1DA8FC6
3,166,506 UART: Caliptra RT
3,166,760 UART: [state] CFI Enabled
3,273,660 UART: [rt] RT listening for mailbox commands...
3,274,330 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,981 UART: [rt]cmd =0x44504543, len=28
3,355,145 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,754 ready_for_fw is high
1,055,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,140 >>> mbox cmd response: success
2,685,480 UART:
2,685,496 UART: Running Caliptra FMC ...
2,685,904 UART:
2,685,958 UART: [state] CFI Enabled
2,696,569 UART: [fht] FMC Alias Private Key: 7
2,803,990 UART: [art] Extend RT PCRs Done
2,804,418 UART: [art] Lock RT PCRs Done
2,805,942 UART: [art] Populate DV Done
2,814,185 UART: [fht] FMC Alias Private Key: 7
2,815,295 UART: [art] Derive CDI
2,815,575 UART: [art] Store in in slot 0x4
2,901,020 UART: [art] Derive Key Pair
2,901,380 UART: [art] Store priv key in slot 0x5
2,914,484 UART: [art] Derive Key Pair - Done
2,929,467 UART: [art] Signing Cert with AUTHO
2,929,947 UART: RITY.KEYID = 7
2,945,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,788 UART: [art] PUB.X = C1587F84E614AE2B33C0285298C8ED6930EF7F4929A14338C263558C0586042CA8CB5A9269A6860C2DD89D8509854D14
2,952,538 UART: [art] PUB.Y = 82D9EE6AC41D82D45467DA69B19435382BCA3D5C5A91F48774A5B3871D98A73DFF51186BE7DBB8C8C31F50ED444A229B
2,959,498 UART: [art] SIG.R = 7D3709A55EB8F320B8B401153AFC88B9F4785688E1CEDF165900054BE1831134D4F2701CBDF13C14BBD62DC5FFFB9CBC
2,966,251 UART: [art] SIG.S = 1ABBC028C6294501481862D60BC2D1288454EBDC2A1F419734AC873AE58C03FF2A57A87B9A6EC1046078CBB44C7381A7
2,989,854 UART: Caliptra RT
2,990,108 UART: [state] CFI Enabled
3,097,814 UART: [rt] RT listening for mailbox commands...
3,098,484 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,207 UART: [rt]cmd =0x44504543, len=28
3,178,973 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,322 UART: [kat] SHA2-256
902,262 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
921,079 UART: [kat] LMS
1,169,391 UART: [kat] --
1,170,236 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 ready_for_fw is high
1,174,604 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,209,171 UART: [ldev] ++
1,209,339 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,242,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,827 UART: [fwproc] Wait for Commands...
1,282,534 UART: [fwproc] Recv command 0x46574c44
1,283,267 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,949 >>> mbox cmd response: success
2,774,968 UART: [afmc] ++
2,775,136 UART: [afmc] CDI.KEYID = 6
2,775,499 UART: [afmc] SUBJECT.KEYID = 7
2,775,925 UART: [afmc] AUTHORITY.KEYID = 5
2,811,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,595 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,207 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,926 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,717 UART: [afmc] --
2,854,817 UART: [cold-reset] --
2,855,477 UART: [state] Locking Datavault
2,856,750 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,354 UART: [state] Locking ICCM
2,857,862 UART: [exit] Launching FMC @ 0x40000130
2,863,191 UART:
2,863,207 UART: Running Caliptra FMC ...
2,863,615 UART:
2,863,758 UART: [state] CFI Enabled
2,874,195 UART: [fht] FMC Alias Private Key: 7
2,982,628 UART: [art] Extend RT PCRs Done
2,983,056 UART: [art] Lock RT PCRs Done
2,984,488 UART: [art] Populate DV Done
2,992,587 UART: [fht] FMC Alias Private Key: 7
2,993,677 UART: [art] Derive CDI
2,993,957 UART: [art] Store in in slot 0x4
3,079,824 UART: [art] Derive Key Pair
3,080,184 UART: [art] Store priv key in slot 0x5
3,093,458 UART: [art] Derive Key Pair - Done
3,108,457 UART: [art] Signing Cert with AUTHO
3,108,937 UART: RITY.KEYID = 7
3,123,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,554 UART: [art] PUB.X = 8A2A3E3CF04BB618338F27E8E04984A3D896ADFDCDF69C03E4746DCA6F05DDAD11175635B2A10AAD67D1C58B03DA4DA6
3,131,332 UART: [art] PUB.Y = D3C00144B78F344F6311E35F681933BD789EAD850496ABDF3A43F9A28483A22F43393F8611EF69CF1302390D708C838E
3,138,266 UART: [art] SIG.R = 47F771CE2FC209A00545EEE338A1DC1DDDB44D410C4C6BA38C1CAEE2F5E5E9FB6D102B8FF13D150B95DC07B1B0488ED5
3,145,045 UART: [art] SIG.S = AA6DB40807FD4A2D11480AD2EB3B7CE65CF8609BDC53AA84698A07BDF85B0864A5436BF55686D7517124AF548FC1E5B9
3,169,267 UART: Caliptra RT
3,169,613 UART: [state] CFI Enabled
3,277,945 UART: [rt] RT listening for mailbox commands...
3,278,615 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,416 UART: [rt]cmd =0x44504543, len=28
3,359,556 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,025 ready_for_fw is high
1,056,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,177 >>> mbox cmd response: success
2,686,215 UART:
2,686,231 UART: Running Caliptra FMC ...
2,686,639 UART:
2,686,782 UART: [state] CFI Enabled
2,697,241 UART: [fht] FMC Alias Private Key: 7
2,804,798 UART: [art] Extend RT PCRs Done
2,805,226 UART: [art] Lock RT PCRs Done
2,807,120 UART: [art] Populate DV Done
2,815,201 UART: [fht] FMC Alias Private Key: 7
2,816,201 UART: [art] Derive CDI
2,816,481 UART: [art] Store in in slot 0x4
2,902,000 UART: [art] Derive Key Pair
2,902,360 UART: [art] Store priv key in slot 0x5
2,915,578 UART: [art] Derive Key Pair - Done
2,930,286 UART: [art] Signing Cert with AUTHO
2,930,766 UART: RITY.KEYID = 7
2,945,920 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,685 UART: [art] PUB.X = 846C16559D10E84862F7B42A70D306996B5CB3D90089C46CB4263225040B8680754A07B3EE57FEE4ED89A060D7E1491E
2,953,415 UART: [art] PUB.Y = C42741E06CEF9263E71F3F6C0505DBF2290A1D3519DC5F194D01BDFBC8112AE111D296EBC00376F29003271ACC0A0F7F
2,960,351 UART: [art] SIG.R = C54410ED29A3B195DF722CC3D45E8958841B6A35050E80EECB59D4A63BFC8DF38B737370DA7FBA62828ACADFB500C8F7
2,967,109 UART: [art] SIG.S = 88EB3EF8E93A48E7625726939ADB838BAFACB0B303EF5DAF0BA0FE749B0EEC313A40F9D066B329FAC7D302AECD3C7EE1
2,990,708 UART: Caliptra RT
2,991,054 UART: [state] CFI Enabled
3,097,893 UART: [rt] RT listening for mailbox commands...
3,098,563 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,176 UART: [rt]cmd =0x44504543, len=28
3,178,946 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,242 writing to cptra_bootfsm_go
193,422 UART:
193,789 UART: Running Caliptra ROM ...
194,978 UART:
195,137 UART: [state] CFI Enabled
268,391 UART: [state] LifecycleState = Unprovisioned
270,375 UART: [state] DebugLocked = No
272,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,395 UART: [kat] SHA2-256
447,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,605 UART: [kat] ++
458,091 UART: [kat] sha1
469,454 UART: [kat] SHA2-256
472,190 UART: [kat] SHA2-384
477,746 UART: [kat] SHA2-512-ACC
480,101 UART: [kat] ECC-384
2,766,067 UART: [kat] HMAC-384Kdf
2,779,535 UART: [kat] LMS
3,969,839 UART: [kat] --
3,974,490 UART: [cold-reset] ++
3,976,699 UART: [fht] Storing FHT @ 0x50003400
3,987,528 UART: [idev] ++
3,988,083 UART: [idev] CDI.KEYID = 6
3,989,108 UART: [idev] SUBJECT.KEYID = 7
3,990,273 UART: [idev] UDS.KEYID = 0
3,991,335 ready_for_fw is high
3,991,550 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,060 UART: [idev] Erasing UDS.KEYID = 0
7,325,665 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,753 UART: [idev] --
7,350,934 UART: [ldev] ++
7,351,489 UART: [ldev] CDI.KEYID = 6
7,352,418 UART: [ldev] SUBJECT.KEYID = 5
7,353,671 UART: [ldev] AUTHORITY.KEYID = 7
7,354,945 UART: [ldev] FE.KEYID = 1
7,400,622 UART: [ldev] Erasing FE.KEYID = 1
10,734,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,910 UART: [ldev] --
13,095,896 UART: [fwproc] Waiting for Commands...
13,098,088 UART: [fwproc] Received command 0x46574c44
13,100,266 UART: [fwproc] Received Image of size 114036 bytes
17,146,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,677 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,582 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,604,133 >>> mbox cmd response: success
17,608,619 UART: [afmc] ++
17,609,215 UART: [afmc] CDI.KEYID = 6
17,610,092 UART: [afmc] SUBJECT.KEYID = 7
17,611,358 UART: [afmc] AUTHORITY.KEYID = 5
20,984,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,083 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,483 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,309 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,747 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,664 UART: [afmc] --
23,353,852 UART: [cold-reset] --
23,357,028 UART: [state] Locking Datavault
23,361,589 UART: [state] Locking PCR0, PCR1 and PCR31
23,363,383 UART: [state] Locking ICCM
23,365,695 UART: [exit] Launching FMC @ 0x40000130
23,374,091 UART:
23,374,324 UART: Running Caliptra FMC ...
23,375,421 UART:
23,375,571 UART: [state] CFI Enabled
23,442,749 UART: [fht] FMC Alias Private Key: 7
25,781,105 UART: [art] Extend RT PCRs Done
25,782,325 UART: [art] Lock RT PCRs Done
25,783,943 UART: [art] Populate DV Done
25,789,462 UART: [fht] FMC Alias Private Key: 7
25,790,996 UART: [art] Derive CDI
25,791,725 UART: [art] Store in in slot 0x4
25,850,439 UART: [art] Derive Key Pair
25,851,522 UART: [art] Store priv key in slot 0x5
29,144,358 UART: [art] Derive Key Pair - Done
29,157,410 UART: [art] Signing Cert with AUTHO
29,158,714 UART: RITY.KEYID = 7
31,445,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,446,670 UART: [art] PUB.X = 1480DA92924A6B6B13DB4F1D3E33007FA33C40B301139B9991F41E576B469713615BD18992550EB14996BA2CABF55385
31,453,888 UART: [art] PUB.Y = 21EA1E91EC6BC7C63D562CDB1365AB4107B3E34B58402A0487BDD11D9B0CF85692D573BB73D1A43B5FBE8A7534C16F04
31,461,199 UART: [art] SIG.R = B9E6EE329A2BFA15B0C2BFF3520B23776386BDC4FA39217F024A750171C7010F093A9BBFB8534DE0796E5CF468D7AB5A
31,468,565 UART: [art] SIG.S = CBB5EA7F1715473B8FA0213545B3C7BB9707AA8A3B1DE97A7AA381EE345BE824E5FA8580C99DAF23A66F7D6FE745B85E
32,774,493 UART: Caliptra RT
32,775,211 UART: [state] CFI Enabled
32,956,123 UART: [rt] RT listening for mailbox commands...
32,958,034 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,988,106 UART: [rt]cmd =0x44504543, len=20
33,016,268 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
3,784,175 ready_for_fw is high
3,784,750 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,875,160 >>> mbox cmd response: success
23,568,587 UART:
23,568,997 UART: Running Caliptra FMC ...
23,570,116 UART:
23,570,261 UART: [state] CFI Enabled
23,637,318 UART: [fht] FMC Alias Private Key: 7
25,975,029 UART: [art] Extend RT PCRs Done
25,976,255 UART: [art] Lock RT PCRs Done
25,977,532 UART: [art] Populate DV Done
25,983,175 UART: [fht] FMC Alias Private Key: 7
25,984,761 UART: [art] Derive CDI
25,985,491 UART: [art] Store in in slot 0x4
26,046,150 UART: [art] Derive Key Pair
26,047,192 UART: [art] Store priv key in slot 0x5
29,340,092 UART: [art] Derive Key Pair - Done
29,353,251 UART: [art] Signing Cert with AUTHO
29,354,548 UART: RITY.KEYID = 7
31,642,302 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,810 UART: [art] PUB.X = 0DF8BAC7B86ED8067727FA80E4C16FBDA7916FC0D73DA73B9BC184FA974C67C78B3DBB6F519D7F637B87C459357ECBDF
31,651,083 UART: [art] PUB.Y = 7D89D5BBF070E7F46C4CE534A967E415CDE5BF96F610BE217DA190FB467F97C7B87556B6A3DF8CA741E0DC0D3E6C1A35
31,658,321 UART: [art] SIG.R = 4F8247D04FBCF813228F37F8E46AB4C4654D148984FE0D7ACEC1EF8FF5C6D959F40534D744DBDA21DB01E819A2171434
31,665,737 UART: [art] SIG.S = EB341FA00550ED93ACEBCD9FA81AEEBA9D24ACCE98BD6FD030371BF7998945A46DA981322B18FBE21774C60022A06754
32,971,820 UART: Caliptra RT
32,972,533 UART: [state] CFI Enabled
33,133,328 UART: [rt] RT listening for mailbox commands...
33,135,253 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,164,942 UART: [rt]cmd =0x44504543, len=20
33,193,000 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,389 UART:
192,755 UART: Running Caliptra ROM ...
193,849 UART:
603,406 UART: [state] CFI Enabled
616,563 UART: [state] LifecycleState = Unprovisioned
618,423 UART: [state] DebugLocked = No
620,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,951 UART: [kat] SHA2-256
794,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,248 UART: [kat] ++
805,768 UART: [kat] sha1
816,851 UART: [kat] SHA2-256
819,576 UART: [kat] SHA2-384
825,781 UART: [kat] SHA2-512-ACC
828,150 UART: [kat] ECC-384
3,113,238 UART: [kat] HMAC-384Kdf
3,124,634 UART: [kat] LMS
4,314,748 UART: [kat] --
4,318,795 UART: [cold-reset] ++
4,320,731 UART: [fht] Storing FHT @ 0x50003400
4,331,568 UART: [idev] ++
4,332,127 UART: [idev] CDI.KEYID = 6
4,333,080 UART: [idev] SUBJECT.KEYID = 7
4,334,323 UART: [idev] UDS.KEYID = 0
4,335,309 ready_for_fw is high
4,335,513 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,977 UART: [idev] Erasing UDS.KEYID = 0
7,621,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,480 UART: [idev] --
7,648,455 UART: [ldev] ++
7,649,029 UART: [ldev] CDI.KEYID = 6
7,650,069 UART: [ldev] SUBJECT.KEYID = 5
7,651,180 UART: [ldev] AUTHORITY.KEYID = 7
7,652,463 UART: [ldev] FE.KEYID = 1
7,662,355 UART: [ldev] Erasing FE.KEYID = 1
10,948,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,349 UART: [ldev] --
13,310,205 UART: [fwproc] Waiting for Commands...
13,313,371 UART: [fwproc] Received command 0x46574c44
13,315,554 UART: [fwproc] Received Image of size 114036 bytes
17,367,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,645 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,544 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,823,345 >>> mbox cmd response: success
17,826,795 UART: [afmc] ++
17,827,389 UART: [afmc] CDI.KEYID = 6
17,828,302 UART: [afmc] SUBJECT.KEYID = 7
17,829,576 UART: [afmc] AUTHORITY.KEYID = 5
21,141,216 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,458 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,718 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,106 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,920 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,413 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,103 UART: [afmc] --
23,507,864 UART: [cold-reset] --
23,509,890 UART: [state] Locking Datavault
23,514,546 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,298 UART: [state] Locking ICCM
23,518,063 UART: [exit] Launching FMC @ 0x40000130
23,526,458 UART:
23,526,697 UART: Running Caliptra FMC ...
23,527,724 UART:
23,527,868 UART: [state] CFI Enabled
23,536,132 UART: [fht] FMC Alias Private Key: 7
25,866,422 UART: [art] Extend RT PCRs Done
25,867,643 UART: [art] Lock RT PCRs Done
25,869,619 UART: [art] Populate DV Done
25,875,341 UART: [fht] FMC Alias Private Key: 7
25,876,945 UART: [art] Derive CDI
25,877,686 UART: [art] Store in in slot 0x4
25,920,389 UART: [art] Derive Key Pair
25,921,386 UART: [art] Store priv key in slot 0x5
29,163,930 UART: [art] Derive Key Pair - Done
29,177,197 UART: [art] Signing Cert with AUTHO
29,178,516 UART: RITY.KEYID = 7
31,457,663 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,183 UART: [art] PUB.X = 31F0878AFB7736B2193EDD7BFFF2C1E42ED20875D24D946AFFF19B2425604BCC50ACF022ED9BBED1913CD61C37173C51
31,466,396 UART: [art] PUB.Y = 230090C01C4BAD4B860D9CE9D794DF6B8DC80B1F2B0EC9C0D1374C33D83B0B817A5630B49F156D9B829B2E70B036B7AA
31,473,684 UART: [art] SIG.R = E1361C622F4D8B0EAE7D2EB00241A58BB74180A8D3ABF7313FB763B996B0CA20E709F688A86DD9C8A82B7A4C985D6CAA
31,481,048 UART: [art] SIG.S = 8FB4FC243AD48B38DA3831933BC187FA0C319A53698A9C888400FCF9F244CFDBCEC0B25B3BFE66482782F261A5C7F824
32,786,382 UART: Caliptra RT
32,787,106 UART: [state] CFI Enabled
32,904,293 UART: [rt] RT listening for mailbox commands...
32,906,232 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,936,380 UART: [rt]cmd =0x44504543, len=20
32,964,945 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,132,367 ready_for_fw is high
4,132,752 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,069,197 >>> mbox cmd response: success
23,707,967 UART:
23,708,371 UART: Running Caliptra FMC ...
23,709,479 UART:
23,709,641 UART: [state] CFI Enabled
23,717,434 UART: [fht] FMC Alias Private Key: 7
26,048,763 UART: [art] Extend RT PCRs Done
26,049,994 UART: [art] Lock RT PCRs Done
26,051,656 UART: [art] Populate DV Done
26,057,140 UART: [fht] FMC Alias Private Key: 7
26,058,789 UART: [art] Derive CDI
26,059,552 UART: [art] Store in in slot 0x4
26,102,062 UART: [art] Derive Key Pair
26,103,117 UART: [art] Store priv key in slot 0x5
29,345,102 UART: [art] Derive Key Pair - Done
29,357,986 UART: [art] Signing Cert with AUTHO
29,359,320 UART: RITY.KEYID = 7
31,639,134 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,636 UART: [art] PUB.X = DB92F6951BE92C858F2EAF521E5340DCD46FBD57F5FCE4E67E8B9108990D1B399418EC7939A4E1E56391E0E1A4FBCE07
31,647,900 UART: [art] PUB.Y = 540713CBCC7282F926000639804A42A7B32C7D65F9137CF8A66CC5CBC8E00646677D93DADB87D877CB527475DB8F62A6
31,655,171 UART: [art] SIG.R = 32320A9D1EAE9C42D81A3012B2EE22EF2586A402DC6A6E546D6B56695ADC09C9040E76363C86E49F623A0ECB87362A0A
31,662,540 UART: [art] SIG.S = 43760D6D1FBD5ED9C94A295D5018BD7BB471EDD199FF0030A384590536CCE2CA647AAF5C8E47868C004C04403C09D93E
32,967,882 UART: Caliptra RT
32,968,592 UART: [state] CFI Enabled
33,087,661 UART: [rt] RT listening for mailbox commands...
33,089,596 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,119,726 UART: [rt]cmd =0x44504543, len=20
33,147,971 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,508 UART:
192,874 UART: Running Caliptra ROM ...
193,977 UART:
194,120 UART: [state] CFI Enabled
266,452 UART: [state] LifecycleState = Unprovisioned
268,362 UART: [state] DebugLocked = No
270,240 UART: [state] WD Timer not started. Device not locked for debugging
273,699 UART: [kat] SHA2-256
452,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,399 UART: [kat] ++
464,856 UART: [kat] sha1
475,799 UART: [kat] SHA2-256
478,878 UART: [kat] SHA2-384
484,880 UART: [kat] SHA2-512-ACC
487,822 UART: [kat] ECC-384
2,948,122 UART: [kat] HMAC-384Kdf
2,972,022 UART: [kat] LMS
3,501,533 UART: [kat] --
3,507,158 UART: [cold-reset] ++
3,509,725 UART: [fht] FHT @ 0x50003400
3,520,491 UART: [idev] ++
3,521,068 UART: [idev] CDI.KEYID = 6
3,521,996 UART: [idev] SUBJECT.KEYID = 7
3,523,173 UART: [idev] UDS.KEYID = 0
3,524,102 ready_for_fw is high
3,524,289 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,119 UART: [idev] Erasing UDS.KEYID = 0
6,028,353 UART: [idev] Sha1 KeyId Algorithm
6,051,693 UART: [idev] --
6,056,645 UART: [ldev] ++
6,057,232 UART: [ldev] CDI.KEYID = 6
6,058,143 UART: [ldev] SUBJECT.KEYID = 5
6,059,326 UART: [ldev] AUTHORITY.KEYID = 7
6,060,566 UART: [ldev] FE.KEYID = 1
6,098,925 UART: [ldev] Erasing FE.KEYID = 1
8,603,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,730 UART: [ldev] --
10,413,481 UART: [fwproc] Wait for Commands...
10,415,305 UART: [fwproc] Recv command 0x46574c44
10,417,395 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,279,104 >>> mbox cmd response: success
14,283,446 UART: [afmc] ++
14,284,059 UART: [afmc] CDI.KEYID = 6
14,284,992 UART: [afmc] SUBJECT.KEYID = 7
14,286,218 UART: [afmc] AUTHORITY.KEYID = 5
16,826,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,254 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,909 UART: [afmc] --
18,628,279 UART: [cold-reset] --
18,630,361 UART: [state] Locking Datavault
18,634,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,692 UART: [state] Locking ICCM
18,638,115 UART: [exit] Launching FMC @ 0x40000130
18,646,538 UART:
18,646,778 UART: Running Caliptra FMC ...
18,647,884 UART:
18,648,050 UART: [state] CFI Enabled
18,709,553 UART: [fht] FMC Alias Private Key: 7
20,472,970 UART: [art] Extend RT PCRs Done
20,474,187 UART: [art] Lock RT PCRs Done
20,475,866 UART: [art] Populate DV Done
20,481,111 UART: [fht] FMC Alias Private Key: 7
20,482,597 UART: [art] Derive CDI
20,483,361 UART: [art] Store in in slot 0x4
20,542,075 UART: [art] Derive Key Pair
20,543,111 UART: [art] Store priv key in slot 0x5
23,007,419 UART: [art] Derive Key Pair - Done
23,020,572 UART: [art] Signing Cert with AUTHO
23,021,875 UART: RITY.KEYID = 7
24,732,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,068 UART: [art] PUB.X = 336CF969AE01679B60954777FC5B5CE7C54AC8A439DBDCDB7461A40FE54F617D38A2F079D6A1C6B35C031943E40E8DAE
24,741,343 UART: [art] PUB.Y = E334DE93C330362A287D2F4621336143FC890268D6398E214354162CE4C580ADF8250BBA30C204A6FC308710BDC160F5
24,748,611 UART: [art] SIG.R = 509576D51ABEF1855A4F3939551EC34735B40F9083C0B1E31BFFD39C350C129E823DE503C63861F180FA921E1074EB18
24,755,980 UART: [art] SIG.S = FBADA13A693825D8017719582E0C539E7D2D7B45562346F4014A769DF111867E736B7F30DE80DC824380D801E1D8CC95
25,734,926 UART: Caliptra RT
25,735,641 UART: [state] CFI Enabled
25,899,960 UART: [rt] RT listening for mailbox commands...
25,901,875 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,931,820 UART: [rt]cmd =0x44504543, len=20
25,960,060 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,452 UART:
192,841 UART: Running Caliptra ROM ...
194,028 UART:
194,197 UART: [state] CFI Enabled
264,950 UART: [state] LifecycleState = Unprovisioned
267,358 UART: [state] DebugLocked = No
270,249 UART: [state] WD Timer not started. Device not locked for debugging
273,950 UART: [kat] SHA2-256
463,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,410 UART: [kat] ++
474,861 UART: [kat] sha1
485,732 UART: [kat] SHA2-256
488,741 UART: [kat] SHA2-384
495,374 UART: [kat] SHA2-512-ACC
497,957 UART: [kat] ECC-384
2,946,037 UART: [kat] HMAC-384Kdf
2,974,498 UART: [kat] LMS
3,506,279 UART: [kat] --
3,510,388 UART: [cold-reset] ++
3,511,911 UART: [fht] FHT @ 0x50003400
3,523,320 UART: [idev] ++
3,524,032 UART: [idev] CDI.KEYID = 6
3,525,073 UART: [idev] SUBJECT.KEYID = 7
3,526,206 UART: [idev] UDS.KEYID = 0
3,527,152 ready_for_fw is high
3,527,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,336 UART: [idev] Erasing UDS.KEYID = 0
6,031,018 UART: [idev] Sha1 KeyId Algorithm
6,053,339 UART: [idev] --
6,058,420 UART: [ldev] ++
6,059,104 UART: [ldev] CDI.KEYID = 6
6,060,020 UART: [ldev] SUBJECT.KEYID = 5
6,061,183 UART: [ldev] AUTHORITY.KEYID = 7
6,062,417 UART: [ldev] FE.KEYID = 1
6,101,535 UART: [ldev] Erasing FE.KEYID = 1
8,608,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,857 UART: [ldev] --
10,415,774 UART: [fwproc] Wait for Commands...
10,417,541 UART: [fwproc] Recv command 0x46574c44
10,419,802 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,601,026 >>> mbox cmd response: success
14,605,476 UART: [afmc] ++
14,606,190 UART: [afmc] CDI.KEYID = 6
14,607,386 UART: [afmc] SUBJECT.KEYID = 7
14,608,890 UART: [afmc] AUTHORITY.KEYID = 5
17,150,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,790 UART: [afmc] --
18,948,471 UART: [cold-reset] --
18,953,098 UART: [state] Locking Datavault
18,958,252 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,454 UART: [state] Locking ICCM
18,962,915 UART: [exit] Launching FMC @ 0x40000130
18,971,549 UART:
18,971,794 UART: Running Caliptra FMC ...
18,972,900 UART:
18,973,058 UART: [state] CFI Enabled
19,031,368 UART: [fht] FMC Alias Private Key: 7
20,794,727 UART: [art] Extend RT PCRs Done
20,795,956 UART: [art] Lock RT PCRs Done
20,797,979 UART: [art] Populate DV Done
20,803,284 UART: [fht] FMC Alias Private Key: 7
20,804,985 UART: [art] Derive CDI
20,805,805 UART: [art] Store in in slot 0x4
20,863,986 UART: [art] Derive Key Pair
20,865,030 UART: [art] Store priv key in slot 0x5
23,328,013 UART: [art] Derive Key Pair - Done
23,341,454 UART: [art] Signing Cert with AUTHO
23,342,757 UART: RITY.KEYID = 7
25,053,669 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,190 UART: [art] PUB.X = B56AC847E124C6F211DE052D98AF9538C34F78298FAB079618A1DDC45CDE180ECAB08F73F7E13318CA688967A8C50362
25,062,499 UART: [art] PUB.Y = 7236125DE58F89F06194FD40FE08A3DF4F6D218B138E7B869A3101A7FEE572390D15296C71266B0A0CEB9D9B37FFAF69
25,069,731 UART: [art] SIG.R = 2A698D4C23C2D88532F479A6F3A8F3DCFDFE18C874DC04C3A27AC4091C6C9146882B4A56FC33DF3256CAB55B10167088
25,077,113 UART: [art] SIG.S = 7C7103734BC55D36FA214269426EF2BC6DBAF7EC6610D89117986F9295FCFB781EBC76D59FB401069A4D1B7CD8C9646C
26,055,669 UART: Caliptra RT
26,056,382 UART: [state] CFI Enabled
26,222,648 UART: [rt] RT listening for mailbox commands...
26,224,570 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,254,468 UART: [rt]cmd =0x44504543, len=20
26,282,499 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,436,408 ready_for_fw is high
3,436,947 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,737,235 >>> mbox cmd response: success
19,026,874 UART:
19,027,265 UART: Running Caliptra FMC ...
19,028,473 UART:
19,028,646 UART: [state] CFI Enabled
19,095,953 UART: [fht] FMC Alias Private Key: 7
20,859,659 UART: [art] Extend RT PCRs Done
20,860,878 UART: [art] Lock RT PCRs Done
20,862,397 UART: [art] Populate DV Done
20,867,864 UART: [fht] FMC Alias Private Key: 7
20,869,414 UART: [art] Derive CDI
20,870,229 UART: [art] Store in in slot 0x4
20,929,066 UART: [art] Derive Key Pair
20,930,107 UART: [art] Store priv key in slot 0x5
23,392,744 UART: [art] Derive Key Pair - Done
23,405,556 UART: [art] Signing Cert with AUTHO
23,406,895 UART: RITY.KEYID = 7
25,119,345 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,854 UART: [art] PUB.X = D5309E141F10231F60CD3331BF31C1282A00140E0AEB3E67694CA685C47E1513C5096371CBB2E081C617B5657BCCB7D5
25,128,065 UART: [art] PUB.Y = E04BBAFBDCF2F456A764DD666C68926468721E4BB882BA5A1461ADCFBB2C819CFBA0EE8DD2C4AD21657AE88893CB489D
25,135,351 UART: [art] SIG.R = 51CE8DE5E30F9FBA3A687E2D35DDDFBA8774CCF9784B0DD3BFF507C15B6019C66535F33BCD06B9BBA362DA32B5641F6B
25,142,769 UART: [art] SIG.S = 88E90763A040058AFA288481BB88628D352C8B10F3FEB9D570A215F25033A434C39E3AA20BACEB14CF160E547EF9C40E
26,121,514 UART: Caliptra RT
26,122,230 UART: [state] CFI Enabled
26,288,158 UART: [rt] RT listening for mailbox commands...
26,290,084 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,320,142 UART: [rt]cmd =0x44504543, len=20
26,348,198 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,467 UART:
192,826 UART: Running Caliptra ROM ...
194,008 UART:
603,747 UART: [state] CFI Enabled
618,495 UART: [state] LifecycleState = Unprovisioned
620,917 UART: [state] DebugLocked = No
622,797 UART: [state] WD Timer not started. Device not locked for debugging
627,326 UART: [kat] SHA2-256
817,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,000 UART: [kat] ++
828,523 UART: [kat] sha1
840,031 UART: [kat] SHA2-256
843,040 UART: [kat] SHA2-384
849,309 UART: [kat] SHA2-512-ACC
851,860 UART: [kat] ECC-384
3,294,523 UART: [kat] HMAC-384Kdf
3,307,099 UART: [kat] LMS
3,838,981 UART: [kat] --
3,844,749 UART: [cold-reset] ++
3,846,814 UART: [fht] FHT @ 0x50003400
3,857,642 UART: [idev] ++
3,858,269 UART: [idev] CDI.KEYID = 6
3,859,294 UART: [idev] SUBJECT.KEYID = 7
3,860,465 UART: [idev] UDS.KEYID = 0
3,861,392 ready_for_fw is high
3,861,620 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,300 UART: [idev] Erasing UDS.KEYID = 0
6,335,071 UART: [idev] Sha1 KeyId Algorithm
6,358,257 UART: [idev] --
6,363,816 UART: [ldev] ++
6,364,507 UART: [ldev] CDI.KEYID = 6
6,365,416 UART: [ldev] SUBJECT.KEYID = 5
6,366,567 UART: [ldev] AUTHORITY.KEYID = 7
6,367,796 UART: [ldev] FE.KEYID = 1
6,377,807 UART: [ldev] Erasing FE.KEYID = 1
8,850,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,228 UART: [ldev] --
10,641,195 UART: [fwproc] Wait for Commands...
10,643,173 UART: [fwproc] Recv command 0x46574c44
10,645,471 UART: [fwproc] Recv'd Img size: 114360 bytes
14,095,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,829,515 >>> mbox cmd response: success
14,833,586 UART: [afmc] ++
14,834,292 UART: [afmc] CDI.KEYID = 6
14,835,480 UART: [afmc] SUBJECT.KEYID = 7
14,836,960 UART: [afmc] AUTHORITY.KEYID = 5
17,342,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,936 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,101 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,123 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,491 UART: [afmc] --
19,139,737 UART: [cold-reset] --
19,143,540 UART: [state] Locking Datavault
19,148,188 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,393 UART: [state] Locking ICCM
19,152,596 UART: [exit] Launching FMC @ 0x40000130
19,161,259 UART:
19,161,492 UART: Running Caliptra FMC ...
19,162,590 UART:
19,162,745 UART: [state] CFI Enabled
19,170,897 UART: [fht] FMC Alias Private Key: 7
20,927,495 UART: [art] Extend RT PCRs Done
20,928,714 UART: [art] Lock RT PCRs Done
20,930,384 UART: [art] Populate DV Done
20,935,527 UART: [fht] FMC Alias Private Key: 7
20,937,049 UART: [art] Derive CDI
20,937,868 UART: [art] Store in in slot 0x4
20,979,976 UART: [art] Derive Key Pair
20,980,974 UART: [art] Store priv key in slot 0x5
23,407,463 UART: [art] Derive Key Pair - Done
23,420,310 UART: [art] Signing Cert with AUTHO
23,421,636 UART: RITY.KEYID = 7
25,127,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,771 UART: [art] PUB.X = 8B7F1D370A952B85EC1669525C1E3F0088CE5D6CB95C9597516638177E9FE7ED0D820527493CB91105124BB89E65B384
25,136,023 UART: [art] PUB.Y = 2ECCCCD86B4CD35B946AE498B3374BC52715F19F28109F091A978235C015C43173DC605C4BD5D28995D9AA8F49C2E405
25,143,250 UART: [art] SIG.R = 99AA367AB87E57FB4C2AB0CC3AA45D91BDFC52ED676A855262C890EA5956D71DB0CACB5841F1BCBAA380AFF2D8C708FB
25,150,701 UART: [art] SIG.S = 448170B8E3A42BBDDD59FF4D19CC756465B3E0A83C1804DA618FC5AD0BD9F08A383D8179F1265F4B909A0768BB6F451C
26,129,867 UART: Caliptra RT
26,130,572 UART: [state] CFI Enabled
26,248,358 UART: [rt] RT listening for mailbox commands...
26,250,274 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,280,234 UART: [rt]cmd =0x44504543, len=20
26,308,374 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,263 writing to cptra_bootfsm_go
3,768,973 ready_for_fw is high
3,769,408 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,961,905 >>> mbox cmd response: success
19,213,664 UART:
19,214,060 UART: Running Caliptra FMC ...
19,215,166 UART:
19,215,320 UART: [state] CFI Enabled
19,223,213 UART: [fht] FMC Alias Private Key: 7
20,980,341 UART: [art] Extend RT PCRs Done
20,981,557 UART: [art] Lock RT PCRs Done
20,983,048 UART: [art] Populate DV Done
20,988,586 UART: [fht] FMC Alias Private Key: 7
20,990,025 UART: [art] Derive CDI
20,990,797 UART: [art] Store in in slot 0x4
21,033,440 UART: [art] Derive Key Pair
21,034,463 UART: [art] Store priv key in slot 0x5
23,461,243 UART: [art] Derive Key Pair - Done
23,474,134 UART: [art] Signing Cert with AUTHO
23,475,440 UART: RITY.KEYID = 7
25,181,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,527 UART: [art] PUB.X = C6215EA426E42D27C2784AB5648A0AF5F7935605C975F774D0A67F44FCB1FAF5C1B73C914AFAD4BBF12C62942D218873
25,189,791 UART: [art] PUB.Y = 359DFCCCFA260C996874DEAD883272CD4ADD6D77CB9879F89D00774A8BA6EC64A4C200055D5D447C00AA988261BCC597
25,197,000 UART: [art] SIG.R = 2A14DD418E262412FCEFF1A773704EE7A2B8F0DEFA935556601E4EC815F7D0485C31E2C28A4E5EC1345613A6DFE29AF2
25,204,416 UART: [art] SIG.S = DF199D941CAE87DD31361BE3288A479960ED7864861568F10B4B0B3FB195941DE55243ABCA987095200626B35511C67C
26,183,069 UART: Caliptra RT
26,183,765 UART: [state] CFI Enabled
26,301,738 UART: [rt] RT listening for mailbox commands...
26,303,650 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,333,350 UART: [rt]cmd =0x44504543, len=20
26,361,514 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
903,024 UART: [kat] HMAC-384Kdf
907,674 UART: [kat] LMS
1,475,870 UART: [kat] --
1,476,761 UART: [cold-reset] ++
1,477,103 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 ready_for_fw is high
1,481,189 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,136 UART: [idev] Erasing UDS.KEYID = 0
1,505,192 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,514,865 UART: [ldev] ++
1,515,033 UART: [ldev] CDI.KEYID = 6
1,515,396 UART: [ldev] SUBJECT.KEYID = 5
1,515,822 UART: [ldev] AUTHORITY.KEYID = 7
1,516,285 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,546,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,514 UART: [ldev] --
1,585,983 UART: [fwproc] Waiting for Commands...
1,586,768 UART: [fwproc] Received command 0x46574c44
1,587,559 UART: [fwproc] Received Image of size 114360 bytes
2,885,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,452 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,804 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,759 >>> mbox cmd response: success
3,077,819 UART: [afmc] ++
3,077,987 UART: [afmc] CDI.KEYID = 6
3,078,349 UART: [afmc] SUBJECT.KEYID = 7
3,078,774 UART: [afmc] AUTHORITY.KEYID = 5
3,114,577 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,635 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,143 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,028 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,718 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,463 UART: [afmc] --
3,157,347 UART: [cold-reset] --
3,157,965 UART: [state] Locking Datavault
3,159,176 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,780 UART: [state] Locking ICCM
3,160,348 UART: [exit] Launching FMC @ 0x40000130
3,165,677 UART:
3,165,693 UART: Running Caliptra FMC ...
3,166,101 UART:
3,166,155 UART: [state] CFI Enabled
3,176,706 UART: [fht] FMC Alias Private Key: 7
3,284,497 UART: [art] Extend RT PCRs Done
3,284,925 UART: [art] Lock RT PCRs Done
3,286,487 UART: [art] Populate DV Done
3,294,864 UART: [fht] FMC Alias Private Key: 7
3,295,906 UART: [art] Derive CDI
3,296,186 UART: [art] Store in in slot 0x4
3,381,973 UART: [art] Derive Key Pair
3,382,333 UART: [art] Store priv key in slot 0x5
3,396,089 UART: [art] Derive Key Pair - Done
3,410,629 UART: [art] Signing Cert with AUTHO
3,411,109 UART: RITY.KEYID = 7
3,426,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,192 UART: [art] PUB.X = B600FC7B935335F603F3868EDD0EAB57D68921E4F11B40F7A53308B7A24E7EC37ECE54C019766613CEB0B9944D553173
3,433,933 UART: [art] PUB.Y = 56AC4E9CC88C8F05320768758011D26DCA9FAFE2A09EBA1A5BF6F738C855A1BCBB91360683E9CE8A5288A1FB3DC75B72
3,440,890 UART: [art] SIG.R = 9A439EFD7FA30B919F1A7EED7F672EE1AF21D9CD99CEDA2E1BA4EA2577C417F6B1AE95D5588A847E96C09239E275D537
3,447,675 UART: [art] SIG.S = 9BD36F2684A47AF33499F237B64EEE81E3AAF3969309AD357DF166EAA324A68C7CDF46E361AFE00504BB85D8097A0D30
3,471,513 UART: Caliptra RT
3,471,767 UART: [state] CFI Enabled
3,579,814 UART: [rt] RT listening for mailbox commands...
3,580,484 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,093 UART: [rt]cmd =0x44504543, len=20
3,638,737 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,269 ready_for_fw is high
1,362,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,677 >>> mbox cmd response: success
2,990,613 UART:
2,990,629 UART: Running Caliptra FMC ...
2,991,037 UART:
2,991,091 UART: [state] CFI Enabled
3,001,632 UART: [fht] FMC Alias Private Key: 7
3,109,869 UART: [art] Extend RT PCRs Done
3,110,297 UART: [art] Lock RT PCRs Done
3,111,635 UART: [art] Populate DV Done
3,119,714 UART: [fht] FMC Alias Private Key: 7
3,120,782 UART: [art] Derive CDI
3,121,062 UART: [art] Store in in slot 0x4
3,206,555 UART: [art] Derive Key Pair
3,206,915 UART: [art] Store priv key in slot 0x5
3,220,239 UART: [art] Derive Key Pair - Done
3,234,839 UART: [art] Signing Cert with AUTHO
3,235,319 UART: RITY.KEYID = 7
3,250,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,522 UART: [art] PUB.X = 399A90238C40314835521FEDCE1A9CADDE4BF67617334838EFD87F61C769AD55CDD1EEBCB06C560897A67622DC187B0C
3,258,296 UART: [art] PUB.Y = F4F696902EEB135D319B81071BEDD1AE69E45E482A036E1905F8B9278A9C37C48BDEB781D621C1D7224BCD0CCB001633
3,265,220 UART: [art] SIG.R = EF6316426811F7B6A820456DC1A492E5E8C753AB6DBA2E4945A18DEDD4E25EA743B51069AB3860428F52C47BF1C489BC
3,271,998 UART: [art] SIG.S = BDBB24BEB38A6DDB9FBB2F20FAF7FE2D4415C7C2C202694D59563F681653E8469F396DAF5E27BF7913AC4EEEFF16F5B8
3,296,222 UART: Caliptra RT
3,296,476 UART: [state] CFI Enabled
3,405,521 UART: [rt] RT listening for mailbox commands...
3,406,191 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,676 UART: [rt]cmd =0x44504543, len=20
3,464,356 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,172 UART: [kat] SHA2-256
882,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,218 UART: [kat] ++
886,370 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,434 UART: [cold-reset] ++
1,476,886 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 ready_for_fw is high
1,481,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,345 UART: [idev] Erasing UDS.KEYID = 0
1,504,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,921 UART: [idev] --
1,513,898 UART: [ldev] ++
1,514,066 UART: [ldev] CDI.KEYID = 6
1,514,429 UART: [ldev] SUBJECT.KEYID = 5
1,514,855 UART: [ldev] AUTHORITY.KEYID = 7
1,515,318 UART: [ldev] FE.KEYID = 1
1,520,428 UART: [ldev] Erasing FE.KEYID = 1
1,545,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,355 UART: [ldev] --
1,584,792 UART: [fwproc] Waiting for Commands...
1,585,563 UART: [fwproc] Received command 0x46574c44
1,586,354 UART: [fwproc] Received Image of size 114360 bytes
2,884,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,671 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,936 >>> mbox cmd response: success
3,078,032 UART: [afmc] ++
3,078,200 UART: [afmc] CDI.KEYID = 6
3,078,562 UART: [afmc] SUBJECT.KEYID = 7
3,078,987 UART: [afmc] AUTHORITY.KEYID = 5
3,114,362 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,470 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,863 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,553 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,538 UART: [afmc] --
3,157,558 UART: [cold-reset] --
3,158,634 UART: [state] Locking Datavault
3,159,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,465 UART: [state] Locking ICCM
3,160,927 UART: [exit] Launching FMC @ 0x40000130
3,166,256 UART:
3,166,272 UART: Running Caliptra FMC ...
3,166,680 UART:
3,166,823 UART: [state] CFI Enabled
3,177,308 UART: [fht] FMC Alias Private Key: 7
3,285,619 UART: [art] Extend RT PCRs Done
3,286,047 UART: [art] Lock RT PCRs Done
3,287,555 UART: [art] Populate DV Done
3,295,754 UART: [fht] FMC Alias Private Key: 7
3,296,786 UART: [art] Derive CDI
3,297,066 UART: [art] Store in in slot 0x4
3,383,039 UART: [art] Derive Key Pair
3,383,399 UART: [art] Store priv key in slot 0x5
3,397,007 UART: [art] Derive Key Pair - Done
3,411,717 UART: [art] Signing Cert with AUTHO
3,412,197 UART: RITY.KEYID = 7
3,427,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,310 UART: [art] PUB.X = F3530416A7EC34400B126D6EC1B297A15A9C703B410A745E51456F1FD98281C45B452C7904970280586AFAC18882370D
3,435,052 UART: [art] PUB.Y = 46DD6ADE6EB5044EF1FD056DE86941DBBBA3F85925635FB9BF78D8826C716B40F356E3B36C4A3AFA0DC682F080ED3260
3,442,009 UART: [art] SIG.R = DDC2DED7F8FDABC776212DFB259256AFBD3BDD5D9236504DE9376B4EEC82CA9FAD1DA9FFFE7768CD6B042BF1FECF870B
3,448,811 UART: [art] SIG.S = 53FB0E06480F5AA770C515A326095109A9A5D7E7E750CAFF1D348B818467BC6C7E682F72BB2F2E3C7E24939F7809FB88
3,472,522 UART: Caliptra RT
3,472,868 UART: [state] CFI Enabled
3,581,638 UART: [rt] RT listening for mailbox commands...
3,582,308 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,819 UART: [rt]cmd =0x44504543, len=20
3,640,245 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 ready_for_fw is high
1,362,564 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,694 >>> mbox cmd response: success
2,989,222 UART:
2,989,238 UART: Running Caliptra FMC ...
2,989,646 UART:
2,989,789 UART: [state] CFI Enabled
3,000,088 UART: [fht] FMC Alias Private Key: 7
3,108,391 UART: [art] Extend RT PCRs Done
3,108,819 UART: [art] Lock RT PCRs Done
3,110,169 UART: [art] Populate DV Done
3,118,500 UART: [fht] FMC Alias Private Key: 7
3,119,676 UART: [art] Derive CDI
3,119,956 UART: [art] Store in in slot 0x4
3,205,855 UART: [art] Derive Key Pair
3,206,215 UART: [art] Store priv key in slot 0x5
3,219,511 UART: [art] Derive Key Pair - Done
3,234,196 UART: [art] Signing Cert with AUTHO
3,234,676 UART: RITY.KEYID = 7
3,249,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,651 UART: [art] PUB.X = 2230C4CA74DA67948EB9BB7E4CC3697A6DD56DB4E821B0ED5AB87623262F73BE1755FCDB16D843DA7F66A24236BFADFF
3,257,441 UART: [art] PUB.Y = 34FAA4F43647020BB58B469743C0DB4E7A058C64E1CE266BEA6DA756F317E880E56CE715C796B3FE53BA7813BECD83EB
3,264,396 UART: [art] SIG.R = C09805B053A79EDAA55BFF6FD46F7418810C26472877247CB7D3CBDF6B0054EDA5A0FF931D5A274E9C8F96E1546232C0
3,271,146 UART: [art] SIG.S = C8C807AEC2A569D8B7EBF5570E066C509E6791E94F2838CDDCC59A6F066748B60668A67A004E0E67E37E0411EEEBEDEF
3,295,350 UART: Caliptra RT
3,295,696 UART: [state] CFI Enabled
3,403,899 UART: [rt] RT listening for mailbox commands...
3,404,569 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,294 UART: [rt]cmd =0x44504543, len=20
3,462,804 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,122 UART: [kat] SHA2-256
892,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,897 UART: [kat] ++
897,049 UART: [kat] sha1
901,307 UART: [kat] SHA2-256
903,247 UART: [kat] SHA2-384
905,890 UART: [kat] SHA2-512-ACC
907,791 UART: [kat] ECC-384
917,354 UART: [kat] HMAC-384Kdf
921,958 UART: [kat] LMS
1,170,286 UART: [kat] --
1,171,005 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,173,960 UART: [idev] ++
1,174,128 UART: [idev] CDI.KEYID = 6
1,174,488 UART: [idev] SUBJECT.KEYID = 7
1,174,912 UART: [idev] UDS.KEYID = 0
1,175,257 ready_for_fw is high
1,175,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,641 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,046 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,828 >>> mbox cmd response: success
2,775,036 UART: [afmc] ++
2,775,204 UART: [afmc] CDI.KEYID = 6
2,775,566 UART: [afmc] SUBJECT.KEYID = 7
2,775,991 UART: [afmc] AUTHORITY.KEYID = 5
2,811,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,487 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,825 UART: [afmc] --
2,854,909 UART: [cold-reset] --
2,855,585 UART: [state] Locking Datavault
2,856,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,202 UART: [state] Locking ICCM
2,857,632 UART: [exit] Launching FMC @ 0x40000130
2,862,961 UART:
2,862,977 UART: Running Caliptra FMC ...
2,863,385 UART:
2,863,439 UART: [state] CFI Enabled
2,873,774 UART: [fht] FMC Alias Private Key: 7
2,981,587 UART: [art] Extend RT PCRs Done
2,982,015 UART: [art] Lock RT PCRs Done
2,983,441 UART: [art] Populate DV Done
2,991,782 UART: [fht] FMC Alias Private Key: 7
2,992,864 UART: [art] Derive CDI
2,993,144 UART: [art] Store in in slot 0x4
3,079,129 UART: [art] Derive Key Pair
3,079,489 UART: [art] Store priv key in slot 0x5
3,092,227 UART: [art] Derive Key Pair - Done
3,107,062 UART: [art] Signing Cert with AUTHO
3,107,542 UART: RITY.KEYID = 7
3,122,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,433 UART: [art] PUB.X = BCFF0B4F1C497E401F2D6285EBDB22FDD54B030CBAD447976D128FA7CA0BD1AA5A7163FFEA8AE281248C032A9BDA7DE8
3,130,216 UART: [art] PUB.Y = F4279B9EF117203AA32298B61BFE5968465021F55F9055610DBE00F2CFED8DAC97C46E55DCB4EE51687A25ED4CA994E1
3,137,151 UART: [art] SIG.R = B487B0D2511BB6296F6FE3BF6144EDF4974F03D31DE2B13959F9C2B5791003B045A9D05B4398491D15491A9759BB811F
3,143,913 UART: [art] SIG.S = FAC05FA251F1E4FC3C368A1BC4BFCAB2300EFB862C6E862D1951B5DB965B93D0E5840DC15E014CBCE307034E44DD90DA
3,167,651 UART: Caliptra RT
3,167,905 UART: [state] CFI Enabled
3,275,284 UART: [rt] RT listening for mailbox commands...
3,275,954 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,369 UART: [rt]cmd =0x44504543, len=20
3,334,043 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,829 ready_for_fw is high
1,060,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,377 >>> mbox cmd response: success
2,689,879 UART:
2,689,895 UART: Running Caliptra FMC ...
2,690,303 UART:
2,690,357 UART: [state] CFI Enabled
2,700,918 UART: [fht] FMC Alias Private Key: 7
2,808,911 UART: [art] Extend RT PCRs Done
2,809,339 UART: [art] Lock RT PCRs Done
2,810,701 UART: [art] Populate DV Done
2,818,988 UART: [fht] FMC Alias Private Key: 7
2,820,040 UART: [art] Derive CDI
2,820,320 UART: [art] Store in in slot 0x4
2,905,705 UART: [art] Derive Key Pair
2,906,065 UART: [art] Store priv key in slot 0x5
2,919,621 UART: [art] Derive Key Pair - Done
2,934,381 UART: [art] Signing Cert with AUTHO
2,934,861 UART: RITY.KEYID = 7
2,949,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,638 UART: [art] PUB.X = E1D89F765D08454E9217E4927FB6F637FDDD50C3FAD36890A36678B66ADDDE32349C886416D4FDA2EB4C0A32E5AA6A76
2,957,414 UART: [art] PUB.Y = B40BBDF860726FA3F0624441576A2349557C9071E96C8A06BD8E76754641522460B287BC823B1F49A788141ACDD22B71
2,964,350 UART: [art] SIG.R = B08166997417FCBC8D75C8BBB4E62DB8642B671F2CB89EE8212780D2A45C0A29F27B6EA1D0295627C5421BEF92D0B65E
2,971,125 UART: [art] SIG.S = D7C422C5C98AAD2AA0E09CCF063032B59C5210D3504E7B518C78DB7D920508F76A7515C3B1BB264631D1327B1946377E
2,995,557 UART: Caliptra RT
2,995,811 UART: [state] CFI Enabled
3,103,572 UART: [rt] RT listening for mailbox commands...
3,104,242 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,901 UART: [rt]cmd =0x44504543, len=20
3,162,533 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,799 UART: [kat] SHA2-512-ACC
908,700 UART: [kat] ECC-384
918,479 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,730 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 ready_for_fw is high
1,176,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,684 UART: [idev] Sha1 KeyId Algorithm
1,210,130 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,217,940 UART: [ldev] Erasing FE.KEYID = 1
1,244,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,434 UART: [ldev] --
1,283,867 UART: [fwproc] Wait for Commands...
1,284,613 UART: [fwproc] Recv command 0x46574c44
1,285,341 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,527 >>> mbox cmd response: success
2,776,781 UART: [afmc] ++
2,776,949 UART: [afmc] CDI.KEYID = 6
2,777,311 UART: [afmc] SUBJECT.KEYID = 7
2,777,736 UART: [afmc] AUTHORITY.KEYID = 5
2,813,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,334 UART: [afmc] --
2,857,226 UART: [cold-reset] --
2,858,172 UART: [state] Locking Datavault
2,859,309 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,913 UART: [state] Locking ICCM
2,860,531 UART: [exit] Launching FMC @ 0x40000130
2,865,860 UART:
2,865,876 UART: Running Caliptra FMC ...
2,866,284 UART:
2,866,427 UART: [state] CFI Enabled
2,877,196 UART: [fht] FMC Alias Private Key: 7
2,984,771 UART: [art] Extend RT PCRs Done
2,985,199 UART: [art] Lock RT PCRs Done
2,986,843 UART: [art] Populate DV Done
2,994,838 UART: [fht] FMC Alias Private Key: 7
2,995,778 UART: [art] Derive CDI
2,996,058 UART: [art] Store in in slot 0x4
3,081,753 UART: [art] Derive Key Pair
3,082,113 UART: [art] Store priv key in slot 0x5
3,095,505 UART: [art] Derive Key Pair - Done
3,110,077 UART: [art] Signing Cert with AUTHO
3,110,557 UART: RITY.KEYID = 7
3,125,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,152 UART: [art] PUB.X = B2CBD6053CF3C5076AE1073C1E641BCFF164010D12C46C5FB5CF52764E9FA3508E5D0B48BCB0E39944E56CB40FEABD75
3,132,919 UART: [art] PUB.Y = C38325B54B9E0D8963E775F63FEA25FDFB55FBD7F59C013FF5E34A63CACA5D6B3A004CFBA9EC043A65EFEA81C8A3B6E7
3,139,866 UART: [art] SIG.R = 1C141CA58A9A6C385A13BBBD1CFF8CA572D750361BEF43E609B53A89BC445D884BDA638E37EACF06130E039F7FBA63C7
3,146,642 UART: [art] SIG.S = F42E290EDAE800AD4CD2EB24EBC25198782719B79D7B51EBD732A53AADA0037DC6C71BBBF09275973D22CA8A8D1592A2
3,170,091 UART: Caliptra RT
3,170,437 UART: [state] CFI Enabled
3,278,025 UART: [rt] RT listening for mailbox commands...
3,278,695 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,296 UART: [rt]cmd =0x44504543, len=20
3,336,828 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,198 ready_for_fw is high
1,060,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,626 >>> mbox cmd response: success
2,687,980 UART:
2,687,996 UART: Running Caliptra FMC ...
2,688,404 UART:
2,688,547 UART: [state] CFI Enabled
2,698,884 UART: [fht] FMC Alias Private Key: 7
2,807,459 UART: [art] Extend RT PCRs Done
2,807,887 UART: [art] Lock RT PCRs Done
2,809,407 UART: [art] Populate DV Done
2,817,598 UART: [fht] FMC Alias Private Key: 7
2,818,602 UART: [art] Derive CDI
2,818,882 UART: [art] Store in in slot 0x4
2,904,679 UART: [art] Derive Key Pair
2,905,039 UART: [art] Store priv key in slot 0x5
2,917,887 UART: [art] Derive Key Pair - Done
2,932,822 UART: [art] Signing Cert with AUTHO
2,933,302 UART: RITY.KEYID = 7
2,948,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,513 UART: [art] PUB.X = E279176145B1DA2A30ECA2520B18663DA4B41CB7DD85AD1FC2DBB108AB634398C9EE700AF19504F76B65B3EAEC426994
2,956,283 UART: [art] PUB.Y = D34FFA8F417C63F43805013744E3463DF9FAD993E46C5FD09ADBC92234D6E40F37282B4191C3D44963160237DC41AA9C
2,963,223 UART: [art] SIG.R = 5C4EB5C1CEED70BF0BD9C2D9ECB657E8174ADA2AC6B35610F9AB4464E7C1041F47E57B20A4E3DDA361763641A8598196
2,970,001 UART: [art] SIG.S = A69CA24BE7359857BC19B4410B96F9F435A28BAAD4D14660A0C00A8EB404D59E87E5CB70D699991D50778998D273D222
2,994,349 UART: Caliptra RT
2,994,695 UART: [state] CFI Enabled
3,101,789 UART: [rt] RT listening for mailbox commands...
3,102,459 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,862 UART: [rt]cmd =0x44504543, len=20
3,160,490 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 ready_for_fw is high
1,174,367 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,768 UART: [fwproc] Wait for Commands...
1,281,455 UART: [fwproc] Recv command 0x46574c44
1,282,188 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,176 >>> mbox cmd response: success
2,773,359 UART: [afmc] ++
2,773,527 UART: [afmc] CDI.KEYID = 6
2,773,890 UART: [afmc] SUBJECT.KEYID = 7
2,774,316 UART: [afmc] AUTHORITY.KEYID = 5
2,810,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,666 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,278 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,978 UART: [afmc] --
2,853,990 UART: [cold-reset] --
2,854,836 UART: [state] Locking Datavault
2,856,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,681 UART: [state] Locking ICCM
2,857,317 UART: [exit] Launching FMC @ 0x40000130
2,862,646 UART:
2,862,662 UART: Running Caliptra FMC ...
2,863,070 UART:
2,863,124 UART: [state] CFI Enabled
2,874,003 UART: [fht] FMC Alias Private Key: 7
2,981,920 UART: [art] Extend RT PCRs Done
2,982,348 UART: [art] Lock RT PCRs Done
2,984,004 UART: [art] Populate DV Done
2,992,309 UART: [fht] FMC Alias Private Key: 7
2,993,353 UART: [art] Derive CDI
2,993,633 UART: [art] Store in in slot 0x4
3,079,142 UART: [art] Derive Key Pair
3,079,502 UART: [art] Store priv key in slot 0x5
3,092,268 UART: [art] Derive Key Pair - Done
3,107,449 UART: [art] Signing Cert with AUTHO
3,107,929 UART: RITY.KEYID = 7
3,122,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,740 UART: [art] PUB.X = 5139292586ACC7B6934B0CF95E15F2DFE0523F697B85279686FABF0ADE80CBB1999FB18DC50644361AF1E5C724A1BF13
3,130,509 UART: [art] PUB.Y = 850EF2B24A3F0008307AB1A0BE76A6EB29B57804F0CCB5378ECCA2F927C7ED7800ED207103598D82E6BE309111650CB8
3,137,406 UART: [art] SIG.R = 0748F7E6A5F0E13EDF7549B7BC957DAB0F2B4B4E439999274460AA206C6336A1908001FC76B83D06DE44DA5928B1947A
3,144,166 UART: [art] SIG.S = 9257C66088C4E337C890568398A8E8DE291CC632ADB3C32DE7C35CFF88FF3C7CD827B114FE084D2D0029F3A66CEE3601
3,168,111 UART: Caliptra RT
3,168,365 UART: [state] CFI Enabled
3,274,903 UART: [rt] RT listening for mailbox commands...
3,275,573 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,312 UART: [rt]cmd =0x44504543, len=20
3,334,032 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,978 ready_for_fw is high
1,055,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,562 >>> mbox cmd response: success
2,684,782 UART:
2,684,798 UART: Running Caliptra FMC ...
2,685,206 UART:
2,685,260 UART: [state] CFI Enabled
2,695,671 UART: [fht] FMC Alias Private Key: 7
2,804,188 UART: [art] Extend RT PCRs Done
2,804,616 UART: [art] Lock RT PCRs Done
2,806,378 UART: [art] Populate DV Done
2,814,455 UART: [fht] FMC Alias Private Key: 7
2,815,493 UART: [art] Derive CDI
2,815,773 UART: [art] Store in in slot 0x4
2,901,238 UART: [art] Derive Key Pair
2,901,598 UART: [art] Store priv key in slot 0x5
2,914,860 UART: [art] Derive Key Pair - Done
2,929,760 UART: [art] Signing Cert with AUTHO
2,930,240 UART: RITY.KEYID = 7
2,945,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,235 UART: [art] PUB.X = 28AFB46EA7A0DC48725C69B1448A1D2C7289118DD0E70C626366232DB85BA9D6FFEF9614E2F045E275ADAEF83BD36C2C
2,953,016 UART: [art] PUB.Y = 477B70BFC006C31A5CB081E2439677342784BA35F00A1CAE494BED6270CDF3FE744D3FD7AB38E6F49A1C538DA420E6B4
2,959,972 UART: [art] SIG.R = DA377D82CDCA3494FBF0ECB837CA083AA98EC9AB7411995C46A2CA927505E8796091721819FBD693937AFD40C6B7C896
2,966,744 UART: [art] SIG.S = 0E4CC1895DB2BA04ACD18967633D7408665F4E6EBCB8B8A2D5C31269C11D8950736EEBCA129B2C3452E20C03E49AE553
2,990,038 UART: Caliptra RT
2,990,292 UART: [state] CFI Enabled
3,098,432 UART: [rt] RT listening for mailbox commands...
3,099,102 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,893 UART: [rt]cmd =0x44504543, len=20
3,157,297 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,502 UART: [kat] ++
895,654 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,174,152 ready_for_fw is high
1,174,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,720 UART: [idev] Erasing UDS.KEYID = 0
1,198,788 UART: [idev] Sha1 KeyId Algorithm
1,207,614 UART: [idev] --
1,208,517 UART: [ldev] ++
1,208,685 UART: [ldev] CDI.KEYID = 6
1,209,049 UART: [ldev] SUBJECT.KEYID = 5
1,209,476 UART: [ldev] AUTHORITY.KEYID = 7
1,209,939 UART: [ldev] FE.KEYID = 1
1,214,925 UART: [ldev] Erasing FE.KEYID = 1
1,241,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,289 UART: [ldev] --
1,280,721 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,949 >>> mbox cmd response: success
2,771,984 UART: [afmc] ++
2,772,152 UART: [afmc] CDI.KEYID = 6
2,772,515 UART: [afmc] SUBJECT.KEYID = 7
2,772,941 UART: [afmc] AUTHORITY.KEYID = 5
2,808,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,779 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,391 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,995 UART: [afmc] --
2,852,055 UART: [cold-reset] --
2,853,125 UART: [state] Locking Datavault
2,854,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,844 UART: [state] Locking ICCM
2,855,316 UART: [exit] Launching FMC @ 0x40000130
2,860,645 UART:
2,860,661 UART: Running Caliptra FMC ...
2,861,069 UART:
2,861,212 UART: [state] CFI Enabled
2,871,757 UART: [fht] FMC Alias Private Key: 7
2,979,464 UART: [art] Extend RT PCRs Done
2,979,892 UART: [art] Lock RT PCRs Done
2,981,532 UART: [art] Populate DV Done
2,989,891 UART: [fht] FMC Alias Private Key: 7
2,990,933 UART: [art] Derive CDI
2,991,213 UART: [art] Store in in slot 0x4
3,076,534 UART: [art] Derive Key Pair
3,076,894 UART: [art] Store priv key in slot 0x5
3,090,106 UART: [art] Derive Key Pair - Done
3,105,007 UART: [art] Signing Cert with AUTHO
3,105,487 UART: RITY.KEYID = 7
3,120,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,344 UART: [art] PUB.X = 8B61A2F9D23B0AAF8BA854CB18E3A413EAAB733F0537B13AFBD2166C21E77F6BC6AD6B4AF6CAD6E5B1D8BE991996C5BA
3,128,136 UART: [art] PUB.Y = 95979832E0A51677CE8328639F6A828017B67E435AF0951E0AD799782C9F3D1B1719EF67E20F1A113B8613BE43528EA7
3,135,072 UART: [art] SIG.R = 97DA1DBA086E136BD03CFA289D062A1E5151BBDBD46E697E94EB633B09C9092EB2FBC605EDD1F65FA19DC3230F3A90EF
3,141,846 UART: [art] SIG.S = 969C37DF2F1EFFEB996F4E33FE5D4C15F627A4AA07C6C5EB7390D6D2FAC5DCB303FA51B9B55482E01F7E271F3043926D
3,165,467 UART: Caliptra RT
3,165,813 UART: [state] CFI Enabled
3,273,416 UART: [rt] RT listening for mailbox commands...
3,274,086 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,761 UART: [rt]cmd =0x44504543, len=20
3,332,523 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,911 ready_for_fw is high
1,056,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,279 >>> mbox cmd response: success
2,687,189 UART:
2,687,205 UART: Running Caliptra FMC ...
2,687,613 UART:
2,687,756 UART: [state] CFI Enabled
2,698,471 UART: [fht] FMC Alias Private Key: 7
2,806,638 UART: [art] Extend RT PCRs Done
2,807,066 UART: [art] Lock RT PCRs Done
2,808,936 UART: [art] Populate DV Done
2,817,045 UART: [fht] FMC Alias Private Key: 7
2,818,057 UART: [art] Derive CDI
2,818,337 UART: [art] Store in in slot 0x4
2,903,594 UART: [art] Derive Key Pair
2,903,954 UART: [art] Store priv key in slot 0x5
2,917,748 UART: [art] Derive Key Pair - Done
2,932,404 UART: [art] Signing Cert with AUTHO
2,932,884 UART: RITY.KEYID = 7
2,948,146 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,911 UART: [art] PUB.X = ADFA4A62A0B4E1F3F63DE6F85BF9C4A0B4EADAAFE465F6CA7E9E602029AFF858FD4A20447D0AA4CBC778EC1843DFD28E
2,955,712 UART: [art] PUB.Y = B452EC62132D27AA5CA2ECC4619D1D59DA9D72BEF431953DA8183A6C6DFB8FFCE39653BC06E98AD7AA0174E065F9D60D
2,962,673 UART: [art] SIG.R = C0A9E892E0A34EBA778DF597680345F32FC7D8AFA034A088B369106B3DD01A0BA52ABA9328EBEA660268D18BD5AA3776
2,969,446 UART: [art] SIG.S = E36BB172295ACE8465AC92D039CF86FB7CE8AB68EB518830BBD6F188498A93D2E6D2ED10BC67784DEECCCD2B014C35D5
2,993,180 UART: Caliptra RT
2,993,526 UART: [state] CFI Enabled
3,101,687 UART: [rt] RT listening for mailbox commands...
3,102,357 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,708 UART: [rt]cmd =0x44504543, len=20
3,160,342 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,312 UART:
192,692 UART: Running Caliptra ROM ...
193,826 UART:
193,969 UART: [state] CFI Enabled
267,179 UART: [state] LifecycleState = Unprovisioned
269,136 UART: [state] DebugLocked = No
271,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,426 UART: [kat] SHA2-256
446,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,624 UART: [kat] ++
457,068 UART: [kat] sha1
467,588 UART: [kat] SHA2-256
470,307 UART: [kat] SHA2-384
476,646 UART: [kat] SHA2-512-ACC
479,018 UART: [kat] ECC-384
2,767,659 UART: [kat] HMAC-384Kdf
2,779,328 UART: [kat] LMS
3,969,625 UART: [kat] --
3,973,967 UART: [cold-reset] ++
3,975,317 UART: [fht] Storing FHT @ 0x50003400
3,986,310 UART: [idev] ++
3,986,941 UART: [idev] CDI.KEYID = 6
3,987,841 UART: [idev] SUBJECT.KEYID = 7
3,989,072 UART: [idev] UDS.KEYID = 0
3,990,052 ready_for_fw is high
3,990,247 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,658 UART: [idev] Erasing UDS.KEYID = 0
7,326,137 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,402 UART: [idev] --
7,350,960 UART: [ldev] ++
7,351,523 UART: [ldev] CDI.KEYID = 6
7,352,491 UART: [ldev] SUBJECT.KEYID = 5
7,353,697 UART: [ldev] AUTHORITY.KEYID = 7
7,354,979 UART: [ldev] FE.KEYID = 1
7,384,137 UART: [ldev] Erasing FE.KEYID = 1
10,719,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,622 UART: [ldev] --
13,096,954 UART: [fwproc] Waiting for Commands...
13,099,649 UART: [fwproc] Received command 0x46574c44
13,101,827 UART: [fwproc] Received Image of size 114036 bytes
17,154,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,228,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,297,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,614,771 >>> mbox cmd response: success
17,619,372 UART: [afmc] ++
17,619,966 UART: [afmc] CDI.KEYID = 6
17,620,926 UART: [afmc] SUBJECT.KEYID = 7
17,622,131 UART: [afmc] AUTHORITY.KEYID = 5
20,988,225 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,529 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,790 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,192 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,046 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,479 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,218 UART: [afmc] --
23,358,648 UART: [cold-reset] --
23,363,905 UART: [state] Locking Datavault
23,368,719 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,466 UART: [state] Locking ICCM
23,371,637 UART: [exit] Launching FMC @ 0x40000130
23,380,023 UART:
23,380,251 UART: Running Caliptra FMC ...
23,381,347 UART:
23,381,499 UART: [state] CFI Enabled
23,449,126 UART: [fht] FMC Alias Private Key: 7
25,787,181 UART: [art] Extend RT PCRs Done
25,788,414 UART: [art] Lock RT PCRs Done
25,789,990 UART: [art] Populate DV Done
25,795,299 UART: [fht] FMC Alias Private Key: 7
25,796,934 UART: [art] Derive CDI
25,797,752 UART: [art] Store in in slot 0x4
25,858,737 UART: [art] Derive Key Pair
25,859,733 UART: [art] Store priv key in slot 0x5
29,151,975 UART: [art] Derive Key Pair - Done
29,164,701 UART: [art] Signing Cert with AUTHO
29,166,036 UART: RITY.KEYID = 7
31,454,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,820 UART: [art] PUB.X = 06BF778C5EDA98E0E18504494B0E1D71D54BE8A3F6BB4A61203B8D12A919161F457B95E3540DF9417A5510F82C06975C
31,463,043 UART: [art] PUB.Y = 9F82C7594B6A80382165A86DB6120F24756FA91A0D452533426C665F96886E334FA9169E4EF5A312D664C59144AEE265
31,470,246 UART: [art] SIG.R = 2C5DDDC0CE2B3F7520EB5E3A411688EBF9BC62EB1C3D13696B3396A61EC9673A98BA21B58FAE4B1CFD51150EE1E7B104
31,477,713 UART: [art] SIG.S = 004A9F0D2CCEB5E1A0601296F6C05712F3C655878BBF6B2D582EB1225CA6AAB666CFCE86CF6169DDB10AC49CAD9BC53C
32,783,572 UART: Caliptra RT
32,784,302 UART: [state] CFI Enabled
32,944,984 UART: [rt] RT listening for mailbox commands...
32,946,909 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,977,155 UART: [rt]cmd =0x44504543, len=40
33,025,804 >>> mbox cmd response data (40 bytes)
33,027,272 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,057,247 UART: [rt]cmd =0x44504543, len=40
33,087,884 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,783,283 ready_for_fw is high
3,783,650 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,870,878 >>> mbox cmd response: success
23,564,973 UART:
23,565,388 UART: Running Caliptra FMC ...
23,566,576 UART:
23,566,738 UART: [state] CFI Enabled
23,635,483 UART: [fht] FMC Alias Private Key: 7
25,973,848 UART: [art] Extend RT PCRs Done
25,975,067 UART: [art] Lock RT PCRs Done
25,976,533 UART: [art] Populate DV Done
25,981,904 UART: [fht] FMC Alias Private Key: 7
25,983,423 UART: [art] Derive CDI
25,984,191 UART: [art] Store in in slot 0x4
26,043,815 UART: [art] Derive Key Pair
26,044,805 UART: [art] Store priv key in slot 0x5
29,337,624 UART: [art] Derive Key Pair - Done
29,350,513 UART: [art] Signing Cert with AUTHO
29,351,844 UART: RITY.KEYID = 7
31,638,830 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,356 UART: [art] PUB.X = 5C83F8D9DF506BCB835843BB6954F1D4B8441670CA2EC6D33DB2A3556B52EF4640CCC3B6D6B149C2D5C617E4480C142D
31,647,585 UART: [art] PUB.Y = 45FD53663C36F7F9191BB4BC86F9478DF81DA767D075303824AF64C7BA32CB3A1886F5B2B36C37740608618FB2E86125
31,654,839 UART: [art] SIG.R = FC17DC366CCB8E03A59921F93A012AE5DA97C561DCF3EFCFDF278BBD47515944413B6EFDA10BF13BB0D00E0148E1C6DE
31,662,279 UART: [art] SIG.S = 0A3030829417DA9B478B01C30BE046E23B1AFA453C808927608223AA8D2038118C4BD1ACA59789BBF6A3168B35FCF1E1
32,967,907 UART: Caliptra RT
32,968,617 UART: [state] CFI Enabled
33,128,542 UART: [rt] RT listening for mailbox commands...
33,130,461 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,160,666 UART: [rt]cmd =0x44504543, len=40
33,209,974 >>> mbox cmd response data (40 bytes)
33,211,321 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,241,418 UART: [rt]cmd =0x44504543, len=40
33,272,275 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,366 UART:
192,731 UART: Running Caliptra ROM ...
193,916 UART:
603,560 UART: [state] CFI Enabled
616,588 UART: [state] LifecycleState = Unprovisioned
618,474 UART: [state] DebugLocked = No
620,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,874 UART: [kat] SHA2-256
794,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,187 UART: [kat] ++
805,633 UART: [kat] sha1
817,216 UART: [kat] SHA2-256
819,939 UART: [kat] SHA2-384
826,990 UART: [kat] SHA2-512-ACC
829,356 UART: [kat] ECC-384
3,114,464 UART: [kat] HMAC-384Kdf
3,125,847 UART: [kat] LMS
4,315,953 UART: [kat] --
4,320,395 UART: [cold-reset] ++
4,322,889 UART: [fht] Storing FHT @ 0x50003400
4,334,931 UART: [idev] ++
4,335,509 UART: [idev] CDI.KEYID = 6
4,336,421 UART: [idev] SUBJECT.KEYID = 7
4,337,670 UART: [idev] UDS.KEYID = 0
4,338,652 ready_for_fw is high
4,338,850 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,063 UART: [idev] Erasing UDS.KEYID = 0
7,628,502 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,461 UART: [idev] --
7,655,933 UART: [ldev] ++
7,656,510 UART: [ldev] CDI.KEYID = 6
7,657,472 UART: [ldev] SUBJECT.KEYID = 5
7,658,624 UART: [ldev] AUTHORITY.KEYID = 7
7,659,905 UART: [ldev] FE.KEYID = 1
7,670,526 UART: [ldev] Erasing FE.KEYID = 1
10,961,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,739 UART: [ldev] --
13,322,243 UART: [fwproc] Waiting for Commands...
13,325,189 UART: [fwproc] Received command 0x46574c44
13,327,384 UART: [fwproc] Received Image of size 114036 bytes
17,385,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,845,186 >>> mbox cmd response: success
17,849,637 UART: [afmc] ++
17,850,237 UART: [afmc] CDI.KEYID = 6
17,851,154 UART: [afmc] SUBJECT.KEYID = 7
17,852,368 UART: [afmc] AUTHORITY.KEYID = 5
21,166,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,996 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,380 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,196 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,630 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,243 UART: [afmc] --
23,531,463 UART: [cold-reset] --
23,536,729 UART: [state] Locking Datavault
23,542,893 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,646 UART: [state] Locking ICCM
23,546,285 UART: [exit] Launching FMC @ 0x40000130
23,554,680 UART:
23,554,915 UART: Running Caliptra FMC ...
23,556,018 UART:
23,556,179 UART: [state] CFI Enabled
23,564,127 UART: [fht] FMC Alias Private Key: 7
25,894,932 UART: [art] Extend RT PCRs Done
25,896,153 UART: [art] Lock RT PCRs Done
25,897,968 UART: [art] Populate DV Done
25,903,322 UART: [fht] FMC Alias Private Key: 7
25,904,913 UART: [art] Derive CDI
25,905,724 UART: [art] Store in in slot 0x4
25,947,720 UART: [art] Derive Key Pair
25,948,722 UART: [art] Store priv key in slot 0x5
29,190,816 UART: [art] Derive Key Pair - Done
29,203,758 UART: [art] Signing Cert with AUTHO
29,205,062 UART: RITY.KEYID = 7
31,484,409 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,912 UART: [art] PUB.X = E9E5D609C4A530AFDB1C79AFB5FE7B2C8E8E9160D950F785E98A7F935236F695366F272C8E2B2EE7184BE95A0EFB1E95
31,493,178 UART: [art] PUB.Y = 8F4FE14D0AA1F29BAE2D364DF594452464C2C69E15C9542A5F1BD821076BC7D5E0CE94B0B9F964D6126891413CEE536F
31,500,425 UART: [art] SIG.R = 521E6480EEA231B11BAE173B6C168DC556D75A91774C06D72F7551B45E3421CF3DC1D1036D0D3A489C0C9DA8905391B4
31,507,777 UART: [art] SIG.S = A0AFD9A604D5D709FA3C6C6AA69B91803B62A5C74F4BEAB147689DCBB7B3E4EC10DCAAD33EC65A76B816123D93D1EE84
32,813,059 UART: Caliptra RT
32,813,778 UART: [state] CFI Enabled
32,930,817 UART: [rt] RT listening for mailbox commands...
32,932,753 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,962,683 UART: [rt]cmd =0x44504543, len=40
32,996,973 >>> mbox cmd response data (40 bytes)
32,998,268 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,028,567 UART: [rt]cmd =0x44504543, len=40
33,058,849 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,130,319 ready_for_fw is high
4,130,715 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,080,013 >>> mbox cmd response: success
23,718,959 UART:
23,719,344 UART: Running Caliptra FMC ...
23,720,477 UART:
23,720,633 UART: [state] CFI Enabled
23,728,261 UART: [fht] FMC Alias Private Key: 7
26,059,136 UART: [art] Extend RT PCRs Done
26,060,365 UART: [art] Lock RT PCRs Done
26,062,002 UART: [art] Populate DV Done
26,067,285 UART: [fht] FMC Alias Private Key: 7
26,068,739 UART: [art] Derive CDI
26,069,509 UART: [art] Store in in slot 0x4
26,111,679 UART: [art] Derive Key Pair
26,112,725 UART: [art] Store priv key in slot 0x5
29,354,489 UART: [art] Derive Key Pair - Done
29,367,321 UART: [art] Signing Cert with AUTHO
29,368,632 UART: RITY.KEYID = 7
31,647,824 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,331 UART: [art] PUB.X = 85BC2C53792CBD5E8A7E2CD081DBA525E8953834828F081249C0D91FCAD9F7489CB45ECFC9A89EFDC6A009EC3BAA29AC
31,656,567 UART: [art] PUB.Y = 82FC01BD75DFF997DBEC0C1004A32129FA111C7FF60048D91B18BE86679F11F4795DFB64B6E2DEE14011A6589654B3C2
31,663,817 UART: [art] SIG.R = 92D00ACC27FC9D49827FABC70B010E3492DAAB65A8DFCED4B78BC1DA21C091A83D7BDD7F96DF7FBA476BA0B796C7CD39
31,671,297 UART: [art] SIG.S = 11968C56443CCFBA6A218F1E2AF16FB83A1444565517EFCAAB7BEAD02346451306DD1B2F17D8538D02E144ECB9910B28
32,976,675 UART: Caliptra RT
32,977,388 UART: [state] CFI Enabled
33,095,354 UART: [rt] RT listening for mailbox commands...
33,097,305 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,127,184 UART: [rt]cmd =0x44504543, len=40
33,160,911 >>> mbox cmd response data (40 bytes)
33,162,055 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,192,052 UART: [rt]cmd =0x44504543, len=40
33,222,589 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,645 UART:
193,007 UART: Running Caliptra ROM ...
194,209 UART:
194,362 UART: [state] CFI Enabled
261,625 UART: [state] LifecycleState = Unprovisioned
263,457 UART: [state] DebugLocked = No
266,434 UART: [state] WD Timer not started. Device not locked for debugging
270,545 UART: [kat] SHA2-256
449,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,245 UART: [kat] ++
461,789 UART: [kat] sha1
473,238 UART: [kat] SHA2-256
476,316 UART: [kat] SHA2-384
482,170 UART: [kat] SHA2-512-ACC
485,106 UART: [kat] ECC-384
2,948,384 UART: [kat] HMAC-384Kdf
2,970,184 UART: [kat] LMS
3,499,640 UART: [kat] --
3,504,939 UART: [cold-reset] ++
3,506,236 UART: [fht] FHT @ 0x50003400
3,516,742 UART: [idev] ++
3,517,312 UART: [idev] CDI.KEYID = 6
3,518,215 UART: [idev] SUBJECT.KEYID = 7
3,519,404 UART: [idev] UDS.KEYID = 0
3,520,388 ready_for_fw is high
3,520,585 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,431 UART: [idev] Erasing UDS.KEYID = 0
6,023,770 UART: [idev] Sha1 KeyId Algorithm
6,046,146 UART: [idev] --
6,050,198 UART: [ldev] ++
6,050,770 UART: [ldev] CDI.KEYID = 6
6,051,686 UART: [ldev] SUBJECT.KEYID = 5
6,052,848 UART: [ldev] AUTHORITY.KEYID = 7
6,054,139 UART: [ldev] FE.KEYID = 1
6,097,172 UART: [ldev] Erasing FE.KEYID = 1
8,596,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,786 UART: [ldev] --
10,389,926 UART: [fwproc] Wait for Commands...
10,392,133 UART: [fwproc] Recv command 0x46574c44
10,394,168 UART: [fwproc] Recv'd Img size: 114360 bytes
13,799,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,262,115 >>> mbox cmd response: success
14,266,236 UART: [afmc] ++
14,266,838 UART: [afmc] CDI.KEYID = 6
14,267,746 UART: [afmc] SUBJECT.KEYID = 7
14,268,961 UART: [afmc] AUTHORITY.KEYID = 5
16,800,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,767 UART: [afmc] --
18,601,667 UART: [cold-reset] --
18,605,044 UART: [state] Locking Datavault
18,609,220 UART: [state] Locking PCR0, PCR1 and PCR31
18,610,865 UART: [state] Locking ICCM
18,612,148 UART: [exit] Launching FMC @ 0x40000130
18,620,551 UART:
18,620,833 UART: Running Caliptra FMC ...
18,621,952 UART:
18,622,111 UART: [state] CFI Enabled
18,685,933 UART: [fht] FMC Alias Private Key: 7
20,450,014 UART: [art] Extend RT PCRs Done
20,451,254 UART: [art] Lock RT PCRs Done
20,453,257 UART: [art] Populate DV Done
20,458,778 UART: [fht] FMC Alias Private Key: 7
20,460,465 UART: [art] Derive CDI
20,461,291 UART: [art] Store in in slot 0x4
20,518,280 UART: [art] Derive Key Pair
20,519,283 UART: [art] Store priv key in slot 0x5
22,982,338 UART: [art] Derive Key Pair - Done
22,995,276 UART: [art] Signing Cert with AUTHO
22,996,576 UART: RITY.KEYID = 7
24,707,338 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,839 UART: [art] PUB.X = E5649F0A088BB01DD1357FCE9D65E138BDF9CF34DEC99B4A64A4D070636F3D6C8D36E0AD1D629BE0EF4193CAD669876B
24,716,165 UART: [art] PUB.Y = 3D8A7723D46412C810273903308DFD57AF3E34E1D4DC2A568F54CDBAB788B5F4961499D86FFFB1FAAC422386EB4D3372
24,723,430 UART: [art] SIG.R = 73674F4BE5BF045AFA0ACD6B55D10CEA6554FA76FEA49E2B8FD694E98185120F59EBCC11FA56DD8B3ADC82EF18500C08
24,730,849 UART: [art] SIG.S = D70520A31121031BA5A2872995358883A0EFF41666796EBA5502F27D3213C6D68AE7261F95A8403362B35B2BD1586AFD
25,709,869 UART: Caliptra RT
25,710,593 UART: [state] CFI Enabled
25,874,225 UART: [rt] RT listening for mailbox commands...
25,876,148 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,906,159 UART: [rt]cmd =0x44504543, len=40
25,956,617 >>> mbox cmd response data (40 bytes)
25,957,782 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,987,935 UART: [rt]cmd =0x44504543, len=40
26,018,425 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,525 writing to cptra_bootfsm_go
192,755 UART:
193,117 UART: Running Caliptra ROM ...
194,307 UART:
194,477 UART: [state] CFI Enabled
259,504 UART: [state] LifecycleState = Unprovisioned
261,924 UART: [state] DebugLocked = No
263,251 UART: [state] WD Timer not started. Device not locked for debugging
267,006 UART: [kat] SHA2-256
456,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,621 UART: [kat] ++
468,103 UART: [kat] sha1
478,448 UART: [kat] SHA2-256
481,460 UART: [kat] SHA2-384
487,324 UART: [kat] SHA2-512-ACC
489,911 UART: [kat] ECC-384
2,947,484 UART: [kat] HMAC-384Kdf
2,971,709 UART: [kat] LMS
3,503,502 UART: [kat] --
3,508,990 UART: [cold-reset] ++
3,509,997 UART: [fht] FHT @ 0x50003400
3,522,205 UART: [idev] ++
3,522,952 UART: [idev] CDI.KEYID = 6
3,523,872 UART: [idev] SUBJECT.KEYID = 7
3,525,052 UART: [idev] UDS.KEYID = 0
3,525,984 ready_for_fw is high
3,526,189 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,342 UART: [idev] Erasing UDS.KEYID = 0
6,029,049 UART: [idev] Sha1 KeyId Algorithm
6,050,800 UART: [idev] --
6,055,455 UART: [ldev] ++
6,056,143 UART: [ldev] CDI.KEYID = 6
6,057,061 UART: [ldev] SUBJECT.KEYID = 5
6,058,222 UART: [ldev] AUTHORITY.KEYID = 7
6,059,458 UART: [ldev] FE.KEYID = 1
6,099,868 UART: [ldev] Erasing FE.KEYID = 1
8,611,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,272 UART: [ldev] --
10,413,846 UART: [fwproc] Wait for Commands...
10,416,531 UART: [fwproc] Recv command 0x46574c44
10,418,840 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,596,661 >>> mbox cmd response: success
14,599,944 UART: [afmc] ++
14,600,655 UART: [afmc] CDI.KEYID = 6
14,601,771 UART: [afmc] SUBJECT.KEYID = 7
14,603,324 UART: [afmc] AUTHORITY.KEYID = 5
17,129,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,870,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,181 UART: [afmc] --
18,927,668 UART: [cold-reset] --
18,931,066 UART: [state] Locking Datavault
18,937,840 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,996 UART: [state] Locking ICCM
18,942,369 UART: [exit] Launching FMC @ 0x40000130
18,950,993 UART:
18,951,227 UART: Running Caliptra FMC ...
18,952,328 UART:
18,952,488 UART: [state] CFI Enabled
19,010,469 UART: [fht] FMC Alias Private Key: 7
20,775,007 UART: [art] Extend RT PCRs Done
20,776,231 UART: [art] Lock RT PCRs Done
20,777,829 UART: [art] Populate DV Done
20,782,972 UART: [fht] FMC Alias Private Key: 7
20,784,518 UART: [art] Derive CDI
20,785,290 UART: [art] Store in in slot 0x4
20,843,423 UART: [art] Derive Key Pair
20,844,484 UART: [art] Store priv key in slot 0x5
23,307,813 UART: [art] Derive Key Pair - Done
23,320,755 UART: [art] Signing Cert with AUTHO
23,322,065 UART: RITY.KEYID = 7
25,033,669 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,327 UART: [art] PUB.X = A10C71F3428C9DA0416FABC0C8414712DC002684A86CC3901F544ABFE3BA2D8DAA1F6B6F605EEDEEB39E35FAE65A151E
25,042,452 UART: [art] PUB.Y = 66428DA32A958D083351284A87137233765A100BF8EACAD97C531F4DC49D3FCEB63A22DCA93DB8A0CE99B101EEA16866
25,049,718 UART: [art] SIG.R = 64A534E9DA12568945A9705CD9FC3C52123C7FC2EB4FC0DE3C41DD99F09573DDCF1174644673ADB1776032A02E9593AF
25,057,089 UART: [art] SIG.S = 13B70DDC969D486C871BBB83EEDD035F1C5B1A9B0626512FD41127D5F4183E2B894AD0AD4C589D38B2F55B8F64D12000
26,036,137 UART: Caliptra RT
26,036,832 UART: [state] CFI Enabled
26,203,675 UART: [rt] RT listening for mailbox commands...
26,205,593 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,235,741 UART: [rt]cmd =0x44504543, len=40
26,284,853 >>> mbox cmd response data (40 bytes)
26,285,966 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,316,307 UART: [rt]cmd =0x44504543, len=40
26,346,736 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,417,463 ready_for_fw is high
3,417,835 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,689,206 >>> mbox cmd response: success
18,980,251 UART:
18,981,028 UART: Running Caliptra FMC ...
18,982,167 UART:
18,982,325 UART: [state] CFI Enabled
19,046,810 UART: [fht] FMC Alias Private Key: 7
20,810,772 UART: [art] Extend RT PCRs Done
20,812,015 UART: [art] Lock RT PCRs Done
20,813,508 UART: [art] Populate DV Done
20,818,930 UART: [fht] FMC Alias Private Key: 7
20,820,414 UART: [art] Derive CDI
20,821,151 UART: [art] Store in in slot 0x4
20,879,434 UART: [art] Derive Key Pair
20,880,478 UART: [art] Store priv key in slot 0x5
23,343,397 UART: [art] Derive Key Pair - Done
23,356,336 UART: [art] Signing Cert with AUTHO
23,357,647 UART: RITY.KEYID = 7
25,069,155 UART: [art] Erasing AUTHORITY.KEYID = 7
25,070,654 UART: [art] PUB.X = E1B524F00FB127889DA56EB2550CE53FEEDBF8BBBB403278AC56715099C008AAD984CA1D717D07EBD487DFAB12A42F4F
25,077,983 UART: [art] PUB.Y = 97AD50E6F6DD58B8020C92BE201209D9744027E50124C37CB7DEB55A7ACB00D07EFB669B27F29E4D4F9517C1DF780349
25,085,202 UART: [art] SIG.R = 1A7980FEABC8E91649FB84B58C718DB581F0240BF7B64F3C87C96DAA79FBC610EBAE635EE2A304F435FB803B7036F138
25,092,623 UART: [art] SIG.S = 71EB5B89982C83A2C5354B574CC68520699980C16723118195EE680329DB5B6099C0597EB1FC695953A6FFAA32B73D33
26,071,420 UART: Caliptra RT
26,072,138 UART: [state] CFI Enabled
26,236,708 UART: [rt] RT listening for mailbox commands...
26,238,659 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,268,769 UART: [rt]cmd =0x44504543, len=40
26,318,671 >>> mbox cmd response data (40 bytes)
26,320,091 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,350,028 UART: [rt]cmd =0x44504543, len=40
26,380,569 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,469 UART:
192,835 UART: Running Caliptra ROM ...
194,021 UART:
603,617 UART: [state] CFI Enabled
615,497 UART: [state] LifecycleState = Unprovisioned
617,869 UART: [state] DebugLocked = No
619,182 UART: [state] WD Timer not started. Device not locked for debugging
624,704 UART: [kat] SHA2-256
814,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,356 UART: [kat] ++
825,970 UART: [kat] sha1
837,209 UART: [kat] SHA2-256
840,281 UART: [kat] SHA2-384
846,759 UART: [kat] SHA2-512-ACC
849,344 UART: [kat] ECC-384
3,291,552 UART: [kat] HMAC-384Kdf
3,303,880 UART: [kat] LMS
3,835,704 UART: [kat] --
3,837,855 UART: [cold-reset] ++
3,839,717 UART: [fht] FHT @ 0x50003400
3,851,973 UART: [idev] ++
3,852,686 UART: [idev] CDI.KEYID = 6
3,853,669 UART: [idev] SUBJECT.KEYID = 7
3,854,848 UART: [idev] UDS.KEYID = 0
3,855,793 ready_for_fw is high
3,855,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,603 UART: [idev] Erasing UDS.KEYID = 0
6,331,652 UART: [idev] Sha1 KeyId Algorithm
6,353,859 UART: [idev] --
6,359,255 UART: [ldev] ++
6,359,939 UART: [ldev] CDI.KEYID = 6
6,360,851 UART: [ldev] SUBJECT.KEYID = 5
6,362,007 UART: [ldev] AUTHORITY.KEYID = 7
6,363,247 UART: [ldev] FE.KEYID = 1
6,373,403 UART: [ldev] Erasing FE.KEYID = 1
8,854,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,907 UART: [ldev] --
10,647,602 UART: [fwproc] Wait for Commands...
10,649,370 UART: [fwproc] Recv command 0x46574c44
10,651,673 UART: [fwproc] Recv'd Img size: 114360 bytes
14,101,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,844,098 >>> mbox cmd response: success
14,848,513 UART: [afmc] ++
14,849,220 UART: [afmc] CDI.KEYID = 6
14,850,403 UART: [afmc] SUBJECT.KEYID = 7
14,851,891 UART: [afmc] AUTHORITY.KEYID = 5
17,349,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,348 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,807 UART: [afmc] --
19,142,482 UART: [cold-reset] --
19,146,719 UART: [state] Locking Datavault
19,152,393 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,579 UART: [state] Locking ICCM
19,156,730 UART: [exit] Launching FMC @ 0x40000130
19,165,389 UART:
19,165,621 UART: Running Caliptra FMC ...
19,166,722 UART:
19,166,877 UART: [state] CFI Enabled
19,175,354 UART: [fht] FMC Alias Private Key: 7
20,931,972 UART: [art] Extend RT PCRs Done
20,933,197 UART: [art] Lock RT PCRs Done
20,934,954 UART: [art] Populate DV Done
20,940,329 UART: [fht] FMC Alias Private Key: 7
20,941,922 UART: [art] Derive CDI
20,942,654 UART: [art] Store in in slot 0x4
20,985,300 UART: [art] Derive Key Pair
20,986,336 UART: [art] Store priv key in slot 0x5
23,413,178 UART: [art] Derive Key Pair - Done
23,426,235 UART: [art] Signing Cert with AUTHO
23,427,536 UART: RITY.KEYID = 7
25,133,045 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,561 UART: [art] PUB.X = 3AD5E9EC5B5F038D7269B23F048F4674D0EFE1D2CEEF30A44103BB8DFD924D99F4C0B32C1B02DFCECA4BBBBC6EF1DDD5
25,141,866 UART: [art] PUB.Y = C2E05574C2A68234EBB269BAD375D845D1281CDB68ABC205C176B2E5AAA879B2E307C013AE05051055D667EDDC3AECE9
25,149,152 UART: [art] SIG.R = B7794BFF59E5962DD005FD4999C30540BF832B1556CB4F493A3287D549311F0DA5058FEB07A1ADC3E2C3B9FE27F8F2B6
25,156,493 UART: [art] SIG.S = 7F1B06F6C7C0CC7BD4D0197898A9C45320A2B991E1883E84D1141C57B0CC823819271BB63769D718DE3CBF89F2169C7F
26,135,425 UART: Caliptra RT
26,136,137 UART: [state] CFI Enabled
26,253,208 UART: [rt] RT listening for mailbox commands...
26,255,149 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,285,296 UART: [rt]cmd =0x44504543, len=40
26,319,160 >>> mbox cmd response data (40 bytes)
26,320,456 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,350,610 UART: [rt]cmd =0x44504543, len=40
26,380,969 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,755,338 ready_for_fw is high
3,755,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,971,159 >>> mbox cmd response: success
19,222,322 UART:
19,222,708 UART: Running Caliptra FMC ...
19,223,901 UART:
19,224,069 UART: [state] CFI Enabled
19,231,758 UART: [fht] FMC Alias Private Key: 7
20,989,401 UART: [art] Extend RT PCRs Done
20,990,626 UART: [art] Lock RT PCRs Done
20,991,898 UART: [art] Populate DV Done
20,997,422 UART: [fht] FMC Alias Private Key: 7
20,999,124 UART: [art] Derive CDI
20,999,939 UART: [art] Store in in slot 0x4
21,042,434 UART: [art] Derive Key Pair
21,043,479 UART: [art] Store priv key in slot 0x5
23,470,386 UART: [art] Derive Key Pair - Done
23,483,271 UART: [art] Signing Cert with AUTHO
23,484,568 UART: RITY.KEYID = 7
25,189,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,114 UART: [art] PUB.X = 5F279DFBD5F34653310306C252CACF0628D9EDD4C2216B61DC546139DC940DBE99924EF4B91F6F08F272420CB0DCBE0F
25,198,431 UART: [art] PUB.Y = 3C2685808A52ACF2876B2CFFFB591B49BB233CE3D2D64E6CACF486BBCE1CC96B025D4F883DD781182C0274A30A52033C
25,205,693 UART: [art] SIG.R = A4A72BBA156B0B23202C97980E20C9B231EC436E2FB77A77D4005C59AF1C521F68B6FD82DF5C6BD7D381B12C1AAAA47F
25,213,095 UART: [art] SIG.S = FED691FE432D6D0ADE3BB7F930BAC6C9F101DF286E9D719CDE1884CEC3AE254973969FC1FA553249A086FD14DAF045CF
26,191,708 UART: Caliptra RT
26,192,400 UART: [state] CFI Enabled
26,309,168 UART: [rt] RT listening for mailbox commands...
26,311,094 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,341,563 UART: [rt]cmd =0x44504543, len=40
26,375,903 >>> mbox cmd response data (40 bytes)
26,377,093 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,407,376 UART: [rt]cmd =0x44504543, len=40
26,437,759 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,470 UART: [idev] ++
1,479,638 UART: [idev] CDI.KEYID = 6
1,479,998 UART: [idev] SUBJECT.KEYID = 7
1,480,422 UART: [idev] UDS.KEYID = 0
1,480,767 ready_for_fw is high
1,480,767 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,250 UART: [idev] Erasing UDS.KEYID = 0
1,504,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,598 UART: [idev] --
1,514,769 UART: [ldev] ++
1,514,937 UART: [ldev] CDI.KEYID = 6
1,515,300 UART: [ldev] SUBJECT.KEYID = 5
1,515,726 UART: [ldev] AUTHORITY.KEYID = 7
1,516,189 UART: [ldev] FE.KEYID = 1
1,521,311 UART: [ldev] Erasing FE.KEYID = 1
1,546,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,550 UART: [ldev] --
1,585,937 UART: [fwproc] Waiting for Commands...
1,586,796 UART: [fwproc] Received command 0x46574c44
1,587,587 UART: [fwproc] Received Image of size 114360 bytes
2,885,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,023 >>> mbox cmd response: success
3,080,247 UART: [afmc] ++
3,080,415 UART: [afmc] CDI.KEYID = 6
3,080,777 UART: [afmc] SUBJECT.KEYID = 7
3,081,202 UART: [afmc] AUTHORITY.KEYID = 5
3,116,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,692 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,382 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,471 UART: [afmc] --
3,159,519 UART: [cold-reset] --
3,160,581 UART: [state] Locking Datavault
3,161,638 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,242 UART: [state] Locking ICCM
3,162,798 UART: [exit] Launching FMC @ 0x40000130
3,168,127 UART:
3,168,143 UART: Running Caliptra FMC ...
3,168,551 UART:
3,168,605 UART: [state] CFI Enabled
3,179,298 UART: [fht] FMC Alias Private Key: 7
3,287,785 UART: [art] Extend RT PCRs Done
3,288,213 UART: [art] Lock RT PCRs Done
3,289,589 UART: [art] Populate DV Done
3,297,730 UART: [fht] FMC Alias Private Key: 7
3,298,904 UART: [art] Derive CDI
3,299,184 UART: [art] Store in in slot 0x4
3,384,639 UART: [art] Derive Key Pair
3,384,999 UART: [art] Store priv key in slot 0x5
3,398,305 UART: [art] Derive Key Pair - Done
3,413,428 UART: [art] Signing Cert with AUTHO
3,413,908 UART: RITY.KEYID = 7
3,429,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,775 UART: [art] PUB.X = 2D7123C6306ACF59104B32469707A4CD1BA5821886293DE9A1E25E92FC059FC2DC7ACF10E9A08868685609A4BA28E4E0
3,436,538 UART: [art] PUB.Y = 16132C722A16317E7AFD4287702847AC58B496EAD228450783DE095D1698EBEE41C8179BFCB3C47F156E52FC8D0A5D9E
3,443,483 UART: [art] SIG.R = 69B7DEE52FE60214759D6CAE64C3AF29D6F4E01C6ED9BEF5A7BEBC0C5A00092007FF7B495E85440BF08A8A11B4CFF456
3,450,236 UART: [art] SIG.S = E903A781C035F0FBE8C6707CECB3E319AA05B45190D292502F4F6EB912D675244F371D055D54367C06D1E35166A52B93
3,473,775 UART: Caliptra RT
3,474,029 UART: [state] CFI Enabled
3,581,813 UART: [rt] RT listening for mailbox commands...
3,582,483 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,246 UART: [rt]cmd =0x44504543, len=40
3,645,687 >>> mbox cmd response data (40 bytes)
3,645,688 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,243 UART: [rt]cmd =0x44504543, len=40
3,705,900 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,813 ready_for_fw is high
1,362,813 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,127 >>> mbox cmd response: success
2,988,505 UART:
2,988,521 UART: Running Caliptra FMC ...
2,988,929 UART:
2,988,983 UART: [state] CFI Enabled
2,999,164 UART: [fht] FMC Alias Private Key: 7
3,107,121 UART: [art] Extend RT PCRs Done
3,107,549 UART: [art] Lock RT PCRs Done
3,109,009 UART: [art] Populate DV Done
3,117,014 UART: [fht] FMC Alias Private Key: 7
3,117,952 UART: [art] Derive CDI
3,118,232 UART: [art] Store in in slot 0x4
3,204,013 UART: [art] Derive Key Pair
3,204,373 UART: [art] Store priv key in slot 0x5
3,217,497 UART: [art] Derive Key Pair - Done
3,232,214 UART: [art] Signing Cert with AUTHO
3,232,694 UART: RITY.KEYID = 7
3,248,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,833 UART: [art] PUB.X = B7CDA90FD3A8A3A64082BBA33061B14E82FFE232B575EBBBF63E18C694CC90230EA4172932A20A797D09F24981153808
3,255,592 UART: [art] PUB.Y = E6E3FE842AFCD200CD00F94E886CEBF097AC836A179857D4F82A9AEA3A7DF88EDFFE1618781EDA1F753F76B3618507DA
3,262,515 UART: [art] SIG.R = B9F4A87784E4CD273FC10BDB09D2C5A62562549734F94E090B0EF25C6CECEA1C07FC1151B67508B4D1C388C1E619D8FD
3,269,276 UART: [art] SIG.S = ED0BC6815FC672769730F28A1E01BA30F02C427E0C6CC6F8108E059C2B8E7D82AE428C8BFD525E8B932B3D27B8D30B22
3,293,274 UART: Caliptra RT
3,293,528 UART: [state] CFI Enabled
3,401,765 UART: [rt] RT listening for mailbox commands...
3,402,435 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,168 UART: [rt]cmd =0x44504543, len=40
3,465,941 >>> mbox cmd response data (40 bytes)
3,465,942 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,707 UART: [rt]cmd =0x44504543, len=40
3,526,534 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
890,906 UART: [kat] SHA2-256
892,844 UART: [kat] SHA2-384
895,831 UART: [kat] SHA2-512-ACC
897,732 UART: [kat] ECC-384
903,591 UART: [kat] HMAC-384Kdf
908,225 UART: [kat] LMS
1,476,421 UART: [kat] --
1,477,266 UART: [cold-reset] ++
1,477,738 UART: [fht] Storing FHT @ 0x50003400
1,480,663 UART: [idev] ++
1,480,831 UART: [idev] CDI.KEYID = 6
1,481,191 UART: [idev] SUBJECT.KEYID = 7
1,481,615 UART: [idev] UDS.KEYID = 0
1,481,960 ready_for_fw is high
1,481,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,506,055 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,797 UART: [idev] --
1,515,750 UART: [ldev] ++
1,515,918 UART: [ldev] CDI.KEYID = 6
1,516,281 UART: [ldev] SUBJECT.KEYID = 5
1,516,707 UART: [ldev] AUTHORITY.KEYID = 7
1,517,170 UART: [ldev] FE.KEYID = 1
1,522,348 UART: [ldev] Erasing FE.KEYID = 1
1,547,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,423 UART: [ldev] --
1,586,784 UART: [fwproc] Waiting for Commands...
1,587,525 UART: [fwproc] Received command 0x46574c44
1,588,316 UART: [fwproc] Received Image of size 114360 bytes
2,886,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,134 >>> mbox cmd response: success
3,080,194 UART: [afmc] ++
3,080,362 UART: [afmc] CDI.KEYID = 6
3,080,724 UART: [afmc] SUBJECT.KEYID = 7
3,081,149 UART: [afmc] AUTHORITY.KEYID = 5
3,116,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,967 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,657 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,604 UART: [afmc] --
3,159,556 UART: [cold-reset] --
3,160,214 UART: [state] Locking Datavault
3,161,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,959 UART: [state] Locking ICCM
3,162,397 UART: [exit] Launching FMC @ 0x40000130
3,167,726 UART:
3,167,742 UART: Running Caliptra FMC ...
3,168,150 UART:
3,168,293 UART: [state] CFI Enabled
3,179,136 UART: [fht] FMC Alias Private Key: 7
3,287,099 UART: [art] Extend RT PCRs Done
3,287,527 UART: [art] Lock RT PCRs Done
3,289,415 UART: [art] Populate DV Done
3,297,476 UART: [fht] FMC Alias Private Key: 7
3,298,484 UART: [art] Derive CDI
3,298,764 UART: [art] Store in in slot 0x4
3,384,607 UART: [art] Derive Key Pair
3,384,967 UART: [art] Store priv key in slot 0x5
3,398,141 UART: [art] Derive Key Pair - Done
3,412,741 UART: [art] Signing Cert with AUTHO
3,413,221 UART: RITY.KEYID = 7
3,428,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,052 UART: [art] PUB.X = F5152E8FD1D62F89C127FB95A9676CAA937F8D72EDB974BA08C7E9DC0590863FE81FEF6F78AE6FEB73F32BB92D89AA72
3,435,836 UART: [art] PUB.Y = B63C9AA2DAF22D16F0ECC57A49EDC121549D8B8F2A0661735AEC3C166FF183B0F592329A2E39867C07C91FCA2565CD5F
3,442,794 UART: [art] SIG.R = A1FEC09824435CB71A700C2418F86A851A2C979678DE762ED901A4600F9A0CA9205E2F2F965AF9E93D7A5FC5DD07509C
3,449,555 UART: [art] SIG.S = E1547518B615B8062D169966400274824114DC4E6F80C852E4817DE6B9EBC7B87B249BD74100BAE617228EADF1F8FA9E
3,472,646 UART: Caliptra RT
3,472,992 UART: [state] CFI Enabled
3,581,701 UART: [rt] RT listening for mailbox commands...
3,582,371 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,146 UART: [rt]cmd =0x44504543, len=40
3,646,251 >>> mbox cmd response data (40 bytes)
3,646,252 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,621 UART: [rt]cmd =0x44504543, len=40
3,706,654 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,824 ready_for_fw is high
1,363,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,542 >>> mbox cmd response: success
2,989,492 UART:
2,989,508 UART: Running Caliptra FMC ...
2,989,916 UART:
2,990,059 UART: [state] CFI Enabled
3,000,772 UART: [fht] FMC Alias Private Key: 7
3,108,755 UART: [art] Extend RT PCRs Done
3,109,183 UART: [art] Lock RT PCRs Done
3,110,939 UART: [art] Populate DV Done
3,119,394 UART: [fht] FMC Alias Private Key: 7
3,120,488 UART: [art] Derive CDI
3,120,768 UART: [art] Store in in slot 0x4
3,206,393 UART: [art] Derive Key Pair
3,206,753 UART: [art] Store priv key in slot 0x5
3,220,165 UART: [art] Derive Key Pair - Done
3,234,996 UART: [art] Signing Cert with AUTHO
3,235,476 UART: RITY.KEYID = 7
3,250,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,309 UART: [art] PUB.X = A715C94FF8D25A6BAE252469253B711096486DD8667821461ADE50962430044AFC1DA65711410412BA92592EE4A1B336
3,258,063 UART: [art] PUB.Y = BCF5F3B8564B12BE0C831B2F8B28D3A826061788C6ECAE31AB3FE15D47DA82B7308AC0F25022027AB196B93DC4927837
3,265,012 UART: [art] SIG.R = 33F7417BD2D264CDECE0AAB5470167DBAB668D62C10DCC02C7A961233DD8D190391BE8254C53F02CC02E379A1913F851
3,271,781 UART: [art] SIG.S = 3B6BE0D637049565C4CC49051EDF77FC21BCC374C23B2D8A10EE2622F53EB4BE79BA47EBE008D430DA8AE8F56FBC760C
3,295,484 UART: Caliptra RT
3,295,830 UART: [state] CFI Enabled
3,404,599 UART: [rt] RT listening for mailbox commands...
3,405,269 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,048 UART: [rt]cmd =0x44504543, len=40
3,469,737 >>> mbox cmd response data (40 bytes)
3,469,738 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,147 UART: [rt]cmd =0x44504543, len=40
3,529,848 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
893,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,679 UART: [kat] ++
897,831 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,850 UART: [kat] SHA2-512-ACC
908,751 UART: [kat] ECC-384
918,908 UART: [kat] HMAC-384Kdf
923,562 UART: [kat] LMS
1,171,890 UART: [kat] --
1,172,739 UART: [cold-reset] ++
1,173,089 UART: [fht] FHT @ 0x50003400
1,175,812 UART: [idev] ++
1,175,980 UART: [idev] CDI.KEYID = 6
1,176,340 UART: [idev] SUBJECT.KEYID = 7
1,176,764 UART: [idev] UDS.KEYID = 0
1,177,109 ready_for_fw is high
1,177,109 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,454 UART: [idev] Erasing UDS.KEYID = 0
1,201,581 UART: [idev] Sha1 KeyId Algorithm
1,210,061 UART: [idev] --
1,210,995 UART: [ldev] ++
1,211,163 UART: [ldev] CDI.KEYID = 6
1,211,526 UART: [ldev] SUBJECT.KEYID = 5
1,211,952 UART: [ldev] AUTHORITY.KEYID = 7
1,212,415 UART: [ldev] FE.KEYID = 1
1,217,885 UART: [ldev] Erasing FE.KEYID = 1
1,244,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,389 UART: [ldev] --
1,283,826 UART: [fwproc] Wait for Commands...
1,284,532 UART: [fwproc] Recv command 0x46574c44
1,285,260 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,792 >>> mbox cmd response: success
2,775,982 UART: [afmc] ++
2,776,150 UART: [afmc] CDI.KEYID = 6
2,776,512 UART: [afmc] SUBJECT.KEYID = 7
2,776,937 UART: [afmc] AUTHORITY.KEYID = 5
2,812,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,261 UART: [afmc] --
2,855,299 UART: [cold-reset] --
2,856,377 UART: [state] Locking Datavault
2,857,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,064 UART: [state] Locking ICCM
2,858,510 UART: [exit] Launching FMC @ 0x40000130
2,863,839 UART:
2,863,855 UART: Running Caliptra FMC ...
2,864,263 UART:
2,864,317 UART: [state] CFI Enabled
2,874,832 UART: [fht] FMC Alias Private Key: 7
2,982,559 UART: [art] Extend RT PCRs Done
2,982,987 UART: [art] Lock RT PCRs Done
2,984,439 UART: [art] Populate DV Done
2,992,578 UART: [fht] FMC Alias Private Key: 7
2,993,742 UART: [art] Derive CDI
2,994,022 UART: [art] Store in in slot 0x4
3,079,925 UART: [art] Derive Key Pair
3,080,285 UART: [art] Store priv key in slot 0x5
3,093,963 UART: [art] Derive Key Pair - Done
3,108,628 UART: [art] Signing Cert with AUTHO
3,109,108 UART: RITY.KEYID = 7
3,124,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,793 UART: [art] PUB.X = 0289CF1B8F259181C3A08701DFE4622CD6A52BD518E7D332E5ED7A83C819D670F04802A90BDB513DDE11A713BB358DA4
3,131,559 UART: [art] PUB.Y = 1787323DD010F33AB9C0658C6A3C238AE442F1F158B088C0084A8A55FEDBF94D53465DA078EE646DEDEB35B93D2F47D7
3,138,516 UART: [art] SIG.R = 6FCC9754DEBDBC55D09472AE608EE171635FABB35E5228E5A2D680FF335FE5CDE6E4E7734F660A05C6E1BC779FC1D824
3,145,298 UART: [art] SIG.S = 2A1B8330D4ECB657F5ABEBC822E891589CD25AE786B33046D32895362421676A404AE764ED5275696D297FAF4FA85632
3,169,451 UART: Caliptra RT
3,169,705 UART: [state] CFI Enabled
3,278,123 UART: [rt] RT listening for mailbox commands...
3,278,793 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,514 UART: [rt]cmd =0x44504543, len=40
3,342,755 >>> mbox cmd response data (40 bytes)
3,342,756 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,509 UART: [rt]cmd =0x44504543, len=40
3,403,090 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 ready_for_fw is high
1,059,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,677 >>> mbox cmd response: success
2,687,413 UART:
2,687,429 UART: Running Caliptra FMC ...
2,687,837 UART:
2,687,891 UART: [state] CFI Enabled
2,698,708 UART: [fht] FMC Alias Private Key: 7
2,806,511 UART: [art] Extend RT PCRs Done
2,806,939 UART: [art] Lock RT PCRs Done
2,808,721 UART: [art] Populate DV Done
2,817,068 UART: [fht] FMC Alias Private Key: 7
2,818,194 UART: [art] Derive CDI
2,818,474 UART: [art] Store in in slot 0x4
2,904,061 UART: [art] Derive Key Pair
2,904,421 UART: [art] Store priv key in slot 0x5
2,917,585 UART: [art] Derive Key Pair - Done
2,932,113 UART: [art] Signing Cert with AUTHO
2,932,593 UART: RITY.KEYID = 7
2,947,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,476 UART: [art] PUB.X = 7CA8BB0CEB61DFF05C038BDD4F0DB194D9E3DA921333DC882E41EDA10298DBFF018484C4F536A8F7233630FDDBE24D16
2,955,251 UART: [art] PUB.Y = 360D4822D550F8F0C8233CED3D02FAC82905B8D14E7A501117C1F63FCC7B5AAD3F061499A61676CD7CD0E915991EF01F
2,962,197 UART: [art] SIG.R = 7E74E13515A2188366FE22D6D2DDF8A9F4E41D16E3C0D38D6C3068ED3BE86369CB9CF5CABE6E96DA18B0C945B9328879
2,968,979 UART: [art] SIG.S = C4CF633120A4E1780581C063E820ABCC2E223851589777DA9425CCD93AD4EEF3DFC31CD805D54839304414FBE04ABE7F
2,992,774 UART: Caliptra RT
2,993,028 UART: [state] CFI Enabled
3,100,380 UART: [rt] RT listening for mailbox commands...
3,101,050 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,981 UART: [rt]cmd =0x44504543, len=40
3,165,100 >>> mbox cmd response data (40 bytes)
3,165,101 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,708 UART: [rt]cmd =0x44504543, len=40
3,225,207 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
918,437 UART: [kat] HMAC-384Kdf
923,093 UART: [kat] LMS
1,171,421 UART: [kat] --
1,172,310 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,439 UART: [idev] ++
1,175,607 UART: [idev] CDI.KEYID = 6
1,175,967 UART: [idev] SUBJECT.KEYID = 7
1,176,391 UART: [idev] UDS.KEYID = 0
1,176,736 ready_for_fw is high
1,176,736 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,175 UART: [idev] Erasing UDS.KEYID = 0
1,201,164 UART: [idev] Sha1 KeyId Algorithm
1,209,548 UART: [idev] --
1,210,534 UART: [ldev] ++
1,210,702 UART: [ldev] CDI.KEYID = 6
1,211,065 UART: [ldev] SUBJECT.KEYID = 5
1,211,491 UART: [ldev] AUTHORITY.KEYID = 7
1,211,954 UART: [ldev] FE.KEYID = 1
1,217,170 UART: [ldev] Erasing FE.KEYID = 1
1,243,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,582 UART: [ldev] --
1,283,075 UART: [fwproc] Wait for Commands...
1,283,675 UART: [fwproc] Recv command 0x46574c44
1,284,403 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,881 >>> mbox cmd response: success
2,777,143 UART: [afmc] ++
2,777,311 UART: [afmc] CDI.KEYID = 6
2,777,673 UART: [afmc] SUBJECT.KEYID = 7
2,778,098 UART: [afmc] AUTHORITY.KEYID = 5
2,814,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,482 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,210 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,814 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,536 UART: [afmc] --
2,857,524 UART: [cold-reset] --
2,858,372 UART: [state] Locking Datavault
2,859,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,339 UART: [state] Locking ICCM
2,860,873 UART: [exit] Launching FMC @ 0x40000130
2,866,202 UART:
2,866,218 UART: Running Caliptra FMC ...
2,866,626 UART:
2,866,769 UART: [state] CFI Enabled
2,877,484 UART: [fht] FMC Alias Private Key: 7
2,984,505 UART: [art] Extend RT PCRs Done
2,984,933 UART: [art] Lock RT PCRs Done
2,986,485 UART: [art] Populate DV Done
2,994,790 UART: [fht] FMC Alias Private Key: 7
2,995,920 UART: [art] Derive CDI
2,996,200 UART: [art] Store in in slot 0x4
3,081,899 UART: [art] Derive Key Pair
3,082,259 UART: [art] Store priv key in slot 0x5
3,096,305 UART: [art] Derive Key Pair - Done
3,111,391 UART: [art] Signing Cert with AUTHO
3,111,871 UART: RITY.KEYID = 7
3,126,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,528 UART: [art] PUB.X = F99C379C1B9BC828099899D1A22056525CBA16133578F26D80147E11EA20120AC47F2E2678EF2E75BB16DE6BF95A8AB8
3,134,294 UART: [art] PUB.Y = 14230347EEC63C8664EEACF8D47380BCB566A38B232E577E8DFD7D3AC828A20CB29554FF94B62EB58767308D69DB6604
3,141,241 UART: [art] SIG.R = DC2820DA3A0B14BE76D8077F30B34151DE96EC1E187E5A58C65F4D4D209910582730EA4B6E28B6183B255FFA1D39FFCB
3,148,015 UART: [art] SIG.S = 53DEE4F286435DCE86148B5B9EAFCCEBE4C04D2671CF67F7F705B5AD43A6180E58D2504ECA5B8CD610547C2377DE631C
3,171,664 UART: Caliptra RT
3,172,010 UART: [state] CFI Enabled
3,279,410 UART: [rt] RT listening for mailbox commands...
3,280,080 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,143 UART: [rt]cmd =0x44504543, len=40
3,343,822 >>> mbox cmd response data (40 bytes)
3,343,823 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,392 UART: [rt]cmd =0x44504543, len=40
3,403,889 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 ready_for_fw is high
1,060,806 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,240 >>> mbox cmd response: success
2,689,892 UART:
2,689,908 UART: Running Caliptra FMC ...
2,690,316 UART:
2,690,459 UART: [state] CFI Enabled
2,701,006 UART: [fht] FMC Alias Private Key: 7
2,808,843 UART: [art] Extend RT PCRs Done
2,809,271 UART: [art] Lock RT PCRs Done
2,810,489 UART: [art] Populate DV Done
2,818,616 UART: [fht] FMC Alias Private Key: 7
2,819,708 UART: [art] Derive CDI
2,819,988 UART: [art] Store in in slot 0x4
2,905,683 UART: [art] Derive Key Pair
2,906,043 UART: [art] Store priv key in slot 0x5
2,919,611 UART: [art] Derive Key Pair - Done
2,934,787 UART: [art] Signing Cert with AUTHO
2,935,267 UART: RITY.KEYID = 7
2,950,227 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,992 UART: [art] PUB.X = 79167E2481A0069F78400ACBFE2FE598A23D608949C475C002B908EBBACB6B0B4BAD5A40797FA14337CFE48E8E9A71EB
2,957,759 UART: [art] PUB.Y = 4D5C0132FF0433A3701366C44D04E2ADB49E1061BD768F5CB161B4FCDEA120B472BE1ADBC8C2CBD78DBA0CD0BE33B1CE
2,964,723 UART: [art] SIG.R = 4375A5E4B3CACE4A27E74FF9C765B1ED9AB4077C9C77377E4F07789C72F62AD1E1924B814AAC3A4D58C07167365CE404
2,971,492 UART: [art] SIG.S = B643FDFBD38E8710399EBEEE859DA96A810A9644A0AB046F00113B6DB3D1316A08CBA9D07D7F9EE0DCC97637ED31EA9F
2,995,216 UART: Caliptra RT
2,995,562 UART: [state] CFI Enabled
3,103,280 UART: [rt] RT listening for mailbox commands...
3,103,950 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,743 UART: [rt]cmd =0x44504543, len=40
3,168,002 >>> mbox cmd response data (40 bytes)
3,168,003 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,800 UART: [rt]cmd =0x44504543, len=40
3,228,173 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
921,036 UART: [kat] LMS
1,169,348 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,241 UART: [idev] ++
1,173,409 UART: [idev] CDI.KEYID = 6
1,173,770 UART: [idev] SUBJECT.KEYID = 7
1,174,195 UART: [idev] UDS.KEYID = 0
1,174,541 ready_for_fw is high
1,174,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,157 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,226 UART: [ldev] ++
1,209,394 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,185 UART: [ldev] AUTHORITY.KEYID = 7
1,210,648 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,520 >>> mbox cmd response: success
2,773,711 UART: [afmc] ++
2,773,879 UART: [afmc] CDI.KEYID = 6
2,774,242 UART: [afmc] SUBJECT.KEYID = 7
2,774,668 UART: [afmc] AUTHORITY.KEYID = 5
2,809,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,003 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,682 UART: [afmc] --
2,852,594 UART: [cold-reset] --
2,853,504 UART: [state] Locking Datavault
2,854,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,193 UART: [state] Locking ICCM
2,855,859 UART: [exit] Launching FMC @ 0x40000130
2,861,188 UART:
2,861,204 UART: Running Caliptra FMC ...
2,861,612 UART:
2,861,666 UART: [state] CFI Enabled
2,872,165 UART: [fht] FMC Alias Private Key: 7
2,979,532 UART: [art] Extend RT PCRs Done
2,979,960 UART: [art] Lock RT PCRs Done
2,981,506 UART: [art] Populate DV Done
2,989,621 UART: [fht] FMC Alias Private Key: 7
2,990,673 UART: [art] Derive CDI
2,990,953 UART: [art] Store in in slot 0x4
3,076,292 UART: [art] Derive Key Pair
3,076,652 UART: [art] Store priv key in slot 0x5
3,090,120 UART: [art] Derive Key Pair - Done
3,104,900 UART: [art] Signing Cert with AUTHO
3,105,380 UART: RITY.KEYID = 7
3,120,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,475 UART: [art] PUB.X = 639F344FEE19FF360D6FA58C41D5238F98D6158BA04714D88EF8E39BA3611D2E43ED5964C5B45A91712E29474E05EA15
3,128,241 UART: [art] PUB.Y = 6802CF43EF6BB68722DBBD8BC8A8BFA622216F773D597DC9F539791C493CDECFF99BFA15A9D34AF9C05ECFF1AEB4B0F4
3,135,216 UART: [art] SIG.R = 1938C3BA329686A1D08FBDC84B2F068260C760CC52BA4481465589A10F2AB0564718523AEF1722129D91DB140738A90C
3,141,968 UART: [art] SIG.S = 08EAD3049772CF8B1D88F64031AF3602D2B083D6C2B220D7D01A39FC8FE227A6BBB0BE562E90FC625A0A8ECB951CB309
3,165,646 UART: Caliptra RT
3,165,900 UART: [state] CFI Enabled
3,273,978 UART: [rt] RT listening for mailbox commands...
3,274,648 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,449 UART: [rt]cmd =0x44504543, len=40
3,337,888 >>> mbox cmd response data (40 bytes)
3,337,889 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,304 UART: [rt]cmd =0x44504543, len=40
3,398,083 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,888 ready_for_fw is high
1,055,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,632 >>> mbox cmd response: success
2,684,916 UART:
2,684,932 UART: Running Caliptra FMC ...
2,685,340 UART:
2,685,394 UART: [state] CFI Enabled
2,695,947 UART: [fht] FMC Alias Private Key: 7
2,804,058 UART: [art] Extend RT PCRs Done
2,804,486 UART: [art] Lock RT PCRs Done
2,805,836 UART: [art] Populate DV Done
2,813,959 UART: [fht] FMC Alias Private Key: 7
2,815,101 UART: [art] Derive CDI
2,815,381 UART: [art] Store in in slot 0x4
2,900,782 UART: [art] Derive Key Pair
2,901,142 UART: [art] Store priv key in slot 0x5
2,914,604 UART: [art] Derive Key Pair - Done
2,929,241 UART: [art] Signing Cert with AUTHO
2,929,721 UART: RITY.KEYID = 7
2,944,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,292 UART: [art] PUB.X = 52CD65C3ED4C239FFE95EA20352CE64D3BB25E2AA88A3E33CA9C3C32A1DDBFB8CE28CEA74ACB12C53CD2C9977C4EDEA2
2,952,096 UART: [art] PUB.Y = 59C04956FE75EBDB831B16BDFC21A735101D50D999E228AC23935D87752C6AC14DEC9BA2339C6A7AEF2D820ADDC897D4
2,959,057 UART: [art] SIG.R = 46AE3AC7DD809CA9709B19B1FD6810DDC5B481340387FF296163C86CCBA74C9E6292D6D1DE2344CA59647D054D945F5F
2,965,829 UART: [art] SIG.S = 6DBCC7A971A5CABA586F821078B7334290F3B901DFAEAD0BA07658EA28AC0C4ADB8AFF386A012F94D48B07CA8A4BB23D
2,988,797 UART: Caliptra RT
2,989,051 UART: [state] CFI Enabled
3,095,917 UART: [rt] RT listening for mailbox commands...
3,096,587 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,228 UART: [rt]cmd =0x44504543, len=40
3,160,221 >>> mbox cmd response data (40 bytes)
3,160,222 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,699 UART: [rt]cmd =0x44504543, len=40
3,220,592 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,915 UART: [state] LifecycleState = Unprovisioned
86,570 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,032 UART: [kat] ++
896,184 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
917,069 UART: [kat] HMAC-384Kdf
921,605 UART: [kat] LMS
1,169,917 UART: [kat] --
1,170,804 UART: [cold-reset] ++
1,171,228 UART: [fht] FHT @ 0x50003400
1,173,658 UART: [idev] ++
1,173,826 UART: [idev] CDI.KEYID = 6
1,174,187 UART: [idev] SUBJECT.KEYID = 7
1,174,612 UART: [idev] UDS.KEYID = 0
1,174,958 ready_for_fw is high
1,174,958 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,296 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,717 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x46574c44
1,283,063 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,245 >>> mbox cmd response: success
2,773,480 UART: [afmc] ++
2,773,648 UART: [afmc] CDI.KEYID = 6
2,774,011 UART: [afmc] SUBJECT.KEYID = 7
2,774,437 UART: [afmc] AUTHORITY.KEYID = 5
2,810,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,488 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,090 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,959 UART: [afmc] --
2,853,995 UART: [cold-reset] --
2,854,791 UART: [state] Locking Datavault
2,856,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,804 UART: [state] Locking ICCM
2,857,476 UART: [exit] Launching FMC @ 0x40000130
2,862,805 UART:
2,862,821 UART: Running Caliptra FMC ...
2,863,229 UART:
2,863,372 UART: [state] CFI Enabled
2,873,911 UART: [fht] FMC Alias Private Key: 7
2,981,728 UART: [art] Extend RT PCRs Done
2,982,156 UART: [art] Lock RT PCRs Done
2,983,610 UART: [art] Populate DV Done
2,991,917 UART: [fht] FMC Alias Private Key: 7
2,992,999 UART: [art] Derive CDI
2,993,279 UART: [art] Store in in slot 0x4
3,079,208 UART: [art] Derive Key Pair
3,079,568 UART: [art] Store priv key in slot 0x5
3,092,358 UART: [art] Derive Key Pair - Done
3,107,219 UART: [art] Signing Cert with AUTHO
3,107,699 UART: RITY.KEYID = 7
3,123,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,828 UART: [art] PUB.X = 2A0FE5EDD777157FF144A5963C72D3C6494DFA48FB29D5C69CB6F1EA72308F7E59F692DF72E38573B15201846B8420F3
3,130,596 UART: [art] PUB.Y = 5B900A29EA76FE287FE85C2222A45C7C80239F193EEAEE20B75BE5D6823025D1257468DD5788F819F14680E53A37EAA6
3,137,545 UART: [art] SIG.R = D0E8034FD5892D84FE65F38E185A31C41BD1276EE921941D97135641F5A75CDB9A6F14D11F92C659211D05E452078A28
3,144,302 UART: [art] SIG.S = A84E3BA0B44D9772A91BA413120BF51FD017EA0F7791C78F2450EF783029FA984567BE3044B99205FA11DF833FA6409B
3,168,742 UART: Caliptra RT
3,169,088 UART: [state] CFI Enabled
3,277,707 UART: [rt] RT listening for mailbox commands...
3,278,377 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,246 UART: [rt]cmd =0x44504543, len=40
3,342,201 >>> mbox cmd response data (40 bytes)
3,342,202 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,917 UART: [rt]cmd =0x44504543, len=40
3,402,376 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,417 ready_for_fw is high
1,056,417 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,839 >>> mbox cmd response: success
2,684,999 UART:
2,685,015 UART: Running Caliptra FMC ...
2,685,423 UART:
2,685,566 UART: [state] CFI Enabled
2,695,881 UART: [fht] FMC Alias Private Key: 7
2,803,890 UART: [art] Extend RT PCRs Done
2,804,318 UART: [art] Lock RT PCRs Done
2,806,124 UART: [art] Populate DV Done
2,814,301 UART: [fht] FMC Alias Private Key: 7
2,815,263 UART: [art] Derive CDI
2,815,543 UART: [art] Store in in slot 0x4
2,901,018 UART: [art] Derive Key Pair
2,901,378 UART: [art] Store priv key in slot 0x5
2,914,622 UART: [art] Derive Key Pair - Done
2,929,463 UART: [art] Signing Cert with AUTHO
2,929,943 UART: RITY.KEYID = 7
2,945,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,086 UART: [art] PUB.X = 3AA2D6AD4B5513FDC0C0972CE4E201B4960B81BB2151D2FF9F776DCDE9ACDB11594251F78C4B5220EE9B2CD6650B3DA4
2,952,865 UART: [art] PUB.Y = B5E5059C954E351976E8DC6D2FFCFA66E390376140E673A7EDF44E6F90C94811CC5FC52AA1BB15C53647CB4117FFAA1E
2,959,826 UART: [art] SIG.R = 10556758416DF8600A946106D820797847DECEAD502C742D5BC5B4FE17BC7DF9B27394525B324A0511BDFC6C4745AF64
2,966,587 UART: [art] SIG.S = 12BF60CBC620D0593E8D62B4E7A75D9E2059711A354AFA0A6DFDECD6F80517571439B6136B0CC78E4C5A5971A12DC3FB
2,990,515 UART: Caliptra RT
2,990,861 UART: [state] CFI Enabled
3,098,723 UART: [rt] RT listening for mailbox commands...
3,099,393 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,876 UART: [rt]cmd =0x44504543, len=40
3,162,347 >>> mbox cmd response data (40 bytes)
3,162,348 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,769 UART: [rt]cmd =0x44504543, len=40
3,222,526 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
192,754 UART:
193,103 UART: Running Caliptra ROM ...
194,274 UART:
194,423 UART: [state] CFI Enabled
261,067 UART: [state] LifecycleState = Unprovisioned
263,044 UART: [state] DebugLocked = No
264,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,151 UART: [kat] SHA2-256
438,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,333 UART: [kat] ++
449,929 UART: [kat] sha1
461,733 UART: [kat] SHA2-256
464,371 UART: [kat] SHA2-384
469,515 UART: [kat] SHA2-512-ACC
471,883 UART: [kat] ECC-384
2,768,657 UART: [kat] HMAC-384Kdf
2,800,744 UART: [kat] LMS
3,990,986 UART: [kat] --
3,994,706 UART: [cold-reset] ++
3,996,873 UART: [fht] Storing FHT @ 0x50003400
4,008,724 UART: [idev] ++
4,009,289 UART: [idev] CDI.KEYID = 6
4,010,170 UART: [idev] SUBJECT.KEYID = 7
4,011,478 UART: [idev] UDS.KEYID = 0
4,012,432 ready_for_fw is high
4,012,613 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,456 UART: [idev] Erasing UDS.KEYID = 0
7,344,165 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,191 UART: [idev] --
7,370,121 UART: [ldev] ++
7,370,702 UART: [ldev] CDI.KEYID = 6
7,371,664 UART: [ldev] SUBJECT.KEYID = 5
7,372,865 UART: [ldev] AUTHORITY.KEYID = 7
7,374,141 UART: [ldev] FE.KEYID = 1
7,404,057 UART: [ldev] Erasing FE.KEYID = 1
10,736,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,262 UART: [ldev] --
13,117,927 UART: [fwproc] Waiting for Commands...
13,120,270 UART: [fwproc] Received command 0x46574c44
13,122,504 UART: [fwproc] Received Image of size 114036 bytes
17,181,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,291 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,644,324 >>> mbox cmd response: success
17,644,907 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,647,792 UART: [afmc] ++
17,648,431 UART: [afmc] CDI.KEYID = 6
17,649,499 UART: [afmc] SUBJECT.KEYID = 7
17,650,594 UART: [afmc] AUTHORITY.KEYID = 5
21,010,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,781 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,186 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,002 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,469 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,818 UART: [afmc] --
23,381,926 UART: [cold-reset] --
23,384,128 UART: [state] Locking Datavault
23,390,290 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,042 UART: [state] Locking ICCM
23,394,563 UART: [exit] Launching FMC @ 0x40000130
23,402,952 UART:
23,403,179 UART: Running Caliptra FMC ...
23,404,273 UART:
23,404,424 UART: [state] CFI Enabled
23,469,661 UART: [fht] FMC Alias Private Key: 7
25,807,362 UART: [art] Extend RT PCRs Done
25,808,574 UART: [art] Lock RT PCRs Done
25,810,324 UART: [art] Populate DV Done
25,815,616 UART: [fht] FMC Alias Private Key: 7
25,817,361 UART: [art] Derive CDI
25,818,165 UART: [art] Store in in slot 0x4
25,878,468 UART: [art] Derive Key Pair
25,879,520 UART: [art] Store priv key in slot 0x5
29,172,601 UART: [art] Derive Key Pair - Done
29,185,703 UART: [art] Signing Cert with AUTHO
29,187,001 UART: RITY.KEYID = 7
31,474,341 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,846 UART: [art] PUB.X = FD4D86C420B530FCF1C2C2193668063C9591B624963EE4902AE4AD4D6A6B7CCCC9921C0844EF859019AE78AAE4B89BD9
31,483,079 UART: [art] PUB.Y = C53A660D7008F31F94589E6E441B11D14ED63E8643359C2DF928ABD3276EB4350899E0C05B3426569F346B28ACD8777B
31,490,301 UART: [art] SIG.R = 987E5C02B23DFC1C939C6A3A8C47FF1734F84D3125C9EA6A3BABE28E6C167E026D5D401E109844D73F2654F31990B475
31,497,673 UART: [art] SIG.S = 952F684273355717F4093571E5353ED4FE49FCFD04551926A9D0ACA7F0D77BDED17BB64A7E4D94ADE5B5EA41DEC72807
32,802,881 UART: Caliptra RT
32,803,581 UART: [state] CFI Enabled
32,965,910 UART: [rt] RT listening for mailbox commands...
32,997,966 UART: [rt]cmd =0x44504543, len=136
38,628,979 >>> mbox cmd response data (136 bytes)
38,630,348 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,661,093 UART: [rt]cmd =0x44504543, len=92
44,423,321 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
3,806,877 ready_for_fw is high
3,807,268 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,902,226 >>> mbox cmd response: success
17,902,895 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,589,116 UART:
23,589,509 UART: Running Caliptra FMC ...
23,590,600 UART:
23,590,748 UART: [state] CFI Enabled
23,656,818 UART: [fht] FMC Alias Private Key: 7
25,994,474 UART: [art] Extend RT PCRs Done
25,995,713 UART: [art] Lock RT PCRs Done
25,997,253 UART: [art] Populate DV Done
26,002,886 UART: [fht] FMC Alias Private Key: 7
26,004,547 UART: [art] Derive CDI
26,005,364 UART: [art] Store in in slot 0x4
26,064,861 UART: [art] Derive Key Pair
26,065,861 UART: [art] Store priv key in slot 0x5
29,358,533 UART: [art] Derive Key Pair - Done
29,371,549 UART: [art] Signing Cert with AUTHO
29,372,847 UART: RITY.KEYID = 7
31,659,356 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,863 UART: [art] PUB.X = 3E06F11AF3A7AFA95892E3A7DA1826404C4A88F0B185334207FA7C7F4EAEFF40ABDB934906A64BF1B161414690F67C7C
31,668,107 UART: [art] PUB.Y = FF4FD23B6544D5F8EA4C5A96DA94B79EB36BCB9A8974FDEE5759DD6DC73DA2CA5CE4494F48C3B97D5E8C1171BFDBAF3C
31,675,417 UART: [art] SIG.R = 5EFDEBE70DCBEDF7869968F4A43652FDBE7D271BCDBEC346C4569162B187B88140F87CB4AF7E108D5D2CB7D2B0F2E3AB
31,682,808 UART: [art] SIG.S = 5641CD76D82677880465DE26290ACA05CB2BDAAB70D9B550C74974D0A3365FD48458D15F3D3EFA6356FBC17648499C66
32,988,289 UART: Caliptra RT
32,989,053 UART: [state] CFI Enabled
33,148,605 UART: [rt] RT listening for mailbox commands...
33,180,620 UART: [rt]cmd =0x44504543, len=136
38,812,803 >>> mbox cmd response data (136 bytes)
38,814,182 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,844,672 UART: [rt]cmd =0x44504543, len=92
44,608,935 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,367 UART:
192,732 UART: Running Caliptra ROM ...
193,822 UART:
603,669 UART: [state] CFI Enabled
618,862 UART: [state] LifecycleState = Unprovisioned
620,830 UART: [state] DebugLocked = No
623,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,647 UART: [kat] SHA2-256
797,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,938 UART: [kat] ++
808,540 UART: [kat] sha1
819,557 UART: [kat] SHA2-256
822,211 UART: [kat] SHA2-384
828,977 UART: [kat] SHA2-512-ACC
831,361 UART: [kat] ECC-384
3,116,544 UART: [kat] HMAC-384Kdf
3,128,874 UART: [kat] LMS
4,319,031 UART: [kat] --
4,321,566 UART: [cold-reset] ++
4,322,937 UART: [fht] Storing FHT @ 0x50003400
4,335,408 UART: [idev] ++
4,335,971 UART: [idev] CDI.KEYID = 6
4,336,928 UART: [idev] SUBJECT.KEYID = 7
4,338,171 UART: [idev] UDS.KEYID = 0
4,339,159 ready_for_fw is high
4,339,374 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,667 UART: [idev] Erasing UDS.KEYID = 0
7,628,794 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,460 UART: [idev] --
7,655,156 UART: [ldev] ++
7,655,744 UART: [ldev] CDI.KEYID = 6
7,656,629 UART: [ldev] SUBJECT.KEYID = 5
7,657,890 UART: [ldev] AUTHORITY.KEYID = 7
7,659,172 UART: [ldev] FE.KEYID = 1
7,670,650 UART: [ldev] Erasing FE.KEYID = 1
10,959,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,224 UART: [ldev] --
13,321,588 UART: [fwproc] Waiting for Commands...
13,323,673 UART: [fwproc] Received command 0x46574c44
13,325,849 UART: [fwproc] Received Image of size 114036 bytes
17,376,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,207 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,843,001 >>> mbox cmd response: success
17,843,607 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,847,851 UART: [afmc] ++
17,848,496 UART: [afmc] CDI.KEYID = 6
17,849,376 UART: [afmc] SUBJECT.KEYID = 7
17,850,641 UART: [afmc] AUTHORITY.KEYID = 5
21,171,503 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,490 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,482,838 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,682 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,117 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,533,399 UART: [afmc] --
23,536,448 UART: [cold-reset] --
23,541,279 UART: [state] Locking Datavault
23,547,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,549,114 UART: [state] Locking ICCM
23,551,124 UART: [exit] Launching FMC @ 0x40000130
23,559,520 UART:
23,559,756 UART: Running Caliptra FMC ...
23,560,856 UART:
23,561,010 UART: [state] CFI Enabled
23,568,953 UART: [fht] FMC Alias Private Key: 7
25,899,621 UART: [art] Extend RT PCRs Done
25,900,844 UART: [art] Lock RT PCRs Done
25,902,257 UART: [art] Populate DV Done
25,907,559 UART: [fht] FMC Alias Private Key: 7
25,909,204 UART: [art] Derive CDI
25,910,014 UART: [art] Store in in slot 0x4
25,952,712 UART: [art] Derive Key Pair
25,953,705 UART: [art] Store priv key in slot 0x5
29,195,447 UART: [art] Derive Key Pair - Done
29,208,391 UART: [art] Signing Cert with AUTHO
29,209,698 UART: RITY.KEYID = 7
31,488,950 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,584 UART: [art] PUB.X = 3A78AD15460E75E77ABD576EFD1D0DF6E4378A1BBB44A8DE52F38386E22EA4C6BF9B4E1A6F85476F0BEE088D38FA46AB
31,497,730 UART: [art] PUB.Y = 10D90248DA7B02208D1F14F0E436296F5E16B986B01FE0DF4A3177119390B2EE6FCD15E9B4865F8FBA09E2E5A316B978
31,504,977 UART: [art] SIG.R = 777BB3DFA4E9B61474ACEB13527F9C6DCDE612BAD5A66CD80BFF242B870CB3438CBD290A4967D83FD16AEAFCE2F9CC8F
31,512,362 UART: [art] SIG.S = C3AFA777C92B2B3B1B5A38F90C2B3C5D6E87EECE70A7F2BECC72F9B5FA04242A21E5E5B98217874629E595FA75AD5829
32,817,514 UART: Caliptra RT
32,818,223 UART: [state] CFI Enabled
32,935,952 UART: [rt] RT listening for mailbox commands...
32,968,125 UART: [rt]cmd =0x44504543, len=136
38,535,109 >>> mbox cmd response data (136 bytes)
38,536,504 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,567,056 UART: [rt]cmd =0x44504543, len=92
44,248,370 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,128,026 ready_for_fw is high
4,128,518 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,064,261 >>> mbox cmd response: success
18,064,983 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,708,852 UART:
23,709,282 UART: Running Caliptra FMC ...
23,710,388 UART:
23,710,549 UART: [state] CFI Enabled
23,718,561 UART: [fht] FMC Alias Private Key: 7
26,049,208 UART: [art] Extend RT PCRs Done
26,050,462 UART: [art] Lock RT PCRs Done
26,052,364 UART: [art] Populate DV Done
26,057,626 UART: [fht] FMC Alias Private Key: 7
26,059,275 UART: [art] Derive CDI
26,060,092 UART: [art] Store in in slot 0x4
26,102,690 UART: [art] Derive Key Pair
26,103,726 UART: [art] Store priv key in slot 0x5
29,345,563 UART: [art] Derive Key Pair - Done
29,358,882 UART: [art] Signing Cert with AUTHO
29,360,223 UART: RITY.KEYID = 7
31,640,123 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,626 UART: [art] PUB.X = 85C97910A1A9DA64C1B5A9B4FD655D7A72F29E6DE44BF8CB52A298C513808BB03D80EF4C6D6E7DD24714BB3967378D13
31,648,863 UART: [art] PUB.Y = F87FF5371A8698E252D4FA7235DC7DCA82A1E513E8B797D14EE8882833FF745BABAEFDAF606B12DDB4EB3D74BF9EEB07
31,656,132 UART: [art] SIG.R = 1879CE9876DFE998CEFB727630D03CE03D2C1EEE5A49F647263709BD422F2BC5345AEEA5315C26045DA1F72F31DF2281
31,663,498 UART: [art] SIG.S = 365BB0A7113D591059AB85B9F7AEE1185A8667F93CE3ED3F2814640BCFCA81771F6F8F6832F7E53F5F359EC937C2F572
32,968,503 UART: Caliptra RT
32,969,230 UART: [state] CFI Enabled
33,085,864 UART: [rt] RT listening for mailbox commands...
33,117,854 UART: [rt]cmd =0x44504543, len=136
38,684,479 >>> mbox cmd response data (136 bytes)
38,685,818 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,716,112 UART: [rt]cmd =0x44504543, len=92
44,397,731 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,503 UART:
192,866 UART: Running Caliptra ROM ...
194,009 UART:
194,162 UART: [state] CFI Enabled
266,343 UART: [state] LifecycleState = Unprovisioned
268,263 UART: [state] DebugLocked = No
269,573 UART: [state] WD Timer not started. Device not locked for debugging
273,342 UART: [kat] SHA2-256
452,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,037 UART: [kat] ++
464,586 UART: [kat] sha1
476,889 UART: [kat] SHA2-256
479,957 UART: [kat] SHA2-384
484,383 UART: [kat] SHA2-512-ACC
487,326 UART: [kat] ECC-384
2,949,705 UART: [kat] HMAC-384Kdf
2,971,982 UART: [kat] LMS
3,501,446 UART: [kat] --
3,506,392 UART: [cold-reset] ++
3,508,689 UART: [fht] FHT @ 0x50003400
3,519,173 UART: [idev] ++
3,519,743 UART: [idev] CDI.KEYID = 6
3,520,628 UART: [idev] SUBJECT.KEYID = 7
3,521,891 UART: [idev] UDS.KEYID = 0
3,522,827 ready_for_fw is high
3,523,019 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,874 UART: [idev] Erasing UDS.KEYID = 0
6,028,688 UART: [idev] Sha1 KeyId Algorithm
6,052,028 UART: [idev] --
6,056,731 UART: [ldev] ++
6,057,309 UART: [ldev] CDI.KEYID = 6
6,058,225 UART: [ldev] SUBJECT.KEYID = 5
6,059,385 UART: [ldev] AUTHORITY.KEYID = 7
6,060,619 UART: [ldev] FE.KEYID = 1
6,101,031 UART: [ldev] Erasing FE.KEYID = 1
8,601,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,696 UART: [ldev] --
10,389,698 UART: [fwproc] Wait for Commands...
10,391,471 UART: [fwproc] Recv command 0x46574c44
10,393,561 UART: [fwproc] Recv'd Img size: 114360 bytes
13,803,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,263,591 >>> mbox cmd response: success
14,264,176 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,268,469 UART: [afmc] ++
14,269,057 UART: [afmc] CDI.KEYID = 6
14,269,975 UART: [afmc] SUBJECT.KEYID = 7
14,271,139 UART: [afmc] AUTHORITY.KEYID = 5
16,809,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,563,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,579,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,595,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,108 UART: [afmc] --
18,622,219 UART: [cold-reset] --
18,625,916 UART: [state] Locking Datavault
18,630,735 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,381 UART: [state] Locking ICCM
18,634,476 UART: [exit] Launching FMC @ 0x40000130
18,642,923 UART:
18,643,158 UART: Running Caliptra FMC ...
18,644,264 UART:
18,644,429 UART: [state] CFI Enabled
18,704,109 UART: [fht] FMC Alias Private Key: 7
20,468,393 UART: [art] Extend RT PCRs Done
20,469,625 UART: [art] Lock RT PCRs Done
20,471,253 UART: [art] Populate DV Done
20,476,503 UART: [fht] FMC Alias Private Key: 7
20,478,152 UART: [art] Derive CDI
20,478,967 UART: [art] Store in in slot 0x4
20,536,313 UART: [art] Derive Key Pair
20,537,355 UART: [art] Store priv key in slot 0x5
23,000,117 UART: [art] Derive Key Pair - Done
23,012,743 UART: [art] Signing Cert with AUTHO
23,014,068 UART: RITY.KEYID = 7
24,725,666 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,166 UART: [art] PUB.X = 30A54426B5B4A6DB45DD026312219420165A973F57E4EFC548917464EB0423D18D8676F793439E5A0220073207FFBAD0
24,734,403 UART: [art] PUB.Y = 92D583B2BC32FD7457051E6FBD00BC4564B37118AE28A226DB82D9BA128FA8B111718D0A1099E4CCB070EFD81ECA11E8
24,741,661 UART: [art] SIG.R = 5EDF8E6AC2BE0F71F0C533EF57152C209EC39EB0C49BBB3A283B76658670CE0DECFF986120C93D0F599B450BA71FFAC3
24,749,057 UART: [art] SIG.S = FD176F59CB46253149FC183341F5EFE76EA73F32BB6197C7AB06FF1A4C66A592FD07FC0026F7DF3002568F686103ED97
25,728,096 UART: Caliptra RT
25,728,819 UART: [state] CFI Enabled
25,893,955 UART: [rt] RT listening for mailbox commands...
25,925,905 UART: [rt]cmd =0x44504543, len=136
30,151,872 >>> mbox cmd response data (136 bytes)
30,153,232 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,183,772 UART: [rt]cmd =0x44504543, len=92
34,539,169 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,557 UART:
192,918 UART: Running Caliptra ROM ...
194,135 UART:
194,298 UART: [state] CFI Enabled
260,950 UART: [state] LifecycleState = Unprovisioned
263,373 UART: [state] DebugLocked = No
265,325 UART: [state] WD Timer not started. Device not locked for debugging
270,486 UART: [kat] SHA2-256
460,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,119 UART: [kat] ++
471,569 UART: [kat] sha1
484,426 UART: [kat] SHA2-256
487,432 UART: [kat] SHA2-384
493,713 UART: [kat] SHA2-512-ACC
496,304 UART: [kat] ECC-384
2,947,375 UART: [kat] HMAC-384Kdf
2,972,620 UART: [kat] LMS
3,504,381 UART: [kat] --
3,507,994 UART: [cold-reset] ++
3,509,932 UART: [fht] FHT @ 0x50003400
3,520,921 UART: [idev] ++
3,521,556 UART: [idev] CDI.KEYID = 6
3,522,586 UART: [idev] SUBJECT.KEYID = 7
3,523,760 UART: [idev] UDS.KEYID = 0
3,525,020 ready_for_fw is high
3,525,218 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,059 UART: [idev] Erasing UDS.KEYID = 0
6,027,534 UART: [idev] Sha1 KeyId Algorithm
6,050,723 UART: [idev] --
6,054,670 UART: [ldev] ++
6,055,355 UART: [ldev] CDI.KEYID = 6
6,056,247 UART: [ldev] SUBJECT.KEYID = 5
6,057,469 UART: [ldev] AUTHORITY.KEYID = 7
6,058,626 UART: [ldev] FE.KEYID = 1
6,101,833 UART: [ldev] Erasing FE.KEYID = 1
8,609,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,440 UART: [ldev] --
10,415,982 UART: [fwproc] Wait for Commands...
10,418,778 UART: [fwproc] Recv command 0x46574c44
10,421,031 UART: [fwproc] Recv'd Img size: 114360 bytes
13,871,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,607,069 >>> mbox cmd response: success
14,607,696 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,611,407 UART: [afmc] ++
14,612,126 UART: [afmc] CDI.KEYID = 6
14,613,379 UART: [afmc] SUBJECT.KEYID = 7
14,614,819 UART: [afmc] AUTHORITY.KEYID = 5
17,149,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,104 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,956 UART: [afmc] --
18,946,071 UART: [cold-reset] --
18,950,980 UART: [state] Locking Datavault
18,954,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,492 UART: [state] Locking ICCM
18,958,593 UART: [exit] Launching FMC @ 0x40000130
18,967,267 UART:
18,967,531 UART: Running Caliptra FMC ...
18,968,638 UART:
18,968,796 UART: [state] CFI Enabled
19,029,675 UART: [fht] FMC Alias Private Key: 7
20,793,827 UART: [art] Extend RT PCRs Done
20,795,047 UART: [art] Lock RT PCRs Done
20,796,432 UART: [art] Populate DV Done
20,802,005 UART: [fht] FMC Alias Private Key: 7
20,803,598 UART: [art] Derive CDI
20,804,336 UART: [art] Store in in slot 0x4
20,862,917 UART: [art] Derive Key Pair
20,863,951 UART: [art] Store priv key in slot 0x5
23,326,800 UART: [art] Derive Key Pair - Done
23,340,061 UART: [art] Signing Cert with AUTHO
23,341,367 UART: RITY.KEYID = 7
25,052,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,336 UART: [art] PUB.X = D950423DF20CE6C09581FF54380395C329EEA886369175FE6CD6A3D768A3B0F416696AAE861199ECA22143210120B19B
25,061,582 UART: [art] PUB.Y = 86E7B794F56B7B72CA770706FFEAADD679B8369468023158A0F22D97261D232075682ABA83D3E55AC496A7E1BE5B7786
25,068,860 UART: [art] SIG.R = 3C19990E04E9B5355896E893CC9A2864E4ADF6FE9CEC86B5A6952F94C956E676EDF0E50683CE9E8BACEB3A347B2F9A0B
25,076,246 UART: [art] SIG.S = 350ED2984B6E9E6C29DAB38554A875A814B038C19CAAB418F0711E565F69C5B29891582FC579BFD423CD5C17C24E4C55
26,054,859 UART: Caliptra RT
26,055,577 UART: [state] CFI Enabled
26,222,584 UART: [rt] RT listening for mailbox commands...
26,254,402 UART: [rt]cmd =0x44504543, len=136
30,479,884 >>> mbox cmd response data (136 bytes)
30,481,199 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,511,962 UART: [rt]cmd =0x44504543, len=92
34,867,787 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,415,740 ready_for_fw is high
3,416,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,718,388 >>> mbox cmd response: success
14,719,319 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,000,818 UART:
19,001,220 UART: Running Caliptra FMC ...
19,002,372 UART:
19,002,558 UART: [state] CFI Enabled
19,071,563 UART: [fht] FMC Alias Private Key: 7
20,835,948 UART: [art] Extend RT PCRs Done
20,837,177 UART: [art] Lock RT PCRs Done
20,838,965 UART: [art] Populate DV Done
20,844,384 UART: [fht] FMC Alias Private Key: 7
20,846,036 UART: [art] Derive CDI
20,846,861 UART: [art] Store in in slot 0x4
20,904,051 UART: [art] Derive Key Pair
20,905,091 UART: [art] Store priv key in slot 0x5
23,368,209 UART: [art] Derive Key Pair - Done
23,381,096 UART: [art] Signing Cert with AUTHO
23,382,442 UART: RITY.KEYID = 7
25,093,372 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,883 UART: [art] PUB.X = 01EF59C0C4AF46CB184AEEE5899F6B9EB4C97852C71BDE741CD1130FB3A0C5F7B04DEBB3DF23993819513485A1384B05
25,102,189 UART: [art] PUB.Y = BBF4498B02CC1007C5FAFFE7848774A2370D9D08310E38AE771DA4B1470311D8E3C33770A6960EA5EE49D519942B9EF3
25,109,400 UART: [art] SIG.R = 855B3954DFD14FB184B835AFC44B1C833C20FB6EA953C435BA84029B3DD254AEEBD3A9465705B5E496A21E04FE11EF15
25,116,855 UART: [art] SIG.S = 3A30354C2EE7F8A7310E21B72D01D842835B273A38EDDBCFD143F588F7112193F061CD71C4450F62F3534A61092BBF7E
26,095,157 UART: Caliptra RT
26,095,879 UART: [state] CFI Enabled
26,260,684 UART: [rt] RT listening for mailbox commands...
26,292,885 UART: [rt]cmd =0x44504543, len=136
30,520,803 >>> mbox cmd response data (136 bytes)
30,522,123 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,552,613 UART: [rt]cmd =0x44504543, len=92
34,907,759 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,460 UART:
192,815 UART: Running Caliptra ROM ...
193,925 UART:
603,707 UART: [state] CFI Enabled
615,021 UART: [state] LifecycleState = Unprovisioned
617,381 UART: [state] DebugLocked = No
619,973 UART: [state] WD Timer not started. Device not locked for debugging
624,356 UART: [kat] SHA2-256
814,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,057 UART: [kat] ++
825,662 UART: [kat] sha1
836,896 UART: [kat] SHA2-256
839,945 UART: [kat] SHA2-384
846,891 UART: [kat] SHA2-512-ACC
849,473 UART: [kat] ECC-384
3,291,150 UART: [kat] HMAC-384Kdf
3,304,869 UART: [kat] LMS
3,836,757 UART: [kat] --
3,841,245 UART: [cold-reset] ++
3,842,460 UART: [fht] FHT @ 0x50003400
3,855,133 UART: [idev] ++
3,855,845 UART: [idev] CDI.KEYID = 6
3,856,751 UART: [idev] SUBJECT.KEYID = 7
3,857,993 UART: [idev] UDS.KEYID = 0
3,858,916 ready_for_fw is high
3,859,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,728 UART: [idev] Erasing UDS.KEYID = 0
6,336,004 UART: [idev] Sha1 KeyId Algorithm
6,358,438 UART: [idev] --
6,363,067 UART: [ldev] ++
6,363,761 UART: [ldev] CDI.KEYID = 6
6,364,671 UART: [ldev] SUBJECT.KEYID = 5
6,365,823 UART: [ldev] AUTHORITY.KEYID = 7
6,367,051 UART: [ldev] FE.KEYID = 1
6,379,317 UART: [ldev] Erasing FE.KEYID = 1
8,858,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,831 UART: [ldev] --
10,649,424 UART: [fwproc] Wait for Commands...
10,652,376 UART: [fwproc] Recv command 0x46574c44
10,654,678 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,839,296 >>> mbox cmd response: success
14,839,935 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,844,063 UART: [afmc] ++
14,844,766 UART: [afmc] CDI.KEYID = 6
14,846,008 UART: [afmc] SUBJECT.KEYID = 7
14,847,439 UART: [afmc] AUTHORITY.KEYID = 5
17,353,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,610 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,299 UART: [afmc] --
19,150,350 UART: [cold-reset] --
19,153,416 UART: [state] Locking Datavault
19,157,645 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,662 UART: [state] Locking ICCM
19,161,501 UART: [exit] Launching FMC @ 0x40000130
19,170,174 UART:
19,170,406 UART: Running Caliptra FMC ...
19,171,433 UART:
19,171,579 UART: [state] CFI Enabled
19,179,788 UART: [fht] FMC Alias Private Key: 7
20,937,094 UART: [art] Extend RT PCRs Done
20,938,316 UART: [art] Lock RT PCRs Done
20,940,173 UART: [art] Populate DV Done
20,945,684 UART: [fht] FMC Alias Private Key: 7
20,947,435 UART: [art] Derive CDI
20,948,169 UART: [art] Store in in slot 0x4
20,990,972 UART: [art] Derive Key Pair
20,991,985 UART: [art] Store priv key in slot 0x5
23,418,877 UART: [art] Derive Key Pair - Done
23,431,757 UART: [art] Signing Cert with AUTHO
23,433,050 UART: RITY.KEYID = 7
25,138,122 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,631 UART: [art] PUB.X = 85A77193C808BB23D298DE9F548DF3499CDF8EC3FB83B121F55FDA43E447C9FD2262F6A439B3080DE0B0991223D46F05
25,146,885 UART: [art] PUB.Y = 60A2EC63B48AC62503B2DBE5EE6917044CC445617F91333099AF8815230CB5F657B1C0483BA207814E12F4820094F6EC
25,154,117 UART: [art] SIG.R = 44AC2C6AD2310057132C360CB9153277F98C8595DF99E31076C82C48BA66B514BF45BDB4A63894D945125AC2B4CA57D5
25,161,498 UART: [art] SIG.S = DCB88B9344C9ED562D82CB1A9EC4C5558A3B42C36CBE283FF2BB1404C45EA53D3C66CA7D7D56342467DD857F256AAD7A
26,140,449 UART: Caliptra RT
26,141,161 UART: [state] CFI Enabled
26,257,252 UART: [rt] RT listening for mailbox commands...
26,289,248 UART: [rt]cmd =0x44504543, len=136
30,467,830 >>> mbox cmd response data (136 bytes)
30,469,138 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,499,848 UART: [rt]cmd =0x44504543, len=92
34,792,064 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,755,777 ready_for_fw is high
3,756,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,846 >>> mbox cmd response: success
14,960,544 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,214,861 UART:
19,215,243 UART: Running Caliptra FMC ...
19,216,343 UART:
19,216,494 UART: [state] CFI Enabled
19,224,555 UART: [fht] FMC Alias Private Key: 7
20,980,981 UART: [art] Extend RT PCRs Done
20,982,202 UART: [art] Lock RT PCRs Done
20,984,014 UART: [art] Populate DV Done
20,989,337 UART: [fht] FMC Alias Private Key: 7
20,990,940 UART: [art] Derive CDI
20,991,680 UART: [art] Store in in slot 0x4
21,034,496 UART: [art] Derive Key Pair
21,035,539 UART: [art] Store priv key in slot 0x5
23,463,128 UART: [art] Derive Key Pair - Done
23,475,914 UART: [art] Signing Cert with AUTHO
23,477,218 UART: RITY.KEYID = 7
25,183,001 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,506 UART: [art] PUB.X = 6E24951447C0620A87B21AFEEA01B7086A1A0A0A2410FB27B3CE53B274B6163F8F4B929DE1ECD097055F47079E336F5D
25,191,804 UART: [art] PUB.Y = CED1031B3007E5239B3BDA0ECDE4584C01A7FCAEA6B2CEC18DE45FBF261425C0CD0B39A00582558CE7A53977883B6836
25,199,054 UART: [art] SIG.R = 361986FD25093BE1D6CA149903FB956CD69A7C1C1FB905A7C247537CD4B9BF468DCF83C77D6A78B46237069877856217
25,206,474 UART: [art] SIG.S = 66ED944E7DAA3CF2B2EC5FE53D4A8C6F83295ED58DBEC44332B7F815CACBA4FBD7A1EEEDAE98AC683DE476E22A61F4E3
26,185,841 UART: Caliptra RT
26,186,538 UART: [state] CFI Enabled
26,304,095 UART: [rt] RT listening for mailbox commands...
26,335,990 UART: [rt]cmd =0x44504543, len=136
30,513,513 >>> mbox cmd response data (136 bytes)
30,514,794 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,545,395 UART: [rt]cmd =0x44504543, len=92
34,838,104 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,415 UART: [kat] SHA2-256
882,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,461 UART: [kat] ++
886,613 UART: [kat] sha1
890,869 UART: [kat] SHA2-256
892,807 UART: [kat] SHA2-384
895,520 UART: [kat] SHA2-512-ACC
897,421 UART: [kat] ECC-384
902,848 UART: [kat] HMAC-384Kdf
907,492 UART: [kat] LMS
1,475,688 UART: [kat] --
1,476,551 UART: [cold-reset] ++
1,476,883 UART: [fht] Storing FHT @ 0x50003400
1,479,680 UART: [idev] ++
1,479,848 UART: [idev] CDI.KEYID = 6
1,480,208 UART: [idev] SUBJECT.KEYID = 7
1,480,632 UART: [idev] UDS.KEYID = 0
1,480,977 ready_for_fw is high
1,480,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,864 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,732 UART: [idev] --
1,514,685 UART: [ldev] ++
1,514,853 UART: [ldev] CDI.KEYID = 6
1,515,216 UART: [ldev] SUBJECT.KEYID = 5
1,515,642 UART: [ldev] AUTHORITY.KEYID = 7
1,516,105 UART: [ldev] FE.KEYID = 1
1,521,277 UART: [ldev] Erasing FE.KEYID = 1
1,546,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,592 UART: [ldev] --
1,585,889 UART: [fwproc] Waiting for Commands...
1,586,530 UART: [fwproc] Received command 0x46574c44
1,587,321 UART: [fwproc] Received Image of size 114360 bytes
2,886,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,530 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,815 >>> mbox cmd response: success
3,078,815 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,973 UART: [afmc] ++
3,080,141 UART: [afmc] CDI.KEYID = 6
3,080,503 UART: [afmc] SUBJECT.KEYID = 7
3,080,928 UART: [afmc] AUTHORITY.KEYID = 5
3,116,457 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,387 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,780 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,470 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,393 UART: [afmc] --
3,159,509 UART: [cold-reset] --
3,160,551 UART: [state] Locking Datavault
3,161,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,254 UART: [state] Locking ICCM
3,162,818 UART: [exit] Launching FMC @ 0x40000130
3,168,147 UART:
3,168,163 UART: Running Caliptra FMC ...
3,168,571 UART:
3,168,625 UART: [state] CFI Enabled
3,179,058 UART: [fht] FMC Alias Private Key: 7
3,287,621 UART: [art] Extend RT PCRs Done
3,288,049 UART: [art] Lock RT PCRs Done
3,289,789 UART: [art] Populate DV Done
3,298,112 UART: [fht] FMC Alias Private Key: 7
3,299,068 UART: [art] Derive CDI
3,299,348 UART: [art] Store in in slot 0x4
3,384,903 UART: [art] Derive Key Pair
3,385,263 UART: [art] Store priv key in slot 0x5
3,398,571 UART: [art] Derive Key Pair - Done
3,413,427 UART: [art] Signing Cert with AUTHO
3,413,907 UART: RITY.KEYID = 7
3,429,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,792 UART: [art] PUB.X = 38FF619B026434B9EF92A5B0EDE345D0732295A470D96199633872C485B4E8B47CFD6C20D01CCD834A5E2EC4BBB800A5
3,436,543 UART: [art] PUB.Y = D9419641145203BECA56B0AFC54EE17C2665ED7D7925D88825398EC9810868F6E6848A2B9B8BC5F8F81DF59B0C899AF2
3,443,488 UART: [art] SIG.R = B1EE4F0D77484CF05ABA50654E803F211E688CEBF42D612D9E9BBA01F9CFC0D00CAD57977ED4829D5121E463786B1A30
3,450,261 UART: [art] SIG.S = D6887F336B31C58D4DD48603FE2B63BC16C9D102D1A74FE4A57401E3034464B0484FA9DD1FBE2DE49C2D2A204EB12574
3,474,392 UART: Caliptra RT
3,474,646 UART: [state] CFI Enabled
3,583,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,072 UART: [rt]cmd =0x44504543, len=136
3,685,134 >>> mbox cmd response data (136 bytes)
3,685,135 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,124 UART: [rt]cmd =0x44504543, len=92
3,906,294 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,227 ready_for_fw is high
1,363,227 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,061 >>> mbox cmd response: success
2,928,061 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,989,529 UART:
2,989,545 UART: Running Caliptra FMC ...
2,989,953 UART:
2,990,007 UART: [state] CFI Enabled
3,000,278 UART: [fht] FMC Alias Private Key: 7
3,108,537 UART: [art] Extend RT PCRs Done
3,108,965 UART: [art] Lock RT PCRs Done
3,110,119 UART: [art] Populate DV Done
3,118,280 UART: [fht] FMC Alias Private Key: 7
3,119,350 UART: [art] Derive CDI
3,119,630 UART: [art] Store in in slot 0x4
3,205,471 UART: [art] Derive Key Pair
3,205,831 UART: [art] Store priv key in slot 0x5
3,218,993 UART: [art] Derive Key Pair - Done
3,233,742 UART: [art] Signing Cert with AUTHO
3,234,222 UART: RITY.KEYID = 7
3,249,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,061 UART: [art] PUB.X = 60ACD4370A68C8E02D2E247E70C4430C5583434E3801F8A3C11A0FD55C287953014A1DCDA98AF1319419FBEEE301133B
3,256,815 UART: [art] PUB.Y = 290DDB0D21A345344A140B2382159BA1BE3C707CB3842916941356C01D7DCF2ABAE73F74B17B8F46C137FDFD39657E73
3,263,760 UART: [art] SIG.R = B6F845EDAEEFC3BFC460C1A91426AF98368BF17DA76E4B45571BD797F7886FFD35B2C03AA5D43D11B7301D58FFB4B93F
3,270,550 UART: [art] SIG.S = B7BD73FCF85BEC99A48EE540CEDD092222C3771698E6D5A8B89079B89E44888D07176E850D7D767C08E084C47F3D4C9F
3,293,955 UART: Caliptra RT
3,294,209 UART: [state] CFI Enabled
3,402,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,627 UART: [rt]cmd =0x44504543, len=136
3,504,595 >>> mbox cmd response data (136 bytes)
3,504,596 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,645 UART: [rt]cmd =0x44504543, len=92
3,726,361 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,558 UART: [kat] SHA2-256
892,496 UART: [kat] SHA2-384
895,227 UART: [kat] SHA2-512-ACC
897,128 UART: [kat] ECC-384
902,699 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,956 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,903 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,561 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,318 UART: [ldev] Erasing FE.KEYID = 1
1,547,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,359 UART: [ldev] --
1,586,690 UART: [fwproc] Waiting for Commands...
1,587,489 UART: [fwproc] Received command 0x46574c44
1,588,280 UART: [fwproc] Received Image of size 114360 bytes
2,885,407 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,346 >>> mbox cmd response: success
3,078,346 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,079,524 UART: [afmc] ++
3,079,692 UART: [afmc] CDI.KEYID = 6
3,080,054 UART: [afmc] SUBJECT.KEYID = 7
3,080,479 UART: [afmc] AUTHORITY.KEYID = 5
3,115,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,170 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,950 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,678 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,563 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,253 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,182 UART: [afmc] --
3,159,156 UART: [cold-reset] --
3,159,844 UART: [state] Locking Datavault
3,161,039 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,643 UART: [state] Locking ICCM
3,162,261 UART: [exit] Launching FMC @ 0x40000130
3,167,590 UART:
3,167,606 UART: Running Caliptra FMC ...
3,168,014 UART:
3,168,157 UART: [state] CFI Enabled
3,178,732 UART: [fht] FMC Alias Private Key: 7
3,286,393 UART: [art] Extend RT PCRs Done
3,286,821 UART: [art] Lock RT PCRs Done
3,288,175 UART: [art] Populate DV Done
3,296,200 UART: [fht] FMC Alias Private Key: 7
3,297,310 UART: [art] Derive CDI
3,297,590 UART: [art] Store in in slot 0x4
3,383,245 UART: [art] Derive Key Pair
3,383,605 UART: [art] Store priv key in slot 0x5
3,396,905 UART: [art] Derive Key Pair - Done
3,411,809 UART: [art] Signing Cert with AUTHO
3,412,289 UART: RITY.KEYID = 7
3,427,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,022 UART: [art] PUB.X = 01861FCAD38434C63C816828F588A371B726799593EC7C76C29F3D4070737BB21EB382E562C323F26DFCDE3456CE4CFB
3,434,791 UART: [art] PUB.Y = 7D6F368E3598391821325C69B292164568B4CB815559B7F7F9C0951F6D08C8A454DE47DC92D78CE8BB68ED9DB100EFA6
3,441,718 UART: [art] SIG.R = C5DA8F448022A37523DFB3E70F276C620C114C83098423BCB5DC586BEF19E838117E24246EED401040A1033862CD8EA9
3,448,476 UART: [art] SIG.S = 2B2CAE667164FFFF28EC1E4348F0F80839ED60C23466959578B84F1E9FA40C521C6C75D72E230CD4DDA89410538D7760
3,472,176 UART: Caliptra RT
3,472,522 UART: [state] CFI Enabled
3,580,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,821 UART: [rt]cmd =0x44504543, len=136
3,683,343 >>> mbox cmd response data (136 bytes)
3,683,344 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,331 UART: [rt]cmd =0x44504543, len=92
3,904,919 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,990 >>> mbox cmd response: success
2,926,990 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,052 UART:
2,988,068 UART: Running Caliptra FMC ...
2,988,476 UART:
2,988,619 UART: [state] CFI Enabled
2,999,030 UART: [fht] FMC Alias Private Key: 7
3,107,061 UART: [art] Extend RT PCRs Done
3,107,489 UART: [art] Lock RT PCRs Done
3,108,801 UART: [art] Populate DV Done
3,117,212 UART: [fht] FMC Alias Private Key: 7
3,118,380 UART: [art] Derive CDI
3,118,660 UART: [art] Store in in slot 0x4
3,204,745 UART: [art] Derive Key Pair
3,205,105 UART: [art] Store priv key in slot 0x5
3,218,825 UART: [art] Derive Key Pair - Done
3,233,409 UART: [art] Signing Cert with AUTHO
3,233,889 UART: RITY.KEYID = 7
3,249,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,102 UART: [art] PUB.X = AC37D0C980DDBBEF0623B769282151B19CD29195C62850AE84D33625221837D15CEBBF51AAB55B3DE71E7639BC5AD3A3
3,256,879 UART: [art] PUB.Y = 454445C2ADCEF17E2BEF030C8E12EA2F36DDEE416730A13CB2228A571EBC14CE722558CA6ECDF5D5A3207FA6309A1292
3,263,839 UART: [art] SIG.R = 6D76A9FB627F0EE821ACEF0F16F3D739CD9C4B7C21DDEA7CDCCF504570796E6A0E62AFBB253BD828C675E242AAC22414
3,270,622 UART: [art] SIG.S = A4EA45604A136817D51CEE694C85DBC927788587298B8DAF627B202FF2E2FA7DF3EEBEBB03DEE00B99522766C845B311
3,294,901 UART: Caliptra RT
3,295,247 UART: [state] CFI Enabled
3,404,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,340 UART: [rt]cmd =0x44504543, len=136
3,506,630 >>> mbox cmd response data (136 bytes)
3,506,631 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,616 UART: [rt]cmd =0x44504543, len=92
3,727,069 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
917,720 UART: [kat] HMAC-384Kdf
922,406 UART: [kat] LMS
1,170,734 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,039 UART: [fht] FHT @ 0x50003400
1,174,894 UART: [idev] ++
1,175,062 UART: [idev] CDI.KEYID = 6
1,175,422 UART: [idev] SUBJECT.KEYID = 7
1,175,846 UART: [idev] UDS.KEYID = 0
1,176,191 ready_for_fw is high
1,176,191 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,842 UART: [idev] Erasing UDS.KEYID = 0
1,201,081 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,154 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,219 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,410 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,864 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,322 >>> mbox cmd response: success
2,773,322 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,556 UART: [afmc] ++
2,774,724 UART: [afmc] CDI.KEYID = 6
2,775,086 UART: [afmc] SUBJECT.KEYID = 7
2,775,511 UART: [afmc] AUTHORITY.KEYID = 5
2,811,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,391 UART: [afmc] --
2,854,279 UART: [cold-reset] --
2,855,137 UART: [state] Locking Datavault
2,856,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,050 UART: [state] Locking ICCM
2,857,540 UART: [exit] Launching FMC @ 0x40000130
2,862,869 UART:
2,862,885 UART: Running Caliptra FMC ...
2,863,293 UART:
2,863,347 UART: [state] CFI Enabled
2,873,798 UART: [fht] FMC Alias Private Key: 7
2,981,875 UART: [art] Extend RT PCRs Done
2,982,303 UART: [art] Lock RT PCRs Done
2,983,991 UART: [art] Populate DV Done
2,992,388 UART: [fht] FMC Alias Private Key: 7
2,993,502 UART: [art] Derive CDI
2,993,782 UART: [art] Store in in slot 0x4
3,079,527 UART: [art] Derive Key Pair
3,079,887 UART: [art] Store priv key in slot 0x5
3,093,009 UART: [art] Derive Key Pair - Done
3,107,438 UART: [art] Signing Cert with AUTHO
3,107,918 UART: RITY.KEYID = 7
3,123,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,873 UART: [art] PUB.X = D658ACD44F322836E5964A303EE7FCC9B83300BFB29EEEEF4E367082756BA003FFC2AFB4B4F59A389F455DB00337FD18
3,130,629 UART: [art] PUB.Y = 7FB4561136F2A27F5415C5207BAD612AD7871C9F53235E56A03F2CB350876A6DAFFFBDF16AEA393E2B90BDBFF0006056
3,137,569 UART: [art] SIG.R = B4D6097C2B533B1AA68129F9CA64BB190EA7D48B942D80EF2AC5DC2226BFF5474DC808FE9C54FC6F964AB58C10793770
3,144,342 UART: [art] SIG.S = 157CF6BF9F7C013CB0BEB45919F1928B320E1D2C8F6135F3E0CD48F42AD6B1CCD9400B7BE798D3304088AEC599373BE4
3,168,044 UART: Caliptra RT
3,168,298 UART: [state] CFI Enabled
3,274,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,701 UART: [rt]cmd =0x44504543, len=136
3,376,975 >>> mbox cmd response data (136 bytes)
3,376,976 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,915 UART: [rt]cmd =0x44504543, len=92
3,598,734 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,699 ready_for_fw is high
1,060,699 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,749 >>> mbox cmd response: success
2,625,749 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,301 UART:
2,687,317 UART: Running Caliptra FMC ...
2,687,725 UART:
2,687,779 UART: [state] CFI Enabled
2,698,332 UART: [fht] FMC Alias Private Key: 7
2,806,525 UART: [art] Extend RT PCRs Done
2,806,953 UART: [art] Lock RT PCRs Done
2,808,335 UART: [art] Populate DV Done
2,816,716 UART: [fht] FMC Alias Private Key: 7
2,817,676 UART: [art] Derive CDI
2,817,956 UART: [art] Store in in slot 0x4
2,903,473 UART: [art] Derive Key Pair
2,903,833 UART: [art] Store priv key in slot 0x5
2,916,797 UART: [art] Derive Key Pair - Done
2,931,676 UART: [art] Signing Cert with AUTHO
2,932,156 UART: RITY.KEYID = 7
2,947,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,573 UART: [art] PUB.X = 2768A69EFFEE54FE401586EE5D3D9A4BD95333476EEE5EDB4871B54AD1CA41F1CBAD5133B1651E29C9DF20FD6B6B13EC
2,955,365 UART: [art] PUB.Y = 87870BF21B84389572908FEBA3FC7D4470126B51AF9E9A14003669DBE4E9293260F0AE8101E0D96779F1930DE429E2EC
2,962,282 UART: [art] SIG.R = FDD69627D74BC84B136C8FB568436D11E09319A11DE6E6D2C970C331A81066F8207773EB42E6F1D221637E6BBFBF83E1
2,969,056 UART: [art] SIG.S = 469748A4243BBA164961910A9A5994E5DDDFA2D085E9EFDE8A06D70B5B011E7A16E9DBFA567A71CB0300F254DE4EBA40
2,993,328 UART: Caliptra RT
2,993,582 UART: [state] CFI Enabled
3,100,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,685 UART: [rt]cmd =0x44504543, len=136
3,202,827 >>> mbox cmd response data (136 bytes)
3,202,828 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,577 UART: [rt]cmd =0x44504543, len=92
3,423,522 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,883 UART: [kat] SHA2-512-ACC
908,784 UART: [kat] ECC-384
918,121 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,171,916 UART: [cold-reset] ++
1,172,280 UART: [fht] FHT @ 0x50003400
1,175,111 UART: [idev] ++
1,175,279 UART: [idev] CDI.KEYID = 6
1,175,639 UART: [idev] SUBJECT.KEYID = 7
1,176,063 UART: [idev] UDS.KEYID = 0
1,176,408 ready_for_fw is high
1,176,408 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,044 UART: [idev] Sha1 KeyId Algorithm
1,209,706 UART: [idev] --
1,210,690 UART: [ldev] ++
1,210,858 UART: [ldev] CDI.KEYID = 6
1,211,221 UART: [ldev] SUBJECT.KEYID = 5
1,211,647 UART: [ldev] AUTHORITY.KEYID = 7
1,212,110 UART: [ldev] FE.KEYID = 1
1,217,454 UART: [ldev] Erasing FE.KEYID = 1
1,243,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,152 UART: [ldev] --
1,283,437 UART: [fwproc] Wait for Commands...
1,284,159 UART: [fwproc] Recv command 0x46574c44
1,284,887 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,325 >>> mbox cmd response: success
2,775,325 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,403 UART: [afmc] ++
2,776,571 UART: [afmc] CDI.KEYID = 6
2,776,933 UART: [afmc] SUBJECT.KEYID = 7
2,777,358 UART: [afmc] AUTHORITY.KEYID = 5
2,812,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,764 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,368 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,188 UART: [afmc] --
2,856,082 UART: [cold-reset] --
2,857,016 UART: [state] Locking Datavault
2,858,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,789 UART: [state] Locking ICCM
2,859,273 UART: [exit] Launching FMC @ 0x40000130
2,864,602 UART:
2,864,618 UART: Running Caliptra FMC ...
2,865,026 UART:
2,865,169 UART: [state] CFI Enabled
2,875,490 UART: [fht] FMC Alias Private Key: 7
2,983,689 UART: [art] Extend RT PCRs Done
2,984,117 UART: [art] Lock RT PCRs Done
2,985,745 UART: [art] Populate DV Done
2,994,038 UART: [fht] FMC Alias Private Key: 7
2,995,130 UART: [art] Derive CDI
2,995,410 UART: [art] Store in in slot 0x4
3,080,505 UART: [art] Derive Key Pair
3,080,865 UART: [art] Store priv key in slot 0x5
3,094,389 UART: [art] Derive Key Pair - Done
3,109,011 UART: [art] Signing Cert with AUTHO
3,109,491 UART: RITY.KEYID = 7
3,124,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,182 UART: [art] PUB.X = FA7C2012D96A23FDA124603EBD86CA4820196C20D7939FF028080EEA6794212918CB2120D60D9F2E474F4150C98757C8
3,131,939 UART: [art] PUB.Y = E268A2953AE3FEEF6775C6AF7A3A2D8C5F06234431D994F8CFA06FBCC8C964D1F6AAB003722C0FEE6A617C909487E2B4
3,138,896 UART: [art] SIG.R = E519ED054A43A80018DA2DF2E98AF848ECAE7F4B8349A21EC4DE32EE9765AACBB0597136CAEFD40BA6087A4E8662066F
3,145,650 UART: [art] SIG.S = EE5CE419584CABD0F545CEAABEADFB67B3FC5D2E18103249DF03E44D1AD3F7A488823458F801D43AAB2E43A9B798B039
3,169,917 UART: Caliptra RT
3,170,263 UART: [state] CFI Enabled
3,279,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,089 UART: [rt]cmd =0x44504543, len=136
3,381,487 >>> mbox cmd response data (136 bytes)
3,381,488 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,383 UART: [rt]cmd =0x44504543, len=92
3,603,200 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,008 ready_for_fw is high
1,060,008 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,568 >>> mbox cmd response: success
2,626,568 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,688,282 UART:
2,688,298 UART: Running Caliptra FMC ...
2,688,706 UART:
2,688,849 UART: [state] CFI Enabled
2,699,302 UART: [fht] FMC Alias Private Key: 7
2,806,859 UART: [art] Extend RT PCRs Done
2,807,287 UART: [art] Lock RT PCRs Done
2,808,469 UART: [art] Populate DV Done
2,816,910 UART: [fht] FMC Alias Private Key: 7
2,818,072 UART: [art] Derive CDI
2,818,352 UART: [art] Store in in slot 0x4
2,903,745 UART: [art] Derive Key Pair
2,904,105 UART: [art] Store priv key in slot 0x5
2,916,709 UART: [art] Derive Key Pair - Done
2,931,311 UART: [art] Signing Cert with AUTHO
2,931,791 UART: RITY.KEYID = 7
2,946,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,686 UART: [art] PUB.X = DF8E218BF3FE83539BEEE17D77F91F48BDF5FB1AD94810B222131CBAE37F0F2078657B9B06CA761691C7BA2B8F0D6181
2,954,461 UART: [art] PUB.Y = DEB9384463EA943BBC10DB11B99D8F038155A6D3A4F820636F52FA6636F6CE848FB8237C4C2F7B874DAA91B3D95BB702
2,961,415 UART: [art] SIG.R = BF2463C839B9F0EE9E336602EBC03D5FDC56258A4CA9EC716AF2F07AC6C113167B2204129FFE66B43CD1E93F937D3F20
2,968,191 UART: [art] SIG.S = 814AD1ECC2E3D815D270AAAC8458C3CE093953050071BFED118EC7F3D23C63AB3E4B9D078BB49644C9CD311BCFB7AB67
2,991,843 UART: Caliptra RT
2,992,189 UART: [state] CFI Enabled
3,100,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,507 UART: [rt]cmd =0x44504543, len=136
3,203,763 >>> mbox cmd response data (136 bytes)
3,203,764 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,779 UART: [rt]cmd =0x44504543, len=92
3,424,156 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,867 UART: [kat] ++
895,019 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,521 UART: [idev] ++
1,172,689 UART: [idev] CDI.KEYID = 6
1,173,050 UART: [idev] SUBJECT.KEYID = 7
1,173,475 UART: [idev] UDS.KEYID = 0
1,173,821 ready_for_fw is high
1,173,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,331 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,390 UART: [ldev] Erasing FE.KEYID = 1
1,241,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,205 UART: [fwproc] Recv command 0x46574c44
1,281,938 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,582 >>> mbox cmd response: success
2,771,582 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,735 UART: [afmc] ++
2,772,903 UART: [afmc] CDI.KEYID = 6
2,773,266 UART: [afmc] SUBJECT.KEYID = 7
2,773,692 UART: [afmc] AUTHORITY.KEYID = 5
2,808,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,050 UART: [afmc] --
2,852,160 UART: [cold-reset] --
2,853,334 UART: [state] Locking Datavault
2,854,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,243 UART: [state] Locking ICCM
2,855,899 UART: [exit] Launching FMC @ 0x40000130
2,861,228 UART:
2,861,244 UART: Running Caliptra FMC ...
2,861,652 UART:
2,861,706 UART: [state] CFI Enabled
2,872,443 UART: [fht] FMC Alias Private Key: 7
2,980,662 UART: [art] Extend RT PCRs Done
2,981,090 UART: [art] Lock RT PCRs Done
2,982,372 UART: [art] Populate DV Done
2,990,519 UART: [fht] FMC Alias Private Key: 7
2,991,503 UART: [art] Derive CDI
2,991,783 UART: [art] Store in in slot 0x4
3,077,512 UART: [art] Derive Key Pair
3,077,872 UART: [art] Store priv key in slot 0x5
3,090,932 UART: [art] Derive Key Pair - Done
3,106,008 UART: [art] Signing Cert with AUTHO
3,106,488 UART: RITY.KEYID = 7
3,121,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,883 UART: [art] PUB.X = E206E9BDCC7D2B0E75E5FF82171F3C8BD6CC6296A50740673EB98F6F5068C8D2084B58A57C5DD5B3ACE90133198788BF
3,128,648 UART: [art] PUB.Y = 0F351DCF1F312C38DE7C384CB6ED307984EC9731EF19E0A3BC3DBCBE3CEE5201E435165346D770D5B31A7B9E599EDFE5
3,135,610 UART: [art] SIG.R = 132D3DA5E695B4496274732332FAA389EE9995627A7909E859692301095985E68A68E57A73E7D10222CF28B304496748
3,142,345 UART: [art] SIG.S = 19BCA8EA5249125E33177340ADEF80B32993BC32680EBE8833E5106B594E71D2C137D9FDE4E3BB52443D7F7E7A9E4EB7
3,166,445 UART: Caliptra RT
3,166,699 UART: [state] CFI Enabled
3,274,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,480 UART: [rt]cmd =0x44504543, len=136
3,376,900 >>> mbox cmd response data (136 bytes)
3,376,901 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,794 UART: [rt]cmd =0x44504543, len=92
3,597,915 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,798 ready_for_fw is high
1,055,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,078 >>> mbox cmd response: success
2,620,078 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,681,712 UART:
2,681,728 UART: Running Caliptra FMC ...
2,682,136 UART:
2,682,190 UART: [state] CFI Enabled
2,692,579 UART: [fht] FMC Alias Private Key: 7
2,800,976 UART: [art] Extend RT PCRs Done
2,801,404 UART: [art] Lock RT PCRs Done
2,803,284 UART: [art] Populate DV Done
2,811,557 UART: [fht] FMC Alias Private Key: 7
2,812,581 UART: [art] Derive CDI
2,812,861 UART: [art] Store in in slot 0x4
2,898,056 UART: [art] Derive Key Pair
2,898,416 UART: [art] Store priv key in slot 0x5
2,910,980 UART: [art] Derive Key Pair - Done
2,925,918 UART: [art] Signing Cert with AUTHO
2,926,398 UART: RITY.KEYID = 7
2,941,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,105 UART: [art] PUB.X = 51892084654E085757F959B4B1D925274117168ECEADA104E236628DD59B2E5D94995D5EF80FF7F1EBDAFC24DDE5F0D7
2,948,872 UART: [art] PUB.Y = 7698DB15AFA986ACF4074E8460401023863D96A08ACD912476367749C0F40013139A434EB403F91F76C24D82811AF7E7
2,955,784 UART: [art] SIG.R = D7BCDCF207F346FFFB80362A6792B80D8EC6E86A7BF3DB9B1449227CABDF2257FC782A3C2288B19C499FEE103E81C70A
2,962,563 UART: [art] SIG.S = 7F9464629E7DB484B0D9D5FE964066DB0AC69A2AC6F56CC9B84FDBDB7D0F9AFE3B7BF64E9BEAAD2F8FB52EF43AF5D183
2,986,538 UART: Caliptra RT
2,986,792 UART: [state] CFI Enabled
3,094,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,621 UART: [rt]cmd =0x44504543, len=136
3,196,909 >>> mbox cmd response data (136 bytes)
3,196,910 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,891 UART: [rt]cmd =0x44504543, len=92
3,417,780 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,174,406 ready_for_fw is high
1,174,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,306 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,293 UART: [ldev] ++
1,209,461 UART: [ldev] CDI.KEYID = 6
1,209,825 UART: [ldev] SUBJECT.KEYID = 5
1,210,252 UART: [ldev] AUTHORITY.KEYID = 7
1,210,715 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,241,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,439 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,742 UART: [fwproc] Recv command 0x46574c44
1,282,475 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,027 >>> mbox cmd response: success
2,773,027 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,774,160 UART: [afmc] ++
2,774,328 UART: [afmc] CDI.KEYID = 6
2,774,691 UART: [afmc] SUBJECT.KEYID = 7
2,775,117 UART: [afmc] AUTHORITY.KEYID = 5
2,811,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,083 UART: [afmc] --
2,855,055 UART: [cold-reset] --
2,855,821 UART: [state] Locking Datavault
2,857,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,674 UART: [state] Locking ICCM
2,858,332 UART: [exit] Launching FMC @ 0x40000130
2,863,661 UART:
2,863,677 UART: Running Caliptra FMC ...
2,864,085 UART:
2,864,228 UART: [state] CFI Enabled
2,874,925 UART: [fht] FMC Alias Private Key: 7
2,982,772 UART: [art] Extend RT PCRs Done
2,983,200 UART: [art] Lock RT PCRs Done
2,984,728 UART: [art] Populate DV Done
2,993,099 UART: [fht] FMC Alias Private Key: 7
2,994,219 UART: [art] Derive CDI
2,994,499 UART: [art] Store in in slot 0x4
3,080,318 UART: [art] Derive Key Pair
3,080,678 UART: [art] Store priv key in slot 0x5
3,094,342 UART: [art] Derive Key Pair - Done
3,109,309 UART: [art] Signing Cert with AUTHO
3,109,789 UART: RITY.KEYID = 7
3,125,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,778 UART: [art] PUB.X = 495180A14D44DA9924BB761306074719820AD7B94227B9C2E572E1C5EA36A33346007E5C849D34515550953592C84B9F
3,132,501 UART: [art] PUB.Y = 4CC8FC4CC2DA029263F9A0B36743012E6660271B8B1D41F42C83DCB3E424DE7B035D076DC2C3D8800866CF9A7EB57694
3,139,442 UART: [art] SIG.R = 08CA102CDA44051FF96912C6A89C5A0C00441A153807EF15599B69785FDC9F58574B9A81A057912F77E383886945BE26
3,146,170 UART: [art] SIG.S = E6DF9D413B2C95B97683FCD3656BB3E3E27C8B6077FAA846AA86E9516496E57D1DBDE7B6BC3EE8010F3DE7102BFF514F
3,169,755 UART: Caliptra RT
3,170,101 UART: [state] CFI Enabled
3,277,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,996 UART: [rt]cmd =0x44504543, len=136
3,381,056 >>> mbox cmd response data (136 bytes)
3,381,057 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,712 UART: [rt]cmd =0x44504543, len=92
3,602,016 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 ready_for_fw is high
1,056,327 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,639 >>> mbox cmd response: success
2,622,639 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,685,567 UART:
2,685,583 UART: Running Caliptra FMC ...
2,685,991 UART:
2,686,134 UART: [state] CFI Enabled
2,696,851 UART: [fht] FMC Alias Private Key: 7
2,804,836 UART: [art] Extend RT PCRs Done
2,805,264 UART: [art] Lock RT PCRs Done
2,806,742 UART: [art] Populate DV Done
2,815,007 UART: [fht] FMC Alias Private Key: 7
2,816,107 UART: [art] Derive CDI
2,816,387 UART: [art] Store in in slot 0x4
2,901,846 UART: [art] Derive Key Pair
2,902,206 UART: [art] Store priv key in slot 0x5
2,915,162 UART: [art] Derive Key Pair - Done
2,929,926 UART: [art] Signing Cert with AUTHO
2,930,406 UART: RITY.KEYID = 7
2,945,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,335 UART: [art] PUB.X = 4467163497D4B70998DF7D56ADD312C2D0D272D8D3553525003D7EA6998845A7098652FCD5BF37F5F45A4D8065E3D551
2,953,071 UART: [art] PUB.Y = 009CF4523542C5AB86EBDB3FE1A1581797BD78B0A189E31E4C31F73DF61A6DC92F811F4BED2FB15E36D7E101CE1C0EB1
2,960,011 UART: [art] SIG.R = D66908AA480B19FFD165E111FFA71EE5C45027974EBE33FD33B386A541124E609E20AFB01BC259025C60DBAAE4FCA03D
2,966,786 UART: [art] SIG.S = B7F333D676BD04A4050A9AC4664DBD515F528A22CA75175461FBA76A00055DC94041F2258C053DCE968C57C9AD6B5F72
2,991,228 UART: Caliptra RT
2,991,574 UART: [state] CFI Enabled
3,099,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,332 UART: [rt]cmd =0x44504543, len=136
3,202,724 >>> mbox cmd response data (136 bytes)
3,202,725 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,752 UART: [rt]cmd =0x44504543, len=92
3,424,351 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,551 UART:
192,921 UART: Running Caliptra ROM ...
194,104 UART:
194,254 UART: [state] CFI Enabled
262,928 UART: [state] LifecycleState = Unprovisioned
264,914 UART: [state] DebugLocked = No
267,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,580 UART: [kat] SHA2-256
442,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,799 UART: [kat] ++
453,345 UART: [kat] sha1
465,497 UART: [kat] SHA2-256
468,127 UART: [kat] SHA2-384
474,187 UART: [kat] SHA2-512-ACC
476,551 UART: [kat] ECC-384
2,765,976 UART: [kat] HMAC-384Kdf
2,778,994 UART: [kat] LMS
3,969,351 UART: [kat] --
3,976,924 UART: [cold-reset] ++
3,978,248 UART: [fht] Storing FHT @ 0x50003400
3,989,339 UART: [idev] ++
3,989,907 UART: [idev] CDI.KEYID = 6
3,990,812 UART: [idev] SUBJECT.KEYID = 7
3,992,046 UART: [idev] UDS.KEYID = 0
3,993,115 ready_for_fw is high
3,993,325 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,222 UART: [idev] Erasing UDS.KEYID = 0
7,327,742 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,980 UART: [idev] --
7,352,651 UART: [ldev] ++
7,353,278 UART: [ldev] CDI.KEYID = 6
7,354,179 UART: [ldev] SUBJECT.KEYID = 5
7,355,438 UART: [ldev] AUTHORITY.KEYID = 7
7,356,658 UART: [ldev] FE.KEYID = 1
7,399,912 UART: [ldev] Erasing FE.KEYID = 1
10,734,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,405 UART: [ldev] --
13,114,922 UART: [fwproc] Waiting for Commands...
13,118,058 UART: [fwproc] Received command 0x46574c44
13,120,238 UART: [fwproc] Received Image of size 114036 bytes
17,174,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,628,886 >>> mbox cmd response: success
17,632,635 UART: [afmc] ++
17,633,225 UART: [afmc] CDI.KEYID = 6
17,634,243 UART: [afmc] SUBJECT.KEYID = 7
17,635,407 UART: [afmc] AUTHORITY.KEYID = 5
21,004,146 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,314,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,316,418 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,330,827 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,345,633 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,360,112 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,382,571 UART: [afmc] --
23,386,976 UART: [cold-reset] --
23,390,939 UART: [state] Locking Datavault
23,396,284 UART: [state] Locking PCR0, PCR1 and PCR31
23,397,977 UART: [state] Locking ICCM
23,399,692 UART: [exit] Launching FMC @ 0x40000130
23,408,035 UART:
23,408,269 UART: Running Caliptra FMC ...
23,409,362 UART:
23,409,520 UART: [state] CFI Enabled
23,472,813 UART: [fht] FMC Alias Private Key: 7
25,811,000 UART: [art] Extend RT PCRs Done
25,812,224 UART: [art] Lock RT PCRs Done
25,813,709 UART: [art] Populate DV Done
25,818,897 UART: [fht] FMC Alias Private Key: 7
25,820,470 UART: [art] Derive CDI
25,821,222 UART: [art] Store in in slot 0x4
25,880,683 UART: [art] Derive Key Pair
25,881,677 UART: [art] Store priv key in slot 0x5
29,174,136 UART: [art] Derive Key Pair - Done
29,187,290 UART: [art] Signing Cert with AUTHO
29,188,623 UART: RITY.KEYID = 7
31,475,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,924 UART: [art] PUB.X = 3DF3C98713DF0EF5C2A240ABC05D20B808906722C263837BB56F6D6E8E011191A76DED7A9D20238EC5C0CC115E9ED919
31,484,134 UART: [art] PUB.Y = B4ACCA53DB88B433A8755703E3DD53E42CFDB7EF8D2BAA3B7F300892AFF533760FE4CCCD5977F9DB7EB0B8BA47DFE284
31,491,442 UART: [art] SIG.R = D67151346BB7E998CA97D0A42B59E3772D06208CC6C3AA8ACCD2C2B0CA1BB6EC3B74DF5715BAC25FD3263088741B210C
31,498,846 UART: [art] SIG.S = 53BF08B18340A89692865D29849A8B8EF2415D3535FDB8BB533725844572A918B2F47D5AEABEA097A0732F40FCD7193E
32,803,401 UART: Caliptra RT
32,804,108 UART: [state] CFI Enabled
32,965,116 UART: [rt] RT listening for mailbox commands...
32,969,160 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,013,677 UART: [rt]cmd =0x4c4d5356, len=1672
34,215,032 >>> mbox cmd response data (8 bytes)
34,217,523 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,262,280 UART: [rt]cmd =0x4c4d5356, len=1672
35,027,361 >>> mbox cmd response data (8 bytes)
35,029,786 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,074,006 UART: [rt]cmd =0x4c4d5356, len=1672
35,813,898 >>> mbox cmd response data (8 bytes)
35,816,285 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,860,891 UART: [rt]cmd =0x4c4d5356, len=1672
36,626,235 >>> mbox cmd response data (8 bytes)
36,627,490 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,671,859 UART: [rt]cmd =0x4c4d5356, len=1672
37,514,978 >>> mbox cmd response data (8 bytes)
37,516,270 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,560,487 UART: [rt]cmd =0x4c4d5356, len=1672
38,299,929 >>> mbox cmd response data (8 bytes)
38,301,210 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,345,582 UART: [rt]cmd =0x4c4d5356, len=1672
39,136,722 >>> mbox cmd response data (8 bytes)
39,137,998 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,182,279 UART: [rt]cmd =0x4c4d5356, len=1672
39,999,403 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,785,116 ready_for_fw is high
3,785,684 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,863,027 >>> mbox cmd response: success
23,545,446 UART:
23,545,859 UART: Running Caliptra FMC ...
23,547,050 UART:
23,547,223 UART: [state] CFI Enabled
23,616,421 UART: [fht] FMC Alias Private Key: 7
25,954,454 UART: [art] Extend RT PCRs Done
25,955,813 UART: [art] Lock RT PCRs Done
25,957,656 UART: [art] Populate DV Done
25,963,394 UART: [fht] FMC Alias Private Key: 7
25,965,039 UART: [art] Derive CDI
25,965,849 UART: [art] Store in in slot 0x4
26,024,831 UART: [art] Derive Key Pair
26,025,834 UART: [art] Store priv key in slot 0x5
29,318,597 UART: [art] Derive Key Pair - Done
29,331,329 UART: [art] Signing Cert with AUTHO
29,332,625 UART: RITY.KEYID = 7
31,620,762 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,297 UART: [art] PUB.X = BF96FBBEB64ECE5D3A6D4DDD5EFA14D1A115178EC16547E7D12B54E2F84627FD6B2B4D932817F8385C43D7F5DC8F8A2C
31,629,546 UART: [art] PUB.Y = 0AF60E1219393377C1139D78C3CEF8F1D3FC4943CDFE9111A6E26F448A442DE46ACE0206A61C95474663A09257A00B80
31,636,788 UART: [art] SIG.R = 4C36E0664DB1C5D510363C4EC2DB9D9AC20D61045260075D09B9A0E2B78F0DC778BCE7742021ACF0E057041BADD44C99
31,644,176 UART: [art] SIG.S = 0DA254CAFA2251BDB2F4968E94B1F50447918C288AF8AE46D3C49B829BABEF9AA36D7DDD192E7AE6B8B79E919E233670
32,949,234 UART: Caliptra RT
32,949,947 UART: [state] CFI Enabled
33,111,445 UART: [rt] RT listening for mailbox commands...
33,115,390 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,159,799 UART: [rt]cmd =0x4c4d5356, len=1672
34,361,204 >>> mbox cmd response data (8 bytes)
34,363,663 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,408,058 UART: [rt]cmd =0x4c4d5356, len=1672
35,173,698 >>> mbox cmd response data (8 bytes)
35,176,125 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,220,397 UART: [rt]cmd =0x4c4d5356, len=1672
35,960,253 >>> mbox cmd response data (8 bytes)
35,962,663 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,007,302 UART: [rt]cmd =0x4c4d5356, len=1672
36,772,526 >>> mbox cmd response data (8 bytes)
36,773,814 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,818,297 UART: [rt]cmd =0x4c4d5356, len=1672
37,661,297 >>> mbox cmd response data (8 bytes)
37,662,596 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,707,139 UART: [rt]cmd =0x4c4d5356, len=1672
38,446,521 >>> mbox cmd response data (8 bytes)
38,447,779 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,492,200 UART: [rt]cmd =0x4c4d5356, len=1672
39,283,132 >>> mbox cmd response data (8 bytes)
39,284,408 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,328,787 UART: [rt]cmd =0x4c4d5356, len=1672
40,145,489 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
192,647 UART:
193,005 UART: Running Caliptra ROM ...
194,106 UART:
603,771 UART: [state] CFI Enabled
617,358 UART: [state] LifecycleState = Unprovisioned
619,304 UART: [state] DebugLocked = No
621,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,774 UART: [kat] SHA2-256
796,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,059 UART: [kat] ++
807,536 UART: [kat] sha1
818,694 UART: [kat] SHA2-256
821,416 UART: [kat] SHA2-384
827,189 UART: [kat] SHA2-512-ACC
829,562 UART: [kat] ECC-384
3,115,028 UART: [kat] HMAC-384Kdf
3,127,050 UART: [kat] LMS
4,317,137 UART: [kat] --
4,321,911 UART: [cold-reset] ++
4,324,200 UART: [fht] Storing FHT @ 0x50003400
4,335,462 UART: [idev] ++
4,336,030 UART: [idev] CDI.KEYID = 6
4,336,984 UART: [idev] SUBJECT.KEYID = 7
4,338,229 UART: [idev] UDS.KEYID = 0
4,339,226 ready_for_fw is high
4,339,442 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,725 UART: [idev] Erasing UDS.KEYID = 0
7,626,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,179 UART: [idev] --
7,651,898 UART: [ldev] ++
7,652,466 UART: [ldev] CDI.KEYID = 6
7,653,437 UART: [ldev] SUBJECT.KEYID = 5
7,654,646 UART: [ldev] AUTHORITY.KEYID = 7
7,655,880 UART: [ldev] FE.KEYID = 1
7,667,367 UART: [ldev] Erasing FE.KEYID = 1
10,958,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,715 UART: [ldev] --
13,319,085 UART: [fwproc] Waiting for Commands...
13,321,229 UART: [fwproc] Received command 0x46574c44
13,323,462 UART: [fwproc] Received Image of size 114036 bytes
17,379,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,335 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,840,148 >>> mbox cmd response: success
17,843,787 UART: [afmc] ++
17,844,378 UART: [afmc] CDI.KEYID = 6
17,845,284 UART: [afmc] SUBJECT.KEYID = 7
17,846,556 UART: [afmc] AUTHORITY.KEYID = 5
21,158,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,551 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,943 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,774 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,193 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,426 UART: [afmc] --
23,521,083 UART: [cold-reset] --
23,524,890 UART: [state] Locking Datavault
23,530,893 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,646 UART: [state] Locking ICCM
23,535,282 UART: [exit] Launching FMC @ 0x40000130
23,543,676 UART:
23,543,920 UART: Running Caliptra FMC ...
23,545,025 UART:
23,545,190 UART: [state] CFI Enabled
23,553,182 UART: [fht] FMC Alias Private Key: 7
25,883,665 UART: [art] Extend RT PCRs Done
25,884,881 UART: [art] Lock RT PCRs Done
25,886,585 UART: [art] Populate DV Done
25,891,962 UART: [fht] FMC Alias Private Key: 7
25,893,666 UART: [art] Derive CDI
25,894,481 UART: [art] Store in in slot 0x4
25,937,029 UART: [art] Derive Key Pair
25,938,073 UART: [art] Store priv key in slot 0x5
29,180,395 UART: [art] Derive Key Pair - Done
29,193,168 UART: [art] Signing Cert with AUTHO
29,194,493 UART: RITY.KEYID = 7
31,473,976 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,484 UART: [art] PUB.X = 19233A4F04D11F590E5753026F250C6156DA7CBC04CC95E8BF6BC37A1E8B3E3D838A8055DD725260FE080D40B2B9F84C
31,482,684 UART: [art] PUB.Y = A7D83AA5971BAFC1E48B0AD4B144AF6C4811D51D2C14DCC46A5C37A54CF0FDEA7832D748DAC1EDF4EBD327CC50DCC781
31,489,989 UART: [art] SIG.R = 44CDBB772678589B46523FFD336CFCB14F14F2AF45374216D4D68833BCE1D17683241E28E7AB9D540A4E636689787B05
31,497,338 UART: [art] SIG.S = 9A67934E66D4C9EFF016B8359F08036364691CD5C0E5CA0D481A430D9430C5858E21097F8A74F04FC9F8A03D7D58EADD
32,802,315 UART: Caliptra RT
32,803,024 UART: [state] CFI Enabled
32,920,699 UART: [rt] RT listening for mailbox commands...
32,924,699 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,969,205 UART: [rt]cmd =0x4c4d5356, len=1672
34,170,676 >>> mbox cmd response data (8 bytes)
34,173,164 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,217,388 UART: [rt]cmd =0x4c4d5356, len=1672
34,982,901 >>> mbox cmd response data (8 bytes)
34,985,331 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,029,777 UART: [rt]cmd =0x4c4d5356, len=1672
35,769,630 >>> mbox cmd response data (8 bytes)
35,772,020 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,816,225 UART: [rt]cmd =0x4c4d5356, len=1672
36,581,623 >>> mbox cmd response data (8 bytes)
36,582,876 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,627,190 UART: [rt]cmd =0x4c4d5356, len=1672
37,470,242 >>> mbox cmd response data (8 bytes)
37,471,530 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,515,663 UART: [rt]cmd =0x4c4d5356, len=1672
38,254,955 >>> mbox cmd response data (8 bytes)
38,256,212 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,300,690 UART: [rt]cmd =0x4c4d5356, len=1672
39,092,034 >>> mbox cmd response data (8 bytes)
39,093,315 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,137,810 UART: [rt]cmd =0x4c4d5356, len=1672
39,954,708 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,129,814 ready_for_fw is high
4,130,192 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,207 >>> mbox cmd response: success
23,720,372 UART:
23,720,767 UART: Running Caliptra FMC ...
23,721,907 UART:
23,722,073 UART: [state] CFI Enabled
23,730,458 UART: [fht] FMC Alias Private Key: 7
26,061,504 UART: [art] Extend RT PCRs Done
26,062,732 UART: [art] Lock RT PCRs Done
26,064,688 UART: [art] Populate DV Done
26,070,057 UART: [fht] FMC Alias Private Key: 7
26,071,573 UART: [art] Derive CDI
26,072,392 UART: [art] Store in in slot 0x4
26,114,677 UART: [art] Derive Key Pair
26,115,745 UART: [art] Store priv key in slot 0x5
29,357,722 UART: [art] Derive Key Pair - Done
29,370,544 UART: [art] Signing Cert with AUTHO
29,371,873 UART: RITY.KEYID = 7
31,651,433 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,935 UART: [art] PUB.X = 1EF714E8330C196A05FF268CC8171C0FBF507D61D373E52F1F2D2B6760815BB6EC09559CD6F47B870E381689FFF71A86
31,660,150 UART: [art] PUB.Y = F884917436A2E3332766E6FF9680599260F47564BE18DEDE1E1B24EE17F36FAA5B543EAC15B974285327213F74FD8A7D
31,667,413 UART: [art] SIG.R = C44504DE3A25978CDA18EE9D2EB8D50DBFD75005B6E4154C8DA6BDA0F18D830DF7045807BB9A4E70990E24E75B01B954
31,674,779 UART: [art] SIG.S = ECFF9CA7D66D56E7A7EE399E57CEBE35B01017055F797BD91B7589853D1AECBCE0184FBA4380852EB88DD204F2F03A52
32,980,059 UART: Caliptra RT
32,980,780 UART: [state] CFI Enabled
33,098,329 UART: [rt] RT listening for mailbox commands...
33,102,345 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,146,942 UART: [rt]cmd =0x4c4d5356, len=1672
34,348,285 >>> mbox cmd response data (8 bytes)
34,350,739 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,395,275 UART: [rt]cmd =0x4c4d5356, len=1672
35,160,882 >>> mbox cmd response data (8 bytes)
35,163,307 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,207,697 UART: [rt]cmd =0x4c4d5356, len=1672
35,947,586 >>> mbox cmd response data (8 bytes)
35,949,968 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,994,232 UART: [rt]cmd =0x4c4d5356, len=1672
36,759,579 >>> mbox cmd response data (8 bytes)
36,760,858 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,805,299 UART: [rt]cmd =0x4c4d5356, len=1672
37,648,221 >>> mbox cmd response data (8 bytes)
37,649,498 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,693,908 UART: [rt]cmd =0x4c4d5356, len=1672
38,433,165 >>> mbox cmd response data (8 bytes)
38,434,425 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,478,637 UART: [rt]cmd =0x4c4d5356, len=1672
39,269,697 >>> mbox cmd response data (8 bytes)
39,270,973 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,315,408 UART: [rt]cmd =0x4c4d5356, len=1672
40,132,424 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,549 UART:
192,923 UART: Running Caliptra ROM ...
194,055 UART:
194,211 UART: [state] CFI Enabled
264,041 UART: [state] LifecycleState = Unprovisioned
265,953 UART: [state] DebugLocked = No
267,614 UART: [state] WD Timer not started. Device not locked for debugging
270,795 UART: [kat] SHA2-256
449,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,501 UART: [kat] ++
461,950 UART: [kat] sha1
473,672 UART: [kat] SHA2-256
476,752 UART: [kat] SHA2-384
482,409 UART: [kat] SHA2-512-ACC
485,421 UART: [kat] ECC-384
2,947,032 UART: [kat] HMAC-384Kdf
2,971,055 UART: [kat] LMS
3,500,563 UART: [kat] --
3,506,520 UART: [cold-reset] ++
3,508,673 UART: [fht] FHT @ 0x50003400
3,521,076 UART: [idev] ++
3,521,652 UART: [idev] CDI.KEYID = 6
3,522,573 UART: [idev] SUBJECT.KEYID = 7
3,523,746 UART: [idev] UDS.KEYID = 0
3,524,796 ready_for_fw is high
3,525,019 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,970 UART: [idev] Erasing UDS.KEYID = 0
6,025,007 UART: [idev] Sha1 KeyId Algorithm
6,047,793 UART: [idev] --
6,050,834 UART: [ldev] ++
6,051,417 UART: [ldev] CDI.KEYID = 6
6,052,306 UART: [ldev] SUBJECT.KEYID = 5
6,053,415 UART: [ldev] AUTHORITY.KEYID = 7
6,054,705 UART: [ldev] FE.KEYID = 1
6,099,362 UART: [ldev] Erasing FE.KEYID = 1
8,603,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,823 UART: [ldev] --
10,412,658 UART: [fwproc] Wait for Commands...
10,414,604 UART: [fwproc] Recv command 0x46574c44
10,416,846 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,274,849 >>> mbox cmd response: success
14,279,026 UART: [afmc] ++
14,279,624 UART: [afmc] CDI.KEYID = 6
14,280,541 UART: [afmc] SUBJECT.KEYID = 7
14,281,699 UART: [afmc] AUTHORITY.KEYID = 5
16,808,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,190 UART: [afmc] --
18,607,193 UART: [cold-reset] --
18,611,430 UART: [state] Locking Datavault
18,616,429 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,080 UART: [state] Locking ICCM
18,619,750 UART: [exit] Launching FMC @ 0x40000130
18,628,203 UART:
18,628,442 UART: Running Caliptra FMC ...
18,629,546 UART:
18,629,707 UART: [state] CFI Enabled
18,690,923 UART: [fht] FMC Alias Private Key: 7
20,454,861 UART: [art] Extend RT PCRs Done
20,456,077 UART: [art] Lock RT PCRs Done
20,457,944 UART: [art] Populate DV Done
20,463,415 UART: [fht] FMC Alias Private Key: 7
20,465,115 UART: [art] Derive CDI
20,465,927 UART: [art] Store in in slot 0x4
20,523,723 UART: [art] Derive Key Pair
20,524,766 UART: [art] Store priv key in slot 0x5
22,987,787 UART: [art] Derive Key Pair - Done
23,001,055 UART: [art] Signing Cert with AUTHO
23,002,368 UART: RITY.KEYID = 7
24,714,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,649 UART: [art] PUB.X = 40E723840BB8BAEFEDF5CC6348A1B37E4DFAE7FBBE590430A244A9FD99926B1C55AD9459FA8D084FF765101AC7817331
24,722,921 UART: [art] PUB.Y = 43916570BDD7859DA26256CF87880305F2925C8A3E8249641E37BF07B02E071E96911F65BDFAC021A3EE8DAB77DC9C49
24,730,176 UART: [art] SIG.R = 3688E66E627C85D21FE6B923CFDA4B943D46B2ACF7B9A0A7D984272E850FFACD026632A559BFBB6F06247A1573C92C95
24,737,563 UART: [art] SIG.S = A52928A5B47BE7D9CBBD142C205914DC6E25172DE43D82296096EDE517B9E21D69758CA6DDE60540C5EECC12DA9DAA79
25,716,490 UART: Caliptra RT
25,717,191 UART: [state] CFI Enabled
25,882,368 UART: [rt] RT listening for mailbox commands...
25,886,357 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,930,925 UART: [rt]cmd =0x4c4d5356, len=1672
26,344,555 >>> mbox cmd response data (8 bytes)
26,347,046 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,391,436 UART: [rt]cmd =0x4c4d5356, len=1672
26,610,318 >>> mbox cmd response data (8 bytes)
26,612,710 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,657,258 UART: [rt]cmd =0x4c4d5356, len=1672
26,874,803 >>> mbox cmd response data (8 bytes)
26,877,210 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,921,763 UART: [rt]cmd =0x4c4d5356, len=1672
27,137,454 >>> mbox cmd response data (8 bytes)
27,138,715 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,183,196 UART: [rt]cmd =0x4c4d5356, len=1672
27,402,049 >>> mbox cmd response data (8 bytes)
27,403,330 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,447,473 UART: [rt]cmd =0x4c4d5356, len=1672
27,663,808 >>> mbox cmd response data (8 bytes)
27,665,076 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,709,401 UART: [rt]cmd =0x4c4d5356, len=1672
27,925,987 >>> mbox cmd response data (8 bytes)
27,927,257 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,971,647 UART: [rt]cmd =0x4c4d5356, len=1672
28,190,863 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,545 UART:
192,920 UART: Running Caliptra ROM ...
194,052 UART:
194,200 UART: [state] CFI Enabled
264,821 UART: [state] LifecycleState = Unprovisioned
267,227 UART: [state] DebugLocked = No
268,625 UART: [state] WD Timer not started. Device not locked for debugging
273,971 UART: [kat] SHA2-256
463,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,624 UART: [kat] ++
475,100 UART: [kat] sha1
486,968 UART: [kat] SHA2-256
490,152 UART: [kat] SHA2-384
495,262 UART: [kat] SHA2-512-ACC
497,853 UART: [kat] ECC-384
2,948,940 UART: [kat] HMAC-384Kdf
2,971,417 UART: [kat] LMS
3,503,154 UART: [kat] --
3,508,070 UART: [cold-reset] ++
3,509,151 UART: [fht] FHT @ 0x50003400
3,520,489 UART: [idev] ++
3,521,195 UART: [idev] CDI.KEYID = 6
3,522,104 UART: [idev] SUBJECT.KEYID = 7
3,523,368 UART: [idev] UDS.KEYID = 0
3,524,296 ready_for_fw is high
3,524,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,314 UART: [idev] Erasing UDS.KEYID = 0
6,033,442 UART: [idev] Sha1 KeyId Algorithm
6,055,916 UART: [idev] --
6,060,848 UART: [ldev] ++
6,061,539 UART: [ldev] CDI.KEYID = 6
6,062,465 UART: [ldev] SUBJECT.KEYID = 5
6,063,633 UART: [ldev] AUTHORITY.KEYID = 7
6,064,869 UART: [ldev] FE.KEYID = 1
6,102,321 UART: [ldev] Erasing FE.KEYID = 1
8,612,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,099 UART: [ldev] --
10,417,700 UART: [fwproc] Wait for Commands...
10,419,697 UART: [fwproc] Recv command 0x46574c44
10,421,970 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,610,044 >>> mbox cmd response: success
14,613,394 UART: [afmc] ++
14,614,108 UART: [afmc] CDI.KEYID = 6
14,615,306 UART: [afmc] SUBJECT.KEYID = 7
14,616,669 UART: [afmc] AUTHORITY.KEYID = 5
17,149,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,766 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,876 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,906 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,065 UART: [afmc] --
18,950,744 UART: [cold-reset] --
18,955,691 UART: [state] Locking Datavault
18,962,415 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,620 UART: [state] Locking ICCM
18,966,561 UART: [exit] Launching FMC @ 0x40000130
18,975,234 UART:
18,975,501 UART: Running Caliptra FMC ...
18,976,610 UART:
18,976,771 UART: [state] CFI Enabled
19,034,212 UART: [fht] FMC Alias Private Key: 7
20,797,828 UART: [art] Extend RT PCRs Done
20,799,029 UART: [art] Lock RT PCRs Done
20,800,403 UART: [art] Populate DV Done
20,805,819 UART: [fht] FMC Alias Private Key: 7
20,807,466 UART: [art] Derive CDI
20,808,278 UART: [art] Store in in slot 0x4
20,867,007 UART: [art] Derive Key Pair
20,868,079 UART: [art] Store priv key in slot 0x5
23,331,358 UART: [art] Derive Key Pair - Done
23,344,729 UART: [art] Signing Cert with AUTHO
23,346,042 UART: RITY.KEYID = 7
25,057,104 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,611 UART: [art] PUB.X = 1000C03CC241171E2690629B632345DE70E4CD420A7FDEA92F9F77353FE81463445D934CEEFCE865C7F4D0FE43274C10
25,065,844 UART: [art] PUB.Y = 9A694CCE7AC99D01A2019B08FB590BA768BE0F4D8B3A389677D8B001848E7E5B6A8A3D60088A469DF2C936A8F27A548B
25,073,115 UART: [art] SIG.R = 3BE86D10BB24A9E575378175F696B81C3492CA18C245E9ED76C314AC426FF81D16D6EDB32B4B3CAD1EC8D2C1C70C6C0C
25,080,491 UART: [art] SIG.S = F24298A86F361B89EFF7F2FCD89DE96860CAB34DFF705D2C2A5E3AF1291B9AE5DF4A28C615270C88A3738974F0A60110
26,059,445 UART: Caliptra RT
26,060,141 UART: [state] CFI Enabled
26,224,464 UART: [rt] RT listening for mailbox commands...
26,228,490 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,272,783 UART: [rt]cmd =0x4c4d5356, len=1672
26,686,663 >>> mbox cmd response data (8 bytes)
26,689,138 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,733,682 UART: [rt]cmd =0x4c4d5356, len=1672
26,952,431 >>> mbox cmd response data (8 bytes)
26,954,819 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,999,474 UART: [rt]cmd =0x4c4d5356, len=1672
27,217,229 >>> mbox cmd response data (8 bytes)
27,219,637 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,263,919 UART: [rt]cmd =0x4c4d5356, len=1672
27,479,219 >>> mbox cmd response data (8 bytes)
27,480,496 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,524,723 UART: [rt]cmd =0x4c4d5356, len=1672
27,743,306 >>> mbox cmd response data (8 bytes)
27,744,616 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,788,857 UART: [rt]cmd =0x4c4d5356, len=1672
28,005,048 >>> mbox cmd response data (8 bytes)
28,006,314 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,050,864 UART: [rt]cmd =0x4c4d5356, len=1672
28,267,409 >>> mbox cmd response data (8 bytes)
28,268,656 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,312,933 UART: [rt]cmd =0x4c4d5356, len=1672
28,531,853 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,103 writing to cptra_bootfsm_go
3,441,631 ready_for_fw is high
3,442,009 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,726,001 >>> mbox cmd response: success
19,042,687 UART:
19,043,113 UART: Running Caliptra FMC ...
19,044,415 UART:
19,044,583 UART: [state] CFI Enabled
19,109,774 UART: [fht] FMC Alias Private Key: 7
20,873,541 UART: [art] Extend RT PCRs Done
20,874,779 UART: [art] Lock RT PCRs Done
20,876,571 UART: [art] Populate DV Done
20,882,060 UART: [fht] FMC Alias Private Key: 7
20,883,601 UART: [art] Derive CDI
20,884,388 UART: [art] Store in in slot 0x4
20,942,456 UART: [art] Derive Key Pair
20,943,453 UART: [art] Store priv key in slot 0x5
23,406,802 UART: [art] Derive Key Pair - Done
23,419,856 UART: [art] Signing Cert with AUTHO
23,421,160 UART: RITY.KEYID = 7
25,132,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,999 UART: [art] PUB.X = 17CC1382DB36FE89A5814FFBFCDF83D02591603E775A61B7982B8DB144D7E3C647376C945827889DC35B2A5B866F4B48
25,141,221 UART: [art] PUB.Y = E4001E055E142EEC1EB184E06B60C76CB50D7532AE0FA168E5B1765248E89A08866EC3FEF6C07CE7A575BF30E7914F82
25,148,456 UART: [art] SIG.R = FFF8DA955E65CBA5E2D933DB645D8654B33950563A7196C9B521E581EE1404B30D8540DAD3C861C0C7430B908E41CF13
25,155,826 UART: [art] SIG.S = 03F96AADE108A76B75F8D02DF323823937F7EABC702BF31F5FD56E4A6954BA6C453A0C48CC5EA34D91D2FC64580A6DF0
26,135,377 UART: Caliptra RT
26,136,099 UART: [state] CFI Enabled
26,300,472 UART: [rt] RT listening for mailbox commands...
26,304,509 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,349,120 UART: [rt]cmd =0x4c4d5356, len=1672
26,762,777 >>> mbox cmd response data (8 bytes)
26,765,232 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,809,609 UART: [rt]cmd =0x4c4d5356, len=1672
27,028,588 >>> mbox cmd response data (8 bytes)
27,030,970 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,075,462 UART: [rt]cmd =0x4c4d5356, len=1672
27,293,050 >>> mbox cmd response data (8 bytes)
27,295,441 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,339,765 UART: [rt]cmd =0x4c4d5356, len=1672
27,554,991 >>> mbox cmd response data (8 bytes)
27,556,269 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,600,575 UART: [rt]cmd =0x4c4d5356, len=1672
27,819,248 >>> mbox cmd response data (8 bytes)
27,820,545 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,864,795 UART: [rt]cmd =0x4c4d5356, len=1672
28,080,867 >>> mbox cmd response data (8 bytes)
28,082,131 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,126,622 UART: [rt]cmd =0x4c4d5356, len=1672
28,343,090 >>> mbox cmd response data (8 bytes)
28,344,370 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,388,805 UART: [rt]cmd =0x4c4d5356, len=1672
28,608,039 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,588 writing to cptra_bootfsm_go
192,764 UART:
193,116 UART: Running Caliptra ROM ...
194,285 UART:
603,827 UART: [state] CFI Enabled
619,716 UART: [state] LifecycleState = Unprovisioned
622,122 UART: [state] DebugLocked = No
623,865 UART: [state] WD Timer not started. Device not locked for debugging
628,461 UART: [kat] SHA2-256
818,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,087 UART: [kat] ++
829,690 UART: [kat] sha1
841,487 UART: [kat] SHA2-256
844,484 UART: [kat] SHA2-384
851,323 UART: [kat] SHA2-512-ACC
853,918 UART: [kat] ECC-384
3,297,320 UART: [kat] HMAC-384Kdf
3,310,329 UART: [kat] LMS
3,842,143 UART: [kat] --
3,847,272 UART: [cold-reset] ++
3,848,507 UART: [fht] FHT @ 0x50003400
3,858,842 UART: [idev] ++
3,859,476 UART: [idev] CDI.KEYID = 6
3,860,604 UART: [idev] SUBJECT.KEYID = 7
3,861,662 UART: [idev] UDS.KEYID = 0
3,862,742 ready_for_fw is high
3,862,935 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,552 UART: [idev] Erasing UDS.KEYID = 0
6,345,545 UART: [idev] Sha1 KeyId Algorithm
6,368,396 UART: [idev] --
6,372,118 UART: [ldev] ++
6,372,974 UART: [ldev] CDI.KEYID = 6
6,373,902 UART: [ldev] SUBJECT.KEYID = 5
6,375,013 UART: [ldev] AUTHORITY.KEYID = 7
6,376,191 UART: [ldev] FE.KEYID = 1
6,388,506 UART: [ldev] Erasing FE.KEYID = 1
8,865,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,240 UART: [ldev] --
10,655,663 UART: [fwproc] Wait for Commands...
10,657,751 UART: [fwproc] Recv command 0x46574c44
10,660,006 UART: [fwproc] Recv'd Img size: 114360 bytes
14,109,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,845,195 >>> mbox cmd response: success
14,849,719 UART: [afmc] ++
14,850,423 UART: [afmc] CDI.KEYID = 6
14,851,604 UART: [afmc] SUBJECT.KEYID = 7
14,853,289 UART: [afmc] AUTHORITY.KEYID = 5
17,357,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,998 UART: [afmc] --
19,152,963 UART: [cold-reset] --
19,157,905 UART: [state] Locking Datavault
19,163,634 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,815 UART: [state] Locking ICCM
19,167,960 UART: [exit] Launching FMC @ 0x40000130
19,176,612 UART:
19,176,883 UART: Running Caliptra FMC ...
19,177,913 UART:
19,178,076 UART: [state] CFI Enabled
19,186,291 UART: [fht] FMC Alias Private Key: 7
20,943,022 UART: [art] Extend RT PCRs Done
20,944,237 UART: [art] Lock RT PCRs Done
20,946,201 UART: [art] Populate DV Done
20,951,556 UART: [fht] FMC Alias Private Key: 7
20,953,093 UART: [art] Derive CDI
20,953,907 UART: [art] Store in in slot 0x4
20,996,183 UART: [art] Derive Key Pair
20,997,181 UART: [art] Store priv key in slot 0x5
23,423,645 UART: [art] Derive Key Pair - Done
23,436,639 UART: [art] Signing Cert with AUTHO
23,437,942 UART: RITY.KEYID = 7
25,143,388 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,896 UART: [art] PUB.X = 17DE7112E128217C4CB2706579C938C8298767317C055D16D8AF0BD34882BDD1F4BE9A39EC883A69B5E52A8608748CEF
25,152,204 UART: [art] PUB.Y = 797585C4C609E5131D6471B1CAAD32311B58A951B2852953893E22BB9298F389BE79A8349E63E2838395FCD0A61F7E88
25,159,405 UART: [art] SIG.R = 1CE1B905964BE79F80F5313313410D7C5E73B28A4435530A074FE9355398599AD90E748A8C0C75F6D84E431C57035A4D
25,166,799 UART: [art] SIG.S = 2A23B89D06ACEC4925F3371580BB87C0392DD0BCCDFF9CB3AE993B1FEC5E9A1E1690FFF4814DC0B6034FEA01A3A4948C
26,145,287 UART: Caliptra RT
26,145,975 UART: [state] CFI Enabled
26,263,935 UART: [rt] RT listening for mailbox commands...
26,267,898 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,312,360 UART: [rt]cmd =0x4c4d5356, len=1672
26,726,139 >>> mbox cmd response data (8 bytes)
26,728,615 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,773,039 UART: [rt]cmd =0x4c4d5356, len=1672
26,991,906 >>> mbox cmd response data (8 bytes)
26,994,287 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,038,786 UART: [rt]cmd =0x4c4d5356, len=1672
27,256,416 >>> mbox cmd response data (8 bytes)
27,258,801 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,303,224 UART: [rt]cmd =0x4c4d5356, len=1672
27,518,828 >>> mbox cmd response data (8 bytes)
27,520,097 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,564,303 UART: [rt]cmd =0x4c4d5356, len=1672
27,782,889 >>> mbox cmd response data (8 bytes)
27,784,152 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,828,686 UART: [rt]cmd =0x4c4d5356, len=1672
28,044,679 >>> mbox cmd response data (8 bytes)
28,045,933 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,090,363 UART: [rt]cmd =0x4c4d5356, len=1672
28,306,643 >>> mbox cmd response data (8 bytes)
28,307,898 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,352,100 UART: [rt]cmd =0x4c4d5356, len=1672
28,571,265 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,753,984 ready_for_fw is high
3,754,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,944,301 >>> mbox cmd response: success
19,198,341 UART:
19,198,732 UART: Running Caliptra FMC ...
19,199,931 UART:
19,200,094 UART: [state] CFI Enabled
19,207,937 UART: [fht] FMC Alias Private Key: 7
20,964,237 UART: [art] Extend RT PCRs Done
20,965,473 UART: [art] Lock RT PCRs Done
20,967,265 UART: [art] Populate DV Done
20,972,574 UART: [fht] FMC Alias Private Key: 7
20,974,121 UART: [art] Derive CDI
20,974,933 UART: [art] Store in in slot 0x4
21,017,378 UART: [art] Derive Key Pair
21,018,428 UART: [art] Store priv key in slot 0x5
23,445,306 UART: [art] Derive Key Pair - Done
23,457,975 UART: [art] Signing Cert with AUTHO
23,459,269 UART: RITY.KEYID = 7
25,164,774 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,284 UART: [art] PUB.X = 699D457B7F329E0E1B2C060DD72D324B324EFFCA61F5DAE0B3E0F70868E0E7A8361829360E5C3CB831F7FDD037A4C238
25,173,539 UART: [art] PUB.Y = 4A10DE0BABC8356697EF19D3E35344D4948C82B3BDA4279924535B5398F827D8C81162C7C32189B744FE3AC952E71BF5
25,180,803 UART: [art] SIG.R = 647EA14C54E12464FB0BFB43AE5B4418A00B9450C52316F6E62285BA2D43A5E2A338D781701D97832217B64E65421800
25,188,149 UART: [art] SIG.S = 2229323BA785DA24A28415C00E7BA71D1D51686C640E3D024E9E053A41368DF95C3FF260298452850A62F046B2833A29
26,167,147 UART: Caliptra RT
26,167,834 UART: [state] CFI Enabled
26,285,052 UART: [rt] RT listening for mailbox commands...
26,288,977 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,333,563 UART: [rt]cmd =0x4c4d5356, len=1672
26,747,215 >>> mbox cmd response data (8 bytes)
26,749,675 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,793,961 UART: [rt]cmd =0x4c4d5356, len=1672
27,012,676 >>> mbox cmd response data (8 bytes)
27,015,092 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,059,429 UART: [rt]cmd =0x4c4d5356, len=1672
27,277,330 >>> mbox cmd response data (8 bytes)
27,279,730 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,323,959 UART: [rt]cmd =0x4c4d5356, len=1672
27,539,551 >>> mbox cmd response data (8 bytes)
27,540,818 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,585,255 UART: [rt]cmd =0x4c4d5356, len=1672
27,804,029 >>> mbox cmd response data (8 bytes)
27,805,297 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,849,559 UART: [rt]cmd =0x4c4d5356, len=1672
28,065,668 >>> mbox cmd response data (8 bytes)
28,066,933 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,111,243 UART: [rt]cmd =0x4c4d5356, len=1672
28,327,506 >>> mbox cmd response data (8 bytes)
28,328,783 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,373,213 UART: [rt]cmd =0x4c4d5356, len=1672
28,592,235 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,666 UART: [state] LifecycleState = Unprovisioned
85,321 UART: [state] DebugLocked = No
85,943 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,561 UART: [kat] SHA2-256
881,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,607 UART: [kat] ++
885,759 UART: [kat] sha1
889,889 UART: [kat] SHA2-256
891,827 UART: [kat] SHA2-384
894,578 UART: [kat] SHA2-512-ACC
896,479 UART: [kat] ECC-384
902,086 UART: [kat] HMAC-384Kdf
906,744 UART: [kat] LMS
1,474,940 UART: [kat] --
1,475,681 UART: [cold-reset] ++
1,476,147 UART: [fht] Storing FHT @ 0x50003400
1,478,912 UART: [idev] ++
1,479,080 UART: [idev] CDI.KEYID = 6
1,479,440 UART: [idev] SUBJECT.KEYID = 7
1,479,864 UART: [idev] UDS.KEYID = 0
1,480,209 ready_for_fw is high
1,480,209 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,832 UART: [idev] Erasing UDS.KEYID = 0
1,504,490 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,100 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,521,139 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,316 UART: [ldev] --
1,585,775 UART: [fwproc] Waiting for Commands...
1,586,640 UART: [fwproc] Received command 0x46574c44
1,587,431 UART: [fwproc] Received Image of size 114360 bytes
2,885,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,669 >>> mbox cmd response: success
3,077,815 UART: [afmc] ++
3,077,983 UART: [afmc] CDI.KEYID = 6
3,078,345 UART: [afmc] SUBJECT.KEYID = 7
3,078,770 UART: [afmc] AUTHORITY.KEYID = 5
3,114,151 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,299 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,912 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,602 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,347 UART: [afmc] --
3,157,347 UART: [cold-reset] --
3,158,237 UART: [state] Locking Datavault
3,159,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,206 UART: [state] Locking ICCM
3,160,736 UART: [exit] Launching FMC @ 0x40000130
3,166,065 UART:
3,166,081 UART: Running Caliptra FMC ...
3,166,489 UART:
3,166,543 UART: [state] CFI Enabled
3,176,840 UART: [fht] FMC Alias Private Key: 7
3,284,249 UART: [art] Extend RT PCRs Done
3,284,677 UART: [art] Lock RT PCRs Done
3,286,337 UART: [art] Populate DV Done
3,294,642 UART: [fht] FMC Alias Private Key: 7
3,295,750 UART: [art] Derive CDI
3,296,030 UART: [art] Store in in slot 0x4
3,381,627 UART: [art] Derive Key Pair
3,381,987 UART: [art] Store priv key in slot 0x5
3,395,311 UART: [art] Derive Key Pair - Done
3,409,972 UART: [art] Signing Cert with AUTHO
3,410,452 UART: RITY.KEYID = 7
3,425,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,297 UART: [art] PUB.X = FDD762A6861D7AF3A3D465BDCCFD6BD3206FA6362AEBE700FDFB50A9395A6ACC17073276F8890A2BA8F474CB906C1C11
3,433,059 UART: [art] PUB.Y = 4F191D1015FCE3A73A39DE9B183746EC9903FBEAFA7F34ACE456AB72A0F9239D269E3F3A881BE2751D3CDD4905811704
3,440,010 UART: [art] SIG.R = 9EF0D7C020ACE08C32E3FB942F5B2EAC93C66BFE76160523CA908C2CCEA299B917AC691211A7A66EC6C25D2BE8AB1D94
3,446,797 UART: [art] SIG.S = 20D93481C77F4E1D566AFC12F95B912AC2FE4923AA4E931A44C7495B6FE754042C2262BD7932CC6B2164AD5EEAC9156F
3,470,519 UART: Caliptra RT
3,470,773 UART: [state] CFI Enabled
3,579,117 UART: [rt] RT listening for mailbox commands...
3,579,787 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,166 UART: [rt]cmd =0x4c4d5356, len=1672
4,140,543 >>> mbox cmd response data (8 bytes)
4,140,544 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,180,737 UART: [rt]cmd =0x4c4d5356, len=1672
4,457,258 >>> mbox cmd response data (8 bytes)
4,457,259 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,497,304 UART: [rt]cmd =0x4c4d5356, len=1672
4,773,693 >>> mbox cmd response data (8 bytes)
4,773,694 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,813,949 UART: [rt]cmd =0x4c4d5356, len=1672
5,085,662 >>> mbox cmd response data (8 bytes)
5,085,663 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,125,834 UART: [rt]cmd =0x4c4d5356, len=1672
5,397,337 >>> mbox cmd response data (8 bytes)
5,397,338 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,437,493 UART: [rt]cmd =0x4c4d5356, len=1672
5,711,589 >>> mbox cmd response data (8 bytes)
5,711,590 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,751,599 UART: [rt]cmd =0x4c4d5356, len=1672
6,022,920 >>> mbox cmd response data (8 bytes)
6,022,921 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,810 UART: [rt]cmd =0x4c4d5356, len=1672
6,337,148 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,877 ready_for_fw is high
1,361,877 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,029 >>> mbox cmd response: success
2,989,039 UART:
2,989,055 UART: Running Caliptra FMC ...
2,989,463 UART:
2,989,517 UART: [state] CFI Enabled
2,999,974 UART: [fht] FMC Alias Private Key: 7
3,107,823 UART: [art] Extend RT PCRs Done
3,108,251 UART: [art] Lock RT PCRs Done
3,109,689 UART: [art] Populate DV Done
3,117,666 UART: [fht] FMC Alias Private Key: 7
3,118,714 UART: [art] Derive CDI
3,118,994 UART: [art] Store in in slot 0x4
3,204,691 UART: [art] Derive Key Pair
3,205,051 UART: [art] Store priv key in slot 0x5
3,218,935 UART: [art] Derive Key Pair - Done
3,233,352 UART: [art] Signing Cert with AUTHO
3,233,832 UART: RITY.KEYID = 7
3,249,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,861 UART: [art] PUB.X = F522D478F666B0DB902D451E9449192DDBEE232BCB97A5F7707BC4EA0E18506D17D4E195AF6E14D17BE78FD1EC0F2215
3,256,637 UART: [art] PUB.Y = 6C568D8AAA5E2A4D1636B548B743717A903FDC7026E641F5E454680813831ADB3288C5DB8E82DDB808347B1C9FD09C94
3,263,583 UART: [art] SIG.R = 60510A9916948D36BF441E1958C5226FE696052FDD28AE9AF2DCAF2388C52CB936438E2B5E7FF484B15FE370CABA664C
3,270,355 UART: [art] SIG.S = C85AAADD3C168330C37FCDFA7444BC9C552F1F20111632F35139276EDDBDD910934F49ACCF95C424669201E3A8B8408D
3,293,991 UART: Caliptra RT
3,294,245 UART: [state] CFI Enabled
3,403,091 UART: [rt] RT listening for mailbox commands...
3,403,761 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,334 UART: [rt]cmd =0x4c4d5356, len=1672
3,964,767 >>> mbox cmd response data (8 bytes)
3,964,768 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,921 UART: [rt]cmd =0x4c4d5356, len=1672
4,281,202 >>> mbox cmd response data (8 bytes)
4,281,203 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,321,350 UART: [rt]cmd =0x4c4d5356, len=1672
4,597,771 >>> mbox cmd response data (8 bytes)
4,597,772 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,637,979 UART: [rt]cmd =0x4c4d5356, len=1672
4,909,560 >>> mbox cmd response data (8 bytes)
4,909,561 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,688 UART: [rt]cmd =0x4c4d5356, len=1672
5,221,327 >>> mbox cmd response data (8 bytes)
5,221,328 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,261,313 UART: [rt]cmd =0x4c4d5356, len=1672
5,535,449 >>> mbox cmd response data (8 bytes)
5,535,450 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,575,677 UART: [rt]cmd =0x4c4d5356, len=1672
5,847,438 >>> mbox cmd response data (8 bytes)
5,847,439 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,442 UART: [rt]cmd =0x4c4d5356, len=1672
6,161,602 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,312 UART: [kat] SHA2-256
882,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,358 UART: [kat] ++
886,510 UART: [kat] sha1
890,618 UART: [kat] SHA2-256
892,556 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,671 UART: [kat] HMAC-384Kdf
907,289 UART: [kat] LMS
1,475,485 UART: [kat] --
1,476,420 UART: [cold-reset] ++
1,476,786 UART: [fht] Storing FHT @ 0x50003400
1,479,587 UART: [idev] ++
1,479,755 UART: [idev] CDI.KEYID = 6
1,480,115 UART: [idev] SUBJECT.KEYID = 7
1,480,539 UART: [idev] UDS.KEYID = 0
1,480,884 ready_for_fw is high
1,480,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,513 UART: [idev] Erasing UDS.KEYID = 0
1,504,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,691 UART: [idev] --
1,514,742 UART: [ldev] ++
1,514,910 UART: [ldev] CDI.KEYID = 6
1,515,273 UART: [ldev] SUBJECT.KEYID = 5
1,515,699 UART: [ldev] AUTHORITY.KEYID = 7
1,516,162 UART: [ldev] FE.KEYID = 1
1,521,634 UART: [ldev] Erasing FE.KEYID = 1
1,546,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,957 UART: [ldev] --
1,586,380 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 114360 bytes
2,885,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,158 >>> mbox cmd response: success
3,079,330 UART: [afmc] ++
3,079,498 UART: [afmc] CDI.KEYID = 6
3,079,860 UART: [afmc] SUBJECT.KEYID = 7
3,080,285 UART: [afmc] AUTHORITY.KEYID = 5
3,115,928 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,196 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,589 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,279 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,106 UART: [afmc] --
3,158,996 UART: [cold-reset] --
3,159,912 UART: [state] Locking Datavault
3,161,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,887 UART: [state] Locking ICCM
3,162,413 UART: [exit] Launching FMC @ 0x40000130
3,167,742 UART:
3,167,758 UART: Running Caliptra FMC ...
3,168,166 UART:
3,168,309 UART: [state] CFI Enabled
3,178,886 UART: [fht] FMC Alias Private Key: 7
3,286,703 UART: [art] Extend RT PCRs Done
3,287,131 UART: [art] Lock RT PCRs Done
3,288,723 UART: [art] Populate DV Done
3,297,152 UART: [fht] FMC Alias Private Key: 7
3,298,150 UART: [art] Derive CDI
3,298,430 UART: [art] Store in in slot 0x4
3,384,403 UART: [art] Derive Key Pair
3,384,763 UART: [art] Store priv key in slot 0x5
3,398,149 UART: [art] Derive Key Pair - Done
3,413,099 UART: [art] Signing Cert with AUTHO
3,413,579 UART: RITY.KEYID = 7
3,428,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,386 UART: [art] PUB.X = 0779A5361E757A42389A5FF95DF8097ED4B5BF19BA62A941EC40F76A53D218AEC429BC49DB2F7301FE254C6E6F65B248
3,436,155 UART: [art] PUB.Y = 5BE5D60DFDCD01D7F6464606048537E19B5F49E5B7FFEE697E1C8D4192DBE2C1A3477F3789263FB515E84CF44B818E1E
3,443,103 UART: [art] SIG.R = 0C870D01EDB7CD7E7F639AC13581E220BC08E3C497A0509EAC125D0BE46C604FF94295184B28B788F85E71F9CF10FB43
3,449,866 UART: [art] SIG.S = EE0CBA9AFFD9F66224FA53B315714010C82ADE4BDE463774325E5FE2A7691DF9D8B309F1848F312C3354ECE27A702CB5
3,473,167 UART: Caliptra RT
3,473,513 UART: [state] CFI Enabled
3,582,883 UART: [rt] RT listening for mailbox commands...
3,583,553 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,694 UART: [rt]cmd =0x4c4d5356, len=1672
4,143,943 >>> mbox cmd response data (8 bytes)
4,143,944 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,184,297 UART: [rt]cmd =0x4c4d5356, len=1672
4,460,748 >>> mbox cmd response data (8 bytes)
4,460,749 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,804 UART: [rt]cmd =0x4c4d5356, len=1672
4,777,527 >>> mbox cmd response data (8 bytes)
4,777,528 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,817,827 UART: [rt]cmd =0x4c4d5356, len=1672
5,089,326 >>> mbox cmd response data (8 bytes)
5,089,327 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,129,520 UART: [rt]cmd =0x4c4d5356, len=1672
5,401,193 >>> mbox cmd response data (8 bytes)
5,401,194 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,441,171 UART: [rt]cmd =0x4c4d5356, len=1672
5,715,459 >>> mbox cmd response data (8 bytes)
5,715,460 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,675 UART: [rt]cmd =0x4c4d5356, len=1672
6,027,260 >>> mbox cmd response data (8 bytes)
6,027,261 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,067,526 UART: [rt]cmd =0x4c4d5356, len=1672
6,341,532 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,138 ready_for_fw is high
1,363,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,378 >>> mbox cmd response: success
2,990,886 UART:
2,990,902 UART: Running Caliptra FMC ...
2,991,310 UART:
2,991,453 UART: [state] CFI Enabled
3,001,940 UART: [fht] FMC Alias Private Key: 7
3,109,813 UART: [art] Extend RT PCRs Done
3,110,241 UART: [art] Lock RT PCRs Done
3,111,807 UART: [art] Populate DV Done
3,120,060 UART: [fht] FMC Alias Private Key: 7
3,121,066 UART: [art] Derive CDI
3,121,346 UART: [art] Store in in slot 0x4
3,207,187 UART: [art] Derive Key Pair
3,207,547 UART: [art] Store priv key in slot 0x5
3,220,567 UART: [art] Derive Key Pair - Done
3,235,657 UART: [art] Signing Cert with AUTHO
3,236,137 UART: RITY.KEYID = 7
3,251,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,938 UART: [art] PUB.X = 5ED1C06A938E3A79CEBAEA854BC73F476F9B5828C1C60A45A8112D999B12D5D7D0F0D5C4E0A3782363A29CEA44881F58
3,258,715 UART: [art] PUB.Y = 6260DDAA2EC8DD24E019832A03C1BC94E89CA687BE9795E20C963585BFE7D0E77DD41876A6975339A720F5345918EB74
3,265,661 UART: [art] SIG.R = 2CF84062006060A5847C80FAFEF7F0BDC49290073BC459A47A7DE9A4B19A5ED87F9F631833491A3AB9C1B1072BF6209F
3,272,409 UART: [art] SIG.S = D4405C929B50F18004CA425AE20174BA571B706B1D1700194D1ADC03DF1771357D2024234C8919327F0BFB7BBC1F72B4
3,296,160 UART: Caliptra RT
3,296,506 UART: [state] CFI Enabled
3,405,484 UART: [rt] RT listening for mailbox commands...
3,406,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,763 UART: [rt]cmd =0x4c4d5356, len=1672
3,967,018 >>> mbox cmd response data (8 bytes)
3,967,019 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,504 UART: [rt]cmd =0x4c4d5356, len=1672
4,284,383 >>> mbox cmd response data (8 bytes)
4,284,384 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,324,549 UART: [rt]cmd =0x4c4d5356, len=1672
4,601,144 >>> mbox cmd response data (8 bytes)
4,601,145 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,472 UART: [rt]cmd =0x4c4d5356, len=1672
4,913,221 >>> mbox cmd response data (8 bytes)
4,913,222 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,523 UART: [rt]cmd =0x4c4d5356, len=1672
5,225,342 >>> mbox cmd response data (8 bytes)
5,225,343 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,265,576 UART: [rt]cmd =0x4c4d5356, len=1672
5,539,818 >>> mbox cmd response data (8 bytes)
5,539,819 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,254 UART: [rt]cmd =0x4c4d5356, len=1672
5,852,043 >>> mbox cmd response data (8 bytes)
5,852,044 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,892,101 UART: [rt]cmd =0x4c4d5356, len=1672
6,166,195 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
918,444 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,043 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 ready_for_fw is high
1,176,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,819 UART: [idev] Sha1 KeyId Algorithm
1,209,273 UART: [idev] --
1,210,439 UART: [ldev] ++
1,210,607 UART: [ldev] CDI.KEYID = 6
1,210,970 UART: [ldev] SUBJECT.KEYID = 5
1,211,396 UART: [ldev] AUTHORITY.KEYID = 7
1,211,859 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,760 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,304 >>> mbox cmd response: success
2,774,326 UART: [afmc] ++
2,774,494 UART: [afmc] CDI.KEYID = 6
2,774,856 UART: [afmc] SUBJECT.KEYID = 7
2,775,281 UART: [afmc] AUTHORITY.KEYID = 5
2,810,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,955 UART: [afmc] --
2,853,995 UART: [cold-reset] --
2,855,071 UART: [state] Locking Datavault
2,856,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,770 UART: [state] Locking ICCM
2,857,332 UART: [exit] Launching FMC @ 0x40000130
2,862,661 UART:
2,862,677 UART: Running Caliptra FMC ...
2,863,085 UART:
2,863,139 UART: [state] CFI Enabled
2,873,430 UART: [fht] FMC Alias Private Key: 7
2,981,083 UART: [art] Extend RT PCRs Done
2,981,511 UART: [art] Lock RT PCRs Done
2,983,023 UART: [art] Populate DV Done
2,991,414 UART: [fht] FMC Alias Private Key: 7
2,992,408 UART: [art] Derive CDI
2,992,688 UART: [art] Store in in slot 0x4
3,078,167 UART: [art] Derive Key Pair
3,078,527 UART: [art] Store priv key in slot 0x5
3,092,153 UART: [art] Derive Key Pair - Done
3,107,106 UART: [art] Signing Cert with AUTHO
3,107,586 UART: RITY.KEYID = 7
3,122,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,401 UART: [art] PUB.X = D94C290A4986193CC779AD31948FE19D555B7C6865818DC6874C6ACA9075F16725FAE4C327C1C9F3CF01059E98278129
3,130,158 UART: [art] PUB.Y = 29ED07488244EF22E5E36C6E8B428FC5D25D88D7FB9E78493BBCF4206E808E7F823FB6FC18190DA094627434CEBB8E04
3,137,107 UART: [art] SIG.R = 883E94DAD4B574A20BA340BA31493F0CF24657BCC8ECB8BD8CED068F5E339A245E28191D20426EA596E4160BEE8293FC
3,143,877 UART: [art] SIG.S = 427CAD5DA2F00F818634C61A86D13593400E12DCEFAB764525E93D52E50EFB3D38A0E763BD6E0D7767575C98A940631E
3,167,778 UART: Caliptra RT
3,168,032 UART: [state] CFI Enabled
3,275,360 UART: [rt] RT listening for mailbox commands...
3,276,030 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,435 UART: [rt]cmd =0x4c4d5356, len=1672
3,836,890 >>> mbox cmd response data (8 bytes)
3,836,891 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,044 UART: [rt]cmd =0x4c4d5356, len=1672
4,153,435 >>> mbox cmd response data (8 bytes)
4,153,436 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,703 UART: [rt]cmd =0x4c4d5356, len=1672
4,470,142 >>> mbox cmd response data (8 bytes)
4,470,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,510,424 UART: [rt]cmd =0x4c4d5356, len=1672
4,781,975 >>> mbox cmd response data (8 bytes)
4,781,976 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,822,203 UART: [rt]cmd =0x4c4d5356, len=1672
5,094,080 >>> mbox cmd response data (8 bytes)
5,094,081 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,134,392 UART: [rt]cmd =0x4c4d5356, len=1672
5,408,572 >>> mbox cmd response data (8 bytes)
5,408,573 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,448,534 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,217 >>> mbox cmd response data (8 bytes)
5,720,218 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,455 UART: [rt]cmd =0x4c4d5356, len=1672
6,034,441 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 ready_for_fw is high
1,060,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,519 >>> mbox cmd response: success
2,688,881 UART:
2,688,897 UART: Running Caliptra FMC ...
2,689,305 UART:
2,689,359 UART: [state] CFI Enabled
2,699,692 UART: [fht] FMC Alias Private Key: 7
2,807,405 UART: [art] Extend RT PCRs Done
2,807,833 UART: [art] Lock RT PCRs Done
2,809,271 UART: [art] Populate DV Done
2,817,806 UART: [fht] FMC Alias Private Key: 7
2,818,758 UART: [art] Derive CDI
2,819,038 UART: [art] Store in in slot 0x4
2,904,259 UART: [art] Derive Key Pair
2,904,619 UART: [art] Store priv key in slot 0x5
2,917,955 UART: [art] Derive Key Pair - Done
2,932,531 UART: [art] Signing Cert with AUTHO
2,933,011 UART: RITY.KEYID = 7
2,948,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,888 UART: [art] PUB.X = 71839DFA359854AEF343C9417F4ED3BBBE4BB607ECE2D149F128497D516FDF8BA416AEA9A7E85820F460F4B7EBFFA2A0
2,955,675 UART: [art] PUB.Y = FE327326C003B1225D9D601221B47578E74F85AABA4934CCDB699C5FC7BE867DEB817C0F008B9DF96DFB35FE7FED2DFD
2,962,617 UART: [art] SIG.R = EA05712BC5095673087260D5B3CA0F5BC828C701B7D02FB6AADA771E866B6CAFE39AEE6519E1A168A0C062A7F0C5FFC9
2,969,388 UART: [art] SIG.S = E95122B997C0D93A68A73D6FF185FC908E9A3ECA7C3FB4A3EC7C0AF2533F9F9DD94ECF126FD49349933C8CC3B713616F
2,992,616 UART: Caliptra RT
2,992,870 UART: [state] CFI Enabled
3,100,071 UART: [rt] RT listening for mailbox commands...
3,100,741 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,090 UART: [rt]cmd =0x4c4d5356, len=1672
3,661,733 >>> mbox cmd response data (8 bytes)
3,661,734 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,965 UART: [rt]cmd =0x4c4d5356, len=1672
3,978,556 >>> mbox cmd response data (8 bytes)
3,978,557 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,576 UART: [rt]cmd =0x4c4d5356, len=1672
4,295,043 >>> mbox cmd response data (8 bytes)
4,295,044 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,315 UART: [rt]cmd =0x4c4d5356, len=1672
4,606,804 >>> mbox cmd response data (8 bytes)
4,606,805 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,880 UART: [rt]cmd =0x4c4d5356, len=1672
4,918,581 >>> mbox cmd response data (8 bytes)
4,918,582 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,958,701 UART: [rt]cmd =0x4c4d5356, len=1672
5,232,889 >>> mbox cmd response data (8 bytes)
5,232,890 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,273,293 UART: [rt]cmd =0x4c4d5356, len=1672
5,544,954 >>> mbox cmd response data (8 bytes)
5,544,955 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,585,244 UART: [rt]cmd =0x4c4d5356, len=1672
5,859,410 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
922,933 UART: [kat] LMS
1,171,261 UART: [kat] --
1,172,240 UART: [cold-reset] ++
1,172,708 UART: [fht] FHT @ 0x50003400
1,175,493 UART: [idev] ++
1,175,661 UART: [idev] CDI.KEYID = 6
1,176,021 UART: [idev] SUBJECT.KEYID = 7
1,176,445 UART: [idev] UDS.KEYID = 0
1,176,790 ready_for_fw is high
1,176,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,785 UART: [idev] Erasing UDS.KEYID = 0
1,202,608 UART: [idev] Sha1 KeyId Algorithm
1,211,036 UART: [idev] --
1,212,040 UART: [ldev] ++
1,212,208 UART: [ldev] CDI.KEYID = 6
1,212,571 UART: [ldev] SUBJECT.KEYID = 5
1,212,997 UART: [ldev] AUTHORITY.KEYID = 7
1,213,460 UART: [ldev] FE.KEYID = 1
1,218,704 UART: [ldev] Erasing FE.KEYID = 1
1,245,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,174 UART: [ldev] --
1,284,683 UART: [fwproc] Wait for Commands...
1,285,421 UART: [fwproc] Recv command 0x46574c44
1,286,149 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,731 >>> mbox cmd response: success
2,776,743 UART: [afmc] ++
2,776,911 UART: [afmc] CDI.KEYID = 6
2,777,273 UART: [afmc] SUBJECT.KEYID = 7
2,777,698 UART: [afmc] AUTHORITY.KEYID = 5
2,813,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,760 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,488 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,964 UART: [afmc] --
2,857,088 UART: [cold-reset] --
2,857,936 UART: [state] Locking Datavault
2,858,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,557 UART: [state] Locking ICCM
2,860,079 UART: [exit] Launching FMC @ 0x40000130
2,865,408 UART:
2,865,424 UART: Running Caliptra FMC ...
2,865,832 UART:
2,865,975 UART: [state] CFI Enabled
2,876,488 UART: [fht] FMC Alias Private Key: 7
2,984,481 UART: [art] Extend RT PCRs Done
2,984,909 UART: [art] Lock RT PCRs Done
2,986,419 UART: [art] Populate DV Done
2,994,522 UART: [fht] FMC Alias Private Key: 7
2,995,500 UART: [art] Derive CDI
2,995,780 UART: [art] Store in in slot 0x4
3,081,565 UART: [art] Derive Key Pair
3,081,925 UART: [art] Store priv key in slot 0x5
3,095,627 UART: [art] Derive Key Pair - Done
3,110,546 UART: [art] Signing Cert with AUTHO
3,111,026 UART: RITY.KEYID = 7
3,126,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,791 UART: [art] PUB.X = 07330841EE8284A10126A54C010CC9F0362714636B3017C5141880D4EFB8E2D1E33353BFF79D3398728A5AD8EECEDF3F
3,133,546 UART: [art] PUB.Y = F9B60088B27E88D45737DC6B9C019633EF49566A5301DA87C93BE98BA7FE1762AFC5448628E1AFA20C2F881BE04B660E
3,140,468 UART: [art] SIG.R = DE5507E45B94B4FE48D73DDF4E64655C82F7404F6058C295F8BD90AE78E2C22F0C1CB58ECB3E30463A587B6DAECE8EEF
3,147,252 UART: [art] SIG.S = 57DBC77C8BA03DD13DE94D9AB668578216508CA14B47440A3E1C480E0C1E53C7333480B3F8B97FC511D7E9DD48099559
3,171,317 UART: Caliptra RT
3,171,663 UART: [state] CFI Enabled
3,279,623 UART: [rt] RT listening for mailbox commands...
3,280,293 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,488 UART: [rt]cmd =0x4c4d5356, len=1672
3,840,843 >>> mbox cmd response data (8 bytes)
3,840,844 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,805 UART: [rt]cmd =0x4c4d5356, len=1672
4,157,430 >>> mbox cmd response data (8 bytes)
4,157,431 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,598 UART: [rt]cmd =0x4c4d5356, len=1672
4,474,101 >>> mbox cmd response data (8 bytes)
4,474,102 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,514,461 UART: [rt]cmd =0x4c4d5356, len=1672
4,786,130 >>> mbox cmd response data (8 bytes)
4,786,131 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,826,114 UART: [rt]cmd =0x4c4d5356, len=1672
5,097,689 >>> mbox cmd response data (8 bytes)
5,097,690 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,137,789 UART: [rt]cmd =0x4c4d5356, len=1672
5,411,879 >>> mbox cmd response data (8 bytes)
5,411,880 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,451,871 UART: [rt]cmd =0x4c4d5356, len=1672
5,723,344 >>> mbox cmd response data (8 bytes)
5,723,345 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,384 UART: [rt]cmd =0x4c4d5356, len=1672
6,037,554 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 ready_for_fw is high
1,060,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,488 >>> mbox cmd response: success
2,690,020 UART:
2,690,036 UART: Running Caliptra FMC ...
2,690,444 UART:
2,690,587 UART: [state] CFI Enabled
2,701,288 UART: [fht] FMC Alias Private Key: 7
2,809,149 UART: [art] Extend RT PCRs Done
2,809,577 UART: [art] Lock RT PCRs Done
2,811,201 UART: [art] Populate DV Done
2,819,374 UART: [fht] FMC Alias Private Key: 7
2,820,526 UART: [art] Derive CDI
2,820,806 UART: [art] Store in in slot 0x4
2,906,601 UART: [art] Derive Key Pair
2,906,961 UART: [art] Store priv key in slot 0x5
2,920,067 UART: [art] Derive Key Pair - Done
2,934,836 UART: [art] Signing Cert with AUTHO
2,935,316 UART: RITY.KEYID = 7
2,950,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,967 UART: [art] PUB.X = 3D56B253C876F5222AF1BD123361799CC650B38CBCE630BE3BBE85F710542F9B955C74B284150A41B7212FBFADBAE761
2,957,742 UART: [art] PUB.Y = EFECF1F945F86F9910ED97A6C21488655E07759C8A9E45B7BA54B2497C32C6244F2D6EF1AEB59BBA8A3B713C143BDD46
2,964,703 UART: [art] SIG.R = A8D887F7AADA1AFECC2A95542B61614AA61A5EAAD4C9FF174B7F89C84E83A931C13D39067BD13924B39CDE8ABC18318D
2,971,490 UART: [art] SIG.S = 8EAAE9E16E0734EA0A31C728A9A132DF04197E18CB227CB18B815E34742EFB083CA15A3B48B77CA22C36E621F4B0FB22
2,995,617 UART: Caliptra RT
2,995,963 UART: [state] CFI Enabled
3,103,342 UART: [rt] RT listening for mailbox commands...
3,104,012 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,279 UART: [rt]cmd =0x4c4d5356, len=1672
3,664,806 >>> mbox cmd response data (8 bytes)
3,664,807 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,724 UART: [rt]cmd =0x4c4d5356, len=1672
3,981,239 >>> mbox cmd response data (8 bytes)
3,981,240 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,307 UART: [rt]cmd =0x4c4d5356, len=1672
4,298,028 >>> mbox cmd response data (8 bytes)
4,298,029 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,338,288 UART: [rt]cmd =0x4c4d5356, len=1672
4,609,747 >>> mbox cmd response data (8 bytes)
4,609,748 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,649,893 UART: [rt]cmd =0x4c4d5356, len=1672
4,921,566 >>> mbox cmd response data (8 bytes)
4,921,567 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,961,768 UART: [rt]cmd =0x4c4d5356, len=1672
5,235,722 >>> mbox cmd response data (8 bytes)
5,235,723 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,276,124 UART: [rt]cmd =0x4c4d5356, len=1672
5,547,639 >>> mbox cmd response data (8 bytes)
5,547,640 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,817 UART: [rt]cmd =0x4c4d5356, len=1672
5,861,847 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,121 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,174,593 ready_for_fw is high
1,174,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,615 UART: [idev] Sha1 KeyId Algorithm
1,208,469 UART: [idev] --
1,209,352 UART: [ldev] ++
1,209,520 UART: [ldev] CDI.KEYID = 6
1,209,884 UART: [ldev] SUBJECT.KEYID = 5
1,210,311 UART: [ldev] AUTHORITY.KEYID = 7
1,210,774 UART: [ldev] FE.KEYID = 1
1,215,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,648 UART: [ldev] --
1,281,120 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,672 >>> mbox cmd response: success
2,773,755 UART: [afmc] ++
2,773,923 UART: [afmc] CDI.KEYID = 6
2,774,286 UART: [afmc] SUBJECT.KEYID = 7
2,774,712 UART: [afmc] AUTHORITY.KEYID = 5
2,810,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,052 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,383 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,236 UART: [afmc] --
2,854,246 UART: [cold-reset] --
2,854,952 UART: [state] Locking Datavault
2,856,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,675 UART: [state] Locking ICCM
2,857,177 UART: [exit] Launching FMC @ 0x40000130
2,862,506 UART:
2,862,522 UART: Running Caliptra FMC ...
2,862,930 UART:
2,862,984 UART: [state] CFI Enabled
2,873,673 UART: [fht] FMC Alias Private Key: 7
2,981,520 UART: [art] Extend RT PCRs Done
2,981,948 UART: [art] Lock RT PCRs Done
2,983,278 UART: [art] Populate DV Done
2,991,697 UART: [fht] FMC Alias Private Key: 7
2,992,753 UART: [art] Derive CDI
2,993,033 UART: [art] Store in in slot 0x4
3,078,830 UART: [art] Derive Key Pair
3,079,190 UART: [art] Store priv key in slot 0x5
3,092,852 UART: [art] Derive Key Pair - Done
3,107,298 UART: [art] Signing Cert with AUTHO
3,107,778 UART: RITY.KEYID = 7
3,123,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,035 UART: [art] PUB.X = E01EFB28D5B635E11562D4E62A36DC83C27A1CA3BAA566B4A8169D4316F4486F7A5BF18B0AB2709F6AD1D71EFB77EAB1
3,130,820 UART: [art] PUB.Y = 7A4CBB8F5A2DDCBF4875EB929ED4E7FCFA14C039FC5AF9DD9E61D54D1FFBC3A013E4E397C186F7B7BC09D7F4AB5D83E4
3,137,801 UART: [art] SIG.R = 8ADAF17D57DF9226488915836D59A0C564F10D13F14C91E905A5BECB86967871A6863EC3FFC65FCE9BBD00CC6D91BE22
3,144,555 UART: [art] SIG.S = 2D9E27713592A6B495180DA2F636FDE960732A8765DEFA44280A23A864541F28F24D9E53F4EB72FB048DAA0AE98BF601
3,168,041 UART: Caliptra RT
3,168,295 UART: [state] CFI Enabled
3,276,363 UART: [rt] RT listening for mailbox commands...
3,277,033 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,552 UART: [rt]cmd =0x4c4d5356, len=1672
3,837,963 >>> mbox cmd response data (8 bytes)
3,837,964 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,921 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,484 >>> mbox cmd response data (8 bytes)
4,154,485 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,002 UART: [rt]cmd =0x4c4d5356, len=1672
4,471,583 >>> mbox cmd response data (8 bytes)
4,471,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,511,733 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,360 >>> mbox cmd response data (8 bytes)
4,783,361 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,823,388 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,117 >>> mbox cmd response data (8 bytes)
5,095,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,469 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,609 >>> mbox cmd response data (8 bytes)
5,409,610 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,869 UART: [rt]cmd =0x4c4d5356, len=1672
5,721,658 >>> mbox cmd response data (8 bytes)
5,721,659 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,806 UART: [rt]cmd =0x4c4d5356, len=1672
6,036,076 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,944 ready_for_fw is high
1,055,944 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,310 >>> mbox cmd response: success
2,685,504 UART:
2,685,520 UART: Running Caliptra FMC ...
2,685,928 UART:
2,685,982 UART: [state] CFI Enabled
2,696,205 UART: [fht] FMC Alias Private Key: 7
2,803,840 UART: [art] Extend RT PCRs Done
2,804,268 UART: [art] Lock RT PCRs Done
2,805,570 UART: [art] Populate DV Done
2,813,727 UART: [fht] FMC Alias Private Key: 7
2,814,813 UART: [art] Derive CDI
2,815,093 UART: [art] Store in in slot 0x4
2,900,836 UART: [art] Derive Key Pair
2,901,196 UART: [art] Store priv key in slot 0x5
2,914,592 UART: [art] Derive Key Pair - Done
2,929,337 UART: [art] Signing Cert with AUTHO
2,929,817 UART: RITY.KEYID = 7
2,944,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,672 UART: [art] PUB.X = 462DB72C5E735A49BA4914A65838F848E7F39DEEFF1054C15CA3CBAA49393E782425F17E44E4B3B82DD8880DC0DF7478
2,952,447 UART: [art] PUB.Y = 2B0D251C96F679FB716B144A47E35C2C5A97F07EE13806766F19E57EA51B2F6FEF1A42C62F4957F0FA5E7EF5808BB076
2,959,399 UART: [art] SIG.R = 0EC76B3F6445C445CFFAC4670D032DDA0CC2B08EAB0022506045C9467E4DAB326B3073055A7BB82A718ED3DB1D9B3B28
2,966,144 UART: [art] SIG.S = 675440819B2082D71143449739E185FB73D8349CB32A9DB2D7F27C40998D73BA5F0FC849055AE271556299F54F9BB883
2,990,079 UART: Caliptra RT
2,990,333 UART: [state] CFI Enabled
3,098,201 UART: [rt] RT listening for mailbox commands...
3,098,871 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,072 UART: [rt]cmd =0x4c4d5356, len=1672
3,659,289 >>> mbox cmd response data (8 bytes)
3,659,290 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,333 UART: [rt]cmd =0x4c4d5356, len=1672
3,976,054 >>> mbox cmd response data (8 bytes)
3,976,055 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,208 UART: [rt]cmd =0x4c4d5356, len=1672
4,292,587 >>> mbox cmd response data (8 bytes)
4,292,588 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,332,851 UART: [rt]cmd =0x4c4d5356, len=1672
4,604,538 >>> mbox cmd response data (8 bytes)
4,604,539 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,644,840 UART: [rt]cmd =0x4c4d5356, len=1672
4,916,503 >>> mbox cmd response data (8 bytes)
4,916,504 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,956,857 UART: [rt]cmd =0x4c4d5356, len=1672
5,230,737 >>> mbox cmd response data (8 bytes)
5,230,738 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,270,737 UART: [rt]cmd =0x4c4d5356, len=1672
5,542,196 >>> mbox cmd response data (8 bytes)
5,542,197 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,454 UART: [rt]cmd =0x4c4d5356, len=1672
5,856,550 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,378 UART: [idev] ++
1,173,546 UART: [idev] CDI.KEYID = 6
1,173,907 UART: [idev] SUBJECT.KEYID = 7
1,174,332 UART: [idev] UDS.KEYID = 0
1,174,678 ready_for_fw is high
1,174,678 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,841 UART: [fwproc] Wait for Commands...
1,282,552 UART: [fwproc] Recv command 0x46574c44
1,283,285 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,217 >>> mbox cmd response: success
2,774,460 UART: [afmc] ++
2,774,628 UART: [afmc] CDI.KEYID = 6
2,774,991 UART: [afmc] SUBJECT.KEYID = 7
2,775,417 UART: [afmc] AUTHORITY.KEYID = 5
2,811,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,761 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,480 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,183 UART: [afmc] --
2,854,263 UART: [cold-reset] --
2,855,021 UART: [state] Locking Datavault
2,856,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,752 UART: [state] Locking ICCM
2,857,338 UART: [exit] Launching FMC @ 0x40000130
2,862,667 UART:
2,862,683 UART: Running Caliptra FMC ...
2,863,091 UART:
2,863,234 UART: [state] CFI Enabled
2,873,729 UART: [fht] FMC Alias Private Key: 7
2,981,626 UART: [art] Extend RT PCRs Done
2,982,054 UART: [art] Lock RT PCRs Done
2,983,772 UART: [art] Populate DV Done
2,991,967 UART: [fht] FMC Alias Private Key: 7
2,993,023 UART: [art] Derive CDI
2,993,303 UART: [art] Store in in slot 0x4
3,079,000 UART: [art] Derive Key Pair
3,079,360 UART: [art] Store priv key in slot 0x5
3,093,056 UART: [art] Derive Key Pair - Done
3,107,843 UART: [art] Signing Cert with AUTHO
3,108,323 UART: RITY.KEYID = 7
3,123,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,996 UART: [art] PUB.X = B39DFAA87E109A2E2A1D7DB6E21B2A270E30CDECB7F4EA26A97CFEA2B2655D75761E8C979215EA4FD21640CD7CE31BF2
3,130,787 UART: [art] PUB.Y = 0E87E152A4FBF6F58EC5E384FC4DE805BA39C61F512960321B8BEDE860E0AB45A87E1CAE0504E7B8D7E8A9FE6B8B9558
3,137,743 UART: [art] SIG.R = 514683A0B3033728DCED7F095488C9389C68CA76A7927F24A9F328D3101E86D8D2F12E7F84F79CA2A5C1BDC9558CF587
3,144,509 UART: [art] SIG.S = 34DE07428DBF796466D771CA4724D67B730BB8E949616C8C7E88DC91EE8378BDDF6A64D16FFD3C2152FA205C1D6CF6BF
3,168,922 UART: Caliptra RT
3,169,268 UART: [state] CFI Enabled
3,276,896 UART: [rt] RT listening for mailbox commands...
3,277,566 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,803 UART: [rt]cmd =0x4c4d5356, len=1672
3,838,102 >>> mbox cmd response data (8 bytes)
3,838,103 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,184 UART: [rt]cmd =0x4c4d5356, len=1672
4,154,609 >>> mbox cmd response data (8 bytes)
4,154,610 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,937 UART: [rt]cmd =0x4c4d5356, len=1672
4,471,268 >>> mbox cmd response data (8 bytes)
4,471,269 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,511,724 UART: [rt]cmd =0x4c4d5356, len=1672
4,783,331 >>> mbox cmd response data (8 bytes)
4,783,332 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,823,573 UART: [rt]cmd =0x4c4d5356, len=1672
5,095,182 >>> mbox cmd response data (8 bytes)
5,095,183 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,135,498 UART: [rt]cmd =0x4c4d5356, len=1672
5,409,668 >>> mbox cmd response data (8 bytes)
5,409,669 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,449,942 UART: [rt]cmd =0x4c4d5356, len=1672
5,721,721 >>> mbox cmd response data (8 bytes)
5,721,722 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,805 UART: [rt]cmd =0x4c4d5356, len=1672
6,036,257 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,305 ready_for_fw is high
1,056,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,125 >>> mbox cmd response: success
2,685,845 UART:
2,685,861 UART: Running Caliptra FMC ...
2,686,269 UART:
2,686,412 UART: [state] CFI Enabled
2,697,209 UART: [fht] FMC Alias Private Key: 7
2,805,224 UART: [art] Extend RT PCRs Done
2,805,652 UART: [art] Lock RT PCRs Done
2,807,090 UART: [art] Populate DV Done
2,814,971 UART: [fht] FMC Alias Private Key: 7
2,816,097 UART: [art] Derive CDI
2,816,377 UART: [art] Store in in slot 0x4
2,902,290 UART: [art] Derive Key Pair
2,902,650 UART: [art] Store priv key in slot 0x5
2,916,088 UART: [art] Derive Key Pair - Done
2,930,931 UART: [art] Signing Cert with AUTHO
2,931,411 UART: RITY.KEYID = 7
2,947,115 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,880 UART: [art] PUB.X = C242545DCCB32B5CDA1A51BE52E12B1BE1722453DF9B2E8768498BA157CD6BAF70BFC83186877E93C095AAEE00E4AF0D
2,954,643 UART: [art] PUB.Y = F0DF9F49873CC1151B1EE146330EC03F7BE7BC5B1E134FB9C4574C53EB2E97504DEBD213A6B819E1F82E29A23BAAB738
2,961,606 UART: [art] SIG.R = 145B24D4AF5FECFFF76A6CBE7FCA93F9C4E8B12FDA8F7EC339CB7560CC219AEF29E4B897F2B9299D7378CC7C36235A79
2,968,400 UART: [art] SIG.S = 6252063D81A719308E586CB25EAA47EA57AD56C945E8095B77E53FE02F0821FC1EA1B529D7BBE0F1C8008229F23A882C
2,991,944 UART: Caliptra RT
2,992,290 UART: [state] CFI Enabled
3,100,076 UART: [rt] RT listening for mailbox commands...
3,100,746 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,059 UART: [rt]cmd =0x4c4d5356, len=1672
3,661,796 >>> mbox cmd response data (8 bytes)
3,661,797 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,812 UART: [rt]cmd =0x4c4d5356, len=1672
3,978,255 >>> mbox cmd response data (8 bytes)
3,978,256 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,561 UART: [rt]cmd =0x4c4d5356, len=1672
4,295,248 >>> mbox cmd response data (8 bytes)
4,295,249 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,476 UART: [rt]cmd =0x4c4d5356, len=1672
4,606,831 >>> mbox cmd response data (8 bytes)
4,606,832 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,905 UART: [rt]cmd =0x4c4d5356, len=1672
4,918,580 >>> mbox cmd response data (8 bytes)
4,918,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,958,634 UART: [rt]cmd =0x4c4d5356, len=1672
5,232,992 >>> mbox cmd response data (8 bytes)
5,232,993 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,273,132 UART: [rt]cmd =0x4c4d5356, len=1672
5,544,845 >>> mbox cmd response data (8 bytes)
5,544,846 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,927 UART: [rt]cmd =0x4c4d5356, len=1672
5,859,149 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
192,573 UART:
192,939 UART: Running Caliptra ROM ...
194,131 UART:
194,284 UART: [state] CFI Enabled
268,670 UART: [state] LifecycleState = Unprovisioned
270,660 UART: [state] DebugLocked = No
272,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,431 UART: [kat] SHA2-256
447,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,647 UART: [kat] ++
458,170 UART: [kat] sha1
469,546 UART: [kat] SHA2-256
472,264 UART: [kat] SHA2-384
477,533 UART: [kat] SHA2-512-ACC
479,906 UART: [kat] ECC-384
2,768,694 UART: [kat] HMAC-384Kdf
2,793,806 UART: [kat] LMS
3,984,056 UART: [kat] --
3,990,770 UART: [cold-reset] ++
3,993,083 UART: [fht] Storing FHT @ 0x50003400
4,005,166 UART: [idev] ++
4,005,802 UART: [idev] CDI.KEYID = 6
4,006,702 UART: [idev] SUBJECT.KEYID = 7
4,007,941 UART: [idev] UDS.KEYID = 0
4,008,907 ready_for_fw is high
4,009,098 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,152,369 UART: [idev] Erasing UDS.KEYID = 0
7,339,120 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,588 UART: [idev] --
7,365,794 UART: [ldev] ++
7,366,365 UART: [ldev] CDI.KEYID = 6
7,367,325 UART: [ldev] SUBJECT.KEYID = 5
7,368,534 UART: [ldev] AUTHORITY.KEYID = 7
7,369,809 UART: [ldev] FE.KEYID = 1
7,416,851 UART: [ldev] Erasing FE.KEYID = 1
10,748,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,449 UART: [ldev] --
13,129,311 UART: [fwproc] Waiting for Commands...
13,131,291 UART: [fwproc] Received command 0x46574c44
13,133,462 UART: [fwproc] Received Image of size 114036 bytes
17,191,710 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,649,005 >>> mbox cmd response: success
17,653,774 UART: [afmc] ++
17,654,367 UART: [afmc] CDI.KEYID = 6
17,655,271 UART: [afmc] SUBJECT.KEYID = 7
17,656,532 UART: [afmc] AUTHORITY.KEYID = 5
21,021,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,322,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,192 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,576 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,396 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,368,849 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,389,853 UART: [afmc] --
23,394,526 UART: [cold-reset] --
23,396,921 UART: [state] Locking Datavault
23,402,594 UART: [state] Locking PCR0, PCR1 and PCR31
23,404,343 UART: [state] Locking ICCM
23,405,404 UART: [exit] Launching FMC @ 0x40000130
23,413,795 UART:
23,414,029 UART: Running Caliptra FMC ...
23,415,125 UART:
23,415,282 UART: [state] CFI Enabled
23,482,572 UART: [fht] FMC Alias Private Key: 7
25,820,528 UART: [art] Extend RT PCRs Done
25,821,862 UART: [art] Lock RT PCRs Done
25,823,622 UART: [art] Populate DV Done
25,829,193 UART: [fht] FMC Alias Private Key: 7
25,830,886 UART: [art] Derive CDI
25,831,615 UART: [art] Store in in slot 0x4
25,891,406 UART: [art] Derive Key Pair
25,892,414 UART: [art] Store priv key in slot 0x5
29,185,695 UART: [art] Derive Key Pair - Done
29,198,529 UART: [art] Signing Cert with AUTHO
29,199,866 UART: RITY.KEYID = 7
31,487,640 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,144 UART: [art] PUB.X = 792FD40F1B548CFAB0A3D669AC6D3E625496CD3F6D7CE423716E3775151D36B2383EEA5ECBF7D0985881B513101CA425
31,496,353 UART: [art] PUB.Y = 7F4C28C8DAE6867F191F05B86BA012CB13025CA461D21BB4DE0FEDDBAC1149B3CDA024068ACF29C1E6F27CA29921A099
31,503,656 UART: [art] SIG.R = E4C0595AA7211A0B45381F000F2EC81C40ACAB290DF98E38B1FB009B9855FDF050F4ECECE4642E0B021E1A0258346703
31,511,028 UART: [art] SIG.S = EEECB6911622067CD06B7490253D2872C39782AC96D2D953C731F81FAEE699498CFD5332834A408BB2C8C0332F51216C
32,816,527 UART: Caliptra RT
32,817,244 UART: [state] CFI Enabled
32,978,139 UART: [rt] RT listening for mailbox commands...
32,982,170 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,026,583 UART: [rt]cmd =0x4c4d5356, len=1672
34,279,293 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,784,714 ready_for_fw is high
3,785,089 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,827,655 >>> mbox cmd response: success
23,528,099 UART:
23,528,511 UART: Running Caliptra FMC ...
23,529,629 UART:
23,529,782 UART: [state] CFI Enabled
23,599,185 UART: [fht] FMC Alias Private Key: 7
25,936,838 UART: [art] Extend RT PCRs Done
25,938,065 UART: [art] Lock RT PCRs Done
25,940,041 UART: [art] Populate DV Done
25,945,396 UART: [fht] FMC Alias Private Key: 7
25,947,048 UART: [art] Derive CDI
25,947,786 UART: [art] Store in in slot 0x4
26,007,938 UART: [art] Derive Key Pair
26,008,976 UART: [art] Store priv key in slot 0x5
29,302,237 UART: [art] Derive Key Pair - Done
29,315,513 UART: [art] Signing Cert with AUTHO
29,316,826 UART: RITY.KEYID = 7
31,604,078 UART: [art] Erasing AUTHORITY.KEYID = 7
31,605,592 UART: [art] PUB.X = 30DC0A444B8645737F1DE163F8A1EDFBF89FCBFFE523B5998F0043EEC14DCD673F6B24DDE81DB3CB3822F5D346452D3A
31,612,868 UART: [art] PUB.Y = 1108C885DD6856342ECFD11E9773A1F54612934201A866ABD7B8495BF13E374706E78012C4B6DB529B3DB3A43D8554D8
31,620,119 UART: [art] SIG.R = B6F0B615A76FFF827EA61CF245802C346F4F8150568E745E14F23D0C2A78F9646291A389A0A41B4462E0EEC9B883C484
31,627,489 UART: [art] SIG.S = 83348321A9E75985255CB5BD6923C66BE7A57E74C435FE80244E055C4D6D64124649FA916939376F4D205B8CC3E7256A
32,932,343 UART: Caliptra RT
32,933,075 UART: [state] CFI Enabled
33,094,157 UART: [rt] RT listening for mailbox commands...
33,098,130 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,142,551 UART: [rt]cmd =0x4c4d5356, len=1672
34,395,168 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,475 UART:
192,831 UART: Running Caliptra ROM ...
194,023 UART:
603,551 UART: [state] CFI Enabled
616,713 UART: [state] LifecycleState = Unprovisioned
618,847 UART: [state] DebugLocked = No
620,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,192 UART: [kat] SHA2-256
795,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,439 UART: [kat] ++
806,928 UART: [kat] sha1
817,164 UART: [kat] SHA2-256
819,892 UART: [kat] SHA2-384
825,885 UART: [kat] SHA2-512-ACC
828,248 UART: [kat] ECC-384
3,110,122 UART: [kat] HMAC-384Kdf
3,122,157 UART: [kat] LMS
4,312,295 UART: [kat] --
4,316,995 UART: [cold-reset] ++
4,319,131 UART: [fht] Storing FHT @ 0x50003400
4,330,319 UART: [idev] ++
4,330,949 UART: [idev] CDI.KEYID = 6
4,331,868 UART: [idev] SUBJECT.KEYID = 7
4,333,127 UART: [idev] UDS.KEYID = 0
4,334,188 ready_for_fw is high
4,334,408 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,477,666 UART: [idev] Erasing UDS.KEYID = 0
7,620,606 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,955 UART: [idev] --
7,647,646 UART: [ldev] ++
7,648,218 UART: [ldev] CDI.KEYID = 6
7,649,181 UART: [ldev] SUBJECT.KEYID = 5
7,650,393 UART: [ldev] AUTHORITY.KEYID = 7
7,651,621 UART: [ldev] FE.KEYID = 1
7,663,726 UART: [ldev] Erasing FE.KEYID = 1
10,955,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,950 UART: [ldev] --
13,316,299 UART: [fwproc] Waiting for Commands...
13,318,983 UART: [fwproc] Received command 0x46574c44
13,321,167 UART: [fwproc] Received Image of size 114036 bytes
17,376,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,552 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,835,908 >>> mbox cmd response: success
17,840,445 UART: [afmc] ++
17,841,104 UART: [afmc] CDI.KEYID = 6
17,842,000 UART: [afmc] SUBJECT.KEYID = 7
17,843,225 UART: [afmc] AUTHORITY.KEYID = 5
21,159,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,196 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,611 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,425 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,853 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,099 UART: [afmc] --
23,522,813 UART: [cold-reset] --
23,527,651 UART: [state] Locking Datavault
23,533,440 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,140 UART: [state] Locking ICCM
23,537,773 UART: [exit] Launching FMC @ 0x40000130
23,546,170 UART:
23,546,410 UART: Running Caliptra FMC ...
23,547,513 UART:
23,547,675 UART: [state] CFI Enabled
23,556,211 UART: [fht] FMC Alias Private Key: 7
25,887,151 UART: [art] Extend RT PCRs Done
25,888,372 UART: [art] Lock RT PCRs Done
25,889,935 UART: [art] Populate DV Done
25,895,250 UART: [fht] FMC Alias Private Key: 7
25,896,841 UART: [art] Derive CDI
25,897,578 UART: [art] Store in in slot 0x4
25,939,777 UART: [art] Derive Key Pair
25,940,797 UART: [art] Store priv key in slot 0x5
29,182,802 UART: [art] Derive Key Pair - Done
29,195,629 UART: [art] Signing Cert with AUTHO
29,196,925 UART: RITY.KEYID = 7
31,476,085 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,601 UART: [art] PUB.X = 6A41FD4CDEC4BD3D42E9F80BD2C8299A05F280AD621EA32F66C327BFD7E4E168AD1850C2FE004D350A6CAD53B5E25E54
31,484,814 UART: [art] PUB.Y = 04823621E6D9F73AA7A4FF524457666E4649681FFD0705883A7309CC1565AAD0DD8D70D09EB0C1114D5978BCAEBBB474
31,492,108 UART: [art] SIG.R = 052B0E63645C0FE9A6DC9F4CDCDD88B24069B98A0A2C1F14E5D19B56487F6EA5088C38D20DCAABAC2C4A453FECAEE4CF
31,499,557 UART: [art] SIG.S = 448E3DF186D96B97347CCBEDFB96E9956C13CF5EA58939750F1ECBF238653379853D077B5C45C8E2E5ED5D33D070D23B
32,804,567 UART: Caliptra RT
32,805,271 UART: [state] CFI Enabled
32,922,249 UART: [rt] RT listening for mailbox commands...
32,926,195 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,970,702 UART: [rt]cmd =0x4c4d5356, len=1672
34,223,300 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,126,184 ready_for_fw is high
4,126,815 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,383 >>> mbox cmd response: success
23,711,569 UART:
23,711,938 UART: Running Caliptra FMC ...
23,713,286 UART:
23,713,451 UART: [state] CFI Enabled
23,721,248 UART: [fht] FMC Alias Private Key: 7
26,051,588 UART: [art] Extend RT PCRs Done
26,052,814 UART: [art] Lock RT PCRs Done
26,054,499 UART: [art] Populate DV Done
26,059,650 UART: [fht] FMC Alias Private Key: 7
26,061,368 UART: [art] Derive CDI
26,062,189 UART: [art] Store in in slot 0x4
26,104,624 UART: [art] Derive Key Pair
26,105,623 UART: [art] Store priv key in slot 0x5
29,347,088 UART: [art] Derive Key Pair - Done
29,359,987 UART: [art] Signing Cert with AUTHO
29,361,295 UART: RITY.KEYID = 7
31,640,172 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,685 UART: [art] PUB.X = EC889921EC7E14DA40405D994328593C28BDCBF094643E2A21E0C156922675A13373D33A5289DAB8DF0CDE9A41C9DEA8
31,648,913 UART: [art] PUB.Y = EB3DED9402005FE10A7CBC1EADC091A16B84D54F51559D7045507A04B1912684A2834E49BA81D8B5CB597D73B2E6171C
31,656,179 UART: [art] SIG.R = EFFC61FBA08BE83FE3C0F6263E93EF9EF6404B3C6D352CFFD7C588F5143EE2EAF62D0192172577233F7E45551C3D5D78
31,663,552 UART: [art] SIG.S = C77EE56B05A3CDB50A186848A0681D916CABC88CBEE72F8AA62DB0EBA07C02F91EB6FDF88AD3476F6996AE1EC03B2415
32,968,939 UART: Caliptra RT
32,969,650 UART: [state] CFI Enabled
33,085,871 UART: [rt] RT listening for mailbox commands...
33,089,839 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,134,226 UART: [rt]cmd =0x4c4d5356, len=1672
34,386,808 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,580 UART:
192,939 UART: Running Caliptra ROM ...
194,156 UART:
194,327 UART: [state] CFI Enabled
262,931 UART: [state] LifecycleState = Unprovisioned
264,870 UART: [state] DebugLocked = No
266,554 UART: [state] WD Timer not started. Device not locked for debugging
270,803 UART: [kat] SHA2-256
449,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,529 UART: [kat] ++
461,990 UART: [kat] sha1
473,643 UART: [kat] SHA2-256
476,723 UART: [kat] SHA2-384
483,288 UART: [kat] SHA2-512-ACC
486,233 UART: [kat] ECC-384
2,949,756 UART: [kat] HMAC-384Kdf
2,970,364 UART: [kat] LMS
3,499,832 UART: [kat] --
3,504,342 UART: [cold-reset] ++
3,505,351 UART: [fht] FHT @ 0x50003400
3,516,899 UART: [idev] ++
3,517,463 UART: [idev] CDI.KEYID = 6
3,518,383 UART: [idev] SUBJECT.KEYID = 7
3,519,553 UART: [idev] UDS.KEYID = 0
3,520,482 ready_for_fw is high
3,520,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,563 UART: [idev] Erasing UDS.KEYID = 0
6,020,847 UART: [idev] Sha1 KeyId Algorithm
6,043,000 UART: [idev] --
6,046,516 UART: [ldev] ++
6,047,093 UART: [ldev] CDI.KEYID = 6
6,048,012 UART: [ldev] SUBJECT.KEYID = 5
6,049,178 UART: [ldev] AUTHORITY.KEYID = 7
6,050,411 UART: [ldev] FE.KEYID = 1
6,098,673 UART: [ldev] Erasing FE.KEYID = 1
8,605,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,421 UART: [ldev] --
10,411,312 UART: [fwproc] Wait for Commands...
10,414,378 UART: [fwproc] Recv command 0x46574c44
10,416,414 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,275,678 >>> mbox cmd response: success
14,280,281 UART: [afmc] ++
14,280,894 UART: [afmc] CDI.KEYID = 6
14,281,829 UART: [afmc] SUBJECT.KEYID = 7
14,282,998 UART: [afmc] AUTHORITY.KEYID = 5
16,824,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,046 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,956 UART: [afmc] --
18,629,103 UART: [cold-reset] --
18,632,591 UART: [state] Locking Datavault
18,636,648 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,293 UART: [state] Locking ICCM
18,640,926 UART: [exit] Launching FMC @ 0x40000130
18,649,386 UART:
18,649,624 UART: Running Caliptra FMC ...
18,650,743 UART:
18,650,908 UART: [state] CFI Enabled
18,708,728 UART: [fht] FMC Alias Private Key: 7
20,472,840 UART: [art] Extend RT PCRs Done
20,474,056 UART: [art] Lock RT PCRs Done
20,475,844 UART: [art] Populate DV Done
20,481,202 UART: [fht] FMC Alias Private Key: 7
20,482,794 UART: [art] Derive CDI
20,483,609 UART: [art] Store in in slot 0x4
20,541,833 UART: [art] Derive Key Pair
20,542,866 UART: [art] Store priv key in slot 0x5
23,006,082 UART: [art] Derive Key Pair - Done
23,019,022 UART: [art] Signing Cert with AUTHO
23,020,353 UART: RITY.KEYID = 7
24,731,890 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,403 UART: [art] PUB.X = 8AED44C26A8ED7AC8E92F0D99F447418C4D130C1DD47D2BB9ECC2008C8E8AD1164849F3BA1B6F2517E18E6FCE531B303
24,740,744 UART: [art] PUB.Y = 278809D85D612B290CE418229B21F9857B18C0AF99667144207436CB359BE767984AB63B1E3BC0A146BFA008F11A451C
24,747,932 UART: [art] SIG.R = A67990628279FF7471E1DDA0B04AA63C12C60D9AF638AD0919416BAE61C2779F2CAF60084C0305426942DD592AD077CF
24,755,292 UART: [art] SIG.S = BF2F73098EEB240221DA691A4447EC014A8EC62C285A9E3177C9538B3A23B2F0EE9E2EF65BD123A6DEC28B861D33EA8F
25,734,312 UART: Caliptra RT
25,735,020 UART: [state] CFI Enabled
25,899,346 UART: [rt] RT listening for mailbox commands...
25,903,265 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,947,924 UART: [rt]cmd =0x4c4d5356, len=1672
26,369,758 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,619 writing to cptra_bootfsm_go
192,726 UART:
193,093 UART: Running Caliptra ROM ...
194,288 UART:
194,442 UART: [state] CFI Enabled
264,079 UART: [state] LifecycleState = Unprovisioned
266,438 UART: [state] DebugLocked = No
267,767 UART: [state] WD Timer not started. Device not locked for debugging
271,520 UART: [kat] SHA2-256
461,165 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,940 UART: [kat] ++
472,441 UART: [kat] sha1
484,809 UART: [kat] SHA2-256
487,826 UART: [kat] SHA2-384
494,106 UART: [kat] SHA2-512-ACC
496,699 UART: [kat] ECC-384
2,948,072 UART: [kat] HMAC-384Kdf
2,972,032 UART: [kat] LMS
3,503,805 UART: [kat] --
3,509,578 UART: [cold-reset] ++
3,512,080 UART: [fht] FHT @ 0x50003400
3,522,632 UART: [idev] ++
3,523,337 UART: [idev] CDI.KEYID = 6
3,524,287 UART: [idev] SUBJECT.KEYID = 7
3,525,459 UART: [idev] UDS.KEYID = 0
3,526,360 ready_for_fw is high
3,526,547 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,418 UART: [idev] Erasing UDS.KEYID = 0
6,052,723 UART: [idev] Sha1 KeyId Algorithm
6,076,111 UART: [idev] --
6,080,842 UART: [ldev] ++
6,081,538 UART: [ldev] CDI.KEYID = 6
6,082,468 UART: [ldev] SUBJECT.KEYID = 5
6,083,636 UART: [ldev] AUTHORITY.KEYID = 7
6,084,738 UART: [ldev] FE.KEYID = 1
6,112,750 UART: [ldev] Erasing FE.KEYID = 1
8,620,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,397 UART: [ldev] --
10,427,229 UART: [fwproc] Wait for Commands...
10,430,152 UART: [fwproc] Recv command 0x46574c44
10,432,464 UART: [fwproc] Recv'd Img size: 114360 bytes
13,876,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,616,845 >>> mbox cmd response: success
14,620,103 UART: [afmc] ++
14,620,997 UART: [afmc] CDI.KEYID = 6
14,621,953 UART: [afmc] SUBJECT.KEYID = 7
14,623,507 UART: [afmc] AUTHORITY.KEYID = 5
17,161,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,887,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,889,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,904,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,920,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,935,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,958,869 UART: [afmc] --
18,961,660 UART: [cold-reset] --
18,965,800 UART: [state] Locking Datavault
18,970,900 UART: [state] Locking PCR0, PCR1 and PCR31
18,973,116 UART: [state] Locking ICCM
18,975,976 UART: [exit] Launching FMC @ 0x40000130
18,984,656 UART:
18,984,893 UART: Running Caliptra FMC ...
18,985,998 UART:
18,986,153 UART: [state] CFI Enabled
19,043,932 UART: [fht] FMC Alias Private Key: 7
20,808,182 UART: [art] Extend RT PCRs Done
20,809,406 UART: [art] Lock RT PCRs Done
20,811,056 UART: [art] Populate DV Done
20,816,530 UART: [fht] FMC Alias Private Key: 7
20,818,133 UART: [art] Derive CDI
20,818,894 UART: [art] Store in in slot 0x4
20,875,887 UART: [art] Derive Key Pair
20,876,930 UART: [art] Store priv key in slot 0x5
23,340,005 UART: [art] Derive Key Pair - Done
23,353,143 UART: [art] Signing Cert with AUTHO
23,354,457 UART: RITY.KEYID = 7
25,065,247 UART: [art] Erasing AUTHORITY.KEYID = 7
25,066,759 UART: [art] PUB.X = 22BD1719D377D7B5EEEB62C28571DA934F1571748045FBB02B39E133365B98A1B06093223DD5BC92D219236F8D13A43B
25,073,994 UART: [art] PUB.Y = BE2D6DF78E2D581DBB9A62C9344079CDFFDC13B529A90E913F5801F59A795A1B880F11AF9AF368ED33728665DAA1872B
25,081,263 UART: [art] SIG.R = 741CC4811EE7A62FC65A30A3929FF16063D6592C248F4909D255D77E12A48F206D3843B88018C0060F2CEF2EF472A9EB
25,088,639 UART: [art] SIG.S = 0AD922E617E17AC63FC2C7C9D925915984B8BE8C64542BACA079C4858C86018C6BD80652B2D9AF6E1480704290F41788
26,067,774 UART: Caliptra RT
26,068,485 UART: [state] CFI Enabled
26,231,660 UART: [rt] RT listening for mailbox commands...
26,235,680 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,280,078 UART: [rt]cmd =0x4c4d5356, len=1672
26,702,059 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
3,438,756 ready_for_fw is high
3,439,169 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,755,729 >>> mbox cmd response: success
19,070,922 UART:
19,071,338 UART: Running Caliptra FMC ...
19,072,460 UART:
19,072,619 UART: [state] CFI Enabled
19,137,771 UART: [fht] FMC Alias Private Key: 7
20,902,009 UART: [art] Extend RT PCRs Done
20,903,243 UART: [art] Lock RT PCRs Done
20,904,924 UART: [art] Populate DV Done
20,910,338 UART: [fht] FMC Alias Private Key: 7
20,911,908 UART: [art] Derive CDI
20,912,736 UART: [art] Store in in slot 0x4
20,970,760 UART: [art] Derive Key Pair
20,971,806 UART: [art] Store priv key in slot 0x5
23,435,132 UART: [art] Derive Key Pair - Done
23,448,295 UART: [art] Signing Cert with AUTHO
23,449,609 UART: RITY.KEYID = 7
25,160,352 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,848 UART: [art] PUB.X = 91E26CD785C79F2112C990670049D1FBAD8DB312BF71C6B37FAD79AF91BEFB4462FB8126E4BFD13D81F8BF5210876D97
25,169,123 UART: [art] PUB.Y = 998FF0FB3CE571E16C385DFDCABCD0AF487472ACB70EAE8563BD205B61973842737BE2A27FA2B3839E2C01C53B2292E0
25,176,403 UART: [art] SIG.R = 19099EDDA73EF68599AB657B306CE18FDE0EA2FCF14B95AA3474ACFFCCDA3FF303623D16B28DDCA7AD36A0556DBDE3C6
25,183,849 UART: [art] SIG.S = 8FAD4B3A9883C36C0DA82BF799846829F1421351FE7A1154E2CEC23BEEA9F325E622926F32F0AA48B3A77ED9F7EE883A
26,162,494 UART: Caliptra RT
26,163,208 UART: [state] CFI Enabled
26,328,055 UART: [rt] RT listening for mailbox commands...
26,332,027 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,376,645 UART: [rt]cmd =0x4c4d5356, len=1672
26,798,485 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,525 UART:
192,879 UART: Running Caliptra ROM ...
194,056 UART:
603,830 UART: [state] CFI Enabled
616,490 UART: [state] LifecycleState = Unprovisioned
618,911 UART: [state] DebugLocked = No
621,361 UART: [state] WD Timer not started. Device not locked for debugging
626,126 UART: [kat] SHA2-256
816,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,762 UART: [kat] ++
827,284 UART: [kat] sha1
839,291 UART: [kat] SHA2-256
842,300 UART: [kat] SHA2-384
849,353 UART: [kat] SHA2-512-ACC
851,930 UART: [kat] ECC-384
3,297,145 UART: [kat] HMAC-384Kdf
3,309,728 UART: [kat] LMS
3,841,550 UART: [kat] --
3,845,043 UART: [cold-reset] ++
3,846,403 UART: [fht] FHT @ 0x50003400
3,856,954 UART: [idev] ++
3,857,665 UART: [idev] CDI.KEYID = 6
3,858,544 UART: [idev] SUBJECT.KEYID = 7
3,859,806 UART: [idev] UDS.KEYID = 0
3,860,743 ready_for_fw is high
3,860,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,545 UART: [idev] Erasing UDS.KEYID = 0
6,338,247 UART: [idev] Sha1 KeyId Algorithm
6,359,965 UART: [idev] --
6,366,232 UART: [ldev] ++
6,366,963 UART: [ldev] CDI.KEYID = 6
6,367,884 UART: [ldev] SUBJECT.KEYID = 5
6,369,045 UART: [ldev] AUTHORITY.KEYID = 7
6,370,273 UART: [ldev] FE.KEYID = 1
6,381,801 UART: [ldev] Erasing FE.KEYID = 1
8,864,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,988 UART: [ldev] --
10,653,209 UART: [fwproc] Wait for Commands...
10,656,059 UART: [fwproc] Recv command 0x46574c44
10,658,314 UART: [fwproc] Recv'd Img size: 114360 bytes
14,101,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,844,892 >>> mbox cmd response: success
14,849,761 UART: [afmc] ++
14,850,471 UART: [afmc] CDI.KEYID = 6
14,851,709 UART: [afmc] SUBJECT.KEYID = 7
14,853,136 UART: [afmc] AUTHORITY.KEYID = 5
17,359,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,970 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,675 UART: [afmc] --
19,155,621 UART: [cold-reset] --
19,160,502 UART: [state] Locking Datavault
19,166,294 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,477 UART: [state] Locking ICCM
19,171,006 UART: [exit] Launching FMC @ 0x40000130
19,179,675 UART:
19,179,951 UART: Running Caliptra FMC ...
19,181,055 UART:
19,181,219 UART: [state] CFI Enabled
19,188,990 UART: [fht] FMC Alias Private Key: 7
20,946,253 UART: [art] Extend RT PCRs Done
20,947,471 UART: [art] Lock RT PCRs Done
20,949,376 UART: [art] Populate DV Done
20,954,629 UART: [fht] FMC Alias Private Key: 7
20,956,326 UART: [art] Derive CDI
20,957,143 UART: [art] Store in in slot 0x4
20,999,862 UART: [art] Derive Key Pair
21,000,865 UART: [art] Store priv key in slot 0x5
23,427,671 UART: [art] Derive Key Pair - Done
23,440,449 UART: [art] Signing Cert with AUTHO
23,441,753 UART: RITY.KEYID = 7
25,147,291 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,803 UART: [art] PUB.X = 16F8C8F047805F4DB80FC509061ABF47E6F9716C15A9DCDE26E1080D44838DB9292336A95BC7F030E89FCB4918D0F03F
25,156,105 UART: [art] PUB.Y = E47BCAD69C2CAC0CFFAC00078B355432E48AC61D70241DEE6C81C045D834422E5CC667EA3C9473C3F3363289884CDE4F
25,163,348 UART: [art] SIG.R = 273B021B75EEB150231F241B9FA1F722AD15C56021CE9934492DA2557801803CF0AEAB9961A81D2DC3C0C8BD4A65B47F
25,170,738 UART: [art] SIG.S = D6F05E9C88EDF1E729612E104F588D4D78D8AFBB3A17EC7F89F4ECACF2A09BA77A8D40334FD0421AB467E43C868F19A9
26,150,144 UART: Caliptra RT
26,150,837 UART: [state] CFI Enabled
26,268,451 UART: [rt] RT listening for mailbox commands...
26,272,457 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,316,702 UART: [rt]cmd =0x4c4d5356, len=1672
26,738,353 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,753,392 ready_for_fw is high
3,754,081 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,150 >>> mbox cmd response: success
19,208,036 UART:
19,208,473 UART: Running Caliptra FMC ...
19,209,619 UART:
19,209,779 UART: [state] CFI Enabled
19,217,839 UART: [fht] FMC Alias Private Key: 7
20,974,902 UART: [art] Extend RT PCRs Done
20,976,124 UART: [art] Lock RT PCRs Done
20,977,691 UART: [art] Populate DV Done
20,983,103 UART: [fht] FMC Alias Private Key: 7
20,984,770 UART: [art] Derive CDI
20,985,589 UART: [art] Store in in slot 0x4
21,028,734 UART: [art] Derive Key Pair
21,029,780 UART: [art] Store priv key in slot 0x5
23,456,935 UART: [art] Derive Key Pair - Done
23,470,099 UART: [art] Signing Cert with AUTHO
23,471,400 UART: RITY.KEYID = 7
25,176,614 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,121 UART: [art] PUB.X = 316A125BF00FE2F08161B7ABE2ACC3B69ABE347AEA905CE3195D3FD21AF24A30D7DE936F82EC0AFBF9107E074BE5FFF5
25,185,429 UART: [art] PUB.Y = C04FABCDAA68A866300B2C3B69B3B956AF249AA7D1B8A911D4683475D636996D6BBD8ABE2E3906E50301842909A385F9
25,192,695 UART: [art] SIG.R = 5BFF54C03A707714D3B588E6509D7C04623EC7AE85D0FFFFBCA7C2D0E912DE93D69E2C13C6C6198527B20AA86BFE5575
25,200,093 UART: [art] SIG.S = C355126A2D621122A452FC328602C6C2F1FB8E6D5BD703EC5C9564E8F3A0A9BFC236D14FE82F035B81CE3BEE6632984F
26,179,121 UART: Caliptra RT
26,179,811 UART: [state] CFI Enabled
26,296,996 UART: [rt] RT listening for mailbox commands...
26,300,983 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,345,684 UART: [rt]cmd =0x4c4d5356, len=1672
26,767,230 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,519 UART: [kat] SHA2-256
892,457 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,714 UART: [kat] HMAC-384Kdf
907,374 UART: [kat] LMS
1,475,570 UART: [kat] --
1,476,437 UART: [cold-reset] ++
1,477,013 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 ready_for_fw is high
1,481,073 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,636 UART: [idev] Erasing UDS.KEYID = 0
1,505,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,978 UART: [idev] --
1,514,963 UART: [ldev] ++
1,515,131 UART: [ldev] CDI.KEYID = 6
1,515,494 UART: [ldev] SUBJECT.KEYID = 5
1,515,920 UART: [ldev] AUTHORITY.KEYID = 7
1,516,383 UART: [ldev] FE.KEYID = 1
1,521,693 UART: [ldev] Erasing FE.KEYID = 1
1,547,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,368 UART: [ldev] --
1,586,801 UART: [fwproc] Waiting for Commands...
1,587,558 UART: [fwproc] Received command 0x46574c44
1,588,349 UART: [fwproc] Received Image of size 114360 bytes
2,886,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,555 >>> mbox cmd response: success
3,079,675 UART: [afmc] ++
3,079,843 UART: [afmc] CDI.KEYID = 6
3,080,205 UART: [afmc] SUBJECT.KEYID = 7
3,080,630 UART: [afmc] AUTHORITY.KEYID = 5
3,115,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,019 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,412 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,102 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,089 UART: [afmc] --
3,159,119 UART: [cold-reset] --
3,159,843 UART: [state] Locking Datavault
3,160,862 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,466 UART: [state] Locking ICCM
3,161,988 UART: [exit] Launching FMC @ 0x40000130
3,167,317 UART:
3,167,333 UART: Running Caliptra FMC ...
3,167,741 UART:
3,167,795 UART: [state] CFI Enabled
3,178,286 UART: [fht] FMC Alias Private Key: 7
3,285,935 UART: [art] Extend RT PCRs Done
3,286,363 UART: [art] Lock RT PCRs Done
3,288,047 UART: [art] Populate DV Done
3,296,274 UART: [fht] FMC Alias Private Key: 7
3,297,242 UART: [art] Derive CDI
3,297,522 UART: [art] Store in in slot 0x4
3,382,787 UART: [art] Derive Key Pair
3,383,147 UART: [art] Store priv key in slot 0x5
3,396,209 UART: [art] Derive Key Pair - Done
3,410,985 UART: [art] Signing Cert with AUTHO
3,411,465 UART: RITY.KEYID = 7
3,426,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,450 UART: [art] PUB.X = B2853BE32E07CE6E4500C33F6988766208AFD966606FB168CF09DCC779D59D5E33AC825EDC8B1815C0CFD17506C273B6
3,434,192 UART: [art] PUB.Y = 3FFD79096DA5FE7BF62A4A3C0CE5C6DA69FBCC5F51D8EDD86ED7962C9B8715BB68769E0B52527DE91373620056F1CF10
3,441,127 UART: [art] SIG.R = FAD56EB031F72A2AD46844F83C34F3D16BE98BDC9E44EAD650795C638AB48449A6F02F5379D8626554F813A79E14599D
3,447,901 UART: [art] SIG.S = B77ED81C877F8B41806454961706FBBD027C7E36FEB14D137E231400624F67423CE4D3D3235654D819378AA3889EAEAE
3,471,490 UART: Caliptra RT
3,471,744 UART: [state] CFI Enabled
3,579,449 UART: [rt] RT listening for mailbox commands...
3,580,119 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,326 UART: [rt]cmd =0x4c4d5356, len=1672
4,149,944 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,407 ready_for_fw is high
1,362,407 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,161 >>> mbox cmd response: success
2,990,037 UART:
2,990,053 UART: Running Caliptra FMC ...
2,990,461 UART:
2,990,515 UART: [state] CFI Enabled
3,000,790 UART: [fht] FMC Alias Private Key: 7
3,108,305 UART: [art] Extend RT PCRs Done
3,108,733 UART: [art] Lock RT PCRs Done
3,110,351 UART: [art] Populate DV Done
3,118,726 UART: [fht] FMC Alias Private Key: 7
3,119,792 UART: [art] Derive CDI
3,120,072 UART: [art] Store in in slot 0x4
3,205,725 UART: [art] Derive Key Pair
3,206,085 UART: [art] Store priv key in slot 0x5
3,219,049 UART: [art] Derive Key Pair - Done
3,233,624 UART: [art] Signing Cert with AUTHO
3,234,104 UART: RITY.KEYID = 7
3,249,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,867 UART: [art] PUB.X = 109840BDD10AF4C8547E0CCD4CE5EAD4C43E80E90A3D7814F961C0379C3A08D80530171B41160A264437BFA368744EBF
3,256,623 UART: [art] PUB.Y = B1827A763BDD070154D22019CCCF547635466B0B651F223994DA5DB7C88CCE52EE4D29B0B9666A186C773E458F82316C
3,263,564 UART: [art] SIG.R = 80CA8E31FED0BF740A0E8269D33F23FB2CBCDCF3C5E5E8993395EBDBE4B9DF080A4FBA3E8B23C7B587585FF2F8BDD467
3,270,350 UART: [art] SIG.S = F9D0FE6253AFF4C5C048DDDC44A3BD366A9AB434119E793619F33C9FFC5AEA8B6EB1DF8DC3AA76F3D04D649EC863DAA0
3,294,367 UART: Caliptra RT
3,294,621 UART: [state] CFI Enabled
3,402,508 UART: [rt] RT listening for mailbox commands...
3,403,178 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,491 UART: [rt]cmd =0x4c4d5356, len=1672
3,973,191 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,344 UART: [kat] SHA2-256
882,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,390 UART: [kat] ++
886,542 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,535 UART: [kat] SHA2-512-ACC
897,436 UART: [kat] ECC-384
903,009 UART: [kat] HMAC-384Kdf
907,889 UART: [kat] LMS
1,476,085 UART: [kat] --
1,476,850 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,480,089 UART: [idev] ++
1,480,257 UART: [idev] CDI.KEYID = 6
1,480,617 UART: [idev] SUBJECT.KEYID = 7
1,481,041 UART: [idev] UDS.KEYID = 0
1,481,386 ready_for_fw is high
1,481,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,955 UART: [idev] Erasing UDS.KEYID = 0
1,505,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,031 UART: [idev] --
1,515,062 UART: [ldev] ++
1,515,230 UART: [ldev] CDI.KEYID = 6
1,515,593 UART: [ldev] SUBJECT.KEYID = 5
1,516,019 UART: [ldev] AUTHORITY.KEYID = 7
1,516,482 UART: [ldev] FE.KEYID = 1
1,521,912 UART: [ldev] Erasing FE.KEYID = 1
1,547,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,359 UART: [ldev] --
1,586,676 UART: [fwproc] Waiting for Commands...
1,587,351 UART: [fwproc] Received command 0x46574c44
1,588,142 UART: [fwproc] Received Image of size 114360 bytes
2,885,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,565 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,944 >>> mbox cmd response: success
3,079,134 UART: [afmc] ++
3,079,302 UART: [afmc] CDI.KEYID = 6
3,079,664 UART: [afmc] SUBJECT.KEYID = 7
3,080,089 UART: [afmc] AUTHORITY.KEYID = 5
3,115,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,288 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,901 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,591 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,528 UART: [afmc] --
3,158,616 UART: [cold-reset] --
3,159,602 UART: [state] Locking Datavault
3,160,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,397 UART: [state] Locking ICCM
3,161,845 UART: [exit] Launching FMC @ 0x40000130
3,167,174 UART:
3,167,190 UART: Running Caliptra FMC ...
3,167,598 UART:
3,167,741 UART: [state] CFI Enabled
3,178,360 UART: [fht] FMC Alias Private Key: 7
3,286,341 UART: [art] Extend RT PCRs Done
3,286,769 UART: [art] Lock RT PCRs Done
3,288,307 UART: [art] Populate DV Done
3,296,616 UART: [fht] FMC Alias Private Key: 7
3,297,738 UART: [art] Derive CDI
3,298,018 UART: [art] Store in in slot 0x4
3,383,689 UART: [art] Derive Key Pair
3,384,049 UART: [art] Store priv key in slot 0x5
3,397,777 UART: [art] Derive Key Pair - Done
3,412,661 UART: [art] Signing Cert with AUTHO
3,413,141 UART: RITY.KEYID = 7
3,428,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,296 UART: [art] PUB.X = 458AE0124BDFB64A7936DE8BC493FDC20F897BD4E4C8E0EB2A16D67DA3A21D6BD7735F3A7EEEFE6D8B4BE7C2F87A5357
3,436,089 UART: [art] PUB.Y = 091C632D29FA6F3487D2986FEDFE6A28548873E881261F57237B037F8B38D69F2D465DBFED92D4C66FE08455CD753CD1
3,443,037 UART: [art] SIG.R = 00460B7005E1FA4283834E26FCE1D0753AE788988832241D86C3C5A7026D966B3E2DD857E8E340AEF4EF92936EFAE2FB
3,449,780 UART: [art] SIG.S = 6739FAABCEA6E9C81E034611933A5D66855E9B4A954AFF527DE9C47737CD0F60D1AED3C4C2B076FAF6DD74F715D775E9
3,473,247 UART: Caliptra RT
3,473,593 UART: [state] CFI Enabled
3,581,753 UART: [rt] RT listening for mailbox commands...
3,582,423 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,906 UART: [rt]cmd =0x4c4d5356, len=1672
4,152,820 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,758 ready_for_fw is high
1,362,758 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,682 >>> mbox cmd response: success
2,989,864 UART:
2,989,880 UART: Running Caliptra FMC ...
2,990,288 UART:
2,990,431 UART: [state] CFI Enabled
3,000,892 UART: [fht] FMC Alias Private Key: 7
3,108,783 UART: [art] Extend RT PCRs Done
3,109,211 UART: [art] Lock RT PCRs Done
3,110,787 UART: [art] Populate DV Done
3,118,690 UART: [fht] FMC Alias Private Key: 7
3,119,802 UART: [art] Derive CDI
3,120,082 UART: [art] Store in in slot 0x4
3,205,691 UART: [art] Derive Key Pair
3,206,051 UART: [art] Store priv key in slot 0x5
3,219,575 UART: [art] Derive Key Pair - Done
3,234,089 UART: [art] Signing Cert with AUTHO
3,234,569 UART: RITY.KEYID = 7
3,249,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,146 UART: [art] PUB.X = 7CB74C2166B631054C678E626E0B6482A4E89BD9194BE4355F2CDD976113B49DB8ACB5808A14357F70E541F61C17A66C
3,256,910 UART: [art] PUB.Y = C394C66936465474600D5EBD0FA13E6292587F2655017C0BC6087419262C22A48A6ABFB89A13342B77F51E2FEE70AE42
3,263,841 UART: [art] SIG.R = 434F0E2C617859A8A24E31C32BF19FADBCAEEAF46D287ABD9F61A945D96B6D97EF255B45B04BC182F41CF604145A4895
3,270,619 UART: [art] SIG.S = F7C3B55BAE0073AE2CBEDAC7BAF47D2F40AC46C2B3E004B2D832A825B5103A5A22F761E82DE7F73E1494A00A6D58A6B2
3,294,744 UART: Caliptra RT
3,295,090 UART: [state] CFI Enabled
3,403,590 UART: [rt] RT listening for mailbox commands...
3,404,260 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,575 UART: [rt]cmd =0x4c4d5356, len=1672
3,974,427 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,514 UART: [state] LifecycleState = Unprovisioned
85,169 UART: [state] DebugLocked = No
85,705 UART: [state] WD Timer not started. Device not locked for debugging
86,874 UART: [kat] SHA2-256
892,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,649 UART: [kat] ++
896,801 UART: [kat] sha1
901,175 UART: [kat] SHA2-256
903,115 UART: [kat] SHA2-384
905,764 UART: [kat] SHA2-512-ACC
907,665 UART: [kat] ECC-384
917,300 UART: [kat] HMAC-384Kdf
921,898 UART: [kat] LMS
1,170,226 UART: [kat] --
1,171,135 UART: [cold-reset] ++
1,171,667 UART: [fht] FHT @ 0x50003400
1,174,402 UART: [idev] ++
1,174,570 UART: [idev] CDI.KEYID = 6
1,174,930 UART: [idev] SUBJECT.KEYID = 7
1,175,354 UART: [idev] UDS.KEYID = 0
1,175,699 ready_for_fw is high
1,175,699 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,204 UART: [idev] Erasing UDS.KEYID = 0
1,200,527 UART: [idev] Sha1 KeyId Algorithm
1,208,973 UART: [idev] --
1,210,093 UART: [ldev] ++
1,210,261 UART: [ldev] CDI.KEYID = 6
1,210,624 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,243,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,184 UART: [fwproc] Wait for Commands...
1,283,826 UART: [fwproc] Recv command 0x46574c44
1,284,554 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,224 >>> mbox cmd response: success
2,777,446 UART: [afmc] ++
2,777,614 UART: [afmc] CDI.KEYID = 6
2,777,976 UART: [afmc] SUBJECT.KEYID = 7
2,778,401 UART: [afmc] AUTHORITY.KEYID = 5
2,813,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,345 UART: [afmc] --
2,857,369 UART: [cold-reset] --
2,858,323 UART: [state] Locking Datavault
2,859,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,346 UART: [state] Locking ICCM
2,860,906 UART: [exit] Launching FMC @ 0x40000130
2,866,235 UART:
2,866,251 UART: Running Caliptra FMC ...
2,866,659 UART:
2,866,713 UART: [state] CFI Enabled
2,877,316 UART: [fht] FMC Alias Private Key: 7
2,985,851 UART: [art] Extend RT PCRs Done
2,986,279 UART: [art] Lock RT PCRs Done
2,987,933 UART: [art] Populate DV Done
2,996,368 UART: [fht] FMC Alias Private Key: 7
2,997,408 UART: [art] Derive CDI
2,997,688 UART: [art] Store in in slot 0x4
3,082,893 UART: [art] Derive Key Pair
3,083,253 UART: [art] Store priv key in slot 0x5
3,096,081 UART: [art] Derive Key Pair - Done
3,111,203 UART: [art] Signing Cert with AUTHO
3,111,683 UART: RITY.KEYID = 7
3,126,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,328 UART: [art] PUB.X = 23568662B2D40FE0ED75BEF3B5DA9C012405A798F413E336AC926C1BF1E7C938CFFCA2453475EAC9F239177B2891262B
3,134,095 UART: [art] PUB.Y = BA9C41FA31477A22BD945C8DE70D813C961D020F9CA7242614F4976FC7AFBA9033EFE88A9C1BEF542D5E3CC14EA1E89E
3,141,054 UART: [art] SIG.R = 99ADB769D034B6B8D79C0AE28AFFF44CBFFB26B86BF20E3A1EA30F9B9C17723367D6B3EB8FFC622066E9117EECAD152A
3,147,839 UART: [art] SIG.S = 001AD34A4500EC207D3FE842088AF2AA9D9B4C2CA67D01AA572F6D6A13EE6A96BC3B720F2F29A9D7AEEDAA84FF7DFDCE
3,171,151 UART: Caliptra RT
3,171,405 UART: [state] CFI Enabled
3,279,248 UART: [rt] RT listening for mailbox commands...
3,279,918 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,161 UART: [rt]cmd =0x4c4d5356, len=1672
3,849,851 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,163 ready_for_fw is high
1,060,163 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,571 >>> mbox cmd response: success
2,688,157 UART:
2,688,173 UART: Running Caliptra FMC ...
2,688,581 UART:
2,688,635 UART: [state] CFI Enabled
2,699,360 UART: [fht] FMC Alias Private Key: 7
2,807,551 UART: [art] Extend RT PCRs Done
2,807,979 UART: [art] Lock RT PCRs Done
2,809,233 UART: [art] Populate DV Done
2,817,582 UART: [fht] FMC Alias Private Key: 7
2,818,628 UART: [art] Derive CDI
2,818,908 UART: [art] Store in in slot 0x4
2,904,627 UART: [art] Derive Key Pair
2,904,987 UART: [art] Store priv key in slot 0x5
2,917,557 UART: [art] Derive Key Pair - Done
2,932,564 UART: [art] Signing Cert with AUTHO
2,933,044 UART: RITY.KEYID = 7
2,948,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,985 UART: [art] PUB.X = 4E8DAFB99B57761B4CB3596942AAE71B0881A3E0CBF6BD546D4445A21161A3675A925EB337FC6EC27DCC1679B6BE1D2E
2,955,766 UART: [art] PUB.Y = 7C9BB05D7DAE6C2C05354DC199E72AB0C1EDBFF842987B6DB15C23BDD90CE8C1E371B6C1254F883C1CED6055C973EC3C
2,962,732 UART: [art] SIG.R = FE3ADB4E678EBF9527C97F22F6CC8F2B358D447F2920792ECBC565E0F246EAC877C58CF62E8235A3DA462C91C02A2FB0
2,969,518 UART: [art] SIG.S = 103FA21EA92FD9C1BDDEEC3A6E6A10DAAF73C1F0FCB4E975FEAD61417D440D3935FA506B6AFF2B819FF54787A6833619
2,993,164 UART: Caliptra RT
2,993,418 UART: [state] CFI Enabled
3,100,816 UART: [rt] RT listening for mailbox commands...
3,101,486 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,841 UART: [rt]cmd =0x4c4d5356, len=1672
3,671,539 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,493 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,550 UART: [cold-reset] ++
1,173,092 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 ready_for_fw is high
1,176,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,579 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,478 UART: [idev] --
1,211,556 UART: [ldev] ++
1,211,724 UART: [ldev] CDI.KEYID = 6
1,212,087 UART: [ldev] SUBJECT.KEYID = 5
1,212,513 UART: [ldev] AUTHORITY.KEYID = 7
1,212,976 UART: [ldev] FE.KEYID = 1
1,218,114 UART: [ldev] Erasing FE.KEYID = 1
1,245,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,914 UART: [ldev] --
1,284,273 UART: [fwproc] Wait for Commands...
1,285,095 UART: [fwproc] Recv command 0x46574c44
1,285,823 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,735 >>> mbox cmd response: success
2,776,929 UART: [afmc] ++
2,777,097 UART: [afmc] CDI.KEYID = 6
2,777,459 UART: [afmc] SUBJECT.KEYID = 7
2,777,884 UART: [afmc] AUTHORITY.KEYID = 5
2,813,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,294 UART: [afmc] --
2,857,266 UART: [cold-reset] --
2,858,178 UART: [state] Locking Datavault
2,859,417 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,021 UART: [state] Locking ICCM
2,860,533 UART: [exit] Launching FMC @ 0x40000130
2,865,862 UART:
2,865,878 UART: Running Caliptra FMC ...
2,866,286 UART:
2,866,429 UART: [state] CFI Enabled
2,877,164 UART: [fht] FMC Alias Private Key: 7
2,985,693 UART: [art] Extend RT PCRs Done
2,986,121 UART: [art] Lock RT PCRs Done
2,987,713 UART: [art] Populate DV Done
2,995,980 UART: [fht] FMC Alias Private Key: 7
2,997,126 UART: [art] Derive CDI
2,997,406 UART: [art] Store in in slot 0x4
3,083,525 UART: [art] Derive Key Pair
3,083,885 UART: [art] Store priv key in slot 0x5
3,096,649 UART: [art] Derive Key Pair - Done
3,111,708 UART: [art] Signing Cert with AUTHO
3,112,188 UART: RITY.KEYID = 7
3,127,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,593 UART: [art] PUB.X = 1D8137056A7E1A64C422057E7294966907F4BC386311527A541D9CE5ED2385E1C625F0386AFA1E295E615FB5D3A36E5F
3,135,350 UART: [art] PUB.Y = FD581F04EA97FBF534A40CE31D41810B4C7D2766C621779A9EBCDB51E0D77755B702CCEA9DE1D9DDC2B3BC50CFBC7930
3,142,310 UART: [art] SIG.R = 63E0EF217D8F293A66289AE30B93390051158B891D7525FAF85632FF2C52C53F002AE45D0D03AFD0260A70D661D78CB9
3,149,024 UART: [art] SIG.S = FD2B829727792318BE83663163A8724D824375753C9E7876CC5DAFB50C6BD399D320160919C345090667BCC3F4B72E66
3,173,081 UART: Caliptra RT
3,173,427 UART: [state] CFI Enabled
3,282,059 UART: [rt] RT listening for mailbox commands...
3,282,729 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,950 UART: [rt]cmd =0x4c4d5356, len=1672
3,852,860 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,716 ready_for_fw is high
1,060,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,930 >>> mbox cmd response: success
2,688,098 UART:
2,688,114 UART: Running Caliptra FMC ...
2,688,522 UART:
2,688,665 UART: [state] CFI Enabled
2,699,334 UART: [fht] FMC Alias Private Key: 7
2,806,977 UART: [art] Extend RT PCRs Done
2,807,405 UART: [art] Lock RT PCRs Done
2,808,635 UART: [art] Populate DV Done
2,816,720 UART: [fht] FMC Alias Private Key: 7
2,817,710 UART: [art] Derive CDI
2,817,990 UART: [art] Store in in slot 0x4
2,903,691 UART: [art] Derive Key Pair
2,904,051 UART: [art] Store priv key in slot 0x5
2,917,831 UART: [art] Derive Key Pair - Done
2,932,775 UART: [art] Signing Cert with AUTHO
2,933,255 UART: RITY.KEYID = 7
2,948,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,836 UART: [art] PUB.X = 521FFE18D839A3FC9ACF250253D2C41F762A494513EE9E04EC19CFB6C13384602428154A1BC4E6ADEFC30302C43EFCA0
2,955,606 UART: [art] PUB.Y = 1806DAE31915A8EBA9FEBBCE1D164956B731FFC433484E4F0FACE014AE899C586C7AD9F3A37AF0261CA4129DE1B94581
2,962,566 UART: [art] SIG.R = D0236855CA05AC9B69894228D12033EA40971A795A6DB534C16CB4142E567B9F12A5C155FF0753D4AAC30D52254626D5
2,969,323 UART: [art] SIG.S = E47B7D77943031836B69513B2122980D2AA713C5E22E4094D1797AFD00EB9D191CABD0C0225FAAAE28D37672BAF65E11
2,993,141 UART: Caliptra RT
2,993,487 UART: [state] CFI Enabled
3,101,140 UART: [rt] RT listening for mailbox commands...
3,101,810 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,183 UART: [rt]cmd =0x4c4d5356, len=1672
3,672,047 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,174,027 ready_for_fw is high
1,174,027 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,548 UART: [ldev] ++
1,208,716 UART: [ldev] CDI.KEYID = 6
1,209,080 UART: [ldev] SUBJECT.KEYID = 5
1,209,507 UART: [ldev] AUTHORITY.KEYID = 7
1,209,970 UART: [ldev] FE.KEYID = 1
1,214,988 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,665 UART: [fwproc] Recv command 0x46574c44
1,282,398 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,770 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,550 >>> mbox cmd response: success
2,773,633 UART: [afmc] ++
2,773,801 UART: [afmc] CDI.KEYID = 6
2,774,164 UART: [afmc] SUBJECT.KEYID = 7
2,774,590 UART: [afmc] AUTHORITY.KEYID = 5
2,810,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,154 UART: [afmc] --
2,853,272 UART: [cold-reset] --
2,853,938 UART: [state] Locking Datavault
2,855,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,755 UART: [state] Locking ICCM
2,856,285 UART: [exit] Launching FMC @ 0x40000130
2,861,614 UART:
2,861,630 UART: Running Caliptra FMC ...
2,862,038 UART:
2,862,092 UART: [state] CFI Enabled
2,872,647 UART: [fht] FMC Alias Private Key: 7
2,979,866 UART: [art] Extend RT PCRs Done
2,980,294 UART: [art] Lock RT PCRs Done
2,982,096 UART: [art] Populate DV Done
2,990,277 UART: [fht] FMC Alias Private Key: 7
2,991,433 UART: [art] Derive CDI
2,991,713 UART: [art] Store in in slot 0x4
3,077,518 UART: [art] Derive Key Pair
3,077,878 UART: [art] Store priv key in slot 0x5
3,091,402 UART: [art] Derive Key Pair - Done
3,106,302 UART: [art] Signing Cert with AUTHO
3,106,782 UART: RITY.KEYID = 7
3,121,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,723 UART: [art] PUB.X = 2CB0E5861611F4B90B96D327E222EB697860CE60B0610FFF5AAC045E07336D7D817DF5F78CE03B83B8E09EE83DEF795E
3,129,491 UART: [art] PUB.Y = 3EF8F21C5FEEA84D97B8DA935B929CEC214C33C6862D81FC7A52345AAA11FE21F9F2DCF0190D93B8DBD02DA32665B79B
3,136,458 UART: [art] SIG.R = 87EFECE7F17094187E373ACEA04367A94A834BE35A5AA7D24F1396FBEA20B35349064D7580C081E320892F75CDACF6B8
3,143,233 UART: [art] SIG.S = BE1F92E1DF83B86F72EE3AC1458D53FF80B406CAFF0F77CB57578958F8247D057D0623B7D69E8F82E7003A7EF52532B2
3,166,622 UART: Caliptra RT
3,166,876 UART: [state] CFI Enabled
3,275,015 UART: [rt] RT listening for mailbox commands...
3,275,685 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,746 UART: [rt]cmd =0x4c4d5356, len=1672
3,845,676 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,758 ready_for_fw is high
1,055,758 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,580 >>> mbox cmd response: success
2,684,596 UART:
2,684,612 UART: Running Caliptra FMC ...
2,685,020 UART:
2,685,074 UART: [state] CFI Enabled
2,695,671 UART: [fht] FMC Alias Private Key: 7
2,803,626 UART: [art] Extend RT PCRs Done
2,804,054 UART: [art] Lock RT PCRs Done
2,805,282 UART: [art] Populate DV Done
2,813,331 UART: [fht] FMC Alias Private Key: 7
2,814,473 UART: [art] Derive CDI
2,814,753 UART: [art] Store in in slot 0x4
2,900,328 UART: [art] Derive Key Pair
2,900,688 UART: [art] Store priv key in slot 0x5
2,913,430 UART: [art] Derive Key Pair - Done
2,928,359 UART: [art] Signing Cert with AUTHO
2,928,839 UART: RITY.KEYID = 7
2,944,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,040 UART: [art] PUB.X = A245B6198EAB2981E98BEFF226EB06E2225C75946B8EEEA61A0701D57C9133C8D1A3C4D6E733696A3B8A459D63D58418
2,951,805 UART: [art] PUB.Y = D8C0968875877EDB6B46429200BA7601984001E2EC199D2E4C9A7BA9D41FD5BEF505B5CC1ABE1D488BBC9D6A929A733A
2,958,736 UART: [art] SIG.R = FB409CE811CE95C650EBFC99EC91AE13309BEBBEED9972F07DFB06086E6105392712A55117AD7793F1BB507FA1134EC2
2,965,509 UART: [art] SIG.S = D08B24F35130A46956E8618FFBE5B1DA58974832C86E23F493D462BE290B949DE6171076BBBF70EAD7F674243542807A
2,989,409 UART: Caliptra RT
2,989,663 UART: [state] CFI Enabled
3,096,594 UART: [rt] RT listening for mailbox commands...
3,097,264 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,479 UART: [rt]cmd =0x4c4d5356, len=1672
3,667,175 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,638 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,672 UART: [idev] ++
1,173,840 UART: [idev] CDI.KEYID = 6
1,174,201 UART: [idev] SUBJECT.KEYID = 7
1,174,626 UART: [idev] UDS.KEYID = 0
1,174,972 ready_for_fw is high
1,174,972 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,030 UART: [idev] Sha1 KeyId Algorithm
1,207,910 UART: [idev] --
1,208,851 UART: [ldev] ++
1,209,019 UART: [ldev] CDI.KEYID = 6
1,209,383 UART: [ldev] SUBJECT.KEYID = 5
1,209,810 UART: [ldev] AUTHORITY.KEYID = 7
1,210,273 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,241,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,815 UART: [ldev] --
1,281,255 UART: [fwproc] Wait for Commands...
1,281,874 UART: [fwproc] Recv command 0x46574c44
1,282,607 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,016 >>> mbox cmd response: success
2,774,267 UART: [afmc] ++
2,774,435 UART: [afmc] CDI.KEYID = 6
2,774,798 UART: [afmc] SUBJECT.KEYID = 7
2,775,224 UART: [afmc] AUTHORITY.KEYID = 5
2,810,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,592 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,204 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,772 UART: [afmc] --
2,853,756 UART: [cold-reset] --
2,854,592 UART: [state] Locking Datavault
2,855,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,373 UART: [state] Locking ICCM
2,857,025 UART: [exit] Launching FMC @ 0x40000130
2,862,354 UART:
2,862,370 UART: Running Caliptra FMC ...
2,862,778 UART:
2,862,921 UART: [state] CFI Enabled
2,873,342 UART: [fht] FMC Alias Private Key: 7
2,981,425 UART: [art] Extend RT PCRs Done
2,981,853 UART: [art] Lock RT PCRs Done
2,983,655 UART: [art] Populate DV Done
2,992,090 UART: [fht] FMC Alias Private Key: 7
2,993,252 UART: [art] Derive CDI
2,993,532 UART: [art] Store in in slot 0x4
3,078,909 UART: [art] Derive Key Pair
3,079,269 UART: [art] Store priv key in slot 0x5
3,092,783 UART: [art] Derive Key Pair - Done
3,107,494 UART: [art] Signing Cert with AUTHO
3,107,974 UART: RITY.KEYID = 7
3,123,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,277 UART: [art] PUB.X = 6DC5E51281546F8D894190DE81B9E8A3DBBE69321CCB91494F1BC804D798B336AE8E1EDFA0E0831C399324BB0D17767D
3,131,049 UART: [art] PUB.Y = 27954219ED85705EF03B8AA6DA1F591F81956AD2109935867D8AD847D97BD96670D74CFA7C6832C6F8B7767AC8A7384A
3,137,999 UART: [art] SIG.R = 422E4BB4E4DAEB63CED08F7A3D44C7DD479CC21DAF1FDE78D79549361FADA2D95E0E666A0381EE1E36FC6E271ED898E2
3,144,787 UART: [art] SIG.S = 2BBDD1B5445F5B70970D3EEF37B03081F6971F2E7DE9A64E0340F253BD7DC45EA4942D40C00B341956A414EF74A4C989
3,168,195 UART: Caliptra RT
3,168,541 UART: [state] CFI Enabled
3,275,861 UART: [rt] RT listening for mailbox commands...
3,276,531 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,756 UART: [rt]cmd =0x4c4d5356, len=1672
3,846,324 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 ready_for_fw is high
1,056,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,061 >>> mbox cmd response: success
2,683,469 UART:
2,683,485 UART: Running Caliptra FMC ...
2,683,893 UART:
2,684,036 UART: [state] CFI Enabled
2,694,843 UART: [fht] FMC Alias Private Key: 7
2,802,710 UART: [art] Extend RT PCRs Done
2,803,138 UART: [art] Lock RT PCRs Done
2,804,644 UART: [art] Populate DV Done
2,812,783 UART: [fht] FMC Alias Private Key: 7
2,813,903 UART: [art] Derive CDI
2,814,183 UART: [art] Store in in slot 0x4
2,899,478 UART: [art] Derive Key Pair
2,899,838 UART: [art] Store priv key in slot 0x5
2,913,392 UART: [art] Derive Key Pair - Done
2,928,184 UART: [art] Signing Cert with AUTHO
2,928,664 UART: RITY.KEYID = 7
2,943,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,591 UART: [art] PUB.X = A9701B3EDFED9ADDAD03414DC8F7C1AB38EA20B845B0F128EE537A2C5F513633B383967E585A0B4D05A61DDD1797793E
2,951,366 UART: [art] PUB.Y = CB96560DD575724B1AEF8A1F081A24DED3EB15EFAD1168C3BB829F918D4CB88F27A956EE4D3899E44D396BD64F15FAB5
2,958,328 UART: [art] SIG.R = 546B5F5B854BD736E70768A9BEBE3FD2A085A474395C6630388CAFDD16C3E8E0CCEFCF626F9FA32E85E002CB07F35C61
2,965,105 UART: [art] SIG.S = A57F9814BC274118941CEFBA41A4782DBF3E6F067E31D90791592E94D8959E6BF2854874D155D863DF476C95CF22E628
2,989,014 UART: Caliptra RT
2,989,360 UART: [state] CFI Enabled
3,096,612 UART: [rt] RT listening for mailbox commands...
3,097,282 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,501 UART: [rt]cmd =0x4c4d5356, len=1672
3,667,273 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,347 UART:
192,707 UART: Running Caliptra ROM ...
193,833 UART:
193,973 UART: [state] CFI Enabled
263,369 UART: [state] LifecycleState = Unprovisioned
265,274 UART: [state] DebugLocked = No
266,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,525 UART: [kat] SHA2-256
441,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,717 UART: [kat] ++
452,164 UART: [kat] sha1
463,203 UART: [kat] SHA2-256
465,892 UART: [kat] SHA2-384
470,321 UART: [kat] SHA2-512-ACC
472,686 UART: [kat] ECC-384
2,767,257 UART: [kat] HMAC-384Kdf
2,780,656 UART: [kat] LMS
3,970,896 UART: [kat] --
3,975,716 UART: [cold-reset] ++
3,977,039 UART: [fht] Storing FHT @ 0x50003400
3,988,054 UART: [idev] ++
3,988,616 UART: [idev] CDI.KEYID = 6
3,989,562 UART: [idev] SUBJECT.KEYID = 7
3,990,794 UART: [idev] UDS.KEYID = 0
3,991,779 ready_for_fw is high
3,991,985 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,593 UART: [idev] Erasing UDS.KEYID = 0
7,326,460 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,668 UART: [idev] --
7,353,910 UART: [ldev] ++
7,354,482 UART: [ldev] CDI.KEYID = 6
7,355,440 UART: [ldev] SUBJECT.KEYID = 5
7,356,648 UART: [ldev] AUTHORITY.KEYID = 7
7,357,932 UART: [ldev] FE.KEYID = 1
7,402,810 UART: [ldev] Erasing FE.KEYID = 1
10,733,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,148 UART: [ldev] --
13,095,577 UART: [fwproc] Waiting for Commands...
13,098,896 UART: [fwproc] Received command 0x46574c44
13,101,084 UART: [fwproc] Received Image of size 114036 bytes
17,149,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,502 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,609,674 >>> mbox cmd response: success
17,612,995 UART: [afmc] ++
17,613,592 UART: [afmc] CDI.KEYID = 6
17,614,469 UART: [afmc] SUBJECT.KEYID = 7
17,615,736 UART: [afmc] AUTHORITY.KEYID = 5
20,986,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,439 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,718 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,113 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,947 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,433 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,945 UART: [afmc] --
23,360,451 UART: [cold-reset] --
23,363,179 UART: [state] Locking Datavault
23,369,666 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,358 UART: [state] Locking ICCM
23,372,584 UART: [exit] Launching FMC @ 0x40000130
23,380,979 UART:
23,381,218 UART: Running Caliptra FMC ...
23,382,311 UART:
23,382,463 UART: [state] CFI Enabled
23,448,252 UART: [fht] FMC Alias Private Key: 7
25,785,407 UART: [art] Extend RT PCRs Done
25,786,620 UART: [art] Lock RT PCRs Done
25,788,507 UART: [art] Populate DV Done
25,794,075 UART: [fht] FMC Alias Private Key: 7
25,795,716 UART: [art] Derive CDI
25,796,523 UART: [art] Store in in slot 0x4
25,855,294 UART: [art] Derive Key Pair
25,856,333 UART: [art] Store priv key in slot 0x5
29,148,801 UART: [art] Derive Key Pair - Done
29,162,338 UART: [art] Signing Cert with AUTHO
29,163,634 UART: RITY.KEYID = 7
31,451,527 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,030 UART: [art] PUB.X = F99DB2F44252BD2284207E35EB989344F6E93EFE603AC576E70EA33D200E8DFD610CAE5D64D4DE7B9DC951ADAACEFC1A
31,460,303 UART: [art] PUB.Y = C5721D40A46D35B35C3CB533C552136BD769132F6B6235D4399833219E07B52AA7E6AB4B2BCEF2D632CEE8D714084D50
31,467,502 UART: [art] SIG.R = D495352018B22A1E9C91E95112D43280607FA522F09FE0A31194EC773CD19565BD397A5006D391AF6BB57E4E34E21BF4
31,474,887 UART: [art] SIG.S = 4B176CE8F525A1B1DB2A3B5FF3C2F4D10170492F32F90CE5E9C9932C3B6967F5B98BBB894A96C0A4A2C189B8015DA682
32,780,313 UART: Caliptra RT
32,781,028 UART: [state] CFI Enabled
32,960,841 UART: [rt] RT listening for mailbox commands...
32,964,837 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,009,498 UART: [rt]cmd =0x4c4d5356, len=1672
33,423,580 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,832 writing to cptra_bootfsm_go
3,806,573 ready_for_fw is high
3,807,133 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,765 >>> mbox cmd response: success
23,574,949 UART:
23,575,341 UART: Running Caliptra FMC ...
23,576,473 UART:
23,576,623 UART: [state] CFI Enabled
23,641,521 UART: [fht] FMC Alias Private Key: 7
25,979,714 UART: [art] Extend RT PCRs Done
25,980,992 UART: [art] Lock RT PCRs Done
25,982,807 UART: [art] Populate DV Done
25,988,160 UART: [fht] FMC Alias Private Key: 7
25,989,857 UART: [art] Derive CDI
25,990,586 UART: [art] Store in in slot 0x4
26,050,607 UART: [art] Derive Key Pair
26,051,649 UART: [art] Store priv key in slot 0x5
29,344,267 UART: [art] Derive Key Pair - Done
29,357,278 UART: [art] Signing Cert with AUTHO
29,358,581 UART: RITY.KEYID = 7
31,646,324 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,833 UART: [art] PUB.X = DB0ABFDC8C7DC7DEF5D6FAC2347B98D68A613F99E0E91FE0278386EBB8F13EF25B90DEF3ECC9B010BA7F65D6CFB51EC0
31,655,136 UART: [art] PUB.Y = 031473AD317232C2D9F517402D26F16B6BBFD3A96771A48AB5050D3D4B099762D58A15D3BC6D5433AA8AC55C1EE13A50
31,662,379 UART: [art] SIG.R = FD86C9DEA0E5996FC984B8D5C13FE423EDC74248E43ECCE97B3AF32781D7C0B660DA355FB209BE1B773658995AF0A68E
31,669,746 UART: [art] SIG.S = BDFE53F671A8C5D67CD10C28D98C4AB70485EE64D26D1AF5360D980C302E7F14C8E3B86A20359DEB3BA5F99A1B700431
32,974,865 UART: Caliptra RT
32,975,565 UART: [state] CFI Enabled
33,137,474 UART: [rt] RT listening for mailbox commands...
33,141,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,185,893 UART: [rt]cmd =0x4c4d5356, len=1672
33,599,595 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,394 UART:
192,757 UART: Running Caliptra ROM ...
193,853 UART:
603,753 UART: [state] CFI Enabled
620,115 UART: [state] LifecycleState = Unprovisioned
622,053 UART: [state] DebugLocked = No
624,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,448 UART: [kat] SHA2-256
799,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,777 UART: [kat] ++
810,301 UART: [kat] sha1
821,340 UART: [kat] SHA2-256
824,038 UART: [kat] SHA2-384
829,750 UART: [kat] SHA2-512-ACC
832,119 UART: [kat] ECC-384
3,116,420 UART: [kat] HMAC-384Kdf
3,127,603 UART: [kat] LMS
4,317,721 UART: [kat] --
4,323,535 UART: [cold-reset] ++
4,324,681 UART: [fht] Storing FHT @ 0x50003400
4,335,588 UART: [idev] ++
4,336,151 UART: [idev] CDI.KEYID = 6
4,337,250 UART: [idev] SUBJECT.KEYID = 7
4,338,368 UART: [idev] UDS.KEYID = 0
4,339,455 ready_for_fw is high
4,339,678 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,811 UART: [idev] Erasing UDS.KEYID = 0
7,627,357 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,298 UART: [idev] --
7,652,339 UART: [ldev] ++
7,652,961 UART: [ldev] CDI.KEYID = 6
7,653,872 UART: [ldev] SUBJECT.KEYID = 5
7,655,105 UART: [ldev] AUTHORITY.KEYID = 7
7,656,391 UART: [ldev] FE.KEYID = 1
7,666,114 UART: [ldev] Erasing FE.KEYID = 1
10,953,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,916 UART: [ldev] --
13,311,811 UART: [fwproc] Waiting for Commands...
13,314,392 UART: [fwproc] Received command 0x46574c44
13,316,631 UART: [fwproc] Received Image of size 114036 bytes
17,373,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,616 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,990 >>> mbox cmd response: success
17,838,310 UART: [afmc] ++
17,838,905 UART: [afmc] CDI.KEYID = 6
17,839,870 UART: [afmc] SUBJECT.KEYID = 7
17,841,087 UART: [afmc] AUTHORITY.KEYID = 5
21,156,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,812 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,170 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,996 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,426 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,659 UART: [afmc] --
23,519,902 UART: [cold-reset] --
23,523,386 UART: [state] Locking Datavault
23,529,387 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,143 UART: [state] Locking ICCM
23,532,590 UART: [exit] Launching FMC @ 0x40000130
23,540,952 UART:
23,541,232 UART: Running Caliptra FMC ...
23,542,342 UART:
23,542,504 UART: [state] CFI Enabled
23,550,765 UART: [fht] FMC Alias Private Key: 7
25,881,352 UART: [art] Extend RT PCRs Done
25,882,573 UART: [art] Lock RT PCRs Done
25,884,144 UART: [art] Populate DV Done
25,889,451 UART: [fht] FMC Alias Private Key: 7
25,890,990 UART: [art] Derive CDI
25,891,750 UART: [art] Store in in slot 0x4
25,934,492 UART: [art] Derive Key Pair
25,935,497 UART: [art] Store priv key in slot 0x5
29,177,780 UART: [art] Derive Key Pair - Done
29,190,889 UART: [art] Signing Cert with AUTHO
29,192,196 UART: RITY.KEYID = 7
31,471,791 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,296 UART: [art] PUB.X = D7EC837B36FB3627677B9CE06832CD4DC509367E512781652D835A2C992B8D3C3399CC94EC6C8519A70F2B4EBA20D8DC
31,480,524 UART: [art] PUB.Y = A5D0D0AB5A2A3E81416D4D3474E411F13442DBF51806F21832F464DDEBBA47B0B72A5BCE17AB2CADC920882066ED425A
31,487,780 UART: [art] SIG.R = 0A08EBACCC8731B9EAD7C333BBE77E4D18D4447DAB010FFA0992F639F2848D433D3754A0641736D55D4966C29AA93D4E
31,495,154 UART: [art] SIG.S = 8E2AB88DFDD2FD5CAE32195E9C273A7DBF569F7F9B60E710AE63B2CF77F31EA3E6EB1CA82B643CDDF991509EC3869683
32,800,357 UART: Caliptra RT
32,801,079 UART: [state] CFI Enabled
32,918,343 UART: [rt] RT listening for mailbox commands...
32,922,340 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,966,646 UART: [rt]cmd =0x4c4d5356, len=1672
33,380,308 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,534 writing to cptra_bootfsm_go
4,144,739 ready_for_fw is high
4,145,132 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,092,558 >>> mbox cmd response: success
23,734,069 UART:
23,734,474 UART: Running Caliptra FMC ...
23,735,581 UART:
23,735,740 UART: [state] CFI Enabled
23,743,847 UART: [fht] FMC Alias Private Key: 7
26,074,813 UART: [art] Extend RT PCRs Done
26,076,050 UART: [art] Lock RT PCRs Done
26,077,855 UART: [art] Populate DV Done
26,083,093 UART: [fht] FMC Alias Private Key: 7
26,084,631 UART: [art] Derive CDI
26,085,374 UART: [art] Store in in slot 0x4
26,128,182 UART: [art] Derive Key Pair
26,129,183 UART: [art] Store priv key in slot 0x5
29,371,088 UART: [art] Derive Key Pair - Done
29,383,871 UART: [art] Signing Cert with AUTHO
29,385,175 UART: RITY.KEYID = 7
31,664,708 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,221 UART: [art] PUB.X = 03FA1E4593A02A40FCF2F5999AEDDEC81382D0540BA09C66EEA34BD1CE318B4F4A38318D849F8B62021263DA51572121
31,673,444 UART: [art] PUB.Y = 968B867E92881172C984C6C2D7C721E577FF47216D0C2BF5810D56D170F68D0954D810E6FF06437E802A0D93E9AA1059
31,680,656 UART: [art] SIG.R = 60562271284DCADFF137F9800F9AF3E614F1DEEEA88EF8819FE43D0CFEBA0A0D7F61A6F91723E8253A4707058CF197CB
31,688,084 UART: [art] SIG.S = DC63815452C674790DE031CC41701DC8CD25FA126577EA9DBD713C0ACEEC13F47CC7F280CBB0FF691EFBE92787CCF6EB
32,993,691 UART: Caliptra RT
32,994,395 UART: [state] CFI Enabled
33,113,346 UART: [rt] RT listening for mailbox commands...
33,117,356 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,162,030 UART: [rt]cmd =0x4c4d5356, len=1672
33,576,172 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
192,811 UART:
193,164 UART: Running Caliptra ROM ...
194,364 UART:
194,540 UART: [state] CFI Enabled
263,947 UART: [state] LifecycleState = Unprovisioned
265,799 UART: [state] DebugLocked = No
267,270 UART: [state] WD Timer not started. Device not locked for debugging
270,311 UART: [kat] SHA2-256
449,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,988 UART: [kat] ++
461,528 UART: [kat] sha1
472,291 UART: [kat] SHA2-256
475,278 UART: [kat] SHA2-384
482,414 UART: [kat] SHA2-512-ACC
485,363 UART: [kat] ECC-384
2,946,183 UART: [kat] HMAC-384Kdf
2,970,235 UART: [kat] LMS
3,499,639 UART: [kat] --
3,502,954 UART: [cold-reset] ++
3,504,908 UART: [fht] FHT @ 0x50003400
3,515,131 UART: [idev] ++
3,515,741 UART: [idev] CDI.KEYID = 6
3,516,632 UART: [idev] SUBJECT.KEYID = 7
3,517,806 UART: [idev] UDS.KEYID = 0
3,518,710 ready_for_fw is high
3,518,931 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,680 UART: [idev] Erasing UDS.KEYID = 0
6,025,856 UART: [idev] Sha1 KeyId Algorithm
6,048,277 UART: [idev] --
6,051,359 UART: [ldev] ++
6,051,932 UART: [ldev] CDI.KEYID = 6
6,052,844 UART: [ldev] SUBJECT.KEYID = 5
6,054,003 UART: [ldev] AUTHORITY.KEYID = 7
6,055,239 UART: [ldev] FE.KEYID = 1
6,098,731 UART: [ldev] Erasing FE.KEYID = 1
8,601,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,277 UART: [ldev] --
10,411,391 UART: [fwproc] Wait for Commands...
10,413,703 UART: [fwproc] Recv command 0x46574c44
10,415,795 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,330 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,287,961 >>> mbox cmd response: success
14,292,668 UART: [afmc] ++
14,293,268 UART: [afmc] CDI.KEYID = 6
14,294,152 UART: [afmc] SUBJECT.KEYID = 7
14,295,387 UART: [afmc] AUTHORITY.KEYID = 5
16,828,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,239 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,624 UART: [afmc] --
18,624,538 UART: [cold-reset] --
18,626,720 UART: [state] Locking Datavault
18,630,508 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,301 UART: [state] Locking ICCM
18,633,484 UART: [exit] Launching FMC @ 0x40000130
18,641,883 UART:
18,642,117 UART: Running Caliptra FMC ...
18,643,215 UART:
18,643,391 UART: [state] CFI Enabled
18,707,974 UART: [fht] FMC Alias Private Key: 7
20,472,006 UART: [art] Extend RT PCRs Done
20,473,227 UART: [art] Lock RT PCRs Done
20,474,880 UART: [art] Populate DV Done
20,480,505 UART: [fht] FMC Alias Private Key: 7
20,482,093 UART: [art] Derive CDI
20,482,836 UART: [art] Store in in slot 0x4
20,540,948 UART: [art] Derive Key Pair
20,541,951 UART: [art] Store priv key in slot 0x5
23,005,187 UART: [art] Derive Key Pair - Done
23,018,029 UART: [art] Signing Cert with AUTHO
23,019,334 UART: RITY.KEYID = 7
24,730,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,364 UART: [art] PUB.X = DD8ED6819D0E17B9E2560D2BC7C1FE8746DB31CB2E72174791BA3A477D03C7274CB07D5D6A3C872240F754A81BC720BE
24,739,634 UART: [art] PUB.Y = 11941CF9F7371D23A799705CFD682DA903348F82E2C0C8950FDF9BFADF78EE6DD08D886A25B0F83D61AC9C5BBF842DF3
24,746,911 UART: [art] SIG.R = B609475FED633EEEF10478B838D676DD6F78DA4465FC52FB452D0358A698D4B93780CFF521840E68B94B754CB11D48C6
24,754,283 UART: [art] SIG.S = 7B05B36140DFEACDF47659EF468C3D254AF08CA1EB27B8D4C57CCB84B963603E164660F54D14AA421A838363ED6E9C06
25,733,429 UART: Caliptra RT
25,734,142 UART: [state] CFI Enabled
25,899,162 UART: [rt] RT listening for mailbox commands...
25,903,103 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,947,350 UART: [rt]cmd =0x4c4d5356, len=1672
26,148,776 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,515 writing to cptra_bootfsm_go
192,620 UART:
192,984 UART: Running Caliptra ROM ...
194,174 UART:
194,328 UART: [state] CFI Enabled
260,843 UART: [state] LifecycleState = Unprovisioned
263,209 UART: [state] DebugLocked = No
264,589 UART: [state] WD Timer not started. Device not locked for debugging
268,592 UART: [kat] SHA2-256
458,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,218 UART: [kat] ++
469,663 UART: [kat] sha1
480,769 UART: [kat] SHA2-256
483,782 UART: [kat] SHA2-384
490,341 UART: [kat] SHA2-512-ACC
492,923 UART: [kat] ECC-384
2,947,491 UART: [kat] HMAC-384Kdf
2,970,522 UART: [kat] LMS
3,502,278 UART: [kat] --
3,507,260 UART: [cold-reset] ++
3,509,264 UART: [fht] FHT @ 0x50003400
3,519,889 UART: [idev] ++
3,520,605 UART: [idev] CDI.KEYID = 6
3,521,485 UART: [idev] SUBJECT.KEYID = 7
3,522,730 UART: [idev] UDS.KEYID = 0
3,523,634 ready_for_fw is high
3,523,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,643 UART: [idev] Erasing UDS.KEYID = 0
6,025,459 UART: [idev] Sha1 KeyId Algorithm
6,048,064 UART: [idev] --
6,052,928 UART: [ldev] ++
6,053,608 UART: [ldev] CDI.KEYID = 6
6,054,501 UART: [ldev] SUBJECT.KEYID = 5
6,055,714 UART: [ldev] AUTHORITY.KEYID = 7
6,056,949 UART: [ldev] FE.KEYID = 1
6,100,382 UART: [ldev] Erasing FE.KEYID = 1
8,604,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,716 UART: [ldev] --
10,413,193 UART: [fwproc] Wait for Commands...
10,416,101 UART: [fwproc] Recv command 0x46574c44
10,418,436 UART: [fwproc] Recv'd Img size: 114360 bytes
13,864,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,596,651 >>> mbox cmd response: success
14,600,038 UART: [afmc] ++
14,600,756 UART: [afmc] CDI.KEYID = 6
14,601,950 UART: [afmc] SUBJECT.KEYID = 7
14,603,390 UART: [afmc] AUTHORITY.KEYID = 5
17,151,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,283 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,028 UART: [afmc] --
18,967,915 UART: [cold-reset] --
18,972,053 UART: [state] Locking Datavault
18,976,459 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,665 UART: [state] Locking ICCM
18,980,387 UART: [exit] Launching FMC @ 0x40000130
18,989,073 UART:
18,989,350 UART: Running Caliptra FMC ...
18,990,387 UART:
18,990,539 UART: [state] CFI Enabled
19,050,523 UART: [fht] FMC Alias Private Key: 7
20,814,098 UART: [art] Extend RT PCRs Done
20,815,315 UART: [art] Lock RT PCRs Done
20,817,342 UART: [art] Populate DV Done
20,823,022 UART: [fht] FMC Alias Private Key: 7
20,824,725 UART: [art] Derive CDI
20,825,712 UART: [art] Store in in slot 0x4
20,882,024 UART: [art] Derive Key Pair
20,883,032 UART: [art] Store priv key in slot 0x5
23,345,817 UART: [art] Derive Key Pair - Done
23,358,317 UART: [art] Signing Cert with AUTHO
23,359,621 UART: RITY.KEYID = 7
25,071,110 UART: [art] Erasing AUTHORITY.KEYID = 7
25,072,619 UART: [art] PUB.X = 38FF5A96855673958622320D3245A6B264DE2C5818A5326054C3BC1BC44BDA3D5DCDD72B85FBD609B331357F442EF656
25,079,851 UART: [art] PUB.Y = 1896E85F7E9AFD168CA65559FC6F8045E61F30088F7BD5B3E8877BD0BFC3C7D9B1F0B308DF6DDEAE88BAB2CEECED9933
25,087,124 UART: [art] SIG.R = 18156237D66AB763EF91C435A49D493144F1EA2B54AE2D1B5A06ACEE788919D0471319E2A153658F5D5DD00CBF1BBC1D
25,094,499 UART: [art] SIG.S = FA680E1045D4BEE29CE05FFC58F2837E89CC993BB361FC0FF22F7A130B0491795125B768A08A456F1B0ED9D8E9E4BC2A
26,073,382 UART: Caliptra RT
26,074,071 UART: [state] CFI Enabled
26,237,671 UART: [rt] RT listening for mailbox commands...
26,241,664 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,285,858 UART: [rt]cmd =0x4c4d5356, len=1672
26,487,440 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,439,664 ready_for_fw is high
3,440,074 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,724,679 >>> mbox cmd response: success
19,025,597 UART:
19,026,007 UART: Running Caliptra FMC ...
19,027,127 UART:
19,027,301 UART: [state] CFI Enabled
19,092,670 UART: [fht] FMC Alias Private Key: 7
20,857,207 UART: [art] Extend RT PCRs Done
20,858,440 UART: [art] Lock RT PCRs Done
20,860,203 UART: [art] Populate DV Done
20,865,674 UART: [fht] FMC Alias Private Key: 7
20,867,381 UART: [art] Derive CDI
20,868,198 UART: [art] Store in in slot 0x4
20,925,250 UART: [art] Derive Key Pair
20,926,293 UART: [art] Store priv key in slot 0x5
23,389,430 UART: [art] Derive Key Pair - Done
23,402,317 UART: [art] Signing Cert with AUTHO
23,403,624 UART: RITY.KEYID = 7
25,114,420 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,934 UART: [art] PUB.X = 5CD35757C1F9E8FF91442B95E9F5D7A47F777163CFBE3CF1CC474177C4659427E2DE932C6BB96157EA58859B1E80F369
25,123,147 UART: [art] PUB.Y = D0D1CE79576E5F7392D42ECB0688ED1547E5373CFC07FCF02543F6B03B5565F2E667BBA357F74BF066D9B864D1770E3E
25,130,470 UART: [art] SIG.R = 6DB966F400795FF578E458FA6A4A7D52CFF02D8BB0CF0C728F8641D733653E87693912A9AA43B02A5C0458B55254FC9D
25,137,780 UART: [art] SIG.S = 776D78E2FCCC64E5146882198ACC51E2E8E214250ACDC0E8EB51F2C025FAF5F51659C58508AF04F78727831723BF026F
26,116,898 UART: Caliptra RT
26,117,595 UART: [state] CFI Enabled
26,281,568 UART: [rt] RT listening for mailbox commands...
26,285,569 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,329,981 UART: [rt]cmd =0x4c4d5356, len=1672
26,531,777 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,391 UART:
192,749 UART: Running Caliptra ROM ...
193,952 UART:
603,472 UART: [state] CFI Enabled
618,290 UART: [state] LifecycleState = Unprovisioned
620,648 UART: [state] DebugLocked = No
622,548 UART: [state] WD Timer not started. Device not locked for debugging
627,146 UART: [kat] SHA2-256
817,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,847 UART: [kat] ++
828,444 UART: [kat] sha1
840,103 UART: [kat] SHA2-256
843,113 UART: [kat] SHA2-384
848,676 UART: [kat] SHA2-512-ACC
851,257 UART: [kat] ECC-384
3,296,074 UART: [kat] HMAC-384Kdf
3,308,734 UART: [kat] LMS
3,840,544 UART: [kat] --
3,845,549 UART: [cold-reset] ++
3,846,558 UART: [fht] FHT @ 0x50003400
3,859,167 UART: [idev] ++
3,859,808 UART: [idev] CDI.KEYID = 6
3,860,838 UART: [idev] SUBJECT.KEYID = 7
3,861,960 UART: [idev] UDS.KEYID = 0
3,862,883 ready_for_fw is high
3,863,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,684 UART: [idev] Erasing UDS.KEYID = 0
6,339,078 UART: [idev] Sha1 KeyId Algorithm
6,361,010 UART: [idev] --
6,365,925 UART: [ldev] ++
6,366,652 UART: [ldev] CDI.KEYID = 6
6,367,562 UART: [ldev] SUBJECT.KEYID = 5
6,368,721 UART: [ldev] AUTHORITY.KEYID = 7
6,369,951 UART: [ldev] FE.KEYID = 1
6,379,485 UART: [ldev] Erasing FE.KEYID = 1
8,862,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,115 UART: [ldev] --
10,652,791 UART: [fwproc] Wait for Commands...
10,655,909 UART: [fwproc] Recv command 0x46574c44
10,658,216 UART: [fwproc] Recv'd Img size: 114360 bytes
14,109,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,851,904 >>> mbox cmd response: success
14,855,943 UART: [afmc] ++
14,856,651 UART: [afmc] CDI.KEYID = 6
14,857,832 UART: [afmc] SUBJECT.KEYID = 7
14,859,537 UART: [afmc] AUTHORITY.KEYID = 5
17,360,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,761 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,762 UART: [afmc] --
19,156,732 UART: [cold-reset] --
19,161,833 UART: [state] Locking Datavault
19,166,978 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,106 UART: [state] Locking ICCM
19,171,744 UART: [exit] Launching FMC @ 0x40000130
19,180,389 UART:
19,180,664 UART: Running Caliptra FMC ...
19,181,706 UART:
19,181,852 UART: [state] CFI Enabled
19,190,063 UART: [fht] FMC Alias Private Key: 7
20,947,819 UART: [art] Extend RT PCRs Done
20,949,025 UART: [art] Lock RT PCRs Done
20,950,724 UART: [art] Populate DV Done
20,956,125 UART: [fht] FMC Alias Private Key: 7
20,957,761 UART: [art] Derive CDI
20,958,496 UART: [art] Store in in slot 0x4
21,001,137 UART: [art] Derive Key Pair
21,002,135 UART: [art] Store priv key in slot 0x5
23,428,999 UART: [art] Derive Key Pair - Done
23,441,889 UART: [art] Signing Cert with AUTHO
23,443,195 UART: RITY.KEYID = 7
25,148,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,026 UART: [art] PUB.X = E3BCBFB1A253852B1252B1F074E7FADC4422D6C9DE5E195C419906AEC2DAFBBB0083535FC23EB88061D3991C2892D25F
25,157,298 UART: [art] PUB.Y = 7034EBBE9A564DDD0714D664A4EE1DFF45B0E212EA41516E61C40A2D23E3E0E7741F6D368A6A1F880A2EF80C7AE5DD77
25,164,591 UART: [art] SIG.R = 9F1DB76E75F2B7C2F0C05D7190DFCF9060401CE3570B7887C594D43BE5D9223A013874010B01BB37E2C56282322A557D
25,171,928 UART: [art] SIG.S = C74CA984337D44CE2EC26DCB716248528C2030C7432F5F8C9375F81ACEF139AEB223895DDDAE5AC1041E440C89FFB01A
26,150,655 UART: Caliptra RT
26,151,353 UART: [state] CFI Enabled
26,268,300 UART: [rt] RT listening for mailbox commands...
26,272,302 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,317,077 UART: [rt]cmd =0x4c4d5356, len=1672
26,518,712 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,758,231 ready_for_fw is high
3,758,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,969,225 >>> mbox cmd response: success
19,222,726 UART:
19,223,114 UART: Running Caliptra FMC ...
19,224,249 UART:
19,224,406 UART: [state] CFI Enabled
19,232,447 UART: [fht] FMC Alias Private Key: 7
20,989,219 UART: [art] Extend RT PCRs Done
20,990,451 UART: [art] Lock RT PCRs Done
20,992,292 UART: [art] Populate DV Done
20,997,648 UART: [fht] FMC Alias Private Key: 7
20,999,240 UART: [art] Derive CDI
20,999,978 UART: [art] Store in in slot 0x4
21,042,567 UART: [art] Derive Key Pair
21,043,566 UART: [art] Store priv key in slot 0x5
23,470,514 UART: [art] Derive Key Pair - Done
23,483,296 UART: [art] Signing Cert with AUTHO
23,484,599 UART: RITY.KEYID = 7
25,190,453 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,963 UART: [art] PUB.X = 698A1C524463C2951AE643CD36F135E23E042D14A4155465CF9CD53C3DDDFDDBAB33DD5FA43C9F9DB54D501B19933697
25,199,239 UART: [art] PUB.Y = C0A3CE3FBBB7AD7C81DE04569B43C0084E670B0CD981788F217A910FAAD2976FC595A699D0351787468C0F356F43A139
25,206,501 UART: [art] SIG.R = 6315E0AE516BF01F99CA0FA47E822DD7B3124EF6D90C08B24E38DC79F8DBFA66675535B8DA754DCF166E03E1874DEACC
25,213,898 UART: [art] SIG.S = EC6692EBCCDAF9CA7583F807CA591F155209E96738A721F43C0B17C0F784B749199E948851A1403C50E5EBDB20F505A8
26,192,743 UART: Caliptra RT
26,193,433 UART: [state] CFI Enabled
26,310,060 UART: [rt] RT listening for mailbox commands...
26,314,005 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,358,588 UART: [rt]cmd =0x4c4d5356, len=1672
26,560,220 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
895,028 UART: [kat] SHA2-512-ACC
896,929 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,476,095 UART: [cold-reset] ++
1,476,621 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 ready_for_fw is high
1,480,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,344 UART: [idev] Erasing UDS.KEYID = 0
1,505,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,676 UART: [idev] --
1,514,811 UART: [ldev] ++
1,514,979 UART: [ldev] CDI.KEYID = 6
1,515,342 UART: [ldev] SUBJECT.KEYID = 5
1,515,768 UART: [ldev] AUTHORITY.KEYID = 7
1,516,231 UART: [ldev] FE.KEYID = 1
1,521,357 UART: [ldev] Erasing FE.KEYID = 1
1,547,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,174 UART: [ldev] --
1,586,465 UART: [fwproc] Waiting for Commands...
1,587,328 UART: [fwproc] Received command 0x46574c44
1,588,119 UART: [fwproc] Received Image of size 114360 bytes
2,886,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,325 >>> mbox cmd response: success
3,080,455 UART: [afmc] ++
3,080,623 UART: [afmc] CDI.KEYID = 6
3,080,985 UART: [afmc] SUBJECT.KEYID = 7
3,081,410 UART: [afmc] AUTHORITY.KEYID = 5
3,116,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,760 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,450 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,175 UART: [afmc] --
3,159,081 UART: [cold-reset] --
3,159,781 UART: [state] Locking Datavault
3,161,032 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,636 UART: [state] Locking ICCM
3,162,088 UART: [exit] Launching FMC @ 0x40000130
3,167,417 UART:
3,167,433 UART: Running Caliptra FMC ...
3,167,841 UART:
3,167,895 UART: [state] CFI Enabled
3,178,654 UART: [fht] FMC Alias Private Key: 7
3,286,549 UART: [art] Extend RT PCRs Done
3,286,977 UART: [art] Lock RT PCRs Done
3,288,883 UART: [art] Populate DV Done
3,297,108 UART: [fht] FMC Alias Private Key: 7
3,298,150 UART: [art] Derive CDI
3,298,430 UART: [art] Store in in slot 0x4
3,384,117 UART: [art] Derive Key Pair
3,384,477 UART: [art] Store priv key in slot 0x5
3,397,171 UART: [art] Derive Key Pair - Done
3,411,924 UART: [art] Signing Cert with AUTHO
3,412,404 UART: RITY.KEYID = 7
3,427,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,889 UART: [art] PUB.X = 5244C842C380D99EA028DB4A610EA88DFD589705302A38DA1CE72126CF46F17C00555D8F240EC6DC9EC4A7B107F8D7F5
3,434,633 UART: [art] PUB.Y = B23B13F405A034ACA96AFD333876E51CF7A536CBE2437849220744BF67A7800125F914112B3464A9C356F9D604ACF96B
3,441,569 UART: [art] SIG.R = D1BC6BE43DE108849461FBDD910486D495E435A49C93ADBD8A5C67B2C8F27577DF0602DC9A32F0F7F937FE8495E13809
3,448,332 UART: [art] SIG.S = 962544AC57A1E2892598A676DA5BBFE7C0B3D1DE1AAD1D65F843243E5C36EA0D88B76D45285C2FFF89C9221C59BA1F04
3,472,087 UART: Caliptra RT
3,472,341 UART: [state] CFI Enabled
3,580,340 UART: [rt] RT listening for mailbox commands...
3,581,010 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,415 UART: [rt]cmd =0x4c4d5356, len=1672
3,873,957 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,447 ready_for_fw is high
1,362,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,393 >>> mbox cmd response: success
2,988,141 UART:
2,988,157 UART: Running Caliptra FMC ...
2,988,565 UART:
2,988,619 UART: [state] CFI Enabled
2,998,680 UART: [fht] FMC Alias Private Key: 7
3,106,401 UART: [art] Extend RT PCRs Done
3,106,829 UART: [art] Lock RT PCRs Done
3,108,405 UART: [art] Populate DV Done
3,116,500 UART: [fht] FMC Alias Private Key: 7
3,117,532 UART: [art] Derive CDI
3,117,812 UART: [art] Store in in slot 0x4
3,203,389 UART: [art] Derive Key Pair
3,203,749 UART: [art] Store priv key in slot 0x5
3,217,059 UART: [art] Derive Key Pair - Done
3,231,543 UART: [art] Signing Cert with AUTHO
3,232,023 UART: RITY.KEYID = 7
3,247,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,966 UART: [art] PUB.X = 999700452060F2A4C3B10E083FE8FC6E1584A8E73C584A4D0D20A14F5BEC0C65E09CB6AB5038F1E480CD115C4B4C8074
3,254,708 UART: [art] PUB.Y = 475EFC11842BC233028D764C7D5925688B7EE0C61C8AB13A61B8F2F7BD8C4001E1543529AEDFEA4B143F995B0A1AAACC
3,261,663 UART: [art] SIG.R = A345430C66E1B0CDAD8856D5690E20FCD32092F69F645A3282EEF91F335110486E2EAEE7A16CC60A562D064F222A3285
3,268,423 UART: [art] SIG.S = 4A822A536459908F7875C59F576881A4C58102CDAE7999DF9B910C624F50659F608B9111DAB70C3046623B95B89D38FC
3,292,127 UART: Caliptra RT
3,292,381 UART: [state] CFI Enabled
3,401,475 UART: [rt] RT listening for mailbox commands...
3,402,145 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,492 UART: [rt]cmd =0x4c4d5356, len=1672
3,694,798 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,828 UART: [kat] SHA2-256
881,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,874 UART: [kat] ++
886,026 UART: [kat] sha1
890,190 UART: [kat] SHA2-256
892,128 UART: [kat] SHA2-384
895,075 UART: [kat] SHA2-512-ACC
896,976 UART: [kat] ECC-384
902,637 UART: [kat] HMAC-384Kdf
907,331 UART: [kat] LMS
1,475,527 UART: [kat] --
1,476,128 UART: [cold-reset] ++
1,476,668 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 ready_for_fw is high
1,480,784 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,517 UART: [idev] Erasing UDS.KEYID = 0
1,504,875 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,535 UART: [idev] --
1,514,542 UART: [ldev] ++
1,514,710 UART: [ldev] CDI.KEYID = 6
1,515,073 UART: [ldev] SUBJECT.KEYID = 5
1,515,499 UART: [ldev] AUTHORITY.KEYID = 7
1,515,962 UART: [ldev] FE.KEYID = 1
1,521,288 UART: [ldev] Erasing FE.KEYID = 1
1,546,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,849 UART: [ldev] --
1,585,190 UART: [fwproc] Waiting for Commands...
1,585,911 UART: [fwproc] Received command 0x46574c44
1,586,702 UART: [fwproc] Received Image of size 114360 bytes
2,884,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,379 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,670 >>> mbox cmd response: success
3,077,698 UART: [afmc] ++
3,077,866 UART: [afmc] CDI.KEYID = 6
3,078,228 UART: [afmc] SUBJECT.KEYID = 7
3,078,653 UART: [afmc] AUTHORITY.KEYID = 5
3,113,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,515 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,205 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,912 UART: [afmc] --
3,156,798 UART: [cold-reset] --
3,157,524 UART: [state] Locking Datavault
3,158,431 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,035 UART: [state] Locking ICCM
3,159,707 UART: [exit] Launching FMC @ 0x40000130
3,165,036 UART:
3,165,052 UART: Running Caliptra FMC ...
3,165,460 UART:
3,165,603 UART: [state] CFI Enabled
3,176,118 UART: [fht] FMC Alias Private Key: 7
3,284,341 UART: [art] Extend RT PCRs Done
3,284,769 UART: [art] Lock RT PCRs Done
3,286,367 UART: [art] Populate DV Done
3,294,594 UART: [fht] FMC Alias Private Key: 7
3,295,618 UART: [art] Derive CDI
3,295,898 UART: [art] Store in in slot 0x4
3,381,671 UART: [art] Derive Key Pair
3,382,031 UART: [art] Store priv key in slot 0x5
3,395,647 UART: [art] Derive Key Pair - Done
3,410,256 UART: [art] Signing Cert with AUTHO
3,410,736 UART: RITY.KEYID = 7
3,425,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,739 UART: [art] PUB.X = 74FF66F8CFF1F7DB94448DD8CD742E1166AC4F543E2023D59F15D02F1B0EF9E2EB0C162AAF5892BC2BBD8EDD0D041A5B
3,433,521 UART: [art] PUB.Y = B6B2CE0A033D28A9E3D251BE80351B85A5558DB0D463F40A642E0F56B360D553D9E2F37B4330D58BD387FC9E55A4E260
3,440,465 UART: [art] SIG.R = 1316BECA3AAD9BF884EC747B280060DB9CE21876C24E3DC996ACEFF24E99C0B1C306E65EB171C8332640B69B57D759FA
3,447,224 UART: [art] SIG.S = 4B25EC973DD4864600C6298E854C98080E2BE1C1EFF71E70E5145E22D739BA3FCCD3C2C6F4B81E3929C4634534EBB0FA
3,470,221 UART: Caliptra RT
3,470,567 UART: [state] CFI Enabled
3,579,054 UART: [rt] RT listening for mailbox commands...
3,579,724 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,149 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,721 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,188 ready_for_fw is high
1,362,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,548 >>> mbox cmd response: success
2,989,402 UART:
2,989,418 UART: Running Caliptra FMC ...
2,989,826 UART:
2,989,969 UART: [state] CFI Enabled
3,000,554 UART: [fht] FMC Alias Private Key: 7
3,108,311 UART: [art] Extend RT PCRs Done
3,108,739 UART: [art] Lock RT PCRs Done
3,110,361 UART: [art] Populate DV Done
3,118,566 UART: [fht] FMC Alias Private Key: 7
3,119,524 UART: [art] Derive CDI
3,119,804 UART: [art] Store in in slot 0x4
3,205,735 UART: [art] Derive Key Pair
3,206,095 UART: [art] Store priv key in slot 0x5
3,219,575 UART: [art] Derive Key Pair - Done
3,234,694 UART: [art] Signing Cert with AUTHO
3,235,174 UART: RITY.KEYID = 7
3,250,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,119 UART: [art] PUB.X = 25A2F5E927073E4B58643373BEB6B34E0DBC15A4B88A782165C4A69E7BEE8D999F32159C22D58D5535C7154DE773DFA8
3,257,887 UART: [art] PUB.Y = D2FC0104AF3D748D11E2AEF04E1B61868FB329CDDBB5622159D8DD8F6227D54A900CC947480C6B751E9D1E9B37EF72A9
3,264,837 UART: [art] SIG.R = 5050C921EFD163F0CCA89106B50702E0A7E6B702672D022FBB035F727141B62B6F7343A60252BDD942CD1AB41609487E
3,271,581 UART: [art] SIG.S = 33F624876D9E260C3B6C01A3F2061080CD389E99FEF069B8E68791BA2666EBDD29D001671365239A834C8345F8D68A89
3,295,032 UART: Caliptra RT
3,295,378 UART: [state] CFI Enabled
3,403,715 UART: [rt] RT listening for mailbox commands...
3,404,385 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,634 UART: [rt]cmd =0x4c4d5356, len=1672
3,697,458 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
892,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,989 UART: [kat] ++
897,141 UART: [kat] sha1
901,491 UART: [kat] SHA2-256
903,431 UART: [kat] SHA2-384
906,170 UART: [kat] SHA2-512-ACC
908,071 UART: [kat] ECC-384
917,942 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,171,869 UART: [cold-reset] ++
1,172,327 UART: [fht] FHT @ 0x50003400
1,175,076 UART: [idev] ++
1,175,244 UART: [idev] CDI.KEYID = 6
1,175,604 UART: [idev] SUBJECT.KEYID = 7
1,176,028 UART: [idev] UDS.KEYID = 0
1,176,373 ready_for_fw is high
1,176,373 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,250 UART: [idev] Erasing UDS.KEYID = 0
1,201,183 UART: [idev] Sha1 KeyId Algorithm
1,209,569 UART: [idev] --
1,210,639 UART: [ldev] ++
1,210,807 UART: [ldev] CDI.KEYID = 6
1,211,170 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,345 UART: [ldev] --
1,282,798 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,902 >>> mbox cmd response: success
2,775,064 UART: [afmc] ++
2,775,232 UART: [afmc] CDI.KEYID = 6
2,775,594 UART: [afmc] SUBJECT.KEYID = 7
2,776,019 UART: [afmc] AUTHORITY.KEYID = 5
2,811,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,845 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,507 UART: [afmc] --
2,854,399 UART: [cold-reset] --
2,855,085 UART: [state] Locking Datavault
2,856,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,658 UART: [state] Locking ICCM
2,857,130 UART: [exit] Launching FMC @ 0x40000130
2,862,459 UART:
2,862,475 UART: Running Caliptra FMC ...
2,862,883 UART:
2,862,937 UART: [state] CFI Enabled
2,873,560 UART: [fht] FMC Alias Private Key: 7
2,981,183 UART: [art] Extend RT PCRs Done
2,981,611 UART: [art] Lock RT PCRs Done
2,982,789 UART: [art] Populate DV Done
2,991,100 UART: [fht] FMC Alias Private Key: 7
2,992,258 UART: [art] Derive CDI
2,992,538 UART: [art] Store in in slot 0x4
3,078,257 UART: [art] Derive Key Pair
3,078,617 UART: [art] Store priv key in slot 0x5
3,091,087 UART: [art] Derive Key Pair - Done
3,105,707 UART: [art] Signing Cert with AUTHO
3,106,187 UART: RITY.KEYID = 7
3,121,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,206 UART: [art] PUB.X = DCE33E40311CB52927B3FD7E6A73A09C8DF243306483C348BB7435A40AA24819BAB4E60833BA44BAF0B6D658D049F287
3,128,976 UART: [art] PUB.Y = 40987F4EA2F7B96DEAC172D3E660F27129DB27D96F92F3100496E6364E6C3276177C6C3EF6E91B8EF83BE12BB840FD3B
3,135,931 UART: [art] SIG.R = 112AA53F8FE58D31EAF8FB95A2C79A8B5036E85C1010EC72DAC6D2B99FCF1EF09AF443B652BD8E495CA0CA0C30BAE00E
3,142,721 UART: [art] SIG.S = 66B7666B296B9C3D2D5D7B68386811046336AC404BCFA8944DB061A559CA96496FFE72741C7060E616A125611CF7C9E6
3,166,983 UART: Caliptra RT
3,167,237 UART: [state] CFI Enabled
3,274,179 UART: [rt] RT listening for mailbox commands...
3,274,849 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,126 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,744 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 ready_for_fw is high
1,059,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,065 >>> mbox cmd response: success
2,687,971 UART:
2,687,987 UART: Running Caliptra FMC ...
2,688,395 UART:
2,688,449 UART: [state] CFI Enabled
2,699,000 UART: [fht] FMC Alias Private Key: 7
2,807,157 UART: [art] Extend RT PCRs Done
2,807,585 UART: [art] Lock RT PCRs Done
2,808,819 UART: [art] Populate DV Done
2,816,994 UART: [fht] FMC Alias Private Key: 7
2,818,124 UART: [art] Derive CDI
2,818,404 UART: [art] Store in in slot 0x4
2,904,083 UART: [art] Derive Key Pair
2,904,443 UART: [art] Store priv key in slot 0x5
2,917,323 UART: [art] Derive Key Pair - Done
2,931,943 UART: [art] Signing Cert with AUTHO
2,932,423 UART: RITY.KEYID = 7
2,947,447 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,212 UART: [art] PUB.X = 6CEC1266D96635327997913B1800675B50CD0F3A96CF68600D525B7829511F6C119D9C74906902C6291BA466C4E0836C
2,954,937 UART: [art] PUB.Y = 3CC0DFD7214651FE66C3C920D1CAE718163FE59A31D195F0C368DAC941EFD698BFAF7C8A015A19B311A83C93E57E1F80
2,961,898 UART: [art] SIG.R = 83D0F97135C9AA48B46DBB2235334104C6F277810673B8489B92AA2ADD50965A9D49694B045CF1A5DF43C507F14E7B66
2,968,654 UART: [art] SIG.S = 4FCC240806D5669412C3BE82F336D70A179D5C62B54D40240336ABB2CE1990DBE10A9BFA0D5E93A460669C0796320635
2,992,295 UART: Caliptra RT
2,992,549 UART: [state] CFI Enabled
3,100,165 UART: [rt] RT listening for mailbox commands...
3,100,835 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,404 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,936 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,534 UART: [kat] SHA2-256
904,474 UART: [kat] SHA2-384
907,291 UART: [kat] SHA2-512-ACC
909,192 UART: [kat] ECC-384
919,387 UART: [kat] HMAC-384Kdf
924,153 UART: [kat] LMS
1,172,481 UART: [kat] --
1,173,428 UART: [cold-reset] ++
1,173,760 UART: [fht] FHT @ 0x50003400
1,176,445 UART: [idev] ++
1,176,613 UART: [idev] CDI.KEYID = 6
1,176,973 UART: [idev] SUBJECT.KEYID = 7
1,177,397 UART: [idev] UDS.KEYID = 0
1,177,742 ready_for_fw is high
1,177,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,401 UART: [idev] Erasing UDS.KEYID = 0
1,202,098 UART: [idev] Sha1 KeyId Algorithm
1,210,450 UART: [idev] --
1,211,642 UART: [ldev] ++
1,211,810 UART: [ldev] CDI.KEYID = 6
1,212,173 UART: [ldev] SUBJECT.KEYID = 5
1,212,599 UART: [ldev] AUTHORITY.KEYID = 7
1,213,062 UART: [ldev] FE.KEYID = 1
1,218,258 UART: [ldev] Erasing FE.KEYID = 1
1,244,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,148 UART: [ldev] --
1,283,663 UART: [fwproc] Wait for Commands...
1,284,319 UART: [fwproc] Recv command 0x46574c44
1,285,047 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,949 >>> mbox cmd response: success
2,777,079 UART: [afmc] ++
2,777,247 UART: [afmc] CDI.KEYID = 6
2,777,609 UART: [afmc] SUBJECT.KEYID = 7
2,778,034 UART: [afmc] AUTHORITY.KEYID = 5
2,813,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,213 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,932 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,600 UART: [afmc] --
2,856,646 UART: [cold-reset] --
2,857,580 UART: [state] Locking Datavault
2,858,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,365 UART: [state] Locking ICCM
2,859,839 UART: [exit] Launching FMC @ 0x40000130
2,865,168 UART:
2,865,184 UART: Running Caliptra FMC ...
2,865,592 UART:
2,865,735 UART: [state] CFI Enabled
2,876,312 UART: [fht] FMC Alias Private Key: 7
2,984,463 UART: [art] Extend RT PCRs Done
2,984,891 UART: [art] Lock RT PCRs Done
2,986,241 UART: [art] Populate DV Done
2,994,456 UART: [fht] FMC Alias Private Key: 7
2,995,556 UART: [art] Derive CDI
2,995,836 UART: [art] Store in in slot 0x4
3,081,641 UART: [art] Derive Key Pair
3,082,001 UART: [art] Store priv key in slot 0x5
3,095,943 UART: [art] Derive Key Pair - Done
3,110,564 UART: [art] Signing Cert with AUTHO
3,111,044 UART: RITY.KEYID = 7
3,126,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,883 UART: [art] PUB.X = D4764D9C75AD2CB0F3136E0AAD0E1F82E4434877706E379F877A4065A83E51A8FC263E4600D26105EAE94791652E4A38
3,133,620 UART: [art] PUB.Y = D28293CF9EF896802F51C365A00D45E9169741CA8E710A08ED2A7EAA25354BE423DC6539E6ED887C3B15DD4B8562CEA6
3,140,569 UART: [art] SIG.R = FEDC09001132D942229C047C903AB33AF6EE558D356EB5CD3652081BE94D3C09BF7C0A276482D7ADC1E80910E18F23D2
3,147,305 UART: [art] SIG.S = F692D5AA22EBBF8BD1D5C576EBE39D61857D6FB5A0306A903D12D790DB1F646F42818636333CAEE16052F62A9DD5DEBD
3,171,248 UART: Caliptra RT
3,171,594 UART: [state] CFI Enabled
3,279,551 UART: [rt] RT listening for mailbox commands...
3,280,221 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,586 UART: [rt]cmd =0x4c4d5356, len=1672
3,573,288 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,654 ready_for_fw is high
1,060,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,524 >>> mbox cmd response: success
2,689,716 UART:
2,689,732 UART: Running Caliptra FMC ...
2,690,140 UART:
2,690,283 UART: [state] CFI Enabled
2,700,638 UART: [fht] FMC Alias Private Key: 7
2,808,505 UART: [art] Extend RT PCRs Done
2,808,933 UART: [art] Lock RT PCRs Done
2,810,179 UART: [art] Populate DV Done
2,818,280 UART: [fht] FMC Alias Private Key: 7
2,819,376 UART: [art] Derive CDI
2,819,656 UART: [art] Store in in slot 0x4
2,905,525 UART: [art] Derive Key Pair
2,905,885 UART: [art] Store priv key in slot 0x5
2,919,965 UART: [art] Derive Key Pair - Done
2,934,906 UART: [art] Signing Cert with AUTHO
2,935,386 UART: RITY.KEYID = 7
2,950,730 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,495 UART: [art] PUB.X = 958AC022077D47492900A13EB8C08B8A38CAE30E4CEFC7E086A9028A5E4B25C546B9678D609ADBD4D993818E7F32B240
2,958,238 UART: [art] PUB.Y = 9DF6AA232D25B48A8761C59766D8116D32742199FB7653186B1A9DB0C1E1D841FB2C704687ECD418D74967561AB5AB09
2,965,183 UART: [art] SIG.R = D9F516733AF77C73944A64AE294FEA70EB88DFFE3169DEEA881659C2A2A4492FA82EAE26AB54D9C178E5837EC5290C0E
2,971,961 UART: [art] SIG.S = C682D3EB44846EAF2CB81B0E0EBB3391A2AD84D7FAB344F31E3D4EA6D08BBA5B40F0492FD7AFF89AD1320BAF6B6FC059
2,995,955 UART: Caliptra RT
2,996,301 UART: [state] CFI Enabled
3,104,436 UART: [rt] RT listening for mailbox commands...
3,105,106 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,489 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,851 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,174,123 ready_for_fw is high
1,174,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,589 UART: [idev] --
1,208,800 UART: [ldev] ++
1,208,968 UART: [ldev] CDI.KEYID = 6
1,209,332 UART: [ldev] SUBJECT.KEYID = 5
1,209,759 UART: [ldev] AUTHORITY.KEYID = 7
1,210,222 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,140 UART: [ldev] --
1,280,406 UART: [fwproc] Wait for Commands...
1,281,223 UART: [fwproc] Recv command 0x46574c44
1,281,956 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,830 >>> mbox cmd response: success
2,773,041 UART: [afmc] ++
2,773,209 UART: [afmc] CDI.KEYID = 6
2,773,572 UART: [afmc] SUBJECT.KEYID = 7
2,773,998 UART: [afmc] AUTHORITY.KEYID = 5
2,809,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,000 UART: [afmc] --
2,853,012 UART: [cold-reset] --
2,853,810 UART: [state] Locking Datavault
2,854,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,507 UART: [state] Locking ICCM
2,856,069 UART: [exit] Launching FMC @ 0x40000130
2,861,398 UART:
2,861,414 UART: Running Caliptra FMC ...
2,861,822 UART:
2,861,876 UART: [state] CFI Enabled
2,872,125 UART: [fht] FMC Alias Private Key: 7
2,979,540 UART: [art] Extend RT PCRs Done
2,979,968 UART: [art] Lock RT PCRs Done
2,981,680 UART: [art] Populate DV Done
2,989,895 UART: [fht] FMC Alias Private Key: 7
2,990,945 UART: [art] Derive CDI
2,991,225 UART: [art] Store in in slot 0x4
3,076,966 UART: [art] Derive Key Pair
3,077,326 UART: [art] Store priv key in slot 0x5
3,090,762 UART: [art] Derive Key Pair - Done
3,105,594 UART: [art] Signing Cert with AUTHO
3,106,074 UART: RITY.KEYID = 7
3,121,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,089 UART: [art] PUB.X = F02D0D52273B886B36D6A50493B40EF3D880FDEB701FC5AB95B729622BEAD494C2DA5C592DCEB6FE5A444A6B9E327E13
3,128,866 UART: [art] PUB.Y = 21059EDED9B13BC3135D9A95E9B81859903DA21B6E40EBD932B45D0B7C0C09F76D5ED8010FC85B6CC3E6508ECE64EB0D
3,135,811 UART: [art] SIG.R = 0C3BF2EDF4F8266383E2FF1E93CCCA4B6122A0BB40A4B2F3D09006DD0C8C355EEDA1B92C1CBE8A840FC7728611960772
3,142,582 UART: [art] SIG.S = 07D99F4251E1CABB79840961900F6F2294A5EB1ECB5B273F6AF1C048290391A4619BF9E8BD48ECD9CEEF8160C118DD4E
3,166,867 UART: Caliptra RT
3,167,121 UART: [state] CFI Enabled
3,275,261 UART: [rt] RT listening for mailbox commands...
3,275,931 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,354 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,912 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,112 ready_for_fw is high
1,056,112 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,690 >>> mbox cmd response: success
2,681,874 UART:
2,681,890 UART: Running Caliptra FMC ...
2,682,298 UART:
2,682,352 UART: [state] CFI Enabled
2,693,185 UART: [fht] FMC Alias Private Key: 7
2,801,096 UART: [art] Extend RT PCRs Done
2,801,524 UART: [art] Lock RT PCRs Done
2,802,824 UART: [art] Populate DV Done
2,810,979 UART: [fht] FMC Alias Private Key: 7
2,811,919 UART: [art] Derive CDI
2,812,199 UART: [art] Store in in slot 0x4
2,897,832 UART: [art] Derive Key Pair
2,898,192 UART: [art] Store priv key in slot 0x5
2,911,048 UART: [art] Derive Key Pair - Done
2,926,094 UART: [art] Signing Cert with AUTHO
2,926,574 UART: RITY.KEYID = 7
2,941,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,565 UART: [art] PUB.X = 2F12BBD74969C0B96A74C4A2652469FDE408EE89D7EEACB12D2801FD36412682382E9B2E8A493A70562C5F0161F8AF86
2,949,330 UART: [art] PUB.Y = 231AAFAC079170FC16F59510910F79DC9EB445703D312D9229CEAAB3E8880C12265F8A66C8E14809D97A68CB9ACD5FAA
2,956,278 UART: [art] SIG.R = 6BEA3ED8339C3C541924860ACFDDC080739F112A1BF5B4C886B8CE961383FAAB7BAB4E11BA67119AB3B653B385A44D62
2,963,059 UART: [art] SIG.S = 1AD71F1E00084BF14F32DB0025B469FFA47E25C39904B30EA220DF3FD8162BF9844B4347C4BAFE4510F4868FA0B6A192
2,986,997 UART: Caliptra RT
2,987,251 UART: [state] CFI Enabled
3,095,719 UART: [rt] RT listening for mailbox commands...
3,096,389 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,814 UART: [rt]cmd =0x4c4d5356, len=1672
3,389,238 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 ready_for_fw is high
1,174,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,788 UART: [idev] --
1,209,809 UART: [ldev] ++
1,209,977 UART: [ldev] CDI.KEYID = 6
1,210,341 UART: [ldev] SUBJECT.KEYID = 5
1,210,768 UART: [ldev] AUTHORITY.KEYID = 7
1,211,231 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,243,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,115 UART: [fwproc] Wait for Commands...
1,283,838 UART: [fwproc] Recv command 0x46574c44
1,284,571 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,343 >>> mbox cmd response: success
2,774,362 UART: [afmc] ++
2,774,530 UART: [afmc] CDI.KEYID = 6
2,774,893 UART: [afmc] SUBJECT.KEYID = 7
2,775,319 UART: [afmc] AUTHORITY.KEYID = 5
2,810,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,857 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,576 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,397 UART: [afmc] --
2,854,385 UART: [cold-reset] --
2,855,199 UART: [state] Locking Datavault
2,856,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,860 UART: [state] Locking ICCM
2,857,482 UART: [exit] Launching FMC @ 0x40000130
2,862,811 UART:
2,862,827 UART: Running Caliptra FMC ...
2,863,235 UART:
2,863,378 UART: [state] CFI Enabled
2,873,799 UART: [fht] FMC Alias Private Key: 7
2,981,948 UART: [art] Extend RT PCRs Done
2,982,376 UART: [art] Lock RT PCRs Done
2,984,160 UART: [art] Populate DV Done
2,992,265 UART: [fht] FMC Alias Private Key: 7
2,993,405 UART: [art] Derive CDI
2,993,685 UART: [art] Store in in slot 0x4
3,079,484 UART: [art] Derive Key Pair
3,079,844 UART: [art] Store priv key in slot 0x5
3,093,074 UART: [art] Derive Key Pair - Done
3,108,034 UART: [art] Signing Cert with AUTHO
3,108,514 UART: RITY.KEYID = 7
3,124,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,785 UART: [art] PUB.X = DDFD8BA75E791CBCAAA33DF8BECBA7EE018034C3A68445FA56349702A05EAC2B71FF8D8137B56E7431847C1B03750FC7
3,131,561 UART: [art] PUB.Y = BB8EFCC6FC027795F63F10779AB95146213FA9F781F7DD24F50BE30E470480B204FB5368636F9DDAEF5866E90983FB58
3,138,499 UART: [art] SIG.R = FDE1EB5D484B8F9F9483581F1476901497B3209250C89D4310618210CACACDE07AA3B2579ADCD7D794D267ADF3146F6C
3,145,275 UART: [art] SIG.S = 35A204BCC9F1634AEDC5B436BC30B7ECD11EA31C8B976C2AFE979CBD2A9175A56DAB6316583F25DFAF47A7C486866B03
3,169,568 UART: Caliptra RT
3,169,914 UART: [state] CFI Enabled
3,277,282 UART: [rt] RT listening for mailbox commands...
3,277,952 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,211 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,939 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,695 ready_for_fw is high
1,056,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,253 >>> mbox cmd response: success
2,685,573 UART:
2,685,589 UART: Running Caliptra FMC ...
2,685,997 UART:
2,686,140 UART: [state] CFI Enabled
2,697,173 UART: [fht] FMC Alias Private Key: 7
2,805,592 UART: [art] Extend RT PCRs Done
2,806,020 UART: [art] Lock RT PCRs Done
2,807,658 UART: [art] Populate DV Done
2,815,793 UART: [fht] FMC Alias Private Key: 7
2,816,911 UART: [art] Derive CDI
2,817,191 UART: [art] Store in in slot 0x4
2,902,846 UART: [art] Derive Key Pair
2,903,206 UART: [art] Store priv key in slot 0x5
2,917,268 UART: [art] Derive Key Pair - Done
2,932,180 UART: [art] Signing Cert with AUTHO
2,932,660 UART: RITY.KEYID = 7
2,947,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,509 UART: [art] PUB.X = 43B1DA87CD8D5159598D41354AF666C779262FFCE02CAE6F96A7C5E512FE21754DEBFE65B59D41634FE3F1F7917A5DE9
2,955,291 UART: [art] PUB.Y = 97842884696187B53A107A95202514E8B65859AC6D7187B7C69A1BDB5294AEB40235D2DD73D820AD0F1B47F7140237EF
2,962,226 UART: [art] SIG.R = A578B990E8189505EEF624B3699D60676EC57CDB0B2A0DADED0CBF903B38AED6DB933710ACFA27CA4371E7A18F56CB5C
2,969,004 UART: [art] SIG.S = 088EEFDAF87C288E5A8A33BE92C98191845D5440728CF84A9C14C31A0F038FD73BB71A8AB4C75D735B6AB6FF108F4DB6
2,992,860 UART: Caliptra RT
2,993,206 UART: [state] CFI Enabled
3,101,488 UART: [rt] RT listening for mailbox commands...
3,102,158 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,367 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,625 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,395 writing to cptra_bootfsm_go
193,607 UART:
193,962 UART: Running Caliptra ROM ...
195,136 UART:
195,285 UART: [state] CFI Enabled
263,243 UART: [state] LifecycleState = Unprovisioned
265,164 UART: [state] DebugLocked = No
267,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,482 UART: [kat] SHA2-256
442,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,659 UART: [kat] ++
453,205 UART: [kat] sha1
462,718 UART: [kat] SHA2-256
465,433 UART: [kat] SHA2-384
470,916 UART: [kat] SHA2-512-ACC
473,275 UART: [kat] ECC-384
2,768,175 UART: [kat] HMAC-384Kdf
2,801,885 UART: [kat] LMS
3,992,198 UART: [kat] --
3,997,556 UART: [cold-reset] ++
4,000,120 UART: [fht] Storing FHT @ 0x50003400
4,010,661 UART: [idev] ++
4,011,235 UART: [idev] CDI.KEYID = 6
4,012,262 UART: [idev] SUBJECT.KEYID = 7
4,013,431 UART: [idev] UDS.KEYID = 0
4,014,468 ready_for_fw is high
4,014,683 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,952 UART: [idev] Erasing UDS.KEYID = 0
7,345,798 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,673 UART: [idev] --
7,372,073 UART: [ldev] ++
7,372,643 UART: [ldev] CDI.KEYID = 6
7,373,574 UART: [ldev] SUBJECT.KEYID = 5
7,374,830 UART: [ldev] AUTHORITY.KEYID = 7
7,376,108 UART: [ldev] FE.KEYID = 1
7,423,392 UART: [ldev] Erasing FE.KEYID = 1
10,757,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,700 UART: [ldev] --
13,118,980 UART: [fwproc] Waiting for Commands...
13,121,020 UART: [fwproc] Received command 0x46574c44
13,123,242 UART: [fwproc] Received Image of size 114036 bytes
17,173,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,637,527 >>> mbox cmd response: success
17,642,086 UART: [afmc] ++
17,642,739 UART: [afmc] CDI.KEYID = 6
17,643,644 UART: [afmc] SUBJECT.KEYID = 7
17,644,852 UART: [afmc] AUTHORITY.KEYID = 5
21,007,005 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,809 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,197 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,063 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,463 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,761 UART: [afmc] --
23,382,125 UART: [cold-reset] --
23,384,362 UART: [state] Locking Datavault
23,390,572 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,313 UART: [state] Locking ICCM
23,394,052 UART: [exit] Launching FMC @ 0x40000130
23,402,434 UART:
23,402,658 UART: Running Caliptra FMC ...
23,403,677 UART:
23,403,815 UART: [state] CFI Enabled
23,471,205 UART: [fht] FMC Alias Private Key: 7
25,808,436 UART: [art] Extend RT PCRs Done
25,809,669 UART: [art] Lock RT PCRs Done
25,811,158 UART: [art] Populate DV Done
25,816,457 UART: [fht] FMC Alias Private Key: 7
25,818,003 UART: [art] Derive CDI
25,818,734 UART: [art] Store in in slot 0x4
25,878,909 UART: [art] Derive Key Pair
25,879,944 UART: [art] Store priv key in slot 0x5
29,172,398 UART: [art] Derive Key Pair - Done
29,185,400 UART: [art] Signing Cert with AUTHO
29,186,711 UART: RITY.KEYID = 7
31,474,971 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,478 UART: [art] PUB.X = F23E365AF00F8B9387850F1973D9DD8804D5B6803A5CD04359A9152B3D2563F75456EFA5F10CD6F9FD9215C49D5229F7
31,483,696 UART: [art] PUB.Y = 863AB76D9151CB4874A97CFE3F76B4216E6EF1395CC6E9A414E6356231851B6DCCFF03B7BD765EFDE16C9E50455EAA36
31,490,950 UART: [art] SIG.R = 6F13A8F45561DD55BF3318DC99602E55D385372D94B5CEE466E9254D5A861C53010CD0413B733EC3D0B0456CF161E4CD
31,498,319 UART: [art] SIG.S = 6B4EB77ECC3BD2D49BF1EE0DC3413CA8831681F75913B60EC8FB229D1FA8381CAD94650D6345E19BF2E508888EBA276B
32,802,870 UART: Caliptra RT
32,803,570 UART: [state] CFI Enabled
32,965,059 UART: [rt] RT listening for mailbox commands...
32,969,084 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,013,819 UART: [rt]cmd =0x4c4d5356, len=1672
33,427,544 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,802,416 ready_for_fw is high
3,802,799 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,875,721 >>> mbox cmd response: success
23,574,883 UART:
23,575,326 UART: Running Caliptra FMC ...
23,576,434 UART:
23,576,575 UART: [state] CFI Enabled
23,641,149 UART: [fht] FMC Alias Private Key: 7
25,978,807 UART: [art] Extend RT PCRs Done
25,980,037 UART: [art] Lock RT PCRs Done
25,981,744 UART: [art] Populate DV Done
25,987,047 UART: [fht] FMC Alias Private Key: 7
25,988,582 UART: [art] Derive CDI
25,989,390 UART: [art] Store in in slot 0x4
26,049,064 UART: [art] Derive Key Pair
26,050,102 UART: [art] Store priv key in slot 0x5
29,342,876 UART: [art] Derive Key Pair - Done
29,355,987 UART: [art] Signing Cert with AUTHO
29,357,289 UART: RITY.KEYID = 7
31,645,028 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,540 UART: [art] PUB.X = C8D51FE49CC1D499EEDF69C6BD852B52030347C4B33F015AE28DA8C3B2F33033D8DE34F5B1DE6984FFBE0D3B64245DCA
31,653,763 UART: [art] PUB.Y = 4135BE16C19B2AE3FA8375C61D599F64D3025A983E0301660447E8F3A1B80966C54077D7B1E7F1307C20A471FE63C220
31,661,029 UART: [art] SIG.R = 3AF2744D8BC5FEE59F6E1605F997460F655B9C6A24C8D53AC6BA2C42DE9152A93D088CB701DA9AFAF477C1EB2F50895A
31,668,405 UART: [art] SIG.S = 59C2EE5CB74327E44629F5CDE91471105331022DEE9A9B41B5643AFE6A27DF458835BDAA6F930E8200AD20C6A0CA63B2
32,973,069 UART: Caliptra RT
32,973,780 UART: [state] CFI Enabled
33,137,443 UART: [rt] RT listening for mailbox commands...
33,141,476 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,185,858 UART: [rt]cmd =0x4c4d5356, len=1672
33,599,813 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,461 UART:
192,814 UART: Running Caliptra ROM ...
193,999 UART:
603,829 UART: [state] CFI Enabled
618,566 UART: [state] LifecycleState = Unprovisioned
620,515 UART: [state] DebugLocked = No
623,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,475 UART: [kat] SHA2-256
798,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,805 UART: [kat] ++
809,283 UART: [kat] sha1
819,743 UART: [kat] SHA2-256
822,434 UART: [kat] SHA2-384
828,227 UART: [kat] SHA2-512-ACC
830,617 UART: [kat] ECC-384
3,114,099 UART: [kat] HMAC-384Kdf
3,126,121 UART: [kat] LMS
4,316,251 UART: [kat] --
4,321,667 UART: [cold-reset] ++
4,323,876 UART: [fht] Storing FHT @ 0x50003400
4,334,862 UART: [idev] ++
4,335,621 UART: [idev] CDI.KEYID = 6
4,336,537 UART: [idev] SUBJECT.KEYID = 7
4,337,641 UART: [idev] UDS.KEYID = 0
4,338,614 ready_for_fw is high
4,338,813 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,882 UART: [idev] Erasing UDS.KEYID = 0
7,622,164 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,753 UART: [idev] --
7,648,982 UART: [ldev] ++
7,649,566 UART: [ldev] CDI.KEYID = 6
7,650,502 UART: [ldev] SUBJECT.KEYID = 5
7,651,709 UART: [ldev] AUTHORITY.KEYID = 7
7,652,993 UART: [ldev] FE.KEYID = 1
7,663,933 UART: [ldev] Erasing FE.KEYID = 1
10,954,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,138 UART: [ldev] --
13,314,707 UART: [fwproc] Waiting for Commands...
13,316,905 UART: [fwproc] Received command 0x46574c44
13,319,079 UART: [fwproc] Received Image of size 114036 bytes
17,370,113 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,547 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,434 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,132 >>> mbox cmd response: success
17,834,786 UART: [afmc] ++
17,835,382 UART: [afmc] CDI.KEYID = 6
17,836,400 UART: [afmc] SUBJECT.KEYID = 7
17,837,560 UART: [afmc] AUTHORITY.KEYID = 5
21,154,967 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,746 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,195 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,024 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,454 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,183 UART: [afmc] --
23,518,428 UART: [cold-reset] --
23,522,235 UART: [state] Locking Datavault
23,528,238 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,008 UART: [state] Locking ICCM
23,531,731 UART: [exit] Launching FMC @ 0x40000130
23,540,133 UART:
23,540,406 UART: Running Caliptra FMC ...
23,541,512 UART:
23,541,669 UART: [state] CFI Enabled
23,549,554 UART: [fht] FMC Alias Private Key: 7
25,880,885 UART: [art] Extend RT PCRs Done
25,882,104 UART: [art] Lock RT PCRs Done
25,883,787 UART: [art] Populate DV Done
25,889,359 UART: [fht] FMC Alias Private Key: 7
25,891,110 UART: [art] Derive CDI
25,891,923 UART: [art] Store in in slot 0x4
25,934,729 UART: [art] Derive Key Pair
25,935,932 UART: [art] Store priv key in slot 0x5
29,178,024 UART: [art] Derive Key Pair - Done
29,190,933 UART: [art] Signing Cert with AUTHO
29,192,238 UART: RITY.KEYID = 7
31,471,711 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,218 UART: [art] PUB.X = C4E9A6A5B67EAF3C1E2BDC5C8EBE47A11873A843EB6098DE9E71CBDD3AD29D824B6E24F0F973BDA6EA4A5A06D663AC60
31,480,477 UART: [art] PUB.Y = 570943968BC31E7ED0830A3E150290BD1AD2F35EA50280953080A4012C51D9BA5E17DAFD35944FA2AD4EA67E7E54DA5C
31,487,725 UART: [art] SIG.R = 968121D099A4E731D991BBEB19A41B3344E1144B784BA875ADFA1693155A9A81783BAB725EF0229E1FA0AE4E65741B8C
31,495,135 UART: [art] SIG.S = 9BA49FB5DFD5C76F653601526CA780B941252CAD22DCC506AFEE0C8BC01542ACE8A0EDC36EB053790714A2161B6B118F
32,800,390 UART: Caliptra RT
32,801,107 UART: [state] CFI Enabled
32,919,063 UART: [rt] RT listening for mailbox commands...
32,923,040 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,967,556 UART: [rt]cmd =0x4c4d5356, len=1672
33,381,409 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,126,865 ready_for_fw is high
4,127,245 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,476 >>> mbox cmd response: success
23,711,394 UART:
23,711,803 UART: Running Caliptra FMC ...
23,712,908 UART:
23,713,061 UART: [state] CFI Enabled
23,720,733 UART: [fht] FMC Alias Private Key: 7
26,051,737 UART: [art] Extend RT PCRs Done
26,052,966 UART: [art] Lock RT PCRs Done
26,054,920 UART: [art] Populate DV Done
26,060,134 UART: [fht] FMC Alias Private Key: 7
26,061,826 UART: [art] Derive CDI
26,062,651 UART: [art] Store in in slot 0x4
26,104,923 UART: [art] Derive Key Pair
26,105,930 UART: [art] Store priv key in slot 0x5
29,347,824 UART: [art] Derive Key Pair - Done
29,360,664 UART: [art] Signing Cert with AUTHO
29,361,974 UART: RITY.KEYID = 7
31,641,232 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,741 UART: [art] PUB.X = 35A2891C1DBFDFBC86E751F623159E1A62243364C7483A74F74A6246843B0C0014480CE2FE905FB415FDA127DDEE4220
31,649,970 UART: [art] PUB.Y = D7057D71B9D0C40A00D121A500E4DA99D1B3F90D5D93A2F4F120C46F9394B5359CA3157FD7AD1D7CF9BAF054D277D947
31,657,176 UART: [art] SIG.R = 89983E1D45FAA87E7956FB285C01D6388F11C1371FD1540DF74904AF97BC8801CAA40646641F63E0C204A09D73A8D98C
31,664,634 UART: [art] SIG.S = 2517F36DAC13CAF0F76EF9D80920222E5CC3F1782AA5B6AB6781DEC2A5CEB454F869CC72063222A4FD034E82361BFD13
32,969,286 UART: Caliptra RT
32,969,988 UART: [state] CFI Enabled
33,086,759 UART: [rt] RT listening for mailbox commands...
33,090,685 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,135,423 UART: [rt]cmd =0x4c4d5356, len=1672
33,549,263 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,497 writing to cptra_bootfsm_go
192,615 UART:
192,975 UART: Running Caliptra ROM ...
194,201 UART:
194,367 UART: [state] CFI Enabled
262,713 UART: [state] LifecycleState = Unprovisioned
264,620 UART: [state] DebugLocked = No
266,583 UART: [state] WD Timer not started. Device not locked for debugging
270,751 UART: [kat] SHA2-256
449,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,437 UART: [kat] ++
461,975 UART: [kat] sha1
473,268 UART: [kat] SHA2-256
476,304 UART: [kat] SHA2-384
482,304 UART: [kat] SHA2-512-ACC
485,240 UART: [kat] ECC-384
2,946,825 UART: [kat] HMAC-384Kdf
2,970,215 UART: [kat] LMS
3,499,661 UART: [kat] --
3,504,192 UART: [cold-reset] ++
3,506,654 UART: [fht] FHT @ 0x50003400
3,518,220 UART: [idev] ++
3,518,792 UART: [idev] CDI.KEYID = 6
3,519,824 UART: [idev] SUBJECT.KEYID = 7
3,520,929 UART: [idev] UDS.KEYID = 0
3,521,861 ready_for_fw is high
3,522,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,959 UART: [idev] Erasing UDS.KEYID = 0
6,025,054 UART: [idev] Sha1 KeyId Algorithm
6,047,742 UART: [idev] --
6,050,935 UART: [ldev] ++
6,051,510 UART: [ldev] CDI.KEYID = 6
6,052,426 UART: [ldev] SUBJECT.KEYID = 5
6,053,642 UART: [ldev] AUTHORITY.KEYID = 7
6,054,879 UART: [ldev] FE.KEYID = 1
6,099,322 UART: [ldev] Erasing FE.KEYID = 1
8,605,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,218 UART: [ldev] --
10,413,681 UART: [fwproc] Wait for Commands...
10,416,210 UART: [fwproc] Recv command 0x46574c44
10,418,307 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,274,915 >>> mbox cmd response: success
14,279,476 UART: [afmc] ++
14,280,072 UART: [afmc] CDI.KEYID = 6
14,281,005 UART: [afmc] SUBJECT.KEYID = 7
14,282,173 UART: [afmc] AUTHORITY.KEYID = 5
16,807,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,632 UART: [afmc] --
18,607,385 UART: [cold-reset] --
18,611,900 UART: [state] Locking Datavault
18,615,958 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,665 UART: [state] Locking ICCM
18,619,425 UART: [exit] Launching FMC @ 0x40000130
18,627,839 UART:
18,628,121 UART: Running Caliptra FMC ...
18,629,253 UART:
18,629,418 UART: [state] CFI Enabled
18,689,670 UART: [fht] FMC Alias Private Key: 7
20,454,189 UART: [art] Extend RT PCRs Done
20,455,412 UART: [art] Lock RT PCRs Done
20,457,388 UART: [art] Populate DV Done
20,462,745 UART: [fht] FMC Alias Private Key: 7
20,464,264 UART: [art] Derive CDI
20,465,007 UART: [art] Store in in slot 0x4
20,522,274 UART: [art] Derive Key Pair
20,523,275 UART: [art] Store priv key in slot 0x5
22,985,874 UART: [art] Derive Key Pair - Done
22,999,081 UART: [art] Signing Cert with AUTHO
23,000,391 UART: RITY.KEYID = 7
24,711,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,298 UART: [art] PUB.X = 530F79E65B6FD323C880C12A0916EC9E9DFAC0D16AAC725DA4BEBF00D464D8D934D296A6BC20562B000FA1E60B4C95AB
24,720,531 UART: [art] PUB.Y = 1372A273339992067DE5DD747F3C262C025E4EF274EBDB1D0182072C0C6DBD084B22B63BF117873A6C3769681A1D1C75
24,727,793 UART: [art] SIG.R = C7BB167BFC12E2639708AB90C3FCF9C97A20AE69EEA94E2E3E4741A3C1A7A50664A0AB7A6E824A1E59C366E590CF180E
24,735,166 UART: [art] SIG.S = BBCAB89268921AB1970909BB82668744CC9E2D9418C1B46DDAB0C673E29870F3C1AEE95EE8B4779F9C58F3AA0A064BF9
25,714,098 UART: Caliptra RT
25,714,814 UART: [state] CFI Enabled
25,879,724 UART: [rt] RT listening for mailbox commands...
25,883,642 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,927,986 UART: [rt]cmd =0x4c4d5356, len=1672
26,129,574 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
192,559 UART:
192,922 UART: Running Caliptra ROM ...
194,121 UART:
194,277 UART: [state] CFI Enabled
263,573 UART: [state] LifecycleState = Unprovisioned
265,973 UART: [state] DebugLocked = No
268,793 UART: [state] WD Timer not started. Device not locked for debugging
273,823 UART: [kat] SHA2-256
463,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,460 UART: [kat] ++
474,948 UART: [kat] sha1
485,751 UART: [kat] SHA2-256
488,768 UART: [kat] SHA2-384
495,062 UART: [kat] SHA2-512-ACC
497,651 UART: [kat] ECC-384
2,949,773 UART: [kat] HMAC-384Kdf
2,972,028 UART: [kat] LMS
3,503,766 UART: [kat] --
3,509,606 UART: [cold-reset] ++
3,511,891 UART: [fht] FHT @ 0x50003400
3,524,216 UART: [idev] ++
3,524,862 UART: [idev] CDI.KEYID = 6
3,525,900 UART: [idev] SUBJECT.KEYID = 7
3,527,006 UART: [idev] UDS.KEYID = 0
3,527,943 ready_for_fw is high
3,528,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,963 UART: [idev] Erasing UDS.KEYID = 0
6,049,881 UART: [idev] Sha1 KeyId Algorithm
6,072,838 UART: [idev] --
6,076,747 UART: [ldev] ++
6,077,489 UART: [ldev] CDI.KEYID = 6
6,078,406 UART: [ldev] SUBJECT.KEYID = 5
6,079,570 UART: [ldev] AUTHORITY.KEYID = 7
6,080,750 UART: [ldev] FE.KEYID = 1
6,122,740 UART: [ldev] Erasing FE.KEYID = 1
8,643,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,378,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,393,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,408,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,423,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,445,996 UART: [ldev] --
10,451,646 UART: [fwproc] Wait for Commands...
10,454,284 UART: [fwproc] Recv command 0x46574c44
10,456,537 UART: [fwproc] Recv'd Img size: 114360 bytes
13,915,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,108,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,651,297 >>> mbox cmd response: success
14,654,629 UART: [afmc] ++
14,655,350 UART: [afmc] CDI.KEYID = 6
14,656,544 UART: [afmc] SUBJECT.KEYID = 7
14,657,982 UART: [afmc] AUTHORITY.KEYID = 5
17,186,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,929,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,931,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,946,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,961,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,976,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,000,361 UART: [afmc] --
19,003,726 UART: [cold-reset] --
19,009,066 UART: [state] Locking Datavault
19,014,890 UART: [state] Locking PCR0, PCR1 and PCR31
19,017,057 UART: [state] Locking ICCM
19,018,679 UART: [exit] Launching FMC @ 0x40000130
19,027,366 UART:
19,027,602 UART: Running Caliptra FMC ...
19,028,704 UART:
19,028,870 UART: [state] CFI Enabled
19,088,801 UART: [fht] FMC Alias Private Key: 7
20,853,131 UART: [art] Extend RT PCRs Done
20,854,348 UART: [art] Lock RT PCRs Done
20,855,922 UART: [art] Populate DV Done
20,861,060 UART: [fht] FMC Alias Private Key: 7
20,862,715 UART: [art] Derive CDI
20,863,457 UART: [art] Store in in slot 0x4
20,921,686 UART: [art] Derive Key Pair
20,922,724 UART: [art] Store priv key in slot 0x5
23,385,647 UART: [art] Derive Key Pair - Done
23,398,627 UART: [art] Signing Cert with AUTHO
23,399,963 UART: RITY.KEYID = 7
25,111,096 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,603 UART: [art] PUB.X = AAF5813EB2414C65E2DC5D2FCABB7E0265EBCFDEE40528A67291F385CF3790A161279EB97592EF7FD6364067C6F93D3C
25,119,826 UART: [art] PUB.Y = 7A6A4F005CCEBAE8C14AB043BAD53BD882F0A09F347DEC4BADBC49E65D26D717420FFD3714E9BB78A433A75534133FE2
25,127,126 UART: [art] SIG.R = B028184B93C1186183F117ACE9A02133F25CB7ED82BF2EF99151E396555BDE0E40989844F4C2E112B0EB528A2D0746E5
25,134,499 UART: [art] SIG.S = 03914F4FF2FB749D0056E75DEDECCF38CE93A7B39D64EC7E07D06F4056655B36473B1EBA69D2E3CDB61BC1E42625C3D0
26,113,268 UART: Caliptra RT
26,113,957 UART: [state] CFI Enabled
26,277,781 UART: [rt] RT listening for mailbox commands...
26,281,802 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,326,469 UART: [rt]cmd =0x4c4d5356, len=1672
26,528,251 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
3,450,480 ready_for_fw is high
3,450,868 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,769,462 >>> mbox cmd response: success
19,064,375 UART:
19,064,771 UART: Running Caliptra FMC ...
19,065,879 UART:
19,066,032 UART: [state] CFI Enabled
19,128,199 UART: [fht] FMC Alias Private Key: 7
20,892,668 UART: [art] Extend RT PCRs Done
20,893,893 UART: [art] Lock RT PCRs Done
20,895,493 UART: [art] Populate DV Done
20,901,071 UART: [fht] FMC Alias Private Key: 7
20,902,572 UART: [art] Derive CDI
20,903,361 UART: [art] Store in in slot 0x4
20,960,454 UART: [art] Derive Key Pair
20,961,496 UART: [art] Store priv key in slot 0x5
23,424,645 UART: [art] Derive Key Pair - Done
23,437,538 UART: [art] Signing Cert with AUTHO
23,438,846 UART: RITY.KEYID = 7
25,149,802 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,309 UART: [art] PUB.X = AFF7CFE4ED038BFFE88BD558C997F2F4F8407D2B96B35A81EC639EFE2C8E222CEE6D932224EA5BF966FFD7ACD5AE8E41
25,158,636 UART: [art] PUB.Y = A6C6839B8082137E1E56BA42F7B067DF8B35BC13599C1481084878D79029B07619C2F1A3BED9E1B4E6181ABC9B02B730
25,165,860 UART: [art] SIG.R = 8728B3603882568B9AD167925237E9628F36D2DFB449901140895364FB35A8E092B063BB983A86D05B3EAA19AF576B9D
25,173,227 UART: [art] SIG.S = 17F8CDB3DCDF42213EA03B15D835FB4DE3F4E4144BB8E180EF46D2761A3D4D73577CEB4F50E1F7C517CEDEBAD8A1AA7A
26,152,996 UART: Caliptra RT
26,153,703 UART: [state] CFI Enabled
26,317,526 UART: [rt] RT listening for mailbox commands...
26,321,430 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,365,729 UART: [rt]cmd =0x4c4d5356, len=1672
26,567,172 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,519 UART:
192,885 UART: Running Caliptra ROM ...
194,060 UART:
603,664 UART: [state] CFI Enabled
618,796 UART: [state] LifecycleState = Unprovisioned
621,213 UART: [state] DebugLocked = No
623,378 UART: [state] WD Timer not started. Device not locked for debugging
628,476 UART: [kat] SHA2-256
818,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,117 UART: [kat] ++
829,648 UART: [kat] sha1
839,808 UART: [kat] SHA2-256
842,815 UART: [kat] SHA2-384
848,874 UART: [kat] SHA2-512-ACC
851,449 UART: [kat] ECC-384
3,293,626 UART: [kat] HMAC-384Kdf
3,306,791 UART: [kat] LMS
3,838,611 UART: [kat] --
3,842,391 UART: [cold-reset] ++
3,844,957 UART: [fht] FHT @ 0x50003400
3,856,087 UART: [idev] ++
3,856,793 UART: [idev] CDI.KEYID = 6
3,857,825 UART: [idev] SUBJECT.KEYID = 7
3,858,928 UART: [idev] UDS.KEYID = 0
3,859,864 ready_for_fw is high
3,860,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,640 UART: [idev] Erasing UDS.KEYID = 0
6,335,197 UART: [idev] Sha1 KeyId Algorithm
6,357,598 UART: [idev] --
6,361,923 UART: [ldev] ++
6,362,602 UART: [ldev] CDI.KEYID = 6
6,363,510 UART: [ldev] SUBJECT.KEYID = 5
6,364,666 UART: [ldev] AUTHORITY.KEYID = 7
6,365,890 UART: [ldev] FE.KEYID = 1
6,376,420 UART: [ldev] Erasing FE.KEYID = 1
8,854,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,367 UART: [ldev] --
10,646,252 UART: [fwproc] Wait for Commands...
10,649,422 UART: [fwproc] Recv command 0x46574c44
10,651,672 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,839,635 >>> mbox cmd response: success
14,844,301 UART: [afmc] ++
14,845,007 UART: [afmc] CDI.KEYID = 6
14,846,195 UART: [afmc] SUBJECT.KEYID = 7
14,847,626 UART: [afmc] AUTHORITY.KEYID = 5
17,350,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,293 UART: [afmc] --
19,146,937 UART: [cold-reset] --
19,151,013 UART: [state] Locking Datavault
19,156,419 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,550 UART: [state] Locking ICCM
19,161,511 UART: [exit] Launching FMC @ 0x40000130
19,170,167 UART:
19,170,406 UART: Running Caliptra FMC ...
19,171,504 UART:
19,171,666 UART: [state] CFI Enabled
19,179,631 UART: [fht] FMC Alias Private Key: 7
20,937,052 UART: [art] Extend RT PCRs Done
20,938,255 UART: [art] Lock RT PCRs Done
20,940,150 UART: [art] Populate DV Done
20,945,396 UART: [fht] FMC Alias Private Key: 7
20,947,091 UART: [art] Derive CDI
20,947,909 UART: [art] Store in in slot 0x4
20,990,230 UART: [art] Derive Key Pair
20,991,230 UART: [art] Store priv key in slot 0x5
23,417,508 UART: [art] Derive Key Pair - Done
23,430,613 UART: [art] Signing Cert with AUTHO
23,431,924 UART: RITY.KEYID = 7
25,137,259 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,766 UART: [art] PUB.X = D920D812D49503D6D37316830D6527B059A1BEBB3D3894320E4A2DF33561895AE33936B192D47528EE3EF1C7609BA872
25,146,023 UART: [art] PUB.Y = AA2EA9DADD0D8ACBBB38C8277CB9FA4C36F4829455351D0BD5A41BF67619D13EC7AF14A857CF77389E8A90B73B7FCD6F
25,153,312 UART: [art] SIG.R = 539AC6B49761536037EC5A4C92B9AA60B73D6C8E570D71C923C096E956EF0BC54D8F631243CE217B1DDD8784B58837CA
25,160,726 UART: [art] SIG.S = 4E3B15167837FFBE693E807EC74713BAF06AEE62F209E38BC224F5F02E27A306E2379959574E88FECD021BF9BA494B62
26,139,519 UART: Caliptra RT
26,140,235 UART: [state] CFI Enabled
26,258,031 UART: [rt] RT listening for mailbox commands...
26,262,050 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,306,676 UART: [rt]cmd =0x4c4d5356, len=1672
26,508,202 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,756,078 ready_for_fw is high
3,756,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,952,835 >>> mbox cmd response: success
19,206,263 UART:
19,206,670 UART: Running Caliptra FMC ...
19,207,807 UART:
19,207,970 UART: [state] CFI Enabled
19,216,135 UART: [fht] FMC Alias Private Key: 7
20,972,479 UART: [art] Extend RT PCRs Done
20,973,727 UART: [art] Lock RT PCRs Done
20,975,360 UART: [art] Populate DV Done
20,980,827 UART: [fht] FMC Alias Private Key: 7
20,982,325 UART: [art] Derive CDI
20,983,089 UART: [art] Store in in slot 0x4
21,025,527 UART: [art] Derive Key Pair
21,026,574 UART: [art] Store priv key in slot 0x5
23,453,348 UART: [art] Derive Key Pair - Done
23,466,616 UART: [art] Signing Cert with AUTHO
23,468,105 UART: RITY.KEYID = 7
25,173,274 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,783 UART: [art] PUB.X = 62F3316DBB5987AC831E3C79A63B14736B65E62D9A5663C16B9FA14CD34EFB5EC34174F05F6B7F1A3F09F5574BD5B061
25,181,990 UART: [art] PUB.Y = 0E1FEF082084B51148CF4C16CA270CBD8EAA8ED2A772EA57C728C2A0237B88C8E6A2DCDBB77DA256474A5812B0824A2D
25,189,312 UART: [art] SIG.R = 7F0D4075890ACDB964C71256D6490FA95E1C6C06BE3CCE3CAE884C8C1A5AA0764BE12697EA4073A6D3C4AEDC37487824
25,196,668 UART: [art] SIG.S = FD42B8104189DD1108731D0DC6D182BCFFA0F081843D95EB0C3BF9A66D414E426E2E233720A2B286346B1B259167EA2A
26,175,839 UART: Caliptra RT
26,176,579 UART: [state] CFI Enabled
26,294,479 UART: [rt] RT listening for mailbox commands...
26,298,507 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,343,171 UART: [rt]cmd =0x4c4d5356, len=1672
26,544,679 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,656 UART: [kat] HMAC-384Kdf
907,158 UART: [kat] LMS
1,475,354 UART: [kat] --
1,476,351 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,536 UART: [idev] Erasing UDS.KEYID = 0
1,505,286 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,920 UART: [idev] --
1,514,927 UART: [ldev] ++
1,515,095 UART: [ldev] CDI.KEYID = 6
1,515,458 UART: [ldev] SUBJECT.KEYID = 5
1,515,884 UART: [ldev] AUTHORITY.KEYID = 7
1,516,347 UART: [ldev] FE.KEYID = 1
1,521,403 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,980 UART: [ldev] --
1,586,345 UART: [fwproc] Waiting for Commands...
1,587,088 UART: [fwproc] Received command 0x46574c44
1,587,879 UART: [fwproc] Received Image of size 114360 bytes
2,886,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,326 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,637 >>> mbox cmd response: success
3,080,711 UART: [afmc] ++
3,080,879 UART: [afmc] CDI.KEYID = 6
3,081,241 UART: [afmc] SUBJECT.KEYID = 7
3,081,666 UART: [afmc] AUTHORITY.KEYID = 5
3,116,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,131 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,911 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,639 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,524 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,214 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,125 UART: [afmc] --
3,159,061 UART: [cold-reset] --
3,159,969 UART: [state] Locking Datavault
3,161,036 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,640 UART: [state] Locking ICCM
3,162,204 UART: [exit] Launching FMC @ 0x40000130
3,167,533 UART:
3,167,549 UART: Running Caliptra FMC ...
3,167,957 UART:
3,168,011 UART: [state] CFI Enabled
3,178,486 UART: [fht] FMC Alias Private Key: 7
3,286,205 UART: [art] Extend RT PCRs Done
3,286,633 UART: [art] Lock RT PCRs Done
3,288,023 UART: [art] Populate DV Done
3,296,326 UART: [fht] FMC Alias Private Key: 7
3,297,384 UART: [art] Derive CDI
3,297,664 UART: [art] Store in in slot 0x4
3,382,943 UART: [art] Derive Key Pair
3,383,303 UART: [art] Store priv key in slot 0x5
3,396,327 UART: [art] Derive Key Pair - Done
3,410,670 UART: [art] Signing Cert with AUTHO
3,411,150 UART: RITY.KEYID = 7
3,426,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,265 UART: [art] PUB.X = DE05742D8A0EF446BE3859B39BCABD30917E3D78FBD6FD1B043B03C4DDB374B864666BB5340CFDE2037324F5E5684A17
3,434,029 UART: [art] PUB.Y = F2EFA0C983B128F037A6EFFB8CEDE216901472DA816121DF0255FEBB9BA00B182B3DA45455D842FDCE1C8E7C6E05EC64
3,440,990 UART: [art] SIG.R = 21558778A5C04ACB136738FDBF88319A1E0685E02F494E234CE22C6AF4FAAE5B7F4E323D2C12603DE3862E9E35A9F3DE
3,447,767 UART: [art] SIG.S = F06C6B5AED5E1493154CBCD4D4DDFC62BD5D72C3EF583E1A3BFB6481550ACEA9A652E53548F18480963FA23579FDF9C7
3,471,985 UART: Caliptra RT
3,472,239 UART: [state] CFI Enabled
3,580,029 UART: [rt] RT listening for mailbox commands...
3,580,699 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,008 UART: [rt]cmd =0x4c4d5356, len=1672
3,873,565 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,677 ready_for_fw is high
1,362,677 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,701 >>> mbox cmd response: success
2,989,075 UART:
2,989,091 UART: Running Caliptra FMC ...
2,989,499 UART:
2,989,553 UART: [state] CFI Enabled
3,000,162 UART: [fht] FMC Alias Private Key: 7
3,108,565 UART: [art] Extend RT PCRs Done
3,108,993 UART: [art] Lock RT PCRs Done
3,110,335 UART: [art] Populate DV Done
3,118,770 UART: [fht] FMC Alias Private Key: 7
3,119,942 UART: [art] Derive CDI
3,120,222 UART: [art] Store in in slot 0x4
3,205,727 UART: [art] Derive Key Pair
3,206,087 UART: [art] Store priv key in slot 0x5
3,219,291 UART: [art] Derive Key Pair - Done
3,234,153 UART: [art] Signing Cert with AUTHO
3,234,633 UART: RITY.KEYID = 7
3,249,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,664 UART: [art] PUB.X = 2682E530DB384FFA127F5A98DA0E81C36BEC4738278F36FA6AEDC8AFEEAC508DAB344CBE9ACB54FA9EC3EB7C21FEBEB4
3,257,467 UART: [art] PUB.Y = 04534E1A7A8E5076F9A5B035C99DC2F20933A9CED957F79953A123291B0399D4CF9CD5A169820D6C908A7F67FE0055E4
3,264,383 UART: [art] SIG.R = 8FD2ACDB14F98A2D6CA8CC94D22E6B3422DE7112BB4318B36FD60DE2533D6836A95044C6DE01964A352FD3D24E59FD25
3,271,159 UART: [art] SIG.S = EF0021F33A29135B493CEE25EF1C8CD4F341EF77F653994234D15D0AAC8602BFD79FC2ABB69ECFDEF384966FF5F548F6
3,295,438 UART: Caliptra RT
3,295,692 UART: [state] CFI Enabled
3,403,987 UART: [rt] RT listening for mailbox commands...
3,404,657 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,028 UART: [rt]cmd =0x4c4d5356, len=1672
3,697,485 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,674 UART: [kat] SHA2-256
881,605 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,720 UART: [kat] ++
885,872 UART: [kat] sha1
889,966 UART: [kat] SHA2-256
891,904 UART: [kat] SHA2-384
894,663 UART: [kat] SHA2-512-ACC
896,564 UART: [kat] ECC-384
901,997 UART: [kat] HMAC-384Kdf
906,577 UART: [kat] LMS
1,474,773 UART: [kat] --
1,475,772 UART: [cold-reset] ++
1,476,348 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 ready_for_fw is high
1,480,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,113 UART: [idev] Erasing UDS.KEYID = 0
1,504,755 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,393 UART: [idev] --
1,514,428 UART: [ldev] ++
1,514,596 UART: [ldev] CDI.KEYID = 6
1,514,959 UART: [ldev] SUBJECT.KEYID = 5
1,515,385 UART: [ldev] AUTHORITY.KEYID = 7
1,515,848 UART: [ldev] FE.KEYID = 1
1,520,958 UART: [ldev] Erasing FE.KEYID = 1
1,546,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,033 UART: [ldev] --
1,585,386 UART: [fwproc] Waiting for Commands...
1,586,147 UART: [fwproc] Received command 0x46574c44
1,586,938 UART: [fwproc] Received Image of size 114360 bytes
2,884,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,405 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,610 >>> mbox cmd response: success
3,078,714 UART: [afmc] ++
3,078,882 UART: [afmc] CDI.KEYID = 6
3,079,244 UART: [afmc] SUBJECT.KEYID = 7
3,079,669 UART: [afmc] AUTHORITY.KEYID = 5
3,114,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,996 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,609 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,299 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,234 UART: [afmc] --
3,158,330 UART: [cold-reset] --
3,159,312 UART: [state] Locking Datavault
3,160,597 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,201 UART: [state] Locking ICCM
3,161,819 UART: [exit] Launching FMC @ 0x40000130
3,167,148 UART:
3,167,164 UART: Running Caliptra FMC ...
3,167,572 UART:
3,167,715 UART: [state] CFI Enabled
3,178,372 UART: [fht] FMC Alias Private Key: 7
3,286,017 UART: [art] Extend RT PCRs Done
3,286,445 UART: [art] Lock RT PCRs Done
3,288,267 UART: [art] Populate DV Done
3,296,350 UART: [fht] FMC Alias Private Key: 7
3,297,486 UART: [art] Derive CDI
3,297,766 UART: [art] Store in in slot 0x4
3,383,269 UART: [art] Derive Key Pair
3,383,629 UART: [art] Store priv key in slot 0x5
3,397,055 UART: [art] Derive Key Pair - Done
3,411,459 UART: [art] Signing Cert with AUTHO
3,411,939 UART: RITY.KEYID = 7
3,427,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,916 UART: [art] PUB.X = 7E8079FEF80F8C5AA89D7893951BE4AB76C6E6C662A859BAEEAE6DFD9ABDE0F8879E918A4A1C7496C48104716C779A53
3,434,694 UART: [art] PUB.Y = 24FACCDBD790A101E144F6DF269F0C185C45E5D24BC73AE16DBC6B74040501B6599C86471F31839087141CFD80FFC995
3,441,635 UART: [art] SIG.R = 684DD396C72E2EA6672EB3EA3D54725E76BFC7705B478070EF3B0D2357DFE63C7382F0577AA3929E8CED2BA911FBA773
3,448,412 UART: [art] SIG.S = C4C35307AB32703A5E42E7234E1554C8CEF0FBD1C6962781878E048CCA08D3FDCE0656E02D657DCCB2B68C325BD7B641
3,472,331 UART: Caliptra RT
3,472,677 UART: [state] CFI Enabled
3,580,913 UART: [rt] RT listening for mailbox commands...
3,581,583 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,866 UART: [rt]cmd =0x4c4d5356, len=1672
3,874,309 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,662 ready_for_fw is high
1,363,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,856 >>> mbox cmd response: success
2,990,558 UART:
2,990,574 UART: Running Caliptra FMC ...
2,990,982 UART:
2,991,125 UART: [state] CFI Enabled
3,002,034 UART: [fht] FMC Alias Private Key: 7
3,110,141 UART: [art] Extend RT PCRs Done
3,110,569 UART: [art] Lock RT PCRs Done
3,111,981 UART: [art] Populate DV Done
3,120,444 UART: [fht] FMC Alias Private Key: 7
3,121,598 UART: [art] Derive CDI
3,121,878 UART: [art] Store in in slot 0x4
3,207,279 UART: [art] Derive Key Pair
3,207,639 UART: [art] Store priv key in slot 0x5
3,220,421 UART: [art] Derive Key Pair - Done
3,234,875 UART: [art] Signing Cert with AUTHO
3,235,355 UART: RITY.KEYID = 7
3,250,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,118 UART: [art] PUB.X = 49BF408F230A2B584B7FA63DFF611BBF1D8E98BCC030A3506A10440B31CD3735856B55AA28B9B6488336F8562ACEB0B2
3,257,890 UART: [art] PUB.Y = 0DD666C54ADF208C62DCC8BECB57BC055DEB1C0A136ADFFC4E600B838735E93B32AC8185D8C152164D04E0FFDD57A8EF
3,264,849 UART: [art] SIG.R = D53CDFB5E9AC0C876052E456BC1E597F248CEB3A3A250653736906D10D5978CD398889B13A7870988F47CDB3D7B09F0C
3,271,608 UART: [art] SIG.S = 84FA56F68CC8FB2450D7AFF2F89FFFEBE7798AF8B613F595F513B2C363E6C557767BB29B737EF6CA44B8E84EB7770F0A
3,295,671 UART: Caliptra RT
3,296,017 UART: [state] CFI Enabled
3,404,316 UART: [rt] RT listening for mailbox commands...
3,404,986 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,257 UART: [rt]cmd =0x4c4d5356, len=1672
3,697,978 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
892,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,959 UART: [kat] ++
897,111 UART: [kat] sha1
901,297 UART: [kat] SHA2-256
903,237 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
917,526 UART: [kat] HMAC-384Kdf
922,140 UART: [kat] LMS
1,170,468 UART: [kat] --
1,171,081 UART: [cold-reset] ++
1,171,423 UART: [fht] FHT @ 0x50003400
1,174,032 UART: [idev] ++
1,174,200 UART: [idev] CDI.KEYID = 6
1,174,560 UART: [idev] SUBJECT.KEYID = 7
1,174,984 UART: [idev] UDS.KEYID = 0
1,175,329 ready_for_fw is high
1,175,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,200,525 UART: [idev] Sha1 KeyId Algorithm
1,208,863 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,636 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,787 UART: [ldev] --
1,282,280 UART: [fwproc] Wait for Commands...
1,283,002 UART: [fwproc] Recv command 0x46574c44
1,283,730 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,166 >>> mbox cmd response: success
2,774,292 UART: [afmc] ++
2,774,460 UART: [afmc] CDI.KEYID = 6
2,774,822 UART: [afmc] SUBJECT.KEYID = 7
2,775,247 UART: [afmc] AUTHORITY.KEYID = 5
2,810,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,211 UART: [afmc] --
2,853,099 UART: [cold-reset] --
2,854,065 UART: [state] Locking Datavault
2,855,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,690 UART: [state] Locking ICCM
2,856,320 UART: [exit] Launching FMC @ 0x40000130
2,861,649 UART:
2,861,665 UART: Running Caliptra FMC ...
2,862,073 UART:
2,862,127 UART: [state] CFI Enabled
2,872,844 UART: [fht] FMC Alias Private Key: 7
2,981,255 UART: [art] Extend RT PCRs Done
2,981,683 UART: [art] Lock RT PCRs Done
2,983,267 UART: [art] Populate DV Done
2,991,256 UART: [fht] FMC Alias Private Key: 7
2,992,248 UART: [art] Derive CDI
2,992,528 UART: [art] Store in in slot 0x4
3,078,639 UART: [art] Derive Key Pair
3,078,999 UART: [art] Store priv key in slot 0x5
3,091,715 UART: [art] Derive Key Pair - Done
3,106,457 UART: [art] Signing Cert with AUTHO
3,106,937 UART: RITY.KEYID = 7
3,121,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,472 UART: [art] PUB.X = 2E88C9B304FE922334F6716E57014AD30C0B69F093EC1723B2E0D9316436313D8B282C2EE1EBDD9F846DD2833C4EFFD4
3,129,236 UART: [art] PUB.Y = BF2019D3BBEA821E7B9BA1C7D3C4A40C74EE7C879FFD795D1033352F1E5FDED8F754BA216468C61B7D7BC0A07EB12A13
3,136,203 UART: [art] SIG.R = 2E216AC36793AF63A1D97D9011D3059DCDA675C15A6EEA92708C97E273964B9B1E3AF9DBDB6653F725ABB8096CCE6592
3,142,977 UART: [art] SIG.S = F6803ABE037F3D7E144A16F78A86BB64980A41145929DF86C5250CD4FB19CA161AB5D9DF37B8F82BF60A34942D261B01
3,167,147 UART: Caliptra RT
3,167,401 UART: [state] CFI Enabled
3,274,035 UART: [rt] RT listening for mailbox commands...
3,274,705 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,206 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,673 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,631 ready_for_fw is high
1,060,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,365 >>> mbox cmd response: success
2,685,851 UART:
2,685,867 UART: Running Caliptra FMC ...
2,686,275 UART:
2,686,329 UART: [state] CFI Enabled
2,696,954 UART: [fht] FMC Alias Private Key: 7
2,805,179 UART: [art] Extend RT PCRs Done
2,805,607 UART: [art] Lock RT PCRs Done
2,807,201 UART: [art] Populate DV Done
2,815,252 UART: [fht] FMC Alias Private Key: 7
2,816,274 UART: [art] Derive CDI
2,816,554 UART: [art] Store in in slot 0x4
2,902,283 UART: [art] Derive Key Pair
2,902,643 UART: [art] Store priv key in slot 0x5
2,915,819 UART: [art] Derive Key Pair - Done
2,930,701 UART: [art] Signing Cert with AUTHO
2,931,181 UART: RITY.KEYID = 7
2,945,637 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,402 UART: [art] PUB.X = D37C5A7AAFD205E2F96D216692804EF82F6C5D2C87BA0F27426C31FA6CE293ABACEEAF274D936B7EB1A2EB523545058A
2,953,181 UART: [art] PUB.Y = 03C25B767564ACC7D7C0C4DE92EC1C503AD28740DE18DD1558F1FCD8713078622AA645BA4161B7668C1A56F10D647E44
2,960,129 UART: [art] SIG.R = F4337B65141FCD0F1B343248B4C0855226853E69D89F71D88BFE64AA6CD4C5B5B308DF6FDA6FCF27CB6B2BCD604FA93E
2,966,911 UART: [art] SIG.S = F699A12B032485837132C1C507D46FDF996DAFDCC838A90DF679E24974FAE23F6B330F0CE26837F5F08465C2C09A9869
2,990,163 UART: Caliptra RT
2,990,417 UART: [state] CFI Enabled
3,097,644 UART: [rt] RT listening for mailbox commands...
3,098,314 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,407 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,770 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,118 UART: [kat] SHA2-256
904,058 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,309 UART: [kat] HMAC-384Kdf
922,781 UART: [kat] LMS
1,171,109 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,756 UART: [fht] FHT @ 0x50003400
1,175,295 UART: [idev] ++
1,175,463 UART: [idev] CDI.KEYID = 6
1,175,823 UART: [idev] SUBJECT.KEYID = 7
1,176,247 UART: [idev] UDS.KEYID = 0
1,176,592 ready_for_fw is high
1,176,592 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,367 UART: [idev] Erasing UDS.KEYID = 0
1,201,720 UART: [idev] Sha1 KeyId Algorithm
1,210,212 UART: [idev] --
1,211,356 UART: [ldev] ++
1,211,524 UART: [ldev] CDI.KEYID = 6
1,211,887 UART: [ldev] SUBJECT.KEYID = 5
1,212,313 UART: [ldev] AUTHORITY.KEYID = 7
1,212,776 UART: [ldev] FE.KEYID = 1
1,218,212 UART: [ldev] Erasing FE.KEYID = 1
1,244,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,238 UART: [ldev] --
1,283,681 UART: [fwproc] Wait for Commands...
1,284,327 UART: [fwproc] Recv command 0x46574c44
1,285,055 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,986 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,165 >>> mbox cmd response: success
2,776,233 UART: [afmc] ++
2,776,401 UART: [afmc] CDI.KEYID = 6
2,776,763 UART: [afmc] SUBJECT.KEYID = 7
2,777,188 UART: [afmc] AUTHORITY.KEYID = 5
2,812,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,561 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,280 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,194 UART: [afmc] --
2,856,252 UART: [cold-reset] --
2,856,928 UART: [state] Locking Datavault
2,858,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,881 UART: [state] Locking ICCM
2,859,345 UART: [exit] Launching FMC @ 0x40000130
2,864,674 UART:
2,864,690 UART: Running Caliptra FMC ...
2,865,098 UART:
2,865,241 UART: [state] CFI Enabled
2,875,808 UART: [fht] FMC Alias Private Key: 7
2,983,717 UART: [art] Extend RT PCRs Done
2,984,145 UART: [art] Lock RT PCRs Done
2,985,713 UART: [art] Populate DV Done
2,993,538 UART: [fht] FMC Alias Private Key: 7
2,994,482 UART: [art] Derive CDI
2,994,762 UART: [art] Store in in slot 0x4
3,080,433 UART: [art] Derive Key Pair
3,080,793 UART: [art] Store priv key in slot 0x5
3,094,331 UART: [art] Derive Key Pair - Done
3,109,005 UART: [art] Signing Cert with AUTHO
3,109,485 UART: RITY.KEYID = 7
3,124,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,324 UART: [art] PUB.X = 1B4DE5543634F196EE028FCBC189E15E9824F8FBA8F5B71D361AA9C3964D00271DECB95675E5CBEDAFF2F78A89980535
3,132,078 UART: [art] PUB.Y = 9CF69637FE314A4E99A344B99B449813521A5878BB45B3A094776F5480565504169E5376760F8D9D16C9ECF2CD32D4B3
3,139,014 UART: [art] SIG.R = 3D6E15E04FF7B9A0D849BCA0B1E2CDEFD7C1D5DC9E0AB7D78863EFCC9D8F65B91A603D2DBF9D7B3A5F9A2A9728888280
3,145,807 UART: [art] SIG.S = 556E438BA48422981B76585AE5AC9DAB255CAC3D9B50F76508DA7AAC3DD51B82B0AA99A006F8350BBD4ED50377D1985E
3,170,070 UART: Caliptra RT
3,170,416 UART: [state] CFI Enabled
3,278,936 UART: [rt] RT listening for mailbox commands...
3,279,606 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,045 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,542 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,922 ready_for_fw is high
1,059,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,180 >>> mbox cmd response: success
2,688,838 UART:
2,688,854 UART: Running Caliptra FMC ...
2,689,262 UART:
2,689,405 UART: [state] CFI Enabled
2,699,894 UART: [fht] FMC Alias Private Key: 7
2,808,261 UART: [art] Extend RT PCRs Done
2,808,689 UART: [art] Lock RT PCRs Done
2,809,947 UART: [art] Populate DV Done
2,818,202 UART: [fht] FMC Alias Private Key: 7
2,819,228 UART: [art] Derive CDI
2,819,508 UART: [art] Store in in slot 0x4
2,904,999 UART: [art] Derive Key Pair
2,905,359 UART: [art] Store priv key in slot 0x5
2,917,863 UART: [art] Derive Key Pair - Done
2,932,431 UART: [art] Signing Cert with AUTHO
2,932,911 UART: RITY.KEYID = 7
2,947,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,658 UART: [art] PUB.X = C26482CBD1DC6765B9D61B4F4017310172DD0879513D641C0FA696ECFA4CFA58F53665CD6EDC512FE8DCB31805B4804E
2,955,426 UART: [art] PUB.Y = DE2962FFEDE7C7D20F1DDE71ECEC5F77A6298FA42A0E96E55B4FC709EF553E6A3F33469E6544852CC3EF74C64014C3CB
2,962,387 UART: [art] SIG.R = D20C1493727B4EA5BB0599416C8789707890C4F0AB1FB83AA64BC33D07E2D58BD6DA153EF6D648A91176D5419D50DF54
2,969,152 UART: [art] SIG.S = EB6B127A5374E3BF94BF49B4ABFE5EBA0C1C806E972DE66A6D61BBB86DD140343DE33DD5FC319E8F44856F795C017C06
2,993,070 UART: Caliptra RT
2,993,416 UART: [state] CFI Enabled
3,101,993 UART: [rt] RT listening for mailbox commands...
3,102,663 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,862 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,363 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,170,249 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,174,485 ready_for_fw is high
1,174,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,982 UART: [ldev] ++
1,209,150 UART: [ldev] CDI.KEYID = 6
1,209,514 UART: [ldev] SUBJECT.KEYID = 5
1,209,941 UART: [ldev] AUTHORITY.KEYID = 7
1,210,404 UART: [ldev] FE.KEYID = 1
1,215,628 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,476 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,579 UART: [fwproc] Recv command 0x46574c44
1,282,312 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,556 >>> mbox cmd response: success
2,773,621 UART: [afmc] ++
2,773,789 UART: [afmc] CDI.KEYID = 6
2,774,152 UART: [afmc] SUBJECT.KEYID = 7
2,774,578 UART: [afmc] AUTHORITY.KEYID = 5
2,810,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,377 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,172 UART: [afmc] --
2,853,094 UART: [cold-reset] --
2,853,930 UART: [state] Locking Datavault
2,854,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,329 UART: [state] Locking ICCM
2,855,849 UART: [exit] Launching FMC @ 0x40000130
2,861,178 UART:
2,861,194 UART: Running Caliptra FMC ...
2,861,602 UART:
2,861,656 UART: [state] CFI Enabled
2,872,299 UART: [fht] FMC Alias Private Key: 7
2,980,366 UART: [art] Extend RT PCRs Done
2,980,794 UART: [art] Lock RT PCRs Done
2,982,266 UART: [art] Populate DV Done
2,990,415 UART: [fht] FMC Alias Private Key: 7
2,991,359 UART: [art] Derive CDI
2,991,639 UART: [art] Store in in slot 0x4
3,077,556 UART: [art] Derive Key Pair
3,077,916 UART: [art] Store priv key in slot 0x5
3,091,038 UART: [art] Derive Key Pair - Done
3,105,851 UART: [art] Signing Cert with AUTHO
3,106,331 UART: RITY.KEYID = 7
3,121,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,128 UART: [art] PUB.X = C5FDB675CBCDFA981DA12A1E7BA8EC6EECB6CED4FD6F8C9BBDDE313AEACA035A47BDC644CC0C83906178A6903474391C
3,128,926 UART: [art] PUB.Y = 5C233F6A68F8D5B7C371A9D4DFE62CC258D71894DD51F7422C78BF27E6B56CB75F6F48E6C6B95EB90E88DB15F129D0AC
3,135,889 UART: [art] SIG.R = D1334F9B8F54531EBC102560C4BC845E626C572F6050D327873034CE81D8DC0BB8387FA012A3967A9A49C39176E6ACCB
3,142,658 UART: [art] SIG.S = 5BCB4C3A6525404B5ED0872917877CC7CA2B714596502042838774F6F4D1DC4EDB1765133F22981F4797222CE45DCC23
3,166,513 UART: Caliptra RT
3,166,767 UART: [state] CFI Enabled
3,274,345 UART: [rt] RT listening for mailbox commands...
3,275,015 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,432 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,849 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,960 ready_for_fw is high
1,055,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,456 >>> mbox cmd response: success
2,683,288 UART:
2,683,304 UART: Running Caliptra FMC ...
2,683,712 UART:
2,683,766 UART: [state] CFI Enabled
2,693,971 UART: [fht] FMC Alias Private Key: 7
2,801,866 UART: [art] Extend RT PCRs Done
2,802,294 UART: [art] Lock RT PCRs Done
2,803,824 UART: [art] Populate DV Done
2,811,975 UART: [fht] FMC Alias Private Key: 7
2,813,111 UART: [art] Derive CDI
2,813,391 UART: [art] Store in in slot 0x4
2,898,788 UART: [art] Derive Key Pair
2,899,148 UART: [art] Store priv key in slot 0x5
2,912,534 UART: [art] Derive Key Pair - Done
2,927,108 UART: [art] Signing Cert with AUTHO
2,927,588 UART: RITY.KEYID = 7
2,943,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,961 UART: [art] PUB.X = 8369B8715DF939BB2DD3A990CFE5B3035351901116018489AC58D7958E51E0D072439BBE45F334BA44769A4804213BEA
2,950,716 UART: [art] PUB.Y = 69BBB5C2BE320E7B5CFEEBA8BFCA0D3AF96A5AD7A0643C3209792E09B58A178082D9F6AFDF99226EC2950A3E99CF71AE
2,957,675 UART: [art] SIG.R = 7BBE29BFBB99BC89DFBD5EE1323EE5AA26E9DE65888FA5C55BBF1214212C96CDF90946B0ADE0270CD5982E670F85422F
2,964,456 UART: [art] SIG.S = 74FC5370C1142840AC5C696C012EDF427EADE4BEE9924676EFF7923E03C38AFC1239CA018D4F1A53A2E23C843C1D50E3
2,988,190 UART: Caliptra RT
2,988,444 UART: [state] CFI Enabled
3,097,148 UART: [rt] RT listening for mailbox commands...
3,097,818 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,161 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,748 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 ready_for_fw is high
1,174,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,004 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,687 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,567 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,139 >>> mbox cmd response: success
2,775,268 UART: [afmc] ++
2,775,436 UART: [afmc] CDI.KEYID = 6
2,775,799 UART: [afmc] SUBJECT.KEYID = 7
2,776,225 UART: [afmc] AUTHORITY.KEYID = 5
2,811,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,245 UART: [afmc] --
2,855,171 UART: [cold-reset] --
2,856,121 UART: [state] Locking Datavault
2,857,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,952 UART: [state] Locking ICCM
2,858,432 UART: [exit] Launching FMC @ 0x40000130
2,863,761 UART:
2,863,777 UART: Running Caliptra FMC ...
2,864,185 UART:
2,864,328 UART: [state] CFI Enabled
2,875,073 UART: [fht] FMC Alias Private Key: 7
2,983,096 UART: [art] Extend RT PCRs Done
2,983,524 UART: [art] Lock RT PCRs Done
2,985,142 UART: [art] Populate DV Done
2,993,367 UART: [fht] FMC Alias Private Key: 7
2,994,311 UART: [art] Derive CDI
2,994,591 UART: [art] Store in in slot 0x4
3,080,034 UART: [art] Derive Key Pair
3,080,394 UART: [art] Store priv key in slot 0x5
3,093,768 UART: [art] Derive Key Pair - Done
3,108,321 UART: [art] Signing Cert with AUTHO
3,108,801 UART: RITY.KEYID = 7
3,123,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,582 UART: [art] PUB.X = F1FF2A713A81223650DDD442B4986EDF85BD9E0967F38907655108B4F4D9BE4A7A312691F445705745F70467BB62D732
3,131,334 UART: [art] PUB.Y = 8442431038BDA2A835E596C5D2FAD9686EC9D9C4998A69FE83235DE221D973B9A6EBBAF63919EA3E49238B8DCB5AFBC6
3,138,298 UART: [art] SIG.R = D50EAF570FA364DD6244F996911475BEFBB0470AF2709F668CF6A36FCBBABB6B64D0BE9DB8109DBF6B956B1DFEBED0B2
3,145,087 UART: [art] SIG.S = D85782659FF9A8219AE6E30E5F761B14055C3960B68940DAA198E08FFFC1010F367C5ED03D50D80010661A666DB0D301
3,168,613 UART: Caliptra RT
3,168,959 UART: [state] CFI Enabled
3,276,454 UART: [rt] RT listening for mailbox commands...
3,277,124 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,491 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,918 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,331 ready_for_fw is high
1,057,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,277 >>> mbox cmd response: success
2,685,241 UART:
2,685,257 UART: Running Caliptra FMC ...
2,685,665 UART:
2,685,808 UART: [state] CFI Enabled
2,696,461 UART: [fht] FMC Alias Private Key: 7
2,804,138 UART: [art] Extend RT PCRs Done
2,804,566 UART: [art] Lock RT PCRs Done
2,805,870 UART: [art] Populate DV Done
2,814,065 UART: [fht] FMC Alias Private Key: 7
2,815,047 UART: [art] Derive CDI
2,815,327 UART: [art] Store in in slot 0x4
2,901,070 UART: [art] Derive Key Pair
2,901,430 UART: [art] Store priv key in slot 0x5
2,914,822 UART: [art] Derive Key Pair - Done
2,929,394 UART: [art] Signing Cert with AUTHO
2,929,874 UART: RITY.KEYID = 7
2,945,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,233 UART: [art] PUB.X = E7E1970FB2D140AC04B5485C9553811117535799B6B9766433B51251F1F8E518193632280DD5E021B2FB5FD9B26B7C00
2,952,962 UART: [art] PUB.Y = 7E2F753D39BDA1FDA5977C8ABA11B7CB0AB7DB0A2FA37313B39497D793367520BFFD2ACF5A7E0714BAE063C4796F220A
2,959,918 UART: [art] SIG.R = 08113CCD43E2D8093C74D8A37884C2FCF68223B815238A6FA462EFC72E75CBCFC3CCEC124307E1F55F06016F4157B34B
2,966,681 UART: [art] SIG.S = 3E58B7266EBB48E3B8ECB2F81289E3B610FA8BAFF14DF77A81692CE3AC469D0ED899F6E430F29DA4632733C15A5F3D52
2,990,527 UART: Caliptra RT
2,990,873 UART: [state] CFI Enabled
3,098,953 UART: [rt] RT listening for mailbox commands...
3,099,623 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,906 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,579 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,313 UART:
192,687 UART: Running Caliptra ROM ...
193,812 UART:
193,952 UART: [state] CFI Enabled
262,883 UART: [state] LifecycleState = Unprovisioned
264,814 UART: [state] DebugLocked = No
267,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,663 UART: [kat] SHA2-256
442,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,867 UART: [kat] ++
453,348 UART: [kat] sha1
465,280 UART: [kat] SHA2-256
468,000 UART: [kat] SHA2-384
472,148 UART: [kat] SHA2-512-ACC
474,510 UART: [kat] ECC-384
2,768,738 UART: [kat] HMAC-384Kdf
2,800,051 UART: [kat] LMS
3,990,332 UART: [kat] --
3,994,353 UART: [cold-reset] ++
3,995,715 UART: [fht] Storing FHT @ 0x50003400
4,006,618 UART: [idev] ++
4,007,180 UART: [idev] CDI.KEYID = 6
4,008,164 UART: [idev] SUBJECT.KEYID = 7
4,009,424 UART: [idev] UDS.KEYID = 0
4,010,492 ready_for_fw is high
4,010,714 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,433 UART: [idev] Erasing UDS.KEYID = 0
7,345,460 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,373 UART: [idev] --
7,371,576 UART: [ldev] ++
7,372,138 UART: [ldev] CDI.KEYID = 6
7,373,094 UART: [ldev] SUBJECT.KEYID = 5
7,374,300 UART: [ldev] AUTHORITY.KEYID = 7
7,375,580 UART: [ldev] FE.KEYID = 1
7,422,461 UART: [ldev] Erasing FE.KEYID = 1
10,753,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,547 UART: [ldev] --
13,116,485 UART: [fwproc] Waiting for Commands...
13,119,111 UART: [fwproc] Received command 0x46574c44
13,121,290 UART: [fwproc] Received Image of size 114036 bytes
17,174,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,634,951 >>> mbox cmd response: success
17,638,481 UART: [afmc] ++
17,639,074 UART: [afmc] CDI.KEYID = 6
17,639,982 UART: [afmc] SUBJECT.KEYID = 7
17,641,189 UART: [afmc] AUTHORITY.KEYID = 5
21,005,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,436 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,694 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,152 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,899 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,327 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,538 UART: [afmc] --
23,374,584 UART: [cold-reset] --
23,378,393 UART: [state] Locking Datavault
23,385,853 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,605 UART: [state] Locking ICCM
23,389,093 UART: [exit] Launching FMC @ 0x40000130
23,397,458 UART:
23,397,703 UART: Running Caliptra FMC ...
23,398,797 UART:
23,398,947 UART: [state] CFI Enabled
23,465,121 UART: [fht] FMC Alias Private Key: 7
25,803,396 UART: [art] Extend RT PCRs Done
25,804,644 UART: [art] Lock RT PCRs Done
25,805,986 UART: [art] Populate DV Done
25,811,130 UART: [fht] FMC Alias Private Key: 7
25,812,824 UART: [art] Derive CDI
25,813,629 UART: [art] Store in in slot 0x4
25,874,127 UART: [art] Derive Key Pair
25,875,162 UART: [art] Store priv key in slot 0x5
29,168,234 UART: [art] Derive Key Pair - Done
29,181,065 UART: [art] Signing Cert with AUTHO
29,182,364 UART: RITY.KEYID = 7
31,470,345 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,863 UART: [art] PUB.X = 2B7E913DA3F99ED8A3B665EADF8A761D34CAFAF6755B4967E37C0381B232F4C42A4FB854073662AA79025AD7D10A8551
31,479,082 UART: [art] PUB.Y = B676E77D0048E5D60A9AEE541FFA08E79B65F7C1618FA4C58EE5401BD4FDC464FCCBEF29A82A594DED592C40646C528B
31,486,334 UART: [art] SIG.R = 0211140AE0AAC61502B65B86A75A4457BC00DA60B93710E11872B762980D25DF7211F458EEAE609E35ECD0E24AC0D186
31,493,697 UART: [art] SIG.S = 91F85B3AFBC385A3BF05165305C8BC545BB3A4CD59DFE2C18217443C2D36CD70A55299FB4B796DCB9B5C5E832811B56D
32,798,612 UART: Caliptra RT
32,799,310 UART: [state] CFI Enabled
32,961,137 UART: [rt] RT listening for mailbox commands...
32,965,107 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,009,535 UART: [rt]cmd =0x4c4d5356, len=1672
33,423,394 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,807,529 ready_for_fw is high
3,807,941 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,888,921 >>> mbox cmd response: success
23,591,654 UART:
23,592,053 UART: Running Caliptra FMC ...
23,593,176 UART:
23,593,327 UART: [state] CFI Enabled
23,661,098 UART: [fht] FMC Alias Private Key: 7
25,998,507 UART: [art] Extend RT PCRs Done
25,999,729 UART: [art] Lock RT PCRs Done
26,001,457 UART: [art] Populate DV Done
26,006,726 UART: [fht] FMC Alias Private Key: 7
26,008,276 UART: [art] Derive CDI
26,009,037 UART: [art] Store in in slot 0x4
26,070,197 UART: [art] Derive Key Pair
26,071,236 UART: [art] Store priv key in slot 0x5
29,364,139 UART: [art] Derive Key Pair - Done
29,377,033 UART: [art] Signing Cert with AUTHO
29,378,353 UART: RITY.KEYID = 7
31,666,524 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,031 UART: [art] PUB.X = B0FD261B64813B68922C7BF60BF28A7BEBDF2E3F9DA713F7EB8F826FDBCD37323DBF702F8BD18E968BF0D56E27280055
31,675,257 UART: [art] PUB.Y = 20696CFE4C0DF099224EE44DCE4CCEDCAAEC229AD80723C9137E3FD993020356C66591D4495555B0EE82F6F538D44A8C
31,682,561 UART: [art] SIG.R = 79F924B88FBE976BA2AC7385863CF3625E67E91EF6ED91D40CF0883F72F44CFB292DA3436890BC9A611C4D8EE3C1EA91
31,689,932 UART: [art] SIG.S = 287F1F25A163790B208BDCD41F87135954E1C8C10FAD9423B6FAA5A3FD0F8A5961DCD4DCDE54A47EA98181FF916F94D7
32,994,950 UART: Caliptra RT
32,995,641 UART: [state] CFI Enabled
33,156,541 UART: [rt] RT listening for mailbox commands...
33,160,492 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,205,106 UART: [rt]cmd =0x4c4d5356, len=1672
33,619,024 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,329 UART:
192,680 UART: Running Caliptra ROM ...
193,799 UART:
603,648 UART: [state] CFI Enabled
618,960 UART: [state] LifecycleState = Unprovisioned
620,831 UART: [state] DebugLocked = No
622,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,200 UART: [kat] SHA2-256
796,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,432 UART: [kat] ++
807,949 UART: [kat] sha1
819,319 UART: [kat] SHA2-256
822,054 UART: [kat] SHA2-384
828,779 UART: [kat] SHA2-512-ACC
831,116 UART: [kat] ECC-384
3,117,757 UART: [kat] HMAC-384Kdf
3,129,205 UART: [kat] LMS
4,319,312 UART: [kat] --
4,325,999 UART: [cold-reset] ++
4,327,927 UART: [fht] Storing FHT @ 0x50003400
4,339,688 UART: [idev] ++
4,340,252 UART: [idev] CDI.KEYID = 6
4,341,283 UART: [idev] SUBJECT.KEYID = 7
4,342,458 UART: [idev] UDS.KEYID = 0
4,343,520 ready_for_fw is high
4,343,743 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,487,455 UART: [idev] Erasing UDS.KEYID = 0
7,625,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,259 UART: [idev] --
7,650,648 UART: [ldev] ++
7,651,277 UART: [ldev] CDI.KEYID = 6
7,652,187 UART: [ldev] SUBJECT.KEYID = 5
7,653,403 UART: [ldev] AUTHORITY.KEYID = 7
7,654,688 UART: [ldev] FE.KEYID = 1
7,665,550 UART: [ldev] Erasing FE.KEYID = 1
10,956,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,620 UART: [ldev] --
13,319,051 UART: [fwproc] Waiting for Commands...
13,321,639 UART: [fwproc] Received command 0x46574c44
13,323,813 UART: [fwproc] Received Image of size 114036 bytes
17,375,407 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,020 >>> mbox cmd response: success
17,837,917 UART: [afmc] ++
17,838,566 UART: [afmc] CDI.KEYID = 6
17,839,473 UART: [afmc] SUBJECT.KEYID = 7
17,840,691 UART: [afmc] AUTHORITY.KEYID = 5
21,153,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,020 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,367 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,205 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,691 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,027 UART: [afmc] --
23,519,005 UART: [cold-reset] --
23,524,455 UART: [state] Locking Datavault
23,528,893 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,587 UART: [state] Locking ICCM
23,533,364 UART: [exit] Launching FMC @ 0x40000130
23,541,757 UART:
23,541,988 UART: Running Caliptra FMC ...
23,543,012 UART:
23,543,160 UART: [state] CFI Enabled
23,550,858 UART: [fht] FMC Alias Private Key: 7
25,881,833 UART: [art] Extend RT PCRs Done
25,883,052 UART: [art] Lock RT PCRs Done
25,885,150 UART: [art] Populate DV Done
25,890,617 UART: [fht] FMC Alias Private Key: 7
25,892,100 UART: [art] Derive CDI
25,892,834 UART: [art] Store in in slot 0x4
25,935,641 UART: [art] Derive Key Pair
25,936,659 UART: [art] Store priv key in slot 0x5
29,178,702 UART: [art] Derive Key Pair - Done
29,191,643 UART: [art] Signing Cert with AUTHO
29,192,944 UART: RITY.KEYID = 7
31,472,517 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,018 UART: [art] PUB.X = BB62E3713F17531BD6F3792A5664AED6066587DE77830CE81A764AA16A98024CB2519DE0C561BEF474FD885A89479DD4
31,481,219 UART: [art] PUB.Y = 27EAFB2D3E711D4BDCE1C5D10A1B0727DB7FBDD359CD56CD37C264F961689ED69D977C374716CBC380843A21D98AC42C
31,488,520 UART: [art] SIG.R = FB060C83DB8EBF6CB15042D6F2CE8DAC03C4B481ED3D15BDEDC19F7F2AF04DCAB36A8520912E01B0BEDDB192388C1399
31,495,921 UART: [art] SIG.S = 10F45087D7E36984203332AFA59445231597133406A704DC263B5865FF3B613C62DB8542417AF86FE06E3895999E4899
32,801,122 UART: Caliptra RT
32,801,836 UART: [state] CFI Enabled
32,919,892 UART: [rt] RT listening for mailbox commands...
32,923,815 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,967,997 UART: [rt]cmd =0x4c4d5356, len=1672
33,381,760 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
4,124,935 ready_for_fw is high
4,125,533 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,357 >>> mbox cmd response: success
23,724,271 UART:
23,724,785 UART: Running Caliptra FMC ...
23,725,912 UART:
23,726,065 UART: [state] CFI Enabled
23,734,056 UART: [fht] FMC Alias Private Key: 7
26,064,886 UART: [art] Extend RT PCRs Done
26,066,125 UART: [art] Lock RT PCRs Done
26,068,033 UART: [art] Populate DV Done
26,073,477 UART: [fht] FMC Alias Private Key: 7
26,074,974 UART: [art] Derive CDI
26,075,739 UART: [art] Store in in slot 0x4
26,118,664 UART: [art] Derive Key Pair
26,119,665 UART: [art] Store priv key in slot 0x5
29,361,956 UART: [art] Derive Key Pair - Done
29,374,630 UART: [art] Signing Cert with AUTHO
29,375,938 UART: RITY.KEYID = 7
31,655,107 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,613 UART: [art] PUB.X = D8C67E672B991E68B5A2C88940237ACF27BDBB7200A67CBF2055A12863D9A68C2191FD6BF94ACAE0AA004C404F37E479
31,663,832 UART: [art] PUB.Y = D0D3D4513254867BBC8CDC228A336FB26586E4263216BD184E5D538F33D4FB6853BFC9F3F95CC50D6A96CC2CAD12E561
31,671,090 UART: [art] SIG.R = CFF3159A4C709C6A4A0EDD3D1DDEA448B8B695407AB7B9B8D202B04C885C49136F79C88C2EC677C61F41BC2EC6872A52
31,678,519 UART: [art] SIG.S = 796C77E3807E73ECE984C29E6733CB1076DD1D0D86415812426AC9B98D74385BED4AE99DD24BEF53EFA3094CB7345360
32,983,342 UART: Caliptra RT
32,984,059 UART: [state] CFI Enabled
33,102,498 UART: [rt] RT listening for mailbox commands...
33,106,545 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,151,042 UART: [rt]cmd =0x4c4d5356, len=1672
33,564,837 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
192,715 UART:
193,094 UART: Running Caliptra ROM ...
194,300 UART:
194,453 UART: [state] CFI Enabled
269,097 UART: [state] LifecycleState = Unprovisioned
270,946 UART: [state] DebugLocked = No
272,911 UART: [state] WD Timer not started. Device not locked for debugging
275,954 UART: [kat] SHA2-256
455,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,631 UART: [kat] ++
467,101 UART: [kat] sha1
478,855 UART: [kat] SHA2-256
481,904 UART: [kat] SHA2-384
487,693 UART: [kat] SHA2-512-ACC
490,635 UART: [kat] ECC-384
2,945,685 UART: [kat] HMAC-384Kdf
2,970,980 UART: [kat] LMS
3,500,440 UART: [kat] --
3,503,439 UART: [cold-reset] ++
3,504,444 UART: [fht] FHT @ 0x50003400
3,515,145 UART: [idev] ++
3,515,751 UART: [idev] CDI.KEYID = 6
3,516,637 UART: [idev] SUBJECT.KEYID = 7
3,517,764 UART: [idev] UDS.KEYID = 0
3,518,726 ready_for_fw is high
3,518,918 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,611 UART: [idev] Erasing UDS.KEYID = 0
6,026,357 UART: [idev] Sha1 KeyId Algorithm
6,049,016 UART: [idev] --
6,052,858 UART: [ldev] ++
6,053,435 UART: [ldev] CDI.KEYID = 6
6,054,326 UART: [ldev] SUBJECT.KEYID = 5
6,055,543 UART: [ldev] AUTHORITY.KEYID = 7
6,056,777 UART: [ldev] FE.KEYID = 1
6,100,002 UART: [ldev] Erasing FE.KEYID = 1
8,604,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,216 UART: [ldev] --
10,409,949 UART: [fwproc] Wait for Commands...
10,411,686 UART: [fwproc] Recv command 0x46574c44
10,413,779 UART: [fwproc] Recv'd Img size: 114360 bytes
13,812,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,273,579 >>> mbox cmd response: success
14,277,891 UART: [afmc] ++
14,278,493 UART: [afmc] CDI.KEYID = 6
14,279,377 UART: [afmc] SUBJECT.KEYID = 7
14,280,591 UART: [afmc] AUTHORITY.KEYID = 5
16,803,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,256 UART: [afmc] --
18,604,553 UART: [cold-reset] --
18,607,381 UART: [state] Locking Datavault
18,611,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,724 UART: [state] Locking ICCM
18,615,467 UART: [exit] Launching FMC @ 0x40000130
18,623,863 UART:
18,624,103 UART: Running Caliptra FMC ...
18,625,204 UART:
18,625,361 UART: [state] CFI Enabled
18,686,594 UART: [fht] FMC Alias Private Key: 7
20,450,423 UART: [art] Extend RT PCRs Done
20,451,645 UART: [art] Lock RT PCRs Done
20,453,233 UART: [art] Populate DV Done
20,458,747 UART: [fht] FMC Alias Private Key: 7
20,460,397 UART: [art] Derive CDI
20,461,153 UART: [art] Store in in slot 0x4
20,518,897 UART: [art] Derive Key Pair
20,519,931 UART: [art] Store priv key in slot 0x5
22,982,441 UART: [art] Derive Key Pair - Done
22,995,707 UART: [art] Signing Cert with AUTHO
22,997,015 UART: RITY.KEYID = 7
24,707,540 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,031 UART: [art] PUB.X = A32A37F4E49AC1BFC360A16BA2B429B896E128EF0F2D521A33803281142C3072AA42BEA71F3526E1CAA46AED9E5F5BE0
24,716,356 UART: [art] PUB.Y = 0C91512EBA449D911B20DAF81FDD03609C53A5E2A459A0A255371EE7E951D0CA63E749B769117257EAC07BB2E53DDB20
24,723,616 UART: [art] SIG.R = 574734036A54712BC09EC7A578C8B4FF0942AB0CE625AA9ACCDF0359CB620B9A326E2E37380B32D150D908C74D4C5547
24,730,980 UART: [art] SIG.S = 4458AA09AFF0B1D0B289AAC90AFE939872BFB14115F6E4B017D9267A4A620336AD5A9013220432ADC2EDCFDF97FBA7BF
25,709,706 UART: Caliptra RT
25,710,426 UART: [state] CFI Enabled
25,875,373 UART: [rt] RT listening for mailbox commands...
25,879,372 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,923,724 UART: [rt]cmd =0x4c4d5356, len=1672
26,125,371 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,418 UART:
192,785 UART: Running Caliptra ROM ...
193,922 UART:
194,069 UART: [state] CFI Enabled
263,044 UART: [state] LifecycleState = Unprovisioned
265,408 UART: [state] DebugLocked = No
268,109 UART: [state] WD Timer not started. Device not locked for debugging
273,212 UART: [kat] SHA2-256
463,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,857 UART: [kat] ++
474,336 UART: [kat] sha1
486,175 UART: [kat] SHA2-256
489,230 UART: [kat] SHA2-384
495,162 UART: [kat] SHA2-512-ACC
497,747 UART: [kat] ECC-384
2,947,749 UART: [kat] HMAC-384Kdf
2,970,646 UART: [kat] LMS
3,502,421 UART: [kat] --
3,506,411 UART: [cold-reset] ++
3,508,413 UART: [fht] FHT @ 0x50003400
3,521,092 UART: [idev] ++
3,521,812 UART: [idev] CDI.KEYID = 6
3,522,739 UART: [idev] SUBJECT.KEYID = 7
3,523,916 UART: [idev] UDS.KEYID = 0
3,524,840 ready_for_fw is high
3,525,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,846 UART: [idev] Erasing UDS.KEYID = 0
6,027,834 UART: [idev] Sha1 KeyId Algorithm
6,049,404 UART: [idev] --
6,053,626 UART: [ldev] ++
6,054,320 UART: [ldev] CDI.KEYID = 6
6,055,235 UART: [ldev] SUBJECT.KEYID = 5
6,056,397 UART: [ldev] AUTHORITY.KEYID = 7
6,057,635 UART: [ldev] FE.KEYID = 1
6,099,118 UART: [ldev] Erasing FE.KEYID = 1
8,610,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,245 UART: [ldev] --
10,413,087 UART: [fwproc] Wait for Commands...
10,416,002 UART: [fwproc] Recv command 0x46574c44
10,418,317 UART: [fwproc] Recv'd Img size: 114360 bytes
13,869,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,608,497 >>> mbox cmd response: success
14,612,700 UART: [afmc] ++
14,613,405 UART: [afmc] CDI.KEYID = 6
14,614,511 UART: [afmc] SUBJECT.KEYID = 7
14,616,063 UART: [afmc] AUTHORITY.KEYID = 5
17,147,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,136 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,961,968 UART: [afmc] --
18,965,556 UART: [cold-reset] --
18,968,888 UART: [state] Locking Datavault
18,974,497 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,650 UART: [state] Locking ICCM
18,979,601 UART: [exit] Launching FMC @ 0x40000130
18,988,276 UART:
18,988,513 UART: Running Caliptra FMC ...
18,989,539 UART:
18,989,685 UART: [state] CFI Enabled
19,048,113 UART: [fht] FMC Alias Private Key: 7
20,812,066 UART: [art] Extend RT PCRs Done
20,813,315 UART: [art] Lock RT PCRs Done
20,814,751 UART: [art] Populate DV Done
20,820,263 UART: [fht] FMC Alias Private Key: 7
20,821,917 UART: [art] Derive CDI
20,822,736 UART: [art] Store in in slot 0x4
20,880,691 UART: [art] Derive Key Pair
20,881,690 UART: [art] Store priv key in slot 0x5
23,344,639 UART: [art] Derive Key Pair - Done
23,357,902 UART: [art] Signing Cert with AUTHO
23,359,212 UART: RITY.KEYID = 7
25,070,036 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,533 UART: [art] PUB.X = 7DFC062C9DE4C61AD8E5FE69C0C391A2F1E4E68420BBB15F8F7447272CD0F46F6D0014D298FB000AAAFAF68E20C9558D
25,078,830 UART: [art] PUB.Y = B0DD98004CCC5128B923559341B80B3F943347E66C51F420542B89170EAE0C13D83202C3745AAB8CB6F35B9687BC0C74
25,086,048 UART: [art] SIG.R = 375C1AEA257F3C8E8442F8B22719AEE813F603A3F125694EA951EA71A55994DBFC66333AB05655C79CD1FC8902EAF2F9
25,093,426 UART: [art] SIG.S = F6BE23E7E8939DD1ED68BB05B93DACC3BE18020ACABB4B6D0F2607FD77509A371464DB3CFCD3744021C92E6BC6081D84
26,072,098 UART: Caliptra RT
26,072,828 UART: [state] CFI Enabled
26,236,629 UART: [rt] RT listening for mailbox commands...
26,240,697 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,285,259 UART: [rt]cmd =0x4c4d5356, len=1672
26,486,619 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,439,399 ready_for_fw is high
3,439,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,741,942 >>> mbox cmd response: success
19,029,020 UART:
19,029,421 UART: Running Caliptra FMC ...
19,030,626 UART:
19,030,800 UART: [state] CFI Enabled
19,096,857 UART: [fht] FMC Alias Private Key: 7
20,861,762 UART: [art] Extend RT PCRs Done
20,862,984 UART: [art] Lock RT PCRs Done
20,864,576 UART: [art] Populate DV Done
20,869,820 UART: [fht] FMC Alias Private Key: 7
20,871,390 UART: [art] Derive CDI
20,872,128 UART: [art] Store in in slot 0x4
20,929,973 UART: [art] Derive Key Pair
20,930,977 UART: [art] Store priv key in slot 0x5
23,394,177 UART: [art] Derive Key Pair - Done
23,407,401 UART: [art] Signing Cert with AUTHO
23,408,706 UART: RITY.KEYID = 7
25,120,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,842 UART: [art] PUB.X = BEB500E61D4EFF4C33901433F91428701267029E194594CBA6F7F2CC00471452887C918D4E01A5179F556B8EB5C1FF04
25,129,054 UART: [art] PUB.Y = A3D0057356B64F3372238BFA81D0D8B0C7229BD7648F6363F9853DA7C9AB829584B7C96C45293C6AB03B0920CC711632
25,136,274 UART: [art] SIG.R = E1F3B42CB33D98794FC3F2EF9594773EE5CF7A8D687C9E1188A3F09071EFDFBB8C6FFF59B64C12438BFB6785AA26F1EB
25,143,692 UART: [art] SIG.S = FF121A2F1047CC84AC9D83E7D5744C741BE95C11C18184591F3ABBAAC068872C2CC0577B2104786A2E5AB9994C2B8361
26,122,424 UART: Caliptra RT
26,123,114 UART: [state] CFI Enabled
26,288,714 UART: [rt] RT listening for mailbox commands...
26,293,038 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,337,708 UART: [rt]cmd =0x4c4d5356, len=1672
26,539,257 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,398 UART:
192,766 UART: Running Caliptra ROM ...
193,957 UART:
603,534 UART: [state] CFI Enabled
618,512 UART: [state] LifecycleState = Unprovisioned
620,912 UART: [state] DebugLocked = No
623,237 UART: [state] WD Timer not started. Device not locked for debugging
627,623 UART: [kat] SHA2-256
817,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,309 UART: [kat] ++
828,835 UART: [kat] sha1
841,123 UART: [kat] SHA2-256
844,201 UART: [kat] SHA2-384
849,952 UART: [kat] SHA2-512-ACC
852,508 UART: [kat] ECC-384
3,293,609 UART: [kat] HMAC-384Kdf
3,306,901 UART: [kat] LMS
3,838,702 UART: [kat] --
3,842,265 UART: [cold-reset] ++
3,844,260 UART: [fht] FHT @ 0x50003400
3,856,297 UART: [idev] ++
3,856,930 UART: [idev] CDI.KEYID = 6
3,857,934 UART: [idev] SUBJECT.KEYID = 7
3,859,113 UART: [idev] UDS.KEYID = 0
3,860,039 ready_for_fw is high
3,860,227 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,811 UART: [idev] Erasing UDS.KEYID = 0
6,337,151 UART: [idev] Sha1 KeyId Algorithm
6,359,668 UART: [idev] --
6,364,090 UART: [ldev] ++
6,364,770 UART: [ldev] CDI.KEYID = 6
6,365,650 UART: [ldev] SUBJECT.KEYID = 5
6,366,861 UART: [ldev] AUTHORITY.KEYID = 7
6,368,092 UART: [ldev] FE.KEYID = 1
6,379,555 UART: [ldev] Erasing FE.KEYID = 1
8,857,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,454 UART: [ldev] --
10,646,284 UART: [fwproc] Wait for Commands...
10,648,212 UART: [fwproc] Recv command 0x46574c44
10,650,519 UART: [fwproc] Recv'd Img size: 114360 bytes
14,091,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,823,679 >>> mbox cmd response: success
14,828,590 UART: [afmc] ++
14,829,308 UART: [afmc] CDI.KEYID = 6
14,830,463 UART: [afmc] SUBJECT.KEYID = 7
14,831,993 UART: [afmc] AUTHORITY.KEYID = 5
17,332,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,073,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,088,796 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,103,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,127,616 UART: [afmc] --
19,131,753 UART: [cold-reset] --
19,135,880 UART: [state] Locking Datavault
19,140,530 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,713 UART: [state] Locking ICCM
19,145,054 UART: [exit] Launching FMC @ 0x40000130
19,153,712 UART:
19,153,945 UART: Running Caliptra FMC ...
19,155,040 UART:
19,155,198 UART: [state] CFI Enabled
19,163,189 UART: [fht] FMC Alias Private Key: 7
20,920,490 UART: [art] Extend RT PCRs Done
20,921,720 UART: [art] Lock RT PCRs Done
20,923,206 UART: [art] Populate DV Done
20,928,936 UART: [fht] FMC Alias Private Key: 7
20,930,622 UART: [art] Derive CDI
20,931,401 UART: [art] Store in in slot 0x4
20,973,672 UART: [art] Derive Key Pair
20,974,669 UART: [art] Store priv key in slot 0x5
23,400,790 UART: [art] Derive Key Pair - Done
23,413,945 UART: [art] Signing Cert with AUTHO
23,415,280 UART: RITY.KEYID = 7
25,120,318 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,810 UART: [art] PUB.X = 2BB730475737557304159E49379EC0C1CD9554F178FFC68836C16063A3A67327810D171AEDC2104D2E60280E686D515B
25,129,060 UART: [art] PUB.Y = 3FC6485233DFD0314978D01F6A61F751890E2658D2FC4704AE7338D399B69A36B0C68BB22BABCDEBF220E915FBA3761A
25,136,352 UART: [art] SIG.R = 7875BB8244C8488626158839C7DFE79C876F7003FE4E6F7131DC4BB23320E3A2E4AF76350D64EF8960A9F8879CD9090A
25,143,682 UART: [art] SIG.S = 131D021B4B0EEEBB14E6C14CE29F7999C7014EF16099ECB16E1EDAD462484A50C1C4B723FA7B93CB4F8A5ABF4B1729E2
26,122,707 UART: Caliptra RT
26,123,434 UART: [state] CFI Enabled
26,240,988 UART: [rt] RT listening for mailbox commands...
26,244,902 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,289,366 UART: [rt]cmd =0x4c4d5356, len=1672
26,490,941 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,755,569 ready_for_fw is high
3,755,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,965,444 >>> mbox cmd response: success
19,207,958 UART:
19,208,347 UART: Running Caliptra FMC ...
19,209,490 UART:
19,209,655 UART: [state] CFI Enabled
19,217,505 UART: [fht] FMC Alias Private Key: 7
20,974,589 UART: [art] Extend RT PCRs Done
20,975,813 UART: [art] Lock RT PCRs Done
20,977,435 UART: [art] Populate DV Done
20,982,648 UART: [fht] FMC Alias Private Key: 7
20,984,253 UART: [art] Derive CDI
20,984,991 UART: [art] Store in in slot 0x4
21,027,583 UART: [art] Derive Key Pair
21,028,590 UART: [art] Store priv key in slot 0x5
23,455,423 UART: [art] Derive Key Pair - Done
23,468,106 UART: [art] Signing Cert with AUTHO
23,469,410 UART: RITY.KEYID = 7
25,174,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,086 UART: [art] PUB.X = 3062A6CE9533D68544995AEAD69F5072BE7B68CE345EFFF392A33DFDAF7F48EA5AD463A1BE0CD76557564706925009C1
25,183,354 UART: [art] PUB.Y = D7F495BD16DC10DE8ECCB903FF587C1507055B2309B57E715FBD89C311ADF212A40F6016F93E4F08F33618119B0A3607
25,190,619 UART: [art] SIG.R = 6462EA3523D6B97FD4728FC0EF9CF4037CE52941DB5F4007116D2FDE2B25FC167D5148927F2993AE39D42C7852374F5F
25,198,117 UART: [art] SIG.S = AD74C1BB10D87C9562D16DBC56E1CD4A8979193AF5D7EBFF45775C0B3C36F705E1F523DB01EB910A298F79F21E5219B3
26,176,972 UART: Caliptra RT
26,177,682 UART: [state] CFI Enabled
26,294,961 UART: [rt] RT listening for mailbox commands...
26,299,008 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,343,374 UART: [rt]cmd =0x4c4d5356, len=1672
26,544,827 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,359 UART: [kat] SHA2-256
882,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,405 UART: [kat] ++
886,557 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,510 UART: [kat] SHA2-512-ACC
897,411 UART: [kat] ECC-384
902,858 UART: [kat] HMAC-384Kdf
907,312 UART: [kat] LMS
1,475,508 UART: [kat] --
1,476,257 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,486 UART: [idev] ++
1,479,654 UART: [idev] CDI.KEYID = 6
1,480,014 UART: [idev] SUBJECT.KEYID = 7
1,480,438 UART: [idev] UDS.KEYID = 0
1,480,783 ready_for_fw is high
1,480,783 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,505,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,814 UART: [idev] --
1,515,035 UART: [ldev] ++
1,515,203 UART: [ldev] CDI.KEYID = 6
1,515,566 UART: [ldev] SUBJECT.KEYID = 5
1,515,992 UART: [ldev] AUTHORITY.KEYID = 7
1,516,455 UART: [ldev] FE.KEYID = 1
1,521,651 UART: [ldev] Erasing FE.KEYID = 1
1,546,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,890 UART: [ldev] --
1,586,155 UART: [fwproc] Waiting for Commands...
1,587,014 UART: [fwproc] Received command 0x46574c44
1,587,805 UART: [fwproc] Received Image of size 114360 bytes
2,885,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,552 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,739 >>> mbox cmd response: success
3,079,955 UART: [afmc] ++
3,080,123 UART: [afmc] CDI.KEYID = 6
3,080,485 UART: [afmc] SUBJECT.KEYID = 7
3,080,910 UART: [afmc] AUTHORITY.KEYID = 5
3,116,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,125 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,633 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,518 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,208 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,125 UART: [afmc] --
3,159,067 UART: [cold-reset] --
3,159,965 UART: [state] Locking Datavault
3,161,278 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,882 UART: [state] Locking ICCM
3,162,500 UART: [exit] Launching FMC @ 0x40000130
3,167,829 UART:
3,167,845 UART: Running Caliptra FMC ...
3,168,253 UART:
3,168,307 UART: [state] CFI Enabled
3,178,610 UART: [fht] FMC Alias Private Key: 7
3,287,013 UART: [art] Extend RT PCRs Done
3,287,441 UART: [art] Lock RT PCRs Done
3,288,605 UART: [art] Populate DV Done
3,296,980 UART: [fht] FMC Alias Private Key: 7
3,298,002 UART: [art] Derive CDI
3,298,282 UART: [art] Store in in slot 0x4
3,384,247 UART: [art] Derive Key Pair
3,384,607 UART: [art] Store priv key in slot 0x5
3,397,299 UART: [art] Derive Key Pair - Done
3,411,772 UART: [art] Signing Cert with AUTHO
3,412,252 UART: RITY.KEYID = 7
3,427,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,919 UART: [art] PUB.X = 969299D88784020E0A8F41D92F2413F3EC34467C03D1F960DC94D8B11028C3050F884C759EB0331170ABDD4445E1B664
3,434,663 UART: [art] PUB.Y = FD6F7ED645EA58265EB27D6DBBF375926B703EFA7E09C909C9F35539384B6162746CE3E14E3C2D93DD8A5147A09323F5
3,441,613 UART: [art] SIG.R = 77978EA4C0561794DF3B8E86206007EE66CB5B0E1D353B052F347AB3E693828F8C45F74E9CEEAB0E832E7F0CBA4DD0C9
3,448,380 UART: [art] SIG.S = 9F88BA96C2B9CBD3C123248033DF132F16789EEE7D48CA88CE8EA67BD380A35B1DC9EDFA7531C4CA2D116530C196D278
3,472,231 UART: Caliptra RT
3,472,485 UART: [state] CFI Enabled
3,580,155 UART: [rt] RT listening for mailbox commands...
3,580,825 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,036 UART: [rt]cmd =0x4c4d5356, len=1672
3,873,723 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,199 >>> mbox cmd response: success
2,990,575 UART:
2,990,591 UART: Running Caliptra FMC ...
2,990,999 UART:
2,991,053 UART: [state] CFI Enabled
3,001,848 UART: [fht] FMC Alias Private Key: 7
3,110,059 UART: [art] Extend RT PCRs Done
3,110,487 UART: [art] Lock RT PCRs Done
3,111,789 UART: [art] Populate DV Done
3,119,650 UART: [fht] FMC Alias Private Key: 7
3,120,770 UART: [art] Derive CDI
3,121,050 UART: [art] Store in in slot 0x4
3,206,789 UART: [art] Derive Key Pair
3,207,149 UART: [art] Store priv key in slot 0x5
3,219,999 UART: [art] Derive Key Pair - Done
3,234,905 UART: [art] Signing Cert with AUTHO
3,235,385 UART: RITY.KEYID = 7
3,251,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,126 UART: [art] PUB.X = 4317955062D0C7CFEE8614C9AEAB9A473DBFF9D76A6BBB860BB7455504EBA6ED617F8C9B553C06139347DCBD22722AC7
3,258,901 UART: [art] PUB.Y = 2D2428AD7C6CE384A36FCEA3995F5A0FCD395F47E98B6FEECD7977846574C838AC422361BB3CFED54FB899F5E3C83D68
3,265,864 UART: [art] SIG.R = 18ABEA34868CC8A8CAD7937B1A1C3D5153A96182FEA5F48F54429BAAF0631AA028EFB16C8F489EA3B36BAB941412DB57
3,272,650 UART: [art] SIG.S = BB5504618D5FFD888808C3092E7CD42113103458573C493D79A742F2CAD7991B444A0A58D4080DC999C9373A010F593F
3,296,259 UART: Caliptra RT
3,296,513 UART: [state] CFI Enabled
3,404,777 UART: [rt] RT listening for mailbox commands...
3,405,447 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,996 UART: [rt]cmd =0x4c4d5356, len=1672
3,698,583 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,916 UART: [kat] SHA2-256
881,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,962 UART: [kat] ++
886,114 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,109 UART: [kat] SHA2-512-ACC
897,010 UART: [kat] ECC-384
902,725 UART: [kat] HMAC-384Kdf
907,531 UART: [kat] LMS
1,475,727 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,631 UART: [idev] ++
1,479,799 UART: [idev] CDI.KEYID = 6
1,480,159 UART: [idev] SUBJECT.KEYID = 7
1,480,583 UART: [idev] UDS.KEYID = 0
1,480,928 ready_for_fw is high
1,480,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,269 UART: [idev] Erasing UDS.KEYID = 0
1,504,957 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,960 UART: [ldev] ++
1,515,128 UART: [ldev] CDI.KEYID = 6
1,515,491 UART: [ldev] SUBJECT.KEYID = 5
1,515,917 UART: [ldev] AUTHORITY.KEYID = 7
1,516,380 UART: [ldev] FE.KEYID = 1
1,521,668 UART: [ldev] Erasing FE.KEYID = 1
1,547,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,825 UART: [ldev] --
1,586,254 UART: [fwproc] Waiting for Commands...
1,586,975 UART: [fwproc] Received command 0x46574c44
1,587,766 UART: [fwproc] Received Image of size 114360 bytes
2,885,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,391 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,584 >>> mbox cmd response: success
3,078,618 UART: [afmc] ++
3,078,786 UART: [afmc] CDI.KEYID = 6
3,079,148 UART: [afmc] SUBJECT.KEYID = 7
3,079,573 UART: [afmc] AUTHORITY.KEYID = 5
3,114,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,171 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,861 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,858 UART: [afmc] --
3,157,848 UART: [cold-reset] --
3,158,462 UART: [state] Locking Datavault
3,159,653 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,257 UART: [state] Locking ICCM
3,160,721 UART: [exit] Launching FMC @ 0x40000130
3,166,050 UART:
3,166,066 UART: Running Caliptra FMC ...
3,166,474 UART:
3,166,617 UART: [state] CFI Enabled
3,177,134 UART: [fht] FMC Alias Private Key: 7
3,285,347 UART: [art] Extend RT PCRs Done
3,285,775 UART: [art] Lock RT PCRs Done
3,287,329 UART: [art] Populate DV Done
3,295,824 UART: [fht] FMC Alias Private Key: 7
3,296,906 UART: [art] Derive CDI
3,297,186 UART: [art] Store in in slot 0x4
3,383,061 UART: [art] Derive Key Pair
3,383,421 UART: [art] Store priv key in slot 0x5
3,396,781 UART: [art] Derive Key Pair - Done
3,411,459 UART: [art] Signing Cert with AUTHO
3,411,939 UART: RITY.KEYID = 7
3,426,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,466 UART: [art] PUB.X = 30643941C7B8F1DD53286F920096F8964AE7F6E07A50B94AC09B674D3499C7AC3AF3E128DADF651AA96489E4AC6F6AA0
3,434,222 UART: [art] PUB.Y = 56BF7C1489DD3EB3B3CF0C52600CDD0F3B4A537AFBBC4BFBED81DACCD5B99FE35CB2276A06CD68B35AC7DCAFDD7E5487
3,441,198 UART: [art] SIG.R = AB701D9DB3BE63F62210DAAF88A4BB54289821893D53446D8366B910AA22D5964749A9D533D6B32B9D02481C347A4175
3,447,961 UART: [art] SIG.S = 26289541D6C3B158ABC07E028E8AAA5A4561E5781B5B7B3B457FE0457A9A4722C26671A84480868AB23AA2538887F1C5
3,471,769 UART: Caliptra RT
3,472,115 UART: [state] CFI Enabled
3,580,787 UART: [rt] RT listening for mailbox commands...
3,581,457 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,746 UART: [rt]cmd =0x4c4d5356, len=1672
3,874,303 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,868 ready_for_fw is high
1,361,868 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,942 >>> mbox cmd response: success
2,988,484 UART:
2,988,500 UART: Running Caliptra FMC ...
2,988,908 UART:
2,989,051 UART: [state] CFI Enabled
2,999,508 UART: [fht] FMC Alias Private Key: 7
3,107,277 UART: [art] Extend RT PCRs Done
3,107,705 UART: [art] Lock RT PCRs Done
3,108,743 UART: [art] Populate DV Done
3,116,952 UART: [fht] FMC Alias Private Key: 7
3,118,098 UART: [art] Derive CDI
3,118,378 UART: [art] Store in in slot 0x4
3,203,885 UART: [art] Derive Key Pair
3,204,245 UART: [art] Store priv key in slot 0x5
3,217,709 UART: [art] Derive Key Pair - Done
3,232,552 UART: [art] Signing Cert with AUTHO
3,233,032 UART: RITY.KEYID = 7
3,248,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,205 UART: [art] PUB.X = 27133073B8912B4A87364F5128D42CE71A70799F59D092E25187B9AA95E85EE57015FBCC5908176EBCB09C5C28425647
3,255,964 UART: [art] PUB.Y = 1ED2E6F92E59863C422E3F65D8599BEF6ED8CCC48DA1622C834A30B92B33564E8816B7DE67763F4BFE1E8F4534793BF7
3,262,922 UART: [art] SIG.R = 41209BF6D65739D0442C295370E0C7521B947CEC724E981446017C0031FFB9E8D104F5926AB5B50E754C86733510B7F1
3,269,651 UART: [art] SIG.S = 419A6D189274F6B8C1A594DB6049822DC7DC1FC3B9DEAB0D3CE410DF7133924132C8BE3917164F3C322F71A9F38B723B
3,293,465 UART: Caliptra RT
3,293,811 UART: [state] CFI Enabled
3,401,406 UART: [rt] RT listening for mailbox commands...
3,402,076 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,377 UART: [rt]cmd =0x4c4d5356, len=1672
3,694,768 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
893,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,443 UART: [kat] ++
897,595 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
918,416 UART: [kat] HMAC-384Kdf
923,028 UART: [kat] LMS
1,171,356 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,853 UART: [fht] FHT @ 0x50003400
1,175,524 UART: [idev] ++
1,175,692 UART: [idev] CDI.KEYID = 6
1,176,052 UART: [idev] SUBJECT.KEYID = 7
1,176,476 UART: [idev] UDS.KEYID = 0
1,176,821 ready_for_fw is high
1,176,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,201,373 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,895 UART: [ldev] ++
1,211,063 UART: [ldev] CDI.KEYID = 6
1,211,426 UART: [ldev] SUBJECT.KEYID = 5
1,211,852 UART: [ldev] AUTHORITY.KEYID = 7
1,212,315 UART: [ldev] FE.KEYID = 1
1,217,825 UART: [ldev] Erasing FE.KEYID = 1
1,244,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,415 UART: [ldev] --
1,283,866 UART: [fwproc] Wait for Commands...
1,284,514 UART: [fwproc] Recv command 0x46574c44
1,285,242 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,328 >>> mbox cmd response: success
2,777,532 UART: [afmc] ++
2,777,700 UART: [afmc] CDI.KEYID = 6
2,778,062 UART: [afmc] SUBJECT.KEYID = 7
2,778,487 UART: [afmc] AUTHORITY.KEYID = 5
2,813,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,564 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,283 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,157 UART: [afmc] --
2,857,185 UART: [cold-reset] --
2,858,109 UART: [state] Locking Datavault
2,859,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,890 UART: [state] Locking ICCM
2,860,552 UART: [exit] Launching FMC @ 0x40000130
2,865,881 UART:
2,865,897 UART: Running Caliptra FMC ...
2,866,305 UART:
2,866,359 UART: [state] CFI Enabled
2,876,490 UART: [fht] FMC Alias Private Key: 7
2,984,455 UART: [art] Extend RT PCRs Done
2,984,883 UART: [art] Lock RT PCRs Done
2,986,589 UART: [art] Populate DV Done
2,994,828 UART: [fht] FMC Alias Private Key: 7
2,995,786 UART: [art] Derive CDI
2,996,066 UART: [art] Store in in slot 0x4
3,081,415 UART: [art] Derive Key Pair
3,081,775 UART: [art] Store priv key in slot 0x5
3,095,231 UART: [art] Derive Key Pair - Done
3,110,372 UART: [art] Signing Cert with AUTHO
3,110,852 UART: RITY.KEYID = 7
3,126,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,945 UART: [art] PUB.X = 15291C5314F6A0DFA406B71C39FDA5860CD8CCA50C3F21F16DEC3369C897D33C4A2D9CFB82DF201FF98177E325C2F264
3,133,718 UART: [art] PUB.Y = 2ACE7AA8F7F2590396418865BB935CC271F481C86459047109CE4E28B5B6460928B036F2EAD89E95766EE943F5891FE5
3,140,652 UART: [art] SIG.R = 90679074BBDBBDDAD65654B50E9564C33D733B1AA85273572559E39A1F8158F9707551EDE11D8E790F452C3D4568B6B6
3,147,414 UART: [art] SIG.S = 6E3D2A378AE5AFBE953DC4DF930B83E2072E8F5A4C42F8BF04FB309B31AA2BF646D4B3EE8C199837D5F4CB3C21328E05
3,171,429 UART: Caliptra RT
3,171,683 UART: [state] CFI Enabled
3,279,875 UART: [rt] RT listening for mailbox commands...
3,280,545 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,816 UART: [rt]cmd =0x4c4d5356, len=1672
3,573,327 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,291 >>> mbox cmd response: success
2,689,307 UART:
2,689,323 UART: Running Caliptra FMC ...
2,689,731 UART:
2,689,785 UART: [state] CFI Enabled
2,700,472 UART: [fht] FMC Alias Private Key: 7
2,808,169 UART: [art] Extend RT PCRs Done
2,808,597 UART: [art] Lock RT PCRs Done
2,809,909 UART: [art] Populate DV Done
2,818,340 UART: [fht] FMC Alias Private Key: 7
2,819,492 UART: [art] Derive CDI
2,819,772 UART: [art] Store in in slot 0x4
2,905,505 UART: [art] Derive Key Pair
2,905,865 UART: [art] Store priv key in slot 0x5
2,918,703 UART: [art] Derive Key Pair - Done
2,933,702 UART: [art] Signing Cert with AUTHO
2,934,182 UART: RITY.KEYID = 7
2,949,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,849 UART: [art] PUB.X = 2C0CCAC13B39B8AC8FF99272E282DC57B320C44108145147BC414DD6D7228839CA7AF0808F4AB4F13AAE3466EB39A852
2,956,621 UART: [art] PUB.Y = AC7915F7CE45D29958177257280075AC7322387467D0E7976CD47A38DDD93751D087F52CB83D7C6AA658E1F6986F54EC
2,963,545 UART: [art] SIG.R = 3D1C289DF8E5906E8075670FE003A55A75D4B55F78EAFA10BB7B8E071073F2680347A12BBACED2F1BB5B900AD630E20C
2,970,309 UART: [art] SIG.S = 37C467AD5293DD2C6A68381C6445AC0BB76322A9C87831B2A546C4EE0779E43DEBABACD9252241C74FFBA2630B035AA4
2,994,236 UART: Caliptra RT
2,994,490 UART: [state] CFI Enabled
3,103,240 UART: [rt] RT listening for mailbox commands...
3,103,910 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,279 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,818 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,240 UART: [kat] SHA2-256
904,180 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,173,030 UART: [fht] FHT @ 0x50003400
1,175,705 UART: [idev] ++
1,175,873 UART: [idev] CDI.KEYID = 6
1,176,233 UART: [idev] SUBJECT.KEYID = 7
1,176,657 UART: [idev] UDS.KEYID = 0
1,177,002 ready_for_fw is high
1,177,002 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,214 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,217,698 UART: [ldev] Erasing FE.KEYID = 1
1,244,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,258 UART: [ldev] --
1,283,645 UART: [fwproc] Wait for Commands...
1,284,395 UART: [fwproc] Recv command 0x46574c44
1,285,123 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,301 >>> mbox cmd response: success
2,775,505 UART: [afmc] ++
2,775,673 UART: [afmc] CDI.KEYID = 6
2,776,035 UART: [afmc] SUBJECT.KEYID = 7
2,776,460 UART: [afmc] AUTHORITY.KEYID = 5
2,812,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,392 UART: [afmc] --
2,855,360 UART: [cold-reset] --
2,856,454 UART: [state] Locking Datavault
2,857,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,091 UART: [state] Locking ICCM
2,858,611 UART: [exit] Launching FMC @ 0x40000130
2,863,940 UART:
2,863,956 UART: Running Caliptra FMC ...
2,864,364 UART:
2,864,507 UART: [state] CFI Enabled
2,875,424 UART: [fht] FMC Alias Private Key: 7
2,982,549 UART: [art] Extend RT PCRs Done
2,982,977 UART: [art] Lock RT PCRs Done
2,984,399 UART: [art] Populate DV Done
2,992,824 UART: [fht] FMC Alias Private Key: 7
2,993,836 UART: [art] Derive CDI
2,994,116 UART: [art] Store in in slot 0x4
3,079,713 UART: [art] Derive Key Pair
3,080,073 UART: [art] Store priv key in slot 0x5
3,093,139 UART: [art] Derive Key Pair - Done
3,107,661 UART: [art] Signing Cert with AUTHO
3,108,141 UART: RITY.KEYID = 7
3,123,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,326 UART: [art] PUB.X = 6CECD424136F2C394F3E08CFD81CE84EEAD2C17E4B076A3E67A8B2991914EEC88BFF77FA9ADAAA8CB5D4816E21ED17EC
3,131,118 UART: [art] PUB.Y = 8D0750698EE7E872721B9A36128779CB9DBF9D89F791E206B0CC5A54AF970F47794CC7F7CA462ACEB33F2A336D05CD18
3,138,064 UART: [art] SIG.R = 2BD634F97A37DE5BCC9371B7DED4138F53C6FA939FDB9BF4DDEEEB7C93552D694BD0524416F6A95C843889D3222F2466
3,144,846 UART: [art] SIG.S = 4EC44118B6E4055388A5ECD821832021837827308AE9F3F7D3D0A987261ED3272C79050AD640611FDCFEE191646CA94B
3,168,402 UART: Caliptra RT
3,168,748 UART: [state] CFI Enabled
3,276,912 UART: [rt] RT listening for mailbox commands...
3,277,582 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,673 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,218 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,580 ready_for_fw is high
1,060,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,334 >>> mbox cmd response: success
2,689,782 UART:
2,689,798 UART: Running Caliptra FMC ...
2,690,206 UART:
2,690,349 UART: [state] CFI Enabled
2,700,712 UART: [fht] FMC Alias Private Key: 7
2,808,769 UART: [art] Extend RT PCRs Done
2,809,197 UART: [art] Lock RT PCRs Done
2,810,827 UART: [art] Populate DV Done
2,819,050 UART: [fht] FMC Alias Private Key: 7
2,820,082 UART: [art] Derive CDI
2,820,362 UART: [art] Store in in slot 0x4
2,905,747 UART: [art] Derive Key Pair
2,906,107 UART: [art] Store priv key in slot 0x5
2,919,427 UART: [art] Derive Key Pair - Done
2,934,308 UART: [art] Signing Cert with AUTHO
2,934,788 UART: RITY.KEYID = 7
2,950,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,831 UART: [art] PUB.X = FE2A3A3FA1027C9D81AC77ACD8B8A6AFCBFF0667985B7D85470596507CA2BC1AF3AD35190E26BCADB0EDF667027B724C
2,957,608 UART: [art] PUB.Y = E3E958E764780FBD1660291DBD8617A776EEF9EA555682BCF557051CA19A0085D8231BFA823D9BF2C0EB7811CACC0739
2,964,535 UART: [art] SIG.R = 06B521F09E0AC9460C38963FDE1C4BE8D6856E8AD3A35487F06608998522666A06BD9FD431F525EE521163A6A516688A
2,971,286 UART: [art] SIG.S = A69C5CCFC62E9E2635C35F04039D624B261450FE1B46CAFFABBC9648349909EDC5CB182E672323E7C2A4E78D0977E44E
2,994,935 UART: Caliptra RT
2,995,281 UART: [state] CFI Enabled
3,103,705 UART: [rt] RT listening for mailbox commands...
3,104,375 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,774 UART: [rt]cmd =0x4c4d5356, len=1672
3,397,505 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,258 UART: [kat] LMS
1,169,570 UART: [kat] --
1,170,623 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,174,985 ready_for_fw is high
1,174,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,041 UART: [idev] Erasing UDS.KEYID = 0
1,199,763 UART: [idev] Sha1 KeyId Algorithm
1,208,771 UART: [idev] --
1,209,878 UART: [ldev] ++
1,210,046 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,837 UART: [ldev] AUTHORITY.KEYID = 7
1,211,300 UART: [ldev] FE.KEYID = 1
1,216,460 UART: [ldev] Erasing FE.KEYID = 1
1,243,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,686 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,974 >>> mbox cmd response: success
2,773,997 UART: [afmc] ++
2,774,165 UART: [afmc] CDI.KEYID = 6
2,774,528 UART: [afmc] SUBJECT.KEYID = 7
2,774,954 UART: [afmc] AUTHORITY.KEYID = 5
2,811,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,450 UART: [afmc] --
2,854,342 UART: [cold-reset] --
2,855,126 UART: [state] Locking Datavault
2,856,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,107 UART: [state] Locking ICCM
2,857,769 UART: [exit] Launching FMC @ 0x40000130
2,863,098 UART:
2,863,114 UART: Running Caliptra FMC ...
2,863,522 UART:
2,863,576 UART: [state] CFI Enabled
2,873,723 UART: [fht] FMC Alias Private Key: 7
2,981,130 UART: [art] Extend RT PCRs Done
2,981,558 UART: [art] Lock RT PCRs Done
2,982,808 UART: [art] Populate DV Done
2,990,875 UART: [fht] FMC Alias Private Key: 7
2,992,003 UART: [art] Derive CDI
2,992,283 UART: [art] Store in in slot 0x4
3,078,148 UART: [art] Derive Key Pair
3,078,508 UART: [art] Store priv key in slot 0x5
3,091,506 UART: [art] Derive Key Pair - Done
3,106,255 UART: [art] Signing Cert with AUTHO
3,106,735 UART: RITY.KEYID = 7
3,121,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,608 UART: [art] PUB.X = AA263E89118911E11D35FC8B8406EFFC95625A0F1A31AC8F7655505BA0CD53B1DE3A5E358DE1D1E412B94B57A6E9C9CE
3,129,386 UART: [art] PUB.Y = 9149EF472A8CBE5A00F8EEB4FA9B8AA59C9A0DFC1FAB644CB78BD06B4749F9B2B77759BDDE8F816A5706BCADCA100344
3,136,331 UART: [art] SIG.R = A23A4A470D4E798C70106945098D2CB8649CFA3527DE1224A85CA047C4FEEBA8A61EA550F3B7FF2D49DD9886867B00A1
3,143,081 UART: [art] SIG.S = E1EAD1B94D8664DE38782968EBEC819AD6253C0C9A48AF5C43F9CE6AE13ABF89F50E9E73055969846A55949024D69551
3,166,777 UART: Caliptra RT
3,167,031 UART: [state] CFI Enabled
3,273,696 UART: [rt] RT listening for mailbox commands...
3,274,366 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,001 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,568 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,082 ready_for_fw is high
1,056,082 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,780 >>> mbox cmd response: success
2,683,168 UART:
2,683,184 UART: Running Caliptra FMC ...
2,683,592 UART:
2,683,646 UART: [state] CFI Enabled
2,694,075 UART: [fht] FMC Alias Private Key: 7
2,801,922 UART: [art] Extend RT PCRs Done
2,802,350 UART: [art] Lock RT PCRs Done
2,803,764 UART: [art] Populate DV Done
2,811,911 UART: [fht] FMC Alias Private Key: 7
2,812,883 UART: [art] Derive CDI
2,813,163 UART: [art] Store in in slot 0x4
2,899,188 UART: [art] Derive Key Pair
2,899,548 UART: [art] Store priv key in slot 0x5
2,912,854 UART: [art] Derive Key Pair - Done
2,927,922 UART: [art] Signing Cert with AUTHO
2,928,402 UART: RITY.KEYID = 7
2,943,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,077 UART: [art] PUB.X = 1EA5DE0A9934E6F1DA2E34FB75C9373890F6A099068BAC20262B22103F130329FEEC96DBB85DEC61F0DABC343F9D608C
2,950,852 UART: [art] PUB.Y = B7D5A08D2D394AD6CDD33CA4BE6B75648CDB82444C7480C1A7176C793A18354E68254CC82C6971DD3C4BAF47FB68E698
2,957,812 UART: [art] SIG.R = 958082B88ACF52A48E346DC464377C02481F6032ABC88EC4594CE004CA29C1A532C6109EA01ADDD7EC3FA3C753B4B0BE
2,964,588 UART: [art] SIG.S = 60BC11B49FF8BDE94B0BC8A0D9315600C4C98C41C2D09B4F17B1CCD7D2778D9F7864956A6143F065FE7111390523B93C
2,988,395 UART: Caliptra RT
2,988,649 UART: [state] CFI Enabled
3,097,013 UART: [rt] RT listening for mailbox commands...
3,097,683 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,132 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,367 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,018 UART: [kat] ++
896,170 UART: [kat] sha1
900,656 UART: [kat] SHA2-256
902,596 UART: [kat] SHA2-384
905,363 UART: [kat] SHA2-512-ACC
907,264 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,762 UART: [cold-reset] ++
1,171,180 UART: [fht] FHT @ 0x50003400
1,173,888 UART: [idev] ++
1,174,056 UART: [idev] CDI.KEYID = 6
1,174,417 UART: [idev] SUBJECT.KEYID = 7
1,174,842 UART: [idev] UDS.KEYID = 0
1,175,188 ready_for_fw is high
1,175,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,772 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,682 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,609 >>> mbox cmd response: success
2,774,858 UART: [afmc] ++
2,775,026 UART: [afmc] CDI.KEYID = 6
2,775,389 UART: [afmc] SUBJECT.KEYID = 7
2,775,815 UART: [afmc] AUTHORITY.KEYID = 5
2,811,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,459 UART: [afmc] --
2,854,507 UART: [cold-reset] --
2,855,483 UART: [state] Locking Datavault
2,856,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,442 UART: [state] Locking ICCM
2,858,092 UART: [exit] Launching FMC @ 0x40000130
2,863,421 UART:
2,863,437 UART: Running Caliptra FMC ...
2,863,845 UART:
2,863,988 UART: [state] CFI Enabled
2,874,403 UART: [fht] FMC Alias Private Key: 7
2,982,838 UART: [art] Extend RT PCRs Done
2,983,266 UART: [art] Lock RT PCRs Done
2,984,770 UART: [art] Populate DV Done
2,992,963 UART: [fht] FMC Alias Private Key: 7
2,993,997 UART: [art] Derive CDI
2,994,277 UART: [art] Store in in slot 0x4
3,079,776 UART: [art] Derive Key Pair
3,080,136 UART: [art] Store priv key in slot 0x5
3,093,346 UART: [art] Derive Key Pair - Done
3,108,358 UART: [art] Signing Cert with AUTHO
3,108,838 UART: RITY.KEYID = 7
3,124,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,889 UART: [art] PUB.X = 85EF2CCF56D227C127112429F328B18F5D03D2BF6F4D376C757477FB02FC2607620F6C6C16FFD2C03B51AB51EB482ED5
3,131,655 UART: [art] PUB.Y = 5EB04D4FF40862964E3B632340CA3EB1864333943BD9886B8B5EE7E31BC2DC71A08265BEFB4B49B765945794B1A3FB07
3,138,603 UART: [art] SIG.R = 769F2B8514DD5773FC814CDB3783123998FE698EDEB206E692A09FFF63C716915D8EE81BAFCB181854BA8076FF1F75F8
3,145,378 UART: [art] SIG.S = 24F51E1EB04BD699A67556358C05F6D6DD86E8DAEEFA029DE8A202E010F59FC80ACEA579D479213897D8317C2FE17B55
3,169,189 UART: Caliptra RT
3,169,535 UART: [state] CFI Enabled
3,277,039 UART: [rt] RT listening for mailbox commands...
3,277,709 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,262 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,845 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,093 ready_for_fw is high
1,056,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,769 >>> mbox cmd response: success
2,686,323 UART:
2,686,339 UART: Running Caliptra FMC ...
2,686,747 UART:
2,686,890 UART: [state] CFI Enabled
2,697,519 UART: [fht] FMC Alias Private Key: 7
2,804,866 UART: [art] Extend RT PCRs Done
2,805,294 UART: [art] Lock RT PCRs Done
2,806,834 UART: [art] Populate DV Done
2,815,053 UART: [fht] FMC Alias Private Key: 7
2,816,063 UART: [art] Derive CDI
2,816,343 UART: [art] Store in in slot 0x4
2,901,566 UART: [art] Derive Key Pair
2,901,926 UART: [art] Store priv key in slot 0x5
2,915,262 UART: [art] Derive Key Pair - Done
2,930,211 UART: [art] Signing Cert with AUTHO
2,930,691 UART: RITY.KEYID = 7
2,945,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,562 UART: [art] PUB.X = E03CABD58173725290E8C63DE3E0F071801CE67096C5AAEC2BF7CA0AE38F983959515BB995AE4A42B7A6D326C80A7431
2,953,334 UART: [art] PUB.Y = 604AF7F86FCE45F38BC44823E0CC88194C98D1A075110337B3FFF42307AC99A6EDDFF3D821253EFA4333744420682866
2,960,278 UART: [art] SIG.R = E913EE0F4B02AFAEA7C0C3542236749538A2472035145BF7B4364D8E57CE732A6097BADD2D23A2606635A02AB39800BD
2,967,022 UART: [art] SIG.S = FB0127524456E06AD3091EF23D23EC6364773FD0EA4C1142DC24FC118DE6545E4BEE36B65B8D0F070B4BB00736ACC900
2,991,051 UART: Caliptra RT
2,991,397 UART: [state] CFI Enabled
3,098,410 UART: [rt] RT listening for mailbox commands...
3,099,080 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,615 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,036 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
192,529 UART:
192,896 UART: Running Caliptra ROM ...
194,071 UART:
194,220 UART: [state] CFI Enabled
266,449 UART: [state] LifecycleState = Unprovisioned
268,449 UART: [state] DebugLocked = No
270,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,980 UART: [kat] SHA2-256
444,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,191 UART: [kat] ++
455,668 UART: [kat] sha1
465,295 UART: [kat] SHA2-256
467,990 UART: [kat] SHA2-384
472,919 UART: [kat] SHA2-512-ACC
475,291 UART: [kat] ECC-384
2,766,995 UART: [kat] HMAC-384Kdf
2,779,236 UART: [kat] LMS
3,969,525 UART: [kat] --
3,975,364 UART: [cold-reset] ++
3,977,385 UART: [fht] Storing FHT @ 0x50003400
3,988,965 UART: [idev] ++
3,989,544 UART: [idev] CDI.KEYID = 6
3,990,421 UART: [idev] SUBJECT.KEYID = 7
3,991,727 UART: [idev] UDS.KEYID = 0
3,992,675 ready_for_fw is high
3,992,852 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,121 UART: [idev] Erasing UDS.KEYID = 0
7,326,047 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,426 UART: [idev] --
7,351,955 UART: [ldev] ++
7,352,533 UART: [ldev] CDI.KEYID = 6
7,353,470 UART: [ldev] SUBJECT.KEYID = 5
7,354,726 UART: [ldev] AUTHORITY.KEYID = 7
7,355,872 UART: [ldev] FE.KEYID = 1
7,400,662 UART: [ldev] Erasing FE.KEYID = 1
10,729,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,629 UART: [ldev] --
13,093,859 UART: [fwproc] Waiting for Commands...
13,097,091 UART: [fwproc] Received command 0x46574c44
13,099,315 UART: [fwproc] Received Image of size 114036 bytes
17,145,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,406 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,605,200 >>> mbox cmd response: success
17,605,753 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,608,923 UART: [afmc] ++
17,609,500 UART: [afmc] CDI.KEYID = 6
17,610,517 UART: [afmc] SUBJECT.KEYID = 7
17,611,672 UART: [afmc] AUTHORITY.KEYID = 5
20,978,880 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,481 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,297,890 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,312,719 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,145 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,348,697 UART: [afmc] --
23,352,682 UART: [cold-reset] --
23,355,850 UART: [state] Locking Datavault
23,362,490 UART: [state] Locking PCR0, PCR1 and PCR31
23,364,244 UART: [state] Locking ICCM
23,366,135 UART: [exit] Launching FMC @ 0x40000130
23,374,526 UART:
23,374,760 UART: Running Caliptra FMC ...
23,375,855 UART:
23,376,007 UART: [state] CFI Enabled
23,440,966 UART: [fht] FMC Alias Private Key: 7
25,778,815 UART: [art] Extend RT PCRs Done
25,780,049 UART: [art] Lock RT PCRs Done
25,781,559 UART: [art] Populate DV Done
25,786,962 UART: [fht] FMC Alias Private Key: 7
25,788,552 UART: [art] Derive CDI
25,789,362 UART: [art] Store in in slot 0x4
25,851,767 UART: [art] Derive Key Pair
25,852,799 UART: [art] Store priv key in slot 0x5
29,145,711 UART: [art] Derive Key Pair - Done
29,158,480 UART: [art] Signing Cert with AUTHO
29,159,771 UART: RITY.KEYID = 7
31,447,281 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,782 UART: [art] PUB.X = F266E6BCC83DBEFF03D242CAF243245E39A0B8C000D402D7ADFF78C95B5297592CD8FB8A00D4CC42E6B78C6C38120247
31,456,016 UART: [art] PUB.Y = 79A3A88BF651D886BB1DEFA1828609DEFFAB35E88C89CD517F0EC24B1A2F01FF768590BF2BF5844A3C120601CF9F0AAE
31,463,291 UART: [art] SIG.R = 28A4F81AF1C59C4818201E1F7A89CFD154CBBCEBA775E42FBBFDA71EFCEBA52F89EC5DA877FE882EB306AF919492FCE8
31,470,745 UART: [art] SIG.S = 6523662A632EF156281172C0938D696A0313379D25FB3B7C00A5D253E0CF884B8E6E5D02F7B488471F7F9D418221B09F
32,775,936 UART: Caliptra RT
32,776,771 UART: [state] CFI Enabled
32,939,507 UART: [rt] RT listening for mailbox commands...
32,952,647 >>> mbox cmd response: failed
32,953,030 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,982,732 UART: [rt]cmd =0x46505652, len=4
32,984,023 UART: [rt] FIPS Version
32,985,175 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,806,826 ready_for_fw is high
3,807,384 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,899,967 >>> mbox cmd response: success
17,900,659 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,589,562 UART:
23,589,946 UART: Running Caliptra FMC ...
23,591,077 UART:
23,591,232 UART: [state] CFI Enabled
23,659,126 UART: [fht] FMC Alias Private Key: 7
25,997,626 UART: [art] Extend RT PCRs Done
25,998,850 UART: [art] Lock RT PCRs Done
26,000,880 UART: [art] Populate DV Done
26,006,422 UART: [fht] FMC Alias Private Key: 7
26,008,019 UART: [art] Derive CDI
26,008,834 UART: [art] Store in in slot 0x4
26,068,184 UART: [art] Derive Key Pair
26,069,224 UART: [art] Store priv key in slot 0x5
29,362,682 UART: [art] Derive Key Pair - Done
29,375,354 UART: [art] Signing Cert with AUTHO
29,376,662 UART: RITY.KEYID = 7
31,664,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,532 UART: [art] PUB.X = E017BD7F611CEFB660729508216B2663645657D7483CB8AAA7856055070A904D61972F122C2AC6539FB2B35D5525FB41
31,672,766 UART: [art] PUB.Y = 792143C6B3EF971328596CE99BC002166E25EA59217981FDD37C9EE399CB1A19CF50D457DF88E1BA3B8A950A0236877E
31,679,998 UART: [art] SIG.R = 98393E169E2B1A2F9929A5B4A8102D6B4EEFD6CA24EF712C822392C6917AC4A107D1ABB27DAE566A61B8C244613DA8B1
31,687,375 UART: [art] SIG.S = 55A228658E76D711883EDEA556474EB8005AEF405897CD3388CFCFDFECB37A9111645A5D6F760B0621F2E1F4A3E2A137
32,992,479 UART: Caliptra RT
32,993,179 UART: [state] CFI Enabled
33,154,527 UART: [rt] RT listening for mailbox commands...
33,167,983 >>> mbox cmd response: failed
33,168,374 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,198,026 UART: [rt]cmd =0x46505652, len=4
33,199,262 UART: [rt] FIPS Version
33,200,516 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,383 UART:
192,750 UART: Running Caliptra ROM ...
193,850 UART:
603,701 UART: [state] CFI Enabled
618,352 UART: [state] LifecycleState = Unprovisioned
620,295 UART: [state] DebugLocked = No
622,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,097 UART: [kat] SHA2-256
796,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,435 UART: [kat] ++
807,883 UART: [kat] sha1
817,971 UART: [kat] SHA2-256
820,696 UART: [kat] SHA2-384
825,904 UART: [kat] SHA2-512-ACC
828,264 UART: [kat] ECC-384
3,109,890 UART: [kat] HMAC-384Kdf
3,122,901 UART: [kat] LMS
4,313,037 UART: [kat] --
4,318,553 UART: [cold-reset] ++
4,320,698 UART: [fht] Storing FHT @ 0x50003400
4,332,248 UART: [idev] ++
4,332,817 UART: [idev] CDI.KEYID = 6
4,333,848 UART: [idev] SUBJECT.KEYID = 7
4,335,028 UART: [idev] UDS.KEYID = 0
4,336,097 ready_for_fw is high
4,336,299 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,514 UART: [idev] Erasing UDS.KEYID = 0
7,626,888 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,703 UART: [idev] --
7,651,622 UART: [ldev] ++
7,652,192 UART: [ldev] CDI.KEYID = 6
7,653,204 UART: [ldev] SUBJECT.KEYID = 5
7,654,359 UART: [ldev] AUTHORITY.KEYID = 7
7,655,586 UART: [ldev] FE.KEYID = 1
7,667,918 UART: [ldev] Erasing FE.KEYID = 1
10,951,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,027 UART: [ldev] --
13,311,296 UART: [fwproc] Waiting for Commands...
13,312,944 UART: [fwproc] Received command 0x46574c44
13,315,133 UART: [fwproc] Received Image of size 114036 bytes
17,362,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,802 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,703 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,827,211 >>> mbox cmd response: success
17,827,762 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,831,670 UART: [afmc] ++
17,832,251 UART: [afmc] CDI.KEYID = 6
17,833,159 UART: [afmc] SUBJECT.KEYID = 7
17,834,431 UART: [afmc] AUTHORITY.KEYID = 5
21,143,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,473 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,436,782 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,451,152 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,465,989 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,425 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,502,479 UART: [afmc] --
23,505,645 UART: [cold-reset] --
23,509,825 UART: [state] Locking Datavault
23,513,501 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,250 UART: [state] Locking ICCM
23,516,614 UART: [exit] Launching FMC @ 0x40000130
23,525,013 UART:
23,525,252 UART: Running Caliptra FMC ...
23,526,352 UART:
23,526,509 UART: [state] CFI Enabled
23,534,338 UART: [fht] FMC Alias Private Key: 7
25,865,316 UART: [art] Extend RT PCRs Done
25,866,530 UART: [art] Lock RT PCRs Done
25,868,157 UART: [art] Populate DV Done
25,873,706 UART: [fht] FMC Alias Private Key: 7
25,875,298 UART: [art] Derive CDI
25,876,114 UART: [art] Store in in slot 0x4
25,919,031 UART: [art] Derive Key Pair
25,920,030 UART: [art] Store priv key in slot 0x5
29,162,424 UART: [art] Derive Key Pair - Done
29,175,645 UART: [art] Signing Cert with AUTHO
29,176,948 UART: RITY.KEYID = 7
31,455,996 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,512 UART: [art] PUB.X = 6CC9DFDAA171A6D8C48421B1AA7A33B53859ADC55CCF3F8960F98BD9A1803590357891DA8A357494B0769FC2A201AB75
31,464,753 UART: [art] PUB.Y = 481104BA047D50517E03A88332DD5F8DD305ECD8E024362454326F0F3D6CD198FF9CE3C8BF1F4EDA8FC52A3F8DC32407
31,471,966 UART: [art] SIG.R = 008BD4B0FD7D436DAA0CBDB5C3C7E47AB77CE60570F7FE72AA2218E8F681CBC8A48790303E619BD0EE5BA7027A222E3C
31,479,358 UART: [art] SIG.S = 4A7324493767B3490D32E79307B71496F35759667A83A025E99572EA7EB75F403E810737ACA3CEA34561378C80350900
32,784,658 UART: Caliptra RT
32,785,357 UART: [state] CFI Enabled
32,903,572 UART: [rt] RT listening for mailbox commands...
32,916,935 >>> mbox cmd response: failed
32,917,398 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,947,058 UART: [rt]cmd =0x46505652, len=4
32,948,307 UART: [rt] FIPS Version
32,949,465 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
4,129,965 ready_for_fw is high
4,130,378 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,079,846 >>> mbox cmd response: success
18,080,716 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,718,601 UART:
23,718,975 UART: Running Caliptra FMC ...
23,720,112 UART:
23,720,266 UART: [state] CFI Enabled
23,727,993 UART: [fht] FMC Alias Private Key: 7
26,058,866 UART: [art] Extend RT PCRs Done
26,060,097 UART: [art] Lock RT PCRs Done
26,061,515 UART: [art] Populate DV Done
26,066,828 UART: [fht] FMC Alias Private Key: 7
26,068,533 UART: [art] Derive CDI
26,069,350 UART: [art] Store in in slot 0x4
26,112,128 UART: [art] Derive Key Pair
26,113,176 UART: [art] Store priv key in slot 0x5
29,355,216 UART: [art] Derive Key Pair - Done
29,368,162 UART: [art] Signing Cert with AUTHO
29,369,468 UART: RITY.KEYID = 7
31,648,830 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,338 UART: [art] PUB.X = CCD3854C2826D828AAE2A743A9AD55950D03A3E231E4D533CE4F0DE0DF5AD1E050ACC1794C84EAF016A000A0DAF32677
31,657,553 UART: [art] PUB.Y = 903F0AB7DD47C2CFC4E14C210B673FB9AB232DA1453992083B494C35E8DA6BC028F877C6C1CEB2D5C654FB9D44B7F57C
31,664,870 UART: [art] SIG.R = A72198AF023668A14096E139665071F0A8AC1B1CBF8CFF7D26A6261AF4F14813690308B79DECEDF4C8E98A042FD178CB
31,672,246 UART: [art] SIG.S = BC60C172CF73F9BE6ED76777D1ED5B4BEDFC8B50BD2C1EC0B910D05DE40F600E7DA67507A40355311F741BB718D3F497
32,977,550 UART: Caliptra RT
32,978,249 UART: [state] CFI Enabled
33,096,727 UART: [rt] RT listening for mailbox commands...
33,109,880 >>> mbox cmd response: failed
33,110,277 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,139,987 UART: [rt]cmd =0x46505652, len=4
33,141,289 UART: [rt] FIPS Version
33,142,555 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
192,465 UART:
192,845 UART: Running Caliptra ROM ...
193,997 UART:
194,146 UART: [state] CFI Enabled
265,597 UART: [state] LifecycleState = Unprovisioned
267,517 UART: [state] DebugLocked = No
269,267 UART: [state] WD Timer not started. Device not locked for debugging
272,880 UART: [kat] SHA2-256
452,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,568 UART: [kat] ++
464,108 UART: [kat] sha1
475,279 UART: [kat] SHA2-256
478,283 UART: [kat] SHA2-384
484,414 UART: [kat] SHA2-512-ACC
487,433 UART: [kat] ECC-384
2,948,603 UART: [kat] HMAC-384Kdf
2,971,817 UART: [kat] LMS
3,501,262 UART: [kat] --
3,506,746 UART: [cold-reset] ++
3,507,753 UART: [fht] FHT @ 0x50003400
3,518,241 UART: [idev] ++
3,518,812 UART: [idev] CDI.KEYID = 6
3,519,722 UART: [idev] SUBJECT.KEYID = 7
3,520,894 UART: [idev] UDS.KEYID = 0
3,521,823 ready_for_fw is high
3,522,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,879 UART: [idev] Erasing UDS.KEYID = 0
6,027,569 UART: [idev] Sha1 KeyId Algorithm
6,051,977 UART: [idev] --
6,056,895 UART: [ldev] ++
6,057,471 UART: [ldev] CDI.KEYID = 6
6,058,388 UART: [ldev] SUBJECT.KEYID = 5
6,059,568 UART: [ldev] AUTHORITY.KEYID = 7
6,060,806 UART: [ldev] FE.KEYID = 1
6,099,810 UART: [ldev] Erasing FE.KEYID = 1
8,602,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,326 UART: [ldev] --
10,391,079 UART: [fwproc] Wait for Commands...
10,394,259 UART: [fwproc] Recv command 0x46574c44
10,396,349 UART: [fwproc] Recv'd Img size: 114360 bytes
13,804,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,265,823 >>> mbox cmd response: success
14,266,366 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,269,371 UART: [afmc] ++
14,269,949 UART: [afmc] CDI.KEYID = 6
14,270,857 UART: [afmc] SUBJECT.KEYID = 7
14,272,074 UART: [afmc] AUTHORITY.KEYID = 5
16,804,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,297 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,211 UART: [afmc] --
18,607,620 UART: [cold-reset] --
18,610,788 UART: [state] Locking Datavault
18,617,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,305 UART: [state] Locking ICCM
18,621,477 UART: [exit] Launching FMC @ 0x40000130
18,629,884 UART:
18,630,126 UART: Running Caliptra FMC ...
18,631,229 UART:
18,631,393 UART: [state] CFI Enabled
18,689,022 UART: [fht] FMC Alias Private Key: 7
20,452,818 UART: [art] Extend RT PCRs Done
20,454,039 UART: [art] Lock RT PCRs Done
20,455,926 UART: [art] Populate DV Done
20,461,223 UART: [fht] FMC Alias Private Key: 7
20,462,866 UART: [art] Derive CDI
20,463,680 UART: [art] Store in in slot 0x4
20,521,079 UART: [art] Derive Key Pair
20,522,124 UART: [art] Store priv key in slot 0x5
22,984,982 UART: [art] Derive Key Pair - Done
22,997,980 UART: [art] Signing Cert with AUTHO
22,999,304 UART: RITY.KEYID = 7
24,711,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,698 UART: [art] PUB.X = D14CAC7D7A7085B2689CACA82B2F78BFAC79D36DBA428E56867A79A88B19E0D59AD29A157F314D00AFEF6BDB90D01A58
24,719,986 UART: [art] PUB.Y = F2BE5EC65BC501B4FE3C91D54B9EB5323A52B774F3A854FF493D07AFA9EAE62F57967DE28E466FF25B7DD0A06D2B70FF
24,727,264 UART: [art] SIG.R = 0F1CBDA6193CF4F9E73201D885286BFB3CFA2C0042F696C6FA5DEB665352F3F2FA84102A4BEF8FF1692403618197822C
24,734,670 UART: [art] SIG.S = 301EAEDA36C9766B5CA72354A9885ECE19E9AF43582980A9D6512E78AF6B96548481A812DA3B4D52CE60409C26F2E3AF
25,713,836 UART: Caliptra RT
25,714,546 UART: [state] CFI Enabled
25,878,239 UART: [rt] RT listening for mailbox commands...
25,891,823 >>> mbox cmd response: failed
25,892,215 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,922,033 UART: [rt]cmd =0x46505652, len=4
25,923,331 UART: [rt] FIPS Version
25,924,595 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,330 UART:
192,721 UART: Running Caliptra ROM ...
193,819 UART:
193,962 UART: [state] CFI Enabled
265,351 UART: [state] LifecycleState = Unprovisioned
267,753 UART: [state] DebugLocked = No
269,915 UART: [state] WD Timer not started. Device not locked for debugging
273,593 UART: [kat] SHA2-256
463,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,267 UART: [kat] ++
474,722 UART: [kat] sha1
486,870 UART: [kat] SHA2-256
489,880 UART: [kat] SHA2-384
496,702 UART: [kat] SHA2-512-ACC
499,256 UART: [kat] ECC-384
2,951,197 UART: [kat] HMAC-384Kdf
2,965,211 UART: [kat] LMS
3,496,970 UART: [kat] --
3,499,194 UART: [cold-reset] ++
3,500,279 UART: [fht] FHT @ 0x50003400
3,510,964 UART: [idev] ++
3,511,668 UART: [idev] CDI.KEYID = 6
3,512,623 UART: [idev] SUBJECT.KEYID = 7
3,513,792 UART: [idev] UDS.KEYID = 0
3,515,016 ready_for_fw is high
3,515,205 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,659,056 UART: [idev] Erasing UDS.KEYID = 0
6,023,206 UART: [idev] Sha1 KeyId Algorithm
6,044,485 UART: [idev] --
6,049,559 UART: [ldev] ++
6,050,237 UART: [ldev] CDI.KEYID = 6
6,051,122 UART: [ldev] SUBJECT.KEYID = 5
6,052,334 UART: [ldev] AUTHORITY.KEYID = 7
6,053,535 UART: [ldev] FE.KEYID = 1
6,093,704 UART: [ldev] Erasing FE.KEYID = 1
8,599,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,870 UART: [ldev] --
10,406,756 UART: [fwproc] Wait for Commands...
10,409,280 UART: [fwproc] Recv command 0x46574c44
10,411,588 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,612,413 >>> mbox cmd response: success
14,612,916 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,616,678 UART: [afmc] ++
14,617,385 UART: [afmc] CDI.KEYID = 6
14,618,577 UART: [afmc] SUBJECT.KEYID = 7
14,620,069 UART: [afmc] AUTHORITY.KEYID = 5
17,147,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,868,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,870,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,885,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,900,817 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,915,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,939,542 UART: [afmc] --
18,943,678 UART: [cold-reset] --
18,947,274 UART: [state] Locking Datavault
18,952,691 UART: [state] Locking PCR0, PCR1 and PCR31
18,954,884 UART: [state] Locking ICCM
18,956,499 UART: [exit] Launching FMC @ 0x40000130
18,965,188 UART:
18,965,430 UART: Running Caliptra FMC ...
18,966,486 UART:
18,966,638 UART: [state] CFI Enabled
19,025,708 UART: [fht] FMC Alias Private Key: 7
20,789,340 UART: [art] Extend RT PCRs Done
20,790,573 UART: [art] Lock RT PCRs Done
20,792,366 UART: [art] Populate DV Done
20,797,617 UART: [fht] FMC Alias Private Key: 7
20,799,218 UART: [art] Derive CDI
20,800,040 UART: [art] Store in in slot 0x4
20,858,423 UART: [art] Derive Key Pair
20,859,463 UART: [art] Store priv key in slot 0x5
23,322,277 UART: [art] Derive Key Pair - Done
23,335,599 UART: [art] Signing Cert with AUTHO
23,336,910 UART: RITY.KEYID = 7
25,048,471 UART: [art] Erasing AUTHORITY.KEYID = 7
25,049,970 UART: [art] PUB.X = 5E4E0297A3A4BE8F1F451E16E24C7D31E847A54B5E8AF84A5B85B8020D771EBB0AF902CDF6A117975B71953F450F25D7
25,057,281 UART: [art] PUB.Y = 05E8D4FEFF193BA0B4FA62250EB73A3728B864A689F750C4F345DFB48F9A6C8D494F6DE1AEA285475D25763D207FC8EC
25,064,567 UART: [art] SIG.R = 8120D6FBA3804B76761F71F2BA4020AAD7B9575DE40D5DCEC4547DDFF173F1DF50AC5DBC522994119139F96B1DA7CDA7
25,071,952 UART: [art] SIG.S = F2C4915D4DF1264DB68C71B29C8B983CD3E9D6621BADFBC2B63F481CB3B349AB672EDEF3E7E061FF1EB72917BF63662B
26,051,115 UART: Caliptra RT
26,051,830 UART: [state] CFI Enabled
26,217,527 UART: [rt] RT listening for mailbox commands...
26,230,901 >>> mbox cmd response: failed
26,231,315 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,261,253 UART: [rt]cmd =0x46505652, len=4
26,262,536 UART: [rt] FIPS Version
26,263,592 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,436,907 ready_for_fw is high
3,437,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,738,709 >>> mbox cmd response: success
14,739,318 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,046,134 UART:
19,046,512 UART: Running Caliptra FMC ...
19,047,654 UART:
19,047,813 UART: [state] CFI Enabled
19,113,118 UART: [fht] FMC Alias Private Key: 7
20,877,192 UART: [art] Extend RT PCRs Done
20,878,425 UART: [art] Lock RT PCRs Done
20,880,325 UART: [art] Populate DV Done
20,885,363 UART: [fht] FMC Alias Private Key: 7
20,887,014 UART: [art] Derive CDI
20,887,834 UART: [art] Store in in slot 0x4
20,945,637 UART: [art] Derive Key Pair
20,946,679 UART: [art] Store priv key in slot 0x5
23,409,743 UART: [art] Derive Key Pair - Done
23,422,796 UART: [art] Signing Cert with AUTHO
23,424,101 UART: RITY.KEYID = 7
25,135,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,753 UART: [art] PUB.X = C47A3A49F75A71514ECC9501059FF881F5AA585F0F3AC11F47329A988C02C561257FD9A8B55D6C0FF66A7FD440B6B691
25,144,067 UART: [art] PUB.Y = 5413BF4B25D9A6EA5E722590F4A5AF30A63B3E9617F0108EF0C4D41DB3C6A4A1EA7CF4EED70684BC9A46E9E30FE5700D
25,151,269 UART: [art] SIG.R = B7D06FFC90883AF3D3EEE264E3D05781BE7A6090A8EF6EC6B393064AB47DBDBDBD35180DA72BC4F491ADFB1FA1A4D900
25,158,709 UART: [art] SIG.S = D03B84BBC21BFEC43AFF11CC787C8EA6531D16432646AE32C20DB26DBCA7116509ADABC790D040D0D2E432019C0800A7
26,137,636 UART: Caliptra RT
26,138,350 UART: [state] CFI Enabled
26,303,658 UART: [rt] RT listening for mailbox commands...
26,317,024 >>> mbox cmd response: failed
26,317,426 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,347,188 UART: [rt]cmd =0x46505652, len=4
26,348,542 UART: [rt] FIPS Version
26,349,814 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,356 UART:
192,734 UART: Running Caliptra ROM ...
193,915 UART:
603,562 UART: [state] CFI Enabled
614,828 UART: [state] LifecycleState = Unprovisioned
617,200 UART: [state] DebugLocked = No
618,443 UART: [state] WD Timer not started. Device not locked for debugging
621,548 UART: [kat] SHA2-256
811,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,227 UART: [kat] ++
822,773 UART: [kat] sha1
834,922 UART: [kat] SHA2-256
837,934 UART: [kat] SHA2-384
843,142 UART: [kat] SHA2-512-ACC
845,722 UART: [kat] ECC-384
3,289,936 UART: [kat] HMAC-384Kdf
3,302,381 UART: [kat] LMS
3,834,174 UART: [kat] --
3,838,593 UART: [cold-reset] ++
3,840,091 UART: [fht] FHT @ 0x50003400
3,852,718 UART: [idev] ++
3,853,431 UART: [idev] CDI.KEYID = 6
3,854,385 UART: [idev] SUBJECT.KEYID = 7
3,855,553 UART: [idev] UDS.KEYID = 0
3,856,475 ready_for_fw is high
3,856,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,636 UART: [idev] Erasing UDS.KEYID = 0
6,332,105 UART: [idev] Sha1 KeyId Algorithm
6,353,598 UART: [idev] --
6,359,209 UART: [ldev] ++
6,359,886 UART: [ldev] CDI.KEYID = 6
6,360,797 UART: [ldev] SUBJECT.KEYID = 5
6,361,953 UART: [ldev] AUTHORITY.KEYID = 7
6,363,182 UART: [ldev] FE.KEYID = 1
6,373,878 UART: [ldev] Erasing FE.KEYID = 1
8,850,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,736 UART: [ldev] --
10,639,630 UART: [fwproc] Wait for Commands...
10,642,839 UART: [fwproc] Recv command 0x46574c44
10,645,161 UART: [fwproc] Recv'd Img size: 114360 bytes
14,093,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,687 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,828,841 >>> mbox cmd response: success
14,829,374 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,832,049 UART: [afmc] ++
14,832,742 UART: [afmc] CDI.KEYID = 6
14,833,975 UART: [afmc] SUBJECT.KEYID = 7
14,835,474 UART: [afmc] AUTHORITY.KEYID = 5
17,334,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,607 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,338 UART: [afmc] --
19,133,725 UART: [cold-reset] --
19,137,799 UART: [state] Locking Datavault
19,143,643 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,826 UART: [state] Locking ICCM
19,148,356 UART: [exit] Launching FMC @ 0x40000130
19,157,020 UART:
19,157,254 UART: Running Caliptra FMC ...
19,158,350 UART:
19,158,531 UART: [state] CFI Enabled
19,166,525 UART: [fht] FMC Alias Private Key: 7
20,923,792 UART: [art] Extend RT PCRs Done
20,924,999 UART: [art] Lock RT PCRs Done
20,926,833 UART: [art] Populate DV Done
20,932,291 UART: [fht] FMC Alias Private Key: 7
20,933,821 UART: [art] Derive CDI
20,934,578 UART: [art] Store in in slot 0x4
20,977,276 UART: [art] Derive Key Pair
20,978,313 UART: [art] Store priv key in slot 0x5
23,405,794 UART: [art] Derive Key Pair - Done
23,418,672 UART: [art] Signing Cert with AUTHO
23,419,977 UART: RITY.KEYID = 7
25,125,662 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,161 UART: [art] PUB.X = EEB4412B8CCF595E5A37F4948396E810AC750A33B6B1C43702683697653C40A2406FD69979D94743EA869DCE2548D6D9
25,134,407 UART: [art] PUB.Y = A3E5AC3FDAB991695618AD0F1C553290FE0C27E1D65384A64E9AE5B322D41C01EDBDA69BF766F3DDE4C1AB897D6365D2
25,141,664 UART: [art] SIG.R = 39916018F53E9F84210DF7F94C09461AB5E8456819BCB8C0BFA1EFB4B833F3F9D044C0B70CC6AF0F4035A923EF787FFA
25,149,056 UART: [art] SIG.S = 1E8DBF03E45A72225C956ED85DB859BEADD8870033BEC3853B55E82E5EA2ED825CDA65942C8B8D86EE8607973F24F15D
26,127,588 UART: Caliptra RT
26,128,274 UART: [state] CFI Enabled
26,245,562 UART: [rt] RT listening for mailbox commands...
26,258,764 >>> mbox cmd response: failed
26,259,155 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,288,761 UART: [rt]cmd =0x46505652, len=4
26,290,005 UART: [rt] FIPS Version
26,291,278 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,752,320 ready_for_fw is high
3,752,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,953,862 >>> mbox cmd response: success
14,954,734 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,208,151 UART:
19,208,579 UART: Running Caliptra FMC ...
19,209,697 UART:
19,209,862 UART: [state] CFI Enabled
19,217,893 UART: [fht] FMC Alias Private Key: 7
20,974,387 UART: [art] Extend RT PCRs Done
20,975,626 UART: [art] Lock RT PCRs Done
20,977,149 UART: [art] Populate DV Done
20,982,411 UART: [fht] FMC Alias Private Key: 7
20,984,058 UART: [art] Derive CDI
20,984,878 UART: [art] Store in in slot 0x4
21,027,544 UART: [art] Derive Key Pair
21,028,591 UART: [art] Store priv key in slot 0x5
23,455,682 UART: [art] Derive Key Pair - Done
23,468,731 UART: [art] Signing Cert with AUTHO
23,470,037 UART: RITY.KEYID = 7
25,175,609 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,137 UART: [art] PUB.X = D9B938816233726E0F364CF3B0A430C1033F35F04C6E5C423188E4423705ABD2FC8627128E5EEFA9B97496EC3476B644
25,184,329 UART: [art] PUB.Y = 542BBBF53E45C7B99874CC0F4F848AA3F3C04FE37D2FF295E71305C3AD71E55AFCD812ACC94188B10A017605E79F2DF7
25,191,626 UART: [art] SIG.R = 21814B75825BE3EE34421E5A0EC287CBDA79B7991FFA5FA46E535549A16AF5E9711DFDB75E99FA1D87CBCAB6B890EDE3
25,199,009 UART: [art] SIG.S = A8E24423C8456DEA62D8093A371F50DA3F89B342BEA1F32869F893BF539E6650601FA2ACFD40FAA6D50D1F461621C3CE
26,177,881 UART: Caliptra RT
26,178,574 UART: [state] CFI Enabled
26,296,414 UART: [rt] RT listening for mailbox commands...
26,309,664 >>> mbox cmd response: failed
26,310,079 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,339,968 UART: [rt]cmd =0x46505652, len=4
26,341,260 UART: [rt] FIPS Version
26,342,527 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,382 UART: [kat] HMAC-384Kdf
906,748 UART: [kat] LMS
1,474,944 UART: [kat] --
1,475,769 UART: [cold-reset] ++
1,476,331 UART: [fht] Storing FHT @ 0x50003400
1,478,964 UART: [idev] ++
1,479,132 UART: [idev] CDI.KEYID = 6
1,479,492 UART: [idev] SUBJECT.KEYID = 7
1,479,916 UART: [idev] UDS.KEYID = 0
1,480,261 ready_for_fw is high
1,480,261 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,838 UART: [idev] Erasing UDS.KEYID = 0
1,503,976 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,570 UART: [idev] --
1,513,611 UART: [ldev] ++
1,513,779 UART: [ldev] CDI.KEYID = 6
1,514,142 UART: [ldev] SUBJECT.KEYID = 5
1,514,568 UART: [ldev] AUTHORITY.KEYID = 7
1,515,031 UART: [ldev] FE.KEYID = 1
1,520,215 UART: [ldev] Erasing FE.KEYID = 1
1,545,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,540 UART: [ldev] --
1,584,845 UART: [fwproc] Waiting for Commands...
1,585,666 UART: [fwproc] Received command 0x46574c44
1,586,457 UART: [fwproc] Received Image of size 114360 bytes
2,884,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,159 >>> mbox cmd response: success
3,077,159 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,078,369 UART: [afmc] ++
3,078,537 UART: [afmc] CDI.KEYID = 6
3,078,899 UART: [afmc] SUBJECT.KEYID = 7
3,079,324 UART: [afmc] AUTHORITY.KEYID = 5
3,114,997 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,443 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,951 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,836 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,526 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,479 UART: [afmc] --
3,158,395 UART: [cold-reset] --
3,159,193 UART: [state] Locking Datavault
3,160,360 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,964 UART: [state] Locking ICCM
3,161,568 UART: [exit] Launching FMC @ 0x40000130
3,166,897 UART:
3,166,913 UART: Running Caliptra FMC ...
3,167,321 UART:
3,167,375 UART: [state] CFI Enabled
3,177,662 UART: [fht] FMC Alias Private Key: 7
3,285,603 UART: [art] Extend RT PCRs Done
3,286,031 UART: [art] Lock RT PCRs Done
3,287,343 UART: [art] Populate DV Done
3,295,792 UART: [fht] FMC Alias Private Key: 7
3,296,784 UART: [art] Derive CDI
3,297,064 UART: [art] Store in in slot 0x4
3,382,905 UART: [art] Derive Key Pair
3,383,265 UART: [art] Store priv key in slot 0x5
3,396,783 UART: [art] Derive Key Pair - Done
3,411,349 UART: [art] Signing Cert with AUTHO
3,411,829 UART: RITY.KEYID = 7
3,426,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,456 UART: [art] PUB.X = 7D7A2B30843D9D4CF7C3926A680DCC0A7A7E20AC6C27088A91F4040D24B59A51940C899D8D1AABD7C1FEF70F05D3BA77
3,434,216 UART: [art] PUB.Y = 02ED45C44DA4790D86C8A8C89AA87EC2ACB7D51CAB372E65331B777A81578125849AE0D5F28B11E81900F4F6FF5224F3
3,441,144 UART: [art] SIG.R = B03E213A95671D0888905897784C3776337C9240C60FC2B4E35B061F3E1D60DA510372AA0CD8240ED839EAB1DEE9F9B6
3,447,896 UART: [art] SIG.S = 4F8FE9034E3812BB35FB0571B25ECEE9480A7BCFF571AE23A92E179E80034FAAB346369FB4F7D4A1A067F7C2F89CE8BF
3,472,285 UART: Caliptra RT
3,472,539 UART: [state] CFI Enabled
3,580,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,956 >>> mbox cmd response: failed
3,592,956 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,386 UART: [rt]cmd =0x46505652, len=4
3,623,057 UART: [rt] FIPS Version
3,624,299 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,333 ready_for_fw is high
1,362,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,751 >>> mbox cmd response: success
2,926,751 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,988,283 UART:
2,988,299 UART: Running Caliptra FMC ...
2,988,707 UART:
2,988,761 UART: [state] CFI Enabled
2,999,444 UART: [fht] FMC Alias Private Key: 7
3,107,315 UART: [art] Extend RT PCRs Done
3,107,743 UART: [art] Lock RT PCRs Done
3,109,305 UART: [art] Populate DV Done
3,117,484 UART: [fht] FMC Alias Private Key: 7
3,118,424 UART: [art] Derive CDI
3,118,704 UART: [art] Store in in slot 0x4
3,204,493 UART: [art] Derive Key Pair
3,204,853 UART: [art] Store priv key in slot 0x5
3,217,533 UART: [art] Derive Key Pair - Done
3,232,584 UART: [art] Signing Cert with AUTHO
3,233,064 UART: RITY.KEYID = 7
3,248,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,123 UART: [art] PUB.X = 71A7B6FAC658F690A14B112E7845015E1AF0AF59489E31F1F5F16CAF19C939F8BB0351768709108C6222338F0B1C5B33
3,255,879 UART: [art] PUB.Y = 440C71F96887BD358A122ED3D617648B888918453C303413EFFC19EC496DCE6351C123F96498C47E943DA8924E50F0CF
3,262,822 UART: [art] SIG.R = 4E7352BB9FE34C11052DA2AEC8C17CEDACC28BABF09B94739221C10457DFA89EFC7A6B81513E304695B0FECB5A0C33B1
3,269,603 UART: [art] SIG.S = 717D9C32E0C171FF3AADA9CBD3CFC59DA437574A988B399D6E03416FD7386A97015CA1B6C030FC6818230D9F81D543CD
3,293,713 UART: Caliptra RT
3,293,967 UART: [state] CFI Enabled
3,401,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,625 >>> mbox cmd response: failed
3,413,625 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,649 UART: [rt]cmd =0x46505652, len=4
3,443,320 UART: [rt] FIPS Version
3,444,406 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
87,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,726 UART: [kat] SHA2-256
882,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,772 UART: [kat] ++
886,924 UART: [kat] sha1
891,024 UART: [kat] SHA2-256
892,962 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,522 UART: [cold-reset] ++
1,476,866 UART: [fht] Storing FHT @ 0x50003400
1,479,637 UART: [idev] ++
1,479,805 UART: [idev] CDI.KEYID = 6
1,480,165 UART: [idev] SUBJECT.KEYID = 7
1,480,589 UART: [idev] UDS.KEYID = 0
1,480,934 ready_for_fw is high
1,480,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,383 UART: [idev] Erasing UDS.KEYID = 0
1,505,053 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,507 UART: [idev] --
1,514,630 UART: [ldev] ++
1,514,798 UART: [ldev] CDI.KEYID = 6
1,515,161 UART: [ldev] SUBJECT.KEYID = 5
1,515,587 UART: [ldev] AUTHORITY.KEYID = 7
1,516,050 UART: [ldev] FE.KEYID = 1
1,521,326 UART: [ldev] Erasing FE.KEYID = 1
1,546,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,569 UART: [ldev] --
1,585,966 UART: [fwproc] Waiting for Commands...
1,586,759 UART: [fwproc] Received command 0x46574c44
1,587,550 UART: [fwproc] Received Image of size 114360 bytes
2,884,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,854 >>> mbox cmd response: success
3,076,854 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,077,982 UART: [afmc] ++
3,078,150 UART: [afmc] CDI.KEYID = 6
3,078,512 UART: [afmc] SUBJECT.KEYID = 7
3,078,937 UART: [afmc] AUTHORITY.KEYID = 5
3,114,006 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,408 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,188 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,801 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,491 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,192 UART: [afmc] --
3,157,104 UART: [cold-reset] --
3,158,030 UART: [state] Locking Datavault
3,159,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,769 UART: [state] Locking ICCM
3,160,409 UART: [exit] Launching FMC @ 0x40000130
3,165,738 UART:
3,165,754 UART: Running Caliptra FMC ...
3,166,162 UART:
3,166,305 UART: [state] CFI Enabled
3,176,750 UART: [fht] FMC Alias Private Key: 7
3,284,445 UART: [art] Extend RT PCRs Done
3,284,873 UART: [art] Lock RT PCRs Done
3,286,415 UART: [art] Populate DV Done
3,294,368 UART: [fht] FMC Alias Private Key: 7
3,295,426 UART: [art] Derive CDI
3,295,706 UART: [art] Store in in slot 0x4
3,381,157 UART: [art] Derive Key Pair
3,381,517 UART: [art] Store priv key in slot 0x5
3,394,591 UART: [art] Derive Key Pair - Done
3,409,285 UART: [art] Signing Cert with AUTHO
3,409,765 UART: RITY.KEYID = 7
3,424,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,684 UART: [art] PUB.X = 0CA4F204E8926F8C218737E8EC01CD87842DD5A5E9E5827DE98B11C2C428D0577EF0EA070154A289068CC35124F7EDF4
3,432,440 UART: [art] PUB.Y = A83D009D0D7EE8ECCA4728F49B1F1F1F873DC676229A089EC382CA8B400FA40519D578262073179641A3CC8B5C96A65A
3,439,360 UART: [art] SIG.R = D8FF6E93B6DEFA2B91D9009282B7F87F90EE3E5E34FB4C04D7CEA9B975AC8BD68C3C2FE84A6E56A04792BB80575E9B72
3,446,125 UART: [art] SIG.S = 3D2FA3560E4A34E15878E984BE37870CF1DA702F7C24DF3AF0F192BAF01DE228944F65C8BA3D2DB484764A8A2CD2B55E
3,469,992 UART: Caliptra RT
3,470,338 UART: [state] CFI Enabled
3,579,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,663 >>> mbox cmd response: failed
3,591,663 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,091 UART: [rt]cmd =0x46505652, len=4
3,621,762 UART: [rt] FIPS Version
3,622,700 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,552 >>> mbox cmd response: success
2,928,552 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,990,370 UART:
2,990,386 UART: Running Caliptra FMC ...
2,990,794 UART:
2,990,937 UART: [state] CFI Enabled
3,001,882 UART: [fht] FMC Alias Private Key: 7
3,110,169 UART: [art] Extend RT PCRs Done
3,110,597 UART: [art] Lock RT PCRs Done
3,112,217 UART: [art] Populate DV Done
3,120,528 UART: [fht] FMC Alias Private Key: 7
3,121,462 UART: [art] Derive CDI
3,121,742 UART: [art] Store in in slot 0x4
3,207,759 UART: [art] Derive Key Pair
3,208,119 UART: [art] Store priv key in slot 0x5
3,221,701 UART: [art] Derive Key Pair - Done
3,236,768 UART: [art] Signing Cert with AUTHO
3,237,248 UART: RITY.KEYID = 7
3,252,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,335 UART: [art] PUB.X = 9FC030180D7AE0E3379A54E8747B4A396D1173CFA6CA8F1E7E1038D55C7A73E2FC596929482F2BEA6744EC507297234E
3,260,104 UART: [art] PUB.Y = BD23DAD2D2038C744C8DC322C9892E096357EAF49EE7DBE1F4FDFEDCA8CF0E04D16C01F8428F0B05F5F112F623B01F15
3,267,053 UART: [art] SIG.R = 1B540D048490A98E566B21BA1081877A8B04F8ABD4968A68E84EE258DBCB2155BAEEDA3FCA4EDF166C2572E815257E83
3,273,824 UART: [art] SIG.S = 63897BB879D17E63A368F542C68FB1345C75B6FCE6C449EE40346C47CBAD0EAFA333A76B5FEC2EB9AE53719B469EAD5D
3,297,236 UART: Caliptra RT
3,297,582 UART: [state] CFI Enabled
3,406,385 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,940 >>> mbox cmd response: failed
3,418,940 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,338 UART: [rt]cmd =0x46505652, len=4
3,449,009 UART: [rt] FIPS Version
3,450,069 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
893,596 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,721 UART: [kat] ++
897,873 UART: [kat] sha1
902,289 UART: [kat] SHA2-256
904,229 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,171,801 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 ready_for_fw is high
1,176,183 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,882 UART: [idev] Erasing UDS.KEYID = 0
1,201,103 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,833 UART: [ldev] ++
1,211,001 UART: [ldev] CDI.KEYID = 6
1,211,364 UART: [ldev] SUBJECT.KEYID = 5
1,211,790 UART: [ldev] AUTHORITY.KEYID = 7
1,212,253 UART: [ldev] FE.KEYID = 1
1,217,359 UART: [ldev] Erasing FE.KEYID = 1
1,243,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,810 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,168 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,488 >>> mbox cmd response: success
2,773,488 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,774,590 UART: [afmc] ++
2,774,758 UART: [afmc] CDI.KEYID = 6
2,775,120 UART: [afmc] SUBJECT.KEYID = 7
2,775,545 UART: [afmc] AUTHORITY.KEYID = 5
2,811,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,741 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,153 UART: [afmc] --
2,854,105 UART: [cold-reset] --
2,854,797 UART: [state] Locking Datavault
2,856,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,844 UART: [state] Locking ICCM
2,857,390 UART: [exit] Launching FMC @ 0x40000130
2,862,719 UART:
2,862,735 UART: Running Caliptra FMC ...
2,863,143 UART:
2,863,197 UART: [state] CFI Enabled
2,873,990 UART: [fht] FMC Alias Private Key: 7
2,981,569 UART: [art] Extend RT PCRs Done
2,981,997 UART: [art] Lock RT PCRs Done
2,983,753 UART: [art] Populate DV Done
2,992,014 UART: [fht] FMC Alias Private Key: 7
2,993,142 UART: [art] Derive CDI
2,993,422 UART: [art] Store in in slot 0x4
3,079,265 UART: [art] Derive Key Pair
3,079,625 UART: [art] Store priv key in slot 0x5
3,092,729 UART: [art] Derive Key Pair - Done
3,107,595 UART: [art] Signing Cert with AUTHO
3,108,075 UART: RITY.KEYID = 7
3,122,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,742 UART: [art] PUB.X = 037B45369A8B6C987E1A93B03069D497F5AAF529C6EC2ACA8E83264792E754EBE7AA0F5C83C00819968376BF5CCE9404
3,130,504 UART: [art] PUB.Y = 2B445B1F094A3C63C886BD5379E79111A7B49250FA44FE4BC61E36109AFE6AA2720FE82A5B312AB51635865E246E213E
3,137,450 UART: [art] SIG.R = AD06D5BB2B1D008E65263679ACAC4E8969843AB30044E1F5F13EA71CB8D82F68B8EE2DE5AEDD8B8E4CDE7A4B29D8EB07
3,144,194 UART: [art] SIG.S = E6D8AD65C30F8660396BDAC4DA9DF019AF0393C167721EA405B501F823A6C03CA3C6A9F18BFAFB2C069A4F5482126BCA
3,168,100 UART: Caliptra RT
3,168,354 UART: [state] CFI Enabled
3,276,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,524 >>> mbox cmd response: failed
3,289,524 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,160 UART: [rt]cmd =0x46505652, len=4
3,319,831 UART: [rt] FIPS Version
3,320,995 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,579 ready_for_fw is high
1,059,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,597 >>> mbox cmd response: success
2,625,597 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,687,635 UART:
2,687,651 UART: Running Caliptra FMC ...
2,688,059 UART:
2,688,113 UART: [state] CFI Enabled
2,698,240 UART: [fht] FMC Alias Private Key: 7
2,806,339 UART: [art] Extend RT PCRs Done
2,806,767 UART: [art] Lock RT PCRs Done
2,808,305 UART: [art] Populate DV Done
2,816,778 UART: [fht] FMC Alias Private Key: 7
2,817,902 UART: [art] Derive CDI
2,818,182 UART: [art] Store in in slot 0x4
2,903,903 UART: [art] Derive Key Pair
2,904,263 UART: [art] Store priv key in slot 0x5
2,917,459 UART: [art] Derive Key Pair - Done
2,932,281 UART: [art] Signing Cert with AUTHO
2,932,761 UART: RITY.KEYID = 7
2,947,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,672 UART: [art] PUB.X = 66963626504770185E2D8A64E5A26C53E9397077DE8E1D6F9353C85BABB619CADB0EFC77F6D875E2B53678E5F4F387AA
2,955,443 UART: [art] PUB.Y = A7103F49B0C6BB86768E47DB71EB181DC592EBEF07104BB410672B4234F6401802090020179E2599F47936EAF148DD97
2,962,356 UART: [art] SIG.R = 449CC8A873E64B68BF9EA1A3F9DE6D31A175C84AF0B4D8F520784120FD6D29318E41564FE547EA691CBAC4C27D81DEC2
2,969,140 UART: [art] SIG.S = 1E21C1F233067E994DFC82F001EB4DADFAFD9310F043C8DDD116632C7AC6912E7F918ED10CCBD61F8F1BE3E3E86F47F4
2,992,772 UART: Caliptra RT
2,993,026 UART: [state] CFI Enabled
3,101,658 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,997 >>> mbox cmd response: failed
3,113,997 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,193 UART: [rt]cmd =0x46505652, len=4
3,143,864 UART: [rt] FIPS Version
3,144,980 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,275 UART: [kat] SHA2-512-ACC
909,176 UART: [kat] ECC-384
918,973 UART: [kat] HMAC-384Kdf
923,571 UART: [kat] LMS
1,171,899 UART: [kat] --
1,172,754 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,175,929 UART: [idev] ++
1,176,097 UART: [idev] CDI.KEYID = 6
1,176,457 UART: [idev] SUBJECT.KEYID = 7
1,176,881 UART: [idev] UDS.KEYID = 0
1,177,226 ready_for_fw is high
1,177,226 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,077 UART: [idev] Erasing UDS.KEYID = 0
1,202,216 UART: [idev] Sha1 KeyId Algorithm
1,210,660 UART: [idev] --
1,211,878 UART: [ldev] ++
1,212,046 UART: [ldev] CDI.KEYID = 6
1,212,409 UART: [ldev] SUBJECT.KEYID = 5
1,212,835 UART: [ldev] AUTHORITY.KEYID = 7
1,213,298 UART: [ldev] FE.KEYID = 1
1,218,552 UART: [ldev] Erasing FE.KEYID = 1
1,245,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,248 UART: [ldev] --
1,284,617 UART: [fwproc] Wait for Commands...
1,285,253 UART: [fwproc] Recv command 0x46574c44
1,285,981 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,847 >>> mbox cmd response: success
2,775,847 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,777,109 UART: [afmc] ++
2,777,277 UART: [afmc] CDI.KEYID = 6
2,777,639 UART: [afmc] SUBJECT.KEYID = 7
2,778,064 UART: [afmc] AUTHORITY.KEYID = 5
2,814,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,824 UART: [afmc] --
2,857,766 UART: [cold-reset] --
2,858,708 UART: [state] Locking Datavault
2,859,865 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,469 UART: [state] Locking ICCM
2,861,127 UART: [exit] Launching FMC @ 0x40000130
2,866,456 UART:
2,866,472 UART: Running Caliptra FMC ...
2,866,880 UART:
2,867,023 UART: [state] CFI Enabled
2,877,456 UART: [fht] FMC Alias Private Key: 7
2,985,231 UART: [art] Extend RT PCRs Done
2,985,659 UART: [art] Lock RT PCRs Done
2,987,227 UART: [art] Populate DV Done
2,995,420 UART: [fht] FMC Alias Private Key: 7
2,996,436 UART: [art] Derive CDI
2,996,716 UART: [art] Store in in slot 0x4
3,082,247 UART: [art] Derive Key Pair
3,082,607 UART: [art] Store priv key in slot 0x5
3,095,889 UART: [art] Derive Key Pair - Done
3,110,434 UART: [art] Signing Cert with AUTHO
3,110,914 UART: RITY.KEYID = 7
3,126,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,811 UART: [art] PUB.X = 2E52EE8CBE8AA9F7413D0701AE90D61880F66E03434A642ABD11D65211F4F2C7222604FCD034AE0B0B31687904978F8B
3,133,562 UART: [art] PUB.Y = 8D928A3F6B0BD5D3F1126B5F51D50CC5AB2776BCBA3601788F72FEBDFBF49858CB51B4CEAEDA73724E05F4B05E028234
3,140,515 UART: [art] SIG.R = C3924ADE1F185F76330697D255449377C3598D011CF36059A0D220849CFAD612E2612C083412BB84415740823DDDDF4D
3,147,268 UART: [art] SIG.S = 25A29E5573BA8F7FD931B3E87B63CD1E281A43743508225ABB0F4A581318CA5E4135B0EF184E3F53776026BDCBA3E9AE
3,171,269 UART: Caliptra RT
3,171,615 UART: [state] CFI Enabled
3,279,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,742 >>> mbox cmd response: failed
3,291,742 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,854 UART: [rt]cmd =0x46505652, len=4
3,321,525 UART: [rt] FIPS Version
3,322,603 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,770 ready_for_fw is high
1,060,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,508 >>> mbox cmd response: success
2,626,508 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,689,156 UART:
2,689,172 UART: Running Caliptra FMC ...
2,689,580 UART:
2,689,723 UART: [state] CFI Enabled
2,700,572 UART: [fht] FMC Alias Private Key: 7
2,808,809 UART: [art] Extend RT PCRs Done
2,809,237 UART: [art] Lock RT PCRs Done
2,810,777 UART: [art] Populate DV Done
2,819,160 UART: [fht] FMC Alias Private Key: 7
2,820,192 UART: [art] Derive CDI
2,820,472 UART: [art] Store in in slot 0x4
2,905,799 UART: [art] Derive Key Pair
2,906,159 UART: [art] Store priv key in slot 0x5
2,919,303 UART: [art] Derive Key Pair - Done
2,934,081 UART: [art] Signing Cert with AUTHO
2,934,561 UART: RITY.KEYID = 7
2,949,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,362 UART: [art] PUB.X = 30DAF101902BC244500EFA28276EBAE257D872D3CF932308978CC45A6D7FAF92DF5206251C265141B708173F4312B4D8
2,957,115 UART: [art] PUB.Y = CD38098BF741A0CA29F97017A97F287CF59EFF99787D33E8357A928FC8D1112DBD59CEB5CDA5A33788972A7629B37349
2,964,066 UART: [art] SIG.R = 7E574822B9CA6E0C780EFEEDD287B8437F1F31C7630E8AE1F941FB8789B4C5857931B009386A06037D3F81AD58E7BB39
2,970,822 UART: [art] SIG.S = A303E81AF89F70ACB6C1A0E9C3FFAFF1CAC7A25B91CDCF1B927A010C61012C22627C6B0D8B88383DDCF8A90EC80DFD2B
2,994,732 UART: Caliptra RT
2,995,078 UART: [state] CFI Enabled
3,103,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,116,591 >>> mbox cmd response: failed
3,116,591 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,953 UART: [rt]cmd =0x46505652, len=4
3,146,624 UART: [rt] FIPS Version
3,147,632 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 ready_for_fw is high
1,174,515 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,255 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,446 UART: [ldev] ++
1,208,614 UART: [ldev] CDI.KEYID = 6
1,208,978 UART: [ldev] SUBJECT.KEYID = 5
1,209,405 UART: [ldev] AUTHORITY.KEYID = 7
1,209,868 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,240,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,392 UART: [ldev] --
1,279,808 UART: [fwproc] Wait for Commands...
1,280,587 UART: [fwproc] Recv command 0x46574c44
1,281,320 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,402 >>> mbox cmd response: success
2,772,402 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,653 UART: [afmc] ++
2,773,821 UART: [afmc] CDI.KEYID = 6
2,774,184 UART: [afmc] SUBJECT.KEYID = 7
2,774,610 UART: [afmc] AUTHORITY.KEYID = 5
2,810,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,786 UART: [afmc] --
2,853,738 UART: [cold-reset] --
2,854,714 UART: [state] Locking Datavault
2,856,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,665 UART: [state] Locking ICCM
2,857,335 UART: [exit] Launching FMC @ 0x40000130
2,862,664 UART:
2,862,680 UART: Running Caliptra FMC ...
2,863,088 UART:
2,863,142 UART: [state] CFI Enabled
2,873,601 UART: [fht] FMC Alias Private Key: 7
2,981,122 UART: [art] Extend RT PCRs Done
2,981,550 UART: [art] Lock RT PCRs Done
2,983,006 UART: [art] Populate DV Done
2,991,147 UART: [fht] FMC Alias Private Key: 7
2,992,099 UART: [art] Derive CDI
2,992,379 UART: [art] Store in in slot 0x4
3,078,182 UART: [art] Derive Key Pair
3,078,542 UART: [art] Store priv key in slot 0x5
3,091,288 UART: [art] Derive Key Pair - Done
3,106,402 UART: [art] Signing Cert with AUTHO
3,106,882 UART: RITY.KEYID = 7
3,121,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,707 UART: [art] PUB.X = E60DA07F6FACEDF1298826D64DB19C6811EF8583C02EFFDC97F05B2FF84AA385233DD604F4A667A74E660851A2392865
3,129,476 UART: [art] PUB.Y = A530F6B91B5533117CA8F311418C2571978DE5505FF999244DCA3063F4EF283758C04FF1134A31279543DD51E2EB4A82
3,136,420 UART: [art] SIG.R = EB9745298F8AB6B33D350703550226B1A8CE0D2D5556EA0C8D5BD6A137A31F172E5AF0C5BA792F5982A26BDF85F49833
3,143,181 UART: [art] SIG.S = EB057B368A31984380A2FC569CAF07B5635ABB36ED71E9B01D8311855066BE2C5C067190A370EC99CC27359DFCE535D7
3,166,647 UART: Caliptra RT
3,166,901 UART: [state] CFI Enabled
3,276,498 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,288,763 >>> mbox cmd response: failed
3,288,763 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,385 UART: [rt]cmd =0x46505652, len=4
3,319,056 UART: [rt] FIPS Version
3,320,234 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,818 ready_for_fw is high
1,055,818 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,034 >>> mbox cmd response: success
2,621,034 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,684,094 UART:
2,684,110 UART: Running Caliptra FMC ...
2,684,518 UART:
2,684,572 UART: [state] CFI Enabled
2,694,627 UART: [fht] FMC Alias Private Key: 7
2,803,020 UART: [art] Extend RT PCRs Done
2,803,448 UART: [art] Lock RT PCRs Done
2,805,002 UART: [art] Populate DV Done
2,813,353 UART: [fht] FMC Alias Private Key: 7
2,814,427 UART: [art] Derive CDI
2,814,707 UART: [art] Store in in slot 0x4
2,900,460 UART: [art] Derive Key Pair
2,900,820 UART: [art] Store priv key in slot 0x5
2,914,008 UART: [art] Derive Key Pair - Done
2,928,801 UART: [art] Signing Cert with AUTHO
2,929,281 UART: RITY.KEYID = 7
2,945,001 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,766 UART: [art] PUB.X = E3185FFE2E376906EE7299321B6254FFF60D26F857D8075A117CAC9EA32098FCC889097F1642DB9DE1088C61AAEAF02D
2,952,529 UART: [art] PUB.Y = 74F4AF8336D14114D45730A74D5435AFC79A4B0F250927CE6826860C6B17A31CE5905EE35E958B2F989824B8176FBBFD
2,959,470 UART: [art] SIG.R = B910D88A28847AB568AD8307E4E10A5084043F60C5F7774D38614F5FC4631C193B381095EE029458DD6149B8863740AD
2,966,218 UART: [art] SIG.S = DAF2FC2E235E36D48E7CCD855184D8991A568423A109B17F1BACA47F7AFDD1032F5B5924ECE80F98CF9A9C151EF944A2
2,990,000 UART: Caliptra RT
2,990,254 UART: [state] CFI Enabled
3,097,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,109,990 >>> mbox cmd response: failed
3,109,990 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,490 UART: [rt]cmd =0x46505652, len=4
3,140,161 UART: [rt] FIPS Version
3,141,317 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,118 UART: [state] WD Timer not started. Device not locked for debugging
88,423 UART: [kat] SHA2-256
891,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,102 UART: [kat] ++
896,254 UART: [kat] sha1
900,716 UART: [kat] SHA2-256
902,656 UART: [kat] SHA2-384
905,473 UART: [kat] SHA2-512-ACC
907,374 UART: [kat] ECC-384
917,157 UART: [kat] HMAC-384Kdf
921,851 UART: [kat] LMS
1,170,163 UART: [kat] --
1,170,826 UART: [cold-reset] ++
1,171,332 UART: [fht] FHT @ 0x50003400
1,174,106 UART: [idev] ++
1,174,274 UART: [idev] CDI.KEYID = 6
1,174,635 UART: [idev] SUBJECT.KEYID = 7
1,175,060 UART: [idev] UDS.KEYID = 0
1,175,406 ready_for_fw is high
1,175,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,981 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,241,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,282,148 UART: [fwproc] Recv command 0x46574c44
1,282,881 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,825 >>> mbox cmd response: success
2,772,825 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,992 UART: [afmc] ++
2,774,160 UART: [afmc] CDI.KEYID = 6
2,774,523 UART: [afmc] SUBJECT.KEYID = 7
2,774,949 UART: [afmc] AUTHORITY.KEYID = 5
2,810,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,345 UART: [afmc] --
2,854,357 UART: [cold-reset] --
2,855,465 UART: [state] Locking Datavault
2,856,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,334 UART: [state] Locking ICCM
2,857,900 UART: [exit] Launching FMC @ 0x40000130
2,863,229 UART:
2,863,245 UART: Running Caliptra FMC ...
2,863,653 UART:
2,863,796 UART: [state] CFI Enabled
2,874,257 UART: [fht] FMC Alias Private Key: 7
2,982,186 UART: [art] Extend RT PCRs Done
2,982,614 UART: [art] Lock RT PCRs Done
2,984,268 UART: [art] Populate DV Done
2,992,529 UART: [fht] FMC Alias Private Key: 7
2,993,657 UART: [art] Derive CDI
2,993,937 UART: [art] Store in in slot 0x4
3,079,488 UART: [art] Derive Key Pair
3,079,848 UART: [art] Store priv key in slot 0x5
3,092,590 UART: [art] Derive Key Pair - Done
3,107,582 UART: [art] Signing Cert with AUTHO
3,108,062 UART: RITY.KEYID = 7
3,122,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,623 UART: [art] PUB.X = F94FC0BC26175DB1353139A85B8B3C5BA43452EFAB63645BE2FE67C7F88BD9D990DD578CDC246D3FCD9636A77E960EAC
3,130,408 UART: [art] PUB.Y = 02497A1745E4A7A3AF4C1B6CC0A66DB3C4B98BE4A4A8A9E7E0E4368FD0CFA804531E82B4693CFF463CD0AACEBCEA7658
3,137,376 UART: [art] SIG.R = 243406EB199B2583DBC4391B6052793392369749524ACB1E4F724C51DCE0312E6DB54C0F67F5E14998C7EA5192EEB9A3
3,144,138 UART: [art] SIG.S = 6DC5E79797967C0C1CEA882DC0A43DFB042050108ED0EE566613F6DD6AD9FFED5C37385F9DBA4BFFD878731E7C834426
3,168,553 UART: Caliptra RT
3,168,899 UART: [state] CFI Enabled
3,276,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,288,650 >>> mbox cmd response: failed
3,288,650 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,192 UART: [rt]cmd =0x46505652, len=4
3,318,863 UART: [rt] FIPS Version
3,319,827 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,561 ready_for_fw is high
1,056,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,165 >>> mbox cmd response: success
2,623,165 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,684,609 UART:
2,684,625 UART: Running Caliptra FMC ...
2,685,033 UART:
2,685,176 UART: [state] CFI Enabled
2,695,779 UART: [fht] FMC Alias Private Key: 7
2,803,362 UART: [art] Extend RT PCRs Done
2,803,790 UART: [art] Lock RT PCRs Done
2,805,044 UART: [art] Populate DV Done
2,813,053 UART: [fht] FMC Alias Private Key: 7
2,814,209 UART: [art] Derive CDI
2,814,489 UART: [art] Store in in slot 0x4
2,900,092 UART: [art] Derive Key Pair
2,900,452 UART: [art] Store priv key in slot 0x5
2,913,768 UART: [art] Derive Key Pair - Done
2,928,180 UART: [art] Signing Cert with AUTHO
2,928,660 UART: RITY.KEYID = 7
2,943,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,475 UART: [art] PUB.X = A7D42BAF2C6B27192BC0A88362F1EC748EBE76399C28EBACAFFF304C0DA6D41F2705483B20AE54AAF3964D9D23011527
2,951,250 UART: [art] PUB.Y = 632CFDC09720ECA4FC5461B1F6F1B2AE096C0E1A3B3721A38F638796C7FF88181B81B3BAAF21055FA1E75B398C4EADF7
2,958,207 UART: [art] SIG.R = C7ED4C4239DF6A17D20E857866DA5105FD45B3DBEB7623418C0FAD9B6F6ABB37CCA2C453F3D159A13F5DD14EFF2E42EB
2,964,992 UART: [art] SIG.S = 66999DB54024D34ECF455CB91E38143975B45F2394C07DBEFDD463EBDF4A85C24732C9BF26C21E2592E0BDFAEE67711E
2,988,683 UART: Caliptra RT
2,989,029 UART: [state] CFI Enabled
3,096,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,108,982 >>> mbox cmd response: failed
3,108,982 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,212 UART: [rt]cmd =0x46505652, len=4
3,138,883 UART: [rt] FIPS Version
3,140,179 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
192,598 UART:
192,967 UART: Running Caliptra ROM ...
194,146 UART:
194,296 UART: [state] CFI Enabled
264,871 UART: [state] LifecycleState = Unprovisioned
266,864 UART: [state] DebugLocked = No
268,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,258 UART: [kat] SHA2-256
442,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,486 UART: [kat] ++
453,955 UART: [kat] sha1
465,169 UART: [kat] SHA2-256
467,844 UART: [kat] SHA2-384
473,922 UART: [kat] SHA2-512-ACC
476,287 UART: [kat] ECC-384
2,768,683 UART: [kat] HMAC-384Kdf
2,800,617 UART: [kat] LMS
3,990,969 UART: [kat] --
3,994,271 UART: [cold-reset] ++
3,996,050 UART: [fht] Storing FHT @ 0x50003400
4,008,513 UART: [idev] ++
4,009,082 UART: [idev] CDI.KEYID = 6
4,010,035 UART: [idev] SUBJECT.KEYID = 7
4,011,274 UART: [idev] UDS.KEYID = 0
4,012,227 ready_for_fw is high
4,012,413 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,829 UART: [idev] Erasing UDS.KEYID = 0
7,347,997 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,827 UART: [idev] --
7,376,619 UART: [ldev] ++
7,377,188 UART: [ldev] CDI.KEYID = 6
7,378,196 UART: [ldev] SUBJECT.KEYID = 5
7,379,355 UART: [ldev] AUTHORITY.KEYID = 7
7,380,633 UART: [ldev] FE.KEYID = 1
7,422,125 UART: [ldev] Erasing FE.KEYID = 1
10,754,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,015 UART: [ldev] --
13,115,311 UART: [fwproc] Waiting for Commands...
13,117,179 UART: [fwproc] Received command 0x46574c44
13,119,349 UART: [fwproc] Received Image of size 114036 bytes
17,171,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,270 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,156 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,571 >>> mbox cmd response: success
17,631,093 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,635,102 UART: [afmc] ++
17,635,745 UART: [afmc] CDI.KEYID = 6
17,636,652 UART: [afmc] SUBJECT.KEYID = 7
17,637,866 UART: [afmc] AUTHORITY.KEYID = 5
21,006,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,774 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,136 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,996 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,447 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,889 UART: [afmc] --
23,381,471 UART: [cold-reset] --
23,384,161 UART: [state] Locking Datavault
23,390,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,893 UART: [state] Locking ICCM
23,394,707 UART: [exit] Launching FMC @ 0x40000130
23,403,090 UART:
23,403,329 UART: Running Caliptra FMC ...
23,404,421 UART:
23,404,571 UART: [state] CFI Enabled
23,467,921 UART: [fht] FMC Alias Private Key: 7
25,804,975 UART: [art] Extend RT PCRs Done
25,806,193 UART: [art] Lock RT PCRs Done
25,807,948 UART: [art] Populate DV Done
25,813,131 UART: [fht] FMC Alias Private Key: 7
25,814,705 UART: [art] Derive CDI
25,815,449 UART: [art] Store in in slot 0x4
25,876,132 UART: [art] Derive Key Pair
25,877,149 UART: [art] Store priv key in slot 0x5
29,169,937 UART: [art] Derive Key Pair - Done
29,183,092 UART: [art] Signing Cert with AUTHO
29,184,423 UART: RITY.KEYID = 7
31,470,663 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,158 UART: [art] PUB.X = 10D10A67DDC3EEED51AA93047ED878785793E5CDC179399407682FAA78199DE09B3EAA39FAC244CE092876381AB52982
31,479,431 UART: [art] PUB.Y = 7822CFF93CBE057719A4A9F788A5F840808EC75A2248D7420161274AFD8A53A90416BDA5F985271421EAB6EF7591A8F1
31,486,652 UART: [art] SIG.R = 9BA06CBB1411C19BD6066D6A766D377ABA5B654297E2D94D46AE14E28907960C2F75E1FE4A60267C4FD4977A39137ADB
31,494,264 UART: [art] SIG.S = 35D852984293A3C0113773AEE595AE0416C1961C70BF88D2DFC48BAA68AE7DD6F82A20D71643C22A8EE886168F041F2F
32,799,455 UART: Caliptra RT
32,800,166 UART: [state] CFI Enabled
32,960,932 UART: [rt] RT listening for mailbox commands...
32,963,106 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,804,606 ready_for_fw is high
3,804,993 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,900,150 >>> mbox cmd response: success
17,900,931 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,586,623 UART:
23,587,005 UART: Running Caliptra FMC ...
23,588,108 UART:
23,588,256 UART: [state] CFI Enabled
23,659,342 UART: [fht] FMC Alias Private Key: 7
25,996,273 UART: [art] Extend RT PCRs Done
25,997,499 UART: [art] Lock RT PCRs Done
25,999,091 UART: [art] Populate DV Done
26,004,614 UART: [fht] FMC Alias Private Key: 7
26,006,159 UART: [art] Derive CDI
26,006,998 UART: [art] Store in in slot 0x4
26,068,409 UART: [art] Derive Key Pair
26,069,452 UART: [art] Store priv key in slot 0x5
29,362,248 UART: [art] Derive Key Pair - Done
29,375,143 UART: [art] Signing Cert with AUTHO
29,376,447 UART: RITY.KEYID = 7
31,663,551 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,063 UART: [art] PUB.X = 9BC538C5282DA43A9C22BBEE24A98F6D7C00EE10544FB4C5F252C26704A4751AE6B44718B3F1C5229CB3ECDCA87347C6
31,672,306 UART: [art] PUB.Y = 0DB8754738715DEB04D983DED2646D400323D6E72A453CBB9CB27C5EB8B58990B6EE0E35CC19244F71760535713F8564
31,679,532 UART: [art] SIG.R = 507C55BEC67D769E25124787BDBAE19016F964FC5D3EF99C961DEC3CA62E63CEDDEDF712382F70A425B467ECE990B7D0
31,686,964 UART: [art] SIG.S = E64902924707BD1C2897DEAA3E3985F3E9D5441B2BE8AE8D57B450824AB39E41D31A9F2381A50F0CC5D1A6BF4851E784
32,991,426 UART: Caliptra RT
32,992,147 UART: [state] CFI Enabled
33,154,527 UART: [rt] RT listening for mailbox commands...
33,156,823 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,426 UART:
192,792 UART: Running Caliptra ROM ...
194,016 UART:
603,825 UART: [state] CFI Enabled
618,978 UART: [state] LifecycleState = Unprovisioned
620,924 UART: [state] DebugLocked = No
623,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,805 UART: [kat] SHA2-256
797,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,141 UART: [kat] ++
808,586 UART: [kat] sha1
819,433 UART: [kat] SHA2-256
822,095 UART: [kat] SHA2-384
828,869 UART: [kat] SHA2-512-ACC
831,235 UART: [kat] ECC-384
3,116,208 UART: [kat] HMAC-384Kdf
3,128,153 UART: [kat] LMS
4,318,284 UART: [kat] --
4,324,214 UART: [cold-reset] ++
4,325,153 UART: [fht] Storing FHT @ 0x50003400
4,337,062 UART: [idev] ++
4,337,633 UART: [idev] CDI.KEYID = 6
4,338,550 UART: [idev] SUBJECT.KEYID = 7
4,339,796 UART: [idev] UDS.KEYID = 0
4,340,848 ready_for_fw is high
4,341,090 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,339 UART: [idev] Erasing UDS.KEYID = 0
7,626,334 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,014 UART: [idev] --
7,653,004 UART: [ldev] ++
7,653,575 UART: [ldev] CDI.KEYID = 6
7,654,539 UART: [ldev] SUBJECT.KEYID = 5
7,655,752 UART: [ldev] AUTHORITY.KEYID = 7
7,657,033 UART: [ldev] FE.KEYID = 1
7,668,816 UART: [ldev] Erasing FE.KEYID = 1
10,954,496 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,399 UART: [ldev] --
13,313,365 UART: [fwproc] Waiting for Commands...
13,315,298 UART: [fwproc] Received command 0x46574c44
13,317,482 UART: [fwproc] Received Image of size 114036 bytes
17,372,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,144 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,830,464 >>> mbox cmd response: success
17,831,018 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,834,624 UART: [afmc] ++
17,835,288 UART: [afmc] CDI.KEYID = 6
17,836,200 UART: [afmc] SUBJECT.KEYID = 7
17,837,414 UART: [afmc] AUTHORITY.KEYID = 5
21,154,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,297 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,648 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,499 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,944 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,372 UART: [afmc] --
23,520,539 UART: [cold-reset] --
23,525,427 UART: [state] Locking Datavault
23,530,032 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,785 UART: [state] Locking ICCM
23,533,234 UART: [exit] Launching FMC @ 0x40000130
23,541,629 UART:
23,541,880 UART: Running Caliptra FMC ...
23,542,979 UART:
23,543,136 UART: [state] CFI Enabled
23,551,126 UART: [fht] FMC Alias Private Key: 7
25,881,739 UART: [art] Extend RT PCRs Done
25,882,956 UART: [art] Lock RT PCRs Done
25,884,356 UART: [art] Populate DV Done
25,889,601 UART: [fht] FMC Alias Private Key: 7
25,891,242 UART: [art] Derive CDI
25,892,056 UART: [art] Store in in slot 0x4
25,934,447 UART: [art] Derive Key Pair
25,935,484 UART: [art] Store priv key in slot 0x5
29,177,725 UART: [art] Derive Key Pair - Done
29,191,143 UART: [art] Signing Cert with AUTHO
29,192,478 UART: RITY.KEYID = 7
31,471,607 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,132 UART: [art] PUB.X = FCDF23D825F36FA5F82F2EB94300AD7ABCD1418BD5EAA6AE845AD7B393015980BF81947AD7C0044FF80932F320CEC320
31,480,399 UART: [art] PUB.Y = 1F99C02B64BC4F034B736DE1229694BA7763E19A31E73B8B92C5C29B6520C0D9CF74450E8DB9801E08499F5303BC1D75
31,487,631 UART: [art] SIG.R = 5A70C74A40E7BE150FE208CBCC6BB7E9C1F63D8CB2B48021886AC82DD3A0EA3A5549E979F55FE0A57575D3E185452EDD
31,495,031 UART: [art] SIG.S = 88D53D5B66732BCEF91E24780B8602F3F930DE86413DB37D66463CB8C4D23D69B495730F67FB4FB8D54A7BFCBC1C35C8
32,800,618 UART: Caliptra RT
32,801,328 UART: [state] CFI Enabled
32,919,416 UART: [rt] RT listening for mailbox commands...
32,921,376 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,127,609 ready_for_fw is high
4,128,196 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,078,950 >>> mbox cmd response: success
18,079,595 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,716,830 UART:
23,717,211 UART: Running Caliptra FMC ...
23,718,353 UART:
23,718,517 UART: [state] CFI Enabled
23,726,152 UART: [fht] FMC Alias Private Key: 7
26,057,097 UART: [art] Extend RT PCRs Done
26,058,326 UART: [art] Lock RT PCRs Done
26,060,010 UART: [art] Populate DV Done
26,065,591 UART: [fht] FMC Alias Private Key: 7
26,067,079 UART: [art] Derive CDI
26,067,843 UART: [art] Store in in slot 0x4
26,110,438 UART: [art] Derive Key Pair
26,111,443 UART: [art] Store priv key in slot 0x5
29,353,723 UART: [art] Derive Key Pair - Done
29,366,850 UART: [art] Signing Cert with AUTHO
29,368,157 UART: RITY.KEYID = 7
31,647,363 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,879 UART: [art] PUB.X = CD2CF9ACF3D83EF38329260DD124B5DF06E966A3B8815F6BC0B6B72538CE83B3C70807BC0CE9EF48CD888731D4F4D748
31,656,150 UART: [art] PUB.Y = 993506A9F58C7F2F26D593BC7EE6577F414F7AB0ABA5D976878FCC5B67F89A5D01778975389BDBB5878F283688AC265A
31,663,379 UART: [art] SIG.R = 0024630D3C8DDC3A6A5D1BF10FBF7827D44793470D4A3494150237D97D90FC6D96BB38DF0F7D07ACC6E946E0EB38A54A
31,670,753 UART: [art] SIG.S = ADBBD5E95BFF916EEA12AF25313EC144CCB68E7917B91E1E57C765ED9AFE052C0ED403A45F73FE92B647FD115AE6E96C
32,975,083 UART: Caliptra RT
32,975,791 UART: [state] CFI Enabled
33,093,514 UART: [rt] RT listening for mailbox commands...
33,095,559 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,497 writing to cptra_bootfsm_go
193,655 UART:
194,012 UART: Running Caliptra ROM ...
195,116 UART:
195,260 UART: [state] CFI Enabled
264,840 UART: [state] LifecycleState = Unprovisioned
266,746 UART: [state] DebugLocked = No
268,765 UART: [state] WD Timer not started. Device not locked for debugging
273,214 UART: [kat] SHA2-256
452,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,920 UART: [kat] ++
464,371 UART: [kat] sha1
475,875 UART: [kat] SHA2-256
478,956 UART: [kat] SHA2-384
484,479 UART: [kat] SHA2-512-ACC
487,392 UART: [kat] ECC-384
2,947,517 UART: [kat] HMAC-384Kdf
2,971,346 UART: [kat] LMS
3,500,761 UART: [kat] --
3,505,488 UART: [cold-reset] ++
3,507,068 UART: [fht] FHT @ 0x50003400
3,516,913 UART: [idev] ++
3,517,486 UART: [idev] CDI.KEYID = 6
3,518,397 UART: [idev] SUBJECT.KEYID = 7
3,519,572 UART: [idev] UDS.KEYID = 0
3,520,499 ready_for_fw is high
3,520,706 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,537 UART: [idev] Erasing UDS.KEYID = 0
6,026,296 UART: [idev] Sha1 KeyId Algorithm
6,050,336 UART: [idev] --
6,054,820 UART: [ldev] ++
6,055,401 UART: [ldev] CDI.KEYID = 6
6,056,315 UART: [ldev] SUBJECT.KEYID = 5
6,057,477 UART: [ldev] AUTHORITY.KEYID = 7
6,058,763 UART: [ldev] FE.KEYID = 1
6,099,690 UART: [ldev] Erasing FE.KEYID = 1
8,606,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,058 UART: [ldev] --
10,412,554 UART: [fwproc] Wait for Commands...
10,414,220 UART: [fwproc] Recv command 0x46574c44
10,416,317 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,410 >>> mbox cmd response: success
14,283,953 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,288,461 UART: [afmc] ++
14,289,043 UART: [afmc] CDI.KEYID = 6
14,289,961 UART: [afmc] SUBJECT.KEYID = 7
14,291,118 UART: [afmc] AUTHORITY.KEYID = 5
16,827,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,642 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,273 UART: [afmc] --
18,627,301 UART: [cold-reset] --
18,630,563 UART: [state] Locking Datavault
18,637,699 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,347 UART: [state] Locking ICCM
18,642,035 UART: [exit] Launching FMC @ 0x40000130
18,650,479 UART:
18,650,726 UART: Running Caliptra FMC ...
18,651,828 UART:
18,651,992 UART: [state] CFI Enabled
18,708,751 UART: [fht] FMC Alias Private Key: 7
20,472,805 UART: [art] Extend RT PCRs Done
20,474,022 UART: [art] Lock RT PCRs Done
20,475,508 UART: [art] Populate DV Done
20,480,808 UART: [fht] FMC Alias Private Key: 7
20,482,327 UART: [art] Derive CDI
20,483,122 UART: [art] Store in in slot 0x4
20,541,221 UART: [art] Derive Key Pair
20,542,226 UART: [art] Store priv key in slot 0x5
23,005,566 UART: [art] Derive Key Pair - Done
23,018,509 UART: [art] Signing Cert with AUTHO
23,019,816 UART: RITY.KEYID = 7
24,731,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,058 UART: [art] PUB.X = 209F9E88C6A4A90C42DD1EC402F9361AE7AA89CE79328CE3456AFAC2D249D138FDD6CBFF3A170657813685ED707BE6E6
24,740,353 UART: [art] PUB.Y = 44D30AE8E96F0267ED977C4DD619355E46D7DBCB28607B500045F68F3AB4B52CB21517BA65CAE20870C4094A3CD60DD8
24,747,572 UART: [art] SIG.R = C8686F0CE338ADCE7D54B4215ACBD26432178FCEA01AFBD92DB5B9A4811C2121BB684DAB0BC94D2C2C3C821B939AEC5F
24,755,005 UART: [art] SIG.S = D5B5C6B24F82DE51CB961D81270AB880D307370693323C722017F32A237EECB6BF0A672A186E6FF6A10577DE7E54E94F
25,734,009 UART: Caliptra RT
25,734,713 UART: [state] CFI Enabled
25,899,667 UART: [rt] RT listening for mailbox commands...
25,901,634 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,387 UART:
192,761 UART: Running Caliptra ROM ...
193,980 UART:
194,132 UART: [state] CFI Enabled
266,111 UART: [state] LifecycleState = Unprovisioned
268,529 UART: [state] DebugLocked = No
270,500 UART: [state] WD Timer not started. Device not locked for debugging
275,324 UART: [kat] SHA2-256
465,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,985 UART: [kat] ++
476,462 UART: [kat] sha1
488,751 UART: [kat] SHA2-256
491,760 UART: [kat] SHA2-384
499,312 UART: [kat] SHA2-512-ACC
501,847 UART: [kat] ECC-384
2,947,366 UART: [kat] HMAC-384Kdf
2,972,390 UART: [kat] LMS
3,504,176 UART: [kat] --
3,508,901 UART: [cold-reset] ++
3,510,201 UART: [fht] FHT @ 0x50003400
3,522,197 UART: [idev] ++
3,522,912 UART: [idev] CDI.KEYID = 6
3,523,951 UART: [idev] SUBJECT.KEYID = 7
3,525,059 UART: [idev] UDS.KEYID = 0
3,525,989 ready_for_fw is high
3,526,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,057 UART: [idev] Erasing UDS.KEYID = 0
6,028,884 UART: [idev] Sha1 KeyId Algorithm
6,050,924 UART: [idev] --
6,056,214 UART: [ldev] ++
6,056,937 UART: [ldev] CDI.KEYID = 6
6,057,829 UART: [ldev] SUBJECT.KEYID = 5
6,058,997 UART: [ldev] AUTHORITY.KEYID = 7
6,060,098 UART: [ldev] FE.KEYID = 1
6,102,910 UART: [ldev] Erasing FE.KEYID = 1
8,607,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,088 UART: [ldev] --
10,415,869 UART: [fwproc] Wait for Commands...
10,417,864 UART: [fwproc] Recv command 0x46574c44
10,420,171 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,609,119 >>> mbox cmd response: success
14,609,633 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,613,650 UART: [afmc] ++
14,614,353 UART: [afmc] CDI.KEYID = 6
14,615,540 UART: [afmc] SUBJECT.KEYID = 7
14,617,051 UART: [afmc] AUTHORITY.KEYID = 5
17,151,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,301 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,036 UART: [afmc] --
18,970,120 UART: [cold-reset] --
18,974,362 UART: [state] Locking Datavault
18,981,298 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,313 UART: [state] Locking ICCM
18,985,535 UART: [exit] Launching FMC @ 0x40000130
18,994,210 UART:
18,994,450 UART: Running Caliptra FMC ...
18,995,558 UART:
18,995,734 UART: [state] CFI Enabled
19,052,945 UART: [fht] FMC Alias Private Key: 7
20,816,510 UART: [art] Extend RT PCRs Done
20,817,725 UART: [art] Lock RT PCRs Done
20,819,646 UART: [art] Populate DV Done
20,825,056 UART: [fht] FMC Alias Private Key: 7
20,826,700 UART: [art] Derive CDI
20,827,524 UART: [art] Store in in slot 0x4
20,885,749 UART: [art] Derive Key Pair
20,886,772 UART: [art] Store priv key in slot 0x5
23,349,128 UART: [art] Derive Key Pair - Done
23,362,020 UART: [art] Signing Cert with AUTHO
23,363,334 UART: RITY.KEYID = 7
25,075,397 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,901 UART: [art] PUB.X = E12EEA4DAC5E98DFEA2C63482AF4C77120D8BCADC9B9D6CFCDB8313B86E62F4B1A6072A0B512131D474823FD6101402C
25,084,194 UART: [art] PUB.Y = 9356C680E331DD0A4570CCD0CC28A76928C0DE271DF706158C3DCF44A235F28A6103664B403800865706A9A70B3BC318
25,091,437 UART: [art] SIG.R = 63451C18BE74D57A307D14059F3C87CB94F3BA51C7B280E9B563B53E4C22D80F027A71171CF4AFA6F6227ED7DE9173EE
25,098,833 UART: [art] SIG.S = 8DF482F7188B8366BFD9693FFAB6F5C5EE8A9410C09FF70E7D0AF442048E9077823AF2544A0250F1BE0156CB2DD314FD
26,077,601 UART: Caliptra RT
26,078,320 UART: [state] CFI Enabled
26,244,143 UART: [rt] RT listening for mailbox commands...
26,246,109 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,439,901 ready_for_fw is high
3,440,529 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,717,996 >>> mbox cmd response: success
14,718,787 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,008,205 UART:
19,008,614 UART: Running Caliptra FMC ...
19,009,735 UART:
19,009,898 UART: [state] CFI Enabled
19,076,030 UART: [fht] FMC Alias Private Key: 7
20,839,687 UART: [art] Extend RT PCRs Done
20,840,897 UART: [art] Lock RT PCRs Done
20,842,818 UART: [art] Populate DV Done
20,848,400 UART: [fht] FMC Alias Private Key: 7
20,849,952 UART: [art] Derive CDI
20,850,769 UART: [art] Store in in slot 0x4
20,909,204 UART: [art] Derive Key Pair
20,910,242 UART: [art] Store priv key in slot 0x5
23,372,722 UART: [art] Derive Key Pair - Done
23,385,848 UART: [art] Signing Cert with AUTHO
23,387,190 UART: RITY.KEYID = 7
25,097,882 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,376 UART: [art] PUB.X = D87EB8ACDECCD249328B6F662D94F05BE36217D6988366968319D58429C16EAE5917AC026F9EA1FF7F390E04FBC25632
25,106,678 UART: [art] PUB.Y = 6590EE9937A5BF1182A23EED71696176B844E994B5B901CE272D4AE697271E47AF9CE13ABAD7BB5EC46532CDB6F6AAC8
25,113,971 UART: [art] SIG.R = 5C4DF79B213956C425AEB5769CC85905416EB555C76FC0B8F83DA9A5AA7A738777319718F3886FE1F18207EF999E2A9A
25,121,295 UART: [art] SIG.S = B5C6AF780AEE0D290D3293B708721E409EEFCC729DC13C2BB7A851FDE784E024C2182C8A8DDA219EB72E9727458B1E10
26,099,731 UART: Caliptra RT
26,100,446 UART: [state] CFI Enabled
26,265,901 UART: [rt] RT listening for mailbox commands...
26,268,199 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,306 UART:
192,664 UART: Running Caliptra ROM ...
193,795 UART:
603,674 UART: [state] CFI Enabled
618,243 UART: [state] LifecycleState = Unprovisioned
620,556 UART: [state] DebugLocked = No
623,067 UART: [state] WD Timer not started. Device not locked for debugging
627,827 UART: [kat] SHA2-256
817,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,526 UART: [kat] ++
828,971 UART: [kat] sha1
840,285 UART: [kat] SHA2-256
843,329 UART: [kat] SHA2-384
850,692 UART: [kat] SHA2-512-ACC
853,280 UART: [kat] ECC-384
3,297,956 UART: [kat] HMAC-384Kdf
3,311,257 UART: [kat] LMS
3,843,138 UART: [kat] --
3,846,285 UART: [cold-reset] ++
3,847,361 UART: [fht] FHT @ 0x50003400
3,859,686 UART: [idev] ++
3,860,398 UART: [idev] CDI.KEYID = 6
3,861,279 UART: [idev] SUBJECT.KEYID = 7
3,862,518 UART: [idev] UDS.KEYID = 0
3,863,449 ready_for_fw is high
3,863,652 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,367 UART: [idev] Erasing UDS.KEYID = 0
6,339,317 UART: [idev] Sha1 KeyId Algorithm
6,362,051 UART: [idev] --
6,366,578 UART: [ldev] ++
6,367,311 UART: [ldev] CDI.KEYID = 6
6,368,220 UART: [ldev] SUBJECT.KEYID = 5
6,369,372 UART: [ldev] AUTHORITY.KEYID = 7
6,370,599 UART: [ldev] FE.KEYID = 1
6,380,755 UART: [ldev] Erasing FE.KEYID = 1
8,854,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,003 UART: [ldev] --
10,645,677 UART: [fwproc] Wait for Commands...
10,648,573 UART: [fwproc] Recv command 0x46574c44
10,650,875 UART: [fwproc] Recv'd Img size: 114360 bytes
14,103,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,841,728 >>> mbox cmd response: success
14,842,238 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,846,419 UART: [afmc] ++
14,847,111 UART: [afmc] CDI.KEYID = 6
14,848,351 UART: [afmc] SUBJECT.KEYID = 7
14,849,786 UART: [afmc] AUTHORITY.KEYID = 5
17,355,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,041 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,657 UART: [afmc] --
19,146,447 UART: [cold-reset] --
19,151,943 UART: [state] Locking Datavault
19,157,578 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,754 UART: [state] Locking ICCM
19,161,586 UART: [exit] Launching FMC @ 0x40000130
19,170,262 UART:
19,170,497 UART: Running Caliptra FMC ...
19,171,599 UART:
19,171,754 UART: [state] CFI Enabled
19,179,605 UART: [fht] FMC Alias Private Key: 7
20,936,732 UART: [art] Extend RT PCRs Done
20,937,957 UART: [art] Lock RT PCRs Done
20,939,501 UART: [art] Populate DV Done
20,945,035 UART: [fht] FMC Alias Private Key: 7
20,946,613 UART: [art] Derive CDI
20,947,359 UART: [art] Store in in slot 0x4
20,989,894 UART: [art] Derive Key Pair
20,990,910 UART: [art] Store priv key in slot 0x5
23,417,568 UART: [art] Derive Key Pair - Done
23,430,076 UART: [art] Signing Cert with AUTHO
23,431,370 UART: RITY.KEYID = 7
25,136,789 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,289 UART: [art] PUB.X = 060D40404E109166DBBBC4FB6F88CEDA76D1DD7FF9DC7FC880A51C792860399500EAF9754494A27B1A204B620BB8DBE4
25,145,538 UART: [art] PUB.Y = 55A2A70A36751754B6FBE1C5D8E71645306901323AE3A8CBED7589DD7DDD0FE4AB4CEC36E2717EFC8B84B8999195683B
25,152,819 UART: [art] SIG.R = 2E2C30AD2EA94E526CC744EC32D034E58C5889442E496C251DCBC912454132B53ECDCD50694052B2B32D1A41F66991E7
25,160,265 UART: [art] SIG.S = FB9F302533398AD8BEAC576888F58C3ADADB94A86D225D6F5C06E3FFB6F0EAC8E66E27111BA16C1A296EFFA4DB7004E3
26,138,832 UART: Caliptra RT
26,139,541 UART: [state] CFI Enabled
26,255,737 UART: [rt] RT listening for mailbox commands...
26,257,868 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,750,859 ready_for_fw is high
3,751,307 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,945,995 >>> mbox cmd response: success
14,946,801 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,197,921 UART:
19,198,304 UART: Running Caliptra FMC ...
19,199,514 UART:
19,199,681 UART: [state] CFI Enabled
19,207,686 UART: [fht] FMC Alias Private Key: 7
20,964,275 UART: [art] Extend RT PCRs Done
20,965,502 UART: [art] Lock RT PCRs Done
20,967,294 UART: [art] Populate DV Done
20,972,710 UART: [fht] FMC Alias Private Key: 7
20,974,312 UART: [art] Derive CDI
20,975,129 UART: [art] Store in in slot 0x4
21,017,838 UART: [art] Derive Key Pair
21,018,904 UART: [art] Store priv key in slot 0x5
23,445,745 UART: [art] Derive Key Pair - Done
23,459,024 UART: [art] Signing Cert with AUTHO
23,460,326 UART: RITY.KEYID = 7
25,165,585 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,102 UART: [art] PUB.X = 1838472169902B49C8CC1CFB5F982DB8BBBCD39774FAAB71AE01C928650B3739F5D121F4C7A39FBB72DA742DA3A0A710
25,174,337 UART: [art] PUB.Y = CBB2820F2C757171187C6AAA3ACD9B11D612EEA53851C85B991F6A1FC81FEC55A0FDA5981EFB1ED3F7F9D50CF171882C
25,181,638 UART: [art] SIG.R = 64ABFB079A25ED85C1771A75AE969BC3EFF35CAB9B04EB56DB8B3DCC326B2BBAE9E66D2867AE5889BE78F67C284DDD5A
25,189,084 UART: [art] SIG.S = C21FA8B522777B083AA918D68C451A0794FFD32F5ACD171A60567B06B2FFCE1C0A6DB1DEF65AB010AA24E5EDC730C084
26,168,705 UART: Caliptra RT
26,169,395 UART: [state] CFI Enabled
26,286,197 UART: [rt] RT listening for mailbox commands...
26,288,325 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,565 UART:
192,934 UART: Running Caliptra ROM ...
194,121 UART:
194,267 UART: [state] CFI Enabled
265,145 UART: [state] LifecycleState = Unprovisioned
267,134 UART: [state] DebugLocked = No
269,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,607 UART: [kat] SHA2-256
444,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,774 UART: [kat] ++
455,288 UART: [kat] sha1
466,507 UART: [kat] SHA2-256
469,229 UART: [kat] SHA2-384
475,387 UART: [kat] SHA2-512-ACC
477,723 UART: [kat] ECC-384
2,768,530 UART: [kat] HMAC-384Kdf
2,799,814 UART: [kat] LMS
3,990,111 UART: [kat] --
3,994,952 UART: [cold-reset] ++
3,997,122 UART: [fht] Storing FHT @ 0x50003400
4,008,172 UART: [idev] ++
4,008,741 UART: [idev] CDI.KEYID = 6
4,009,791 UART: [idev] SUBJECT.KEYID = 7
4,010,965 UART: [idev] UDS.KEYID = 0
4,012,034 ready_for_fw is high
4,012,247 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,736 UART: [idev] Erasing UDS.KEYID = 0
7,345,219 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,260 UART: [idev] --
7,371,288 UART: [ldev] ++
7,371,918 UART: [ldev] CDI.KEYID = 6
7,372,841 UART: [ldev] SUBJECT.KEYID = 5
7,374,049 UART: [ldev] AUTHORITY.KEYID = 7
7,375,252 UART: [ldev] FE.KEYID = 1
7,421,802 UART: [ldev] Erasing FE.KEYID = 1
10,755,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,050 UART: [ldev] --
13,137,256 UART: [fwproc] Waiting for Commands...
13,139,666 UART: [fwproc] Received command 0x46574c44
13,141,839 UART: [fwproc] Received Image of size 114036 bytes
17,194,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,757 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,661,366 >>> mbox cmd response: success
17,661,895 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,666,240 UART: [afmc] ++
17,666,821 UART: [afmc] CDI.KEYID = 6
17,667,781 UART: [afmc] SUBJECT.KEYID = 7
17,668,987 UART: [afmc] AUTHORITY.KEYID = 5
21,026,833 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,933 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,187 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,591 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,457 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,858 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,741 UART: [afmc] --
23,399,322 UART: [cold-reset] --
23,402,580 UART: [state] Locking Datavault
23,410,194 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,944 UART: [state] Locking ICCM
23,413,004 UART: [exit] Launching FMC @ 0x40000130
23,421,347 UART:
23,421,574 UART: Running Caliptra FMC ...
23,422,669 UART:
23,422,823 UART: [state] CFI Enabled
23,494,443 UART: [fht] FMC Alias Private Key: 7
25,832,165 UART: [art] Extend RT PCRs Done
25,833,492 UART: [art] Lock RT PCRs Done
25,835,244 UART: [art] Populate DV Done
25,840,597 UART: [fht] FMC Alias Private Key: 7
25,842,078 UART: [art] Derive CDI
25,842,834 UART: [art] Store in in slot 0x4
25,902,650 UART: [art] Derive Key Pair
25,903,647 UART: [art] Store priv key in slot 0x5
29,196,702 UART: [art] Derive Key Pair - Done
29,209,642 UART: [art] Signing Cert with AUTHO
29,210,933 UART: RITY.KEYID = 7
31,499,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,000 UART: [art] PUB.X = B87CCB7FBF3891657E47D052B4A99B2DD97ABC94296047A6E447F29BCAEF2FB8DD516923F203DB108FF253CAA7B8C09F
31,508,295 UART: [art] PUB.Y = 88272D33ADC69CBD6B4857E49664AA0F1C307C18A0E7BCC6299D56BDC255A44C28347AB9AF0680F9F1453BA5DE087020
31,515,559 UART: [art] SIG.R = C96E00826B3D3986E62681A9CE7A05C8724F4CCA75F6C9ADEA7E241C0B86C211407EF3FA50C97E8218B2713898C778FA
31,522,894 UART: [art] SIG.S = F4FCC80D16FB07F2FB22A8287A2BCFEBF74CDB8F657E85FA0E3419048582F68D05CC2A657746773A08543615149030C7
32,827,736 UART: Caliptra RT
32,828,434 UART: [state] CFI Enabled
32,990,998 UART: [rt] RT listening for mailbox commands...
33,021,929 UART: [rt]cmd =0xaabbccdd, len=4
33,023,324 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,784,488 ready_for_fw is high
3,785,098 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,858,938 >>> mbox cmd response: success
17,859,606 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,549,435 UART:
23,549,827 UART: Running Caliptra FMC ...
23,551,012 UART:
23,551,174 UART: [state] CFI Enabled
23,619,493 UART: [fht] FMC Alias Private Key: 7
25,957,168 UART: [art] Extend RT PCRs Done
25,958,442 UART: [art] Lock RT PCRs Done
25,959,718 UART: [art] Populate DV Done
25,965,033 UART: [fht] FMC Alias Private Key: 7
25,966,629 UART: [art] Derive CDI
25,967,377 UART: [art] Store in in slot 0x4
26,027,901 UART: [art] Derive Key Pair
26,028,972 UART: [art] Store priv key in slot 0x5
29,321,637 UART: [art] Derive Key Pair - Done
29,334,632 UART: [art] Signing Cert with AUTHO
29,335,929 UART: RITY.KEYID = 7
31,623,117 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,754 UART: [art] PUB.X = 94F03F20436B8ACDEE03ADFACE3CF29BE6496CCEBC634FEA802809BA0945B955E730052B7B56D40B9A29554DE62A0119
31,631,877 UART: [art] PUB.Y = DE630EF56318BB6A3EF4D477793CF96E8F5F5529C6DC3B1C213C8C4677462AF155BEC61DE74EE2812EEC78CE75877246
31,639,105 UART: [art] SIG.R = 4CC0C8C1F610E45CC5638D751C6E576C5894551A530C72AB43D8E2F7EB321A3FC7AF19D58C5A45E96714E0FF76B4CBBB
31,646,480 UART: [art] SIG.S = A11D8FC3DBC11252BEB1A2E9EBCB79E2E2DDF9EF04DE37A66C15FB4F57AC760906890139205AAD86C70CDE437976C999
32,951,790 UART: Caliptra RT
32,952,511 UART: [state] CFI Enabled
33,133,210 UART: [rt] RT listening for mailbox commands...
33,164,380 UART: [rt]cmd =0xaabbccdd, len=4
33,165,803 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
192,509 UART:
192,868 UART: Running Caliptra ROM ...
193,989 UART:
603,501 UART: [state] CFI Enabled
617,440 UART: [state] LifecycleState = Unprovisioned
619,358 UART: [state] DebugLocked = No
621,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,808 UART: [kat] SHA2-256
796,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,131 UART: [kat] ++
807,577 UART: [kat] sha1
818,869 UART: [kat] SHA2-256
821,521 UART: [kat] SHA2-384
828,149 UART: [kat] SHA2-512-ACC
830,515 UART: [kat] ECC-384
3,113,697 UART: [kat] HMAC-384Kdf
3,125,644 UART: [kat] LMS
4,315,760 UART: [kat] --
4,321,428 UART: [cold-reset] ++
4,324,004 UART: [fht] Storing FHT @ 0x50003400
4,335,205 UART: [idev] ++
4,335,846 UART: [idev] CDI.KEYID = 6
4,336,767 UART: [idev] SUBJECT.KEYID = 7
4,338,017 UART: [idev] UDS.KEYID = 0
4,339,004 ready_for_fw is high
4,339,201 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,408 UART: [idev] Erasing UDS.KEYID = 0
7,627,657 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,640 UART: [idev] --
7,653,575 UART: [ldev] ++
7,654,192 UART: [ldev] CDI.KEYID = 6
7,655,204 UART: [ldev] SUBJECT.KEYID = 5
7,656,357 UART: [ldev] AUTHORITY.KEYID = 7
7,657,583 UART: [ldev] FE.KEYID = 1
7,668,840 UART: [ldev] Erasing FE.KEYID = 1
10,958,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,117 UART: [ldev] --
13,318,216 UART: [fwproc] Waiting for Commands...
13,320,467 UART: [fwproc] Received command 0x46574c44
13,322,645 UART: [fwproc] Received Image of size 114036 bytes
17,371,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,485 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,383 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,028 >>> mbox cmd response: success
17,833,569 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,838,018 UART: [afmc] ++
17,838,623 UART: [afmc] CDI.KEYID = 6
17,839,538 UART: [afmc] SUBJECT.KEYID = 7
17,840,749 UART: [afmc] AUTHORITY.KEYID = 5
21,154,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,035 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,442 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,258 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,692 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,362 UART: [afmc] --
23,519,479 UART: [cold-reset] --
23,523,395 UART: [state] Locking Datavault
23,528,917 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,670 UART: [state] Locking ICCM
23,532,868 UART: [exit] Launching FMC @ 0x40000130
23,541,262 UART:
23,541,513 UART: Running Caliptra FMC ...
23,542,614 UART:
23,542,771 UART: [state] CFI Enabled
23,550,762 UART: [fht] FMC Alias Private Key: 7
25,881,493 UART: [art] Extend RT PCRs Done
25,882,714 UART: [art] Lock RT PCRs Done
25,884,286 UART: [art] Populate DV Done
25,889,803 UART: [fht] FMC Alias Private Key: 7
25,891,390 UART: [art] Derive CDI
25,892,201 UART: [art] Store in in slot 0x4
25,935,386 UART: [art] Derive Key Pair
25,936,426 UART: [art] Store priv key in slot 0x5
29,178,081 UART: [art] Derive Key Pair - Done
29,191,259 UART: [art] Signing Cert with AUTHO
29,192,564 UART: RITY.KEYID = 7
31,471,642 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,166 UART: [art] PUB.X = 8EB941C5475119F8E2393352D0C9E9776B396005D459A29265BB265BCA01195832482ED5FD5EB46F429B44B0B2E265F0
31,480,349 UART: [art] PUB.Y = 90116471ABE8CEE216227993CA53668EDC7AAFD1789BCBFB884009ED060D8E7A7C5439FC7033A90419A4B8A7F6A8EFCF
31,487,647 UART: [art] SIG.R = 38A5CCCF87EA5D006D73BF360550CE96A701E30A06A7EA9566CFE60170D31F370188D936FD1C48C105F76E13E765A936
31,495,051 UART: [art] SIG.S = 9761A556D5715CFC7232BA80EE1DC2490E17BA51774E77436B934B0812C7F436F8DB750BF05EA6106DACF5C5A178A03B
32,800,930 UART: Caliptra RT
32,801,638 UART: [state] CFI Enabled
32,918,539 UART: [rt] RT listening for mailbox commands...
32,949,450 UART: [rt]cmd =0xaabbccdd, len=4
32,950,825 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,130,001 ready_for_fw is high
4,130,390 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,086,451 >>> mbox cmd response: success
18,087,317 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,726,503 UART:
23,726,884 UART: Running Caliptra FMC ...
23,728,000 UART:
23,728,156 UART: [state] CFI Enabled
23,736,383 UART: [fht] FMC Alias Private Key: 7
26,066,777 UART: [art] Extend RT PCRs Done
26,068,005 UART: [art] Lock RT PCRs Done
26,069,585 UART: [art] Populate DV Done
26,074,892 UART: [fht] FMC Alias Private Key: 7
26,076,434 UART: [art] Derive CDI
26,077,201 UART: [art] Store in in slot 0x4
26,119,855 UART: [art] Derive Key Pair
26,120,897 UART: [art] Store priv key in slot 0x5
29,363,333 UART: [art] Derive Key Pair - Done
29,376,335 UART: [art] Signing Cert with AUTHO
29,377,676 UART: RITY.KEYID = 7
31,656,475 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,986 UART: [art] PUB.X = 6E94784F5A1C31F5A682C7C2A22E8AD7ECAE1AAF62F1E6F513DE0827F80BA1991B4CEAF7F0B8935F8935835C2666FEDC
31,665,253 UART: [art] PUB.Y = DEB51731F79BD9F79916761F179104E45EA8FD9709C7510B15B94F15D3E1E256C82B46A429E8B0DD3100B0B47B49CECC
31,672,509 UART: [art] SIG.R = 9CCA7F0AC9414ABEC02B381262ABA1F0C287A353EE5747E7FB4590D2EC12E05DE217780C1E75910F970F41B466CE100B
31,679,876 UART: [art] SIG.S = 90972DE68090F2074E6B7C6E4F2CDF28785FA6BBCF7A48DDE1CC96F28B78A4A934FDE9A2F1FAC79AF5FDAA9BD3AC79EB
32,985,450 UART: Caliptra RT
32,986,172 UART: [state] CFI Enabled
33,103,893 UART: [rt] RT listening for mailbox commands...
33,135,309 UART: [rt]cmd =0xaabbccdd, len=4
33,136,581 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,515 UART:
192,897 UART: Running Caliptra ROM ...
194,046 UART:
194,195 UART: [state] CFI Enabled
266,295 UART: [state] LifecycleState = Unprovisioned
268,208 UART: [state] DebugLocked = No
270,265 UART: [state] WD Timer not started. Device not locked for debugging
273,807 UART: [kat] SHA2-256
452,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,492 UART: [kat] ++
464,943 UART: [kat] sha1
476,804 UART: [kat] SHA2-256
479,808 UART: [kat] SHA2-384
485,829 UART: [kat] SHA2-512-ACC
488,590 UART: [kat] ECC-384
2,948,127 UART: [kat] HMAC-384Kdf
2,972,881 UART: [kat] LMS
3,502,396 UART: [kat] --
3,506,248 UART: [cold-reset] ++
3,508,034 UART: [fht] FHT @ 0x50003400
3,520,080 UART: [idev] ++
3,520,651 UART: [idev] CDI.KEYID = 6
3,521,656 UART: [idev] SUBJECT.KEYID = 7
3,522,834 UART: [idev] UDS.KEYID = 0
3,523,763 ready_for_fw is high
3,523,949 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,738 UART: [idev] Erasing UDS.KEYID = 0
6,026,671 UART: [idev] Sha1 KeyId Algorithm
6,051,087 UART: [idev] --
6,054,760 UART: [ldev] ++
6,055,334 UART: [ldev] CDI.KEYID = 6
6,056,223 UART: [ldev] SUBJECT.KEYID = 5
6,057,440 UART: [ldev] AUTHORITY.KEYID = 7
6,058,679 UART: [ldev] FE.KEYID = 1
6,101,459 UART: [ldev] Erasing FE.KEYID = 1
8,605,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,292 UART: [ldev] --
10,405,150 UART: [fwproc] Wait for Commands...
10,406,796 UART: [fwproc] Recv command 0x46574c44
10,408,905 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,280,248 >>> mbox cmd response: success
14,280,794 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,284,675 UART: [afmc] ++
14,285,259 UART: [afmc] CDI.KEYID = 6
14,286,140 UART: [afmc] SUBJECT.KEYID = 7
14,287,354 UART: [afmc] AUTHORITY.KEYID = 5
16,809,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,538,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,540,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,556,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,572,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,588,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,612,476 UART: [afmc] --
18,615,800 UART: [cold-reset] --
18,619,173 UART: [state] Locking Datavault
18,624,421 UART: [state] Locking PCR0, PCR1 and PCR31
18,626,077 UART: [state] Locking ICCM
18,627,800 UART: [exit] Launching FMC @ 0x40000130
18,636,193 UART:
18,636,426 UART: Running Caliptra FMC ...
18,637,524 UART:
18,637,681 UART: [state] CFI Enabled
18,696,251 UART: [fht] FMC Alias Private Key: 7
20,460,424 UART: [art] Extend RT PCRs Done
20,461,643 UART: [art] Lock RT PCRs Done
20,463,320 UART: [art] Populate DV Done
20,468,998 UART: [fht] FMC Alias Private Key: 7
20,470,547 UART: [art] Derive CDI
20,471,364 UART: [art] Store in in slot 0x4
20,529,623 UART: [art] Derive Key Pair
20,530,658 UART: [art] Store priv key in slot 0x5
22,993,161 UART: [art] Derive Key Pair - Done
23,006,202 UART: [art] Signing Cert with AUTHO
23,007,520 UART: RITY.KEYID = 7
24,719,400 UART: [art] Erasing AUTHORITY.KEYID = 7
24,720,908 UART: [art] PUB.X = D3E08C2024A18DADAB57DCCD925E48B17337A5038874E1815DA719A5AF3D564C22A8ADBE47F3D74C89F32F2E20275DEF
24,728,167 UART: [art] PUB.Y = 4E2A846445AD8CEFA79EB4FECF4D666FD34FE1E52FA4E0E4789C85E3A5442535331E75C9DE0B5B9AF66B52B384F90284
24,735,449 UART: [art] SIG.R = A86D6C5303BB55778DD092DBB22084A317B9993B57CA7D168EE155486ECD2A0C0AF24994002D0EEEE8A35F57CA7F19F5
24,742,824 UART: [art] SIG.S = DACBC19F6A0E73FB7489091486709D9E447D6530777885A05F78F92070807CA111ED992CE70E0ED18F9561A4F328C6B4
25,721,738 UART: Caliptra RT
25,722,447 UART: [state] CFI Enabled
25,886,650 UART: [rt] RT listening for mailbox commands...
25,917,737 UART: [rt]cmd =0xaabbccdd, len=4
25,919,077 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,628 UART:
192,984 UART: Running Caliptra ROM ...
194,163 UART:
194,320 UART: [state] CFI Enabled
300,266 UART: [state] LifecycleState = Unprovisioned
302,723 UART: [state] DebugLocked = No
304,040 UART: [state] WD Timer not started. Device not locked for debugging
308,085 UART: [kat] SHA2-256
498,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
508,755 UART: [kat] ++
509,234 UART: [kat] sha1
520,764 UART: [kat] SHA2-256
523,848 UART: [kat] SHA2-384
530,038 UART: [kat] SHA2-512-ACC
532,638 UART: [kat] ECC-384
2,980,556 UART: [kat] HMAC-384Kdf
3,005,177 UART: [kat] LMS
3,536,997 UART: [kat] --
3,542,918 UART: [cold-reset] ++
3,544,426 UART: [fht] FHT @ 0x50003400
3,557,110 UART: [idev] ++
3,557,747 UART: [idev] CDI.KEYID = 6
3,558,726 UART: [idev] SUBJECT.KEYID = 7
3,559,900 UART: [idev] UDS.KEYID = 0
3,560,826 ready_for_fw is high
3,561,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,704,931 UART: [idev] Erasing UDS.KEYID = 0
6,065,666 UART: [idev] Sha1 KeyId Algorithm
6,088,466 UART: [idev] --
6,093,811 UART: [ldev] ++
6,094,489 UART: [ldev] CDI.KEYID = 6
6,095,401 UART: [ldev] SUBJECT.KEYID = 5
6,096,617 UART: [ldev] AUTHORITY.KEYID = 7
6,097,800 UART: [ldev] FE.KEYID = 1
6,134,348 UART: [ldev] Erasing FE.KEYID = 1
8,640,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,375,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,390,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,405,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,420,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,441,709 UART: [ldev] --
10,447,531 UART: [fwproc] Wait for Commands...
10,450,690 UART: [fwproc] Recv command 0x46574c44
10,453,027 UART: [fwproc] Recv'd Img size: 114360 bytes
13,900,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,977,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,094,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,637,104 >>> mbox cmd response: success
14,637,628 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,640,627 UART: [afmc] ++
14,641,322 UART: [afmc] CDI.KEYID = 6
14,642,466 UART: [afmc] SUBJECT.KEYID = 7
14,644,015 UART: [afmc] AUTHORITY.KEYID = 5
17,184,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,928,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,930,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,945,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,960,608 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,975,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,999,939 UART: [afmc] --
19,003,325 UART: [cold-reset] --
19,008,697 UART: [state] Locking Datavault
19,015,537 UART: [state] Locking PCR0, PCR1 and PCR31
19,017,745 UART: [state] Locking ICCM
19,019,740 UART: [exit] Launching FMC @ 0x40000130
19,028,418 UART:
19,028,656 UART: Running Caliptra FMC ...
19,029,758 UART:
19,029,918 UART: [state] CFI Enabled
19,084,546 UART: [fht] FMC Alias Private Key: 7
20,848,338 UART: [art] Extend RT PCRs Done
20,849,551 UART: [art] Lock RT PCRs Done
20,851,229 UART: [art] Populate DV Done
20,856,263 UART: [fht] FMC Alias Private Key: 7
20,857,908 UART: [art] Derive CDI
20,858,745 UART: [art] Store in in slot 0x4
20,917,392 UART: [art] Derive Key Pair
20,918,387 UART: [art] Store priv key in slot 0x5
23,381,502 UART: [art] Derive Key Pair - Done
23,394,787 UART: [art] Signing Cert with AUTHO
23,396,089 UART: RITY.KEYID = 7
25,106,612 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,125 UART: [art] PUB.X = 0DB61EEA0A77AFBE76A5FBE785F530A743A5AEED565B736EE3FA378D2C1D19C3666BAE0601EEEC695984DC8AE82E6E2F
25,115,421 UART: [art] PUB.Y = ED1BDDF66CF9175036A80F5E8C84606B45955DD5A5B410E00EDC45EAAFAA687B4B7F9B080138B7FED882A9CD8D10B85C
25,122,692 UART: [art] SIG.R = 1CDCF16BFED7118FB90D00369162798007B1E96A5504248E28A0EE09BC3140538E9237EC423997EC7CC80EBC3567C99C
25,130,069 UART: [art] SIG.S = 73DD9CE42D0A1748C69D4E064E99AB8423122638E6EDCD617934B94DE59C618534B11D80C1883438834B00851ED76377
26,108,732 UART: Caliptra RT
26,109,444 UART: [state] CFI Enabled
26,273,729 UART: [rt] RT listening for mailbox commands...
26,304,700 UART: [rt]cmd =0xaabbccdd, len=4
26,306,077 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,438,301 ready_for_fw is high
3,438,926 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,758,662 >>> mbox cmd response: success
14,759,349 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,047,198 UART:
19,047,581 UART: Running Caliptra FMC ...
19,048,783 UART:
19,048,950 UART: [state] CFI Enabled
19,118,422 UART: [fht] FMC Alias Private Key: 7
20,882,238 UART: [art] Extend RT PCRs Done
20,883,453 UART: [art] Lock RT PCRs Done
20,884,704 UART: [art] Populate DV Done
20,890,112 UART: [fht] FMC Alias Private Key: 7
20,891,770 UART: [art] Derive CDI
20,892,586 UART: [art] Store in in slot 0x4
20,951,286 UART: [art] Derive Key Pair
20,952,331 UART: [art] Store priv key in slot 0x5
23,415,277 UART: [art] Derive Key Pair - Done
23,428,333 UART: [art] Signing Cert with AUTHO
23,429,669 UART: RITY.KEYID = 7
25,141,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,872 UART: [art] PUB.X = C0A31D96FB8B7171BB20CE2DF7068493CE6AB3D2B94C1D431A789AE5B4938573516B540A40DB5C04C04F9CF3E956A2B6
25,150,026 UART: [art] PUB.Y = D895087F8C2A1D0604E7D3BE856FB1C228CA9C51A39A576D27B5A00695B50CC599A1F1F35724499B52AB0F719A58E75A
25,157,273 UART: [art] SIG.R = B12534A97E8A003E796FB9CEA17D3B63EF7B75DEE9567178D37F41323826FA279E33B7198244DBB98851E4755267F7F0
25,164,603 UART: [art] SIG.S = 70E46BB69C47981B5F4916B42E5F0C0F9784428E171677E59B391AFA4AAA5006C48A4797A6A7942205512E05734E5A57
26,143,819 UART: Caliptra RT
26,144,526 UART: [state] CFI Enabled
26,310,536 UART: [rt] RT listening for mailbox commands...
26,341,577 UART: [rt]cmd =0xaabbccdd, len=4
26,343,082 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,665 UART:
193,024 UART: Running Caliptra ROM ...
194,208 UART:
603,880 UART: [state] CFI Enabled
621,950 UART: [state] LifecycleState = Unprovisioned
624,323 UART: [state] DebugLocked = No
626,274 UART: [state] WD Timer not started. Device not locked for debugging
631,521 UART: [kat] SHA2-256
821,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,193 UART: [kat] ++
832,744 UART: [kat] sha1
844,157 UART: [kat] SHA2-256
847,145 UART: [kat] SHA2-384
853,140 UART: [kat] SHA2-512-ACC
855,738 UART: [kat] ECC-384
3,296,745 UART: [kat] HMAC-384Kdf
3,310,595 UART: [kat] LMS
3,842,476 UART: [kat] --
3,847,670 UART: [cold-reset] ++
3,849,242 UART: [fht] FHT @ 0x50003400
3,861,143 UART: [idev] ++
3,861,849 UART: [idev] CDI.KEYID = 6
3,862,759 UART: [idev] SUBJECT.KEYID = 7
3,864,000 UART: [idev] UDS.KEYID = 0
3,864,927 ready_for_fw is high
3,865,135 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,824 UART: [idev] Erasing UDS.KEYID = 0
6,341,500 UART: [idev] Sha1 KeyId Algorithm
6,364,400 UART: [idev] --
6,370,099 UART: [ldev] ++
6,370,806 UART: [ldev] CDI.KEYID = 6
6,371,717 UART: [ldev] SUBJECT.KEYID = 5
6,372,874 UART: [ldev] AUTHORITY.KEYID = 7
6,374,099 UART: [ldev] FE.KEYID = 1
6,386,256 UART: [ldev] Erasing FE.KEYID = 1
8,866,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,211 UART: [ldev] --
10,656,495 UART: [fwproc] Wait for Commands...
10,659,456 UART: [fwproc] Recv command 0x46574c44
10,661,706 UART: [fwproc] Recv'd Img size: 114360 bytes
14,106,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,843,608 >>> mbox cmd response: success
14,844,137 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,847,985 UART: [afmc] ++
14,848,689 UART: [afmc] CDI.KEYID = 6
14,849,922 UART: [afmc] SUBJECT.KEYID = 7
14,851,343 UART: [afmc] AUTHORITY.KEYID = 5
17,356,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,932 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,200 UART: [afmc] --
19,155,392 UART: [cold-reset] --
19,159,089 UART: [state] Locking Datavault
19,165,111 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,339 UART: [state] Locking ICCM
19,169,764 UART: [exit] Launching FMC @ 0x40000130
19,178,428 UART:
19,178,660 UART: Running Caliptra FMC ...
19,179,754 UART:
19,179,914 UART: [state] CFI Enabled
19,188,498 UART: [fht] FMC Alias Private Key: 7
20,945,857 UART: [art] Extend RT PCRs Done
20,947,086 UART: [art] Lock RT PCRs Done
20,948,825 UART: [art] Populate DV Done
20,954,237 UART: [fht] FMC Alias Private Key: 7
20,955,935 UART: [art] Derive CDI
20,956,745 UART: [art] Store in in slot 0x4
20,999,549 UART: [art] Derive Key Pair
21,000,543 UART: [art] Store priv key in slot 0x5
23,427,222 UART: [art] Derive Key Pair - Done
23,439,891 UART: [art] Signing Cert with AUTHO
23,441,190 UART: RITY.KEYID = 7
25,146,471 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,973 UART: [art] PUB.X = 604C1C8FDE537BEEE02BA12DB73CB0D7C810DA018A957CAAA15788DE38B0A477560404CFC7CC3A4F184DD7D6E6467B5E
25,155,217 UART: [art] PUB.Y = 99CC785B8710E8947D7BD7F3FAF27800E2847D2F42FAEF4F1404BD4FF855AC5FA0C46AB73291C9D0B99DAA3F13C9E439
25,162,665 UART: [art] SIG.R = 7AA09D5A3B5659DDB702117575C4B130A3CADCC44A30CE7C1720CDFE3C7A30C048054444845FD7405C86AFD40BC0EC5D
25,169,947 UART: [art] SIG.S = 930214BC7884896E534F9DFFCFF9D964BB5E7EEAA1B0F536EF3EDE9BBDAE41A54C7ED2F5B842CCC7757E47F0D3CCAB78
26,149,089 UART: Caliptra RT
26,149,800 UART: [state] CFI Enabled
26,266,675 UART: [rt] RT listening for mailbox commands...
26,297,852 UART: [rt]cmd =0xaabbccdd, len=4
26,299,165 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,758,142 ready_for_fw is high
3,758,636 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,316 >>> mbox cmd response: success
14,956,948 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,210,525 UART:
19,210,938 UART: Running Caliptra FMC ...
19,212,043 UART:
19,212,196 UART: [state] CFI Enabled
19,219,886 UART: [fht] FMC Alias Private Key: 7
20,976,627 UART: [art] Extend RT PCRs Done
20,977,849 UART: [art] Lock RT PCRs Done
20,979,715 UART: [art] Populate DV Done
20,985,230 UART: [fht] FMC Alias Private Key: 7
20,986,928 UART: [art] Derive CDI
20,987,661 UART: [art] Store in in slot 0x4
21,030,898 UART: [art] Derive Key Pair
21,031,904 UART: [art] Store priv key in slot 0x5
23,458,379 UART: [art] Derive Key Pair - Done
23,471,533 UART: [art] Signing Cert with AUTHO
23,472,829 UART: RITY.KEYID = 7
25,178,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,853 UART: [art] PUB.X = 4C2157E7C4C624B6AA0E5A76970546BAD960D271AB061F7EFF0DFBC38E35FBFE9F00EE6F192CEF5FFD6D1F4EFBFDCC01
25,187,152 UART: [art] PUB.Y = 50047BE9C25FB41F1AA1A3B4F15A7D944643EA6B28EDA5017A01E73C2F85EEC135A202452273D1664F57C59E43B8AE28
25,194,406 UART: [art] SIG.R = 1A5C429D4820C10FD82C4ECE96CDBCD297C9CE7589B69177BD83E740FDBDCFD6EEC59C4014B0DC6ADF4D2B9380137222
25,201,794 UART: [art] SIG.S = 34171C2FAA71FE8F3F04F345C693706C1200A937712C1DDC3F256892352CA4BBDE7C230478D3D3DD2FDE36A3C27242F0
26,181,072 UART: Caliptra RT
26,181,765 UART: [state] CFI Enabled
26,299,849 UART: [rt] RT listening for mailbox commands...
26,330,763 UART: [rt]cmd =0xaabbccdd, len=4
26,332,188 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,779 UART: [kat] SHA2-256
881,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,825 UART: [kat] ++
885,977 UART: [kat] sha1
890,239 UART: [kat] SHA2-256
892,177 UART: [kat] SHA2-384
895,026 UART: [kat] SHA2-512-ACC
896,927 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,083 UART: [fht] Storing FHT @ 0x50003400
1,480,050 UART: [idev] ++
1,480,218 UART: [idev] CDI.KEYID = 6
1,480,578 UART: [idev] SUBJECT.KEYID = 7
1,481,002 UART: [idev] UDS.KEYID = 0
1,481,347 ready_for_fw is high
1,481,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,840 UART: [idev] Erasing UDS.KEYID = 0
1,505,398 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,243 UART: [ldev] ++
1,515,411 UART: [ldev] CDI.KEYID = 6
1,515,774 UART: [ldev] SUBJECT.KEYID = 5
1,516,200 UART: [ldev] AUTHORITY.KEYID = 7
1,516,663 UART: [ldev] FE.KEYID = 1
1,522,143 UART: [ldev] Erasing FE.KEYID = 1
1,546,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,880 UART: [ldev] --
1,586,331 UART: [fwproc] Waiting for Commands...
1,587,162 UART: [fwproc] Received command 0x46574c44
1,587,953 UART: [fwproc] Received Image of size 114360 bytes
2,886,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,988 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,183 >>> mbox cmd response: success
3,079,183 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,080,361 UART: [afmc] ++
3,080,529 UART: [afmc] CDI.KEYID = 6
3,080,891 UART: [afmc] SUBJECT.KEYID = 7
3,081,316 UART: [afmc] AUTHORITY.KEYID = 5
3,115,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,462 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,152 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,917 UART: [afmc] --
3,158,979 UART: [cold-reset] --
3,159,823 UART: [state] Locking Datavault
3,161,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,820 UART: [state] Locking ICCM
3,162,448 UART: [exit] Launching FMC @ 0x40000130
3,167,777 UART:
3,167,793 UART: Running Caliptra FMC ...
3,168,201 UART:
3,168,255 UART: [state] CFI Enabled
3,178,956 UART: [fht] FMC Alias Private Key: 7
3,286,605 UART: [art] Extend RT PCRs Done
3,287,033 UART: [art] Lock RT PCRs Done
3,288,825 UART: [art] Populate DV Done
3,297,278 UART: [fht] FMC Alias Private Key: 7
3,298,206 UART: [art] Derive CDI
3,298,486 UART: [art] Store in in slot 0x4
3,384,255 UART: [art] Derive Key Pair
3,384,615 UART: [art] Store priv key in slot 0x5
3,397,905 UART: [art] Derive Key Pair - Done
3,412,677 UART: [art] Signing Cert with AUTHO
3,413,157 UART: RITY.KEYID = 7
3,428,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,224 UART: [art] PUB.X = 059F689DB514606C7E648B851D23C9F291CB8A083DD31EF03086AD1D8D88B737F99D15A8A614FFD87FF2BAD02B0B5C79
3,435,995 UART: [art] PUB.Y = 66D81C03B3C0FCD3BC808AD633B3CF26E97A375AB17461D7C7D07AA5E0F18A7CF7CC99B3AB1C6BC60BB65A300B3FA456
3,442,958 UART: [art] SIG.R = 8937D1E68687A0694AA25C8A736D467CC24DA97F734E873045D83E1324DEA4F8A1286AD2F409602A852664EEC10E8439
3,449,718 UART: [art] SIG.S = 147F38D853CD7A24DF7C61332582B0C10D807A32A3ECF2777DAFB37BC35807C08D7010931319F5C9304D714BA27A0B1E
3,474,064 UART: Caliptra RT
3,474,318 UART: [state] CFI Enabled
3,582,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,453 UART: [rt]cmd =0xaabbccdd, len=4
3,613,509 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,891 >>> mbox cmd response: success
2,926,891 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,988,651 UART:
2,988,667 UART: Running Caliptra FMC ...
2,989,075 UART:
2,989,129 UART: [state] CFI Enabled
2,999,506 UART: [fht] FMC Alias Private Key: 7
3,107,103 UART: [art] Extend RT PCRs Done
3,107,531 UART: [art] Lock RT PCRs Done
3,109,103 UART: [art] Populate DV Done
3,117,326 UART: [fht] FMC Alias Private Key: 7
3,118,326 UART: [art] Derive CDI
3,118,606 UART: [art] Store in in slot 0x4
3,204,859 UART: [art] Derive Key Pair
3,205,219 UART: [art] Store priv key in slot 0x5
3,218,373 UART: [art] Derive Key Pair - Done
3,233,023 UART: [art] Signing Cert with AUTHO
3,233,503 UART: RITY.KEYID = 7
3,248,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,664 UART: [art] PUB.X = 914D63B73594633C6D75BCEA3A2AAEEC650C996FE2648300FEDE153DE9E952987C3BB123336798DEDAA342969910AEC9
3,256,417 UART: [art] PUB.Y = A80ED67D8E00AE12445A2D2F842012E82BA3EEE9E332E31D7074ABD59AF7CFEF2BA90D5C3721D39C8F331F307F819D38
3,263,353 UART: [art] SIG.R = A63451F8FC143EF3C737CAA4349445D93BBDDFBFE0446ED040EBE3F6CDA66204282FC4AAE299FA27D58360EAB4043C02
3,270,132 UART: [art] SIG.S = 495AC1AA1D89995FDC3B7C860A502AB942330DE214487A34B5BF8C5EE691A78474F484B92A56BD1460730B2E94478FB6
3,293,514 UART: Caliptra RT
3,293,768 UART: [state] CFI Enabled
3,401,676 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,921 UART: [rt]cmd =0xaabbccdd, len=4
3,432,803 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,228 UART: [kat] SHA2-256
882,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,274 UART: [kat] ++
886,426 UART: [kat] sha1
890,522 UART: [kat] SHA2-256
892,460 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,701 UART: [kat] LMS
1,475,897 UART: [kat] --
1,476,494 UART: [cold-reset] ++
1,476,988 UART: [fht] Storing FHT @ 0x50003400
1,479,769 UART: [idev] ++
1,479,937 UART: [idev] CDI.KEYID = 6
1,480,297 UART: [idev] SUBJECT.KEYID = 7
1,480,721 UART: [idev] UDS.KEYID = 0
1,481,066 ready_for_fw is high
1,481,066 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,267 UART: [idev] Erasing UDS.KEYID = 0
1,504,909 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,503 UART: [idev] --
1,514,738 UART: [ldev] ++
1,514,906 UART: [ldev] CDI.KEYID = 6
1,515,269 UART: [ldev] SUBJECT.KEYID = 5
1,515,695 UART: [ldev] AUTHORITY.KEYID = 7
1,516,158 UART: [ldev] FE.KEYID = 1
1,521,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,337 UART: [ldev] --
1,586,814 UART: [fwproc] Waiting for Commands...
1,587,551 UART: [fwproc] Received command 0x46574c44
1,588,342 UART: [fwproc] Received Image of size 114360 bytes
2,886,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,943 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,260 >>> mbox cmd response: success
3,079,260 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,080,428 UART: [afmc] ++
3,080,596 UART: [afmc] CDI.KEYID = 6
3,080,958 UART: [afmc] SUBJECT.KEYID = 7
3,081,383 UART: [afmc] AUTHORITY.KEYID = 5
3,116,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,525 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,215 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,158 UART: [afmc] --
3,160,090 UART: [cold-reset] --
3,160,936 UART: [state] Locking Datavault
3,162,115 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,719 UART: [state] Locking ICCM
3,163,353 UART: [exit] Launching FMC @ 0x40000130
3,168,682 UART:
3,168,698 UART: Running Caliptra FMC ...
3,169,106 UART:
3,169,249 UART: [state] CFI Enabled
3,179,832 UART: [fht] FMC Alias Private Key: 7
3,287,503 UART: [art] Extend RT PCRs Done
3,287,931 UART: [art] Lock RT PCRs Done
3,289,591 UART: [art] Populate DV Done
3,297,732 UART: [fht] FMC Alias Private Key: 7
3,298,818 UART: [art] Derive CDI
3,299,098 UART: [art] Store in in slot 0x4
3,384,517 UART: [art] Derive Key Pair
3,384,877 UART: [art] Store priv key in slot 0x5
3,398,575 UART: [art] Derive Key Pair - Done
3,413,508 UART: [art] Signing Cert with AUTHO
3,413,988 UART: RITY.KEYID = 7
3,428,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,725 UART: [art] PUB.X = 363A9C7CFBF89BFCEAFE3CAA4A2968D4A6BC2E36742B8B24A81E09B9C3CEB90919DB2308449DE8AB49056DB4DF39E05F
3,436,507 UART: [art] PUB.Y = 862A6C13427700DDAEB85057251CE85C7525BB546791B0BDC5B33C5717B451CE5B77811941884454D80A0FBD98D46C59
3,443,425 UART: [art] SIG.R = 795CEF221653EFE40DA28164B1AB7A7DB014533026FB4B35D8EDEC0A7D3EBDCE1CC93272E9E08A970DA775C11B62EA18
3,450,204 UART: [art] SIG.S = 6B6D9F7584722B397C4B9CBE630E81C4EBF4426A594AECC445D2EA71925F7E80021FEAE7A4D9016602EC0F265F4582D3
3,474,056 UART: Caliptra RT
3,474,402 UART: [state] CFI Enabled
3,582,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,304 UART: [rt]cmd =0xaabbccdd, len=4
3,613,472 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,654 ready_for_fw is high
1,362,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,616 >>> mbox cmd response: success
2,926,616 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,988,110 UART:
2,988,126 UART: Running Caliptra FMC ...
2,988,534 UART:
2,988,677 UART: [state] CFI Enabled
2,999,024 UART: [fht] FMC Alias Private Key: 7
3,107,277 UART: [art] Extend RT PCRs Done
3,107,705 UART: [art] Lock RT PCRs Done
3,109,399 UART: [art] Populate DV Done
3,117,824 UART: [fht] FMC Alias Private Key: 7
3,118,844 UART: [art] Derive CDI
3,119,124 UART: [art] Store in in slot 0x4
3,204,491 UART: [art] Derive Key Pair
3,204,851 UART: [art] Store priv key in slot 0x5
3,217,915 UART: [art] Derive Key Pair - Done
3,232,494 UART: [art] Signing Cert with AUTHO
3,232,974 UART: RITY.KEYID = 7
3,248,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,941 UART: [art] PUB.X = 64510FB45276A1EBE8D4F67DFC3A7654A9BC0BD542C99BE88522C79BADF2EC3295BC528554BA66749768E399E6364F26
3,255,711 UART: [art] PUB.Y = 46516EDBD2FF801B88917292F3B95889565BFFEF46D2C027307B2ABC309E865E69F0C173576E0F79B6FDE5A9A095B35A
3,262,664 UART: [art] SIG.R = 27CC5F22C0AF4C869488BF11E912EA8A01CD51353422039597C388E2BCA12642911952C6D7AB9E75346D92CF3809D187
3,269,421 UART: [art] SIG.S = 26DDC808391AD20E1B273A5A21AA54E8F8934D4EE83CBB63CCF0E2204DA6B114229B0776282AFAE23216902996A6B75B
3,292,587 UART: Caliptra RT
3,292,933 UART: [state] CFI Enabled
3,401,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,583 UART: [rt]cmd =0xaabbccdd, len=4
3,432,607 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,980 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,637 UART: [cold-reset] ++
1,172,093 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 ready_for_fw is high
1,176,083 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,201,025 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,323 UART: [ldev] ++
1,210,491 UART: [ldev] CDI.KEYID = 6
1,210,854 UART: [ldev] SUBJECT.KEYID = 5
1,211,280 UART: [ldev] AUTHORITY.KEYID = 7
1,211,743 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,412 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,840 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,036 >>> mbox cmd response: success
2,774,036 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,775,246 UART: [afmc] ++
2,775,414 UART: [afmc] CDI.KEYID = 6
2,775,776 UART: [afmc] SUBJECT.KEYID = 7
2,776,201 UART: [afmc] AUTHORITY.KEYID = 5
2,811,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,485 UART: [afmc] --
2,855,425 UART: [cold-reset] --
2,856,517 UART: [state] Locking Datavault
2,857,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,920 UART: [state] Locking ICCM
2,858,526 UART: [exit] Launching FMC @ 0x40000130
2,863,855 UART:
2,863,871 UART: Running Caliptra FMC ...
2,864,279 UART:
2,864,333 UART: [state] CFI Enabled
2,874,484 UART: [fht] FMC Alias Private Key: 7
2,983,605 UART: [art] Extend RT PCRs Done
2,984,033 UART: [art] Lock RT PCRs Done
2,985,745 UART: [art] Populate DV Done
2,993,792 UART: [fht] FMC Alias Private Key: 7
2,994,938 UART: [art] Derive CDI
2,995,218 UART: [art] Store in in slot 0x4
3,080,549 UART: [art] Derive Key Pair
3,080,909 UART: [art] Store priv key in slot 0x5
3,093,979 UART: [art] Derive Key Pair - Done
3,108,696 UART: [art] Signing Cert with AUTHO
3,109,176 UART: RITY.KEYID = 7
3,124,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,475 UART: [art] PUB.X = 95A33997FCC6C4DA949D70A80045B3DB1D2CEB2B0C95B9B6432E5A856F55F7C0880FD49338C19BEC71342E5A7DAAD125
3,132,229 UART: [art] PUB.Y = DFA1C5C2620F2C042D28B721AC8D3EF24449EEE89BF5F8BED76E0AA21332BC5026E2C61148DD7FEA2459545C3D54EEB9
3,139,188 UART: [art] SIG.R = E82754A5168E6ACC286E585C0B8834BED647D2AABCA84CBBBA45DDC12B439D3462F20C0DF0BAA6F7326CC02C2BBE7F6A
3,145,975 UART: [art] SIG.S = C66A416922866F04FEB6602DE80AED69E93665CF437EB0313CB096684F8648BDF84A2E02BA1208F1D6703E6FEAF49C28
3,169,662 UART: Caliptra RT
3,169,916 UART: [state] CFI Enabled
3,277,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,082 UART: [rt]cmd =0xaabbccdd, len=4
3,309,156 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,427 ready_for_fw is high
1,060,427 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,173 >>> mbox cmd response: success
2,626,173 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,688,319 UART:
2,688,335 UART: Running Caliptra FMC ...
2,688,743 UART:
2,688,797 UART: [state] CFI Enabled
2,699,480 UART: [fht] FMC Alias Private Key: 7
2,807,567 UART: [art] Extend RT PCRs Done
2,807,995 UART: [art] Lock RT PCRs Done
2,809,529 UART: [art] Populate DV Done
2,817,594 UART: [fht] FMC Alias Private Key: 7
2,818,736 UART: [art] Derive CDI
2,819,016 UART: [art] Store in in slot 0x4
2,904,435 UART: [art] Derive Key Pair
2,904,795 UART: [art] Store priv key in slot 0x5
2,917,425 UART: [art] Derive Key Pair - Done
2,932,351 UART: [art] Signing Cert with AUTHO
2,932,831 UART: RITY.KEYID = 7
2,948,259 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,024 UART: [art] PUB.X = 8DBF124CBABB0A4B190E8260D73A0D311921D95AF94AEA7864D2B938BF3724EAAE3C3C0DD55E84D77CC8C40A5C9D4A0C
2,955,798 UART: [art] PUB.Y = C3210181D903188BD293936DDB6F5481B89725A8A6FAB1CC778DC180D315D3C4485A14AB2A9F3E40BDE4059B3C534ABA
2,962,747 UART: [art] SIG.R = E221E12BF8C0CFDA8A716E86750E5716809C402CC8D2D5A9E843CE407CE907970DD3E0FEABDE688D6B3C7DCB12ED4B46
2,969,528 UART: [art] SIG.S = 7A7D2E61352FF57E60D2A628A6DBB1DDBDF7AEF1D98C2788EAD3EF358AC3E3D01AD3568CFB25F96B0E2A1B92B6FD94A0
2,993,556 UART: Caliptra RT
2,993,810 UART: [state] CFI Enabled
3,101,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,247 UART: [rt]cmd =0xaabbccdd, len=4
3,132,073 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,594 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,061 UART: [idev] Erasing UDS.KEYID = 0
1,200,932 UART: [idev] Sha1 KeyId Algorithm
1,209,252 UART: [idev] --
1,210,276 UART: [ldev] ++
1,210,444 UART: [ldev] CDI.KEYID = 6
1,210,807 UART: [ldev] SUBJECT.KEYID = 5
1,211,233 UART: [ldev] AUTHORITY.KEYID = 7
1,211,696 UART: [ldev] FE.KEYID = 1
1,216,580 UART: [ldev] Erasing FE.KEYID = 1
1,242,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,988 UART: [ldev] --
1,282,419 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,831 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,375 >>> mbox cmd response: success
2,774,375 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,775,599 UART: [afmc] ++
2,775,767 UART: [afmc] CDI.KEYID = 6
2,776,129 UART: [afmc] SUBJECT.KEYID = 7
2,776,554 UART: [afmc] AUTHORITY.KEYID = 5
2,812,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,354 UART: [afmc] --
2,855,428 UART: [cold-reset] --
2,856,400 UART: [state] Locking Datavault
2,857,499 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,103 UART: [state] Locking ICCM
2,858,527 UART: [exit] Launching FMC @ 0x40000130
2,863,856 UART:
2,863,872 UART: Running Caliptra FMC ...
2,864,280 UART:
2,864,423 UART: [state] CFI Enabled
2,875,312 UART: [fht] FMC Alias Private Key: 7
2,983,161 UART: [art] Extend RT PCRs Done
2,983,589 UART: [art] Lock RT PCRs Done
2,985,343 UART: [art] Populate DV Done
2,993,548 UART: [fht] FMC Alias Private Key: 7
2,994,566 UART: [art] Derive CDI
2,994,846 UART: [art] Store in in slot 0x4
3,080,549 UART: [art] Derive Key Pair
3,080,909 UART: [art] Store priv key in slot 0x5
3,093,895 UART: [art] Derive Key Pair - Done
3,108,753 UART: [art] Signing Cert with AUTHO
3,109,233 UART: RITY.KEYID = 7
3,124,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,358 UART: [art] PUB.X = 4B1D237E028204349AA0BEEB57197F615BDD64082FD9BED6F5AA0CBE7618CB82255761C0792D0753CDFA3AF92422BF6F
3,132,125 UART: [art] PUB.Y = 34F6B1D57094DD76A1138A136883B9FC62B37839899506CE4C3B18DBC56F1184BFDE2B40CC329E9F1176B115394AA4B1
3,139,074 UART: [art] SIG.R = 81F241A7F9F03279762958A7B9595BC3AA79946349CDCDDEA4436E9A6C041EE1E023D07E69567E259733C7EA455C772B
3,145,841 UART: [art] SIG.S = C130E1A41050E36A8864CD59D4D9AC6684330D16FEE91B9C42B0E950CE9C47BF331FDFBB321148BAEE2490A0B22448B0
3,169,883 UART: Caliptra RT
3,170,229 UART: [state] CFI Enabled
3,278,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,711 UART: [rt]cmd =0xaabbccdd, len=4
3,309,615 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 ready_for_fw is high
1,060,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,696 >>> mbox cmd response: success
2,626,696 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,689,094 UART:
2,689,110 UART: Running Caliptra FMC ...
2,689,518 UART:
2,689,661 UART: [state] CFI Enabled
2,700,306 UART: [fht] FMC Alias Private Key: 7
2,808,145 UART: [art] Extend RT PCRs Done
2,808,573 UART: [art] Lock RT PCRs Done
2,809,995 UART: [art] Populate DV Done
2,818,032 UART: [fht] FMC Alias Private Key: 7
2,819,048 UART: [art] Derive CDI
2,819,328 UART: [art] Store in in slot 0x4
2,905,055 UART: [art] Derive Key Pair
2,905,415 UART: [art] Store priv key in slot 0x5
2,918,917 UART: [art] Derive Key Pair - Done
2,933,581 UART: [art] Signing Cert with AUTHO
2,934,061 UART: RITY.KEYID = 7
2,949,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,254 UART: [art] PUB.X = 928E54AE44FB8B014C0FA8B2AE810DEB122CE73CE27CF1C5B6C61B04B5DDF513E9C307441DB00BBA603F2D4B581657D6
2,957,024 UART: [art] PUB.Y = 9B8E683280546D1E5070A84B1D02F02681939F413F57567D91B358F30FE8A8F77ED63A9EAD751E5221A79FEAFFA5718F
2,963,970 UART: [art] SIG.R = 4723573E957285B10C60CD580656C11AF6F09C11C10A1562417570E293F9D7DF339DB2F2AB0E802FB3CB42A3904A6C3E
2,970,728 UART: [art] SIG.S = D653755750AB80804A7A78DB006DCBE379F406DD29274C372F72F14FD6B2494CA1919557BE3BE18D207DDFB2C0DB86ED
2,994,554 UART: Caliptra RT
2,994,900 UART: [state] CFI Enabled
3,103,026 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,215 UART: [rt]cmd =0xaabbccdd, len=4
3,134,343 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,169,941 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,173,973 ready_for_fw is high
1,173,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,779 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,832 UART: [ldev] ++
1,209,000 UART: [ldev] CDI.KEYID = 6
1,209,364 UART: [ldev] SUBJECT.KEYID = 5
1,209,791 UART: [ldev] AUTHORITY.KEYID = 7
1,210,254 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,241,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,316 >>> mbox cmd response: success
2,771,316 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,772,415 UART: [afmc] ++
2,772,583 UART: [afmc] CDI.KEYID = 6
2,772,946 UART: [afmc] SUBJECT.KEYID = 7
2,773,372 UART: [afmc] AUTHORITY.KEYID = 5
2,808,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,578 UART: [afmc] --
2,851,680 UART: [cold-reset] --
2,852,514 UART: [state] Locking Datavault
2,853,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,413 UART: [state] Locking ICCM
2,854,945 UART: [exit] Launching FMC @ 0x40000130
2,860,274 UART:
2,860,290 UART: Running Caliptra FMC ...
2,860,698 UART:
2,860,752 UART: [state] CFI Enabled
2,870,901 UART: [fht] FMC Alias Private Key: 7
2,978,272 UART: [art] Extend RT PCRs Done
2,978,700 UART: [art] Lock RT PCRs Done
2,980,230 UART: [art] Populate DV Done
2,988,543 UART: [fht] FMC Alias Private Key: 7
2,989,583 UART: [art] Derive CDI
2,989,863 UART: [art] Store in in slot 0x4
3,075,600 UART: [art] Derive Key Pair
3,075,960 UART: [art] Store priv key in slot 0x5
3,089,460 UART: [art] Derive Key Pair - Done
3,103,853 UART: [art] Signing Cert with AUTHO
3,104,333 UART: RITY.KEYID = 7
3,119,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,990 UART: [art] PUB.X = F88BBDAFE7A0189434D650B89C8AA198E3847B382FD972CD494EA2DF8A1CEBCD1C3F4CD814792C656AD3633BD820B74E
3,126,778 UART: [art] PUB.Y = E1256CF019894471356BA8F374D5E9A8CA835898145DC625494259BC1250B4B0D5A83D9595CF47B94F14668257B98EF2
3,133,720 UART: [art] SIG.R = CE535C19368DE79DD4A8ED5E36A80626348B9E552E552BE6B2A965555FE529DB6FB0679C1BA43720184D1B64CCBC2A00
3,140,473 UART: [art] SIG.S = 8696F2D2644A7831AD8E30CF0ED2E68C443F5F4E1F9B4986D6076183418651A160E7EC63FFEA617C3D725CBC4A0E615D
3,163,927 UART: Caliptra RT
3,164,181 UART: [state] CFI Enabled
3,272,582 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,839 UART: [rt]cmd =0xaabbccdd, len=4
3,303,637 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,022 ready_for_fw is high
1,056,022 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,482 >>> mbox cmd response: success
2,622,482 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,684,184 UART:
2,684,200 UART: Running Caliptra FMC ...
2,684,608 UART:
2,684,662 UART: [state] CFI Enabled
2,695,297 UART: [fht] FMC Alias Private Key: 7
2,804,034 UART: [art] Extend RT PCRs Done
2,804,462 UART: [art] Lock RT PCRs Done
2,805,990 UART: [art] Populate DV Done
2,814,355 UART: [fht] FMC Alias Private Key: 7
2,815,535 UART: [art] Derive CDI
2,815,815 UART: [art] Store in in slot 0x4
2,901,468 UART: [art] Derive Key Pair
2,901,828 UART: [art] Store priv key in slot 0x5
2,915,124 UART: [art] Derive Key Pair - Done
2,929,792 UART: [art] Signing Cert with AUTHO
2,930,272 UART: RITY.KEYID = 7
2,945,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,989 UART: [art] PUB.X = F4DFB51F8FFC8CB89B2102286C2319459AAA19D1EF839522674CFC3A066B0A3E6FB67878F21ADCC11469DCCC59399F3F
2,952,764 UART: [art] PUB.Y = E89567B9D4683479A46AA5DACCF748019106A5C05C862C88EBF8DE3124DB0A674AE131820F4E840166AB6BABC61C6D60
2,959,707 UART: [art] SIG.R = E9ACF56AB9B5C0004A1C5A659E1EA056054B73D0C78766D92E9EC35D500B54E447841611D2E794D03C1FEAF3037CC272
2,966,452 UART: [art] SIG.S = DC31CA6B588C73C4A9D8A6AF93F924952E5D85FC2B7A50FDEB01EC86D22753E15142C9C27F233745F504F29D32327B67
2,990,309 UART: Caliptra RT
2,990,563 UART: [state] CFI Enabled
3,097,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,081 UART: [rt]cmd =0xaabbccdd, len=4
3,129,007 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,186 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,436 UART: [kat] SHA2-256
901,376 UART: [kat] SHA2-384
904,159 UART: [kat] SHA2-512-ACC
906,060 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 ready_for_fw is high
1,174,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,557 UART: [fwproc] Wait for Commands...
1,282,264 UART: [fwproc] Recv command 0x46574c44
1,282,997 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,283 >>> mbox cmd response: success
2,772,283 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,773,486 UART: [afmc] ++
2,773,654 UART: [afmc] CDI.KEYID = 6
2,774,017 UART: [afmc] SUBJECT.KEYID = 7
2,774,443 UART: [afmc] AUTHORITY.KEYID = 5
2,809,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,919 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,547 UART: [afmc] --
2,853,497 UART: [cold-reset] --
2,854,285 UART: [state] Locking Datavault
2,855,646 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,250 UART: [state] Locking ICCM
2,856,900 UART: [exit] Launching FMC @ 0x40000130
2,862,229 UART:
2,862,245 UART: Running Caliptra FMC ...
2,862,653 UART:
2,862,796 UART: [state] CFI Enabled
2,873,635 UART: [fht] FMC Alias Private Key: 7
2,982,050 UART: [art] Extend RT PCRs Done
2,982,478 UART: [art] Lock RT PCRs Done
2,984,156 UART: [art] Populate DV Done
2,992,461 UART: [fht] FMC Alias Private Key: 7
2,993,479 UART: [art] Derive CDI
2,993,759 UART: [art] Store in in slot 0x4
3,079,158 UART: [art] Derive Key Pair
3,079,518 UART: [art] Store priv key in slot 0x5
3,092,900 UART: [art] Derive Key Pair - Done
3,107,978 UART: [art] Signing Cert with AUTHO
3,108,458 UART: RITY.KEYID = 7
3,123,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,449 UART: [art] PUB.X = 3301D90480021D1131249DB40688C3DF6FCFDE3C0BF9D3F94313C07A4E625E0EFE8A8287A987E43FC80CBE148F692872
3,131,202 UART: [art] PUB.Y = 7A638894C7C95440872794ABDE13CB3789EE19EF50274F39E6365D470991801BBBDAD8B4B1284C6C60B1FE07AAB18A02
3,138,147 UART: [art] SIG.R = 5D2C2B12647D6F7B55292655F135F2928D9D1EEA16D05F68AE21DF8C7064396CE8F3E8A91D9D8977483DBAA978202B5A
3,144,921 UART: [art] SIG.S = 2055A6E3725F8E24CD7DA18B1C3A84D60CA42797E26F623EEE8402EABBFF42125628577DCE778865D23D27D82D0E8DC1
3,168,941 UART: Caliptra RT
3,169,287 UART: [state] CFI Enabled
3,278,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,236 UART: [rt]cmd =0xaabbccdd, len=4
3,309,092 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,169 ready_for_fw is high
1,055,169 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,779 >>> mbox cmd response: success
2,620,779 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,682,371 UART:
2,682,387 UART: Running Caliptra FMC ...
2,682,795 UART:
2,682,938 UART: [state] CFI Enabled
2,693,429 UART: [fht] FMC Alias Private Key: 7
2,801,386 UART: [art] Extend RT PCRs Done
2,801,814 UART: [art] Lock RT PCRs Done
2,803,014 UART: [art] Populate DV Done
2,811,093 UART: [fht] FMC Alias Private Key: 7
2,812,083 UART: [art] Derive CDI
2,812,363 UART: [art] Store in in slot 0x4
2,898,116 UART: [art] Derive Key Pair
2,898,476 UART: [art] Store priv key in slot 0x5
2,912,348 UART: [art] Derive Key Pair - Done
2,927,329 UART: [art] Signing Cert with AUTHO
2,927,809 UART: RITY.KEYID = 7
2,943,039 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,804 UART: [art] PUB.X = F0DC3EFAD6D6D022BEA85DD19ABE9048B0489B43E8641A6B85D46D94B22651E274ACD7C5CDC47102089AB08EECD0754B
2,950,586 UART: [art] PUB.Y = 6202D0B25FD6E5E2E896CF3832A7F1394C7EE0A32F95C554D26C2C1F5D8703CB167F3A8898822D0F36D1CA357D33AC49
2,957,533 UART: [art] SIG.R = EE4EDE8C6E99C1B541793DBB563EC44357BAE5B0901778F5A95B6BBA6C5DBD35E09727F1DD1C68069D16E66AFCAD06A3
2,964,317 UART: [art] SIG.S = 77E12061AF78063DF647557180FEE3CD0AA0354193281F8D92C2DB86CB93B666FC493613C1DB8F1D5B822793EE5B35E2
2,988,352 UART: Caliptra RT
2,988,698 UART: [state] CFI Enabled
3,095,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,189 UART: [rt]cmd =0xaabbccdd, len=4
3,127,397 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,579 UART:
192,943 UART: Running Caliptra ROM ...
194,115 UART:
194,263 UART: [state] CFI Enabled
263,185 UART: [state] LifecycleState = Unprovisioned
265,174 UART: [state] DebugLocked = No
266,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,348 UART: [kat] SHA2-256
442,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,564 UART: [kat] ++
453,035 UART: [kat] sha1
463,967 UART: [kat] SHA2-256
466,640 UART: [kat] SHA2-384
472,768 UART: [kat] SHA2-512-ACC
475,125 UART: [kat] ECC-384
2,766,707 UART: [kat] HMAC-384Kdf
2,791,627 UART: [kat] LMS
3,981,961 UART: [kat] --
3,985,673 UART: [cold-reset] ++
3,986,675 UART: [fht] Storing FHT @ 0x50003400
3,997,006 UART: [idev] ++
3,997,635 UART: [idev] CDI.KEYID = 6
3,998,536 UART: [idev] SUBJECT.KEYID = 7
3,999,715 UART: [idev] UDS.KEYID = 0
4,000,766 ready_for_fw is high
4,000,965 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,144,389 UART: [idev] Erasing UDS.KEYID = 0
7,335,055 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,612 UART: [idev] --
7,361,218 UART: [ldev] ++
7,361,794 UART: [ldev] CDI.KEYID = 6
7,362,751 UART: [ldev] SUBJECT.KEYID = 5
7,363,975 UART: [ldev] AUTHORITY.KEYID = 7
7,365,205 UART: [ldev] FE.KEYID = 1
7,396,748 UART: [ldev] Erasing FE.KEYID = 1
10,726,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,050,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,312 UART: [ldev] --
13,088,219 UART: [fwproc] Waiting for Commands...
13,091,118 UART: [fwproc] Received command 0x46574c44
13,093,855 UART: [fwproc] Received Image of size 114036 bytes
17,146,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,606,554 >>> mbox cmd response: success
17,611,067 UART: [afmc] ++
17,611,670 UART: [afmc] CDI.KEYID = 6
17,612,735 UART: [afmc] SUBJECT.KEYID = 7
17,613,835 UART: [afmc] AUTHORITY.KEYID = 5
20,982,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,608 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,022 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,312,836 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,301 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,347,972 UART: [afmc] --
23,352,600 UART: [cold-reset] --
23,357,101 UART: [state] Locking Datavault
23,362,886 UART: [state] Locking PCR0, PCR1 and PCR31
23,364,639 UART: [state] Locking ICCM
23,366,672 UART: [exit] Launching FMC @ 0x40000130
23,375,081 UART:
23,375,315 UART: Running Caliptra FMC ...
23,376,408 UART:
23,376,562 UART: [state] CFI Enabled
23,442,371 UART: [fht] FMC Alias Private Key: 7
25,780,602 UART: [art] Extend RT PCRs Done
25,781,823 UART: [art] Lock RT PCRs Done
25,783,255 UART: [art] Populate DV Done
25,788,656 UART: [fht] FMC Alias Private Key: 7
25,790,192 UART: [art] Derive CDI
25,790,923 UART: [art] Store in in slot 0x4
25,850,931 UART: [art] Derive Key Pair
25,851,970 UART: [art] Store priv key in slot 0x5
29,144,670 UART: [art] Derive Key Pair - Done
29,157,617 UART: [art] Signing Cert with AUTHO
29,158,913 UART: RITY.KEYID = 7
31,446,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,390 UART: [art] PUB.X = C54C5631BE3B0BE106DF7D515BCF8E9F741614742641F6497404FC9D9532B248854D7DDE4E5C7C1D2BB8033358EFE915
31,455,618 UART: [art] PUB.Y = 81309154CED005275817AF99A52D35DFF230688973F3D0FCFD5F141EACFA5818C0A8CF53D3A9716599D012A292EDA016
31,462,849 UART: [art] SIG.R = 7C34ABF4518721F11D20E20D8333197C3FF01612EA73BC03A8134AD9ED2CD8F2732AEDD9E5526D3BCF72EFF45AF42603
31,470,261 UART: [art] SIG.S = 246B6947537ACD8FF870D5F07B27CDA8E158E7B93D8D188A7CEA2B2CDDA85CB00D22114E44FCF46556F9A21DB1562F33
32,775,585 UART: Caliptra RT
32,776,293 UART: [state] CFI Enabled
32,937,734 UART: [rt] RT listening for mailbox commands...
32,939,617 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,969,962 UART: [rt]cmd =0x434b4558, len=80
32,971,379 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,808,648 ready_for_fw is high
3,809,069 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,902,299 >>> mbox cmd response: success
23,588,557 UART:
23,588,956 UART: Running Caliptra FMC ...
23,590,082 UART:
23,590,241 UART: [state] CFI Enabled
23,659,098 UART: [fht] FMC Alias Private Key: 7
25,997,309 UART: [art] Extend RT PCRs Done
25,998,541 UART: [art] Lock RT PCRs Done
26,000,055 UART: [art] Populate DV Done
26,005,577 UART: [fht] FMC Alias Private Key: 7
26,007,227 UART: [art] Derive CDI
26,008,041 UART: [art] Store in in slot 0x4
26,067,913 UART: [art] Derive Key Pair
26,068,964 UART: [art] Store priv key in slot 0x5
29,362,093 UART: [art] Derive Key Pair - Done
29,375,201 UART: [art] Signing Cert with AUTHO
29,376,549 UART: RITY.KEYID = 7
31,664,187 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,693 UART: [art] PUB.X = 701495C3D50AA94F10B83190EE42CAA219C2ABDBF2BDEA058BAE8ED5139A993C6601B940662A6379AEB2F9B77BE4939A
31,672,969 UART: [art] PUB.Y = 3293094A34B7A9FAB6335445497985E00CE5056223CDB383EF24D981DB23A46E514A0F4739776886A449ACF0825253C0
31,680,166 UART: [art] SIG.R = DC10AAE146D9B1269C1FD33ADEFA123F2F8C06BBD32F0F7A892BD2A9B308E181D9EDB086FD3E708B1B28BAE12892A14A
31,687,587 UART: [art] SIG.S = 09CDE24D31FD69B3683E19F2D4781607898C900DB57DAA133B0EB4C8CA999B15605F3FDD8E977FF3FBB730FC2143041F
32,993,189 UART: Caliptra RT
32,993,884 UART: [state] CFI Enabled
33,155,475 UART: [rt] RT listening for mailbox commands...
33,157,362 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,187,769 UART: [rt]cmd =0x434b4558, len=80
33,189,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,537 UART:
192,904 UART: Running Caliptra ROM ...
194,109 UART:
603,564 UART: [state] CFI Enabled
620,276 UART: [state] LifecycleState = Unprovisioned
622,226 UART: [state] DebugLocked = No
623,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,979 UART: [kat] SHA2-256
797,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,271 UART: [kat] ++
808,750 UART: [kat] sha1
819,005 UART: [kat] SHA2-256
821,723 UART: [kat] SHA2-384
828,512 UART: [kat] SHA2-512-ACC
830,881 UART: [kat] ECC-384
3,114,883 UART: [kat] HMAC-384Kdf
3,126,113 UART: [kat] LMS
4,316,257 UART: [kat] --
4,321,414 UART: [cold-reset] ++
4,323,571 UART: [fht] Storing FHT @ 0x50003400
4,334,911 UART: [idev] ++
4,335,477 UART: [idev] CDI.KEYID = 6
4,336,505 UART: [idev] SUBJECT.KEYID = 7
4,337,679 UART: [idev] UDS.KEYID = 0
4,338,712 ready_for_fw is high
4,338,918 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,209 UART: [idev] Erasing UDS.KEYID = 0
7,623,574 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,015 UART: [idev] --
7,650,184 UART: [ldev] ++
7,650,750 UART: [ldev] CDI.KEYID = 6
7,651,692 UART: [ldev] SUBJECT.KEYID = 5
7,652,901 UART: [ldev] AUTHORITY.KEYID = 7
7,654,184 UART: [ldev] FE.KEYID = 1
7,664,751 UART: [ldev] Erasing FE.KEYID = 1
10,951,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,695 UART: [ldev] --
13,312,967 UART: [fwproc] Waiting for Commands...
13,315,221 UART: [fwproc] Received command 0x46574c44
13,317,419 UART: [fwproc] Received Image of size 114036 bytes
17,365,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,994 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,387 >>> mbox cmd response: success
17,838,361 UART: [afmc] ++
17,838,963 UART: [afmc] CDI.KEYID = 6
17,839,887 UART: [afmc] SUBJECT.KEYID = 7
17,841,105 UART: [afmc] AUTHORITY.KEYID = 5
21,150,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,382 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,796 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,575 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,053 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,197 UART: [afmc] --
23,516,489 UART: [cold-reset] --
23,520,405 UART: [state] Locking Datavault
23,527,324 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,020 UART: [state] Locking ICCM
23,531,707 UART: [exit] Launching FMC @ 0x40000130
23,540,114 UART:
23,540,395 UART: Running Caliptra FMC ...
23,541,449 UART:
23,541,606 UART: [state] CFI Enabled
23,549,758 UART: [fht] FMC Alias Private Key: 7
25,880,306 UART: [art] Extend RT PCRs Done
25,881,529 UART: [art] Lock RT PCRs Done
25,883,206 UART: [art] Populate DV Done
25,888,672 UART: [fht] FMC Alias Private Key: 7
25,890,265 UART: [art] Derive CDI
25,891,194 UART: [art] Store in in slot 0x4
25,933,895 UART: [art] Derive Key Pair
25,934,905 UART: [art] Store priv key in slot 0x5
29,176,788 UART: [art] Derive Key Pair - Done
29,189,785 UART: [art] Signing Cert with AUTHO
29,191,088 UART: RITY.KEYID = 7
31,469,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,497 UART: [art] PUB.X = 394C06CC6D36E5D8BC586A11E132DBBAFF6BB5B1193F6E880F4E220C55684CF0C754D82916D2B19FD59678F78D27C175
31,478,765 UART: [art] PUB.Y = 4744AE8357C904D72B0DABF0FCC05A0F29E08B2A3CF9613A85C8297BFBA53E221232E5A72A1F0524CF4BB0C8E4B0E905
31,486,006 UART: [art] SIG.R = 4E82AC62BC45580ADB6E16500A9D14FF9C15123C910E52F190A585C6DB0A7B2BDB545FCA49C96DD3F2ED08C8E69DFC3B
31,493,407 UART: [art] SIG.S = 2EC3375CE32398EB300881B79CD0FDD65B1FC7C2468FE526C704B5AD893EE79B3FEDB7DCF8EA7667CA676C4661A54CC1
32,799,040 UART: Caliptra RT
32,799,764 UART: [state] CFI Enabled
32,917,337 UART: [rt] RT listening for mailbox commands...
32,919,237 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,949,541 UART: [rt]cmd =0x434b4558, len=80
32,950,918 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,135,358 ready_for_fw is high
4,135,756 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,570 >>> mbox cmd response: success
23,713,421 UART:
23,713,803 UART: Running Caliptra FMC ...
23,714,996 UART:
23,715,163 UART: [state] CFI Enabled
23,723,492 UART: [fht] FMC Alias Private Key: 7
26,054,415 UART: [art] Extend RT PCRs Done
26,055,645 UART: [art] Lock RT PCRs Done
26,057,081 UART: [art] Populate DV Done
26,062,942 UART: [fht] FMC Alias Private Key: 7
26,064,436 UART: [art] Derive CDI
26,065,201 UART: [art] Store in in slot 0x4
26,107,422 UART: [art] Derive Key Pair
26,108,423 UART: [art] Store priv key in slot 0x5
29,350,850 UART: [art] Derive Key Pair - Done
29,363,891 UART: [art] Signing Cert with AUTHO
29,365,204 UART: RITY.KEYID = 7
31,644,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,193 UART: [art] PUB.X = B6AC408091B7C47F036CD9F56E70911CAEA8BCD098B92C018E8B2C4370AD404B662D787A1E895DE205DDBB86EA2D638D
31,653,468 UART: [art] PUB.Y = 4476717F43C85EDE7F627A2F147272086CB5E545622BC54A6041FA4437779205A6B494EC3382644DF70617B5B8B0B8A8
31,660,669 UART: [art] SIG.R = A78BDDF725E6F9D7D064774006F0B99D1EB7DB425CF78339CCD92CCAE586B742AF4F59E425570DAD04C1CCA85C977619
31,668,080 UART: [art] SIG.S = C7409A54175311FE480961AED68ABF3EEBD7633C3E6B56A84E879E8E60033F54FD2D3B6543BC4CF2B26825FB027D211F
32,973,386 UART: Caliptra RT
32,974,098 UART: [state] CFI Enabled
33,092,665 UART: [rt] RT listening for mailbox commands...
33,094,578 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,124,880 UART: [rt]cmd =0x434b4558, len=80
33,126,265 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
192,517 UART:
192,876 UART: Running Caliptra ROM ...
194,083 UART:
194,242 UART: [state] CFI Enabled
265,939 UART: [state] LifecycleState = Unprovisioned
267,802 UART: [state] DebugLocked = No
269,047 UART: [state] WD Timer not started. Device not locked for debugging
273,249 UART: [kat] SHA2-256
452,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,959 UART: [kat] ++
464,490 UART: [kat] sha1
475,796 UART: [kat] SHA2-256
478,823 UART: [kat] SHA2-384
483,751 UART: [kat] SHA2-512-ACC
486,688 UART: [kat] ECC-384
2,948,612 UART: [kat] HMAC-384Kdf
2,971,093 UART: [kat] LMS
3,500,578 UART: [kat] --
3,505,372 UART: [cold-reset] ++
3,506,245 UART: [fht] FHT @ 0x50003400
3,517,581 UART: [idev] ++
3,518,144 UART: [idev] CDI.KEYID = 6
3,519,097 UART: [idev] SUBJECT.KEYID = 7
3,520,272 UART: [idev] UDS.KEYID = 0
3,521,284 ready_for_fw is high
3,521,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,342 UART: [idev] Erasing UDS.KEYID = 0
6,024,515 UART: [idev] Sha1 KeyId Algorithm
6,047,434 UART: [idev] --
6,051,131 UART: [ldev] ++
6,051,711 UART: [ldev] CDI.KEYID = 6
6,052,627 UART: [ldev] SUBJECT.KEYID = 5
6,053,790 UART: [ldev] AUTHORITY.KEYID = 7
6,055,020 UART: [ldev] FE.KEYID = 1
6,097,749 UART: [ldev] Erasing FE.KEYID = 1
8,601,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,512 UART: [ldev] --
10,410,908 UART: [fwproc] Wait for Commands...
10,413,872 UART: [fwproc] Recv command 0x46574c44
10,415,960 UART: [fwproc] Recv'd Img size: 114360 bytes
13,824,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,289,499 >>> mbox cmd response: success
14,293,989 UART: [afmc] ++
14,294,585 UART: [afmc] CDI.KEYID = 6
14,295,493 UART: [afmc] SUBJECT.KEYID = 7
14,296,649 UART: [afmc] AUTHORITY.KEYID = 5
16,821,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,125 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,842 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,562 UART: [afmc] --
18,625,131 UART: [cold-reset] --
18,629,173 UART: [state] Locking Datavault
18,636,374 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,076 UART: [state] Locking ICCM
18,639,471 UART: [exit] Launching FMC @ 0x40000130
18,647,870 UART:
18,648,105 UART: Running Caliptra FMC ...
18,649,207 UART:
18,649,364 UART: [state] CFI Enabled
18,705,450 UART: [fht] FMC Alias Private Key: 7
20,469,730 UART: [art] Extend RT PCRs Done
20,470,955 UART: [art] Lock RT PCRs Done
20,472,799 UART: [art] Populate DV Done
20,477,997 UART: [fht] FMC Alias Private Key: 7
20,479,545 UART: [art] Derive CDI
20,480,303 UART: [art] Store in in slot 0x4
20,538,353 UART: [art] Derive Key Pair
20,539,405 UART: [art] Store priv key in slot 0x5
23,002,918 UART: [art] Derive Key Pair - Done
23,015,756 UART: [art] Signing Cert with AUTHO
23,017,065 UART: RITY.KEYID = 7
24,727,623 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,126 UART: [art] PUB.X = 2F8184098C4AE5A5459521F3D9293ECA7634458344486677F9E8D4D27B4F3ACDF4AC0A5867D6551F98F07D53AF83782B
24,736,393 UART: [art] PUB.Y = AD1C0D743CD8067CE5CBEC78EF326E4923FFD952533606D4E677D50B93E4E12553CDD1B45A2ECE0704673F68EA62FB42
24,743,676 UART: [art] SIG.R = F8462971E85F3754B0D3CCE37AF6410A1845C639B1F6478D522C759FD17A90914F48CBE28BE9875293AB47ED80D9228C
24,751,036 UART: [art] SIG.S = A2CF0222728B78F7EB2A490AC7B7A607908459B7456F81F56C995D30BBF098FE1197120EAC307451823A0B435BB19E9B
25,729,802 UART: Caliptra RT
25,730,499 UART: [state] CFI Enabled
25,895,987 UART: [rt] RT listening for mailbox commands...
25,897,890 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,928,352 UART: [rt]cmd =0x434b4558, len=80
25,929,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,387 UART:
192,760 UART: Running Caliptra ROM ...
193,954 UART:
194,111 UART: [state] CFI Enabled
265,107 UART: [state] LifecycleState = Unprovisioned
267,451 UART: [state] DebugLocked = No
269,077 UART: [state] WD Timer not started. Device not locked for debugging
273,538 UART: [kat] SHA2-256
463,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,190 UART: [kat] ++
474,680 UART: [kat] sha1
487,049 UART: [kat] SHA2-256
490,062 UART: [kat] SHA2-384
496,764 UART: [kat] SHA2-512-ACC
499,356 UART: [kat] ECC-384
2,946,956 UART: [kat] HMAC-384Kdf
2,972,424 UART: [kat] LMS
3,504,239 UART: [kat] --
3,507,382 UART: [cold-reset] ++
3,508,956 UART: [fht] FHT @ 0x50003400
3,520,366 UART: [idev] ++
3,521,009 UART: [idev] CDI.KEYID = 6
3,522,071 UART: [idev] SUBJECT.KEYID = 7
3,523,188 UART: [idev] UDS.KEYID = 0
3,524,134 ready_for_fw is high
3,524,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,273 UART: [idev] Erasing UDS.KEYID = 0
6,027,569 UART: [idev] Sha1 KeyId Algorithm
6,050,210 UART: [idev] --
6,054,403 UART: [ldev] ++
6,055,095 UART: [ldev] CDI.KEYID = 6
6,056,013 UART: [ldev] SUBJECT.KEYID = 5
6,057,175 UART: [ldev] AUTHORITY.KEYID = 7
6,058,413 UART: [ldev] FE.KEYID = 1
6,101,577 UART: [ldev] Erasing FE.KEYID = 1
8,611,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,736 UART: [ldev] --
10,413,058 UART: [fwproc] Wait for Commands...
10,415,273 UART: [fwproc] Recv command 0x46574c44
10,417,587 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,610 >>> mbox cmd response: success
14,605,421 UART: [afmc] ++
14,606,150 UART: [afmc] CDI.KEYID = 6
14,607,349 UART: [afmc] SUBJECT.KEYID = 7
14,608,787 UART: [afmc] AUTHORITY.KEYID = 5
17,151,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,254 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,239 UART: [afmc] --
18,949,572 UART: [cold-reset] --
18,952,796 UART: [state] Locking Datavault
18,958,382 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,591 UART: [state] Locking ICCM
18,963,612 UART: [exit] Launching FMC @ 0x40000130
18,972,240 UART:
18,972,484 UART: Running Caliptra FMC ...
18,973,535 UART:
18,973,686 UART: [state] CFI Enabled
19,032,063 UART: [fht] FMC Alias Private Key: 7
20,796,786 UART: [art] Extend RT PCRs Done
20,798,015 UART: [art] Lock RT PCRs Done
20,800,100 UART: [art] Populate DV Done
20,805,352 UART: [fht] FMC Alias Private Key: 7
20,806,893 UART: [art] Derive CDI
20,807,716 UART: [art] Store in in slot 0x4
20,865,026 UART: [art] Derive Key Pair
20,866,067 UART: [art] Store priv key in slot 0x5
23,329,474 UART: [art] Derive Key Pair - Done
23,342,375 UART: [art] Signing Cert with AUTHO
23,343,677 UART: RITY.KEYID = 7
25,055,455 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,960 UART: [art] PUB.X = 5BD25F9B9098512C0137B5AF48BC2DDA4C46732FFE76ADD724417A65D945EBC7328A6A071EBDF9739D5C0B3B14005F7E
25,064,239 UART: [art] PUB.Y = DAE59C516F0BDC83D2BD2C0BE05E840704562305D3B877B9577B02DDC5E43000A09D9D4EAF1146A2F6B47ABC4B3A766E
25,071,511 UART: [art] SIG.R = 439B8002496946FF0F25E7B6C33BD7DB0A9386E2F855198FC0925255A8C60D6FB425E4A86ABDFE0DEE2AB2EBCE52E573
25,078,887 UART: [art] SIG.S = 5C3E541EF757F9084B108B620804893084D162ADEB1410F3D6B82C47B0706AE9EB522183F995B3ACDB9950D03249E020
26,057,960 UART: Caliptra RT
26,058,693 UART: [state] CFI Enabled
26,224,641 UART: [rt] RT listening for mailbox commands...
26,226,536 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,256,779 UART: [rt]cmd =0x434b4558, len=80
26,258,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,416,175 ready_for_fw is high
3,416,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,711,962 >>> mbox cmd response: success
19,002,692 UART:
19,003,075 UART: Running Caliptra FMC ...
19,004,295 UART:
19,004,471 UART: [state] CFI Enabled
19,071,278 UART: [fht] FMC Alias Private Key: 7
20,835,193 UART: [art] Extend RT PCRs Done
20,836,415 UART: [art] Lock RT PCRs Done
20,838,206 UART: [art] Populate DV Done
20,844,006 UART: [fht] FMC Alias Private Key: 7
20,845,492 UART: [art] Derive CDI
20,846,262 UART: [art] Store in in slot 0x4
20,904,026 UART: [art] Derive Key Pair
20,905,035 UART: [art] Store priv key in slot 0x5
23,368,283 UART: [art] Derive Key Pair - Done
23,381,004 UART: [art] Signing Cert with AUTHO
23,382,321 UART: RITY.KEYID = 7
25,094,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,086 UART: [art] PUB.X = 1B66AC249DE84D9745431C3C8AA1741C2C278E96B13B7136D443DC35FFA565D6130B3EECC6E02DA04430D05D329D85B2
25,103,372 UART: [art] PUB.Y = 679A053E39784A32E6E7752834B93000BD958FE02B26253D9683BBE0FB15E120D877ABFEF154B94059EFC105A91CE1F6
25,110,600 UART: [art] SIG.R = E632C0918FEA6FA0B5C4B5EC42A0FDEF875BB04FFDBAEC7728F31A7B8FE4F77C16723275E98E49E12293004295B098BC
25,117,970 UART: [art] SIG.S = 4C7E89E7B1139B0DDD9726495FA0912B6FD78C55C34E09D5EA32FFF1221396B7A890E4278ABD446975329E33744FF37E
26,097,012 UART: Caliptra RT
26,097,714 UART: [state] CFI Enabled
26,262,378 UART: [rt] RT listening for mailbox commands...
26,264,287 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,294,593 UART: [rt]cmd =0x434b4558, len=80
26,296,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,514 UART:
192,903 UART: Running Caliptra ROM ...
194,093 UART:
603,579 UART: [state] CFI Enabled
617,669 UART: [state] LifecycleState = Unprovisioned
620,027 UART: [state] DebugLocked = No
621,552 UART: [state] WD Timer not started. Device not locked for debugging
626,494 UART: [kat] SHA2-256
816,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,137 UART: [kat] ++
827,655 UART: [kat] sha1
838,822 UART: [kat] SHA2-256
841,868 UART: [kat] SHA2-384
847,296 UART: [kat] SHA2-512-ACC
849,871 UART: [kat] ECC-384
3,292,083 UART: [kat] HMAC-384Kdf
3,304,703 UART: [kat] LMS
3,836,485 UART: [kat] --
3,839,921 UART: [cold-reset] ++
3,841,853 UART: [fht] FHT @ 0x50003400
3,854,244 UART: [idev] ++
3,854,950 UART: [idev] CDI.KEYID = 6
3,855,831 UART: [idev] SUBJECT.KEYID = 7
3,857,072 UART: [idev] UDS.KEYID = 0
3,857,974 ready_for_fw is high
3,858,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,921 UART: [idev] Erasing UDS.KEYID = 0
6,339,145 UART: [idev] Sha1 KeyId Algorithm
6,361,572 UART: [idev] --
6,365,216 UART: [ldev] ++
6,365,956 UART: [ldev] CDI.KEYID = 6
6,366,870 UART: [ldev] SUBJECT.KEYID = 5
6,368,026 UART: [ldev] AUTHORITY.KEYID = 7
6,369,277 UART: [ldev] FE.KEYID = 1
6,378,461 UART: [ldev] Erasing FE.KEYID = 1
8,855,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,388 UART: [ldev] --
10,646,618 UART: [fwproc] Wait for Commands...
10,648,925 UART: [fwproc] Recv command 0x46574c44
10,651,228 UART: [fwproc] Recv'd Img size: 114360 bytes
14,106,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,807 >>> mbox cmd response: success
14,846,022 UART: [afmc] ++
14,846,748 UART: [afmc] CDI.KEYID = 6
14,847,985 UART: [afmc] SUBJECT.KEYID = 7
14,849,414 UART: [afmc] AUTHORITY.KEYID = 5
17,354,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,117 UART: [afmc] --
19,150,493 UART: [cold-reset] --
19,154,617 UART: [state] Locking Datavault
19,161,718 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,898 UART: [state] Locking ICCM
19,165,192 UART: [exit] Launching FMC @ 0x40000130
19,173,863 UART:
19,174,113 UART: Running Caliptra FMC ...
19,175,212 UART:
19,175,366 UART: [state] CFI Enabled
19,183,137 UART: [fht] FMC Alias Private Key: 7
20,939,401 UART: [art] Extend RT PCRs Done
20,940,631 UART: [art] Lock RT PCRs Done
20,942,332 UART: [art] Populate DV Done
20,947,845 UART: [fht] FMC Alias Private Key: 7
20,949,541 UART: [art] Derive CDI
20,950,280 UART: [art] Store in in slot 0x4
20,993,033 UART: [art] Derive Key Pair
20,994,027 UART: [art] Store priv key in slot 0x5
23,421,067 UART: [art] Derive Key Pair - Done
23,434,124 UART: [art] Signing Cert with AUTHO
23,435,424 UART: RITY.KEYID = 7
25,140,893 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,419 UART: [art] PUB.X = F8D92FA7F67B16B6D24B12F510CA340B81293392DF9E60835058DCBDBDBE38C0F33D4F606AEE21A5951F44808BAA8D16
25,149,668 UART: [art] PUB.Y = B96A717B80DA2D78B784E53276613AFD7FAE2497D31703A6C16D94373EB0CEB7F2765A1E735BBA4A4E9BADCFD8B1A480
25,156,948 UART: [art] SIG.R = 6499027D83F8FD78F4AC0D59BD422B722DB0D05A062A8D52A5DA7AAAB0227341013766C3E81047EFA655B9300F378F7A
25,164,378 UART: [art] SIG.S = A023C11909808281D8A34E6B3E0FD8A374395CD0EDEB6B0A03270C2DFD0460EC78C414C96BC0BD230342B95ADD908ABE
26,143,001 UART: Caliptra RT
26,143,714 UART: [state] CFI Enabled
26,261,697 UART: [rt] RT listening for mailbox commands...
26,263,581 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,293,994 UART: [rt]cmd =0x434b4558, len=80
26,295,356 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,754,215 ready_for_fw is high
3,754,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,967,604 >>> mbox cmd response: success
19,215,733 UART:
19,216,129 UART: Running Caliptra FMC ...
19,217,324 UART:
19,217,494 UART: [state] CFI Enabled
19,225,331 UART: [fht] FMC Alias Private Key: 7
20,981,877 UART: [art] Extend RT PCRs Done
20,983,095 UART: [art] Lock RT PCRs Done
20,984,884 UART: [art] Populate DV Done
20,990,409 UART: [fht] FMC Alias Private Key: 7
20,992,143 UART: [art] Derive CDI
20,992,964 UART: [art] Store in in slot 0x4
21,035,220 UART: [art] Derive Key Pair
21,036,255 UART: [art] Store priv key in slot 0x5
23,462,869 UART: [art] Derive Key Pair - Done
23,475,704 UART: [art] Signing Cert with AUTHO
23,477,001 UART: RITY.KEYID = 7
25,182,802 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,315 UART: [art] PUB.X = 0FB0FD26F7881218FF54A8AB38528CD9106503310B13ECE8BAF90C9BEDEE3E10FFE64075EE25E8A1466654EBC736E12F
25,191,578 UART: [art] PUB.Y = A7406022CDC82B438207FDE200BB8EC20722B1BB2FABB450CD0087F243A6286A575E531BCB4C225736319191C65DE645
25,198,789 UART: [art] SIG.R = E0F0CBFA147C30D367074AF2B326154F7FE10EAB895CE194F4A3CAD8856BF2A62E7C7F4993B6C74F6D26C0B682383F90
25,206,198 UART: [art] SIG.S = F09EBDC6EE66090101293345445142180AB183C4351335241F9B5C29DADBDE0DB44E8D177F92BC1D0A1D28B5C6C5D42A
26,185,643 UART: Caliptra RT
26,186,341 UART: [state] CFI Enabled
26,303,592 UART: [rt] RT listening for mailbox commands...
26,305,497 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,336,205 UART: [rt]cmd =0x434b4558, len=80
26,337,755 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,805 UART: [kat] SHA2-256
881,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,851 UART: [kat] ++
886,003 UART: [kat] sha1
890,319 UART: [kat] SHA2-256
892,257 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,438 UART: [kat] LMS
1,475,634 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,476,991 UART: [fht] Storing FHT @ 0x50003400
1,479,790 UART: [idev] ++
1,479,958 UART: [idev] CDI.KEYID = 6
1,480,318 UART: [idev] SUBJECT.KEYID = 7
1,480,742 UART: [idev] UDS.KEYID = 0
1,481,087 ready_for_fw is high
1,481,087 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,806 UART: [idev] Erasing UDS.KEYID = 0
1,505,742 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,364 UART: [idev] --
1,515,245 UART: [ldev] ++
1,515,413 UART: [ldev] CDI.KEYID = 6
1,515,776 UART: [ldev] SUBJECT.KEYID = 5
1,516,202 UART: [ldev] AUTHORITY.KEYID = 7
1,516,665 UART: [ldev] FE.KEYID = 1
1,521,739 UART: [ldev] Erasing FE.KEYID = 1
1,547,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,036 UART: [ldev] --
1,586,405 UART: [fwproc] Waiting for Commands...
1,587,166 UART: [fwproc] Received command 0x46574c44
1,587,957 UART: [fwproc] Received Image of size 114360 bytes
2,886,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,644 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,837 >>> mbox cmd response: success
3,079,067 UART: [afmc] ++
3,079,235 UART: [afmc] CDI.KEYID = 6
3,079,597 UART: [afmc] SUBJECT.KEYID = 7
3,080,022 UART: [afmc] AUTHORITY.KEYID = 5
3,115,749 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,885 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,665 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,278 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,968 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,867 UART: [afmc] --
3,158,999 UART: [cold-reset] --
3,159,805 UART: [state] Locking Datavault
3,161,104 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,708 UART: [state] Locking ICCM
3,162,290 UART: [exit] Launching FMC @ 0x40000130
3,167,619 UART:
3,167,635 UART: Running Caliptra FMC ...
3,168,043 UART:
3,168,097 UART: [state] CFI Enabled
3,178,606 UART: [fht] FMC Alias Private Key: 7
3,286,599 UART: [art] Extend RT PCRs Done
3,287,027 UART: [art] Lock RT PCRs Done
3,288,767 UART: [art] Populate DV Done
3,296,898 UART: [fht] FMC Alias Private Key: 7
3,298,076 UART: [art] Derive CDI
3,298,356 UART: [art] Store in in slot 0x4
3,384,201 UART: [art] Derive Key Pair
3,384,561 UART: [art] Store priv key in slot 0x5
3,397,715 UART: [art] Derive Key Pair - Done
3,412,293 UART: [art] Signing Cert with AUTHO
3,412,773 UART: RITY.KEYID = 7
3,427,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,530 UART: [art] PUB.X = A0051CB03855A825218F13525BDFFB4E7ECE8F5DEF90F97FD6B6A09F083756F55B0913289353E80621721326F82E8318
3,435,284 UART: [art] PUB.Y = FCFCED1BBBF55988C580F08128A532240AA57B6FB75414A511E1D3202AD1F0EF827F7BAFC2D5FF494EA502A257605740
3,442,240 UART: [art] SIG.R = 2F3BEB8B2A0E1CA44D9A93F45A7D3E97B21EF4F213552E44787D8D4B9A606D3B1B99BA8F8BC0E1FC2BCE1B3D86D74C16
3,449,029 UART: [art] SIG.S = 3C56CD94F5F129E85DA7659C1132DD64B3F8446759C462D518FF09FEBBE4D2DFFA4780DA5585068E0C84A09333567211
3,473,017 UART: Caliptra RT
3,473,271 UART: [state] CFI Enabled
3,581,332 UART: [rt] RT listening for mailbox commands...
3,582,002 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,875 UART: [rt]cmd =0x434b4558, len=80
3,613,032 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,201 ready_for_fw is high
1,363,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,345 >>> mbox cmd response: success
2,990,775 UART:
2,990,791 UART: Running Caliptra FMC ...
2,991,199 UART:
2,991,253 UART: [state] CFI Enabled
3,001,766 UART: [fht] FMC Alias Private Key: 7
3,110,251 UART: [art] Extend RT PCRs Done
3,110,679 UART: [art] Lock RT PCRs Done
3,112,107 UART: [art] Populate DV Done
3,120,168 UART: [fht] FMC Alias Private Key: 7
3,121,326 UART: [art] Derive CDI
3,121,606 UART: [art] Store in in slot 0x4
3,207,343 UART: [art] Derive Key Pair
3,207,703 UART: [art] Store priv key in slot 0x5
3,220,925 UART: [art] Derive Key Pair - Done
3,235,671 UART: [art] Signing Cert with AUTHO
3,236,151 UART: RITY.KEYID = 7
3,251,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,424 UART: [art] PUB.X = B779B399A472B82A370DDF745713DCE4B6611BDFF61A44476D3CF5E0DF11267BFCAAA2C758B5CDA404ED6663B4A872CB
3,259,206 UART: [art] PUB.Y = 5055424B34F18BD19896CE5A1305D4CD684A588AC74FD40D63DEE19CCC0D1819CD6A30B5637E6188DDD0958299E6BD0B
3,266,152 UART: [art] SIG.R = E8F8C1ED98BF59683FF0FDBCB8A2282CE7143F6A4B4B3CD6BB1FC73B2FBF12997DC2EBD83292AB92EEA9ABE591A2100E
3,272,949 UART: [art] SIG.S = 66605884E42E7056B82EE6681532DA2C2A23674EEDCC6A3BAFB7D460F933AD1C2C76E1E168DFBE62BFDBDE50C3DCF774
3,297,000 UART: Caliptra RT
3,297,254 UART: [state] CFI Enabled
3,405,662 UART: [rt] RT listening for mailbox commands...
3,406,332 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,471 UART: [rt]cmd =0x434b4558, len=80
3,437,522 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,475 UART: [kat] LMS
1,475,671 UART: [kat] --
1,476,788 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,245 UART: [idev] ++
1,480,413 UART: [idev] CDI.KEYID = 6
1,480,773 UART: [idev] SUBJECT.KEYID = 7
1,481,197 UART: [idev] UDS.KEYID = 0
1,481,542 ready_for_fw is high
1,481,542 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,227 UART: [idev] Erasing UDS.KEYID = 0
1,505,695 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,323 UART: [idev] --
1,515,278 UART: [ldev] ++
1,515,446 UART: [ldev] CDI.KEYID = 6
1,515,809 UART: [ldev] SUBJECT.KEYID = 5
1,516,235 UART: [ldev] AUTHORITY.KEYID = 7
1,516,698 UART: [ldev] FE.KEYID = 1
1,522,182 UART: [ldev] Erasing FE.KEYID = 1
1,547,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,105 UART: [ldev] --
1,587,418 UART: [fwproc] Waiting for Commands...
1,588,197 UART: [fwproc] Received command 0x46574c44
1,588,988 UART: [fwproc] Received Image of size 114360 bytes
2,887,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,038 >>> mbox cmd response: success
3,081,132 UART: [afmc] ++
3,081,300 UART: [afmc] CDI.KEYID = 6
3,081,662 UART: [afmc] SUBJECT.KEYID = 7
3,082,087 UART: [afmc] AUTHORITY.KEYID = 5
3,117,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,237 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,927 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,788 UART: [afmc] --
3,160,836 UART: [cold-reset] --
3,161,836 UART: [state] Locking Datavault
3,162,987 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,591 UART: [state] Locking ICCM
3,164,139 UART: [exit] Launching FMC @ 0x40000130
3,169,468 UART:
3,169,484 UART: Running Caliptra FMC ...
3,169,892 UART:
3,170,035 UART: [state] CFI Enabled
3,180,622 UART: [fht] FMC Alias Private Key: 7
3,287,955 UART: [art] Extend RT PCRs Done
3,288,383 UART: [art] Lock RT PCRs Done
3,290,085 UART: [art] Populate DV Done
3,298,146 UART: [fht] FMC Alias Private Key: 7
3,299,088 UART: [art] Derive CDI
3,299,368 UART: [art] Store in in slot 0x4
3,384,947 UART: [art] Derive Key Pair
3,385,307 UART: [art] Store priv key in slot 0x5
3,398,723 UART: [art] Derive Key Pair - Done
3,413,575 UART: [art] Signing Cert with AUTHO
3,414,055 UART: RITY.KEYID = 7
3,429,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,260 UART: [art] PUB.X = D4F9744652687F479CAA16AC88BEDD882855060870A8D90ED7DFF8FE93AEDA4C3A33EC834D490F05DF26BA5245392BA6
3,437,027 UART: [art] PUB.Y = C4D0AC61570624E63D51CEC712D740EF344635041CE06978A3A549E1737C72ACBFD82B4D53EDA9C93F38878459843B55
3,443,971 UART: [art] SIG.R = A8EF73B867DBAB7FE9B8084560E90A2E8BD4D7EC76CCB6A04144AF0AEE624E6E99C839187CB3A1656AF8AFCDE5349D3D
3,450,756 UART: [art] SIG.S = 1CE36A47ED33B9D9E0E40500C56A1611D7A752A22D95A70D51F6ED435351A59F8C1A2C5026AB4BFC963C3FA8820CF86D
3,474,616 UART: Caliptra RT
3,474,962 UART: [state] CFI Enabled
3,582,938 UART: [rt] RT listening for mailbox commands...
3,583,608 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,531 UART: [rt]cmd =0x434b4558, len=80
3,614,562 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 ready_for_fw is high
1,362,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,750 >>> mbox cmd response: success
2,990,252 UART:
2,990,268 UART: Running Caliptra FMC ...
2,990,676 UART:
2,990,819 UART: [state] CFI Enabled
3,001,346 UART: [fht] FMC Alias Private Key: 7
3,109,531 UART: [art] Extend RT PCRs Done
3,109,959 UART: [art] Lock RT PCRs Done
3,111,217 UART: [art] Populate DV Done
3,119,198 UART: [fht] FMC Alias Private Key: 7
3,120,242 UART: [art] Derive CDI
3,120,522 UART: [art] Store in in slot 0x4
3,206,235 UART: [art] Derive Key Pair
3,206,595 UART: [art] Store priv key in slot 0x5
3,219,535 UART: [art] Derive Key Pair - Done
3,234,402 UART: [art] Signing Cert with AUTHO
3,234,882 UART: RITY.KEYID = 7
3,249,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,759 UART: [art] PUB.X = 2716E17EE53C016341D79A7E7795F7BE6B17C188DE2194EDB11AEAB8C863F2CCC1B1DB21F813958C7CD6D4928CEF644C
3,257,540 UART: [art] PUB.Y = BCE4D191F3AA86360B1BBCE069586E962874664A0A60D7368449A243677A546FA1A4B0C9E51CF465F5E8E396000CFC30
3,264,461 UART: [art] SIG.R = 49CA1080DB61F673AF102BB3A26883E1E3B524CB2E640331876CA3DDA1DABB6F7D8587FD0B486A3BE4F23797CEAF63FF
3,271,243 UART: [art] SIG.S = 814C81D43064980A01B27DBF7F1DBE8FCCBBDB93127633A4CD97EB65AD729D8B5682DCE8CC42E757AF9B69CD78E3974A
3,295,364 UART: Caliptra RT
3,295,710 UART: [state] CFI Enabled
3,404,702 UART: [rt] RT listening for mailbox commands...
3,405,372 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,329 UART: [rt]cmd =0x434b4558, len=80
3,436,414 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,135 UART: [kat] SHA2-256
904,075 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
923,030 UART: [kat] LMS
1,171,358 UART: [kat] --
1,172,447 UART: [cold-reset] ++
1,172,883 UART: [fht] FHT @ 0x50003400
1,175,552 UART: [idev] ++
1,175,720 UART: [idev] CDI.KEYID = 6
1,176,080 UART: [idev] SUBJECT.KEYID = 7
1,176,504 UART: [idev] UDS.KEYID = 0
1,176,849 ready_for_fw is high
1,176,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,848 UART: [idev] Erasing UDS.KEYID = 0
1,201,725 UART: [idev] Sha1 KeyId Algorithm
1,210,363 UART: [idev] --
1,211,455 UART: [ldev] ++
1,211,623 UART: [ldev] CDI.KEYID = 6
1,211,986 UART: [ldev] SUBJECT.KEYID = 5
1,212,412 UART: [ldev] AUTHORITY.KEYID = 7
1,212,875 UART: [ldev] FE.KEYID = 1
1,217,959 UART: [ldev] Erasing FE.KEYID = 1
1,243,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,049 UART: [ldev] --
1,283,310 UART: [fwproc] Wait for Commands...
1,284,092 UART: [fwproc] Recv command 0x46574c44
1,284,820 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,754 >>> mbox cmd response: success
2,776,768 UART: [afmc] ++
2,776,936 UART: [afmc] CDI.KEYID = 6
2,777,298 UART: [afmc] SUBJECT.KEYID = 7
2,777,723 UART: [afmc] AUTHORITY.KEYID = 5
2,813,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,763 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,376 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,095 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,821 UART: [afmc] --
2,856,727 UART: [cold-reset] --
2,857,573 UART: [state] Locking Datavault
2,858,592 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,196 UART: [state] Locking ICCM
2,859,788 UART: [exit] Launching FMC @ 0x40000130
2,865,117 UART:
2,865,133 UART: Running Caliptra FMC ...
2,865,541 UART:
2,865,595 UART: [state] CFI Enabled
2,875,916 UART: [fht] FMC Alias Private Key: 7
2,983,099 UART: [art] Extend RT PCRs Done
2,983,527 UART: [art] Lock RT PCRs Done
2,985,271 UART: [art] Populate DV Done
2,993,454 UART: [fht] FMC Alias Private Key: 7
2,994,532 UART: [art] Derive CDI
2,994,812 UART: [art] Store in in slot 0x4
3,080,501 UART: [art] Derive Key Pair
3,080,861 UART: [art] Store priv key in slot 0x5
3,094,091 UART: [art] Derive Key Pair - Done
3,108,924 UART: [art] Signing Cert with AUTHO
3,109,404 UART: RITY.KEYID = 7
3,124,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,493 UART: [art] PUB.X = 075B82D261D727C31A05C11136910ECDD6902ED501D1D69245803BED8E0F0C80DE28CD2D78B0120D8102AF2A2B831234
3,132,239 UART: [art] PUB.Y = ED4B22CB60C97EFBE5383D6C32F73169823D1E9D5F8219D807071B5F008550AA546092673C6B375160631C801DA79556
3,139,153 UART: [art] SIG.R = F378290250F222D5D02F991A32588912E4F269F7B3085566182D4080FC8A06551A5CAA483C7F4BDCAFD90880108FF018
3,145,905 UART: [art] SIG.S = E483168049A707E802D2CCF0C031AFBF50706EB8CAB10A62BEEE778B7E87AC5F09C136B9C4A3D17BE456F40FA9E2A24A
3,169,467 UART: Caliptra RT
3,169,721 UART: [state] CFI Enabled
3,277,608 UART: [rt] RT listening for mailbox commands...
3,278,278 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,327 UART: [rt]cmd =0x434b4558, len=80
3,309,154 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,851 ready_for_fw is high
1,059,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,925 >>> mbox cmd response: success
2,688,445 UART:
2,688,461 UART: Running Caliptra FMC ...
2,688,869 UART:
2,688,923 UART: [state] CFI Enabled
2,699,086 UART: [fht] FMC Alias Private Key: 7
2,807,023 UART: [art] Extend RT PCRs Done
2,807,451 UART: [art] Lock RT PCRs Done
2,808,665 UART: [art] Populate DV Done
2,817,084 UART: [fht] FMC Alias Private Key: 7
2,818,234 UART: [art] Derive CDI
2,818,514 UART: [art] Store in in slot 0x4
2,903,889 UART: [art] Derive Key Pair
2,904,249 UART: [art] Store priv key in slot 0x5
2,917,143 UART: [art] Derive Key Pair - Done
2,932,024 UART: [art] Signing Cert with AUTHO
2,932,504 UART: RITY.KEYID = 7
2,947,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,051 UART: [art] PUB.X = 96E39EAEEE0E401B7C2DA7F29BDB29D4D6411C62EDC938C7C008CADAF768CDE62E80DF521954E394EB21DA4A0807A018
2,954,829 UART: [art] PUB.Y = 077804443F085735850B2F9E7898F204791F0A583ED869EFC9D14E5CA840311F5BD453B438B58B184DE5F59E7795EB0D
2,961,754 UART: [art] SIG.R = 5A65FA2C20CF16CED10EDA788A3C3DB80081620135005B94D8CE10544278692F7E0F9698780D6EC71AECD08862EF350E
2,968,469 UART: [art] SIG.S = 0B3285199191568137E0D847F9CF78EE8181BF0FA9348C2F5AB5A8504EA9C0BB915212FC4CDB54EF247C75828B79DB96
2,992,352 UART: Caliptra RT
2,992,606 UART: [state] CFI Enabled
3,100,274 UART: [rt] RT listening for mailbox commands...
3,100,944 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,123 UART: [rt]cmd =0x434b4558, len=80
3,132,226 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,879 UART: [kat] SHA2-512-ACC
908,780 UART: [kat] ECC-384
918,583 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,702 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 ready_for_fw is high
1,176,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,793 UART: [idev] Erasing UDS.KEYID = 0
1,202,186 UART: [idev] Sha1 KeyId Algorithm
1,210,744 UART: [idev] --
1,211,900 UART: [ldev] ++
1,212,068 UART: [ldev] CDI.KEYID = 6
1,212,431 UART: [ldev] SUBJECT.KEYID = 5
1,212,857 UART: [ldev] AUTHORITY.KEYID = 7
1,213,320 UART: [ldev] FE.KEYID = 1
1,218,422 UART: [ldev] Erasing FE.KEYID = 1
1,245,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,562 UART: [ldev] --
1,283,897 UART: [fwproc] Wait for Commands...
1,284,515 UART: [fwproc] Recv command 0x46574c44
1,285,243 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,721 >>> mbox cmd response: success
2,776,841 UART: [afmc] ++
2,777,009 UART: [afmc] CDI.KEYID = 6
2,777,371 UART: [afmc] SUBJECT.KEYID = 7
2,777,796 UART: [afmc] AUTHORITY.KEYID = 5
2,812,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,669 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,388 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,180 UART: [afmc] --
2,856,098 UART: [cold-reset] --
2,857,078 UART: [state] Locking Datavault
2,858,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,805 UART: [state] Locking ICCM
2,859,457 UART: [exit] Launching FMC @ 0x40000130
2,864,786 UART:
2,864,802 UART: Running Caliptra FMC ...
2,865,210 UART:
2,865,353 UART: [state] CFI Enabled
2,875,942 UART: [fht] FMC Alias Private Key: 7
2,983,987 UART: [art] Extend RT PCRs Done
2,984,415 UART: [art] Lock RT PCRs Done
2,985,931 UART: [art] Populate DV Done
2,994,150 UART: [fht] FMC Alias Private Key: 7
2,995,330 UART: [art] Derive CDI
2,995,610 UART: [art] Store in in slot 0x4
3,081,345 UART: [art] Derive Key Pair
3,081,705 UART: [art] Store priv key in slot 0x5
3,094,909 UART: [art] Derive Key Pair - Done
3,109,743 UART: [art] Signing Cert with AUTHO
3,110,223 UART: RITY.KEYID = 7
3,125,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,372 UART: [art] PUB.X = E5E713EF81643C348F48F88F8CF942B1131A8B6EC5B17DE1D1FD79C9752954E625421CD17ABB54CEFED7FDF6D4468686
3,133,154 UART: [art] PUB.Y = DFB85995856102C0CE51EECDF2C3F049115889FB6032967F50CAE8357476702574AF3EE1AC1EFB0A984E847B0626778E
3,140,097 UART: [art] SIG.R = E8217E3231868F1E62068543FDB480889DE4DBD06A88385730063CF9F54DF340DEEB3E9BFFEF467A26CEB4156D056211
3,146,862 UART: [art] SIG.S = 7CC74E313750856EA26C4F7F81D59E1630D40DF565728E702B68A206D491D654734400CD6499A6AAEDF2668AABF0FE55
3,170,387 UART: Caliptra RT
3,170,733 UART: [state] CFI Enabled
3,277,933 UART: [rt] RT listening for mailbox commands...
3,278,603 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,560 UART: [rt]cmd =0x434b4558, len=80
3,309,643 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,026 ready_for_fw is high
1,060,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,598 >>> mbox cmd response: success
2,691,226 UART:
2,691,242 UART: Running Caliptra FMC ...
2,691,650 UART:
2,691,793 UART: [state] CFI Enabled
2,702,270 UART: [fht] FMC Alias Private Key: 7
2,810,347 UART: [art] Extend RT PCRs Done
2,810,775 UART: [art] Lock RT PCRs Done
2,812,127 UART: [art] Populate DV Done
2,820,196 UART: [fht] FMC Alias Private Key: 7
2,821,288 UART: [art] Derive CDI
2,821,568 UART: [art] Store in in slot 0x4
2,907,217 UART: [art] Derive Key Pair
2,907,577 UART: [art] Store priv key in slot 0x5
2,921,083 UART: [art] Derive Key Pair - Done
2,935,945 UART: [art] Signing Cert with AUTHO
2,936,425 UART: RITY.KEYID = 7
2,951,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,374 UART: [art] PUB.X = CC48FF5F2D35C4A5E13AE9BA61F45C5D3D54637F6DC4578603E62DAADDDA0869AB2D9486AEEACAF368BEBCDFA6220DFB
2,959,169 UART: [art] PUB.Y = D9705C4B29B590B106341148FF9F305BEBF5D73E77B01E4375F58F2468F7BE5428ED24BEA450EDFD8386B9E704EC5A3A
2,966,123 UART: [art] SIG.R = 0EB30AB80090510F37C463BC4F1AB50EB6E60E25ACA89BB4F8D9CCAB3A0EE3A0030DA74E7E7193286688F360B73B090C
2,972,855 UART: [art] SIG.S = 369D4C6479EC4B435C927EA66111AF4CD443C8193B8D8D104EA35AB04B1268DC604D7E65908FFBA1B45E846AC2E5455A
2,996,782 UART: Caliptra RT
2,997,128 UART: [state] CFI Enabled
3,105,670 UART: [rt] RT listening for mailbox commands...
3,106,340 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,409 UART: [rt]cmd =0x434b4558, len=80
3,137,492 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,174,613 ready_for_fw is high
1,174,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,853 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,253 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,400 >>> mbox cmd response: success
2,774,555 UART: [afmc] ++
2,774,723 UART: [afmc] CDI.KEYID = 6
2,775,086 UART: [afmc] SUBJECT.KEYID = 7
2,775,512 UART: [afmc] AUTHORITY.KEYID = 5
2,811,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,622 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,341 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,216 UART: [afmc] --
2,854,246 UART: [cold-reset] --
2,855,034 UART: [state] Locking Datavault
2,856,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,901 UART: [state] Locking ICCM
2,857,369 UART: [exit] Launching FMC @ 0x40000130
2,862,698 UART:
2,862,714 UART: Running Caliptra FMC ...
2,863,122 UART:
2,863,176 UART: [state] CFI Enabled
2,873,447 UART: [fht] FMC Alias Private Key: 7
2,981,352 UART: [art] Extend RT PCRs Done
2,981,780 UART: [art] Lock RT PCRs Done
2,983,484 UART: [art] Populate DV Done
2,991,751 UART: [fht] FMC Alias Private Key: 7
2,992,889 UART: [art] Derive CDI
2,993,169 UART: [art] Store in in slot 0x4
3,079,120 UART: [art] Derive Key Pair
3,079,480 UART: [art] Store priv key in slot 0x5
3,092,454 UART: [art] Derive Key Pair - Done
3,106,956 UART: [art] Signing Cert with AUTHO
3,107,436 UART: RITY.KEYID = 7
3,122,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,937 UART: [art] PUB.X = ABBCCDFB8025A7B1678308F6D2117CDE1F0C31B59B7CD395764B656B1A2691B65D25793993D4E5429C68BF675181AF7A
3,129,707 UART: [art] PUB.Y = 503FA503DA10BB93CB1A326C3F34FFD46D9DF160F68563F6A4C7DB526E897FA81E736FBAB4719B33686AB3E4F93F2B07
3,136,665 UART: [art] SIG.R = 16EAD685C3C32B8C23FB5489717BB539DCCA14A4F66497407AE76BF3D2EAE922D437648549252C960298AFE5B19EABDA
3,143,442 UART: [art] SIG.S = B8CEFC2E549586041B6D43FFC3F9A8DDA87E98B5639C9FF4BC5E2EC4E422D2198B4543E3B2E3DEDC922DA9961DC77BFB
3,166,890 UART: Caliptra RT
3,167,144 UART: [state] CFI Enabled
3,274,992 UART: [rt] RT listening for mailbox commands...
3,275,662 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,723 UART: [rt]cmd =0x434b4558, len=80
3,306,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,920 ready_for_fw is high
1,055,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,574 >>> mbox cmd response: success
2,683,502 UART:
2,683,518 UART: Running Caliptra FMC ...
2,683,926 UART:
2,683,980 UART: [state] CFI Enabled
2,694,385 UART: [fht] FMC Alias Private Key: 7
2,802,934 UART: [art] Extend RT PCRs Done
2,803,362 UART: [art] Lock RT PCRs Done
2,804,886 UART: [art] Populate DV Done
2,813,143 UART: [fht] FMC Alias Private Key: 7
2,814,241 UART: [art] Derive CDI
2,814,521 UART: [art] Store in in slot 0x4
2,900,020 UART: [art] Derive Key Pair
2,900,380 UART: [art] Store priv key in slot 0x5
2,913,340 UART: [art] Derive Key Pair - Done
2,928,012 UART: [art] Signing Cert with AUTHO
2,928,492 UART: RITY.KEYID = 7
2,944,014 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,779 UART: [art] PUB.X = 3859E22667218477A75BC6A78367AD0C0987BE08D3B97328CA02BE9C74E02D5E2C9F048E307DBB07BD4B478CB4346111
2,951,531 UART: [art] PUB.Y = 28C3658C6036BBE3D68A7EBF45D21F7AB9B400CDC7AB1F4069D75A5037190D14633219BBC57F246D1444EE656B095251
2,958,455 UART: [art] SIG.R = 8A02A5751BF69CF43A5457488CC79D361C7F01CC22DCA390C64C95D88DCBD8DA457BC5DCB14069ECF65004A450C6C4E1
2,965,230 UART: [art] SIG.S = 61EA3B3568F839747E2AF9A365C31392B064180F98294E8C1ABA6A6769D86D65261CB033E50C8F91EA1D9E208CF899B5
2,989,523 UART: Caliptra RT
2,989,777 UART: [state] CFI Enabled
3,097,857 UART: [rt] RT listening for mailbox commands...
3,098,527 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,178 UART: [rt]cmd =0x434b4558, len=80
3,129,171 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
891,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,944 UART: [kat] ++
896,096 UART: [kat] sha1
900,376 UART: [kat] SHA2-256
902,316 UART: [kat] SHA2-384
905,105 UART: [kat] SHA2-512-ACC
907,006 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,593 UART: [kat] LMS
1,169,905 UART: [kat] --
1,170,772 UART: [cold-reset] ++
1,171,126 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,175,044 ready_for_fw is high
1,175,044 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,896 UART: [idev] --
1,210,027 UART: [ldev] ++
1,210,195 UART: [ldev] CDI.KEYID = 6
1,210,559 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,243,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,282,948 UART: [fwproc] Recv command 0x46574c44
1,283,681 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,639 >>> mbox cmd response: success
2,773,790 UART: [afmc] ++
2,773,958 UART: [afmc] CDI.KEYID = 6
2,774,321 UART: [afmc] SUBJECT.KEYID = 7
2,774,747 UART: [afmc] AUTHORITY.KEYID = 5
2,810,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,575 UART: [afmc] --
2,853,695 UART: [cold-reset] --
2,854,685 UART: [state] Locking Datavault
2,855,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,398 UART: [state] Locking ICCM
2,856,868 UART: [exit] Launching FMC @ 0x40000130
2,862,197 UART:
2,862,213 UART: Running Caliptra FMC ...
2,862,621 UART:
2,862,764 UART: [state] CFI Enabled
2,873,379 UART: [fht] FMC Alias Private Key: 7
2,981,146 UART: [art] Extend RT PCRs Done
2,981,574 UART: [art] Lock RT PCRs Done
2,983,074 UART: [art] Populate DV Done
2,991,333 UART: [fht] FMC Alias Private Key: 7
2,992,449 UART: [art] Derive CDI
2,992,729 UART: [art] Store in in slot 0x4
3,078,310 UART: [art] Derive Key Pair
3,078,670 UART: [art] Store priv key in slot 0x5
3,092,278 UART: [art] Derive Key Pair - Done
3,106,977 UART: [art] Signing Cert with AUTHO
3,107,457 UART: RITY.KEYID = 7
3,123,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,796 UART: [art] PUB.X = B5C80A73D1616F2915BDB2E6F9E8455B616FA47EAA4B1B0C67AE007821657CABAFDBE5B8A1B645A73799DB043BEBFA9E
3,130,557 UART: [art] PUB.Y = 4CB3CD866AE7074258556F25F0E0C60AB630B2EC16823BE84FB1ACB7524DBBAE62419D4E4C386E94ED424A7C031D8491
3,137,508 UART: [art] SIG.R = DBF5DA8EF767E69344DFBBE0599D8749661A603830C03555802DE9B7C237C1DE167671BA45DA24B6A41F892C8066B7E9
3,144,282 UART: [art] SIG.S = 63BA4C4DBF13AA84C7972B4D358B9E9DCDC3F5097B3915220E93907E8C95CD79D1CE1BD065D18AD8EBC1401603D82CFF
3,168,192 UART: Caliptra RT
3,168,538 UART: [state] CFI Enabled
3,276,628 UART: [rt] RT listening for mailbox commands...
3,277,298 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,231 UART: [rt]cmd =0x434b4558, len=80
3,308,302 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,509 ready_for_fw is high
1,056,509 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,423 >>> mbox cmd response: success
2,684,931 UART:
2,684,947 UART: Running Caliptra FMC ...
2,685,355 UART:
2,685,498 UART: [state] CFI Enabled
2,696,425 UART: [fht] FMC Alias Private Key: 7
2,804,224 UART: [art] Extend RT PCRs Done
2,804,652 UART: [art] Lock RT PCRs Done
2,806,280 UART: [art] Populate DV Done
2,814,419 UART: [fht] FMC Alias Private Key: 7
2,815,453 UART: [art] Derive CDI
2,815,733 UART: [art] Store in in slot 0x4
2,901,620 UART: [art] Derive Key Pair
2,901,980 UART: [art] Store priv key in slot 0x5
2,915,324 UART: [art] Derive Key Pair - Done
2,929,749 UART: [art] Signing Cert with AUTHO
2,930,229 UART: RITY.KEYID = 7
2,945,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,566 UART: [art] PUB.X = C6B15E855F852400126B42B7A560A8CC36369960EF03A960B878464042A7E5C95BD10292ECD3F2FB39194D793F3B2701
2,953,299 UART: [art] PUB.Y = A46B950C412958538C89FB5D302715544463E5F5119C65DE9E1D81306AF087B17B40FDD6107F41A88C382DEE370F796D
2,960,239 UART: [art] SIG.R = C9FCB021F3250F06494CFD8765E8CAFDCB955B1FE1A29334A5F1C6CE62A44E2994D5A91A38B468461642A090BEF1E984
2,967,013 UART: [art] SIG.S = 4258653A93A4D7D5535583895B1F3A3F7B7D1F24FD8C49AB201B834CE1921ADD3199015689B310BE31B685C65424361E
2,991,427 UART: Caliptra RT
2,991,773 UART: [state] CFI Enabled
3,099,267 UART: [rt] RT listening for mailbox commands...
3,099,937 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,822 UART: [rt]cmd =0x434b4558, len=80
3,131,145 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,428 UART:
192,800 UART: Running Caliptra ROM ...
193,977 UART:
194,137 UART: [state] CFI Enabled
267,600 UART: [state] LifecycleState = Unprovisioned
269,594 UART: [state] DebugLocked = No
271,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,623 UART: [kat] SHA2-256
447,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,870 UART: [kat] ++
458,344 UART: [kat] sha1
469,710 UART: [kat] SHA2-256
472,353 UART: [kat] SHA2-384
477,905 UART: [kat] SHA2-512-ACC
480,285 UART: [kat] ECC-384
2,768,324 UART: [kat] HMAC-384Kdf
2,800,451 UART: [kat] LMS
3,990,748 UART: [kat] --
3,995,128 UART: [cold-reset] ++
3,996,355 UART: [fht] Storing FHT @ 0x50003400
4,007,971 UART: [idev] ++
4,008,544 UART: [idev] CDI.KEYID = 6
4,009,533 UART: [idev] SUBJECT.KEYID = 7
4,010,770 UART: [idev] UDS.KEYID = 0
4,011,863 ready_for_fw is high
4,012,081 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,553 UART: [idev] Erasing UDS.KEYID = 0
7,347,220 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,137 UART: [idev] --
7,372,315 UART: [ldev] ++
7,372,949 UART: [ldev] CDI.KEYID = 6
7,373,853 UART: [ldev] SUBJECT.KEYID = 5
7,375,053 UART: [ldev] AUTHORITY.KEYID = 7
7,376,334 UART: [ldev] FE.KEYID = 1
7,421,055 UART: [ldev] Erasing FE.KEYID = 1
10,758,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,459 UART: [ldev] --
13,130,234 UART: [fwproc] Waiting for Commands...
13,133,524 UART: [fwproc] Received command 0x46574c44
13,135,758 UART: [fwproc] Received Image of size 114036 bytes
17,190,951 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,344 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,648,090 >>> mbox cmd response: success
17,652,513 UART: [afmc] ++
17,653,161 UART: [afmc] CDI.KEYID = 6
17,654,071 UART: [afmc] SUBJECT.KEYID = 7
17,655,176 UART: [afmc] AUTHORITY.KEYID = 5
21,022,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,320,705 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,975 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,337,361 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,352,179 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,366,627 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,388,150 UART: [afmc] --
23,392,235 UART: [cold-reset] --
23,396,741 UART: [state] Locking Datavault
23,401,336 UART: [state] Locking PCR0, PCR1 and PCR31
23,403,104 UART: [state] Locking ICCM
23,405,355 UART: [exit] Launching FMC @ 0x40000130
23,413,764 UART:
23,414,054 UART: Running Caliptra FMC ...
23,415,167 UART:
23,415,326 UART: [state] CFI Enabled
23,478,015 UART: [fht] FMC Alias Private Key: 7
25,815,712 UART: [art] Extend RT PCRs Done
25,816,931 UART: [art] Lock RT PCRs Done
25,818,847 UART: [art] Populate DV Done
25,824,198 UART: [fht] FMC Alias Private Key: 7
25,825,673 UART: [art] Derive CDI
25,826,402 UART: [art] Store in in slot 0x4
25,886,777 UART: [art] Derive Key Pair
25,887,766 UART: [art] Store priv key in slot 0x5
29,180,495 UART: [art] Derive Key Pair - Done
29,193,652 UART: [art] Signing Cert with AUTHO
29,194,957 UART: RITY.KEYID = 7
31,482,795 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,312 UART: [art] PUB.X = 2724FF18A235DA764B6B2AF075ED1A359FA98C8761D0C1FFD357F02FEB791CA622C3ADFFC65A24272F1C31F846E74088
31,491,575 UART: [art] PUB.Y = B1F74A199088156805FF631381B0A52BAD6A59A6DD61D0733EEE39174DAEB65ABC554E04B9791199CEF8D1045AECE4EB
31,498,829 UART: [art] SIG.R = 9A6B5414D12CE2A491405CC3744D59E6B47D17E08EA0E087996F3B8D714C48FF3D343967C721DC895B51429C1788CA02
31,506,209 UART: [art] SIG.S = AC4247B4545FDDF2687A2F496A0E1974EE8F9286E50E2D19986CEF4C3173F401292911EACA7B1DEA12A1B2D2512496AC
32,811,842 UART: Caliptra RT
32,812,570 UART: [state] CFI Enabled
32,973,366 UART: [rt] RT listening for mailbox commands...
32,975,313 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,006,024 UART: [rt]cmd =0x44504543, len=92
33,012,438 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,804,680 ready_for_fw is high
3,805,120 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,946 >>> mbox cmd response: success
23,565,341 UART:
23,565,768 UART: Running Caliptra FMC ...
23,566,872 UART:
23,567,027 UART: [state] CFI Enabled
23,633,398 UART: [fht] FMC Alias Private Key: 7
25,971,817 UART: [art] Extend RT PCRs Done
25,973,080 UART: [art] Lock RT PCRs Done
25,974,792 UART: [art] Populate DV Done
25,980,205 UART: [fht] FMC Alias Private Key: 7
25,981,740 UART: [art] Derive CDI
25,982,471 UART: [art] Store in in slot 0x4
26,042,318 UART: [art] Derive Key Pair
26,043,362 UART: [art] Store priv key in slot 0x5
29,336,322 UART: [art] Derive Key Pair - Done
29,349,645 UART: [art] Signing Cert with AUTHO
29,350,964 UART: RITY.KEYID = 7
31,638,371 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,871 UART: [art] PUB.X = 2D3E9275D03065F354A2B9D57A01386994751E25406F3D11402551C34EC966335791D781477D7398E51CBFFA1F010A23
31,647,106 UART: [art] PUB.Y = 7EAC27F4FFF896BC7DBA996F4BB20C225E4A9500335193DB28B216C49543B1F019752854BAF82614F02EC72120612AC4
31,654,307 UART: [art] SIG.R = 6CBB24D47F682D865D30ABF4F250C5574EA05AA5DBF59C4EF2A632C262E2C1E24B13105CB83F203FC5F092163B3580F3
31,661,732 UART: [art] SIG.S = AEE5C591B39033EC4BE6C7EBBD5DFBFC286A25CE64849E5054117223D7AE95CF18DD9C409FB7108875564ECBFB6EB2AA
32,966,657 UART: Caliptra RT
32,967,379 UART: [state] CFI Enabled
33,129,889 UART: [rt] RT listening for mailbox commands...
33,131,836 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,162,325 UART: [rt]cmd =0x44504543, len=92
33,168,655 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
192,576 UART:
192,936 UART: Running Caliptra ROM ...
194,061 UART:
603,866 UART: [state] CFI Enabled
623,174 UART: [state] LifecycleState = Unprovisioned
625,155 UART: [state] DebugLocked = No
627,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,842 UART: [kat] SHA2-256
802,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
813,141 UART: [kat] ++
813,690 UART: [kat] sha1
824,429 UART: [kat] SHA2-256
827,082 UART: [kat] SHA2-384
833,220 UART: [kat] SHA2-512-ACC
835,584 UART: [kat] ECC-384
3,119,669 UART: [kat] HMAC-384Kdf
3,130,481 UART: [kat] LMS
4,320,628 UART: [kat] --
4,326,516 UART: [cold-reset] ++
4,328,727 UART: [fht] Storing FHT @ 0x50003400
4,340,625 UART: [idev] ++
4,341,185 UART: [idev] CDI.KEYID = 6
4,342,141 UART: [idev] SUBJECT.KEYID = 7
4,343,381 UART: [idev] UDS.KEYID = 0
4,344,385 ready_for_fw is high
4,344,599 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,488,278 UART: [idev] Erasing UDS.KEYID = 0
7,633,557 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,887 UART: [idev] --
7,659,993 UART: [ldev] ++
7,660,564 UART: [ldev] CDI.KEYID = 6
7,661,501 UART: [ldev] SUBJECT.KEYID = 5
7,662,760 UART: [ldev] AUTHORITY.KEYID = 7
7,663,907 UART: [ldev] FE.KEYID = 1
7,674,786 UART: [ldev] Erasing FE.KEYID = 1
10,963,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,840 UART: [ldev] --
13,325,374 UART: [fwproc] Waiting for Commands...
13,328,235 UART: [fwproc] Received command 0x46574c44
13,330,421 UART: [fwproc] Received Image of size 114036 bytes
17,381,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,325 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,843,814 >>> mbox cmd response: success
17,848,005 UART: [afmc] ++
17,848,614 UART: [afmc] CDI.KEYID = 6
17,849,580 UART: [afmc] SUBJECT.KEYID = 7
17,850,799 UART: [afmc] AUTHORITY.KEYID = 5
21,166,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,465,919 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,312 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,160 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,602 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,370 UART: [afmc] --
23,534,079 UART: [cold-reset] --
23,537,618 UART: [state] Locking Datavault
23,542,431 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,183 UART: [state] Locking ICCM
23,546,709 UART: [exit] Launching FMC @ 0x40000130
23,555,102 UART:
23,555,342 UART: Running Caliptra FMC ...
23,556,446 UART:
23,556,603 UART: [state] CFI Enabled
23,564,758 UART: [fht] FMC Alias Private Key: 7
25,895,337 UART: [art] Extend RT PCRs Done
25,896,565 UART: [art] Lock RT PCRs Done
25,898,463 UART: [art] Populate DV Done
25,903,935 UART: [fht] FMC Alias Private Key: 7
25,905,528 UART: [art] Derive CDI
25,906,362 UART: [art] Store in in slot 0x4
25,948,907 UART: [art] Derive Key Pair
25,949,904 UART: [art] Store priv key in slot 0x5
29,191,854 UART: [art] Derive Key Pair - Done
29,205,123 UART: [art] Signing Cert with AUTHO
29,206,421 UART: RITY.KEYID = 7
31,485,629 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,131 UART: [art] PUB.X = 04816E4CE4071B24C04C65EB9CA12FD22AF75E8CC534C7E65A9FB8D78E9F458722DE2167E03F0BDFBF8F438A094D9855
31,494,424 UART: [art] PUB.Y = 82DBF28FF8F6A0199A78EB6088030DAAB0C819AEE8981107B7E1495D6A54EB3703FB0961A6141D9E1A47FDF56A78019E
31,501,631 UART: [art] SIG.R = 754825C1BA7007ECFD6B298C3B30CACB8FAEC2BF2803C1D782262E23031977840DC95631C6CAAD720B7031F9658FDF2C
31,508,982 UART: [art] SIG.S = 2D044A6A5E0CEE5A0FCAE01A9F023618886D1278A3F2A059ED8D42AC4EA7261DEBD45BE515FE39D5CD2EA4A700B67F3A
32,814,257 UART: Caliptra RT
32,814,956 UART: [state] CFI Enabled
32,932,948 UART: [rt] RT listening for mailbox commands...
32,934,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,965,578 UART: [rt]cmd =0x44504543, len=92
32,972,272 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,128,219 ready_for_fw is high
4,128,979 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,078,694 >>> mbox cmd response: success
23,721,609 UART:
23,721,996 UART: Running Caliptra FMC ...
23,723,149 UART:
23,723,315 UART: [state] CFI Enabled
23,731,336 UART: [fht] FMC Alias Private Key: 7
26,061,468 UART: [art] Extend RT PCRs Done
26,062,684 UART: [art] Lock RT PCRs Done
26,064,106 UART: [art] Populate DV Done
26,069,586 UART: [fht] FMC Alias Private Key: 7
26,071,198 UART: [art] Derive CDI
26,072,043 UART: [art] Store in in slot 0x4
26,114,538 UART: [art] Derive Key Pair
26,115,549 UART: [art] Store priv key in slot 0x5
29,357,235 UART: [art] Derive Key Pair - Done
29,370,239 UART: [art] Signing Cert with AUTHO
29,371,548 UART: RITY.KEYID = 7
31,650,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,348 UART: [art] PUB.X = 21A352D9B21E41B434A0FBFB0A63F5E8A25B35A09DEA6A17296D522F2D241B0607B1007D9929BC058218E204A65BA54C
31,659,568 UART: [art] PUB.Y = 478196967A55088DE713D624958EBAF5FD60B4408018DAB497F481DF0A2B1AA0CBDD02007F1D849A551A3A513D4C82C1
31,666,817 UART: [art] SIG.R = 16A9921619DE7B7D0883E29259BCE38BBF22FF962518FE8F6BF5CA2044E4A296898414F447DE9480B20E63E21199824D
31,674,189 UART: [art] SIG.S = ED41BF819D4DD67EF1F7C25BB634B7B3D43E637FD96F1B528048A9ECABF94A8EF6F53CD5866AA38FFC57AB3B5F881DD5
32,979,527 UART: Caliptra RT
32,980,236 UART: [state] CFI Enabled
33,098,186 UART: [rt] RT listening for mailbox commands...
33,100,130 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,130,613 UART: [rt]cmd =0x44504543, len=92
33,136,990 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
192,617 UART:
192,986 UART: Running Caliptra ROM ...
194,182 UART:
194,335 UART: [state] CFI Enabled
264,252 UART: [state] LifecycleState = Unprovisioned
266,170 UART: [state] DebugLocked = No
268,274 UART: [state] WD Timer not started. Device not locked for debugging
271,674 UART: [kat] SHA2-256
450,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,342 UART: [kat] ++
462,797 UART: [kat] sha1
474,584 UART: [kat] SHA2-256
477,578 UART: [kat] SHA2-384
484,147 UART: [kat] SHA2-512-ACC
487,103 UART: [kat] ECC-384
2,947,589 UART: [kat] HMAC-384Kdf
2,972,791 UART: [kat] LMS
3,502,227 UART: [kat] --
3,504,377 UART: [cold-reset] ++
3,505,246 UART: [fht] FHT @ 0x50003400
3,516,840 UART: [idev] ++
3,517,484 UART: [idev] CDI.KEYID = 6
3,518,424 UART: [idev] SUBJECT.KEYID = 7
3,519,531 UART: [idev] UDS.KEYID = 0
3,520,457 ready_for_fw is high
3,520,667 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,382 UART: [idev] Erasing UDS.KEYID = 0
6,041,592 UART: [idev] Sha1 KeyId Algorithm
6,066,237 UART: [idev] --
6,071,536 UART: [ldev] ++
6,072,132 UART: [ldev] CDI.KEYID = 6
6,073,045 UART: [ldev] SUBJECT.KEYID = 5
6,074,370 UART: [ldev] AUTHORITY.KEYID = 7
6,075,568 UART: [ldev] FE.KEYID = 1
6,113,812 UART: [ldev] Erasing FE.KEYID = 1
8,616,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,357,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,166 UART: [ldev] --
10,428,840 UART: [fwproc] Wait for Commands...
10,430,827 UART: [fwproc] Recv command 0x46574c44
10,432,924 UART: [fwproc] Recv'd Img size: 114360 bytes
13,835,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,294,128 >>> mbox cmd response: success
14,298,106 UART: [afmc] ++
14,298,713 UART: [afmc] CDI.KEYID = 6
14,299,628 UART: [afmc] SUBJECT.KEYID = 7
14,300,788 UART: [afmc] AUTHORITY.KEYID = 5
16,843,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,567,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,569,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,585,117 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,601,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,617,000 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,638,808 UART: [afmc] --
18,642,671 UART: [cold-reset] --
18,648,543 UART: [state] Locking Datavault
18,655,201 UART: [state] Locking PCR0, PCR1 and PCR31
18,656,868 UART: [state] Locking ICCM
18,658,262 UART: [exit] Launching FMC @ 0x40000130
18,666,661 UART:
18,666,897 UART: Running Caliptra FMC ...
18,668,004 UART:
18,668,171 UART: [state] CFI Enabled
18,725,784 UART: [fht] FMC Alias Private Key: 7
20,489,942 UART: [art] Extend RT PCRs Done
20,491,165 UART: [art] Lock RT PCRs Done
20,492,791 UART: [art] Populate DV Done
20,498,472 UART: [fht] FMC Alias Private Key: 7
20,500,168 UART: [art] Derive CDI
20,500,987 UART: [art] Store in in slot 0x4
20,559,009 UART: [art] Derive Key Pair
20,560,047 UART: [art] Store priv key in slot 0x5
23,022,721 UART: [art] Derive Key Pair - Done
23,035,460 UART: [art] Signing Cert with AUTHO
23,036,798 UART: RITY.KEYID = 7
24,748,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,750,229 UART: [art] PUB.X = A487EEF40F79816FA1BAF57E9263F2987EBADD91003C99FCAC17FBE4E798EF12544085551DD1F09394BCDB9033D648A1
24,757,439 UART: [art] PUB.Y = 8A93AF70A57882EF4AFC1F3236CC039FDBE9ECBF4F6298DE217CF0EDF8ACA3F66C098D4DED97CC0CBBFF792886539660
24,764,764 UART: [art] SIG.R = 1CEF10E4C7C1458BBAFC3315FDCA2008A1CB2FAB20178693DA854DA3C7E7E4D28063EEDF9B8423F404C1D817ACEB7DCB
24,772,181 UART: [art] SIG.S = A8C3F4424AAD8EE1F4E8B5C65E95A2D5E7D0FB970BF7232A670BB3CB4CDBFF377A4BF6830C776154492E3013EFBB1DFB
25,751,568 UART: Caliptra RT
25,752,269 UART: [state] CFI Enabled
25,917,675 UART: [rt] RT listening for mailbox commands...
25,919,615 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,950,064 UART: [rt]cmd =0x44504543, len=92
25,956,755 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,549 UART:
192,904 UART: Running Caliptra ROM ...
194,047 UART:
194,199 UART: [state] CFI Enabled
266,207 UART: [state] LifecycleState = Unprovisioned
268,577 UART: [state] DebugLocked = No
269,890 UART: [state] WD Timer not started. Device not locked for debugging
274,528 UART: [kat] SHA2-256
464,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,984 UART: [kat] ++
475,430 UART: [kat] sha1
485,570 UART: [kat] SHA2-256
488,603 UART: [kat] SHA2-384
493,532 UART: [kat] SHA2-512-ACC
496,111 UART: [kat] ECC-384
2,949,008 UART: [kat] HMAC-384Kdf
2,963,243 UART: [kat] LMS
3,494,993 UART: [kat] --
3,498,918 UART: [cold-reset] ++
3,499,776 UART: [fht] FHT @ 0x50003400
3,510,408 UART: [idev] ++
3,511,113 UART: [idev] CDI.KEYID = 6
3,512,103 UART: [idev] SUBJECT.KEYID = 7
3,513,219 UART: [idev] UDS.KEYID = 0
3,514,202 ready_for_fw is high
3,514,417 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,658,778 UART: [idev] Erasing UDS.KEYID = 0
6,022,099 UART: [idev] Sha1 KeyId Algorithm
6,042,857 UART: [idev] --
6,047,375 UART: [ldev] ++
6,048,073 UART: [ldev] CDI.KEYID = 6
6,048,965 UART: [ldev] SUBJECT.KEYID = 5
6,050,199 UART: [ldev] AUTHORITY.KEYID = 7
6,051,386 UART: [ldev] FE.KEYID = 1
6,091,963 UART: [ldev] Erasing FE.KEYID = 1
8,594,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,537 UART: [ldev] --
10,407,214 UART: [fwproc] Wait for Commands...
10,409,634 UART: [fwproc] Recv command 0x46574c44
10,411,941 UART: [fwproc] Recv'd Img size: 114360 bytes
13,864,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,896 >>> mbox cmd response: success
14,608,728 UART: [afmc] ++
14,609,446 UART: [afmc] CDI.KEYID = 6
14,610,642 UART: [afmc] SUBJECT.KEYID = 7
14,612,078 UART: [afmc] AUTHORITY.KEYID = 5
17,153,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,583 UART: [afmc] --
18,952,909 UART: [cold-reset] --
18,956,081 UART: [state] Locking Datavault
18,960,489 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,641 UART: [state] Locking ICCM
18,963,935 UART: [exit] Launching FMC @ 0x40000130
18,972,633 UART:
18,972,869 UART: Running Caliptra FMC ...
18,973,971 UART:
18,974,131 UART: [state] CFI Enabled
19,034,327 UART: [fht] FMC Alias Private Key: 7
20,798,302 UART: [art] Extend RT PCRs Done
20,799,524 UART: [art] Lock RT PCRs Done
20,801,015 UART: [art] Populate DV Done
20,806,211 UART: [fht] FMC Alias Private Key: 7
20,807,857 UART: [art] Derive CDI
20,808,672 UART: [art] Store in in slot 0x4
20,866,851 UART: [art] Derive Key Pair
20,867,893 UART: [art] Store priv key in slot 0x5
23,330,980 UART: [art] Derive Key Pair - Done
23,344,081 UART: [art] Signing Cert with AUTHO
23,345,388 UART: RITY.KEYID = 7
25,056,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,512 UART: [art] PUB.X = A6F06158AA216027FFA1116A86A161D1EF82BBEBD9D50B7AF43F8D7C904D396CA7D38F38C910D95FEC1C8ED372F613DA
25,065,744 UART: [art] PUB.Y = 3AFBB0307EBD9AE8DDFEBF901B5716EA2FBD18CB2CE64766FC0E6E38EC548952F4018D79E46A0781EDDF3BC04138B3FF
25,073,065 UART: [art] SIG.R = 52E253BA9A1FCAFE6744D9D100C849C532308FCBD60A8A26F5927119D0901D1AC5C009269156E923581F3C6DF77D43F6
25,080,462 UART: [art] SIG.S = CA7C541992BC4B07054D071F8F0928563792AA394EA73F8925003EE526EBC8C3B9F7CA43D6C8BA6E8014C53C53B3F516
26,059,584 UART: Caliptra RT
26,060,274 UART: [state] CFI Enabled
26,225,818 UART: [rt] RT listening for mailbox commands...
26,227,749 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,258,279 UART: [rt]cmd =0x44504543, len=92
26,264,680 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,434,910 ready_for_fw is high
3,435,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,727,954 >>> mbox cmd response: success
19,022,683 UART:
19,023,085 UART: Running Caliptra FMC ...
19,024,198 UART:
19,024,359 UART: [state] CFI Enabled
19,092,587 UART: [fht] FMC Alias Private Key: 7
20,856,225 UART: [art] Extend RT PCRs Done
20,857,454 UART: [art] Lock RT PCRs Done
20,859,045 UART: [art] Populate DV Done
20,864,683 UART: [fht] FMC Alias Private Key: 7
20,866,394 UART: [art] Derive CDI
20,867,133 UART: [art] Store in in slot 0x4
20,925,092 UART: [art] Derive Key Pair
20,926,158 UART: [art] Store priv key in slot 0x5
23,388,904 UART: [art] Derive Key Pair - Done
23,401,698 UART: [art] Signing Cert with AUTHO
23,403,003 UART: RITY.KEYID = 7
25,114,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,526 UART: [art] PUB.X = 66CFC09AB5866F86D24343678C1A8579B095C8A83C8A427615EC26546B67E067C9528D6A0E3A3D12CF2A82FF325FE96E
25,123,595 UART: [art] PUB.Y = E1D7080371CA1C557338D0136E2DB84E3EAF9E0D0FBAE24B3BF24B8B59E8F1958AF6BEFD19F7FE9AD300FCF936EEF505
25,130,889 UART: [art] SIG.R = EB55650FDF2532D8BC43CD909E962248A6EF2106DB913C8C707D9E03E4E7FD8463454F26B2C9CB5B9B95B5E147895E49
25,138,270 UART: [art] SIG.S = CE228E3A15109E390BEE997EEEE04DD06CCEFB406D781E44D646E2EDFDB06640852070D4BE3F4524458F55F77ABA3F1B
26,117,279 UART: Caliptra RT
26,117,990 UART: [state] CFI Enabled
26,281,962 UART: [rt] RT listening for mailbox commands...
26,283,915 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,314,389 UART: [rt]cmd =0x44504543, len=92
26,321,075 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
193,438 UART:
193,816 UART: Running Caliptra ROM ...
195,000 UART:
604,517 UART: [state] CFI Enabled
618,820 UART: [state] LifecycleState = Unprovisioned
621,184 UART: [state] DebugLocked = No
623,480 UART: [state] WD Timer not started. Device not locked for debugging
628,506 UART: [kat] SHA2-256
818,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,181 UART: [kat] ++
829,700 UART: [kat] sha1
840,569 UART: [kat] SHA2-256
843,584 UART: [kat] SHA2-384
850,642 UART: [kat] SHA2-512-ACC
853,226 UART: [kat] ECC-384
3,297,014 UART: [kat] HMAC-384Kdf
3,310,051 UART: [kat] LMS
3,841,839 UART: [kat] --
3,847,547 UART: [cold-reset] ++
3,849,101 UART: [fht] FHT @ 0x50003400
3,860,156 UART: [idev] ++
3,860,868 UART: [idev] CDI.KEYID = 6
3,861,777 UART: [idev] SUBJECT.KEYID = 7
3,863,019 UART: [idev] UDS.KEYID = 0
3,863,948 ready_for_fw is high
3,864,153 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,851 UART: [idev] Erasing UDS.KEYID = 0
6,342,819 UART: [idev] Sha1 KeyId Algorithm
6,365,245 UART: [idev] --
6,370,645 UART: [ldev] ++
6,371,386 UART: [ldev] CDI.KEYID = 6
6,372,297 UART: [ldev] SUBJECT.KEYID = 5
6,373,453 UART: [ldev] AUTHORITY.KEYID = 7
6,374,697 UART: [ldev] FE.KEYID = 1
6,385,229 UART: [ldev] Erasing FE.KEYID = 1
8,863,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,939 UART: [ldev] --
10,654,244 UART: [fwproc] Wait for Commands...
10,657,044 UART: [fwproc] Recv command 0x46574c44
10,659,359 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,843,916 >>> mbox cmd response: success
14,848,776 UART: [afmc] ++
14,849,512 UART: [afmc] CDI.KEYID = 6
14,850,698 UART: [afmc] SUBJECT.KEYID = 7
14,852,127 UART: [afmc] AUTHORITY.KEYID = 5
17,355,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,091 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,347 UART: [afmc] --
19,149,764 UART: [cold-reset] --
19,153,463 UART: [state] Locking Datavault
19,160,112 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,295 UART: [state] Locking ICCM
19,165,313 UART: [exit] Launching FMC @ 0x40000130
19,173,979 UART:
19,174,233 UART: Running Caliptra FMC ...
19,175,332 UART:
19,175,504 UART: [state] CFI Enabled
19,183,877 UART: [fht] FMC Alias Private Key: 7
20,940,850 UART: [art] Extend RT PCRs Done
20,942,062 UART: [art] Lock RT PCRs Done
20,943,633 UART: [art] Populate DV Done
20,948,935 UART: [fht] FMC Alias Private Key: 7
20,950,576 UART: [art] Derive CDI
20,951,391 UART: [art] Store in in slot 0x4
20,994,145 UART: [art] Derive Key Pair
20,995,180 UART: [art] Store priv key in slot 0x5
23,422,047 UART: [art] Derive Key Pair - Done
23,435,151 UART: [art] Signing Cert with AUTHO
23,436,450 UART: RITY.KEYID = 7
25,141,974 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,498 UART: [art] PUB.X = 1521840AE7EF341221EA66035BC93F040ACE7A1C4ADEB32050AC1C22FCAA14C1ED4789F90288D411AACD699EF526D924
25,150,750 UART: [art] PUB.Y = 51D36C67F08E299970DFD4AD9FD98C6027D354C1D29C4E5D862C6A4D45B13E4B6C23DD5C62203B7F648D3F958DD83813
25,158,032 UART: [art] SIG.R = 2E1E03FF217B331EC3771C09F853382A1DB2821B521059A49D96381C3242E794EE0E20EF023E02676F58963D6E7A0094
25,165,378 UART: [art] SIG.S = 3B0A5045D2DB91756332AB402E37809FC47640777BBF6176714F2DFE6289C146279DF10E0137FAE3FA54E11A0845EECE
26,144,198 UART: Caliptra RT
26,144,883 UART: [state] CFI Enabled
26,262,817 UART: [rt] RT listening for mailbox commands...
26,264,760 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,295,400 UART: [rt]cmd =0x44504543, len=92
26,301,838 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,758,840 ready_for_fw is high
3,759,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,957,018 >>> mbox cmd response: success
19,211,112 UART:
19,211,499 UART: Running Caliptra FMC ...
19,212,628 UART:
19,212,786 UART: [state] CFI Enabled
19,220,670 UART: [fht] FMC Alias Private Key: 7
20,978,285 UART: [art] Extend RT PCRs Done
20,979,509 UART: [art] Lock RT PCRs Done
20,981,242 UART: [art] Populate DV Done
20,986,320 UART: [fht] FMC Alias Private Key: 7
20,987,868 UART: [art] Derive CDI
20,988,685 UART: [art] Store in in slot 0x4
21,031,609 UART: [art] Derive Key Pair
21,032,675 UART: [art] Store priv key in slot 0x5
23,459,504 UART: [art] Derive Key Pair - Done
23,472,606 UART: [art] Signing Cert with AUTHO
23,473,912 UART: RITY.KEYID = 7
25,179,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,749 UART: [art] PUB.X = 431081DCF5639FCF7FBE82C1007186A1466D190DF41A11224C06D087E4144FB25248811B6EF04F7C759DFF6C7A9F5FE5
25,187,955 UART: [art] PUB.Y = AD3C152DE2E4DCE1A3AD208A8C28354098DD58A27FD296832067B01863F2FFC29B44698AB1213C49075A965F67F96FB1
25,195,209 UART: [art] SIG.R = D298736D74FB6AABA1939C721CD0DFE1D06B7C5E3BB338899CF5FEA6DCDAF3D44329557798E31DC1C202B4453AC9B440
25,202,668 UART: [art] SIG.S = 50E0F8B2A50248FA9EAA0B6EE89AF579DD1D641689A163A0D50AD8EC946A864D0D92CB0668C171C3183CF4AFDA291DD0
26,181,426 UART: Caliptra RT
26,182,116 UART: [state] CFI Enabled
26,299,028 UART: [rt] RT listening for mailbox commands...
26,300,973 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,331,672 UART: [rt]cmd =0x44504543, len=92
26,338,121 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,307 UART: [kat] SHA2-256
892,245 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,794 UART: [kat] HMAC-384Kdf
907,588 UART: [kat] LMS
1,475,784 UART: [kat] --
1,476,575 UART: [cold-reset] ++
1,477,045 UART: [fht] Storing FHT @ 0x50003400
1,479,626 UART: [idev] ++
1,479,794 UART: [idev] CDI.KEYID = 6
1,480,154 UART: [idev] SUBJECT.KEYID = 7
1,480,578 UART: [idev] UDS.KEYID = 0
1,480,923 ready_for_fw is high
1,480,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,334 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,772 UART: [ldev] --
1,585,099 UART: [fwproc] Waiting for Commands...
1,585,822 UART: [fwproc] Received command 0x46574c44
1,586,613 UART: [fwproc] Received Image of size 114360 bytes
2,884,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,091 >>> mbox cmd response: success
3,077,349 UART: [afmc] ++
3,077,517 UART: [afmc] CDI.KEYID = 6
3,077,879 UART: [afmc] SUBJECT.KEYID = 7
3,078,304 UART: [afmc] AUTHORITY.KEYID = 5
3,113,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,044 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,734 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,463 UART: [afmc] --
3,156,515 UART: [cold-reset] --
3,157,355 UART: [state] Locking Datavault
3,158,442 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,046 UART: [state] Locking ICCM
3,159,512 UART: [exit] Launching FMC @ 0x40000130
3,164,841 UART:
3,164,857 UART: Running Caliptra FMC ...
3,165,265 UART:
3,165,319 UART: [state] CFI Enabled
3,175,284 UART: [fht] FMC Alias Private Key: 7
3,283,019 UART: [art] Extend RT PCRs Done
3,283,447 UART: [art] Lock RT PCRs Done
3,285,179 UART: [art] Populate DV Done
3,293,286 UART: [fht] FMC Alias Private Key: 7
3,294,392 UART: [art] Derive CDI
3,294,672 UART: [art] Store in in slot 0x4
3,380,315 UART: [art] Derive Key Pair
3,380,675 UART: [art] Store priv key in slot 0x5
3,393,549 UART: [art] Derive Key Pair - Done
3,408,501 UART: [art] Signing Cert with AUTHO
3,408,981 UART: RITY.KEYID = 7
3,423,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,606 UART: [art] PUB.X = 7DBC5412923EF7CA43139B017E3D4D0CEEBC634FB5E5A20AFEAB96F11FC29E95E05A5EA4451C171C0605C88A29512441
3,431,373 UART: [art] PUB.Y = 4E8C8FE35D3C9EC7B059B6AD6B125799706DB25884146CE2ACDCC03CF81EBC3471596E8ADD9970846E28801B506EBB0B
3,438,332 UART: [art] SIG.R = 625AF145D48E52B590D9E7C69D22C18727D595A1A1B26990A09FC676949666DE2773C1BC1C23828D801ACCA9C3A27BF6
3,445,104 UART: [art] SIG.S = 19F1C8E030A5B4837499ADFD91455B51F156949E2FE3B0A9A27F7A0F9F3287B17B5A714F80313FCAF0DCFAF83ADB5292
3,468,804 UART: Caliptra RT
3,469,058 UART: [state] CFI Enabled
3,577,413 UART: [rt] RT listening for mailbox commands...
3,578,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,344 UART: [rt]cmd =0x44504543, len=92
3,615,616 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 ready_for_fw is high
1,362,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,811 >>> mbox cmd response: success
2,990,577 UART:
2,990,593 UART: Running Caliptra FMC ...
2,991,001 UART:
2,991,055 UART: [state] CFI Enabled
3,001,972 UART: [fht] FMC Alias Private Key: 7
3,109,265 UART: [art] Extend RT PCRs Done
3,109,693 UART: [art] Lock RT PCRs Done
3,111,597 UART: [art] Populate DV Done
3,119,736 UART: [fht] FMC Alias Private Key: 7
3,120,844 UART: [art] Derive CDI
3,121,124 UART: [art] Store in in slot 0x4
3,206,865 UART: [art] Derive Key Pair
3,207,225 UART: [art] Store priv key in slot 0x5
3,220,535 UART: [art] Derive Key Pair - Done
3,235,326 UART: [art] Signing Cert with AUTHO
3,235,806 UART: RITY.KEYID = 7
3,251,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,135 UART: [art] PUB.X = 406EC00B6A23E3DE1CF0E0C238F3AC4BBAA99CB794FFE8B0CA241D36177EFF20DF8948A8E99D649D5CBAEB06ACC491DD
3,258,929 UART: [art] PUB.Y = 805D03FCE0CDF4BE113A52ED533DDEFFB002C5D985EE00D0C721EBAF845C81AD8122F9BB55AA3E764A2140B9459CC4D7
3,265,873 UART: [art] SIG.R = 296AE72C8734CD0C4F7D4901BA7D98EBE0AA3BFD0AC0756D41376608A49D933761F6EB82FD59983EDBF4ED9B8C41A42B
3,272,647 UART: [art] SIG.S = B89723BAAB64C8EFA715A9AC5D0B4086F16A3A2B69426FD7864A1DCCCCDF5DBD1ECC9518C65C95C58BB3A2C74E18F5E8
3,296,325 UART: Caliptra RT
3,296,579 UART: [state] CFI Enabled
3,404,529 UART: [rt] RT listening for mailbox commands...
3,405,199 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,254 UART: [rt]cmd =0x44504543, len=92
3,442,474 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,026 UART: [kat] SHA2-256
881,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,072 UART: [kat] ++
886,224 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,145 UART: [kat] SHA2-512-ACC
897,046 UART: [kat] ECC-384
902,591 UART: [kat] HMAC-384Kdf
907,145 UART: [kat] LMS
1,475,341 UART: [kat] --
1,476,082 UART: [cold-reset] ++
1,476,564 UART: [fht] Storing FHT @ 0x50003400
1,479,331 UART: [idev] ++
1,479,499 UART: [idev] CDI.KEYID = 6
1,479,859 UART: [idev] SUBJECT.KEYID = 7
1,480,283 UART: [idev] UDS.KEYID = 0
1,480,628 ready_for_fw is high
1,480,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,311 UART: [idev] Erasing UDS.KEYID = 0
1,505,159 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,717 UART: [idev] --
1,514,622 UART: [ldev] ++
1,514,790 UART: [ldev] CDI.KEYID = 6
1,515,153 UART: [ldev] SUBJECT.KEYID = 5
1,515,579 UART: [ldev] AUTHORITY.KEYID = 7
1,516,042 UART: [ldev] FE.KEYID = 1
1,521,416 UART: [ldev] Erasing FE.KEYID = 1
1,547,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,129 UART: [ldev] --
1,586,476 UART: [fwproc] Waiting for Commands...
1,587,309 UART: [fwproc] Received command 0x46574c44
1,588,100 UART: [fwproc] Received Image of size 114360 bytes
2,885,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,013 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,365 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,186 >>> mbox cmd response: success
3,079,260 UART: [afmc] ++
3,079,428 UART: [afmc] CDI.KEYID = 6
3,079,790 UART: [afmc] SUBJECT.KEYID = 7
3,080,215 UART: [afmc] AUTHORITY.KEYID = 5
3,115,356 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,818 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,703 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,393 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,400 UART: [afmc] --
3,158,278 UART: [cold-reset] --
3,159,204 UART: [state] Locking Datavault
3,160,545 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,149 UART: [state] Locking ICCM
3,161,811 UART: [exit] Launching FMC @ 0x40000130
3,167,140 UART:
3,167,156 UART: Running Caliptra FMC ...
3,167,564 UART:
3,167,707 UART: [state] CFI Enabled
3,178,218 UART: [fht] FMC Alias Private Key: 7
3,285,761 UART: [art] Extend RT PCRs Done
3,286,189 UART: [art] Lock RT PCRs Done
3,287,697 UART: [art] Populate DV Done
3,296,074 UART: [fht] FMC Alias Private Key: 7
3,297,126 UART: [art] Derive CDI
3,297,406 UART: [art] Store in in slot 0x4
3,382,813 UART: [art] Derive Key Pair
3,383,173 UART: [art] Store priv key in slot 0x5
3,396,727 UART: [art] Derive Key Pair - Done
3,411,484 UART: [art] Signing Cert with AUTHO
3,411,964 UART: RITY.KEYID = 7
3,426,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,453 UART: [art] PUB.X = 3AE2BED33321E911B772110F4C6F1A5ED01B7CDF213A64D5FE60D6DF840161987F22C471523C45590266E9150E50369F
3,434,209 UART: [art] PUB.Y = 78E581F7C967280538D324F2E679E9711BF48F766582244A1685A48BF60299A3967C7B8BBC1D685A1BC6147A90CF130D
3,441,144 UART: [art] SIG.R = 7C03917A4A828F1549797A0424E03F332A7BE9A5E08D81F024DB3B58A5FE2EFC3487E2B5BB8DAD4CF89FF7C82E76AF0B
3,447,921 UART: [art] SIG.S = 7F4D5E7116ED4A802A3382FFC2D3E965E799A7D8C8FD941E08E8B923AE2FC3229B5CD38A1F946D8A3DE430C061CDAEFE
3,471,433 UART: Caliptra RT
3,471,779 UART: [state] CFI Enabled
3,580,300 UART: [rt] RT listening for mailbox commands...
3,580,970 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,113 UART: [rt]cmd =0x44504543, len=92
3,618,127 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 ready_for_fw is high
1,363,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,006 >>> mbox cmd response: success
2,990,828 UART:
2,990,844 UART: Running Caliptra FMC ...
2,991,252 UART:
2,991,395 UART: [state] CFI Enabled
3,002,270 UART: [fht] FMC Alias Private Key: 7
3,110,581 UART: [art] Extend RT PCRs Done
3,111,009 UART: [art] Lock RT PCRs Done
3,112,969 UART: [art] Populate DV Done
3,121,106 UART: [fht] FMC Alias Private Key: 7
3,122,244 UART: [art] Derive CDI
3,122,524 UART: [art] Store in in slot 0x4
3,208,137 UART: [art] Derive Key Pair
3,208,497 UART: [art] Store priv key in slot 0x5
3,221,597 UART: [art] Derive Key Pair - Done
3,236,419 UART: [art] Signing Cert with AUTHO
3,236,899 UART: RITY.KEYID = 7
3,252,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,954 UART: [art] PUB.X = 432BAC3FE493985D1C802C239EC2B4837081792FB10C4851446278109A6AE13DCE89603592C2BDE1D6BBB45640E57AF7
3,259,721 UART: [art] PUB.Y = A8E3C5B8571AD0EE6E69D0621873315281209890C20DB0E6EC0AE9A1C5814FDF5341B304E45458D3E8FCD7954EA9CD95
3,266,668 UART: [art] SIG.R = 5B4E1A309CB220A395B0F5A0FA219D1BF7F2CBE6D3437B285EA63090CF06DFD0D5B23ABAE4D6A0B8834E96C7480A716F
3,273,450 UART: [art] SIG.S = 9D9D1195F11396317C71B429C62304A2D8EE5C6BBBF5941574417AE3F2D6348FD35B899ED40DDE81F9CF7265C4278F2C
3,297,275 UART: Caliptra RT
3,297,621 UART: [state] CFI Enabled
3,406,295 UART: [rt] RT listening for mailbox commands...
3,406,965 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,262 UART: [rt]cmd =0x44504543, len=92
3,444,602 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
902,189 UART: [kat] SHA2-256
904,129 UART: [kat] SHA2-384
906,904 UART: [kat] SHA2-512-ACC
908,805 UART: [kat] ECC-384
918,290 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,027 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,162 UART: [idev] ++
1,175,330 UART: [idev] CDI.KEYID = 6
1,175,690 UART: [idev] SUBJECT.KEYID = 7
1,176,114 UART: [idev] UDS.KEYID = 0
1,176,459 ready_for_fw is high
1,176,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,649 UART: [idev] Sha1 KeyId Algorithm
1,209,195 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,462 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,640 >>> mbox cmd response: success
2,774,876 UART: [afmc] ++
2,775,044 UART: [afmc] CDI.KEYID = 6
2,775,406 UART: [afmc] SUBJECT.KEYID = 7
2,775,831 UART: [afmc] AUTHORITY.KEYID = 5
2,810,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,213 UART: [afmc] --
2,854,097 UART: [cold-reset] --
2,854,781 UART: [state] Locking Datavault
2,855,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,498 UART: [state] Locking ICCM
2,857,048 UART: [exit] Launching FMC @ 0x40000130
2,862,377 UART:
2,862,393 UART: Running Caliptra FMC ...
2,862,801 UART:
2,862,855 UART: [state] CFI Enabled
2,873,480 UART: [fht] FMC Alias Private Key: 7
2,981,559 UART: [art] Extend RT PCRs Done
2,981,987 UART: [art] Lock RT PCRs Done
2,983,405 UART: [art] Populate DV Done
2,991,500 UART: [fht] FMC Alias Private Key: 7
2,992,538 UART: [art] Derive CDI
2,992,818 UART: [art] Store in in slot 0x4
3,078,301 UART: [art] Derive Key Pair
3,078,661 UART: [art] Store priv key in slot 0x5
3,091,693 UART: [art] Derive Key Pair - Done
3,106,115 UART: [art] Signing Cert with AUTHO
3,106,595 UART: RITY.KEYID = 7
3,122,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,778 UART: [art] PUB.X = 0D1FB3FF2EECC683D764A4BD2BAF7CBCD04DD8B21989E28485048E1FEA99DE2CF849A08E6AB3A3B11293C0475AC7F9CE
3,129,568 UART: [art] PUB.Y = FFC471BB9637A918C893E8E2370C51D8170B303F3B8B45FFFC45ABDDB623D8AB4FD6E10DBA9E98BD04E8BFC270EA7EC4
3,136,532 UART: [art] SIG.R = 471BD40E1A7D67F9DAFC1856DEF3C4EA34ACBDE6BD49013ED2B578AFFB3A9DCF401D611D11E5D9567F5F5436FE3F0970
3,143,317 UART: [art] SIG.S = F0E7206C08D70F6C15F4D7822DB8AC9BBBD74183A2F3371FCC935E2661D2A49428AD3D2446F7A6AB57B8C2064963204B
3,166,711 UART: Caliptra RT
3,166,965 UART: [state] CFI Enabled
3,272,923 UART: [rt] RT listening for mailbox commands...
3,273,593 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,706 UART: [rt]cmd =0x44504543, len=92
3,310,744 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,077 ready_for_fw is high
1,060,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,727 >>> mbox cmd response: success
2,687,405 UART:
2,687,421 UART: Running Caliptra FMC ...
2,687,829 UART:
2,687,883 UART: [state] CFI Enabled
2,698,416 UART: [fht] FMC Alias Private Key: 7
2,806,345 UART: [art] Extend RT PCRs Done
2,806,773 UART: [art] Lock RT PCRs Done
2,808,383 UART: [art] Populate DV Done
2,816,606 UART: [fht] FMC Alias Private Key: 7
2,817,744 UART: [art] Derive CDI
2,818,024 UART: [art] Store in in slot 0x4
2,903,643 UART: [art] Derive Key Pair
2,904,003 UART: [art] Store priv key in slot 0x5
2,916,871 UART: [art] Derive Key Pair - Done
2,931,595 UART: [art] Signing Cert with AUTHO
2,932,075 UART: RITY.KEYID = 7
2,947,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,292 UART: [art] PUB.X = 0D3A2BBCC5513D524E390A5EA665B757475D262E91C985B08165E8B53D20EA2E42C739BC1FA9BF94A09CFC18FCA5166B
2,955,068 UART: [art] PUB.Y = 9EA8E08EEF484216741F01E5878E35D2EDEFB8FCA9577C2F21AF6679324AF03254C84120C54F74C6CB986D6D178E0D58
2,962,018 UART: [art] SIG.R = 59A6E0AC95A328EC54C365953386B76FEB79150B1433C0B71FB0FCD2038F6048ADC800DDDB875EED31C9EBF40B45C6B5
2,968,771 UART: [art] SIG.S = 8118320DD00D42CA979B45B5A15BB10B207012A99723BEF3FED0F13A2F7029E34B99B3D45807BA881810C605B55E7E25
2,992,443 UART: Caliptra RT
2,992,697 UART: [state] CFI Enabled
3,100,289 UART: [rt] RT listening for mailbox commands...
3,100,959 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,906 UART: [rt]cmd =0x44504543, len=92
3,137,696 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
893,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,466 UART: [kat] ++
897,618 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
923,091 UART: [kat] LMS
1,171,419 UART: [kat] --
1,172,388 UART: [cold-reset] ++
1,172,768 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,863 UART: [idev] Erasing UDS.KEYID = 0
1,201,868 UART: [idev] Sha1 KeyId Algorithm
1,210,222 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,217,766 UART: [ldev] Erasing FE.KEYID = 1
1,243,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,876 UART: [ldev] --
1,283,287 UART: [fwproc] Wait for Commands...
1,283,909 UART: [fwproc] Recv command 0x46574c44
1,284,637 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,175 >>> mbox cmd response: success
2,775,345 UART: [afmc] ++
2,775,513 UART: [afmc] CDI.KEYID = 6
2,775,875 UART: [afmc] SUBJECT.KEYID = 7
2,776,300 UART: [afmc] AUTHORITY.KEYID = 5
2,811,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,880 UART: [afmc] --
2,854,942 UART: [cold-reset] --
2,855,850 UART: [state] Locking Datavault
2,857,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,827 UART: [state] Locking ICCM
2,858,283 UART: [exit] Launching FMC @ 0x40000130
2,863,612 UART:
2,863,628 UART: Running Caliptra FMC ...
2,864,036 UART:
2,864,179 UART: [state] CFI Enabled
2,875,094 UART: [fht] FMC Alias Private Key: 7
2,982,849 UART: [art] Extend RT PCRs Done
2,983,277 UART: [art] Lock RT PCRs Done
2,984,701 UART: [art] Populate DV Done
2,992,800 UART: [fht] FMC Alias Private Key: 7
2,993,928 UART: [art] Derive CDI
2,994,208 UART: [art] Store in in slot 0x4
3,079,941 UART: [art] Derive Key Pair
3,080,301 UART: [art] Store priv key in slot 0x5
3,093,741 UART: [art] Derive Key Pair - Done
3,108,183 UART: [art] Signing Cert with AUTHO
3,108,663 UART: RITY.KEYID = 7
3,124,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,088 UART: [art] PUB.X = D7CC78A55E45CCF63212C23308385B08669197BF987C621C6671CAF47005F4EE7E198E9986FDAA4B778253BAA3C01BCF
3,131,855 UART: [art] PUB.Y = 9E640A3071245CA0E12B9B451CC3B928ADE41DECBF777F91025F9AC282934F77A7B5A2A6281FE183DF1D8BF92965BECD
3,138,813 UART: [art] SIG.R = FF03669E2BBB524B2BEE6E0D25A710029B805810D3B3AD6761A77E6BF27BF5541049B967D4B89973170BF59C7D71A733
3,145,573 UART: [art] SIG.S = 6DC3780BA55FE9D0271B46F9FEC7B83C4CE1038BEB545A572A5468E7B7198995DF9BC2C60AF1AF447AEB851998F7CF30
3,168,971 UART: Caliptra RT
3,169,317 UART: [state] CFI Enabled
3,277,367 UART: [rt] RT listening for mailbox commands...
3,278,037 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,088 UART: [rt]cmd =0x44504543, len=92
3,315,514 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,292 ready_for_fw is high
1,060,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,700 >>> mbox cmd response: success
2,689,280 UART:
2,689,296 UART: Running Caliptra FMC ...
2,689,704 UART:
2,689,847 UART: [state] CFI Enabled
2,700,644 UART: [fht] FMC Alias Private Key: 7
2,808,581 UART: [art] Extend RT PCRs Done
2,809,009 UART: [art] Lock RT PCRs Done
2,810,563 UART: [art] Populate DV Done
2,818,608 UART: [fht] FMC Alias Private Key: 7
2,819,770 UART: [art] Derive CDI
2,820,050 UART: [art] Store in in slot 0x4
2,906,231 UART: [art] Derive Key Pair
2,906,591 UART: [art] Store priv key in slot 0x5
2,919,507 UART: [art] Derive Key Pair - Done
2,934,298 UART: [art] Signing Cert with AUTHO
2,934,778 UART: RITY.KEYID = 7
2,949,856 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,621 UART: [art] PUB.X = CFFB2FAC447EC232A69F04465CE4265C5F282071B55C0E6467C50716921E68D64C4FBAD75784D30CCF6C84C3F7DCED24
2,957,391 UART: [art] PUB.Y = 0B658E4E48C007071ADCE14892F7C749B4F367AA45D157CBA0E6842AB9F94714F9BF896D6CC7605DE57B395B497DB72F
2,964,340 UART: [art] SIG.R = 33923C0FBE50D64EAD2472522C51FDDCE4C47D954DD8CBB631C7C996D78900CB039E6F554F0DFB457D7AEE420BD42673
2,971,090 UART: [art] SIG.S = 08C26061CA59B0A8C674D9AE82C68261F96F12B31E9C19893FBFDA9D04669EC42F3DA955D655C819B686DDA1DD0C7654
2,994,986 UART: Caliptra RT
2,995,332 UART: [state] CFI Enabled
3,102,176 UART: [rt] RT listening for mailbox commands...
3,102,846 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,765 UART: [rt]cmd =0x44504543, len=92
3,139,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,599 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,561 UART: [idev] ++
1,172,729 UART: [idev] CDI.KEYID = 6
1,173,090 UART: [idev] SUBJECT.KEYID = 7
1,173,515 UART: [idev] UDS.KEYID = 0
1,173,861 ready_for_fw is high
1,173,861 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,489 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,629 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,794 UART: [fwproc] Wait for Commands...
1,281,569 UART: [fwproc] Recv command 0x46574c44
1,282,302 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,226 >>> mbox cmd response: success
2,772,445 UART: [afmc] ++
2,772,613 UART: [afmc] CDI.KEYID = 6
2,772,976 UART: [afmc] SUBJECT.KEYID = 7
2,773,402 UART: [afmc] AUTHORITY.KEYID = 5
2,809,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,442 UART: [afmc] --
2,852,352 UART: [cold-reset] --
2,853,436 UART: [state] Locking Datavault
2,854,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,253 UART: [state] Locking ICCM
2,855,861 UART: [exit] Launching FMC @ 0x40000130
2,861,190 UART:
2,861,206 UART: Running Caliptra FMC ...
2,861,614 UART:
2,861,668 UART: [state] CFI Enabled
2,872,117 UART: [fht] FMC Alias Private Key: 7
2,979,838 UART: [art] Extend RT PCRs Done
2,980,266 UART: [art] Lock RT PCRs Done
2,981,800 UART: [art] Populate DV Done
2,990,017 UART: [fht] FMC Alias Private Key: 7
2,991,027 UART: [art] Derive CDI
2,991,307 UART: [art] Store in in slot 0x4
3,077,026 UART: [art] Derive Key Pair
3,077,386 UART: [art] Store priv key in slot 0x5
3,090,430 UART: [art] Derive Key Pair - Done
3,105,325 UART: [art] Signing Cert with AUTHO
3,105,805 UART: RITY.KEYID = 7
3,121,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,860 UART: [art] PUB.X = F92BFD4C371C662FAE0D6278E645B234CCA9FA6F02BB42C37B7DF3260456ED409A55141818EEA9FEDD96FCFF1C862BC4
3,128,641 UART: [art] PUB.Y = E8B9EA45B25987F6910C9B45EA31596BEC7C6A9ACAA2F0E34B53F6909D04CE3B05071CEE6D32887E48B3351FC321EF6C
3,135,593 UART: [art] SIG.R = 852D35129DF711C22D5939C92936E14CE620D202A5112C1FC2B004D7F25CBF60EBC82C0C89AEF297A1E41280BC4CD6FE
3,142,364 UART: [art] SIG.S = 53500158D4E015F92A9973360A6F947391FB6D277B233E5677CD10175DE3C99E1F835E32DA8DA7F31973F940D5B2D632
3,165,937 UART: Caliptra RT
3,166,191 UART: [state] CFI Enabled
3,273,415 UART: [rt] RT listening for mailbox commands...
3,274,085 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,302 UART: [rt]cmd =0x44504543, len=92
3,311,500 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,152 ready_for_fw is high
1,056,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,100 >>> mbox cmd response: success
2,684,676 UART:
2,684,692 UART: Running Caliptra FMC ...
2,685,100 UART:
2,685,154 UART: [state] CFI Enabled
2,695,765 UART: [fht] FMC Alias Private Key: 7
2,803,970 UART: [art] Extend RT PCRs Done
2,804,398 UART: [art] Lock RT PCRs Done
2,806,024 UART: [art] Populate DV Done
2,814,269 UART: [fht] FMC Alias Private Key: 7
2,815,375 UART: [art] Derive CDI
2,815,655 UART: [art] Store in in slot 0x4
2,901,286 UART: [art] Derive Key Pair
2,901,646 UART: [art] Store priv key in slot 0x5
2,914,600 UART: [art] Derive Key Pair - Done
2,929,181 UART: [art] Signing Cert with AUTHO
2,929,661 UART: RITY.KEYID = 7
2,944,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,318 UART: [art] PUB.X = F479073C27AE37FD454D3868013D614E13DC0290235D83C8D5C938F408C4C80EEB5612E2943EAF24A2D43AE6D24D3CDF
2,952,079 UART: [art] PUB.Y = D58E8A706C6E5372FF7F6E10C5BC1CF81DE7A6BF3C4699753CDC0973FF5A283D6E95B988737063DE7B547D4318054719
2,959,027 UART: [art] SIG.R = 8A0219B0CC7583295465943BE201B413ED6AA281A6FBE5B265042FD47058268BFD4221380785BAD0032AFD7D595D4A52
2,965,780 UART: [art] SIG.S = E29D01F246DF3029AE2E43344415326FA444D702307FC893990CA89413CB39573B3506FE00E2CFA3151C15F1C8CCEC07
2,989,714 UART: Caliptra RT
2,989,968 UART: [state] CFI Enabled
3,098,989 UART: [rt] RT listening for mailbox commands...
3,099,659 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,738 UART: [rt]cmd =0x44504543, len=92
3,136,884 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,812 UART: [idev] Sha1 KeyId Algorithm
1,208,562 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,167 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,723 UART: [ldev] --
1,283,179 UART: [fwproc] Wait for Commands...
1,283,786 UART: [fwproc] Recv command 0x46574c44
1,284,519 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,023 >>> mbox cmd response: success
2,775,100 UART: [afmc] ++
2,775,268 UART: [afmc] CDI.KEYID = 6
2,775,631 UART: [afmc] SUBJECT.KEYID = 7
2,776,057 UART: [afmc] AUTHORITY.KEYID = 5
2,811,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,795 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,399 UART: [afmc] --
2,855,477 UART: [cold-reset] --
2,856,417 UART: [state] Locking Datavault
2,857,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,936 UART: [state] Locking ICCM
2,858,548 UART: [exit] Launching FMC @ 0x40000130
2,863,877 UART:
2,863,893 UART: Running Caliptra FMC ...
2,864,301 UART:
2,864,444 UART: [state] CFI Enabled
2,875,211 UART: [fht] FMC Alias Private Key: 7
2,983,184 UART: [art] Extend RT PCRs Done
2,983,612 UART: [art] Lock RT PCRs Done
2,984,980 UART: [art] Populate DV Done
2,993,009 UART: [fht] FMC Alias Private Key: 7
2,994,125 UART: [art] Derive CDI
2,994,405 UART: [art] Store in in slot 0x4
3,079,842 UART: [art] Derive Key Pair
3,080,202 UART: [art] Store priv key in slot 0x5
3,093,494 UART: [art] Derive Key Pair - Done
3,108,567 UART: [art] Signing Cert with AUTHO
3,109,047 UART: RITY.KEYID = 7
3,123,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,626 UART: [art] PUB.X = 32557B58FE8A8D76DF57558CAAC276D89D0FEBAF7595D24C8F9BA155B9C95A9A4348E9DB1937144C934B67ACD9C26CB2
3,131,407 UART: [art] PUB.Y = F8E733610092BFD886A9FF9EA329BCB2EB64CE45AE793E1485D633041F03CFD42EE674AAD51D05B50CCC7E0A2A9897EB
3,138,338 UART: [art] SIG.R = A1A5FFC2D7F6DA12BE2350C57B7C8618447BB1BA6079B6E21CFC209950E378C45400E8680A69ACF164BAC277866AC1E2
3,145,093 UART: [art] SIG.S = A96E4C1F9943D8F36651B1627A02EE2557BF2A87FC7A22D8B13D3680BC0FF9331584949B17060D0C15BFD7E7BE4CC87D
3,168,805 UART: Caliptra RT
3,169,151 UART: [state] CFI Enabled
3,276,910 UART: [rt] RT listening for mailbox commands...
3,277,580 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,739 UART: [rt]cmd =0x44504543, len=92
3,314,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,779 ready_for_fw is high
1,056,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,391 >>> mbox cmd response: success
2,685,487 UART:
2,685,503 UART: Running Caliptra FMC ...
2,685,911 UART:
2,686,054 UART: [state] CFI Enabled
2,696,607 UART: [fht] FMC Alias Private Key: 7
2,804,546 UART: [art] Extend RT PCRs Done
2,804,974 UART: [art] Lock RT PCRs Done
2,806,586 UART: [art] Populate DV Done
2,814,781 UART: [fht] FMC Alias Private Key: 7
2,815,863 UART: [art] Derive CDI
2,816,143 UART: [art] Store in in slot 0x4
2,901,976 UART: [art] Derive Key Pair
2,902,336 UART: [art] Store priv key in slot 0x5
2,916,212 UART: [art] Derive Key Pair - Done
2,930,970 UART: [art] Signing Cert with AUTHO
2,931,450 UART: RITY.KEYID = 7
2,946,522 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,287 UART: [art] PUB.X = 93E9187A8423CA1074E76BF761A63E99331F73F600DD7F7A51D99960A85F27870E43674E3922866E9DB740283796F596
2,954,018 UART: [art] PUB.Y = 9533FE9319BD548F73FA25B7B09BA15E0DE8FC21CBBB55799BF594C69F0F6CDBD1E9C12719642E650BC7D7256880C52D
2,960,971 UART: [art] SIG.R = CAE65AC18EDFB92BDD2D6ACF7E1205F97E608CA288BDA9B0D9826C376CD5B36BAD78F72DFC8C3B32FF2AE9954FEBAD51
2,967,772 UART: [art] SIG.S = 43EE228E667543DE12EBBB55AC214FC07232FDD8C368E392B301D899083B7DCA5A6661D911FD6A0048A523143C0331B1
2,991,686 UART: Caliptra RT
2,992,032 UART: [state] CFI Enabled
3,100,070 UART: [rt] RT listening for mailbox commands...
3,100,740 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,103 UART: [rt]cmd =0x44504543, len=92
3,138,671 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,386 UART:
192,760 UART: Running Caliptra ROM ...
193,860 UART:
193,995 UART: [state] CFI Enabled
268,098 UART: [state] LifecycleState = Unprovisioned
270,115 UART: [state] DebugLocked = No
272,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,585 UART: [kat] SHA2-256
447,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,843 UART: [kat] ++
458,280 UART: [kat] sha1
469,498 UART: [kat] SHA2-256
472,208 UART: [kat] SHA2-384
477,970 UART: [kat] SHA2-512-ACC
480,323 UART: [kat] ECC-384
2,768,186 UART: [kat] HMAC-384Kdf
2,793,011 UART: [kat] LMS
3,983,302 UART: [kat] --
3,988,072 UART: [cold-reset] ++
3,989,004 UART: [fht] Storing FHT @ 0x50003400
4,001,963 UART: [idev] ++
4,002,522 UART: [idev] CDI.KEYID = 6
4,003,530 UART: [idev] SUBJECT.KEYID = 7
4,004,770 UART: [idev] UDS.KEYID = 0
4,005,757 ready_for_fw is high
4,005,953 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,149,373 UART: [idev] Erasing UDS.KEYID = 0
7,337,440 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,806 UART: [idev] --
7,362,638 UART: [ldev] ++
7,363,251 UART: [ldev] CDI.KEYID = 6
7,364,183 UART: [ldev] SUBJECT.KEYID = 5
7,365,380 UART: [ldev] AUTHORITY.KEYID = 7
7,366,658 UART: [ldev] FE.KEYID = 1
7,395,271 UART: [ldev] Erasing FE.KEYID = 1
10,727,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,020,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,035,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,049,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,064,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,305 UART: [ldev] --
13,088,643 UART: [fwproc] Waiting for Commands...
13,091,756 UART: [fwproc] Received command 0x46574c44
13,093,928 UART: [fwproc] Received Image of size 114036 bytes
17,153,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,618,297 >>> mbox cmd response: success
17,622,398 UART: [afmc] ++
17,622,987 UART: [afmc] CDI.KEYID = 6
17,623,952 UART: [afmc] SUBJECT.KEYID = 7
17,625,162 UART: [afmc] AUTHORITY.KEYID = 5
20,978,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,280,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,282,610 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,297,062 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,311,845 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,326,297 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,347,097 UART: [afmc] --
23,351,067 UART: [cold-reset] --
23,353,846 UART: [state] Locking Datavault
23,358,609 UART: [state] Locking PCR0, PCR1 and PCR31
23,360,356 UART: [state] Locking ICCM
23,361,468 UART: [exit] Launching FMC @ 0x40000130
23,369,856 UART:
23,370,084 UART: Running Caliptra FMC ...
23,371,177 UART:
23,371,328 UART: [state] CFI Enabled
23,439,808 UART: [fht] FMC Alias Private Key: 7
25,778,333 UART: [art] Extend RT PCRs Done
25,779,566 UART: [art] Lock RT PCRs Done
25,781,184 UART: [art] Populate DV Done
25,786,699 UART: [fht] FMC Alias Private Key: 7
25,788,400 UART: [art] Derive CDI
25,789,210 UART: [art] Store in in slot 0x4
25,848,090 UART: [art] Derive Key Pair
25,849,085 UART: [art] Store priv key in slot 0x5
29,142,163 UART: [art] Derive Key Pair - Done
29,155,532 UART: [art] Signing Cert with AUTHO
29,156,826 UART: RITY.KEYID = 7
31,443,592 UART: [art] Erasing AUTHORITY.KEYID = 7
31,445,098 UART: [art] PUB.X = A35B661221190896F10EC1820D241D4A1B453805AD8DF0CD23D58BF75AB6F655475C7B0BFC6D859047C5A244A7A3B73F
31,452,564 UART: [art] PUB.Y = 2C7FA4655ABE08B4744DE6907435FFBAE97972835BFDCF65A78390154EB853B5AFB44284C5478829453310D9A8C2C7C1
31,459,618 UART: [art] SIG.R = A640E79CF1F6B43ABF01B6DCABE1F006F7B96C94E6F714FD7B6A9E8FB0F7DA76B6913DC9E4A26828D3C803AD749D76DC
31,467,027 UART: [art] SIG.S = 4DDFDDD3CBB948EE61E99CA9E10FDB770D0D650A55D4D9A4981B2F6F0349A3C014B87E964E01C4AF38A29EFB415B23CD
32,772,459 UART: Caliptra RT
32,773,197 UART: [state] CFI Enabled
32,933,122 UART: [rt] RT listening for mailbox commands...
32,935,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,965,541 UART: [rt]cmd =0x44504543, len=96
33,004,203 >>> mbox cmd response data (56 bytes)
33,005,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,035,633 UART: [rt]cmd =0x44504543, len=96
33,075,579 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,804,660 ready_for_fw is high
3,805,207 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,899,178 >>> mbox cmd response: success
23,586,233 UART:
23,586,721 UART: Running Caliptra FMC ...
23,587,819 UART:
23,587,970 UART: [state] CFI Enabled
23,656,365 UART: [fht] FMC Alias Private Key: 7
25,994,441 UART: [art] Extend RT PCRs Done
25,995,724 UART: [art] Lock RT PCRs Done
25,997,377 UART: [art] Populate DV Done
26,002,943 UART: [fht] FMC Alias Private Key: 7
26,004,632 UART: [art] Derive CDI
26,005,454 UART: [art] Store in in slot 0x4
26,064,825 UART: [art] Derive Key Pair
26,065,819 UART: [art] Store priv key in slot 0x5
29,359,032 UART: [art] Derive Key Pair - Done
29,371,827 UART: [art] Signing Cert with AUTHO
29,373,130 UART: RITY.KEYID = 7
31,660,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,271 UART: [art] PUB.X = 1535AA9DAEDE0E3ACEFADE07B2908A8F59C2EC3C375CD6A9CB84107067D4DDE551D63612877FBA4DAAA17F58C27868EC
31,669,558 UART: [art] PUB.Y = 044D4204908DD3DCB28A83CFA160E3C2FCD7029488371C8EFE86B015C4322AC7CC9EAD00F45A4DD55CC38B72475D03BE
31,676,816 UART: [art] SIG.R = 870AB955B7A6B5E7C716EF02F870006263F47C6F88DD594D6FB9B0065A56CAD35F9FA569BCD43B12B663142A602C35DD
31,684,224 UART: [art] SIG.S = 208115C1DEADA2534F433FC3AF40428B69285C9BF46B00F08A171E6F526558613E7DE02E356C085CA256910F278430AD
32,989,479 UART: Caliptra RT
32,990,195 UART: [state] CFI Enabled
33,150,546 UART: [rt] RT listening for mailbox commands...
33,152,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,183,153 UART: [rt]cmd =0x44504543, len=96
33,222,678 >>> mbox cmd response data (56 bytes)
33,223,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,253,882 UART: [rt]cmd =0x44504543, len=96
33,293,427 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,366 UART:
192,732 UART: Running Caliptra ROM ...
193,869 UART:
603,696 UART: [state] CFI Enabled
614,177 UART: [state] LifecycleState = Unprovisioned
616,125 UART: [state] DebugLocked = No
617,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,109 UART: [kat] SHA2-256
791,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,209 UART: [kat] ++
802,647 UART: [kat] sha1
813,162 UART: [kat] SHA2-256
815,901 UART: [kat] SHA2-384
820,753 UART: [kat] SHA2-512-ACC
823,113 UART: [kat] ECC-384
3,106,963 UART: [kat] HMAC-384Kdf
3,120,113 UART: [kat] LMS
4,310,230 UART: [kat] --
4,314,356 UART: [cold-reset] ++
4,315,422 UART: [fht] Storing FHT @ 0x50003400
4,328,193 UART: [idev] ++
4,328,759 UART: [idev] CDI.KEYID = 6
4,329,710 UART: [idev] SUBJECT.KEYID = 7
4,330,954 UART: [idev] UDS.KEYID = 0
4,331,898 ready_for_fw is high
4,332,089 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,475,659 UART: [idev] Erasing UDS.KEYID = 0
7,617,702 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,875 UART: [idev] --
7,644,109 UART: [ldev] ++
7,644,675 UART: [ldev] CDI.KEYID = 6
7,645,609 UART: [ldev] SUBJECT.KEYID = 5
7,646,819 UART: [ldev] AUTHORITY.KEYID = 7
7,648,102 UART: [ldev] FE.KEYID = 1
7,660,721 UART: [ldev] Erasing FE.KEYID = 1
10,950,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,792 UART: [ldev] --
13,314,371 UART: [fwproc] Waiting for Commands...
13,316,459 UART: [fwproc] Received command 0x46574c44
13,318,633 UART: [fwproc] Received Image of size 114036 bytes
17,365,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,400 >>> mbox cmd response: success
17,834,969 UART: [afmc] ++
17,835,565 UART: [afmc] CDI.KEYID = 6
17,836,446 UART: [afmc] SUBJECT.KEYID = 7
17,837,718 UART: [afmc] AUTHORITY.KEYID = 5
21,150,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,861 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,111 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,490 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,356 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,785 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,835 UART: [afmc] --
23,515,221 UART: [cold-reset] --
23,518,559 UART: [state] Locking Datavault
23,523,639 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,331 UART: [state] Locking ICCM
23,526,913 UART: [exit] Launching FMC @ 0x40000130
23,535,302 UART:
23,535,531 UART: Running Caliptra FMC ...
23,536,554 UART:
23,536,701 UART: [state] CFI Enabled
23,544,772 UART: [fht] FMC Alias Private Key: 7
25,875,739 UART: [art] Extend RT PCRs Done
25,876,955 UART: [art] Lock RT PCRs Done
25,878,602 UART: [art] Populate DV Done
25,884,341 UART: [fht] FMC Alias Private Key: 7
25,886,039 UART: [art] Derive CDI
25,886,774 UART: [art] Store in in slot 0x4
25,929,365 UART: [art] Derive Key Pair
25,930,419 UART: [art] Store priv key in slot 0x5
29,172,357 UART: [art] Derive Key Pair - Done
29,185,735 UART: [art] Signing Cert with AUTHO
29,187,071 UART: RITY.KEYID = 7
31,466,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,657 UART: [art] PUB.X = 5779B5E0C2598B2A19309724080212B3B90723E1743F4300B91A7CF2D46C4DE8C736D4863B291E763BC026C5DBA47526
31,474,923 UART: [art] PUB.Y = EA774161C5123B73B21DB9484893A90B0F82C60D98A70E3301C8B22C4F46D36417114A36CB1146790941F62C8F00BDC4
31,482,112 UART: [art] SIG.R = 9A3607B32542614178BFC2AAAA27843ADFDBAC7FAC39AA56D512B868C6DEDF770BE862982F0CC82892578275425026CF
31,489,454 UART: [art] SIG.S = 7BA5E9D88942452103C2C5D61D7C97EC9B1E9B184B5654DCB00AAF2A747179CCFAA4BEFFD9B0A72198044FE66FD51B12
32,794,714 UART: Caliptra RT
32,795,427 UART: [state] CFI Enabled
32,913,300 UART: [rt] RT listening for mailbox commands...
32,915,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,945,937 UART: [rt]cmd =0x44504543, len=96
32,985,606 >>> mbox cmd response data (56 bytes)
32,986,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,016,802 UART: [rt]cmd =0x44504543, len=96
33,056,027 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
4,124,222 ready_for_fw is high
4,124,605 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,085,564 >>> mbox cmd response: success
23,725,813 UART:
23,726,198 UART: Running Caliptra FMC ...
23,727,402 UART:
23,727,571 UART: [state] CFI Enabled
23,735,261 UART: [fht] FMC Alias Private Key: 7
26,066,460 UART: [art] Extend RT PCRs Done
26,067,686 UART: [art] Lock RT PCRs Done
26,069,323 UART: [art] Populate DV Done
26,074,579 UART: [fht] FMC Alias Private Key: 7
26,076,168 UART: [art] Derive CDI
26,076,911 UART: [art] Store in in slot 0x4
26,119,910 UART: [art] Derive Key Pair
26,120,913 UART: [art] Store priv key in slot 0x5
29,362,806 UART: [art] Derive Key Pair - Done
29,376,140 UART: [art] Signing Cert with AUTHO
29,377,447 UART: RITY.KEYID = 7
31,656,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,269 UART: [art] PUB.X = A73CD319D639BC4CB56AF9D5E496F761919254188CA14A7E1DCD8914D4B2096F3EA5FD55EEB0D300BE557B8A54481773
31,665,499 UART: [art] PUB.Y = DD2D7000ED7FD33E15DE66B224CFD28610B1D9B02D47CFF158A4C07D7D6C45D7BF5461EFAC02A22DD41BC6ADF3EFC0C8
31,672,757 UART: [art] SIG.R = E8F013A1ED5EE35DCA09FB483D72719DE151B90C5BC402755C8816CAFBEA17C66B6D1A4B7BD345CC1ED3E4161573BB4A
31,680,171 UART: [art] SIG.S = DE0903E4408DB4B79A7FB514C4F2F38E3CBD16FC455362570E88AEFEA0719F8D41474F71ADCEB9B22B03C1C43D84C72E
32,984,910 UART: Caliptra RT
32,985,613 UART: [state] CFI Enabled
33,103,167 UART: [rt] RT listening for mailbox commands...
33,105,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,135,747 UART: [rt]cmd =0x44504543, len=96
33,174,097 >>> mbox cmd response data (56 bytes)
33,175,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,205,559 UART: [rt]cmd =0x44504543, len=96
33,245,041 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,642 UART:
193,019 UART: Running Caliptra ROM ...
194,224 UART:
194,385 UART: [state] CFI Enabled
268,134 UART: [state] LifecycleState = Unprovisioned
269,983 UART: [state] DebugLocked = No
271,736 UART: [state] WD Timer not started. Device not locked for debugging
275,483 UART: [kat] SHA2-256
454,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,183 UART: [kat] ++
466,722 UART: [kat] sha1
477,891 UART: [kat] SHA2-256
480,964 UART: [kat] SHA2-384
486,670 UART: [kat] SHA2-512-ACC
489,614 UART: [kat] ECC-384
2,952,004 UART: [kat] HMAC-384Kdf
2,973,646 UART: [kat] LMS
3,503,118 UART: [kat] --
3,506,867 UART: [cold-reset] ++
3,508,589 UART: [fht] FHT @ 0x50003400
3,519,728 UART: [idev] ++
3,520,296 UART: [idev] CDI.KEYID = 6
3,521,333 UART: [idev] SUBJECT.KEYID = 7
3,522,436 UART: [idev] UDS.KEYID = 0
3,523,362 ready_for_fw is high
3,523,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,465 UART: [idev] Erasing UDS.KEYID = 0
6,026,851 UART: [idev] Sha1 KeyId Algorithm
6,050,837 UART: [idev] --
6,054,186 UART: [ldev] ++
6,054,760 UART: [ldev] CDI.KEYID = 6
6,055,674 UART: [ldev] SUBJECT.KEYID = 5
6,056,938 UART: [ldev] AUTHORITY.KEYID = 7
6,058,076 UART: [ldev] FE.KEYID = 1
6,101,517 UART: [ldev] Erasing FE.KEYID = 1
8,604,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,860 UART: [ldev] --
10,414,688 UART: [fwproc] Wait for Commands...
10,416,187 UART: [fwproc] Recv command 0x46574c44
10,418,274 UART: [fwproc] Recv'd Img size: 114360 bytes
13,825,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,286,049 >>> mbox cmd response: success
14,290,395 UART: [afmc] ++
14,290,993 UART: [afmc] CDI.KEYID = 6
14,291,903 UART: [afmc] SUBJECT.KEYID = 7
14,293,064 UART: [afmc] AUTHORITY.KEYID = 5
16,831,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,796 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,724 UART: [afmc] --
18,629,917 UART: [cold-reset] --
18,633,126 UART: [state] Locking Datavault
18,638,316 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,012 UART: [state] Locking ICCM
18,641,328 UART: [exit] Launching FMC @ 0x40000130
18,649,718 UART:
18,649,961 UART: Running Caliptra FMC ...
18,650,996 UART:
18,651,141 UART: [state] CFI Enabled
18,712,385 UART: [fht] FMC Alias Private Key: 7
20,476,573 UART: [art] Extend RT PCRs Done
20,477,795 UART: [art] Lock RT PCRs Done
20,479,284 UART: [art] Populate DV Done
20,484,639 UART: [fht] FMC Alias Private Key: 7
20,486,230 UART: [art] Derive CDI
20,487,043 UART: [art] Store in in slot 0x4
20,545,085 UART: [art] Derive Key Pair
20,546,125 UART: [art] Store priv key in slot 0x5
23,009,667 UART: [art] Derive Key Pair - Done
23,022,616 UART: [art] Signing Cert with AUTHO
23,023,916 UART: RITY.KEYID = 7
24,734,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,369 UART: [art] PUB.X = 808D20FF8C66D2BE8F33883F28A52AB637B80D3C483825F17BFA880D4FC52D31A172FAFE33997A6F094CF9AABDACDABC
24,743,651 UART: [art] PUB.Y = D437482B4DBDA0E752D5C18A1191761026D9B52253AF177CC8CD6FB78B9326A83338EEEA705CD59038A0D09C1AA4550A
24,750,926 UART: [art] SIG.R = 9C31F4FB3130691A7FF574E9F575BD62382C2D168517FFE3C0457E41AF0030D6259B45B7D88B993CBF2ADEC1B25D95C6
24,758,309 UART: [art] SIG.S = F18BFC9FFD5C7BD5CA3C72CF918F949BD4FEF4D39640F3115DF986B9F9F952CD30FB7026511C596A3E21889722460477
25,737,116 UART: Caliptra RT
25,737,828 UART: [state] CFI Enabled
25,904,138 UART: [rt] RT listening for mailbox commands...
25,906,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,936,555 UART: [rt]cmd =0x44504543, len=96
25,976,110 >>> mbox cmd response data (56 bytes)
25,976,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,007,481 UART: [rt]cmd =0x44504543, len=96
26,046,317 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,377 UART:
192,757 UART: Running Caliptra ROM ...
193,891 UART:
194,038 UART: [state] CFI Enabled
262,415 UART: [state] LifecycleState = Unprovisioned
264,769 UART: [state] DebugLocked = No
266,723 UART: [state] WD Timer not started. Device not locked for debugging
270,524 UART: [kat] SHA2-256
460,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,204 UART: [kat] ++
471,740 UART: [kat] sha1
484,108 UART: [kat] SHA2-256
487,107 UART: [kat] SHA2-384
492,881 UART: [kat] SHA2-512-ACC
495,474 UART: [kat] ECC-384
2,947,580 UART: [kat] HMAC-384Kdf
2,973,199 UART: [kat] LMS
3,504,961 UART: [kat] --
3,511,973 UART: [cold-reset] ++
3,512,849 UART: [fht] FHT @ 0x50003400
3,523,120 UART: [idev] ++
3,523,763 UART: [idev] CDI.KEYID = 6
3,524,794 UART: [idev] SUBJECT.KEYID = 7
3,525,972 UART: [idev] UDS.KEYID = 0
3,526,903 ready_for_fw is high
3,527,105 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,041 UART: [idev] Erasing UDS.KEYID = 0
6,029,442 UART: [idev] Sha1 KeyId Algorithm
6,051,107 UART: [idev] --
6,057,108 UART: [ldev] ++
6,057,792 UART: [ldev] CDI.KEYID = 6
6,058,678 UART: [ldev] SUBJECT.KEYID = 5
6,059,913 UART: [ldev] AUTHORITY.KEYID = 7
6,061,050 UART: [ldev] FE.KEYID = 1
6,101,556 UART: [ldev] Erasing FE.KEYID = 1
8,608,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,765 UART: [ldev] --
10,413,867 UART: [fwproc] Wait for Commands...
10,416,345 UART: [fwproc] Recv command 0x46574c44
10,418,660 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,596,777 >>> mbox cmd response: success
14,601,389 UART: [afmc] ++
14,602,098 UART: [afmc] CDI.KEYID = 6
14,603,304 UART: [afmc] SUBJECT.KEYID = 7
14,604,751 UART: [afmc] AUTHORITY.KEYID = 5
17,130,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,855,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,857,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,872,809 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,887,914 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,902,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,926,207 UART: [afmc] --
18,928,898 UART: [cold-reset] --
18,933,040 UART: [state] Locking Datavault
18,938,305 UART: [state] Locking PCR0, PCR1 and PCR31
18,940,516 UART: [state] Locking ICCM
18,943,158 UART: [exit] Launching FMC @ 0x40000130
18,951,861 UART:
18,952,110 UART: Running Caliptra FMC ...
18,953,221 UART:
18,953,383 UART: [state] CFI Enabled
19,012,281 UART: [fht] FMC Alias Private Key: 7
20,776,718 UART: [art] Extend RT PCRs Done
20,777,959 UART: [art] Lock RT PCRs Done
20,779,797 UART: [art] Populate DV Done
20,785,424 UART: [fht] FMC Alias Private Key: 7
20,787,125 UART: [art] Derive CDI
20,787,937 UART: [art] Store in in slot 0x4
20,844,541 UART: [art] Derive Key Pair
20,845,588 UART: [art] Store priv key in slot 0x5
23,308,681 UART: [art] Derive Key Pair - Done
23,321,300 UART: [art] Signing Cert with AUTHO
23,322,601 UART: RITY.KEYID = 7
25,034,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,649 UART: [art] PUB.X = 445F963C7CBA381097EFD9B0FC065860C4464F7DDBBCE1C927D9F579994C30FBE812A0E7550EBF77B65C98234E3C47B7
25,042,935 UART: [art] PUB.Y = F37E83165A4382C7E7BBA67F63CC189BE19129B61FE1ECB8A8CB81A79D1120FAC9DA12212B684396778B23E3D5A1FE01
25,050,211 UART: [art] SIG.R = 84BCB803525E02759A145DAD35738E6009326E527F162DD587ACCD022F57B636E3277CE0F45111CE936B23CB63CC80C2
25,057,590 UART: [art] SIG.S = 36B4F04F1AD129EFB8FE89B655B3A9160BF21220AE4247E7B929FC6E1DD272FB45BC7DA6642D4BF6307A5D5A4B8A94B2
26,036,439 UART: Caliptra RT
26,037,152 UART: [state] CFI Enabled
26,202,865 UART: [rt] RT listening for mailbox commands...
26,204,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,235,478 UART: [rt]cmd =0x44504543, len=96
26,274,767 >>> mbox cmd response data (56 bytes)
26,275,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,306,216 UART: [rt]cmd =0x44504543, len=96
26,346,273 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,439,557 ready_for_fw is high
3,439,931 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,736,361 >>> mbox cmd response: success
19,042,814 UART:
19,043,201 UART: Running Caliptra FMC ...
19,044,314 UART:
19,044,470 UART: [state] CFI Enabled
19,115,405 UART: [fht] FMC Alias Private Key: 7
20,879,223 UART: [art] Extend RT PCRs Done
20,880,445 UART: [art] Lock RT PCRs Done
20,882,416 UART: [art] Populate DV Done
20,887,830 UART: [fht] FMC Alias Private Key: 7
20,889,319 UART: [art] Derive CDI
20,890,072 UART: [art] Store in in slot 0x4
20,948,197 UART: [art] Derive Key Pair
20,949,239 UART: [art] Store priv key in slot 0x5
23,412,086 UART: [art] Derive Key Pair - Done
23,425,090 UART: [art] Signing Cert with AUTHO
23,426,400 UART: RITY.KEYID = 7
25,138,706 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,215 UART: [art] PUB.X = 3B9E6F9C5BB9E9C2301054BA147B0A89540502AD9D2F69CBD8B89B2D3CF260959AC5A6787ED50B71B7ADE2D629398CFE
25,147,487 UART: [art] PUB.Y = 0589E7998821F8D97D4B8D3FA328BCD01B9BC650DC6231E50C95BA7B5CADF4D27DF11DB8FA31E7F3DE1CF00D50E0DE3C
25,154,762 UART: [art] SIG.R = C343259079F12C814A4BD5E4EF4E213844C8DABDFB28CF6521C80944F8D274870A1237CD91A5CFD8105B5743A845E5F0
25,162,127 UART: [art] SIG.S = 82BADE4BBFECF8EDF344696D9E9E2006AA3AAE2A5CFB9C22DE9D6D8C81F2CA2AE0C9C50448BEA5666C3A16A006D6FD26
26,140,717 UART: Caliptra RT
26,141,424 UART: [state] CFI Enabled
26,306,901 UART: [rt] RT listening for mailbox commands...
26,308,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,517 UART: [rt]cmd =0x44504543, len=96
26,378,830 >>> mbox cmd response data (56 bytes)
26,379,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,410,330 UART: [rt]cmd =0x44504543, len=96
26,450,139 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,488 UART:
192,858 UART: Running Caliptra ROM ...
194,065 UART:
603,854 UART: [state] CFI Enabled
616,944 UART: [state] LifecycleState = Unprovisioned
619,316 UART: [state] DebugLocked = No
620,771 UART: [state] WD Timer not started. Device not locked for debugging
624,518 UART: [kat] SHA2-256
814,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,128 UART: [kat] ++
825,646 UART: [kat] sha1
837,311 UART: [kat] SHA2-256
840,357 UART: [kat] SHA2-384
846,637 UART: [kat] SHA2-512-ACC
849,220 UART: [kat] ECC-384
3,291,270 UART: [kat] HMAC-384Kdf
3,303,439 UART: [kat] LMS
3,835,255 UART: [kat] --
3,839,549 UART: [cold-reset] ++
3,840,988 UART: [fht] FHT @ 0x50003400
3,853,668 UART: [idev] ++
3,854,372 UART: [idev] CDI.KEYID = 6
3,855,279 UART: [idev] SUBJECT.KEYID = 7
3,856,523 UART: [idev] UDS.KEYID = 0
3,857,712 ready_for_fw is high
3,857,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,541 UART: [idev] Erasing UDS.KEYID = 0
6,332,862 UART: [idev] Sha1 KeyId Algorithm
6,354,950 UART: [idev] --
6,359,986 UART: [ldev] ++
6,360,663 UART: [ldev] CDI.KEYID = 6
6,361,582 UART: [ldev] SUBJECT.KEYID = 5
6,362,734 UART: [ldev] AUTHORITY.KEYID = 7
6,363,959 UART: [ldev] FE.KEYID = 1
6,377,696 UART: [ldev] Erasing FE.KEYID = 1
8,855,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,226 UART: [ldev] --
10,646,054 UART: [fwproc] Wait for Commands...
10,648,142 UART: [fwproc] Recv command 0x46574c44
10,650,393 UART: [fwproc] Recv'd Img size: 114360 bytes
14,094,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,827,597 >>> mbox cmd response: success
14,832,580 UART: [afmc] ++
14,833,316 UART: [afmc] CDI.KEYID = 6
14,834,533 UART: [afmc] SUBJECT.KEYID = 7
14,835,977 UART: [afmc] AUTHORITY.KEYID = 5
17,341,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,403 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,469 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,362 UART: [afmc] --
19,139,383 UART: [cold-reset] --
19,142,323 UART: [state] Locking Datavault
19,146,970 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,160 UART: [state] Locking ICCM
19,150,593 UART: [exit] Launching FMC @ 0x40000130
19,159,272 UART:
19,159,510 UART: Running Caliptra FMC ...
19,160,627 UART:
19,160,785 UART: [state] CFI Enabled
19,168,613 UART: [fht] FMC Alias Private Key: 7
20,925,020 UART: [art] Extend RT PCRs Done
20,926,243 UART: [art] Lock RT PCRs Done
20,927,983 UART: [art] Populate DV Done
20,933,446 UART: [fht] FMC Alias Private Key: 7
20,935,042 UART: [art] Derive CDI
20,935,805 UART: [art] Store in in slot 0x4
20,978,396 UART: [art] Derive Key Pair
20,979,393 UART: [art] Store priv key in slot 0x5
23,406,105 UART: [art] Derive Key Pair - Done
23,418,835 UART: [art] Signing Cert with AUTHO
23,420,130 UART: RITY.KEYID = 7
25,125,945 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,448 UART: [art] PUB.X = B5178C0AE54C450BCFCA1F8600E264CA66BB100F4162B9A0AF5A79207A0A6F494265A8AD036E80D4D6C2A6A6A83FD907
25,134,712 UART: [art] PUB.Y = E83B6D04F16B7A85687E904C827C18660069E27D808738308B50897FDF95A7D6C784D883209BAF03FB9B66CF8414CDAF
25,141,950 UART: [art] SIG.R = 60D6F35532BA764B180252A7B25C8667376D08749A539F8E61389E6B09B9F3758D1E8CD39AEEBF4049440A6705E3619A
25,149,298 UART: [art] SIG.S = 423BFD4DA51BA1831961D2AE4CA318DBC51EF0974935A8F00A48FA912032BEE7BDC6C3E9123ECA7FBF79EBE122724F95
26,128,136 UART: Caliptra RT
26,128,850 UART: [state] CFI Enabled
26,246,075 UART: [rt] RT listening for mailbox commands...
26,248,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,278,498 UART: [rt]cmd =0x44504543, len=96
26,318,375 >>> mbox cmd response data (56 bytes)
26,319,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,350,059 UART: [rt]cmd =0x44504543, len=96
26,388,922 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,755,815 ready_for_fw is high
3,756,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,948,506 >>> mbox cmd response: success
19,203,631 UART:
19,204,024 UART: Running Caliptra FMC ...
19,205,134 UART:
19,205,290 UART: [state] CFI Enabled
19,213,519 UART: [fht] FMC Alias Private Key: 7
20,970,605 UART: [art] Extend RT PCRs Done
20,971,835 UART: [art] Lock RT PCRs Done
20,973,330 UART: [art] Populate DV Done
20,978,803 UART: [fht] FMC Alias Private Key: 7
20,980,451 UART: [art] Derive CDI
20,981,194 UART: [art] Store in in slot 0x4
21,023,522 UART: [art] Derive Key Pair
21,024,568 UART: [art] Store priv key in slot 0x5
23,451,000 UART: [art] Derive Key Pair - Done
23,464,107 UART: [art] Signing Cert with AUTHO
23,465,408 UART: RITY.KEYID = 7
25,170,670 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,179 UART: [art] PUB.X = 4D348D31D1E1B073FD3624851691D4524F9B0D082AF7B4625948CB25FD94AD980BF52B31B8F1885886F2A5CE0169AA47
25,179,395 UART: [art] PUB.Y = FEF8CD63F5AFD836E90A97213569E2F23385FCBD6BFE590FEF19CC7CDB96EF7BDB3B7C8F0B7AF73DC4B3174C67BC65C7
25,186,711 UART: [art] SIG.R = 1DC17A0FD3238EE897A80A2EEE5618F3C8C545B825A658D181FC5082751C52CAF6C05A7C8215C957F563AEDC80C096BF
25,194,113 UART: [art] SIG.S = C37D5D2CFBC428050FFB9A9A2D1EC9417FEF5E16DBA829C3FEFBF83E871FD08E1810E42D7E64ADC7F4FB963E904B389C
26,173,307 UART: Caliptra RT
26,174,015 UART: [state] CFI Enabled
26,291,256 UART: [rt] RT listening for mailbox commands...
26,293,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,324,046 UART: [rt]cmd =0x44504543, len=96
26,363,799 >>> mbox cmd response data (56 bytes)
26,364,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,395,105 UART: [rt]cmd =0x44504543, len=96
26,434,695 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,946 UART: [kat] HMAC-384Kdf
907,562 UART: [kat] LMS
1,475,758 UART: [kat] --
1,476,771 UART: [cold-reset] ++
1,477,217 UART: [fht] Storing FHT @ 0x50003400
1,479,946 UART: [idev] ++
1,480,114 UART: [idev] CDI.KEYID = 6
1,480,474 UART: [idev] SUBJECT.KEYID = 7
1,480,898 UART: [idev] UDS.KEYID = 0
1,481,243 ready_for_fw is high
1,481,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,974 UART: [idev] Erasing UDS.KEYID = 0
1,505,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,268 UART: [idev] --
1,515,355 UART: [ldev] ++
1,515,523 UART: [ldev] CDI.KEYID = 6
1,515,886 UART: [ldev] SUBJECT.KEYID = 5
1,516,312 UART: [ldev] AUTHORITY.KEYID = 7
1,516,775 UART: [ldev] FE.KEYID = 1
1,521,845 UART: [ldev] Erasing FE.KEYID = 1
1,548,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,758 UART: [ldev] --
1,588,243 UART: [fwproc] Waiting for Commands...
1,589,060 UART: [fwproc] Received command 0x46574c44
1,589,851 UART: [fwproc] Received Image of size 114360 bytes
2,887,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,538 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,895 >>> mbox cmd response: success
3,081,087 UART: [afmc] ++
3,081,255 UART: [afmc] CDI.KEYID = 6
3,081,617 UART: [afmc] SUBJECT.KEYID = 7
3,082,042 UART: [afmc] AUTHORITY.KEYID = 5
3,117,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,678 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,368 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,201 UART: [afmc] --
3,160,215 UART: [cold-reset] --
3,160,961 UART: [state] Locking Datavault
3,162,122 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,726 UART: [state] Locking ICCM
3,163,174 UART: [exit] Launching FMC @ 0x40000130
3,168,503 UART:
3,168,519 UART: Running Caliptra FMC ...
3,168,927 UART:
3,168,981 UART: [state] CFI Enabled
3,179,532 UART: [fht] FMC Alias Private Key: 7
3,287,837 UART: [art] Extend RT PCRs Done
3,288,265 UART: [art] Lock RT PCRs Done
3,289,799 UART: [art] Populate DV Done
3,297,832 UART: [fht] FMC Alias Private Key: 7
3,298,922 UART: [art] Derive CDI
3,299,202 UART: [art] Store in in slot 0x4
3,385,059 UART: [art] Derive Key Pair
3,385,419 UART: [art] Store priv key in slot 0x5
3,398,545 UART: [art] Derive Key Pair - Done
3,413,050 UART: [art] Signing Cert with AUTHO
3,413,530 UART: RITY.KEYID = 7
3,428,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,403 UART: [art] PUB.X = C4A81370A741266E9CA44F6273A7EB5F1781F2C0765CB5DD1544AAF9C140A09C0B701AA4DD78AB031D6B72E768F7AD0F
3,436,176 UART: [art] PUB.Y = CF5504473A6DBC434D87CBD9F8D480C1F5E9B42A77C5BCD619EE9643A6CDB5D9DE8B35885C17FE64B5978FA5BD5DDFCA
3,443,149 UART: [art] SIG.R = D5332E08BBBDB97CBD1607D080BC1176272DD6BFFD9A876341A959E552D7B2A29AA337E8592D810F34F83DB163CBBCCC
3,449,926 UART: [art] SIG.S = 6F8D76D8C1DE05F2BFACE80189D0A9C9DDE954D39195DC9957D3E3FB055EDD6DAA5C1FEE37960B10B9710AA0AB224187
3,473,526 UART: Caliptra RT
3,473,780 UART: [state] CFI Enabled
3,581,642 UART: [rt] RT listening for mailbox commands...
3,582,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,505 UART: [rt]cmd =0x44504543, len=96
3,652,858 >>> mbox cmd response data (56 bytes)
3,652,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,610 UART: [rt]cmd =0x44504543, len=96
3,723,228 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 ready_for_fw is high
1,362,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,025 >>> mbox cmd response: success
2,987,981 UART:
2,987,997 UART: Running Caliptra FMC ...
2,988,405 UART:
2,988,459 UART: [state] CFI Enabled
2,998,836 UART: [fht] FMC Alias Private Key: 7
3,107,451 UART: [art] Extend RT PCRs Done
3,107,879 UART: [art] Lock RT PCRs Done
3,109,367 UART: [art] Populate DV Done
3,117,758 UART: [fht] FMC Alias Private Key: 7
3,118,860 UART: [art] Derive CDI
3,119,140 UART: [art] Store in in slot 0x4
3,204,513 UART: [art] Derive Key Pair
3,204,873 UART: [art] Store priv key in slot 0x5
3,219,071 UART: [art] Derive Key Pair - Done
3,233,833 UART: [art] Signing Cert with AUTHO
3,234,313 UART: RITY.KEYID = 7
3,250,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,842 UART: [art] PUB.X = 785D25A7A671921AC0332327961FFC8505C2625DE0EC1C9F723A570B9543A88ED0E47B890FBFBD5E49174EF59DD7F24C
3,257,609 UART: [art] PUB.Y = 67B4FBCC9CD55EA2A1FFBA011B856A024FAA97D81F5F8CCD882AE2DFA00A01699747F48403AC9E5206AAD7208F512F85
3,264,559 UART: [art] SIG.R = A9139FF7D09F15D9B7EDEA0D98F0CF8272481712F5187F8DFF2529AEBE5BFF6F0B41764640ABF54F765DA00B2935CCC7
3,271,336 UART: [art] SIG.S = E1F93E21897092671263AE7AECF52E8197D4C8AB3C4ECF51C0A6D973DB205CA13C1647336A1BE0ED26533582115B510A
3,295,120 UART: Caliptra RT
3,295,374 UART: [state] CFI Enabled
3,402,307 UART: [rt] RT listening for mailbox commands...
3,402,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,000 UART: [rt]cmd =0x44504543, len=96
3,473,795 >>> mbox cmd response data (56 bytes)
3,473,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,837 UART: [rt]cmd =0x44504543, len=96
3,543,659 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,872 UART: [kat] SHA2-256
882,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,918 UART: [kat] ++
887,070 UART: [kat] sha1
891,226 UART: [kat] SHA2-256
893,164 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
903,195 UART: [kat] HMAC-384Kdf
907,759 UART: [kat] LMS
1,475,955 UART: [kat] --
1,476,758 UART: [cold-reset] ++
1,477,334 UART: [fht] Storing FHT @ 0x50003400
1,480,265 UART: [idev] ++
1,480,433 UART: [idev] CDI.KEYID = 6
1,480,793 UART: [idev] SUBJECT.KEYID = 7
1,481,217 UART: [idev] UDS.KEYID = 0
1,481,562 ready_for_fw is high
1,481,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,325 UART: [idev] Erasing UDS.KEYID = 0
1,506,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,755 UART: [idev] --
1,515,968 UART: [ldev] ++
1,516,136 UART: [ldev] CDI.KEYID = 6
1,516,499 UART: [ldev] SUBJECT.KEYID = 5
1,516,925 UART: [ldev] AUTHORITY.KEYID = 7
1,517,388 UART: [ldev] FE.KEYID = 1
1,522,634 UART: [ldev] Erasing FE.KEYID = 1
1,547,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,901 UART: [ldev] --
1,587,200 UART: [fwproc] Waiting for Commands...
1,588,061 UART: [fwproc] Received command 0x46574c44
1,588,852 UART: [fwproc] Received Image of size 114360 bytes
2,886,023 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,915 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,268 >>> mbox cmd response: success
3,080,438 UART: [afmc] ++
3,080,606 UART: [afmc] CDI.KEYID = 6
3,080,968 UART: [afmc] SUBJECT.KEYID = 7
3,081,393 UART: [afmc] AUTHORITY.KEYID = 5
3,116,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,148 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,541 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,231 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,158 UART: [afmc] --
3,160,198 UART: [cold-reset] --
3,161,026 UART: [state] Locking Datavault
3,162,209 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,813 UART: [state] Locking ICCM
3,163,257 UART: [exit] Launching FMC @ 0x40000130
3,168,586 UART:
3,168,602 UART: Running Caliptra FMC ...
3,169,010 UART:
3,169,153 UART: [state] CFI Enabled
3,180,152 UART: [fht] FMC Alias Private Key: 7
3,288,243 UART: [art] Extend RT PCRs Done
3,288,671 UART: [art] Lock RT PCRs Done
3,290,129 UART: [art] Populate DV Done
3,298,134 UART: [fht] FMC Alias Private Key: 7
3,299,116 UART: [art] Derive CDI
3,299,396 UART: [art] Store in in slot 0x4
3,384,935 UART: [art] Derive Key Pair
3,385,295 UART: [art] Store priv key in slot 0x5
3,398,781 UART: [art] Derive Key Pair - Done
3,413,451 UART: [art] Signing Cert with AUTHO
3,413,931 UART: RITY.KEYID = 7
3,429,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,916 UART: [art] PUB.X = 181CCB31952C27524C945EBBBF58A1DC1DAA61A596C4366858999DC573DC99DFE7F235CFD5BBC6634060E5F04BA04DE6
3,436,700 UART: [art] PUB.Y = DC9494A823DAB409E67662C979E6A5758C11B0023D1730CDC55CF565E97B4A13F458CFC528259BAEF19CC6CBE879E02D
3,443,654 UART: [art] SIG.R = FA072B3FA7828D1B39550822D7E0B651F6F3B2B588ACC83C2AB31D17A1BEB0947DD6A7CF663FFF0239650D5A174E24C3
3,450,424 UART: [art] SIG.S = D7056C28660D6F7853212C0644E1F1595765D5A8D224133AE310916C15497828737C4179CA25C4F492954EE182B6DBAC
3,474,612 UART: Caliptra RT
3,474,958 UART: [state] CFI Enabled
3,582,301 UART: [rt] RT listening for mailbox commands...
3,582,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,850 UART: [rt]cmd =0x44504543, len=96
3,653,039 >>> mbox cmd response data (56 bytes)
3,653,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,119 UART: [rt]cmd =0x44504543, len=96
3,723,421 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 ready_for_fw is high
1,363,090 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,326 >>> mbox cmd response: success
2,990,194 UART:
2,990,210 UART: Running Caliptra FMC ...
2,990,618 UART:
2,990,761 UART: [state] CFI Enabled
3,001,176 UART: [fht] FMC Alias Private Key: 7
3,108,973 UART: [art] Extend RT PCRs Done
3,109,401 UART: [art] Lock RT PCRs Done
3,110,693 UART: [art] Populate DV Done
3,118,818 UART: [fht] FMC Alias Private Key: 7
3,119,896 UART: [art] Derive CDI
3,120,176 UART: [art] Store in in slot 0x4
3,206,009 UART: [art] Derive Key Pair
3,206,369 UART: [art] Store priv key in slot 0x5
3,219,273 UART: [art] Derive Key Pair - Done
3,233,788 UART: [art] Signing Cert with AUTHO
3,234,268 UART: RITY.KEYID = 7
3,249,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,179 UART: [art] PUB.X = 277B406D037926A0982DF29D55C2F82E3874263B3F25083190534FA9F9A48C7E27E338336065CA91333EB390A861D07B
3,256,931 UART: [art] PUB.Y = 3DD10B00E00705ED18C98FA4305BEAB4C8C12D62E34CF6751992FE61E25570F61E63165B646EEC072AB8FB8D88EEC079
3,263,857 UART: [art] SIG.R = 0C1F750128E9F4A222AB4BF3776523788E03E3BF8ACD020855C83DE98308A0F4457926929D9CF31033F9D55BC6CA4A74
3,270,609 UART: [art] SIG.S = 51E23BE7304F1A95E1731E81FC8E88F103A9369A86F03AD4F40DB14C79A2C5B6ADEED1A5638A0299D452CF83D393BB6F
3,294,549 UART: Caliptra RT
3,294,895 UART: [state] CFI Enabled
3,403,056 UART: [rt] RT listening for mailbox commands...
3,403,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,845 UART: [rt]cmd =0x44504543, len=96
3,473,306 >>> mbox cmd response data (56 bytes)
3,473,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,220 UART: [rt]cmd =0x44504543, len=96
3,543,496 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,112 UART: [kat] SHA2-256
892,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,887 UART: [kat] ++
897,039 UART: [kat] sha1
901,171 UART: [kat] SHA2-256
903,111 UART: [kat] SHA2-384
905,812 UART: [kat] SHA2-512-ACC
907,713 UART: [kat] ECC-384
917,680 UART: [kat] HMAC-384Kdf
922,268 UART: [kat] LMS
1,170,596 UART: [kat] --
1,171,243 UART: [cold-reset] ++
1,171,653 UART: [fht] FHT @ 0x50003400
1,174,296 UART: [idev] ++
1,174,464 UART: [idev] CDI.KEYID = 6
1,174,824 UART: [idev] SUBJECT.KEYID = 7
1,175,248 UART: [idev] UDS.KEYID = 0
1,175,593 ready_for_fw is high
1,175,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,538 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,503 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,264 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,704 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,363 >>> mbox cmd response: success
2,773,441 UART: [afmc] ++
2,773,609 UART: [afmc] CDI.KEYID = 6
2,773,971 UART: [afmc] SUBJECT.KEYID = 7
2,774,396 UART: [afmc] AUTHORITY.KEYID = 5
2,809,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,571 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,980 UART: [afmc] --
2,853,064 UART: [cold-reset] --
2,853,750 UART: [state] Locking Datavault
2,854,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,491 UART: [state] Locking ICCM
2,855,911 UART: [exit] Launching FMC @ 0x40000130
2,861,240 UART:
2,861,256 UART: Running Caliptra FMC ...
2,861,664 UART:
2,861,718 UART: [state] CFI Enabled
2,872,253 UART: [fht] FMC Alias Private Key: 7
2,979,868 UART: [art] Extend RT PCRs Done
2,980,296 UART: [art] Lock RT PCRs Done
2,981,720 UART: [art] Populate DV Done
2,989,991 UART: [fht] FMC Alias Private Key: 7
2,991,169 UART: [art] Derive CDI
2,991,449 UART: [art] Store in in slot 0x4
3,076,932 UART: [art] Derive Key Pair
3,077,292 UART: [art] Store priv key in slot 0x5
3,090,036 UART: [art] Derive Key Pair - Done
3,104,826 UART: [art] Signing Cert with AUTHO
3,105,306 UART: RITY.KEYID = 7
3,120,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,163 UART: [art] PUB.X = C1DAE1E2F2B0C3A5073EBD54038A94EEE32E09C0F6C8F8C1D5831E95957EBA33A3880A00D65D5DFBC965C2C614ADFF9B
3,127,921 UART: [art] PUB.Y = E11B3E70DF99D97EDD459467C8EAFD28B98A23D94712EE9B73A3FA0460D60F41E2AAADB0CA9786D81BE47AAE7942341E
3,134,883 UART: [art] SIG.R = 5309B9903159313B2AF38FF7A00A784EA59381229B499F074BDE872D39E2B21906EBA434177513794E698E63CD26DADE
3,141,637 UART: [art] SIG.S = A1F19A1E03740B5EE70E6BD94348E7D30D8A486EC07E90CBD52690A703F73425AFF1D4BF874043F50DC95A8324E3C926
3,165,522 UART: Caliptra RT
3,165,776 UART: [state] CFI Enabled
3,274,648 UART: [rt] RT listening for mailbox commands...
3,275,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,483 UART: [rt]cmd =0x44504543, len=96
3,346,036 >>> mbox cmd response data (56 bytes)
3,346,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,830 UART: [rt]cmd =0x44504543, len=96
3,416,906 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,557 >>> mbox cmd response: success
2,687,705 UART:
2,687,721 UART: Running Caliptra FMC ...
2,688,129 UART:
2,688,183 UART: [state] CFI Enabled
2,698,954 UART: [fht] FMC Alias Private Key: 7
2,807,007 UART: [art] Extend RT PCRs Done
2,807,435 UART: [art] Lock RT PCRs Done
2,808,987 UART: [art] Populate DV Done
2,817,208 UART: [fht] FMC Alias Private Key: 7
2,818,144 UART: [art] Derive CDI
2,818,424 UART: [art] Store in in slot 0x4
2,903,597 UART: [art] Derive Key Pair
2,903,957 UART: [art] Store priv key in slot 0x5
2,916,741 UART: [art] Derive Key Pair - Done
2,931,675 UART: [art] Signing Cert with AUTHO
2,932,155 UART: RITY.KEYID = 7
2,947,779 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,544 UART: [art] PUB.X = 5A251DAB18751D6E8DE9A4A4E26A9E0BB527D7C3FF4B7DCD74547C146E364EAC979206C3C506C53D6C647FC3D0CA434E
2,955,321 UART: [art] PUB.Y = 9C6C180C48FBC3F1B4021D0650C348E4363DE8B86476E1EEAC6FC720516E3323C565D2A42838C5ECF777B36C10C12B53
2,962,266 UART: [art] SIG.R = D4FF71C09A33ABAB5C0FA5F072E944AFA37235CB824E493925E0D845DC8D123703F68306B82DA9D2111B6F92FAAC6D9D
2,969,041 UART: [art] SIG.S = 43B07FC5897B7257BE22A10B7B9F28B036BF9BCB576D01EF9D99C3086CF0AE6053601FF33EAA8A99C30EE042AB432D49
2,993,442 UART: Caliptra RT
2,993,696 UART: [state] CFI Enabled
3,101,274 UART: [rt] RT listening for mailbox commands...
3,101,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,135 UART: [rt]cmd =0x44504543, len=96
3,172,154 >>> mbox cmd response data (56 bytes)
3,172,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,202,158 UART: [rt]cmd =0x44504543, len=96
3,242,572 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,390 UART: [kat] SHA2-256
904,330 UART: [kat] SHA2-384
907,123 UART: [kat] SHA2-512-ACC
909,024 UART: [kat] ECC-384
918,909 UART: [kat] HMAC-384Kdf
923,569 UART: [kat] LMS
1,171,897 UART: [kat] --
1,172,734 UART: [cold-reset] ++
1,173,230 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 ready_for_fw is high
1,177,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,199 UART: [idev] Erasing UDS.KEYID = 0
1,202,054 UART: [idev] Sha1 KeyId Algorithm
1,210,490 UART: [idev] --
1,211,628 UART: [ldev] ++
1,211,796 UART: [ldev] CDI.KEYID = 6
1,212,159 UART: [ldev] SUBJECT.KEYID = 5
1,212,585 UART: [ldev] AUTHORITY.KEYID = 7
1,213,048 UART: [ldev] FE.KEYID = 1
1,218,394 UART: [ldev] Erasing FE.KEYID = 1
1,245,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,092 UART: [ldev] --
1,284,417 UART: [fwproc] Wait for Commands...
1,285,127 UART: [fwproc] Recv command 0x46574c44
1,285,855 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,935 >>> mbox cmd response: success
2,778,147 UART: [afmc] ++
2,778,315 UART: [afmc] CDI.KEYID = 6
2,778,677 UART: [afmc] SUBJECT.KEYID = 7
2,779,102 UART: [afmc] AUTHORITY.KEYID = 5
2,814,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,058 UART: [afmc] --
2,857,988 UART: [cold-reset] --
2,858,734 UART: [state] Locking Datavault
2,860,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,725 UART: [state] Locking ICCM
2,861,323 UART: [exit] Launching FMC @ 0x40000130
2,866,652 UART:
2,866,668 UART: Running Caliptra FMC ...
2,867,076 UART:
2,867,219 UART: [state] CFI Enabled
2,877,894 UART: [fht] FMC Alias Private Key: 7
2,985,971 UART: [art] Extend RT PCRs Done
2,986,399 UART: [art] Lock RT PCRs Done
2,987,903 UART: [art] Populate DV Done
2,996,104 UART: [fht] FMC Alias Private Key: 7
2,997,038 UART: [art] Derive CDI
2,997,318 UART: [art] Store in in slot 0x4
3,083,271 UART: [art] Derive Key Pair
3,083,631 UART: [art] Store priv key in slot 0x5
3,097,149 UART: [art] Derive Key Pair - Done
3,111,716 UART: [art] Signing Cert with AUTHO
3,112,196 UART: RITY.KEYID = 7
3,126,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,757 UART: [art] PUB.X = A5DBB77BE9F0FD131BE267A25AC8F42BE4BEC470F423F22AA8ACBA91E609399BEF02DFFCCEECF3977F915EB853174F56
3,134,549 UART: [art] PUB.Y = BE1F72FA738A62FA4AA3F1D9E26C56D06AFA45106B8991258E298C09FE8EC524E1F8E246190D4595C7404970D5EA7A51
3,141,499 UART: [art] SIG.R = 221FA169010EEEB8E874D55DEA4C35027C0E5D9A93BEE045B1FD4EC7196B380004AAF2BADE19021F88D462D07DF75B86
3,148,243 UART: [art] SIG.S = 15841A3AA0F16BA7E52D7BDFE2579A61A0112D38E184C6C9D31FBE27F106B85A93B48C1FB09882BE356976A2828BBDB2
3,172,287 UART: Caliptra RT
3,172,633 UART: [state] CFI Enabled
3,279,715 UART: [rt] RT listening for mailbox commands...
3,280,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,654 UART: [rt]cmd =0x44504543, len=96
3,351,219 >>> mbox cmd response data (56 bytes)
3,351,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,167 UART: [rt]cmd =0x44504543, len=96
3,421,729 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,202 ready_for_fw is high
1,060,202 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,646 >>> mbox cmd response: success
2,688,472 UART:
2,688,488 UART: Running Caliptra FMC ...
2,688,896 UART:
2,689,039 UART: [state] CFI Enabled
2,699,806 UART: [fht] FMC Alias Private Key: 7
2,808,415 UART: [art] Extend RT PCRs Done
2,808,843 UART: [art] Lock RT PCRs Done
2,810,353 UART: [art] Populate DV Done
2,818,446 UART: [fht] FMC Alias Private Key: 7
2,819,402 UART: [art] Derive CDI
2,819,682 UART: [art] Store in in slot 0x4
2,905,561 UART: [art] Derive Key Pair
2,905,921 UART: [art] Store priv key in slot 0x5
2,919,561 UART: [art] Derive Key Pair - Done
2,934,351 UART: [art] Signing Cert with AUTHO
2,934,831 UART: RITY.KEYID = 7
2,950,413 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,178 UART: [art] PUB.X = 0CB9DB61D8B5293EFCB5776D12F39A7B8D56377613C3D0A43D7781AB0DD226025BCBB8E9E8353F03E35B5389274846DE
2,957,942 UART: [art] PUB.Y = 3FD0882519B705C34645755356B5AEDDCAFFEFD2354343347E98C5D16E3989EB50839935B5140E84A074E0D04D78567F
2,964,882 UART: [art] SIG.R = 5B2B0E4AF39FD0C871F3F5CEA02A838C8A6D1B53D03054B50BFA94E706E3DED38DC34C4325BEF4F2FE8762483DF544F2
2,971,661 UART: [art] SIG.S = A12ADDE5F6C5F2BEFC7A377E9E7B9C145122B07E69A96444681C8BF643062883FE907BE6C2B9907CA15723537818ECC3
2,995,987 UART: Caliptra RT
2,996,333 UART: [state] CFI Enabled
3,104,517 UART: [rt] RT listening for mailbox commands...
3,105,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,224 UART: [rt]cmd =0x44504543, len=96
3,175,495 >>> mbox cmd response data (56 bytes)
3,175,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,205,575 UART: [rt]cmd =0x44504543, len=96
3,246,711 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,623 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,895 UART: [idev] ++
1,173,063 UART: [idev] CDI.KEYID = 6
1,173,424 UART: [idev] SUBJECT.KEYID = 7
1,173,849 UART: [idev] UDS.KEYID = 0
1,174,195 ready_for_fw is high
1,174,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,643 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,601 UART: [fwproc] Recv command 0x46574c44
1,282,334 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,122 >>> mbox cmd response: success
2,773,293 UART: [afmc] ++
2,773,461 UART: [afmc] CDI.KEYID = 6
2,773,824 UART: [afmc] SUBJECT.KEYID = 7
2,774,250 UART: [afmc] AUTHORITY.KEYID = 5
2,810,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,752 UART: [afmc] --
2,853,640 UART: [cold-reset] --
2,854,622 UART: [state] Locking Datavault
2,855,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,371 UART: [state] Locking ICCM
2,856,953 UART: [exit] Launching FMC @ 0x40000130
2,862,282 UART:
2,862,298 UART: Running Caliptra FMC ...
2,862,706 UART:
2,862,760 UART: [state] CFI Enabled
2,873,219 UART: [fht] FMC Alias Private Key: 7
2,981,190 UART: [art] Extend RT PCRs Done
2,981,618 UART: [art] Lock RT PCRs Done
2,983,212 UART: [art] Populate DV Done
2,991,433 UART: [fht] FMC Alias Private Key: 7
2,992,375 UART: [art] Derive CDI
2,992,655 UART: [art] Store in in slot 0x4
3,078,428 UART: [art] Derive Key Pair
3,078,788 UART: [art] Store priv key in slot 0x5
3,092,178 UART: [art] Derive Key Pair - Done
3,106,960 UART: [art] Signing Cert with AUTHO
3,107,440 UART: RITY.KEYID = 7
3,122,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,585 UART: [art] PUB.X = FF9F6D066386242872B4392D9F9967098F9D213CA4E7DFE3C01A3FBF13B5D0B3B79F8699870CEE936214ECE1B8257AC0
3,130,352 UART: [art] PUB.Y = FECEC4428FD4E63F935DCFF560C7F2BF18A2948544DD4B1E13C92699241FC1236F15985881071CF8A556B410246DC806
3,137,298 UART: [art] SIG.R = 93922546A2517AD76F8A6B055011B6D7500B2A4B5407BF0D329F469D522B687D53D57EBC1113C5EE219D1415A88401ED
3,144,049 UART: [art] SIG.S = 0CC85EA6CC7001645D98D3F69BB22FABAAB0686B8A5FC802358391553579F47504E0E43D3DA6FDFCA5886D1AD80F2598
3,167,631 UART: Caliptra RT
3,167,885 UART: [state] CFI Enabled
3,275,221 UART: [rt] RT listening for mailbox commands...
3,275,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,982 UART: [rt]cmd =0x44504543, len=96
3,346,089 >>> mbox cmd response data (56 bytes)
3,346,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,825 UART: [rt]cmd =0x44504543, len=96
3,416,069 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,282 ready_for_fw is high
1,056,282 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,964 >>> mbox cmd response: success
2,683,048 UART:
2,683,064 UART: Running Caliptra FMC ...
2,683,472 UART:
2,683,526 UART: [state] CFI Enabled
2,694,191 UART: [fht] FMC Alias Private Key: 7
2,802,098 UART: [art] Extend RT PCRs Done
2,802,526 UART: [art] Lock RT PCRs Done
2,804,118 UART: [art] Populate DV Done
2,812,295 UART: [fht] FMC Alias Private Key: 7
2,813,317 UART: [art] Derive CDI
2,813,597 UART: [art] Store in in slot 0x4
2,899,652 UART: [art] Derive Key Pair
2,900,012 UART: [art] Store priv key in slot 0x5
2,912,880 UART: [art] Derive Key Pair - Done
2,927,603 UART: [art] Signing Cert with AUTHO
2,928,083 UART: RITY.KEYID = 7
2,943,737 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,502 UART: [art] PUB.X = 7B90C251B5B1130E5DDD7756CB8142D41279C80B5806987EBA4596250F8ADF1655E6A22EEB2C3D098F019E4454DE3563
2,951,254 UART: [art] PUB.Y = 0B33EC4B18EE5C4F975C95F403AEB691E63E459C6F462B228A4E506438E7F669ABE74822CFC20039B5103B5B328073DB
2,958,180 UART: [art] SIG.R = 23624C314518F7E5D243469931D9C180965DD2D69FF7C261459B5D6FD76E993A61BD1BF7405DDFE934B339D90639B740
2,964,943 UART: [art] SIG.S = AD47E90D172E666BC1E3E96DDCE1D80F8A1E5B6CBE7BCA6AE93E4CD79FF7E659544EB68D1837CA7D469D8383CEA3FD93
2,989,574 UART: Caliptra RT
2,989,828 UART: [state] CFI Enabled
3,097,766 UART: [rt] RT listening for mailbox commands...
3,098,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,523 UART: [rt]cmd =0x44504543, len=96
3,169,252 >>> mbox cmd response data (56 bytes)
3,169,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,068 UART: [rt]cmd =0x44504543, len=96
3,239,176 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,174,360 ready_for_fw is high
1,174,360 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,209,183 UART: [ldev] ++
1,209,351 UART: [ldev] CDI.KEYID = 6
1,209,715 UART: [ldev] SUBJECT.KEYID = 5
1,210,142 UART: [ldev] AUTHORITY.KEYID = 7
1,210,605 UART: [ldev] FE.KEYID = 1
1,215,949 UART: [ldev] Erasing FE.KEYID = 1
1,242,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,447 UART: [fwproc] Wait for Commands...
1,283,122 UART: [fwproc] Recv command 0x46574c44
1,283,855 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,465 >>> mbox cmd response: success
2,773,560 UART: [afmc] ++
2,773,728 UART: [afmc] CDI.KEYID = 6
2,774,091 UART: [afmc] SUBJECT.KEYID = 7
2,774,517 UART: [afmc] AUTHORITY.KEYID = 5
2,810,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,563 UART: [afmc] --
2,853,479 UART: [cold-reset] --
2,854,531 UART: [state] Locking Datavault
2,855,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,216 UART: [state] Locking ICCM
2,856,832 UART: [exit] Launching FMC @ 0x40000130
2,862,161 UART:
2,862,177 UART: Running Caliptra FMC ...
2,862,585 UART:
2,862,728 UART: [state] CFI Enabled
2,873,337 UART: [fht] FMC Alias Private Key: 7
2,980,738 UART: [art] Extend RT PCRs Done
2,981,166 UART: [art] Lock RT PCRs Done
2,983,112 UART: [art] Populate DV Done
2,991,349 UART: [fht] FMC Alias Private Key: 7
2,992,461 UART: [art] Derive CDI
2,992,741 UART: [art] Store in in slot 0x4
3,078,534 UART: [art] Derive Key Pair
3,078,894 UART: [art] Store priv key in slot 0x5
3,092,438 UART: [art] Derive Key Pair - Done
3,107,206 UART: [art] Signing Cert with AUTHO
3,107,686 UART: RITY.KEYID = 7
3,123,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,151 UART: [art] PUB.X = 23A1B7B9150F96319769AA09D083F28CBB7CA89B848E39341BD92697B7FA5CA378F150F157FB738C56010C3652D0326E
3,130,907 UART: [art] PUB.Y = 312D3C9B84F870E0051928D70A47D1C60F9E5F19C75B886C95B8590883BD631958C117157CE1AC18B056238148EBA45F
3,137,839 UART: [art] SIG.R = 9662AE75FC291929A2155DCF9FA956D4412441F2689E3238B936419B1D828AAD595A4E29CCB9FD8AFFD39D302E043014
3,144,608 UART: [art] SIG.S = C506170BCE81807A0ACF85ACEE6C1AC089E364A24F559B0F899875F62024188BF73C62A4ABFE26F192419C809A255DCB
3,168,141 UART: Caliptra RT
3,168,487 UART: [state] CFI Enabled
3,275,818 UART: [rt] RT listening for mailbox commands...
3,276,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,475 UART: [rt]cmd =0x44504543, len=96
3,346,686 >>> mbox cmd response data (56 bytes)
3,346,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,580 UART: [rt]cmd =0x44504543, len=96
3,416,966 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,067 ready_for_fw is high
1,056,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,865 >>> mbox cmd response: success
2,684,481 UART:
2,684,497 UART: Running Caliptra FMC ...
2,684,905 UART:
2,685,048 UART: [state] CFI Enabled
2,695,669 UART: [fht] FMC Alias Private Key: 7
2,803,026 UART: [art] Extend RT PCRs Done
2,803,454 UART: [art] Lock RT PCRs Done
2,804,968 UART: [art] Populate DV Done
2,813,167 UART: [fht] FMC Alias Private Key: 7
2,814,225 UART: [art] Derive CDI
2,814,505 UART: [art] Store in in slot 0x4
2,899,924 UART: [art] Derive Key Pair
2,900,284 UART: [art] Store priv key in slot 0x5
2,913,010 UART: [art] Derive Key Pair - Done
2,927,295 UART: [art] Signing Cert with AUTHO
2,927,775 UART: RITY.KEYID = 7
2,943,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,832 UART: [art] PUB.X = 4E8953B03D065DEBA50A04AA9E3AE88DD22ED8CE58C81DB5C4437BACA4D0AD640E94C30918AF5A404A6122A1ACAA107C
2,950,609 UART: [art] PUB.Y = C7E91AE1D3EC474FE6D816B1C26D5E907C9050037B43349C8A8CBD1701DCA563448730ECAA722309C977B2A8182018E9
2,957,552 UART: [art] SIG.R = 84DF987CC65E39BA359124CC6CC84755B6E0D3AFA2FCEA64492BFEBCA9763970C37648C29668C1BD464E98F1132C682C
2,964,332 UART: [art] SIG.S = 2E4B42EF9B6D371FBBB3658B7DDE8F7DF785524C025E5E8E14A9413E0B4738C228AD4600093972B49403886C3819E0FB
2,987,461 UART: Caliptra RT
2,987,807 UART: [state] CFI Enabled
3,095,379 UART: [rt] RT listening for mailbox commands...
3,096,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,150 UART: [rt]cmd =0x44504543, len=96
3,166,887 >>> mbox cmd response data (56 bytes)
3,166,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,715 UART: [rt]cmd =0x44504543, len=96
3,237,395 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,458 UART:
192,841 UART: Running Caliptra ROM ...
193,936 UART:
194,074 UART: [state] CFI Enabled
265,760 UART: [state] LifecycleState = Unprovisioned
267,662 UART: [state] DebugLocked = No
270,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,909 UART: [kat] SHA2-256
444,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,118 UART: [kat] ++
455,564 UART: [kat] sha1
466,686 UART: [kat] SHA2-256
469,318 UART: [kat] SHA2-384
476,019 UART: [kat] SHA2-512-ACC
478,390 UART: [kat] ECC-384
2,765,085 UART: [kat] HMAC-384Kdf
2,777,967 UART: [kat] LMS
3,968,315 UART: [kat] --
3,973,962 UART: [cold-reset] ++
3,976,465 UART: [fht] Storing FHT @ 0x50003400
3,988,523 UART: [idev] ++
3,989,133 UART: [idev] CDI.KEYID = 6
3,990,058 UART: [idev] SUBJECT.KEYID = 7
3,991,299 UART: [idev] UDS.KEYID = 0
3,992,285 ready_for_fw is high
3,992,488 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,832 UART: [idev] Erasing UDS.KEYID = 0
7,323,150 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,877 UART: [idev] --
7,348,516 UART: [ldev] ++
7,349,120 UART: [ldev] CDI.KEYID = 6
7,350,046 UART: [ldev] SUBJECT.KEYID = 5
7,351,261 UART: [ldev] AUTHORITY.KEYID = 7
7,352,492 UART: [ldev] FE.KEYID = 1
7,399,321 UART: [ldev] Erasing FE.KEYID = 1
10,731,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,244 UART: [ldev] --
13,114,605 UART: [fwproc] Waiting for Commands...
13,117,184 UART: [fwproc] Received command 0x46574c44
13,119,416 UART: [fwproc] Received Image of size 114036 bytes
17,171,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,891 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,633,989 >>> mbox cmd response: success
17,638,553 UART: [afmc] ++
17,639,203 UART: [afmc] CDI.KEYID = 6
17,640,103 UART: [afmc] SUBJECT.KEYID = 7
17,641,318 UART: [afmc] AUTHORITY.KEYID = 5
21,004,239 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,012 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,362 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,233 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,687 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,103 UART: [afmc] --
23,377,506 UART: [cold-reset] --
23,380,665 UART: [state] Locking Datavault
23,384,401 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,158 UART: [state] Locking ICCM
23,387,841 UART: [exit] Launching FMC @ 0x40000130
23,396,239 UART:
23,396,470 UART: Running Caliptra FMC ...
23,397,566 UART:
23,397,719 UART: [state] CFI Enabled
23,467,116 UART: [fht] FMC Alias Private Key: 7
25,804,997 UART: [art] Extend RT PCRs Done
25,806,219 UART: [art] Lock RT PCRs Done
25,808,035 UART: [art] Populate DV Done
25,813,494 UART: [fht] FMC Alias Private Key: 7
25,814,971 UART: [art] Derive CDI
25,815,697 UART: [art] Store in in slot 0x4
25,875,226 UART: [art] Derive Key Pair
25,876,270 UART: [art] Store priv key in slot 0x5
29,169,212 UART: [art] Derive Key Pair - Done
29,182,211 UART: [art] Signing Cert with AUTHO
29,183,538 UART: RITY.KEYID = 7
31,470,564 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,075 UART: [art] PUB.X = 8CF760726FC638D7A8367A502908FF112127909C460FE13B3E2847C02F2DE82BF741EF315AB4139583114A79DC6F6E74
31,479,296 UART: [art] PUB.Y = D0CEA50D9330C0A2075364BDDAA0192CB00157EF49FCB3B28C28C75CBABB1472CA439AA82516CDBC48B8C3478BBB0DC3
31,486,546 UART: [art] SIG.R = 5A1C164574CE9E3F1947925E6C6388398566906EE8C497A19D1FB9599D2184D83BD0A02D60DD29E122A7BCFF60C329DF
31,493,911 UART: [art] SIG.S = 445DFEE9289EA7B25419481EFD624052B02EEA636E83ECAE4031583A8F22866716E87058CB1C082915260878436715C5
32,799,201 UART: Caliptra RT
32,799,913 UART: [state] CFI Enabled
32,962,215 UART: [rt] RT listening for mailbox commands...
32,964,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,994,089 UART: [rt]cmd =0x44504543, len=24
33,043,884 >>> mbox cmd response data (40 bytes)
33,045,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,075,822 UART: [rt]cmd =0x44504543, len=96
33,082,333 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,804,304 ready_for_fw is high
3,804,678 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,875,228 >>> mbox cmd response: success
23,571,736 UART:
23,572,136 UART: Running Caliptra FMC ...
23,573,264 UART:
23,573,417 UART: [state] CFI Enabled
23,637,634 UART: [fht] FMC Alias Private Key: 7
25,975,172 UART: [art] Extend RT PCRs Done
25,976,393 UART: [art] Lock RT PCRs Done
25,978,144 UART: [art] Populate DV Done
25,983,605 UART: [fht] FMC Alias Private Key: 7
25,985,203 UART: [art] Derive CDI
25,985,930 UART: [art] Store in in slot 0x4
26,047,095 UART: [art] Derive Key Pair
26,048,139 UART: [art] Store priv key in slot 0x5
29,341,019 UART: [art] Derive Key Pair - Done
29,354,074 UART: [art] Signing Cert with AUTHO
29,355,558 UART: RITY.KEYID = 7
31,642,644 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,149 UART: [art] PUB.X = 7424B860D5157FC4BB48F981DD2BDDEDEBEFAE0DB1A486A90FA94FD08B91BABDF02822DF5674B8639DA97CFD7FF9292E
31,651,419 UART: [art] PUB.Y = BAEAD57627A94CDD5D7E286EFF82423FE11282996BAF1CEC77A419753C748C1B6AF0CC53E61C4EC26FB8DFE6CF0A953F
31,658,663 UART: [art] SIG.R = D033632320AFFAA2FF0DFA9F9ABE030BADDC2E8ACE0DDD0C200AD71CEB0F157D08874670F5D49BEB615CE19FCF0A11F1
31,666,128 UART: [art] SIG.S = 8BFEC1676A74D18D5BA42EB8B4B9DDB7252CDF54E6418DB4DDA74EDB1AA3096874AF371F20104B16765B2D9626D66C47
32,971,138 UART: Caliptra RT
32,971,856 UART: [state] CFI Enabled
33,133,400 UART: [rt] RT listening for mailbox commands...
33,135,324 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,165,332 UART: [rt]cmd =0x44504543, len=24
33,215,772 >>> mbox cmd response data (40 bytes)
33,217,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,247,815 UART: [rt]cmd =0x44504543, len=96
33,254,596 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,571 writing to cptra_bootfsm_go
192,761 UART:
193,114 UART: Running Caliptra ROM ...
194,306 UART:
603,941 UART: [state] CFI Enabled
621,719 UART: [state] LifecycleState = Unprovisioned
623,617 UART: [state] DebugLocked = No
625,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,796 UART: [kat] SHA2-256
800,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,046 UART: [kat] ++
811,546 UART: [kat] sha1
822,566 UART: [kat] SHA2-256
825,286 UART: [kat] SHA2-384
830,279 UART: [kat] SHA2-512-ACC
832,650 UART: [kat] ECC-384
3,117,056 UART: [kat] HMAC-384Kdf
3,128,314 UART: [kat] LMS
4,318,404 UART: [kat] --
4,322,843 UART: [cold-reset] ++
4,325,271 UART: [fht] Storing FHT @ 0x50003400
4,336,675 UART: [idev] ++
4,337,246 UART: [idev] CDI.KEYID = 6
4,338,155 UART: [idev] SUBJECT.KEYID = 7
4,339,398 UART: [idev] UDS.KEYID = 0
4,340,522 ready_for_fw is high
4,340,755 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,324 UART: [idev] Erasing UDS.KEYID = 0
7,629,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,040 UART: [idev] --
7,653,226 UART: [ldev] ++
7,653,786 UART: [ldev] CDI.KEYID = 6
7,654,722 UART: [ldev] SUBJECT.KEYID = 5
7,655,987 UART: [ldev] AUTHORITY.KEYID = 7
7,657,160 UART: [ldev] FE.KEYID = 1
7,670,555 UART: [ldev] Erasing FE.KEYID = 1
10,962,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,302 UART: [ldev] --
13,320,857 UART: [fwproc] Waiting for Commands...
13,323,451 UART: [fwproc] Received command 0x46574c44
13,325,684 UART: [fwproc] Received Image of size 114036 bytes
17,379,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,710 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,842,232 >>> mbox cmd response: success
17,846,313 UART: [afmc] ++
17,846,906 UART: [afmc] CDI.KEYID = 6
17,847,789 UART: [afmc] SUBJECT.KEYID = 7
17,849,063 UART: [afmc] AUTHORITY.KEYID = 5
21,162,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,077 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,460 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,295 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,769 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,169 UART: [afmc] --
23,530,496 UART: [cold-reset] --
23,535,542 UART: [state] Locking Datavault
23,540,786 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,538 UART: [state] Locking ICCM
23,543,933 UART: [exit] Launching FMC @ 0x40000130
23,552,327 UART:
23,552,566 UART: Running Caliptra FMC ...
23,553,590 UART:
23,553,734 UART: [state] CFI Enabled
23,561,675 UART: [fht] FMC Alias Private Key: 7
25,892,166 UART: [art] Extend RT PCRs Done
25,893,385 UART: [art] Lock RT PCRs Done
25,895,147 UART: [art] Populate DV Done
25,900,454 UART: [fht] FMC Alias Private Key: 7
25,902,028 UART: [art] Derive CDI
25,902,794 UART: [art] Store in in slot 0x4
25,945,553 UART: [art] Derive Key Pair
25,946,554 UART: [art] Store priv key in slot 0x5
29,188,967 UART: [art] Derive Key Pair - Done
29,201,906 UART: [art] Signing Cert with AUTHO
29,203,210 UART: RITY.KEYID = 7
31,482,560 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,062 UART: [art] PUB.X = 83519F9918B0271454DC08A5AC92902C2E73D4E5B6E662BC8B091198759834F366D9B075EB5BBE1E7601ABCC654B75BC
31,491,338 UART: [art] PUB.Y = FE628859FFC2A6A0BF82547480CD7B36CBB048A037CA920DD64C76111995A6B2D3A795F52F87E4B294566628F631BA40
31,498,521 UART: [art] SIG.R = E0AA2917F5AA600E154CB0D5DC39F918D2BBA1680433D94DD50AEC8D18A130A1270DB27599C38664F6FE219F3D7B4B79
31,505,959 UART: [art] SIG.S = C71BD22FCA00D80632A03ECAA376B6FA806538932D2DA9AA7FF6153AF787826EA53DEE4A043CAF9B6F6859888ED3A51B
32,811,202 UART: Caliptra RT
32,811,909 UART: [state] CFI Enabled
32,930,371 UART: [rt] RT listening for mailbox commands...
32,932,292 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,962,535 UART: [rt]cmd =0x44504543, len=24
32,996,280 >>> mbox cmd response data (40 bytes)
32,997,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,028,194 UART: [rt]cmd =0x44504543, len=96
33,034,589 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
4,126,990 ready_for_fw is high
4,127,683 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,950 >>> mbox cmd response: success
23,719,590 UART:
23,719,993 UART: Running Caliptra FMC ...
23,721,098 UART:
23,721,254 UART: [state] CFI Enabled
23,729,259 UART: [fht] FMC Alias Private Key: 7
26,060,289 UART: [art] Extend RT PCRs Done
26,061,522 UART: [art] Lock RT PCRs Done
26,063,266 UART: [art] Populate DV Done
26,068,808 UART: [fht] FMC Alias Private Key: 7
26,070,461 UART: [art] Derive CDI
26,071,200 UART: [art] Store in in slot 0x4
26,113,915 UART: [art] Derive Key Pair
26,114,963 UART: [art] Store priv key in slot 0x5
29,356,456 UART: [art] Derive Key Pair - Done
29,369,628 UART: [art] Signing Cert with AUTHO
29,370,928 UART: RITY.KEYID = 7
31,649,832 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,346 UART: [art] PUB.X = 19EBCFE0BFC3E8CD89CB270BEC37A9B320D5075EDBD6B6AF3A2CB17C903222505C721BFD1FEF069085AD65C648C8D29A
31,658,617 UART: [art] PUB.Y = 131B6C4DF262C43C0B193F7042E983998D91E5C0AF4D489897A2488C10521EC53E0519BCC212C5D5678130A2B5CD0023
31,665,827 UART: [art] SIG.R = 3DA00101E8EE471716AA1089F3C6EB5119DA9CFAEDEE5DBC10CED01C8163D65539C3778CDE6D66B492E489C040CD5354
31,673,242 UART: [art] SIG.S = B0A7F6E5D412E1D0B86C2E7C9D8615722F9A709900B02FDF6BBD0B1BC8EA835C04A9F92CA60C2942205E0D20F8624C9B
32,978,534 UART: Caliptra RT
32,979,239 UART: [state] CFI Enabled
33,096,522 UART: [rt] RT listening for mailbox commands...
33,098,471 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,128,339 UART: [rt]cmd =0x44504543, len=24
33,162,748 >>> mbox cmd response data (40 bytes)
33,163,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,194,625 UART: [rt]cmd =0x44504543, len=96
33,201,421 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,398 UART:
192,775 UART: Running Caliptra ROM ...
193,931 UART:
194,108 UART: [state] CFI Enabled
263,829 UART: [state] LifecycleState = Unprovisioned
266,538 UART: [state] DebugLocked = No
267,807 UART: [state] WD Timer not started. Device not locked for debugging
272,202 UART: [kat] SHA2-256
451,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,920 UART: [kat] ++
463,461 UART: [kat] sha1
475,405 UART: [kat] SHA2-256
478,412 UART: [kat] SHA2-384
483,335 UART: [kat] SHA2-512-ACC
486,351 UART: [kat] ECC-384
2,945,923 UART: [kat] HMAC-384Kdf
2,971,304 UART: [kat] LMS
3,500,728 UART: [kat] --
3,505,741 UART: [cold-reset] ++
3,508,331 UART: [fht] FHT @ 0x50003400
3,519,666 UART: [idev] ++
3,520,229 UART: [idev] CDI.KEYID = 6
3,521,116 UART: [idev] SUBJECT.KEYID = 7
3,522,359 UART: [idev] UDS.KEYID = 0
3,523,258 ready_for_fw is high
3,523,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,417 UART: [idev] Erasing UDS.KEYID = 0
6,025,849 UART: [idev] Sha1 KeyId Algorithm
6,047,459 UART: [idev] --
6,050,761 UART: [ldev] ++
6,051,337 UART: [ldev] CDI.KEYID = 6
6,052,258 UART: [ldev] SUBJECT.KEYID = 5
6,053,420 UART: [ldev] AUTHORITY.KEYID = 7
6,054,659 UART: [ldev] FE.KEYID = 1
6,100,156 UART: [ldev] Erasing FE.KEYID = 1
8,606,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,624 UART: [ldev] --
10,415,834 UART: [fwproc] Wait for Commands...
10,418,037 UART: [fwproc] Recv command 0x46574c44
10,420,079 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,276,665 >>> mbox cmd response: success
14,280,091 UART: [afmc] ++
14,280,695 UART: [afmc] CDI.KEYID = 6
14,281,609 UART: [afmc] SUBJECT.KEYID = 7
14,282,791 UART: [afmc] AUTHORITY.KEYID = 5
16,824,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,430 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,550 UART: [afmc] --
18,628,363 UART: [cold-reset] --
18,632,817 UART: [state] Locking Datavault
18,637,850 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,555 UART: [state] Locking ICCM
18,640,894 UART: [exit] Launching FMC @ 0x40000130
18,649,295 UART:
18,649,538 UART: Running Caliptra FMC ...
18,650,641 UART:
18,650,824 UART: [state] CFI Enabled
18,709,731 UART: [fht] FMC Alias Private Key: 7
20,473,343 UART: [art] Extend RT PCRs Done
20,474,563 UART: [art] Lock RT PCRs Done
20,475,806 UART: [art] Populate DV Done
20,481,061 UART: [fht] FMC Alias Private Key: 7
20,482,708 UART: [art] Derive CDI
20,483,524 UART: [art] Store in in slot 0x4
20,542,690 UART: [art] Derive Key Pair
20,543,732 UART: [art] Store priv key in slot 0x5
23,007,287 UART: [art] Derive Key Pair - Done
23,020,282 UART: [art] Signing Cert with AUTHO
23,021,592 UART: RITY.KEYID = 7
24,732,978 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,495 UART: [art] PUB.X = C47E1F65C8E5A5936B7142698F6910E31FBAA8C4358906F1B96A1957B86F7CCE31C74426F46D1BDF99A35C3C14C6BE06
24,741,753 UART: [art] PUB.Y = E2A48A56C38E4988B43904BE086B544064928B98205FDD7DA06488D85E38C39EBAE1F79F98E9DB35A59AD9CF26E36C37
24,749,012 UART: [art] SIG.R = FFE7168E46F52AF4C7F6CC9913F0006DC0DA86AD34E8B608B341BF7665CBD6333C10F03FDFCE8E05087F7645FDC04493
24,756,395 UART: [art] SIG.S = CB0BE5ECCE40BA7039CBF7A61688C38709106FA051C6DDE82D72AD791F38799091C1652CE164B11FCC803187460F5464
25,735,424 UART: Caliptra RT
25,736,136 UART: [state] CFI Enabled
25,901,369 UART: [rt] RT listening for mailbox commands...
25,903,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,933,241 UART: [rt]cmd =0x44504543, len=24
25,983,792 >>> mbox cmd response data (40 bytes)
25,985,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,015,737 UART: [rt]cmd =0x44504543, len=96
26,022,688 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,394 UART:
192,762 UART: Running Caliptra ROM ...
193,854 UART:
193,994 UART: [state] CFI Enabled
265,434 UART: [state] LifecycleState = Unprovisioned
267,845 UART: [state] DebugLocked = No
270,221 UART: [state] WD Timer not started. Device not locked for debugging
274,690 UART: [kat] SHA2-256
464,596 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,335 UART: [kat] ++
475,784 UART: [kat] sha1
488,430 UART: [kat] SHA2-256
491,443 UART: [kat] SHA2-384
497,697 UART: [kat] SHA2-512-ACC
500,317 UART: [kat] ECC-384
2,946,384 UART: [kat] HMAC-384Kdf
2,971,125 UART: [kat] LMS
3,502,911 UART: [kat] --
3,505,630 UART: [cold-reset] ++
3,507,639 UART: [fht] FHT @ 0x50003400
3,520,751 UART: [idev] ++
3,521,469 UART: [idev] CDI.KEYID = 6
3,522,394 UART: [idev] SUBJECT.KEYID = 7
3,523,569 UART: [idev] UDS.KEYID = 0
3,524,495 ready_for_fw is high
3,524,684 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,924 UART: [idev] Erasing UDS.KEYID = 0
6,027,845 UART: [idev] Sha1 KeyId Algorithm
6,051,209 UART: [idev] --
6,055,667 UART: [ldev] ++
6,056,355 UART: [ldev] CDI.KEYID = 6
6,057,245 UART: [ldev] SUBJECT.KEYID = 5
6,058,405 UART: [ldev] AUTHORITY.KEYID = 7
6,059,700 UART: [ldev] FE.KEYID = 1
6,102,448 UART: [ldev] Erasing FE.KEYID = 1
8,607,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,004 UART: [ldev] --
10,417,851 UART: [fwproc] Wait for Commands...
10,420,410 UART: [fwproc] Recv command 0x46574c44
10,422,724 UART: [fwproc] Recv'd Img size: 114360 bytes
13,871,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,614,104 >>> mbox cmd response: success
14,617,931 UART: [afmc] ++
14,618,643 UART: [afmc] CDI.KEYID = 6
14,619,813 UART: [afmc] SUBJECT.KEYID = 7
14,621,305 UART: [afmc] AUTHORITY.KEYID = 5
17,148,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,832 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,332 UART: [afmc] --
18,947,335 UART: [cold-reset] --
18,951,962 UART: [state] Locking Datavault
18,956,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,920 UART: [state] Locking ICCM
18,960,319 UART: [exit] Launching FMC @ 0x40000130
18,969,005 UART:
18,969,249 UART: Running Caliptra FMC ...
18,970,354 UART:
18,970,514 UART: [state] CFI Enabled
19,032,563 UART: [fht] FMC Alias Private Key: 7
20,796,206 UART: [art] Extend RT PCRs Done
20,797,426 UART: [art] Lock RT PCRs Done
20,799,323 UART: [art] Populate DV Done
20,805,057 UART: [fht] FMC Alias Private Key: 7
20,806,660 UART: [art] Derive CDI
20,807,478 UART: [art] Store in in slot 0x4
20,865,276 UART: [art] Derive Key Pair
20,866,312 UART: [art] Store priv key in slot 0x5
23,328,984 UART: [art] Derive Key Pair - Done
23,342,299 UART: [art] Signing Cert with AUTHO
23,343,606 UART: RITY.KEYID = 7
25,054,487 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,004 UART: [art] PUB.X = AC15896D2C0B6F249066CC5F95F61BAAEF9347E14847FA25842256DA40BA6E39A7F3DE094BFEA7D10A97E14EDCBBFA74
25,063,244 UART: [art] PUB.Y = 8DE0AF418208FC03495927C16A09CC5B06BB62DEFDDFF222F796F1D900047D82D366AF091D7FE21EF61BAB11CC2F961D
25,070,515 UART: [art] SIG.R = 4E9784611243A3195BFA89679CB51682140FEA1EFB08D5DDAC604CE21BDB5F0FA1DE36A4CE47BF80323643373AA85022
25,077,894 UART: [art] SIG.S = 33675D87E88DF8F30261BF02F89029430A2803DE57D2E08EC707E862329D6181A41C57ADF1150B90675CD825A124B825
26,056,762 UART: Caliptra RT
26,057,481 UART: [state] CFI Enabled
26,223,473 UART: [rt] RT listening for mailbox commands...
26,225,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,255,291 UART: [rt]cmd =0x44504543, len=24
26,306,234 >>> mbox cmd response data (40 bytes)
26,307,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,236 UART: [rt]cmd =0x44504543, len=96
26,344,590 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
3,438,341 ready_for_fw is high
3,438,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,737,043 >>> mbox cmd response: success
19,025,082 UART:
19,025,497 UART: Running Caliptra FMC ...
19,026,640 UART:
19,026,805 UART: [state] CFI Enabled
19,092,622 UART: [fht] FMC Alias Private Key: 7
20,856,633 UART: [art] Extend RT PCRs Done
20,857,844 UART: [art] Lock RT PCRs Done
20,859,522 UART: [art] Populate DV Done
20,864,928 UART: [fht] FMC Alias Private Key: 7
20,866,531 UART: [art] Derive CDI
20,867,354 UART: [art] Store in in slot 0x4
20,924,581 UART: [art] Derive Key Pair
20,925,580 UART: [art] Store priv key in slot 0x5
23,388,340 UART: [art] Derive Key Pair - Done
23,400,705 UART: [art] Signing Cert with AUTHO
23,402,016 UART: RITY.KEYID = 7
25,114,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,630 UART: [art] PUB.X = B826CB2F1774392EC47A2F1F50943F2BED11CAAF05F035526AA42383E8B9BFCE0735267341CAF13723A20C8AA6DC94EB
25,122,921 UART: [art] PUB.Y = 64290F43F264C6DDBACFB10A8F0F36FF7377AC9CDC1673C40EB977789146A0F762AC8B0964242906EEF3118BC6FFD2FC
25,130,187 UART: [art] SIG.R = 05519335A562490EE26213FE8CDD9B9066DEE996A63330AFC7D52EF6910E5C3665678DEFF1D9F2786BE1205476F50C0F
25,137,562 UART: [art] SIG.S = 7D4EA9AC70F8039C328432F1D4CD037CD39E48BD006B3ADF96EF770D78057BEF8760EE48A177D2F6DDF026DBB159661B
26,116,464 UART: Caliptra RT
26,117,178 UART: [state] CFI Enabled
26,283,652 UART: [rt] RT listening for mailbox commands...
26,285,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,315,570 UART: [rt]cmd =0x44504543, len=24
26,364,899 >>> mbox cmd response data (40 bytes)
26,366,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,396,764 UART: [rt]cmd =0x44504543, len=96
26,403,579 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,459 UART:
192,839 UART: Running Caliptra ROM ...
193,965 UART:
603,692 UART: [state] CFI Enabled
617,424 UART: [state] LifecycleState = Unprovisioned
619,805 UART: [state] DebugLocked = No
621,267 UART: [state] WD Timer not started. Device not locked for debugging
625,080 UART: [kat] SHA2-256
814,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,737 UART: [kat] ++
826,284 UART: [kat] sha1
836,393 UART: [kat] SHA2-256
839,401 UART: [kat] SHA2-384
845,681 UART: [kat] SHA2-512-ACC
848,261 UART: [kat] ECC-384
3,292,927 UART: [kat] HMAC-384Kdf
3,307,001 UART: [kat] LMS
3,838,792 UART: [kat] --
3,843,922 UART: [cold-reset] ++
3,846,418 UART: [fht] FHT @ 0x50003400
3,856,820 UART: [idev] ++
3,857,524 UART: [idev] CDI.KEYID = 6
3,858,429 UART: [idev] SUBJECT.KEYID = 7
3,859,687 UART: [idev] UDS.KEYID = 0
3,860,613 ready_for_fw is high
3,860,797 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,394 UART: [idev] Erasing UDS.KEYID = 0
6,334,451 UART: [idev] Sha1 KeyId Algorithm
6,357,553 UART: [idev] --
6,361,651 UART: [ldev] ++
6,362,327 UART: [ldev] CDI.KEYID = 6
6,363,289 UART: [ldev] SUBJECT.KEYID = 5
6,364,447 UART: [ldev] AUTHORITY.KEYID = 7
6,365,675 UART: [ldev] FE.KEYID = 1
6,377,290 UART: [ldev] Erasing FE.KEYID = 1
8,856,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,716 UART: [ldev] --
10,643,826 UART: [fwproc] Wait for Commands...
10,645,536 UART: [fwproc] Recv command 0x46574c44
10,647,861 UART: [fwproc] Recv'd Img size: 114360 bytes
14,091,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,825,232 >>> mbox cmd response: success
14,828,961 UART: [afmc] ++
14,829,679 UART: [afmc] CDI.KEYID = 6
14,830,810 UART: [afmc] SUBJECT.KEYID = 7
14,832,296 UART: [afmc] AUTHORITY.KEYID = 5
17,333,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,073,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,088,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,103,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,126,767 UART: [afmc] --
19,130,990 UART: [cold-reset] --
19,134,152 UART: [state] Locking Datavault
19,138,583 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,711 UART: [state] Locking ICCM
19,143,026 UART: [exit] Launching FMC @ 0x40000130
19,151,692 UART:
19,151,935 UART: Running Caliptra FMC ...
19,153,035 UART:
19,153,199 UART: [state] CFI Enabled
19,161,512 UART: [fht] FMC Alias Private Key: 7
20,918,087 UART: [art] Extend RT PCRs Done
20,919,307 UART: [art] Lock RT PCRs Done
20,920,681 UART: [art] Populate DV Done
20,926,309 UART: [fht] FMC Alias Private Key: 7
20,928,001 UART: [art] Derive CDI
20,928,738 UART: [art] Store in in slot 0x4
20,971,681 UART: [art] Derive Key Pair
20,972,717 UART: [art] Store priv key in slot 0x5
23,399,259 UART: [art] Derive Key Pair - Done
23,412,194 UART: [art] Signing Cert with AUTHO
23,413,495 UART: RITY.KEYID = 7
25,119,077 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,580 UART: [art] PUB.X = 8891CB0BBE2EE44314437A268680D430D9596CBC2F28BDCF9F9E9510889F741AE8C9B388E98F806B6DEF501C70D654B9
25,127,884 UART: [art] PUB.Y = A4B64FF2A15D21ABFB430AB88ED18D4C865DC990ACE73E2A2989D501895817E1DE0EA4A04BC1D1497E3A6D961320B1E0
25,135,170 UART: [art] SIG.R = D454FC13D4FE5839763194AE765174D254F71438021BE2DE11E94998128B4AD2BD1FC944D2087F07D38EF2D6E4CA116C
25,142,503 UART: [art] SIG.S = F5382D51E4D95CEBA3AC745C45F3ED24591886B59D8084B04168AFB8CBDA6738E74576D0BDB3BF81A1270F25A8B36FF5
26,121,725 UART: Caliptra RT
26,122,414 UART: [state] CFI Enabled
26,239,631 UART: [rt] RT listening for mailbox commands...
26,241,550 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,271,608 UART: [rt]cmd =0x44504543, len=24
26,306,217 >>> mbox cmd response data (40 bytes)
26,307,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,175 UART: [rt]cmd =0x44504543, len=96
26,344,646 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,756,037 ready_for_fw is high
3,756,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,507 >>> mbox cmd response: success
19,213,870 UART:
19,214,253 UART: Running Caliptra FMC ...
19,215,448 UART:
19,215,614 UART: [state] CFI Enabled
19,223,661 UART: [fht] FMC Alias Private Key: 7
20,980,932 UART: [art] Extend RT PCRs Done
20,982,155 UART: [art] Lock RT PCRs Done
20,983,724 UART: [art] Populate DV Done
20,989,301 UART: [fht] FMC Alias Private Key: 7
20,990,938 UART: [art] Derive CDI
20,991,871 UART: [art] Store in in slot 0x4
21,034,584 UART: [art] Derive Key Pair
21,035,586 UART: [art] Store priv key in slot 0x5
23,462,375 UART: [art] Derive Key Pair - Done
23,475,338 UART: [art] Signing Cert with AUTHO
23,476,670 UART: RITY.KEYID = 7
25,181,830 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,337 UART: [art] PUB.X = 7E92EE573D5472802544C1C51EA5909DFA9667D17704961735D4F5FEDD839CBD432C7B490D3C63164F1D965EF76B8223
25,190,594 UART: [art] PUB.Y = E486CEC2C3D4F3A419D5BDAB7C1674625D7DA1D80320F08CC91C558CC0566B46BE0154E46CE7D4DE724A5148032013C8
25,197,854 UART: [art] SIG.R = BD098889B4B75F56833535B8972700ED5CA0C873E54072328F01602939EBFD319D8D9702749283A58BC8DB39A1FF96A9
25,205,209 UART: [art] SIG.S = 0D387B91E44ED2183C2F3553C236B766F906B760382B5BFB586554C569474C4DEDAAE575AEA18C4F2C1644AE7CF6B7BD
26,184,249 UART: Caliptra RT
26,184,958 UART: [state] CFI Enabled
26,301,769 UART: [rt] RT listening for mailbox commands...
26,303,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,333,543 UART: [rt]cmd =0x44504543, len=24
26,368,102 >>> mbox cmd response data (40 bytes)
26,369,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,399,850 UART: [rt]cmd =0x44504543, len=96
26,406,434 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,340 UART: [kat] SHA2-512-ACC
897,241 UART: [kat] ECC-384
902,820 UART: [kat] HMAC-384Kdf
907,454 UART: [kat] LMS
1,475,650 UART: [kat] --
1,476,611 UART: [cold-reset] ++
1,476,947 UART: [fht] Storing FHT @ 0x50003400
1,479,772 UART: [idev] ++
1,479,940 UART: [idev] CDI.KEYID = 6
1,480,300 UART: [idev] SUBJECT.KEYID = 7
1,480,724 UART: [idev] UDS.KEYID = 0
1,481,069 ready_for_fw is high
1,481,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,178 UART: [idev] --
1,515,165 UART: [ldev] ++
1,515,333 UART: [ldev] CDI.KEYID = 6
1,515,696 UART: [ldev] SUBJECT.KEYID = 5
1,516,122 UART: [ldev] AUTHORITY.KEYID = 7
1,516,585 UART: [ldev] FE.KEYID = 1
1,521,737 UART: [ldev] Erasing FE.KEYID = 1
1,546,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,438 UART: [ldev] --
1,585,763 UART: [fwproc] Waiting for Commands...
1,586,380 UART: [fwproc] Received command 0x46574c44
1,587,171 UART: [fwproc] Received Image of size 114360 bytes
2,884,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,090 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,305 >>> mbox cmd response: success
3,077,545 UART: [afmc] ++
3,077,713 UART: [afmc] CDI.KEYID = 6
3,078,075 UART: [afmc] SUBJECT.KEYID = 7
3,078,500 UART: [afmc] AUTHORITY.KEYID = 5
3,113,497 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,164 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,854 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,883 UART: [afmc] --
3,156,937 UART: [cold-reset] --
3,157,917 UART: [state] Locking Datavault
3,159,102 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,706 UART: [state] Locking ICCM
3,160,338 UART: [exit] Launching FMC @ 0x40000130
3,165,667 UART:
3,165,683 UART: Running Caliptra FMC ...
3,166,091 UART:
3,166,145 UART: [state] CFI Enabled
3,176,816 UART: [fht] FMC Alias Private Key: 7
3,284,325 UART: [art] Extend RT PCRs Done
3,284,753 UART: [art] Lock RT PCRs Done
3,286,101 UART: [art] Populate DV Done
3,294,150 UART: [fht] FMC Alias Private Key: 7
3,295,270 UART: [art] Derive CDI
3,295,550 UART: [art] Store in in slot 0x4
3,381,503 UART: [art] Derive Key Pair
3,381,863 UART: [art] Store priv key in slot 0x5
3,395,387 UART: [art] Derive Key Pair - Done
3,410,228 UART: [art] Signing Cert with AUTHO
3,410,708 UART: RITY.KEYID = 7
3,425,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,513 UART: [art] PUB.X = 89F4DBFD142ED0AAD9230011D2E3E20A682A9CDA9D1388FB6B69A1E75723B16C4FBAB370E7EA9A66B61997E070862DAA
3,433,274 UART: [art] PUB.Y = 7B000E44556291ED569027E466DA52A8178DF6AB3420B9B3C24FF8715C22A438B9F12C8470BE3942C5F36F07579C6E59
3,440,192 UART: [art] SIG.R = 11AA704F14CC98FD4B00EFD178AFAD2A401EA0DB2D4559E2B15E207357F22102AD2CD8DA91414B7266D1BA62711C4631
3,446,947 UART: [art] SIG.S = D0A57F637091EE58581813A1FA1F241058E2DED12FBC2E88680EF67CD73DF1FCDA7DDD0A74149F75C2D175E895C88F3D
3,470,826 UART: Caliptra RT
3,471,080 UART: [state] CFI Enabled
3,578,956 UART: [rt] RT listening for mailbox commands...
3,579,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,177 UART: [rt]cmd =0x44504543, len=24
3,643,370 >>> mbox cmd response data (40 bytes)
3,643,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,200 UART: [rt]cmd =0x44504543, len=96
3,680,677 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,811 ready_for_fw is high
1,362,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,741 >>> mbox cmd response: success
2,989,319 UART:
2,989,335 UART: Running Caliptra FMC ...
2,989,743 UART:
2,989,797 UART: [state] CFI Enabled
3,000,580 UART: [fht] FMC Alias Private Key: 7
3,108,975 UART: [art] Extend RT PCRs Done
3,109,403 UART: [art] Lock RT PCRs Done
3,110,745 UART: [art] Populate DV Done
3,119,214 UART: [fht] FMC Alias Private Key: 7
3,120,390 UART: [art] Derive CDI
3,120,670 UART: [art] Store in in slot 0x4
3,206,279 UART: [art] Derive Key Pair
3,206,639 UART: [art] Store priv key in slot 0x5
3,219,587 UART: [art] Derive Key Pair - Done
3,234,290 UART: [art] Signing Cert with AUTHO
3,234,770 UART: RITY.KEYID = 7
3,250,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,889 UART: [art] PUB.X = F2DF8F49FD505B31B47B0946C569A0351F073B7DCAE05FE6D3A6F8E2166BF5418A2ECC0E6BD15B6DA11C2CFBC359632F
3,257,670 UART: [art] PUB.Y = B387D52CB93E0BF8671B3DB90E22EF90896C707DA07D2ADFEC30981CBC354A1C21396A2E4D54982D7F628B21CD341A41
3,264,624 UART: [art] SIG.R = B4ABB13227D5958DBD980AAA534EAAB07FE488B41E085F1DAD344078B6E8E924B6C9A6DE6F9AB2FD46CBE084677ECC96
3,271,410 UART: [art] SIG.S = B289E12009E945E4E6EFE8A94EF0F1724520B56D7B47B46CC896B86A37FE175C6B2756B2F7DFAFBDEDB80A23B239A926
3,295,915 UART: Caliptra RT
3,296,169 UART: [state] CFI Enabled
3,404,004 UART: [rt] RT listening for mailbox commands...
3,404,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,191 UART: [rt]cmd =0x44504543, len=24
3,468,276 >>> mbox cmd response data (40 bytes)
3,468,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,222 UART: [rt]cmd =0x44504543, len=96
3,505,351 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,581 UART: [idev] ++
1,479,749 UART: [idev] CDI.KEYID = 6
1,480,109 UART: [idev] SUBJECT.KEYID = 7
1,480,533 UART: [idev] UDS.KEYID = 0
1,480,878 ready_for_fw is high
1,480,878 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,425 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,961 UART: [idev] --
1,514,806 UART: [ldev] ++
1,514,974 UART: [ldev] CDI.KEYID = 6
1,515,337 UART: [ldev] SUBJECT.KEYID = 5
1,515,763 UART: [ldev] AUTHORITY.KEYID = 7
1,516,226 UART: [ldev] FE.KEYID = 1
1,521,534 UART: [ldev] Erasing FE.KEYID = 1
1,547,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,597 UART: [ldev] --
1,587,070 UART: [fwproc] Waiting for Commands...
1,587,843 UART: [fwproc] Received command 0x46574c44
1,588,634 UART: [fwproc] Received Image of size 114360 bytes
2,886,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,822 >>> mbox cmd response: success
3,080,024 UART: [afmc] ++
3,080,192 UART: [afmc] CDI.KEYID = 6
3,080,554 UART: [afmc] SUBJECT.KEYID = 7
3,080,979 UART: [afmc] AUTHORITY.KEYID = 5
3,116,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,183 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,873 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,868 UART: [afmc] --
3,159,948 UART: [cold-reset] --
3,160,878 UART: [state] Locking Datavault
3,161,999 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,603 UART: [state] Locking ICCM
3,163,073 UART: [exit] Launching FMC @ 0x40000130
3,168,402 UART:
3,168,418 UART: Running Caliptra FMC ...
3,168,826 UART:
3,168,969 UART: [state] CFI Enabled
3,179,378 UART: [fht] FMC Alias Private Key: 7
3,287,183 UART: [art] Extend RT PCRs Done
3,287,611 UART: [art] Lock RT PCRs Done
3,288,755 UART: [art] Populate DV Done
3,296,816 UART: [fht] FMC Alias Private Key: 7
3,297,778 UART: [art] Derive CDI
3,298,058 UART: [art] Store in in slot 0x4
3,384,149 UART: [art] Derive Key Pair
3,384,509 UART: [art] Store priv key in slot 0x5
3,397,817 UART: [art] Derive Key Pair - Done
3,412,244 UART: [art] Signing Cert with AUTHO
3,412,724 UART: RITY.KEYID = 7
3,427,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,599 UART: [art] PUB.X = 5C4DB8953B722A16490C758B33747298D257415721EDAC69F9B7B351A3A210C4869C23F4C9F5E7D0409A1988BE08E459
3,435,357 UART: [art] PUB.Y = 7E9E11B948EE81C87B6E1639F0429D2DAF1C8FE3E2EA69EF548352C951CACE1A4FD0B2DB13C09FD5AD7ECBD38011DF5A
3,442,333 UART: [art] SIG.R = 66F47EE98627E2310D808D1F5938FBDD691BAE7F2216A91F3F39B570B1733C3208A6F9CA97D6D856938B9C19874ABFC6
3,449,101 UART: [art] SIG.S = 7AE81150904150F220BEB4CF20F5A976047DED54F8DC2611886DEEF64A6A9ED3CCE0450404C179E93383BAAD3F7FA1C1
3,473,723 UART: Caliptra RT
3,474,069 UART: [state] CFI Enabled
3,582,250 UART: [rt] RT listening for mailbox commands...
3,582,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,467 UART: [rt]cmd =0x44504543, len=24
3,647,164 >>> mbox cmd response data (40 bytes)
3,647,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,210 UART: [rt]cmd =0x44504543, len=96
3,684,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,124 ready_for_fw is high
1,363,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,198 >>> mbox cmd response: success
2,989,198 UART:
2,989,214 UART: Running Caliptra FMC ...
2,989,622 UART:
2,989,765 UART: [state] CFI Enabled
3,000,206 UART: [fht] FMC Alias Private Key: 7
3,108,157 UART: [art] Extend RT PCRs Done
3,108,585 UART: [art] Lock RT PCRs Done
3,110,081 UART: [art] Populate DV Done
3,118,192 UART: [fht] FMC Alias Private Key: 7
3,119,178 UART: [art] Derive CDI
3,119,458 UART: [art] Store in in slot 0x4
3,205,647 UART: [art] Derive Key Pair
3,206,007 UART: [art] Store priv key in slot 0x5
3,220,031 UART: [art] Derive Key Pair - Done
3,234,712 UART: [art] Signing Cert with AUTHO
3,235,192 UART: RITY.KEYID = 7
3,249,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,741 UART: [art] PUB.X = 8C5AB15D738DBF1590ACFB8F897B6D4A9E1CDF76D3566A17B6DEBE6D7AEA4BEBE525ECC5B954AC86EB595F331A0E3B02
3,257,535 UART: [art] PUB.Y = FFFACAC206D9BD74DDBC9E778E49AF713AB81C2460706FBD6BE2AA9B3F8CD6EEACCB856F5918F5002F165ED047919E5B
3,264,488 UART: [art] SIG.R = 689B3ED4E47864A7FF0B984AF056A0D39793D3FD26D902A8099E6FEF816A0FD2CA3FF40A013D603BC42645211DC73C83
3,271,248 UART: [art] SIG.S = 9A6292FBB3CCD43C5A8852693E18EF3D97C0000F5BBB802794A0D0AE6641ACD6FD08E951CFBEE199AB8F35B8C2487C3A
3,294,789 UART: Caliptra RT
3,295,135 UART: [state] CFI Enabled
3,403,815 UART: [rt] RT listening for mailbox commands...
3,404,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,066 UART: [rt]cmd =0x44504543, len=24
3,468,533 >>> mbox cmd response data (40 bytes)
3,468,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,619 UART: [rt]cmd =0x44504543, len=96
3,506,126 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,923 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
893,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,821 UART: [kat] ++
897,973 UART: [kat] sha1
902,199 UART: [kat] SHA2-256
904,139 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,634 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,315 UART: [cold-reset] ++
1,172,685 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 ready_for_fw is high
1,176,739 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,676 UART: [idev] Erasing UDS.KEYID = 0
1,201,545 UART: [idev] Sha1 KeyId Algorithm
1,210,101 UART: [idev] --
1,211,033 UART: [ldev] ++
1,211,201 UART: [ldev] CDI.KEYID = 6
1,211,564 UART: [ldev] SUBJECT.KEYID = 5
1,211,990 UART: [ldev] AUTHORITY.KEYID = 7
1,212,453 UART: [ldev] FE.KEYID = 1
1,217,379 UART: [ldev] Erasing FE.KEYID = 1
1,244,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,285 UART: [ldev] --
1,283,724 UART: [fwproc] Wait for Commands...
1,284,322 UART: [fwproc] Recv command 0x46574c44
1,285,050 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,320 >>> mbox cmd response: success
2,775,440 UART: [afmc] ++
2,775,608 UART: [afmc] CDI.KEYID = 6
2,775,970 UART: [afmc] SUBJECT.KEYID = 7
2,776,395 UART: [afmc] AUTHORITY.KEYID = 5
2,812,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,359 UART: [afmc] --
2,855,315 UART: [cold-reset] --
2,856,157 UART: [state] Locking Datavault
2,857,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,978 UART: [state] Locking ICCM
2,858,468 UART: [exit] Launching FMC @ 0x40000130
2,863,797 UART:
2,863,813 UART: Running Caliptra FMC ...
2,864,221 UART:
2,864,275 UART: [state] CFI Enabled
2,874,922 UART: [fht] FMC Alias Private Key: 7
2,982,995 UART: [art] Extend RT PCRs Done
2,983,423 UART: [art] Lock RT PCRs Done
2,984,953 UART: [art] Populate DV Done
2,993,454 UART: [fht] FMC Alias Private Key: 7
2,994,618 UART: [art] Derive CDI
2,994,898 UART: [art] Store in in slot 0x4
3,080,823 UART: [art] Derive Key Pair
3,081,183 UART: [art] Store priv key in slot 0x5
3,094,629 UART: [art] Derive Key Pair - Done
3,109,416 UART: [art] Signing Cert with AUTHO
3,109,896 UART: RITY.KEYID = 7
3,124,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,537 UART: [art] PUB.X = D5A0CB7F3B2D7DE2EA87BD4707FCC16A272F92A26D80FDA5DD111CECC579DA777513DBF437FDBD1452E552F5368ED9C1
3,132,328 UART: [art] PUB.Y = B5837C00B35933743D48DBF5D722B551F99E4103AA7BF09BCAF1C3FDF018E9E41F1A9ADF52AF884D3605C40F3408A9FF
3,139,258 UART: [art] SIG.R = 6944F27ACA302040F0176DF151BA5825F9AE95C917A89332253B58CCF51918B555215E266D08FB8824DB6DE243C13B0E
3,146,020 UART: [art] SIG.S = 5A94C525D01081C6A1717F8CFD34AC1EBD4C6ABD267D6E18A8D9F8ECA4C75371EA484031DB954200F0D5FE1B53B6BCEF
3,170,363 UART: Caliptra RT
3,170,617 UART: [state] CFI Enabled
3,278,955 UART: [rt] RT listening for mailbox commands...
3,279,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,082 UART: [rt]cmd =0x44504543, len=24
3,343,861 >>> mbox cmd response data (40 bytes)
3,343,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,847 UART: [rt]cmd =0x44504543, len=96
3,381,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 ready_for_fw is high
1,060,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,295 >>> mbox cmd response: success
2,687,651 UART:
2,687,667 UART: Running Caliptra FMC ...
2,688,075 UART:
2,688,129 UART: [state] CFI Enabled
2,698,426 UART: [fht] FMC Alias Private Key: 7
2,806,369 UART: [art] Extend RT PCRs Done
2,806,797 UART: [art] Lock RT PCRs Done
2,808,139 UART: [art] Populate DV Done
2,816,208 UART: [fht] FMC Alias Private Key: 7
2,817,308 UART: [art] Derive CDI
2,817,588 UART: [art] Store in in slot 0x4
2,903,433 UART: [art] Derive Key Pair
2,903,793 UART: [art] Store priv key in slot 0x5
2,917,155 UART: [art] Derive Key Pair - Done
2,932,334 UART: [art] Signing Cert with AUTHO
2,932,814 UART: RITY.KEYID = 7
2,947,412 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,177 UART: [art] PUB.X = BE1C871CB1833C5F11811A406CB7EBCACB5426F03F9B7139BC809CFCA632C81CDBCE184EFE8E4E55383FF53CE9F38469
2,954,967 UART: [art] PUB.Y = D73D7173681C80CF482A0CBE8D75E3BC5DE794CEE1F83B3B6E08B355966808A8FD3281B0886E567C2DA111191CFB83E8
2,961,916 UART: [art] SIG.R = 6817A6CC6E6F2E92E4AF19854CBCB2949FF92B4B291E239830D4645EBBBA61CADD018BC0F3F845EE725B2463E709282D
2,968,692 UART: [art] SIG.S = CDC3651DF11AD0335466D77D2E74F21EF229436CFF88E93B820369D3E727B7B5C88F37B0B9FCE87B636B4D0B0CF95699
2,992,570 UART: Caliptra RT
2,992,824 UART: [state] CFI Enabled
3,101,914 UART: [rt] RT listening for mailbox commands...
3,102,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,175 UART: [rt]cmd =0x44504543, len=24
3,165,960 >>> mbox cmd response data (40 bytes)
3,165,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,952 UART: [rt]cmd =0x44504543, len=96
3,203,371 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
893,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,882 UART: [kat] ++
898,034 UART: [kat] sha1
902,142 UART: [kat] SHA2-256
904,082 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
922,827 UART: [kat] LMS
1,171,155 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,548 UART: [fht] FHT @ 0x50003400
1,175,129 UART: [idev] ++
1,175,297 UART: [idev] CDI.KEYID = 6
1,175,657 UART: [idev] SUBJECT.KEYID = 7
1,176,081 UART: [idev] UDS.KEYID = 0
1,176,426 ready_for_fw is high
1,176,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,049 UART: [idev] Erasing UDS.KEYID = 0
1,201,186 UART: [idev] Sha1 KeyId Algorithm
1,209,668 UART: [idev] --
1,210,846 UART: [ldev] ++
1,211,014 UART: [ldev] CDI.KEYID = 6
1,211,377 UART: [ldev] SUBJECT.KEYID = 5
1,211,803 UART: [ldev] AUTHORITY.KEYID = 7
1,212,266 UART: [ldev] FE.KEYID = 1
1,217,498 UART: [ldev] Erasing FE.KEYID = 1
1,244,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,891 UART: [fwproc] Wait for Commands...
1,284,469 UART: [fwproc] Recv command 0x46574c44
1,285,197 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,709 >>> mbox cmd response: success
2,775,911 UART: [afmc] ++
2,776,079 UART: [afmc] CDI.KEYID = 6
2,776,441 UART: [afmc] SUBJECT.KEYID = 7
2,776,866 UART: [afmc] AUTHORITY.KEYID = 5
2,812,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,348 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,132 UART: [afmc] --
2,856,198 UART: [cold-reset] --
2,857,018 UART: [state] Locking Datavault
2,857,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,539 UART: [state] Locking ICCM
2,859,131 UART: [exit] Launching FMC @ 0x40000130
2,864,460 UART:
2,864,476 UART: Running Caliptra FMC ...
2,864,884 UART:
2,865,027 UART: [state] CFI Enabled
2,875,338 UART: [fht] FMC Alias Private Key: 7
2,983,375 UART: [art] Extend RT PCRs Done
2,983,803 UART: [art] Lock RT PCRs Done
2,985,233 UART: [art] Populate DV Done
2,993,478 UART: [fht] FMC Alias Private Key: 7
2,994,634 UART: [art] Derive CDI
2,994,914 UART: [art] Store in in slot 0x4
3,080,199 UART: [art] Derive Key Pair
3,080,559 UART: [art] Store priv key in slot 0x5
3,093,917 UART: [art] Derive Key Pair - Done
3,108,407 UART: [art] Signing Cert with AUTHO
3,108,887 UART: RITY.KEYID = 7
3,124,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,888 UART: [art] PUB.X = C409FBD4115909DEC11E64513308B65C37A1E79564FCA6376DC7B155EDEF532C4F1F2B99FE06902003DFBFED7E7FB965
3,131,655 UART: [art] PUB.Y = 9FD397DED1D3E2EB726A8468240CCF43C42D7B127AE129CD8C2A10F59B91D0FBA280CB602038337458DB77738A0D356A
3,138,607 UART: [art] SIG.R = 6583E19A3F1111DFC0519A1A8E330F95524CBBEB6383B1CEDD363AC5EC26057CE3B4694137D6C21B1477FE18A83A1BF1
3,145,381 UART: [art] SIG.S = 6A57B45E39AC99AFB788CD001A7E478C1E138FE233051FC9C334221319DD2EC4D0878EE7AE53F358826FD2C5BCFADDD7
3,169,401 UART: Caliptra RT
3,169,747 UART: [state] CFI Enabled
3,278,119 UART: [rt] RT listening for mailbox commands...
3,278,789 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,624 UART: [rt]cmd =0x44504543, len=24
3,342,491 >>> mbox cmd response data (40 bytes)
3,342,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,533 UART: [rt]cmd =0x44504543, len=96
3,379,808 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,390 ready_for_fw is high
1,061,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,958 >>> mbox cmd response: success
2,686,964 UART:
2,686,980 UART: Running Caliptra FMC ...
2,687,388 UART:
2,687,531 UART: [state] CFI Enabled
2,698,210 UART: [fht] FMC Alias Private Key: 7
2,806,227 UART: [art] Extend RT PCRs Done
2,806,655 UART: [art] Lock RT PCRs Done
2,808,073 UART: [art] Populate DV Done
2,816,422 UART: [fht] FMC Alias Private Key: 7
2,817,468 UART: [art] Derive CDI
2,817,748 UART: [art] Store in in slot 0x4
2,903,147 UART: [art] Derive Key Pair
2,903,507 UART: [art] Store priv key in slot 0x5
2,916,773 UART: [art] Derive Key Pair - Done
2,931,503 UART: [art] Signing Cert with AUTHO
2,931,983 UART: RITY.KEYID = 7
2,947,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,888 UART: [art] PUB.X = ADBFBEB25DDCFDA5CD4611F968AD41BAA0C4EFF834F42CA11C725959A0910164986481BA787FF444974ECB213E260876
2,954,666 UART: [art] PUB.Y = 5E89045108AA7460FC8D8224CFA735728F0BAD14473A3909AFE812AC92613BCA66FE752909373D5B58508BE6EB6BD840
2,961,603 UART: [art] SIG.R = 5E2A9638DDB29ACEEC798A870ED1DFD06B01C61C3330C7289B7073B5F735C62ED60333692C1FBA9869606F9AB456C5FE
2,968,374 UART: [art] SIG.S = F4B97592D31F7D23117E03DD40F5C4E3E981DB872FFD000EE965EE5DBE789378AFDB481D830052975D8B15A4AA2EF7D4
2,992,331 UART: Caliptra RT
2,992,677 UART: [state] CFI Enabled
3,100,233 UART: [rt] RT listening for mailbox commands...
3,100,903 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,362 UART: [rt]cmd =0x44504543, len=24
3,165,033 >>> mbox cmd response data (40 bytes)
3,165,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,029 UART: [rt]cmd =0x44504543, len=96
3,202,338 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
919,992 UART: [kat] LMS
1,168,304 UART: [kat] --
1,169,077 UART: [cold-reset] ++
1,169,487 UART: [fht] FHT @ 0x50003400
1,172,213 UART: [idev] ++
1,172,381 UART: [idev] CDI.KEYID = 6
1,172,742 UART: [idev] SUBJECT.KEYID = 7
1,173,167 UART: [idev] UDS.KEYID = 0
1,173,513 ready_for_fw is high
1,173,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,975 UART: [idev] Erasing UDS.KEYID = 0
1,197,689 UART: [idev] Sha1 KeyId Algorithm
1,206,473 UART: [idev] --
1,207,546 UART: [ldev] ++
1,207,714 UART: [ldev] CDI.KEYID = 6
1,208,078 UART: [ldev] SUBJECT.KEYID = 5
1,208,505 UART: [ldev] AUTHORITY.KEYID = 7
1,208,968 UART: [ldev] FE.KEYID = 1
1,214,122 UART: [ldev] Erasing FE.KEYID = 1
1,240,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,184 UART: [fwproc] Wait for Commands...
1,280,803 UART: [fwproc] Recv command 0x46574c44
1,281,536 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,856 >>> mbox cmd response: success
2,771,915 UART: [afmc] ++
2,772,083 UART: [afmc] CDI.KEYID = 6
2,772,446 UART: [afmc] SUBJECT.KEYID = 7
2,772,872 UART: [afmc] AUTHORITY.KEYID = 5
2,808,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,616 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,228 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,947 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,948 UART: [afmc] --
2,852,072 UART: [cold-reset] --
2,853,136 UART: [state] Locking Datavault
2,854,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,865 UART: [state] Locking ICCM
2,855,387 UART: [exit] Launching FMC @ 0x40000130
2,860,716 UART:
2,860,732 UART: Running Caliptra FMC ...
2,861,140 UART:
2,861,194 UART: [state] CFI Enabled
2,871,923 UART: [fht] FMC Alias Private Key: 7
2,980,094 UART: [art] Extend RT PCRs Done
2,980,522 UART: [art] Lock RT PCRs Done
2,982,030 UART: [art] Populate DV Done
2,990,017 UART: [fht] FMC Alias Private Key: 7
2,990,979 UART: [art] Derive CDI
2,991,259 UART: [art] Store in in slot 0x4
3,076,522 UART: [art] Derive Key Pair
3,076,882 UART: [art] Store priv key in slot 0x5
3,090,366 UART: [art] Derive Key Pair - Done
3,105,353 UART: [art] Signing Cert with AUTHO
3,105,833 UART: RITY.KEYID = 7
3,121,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,846 UART: [art] PUB.X = 76C35723010AFA6EB5441FD8ABF18B8819ED122D01DCF06C20C57068BBDB8AC00C954F7F739F6AF468D94452A040C7CE
3,128,616 UART: [art] PUB.Y = 16230401B295A6574EC6301DAEBFAD701B06458F1180F77A54FF1E55F740C07CEB23C9A5BFE0DF48703A1DAC133F122F
3,135,567 UART: [art] SIG.R = CAE39ECFBDD01F1706EF148AFC9757D6646D00B7C8D3AB9168FEC48A32E06D432D5705B30AB82DB2D22E43AD87A634B3
3,142,324 UART: [art] SIG.S = 6C200A12BBAD307D73176E449E572877C07EDCA62CE760182AB2C77C0BEB7209C1E935E4EF22FEE47D83076299C3FB89
3,166,005 UART: Caliptra RT
3,166,259 UART: [state] CFI Enabled
3,273,769 UART: [rt] RT listening for mailbox commands...
3,274,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,206 UART: [rt]cmd =0x44504543, len=24
3,338,345 >>> mbox cmd response data (40 bytes)
3,338,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,201 UART: [rt]cmd =0x44504543, len=96
3,375,474 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,304 ready_for_fw is high
1,055,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,062 >>> mbox cmd response: success
2,681,912 UART:
2,681,928 UART: Running Caliptra FMC ...
2,682,336 UART:
2,682,390 UART: [state] CFI Enabled
2,693,205 UART: [fht] FMC Alias Private Key: 7
2,801,008 UART: [art] Extend RT PCRs Done
2,801,436 UART: [art] Lock RT PCRs Done
2,803,294 UART: [art] Populate DV Done
2,811,677 UART: [fht] FMC Alias Private Key: 7
2,812,773 UART: [art] Derive CDI
2,813,053 UART: [art] Store in in slot 0x4
2,899,036 UART: [art] Derive Key Pair
2,899,396 UART: [art] Store priv key in slot 0x5
2,912,462 UART: [art] Derive Key Pair - Done
2,926,996 UART: [art] Signing Cert with AUTHO
2,927,476 UART: RITY.KEYID = 7
2,942,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,313 UART: [art] PUB.X = 13E3BE9DA48BE3BC2C230CD090028072B7ED012D9504C673982C39DC712E8A933BF85F26CAD637CD2C3A3EAA67EF634B
2,950,085 UART: [art] PUB.Y = 066DA6CCE44819FE7F676748FADB9DEC2DF7A2C12E8ACE048FA8F91DAB443690027436057776247B62E17D25B24F2348
2,957,029 UART: [art] SIG.R = A63779EB536ABCC3D7E4EA5B0F53A221E6D6B5CE0D0C9535249BF43EC582B99BC2430D3BC970D7D4B9B0869FF6B99DCA
2,963,807 UART: [art] SIG.S = 52D50028B4C70E72CB522460F6723BFA304CACAE085E571AE62C703982A614073BA454A8267FE4F970DE7DA093C0F919
2,987,571 UART: Caliptra RT
2,987,825 UART: [state] CFI Enabled
3,095,655 UART: [rt] RT listening for mailbox commands...
3,096,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,974 UART: [rt]cmd =0x44504543, len=24
3,160,397 >>> mbox cmd response data (40 bytes)
3,160,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,345 UART: [rt]cmd =0x44504543, len=96
3,197,534 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,433 UART: [kat] LMS
1,169,745 UART: [kat] --
1,170,658 UART: [cold-reset] ++
1,171,054 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,174,928 ready_for_fw is high
1,174,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,199,358 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x46574c44
1,283,173 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,482 >>> mbox cmd response: success
2,773,517 UART: [afmc] ++
2,773,685 UART: [afmc] CDI.KEYID = 6
2,774,048 UART: [afmc] SUBJECT.KEYID = 7
2,774,474 UART: [afmc] AUTHORITY.KEYID = 5
2,810,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,634 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,632 UART: [afmc] --
2,853,618 UART: [cold-reset] --
2,854,366 UART: [state] Locking Datavault
2,855,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,149 UART: [state] Locking ICCM
2,856,715 UART: [exit] Launching FMC @ 0x40000130
2,862,044 UART:
2,862,060 UART: Running Caliptra FMC ...
2,862,468 UART:
2,862,611 UART: [state] CFI Enabled
2,873,242 UART: [fht] FMC Alias Private Key: 7
2,981,619 UART: [art] Extend RT PCRs Done
2,982,047 UART: [art] Lock RT PCRs Done
2,983,887 UART: [art] Populate DV Done
2,992,304 UART: [fht] FMC Alias Private Key: 7
2,993,370 UART: [art] Derive CDI
2,993,650 UART: [art] Store in in slot 0x4
3,079,451 UART: [art] Derive Key Pair
3,079,811 UART: [art] Store priv key in slot 0x5
3,093,263 UART: [art] Derive Key Pair - Done
3,108,142 UART: [art] Signing Cert with AUTHO
3,108,622 UART: RITY.KEYID = 7
3,123,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,673 UART: [art] PUB.X = 982F655EA9566B8BF10C5A655C711A2F9D48FCBB56D9D9C990D543F6572DC6772686E1FC78F0B083D4CAAE85F49C6C76
3,131,450 UART: [art] PUB.Y = F26A6681D01A88C54D236CF753F889BF49340AFBDB0234671F247DDF8698EA5C4059DB03F4C3B0FC51E0E28F3855E263
3,138,397 UART: [art] SIG.R = 1D6E7A6578ECCEB8BD4EA4DB1AA38CACE91BBF3A2479C7242BEBFDEBC536BD8C13D88EC51775BAB601B331A83AF8CF5F
3,145,200 UART: [art] SIG.S = B3BD66D2C0DF62E9B528A54FBAB5ED58B1BD2BA61859E1274A6BC2DF6088F05CA0AD9848270F136D607F10B2B365B247
3,168,674 UART: Caliptra RT
3,169,020 UART: [state] CFI Enabled
3,276,888 UART: [rt] RT listening for mailbox commands...
3,277,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,181 UART: [rt]cmd =0x44504543, len=24
3,341,512 >>> mbox cmd response data (40 bytes)
3,341,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,396 UART: [rt]cmd =0x44504543, len=96
3,378,567 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,393 ready_for_fw is high
1,056,393 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,385 >>> mbox cmd response: success
2,684,859 UART:
2,684,875 UART: Running Caliptra FMC ...
2,685,283 UART:
2,685,426 UART: [state] CFI Enabled
2,695,939 UART: [fht] FMC Alias Private Key: 7
2,803,638 UART: [art] Extend RT PCRs Done
2,804,066 UART: [art] Lock RT PCRs Done
2,805,534 UART: [art] Populate DV Done
2,813,547 UART: [fht] FMC Alias Private Key: 7
2,814,601 UART: [art] Derive CDI
2,814,881 UART: [art] Store in in slot 0x4
2,900,576 UART: [art] Derive Key Pair
2,900,936 UART: [art] Store priv key in slot 0x5
2,914,454 UART: [art] Derive Key Pair - Done
2,928,864 UART: [art] Signing Cert with AUTHO
2,929,344 UART: RITY.KEYID = 7
2,944,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,159 UART: [art] PUB.X = 21324478D52BB21E88C084D80D76A4FACD92995EB6E78E866D859D37E0E675FDED9B2C09789182CFEC1D6E89EEA47C49
2,951,933 UART: [art] PUB.Y = D606E34D79DAA27F504EE79EFFCEFA7504830CFF767CB6560B7E8565FB9D5D493C4ED761BD8890191F47C8CCE126E712
2,958,885 UART: [art] SIG.R = 3C22F9FCF649FD18A455B8B18B21389B1D63537BD0C75780D581337FF4FBB88A3347CFF9E3ADA3820FB23BE61D9D1BFF
2,965,668 UART: [art] SIG.S = D49B141487D288722A67E18575185227CC7D993E1EDDB888F872F0AFF19649CE8270475F565BF1E31188931D416713EF
2,989,819 UART: Caliptra RT
2,990,165 UART: [state] CFI Enabled
3,097,897 UART: [rt] RT listening for mailbox commands...
3,098,567 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,028 UART: [rt]cmd =0x44504543, len=24
3,162,189 >>> mbox cmd response data (40 bytes)
3,162,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,213 UART: [rt]cmd =0x44504543, len=96
3,199,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,328 UART:
192,688 UART: Running Caliptra ROM ...
193,826 UART:
193,965 UART: [state] CFI Enabled
264,337 UART: [state] LifecycleState = Unprovisioned
266,275 UART: [state] DebugLocked = No
267,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,691 UART: [kat] SHA2-256
441,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,959 UART: [kat] ++
452,428 UART: [kat] sha1
463,225 UART: [kat] SHA2-256
465,874 UART: [kat] SHA2-384
472,003 UART: [kat] SHA2-512-ACC
474,370 UART: [kat] ECC-384
2,766,242 UART: [kat] HMAC-384Kdf
2,778,762 UART: [kat] LMS
3,969,092 UART: [kat] --
3,975,246 UART: [cold-reset] ++
3,976,748 UART: [fht] Storing FHT @ 0x50003400
3,988,521 UART: [idev] ++
3,989,162 UART: [idev] CDI.KEYID = 6
3,990,065 UART: [idev] SUBJECT.KEYID = 7
3,991,303 UART: [idev] UDS.KEYID = 0
3,992,327 ready_for_fw is high
3,992,518 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,925 UART: [idev] Erasing UDS.KEYID = 0
7,322,160 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,214 UART: [idev] --
7,349,287 UART: [ldev] ++
7,349,852 UART: [ldev] CDI.KEYID = 6
7,350,815 UART: [ldev] SUBJECT.KEYID = 5
7,352,020 UART: [ldev] AUTHORITY.KEYID = 7
7,353,244 UART: [ldev] FE.KEYID = 1
7,401,049 UART: [ldev] Erasing FE.KEYID = 1
10,734,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,253 UART: [ldev] --
13,115,026 UART: [fwproc] Waiting for Commands...
13,117,548 UART: [fwproc] Received command 0x46574c44
13,119,721 UART: [fwproc] Received Image of size 114036 bytes
17,164,000 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,634,186 >>> mbox cmd response: success
17,638,764 UART: [afmc] ++
17,639,362 UART: [afmc] CDI.KEYID = 6
17,640,268 UART: [afmc] SUBJECT.KEYID = 7
17,641,535 UART: [afmc] AUTHORITY.KEYID = 5
21,005,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,603 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,866 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,315 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,138 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,555 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,903 UART: [afmc] --
23,377,329 UART: [cold-reset] --
23,381,347 UART: [state] Locking Datavault
23,387,727 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,484 UART: [state] Locking ICCM
23,391,152 UART: [exit] Launching FMC @ 0x40000130
23,399,571 UART:
23,399,804 UART: Running Caliptra FMC ...
23,400,826 UART:
23,400,967 UART: [state] CFI Enabled
23,466,417 UART: [fht] FMC Alias Private Key: 7
25,804,279 UART: [art] Extend RT PCRs Done
25,805,512 UART: [art] Lock RT PCRs Done
25,807,022 UART: [art] Populate DV Done
25,812,379 UART: [fht] FMC Alias Private Key: 7
25,813,913 UART: [art] Derive CDI
25,814,667 UART: [art] Store in in slot 0x4
25,875,543 UART: [art] Derive Key Pair
25,876,574 UART: [art] Store priv key in slot 0x5
29,168,775 UART: [art] Derive Key Pair - Done
29,181,607 UART: [art] Signing Cert with AUTHO
29,182,903 UART: RITY.KEYID = 7
31,469,699 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,207 UART: [art] PUB.X = 2CBF520C212CA2CF461E61724F36CCE4205EB5260F73537837283315043D21A3FE689CB264BD51A4F2F8AB49EA556764
31,478,420 UART: [art] PUB.Y = F27CD126822EF5E7439483592E28FB113F46B8754D7F8169597E717629A4635368D9511B8D87FA4A406E0806CA376BE5
31,485,660 UART: [art] SIG.R = 2AB183E132479F2CF1F031C3F10AC7570B99C26EA1E3706EF9A0468C2FC4B0FF7F6220C2B3FDDBCA3744670601A09893
31,493,034 UART: [art] SIG.S = B8D1E0D03E62D1863597B8DAE8518EEF2BA896CFA18FEBF5F71D73F926D91CF8B97D46B223DAF7C3F3FF2770E4EEF1B6
32,798,381 UART: Caliptra RT
32,799,090 UART: [state] CFI Enabled
32,979,529 UART: [rt] RT listening for mailbox commands...
32,981,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,012,108 UART: [rt]cmd =0x44504543, len=96
33,018,280 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,809,515 ready_for_fw is high
3,810,086 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,897,871 >>> mbox cmd response: success
23,594,043 UART:
23,594,431 UART: Running Caliptra FMC ...
23,595,557 UART:
23,595,711 UART: [state] CFI Enabled
23,662,408 UART: [fht] FMC Alias Private Key: 7
26,000,488 UART: [art] Extend RT PCRs Done
26,001,718 UART: [art] Lock RT PCRs Done
26,003,510 UART: [art] Populate DV Done
26,008,873 UART: [fht] FMC Alias Private Key: 7
26,010,469 UART: [art] Derive CDI
26,011,281 UART: [art] Store in in slot 0x4
26,073,082 UART: [art] Derive Key Pair
26,074,121 UART: [art] Store priv key in slot 0x5
29,367,152 UART: [art] Derive Key Pair - Done
29,379,825 UART: [art] Signing Cert with AUTHO
29,381,123 UART: RITY.KEYID = 7
31,669,000 UART: [art] Erasing AUTHORITY.KEYID = 7
31,670,514 UART: [art] PUB.X = BD424C1F813353E0AEC639D69D3730590C02589358CB40FA416D663B8B43DE45B3F33E57ED4634656FA23EEC37AD4498
31,677,722 UART: [art] PUB.Y = C5F7D0932A021CFE465259E820F1A0867C5E4F186366F8467BB358620528F80A4D10107C69087022E67BB404F5B4B35A
31,684,950 UART: [art] SIG.R = 3C0DFDB08ABB379E94BC8C0826831AB9A709C8F7CBE3C71E61C7B318FC8F5500B20ED57439D3BD20151956EED55DE039
31,692,366 UART: [art] SIG.S = AC72E23E910957F2E761407B8450DEBA2CDDD4B1AE9B7080316D159D45C8A8AA97B6395638F635FAC09166A77204BE76
32,997,914 UART: Caliptra RT
32,998,616 UART: [state] CFI Enabled
33,161,183 UART: [rt] RT listening for mailbox commands...
33,163,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,194,059 UART: [rt]cmd =0x44504543, len=96
33,200,958 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,214 UART:
192,572 UART: Running Caliptra ROM ...
193,702 UART:
603,534 UART: [state] CFI Enabled
616,410 UART: [state] LifecycleState = Unprovisioned
618,283 UART: [state] DebugLocked = No
620,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,032 UART: [kat] SHA2-256
794,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,266 UART: [kat] ++
805,784 UART: [kat] sha1
817,224 UART: [kat] SHA2-256
819,944 UART: [kat] SHA2-384
826,639 UART: [kat] SHA2-512-ACC
829,009 UART: [kat] ECC-384
3,111,068 UART: [kat] HMAC-384Kdf
3,122,530 UART: [kat] LMS
4,312,621 UART: [kat] --
4,318,910 UART: [cold-reset] ++
4,320,010 UART: [fht] Storing FHT @ 0x50003400
4,331,157 UART: [idev] ++
4,331,769 UART: [idev] CDI.KEYID = 6
4,332,685 UART: [idev] SUBJECT.KEYID = 7
4,333,864 UART: [idev] UDS.KEYID = 0
4,334,914 ready_for_fw is high
4,335,123 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,206 UART: [idev] Erasing UDS.KEYID = 0
7,618,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,000 UART: [idev] --
7,641,634 UART: [ldev] ++
7,642,195 UART: [ldev] CDI.KEYID = 6
7,643,135 UART: [ldev] SUBJECT.KEYID = 5
7,644,317 UART: [ldev] AUTHORITY.KEYID = 7
7,645,645 UART: [ldev] FE.KEYID = 1
7,656,423 UART: [ldev] Erasing FE.KEYID = 1
10,943,778 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,944 UART: [ldev] --
13,303,511 UART: [fwproc] Waiting for Commands...
13,306,257 UART: [fwproc] Received command 0x46574c44
13,308,437 UART: [fwproc] Received Image of size 114036 bytes
17,365,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,916 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,802 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,825,642 >>> mbox cmd response: success
17,829,848 UART: [afmc] ++
17,830,440 UART: [afmc] CDI.KEYID = 6
17,831,460 UART: [afmc] SUBJECT.KEYID = 7
17,832,637 UART: [afmc] AUTHORITY.KEYID = 5
21,148,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,016 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,298 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,692 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,506 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,969 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,597 UART: [afmc] --
23,515,653 UART: [cold-reset] --
23,520,607 UART: [state] Locking Datavault
23,525,053 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,797 UART: [state] Locking ICCM
23,528,738 UART: [exit] Launching FMC @ 0x40000130
23,537,092 UART:
23,537,331 UART: Running Caliptra FMC ...
23,538,431 UART:
23,538,612 UART: [state] CFI Enabled
23,546,776 UART: [fht] FMC Alias Private Key: 7
25,877,469 UART: [art] Extend RT PCRs Done
25,878,687 UART: [art] Lock RT PCRs Done
25,880,363 UART: [art] Populate DV Done
25,885,829 UART: [fht] FMC Alias Private Key: 7
25,887,322 UART: [art] Derive CDI
25,888,084 UART: [art] Store in in slot 0x4
25,930,688 UART: [art] Derive Key Pair
25,931,725 UART: [art] Store priv key in slot 0x5
29,173,519 UART: [art] Derive Key Pair - Done
29,186,567 UART: [art] Signing Cert with AUTHO
29,187,873 UART: RITY.KEYID = 7
31,467,617 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,123 UART: [art] PUB.X = A88F764ACAA78597505F1B45F6AFE9B0D649FEC35AA9B9D31E41AF29A34F41C9B3136A2D70BA97F4ED7CE3CFBDCCDB13
31,476,386 UART: [art] PUB.Y = 32B37DC29D9AEC2C13B13B69CEEE1820C5A049CD069B68D99BABC3E2ADBBB5E974ED8527F583981DF126E7DB332ED9E5
31,483,705 UART: [art] SIG.R = 78E92C754771329D4EAFC9D9151E044F71C2DD6AA2668871AC17231E1086B84202A8EB35A016B8968F79DF7BC32B368F
31,491,063 UART: [art] SIG.S = 041FC021A03F6D7A41E4105766CE91E6C12098E93C55B0033DC7858BE6E0A687A9EDEC90B7A4DE4FA0DF740C8190F3C9
32,796,030 UART: Caliptra RT
32,796,730 UART: [state] CFI Enabled
32,914,582 UART: [rt] RT listening for mailbox commands...
32,916,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,947,216 UART: [rt]cmd =0x44504543, len=96
32,953,684 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,127,078 ready_for_fw is high
4,127,501 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,826 >>> mbox cmd response: success
23,714,823 UART:
23,715,207 UART: Running Caliptra FMC ...
23,716,406 UART:
23,716,577 UART: [state] CFI Enabled
23,724,269 UART: [fht] FMC Alias Private Key: 7
26,055,150 UART: [art] Extend RT PCRs Done
26,056,370 UART: [art] Lock RT PCRs Done
26,058,059 UART: [art] Populate DV Done
26,063,320 UART: [fht] FMC Alias Private Key: 7
26,065,004 UART: [art] Derive CDI
26,065,831 UART: [art] Store in in slot 0x4
26,108,533 UART: [art] Derive Key Pair
26,109,531 UART: [art] Store priv key in slot 0x5
29,351,314 UART: [art] Derive Key Pair - Done
29,363,932 UART: [art] Signing Cert with AUTHO
29,365,231 UART: RITY.KEYID = 7
31,644,757 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,265 UART: [art] PUB.X = 5D68F8427B6BA0D79DFCA09065059EBF216391E52AD487A315DD06C5256900B8CF4296CCA8AD5E3D95EAFB718DCE6971
31,653,541 UART: [art] PUB.Y = 33E346B0FAB4DA00A384F3BB5D2820F5828BA3B3BB21E039D7411CD8C031592E325B57CCA6A133621FA9C17C65F51381
31,660,753 UART: [art] SIG.R = 830A53A48A1CC3F079304DB18757CA9C3A13073CE27CFEC204FC185C8F08C6A4B2BC5109C93B53625B0037D417D8D27C
31,668,164 UART: [art] SIG.S = 4B67AEA6FB120A02789F6F529867E68F274A6822B26A23B948F4AFB82692DD0177BEECF2001969959A62E3D8DB104780
32,973,105 UART: Caliptra RT
32,973,815 UART: [state] CFI Enabled
33,092,921 UART: [rt] RT listening for mailbox commands...
33,094,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,125,614 UART: [rt]cmd =0x44504543, len=96
33,132,410 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,539 writing to cptra_bootfsm_go
192,665 UART:
193,031 UART: Running Caliptra ROM ...
194,232 UART:
194,409 UART: [state] CFI Enabled
260,944 UART: [state] LifecycleState = Unprovisioned
262,894 UART: [state] DebugLocked = No
264,936 UART: [state] WD Timer not started. Device not locked for debugging
269,253 UART: [kat] SHA2-256
448,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,929 UART: [kat] ++
460,470 UART: [kat] sha1
471,994 UART: [kat] SHA2-256
474,996 UART: [kat] SHA2-384
482,471 UART: [kat] SHA2-512-ACC
485,418 UART: [kat] ECC-384
2,946,912 UART: [kat] HMAC-384Kdf
2,970,154 UART: [kat] LMS
3,499,579 UART: [kat] --
3,502,101 UART: [cold-reset] ++
3,503,146 UART: [fht] FHT @ 0x50003400
3,512,994 UART: [idev] ++
3,513,560 UART: [idev] CDI.KEYID = 6
3,514,442 UART: [idev] SUBJECT.KEYID = 7
3,515,620 UART: [idev] UDS.KEYID = 0
3,516,672 ready_for_fw is high
3,516,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,660,656 UART: [idev] Erasing UDS.KEYID = 0
6,024,757 UART: [idev] Sha1 KeyId Algorithm
6,047,497 UART: [idev] --
6,052,367 UART: [ldev] ++
6,052,943 UART: [ldev] CDI.KEYID = 6
6,053,866 UART: [ldev] SUBJECT.KEYID = 5
6,055,149 UART: [ldev] AUTHORITY.KEYID = 7
6,056,545 UART: [ldev] FE.KEYID = 1
6,100,507 UART: [ldev] Erasing FE.KEYID = 1
8,605,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,734 UART: [ldev] --
10,415,946 UART: [fwproc] Wait for Commands...
10,417,552 UART: [fwproc] Recv command 0x46574c44
10,419,647 UART: [fwproc] Recv'd Img size: 114360 bytes
13,826,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,546 >>> mbox cmd response: success
14,288,335 UART: [afmc] ++
14,288,936 UART: [afmc] CDI.KEYID = 6
14,289,851 UART: [afmc] SUBJECT.KEYID = 7
14,291,036 UART: [afmc] AUTHORITY.KEYID = 5
16,829,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,729 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,162 UART: [afmc] --
18,629,121 UART: [cold-reset] --
18,633,423 UART: [state] Locking Datavault
18,638,509 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,158 UART: [state] Locking ICCM
18,642,257 UART: [exit] Launching FMC @ 0x40000130
18,650,656 UART:
18,650,895 UART: Running Caliptra FMC ...
18,651,999 UART:
18,652,179 UART: [state] CFI Enabled
18,711,187 UART: [fht] FMC Alias Private Key: 7
20,474,863 UART: [art] Extend RT PCRs Done
20,476,090 UART: [art] Lock RT PCRs Done
20,477,829 UART: [art] Populate DV Done
20,483,293 UART: [fht] FMC Alias Private Key: 7
20,484,776 UART: [art] Derive CDI
20,485,536 UART: [art] Store in in slot 0x4
20,542,850 UART: [art] Derive Key Pair
20,543,892 UART: [art] Store priv key in slot 0x5
23,007,590 UART: [art] Derive Key Pair - Done
23,020,322 UART: [art] Signing Cert with AUTHO
23,021,654 UART: RITY.KEYID = 7
24,732,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,184 UART: [art] PUB.X = DD366AE3D63F1B5490DF5626DA56E98C6F4B554011C847A228133275E69EF27C7FE4B0707CDD3EDB322D954AE330A896
24,741,405 UART: [art] PUB.Y = ADA4402F2D257891A08435C628D11643D0FE81429A32311D463A5B107498DC96DB2E33C69EF15BD1735ACC10DBF95D23
24,748,687 UART: [art] SIG.R = 0C76C1A10B3A03BE884F39C016EB2D2DDA63075F4571538DC947572C6714418AAF164FE3219FC609CE0A5C2A9A1086C1
24,756,056 UART: [art] SIG.S = 66C885FDF0C3052DB93EB5EA17636E3C5E99D53BC90A898715DCC423A7B17596659FD2A9C46A996EDCCE72FF470AD6EB
25,735,005 UART: Caliptra RT
25,735,708 UART: [state] CFI Enabled
25,900,449 UART: [rt] RT listening for mailbox commands...
25,902,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,824 UART: [rt]cmd =0x44504543, len=96
25,939,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,546 UART:
192,910 UART: Running Caliptra ROM ...
194,089 UART:
194,249 UART: [state] CFI Enabled
266,620 UART: [state] LifecycleState = Unprovisioned
269,056 UART: [state] DebugLocked = No
271,667 UART: [state] WD Timer not started. Device not locked for debugging
277,125 UART: [kat] SHA2-256
466,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,741 UART: [kat] ++
478,191 UART: [kat] sha1
490,293 UART: [kat] SHA2-256
493,257 UART: [kat] SHA2-384
500,601 UART: [kat] SHA2-512-ACC
503,182 UART: [kat] ECC-384
2,947,673 UART: [kat] HMAC-384Kdf
2,972,779 UART: [kat] LMS
3,504,511 UART: [kat] --
3,509,028 UART: [cold-reset] ++
3,510,549 UART: [fht] FHT @ 0x50003400
3,523,397 UART: [idev] ++
3,524,097 UART: [idev] CDI.KEYID = 6
3,525,032 UART: [idev] SUBJECT.KEYID = 7
3,526,216 UART: [idev] UDS.KEYID = 0
3,527,143 ready_for_fw is high
3,527,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,995 UART: [idev] Erasing UDS.KEYID = 0
6,051,798 UART: [idev] Sha1 KeyId Algorithm
6,074,747 UART: [idev] --
6,079,607 UART: [ldev] ++
6,080,330 UART: [ldev] CDI.KEYID = 6
6,081,262 UART: [ldev] SUBJECT.KEYID = 5
6,082,369 UART: [ldev] AUTHORITY.KEYID = 7
6,083,609 UART: [ldev] FE.KEYID = 1
6,122,022 UART: [ldev] Erasing FE.KEYID = 1
8,629,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,249 UART: [ldev] --
10,437,253 UART: [fwproc] Wait for Commands...
10,438,859 UART: [fwproc] Recv command 0x46574c44
10,441,118 UART: [fwproc] Recv'd Img size: 114360 bytes
13,881,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,616,821 >>> mbox cmd response: success
14,620,647 UART: [afmc] ++
14,621,358 UART: [afmc] CDI.KEYID = 6
14,622,611 UART: [afmc] SUBJECT.KEYID = 7
14,624,065 UART: [afmc] AUTHORITY.KEYID = 5
17,148,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,322 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,347 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,399 UART: [afmc] --
18,946,083 UART: [cold-reset] --
18,949,693 UART: [state] Locking Datavault
18,956,789 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,116 UART: [state] Locking ICCM
18,960,521 UART: [exit] Launching FMC @ 0x40000130
18,969,165 UART:
18,969,420 UART: Running Caliptra FMC ...
18,970,527 UART:
18,970,687 UART: [state] CFI Enabled
19,028,991 UART: [fht] FMC Alias Private Key: 7
20,792,195 UART: [art] Extend RT PCRs Done
20,793,416 UART: [art] Lock RT PCRs Done
20,795,131 UART: [art] Populate DV Done
20,800,281 UART: [fht] FMC Alias Private Key: 7
20,801,964 UART: [art] Derive CDI
20,802,789 UART: [art] Store in in slot 0x4
20,861,289 UART: [art] Derive Key Pair
20,862,297 UART: [art] Store priv key in slot 0x5
23,325,246 UART: [art] Derive Key Pair - Done
23,338,196 UART: [art] Signing Cert with AUTHO
23,339,498 UART: RITY.KEYID = 7
25,050,018 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,532 UART: [art] PUB.X = 1BEC062EB575320F7631AACE3A76B1DB40F06D19A6D8D0C1F62D87EF4CB84BF248EF9C9C05519C7E66850A0CF55B4FD8
25,058,819 UART: [art] PUB.Y = 279DFAE33FD426773BEACEBE521680AF8A51BBFB5CE0EE79C0466E85204A86620DE4A772D8E06BB4390CBB1FA9338210
25,066,091 UART: [art] SIG.R = 303B3811F80E057845FAC8DD25A127B335B4209F086DF0F55997CC53CCDD97CE43CA27CED85B024382C55462D0513754
25,073,469 UART: [art] SIG.S = C8C152DD9BDE6415F30357721C53644DE3ED5E46EBD304332EB71D3ECF0CD59F6F0AF5AC12C1D74404525B96DCD5795E
26,052,168 UART: Caliptra RT
26,052,882 UART: [state] CFI Enabled
26,218,234 UART: [rt] RT listening for mailbox commands...
26,220,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,250,653 UART: [rt]cmd =0x44504543, len=96
26,257,418 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,439,224 ready_for_fw is high
3,439,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,738,220 >>> mbox cmd response: success
19,023,009 UART:
19,023,397 UART: Running Caliptra FMC ...
19,024,610 UART:
19,024,791 UART: [state] CFI Enabled
19,092,984 UART: [fht] FMC Alias Private Key: 7
20,857,192 UART: [art] Extend RT PCRs Done
20,858,411 UART: [art] Lock RT PCRs Done
20,859,953 UART: [art] Populate DV Done
20,865,484 UART: [fht] FMC Alias Private Key: 7
20,866,921 UART: [art] Derive CDI
20,867,664 UART: [art] Store in in slot 0x4
20,925,403 UART: [art] Derive Key Pair
20,926,406 UART: [art] Store priv key in slot 0x5
23,389,990 UART: [art] Derive Key Pair - Done
23,403,094 UART: [art] Signing Cert with AUTHO
23,404,405 UART: RITY.KEYID = 7
25,115,275 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,783 UART: [art] PUB.X = B4D03BAE2AA65FC1651B29D1633A17EFE5CA68459BCD8830CF55F9E6E0A42DB4AA95EB69E7AA55AC2A76276419E6440B
25,124,058 UART: [art] PUB.Y = 4AADCED488DC1DA156F97BCBF56223C2D85A672D0802C3E81AAB296307AA9D43133EE2CE62B785B5D99E81FA30A2AB86
25,131,336 UART: [art] SIG.R = F68FD67B3B0CD83D7A18DB3DCE831C7B2E8AC1522E200BBFC64C543A3C9548FA2B5F5C76E0AA6034BF6742CB57F6211A
25,138,764 UART: [art] SIG.S = 5B3284A2AE816AB8A4927BB8BD4ED6E769BAF01BBB2F89AFC2BCE5E7A0D3DA08407FD0356F29F3AAFECFD559EE23DEE0
26,118,123 UART: Caliptra RT
26,118,805 UART: [state] CFI Enabled
26,282,282 UART: [rt] RT listening for mailbox commands...
26,284,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,314,798 UART: [rt]cmd =0x44504543, len=96
26,321,456 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,270 UART:
192,649 UART: Running Caliptra ROM ...
193,741 UART:
603,322 UART: [state] CFI Enabled
620,318 UART: [state] LifecycleState = Unprovisioned
622,676 UART: [state] DebugLocked = No
625,047 UART: [state] WD Timer not started. Device not locked for debugging
630,001 UART: [kat] SHA2-256
819,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,687 UART: [kat] ++
831,209 UART: [kat] sha1
843,706 UART: [kat] SHA2-256
846,710 UART: [kat] SHA2-384
852,482 UART: [kat] SHA2-512-ACC
855,072 UART: [kat] ECC-384
3,298,505 UART: [kat] HMAC-384Kdf
3,312,148 UART: [kat] LMS
3,843,989 UART: [kat] --
3,848,480 UART: [cold-reset] ++
3,850,763 UART: [fht] FHT @ 0x50003400
3,862,945 UART: [idev] ++
3,863,648 UART: [idev] CDI.KEYID = 6
3,864,713 UART: [idev] SUBJECT.KEYID = 7
3,865,814 UART: [idev] UDS.KEYID = 0
3,866,752 ready_for_fw is high
3,866,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,010,543 UART: [idev] Erasing UDS.KEYID = 0
6,342,482 UART: [idev] Sha1 KeyId Algorithm
6,365,426 UART: [idev] --
6,369,601 UART: [ldev] ++
6,370,282 UART: [ldev] CDI.KEYID = 6
6,371,350 UART: [ldev] SUBJECT.KEYID = 5
6,372,458 UART: [ldev] AUTHORITY.KEYID = 7
6,373,652 UART: [ldev] FE.KEYID = 1
6,386,245 UART: [ldev] Erasing FE.KEYID = 1
8,865,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,253 UART: [ldev] --
10,659,605 UART: [fwproc] Wait for Commands...
10,662,776 UART: [fwproc] Recv command 0x46574c44
10,665,086 UART: [fwproc] Recv'd Img size: 114360 bytes
14,110,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,849,960 >>> mbox cmd response: success
14,853,760 UART: [afmc] ++
14,854,486 UART: [afmc] CDI.KEYID = 6
14,855,676 UART: [afmc] SUBJECT.KEYID = 7
14,857,108 UART: [afmc] AUTHORITY.KEYID = 5
17,364,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,086,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,088,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,103,670 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,118,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,133,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,995 UART: [afmc] --
19,162,238 UART: [cold-reset] --
19,165,559 UART: [state] Locking Datavault
19,172,964 UART: [state] Locking PCR0, PCR1 and PCR31
19,175,145 UART: [state] Locking ICCM
19,177,613 UART: [exit] Launching FMC @ 0x40000130
19,186,282 UART:
19,186,536 UART: Running Caliptra FMC ...
19,187,744 UART:
19,187,901 UART: [state] CFI Enabled
19,195,953 UART: [fht] FMC Alias Private Key: 7
20,952,384 UART: [art] Extend RT PCRs Done
20,953,606 UART: [art] Lock RT PCRs Done
20,955,306 UART: [art] Populate DV Done
20,960,674 UART: [fht] FMC Alias Private Key: 7
20,962,330 UART: [art] Derive CDI
20,963,145 UART: [art] Store in in slot 0x4
21,006,011 UART: [art] Derive Key Pair
21,007,018 UART: [art] Store priv key in slot 0x5
23,433,707 UART: [art] Derive Key Pair - Done
23,446,566 UART: [art] Signing Cert with AUTHO
23,447,869 UART: RITY.KEYID = 7
25,153,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,840 UART: [art] PUB.X = 75DFDD72758F07D39170F52A9179C5D13B3D7EE3E6CF6F417C8A343A4E2467F512FF8BF4230D2F1FBDA5F52C32269DC0
25,162,040 UART: [art] PUB.Y = DA188EB905808EA2BBCD4B05B41221F48280CB97EB1095C7CB0A6DBDE11162E6FA17B217128992126E432A9284D63576
25,169,336 UART: [art] SIG.R = 2D430F76EFE42CED06033CAAFCE51B54DCC4008405B27100532E9E9F86CEB541711D9F5C3E2D8174B559622C58661C54
25,176,682 UART: [art] SIG.S = 01FB1336A1AB7C5F09A3D682CA89B4B945F7D61242D7AF3C3DB6EF8A6110C997F629A3AB442963BF497A170282DA6CC0
26,155,522 UART: Caliptra RT
26,156,231 UART: [state] CFI Enabled
26,273,359 UART: [rt] RT listening for mailbox commands...
26,275,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,305,704 UART: [rt]cmd =0x44504543, len=96
26,312,210 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,758,459 ready_for_fw is high
3,759,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,630 >>> mbox cmd response: success
19,215,792 UART:
19,216,184 UART: Running Caliptra FMC ...
19,217,325 UART:
19,217,484 UART: [state] CFI Enabled
19,225,221 UART: [fht] FMC Alias Private Key: 7
20,982,065 UART: [art] Extend RT PCRs Done
20,983,289 UART: [art] Lock RT PCRs Done
20,985,149 UART: [art] Populate DV Done
20,990,715 UART: [fht] FMC Alias Private Key: 7
20,992,303 UART: [art] Derive CDI
20,993,036 UART: [art] Store in in slot 0x4
21,035,923 UART: [art] Derive Key Pair
21,036,972 UART: [art] Store priv key in slot 0x5
23,464,113 UART: [art] Derive Key Pair - Done
23,477,000 UART: [art] Signing Cert with AUTHO
23,478,305 UART: RITY.KEYID = 7
25,183,928 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,436 UART: [art] PUB.X = A76FEA8747B67A2501DA61663961110D16C1212DB5E56A9111859D4D0EDEBAD960D06F310962890FFBD0CFB264026C98
25,192,688 UART: [art] PUB.Y = 490602C128AF4A3E12408FC0540A2D69DA8A8A1DAF93D7392851BE90EDD07622D6B45CB23E6552B3B12981338BFA686E
25,199,953 UART: [art] SIG.R = 6D19BE96178D265BEB513BB50C40704382091AECFDE908D197F0060D7AF0F27520C5A79BB25AA5B2055F9D1E86E1E678
25,207,352 UART: [art] SIG.S = EB63A8B3F711B227EBFD107E9EE04D2BDBC42345017BF3B2781E9693D76674E95FEFA12B94394501D27DFD143C5CEFAA
26,186,972 UART: Caliptra RT
26,187,681 UART: [state] CFI Enabled
26,304,720 UART: [rt] RT listening for mailbox commands...
26,306,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,362 UART: [rt]cmd =0x44504543, len=96
26,343,931 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,279 UART: [kat] SHA2-256
892,217 UART: [kat] SHA2-384
894,798 UART: [kat] SHA2-512-ACC
896,699 UART: [kat] ECC-384
902,086 UART: [kat] HMAC-384Kdf
906,730 UART: [kat] LMS
1,474,926 UART: [kat] --
1,475,787 UART: [cold-reset] ++
1,476,345 UART: [fht] Storing FHT @ 0x50003400
1,479,090 UART: [idev] ++
1,479,258 UART: [idev] CDI.KEYID = 6
1,479,618 UART: [idev] SUBJECT.KEYID = 7
1,480,042 UART: [idev] UDS.KEYID = 0
1,480,387 ready_for_fw is high
1,480,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,158 UART: [idev] Erasing UDS.KEYID = 0
1,505,188 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,942 UART: [idev] --
1,515,059 UART: [ldev] ++
1,515,227 UART: [ldev] CDI.KEYID = 6
1,515,590 UART: [ldev] SUBJECT.KEYID = 5
1,516,016 UART: [ldev] AUTHORITY.KEYID = 7
1,516,479 UART: [ldev] FE.KEYID = 1
1,521,321 UART: [ldev] Erasing FE.KEYID = 1
1,546,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,084 UART: [ldev] --
1,585,515 UART: [fwproc] Waiting for Commands...
1,586,208 UART: [fwproc] Received command 0x46574c44
1,586,999 UART: [fwproc] Received Image of size 114360 bytes
2,884,412 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,630 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,982 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,007 >>> mbox cmd response: success
3,078,083 UART: [afmc] ++
3,078,251 UART: [afmc] CDI.KEYID = 6
3,078,613 UART: [afmc] SUBJECT.KEYID = 7
3,079,038 UART: [afmc] AUTHORITY.KEYID = 5
3,115,095 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,736 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,426 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,123 UART: [afmc] --
3,158,103 UART: [cold-reset] --
3,158,955 UART: [state] Locking Datavault
3,160,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,146 UART: [state] Locking ICCM
3,161,640 UART: [exit] Launching FMC @ 0x40000130
3,166,969 UART:
3,166,985 UART: Running Caliptra FMC ...
3,167,393 UART:
3,167,447 UART: [state] CFI Enabled
3,177,872 UART: [fht] FMC Alias Private Key: 7
3,285,305 UART: [art] Extend RT PCRs Done
3,285,733 UART: [art] Lock RT PCRs Done
3,287,001 UART: [art] Populate DV Done
3,295,174 UART: [fht] FMC Alias Private Key: 7
3,296,266 UART: [art] Derive CDI
3,296,546 UART: [art] Store in in slot 0x4
3,382,123 UART: [art] Derive Key Pair
3,382,483 UART: [art] Store priv key in slot 0x5
3,395,767 UART: [art] Derive Key Pair - Done
3,410,264 UART: [art] Signing Cert with AUTHO
3,410,744 UART: RITY.KEYID = 7
3,426,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,905 UART: [art] PUB.X = AC2FE710F69440AE941D325615CE931AD5398FD25704B2D7A8BE8B857F50938103473E548110A73939CBE7F5869BFB38
3,433,667 UART: [art] PUB.Y = 9DA16D2A365A28ACC3D21ADC4D30F71F09ED412A5DB2102AD8122902543DB510B0CE8423A7DF6F86714F05051654D537
3,440,609 UART: [art] SIG.R = F1144F40523CD03909066C7A10066597ECA7E79B45A5ED7EE7AC71743F062A908EE212C4DB3FEDE91B97DE6CC09238CF
3,447,377 UART: [art] SIG.S = 402FFAD7654EB8BD9E882BC1E0BB1F122A61BE125A189A191168FDF8D3C0A15F097F64E2651F763B3FECF995071E2C65
3,471,144 UART: Caliptra RT
3,471,398 UART: [state] CFI Enabled
3,579,160 UART: [rt] RT listening for mailbox commands...
3,579,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,967 UART: [rt]cmd =0x44504543, len=96
3,617,057 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,967 ready_for_fw is high
1,361,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,139 >>> mbox cmd response: success
2,987,137 UART:
2,987,153 UART: Running Caliptra FMC ...
2,987,561 UART:
2,987,615 UART: [state] CFI Enabled
2,997,736 UART: [fht] FMC Alias Private Key: 7
3,105,321 UART: [art] Extend RT PCRs Done
3,105,749 UART: [art] Lock RT PCRs Done
3,107,149 UART: [art] Populate DV Done
3,115,478 UART: [fht] FMC Alias Private Key: 7
3,116,556 UART: [art] Derive CDI
3,116,836 UART: [art] Store in in slot 0x4
3,202,437 UART: [art] Derive Key Pair
3,202,797 UART: [art] Store priv key in slot 0x5
3,216,131 UART: [art] Derive Key Pair - Done
3,231,071 UART: [art] Signing Cert with AUTHO
3,231,551 UART: RITY.KEYID = 7
3,246,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,184 UART: [art] PUB.X = FAFC0A05168898709C5B20DFC488EA954603683BA37E75E2F1F011733F985FBD9E0CFE08000E82D4F024F7B6C6008349
3,253,894 UART: [art] PUB.Y = 91CC79BD20B11750DEEF953DE51B8A4191AD1128794E14674CDA37001739F11D582E1A5C27E3E9CBCE21BADFE0D9473F
3,260,834 UART: [art] SIG.R = D69209341F72AA050327E6E598F933872E7AE3F6B99AFFE3D84DE43CECA51CF7124F85B0CFF2F33402378D2D28EF1169
3,267,600 UART: [art] SIG.S = B8F21AC727FEFDADED81C1E0753F06F30E145BB91E6AE539DE95D8700DBA301061B33DCA09303B934DE639CDFC3FECA1
3,291,103 UART: Caliptra RT
3,291,357 UART: [state] CFI Enabled
3,399,562 UART: [rt] RT listening for mailbox commands...
3,400,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,547 UART: [rt]cmd =0x44504543, len=96
3,437,749 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
87,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,982 UART: [kat] SHA2-256
892,920 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
908,071 UART: [kat] LMS
1,476,267 UART: [kat] --
1,477,142 UART: [cold-reset] ++
1,477,558 UART: [fht] Storing FHT @ 0x50003400
1,480,413 UART: [idev] ++
1,480,581 UART: [idev] CDI.KEYID = 6
1,480,941 UART: [idev] SUBJECT.KEYID = 7
1,481,365 UART: [idev] UDS.KEYID = 0
1,481,710 ready_for_fw is high
1,481,710 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,987 UART: [idev] Erasing UDS.KEYID = 0
1,506,117 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,631 UART: [idev] --
1,515,630 UART: [ldev] ++
1,515,798 UART: [ldev] CDI.KEYID = 6
1,516,161 UART: [ldev] SUBJECT.KEYID = 5
1,516,587 UART: [ldev] AUTHORITY.KEYID = 7
1,517,050 UART: [ldev] FE.KEYID = 1
1,522,366 UART: [ldev] Erasing FE.KEYID = 1
1,547,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,059 UART: [ldev] --
1,587,478 UART: [fwproc] Waiting for Commands...
1,588,333 UART: [fwproc] Received command 0x46574c44
1,589,124 UART: [fwproc] Received Image of size 114360 bytes
2,886,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,193 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,338 >>> mbox cmd response: success
3,080,498 UART: [afmc] ++
3,080,666 UART: [afmc] CDI.KEYID = 6
3,081,028 UART: [afmc] SUBJECT.KEYID = 7
3,081,453 UART: [afmc] AUTHORITY.KEYID = 5
3,115,990 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,348 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,741 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,431 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,450 UART: [afmc] --
3,159,436 UART: [cold-reset] --
3,160,186 UART: [state] Locking Datavault
3,161,341 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,945 UART: [state] Locking ICCM
3,162,431 UART: [exit] Launching FMC @ 0x40000130
3,167,760 UART:
3,167,776 UART: Running Caliptra FMC ...
3,168,184 UART:
3,168,327 UART: [state] CFI Enabled
3,179,160 UART: [fht] FMC Alias Private Key: 7
3,287,529 UART: [art] Extend RT PCRs Done
3,287,957 UART: [art] Lock RT PCRs Done
3,289,469 UART: [art] Populate DV Done
3,297,662 UART: [fht] FMC Alias Private Key: 7
3,298,618 UART: [art] Derive CDI
3,298,898 UART: [art] Store in in slot 0x4
3,384,381 UART: [art] Derive Key Pair
3,384,741 UART: [art] Store priv key in slot 0x5
3,397,433 UART: [art] Derive Key Pair - Done
3,412,320 UART: [art] Signing Cert with AUTHO
3,412,800 UART: RITY.KEYID = 7
3,428,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,987 UART: [art] PUB.X = 969074F19FF3488E046FBC32782BB23D9757D81210B5BA6825ED2E91F20FA9C23FD74A68F81064FCCFCAEE2A3B452F5B
3,435,763 UART: [art] PUB.Y = 5F8D651A25FFC30B0B32CD182C60D6FF9035429857D4D9DF0DC8A98494B488316611733D7E338BDF059B9579BE64E84D
3,442,703 UART: [art] SIG.R = 5AE61A129883CFF5770D0710C221AE8462D9FA92DBE3FAB1696833EFA354B7B0163B09A20EF1407B739A1AA5175CB9CC
3,449,471 UART: [art] SIG.S = 57D7CCAA259C22F1CF34A6ED1E2EA4DEA0F06C44285F3D5B49B4D9064AE9A56262A4B48299C79C82BB172964BD235208
3,473,318 UART: Caliptra RT
3,473,664 UART: [state] CFI Enabled
3,581,297 UART: [rt] RT listening for mailbox commands...
3,581,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,148 UART: [rt]cmd =0x44504543, len=96
3,619,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,062 ready_for_fw is high
1,363,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,384 >>> mbox cmd response: success
2,992,184 UART:
2,992,200 UART: Running Caliptra FMC ...
2,992,608 UART:
2,992,751 UART: [state] CFI Enabled
3,003,404 UART: [fht] FMC Alias Private Key: 7
3,111,581 UART: [art] Extend RT PCRs Done
3,112,009 UART: [art] Lock RT PCRs Done
3,113,607 UART: [art] Populate DV Done
3,122,014 UART: [fht] FMC Alias Private Key: 7
3,123,060 UART: [art] Derive CDI
3,123,340 UART: [art] Store in in slot 0x4
3,209,291 UART: [art] Derive Key Pair
3,209,651 UART: [art] Store priv key in slot 0x5
3,222,725 UART: [art] Derive Key Pair - Done
3,237,399 UART: [art] Signing Cert with AUTHO
3,237,879 UART: RITY.KEYID = 7
3,253,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,030 UART: [art] PUB.X = A5F5413A830D994A8E585EF651DBE6527E322CBEE4AF1DD535F929F3A2E3A61E5E04E5C606292F2C444D8D9DB15C9799
3,260,801 UART: [art] PUB.Y = B06F238DBE94486CE12B6A70AB6164F155428F128BA1825F73E24C4D125ED3B729ACC9876CA842F0A84CE7B675B7285C
3,267,757 UART: [art] SIG.R = B919FE14CB283DF0B19E413E616BB0C707BA08D9DFB53751C35994FA9665F965629D55617AF4D966E9ADECC83BE55424
3,274,529 UART: [art] SIG.S = 3AC834ADA53753170AE0E791881BE4CB138778D5F0BDBCDA17B2598DD07B38A23BE526B2C76BE2A76F534D7805D32A48
3,298,606 UART: Caliptra RT
3,298,952 UART: [state] CFI Enabled
3,408,812 UART: [rt] RT listening for mailbox commands...
3,409,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,677 UART: [rt]cmd =0x44504543, len=96
3,446,953 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,536 UART: [kat] HMAC-384Kdf
923,018 UART: [kat] LMS
1,171,346 UART: [kat] --
1,172,165 UART: [cold-reset] ++
1,172,629 UART: [fht] FHT @ 0x50003400
1,175,434 UART: [idev] ++
1,175,602 UART: [idev] CDI.KEYID = 6
1,175,962 UART: [idev] SUBJECT.KEYID = 7
1,176,386 UART: [idev] UDS.KEYID = 0
1,176,731 ready_for_fw is high
1,176,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,919 UART: [idev] Sha1 KeyId Algorithm
1,210,551 UART: [idev] --
1,211,805 UART: [ldev] ++
1,211,973 UART: [ldev] CDI.KEYID = 6
1,212,336 UART: [ldev] SUBJECT.KEYID = 5
1,212,762 UART: [ldev] AUTHORITY.KEYID = 7
1,213,225 UART: [ldev] FE.KEYID = 1
1,218,389 UART: [ldev] Erasing FE.KEYID = 1
1,244,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,531 UART: [ldev] --
1,283,826 UART: [fwproc] Wait for Commands...
1,284,492 UART: [fwproc] Recv command 0x46574c44
1,285,220 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,472 >>> mbox cmd response: success
2,775,620 UART: [afmc] ++
2,775,788 UART: [afmc] CDI.KEYID = 6
2,776,150 UART: [afmc] SUBJECT.KEYID = 7
2,776,575 UART: [afmc] AUTHORITY.KEYID = 5
2,811,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,727 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,937 UART: [afmc] --
2,854,851 UART: [cold-reset] --
2,855,563 UART: [state] Locking Datavault
2,856,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,458 UART: [state] Locking ICCM
2,857,938 UART: [exit] Launching FMC @ 0x40000130
2,863,267 UART:
2,863,283 UART: Running Caliptra FMC ...
2,863,691 UART:
2,863,745 UART: [state] CFI Enabled
2,874,358 UART: [fht] FMC Alias Private Key: 7
2,981,729 UART: [art] Extend RT PCRs Done
2,982,157 UART: [art] Lock RT PCRs Done
2,983,595 UART: [art] Populate DV Done
2,991,808 UART: [fht] FMC Alias Private Key: 7
2,992,896 UART: [art] Derive CDI
2,993,176 UART: [art] Store in in slot 0x4
3,078,571 UART: [art] Derive Key Pair
3,078,931 UART: [art] Store priv key in slot 0x5
3,091,841 UART: [art] Derive Key Pair - Done
3,106,486 UART: [art] Signing Cert with AUTHO
3,106,966 UART: RITY.KEYID = 7
3,122,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,105 UART: [art] PUB.X = DB9AAB69140F51A4D4C9170BBC74BCB35739C9CA293B63DB76653CBB428F19D7A018A43AD65D8994D8D359C272F32C9C
3,129,881 UART: [art] PUB.Y = 7F90568A7683636955008436CA0626CCB0FAA82049BED0CBEC2015F90303520E40A61D87D9A789E30812B5B1028D6D70
3,136,785 UART: [art] SIG.R = 4419CAD57F6BC1E0BF534904BB2FAFEB3D9415C6882C321C1197E36C845AAF705AE028CDE5ED973D8C3E00472EF62204
3,143,539 UART: [art] SIG.S = BD2D84B42283F1E8E297695A2BF8E194EC524C76E91D6699380BF041347DA5F69F2DF3BCF8E7CFFFBF037DF3F0E8F5F2
3,167,084 UART: Caliptra RT
3,167,338 UART: [state] CFI Enabled
3,274,996 UART: [rt] RT listening for mailbox commands...
3,275,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,783 UART: [rt]cmd =0x44504543, len=96
3,312,805 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 ready_for_fw is high
1,060,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,911 >>> mbox cmd response: success
2,688,407 UART:
2,688,423 UART: Running Caliptra FMC ...
2,688,831 UART:
2,688,885 UART: [state] CFI Enabled
2,699,386 UART: [fht] FMC Alias Private Key: 7
2,807,581 UART: [art] Extend RT PCRs Done
2,808,009 UART: [art] Lock RT PCRs Done
2,809,805 UART: [art] Populate DV Done
2,818,036 UART: [fht] FMC Alias Private Key: 7
2,819,010 UART: [art] Derive CDI
2,819,290 UART: [art] Store in in slot 0x4
2,905,293 UART: [art] Derive Key Pair
2,905,653 UART: [art] Store priv key in slot 0x5
2,918,445 UART: [art] Derive Key Pair - Done
2,933,288 UART: [art] Signing Cert with AUTHO
2,933,768 UART: RITY.KEYID = 7
2,948,926 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,691 UART: [art] PUB.X = 7CDDF5A1337CEB4C7FA3E90F888ABE096E362FE0622E79F726C74E0AFD2B47DE7B9903F7DB889901F53C7CD7287CC89A
2,956,464 UART: [art] PUB.Y = 13C79BD4C0358E0F31E38DFE4A086418651D92B1E72F15D1958E55811F127FE0A2D75DE60190F56705A2ED2DFBC45A12
2,963,406 UART: [art] SIG.R = 0F6F74177BAF19BA5EAA4F98F94C8DF78F8DBDA631104BD5ACB340789EE446C2F99208A5153B457360B498821090C360
2,970,174 UART: [art] SIG.S = 5664133A892176F6CB733696F210CE1862E8C3D8DCA61CAF2D1ECDF16D5112B66A3BCE7798F160BE1B570C40C11D346F
2,993,544 UART: Caliptra RT
2,993,798 UART: [state] CFI Enabled
3,101,086 UART: [rt] RT listening for mailbox commands...
3,101,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,779 UART: [rt]cmd =0x44504543, len=96
3,139,117 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
893,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,982 UART: [kat] ++
898,134 UART: [kat] sha1
902,428 UART: [kat] SHA2-256
904,368 UART: [kat] SHA2-384
907,089 UART: [kat] SHA2-512-ACC
908,990 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,471 UART: [kat] LMS
1,171,799 UART: [kat] --
1,172,670 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,175,771 UART: [idev] ++
1,175,939 UART: [idev] CDI.KEYID = 6
1,176,299 UART: [idev] SUBJECT.KEYID = 7
1,176,723 UART: [idev] UDS.KEYID = 0
1,177,068 ready_for_fw is high
1,177,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,097 UART: [idev] Erasing UDS.KEYID = 0
1,202,204 UART: [idev] Sha1 KeyId Algorithm
1,210,594 UART: [idev] --
1,211,760 UART: [ldev] ++
1,211,928 UART: [ldev] CDI.KEYID = 6
1,212,291 UART: [ldev] SUBJECT.KEYID = 5
1,212,717 UART: [ldev] AUTHORITY.KEYID = 7
1,213,180 UART: [ldev] FE.KEYID = 1
1,218,414 UART: [ldev] Erasing FE.KEYID = 1
1,245,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,432 UART: [ldev] --
1,284,717 UART: [fwproc] Wait for Commands...
1,285,349 UART: [fwproc] Recv command 0x46574c44
1,286,077 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,515 >>> mbox cmd response: success
2,776,663 UART: [afmc] ++
2,776,831 UART: [afmc] CDI.KEYID = 6
2,777,193 UART: [afmc] SUBJECT.KEYID = 7
2,777,618 UART: [afmc] AUTHORITY.KEYID = 5
2,813,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,746 UART: [afmc] --
2,856,718 UART: [cold-reset] --
2,857,706 UART: [state] Locking Datavault
2,858,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,583 UART: [state] Locking ICCM
2,860,217 UART: [exit] Launching FMC @ 0x40000130
2,865,546 UART:
2,865,562 UART: Running Caliptra FMC ...
2,865,970 UART:
2,866,113 UART: [state] CFI Enabled
2,876,866 UART: [fht] FMC Alias Private Key: 7
2,985,365 UART: [art] Extend RT PCRs Done
2,985,793 UART: [art] Lock RT PCRs Done
2,987,309 UART: [art] Populate DV Done
2,995,576 UART: [fht] FMC Alias Private Key: 7
2,996,744 UART: [art] Derive CDI
2,997,024 UART: [art] Store in in slot 0x4
3,082,425 UART: [art] Derive Key Pair
3,082,785 UART: [art] Store priv key in slot 0x5
3,096,161 UART: [art] Derive Key Pair - Done
3,110,960 UART: [art] Signing Cert with AUTHO
3,111,440 UART: RITY.KEYID = 7
3,127,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,767 UART: [art] PUB.X = 36883B1446E08E0B0398280ED4A09FD645A867A59F3920E9436FC635E0F3C90DE347BEB888D170091DEAB99992FF589F
3,134,522 UART: [art] PUB.Y = 717627EE52229EE59BF35EDFD5AB0B520BCD5C7C85187D8DD761C4C4FA5968FF00862CCC15D27C2BC9B260504EC47A33
3,141,458 UART: [art] SIG.R = 2E22A829DC20AFB5043C75341757575C7FDF3E51EBD8CAD96BC4498C4F41B60F6FCF16A6191C69B67B281B9B9C53F22C
3,148,234 UART: [art] SIG.S = 631A2C6B0F473B6DF02CA745A64EABF722F74E26F69B7AB80227EA8C4AD2D12664CE7ADFF40BC341580FA0C1CE742575
3,172,665 UART: Caliptra RT
3,173,011 UART: [state] CFI Enabled
3,280,081 UART: [rt] RT listening for mailbox commands...
3,280,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,950 UART: [rt]cmd =0x44504543, len=96
3,318,306 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 ready_for_fw is high
1,060,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,996 >>> mbox cmd response: success
2,689,674 UART:
2,689,690 UART: Running Caliptra FMC ...
2,690,098 UART:
2,690,241 UART: [state] CFI Enabled
2,700,694 UART: [fht] FMC Alias Private Key: 7
2,808,857 UART: [art] Extend RT PCRs Done
2,809,285 UART: [art] Lock RT PCRs Done
2,810,703 UART: [art] Populate DV Done
2,818,954 UART: [fht] FMC Alias Private Key: 7
2,820,128 UART: [art] Derive CDI
2,820,408 UART: [art] Store in in slot 0x4
2,906,645 UART: [art] Derive Key Pair
2,907,005 UART: [art] Store priv key in slot 0x5
2,920,793 UART: [art] Derive Key Pair - Done
2,935,359 UART: [art] Signing Cert with AUTHO
2,935,839 UART: RITY.KEYID = 7
2,950,951 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,716 UART: [art] PUB.X = 564FB6D0FD8E0F4FCCB35169862BCD3F4E7CF5995197DA90BFC98704AE3930AFA60804EF3A230150423CBCF49DD810E3
2,958,485 UART: [art] PUB.Y = BB703803A22EDAD3A3DE34F7A6DCB1AB906DFD85D048E5F4EAC90244CE76F37132A71E1BE141564D8BF97245CE696AFA
2,965,449 UART: [art] SIG.R = 03FB0B8AA826ED1EC7E4F46D38E6FCD9A8ED055C8536F982FE818860BD4BE9821D78B2C7DBA3A9322F23099F8916072D
2,972,216 UART: [art] SIG.S = 3A11697486E313F699EB42FAA39852233265598269CDC363F0ABED7A61BDBDA37301351850393A8C38687591D1D74E3E
2,996,198 UART: Caliptra RT
2,996,544 UART: [state] CFI Enabled
3,105,162 UART: [rt] RT listening for mailbox commands...
3,105,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,081 UART: [rt]cmd =0x44504543, len=96
3,142,983 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,174,123 ready_for_fw is high
1,174,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,301 UART: [idev] --
1,208,264 UART: [ldev] ++
1,208,432 UART: [ldev] CDI.KEYID = 6
1,208,796 UART: [ldev] SUBJECT.KEYID = 5
1,209,223 UART: [ldev] AUTHORITY.KEYID = 7
1,209,686 UART: [ldev] FE.KEYID = 1
1,215,116 UART: [ldev] Erasing FE.KEYID = 1
1,241,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,942 UART: [ldev] --
1,280,302 UART: [fwproc] Wait for Commands...
1,280,985 UART: [fwproc] Recv command 0x46574c44
1,281,718 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,552 >>> mbox cmd response: success
2,772,627 UART: [afmc] ++
2,772,795 UART: [afmc] CDI.KEYID = 6
2,773,158 UART: [afmc] SUBJECT.KEYID = 7
2,773,584 UART: [afmc] AUTHORITY.KEYID = 5
2,808,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,880 UART: [afmc] --
2,852,000 UART: [cold-reset] --
2,852,820 UART: [state] Locking Datavault
2,854,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,609 UART: [state] Locking ICCM
2,855,109 UART: [exit] Launching FMC @ 0x40000130
2,860,438 UART:
2,860,454 UART: Running Caliptra FMC ...
2,860,862 UART:
2,860,916 UART: [state] CFI Enabled
2,871,131 UART: [fht] FMC Alias Private Key: 7
2,978,844 UART: [art] Extend RT PCRs Done
2,979,272 UART: [art] Lock RT PCRs Done
2,980,554 UART: [art] Populate DV Done
2,988,675 UART: [fht] FMC Alias Private Key: 7
2,989,751 UART: [art] Derive CDI
2,990,031 UART: [art] Store in in slot 0x4
3,075,422 UART: [art] Derive Key Pair
3,075,782 UART: [art] Store priv key in slot 0x5
3,087,826 UART: [art] Derive Key Pair - Done
3,103,027 UART: [art] Signing Cert with AUTHO
3,103,507 UART: RITY.KEYID = 7
3,118,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,598 UART: [art] PUB.X = E046FF3697D7CF7F0E8261B3FEE92730EBDCE5F2DE6038D4DC0E61753A3A77DDF54EB401C59B7B4F340340B9158DD479
3,126,370 UART: [art] PUB.Y = 473C2C0F0CC99443F8E0C16D90C99D68F4BADC638682EB85ACF895A918BCA834CF766B86EECEE30D2225B72039D26BC8
3,133,325 UART: [art] SIG.R = 44C5DAD3C1A34921B5BF727AFB5750CBF899BC856DB0E5A6EE08DED5606DD3D442F3BAE6031911D8AB131B6097D4B323
3,140,105 UART: [art] SIG.S = 76073CB4D67765E904E8E6DBC1C345493862312098B2B26C57DE1FBCCF6DCF93E181A86405B6BF59CB6CE47A20F0CB2F
3,164,205 UART: Caliptra RT
3,164,459 UART: [state] CFI Enabled
3,271,559 UART: [rt] RT listening for mailbox commands...
3,272,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,470 UART: [rt]cmd =0x44504543, len=96
3,309,456 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,308 ready_for_fw is high
1,056,308 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,454 >>> mbox cmd response: success
2,683,862 UART:
2,683,878 UART: Running Caliptra FMC ...
2,684,286 UART:
2,684,340 UART: [state] CFI Enabled
2,694,479 UART: [fht] FMC Alias Private Key: 7
2,802,810 UART: [art] Extend RT PCRs Done
2,803,238 UART: [art] Lock RT PCRs Done
2,804,990 UART: [art] Populate DV Done
2,813,403 UART: [fht] FMC Alias Private Key: 7
2,814,421 UART: [art] Derive CDI
2,814,701 UART: [art] Store in in slot 0x4
2,900,412 UART: [art] Derive Key Pair
2,900,772 UART: [art] Store priv key in slot 0x5
2,914,158 UART: [art] Derive Key Pair - Done
2,929,098 UART: [art] Signing Cert with AUTHO
2,929,578 UART: RITY.KEYID = 7
2,944,736 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,501 UART: [art] PUB.X = 230C1CF3C302575B83CBA23276689797ADA62B0BAD49444F8F3EDF6C29F3143718D3138A9B1D5FCC49BA7035AE20E738
2,952,268 UART: [art] PUB.Y = 8DE386741C8DCC8253C15EFCA5F70EC3323460D26713B6579DAEC7C5F748BA91C4DC84C957C338A77C33CF0E7679AE52
2,959,222 UART: [art] SIG.R = B8DFD18F19CF67ED97B7923E88EA424895A2B3EF4726A49AA2918B14B6713D3ABB5C0BBD08EE57B6CDF0927357329725
2,965,996 UART: [art] SIG.S = 1574E0E0662B881289BE055B66B31E8D42079C1FF99F8074C4BAC94B2B78C605A58A235CFA6575824C9E9DDDF4C1B09F
2,989,630 UART: Caliptra RT
2,989,884 UART: [state] CFI Enabled
3,097,806 UART: [rt] RT listening for mailbox commands...
3,098,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,447 UART: [rt]cmd =0x44504543, len=96
3,136,021 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,174,702 ready_for_fw is high
1,174,702 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,584 UART: [idev] --
1,209,681 UART: [ldev] ++
1,209,849 UART: [ldev] CDI.KEYID = 6
1,210,213 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,675 UART: [ldev] --
1,281,193 UART: [fwproc] Wait for Commands...
1,281,954 UART: [fwproc] Recv command 0x46574c44
1,282,687 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,411 >>> mbox cmd response: success
2,773,586 UART: [afmc] ++
2,773,754 UART: [afmc] CDI.KEYID = 6
2,774,117 UART: [afmc] SUBJECT.KEYID = 7
2,774,543 UART: [afmc] AUTHORITY.KEYID = 5
2,811,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,417 UART: [afmc] --
2,854,361 UART: [cold-reset] --
2,855,057 UART: [state] Locking Datavault
2,856,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,804 UART: [state] Locking ICCM
2,857,332 UART: [exit] Launching FMC @ 0x40000130
2,862,661 UART:
2,862,677 UART: Running Caliptra FMC ...
2,863,085 UART:
2,863,228 UART: [state] CFI Enabled
2,874,051 UART: [fht] FMC Alias Private Key: 7
2,981,978 UART: [art] Extend RT PCRs Done
2,982,406 UART: [art] Lock RT PCRs Done
2,984,380 UART: [art] Populate DV Done
2,992,577 UART: [fht] FMC Alias Private Key: 7
2,993,735 UART: [art] Derive CDI
2,994,015 UART: [art] Store in in slot 0x4
3,079,780 UART: [art] Derive Key Pair
3,080,140 UART: [art] Store priv key in slot 0x5
3,093,042 UART: [art] Derive Key Pair - Done
3,108,236 UART: [art] Signing Cert with AUTHO
3,108,716 UART: RITY.KEYID = 7
3,124,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,905 UART: [art] PUB.X = 571A41F9D401091D883987B5427E811FE70DEF7AF07DE4D99D6D570A98BD63865090F204C6511329149A261D728D7959
3,131,650 UART: [art] PUB.Y = 00DF69A904FC2CC09A6C34F8E00FF0F9F3D4FD7725F60162FC425B90EF436422B9FBF5111BBD8879DC65AADA2A4FFEA5
3,138,591 UART: [art] SIG.R = DD24154C7825267EA35D64E396F986D157FFBCECA3DF41151F1CA07C73EE5A54DCBE27E2BC79B36EF0117C49FA038567
3,145,372 UART: [art] SIG.S = A24C6DE036981AC9CB40693307FF409FC0520F7F1D409378A0CC0BA9071AFC78972049350EF71C72F660665DC2D8A838
3,169,246 UART: Caliptra RT
3,169,592 UART: [state] CFI Enabled
3,277,025 UART: [rt] RT listening for mailbox commands...
3,277,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,792 UART: [rt]cmd =0x44504543, len=96
3,315,136 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,703 >>> mbox cmd response: success
2,683,169 UART:
2,683,185 UART: Running Caliptra FMC ...
2,683,593 UART:
2,683,736 UART: [state] CFI Enabled
2,694,435 UART: [fht] FMC Alias Private Key: 7
2,802,328 UART: [art] Extend RT PCRs Done
2,802,756 UART: [art] Lock RT PCRs Done
2,804,386 UART: [art] Populate DV Done
2,812,759 UART: [fht] FMC Alias Private Key: 7
2,813,833 UART: [art] Derive CDI
2,814,113 UART: [art] Store in in slot 0x4
2,899,714 UART: [art] Derive Key Pair
2,900,074 UART: [art] Store priv key in slot 0x5
2,912,842 UART: [art] Derive Key Pair - Done
2,927,734 UART: [art] Signing Cert with AUTHO
2,928,214 UART: RITY.KEYID = 7
2,943,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,903 UART: [art] PUB.X = 1B085E66F40E302EBDD7980916ADDE37773658EA59C74FDE19405AC7B0FDEB88D2B3D812A02B5115EE58BB86D936F2E7
2,950,676 UART: [art] PUB.Y = A14DC108597A922FBEE8348DF5832AC4D30511A0050D8160D32CFF4CBEA215B1BBB07AD0E401A3908432234D5FFF3A47
2,957,621 UART: [art] SIG.R = 082E2B350BF9E16A9DA66B3B74B6B3707393A8646313CDAABAC714EFB3C171A4491F8685E2D0EC26E7BDF954B862E525
2,964,395 UART: [art] SIG.S = 7506DD649933E66599822133A46CB47389DA3BC28A52F65A66C2DC0CAAE06E5788804E1D426BD9C0E66A37B42EB7471C
2,988,098 UART: Caliptra RT
2,988,444 UART: [state] CFI Enabled
3,096,972 UART: [rt] RT listening for mailbox commands...
3,097,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,679 UART: [rt]cmd =0x44504543, len=96
3,134,893 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,587 writing to cptra_bootfsm_go
192,698 UART:
193,054 UART: Running Caliptra ROM ...
194,237 UART:
194,385 UART: [state] CFI Enabled
261,293 UART: [state] LifecycleState = Unprovisioned
263,282 UART: [state] DebugLocked = No
265,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,045 UART: [kat] SHA2-256
439,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,271 UART: [kat] ++
450,746 UART: [kat] sha1
462,110 UART: [kat] SHA2-256
464,823 UART: [kat] SHA2-384
471,723 UART: [kat] SHA2-512-ACC
474,110 UART: [kat] ECC-384
2,769,553 UART: [kat] HMAC-384Kdf
2,800,492 UART: [kat] LMS
3,990,799 UART: [kat] --
3,994,383 UART: [cold-reset] ++
3,996,308 UART: [fht] Storing FHT @ 0x50003400
4,007,918 UART: [idev] ++
4,008,475 UART: [idev] CDI.KEYID = 6
4,009,373 UART: [idev] SUBJECT.KEYID = 7
4,010,615 UART: [idev] UDS.KEYID = 0
4,011,572 ready_for_fw is high
4,011,762 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,165 UART: [idev] Erasing UDS.KEYID = 0
7,355,428 UART: [idev] Using Sha1 for KeyId Algorithm
7,377,820 UART: [idev] --
7,381,544 UART: [ldev] ++
7,382,159 UART: [ldev] CDI.KEYID = 6
7,383,122 UART: [ldev] SUBJECT.KEYID = 5
7,384,329 UART: [ldev] AUTHORITY.KEYID = 7
7,385,548 UART: [ldev] FE.KEYID = 1
7,427,894 UART: [ldev] Erasing FE.KEYID = 1
10,762,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,119,243 UART: [ldev] --
13,123,436 UART: [fwproc] Waiting for Commands...
13,125,959 UART: [fwproc] Received command 0x46574c44
13,128,131 UART: [fwproc] Received Image of size 114036 bytes
17,178,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,205 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,111 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,641,964 >>> mbox cmd response: success
17,646,136 UART: [afmc] ++
17,646,745 UART: [afmc] CDI.KEYID = 6
17,647,648 UART: [afmc] SUBJECT.KEYID = 7
17,648,860 UART: [afmc] AUTHORITY.KEYID = 5
21,013,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,313,840 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,316,118 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,330,522 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,345,349 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,359,837 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,380,958 UART: [afmc] --
23,383,946 UART: [cold-reset] --
23,388,881 UART: [state] Locking Datavault
23,396,173 UART: [state] Locking PCR0, PCR1 and PCR31
23,397,932 UART: [state] Locking ICCM
23,400,454 UART: [exit] Launching FMC @ 0x40000130
23,408,844 UART:
23,409,076 UART: Running Caliptra FMC ...
23,410,171 UART:
23,410,319 UART: [state] CFI Enabled
23,473,495 UART: [fht] FMC Alias Private Key: 7
25,811,134 UART: [art] Extend RT PCRs Done
25,812,368 UART: [art] Lock RT PCRs Done
25,814,204 UART: [art] Populate DV Done
25,819,883 UART: [fht] FMC Alias Private Key: 7
25,821,468 UART: [art] Derive CDI
25,822,272 UART: [art] Store in in slot 0x4
25,883,531 UART: [art] Derive Key Pair
25,884,571 UART: [art] Store priv key in slot 0x5
29,176,782 UART: [art] Derive Key Pair - Done
29,189,892 UART: [art] Signing Cert with AUTHO
29,191,242 UART: RITY.KEYID = 7
31,479,376 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,876 UART: [art] PUB.X = 4756F5E52304CF6DB2447FAC108279F4A9D8B3C41E51EDCBA0E532ABB18520B41A9F0B1388113F17A78E265B6D166D2F
31,488,153 UART: [art] PUB.Y = 6E79DD615FC8A74F68B942412577411B5FEF0ABA66EB896A3956FC01337C5D4C3955A7D5144A5254B00425DC2A92F4CC
31,495,403 UART: [art] SIG.R = 97707E4BABA1E426620CF4811ABFEC8D4E5F15847B96E3DC2437F84201CBA21813539F0ED26EC1400C520DC4C1DBC533
31,502,764 UART: [art] SIG.S = 14ACF6B47DC7500C4CBD6057E83A88A163704A6C95B5CEBBF3CC969EBBEEFCD1B3DECDF01F8CAD5038DE0F5B262218D3
32,807,951 UART: Caliptra RT
32,808,676 UART: [state] CFI Enabled
32,969,853 UART: [rt] RT listening for mailbox commands...
32,971,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,002,655 UART: [rt]cmd =0x4d454153, len=108
33,021,051 >>> mbox cmd response data (12 bytes)
33,021,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,052,146 UART: [rt]cmd =0x4d454153, len=108
33,070,571 >>> mbox cmd response data (12 bytes)
33,071,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,101,773 UART: [rt]cmd =0x4d454153, len=108
33,120,431 >>> mbox cmd response data (12 bytes)
33,120,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,151,592 UART: [rt]cmd =0x4d454153, len=108
33,170,296 >>> mbox cmd response data (12 bytes)
33,170,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,201,315 UART: [rt]cmd =0x4d454153, len=108
33,219,591 >>> mbox cmd response data (12 bytes)
33,220,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,250,782 UART: [rt]cmd =0x4d454153, len=108
33,269,057 >>> mbox cmd response data (12 bytes)
33,269,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,300,331 UART: [rt]cmd =0x4d454153, len=108
33,318,925 >>> mbox cmd response data (12 bytes)
33,319,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,349,946 UART: [rt]cmd =0x4d454153, len=108
33,368,301 >>> mbox cmd response data (12 bytes)
33,368,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,399,590 UART: [rt]cmd =0x4d454153, len=108
33,417,644 >>> mbox cmd response data (12 bytes)
33,418,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,448,991 UART: [rt]cmd =0x4d454153, len=108
33,468,103 >>> mbox cmd response data (12 bytes)
33,468,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,499,033 UART: [rt]cmd =0x4d454153, len=108
33,517,581 >>> mbox cmd response data (12 bytes)
33,518,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,548,634 UART: [rt]cmd =0x4d454153, len=108
33,568,365 >>> mbox cmd response data (12 bytes)
33,568,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,599,222 UART: [rt]cmd =0x4d454153, len=108
33,618,013 >>> mbox cmd response data (12 bytes)
33,618,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,649,196 UART: [rt]cmd =0x4d454153, len=108
33,667,575 >>> mbox cmd response data (12 bytes)
33,668,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,698,802 UART: [rt]cmd =0x4d454153, len=108
33,717,237 >>> mbox cmd response data (12 bytes)
33,717,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,748,490 UART: [rt]cmd =0x4d454153, len=108
33,750,749 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,804,661 ready_for_fw is high
3,805,068 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,905,585 >>> mbox cmd response: success
23,593,256 UART:
23,594,288 UART: Running Caliptra FMC ...
23,595,426 UART:
23,595,686 UART: [state] CFI Enabled
23,662,850 UART: [fht] FMC Alias Private Key: 7
26,000,242 UART: [art] Extend RT PCRs Done
26,001,492 UART: [art] Lock RT PCRs Done
26,003,143 UART: [art] Populate DV Done
26,008,580 UART: [fht] FMC Alias Private Key: 7
26,010,195 UART: [art] Derive CDI
26,011,014 UART: [art] Store in in slot 0x4
26,070,715 UART: [art] Derive Key Pair
26,071,759 UART: [art] Store priv key in slot 0x5
29,364,921 UART: [art] Derive Key Pair - Done
29,377,962 UART: [art] Signing Cert with AUTHO
29,379,271 UART: RITY.KEYID = 7
31,666,050 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,562 UART: [art] PUB.X = E847C9515BECC2F715268DC1A32B463CE69294F95E1507156F0240EF1700E3D9EB1EE7D919635641EEC5C66101565F3F
31,674,785 UART: [art] PUB.Y = 10EA11E257D11DF002A445D9F83D883DED556A002BE3AE187DC935D3EF57CF2AA9302F86A98EAC9EB91BB59028F6F014
31,682,032 UART: [art] SIG.R = 7A2E6BB08350119511F1F769F17970D9926A61CE5B9960A952895557A3DAB3D2602D6BC4ADA5CE3D1E06455C45F6C981
31,689,395 UART: [art] SIG.S = FE32A03CA80A0198DE010C76A3D1E9B7463F8C3F88363564590EDBD7E4F26AC6C5EE8789E371DE252B11D03BBAFA49D9
32,995,585 UART: Caliptra RT
32,996,299 UART: [state] CFI Enabled
33,158,224 UART: [rt] RT listening for mailbox commands...
33,160,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,190,840 UART: [rt]cmd =0x4d454153, len=108
33,209,430 >>> mbox cmd response data (12 bytes)
33,209,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,240,691 UART: [rt]cmd =0x4d454153, len=108
33,260,055 >>> mbox cmd response data (12 bytes)
33,260,545 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,291,250 UART: [rt]cmd =0x4d454153, len=108
33,309,308 >>> mbox cmd response data (12 bytes)
33,309,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,340,540 UART: [rt]cmd =0x4d454153, len=108
33,358,996 >>> mbox cmd response data (12 bytes)
33,359,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,390,021 UART: [rt]cmd =0x4d454153, len=108
33,408,951 >>> mbox cmd response data (12 bytes)
33,409,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,440,071 UART: [rt]cmd =0x4d454153, len=108
33,458,528 >>> mbox cmd response data (12 bytes)
33,458,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,489,328 UART: [rt]cmd =0x4d454153, len=108
33,508,553 >>> mbox cmd response data (12 bytes)
33,508,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,539,467 UART: [rt]cmd =0x4d454153, len=108
33,558,055 >>> mbox cmd response data (12 bytes)
33,558,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,589,183 UART: [rt]cmd =0x4d454153, len=108
33,608,139 >>> mbox cmd response data (12 bytes)
33,608,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,639,311 UART: [rt]cmd =0x4d454153, len=108
33,657,263 >>> mbox cmd response data (12 bytes)
33,657,725 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,688,536 UART: [rt]cmd =0x4d454153, len=108
33,707,185 >>> mbox cmd response data (12 bytes)
33,707,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,738,381 UART: [rt]cmd =0x4d454153, len=108
33,756,798 >>> mbox cmd response data (12 bytes)
33,757,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,787,765 UART: [rt]cmd =0x4d454153, len=108
33,806,742 >>> mbox cmd response data (12 bytes)
33,807,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,837,868 UART: [rt]cmd =0x4d454153, len=108
33,856,413 >>> mbox cmd response data (12 bytes)
33,856,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,887,423 UART: [rt]cmd =0x4d454153, len=108
33,906,595 >>> mbox cmd response data (12 bytes)
33,907,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,937,617 UART: [rt]cmd =0x4d454153, len=108
33,939,940 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,351 UART:
192,705 UART: Running Caliptra ROM ...
193,800 UART:
603,490 UART: [state] CFI Enabled
618,991 UART: [state] LifecycleState = Unprovisioned
620,948 UART: [state] DebugLocked = No
623,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,274 UART: [kat] SHA2-256
799,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,534 UART: [kat] ++
809,981 UART: [kat] sha1
819,788 UART: [kat] SHA2-256
822,511 UART: [kat] SHA2-384
829,375 UART: [kat] SHA2-512-ACC
831,783 UART: [kat] ECC-384
3,117,836 UART: [kat] HMAC-384Kdf
3,130,458 UART: [kat] LMS
4,320,534 UART: [kat] --
4,326,969 UART: [cold-reset] ++
4,327,906 UART: [fht] Storing FHT @ 0x50003400
4,339,094 UART: [idev] ++
4,339,688 UART: [idev] CDI.KEYID = 6
4,340,575 UART: [idev] SUBJECT.KEYID = 7
4,341,892 UART: [idev] UDS.KEYID = 0
4,342,887 ready_for_fw is high
4,343,096 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,402 UART: [idev] Erasing UDS.KEYID = 0
7,625,979 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,405 UART: [idev] --
7,651,782 UART: [ldev] ++
7,652,413 UART: [ldev] CDI.KEYID = 6
7,653,325 UART: [ldev] SUBJECT.KEYID = 5
7,654,536 UART: [ldev] AUTHORITY.KEYID = 7
7,655,817 UART: [ldev] FE.KEYID = 1
7,668,616 UART: [ldev] Erasing FE.KEYID = 1
10,953,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,881 UART: [ldev] --
13,319,103 UART: [fwproc] Waiting for Commands...
13,321,791 UART: [fwproc] Received command 0x46574c44
13,324,025 UART: [fwproc] Received Image of size 114036 bytes
17,375,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,874 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,209 >>> mbox cmd response: success
17,838,824 UART: [afmc] ++
17,839,420 UART: [afmc] CDI.KEYID = 6
17,840,328 UART: [afmc] SUBJECT.KEYID = 7
17,841,551 UART: [afmc] AUTHORITY.KEYID = 5
21,154,037 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,890 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,159 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,550 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,373 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,853 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,493 UART: [afmc] --
23,518,661 UART: [cold-reset] --
23,521,769 UART: [state] Locking Datavault
23,527,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,939 UART: [state] Locking ICCM
23,530,331 UART: [exit] Launching FMC @ 0x40000130
23,538,674 UART:
23,538,910 UART: Running Caliptra FMC ...
23,540,014 UART:
23,540,174 UART: [state] CFI Enabled
23,548,238 UART: [fht] FMC Alias Private Key: 7
25,878,236 UART: [art] Extend RT PCRs Done
25,879,458 UART: [art] Lock RT PCRs Done
25,881,004 UART: [art] Populate DV Done
25,886,314 UART: [fht] FMC Alias Private Key: 7
25,887,845 UART: [art] Derive CDI
25,888,579 UART: [art] Store in in slot 0x4
25,931,003 UART: [art] Derive Key Pair
25,932,006 UART: [art] Store priv key in slot 0x5
29,173,654 UART: [art] Derive Key Pair - Done
29,186,757 UART: [art] Signing Cert with AUTHO
29,188,058 UART: RITY.KEYID = 7
31,467,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,074 UART: [art] PUB.X = D64374AB9940F015E625C4D1AC455896CA47B1C7E6500A3B9D43385262C4A01BB0FFE0F98EC65A4DC5299A30B840DC52
31,476,285 UART: [art] PUB.Y = AC891A3975B59085A2687161460E8D1854A1CCE913F2B6AF71B6A9948B28E43226EFCD8A92C19005D8CFC9C2532B7C0F
31,483,574 UART: [art] SIG.R = 4B9E7EF0C7FB0D86A4EE205F03C80B9F4C9D2B9424686F15583C38BAADD38FBDA6F001B5DB52B4A35A0CEAAF5D4D5FC4
31,490,966 UART: [art] SIG.S = 34C17C8F1FD99D46585D12A96988AE3450D5B06D2BC85BBA4CEC09A07E14DE6A126CA9AD26C04DC0FE792BBCE81F5995
32,796,339 UART: Caliptra RT
32,797,029 UART: [state] CFI Enabled
32,914,357 UART: [rt] RT listening for mailbox commands...
32,916,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,946,839 UART: [rt]cmd =0x4d454153, len=108
32,965,452 >>> mbox cmd response data (12 bytes)
32,965,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,996,802 UART: [rt]cmd =0x4d454153, len=108
33,015,927 >>> mbox cmd response data (12 bytes)
33,016,378 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,046,972 UART: [rt]cmd =0x4d454153, len=108
33,066,278 >>> mbox cmd response data (12 bytes)
33,066,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,097,639 UART: [rt]cmd =0x4d454153, len=108
33,116,230 >>> mbox cmd response data (12 bytes)
33,116,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,147,446 UART: [rt]cmd =0x4d454153, len=108
33,166,414 >>> mbox cmd response data (12 bytes)
33,166,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,197,602 UART: [rt]cmd =0x4d454153, len=108
33,216,255 >>> mbox cmd response data (12 bytes)
33,216,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,247,228 UART: [rt]cmd =0x4d454153, len=108
33,266,244 >>> mbox cmd response data (12 bytes)
33,266,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,297,267 UART: [rt]cmd =0x4d454153, len=108
33,315,879 >>> mbox cmd response data (12 bytes)
33,316,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,347,164 UART: [rt]cmd =0x4d454153, len=108
33,365,708 >>> mbox cmd response data (12 bytes)
33,366,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,396,763 UART: [rt]cmd =0x4d454153, len=108
33,416,011 >>> mbox cmd response data (12 bytes)
33,416,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,446,932 UART: [rt]cmd =0x4d454153, len=108
33,466,072 >>> mbox cmd response data (12 bytes)
33,466,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,497,372 UART: [rt]cmd =0x4d454153, len=108
33,516,279 >>> mbox cmd response data (12 bytes)
33,516,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,547,479 UART: [rt]cmd =0x4d454153, len=108
33,566,491 >>> mbox cmd response data (12 bytes)
33,566,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,597,300 UART: [rt]cmd =0x4d454153, len=108
33,615,469 >>> mbox cmd response data (12 bytes)
33,615,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,646,587 UART: [rt]cmd =0x4d454153, len=108
33,665,239 >>> mbox cmd response data (12 bytes)
33,665,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,696,417 UART: [rt]cmd =0x4d454153, len=108
33,698,635 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
4,127,710 ready_for_fw is high
4,128,279 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,002 >>> mbox cmd response: success
23,711,062 UART:
23,711,491 UART: Running Caliptra FMC ...
23,712,619 UART:
23,712,784 UART: [state] CFI Enabled
23,720,682 UART: [fht] FMC Alias Private Key: 7
26,052,217 UART: [art] Extend RT PCRs Done
26,053,446 UART: [art] Lock RT PCRs Done
26,055,029 UART: [art] Populate DV Done
26,060,623 UART: [fht] FMC Alias Private Key: 7
26,062,183 UART: [art] Derive CDI
26,063,025 UART: [art] Store in in slot 0x4
26,105,260 UART: [art] Derive Key Pair
26,106,264 UART: [art] Store priv key in slot 0x5
29,348,549 UART: [art] Derive Key Pair - Done
29,361,333 UART: [art] Signing Cert with AUTHO
29,362,635 UART: RITY.KEYID = 7
31,641,901 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,053 UART: [art] PUB.X = AAE36702223F962BF9CB75851ED7B2D3E6775AE04AA903A115E2E90EAB72ADE255873D4AE3973B5E80CD1A70DC64B413
31,650,672 UART: [art] PUB.Y = 7ECE34A1C95EA999BFA8A3669E4B02B44D35A62FA16E56DADE78F939E4D908D4615BC72F084C28305C00BE820AB71FF7
31,657,955 UART: [art] SIG.R = 372BF1B842500959C5DFF9C2FC3E764F885C32A97440786C0157910C1FA124A09AE204164892FD2831DF34A0E3340111
31,665,320 UART: [art] SIG.S = C954B22112339633932BDCA6778985E71EE68584A7658BEC5939B3EF889D96011CB364D09F02B016EC189A87F06BAB19
32,970,840 UART: Caliptra RT
32,971,567 UART: [state] CFI Enabled
33,088,750 UART: [rt] RT listening for mailbox commands...
33,090,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,121,088 UART: [rt]cmd =0x4d454153, len=108
33,139,290 >>> mbox cmd response data (12 bytes)
33,139,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,170,415 UART: [rt]cmd =0x4d454153, len=108
33,188,685 >>> mbox cmd response data (12 bytes)
33,189,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,219,733 UART: [rt]cmd =0x4d454153, len=108
33,237,694 >>> mbox cmd response data (12 bytes)
33,238,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,268,844 UART: [rt]cmd =0x4d454153, len=108
33,286,828 >>> mbox cmd response data (12 bytes)
33,287,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,317,808 UART: [rt]cmd =0x4d454153, len=108
33,336,318 >>> mbox cmd response data (12 bytes)
33,336,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,367,647 UART: [rt]cmd =0x4d454153, len=108
33,386,035 >>> mbox cmd response data (12 bytes)
33,386,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,417,196 UART: [rt]cmd =0x4d454153, len=108
33,435,779 >>> mbox cmd response data (12 bytes)
33,436,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,466,847 UART: [rt]cmd =0x4d454153, len=108
33,485,455 >>> mbox cmd response data (12 bytes)
33,485,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,516,784 UART: [rt]cmd =0x4d454153, len=108
33,535,554 >>> mbox cmd response data (12 bytes)
33,535,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,566,688 UART: [rt]cmd =0x4d454153, len=108
33,585,220 >>> mbox cmd response data (12 bytes)
33,585,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,616,399 UART: [rt]cmd =0x4d454153, len=108
33,634,678 >>> mbox cmd response data (12 bytes)
33,635,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,665,840 UART: [rt]cmd =0x4d454153, len=108
33,684,967 >>> mbox cmd response data (12 bytes)
33,685,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,716,105 UART: [rt]cmd =0x4d454153, len=108
33,734,995 >>> mbox cmd response data (12 bytes)
33,735,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,766,169 UART: [rt]cmd =0x4d454153, len=108
33,785,209 >>> mbox cmd response data (12 bytes)
33,785,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,816,180 UART: [rt]cmd =0x4d454153, len=108
33,835,360 >>> mbox cmd response data (12 bytes)
33,835,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,866,170 UART: [rt]cmd =0x4d454153, len=108
33,868,717 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,501 UART:
192,877 UART: Running Caliptra ROM ...
193,984 UART:
194,126 UART: [state] CFI Enabled
266,633 UART: [state] LifecycleState = Unprovisioned
268,488 UART: [state] DebugLocked = No
270,795 UART: [state] WD Timer not started. Device not locked for debugging
274,401 UART: [kat] SHA2-256
453,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,101 UART: [kat] ++
465,618 UART: [kat] sha1
477,124 UART: [kat] SHA2-256
480,128 UART: [kat] SHA2-384
486,545 UART: [kat] SHA2-512-ACC
489,495 UART: [kat] ECC-384
2,948,608 UART: [kat] HMAC-384Kdf
2,970,859 UART: [kat] LMS
3,500,262 UART: [kat] --
3,504,279 UART: [cold-reset] ++
3,506,010 UART: [fht] FHT @ 0x50003400
3,516,151 UART: [idev] ++
3,516,714 UART: [idev] CDI.KEYID = 6
3,517,593 UART: [idev] SUBJECT.KEYID = 7
3,518,840 UART: [idev] UDS.KEYID = 0
3,519,855 ready_for_fw is high
3,520,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,891 UART: [idev] Erasing UDS.KEYID = 0
6,026,923 UART: [idev] Sha1 KeyId Algorithm
6,049,299 UART: [idev] --
6,053,514 UART: [ldev] ++
6,054,089 UART: [ldev] CDI.KEYID = 6
6,055,045 UART: [ldev] SUBJECT.KEYID = 5
6,056,154 UART: [ldev] AUTHORITY.KEYID = 7
6,057,390 UART: [ldev] FE.KEYID = 1
6,099,050 UART: [ldev] Erasing FE.KEYID = 1
8,605,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,066 UART: [ldev] --
10,413,636 UART: [fwproc] Wait for Commands...
10,415,117 UART: [fwproc] Recv command 0x46574c44
10,417,215 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,271,991 >>> mbox cmd response: success
14,276,072 UART: [afmc] ++
14,276,671 UART: [afmc] CDI.KEYID = 6
14,277,587 UART: [afmc] SUBJECT.KEYID = 7
14,278,748 UART: [afmc] AUTHORITY.KEYID = 5
16,799,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,543,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,559,761 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,648 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,570 UART: [afmc] --
18,603,771 UART: [cold-reset] --
18,607,588 UART: [state] Locking Datavault
18,613,159 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,804 UART: [state] Locking ICCM
18,617,057 UART: [exit] Launching FMC @ 0x40000130
18,625,456 UART:
18,625,699 UART: Running Caliptra FMC ...
18,626,728 UART:
18,626,873 UART: [state] CFI Enabled
18,687,123 UART: [fht] FMC Alias Private Key: 7
20,450,700 UART: [art] Extend RT PCRs Done
20,451,920 UART: [art] Lock RT PCRs Done
20,453,691 UART: [art] Populate DV Done
20,459,320 UART: [fht] FMC Alias Private Key: 7
20,461,016 UART: [art] Derive CDI
20,461,755 UART: [art] Store in in slot 0x4
20,519,961 UART: [art] Derive Key Pair
20,520,994 UART: [art] Store priv key in slot 0x5
22,983,701 UART: [art] Derive Key Pair - Done
22,996,857 UART: [art] Signing Cert with AUTHO
22,998,180 UART: RITY.KEYID = 7
24,710,135 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,637 UART: [art] PUB.X = C5CB1E750A3C2D66ABF3B43B57B57C7566C1C5E3500C5AF3009159BA25305BE8E4F19F580B868E2DA2B711019AA46EF9
24,718,870 UART: [art] PUB.Y = D247F207A221FD69E57273C0E8323C3865B016BBD1835A95F5F7A8F801D419AB3F0DBEEC7C013C43D4418BC39DE54BE1
24,726,130 UART: [art] SIG.R = 6496A117581C47943FE1F9039608EF83B6074800703B526CCD06F80F1B85FBBAD19EA047DB6D5402D200A985544B45BA
24,733,522 UART: [art] SIG.S = 493711BD889C88D0521EAFDA975276AF3C3B551DB6040C2CAD1C5178F7459D24BD3181663976D142E3CC8A3E1E73DBDA
25,712,488 UART: Caliptra RT
25,713,181 UART: [state] CFI Enabled
25,879,223 UART: [rt] RT listening for mailbox commands...
25,881,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,911,677 UART: [rt]cmd =0x4d454153, len=108
25,929,580 >>> mbox cmd response data (12 bytes)
25,930,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,960,797 UART: [rt]cmd =0x4d454153, len=108
25,979,349 >>> mbox cmd response data (12 bytes)
25,979,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,010,408 UART: [rt]cmd =0x4d454153, len=108
26,028,824 >>> mbox cmd response data (12 bytes)
26,029,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,059,952 UART: [rt]cmd =0x4d454153, len=108
26,078,396 >>> mbox cmd response data (12 bytes)
26,078,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,109,496 UART: [rt]cmd =0x4d454153, len=108
26,128,559 >>> mbox cmd response data (12 bytes)
26,128,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,159,829 UART: [rt]cmd =0x4d454153, len=108
26,178,719 >>> mbox cmd response data (12 bytes)
26,179,191 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,209,787 UART: [rt]cmd =0x4d454153, len=108
26,227,856 >>> mbox cmd response data (12 bytes)
26,228,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,258,822 UART: [rt]cmd =0x4d454153, len=108
26,277,961 >>> mbox cmd response data (12 bytes)
26,278,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,309,110 UART: [rt]cmd =0x4d454153, len=108
26,327,336 >>> mbox cmd response data (12 bytes)
26,327,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,358,259 UART: [rt]cmd =0x4d454153, len=108
26,376,680 >>> mbox cmd response data (12 bytes)
26,377,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,407,760 UART: [rt]cmd =0x4d454153, len=108
26,426,310 >>> mbox cmd response data (12 bytes)
26,426,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,457,207 UART: [rt]cmd =0x4d454153, len=108
26,476,240 >>> mbox cmd response data (12 bytes)
26,476,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,507,260 UART: [rt]cmd =0x4d454153, len=108
26,526,004 >>> mbox cmd response data (12 bytes)
26,526,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,557,382 UART: [rt]cmd =0x4d454153, len=108
26,575,730 >>> mbox cmd response data (12 bytes)
26,576,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,606,910 UART: [rt]cmd =0x4d454153, len=108
26,626,223 >>> mbox cmd response data (12 bytes)
26,626,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,657,412 UART: [rt]cmd =0x4d454153, len=108
26,659,562 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,520 UART:
192,885 UART: Running Caliptra ROM ...
194,082 UART:
194,244 UART: [state] CFI Enabled
266,317 UART: [state] LifecycleState = Unprovisioned
268,730 UART: [state] DebugLocked = No
271,471 UART: [state] WD Timer not started. Device not locked for debugging
275,571 UART: [kat] SHA2-256
465,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,170 UART: [kat] ++
476,645 UART: [kat] sha1
486,564 UART: [kat] SHA2-256
489,561 UART: [kat] SHA2-384
495,777 UART: [kat] SHA2-512-ACC
498,432 UART: [kat] ECC-384
2,947,718 UART: [kat] HMAC-384Kdf
2,970,277 UART: [kat] LMS
3,502,059 UART: [kat] --
3,505,353 UART: [cold-reset] ++
3,507,365 UART: [fht] FHT @ 0x50003400
3,517,989 UART: [idev] ++
3,518,819 UART: [idev] CDI.KEYID = 6
3,519,737 UART: [idev] SUBJECT.KEYID = 7
3,520,847 UART: [idev] UDS.KEYID = 0
3,521,773 ready_for_fw is high
3,521,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,659 UART: [idev] Erasing UDS.KEYID = 0
6,027,491 UART: [idev] Sha1 KeyId Algorithm
6,050,354 UART: [idev] --
6,055,435 UART: [ldev] ++
6,056,117 UART: [ldev] CDI.KEYID = 6
6,057,103 UART: [ldev] SUBJECT.KEYID = 5
6,058,212 UART: [ldev] AUTHORITY.KEYID = 7
6,059,446 UART: [ldev] FE.KEYID = 1
6,099,931 UART: [ldev] Erasing FE.KEYID = 1
8,606,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,494 UART: [ldev] --
10,413,692 UART: [fwproc] Wait for Commands...
10,415,738 UART: [fwproc] Recv command 0x46574c44
10,417,997 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,573 >>> mbox cmd response: success
14,608,737 UART: [afmc] ++
14,609,450 UART: [afmc] CDI.KEYID = 6
14,610,696 UART: [afmc] SUBJECT.KEYID = 7
14,612,137 UART: [afmc] AUTHORITY.KEYID = 5
17,145,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,441 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,290 UART: [afmc] --
18,947,240 UART: [cold-reset] --
18,951,217 UART: [state] Locking Datavault
18,955,829 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,981 UART: [state] Locking ICCM
18,960,579 UART: [exit] Launching FMC @ 0x40000130
18,969,286 UART:
18,969,534 UART: Running Caliptra FMC ...
18,970,638 UART:
18,970,796 UART: [state] CFI Enabled
19,029,910 UART: [fht] FMC Alias Private Key: 7
20,793,929 UART: [art] Extend RT PCRs Done
20,795,149 UART: [art] Lock RT PCRs Done
20,796,637 UART: [art] Populate DV Done
20,802,033 UART: [fht] FMC Alias Private Key: 7
20,803,665 UART: [art] Derive CDI
20,804,436 UART: [art] Store in in slot 0x4
20,862,395 UART: [art] Derive Key Pair
20,863,402 UART: [art] Store priv key in slot 0x5
23,326,424 UART: [art] Derive Key Pair - Done
23,339,517 UART: [art] Signing Cert with AUTHO
23,340,838 UART: RITY.KEYID = 7
25,052,835 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,351 UART: [art] PUB.X = 89D5EDB66740789C7EC7BBFA96656316DD9B371CD3E6FBAD5C226C28C6A9A6A7E7BACBB979E012655DD33CFE29EBAAC0
25,061,639 UART: [art] PUB.Y = 126D8B4ADA6A47429902B65F991D782B974E1D8BF2E4361882A9BA9B88B13778A5856333CD85FF8FE208736C4264D4AC
25,068,867 UART: [art] SIG.R = D0A1C873FC85012C7283CCC963B79EAD2875F8FDE2BAF77A8523828107A36F99454BB93BB1D69B02C6B5C75685F182FC
25,076,242 UART: [art] SIG.S = 140B35DACEF3651C879008C572916A92CE5F158E6BF6CE1F5EA56857D1F5DEEF166A46DE726CA171366ACB2723F3546B
26,055,416 UART: Caliptra RT
26,056,307 UART: [state] CFI Enabled
26,221,500 UART: [rt] RT listening for mailbox commands...
26,223,422 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,253,948 UART: [rt]cmd =0x4d454153, len=108
26,272,970 >>> mbox cmd response data (12 bytes)
26,273,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,304,179 UART: [rt]cmd =0x4d454153, len=108
26,322,473 >>> mbox cmd response data (12 bytes)
26,322,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,353,353 UART: [rt]cmd =0x4d454153, len=108
26,371,702 >>> mbox cmd response data (12 bytes)
26,372,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,402,748 UART: [rt]cmd =0x4d454153, len=108
26,421,978 >>> mbox cmd response data (12 bytes)
26,422,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,453,051 UART: [rt]cmd =0x4d454153, len=108
26,471,927 >>> mbox cmd response data (12 bytes)
26,472,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,502,731 UART: [rt]cmd =0x4d454153, len=108
26,520,934 >>> mbox cmd response data (12 bytes)
26,521,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,551,947 UART: [rt]cmd =0x4d454153, len=108
26,570,883 >>> mbox cmd response data (12 bytes)
26,571,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,601,767 UART: [rt]cmd =0x4d454153, len=108
26,620,872 >>> mbox cmd response data (12 bytes)
26,621,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,652,005 UART: [rt]cmd =0x4d454153, len=108
26,670,591 >>> mbox cmd response data (12 bytes)
26,671,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,701,506 UART: [rt]cmd =0x4d454153, len=108
26,720,275 >>> mbox cmd response data (12 bytes)
26,720,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,751,441 UART: [rt]cmd =0x4d454153, len=108
26,770,092 >>> mbox cmd response data (12 bytes)
26,770,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,801,234 UART: [rt]cmd =0x4d454153, len=108
26,819,520 >>> mbox cmd response data (12 bytes)
26,819,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,850,445 UART: [rt]cmd =0x4d454153, len=108
26,869,481 >>> mbox cmd response data (12 bytes)
26,869,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,900,652 UART: [rt]cmd =0x4d454153, len=108
26,919,297 >>> mbox cmd response data (12 bytes)
26,919,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,950,215 UART: [rt]cmd =0x4d454153, len=108
26,969,157 >>> mbox cmd response data (12 bytes)
26,969,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,000,099 UART: [rt]cmd =0x4d454153, len=108
27,002,439 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,140 writing to cptra_bootfsm_go
3,438,793 ready_for_fw is high
3,439,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,728,290 >>> mbox cmd response: success
19,009,686 UART:
19,010,098 UART: Running Caliptra FMC ...
19,011,212 UART:
19,011,369 UART: [state] CFI Enabled
19,073,206 UART: [fht] FMC Alias Private Key: 7
20,837,249 UART: [art] Extend RT PCRs Done
20,838,487 UART: [art] Lock RT PCRs Done
20,840,056 UART: [art] Populate DV Done
20,845,426 UART: [fht] FMC Alias Private Key: 7
20,847,024 UART: [art] Derive CDI
20,847,766 UART: [art] Store in in slot 0x4
20,905,529 UART: [art] Derive Key Pair
20,906,571 UART: [art] Store priv key in slot 0x5
23,369,367 UART: [art] Derive Key Pair - Done
23,382,316 UART: [art] Signing Cert with AUTHO
23,383,629 UART: RITY.KEYID = 7
25,095,208 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,709 UART: [art] PUB.X = F97C790DA32ED8545B139A2937C6D6B7A5252F7DDC6973822A2B8997198C8AB0AA26212A13DA1205F640DBC2248BB436
25,103,987 UART: [art] PUB.Y = 5E8DB44C771768740814E8BE2014591D2DA21898517BF8AE63BED37FC0D1C606944C7E25D5099776DA38CA4AAA117EEE
25,111,247 UART: [art] SIG.R = E0AAEBE70DA42B73F39243BB10623A7A6FC27215527E99AE906AD86F9C3018D4E92760A8A30882BFD005539B4F9354C6
25,118,623 UART: [art] SIG.S = 3174CC01EEFEDFCD9F4345BF8B513954F3B03C2F8AA497302397E5512E727A34DACEEDA9FEC3FC98F8C74BB2B5866A77
26,097,672 UART: Caliptra RT
26,098,388 UART: [state] CFI Enabled
26,263,635 UART: [rt] RT listening for mailbox commands...
26,265,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,296,242 UART: [rt]cmd =0x4d454153, len=108
26,315,005 >>> mbox cmd response data (12 bytes)
26,315,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,346,530 UART: [rt]cmd =0x4d454153, len=108
26,364,680 >>> mbox cmd response data (12 bytes)
26,365,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,396,045 UART: [rt]cmd =0x4d454153, len=108
26,414,980 >>> mbox cmd response data (12 bytes)
26,415,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,446,046 UART: [rt]cmd =0x4d454153, len=108
26,464,419 >>> mbox cmd response data (12 bytes)
26,464,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,495,400 UART: [rt]cmd =0x4d454153, len=108
26,514,084 >>> mbox cmd response data (12 bytes)
26,514,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,545,188 UART: [rt]cmd =0x4d454153, len=108
26,563,411 >>> mbox cmd response data (12 bytes)
26,563,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,594,258 UART: [rt]cmd =0x4d454153, len=108
26,612,600 >>> mbox cmd response data (12 bytes)
26,613,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,643,689 UART: [rt]cmd =0x4d454153, len=108
26,661,951 >>> mbox cmd response data (12 bytes)
26,662,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,693,022 UART: [rt]cmd =0x4d454153, len=108
26,711,623 >>> mbox cmd response data (12 bytes)
26,712,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,742,758 UART: [rt]cmd =0x4d454153, len=108
26,761,176 >>> mbox cmd response data (12 bytes)
26,761,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,792,117 UART: [rt]cmd =0x4d454153, len=108
26,810,564 >>> mbox cmd response data (12 bytes)
26,811,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,841,617 UART: [rt]cmd =0x4d454153, len=108
26,860,433 >>> mbox cmd response data (12 bytes)
26,860,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,891,506 UART: [rt]cmd =0x4d454153, len=108
26,910,355 >>> mbox cmd response data (12 bytes)
26,910,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,941,260 UART: [rt]cmd =0x4d454153, len=108
26,960,346 >>> mbox cmd response data (12 bytes)
26,960,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,991,515 UART: [rt]cmd =0x4d454153, len=108
27,010,440 >>> mbox cmd response data (12 bytes)
27,010,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,041,466 UART: [rt]cmd =0x4d454153, len=108
27,043,848 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,494 UART:
192,869 UART: Running Caliptra ROM ...
194,055 UART:
603,633 UART: [state] CFI Enabled
620,554 UART: [state] LifecycleState = Unprovisioned
622,925 UART: [state] DebugLocked = No
625,153 UART: [state] WD Timer not started. Device not locked for debugging
629,320 UART: [kat] SHA2-256
819,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,997 UART: [kat] ++
830,515 UART: [kat] sha1
841,314 UART: [kat] SHA2-256
844,313 UART: [kat] SHA2-384
849,017 UART: [kat] SHA2-512-ACC
851,602 UART: [kat] ECC-384
3,293,368 UART: [kat] HMAC-384Kdf
3,305,971 UART: [kat] LMS
3,837,792 UART: [kat] --
3,839,886 UART: [cold-reset] ++
3,841,392 UART: [fht] FHT @ 0x50003400
3,853,079 UART: [idev] ++
3,853,794 UART: [idev] CDI.KEYID = 6
3,854,824 UART: [idev] SUBJECT.KEYID = 7
3,855,925 UART: [idev] UDS.KEYID = 0
3,856,852 ready_for_fw is high
3,857,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,741 UART: [idev] Erasing UDS.KEYID = 0
6,332,889 UART: [idev] Sha1 KeyId Algorithm
6,355,812 UART: [idev] --
6,360,468 UART: [ldev] ++
6,361,144 UART: [ldev] CDI.KEYID = 6
6,362,024 UART: [ldev] SUBJECT.KEYID = 5
6,363,237 UART: [ldev] AUTHORITY.KEYID = 7
6,364,465 UART: [ldev] FE.KEYID = 1
6,376,267 UART: [ldev] Erasing FE.KEYID = 1
8,849,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,422 UART: [ldev] --
10,641,186 UART: [fwproc] Wait for Commands...
10,644,031 UART: [fwproc] Recv command 0x46574c44
10,646,337 UART: [fwproc] Recv'd Img size: 114360 bytes
14,088,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,827,851 >>> mbox cmd response: success
14,831,114 UART: [afmc] ++
14,831,821 UART: [afmc] CDI.KEYID = 6
14,833,055 UART: [afmc] SUBJECT.KEYID = 7
14,834,483 UART: [afmc] AUTHORITY.KEYID = 5
17,338,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,040 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,196 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,643 UART: [afmc] --
19,135,720 UART: [cold-reset] --
19,138,391 UART: [state] Locking Datavault
19,143,192 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,378 UART: [state] Locking ICCM
19,148,231 UART: [exit] Launching FMC @ 0x40000130
19,156,892 UART:
19,157,122 UART: Running Caliptra FMC ...
19,158,219 UART:
19,158,378 UART: [state] CFI Enabled
19,166,694 UART: [fht] FMC Alias Private Key: 7
20,924,101 UART: [art] Extend RT PCRs Done
20,925,312 UART: [art] Lock RT PCRs Done
20,927,066 UART: [art] Populate DV Done
20,932,531 UART: [fht] FMC Alias Private Key: 7
20,934,086 UART: [art] Derive CDI
20,934,904 UART: [art] Store in in slot 0x4
20,977,546 UART: [art] Derive Key Pair
20,978,584 UART: [art] Store priv key in slot 0x5
23,405,869 UART: [art] Derive Key Pair - Done
23,418,647 UART: [art] Signing Cert with AUTHO
23,419,947 UART: RITY.KEYID = 7
25,125,445 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,950 UART: [art] PUB.X = 146F0ABFE4A02622CB26D41EF6953EE283C967059AE82BA312FB3A784B9C2C304FE1EF54A34BAF7E38174F852B2EA08B
25,134,254 UART: [art] PUB.Y = C08E6A2E8F6F5FBE0D9E025EC1B6A593A90F83E5ED6D58FE259522AED3D93B33CDE506F6CD1679F663A42F9ED4EE6023
25,141,532 UART: [art] SIG.R = 877C0CCC354735E5B0F42D9DE3EADEF66BA7F255B68BBBFB7E5315769EA45C1233135D6493ED14D5B6702B8B718635BC
25,148,931 UART: [art] SIG.S = CF5F5F8441413A37528DBBFFBDDB14E67A5A4A155D75EDCFAD348E216B77CB49017DB0690F03D2A43FD8449D7C718A42
26,127,614 UART: Caliptra RT
26,128,300 UART: [state] CFI Enabled
26,244,976 UART: [rt] RT listening for mailbox commands...
26,246,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,277,723 UART: [rt]cmd =0x4d454153, len=108
26,296,628 >>> mbox cmd response data (12 bytes)
26,297,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,328,067 UART: [rt]cmd =0x4d454153, len=108
26,346,203 >>> mbox cmd response data (12 bytes)
26,346,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,377,440 UART: [rt]cmd =0x4d454153, len=108
26,396,312 >>> mbox cmd response data (12 bytes)
26,396,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,427,499 UART: [rt]cmd =0x4d454153, len=108
26,446,788 >>> mbox cmd response data (12 bytes)
26,447,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,477,973 UART: [rt]cmd =0x4d454153, len=108
26,496,894 >>> mbox cmd response data (12 bytes)
26,497,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,528,567 UART: [rt]cmd =0x4d454153, len=108
26,547,327 >>> mbox cmd response data (12 bytes)
26,547,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,578,435 UART: [rt]cmd =0x4d454153, len=108
26,597,025 >>> mbox cmd response data (12 bytes)
26,597,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,628,236 UART: [rt]cmd =0x4d454153, len=108
26,647,377 >>> mbox cmd response data (12 bytes)
26,647,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,678,616 UART: [rt]cmd =0x4d454153, len=108
26,697,303 >>> mbox cmd response data (12 bytes)
26,697,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,728,535 UART: [rt]cmd =0x4d454153, len=108
26,747,243 >>> mbox cmd response data (12 bytes)
26,747,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,778,295 UART: [rt]cmd =0x4d454153, len=108
26,797,549 >>> mbox cmd response data (12 bytes)
26,797,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,828,644 UART: [rt]cmd =0x4d454153, len=108
26,846,903 >>> mbox cmd response data (12 bytes)
26,847,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,878,029 UART: [rt]cmd =0x4d454153, len=108
26,897,221 >>> mbox cmd response data (12 bytes)
26,897,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,928,590 UART: [rt]cmd =0x4d454153, len=108
26,947,522 >>> mbox cmd response data (12 bytes)
26,947,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,978,598 UART: [rt]cmd =0x4d454153, len=108
26,997,618 >>> mbox cmd response data (12 bytes)
26,998,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,028,964 UART: [rt]cmd =0x4d454153, len=108
27,031,292 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,756,867 ready_for_fw is high
3,757,478 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,955,169 >>> mbox cmd response: success
19,209,585 UART:
19,209,963 UART: Running Caliptra FMC ...
19,211,066 UART:
19,211,242 UART: [state] CFI Enabled
19,219,311 UART: [fht] FMC Alias Private Key: 7
20,976,781 UART: [art] Extend RT PCRs Done
20,978,006 UART: [art] Lock RT PCRs Done
20,979,611 UART: [art] Populate DV Done
20,985,198 UART: [fht] FMC Alias Private Key: 7
20,986,850 UART: [art] Derive CDI
20,987,584 UART: [art] Store in in slot 0x4
21,030,513 UART: [art] Derive Key Pair
21,031,556 UART: [art] Store priv key in slot 0x5
23,458,557 UART: [art] Derive Key Pair - Done
23,472,040 UART: [art] Signing Cert with AUTHO
23,473,351 UART: RITY.KEYID = 7
25,178,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,390 UART: [art] PUB.X = 29A630984FEF92587814854D208E3CE7DC6F1D1F2E4495FCCE07FEB9C7E0E4E90F9A9659D2429C424B46F35FFA194708
25,187,656 UART: [art] PUB.Y = 2E0771D2A6CEBBEEB368C0360CF890A5206A279C95B4FE886387BE956BB6AA80F60B8B6C70E5279C44459192D55965B7
25,194,932 UART: [art] SIG.R = 230FF0F9D1296587EA6E1DB4B418C85DD55304ED09DE10C4976A35CD41CA98171C6F91D5F4FB938E4BFA01731ECD06F5
25,202,332 UART: [art] SIG.S = C898ED3CA02917B76A505B48EC3B42BD5CA2F7B4AC749B282A9CC4DC08701923C32D032C2CAA5213FCEAD61D7EF552C8
26,181,580 UART: Caliptra RT
26,182,281 UART: [state] CFI Enabled
26,299,678 UART: [rt] RT listening for mailbox commands...
26,301,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,332,121 UART: [rt]cmd =0x4d454153, len=108
26,350,776 >>> mbox cmd response data (12 bytes)
26,351,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,382,036 UART: [rt]cmd =0x4d454153, len=108
26,400,628 >>> mbox cmd response data (12 bytes)
26,401,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,431,507 UART: [rt]cmd =0x4d454153, len=108
26,450,221 >>> mbox cmd response data (12 bytes)
26,450,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,481,393 UART: [rt]cmd =0x4d454153, len=108
26,500,355 >>> mbox cmd response data (12 bytes)
26,500,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,531,436 UART: [rt]cmd =0x4d454153, len=108
26,549,967 >>> mbox cmd response data (12 bytes)
26,550,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,581,053 UART: [rt]cmd =0x4d454153, len=108
26,599,707 >>> mbox cmd response data (12 bytes)
26,600,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,630,507 UART: [rt]cmd =0x4d454153, len=108
26,648,984 >>> mbox cmd response data (12 bytes)
26,649,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,680,322 UART: [rt]cmd =0x4d454153, len=108
26,698,553 >>> mbox cmd response data (12 bytes)
26,699,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,729,626 UART: [rt]cmd =0x4d454153, len=108
26,748,556 >>> mbox cmd response data (12 bytes)
26,749,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,779,605 UART: [rt]cmd =0x4d454153, len=108
26,798,076 >>> mbox cmd response data (12 bytes)
26,798,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,829,240 UART: [rt]cmd =0x4d454153, len=108
26,848,392 >>> mbox cmd response data (12 bytes)
26,848,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,879,392 UART: [rt]cmd =0x4d454153, len=108
26,897,944 >>> mbox cmd response data (12 bytes)
26,898,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,929,116 UART: [rt]cmd =0x4d454153, len=108
26,947,858 >>> mbox cmd response data (12 bytes)
26,948,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,978,977 UART: [rt]cmd =0x4d454153, len=108
26,997,355 >>> mbox cmd response data (12 bytes)
26,997,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,028,280 UART: [rt]cmd =0x4d454153, len=108
27,046,809 >>> mbox cmd response data (12 bytes)
27,047,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,077,717 UART: [rt]cmd =0x4d454153, len=108
27,079,886 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,087 UART: [kat] SHA2-256
882,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,133 UART: [kat] ++
886,285 UART: [kat] sha1
890,687 UART: [kat] SHA2-256
892,625 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,367 UART: [cold-reset] ++
1,476,831 UART: [fht] Storing FHT @ 0x50003400
1,479,528 UART: [idev] ++
1,479,696 UART: [idev] CDI.KEYID = 6
1,480,056 UART: [idev] SUBJECT.KEYID = 7
1,480,480 UART: [idev] UDS.KEYID = 0
1,480,825 ready_for_fw is high
1,480,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,504,838 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,552 UART: [idev] --
1,514,579 UART: [ldev] ++
1,514,747 UART: [ldev] CDI.KEYID = 6
1,515,110 UART: [ldev] SUBJECT.KEYID = 5
1,515,536 UART: [ldev] AUTHORITY.KEYID = 7
1,515,999 UART: [ldev] FE.KEYID = 1
1,521,209 UART: [ldev] Erasing FE.KEYID = 1
1,546,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,510 UART: [ldev] --
1,585,975 UART: [fwproc] Waiting for Commands...
1,586,802 UART: [fwproc] Received command 0x46574c44
1,587,593 UART: [fwproc] Received Image of size 114360 bytes
2,884,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,030 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,237 >>> mbox cmd response: success
3,078,247 UART: [afmc] ++
3,078,415 UART: [afmc] CDI.KEYID = 6
3,078,777 UART: [afmc] SUBJECT.KEYID = 7
3,079,202 UART: [afmc] AUTHORITY.KEYID = 5
3,115,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,782 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,472 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,355 UART: [afmc] --
3,158,317 UART: [cold-reset] --
3,158,943 UART: [state] Locking Datavault
3,159,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,436 UART: [state] Locking ICCM
3,161,100 UART: [exit] Launching FMC @ 0x40000130
3,166,429 UART:
3,166,445 UART: Running Caliptra FMC ...
3,166,853 UART:
3,166,907 UART: [state] CFI Enabled
3,177,380 UART: [fht] FMC Alias Private Key: 7
3,285,225 UART: [art] Extend RT PCRs Done
3,285,653 UART: [art] Lock RT PCRs Done
3,286,941 UART: [art] Populate DV Done
3,295,222 UART: [fht] FMC Alias Private Key: 7
3,296,184 UART: [art] Derive CDI
3,296,464 UART: [art] Store in in slot 0x4
3,382,131 UART: [art] Derive Key Pair
3,382,491 UART: [art] Store priv key in slot 0x5
3,395,603 UART: [art] Derive Key Pair - Done
3,410,592 UART: [art] Signing Cert with AUTHO
3,411,072 UART: RITY.KEYID = 7
3,426,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,109 UART: [art] PUB.X = E88F66E30474439DBAC977593771DBE3E15EB5E2CAB0D395AE8B88427ADA014227D1BD25E184F567C0BB6211825FFA0C
3,433,880 UART: [art] PUB.Y = 658146E225376F14182FDE22638D6495A63B748F8F5699565D8EBA7487B762E9C6F00528624AA2D53A9361F2C8F0D912
3,440,817 UART: [art] SIG.R = CD02569BF6CA67A5633CA2A807BCBA7632A1AC86D454F60945E23155F59913EFF12E8AE10FCE9D6464626D675515A99F
3,447,581 UART: [art] SIG.S = 4113370D1EAB3657A71C837B57380BF06B4E701760DC7E1CDD435CD267E234CB2362A8447F432C95A846DCCF2545C404
3,470,905 UART: Caliptra RT
3,471,159 UART: [state] CFI Enabled
3,579,575 UART: [rt] RT listening for mailbox commands...
3,580,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,638 UART: [rt]cmd =0x4d454153, len=108
3,630,779 >>> mbox cmd response data (12 bytes)
3,630,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,775 UART: [rt]cmd =0x4d454153, len=108
3,681,282 >>> mbox cmd response data (12 bytes)
3,681,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,230 UART: [rt]cmd =0x4d454153, len=108
3,732,021 >>> mbox cmd response data (12 bytes)
3,732,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,101 UART: [rt]cmd =0x4d454153, len=108
3,782,288 >>> mbox cmd response data (12 bytes)
3,782,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,302 UART: [rt]cmd =0x4d454153, len=108
3,832,313 >>> mbox cmd response data (12 bytes)
3,832,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,421 UART: [rt]cmd =0x4d454153, len=108
3,883,500 >>> mbox cmd response data (12 bytes)
3,883,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,706 UART: [rt]cmd =0x4d454153, len=108
3,934,177 >>> mbox cmd response data (12 bytes)
3,934,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,183 UART: [rt]cmd =0x4d454153, len=108
3,984,652 >>> mbox cmd response data (12 bytes)
3,984,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,782 UART: [rt]cmd =0x4d454153, len=108
4,034,669 >>> mbox cmd response data (12 bytes)
4,034,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,865 UART: [rt]cmd =0x4d454153, len=108
4,085,534 >>> mbox cmd response data (12 bytes)
4,085,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,566 UART: [rt]cmd =0x4d454153, len=108
4,135,385 >>> mbox cmd response data (12 bytes)
4,135,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,483 UART: [rt]cmd =0x4d454153, len=108
4,186,682 >>> mbox cmd response data (12 bytes)
4,186,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,216,960 UART: [rt]cmd =0x4d454153, len=108
4,238,443 >>> mbox cmd response data (12 bytes)
4,238,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,557 UART: [rt]cmd =0x4d454153, len=108
4,289,696 >>> mbox cmd response data (12 bytes)
4,289,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,319,896 UART: [rt]cmd =0x4d454153, len=108
4,340,913 >>> mbox cmd response data (12 bytes)
4,340,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,777 UART: [rt]cmd =0x4d454153, len=108
4,372,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,505 ready_for_fw is high
1,362,505 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,637 >>> mbox cmd response: success
2,987,859 UART:
2,987,875 UART: Running Caliptra FMC ...
2,988,283 UART:
2,988,337 UART: [state] CFI Enabled
2,999,166 UART: [fht] FMC Alias Private Key: 7
3,106,255 UART: [art] Extend RT PCRs Done
3,106,683 UART: [art] Lock RT PCRs Done
3,108,319 UART: [art] Populate DV Done
3,116,410 UART: [fht] FMC Alias Private Key: 7
3,117,352 UART: [art] Derive CDI
3,117,632 UART: [art] Store in in slot 0x4
3,203,519 UART: [art] Derive Key Pair
3,203,879 UART: [art] Store priv key in slot 0x5
3,217,639 UART: [art] Derive Key Pair - Done
3,232,335 UART: [art] Signing Cert with AUTHO
3,232,815 UART: RITY.KEYID = 7
3,247,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,670 UART: [art] PUB.X = 96B016E34243B759819E54D75C0DDAD2C39047542997D51F4C154FED7CDA0E5DF8C8FCF2A79C8E0DBF961B488F2738DD
3,255,443 UART: [art] PUB.Y = A292B31302E2716C68049B973EF03E3B70484AAF4B0B47DC9F7B802BAF8A601FDE3DA6002CFBDF2A02BECFB06F226A33
3,262,377 UART: [art] SIG.R = 0E6A3D82D7FB8F6889E7E86DEE210A846AB992BD67A4B83859C5BB9B87B105A599FE085EA3D10F0D6FA5582083E1C538
3,269,139 UART: [art] SIG.S = CF556B71F130829A8BCDB2FD971C14D2E8C1581C4091769CC6DF0EEA2F1D0B0F7206B46D20F0A90F4B68CE3EC4DC8670
3,294,055 UART: Caliptra RT
3,294,309 UART: [state] CFI Enabled
3,402,427 UART: [rt] RT listening for mailbox commands...
3,403,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,100 UART: [rt]cmd =0x4d454153, len=108
3,454,085 >>> mbox cmd response data (12 bytes)
3,454,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,231 UART: [rt]cmd =0x4d454153, len=108
3,505,498 >>> mbox cmd response data (12 bytes)
3,505,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,548 UART: [rt]cmd =0x4d454153, len=108
3,556,955 >>> mbox cmd response data (12 bytes)
3,556,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,847 UART: [rt]cmd =0x4d454153, len=108
3,607,636 >>> mbox cmd response data (12 bytes)
3,607,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,798 UART: [rt]cmd =0x4d454153, len=108
3,658,123 >>> mbox cmd response data (12 bytes)
3,658,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,101 UART: [rt]cmd =0x4d454153, len=108
3,709,320 >>> mbox cmd response data (12 bytes)
3,709,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,374 UART: [rt]cmd =0x4d454153, len=108
3,760,135 >>> mbox cmd response data (12 bytes)
3,760,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,943 UART: [rt]cmd =0x4d454153, len=108
3,810,548 >>> mbox cmd response data (12 bytes)
3,810,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,382 UART: [rt]cmd =0x4d454153, len=108
3,860,693 >>> mbox cmd response data (12 bytes)
3,860,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,699 UART: [rt]cmd =0x4d454153, len=108
3,911,832 >>> mbox cmd response data (12 bytes)
3,911,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,964 UART: [rt]cmd =0x4d454153, len=108
3,962,789 >>> mbox cmd response data (12 bytes)
3,962,790 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,815 UART: [rt]cmd =0x4d454153, len=108
4,012,852 >>> mbox cmd response data (12 bytes)
4,012,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,908 UART: [rt]cmd =0x4d454153, len=108
4,063,651 >>> mbox cmd response data (12 bytes)
4,063,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,509 UART: [rt]cmd =0x4d454153, len=108
4,114,332 >>> mbox cmd response data (12 bytes)
4,114,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,332 UART: [rt]cmd =0x4d454153, len=108
4,165,057 >>> mbox cmd response data (12 bytes)
4,165,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,985 UART: [rt]cmd =0x4d454153, len=108
4,196,785 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,485 UART: [kat] SHA2-512-ACC
897,386 UART: [kat] ECC-384
903,207 UART: [kat] HMAC-384Kdf
907,829 UART: [kat] LMS
1,476,025 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,113 UART: [idev] ++
1,480,281 UART: [idev] CDI.KEYID = 6
1,480,641 UART: [idev] SUBJECT.KEYID = 7
1,481,065 UART: [idev] UDS.KEYID = 0
1,481,410 ready_for_fw is high
1,481,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,757 UART: [idev] Erasing UDS.KEYID = 0
1,505,311 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,157 UART: [idev] --
1,515,412 UART: [ldev] ++
1,515,580 UART: [ldev] CDI.KEYID = 6
1,515,943 UART: [ldev] SUBJECT.KEYID = 5
1,516,369 UART: [ldev] AUTHORITY.KEYID = 7
1,516,832 UART: [ldev] FE.KEYID = 1
1,521,940 UART: [ldev] Erasing FE.KEYID = 1
1,548,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,317 UART: [ldev] --
1,587,794 UART: [fwproc] Waiting for Commands...
1,588,647 UART: [fwproc] Received command 0x46574c44
1,589,438 UART: [fwproc] Received Image of size 114360 bytes
2,887,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,546 >>> mbox cmd response: success
3,080,556 UART: [afmc] ++
3,080,724 UART: [afmc] CDI.KEYID = 6
3,081,086 UART: [afmc] SUBJECT.KEYID = 7
3,081,511 UART: [afmc] AUTHORITY.KEYID = 5
3,116,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,406 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,799 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,489 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,236 UART: [afmc] --
3,159,210 UART: [cold-reset] --
3,160,104 UART: [state] Locking Datavault
3,161,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,929 UART: [state] Locking ICCM
3,162,549 UART: [exit] Launching FMC @ 0x40000130
3,167,878 UART:
3,167,894 UART: Running Caliptra FMC ...
3,168,302 UART:
3,168,445 UART: [state] CFI Enabled
3,178,620 UART: [fht] FMC Alias Private Key: 7
3,286,079 UART: [art] Extend RT PCRs Done
3,286,507 UART: [art] Lock RT PCRs Done
3,288,179 UART: [art] Populate DV Done
3,296,276 UART: [fht] FMC Alias Private Key: 7
3,297,376 UART: [art] Derive CDI
3,297,656 UART: [art] Store in in slot 0x4
3,383,487 UART: [art] Derive Key Pair
3,383,847 UART: [art] Store priv key in slot 0x5
3,397,725 UART: [art] Derive Key Pair - Done
3,412,535 UART: [art] Signing Cert with AUTHO
3,413,015 UART: RITY.KEYID = 7
3,428,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,074 UART: [art] PUB.X = D9768AE71FE3498F57F61A565D0F9D4027CFD51F1B45545202B9D8616C213229986EA906294D0F175D8D821C9DBB3723
3,435,828 UART: [art] PUB.Y = 9A226BD7C1D432D6F7C559A1D0451D945ACFB7D10F00BAF129B955AA6D9FE4D059B44679B8D01E6D9A50C261E47F9E2C
3,442,767 UART: [art] SIG.R = 82A02676D9601B26969A9BF4431B309598CF6432736957F4055FA8C868B65AE9648C0CCB90C2DAD38EC459DA3600184D
3,449,505 UART: [art] SIG.S = 1ADF63614EEA467127E520A24C8C36BB3F870131ACA9E9E39596E53A56C9A165A26AB2215DD55BB93E5609196F51C58B
3,473,324 UART: Caliptra RT
3,473,670 UART: [state] CFI Enabled
3,582,576 UART: [rt] RT listening for mailbox commands...
3,583,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,341 UART: [rt]cmd =0x4d454153, len=108
3,633,872 >>> mbox cmd response data (12 bytes)
3,633,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,646 UART: [rt]cmd =0x4d454153, len=108
3,683,895 >>> mbox cmd response data (12 bytes)
3,683,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,017 UART: [rt]cmd =0x4d454153, len=108
3,733,820 >>> mbox cmd response data (12 bytes)
3,733,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,740 UART: [rt]cmd =0x4d454153, len=108
3,784,551 >>> mbox cmd response data (12 bytes)
3,784,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,775 UART: [rt]cmd =0x4d454153, len=108
3,835,700 >>> mbox cmd response data (12 bytes)
3,835,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,700 UART: [rt]cmd =0x4d454153, len=108
3,886,385 >>> mbox cmd response data (12 bytes)
3,886,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,367 UART: [rt]cmd =0x4d454153, len=108
3,937,572 >>> mbox cmd response data (12 bytes)
3,937,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,602 UART: [rt]cmd =0x4d454153, len=108
3,988,801 >>> mbox cmd response data (12 bytes)
3,988,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,957 UART: [rt]cmd =0x4d454153, len=108
4,040,060 >>> mbox cmd response data (12 bytes)
4,040,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,126 UART: [rt]cmd =0x4d454153, len=108
4,090,603 >>> mbox cmd response data (12 bytes)
4,090,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,481 UART: [rt]cmd =0x4d454153, len=108
4,140,762 >>> mbox cmd response data (12 bytes)
4,140,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,864 UART: [rt]cmd =0x4d454153, len=108
4,191,211 >>> mbox cmd response data (12 bytes)
4,191,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,247 UART: [rt]cmd =0x4d454153, len=108
4,242,480 >>> mbox cmd response data (12 bytes)
4,242,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,278 UART: [rt]cmd =0x4d454153, len=108
4,293,085 >>> mbox cmd response data (12 bytes)
4,293,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,183 UART: [rt]cmd =0x4d454153, len=108
4,345,058 >>> mbox cmd response data (12 bytes)
4,345,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,375,102 UART: [rt]cmd =0x4d454153, len=108
4,377,314 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,422 ready_for_fw is high
1,362,422 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,882 >>> mbox cmd response: success
2,991,068 UART:
2,991,084 UART: Running Caliptra FMC ...
2,991,492 UART:
2,991,635 UART: [state] CFI Enabled
3,002,264 UART: [fht] FMC Alias Private Key: 7
3,109,955 UART: [art] Extend RT PCRs Done
3,110,383 UART: [art] Lock RT PCRs Done
3,111,889 UART: [art] Populate DV Done
3,119,954 UART: [fht] FMC Alias Private Key: 7
3,121,106 UART: [art] Derive CDI
3,121,386 UART: [art] Store in in slot 0x4
3,207,245 UART: [art] Derive Key Pair
3,207,605 UART: [art] Store priv key in slot 0x5
3,220,959 UART: [art] Derive Key Pair - Done
3,235,808 UART: [art] Signing Cert with AUTHO
3,236,288 UART: RITY.KEYID = 7
3,251,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,091 UART: [art] PUB.X = B26A22E7CA19176A333497E6290404218A4456C8F35C88837923FFA263C66C3ECF4275E83F1D9D8F5536EE804E48666D
3,258,849 UART: [art] PUB.Y = E24872BA4D9754B572A2C9347218E7569D2EF8C336298A503AB6F4A8396007C343BDCCC67AC79D6FEF2E6DF31A06BA0C
3,265,800 UART: [art] SIG.R = 57E2E81EB23E2694B14C37991AC9042F6BD36BA45D952074790D12AD4D6D386411A0091A2CF258EF9EDF0F3E7844A7B5
3,272,562 UART: [art] SIG.S = 51A717D9C9CC81E91E82EA59FCF5A964B551D8E194038051B98DB5DAA149E76B45974033E6EAFFAC510F702DBEE3DEB7
3,296,511 UART: Caliptra RT
3,296,857 UART: [state] CFI Enabled
3,405,706 UART: [rt] RT listening for mailbox commands...
3,406,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,775 UART: [rt]cmd =0x4d454153, len=108
3,457,500 >>> mbox cmd response data (12 bytes)
3,457,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,682 UART: [rt]cmd =0x4d454153, len=108
3,508,825 >>> mbox cmd response data (12 bytes)
3,508,826 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,717 UART: [rt]cmd =0x4d454153, len=108
3,559,100 >>> mbox cmd response data (12 bytes)
3,559,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,172 UART: [rt]cmd =0x4d454153, len=108
3,610,257 >>> mbox cmd response data (12 bytes)
3,610,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,379 UART: [rt]cmd =0x4d454153, len=108
3,660,786 >>> mbox cmd response data (12 bytes)
3,660,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,788 UART: [rt]cmd =0x4d454153, len=108
3,712,143 >>> mbox cmd response data (12 bytes)
3,712,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,955 UART: [rt]cmd =0x4d454153, len=108
3,762,874 >>> mbox cmd response data (12 bytes)
3,762,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,870 UART: [rt]cmd =0x4d454153, len=108
3,813,539 >>> mbox cmd response data (12 bytes)
3,813,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,621 UART: [rt]cmd =0x4d454153, len=108
3,864,764 >>> mbox cmd response data (12 bytes)
3,864,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,950 UART: [rt]cmd =0x4d454153, len=108
3,916,263 >>> mbox cmd response data (12 bytes)
3,916,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,239 UART: [rt]cmd =0x4d454153, len=108
3,966,858 >>> mbox cmd response data (12 bytes)
3,966,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,134 UART: [rt]cmd =0x4d454153, len=108
4,018,539 >>> mbox cmd response data (12 bytes)
4,018,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,739 UART: [rt]cmd =0x4d454153, len=108
4,068,956 >>> mbox cmd response data (12 bytes)
4,068,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,099,012 UART: [rt]cmd =0x4d454153, len=108
4,119,033 >>> mbox cmd response data (12 bytes)
4,119,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,177 UART: [rt]cmd =0x4d454153, len=108
4,169,806 >>> mbox cmd response data (12 bytes)
4,169,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,818 UART: [rt]cmd =0x4d454153, len=108
4,201,792 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
902,323 UART: [kat] SHA2-256
904,263 UART: [kat] SHA2-384
906,890 UART: [kat] SHA2-512-ACC
908,791 UART: [kat] ECC-384
918,578 UART: [kat] HMAC-384Kdf
922,984 UART: [kat] LMS
1,171,312 UART: [kat] --
1,172,487 UART: [cold-reset] ++
1,173,003 UART: [fht] FHT @ 0x50003400
1,175,690 UART: [idev] ++
1,175,858 UART: [idev] CDI.KEYID = 6
1,176,218 UART: [idev] SUBJECT.KEYID = 7
1,176,642 UART: [idev] UDS.KEYID = 0
1,176,987 ready_for_fw is high
1,176,987 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,330 UART: [idev] Erasing UDS.KEYID = 0
1,201,411 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,211,025 UART: [ldev] ++
1,211,193 UART: [ldev] CDI.KEYID = 6
1,211,556 UART: [ldev] SUBJECT.KEYID = 5
1,211,982 UART: [ldev] AUTHORITY.KEYID = 7
1,212,445 UART: [ldev] FE.KEYID = 1
1,217,455 UART: [ldev] Erasing FE.KEYID = 1
1,244,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,447 UART: [ldev] --
1,283,916 UART: [fwproc] Wait for Commands...
1,284,684 UART: [fwproc] Recv command 0x46574c44
1,285,412 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,518 >>> mbox cmd response: success
2,777,550 UART: [afmc] ++
2,777,718 UART: [afmc] CDI.KEYID = 6
2,778,080 UART: [afmc] SUBJECT.KEYID = 7
2,778,505 UART: [afmc] AUTHORITY.KEYID = 5
2,813,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,809 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,694 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,033 UART: [afmc] --
2,857,111 UART: [cold-reset] --
2,858,103 UART: [state] Locking Datavault
2,859,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,888 UART: [state] Locking ICCM
2,860,360 UART: [exit] Launching FMC @ 0x40000130
2,865,689 UART:
2,865,705 UART: Running Caliptra FMC ...
2,866,113 UART:
2,866,167 UART: [state] CFI Enabled
2,876,442 UART: [fht] FMC Alias Private Key: 7
2,984,939 UART: [art] Extend RT PCRs Done
2,985,367 UART: [art] Lock RT PCRs Done
2,987,129 UART: [art] Populate DV Done
2,995,242 UART: [fht] FMC Alias Private Key: 7
2,996,296 UART: [art] Derive CDI
2,996,576 UART: [art] Store in in slot 0x4
3,081,953 UART: [art] Derive Key Pair
3,082,313 UART: [art] Store priv key in slot 0x5
3,095,469 UART: [art] Derive Key Pair - Done
3,110,293 UART: [art] Signing Cert with AUTHO
3,110,773 UART: RITY.KEYID = 7
3,126,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,226 UART: [art] PUB.X = DE10FCDCF594A8E37684EB6B30FC906B6ABEF1C06E5341744D7565A4E9E602BAD59CEBD5D125773FAACBE3310C2199B7
3,134,010 UART: [art] PUB.Y = 0CDC045ED2D988BDBE797AA6963643EC23AD0067318CDAD4AF142BB0B6E60972CE0870929D934AC0DEDAB5F33F4EF081
3,140,944 UART: [art] SIG.R = FF75F43EFB25677CEDEBC322194808CF790954DA6A38C7BCFDA5068D75F863E0C7A804D02B8D4C2C5DCB04AC5B061EF0
3,147,716 UART: [art] SIG.S = 21DBA9DCDF6590F0D29579936680C36483BD2A9620EAA7457C47AD61E7B080E7560E2D4F081CEC8684604322463BB469
3,171,743 UART: Caliptra RT
3,171,997 UART: [state] CFI Enabled
3,279,287 UART: [rt] RT listening for mailbox commands...
3,279,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,044 UART: [rt]cmd =0x4d454153, len=108
3,330,957 >>> mbox cmd response data (12 bytes)
3,330,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,129 UART: [rt]cmd =0x4d454153, len=108
3,381,802 >>> mbox cmd response data (12 bytes)
3,381,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,694 UART: [rt]cmd =0x4d454153, len=108
3,432,179 >>> mbox cmd response data (12 bytes)
3,432,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,405 UART: [rt]cmd =0x4d454153, len=108
3,483,114 >>> mbox cmd response data (12 bytes)
3,483,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,200 UART: [rt]cmd =0x4d454153, len=108
3,534,313 >>> mbox cmd response data (12 bytes)
3,534,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,451 UART: [rt]cmd =0x4d454153, len=108
3,584,924 >>> mbox cmd response data (12 bytes)
3,584,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,978 UART: [rt]cmd =0x4d454153, len=108
3,635,623 >>> mbox cmd response data (12 bytes)
3,635,624 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,465 UART: [rt]cmd =0x4d454153, len=108
3,686,362 >>> mbox cmd response data (12 bytes)
3,686,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,504 UART: [rt]cmd =0x4d454153, len=108
3,736,745 >>> mbox cmd response data (12 bytes)
3,736,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,737 UART: [rt]cmd =0x4d454153, len=108
3,787,022 >>> mbox cmd response data (12 bytes)
3,787,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,994 UART: [rt]cmd =0x4d454153, len=108
3,837,299 >>> mbox cmd response data (12 bytes)
3,837,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,547 UART: [rt]cmd =0x4d454153, len=108
3,888,514 >>> mbox cmd response data (12 bytes)
3,888,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,554 UART: [rt]cmd =0x4d454153, len=108
3,939,969 >>> mbox cmd response data (12 bytes)
3,939,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,889 UART: [rt]cmd =0x4d454153, len=108
3,990,034 >>> mbox cmd response data (12 bytes)
3,990,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,134 UART: [rt]cmd =0x4d454153, len=108
4,040,849 >>> mbox cmd response data (12 bytes)
4,040,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,705 UART: [rt]cmd =0x4d454153, len=108
4,072,875 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,845 ready_for_fw is high
1,059,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,371 >>> mbox cmd response: success
2,689,363 UART:
2,689,379 UART: Running Caliptra FMC ...
2,689,787 UART:
2,689,841 UART: [state] CFI Enabled
2,700,112 UART: [fht] FMC Alias Private Key: 7
2,808,603 UART: [art] Extend RT PCRs Done
2,809,031 UART: [art] Lock RT PCRs Done
2,810,815 UART: [art] Populate DV Done
2,818,904 UART: [fht] FMC Alias Private Key: 7
2,819,890 UART: [art] Derive CDI
2,820,170 UART: [art] Store in in slot 0x4
2,905,663 UART: [art] Derive Key Pair
2,906,023 UART: [art] Store priv key in slot 0x5
2,919,557 UART: [art] Derive Key Pair - Done
2,934,276 UART: [art] Signing Cert with AUTHO
2,934,756 UART: RITY.KEYID = 7
2,949,870 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,635 UART: [art] PUB.X = 17D553CA0F7C32127F989EA51E1509B20F53F50303344458D414E46882F7C38A003859B8FD66EAAFFDFF4775CF681191
2,957,366 UART: [art] PUB.Y = BE51AC83F86FFAC33D84446303E1197D9708BDA86478F917DA8D895430690245B20F15C435F396D501C3A99ADD6FACE6
2,964,305 UART: [art] SIG.R = 65746BCADD63CE92270932A786991BD9BEC2F41F7B3F162F2716632B3AD6DA919260D85524F695CEBA6A0627031C7034
2,971,066 UART: [art] SIG.S = 1D082528A4FE616C4977F13B05BDFBB76666E3B33232546E26EBDA52CE34DBC2758FF3184ED10E76A7B52190D40D0B13
2,994,468 UART: Caliptra RT
2,994,722 UART: [state] CFI Enabled
3,102,820 UART: [rt] RT listening for mailbox commands...
3,103,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,375 UART: [rt]cmd =0x4d454153, len=108
3,154,282 >>> mbox cmd response data (12 bytes)
3,154,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,192 UART: [rt]cmd =0x4d454153, len=108
3,204,301 >>> mbox cmd response data (12 bytes)
3,204,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,497 UART: [rt]cmd =0x4d454153, len=108
3,255,866 >>> mbox cmd response data (12 bytes)
3,255,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,978 UART: [rt]cmd =0x4d454153, len=108
3,307,121 >>> mbox cmd response data (12 bytes)
3,307,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,355 UART: [rt]cmd =0x4d454153, len=108
3,357,958 >>> mbox cmd response data (12 bytes)
3,357,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,964 UART: [rt]cmd =0x4d454153, len=108
3,408,787 >>> mbox cmd response data (12 bytes)
3,408,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,725 UART: [rt]cmd =0x4d454153, len=108
3,459,792 >>> mbox cmd response data (12 bytes)
3,459,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,560 UART: [rt]cmd =0x4d454153, len=108
3,510,297 >>> mbox cmd response data (12 bytes)
3,510,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,499 UART: [rt]cmd =0x4d454153, len=108
3,561,820 >>> mbox cmd response data (12 bytes)
3,561,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,828 UART: [rt]cmd =0x4d454153, len=108
3,611,841 >>> mbox cmd response data (12 bytes)
3,611,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,905 UART: [rt]cmd =0x4d454153, len=108
3,662,674 >>> mbox cmd response data (12 bytes)
3,662,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,632 UART: [rt]cmd =0x4d454153, len=108
3,713,575 >>> mbox cmd response data (12 bytes)
3,713,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,833 UART: [rt]cmd =0x4d454153, len=108
3,764,716 >>> mbox cmd response data (12 bytes)
3,764,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,858 UART: [rt]cmd =0x4d454153, len=108
3,814,605 >>> mbox cmd response data (12 bytes)
3,814,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,615 UART: [rt]cmd =0x4d454153, len=108
3,864,738 >>> mbox cmd response data (12 bytes)
3,864,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,888 UART: [rt]cmd =0x4d454153, len=108
3,896,468 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,302 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,327 UART: [idev] ++
1,175,495 UART: [idev] CDI.KEYID = 6
1,175,855 UART: [idev] SUBJECT.KEYID = 7
1,176,279 UART: [idev] UDS.KEYID = 0
1,176,624 ready_for_fw is high
1,176,624 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,597 UART: [idev] Erasing UDS.KEYID = 0
1,201,162 UART: [idev] Sha1 KeyId Algorithm
1,209,618 UART: [idev] --
1,210,858 UART: [ldev] ++
1,211,026 UART: [ldev] CDI.KEYID = 6
1,211,389 UART: [ldev] SUBJECT.KEYID = 5
1,211,815 UART: [ldev] AUTHORITY.KEYID = 7
1,212,278 UART: [ldev] FE.KEYID = 1
1,217,306 UART: [ldev] Erasing FE.KEYID = 1
1,243,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,268 UART: [ldev] --
1,282,623 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,055 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,933 >>> mbox cmd response: success
2,775,033 UART: [afmc] ++
2,775,201 UART: [afmc] CDI.KEYID = 6
2,775,563 UART: [afmc] SUBJECT.KEYID = 7
2,775,988 UART: [afmc] AUTHORITY.KEYID = 5
2,811,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,308 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,090 UART: [afmc] --
2,855,074 UART: [cold-reset] --
2,856,196 UART: [state] Locking Datavault
2,857,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,917 UART: [state] Locking ICCM
2,858,583 UART: [exit] Launching FMC @ 0x40000130
2,863,912 UART:
2,863,928 UART: Running Caliptra FMC ...
2,864,336 UART:
2,864,479 UART: [state] CFI Enabled
2,874,804 UART: [fht] FMC Alias Private Key: 7
2,982,715 UART: [art] Extend RT PCRs Done
2,983,143 UART: [art] Lock RT PCRs Done
2,984,711 UART: [art] Populate DV Done
2,992,794 UART: [fht] FMC Alias Private Key: 7
2,993,824 UART: [art] Derive CDI
2,994,104 UART: [art] Store in in slot 0x4
3,080,441 UART: [art] Derive Key Pair
3,080,801 UART: [art] Store priv key in slot 0x5
3,094,437 UART: [art] Derive Key Pair - Done
3,109,575 UART: [art] Signing Cert with AUTHO
3,110,055 UART: RITY.KEYID = 7
3,125,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,104 UART: [art] PUB.X = F578267A5E148ED01904F1579EDB9502DDBE7576B83F88E6EDA54C412C7B6558A9985485075401C374A24C6456B235B6
3,132,856 UART: [art] PUB.Y = 5DBA65963E4714FBCF50118506E9D183A9FC925F76984F05910FE20B04FDE0548E5AD13EF3613C4477C8AB74A1401F82
3,139,793 UART: [art] SIG.R = A1A42B0EE73E6476826CC5177E30ADE874CEE703FEB21C86B52D2085CFC8FC5D7F99E318818AF6B4E502E56041085F6F
3,146,561 UART: [art] SIG.S = 000A85BBE69E40FD8CC196DD37AEBD3E12F17ECB97DB71645D56B3F09620805CC2F8619A2D124245361B911641BC5A2F
3,169,957 UART: Caliptra RT
3,170,303 UART: [state] CFI Enabled
3,277,982 UART: [rt] RT listening for mailbox commands...
3,278,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,743 UART: [rt]cmd =0x4d454153, len=108
3,329,192 >>> mbox cmd response data (12 bytes)
3,329,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,210 UART: [rt]cmd =0x4d454153, len=108
3,380,069 >>> mbox cmd response data (12 bytes)
3,380,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,019 UART: [rt]cmd =0x4d454153, len=108
3,430,528 >>> mbox cmd response data (12 bytes)
3,430,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,522 UART: [rt]cmd =0x4d454153, len=108
3,482,603 >>> mbox cmd response data (12 bytes)
3,482,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,555 UART: [rt]cmd =0x4d454153, len=108
3,533,530 >>> mbox cmd response data (12 bytes)
3,533,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,428 UART: [rt]cmd =0x4d454153, len=108
3,583,653 >>> mbox cmd response data (12 bytes)
3,583,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,721 UART: [rt]cmd =0x4d454153, len=108
3,634,064 >>> mbox cmd response data (12 bytes)
3,634,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,788 UART: [rt]cmd =0x4d454153, len=108
3,684,407 >>> mbox cmd response data (12 bytes)
3,684,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,359 UART: [rt]cmd =0x4d454153, len=108
3,734,960 >>> mbox cmd response data (12 bytes)
3,734,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,866 UART: [rt]cmd =0x4d454153, len=108
3,785,527 >>> mbox cmd response data (12 bytes)
3,785,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,571 UART: [rt]cmd =0x4d454153, len=108
3,836,656 >>> mbox cmd response data (12 bytes)
3,836,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,774 UART: [rt]cmd =0x4d454153, len=108
3,888,023 >>> mbox cmd response data (12 bytes)
3,888,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,085 UART: [rt]cmd =0x4d454153, len=108
3,939,320 >>> mbox cmd response data (12 bytes)
3,939,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,382 UART: [rt]cmd =0x4d454153, len=108
3,990,603 >>> mbox cmd response data (12 bytes)
3,990,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,511 UART: [rt]cmd =0x4d454153, len=108
4,041,578 >>> mbox cmd response data (12 bytes)
4,041,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,706 UART: [rt]cmd =0x4d454153, len=108
4,073,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,072 ready_for_fw is high
1,061,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,194 >>> mbox cmd response: success
2,688,174 UART:
2,688,190 UART: Running Caliptra FMC ...
2,688,598 UART:
2,688,741 UART: [state] CFI Enabled
2,699,268 UART: [fht] FMC Alias Private Key: 7
2,807,835 UART: [art] Extend RT PCRs Done
2,808,263 UART: [art] Lock RT PCRs Done
2,809,905 UART: [art] Populate DV Done
2,818,042 UART: [fht] FMC Alias Private Key: 7
2,819,026 UART: [art] Derive CDI
2,819,306 UART: [art] Store in in slot 0x4
2,905,095 UART: [art] Derive Key Pair
2,905,455 UART: [art] Store priv key in slot 0x5
2,918,585 UART: [art] Derive Key Pair - Done
2,933,539 UART: [art] Signing Cert with AUTHO
2,934,019 UART: RITY.KEYID = 7
2,949,177 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,942 UART: [art] PUB.X = F64DAA7C0BE069404B0D02122CD13203E80C4AEB9ED3FECEA46813581ECB5119E01F0182C481614F0E6BD54E4F838990
2,956,699 UART: [art] PUB.Y = BB01F097A1101C2C808D5FDDE15F8D295DDD5BC6B2AF7CE153D6CB0A94A0ACD6ACED3FB73B4A50F3026A5C2266B1355C
2,963,666 UART: [art] SIG.R = 0C69CEA8441B849FF142FB332533ACE1C1DDF6D99FE2C788A9341D31905C6513E455AC9443D1AC32CA942D8839BE694A
2,970,441 UART: [art] SIG.S = 82F6B45F3F6FA0C7A1859AEF3D8AD1C7C4D67B148F0E15B998DAAB9C7D397B9DAA6DD6B720306CEB1DA3EC94898C6CCD
2,994,167 UART: Caliptra RT
2,994,513 UART: [state] CFI Enabled
3,102,429 UART: [rt] RT listening for mailbox commands...
3,103,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,432 UART: [rt]cmd =0x4d454153, len=108
3,154,097 >>> mbox cmd response data (12 bytes)
3,154,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,205 UART: [rt]cmd =0x4d454153, len=108
3,205,184 >>> mbox cmd response data (12 bytes)
3,205,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,198 UART: [rt]cmd =0x4d454153, len=108
3,256,049 >>> mbox cmd response data (12 bytes)
3,256,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,205 UART: [rt]cmd =0x4d454153, len=108
3,306,572 >>> mbox cmd response data (12 bytes)
3,306,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,556 UART: [rt]cmd =0x4d454153, len=108
3,357,631 >>> mbox cmd response data (12 bytes)
3,357,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,619 UART: [rt]cmd =0x4d454153, len=108
3,408,012 >>> mbox cmd response data (12 bytes)
3,408,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,908 UART: [rt]cmd =0x4d454153, len=108
3,458,373 >>> mbox cmd response data (12 bytes)
3,458,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,129 UART: [rt]cmd =0x4d454153, len=108
3,508,962 >>> mbox cmd response data (12 bytes)
3,508,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,062 UART: [rt]cmd =0x4d454153, len=108
3,560,119 >>> mbox cmd response data (12 bytes)
3,560,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,361 UART: [rt]cmd =0x4d454153, len=108
3,610,936 >>> mbox cmd response data (12 bytes)
3,610,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,700 UART: [rt]cmd =0x4d454153, len=108
3,661,305 >>> mbox cmd response data (12 bytes)
3,661,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,513 UART: [rt]cmd =0x4d454153, len=108
3,712,236 >>> mbox cmd response data (12 bytes)
3,712,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,450 UART: [rt]cmd =0x4d454153, len=108
3,763,877 >>> mbox cmd response data (12 bytes)
3,763,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,931 UART: [rt]cmd =0x4d454153, len=108
3,813,780 >>> mbox cmd response data (12 bytes)
3,813,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,810 UART: [rt]cmd =0x4d454153, len=108
3,864,359 >>> mbox cmd response data (12 bytes)
3,864,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,419 UART: [rt]cmd =0x4d454153, len=108
3,896,223 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,322 UART: [kat] SHA2-512-ACC
906,223 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,174,623 ready_for_fw is high
1,174,623 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,073 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,930 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,708 >>> mbox cmd response: success
2,773,975 UART: [afmc] ++
2,774,143 UART: [afmc] CDI.KEYID = 6
2,774,506 UART: [afmc] SUBJECT.KEYID = 7
2,774,932 UART: [afmc] AUTHORITY.KEYID = 5
2,810,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,780 UART: [afmc] --
2,853,806 UART: [cold-reset] --
2,854,500 UART: [state] Locking Datavault
2,855,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,345 UART: [state] Locking ICCM
2,857,013 UART: [exit] Launching FMC @ 0x40000130
2,862,342 UART:
2,862,358 UART: Running Caliptra FMC ...
2,862,766 UART:
2,862,820 UART: [state] CFI Enabled
2,873,497 UART: [fht] FMC Alias Private Key: 7
2,981,396 UART: [art] Extend RT PCRs Done
2,981,824 UART: [art] Lock RT PCRs Done
2,983,346 UART: [art] Populate DV Done
2,991,703 UART: [fht] FMC Alias Private Key: 7
2,992,857 UART: [art] Derive CDI
2,993,137 UART: [art] Store in in slot 0x4
3,079,056 UART: [art] Derive Key Pair
3,079,416 UART: [art] Store priv key in slot 0x5
3,093,168 UART: [art] Derive Key Pair - Done
3,107,992 UART: [art] Signing Cert with AUTHO
3,108,472 UART: RITY.KEYID = 7
3,123,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,343 UART: [art] PUB.X = 38A895DAACA332A3F510B66B513622C174E2008DDBD85A95D97BF50BF9A15347CB6D7355F3602A07EF1404AB4B02C596
3,131,085 UART: [art] PUB.Y = 547543B067A7B3A62CF38B45D6BCECF792572DD8216E8707775DA0CE57A18DB871CFFD601006C3996956F6CE165222B6
3,138,031 UART: [art] SIG.R = 3B9E93594C9EAF0621BA9947122E881E5753ED947D7B13E66AE3D243F5E1954139992613B046B40CF3F700705147C741
3,144,763 UART: [art] SIG.S = 0986F6CC0FE9F8B340E93CE4A8468FED5DC90907632E5042A0F76019EB23CF3A30E3003A521A51C5084199BBD446729B
3,168,773 UART: Caliptra RT
3,169,027 UART: [state] CFI Enabled
3,277,361 UART: [rt] RT listening for mailbox commands...
3,278,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,258 UART: [rt]cmd =0x4d454153, len=108
3,329,279 >>> mbox cmd response data (12 bytes)
3,329,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,417 UART: [rt]cmd =0x4d454153, len=108
3,379,900 >>> mbox cmd response data (12 bytes)
3,379,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,766 UART: [rt]cmd =0x4d454153, len=108
3,429,373 >>> mbox cmd response data (12 bytes)
3,429,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,291 UART: [rt]cmd =0x4d454153, len=108
3,480,194 >>> mbox cmd response data (12 bytes)
3,480,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,270 UART: [rt]cmd =0x4d454153, len=108
3,531,015 >>> mbox cmd response data (12 bytes)
3,531,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,263 UART: [rt]cmd =0x4d454153, len=108
3,582,128 >>> mbox cmd response data (12 bytes)
3,582,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,936 UART: [rt]cmd =0x4d454153, len=108
3,631,731 >>> mbox cmd response data (12 bytes)
3,631,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,811 UART: [rt]cmd =0x4d454153, len=108
3,682,250 >>> mbox cmd response data (12 bytes)
3,682,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,256 UART: [rt]cmd =0x4d454153, len=108
3,732,861 >>> mbox cmd response data (12 bytes)
3,732,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,749 UART: [rt]cmd =0x4d454153, len=108
3,783,756 >>> mbox cmd response data (12 bytes)
3,783,757 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,750 UART: [rt]cmd =0x4d454153, len=108
3,834,625 >>> mbox cmd response data (12 bytes)
3,834,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,561 UART: [rt]cmd =0x4d454153, len=108
3,884,868 >>> mbox cmd response data (12 bytes)
3,884,869 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,700 UART: [rt]cmd =0x4d454153, len=108
3,935,727 >>> mbox cmd response data (12 bytes)
3,935,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,573 UART: [rt]cmd =0x4d454153, len=108
3,986,346 >>> mbox cmd response data (12 bytes)
3,986,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,422 UART: [rt]cmd =0x4d454153, len=108
4,037,619 >>> mbox cmd response data (12 bytes)
4,037,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,497 UART: [rt]cmd =0x4d454153, len=108
4,069,121 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,954 ready_for_fw is high
1,055,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,330 >>> mbox cmd response: success
2,683,192 UART:
2,683,208 UART: Running Caliptra FMC ...
2,683,616 UART:
2,683,670 UART: [state] CFI Enabled
2,693,993 UART: [fht] FMC Alias Private Key: 7
2,802,134 UART: [art] Extend RT PCRs Done
2,802,562 UART: [art] Lock RT PCRs Done
2,804,266 UART: [art] Populate DV Done
2,812,407 UART: [fht] FMC Alias Private Key: 7
2,813,459 UART: [art] Derive CDI
2,813,739 UART: [art] Store in in slot 0x4
2,899,408 UART: [art] Derive Key Pair
2,899,768 UART: [art] Store priv key in slot 0x5
2,913,108 UART: [art] Derive Key Pair - Done
2,927,666 UART: [art] Signing Cert with AUTHO
2,928,146 UART: RITY.KEYID = 7
2,943,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,975 UART: [art] PUB.X = F9A4053F0D92C666889085C81246708A8CB1C4E055B3C75544600DB71CCD45798388173E59FCBC59A42684B4A596009F
2,950,706 UART: [art] PUB.Y = 7D7BC7C431C2344826B154A9B0963981DD44ECD0B9BFC6D301AD6E713D165D91B2BD10659154C8646B20311CFA6491E6
2,957,655 UART: [art] SIG.R = 53090E5CA00CB07030E26836DD6E6BC6D61FE4524DF1522C9B29F672E8FCC3E3C4E7A3DA4A8A255018886D4BDCB36EAA
2,964,432 UART: [art] SIG.S = 2C9112AD13165F3098221B5314C512C52961EEC08062D36BD5372DB3336B138BB2B48D80C5E7DAC55BD0D4EE8E370FA5
2,987,772 UART: Caliptra RT
2,988,026 UART: [state] CFI Enabled
3,095,670 UART: [rt] RT listening for mailbox commands...
3,096,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,481 UART: [rt]cmd =0x4d454153, len=108
3,146,976 >>> mbox cmd response data (12 bytes)
3,146,977 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,177,084 UART: [rt]cmd =0x4d454153, len=108
3,198,359 >>> mbox cmd response data (12 bytes)
3,198,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,431 UART: [rt]cmd =0x4d454153, len=108
3,250,326 >>> mbox cmd response data (12 bytes)
3,250,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,544 UART: [rt]cmd =0x4d454153, len=108
3,301,573 >>> mbox cmd response data (12 bytes)
3,301,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,509 UART: [rt]cmd =0x4d454153, len=108
3,351,710 >>> mbox cmd response data (12 bytes)
3,351,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,674 UART: [rt]cmd =0x4d454153, len=108
3,402,195 >>> mbox cmd response data (12 bytes)
3,402,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,991 UART: [rt]cmd =0x4d454153, len=108
3,452,738 >>> mbox cmd response data (12 bytes)
3,452,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,692 UART: [rt]cmd =0x4d454153, len=108
3,503,673 >>> mbox cmd response data (12 bytes)
3,503,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,769 UART: [rt]cmd =0x4d454153, len=108
3,554,986 >>> mbox cmd response data (12 bytes)
3,554,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,218 UART: [rt]cmd =0x4d454153, len=108
3,606,109 >>> mbox cmd response data (12 bytes)
3,606,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,295 UART: [rt]cmd =0x4d454153, len=108
3,656,194 >>> mbox cmd response data (12 bytes)
3,656,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,270 UART: [rt]cmd =0x4d454153, len=108
3,707,145 >>> mbox cmd response data (12 bytes)
3,707,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,121 UART: [rt]cmd =0x4d454153, len=108
3,758,348 >>> mbox cmd response data (12 bytes)
3,758,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,374 UART: [rt]cmd =0x4d454153, len=108
3,809,009 >>> mbox cmd response data (12 bytes)
3,809,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,825 UART: [rt]cmd =0x4d454153, len=108
3,859,736 >>> mbox cmd response data (12 bytes)
3,859,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,716 UART: [rt]cmd =0x4d454153, len=108
3,891,546 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,467 UART: [kat] SHA2-256
892,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,146 UART: [kat] ++
896,298 UART: [kat] sha1
900,696 UART: [kat] SHA2-256
902,636 UART: [kat] SHA2-384
905,275 UART: [kat] SHA2-512-ACC
907,176 UART: [kat] ECC-384
916,869 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,738 UART: [cold-reset] ++
1,171,202 UART: [fht] FHT @ 0x50003400
1,173,828 UART: [idev] ++
1,173,996 UART: [idev] CDI.KEYID = 6
1,174,357 UART: [idev] SUBJECT.KEYID = 7
1,174,782 UART: [idev] UDS.KEYID = 0
1,175,128 ready_for_fw is high
1,175,128 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,006 UART: [idev] Sha1 KeyId Algorithm
1,208,988 UART: [idev] --
1,210,037 UART: [ldev] ++
1,210,205 UART: [ldev] CDI.KEYID = 6
1,210,569 UART: [ldev] SUBJECT.KEYID = 5
1,210,996 UART: [ldev] AUTHORITY.KEYID = 7
1,211,459 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,179 UART: [fwproc] Wait for Commands...
1,282,918 UART: [fwproc] Recv command 0x46574c44
1,283,651 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,929 >>> mbox cmd response: success
2,772,946 UART: [afmc] ++
2,773,114 UART: [afmc] CDI.KEYID = 6
2,773,477 UART: [afmc] SUBJECT.KEYID = 7
2,773,903 UART: [afmc] AUTHORITY.KEYID = 5
2,809,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,125 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,844 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,831 UART: [afmc] --
2,852,729 UART: [cold-reset] --
2,853,441 UART: [state] Locking Datavault
2,854,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,330 UART: [state] Locking ICCM
2,855,942 UART: [exit] Launching FMC @ 0x40000130
2,861,271 UART:
2,861,287 UART: Running Caliptra FMC ...
2,861,695 UART:
2,861,838 UART: [state] CFI Enabled
2,872,841 UART: [fht] FMC Alias Private Key: 7
2,981,238 UART: [art] Extend RT PCRs Done
2,981,666 UART: [art] Lock RT PCRs Done
2,983,142 UART: [art] Populate DV Done
2,991,249 UART: [fht] FMC Alias Private Key: 7
2,992,331 UART: [art] Derive CDI
2,992,611 UART: [art] Store in in slot 0x4
3,078,272 UART: [art] Derive Key Pair
3,078,632 UART: [art] Store priv key in slot 0x5
3,092,456 UART: [art] Derive Key Pair - Done
3,106,999 UART: [art] Signing Cert with AUTHO
3,107,479 UART: RITY.KEYID = 7
3,122,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,470 UART: [art] PUB.X = 692115C4D1AFB1FC43A7CC253AD21008826B7D23FCCF4F351BCE6C4540289AE544F8491D83ECC05130A8DA0856AC66C9
3,130,244 UART: [art] PUB.Y = 82023E3FC4FC15B5077488E14B97CCBC34596E4AE260ED8B2ABE935604284D9F41370C5AE25FB6705665A4A2ED927307
3,137,181 UART: [art] SIG.R = 6E3373443863D67842BAF74A9850978519E1A4F2BA49EE1B8174C2C212A3B4480B293A5B84F6BF1E4BEC7519E828C3E0
3,143,948 UART: [art] SIG.S = 7E742B13383F0EEBF164E1FC8A3B17EE64F19DEED6D679C75A56FBFFE6A3E69386E1AA154D3BBD0F8D87F7FF6E72634E
3,167,329 UART: Caliptra RT
3,167,675 UART: [state] CFI Enabled
3,275,901 UART: [rt] RT listening for mailbox commands...
3,276,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,552 UART: [rt]cmd =0x4d454153, len=108
3,326,887 >>> mbox cmd response data (12 bytes)
3,326,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,059 UART: [rt]cmd =0x4d454153, len=108
3,377,392 >>> mbox cmd response data (12 bytes)
3,377,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,428 UART: [rt]cmd =0x4d454153, len=108
3,428,195 >>> mbox cmd response data (12 bytes)
3,428,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,983 UART: [rt]cmd =0x4d454153, len=108
3,478,088 >>> mbox cmd response data (12 bytes)
3,478,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,954 UART: [rt]cmd =0x4d454153, len=108
3,528,579 >>> mbox cmd response data (12 bytes)
3,528,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,531 UART: [rt]cmd =0x4d454153, len=108
3,579,124 >>> mbox cmd response data (12 bytes)
3,579,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,124 UART: [rt]cmd =0x4d454153, len=108
3,629,669 >>> mbox cmd response data (12 bytes)
3,629,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,567 UART: [rt]cmd =0x4d454153, len=108
3,680,272 >>> mbox cmd response data (12 bytes)
3,680,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,224 UART: [rt]cmd =0x4d454153, len=108
3,730,693 >>> mbox cmd response data (12 bytes)
3,730,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,723 UART: [rt]cmd =0x4d454153, len=108
3,781,172 >>> mbox cmd response data (12 bytes)
3,781,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,102 UART: [rt]cmd =0x4d454153, len=108
3,832,255 >>> mbox cmd response data (12 bytes)
3,832,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,197 UART: [rt]cmd =0x4d454153, len=108
3,883,088 >>> mbox cmd response data (12 bytes)
3,883,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,082 UART: [rt]cmd =0x4d454153, len=108
3,933,749 >>> mbox cmd response data (12 bytes)
3,933,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,681 UART: [rt]cmd =0x4d454153, len=108
3,984,864 >>> mbox cmd response data (12 bytes)
3,984,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,946 UART: [rt]cmd =0x4d454153, len=108
4,035,903 >>> mbox cmd response data (12 bytes)
4,035,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,009 UART: [rt]cmd =0x4d454153, len=108
4,067,837 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,511 ready_for_fw is high
1,055,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,531 >>> mbox cmd response: success
2,684,709 UART:
2,684,725 UART: Running Caliptra FMC ...
2,685,133 UART:
2,685,276 UART: [state] CFI Enabled
2,695,689 UART: [fht] FMC Alias Private Key: 7
2,804,142 UART: [art] Extend RT PCRs Done
2,804,570 UART: [art] Lock RT PCRs Done
2,806,096 UART: [art] Populate DV Done
2,814,305 UART: [fht] FMC Alias Private Key: 7
2,815,291 UART: [art] Derive CDI
2,815,571 UART: [art] Store in in slot 0x4
2,901,402 UART: [art] Derive Key Pair
2,901,762 UART: [art] Store priv key in slot 0x5
2,915,622 UART: [art] Derive Key Pair - Done
2,930,125 UART: [art] Signing Cert with AUTHO
2,930,605 UART: RITY.KEYID = 7
2,945,937 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,702 UART: [art] PUB.X = 22835C6368EEE511B27E7A71BD03CF1CBB12D2B01C60827402D61314443E5DFB8D6561369811069299EB90D8F0DA249F
2,953,461 UART: [art] PUB.Y = B4FF714D3B1EFDB39C64172D3653E07B7EDEFEBEB93B207CBFFFB32BD06823ACBCB1D2FBA5669B23291D89B31B585F39
2,960,437 UART: [art] SIG.R = 5DF3FDBED80BEBC9333E15296AC336C378FE6F12A9A12893C64D965E1224392D065F375141AAE320F7D2274BCAAD4FBF
2,967,215 UART: [art] SIG.S = A4012E26EC55E6042A1DFF6191501B52616E97AE712844665315B833440E8997C8B4BF37108507C4D7C85699D5DCE407
2,990,905 UART: Caliptra RT
2,991,251 UART: [state] CFI Enabled
3,100,203 UART: [rt] RT listening for mailbox commands...
3,100,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,840 UART: [rt]cmd =0x4d454153, len=108
3,151,527 >>> mbox cmd response data (12 bytes)
3,151,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,617 UART: [rt]cmd =0x4d454153, len=108
3,202,540 >>> mbox cmd response data (12 bytes)
3,202,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,648 UART: [rt]cmd =0x4d454153, len=108
3,253,791 >>> mbox cmd response data (12 bytes)
3,253,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,907 UART: [rt]cmd =0x4d454153, len=108
3,304,524 >>> mbox cmd response data (12 bytes)
3,304,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,598 UART: [rt]cmd =0x4d454153, len=108
3,355,321 >>> mbox cmd response data (12 bytes)
3,355,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,351 UART: [rt]cmd =0x4d454153, len=108
3,406,248 >>> mbox cmd response data (12 bytes)
3,406,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,048 UART: [rt]cmd =0x4d454153, len=108
3,455,915 >>> mbox cmd response data (12 bytes)
3,455,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,945 UART: [rt]cmd =0x4d454153, len=108
3,507,232 >>> mbox cmd response data (12 bytes)
3,507,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,346 UART: [rt]cmd =0x4d454153, len=108
3,557,817 >>> mbox cmd response data (12 bytes)
3,557,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,963 UART: [rt]cmd =0x4d454153, len=108
3,608,436 >>> mbox cmd response data (12 bytes)
3,608,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,388 UART: [rt]cmd =0x4d454153, len=108
3,659,079 >>> mbox cmd response data (12 bytes)
3,659,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,993 UART: [rt]cmd =0x4d454153, len=108
3,709,328 >>> mbox cmd response data (12 bytes)
3,709,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,368 UART: [rt]cmd =0x4d454153, len=108
3,759,879 >>> mbox cmd response data (12 bytes)
3,759,880 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,913 UART: [rt]cmd =0x4d454153, len=108
3,811,214 >>> mbox cmd response data (12 bytes)
3,811,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,180 UART: [rt]cmd =0x4d454153, len=108
3,862,125 >>> mbox cmd response data (12 bytes)
3,862,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,035 UART: [rt]cmd =0x4d454153, len=108
3,893,881 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,476 UART:
192,862 UART: Running Caliptra ROM ...
194,007 UART:
194,162 UART: [state] CFI Enabled
264,129 UART: [state] LifecycleState = Unprovisioned
266,097 UART: [state] DebugLocked = No
268,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,980 UART: [kat] SHA2-256
442,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,218 UART: [kat] ++
453,750 UART: [kat] sha1
464,551 UART: [kat] SHA2-256
467,270 UART: [kat] SHA2-384
473,409 UART: [kat] SHA2-512-ACC
475,773 UART: [kat] ECC-384
2,766,835 UART: [kat] HMAC-384Kdf
2,779,224 UART: [kat] LMS
3,969,469 UART: [kat] --
3,976,261 UART: [cold-reset] ++
3,978,334 UART: [fht] Storing FHT @ 0x50003400
3,989,245 UART: [idev] ++
3,989,802 UART: [idev] CDI.KEYID = 6
3,990,829 UART: [idev] SUBJECT.KEYID = 7
3,991,998 UART: [idev] UDS.KEYID = 0
3,993,044 ready_for_fw is high
3,993,261 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,755 UART: [idev] Erasing UDS.KEYID = 0
7,324,360 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,026 UART: [idev] --
7,351,418 UART: [ldev] ++
7,352,035 UART: [ldev] CDI.KEYID = 6
7,352,994 UART: [ldev] SUBJECT.KEYID = 5
7,354,201 UART: [ldev] AUTHORITY.KEYID = 7
7,355,429 UART: [ldev] FE.KEYID = 1
7,402,039 UART: [ldev] Erasing FE.KEYID = 1
10,735,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,899 UART: [ldev] --
13,116,314 UART: [fwproc] Waiting for Commands...
13,119,209 UART: [fwproc] Received command 0x46574c44
13,121,436 UART: [fwproc] Received Image of size 114036 bytes
17,177,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,635,574 >>> mbox cmd response: success
17,639,431 UART: [afmc] ++
17,640,078 UART: [afmc] CDI.KEYID = 6
17,641,148 UART: [afmc] SUBJECT.KEYID = 7
17,642,245 UART: [afmc] AUTHORITY.KEYID = 5
21,009,086 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,267 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,525 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,925 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,798 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,228 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,594 UART: [afmc] --
23,379,139 UART: [cold-reset] --
23,383,544 UART: [state] Locking Datavault
23,387,887 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,639 UART: [state] Locking ICCM
23,391,780 UART: [exit] Launching FMC @ 0x40000130
23,400,165 UART:
23,400,399 UART: Running Caliptra FMC ...
23,401,442 UART:
23,401,583 UART: [state] CFI Enabled
23,467,561 UART: [fht] FMC Alias Private Key: 7
25,805,524 UART: [art] Extend RT PCRs Done
25,806,744 UART: [art] Lock RT PCRs Done
25,808,143 UART: [art] Populate DV Done
25,813,600 UART: [fht] FMC Alias Private Key: 7
25,815,181 UART: [art] Derive CDI
25,815,989 UART: [art] Store in in slot 0x4
25,875,890 UART: [art] Derive Key Pair
25,876,926 UART: [art] Store priv key in slot 0x5
29,169,700 UART: [art] Derive Key Pair - Done
29,182,639 UART: [art] Signing Cert with AUTHO
29,183,931 UART: RITY.KEYID = 7
31,471,044 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,585 UART: [art] PUB.X = 71C83B99F0336B8B6921DACD446E286E9293EEA99B6A512746CD8D3224017D926EFDBD48C62C85A5F350DAB9970DC541
31,479,754 UART: [art] PUB.Y = 8D9585E601FEAEC36EFC1D965370D814EA10DC87019AA00FEDB2F24C7C8B42B84B70D1A350265212F079C8F6B790362A
31,487,012 UART: [art] SIG.R = BC80D55E435E0513A32F9180F52F9AC17ABC598231439CF0AAD80EBA73A9CD95865E6E95B04C385358CE48D3D73014AC
31,494,386 UART: [art] SIG.S = 5C701E243C752F364A5A4FAEEC96FFA03B755598CD0B87D95FED8628BFC0BC1E0263CC7F6F31DD453156769DADCE42E6
32,799,197 UART: Caliptra RT
32,799,910 UART: [state] CFI Enabled
32,961,158 UART: [rt] RT listening for mailbox commands...
32,963,098 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,993,305 UART: [rt]cmd =0x44504543, len=40
33,042,753 >>> mbox cmd response data (40 bytes)
33,044,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,074,648 UART: [rt]cmd =0x44504543, len=96
33,155,500 >>> mbox cmd response data (56 bytes)
33,156,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,186,795 UART: [rt]cmd =0x44504543, len=96
33,262,725 >>> mbox cmd response data (56 bytes)
33,263,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,293,947 UART: [rt]cmd =0x44504543, len=96
33,369,739 >>> mbox cmd response data (56 bytes)
33,370,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,400,880 UART: [rt]cmd =0x44504543, len=96
33,476,696 >>> mbox cmd response data (56 bytes)
33,477,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,507,835 UART: [rt]cmd =0x44504543, len=96
33,583,495 >>> mbox cmd response data (56 bytes)
33,584,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,614,592 UART: [rt]cmd =0x44504543, len=96
33,690,267 >>> mbox cmd response data (56 bytes)
33,691,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,721,543 UART: [rt]cmd =0x44504543, len=96
33,797,155 >>> mbox cmd response data (56 bytes)
33,797,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,828,295 UART: [rt]cmd =0x44504543, len=96
33,904,323 >>> mbox cmd response data (56 bytes)
33,905,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,935,591 UART: [rt]cmd =0x44504543, len=96
34,011,375 >>> mbox cmd response data (56 bytes)
34,012,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,042,684 UART: [rt]cmd =0x44504543, len=96
34,118,396 >>> mbox cmd response data (56 bytes)
34,119,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,149,572 UART: [rt]cmd =0x44504543, len=96
34,224,803 >>> mbox cmd response data (56 bytes)
34,225,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,256,127 UART: [rt]cmd =0x44504543, len=96
34,331,753 >>> mbox cmd response data (56 bytes)
34,332,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,363,103 UART: [rt]cmd =0x44504543, len=96
34,439,127 >>> mbox cmd response data (56 bytes)
34,439,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,470,541 UART: [rt]cmd =0x44504543, len=96
34,546,148 >>> mbox cmd response data (56 bytes)
34,546,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,577,462 UART: [rt]cmd =0x44504543, len=96
34,652,922 >>> mbox cmd response data (56 bytes)
34,653,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,684,052 UART: [rt]cmd =0x44504543, len=96
34,690,284 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,785,928 ready_for_fw is high
3,786,355 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,889,132 >>> mbox cmd response: success
23,590,900 UART:
23,591,275 UART: Running Caliptra FMC ...
23,592,457 UART:
23,592,619 UART: [state] CFI Enabled
23,660,389 UART: [fht] FMC Alias Private Key: 7
25,998,474 UART: [art] Extend RT PCRs Done
25,999,712 UART: [art] Lock RT PCRs Done
26,001,878 UART: [art] Populate DV Done
26,007,026 UART: [fht] FMC Alias Private Key: 7
26,008,627 UART: [art] Derive CDI
26,009,444 UART: [art] Store in in slot 0x4
26,068,279 UART: [art] Derive Key Pair
26,069,315 UART: [art] Store priv key in slot 0x5
29,362,894 UART: [art] Derive Key Pair - Done
29,375,891 UART: [art] Signing Cert with AUTHO
29,377,190 UART: RITY.KEYID = 7
31,664,957 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,464 UART: [art] PUB.X = 4470F03E586420FE623C1A6F9D82FD79F8E91FE6C88AB863A00387D46C152BE75C2501618F86C046142A566A2DEE3E04
31,673,685 UART: [art] PUB.Y = 4A792281A6314A42F1DB879C3317376FF5C3AA62E47174C0A5E410DCEB67484BDD43F31286C2A0E6DE7FB837CFF6D9E2
31,680,933 UART: [art] SIG.R = A1F51A0750310694BE336036C8CFE870732EF44CDAFE4C949A888EBB428DD9D733ACC4C50ED2A9A253F2E7279586FEC0
31,688,301 UART: [art] SIG.S = C0E5BA7C7E9E2005E39A6A0B9F89F5FB2739B60EC1EC8A2035F01FD07D03865368BCEA01471150059DA8AB87D07FE5C5
32,993,629 UART: Caliptra RT
32,994,363 UART: [state] CFI Enabled
33,155,166 UART: [rt] RT listening for mailbox commands...
33,157,076 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,187,179 UART: [rt]cmd =0x44504543, len=40
33,237,131 >>> mbox cmd response data (40 bytes)
33,238,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,269,060 UART: [rt]cmd =0x44504543, len=96
33,350,289 >>> mbox cmd response data (56 bytes)
33,351,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,381,486 UART: [rt]cmd =0x44504543, len=96
33,457,986 >>> mbox cmd response data (56 bytes)
33,458,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,489,135 UART: [rt]cmd =0x44504543, len=96
33,565,218 >>> mbox cmd response data (56 bytes)
33,565,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,596,485 UART: [rt]cmd =0x44504543, len=96
33,672,089 >>> mbox cmd response data (56 bytes)
33,672,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,703,467 UART: [rt]cmd =0x44504543, len=96
33,779,202 >>> mbox cmd response data (56 bytes)
33,779,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,810,494 UART: [rt]cmd =0x44504543, len=96
33,885,261 >>> mbox cmd response data (56 bytes)
33,885,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,916,518 UART: [rt]cmd =0x44504543, len=96
33,992,707 >>> mbox cmd response data (56 bytes)
33,993,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,023,915 UART: [rt]cmd =0x44504543, len=96
34,099,545 >>> mbox cmd response data (56 bytes)
34,100,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,130,516 UART: [rt]cmd =0x44504543, len=96
34,206,079 >>> mbox cmd response data (56 bytes)
34,206,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,237,196 UART: [rt]cmd =0x44504543, len=96
34,313,328 >>> mbox cmd response data (56 bytes)
34,314,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,344,583 UART: [rt]cmd =0x44504543, len=96
34,420,000 >>> mbox cmd response data (56 bytes)
34,420,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,451,347 UART: [rt]cmd =0x44504543, len=96
34,527,096 >>> mbox cmd response data (56 bytes)
34,527,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,558,197 UART: [rt]cmd =0x44504543, len=96
34,633,848 >>> mbox cmd response data (56 bytes)
34,634,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,665,202 UART: [rt]cmd =0x44504543, len=96
34,740,930 >>> mbox cmd response data (56 bytes)
34,741,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,772,075 UART: [rt]cmd =0x44504543, len=96
34,847,906 >>> mbox cmd response data (56 bytes)
34,848,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,879,280 UART: [rt]cmd =0x44504543, len=96
34,885,408 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,448 UART:
192,806 UART: Running Caliptra ROM ...
193,997 UART:
603,772 UART: [state] CFI Enabled
615,582 UART: [state] LifecycleState = Unprovisioned
617,518 UART: [state] DebugLocked = No
619,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,253 UART: [kat] SHA2-256
794,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,501 UART: [kat] ++
805,978 UART: [kat] sha1
817,706 UART: [kat] SHA2-256
820,434 UART: [kat] SHA2-384
825,857 UART: [kat] SHA2-512-ACC
828,221 UART: [kat] ECC-384
3,114,058 UART: [kat] HMAC-384Kdf
3,125,711 UART: [kat] LMS
4,315,780 UART: [kat] --
4,319,432 UART: [cold-reset] ++
4,321,289 UART: [fht] Storing FHT @ 0x50003400
4,332,902 UART: [idev] ++
4,333,462 UART: [idev] CDI.KEYID = 6
4,334,530 UART: [idev] SUBJECT.KEYID = 7
4,335,636 UART: [idev] UDS.KEYID = 0
4,336,701 ready_for_fw is high
4,336,934 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,167 UART: [idev] Erasing UDS.KEYID = 0
7,622,600 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,928 UART: [idev] --
7,648,095 UART: [ldev] ++
7,648,675 UART: [ldev] CDI.KEYID = 6
7,649,804 UART: [ldev] SUBJECT.KEYID = 5
7,650,910 UART: [ldev] AUTHORITY.KEYID = 7
7,652,140 UART: [ldev] FE.KEYID = 1
7,662,745 UART: [ldev] Erasing FE.KEYID = 1
10,950,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,952 UART: [ldev] --
13,311,849 UART: [fwproc] Waiting for Commands...
13,314,370 UART: [fwproc] Received command 0x46574c44
13,316,543 UART: [fwproc] Received Image of size 114036 bytes
17,366,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,655 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,562 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,827,096 >>> mbox cmd response: success
17,831,384 UART: [afmc] ++
17,831,979 UART: [afmc] CDI.KEYID = 6
17,832,867 UART: [afmc] SUBJECT.KEYID = 7
17,834,137 UART: [afmc] AUTHORITY.KEYID = 5
21,148,642 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,895 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,202 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,412 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,902 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,110 UART: [afmc] --
23,515,433 UART: [cold-reset] --
23,518,803 UART: [state] Locking Datavault
23,525,673 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,436 UART: [state] Locking ICCM
23,529,149 UART: [exit] Launching FMC @ 0x40000130
23,537,547 UART:
23,537,782 UART: Running Caliptra FMC ...
23,538,883 UART:
23,539,041 UART: [state] CFI Enabled
23,547,036 UART: [fht] FMC Alias Private Key: 7
25,877,768 UART: [art] Extend RT PCRs Done
25,879,002 UART: [art] Lock RT PCRs Done
25,880,532 UART: [art] Populate DV Done
25,886,074 UART: [fht] FMC Alias Private Key: 7
25,887,692 UART: [art] Derive CDI
25,888,509 UART: [art] Store in in slot 0x4
25,931,433 UART: [art] Derive Key Pair
25,932,435 UART: [art] Store priv key in slot 0x5
29,174,489 UART: [art] Derive Key Pair - Done
29,187,392 UART: [art] Signing Cert with AUTHO
29,188,703 UART: RITY.KEYID = 7
31,467,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,364 UART: [art] PUB.X = A91C22CFF69785DD214F342498EC35CBE55650D3F8A41ABD032CCF36A5F59E56B8C01EF8C3F94FCF245ED019BE75CA50
31,476,596 UART: [art] PUB.Y = 45088E2049EB1C578C937E7B9BCC1AC2B29E529281969E141EF1EEC0C9BB4F27992A31EBD481DA3AF4DFA69C3861C3B9
31,483,892 UART: [art] SIG.R = 2B34D8BD8D81646833F71B802C04AB02C5C6D36BB63ECB51A4C763F9DD456D978796A8AA42A252116B8090677B3D8612
31,491,266 UART: [art] SIG.S = E301C00770B15276305242E9C8E5F1F80CCD5D535A750ECED7B3A4EA9792E07046508ED970CFE821DE6140462B0F9F56
32,796,397 UART: Caliptra RT
32,797,112 UART: [state] CFI Enabled
32,915,856 UART: [rt] RT listening for mailbox commands...
32,917,796 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,947,914 UART: [rt]cmd =0x44504543, len=40
32,982,082 >>> mbox cmd response data (40 bytes)
32,983,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,014,255 UART: [rt]cmd =0x44504543, len=96
33,063,111 >>> mbox cmd response data (56 bytes)
33,063,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,094,438 UART: [rt]cmd =0x44504543, len=96
33,143,345 >>> mbox cmd response data (56 bytes)
33,144,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,174,637 UART: [rt]cmd =0x44504543, len=96
33,223,484 >>> mbox cmd response data (56 bytes)
33,224,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,254,924 UART: [rt]cmd =0x44504543, len=96
33,304,207 >>> mbox cmd response data (56 bytes)
33,304,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,335,659 UART: [rt]cmd =0x44504543, len=96
33,384,846 >>> mbox cmd response data (56 bytes)
33,385,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,416,124 UART: [rt]cmd =0x44504543, len=96
33,465,885 >>> mbox cmd response data (56 bytes)
33,466,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,497,012 UART: [rt]cmd =0x44504543, len=96
33,546,995 >>> mbox cmd response data (56 bytes)
33,547,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,578,065 UART: [rt]cmd =0x44504543, len=96
33,629,181 >>> mbox cmd response data (56 bytes)
33,629,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,660,315 UART: [rt]cmd =0x44504543, len=96
33,710,514 >>> mbox cmd response data (56 bytes)
33,711,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,741,910 UART: [rt]cmd =0x44504543, len=96
33,792,426 >>> mbox cmd response data (56 bytes)
33,793,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,823,679 UART: [rt]cmd =0x44504543, len=96
33,874,685 >>> mbox cmd response data (56 bytes)
33,875,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,905,918 UART: [rt]cmd =0x44504543, len=96
33,958,322 >>> mbox cmd response data (56 bytes)
33,959,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,989,564 UART: [rt]cmd =0x44504543, len=96
34,041,648 >>> mbox cmd response data (56 bytes)
34,042,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,072,913 UART: [rt]cmd =0x44504543, len=96
34,125,195 >>> mbox cmd response data (56 bytes)
34,125,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,156,284 UART: [rt]cmd =0x44504543, len=96
34,208,716 >>> mbox cmd response data (56 bytes)
34,209,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,239,975 UART: [rt]cmd =0x44504543, len=96
34,246,762 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,131,389 ready_for_fw is high
4,132,004 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,226 >>> mbox cmd response: success
23,717,567 UART:
23,717,995 UART: Running Caliptra FMC ...
23,719,142 UART:
23,719,306 UART: [state] CFI Enabled
23,727,137 UART: [fht] FMC Alias Private Key: 7
26,058,223 UART: [art] Extend RT PCRs Done
26,059,451 UART: [art] Lock RT PCRs Done
26,061,236 UART: [art] Populate DV Done
26,066,390 UART: [fht] FMC Alias Private Key: 7
26,068,043 UART: [art] Derive CDI
26,068,788 UART: [art] Store in in slot 0x4
26,111,876 UART: [art] Derive Key Pair
26,112,918 UART: [art] Store priv key in slot 0x5
29,355,282 UART: [art] Derive Key Pair - Done
29,368,282 UART: [art] Signing Cert with AUTHO
29,369,578 UART: RITY.KEYID = 7
31,649,334 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,854 UART: [art] PUB.X = B4043D521A59923E4FC332A031F370215ACF41AABF335C985754D3713849333528145DA295BC8A8EE94DCA34E7163344
31,658,083 UART: [art] PUB.Y = 338F5922AE21B7BE90B0DD1715070AA55CC7A81145CB91B4D6AFCC5A5BDDB7F6B173F4821D81336EAB85485DD518A81B
31,665,331 UART: [art] SIG.R = D5CCDBDD28DE8B8E92DDCE6B5EA2AE76EC9DF408D6E49A22687A534AD83B08CEF662BE3013E0449B68E7F914D04A1676
31,672,743 UART: [art] SIG.S = 1FEFC4FADB7DA87003CCA92D6E46A850A6CA0C1426EA62DAA44F48D98B111C18EE0AD28F715A41E12B5355DB07C87850
32,977,529 UART: Caliptra RT
32,978,235 UART: [state] CFI Enabled
33,095,485 UART: [rt] RT listening for mailbox commands...
33,097,417 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,127,564 UART: [rt]cmd =0x44504543, len=40
33,161,219 >>> mbox cmd response data (40 bytes)
33,162,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,193,259 UART: [rt]cmd =0x44504543, len=96
33,240,803 >>> mbox cmd response data (56 bytes)
33,241,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,272,144 UART: [rt]cmd =0x44504543, len=96
33,321,299 >>> mbox cmd response data (56 bytes)
33,322,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,352,640 UART: [rt]cmd =0x44504543, len=96
33,401,495 >>> mbox cmd response data (56 bytes)
33,402,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,432,870 UART: [rt]cmd =0x44504543, len=96
33,481,589 >>> mbox cmd response data (56 bytes)
33,482,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,512,731 UART: [rt]cmd =0x44504543, len=96
33,561,289 >>> mbox cmd response data (56 bytes)
33,562,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,592,591 UART: [rt]cmd =0x44504543, len=96
33,641,740 >>> mbox cmd response data (56 bytes)
33,642,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,673,157 UART: [rt]cmd =0x44504543, len=96
33,722,849 >>> mbox cmd response data (56 bytes)
33,723,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,754,343 UART: [rt]cmd =0x44504543, len=96
33,805,538 >>> mbox cmd response data (56 bytes)
33,806,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,836,513 UART: [rt]cmd =0x44504543, len=96
33,887,007 >>> mbox cmd response data (56 bytes)
33,887,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,918,478 UART: [rt]cmd =0x44504543, len=96
33,968,703 >>> mbox cmd response data (56 bytes)
33,969,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,000,216 UART: [rt]cmd =0x44504543, len=96
34,051,253 >>> mbox cmd response data (56 bytes)
34,051,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,082,450 UART: [rt]cmd =0x44504543, len=96
34,134,944 >>> mbox cmd response data (56 bytes)
34,135,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,166,026 UART: [rt]cmd =0x44504543, len=96
34,218,053 >>> mbox cmd response data (56 bytes)
34,218,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,249,360 UART: [rt]cmd =0x44504543, len=96
34,302,252 >>> mbox cmd response data (56 bytes)
34,302,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,333,438 UART: [rt]cmd =0x44504543, len=96
34,385,600 >>> mbox cmd response data (56 bytes)
34,386,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,416,742 UART: [rt]cmd =0x44504543, len=96
34,423,194 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,630 UART:
193,003 UART: Running Caliptra ROM ...
194,205 UART:
194,357 UART: [state] CFI Enabled
262,321 UART: [state] LifecycleState = Unprovisioned
264,233 UART: [state] DebugLocked = No
266,831 UART: [state] WD Timer not started. Device not locked for debugging
270,455 UART: [kat] SHA2-256
449,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,198 UART: [kat] ++
461,735 UART: [kat] sha1
473,392 UART: [kat] SHA2-256
476,391 UART: [kat] SHA2-384
482,099 UART: [kat] SHA2-512-ACC
485,107 UART: [kat] ECC-384
2,950,403 UART: [kat] HMAC-384Kdf
2,971,449 UART: [kat] LMS
3,500,905 UART: [kat] --
3,506,389 UART: [cold-reset] ++
3,507,900 UART: [fht] FHT @ 0x50003400
3,517,955 UART: [idev] ++
3,518,528 UART: [idev] CDI.KEYID = 6
3,519,452 UART: [idev] SUBJECT.KEYID = 7
3,520,713 UART: [idev] UDS.KEYID = 0
3,521,639 ready_for_fw is high
3,521,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,666 UART: [idev] Erasing UDS.KEYID = 0
6,030,136 UART: [idev] Sha1 KeyId Algorithm
6,054,109 UART: [idev] --
6,058,676 UART: [ldev] ++
6,059,258 UART: [ldev] CDI.KEYID = 6
6,060,174 UART: [ldev] SUBJECT.KEYID = 5
6,061,386 UART: [ldev] AUTHORITY.KEYID = 7
6,062,616 UART: [ldev] FE.KEYID = 1
6,102,000 UART: [ldev] Erasing FE.KEYID = 1
8,606,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,430 UART: [ldev] --
10,415,151 UART: [fwproc] Wait for Commands...
10,417,901 UART: [fwproc] Recv command 0x46574c44
10,419,994 UART: [fwproc] Recv'd Img size: 114360 bytes
13,828,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,290,422 >>> mbox cmd response: success
14,294,994 UART: [afmc] ++
14,295,588 UART: [afmc] CDI.KEYID = 6
14,296,515 UART: [afmc] SUBJECT.KEYID = 7
14,297,671 UART: [afmc] AUTHORITY.KEYID = 5
16,826,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,686 UART: [afmc] --
18,631,150 UART: [cold-reset] --
18,636,794 UART: [state] Locking Datavault
18,640,863 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,509 UART: [state] Locking ICCM
18,643,848 UART: [exit] Launching FMC @ 0x40000130
18,652,243 UART:
18,652,476 UART: Running Caliptra FMC ...
18,653,582 UART:
18,653,744 UART: [state] CFI Enabled
18,710,549 UART: [fht] FMC Alias Private Key: 7
20,474,172 UART: [art] Extend RT PCRs Done
20,475,371 UART: [art] Lock RT PCRs Done
20,477,011 UART: [art] Populate DV Done
20,482,420 UART: [fht] FMC Alias Private Key: 7
20,483,962 UART: [art] Derive CDI
20,484,722 UART: [art] Store in in slot 0x4
20,543,376 UART: [art] Derive Key Pair
20,544,406 UART: [art] Store priv key in slot 0x5
23,007,148 UART: [art] Derive Key Pair - Done
23,020,215 UART: [art] Signing Cert with AUTHO
23,021,540 UART: RITY.KEYID = 7
24,732,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,094 UART: [art] PUB.X = 33F0166544CC78579DCF7EE60D429F1EA08D3388816135EA98CD4223F1B3DCD07F0DBFCCA204E1114AC9BE15EBC83338
24,741,364 UART: [art] PUB.Y = 8F91CCE87EAF52211DD8080189D0EE0FC06BA31173340611907D57A6977ACB5F7308A9BBF8F396612F5DF5802ABC4E3E
24,748,621 UART: [art] SIG.R = 4538FCB52DCDBF0E2758C1495A72CA407E51FF2DEDC637C69CEC5F090EDF435801D4F237AB616E7E2B80C8729A8CC0C7
24,756,041 UART: [art] SIG.S = 4366EC1BA3E058D668FD42B667AED0024C74A6EE350955DEAA580FDC994FBB0FC5CCFF005AE7AD854BB7CAA7634E9368
25,735,461 UART: Caliptra RT
25,736,169 UART: [state] CFI Enabled
25,901,104 UART: [rt] RT listening for mailbox commands...
25,903,043 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,932,918 UART: [rt]cmd =0x44504543, len=40
25,982,970 >>> mbox cmd response data (40 bytes)
25,984,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,941 UART: [rt]cmd =0x44504543, len=96
26,096,020 >>> mbox cmd response data (56 bytes)
26,096,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,127,225 UART: [rt]cmd =0x44504543, len=96
26,203,195 >>> mbox cmd response data (56 bytes)
26,203,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,234,231 UART: [rt]cmd =0x44504543, len=96
26,309,972 >>> mbox cmd response data (56 bytes)
26,310,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,175 UART: [rt]cmd =0x44504543, len=96
26,416,072 >>> mbox cmd response data (56 bytes)
26,416,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,447,278 UART: [rt]cmd =0x44504543, len=96
26,523,512 >>> mbox cmd response data (56 bytes)
26,524,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,554,742 UART: [rt]cmd =0x44504543, len=96
26,629,778 >>> mbox cmd response data (56 bytes)
26,630,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,660,923 UART: [rt]cmd =0x44504543, len=96
26,736,960 >>> mbox cmd response data (56 bytes)
26,737,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,768,383 UART: [rt]cmd =0x44504543, len=96
26,843,906 >>> mbox cmd response data (56 bytes)
26,844,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,875,076 UART: [rt]cmd =0x44504543, len=96
26,950,708 >>> mbox cmd response data (56 bytes)
26,951,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,981,819 UART: [rt]cmd =0x44504543, len=96
27,057,903 >>> mbox cmd response data (56 bytes)
27,058,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,089,162 UART: [rt]cmd =0x44504543, len=96
27,164,535 >>> mbox cmd response data (56 bytes)
27,165,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,195,985 UART: [rt]cmd =0x44504543, len=96
27,271,563 >>> mbox cmd response data (56 bytes)
27,272,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,302,914 UART: [rt]cmd =0x44504543, len=96
27,378,459 >>> mbox cmd response data (56 bytes)
27,379,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,409,698 UART: [rt]cmd =0x44504543, len=96
27,485,228 >>> mbox cmd response data (56 bytes)
27,485,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,516,947 UART: [rt]cmd =0x44504543, len=96
27,592,861 >>> mbox cmd response data (56 bytes)
27,593,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,623,946 UART: [rt]cmd =0x44504543, len=96
27,630,776 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,438 UART:
192,836 UART: Running Caliptra ROM ...
193,973 UART:
194,130 UART: [state] CFI Enabled
262,715 UART: [state] LifecycleState = Unprovisioned
265,052 UART: [state] DebugLocked = No
266,452 UART: [state] WD Timer not started. Device not locked for debugging
271,695 UART: [kat] SHA2-256
461,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,352 UART: [kat] ++
472,894 UART: [kat] sha1
483,564 UART: [kat] SHA2-256
486,578 UART: [kat] SHA2-384
492,565 UART: [kat] SHA2-512-ACC
495,150 UART: [kat] ECC-384
2,946,944 UART: [kat] HMAC-384Kdf
2,970,408 UART: [kat] LMS
3,502,155 UART: [kat] --
3,505,818 UART: [cold-reset] ++
3,507,974 UART: [fht] FHT @ 0x50003400
3,518,527 UART: [idev] ++
3,519,234 UART: [idev] CDI.KEYID = 6
3,520,216 UART: [idev] SUBJECT.KEYID = 7
3,521,392 UART: [idev] UDS.KEYID = 0
3,522,316 ready_for_fw is high
3,522,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,346 UART: [idev] Erasing UDS.KEYID = 0
6,032,125 UART: [idev] Sha1 KeyId Algorithm
6,053,941 UART: [idev] --
6,060,066 UART: [ldev] ++
6,060,757 UART: [ldev] CDI.KEYID = 6
6,061,673 UART: [ldev] SUBJECT.KEYID = 5
6,062,832 UART: [ldev] AUTHORITY.KEYID = 7
6,064,087 UART: [ldev] FE.KEYID = 1
6,101,425 UART: [ldev] Erasing FE.KEYID = 1
8,604,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,184 UART: [ldev] --
10,415,395 UART: [fwproc] Wait for Commands...
10,417,485 UART: [fwproc] Recv command 0x46574c44
10,419,741 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,745 >>> mbox cmd response: success
14,608,608 UART: [afmc] ++
14,609,361 UART: [afmc] CDI.KEYID = 6
14,610,507 UART: [afmc] SUBJECT.KEYID = 7
14,612,003 UART: [afmc] AUTHORITY.KEYID = 5
17,152,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,911 UART: [afmc] --
18,950,520 UART: [cold-reset] --
18,955,744 UART: [state] Locking Datavault
18,961,123 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,271 UART: [state] Locking ICCM
18,965,485 UART: [exit] Launching FMC @ 0x40000130
18,974,169 UART:
18,974,425 UART: Running Caliptra FMC ...
18,975,529 UART:
18,975,688 UART: [state] CFI Enabled
19,032,061 UART: [fht] FMC Alias Private Key: 7
20,796,116 UART: [art] Extend RT PCRs Done
20,797,350 UART: [art] Lock RT PCRs Done
20,798,946 UART: [art] Populate DV Done
20,804,254 UART: [fht] FMC Alias Private Key: 7
20,805,792 UART: [art] Derive CDI
20,806,526 UART: [art] Store in in slot 0x4
20,864,537 UART: [art] Derive Key Pair
20,865,581 UART: [art] Store priv key in slot 0x5
23,328,214 UART: [art] Derive Key Pair - Done
23,341,153 UART: [art] Signing Cert with AUTHO
23,342,458 UART: RITY.KEYID = 7
25,054,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,624 UART: [art] PUB.X = 940F54F49A708CF52C075D66AC08261841E8C14047DB4AFB862D437788C7952FBD15560465ACA77D31689355624A2C0D
25,062,858 UART: [art] PUB.Y = 94254C14A1073B75ACD19F4E1B5B2C3A484439611B4BB965E0A1ED5904EAA41181EF4A590F503E227BF53FD70AC334E1
25,070,129 UART: [art] SIG.R = 4D75F8643E8102402E70B2383A7C9FDAE1DF4767DEB395D65356359942DFFFCC13DD907E24D54C0819E0B48688EE14A0
25,077,503 UART: [art] SIG.S = 91A62C180E22B42917D233780FF7690F6B4ABAB432AB6CA61E9A218E669875D5C9B9B097DFA230FC0825B3D6E2A81F5B
26,055,564 UART: Caliptra RT
26,056,273 UART: [state] CFI Enabled
26,222,015 UART: [rt] RT listening for mailbox commands...
26,223,947 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,253,829 UART: [rt]cmd =0x44504543, len=40
26,303,785 >>> mbox cmd response data (40 bytes)
26,305,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,728 UART: [rt]cmd =0x44504543, len=96
26,416,584 >>> mbox cmd response data (56 bytes)
26,417,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,448,116 UART: [rt]cmd =0x44504543, len=96
26,524,138 >>> mbox cmd response data (56 bytes)
26,524,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,555,343 UART: [rt]cmd =0x44504543, len=96
26,630,857 >>> mbox cmd response data (56 bytes)
26,631,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,662,001 UART: [rt]cmd =0x44504543, len=96
26,737,193 >>> mbox cmd response data (56 bytes)
26,737,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,768,675 UART: [rt]cmd =0x44504543, len=96
26,844,474 >>> mbox cmd response data (56 bytes)
26,845,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,875,772 UART: [rt]cmd =0x44504543, len=96
26,951,353 >>> mbox cmd response data (56 bytes)
26,952,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,982,669 UART: [rt]cmd =0x44504543, len=96
27,057,611 >>> mbox cmd response data (56 bytes)
27,058,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,088,951 UART: [rt]cmd =0x44504543, len=96
27,164,857 >>> mbox cmd response data (56 bytes)
27,165,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,196,037 UART: [rt]cmd =0x44504543, len=96
27,271,202 >>> mbox cmd response data (56 bytes)
27,271,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,302,505 UART: [rt]cmd =0x44504543, len=96
27,378,486 >>> mbox cmd response data (56 bytes)
27,379,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,409,699 UART: [rt]cmd =0x44504543, len=96
27,485,342 >>> mbox cmd response data (56 bytes)
27,486,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,516,750 UART: [rt]cmd =0x44504543, len=96
27,592,376 >>> mbox cmd response data (56 bytes)
27,593,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,623,626 UART: [rt]cmd =0x44504543, len=96
27,699,200 >>> mbox cmd response data (56 bytes)
27,699,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,730,506 UART: [rt]cmd =0x44504543, len=96
27,805,555 >>> mbox cmd response data (56 bytes)
27,806,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,836,855 UART: [rt]cmd =0x44504543, len=96
27,912,750 >>> mbox cmd response data (56 bytes)
27,913,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,943,999 UART: [rt]cmd =0x44504543, len=96
27,950,615 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,440,110 ready_for_fw is high
3,440,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,729,354 >>> mbox cmd response: success
19,026,386 UART:
19,026,789 UART: Running Caliptra FMC ...
19,027,936 UART:
19,028,101 UART: [state] CFI Enabled
19,093,731 UART: [fht] FMC Alias Private Key: 7
20,857,612 UART: [art] Extend RT PCRs Done
20,858,827 UART: [art] Lock RT PCRs Done
20,860,293 UART: [art] Populate DV Done
20,865,873 UART: [fht] FMC Alias Private Key: 7
20,867,586 UART: [art] Derive CDI
20,868,410 UART: [art] Store in in slot 0x4
20,926,652 UART: [art] Derive Key Pair
20,927,696 UART: [art] Store priv key in slot 0x5
23,390,935 UART: [art] Derive Key Pair - Done
23,403,766 UART: [art] Signing Cert with AUTHO
23,405,095 UART: RITY.KEYID = 7
25,116,560 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,071 UART: [art] PUB.X = 99AADA75C25FA7AA2D9A5892D0BBE22495FBBD282B570643D4D42D73BCCA7F12F2A92C347D874163361708E006610B8F
25,125,345 UART: [art] PUB.Y = D11E92F316BD53C1D8A8B5F01285F7D07D62EAC2C9A218792E1F5DE6E1267A62C43D19117B364DB33B031360FA689B7E
25,132,622 UART: [art] SIG.R = 5BAA152D3057EECD1F96173757757A12C46448DC52310A76E6ED7C3F3ECBFBB15A4084257E6240F83683B9012EB888B2
25,140,034 UART: [art] SIG.S = A1ADDEE18A815F0A1B55A79665474991453566AE90A4CFDE8B8398F88C64044B0A83B9016A4F8C104626DE2F765CEDE6
26,118,701 UART: Caliptra RT
26,119,394 UART: [state] CFI Enabled
26,285,424 UART: [rt] RT listening for mailbox commands...
26,287,340 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,317,478 UART: [rt]cmd =0x44504543, len=40
26,367,424 >>> mbox cmd response data (40 bytes)
26,368,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,399,400 UART: [rt]cmd =0x44504543, len=96
26,480,723 >>> mbox cmd response data (56 bytes)
26,481,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,512,093 UART: [rt]cmd =0x44504543, len=96
26,587,682 >>> mbox cmd response data (56 bytes)
26,588,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,618,888 UART: [rt]cmd =0x44504543, len=96
26,693,990 >>> mbox cmd response data (56 bytes)
26,694,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,725,363 UART: [rt]cmd =0x44504543, len=96
26,800,546 >>> mbox cmd response data (56 bytes)
26,801,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,831,696 UART: [rt]cmd =0x44504543, len=96
26,907,707 >>> mbox cmd response data (56 bytes)
26,908,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,939,123 UART: [rt]cmd =0x44504543, len=96
27,014,471 >>> mbox cmd response data (56 bytes)
27,015,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,045,839 UART: [rt]cmd =0x44504543, len=96
27,121,091 >>> mbox cmd response data (56 bytes)
27,121,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,152,456 UART: [rt]cmd =0x44504543, len=96
27,227,923 >>> mbox cmd response data (56 bytes)
27,228,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,259,340 UART: [rt]cmd =0x44504543, len=96
27,334,673 >>> mbox cmd response data (56 bytes)
27,335,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,366,029 UART: [rt]cmd =0x44504543, len=96
27,441,422 >>> mbox cmd response data (56 bytes)
27,442,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,472,785 UART: [rt]cmd =0x44504543, len=96
27,548,819 >>> mbox cmd response data (56 bytes)
27,549,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,580,186 UART: [rt]cmd =0x44504543, len=96
27,655,398 >>> mbox cmd response data (56 bytes)
27,656,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,686,658 UART: [rt]cmd =0x44504543, len=96
27,762,479 >>> mbox cmd response data (56 bytes)
27,763,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,793,520 UART: [rt]cmd =0x44504543, len=96
27,869,447 >>> mbox cmd response data (56 bytes)
27,870,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,900,848 UART: [rt]cmd =0x44504543, len=96
27,976,554 >>> mbox cmd response data (56 bytes)
27,977,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,007,585 UART: [rt]cmd =0x44504543, len=96
28,014,203 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,442 UART:
192,806 UART: Running Caliptra ROM ...
193,892 UART:
603,533 UART: [state] CFI Enabled
617,849 UART: [state] LifecycleState = Unprovisioned
620,252 UART: [state] DebugLocked = No
622,268 UART: [state] WD Timer not started. Device not locked for debugging
626,158 UART: [kat] SHA2-256
816,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,857 UART: [kat] ++
827,330 UART: [kat] sha1
838,062 UART: [kat] SHA2-256
841,072 UART: [kat] SHA2-384
847,774 UART: [kat] SHA2-512-ACC
850,378 UART: [kat] ECC-384
3,293,210 UART: [kat] HMAC-384Kdf
3,306,646 UART: [kat] LMS
3,838,493 UART: [kat] --
3,844,471 UART: [cold-reset] ++
3,847,039 UART: [fht] FHT @ 0x50003400
3,859,646 UART: [idev] ++
3,860,348 UART: [idev] CDI.KEYID = 6
3,861,228 UART: [idev] SUBJECT.KEYID = 7
3,862,466 UART: [idev] UDS.KEYID = 0
3,863,388 ready_for_fw is high
3,863,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,179 UART: [idev] Erasing UDS.KEYID = 0
6,338,354 UART: [idev] Sha1 KeyId Algorithm
6,361,419 UART: [idev] --
6,365,518 UART: [ldev] ++
6,366,212 UART: [ldev] CDI.KEYID = 6
6,367,121 UART: [ldev] SUBJECT.KEYID = 5
6,368,280 UART: [ldev] AUTHORITY.KEYID = 7
6,369,509 UART: [ldev] FE.KEYID = 1
6,379,924 UART: [ldev] Erasing FE.KEYID = 1
8,855,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,492 UART: [ldev] --
10,649,670 UART: [fwproc] Wait for Commands...
10,652,729 UART: [fwproc] Recv command 0x46574c44
10,655,035 UART: [fwproc] Recv'd Img size: 114360 bytes
14,103,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,831,721 >>> mbox cmd response: success
14,835,300 UART: [afmc] ++
14,836,004 UART: [afmc] CDI.KEYID = 6
14,837,118 UART: [afmc] SUBJECT.KEYID = 7
14,838,650 UART: [afmc] AUTHORITY.KEYID = 5
17,343,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,713 UART: [afmc] --
19,139,962 UART: [cold-reset] --
19,144,089 UART: [state] Locking Datavault
19,150,899 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,041 UART: [state] Locking ICCM
19,155,463 UART: [exit] Launching FMC @ 0x40000130
19,164,123 UART:
19,164,355 UART: Running Caliptra FMC ...
19,165,456 UART:
19,165,613 UART: [state] CFI Enabled
19,173,874 UART: [fht] FMC Alias Private Key: 7
20,930,681 UART: [art] Extend RT PCRs Done
20,931,898 UART: [art] Lock RT PCRs Done
20,933,503 UART: [art] Populate DV Done
20,939,026 UART: [fht] FMC Alias Private Key: 7
20,940,706 UART: [art] Derive CDI
20,941,445 UART: [art] Store in in slot 0x4
20,983,873 UART: [art] Derive Key Pair
20,984,866 UART: [art] Store priv key in slot 0x5
23,411,537 UART: [art] Derive Key Pair - Done
23,424,597 UART: [art] Signing Cert with AUTHO
23,425,927 UART: RITY.KEYID = 7
25,131,073 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,577 UART: [art] PUB.X = 2099B7F2F8E1C1C5E31244D592653508243BD7BBF064AED5424F946A66639A4489645A885DA331BC3946DED5150D2730
25,139,824 UART: [art] PUB.Y = E5ADA71A647C0ADC102DF80DF464F700A5EE4DB35A0F94662864FE282A766681A7393054B3D61BDF97422BF545B9C5A3
25,147,048 UART: [art] SIG.R = 93E93C7AF3C906CA0001B35F0B222F8A8FDD4E22BF492FECA74EC0D0C3506883181785A6402489116885A9A9904C430F
25,154,394 UART: [art] SIG.S = DCB760F42DA52C716D398FF20F1C44DC1FCB4E014A143CCA9469CA1ED9E9AA72E9D48B104C6E31BC7E6F737329C7B0AF
26,133,942 UART: Caliptra RT
26,134,626 UART: [state] CFI Enabled
26,252,495 UART: [rt] RT listening for mailbox commands...
26,254,402 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,284,280 UART: [rt]cmd =0x44504543, len=40
26,317,815 >>> mbox cmd response data (40 bytes)
26,318,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,349,542 UART: [rt]cmd =0x44504543, len=96
26,397,839 >>> mbox cmd response data (56 bytes)
26,398,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,429,151 UART: [rt]cmd =0x44504543, len=96
26,477,535 >>> mbox cmd response data (56 bytes)
26,478,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,508,845 UART: [rt]cmd =0x44504543, len=96
26,557,771 >>> mbox cmd response data (56 bytes)
26,558,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,588,963 UART: [rt]cmd =0x44504543, len=96
26,637,783 >>> mbox cmd response data (56 bytes)
26,638,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,669,025 UART: [rt]cmd =0x44504543, len=96
26,718,340 >>> mbox cmd response data (56 bytes)
26,719,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,749,730 UART: [rt]cmd =0x44504543, len=96
26,799,603 >>> mbox cmd response data (56 bytes)
26,800,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,830,770 UART: [rt]cmd =0x44504543, len=96
26,880,484 >>> mbox cmd response data (56 bytes)
26,881,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,911,849 UART: [rt]cmd =0x44504543, len=96
26,962,163 >>> mbox cmd response data (56 bytes)
26,962,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,993,354 UART: [rt]cmd =0x44504543, len=96
27,043,564 >>> mbox cmd response data (56 bytes)
27,044,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,075,018 UART: [rt]cmd =0x44504543, len=96
27,125,645 >>> mbox cmd response data (56 bytes)
27,126,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,157,205 UART: [rt]cmd =0x44504543, len=96
27,207,986 >>> mbox cmd response data (56 bytes)
27,208,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,239,422 UART: [rt]cmd =0x44504543, len=96
27,291,344 >>> mbox cmd response data (56 bytes)
27,292,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,322,663 UART: [rt]cmd =0x44504543, len=96
27,374,343 >>> mbox cmd response data (56 bytes)
27,375,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,405,326 UART: [rt]cmd =0x44504543, len=96
27,457,753 >>> mbox cmd response data (56 bytes)
27,458,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,489,012 UART: [rt]cmd =0x44504543, len=96
27,541,241 >>> mbox cmd response data (56 bytes)
27,541,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,572,536 UART: [rt]cmd =0x44504543, len=96
27,579,272 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,757,090 ready_for_fw is high
3,757,691 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,972,178 >>> mbox cmd response: success
19,225,221 UART:
19,225,621 UART: Running Caliptra FMC ...
19,226,919 UART:
19,227,087 UART: [state] CFI Enabled
19,234,712 UART: [fht] FMC Alias Private Key: 7
20,991,746 UART: [art] Extend RT PCRs Done
20,992,970 UART: [art] Lock RT PCRs Done
20,994,700 UART: [art] Populate DV Done
21,000,160 UART: [fht] FMC Alias Private Key: 7
21,001,704 UART: [art] Derive CDI
21,002,526 UART: [art] Store in in slot 0x4
21,045,180 UART: [art] Derive Key Pair
21,046,183 UART: [art] Store priv key in slot 0x5
23,473,599 UART: [art] Derive Key Pair - Done
23,486,430 UART: [art] Signing Cert with AUTHO
23,487,734 UART: RITY.KEYID = 7
25,193,308 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,831 UART: [art] PUB.X = D05A165A833EA7240B0225DABCB1A9545A79DCCF6AEDBC6619A676DC25A01900E7B1474945CFCC7DCB2B9E434CC5058C
25,202,102 UART: [art] PUB.Y = 4AC89E387AF1C0C2ACFBDDECB13B13859782BD4052C2718424C124A16FF80400306A5DFF30B3264CCB6DACE4D20042F3
25,209,313 UART: [art] SIG.R = FE10154CFE66E143FF27CABFDFBEC8A1F9DA768E3F4A2B958A498621378437B1C63C2E4803731D9A84FD78809FE00E14
25,216,710 UART: [art] SIG.S = EB157E47A97E084E4983E71AB4623918DFA92F3DFB705D3E467480DBC002D908E876AFF0549996BBAA578111F8C38525
26,195,879 UART: Caliptra RT
26,196,571 UART: [state] CFI Enabled
26,314,653 UART: [rt] RT listening for mailbox commands...
26,316,574 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,346,660 UART: [rt]cmd =0x44504543, len=40
26,380,229 >>> mbox cmd response data (40 bytes)
26,381,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,411,954 UART: [rt]cmd =0x44504543, len=96
26,459,920 >>> mbox cmd response data (56 bytes)
26,460,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,491,370 UART: [rt]cmd =0x44504543, len=96
26,539,976 >>> mbox cmd response data (56 bytes)
26,540,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,571,366 UART: [rt]cmd =0x44504543, len=96
26,620,266 >>> mbox cmd response data (56 bytes)
26,621,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,651,671 UART: [rt]cmd =0x44504543, len=96
26,699,645 >>> mbox cmd response data (56 bytes)
26,700,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,730,745 UART: [rt]cmd =0x44504543, len=96
26,780,049 >>> mbox cmd response data (56 bytes)
26,780,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,811,360 UART: [rt]cmd =0x44504543, len=96
26,860,941 >>> mbox cmd response data (56 bytes)
26,861,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,892,037 UART: [rt]cmd =0x44504543, len=96
26,940,700 >>> mbox cmd response data (56 bytes)
26,941,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,812 UART: [rt]cmd =0x44504543, len=96
27,022,525 >>> mbox cmd response data (56 bytes)
27,023,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,053,683 UART: [rt]cmd =0x44504543, len=96
27,104,402 >>> mbox cmd response data (56 bytes)
27,105,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,135,763 UART: [rt]cmd =0x44504543, len=96
27,186,644 >>> mbox cmd response data (56 bytes)
27,187,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,217,733 UART: [rt]cmd =0x44504543, len=96
27,268,933 >>> mbox cmd response data (56 bytes)
27,269,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,300,397 UART: [rt]cmd =0x44504543, len=96
27,352,134 >>> mbox cmd response data (56 bytes)
27,352,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,383,332 UART: [rt]cmd =0x44504543, len=96
27,435,142 >>> mbox cmd response data (56 bytes)
27,435,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,466,614 UART: [rt]cmd =0x44504543, len=96
27,518,438 >>> mbox cmd response data (56 bytes)
27,519,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,549,841 UART: [rt]cmd =0x44504543, len=96
27,601,605 >>> mbox cmd response data (56 bytes)
27,602,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,632,782 UART: [rt]cmd =0x44504543, len=96
27,639,106 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,833 UART: [kat] SHA2-256
881,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,879 UART: [kat] ++
886,031 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
894,830 UART: [kat] SHA2-512-ACC
896,731 UART: [kat] ECC-384
902,336 UART: [kat] HMAC-384Kdf
906,826 UART: [kat] LMS
1,475,022 UART: [kat] --
1,475,773 UART: [cold-reset] ++
1,476,325 UART: [fht] Storing FHT @ 0x50003400
1,479,200 UART: [idev] ++
1,479,368 UART: [idev] CDI.KEYID = 6
1,479,728 UART: [idev] SUBJECT.KEYID = 7
1,480,152 UART: [idev] UDS.KEYID = 0
1,480,497 ready_for_fw is high
1,480,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,330 UART: [idev] Erasing UDS.KEYID = 0
1,504,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,050 UART: [idev] --
1,514,133 UART: [ldev] ++
1,514,301 UART: [ldev] CDI.KEYID = 6
1,514,664 UART: [ldev] SUBJECT.KEYID = 5
1,515,090 UART: [ldev] AUTHORITY.KEYID = 7
1,515,553 UART: [ldev] FE.KEYID = 1
1,520,709 UART: [ldev] Erasing FE.KEYID = 1
1,545,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,222 UART: [ldev] --
1,584,701 UART: [fwproc] Waiting for Commands...
1,585,374 UART: [fwproc] Received command 0x46574c44
1,586,165 UART: [fwproc] Received Image of size 114360 bytes
2,883,956 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,025 >>> mbox cmd response: success
3,078,101 UART: [afmc] ++
3,078,269 UART: [afmc] CDI.KEYID = 6
3,078,631 UART: [afmc] SUBJECT.KEYID = 7
3,079,056 UART: [afmc] AUTHORITY.KEYID = 5
3,114,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,317 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,930 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,620 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,535 UART: [afmc] --
3,157,613 UART: [cold-reset] --
3,158,379 UART: [state] Locking Datavault
3,159,708 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,312 UART: [state] Locking ICCM
3,160,934 UART: [exit] Launching FMC @ 0x40000130
3,166,263 UART:
3,166,279 UART: Running Caliptra FMC ...
3,166,687 UART:
3,166,741 UART: [state] CFI Enabled
3,177,192 UART: [fht] FMC Alias Private Key: 7
3,284,859 UART: [art] Extend RT PCRs Done
3,285,287 UART: [art] Lock RT PCRs Done
3,286,923 UART: [art] Populate DV Done
3,295,188 UART: [fht] FMC Alias Private Key: 7
3,296,220 UART: [art] Derive CDI
3,296,500 UART: [art] Store in in slot 0x4
3,382,381 UART: [art] Derive Key Pair
3,382,741 UART: [art] Store priv key in slot 0x5
3,395,549 UART: [art] Derive Key Pair - Done
3,410,604 UART: [art] Signing Cert with AUTHO
3,411,084 UART: RITY.KEYID = 7
3,426,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,065 UART: [art] PUB.X = 2A536C7AFB1C2FF07792D7DAB74E8BCF6490D2868AB328B8DB6BD88D174BCCFCE037E083B626765D83BDFC72E6A8AC0D
3,433,856 UART: [art] PUB.Y = 3250AB8D0433411BB640A6125CC886C57C5B0B88197EF1DCAEA119B046104E1024866A1919B299D64056611ED909C30D
3,440,788 UART: [art] SIG.R = 3912CD5E68EFBB391714A27B10C4254B4577ED885FD57A5416E879A4616920D98E6AED45376181C353E6EF6CC290163A
3,447,556 UART: [art] SIG.S = 96B5C349C5A599E865089652D679D73920A67931DD4F3153633C35D19C352ED2D515E6646068D34EA6AEBC1138151ED1
3,471,076 UART: Caliptra RT
3,471,330 UART: [state] CFI Enabled
3,579,480 UART: [rt] RT listening for mailbox commands...
3,580,150 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,835 UART: [rt]cmd =0x44504543, len=40
3,643,774 >>> mbox cmd response data (40 bytes)
3,643,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,744 UART: [rt]cmd =0x44504543, len=96
3,721,897 >>> mbox cmd response data (56 bytes)
3,721,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,963 UART: [rt]cmd =0x44504543, len=96
3,800,155 >>> mbox cmd response data (56 bytes)
3,800,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,113 UART: [rt]cmd =0x44504543, len=96
3,879,005 >>> mbox cmd response data (56 bytes)
3,879,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,879 UART: [rt]cmd =0x44504543, len=96
3,957,899 >>> mbox cmd response data (56 bytes)
3,957,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,987,871 UART: [rt]cmd =0x44504543, len=96
4,036,975 >>> mbox cmd response data (56 bytes)
4,036,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,801 UART: [rt]cmd =0x44504543, len=96
4,116,113 >>> mbox cmd response data (56 bytes)
4,116,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,245 UART: [rt]cmd =0x44504543, len=96
4,196,127 >>> mbox cmd response data (56 bytes)
4,196,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,041 UART: [rt]cmd =0x44504543, len=96
4,275,769 >>> mbox cmd response data (56 bytes)
4,275,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,305,667 UART: [rt]cmd =0x44504543, len=96
4,356,457 >>> mbox cmd response data (56 bytes)
4,356,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,386,477 UART: [rt]cmd =0x44504543, len=96
4,437,431 >>> mbox cmd response data (56 bytes)
4,437,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,467,677 UART: [rt]cmd =0x44504543, len=96
4,518,791 >>> mbox cmd response data (56 bytes)
4,518,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,548,725 UART: [rt]cmd =0x44504543, len=96
4,600,161 >>> mbox cmd response data (56 bytes)
4,600,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,630,151 UART: [rt]cmd =0x44504543, len=96
4,681,565 >>> mbox cmd response data (56 bytes)
4,681,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,711,731 UART: [rt]cmd =0x44504543, len=96
4,763,443 >>> mbox cmd response data (56 bytes)
4,763,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,793,385 UART: [rt]cmd =0x44504543, len=96
4,845,223 >>> mbox cmd response data (56 bytes)
4,845,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,874,941 UART: [rt]cmd =0x44504543, len=96
4,882,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,793 ready_for_fw is high
1,361,793 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,965 >>> mbox cmd response: success
2,986,797 UART:
2,986,813 UART: Running Caliptra FMC ...
2,987,221 UART:
2,987,275 UART: [state] CFI Enabled
2,997,552 UART: [fht] FMC Alias Private Key: 7
3,105,727 UART: [art] Extend RT PCRs Done
3,106,155 UART: [art] Lock RT PCRs Done
3,107,849 UART: [art] Populate DV Done
3,116,248 UART: [fht] FMC Alias Private Key: 7
3,117,188 UART: [art] Derive CDI
3,117,468 UART: [art] Store in in slot 0x4
3,203,407 UART: [art] Derive Key Pair
3,203,767 UART: [art] Store priv key in slot 0x5
3,217,239 UART: [art] Derive Key Pair - Done
3,231,813 UART: [art] Signing Cert with AUTHO
3,232,293 UART: RITY.KEYID = 7
3,247,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,334 UART: [art] PUB.X = 5FA751A60188FB8232F383F518D2E7B612F9A6AFC097264A37A219496CF4553763EB895275BB33A18597D06A8BA379E6
3,255,097 UART: [art] PUB.Y = 3162F3F7B77DB9BB031290A8088686D969AD759E2ECD28B321356C9B7957EC712B65B69CBC960C05352B52814B22C8F6
3,262,033 UART: [art] SIG.R = CA994573F031109654F609810BA578B8ECF5604DB4D9CC37829CB1585C62C3BAF672653A4240E9CE5B1FEA6A3B920CB7
3,268,800 UART: [art] SIG.S = 0933D1ADE21E97EDBB0F8AD72DA9081ADEBC2DAA71629761D7E08417883C7359D19146EB5706EDB9D240C99ED1ACBA74
3,292,473 UART: Caliptra RT
3,292,727 UART: [state] CFI Enabled
3,400,753 UART: [rt] RT listening for mailbox commands...
3,401,423 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,382 UART: [rt]cmd =0x44504543, len=40
3,465,477 >>> mbox cmd response data (40 bytes)
3,465,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,475 UART: [rt]cmd =0x44504543, len=96
3,544,166 >>> mbox cmd response data (56 bytes)
3,544,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,134 UART: [rt]cmd =0x44504543, len=96
3,622,958 >>> mbox cmd response data (56 bytes)
3,622,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,988 UART: [rt]cmd =0x44504543, len=96
3,702,070 >>> mbox cmd response data (56 bytes)
3,702,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,208 UART: [rt]cmd =0x44504543, len=96
3,782,054 >>> mbox cmd response data (56 bytes)
3,782,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,066 UART: [rt]cmd =0x44504543, len=96
3,861,016 >>> mbox cmd response data (56 bytes)
3,861,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,848 UART: [rt]cmd =0x44504543, len=96
3,940,208 >>> mbox cmd response data (56 bytes)
3,940,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,300 UART: [rt]cmd =0x44504543, len=96
4,019,942 >>> mbox cmd response data (56 bytes)
4,019,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,004 UART: [rt]cmd =0x44504543, len=96
4,099,432 >>> mbox cmd response data (56 bytes)
4,099,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,129,402 UART: [rt]cmd =0x44504543, len=96
4,180,252 >>> mbox cmd response data (56 bytes)
4,180,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,210,210 UART: [rt]cmd =0x44504543, len=96
4,261,554 >>> mbox cmd response data (56 bytes)
4,261,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,291,454 UART: [rt]cmd =0x44504543, len=96
4,341,390 >>> mbox cmd response data (56 bytes)
4,341,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,432 UART: [rt]cmd =0x44504543, len=96
4,423,056 >>> mbox cmd response data (56 bytes)
4,423,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,453,084 UART: [rt]cmd =0x44504543, len=96
4,504,476 >>> mbox cmd response data (56 bytes)
4,504,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,534,572 UART: [rt]cmd =0x44504543, len=96
4,586,290 >>> mbox cmd response data (56 bytes)
4,586,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,616,200 UART: [rt]cmd =0x44504543, len=96
4,668,874 >>> mbox cmd response data (56 bytes)
4,668,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,698,728 UART: [rt]cmd =0x44504543, len=96
4,706,056 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,222 UART: [kat] SHA2-256
882,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,268 UART: [kat] ++
886,420 UART: [kat] sha1
890,724 UART: [kat] SHA2-256
892,662 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,493 UART: [kat] LMS
1,475,689 UART: [kat] --
1,476,516 UART: [cold-reset] ++
1,476,846 UART: [fht] Storing FHT @ 0x50003400
1,479,689 UART: [idev] ++
1,479,857 UART: [idev] CDI.KEYID = 6
1,480,217 UART: [idev] SUBJECT.KEYID = 7
1,480,641 UART: [idev] UDS.KEYID = 0
1,480,986 ready_for_fw is high
1,480,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,427 UART: [idev] Erasing UDS.KEYID = 0
1,505,229 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,973 UART: [idev] --
1,514,884 UART: [ldev] ++
1,515,052 UART: [ldev] CDI.KEYID = 6
1,515,415 UART: [ldev] SUBJECT.KEYID = 5
1,515,841 UART: [ldev] AUTHORITY.KEYID = 7
1,516,304 UART: [ldev] FE.KEYID = 1
1,521,730 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,153 UART: [ldev] --
1,586,576 UART: [fwproc] Waiting for Commands...
1,587,231 UART: [fwproc] Received command 0x46574c44
1,588,022 UART: [fwproc] Received Image of size 114360 bytes
2,886,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,524 >>> mbox cmd response: success
3,080,636 UART: [afmc] ++
3,080,804 UART: [afmc] CDI.KEYID = 6
3,081,166 UART: [afmc] SUBJECT.KEYID = 7
3,081,591 UART: [afmc] AUTHORITY.KEYID = 5
3,116,130 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,993 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,683 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,568 UART: [afmc] --
3,159,592 UART: [cold-reset] --
3,160,422 UART: [state] Locking Datavault
3,161,761 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,365 UART: [state] Locking ICCM
3,162,863 UART: [exit] Launching FMC @ 0x40000130
3,168,192 UART:
3,168,208 UART: Running Caliptra FMC ...
3,168,616 UART:
3,168,759 UART: [state] CFI Enabled
3,179,234 UART: [fht] FMC Alias Private Key: 7
3,287,103 UART: [art] Extend RT PCRs Done
3,287,531 UART: [art] Lock RT PCRs Done
3,288,627 UART: [art] Populate DV Done
3,297,048 UART: [fht] FMC Alias Private Key: 7
3,298,128 UART: [art] Derive CDI
3,298,408 UART: [art] Store in in slot 0x4
3,384,277 UART: [art] Derive Key Pair
3,384,637 UART: [art] Store priv key in slot 0x5
3,398,381 UART: [art] Derive Key Pair - Done
3,413,048 UART: [art] Signing Cert with AUTHO
3,413,528 UART: RITY.KEYID = 7
3,428,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,615 UART: [art] PUB.X = 8ABE289F9B5A9F276E4E11891DF78FA4A3A3498816B56A2D5105C23CE9D7AF07CD5DA15C194F17980FC56D5C8250840B
3,436,381 UART: [art] PUB.Y = 623EBEF032E71F8CEA8B96954A41CA6C5BEFCA42B715FD3C1BCF8051D25CAB990CDAF94CA0DDAA6D9E8BE90C87CAED1D
3,443,363 UART: [art] SIG.R = 57ABF0B93B846689FD59F4878FF4DA209CF93F404DE4075F28B748F1F1D8B85F8AB355E61D6F22A6E5A7F156AF78A04D
3,450,142 UART: [art] SIG.S = BCAE3D4EBFF5E029FF6F497C852A6ECAD5B1DCED0118912923FBB9DE84D9FB64D092FB6CA3F1F9B5CD3704798CE069BD
3,474,177 UART: Caliptra RT
3,474,523 UART: [state] CFI Enabled
3,581,741 UART: [rt] RT listening for mailbox commands...
3,582,411 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,956 UART: [rt]cmd =0x44504543, len=40
3,646,051 >>> mbox cmd response data (40 bytes)
3,646,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,835 UART: [rt]cmd =0x44504543, len=96
3,724,056 >>> mbox cmd response data (56 bytes)
3,724,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,902 UART: [rt]cmd =0x44504543, len=96
3,802,376 >>> mbox cmd response data (56 bytes)
3,802,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,240 UART: [rt]cmd =0x44504543, len=96
3,881,354 >>> mbox cmd response data (56 bytes)
3,881,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,284 UART: [rt]cmd =0x44504543, len=96
3,959,960 >>> mbox cmd response data (56 bytes)
3,959,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,982 UART: [rt]cmd =0x44504543, len=96
4,039,406 >>> mbox cmd response data (56 bytes)
4,039,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,294 UART: [rt]cmd =0x44504543, len=96
4,118,984 >>> mbox cmd response data (56 bytes)
4,118,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,220 UART: [rt]cmd =0x44504543, len=96
4,198,964 >>> mbox cmd response data (56 bytes)
4,198,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,228,914 UART: [rt]cmd =0x44504543, len=96
4,278,722 >>> mbox cmd response data (56 bytes)
4,278,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,308,604 UART: [rt]cmd =0x44504543, len=96
4,359,224 >>> mbox cmd response data (56 bytes)
4,359,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,389,018 UART: [rt]cmd =0x44504543, len=96
4,439,450 >>> mbox cmd response data (56 bytes)
4,439,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,469,256 UART: [rt]cmd =0x44504543, len=96
4,519,078 >>> mbox cmd response data (56 bytes)
4,519,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,549,100 UART: [rt]cmd =0x44504543, len=96
4,600,334 >>> mbox cmd response data (56 bytes)
4,600,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,630,128 UART: [rt]cmd =0x44504543, len=96
4,681,906 >>> mbox cmd response data (56 bytes)
4,681,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,711,912 UART: [rt]cmd =0x44504543, len=96
4,764,256 >>> mbox cmd response data (56 bytes)
4,764,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,794,422 UART: [rt]cmd =0x44504543, len=96
4,847,110 >>> mbox cmd response data (56 bytes)
4,847,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,877,250 UART: [rt]cmd =0x44504543, len=96
4,884,260 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,698 ready_for_fw is high
1,362,698 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,968 >>> mbox cmd response: success
2,991,234 UART:
2,991,250 UART: Running Caliptra FMC ...
2,991,658 UART:
2,991,801 UART: [state] CFI Enabled
3,002,372 UART: [fht] FMC Alias Private Key: 7
3,110,275 UART: [art] Extend RT PCRs Done
3,110,703 UART: [art] Lock RT PCRs Done
3,112,251 UART: [art] Populate DV Done
3,120,648 UART: [fht] FMC Alias Private Key: 7
3,121,782 UART: [art] Derive CDI
3,122,062 UART: [art] Store in in slot 0x4
3,207,829 UART: [art] Derive Key Pair
3,208,189 UART: [art] Store priv key in slot 0x5
3,221,767 UART: [art] Derive Key Pair - Done
3,236,680 UART: [art] Signing Cert with AUTHO
3,237,160 UART: RITY.KEYID = 7
3,252,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,105 UART: [art] PUB.X = B27F3D51E851D203EB81F4EF63A6D568E6C91EB1D7EA5FFAF3C7F1A8D2249A68A7A1A7733EFEFEEDAA1A53619914F0CD
3,259,898 UART: [art] PUB.Y = F65CA3F7BD3CE15DFDF71C0E337CA833E08643864D3A3DD675BF08FBFF776C72EA96638CDC587337FF0505D3DCC57014
3,266,852 UART: [art] SIG.R = 72047EB9BF0B8208B8E2DB5753FEA73F9294F1EEDF0DF146B97A600ED5639D8A0AA1C037DC125BE7AF1CAD6EBD1BB5BE
3,273,632 UART: [art] SIG.S = F244C0A804392AAE5C113AB4DA8251AE15D4270129B001347433594020F690E90CB37276EFC76DB60C3A92A98BB40CE4
3,297,263 UART: Caliptra RT
3,297,609 UART: [state] CFI Enabled
3,404,773 UART: [rt] RT listening for mailbox commands...
3,405,443 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,260 UART: [rt]cmd =0x44504543, len=40
3,469,293 >>> mbox cmd response data (40 bytes)
3,469,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,331 UART: [rt]cmd =0x44504543, len=96
3,546,506 >>> mbox cmd response data (56 bytes)
3,546,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,434 UART: [rt]cmd =0x44504543, len=96
3,624,486 >>> mbox cmd response data (56 bytes)
3,624,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,492 UART: [rt]cmd =0x44504543, len=96
3,703,192 >>> mbox cmd response data (56 bytes)
3,703,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,118 UART: [rt]cmd =0x44504543, len=96
3,782,112 >>> mbox cmd response data (56 bytes)
3,782,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,232 UART: [rt]cmd =0x44504543, len=96
3,861,346 >>> mbox cmd response data (56 bytes)
3,861,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,162 UART: [rt]cmd =0x44504543, len=96
3,940,710 >>> mbox cmd response data (56 bytes)
3,940,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,622 UART: [rt]cmd =0x44504543, len=96
4,020,260 >>> mbox cmd response data (56 bytes)
4,020,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,096 UART: [rt]cmd =0x44504543, len=96
4,100,384 >>> mbox cmd response data (56 bytes)
4,100,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,222 UART: [rt]cmd =0x44504543, len=96
4,180,750 >>> mbox cmd response data (56 bytes)
4,180,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,210,834 UART: [rt]cmd =0x44504543, len=96
4,262,004 >>> mbox cmd response data (56 bytes)
4,262,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,292,010 UART: [rt]cmd =0x44504543, len=96
4,343,254 >>> mbox cmd response data (56 bytes)
4,343,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,373,076 UART: [rt]cmd =0x44504543, len=96
4,425,564 >>> mbox cmd response data (56 bytes)
4,425,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,455,724 UART: [rt]cmd =0x44504543, len=96
4,507,524 >>> mbox cmd response data (56 bytes)
4,507,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,537,646 UART: [rt]cmd =0x44504543, len=96
4,589,794 >>> mbox cmd response data (56 bytes)
4,589,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,619,710 UART: [rt]cmd =0x44504543, len=96
4,671,892 >>> mbox cmd response data (56 bytes)
4,671,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,701,858 UART: [rt]cmd =0x44504543, len=96
4,709,238 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
892,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,927 UART: [kat] ++
897,079 UART: [kat] sha1
901,189 UART: [kat] SHA2-256
903,129 UART: [kat] SHA2-384
905,882 UART: [kat] SHA2-512-ACC
907,783 UART: [kat] ECC-384
917,510 UART: [kat] HMAC-384Kdf
921,950 UART: [kat] LMS
1,170,278 UART: [kat] --
1,171,213 UART: [cold-reset] ++
1,171,789 UART: [fht] FHT @ 0x50003400
1,174,278 UART: [idev] ++
1,174,446 UART: [idev] CDI.KEYID = 6
1,174,806 UART: [idev] SUBJECT.KEYID = 7
1,175,230 UART: [idev] UDS.KEYID = 0
1,175,575 ready_for_fw is high
1,175,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,075 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,082 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,756 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,268 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,781 >>> mbox cmd response: success
2,775,945 UART: [afmc] ++
2,776,113 UART: [afmc] CDI.KEYID = 6
2,776,475 UART: [afmc] SUBJECT.KEYID = 7
2,776,900 UART: [afmc] AUTHORITY.KEYID = 5
2,812,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,000 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,604 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,210 UART: [afmc] --
2,856,278 UART: [cold-reset] --
2,857,086 UART: [state] Locking Datavault
2,858,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,877 UART: [state] Locking ICCM
2,859,319 UART: [exit] Launching FMC @ 0x40000130
2,864,648 UART:
2,864,664 UART: Running Caliptra FMC ...
2,865,072 UART:
2,865,126 UART: [state] CFI Enabled
2,875,365 UART: [fht] FMC Alias Private Key: 7
2,983,458 UART: [art] Extend RT PCRs Done
2,983,886 UART: [art] Lock RT PCRs Done
2,985,670 UART: [art] Populate DV Done
2,994,057 UART: [fht] FMC Alias Private Key: 7
2,995,009 UART: [art] Derive CDI
2,995,289 UART: [art] Store in in slot 0x4
3,081,000 UART: [art] Derive Key Pair
3,081,360 UART: [art] Store priv key in slot 0x5
3,095,410 UART: [art] Derive Key Pair - Done
3,110,375 UART: [art] Signing Cert with AUTHO
3,110,855 UART: RITY.KEYID = 7
3,125,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,296 UART: [art] PUB.X = 520A24FEC09A3EBF08927226BFECEF89EB5E445748E1D8D2535AEA47A71CD67C0AB27EF6550DFA62BB584049E282A04C
3,133,070 UART: [art] PUB.Y = 6946600F078160B393E94ACF04C731EB20781C8700B1A6429F97D4083786CDA02F513073F37C0CFE658B3E714A5E4944
3,139,975 UART: [art] SIG.R = AE7BB80D6F08DA4A0219D704C02B0BA680F0059425CE9C72B604E2FF49F03781966393859C21C74ACBF64920E9FB8B8A
3,146,730 UART: [art] SIG.S = D965E6C4BCCBE065A28D5E094C70A618FCAE7540A9DFE679346018B1C972D4B810BC4AB6FC0DD9F7A09D6236C0D1783F
3,170,715 UART: Caliptra RT
3,170,969 UART: [state] CFI Enabled
3,277,562 UART: [rt] RT listening for mailbox commands...
3,278,232 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,797 UART: [rt]cmd =0x44504543, len=40
3,341,760 >>> mbox cmd response data (40 bytes)
3,341,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,874 UART: [rt]cmd =0x44504543, len=96
3,420,557 >>> mbox cmd response data (56 bytes)
3,420,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,589 UART: [rt]cmd =0x44504543, len=96
3,499,199 >>> mbox cmd response data (56 bytes)
3,499,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,321 UART: [rt]cmd =0x44504543, len=96
3,577,819 >>> mbox cmd response data (56 bytes)
3,577,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,783 UART: [rt]cmd =0x44504543, len=96
3,656,743 >>> mbox cmd response data (56 bytes)
3,656,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,877 UART: [rt]cmd =0x44504543, len=96
3,735,817 >>> mbox cmd response data (56 bytes)
3,735,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,559 UART: [rt]cmd =0x44504543, len=96
3,814,841 >>> mbox cmd response data (56 bytes)
3,814,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,837 UART: [rt]cmd =0x44504543, len=96
3,894,873 >>> mbox cmd response data (56 bytes)
3,894,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,745 UART: [rt]cmd =0x44504543, len=96
3,974,787 >>> mbox cmd response data (56 bytes)
3,974,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,557 UART: [rt]cmd =0x44504543, len=96
4,054,519 >>> mbox cmd response data (56 bytes)
4,054,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,429 UART: [rt]cmd =0x44504543, len=96
4,135,369 >>> mbox cmd response data (56 bytes)
4,135,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,297 UART: [rt]cmd =0x44504543, len=96
4,216,001 >>> mbox cmd response data (56 bytes)
4,216,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,246,103 UART: [rt]cmd =0x44504543, len=96
4,297,573 >>> mbox cmd response data (56 bytes)
4,297,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,327,331 UART: [rt]cmd =0x44504543, len=96
4,378,747 >>> mbox cmd response data (56 bytes)
4,378,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,408,703 UART: [rt]cmd =0x44504543, len=96
4,460,041 >>> mbox cmd response data (56 bytes)
4,460,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,489,937 UART: [rt]cmd =0x44504543, len=96
4,542,357 >>> mbox cmd response data (56 bytes)
4,542,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,572,147 UART: [rt]cmd =0x44504543, len=96
4,579,383 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,975 ready_for_fw is high
1,060,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,089 >>> mbox cmd response: success
2,688,453 UART:
2,688,469 UART: Running Caliptra FMC ...
2,688,877 UART:
2,688,931 UART: [state] CFI Enabled
2,699,600 UART: [fht] FMC Alias Private Key: 7
2,807,193 UART: [art] Extend RT PCRs Done
2,807,621 UART: [art] Lock RT PCRs Done
2,809,235 UART: [art] Populate DV Done
2,817,162 UART: [fht] FMC Alias Private Key: 7
2,818,332 UART: [art] Derive CDI
2,818,612 UART: [art] Store in in slot 0x4
2,904,647 UART: [art] Derive Key Pair
2,905,007 UART: [art] Store priv key in slot 0x5
2,918,625 UART: [art] Derive Key Pair - Done
2,933,466 UART: [art] Signing Cert with AUTHO
2,933,946 UART: RITY.KEYID = 7
2,949,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,241 UART: [art] PUB.X = 8556713DD5F81BB9CEB8B37BF131FE2F7E1E24E887AEF5325043B7B805626C1DAE98B80CDB81B5A0BE08421193329AFF
2,957,014 UART: [art] PUB.Y = B8DDA61C9822956CEF0F207E01DE96B9352909AC20C100A474C9157AF210D229571AFAF2981FF51C00F95215AC665A3E
2,963,915 UART: [art] SIG.R = 1BEFE26129E3C8CC2BE51BB87A3295243CA074C822624FC2A63138E0B085B1AAB13B653394F092DC9690069CA00EF6BB
2,970,687 UART: [art] SIG.S = 2C84FC1BD06D15329FC4BF445157418DD0AF93737EE0A786BC31BE2455889AFFE768D3C3282DF93910A84853B3FB5C3B
2,995,074 UART: Caliptra RT
2,995,328 UART: [state] CFI Enabled
3,103,108 UART: [rt] RT listening for mailbox commands...
3,103,778 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,489 UART: [rt]cmd =0x44504543, len=40
3,167,430 >>> mbox cmd response data (40 bytes)
3,167,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,332 UART: [rt]cmd =0x44504543, len=96
3,246,017 >>> mbox cmd response data (56 bytes)
3,246,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,929 UART: [rt]cmd =0x44504543, len=96
3,324,047 >>> mbox cmd response data (56 bytes)
3,324,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,353,881 UART: [rt]cmd =0x44504543, len=96
3,402,519 >>> mbox cmd response data (56 bytes)
3,402,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,355 UART: [rt]cmd =0x44504543, len=96
3,481,435 >>> mbox cmd response data (56 bytes)
3,481,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,353 UART: [rt]cmd =0x44504543, len=96
3,561,065 >>> mbox cmd response data (56 bytes)
3,561,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,131 UART: [rt]cmd =0x44504543, len=96
3,640,817 >>> mbox cmd response data (56 bytes)
3,640,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,621 UART: [rt]cmd =0x44504543, len=96
3,720,441 >>> mbox cmd response data (56 bytes)
3,720,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,449 UART: [rt]cmd =0x44504543, len=96
3,800,937 >>> mbox cmd response data (56 bytes)
3,800,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,863 UART: [rt]cmd =0x44504543, len=96
3,880,657 >>> mbox cmd response data (56 bytes)
3,880,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,513 UART: [rt]cmd =0x44504543, len=96
3,961,185 >>> mbox cmd response data (56 bytes)
3,961,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,067 UART: [rt]cmd =0x44504543, len=96
4,042,121 >>> mbox cmd response data (56 bytes)
4,042,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,177 UART: [rt]cmd =0x44504543, len=96
4,123,091 >>> mbox cmd response data (56 bytes)
4,123,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,129 UART: [rt]cmd =0x44504543, len=96
4,205,063 >>> mbox cmd response data (56 bytes)
4,205,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,234,935 UART: [rt]cmd =0x44504543, len=96
4,286,483 >>> mbox cmd response data (56 bytes)
4,286,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,316,681 UART: [rt]cmd =0x44504543, len=96
4,369,037 >>> mbox cmd response data (56 bytes)
4,369,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,398,943 UART: [rt]cmd =0x44504543, len=96
4,406,137 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,231 UART: [kat] SHA2-512-ACC
909,132 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,467 UART: [kat] LMS
1,171,795 UART: [kat] --
1,172,788 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,919 UART: [idev] ++
1,176,087 UART: [idev] CDI.KEYID = 6
1,176,447 UART: [idev] SUBJECT.KEYID = 7
1,176,871 UART: [idev] UDS.KEYID = 0
1,177,216 ready_for_fw is high
1,177,216 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,621 UART: [idev] Erasing UDS.KEYID = 0
1,201,686 UART: [idev] Sha1 KeyId Algorithm
1,210,046 UART: [idev] --
1,211,100 UART: [ldev] ++
1,211,268 UART: [ldev] CDI.KEYID = 6
1,211,631 UART: [ldev] SUBJECT.KEYID = 5
1,212,057 UART: [ldev] AUTHORITY.KEYID = 7
1,212,520 UART: [ldev] FE.KEYID = 1
1,217,748 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,310 UART: [ldev] --
1,283,571 UART: [fwproc] Wait for Commands...
1,284,247 UART: [fwproc] Recv command 0x46574c44
1,284,975 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,593 >>> mbox cmd response: success
2,775,635 UART: [afmc] ++
2,775,803 UART: [afmc] CDI.KEYID = 6
2,776,165 UART: [afmc] SUBJECT.KEYID = 7
2,776,590 UART: [afmc] AUTHORITY.KEYID = 5
2,812,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,424 UART: [afmc] --
2,855,330 UART: [cold-reset] --
2,856,250 UART: [state] Locking Datavault
2,857,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,905 UART: [state] Locking ICCM
2,858,421 UART: [exit] Launching FMC @ 0x40000130
2,863,750 UART:
2,863,766 UART: Running Caliptra FMC ...
2,864,174 UART:
2,864,317 UART: [state] CFI Enabled
2,875,120 UART: [fht] FMC Alias Private Key: 7
2,983,893 UART: [art] Extend RT PCRs Done
2,984,321 UART: [art] Lock RT PCRs Done
2,986,037 UART: [art] Populate DV Done
2,994,284 UART: [fht] FMC Alias Private Key: 7
2,995,466 UART: [art] Derive CDI
2,995,746 UART: [art] Store in in slot 0x4
3,081,075 UART: [art] Derive Key Pair
3,081,435 UART: [art] Store priv key in slot 0x5
3,094,007 UART: [art] Derive Key Pair - Done
3,108,855 UART: [art] Signing Cert with AUTHO
3,109,335 UART: RITY.KEYID = 7
3,124,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,306 UART: [art] PUB.X = B4EEFD7B1238EFBF918706C4D133049477402009BA59BD425658F5186762809795B8540DF671F320D5A1E6426625F1F4
3,132,054 UART: [art] PUB.Y = 6B519D334AB68AE61757D2F4804DB0774D1E3E79BACB1EAB52B055366D5BEC418EC171E8F0B87F5117E27D74252936FF
3,139,012 UART: [art] SIG.R = B772474AE5506965417ED7B9DCD98D187BFBD492342F1BB80AA534C49AD39BA669544B4B1671C6DCFFC8331CB6FC3A98
3,145,791 UART: [art] SIG.S = FAE534C90C895AA55320DA1197F4F27B3F5562C5F95BFF09CD34760317CE3400C42AA9EE5159DE68DE94B3453CA4B085
3,169,595 UART: Caliptra RT
3,169,941 UART: [state] CFI Enabled
3,277,634 UART: [rt] RT listening for mailbox commands...
3,278,304 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,889 UART: [rt]cmd =0x44504543, len=40
3,342,174 >>> mbox cmd response data (40 bytes)
3,342,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,138 UART: [rt]cmd =0x44504543, len=96
3,420,569 >>> mbox cmd response data (56 bytes)
3,420,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,697 UART: [rt]cmd =0x44504543, len=96
3,499,353 >>> mbox cmd response data (56 bytes)
3,499,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,315 UART: [rt]cmd =0x44504543, len=96
3,578,289 >>> mbox cmd response data (56 bytes)
3,578,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,539 UART: [rt]cmd =0x44504543, len=96
3,657,673 >>> mbox cmd response data (56 bytes)
3,657,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,761 UART: [rt]cmd =0x44504543, len=96
3,736,881 >>> mbox cmd response data (56 bytes)
3,736,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,771 UART: [rt]cmd =0x44504543, len=96
3,816,943 >>> mbox cmd response data (56 bytes)
3,816,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,029 UART: [rt]cmd =0x44504543, len=96
3,896,317 >>> mbox cmd response data (56 bytes)
3,896,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,926,139 UART: [rt]cmd =0x44504543, len=96
3,976,479 >>> mbox cmd response data (56 bytes)
3,976,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,379 UART: [rt]cmd =0x44504543, len=96
4,056,745 >>> mbox cmd response data (56 bytes)
4,056,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,857 UART: [rt]cmd =0x44504543, len=96
4,138,013 >>> mbox cmd response data (56 bytes)
4,138,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,113 UART: [rt]cmd =0x44504543, len=96
4,219,641 >>> mbox cmd response data (56 bytes)
4,219,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,249,529 UART: [rt]cmd =0x44504543, len=96
4,301,121 >>> mbox cmd response data (56 bytes)
4,301,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,330,903 UART: [rt]cmd =0x44504543, len=96
4,383,109 >>> mbox cmd response data (56 bytes)
4,383,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,413,035 UART: [rt]cmd =0x44504543, len=96
4,465,331 >>> mbox cmd response data (56 bytes)
4,465,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,495,329 UART: [rt]cmd =0x44504543, len=96
4,547,427 >>> mbox cmd response data (56 bytes)
4,547,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,577,525 UART: [rt]cmd =0x44504543, len=96
4,584,895 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,354 ready_for_fw is high
1,060,354 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,222 >>> mbox cmd response: success
2,689,026 UART:
2,689,042 UART: Running Caliptra FMC ...
2,689,450 UART:
2,689,593 UART: [state] CFI Enabled
2,700,102 UART: [fht] FMC Alias Private Key: 7
2,809,445 UART: [art] Extend RT PCRs Done
2,809,873 UART: [art] Lock RT PCRs Done
2,811,491 UART: [art] Populate DV Done
2,819,676 UART: [fht] FMC Alias Private Key: 7
2,820,604 UART: [art] Derive CDI
2,820,884 UART: [art] Store in in slot 0x4
2,906,841 UART: [art] Derive Key Pair
2,907,201 UART: [art] Store priv key in slot 0x5
2,920,317 UART: [art] Derive Key Pair - Done
2,935,290 UART: [art] Signing Cert with AUTHO
2,935,770 UART: RITY.KEYID = 7
2,951,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,781 UART: [art] PUB.X = 1A96653A27903EE2AE01E06B53988987399AE29F86A99C7D45C284AC4C19834939D2438141CD7D2BB84FDFB5AABF766A
2,958,552 UART: [art] PUB.Y = 81E3240EB0BA64B22FCEFF3551A523F3FEEE5A816796C67A46A274FDD1D57F4D4E4A1706F9C140DBE1D9C2C165F26D34
2,965,512 UART: [art] SIG.R = D180DE21E8CFE39ED4539E6B3A48E3719843F05D94C3188C1D1F947BEE1DDD8D2B4B9C927ABAA44B12CD0012AF9B655B
2,972,278 UART: [art] SIG.S = A1E8610AA935FB8A608C36BBE2C481693F8185DE1633B1EA7EEE653D8EF17BC30E0C3B1E408694074E4E2647FD83D271
2,995,789 UART: Caliptra RT
2,996,135 UART: [state] CFI Enabled
3,104,422 UART: [rt] RT listening for mailbox commands...
3,105,092 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,925 UART: [rt]cmd =0x44504543, len=40
3,169,622 >>> mbox cmd response data (40 bytes)
3,169,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,620 UART: [rt]cmd =0x44504543, len=96
3,248,797 >>> mbox cmd response data (56 bytes)
3,248,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,873 UART: [rt]cmd =0x44504543, len=96
3,326,661 >>> mbox cmd response data (56 bytes)
3,326,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,763 UART: [rt]cmd =0x44504543, len=96
3,405,141 >>> mbox cmd response data (56 bytes)
3,405,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,057 UART: [rt]cmd =0x44504543, len=96
3,483,765 >>> mbox cmd response data (56 bytes)
3,483,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,019 UART: [rt]cmd =0x44504543, len=96
3,562,923 >>> mbox cmd response data (56 bytes)
3,562,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,873 UART: [rt]cmd =0x44504543, len=96
3,643,167 >>> mbox cmd response data (56 bytes)
3,643,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,945 UART: [rt]cmd =0x44504543, len=96
3,722,955 >>> mbox cmd response data (56 bytes)
3,722,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,081 UART: [rt]cmd =0x44504543, len=96
3,804,047 >>> mbox cmd response data (56 bytes)
3,804,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,007 UART: [rt]cmd =0x44504543, len=96
3,885,235 >>> mbox cmd response data (56 bytes)
3,885,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,097 UART: [rt]cmd =0x44504543, len=96
3,965,397 >>> mbox cmd response data (56 bytes)
3,965,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,449 UART: [rt]cmd =0x44504543, len=96
4,046,479 >>> mbox cmd response data (56 bytes)
4,046,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,655 UART: [rt]cmd =0x44504543, len=96
4,127,787 >>> mbox cmd response data (56 bytes)
4,127,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,157,879 UART: [rt]cmd =0x44504543, len=96
4,209,963 >>> mbox cmd response data (56 bytes)
4,209,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,239,721 UART: [rt]cmd =0x44504543, len=96
4,291,597 >>> mbox cmd response data (56 bytes)
4,291,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,321,467 UART: [rt]cmd =0x44504543, len=96
4,373,617 >>> mbox cmd response data (56 bytes)
4,373,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,403,411 UART: [rt]cmd =0x44504543, len=96
4,410,533 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,174,345 ready_for_fw is high
1,174,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,560 UART: [ldev] ++
1,208,728 UART: [ldev] CDI.KEYID = 6
1,209,092 UART: [ldev] SUBJECT.KEYID = 5
1,209,519 UART: [ldev] AUTHORITY.KEYID = 7
1,209,982 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,282,179 UART: [fwproc] Recv command 0x46574c44
1,282,912 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,590 >>> mbox cmd response: success
2,774,723 UART: [afmc] ++
2,774,891 UART: [afmc] CDI.KEYID = 6
2,775,254 UART: [afmc] SUBJECT.KEYID = 7
2,775,680 UART: [afmc] AUTHORITY.KEYID = 5
2,811,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,066 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,785 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,576 UART: [afmc] --
2,854,456 UART: [cold-reset] --
2,855,420 UART: [state] Locking Datavault
2,856,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,353 UART: [state] Locking ICCM
2,857,963 UART: [exit] Launching FMC @ 0x40000130
2,863,292 UART:
2,863,308 UART: Running Caliptra FMC ...
2,863,716 UART:
2,863,770 UART: [state] CFI Enabled
2,874,559 UART: [fht] FMC Alias Private Key: 7
2,981,936 UART: [art] Extend RT PCRs Done
2,982,364 UART: [art] Lock RT PCRs Done
2,983,860 UART: [art] Populate DV Done
2,991,931 UART: [fht] FMC Alias Private Key: 7
2,993,001 UART: [art] Derive CDI
2,993,281 UART: [art] Store in in slot 0x4
3,079,474 UART: [art] Derive Key Pair
3,079,834 UART: [art] Store priv key in slot 0x5
3,093,016 UART: [art] Derive Key Pair - Done
3,107,661 UART: [art] Signing Cert with AUTHO
3,108,141 UART: RITY.KEYID = 7
3,123,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,012 UART: [art] PUB.X = FF39F666710E73DA7701DFC7E8EBEF2A57C26E605C1A1D551410ED9DDD7712621D8F0788FA04E8BDC879280ED05B4DE5
3,130,781 UART: [art] PUB.Y = DC2DBEB1279FC8C360915CDE47205CB9FA1ABDFD34D0254E000FC40A95050E4A749D6A16F4619872FFC6AD0C6B822CC2
3,137,712 UART: [art] SIG.R = CFCE376BFEEE911CDD08145779140B45DDDF0B95DA16485F0CCA9E72E1C09A4C660054A21995EF307D87F9E570186CAA
3,144,462 UART: [art] SIG.S = B67622512219E62CEF999A720836603A128A6AEDF0F618D4743089CE2BE13576DD22D42A4130046459426266D2C24D3F
3,168,259 UART: Caliptra RT
3,168,513 UART: [state] CFI Enabled
3,276,996 UART: [rt] RT listening for mailbox commands...
3,277,666 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,197 UART: [rt]cmd =0x44504543, len=40
3,340,864 >>> mbox cmd response data (40 bytes)
3,340,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,966 UART: [rt]cmd =0x44504543, len=96
3,418,653 >>> mbox cmd response data (56 bytes)
3,418,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,575 UART: [rt]cmd =0x44504543, len=96
3,497,207 >>> mbox cmd response data (56 bytes)
3,497,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,217 UART: [rt]cmd =0x44504543, len=96
3,576,559 >>> mbox cmd response data (56 bytes)
3,576,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,575 UART: [rt]cmd =0x44504543, len=96
3,655,599 >>> mbox cmd response data (56 bytes)
3,655,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,437 UART: [rt]cmd =0x44504543, len=96
3,734,399 >>> mbox cmd response data (56 bytes)
3,734,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,261 UART: [rt]cmd =0x44504543, len=96
3,814,245 >>> mbox cmd response data (56 bytes)
3,814,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,855 UART: [rt]cmd =0x44504543, len=96
3,893,739 >>> mbox cmd response data (56 bytes)
3,893,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,625 UART: [rt]cmd =0x44504543, len=96
3,974,149 >>> mbox cmd response data (56 bytes)
3,974,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,091 UART: [rt]cmd =0x44504543, len=96
4,054,147 >>> mbox cmd response data (56 bytes)
4,054,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,269 UART: [rt]cmd =0x44504543, len=96
4,135,431 >>> mbox cmd response data (56 bytes)
4,135,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,575 UART: [rt]cmd =0x44504543, len=96
4,216,445 >>> mbox cmd response data (56 bytes)
4,216,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,246,355 UART: [rt]cmd =0x44504543, len=96
4,297,493 >>> mbox cmd response data (56 bytes)
4,297,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,327,565 UART: [rt]cmd =0x44504543, len=96
4,379,117 >>> mbox cmd response data (56 bytes)
4,379,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,409,123 UART: [rt]cmd =0x44504543, len=96
4,460,845 >>> mbox cmd response data (56 bytes)
4,460,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,490,939 UART: [rt]cmd =0x44504543, len=96
4,543,197 >>> mbox cmd response data (56 bytes)
4,543,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,573,189 UART: [rt]cmd =0x44504543, len=96
4,579,993 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 ready_for_fw is high
1,055,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,404 >>> mbox cmd response: success
2,685,126 UART:
2,685,142 UART: Running Caliptra FMC ...
2,685,550 UART:
2,685,604 UART: [state] CFI Enabled
2,696,087 UART: [fht] FMC Alias Private Key: 7
2,803,626 UART: [art] Extend RT PCRs Done
2,804,054 UART: [art] Lock RT PCRs Done
2,805,636 UART: [art] Populate DV Done
2,813,953 UART: [fht] FMC Alias Private Key: 7
2,815,025 UART: [art] Derive CDI
2,815,305 UART: [art] Store in in slot 0x4
2,900,948 UART: [art] Derive Key Pair
2,901,308 UART: [art] Store priv key in slot 0x5
2,914,986 UART: [art] Derive Key Pair - Done
2,929,505 UART: [art] Signing Cert with AUTHO
2,929,985 UART: RITY.KEYID = 7
2,945,081 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,846 UART: [art] PUB.X = CE46D4E5B10FBA29AEC74B98D5411505C8338E459F1E3BC8E6DFA74F39A9B06AAA10095BB4E2CCF7968AE273B479CF77
2,952,625 UART: [art] PUB.Y = 2C856A4EA6491E3DEE173EDE0DB1BE765FCF9A221AE53DFD240C46D2E83BBA98B69D94A39FC23307775CFE06C0D02F8A
2,959,585 UART: [art] SIG.R = DA0271B1E11248FE7F7784D1C8A1BC6BB3AD804418B227DFA53C135F80612DD59F312FD424B8EA3BA015C76E88C614A7
2,966,362 UART: [art] SIG.S = 217D6DC841877DEDD5B78FA8FCF2C025A88EA4897B0D38CCF694F2832DF1B197FA2693BE8AA08DF24F43859625D43697
2,989,738 UART: Caliptra RT
2,989,992 UART: [state] CFI Enabled
3,097,700 UART: [rt] RT listening for mailbox commands...
3,098,370 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,003 UART: [rt]cmd =0x44504543, len=40
3,161,830 >>> mbox cmd response data (40 bytes)
3,161,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,870 UART: [rt]cmd =0x44504543, len=96
3,240,483 >>> mbox cmd response data (56 bytes)
3,240,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,270,631 UART: [rt]cmd =0x44504543, len=96
3,319,197 >>> mbox cmd response data (56 bytes)
3,319,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,981 UART: [rt]cmd =0x44504543, len=96
3,398,281 >>> mbox cmd response data (56 bytes)
3,398,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,131 UART: [rt]cmd =0x44504543, len=96
3,476,399 >>> mbox cmd response data (56 bytes)
3,476,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,507 UART: [rt]cmd =0x44504543, len=96
3,555,855 >>> mbox cmd response data (56 bytes)
3,555,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,881 UART: [rt]cmd =0x44504543, len=96
3,635,205 >>> mbox cmd response data (56 bytes)
3,635,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,371 UART: [rt]cmd =0x44504543, len=96
3,715,175 >>> mbox cmd response data (56 bytes)
3,715,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,203 UART: [rt]cmd =0x44504543, len=96
3,795,147 >>> mbox cmd response data (56 bytes)
3,795,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,247 UART: [rt]cmd =0x44504543, len=96
3,875,467 >>> mbox cmd response data (56 bytes)
3,875,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,551 UART: [rt]cmd =0x44504543, len=96
3,956,607 >>> mbox cmd response data (56 bytes)
3,956,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,565 UART: [rt]cmd =0x44504543, len=96
4,037,975 >>> mbox cmd response data (56 bytes)
4,037,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,935 UART: [rt]cmd =0x44504543, len=96
4,118,983 >>> mbox cmd response data (56 bytes)
4,118,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,829 UART: [rt]cmd =0x44504543, len=96
4,200,407 >>> mbox cmd response data (56 bytes)
4,200,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,230,253 UART: [rt]cmd =0x44504543, len=96
4,282,659 >>> mbox cmd response data (56 bytes)
4,282,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,312,377 UART: [rt]cmd =0x44504543, len=96
4,364,267 >>> mbox cmd response data (56 bytes)
4,364,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,394,363 UART: [rt]cmd =0x44504543, len=96
4,401,563 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,871 UART: [kat] SHA2-512-ACC
906,772 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 ready_for_fw is high
1,174,766 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,461 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,739 UART: [ldev] --
1,282,049 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,437 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,253 >>> mbox cmd response: success
2,773,352 UART: [afmc] ++
2,773,520 UART: [afmc] CDI.KEYID = 6
2,773,883 UART: [afmc] SUBJECT.KEYID = 7
2,774,309 UART: [afmc] AUTHORITY.KEYID = 5
2,810,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,209 UART: [afmc] --
2,854,193 UART: [cold-reset] --
2,854,993 UART: [state] Locking Datavault
2,856,188 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,792 UART: [state] Locking ICCM
2,857,346 UART: [exit] Launching FMC @ 0x40000130
2,862,675 UART:
2,862,691 UART: Running Caliptra FMC ...
2,863,099 UART:
2,863,242 UART: [state] CFI Enabled
2,873,909 UART: [fht] FMC Alias Private Key: 7
2,981,634 UART: [art] Extend RT PCRs Done
2,982,062 UART: [art] Lock RT PCRs Done
2,983,728 UART: [art] Populate DV Done
2,991,725 UART: [fht] FMC Alias Private Key: 7
2,992,713 UART: [art] Derive CDI
2,992,993 UART: [art] Store in in slot 0x4
3,078,504 UART: [art] Derive Key Pair
3,078,864 UART: [art] Store priv key in slot 0x5
3,091,802 UART: [art] Derive Key Pair - Done
3,106,681 UART: [art] Signing Cert with AUTHO
3,107,161 UART: RITY.KEYID = 7
3,121,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,740 UART: [art] PUB.X = 5F615A34158BCC1ED4DC132ADFEAC3ECF4E65E179FE07139F2B14B306239623B57BC6E9CBF41F9C1E3B566DBE94D8A99
3,129,530 UART: [art] PUB.Y = 6FA133FD8643781026F90A1BB25FE3A580BA3C52755CB4788AC35FBA650E8599DC071DD112248A09376D5475EC841327
3,136,466 UART: [art] SIG.R = 3357639EC373580780F17ABB9D33FC5FBC30C50AFFFD7F23EDB471825F5FC72EFDC991558377FFC965234172C7291A5A
3,143,238 UART: [art] SIG.S = 5F477603D8C11EB00D30B89C3FD810A8F9D3371E447DEBBFD883185383E4B8CDBDA16CABAD17066D6A25F6FD9BDF18E5
3,167,090 UART: Caliptra RT
3,167,436 UART: [state] CFI Enabled
3,275,662 UART: [rt] RT listening for mailbox commands...
3,276,332 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,935 UART: [rt]cmd =0x44504543, len=40
3,339,862 >>> mbox cmd response data (40 bytes)
3,339,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,838 UART: [rt]cmd =0x44504543, len=96
3,417,903 >>> mbox cmd response data (56 bytes)
3,417,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,791 UART: [rt]cmd =0x44504543, len=96
3,496,551 >>> mbox cmd response data (56 bytes)
3,496,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,431 UART: [rt]cmd =0x44504543, len=96
3,575,581 >>> mbox cmd response data (56 bytes)
3,575,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,393 UART: [rt]cmd =0x44504543, len=96
3,655,531 >>> mbox cmd response data (56 bytes)
3,655,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,431 UART: [rt]cmd =0x44504543, len=96
3,735,167 >>> mbox cmd response data (56 bytes)
3,735,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,337 UART: [rt]cmd =0x44504543, len=96
3,814,303 >>> mbox cmd response data (56 bytes)
3,814,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,305 UART: [rt]cmd =0x44504543, len=96
3,894,431 >>> mbox cmd response data (56 bytes)
3,894,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,491 UART: [rt]cmd =0x44504543, len=96
3,974,005 >>> mbox cmd response data (56 bytes)
3,974,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,163 UART: [rt]cmd =0x44504543, len=96
4,053,833 >>> mbox cmd response data (56 bytes)
4,053,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,889 UART: [rt]cmd =0x44504543, len=96
4,134,825 >>> mbox cmd response data (56 bytes)
4,134,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,679 UART: [rt]cmd =0x44504543, len=96
4,215,669 >>> mbox cmd response data (56 bytes)
4,215,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,245,691 UART: [rt]cmd =0x44504543, len=96
4,297,083 >>> mbox cmd response data (56 bytes)
4,297,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,327,255 UART: [rt]cmd =0x44504543, len=96
4,378,703 >>> mbox cmd response data (56 bytes)
4,378,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,408,559 UART: [rt]cmd =0x44504543, len=96
4,460,735 >>> mbox cmd response data (56 bytes)
4,460,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,490,843 UART: [rt]cmd =0x44504543, len=96
4,542,555 >>> mbox cmd response data (56 bytes)
4,542,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,572,663 UART: [rt]cmd =0x44504543, len=96
4,579,899 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,291 ready_for_fw is high
1,056,291 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,607 >>> mbox cmd response: success
2,685,361 UART:
2,685,377 UART: Running Caliptra FMC ...
2,685,785 UART:
2,685,928 UART: [state] CFI Enabled
2,696,321 UART: [fht] FMC Alias Private Key: 7
2,804,248 UART: [art] Extend RT PCRs Done
2,804,676 UART: [art] Lock RT PCRs Done
2,806,100 UART: [art] Populate DV Done
2,814,315 UART: [fht] FMC Alias Private Key: 7
2,815,297 UART: [art] Derive CDI
2,815,577 UART: [art] Store in in slot 0x4
2,901,458 UART: [art] Derive Key Pair
2,901,818 UART: [art] Store priv key in slot 0x5
2,914,982 UART: [art] Derive Key Pair - Done
2,930,018 UART: [art] Signing Cert with AUTHO
2,930,498 UART: RITY.KEYID = 7
2,946,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,937 UART: [art] PUB.X = 6144B18F7F2ED03C89DB0CF57285FF7CC1566FD58A3E0C3328452078DCDAFDA9ED7009D5570FC585171599FD7897DF5F
2,953,705 UART: [art] PUB.Y = CB98E3C30918A0191DEA8CC96A5247716160200020A359F55AA41E30C56DEF85DC5DC61F19B73C3B14D1E995B23E1AB2
2,960,636 UART: [art] SIG.R = D87258A629F47F621056C25A893E6AFF5D5E65C2F791B6C7E2B7DFC7CE85BA88E699E99983BBFBF2345883CF6607F249
2,967,411 UART: [art] SIG.S = 0DC2EE1B1EB95646822D50C49A9BCE5290E530403F8873974EFA52E9358DA1571E241AD95D658529361EDFCFFBD46A1E
2,991,093 UART: Caliptra RT
2,991,439 UART: [state] CFI Enabled
3,099,367 UART: [rt] RT listening for mailbox commands...
3,100,037 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,756 UART: [rt]cmd =0x44504543, len=40
3,164,137 >>> mbox cmd response data (40 bytes)
3,164,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,149 UART: [rt]cmd =0x44504543, len=96
3,242,670 >>> mbox cmd response data (56 bytes)
3,242,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,770 UART: [rt]cmd =0x44504543, len=96
3,321,654 >>> mbox cmd response data (56 bytes)
3,321,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,384 UART: [rt]cmd =0x44504543, len=96
3,399,882 >>> mbox cmd response data (56 bytes)
3,399,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,730 UART: [rt]cmd =0x44504543, len=96
3,478,870 >>> mbox cmd response data (56 bytes)
3,478,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,872 UART: [rt]cmd =0x44504543, len=96
3,558,716 >>> mbox cmd response data (56 bytes)
3,558,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,862 UART: [rt]cmd =0x44504543, len=96
3,638,258 >>> mbox cmd response data (56 bytes)
3,638,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,332 UART: [rt]cmd =0x44504543, len=96
3,718,404 >>> mbox cmd response data (56 bytes)
3,718,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,532 UART: [rt]cmd =0x44504543, len=96
3,798,646 >>> mbox cmd response data (56 bytes)
3,798,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,414 UART: [rt]cmd =0x44504543, len=96
3,879,966 >>> mbox cmd response data (56 bytes)
3,879,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,136 UART: [rt]cmd =0x44504543, len=96
3,961,322 >>> mbox cmd response data (56 bytes)
3,961,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,314 UART: [rt]cmd =0x44504543, len=96
4,042,382 >>> mbox cmd response data (56 bytes)
4,042,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,136 UART: [rt]cmd =0x44504543, len=96
4,123,540 >>> mbox cmd response data (56 bytes)
4,123,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,610 UART: [rt]cmd =0x44504543, len=96
4,205,352 >>> mbox cmd response data (56 bytes)
4,205,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,235,456 UART: [rt]cmd =0x44504543, len=96
4,288,038 >>> mbox cmd response data (56 bytes)
4,288,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,317,850 UART: [rt]cmd =0x44504543, len=96
4,369,836 >>> mbox cmd response data (56 bytes)
4,369,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,399,538 UART: [rt]cmd =0x44504543, len=96
4,406,822 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,381 UART:
192,757 UART: Running Caliptra ROM ...
193,880 UART:
194,022 UART: [state] CFI Enabled
262,281 UART: [state] LifecycleState = Unprovisioned
264,262 UART: [state] DebugLocked = No
265,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,724 UART: [kat] SHA2-256
440,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,924 UART: [kat] ++
451,391 UART: [kat] sha1
463,040 UART: [kat] SHA2-256
465,684 UART: [kat] SHA2-384
471,840 UART: [kat] SHA2-512-ACC
474,207 UART: [kat] ECC-384
2,768,655 UART: [kat] HMAC-384Kdf
2,800,127 UART: [kat] LMS
3,990,435 UART: [kat] --
3,994,736 UART: [cold-reset] ++
3,997,159 UART: [fht] Storing FHT @ 0x50003400
4,007,919 UART: [idev] ++
4,008,552 UART: [idev] CDI.KEYID = 6
4,009,458 UART: [idev] SUBJECT.KEYID = 7
4,010,697 UART: [idev] UDS.KEYID = 0
4,011,744 ready_for_fw is high
4,011,959 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,440 UART: [idev] Erasing UDS.KEYID = 0
7,348,033 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,119 UART: [idev] --
7,376,429 UART: [ldev] ++
7,377,055 UART: [ldev] CDI.KEYID = 6
7,377,962 UART: [ldev] SUBJECT.KEYID = 5
7,379,222 UART: [ldev] AUTHORITY.KEYID = 7
7,380,449 UART: [ldev] FE.KEYID = 1
7,422,161 UART: [ldev] Erasing FE.KEYID = 1
10,757,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,162 UART: [ldev] --
13,136,561 UART: [fwproc] Waiting for Commands...
13,139,510 UART: [fwproc] Received command 0x46574c44
13,141,684 UART: [fwproc] Received Image of size 114036 bytes
17,194,545 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,656,034 >>> mbox cmd response: success
17,660,974 UART: [afmc] ++
17,661,567 UART: [afmc] CDI.KEYID = 6
17,662,469 UART: [afmc] SUBJECT.KEYID = 7
17,663,733 UART: [afmc] AUTHORITY.KEYID = 5
21,026,224 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,199 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,603 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,421 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,854 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,899 UART: [afmc] --
23,398,807 UART: [cold-reset] --
23,402,554 UART: [state] Locking Datavault
23,407,883 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,627 UART: [state] Locking ICCM
23,410,914 UART: [exit] Launching FMC @ 0x40000130
23,419,306 UART:
23,419,537 UART: Running Caliptra FMC ...
23,420,630 UART:
23,420,782 UART: [state] CFI Enabled
23,488,735 UART: [fht] FMC Alias Private Key: 7
25,826,874 UART: [art] Extend RT PCRs Done
25,828,094 UART: [art] Lock RT PCRs Done
25,829,872 UART: [art] Populate DV Done
25,835,328 UART: [fht] FMC Alias Private Key: 7
25,836,860 UART: [art] Derive CDI
25,837,666 UART: [art] Store in in slot 0x4
25,897,457 UART: [art] Derive Key Pair
25,898,515 UART: [art] Store priv key in slot 0x5
29,191,500 UART: [art] Derive Key Pair - Done
29,204,447 UART: [art] Signing Cert with AUTHO
29,205,751 UART: RITY.KEYID = 7
31,493,786 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,291 UART: [art] PUB.X = A53F4F0C4E5181A738470E7980CE2FDA4F5A7DE4D53337D8C52D25AF2637DCDF9EACE164DAE96A5F44B66081E4FE52EA
31,502,567 UART: [art] PUB.Y = 5E1685058B27F8EE2DA54C765362D3005982B767638E6D0EF3CE6E763AF485EF1DC6E6142833DFFE62316C321542B46A
31,509,815 UART: [art] SIG.R = 7ECE60A3982062537C12BC4904F3CE4AB29449AE9555B3C1D80951B2452C3601D429F8ADE331AEA64F5D7AF268098BE4
31,517,164 UART: [art] SIG.S = 1F92F8758C1CDF61D0CB93C2C55C6B9BE49B0C171CEDDD8EB3B85E2A72A57D6CC06700F38FC2F1502D1EA0C00E69EF65
32,822,678 UART: Caliptra RT
32,823,386 UART: [state] CFI Enabled
32,984,035 UART: [rt] RT listening for mailbox commands...
32,985,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,015,981 UART: [rt]cmd =0x44504543, len=24
33,066,285 >>> mbox cmd response data (40 bytes)
33,067,072 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,096,836 UART: [rt]cmd =0x44504543, len=24
33,151,581 >>> mbox cmd response data (40 bytes)
33,152,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,182,029 UART: [rt]cmd =0x44504543, len=24
33,237,139 >>> mbox cmd response data (40 bytes)
33,237,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,267,954 UART: [rt]cmd =0x44504543, len=24
33,322,306 >>> mbox cmd response data (40 bytes)
33,322,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,352,846 UART: [rt]cmd =0x44504543, len=24
33,407,732 >>> mbox cmd response data (40 bytes)
33,408,381 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,438,282 UART: [rt]cmd =0x44504543, len=24
33,493,103 >>> mbox cmd response data (40 bytes)
33,493,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,523,493 UART: [rt]cmd =0x44504543, len=24
33,578,044 >>> mbox cmd response data (40 bytes)
33,578,724 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,608,894 UART: [rt]cmd =0x44504543, len=24
33,663,441 >>> mbox cmd response data (40 bytes)
33,664,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,694,093 UART: [rt]cmd =0x44504543, len=24
33,749,013 >>> mbox cmd response data (40 bytes)
33,749,666 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,779,453 UART: [rt]cmd =0x44504543, len=24
33,834,378 >>> mbox cmd response data (40 bytes)
33,835,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,865,085 UART: [rt]cmd =0x44504543, len=24
33,919,897 >>> mbox cmd response data (40 bytes)
33,920,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,950,387 UART: [rt]cmd =0x44504543, len=24
34,005,259 >>> mbox cmd response data (40 bytes)
34,005,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,035,728 UART: [rt]cmd =0x44504543, len=24
34,090,762 >>> mbox cmd response data (40 bytes)
34,091,409 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,121,251 UART: [rt]cmd =0x44504543, len=24
34,175,692 >>> mbox cmd response data (40 bytes)
34,176,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,206,344 UART: [rt]cmd =0x44504543, len=24
34,261,390 >>> mbox cmd response data (40 bytes)
34,262,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,291,838 UART: [rt]cmd =0x44504543, len=24
34,298,271 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,784,625 ready_for_fw is high
3,785,293 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,847,903 >>> mbox cmd response: success
23,549,752 UART:
23,550,155 UART: Running Caliptra FMC ...
23,551,290 UART:
23,551,447 UART: [state] CFI Enabled
23,617,013 UART: [fht] FMC Alias Private Key: 7
25,955,573 UART: [art] Extend RT PCRs Done
25,956,798 UART: [art] Lock RT PCRs Done
25,958,363 UART: [art] Populate DV Done
25,963,935 UART: [fht] FMC Alias Private Key: 7
25,965,576 UART: [art] Derive CDI
25,966,379 UART: [art] Store in in slot 0x4
26,025,303 UART: [art] Derive Key Pair
26,026,295 UART: [art] Store priv key in slot 0x5
29,319,605 UART: [art] Derive Key Pair - Done
29,332,827 UART: [art] Signing Cert with AUTHO
29,334,135 UART: RITY.KEYID = 7
31,620,889 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,418 UART: [art] PUB.X = 2592EE1F26984C48E9DCFAC1C3B553893947CDEE72AA981C7A142BD3405B6C9D99CB099BD080CC33064950AF4B3DE8BE
31,629,603 UART: [art] PUB.Y = 4D68C217977F2B53625BA1E2BE59E2ED85D837B644FC8CDB1B7DA2EAF6758823198BFEA29D87CD012A34532564C95F43
31,636,908 UART: [art] SIG.R = 9606DD2D879CCA13397DB7906204827E0665F307FBDFB6C8C8D9A970D3C0DADB6E5BA6AF54B5B9C9F07340E8D4F6140E
31,644,275 UART: [art] SIG.S = 0A5E9EDEDB1B502C40FF72F932509D729FE5B4CC2C2C9E52E65FF1A94BF7B75956A596BDE623F8937C754B6CFDB0F5E2
32,949,835 UART: Caliptra RT
32,950,536 UART: [state] CFI Enabled
33,113,861 UART: [rt] RT listening for mailbox commands...
33,115,779 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,145,580 UART: [rt]cmd =0x44504543, len=24
33,195,324 >>> mbox cmd response data (40 bytes)
33,196,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,226,104 UART: [rt]cmd =0x44504543, len=24
33,280,668 >>> mbox cmd response data (40 bytes)
33,281,342 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,311,024 UART: [rt]cmd =0x44504543, len=24
33,366,141 >>> mbox cmd response data (40 bytes)
33,366,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,396,637 UART: [rt]cmd =0x44504543, len=24
33,451,726 >>> mbox cmd response data (40 bytes)
33,452,352 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,482,349 UART: [rt]cmd =0x44504543, len=24
33,537,140 >>> mbox cmd response data (40 bytes)
33,537,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,567,798 UART: [rt]cmd =0x44504543, len=24
33,622,982 >>> mbox cmd response data (40 bytes)
33,623,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,653,415 UART: [rt]cmd =0x44504543, len=24
33,708,366 >>> mbox cmd response data (40 bytes)
33,708,984 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,739,056 UART: [rt]cmd =0x44504543, len=24
33,793,831 >>> mbox cmd response data (40 bytes)
33,794,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,824,327 UART: [rt]cmd =0x44504543, len=24
33,879,453 >>> mbox cmd response data (40 bytes)
33,880,106 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,909,903 UART: [rt]cmd =0x44504543, len=24
33,964,709 >>> mbox cmd response data (40 bytes)
33,965,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,995,472 UART: [rt]cmd =0x44504543, len=24
34,050,438 >>> mbox cmd response data (40 bytes)
34,051,086 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,081,312 UART: [rt]cmd =0x44504543, len=24
34,135,636 >>> mbox cmd response data (40 bytes)
34,136,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,166,441 UART: [rt]cmd =0x44504543, len=24
34,221,240 >>> mbox cmd response data (40 bytes)
34,221,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,251,668 UART: [rt]cmd =0x44504543, len=24
34,307,029 >>> mbox cmd response data (40 bytes)
34,307,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,337,563 UART: [rt]cmd =0x44504543, len=24
34,392,319 >>> mbox cmd response data (40 bytes)
34,392,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,422,909 UART: [rt]cmd =0x44504543, len=24
34,429,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,504 UART:
192,861 UART: Running Caliptra ROM ...
193,994 UART:
603,707 UART: [state] CFI Enabled
618,376 UART: [state] LifecycleState = Unprovisioned
620,351 UART: [state] DebugLocked = No
623,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,166 UART: [kat] SHA2-256
796,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,397 UART: [kat] ++
807,918 UART: [kat] sha1
820,420 UART: [kat] SHA2-256
823,074 UART: [kat] SHA2-384
828,230 UART: [kat] SHA2-512-ACC
830,598 UART: [kat] ECC-384
3,117,244 UART: [kat] HMAC-384Kdf
3,130,255 UART: [kat] LMS
4,320,359 UART: [kat] --
4,326,085 UART: [cold-reset] ++
4,327,809 UART: [fht] Storing FHT @ 0x50003400
4,338,789 UART: [idev] ++
4,339,360 UART: [idev] CDI.KEYID = 6
4,340,390 UART: [idev] SUBJECT.KEYID = 7
4,341,568 UART: [idev] UDS.KEYID = 0
4,342,599 ready_for_fw is high
4,342,802 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,010 UART: [idev] Erasing UDS.KEYID = 0
7,631,288 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,276 UART: [idev] --
7,658,858 UART: [ldev] ++
7,659,492 UART: [ldev] CDI.KEYID = 6
7,660,400 UART: [ldev] SUBJECT.KEYID = 5
7,661,615 UART: [ldev] AUTHORITY.KEYID = 7
7,662,897 UART: [ldev] FE.KEYID = 1
7,671,982 UART: [ldev] Erasing FE.KEYID = 1
10,956,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,705 UART: [ldev] --
13,314,647 UART: [fwproc] Waiting for Commands...
13,317,331 UART: [fwproc] Received command 0x46574c44
13,319,509 UART: [fwproc] Received Image of size 114036 bytes
17,375,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,841,861 >>> mbox cmd response: success
17,846,792 UART: [afmc] ++
17,847,389 UART: [afmc] CDI.KEYID = 6
17,848,274 UART: [afmc] SUBJECT.KEYID = 7
17,849,551 UART: [afmc] AUTHORITY.KEYID = 5
21,165,340 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,053 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,318 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,706 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,519 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,996 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,689 UART: [afmc] --
23,527,991 UART: [cold-reset] --
23,530,127 UART: [state] Locking Datavault
23,535,833 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,535 UART: [state] Locking ICCM
23,539,474 UART: [exit] Launching FMC @ 0x40000130
23,547,872 UART:
23,548,114 UART: Running Caliptra FMC ...
23,549,219 UART:
23,549,378 UART: [state] CFI Enabled
23,557,103 UART: [fht] FMC Alias Private Key: 7
25,888,472 UART: [art] Extend RT PCRs Done
25,889,688 UART: [art] Lock RT PCRs Done
25,891,364 UART: [art] Populate DV Done
25,896,898 UART: [fht] FMC Alias Private Key: 7
25,898,590 UART: [art] Derive CDI
25,899,421 UART: [art] Store in in slot 0x4
25,942,016 UART: [art] Derive Key Pair
25,943,022 UART: [art] Store priv key in slot 0x5
29,184,556 UART: [art] Derive Key Pair - Done
29,197,563 UART: [art] Signing Cert with AUTHO
29,198,867 UART: RITY.KEYID = 7
31,477,846 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,351 UART: [art] PUB.X = DDB60430A94FC72EF6221593066434E347F307B824F56CA6BC9938CF4DEFCE602205ACB376576C27B956CF84F7A995CB
31,486,615 UART: [art] PUB.Y = 0CE438AA32B9910CAEDD3EAFD640E527ABB053F6D4C44CD0353E66BA307652C00405468A6D0A7777877B87C50E5FF58A
31,493,851 UART: [art] SIG.R = 3DBB15198B37DB2941366E815B6360DB6A93DFF6EE5229DF271CA0058F891963D552C05C4FB2185DD692FFDB686B54A3
31,501,265 UART: [art] SIG.S = 4A3CBD10EE76ACD866C2FAFC600168355C102C70CCB641C50930FF72698FD29C716E2B4B717300FB68514444D8BDB358
32,806,345 UART: Caliptra RT
32,807,062 UART: [state] CFI Enabled
32,924,409 UART: [rt] RT listening for mailbox commands...
32,926,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,956,197 UART: [rt]cmd =0x44504543, len=24
32,990,194 >>> mbox cmd response data (40 bytes)
32,990,973 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,020,895 UART: [rt]cmd =0x44504543, len=24
33,055,076 >>> mbox cmd response data (40 bytes)
33,055,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,085,637 UART: [rt]cmd =0x44504543, len=24
33,119,664 >>> mbox cmd response data (40 bytes)
33,120,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,150,173 UART: [rt]cmd =0x44504543, len=24
33,184,256 >>> mbox cmd response data (40 bytes)
33,184,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,214,710 UART: [rt]cmd =0x44504543, len=24
33,249,104 >>> mbox cmd response data (40 bytes)
33,249,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,279,575 UART: [rt]cmd =0x44504543, len=24
33,313,573 >>> mbox cmd response data (40 bytes)
33,314,200 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,344,009 UART: [rt]cmd =0x44504543, len=24
33,378,392 >>> mbox cmd response data (40 bytes)
33,379,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,408,935 UART: [rt]cmd =0x44504543, len=24
33,442,853 >>> mbox cmd response data (40 bytes)
33,443,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,473,287 UART: [rt]cmd =0x44504543, len=24
33,507,422 >>> mbox cmd response data (40 bytes)
33,508,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,537,920 UART: [rt]cmd =0x44504543, len=24
33,572,361 >>> mbox cmd response data (40 bytes)
33,573,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,603,062 UART: [rt]cmd =0x44504543, len=24
33,637,136 >>> mbox cmd response data (40 bytes)
33,637,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,667,653 UART: [rt]cmd =0x44504543, len=24
33,701,803 >>> mbox cmd response data (40 bytes)
33,702,415 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,732,439 UART: [rt]cmd =0x44504543, len=24
33,766,761 >>> mbox cmd response data (40 bytes)
33,767,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,797,112 UART: [rt]cmd =0x44504543, len=24
33,831,131 >>> mbox cmd response data (40 bytes)
33,831,777 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,861,516 UART: [rt]cmd =0x44504543, len=24
33,895,378 >>> mbox cmd response data (40 bytes)
33,896,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,925,875 UART: [rt]cmd =0x44504543, len=24
33,932,381 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,124,906 ready_for_fw is high
4,125,323 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,069,734 >>> mbox cmd response: success
23,705,393 UART:
23,705,821 UART: Running Caliptra FMC ...
23,707,021 UART:
23,707,195 UART: [state] CFI Enabled
23,714,657 UART: [fht] FMC Alias Private Key: 7
26,046,104 UART: [art] Extend RT PCRs Done
26,047,381 UART: [art] Lock RT PCRs Done
26,048,986 UART: [art] Populate DV Done
26,054,610 UART: [fht] FMC Alias Private Key: 7
26,056,158 UART: [art] Derive CDI
26,056,927 UART: [art] Store in in slot 0x4
26,099,475 UART: [art] Derive Key Pair
26,100,480 UART: [art] Store priv key in slot 0x5
29,342,956 UART: [art] Derive Key Pair - Done
29,355,920 UART: [art] Signing Cert with AUTHO
29,357,233 UART: RITY.KEYID = 7
31,636,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,148 UART: [art] PUB.X = 65061791BCC7C97D64797B27CFB9D10E46DD9CB34C1282424975F465C964A0F40E58A8269E93E9B0FA68607C55DA4043
31,645,314 UART: [art] PUB.Y = 1618555A9F701F951325BB21FBF4A12165EE4ED6A2B598A25E774BA4AECBA8BAC83B1B06C62017A0ACEBE8381F48CE88
31,652,627 UART: [art] SIG.R = 808A2B145EDC13E109DB5325B6571688B6CF2A2C45A9449644F0051E6DF67B7BD10BEFAA785EAE72DBB4397D7336A52A
31,659,999 UART: [art] SIG.S = D0D791F5087248E5A190C30F3A6857A082B12F4097B85D5081B84B14E279FD8E316537C37753C498D7F11B8A101744E5
32,964,955 UART: Caliptra RT
32,965,657 UART: [state] CFI Enabled
33,083,383 UART: [rt] RT listening for mailbox commands...
33,085,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,115,232 UART: [rt]cmd =0x44504543, len=24
33,149,365 >>> mbox cmd response data (40 bytes)
33,150,143 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,180,168 UART: [rt]cmd =0x44504543, len=24
33,214,332 >>> mbox cmd response data (40 bytes)
33,214,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,244,938 UART: [rt]cmd =0x44504543, len=24
33,278,710 >>> mbox cmd response data (40 bytes)
33,279,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,309,257 UART: [rt]cmd =0x44504543, len=24
33,343,450 >>> mbox cmd response data (40 bytes)
33,344,153 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,374,113 UART: [rt]cmd =0x44504543, len=24
33,408,053 >>> mbox cmd response data (40 bytes)
33,408,713 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,438,508 UART: [rt]cmd =0x44504543, len=24
33,472,579 >>> mbox cmd response data (40 bytes)
33,473,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,503,225 UART: [rt]cmd =0x44504543, len=24
33,537,758 >>> mbox cmd response data (40 bytes)
33,538,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,568,232 UART: [rt]cmd =0x44504543, len=24
33,602,125 >>> mbox cmd response data (40 bytes)
33,602,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,632,562 UART: [rt]cmd =0x44504543, len=24
33,667,020 >>> mbox cmd response data (40 bytes)
33,667,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,697,644 UART: [rt]cmd =0x44504543, len=24
33,732,109 >>> mbox cmd response data (40 bytes)
33,732,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,762,549 UART: [rt]cmd =0x44504543, len=24
33,796,538 >>> mbox cmd response data (40 bytes)
33,797,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,827,086 UART: [rt]cmd =0x44504543, len=24
33,861,375 >>> mbox cmd response data (40 bytes)
33,861,979 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,892,072 UART: [rt]cmd =0x44504543, len=24
33,926,233 >>> mbox cmd response data (40 bytes)
33,926,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,956,704 UART: [rt]cmd =0x44504543, len=24
33,990,451 >>> mbox cmd response data (40 bytes)
33,991,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,021,074 UART: [rt]cmd =0x44504543, len=24
34,055,155 >>> mbox cmd response data (40 bytes)
34,055,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,085,596 UART: [rt]cmd =0x44504543, len=24
34,092,274 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,578 writing to cptra_bootfsm_go
192,681 UART:
193,055 UART: Running Caliptra ROM ...
194,240 UART:
194,392 UART: [state] CFI Enabled
264,754 UART: [state] LifecycleState = Unprovisioned
266,672 UART: [state] DebugLocked = No
267,927 UART: [state] WD Timer not started. Device not locked for debugging
270,972 UART: [kat] SHA2-256
450,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,653 UART: [kat] ++
462,186 UART: [kat] sha1
472,074 UART: [kat] SHA2-256
475,256 UART: [kat] SHA2-384
481,568 UART: [kat] SHA2-512-ACC
484,526 UART: [kat] ECC-384
2,946,652 UART: [kat] HMAC-384Kdf
2,970,387 UART: [kat] LMS
3,499,852 UART: [kat] --
3,503,775 UART: [cold-reset] ++
3,505,138 UART: [fht] FHT @ 0x50003400
3,516,342 UART: [idev] ++
3,516,953 UART: [idev] CDI.KEYID = 6
3,517,869 UART: [idev] SUBJECT.KEYID = 7
3,519,050 UART: [idev] UDS.KEYID = 0
3,519,980 ready_for_fw is high
3,520,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,868 UART: [idev] Erasing UDS.KEYID = 0
6,023,861 UART: [idev] Sha1 KeyId Algorithm
6,046,494 UART: [idev] --
6,050,121 UART: [ldev] ++
6,050,716 UART: [ldev] CDI.KEYID = 6
6,051,633 UART: [ldev] SUBJECT.KEYID = 5
6,052,678 UART: [ldev] AUTHORITY.KEYID = 7
6,054,022 UART: [ldev] FE.KEYID = 1
6,097,144 UART: [ldev] Erasing FE.KEYID = 1
8,602,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,084 UART: [ldev] --
10,410,040 UART: [fwproc] Wait for Commands...
10,413,118 UART: [fwproc] Recv command 0x46574c44
10,415,157 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,274,981 >>> mbox cmd response: success
14,279,138 UART: [afmc] ++
14,279,734 UART: [afmc] CDI.KEYID = 6
14,280,654 UART: [afmc] SUBJECT.KEYID = 7
14,281,809 UART: [afmc] AUTHORITY.KEYID = 5
16,822,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,006 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,314 UART: [afmc] --
18,624,959 UART: [cold-reset] --
18,630,221 UART: [state] Locking Datavault
18,634,995 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,755 UART: [state] Locking ICCM
18,639,349 UART: [exit] Launching FMC @ 0x40000130
18,647,747 UART:
18,647,983 UART: Running Caliptra FMC ...
18,649,085 UART:
18,649,254 UART: [state] CFI Enabled
18,707,080 UART: [fht] FMC Alias Private Key: 7
20,470,726 UART: [art] Extend RT PCRs Done
20,471,933 UART: [art] Lock RT PCRs Done
20,473,500 UART: [art] Populate DV Done
20,479,137 UART: [fht] FMC Alias Private Key: 7
20,480,822 UART: [art] Derive CDI
20,481,645 UART: [art] Store in in slot 0x4
20,539,658 UART: [art] Derive Key Pair
20,540,658 UART: [art] Store priv key in slot 0x5
23,003,459 UART: [art] Derive Key Pair - Done
23,016,585 UART: [art] Signing Cert with AUTHO
23,017,898 UART: RITY.KEYID = 7
24,729,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,382 UART: [art] PUB.X = 195D3643A07D6172F72313A155FF58030C1C3BCD03A5C345EBEA745C3E064B247907D97912A8515FEFC7539767224796
24,738,651 UART: [art] PUB.Y = C15D556C32A8154597A1129D2285C41FBC4AE0F07E98099FB03B28CE7ED6171585CCA15BE6E58F691B338818DA9FF68A
24,745,910 UART: [art] SIG.R = CA810FDAA10301DE39DFF9B934443D0D96C9F676985CAA8F937EA51DB96D3436D18DC3057B0E1D2DCA6A27A1D7AB095B
24,753,342 UART: [art] SIG.S = 38B60B7EB5D5D6B733C1BD000D6980694B474A8ECD497CDD31A2C2852BF0E46D4E603E698CABAA86E595C42AD02B44D6
25,731,766 UART: Caliptra RT
25,732,461 UART: [state] CFI Enabled
25,898,685 UART: [rt] RT listening for mailbox commands...
25,900,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,930,586 UART: [rt]cmd =0x44504543, len=24
25,980,350 >>> mbox cmd response data (40 bytes)
25,981,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,011,194 UART: [rt]cmd =0x44504543, len=24
26,065,873 >>> mbox cmd response data (40 bytes)
26,066,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,096,391 UART: [rt]cmd =0x44504543, len=24
26,151,099 >>> mbox cmd response data (40 bytes)
26,151,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,181,594 UART: [rt]cmd =0x44504543, len=24
26,236,742 >>> mbox cmd response data (40 bytes)
26,237,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,267,125 UART: [rt]cmd =0x44504543, len=24
26,301,034 >>> mbox cmd response data (40 bytes)
26,301,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,391 UART: [rt]cmd =0x44504543, len=24
26,386,346 >>> mbox cmd response data (40 bytes)
26,386,962 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,416,973 UART: [rt]cmd =0x44504543, len=24
26,472,028 >>> mbox cmd response data (40 bytes)
26,472,645 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,502,626 UART: [rt]cmd =0x44504543, len=24
26,557,576 >>> mbox cmd response data (40 bytes)
26,558,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,588,119 UART: [rt]cmd =0x44504543, len=24
26,642,958 >>> mbox cmd response data (40 bytes)
26,643,629 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,673,700 UART: [rt]cmd =0x44504543, len=24
26,728,425 >>> mbox cmd response data (40 bytes)
26,729,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,758,929 UART: [rt]cmd =0x44504543, len=24
26,813,965 >>> mbox cmd response data (40 bytes)
26,814,607 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,844,616 UART: [rt]cmd =0x44504543, len=24
26,899,795 >>> mbox cmd response data (40 bytes)
26,900,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,930,105 UART: [rt]cmd =0x44504543, len=24
26,985,367 >>> mbox cmd response data (40 bytes)
26,986,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,015,966 UART: [rt]cmd =0x44504543, len=24
27,070,836 >>> mbox cmd response data (40 bytes)
27,071,479 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,101,271 UART: [rt]cmd =0x44504543, len=24
27,156,136 >>> mbox cmd response data (40 bytes)
27,156,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,186,776 UART: [rt]cmd =0x44504543, len=24
27,193,287 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,601 UART:
192,971 UART: Running Caliptra ROM ...
194,071 UART:
194,217 UART: [state] CFI Enabled
266,009 UART: [state] LifecycleState = Unprovisioned
268,394 UART: [state] DebugLocked = No
270,978 UART: [state] WD Timer not started. Device not locked for debugging
275,327 UART: [kat] SHA2-256
465,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,919 UART: [kat] ++
476,370 UART: [kat] sha1
486,744 UART: [kat] SHA2-256
489,754 UART: [kat] SHA2-384
495,895 UART: [kat] SHA2-512-ACC
498,428 UART: [kat] ECC-384
2,949,140 UART: [kat] HMAC-384Kdf
2,971,389 UART: [kat] LMS
3,503,211 UART: [kat] --
3,507,772 UART: [cold-reset] ++
3,509,563 UART: [fht] FHT @ 0x50003400
3,520,976 UART: [idev] ++
3,521,688 UART: [idev] CDI.KEYID = 6
3,522,607 UART: [idev] SUBJECT.KEYID = 7
3,523,851 UART: [idev] UDS.KEYID = 0
3,524,777 ready_for_fw is high
3,524,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,798 UART: [idev] Erasing UDS.KEYID = 0
6,025,080 UART: [idev] Sha1 KeyId Algorithm
6,047,340 UART: [idev] --
6,052,076 UART: [ldev] ++
6,052,789 UART: [ldev] CDI.KEYID = 6
6,053,706 UART: [ldev] SUBJECT.KEYID = 5
6,054,819 UART: [ldev] AUTHORITY.KEYID = 7
6,056,054 UART: [ldev] FE.KEYID = 1
6,098,595 UART: [ldev] Erasing FE.KEYID = 1
8,605,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,242 UART: [ldev] --
10,412,773 UART: [fwproc] Wait for Commands...
10,415,090 UART: [fwproc] Recv command 0x46574c44
10,417,349 UART: [fwproc] Recv'd Img size: 114360 bytes
13,856,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,592,245 >>> mbox cmd response: success
14,597,105 UART: [afmc] ++
14,597,846 UART: [afmc] CDI.KEYID = 6
14,599,046 UART: [afmc] SUBJECT.KEYID = 7
14,600,487 UART: [afmc] AUTHORITY.KEYID = 5
17,126,889 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,849,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,866,607 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,881,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,896,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,213 UART: [afmc] --
18,923,026 UART: [cold-reset] --
18,928,048 UART: [state] Locking Datavault
18,933,257 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,422 UART: [state] Locking ICCM
18,938,374 UART: [exit] Launching FMC @ 0x40000130
18,947,053 UART:
18,947,295 UART: Running Caliptra FMC ...
18,948,323 UART:
18,948,470 UART: [state] CFI Enabled
19,007,698 UART: [fht] FMC Alias Private Key: 7
20,771,737 UART: [art] Extend RT PCRs Done
20,772,955 UART: [art] Lock RT PCRs Done
20,774,441 UART: [art] Populate DV Done
20,779,906 UART: [fht] FMC Alias Private Key: 7
20,781,437 UART: [art] Derive CDI
20,782,170 UART: [art] Store in in slot 0x4
20,840,100 UART: [art] Derive Key Pair
20,841,132 UART: [art] Store priv key in slot 0x5
23,304,563 UART: [art] Derive Key Pair - Done
23,317,456 UART: [art] Signing Cert with AUTHO
23,318,785 UART: RITY.KEYID = 7
25,030,807 UART: [art] Erasing AUTHORITY.KEYID = 7
25,032,320 UART: [art] PUB.X = 20273C60B18A12E70F3DB4DC975E72A4CE69D28C8E5F4897BE19F4B0BC27208E2F27FFCC27A7C382198F5C9FD26C693C
25,039,595 UART: [art] PUB.Y = 15D0776EC03BEC2674081499C821D7829CBE5D957F542DCE377910346EDFA15FCA86778D79846DB1D5D815BEC8EF3549
25,046,862 UART: [art] SIG.R = 0F8DA400974D1DB7CC604BAC21751555D6FC58169BA0EC28630ACE783D845DED2C19871ED048F681311A2A2CCA9323D9
25,054,233 UART: [art] SIG.S = AD540D3079FD9C788BB8E3BB14350DB2F5EE110DF059B9F6A8D2B4980B022AA06D3E641664D8FE65A57AF64A5A108219
26,033,361 UART: Caliptra RT
26,034,054 UART: [state] CFI Enabled
26,199,241 UART: [rt] RT listening for mailbox commands...
26,201,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,231,137 UART: [rt]cmd =0x44504543, len=24
26,281,468 >>> mbox cmd response data (40 bytes)
26,282,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,311,960 UART: [rt]cmd =0x44504543, len=24
26,366,462 >>> mbox cmd response data (40 bytes)
26,367,149 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,397,158 UART: [rt]cmd =0x44504543, len=24
26,452,040 >>> mbox cmd response data (40 bytes)
26,452,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,482,700 UART: [rt]cmd =0x44504543, len=24
26,537,468 >>> mbox cmd response data (40 bytes)
26,538,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,567,902 UART: [rt]cmd =0x44504543, len=24
26,623,144 >>> mbox cmd response data (40 bytes)
26,623,797 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,653,861 UART: [rt]cmd =0x44504543, len=24
26,709,016 >>> mbox cmd response data (40 bytes)
26,709,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,739,701 UART: [rt]cmd =0x44504543, len=24
26,794,259 >>> mbox cmd response data (40 bytes)
26,794,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,824,566 UART: [rt]cmd =0x44504543, len=24
26,879,761 >>> mbox cmd response data (40 bytes)
26,880,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,910,198 UART: [rt]cmd =0x44504543, len=24
26,965,390 >>> mbox cmd response data (40 bytes)
26,966,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,995,891 UART: [rt]cmd =0x44504543, len=24
27,050,627 >>> mbox cmd response data (40 bytes)
27,051,255 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,081,272 UART: [rt]cmd =0x44504543, len=24
27,135,956 >>> mbox cmd response data (40 bytes)
27,136,576 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,166,320 UART: [rt]cmd =0x44504543, len=24
27,200,426 >>> mbox cmd response data (40 bytes)
27,201,041 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,230,667 UART: [rt]cmd =0x44504543, len=24
27,285,883 >>> mbox cmd response data (40 bytes)
27,286,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,316,438 UART: [rt]cmd =0x44504543, len=24
27,371,606 >>> mbox cmd response data (40 bytes)
27,372,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,402,069 UART: [rt]cmd =0x44504543, len=24
27,456,643 >>> mbox cmd response data (40 bytes)
27,457,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,487,208 UART: [rt]cmd =0x44504543, len=24
27,493,441 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,439,437 ready_for_fw is high
3,439,853 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,731,070 >>> mbox cmd response: success
19,021,823 UART:
19,022,224 UART: Running Caliptra FMC ...
19,023,430 UART:
19,023,603 UART: [state] CFI Enabled
19,091,936 UART: [fht] FMC Alias Private Key: 7
20,855,493 UART: [art] Extend RT PCRs Done
20,856,732 UART: [art] Lock RT PCRs Done
20,858,419 UART: [art] Populate DV Done
20,863,887 UART: [fht] FMC Alias Private Key: 7
20,865,426 UART: [art] Derive CDI
20,866,245 UART: [art] Store in in slot 0x4
20,924,322 UART: [art] Derive Key Pair
20,925,358 UART: [art] Store priv key in slot 0x5
23,388,682 UART: [art] Derive Key Pair - Done
23,401,364 UART: [art] Signing Cert with AUTHO
23,402,667 UART: RITY.KEYID = 7
25,114,060 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,571 UART: [art] PUB.X = 63690B2172E9152A26176D5838DF396C27EB9E4F2542477BDB359B4E94943402CDF3EB2D8D35860B6667AFAA3F70530E
25,122,794 UART: [art] PUB.Y = 281865F3F094924A0809113F34D1114EAF40D969C509B676C319BE854ACB98F74F0B56345B3F83FA4A51836FA68A92DC
25,130,082 UART: [art] SIG.R = 521351B0109C70661612FFB13DCD96ECA460163B79252E5F421CAD8446A4F9E43C157C5D45889C307BFAFB0AF2DD583D
25,137,480 UART: [art] SIG.S = 7B38FA0442ADD1DF61DD9737AD09200A586AEB299E0118EF2198315ED19AE18A2F9B31A9E71EDF848C4FEB6BDEB0A2A8
26,116,467 UART: Caliptra RT
26,117,180 UART: [state] CFI Enabled
26,281,662 UART: [rt] RT listening for mailbox commands...
26,283,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,313,391 UART: [rt]cmd =0x44504543, len=24
26,364,394 >>> mbox cmd response data (40 bytes)
26,365,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,395,334 UART: [rt]cmd =0x44504543, len=24
26,449,686 >>> mbox cmd response data (40 bytes)
26,450,348 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,480,298 UART: [rt]cmd =0x44504543, len=24
26,534,847 >>> mbox cmd response data (40 bytes)
26,535,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,565,502 UART: [rt]cmd =0x44504543, len=24
26,620,406 >>> mbox cmd response data (40 bytes)
26,621,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,650,899 UART: [rt]cmd =0x44504543, len=24
26,705,977 >>> mbox cmd response data (40 bytes)
26,706,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,736,415 UART: [rt]cmd =0x44504543, len=24
26,791,317 >>> mbox cmd response data (40 bytes)
26,791,937 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,822,056 UART: [rt]cmd =0x44504543, len=24
26,877,220 >>> mbox cmd response data (40 bytes)
26,877,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,907,880 UART: [rt]cmd =0x44504543, len=24
26,962,608 >>> mbox cmd response data (40 bytes)
26,963,222 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,993,180 UART: [rt]cmd =0x44504543, len=24
27,047,968 >>> mbox cmd response data (40 bytes)
27,048,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,078,602 UART: [rt]cmd =0x44504543, len=24
27,133,825 >>> mbox cmd response data (40 bytes)
27,134,441 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,164,347 UART: [rt]cmd =0x44504543, len=24
27,219,128 >>> mbox cmd response data (40 bytes)
27,219,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,249,548 UART: [rt]cmd =0x44504543, len=24
27,304,582 >>> mbox cmd response data (40 bytes)
27,305,229 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,335,203 UART: [rt]cmd =0x44504543, len=24
27,390,181 >>> mbox cmd response data (40 bytes)
27,390,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,420,507 UART: [rt]cmd =0x44504543, len=24
27,475,364 >>> mbox cmd response data (40 bytes)
27,476,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,506,092 UART: [rt]cmd =0x44504543, len=24
27,561,069 >>> mbox cmd response data (40 bytes)
27,561,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,591,623 UART: [rt]cmd =0x44504543, len=24
27,598,131 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,373 UART:
192,755 UART: Running Caliptra ROM ...
193,846 UART:
603,693 UART: [state] CFI Enabled
617,567 UART: [state] LifecycleState = Unprovisioned
619,935 UART: [state] DebugLocked = No
621,094 UART: [state] WD Timer not started. Device not locked for debugging
625,119 UART: [kat] SHA2-256
814,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,704 UART: [kat] ++
826,231 UART: [kat] sha1
836,609 UART: [kat] SHA2-256
839,616 UART: [kat] SHA2-384
846,742 UART: [kat] SHA2-512-ACC
849,328 UART: [kat] ECC-384
3,288,484 UART: [kat] HMAC-384Kdf
3,302,410 UART: [kat] LMS
3,834,215 UART: [kat] --
3,839,696 UART: [cold-reset] ++
3,841,412 UART: [fht] FHT @ 0x50003400
3,851,817 UART: [idev] ++
3,852,521 UART: [idev] CDI.KEYID = 6
3,853,505 UART: [idev] SUBJECT.KEYID = 7
3,854,619 UART: [idev] UDS.KEYID = 0
3,855,603 ready_for_fw is high
3,855,786 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,385 UART: [idev] Erasing UDS.KEYID = 0
6,329,023 UART: [idev] Sha1 KeyId Algorithm
6,352,375 UART: [idev] --
6,356,882 UART: [ldev] ++
6,357,562 UART: [ldev] CDI.KEYID = 6
6,358,471 UART: [ldev] SUBJECT.KEYID = 5
6,359,682 UART: [ldev] AUTHORITY.KEYID = 7
6,360,876 UART: [ldev] FE.KEYID = 1
6,371,576 UART: [ldev] Erasing FE.KEYID = 1
8,848,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,575 UART: [ldev] --
10,640,431 UART: [fwproc] Wait for Commands...
10,643,335 UART: [fwproc] Recv command 0x46574c44
10,645,594 UART: [fwproc] Recv'd Img size: 114360 bytes
14,092,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,834,169 >>> mbox cmd response: success
14,838,522 UART: [afmc] ++
14,839,249 UART: [afmc] CDI.KEYID = 6
14,840,435 UART: [afmc] SUBJECT.KEYID = 7
14,841,866 UART: [afmc] AUTHORITY.KEYID = 5
17,342,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,230 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,555 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,605 UART: [afmc] --
19,137,792 UART: [cold-reset] --
19,142,252 UART: [state] Locking Datavault
19,147,355 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,541 UART: [state] Locking ICCM
19,152,337 UART: [exit] Launching FMC @ 0x40000130
19,161,012 UART:
19,161,270 UART: Running Caliptra FMC ...
19,162,373 UART:
19,162,531 UART: [state] CFI Enabled
19,170,575 UART: [fht] FMC Alias Private Key: 7
20,927,010 UART: [art] Extend RT PCRs Done
20,928,243 UART: [art] Lock RT PCRs Done
20,929,787 UART: [art] Populate DV Done
20,935,146 UART: [fht] FMC Alias Private Key: 7
20,936,746 UART: [art] Derive CDI
20,937,564 UART: [art] Store in in slot 0x4
20,979,941 UART: [art] Derive Key Pair
20,980,979 UART: [art] Store priv key in slot 0x5
23,407,510 UART: [art] Derive Key Pair - Done
23,420,290 UART: [art] Signing Cert with AUTHO
23,421,595 UART: RITY.KEYID = 7
25,127,091 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,613 UART: [art] PUB.X = CE88EB84B9192B66DD5031D7AF5937E82585D81E11A0B086A74E09CE9C7613C148F4B5AFA9CFD94B3F7558C657476190
25,135,872 UART: [art] PUB.Y = 81604B9125FB5509059C4CFBED294EA927E2D557C63A8F2CF1DA1F28E4222124765C13E3CD4C2412A76B62CB20BBAE3B
25,143,139 UART: [art] SIG.R = 482C8C6B72E83E5B0C2BE534418B73F2F103AA09AF449A2A21826416DB5B478ECE7ACD93C46022106ACAE0C64CBB2A18
25,150,536 UART: [art] SIG.S = B9AFD418E9478D8879182FF31D5A10BD9A46EF7E56105871AC715D88973ACF3D3BC56F2CFCB39EB9294CEB7446E8FC55
26,129,717 UART: Caliptra RT
26,130,426 UART: [state] CFI Enabled
26,247,324 UART: [rt] RT listening for mailbox commands...
26,249,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,279,113 UART: [rt]cmd =0x44504543, len=24
26,313,220 >>> mbox cmd response data (40 bytes)
26,314,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,343,613 UART: [rt]cmd =0x44504543, len=24
26,377,565 >>> mbox cmd response data (40 bytes)
26,378,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,408,207 UART: [rt]cmd =0x44504543, len=24
26,442,448 >>> mbox cmd response data (40 bytes)
26,443,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,473,125 UART: [rt]cmd =0x44504543, len=24
26,507,320 >>> mbox cmd response data (40 bytes)
26,507,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,537,963 UART: [rt]cmd =0x44504543, len=24
26,572,030 >>> mbox cmd response data (40 bytes)
26,572,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,602,649 UART: [rt]cmd =0x44504543, len=24
26,636,749 >>> mbox cmd response data (40 bytes)
26,637,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,667,318 UART: [rt]cmd =0x44504543, len=24
26,701,147 >>> mbox cmd response data (40 bytes)
26,701,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,731,868 UART: [rt]cmd =0x44504543, len=24
26,765,719 >>> mbox cmd response data (40 bytes)
26,766,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,796,232 UART: [rt]cmd =0x44504543, len=24
26,830,044 >>> mbox cmd response data (40 bytes)
26,830,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,860,914 UART: [rt]cmd =0x44504543, len=24
26,895,139 >>> mbox cmd response data (40 bytes)
26,895,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,925,752 UART: [rt]cmd =0x44504543, len=24
26,959,903 >>> mbox cmd response data (40 bytes)
26,960,516 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,990,372 UART: [rt]cmd =0x44504543, len=24
27,024,362 >>> mbox cmd response data (40 bytes)
27,024,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,054,815 UART: [rt]cmd =0x44504543, len=24
27,089,153 >>> mbox cmd response data (40 bytes)
27,089,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,119,852 UART: [rt]cmd =0x44504543, len=24
27,154,040 >>> mbox cmd response data (40 bytes)
27,154,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,184,586 UART: [rt]cmd =0x44504543, len=24
27,218,600 >>> mbox cmd response data (40 bytes)
27,219,384 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,249,117 UART: [rt]cmd =0x44504543, len=24
27,255,636 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,757,802 ready_for_fw is high
3,758,393 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,020 >>> mbox cmd response: success
19,214,835 UART:
19,215,261 UART: Running Caliptra FMC ...
19,216,374 UART:
19,216,535 UART: [state] CFI Enabled
19,224,544 UART: [fht] FMC Alias Private Key: 7
20,980,972 UART: [art] Extend RT PCRs Done
20,982,201 UART: [art] Lock RT PCRs Done
20,983,610 UART: [art] Populate DV Done
20,989,299 UART: [fht] FMC Alias Private Key: 7
20,990,866 UART: [art] Derive CDI
20,991,683 UART: [art] Store in in slot 0x4
21,034,275 UART: [art] Derive Key Pair
21,035,276 UART: [art] Store priv key in slot 0x5
23,461,763 UART: [art] Derive Key Pair - Done
23,474,705 UART: [art] Signing Cert with AUTHO
23,476,035 UART: RITY.KEYID = 7
25,181,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,718 UART: [art] PUB.X = DE3F3FF76E1720D117FDBF5A0B301186B860CD137462A7205FF9765F7C042CBB8EDB3C1A8A26CC45EC2868D86F87B873
25,189,973 UART: [art] PUB.Y = 482A9B5CDC6E0F39E23E3561E02B47976FB3CA640F1A1A1B71920BF85617DD2F00E080D5BA545642831F7130DF42414C
25,197,181 UART: [art] SIG.R = 1E6272F38027FD64396D336979F4CFF666B1B2A0345D4D6B12E8B44DB0806AFE3981F6724F10492DEF8E0223D756D23C
25,204,594 UART: [art] SIG.S = E8514972C6B767D744C5A1A5741A01036BD5E616BD5F8D148C5725171ED1E70F9EF9BA278E46A6354922BC90481C94F8
26,183,834 UART: Caliptra RT
26,184,541 UART: [state] CFI Enabled
26,302,469 UART: [rt] RT listening for mailbox commands...
26,304,394 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,334,347 UART: [rt]cmd =0x44504543, len=24
26,368,183 >>> mbox cmd response data (40 bytes)
26,368,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,398,971 UART: [rt]cmd =0x44504543, len=24
26,433,703 >>> mbox cmd response data (40 bytes)
26,434,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,464,327 UART: [rt]cmd =0x44504543, len=24
26,498,785 >>> mbox cmd response data (40 bytes)
26,499,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,529,335 UART: [rt]cmd =0x44504543, len=24
26,563,543 >>> mbox cmd response data (40 bytes)
26,564,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,593,965 UART: [rt]cmd =0x44504543, len=24
26,628,063 >>> mbox cmd response data (40 bytes)
26,628,679 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,658,799 UART: [rt]cmd =0x44504543, len=24
26,692,710 >>> mbox cmd response data (40 bytes)
26,693,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,723,064 UART: [rt]cmd =0x44504543, len=24
26,757,141 >>> mbox cmd response data (40 bytes)
26,757,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,787,850 UART: [rt]cmd =0x44504543, len=24
26,821,980 >>> mbox cmd response data (40 bytes)
26,822,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,852,368 UART: [rt]cmd =0x44504543, len=24
26,886,229 >>> mbox cmd response data (40 bytes)
26,886,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,916,936 UART: [rt]cmd =0x44504543, len=24
26,950,950 >>> mbox cmd response data (40 bytes)
26,951,562 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,981,255 UART: [rt]cmd =0x44504543, len=24
27,015,415 >>> mbox cmd response data (40 bytes)
27,016,052 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,045,699 UART: [rt]cmd =0x44504543, len=24
27,080,019 >>> mbox cmd response data (40 bytes)
27,080,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,110,373 UART: [rt]cmd =0x44504543, len=24
27,144,335 >>> mbox cmd response data (40 bytes)
27,144,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,174,982 UART: [rt]cmd =0x44504543, len=24
27,209,653 >>> mbox cmd response data (40 bytes)
27,210,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,240,031 UART: [rt]cmd =0x44504543, len=24
27,274,588 >>> mbox cmd response data (40 bytes)
27,275,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,305,042 UART: [rt]cmd =0x44504543, len=24
27,311,318 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,941 UART: [kat] SHA2-256
881,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,987 UART: [kat] ++
886,139 UART: [kat] sha1
890,481 UART: [kat] SHA2-256
892,419 UART: [kat] SHA2-384
895,216 UART: [kat] SHA2-512-ACC
897,117 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,708 UART: [kat] LMS
1,475,904 UART: [kat] --
1,476,415 UART: [cold-reset] ++
1,476,889 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 ready_for_fw is high
1,481,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,846 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,590 UART: [idev] --
1,514,639 UART: [ldev] ++
1,514,807 UART: [ldev] CDI.KEYID = 6
1,515,170 UART: [ldev] SUBJECT.KEYID = 5
1,515,596 UART: [ldev] AUTHORITY.KEYID = 7
1,516,059 UART: [ldev] FE.KEYID = 1
1,521,555 UART: [ldev] Erasing FE.KEYID = 1
1,546,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,346 UART: [ldev] --
1,585,727 UART: [fwproc] Waiting for Commands...
1,586,502 UART: [fwproc] Received command 0x46574c44
1,587,293 UART: [fwproc] Received Image of size 114360 bytes
2,885,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,654 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,935 >>> mbox cmd response: success
3,078,095 UART: [afmc] ++
3,078,263 UART: [afmc] CDI.KEYID = 6
3,078,625 UART: [afmc] SUBJECT.KEYID = 7
3,079,050 UART: [afmc] AUTHORITY.KEYID = 5
3,114,449 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,092 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,782 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,537 UART: [afmc] --
3,157,515 UART: [cold-reset] --
3,158,233 UART: [state] Locking Datavault
3,159,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,182 UART: [state] Locking ICCM
3,160,828 UART: [exit] Launching FMC @ 0x40000130
3,166,157 UART:
3,166,173 UART: Running Caliptra FMC ...
3,166,581 UART:
3,166,635 UART: [state] CFI Enabled
3,177,310 UART: [fht] FMC Alias Private Key: 7
3,286,117 UART: [art] Extend RT PCRs Done
3,286,545 UART: [art] Lock RT PCRs Done
3,288,039 UART: [art] Populate DV Done
3,296,454 UART: [fht] FMC Alias Private Key: 7
3,297,408 UART: [art] Derive CDI
3,297,688 UART: [art] Store in in slot 0x4
3,383,503 UART: [art] Derive Key Pair
3,383,863 UART: [art] Store priv key in slot 0x5
3,397,139 UART: [art] Derive Key Pair - Done
3,411,819 UART: [art] Signing Cert with AUTHO
3,412,299 UART: RITY.KEYID = 7
3,427,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,530 UART: [art] PUB.X = FCA5862DE7187577118A241AFAE1625AE89B845A84F004E991FF0C035689FED3EAF38B9306ED37A3141D110C752467BF
3,435,289 UART: [art] PUB.Y = 5933E975DD635F289879775DE87B5E3A92A2867D3B357C861C15533180BEC59D9EE998A1AB6162CBE912624F6B5A2650
3,442,235 UART: [art] SIG.R = A64D0F71840FD88AFD72510CE9A80E3375CFE432856AF86F7EB9133D085E54DA42BDABDAC0BD27A334CAC1F6F9E5B5EC
3,449,014 UART: [art] SIG.S = 8CED32D9799020C486C49B2732BAEF25D18134FEBAE5DFF50BE785AF992E62F05CEFD34816B0F65868421F1D4742C625
3,472,226 UART: Caliptra RT
3,472,480 UART: [state] CFI Enabled
3,580,939 UART: [rt] RT listening for mailbox commands...
3,581,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,174 UART: [rt]cmd =0x44504543, len=24
3,645,422 >>> mbox cmd response data (40 bytes)
3,645,423 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,052 UART: [rt]cmd =0x44504543, len=24
3,709,084 >>> mbox cmd response data (40 bytes)
3,709,085 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,328 UART: [rt]cmd =0x44504543, len=24
3,772,658 >>> mbox cmd response data (40 bytes)
3,772,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,802,078 UART: [rt]cmd =0x44504543, len=24
3,836,022 >>> mbox cmd response data (40 bytes)
3,836,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,390 UART: [rt]cmd =0x44504543, len=24
3,899,278 >>> mbox cmd response data (40 bytes)
3,899,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,928,540 UART: [rt]cmd =0x44504543, len=24
3,962,788 >>> mbox cmd response data (40 bytes)
3,962,789 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,390 UART: [rt]cmd =0x44504543, len=24
4,026,364 >>> mbox cmd response data (40 bytes)
4,026,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,055,960 UART: [rt]cmd =0x44504543, len=24
4,090,820 >>> mbox cmd response data (40 bytes)
4,090,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,196 UART: [rt]cmd =0x44504543, len=24
4,154,270 >>> mbox cmd response data (40 bytes)
4,154,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,183,626 UART: [rt]cmd =0x44504543, len=24
4,217,938 >>> mbox cmd response data (40 bytes)
4,217,939 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,247,152 UART: [rt]cmd =0x44504543, len=24
4,281,304 >>> mbox cmd response data (40 bytes)
4,281,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,310,958 UART: [rt]cmd =0x44504543, len=24
4,345,304 >>> mbox cmd response data (40 bytes)
4,345,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,704 UART: [rt]cmd =0x44504543, len=24
4,408,448 >>> mbox cmd response data (40 bytes)
4,408,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,437,798 UART: [rt]cmd =0x44504543, len=24
4,472,084 >>> mbox cmd response data (40 bytes)
4,472,085 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,626 UART: [rt]cmd =0x44504543, len=24
4,536,020 >>> mbox cmd response data (40 bytes)
4,536,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,565,616 UART: [rt]cmd =0x44504543, len=24
4,572,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,683 ready_for_fw is high
1,362,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,871 >>> mbox cmd response: success
2,987,725 UART:
2,987,741 UART: Running Caliptra FMC ...
2,988,149 UART:
2,988,203 UART: [state] CFI Enabled
2,998,570 UART: [fht] FMC Alias Private Key: 7
3,106,923 UART: [art] Extend RT PCRs Done
3,107,351 UART: [art] Lock RT PCRs Done
3,109,049 UART: [art] Populate DV Done
3,117,002 UART: [fht] FMC Alias Private Key: 7
3,118,072 UART: [art] Derive CDI
3,118,352 UART: [art] Store in in slot 0x4
3,204,277 UART: [art] Derive Key Pair
3,204,637 UART: [art] Store priv key in slot 0x5
3,217,475 UART: [art] Derive Key Pair - Done
3,232,033 UART: [art] Signing Cert with AUTHO
3,232,513 UART: RITY.KEYID = 7
3,247,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,868 UART: [art] PUB.X = E378DF66C7146F23B479F34696E30E011F36BFD255C85BA315592667976ABE44CD214B81C92FA46D2B601A698479AEDD
3,254,634 UART: [art] PUB.Y = A14981067C7A1A7509C372308BFBCFF35224DDF827BC10EFDB3E74A1A4FC5F063786C9AD876ED7313F6DE5C6B557A0FF
3,261,591 UART: [art] SIG.R = F171558A8DB0484EE95CC5CD06F4503B913CC40035FB437EB9C345B4B90782EEA29865E1C225D152BC069D73A1CD2DE6
3,268,338 UART: [art] SIG.S = 613F22828BA73F6C2ECA93F56A994126D63A48598407E824EB69C1B357D665F239ABA3C11CBB56FFF828890DA0DF4428
3,291,737 UART: Caliptra RT
3,291,991 UART: [state] CFI Enabled
3,400,513 UART: [rt] RT listening for mailbox commands...
3,401,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,854 UART: [rt]cmd =0x44504543, len=24
3,464,860 >>> mbox cmd response data (40 bytes)
3,464,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,348 UART: [rt]cmd =0x44504543, len=24
3,528,136 >>> mbox cmd response data (40 bytes)
3,528,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,664 UART: [rt]cmd =0x44504543, len=24
3,591,206 >>> mbox cmd response data (40 bytes)
3,591,207 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,966 UART: [rt]cmd =0x44504543, len=24
3,655,062 >>> mbox cmd response data (40 bytes)
3,655,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,538 UART: [rt]cmd =0x44504543, len=24
3,718,682 >>> mbox cmd response data (40 bytes)
3,718,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,156 UART: [rt]cmd =0x44504543, len=24
3,782,648 >>> mbox cmd response data (40 bytes)
3,782,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,162 UART: [rt]cmd =0x44504543, len=24
3,846,590 >>> mbox cmd response data (40 bytes)
3,846,591 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,956 UART: [rt]cmd =0x44504543, len=24
3,909,914 >>> mbox cmd response data (40 bytes)
3,909,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,172 UART: [rt]cmd =0x44504543, len=24
3,973,426 >>> mbox cmd response data (40 bytes)
3,973,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,002,898 UART: [rt]cmd =0x44504543, len=24
4,037,058 >>> mbox cmd response data (40 bytes)
4,037,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,548 UART: [rt]cmd =0x44504543, len=24
4,100,694 >>> mbox cmd response data (40 bytes)
4,100,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,130,042 UART: [rt]cmd =0x44504543, len=24
4,164,128 >>> mbox cmd response data (40 bytes)
4,164,129 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,666 UART: [rt]cmd =0x44504543, len=24
4,228,056 >>> mbox cmd response data (40 bytes)
4,228,057 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,257,642 UART: [rt]cmd =0x44504543, len=24
4,292,060 >>> mbox cmd response data (40 bytes)
4,292,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,321,582 UART: [rt]cmd =0x44504543, len=24
4,355,888 >>> mbox cmd response data (40 bytes)
4,355,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,385,324 UART: [rt]cmd =0x44504543, len=24
4,392,337 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
891,014 UART: [kat] SHA2-256
892,952 UART: [kat] SHA2-384
895,705 UART: [kat] SHA2-512-ACC
897,606 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,453 UART: [kat] LMS
1,475,649 UART: [kat] --
1,476,304 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 ready_for_fw is high
1,480,964 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,677 UART: [idev] Erasing UDS.KEYID = 0
1,505,671 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,427 UART: [idev] --
1,515,670 UART: [ldev] ++
1,515,838 UART: [ldev] CDI.KEYID = 6
1,516,201 UART: [ldev] SUBJECT.KEYID = 5
1,516,627 UART: [ldev] AUTHORITY.KEYID = 7
1,517,090 UART: [ldev] FE.KEYID = 1
1,522,524 UART: [ldev] Erasing FE.KEYID = 1
1,547,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,481 UART: [ldev] --
1,586,948 UART: [fwproc] Waiting for Commands...
1,587,639 UART: [fwproc] Received command 0x46574c44
1,588,430 UART: [fwproc] Received Image of size 114360 bytes
2,886,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,996 >>> mbox cmd response: success
3,080,238 UART: [afmc] ++
3,080,406 UART: [afmc] CDI.KEYID = 6
3,080,768 UART: [afmc] SUBJECT.KEYID = 7
3,081,193 UART: [afmc] AUTHORITY.KEYID = 5
3,115,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,196 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,589 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,279 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,296 UART: [afmc] --
3,159,232 UART: [cold-reset] --
3,159,956 UART: [state] Locking Datavault
3,161,241 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,845 UART: [state] Locking ICCM
3,162,265 UART: [exit] Launching FMC @ 0x40000130
3,167,594 UART:
3,167,610 UART: Running Caliptra FMC ...
3,168,018 UART:
3,168,161 UART: [state] CFI Enabled
3,178,564 UART: [fht] FMC Alias Private Key: 7
3,286,425 UART: [art] Extend RT PCRs Done
3,286,853 UART: [art] Lock RT PCRs Done
3,288,473 UART: [art] Populate DV Done
3,296,958 UART: [fht] FMC Alias Private Key: 7
3,297,998 UART: [art] Derive CDI
3,298,278 UART: [art] Store in in slot 0x4
3,383,855 UART: [art] Derive Key Pair
3,384,215 UART: [art] Store priv key in slot 0x5
3,396,779 UART: [art] Derive Key Pair - Done
3,411,272 UART: [art] Signing Cert with AUTHO
3,411,752 UART: RITY.KEYID = 7
3,426,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,605 UART: [art] PUB.X = 8BEC71C3429F7AD1D51AA325BB584FB46B446AC31C226EA18510B7FEB5DF0FA8C82F65478561AC58937635EF9A3671A1
3,434,382 UART: [art] PUB.Y = 3B1A72C6A0EF03B0F207E452278E8433E4A1C5DD36890A91E37C6AC57C22FC26EA834CA2E8CB2C2F0EA44F3216E9EA28
3,441,334 UART: [art] SIG.R = B8EC8D1C74A753A468C5CE571FB74D1CC1C04B94FD4A0E9AA1A96AE724470D3FD821AD92292B5C1C2427216B2D112772
3,448,108 UART: [art] SIG.S = E4704D729A711280713E6E217AF04F850494497C29C74CD25C2AB1C02D35683F19B7EB45E995048DB85AF0BE0F4C9497
3,471,568 UART: Caliptra RT
3,471,914 UART: [state] CFI Enabled
3,579,721 UART: [rt] RT listening for mailbox commands...
3,580,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,962 UART: [rt]cmd =0x44504543, len=24
3,643,892 >>> mbox cmd response data (40 bytes)
3,643,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,286 UART: [rt]cmd =0x44504543, len=24
3,707,308 >>> mbox cmd response data (40 bytes)
3,707,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,732 UART: [rt]cmd =0x44504543, len=24
3,770,604 >>> mbox cmd response data (40 bytes)
3,770,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,800,212 UART: [rt]cmd =0x44504543, len=24
3,834,324 >>> mbox cmd response data (40 bytes)
3,834,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,962 UART: [rt]cmd =0x44504543, len=24
3,897,650 >>> mbox cmd response data (40 bytes)
3,897,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,370 UART: [rt]cmd =0x44504543, len=24
3,961,434 >>> mbox cmd response data (40 bytes)
3,961,435 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,872 UART: [rt]cmd =0x44504543, len=24
4,024,526 >>> mbox cmd response data (40 bytes)
4,024,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,054,084 UART: [rt]cmd =0x44504543, len=24
4,088,270 >>> mbox cmd response data (40 bytes)
4,088,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,500 UART: [rt]cmd =0x44504543, len=24
4,151,404 >>> mbox cmd response data (40 bytes)
4,151,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,181,006 UART: [rt]cmd =0x44504543, len=24
4,214,770 >>> mbox cmd response data (40 bytes)
4,214,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,244,248 UART: [rt]cmd =0x44504543, len=24
4,278,784 >>> mbox cmd response data (40 bytes)
4,278,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,308,298 UART: [rt]cmd =0x44504543, len=24
4,342,286 >>> mbox cmd response data (40 bytes)
4,342,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,718 UART: [rt]cmd =0x44504543, len=24
4,405,996 >>> mbox cmd response data (40 bytes)
4,405,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,435,478 UART: [rt]cmd =0x44504543, len=24
4,469,540 >>> mbox cmd response data (40 bytes)
4,469,541 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,499,220 UART: [rt]cmd =0x44504543, len=24
4,533,258 >>> mbox cmd response data (40 bytes)
4,533,259 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,562,788 UART: [rt]cmd =0x44504543, len=24
4,569,833 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,578 ready_for_fw is high
1,362,578 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,326 >>> mbox cmd response: success
2,989,652 UART:
2,989,668 UART: Running Caliptra FMC ...
2,990,076 UART:
2,990,219 UART: [state] CFI Enabled
3,000,620 UART: [fht] FMC Alias Private Key: 7
3,108,603 UART: [art] Extend RT PCRs Done
3,109,031 UART: [art] Lock RT PCRs Done
3,110,307 UART: [art] Populate DV Done
3,118,470 UART: [fht] FMC Alias Private Key: 7
3,119,418 UART: [art] Derive CDI
3,119,698 UART: [art] Store in in slot 0x4
3,205,303 UART: [art] Derive Key Pair
3,205,663 UART: [art] Store priv key in slot 0x5
3,218,905 UART: [art] Derive Key Pair - Done
3,233,457 UART: [art] Signing Cert with AUTHO
3,233,937 UART: RITY.KEYID = 7
3,249,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,044 UART: [art] PUB.X = 8C8EFB2F90F1DEE6D5599FC4C5F43022BA5FCDB865F70ED60ADFE80AAF7181EADA73650FAA844417F9ED5213960EAE74
3,256,823 UART: [art] PUB.Y = 103386E5BF91EB6AD2527BADD70E506D469DE285CABD2EBAD1A35815B316664B0022FE040E6445A7850C26D36CA6CD9C
3,263,751 UART: [art] SIG.R = E718C219EF635FCD492079836B199E32FDA480033483BE0D20C18656D1AF7E37146D58F1091251E40A280C31A31C3FA0
3,270,502 UART: [art] SIG.S = BC4AA7D83987655618E9E59C70F6506A6C366DCF119BBA32139B9FC226C23D9EE6B1988B068403CFC449B1B1935FEFA4
3,294,121 UART: Caliptra RT
3,294,467 UART: [state] CFI Enabled
3,402,788 UART: [rt] RT listening for mailbox commands...
3,403,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,119 UART: [rt]cmd =0x44504543, len=24
3,467,059 >>> mbox cmd response data (40 bytes)
3,467,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,603 UART: [rt]cmd =0x44504543, len=24
3,530,761 >>> mbox cmd response data (40 bytes)
3,530,762 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,409 UART: [rt]cmd =0x44504543, len=24
3,594,287 >>> mbox cmd response data (40 bytes)
3,594,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,607 UART: [rt]cmd =0x44504543, len=24
3,657,695 >>> mbox cmd response data (40 bytes)
3,657,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,275 UART: [rt]cmd =0x44504543, len=24
3,721,721 >>> mbox cmd response data (40 bytes)
3,721,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,181 UART: [rt]cmd =0x44504543, len=24
3,784,745 >>> mbox cmd response data (40 bytes)
3,784,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,983 UART: [rt]cmd =0x44504543, len=24
3,848,335 >>> mbox cmd response data (40 bytes)
3,848,336 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,819 UART: [rt]cmd =0x44504543, len=24
3,912,127 >>> mbox cmd response data (40 bytes)
3,912,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,621 UART: [rt]cmd =0x44504543, len=24
3,975,325 >>> mbox cmd response data (40 bytes)
3,975,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,629 UART: [rt]cmd =0x44504543, len=24
4,038,993 >>> mbox cmd response data (40 bytes)
4,038,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,533 UART: [rt]cmd =0x44504543, len=24
4,102,925 >>> mbox cmd response data (40 bytes)
4,102,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,132,531 UART: [rt]cmd =0x44504543, len=24
4,166,635 >>> mbox cmd response data (40 bytes)
4,166,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,921 UART: [rt]cmd =0x44504543, len=24
4,230,159 >>> mbox cmd response data (40 bytes)
4,230,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,259,729 UART: [rt]cmd =0x44504543, len=24
4,293,859 >>> mbox cmd response data (40 bytes)
4,293,860 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,331 UART: [rt]cmd =0x44504543, len=24
4,357,821 >>> mbox cmd response data (40 bytes)
4,357,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,387,201 UART: [rt]cmd =0x44504543, len=24
4,394,544 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,686 UART: [state] LifecycleState = Unprovisioned
86,341 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
893,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,813 UART: [kat] ++
897,965 UART: [kat] sha1
902,333 UART: [kat] SHA2-256
904,273 UART: [kat] SHA2-384
907,194 UART: [kat] SHA2-512-ACC
909,095 UART: [kat] ECC-384
918,556 UART: [kat] HMAC-384Kdf
923,144 UART: [kat] LMS
1,171,472 UART: [kat] --
1,172,659 UART: [cold-reset] ++
1,173,141 UART: [fht] FHT @ 0x50003400
1,175,694 UART: [idev] ++
1,175,862 UART: [idev] CDI.KEYID = 6
1,176,222 UART: [idev] SUBJECT.KEYID = 7
1,176,646 UART: [idev] UDS.KEYID = 0
1,176,991 ready_for_fw is high
1,176,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,678 UART: [idev] Erasing UDS.KEYID = 0
1,202,167 UART: [idev] Sha1 KeyId Algorithm
1,210,661 UART: [idev] --
1,211,639 UART: [ldev] ++
1,211,807 UART: [ldev] CDI.KEYID = 6
1,212,170 UART: [ldev] SUBJECT.KEYID = 5
1,212,596 UART: [ldev] AUTHORITY.KEYID = 7
1,213,059 UART: [ldev] FE.KEYID = 1
1,218,407 UART: [ldev] Erasing FE.KEYID = 1
1,244,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,749 UART: [ldev] --
1,284,158 UART: [fwproc] Wait for Commands...
1,284,958 UART: [fwproc] Recv command 0x46574c44
1,285,686 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,592 >>> mbox cmd response: success
2,777,646 UART: [afmc] ++
2,777,814 UART: [afmc] CDI.KEYID = 6
2,778,176 UART: [afmc] SUBJECT.KEYID = 7
2,778,601 UART: [afmc] AUTHORITY.KEYID = 5
2,814,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,061 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,946 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,499 UART: [afmc] --
2,857,491 UART: [cold-reset] --
2,858,235 UART: [state] Locking Datavault
2,859,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,164 UART: [state] Locking ICCM
2,860,800 UART: [exit] Launching FMC @ 0x40000130
2,866,129 UART:
2,866,145 UART: Running Caliptra FMC ...
2,866,553 UART:
2,866,607 UART: [state] CFI Enabled
2,877,112 UART: [fht] FMC Alias Private Key: 7
2,984,627 UART: [art] Extend RT PCRs Done
2,985,055 UART: [art] Lock RT PCRs Done
2,986,573 UART: [art] Populate DV Done
2,994,726 UART: [fht] FMC Alias Private Key: 7
2,995,852 UART: [art] Derive CDI
2,996,132 UART: [art] Store in in slot 0x4
3,081,693 UART: [art] Derive Key Pair
3,082,053 UART: [art] Store priv key in slot 0x5
3,095,583 UART: [art] Derive Key Pair - Done
3,110,482 UART: [art] Signing Cert with AUTHO
3,110,962 UART: RITY.KEYID = 7
3,125,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,349 UART: [art] PUB.X = A548B80DFB5156ADE7CB55446A282ED53A4FE6108CBF3A89B47C4F3483BE51D87EF8DBA4E58721ED780A69C740257B23
3,133,125 UART: [art] PUB.Y = AA21426726127042E588CBEC9B824D12DFC8BE48040D0D5598C52DFEC4C372206E23F154B9759BD0D4E4D75DF85E866A
3,140,072 UART: [art] SIG.R = 2473CE1FFEF672B73117EBC460296752EB8D541292649ABD862083B7587C14A21C7129E13F185B401D20437C5A088F81
3,146,831 UART: [art] SIG.S = DB1FEBB751E310B923C73C3F9DC7AED69C467DBA7F9B1F3A36063A3D026F03304F34AB13A18D6ED552EED1E1E00B8138
3,170,792 UART: Caliptra RT
3,171,046 UART: [state] CFI Enabled
3,278,758 UART: [rt] RT listening for mailbox commands...
3,279,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,255 UART: [rt]cmd =0x44504543, len=24
3,343,735 >>> mbox cmd response data (40 bytes)
3,343,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,911 UART: [rt]cmd =0x44504543, len=24
3,407,273 >>> mbox cmd response data (40 bytes)
3,407,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,747 UART: [rt]cmd =0x44504543, len=24
3,471,099 >>> mbox cmd response data (40 bytes)
3,471,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,677 UART: [rt]cmd =0x44504543, len=24
3,534,631 >>> mbox cmd response data (40 bytes)
3,534,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,985 UART: [rt]cmd =0x44504543, len=24
3,597,951 >>> mbox cmd response data (40 bytes)
3,597,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,253 UART: [rt]cmd =0x44504543, len=24
3,661,317 >>> mbox cmd response data (40 bytes)
3,661,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,787 UART: [rt]cmd =0x44504543, len=24
3,725,189 >>> mbox cmd response data (40 bytes)
3,725,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,723 UART: [rt]cmd =0x44504543, len=24
3,789,147 >>> mbox cmd response data (40 bytes)
3,789,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,751 UART: [rt]cmd =0x44504543, len=24
3,852,925 >>> mbox cmd response data (40 bytes)
3,852,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,563 UART: [rt]cmd =0x44504543, len=24
3,916,189 >>> mbox cmd response data (40 bytes)
3,916,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,631 UART: [rt]cmd =0x44504543, len=24
3,979,873 >>> mbox cmd response data (40 bytes)
3,979,874 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,197 UART: [rt]cmd =0x44504543, len=24
4,043,455 >>> mbox cmd response data (40 bytes)
4,043,456 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,855 UART: [rt]cmd =0x44504543, len=24
4,107,127 >>> mbox cmd response data (40 bytes)
4,107,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,136,459 UART: [rt]cmd =0x44504543, len=24
4,170,439 >>> mbox cmd response data (40 bytes)
4,170,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,911 UART: [rt]cmd =0x44504543, len=24
4,234,191 >>> mbox cmd response data (40 bytes)
4,234,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,263,821 UART: [rt]cmd =0x44504543, len=24
4,271,174 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,473 ready_for_fw is high
1,059,473 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,637 >>> mbox cmd response: success
2,686,367 UART:
2,686,383 UART: Running Caliptra FMC ...
2,686,791 UART:
2,686,845 UART: [state] CFI Enabled
2,697,322 UART: [fht] FMC Alias Private Key: 7
2,805,541 UART: [art] Extend RT PCRs Done
2,805,969 UART: [art] Lock RT PCRs Done
2,807,347 UART: [art] Populate DV Done
2,815,626 UART: [fht] FMC Alias Private Key: 7
2,816,602 UART: [art] Derive CDI
2,816,882 UART: [art] Store in in slot 0x4
2,902,663 UART: [art] Derive Key Pair
2,903,023 UART: [art] Store priv key in slot 0x5
2,916,049 UART: [art] Derive Key Pair - Done
2,930,892 UART: [art] Signing Cert with AUTHO
2,931,372 UART: RITY.KEYID = 7
2,946,232 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,997 UART: [art] PUB.X = C868F2976DAC807A1EAF06535ED7FD8D70A81E5C9104C0B20A8BF669CE5A097955EB4AA66534C60F36EC6EFB9522A6BA
2,953,768 UART: [art] PUB.Y = 204D547C8C05E9C43313336C01773796CBDB3DFD89D70DDEC9692547902016A543F074A9E4E4FF58592575E2B118198C
2,960,703 UART: [art] SIG.R = CD2CDA93EA66E5AA7DBD1EF84B2824F883B3B9D926ADA7424AF8B34F56461A5E1F5F40CD559DF5E45F289025CACCF04D
2,967,497 UART: [art] SIG.S = D6A82AE80888452D4428C0F2C3F1BD4D74D88147ADAB4185794CC99229F4DC7250C9FDFC7F08A5EA8BE72AD490A90EAC
2,991,175 UART: Caliptra RT
2,991,429 UART: [state] CFI Enabled
3,099,118 UART: [rt] RT listening for mailbox commands...
3,099,788 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,397 UART: [rt]cmd =0x44504543, len=24
3,163,311 >>> mbox cmd response data (40 bytes)
3,163,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,747 UART: [rt]cmd =0x44504543, len=24
3,226,909 >>> mbox cmd response data (40 bytes)
3,226,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,471 UART: [rt]cmd =0x44504543, len=24
3,290,715 >>> mbox cmd response data (40 bytes)
3,290,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,911 UART: [rt]cmd =0x44504543, len=24
3,354,191 >>> mbox cmd response data (40 bytes)
3,354,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,641 UART: [rt]cmd =0x44504543, len=24
3,417,649 >>> mbox cmd response data (40 bytes)
3,417,650 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,161 UART: [rt]cmd =0x44504543, len=24
3,481,745 >>> mbox cmd response data (40 bytes)
3,481,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,987 UART: [rt]cmd =0x44504543, len=24
3,545,063 >>> mbox cmd response data (40 bytes)
3,545,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,733 UART: [rt]cmd =0x44504543, len=24
3,609,007 >>> mbox cmd response data (40 bytes)
3,609,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,309 UART: [rt]cmd =0x44504543, len=24
3,671,965 >>> mbox cmd response data (40 bytes)
3,671,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,305 UART: [rt]cmd =0x44504543, len=24
3,735,461 >>> mbox cmd response data (40 bytes)
3,735,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,071 UART: [rt]cmd =0x44504543, len=24
3,799,319 >>> mbox cmd response data (40 bytes)
3,799,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,027 UART: [rt]cmd =0x44504543, len=24
3,863,139 >>> mbox cmd response data (40 bytes)
3,863,140 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,737 UART: [rt]cmd =0x44504543, len=24
3,927,059 >>> mbox cmd response data (40 bytes)
3,927,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,695 UART: [rt]cmd =0x44504543, len=24
3,991,409 >>> mbox cmd response data (40 bytes)
3,991,410 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,019 UART: [rt]cmd =0x44504543, len=24
4,054,791 >>> mbox cmd response data (40 bytes)
4,054,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,287 UART: [rt]cmd =0x44504543, len=24
4,091,528 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
893,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,984 UART: [kat] ++
898,136 UART: [kat] sha1
902,410 UART: [kat] SHA2-256
904,350 UART: [kat] SHA2-384
907,251 UART: [kat] SHA2-512-ACC
909,152 UART: [kat] ECC-384
918,967 UART: [kat] HMAC-384Kdf
923,787 UART: [kat] LMS
1,172,115 UART: [kat] --
1,172,964 UART: [cold-reset] ++
1,173,370 UART: [fht] FHT @ 0x50003400
1,175,821 UART: [idev] ++
1,175,989 UART: [idev] CDI.KEYID = 6
1,176,349 UART: [idev] SUBJECT.KEYID = 7
1,176,773 UART: [idev] UDS.KEYID = 0
1,177,118 ready_for_fw is high
1,177,118 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,171 UART: [idev] Erasing UDS.KEYID = 0
1,201,260 UART: [idev] Sha1 KeyId Algorithm
1,209,888 UART: [idev] --
1,210,778 UART: [ldev] ++
1,210,946 UART: [ldev] CDI.KEYID = 6
1,211,309 UART: [ldev] SUBJECT.KEYID = 5
1,211,735 UART: [ldev] AUTHORITY.KEYID = 7
1,212,198 UART: [ldev] FE.KEYID = 1
1,217,480 UART: [ldev] Erasing FE.KEYID = 1
1,243,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,796 UART: [ldev] --
1,283,281 UART: [fwproc] Wait for Commands...
1,284,097 UART: [fwproc] Recv command 0x46574c44
1,284,825 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,549 >>> mbox cmd response: success
2,774,751 UART: [afmc] ++
2,774,919 UART: [afmc] CDI.KEYID = 6
2,775,281 UART: [afmc] SUBJECT.KEYID = 7
2,775,706 UART: [afmc] AUTHORITY.KEYID = 5
2,811,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,816 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,148 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,128 UART: [afmc] --
2,855,060 UART: [cold-reset] --
2,856,008 UART: [state] Locking Datavault
2,857,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,761 UART: [state] Locking ICCM
2,858,253 UART: [exit] Launching FMC @ 0x40000130
2,863,582 UART:
2,863,598 UART: Running Caliptra FMC ...
2,864,006 UART:
2,864,149 UART: [state] CFI Enabled
2,874,598 UART: [fht] FMC Alias Private Key: 7
2,982,347 UART: [art] Extend RT PCRs Done
2,982,775 UART: [art] Lock RT PCRs Done
2,984,417 UART: [art] Populate DV Done
2,992,738 UART: [fht] FMC Alias Private Key: 7
2,993,762 UART: [art] Derive CDI
2,994,042 UART: [art] Store in in slot 0x4
3,079,711 UART: [art] Derive Key Pair
3,080,071 UART: [art] Store priv key in slot 0x5
3,093,949 UART: [art] Derive Key Pair - Done
3,108,979 UART: [art] Signing Cert with AUTHO
3,109,459 UART: RITY.KEYID = 7
3,124,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,412 UART: [art] PUB.X = BCBE46D2A31B006723010DB7E4D33C32121A9CC062F037029A682CCE04C1BAD9A344244FD45C88C11D19B93D2DFA9226
3,132,156 UART: [art] PUB.Y = 445F355FFEFA52F4326D705749A437BC48891632723DFAA9C6B5790CC74B79D67C48B5DB25EA10E5BA77F8EC71B876B1
3,139,111 UART: [art] SIG.R = CE1FD7F68787A9ED2A78A60F34739371F81C4C5725881C00E2CA9ADB938C05CCC5D0612E673FF236C31627451122FBB7
3,145,857 UART: [art] SIG.S = 1D7BFCA474B9E4389BA098165C61C3C928FA2FC6293971DDA723572BEC1AD3763A3142D3C2ABDDC781C5E8BC2DCED924
3,169,484 UART: Caliptra RT
3,169,830 UART: [state] CFI Enabled
3,277,506 UART: [rt] RT listening for mailbox commands...
3,278,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,821 UART: [rt]cmd =0x44504543, len=24
3,341,857 >>> mbox cmd response data (40 bytes)
3,341,858 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,271 UART: [rt]cmd =0x44504543, len=24
3,405,315 >>> mbox cmd response data (40 bytes)
3,405,316 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,809 UART: [rt]cmd =0x44504543, len=24
3,468,637 >>> mbox cmd response data (40 bytes)
3,468,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,927 UART: [rt]cmd =0x44504543, len=24
3,532,019 >>> mbox cmd response data (40 bytes)
3,532,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,641 UART: [rt]cmd =0x44504543, len=24
3,595,791 >>> mbox cmd response data (40 bytes)
3,595,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,325 UART: [rt]cmd =0x44504543, len=24
3,659,407 >>> mbox cmd response data (40 bytes)
3,659,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,947 UART: [rt]cmd =0x44504543, len=24
3,723,383 >>> mbox cmd response data (40 bytes)
3,723,384 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,895 UART: [rt]cmd =0x44504543, len=24
3,786,995 >>> mbox cmd response data (40 bytes)
3,786,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,603 UART: [rt]cmd =0x44504543, len=24
3,851,101 >>> mbox cmd response data (40 bytes)
3,851,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,561 UART: [rt]cmd =0x44504543, len=24
3,915,187 >>> mbox cmd response data (40 bytes)
3,915,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,601 UART: [rt]cmd =0x44504543, len=24
3,978,973 >>> mbox cmd response data (40 bytes)
3,978,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,493 UART: [rt]cmd =0x44504543, len=24
4,042,777 >>> mbox cmd response data (40 bytes)
4,042,778 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,357 UART: [rt]cmd =0x44504543, len=24
4,106,385 >>> mbox cmd response data (40 bytes)
4,106,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,136,229 UART: [rt]cmd =0x44504543, len=24
4,170,351 >>> mbox cmd response data (40 bytes)
4,170,352 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,869 UART: [rt]cmd =0x44504543, len=24
4,233,973 >>> mbox cmd response data (40 bytes)
4,233,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,263,421 UART: [rt]cmd =0x44504543, len=24
4,270,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,764 ready_for_fw is high
1,060,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,815 >>> mbox cmd response: success
2,688,555 UART:
2,688,571 UART: Running Caliptra FMC ...
2,688,979 UART:
2,689,122 UART: [state] CFI Enabled
2,699,629 UART: [fht] FMC Alias Private Key: 7
2,807,866 UART: [art] Extend RT PCRs Done
2,808,294 UART: [art] Lock RT PCRs Done
2,810,008 UART: [art] Populate DV Done
2,818,009 UART: [fht] FMC Alias Private Key: 7
2,818,949 UART: [art] Derive CDI
2,819,229 UART: [art] Store in in slot 0x4
2,904,694 UART: [art] Derive Key Pair
2,905,054 UART: [art] Store priv key in slot 0x5
2,917,626 UART: [art] Derive Key Pair - Done
2,932,415 UART: [art] Signing Cert with AUTHO
2,932,895 UART: RITY.KEYID = 7
2,948,033 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,798 UART: [art] PUB.X = 2F9377655A279E89AA2ED55FDC3FAE020241EFC179B84A1259CDF3B862C93C8F617190852ABAA0261B89DBF9F6CD52AB
2,955,576 UART: [art] PUB.Y = 332C7DF14BD3BDB9A7E2E36C85C41D7909E034F79EEDAD68B3054AD74241EAF855956982858C53388E3867D33ADD8333
2,962,524 UART: [art] SIG.R = 349719F26DE95E13FB1B2EB6983B51A65ED9E4358A372EAB4C534144A1C68037F7D626FBB5B4CAABBF3716AFCA515F97
2,969,308 UART: [art] SIG.S = 84B734B52B2E03E98D47A283700635A543353DB9EB9C53FD7E206EA8087D3A96B572ADF372393A19CA072A09DE07B9D6
2,993,547 UART: Caliptra RT
2,993,893 UART: [state] CFI Enabled
3,101,531 UART: [rt] RT listening for mailbox commands...
3,102,201 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,578 UART: [rt]cmd =0x44504543, len=24
3,165,652 >>> mbox cmd response data (40 bytes)
3,165,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,146 UART: [rt]cmd =0x44504543, len=24
3,229,266 >>> mbox cmd response data (40 bytes)
3,229,267 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,258,922 UART: [rt]cmd =0x44504543, len=24
3,292,764 >>> mbox cmd response data (40 bytes)
3,292,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,154 UART: [rt]cmd =0x44504543, len=24
3,356,658 >>> mbox cmd response data (40 bytes)
3,356,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,280 UART: [rt]cmd =0x44504543, len=24
3,420,380 >>> mbox cmd response data (40 bytes)
3,420,381 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,944 UART: [rt]cmd =0x44504543, len=24
3,484,300 >>> mbox cmd response data (40 bytes)
3,484,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,732 UART: [rt]cmd =0x44504543, len=24
3,547,766 >>> mbox cmd response data (40 bytes)
3,547,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,072 UART: [rt]cmd =0x44504543, len=24
3,611,058 >>> mbox cmd response data (40 bytes)
3,611,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,548 UART: [rt]cmd =0x44504543, len=24
3,674,708 >>> mbox cmd response data (40 bytes)
3,674,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,150 UART: [rt]cmd =0x44504543, len=24
3,738,858 >>> mbox cmd response data (40 bytes)
3,738,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,260 UART: [rt]cmd =0x44504543, len=24
3,802,442 >>> mbox cmd response data (40 bytes)
3,802,443 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,210 UART: [rt]cmd =0x44504543, len=24
3,866,188 >>> mbox cmd response data (40 bytes)
3,866,189 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,360 UART: [rt]cmd =0x44504543, len=24
3,929,714 >>> mbox cmd response data (40 bytes)
3,929,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,314 UART: [rt]cmd =0x44504543, len=24
3,993,536 >>> mbox cmd response data (40 bytes)
3,993,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,096 UART: [rt]cmd =0x44504543, len=24
4,057,550 >>> mbox cmd response data (40 bytes)
4,057,551 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,186 UART: [rt]cmd =0x44504543, len=24
4,094,291 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,275 UART: [kat] SHA2-256
901,215 UART: [kat] SHA2-384
903,902 UART: [kat] SHA2-512-ACC
905,803 UART: [kat] ECC-384
915,412 UART: [kat] HMAC-384Kdf
920,082 UART: [kat] LMS
1,168,394 UART: [kat] --
1,169,255 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,429 UART: [idev] ++
1,172,597 UART: [idev] CDI.KEYID = 6
1,172,958 UART: [idev] SUBJECT.KEYID = 7
1,173,383 UART: [idev] UDS.KEYID = 0
1,173,729 ready_for_fw is high
1,173,729 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,616 UART: [ldev] --
1,280,990 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,805 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,928 >>> mbox cmd response: success
2,773,979 UART: [afmc] ++
2,774,147 UART: [afmc] CDI.KEYID = 6
2,774,510 UART: [afmc] SUBJECT.KEYID = 7
2,774,936 UART: [afmc] AUTHORITY.KEYID = 5
2,810,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,198 UART: [afmc] --
2,854,204 UART: [cold-reset] --
2,855,202 UART: [state] Locking Datavault
2,856,311 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,915 UART: [state] Locking ICCM
2,857,417 UART: [exit] Launching FMC @ 0x40000130
2,862,746 UART:
2,862,762 UART: Running Caliptra FMC ...
2,863,170 UART:
2,863,224 UART: [state] CFI Enabled
2,873,655 UART: [fht] FMC Alias Private Key: 7
2,981,608 UART: [art] Extend RT PCRs Done
2,982,036 UART: [art] Lock RT PCRs Done
2,983,324 UART: [art] Populate DV Done
2,991,533 UART: [fht] FMC Alias Private Key: 7
2,992,551 UART: [art] Derive CDI
2,992,831 UART: [art] Store in in slot 0x4
3,078,376 UART: [art] Derive Key Pair
3,078,736 UART: [art] Store priv key in slot 0x5
3,091,686 UART: [art] Derive Key Pair - Done
3,106,678 UART: [art] Signing Cert with AUTHO
3,107,158 UART: RITY.KEYID = 7
3,121,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,741 UART: [art] PUB.X = CC371BEE70FE6D33E6FEE3D281844EEB926832C71D55C073956EFDF1BA18086EC628E99BE909F95E6304BDE4CC5DFFF3
3,129,522 UART: [art] PUB.Y = D42A8FE74A2AD692877183E065B10AD88F51A41F646E6A32432D68B8698EAE219B916374E2A55FCB4AC38E747A14EAC6
3,136,475 UART: [art] SIG.R = CCA6E44CCAF0ACC8E96116F5213F200861459B1ECCBB1D9277EE627E3656748B920F1A44047E5D83BEC9FC3E1DABB02B
3,143,254 UART: [art] SIG.S = 22244AE356F2DE7B0D81CED21C0C8027AC5EF5CB5466060FF9A1CAFB58679B2ED38DDDF913042708AE7FCD0385B5CB26
3,166,996 UART: Caliptra RT
3,167,250 UART: [state] CFI Enabled
3,275,262 UART: [rt] RT listening for mailbox commands...
3,275,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,665 UART: [rt]cmd =0x44504543, len=24
3,339,653 >>> mbox cmd response data (40 bytes)
3,339,654 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,223 UART: [rt]cmd =0x44504543, len=24
3,402,847 >>> mbox cmd response data (40 bytes)
3,402,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,471 UART: [rt]cmd =0x44504543, len=24
3,466,753 >>> mbox cmd response data (40 bytes)
3,466,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,145 UART: [rt]cmd =0x44504543, len=24
3,530,469 >>> mbox cmd response data (40 bytes)
3,530,470 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,937 UART: [rt]cmd =0x44504543, len=24
3,593,803 >>> mbox cmd response data (40 bytes)
3,593,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,359 UART: [rt]cmd =0x44504543, len=24
3,657,151 >>> mbox cmd response data (40 bytes)
3,657,152 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,607 UART: [rt]cmd =0x44504543, len=24
3,720,665 >>> mbox cmd response data (40 bytes)
3,720,666 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,179 UART: [rt]cmd =0x44504543, len=24
3,784,353 >>> mbox cmd response data (40 bytes)
3,784,354 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,945 UART: [rt]cmd =0x44504543, len=24
3,848,641 >>> mbox cmd response data (40 bytes)
3,848,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,109 UART: [rt]cmd =0x44504543, len=24
3,911,907 >>> mbox cmd response data (40 bytes)
3,911,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,359 UART: [rt]cmd =0x44504543, len=24
3,975,525 >>> mbox cmd response data (40 bytes)
3,975,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,047 UART: [rt]cmd =0x44504543, len=24
4,039,273 >>> mbox cmd response data (40 bytes)
4,039,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,585 UART: [rt]cmd =0x44504543, len=24
4,103,375 >>> mbox cmd response data (40 bytes)
4,103,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,133,009 UART: [rt]cmd =0x44504543, len=24
4,166,785 >>> mbox cmd response data (40 bytes)
4,166,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,201 UART: [rt]cmd =0x44504543, len=24
4,230,239 >>> mbox cmd response data (40 bytes)
4,230,240 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,259,709 UART: [rt]cmd =0x44504543, len=24
4,266,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,352 ready_for_fw is high
1,056,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,530 >>> mbox cmd response: success
2,683,124 UART:
2,683,140 UART: Running Caliptra FMC ...
2,683,548 UART:
2,683,602 UART: [state] CFI Enabled
2,693,647 UART: [fht] FMC Alias Private Key: 7
2,802,048 UART: [art] Extend RT PCRs Done
2,802,476 UART: [art] Lock RT PCRs Done
2,803,904 UART: [art] Populate DV Done
2,812,119 UART: [fht] FMC Alias Private Key: 7
2,813,195 UART: [art] Derive CDI
2,813,475 UART: [art] Store in in slot 0x4
2,898,780 UART: [art] Derive Key Pair
2,899,140 UART: [art] Store priv key in slot 0x5
2,912,104 UART: [art] Derive Key Pair - Done
2,926,809 UART: [art] Signing Cert with AUTHO
2,927,289 UART: RITY.KEYID = 7
2,942,521 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,286 UART: [art] PUB.X = 13F3985D73BB88CC35F9EF0C1BC4D27E40B937DEBC8F93F34C22C457E92677E70530236DC64F264197483C60EF715F71
2,950,052 UART: [art] PUB.Y = 458288CAFD6F2D9902D050DBA7D93C0114752C34AB1D0F318672CBA2B08774B0FF8D98041CF9F30528F9C83DB2716E7B
2,956,993 UART: [art] SIG.R = 7D3E2EABA90C5D09F98F3AEAFA726E628A6BAF9B1F567D2F65A405AF05316A48E6A250378A1755545DEE8EF8DE31AD77
2,963,769 UART: [art] SIG.S = 5BF2AAA939E46AB5E6B23FACFCD5C1EF6B25A55115137643353C16C20C758ADE59C7305AC0F0D25D0C929D1FA6D61A52
2,987,258 UART: Caliptra RT
2,987,512 UART: [state] CFI Enabled
3,094,376 UART: [rt] RT listening for mailbox commands...
3,095,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,679 UART: [rt]cmd =0x44504543, len=24
3,158,909 >>> mbox cmd response data (40 bytes)
3,158,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,389 UART: [rt]cmd =0x44504543, len=24
3,222,095 >>> mbox cmd response data (40 bytes)
3,222,096 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,251,633 UART: [rt]cmd =0x44504543, len=24
3,286,029 >>> mbox cmd response data (40 bytes)
3,286,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,391 UART: [rt]cmd =0x44504543, len=24
3,349,203 >>> mbox cmd response data (40 bytes)
3,349,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,719 UART: [rt]cmd =0x44504543, len=24
3,412,387 >>> mbox cmd response data (40 bytes)
3,412,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,797 UART: [rt]cmd =0x44504543, len=24
3,475,899 >>> mbox cmd response data (40 bytes)
3,475,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,305 UART: [rt]cmd =0x44504543, len=24
3,539,491 >>> mbox cmd response data (40 bytes)
3,539,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,649 UART: [rt]cmd =0x44504543, len=24
3,602,939 >>> mbox cmd response data (40 bytes)
3,602,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,427 UART: [rt]cmd =0x44504543, len=24
3,666,355 >>> mbox cmd response data (40 bytes)
3,666,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,765 UART: [rt]cmd =0x44504543, len=24
3,730,039 >>> mbox cmd response data (40 bytes)
3,730,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,587 UART: [rt]cmd =0x44504543, len=24
3,793,475 >>> mbox cmd response data (40 bytes)
3,793,476 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,737 UART: [rt]cmd =0x44504543, len=24
3,856,865 >>> mbox cmd response data (40 bytes)
3,856,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,353 UART: [rt]cmd =0x44504543, len=24
3,920,387 >>> mbox cmd response data (40 bytes)
3,920,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,949 UART: [rt]cmd =0x44504543, len=24
3,984,067 >>> mbox cmd response data (40 bytes)
3,984,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,499 UART: [rt]cmd =0x44504543, len=24
4,047,887 >>> mbox cmd response data (40 bytes)
4,047,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,621 UART: [rt]cmd =0x44504543, len=24
4,084,696 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,829 UART: [state] LifecycleState = Unprovisioned
85,484 UART: [state] DebugLocked = No
86,152 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,631 UART: [kat] LMS
1,168,943 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 ready_for_fw is high
1,174,120 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,191 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,462 UART: [fwproc] Recv command 0x46574c44
1,283,195 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,797 >>> mbox cmd response: success
2,773,048 UART: [afmc] ++
2,773,216 UART: [afmc] CDI.KEYID = 6
2,773,579 UART: [afmc] SUBJECT.KEYID = 7
2,774,005 UART: [afmc] AUTHORITY.KEYID = 5
2,809,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,177 UART: [afmc] --
2,853,091 UART: [cold-reset] --
2,854,111 UART: [state] Locking Datavault
2,855,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,044 UART: [state] Locking ICCM
2,856,486 UART: [exit] Launching FMC @ 0x40000130
2,861,815 UART:
2,861,831 UART: Running Caliptra FMC ...
2,862,239 UART:
2,862,382 UART: [state] CFI Enabled
2,872,813 UART: [fht] FMC Alias Private Key: 7
2,980,592 UART: [art] Extend RT PCRs Done
2,981,020 UART: [art] Lock RT PCRs Done
2,982,754 UART: [art] Populate DV Done
2,991,209 UART: [fht] FMC Alias Private Key: 7
2,992,229 UART: [art] Derive CDI
2,992,509 UART: [art] Store in in slot 0x4
3,078,228 UART: [art] Derive Key Pair
3,078,588 UART: [art] Store priv key in slot 0x5
3,091,710 UART: [art] Derive Key Pair - Done
3,106,540 UART: [art] Signing Cert with AUTHO
3,107,020 UART: RITY.KEYID = 7
3,121,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,751 UART: [art] PUB.X = F9FF616255B09F145ACE56A15678CDB59105A08ECFFB405295EECEF6A648BAEC8CA2C096B189FF35E8956BF669DEA122
3,129,536 UART: [art] PUB.Y = 829CEF0E465619BCB993BF39793ABB99A79BEDE463C1BF9EE7F50589ECF7D8ADE87450A92E59293DA6A500692EE0D025
3,136,472 UART: [art] SIG.R = A1E59322634024C9A202B43865755E8963CE28524F2A01D856582DA3D9F38288D7BBD11BBB2399ACF106A39CC8342B19
3,143,229 UART: [art] SIG.S = 53D5AD8F984CE811D07EB62865D7462B5CDE59EF468E6227599C311EB3C7B93B80576FDC4CBFAE984CCFB6F740B2DF0E
3,167,275 UART: Caliptra RT
3,167,621 UART: [state] CFI Enabled
3,275,225 UART: [rt] RT listening for mailbox commands...
3,275,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,492 UART: [rt]cmd =0x44504543, len=24
3,339,660 >>> mbox cmd response data (40 bytes)
3,339,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,184 UART: [rt]cmd =0x44504543, len=24
3,403,118 >>> mbox cmd response data (40 bytes)
3,403,119 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,484 UART: [rt]cmd =0x44504543, len=24
3,467,086 >>> mbox cmd response data (40 bytes)
3,467,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,576 UART: [rt]cmd =0x44504543, len=24
3,531,048 >>> mbox cmd response data (40 bytes)
3,531,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,456 UART: [rt]cmd =0x44504543, len=24
3,594,404 >>> mbox cmd response data (40 bytes)
3,594,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,824 UART: [rt]cmd =0x44504543, len=24
3,657,896 >>> mbox cmd response data (40 bytes)
3,657,897 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,338 UART: [rt]cmd =0x44504543, len=24
3,721,946 >>> mbox cmd response data (40 bytes)
3,721,947 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,272 UART: [rt]cmd =0x44504543, len=24
3,785,428 >>> mbox cmd response data (40 bytes)
3,785,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,780 UART: [rt]cmd =0x44504543, len=24
3,848,754 >>> mbox cmd response data (40 bytes)
3,848,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,256 UART: [rt]cmd =0x44504543, len=24
3,911,944 >>> mbox cmd response data (40 bytes)
3,911,945 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,420 UART: [rt]cmd =0x44504543, len=24
3,975,306 >>> mbox cmd response data (40 bytes)
3,975,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,752 UART: [rt]cmd =0x44504543, len=24
4,038,926 >>> mbox cmd response data (40 bytes)
4,038,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,520 UART: [rt]cmd =0x44504543, len=24
4,103,030 >>> mbox cmd response data (40 bytes)
4,103,031 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,132,604 UART: [rt]cmd =0x44504543, len=24
4,167,042 >>> mbox cmd response data (40 bytes)
4,167,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,532 UART: [rt]cmd =0x44504543, len=24
4,231,108 >>> mbox cmd response data (40 bytes)
4,231,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,260,734 UART: [rt]cmd =0x44504543, len=24
4,267,969 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,035 ready_for_fw is high
1,057,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,421 >>> mbox cmd response: success
2,685,311 UART:
2,685,327 UART: Running Caliptra FMC ...
2,685,735 UART:
2,685,878 UART: [state] CFI Enabled
2,696,189 UART: [fht] FMC Alias Private Key: 7
2,804,428 UART: [art] Extend RT PCRs Done
2,804,856 UART: [art] Lock RT PCRs Done
2,806,312 UART: [art] Populate DV Done
2,814,575 UART: [fht] FMC Alias Private Key: 7
2,815,717 UART: [art] Derive CDI
2,815,997 UART: [art] Store in in slot 0x4
2,901,634 UART: [art] Derive Key Pair
2,901,994 UART: [art] Store priv key in slot 0x5
2,915,222 UART: [art] Derive Key Pair - Done
2,930,066 UART: [art] Signing Cert with AUTHO
2,930,546 UART: RITY.KEYID = 7
2,945,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,057 UART: [art] PUB.X = 8E3CBDCA49C227554028E6852E2AD57EA1DB5B51B3A1ED7561B29E4706D1A19FB8553138AAB4AE0D660FA1E26F0AA3A8
2,952,831 UART: [art] PUB.Y = 39E1A28C1FDA12280A2D1849886B35A3DCF5F428A35546735CD4127DB3860B0F5CB6AEC2985AA14EC1EA1F605DE9328D
2,959,782 UART: [art] SIG.R = 2DBB581D24AABAF4ED6A97620D16167973B11B478114BF6B663930D1E9A8E7DB3E92B264193A70DCE536E97B75B8A41D
2,966,557 UART: [art] SIG.S = 9BEDEC94D7D080D7FE9F2196FE67D5078597CD6679095EFA68AAEA7D705BF673063ED873FF5A4DD57F0028ADB9F93739
2,990,353 UART: Caliptra RT
2,990,699 UART: [state] CFI Enabled
3,097,895 UART: [rt] RT listening for mailbox commands...
3,098,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,080 UART: [rt]cmd =0x44504543, len=24
3,162,158 >>> mbox cmd response data (40 bytes)
3,162,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,568 UART: [rt]cmd =0x44504543, len=24
3,225,844 >>> mbox cmd response data (40 bytes)
3,225,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,176 UART: [rt]cmd =0x44504543, len=24
3,289,500 >>> mbox cmd response data (40 bytes)
3,289,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,892 UART: [rt]cmd =0x44504543, len=24
3,353,250 >>> mbox cmd response data (40 bytes)
3,353,251 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,942 UART: [rt]cmd =0x44504543, len=24
3,417,076 >>> mbox cmd response data (40 bytes)
3,417,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,576 UART: [rt]cmd =0x44504543, len=24
3,481,028 >>> mbox cmd response data (40 bytes)
3,481,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,474 UART: [rt]cmd =0x44504543, len=24
3,544,568 >>> mbox cmd response data (40 bytes)
3,544,569 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,110 UART: [rt]cmd =0x44504543, len=24
3,608,184 >>> mbox cmd response data (40 bytes)
3,608,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,748 UART: [rt]cmd =0x44504543, len=24
3,671,924 >>> mbox cmd response data (40 bytes)
3,671,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,432 UART: [rt]cmd =0x44504543, len=24
3,735,674 >>> mbox cmd response data (40 bytes)
3,735,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,278 UART: [rt]cmd =0x44504543, len=24
3,799,346 >>> mbox cmd response data (40 bytes)
3,799,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,756 UART: [rt]cmd =0x44504543, len=24
3,863,248 >>> mbox cmd response data (40 bytes)
3,863,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,452 UART: [rt]cmd =0x44504543, len=24
3,926,128 >>> mbox cmd response data (40 bytes)
3,926,129 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,792 UART: [rt]cmd =0x44504543, len=24
3,989,760 >>> mbox cmd response data (40 bytes)
3,989,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,364 UART: [rt]cmd =0x44504543, len=24
4,053,394 >>> mbox cmd response data (40 bytes)
4,053,395 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,642 UART: [rt]cmd =0x44504543, len=24
4,089,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,423 UART:
192,805 UART: Running Caliptra ROM ...
193,893 UART:
194,030 UART: [state] CFI Enabled
263,834 UART: [state] LifecycleState = Unprovisioned
265,820 UART: [state] DebugLocked = No
267,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,976 UART: [kat] SHA2-256
442,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,173 UART: [kat] ++
453,722 UART: [kat] sha1
464,455 UART: [kat] SHA2-256
467,173 UART: [kat] SHA2-384
473,007 UART: [kat] SHA2-512-ACC
475,380 UART: [kat] ECC-384
2,768,055 UART: [kat] HMAC-384Kdf
2,800,400 UART: [kat] LMS
3,990,705 UART: [kat] --
3,994,913 UART: [cold-reset] ++
3,997,474 UART: [fht] Storing FHT @ 0x50003400
4,009,295 UART: [idev] ++
4,009,847 UART: [idev] CDI.KEYID = 6
4,010,797 UART: [idev] SUBJECT.KEYID = 7
4,012,048 UART: [idev] UDS.KEYID = 0
4,013,047 ready_for_fw is high
4,013,233 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,522 UART: [idev] Erasing UDS.KEYID = 0
7,347,471 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,702 UART: [idev] --
7,373,671 UART: [ldev] ++
7,374,273 UART: [ldev] CDI.KEYID = 6
7,375,181 UART: [ldev] SUBJECT.KEYID = 5
7,376,389 UART: [ldev] AUTHORITY.KEYID = 7
7,377,670 UART: [ldev] FE.KEYID = 1
7,423,086 UART: [ldev] Erasing FE.KEYID = 1
10,755,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,712 UART: [ldev] --
13,115,103 UART: [fwproc] Waiting for Commands...
13,117,860 UART: [fwproc] Received command 0x46574c44
13,120,037 UART: [fwproc] Received Image of size 114036 bytes
17,178,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,646,609 >>> mbox cmd response: success
17,650,987 UART: [afmc] ++
17,651,636 UART: [afmc] CDI.KEYID = 6
17,652,541 UART: [afmc] SUBJECT.KEYID = 7
17,653,745 UART: [afmc] AUTHORITY.KEYID = 5
21,009,088 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,398 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,799 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,622 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,034 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,765 UART: [afmc] --
23,381,370 UART: [cold-reset] --
23,385,447 UART: [state] Locking Datavault
23,392,526 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,285 UART: [state] Locking ICCM
23,396,211 UART: [exit] Launching FMC @ 0x40000130
23,404,601 UART:
23,404,830 UART: Running Caliptra FMC ...
23,405,927 UART:
23,406,082 UART: [state] CFI Enabled
23,467,905 UART: [fht] FMC Alias Private Key: 7
25,806,291 UART: [art] Extend RT PCRs Done
25,807,529 UART: [art] Lock RT PCRs Done
25,809,314 UART: [art] Populate DV Done
25,814,770 UART: [fht] FMC Alias Private Key: 7
25,816,301 UART: [art] Derive CDI
25,817,131 UART: [art] Store in in slot 0x4
25,876,761 UART: [art] Derive Key Pair
25,877,802 UART: [art] Store priv key in slot 0x5
29,170,407 UART: [art] Derive Key Pair - Done
29,183,679 UART: [art] Signing Cert with AUTHO
29,184,982 UART: RITY.KEYID = 7
31,471,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,123 UART: [art] PUB.X = ADBE5884B7AB7F9977894C4C0C6241EC9C3096F452EC0CDA378115D502E7EAD6F9BDE20AB12C9B1195A7B488E6E29F4D
31,480,395 UART: [art] PUB.Y = FE398699F6746D333DC0854398C1E35FED9453AFBA3AF7A483AFAC055AC07C125666EE25E66663A862FE0B46A48E7A52
31,487,649 UART: [art] SIG.R = 6D9C80A0E22A1527158DD5C235EBDF565D8CCBD5A5D7301B05363096AB48914BCB66E717AA6EC5C28B34A861555D2B13
31,495,006 UART: [art] SIG.S = 4D73FEFC7187E31076ED77C45219BDD6702391B49EC5E7FB5E525D24DBBCD384220CF6B0069B858DC29F644BD961EF25
32,800,137 UART: Caliptra RT
32,800,834 UART: [state] CFI Enabled
32,961,681 UART: [rt] RT listening for mailbox commands...
32,963,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,993,569 UART: [rt]cmd =0x44504543, len=24
33,043,028 >>> mbox cmd response data (40 bytes)
33,044,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,075,201 UART: [rt]cmd =0x44504543, len=96
33,155,481 >>> mbox cmd response data (56 bytes)
33,156,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,186,757 UART: [rt]cmd =0x44504543, len=96
33,261,816 >>> mbox cmd response data (56 bytes)
33,262,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,293,224 UART: [rt]cmd =0x44504543, len=96
33,369,315 >>> mbox cmd response data (56 bytes)
33,370,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,400,691 UART: [rt]cmd =0x44504543, len=96
33,476,111 >>> mbox cmd response data (56 bytes)
33,476,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,507,478 UART: [rt]cmd =0x44504543, len=96
33,582,599 >>> mbox cmd response data (56 bytes)
33,583,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,613,659 UART: [rt]cmd =0x44504543, len=96
33,689,560 >>> mbox cmd response data (56 bytes)
33,690,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,720,893 UART: [rt]cmd =0x44504543, len=96
33,795,659 >>> mbox cmd response data (56 bytes)
33,796,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,827,006 UART: [rt]cmd =0x44504543, len=96
33,903,335 >>> mbox cmd response data (56 bytes)
33,904,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,934,453 UART: [rt]cmd =0x44504543, len=96
34,010,074 >>> mbox cmd response data (56 bytes)
34,010,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,041,218 UART: [rt]cmd =0x44504543, len=96
34,116,904 >>> mbox cmd response data (56 bytes)
34,117,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,148,062 UART: [rt]cmd =0x44504543, len=96
34,224,302 >>> mbox cmd response data (56 bytes)
34,225,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,255,615 UART: [rt]cmd =0x44504543, len=96
34,331,407 >>> mbox cmd response data (56 bytes)
34,332,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,362,654 UART: [rt]cmd =0x44504543, len=96
34,437,551 >>> mbox cmd response data (56 bytes)
34,438,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,468,840 UART: [rt]cmd =0x44504543, len=96
34,544,971 >>> mbox cmd response data (56 bytes)
34,545,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,576,111 UART: [rt]cmd =0x44504543, len=96
34,582,590 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,784,042 ready_for_fw is high
3,784,589 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,865,140 >>> mbox cmd response: success
23,563,353 UART:
23,563,777 UART: Running Caliptra FMC ...
23,564,878 UART:
23,565,023 UART: [state] CFI Enabled
23,634,316 UART: [fht] FMC Alias Private Key: 7
25,972,379 UART: [art] Extend RT PCRs Done
25,973,606 UART: [art] Lock RT PCRs Done
25,975,589 UART: [art] Populate DV Done
25,980,853 UART: [fht] FMC Alias Private Key: 7
25,982,537 UART: [art] Derive CDI
25,983,354 UART: [art] Store in in slot 0x4
26,042,980 UART: [art] Derive Key Pair
26,043,995 UART: [art] Store priv key in slot 0x5
29,336,786 UART: [art] Derive Key Pair - Done
29,349,722 UART: [art] Signing Cert with AUTHO
29,351,054 UART: RITY.KEYID = 7
31,638,709 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,217 UART: [art] PUB.X = E3574725481BF3DFD259FE6921CFF7F8E1096D009A4A200127318F764836083D1F4D808B2FA8599AC6BE35E697DB0224
31,647,426 UART: [art] PUB.Y = A868A34551730664429BE91E137CA112F7D045A91D8C420148DE89CE211C9229F1A9124AFFA779F2A5DF2A050FD9DA47
31,654,730 UART: [art] SIG.R = 5D7BAB3FBE86EA86C26A78DDA4085C28D1C97C711DC2584C947F57DBCF168943746B105F4EE8882A0A2F81E601FBD480
31,662,130 UART: [art] SIG.S = 66CB88958978516B38F8C27D0E04092792DC33D5C2C013E441170578B0BEAA16ADBBD11E14A129F671A73733096857D6
32,967,520 UART: Caliptra RT
32,968,217 UART: [state] CFI Enabled
33,130,178 UART: [rt] RT listening for mailbox commands...
33,132,103 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,162,012 UART: [rt]cmd =0x44504543, len=24
33,211,537 >>> mbox cmd response data (40 bytes)
33,212,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,243,376 UART: [rt]cmd =0x44504543, len=96
33,323,978 >>> mbox cmd response data (56 bytes)
33,324,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,355,013 UART: [rt]cmd =0x44504543, len=96
33,431,073 >>> mbox cmd response data (56 bytes)
33,431,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,462,105 UART: [rt]cmd =0x44504543, len=96
33,537,999 >>> mbox cmd response data (56 bytes)
33,538,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,569,367 UART: [rt]cmd =0x44504543, len=96
33,644,802 >>> mbox cmd response data (56 bytes)
33,645,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,675,896 UART: [rt]cmd =0x44504543, len=96
33,751,255 >>> mbox cmd response data (56 bytes)
33,751,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,782,286 UART: [rt]cmd =0x44504543, len=96
33,858,129 >>> mbox cmd response data (56 bytes)
33,858,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,889,271 UART: [rt]cmd =0x44504543, len=96
33,964,982 >>> mbox cmd response data (56 bytes)
33,965,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,996,133 UART: [rt]cmd =0x44504543, len=96
34,071,911 >>> mbox cmd response data (56 bytes)
34,072,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,103,160 UART: [rt]cmd =0x44504543, len=96
34,178,326 >>> mbox cmd response data (56 bytes)
34,179,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,209,576 UART: [rt]cmd =0x44504543, len=96
34,284,805 >>> mbox cmd response data (56 bytes)
34,285,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,316,326 UART: [rt]cmd =0x44504543, len=96
34,391,175 >>> mbox cmd response data (56 bytes)
34,391,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,422,546 UART: [rt]cmd =0x44504543, len=96
34,498,628 >>> mbox cmd response data (56 bytes)
34,499,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,529,880 UART: [rt]cmd =0x44504543, len=96
34,605,381 >>> mbox cmd response data (56 bytes)
34,606,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,636,527 UART: [rt]cmd =0x44504543, len=96
34,712,095 >>> mbox cmd response data (56 bytes)
34,712,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,743,288 UART: [rt]cmd =0x44504543, len=96
34,750,007 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,023 writing to cptra_bootfsm_go
193,259 UART:
193,606 UART: Running Caliptra ROM ...
194,787 UART:
604,592 UART: [state] CFI Enabled
620,656 UART: [state] LifecycleState = Unprovisioned
622,594 UART: [state] DebugLocked = No
624,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,914 UART: [kat] SHA2-256
798,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,251 UART: [kat] ++
809,786 UART: [kat] sha1
820,664 UART: [kat] SHA2-256
823,316 UART: [kat] SHA2-384
829,730 UART: [kat] SHA2-512-ACC
832,092 UART: [kat] ECC-384
3,117,217 UART: [kat] HMAC-384Kdf
3,127,544 UART: [kat] LMS
4,317,695 UART: [kat] --
4,321,785 UART: [cold-reset] ++
4,323,812 UART: [fht] Storing FHT @ 0x50003400
4,335,467 UART: [idev] ++
4,336,035 UART: [idev] CDI.KEYID = 6
4,337,072 UART: [idev] SUBJECT.KEYID = 7
4,338,249 UART: [idev] UDS.KEYID = 0
4,339,300 ready_for_fw is high
4,339,502 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,564 UART: [idev] Erasing UDS.KEYID = 0
7,629,182 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,722 UART: [idev] --
7,654,819 UART: [ldev] ++
7,655,442 UART: [ldev] CDI.KEYID = 6
7,656,456 UART: [ldev] SUBJECT.KEYID = 5
7,657,608 UART: [ldev] AUTHORITY.KEYID = 7
7,658,834 UART: [ldev] FE.KEYID = 1
7,670,937 UART: [ldev] Erasing FE.KEYID = 1
10,961,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,398 UART: [ldev] --
13,321,261 UART: [fwproc] Waiting for Commands...
13,323,564 UART: [fwproc] Received command 0x46574c44
13,325,796 UART: [fwproc] Received Image of size 114036 bytes
17,372,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,484 >>> mbox cmd response: success
17,838,261 UART: [afmc] ++
17,838,852 UART: [afmc] CDI.KEYID = 6
17,839,817 UART: [afmc] SUBJECT.KEYID = 7
17,841,031 UART: [afmc] AUTHORITY.KEYID = 5
21,155,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,629 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,018 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,833 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,312 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,369 UART: [afmc] --
23,522,074 UART: [cold-reset] --
23,526,376 UART: [state] Locking Datavault
23,533,116 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,884 UART: [state] Locking ICCM
23,536,254 UART: [exit] Launching FMC @ 0x40000130
23,544,646 UART:
23,544,879 UART: Running Caliptra FMC ...
23,545,904 UART:
23,546,050 UART: [state] CFI Enabled
23,554,340 UART: [fht] FMC Alias Private Key: 7
25,885,081 UART: [art] Extend RT PCRs Done
25,886,307 UART: [art] Lock RT PCRs Done
25,888,009 UART: [art] Populate DV Done
25,893,388 UART: [fht] FMC Alias Private Key: 7
25,895,038 UART: [art] Derive CDI
25,895,854 UART: [art] Store in in slot 0x4
25,938,550 UART: [art] Derive Key Pair
25,939,591 UART: [art] Store priv key in slot 0x5
29,181,874 UART: [art] Derive Key Pair - Done
29,194,817 UART: [art] Signing Cert with AUTHO
29,196,118 UART: RITY.KEYID = 7
31,475,755 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,256 UART: [art] PUB.X = 09F3DF72EB8D3FDAA5BD04578B03F9D703D91AFBBDA663118526D54D21E860866F057B8CAD350AF5324C13B46B6014A1
31,484,525 UART: [art] PUB.Y = 39C1D1D7389921A745B87804BBC0FF7D774E509A6358BABA7FF4A07F9FDD5A7FD292E7CC21F7CAA0EBE7ACABEE5905A1
31,491,770 UART: [art] SIG.R = 1FB1FE2FBB36590C8B5EDB7DDCAEB3BD6C96D2F0A8A50F65EF4CF381E49D11448C37B74F0A5410FFA7FC4B9955269875
31,499,220 UART: [art] SIG.S = A70C6CF17602ACA4F9ADDC2906DE0192F326C0BFDEDC1CC9D36F960C5FD0296F57C9D981F22956B33DFC18F71819711A
32,804,567 UART: Caliptra RT
32,805,267 UART: [state] CFI Enabled
32,922,760 UART: [rt] RT listening for mailbox commands...
32,924,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,954,453 UART: [rt]cmd =0x44504543, len=24
32,988,687 >>> mbox cmd response data (40 bytes)
32,989,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,020,100 UART: [rt]cmd =0x44504543, len=96
33,067,706 >>> mbox cmd response data (56 bytes)
33,068,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,098,829 UART: [rt]cmd =0x44504543, len=96
33,146,743 >>> mbox cmd response data (56 bytes)
33,147,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,178,124 UART: [rt]cmd =0x44504543, len=96
33,226,596 >>> mbox cmd response data (56 bytes)
33,227,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,257,935 UART: [rt]cmd =0x44504543, len=96
33,306,875 >>> mbox cmd response data (56 bytes)
33,307,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,338,306 UART: [rt]cmd =0x44504543, len=96
33,387,732 >>> mbox cmd response data (56 bytes)
33,388,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,418,987 UART: [rt]cmd =0x44504543, len=96
33,468,510 >>> mbox cmd response data (56 bytes)
33,469,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,499,708 UART: [rt]cmd =0x44504543, len=96
33,550,248 >>> mbox cmd response data (56 bytes)
33,550,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,581,439 UART: [rt]cmd =0x44504543, len=96
33,631,497 >>> mbox cmd response data (56 bytes)
33,632,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,662,636 UART: [rt]cmd =0x44504543, len=96
33,712,481 >>> mbox cmd response data (56 bytes)
33,713,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,743,679 UART: [rt]cmd =0x44504543, len=96
33,794,896 >>> mbox cmd response data (56 bytes)
33,795,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,826,361 UART: [rt]cmd =0x44504543, len=96
33,878,428 >>> mbox cmd response data (56 bytes)
33,879,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,909,787 UART: [rt]cmd =0x44504543, len=96
33,961,142 >>> mbox cmd response data (56 bytes)
33,961,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,992,559 UART: [rt]cmd =0x44504543, len=96
34,044,778 >>> mbox cmd response data (56 bytes)
34,045,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,075,765 UART: [rt]cmd =0x44504543, len=96
34,127,993 >>> mbox cmd response data (56 bytes)
34,128,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,159,183 UART: [rt]cmd =0x44504543, len=96
34,165,540 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,130,828 ready_for_fw is high
4,131,233 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,391 >>> mbox cmd response: success
23,715,271 UART:
23,715,670 UART: Running Caliptra FMC ...
23,717,026 UART:
23,717,216 UART: [state] CFI Enabled
23,725,047 UART: [fht] FMC Alias Private Key: 7
26,055,925 UART: [art] Extend RT PCRs Done
26,057,158 UART: [art] Lock RT PCRs Done
26,058,686 UART: [art] Populate DV Done
26,063,892 UART: [fht] FMC Alias Private Key: 7
26,065,545 UART: [art] Derive CDI
26,066,362 UART: [art] Store in in slot 0x4
26,108,910 UART: [art] Derive Key Pair
26,109,913 UART: [art] Store priv key in slot 0x5
29,351,832 UART: [art] Derive Key Pair - Done
29,365,056 UART: [art] Signing Cert with AUTHO
29,366,373 UART: RITY.KEYID = 7
31,645,757 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,268 UART: [art] PUB.X = 5E8FC9695C7E896EAAA90E473D4A8E8A8F3466B13BA1D88D81EA484C30AF538D5FDB002FCE0B9E61E1666E05A76BFAC1
31,654,544 UART: [art] PUB.Y = 006860329B623800ACFE71F4288CA59F37E7B2E068EC7129E9B8E5ED2D9D251695B8C3ABEFF1D4AAA716BE308CD190FD
31,661,747 UART: [art] SIG.R = 1E05954BF6C9CA974C05490CA0781C5F10581F5EF55A264DD6B3006A02A0C68EE87057257B10B6CE837F65C2B6CC23E4
31,669,133 UART: [art] SIG.S = 6FC299194B67B7799809AC1BF6F4F56A14DFAD6ED09131D183A204794F9AA1BAD7F0FC30A58041019E6CA6556AEAAE8A
32,973,667 UART: Caliptra RT
32,974,387 UART: [state] CFI Enabled
33,092,396 UART: [rt] RT listening for mailbox commands...
33,094,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,124,420 UART: [rt]cmd =0x44504543, len=24
33,158,696 >>> mbox cmd response data (40 bytes)
33,160,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,190,621 UART: [rt]cmd =0x44504543, len=96
33,238,701 >>> mbox cmd response data (56 bytes)
33,239,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,269,988 UART: [rt]cmd =0x44504543, len=96
33,318,234 >>> mbox cmd response data (56 bytes)
33,318,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,349,613 UART: [rt]cmd =0x44504543, len=96
33,398,790 >>> mbox cmd response data (56 bytes)
33,399,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,429,863 UART: [rt]cmd =0x44504543, len=96
33,478,449 >>> mbox cmd response data (56 bytes)
33,479,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,509,853 UART: [rt]cmd =0x44504543, len=96
33,559,122 >>> mbox cmd response data (56 bytes)
33,559,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,590,383 UART: [rt]cmd =0x44504543, len=96
33,639,546 >>> mbox cmd response data (56 bytes)
33,640,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,671,020 UART: [rt]cmd =0x44504543, len=96
33,721,143 >>> mbox cmd response data (56 bytes)
33,721,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,752,569 UART: [rt]cmd =0x44504543, len=96
33,802,424 >>> mbox cmd response data (56 bytes)
33,803,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,833,753 UART: [rt]cmd =0x44504543, len=96
33,884,078 >>> mbox cmd response data (56 bytes)
33,884,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,915,423 UART: [rt]cmd =0x44504543, len=96
33,965,921 >>> mbox cmd response data (56 bytes)
33,966,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,997,288 UART: [rt]cmd =0x44504543, len=96
34,048,602 >>> mbox cmd response data (56 bytes)
34,049,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,079,812 UART: [rt]cmd =0x44504543, len=96
34,131,873 >>> mbox cmd response data (56 bytes)
34,132,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,163,074 UART: [rt]cmd =0x44504543, len=96
34,214,535 >>> mbox cmd response data (56 bytes)
34,215,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,245,622 UART: [rt]cmd =0x44504543, len=96
34,297,373 >>> mbox cmd response data (56 bytes)
34,298,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,328,747 UART: [rt]cmd =0x44504543, len=96
34,335,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,533 UART:
192,891 UART: Running Caliptra ROM ...
194,087 UART:
194,250 UART: [state] CFI Enabled
263,781 UART: [state] LifecycleState = Unprovisioned
265,693 UART: [state] DebugLocked = No
267,162 UART: [state] WD Timer not started. Device not locked for debugging
270,078 UART: [kat] SHA2-256
449,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,784 UART: [kat] ++
461,321 UART: [kat] sha1
473,336 UART: [kat] SHA2-256
476,349 UART: [kat] SHA2-384
482,909 UART: [kat] SHA2-512-ACC
485,842 UART: [kat] ECC-384
2,949,383 UART: [kat] HMAC-384Kdf
2,970,891 UART: [kat] LMS
3,500,334 UART: [kat] --
3,505,346 UART: [cold-reset] ++
3,506,501 UART: [fht] FHT @ 0x50003400
3,517,057 UART: [idev] ++
3,517,630 UART: [idev] CDI.KEYID = 6
3,518,541 UART: [idev] SUBJECT.KEYID = 7
3,519,734 UART: [idev] UDS.KEYID = 0
3,520,661 ready_for_fw is high
3,520,848 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,656 UART: [idev] Erasing UDS.KEYID = 0
6,028,671 UART: [idev] Sha1 KeyId Algorithm
6,051,413 UART: [idev] --
6,055,351 UART: [ldev] ++
6,055,928 UART: [ldev] CDI.KEYID = 6
6,056,815 UART: [ldev] SUBJECT.KEYID = 5
6,058,024 UART: [ldev] AUTHORITY.KEYID = 7
6,059,264 UART: [ldev] FE.KEYID = 1
6,100,463 UART: [ldev] Erasing FE.KEYID = 1
8,606,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,630 UART: [ldev] --
10,414,067 UART: [fwproc] Wait for Commands...
10,416,853 UART: [fwproc] Recv command 0x46574c44
10,418,953 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,270,822 >>> mbox cmd response: success
14,275,389 UART: [afmc] ++
14,275,990 UART: [afmc] CDI.KEYID = 6
14,276,878 UART: [afmc] SUBJECT.KEYID = 7
14,278,097 UART: [afmc] AUTHORITY.KEYID = 5
16,808,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,044 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,868 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,795 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,254 UART: [afmc] --
18,607,502 UART: [cold-reset] --
18,612,131 UART: [state] Locking Datavault
18,618,676 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,326 UART: [state] Locking ICCM
18,622,904 UART: [exit] Launching FMC @ 0x40000130
18,631,358 UART:
18,631,604 UART: Running Caliptra FMC ...
18,632,706 UART:
18,632,867 UART: [state] CFI Enabled
18,689,612 UART: [fht] FMC Alias Private Key: 7
20,453,750 UART: [art] Extend RT PCRs Done
20,454,968 UART: [art] Lock RT PCRs Done
20,456,481 UART: [art] Populate DV Done
20,461,514 UART: [fht] FMC Alias Private Key: 7
20,463,213 UART: [art] Derive CDI
20,463,950 UART: [art] Store in in slot 0x4
20,522,230 UART: [art] Derive Key Pair
20,523,268 UART: [art] Store priv key in slot 0x5
22,986,586 UART: [art] Derive Key Pair - Done
22,999,629 UART: [art] Signing Cert with AUTHO
23,000,937 UART: RITY.KEYID = 7
24,712,588 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,101 UART: [art] PUB.X = 0A885C3F1FA58CDB894F340AA422D4498B23079427C7537959DF52422C29C172563727EEF415F1596A722E184E288E4D
24,721,323 UART: [art] PUB.Y = 751237524B08E16019D5333D3594096596A02C04F672B1672653644A05A6CAFB15E3C97E168C2DF50B6F663E02F896E4
24,728,525 UART: [art] SIG.R = 0E7FCDD7B8A1A2861914265586A5573961DE5AD457A9D78CCE30D29F3BB82DC75BA7297D25C44FF06FB1E5BAC94BD7C0
24,735,980 UART: [art] SIG.S = 71F3BA4A5596F7720391F549C10BD5D627F49A16060275622D895E045F16C85490F2021A9E69E4ED365895FFBD485386
25,715,494 UART: Caliptra RT
25,716,176 UART: [state] CFI Enabled
25,880,877 UART: [rt] RT listening for mailbox commands...
25,882,829 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,912,748 UART: [rt]cmd =0x44504543, len=24
25,964,983 >>> mbox cmd response data (40 bytes)
25,966,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,996,886 UART: [rt]cmd =0x44504543, len=96
26,077,535 >>> mbox cmd response data (56 bytes)
26,078,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,108,787 UART: [rt]cmd =0x44504543, len=96
26,184,401 >>> mbox cmd response data (56 bytes)
26,185,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,215,894 UART: [rt]cmd =0x44504543, len=96
26,291,832 >>> mbox cmd response data (56 bytes)
26,292,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,323,308 UART: [rt]cmd =0x44504543, len=96
26,398,269 >>> mbox cmd response data (56 bytes)
26,399,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,429,660 UART: [rt]cmd =0x44504543, len=96
26,504,697 >>> mbox cmd response data (56 bytes)
26,505,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,535,681 UART: [rt]cmd =0x44504543, len=96
26,611,986 >>> mbox cmd response data (56 bytes)
26,612,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,287 UART: [rt]cmd =0x44504543, len=96
26,718,685 >>> mbox cmd response data (56 bytes)
26,719,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,750,051 UART: [rt]cmd =0x44504543, len=96
26,825,579 >>> mbox cmd response data (56 bytes)
26,826,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,856,842 UART: [rt]cmd =0x44504543, len=96
26,932,120 >>> mbox cmd response data (56 bytes)
26,932,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,963,278 UART: [rt]cmd =0x44504543, len=96
27,039,381 >>> mbox cmd response data (56 bytes)
27,040,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,070,696 UART: [rt]cmd =0x44504543, len=96
27,146,119 >>> mbox cmd response data (56 bytes)
27,146,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,177,577 UART: [rt]cmd =0x44504543, len=96
27,253,122 >>> mbox cmd response data (56 bytes)
27,253,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,284,373 UART: [rt]cmd =0x44504543, len=96
27,359,653 >>> mbox cmd response data (56 bytes)
27,360,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,390,917 UART: [rt]cmd =0x44504543, len=96
27,466,793 >>> mbox cmd response data (56 bytes)
27,467,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,498,083 UART: [rt]cmd =0x44504543, len=96
27,504,719 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,487 UART:
192,858 UART: Running Caliptra ROM ...
194,046 UART:
194,220 UART: [state] CFI Enabled
265,387 UART: [state] LifecycleState = Unprovisioned
267,794 UART: [state] DebugLocked = No
269,122 UART: [state] WD Timer not started. Device not locked for debugging
274,367 UART: [kat] SHA2-256
464,239 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,977 UART: [kat] ++
475,423 UART: [kat] sha1
486,366 UART: [kat] SHA2-256
489,371 UART: [kat] SHA2-384
496,504 UART: [kat] SHA2-512-ACC
499,086 UART: [kat] ECC-384
2,948,425 UART: [kat] HMAC-384Kdf
2,973,105 UART: [kat] LMS
3,504,851 UART: [kat] --
3,509,410 UART: [cold-reset] ++
3,511,061 UART: [fht] FHT @ 0x50003400
3,522,410 UART: [idev] ++
3,523,122 UART: [idev] CDI.KEYID = 6
3,524,059 UART: [idev] SUBJECT.KEYID = 7
3,525,314 UART: [idev] UDS.KEYID = 0
3,526,509 ready_for_fw is high
3,526,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,590 UART: [idev] Erasing UDS.KEYID = 0
6,030,498 UART: [idev] Sha1 KeyId Algorithm
6,053,929 UART: [idev] --
6,058,065 UART: [ldev] ++
6,058,760 UART: [ldev] CDI.KEYID = 6
6,059,675 UART: [ldev] SUBJECT.KEYID = 5
6,060,891 UART: [ldev] AUTHORITY.KEYID = 7
6,062,076 UART: [ldev] FE.KEYID = 1
6,100,817 UART: [ldev] Erasing FE.KEYID = 1
8,608,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,255 UART: [ldev] --
10,414,849 UART: [fwproc] Wait for Commands...
10,417,377 UART: [fwproc] Recv command 0x46574c44
10,419,635 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,594,479 >>> mbox cmd response: success
14,597,908 UART: [afmc] ++
14,598,622 UART: [afmc] CDI.KEYID = 6
14,599,814 UART: [afmc] SUBJECT.KEYID = 7
14,601,260 UART: [afmc] AUTHORITY.KEYID = 5
17,129,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,853,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,855,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,870,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,265 UART: [afmc] --
18,929,228 UART: [cold-reset] --
18,933,760 UART: [state] Locking Datavault
18,939,567 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,712 UART: [state] Locking ICCM
18,943,488 UART: [exit] Launching FMC @ 0x40000130
18,952,174 UART:
18,952,413 UART: Running Caliptra FMC ...
18,953,518 UART:
18,953,675 UART: [state] CFI Enabled
19,011,177 UART: [fht] FMC Alias Private Key: 7
20,775,310 UART: [art] Extend RT PCRs Done
20,776,551 UART: [art] Lock RT PCRs Done
20,778,364 UART: [art] Populate DV Done
20,783,882 UART: [fht] FMC Alias Private Key: 7
20,785,525 UART: [art] Derive CDI
20,786,262 UART: [art] Store in in slot 0x4
20,844,322 UART: [art] Derive Key Pair
20,845,356 UART: [art] Store priv key in slot 0x5
23,308,648 UART: [art] Derive Key Pair - Done
23,321,860 UART: [art] Signing Cert with AUTHO
23,323,165 UART: RITY.KEYID = 7
25,034,364 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,877 UART: [art] PUB.X = B81DA37A35CEABD06B585B55CC3FAFFE628418B3EA4BA6B072A00B5567BFE054D66584F5DEF27EEF18622365B72BE113
25,043,168 UART: [art] PUB.Y = 608CE148A2C5828B04DEBCB44BE917A089E3F7B6B413943E002FE6C44A3A5AEF5F4A675D3666D0A8526566814F001DE5
25,050,382 UART: [art] SIG.R = 8A024AB9C7B6347893F8EBCDA8E9EB701F54DA9DADBDF1497A34D8149EDAD3FCE003DB453CBFAB34187716B5CD85EE7B
25,057,811 UART: [art] SIG.S = 2EA8D48C5365413906785993CDFF2AD6A34527974BED18A4A08D5191864B8B25A018F5B0A0D4447AED1B81FA0BDD31ED
26,036,868 UART: Caliptra RT
26,037,583 UART: [state] CFI Enabled
26,202,133 UART: [rt] RT listening for mailbox commands...
26,204,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,233,993 UART: [rt]cmd =0x44504543, len=24
26,284,971 >>> mbox cmd response data (40 bytes)
26,286,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,316,377 UART: [rt]cmd =0x44504543, len=96
26,397,568 >>> mbox cmd response data (56 bytes)
26,398,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,428,966 UART: [rt]cmd =0x44504543, len=96
26,505,382 >>> mbox cmd response data (56 bytes)
26,506,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,536,821 UART: [rt]cmd =0x44504543, len=96
26,612,121 >>> mbox cmd response data (56 bytes)
26,612,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,544 UART: [rt]cmd =0x44504543, len=96
26,718,687 >>> mbox cmd response data (56 bytes)
26,719,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,749,948 UART: [rt]cmd =0x44504543, len=96
26,825,392 >>> mbox cmd response data (56 bytes)
26,826,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,856,389 UART: [rt]cmd =0x44504543, len=96
26,932,126 >>> mbox cmd response data (56 bytes)
26,932,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,963,326 UART: [rt]cmd =0x44504543, len=96
27,039,078 >>> mbox cmd response data (56 bytes)
27,039,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,070,315 UART: [rt]cmd =0x44504543, len=96
27,146,585 >>> mbox cmd response data (56 bytes)
27,147,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,177,854 UART: [rt]cmd =0x44504543, len=96
27,252,784 >>> mbox cmd response data (56 bytes)
27,253,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,284,006 UART: [rt]cmd =0x44504543, len=96
27,359,779 >>> mbox cmd response data (56 bytes)
27,360,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,391,029 UART: [rt]cmd =0x44504543, len=96
27,466,750 >>> mbox cmd response data (56 bytes)
27,467,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,497,997 UART: [rt]cmd =0x44504543, len=96
27,573,590 >>> mbox cmd response data (56 bytes)
27,574,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,604,953 UART: [rt]cmd =0x44504543, len=96
27,680,886 >>> mbox cmd response data (56 bytes)
27,681,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,712,018 UART: [rt]cmd =0x44504543, len=96
27,787,513 >>> mbox cmd response data (56 bytes)
27,788,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,818,659 UART: [rt]cmd =0x44504543, len=96
27,825,197 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,442,169 ready_for_fw is high
3,442,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,723,248 >>> mbox cmd response: success
19,007,300 UART:
19,007,689 UART: Running Caliptra FMC ...
19,008,900 UART:
19,009,072 UART: [state] CFI Enabled
19,076,390 UART: [fht] FMC Alias Private Key: 7
20,840,669 UART: [art] Extend RT PCRs Done
20,841,897 UART: [art] Lock RT PCRs Done
20,843,685 UART: [art] Populate DV Done
20,848,905 UART: [fht] FMC Alias Private Key: 7
20,850,515 UART: [art] Derive CDI
20,851,334 UART: [art] Store in in slot 0x4
20,909,628 UART: [art] Derive Key Pair
20,910,667 UART: [art] Store priv key in slot 0x5
23,373,331 UART: [art] Derive Key Pair - Done
23,386,552 UART: [art] Signing Cert with AUTHO
23,387,898 UART: RITY.KEYID = 7
25,099,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,235 UART: [art] PUB.X = 87F7E99B152790937BCF700D9E35061339572832FD2717F5F42AD7B442871DCB4A8C3E015FBEADE8B99344BC28307D38
25,108,465 UART: [art] PUB.Y = 053C8846879970FC24316BC015BBA552366E9BBDBF5B34B5FC3EEE1FE227F02959CE86258DCB6AEC1AF5218A19D98370
25,115,747 UART: [art] SIG.R = 37D71A29FED0A8AAAFCCAAE693BCBF6437BD1B550398BB364ED63B881AFF6395671DF9122B71F7E6B5BC93CECEBB0F65
25,123,170 UART: [art] SIG.S = D4D841B13535D980D2C249EB5FDDF092E06DA0E802AE3D711278E52B62CD83894461D634379FB91B9199A08E966E6D76
26,102,346 UART: Caliptra RT
26,103,060 UART: [state] CFI Enabled
26,267,659 UART: [rt] RT listening for mailbox commands...
26,269,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,299,456 UART: [rt]cmd =0x44504543, len=24
26,349,733 >>> mbox cmd response data (40 bytes)
26,350,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,381,415 UART: [rt]cmd =0x44504543, len=96
26,462,711 >>> mbox cmd response data (56 bytes)
26,463,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,494,049 UART: [rt]cmd =0x44504543, len=96
26,569,132 >>> mbox cmd response data (56 bytes)
26,569,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,600,405 UART: [rt]cmd =0x44504543, len=96
26,675,636 >>> mbox cmd response data (56 bytes)
26,676,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,706,946 UART: [rt]cmd =0x44504543, len=96
26,782,764 >>> mbox cmd response data (56 bytes)
26,783,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,813,931 UART: [rt]cmd =0x44504543, len=96
26,889,869 >>> mbox cmd response data (56 bytes)
26,890,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,921,242 UART: [rt]cmd =0x44504543, len=96
26,996,593 >>> mbox cmd response data (56 bytes)
26,997,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,027,682 UART: [rt]cmd =0x44504543, len=96
27,103,405 >>> mbox cmd response data (56 bytes)
27,104,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,134,766 UART: [rt]cmd =0x44504543, len=96
27,210,373 >>> mbox cmd response data (56 bytes)
27,211,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,241,569 UART: [rt]cmd =0x44504543, len=96
27,316,980 >>> mbox cmd response data (56 bytes)
27,317,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,348,336 UART: [rt]cmd =0x44504543, len=96
27,423,423 >>> mbox cmd response data (56 bytes)
27,424,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,454,746 UART: [rt]cmd =0x44504543, len=96
27,530,088 >>> mbox cmd response data (56 bytes)
27,530,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,561,519 UART: [rt]cmd =0x44504543, len=96
27,637,018 >>> mbox cmd response data (56 bytes)
27,637,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,668,354 UART: [rt]cmd =0x44504543, len=96
27,743,974 >>> mbox cmd response data (56 bytes)
27,744,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,775,065 UART: [rt]cmd =0x44504543, len=96
27,850,571 >>> mbox cmd response data (56 bytes)
27,851,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,881,715 UART: [rt]cmd =0x44504543, len=96
27,888,422 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,489 UART:
192,874 UART: Running Caliptra ROM ...
194,056 UART:
603,640 UART: [state] CFI Enabled
620,442 UART: [state] LifecycleState = Unprovisioned
622,824 UART: [state] DebugLocked = No
624,711 UART: [state] WD Timer not started. Device not locked for debugging
628,955 UART: [kat] SHA2-256
818,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,635 UART: [kat] ++
830,212 UART: [kat] sha1
843,218 UART: [kat] SHA2-256
846,225 UART: [kat] SHA2-384
852,425 UART: [kat] SHA2-512-ACC
855,010 UART: [kat] ECC-384
3,298,848 UART: [kat] HMAC-384Kdf
3,310,682 UART: [kat] LMS
3,842,460 UART: [kat] --
3,846,176 UART: [cold-reset] ++
3,848,202 UART: [fht] FHT @ 0x50003400
3,860,105 UART: [idev] ++
3,860,810 UART: [idev] CDI.KEYID = 6
3,861,737 UART: [idev] SUBJECT.KEYID = 7
3,862,923 UART: [idev] UDS.KEYID = 0
3,863,837 ready_for_fw is high
3,864,047 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,738 UART: [idev] Erasing UDS.KEYID = 0
6,340,057 UART: [idev] Sha1 KeyId Algorithm
6,362,799 UART: [idev] --
6,368,573 UART: [ldev] ++
6,369,251 UART: [ldev] CDI.KEYID = 6
6,370,163 UART: [ldev] SUBJECT.KEYID = 5
6,371,319 UART: [ldev] AUTHORITY.KEYID = 7
6,372,549 UART: [ldev] FE.KEYID = 1
6,381,275 UART: [ldev] Erasing FE.KEYID = 1
8,858,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,113 UART: [ldev] --
10,650,311 UART: [fwproc] Wait for Commands...
10,651,998 UART: [fwproc] Recv command 0x46574c44
10,654,309 UART: [fwproc] Recv'd Img size: 114360 bytes
14,102,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,845,794 >>> mbox cmd response: success
14,849,858 UART: [afmc] ++
14,850,613 UART: [afmc] CDI.KEYID = 6
14,851,796 UART: [afmc] SUBJECT.KEYID = 7
14,853,276 UART: [afmc] AUTHORITY.KEYID = 5
17,356,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,603 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,445 UART: [afmc] --
19,152,988 UART: [cold-reset] --
19,157,815 UART: [state] Locking Datavault
19,162,084 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,269 UART: [state] Locking ICCM
19,165,555 UART: [exit] Launching FMC @ 0x40000130
19,174,214 UART:
19,174,446 UART: Running Caliptra FMC ...
19,175,543 UART:
19,175,699 UART: [state] CFI Enabled
19,183,855 UART: [fht] FMC Alias Private Key: 7
20,940,197 UART: [art] Extend RT PCRs Done
20,941,406 UART: [art] Lock RT PCRs Done
20,943,247 UART: [art] Populate DV Done
20,948,814 UART: [fht] FMC Alias Private Key: 7
20,950,351 UART: [art] Derive CDI
20,951,183 UART: [art] Store in in slot 0x4
20,993,673 UART: [art] Derive Key Pair
20,994,702 UART: [art] Store priv key in slot 0x5
23,421,150 UART: [art] Derive Key Pair - Done
23,433,938 UART: [art] Signing Cert with AUTHO
23,435,239 UART: RITY.KEYID = 7
25,140,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,024 UART: [art] PUB.X = 6B71D63669C6EAEEC42FDDBE56B090C45FAEA58D611B4F6BFC4564D7116A2E037BDB0D8562459DCFDB32FAEF86BA1811
25,149,331 UART: [art] PUB.Y = 712B0F13D4255BB06D408C89E2D180CE6246DD00EB39DAB3C9E8AD2103D5F5F86C37EF63B08F1750AD5C5CECA839D270
25,156,564 UART: [art] SIG.R = 1F83AA9A4AD78B6CD063DDCC65DF25651FCA45C01ECC67E885109BF7E611C34351344C3FA287CF106F362C4CBF9C3E82
25,164,001 UART: [art] SIG.S = 4E7D7056384387EEFFEBD5CBC5D08EFDFC8AB99051C09937E39409F2DF8C55B9385F5A411964E2BB17CFE8DBD5EA0E5D
26,143,613 UART: Caliptra RT
26,144,324 UART: [state] CFI Enabled
26,260,893 UART: [rt] RT listening for mailbox commands...
26,262,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,292,844 UART: [rt]cmd =0x44504543, len=24
26,326,998 >>> mbox cmd response data (40 bytes)
26,328,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,358,941 UART: [rt]cmd =0x44504543, len=96
26,407,230 >>> mbox cmd response data (56 bytes)
26,407,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,670 UART: [rt]cmd =0x44504543, len=96
26,487,330 >>> mbox cmd response data (56 bytes)
26,488,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,518,580 UART: [rt]cmd =0x44504543, len=96
26,568,707 >>> mbox cmd response data (56 bytes)
26,569,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,599,907 UART: [rt]cmd =0x44504543, len=96
26,649,244 >>> mbox cmd response data (56 bytes)
26,649,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,680,528 UART: [rt]cmd =0x44504543, len=96
26,729,724 >>> mbox cmd response data (56 bytes)
26,730,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,760,823 UART: [rt]cmd =0x44504543, len=96
26,810,778 >>> mbox cmd response data (56 bytes)
26,811,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,841,969 UART: [rt]cmd =0x44504543, len=96
26,892,192 >>> mbox cmd response data (56 bytes)
26,892,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,923,548 UART: [rt]cmd =0x44504543, len=96
26,973,767 >>> mbox cmd response data (56 bytes)
26,974,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,005,063 UART: [rt]cmd =0x44504543, len=96
27,055,021 >>> mbox cmd response data (56 bytes)
27,055,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,086,333 UART: [rt]cmd =0x44504543, len=96
27,136,831 >>> mbox cmd response data (56 bytes)
27,137,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,168,207 UART: [rt]cmd =0x44504543, len=96
27,219,028 >>> mbox cmd response data (56 bytes)
27,219,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,250,500 UART: [rt]cmd =0x44504543, len=96
27,302,403 >>> mbox cmd response data (56 bytes)
27,303,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,333,700 UART: [rt]cmd =0x44504543, len=96
27,385,505 >>> mbox cmd response data (56 bytes)
27,386,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,416,785 UART: [rt]cmd =0x44504543, len=96
27,468,571 >>> mbox cmd response data (56 bytes)
27,469,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,500,111 UART: [rt]cmd =0x44504543, len=96
27,506,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,751,440 ready_for_fw is high
3,751,887 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,942,129 >>> mbox cmd response: success
19,189,776 UART:
19,190,172 UART: Running Caliptra FMC ...
19,191,315 UART:
19,191,480 UART: [state] CFI Enabled
19,199,707 UART: [fht] FMC Alias Private Key: 7
20,956,649 UART: [art] Extend RT PCRs Done
20,957,874 UART: [art] Lock RT PCRs Done
20,959,689 UART: [art] Populate DV Done
20,965,211 UART: [fht] FMC Alias Private Key: 7
20,966,696 UART: [art] Derive CDI
20,967,456 UART: [art] Store in in slot 0x4
21,010,265 UART: [art] Derive Key Pair
21,011,270 UART: [art] Store priv key in slot 0x5
23,437,221 UART: [art] Derive Key Pair - Done
23,450,003 UART: [art] Signing Cert with AUTHO
23,451,314 UART: RITY.KEYID = 7
25,156,943 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,460 UART: [art] PUB.X = E746E5811AF1DA50C8C4EED22C3851E654DC91852F52887E40C7AC203CE13090CFC8615A556F26AFBB29A2BA73FDFC02
25,165,720 UART: [art] PUB.Y = EEA77F238D3FF667F7573750D4E4A5A4B16177C262232D683CA20A646D1D15172B3265AE95BD40587F3715F7B0368A30
25,172,932 UART: [art] SIG.R = 8CC0F7F9868ABAC866EE27133BFCBCF6386D5776E6BA4BB4FF5E4343D147E4A62A19587FDB98A35A171B88A118564D99
25,180,383 UART: [art] SIG.S = 54B9435F69261585B9FACDCFCAEC0D716E1A5A13479FB51EDEA55AB11EC253F3783AA3DF4276103AC480B3FFA2D60C52
26,158,748 UART: Caliptra RT
26,159,457 UART: [state] CFI Enabled
26,276,953 UART: [rt] RT listening for mailbox commands...
26,278,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,308,735 UART: [rt]cmd =0x44504543, len=24
26,342,844 >>> mbox cmd response data (40 bytes)
26,344,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,374,826 UART: [rt]cmd =0x44504543, len=96
26,423,431 >>> mbox cmd response data (56 bytes)
26,424,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,454,475 UART: [rt]cmd =0x44504543, len=96
26,502,908 >>> mbox cmd response data (56 bytes)
26,503,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,203 UART: [rt]cmd =0x44504543, len=96
26,583,477 >>> mbox cmd response data (56 bytes)
26,584,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,614,946 UART: [rt]cmd =0x44504543, len=96
26,664,234 >>> mbox cmd response data (56 bytes)
26,664,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,695,412 UART: [rt]cmd =0x44504543, len=96
26,744,583 >>> mbox cmd response data (56 bytes)
26,745,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,775,969 UART: [rt]cmd =0x44504543, len=96
26,826,543 >>> mbox cmd response data (56 bytes)
26,827,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,857,662 UART: [rt]cmd =0x44504543, len=96
26,907,319 >>> mbox cmd response data (56 bytes)
26,908,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,938,659 UART: [rt]cmd =0x44504543, len=96
26,989,829 >>> mbox cmd response data (56 bytes)
26,990,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,021,081 UART: [rt]cmd =0x44504543, len=96
27,071,767 >>> mbox cmd response data (56 bytes)
27,072,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,103,103 UART: [rt]cmd =0x44504543, len=96
27,154,751 >>> mbox cmd response data (56 bytes)
27,155,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,185,654 UART: [rt]cmd =0x44504543, len=96
27,236,338 >>> mbox cmd response data (56 bytes)
27,237,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,267,410 UART: [rt]cmd =0x44504543, len=96
27,318,956 >>> mbox cmd response data (56 bytes)
27,319,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,350,172 UART: [rt]cmd =0x44504543, len=96
27,401,770 >>> mbox cmd response data (56 bytes)
27,402,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,433,144 UART: [rt]cmd =0x44504543, len=96
27,485,744 >>> mbox cmd response data (56 bytes)
27,486,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,516,974 UART: [rt]cmd =0x44504543, len=96
27,523,628 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
889,975 UART: [kat] SHA2-256
891,913 UART: [kat] SHA2-384
894,652 UART: [kat] SHA2-512-ACC
896,553 UART: [kat] ECC-384
902,146 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,475,629 UART: [cold-reset] ++
1,476,061 UART: [fht] Storing FHT @ 0x50003400
1,479,006 UART: [idev] ++
1,479,174 UART: [idev] CDI.KEYID = 6
1,479,534 UART: [idev] SUBJECT.KEYID = 7
1,479,958 UART: [idev] UDS.KEYID = 0
1,480,303 ready_for_fw is high
1,480,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,018 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,500 UART: [idev] --
1,514,501 UART: [ldev] ++
1,514,669 UART: [ldev] CDI.KEYID = 6
1,515,032 UART: [ldev] SUBJECT.KEYID = 5
1,515,458 UART: [ldev] AUTHORITY.KEYID = 7
1,515,921 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,914 UART: [ldev] --
1,586,361 UART: [fwproc] Waiting for Commands...
1,587,008 UART: [fwproc] Received command 0x46574c44
1,587,799 UART: [fwproc] Received Image of size 114360 bytes
2,886,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,457 >>> mbox cmd response: success
3,079,477 UART: [afmc] ++
3,079,645 UART: [afmc] CDI.KEYID = 6
3,080,007 UART: [afmc] SUBJECT.KEYID = 7
3,080,432 UART: [afmc] AUTHORITY.KEYID = 5
3,115,201 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,707 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,100 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,790 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,519 UART: [afmc] --
3,158,579 UART: [cold-reset] --
3,159,503 UART: [state] Locking Datavault
3,160,622 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,226 UART: [state] Locking ICCM
3,161,882 UART: [exit] Launching FMC @ 0x40000130
3,167,211 UART:
3,167,227 UART: Running Caliptra FMC ...
3,167,635 UART:
3,167,689 UART: [state] CFI Enabled
3,178,134 UART: [fht] FMC Alias Private Key: 7
3,286,461 UART: [art] Extend RT PCRs Done
3,286,889 UART: [art] Lock RT PCRs Done
3,288,501 UART: [art] Populate DV Done
3,296,738 UART: [fht] FMC Alias Private Key: 7
3,297,814 UART: [art] Derive CDI
3,298,094 UART: [art] Store in in slot 0x4
3,383,555 UART: [art] Derive Key Pair
3,383,915 UART: [art] Store priv key in slot 0x5
3,397,181 UART: [art] Derive Key Pair - Done
3,412,174 UART: [art] Signing Cert with AUTHO
3,412,654 UART: RITY.KEYID = 7
3,427,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,493 UART: [art] PUB.X = 0D25B323F37B3DB932BE3A58F7EB9E2A68A551128798BC76EF180058FC5AD797261435F712578891129A896B6027F29E
3,435,232 UART: [art] PUB.Y = D1A0847B791C56AC3D8B25047329A4293B96ABB1D7DBD76C2A13A43D44E0121AADE6A5A28F3D6537BB0DC3345EE2BDFF
3,442,194 UART: [art] SIG.R = 35B21BDF8E71C55582E5A31D1DE4E73D5ECBB1B204B8AD8FC2E9AF18DB0C540405B2DED5C8334EE582193047F730195E
3,448,966 UART: [art] SIG.S = A3157D46279D3051619BC89EC0BE66EB38568B4B0C2C428E0BE6290B1831500C25E5CA62EC380A7C0BCE351215A0392F
3,472,977 UART: Caliptra RT
3,473,231 UART: [state] CFI Enabled
3,580,983 UART: [rt] RT listening for mailbox commands...
3,581,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,392 UART: [rt]cmd =0x44504543, len=24
3,645,281 >>> mbox cmd response data (40 bytes)
3,645,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,215 UART: [rt]cmd =0x44504543, len=96
3,722,841 >>> mbox cmd response data (56 bytes)
3,722,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,923 UART: [rt]cmd =0x44504543, len=96
3,800,934 >>> mbox cmd response data (56 bytes)
3,800,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,966 UART: [rt]cmd =0x44504543, len=96
3,879,063 >>> mbox cmd response data (56 bytes)
3,879,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,955 UART: [rt]cmd =0x44504543, len=96
3,957,984 >>> mbox cmd response data (56 bytes)
3,957,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,987,762 UART: [rt]cmd =0x44504543, len=96
4,036,981 >>> mbox cmd response data (56 bytes)
4,036,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,127 UART: [rt]cmd =0x44504543, len=96
4,116,438 >>> mbox cmd response data (56 bytes)
4,116,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,424 UART: [rt]cmd =0x44504543, len=96
4,196,581 >>> mbox cmd response data (56 bytes)
4,196,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,469 UART: [rt]cmd =0x44504543, len=96
4,276,492 >>> mbox cmd response data (56 bytes)
4,276,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,306,346 UART: [rt]cmd =0x44504543, len=96
4,356,033 >>> mbox cmd response data (56 bytes)
4,356,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,386,153 UART: [rt]cmd =0x44504543, len=96
4,436,994 >>> mbox cmd response data (56 bytes)
4,436,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,466,860 UART: [rt]cmd =0x44504543, len=96
4,517,579 >>> mbox cmd response data (56 bytes)
4,517,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,547,383 UART: [rt]cmd =0x44504543, len=96
4,598,848 >>> mbox cmd response data (56 bytes)
4,598,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,629,080 UART: [rt]cmd =0x44504543, len=96
4,681,089 >>> mbox cmd response data (56 bytes)
4,681,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,711,147 UART: [rt]cmd =0x44504543, len=96
4,763,140 >>> mbox cmd response data (56 bytes)
4,763,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,793,210 UART: [rt]cmd =0x44504543, len=96
4,800,471 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,071 ready_for_fw is high
1,362,071 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,383 >>> mbox cmd response: success
2,987,589 UART:
2,987,605 UART: Running Caliptra FMC ...
2,988,013 UART:
2,988,067 UART: [state] CFI Enabled
2,998,708 UART: [fht] FMC Alias Private Key: 7
3,106,375 UART: [art] Extend RT PCRs Done
3,106,803 UART: [art] Lock RT PCRs Done
3,108,239 UART: [art] Populate DV Done
3,116,520 UART: [fht] FMC Alias Private Key: 7
3,117,574 UART: [art] Derive CDI
3,117,854 UART: [art] Store in in slot 0x4
3,203,819 UART: [art] Derive Key Pair
3,204,179 UART: [art] Store priv key in slot 0x5
3,217,115 UART: [art] Derive Key Pair - Done
3,231,891 UART: [art] Signing Cert with AUTHO
3,232,371 UART: RITY.KEYID = 7
3,247,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,024 UART: [art] PUB.X = F121A1A3C6D42050AA5F9F318BBB8BEF1618DAA17FC589740FCFF4B5D83BAC22CB805BF5A843FAD20A6C8A267509B219
3,254,805 UART: [art] PUB.Y = 2420B37C629D5F6D00B870418C9640BDB102D58BD0DFFA1C2E51ECBEE056817E669CC8D7274DA86EE0541423200E2771
3,261,731 UART: [art] SIG.R = BE4C730A56DDB742EA7D1BCCE6DDE35171336D3C73C53BF194CC9CAC90BD8B2687606596B698A9EFD002631988848A22
3,268,505 UART: [art] SIG.S = E805494BA23EA1E02320BC326DAFF36D3AEF752F41A32363D270B2E0C50555E3C9D13B5AAF4899AF81B3FE2FAF829BBF
3,293,294 UART: Caliptra RT
3,293,548 UART: [state] CFI Enabled
3,402,201 UART: [rt] RT listening for mailbox commands...
3,402,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,680 UART: [rt]cmd =0x44504543, len=24
3,467,181 >>> mbox cmd response data (40 bytes)
3,467,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,101 UART: [rt]cmd =0x44504543, len=96
3,545,111 >>> mbox cmd response data (56 bytes)
3,545,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,263 UART: [rt]cmd =0x44504543, len=96
3,623,444 >>> mbox cmd response data (56 bytes)
3,623,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,534 UART: [rt]cmd =0x44504543, len=96
3,701,971 >>> mbox cmd response data (56 bytes)
3,701,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,731,881 UART: [rt]cmd =0x44504543, len=96
3,781,020 >>> mbox cmd response data (56 bytes)
3,781,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,718 UART: [rt]cmd =0x44504543, len=96
3,859,749 >>> mbox cmd response data (56 bytes)
3,859,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,575 UART: [rt]cmd =0x44504543, len=96
3,938,852 >>> mbox cmd response data (56 bytes)
3,938,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,854 UART: [rt]cmd =0x44504543, len=96
4,018,057 >>> mbox cmd response data (56 bytes)
4,018,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,197 UART: [rt]cmd =0x44504543, len=96
4,098,882 >>> mbox cmd response data (56 bytes)
4,098,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,128,872 UART: [rt]cmd =0x44504543, len=96
4,179,109 >>> mbox cmd response data (56 bytes)
4,179,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,208,801 UART: [rt]cmd =0x44504543, len=96
4,259,664 >>> mbox cmd response data (56 bytes)
4,259,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,289,588 UART: [rt]cmd =0x44504543, len=96
4,340,389 >>> mbox cmd response data (56 bytes)
4,340,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,265 UART: [rt]cmd =0x44504543, len=96
4,422,168 >>> mbox cmd response data (56 bytes)
4,422,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,244 UART: [rt]cmd =0x44504543, len=96
4,504,269 >>> mbox cmd response data (56 bytes)
4,504,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,534,113 UART: [rt]cmd =0x44504543, len=96
4,586,322 >>> mbox cmd response data (56 bytes)
4,586,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,616,166 UART: [rt]cmd =0x44504543, len=96
4,623,713 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,561 UART: [kat] SHA2-512-ACC
897,462 UART: [kat] ECC-384
903,259 UART: [kat] HMAC-384Kdf
907,871 UART: [kat] LMS
1,476,067 UART: [kat] --
1,476,696 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,807 UART: [idev] ++
1,479,975 UART: [idev] CDI.KEYID = 6
1,480,335 UART: [idev] SUBJECT.KEYID = 7
1,480,759 UART: [idev] UDS.KEYID = 0
1,481,104 ready_for_fw is high
1,481,104 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,505,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,245 UART: [idev] --
1,515,432 UART: [ldev] ++
1,515,600 UART: [ldev] CDI.KEYID = 6
1,515,963 UART: [ldev] SUBJECT.KEYID = 5
1,516,389 UART: [ldev] AUTHORITY.KEYID = 7
1,516,852 UART: [ldev] FE.KEYID = 1
1,521,970 UART: [ldev] Erasing FE.KEYID = 1
1,547,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,613 UART: [ldev] --
1,586,898 UART: [fwproc] Waiting for Commands...
1,587,703 UART: [fwproc] Received command 0x46574c44
1,588,494 UART: [fwproc] Received Image of size 114360 bytes
2,886,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,563 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,915 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,898 >>> mbox cmd response: success
3,080,016 UART: [afmc] ++
3,080,184 UART: [afmc] CDI.KEYID = 6
3,080,546 UART: [afmc] SUBJECT.KEYID = 7
3,080,971 UART: [afmc] AUTHORITY.KEYID = 5
3,116,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,576 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,969 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,659 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,382 UART: [afmc] --
3,159,396 UART: [cold-reset] --
3,160,160 UART: [state] Locking Datavault
3,161,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,245 UART: [state] Locking ICCM
3,162,685 UART: [exit] Launching FMC @ 0x40000130
3,168,014 UART:
3,168,030 UART: Running Caliptra FMC ...
3,168,438 UART:
3,168,581 UART: [state] CFI Enabled
3,179,110 UART: [fht] FMC Alias Private Key: 7
3,287,627 UART: [art] Extend RT PCRs Done
3,288,055 UART: [art] Lock RT PCRs Done
3,289,929 UART: [art] Populate DV Done
3,298,190 UART: [fht] FMC Alias Private Key: 7
3,299,150 UART: [art] Derive CDI
3,299,430 UART: [art] Store in in slot 0x4
3,385,389 UART: [art] Derive Key Pair
3,385,749 UART: [art] Store priv key in slot 0x5
3,398,937 UART: [art] Derive Key Pair - Done
3,413,549 UART: [art] Signing Cert with AUTHO
3,414,029 UART: RITY.KEYID = 7
3,429,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,918 UART: [art] PUB.X = 025548CA035DE0BEC627AEFF93142AF71F12BB0467FC695A45DBB9AD812DE6CFA8B4B33D7065FD098F60B666EB4E0B23
3,436,691 UART: [art] PUB.Y = 75B6631B4E0D571275D3D6D20D988513972E8E7E99F01D19869FA7C6AC4EB9373DD5C157D21C772B95B377E013E86E83
3,443,633 UART: [art] SIG.R = 2B36FC089AD8EA22DBE25A41B08484C175C95555826ED4C7AE11403153118C3C35CFF3D7912A8F6D42B39C9495EF7E25
3,450,404 UART: [art] SIG.S = 88D3DF14E1F55242BA33E87CBA99B5D8C23C2F4BF2043CED85F0849E2ECC3F21ACA044601AE8D54C58B1E55D967BF856
3,474,690 UART: Caliptra RT
3,475,036 UART: [state] CFI Enabled
3,582,868 UART: [rt] RT listening for mailbox commands...
3,583,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,149 UART: [rt]cmd =0x44504543, len=24
3,647,524 >>> mbox cmd response data (40 bytes)
3,647,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,204 UART: [rt]cmd =0x44504543, len=96
3,724,790 >>> mbox cmd response data (56 bytes)
3,724,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,858 UART: [rt]cmd =0x44504543, len=96
3,803,023 >>> mbox cmd response data (56 bytes)
3,803,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,171 UART: [rt]cmd =0x44504543, len=96
3,882,058 >>> mbox cmd response data (56 bytes)
3,882,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,182 UART: [rt]cmd =0x44504543, len=96
3,961,059 >>> mbox cmd response data (56 bytes)
3,961,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,051 UART: [rt]cmd =0x44504543, len=96
4,040,094 >>> mbox cmd response data (56 bytes)
4,040,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,968 UART: [rt]cmd =0x44504543, len=96
4,118,725 >>> mbox cmd response data (56 bytes)
4,118,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,739 UART: [rt]cmd =0x44504543, len=96
4,199,168 >>> mbox cmd response data (56 bytes)
4,199,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,229,416 UART: [rt]cmd =0x44504543, len=96
4,279,631 >>> mbox cmd response data (56 bytes)
4,279,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,635 UART: [rt]cmd =0x44504543, len=96
4,360,168 >>> mbox cmd response data (56 bytes)
4,360,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,389,884 UART: [rt]cmd =0x44504543, len=96
4,439,603 >>> mbox cmd response data (56 bytes)
4,439,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,469,275 UART: [rt]cmd =0x44504543, len=96
4,520,240 >>> mbox cmd response data (56 bytes)
4,520,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,550,340 UART: [rt]cmd =0x44504543, len=96
4,601,607 >>> mbox cmd response data (56 bytes)
4,601,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,631,489 UART: [rt]cmd =0x44504543, len=96
4,683,880 >>> mbox cmd response data (56 bytes)
4,683,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,713,744 UART: [rt]cmd =0x44504543, len=96
4,766,215 >>> mbox cmd response data (56 bytes)
4,766,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,796,199 UART: [rt]cmd =0x44504543, len=96
4,803,420 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,858 ready_for_fw is high
1,362,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,002 >>> mbox cmd response: success
2,991,028 UART:
2,991,044 UART: Running Caliptra FMC ...
2,991,452 UART:
2,991,595 UART: [state] CFI Enabled
3,002,496 UART: [fht] FMC Alias Private Key: 7
3,110,593 UART: [art] Extend RT PCRs Done
3,111,021 UART: [art] Lock RT PCRs Done
3,112,335 UART: [art] Populate DV Done
3,120,636 UART: [fht] FMC Alias Private Key: 7
3,121,802 UART: [art] Derive CDI
3,122,082 UART: [art] Store in in slot 0x4
3,207,917 UART: [art] Derive Key Pair
3,208,277 UART: [art] Store priv key in slot 0x5
3,221,581 UART: [art] Derive Key Pair - Done
3,236,198 UART: [art] Signing Cert with AUTHO
3,236,678 UART: RITY.KEYID = 7
3,252,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,117 UART: [art] PUB.X = E120BFE5E99CBF5A632629BB7B49A5E1969DA4F63EDA72B7AED63853D21D8A5001D295E75DDABE621799118A49632B16
3,259,894 UART: [art] PUB.Y = A96DAF05A5187B4FF0B40FB37C1FA5987ACFDB27A1FBB512939D72743AEB7B9CB790BAA152062C00705C2DF9D34F7E04
3,266,828 UART: [art] SIG.R = E62364B473DCF009D535B31942E49AEE75E495EBB96B58FF0F21C2D771FBBF7477EEF6DC0D4DCBC5A004F67C378066A9
3,273,602 UART: [art] SIG.S = 01D3BEAFD9AF44EB27F9E0CE4153DFD2DA7057DE67B685D05DA15CC1048FAA5D5C153DAF3B192183A4C55DF68FC25B86
3,297,617 UART: Caliptra RT
3,297,963 UART: [state] CFI Enabled
3,406,231 UART: [rt] RT listening for mailbox commands...
3,406,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,634 UART: [rt]cmd =0x44504543, len=24
3,470,575 >>> mbox cmd response data (40 bytes)
3,470,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,497 UART: [rt]cmd =0x44504543, len=96
3,549,201 >>> mbox cmd response data (56 bytes)
3,549,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,373 UART: [rt]cmd =0x44504543, len=96
3,627,804 >>> mbox cmd response data (56 bytes)
3,627,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,942 UART: [rt]cmd =0x44504543, len=96
3,705,927 >>> mbox cmd response data (56 bytes)
3,705,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,025 UART: [rt]cmd =0x44504543, len=96
3,785,900 >>> mbox cmd response data (56 bytes)
3,785,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,018 UART: [rt]cmd =0x44504543, len=96
3,865,325 >>> mbox cmd response data (56 bytes)
3,865,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,315 UART: [rt]cmd =0x44504543, len=96
3,944,986 >>> mbox cmd response data (56 bytes)
3,944,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,018 UART: [rt]cmd =0x44504543, len=96
4,024,597 >>> mbox cmd response data (56 bytes)
4,024,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,054,499 UART: [rt]cmd =0x44504543, len=96
4,105,166 >>> mbox cmd response data (56 bytes)
4,105,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,135,234 UART: [rt]cmd =0x44504543, len=96
4,185,639 >>> mbox cmd response data (56 bytes)
4,185,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,215,801 UART: [rt]cmd =0x44504543, len=96
4,266,664 >>> mbox cmd response data (56 bytes)
4,266,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,706 UART: [rt]cmd =0x44504543, len=96
4,347,967 >>> mbox cmd response data (56 bytes)
4,347,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,903 UART: [rt]cmd =0x44504543, len=96
4,429,204 >>> mbox cmd response data (56 bytes)
4,429,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,459,378 UART: [rt]cmd =0x44504543, len=96
4,510,847 >>> mbox cmd response data (56 bytes)
4,510,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,540,795 UART: [rt]cmd =0x44504543, len=96
4,592,386 >>> mbox cmd response data (56 bytes)
4,592,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,622,196 UART: [rt]cmd =0x44504543, len=96
4,629,553 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,620 UART: [kat] LMS
1,170,948 UART: [kat] --
1,171,721 UART: [cold-reset] ++
1,172,219 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,199,911 UART: [idev] Sha1 KeyId Algorithm
1,208,319 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,755 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,648 UART: [fwproc] Recv command 0x46574c44
1,283,376 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,540 >>> mbox cmd response: success
2,774,616 UART: [afmc] ++
2,774,784 UART: [afmc] CDI.KEYID = 6
2,775,146 UART: [afmc] SUBJECT.KEYID = 7
2,775,571 UART: [afmc] AUTHORITY.KEYID = 5
2,811,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,516 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,235 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,101 UART: [afmc] --
2,854,059 UART: [cold-reset] --
2,854,867 UART: [state] Locking Datavault
2,856,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,766 UART: [state] Locking ICCM
2,857,298 UART: [exit] Launching FMC @ 0x40000130
2,862,627 UART:
2,862,643 UART: Running Caliptra FMC ...
2,863,051 UART:
2,863,105 UART: [state] CFI Enabled
2,873,640 UART: [fht] FMC Alias Private Key: 7
2,982,453 UART: [art] Extend RT PCRs Done
2,982,881 UART: [art] Lock RT PCRs Done
2,984,403 UART: [art] Populate DV Done
2,992,804 UART: [fht] FMC Alias Private Key: 7
2,993,788 UART: [art] Derive CDI
2,994,068 UART: [art] Store in in slot 0x4
3,079,655 UART: [art] Derive Key Pair
3,080,015 UART: [art] Store priv key in slot 0x5
3,092,429 UART: [art] Derive Key Pair - Done
3,106,968 UART: [art] Signing Cert with AUTHO
3,107,448 UART: RITY.KEYID = 7
3,122,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,597 UART: [art] PUB.X = A5CD3AD24BEF15B8D999657113FE77AB802DD0D55381F4D9FFF8CBB7AEFE96FE7EC4C432C54E6E44447401B0069947B4
3,130,377 UART: [art] PUB.Y = 5CB52095626BA5DECB776DB828B212E1224ADB0F59C50A1ED141EC5996B513BAEB9FE069FC7E930FB05DC72327174712
3,137,328 UART: [art] SIG.R = 3C63E5A0F1087A493B603BAFF09D06D2D5754369C7D77704C7C438410E2C0E9E8202BCA1032CD0F2AC5EDF43172AFC9D
3,144,087 UART: [art] SIG.S = BCFB64996026D95D28BB345BF486F6CA14485A3F9C81D1E9D6262C31201ACEEECE8D8660C4CB87392EA4E8AFF37F8B43
3,168,116 UART: Caliptra RT
3,168,370 UART: [state] CFI Enabled
3,276,360 UART: [rt] RT listening for mailbox commands...
3,277,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,849 UART: [rt]cmd =0x44504543, len=24
3,340,374 >>> mbox cmd response data (40 bytes)
3,340,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,332 UART: [rt]cmd =0x44504543, len=96
3,418,582 >>> mbox cmd response data (56 bytes)
3,418,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,744 UART: [rt]cmd =0x44504543, len=96
3,497,309 >>> mbox cmd response data (56 bytes)
3,497,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,477 UART: [rt]cmd =0x44504543, len=96
3,576,278 >>> mbox cmd response data (56 bytes)
3,576,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,274 UART: [rt]cmd =0x44504543, len=96
3,655,479 >>> mbox cmd response data (56 bytes)
3,655,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,425 UART: [rt]cmd =0x44504543, len=96
3,734,750 >>> mbox cmd response data (56 bytes)
3,734,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,632 UART: [rt]cmd =0x44504543, len=96
3,814,445 >>> mbox cmd response data (56 bytes)
3,814,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,125 UART: [rt]cmd =0x44504543, len=96
3,894,538 >>> mbox cmd response data (56 bytes)
3,894,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,504 UART: [rt]cmd =0x44504543, len=96
3,974,021 >>> mbox cmd response data (56 bytes)
3,974,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,065 UART: [rt]cmd =0x44504543, len=96
4,053,964 >>> mbox cmd response data (56 bytes)
4,053,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,880 UART: [rt]cmd =0x44504543, len=96
4,134,435 >>> mbox cmd response data (56 bytes)
4,134,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,481 UART: [rt]cmd =0x44504543, len=96
4,215,082 >>> mbox cmd response data (56 bytes)
4,215,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,245,146 UART: [rt]cmd =0x44504543, len=96
4,296,313 >>> mbox cmd response data (56 bytes)
4,296,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,326,333 UART: [rt]cmd =0x44504543, len=96
4,377,314 >>> mbox cmd response data (56 bytes)
4,377,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,407,046 UART: [rt]cmd =0x44504543, len=96
4,459,291 >>> mbox cmd response data (56 bytes)
4,459,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,489,281 UART: [rt]cmd =0x44504543, len=96
4,496,486 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 ready_for_fw is high
1,060,341 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,739 >>> mbox cmd response: success
2,686,793 UART:
2,686,809 UART: Running Caliptra FMC ...
2,687,217 UART:
2,687,271 UART: [state] CFI Enabled
2,697,462 UART: [fht] FMC Alias Private Key: 7
2,805,609 UART: [art] Extend RT PCRs Done
2,806,037 UART: [art] Lock RT PCRs Done
2,807,333 UART: [art] Populate DV Done
2,815,536 UART: [fht] FMC Alias Private Key: 7
2,816,596 UART: [art] Derive CDI
2,816,876 UART: [art] Store in in slot 0x4
2,902,421 UART: [art] Derive Key Pair
2,902,781 UART: [art] Store priv key in slot 0x5
2,915,893 UART: [art] Derive Key Pair - Done
2,930,697 UART: [art] Signing Cert with AUTHO
2,931,177 UART: RITY.KEYID = 7
2,946,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,930 UART: [art] PUB.X = 62663758AB0DA64E3C831AF6133DA53FA13AFBE689DC3E5E056F77602005088F9110D8D88AFDF9E400AD5A1C71302EA9
2,953,674 UART: [art] PUB.Y = DA8AF8BF1613F84893445E786191D56BF01F96F37B9CB7E071CA75B27DC988EABC3D23A8D61D62D3522E4874325AA88F
2,960,632 UART: [art] SIG.R = 881A075B83907681F3C86F1641BF4F20937B303B515D8C48CF4DA93EEE71F69C1044E0424AE90D46A577F790D6AAD7E2
2,967,398 UART: [art] SIG.S = 18360619EC34A876397CDA9F92A99FE483558C2E3B2AA3D750794D7FE13692B64D81B044E867B90CD0C7531B719DF218
2,990,763 UART: Caliptra RT
2,991,017 UART: [state] CFI Enabled
3,097,285 UART: [rt] RT listening for mailbox commands...
3,097,955 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,772 UART: [rt]cmd =0x44504543, len=24
3,161,425 >>> mbox cmd response data (40 bytes)
3,161,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,669 UART: [rt]cmd =0x44504543, len=96
3,240,059 >>> mbox cmd response data (56 bytes)
3,240,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,269,877 UART: [rt]cmd =0x44504543, len=96
3,318,192 >>> mbox cmd response data (56 bytes)
3,318,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,022 UART: [rt]cmd =0x44504543, len=96
3,396,983 >>> mbox cmd response data (56 bytes)
3,396,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,157 UART: [rt]cmd =0x44504543, len=96
3,476,142 >>> mbox cmd response data (56 bytes)
3,476,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,132 UART: [rt]cmd =0x44504543, len=96
3,554,891 >>> mbox cmd response data (56 bytes)
3,554,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,905 UART: [rt]cmd =0x44504543, len=96
3,633,614 >>> mbox cmd response data (56 bytes)
3,633,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,788 UART: [rt]cmd =0x44504543, len=96
3,713,565 >>> mbox cmd response data (56 bytes)
3,713,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,471 UART: [rt]cmd =0x44504543, len=96
3,793,744 >>> mbox cmd response data (56 bytes)
3,793,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,692 UART: [rt]cmd =0x44504543, len=96
3,874,735 >>> mbox cmd response data (56 bytes)
3,874,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,904,919 UART: [rt]cmd =0x44504543, len=96
3,955,652 >>> mbox cmd response data (56 bytes)
3,955,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,985,608 UART: [rt]cmd =0x44504543, len=96
4,036,597 >>> mbox cmd response data (56 bytes)
4,036,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,655 UART: [rt]cmd =0x44504543, len=96
4,117,606 >>> mbox cmd response data (56 bytes)
4,117,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,560 UART: [rt]cmd =0x44504543, len=96
4,198,771 >>> mbox cmd response data (56 bytes)
4,198,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,228,693 UART: [rt]cmd =0x44504543, len=96
4,280,302 >>> mbox cmd response data (56 bytes)
4,280,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,310,336 UART: [rt]cmd =0x44504543, len=96
4,317,831 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
893,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,468 UART: [kat] ++
897,620 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,455 UART: [kat] SHA2-512-ACC
908,356 UART: [kat] ECC-384
918,055 UART: [kat] HMAC-384Kdf
922,575 UART: [kat] LMS
1,170,903 UART: [kat] --
1,171,812 UART: [cold-reset] ++
1,172,382 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
1,176,284 ready_for_fw is high
1,176,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,201 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,460 UART: [idev] --
1,210,410 UART: [ldev] ++
1,210,578 UART: [ldev] CDI.KEYID = 6
1,210,941 UART: [ldev] SUBJECT.KEYID = 5
1,211,367 UART: [ldev] AUTHORITY.KEYID = 7
1,211,830 UART: [ldev] FE.KEYID = 1
1,216,950 UART: [ldev] Erasing FE.KEYID = 1
1,242,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,770 UART: [ldev] --
1,282,083 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,591 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,695 >>> mbox cmd response: success
2,774,831 UART: [afmc] ++
2,774,999 UART: [afmc] CDI.KEYID = 6
2,775,361 UART: [afmc] SUBJECT.KEYID = 7
2,775,786 UART: [afmc] AUTHORITY.KEYID = 5
2,810,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,214 UART: [afmc] --
2,854,314 UART: [cold-reset] --
2,855,334 UART: [state] Locking Datavault
2,856,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,161 UART: [state] Locking ICCM
2,857,821 UART: [exit] Launching FMC @ 0x40000130
2,863,150 UART:
2,863,166 UART: Running Caliptra FMC ...
2,863,574 UART:
2,863,717 UART: [state] CFI Enabled
2,874,372 UART: [fht] FMC Alias Private Key: 7
2,982,777 UART: [art] Extend RT PCRs Done
2,983,205 UART: [art] Lock RT PCRs Done
2,984,519 UART: [art] Populate DV Done
2,992,832 UART: [fht] FMC Alias Private Key: 7
2,994,002 UART: [art] Derive CDI
2,994,282 UART: [art] Store in in slot 0x4
3,079,841 UART: [art] Derive Key Pair
3,080,201 UART: [art] Store priv key in slot 0x5
3,093,623 UART: [art] Derive Key Pair - Done
3,108,294 UART: [art] Signing Cert with AUTHO
3,108,774 UART: RITY.KEYID = 7
3,123,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,385 UART: [art] PUB.X = 2204C7869D270FE70F5D6A7598AF7B8BDD92648CA64941D5DC1991BC9A329FD203EBF04CE7B776250E5C3E37935D1F9F
3,131,148 UART: [art] PUB.Y = EC6F873B68CD0A43966B6569AA2F2E3755606C202887FF61225BAB16BC55D6030FB883621A24B821754A3D1671C1AA5E
3,138,089 UART: [art] SIG.R = 8FF75EB53D5AA63AEB463BF466ACD17BAF27BA47257E5439220A854A32B5DF3014B583F24A5342D80003FCC47CEB697C
3,144,843 UART: [art] SIG.S = 1C5CDEFF4D81D9C06AF7E00D697FEFF90098267C3D5FFD918CCB9A5F175ED5CE7C7DE8FD375F018B47339FC236DC04F6
3,168,653 UART: Caliptra RT
3,168,999 UART: [state] CFI Enabled
3,276,507 UART: [rt] RT listening for mailbox commands...
3,277,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,592 UART: [rt]cmd =0x44504543, len=24
3,340,483 >>> mbox cmd response data (40 bytes)
3,340,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,587 UART: [rt]cmd =0x44504543, len=96
3,418,817 >>> mbox cmd response data (56 bytes)
3,418,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,715 UART: [rt]cmd =0x44504543, len=96
3,497,994 >>> mbox cmd response data (56 bytes)
3,497,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,918 UART: [rt]cmd =0x44504543, len=96
3,576,493 >>> mbox cmd response data (56 bytes)
3,576,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,339 UART: [rt]cmd =0x44504543, len=96
3,655,032 >>> mbox cmd response data (56 bytes)
3,655,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,016 UART: [rt]cmd =0x44504543, len=96
3,735,167 >>> mbox cmd response data (56 bytes)
3,735,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,347 UART: [rt]cmd =0x44504543, len=96
3,814,980 >>> mbox cmd response data (56 bytes)
3,814,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,856 UART: [rt]cmd =0x44504543, len=96
3,894,823 >>> mbox cmd response data (56 bytes)
3,894,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,925,043 UART: [rt]cmd =0x44504543, len=96
3,975,050 >>> mbox cmd response data (56 bytes)
3,975,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,224 UART: [rt]cmd =0x44504543, len=96
4,056,317 >>> mbox cmd response data (56 bytes)
4,056,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,125 UART: [rt]cmd =0x44504543, len=96
4,137,098 >>> mbox cmd response data (56 bytes)
4,137,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,092 UART: [rt]cmd =0x44504543, len=96
4,218,351 >>> mbox cmd response data (56 bytes)
4,218,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,248,423 UART: [rt]cmd =0x44504543, len=96
4,299,746 >>> mbox cmd response data (56 bytes)
4,299,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,329,528 UART: [rt]cmd =0x44504543, len=96
4,380,877 >>> mbox cmd response data (56 bytes)
4,380,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,410,583 UART: [rt]cmd =0x44504543, len=96
4,462,798 >>> mbox cmd response data (56 bytes)
4,462,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,492,640 UART: [rt]cmd =0x44504543, len=96
4,500,181 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,632 ready_for_fw is high
1,059,632 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,838 >>> mbox cmd response: success
2,687,788 UART:
2,687,804 UART: Running Caliptra FMC ...
2,688,212 UART:
2,688,355 UART: [state] CFI Enabled
2,699,116 UART: [fht] FMC Alias Private Key: 7
2,806,847 UART: [art] Extend RT PCRs Done
2,807,275 UART: [art] Lock RT PCRs Done
2,808,597 UART: [art] Populate DV Done
2,816,854 UART: [fht] FMC Alias Private Key: 7
2,817,918 UART: [art] Derive CDI
2,818,198 UART: [art] Store in in slot 0x4
2,904,209 UART: [art] Derive Key Pair
2,904,569 UART: [art] Store priv key in slot 0x5
2,918,071 UART: [art] Derive Key Pair - Done
2,932,658 UART: [art] Signing Cert with AUTHO
2,933,138 UART: RITY.KEYID = 7
2,948,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,109 UART: [art] PUB.X = 7ADDA80A5FE888359ADA9F39CAB53B7E8EF6B0145A88E2FAFAACB6AFA353BC718461C1F06736CD7B75EA36A8F0EE4B7A
2,955,906 UART: [art] PUB.Y = 8F3CD1607420E9750FC6C27597E8FAA97BBCA4592BD9578720360DD38A11A05F25EF9701073289DEA5A3519924986DA4
2,962,842 UART: [art] SIG.R = FE07E267B8D9D7EC46594BBFD07B92DF3997184E100528718BF95FE75AF5D63459E11579458E59A01596C24BB57845E7
2,969,604 UART: [art] SIG.S = 5B242189789EA054E57EEB5036513F84D8FA021A7A181B1DF63CE5D429FFD5DD838C9EF1590C549849DDEBCDE44AC9A0
2,993,505 UART: Caliptra RT
2,993,851 UART: [state] CFI Enabled
3,101,831 UART: [rt] RT listening for mailbox commands...
3,102,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,978 UART: [rt]cmd =0x44504543, len=24
3,166,385 >>> mbox cmd response data (40 bytes)
3,166,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,587 UART: [rt]cmd =0x44504543, len=96
3,244,757 >>> mbox cmd response data (56 bytes)
3,244,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,581 UART: [rt]cmd =0x44504543, len=96
3,322,858 >>> mbox cmd response data (56 bytes)
3,322,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,740 UART: [rt]cmd =0x44504543, len=96
3,402,035 >>> mbox cmd response data (56 bytes)
3,402,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,141 UART: [rt]cmd =0x44504543, len=96
3,481,436 >>> mbox cmd response data (56 bytes)
3,481,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,314 UART: [rt]cmd =0x44504543, len=96
3,559,981 >>> mbox cmd response data (56 bytes)
3,559,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,745 UART: [rt]cmd =0x44504543, len=96
3,639,470 >>> mbox cmd response data (56 bytes)
3,639,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,328 UART: [rt]cmd =0x44504543, len=96
3,719,489 >>> mbox cmd response data (56 bytes)
3,719,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,657 UART: [rt]cmd =0x44504543, len=96
3,799,482 >>> mbox cmd response data (56 bytes)
3,799,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,528 UART: [rt]cmd =0x44504543, len=96
3,880,017 >>> mbox cmd response data (56 bytes)
3,880,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,981 UART: [rt]cmd =0x44504543, len=96
3,960,922 >>> mbox cmd response data (56 bytes)
3,960,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,840 UART: [rt]cmd =0x44504543, len=96
4,042,085 >>> mbox cmd response data (56 bytes)
4,042,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,977 UART: [rt]cmd =0x44504543, len=96
4,123,574 >>> mbox cmd response data (56 bytes)
4,123,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,506 UART: [rt]cmd =0x44504543, len=96
4,204,945 >>> mbox cmd response data (56 bytes)
4,204,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,234,915 UART: [rt]cmd =0x44504543, len=96
4,286,342 >>> mbox cmd response data (56 bytes)
4,286,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,316,104 UART: [rt]cmd =0x44504543, len=96
4,323,233 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 ready_for_fw is high
1,174,489 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,199,469 UART: [idev] Sha1 KeyId Algorithm
1,208,263 UART: [idev] --
1,209,298 UART: [ldev] ++
1,209,466 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,257 UART: [ldev] AUTHORITY.KEYID = 7
1,210,720 UART: [ldev] FE.KEYID = 1
1,216,240 UART: [ldev] Erasing FE.KEYID = 1
1,242,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,502 UART: [ldev] --
1,281,788 UART: [fwproc] Wait for Commands...
1,282,517 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,352 >>> mbox cmd response: success
2,773,423 UART: [afmc] ++
2,773,591 UART: [afmc] CDI.KEYID = 6
2,773,954 UART: [afmc] SUBJECT.KEYID = 7
2,774,380 UART: [afmc] AUTHORITY.KEYID = 5
2,809,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,674 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,005 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,702 UART: [afmc] --
2,852,784 UART: [cold-reset] --
2,853,574 UART: [state] Locking Datavault
2,854,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,451 UART: [state] Locking ICCM
2,855,957 UART: [exit] Launching FMC @ 0x40000130
2,861,286 UART:
2,861,302 UART: Running Caliptra FMC ...
2,861,710 UART:
2,861,764 UART: [state] CFI Enabled
2,872,175 UART: [fht] FMC Alias Private Key: 7
2,980,438 UART: [art] Extend RT PCRs Done
2,980,866 UART: [art] Lock RT PCRs Done
2,982,642 UART: [art] Populate DV Done
2,990,679 UART: [fht] FMC Alias Private Key: 7
2,991,777 UART: [art] Derive CDI
2,992,057 UART: [art] Store in in slot 0x4
3,077,970 UART: [art] Derive Key Pair
3,078,330 UART: [art] Store priv key in slot 0x5
3,091,622 UART: [art] Derive Key Pair - Done
3,106,244 UART: [art] Signing Cert with AUTHO
3,106,724 UART: RITY.KEYID = 7
3,122,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,851 UART: [art] PUB.X = D0DF314A2454ACFADAA19C1C5C253C35A9B83E9B674CB9A004D1E8D2F72ACCEAEFF154859C143424E634625411CDC7FD
3,129,638 UART: [art] PUB.Y = E363B1D4541EACA5552A735F34CA261E6E007861225180DA5E2134B348DB07F9CD5ED34C3C672A5AEFE7193F099842C3
3,136,564 UART: [art] SIG.R = C507C26174A2EFBBCEDC76055EC463D5D3E98AF6CE5C0FC62A2514CC69C8FE70D26F4A7C36703864765639EAD6D1112E
3,143,339 UART: [art] SIG.S = 7E6E1C2573E2C0D1F0A13D23B4C45A3F3AC7E18997449891E728E3CC82EA2406962215A2948B152875EF146D225ABF0E
3,167,278 UART: Caliptra RT
3,167,532 UART: [state] CFI Enabled
3,274,588 UART: [rt] RT listening for mailbox commands...
3,275,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,795 UART: [rt]cmd =0x44504543, len=24
3,338,720 >>> mbox cmd response data (40 bytes)
3,338,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,794 UART: [rt]cmd =0x44504543, len=96
3,417,390 >>> mbox cmd response data (56 bytes)
3,417,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,104 UART: [rt]cmd =0x44504543, len=96
3,495,679 >>> mbox cmd response data (56 bytes)
3,495,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,451 UART: [rt]cmd =0x44504543, len=96
3,574,932 >>> mbox cmd response data (56 bytes)
3,574,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,012 UART: [rt]cmd =0x44504543, len=96
3,653,705 >>> mbox cmd response data (56 bytes)
3,653,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,857 UART: [rt]cmd =0x44504543, len=96
3,733,348 >>> mbox cmd response data (56 bytes)
3,733,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,292 UART: [rt]cmd =0x44504543, len=96
3,812,417 >>> mbox cmd response data (56 bytes)
3,812,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,343 UART: [rt]cmd =0x44504543, len=96
3,891,186 >>> mbox cmd response data (56 bytes)
3,891,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,190 UART: [rt]cmd =0x44504543, len=96
3,971,345 >>> mbox cmd response data (56 bytes)
3,971,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,289 UART: [rt]cmd =0x44504543, len=96
4,051,504 >>> mbox cmd response data (56 bytes)
4,051,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,081,476 UART: [rt]cmd =0x44504543, len=96
4,132,363 >>> mbox cmd response data (56 bytes)
4,132,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,413 UART: [rt]cmd =0x44504543, len=96
4,213,306 >>> mbox cmd response data (56 bytes)
4,213,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,243,062 UART: [rt]cmd =0x44504543, len=96
4,294,387 >>> mbox cmd response data (56 bytes)
4,294,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,324,403 UART: [rt]cmd =0x44504543, len=96
4,375,874 >>> mbox cmd response data (56 bytes)
4,375,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,405,922 UART: [rt]cmd =0x44504543, len=96
4,457,133 >>> mbox cmd response data (56 bytes)
4,457,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,486,951 UART: [rt]cmd =0x44504543, len=96
4,494,016 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,500 ready_for_fw is high
1,056,500 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,944 >>> mbox cmd response: success
2,686,880 UART:
2,686,896 UART: Running Caliptra FMC ...
2,687,304 UART:
2,687,358 UART: [state] CFI Enabled
2,698,131 UART: [fht] FMC Alias Private Key: 7
2,807,078 UART: [art] Extend RT PCRs Done
2,807,506 UART: [art] Lock RT PCRs Done
2,809,084 UART: [art] Populate DV Done
2,817,303 UART: [fht] FMC Alias Private Key: 7
2,818,291 UART: [art] Derive CDI
2,818,571 UART: [art] Store in in slot 0x4
2,904,116 UART: [art] Derive Key Pair
2,904,476 UART: [art] Store priv key in slot 0x5
2,917,780 UART: [art] Derive Key Pair - Done
2,932,344 UART: [art] Signing Cert with AUTHO
2,932,824 UART: RITY.KEYID = 7
2,948,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,827 UART: [art] PUB.X = 6CA267BAD843628797A9928C2393A15C4B653C33AB666EA87F2134F0A9EC275CB00BFBD2817B4D85061AAC05CC47161A
2,955,594 UART: [art] PUB.Y = 3D612B65E7C2278D5011D43E91ACDC527D076CE91C2ADDD2DEE7F9FD98899E2377339CCA520F6FE3CF98676ACD24EEC0
2,962,556 UART: [art] SIG.R = 742307E36171E22F8800A8AEF097950CE514074D896F44C7991A2F9AF027F55F888589304E67D03BA2BAAD3E6B3A8D73
2,969,293 UART: [art] SIG.S = A4BB6037EDFA7A26DEBF70B33169B14C4F77A2952AFD5C9331D047464C58F4B527865FFA0E25725DD9B70EF2A3F8FFDB
2,992,548 UART: Caliptra RT
2,992,802 UART: [state] CFI Enabled
3,100,378 UART: [rt] RT listening for mailbox commands...
3,101,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,591 UART: [rt]cmd =0x44504543, len=24
3,164,672 >>> mbox cmd response data (40 bytes)
3,164,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,704 UART: [rt]cmd =0x44504543, len=96
3,242,904 >>> mbox cmd response data (56 bytes)
3,242,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,792 UART: [rt]cmd =0x44504543, len=96
3,321,143 >>> mbox cmd response data (56 bytes)
3,321,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,937 UART: [rt]cmd =0x44504543, len=96
3,399,844 >>> mbox cmd response data (56 bytes)
3,399,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,066 UART: [rt]cmd =0x44504543, len=96
3,478,945 >>> mbox cmd response data (56 bytes)
3,478,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,065 UART: [rt]cmd =0x44504543, len=96
3,558,296 >>> mbox cmd response data (56 bytes)
3,558,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,158 UART: [rt]cmd =0x44504543, len=96
3,637,635 >>> mbox cmd response data (56 bytes)
3,637,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,515 UART: [rt]cmd =0x44504543, len=96
3,717,438 >>> mbox cmd response data (56 bytes)
3,717,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,402 UART: [rt]cmd =0x44504543, len=96
3,797,205 >>> mbox cmd response data (56 bytes)
3,797,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,283 UART: [rt]cmd =0x44504543, len=96
3,877,910 >>> mbox cmd response data (56 bytes)
3,877,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,882 UART: [rt]cmd =0x44504543, len=96
3,957,781 >>> mbox cmd response data (56 bytes)
3,957,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,987,665 UART: [rt]cmd =0x44504543, len=96
4,038,684 >>> mbox cmd response data (56 bytes)
4,038,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,748 UART: [rt]cmd =0x44504543, len=96
4,120,811 >>> mbox cmd response data (56 bytes)
4,120,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,150,547 UART: [rt]cmd =0x44504543, len=96
4,201,936 >>> mbox cmd response data (56 bytes)
4,201,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,231,900 UART: [rt]cmd =0x44504543, len=96
4,283,373 >>> mbox cmd response data (56 bytes)
4,283,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,313,401 UART: [rt]cmd =0x44504543, len=96
4,320,620 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,174,536 ready_for_fw is high
1,174,536 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,418 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,703 UART: [fwproc] Wait for Commands...
1,283,494 UART: [fwproc] Recv command 0x46574c44
1,284,227 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,837 >>> mbox cmd response: success
2,776,054 UART: [afmc] ++
2,776,222 UART: [afmc] CDI.KEYID = 6
2,776,585 UART: [afmc] SUBJECT.KEYID = 7
2,777,011 UART: [afmc] AUTHORITY.KEYID = 5
2,813,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,883 UART: [afmc] --
2,856,797 UART: [cold-reset] --
2,857,473 UART: [state] Locking Datavault
2,858,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,108 UART: [state] Locking ICCM
2,859,742 UART: [exit] Launching FMC @ 0x40000130
2,865,071 UART:
2,865,087 UART: Running Caliptra FMC ...
2,865,495 UART:
2,865,638 UART: [state] CFI Enabled
2,876,463 UART: [fht] FMC Alias Private Key: 7
2,985,428 UART: [art] Extend RT PCRs Done
2,985,856 UART: [art] Lock RT PCRs Done
2,987,426 UART: [art] Populate DV Done
2,995,611 UART: [fht] FMC Alias Private Key: 7
2,996,687 UART: [art] Derive CDI
2,996,967 UART: [art] Store in in slot 0x4
3,082,812 UART: [art] Derive Key Pair
3,083,172 UART: [art] Store priv key in slot 0x5
3,096,146 UART: [art] Derive Key Pair - Done
3,111,116 UART: [art] Signing Cert with AUTHO
3,111,596 UART: RITY.KEYID = 7
3,126,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,393 UART: [art] PUB.X = 6B539E88C1ECE20151B2B786DBA723AEEF823C42CD6B58A879DB56206C9E84F54A022846B805DEB7F707169FACBE2E7B
3,134,165 UART: [art] PUB.Y = F60620DD619D9365D1D059002F063C8585074CB4E8E77FCD6FAD51807848DA8F659468A9F4AF37D789DF823B0B8421F3
3,141,081 UART: [art] SIG.R = 1D94C0014BE2DAC9AD33A07565EF75619297156C726C741B2FCBCBC477C6861A59AF5F7D3805126D89567350A61204CE
3,147,842 UART: [art] SIG.S = 062E84E9CDFDFA1E7889A628393588EEB786B12F20C9F9A475EC8DD66CA3438B6245AA9AB25F3A19C21C7521DDC01237
3,172,046 UART: Caliptra RT
3,172,392 UART: [state] CFI Enabled
3,279,770 UART: [rt] RT listening for mailbox commands...
3,280,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,079 UART: [rt]cmd =0x44504543, len=24
3,344,240 >>> mbox cmd response data (40 bytes)
3,344,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,290 UART: [rt]cmd =0x44504543, len=96
3,422,282 >>> mbox cmd response data (56 bytes)
3,422,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,270 UART: [rt]cmd =0x44504543, len=96
3,501,079 >>> mbox cmd response data (56 bytes)
3,501,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,947 UART: [rt]cmd =0x44504543, len=96
3,579,998 >>> mbox cmd response data (56 bytes)
3,579,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,172 UART: [rt]cmd =0x44504543, len=96
3,658,631 >>> mbox cmd response data (56 bytes)
3,658,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,523 UART: [rt]cmd =0x44504543, len=96
3,737,260 >>> mbox cmd response data (56 bytes)
3,737,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,170 UART: [rt]cmd =0x44504543, len=96
3,816,365 >>> mbox cmd response data (56 bytes)
3,816,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,483 UART: [rt]cmd =0x44504543, len=96
3,896,820 >>> mbox cmd response data (56 bytes)
3,896,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,926,814 UART: [rt]cmd =0x44504543, len=96
3,977,041 >>> mbox cmd response data (56 bytes)
3,977,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,006,901 UART: [rt]cmd =0x44504543, len=96
4,057,564 >>> mbox cmd response data (56 bytes)
4,057,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,466 UART: [rt]cmd =0x44504543, len=96
4,137,957 >>> mbox cmd response data (56 bytes)
4,137,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,847 UART: [rt]cmd =0x44504543, len=96
4,218,120 >>> mbox cmd response data (56 bytes)
4,218,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,248,188 UART: [rt]cmd =0x44504543, len=96
4,300,119 >>> mbox cmd response data (56 bytes)
4,300,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,330,127 UART: [rt]cmd =0x44504543, len=96
4,381,998 >>> mbox cmd response data (56 bytes)
4,381,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,411,832 UART: [rt]cmd =0x44504543, len=96
4,463,571 >>> mbox cmd response data (56 bytes)
4,463,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,493,437 UART: [rt]cmd =0x44504543, len=96
4,500,672 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,651 ready_for_fw is high
1,055,651 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,501 >>> mbox cmd response: success
2,684,395 UART:
2,684,411 UART: Running Caliptra FMC ...
2,684,819 UART:
2,684,962 UART: [state] CFI Enabled
2,695,517 UART: [fht] FMC Alias Private Key: 7
2,804,270 UART: [art] Extend RT PCRs Done
2,804,698 UART: [art] Lock RT PCRs Done
2,806,134 UART: [art] Populate DV Done
2,814,235 UART: [fht] FMC Alias Private Key: 7
2,815,281 UART: [art] Derive CDI
2,815,561 UART: [art] Store in in slot 0x4
2,901,662 UART: [art] Derive Key Pair
2,902,022 UART: [art] Store priv key in slot 0x5
2,914,716 UART: [art] Derive Key Pair - Done
2,929,360 UART: [art] Signing Cert with AUTHO
2,929,840 UART: RITY.KEYID = 7
2,945,104 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,869 UART: [art] PUB.X = D929D5BBCE93EC68E9792BD2C5EA2E374DF6F4364E79ED7EFA318E58BF3BCA3EEB2D0EC24330BC52EE00703B7E07875E
2,952,635 UART: [art] PUB.Y = B0C76B1908FDDC76E08B7EE521972DB47CE0870650399E27EA0D61031B0BC9BFD00AB2DCD406466834E394D82CEAA8C9
2,959,576 UART: [art] SIG.R = D9F116977190532CB5731C20273D98AAAEADFA55C9723F37806AEB87F9F8D948DB6AD7D844515DB996C007325F517B51
2,966,345 UART: [art] SIG.S = 9FD743D8A47F6A969F41013036AE3E9E2448D521F38108B215F0A03B6BA188F5BDAF5ED8B7D47ED2E899C938AE712697
2,990,182 UART: Caliptra RT
2,990,528 UART: [state] CFI Enabled
3,098,681 UART: [rt] RT listening for mailbox commands...
3,099,351 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,928 UART: [rt]cmd =0x44504543, len=24
3,162,963 >>> mbox cmd response data (40 bytes)
3,162,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,025 UART: [rt]cmd =0x44504543, len=96
3,241,175 >>> mbox cmd response data (56 bytes)
3,241,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,271,211 UART: [rt]cmd =0x44504543, len=96
3,320,024 >>> mbox cmd response data (56 bytes)
3,320,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,256 UART: [rt]cmd =0x44504543, len=96
3,399,915 >>> mbox cmd response data (56 bytes)
3,399,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,191 UART: [rt]cmd =0x44504543, len=96
3,479,528 >>> mbox cmd response data (56 bytes)
3,479,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,524 UART: [rt]cmd =0x44504543, len=96
3,558,327 >>> mbox cmd response data (56 bytes)
3,558,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,131 UART: [rt]cmd =0x44504543, len=96
3,637,514 >>> mbox cmd response data (56 bytes)
3,637,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,610 UART: [rt]cmd =0x44504543, len=96
3,717,277 >>> mbox cmd response data (56 bytes)
3,717,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,245 UART: [rt]cmd =0x44504543, len=96
3,797,194 >>> mbox cmd response data (56 bytes)
3,797,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,160 UART: [rt]cmd =0x44504543, len=96
3,877,661 >>> mbox cmd response data (56 bytes)
3,877,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,787 UART: [rt]cmd =0x44504543, len=96
3,958,322 >>> mbox cmd response data (56 bytes)
3,958,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,146 UART: [rt]cmd =0x44504543, len=96
4,039,089 >>> mbox cmd response data (56 bytes)
4,039,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,993 UART: [rt]cmd =0x44504543, len=96
4,120,214 >>> mbox cmd response data (56 bytes)
4,120,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,150,106 UART: [rt]cmd =0x44504543, len=96
4,201,327 >>> mbox cmd response data (56 bytes)
4,201,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,231,361 UART: [rt]cmd =0x44504543, len=96
4,283,474 >>> mbox cmd response data (56 bytes)
4,283,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,313,512 UART: [rt]cmd =0x44504543, len=96
4,320,631 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
192,512 UART:
192,889 UART: Running Caliptra ROM ...
194,081 UART:
194,235 UART: [state] CFI Enabled
265,282 UART: [state] LifecycleState = Unprovisioned
267,202 UART: [state] DebugLocked = No
269,800 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,584 UART: [kat] SHA2-256
445,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,730 UART: [kat] ++
456,324 UART: [kat] sha1
467,911 UART: [kat] SHA2-256
470,630 UART: [kat] SHA2-384
475,117 UART: [kat] SHA2-512-ACC
477,477 UART: [kat] ECC-384
2,769,415 UART: [kat] HMAC-384Kdf
2,799,127 UART: [kat] LMS
3,989,479 UART: [kat] --
3,993,422 UART: [cold-reset] ++
3,995,921 UART: [fht] Storing FHT @ 0x50003400
4,007,905 UART: [idev] ++
4,008,506 UART: [idev] CDI.KEYID = 6
4,009,420 UART: [idev] SUBJECT.KEYID = 7
4,010,662 UART: [idev] UDS.KEYID = 0
4,011,717 ready_for_fw is high
4,011,913 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,166 UART: [idev] Erasing UDS.KEYID = 0
7,346,795 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,483 UART: [idev] --
7,374,475 UART: [ldev] ++
7,375,047 UART: [ldev] CDI.KEYID = 6
7,376,010 UART: [ldev] SUBJECT.KEYID = 5
7,377,219 UART: [ldev] AUTHORITY.KEYID = 7
7,378,447 UART: [ldev] FE.KEYID = 1
7,421,009 UART: [ldev] Erasing FE.KEYID = 1
10,756,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,785 UART: [ldev] --
13,139,224 UART: [fwproc] Waiting for Commands...
13,140,989 UART: [fwproc] Received command 0x46574c44
13,143,219 UART: [fwproc] Received Image of size 114036 bytes
17,198,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,695 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,658,822 >>> mbox cmd response: success
17,663,798 UART: [afmc] ++
17,664,401 UART: [afmc] CDI.KEYID = 6
17,665,308 UART: [afmc] SUBJECT.KEYID = 7
17,666,577 UART: [afmc] AUTHORITY.KEYID = 5
21,027,172 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,604 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,000 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,848 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,319 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,017 UART: [afmc] --
23,399,171 UART: [cold-reset] --
23,402,970 UART: [state] Locking Datavault
23,407,563 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,323 UART: [state] Locking ICCM
23,410,495 UART: [exit] Launching FMC @ 0x40000130
23,418,835 UART:
23,419,067 UART: Running Caliptra FMC ...
23,420,165 UART:
23,420,320 UART: [state] CFI Enabled
23,488,578 UART: [fht] FMC Alias Private Key: 7
25,826,369 UART: [art] Extend RT PCRs Done
25,827,581 UART: [art] Lock RT PCRs Done
25,829,228 UART: [art] Populate DV Done
25,834,595 UART: [fht] FMC Alias Private Key: 7
25,836,126 UART: [art] Derive CDI
25,836,851 UART: [art] Store in in slot 0x4
25,897,127 UART: [art] Derive Key Pair
25,898,168 UART: [art] Store priv key in slot 0x5
29,191,110 UART: [art] Derive Key Pair - Done
29,203,997 UART: [art] Signing Cert with AUTHO
29,205,331 UART: RITY.KEYID = 7
31,492,948 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,451 UART: [art] PUB.X = 7FD70A751B4B21B59DA3B0AB21E5B3B08F13A1B2E9E2CBB78B7E84FC729183761ED6C80D417FE04949C4459171F1AFD7
31,501,696 UART: [art] PUB.Y = 22622763D1447AFD01D5F2106D7DCDEC1D15A0D40B729FB852446CBE9D85EDF98897CA869A4A0702BFABD9D239F48B3F
31,508,955 UART: [art] SIG.R = 4C70406E298247260CF8D2101ACBF599230752FF8B8AFCD66849DEAAE1008B1A9064ED2ABEBBEAC2DE70022EE7014CBA
31,516,369 UART: [art] SIG.S = 595B3FF3EDB975BA0C8AB7FCAACEB4057DADEBE48BAB034F83AA57E59B02FF9BC75911C9B90E2A60C1229EA4220DB0B0
32,821,493 UART: Caliptra RT
32,822,202 UART: [state] CFI Enabled
32,982,343 UART: [rt] RT listening for mailbox commands...
32,984,291 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,014,208 UART: [rt]cmd =0x44504543, len=24
33,064,540 >>> mbox cmd response data (40 bytes)
33,065,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,095,271 UART: [rt]cmd =0x44504543, len=24
33,149,549 >>> mbox cmd response data (40 bytes)
33,150,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,179,847 UART: [rt]cmd =0x44504543, len=24
33,213,706 >>> mbox cmd response data (40 bytes)
33,214,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,244,323 UART: [rt]cmd =0x44504543, len=24
33,299,027 >>> mbox cmd response data (40 bytes)
33,299,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,329,370 UART: [rt]cmd =0x44504543, len=24
33,384,564 >>> mbox cmd response data (40 bytes)
33,385,212 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,415,033 UART: [rt]cmd =0x44504543, len=24
33,469,961 >>> mbox cmd response data (40 bytes)
33,470,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,500,464 UART: [rt]cmd =0x44504543, len=24
33,555,387 >>> mbox cmd response data (40 bytes)
33,556,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,585,952 UART: [rt]cmd =0x44504543, len=24
33,640,711 >>> mbox cmd response data (40 bytes)
33,641,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,671,153 UART: [rt]cmd =0x44504543, len=24
33,725,911 >>> mbox cmd response data (40 bytes)
33,726,559 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,756,301 UART: [rt]cmd =0x44504543, len=24
33,811,501 >>> mbox cmd response data (40 bytes)
33,812,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,842,097 UART: [rt]cmd =0x44504543, len=24
33,896,834 >>> mbox cmd response data (40 bytes)
33,897,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,927,381 UART: [rt]cmd =0x44504543, len=24
33,982,216 >>> mbox cmd response data (40 bytes)
33,982,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,013,112 UART: [rt]cmd =0x44504543, len=24
34,067,356 >>> mbox cmd response data (40 bytes)
34,067,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,097,765 UART: [rt]cmd =0x44504543, len=24
34,152,827 >>> mbox cmd response data (40 bytes)
34,153,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,183,249 UART: [rt]cmd =0x44504543, len=24
34,237,934 >>> mbox cmd response data (40 bytes)
34,238,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,268,341 UART: [rt]cmd =0x44504543, len=24
34,274,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
3,804,871 ready_for_fw is high
3,805,258 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,886,726 >>> mbox cmd response: success
23,574,832 UART:
23,575,230 UART: Running Caliptra FMC ...
23,576,417 UART:
23,576,599 UART: [state] CFI Enabled
23,641,140 UART: [fht] FMC Alias Private Key: 7
25,978,642 UART: [art] Extend RT PCRs Done
25,979,873 UART: [art] Lock RT PCRs Done
25,981,723 UART: [art] Populate DV Done
25,987,243 UART: [fht] FMC Alias Private Key: 7
25,988,947 UART: [art] Derive CDI
25,989,758 UART: [art] Store in in slot 0x4
26,048,910 UART: [art] Derive Key Pair
26,049,944 UART: [art] Store priv key in slot 0x5
29,342,855 UART: [art] Derive Key Pair - Done
29,356,067 UART: [art] Signing Cert with AUTHO
29,357,365 UART: RITY.KEYID = 7
31,644,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,717 UART: [art] PUB.X = 42470C4E69D00A2370EB8676D5CAF2DC81339A26460A257244CAAFEF53C7A6C7EDF7FA4B5AB4F02C72FA88FC93E99A21
31,653,027 UART: [art] PUB.Y = 301CEE1F5C67964C581BD6BE240654343D8DCBA3560753564442EF3DEFD5300982DD8EBEAED21D208A25CB57A06FC8D9
31,660,220 UART: [art] SIG.R = 7F15263FBAE3DD0C9660F39C0C8F97355E3F7326B46991D9DF7B7E6CB76515FDE3A0A8BE116F69DDC6F5B0AE42AFDE8F
31,667,633 UART: [art] SIG.S = 0821C40048680FE8EF69A570AB707E8C632A500D85E8F49F398AE18254B8AB04D2C56224A212CB1B49F1DFBBF0A5464F
32,973,055 UART: Caliptra RT
32,973,760 UART: [state] CFI Enabled
33,133,835 UART: [rt] RT listening for mailbox commands...
33,135,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,165,898 UART: [rt]cmd =0x44504543, len=24
33,215,988 >>> mbox cmd response data (40 bytes)
33,216,762 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,246,690 UART: [rt]cmd =0x44504543, len=24
33,301,029 >>> mbox cmd response data (40 bytes)
33,301,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,331,723 UART: [rt]cmd =0x44504543, len=24
33,386,570 >>> mbox cmd response data (40 bytes)
33,387,203 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,417,119 UART: [rt]cmd =0x44504543, len=24
33,471,603 >>> mbox cmd response data (40 bytes)
33,472,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,502,103 UART: [rt]cmd =0x44504543, len=24
33,557,207 >>> mbox cmd response data (40 bytes)
33,557,834 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,587,973 UART: [rt]cmd =0x44504543, len=24
33,642,162 >>> mbox cmd response data (40 bytes)
33,642,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,672,587 UART: [rt]cmd =0x44504543, len=24
33,727,685 >>> mbox cmd response data (40 bytes)
33,728,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,758,260 UART: [rt]cmd =0x44504543, len=24
33,813,155 >>> mbox cmd response data (40 bytes)
33,813,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,843,836 UART: [rt]cmd =0x44504543, len=24
33,898,388 >>> mbox cmd response data (40 bytes)
33,899,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,928,784 UART: [rt]cmd =0x44504543, len=24
33,983,757 >>> mbox cmd response data (40 bytes)
33,984,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,014,250 UART: [rt]cmd =0x44504543, len=24
34,069,392 >>> mbox cmd response data (40 bytes)
34,070,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,099,838 UART: [rt]cmd =0x44504543, len=24
34,154,657 >>> mbox cmd response data (40 bytes)
34,155,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,185,275 UART: [rt]cmd =0x44504543, len=24
34,240,251 >>> mbox cmd response data (40 bytes)
34,240,896 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,270,955 UART: [rt]cmd =0x44504543, len=24
34,325,657 >>> mbox cmd response data (40 bytes)
34,326,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,356,309 UART: [rt]cmd =0x44504543, len=24
34,410,638 >>> mbox cmd response data (40 bytes)
34,411,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,441,392 UART: [rt]cmd =0x44504543, len=24
34,447,745 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,390 UART:
192,762 UART: Running Caliptra ROM ...
193,863 UART:
603,638 UART: [state] CFI Enabled
617,860 UART: [state] LifecycleState = Unprovisioned
619,792 UART: [state] DebugLocked = No
621,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,622 UART: [kat] SHA2-256
795,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,921 UART: [kat] ++
806,363 UART: [kat] sha1
817,039 UART: [kat] SHA2-256
819,738 UART: [kat] SHA2-384
825,896 UART: [kat] SHA2-512-ACC
828,261 UART: [kat] ECC-384
3,113,499 UART: [kat] HMAC-384Kdf
3,125,234 UART: [kat] LMS
4,315,331 UART: [kat] --
4,320,468 UART: [cold-reset] ++
4,322,111 UART: [fht] Storing FHT @ 0x50003400
4,334,011 UART: [idev] ++
4,334,580 UART: [idev] CDI.KEYID = 6
4,335,666 UART: [idev] SUBJECT.KEYID = 7
4,336,786 UART: [idev] UDS.KEYID = 0
4,337,767 ready_for_fw is high
4,337,987 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,119 UART: [idev] Erasing UDS.KEYID = 0
7,619,202 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,788 UART: [idev] --
7,646,362 UART: [ldev] ++
7,646,931 UART: [ldev] CDI.KEYID = 6
7,647,864 UART: [ldev] SUBJECT.KEYID = 5
7,649,126 UART: [ldev] AUTHORITY.KEYID = 7
7,650,352 UART: [ldev] FE.KEYID = 1
7,660,218 UART: [ldev] Erasing FE.KEYID = 1
10,948,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,864 UART: [ldev] --
13,311,138 UART: [fwproc] Waiting for Commands...
13,314,309 UART: [fwproc] Received command 0x46574c44
13,316,482 UART: [fwproc] Received Image of size 114036 bytes
17,379,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,529 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,836,097 >>> mbox cmd response: success
17,839,816 UART: [afmc] ++
17,840,414 UART: [afmc] CDI.KEYID = 6
17,841,297 UART: [afmc] SUBJECT.KEYID = 7
17,842,573 UART: [afmc] AUTHORITY.KEYID = 5
21,155,792 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,377 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,812 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,624 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,056 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,216 UART: [afmc] --
23,520,079 UART: [cold-reset] --
23,525,019 UART: [state] Locking Datavault
23,529,693 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,443 UART: [state] Locking ICCM
23,532,540 UART: [exit] Launching FMC @ 0x40000130
23,540,947 UART:
23,541,224 UART: Running Caliptra FMC ...
23,542,249 UART:
23,542,395 UART: [state] CFI Enabled
23,550,606 UART: [fht] FMC Alias Private Key: 7
25,881,409 UART: [art] Extend RT PCRs Done
25,882,632 UART: [art] Lock RT PCRs Done
25,884,225 UART: [art] Populate DV Done
25,889,742 UART: [fht] FMC Alias Private Key: 7
25,891,386 UART: [art] Derive CDI
25,892,121 UART: [art] Store in in slot 0x4
25,935,630 UART: [art] Derive Key Pair
25,936,689 UART: [art] Store priv key in slot 0x5
29,178,719 UART: [art] Derive Key Pair - Done
29,191,933 UART: [art] Signing Cert with AUTHO
29,193,239 UART: RITY.KEYID = 7
31,473,185 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,688 UART: [art] PUB.X = C4AA1BA0EEAF2B0085B5227D415481C0BABD852CDE6F708564FD106A81C95B69977B0F45541A330D32842FAF678563DA
31,481,945 UART: [art] PUB.Y = 9FA0B3DCC507FA31001B07E6D9CDA352319A918FD140F1C0655DA12A6215B748B70F09005B47E9136F570AD8DFECD726
31,489,133 UART: [art] SIG.R = 853C4B485AB2B730FB2586D5ED8E2AB4F6216B5B1CF325CEBFAB13054E2C5A959075135E4B2D1DC883B376CB5CB1224E
31,496,588 UART: [art] SIG.S = 24BDA076848B99E73ECDD90CC61C5501E25848FF6657FC945A9D2EED417BB1E8904B4A3E1E7EA5CC664A432E6390DF4A
32,801,673 UART: Caliptra RT
32,802,385 UART: [state] CFI Enabled
32,919,465 UART: [rt] RT listening for mailbox commands...
32,921,392 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,951,252 UART: [rt]cmd =0x44504543, len=24
32,985,383 >>> mbox cmd response data (40 bytes)
32,986,216 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,016,180 UART: [rt]cmd =0x44504543, len=24
33,050,547 >>> mbox cmd response data (40 bytes)
33,051,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,081,043 UART: [rt]cmd =0x44504543, len=24
33,115,635 >>> mbox cmd response data (40 bytes)
33,116,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,145,910 UART: [rt]cmd =0x44504543, len=24
33,180,387 >>> mbox cmd response data (40 bytes)
33,181,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,211,071 UART: [rt]cmd =0x44504543, len=24
33,245,260 >>> mbox cmd response data (40 bytes)
33,245,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,275,657 UART: [rt]cmd =0x44504543, len=24
33,310,054 >>> mbox cmd response data (40 bytes)
33,310,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,340,564 UART: [rt]cmd =0x44504543, len=24
33,374,465 >>> mbox cmd response data (40 bytes)
33,375,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,405,096 UART: [rt]cmd =0x44504543, len=24
33,439,061 >>> mbox cmd response data (40 bytes)
33,439,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,469,467 UART: [rt]cmd =0x44504543, len=24
33,503,458 >>> mbox cmd response data (40 bytes)
33,504,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,533,912 UART: [rt]cmd =0x44504543, len=24
33,567,894 >>> mbox cmd response data (40 bytes)
33,568,532 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,598,488 UART: [rt]cmd =0x44504543, len=24
33,632,398 >>> mbox cmd response data (40 bytes)
33,633,041 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,662,778 UART: [rt]cmd =0x44504543, len=24
33,696,362 >>> mbox cmd response data (40 bytes)
33,697,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,726,823 UART: [rt]cmd =0x44504543, len=24
33,760,622 >>> mbox cmd response data (40 bytes)
33,761,232 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,791,353 UART: [rt]cmd =0x44504543, len=24
33,825,884 >>> mbox cmd response data (40 bytes)
33,826,507 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,856,551 UART: [rt]cmd =0x44504543, len=24
33,890,541 >>> mbox cmd response data (40 bytes)
33,891,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,921,041 UART: [rt]cmd =0x44504543, len=24
33,927,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
4,131,061 ready_for_fw is high
4,131,514 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,955 >>> mbox cmd response: success
23,711,160 UART:
23,711,554 UART: Running Caliptra FMC ...
23,712,673 UART:
23,712,829 UART: [state] CFI Enabled
23,720,779 UART: [fht] FMC Alias Private Key: 7
26,051,407 UART: [art] Extend RT PCRs Done
26,052,635 UART: [art] Lock RT PCRs Done
26,054,238 UART: [art] Populate DV Done
26,059,506 UART: [fht] FMC Alias Private Key: 7
26,061,103 UART: [art] Derive CDI
26,061,840 UART: [art] Store in in slot 0x4
26,104,544 UART: [art] Derive Key Pair
26,105,545 UART: [art] Store priv key in slot 0x5
29,347,267 UART: [art] Derive Key Pair - Done
29,360,104 UART: [art] Signing Cert with AUTHO
29,361,405 UART: RITY.KEYID = 7
31,640,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,081 UART: [art] PUB.X = 901F0F2FDA1DE3830CAB3A48F12420BD090A966FCC5FD00DEFCB013891A0A5E41A3541E5135279CA2D2700E8C3D4476D
31,649,332 UART: [art] PUB.Y = A9C4D9FFA22475297D23784662C4A7536E0445EE3039098EE2EB15660D95F2A250CB429BBDAECEF48E2D36477B5BC038
31,656,551 UART: [art] SIG.R = 5A8ADE452FBBC04DB7637312F54EEB3A01C90054DDBD9FE51C938465BDB83586004EE4F5AB85E465C619CEE3E4E21847
31,663,918 UART: [art] SIG.S = E68154F371C178810FEA204DD08FEA8D5B5D7B231D613AF1ECCE556B932A88B7AE9EE2BF173BE707461445D1655D9FCE
32,969,693 UART: Caliptra RT
32,970,408 UART: [state] CFI Enabled
33,088,852 UART: [rt] RT listening for mailbox commands...
33,090,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,120,647 UART: [rt]cmd =0x44504543, len=24
33,154,726 >>> mbox cmd response data (40 bytes)
33,155,479 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,185,238 UART: [rt]cmd =0x44504543, len=24
33,219,480 >>> mbox cmd response data (40 bytes)
33,220,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,250,094 UART: [rt]cmd =0x44504543, len=24
33,284,100 >>> mbox cmd response data (40 bytes)
33,284,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,314,586 UART: [rt]cmd =0x44504543, len=24
33,348,487 >>> mbox cmd response data (40 bytes)
33,349,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,379,292 UART: [rt]cmd =0x44504543, len=24
33,413,218 >>> mbox cmd response data (40 bytes)
33,413,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,443,838 UART: [rt]cmd =0x44504543, len=24
33,477,914 >>> mbox cmd response data (40 bytes)
33,478,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,508,535 UART: [rt]cmd =0x44504543, len=24
33,542,320 >>> mbox cmd response data (40 bytes)
33,542,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,572,658 UART: [rt]cmd =0x44504543, len=24
33,606,659 >>> mbox cmd response data (40 bytes)
33,607,286 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,637,075 UART: [rt]cmd =0x44504543, len=24
33,671,062 >>> mbox cmd response data (40 bytes)
33,671,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,701,734 UART: [rt]cmd =0x44504543, len=24
33,736,091 >>> mbox cmd response data (40 bytes)
33,736,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,766,609 UART: [rt]cmd =0x44504543, len=24
33,800,951 >>> mbox cmd response data (40 bytes)
33,801,559 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,831,364 UART: [rt]cmd =0x44504543, len=24
33,865,421 >>> mbox cmd response data (40 bytes)
33,866,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,895,867 UART: [rt]cmd =0x44504543, len=24
33,930,197 >>> mbox cmd response data (40 bytes)
33,930,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,960,717 UART: [rt]cmd =0x44504543, len=24
33,994,688 >>> mbox cmd response data (40 bytes)
33,995,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,025,404 UART: [rt]cmd =0x44504543, len=24
34,059,764 >>> mbox cmd response data (40 bytes)
34,060,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,090,150 UART: [rt]cmd =0x44504543, len=24
34,096,390 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,462 UART:
192,829 UART: Running Caliptra ROM ...
193,959 UART:
194,110 UART: [state] CFI Enabled
264,427 UART: [state] LifecycleState = Unprovisioned
266,326 UART: [state] DebugLocked = No
268,576 UART: [state] WD Timer not started. Device not locked for debugging
272,472 UART: [kat] SHA2-256
451,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,176 UART: [kat] ++
463,714 UART: [kat] sha1
474,521 UART: [kat] SHA2-256
477,595 UART: [kat] SHA2-384
483,301 UART: [kat] SHA2-512-ACC
486,314 UART: [kat] ECC-384
2,951,423 UART: [kat] HMAC-384Kdf
2,972,008 UART: [kat] LMS
3,501,416 UART: [kat] --
3,504,706 UART: [cold-reset] ++
3,507,208 UART: [fht] FHT @ 0x50003400
3,517,404 UART: [idev] ++
3,517,970 UART: [idev] CDI.KEYID = 6
3,518,904 UART: [idev] SUBJECT.KEYID = 7
3,520,078 UART: [idev] UDS.KEYID = 0
3,521,008 ready_for_fw is high
3,521,216 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,043 UART: [idev] Erasing UDS.KEYID = 0
6,027,108 UART: [idev] Sha1 KeyId Algorithm
6,050,713 UART: [idev] --
6,053,839 UART: [ldev] ++
6,054,409 UART: [ldev] CDI.KEYID = 6
6,055,294 UART: [ldev] SUBJECT.KEYID = 5
6,056,505 UART: [ldev] AUTHORITY.KEYID = 7
6,057,686 UART: [ldev] FE.KEYID = 1
6,100,680 UART: [ldev] Erasing FE.KEYID = 1
8,603,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,352 UART: [ldev] --
10,414,868 UART: [fwproc] Wait for Commands...
10,417,239 UART: [fwproc] Recv command 0x46574c44
10,419,328 UART: [fwproc] Recv'd Img size: 114360 bytes
13,821,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,284,570 >>> mbox cmd response: success
14,288,272 UART: [afmc] ++
14,288,874 UART: [afmc] CDI.KEYID = 6
14,289,762 UART: [afmc] SUBJECT.KEYID = 7
14,290,980 UART: [afmc] AUTHORITY.KEYID = 5
16,833,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,568,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,570,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,585,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,601,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,617,810 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,640,870 UART: [afmc] --
18,644,845 UART: [cold-reset] --
18,648,821 UART: [state] Locking Datavault
18,653,853 UART: [state] Locking PCR0, PCR1 and PCR31
18,655,515 UART: [state] Locking ICCM
18,657,048 UART: [exit] Launching FMC @ 0x40000130
18,665,450 UART:
18,665,700 UART: Running Caliptra FMC ...
18,666,805 UART:
18,666,966 UART: [state] CFI Enabled
18,727,499 UART: [fht] FMC Alias Private Key: 7
20,491,680 UART: [art] Extend RT PCRs Done
20,492,898 UART: [art] Lock RT PCRs Done
20,494,521 UART: [art] Populate DV Done
20,499,930 UART: [fht] FMC Alias Private Key: 7
20,501,517 UART: [art] Derive CDI
20,502,327 UART: [art] Store in in slot 0x4
20,560,289 UART: [art] Derive Key Pair
20,561,286 UART: [art] Store priv key in slot 0x5
23,024,228 UART: [art] Derive Key Pair - Done
23,037,227 UART: [art] Signing Cert with AUTHO
23,038,532 UART: RITY.KEYID = 7
24,749,316 UART: [art] Erasing AUTHORITY.KEYID = 7
24,750,798 UART: [art] PUB.X = 8BEA8BE112468CF930BC656F361586C3A0F702750604090F78FECF7BA96676E8DDA0524B80EA68A5CA547822473A39E1
24,758,121 UART: [art] PUB.Y = B72DE916EB9585E108FD8D0D9C704C3CB378618F80F02A76F73318DCF67A9C80D7E19E25ADA14DADEF6230D9F1A9CB46
24,765,378 UART: [art] SIG.R = 319DB1FF71E8FB0AB97652724CA2EA3B2351A312B0BB470C2692F3015B3F601FA81AD8A1AC384547C5643BCA3C83A3FA
24,772,798 UART: [art] SIG.S = 27FA11D8D9EDF1B1F10DA720B973BC654527C51C526E1CA6A5E7922D6F5F28FD7335F69FBA5F63C661F2385280D8995E
25,752,398 UART: Caliptra RT
25,753,128 UART: [state] CFI Enabled
25,916,960 UART: [rt] RT listening for mailbox commands...
25,918,892 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,949,016 UART: [rt]cmd =0x44504543, len=24
25,998,620 >>> mbox cmd response data (40 bytes)
25,999,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,029,254 UART: [rt]cmd =0x44504543, len=24
26,062,768 >>> mbox cmd response data (40 bytes)
26,063,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,093,202 UART: [rt]cmd =0x44504543, len=24
26,148,313 >>> mbox cmd response data (40 bytes)
26,148,936 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,178,789 UART: [rt]cmd =0x44504543, len=24
26,234,279 >>> mbox cmd response data (40 bytes)
26,234,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,264,792 UART: [rt]cmd =0x44504543, len=24
26,319,329 >>> mbox cmd response data (40 bytes)
26,319,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,350,018 UART: [rt]cmd =0x44504543, len=24
26,404,759 >>> mbox cmd response data (40 bytes)
26,405,373 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,435,282 UART: [rt]cmd =0x44504543, len=24
26,490,286 >>> mbox cmd response data (40 bytes)
26,490,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,520,984 UART: [rt]cmd =0x44504543, len=24
26,575,747 >>> mbox cmd response data (40 bytes)
26,576,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,606,392 UART: [rt]cmd =0x44504543, len=24
26,660,997 >>> mbox cmd response data (40 bytes)
26,661,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,691,541 UART: [rt]cmd =0x44504543, len=24
26,746,626 >>> mbox cmd response data (40 bytes)
26,747,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,777,188 UART: [rt]cmd =0x44504543, len=24
26,832,219 >>> mbox cmd response data (40 bytes)
26,832,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,862,922 UART: [rt]cmd =0x44504543, len=24
26,917,573 >>> mbox cmd response data (40 bytes)
26,918,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,947,954 UART: [rt]cmd =0x44504543, len=24
27,002,899 >>> mbox cmd response data (40 bytes)
27,003,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,033,537 UART: [rt]cmd =0x44504543, len=24
27,088,537 >>> mbox cmd response data (40 bytes)
27,089,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,119,418 UART: [rt]cmd =0x44504543, len=24
27,173,913 >>> mbox cmd response data (40 bytes)
27,174,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,204,582 UART: [rt]cmd =0x44504543, len=24
27,210,946 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
192,663 UART:
193,045 UART: Running Caliptra ROM ...
194,233 UART:
194,388 UART: [state] CFI Enabled
261,627 UART: [state] LifecycleState = Unprovisioned
264,063 UART: [state] DebugLocked = No
266,603 UART: [state] WD Timer not started. Device not locked for debugging
270,924 UART: [kat] SHA2-256
460,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,560 UART: [kat] ++
472,051 UART: [kat] sha1
483,525 UART: [kat] SHA2-256
486,575 UART: [kat] SHA2-384
492,851 UART: [kat] SHA2-512-ACC
495,445 UART: [kat] ECC-384
2,947,995 UART: [kat] HMAC-384Kdf
2,971,190 UART: [kat] LMS
3,503,002 UART: [kat] --
3,508,423 UART: [cold-reset] ++
3,510,923 UART: [fht] FHT @ 0x50003400
3,523,198 UART: [idev] ++
3,523,943 UART: [idev] CDI.KEYID = 6
3,524,828 UART: [idev] SUBJECT.KEYID = 7
3,526,072 UART: [idev] UDS.KEYID = 0
3,526,974 ready_for_fw is high
3,527,162 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,847 UART: [idev] Erasing UDS.KEYID = 0
6,052,205 UART: [idev] Sha1 KeyId Algorithm
6,074,950 UART: [idev] --
6,079,564 UART: [ldev] ++
6,080,259 UART: [ldev] CDI.KEYID = 6
6,081,146 UART: [ldev] SUBJECT.KEYID = 5
6,082,252 UART: [ldev] AUTHORITY.KEYID = 7
6,083,561 UART: [ldev] FE.KEYID = 1
6,123,189 UART: [ldev] Erasing FE.KEYID = 1
8,629,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,494 UART: [ldev] --
10,436,354 UART: [fwproc] Wait for Commands...
10,438,660 UART: [fwproc] Recv command 0x46574c44
10,440,966 UART: [fwproc] Recv'd Img size: 114360 bytes
13,886,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,623,019 >>> mbox cmd response: success
14,627,108 UART: [afmc] ++
14,627,843 UART: [afmc] CDI.KEYID = 6
14,628,956 UART: [afmc] SUBJECT.KEYID = 7
14,630,510 UART: [afmc] AUTHORITY.KEYID = 5
17,176,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,918,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,920,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,935,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,950,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,965,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,988,329 UART: [afmc] --
18,991,881 UART: [cold-reset] --
18,994,185 UART: [state] Locking Datavault
19,001,060 UART: [state] Locking PCR0, PCR1 and PCR31
19,003,261 UART: [state] Locking ICCM
19,005,081 UART: [exit] Launching FMC @ 0x40000130
19,013,781 UART:
19,014,052 UART: Running Caliptra FMC ...
19,015,166 UART:
19,015,330 UART: [state] CFI Enabled
19,075,488 UART: [fht] FMC Alias Private Key: 7
20,839,146 UART: [art] Extend RT PCRs Done
20,840,363 UART: [art] Lock RT PCRs Done
20,841,830 UART: [art] Populate DV Done
20,847,248 UART: [fht] FMC Alias Private Key: 7
20,848,946 UART: [art] Derive CDI
20,849,762 UART: [art] Store in in slot 0x4
20,908,049 UART: [art] Derive Key Pair
20,909,082 UART: [art] Store priv key in slot 0x5
23,371,547 UART: [art] Derive Key Pair - Done
23,384,330 UART: [art] Signing Cert with AUTHO
23,385,637 UART: RITY.KEYID = 7
25,097,781 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,294 UART: [art] PUB.X = A34A821AD20F7F88C93F23843D1B8E0122A3D30FB3001497C27BBB6B5C559CC57A113396D08FE5658DF852610550C892
25,106,530 UART: [art] PUB.Y = A913CE55632233795B43493D79049FBAF4C5F4925D210A53E706B9DB83083EDFED85CC53DB9C48A9479690EAF7B0580C
25,113,746 UART: [art] SIG.R = 069F74E7BC61440976127AE4378391C9F746CAA13C444B6A9C9E5D071716E16FC70010DF6572B9BBBC4D70203B787883
25,121,146 UART: [art] SIG.S = 1FC33334773F9BDD7C7C48B5B10D18F24B0947E59E23419F0CA5E1A56E4C497D83872AC711EE7CB596FEA6CC39B474A9
26,100,038 UART: Caliptra RT
26,100,751 UART: [state] CFI Enabled
26,264,681 UART: [rt] RT listening for mailbox commands...
26,266,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,296,678 UART: [rt]cmd =0x44504543, len=24
26,347,223 >>> mbox cmd response data (40 bytes)
26,348,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,378,152 UART: [rt]cmd =0x44504543, len=24
26,432,542 >>> mbox cmd response data (40 bytes)
26,433,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,462,937 UART: [rt]cmd =0x44504543, len=24
26,518,077 >>> mbox cmd response data (40 bytes)
26,518,751 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,548,648 UART: [rt]cmd =0x44504543, len=24
26,603,349 >>> mbox cmd response data (40 bytes)
26,603,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,633,948 UART: [rt]cmd =0x44504543, len=24
26,688,656 >>> mbox cmd response data (40 bytes)
26,689,302 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,719,166 UART: [rt]cmd =0x44504543, len=24
26,774,284 >>> mbox cmd response data (40 bytes)
26,774,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,804,759 UART: [rt]cmd =0x44504543, len=24
26,859,438 >>> mbox cmd response data (40 bytes)
26,860,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,889,959 UART: [rt]cmd =0x44504543, len=24
26,945,123 >>> mbox cmd response data (40 bytes)
26,945,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,975,553 UART: [rt]cmd =0x44504543, len=24
27,030,066 >>> mbox cmd response data (40 bytes)
27,030,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,060,543 UART: [rt]cmd =0x44504543, len=24
27,115,706 >>> mbox cmd response data (40 bytes)
27,116,358 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,146,308 UART: [rt]cmd =0x44504543, len=24
27,200,845 >>> mbox cmd response data (40 bytes)
27,201,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,231,541 UART: [rt]cmd =0x44504543, len=24
27,286,245 >>> mbox cmd response data (40 bytes)
27,286,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,316,921 UART: [rt]cmd =0x44504543, len=24
27,371,487 >>> mbox cmd response data (40 bytes)
27,372,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,402,145 UART: [rt]cmd =0x44504543, len=24
27,457,138 >>> mbox cmd response data (40 bytes)
27,457,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,487,969 UART: [rt]cmd =0x44504543, len=24
27,542,521 >>> mbox cmd response data (40 bytes)
27,543,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,573,233 UART: [rt]cmd =0x44504543, len=24
27,579,853 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
3,438,783 ready_for_fw is high
3,439,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,758,353 >>> mbox cmd response: success
19,062,153 UART:
19,062,541 UART: Running Caliptra FMC ...
19,063,683 UART:
19,063,848 UART: [state] CFI Enabled
19,113,776 UART: [fht] FMC Alias Private Key: 7
20,877,200 UART: [art] Extend RT PCRs Done
20,878,425 UART: [art] Lock RT PCRs Done
20,879,808 UART: [art] Populate DV Done
20,885,419 UART: [fht] FMC Alias Private Key: 7
20,887,125 UART: [art] Derive CDI
20,887,958 UART: [art] Store in in slot 0x4
20,946,360 UART: [art] Derive Key Pair
20,947,365 UART: [art] Store priv key in slot 0x5
23,410,216 UART: [art] Derive Key Pair - Done
23,423,432 UART: [art] Signing Cert with AUTHO
23,424,749 UART: RITY.KEYID = 7
25,136,329 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,837 UART: [art] PUB.X = F4E8CAA0315A58762D5C6433278641AA13CF2D7CC00557A678601484B93B86725AA807D2D00B12377868EF2A0D1C1A87
25,145,063 UART: [art] PUB.Y = 0ACD548B5FBC2B3E66F9BA380A71001EBDC9CE2845EA8329766FD57EDE65A942E6A10F524BC7B9688CC20883FBC6FC8B
25,152,350 UART: [art] SIG.R = EBF4D9CC15719AA4AD688FB3CB66FFC5C3E1C1AC64989CFD245AC48DC418FDE1A065A947788289138E2BF43730EFF619
25,159,720 UART: [art] SIG.S = 8C8D0F99B76AC51056882D19F2B3CA356A2899613ACB73437A6A7CD7204FFA3A038394AA382BE6C0C4BC2E273D0A73B5
26,139,045 UART: Caliptra RT
26,139,759 UART: [state] CFI Enabled
26,303,829 UART: [rt] RT listening for mailbox commands...
26,305,769 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,335,783 UART: [rt]cmd =0x44504543, len=24
26,385,611 >>> mbox cmd response data (40 bytes)
26,386,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,416,227 UART: [rt]cmd =0x44504543, len=24
26,470,810 >>> mbox cmd response data (40 bytes)
26,471,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,501,291 UART: [rt]cmd =0x44504543, len=24
26,555,918 >>> mbox cmd response data (40 bytes)
26,556,566 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,586,518 UART: [rt]cmd =0x44504543, len=24
26,641,523 >>> mbox cmd response data (40 bytes)
26,642,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,672,229 UART: [rt]cmd =0x44504543, len=24
26,726,997 >>> mbox cmd response data (40 bytes)
26,727,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,757,613 UART: [rt]cmd =0x44504543, len=24
26,812,282 >>> mbox cmd response data (40 bytes)
26,812,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,843,097 UART: [rt]cmd =0x44504543, len=24
26,897,600 >>> mbox cmd response data (40 bytes)
26,898,247 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,928,321 UART: [rt]cmd =0x44504543, len=24
26,983,087 >>> mbox cmd response data (40 bytes)
26,983,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,013,595 UART: [rt]cmd =0x44504543, len=24
27,068,256 >>> mbox cmd response data (40 bytes)
27,068,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,098,971 UART: [rt]cmd =0x44504543, len=24
27,153,580 >>> mbox cmd response data (40 bytes)
27,154,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,184,228 UART: [rt]cmd =0x44504543, len=24
27,239,115 >>> mbox cmd response data (40 bytes)
27,239,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,269,663 UART: [rt]cmd =0x44504543, len=24
27,324,643 >>> mbox cmd response data (40 bytes)
27,325,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,355,351 UART: [rt]cmd =0x44504543, len=24
27,409,873 >>> mbox cmd response data (40 bytes)
27,410,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,440,480 UART: [rt]cmd =0x44504543, len=24
27,495,065 >>> mbox cmd response data (40 bytes)
27,495,682 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,525,547 UART: [rt]cmd =0x44504543, len=24
27,580,666 >>> mbox cmd response data (40 bytes)
27,581,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,611,137 UART: [rt]cmd =0x44504543, len=24
27,617,678 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,437 UART:
192,791 UART: Running Caliptra ROM ...
193,919 UART:
603,686 UART: [state] CFI Enabled
616,424 UART: [state] LifecycleState = Unprovisioned
618,794 UART: [state] DebugLocked = No
620,382 UART: [state] WD Timer not started. Device not locked for debugging
625,481 UART: [kat] SHA2-256
815,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,105 UART: [kat] ++
826,637 UART: [kat] sha1
837,619 UART: [kat] SHA2-256
840,598 UART: [kat] SHA2-384
846,953 UART: [kat] SHA2-512-ACC
849,603 UART: [kat] ECC-384
3,290,209 UART: [kat] HMAC-384Kdf
3,302,479 UART: [kat] LMS
3,834,277 UART: [kat] --
3,836,771 UART: [cold-reset] ++
3,838,689 UART: [fht] FHT @ 0x50003400
3,849,801 UART: [idev] ++
3,850,497 UART: [idev] CDI.KEYID = 6
3,851,450 UART: [idev] SUBJECT.KEYID = 7
3,852,620 UART: [idev] UDS.KEYID = 0
3,853,523 ready_for_fw is high
3,853,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,997,546 UART: [idev] Erasing UDS.KEYID = 0
6,331,608 UART: [idev] Sha1 KeyId Algorithm
6,353,331 UART: [idev] --
6,357,646 UART: [ldev] ++
6,358,364 UART: [ldev] CDI.KEYID = 6
6,359,288 UART: [ldev] SUBJECT.KEYID = 5
6,360,442 UART: [ldev] AUTHORITY.KEYID = 7
6,361,666 UART: [ldev] FE.KEYID = 1
6,371,823 UART: [ldev] Erasing FE.KEYID = 1
8,850,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,276 UART: [ldev] --
10,640,379 UART: [fwproc] Wait for Commands...
10,643,406 UART: [fwproc] Recv command 0x46574c44
10,645,657 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,802 >>> mbox cmd response: success
14,839,966 UART: [afmc] ++
14,840,695 UART: [afmc] CDI.KEYID = 6
14,841,875 UART: [afmc] SUBJECT.KEYID = 7
14,843,353 UART: [afmc] AUTHORITY.KEYID = 5
17,347,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,753 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,011 UART: [afmc] --
19,143,069 UART: [cold-reset] --
19,147,148 UART: [state] Locking Datavault
19,152,619 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,750 UART: [state] Locking ICCM
19,157,060 UART: [exit] Launching FMC @ 0x40000130
19,165,717 UART:
19,165,967 UART: Running Caliptra FMC ...
19,167,071 UART:
19,167,232 UART: [state] CFI Enabled
19,175,720 UART: [fht] FMC Alias Private Key: 7
20,933,106 UART: [art] Extend RT PCRs Done
20,934,321 UART: [art] Lock RT PCRs Done
20,936,159 UART: [art] Populate DV Done
20,941,615 UART: [fht] FMC Alias Private Key: 7
20,943,255 UART: [art] Derive CDI
20,944,006 UART: [art] Store in in slot 0x4
20,986,658 UART: [art] Derive Key Pair
20,987,652 UART: [art] Store priv key in slot 0x5
23,414,747 UART: [art] Derive Key Pair - Done
23,427,955 UART: [art] Signing Cert with AUTHO
23,429,259 UART: RITY.KEYID = 7
25,134,879 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,382 UART: [art] PUB.X = D91A271AA9020F0B3D0E5C3254C02FC21BD1A848B406DBD82312644A01F5391756F844109E8CD2237A6CAE7BA41D904F
25,143,627 UART: [art] PUB.Y = 71BA782052DA5090F09839496FAF00DB14517AD55C4E339694BFE93A65DA7E54D682BFED8E9866B76204DCB7D1EF2DE3
25,150,863 UART: [art] SIG.R = 445C8DAB9BF6822009D6B15A8CA5AE243D492A23BA0E816856F9DC396AF1FEB1B71788C65E0FAA7195F4DD4E3341B332
25,158,338 UART: [art] SIG.S = 4B89B5FFB64ED2BF2602262586D891233E7B376F5C3047DE372B1631990CD94F4BE4909ED356754B2B4C8179AE4938D4
26,137,439 UART: Caliptra RT
26,138,152 UART: [state] CFI Enabled
26,255,408 UART: [rt] RT listening for mailbox commands...
26,257,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,286,911 UART: [rt]cmd =0x44504543, len=24
26,321,142 >>> mbox cmd response data (40 bytes)
26,321,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,351,936 UART: [rt]cmd =0x44504543, len=24
26,385,796 >>> mbox cmd response data (40 bytes)
26,386,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,416,317 UART: [rt]cmd =0x44504543, len=24
26,450,347 >>> mbox cmd response data (40 bytes)
26,450,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,481,001 UART: [rt]cmd =0x44504543, len=24
26,515,717 >>> mbox cmd response data (40 bytes)
26,516,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,546,196 UART: [rt]cmd =0x44504543, len=24
26,580,730 >>> mbox cmd response data (40 bytes)
26,581,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,611,202 UART: [rt]cmd =0x44504543, len=24
26,645,611 >>> mbox cmd response data (40 bytes)
26,646,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,676,145 UART: [rt]cmd =0x44504543, len=24
26,710,448 >>> mbox cmd response data (40 bytes)
26,711,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,741,110 UART: [rt]cmd =0x44504543, len=24
26,775,508 >>> mbox cmd response data (40 bytes)
26,776,147 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,806,157 UART: [rt]cmd =0x44504543, len=24
26,839,913 >>> mbox cmd response data (40 bytes)
26,840,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,870,467 UART: [rt]cmd =0x44504543, len=24
26,904,848 >>> mbox cmd response data (40 bytes)
26,905,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,935,456 UART: [rt]cmd =0x44504543, len=24
26,969,276 >>> mbox cmd response data (40 bytes)
26,969,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,999,761 UART: [rt]cmd =0x44504543, len=24
27,034,019 >>> mbox cmd response data (40 bytes)
27,034,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,064,598 UART: [rt]cmd =0x44504543, len=24
27,098,628 >>> mbox cmd response data (40 bytes)
27,099,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,129,284 UART: [rt]cmd =0x44504543, len=24
27,163,682 >>> mbox cmd response data (40 bytes)
27,164,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,194,340 UART: [rt]cmd =0x44504543, len=24
27,228,893 >>> mbox cmd response data (40 bytes)
27,229,490 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,259,242 UART: [rt]cmd =0x44504543, len=24
27,265,566 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,757,572 ready_for_fw is high
3,757,981 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,963,160 >>> mbox cmd response: success
19,208,191 UART:
19,208,588 UART: Running Caliptra FMC ...
19,209,727 UART:
19,209,890 UART: [state] CFI Enabled
19,217,742 UART: [fht] FMC Alias Private Key: 7
20,974,062 UART: [art] Extend RT PCRs Done
20,975,318 UART: [art] Lock RT PCRs Done
20,977,300 UART: [art] Populate DV Done
20,982,770 UART: [fht] FMC Alias Private Key: 7
20,984,252 UART: [art] Derive CDI
20,984,985 UART: [art] Store in in slot 0x4
21,027,585 UART: [art] Derive Key Pair
21,028,628 UART: [art] Store priv key in slot 0x5
23,456,044 UART: [art] Derive Key Pair - Done
23,468,721 UART: [art] Signing Cert with AUTHO
23,470,035 UART: RITY.KEYID = 7
25,175,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,123 UART: [art] PUB.X = 631FFE496F2CDDA53CFF7EF439DF733A43BB8EBE358CF0F554545ECB1A568F88573DD95CA26540847558D3D0CF32CA09
25,184,384 UART: [art] PUB.Y = 6E0E90A656764E8852A96B99F122AA0532BC51C51491122C0FDB77E148B45E4D7547E812310E3EF73C51B0BF08CC5F16
25,191,679 UART: [art] SIG.R = 80CE0234CF73A99E6E6B9286502567AFFF880534635188AD605F55487AD45B10306B1470F31AE02B9ABA10D3E7ED8DB6
25,199,033 UART: [art] SIG.S = 3F2286E08C2E022C90683A4C7A7E50592805596592E80EBF0E297D4BF727D1DAB77A9E28AC086AB3339756DFD1A666D0
26,178,196 UART: Caliptra RT
26,178,902 UART: [state] CFI Enabled
26,295,106 UART: [rt] RT listening for mailbox commands...
26,297,050 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,327,304 UART: [rt]cmd =0x44504543, len=24
26,361,360 >>> mbox cmd response data (40 bytes)
26,362,106 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,918 UART: [rt]cmd =0x44504543, len=24
26,425,812 >>> mbox cmd response data (40 bytes)
26,426,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,456,285 UART: [rt]cmd =0x44504543, len=24
26,490,794 >>> mbox cmd response data (40 bytes)
26,491,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,521,071 UART: [rt]cmd =0x44504543, len=24
26,555,231 >>> mbox cmd response data (40 bytes)
26,555,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,585,628 UART: [rt]cmd =0x44504543, len=24
26,619,827 >>> mbox cmd response data (40 bytes)
26,620,435 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,650,481 UART: [rt]cmd =0x44504543, len=24
26,684,812 >>> mbox cmd response data (40 bytes)
26,685,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,715,173 UART: [rt]cmd =0x44504543, len=24
26,749,167 >>> mbox cmd response data (40 bytes)
26,749,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,779,580 UART: [rt]cmd =0x44504543, len=24
26,814,298 >>> mbox cmd response data (40 bytes)
26,814,941 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,844,786 UART: [rt]cmd =0x44504543, len=24
26,879,076 >>> mbox cmd response data (40 bytes)
26,879,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,909,678 UART: [rt]cmd =0x44504543, len=24
26,944,343 >>> mbox cmd response data (40 bytes)
26,944,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,974,760 UART: [rt]cmd =0x44504543, len=24
27,009,409 >>> mbox cmd response data (40 bytes)
27,010,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,039,843 UART: [rt]cmd =0x44504543, len=24
27,074,382 >>> mbox cmd response data (40 bytes)
27,075,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,104,963 UART: [rt]cmd =0x44504543, len=24
27,139,203 >>> mbox cmd response data (40 bytes)
27,139,849 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,169,804 UART: [rt]cmd =0x44504543, len=24
27,204,207 >>> mbox cmd response data (40 bytes)
27,204,849 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,234,582 UART: [rt]cmd =0x44504543, len=24
27,269,036 >>> mbox cmd response data (40 bytes)
27,269,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,299,647 UART: [rt]cmd =0x44504543, len=24
27,306,641 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,328 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,183 UART: [cold-reset] ++
1,476,723 UART: [fht] Storing FHT @ 0x50003400
1,479,642 UART: [idev] ++
1,479,810 UART: [idev] CDI.KEYID = 6
1,480,170 UART: [idev] SUBJECT.KEYID = 7
1,480,594 UART: [idev] UDS.KEYID = 0
1,480,939 ready_for_fw is high
1,480,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,344 UART: [idev] Erasing UDS.KEYID = 0
1,504,590 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,124 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,521,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,274 UART: [ldev] --
1,585,749 UART: [fwproc] Waiting for Commands...
1,586,418 UART: [fwproc] Received command 0x46574c44
1,587,209 UART: [fwproc] Received Image of size 114360 bytes
2,883,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,401 >>> mbox cmd response: success
3,077,443 UART: [afmc] ++
3,077,611 UART: [afmc] CDI.KEYID = 6
3,077,973 UART: [afmc] SUBJECT.KEYID = 7
3,078,398 UART: [afmc] AUTHORITY.KEYID = 5
3,113,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,667 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,060 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,750 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,575 UART: [afmc] --
3,156,679 UART: [cold-reset] --
3,157,535 UART: [state] Locking Datavault
3,158,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,024 UART: [state] Locking ICCM
3,159,548 UART: [exit] Launching FMC @ 0x40000130
3,164,877 UART:
3,164,893 UART: Running Caliptra FMC ...
3,165,301 UART:
3,165,355 UART: [state] CFI Enabled
3,175,666 UART: [fht] FMC Alias Private Key: 7
3,284,031 UART: [art] Extend RT PCRs Done
3,284,459 UART: [art] Lock RT PCRs Done
3,286,087 UART: [art] Populate DV Done
3,294,380 UART: [fht] FMC Alias Private Key: 7
3,295,372 UART: [art] Derive CDI
3,295,652 UART: [art] Store in in slot 0x4
3,381,141 UART: [art] Derive Key Pair
3,381,501 UART: [art] Store priv key in slot 0x5
3,394,461 UART: [art] Derive Key Pair - Done
3,409,241 UART: [art] Signing Cert with AUTHO
3,409,721 UART: RITY.KEYID = 7
3,425,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,894 UART: [art] PUB.X = 13FFA227E1ED0CEE3D65AD755920DF46605F7BBBF23A945577E3D21248BE82CD7310174CCD3F5989348F5CEAB0CB2409
3,432,670 UART: [art] PUB.Y = 4044A5FBAC482C8A6425DABE3EAE6265EA12A5E4BA7AD3BB4373BED0E3F1E07389EE0B09DCD7C7FC6A1126770B761FD1
3,439,635 UART: [art] SIG.R = F2CBACB6CFB24C81AF9AD15830D17684E33287E186655BBF3F5AB60A3E422A15CB0406703BEFE064FB0310F24B1A58C6
3,446,407 UART: [art] SIG.S = 4352C4C912445495F1AA7EA797E31DCE7F0A3232BF74FE1473ADB3294143DA3444B9AD11F494A44B17B72609801FBF26
3,469,898 UART: Caliptra RT
3,470,152 UART: [state] CFI Enabled
3,578,726 UART: [rt] RT listening for mailbox commands...
3,579,396 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,149 UART: [rt]cmd =0x44504543, len=24
3,643,600 >>> mbox cmd response data (40 bytes)
3,643,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,022 UART: [rt]cmd =0x44504543, len=24
3,706,813 >>> mbox cmd response data (40 bytes)
3,706,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,297 UART: [rt]cmd =0x44504543, len=24
3,770,224 >>> mbox cmd response data (40 bytes)
3,770,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,799,876 UART: [rt]cmd =0x44504543, len=24
3,833,939 >>> mbox cmd response data (40 bytes)
3,833,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,485 UART: [rt]cmd =0x44504543, len=24
3,897,636 >>> mbox cmd response data (40 bytes)
3,897,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,032 UART: [rt]cmd =0x44504543, len=24
3,960,923 >>> mbox cmd response data (40 bytes)
3,960,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,473 UART: [rt]cmd =0x44504543, len=24
4,025,044 >>> mbox cmd response data (40 bytes)
4,025,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,054,456 UART: [rt]cmd =0x44504543, len=24
4,088,417 >>> mbox cmd response data (40 bytes)
4,088,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,127 UART: [rt]cmd =0x44504543, len=24
4,152,490 >>> mbox cmd response data (40 bytes)
4,152,491 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,182,120 UART: [rt]cmd =0x44504543, len=24
4,216,487 >>> mbox cmd response data (40 bytes)
4,216,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,245,945 UART: [rt]cmd =0x44504543, len=24
4,280,266 >>> mbox cmd response data (40 bytes)
4,280,267 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,884 UART: [rt]cmd =0x44504543, len=24
4,344,395 >>> mbox cmd response data (40 bytes)
4,344,396 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,127 UART: [rt]cmd =0x44504543, len=24
4,408,478 >>> mbox cmd response data (40 bytes)
4,408,479 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,437,958 UART: [rt]cmd =0x44504543, len=24
4,471,689 >>> mbox cmd response data (40 bytes)
4,471,690 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,285 UART: [rt]cmd =0x44504543, len=24
4,535,044 >>> mbox cmd response data (40 bytes)
4,535,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,564,534 UART: [rt]cmd =0x44504543, len=24
4,571,644 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,979 ready_for_fw is high
1,361,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,247 >>> mbox cmd response: success
2,989,631 UART:
2,989,647 UART: Running Caliptra FMC ...
2,990,055 UART:
2,990,109 UART: [state] CFI Enabled
3,000,470 UART: [fht] FMC Alias Private Key: 7
3,108,529 UART: [art] Extend RT PCRs Done
3,108,957 UART: [art] Lock RT PCRs Done
3,110,459 UART: [art] Populate DV Done
3,118,836 UART: [fht] FMC Alias Private Key: 7
3,120,000 UART: [art] Derive CDI
3,120,280 UART: [art] Store in in slot 0x4
3,206,029 UART: [art] Derive Key Pair
3,206,389 UART: [art] Store priv key in slot 0x5
3,219,057 UART: [art] Derive Key Pair - Done
3,233,955 UART: [art] Signing Cert with AUTHO
3,234,435 UART: RITY.KEYID = 7
3,249,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,856 UART: [art] PUB.X = 9DE8426C5CC26C2D53BB9E4B29C586F9E60572737E74D56B06B770B5CEDD6CB56F834E119A56E66D21ACBA0F90D22282
3,256,627 UART: [art] PUB.Y = BD7A3FAFE72EF7347702D20A2CCF284F1EC9CA0BFB10AB1D87900132B35ED09611686AFC3E79D43E54463BCC55ED1EE3
3,263,585 UART: [art] SIG.R = 99C4F97D379E646169C73304E93C17B2C400F7D552591B31F75CEADC1FCA0EACCE6F6F29C89C94290BF5505CF8C89844
3,270,332 UART: [art] SIG.S = BED2E9DF19B98E9D2734B66A0FEE6EA1658C7AB03920B36FE964ACAAFF643D2BD3194249B6A177EBC6F4948E47EF55CF
3,293,888 UART: Caliptra RT
3,294,142 UART: [state] CFI Enabled
3,402,377 UART: [rt] RT listening for mailbox commands...
3,403,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,816 UART: [rt]cmd =0x44504543, len=24
3,466,667 >>> mbox cmd response data (40 bytes)
3,466,668 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,427 UART: [rt]cmd =0x44504543, len=24
3,530,354 >>> mbox cmd response data (40 bytes)
3,530,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,954 UART: [rt]cmd =0x44504543, len=24
3,594,015 >>> mbox cmd response data (40 bytes)
3,594,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,407 UART: [rt]cmd =0x44504543, len=24
3,657,264 >>> mbox cmd response data (40 bytes)
3,657,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,590 UART: [rt]cmd =0x44504543, len=24
3,721,113 >>> mbox cmd response data (40 bytes)
3,721,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,657 UART: [rt]cmd =0x44504543, len=24
3,784,516 >>> mbox cmd response data (40 bytes)
3,784,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,224 UART: [rt]cmd =0x44504543, len=24
3,847,783 >>> mbox cmd response data (40 bytes)
3,847,784 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,263 UART: [rt]cmd =0x44504543, len=24
3,911,182 >>> mbox cmd response data (40 bytes)
3,911,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,674 UART: [rt]cmd =0x44504543, len=24
3,974,481 >>> mbox cmd response data (40 bytes)
3,974,482 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,021 UART: [rt]cmd =0x44504543, len=24
4,038,324 >>> mbox cmd response data (40 bytes)
4,038,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,818 UART: [rt]cmd =0x44504543, len=24
4,101,915 >>> mbox cmd response data (40 bytes)
4,101,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,131,505 UART: [rt]cmd =0x44504543, len=24
4,166,068 >>> mbox cmd response data (40 bytes)
4,166,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,460 UART: [rt]cmd =0x44504543, len=24
4,229,675 >>> mbox cmd response data (40 bytes)
4,229,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,259,217 UART: [rt]cmd =0x44504543, len=24
4,293,720 >>> mbox cmd response data (40 bytes)
4,293,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,322,976 UART: [rt]cmd =0x44504543, len=24
4,356,581 >>> mbox cmd response data (40 bytes)
4,356,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,386,067 UART: [rt]cmd =0x44504543, len=24
4,393,289 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
87,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,678 UART: [kat] SHA2-256
882,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,724 UART: [kat] ++
886,876 UART: [kat] sha1
891,142 UART: [kat] SHA2-256
893,080 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,185 UART: [kat] HMAC-384Kdf
908,009 UART: [kat] LMS
1,476,205 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,596 UART: [fht] Storing FHT @ 0x50003400
1,480,313 UART: [idev] ++
1,480,481 UART: [idev] CDI.KEYID = 6
1,480,841 UART: [idev] SUBJECT.KEYID = 7
1,481,265 UART: [idev] UDS.KEYID = 0
1,481,610 ready_for_fw is high
1,481,610 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,223 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,663 UART: [idev] --
1,515,732 UART: [ldev] ++
1,515,900 UART: [ldev] CDI.KEYID = 6
1,516,263 UART: [ldev] SUBJECT.KEYID = 5
1,516,689 UART: [ldev] AUTHORITY.KEYID = 7
1,517,152 UART: [ldev] FE.KEYID = 1
1,522,344 UART: [ldev] Erasing FE.KEYID = 1
1,548,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,015 UART: [ldev] --
1,587,374 UART: [fwproc] Waiting for Commands...
1,588,073 UART: [fwproc] Received command 0x46574c44
1,588,864 UART: [fwproc] Received Image of size 114360 bytes
2,886,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,279 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,410 >>> mbox cmd response: success
3,080,586 UART: [afmc] ++
3,080,754 UART: [afmc] CDI.KEYID = 6
3,081,116 UART: [afmc] SUBJECT.KEYID = 7
3,081,541 UART: [afmc] AUTHORITY.KEYID = 5
3,116,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,571 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,261 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,024 UART: [afmc] --
3,159,912 UART: [cold-reset] --
3,161,038 UART: [state] Locking Datavault
3,162,369 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,973 UART: [state] Locking ICCM
3,163,641 UART: [exit] Launching FMC @ 0x40000130
3,168,970 UART:
3,168,986 UART: Running Caliptra FMC ...
3,169,394 UART:
3,169,537 UART: [state] CFI Enabled
3,180,146 UART: [fht] FMC Alias Private Key: 7
3,287,847 UART: [art] Extend RT PCRs Done
3,288,275 UART: [art] Lock RT PCRs Done
3,289,571 UART: [art] Populate DV Done
3,297,732 UART: [fht] FMC Alias Private Key: 7
3,298,724 UART: [art] Derive CDI
3,299,004 UART: [art] Store in in slot 0x4
3,384,671 UART: [art] Derive Key Pair
3,385,031 UART: [art] Store priv key in slot 0x5
3,398,271 UART: [art] Derive Key Pair - Done
3,412,914 UART: [art] Signing Cert with AUTHO
3,413,394 UART: RITY.KEYID = 7
3,428,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,241 UART: [art] PUB.X = 06632D262DFB0A464347C75C42EF28174DAC9DBD380B25035929C0A62F8724B71AD89B19249CCA266F4C2B84FD76997A
3,436,001 UART: [art] PUB.Y = 0970377F8444113FED61F7BAE7ECE93E9EBB4704DD683591792CF6C290D248FFF9EAACEE9210653BCB36627934EC8E47
3,442,955 UART: [art] SIG.R = FE6EC136E7FEC8E21EB4A1626F868150A2E8663AFD3572AA131BEAEFC35CC24BB3982A7341E61F766F3127FEB7898C81
3,449,739 UART: [art] SIG.S = DAB3680051B121D558865803B98FE9B4F74020A56205E0352AC25F1107143BF1BB4122107C2001BDFA48BA20C3D146E2
3,473,846 UART: Caliptra RT
3,474,192 UART: [state] CFI Enabled
3,582,569 UART: [rt] RT listening for mailbox commands...
3,583,239 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,956 UART: [rt]cmd =0x44504543, len=24
3,646,969 >>> mbox cmd response data (40 bytes)
3,646,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,699 UART: [rt]cmd =0x44504543, len=24
3,710,854 >>> mbox cmd response data (40 bytes)
3,710,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,326 UART: [rt]cmd =0x44504543, len=24
3,774,437 >>> mbox cmd response data (40 bytes)
3,774,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,117 UART: [rt]cmd =0x44504543, len=24
3,837,992 >>> mbox cmd response data (40 bytes)
3,837,993 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,726 UART: [rt]cmd =0x44504543, len=24
3,901,969 >>> mbox cmd response data (40 bytes)
3,901,970 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,491 UART: [rt]cmd =0x44504543, len=24
3,966,016 >>> mbox cmd response data (40 bytes)
3,966,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,670 UART: [rt]cmd =0x44504543, len=24
4,030,043 >>> mbox cmd response data (40 bytes)
4,030,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,457 UART: [rt]cmd =0x44504543, len=24
4,093,742 >>> mbox cmd response data (40 bytes)
4,093,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,056 UART: [rt]cmd =0x44504543, len=24
4,157,093 >>> mbox cmd response data (40 bytes)
4,157,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,186,337 UART: [rt]cmd =0x44504543, len=24
4,220,254 >>> mbox cmd response data (40 bytes)
4,220,255 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,249,890 UART: [rt]cmd =0x44504543, len=24
4,283,793 >>> mbox cmd response data (40 bytes)
4,283,794 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,313,331 UART: [rt]cmd =0x44504543, len=24
4,347,730 >>> mbox cmd response data (40 bytes)
4,347,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,984 UART: [rt]cmd =0x44504543, len=24
4,411,057 >>> mbox cmd response data (40 bytes)
4,411,058 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,440,509 UART: [rt]cmd =0x44504543, len=24
4,474,886 >>> mbox cmd response data (40 bytes)
4,474,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,504,238 UART: [rt]cmd =0x44504543, len=24
4,538,459 >>> mbox cmd response data (40 bytes)
4,538,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,567,743 UART: [rt]cmd =0x44504543, len=24
4,574,997 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,658 ready_for_fw is high
1,363,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,914 >>> mbox cmd response: success
2,992,268 UART:
2,992,284 UART: Running Caliptra FMC ...
2,992,692 UART:
2,992,835 UART: [state] CFI Enabled
3,003,312 UART: [fht] FMC Alias Private Key: 7
3,111,537 UART: [art] Extend RT PCRs Done
3,111,965 UART: [art] Lock RT PCRs Done
3,113,367 UART: [art] Populate DV Done
3,121,454 UART: [fht] FMC Alias Private Key: 7
3,122,444 UART: [art] Derive CDI
3,122,724 UART: [art] Store in in slot 0x4
3,208,073 UART: [art] Derive Key Pair
3,208,433 UART: [art] Store priv key in slot 0x5
3,221,667 UART: [art] Derive Key Pair - Done
3,236,429 UART: [art] Signing Cert with AUTHO
3,236,909 UART: RITY.KEYID = 7
3,252,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,212 UART: [art] PUB.X = B35DDE82C8967940A977CE0BA6BC267394613E318DE7BEBFA9A9FF7B932B7B26D53C30C88D1216842B45F0A2D4914CB9
3,259,989 UART: [art] PUB.Y = 5B8D82E76618660FA8B0EFB2B6AD834D5E0F6D8D9412A87EA961D46D4530D92D708BA54AC511A6E73344B2E1A630A38B
3,266,941 UART: [art] SIG.R = A14F3E74F1838F57224B4ACEACADF4091968946F3DF194497E85F60D825DA092A93F367C8BB815420361B45722E2D907
3,273,697 UART: [art] SIG.S = 310F2D2633FBD67BD6BFB1CD346694B54680BE97EE8F46F62A6FC97FF9D1CE69C59E558930BDB179D90BE129FC16A788
3,297,398 UART: Caliptra RT
3,297,744 UART: [state] CFI Enabled
3,405,520 UART: [rt] RT listening for mailbox commands...
3,406,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,735 UART: [rt]cmd =0x44504543, len=24
3,469,462 >>> mbox cmd response data (40 bytes)
3,469,463 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,870 UART: [rt]cmd =0x44504543, len=24
3,532,925 >>> mbox cmd response data (40 bytes)
3,532,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,187 UART: [rt]cmd =0x44504543, len=24
3,596,676 >>> mbox cmd response data (40 bytes)
3,596,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,194 UART: [rt]cmd =0x44504543, len=24
3,660,251 >>> mbox cmd response data (40 bytes)
3,660,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,579 UART: [rt]cmd =0x44504543, len=24
3,723,344 >>> mbox cmd response data (40 bytes)
3,723,345 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,770 UART: [rt]cmd =0x44504543, len=24
3,786,995 >>> mbox cmd response data (40 bytes)
3,786,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,687 UART: [rt]cmd =0x44504543, len=24
3,851,212 >>> mbox cmd response data (40 bytes)
3,851,213 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,614 UART: [rt]cmd =0x44504543, len=24
3,914,801 >>> mbox cmd response data (40 bytes)
3,914,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,425 UART: [rt]cmd =0x44504543, len=24
3,978,654 >>> mbox cmd response data (40 bytes)
3,978,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,988 UART: [rt]cmd =0x44504543, len=24
4,042,255 >>> mbox cmd response data (40 bytes)
4,042,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,783 UART: [rt]cmd =0x44504543, len=24
4,106,530 >>> mbox cmd response data (40 bytes)
4,106,531 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,136,002 UART: [rt]cmd =0x44504543, len=24
4,169,901 >>> mbox cmd response data (40 bytes)
4,169,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,267 UART: [rt]cmd =0x44504543, len=24
4,234,010 >>> mbox cmd response data (40 bytes)
4,234,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,263,642 UART: [rt]cmd =0x44504543, len=24
4,298,397 >>> mbox cmd response data (40 bytes)
4,298,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,328,007 UART: [rt]cmd =0x44504543, len=24
4,362,368 >>> mbox cmd response data (40 bytes)
4,362,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,391,742 UART: [rt]cmd =0x44504543, len=24
4,399,146 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,596 UART: [kat] LMS
1,170,924 UART: [kat] --
1,171,915 UART: [cold-reset] ++
1,172,411 UART: [fht] FHT @ 0x50003400
1,175,030 UART: [idev] ++
1,175,198 UART: [idev] CDI.KEYID = 6
1,175,558 UART: [idev] SUBJECT.KEYID = 7
1,175,982 UART: [idev] UDS.KEYID = 0
1,176,327 ready_for_fw is high
1,176,327 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,505 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,210,173 UART: [ldev] ++
1,210,341 UART: [ldev] CDI.KEYID = 6
1,210,704 UART: [ldev] SUBJECT.KEYID = 5
1,211,130 UART: [ldev] AUTHORITY.KEYID = 7
1,211,593 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,564 UART: [fwproc] Recv command 0x46574c44
1,284,292 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,364 >>> mbox cmd response: success
2,776,448 UART: [afmc] ++
2,776,616 UART: [afmc] CDI.KEYID = 6
2,776,978 UART: [afmc] SUBJECT.KEYID = 7
2,777,403 UART: [afmc] AUTHORITY.KEYID = 5
2,812,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,015 UART: [afmc] --
2,855,933 UART: [cold-reset] --
2,856,687 UART: [state] Locking Datavault
2,857,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,352 UART: [state] Locking ICCM
2,858,816 UART: [exit] Launching FMC @ 0x40000130
2,864,145 UART:
2,864,161 UART: Running Caliptra FMC ...
2,864,569 UART:
2,864,623 UART: [state] CFI Enabled
2,875,234 UART: [fht] FMC Alias Private Key: 7
2,983,217 UART: [art] Extend RT PCRs Done
2,983,645 UART: [art] Lock RT PCRs Done
2,985,303 UART: [art] Populate DV Done
2,993,302 UART: [fht] FMC Alias Private Key: 7
2,994,232 UART: [art] Derive CDI
2,994,512 UART: [art] Store in in slot 0x4
3,079,827 UART: [art] Derive Key Pair
3,080,187 UART: [art] Store priv key in slot 0x5
3,093,227 UART: [art] Derive Key Pair - Done
3,107,707 UART: [art] Signing Cert with AUTHO
3,108,187 UART: RITY.KEYID = 7
3,123,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,350 UART: [art] PUB.X = 3821432C096A14147A373D6C2C8DD1C66D2506963C2BF3D415828E547D86E330E88CFB258D59CFCC571651D960F2F053
3,131,110 UART: [art] PUB.Y = B896BD62C6B6B8F5ED4E09399D37EC3C1D90537AD37DCA6B14BD0E1BFA0D2ED088295A04C1008234C87A1C9A47846A13
3,138,038 UART: [art] SIG.R = 7D36489FE50260F88F693CEAF3D1952BDC8DEED4CFDE15A275343F7D1DB1A1EE1D691BC59594373E89046AF8A75840F0
3,144,814 UART: [art] SIG.S = 89D9CB859586F72775916C2EE14B0B4C3FFD8DEAE13A8B908F5258AF1A973409FB7D16ED7E9261A8568AD03DAA9BF034
3,168,531 UART: Caliptra RT
3,168,785 UART: [state] CFI Enabled
3,276,339 UART: [rt] RT listening for mailbox commands...
3,277,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,710 UART: [rt]cmd =0x44504543, len=24
3,340,977 >>> mbox cmd response data (40 bytes)
3,340,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,539 UART: [rt]cmd =0x44504543, len=24
3,404,522 >>> mbox cmd response data (40 bytes)
3,404,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,010 UART: [rt]cmd =0x44504543, len=24
3,468,021 >>> mbox cmd response data (40 bytes)
3,468,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,623 UART: [rt]cmd =0x44504543, len=24
3,531,670 >>> mbox cmd response data (40 bytes)
3,531,671 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,232 UART: [rt]cmd =0x44504543, len=24
3,595,377 >>> mbox cmd response data (40 bytes)
3,595,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,891 UART: [rt]cmd =0x44504543, len=24
3,659,528 >>> mbox cmd response data (40 bytes)
3,659,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,964 UART: [rt]cmd =0x44504543, len=24
3,723,011 >>> mbox cmd response data (40 bytes)
3,723,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,663 UART: [rt]cmd =0x44504543, len=24
3,787,248 >>> mbox cmd response data (40 bytes)
3,787,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,558 UART: [rt]cmd =0x44504543, len=24
3,850,871 >>> mbox cmd response data (40 bytes)
3,850,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,269 UART: [rt]cmd =0x44504543, len=24
3,914,480 >>> mbox cmd response data (40 bytes)
3,914,481 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,966 UART: [rt]cmd =0x44504543, len=24
3,978,387 >>> mbox cmd response data (40 bytes)
3,978,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,735 UART: [rt]cmd =0x44504543, len=24
4,041,690 >>> mbox cmd response data (40 bytes)
4,041,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,220 UART: [rt]cmd =0x44504543, len=24
4,105,727 >>> mbox cmd response data (40 bytes)
4,105,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,135,229 UART: [rt]cmd =0x44504543, len=24
4,169,262 >>> mbox cmd response data (40 bytes)
4,169,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,576 UART: [rt]cmd =0x44504543, len=24
4,233,137 >>> mbox cmd response data (40 bytes)
4,233,138 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,262,699 UART: [rt]cmd =0x44504543, len=24
4,270,007 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,089 ready_for_fw is high
1,061,089 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,361 >>> mbox cmd response: success
2,688,829 UART:
2,688,845 UART: Running Caliptra FMC ...
2,689,253 UART:
2,689,307 UART: [state] CFI Enabled
2,699,864 UART: [fht] FMC Alias Private Key: 7
2,807,511 UART: [art] Extend RT PCRs Done
2,807,939 UART: [art] Lock RT PCRs Done
2,809,509 UART: [art] Populate DV Done
2,817,802 UART: [fht] FMC Alias Private Key: 7
2,818,736 UART: [art] Derive CDI
2,819,016 UART: [art] Store in in slot 0x4
2,904,717 UART: [art] Derive Key Pair
2,905,077 UART: [art] Store priv key in slot 0x5
2,917,917 UART: [art] Derive Key Pair - Done
2,932,710 UART: [art] Signing Cert with AUTHO
2,933,190 UART: RITY.KEYID = 7
2,948,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,197 UART: [art] PUB.X = DF67545559380452ADF8C9C56F1DB8A2EA2CFFCCF04247CA746AD6429D711D20BC8434FE86CB67B1DDB208726826C60D
2,955,970 UART: [art] PUB.Y = 82C0F5A63330EAB4BDE67F47D3CAAE1CEE3FF71FEA196C96A2E1C0667FEF7D37ED64DCC3C9F1A28F180EE63A0DE763D2
2,962,944 UART: [art] SIG.R = F5C4D0C72917C7E329DE9FF40D00C0B73D80AF2B00D149F0E5BF784B6AD422896BA6824465DB0B6499A579242FA61AF6
2,969,672 UART: [art] SIG.S = 811EE88360D6210A62D6D3F890D7328AC5069DF1B6E933D3766F9BE601CB5BCC05C3B047345851C4B63DE559A62B8AAA
2,993,511 UART: Caliptra RT
2,993,765 UART: [state] CFI Enabled
3,100,638 UART: [rt] RT listening for mailbox commands...
3,101,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,953 UART: [rt]cmd =0x44504543, len=24
3,165,034 >>> mbox cmd response data (40 bytes)
3,165,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,556 UART: [rt]cmd =0x44504543, len=24
3,228,957 >>> mbox cmd response data (40 bytes)
3,228,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,258,465 UART: [rt]cmd =0x44504543, len=24
3,292,676 >>> mbox cmd response data (40 bytes)
3,292,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,152 UART: [rt]cmd =0x44504543, len=24
3,356,387 >>> mbox cmd response data (40 bytes)
3,356,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,801 UART: [rt]cmd =0x44504543, len=24
3,420,100 >>> mbox cmd response data (40 bytes)
3,420,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,642 UART: [rt]cmd =0x44504543, len=24
3,483,789 >>> mbox cmd response data (40 bytes)
3,483,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,147 UART: [rt]cmd =0x44504543, len=24
3,547,754 >>> mbox cmd response data (40 bytes)
3,547,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,218 UART: [rt]cmd =0x44504543, len=24
3,611,273 >>> mbox cmd response data (40 bytes)
3,611,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,635 UART: [rt]cmd =0x44504543, len=24
3,675,162 >>> mbox cmd response data (40 bytes)
3,675,163 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,642 UART: [rt]cmd =0x44504543, len=24
3,738,541 >>> mbox cmd response data (40 bytes)
3,738,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,969 UART: [rt]cmd =0x44504543, len=24
3,802,460 >>> mbox cmd response data (40 bytes)
3,802,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,968 UART: [rt]cmd =0x44504543, len=24
3,865,915 >>> mbox cmd response data (40 bytes)
3,865,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,323 UART: [rt]cmd =0x44504543, len=24
3,930,000 >>> mbox cmd response data (40 bytes)
3,930,001 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,702 UART: [rt]cmd =0x44504543, len=24
3,993,773 >>> mbox cmd response data (40 bytes)
3,993,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,023,339 UART: [rt]cmd =0x44504543, len=24
4,057,090 >>> mbox cmd response data (40 bytes)
4,057,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,524 UART: [rt]cmd =0x44504543, len=24
4,093,592 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,525 UART: [kat] SHA2-512-ACC
908,426 UART: [kat] ECC-384
918,827 UART: [kat] HMAC-384Kdf
923,541 UART: [kat] LMS
1,171,869 UART: [kat] --
1,172,738 UART: [cold-reset] ++
1,173,304 UART: [fht] FHT @ 0x50003400
1,175,869 UART: [idev] ++
1,176,037 UART: [idev] CDI.KEYID = 6
1,176,397 UART: [idev] SUBJECT.KEYID = 7
1,176,821 UART: [idev] UDS.KEYID = 0
1,177,166 ready_for_fw is high
1,177,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,959 UART: [idev] Erasing UDS.KEYID = 0
1,201,866 UART: [idev] Sha1 KeyId Algorithm
1,210,406 UART: [idev] --
1,211,294 UART: [ldev] ++
1,211,462 UART: [ldev] CDI.KEYID = 6
1,211,825 UART: [ldev] SUBJECT.KEYID = 5
1,212,251 UART: [ldev] AUTHORITY.KEYID = 7
1,212,714 UART: [ldev] FE.KEYID = 1
1,218,012 UART: [ldev] Erasing FE.KEYID = 1
1,243,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,296 UART: [ldev] --
1,283,677 UART: [fwproc] Wait for Commands...
1,284,273 UART: [fwproc] Recv command 0x46574c44
1,285,001 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,619 >>> mbox cmd response: success
2,777,679 UART: [afmc] ++
2,777,847 UART: [afmc] CDI.KEYID = 6
2,778,209 UART: [afmc] SUBJECT.KEYID = 7
2,778,634 UART: [afmc] AUTHORITY.KEYID = 5
2,814,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,736 UART: [afmc] --
2,857,756 UART: [cold-reset] --
2,858,888 UART: [state] Locking Datavault
2,860,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,631 UART: [state] Locking ICCM
2,861,181 UART: [exit] Launching FMC @ 0x40000130
2,866,510 UART:
2,866,526 UART: Running Caliptra FMC ...
2,866,934 UART:
2,867,077 UART: [state] CFI Enabled
2,878,186 UART: [fht] FMC Alias Private Key: 7
2,986,707 UART: [art] Extend RT PCRs Done
2,987,135 UART: [art] Lock RT PCRs Done
2,988,669 UART: [art] Populate DV Done
2,996,958 UART: [fht] FMC Alias Private Key: 7
2,998,030 UART: [art] Derive CDI
2,998,310 UART: [art] Store in in slot 0x4
3,084,321 UART: [art] Derive Key Pair
3,084,681 UART: [art] Store priv key in slot 0x5
3,098,535 UART: [art] Derive Key Pair - Done
3,113,393 UART: [art] Signing Cert with AUTHO
3,113,873 UART: RITY.KEYID = 7
3,129,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,358 UART: [art] PUB.X = B152620A5F4AA5BABE2AAA81FCCF6F4A91102055EF3333320A9EAD98F5A9B0A8977D9CCAC33955B3368AB595B5619BAA
3,137,140 UART: [art] PUB.Y = 7E441F36888E08429B525EFBEB59AB4335B8740742117B99794F0D78D594D7C96D0D4B1ACC1F4FC985A675BF51B91862
3,144,078 UART: [art] SIG.R = 317BA45C57C855D370B97A1A5F83B9A9341204CA406A028A210434380E75E49D1449098D6FFC6E1337404F2730208204
3,150,816 UART: [art] SIG.S = 56099900C3B21FF9A411EAC14A0FFD97F01CA12EB9DFEBC60A8798CFECD42BB01879E1A388000423783020F8EE1BC484
3,174,563 UART: Caliptra RT
3,174,909 UART: [state] CFI Enabled
3,282,405 UART: [rt] RT listening for mailbox commands...
3,283,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,414 UART: [rt]cmd =0x44504543, len=24
3,346,613 >>> mbox cmd response data (40 bytes)
3,346,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,269 UART: [rt]cmd =0x44504543, len=24
3,410,836 >>> mbox cmd response data (40 bytes)
3,410,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,254 UART: [rt]cmd =0x44504543, len=24
3,473,903 >>> mbox cmd response data (40 bytes)
3,473,904 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,455 UART: [rt]cmd =0x44504543, len=24
3,537,766 >>> mbox cmd response data (40 bytes)
3,537,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,194 UART: [rt]cmd =0x44504543, len=24
3,601,293 >>> mbox cmd response data (40 bytes)
3,601,294 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,829 UART: [rt]cmd =0x44504543, len=24
3,664,918 >>> mbox cmd response data (40 bytes)
3,664,919 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,336 UART: [rt]cmd =0x44504543, len=24
3,728,811 >>> mbox cmd response data (40 bytes)
3,728,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,143 UART: [rt]cmd =0x44504543, len=24
3,792,908 >>> mbox cmd response data (40 bytes)
3,792,909 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,336 UART: [rt]cmd =0x44504543, len=24
3,856,327 >>> mbox cmd response data (40 bytes)
3,856,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,739 UART: [rt]cmd =0x44504543, len=24
3,920,326 >>> mbox cmd response data (40 bytes)
3,920,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,832 UART: [rt]cmd =0x44504543, len=24
3,983,931 >>> mbox cmd response data (40 bytes)
3,983,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,657 UART: [rt]cmd =0x44504543, len=24
4,047,988 >>> mbox cmd response data (40 bytes)
4,047,989 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,504 UART: [rt]cmd =0x44504543, len=24
4,111,741 >>> mbox cmd response data (40 bytes)
4,111,742 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,351 UART: [rt]cmd =0x44504543, len=24
4,175,722 >>> mbox cmd response data (40 bytes)
4,175,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,205,242 UART: [rt]cmd =0x44504543, len=24
4,239,645 >>> mbox cmd response data (40 bytes)
4,239,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,269 UART: [rt]cmd =0x44504543, len=24
4,276,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,598 >>> mbox cmd response: success
2,689,018 UART:
2,689,034 UART: Running Caliptra FMC ...
2,689,442 UART:
2,689,585 UART: [state] CFI Enabled
2,700,330 UART: [fht] FMC Alias Private Key: 7
2,808,823 UART: [art] Extend RT PCRs Done
2,809,251 UART: [art] Lock RT PCRs Done
2,810,775 UART: [art] Populate DV Done
2,818,992 UART: [fht] FMC Alias Private Key: 7
2,820,080 UART: [art] Derive CDI
2,820,360 UART: [art] Store in in slot 0x4
2,906,125 UART: [art] Derive Key Pair
2,906,485 UART: [art] Store priv key in slot 0x5
2,919,957 UART: [art] Derive Key Pair - Done
2,934,995 UART: [art] Signing Cert with AUTHO
2,935,475 UART: RITY.KEYID = 7
2,950,757 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,522 UART: [art] PUB.X = 503DCE85CFCF63678B76F03350F357325EA792B3454185B7042ECCC505ED315CCFF83EB8DC15A880A0CF671C3666E134
2,958,292 UART: [art] PUB.Y = DD4DD7D1DF53D8B61AF8ECA2DDF3B44DE5C22A0ABD7457320665A5B36D726D8207C7924B776B30D6DFDA66ED02D27597
2,965,248 UART: [art] SIG.R = 6816804D61220E4D4161EE90E19DC2C6092ED5407BA254E872A672ECAB55FAF889ED6CED3AA17F44699A6254208F15DB
2,972,018 UART: [art] SIG.S = A152CECC14A289485239BE071CC07C12F2152F83AF3BB906AC57A719B85E65DF84CB0E7E4DCDDE9D05A6E398F91C1D5E
2,995,785 UART: Caliptra RT
2,996,131 UART: [state] CFI Enabled
3,104,353 UART: [rt] RT listening for mailbox commands...
3,105,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,584 UART: [rt]cmd =0x44504543, len=24
3,168,661 >>> mbox cmd response data (40 bytes)
3,168,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,198,273 UART: [rt]cmd =0x44504543, len=24
3,231,816 >>> mbox cmd response data (40 bytes)
3,231,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,261,154 UART: [rt]cmd =0x44504543, len=24
3,295,611 >>> mbox cmd response data (40 bytes)
3,295,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,915 UART: [rt]cmd =0x44504543, len=24
3,359,718 >>> mbox cmd response data (40 bytes)
3,359,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,184 UART: [rt]cmd =0x44504543, len=24
3,423,133 >>> mbox cmd response data (40 bytes)
3,423,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,497 UART: [rt]cmd =0x44504543, len=24
3,487,020 >>> mbox cmd response data (40 bytes)
3,487,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,606 UART: [rt]cmd =0x44504543, len=24
3,550,929 >>> mbox cmd response data (40 bytes)
3,550,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,603 UART: [rt]cmd =0x44504543, len=24
3,615,160 >>> mbox cmd response data (40 bytes)
3,615,161 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,640 UART: [rt]cmd =0x44504543, len=24
3,678,767 >>> mbox cmd response data (40 bytes)
3,678,768 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,435 UART: [rt]cmd =0x44504543, len=24
3,742,844 >>> mbox cmd response data (40 bytes)
3,742,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,202 UART: [rt]cmd =0x44504543, len=24
3,806,381 >>> mbox cmd response data (40 bytes)
3,806,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,765 UART: [rt]cmd =0x44504543, len=24
3,869,892 >>> mbox cmd response data (40 bytes)
3,869,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,330 UART: [rt]cmd =0x44504543, len=24
3,933,859 >>> mbox cmd response data (40 bytes)
3,933,860 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,401 UART: [rt]cmd =0x44504543, len=24
3,997,774 >>> mbox cmd response data (40 bytes)
3,997,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,027,478 UART: [rt]cmd =0x44504543, len=24
4,061,829 >>> mbox cmd response data (40 bytes)
4,061,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,495 UART: [rt]cmd =0x44504543, len=24
4,098,355 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 ready_for_fw is high
1,174,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,211 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,970 UART: [ldev] Erasing FE.KEYID = 1
1,242,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,366 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,403 UART: [fwproc] Recv command 0x46574c44
1,283,136 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,622 >>> mbox cmd response: success
2,773,711 UART: [afmc] ++
2,773,879 UART: [afmc] CDI.KEYID = 6
2,774,242 UART: [afmc] SUBJECT.KEYID = 7
2,774,668 UART: [afmc] AUTHORITY.KEYID = 5
2,810,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,058 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,777 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,484 UART: [afmc] --
2,853,396 UART: [cold-reset] --
2,854,242 UART: [state] Locking Datavault
2,855,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,025 UART: [state] Locking ICCM
2,856,663 UART: [exit] Launching FMC @ 0x40000130
2,861,992 UART:
2,862,008 UART: Running Caliptra FMC ...
2,862,416 UART:
2,862,470 UART: [state] CFI Enabled
2,873,361 UART: [fht] FMC Alias Private Key: 7
2,981,252 UART: [art] Extend RT PCRs Done
2,981,680 UART: [art] Lock RT PCRs Done
2,983,310 UART: [art] Populate DV Done
2,991,525 UART: [fht] FMC Alias Private Key: 7
2,992,697 UART: [art] Derive CDI
2,992,977 UART: [art] Store in in slot 0x4
3,079,068 UART: [art] Derive Key Pair
3,079,428 UART: [art] Store priv key in slot 0x5
3,092,760 UART: [art] Derive Key Pair - Done
3,107,668 UART: [art] Signing Cert with AUTHO
3,108,148 UART: RITY.KEYID = 7
3,123,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,853 UART: [art] PUB.X = C3A775EA2DF7ADB6FF24BCF373CDD25CAB9A572587C86998C7EF30EA62A7BDB4EDB85CF639FC2F05F45D5BDA46892D32
3,130,648 UART: [art] PUB.Y = 92634E5766DDCF289B38B885DD11827404D142332609CE48BC19DD93A9E05FACA4ED86B2EFE79C69C14049F3499EB563
3,137,596 UART: [art] SIG.R = 2F42E1596343DAC7307F5873D703932365BE1691A5E87290C0621F0CDE7093C4824A2BD97122ACF1CC34F11792B534EC
3,144,356 UART: [art] SIG.S = D6D19AAB91F6BAE93CEAE96E96AD4ED58548003EC67F4BAF91CB7AB19AF2A8559C41EE481F45EABEE6FEA6D8F4C48372
3,167,975 UART: Caliptra RT
3,168,229 UART: [state] CFI Enabled
3,275,761 UART: [rt] RT listening for mailbox commands...
3,276,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,916 UART: [rt]cmd =0x44504543, len=24
3,340,173 >>> mbox cmd response data (40 bytes)
3,340,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,669 UART: [rt]cmd =0x44504543, len=24
3,404,008 >>> mbox cmd response data (40 bytes)
3,404,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,648 UART: [rt]cmd =0x44504543, len=24
3,467,625 >>> mbox cmd response data (40 bytes)
3,467,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,269 UART: [rt]cmd =0x44504543, len=24
3,531,678 >>> mbox cmd response data (40 bytes)
3,531,679 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,088 UART: [rt]cmd =0x44504543, len=24
3,595,521 >>> mbox cmd response data (40 bytes)
3,595,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,103 UART: [rt]cmd =0x44504543, len=24
3,659,614 >>> mbox cmd response data (40 bytes)
3,659,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,012 UART: [rt]cmd =0x44504543, len=24
3,723,023 >>> mbox cmd response data (40 bytes)
3,723,024 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,619 UART: [rt]cmd =0x44504543, len=24
3,787,024 >>> mbox cmd response data (40 bytes)
3,787,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,506 UART: [rt]cmd =0x44504543, len=24
3,850,795 >>> mbox cmd response data (40 bytes)
3,850,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,361 UART: [rt]cmd =0x44504543, len=24
3,914,284 >>> mbox cmd response data (40 bytes)
3,914,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,788 UART: [rt]cmd =0x44504543, len=24
3,978,229 >>> mbox cmd response data (40 bytes)
3,978,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,741 UART: [rt]cmd =0x44504543, len=24
4,042,036 >>> mbox cmd response data (40 bytes)
4,042,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,646 UART: [rt]cmd =0x44504543, len=24
4,105,063 >>> mbox cmd response data (40 bytes)
4,105,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,134,501 UART: [rt]cmd =0x44504543, len=24
4,169,010 >>> mbox cmd response data (40 bytes)
4,169,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,604 UART: [rt]cmd =0x44504543, len=24
4,232,821 >>> mbox cmd response data (40 bytes)
4,232,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,262,189 UART: [rt]cmd =0x44504543, len=24
4,269,203 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,398 ready_for_fw is high
1,056,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,938 >>> mbox cmd response: success
2,685,048 UART:
2,685,064 UART: Running Caliptra FMC ...
2,685,472 UART:
2,685,526 UART: [state] CFI Enabled
2,695,901 UART: [fht] FMC Alias Private Key: 7
2,803,536 UART: [art] Extend RT PCRs Done
2,803,964 UART: [art] Lock RT PCRs Done
2,805,354 UART: [art] Populate DV Done
2,813,799 UART: [fht] FMC Alias Private Key: 7
2,814,877 UART: [art] Derive CDI
2,815,157 UART: [art] Store in in slot 0x4
2,900,800 UART: [art] Derive Key Pair
2,901,160 UART: [art] Store priv key in slot 0x5
2,914,216 UART: [art] Derive Key Pair - Done
2,928,701 UART: [art] Signing Cert with AUTHO
2,929,181 UART: RITY.KEYID = 7
2,944,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,140 UART: [art] PUB.X = 4D62FE1EE73C57999427A00490ABFA68FB1A094A0AC628B4D0975A902570A6B6A756389011A4C1891E8E6F2E2EC79C21
2,951,903 UART: [art] PUB.Y = E049BB86F55D5804AC86F21CEAAD7685E6C7E7302DF60216BD023D87FC4AFB0622552F309D70B179B8362F639579032D
2,958,840 UART: [art] SIG.R = 851F866D8A6A69B0EA6DA88C5CC642CBC5D8BA1D819FE501AE523F5E382ABA6845423A70BDBDE33103D5DEF0AD7F99D1
2,965,626 UART: [art] SIG.S = 70666AFE265C443EAFCEA1CFC5D059980EB99E3612A512A24E7297E38A8110C7B307B8CD67AF134AD5A4AB39BB757FC6
2,989,171 UART: Caliptra RT
2,989,425 UART: [state] CFI Enabled
3,096,681 UART: [rt] RT listening for mailbox commands...
3,097,351 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,874 UART: [rt]cmd =0x44504543, len=24
3,160,657 >>> mbox cmd response data (40 bytes)
3,160,658 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,903 UART: [rt]cmd =0x44504543, len=24
3,224,032 >>> mbox cmd response data (40 bytes)
3,224,033 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,253,708 UART: [rt]cmd =0x44504543, len=24
3,287,875 >>> mbox cmd response data (40 bytes)
3,287,876 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,453 UART: [rt]cmd =0x44504543, len=24
3,351,956 >>> mbox cmd response data (40 bytes)
3,351,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,628 UART: [rt]cmd =0x44504543, len=24
3,415,959 >>> mbox cmd response data (40 bytes)
3,415,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,365 UART: [rt]cmd =0x44504543, len=24
3,479,668 >>> mbox cmd response data (40 bytes)
3,479,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,916 UART: [rt]cmd =0x44504543, len=24
3,542,933 >>> mbox cmd response data (40 bytes)
3,542,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,473 UART: [rt]cmd =0x44504543, len=24
3,606,134 >>> mbox cmd response data (40 bytes)
3,606,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,688 UART: [rt]cmd =0x44504543, len=24
3,669,989 >>> mbox cmd response data (40 bytes)
3,669,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,345 UART: [rt]cmd =0x44504543, len=24
3,733,532 >>> mbox cmd response data (40 bytes)
3,733,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,038 UART: [rt]cmd =0x44504543, len=24
3,796,613 >>> mbox cmd response data (40 bytes)
3,796,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,079 UART: [rt]cmd =0x44504543, len=24
3,860,022 >>> mbox cmd response data (40 bytes)
3,860,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,560 UART: [rt]cmd =0x44504543, len=24
3,923,963 >>> mbox cmd response data (40 bytes)
3,923,964 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,421 UART: [rt]cmd =0x44504543, len=24
3,987,630 >>> mbox cmd response data (40 bytes)
3,987,631 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,914 UART: [rt]cmd =0x44504543, len=24
4,050,929 >>> mbox cmd response data (40 bytes)
4,050,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,080,433 UART: [rt]cmd =0x44504543, len=24
4,087,749 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,239 UART: [kat] SHA2-512-ACC
907,140 UART: [kat] ECC-384
916,901 UART: [kat] HMAC-384Kdf
921,573 UART: [kat] LMS
1,169,885 UART: [kat] --
1,170,858 UART: [cold-reset] ++
1,171,318 UART: [fht] FHT @ 0x50003400
1,173,940 UART: [idev] ++
1,174,108 UART: [idev] CDI.KEYID = 6
1,174,469 UART: [idev] SUBJECT.KEYID = 7
1,174,894 UART: [idev] UDS.KEYID = 0
1,175,240 ready_for_fw is high
1,175,240 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,210,067 UART: [ldev] ++
1,210,235 UART: [ldev] CDI.KEYID = 6
1,210,599 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,261 UART: [fwproc] Wait for Commands...
1,283,084 UART: [fwproc] Recv command 0x46574c44
1,283,817 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,879 >>> mbox cmd response: success
2,776,954 UART: [afmc] ++
2,777,122 UART: [afmc] CDI.KEYID = 6
2,777,485 UART: [afmc] SUBJECT.KEYID = 7
2,777,911 UART: [afmc] AUTHORITY.KEYID = 5
2,812,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,059 UART: [afmc] --
2,856,189 UART: [cold-reset] --
2,857,329 UART: [state] Locking Datavault
2,858,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,274 UART: [state] Locking ICCM
2,859,852 UART: [exit] Launching FMC @ 0x40000130
2,865,181 UART:
2,865,197 UART: Running Caliptra FMC ...
2,865,605 UART:
2,865,748 UART: [state] CFI Enabled
2,876,387 UART: [fht] FMC Alias Private Key: 7
2,984,116 UART: [art] Extend RT PCRs Done
2,984,544 UART: [art] Lock RT PCRs Done
2,986,192 UART: [art] Populate DV Done
2,994,627 UART: [fht] FMC Alias Private Key: 7
2,995,753 UART: [art] Derive CDI
2,996,033 UART: [art] Store in in slot 0x4
3,081,702 UART: [art] Derive Key Pair
3,082,062 UART: [art] Store priv key in slot 0x5
3,095,922 UART: [art] Derive Key Pair - Done
3,110,991 UART: [art] Signing Cert with AUTHO
3,111,471 UART: RITY.KEYID = 7
3,126,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,358 UART: [art] PUB.X = 515AC9589DD6B66B22809AE594422C1998EAB186AE29D43CC96E7C08D51AB2ADF561C1D23C06382A8B85135EA4E8677E
3,134,128 UART: [art] PUB.Y = C32A003A66F93DCC97625D6375A2957C1CCA1B2DDEFEED58FBC7631EA08179FA99870309B9EC401D7D8ECA6167EF5158
3,141,064 UART: [art] SIG.R = 4DDDB72C49F2452CBD4B809EC4DBF9D477C81F119526602F5447BA53E7DAF5349B40E03E97A459CF7B6A564E2A2F994C
3,147,846 UART: [art] SIG.S = 375FC87B63CECEB756DB4A27308BE4DF2E66A5295360DB8CEAB063FFEABECD55B1C224D5F03645D1A6A6D011FCC67B85
3,172,041 UART: Caliptra RT
3,172,387 UART: [state] CFI Enabled
3,280,337 UART: [rt] RT listening for mailbox commands...
3,281,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,824 UART: [rt]cmd =0x44504543, len=24
3,344,669 >>> mbox cmd response data (40 bytes)
3,344,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,025 UART: [rt]cmd =0x44504543, len=24
3,407,818 >>> mbox cmd response data (40 bytes)
3,407,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,276 UART: [rt]cmd =0x44504543, len=24
3,471,615 >>> mbox cmd response data (40 bytes)
3,471,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,997 UART: [rt]cmd =0x44504543, len=24
3,535,334 >>> mbox cmd response data (40 bytes)
3,535,335 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,786 UART: [rt]cmd =0x44504543, len=24
3,598,541 >>> mbox cmd response data (40 bytes)
3,598,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,803 UART: [rt]cmd =0x44504543, len=24
3,661,820 >>> mbox cmd response data (40 bytes)
3,661,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,192 UART: [rt]cmd =0x44504543, len=24
3,725,171 >>> mbox cmd response data (40 bytes)
3,725,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,801 UART: [rt]cmd =0x44504543, len=24
3,789,468 >>> mbox cmd response data (40 bytes)
3,789,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,072 UART: [rt]cmd =0x44504543, len=24
3,853,767 >>> mbox cmd response data (40 bytes)
3,853,768 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,411 UART: [rt]cmd =0x44504543, len=24
3,917,558 >>> mbox cmd response data (40 bytes)
3,917,559 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,066 UART: [rt]cmd =0x44504543, len=24
3,981,317 >>> mbox cmd response data (40 bytes)
3,981,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,010,765 UART: [rt]cmd =0x44504543, len=24
4,044,818 >>> mbox cmd response data (40 bytes)
4,044,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,148 UART: [rt]cmd =0x44504543, len=24
4,108,427 >>> mbox cmd response data (40 bytes)
4,108,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,137,939 UART: [rt]cmd =0x44504543, len=24
4,172,084 >>> mbox cmd response data (40 bytes)
4,172,085 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,201,698 UART: [rt]cmd =0x44504543, len=24
4,235,917 >>> mbox cmd response data (40 bytes)
4,235,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,265,561 UART: [rt]cmd =0x44504543, len=24
4,272,911 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,813 ready_for_fw is high
1,055,813 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,661 >>> mbox cmd response: success
2,686,355 UART:
2,686,371 UART: Running Caliptra FMC ...
2,686,779 UART:
2,686,922 UART: [state] CFI Enabled
2,697,129 UART: [fht] FMC Alias Private Key: 7
2,804,880 UART: [art] Extend RT PCRs Done
2,805,308 UART: [art] Lock RT PCRs Done
2,807,050 UART: [art] Populate DV Done
2,815,279 UART: [fht] FMC Alias Private Key: 7
2,816,271 UART: [art] Derive CDI
2,816,551 UART: [art] Store in in slot 0x4
2,901,912 UART: [art] Derive Key Pair
2,902,272 UART: [art] Store priv key in slot 0x5
2,915,566 UART: [art] Derive Key Pair - Done
2,930,148 UART: [art] Signing Cert with AUTHO
2,930,628 UART: RITY.KEYID = 7
2,946,246 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,011 UART: [art] PUB.X = 166D05CE5448B82D03278B213522769952E45244D4693CEB88D34CADE9FC4847B0F3DA6DC852F2E37FB6CEB067CECE4C
2,953,785 UART: [art] PUB.Y = 33B37F83ADF1F7E548EF09B363F7F38E8B98ED481E20E819249BDD54355F534AAE2E69FA110901D3B48981DA60C7E592
2,960,732 UART: [art] SIG.R = 62A5AB00246CB89CCA39B41542D6E222490013BD8A3F5DE0392B05A0FFFB65557F90826B6696459DA16C2D986F8EE562
2,967,457 UART: [art] SIG.S = C5F2340E1D71AA0C7367C9BB341544B9A8413B6DB83AFCEEED03BE95082310679A5F29FF3EA4AD1AAF75013A13E783FC
2,990,917 UART: Caliptra RT
2,991,263 UART: [state] CFI Enabled
3,099,547 UART: [rt] RT listening for mailbox commands...
3,100,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,072 UART: [rt]cmd =0x44504543, len=24
3,164,085 >>> mbox cmd response data (40 bytes)
3,164,086 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,561 UART: [rt]cmd =0x44504543, len=24
3,228,100 >>> mbox cmd response data (40 bytes)
3,228,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,630 UART: [rt]cmd =0x44504543, len=24
3,291,871 >>> mbox cmd response data (40 bytes)
3,291,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,221 UART: [rt]cmd =0x44504543, len=24
3,355,406 >>> mbox cmd response data (40 bytes)
3,355,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,780 UART: [rt]cmd =0x44504543, len=24
3,418,319 >>> mbox cmd response data (40 bytes)
3,418,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,865 UART: [rt]cmd =0x44504543, len=24
3,482,208 >>> mbox cmd response data (40 bytes)
3,482,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,758 UART: [rt]cmd =0x44504543, len=24
3,545,515 >>> mbox cmd response data (40 bytes)
3,545,516 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,113 UART: [rt]cmd =0x44504543, len=24
3,609,362 >>> mbox cmd response data (40 bytes)
3,609,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,990 UART: [rt]cmd =0x44504543, len=24
3,673,173 >>> mbox cmd response data (40 bytes)
3,673,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,859 UART: [rt]cmd =0x44504543, len=24
3,736,892 >>> mbox cmd response data (40 bytes)
3,736,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,546 UART: [rt]cmd =0x44504543, len=24
3,801,177 >>> mbox cmd response data (40 bytes)
3,801,178 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,513 UART: [rt]cmd =0x44504543, len=24
3,864,732 >>> mbox cmd response data (40 bytes)
3,864,733 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,106 UART: [rt]cmd =0x44504543, len=24
3,928,533 >>> mbox cmd response data (40 bytes)
3,928,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,955 UART: [rt]cmd =0x44504543, len=24
3,991,990 >>> mbox cmd response data (40 bytes)
3,991,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,290 UART: [rt]cmd =0x44504543, len=24
4,055,411 >>> mbox cmd response data (40 bytes)
4,055,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,919 UART: [rt]cmd =0x44504543, len=24
4,092,011 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
193,235 UART:
193,601 UART: Running Caliptra ROM ...
194,797 UART:
194,945 UART: [state] CFI Enabled
265,066 UART: [state] LifecycleState = Unprovisioned
267,058 UART: [state] DebugLocked = No
269,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,377 UART: [kat] SHA2-256
444,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,591 UART: [kat] ++
455,079 UART: [kat] sha1
466,750 UART: [kat] SHA2-256
469,414 UART: [kat] SHA2-384
475,822 UART: [kat] SHA2-512-ACC
478,190 UART: [kat] ECC-384
2,766,511 UART: [kat] HMAC-384Kdf
2,778,244 UART: [kat] LMS
3,968,503 UART: [kat] --
3,974,511 UART: [cold-reset] ++
3,976,511 UART: [fht] Storing FHT @ 0x50003400
3,988,057 UART: [idev] ++
3,988,615 UART: [idev] CDI.KEYID = 6
3,989,562 UART: [idev] SUBJECT.KEYID = 7
3,990,792 UART: [idev] UDS.KEYID = 0
3,991,772 ready_for_fw is high
3,991,970 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,475 UART: [idev] Erasing UDS.KEYID = 0
7,323,121 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,437 UART: [idev] --
7,349,652 UART: [ldev] ++
7,350,216 UART: [ldev] CDI.KEYID = 6
7,351,185 UART: [ldev] SUBJECT.KEYID = 5
7,352,390 UART: [ldev] AUTHORITY.KEYID = 7
7,353,623 UART: [ldev] FE.KEYID = 1
7,399,805 UART: [ldev] Erasing FE.KEYID = 1
10,733,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,429 UART: [ldev] --
13,114,929 UART: [fwproc] Waiting for Commands...
13,118,145 UART: [fwproc] Received command 0x46574c44
13,120,319 UART: [fwproc] Received Image of size 114036 bytes
17,179,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,645,718 >>> mbox cmd response: success
17,649,590 UART: [afmc] ++
17,650,185 UART: [afmc] CDI.KEYID = 6
17,651,087 UART: [afmc] SUBJECT.KEYID = 7
17,652,354 UART: [afmc] AUTHORITY.KEYID = 5
21,008,876 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,513 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,919 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,796 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,195 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,891 UART: [afmc] --
23,378,759 UART: [cold-reset] --
23,382,038 UART: [state] Locking Datavault
23,387,821 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,572 UART: [state] Locking ICCM
23,391,605 UART: [exit] Launching FMC @ 0x40000130
23,399,990 UART:
23,400,227 UART: Running Caliptra FMC ...
23,401,322 UART:
23,401,476 UART: [state] CFI Enabled
23,468,160 UART: [fht] FMC Alias Private Key: 7
25,806,119 UART: [art] Extend RT PCRs Done
25,807,341 UART: [art] Lock RT PCRs Done
25,808,799 UART: [art] Populate DV Done
25,814,369 UART: [fht] FMC Alias Private Key: 7
25,815,953 UART: [art] Derive CDI
25,816,761 UART: [art] Store in in slot 0x4
25,875,905 UART: [art] Derive Key Pair
25,876,966 UART: [art] Store priv key in slot 0x5
29,169,692 UART: [art] Derive Key Pair - Done
29,182,852 UART: [art] Signing Cert with AUTHO
29,184,147 UART: RITY.KEYID = 7
31,471,983 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,500 UART: [art] PUB.X = 5DBB5C962181F973EF930B346DF1A4787F189340269C72055D15A84BE3F8E1EC68D6848B8E68CD62D0F608E5C2F6F9E3
31,480,718 UART: [art] PUB.Y = 94AA9A8192E0854C5F72CD3512BE8BB3C65F08D1D1EA8B0ACB86CCE8D90D48BF2FE24F5A89B15F46F4BCFB3FDCA09895
31,488,027 UART: [art] SIG.R = C9856115A34C23F4F94452C0F747766FBBA1BDD1803B2E76073E035B434843B4E0AE49E707784E5CFACD54E1DD6C2127
31,495,397 UART: [art] SIG.S = 61957DF26E87096E3907B8EBBC709E86252513E6BBC1E390C5EC378A0B5148EAF4EF2ECAC1D650383D19D86962E7C369
32,800,022 UART: Caliptra RT
32,800,727 UART: [state] CFI Enabled
32,963,083 UART: [rt] RT listening for mailbox commands...
32,965,606 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,995,563 UART: [rt]cmd =0x49444550, len=8
32,997,892 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,781,527 ready_for_fw is high
3,781,929 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,827,023 >>> mbox cmd response: success
23,520,410 UART:
23,520,828 UART: Running Caliptra FMC ...
23,521,926 UART:
23,522,080 UART: [state] CFI Enabled
23,590,688 UART: [fht] FMC Alias Private Key: 7
25,927,870 UART: [art] Extend RT PCRs Done
25,929,547 UART: [art] Lock RT PCRs Done
25,930,632 UART: [art] Populate DV Done
25,935,884 UART: [fht] FMC Alias Private Key: 7
25,937,367 UART: [art] Derive CDI
25,938,124 UART: [art] Store in in slot 0x4
25,999,053 UART: [art] Derive Key Pair
26,000,049 UART: [art] Store priv key in slot 0x5
29,293,482 UART: [art] Derive Key Pair - Done
29,306,438 UART: [art] Signing Cert with AUTHO
29,307,747 UART: RITY.KEYID = 7
31,594,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,596,157 UART: [art] PUB.X = 8FEE8D2E4D2519CD8D38A8AC10B122875ED8438065C3E7782AE45EAAC0F6170CC749449F02385CA50DCEEE6EFEE5F4BC
31,603,431 UART: [art] PUB.Y = 92752B51F00013478D1FEF087FF76E10FB14703D2F864BE06E1F28C76959EF745D8BE59D52941E8BF3AC1036ABB3C3C2
31,610,683 UART: [art] SIG.R = 81978CB1B99F84D99923C0D36F36B706C4FB16E45A891892319946B911F88F68758FAAE13CF5CADE408E23CFA3BA6223
31,618,057 UART: [art] SIG.S = 19E102FF52DE99A2DED096D36186AD2C8C1BA613B0D3A54D758A798F92DBBF7D3114B3A57622641E8815AD31A125C926
32,922,939 UART: Caliptra RT
32,923,655 UART: [state] CFI Enabled
33,084,591 UART: [rt] RT listening for mailbox commands...
33,086,990 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,116,901 UART: [rt]cmd =0x49444550, len=8
33,119,333 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,500 UART:
192,876 UART: Running Caliptra ROM ...
193,996 UART:
603,853 UART: [state] CFI Enabled
615,022 UART: [state] LifecycleState = Unprovisioned
616,963 UART: [state] DebugLocked = No
618,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,055 UART: [kat] SHA2-256
792,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,363 UART: [kat] ++
803,827 UART: [kat] sha1
814,627 UART: [kat] SHA2-256
817,283 UART: [kat] SHA2-384
822,418 UART: [kat] SHA2-512-ACC
824,789 UART: [kat] ECC-384
3,110,529 UART: [kat] HMAC-384Kdf
3,122,336 UART: [kat] LMS
4,312,404 UART: [kat] --
4,319,039 UART: [cold-reset] ++
4,319,978 UART: [fht] Storing FHT @ 0x50003400
4,332,379 UART: [idev] ++
4,333,009 UART: [idev] CDI.KEYID = 6
4,333,916 UART: [idev] SUBJECT.KEYID = 7
4,335,161 UART: [idev] UDS.KEYID = 0
4,336,140 ready_for_fw is high
4,336,338 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,604 UART: [idev] Erasing UDS.KEYID = 0
7,628,817 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,214 UART: [idev] --
7,655,506 UART: [ldev] ++
7,656,081 UART: [ldev] CDI.KEYID = 6
7,657,103 UART: [ldev] SUBJECT.KEYID = 5
7,658,258 UART: [ldev] AUTHORITY.KEYID = 7
7,659,544 UART: [ldev] FE.KEYID = 1
7,670,410 UART: [ldev] Erasing FE.KEYID = 1
10,959,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,460 UART: [ldev] --
13,322,674 UART: [fwproc] Waiting for Commands...
13,324,897 UART: [fwproc] Received command 0x46574c44
13,327,077 UART: [fwproc] Received Image of size 114036 bytes
17,381,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,838,472 >>> mbox cmd response: success
17,841,970 UART: [afmc] ++
17,842,566 UART: [afmc] CDI.KEYID = 6
17,843,587 UART: [afmc] SUBJECT.KEYID = 7
17,844,748 UART: [afmc] AUTHORITY.KEYID = 5
21,157,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,404 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,672 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,015 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,880 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,315 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,861 UART: [afmc] --
23,525,055 UART: [cold-reset] --
23,529,511 UART: [state] Locking Datavault
23,535,942 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,698 UART: [state] Locking ICCM
23,538,823 UART: [exit] Launching FMC @ 0x40000130
23,547,213 UART:
23,547,449 UART: Running Caliptra FMC ...
23,548,549 UART:
23,548,709 UART: [state] CFI Enabled
23,556,575 UART: [fht] FMC Alias Private Key: 7
25,888,001 UART: [art] Extend RT PCRs Done
25,889,269 UART: [art] Lock RT PCRs Done
25,890,928 UART: [art] Populate DV Done
25,896,340 UART: [fht] FMC Alias Private Key: 7
25,897,990 UART: [art] Derive CDI
25,898,825 UART: [art] Store in in slot 0x4
25,941,793 UART: [art] Derive Key Pair
25,942,784 UART: [art] Store priv key in slot 0x5
29,185,518 UART: [art] Derive Key Pair - Done
29,198,349 UART: [art] Signing Cert with AUTHO
29,199,654 UART: RITY.KEYID = 7
31,479,180 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,680 UART: [art] PUB.X = 5E1CF0BEA224E97328360AA90F9E507381A95CA043770D3FE4C844D24C6611FC0560E58DCBC6E3432F2381612818F693
31,487,889 UART: [art] PUB.Y = 39836A1398A9F3F26F54B42C3E1C374553B0792C633C8EC9B71027B1C5FB3DF16131E25EBF434E30283A294894814942
31,495,137 UART: [art] SIG.R = 767850686E87D3FEE96802D105192FB14B1F300C339AC31DAA51C873AD7C662B86FA911E740A6119A53890DD6E53FB6D
31,502,488 UART: [art] SIG.S = A1BC1E29D0690DED0A1999117957BEF38AAB2D80F534BC33B43CCE6CD3A2064AB8E8EB9E6EA7EDDC73457DAAA3BC9577
32,807,932 UART: Caliptra RT
32,808,632 UART: [state] CFI Enabled
32,924,737 UART: [rt] RT listening for mailbox commands...
32,927,015 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,956,879 UART: [rt]cmd =0x49444550, len=8
32,959,010 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,130,807 ready_for_fw is high
4,131,373 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,083,005 >>> mbox cmd response: success
23,718,627 UART:
23,719,041 UART: Running Caliptra FMC ...
23,720,182 UART:
23,720,340 UART: [state] CFI Enabled
23,728,390 UART: [fht] FMC Alias Private Key: 7
26,059,451 UART: [art] Extend RT PCRs Done
26,060,678 UART: [art] Lock RT PCRs Done
26,062,220 UART: [art] Populate DV Done
26,067,485 UART: [fht] FMC Alias Private Key: 7
26,069,146 UART: [art] Derive CDI
26,069,970 UART: [art] Store in in slot 0x4
26,112,349 UART: [art] Derive Key Pair
26,113,349 UART: [art] Store priv key in slot 0x5
29,355,113 UART: [art] Derive Key Pair - Done
29,368,050 UART: [art] Signing Cert with AUTHO
29,369,348 UART: RITY.KEYID = 7
31,648,928 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,432 UART: [art] PUB.X = 33B8D13CE8A53DA51924B87878051D30AE4E3316FA2BCF72BE12840859D2E0461C3171EDC74017ACADC3A6FB2A2A8C21
31,657,723 UART: [art] PUB.Y = 21CE8EA563A1333A5FC9C91A7D319C314E197E54339878B598FD306E254E60F76C1D712890836059016A6926297F6875
31,664,890 UART: [art] SIG.R = A5AF76196E671A9C2D7EFB35BCC874630E1503BE19CA88962ACE33A17ECBFD25A49DB819F4047246CE7C85F19AC96BF2
31,672,311 UART: [art] SIG.S = 0039B6AE8074AE5EC519FE05474E46A656ED2D3021B5FF39FC6F5F93701AB01E23AA79149267FC5604FA99DB5C934440
32,977,227 UART: Caliptra RT
32,977,948 UART: [state] CFI Enabled
33,095,342 UART: [rt] RT listening for mailbox commands...
33,097,873 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,127,669 UART: [rt]cmd =0x49444550, len=8
33,129,949 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
192,612 UART:
192,989 UART: Running Caliptra ROM ...
194,130 UART:
194,280 UART: [state] CFI Enabled
267,225 UART: [state] LifecycleState = Unprovisioned
269,144 UART: [state] DebugLocked = No
271,602 UART: [state] WD Timer not started. Device not locked for debugging
276,206 UART: [kat] SHA2-256
455,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,938 UART: [kat] ++
467,383 UART: [kat] sha1
478,751 UART: [kat] SHA2-256
481,825 UART: [kat] SHA2-384
488,545 UART: [kat] SHA2-512-ACC
491,488 UART: [kat] ECC-384
2,946,064 UART: [kat] HMAC-384Kdf
2,970,875 UART: [kat] LMS
3,500,288 UART: [kat] --
3,504,565 UART: [cold-reset] ++
3,506,282 UART: [fht] FHT @ 0x50003400
3,517,344 UART: [idev] ++
3,517,910 UART: [idev] CDI.KEYID = 6
3,518,794 UART: [idev] SUBJECT.KEYID = 7
3,520,033 UART: [idev] UDS.KEYID = 0
3,520,965 ready_for_fw is high
3,521,157 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,995 UART: [idev] Erasing UDS.KEYID = 0
6,021,678 UART: [idev] Sha1 KeyId Algorithm
6,043,932 UART: [idev] --
6,047,241 UART: [ldev] ++
6,048,012 UART: [ldev] CDI.KEYID = 6
6,048,941 UART: [ldev] SUBJECT.KEYID = 5
6,050,052 UART: [ldev] AUTHORITY.KEYID = 7
6,051,238 UART: [ldev] FE.KEYID = 1
6,097,205 UART: [ldev] Erasing FE.KEYID = 1
8,603,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,243 UART: [ldev] --
10,412,077 UART: [fwproc] Wait for Commands...
10,414,446 UART: [fwproc] Recv command 0x46574c44
10,416,538 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,751 >>> mbox cmd response: success
14,287,540 UART: [afmc] ++
14,288,319 UART: [afmc] CDI.KEYID = 6
14,289,233 UART: [afmc] SUBJECT.KEYID = 7
14,290,339 UART: [afmc] AUTHORITY.KEYID = 5
16,826,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,290 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,087 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,598 UART: [afmc] --
18,623,604 UART: [cold-reset] --
18,627,513 UART: [state] Locking Datavault
18,633,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,032 UART: [state] Locking ICCM
18,637,617 UART: [exit] Launching FMC @ 0x40000130
18,646,015 UART:
18,646,265 UART: Running Caliptra FMC ...
18,647,317 UART:
18,647,466 UART: [state] CFI Enabled
18,706,054 UART: [fht] FMC Alias Private Key: 7
20,469,677 UART: [art] Extend RT PCRs Done
20,470,890 UART: [art] Lock RT PCRs Done
20,472,697 UART: [art] Populate DV Done
20,478,261 UART: [fht] FMC Alias Private Key: 7
20,479,793 UART: [art] Derive CDI
20,480,526 UART: [art] Store in in slot 0x4
20,539,070 UART: [art] Derive Key Pair
20,540,114 UART: [art] Store priv key in slot 0x5
23,002,570 UART: [art] Derive Key Pair - Done
23,015,472 UART: [art] Signing Cert with AUTHO
23,016,814 UART: RITY.KEYID = 7
24,728,817 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,299 UART: [art] PUB.X = D5E1D9E1E2740D140E53E9A43FB39F9EFA9865B4D89641728091AE57B1F8B79B13B08DEDC5DF899686EFF085D063250B
24,737,572 UART: [art] PUB.Y = 5AA1DF7619353555FB666DA8E3851089E3C95B6E5344BB587311C05EC6E2ADD0EAD46EABD4A87FD1F981AAC19A19C373
24,744,824 UART: [art] SIG.R = 51BD00013AE9888701FB3B297C05356AA3A483BE44B936C4C37738C0A198243C9D01F2DC27BCB54F5B2235BC98476E39
24,752,194 UART: [art] SIG.S = D4094FD17E15303DD054B52E488B990A55049D1EFA780FAE3F30E69B1598BE3A45C11D29EFA954965868843380998020
25,731,168 UART: Caliptra RT
25,731,879 UART: [state] CFI Enabled
25,897,005 UART: [rt] RT listening for mailbox commands...
25,899,226 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,929,113 UART: [rt]cmd =0x49444550, len=8
25,931,337 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
192,530 UART:
192,907 UART: Running Caliptra ROM ...
194,103 UART:
194,260 UART: [state] CFI Enabled
263,924 UART: [state] LifecycleState = Unprovisioned
266,288 UART: [state] DebugLocked = No
269,235 UART: [state] WD Timer not started. Device not locked for debugging
273,154 UART: [kat] SHA2-256
463,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,824 UART: [kat] ++
474,308 UART: [kat] sha1
486,956 UART: [kat] SHA2-256
489,967 UART: [kat] SHA2-384
496,880 UART: [kat] SHA2-512-ACC
499,458 UART: [kat] ECC-384
2,946,955 UART: [kat] HMAC-384Kdf
2,972,903 UART: [kat] LMS
3,504,716 UART: [kat] --
3,509,804 UART: [cold-reset] ++
3,511,813 UART: [fht] FHT @ 0x50003400
3,522,313 UART: [idev] ++
3,523,021 UART: [idev] CDI.KEYID = 6
3,523,934 UART: [idev] SUBJECT.KEYID = 7
3,525,181 UART: [idev] UDS.KEYID = 0
3,526,111 ready_for_fw is high
3,526,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,171 UART: [idev] Erasing UDS.KEYID = 0
6,028,801 UART: [idev] Sha1 KeyId Algorithm
6,050,548 UART: [idev] --
6,055,152 UART: [ldev] ++
6,055,840 UART: [ldev] CDI.KEYID = 6
6,056,756 UART: [ldev] SUBJECT.KEYID = 5
6,057,919 UART: [ldev] AUTHORITY.KEYID = 7
6,059,154 UART: [ldev] FE.KEYID = 1
6,099,994 UART: [ldev] Erasing FE.KEYID = 1
8,605,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,966 UART: [ldev] --
10,414,280 UART: [fwproc] Wait for Commands...
10,416,534 UART: [fwproc] Recv command 0x46574c44
10,418,785 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,606,205 >>> mbox cmd response: success
14,609,833 UART: [afmc] ++
14,610,543 UART: [afmc] CDI.KEYID = 6
14,611,789 UART: [afmc] SUBJECT.KEYID = 7
14,613,229 UART: [afmc] AUTHORITY.KEYID = 5
17,150,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,963 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,181 UART: [afmc] --
18,946,972 UART: [cold-reset] --
18,950,031 UART: [state] Locking Datavault
18,955,729 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,879 UART: [state] Locking ICCM
18,960,307 UART: [exit] Launching FMC @ 0x40000130
18,968,941 UART:
18,969,183 UART: Running Caliptra FMC ...
18,970,283 UART:
18,970,447 UART: [state] CFI Enabled
19,030,883 UART: [fht] FMC Alias Private Key: 7
20,794,843 UART: [art] Extend RT PCRs Done
20,796,062 UART: [art] Lock RT PCRs Done
20,797,963 UART: [art] Populate DV Done
20,803,481 UART: [fht] FMC Alias Private Key: 7
20,805,021 UART: [art] Derive CDI
20,805,848 UART: [art] Store in in slot 0x4
20,863,651 UART: [art] Derive Key Pair
20,864,686 UART: [art] Store priv key in slot 0x5
23,327,624 UART: [art] Derive Key Pair - Done
23,340,561 UART: [art] Signing Cert with AUTHO
23,341,858 UART: RITY.KEYID = 7
25,053,731 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,246 UART: [art] PUB.X = 58DFE85C681A835316D921B83947495957D0CF990F5963DE2A3355246CFA09D8DF1435432C95C85F5016AF046BC054A4
25,062,474 UART: [art] PUB.Y = B537ABA35AA1D182F29DFEFD923017B03DA88A4F70180ACDFDFDA2BF50C2FD614C2ECC3CDBCBC59EC2F16C48FB079FE3
25,069,937 UART: [art] SIG.R = 265ADCF500F0BDABF22CFCD9FE6036E46E71516ADFB592CE030E1303F6C2D13746D0888175EB987D57723074BFB905B4
25,077,231 UART: [art] SIG.S = DCBA23BD690DEDE5F54254FC643FF0D62F290B945B105DD22A2F88247555DB5DFE06617D3C7543FEB0924DB9D6448024
26,056,089 UART: Caliptra RT
26,056,792 UART: [state] CFI Enabled
26,222,651 UART: [rt] RT listening for mailbox commands...
26,224,988 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,254,884 UART: [rt]cmd =0x49444550, len=8
26,257,273 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
3,437,319 ready_for_fw is high
3,437,715 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,728,866 >>> mbox cmd response: success
19,029,769 UART:
19,030,169 UART: Running Caliptra FMC ...
19,031,335 UART:
19,031,498 UART: [state] CFI Enabled
19,094,603 UART: [fht] FMC Alias Private Key: 7
20,858,963 UART: [art] Extend RT PCRs Done
20,860,184 UART: [art] Lock RT PCRs Done
20,861,863 UART: [art] Populate DV Done
20,867,172 UART: [fht] FMC Alias Private Key: 7
20,868,665 UART: [art] Derive CDI
20,869,430 UART: [art] Store in in slot 0x4
20,927,775 UART: [art] Derive Key Pair
20,928,815 UART: [art] Store priv key in slot 0x5
23,391,821 UART: [art] Derive Key Pair - Done
23,404,989 UART: [art] Signing Cert with AUTHO
23,406,295 UART: RITY.KEYID = 7
25,118,286 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,795 UART: [art] PUB.X = 52F8DDFE75E12BAC18C76CB1D2D9A59B3819140052DD2E17B901A6E16780AD52A85DE768C9595A8329D3D0722A8E9033
25,127,043 UART: [art] PUB.Y = 28BF0BF0E3091C1D4399C42A4F6C0A00453326F3DBAA491AA93BF642F90169DBC420E15116F40181F47B6D86F6DE1E23
25,134,289 UART: [art] SIG.R = DDD4DA18669F0C5FA383DEA7D1B12D7ED0D22A282134000D9F5DBD70F2CD16FEE2B6FAEB9A9B6AC9A6244D0A32D76A16
25,141,670 UART: [art] SIG.S = FF1BD23D3B8D76E426C0186B9CA72F3B48555A285F3A3A3444B90485C4F410C3BEBC71372DBD17E531A81EE0544FAB8C
26,121,124 UART: Caliptra RT
26,121,848 UART: [state] CFI Enabled
26,286,970 UART: [rt] RT listening for mailbox commands...
26,289,316 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,319,226 UART: [rt]cmd =0x49444550, len=8
26,321,525 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,073 writing to cptra_bootfsm_go
194,392 UART:
194,753 UART: Running Caliptra ROM ...
195,948 UART:
605,483 UART: [state] CFI Enabled
620,490 UART: [state] LifecycleState = Unprovisioned
622,857 UART: [state] DebugLocked = No
625,591 UART: [state] WD Timer not started. Device not locked for debugging
629,827 UART: [kat] SHA2-256
819,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,482 UART: [kat] ++
831,081 UART: [kat] sha1
843,814 UART: [kat] SHA2-256
846,812 UART: [kat] SHA2-384
854,146 UART: [kat] SHA2-512-ACC
856,723 UART: [kat] ECC-384
3,299,509 UART: [kat] HMAC-384Kdf
3,311,827 UART: [kat] LMS
3,843,692 UART: [kat] --
3,847,769 UART: [cold-reset] ++
3,848,918 UART: [fht] FHT @ 0x50003400
3,860,298 UART: [idev] ++
3,860,932 UART: [idev] CDI.KEYID = 6
3,861,887 UART: [idev] SUBJECT.KEYID = 7
3,863,130 UART: [idev] UDS.KEYID = 0
3,864,407 ready_for_fw is high
3,864,612 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,324 UART: [idev] Erasing UDS.KEYID = 0
6,340,955 UART: [idev] Sha1 KeyId Algorithm
6,364,071 UART: [idev] --
6,368,602 UART: [ldev] ++
6,369,330 UART: [ldev] CDI.KEYID = 6
6,370,209 UART: [ldev] SUBJECT.KEYID = 5
6,371,415 UART: [ldev] AUTHORITY.KEYID = 7
6,372,643 UART: [ldev] FE.KEYID = 1
6,383,020 UART: [ldev] Erasing FE.KEYID = 1
8,859,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,177 UART: [ldev] --
10,648,756 UART: [fwproc] Wait for Commands...
10,650,367 UART: [fwproc] Recv command 0x46574c44
10,652,618 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,848,174 >>> mbox cmd response: success
14,851,371 UART: [afmc] ++
14,852,075 UART: [afmc] CDI.KEYID = 6
14,853,239 UART: [afmc] SUBJECT.KEYID = 7
14,854,770 UART: [afmc] AUTHORITY.KEYID = 5
17,355,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,929 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,986 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,431 UART: [afmc] --
19,153,669 UART: [cold-reset] --
19,158,552 UART: [state] Locking Datavault
19,162,019 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,151 UART: [state] Locking ICCM
19,166,624 UART: [exit] Launching FMC @ 0x40000130
19,175,288 UART:
19,175,520 UART: Running Caliptra FMC ...
19,176,621 UART:
19,176,780 UART: [state] CFI Enabled
19,184,889 UART: [fht] FMC Alias Private Key: 7
20,942,268 UART: [art] Extend RT PCRs Done
20,943,497 UART: [art] Lock RT PCRs Done
20,945,259 UART: [art] Populate DV Done
20,950,849 UART: [fht] FMC Alias Private Key: 7
20,952,438 UART: [art] Derive CDI
20,953,167 UART: [art] Store in in slot 0x4
20,995,651 UART: [art] Derive Key Pair
20,996,688 UART: [art] Store priv key in slot 0x5
23,423,821 UART: [art] Derive Key Pair - Done
23,436,704 UART: [art] Signing Cert with AUTHO
23,438,008 UART: RITY.KEYID = 7
25,143,534 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,038 UART: [art] PUB.X = 910D233CC2A5031D839FFBA497DC6DCC60E09167A380DDF9C274B2F072AA8E4EF42A74F643E1AB4259345CBAD822EC10
25,152,343 UART: [art] PUB.Y = 187A325767E66806460378733004B02A3CEC5633419E9E843029479227EFBFD5ED5C03AE4CE39F8F0BC5B2704337FCB6
25,159,584 UART: [art] SIG.R = 4C9F0A228E8255447C26D4F749C06CDB5543A9ACA716E13C012D644909936D37242402987946906217FB8A33CFC2C409
25,166,920 UART: [art] SIG.S = 6DFD8B69405ADC8E9E1908C42579259899CC004B421222EB5AC6E2AE9A99076D082C4189A7E18186E7AB662C8C2FE102
26,145,991 UART: Caliptra RT
26,146,701 UART: [state] CFI Enabled
26,263,941 UART: [rt] RT listening for mailbox commands...
26,266,302 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,296,092 UART: [rt]cmd =0x49444550, len=8
26,298,476 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,755,165 ready_for_fw is high
3,755,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,945,261 >>> mbox cmd response: success
19,195,997 UART:
19,196,373 UART: Running Caliptra FMC ...
19,197,528 UART:
19,197,686 UART: [state] CFI Enabled
19,205,422 UART: [fht] FMC Alias Private Key: 7
20,962,004 UART: [art] Extend RT PCRs Done
20,963,221 UART: [art] Lock RT PCRs Done
20,965,033 UART: [art] Populate DV Done
20,970,332 UART: [fht] FMC Alias Private Key: 7
20,971,870 UART: [art] Derive CDI
20,972,684 UART: [art] Store in in slot 0x4
21,015,336 UART: [art] Derive Key Pair
21,016,328 UART: [art] Store priv key in slot 0x5
23,442,608 UART: [art] Derive Key Pair - Done
23,455,394 UART: [art] Signing Cert with AUTHO
23,456,704 UART: RITY.KEYID = 7
25,162,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,010 UART: [art] PUB.X = 49DDFB7273DE42C3311461414B137F2ACFE6A9B32C25F476BF28D32B1DB083EBA856D5A4C4AD2131B0DDC32F438C0534
25,171,299 UART: [art] PUB.Y = 384A28ACE8282442C4ACEA51D873267A62F39CFA9E57824917917F230E6AA6F7F3FC9E4526E8CC0951C370D8080AAD91
25,178,564 UART: [art] SIG.R = 1565D118ED7355736F69311D5362C5891264EB94D94F8A8CD9A38AF1BA44D922FCBCA78F08286E8AB022B8F7C45DCC80
25,185,967 UART: [art] SIG.S = 015365AD9D94D9D43F289663B994843DAD6AE0B3B47655E3C63EE80D54652A9F0E0FF1F5243287EDA413D04311C6FB0A
26,164,797 UART: Caliptra RT
26,165,505 UART: [state] CFI Enabled
26,282,892 UART: [rt] RT listening for mailbox commands...
26,285,266 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,315,124 UART: [rt]cmd =0x49444550, len=8
26,317,428 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,171 UART: [kat] SHA2-256
882,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,217 UART: [kat] ++
886,369 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,376 UART: [kat] SHA2-512-ACC
897,277 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,330 UART: [kat] LMS
1,475,526 UART: [kat] --
1,476,773 UART: [cold-reset] ++
1,477,163 UART: [fht] Storing FHT @ 0x50003400
1,479,946 UART: [idev] ++
1,480,114 UART: [idev] CDI.KEYID = 6
1,480,474 UART: [idev] SUBJECT.KEYID = 7
1,480,898 UART: [idev] UDS.KEYID = 0
1,481,243 ready_for_fw is high
1,481,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,022 UART: [idev] Erasing UDS.KEYID = 0
1,505,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,258 UART: [idev] --
1,515,419 UART: [ldev] ++
1,515,587 UART: [ldev] CDI.KEYID = 6
1,515,950 UART: [ldev] SUBJECT.KEYID = 5
1,516,376 UART: [ldev] AUTHORITY.KEYID = 7
1,516,839 UART: [ldev] FE.KEYID = 1
1,522,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,690 UART: [ldev] --
1,585,983 UART: [fwproc] Waiting for Commands...
1,586,794 UART: [fwproc] Received command 0x46574c44
1,587,585 UART: [fwproc] Received Image of size 114360 bytes
2,885,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,396 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,563 >>> mbox cmd response: success
3,078,733 UART: [afmc] ++
3,078,901 UART: [afmc] CDI.KEYID = 6
3,079,263 UART: [afmc] SUBJECT.KEYID = 7
3,079,688 UART: [afmc] AUTHORITY.KEYID = 5
3,115,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,260 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,950 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,981 UART: [afmc] --
3,158,867 UART: [cold-reset] --
3,159,703 UART: [state] Locking Datavault
3,161,004 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,608 UART: [state] Locking ICCM
3,162,100 UART: [exit] Launching FMC @ 0x40000130
3,167,429 UART:
3,167,445 UART: Running Caliptra FMC ...
3,167,853 UART:
3,167,907 UART: [state] CFI Enabled
3,178,318 UART: [fht] FMC Alias Private Key: 7
3,286,411 UART: [art] Extend RT PCRs Done
3,286,839 UART: [art] Lock RT PCRs Done
3,288,227 UART: [art] Populate DV Done
3,296,454 UART: [fht] FMC Alias Private Key: 7
3,297,604 UART: [art] Derive CDI
3,297,884 UART: [art] Store in in slot 0x4
3,383,563 UART: [art] Derive Key Pair
3,383,923 UART: [art] Store priv key in slot 0x5
3,397,001 UART: [art] Derive Key Pair - Done
3,411,656 UART: [art] Signing Cert with AUTHO
3,412,136 UART: RITY.KEYID = 7
3,427,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,785 UART: [art] PUB.X = AEC11DC2AAE0BA77137F2D281E4F9F7ADE9EAB3A822BFA795DD29A6FFB61FC3DEA0AAC6D114ACF75DA80E088028D73EB
3,434,585 UART: [art] PUB.Y = 2D50EDDCEA6989C3AA63C59138DE5426B96BDB3361EC4C7F4CCBBB63088812C8ABB72FF3200A00FA0269342D761A208F
3,441,518 UART: [art] SIG.R = 0386160B8F0AD41AA32C245335DA1118A0FA84BFEDB6C71FB37DBB03A00DD6508B01C456F1140F459645FDEDDE540BE2
3,448,278 UART: [art] SIG.S = 71084A622EB857D92B93F7E97DF7ACAE6C9E797809559DD91810012C8BF008B3174852A2A03920D054B434FD7EB94DA0
3,471,927 UART: Caliptra RT
3,472,181 UART: [state] CFI Enabled
3,580,050 UART: [rt] RT listening for mailbox commands...
3,580,720 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,173 UART: [rt]cmd =0x49444550, len=8
3,612,272 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,157 ready_for_fw is high
1,363,157 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,677 >>> mbox cmd response: success
2,991,069 UART:
2,991,085 UART: Running Caliptra FMC ...
2,991,493 UART:
2,991,547 UART: [state] CFI Enabled
3,001,848 UART: [fht] FMC Alias Private Key: 7
3,109,695 UART: [art] Extend RT PCRs Done
3,110,123 UART: [art] Lock RT PCRs Done
3,111,369 UART: [art] Populate DV Done
3,119,782 UART: [fht] FMC Alias Private Key: 7
3,120,948 UART: [art] Derive CDI
3,121,228 UART: [art] Store in in slot 0x4
3,207,357 UART: [art] Derive Key Pair
3,207,717 UART: [art] Store priv key in slot 0x5
3,220,841 UART: [art] Derive Key Pair - Done
3,235,972 UART: [art] Signing Cert with AUTHO
3,236,452 UART: RITY.KEYID = 7
3,251,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,315 UART: [art] PUB.X = 9C622F5D687F86C39C69B8152018768C547D35AEB97E27F38DB3E39A8264ADE8E0543614F1D241A0B5C55A7C124A2947
3,259,083 UART: [art] PUB.Y = 2B5C90451C06E88C6353A1201B2E58901BC19E6D1719B71364DC75AFB1E7CF806B3323420C07347B712663F0DD794ED6
3,266,020 UART: [art] SIG.R = 4EBDD1972D7AEDB3C5A3D806291B71A58F946E7080F5781CC0E75A1D80F5905ED98B43462C51A09DF6BDC67FC1FD7BE3
3,272,803 UART: [art] SIG.S = 34C8CAD1591865AE33F7E147551A150444C3846764EBA2A20D104E76A1CB21B7DEAA0FF118E042BD5E306DCE54CA7905
3,296,550 UART: Caliptra RT
3,296,804 UART: [state] CFI Enabled
3,406,189 UART: [rt] RT listening for mailbox commands...
3,406,859 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,202 UART: [rt]cmd =0x49444550, len=8
3,438,165 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,727 UART: [kat] SHA2-512-ACC
897,628 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,799 UART: [kat] LMS
1,475,995 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,480,115 UART: [idev] ++
1,480,283 UART: [idev] CDI.KEYID = 6
1,480,643 UART: [idev] SUBJECT.KEYID = 7
1,481,067 UART: [idev] UDS.KEYID = 0
1,481,412 ready_for_fw is high
1,481,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,525 UART: [idev] --
1,515,660 UART: [ldev] ++
1,515,828 UART: [ldev] CDI.KEYID = 6
1,516,191 UART: [ldev] SUBJECT.KEYID = 5
1,516,617 UART: [ldev] AUTHORITY.KEYID = 7
1,517,080 UART: [ldev] FE.KEYID = 1
1,522,378 UART: [ldev] Erasing FE.KEYID = 1
1,547,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,889 UART: [ldev] --
1,586,272 UART: [fwproc] Waiting for Commands...
1,587,125 UART: [fwproc] Received command 0x46574c44
1,587,916 UART: [fwproc] Received Image of size 114360 bytes
2,885,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,964 >>> mbox cmd response: success
3,080,180 UART: [afmc] ++
3,080,348 UART: [afmc] CDI.KEYID = 6
3,080,710 UART: [afmc] SUBJECT.KEYID = 7
3,081,135 UART: [afmc] AUTHORITY.KEYID = 5
3,116,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,237 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,927 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,758 UART: [afmc] --
3,159,690 UART: [cold-reset] --
3,160,544 UART: [state] Locking Datavault
3,161,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,285 UART: [state] Locking ICCM
3,162,881 UART: [exit] Launching FMC @ 0x40000130
3,168,210 UART:
3,168,226 UART: Running Caliptra FMC ...
3,168,634 UART:
3,168,777 UART: [state] CFI Enabled
3,179,452 UART: [fht] FMC Alias Private Key: 7
3,287,435 UART: [art] Extend RT PCRs Done
3,287,863 UART: [art] Lock RT PCRs Done
3,289,651 UART: [art] Populate DV Done
3,297,896 UART: [fht] FMC Alias Private Key: 7
3,298,934 UART: [art] Derive CDI
3,299,214 UART: [art] Store in in slot 0x4
3,384,963 UART: [art] Derive Key Pair
3,385,323 UART: [art] Store priv key in slot 0x5
3,398,695 UART: [art] Derive Key Pair - Done
3,413,679 UART: [art] Signing Cert with AUTHO
3,414,159 UART: RITY.KEYID = 7
3,429,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,870 UART: [art] PUB.X = 867B1AF74CBB4B05035EE65C2223BB1453997C16D190C6A336D4DC2AA0B2F068E6953CBBA6D235E6B70F890B202D95E4
3,436,636 UART: [art] PUB.Y = 8CDA39D2F3FF8A73AA8D9FD5E2847C83BE72921023F111710376CC6E54C99AED519D065E3195D0276E288A94562EE683
3,443,582 UART: [art] SIG.R = 2933AC06B9298B09D2E47B6676F4AAF4A8576FD93DFA9CB19D11E7A7B95A29CD1B63FC965FE8937DDA58E7D866CB832F
3,450,362 UART: [art] SIG.S = F7BE8D36129A9D255E863091B67809AEEBD028AD5E3AC918FB22CB86366F383B0FFAF039F57FC24D468284B103A7D81C
3,474,002 UART: Caliptra RT
3,474,348 UART: [state] CFI Enabled
3,582,574 UART: [rt] RT listening for mailbox commands...
3,583,244 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,871 UART: [rt]cmd =0x49444550, len=8
3,614,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,128 ready_for_fw is high
1,362,128 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,676 >>> mbox cmd response: success
2,991,150 UART:
2,991,166 UART: Running Caliptra FMC ...
2,991,574 UART:
2,991,717 UART: [state] CFI Enabled
3,002,448 UART: [fht] FMC Alias Private Key: 7
3,110,079 UART: [art] Extend RT PCRs Done
3,110,507 UART: [art] Lock RT PCRs Done
3,112,509 UART: [art] Populate DV Done
3,120,702 UART: [fht] FMC Alias Private Key: 7
3,121,808 UART: [art] Derive CDI
3,122,088 UART: [art] Store in in slot 0x4
3,207,667 UART: [art] Derive Key Pair
3,208,027 UART: [art] Store priv key in slot 0x5
3,221,501 UART: [art] Derive Key Pair - Done
3,236,210 UART: [art] Signing Cert with AUTHO
3,236,690 UART: RITY.KEYID = 7
3,252,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,989 UART: [art] PUB.X = 7D499CD276E0BF68F4B4BAFD98898FBBD3626D2214946974A48192583AAAAAEDD3F03CDD1F9384614381195089881EA8
3,259,763 UART: [art] PUB.Y = E7D9B855562E820E5B39A93ABE3B5E2D0CD3EEAD653ABDC80F454EE56899EC9F90A6E35D14FE14D05C5594EAFCCEC7A1
3,266,730 UART: [art] SIG.R = E12E3AF3DDEAAA718A812A279BC3BD2BE5A26C71F76278A43FB1642C47B06190E6ADE6CC3BF101E3A922DB2B3DC086C4
3,273,519 UART: [art] SIG.S = 180B15AC6FA49157A2F7D2136E8F4579D607E45B06BBDCC723BB732923ED58E028416B15FFBAA2420FFD39818D80D459
3,297,628 UART: Caliptra RT
3,297,974 UART: [state] CFI Enabled
3,407,052 UART: [rt] RT listening for mailbox commands...
3,407,722 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,341 UART: [rt]cmd =0x49444550, len=8
3,439,262 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,290 UART: [kat] SHA2-256
892,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,065 UART: [kat] ++
897,217 UART: [kat] sha1
901,515 UART: [kat] SHA2-256
903,455 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,386 UART: [kat] LMS
1,170,714 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,337 UART: [fht] FHT @ 0x50003400
1,174,942 UART: [idev] ++
1,175,110 UART: [idev] CDI.KEYID = 6
1,175,470 UART: [idev] SUBJECT.KEYID = 7
1,175,894 UART: [idev] UDS.KEYID = 0
1,176,239 ready_for_fw is high
1,176,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,212 UART: [idev] Erasing UDS.KEYID = 0
1,201,573 UART: [idev] Sha1 KeyId Algorithm
1,210,105 UART: [idev] --
1,211,311 UART: [ldev] ++
1,211,479 UART: [ldev] CDI.KEYID = 6
1,211,842 UART: [ldev] SUBJECT.KEYID = 5
1,212,268 UART: [ldev] AUTHORITY.KEYID = 7
1,212,731 UART: [ldev] FE.KEYID = 1
1,217,833 UART: [ldev] Erasing FE.KEYID = 1
1,244,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,953 UART: [ldev] --
1,283,244 UART: [fwproc] Wait for Commands...
1,283,966 UART: [fwproc] Recv command 0x46574c44
1,284,694 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,454 >>> mbox cmd response: success
2,776,518 UART: [afmc] ++
2,776,686 UART: [afmc] CDI.KEYID = 6
2,777,048 UART: [afmc] SUBJECT.KEYID = 7
2,777,473 UART: [afmc] AUTHORITY.KEYID = 5
2,814,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,932 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,651 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,437 UART: [afmc] --
2,857,499 UART: [cold-reset] --
2,858,329 UART: [state] Locking Datavault
2,859,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,952 UART: [state] Locking ICCM
2,860,526 UART: [exit] Launching FMC @ 0x40000130
2,865,855 UART:
2,865,871 UART: Running Caliptra FMC ...
2,866,279 UART:
2,866,333 UART: [state] CFI Enabled
2,876,900 UART: [fht] FMC Alias Private Key: 7
2,984,561 UART: [art] Extend RT PCRs Done
2,984,989 UART: [art] Lock RT PCRs Done
2,986,567 UART: [art] Populate DV Done
2,994,816 UART: [fht] FMC Alias Private Key: 7
2,995,872 UART: [art] Derive CDI
2,996,152 UART: [art] Store in in slot 0x4
3,081,871 UART: [art] Derive Key Pair
3,082,231 UART: [art] Store priv key in slot 0x5
3,095,775 UART: [art] Derive Key Pair - Done
3,110,737 UART: [art] Signing Cert with AUTHO
3,111,217 UART: RITY.KEYID = 7
3,126,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,604 UART: [art] PUB.X = 97885B677B8CFA518B807F55BAC09A2257FC43B0EBD10AA5E71FDE4ED848CF881F547B96C7EAFF37C3807FB1A92FB113
3,134,389 UART: [art] PUB.Y = 2D8F24EE5ADF3D481907BA365335D129233D01B781C2484807340A09221ED9A3DA0F7E28B5680EE261271BE8B0DDEFCE
3,141,324 UART: [art] SIG.R = AB1CFB4E6A77C3B329235A862665E10D3FCE37EC48B38B7772707FC7B4CF0E92025B36CA023E19FBB840937CB7073BB2
3,148,089 UART: [art] SIG.S = 4677FF9C170A0B3C3CEA49E8C0BD7F7D72DC431D3D2B86406269682520B947F966E785C18715E8553497262F939D32D3
3,172,056 UART: Caliptra RT
3,172,310 UART: [state] CFI Enabled
3,279,260 UART: [rt] RT listening for mailbox commands...
3,279,930 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,505 UART: [rt]cmd =0x49444550, len=8
3,311,412 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,501 ready_for_fw is high
1,060,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,859 >>> mbox cmd response: success
2,689,021 UART:
2,689,037 UART: Running Caliptra FMC ...
2,689,445 UART:
2,689,499 UART: [state] CFI Enabled
2,700,268 UART: [fht] FMC Alias Private Key: 7
2,808,739 UART: [art] Extend RT PCRs Done
2,809,167 UART: [art] Lock RT PCRs Done
2,810,701 UART: [art] Populate DV Done
2,819,112 UART: [fht] FMC Alias Private Key: 7
2,820,182 UART: [art] Derive CDI
2,820,462 UART: [art] Store in in slot 0x4
2,906,195 UART: [art] Derive Key Pair
2,906,555 UART: [art] Store priv key in slot 0x5
2,919,095 UART: [art] Derive Key Pair - Done
2,933,802 UART: [art] Signing Cert with AUTHO
2,934,282 UART: RITY.KEYID = 7
2,949,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,637 UART: [art] PUB.X = 328A72C49CC77CEB6031EABE9A2472CE33EA434310393037444C2D13908D0528E6DF19C9FAFA6F974AC261D6257666F3
2,957,406 UART: [art] PUB.Y = 8A190253B7E69BAF30EEBDDF925EE1CC997B63C10A7E895B2A3B890442A31A5E58D7187FB20857517BEB81B73DFFAB4B
2,964,360 UART: [art] SIG.R = 5E9739694A2705D3805E7827AA27F4C3E2599B28F8403BB42B5334868B206E18E7B0AA3FD52AF5B42DD126D6BF4533AA
2,971,129 UART: [art] SIG.S = DB021FAEEC25DD5C09A92FFF30C0069C334AFB77A3003CAABFDCEE3D682C9877C616C5EBD50E40F13E301CED961D09FD
2,995,277 UART: Caliptra RT
2,995,531 UART: [state] CFI Enabled
3,103,091 UART: [rt] RT listening for mailbox commands...
3,103,761 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,238 UART: [rt]cmd =0x49444550, len=8
3,135,155 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,152 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
893,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,272 UART: [kat] ++
897,424 UART: [kat] sha1
901,740 UART: [kat] SHA2-256
903,680 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
918,141 UART: [kat] HMAC-384Kdf
922,807 UART: [kat] LMS
1,171,135 UART: [kat] --
1,171,944 UART: [cold-reset] ++
1,172,358 UART: [fht] FHT @ 0x50003400
1,175,063 UART: [idev] ++
1,175,231 UART: [idev] CDI.KEYID = 6
1,175,591 UART: [idev] SUBJECT.KEYID = 7
1,176,015 UART: [idev] UDS.KEYID = 0
1,176,360 ready_for_fw is high
1,176,360 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,045 UART: [idev] Erasing UDS.KEYID = 0
1,200,510 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,209,972 UART: [ldev] ++
1,210,140 UART: [ldev] CDI.KEYID = 6
1,210,503 UART: [ldev] SUBJECT.KEYID = 5
1,210,929 UART: [ldev] AUTHORITY.KEYID = 7
1,211,392 UART: [ldev] FE.KEYID = 1
1,216,606 UART: [ldev] Erasing FE.KEYID = 1
1,242,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,030 UART: [ldev] --
1,282,299 UART: [fwproc] Wait for Commands...
1,282,931 UART: [fwproc] Recv command 0x46574c44
1,283,659 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,511 >>> mbox cmd response: success
2,776,713 UART: [afmc] ++
2,776,881 UART: [afmc] CDI.KEYID = 6
2,777,243 UART: [afmc] SUBJECT.KEYID = 7
2,777,668 UART: [afmc] AUTHORITY.KEYID = 5
2,813,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,550 UART: [afmc] --
2,857,504 UART: [cold-reset] --
2,858,510 UART: [state] Locking Datavault
2,859,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,289 UART: [state] Locking ICCM
2,860,819 UART: [exit] Launching FMC @ 0x40000130
2,866,148 UART:
2,866,164 UART: Running Caliptra FMC ...
2,866,572 UART:
2,866,715 UART: [state] CFI Enabled
2,877,320 UART: [fht] FMC Alias Private Key: 7
2,985,701 UART: [art] Extend RT PCRs Done
2,986,129 UART: [art] Lock RT PCRs Done
2,987,783 UART: [art] Populate DV Done
2,996,370 UART: [fht] FMC Alias Private Key: 7
2,997,374 UART: [art] Derive CDI
2,997,654 UART: [art] Store in in slot 0x4
3,083,295 UART: [art] Derive Key Pair
3,083,655 UART: [art] Store priv key in slot 0x5
3,096,127 UART: [art] Derive Key Pair - Done
3,110,891 UART: [art] Signing Cert with AUTHO
3,111,371 UART: RITY.KEYID = 7
3,126,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,904 UART: [art] PUB.X = ADC9F790239B9296B92D7148015C407B95F4E7E0EB5B5F01079A6BF48CA55AF58C17E583E337AA8D67A493425FDC0229
3,133,666 UART: [art] PUB.Y = 76E3078DE3A325159A5A62B9C0289A1B39389AB7993F3FF950D2526E153CF7D082F4518F84CCFB6442DC03875ADAFD7B
3,140,616 UART: [art] SIG.R = F9D725159776CFEA8D12F76EB397092B18BF64B342D5502B26A67D7535CA5E080997A02D924495565496114E1E099486
3,147,362 UART: [art] SIG.S = 0E15CB1FFBD30EA9612C109BCD7911AAAAA31BE2C321728B47BC89E8D9DF3CF035B557AA0CCD75121654C933868C74D0
3,171,174 UART: Caliptra RT
3,171,520 UART: [state] CFI Enabled
3,278,798 UART: [rt] RT listening for mailbox commands...
3,279,468 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,849 UART: [rt]cmd =0x49444550, len=8
3,310,664 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,600 ready_for_fw is high
1,061,600 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,088 >>> mbox cmd response: success
2,689,648 UART:
2,689,664 UART: Running Caliptra FMC ...
2,690,072 UART:
2,690,215 UART: [state] CFI Enabled
2,700,808 UART: [fht] FMC Alias Private Key: 7
2,808,345 UART: [art] Extend RT PCRs Done
2,808,773 UART: [art] Lock RT PCRs Done
2,810,291 UART: [art] Populate DV Done
2,818,288 UART: [fht] FMC Alias Private Key: 7
2,819,236 UART: [art] Derive CDI
2,819,516 UART: [art] Store in in slot 0x4
2,905,015 UART: [art] Derive Key Pair
2,905,375 UART: [art] Store priv key in slot 0x5
2,918,453 UART: [art] Derive Key Pair - Done
2,933,381 UART: [art] Signing Cert with AUTHO
2,933,861 UART: RITY.KEYID = 7
2,949,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,322 UART: [art] PUB.X = 87D95D99219CD7E15761EDCD70A49C557C572DF8D2DFE1F1BA18089F05C68E189E889ED3743426C7C5A9C1220FBE046B
2,957,088 UART: [art] PUB.Y = F64C6899ED1EBF9E436A2BF62245525FB99DB8608CA25CAD0E6A18D0DAD657FA8E285D1BC15F8D541B5B74D271B4C184
2,964,051 UART: [art] SIG.R = DDBB1689E1C9D5AD4E94157F8B351E9C3C253AB1BA5C6651166CFD79FDADA62AB03DFA0EFBCBB893599857CAE868D732
2,970,842 UART: [art] SIG.S = 2DABFC41FB7EA2A9EAF850805CEC6F52966A33E6CE609784D8E5B7D9584E9FDF0E35C5F971DC9D0592FAC13E55C0F612
2,994,209 UART: Caliptra RT
2,994,555 UART: [state] CFI Enabled
3,102,373 UART: [rt] RT listening for mailbox commands...
3,103,043 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,828 UART: [rt]cmd =0x49444550, len=8
3,134,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,174,705 ready_for_fw is high
1,174,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,541 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,214,738 UART: [ldev] Erasing FE.KEYID = 1
1,240,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,232 UART: [ldev] --
1,279,604 UART: [fwproc] Wait for Commands...
1,280,215 UART: [fwproc] Recv command 0x46574c44
1,280,948 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,456 >>> mbox cmd response: success
2,771,537 UART: [afmc] ++
2,771,705 UART: [afmc] CDI.KEYID = 6
2,772,068 UART: [afmc] SUBJECT.KEYID = 7
2,772,494 UART: [afmc] AUTHORITY.KEYID = 5
2,808,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,196 UART: [afmc] --
2,851,226 UART: [cold-reset] --
2,852,066 UART: [state] Locking Datavault
2,853,309 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,913 UART: [state] Locking ICCM
2,854,435 UART: [exit] Launching FMC @ 0x40000130
2,859,764 UART:
2,859,780 UART: Running Caliptra FMC ...
2,860,188 UART:
2,860,242 UART: [state] CFI Enabled
2,870,959 UART: [fht] FMC Alias Private Key: 7
2,979,186 UART: [art] Extend RT PCRs Done
2,979,614 UART: [art] Lock RT PCRs Done
2,981,064 UART: [art] Populate DV Done
2,989,255 UART: [fht] FMC Alias Private Key: 7
2,990,299 UART: [art] Derive CDI
2,990,579 UART: [art] Store in in slot 0x4
3,075,946 UART: [art] Derive Key Pair
3,076,306 UART: [art] Store priv key in slot 0x5
3,089,900 UART: [art] Derive Key Pair - Done
3,104,213 UART: [art] Signing Cert with AUTHO
3,104,693 UART: RITY.KEYID = 7
3,119,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,548 UART: [art] PUB.X = 50964732D48CA3107474EE39962C9BE5A32D1672D1D73E32460D2CB0AE220E859342BDB8469D91567AF593A10BC8F1C9
3,127,307 UART: [art] PUB.Y = 80FC2400E61F4DDC7D4443501A169DDA110D528C6FCB18ED4A636ADA8BEF15CE783840B64D8EA978FFD4851A984BBEFA
3,134,252 UART: [art] SIG.R = 81DE65921876BC35E349B5E3DD3DE85F43840A6437DDBF4BCC85DDE64C81EAF1DEDE7B11A3ECB3F52B894C36610CE495
3,141,036 UART: [art] SIG.S = E3CC1B83EB2C4AC27A7A4E2CF6719EE5897C3CB9C1D6D40B39F3E97337CEE7A2718805940C08A9083A10B6C30DB8F1D7
3,164,671 UART: Caliptra RT
3,164,925 UART: [state] CFI Enabled
3,273,848 UART: [rt] RT listening for mailbox commands...
3,274,518 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,965 UART: [rt]cmd =0x49444550, len=8
3,305,754 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,998 ready_for_fw is high
1,055,998 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,846 >>> mbox cmd response: success
2,684,046 UART:
2,684,062 UART: Running Caliptra FMC ...
2,684,470 UART:
2,684,524 UART: [state] CFI Enabled
2,695,177 UART: [fht] FMC Alias Private Key: 7
2,803,274 UART: [art] Extend RT PCRs Done
2,803,702 UART: [art] Lock RT PCRs Done
2,805,268 UART: [art] Populate DV Done
2,813,545 UART: [fht] FMC Alias Private Key: 7
2,814,525 UART: [art] Derive CDI
2,814,805 UART: [art] Store in in slot 0x4
2,900,650 UART: [art] Derive Key Pair
2,901,010 UART: [art] Store priv key in slot 0x5
2,914,290 UART: [art] Derive Key Pair - Done
2,929,109 UART: [art] Signing Cert with AUTHO
2,929,589 UART: RITY.KEYID = 7
2,944,689 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,454 UART: [art] PUB.X = 9FF814FC351FBDD663662B2ACF908E98B627D31196A9D107BC5BC5200AF4306A2C046C87ED8B84CBD483E305DF2A8252
2,952,222 UART: [art] PUB.Y = D4ABCD33D6237E6AE19E556912375CFAF392ADB7A33EECB0ADC483F88C382AD52FFBFB70FC90ED3CA1CFB0FE003C0ED5
2,959,181 UART: [art] SIG.R = CDBA1B0D019D9DBB3C5EFB499EBB20C62F2EB852AC76C35ADE11AA651EB9D1F93A681264470700CB253C71623572CD60
2,965,936 UART: [art] SIG.S = 4DACB99F9C5066E1316EF494885083E5703181125B4689E72429904388F6E2C4C182892F7218492930DF5A71CFF024E7
2,989,865 UART: Caliptra RT
2,990,119 UART: [state] CFI Enabled
3,098,119 UART: [rt] RT listening for mailbox commands...
3,098,789 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,446 UART: [rt]cmd =0x49444550, len=8
3,130,357 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,348 UART: [kat] SHA2-256
902,288 UART: [kat] SHA2-384
905,067 UART: [kat] SHA2-512-ACC
906,968 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 ready_for_fw is high
1,174,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,626 UART: [idev] Erasing UDS.KEYID = 0
1,198,314 UART: [idev] Sha1 KeyId Algorithm
1,207,290 UART: [idev] --
1,208,347 UART: [ldev] ++
1,208,515 UART: [ldev] CDI.KEYID = 6
1,208,879 UART: [ldev] SUBJECT.KEYID = 5
1,209,306 UART: [ldev] AUTHORITY.KEYID = 7
1,209,769 UART: [ldev] FE.KEYID = 1
1,215,183 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,647 UART: [ldev] --
1,280,999 UART: [fwproc] Wait for Commands...
1,281,736 UART: [fwproc] Recv command 0x46574c44
1,282,469 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,787 >>> mbox cmd response: success
2,773,906 UART: [afmc] ++
2,774,074 UART: [afmc] CDI.KEYID = 6
2,774,437 UART: [afmc] SUBJECT.KEYID = 7
2,774,863 UART: [afmc] AUTHORITY.KEYID = 5
2,810,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,243 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,679 UART: [afmc] --
2,853,709 UART: [cold-reset] --
2,854,549 UART: [state] Locking Datavault
2,856,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,612 UART: [state] Locking ICCM
2,857,114 UART: [exit] Launching FMC @ 0x40000130
2,862,443 UART:
2,862,459 UART: Running Caliptra FMC ...
2,862,867 UART:
2,863,010 UART: [state] CFI Enabled
2,873,493 UART: [fht] FMC Alias Private Key: 7
2,981,120 UART: [art] Extend RT PCRs Done
2,981,548 UART: [art] Lock RT PCRs Done
2,983,216 UART: [art] Populate DV Done
2,991,379 UART: [fht] FMC Alias Private Key: 7
2,992,541 UART: [art] Derive CDI
2,992,821 UART: [art] Store in in slot 0x4
3,078,658 UART: [art] Derive Key Pair
3,079,018 UART: [art] Store priv key in slot 0x5
3,092,198 UART: [art] Derive Key Pair - Done
3,107,084 UART: [art] Signing Cert with AUTHO
3,107,564 UART: RITY.KEYID = 7
3,122,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,469 UART: [art] PUB.X = CA853C50E5CC2CA5F09166D2D88AA66CB118894F9A8005959E0B32B7B089BD184119CC9622B1C47D9A7241A6A1A61A39
3,130,237 UART: [art] PUB.Y = 75B6A9EF1A1EC039A65E393F55B1E91C7C0C44602021CB20322938387A7D7829A913FA186F7B23EED5D6A95B8AF45E15
3,137,188 UART: [art] SIG.R = 1483300E69CC0429E46E819A89523F554D76C1F656186B1853EC534D861A023A203096EDFAD87CE9C5DFC1ED63DEB255
3,143,951 UART: [art] SIG.S = 480B1BAC530907D870BF416E247783AF79A03DC5CDE311DFD2F469922792CAFD58A96763889E2826E5C7C6749DEC2377
3,168,471 UART: Caliptra RT
3,168,817 UART: [state] CFI Enabled
3,276,257 UART: [rt] RT listening for mailbox commands...
3,276,927 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,374 UART: [rt]cmd =0x49444550, len=8
3,308,203 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,843 ready_for_fw is high
1,056,843 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,167 >>> mbox cmd response: success
2,685,941 UART:
2,685,957 UART: Running Caliptra FMC ...
2,686,365 UART:
2,686,508 UART: [state] CFI Enabled
2,697,173 UART: [fht] FMC Alias Private Key: 7
2,804,938 UART: [art] Extend RT PCRs Done
2,805,366 UART: [art] Lock RT PCRs Done
2,807,054 UART: [art] Populate DV Done
2,815,091 UART: [fht] FMC Alias Private Key: 7
2,816,195 UART: [art] Derive CDI
2,816,475 UART: [art] Store in in slot 0x4
2,902,010 UART: [art] Derive Key Pair
2,902,370 UART: [art] Store priv key in slot 0x5
2,915,818 UART: [art] Derive Key Pair - Done
2,930,774 UART: [art] Signing Cert with AUTHO
2,931,254 UART: RITY.KEYID = 7
2,946,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,599 UART: [art] PUB.X = D8FA138C23DD89452960A0C0F53A4A7110BD1055EFD0C72C08A3E02D2DF9FA904E7E86FBC3BD76BC15F8C59C7C4232AA
2,954,384 UART: [art] PUB.Y = 0B1E6CE57A544F123C57758C8D6314980F06B0D0FDEA9290F39C6A71FB0F1860ADA42D03DA8D72B8520540A82EC4F2A1
2,961,324 UART: [art] SIG.R = F883621A468941BBC73F93B2AE9C9D7F1EFB35EE95D95857AF0E79E3B12E67EC256CF8CC9379E5689290358166D5332F
2,968,095 UART: [art] SIG.S = FFDF5F8521DC608AD73294B4B70A4397F1D8E177A8D5640BC414011FD5F87810A59A4FE3B3AC0EB5CEA94ED76638E9C7
2,992,614 UART: Caliptra RT
2,992,960 UART: [state] CFI Enabled
3,100,907 UART: [rt] RT listening for mailbox commands...
3,101,577 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,076 UART: [rt]cmd =0x49444550, len=8
3,132,855 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,454 UART:
192,850 UART: Running Caliptra ROM ...
194,052 UART:
194,203 UART: [state] CFI Enabled
263,233 UART: [state] LifecycleState = Unprovisioned
265,142 UART: [state] DebugLocked = No
266,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,114 UART: [kat] SHA2-256
440,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,259 UART: [kat] ++
451,698 UART: [kat] sha1
463,292 UART: [kat] SHA2-256
465,982 UART: [kat] SHA2-384
471,616 UART: [kat] SHA2-512-ACC
473,979 UART: [kat] ECC-384
2,767,373 UART: [kat] HMAC-384Kdf
2,779,066 UART: [kat] LMS
3,969,405 UART: [kat] --
3,975,059 UART: [cold-reset] ++
3,976,167 UART: [fht] Storing FHT @ 0x50003400
3,987,645 UART: [idev] ++
3,988,201 UART: [idev] CDI.KEYID = 6
3,989,176 UART: [idev] SUBJECT.KEYID = 7
3,990,408 UART: [idev] UDS.KEYID = 0
3,991,380 ready_for_fw is high
3,991,568 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,827 UART: [idev] Erasing UDS.KEYID = 0
7,326,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,100 UART: [idev] --
7,351,841 UART: [ldev] ++
7,352,410 UART: [ldev] CDI.KEYID = 6
7,353,372 UART: [ldev] SUBJECT.KEYID = 5
7,354,579 UART: [ldev] AUTHORITY.KEYID = 7
7,355,889 UART: [ldev] FE.KEYID = 1
7,402,720 UART: [ldev] Erasing FE.KEYID = 1
10,734,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,617 UART: [ldev] --
13,094,547 UART: [fwproc] Waiting for Commands...
13,097,332 UART: [fwproc] Received command 0x46574c44
13,099,526 UART: [fwproc] Received Image of size 114036 bytes
17,147,317 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,605,217 >>> mbox cmd response: success
17,608,727 UART: [afmc] ++
17,609,339 UART: [afmc] CDI.KEYID = 6
17,610,245 UART: [afmc] SUBJECT.KEYID = 7
17,611,512 UART: [afmc] AUTHORITY.KEYID = 5
20,969,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,263,541 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,265,821 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,220 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,295,066 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,309,475 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,329,955 UART: [afmc] --
23,334,130 UART: [cold-reset] --
23,337,866 UART: [state] Locking Datavault
23,342,155 UART: [state] Locking PCR0, PCR1 and PCR31
23,343,905 UART: [state] Locking ICCM
23,345,402 UART: [exit] Launching FMC @ 0x40000130
23,353,797 UART:
23,354,045 UART: Running Caliptra FMC ...
23,355,259 UART:
23,355,421 UART: [state] CFI Enabled
23,426,429 UART: [fht] FMC Alias Private Key: 7
25,764,333 UART: [art] Extend RT PCRs Done
25,765,557 UART: [art] Lock RT PCRs Done
25,767,311 UART: [art] Populate DV Done
25,772,929 UART: [fht] FMC Alias Private Key: 7
25,774,620 UART: [art] Derive CDI
25,775,428 UART: [art] Store in in slot 0x4
25,836,689 UART: [art] Derive Key Pair
25,837,729 UART: [art] Store priv key in slot 0x5
29,130,772 UART: [art] Derive Key Pair - Done
29,143,715 UART: [art] Signing Cert with AUTHO
29,145,009 UART: RITY.KEYID = 7
31,432,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,434,256 UART: [art] PUB.X = 403CAB31D61158AAC030D2B7480F7B2C5E5154A60BE3C4A48C1D97A49E65B5A314EE8C51D7D3FA3A36AD49B7FA455840
31,441,587 UART: [art] PUB.Y = A1E775E3AACC8A417D6212108F88613B779A5CBDB782981D02D0950C7E787B52C33897514ED29704FD515FA0C8A339D4
31,448,738 UART: [art] SIG.R = 75F413253FAA58798B097832AA5655FDD8FB1B925D69CCAF1A5F350296FF76BEF33418E0E329EFF6941ED52886400C0D
31,456,104 UART: [art] SIG.S = 867C66E4AD766B99139D2CFEC6B484F74EF3EA10FE3C4D5C5D6D4D0AA6707CC72B24B26AFA4086D2630B3C101372B640
32,760,368 UART: Caliptra RT
32,761,082 UART: [state] CFI Enabled
32,923,934 UART: [rt] RT listening for mailbox commands...
32,925,825 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,955,649 UART: [rt]cmd =0x52564348, len=36
32,957,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,804,552 ready_for_fw is high
3,805,103 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,890,686 >>> mbox cmd response: success
23,587,789 UART:
23,588,240 UART: Running Caliptra FMC ...
23,589,353 UART:
23,589,502 UART: [state] CFI Enabled
23,658,965 UART: [fht] FMC Alias Private Key: 7
25,996,521 UART: [art] Extend RT PCRs Done
25,997,750 UART: [art] Lock RT PCRs Done
25,999,213 UART: [art] Populate DV Done
26,004,352 UART: [fht] FMC Alias Private Key: 7
26,006,054 UART: [art] Derive CDI
26,006,890 UART: [art] Store in in slot 0x4
26,067,620 UART: [art] Derive Key Pair
26,068,668 UART: [art] Store priv key in slot 0x5
29,361,767 UART: [art] Derive Key Pair - Done
29,374,662 UART: [art] Signing Cert with AUTHO
29,375,969 UART: RITY.KEYID = 7
31,662,292 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,803 UART: [art] PUB.X = 28BA914A19234E145703CE2D255505BE1C57A771AFA43C91ACAD78C94207DC84EA957BA7C6C28312F1577056E985E9A1
31,671,029 UART: [art] PUB.Y = 1E06DDCF36728AABC0C02C64767A26D51B275A519BCEB9B318D815A81652D4368E5751D9A65EF575DB5FF0A888041EB2
31,678,238 UART: [art] SIG.R = E77BA90A003B001306FD8BA8461E8B389E9704684AD35F42C16626C1C3298A8896F0999E4F6182CCF9A89B55263FFF2F
31,685,607 UART: [art] SIG.S = F068DD2019C8EE8BE40FBAF7F279228C1E5355FDDAEEC985F1827BE4A98A340E25D9BF2503898D8725C284D27CAD7DDF
32,991,506 UART: Caliptra RT
32,992,210 UART: [state] CFI Enabled
33,171,825 UART: [rt] RT listening for mailbox commands...
33,173,723 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,204,033 UART: [rt]cmd =0x52564348, len=36
33,205,971 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,359 UART:
192,708 UART: Running Caliptra ROM ...
193,833 UART:
603,724 UART: [state] CFI Enabled
618,734 UART: [state] LifecycleState = Unprovisioned
620,628 UART: [state] DebugLocked = No
622,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,300 UART: [kat] SHA2-256
798,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,622 UART: [kat] ++
809,153 UART: [kat] sha1
818,967 UART: [kat] SHA2-256
821,690 UART: [kat] SHA2-384
828,532 UART: [kat] SHA2-512-ACC
830,901 UART: [kat] ECC-384
3,115,101 UART: [kat] HMAC-384Kdf
3,126,844 UART: [kat] LMS
4,316,937 UART: [kat] --
4,322,734 UART: [cold-reset] ++
4,325,021 UART: [fht] Storing FHT @ 0x50003400
4,335,232 UART: [idev] ++
4,335,818 UART: [idev] CDI.KEYID = 6
4,336,732 UART: [idev] SUBJECT.KEYID = 7
4,337,980 UART: [idev] UDS.KEYID = 0
4,338,955 ready_for_fw is high
4,339,151 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,366 UART: [idev] Erasing UDS.KEYID = 0
7,623,604 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,574 UART: [idev] --
7,648,644 UART: [ldev] ++
7,649,268 UART: [ldev] CDI.KEYID = 6
7,650,231 UART: [ldev] SUBJECT.KEYID = 5
7,651,437 UART: [ldev] AUTHORITY.KEYID = 7
7,652,663 UART: [ldev] FE.KEYID = 1
7,661,900 UART: [ldev] Erasing FE.KEYID = 1
10,949,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,248 UART: [ldev] --
13,309,298 UART: [fwproc] Waiting for Commands...
13,311,768 UART: [fwproc] Received command 0x46574c44
13,313,945 UART: [fwproc] Received Image of size 114036 bytes
17,363,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,779 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,821,145 >>> mbox cmd response: success
17,825,779 UART: [afmc] ++
17,826,390 UART: [afmc] CDI.KEYID = 6
17,827,299 UART: [afmc] SUBJECT.KEYID = 7
17,828,575 UART: [afmc] AUTHORITY.KEYID = 5
21,146,205 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,380 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,725 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,585 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,999 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,384 UART: [afmc] --
23,512,718 UART: [cold-reset] --
23,517,339 UART: [state] Locking Datavault
23,523,725 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,421 UART: [state] Locking ICCM
23,527,620 UART: [exit] Launching FMC @ 0x40000130
23,536,017 UART:
23,536,264 UART: Running Caliptra FMC ...
23,537,364 UART:
23,537,528 UART: [state] CFI Enabled
23,545,762 UART: [fht] FMC Alias Private Key: 7
25,876,148 UART: [art] Extend RT PCRs Done
25,877,359 UART: [art] Lock RT PCRs Done
25,878,873 UART: [art] Populate DV Done
25,884,234 UART: [fht] FMC Alias Private Key: 7
25,885,727 UART: [art] Derive CDI
25,886,464 UART: [art] Store in in slot 0x4
25,929,231 UART: [art] Derive Key Pair
25,930,273 UART: [art] Store priv key in slot 0x5
29,172,080 UART: [art] Derive Key Pair - Done
29,185,137 UART: [art] Signing Cert with AUTHO
29,186,475 UART: RITY.KEYID = 7
31,465,699 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,201 UART: [art] PUB.X = B869102A7A1232AE81F1C6760AC2BD802F3F6ADA495A4242A9F7C3D09B8C333571B155D08C8CFF700790FE1CA8AB5E4F
31,474,463 UART: [art] PUB.Y = 2013A063E6C1BB07FDD591F99537D3BA21B2DB7D18C0E72740BE9B2B6245FB24706F033658FA72CD1D2178236F160841
31,481,713 UART: [art] SIG.R = 7E8D815830B1E40CDAC2789C4841F728F4411BDB49009DB065822E3658C6E0B98EB44E9D73A23BEC2E2DF418320E5AF1
31,489,056 UART: [art] SIG.S = 39059801C255828712ED3B9E57109CC6E2E5FFCC7BCD57040BC0091D549BA583559D749B3B17C124D1F6FA77BEB9E0E1
32,794,599 UART: Caliptra RT
32,795,300 UART: [state] CFI Enabled
32,912,963 UART: [rt] RT listening for mailbox commands...
32,914,844 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,945,068 UART: [rt]cmd =0x52564348, len=36
32,946,857 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
4,126,302 ready_for_fw is high
4,126,696 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,067,316 >>> mbox cmd response: success
23,703,681 UART:
23,704,080 UART: Running Caliptra FMC ...
23,705,219 UART:
23,705,379 UART: [state] CFI Enabled
23,713,119 UART: [fht] FMC Alias Private Key: 7
26,043,965 UART: [art] Extend RT PCRs Done
26,045,204 UART: [art] Lock RT PCRs Done
26,046,855 UART: [art] Populate DV Done
26,052,392 UART: [fht] FMC Alias Private Key: 7
26,053,996 UART: [art] Derive CDI
26,054,759 UART: [art] Store in in slot 0x4
26,097,425 UART: [art] Derive Key Pair
26,098,476 UART: [art] Store priv key in slot 0x5
29,340,674 UART: [art] Derive Key Pair - Done
29,353,837 UART: [art] Signing Cert with AUTHO
29,355,143 UART: RITY.KEYID = 7
31,634,943 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,442 UART: [art] PUB.X = 830339ED5BC8902891B5DA5CB240D79D5774BD4531AFADE938BAA589F338D687C788FFD7252A1F78B005B6EF4ED6CEAF
31,643,732 UART: [art] PUB.Y = 3FA765D5497010DC3AFAD25C8B7841C0C6639C21079ABEE4AED92E8359D1732D18EAE081F288F7175255A736F6452B84
31,650,944 UART: [art] SIG.R = F872CBFE06FEDF7ADDDB629B2ECA1395FBE4C80176A1E299CBF9C776992D3F46532B30733AE1C01EA1FFDDD4A037B716
31,658,357 UART: [art] SIG.S = 594BADAFFBE6DCC1F84820A81ED0D8C641324A366BF7DD7DE4CA6CBBE74730169F4A30576F7F2CB23D7747D780599967
32,963,487 UART: Caliptra RT
32,964,191 UART: [state] CFI Enabled
33,081,004 UART: [rt] RT listening for mailbox commands...
33,082,911 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,112,780 UART: [rt]cmd =0x52564348, len=36
33,114,599 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,479 UART:
192,840 UART: Running Caliptra ROM ...
194,019 UART:
194,180 UART: [state] CFI Enabled
263,300 UART: [state] LifecycleState = Unprovisioned
265,136 UART: [state] DebugLocked = No
267,384 UART: [state] WD Timer not started. Device not locked for debugging
271,197 UART: [kat] SHA2-256
450,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,898 UART: [kat] ++
462,429 UART: [kat] sha1
473,608 UART: [kat] SHA2-256
476,677 UART: [kat] SHA2-384
482,314 UART: [kat] SHA2-512-ACC
485,323 UART: [kat] ECC-384
2,948,844 UART: [kat] HMAC-384Kdf
2,971,903 UART: [kat] LMS
3,501,357 UART: [kat] --
3,506,348 UART: [cold-reset] ++
3,508,425 UART: [fht] FHT @ 0x50003400
3,518,917 UART: [idev] ++
3,519,491 UART: [idev] CDI.KEYID = 6
3,520,419 UART: [idev] SUBJECT.KEYID = 7
3,521,597 UART: [idev] UDS.KEYID = 0
3,522,523 ready_for_fw is high
3,522,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,656 UART: [idev] Erasing UDS.KEYID = 0
6,029,474 UART: [idev] Sha1 KeyId Algorithm
6,051,997 UART: [idev] --
6,055,559 UART: [ldev] ++
6,056,137 UART: [ldev] CDI.KEYID = 6
6,057,048 UART: [ldev] SUBJECT.KEYID = 5
6,058,208 UART: [ldev] AUTHORITY.KEYID = 7
6,059,500 UART: [ldev] FE.KEYID = 1
6,100,280 UART: [ldev] Erasing FE.KEYID = 1
8,604,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,926 UART: [ldev] --
10,415,872 UART: [fwproc] Wait for Commands...
10,417,794 UART: [fwproc] Recv command 0x46574c44
10,419,919 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,277,754 >>> mbox cmd response: success
14,281,418 UART: [afmc] ++
14,282,016 UART: [afmc] CDI.KEYID = 6
14,282,930 UART: [afmc] SUBJECT.KEYID = 7
14,284,091 UART: [afmc] AUTHORITY.KEYID = 5
16,827,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,130 UART: [afmc] --
18,625,044 UART: [cold-reset] --
18,628,805 UART: [state] Locking Datavault
18,634,160 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,803 UART: [state] Locking ICCM
18,637,411 UART: [exit] Launching FMC @ 0x40000130
18,645,860 UART:
18,646,097 UART: Running Caliptra FMC ...
18,647,204 UART:
18,647,365 UART: [state] CFI Enabled
18,708,103 UART: [fht] FMC Alias Private Key: 7
20,472,704 UART: [art] Extend RT PCRs Done
20,473,922 UART: [art] Lock RT PCRs Done
20,475,144 UART: [art] Populate DV Done
20,480,516 UART: [fht] FMC Alias Private Key: 7
20,481,996 UART: [art] Derive CDI
20,482,758 UART: [art] Store in in slot 0x4
20,541,006 UART: [art] Derive Key Pair
20,542,055 UART: [art] Store priv key in slot 0x5
23,004,581 UART: [art] Derive Key Pair - Done
23,017,910 UART: [art] Signing Cert with AUTHO
23,019,216 UART: RITY.KEYID = 7
24,730,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,334 UART: [art] PUB.X = 275E78E164AD4F8B07F35E2F3244010F69915837F551F3D13A285F99506289E00250A3D7E58009CFCFE2EFF030849A77
24,739,576 UART: [art] PUB.Y = 1B24C24CF8B718CC39C5B7823A8236D88F22B33A74B157E77FCC1FAC0171D74DF60A86E8F38CCC6E5AE8BACB64C50593
24,746,845 UART: [art] SIG.R = 3A6BF994815192AAFF2572B2232D13535EB88066C4E5E0E3F0D9EC5BE7ADC079A438053CA4F5CF0F82EAAC9901B1FC7E
24,754,214 UART: [art] SIG.S = 5A28DBB24AEA437CB91C7AF413DBE852BD5AA5B53DA55E0DC429D9BF924CA7B56BC610D2E64B78F972478A2A232D2F9A
25,733,155 UART: Caliptra RT
25,733,862 UART: [state] CFI Enabled
25,900,183 UART: [rt] RT listening for mailbox commands...
25,902,064 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,932,033 UART: [rt]cmd =0x52564348, len=36
25,933,784 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,620 UART:
193,011 UART: Running Caliptra ROM ...
194,220 UART:
194,381 UART: [state] CFI Enabled
262,108 UART: [state] LifecycleState = Unprovisioned
264,468 UART: [state] DebugLocked = No
267,357 UART: [state] WD Timer not started. Device not locked for debugging
272,272 UART: [kat] SHA2-256
462,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,923 UART: [kat] ++
473,417 UART: [kat] sha1
485,684 UART: [kat] SHA2-256
488,709 UART: [kat] SHA2-384
494,637 UART: [kat] SHA2-512-ACC
497,239 UART: [kat] ECC-384
2,946,487 UART: [kat] HMAC-384Kdf
2,972,298 UART: [kat] LMS
3,504,048 UART: [kat] --
3,507,911 UART: [cold-reset] ++
3,509,773 UART: [fht] FHT @ 0x50003400
3,521,249 UART: [idev] ++
3,521,965 UART: [idev] CDI.KEYID = 6
3,522,855 UART: [idev] SUBJECT.KEYID = 7
3,524,102 UART: [idev] UDS.KEYID = 0
3,525,008 ready_for_fw is high
3,525,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,050 UART: [idev] Erasing UDS.KEYID = 0
6,027,195 UART: [idev] Sha1 KeyId Algorithm
6,049,835 UART: [idev] --
6,054,482 UART: [ldev] ++
6,055,185 UART: [ldev] CDI.KEYID = 6
6,056,075 UART: [ldev] SUBJECT.KEYID = 5
6,057,296 UART: [ldev] AUTHORITY.KEYID = 7
6,058,439 UART: [ldev] FE.KEYID = 1
6,100,142 UART: [ldev] Erasing FE.KEYID = 1
8,605,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,600 UART: [ldev] --
10,413,780 UART: [fwproc] Wait for Commands...
10,416,790 UART: [fwproc] Recv command 0x46574c44
10,419,052 UART: [fwproc] Recv'd Img size: 114360 bytes
13,870,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,604,912 >>> mbox cmd response: success
14,608,892 UART: [afmc] ++
14,609,604 UART: [afmc] CDI.KEYID = 6
14,610,864 UART: [afmc] SUBJECT.KEYID = 7
14,612,316 UART: [afmc] AUTHORITY.KEYID = 5
17,151,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,091 UART: [afmc] --
18,966,151 UART: [cold-reset] --
18,971,743 UART: [state] Locking Datavault
18,977,108 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,285 UART: [state] Locking ICCM
18,982,042 UART: [exit] Launching FMC @ 0x40000130
18,990,739 UART:
18,991,018 UART: Running Caliptra FMC ...
18,992,134 UART:
18,992,300 UART: [state] CFI Enabled
19,049,366 UART: [fht] FMC Alias Private Key: 7
20,813,506 UART: [art] Extend RT PCRs Done
20,814,764 UART: [art] Lock RT PCRs Done
20,816,467 UART: [art] Populate DV Done
20,821,662 UART: [fht] FMC Alias Private Key: 7
20,823,155 UART: [art] Derive CDI
20,823,891 UART: [art] Store in in slot 0x4
20,882,787 UART: [art] Derive Key Pair
20,883,824 UART: [art] Store priv key in slot 0x5
23,346,752 UART: [art] Derive Key Pair - Done
23,359,721 UART: [art] Signing Cert with AUTHO
23,361,036 UART: RITY.KEYID = 7
25,072,780 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,289 UART: [art] PUB.X = 310C2FD89EFC5920E06F3361AFFC13BD9E4B7B5031A26206948956DEB3E64914A0CFA3233193DC6217B8A6913664DA11
25,081,578 UART: [art] PUB.Y = 0363C0BD73BA7EDF206FBDBC8D6AFA10DB491627B93C003E08E84AFE8E426EDF486E8705D9212A5F593A7A6D185FB136
25,088,795 UART: [art] SIG.R = A45F7D5576EAA32E6E7BA86E45783F48161E6ECB4C9A3B10F68595CA0B824F4F0F201486F44456F6B9EC74AC04BE6DE5
25,096,223 UART: [art] SIG.S = B89D93DD9AED1BABB30CCFE771DC2AC017E9D5E39CE972634CE8B537AE6875F9EFC028A0932B59DF8F2FA2B9639D1413
26,074,141 UART: Caliptra RT
26,074,859 UART: [state] CFI Enabled
26,240,063 UART: [rt] RT listening for mailbox commands...
26,241,956 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,272,143 UART: [rt]cmd =0x52564348, len=36
26,273,992 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
3,437,707 ready_for_fw is high
3,438,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,744,324 >>> mbox cmd response: success
19,027,048 UART:
19,027,456 UART: Running Caliptra FMC ...
19,028,573 UART:
19,028,730 UART: [state] CFI Enabled
19,095,821 UART: [fht] FMC Alias Private Key: 7
20,859,587 UART: [art] Extend RT PCRs Done
20,860,816 UART: [art] Lock RT PCRs Done
20,862,470 UART: [art] Populate DV Done
20,867,990 UART: [fht] FMC Alias Private Key: 7
20,869,542 UART: [art] Derive CDI
20,870,367 UART: [art] Store in in slot 0x4
20,928,668 UART: [art] Derive Key Pair
20,929,711 UART: [art] Store priv key in slot 0x5
23,392,403 UART: [art] Derive Key Pair - Done
23,405,532 UART: [art] Signing Cert with AUTHO
23,406,847 UART: RITY.KEYID = 7
25,118,502 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,006 UART: [art] PUB.X = 2D451C667945347F82B17DEF794D0D1F9788E748BF8E943355C54C57F7F973ED8BEB76922E570DF449E9F34E7A3A3CDB
25,127,262 UART: [art] PUB.Y = DA28CF756C309B0C71CBE48CD2BF471A1B9C1DB4FE220472A749E03B0DB67DAFB18B82DE51AD3EE088FE7ADCBB12C17B
25,134,543 UART: [art] SIG.R = 73121731C81E8B40F373116E8C85552823D54A29EAA00C43F6D4C491C30308A407C79C88A980259FB270EC65A6B8BD77
25,141,913 UART: [art] SIG.S = 68C493C9EF1420DCDDA4E894EF7985104339D591913EFD6886853357592B49A206AAFD46E1274BB98D0AF3FDCF70575F
26,120,838 UART: Caliptra RT
26,121,527 UART: [state] CFI Enabled
26,287,834 UART: [rt] RT listening for mailbox commands...
26,289,717 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,319,622 UART: [rt]cmd =0x52564348, len=36
26,321,325 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,473 UART:
192,838 UART: Running Caliptra ROM ...
194,023 UART:
603,755 UART: [state] CFI Enabled
618,280 UART: [state] LifecycleState = Unprovisioned
620,304 UART: [state] DebugLocked = No
622,896 UART: [state] WD Timer not started. Device not locked for debugging
626,708 UART: [kat] SHA2-256
816,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,413 UART: [kat] ++
827,862 UART: [kat] sha1
838,943 UART: [kat] SHA2-256
841,948 UART: [kat] SHA2-384
848,973 UART: [kat] SHA2-512-ACC
851,536 UART: [kat] ECC-384
3,290,997 UART: [kat] HMAC-384Kdf
3,302,971 UART: [kat] LMS
3,834,801 UART: [kat] --
3,839,644 UART: [cold-reset] ++
3,840,717 UART: [fht] FHT @ 0x50003400
3,851,856 UART: [idev] ++
3,852,491 UART: [idev] CDI.KEYID = 6
3,853,451 UART: [idev] SUBJECT.KEYID = 7
3,854,694 UART: [idev] UDS.KEYID = 0
3,855,885 ready_for_fw is high
3,856,099 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,788 UART: [idev] Erasing UDS.KEYID = 0
6,332,956 UART: [idev] Sha1 KeyId Algorithm
6,355,967 UART: [idev] --
6,360,680 UART: [ldev] ++
6,361,414 UART: [ldev] CDI.KEYID = 6
6,362,317 UART: [ldev] SUBJECT.KEYID = 5
6,363,468 UART: [ldev] AUTHORITY.KEYID = 7
6,364,843 UART: [ldev] FE.KEYID = 1
6,374,909 UART: [ldev] Erasing FE.KEYID = 1
8,852,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,787 UART: [ldev] --
10,643,025 UART: [fwproc] Wait for Commands...
10,645,289 UART: [fwproc] Recv command 0x46574c44
10,647,595 UART: [fwproc] Recv'd Img size: 114360 bytes
14,090,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,829,260 >>> mbox cmd response: success
14,834,238 UART: [afmc] ++
14,834,939 UART: [afmc] CDI.KEYID = 6
14,836,186 UART: [afmc] SUBJECT.KEYID = 7
14,837,626 UART: [afmc] AUTHORITY.KEYID = 5
17,341,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,629 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,815 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,970 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,263 UART: [afmc] --
19,140,106 UART: [cold-reset] --
19,144,182 UART: [state] Locking Datavault
19,151,117 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,299 UART: [state] Locking ICCM
19,155,984 UART: [exit] Launching FMC @ 0x40000130
19,164,665 UART:
19,164,938 UART: Running Caliptra FMC ...
19,166,046 UART:
19,166,206 UART: [state] CFI Enabled
19,174,305 UART: [fht] FMC Alias Private Key: 7
20,931,370 UART: [art] Extend RT PCRs Done
20,932,569 UART: [art] Lock RT PCRs Done
20,934,241 UART: [art] Populate DV Done
20,939,598 UART: [fht] FMC Alias Private Key: 7
20,941,140 UART: [art] Derive CDI
20,941,955 UART: [art] Store in in slot 0x4
20,984,489 UART: [art] Derive Key Pair
20,985,481 UART: [art] Store priv key in slot 0x5
23,411,838 UART: [art] Derive Key Pair - Done
23,424,839 UART: [art] Signing Cert with AUTHO
23,426,136 UART: RITY.KEYID = 7
25,131,407 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,900 UART: [art] PUB.X = 31BD49D7EC2C27693BC236E87EE966A449DAB642B6EB2EBACC2E7E1D5D2596548C80AE6A73D2DA867AB6CED001F29973
25,140,200 UART: [art] PUB.Y = 7D16185EDCD565BD361F1C8A643EE8B23BDFC8D581DD88F29AFF3BF0E2852D8C00071FDAD2D35C9634D5DB3E90BD6B56
25,147,481 UART: [art] SIG.R = 2E7F698562271A5A661E61B1D8AE67CF3EA19C25E24182676B01CABD6DEA9D314C5F284B8423B840707A94D4F2B34944
25,154,877 UART: [art] SIG.S = C7C14DFEE1132DFAB015502C20DBCF565303D09F3AEB57239FAF9F0025BCCC35B9F111B659CCB1D4A30CE93ED795C630
26,133,531 UART: Caliptra RT
26,134,241 UART: [state] CFI Enabled
26,252,173 UART: [rt] RT listening for mailbox commands...
26,254,056 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,284,145 UART: [rt]cmd =0x52564348, len=36
26,285,933 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,754,857 ready_for_fw is high
3,755,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,952,227 >>> mbox cmd response: success
19,205,241 UART:
19,205,629 UART: Running Caliptra FMC ...
19,206,724 UART:
19,206,878 UART: [state] CFI Enabled
19,214,886 UART: [fht] FMC Alias Private Key: 7
20,971,127 UART: [art] Extend RT PCRs Done
20,972,353 UART: [art] Lock RT PCRs Done
20,974,059 UART: [art] Populate DV Done
20,979,357 UART: [fht] FMC Alias Private Key: 7
20,980,949 UART: [art] Derive CDI
20,981,683 UART: [art] Store in in slot 0x4
21,024,669 UART: [art] Derive Key Pair
21,025,673 UART: [art] Store priv key in slot 0x5
23,451,861 UART: [art] Derive Key Pair - Done
23,464,645 UART: [art] Signing Cert with AUTHO
23,465,945 UART: RITY.KEYID = 7
25,171,307 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,811 UART: [art] PUB.X = B1597507B921141194B7B6D51483B519516667B8A904FC89021F879CCC132BE05C53CB3E76795F66B517FA016779AAF6
25,180,069 UART: [art] PUB.Y = E3F789C39B16C5E1E5ED7CAD6C801B746B9EDB3583B4DC91FC855BB78326995DB2B8CAF9E2C746AAD7ED64C56CB368C4
25,187,342 UART: [art] SIG.R = 019001CB60A6930FF56D1621EF5FDAFCD649DB746CEF218A6D6E2808BCF114D8A51B15A05C3C3390CFE0EC4E84872654
25,194,754 UART: [art] SIG.S = 30E68633FA45DFD71E312479561F998D3D526B886B2B72DF5F89B5815ECBD60334547FC5D0945E92DB151BCA131ADD39
26,173,310 UART: Caliptra RT
26,174,017 UART: [state] CFI Enabled
26,291,788 UART: [rt] RT listening for mailbox commands...
26,293,667 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,323,968 UART: [rt]cmd =0x52564348, len=36
26,325,780 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,173 UART: [kat] SHA2-256
882,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,219 UART: [kat] ++
886,371 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
902,810 UART: [kat] HMAC-384Kdf
907,436 UART: [kat] LMS
1,475,632 UART: [kat] --
1,476,537 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 ready_for_fw is high
1,481,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,686 UART: [idev] Erasing UDS.KEYID = 0
1,505,334 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,989 UART: [ldev] ++
1,515,157 UART: [ldev] CDI.KEYID = 6
1,515,520 UART: [ldev] SUBJECT.KEYID = 5
1,515,946 UART: [ldev] AUTHORITY.KEYID = 7
1,516,409 UART: [ldev] FE.KEYID = 1
1,521,499 UART: [ldev] Erasing FE.KEYID = 1
1,546,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,652 UART: [ldev] --
1,586,021 UART: [fwproc] Waiting for Commands...
1,586,788 UART: [fwproc] Received command 0x46574c44
1,587,579 UART: [fwproc] Received Image of size 114360 bytes
2,885,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,574 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,893 >>> mbox cmd response: success
3,080,141 UART: [afmc] ++
3,080,309 UART: [afmc] CDI.KEYID = 6
3,080,671 UART: [afmc] SUBJECT.KEYID = 7
3,081,096 UART: [afmc] AUTHORITY.KEYID = 5
3,115,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,327 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,720 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,410 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,293 UART: [afmc] --
3,158,385 UART: [cold-reset] --
3,159,415 UART: [state] Locking Datavault
3,160,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,344 UART: [state] Locking ICCM
3,161,816 UART: [exit] Launching FMC @ 0x40000130
3,167,145 UART:
3,167,161 UART: Running Caliptra FMC ...
3,167,569 UART:
3,167,623 UART: [state] CFI Enabled
3,178,262 UART: [fht] FMC Alias Private Key: 7
3,286,137 UART: [art] Extend RT PCRs Done
3,286,565 UART: [art] Lock RT PCRs Done
3,287,985 UART: [art] Populate DV Done
3,296,420 UART: [fht] FMC Alias Private Key: 7
3,297,526 UART: [art] Derive CDI
3,297,806 UART: [art] Store in in slot 0x4
3,383,411 UART: [art] Derive Key Pair
3,383,771 UART: [art] Store priv key in slot 0x5
3,397,081 UART: [art] Derive Key Pair - Done
3,412,097 UART: [art] Signing Cert with AUTHO
3,412,577 UART: RITY.KEYID = 7
3,427,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,600 UART: [art] PUB.X = 0663C12BDC303AC02EADE5C3388EC3C83C1CCABF4EFFCC6C13FEA15ED13E0E0FE4FA6578E48894F74680958C7D62C0A7
3,435,385 UART: [art] PUB.Y = B4D0B3E7ED9E6417EE346E4DFD0DFFEA6AB284C7E9D140405D8C573E054AD88F62B2BF459E1F6D9FA0088A1C390605CC
3,442,340 UART: [art] SIG.R = F144E3F838EA90B643EF8E7372C18C0A80967E9A89E09E309990D5BC5B36C060AADAF8E7321160DE7B6FE59602C85065
3,449,108 UART: [art] SIG.S = 366A32D37FF7C01E2C4DCAF106C2CC5FE3EB8EC348D9B4C162A307E6BC14CF1AF8E307FE7E1F2B996B3D4347C782A35B
3,473,382 UART: Caliptra RT
3,473,636 UART: [state] CFI Enabled
3,580,920 UART: [rt] RT listening for mailbox commands...
3,581,590 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,133 UART: [rt]cmd =0x52564348, len=36
3,612,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,481 ready_for_fw is high
1,362,481 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,279 >>> mbox cmd response: success
2,988,831 UART:
2,988,847 UART: Running Caliptra FMC ...
2,989,255 UART:
2,989,309 UART: [state] CFI Enabled
2,999,992 UART: [fht] FMC Alias Private Key: 7
3,108,445 UART: [art] Extend RT PCRs Done
3,108,873 UART: [art] Lock RT PCRs Done
3,110,219 UART: [art] Populate DV Done
3,118,442 UART: [fht] FMC Alias Private Key: 7
3,119,442 UART: [art] Derive CDI
3,119,722 UART: [art] Store in in slot 0x4
3,205,215 UART: [art] Derive Key Pair
3,205,575 UART: [art] Store priv key in slot 0x5
3,218,425 UART: [art] Derive Key Pair - Done
3,232,598 UART: [art] Signing Cert with AUTHO
3,233,078 UART: RITY.KEYID = 7
3,248,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,871 UART: [art] PUB.X = 57F5769A6301FF24413A91EA7E31FB96CA97D703AC6F4147DAFAA4026D5174983971CC7B9D7DDF64EA82CD0B6D2A3230
3,255,639 UART: [art] PUB.Y = EAD9A54B4135CB2B7B35692C891131FB2910347A28D772131D8226B9E1E75299534A446B859EF956A7EA7DEB9261E8CE
3,262,589 UART: [art] SIG.R = A15D0D94ECE660D75260817452DDA31B977DB24FAC00FD501000AB6A278D22204FD493A6D4E5B4477D91A60763B5D072
3,269,311 UART: [art] SIG.S = 4881CF6F914265E292657FF0A97CDDB869131F18321F961F28FAFE7593972E99D60EC7165EDD3D8935BA9758116D9F7F
3,293,209 UART: Caliptra RT
3,293,463 UART: [state] CFI Enabled
3,401,687 UART: [rt] RT listening for mailbox commands...
3,402,357 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,146 UART: [rt]cmd =0x52564348, len=36
3,433,703 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,491 UART: [kat] HMAC-384Kdf
907,033 UART: [kat] LMS
1,475,229 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,588 UART: [fht] Storing FHT @ 0x50003400
1,479,171 UART: [idev] ++
1,479,339 UART: [idev] CDI.KEYID = 6
1,479,699 UART: [idev] SUBJECT.KEYID = 7
1,480,123 UART: [idev] UDS.KEYID = 0
1,480,468 ready_for_fw is high
1,480,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,173 UART: [idev] Erasing UDS.KEYID = 0
1,505,089 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,747 UART: [idev] --
1,514,886 UART: [ldev] ++
1,515,054 UART: [ldev] CDI.KEYID = 6
1,515,417 UART: [ldev] SUBJECT.KEYID = 5
1,515,843 UART: [ldev] AUTHORITY.KEYID = 7
1,516,306 UART: [ldev] FE.KEYID = 1
1,521,210 UART: [ldev] Erasing FE.KEYID = 1
1,547,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,743 UART: [ldev] --
1,586,128 UART: [fwproc] Waiting for Commands...
1,586,929 UART: [fwproc] Received command 0x46574c44
1,587,720 UART: [fwproc] Received Image of size 114360 bytes
2,886,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,744 >>> mbox cmd response: success
3,079,996 UART: [afmc] ++
3,080,164 UART: [afmc] CDI.KEYID = 6
3,080,526 UART: [afmc] SUBJECT.KEYID = 7
3,080,951 UART: [afmc] AUTHORITY.KEYID = 5
3,115,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,459 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,149 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,012 UART: [afmc] --
3,159,018 UART: [cold-reset] --
3,159,758 UART: [state] Locking Datavault
3,160,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,423 UART: [state] Locking ICCM
3,162,013 UART: [exit] Launching FMC @ 0x40000130
3,167,342 UART:
3,167,358 UART: Running Caliptra FMC ...
3,167,766 UART:
3,167,909 UART: [state] CFI Enabled
3,178,646 UART: [fht] FMC Alias Private Key: 7
3,286,151 UART: [art] Extend RT PCRs Done
3,286,579 UART: [art] Lock RT PCRs Done
3,287,911 UART: [art] Populate DV Done
3,296,308 UART: [fht] FMC Alias Private Key: 7
3,297,308 UART: [art] Derive CDI
3,297,588 UART: [art] Store in in slot 0x4
3,383,097 UART: [art] Derive Key Pair
3,383,457 UART: [art] Store priv key in slot 0x5
3,396,765 UART: [art] Derive Key Pair - Done
3,411,481 UART: [art] Signing Cert with AUTHO
3,411,961 UART: RITY.KEYID = 7
3,427,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,906 UART: [art] PUB.X = 8F2AD40FDBC7BED9D82B337A54912E7121219035E35C6E7D6D8E2F32D44AD5CA5D3F96D8A39B298706CFB24B26555D7E
3,434,682 UART: [art] PUB.Y = 00A247AB18E37BBA8E232B4770B17D9B38E580ADE66AB59185FEF6586702616078E571D7126BDA95D9942511E2418A85
3,441,603 UART: [art] SIG.R = 7BD94155751BB0A912B9A76C56AA920261ABC71791161CDA141A0B3AEFC7BC926D1A249918EF18D6F449042603767929
3,448,359 UART: [art] SIG.S = 996DCE59CD3F24BDCBE3985EEE6A637E8AB70A456618CFD0783689C603EE586964E8ADF96292F5F87F7F70D31CE63924
3,472,032 UART: Caliptra RT
3,472,378 UART: [state] CFI Enabled
3,580,230 UART: [rt] RT listening for mailbox commands...
3,580,900 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,403 UART: [rt]cmd =0x52564348, len=36
3,611,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,314 ready_for_fw is high
1,363,314 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,574 >>> mbox cmd response: success
2,990,036 UART:
2,990,052 UART: Running Caliptra FMC ...
2,990,460 UART:
2,990,603 UART: [state] CFI Enabled
3,001,214 UART: [fht] FMC Alias Private Key: 7
3,108,977 UART: [art] Extend RT PCRs Done
3,109,405 UART: [art] Lock RT PCRs Done
3,110,679 UART: [art] Populate DV Done
3,118,680 UART: [fht] FMC Alias Private Key: 7
3,119,710 UART: [art] Derive CDI
3,119,990 UART: [art] Store in in slot 0x4
3,206,021 UART: [art] Derive Key Pair
3,206,381 UART: [art] Store priv key in slot 0x5
3,219,501 UART: [art] Derive Key Pair - Done
3,234,284 UART: [art] Signing Cert with AUTHO
3,234,764 UART: RITY.KEYID = 7
3,250,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,999 UART: [art] PUB.X = 54467973BCB199303704F20C50F0FF950C3604B826F39C1BAD7C2DE7B0D6C4AA71E60493BF998F15C551B98A9B731E59
3,257,756 UART: [art] PUB.Y = CC4478E842DE2FCC96D04CB72D49D2E4E9EA319DF3979E7A213D55D22783DF5611ECF0795508A2D98B8CE5AC9068BDA6
3,264,717 UART: [art] SIG.R = 0F917022531D83942383FD6B281AB01DC5257CA9F116D67A845963A2595F3A8C7302374D8227357ACF2B2C11FAEED7B3
3,271,479 UART: [art] SIG.S = 2ECAB5F30951878C252E8E3DAFF79071282BDA507119ACC73A7DF1C1E4C0794BC234D0EDAF6400D11A61C602BBA9EE84
3,295,530 UART: Caliptra RT
3,295,876 UART: [state] CFI Enabled
3,403,687 UART: [rt] RT listening for mailbox commands...
3,404,357 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,102 UART: [rt]cmd =0x52564348, len=36
3,435,423 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,738 UART: [state] LifecycleState = Unprovisioned
86,393 UART: [state] DebugLocked = No
87,075 UART: [state] WD Timer not started. Device not locked for debugging
88,208 UART: [kat] SHA2-256
893,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,983 UART: [kat] ++
898,135 UART: [kat] sha1
902,203 UART: [kat] SHA2-256
904,143 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,598 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,463 UART: [cold-reset] ++
1,172,807 UART: [fht] FHT @ 0x50003400
1,175,554 UART: [idev] ++
1,175,722 UART: [idev] CDI.KEYID = 6
1,176,082 UART: [idev] SUBJECT.KEYID = 7
1,176,506 UART: [idev] UDS.KEYID = 0
1,176,851 ready_for_fw is high
1,176,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,680 UART: [idev] Erasing UDS.KEYID = 0
1,201,529 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,211,133 UART: [ldev] ++
1,211,301 UART: [ldev] CDI.KEYID = 6
1,211,664 UART: [ldev] SUBJECT.KEYID = 5
1,212,090 UART: [ldev] AUTHORITY.KEYID = 7
1,212,553 UART: [ldev] FE.KEYID = 1
1,217,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,307 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,286 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,592 >>> mbox cmd response: success
2,776,684 UART: [afmc] ++
2,776,852 UART: [afmc] CDI.KEYID = 6
2,777,214 UART: [afmc] SUBJECT.KEYID = 7
2,777,639 UART: [afmc] AUTHORITY.KEYID = 5
2,812,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,926 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,393 UART: [afmc] --
2,856,357 UART: [cold-reset] --
2,857,233 UART: [state] Locking Datavault
2,858,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,890 UART: [state] Locking ICCM
2,859,542 UART: [exit] Launching FMC @ 0x40000130
2,864,871 UART:
2,864,887 UART: Running Caliptra FMC ...
2,865,295 UART:
2,865,349 UART: [state] CFI Enabled
2,875,956 UART: [fht] FMC Alias Private Key: 7
2,983,899 UART: [art] Extend RT PCRs Done
2,984,327 UART: [art] Lock RT PCRs Done
2,985,601 UART: [art] Populate DV Done
2,993,766 UART: [fht] FMC Alias Private Key: 7
2,994,744 UART: [art] Derive CDI
2,995,024 UART: [art] Store in in slot 0x4
3,080,417 UART: [art] Derive Key Pair
3,080,777 UART: [art] Store priv key in slot 0x5
3,094,089 UART: [art] Derive Key Pair - Done
3,108,785 UART: [art] Signing Cert with AUTHO
3,109,265 UART: RITY.KEYID = 7
3,124,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,422 UART: [art] PUB.X = 72DAB2C67BE563F40370DDACC2502CE371430BCEAA8C3696C7D6B7BE18366E3B0C9DA60B2B82190A38E8883820F27032
3,132,185 UART: [art] PUB.Y = E971EFACAC423BB8C3083D3F457B6E89C31023C7ECEE35D5334FBEE3E613B68248966A800B2A3A6FC0BC2B442289C3C8
3,139,143 UART: [art] SIG.R = EE8554E3203144235BF99793497C9695AFB0353595D72623471EF927F7D1487A4FA6B5D4A0FE0FC69F30442E3102C7CD
3,145,903 UART: [art] SIG.S = A97E963AF23857B8580C5948CFB7A78EAF08783A46EF95992888018ECE0DD238EBC5A01C337A9D0A9995CC24E954C963
3,169,975 UART: Caliptra RT
3,170,229 UART: [state] CFI Enabled
3,278,012 UART: [rt] RT listening for mailbox commands...
3,278,682 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,395 UART: [rt]cmd =0x52564348, len=36
3,309,810 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 ready_for_fw is high
1,059,701 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,521 >>> mbox cmd response: success
2,688,601 UART:
2,688,617 UART: Running Caliptra FMC ...
2,689,025 UART:
2,689,079 UART: [state] CFI Enabled
2,699,608 UART: [fht] FMC Alias Private Key: 7
2,807,703 UART: [art] Extend RT PCRs Done
2,808,131 UART: [art] Lock RT PCRs Done
2,809,385 UART: [art] Populate DV Done
2,817,700 UART: [fht] FMC Alias Private Key: 7
2,818,710 UART: [art] Derive CDI
2,818,990 UART: [art] Store in in slot 0x4
2,904,955 UART: [art] Derive Key Pair
2,905,315 UART: [art] Store priv key in slot 0x5
2,918,219 UART: [art] Derive Key Pair - Done
2,932,684 UART: [art] Signing Cert with AUTHO
2,933,164 UART: RITY.KEYID = 7
2,948,060 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,825 UART: [art] PUB.X = 44F861A11EF8A919CB31D2BCF9AFFED37E35871394C0D363D8C32A98823A6B027D2821FC957AAB2263B3142DD93CE1AB
2,955,604 UART: [art] PUB.Y = B6291946BBA1410FDCCD8DD4B196E7A02AA8782455DABB769E13ED6379EE5C81666A416E1F22D04D48BA5959DD13A9C0
2,962,563 UART: [art] SIG.R = E0739609BA6C2C720C7F5ABD36F106BAC9375DB4CCAAA32099B1D5B07CB1B33951630428F16499ABD8A7D37A190610CD
2,969,328 UART: [art] SIG.S = 4182D8B7147E4673F99EA0A6F7E100056EF2F807F5398504A9979804A84D44A3D94FBE3C5FB6BEDBF252324E1F3F9F57
2,992,507 UART: Caliptra RT
2,992,761 UART: [state] CFI Enabled
3,100,113 UART: [rt] RT listening for mailbox commands...
3,100,783 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,598 UART: [rt]cmd =0x52564348, len=36
3,131,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,789 UART: [kat] SHA2-512-ACC
908,690 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,362 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,775 UART: [idev] Erasing UDS.KEYID = 0
1,201,522 UART: [idev] Sha1 KeyId Algorithm
1,210,034 UART: [idev] --
1,211,088 UART: [ldev] ++
1,211,256 UART: [ldev] CDI.KEYID = 6
1,211,619 UART: [ldev] SUBJECT.KEYID = 5
1,212,045 UART: [ldev] AUTHORITY.KEYID = 7
1,212,508 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,244,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,804 UART: [ldev] --
1,283,265 UART: [fwproc] Wait for Commands...
1,284,065 UART: [fwproc] Recv command 0x46574c44
1,284,793 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,222 >>> mbox cmd response: success
2,775,484 UART: [afmc] ++
2,775,652 UART: [afmc] CDI.KEYID = 6
2,776,014 UART: [afmc] SUBJECT.KEYID = 7
2,776,439 UART: [afmc] AUTHORITY.KEYID = 5
2,811,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,145 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,758 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,477 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,299 UART: [afmc] --
2,855,289 UART: [cold-reset] --
2,856,021 UART: [state] Locking Datavault
2,857,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,006 UART: [state] Locking ICCM
2,858,578 UART: [exit] Launching FMC @ 0x40000130
2,863,907 UART:
2,863,923 UART: Running Caliptra FMC ...
2,864,331 UART:
2,864,474 UART: [state] CFI Enabled
2,875,355 UART: [fht] FMC Alias Private Key: 7
2,984,096 UART: [art] Extend RT PCRs Done
2,984,524 UART: [art] Lock RT PCRs Done
2,985,762 UART: [art] Populate DV Done
2,993,745 UART: [fht] FMC Alias Private Key: 7
2,994,829 UART: [art] Derive CDI
2,995,109 UART: [art] Store in in slot 0x4
3,081,032 UART: [art] Derive Key Pair
3,081,392 UART: [art] Store priv key in slot 0x5
3,094,104 UART: [art] Derive Key Pair - Done
3,109,009 UART: [art] Signing Cert with AUTHO
3,109,489 UART: RITY.KEYID = 7
3,124,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,138 UART: [art] PUB.X = 14CC8B8FE8DB2F2E988F1D386743FA97118344496498419A255FACFC755B7DEE6480B9261EBB9626FBD94FD5CC8BA443
3,131,918 UART: [art] PUB.Y = A9D62C2B4557DE2E095C93006B720D9A637445323F782ED1292553131A6B3EB06D8E91FAC858D3FD191C8B8513D3AAF2
3,138,842 UART: [art] SIG.R = 32F733D24E684D87524C8611DD8EB1E4A0159EFCC06EA1D79D407A5D8F6B68C302B2A99BD78A7E2E92EA631BC97709D8
3,145,616 UART: [art] SIG.S = 6497641ECD4207509D525E1E9488069276E37A2A2F9B17916798B2612DCE05F97F73B7A09B6F2CC608AB5328E3DB6BCE
3,169,305 UART: Caliptra RT
3,169,651 UART: [state] CFI Enabled
3,277,853 UART: [rt] RT listening for mailbox commands...
3,278,523 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,318 UART: [rt]cmd =0x52564348, len=36
3,309,757 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 ready_for_fw is high
1,060,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,122 >>> mbox cmd response: success
2,689,844 UART:
2,689,860 UART: Running Caliptra FMC ...
2,690,268 UART:
2,690,411 UART: [state] CFI Enabled
2,700,888 UART: [fht] FMC Alias Private Key: 7
2,808,339 UART: [art] Extend RT PCRs Done
2,808,767 UART: [art] Lock RT PCRs Done
2,810,345 UART: [art] Populate DV Done
2,818,368 UART: [fht] FMC Alias Private Key: 7
2,819,316 UART: [art] Derive CDI
2,819,596 UART: [art] Store in in slot 0x4
2,905,179 UART: [art] Derive Key Pair
2,905,539 UART: [art] Store priv key in slot 0x5
2,919,337 UART: [art] Derive Key Pair - Done
2,934,194 UART: [art] Signing Cert with AUTHO
2,934,674 UART: RITY.KEYID = 7
2,950,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,975 UART: [art] PUB.X = F482AB359D23BBFC8FA1FEF1161E6B0A9C62AC1B850CC03538C66850322DB37B518782E4FC7020B1E5A447419AD77228
2,957,745 UART: [art] PUB.Y = 4EE23455CAAEBB6740BDDC692A8BD60CE5106B2474ED010AD2D2C3D55C20EBD48614887292A892F517E6FA9D17467625
2,964,694 UART: [art] SIG.R = 0933EA427FD9014C363AB99DAF6BC595CB3BE99967B24B735365CFE01FAC6E906A61F2019696031EAB667AA906FCF327
2,971,457 UART: [art] SIG.S = E59432A867BF86FC88F9F2BEFC23F32B05D852C4BF9C543CFF2C5368244D9DCBA3DBE205917F8EB779F034F449374359
2,996,038 UART: Caliptra RT
2,996,384 UART: [state] CFI Enabled
3,105,094 UART: [rt] RT listening for mailbox commands...
3,105,764 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,671 UART: [rt]cmd =0x52564348, len=36
3,136,950 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 ready_for_fw is high
1,174,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,133 UART: [idev] Sha1 KeyId Algorithm
1,206,997 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,696 UART: [ldev] Erasing FE.KEYID = 1
1,240,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,520 UART: [ldev] --
1,279,880 UART: [fwproc] Wait for Commands...
1,280,457 UART: [fwproc] Recv command 0x46574c44
1,281,190 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,126 >>> mbox cmd response: success
2,772,365 UART: [afmc] ++
2,772,533 UART: [afmc] CDI.KEYID = 6
2,772,896 UART: [afmc] SUBJECT.KEYID = 7
2,773,322 UART: [afmc] AUTHORITY.KEYID = 5
2,808,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,198 UART: [afmc] --
2,852,078 UART: [cold-reset] --
2,853,032 UART: [state] Locking Datavault
2,854,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,909 UART: [state] Locking ICCM
2,855,461 UART: [exit] Launching FMC @ 0x40000130
2,860,790 UART:
2,860,806 UART: Running Caliptra FMC ...
2,861,214 UART:
2,861,268 UART: [state] CFI Enabled
2,871,991 UART: [fht] FMC Alias Private Key: 7
2,980,218 UART: [art] Extend RT PCRs Done
2,980,646 UART: [art] Lock RT PCRs Done
2,982,360 UART: [art] Populate DV Done
2,990,505 UART: [fht] FMC Alias Private Key: 7
2,991,609 UART: [art] Derive CDI
2,991,889 UART: [art] Store in in slot 0x4
3,077,200 UART: [art] Derive Key Pair
3,077,560 UART: [art] Store priv key in slot 0x5
3,090,882 UART: [art] Derive Key Pair - Done
3,105,695 UART: [art] Signing Cert with AUTHO
3,106,175 UART: RITY.KEYID = 7
3,121,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,940 UART: [art] PUB.X = 7E714D6C8218FD5C5FD53FE116756CE06F8E027F909935BD3F38542CA56E84A2881905ADF5954271E0A4C0CA8ABB83D6
3,128,710 UART: [art] PUB.Y = CA6F6A3F888F5C73959A47E80F356B07D9B143C1EC82B1AA16CAD637D4687A39E2BEE3F89918EFA475DE48766E6C69EB
3,135,668 UART: [art] SIG.R = 24FF53CADC91536137B82BEA3EB6262A7C3745C1CCAE079D623A7A926E76134F8B5A5B9BC242A34D608A1D7222DAC69E
3,142,447 UART: [art] SIG.S = B46959B10A92D7A3E562B1924A283423D118522A4088AB11B4894EDC572FC08950F1A6D68FF3AF219938B49AAADAA782
3,166,211 UART: Caliptra RT
3,166,465 UART: [state] CFI Enabled
3,273,197 UART: [rt] RT listening for mailbox commands...
3,273,867 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,564 UART: [rt]cmd =0x52564348, len=36
3,305,049 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,620 ready_for_fw is high
1,055,620 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,670 >>> mbox cmd response: success
2,684,388 UART:
2,684,404 UART: Running Caliptra FMC ...
2,684,812 UART:
2,684,866 UART: [state] CFI Enabled
2,695,341 UART: [fht] FMC Alias Private Key: 7
2,803,748 UART: [art] Extend RT PCRs Done
2,804,176 UART: [art] Lock RT PCRs Done
2,805,718 UART: [art] Populate DV Done
2,813,785 UART: [fht] FMC Alias Private Key: 7
2,814,899 UART: [art] Derive CDI
2,815,179 UART: [art] Store in in slot 0x4
2,901,102 UART: [art] Derive Key Pair
2,901,462 UART: [art] Store priv key in slot 0x5
2,914,750 UART: [art] Derive Key Pair - Done
2,929,685 UART: [art] Signing Cert with AUTHO
2,930,165 UART: RITY.KEYID = 7
2,945,211 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,976 UART: [art] PUB.X = D84F589E80118A9533B92077477D95AE91181CBB78F1AF3449DC1F288654C76AD5EF3A4941140E699F2877B18EE27639
2,952,737 UART: [art] PUB.Y = 87384036534DE9C20B6963F84B6A2BA90E6F840C5E429F571867C3876A18C3C5760C4415DE2E5808D6A3DF4E90074114
2,959,661 UART: [art] SIG.R = 5E77BAB4941B8EA31C4D27A554E2B092E6AC0BACFA97E13ED83EA76D65351828999F2AF07557C62EA8A7CB5DCFFF5CF5
2,966,450 UART: [art] SIG.S = 76DCA12142E087309DAFC5A3D279F7714CD4FDEBD229661EEAC49DE197BC7B5FF53DFDE19F09D523C900765367054019
2,989,947 UART: Caliptra RT
2,990,201 UART: [state] CFI Enabled
3,097,583 UART: [rt] RT listening for mailbox commands...
3,098,253 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,088 UART: [rt]cmd =0x52564348, len=36
3,129,361 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,765 UART: [kat] HMAC-384Kdf
921,549 UART: [kat] LMS
1,169,861 UART: [kat] --
1,170,894 UART: [cold-reset] ++
1,171,286 UART: [fht] FHT @ 0x50003400
1,173,912 UART: [idev] ++
1,174,080 UART: [idev] CDI.KEYID = 6
1,174,441 UART: [idev] SUBJECT.KEYID = 7
1,174,866 UART: [idev] UDS.KEYID = 0
1,175,212 ready_for_fw is high
1,175,212 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,104 UART: [idev] Erasing UDS.KEYID = 0
1,200,640 UART: [idev] Sha1 KeyId Algorithm
1,209,636 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,375 UART: [ldev] SUBJECT.KEYID = 5
1,211,802 UART: [ldev] AUTHORITY.KEYID = 7
1,212,265 UART: [ldev] FE.KEYID = 1
1,217,925 UART: [ldev] Erasing FE.KEYID = 1
1,244,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,607 UART: [ldev] --
1,283,949 UART: [fwproc] Wait for Commands...
1,284,730 UART: [fwproc] Recv command 0x46574c44
1,285,463 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,959 >>> mbox cmd response: success
2,778,204 UART: [afmc] ++
2,778,372 UART: [afmc] CDI.KEYID = 6
2,778,735 UART: [afmc] SUBJECT.KEYID = 7
2,779,161 UART: [afmc] AUTHORITY.KEYID = 5
2,814,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,819 UART: [afmc] --
2,857,723 UART: [cold-reset] --
2,858,525 UART: [state] Locking Datavault
2,859,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,014 UART: [state] Locking ICCM
2,860,458 UART: [exit] Launching FMC @ 0x40000130
2,865,787 UART:
2,865,803 UART: Running Caliptra FMC ...
2,866,211 UART:
2,866,354 UART: [state] CFI Enabled
2,876,933 UART: [fht] FMC Alias Private Key: 7
2,985,044 UART: [art] Extend RT PCRs Done
2,985,472 UART: [art] Lock RT PCRs Done
2,987,262 UART: [art] Populate DV Done
2,995,507 UART: [fht] FMC Alias Private Key: 7
2,996,657 UART: [art] Derive CDI
2,996,937 UART: [art] Store in in slot 0x4
3,082,988 UART: [art] Derive Key Pair
3,083,348 UART: [art] Store priv key in slot 0x5
3,096,110 UART: [art] Derive Key Pair - Done
3,111,113 UART: [art] Signing Cert with AUTHO
3,111,593 UART: RITY.KEYID = 7
3,126,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,660 UART: [art] PUB.X = 9B756B1B3F0B1EFBC0E732FE7147CDC5536ECAB2C7D29750BB0492DF89C41D34B5D9645C68FA15734B447BEAACB59DDE
3,134,446 UART: [art] PUB.Y = F4A827B2251AB9A9A9A18E36366902E25FE6A4EC3367F0CDF6CC13C6E696C22D8ECE649FE381BEC67EE6E1C3F1ADAC45
3,141,415 UART: [art] SIG.R = 0E9FB5FC9ADBD175A637CF884B60CC91A2F5A553DF2964393AE183730E064829F25C5608CC9EAF3326F06A321120AE18
3,148,179 UART: [art] SIG.S = 4C3EC4B9C65907759CB7886C97DA4A0A802C25290276AA745BEBD5BD024B7F10F066A096CB4BCCA0645DABDD687B9DB9
3,171,632 UART: Caliptra RT
3,171,978 UART: [state] CFI Enabled
3,279,600 UART: [rt] RT listening for mailbox commands...
3,280,270 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,967 UART: [rt]cmd =0x52564348, len=36
3,311,638 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,367 ready_for_fw is high
1,056,367 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,741 >>> mbox cmd response: success
2,684,987 UART:
2,685,003 UART: Running Caliptra FMC ...
2,685,411 UART:
2,685,554 UART: [state] CFI Enabled
2,696,009 UART: [fht] FMC Alias Private Key: 7
2,804,276 UART: [art] Extend RT PCRs Done
2,804,704 UART: [art] Lock RT PCRs Done
2,806,444 UART: [art] Populate DV Done
2,814,629 UART: [fht] FMC Alias Private Key: 7
2,815,761 UART: [art] Derive CDI
2,816,041 UART: [art] Store in in slot 0x4
2,901,916 UART: [art] Derive Key Pair
2,902,276 UART: [art] Store priv key in slot 0x5
2,915,640 UART: [art] Derive Key Pair - Done
2,930,571 UART: [art] Signing Cert with AUTHO
2,931,051 UART: RITY.KEYID = 7
2,946,285 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,050 UART: [art] PUB.X = 147E1B395B432E6E06729FA69E0935EC36BD11914869A561FAD255B501E179678BCFD644D7DF93329DBE751790772325
2,953,805 UART: [art] PUB.Y = CD9E34755FB4F34959A67AD4A81FA3CAAB61A954B513953E38DE5EB74CF76CA6824F339C78B2C3C9811F9BB1C4925762
2,960,765 UART: [art] SIG.R = A44A3F40F40231DBED0969333FD0F20BF21EE4C5ABF996C4BDF1EA11736F2972CEE55B6D00134AE29D2D83AC51799EE7
2,967,520 UART: [art] SIG.S = F278B1D58353210FD836667E5188DA419EDB6CBAF9380FDF3BB3AEE78AC02AC15B263E11C4CCEC59DCA05FD08AFCF5B5
2,991,123 UART: Caliptra RT
2,991,469 UART: [state] CFI Enabled
3,100,532 UART: [rt] RT listening for mailbox commands...
3,101,202 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,933 UART: [rt]cmd =0x52564348, len=36
3,132,464 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,497 writing to cptra_bootfsm_go
192,693 UART:
193,047 UART: Running Caliptra ROM ...
194,238 UART:
194,385 UART: [state] CFI Enabled
262,856 UART: [state] LifecycleState = Unprovisioned
264,844 UART: [state] DebugLocked = No
267,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,311 UART: [kat] SHA2-256
441,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,466 UART: [kat] ++
452,063 UART: [kat] sha1
462,889 UART: [kat] SHA2-256
465,574 UART: [kat] SHA2-384
472,249 UART: [kat] SHA2-512-ACC
474,622 UART: [kat] ECC-384
2,769,600 UART: [kat] HMAC-384Kdf
2,801,038 UART: [kat] LMS
3,991,367 UART: [kat] --
3,994,455 UART: [cold-reset] ++
3,995,529 UART: [fht] Storing FHT @ 0x50003400
4,007,162 UART: [idev] ++
4,007,732 UART: [idev] CDI.KEYID = 6
4,008,758 UART: [idev] SUBJECT.KEYID = 7
4,009,927 UART: [idev] UDS.KEYID = 0
4,010,964 ready_for_fw is high
4,011,156 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,568 UART: [idev] Erasing UDS.KEYID = 0
7,346,635 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,711 UART: [idev] --
7,372,696 UART: [ldev] ++
7,373,253 UART: [ldev] CDI.KEYID = 6
7,374,314 UART: [ldev] SUBJECT.KEYID = 5
7,375,462 UART: [ldev] AUTHORITY.KEYID = 7
7,376,682 UART: [ldev] FE.KEYID = 1
7,423,266 UART: [ldev] Erasing FE.KEYID = 1
10,754,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,869 UART: [ldev] --
13,115,924 UART: [fwproc] Waiting for Commands...
13,118,387 UART: [fwproc] Received command 0x46574c44
13,120,633 UART: [fwproc] Received Image of size 114036 bytes
17,172,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,639,636 >>> mbox cmd response: success
17,644,232 UART: [afmc] ++
17,644,817 UART: [afmc] CDI.KEYID = 6
17,645,828 UART: [afmc] SUBJECT.KEYID = 7
17,646,979 UART: [afmc] AUTHORITY.KEYID = 5
21,007,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,015 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,272 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,672 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,549 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,992 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,337 UART: [afmc] --
23,377,541 UART: [cold-reset] --
23,382,159 UART: [state] Locking Datavault
23,386,645 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,340 UART: [state] Locking ICCM
23,389,807 UART: [exit] Launching FMC @ 0x40000130
23,398,196 UART:
23,398,430 UART: Running Caliptra FMC ...
23,399,450 UART:
23,399,590 UART: [state] CFI Enabled
23,467,637 UART: [fht] FMC Alias Private Key: 7
25,805,609 UART: [art] Extend RT PCRs Done
25,806,819 UART: [art] Lock RT PCRs Done
25,808,625 UART: [art] Populate DV Done
25,814,080 UART: [fht] FMC Alias Private Key: 7
25,815,560 UART: [art] Derive CDI
25,816,313 UART: [art] Store in in slot 0x4
25,875,476 UART: [art] Derive Key Pair
25,876,512 UART: [art] Store priv key in slot 0x5
29,169,274 UART: [art] Derive Key Pair - Done
29,182,597 UART: [art] Signing Cert with AUTHO
29,183,893 UART: RITY.KEYID = 7
31,470,901 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,407 UART: [art] PUB.X = E8E62AAF8490C3B5E73011C80FBABED220EDE631D8A4B1233B4D5E25796C9C0C6BC5066762BAD0BC2C9285979A32AC1C
31,479,679 UART: [art] PUB.Y = 50D1935285FD1FC27F7A5F064DD0099195FD2D43A2AAB539CD612D2149CB4A94316E4E28C53498720E808680BFB9DA29
31,486,925 UART: [art] SIG.R = EB218EFF9CE5AE8A2E6AD533817682EDE66A80D91E4D3A3141323E695782D860E2D6AADA68D19648E180B230DD9495D1
31,494,288 UART: [art] SIG.S = E832D51BE37E8328E25C9C2190BB68432D7757464094BF90F68D07BA8153BF536245B1BD19776F5879181072CCE2CEE4
32,798,910 UART: Caliptra RT
32,799,610 UART: [state] CFI Enabled
32,959,266 UART: [rt] RT listening for mailbox commands...
32,961,161 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,991,836 UART: [rt]cmd =0x53574545, len=84
32,993,474 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,783,881 ready_for_fw is high
3,784,290 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,873,046 >>> mbox cmd response: success
23,563,655 UART:
23,564,091 UART: Running Caliptra FMC ...
23,565,208 UART:
23,565,375 UART: [state] CFI Enabled
23,615,624 UART: [fht] FMC Alias Private Key: 7
25,953,401 UART: [art] Extend RT PCRs Done
25,954,624 UART: [art] Lock RT PCRs Done
25,956,226 UART: [art] Populate DV Done
25,961,583 UART: [fht] FMC Alias Private Key: 7
25,963,169 UART: [art] Derive CDI
25,963,895 UART: [art] Store in in slot 0x4
26,024,285 UART: [art] Derive Key Pair
26,025,323 UART: [art] Store priv key in slot 0x5
29,317,933 UART: [art] Derive Key Pair - Done
29,331,211 UART: [art] Signing Cert with AUTHO
29,332,511 UART: RITY.KEYID = 7
31,620,598 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,103 UART: [art] PUB.X = E0B95D58FD570C42505DFFA15E4159E0E60EDD54DAC814D6D70B5C00FAA52D270D7047C93DC2552FDE807AC5DE886871
31,629,418 UART: [art] PUB.Y = 115E5BC25BB8ECE86495BEA7B963B6DD1834FC3E33F3D9D9EE5E163DCC78C6CAE5B6377245223E259D3BE220632DAD2E
31,636,694 UART: [art] SIG.R = 874344928412B9D8EE0B2F09B623117C308845494A92A5E63909D40D8AFFF331D48CA853D820B7DF73B04C5B99FDCA17
31,644,070 UART: [art] SIG.S = C3D8D80A7C88DB814F393BD76293BF80900648D55A9E446A6E7945ACEC167028436314D1726687D64B80AE1902773A70
32,949,537 UART: Caliptra RT
32,950,255 UART: [state] CFI Enabled
33,110,242 UART: [rt] RT listening for mailbox commands...
33,112,139 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,142,762 UART: [rt]cmd =0x53574545, len=84
33,144,823 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,432 UART:
192,789 UART: Running Caliptra ROM ...
193,874 UART:
603,511 UART: [state] CFI Enabled
619,456 UART: [state] LifecycleState = Unprovisioned
621,334 UART: [state] DebugLocked = No
624,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,371 UART: [kat] SHA2-256
799,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,705 UART: [kat] ++
810,153 UART: [kat] sha1
820,262 UART: [kat] SHA2-256
822,957 UART: [kat] SHA2-384
829,944 UART: [kat] SHA2-512-ACC
832,310 UART: [kat] ECC-384
3,118,605 UART: [kat] HMAC-384Kdf
3,130,335 UART: [kat] LMS
4,320,430 UART: [kat] --
4,324,988 UART: [cold-reset] ++
4,325,929 UART: [fht] Storing FHT @ 0x50003400
4,337,235 UART: [idev] ++
4,337,837 UART: [idev] CDI.KEYID = 6
4,338,734 UART: [idev] SUBJECT.KEYID = 7
4,339,981 UART: [idev] UDS.KEYID = 0
4,340,970 ready_for_fw is high
4,341,192 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,323 UART: [idev] Erasing UDS.KEYID = 0
7,625,999 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,549 UART: [idev] --
7,650,354 UART: [ldev] ++
7,650,927 UART: [ldev] CDI.KEYID = 6
7,651,942 UART: [ldev] SUBJECT.KEYID = 5
7,653,100 UART: [ldev] AUTHORITY.KEYID = 7
7,654,333 UART: [ldev] FE.KEYID = 1
7,665,032 UART: [ldev] Erasing FE.KEYID = 1
10,956,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,879 UART: [ldev] --
13,314,878 UART: [fwproc] Waiting for Commands...
13,317,396 UART: [fwproc] Received command 0x46574c44
13,319,577 UART: [fwproc] Received Image of size 114036 bytes
17,370,021 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,401 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,538 >>> mbox cmd response: success
17,835,557 UART: [afmc] ++
17,836,154 UART: [afmc] CDI.KEYID = 6
17,837,067 UART: [afmc] SUBJECT.KEYID = 7
17,838,286 UART: [afmc] AUTHORITY.KEYID = 5
21,154,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,758 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,151 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,975 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,413 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,559 UART: [afmc] --
23,520,100 UART: [cold-reset] --
23,522,122 UART: [state] Locking Datavault
23,527,690 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,442 UART: [state] Locking ICCM
23,531,080 UART: [exit] Launching FMC @ 0x40000130
23,539,474 UART:
23,539,720 UART: Running Caliptra FMC ...
23,540,822 UART:
23,540,982 UART: [state] CFI Enabled
23,548,990 UART: [fht] FMC Alias Private Key: 7
25,879,217 UART: [art] Extend RT PCRs Done
25,880,430 UART: [art] Lock RT PCRs Done
25,882,105 UART: [art] Populate DV Done
25,887,838 UART: [fht] FMC Alias Private Key: 7
25,889,316 UART: [art] Derive CDI
25,890,076 UART: [art] Store in in slot 0x4
25,932,616 UART: [art] Derive Key Pair
25,933,813 UART: [art] Store priv key in slot 0x5
29,175,958 UART: [art] Derive Key Pair - Done
29,188,955 UART: [art] Signing Cert with AUTHO
29,190,293 UART: RITY.KEYID = 7
31,469,946 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,458 UART: [art] PUB.X = 368E0B8DFBE82420D0BE0C6DA48DD53DCAD877A247571E4DC8219EEBA68D4D468C17FFE96A4136DE17518B72706F8DDB
31,478,739 UART: [art] PUB.Y = 0EB2048629E418B637D4A6CFB5E837EBCB23FA6DB6781713AAAB5BD6196CEF4BF62A6342570D7840CF2199CB9652CAFA
31,485,996 UART: [art] SIG.R = 106FE2B302C9EE191C1F4B7CF66B10CC79937C57D3EA41D20D02333483D531F1CF1CC6FA1209CDE493B02D316BB17781
31,493,397 UART: [art] SIG.S = E7F3C870AEDC8B81C9BC3F3F5B3F21FA2D0B1C74F6EA6161A8B2034D2B15734F9D1F725C29484E8CA75830954062C24B
32,798,832 UART: Caliptra RT
32,799,538 UART: [state] CFI Enabled
32,917,167 UART: [rt] RT listening for mailbox commands...
32,919,062 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,949,524 UART: [rt]cmd =0x53574545, len=84
32,951,439 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,125,686 ready_for_fw is high
4,126,299 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,069,962 >>> mbox cmd response: success
23,714,597 UART:
23,715,006 UART: Running Caliptra FMC ...
23,716,152 UART:
23,716,314 UART: [state] CFI Enabled
23,724,527 UART: [fht] FMC Alias Private Key: 7
26,055,455 UART: [art] Extend RT PCRs Done
26,056,674 UART: [art] Lock RT PCRs Done
26,058,572 UART: [art] Populate DV Done
26,064,317 UART: [fht] FMC Alias Private Key: 7
26,065,867 UART: [art] Derive CDI
26,066,630 UART: [art] Store in in slot 0x4
26,109,292 UART: [art] Derive Key Pair
26,110,336 UART: [art] Store priv key in slot 0x5
29,352,251 UART: [art] Derive Key Pair - Done
29,365,308 UART: [art] Signing Cert with AUTHO
29,366,629 UART: RITY.KEYID = 7
31,645,837 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,337 UART: [art] PUB.X = 77061CE92A96C83AF3440600892EF9582B12C9B20A770CD63394766D7B3CABFA2FBF2515AADAAF3A5FFD090EACB50985
31,654,620 UART: [art] PUB.Y = BE7CD00FC77C85C692FA16FDC08C93D4D1E1B239FBED2BBE4FF9162B16F95EA6978C0A9DED47C2666A4DBAA11C85D872
31,661,880 UART: [art] SIG.R = 90AE1FD5DFB19D52FF9B28AA235CFDDCAFD40DFF10669E54840E6A0C08DBDDF971260912C73B56D4A6B592E91A17D465
31,669,288 UART: [art] SIG.S = 44749228B6BB7ECE4E732A876E98F6839832EAEACB578E182F61785B01B2C81C1ABBEECC67923992587CBC8CCD5BB624
32,974,471 UART: Caliptra RT
32,975,179 UART: [state] CFI Enabled
33,093,610 UART: [rt] RT listening for mailbox commands...
33,095,517 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,126,149 UART: [rt]cmd =0x53574545, len=84
33,127,748 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,633 UART:
193,006 UART: Running Caliptra ROM ...
194,230 UART:
194,390 UART: [state] CFI Enabled
262,562 UART: [state] LifecycleState = Unprovisioned
264,477 UART: [state] DebugLocked = No
266,292 UART: [state] WD Timer not started. Device not locked for debugging
269,675 UART: [kat] SHA2-256
448,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,392 UART: [kat] ++
460,928 UART: [kat] sha1
473,014 UART: [kat] SHA2-256
476,093 UART: [kat] SHA2-384
482,440 UART: [kat] SHA2-512-ACC
485,384 UART: [kat] ECC-384
2,947,518 UART: [kat] HMAC-384Kdf
2,970,879 UART: [kat] LMS
3,500,362 UART: [kat] --
3,502,886 UART: [cold-reset] ++
3,505,033 UART: [fht] FHT @ 0x50003400
3,516,649 UART: [idev] ++
3,517,211 UART: [idev] CDI.KEYID = 6
3,518,168 UART: [idev] SUBJECT.KEYID = 7
3,519,343 UART: [idev] UDS.KEYID = 0
3,520,317 ready_for_fw is high
3,520,521 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,423 UART: [idev] Erasing UDS.KEYID = 0
6,027,579 UART: [idev] Sha1 KeyId Algorithm
6,050,705 UART: [idev] --
6,053,439 UART: [ldev] ++
6,054,019 UART: [ldev] CDI.KEYID = 6
6,054,911 UART: [ldev] SUBJECT.KEYID = 5
6,055,985 UART: [ldev] AUTHORITY.KEYID = 7
6,057,323 UART: [ldev] FE.KEYID = 1
6,101,124 UART: [ldev] Erasing FE.KEYID = 1
8,604,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,694 UART: [ldev] --
10,411,740 UART: [fwproc] Wait for Commands...
10,414,967 UART: [fwproc] Recv command 0x46574c44
10,417,002 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,273,380 >>> mbox cmd response: success
14,277,481 UART: [afmc] ++
14,278,080 UART: [afmc] CDI.KEYID = 6
14,278,987 UART: [afmc] SUBJECT.KEYID = 7
14,280,090 UART: [afmc] AUTHORITY.KEYID = 5
16,802,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,271 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,927 UART: [afmc] --
18,603,876 UART: [cold-reset] --
18,608,162 UART: [state] Locking Datavault
18,614,653 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,462 UART: [state] Locking ICCM
18,617,733 UART: [exit] Launching FMC @ 0x40000130
18,626,190 UART:
18,626,478 UART: Running Caliptra FMC ...
18,627,554 UART:
18,627,709 UART: [state] CFI Enabled
18,687,851 UART: [fht] FMC Alias Private Key: 7
20,451,543 UART: [art] Extend RT PCRs Done
20,452,766 UART: [art] Lock RT PCRs Done
20,454,662 UART: [art] Populate DV Done
20,460,183 UART: [fht] FMC Alias Private Key: 7
20,461,775 UART: [art] Derive CDI
20,462,588 UART: [art] Store in in slot 0x4
20,520,275 UART: [art] Derive Key Pair
20,521,266 UART: [art] Store priv key in slot 0x5
22,983,720 UART: [art] Derive Key Pair - Done
22,996,500 UART: [art] Signing Cert with AUTHO
22,997,802 UART: RITY.KEYID = 7
24,710,757 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,262 UART: [art] PUB.X = FE32AA30989857C6FACA96E5FF5E61D1F2BCCBF8781CA55F8348FB7BA551CC22E4DF6C72A2F9E9E80A0799C7A6298D9B
24,719,557 UART: [art] PUB.Y = 25A0794FE48C6A1ED58CAA690FFD77C33ED0B651E4F895E239A41F7D1B67DECF0C625FDFFC1D905E5A5FC215EDD5215E
24,726,826 UART: [art] SIG.R = 8251BC82D04546A0C97474897A8903E07E6D76667172BA63EC6D0CD5D92B4E473BA8662EA737B680FE0BFF0D62C10292
24,734,248 UART: [art] SIG.S = 8A15F8288F94B367DA16FD3E6544803D9CD9286D3068ED817897D3961226E0443BBBF2104E2EB8162B637ED1E7485E21
25,712,880 UART: Caliptra RT
25,713,579 UART: [state] CFI Enabled
25,879,404 UART: [rt] RT listening for mailbox commands...
25,881,295 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,911,929 UART: [rt]cmd =0x53574545, len=84
25,913,936 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,381 writing to cptra_bootfsm_go
193,521 UART:
193,893 UART: Running Caliptra ROM ...
195,087 UART:
195,256 UART: [state] CFI Enabled
264,318 UART: [state] LifecycleState = Unprovisioned
266,737 UART: [state] DebugLocked = No
268,365 UART: [state] WD Timer not started. Device not locked for debugging
273,048 UART: [kat] SHA2-256
462,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,715 UART: [kat] ++
474,191 UART: [kat] sha1
486,927 UART: [kat] SHA2-256
489,905 UART: [kat] SHA2-384
496,897 UART: [kat] SHA2-512-ACC
499,486 UART: [kat] ECC-384
2,947,966 UART: [kat] HMAC-384Kdf
2,973,283 UART: [kat] LMS
3,505,058 UART: [kat] --
3,508,226 UART: [cold-reset] ++
3,509,521 UART: [fht] FHT @ 0x50003400
3,521,358 UART: [idev] ++
3,522,200 UART: [idev] CDI.KEYID = 6
3,523,120 UART: [idev] SUBJECT.KEYID = 7
3,524,181 UART: [idev] UDS.KEYID = 0
3,525,075 ready_for_fw is high
3,525,280 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,061 UART: [idev] Erasing UDS.KEYID = 0
6,030,979 UART: [idev] Sha1 KeyId Algorithm
6,053,351 UART: [idev] --
6,059,351 UART: [ldev] ++
6,060,037 UART: [ldev] CDI.KEYID = 6
6,060,951 UART: [ldev] SUBJECT.KEYID = 5
6,062,052 UART: [ldev] AUTHORITY.KEYID = 7
6,063,346 UART: [ldev] FE.KEYID = 1
6,100,410 UART: [ldev] Erasing FE.KEYID = 1
8,607,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,485 UART: [ldev] --
10,413,359 UART: [fwproc] Wait for Commands...
10,415,514 UART: [fwproc] Recv command 0x46574c44
10,417,771 UART: [fwproc] Recv'd Img size: 114360 bytes
13,866,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,602,356 >>> mbox cmd response: success
14,606,537 UART: [afmc] ++
14,607,252 UART: [afmc] CDI.KEYID = 6
14,608,500 UART: [afmc] SUBJECT.KEYID = 7
14,609,935 UART: [afmc] AUTHORITY.KEYID = 5
17,154,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,377 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,446 UART: [afmc] --
18,971,805 UART: [cold-reset] --
18,974,972 UART: [state] Locking Datavault
18,980,606 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,757 UART: [state] Locking ICCM
18,984,676 UART: [exit] Launching FMC @ 0x40000130
18,993,352 UART:
18,993,596 UART: Running Caliptra FMC ...
18,994,623 UART:
18,994,768 UART: [state] CFI Enabled
19,054,642 UART: [fht] FMC Alias Private Key: 7
20,818,254 UART: [art] Extend RT PCRs Done
20,819,492 UART: [art] Lock RT PCRs Done
20,821,304 UART: [art] Populate DV Done
20,826,721 UART: [fht] FMC Alias Private Key: 7
20,828,206 UART: [art] Derive CDI
20,828,969 UART: [art] Store in in slot 0x4
20,887,674 UART: [art] Derive Key Pair
20,888,714 UART: [art] Store priv key in slot 0x5
23,351,756 UART: [art] Derive Key Pair - Done
23,364,790 UART: [art] Signing Cert with AUTHO
23,366,118 UART: RITY.KEYID = 7
25,076,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,333 UART: [art] PUB.X = 95C459316A11EE4569996FD96D9E03C5C42801D94AC1370ABF8591FBDD4AF15060CD111D37E096711A5F84A49A0A65AE
25,085,561 UART: [art] PUB.Y = 39C4942B65FE75E601CE3F07CD5BDA3CAA02DBC06CBB217E732E09687099EBF49415263803708A2809DB421A04963920
25,092,825 UART: [art] SIG.R = D6DE3B43DBDADA696744C9A625244181C8CE68F60AA5957542A4B2A51555262028A616D206D909BA57E929D073E5B35E
25,100,177 UART: [art] SIG.S = 0A12B095AD492B9F427DA35F5581A4AB7E835CC092782D802DB593D16F3C15F1DFDBD0137D0ADC0ADC39BE8969AAA017
26,078,941 UART: Caliptra RT
26,079,669 UART: [state] CFI Enabled
26,244,162 UART: [rt] RT listening for mailbox commands...
26,246,057 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,276,576 UART: [rt]cmd =0x53574545, len=84
26,278,601 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,438,975 ready_for_fw is high
3,439,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,710,244 >>> mbox cmd response: success
19,009,154 UART:
19,009,568 UART: Running Caliptra FMC ...
19,010,780 UART:
19,010,959 UART: [state] CFI Enabled
19,076,158 UART: [fht] FMC Alias Private Key: 7
20,840,913 UART: [art] Extend RT PCRs Done
20,842,142 UART: [art] Lock RT PCRs Done
20,843,982 UART: [art] Populate DV Done
20,849,234 UART: [fht] FMC Alias Private Key: 7
20,850,833 UART: [art] Derive CDI
20,851,647 UART: [art] Store in in slot 0x4
20,908,968 UART: [art] Derive Key Pair
20,910,013 UART: [art] Store priv key in slot 0x5
23,372,517 UART: [art] Derive Key Pair - Done
23,385,312 UART: [art] Signing Cert with AUTHO
23,386,673 UART: RITY.KEYID = 7
25,098,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,722 UART: [art] PUB.X = 6918555C972C92D2A13A6E3F7909228FFC13F0052A95891835E2F91622F8D38E8CEFCAAB91E3FCEC146CB3C7AB3F5E9D
25,107,006 UART: [art] PUB.Y = 314F8519513E8B28ED8081150C644D2466D319256E96F749B98CFC8DDB1C45425E80F30544A5B1A28BB9E00076F5648F
25,114,193 UART: [art] SIG.R = 1E1342FD0CB1AE0FE99C8BC7049F739D61A7BC9014C990C8EAF553A31DC0DD9D69BD18A6842FA9274124857E87C38F0C
25,121,619 UART: [art] SIG.S = C4E664333FF032C3397CD76AA1747756CF52C4B015186F3E01D5DCB221ABE70CE020C1CB9C9AEF4D4F987D7ECB1C0C2F
26,100,728 UART: Caliptra RT
26,101,447 UART: [state] CFI Enabled
26,265,289 UART: [rt] RT listening for mailbox commands...
26,267,179 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,297,686 UART: [rt]cmd =0x53574545, len=84
26,299,396 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,565 UART:
192,934 UART: Running Caliptra ROM ...
194,040 UART:
603,594 UART: [state] CFI Enabled
614,713 UART: [state] LifecycleState = Unprovisioned
617,031 UART: [state] DebugLocked = No
618,420 UART: [state] WD Timer not started. Device not locked for debugging
622,523 UART: [kat] SHA2-256
812,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,178 UART: [kat] ++
823,786 UART: [kat] sha1
835,373 UART: [kat] SHA2-256
838,443 UART: [kat] SHA2-384
845,372 UART: [kat] SHA2-512-ACC
847,958 UART: [kat] ECC-384
3,288,256 UART: [kat] HMAC-384Kdf
3,299,931 UART: [kat] LMS
3,831,735 UART: [kat] --
3,834,801 UART: [cold-reset] ++
3,836,659 UART: [fht] FHT @ 0x50003400
3,847,275 UART: [idev] ++
3,847,905 UART: [idev] CDI.KEYID = 6
3,848,886 UART: [idev] SUBJECT.KEYID = 7
3,850,058 UART: [idev] UDS.KEYID = 0
3,850,990 ready_for_fw is high
3,851,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,994,914 UART: [idev] Erasing UDS.KEYID = 0
6,331,080 UART: [idev] Sha1 KeyId Algorithm
6,354,151 UART: [idev] --
6,357,269 UART: [ldev] ++
6,357,844 UART: [ldev] CDI.KEYID = 6
6,358,753 UART: [ldev] SUBJECT.KEYID = 5
6,359,969 UART: [ldev] AUTHORITY.KEYID = 7
6,361,147 UART: [ldev] FE.KEYID = 1
6,372,387 UART: [ldev] Erasing FE.KEYID = 1
8,849,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,278 UART: [ldev] --
10,640,331 UART: [fwproc] Wait for Commands...
10,642,910 UART: [fwproc] Recv command 0x46574c44
10,645,213 UART: [fwproc] Recv'd Img size: 114360 bytes
14,092,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,830,905 >>> mbox cmd response: success
14,835,390 UART: [afmc] ++
14,836,097 UART: [afmc] CDI.KEYID = 6
14,837,257 UART: [afmc] SUBJECT.KEYID = 7
14,838,787 UART: [afmc] AUTHORITY.KEYID = 5
17,342,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,094 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,650 UART: [afmc] --
19,138,813 UART: [cold-reset] --
19,144,274 UART: [state] Locking Datavault
19,149,555 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,754 UART: [state] Locking ICCM
19,153,092 UART: [exit] Launching FMC @ 0x40000130
19,161,757 UART:
19,161,992 UART: Running Caliptra FMC ...
19,163,089 UART:
19,163,244 UART: [state] CFI Enabled
19,171,340 UART: [fht] FMC Alias Private Key: 7
20,928,066 UART: [art] Extend RT PCRs Done
20,929,292 UART: [art] Lock RT PCRs Done
20,930,968 UART: [art] Populate DV Done
20,936,328 UART: [fht] FMC Alias Private Key: 7
20,937,810 UART: [art] Derive CDI
20,938,568 UART: [art] Store in in slot 0x4
20,981,269 UART: [art] Derive Key Pair
20,982,307 UART: [art] Store priv key in slot 0x5
23,409,329 UART: [art] Derive Key Pair - Done
23,422,460 UART: [art] Signing Cert with AUTHO
23,423,758 UART: RITY.KEYID = 7
25,128,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,479 UART: [art] PUB.X = FF09BC5712CE6BD7F0CEE83C9304642F0DFCAA1E865F1B7168AC00750B6F404CD233815F7560C842B334AB02BBED35B1
25,137,859 UART: [art] PUB.Y = 7AED69A67CD14DAD158C47C2BF32D5CBD1845842F3172163C8AE782F1A1D923CE0A13E4BF35742A48F60AB44C7AD40C1
25,145,057 UART: [art] SIG.R = CF499C17F4D5EE77D9F0727A5BD5687F3BD3C1A2A86BC73D606A1F1413B2EEF7403E0ED35741EBDE919D63E370BA674B
25,152,463 UART: [art] SIG.S = F31E64F7C3FAB9C9EA0657FD375CAE407FE6A55D7575DAEC667B2A571E6D80B920A134281C601DC7029D2B9A5C199B4F
26,131,013 UART: Caliptra RT
26,131,719 UART: [state] CFI Enabled
26,248,919 UART: [rt] RT listening for mailbox commands...
26,250,810 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,281,419 UART: [rt]cmd =0x53574545, len=84
26,283,257 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,759,469 ready_for_fw is high
3,759,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,134 >>> mbox cmd response: success
19,210,236 UART:
19,210,649 UART: Running Caliptra FMC ...
19,211,773 UART:
19,211,945 UART: [state] CFI Enabled
19,219,996 UART: [fht] FMC Alias Private Key: 7
20,976,662 UART: [art] Extend RT PCRs Done
20,977,885 UART: [art] Lock RT PCRs Done
20,979,731 UART: [art] Populate DV Done
20,985,208 UART: [fht] FMC Alias Private Key: 7
20,986,750 UART: [art] Derive CDI
20,987,486 UART: [art] Store in in slot 0x4
21,030,299 UART: [art] Derive Key Pair
21,031,345 UART: [art] Store priv key in slot 0x5
23,457,992 UART: [art] Derive Key Pair - Done
23,470,983 UART: [art] Signing Cert with AUTHO
23,472,467 UART: RITY.KEYID = 7
25,178,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,715 UART: [art] PUB.X = 58B724A7A92135EE9ED37669F142F48D3AA61EA7E03E60816A7F0240D14831C492C826B8061581B1B03358792B21D310
25,186,980 UART: [art] PUB.Y = 91F15EEB7AA98F451F4B632B190E15FBF22FD01B321DF2CB5C550B77498F855068A996080B76BF8A54F884C7ED254DD6
25,194,252 UART: [art] SIG.R = 87B4F6B3B1282A04BE65A698AA86E37C3E21D07016EA08C3516881425A5DA9353264B45AEC074E9566A5422690B10CAF
25,201,596 UART: [art] SIG.S = 7CDC0E20DA7266913D5DA9B38EED29B8838F3B71C8C3BE2A7901CBF1970106EC33A6E76AB6C96E60629D8660FAD168B7
26,181,400 UART: Caliptra RT
26,182,131 UART: [state] CFI Enabled
26,298,943 UART: [rt] RT listening for mailbox commands...
26,300,846 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,331,328 UART: [rt]cmd =0x53574545, len=84
26,333,039 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,331 UART: [kat] SHA2-256
882,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,377 UART: [kat] ++
886,529 UART: [kat] sha1
890,887 UART: [kat] SHA2-256
892,825 UART: [kat] SHA2-384
895,786 UART: [kat] SHA2-512-ACC
897,687 UART: [kat] ECC-384
903,508 UART: [kat] HMAC-384Kdf
907,902 UART: [kat] LMS
1,476,098 UART: [kat] --
1,477,035 UART: [cold-reset] ++
1,477,603 UART: [fht] Storing FHT @ 0x50003400
1,480,454 UART: [idev] ++
1,480,622 UART: [idev] CDI.KEYID = 6
1,480,982 UART: [idev] SUBJECT.KEYID = 7
1,481,406 UART: [idev] UDS.KEYID = 0
1,481,751 ready_for_fw is high
1,481,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,434 UART: [idev] Erasing UDS.KEYID = 0
1,505,664 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,200 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,547,894 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,016 UART: [ldev] --
1,587,531 UART: [fwproc] Waiting for Commands...
1,588,314 UART: [fwproc] Received command 0x46574c44
1,589,105 UART: [fwproc] Received Image of size 114360 bytes
2,886,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,552 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,785 >>> mbox cmd response: success
3,079,979 UART: [afmc] ++
3,080,147 UART: [afmc] CDI.KEYID = 6
3,080,509 UART: [afmc] SUBJECT.KEYID = 7
3,080,934 UART: [afmc] AUTHORITY.KEYID = 5
3,115,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,019 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,904 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,594 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,687 UART: [afmc] --
3,159,713 UART: [cold-reset] --
3,160,683 UART: [state] Locking Datavault
3,161,696 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,300 UART: [state] Locking ICCM
3,162,906 UART: [exit] Launching FMC @ 0x40000130
3,168,235 UART:
3,168,251 UART: Running Caliptra FMC ...
3,168,659 UART:
3,168,713 UART: [state] CFI Enabled
3,179,042 UART: [fht] FMC Alias Private Key: 7
3,287,273 UART: [art] Extend RT PCRs Done
3,287,701 UART: [art] Lock RT PCRs Done
3,289,419 UART: [art] Populate DV Done
3,297,628 UART: [fht] FMC Alias Private Key: 7
3,298,764 UART: [art] Derive CDI
3,299,044 UART: [art] Store in in slot 0x4
3,384,945 UART: [art] Derive Key Pair
3,385,305 UART: [art] Store priv key in slot 0x5
3,399,143 UART: [art] Derive Key Pair - Done
3,414,159 UART: [art] Signing Cert with AUTHO
3,414,639 UART: RITY.KEYID = 7
3,430,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,874 UART: [art] PUB.X = E905C239243BBA48A71DC52CC9C1FBD828F616F2EF9C2644FD28D851EBFF39CF6F4867CF25A260E038BA4E7D20E67C68
3,437,657 UART: [art] PUB.Y = D31B7C3000E04E83C90891CEFD3401CCCB7908F040ACA5B6CE59DB2756C508D03D88C72C42510B7354EF3D852265DB3F
3,444,578 UART: [art] SIG.R = 0AC12A3E7CC676371BE97A5AEA62794CAB0C1653BFB214A75ECF35CEBD169819D0BB26B6C17F210FCDD362EA8914DBDA
3,451,363 UART: [art] SIG.S = A5295A504E2882B037017271FB4AF97BDCC19E6D3AA031EB97B558FBF94C05CCE97F9204BA80E1616828FE2C1B7C4315
3,475,501 UART: Caliptra RT
3,475,755 UART: [state] CFI Enabled
3,583,157 UART: [rt] RT listening for mailbox commands...
3,583,827 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,724 UART: [rt]cmd =0x53574545, len=84
3,614,988 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,935 ready_for_fw is high
1,361,935 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,987,835 UART:
2,987,851 UART: Running Caliptra FMC ...
2,988,259 UART:
2,988,313 UART: [state] CFI Enabled
2,998,984 UART: [fht] FMC Alias Private Key: 7
3,107,131 UART: [art] Extend RT PCRs Done
3,107,559 UART: [art] Lock RT PCRs Done
3,109,269 UART: [art] Populate DV Done
3,117,420 UART: [fht] FMC Alias Private Key: 7
3,118,388 UART: [art] Derive CDI
3,118,668 UART: [art] Store in in slot 0x4
3,204,591 UART: [art] Derive Key Pair
3,204,951 UART: [art] Store priv key in slot 0x5
3,218,097 UART: [art] Derive Key Pair - Done
3,233,075 UART: [art] Signing Cert with AUTHO
3,233,555 UART: RITY.KEYID = 7
3,248,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,084 UART: [art] PUB.X = E8419B1F1A0551231FBC2B9ADD5C381666DD615A0CCCACCD1FC397F036B6AFDC2CDA7C79E9A74081DB92421742A8CA2F
3,255,870 UART: [art] PUB.Y = 8B53CE5A457D557721919662AE43197247357A365962F422C5EBD488048F3C1830C72AF977FEEB468A942C4E37EF2B58
3,262,811 UART: [art] SIG.R = E075A9B607D01824FE33831D58A47861047E6F2DA1E8AED48DE4137A789A7235C0E59C1CF8768027E126186089323424
3,269,565 UART: [art] SIG.S = BCDBEDB482731753F78D6EF25A208A35F400550FF6D79FAE77237B8CB79D090348323E29AD3351C2E180B2C6813DF9D2
3,293,595 UART: Caliptra RT
3,293,849 UART: [state] CFI Enabled
3,401,558 UART: [rt] RT listening for mailbox commands...
3,402,228 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,307 UART: [rt]cmd =0x53574545, len=84
3,433,901 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,677 UART: [kat] SHA2-512-ACC
897,578 UART: [kat] ECC-384
903,143 UART: [kat] HMAC-384Kdf
907,897 UART: [kat] LMS
1,476,093 UART: [kat] --
1,476,998 UART: [cold-reset] ++
1,477,472 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 ready_for_fw is high
1,481,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,061 UART: [idev] Erasing UDS.KEYID = 0
1,506,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,783 UART: [idev] --
1,515,750 UART: [ldev] ++
1,515,918 UART: [ldev] CDI.KEYID = 6
1,516,281 UART: [ldev] SUBJECT.KEYID = 5
1,516,707 UART: [ldev] AUTHORITY.KEYID = 7
1,517,170 UART: [ldev] FE.KEYID = 1
1,522,176 UART: [ldev] Erasing FE.KEYID = 1
1,547,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,277 UART: [ldev] --
1,587,776 UART: [fwproc] Waiting for Commands...
1,588,581 UART: [fwproc] Received command 0x46574c44
1,589,372 UART: [fwproc] Received Image of size 114360 bytes
2,887,273 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,303 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,656 >>> mbox cmd response: success
3,080,680 UART: [afmc] ++
3,080,848 UART: [afmc] CDI.KEYID = 6
3,081,210 UART: [afmc] SUBJECT.KEYID = 7
3,081,635 UART: [afmc] AUTHORITY.KEYID = 5
3,116,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,880 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,608 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,493 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,183 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,860 UART: [afmc] --
3,159,936 UART: [cold-reset] --
3,160,872 UART: [state] Locking Datavault
3,161,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,295 UART: [state] Locking ICCM
3,162,895 UART: [exit] Launching FMC @ 0x40000130
3,168,224 UART:
3,168,240 UART: Running Caliptra FMC ...
3,168,648 UART:
3,168,791 UART: [state] CFI Enabled
3,179,552 UART: [fht] FMC Alias Private Key: 7
3,286,891 UART: [art] Extend RT PCRs Done
3,287,319 UART: [art] Lock RT PCRs Done
3,288,721 UART: [art] Populate DV Done
3,296,946 UART: [fht] FMC Alias Private Key: 7
3,297,916 UART: [art] Derive CDI
3,298,196 UART: [art] Store in in slot 0x4
3,383,819 UART: [art] Derive Key Pair
3,384,179 UART: [art] Store priv key in slot 0x5
3,397,509 UART: [art] Derive Key Pair - Done
3,412,271 UART: [art] Signing Cert with AUTHO
3,412,751 UART: RITY.KEYID = 7
3,427,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,612 UART: [art] PUB.X = 316658911B624E44F6101A593CB80E9CCDD4FB85595A49C71FBEDF2742EC179A355D114776038198F850287E7CD01222
3,435,370 UART: [art] PUB.Y = 09CE34C72C46A90EE62A0B4FA7D0EB45DD20FA563B99C64AAF055FECE7179C294A79410C06195BAE3B08B2D6F81C8F5C
3,442,317 UART: [art] SIG.R = B0BAD6261EFE61E05CC556509F36076D7DF30D0DC577659B62E616C24B833C7CDF339762619E68A79B7F9998CE7C8FB3
3,449,084 UART: [art] SIG.S = 0FBE702CB321C6DF039ED440D466B9B8E6A347F350C65E412CA890990B9E010278AC6904837847F05DDD0A4B00E834F4
3,472,898 UART: Caliptra RT
3,473,244 UART: [state] CFI Enabled
3,581,346 UART: [rt] RT listening for mailbox commands...
3,582,016 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,859 UART: [rt]cmd =0x53574545, len=84
3,613,483 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,362 ready_for_fw is high
1,363,362 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,686 >>> mbox cmd response: success
2,991,158 UART:
2,991,174 UART: Running Caliptra FMC ...
2,991,582 UART:
2,991,725 UART: [state] CFI Enabled
3,002,430 UART: [fht] FMC Alias Private Key: 7
3,110,723 UART: [art] Extend RT PCRs Done
3,111,151 UART: [art] Lock RT PCRs Done
3,112,735 UART: [art] Populate DV Done
3,120,874 UART: [fht] FMC Alias Private Key: 7
3,121,866 UART: [art] Derive CDI
3,122,146 UART: [art] Store in in slot 0x4
3,207,543 UART: [art] Derive Key Pair
3,207,903 UART: [art] Store priv key in slot 0x5
3,221,177 UART: [art] Derive Key Pair - Done
3,235,692 UART: [art] Signing Cert with AUTHO
3,236,172 UART: RITY.KEYID = 7
3,251,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,467 UART: [art] PUB.X = 1DC1619CD85153666F546565651FAC27688483200E9232DF19CCD65D27EF163F843B3AA57F8D59512E840FF9E8ED9327
3,259,227 UART: [art] PUB.Y = 80BE1F403FE793430C1F6537D11B1E1C034781E056CE303F27FE14031154022C6E2635D5BF8D8C84EBDDF7AE0E14CAD7
3,266,170 UART: [art] SIG.R = E774020DBB2EA7CC85127BC3A96A6217B7334EB7FE784CD32EC61F518F4F43FD0E55E50DB35DE9C96C7FDAA4BE088716
3,272,943 UART: [art] SIG.S = BBCAF1F6283D7DCCF1D5CC3C8BDFDCE713567065FD5EEFC2830A53D60DA6E8A57C5F6602B818A484AEC0ADFE55FB0068
3,296,421 UART: Caliptra RT
3,296,767 UART: [state] CFI Enabled
3,404,974 UART: [rt] RT listening for mailbox commands...
3,405,644 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,679 UART: [rt]cmd =0x53574545, len=84
3,437,013 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
893,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,555 UART: [kat] ++
897,707 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,414 UART: [kat] SHA2-512-ACC
908,315 UART: [kat] ECC-384
917,998 UART: [kat] HMAC-384Kdf
922,434 UART: [kat] LMS
1,170,762 UART: [kat] --
1,171,449 UART: [cold-reset] ++
1,172,019 UART: [fht] FHT @ 0x50003400
1,174,846 UART: [idev] ++
1,175,014 UART: [idev] CDI.KEYID = 6
1,175,374 UART: [idev] SUBJECT.KEYID = 7
1,175,798 UART: [idev] UDS.KEYID = 0
1,176,143 ready_for_fw is high
1,176,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,545 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,209,995 UART: [ldev] ++
1,210,163 UART: [ldev] CDI.KEYID = 6
1,210,526 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,567 UART: [ldev] --
1,282,070 UART: [fwproc] Wait for Commands...
1,282,640 UART: [fwproc] Recv command 0x46574c44
1,283,368 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,262 >>> mbox cmd response: success
2,775,490 UART: [afmc] ++
2,775,658 UART: [afmc] CDI.KEYID = 6
2,776,020 UART: [afmc] SUBJECT.KEYID = 7
2,776,445 UART: [afmc] AUTHORITY.KEYID = 5
2,812,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,773 UART: [afmc] --
2,855,743 UART: [cold-reset] --
2,856,541 UART: [state] Locking Datavault
2,857,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,140 UART: [state] Locking ICCM
2,858,566 UART: [exit] Launching FMC @ 0x40000130
2,863,895 UART:
2,863,911 UART: Running Caliptra FMC ...
2,864,319 UART:
2,864,373 UART: [state] CFI Enabled
2,874,676 UART: [fht] FMC Alias Private Key: 7
2,982,227 UART: [art] Extend RT PCRs Done
2,982,655 UART: [art] Lock RT PCRs Done
2,984,161 UART: [art] Populate DV Done
2,992,574 UART: [fht] FMC Alias Private Key: 7
2,993,608 UART: [art] Derive CDI
2,993,888 UART: [art] Store in in slot 0x4
3,079,375 UART: [art] Derive Key Pair
3,079,735 UART: [art] Store priv key in slot 0x5
3,092,499 UART: [art] Derive Key Pair - Done
3,107,315 UART: [art] Signing Cert with AUTHO
3,107,795 UART: RITY.KEYID = 7
3,122,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,654 UART: [art] PUB.X = 94A88B8B8F5A18B2981FF515BB9B11DD7F756B201B0F0B5B7F8C3F7B2FF61404C1E22046B7D7E8965135222FB6EB03DC
3,130,422 UART: [art] PUB.Y = B331983C01500B94DAF615ACF80D9E4D5AA2AA2A60C4EFE31A600A735EE35912B85F23FA5DDEFB6CE64D88EA6B1AFE0C
3,137,383 UART: [art] SIG.R = 116C1428307388E1213EF1EDD36DA2A6A8CD5169B50BE26A5C0B6FC870AFDF64491D221798C8F41ADA5BB75FADE31681
3,144,159 UART: [art] SIG.S = 301D1D10FD164755651C01F366ABFEE68AADD41E0164CD942EF36230689EEC9E0ABB6D27BE7EDC304E1A2294533741E2
3,168,031 UART: Caliptra RT
3,168,285 UART: [state] CFI Enabled
3,275,749 UART: [rt] RT listening for mailbox commands...
3,276,419 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,252 UART: [rt]cmd =0x53574545, len=84
3,307,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 ready_for_fw is high
1,060,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,433 >>> mbox cmd response: success
2,689,691 UART:
2,689,707 UART: Running Caliptra FMC ...
2,690,115 UART:
2,690,169 UART: [state] CFI Enabled
2,700,626 UART: [fht] FMC Alias Private Key: 7
2,809,207 UART: [art] Extend RT PCRs Done
2,809,635 UART: [art] Lock RT PCRs Done
2,811,231 UART: [art] Populate DV Done
2,819,464 UART: [fht] FMC Alias Private Key: 7
2,820,622 UART: [art] Derive CDI
2,820,902 UART: [art] Store in in slot 0x4
2,906,605 UART: [art] Derive Key Pair
2,906,965 UART: [art] Store priv key in slot 0x5
2,920,179 UART: [art] Derive Key Pair - Done
2,934,876 UART: [art] Signing Cert with AUTHO
2,935,356 UART: RITY.KEYID = 7
2,950,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,205 UART: [art] PUB.X = 084FAD5FB8E76857DD5C2BD9DF97B32BAAAAF13C7C510A1AA15507FD263766B4DF706481E35F166AC103389DD23336ED
2,957,977 UART: [art] PUB.Y = 17A9D16E4CDF18C208B77779F6E79ACBCC68013F4D39E6ACC7969515DD154C9A1895C23FD6CA6D0FF84E4BAB364690F2
2,964,932 UART: [art] SIG.R = 02F1F81ABB598968333CE90792369AA9DCDBD4850221895CE4E47EF620C909077C1147EFB21245C01B7AC52EE5175FB7
2,971,689 UART: [art] SIG.S = A929E73FDE1B183B0CB2B4057D526B61547F61C755E36750DE8B46C1BE4AFCB27755FCB04D685B1951C53EC5C1296E24
2,995,018 UART: Caliptra RT
2,995,272 UART: [state] CFI Enabled
3,103,206 UART: [rt] RT listening for mailbox commands...
3,103,876 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,883 UART: [rt]cmd =0x53574545, len=84
3,135,345 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
893,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,434 UART: [kat] ++
897,586 UART: [kat] sha1
901,766 UART: [kat] SHA2-256
903,706 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,172,986 UART: [fht] FHT @ 0x50003400
1,175,741 UART: [idev] ++
1,175,909 UART: [idev] CDI.KEYID = 6
1,176,269 UART: [idev] SUBJECT.KEYID = 7
1,176,693 UART: [idev] UDS.KEYID = 0
1,177,038 ready_for_fw is high
1,177,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,683 UART: [idev] Erasing UDS.KEYID = 0
1,201,222 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,570 UART: [ldev] ++
1,210,738 UART: [ldev] CDI.KEYID = 6
1,211,101 UART: [ldev] SUBJECT.KEYID = 5
1,211,527 UART: [ldev] AUTHORITY.KEYID = 7
1,211,990 UART: [ldev] FE.KEYID = 1
1,217,062 UART: [ldev] Erasing FE.KEYID = 1
1,243,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,248 UART: [ldev] --
1,282,531 UART: [fwproc] Wait for Commands...
1,283,339 UART: [fwproc] Recv command 0x46574c44
1,284,067 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,599 >>> mbox cmd response: success
2,775,757 UART: [afmc] ++
2,775,925 UART: [afmc] CDI.KEYID = 6
2,776,287 UART: [afmc] SUBJECT.KEYID = 7
2,776,712 UART: [afmc] AUTHORITY.KEYID = 5
2,811,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,839 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,320 UART: [afmc] --
2,855,248 UART: [cold-reset] --
2,856,128 UART: [state] Locking Datavault
2,857,395 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,999 UART: [state] Locking ICCM
2,858,627 UART: [exit] Launching FMC @ 0x40000130
2,863,956 UART:
2,863,972 UART: Running Caliptra FMC ...
2,864,380 UART:
2,864,523 UART: [state] CFI Enabled
2,875,262 UART: [fht] FMC Alias Private Key: 7
2,983,825 UART: [art] Extend RT PCRs Done
2,984,253 UART: [art] Lock RT PCRs Done
2,985,887 UART: [art] Populate DV Done
2,993,938 UART: [fht] FMC Alias Private Key: 7
2,995,064 UART: [art] Derive CDI
2,995,344 UART: [art] Store in in slot 0x4
3,080,657 UART: [art] Derive Key Pair
3,081,017 UART: [art] Store priv key in slot 0x5
3,094,481 UART: [art] Derive Key Pair - Done
3,109,231 UART: [art] Signing Cert with AUTHO
3,109,711 UART: RITY.KEYID = 7
3,124,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,276 UART: [art] PUB.X = A38E837AA6B489AEA8C7B01D626AFE4E287EA113DBE18FC04099B57B7029DF1259869E02FA7BE50F3F143B642B183E42
3,132,050 UART: [art] PUB.Y = 6DAD67FEA8AA1FD184C503963810DC719EC7BA5706F66095CAAD38B510AE1D2F6DBDFD0D6988BE23FD50636AB1CCF93B
3,139,015 UART: [art] SIG.R = BA5FE05465BAE2F0751653B3AF0A32FECDA7FD018E0CD43B353CB0FB4D1F8C5A3DEBB045A07EA0891E79E1B549E7020C
3,145,794 UART: [art] SIG.S = 3E31220BB0BE07674F39DC2873AD6EED48FB5D4F316764C2BE9F144449676880E51062353899A6FBA48EF1378F22CDD0
3,168,681 UART: Caliptra RT
3,169,027 UART: [state] CFI Enabled
3,276,717 UART: [rt] RT listening for mailbox commands...
3,277,387 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,498 UART: [rt]cmd =0x53574545, len=84
3,308,984 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,366 ready_for_fw is high
1,061,366 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,154 >>> mbox cmd response: success
2,689,924 UART:
2,689,940 UART: Running Caliptra FMC ...
2,690,348 UART:
2,690,491 UART: [state] CFI Enabled
2,701,134 UART: [fht] FMC Alias Private Key: 7
2,808,833 UART: [art] Extend RT PCRs Done
2,809,261 UART: [art] Lock RT PCRs Done
2,810,753 UART: [art] Populate DV Done
2,818,876 UART: [fht] FMC Alias Private Key: 7
2,819,844 UART: [art] Derive CDI
2,820,124 UART: [art] Store in in slot 0x4
2,906,199 UART: [art] Derive Key Pair
2,906,559 UART: [art] Store priv key in slot 0x5
2,919,699 UART: [art] Derive Key Pair - Done
2,934,369 UART: [art] Signing Cert with AUTHO
2,934,849 UART: RITY.KEYID = 7
2,949,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,754 UART: [art] PUB.X = 588485484D40302CD3A1F03431EAB6267320288FD42D15160ED5D49EB9C67FA1F2695B977A5E60C0CA1CE81F63B6D726
2,957,521 UART: [art] PUB.Y = 1CFE4826DDD2F04AC996E8180CACC554F56F9D2F84DD8A87650F57705EB4BE159A010E0896368006FB13DBE98F55E173
2,964,461 UART: [art] SIG.R = 6FA9E026446B6E5A1734DE2D299A8439F548A340B04BE7B8ED210FB98EB849109FDC5CAA6E0E9A6F5630799AE1002162
2,971,209 UART: [art] SIG.S = 61E2A67EE8EDD21CAD26A38BF18CC61D0161DC2B547AE536686232CEE757C2997C489D8B8CEAC69AB2BC640CBC332DDD
2,994,846 UART: Caliptra RT
2,995,192 UART: [state] CFI Enabled
3,102,884 UART: [rt] RT listening for mailbox commands...
3,103,554 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,469 UART: [rt]cmd =0x53574545, len=84
3,134,807 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,301 UART: [cold-reset] ++
1,169,719 UART: [fht] FHT @ 0x50003400
1,172,331 UART: [idev] ++
1,172,499 UART: [idev] CDI.KEYID = 6
1,172,860 UART: [idev] SUBJECT.KEYID = 7
1,173,285 UART: [idev] UDS.KEYID = 0
1,173,631 ready_for_fw is high
1,173,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,513 UART: [idev] Erasing UDS.KEYID = 0
1,198,127 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,764 UART: [ldev] --
1,281,186 UART: [fwproc] Wait for Commands...
1,281,865 UART: [fwproc] Recv command 0x46574c44
1,282,598 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,502 >>> mbox cmd response: success
2,774,539 UART: [afmc] ++
2,774,707 UART: [afmc] CDI.KEYID = 6
2,775,070 UART: [afmc] SUBJECT.KEYID = 7
2,775,496 UART: [afmc] AUTHORITY.KEYID = 5
2,811,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,062 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,526 UART: [afmc] --
2,854,516 UART: [cold-reset] --
2,855,528 UART: [state] Locking Datavault
2,856,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,471 UART: [state] Locking ICCM
2,857,991 UART: [exit] Launching FMC @ 0x40000130
2,863,320 UART:
2,863,336 UART: Running Caliptra FMC ...
2,863,744 UART:
2,863,798 UART: [state] CFI Enabled
2,874,329 UART: [fht] FMC Alias Private Key: 7
2,982,016 UART: [art] Extend RT PCRs Done
2,982,444 UART: [art] Lock RT PCRs Done
2,984,138 UART: [art] Populate DV Done
2,992,523 UART: [fht] FMC Alias Private Key: 7
2,993,595 UART: [art] Derive CDI
2,993,875 UART: [art] Store in in slot 0x4
3,079,540 UART: [art] Derive Key Pair
3,079,900 UART: [art] Store priv key in slot 0x5
3,093,414 UART: [art] Derive Key Pair - Done
3,107,912 UART: [art] Signing Cert with AUTHO
3,108,392 UART: RITY.KEYID = 7
3,123,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,519 UART: [art] PUB.X = F7F14916666E35F5DF47368505BE3F1C87D53B863FFEBD19493E2D67FC6C50C5DBBAC4227319E92661FCE2171304896C
3,131,287 UART: [art] PUB.Y = F15F6086885BC57E10FD59CC3F71EE309CD68BD57C1BD3103B8E91FEB0A4D038B0575D2EB10EACD588461A2D9CA3888C
3,138,250 UART: [art] SIG.R = 516599F1034422C90FA66D11EAB0DE2D562AF9D1F49E6578B0BB6FFC4A138517A09C0B3E7DE3C38FA437F93EC161D114
3,145,021 UART: [art] SIG.S = DF6BA887D0CCA770B8906B8A88DC4147DFC6BA90B8C575F8B6517922A423D1512233956A849E0F85DA0610A38C63CBDB
3,169,346 UART: Caliptra RT
3,169,600 UART: [state] CFI Enabled
3,276,584 UART: [rt] RT listening for mailbox commands...
3,277,254 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,151 UART: [rt]cmd =0x53574545, len=84
3,308,313 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,502 ready_for_fw is high
1,056,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,750 >>> mbox cmd response: success
2,685,066 UART:
2,685,082 UART: Running Caliptra FMC ...
2,685,490 UART:
2,685,544 UART: [state] CFI Enabled
2,696,119 UART: [fht] FMC Alias Private Key: 7
2,804,260 UART: [art] Extend RT PCRs Done
2,804,688 UART: [art] Lock RT PCRs Done
2,806,002 UART: [art] Populate DV Done
2,814,211 UART: [fht] FMC Alias Private Key: 7
2,815,269 UART: [art] Derive CDI
2,815,549 UART: [art] Store in in slot 0x4
2,900,946 UART: [art] Derive Key Pair
2,901,306 UART: [art] Store priv key in slot 0x5
2,914,756 UART: [art] Derive Key Pair - Done
2,929,737 UART: [art] Signing Cert with AUTHO
2,930,217 UART: RITY.KEYID = 7
2,945,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,866 UART: [art] PUB.X = 7FD8AB84F03B2594C0FE811A69B3BA86F5CE91DB8EE7DC94BB7DAAAA44AA8D955CC63E656768EA8FC1A8AF6D93C3FB08
2,952,663 UART: [art] PUB.Y = F7C1EAA52FDFA153D0D11DBDD6CB7B4375258878934176859A819C4211376D42F86DDBF2856E6F705319DCFEEBAFFD1D
2,959,629 UART: [art] SIG.R = E3F6FE7F58EC18B93C3BDEB665ED20A814A8278D0353201E309F9DB2466EE424220328B78592FB20D3260F70B42D7785
2,966,390 UART: [art] SIG.S = 19B8002472D0303506A6E576DA7A3F7C0B490FC6C60575DF7C6185DB6CCA097408C82199871031D3C93FC5C917E601C8
2,990,094 UART: Caliptra RT
2,990,348 UART: [state] CFI Enabled
3,096,868 UART: [rt] RT listening for mailbox commands...
3,097,538 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,545 UART: [rt]cmd =0x53574545, len=84
3,128,997 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,718 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 ready_for_fw is high
1,174,096 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,119 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,361 >>> mbox cmd response: success
2,776,438 UART: [afmc] ++
2,776,606 UART: [afmc] CDI.KEYID = 6
2,776,969 UART: [afmc] SUBJECT.KEYID = 7
2,777,395 UART: [afmc] AUTHORITY.KEYID = 5
2,813,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,471 UART: [afmc] --
2,856,419 UART: [cold-reset] --
2,857,155 UART: [state] Locking Datavault
2,858,346 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,950 UART: [state] Locking ICCM
2,859,584 UART: [exit] Launching FMC @ 0x40000130
2,864,913 UART:
2,864,929 UART: Running Caliptra FMC ...
2,865,337 UART:
2,865,480 UART: [state] CFI Enabled
2,876,479 UART: [fht] FMC Alias Private Key: 7
2,984,394 UART: [art] Extend RT PCRs Done
2,984,822 UART: [art] Lock RT PCRs Done
2,986,326 UART: [art] Populate DV Done
2,994,417 UART: [fht] FMC Alias Private Key: 7
2,995,499 UART: [art] Derive CDI
2,995,779 UART: [art] Store in in slot 0x4
3,081,116 UART: [art] Derive Key Pair
3,081,476 UART: [art] Store priv key in slot 0x5
3,095,040 UART: [art] Derive Key Pair - Done
3,109,922 UART: [art] Signing Cert with AUTHO
3,110,402 UART: RITY.KEYID = 7
3,125,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,349 UART: [art] PUB.X = 2B95663159A9E68FDA271D47A2D63015322EE55F9E3BE8BDA4E88BBB381AF8A7A5FFDFD3391C54C1D9FA4B1148420714
3,133,128 UART: [art] PUB.Y = 98A7CCCC07B44C781CF4C0EEF8668DF08F740456F3F31A663D9B63621A4FFE2D57750243FF656E5CB8DB243BF3984274
3,140,077 UART: [art] SIG.R = C49BD5BF9668802CFCF09DAC8B6314C1E3CE6B6127BBB67295C883D9A60301BE8FCF7F18525487852DEB8CE1571017FC
3,146,853 UART: [art] SIG.S = BAE6174557CA7F8370E5FB699C50039B2778B5BAB9EE69632F5D48C4B25F4108101DF0D3FC2B27FF3A2E3754105A65E5
3,170,098 UART: Caliptra RT
3,170,444 UART: [state] CFI Enabled
3,278,479 UART: [rt] RT listening for mailbox commands...
3,279,149 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,236 UART: [rt]cmd =0x53574545, len=84
3,310,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,149 ready_for_fw is high
1,056,149 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,165 >>> mbox cmd response: success
2,683,947 UART:
2,683,963 UART: Running Caliptra FMC ...
2,684,371 UART:
2,684,514 UART: [state] CFI Enabled
2,695,089 UART: [fht] FMC Alias Private Key: 7
2,803,034 UART: [art] Extend RT PCRs Done
2,803,462 UART: [art] Lock RT PCRs Done
2,804,594 UART: [art] Populate DV Done
2,813,033 UART: [fht] FMC Alias Private Key: 7
2,814,181 UART: [art] Derive CDI
2,814,461 UART: [art] Store in in slot 0x4
2,900,468 UART: [art] Derive Key Pair
2,900,828 UART: [art] Store priv key in slot 0x5
2,914,290 UART: [art] Derive Key Pair - Done
2,929,162 UART: [art] Signing Cert with AUTHO
2,929,642 UART: RITY.KEYID = 7
2,945,032 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,797 UART: [art] PUB.X = AD0D38411486E3B61BC8E763DE6C2FDFA894423F4EB9AA2D3372993D47EDED94E4EC2909E41B9479DFDDB3BC8EB28B13
2,952,581 UART: [art] PUB.Y = 5CEAE981E8DB028A612CE9F84EE82CD801A094483A409DA183F8EF6234A0F340A175D752B685B2BD98E09A59D7FA28CD
2,959,537 UART: [art] SIG.R = 2DD384F330878E946421D17C595005F776C7168D4F707D240D3EDA25809D34F298AB9D1C60B0E12D169AF47E9FF7E0EE
2,966,303 UART: [art] SIG.S = DD9C600E975C1B99EE8481E57C5C698BD7933FF12DA14F6ABA493181DEA6192E2DED7B7AD75F06F213853459EB47D1D5
2,990,806 UART: Caliptra RT
2,991,152 UART: [state] CFI Enabled
3,098,690 UART: [rt] RT listening for mailbox commands...
3,099,360 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,457 UART: [rt]cmd =0x53574545, len=84
3,130,777 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,500 UART:
192,879 UART: Running Caliptra ROM ...
194,001 UART:
194,151 UART: [state] CFI Enabled
267,007 UART: [state] LifecycleState = Unprovisioned
269,012 UART: [state] DebugLocked = No
270,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,916 UART: [kat] SHA2-256
444,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,157 UART: [kat] ++
455,620 UART: [kat] sha1
465,918 UART: [kat] SHA2-256
468,568 UART: [kat] SHA2-384
474,691 UART: [kat] SHA2-512-ACC
477,048 UART: [kat] ECC-384
2,767,766 UART: [kat] HMAC-384Kdf
2,800,671 UART: [kat] LMS
3,990,994 UART: [kat] --
3,996,214 UART: [cold-reset] ++
3,997,147 UART: [fht] Storing FHT @ 0x50003400
4,008,903 UART: [idev] ++
4,009,471 UART: [idev] CDI.KEYID = 6
4,010,496 UART: [idev] SUBJECT.KEYID = 7
4,011,670 UART: [idev] UDS.KEYID = 0
4,012,699 ready_for_fw is high
4,012,893 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,352 UART: [idev] Erasing UDS.KEYID = 0
7,345,977 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,108 UART: [idev] --
7,372,555 UART: [ldev] ++
7,373,123 UART: [ldev] CDI.KEYID = 6
7,374,096 UART: [ldev] SUBJECT.KEYID = 5
7,375,300 UART: [ldev] AUTHORITY.KEYID = 7
7,376,536 UART: [ldev] FE.KEYID = 1
7,421,076 UART: [ldev] Erasing FE.KEYID = 1
10,754,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,893 UART: [ldev] --
13,136,396 UART: [fwproc] Waiting for Commands...
13,139,041 UART: [fwproc] Received command 0x46574c44
13,141,220 UART: [fwproc] Received Image of size 114036 bytes
17,194,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,652,005 >>> mbox cmd response: success
17,656,934 UART: [afmc] ++
17,657,534 UART: [afmc] CDI.KEYID = 6
17,658,418 UART: [afmc] SUBJECT.KEYID = 7
17,659,683 UART: [afmc] AUTHORITY.KEYID = 5
21,026,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,363 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,775 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,643 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,074 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,071 UART: [afmc] --
23,399,147 UART: [cold-reset] --
23,403,106 UART: [state] Locking Datavault
23,407,294 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,996 UART: [state] Locking ICCM
23,411,737 UART: [exit] Launching FMC @ 0x40000130
23,420,125 UART:
23,420,351 UART: Running Caliptra FMC ...
23,421,445 UART:
23,421,595 UART: [state] CFI Enabled
23,487,120 UART: [fht] FMC Alias Private Key: 7
25,825,453 UART: [art] Extend RT PCRs Done
25,826,685 UART: [art] Lock RT PCRs Done
25,828,007 UART: [art] Populate DV Done
25,833,530 UART: [fht] FMC Alias Private Key: 7
25,835,006 UART: [art] Derive CDI
25,835,786 UART: [art] Store in in slot 0x4
25,895,639 UART: [art] Derive Key Pair
25,896,677 UART: [art] Store priv key in slot 0x5
29,189,748 UART: [art] Derive Key Pair - Done
29,203,067 UART: [art] Signing Cert with AUTHO
29,204,367 UART: RITY.KEYID = 7
31,490,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,503 UART: [art] PUB.X = B31C76924ECBC90775DBCC5233C3106167B8D894DADFA9117D41B8BD314A304608E293DCEA2260AE1E82EEA86C81C232
31,499,730 UART: [art] PUB.Y = 58B18384754525EB8702A5EE285F3E735C338BC8A64AF5E905E0D592E2ECF73A8B65DF9FB08AD4F245685E29FED2DE0C
31,506,987 UART: [art] SIG.R = 278F0724E5BEE4F13D52F648C41B8B0E200F4A3E2C753714716BC6701F390DCEBE37B88D4C9D1EC0AF71BA12E3DEB505
31,514,396 UART: [art] SIG.S = 41653405422FCF341EEC610CB97188519A7DBB60EE4916C9A7B1366DCDFFF53B242E51B638FEECB9CFA8A5A4591D9AE8
32,820,026 UART: Caliptra RT
32,820,738 UART: [state] CFI Enabled
32,981,041 UART: [rt] RT listening for mailbox commands...
32,982,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,013,497 UART: [rt]cmd =0x4d454153, len=108
33,015,343 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,784,389 ready_for_fw is high
3,784,804 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,886,722 >>> mbox cmd response: success
23,581,914 UART:
23,582,312 UART: Running Caliptra FMC ...
23,583,448 UART:
23,583,602 UART: [state] CFI Enabled
23,634,737 UART: [fht] FMC Alias Private Key: 7
25,972,209 UART: [art] Extend RT PCRs Done
25,973,456 UART: [art] Lock RT PCRs Done
25,975,244 UART: [art] Populate DV Done
25,980,767 UART: [fht] FMC Alias Private Key: 7
25,982,357 UART: [art] Derive CDI
25,983,165 UART: [art] Store in in slot 0x4
26,043,511 UART: [art] Derive Key Pair
26,044,558 UART: [art] Store priv key in slot 0x5
29,337,369 UART: [art] Derive Key Pair - Done
29,350,368 UART: [art] Signing Cert with AUTHO
29,351,666 UART: RITY.KEYID = 7
31,638,736 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,237 UART: [art] PUB.X = F57C72CA7963DFAC474CEBFF6A34A6ABCE355FADB1191203EC0EF17586757378E292E007FA9CCBCC7867DC2FE3639F8F
31,647,515 UART: [art] PUB.Y = D19B89DC131B8CD872F0A6BF329A6DCF275A49A66BF9BB66017F8751C5DA9009DBB0DF50C1F63B7CB89801E5FDE511E1
31,654,770 UART: [art] SIG.R = 25CA5E7ADBAD09A68B95573AB091CF10218B776521387E9032FE8F3D44C715183ABF3389532130851E2C66D75DE78144
31,662,134 UART: [art] SIG.S = E3E7C414FC23D0B2BEE741980EC5B0549F9469C9BDFD0114280DB6DEFB3E369933B1AE328DA63ED16386C3D9C70C4824
32,967,472 UART: Caliptra RT
32,968,211 UART: [state] CFI Enabled
33,131,101 UART: [rt] RT listening for mailbox commands...
33,133,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,163,730 UART: [rt]cmd =0x4d454153, len=108
33,165,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,479 UART:
192,843 UART: Running Caliptra ROM ...
194,027 UART:
603,770 UART: [state] CFI Enabled
618,503 UART: [state] LifecycleState = Unprovisioned
620,386 UART: [state] DebugLocked = No
622,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,701 UART: [kat] SHA2-256
796,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,020 UART: [kat] ++
807,547 UART: [kat] sha1
819,700 UART: [kat] SHA2-256
822,425 UART: [kat] SHA2-384
828,193 UART: [kat] SHA2-512-ACC
830,576 UART: [kat] ECC-384
3,114,569 UART: [kat] HMAC-384Kdf
3,126,516 UART: [kat] LMS
4,316,605 UART: [kat] --
4,321,543 UART: [cold-reset] ++
4,323,403 UART: [fht] Storing FHT @ 0x50003400
4,335,949 UART: [idev] ++
4,336,518 UART: [idev] CDI.KEYID = 6
4,337,496 UART: [idev] SUBJECT.KEYID = 7
4,338,741 UART: [idev] UDS.KEYID = 0
4,339,716 ready_for_fw is high
4,339,918 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,150 UART: [idev] Erasing UDS.KEYID = 0
7,626,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,160 UART: [idev] --
7,651,246 UART: [ldev] ++
7,651,892 UART: [ldev] CDI.KEYID = 6
7,652,801 UART: [ldev] SUBJECT.KEYID = 5
7,654,008 UART: [ldev] AUTHORITY.KEYID = 7
7,655,296 UART: [ldev] FE.KEYID = 1
7,666,261 UART: [ldev] Erasing FE.KEYID = 1
10,953,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,705 UART: [ldev] --
13,313,892 UART: [fwproc] Waiting for Commands...
13,317,049 UART: [fwproc] Received command 0x46574c44
13,319,239 UART: [fwproc] Received Image of size 114036 bytes
17,368,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,832,475 >>> mbox cmd response: success
17,835,799 UART: [afmc] ++
17,836,392 UART: [afmc] CDI.KEYID = 6
17,837,300 UART: [afmc] SUBJECT.KEYID = 7
17,838,570 UART: [afmc] AUTHORITY.KEYID = 5
21,151,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,576 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,967 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,804 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,236 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,787 UART: [afmc] --
23,515,943 UART: [cold-reset] --
23,519,851 UART: [state] Locking Datavault
23,524,336 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,102 UART: [state] Locking ICCM
23,528,737 UART: [exit] Launching FMC @ 0x40000130
23,537,131 UART:
23,537,365 UART: Running Caliptra FMC ...
23,538,464 UART:
23,538,623 UART: [state] CFI Enabled
23,546,564 UART: [fht] FMC Alias Private Key: 7
25,877,045 UART: [art] Extend RT PCRs Done
25,878,268 UART: [art] Lock RT PCRs Done
25,879,674 UART: [art] Populate DV Done
25,885,084 UART: [fht] FMC Alias Private Key: 7
25,886,569 UART: [art] Derive CDI
25,887,328 UART: [art] Store in in slot 0x4
25,929,916 UART: [art] Derive Key Pair
25,930,913 UART: [art] Store priv key in slot 0x5
29,173,533 UART: [art] Derive Key Pair - Done
29,186,818 UART: [art] Signing Cert with AUTHO
29,188,126 UART: RITY.KEYID = 7
31,467,252 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,753 UART: [art] PUB.X = B072F803E1B94386941EB84804458C7BBD188AB33EE8D0EADEBEEFA4C9C3636894C374CD8EA9E1FCC4EC02D2DFD477D7
31,476,066 UART: [art] PUB.Y = B6C96EBD9F4FECA1C2ECB324835BDE4F47D44519F2F3D08DE7A8F8E1BFECC0947F4A34911666E5D6D8ABFCC5AA5E721E
31,483,347 UART: [art] SIG.R = 535E58D8117636CFFB5FF9A00CB979A9E7926305AAF6D49E1BF896B291A7E66B9A2762759F21E169D024EC2382815C5B
31,490,711 UART: [art] SIG.S = 575BA5350814BC0A8E93D054F5FCC8CA66BA210F8070A3AAFB1CF36E36C72C058FA8D06B9479801B56864B1D12050118
32,795,686 UART: Caliptra RT
32,796,380 UART: [state] CFI Enabled
32,914,039 UART: [rt] RT listening for mailbox commands...
32,916,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,946,680 UART: [rt]cmd =0x4d454153, len=108
32,948,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,130,834 ready_for_fw is high
4,131,224 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,810 >>> mbox cmd response: success
23,700,234 UART:
23,700,657 UART: Running Caliptra FMC ...
23,701,770 UART:
23,701,920 UART: [state] CFI Enabled
23,710,250 UART: [fht] FMC Alias Private Key: 7
26,041,513 UART: [art] Extend RT PCRs Done
26,042,795 UART: [art] Lock RT PCRs Done
26,044,137 UART: [art] Populate DV Done
26,049,421 UART: [fht] FMC Alias Private Key: 7
26,051,021 UART: [art] Derive CDI
26,051,770 UART: [art] Store in in slot 0x4
26,094,580 UART: [art] Derive Key Pair
26,095,605 UART: [art] Store priv key in slot 0x5
29,337,930 UART: [art] Derive Key Pair - Done
29,350,603 UART: [art] Signing Cert with AUTHO
29,351,912 UART: RITY.KEYID = 7
31,631,789 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,296 UART: [art] PUB.X = 426E843CFEA3592E833CDDFF5CAC01D8A05B71DF97DE6EAC58DEC5E6E78F8346502C5C1C5AB85E43392F98ED3B1A01C4
31,640,593 UART: [art] PUB.Y = 9CF7744A0447E4680E8B8DFE4985729F59E84E3D04A9C5BA51BBC3896F9AC602319C8F4D9B9A5AE00B4CA006E9FE74E9
31,647,805 UART: [art] SIG.R = C22AE8A7DDFC3A610FA8786C0A127724950591E965B9B417FBA095D13FE0E37E90BA9D3EE3CDBAB57F83C4DC0BB8EE68
31,655,229 UART: [art] SIG.S = DED6934E9A19E8B928A2EF1A588AFECD6A8D9282687C00493F94A3BAAC63BFC6DD25B9D2004967C0BF16D75380CAD483
32,960,122 UART: Caliptra RT
32,960,842 UART: [state] CFI Enabled
33,078,347 UART: [rt] RT listening for mailbox commands...
33,080,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,111,023 UART: [rt]cmd =0x4d454153, len=108
33,112,987 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,503 UART:
192,892 UART: Running Caliptra ROM ...
194,097 UART:
194,257 UART: [state] CFI Enabled
265,884 UART: [state] LifecycleState = Unprovisioned
267,755 UART: [state] DebugLocked = No
270,651 UART: [state] WD Timer not started. Device not locked for debugging
273,528 UART: [kat] SHA2-256
452,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,261 UART: [kat] ++
464,796 UART: [kat] sha1
475,607 UART: [kat] SHA2-256
478,608 UART: [kat] SHA2-384
483,533 UART: [kat] SHA2-512-ACC
486,475 UART: [kat] ECC-384
2,946,352 UART: [kat] HMAC-384Kdf
2,972,735 UART: [kat] LMS
3,502,260 UART: [kat] --
3,505,925 UART: [cold-reset] ++
3,508,428 UART: [fht] FHT @ 0x50003400
3,518,697 UART: [idev] ++
3,519,264 UART: [idev] CDI.KEYID = 6
3,520,173 UART: [idev] SUBJECT.KEYID = 7
3,521,420 UART: [idev] UDS.KEYID = 0
3,522,345 ready_for_fw is high
3,522,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,363 UART: [idev] Erasing UDS.KEYID = 0
6,028,342 UART: [idev] Sha1 KeyId Algorithm
6,051,690 UART: [idev] --
6,055,753 UART: [ldev] ++
6,056,330 UART: [ldev] CDI.KEYID = 6
6,057,219 UART: [ldev] SUBJECT.KEYID = 5
6,058,457 UART: [ldev] AUTHORITY.KEYID = 7
6,059,698 UART: [ldev] FE.KEYID = 1
6,099,108 UART: [ldev] Erasing FE.KEYID = 1
8,602,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,556 UART: [ldev] --
10,412,036 UART: [fwproc] Wait for Commands...
10,414,024 UART: [fwproc] Recv command 0x46574c44
10,416,121 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,281,736 >>> mbox cmd response: success
14,286,613 UART: [afmc] ++
14,287,215 UART: [afmc] CDI.KEYID = 6
14,288,101 UART: [afmc] SUBJECT.KEYID = 7
14,289,316 UART: [afmc] AUTHORITY.KEYID = 5
16,825,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,842 UART: [afmc] --
18,623,004 UART: [cold-reset] --
18,627,033 UART: [state] Locking Datavault
18,633,734 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,377 UART: [state] Locking ICCM
18,637,552 UART: [exit] Launching FMC @ 0x40000130
18,645,966 UART:
18,646,211 UART: Running Caliptra FMC ...
18,647,314 UART:
18,647,472 UART: [state] CFI Enabled
18,704,971 UART: [fht] FMC Alias Private Key: 7
20,468,857 UART: [art] Extend RT PCRs Done
20,470,072 UART: [art] Lock RT PCRs Done
20,471,998 UART: [art] Populate DV Done
20,477,359 UART: [fht] FMC Alias Private Key: 7
20,478,847 UART: [art] Derive CDI
20,479,621 UART: [art] Store in in slot 0x4
20,536,874 UART: [art] Derive Key Pair
20,537,916 UART: [art] Store priv key in slot 0x5
23,000,616 UART: [art] Derive Key Pair - Done
23,013,772 UART: [art] Signing Cert with AUTHO
23,015,082 UART: RITY.KEYID = 7
24,726,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,529 UART: [art] PUB.X = E7375AD0C2075A96E895B445C2ED6007966627C142C9AED65BE5CBC706EA6CC8357D741FA74930413119A835E251B14B
24,734,803 UART: [art] PUB.Y = A627C405503AEF7CC2D2C6C6C35CE326061A7B9933D7D77DEF512CD9578B712F3B206311F9CF5F3D1B1D842D870DDFA5
24,742,057 UART: [art] SIG.R = 6762B00479EAF3A7C2CC3E8FA322B2E441C319A7B3FAA957B71839BC9CE4A799CFB9C5934DC01A974B48F8E1F6405FF6
24,749,566 UART: [art] SIG.S = 30529DAB09F8C7F1439C669AD847F83E270DED4B6B9F05D760652C501FE8AF3F2304A93816350AA5D12DAB2DA45148DD
25,728,743 UART: Caliptra RT
25,729,441 UART: [state] CFI Enabled
25,895,185 UART: [rt] RT listening for mailbox commands...
25,897,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,927,754 UART: [rt]cmd =0x4d454153, len=108
25,929,607 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,563 writing to cptra_bootfsm_go
192,640 UART:
193,013 UART: Running Caliptra ROM ...
194,212 UART:
194,369 UART: [state] CFI Enabled
260,696 UART: [state] LifecycleState = Unprovisioned
262,766 UART: [state] DebugLocked = No
264,660 UART: [state] WD Timer not started. Device not locked for debugging
269,835 UART: [kat] SHA2-256
459,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,438 UART: [kat] ++
470,889 UART: [kat] sha1
482,404 UART: [kat] SHA2-256
485,435 UART: [kat] SHA2-384
492,926 UART: [kat] SHA2-512-ACC
495,509 UART: [kat] ECC-384
2,947,347 UART: [kat] HMAC-384Kdf
2,972,080 UART: [kat] LMS
3,503,830 UART: [kat] --
3,509,174 UART: [cold-reset] ++
3,511,674 UART: [fht] FHT @ 0x50003400
3,522,865 UART: [idev] ++
3,523,580 UART: [idev] CDI.KEYID = 6
3,524,510 UART: [idev] SUBJECT.KEYID = 7
3,525,681 UART: [idev] UDS.KEYID = 0
3,526,947 ready_for_fw is high
3,527,163 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,070 UART: [idev] Erasing UDS.KEYID = 0
6,029,779 UART: [idev] Sha1 KeyId Algorithm
6,052,498 UART: [idev] --
6,057,770 UART: [ldev] ++
6,058,460 UART: [ldev] CDI.KEYID = 6
6,059,382 UART: [ldev] SUBJECT.KEYID = 5
6,060,544 UART: [ldev] AUTHORITY.KEYID = 7
6,061,778 UART: [ldev] FE.KEYID = 1
6,101,268 UART: [ldev] Erasing FE.KEYID = 1
8,609,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,439 UART: [ldev] --
10,411,980 UART: [fwproc] Wait for Commands...
10,413,590 UART: [fwproc] Recv command 0x46574c44
10,415,897 UART: [fwproc] Recv'd Img size: 114360 bytes
13,854,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,045,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,587,831 >>> mbox cmd response: success
14,592,501 UART: [afmc] ++
14,593,212 UART: [afmc] CDI.KEYID = 6
14,594,331 UART: [afmc] SUBJECT.KEYID = 7
14,595,879 UART: [afmc] AUTHORITY.KEYID = 5
17,130,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,646 UART: [afmc] --
18,948,844 UART: [cold-reset] --
18,952,572 UART: [state] Locking Datavault
18,958,212 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,372 UART: [state] Locking ICCM
18,962,746 UART: [exit] Launching FMC @ 0x40000130
18,971,431 UART:
18,971,669 UART: Running Caliptra FMC ...
18,972,771 UART:
18,972,932 UART: [state] CFI Enabled
19,030,537 UART: [fht] FMC Alias Private Key: 7
20,794,867 UART: [art] Extend RT PCRs Done
20,796,098 UART: [art] Lock RT PCRs Done
20,797,377 UART: [art] Populate DV Done
20,802,796 UART: [fht] FMC Alias Private Key: 7
20,804,286 UART: [art] Derive CDI
20,805,024 UART: [art] Store in in slot 0x4
20,863,243 UART: [art] Derive Key Pair
20,864,301 UART: [art] Store priv key in slot 0x5
23,327,630 UART: [art] Derive Key Pair - Done
23,340,640 UART: [art] Signing Cert with AUTHO
23,341,981 UART: RITY.KEYID = 7
25,053,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,841 UART: [art] PUB.X = 58447CD145FF4F22B5EF244580FF84C167293786202CD7EE8DC506CA9A6020A713F9B90C7A1692DDC160030C6641C6E8
25,062,083 UART: [art] PUB.Y = 5B35FC7955B49DDB1270DA3F79562D1DA144F6067043490B428AE90D061611C326C4C6F32EC6EF9E32AD6054C81D7DDA
25,069,359 UART: [art] SIG.R = DFEFE7D07D3D1F14E215CBDF00F352DDF022A4DC55EEF86BEEAB77F76C55D0C38444981529CD6A49BBE4D27BB70DF634
25,076,762 UART: [art] SIG.S = 71F4AF221905C4006FBFF1011AE0789DCE600C083797A881B5050D3A2F1A26FF138C40F6BD1407C81D40F3B6FAD9B0EF
26,056,429 UART: Caliptra RT
26,057,147 UART: [state] CFI Enabled
26,221,784 UART: [rt] RT listening for mailbox commands...
26,223,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,254,570 UART: [rt]cmd =0x4d454153, len=108
26,256,254 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,439,564 ready_for_fw is high
3,440,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,742,020 >>> mbox cmd response: success
19,025,649 UART:
19,026,056 UART: Running Caliptra FMC ...
19,027,202 UART:
19,027,364 UART: [state] CFI Enabled
19,093,487 UART: [fht] FMC Alias Private Key: 7
20,857,132 UART: [art] Extend RT PCRs Done
20,858,353 UART: [art] Lock RT PCRs Done
20,860,275 UART: [art] Populate DV Done
20,865,679 UART: [fht] FMC Alias Private Key: 7
20,867,382 UART: [art] Derive CDI
20,868,122 UART: [art] Store in in slot 0x4
20,926,631 UART: [art] Derive Key Pair
20,927,666 UART: [art] Store priv key in slot 0x5
23,390,680 UART: [art] Derive Key Pair - Done
23,403,808 UART: [art] Signing Cert with AUTHO
23,405,116 UART: RITY.KEYID = 7
25,116,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,138 UART: [art] PUB.X = FA91A2205227D06DFCE48721FF5347A9ECBB039E006F5DDF2AE20A6C7BB54B22DE2645B889A020C947C813030F3E845C
25,125,407 UART: [art] PUB.Y = 44DA049925E9F8C916AF3F86B8BAD9A709A3456A0D0FFDDF9AC356EA91EF29D0969A13B88FABF6D98549652189DBF864
25,132,690 UART: [art] SIG.R = ED62A2F6A2AF6350E9D9947E760F791774EF2A30CAC8711833E77C9C7D367B4ECEA0B6CB85BD3BA05AF6968DE887952A
25,140,060 UART: [art] SIG.S = 62C6ED27A5EF4B83456B45B287190DC1BEAAE0E0E339A9665CCD027922B478C3A5AA7859F72CE3B81BFDFC22C769CBD5
26,118,668 UART: Caliptra RT
26,119,381 UART: [state] CFI Enabled
26,285,377 UART: [rt] RT listening for mailbox commands...
26,287,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,317,785 UART: [rt]cmd =0x4d454153, len=108
26,319,577 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,452 UART:
192,816 UART: Running Caliptra ROM ...
193,949 UART:
603,460 UART: [state] CFI Enabled
616,578 UART: [state] LifecycleState = Unprovisioned
618,604 UART: [state] DebugLocked = No
620,554 UART: [state] WD Timer not started. Device not locked for debugging
625,576 UART: [kat] SHA2-256
815,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,293 UART: [kat] ++
826,765 UART: [kat] sha1
838,491 UART: [kat] SHA2-256
841,574 UART: [kat] SHA2-384
846,356 UART: [kat] SHA2-512-ACC
848,935 UART: [kat] ECC-384
3,290,822 UART: [kat] HMAC-384Kdf
3,305,538 UART: [kat] LMS
3,837,349 UART: [kat] --
3,843,141 UART: [cold-reset] ++
3,844,293 UART: [fht] FHT @ 0x50003400
3,854,930 UART: [idev] ++
3,855,649 UART: [idev] CDI.KEYID = 6
3,856,681 UART: [idev] SUBJECT.KEYID = 7
3,857,781 UART: [idev] UDS.KEYID = 0
3,859,045 ready_for_fw is high
3,859,241 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,866 UART: [idev] Erasing UDS.KEYID = 0
6,337,148 UART: [idev] Sha1 KeyId Algorithm
6,358,930 UART: [idev] --
6,363,195 UART: [ldev] ++
6,363,869 UART: [ldev] CDI.KEYID = 6
6,364,776 UART: [ldev] SUBJECT.KEYID = 5
6,365,985 UART: [ldev] AUTHORITY.KEYID = 7
6,367,158 UART: [ldev] FE.KEYID = 1
6,380,503 UART: [ldev] Erasing FE.KEYID = 1
8,854,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,492 UART: [ldev] --
10,646,466 UART: [fwproc] Wait for Commands...
10,649,205 UART: [fwproc] Recv command 0x46574c44
10,651,514 UART: [fwproc] Recv'd Img size: 114360 bytes
14,093,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,823,799 >>> mbox cmd response: success
14,828,528 UART: [afmc] ++
14,829,225 UART: [afmc] CDI.KEYID = 6
14,830,385 UART: [afmc] SUBJECT.KEYID = 7
14,831,916 UART: [afmc] AUTHORITY.KEYID = 5
17,335,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,404 UART: [afmc] --
19,136,008 UART: [cold-reset] --
19,140,201 UART: [state] Locking Datavault
19,145,766 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,902 UART: [state] Locking ICCM
19,150,052 UART: [exit] Launching FMC @ 0x40000130
19,158,726 UART:
19,158,960 UART: Running Caliptra FMC ...
19,159,982 UART:
19,160,130 UART: [state] CFI Enabled
19,168,463 UART: [fht] FMC Alias Private Key: 7
20,925,889 UART: [art] Extend RT PCRs Done
20,927,116 UART: [art] Lock RT PCRs Done
20,928,926 UART: [art] Populate DV Done
20,934,441 UART: [fht] FMC Alias Private Key: 7
20,935,978 UART: [art] Derive CDI
20,936,739 UART: [art] Store in in slot 0x4
20,979,439 UART: [art] Derive Key Pair
20,980,479 UART: [art] Store priv key in slot 0x5
23,407,517 UART: [art] Derive Key Pair - Done
23,420,508 UART: [art] Signing Cert with AUTHO
23,421,810 UART: RITY.KEYID = 7
25,127,505 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,009 UART: [art] PUB.X = 754097D138F2B7D728B2AE8DBC68CF83DF4F54FF6913A80F8860CDC579FFDC7F904CE8851DEC8D494813C8A76CC84AEF
25,136,257 UART: [art] PUB.Y = DF7FC2B09ACDB2E370A2622E63E4387CD88D528B4D94578BA5012E89240D385DCF1B47092F7FEE3F57DB834AB258EAA9
25,143,550 UART: [art] SIG.R = AA38861D4F3A295CC07DFC67E613ED0AA07D603FFD6B1FA61F94DB1B3C648541727A68874B8936E2C9C41C5800BA1C24
25,150,963 UART: [art] SIG.S = C7264FB1CDA10F6DAFE7CEDBF09F1CE9CC92AC7AD3B76114546DA1E6E2E197BA1A83B6CE0CFB59A0F00EBD77B0EA6230
26,130,354 UART: Caliptra RT
26,131,042 UART: [state] CFI Enabled
26,248,869 UART: [rt] RT listening for mailbox commands...
26,250,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,281,737 UART: [rt]cmd =0x4d454153, len=108
26,283,750 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,754,760 ready_for_fw is high
3,755,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,952,350 >>> mbox cmd response: success
19,202,693 UART:
19,203,083 UART: Running Caliptra FMC ...
19,204,183 UART:
19,204,334 UART: [state] CFI Enabled
19,212,232 UART: [fht] FMC Alias Private Key: 7
20,969,152 UART: [art] Extend RT PCRs Done
20,970,376 UART: [art] Lock RT PCRs Done
20,972,135 UART: [art] Populate DV Done
20,977,752 UART: [fht] FMC Alias Private Key: 7
20,979,183 UART: [art] Derive CDI
20,979,936 UART: [art] Store in in slot 0x4
21,022,369 UART: [art] Derive Key Pair
21,023,412 UART: [art] Store priv key in slot 0x5
23,449,250 UART: [art] Derive Key Pair - Done
23,461,922 UART: [art] Signing Cert with AUTHO
23,463,227 UART: RITY.KEYID = 7
25,168,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,264 UART: [art] PUB.X = A3B1FC21517C876B6F8FA6FABB859CB3BA5261D6F9FE812CC5945676320BBF55BEA8F2054A547F33F57D241BD1F5BA43
25,177,526 UART: [art] PUB.Y = 540AE9B90A7F272ED26014CA7A334C85C469E113749F7286880D2EC33DEFC6FCC1689AFD9F1EA22E42DE8D186FB7698A
25,184,846 UART: [art] SIG.R = 9A2AAA0394244335B9A0DA36401FAFB578866D1A72691956206E4DEC094210BA98DEF6D4D5456D1F18D3C0C7EFC4DECC
25,192,199 UART: [art] SIG.S = 54F2A06A4201D636B4EB30A7DCDEA7471F05E04C13EAE13E6BBC75865ECD794726D429C84D3E553F585E3BC66AD9F39E
26,171,343 UART: Caliptra RT
26,172,051 UART: [state] CFI Enabled
26,289,460 UART: [rt] RT listening for mailbox commands...
26,291,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,322,072 UART: [rt]cmd =0x4d454153, len=108
26,323,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,067 UART: [kat] SHA2-256
881,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,113 UART: [kat] ++
886,265 UART: [kat] sha1
890,621 UART: [kat] SHA2-256
892,559 UART: [kat] SHA2-384
895,462 UART: [kat] SHA2-512-ACC
897,363 UART: [kat] ECC-384
902,762 UART: [kat] HMAC-384Kdf
907,270 UART: [kat] LMS
1,475,466 UART: [kat] --
1,476,265 UART: [cold-reset] ++
1,476,601 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 ready_for_fw is high
1,480,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,382 UART: [idev] Erasing UDS.KEYID = 0
1,504,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,092 UART: [idev] --
1,513,949 UART: [ldev] ++
1,514,117 UART: [ldev] CDI.KEYID = 6
1,514,480 UART: [ldev] SUBJECT.KEYID = 5
1,514,906 UART: [ldev] AUTHORITY.KEYID = 7
1,515,369 UART: [ldev] FE.KEYID = 1
1,520,699 UART: [ldev] Erasing FE.KEYID = 1
1,545,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,772 UART: [ldev] --
1,585,093 UART: [fwproc] Waiting for Commands...
1,585,810 UART: [fwproc] Received command 0x46574c44
1,586,601 UART: [fwproc] Received Image of size 114360 bytes
2,883,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,150 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,393 >>> mbox cmd response: success
3,077,627 UART: [afmc] ++
3,077,795 UART: [afmc] CDI.KEYID = 6
3,078,157 UART: [afmc] SUBJECT.KEYID = 7
3,078,582 UART: [afmc] AUTHORITY.KEYID = 5
3,113,947 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,302 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,992 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,827 UART: [afmc] --
3,156,747 UART: [cold-reset] --
3,157,431 UART: [state] Locking Datavault
3,158,706 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,310 UART: [state] Locking ICCM
3,159,794 UART: [exit] Launching FMC @ 0x40000130
3,165,123 UART:
3,165,139 UART: Running Caliptra FMC ...
3,165,547 UART:
3,165,601 UART: [state] CFI Enabled
3,176,044 UART: [fht] FMC Alias Private Key: 7
3,284,327 UART: [art] Extend RT PCRs Done
3,284,755 UART: [art] Lock RT PCRs Done
3,286,693 UART: [art] Populate DV Done
3,295,016 UART: [fht] FMC Alias Private Key: 7
3,296,118 UART: [art] Derive CDI
3,296,398 UART: [art] Store in in slot 0x4
3,382,103 UART: [art] Derive Key Pair
3,382,463 UART: [art] Store priv key in slot 0x5
3,395,753 UART: [art] Derive Key Pair - Done
3,410,689 UART: [art] Signing Cert with AUTHO
3,411,169 UART: RITY.KEYID = 7
3,426,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,290 UART: [art] PUB.X = D456858FEDE4B7B2272334A3446AF0E9BC3AE3F9BBAE775E0116685CBDF328C9E01D016899A5DD89870CB833EABEBDC6
3,434,069 UART: [art] PUB.Y = F557D9F4419FAF585F8B385255C8023EC7F82C02772D844D7A85524D217B4AD896FF2823A3A88C9F61BA7CED939E7CC3
3,441,019 UART: [art] SIG.R = 8C5EBC680AC89AF6DE46814C7A74CA71F2230486F561FC033FAD7414458720EB4B09BEBBCD3F5F63C25BE99054DD5BCF
3,447,795 UART: [art] SIG.S = DA664F93A10121210718F16E754D3A12B45D85ECFC56D00695C550655EB686C102C51BD71999CED1E541CBACBC0B0B4E
3,471,642 UART: Caliptra RT
3,471,896 UART: [state] CFI Enabled
3,579,737 UART: [rt] RT listening for mailbox commands...
3,580,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,582 UART: [rt]cmd =0x4d454153, len=108
3,612,317 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 ready_for_fw is high
1,362,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,897 >>> mbox cmd response: success
2,991,081 UART:
2,991,097 UART: Running Caliptra FMC ...
2,991,505 UART:
2,991,559 UART: [state] CFI Enabled
3,002,310 UART: [fht] FMC Alias Private Key: 7
3,110,197 UART: [art] Extend RT PCRs Done
3,110,625 UART: [art] Lock RT PCRs Done
3,112,091 UART: [art] Populate DV Done
3,120,208 UART: [fht] FMC Alias Private Key: 7
3,121,264 UART: [art] Derive CDI
3,121,544 UART: [art] Store in in slot 0x4
3,207,275 UART: [art] Derive Key Pair
3,207,635 UART: [art] Store priv key in slot 0x5
3,220,489 UART: [art] Derive Key Pair - Done
3,235,518 UART: [art] Signing Cert with AUTHO
3,235,998 UART: RITY.KEYID = 7
3,251,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,929 UART: [art] PUB.X = DDA0501CCF65782E4BEFFEAB6AAAB0A9F9A2F90FF325BF54B006A03D7F66E058C613D94F7C964EB45F3ED84DDB7ECCA0
3,258,725 UART: [art] PUB.Y = 7ECE8EB846B181CF36D98C29C69FE2629B5EC02BB105472E35C2F45E5CC642220D8D72BD5CA5D2AF7FED8685068E1DFF
3,265,684 UART: [art] SIG.R = 2AF0AEC78C00BD5EBF3B8A4440C33F665DB01CF8E09C46798FBE325796A6099A787A9B386FC01E20A8A9EAC0AD47FCE9
3,272,449 UART: [art] SIG.S = 872A84F4BA2217B236EBA2D091BF9D52FE9175440488D43017F49C2FA2CF5D6C4333D12D75FAEF23805ED2913B95756C
3,296,509 UART: Caliptra RT
3,296,763 UART: [state] CFI Enabled
3,404,617 UART: [rt] RT listening for mailbox commands...
3,405,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,406 UART: [rt]cmd =0x4d454153, len=108
3,437,019 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
891,144 UART: [kat] SHA2-256
893,082 UART: [kat] SHA2-384
895,753 UART: [kat] SHA2-512-ACC
897,654 UART: [kat] ECC-384
903,131 UART: [kat] HMAC-384Kdf
907,945 UART: [kat] LMS
1,476,141 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,474 UART: [fht] Storing FHT @ 0x50003400
1,480,363 UART: [idev] ++
1,480,531 UART: [idev] CDI.KEYID = 6
1,480,891 UART: [idev] SUBJECT.KEYID = 7
1,481,315 UART: [idev] UDS.KEYID = 0
1,481,660 ready_for_fw is high
1,481,660 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,931 UART: [idev] Erasing UDS.KEYID = 0
1,505,827 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,232 UART: [ldev] ++
1,515,400 UART: [ldev] CDI.KEYID = 6
1,515,763 UART: [ldev] SUBJECT.KEYID = 5
1,516,189 UART: [ldev] AUTHORITY.KEYID = 7
1,516,652 UART: [ldev] FE.KEYID = 1
1,521,928 UART: [ldev] Erasing FE.KEYID = 1
1,547,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,333 UART: [ldev] --
1,586,820 UART: [fwproc] Waiting for Commands...
1,587,453 UART: [fwproc] Received command 0x46574c44
1,588,244 UART: [fwproc] Received Image of size 114360 bytes
2,886,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,202 >>> mbox cmd response: success
3,080,212 UART: [afmc] ++
3,080,380 UART: [afmc] CDI.KEYID = 6
3,080,742 UART: [afmc] SUBJECT.KEYID = 7
3,081,167 UART: [afmc] AUTHORITY.KEYID = 5
3,116,736 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,211 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,901 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,720 UART: [afmc] --
3,159,772 UART: [cold-reset] --
3,160,642 UART: [state] Locking Datavault
3,161,897 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,501 UART: [state] Locking ICCM
3,163,051 UART: [exit] Launching FMC @ 0x40000130
3,168,380 UART:
3,168,396 UART: Running Caliptra FMC ...
3,168,804 UART:
3,168,947 UART: [state] CFI Enabled
3,179,612 UART: [fht] FMC Alias Private Key: 7
3,287,451 UART: [art] Extend RT PCRs Done
3,287,879 UART: [art] Lock RT PCRs Done
3,289,195 UART: [art] Populate DV Done
3,297,146 UART: [fht] FMC Alias Private Key: 7
3,298,158 UART: [art] Derive CDI
3,298,438 UART: [art] Store in in slot 0x4
3,383,697 UART: [art] Derive Key Pair
3,384,057 UART: [art] Store priv key in slot 0x5
3,397,177 UART: [art] Derive Key Pair - Done
3,411,813 UART: [art] Signing Cert with AUTHO
3,412,293 UART: RITY.KEYID = 7
3,427,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,000 UART: [art] PUB.X = 509595D9839E54DAA53E59B65782BD2C134149D4D46AC45563EF0E40AF94AA7AD78E0EC124ED259B36EE5572FD461D5B
3,434,772 UART: [art] PUB.Y = 578250F012A1ACE62F2AA2AAC57C48D44DB1D06519F917D0A30B277092F6921358FE1F8B28919F76639A7E313ECA9D7D
3,441,723 UART: [art] SIG.R = 0B36BB06809E75111E15027C26C470D7139ECC1FE80A3F5F8FC761B937D3F1C2B40AAC6B10C19987553A0B6F0ED50CC5
3,448,477 UART: [art] SIG.S = 65D177FE91659E0D4D12FA8E0EA744D2AA626D2B873325CBCE8C2E9FF1BBACD04E92C8F3785543A689B0345F587DAFB3
3,472,324 UART: Caliptra RT
3,472,670 UART: [state] CFI Enabled
3,580,559 UART: [rt] RT listening for mailbox commands...
3,581,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,400 UART: [rt]cmd =0x4d454153, len=108
3,612,877 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,118 ready_for_fw is high
1,363,118 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,122 >>> mbox cmd response: success
2,990,018 UART:
2,990,034 UART: Running Caliptra FMC ...
2,990,442 UART:
2,990,585 UART: [state] CFI Enabled
3,001,350 UART: [fht] FMC Alias Private Key: 7
3,109,479 UART: [art] Extend RT PCRs Done
3,109,907 UART: [art] Lock RT PCRs Done
3,111,571 UART: [art] Populate DV Done
3,119,822 UART: [fht] FMC Alias Private Key: 7
3,120,826 UART: [art] Derive CDI
3,121,106 UART: [art] Store in in slot 0x4
3,206,673 UART: [art] Derive Key Pair
3,207,033 UART: [art] Store priv key in slot 0x5
3,220,669 UART: [art] Derive Key Pair - Done
3,235,310 UART: [art] Signing Cert with AUTHO
3,235,790 UART: RITY.KEYID = 7
3,250,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,601 UART: [art] PUB.X = 7AF71ACF7A486DE0F4492BCAE79ABC87D6743FA2E4F1DE27EEE581D60A6E2C9F653E830FEE12B7896166CEE8D57DBEB1
3,258,391 UART: [art] PUB.Y = 5DA7C7F72D4A0763E95A21B4D0E229EAA50582675E239B7B3C6CA8F593AF3B5FC4554D3D2D3AC50042A2B6807618519E
3,265,319 UART: [art] SIG.R = 652679E4D5897C254D6349F6DEBC129C2FAEA5BD8B2CD7DBD01CDA19D780E0BF2EB21B27AFE448E34297B2B8951EE1B3
3,272,109 UART: [art] SIG.S = E6B8156EDD5667185A7B8F66CC691334F9096C28385324E516EC5230248C161EAB630C09AC77CE633E46AD6E5C82490E
3,295,678 UART: Caliptra RT
3,296,024 UART: [state] CFI Enabled
3,404,674 UART: [rt] RT listening for mailbox commands...
3,405,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,581 UART: [rt]cmd =0x4d454153, len=108
3,437,240 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,682 UART: [state] LifecycleState = Unprovisioned
86,337 UART: [state] DebugLocked = No
87,015 UART: [state] WD Timer not started. Device not locked for debugging
88,298 UART: [kat] SHA2-256
893,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,073 UART: [kat] ++
898,225 UART: [kat] sha1
902,383 UART: [kat] SHA2-256
904,323 UART: [kat] SHA2-384
907,104 UART: [kat] SHA2-512-ACC
909,005 UART: [kat] ECC-384
918,656 UART: [kat] HMAC-384Kdf
923,314 UART: [kat] LMS
1,171,642 UART: [kat] --
1,172,501 UART: [cold-reset] ++
1,173,077 UART: [fht] FHT @ 0x50003400
1,175,910 UART: [idev] ++
1,176,078 UART: [idev] CDI.KEYID = 6
1,176,438 UART: [idev] SUBJECT.KEYID = 7
1,176,862 UART: [idev] UDS.KEYID = 0
1,177,207 ready_for_fw is high
1,177,207 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,580 UART: [idev] Erasing UDS.KEYID = 0
1,201,893 UART: [idev] Sha1 KeyId Algorithm
1,210,263 UART: [idev] --
1,211,225 UART: [ldev] ++
1,211,393 UART: [ldev] CDI.KEYID = 6
1,211,756 UART: [ldev] SUBJECT.KEYID = 5
1,212,182 UART: [ldev] AUTHORITY.KEYID = 7
1,212,645 UART: [ldev] FE.KEYID = 1
1,218,199 UART: [ldev] Erasing FE.KEYID = 1
1,244,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,941 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,086 UART: [fwproc] Recv command 0x46574c44
1,284,814 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,768 >>> mbox cmd response: success
2,775,906 UART: [afmc] ++
2,776,074 UART: [afmc] CDI.KEYID = 6
2,776,436 UART: [afmc] SUBJECT.KEYID = 7
2,776,861 UART: [afmc] AUTHORITY.KEYID = 5
2,812,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,617 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,949 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,943 UART: [afmc] --
2,855,961 UART: [cold-reset] --
2,856,961 UART: [state] Locking Datavault
2,857,990 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,594 UART: [state] Locking ICCM
2,859,070 UART: [exit] Launching FMC @ 0x40000130
2,864,399 UART:
2,864,415 UART: Running Caliptra FMC ...
2,864,823 UART:
2,864,877 UART: [state] CFI Enabled
2,875,402 UART: [fht] FMC Alias Private Key: 7
2,983,465 UART: [art] Extend RT PCRs Done
2,983,893 UART: [art] Lock RT PCRs Done
2,985,575 UART: [art] Populate DV Done
2,993,666 UART: [fht] FMC Alias Private Key: 7
2,994,630 UART: [art] Derive CDI
2,994,910 UART: [art] Store in in slot 0x4
3,080,833 UART: [art] Derive Key Pair
3,081,193 UART: [art] Store priv key in slot 0x5
3,093,385 UART: [art] Derive Key Pair - Done
3,108,249 UART: [art] Signing Cert with AUTHO
3,108,729 UART: RITY.KEYID = 7
3,124,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,822 UART: [art] PUB.X = 47A85FE647E61B75E4632E4BCEF55BADAEFC4AD25D56F8603F11C93791A7F6074594525E15CE1871906E525EC07A2B90
3,131,595 UART: [art] PUB.Y = 718CF17C51CBDA36C96ED272ED5844CBB5E6F7EBEE234D263EC240002FDA41868983475D1FC3D0C3629D94BFB8E6A226
3,138,537 UART: [art] SIG.R = 6CB545BF4C6806F070E029880871327E48A762025CD392B43F01F1F76AA6C151004718886589C9D78E9F9B6454F30975
3,145,256 UART: [art] SIG.S = B852550365EBF2EA0D6257A7AC7838C5FC43CAC97FF487821B0A4EFCAA700DA3A5F4FE33BB4D861E77ED5791FB053D5B
3,168,738 UART: Caliptra RT
3,168,992 UART: [state] CFI Enabled
3,276,640 UART: [rt] RT listening for mailbox commands...
3,277,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,365 UART: [rt]cmd =0x4d454153, len=108
3,308,836 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,379 ready_for_fw is high
1,059,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,219 >>> mbox cmd response: success
2,688,393 UART:
2,688,409 UART: Running Caliptra FMC ...
2,688,817 UART:
2,688,871 UART: [state] CFI Enabled
2,699,612 UART: [fht] FMC Alias Private Key: 7
2,807,115 UART: [art] Extend RT PCRs Done
2,807,543 UART: [art] Lock RT PCRs Done
2,809,117 UART: [art] Populate DV Done
2,817,444 UART: [fht] FMC Alias Private Key: 7
2,818,424 UART: [art] Derive CDI
2,818,704 UART: [art] Store in in slot 0x4
2,904,317 UART: [art] Derive Key Pair
2,904,677 UART: [art] Store priv key in slot 0x5
2,917,045 UART: [art] Derive Key Pair - Done
2,931,747 UART: [art] Signing Cert with AUTHO
2,932,227 UART: RITY.KEYID = 7
2,947,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,016 UART: [art] PUB.X = DFC863B35B53DD18EB967E7B9EB5420082470D4F698DE47E002B0835317D580CAFEFEC4BFCA9D6E78C864918DF661084
2,954,743 UART: [art] PUB.Y = 62E2AB4ABF12CA4D7644041CA403FDC6BEBDB83C889BDDF31E290FC8C7693DA89F7E92245B9F6137BF03E682590DA530
2,961,694 UART: [art] SIG.R = F8B6DCE9B673A1BB77B01EDF3B1EC57976D16FADB44BF9133AA2126745702554213FA6696ED3BE22B7775AF73114E80C
2,968,471 UART: [art] SIG.S = 3138425E79F187C5F967915F1D0D5E5B7431485D0FDE3BFD73DA17E277BE315E9896B7C8D00F956676F8B98330FC605F
2,992,193 UART: Caliptra RT
2,992,447 UART: [state] CFI Enabled
3,100,737 UART: [rt] RT listening for mailbox commands...
3,101,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,486 UART: [rt]cmd =0x4d454153, len=108
3,132,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,403 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,390 UART: [cold-reset] ++
1,172,828 UART: [fht] FHT @ 0x50003400
1,175,521 UART: [idev] ++
1,175,689 UART: [idev] CDI.KEYID = 6
1,176,049 UART: [idev] SUBJECT.KEYID = 7
1,176,473 UART: [idev] UDS.KEYID = 0
1,176,818 ready_for_fw is high
1,176,818 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,788 UART: [idev] Sha1 KeyId Algorithm
1,210,372 UART: [idev] --
1,211,430 UART: [ldev] ++
1,211,598 UART: [ldev] CDI.KEYID = 6
1,211,961 UART: [ldev] SUBJECT.KEYID = 5
1,212,387 UART: [ldev] AUTHORITY.KEYID = 7
1,212,850 UART: [ldev] FE.KEYID = 1
1,218,086 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,312 UART: [ldev] --
1,283,597 UART: [fwproc] Wait for Commands...
1,284,183 UART: [fwproc] Recv command 0x46574c44
1,284,911 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,693 >>> mbox cmd response: success
2,775,761 UART: [afmc] ++
2,775,929 UART: [afmc] CDI.KEYID = 6
2,776,291 UART: [afmc] SUBJECT.KEYID = 7
2,776,716 UART: [afmc] AUTHORITY.KEYID = 5
2,812,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,540 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,425 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,144 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,012 UART: [afmc] --
2,855,960 UART: [cold-reset] --
2,856,954 UART: [state] Locking Datavault
2,858,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,793 UART: [state] Locking ICCM
2,859,441 UART: [exit] Launching FMC @ 0x40000130
2,864,770 UART:
2,864,786 UART: Running Caliptra FMC ...
2,865,194 UART:
2,865,337 UART: [state] CFI Enabled
2,876,114 UART: [fht] FMC Alias Private Key: 7
2,984,149 UART: [art] Extend RT PCRs Done
2,984,577 UART: [art] Lock RT PCRs Done
2,986,181 UART: [art] Populate DV Done
2,994,148 UART: [fht] FMC Alias Private Key: 7
2,995,262 UART: [art] Derive CDI
2,995,542 UART: [art] Store in in slot 0x4
3,081,557 UART: [art] Derive Key Pair
3,081,917 UART: [art] Store priv key in slot 0x5
3,094,909 UART: [art] Derive Key Pair - Done
3,109,349 UART: [art] Signing Cert with AUTHO
3,109,829 UART: RITY.KEYID = 7
3,124,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,760 UART: [art] PUB.X = FC96C632AE7F2950443ABF7C684F52EC614DC35929AA6877255B93B50E526C9A2368D1CFE726908AB1294E59A6AA1AB5
3,132,533 UART: [art] PUB.Y = 4BB558B97897E10D93207BF9985E1EE0A1D50E799D9B7295F55BDCEA82BDFFFB0F0F734D58ABC9DC598A3D4ECDB3B5A2
3,139,495 UART: [art] SIG.R = 088F97C5C7575EFA228C53E37038F7019A9255C04180C50A7D107E14E455126B69057D2812DE6F64A36F888AB04B71EB
3,146,247 UART: [art] SIG.S = 5C99F763097B8DF0EC84CB1C772673766D48531A53C3E25B2C5CB7296849E7D3469AC564C17F338E355E69AEE21FE400
3,170,429 UART: Caliptra RT
3,170,775 UART: [state] CFI Enabled
3,278,241 UART: [rt] RT listening for mailbox commands...
3,278,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,376 UART: [rt]cmd =0x4d454153, len=108
3,310,865 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,372 ready_for_fw is high
1,061,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,602 >>> mbox cmd response: success
2,690,782 UART:
2,690,798 UART: Running Caliptra FMC ...
2,691,206 UART:
2,691,349 UART: [state] CFI Enabled
2,701,808 UART: [fht] FMC Alias Private Key: 7
2,809,625 UART: [art] Extend RT PCRs Done
2,810,053 UART: [art] Lock RT PCRs Done
2,811,843 UART: [art] Populate DV Done
2,820,026 UART: [fht] FMC Alias Private Key: 7
2,821,008 UART: [art] Derive CDI
2,821,288 UART: [art] Store in in slot 0x4
2,907,291 UART: [art] Derive Key Pair
2,907,651 UART: [art] Store priv key in slot 0x5
2,920,669 UART: [art] Derive Key Pair - Done
2,935,675 UART: [art] Signing Cert with AUTHO
2,936,155 UART: RITY.KEYID = 7
2,951,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,526 UART: [art] PUB.X = 5DD4A9750A2B3412EF1A19DCD5177DBD580681C193C1E1ABC6602685BBAB279A5595533D0B2FCA70FD175BDA5567867B
2,959,297 UART: [art] PUB.Y = 6ED57B930E685D520619E32D940F59E55161E0E39BC5D82B766FC51BB715B702EF4CD22C5ED6B5216A6CAAB641EDD542
2,966,245 UART: [art] SIG.R = 68CD043C2FA5E69A8D3C6518918917B633144F9E8A136663B5EDA880E25621C6D253065E131A4DF04917687F6617F19D
2,973,001 UART: [art] SIG.S = 1F0844B2547B34D1F17A6BC04A37E828082BB1EE74830D9969C5286A50BCE3781BCB8CBD868A663F87B2C808F9912EAA
2,996,426 UART: Caliptra RT
2,996,772 UART: [state] CFI Enabled
3,103,970 UART: [rt] RT listening for mailbox commands...
3,104,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,539 UART: [rt]cmd =0x4d454153, len=108
3,136,080 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,700 UART: [state] LifecycleState = Unprovisioned
86,355 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,174,453 ready_for_fw is high
1,174,453 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,716 UART: [ldev] ++
1,208,884 UART: [ldev] CDI.KEYID = 6
1,209,248 UART: [ldev] SUBJECT.KEYID = 5
1,209,675 UART: [ldev] AUTHORITY.KEYID = 7
1,210,138 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,814 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,280,833 UART: [fwproc] Recv command 0x46574c44
1,281,566 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,968 >>> mbox cmd response: success
2,772,137 UART: [afmc] ++
2,772,305 UART: [afmc] CDI.KEYID = 6
2,772,668 UART: [afmc] SUBJECT.KEYID = 7
2,773,094 UART: [afmc] AUTHORITY.KEYID = 5
2,808,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,838 UART: [afmc] --
2,851,910 UART: [cold-reset] --
2,852,750 UART: [state] Locking Datavault
2,854,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,693 UART: [state] Locking ICCM
2,855,239 UART: [exit] Launching FMC @ 0x40000130
2,860,568 UART:
2,860,584 UART: Running Caliptra FMC ...
2,860,992 UART:
2,861,046 UART: [state] CFI Enabled
2,871,607 UART: [fht] FMC Alias Private Key: 7
2,979,732 UART: [art] Extend RT PCRs Done
2,980,160 UART: [art] Lock RT PCRs Done
2,982,028 UART: [art] Populate DV Done
2,990,163 UART: [fht] FMC Alias Private Key: 7
2,991,317 UART: [art] Derive CDI
2,991,597 UART: [art] Store in in slot 0x4
3,077,196 UART: [art] Derive Key Pair
3,077,556 UART: [art] Store priv key in slot 0x5
3,090,976 UART: [art] Derive Key Pair - Done
3,105,700 UART: [art] Signing Cert with AUTHO
3,106,180 UART: RITY.KEYID = 7
3,121,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,961 UART: [art] PUB.X = 03622260EE055DB96265D30DEF1D6E952417BD2851218792AB69F512531F01D234267FE37744C3288D174FDA5465AAD2
3,128,711 UART: [art] PUB.Y = 9C812AE7F5E8C0D6586726F1CF0D667BA8F7E096268B5ACB2E8549A9DE99EB1D727332EB33E0CCFC953DA4CE0025735B
3,135,650 UART: [art] SIG.R = 9938422885C110D09D7457E5C8A3F930E70FC0911EE216E1EF3A96BA5F43605E0676A4E824E28982D72312D7B2E74CEC
3,142,412 UART: [art] SIG.S = 3B2009947A6C41FEE2225A9BC5EA733ECAA137FE9A1BC8FFC4ED17F87C224A2099A17C8AFE71A809B71DB9BA817C5473
3,166,501 UART: Caliptra RT
3,166,755 UART: [state] CFI Enabled
3,274,801 UART: [rt] RT listening for mailbox commands...
3,275,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,672 UART: [rt]cmd =0x4d454153, len=108
3,307,135 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,864 ready_for_fw is high
1,055,864 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,970 >>> mbox cmd response: success
2,684,342 UART:
2,684,358 UART: Running Caliptra FMC ...
2,684,766 UART:
2,684,820 UART: [state] CFI Enabled
2,695,307 UART: [fht] FMC Alias Private Key: 7
2,803,676 UART: [art] Extend RT PCRs Done
2,804,104 UART: [art] Lock RT PCRs Done
2,805,740 UART: [art] Populate DV Done
2,813,869 UART: [fht] FMC Alias Private Key: 7
2,814,965 UART: [art] Derive CDI
2,815,245 UART: [art] Store in in slot 0x4
2,901,294 UART: [art] Derive Key Pair
2,901,654 UART: [art] Store priv key in slot 0x5
2,915,014 UART: [art] Derive Key Pair - Done
2,929,855 UART: [art] Signing Cert with AUTHO
2,930,335 UART: RITY.KEYID = 7
2,945,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,114 UART: [art] PUB.X = F83DA1B28C8FCB65A47CA771ABF33B7D7727F0DBB71831D7427D72C4B5BE0AA3482C5D6CB2935CCC86F49993D5A67A9A
2,952,899 UART: [art] PUB.Y = 1F01294A3CA46493EEF0C4D7B8791765D743C32344BD81EDD9D3B8F44FF028BD40D11585883C5ACE043FA689B8F33FDB
2,959,853 UART: [art] SIG.R = B8BEC39280242B2BDC10F4AC4FC795C8357E3AA83FBA8CE52089BEDE8E91B95CBF7118C97C72F7A242A2F817E43B497B
2,966,641 UART: [art] SIG.S = 1F55FC68035D12E0A2BE4F177A42A6B0CB869C29ECF11CFCA89BB26B2269C2ED8572BE88CBFC0D759E4925EE82D5191B
2,990,328 UART: Caliptra RT
2,990,582 UART: [state] CFI Enabled
3,097,826 UART: [rt] RT listening for mailbox commands...
3,098,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,733 UART: [rt]cmd =0x4d454153, len=108
3,130,318 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,595 UART: [kat] HMAC-384Kdf
921,399 UART: [kat] LMS
1,169,711 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,104 UART: [fht] FHT @ 0x50003400
1,173,858 UART: [idev] ++
1,174,026 UART: [idev] CDI.KEYID = 6
1,174,387 UART: [idev] SUBJECT.KEYID = 7
1,174,812 UART: [idev] UDS.KEYID = 0
1,175,158 ready_for_fw is high
1,175,158 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,735 UART: [ldev] ++
1,209,903 UART: [ldev] CDI.KEYID = 6
1,210,267 UART: [ldev] SUBJECT.KEYID = 5
1,210,694 UART: [ldev] AUTHORITY.KEYID = 7
1,211,157 UART: [ldev] FE.KEYID = 1
1,216,439 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,747 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,593 >>> mbox cmd response: success
2,775,812 UART: [afmc] ++
2,775,980 UART: [afmc] CDI.KEYID = 6
2,776,343 UART: [afmc] SUBJECT.KEYID = 7
2,776,769 UART: [afmc] AUTHORITY.KEYID = 5
2,812,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,447 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,061 UART: [afmc] --
2,856,057 UART: [cold-reset] --
2,857,047 UART: [state] Locking Datavault
2,858,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,712 UART: [state] Locking ICCM
2,859,386 UART: [exit] Launching FMC @ 0x40000130
2,864,715 UART:
2,864,731 UART: Running Caliptra FMC ...
2,865,139 UART:
2,865,282 UART: [state] CFI Enabled
2,876,059 UART: [fht] FMC Alias Private Key: 7
2,984,262 UART: [art] Extend RT PCRs Done
2,984,690 UART: [art] Lock RT PCRs Done
2,986,370 UART: [art] Populate DV Done
2,994,663 UART: [fht] FMC Alias Private Key: 7
2,995,651 UART: [art] Derive CDI
2,995,931 UART: [art] Store in in slot 0x4
3,081,726 UART: [art] Derive Key Pair
3,082,086 UART: [art] Store priv key in slot 0x5
3,095,266 UART: [art] Derive Key Pair - Done
3,109,838 UART: [art] Signing Cert with AUTHO
3,110,318 UART: RITY.KEYID = 7
3,126,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,775 UART: [art] PUB.X = CF5E951629C7410BCBE9EE9D79EB9804F781B838D3E9BCB8A4192B5B55F5C4DFB645C67FD9774974381EA2628C15FC25
3,133,549 UART: [art] PUB.Y = EC7AC1772B41EF04DA915C08AF044E13C5B143C6B40FCA2A1DF3068D69F38C116B9484A5FA134F83643F0EAB5B7973BE
3,140,495 UART: [art] SIG.R = 70EBEB9D39F150EA50E05147D79C308626897A1EC0A54BF79B6A5AAB5CF36B3FD6CCAFB738E52996CADEF1DA11D9531F
3,147,287 UART: [art] SIG.S = 3E91E2DD678496E528DFD26C0BFC6F9CC0BEAAB10309EB65E10344FDFE57485ABAF9FB0A5EBD58B525069787454D6BEA
3,171,140 UART: Caliptra RT
3,171,486 UART: [state] CFI Enabled
3,277,848 UART: [rt] RT listening for mailbox commands...
3,278,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,609 UART: [rt]cmd =0x4d454153, len=108
3,309,826 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 ready_for_fw is high
1,056,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,305 >>> mbox cmd response: success
2,686,245 UART:
2,686,261 UART: Running Caliptra FMC ...
2,686,669 UART:
2,686,812 UART: [state] CFI Enabled
2,697,141 UART: [fht] FMC Alias Private Key: 7
2,804,462 UART: [art] Extend RT PCRs Done
2,804,890 UART: [art] Lock RT PCRs Done
2,806,298 UART: [art] Populate DV Done
2,814,517 UART: [fht] FMC Alias Private Key: 7
2,815,535 UART: [art] Derive CDI
2,815,815 UART: [art] Store in in slot 0x4
2,901,478 UART: [art] Derive Key Pair
2,901,838 UART: [art] Store priv key in slot 0x5
2,914,460 UART: [art] Derive Key Pair - Done
2,929,052 UART: [art] Signing Cert with AUTHO
2,929,532 UART: RITY.KEYID = 7
2,944,792 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,557 UART: [art] PUB.X = A9E561C9FB3B5D4C0743F12F6D440384567AE752CD036EB8866B657C698331541C36F7FAE343E1FCBB22E462BBB6316F
2,952,324 UART: [art] PUB.Y = 005FAAD65006C5FD73F118A031022562B9890E4DF8C9CF175884D5A4E6112FA0339CE705EF075728D113BC3E3AC996EC
2,959,241 UART: [art] SIG.R = 3511D7CCE8D62F0DA794804D43E15D3E6F50CFD4ED52B3A96D1B1BC07D825875C03D20DE627BC538190AC29DBCB16134
2,966,017 UART: [art] SIG.S = 76E6ECFBC50C0DFFE786AAE05371FC566F6EA2A8F2E8717A64F5F3F7718CF310F470F4A81607ADAC2F759C3613E6D53F
2,990,295 UART: Caliptra RT
2,990,641 UART: [state] CFI Enabled
3,098,841 UART: [rt] RT listening for mailbox commands...
3,099,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,562 UART: [rt]cmd =0x4d454153, len=108
3,131,333 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,498 UART:
192,882 UART: Running Caliptra ROM ...
194,066 UART:
194,224 UART: [state] CFI Enabled
262,431 UART: [state] LifecycleState = Unprovisioned
264,401 UART: [state] DebugLocked = No
265,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,280 UART: [kat] SHA2-256
440,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,466 UART: [kat] ++
451,946 UART: [kat] sha1
463,100 UART: [kat] SHA2-256
465,814 UART: [kat] SHA2-384
473,096 UART: [kat] SHA2-512-ACC
475,446 UART: [kat] ECC-384
2,768,014 UART: [kat] HMAC-384Kdf
2,799,674 UART: [kat] LMS
3,989,978 UART: [kat] --
3,994,261 UART: [cold-reset] ++
3,995,932 UART: [fht] Storing FHT @ 0x50003400
4,008,640 UART: [idev] ++
4,009,214 UART: [idev] CDI.KEYID = 6
4,010,123 UART: [idev] SUBJECT.KEYID = 7
4,011,361 UART: [idev] UDS.KEYID = 0
4,012,340 ready_for_fw is high
4,012,524 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,937 UART: [idev] Erasing UDS.KEYID = 0
7,346,523 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,774 UART: [idev] --
7,371,583 UART: [ldev] ++
7,372,152 UART: [ldev] CDI.KEYID = 6
7,373,107 UART: [ldev] SUBJECT.KEYID = 5
7,374,312 UART: [ldev] AUTHORITY.KEYID = 7
7,375,595 UART: [ldev] FE.KEYID = 1
7,422,970 UART: [ldev] Erasing FE.KEYID = 1
10,756,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,338 UART: [ldev] --
13,116,563 UART: [fwproc] Waiting for Commands...
13,119,145 UART: [fwproc] Received command 0x46574c44
13,121,383 UART: [fwproc] Received Image of size 114036 bytes
17,183,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,644,286 >>> mbox cmd response: success
17,647,866 UART: [afmc] ++
17,648,460 UART: [afmc] CDI.KEYID = 6
17,649,368 UART: [afmc] SUBJECT.KEYID = 7
17,650,630 UART: [afmc] AUTHORITY.KEYID = 5
21,007,643 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,665 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,071 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,894 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,499 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,938 UART: [afmc] --
23,375,693 UART: [cold-reset] --
23,379,441 UART: [state] Locking Datavault
23,384,898 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,657 UART: [state] Locking ICCM
23,389,338 UART: [exit] Launching FMC @ 0x40000130
23,397,724 UART:
23,397,949 UART: Running Caliptra FMC ...
23,399,043 UART:
23,399,195 UART: [state] CFI Enabled
23,466,140 UART: [fht] FMC Alias Private Key: 7
25,804,221 UART: [art] Extend RT PCRs Done
25,805,441 UART: [art] Lock RT PCRs Done
25,807,220 UART: [art] Populate DV Done
25,812,624 UART: [fht] FMC Alias Private Key: 7
25,814,207 UART: [art] Derive CDI
25,815,013 UART: [art] Store in in slot 0x4
25,875,135 UART: [art] Derive Key Pair
25,876,170 UART: [art] Store priv key in slot 0x5
29,168,718 UART: [art] Derive Key Pair - Done
29,181,385 UART: [art] Signing Cert with AUTHO
29,182,688 UART: RITY.KEYID = 7
31,463,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,523 UART: [art] PUB.X = 28558DF709399425E165717A5D6FBC23E43AF624C9D14D6A06CAC9F7FB521CDDE5233F419DFCF9BDA04308D67241137E
31,471,742 UART: [art] PUB.Y = 76DF7EB4BC2BD94DCB3292F30846D0A4772DADD5DE8034D255DD8FEA4663CEED1FFBC6D71D7D047238EFEC8218035DCA
31,479,047 UART: [art] SIG.R = D9B2B39824C54292A96DF9D0A4541F004EC2132296148730103958C2D1E50FB9CEF111D1E098E8CF1FCDDB46D9BA95D3
31,486,435 UART: [art] SIG.S = E7D1B5EA6D0B35D807CAC3C3B17B3AAC31C26AE124C1EC697DFC407C49D60D36E533AA714989B722662C407B87B81464
32,791,321 UART: Caliptra RT
32,792,022 UART: [state] CFI Enabled
32,953,622 UART: [rt] RT listening for mailbox commands...
32,955,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,986,146 UART: [rt]cmd =0x4d454153, len=108
33,005,127 >>> mbox cmd response data (12 bytes)
33,005,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,036,563 UART: [rt]cmd =0x4d454153, len=108
33,054,824 >>> mbox cmd response data (12 bytes)
33,055,266 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,085,963 UART: [rt]cmd =0x4d454153, len=108
33,104,129 >>> mbox cmd response data (12 bytes)
33,104,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,135,310 UART: [rt]cmd =0x4d454153, len=108
33,154,315 >>> mbox cmd response data (12 bytes)
33,154,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,185,412 UART: [rt]cmd =0x4d454153, len=108
33,204,008 >>> mbox cmd response data (12 bytes)
33,204,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,235,011 UART: [rt]cmd =0x4d454153, len=108
33,253,665 >>> mbox cmd response data (12 bytes)
33,254,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,284,901 UART: [rt]cmd =0x4d454153, len=108
33,303,700 >>> mbox cmd response data (12 bytes)
33,304,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,334,608 UART: [rt]cmd =0x4d454153, len=108
33,353,082 >>> mbox cmd response data (12 bytes)
33,353,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,384,275 UART: [rt]cmd =0x4d454153, len=108
33,402,980 >>> mbox cmd response data (12 bytes)
33,403,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,434,126 UART: [rt]cmd =0x4d454153, len=108
33,452,274 >>> mbox cmd response data (12 bytes)
33,452,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,483,340 UART: [rt]cmd =0x4d454153, len=108
33,501,923 >>> mbox cmd response data (12 bytes)
33,502,335 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,533,041 UART: [rt]cmd =0x4d454153, len=108
33,551,782 >>> mbox cmd response data (12 bytes)
33,552,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,582,791 UART: [rt]cmd =0x4d454153, len=108
33,601,822 >>> mbox cmd response data (12 bytes)
33,602,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,632,878 UART: [rt]cmd =0x4d454153, len=108
33,651,908 >>> mbox cmd response data (12 bytes)
33,652,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,683,029 UART: [rt]cmd =0x4d454153, len=108
33,701,626 >>> mbox cmd response data (12 bytes)
33,702,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,732,644 UART: [rt]cmd =0x4d454153, len=108
33,735,179 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,807,202 ready_for_fw is high
3,807,766 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,893,075 >>> mbox cmd response: success
23,582,515 UART:
23,582,904 UART: Running Caliptra FMC ...
23,584,002 UART:
23,584,152 UART: [state] CFI Enabled
23,654,465 UART: [fht] FMC Alias Private Key: 7
25,992,447 UART: [art] Extend RT PCRs Done
25,993,670 UART: [art] Lock RT PCRs Done
25,995,553 UART: [art] Populate DV Done
26,000,857 UART: [fht] FMC Alias Private Key: 7
26,002,563 UART: [art] Derive CDI
26,003,301 UART: [art] Store in in slot 0x4
26,063,812 UART: [art] Derive Key Pair
26,064,851 UART: [art] Store priv key in slot 0x5
29,357,704 UART: [art] Derive Key Pair - Done
29,370,597 UART: [art] Signing Cert with AUTHO
29,371,898 UART: RITY.KEYID = 7
31,659,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,176 UART: [art] PUB.X = 6DF04CF464F8964BAA73B7DDA929864F40E68D8F3A98DE0077006E2799BEEDC63554E7B349623FDDE812E115C96E16E6
31,668,396 UART: [art] PUB.Y = 226521565688AFFE197B19A098F7FBBFDC8B47D0F304B89B6840CFAAA474CFB7AB397118A2D00EA3462E79C070A95170
31,675,649 UART: [art] SIG.R = A77C2CE4CE03BE5BBC014BE9FBD999A74346F4A9D2D3C969B4485EEDA707DC520446A8325BB83C1895C7928490A249ED
31,683,064 UART: [art] SIG.S = 0B3D93A61C0DA8A0F420465B5C70A417792409434C4B963C2B0AE3529642DB316D3D1363D34774510E483CE1C2FD239E
32,987,960 UART: Caliptra RT
32,988,669 UART: [state] CFI Enabled
33,149,254 UART: [rt] RT listening for mailbox commands...
33,151,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,181,883 UART: [rt]cmd =0x4d454153, len=108
33,200,153 >>> mbox cmd response data (12 bytes)
33,200,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,231,293 UART: [rt]cmd =0x4d454153, len=108
33,250,111 >>> mbox cmd response data (12 bytes)
33,250,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,281,203 UART: [rt]cmd =0x4d454153, len=108
33,299,857 >>> mbox cmd response data (12 bytes)
33,300,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,330,760 UART: [rt]cmd =0x4d454153, len=108
33,349,065 >>> mbox cmd response data (12 bytes)
33,349,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,380,072 UART: [rt]cmd =0x4d454153, len=108
33,398,727 >>> mbox cmd response data (12 bytes)
33,399,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,429,688 UART: [rt]cmd =0x4d454153, len=108
33,448,697 >>> mbox cmd response data (12 bytes)
33,449,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,479,653 UART: [rt]cmd =0x4d454153, len=108
33,498,904 >>> mbox cmd response data (12 bytes)
33,499,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,529,900 UART: [rt]cmd =0x4d454153, len=108
33,548,818 >>> mbox cmd response data (12 bytes)
33,549,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,579,912 UART: [rt]cmd =0x4d454153, len=108
33,598,815 >>> mbox cmd response data (12 bytes)
33,599,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,629,885 UART: [rt]cmd =0x4d454153, len=108
33,648,207 >>> mbox cmd response data (12 bytes)
33,648,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,679,116 UART: [rt]cmd =0x4d454153, len=108
33,697,799 >>> mbox cmd response data (12 bytes)
33,698,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,728,973 UART: [rt]cmd =0x4d454153, len=108
33,747,731 >>> mbox cmd response data (12 bytes)
33,748,254 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,778,797 UART: [rt]cmd =0x4d454153, len=108
33,797,614 >>> mbox cmd response data (12 bytes)
33,798,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,828,605 UART: [rt]cmd =0x4d454153, len=108
33,846,859 >>> mbox cmd response data (12 bytes)
33,847,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,877,793 UART: [rt]cmd =0x4d454153, len=108
33,896,722 >>> mbox cmd response data (12 bytes)
33,897,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,927,831 UART: [rt]cmd =0x4d454153, len=108
33,930,098 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
192,574 UART:
192,924 UART: Running Caliptra ROM ...
194,026 UART:
603,648 UART: [state] CFI Enabled
616,673 UART: [state] LifecycleState = Unprovisioned
618,634 UART: [state] DebugLocked = No
619,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,303 UART: [kat] SHA2-256
795,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,576 UART: [kat] ++
806,176 UART: [kat] sha1
816,843 UART: [kat] SHA2-256
819,570 UART: [kat] SHA2-384
826,337 UART: [kat] SHA2-512-ACC
828,699 UART: [kat] ECC-384
3,113,529 UART: [kat] HMAC-384Kdf
3,124,648 UART: [kat] LMS
4,314,761 UART: [kat] --
4,319,854 UART: [cold-reset] ++
4,321,150 UART: [fht] Storing FHT @ 0x50003400
4,331,272 UART: [idev] ++
4,331,932 UART: [idev] CDI.KEYID = 6
4,332,843 UART: [idev] SUBJECT.KEYID = 7
4,334,089 UART: [idev] UDS.KEYID = 0
4,335,104 ready_for_fw is high
4,335,320 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,588 UART: [idev] Erasing UDS.KEYID = 0
7,623,053 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,974 UART: [idev] --
7,649,554 UART: [ldev] ++
7,650,114 UART: [ldev] CDI.KEYID = 6
7,651,052 UART: [ldev] SUBJECT.KEYID = 5
7,652,262 UART: [ldev] AUTHORITY.KEYID = 7
7,653,546 UART: [ldev] FE.KEYID = 1
7,664,758 UART: [ldev] Erasing FE.KEYID = 1
10,954,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,111 UART: [ldev] --
13,317,262 UART: [fwproc] Waiting for Commands...
13,319,186 UART: [fwproc] Received command 0x46574c44
13,321,362 UART: [fwproc] Received Image of size 114036 bytes
17,370,568 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,284 >>> mbox cmd response: success
17,839,323 UART: [afmc] ++
17,839,975 UART: [afmc] CDI.KEYID = 6
17,840,859 UART: [afmc] SUBJECT.KEYID = 7
17,842,128 UART: [afmc] AUTHORITY.KEYID = 5
21,155,006 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,093 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,480 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,335 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,752 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,363 UART: [afmc] --
23,518,074 UART: [cold-reset] --
23,521,991 UART: [state] Locking Datavault
23,528,487 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,241 UART: [state] Locking ICCM
23,531,847 UART: [exit] Launching FMC @ 0x40000130
23,540,241 UART:
23,540,479 UART: Running Caliptra FMC ...
23,541,573 UART:
23,541,731 UART: [state] CFI Enabled
23,550,204 UART: [fht] FMC Alias Private Key: 7
25,881,360 UART: [art] Extend RT PCRs Done
25,882,578 UART: [art] Lock RT PCRs Done
25,884,417 UART: [art] Populate DV Done
25,889,724 UART: [fht] FMC Alias Private Key: 7
25,891,380 UART: [art] Derive CDI
25,892,196 UART: [art] Store in in slot 0x4
25,934,850 UART: [art] Derive Key Pair
25,935,889 UART: [art] Store priv key in slot 0x5
29,178,621 UART: [art] Derive Key Pair - Done
29,191,725 UART: [art] Signing Cert with AUTHO
29,193,061 UART: RITY.KEYID = 7
31,472,155 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,659 UART: [art] PUB.X = 8538850E64335133125F2B9C682F9D7C353CA419F175EED7DF3F0BFB20DE03B2649B90C7334F8B1A82223917DFB3F9FE
31,480,890 UART: [art] PUB.Y = 7ECF389A452F19DCF84B3D24FF9DBD75B335A08D52B05479A6BEDBADAD0D70611DF5514ED126851AF7076EEEC98BB3B9
31,488,183 UART: [art] SIG.R = F6F356B8FD60DBB68B14D47F9792B2CF6887866BE56F4C11C3E5E858A8FC7EA4E40BB579E804F73F33C3856A4214D085
31,495,524 UART: [art] SIG.S = C36E17C3BE85633407036B59B4BCE5AA23A93B6BA91C56AD5DAB977B163AC7BD1DFDAD285873B1A77DBEAE07C8150DEA
32,800,961 UART: Caliptra RT
32,801,675 UART: [state] CFI Enabled
32,919,390 UART: [rt] RT listening for mailbox commands...
32,921,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,951,829 UART: [rt]cmd =0x4d454153, len=108
32,970,740 >>> mbox cmd response data (12 bytes)
32,971,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,002,027 UART: [rt]cmd =0x4d454153, len=108
33,020,638 >>> mbox cmd response data (12 bytes)
33,021,072 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,051,785 UART: [rt]cmd =0x4d454153, len=108
33,069,515 >>> mbox cmd response data (12 bytes)
33,069,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,100,761 UART: [rt]cmd =0x4d454153, len=108
33,119,045 >>> mbox cmd response data (12 bytes)
33,119,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,150,116 UART: [rt]cmd =0x4d454153, len=108
33,168,279 >>> mbox cmd response data (12 bytes)
33,168,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,199,142 UART: [rt]cmd =0x4d454153, len=108
33,217,557 >>> mbox cmd response data (12 bytes)
33,217,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,248,567 UART: [rt]cmd =0x4d454153, len=108
33,267,284 >>> mbox cmd response data (12 bytes)
33,267,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,298,381 UART: [rt]cmd =0x4d454153, len=108
33,317,082 >>> mbox cmd response data (12 bytes)
33,317,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,348,097 UART: [rt]cmd =0x4d454153, len=108
33,367,218 >>> mbox cmd response data (12 bytes)
33,367,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,398,499 UART: [rt]cmd =0x4d454153, len=108
33,417,225 >>> mbox cmd response data (12 bytes)
33,417,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,448,192 UART: [rt]cmd =0x4d454153, len=108
33,467,317 >>> mbox cmd response data (12 bytes)
33,467,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,498,547 UART: [rt]cmd =0x4d454153, len=108
33,517,734 >>> mbox cmd response data (12 bytes)
33,518,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,548,904 UART: [rt]cmd =0x4d454153, len=108
33,567,557 >>> mbox cmd response data (12 bytes)
33,567,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,598,690 UART: [rt]cmd =0x4d454153, len=108
33,617,912 >>> mbox cmd response data (12 bytes)
33,618,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,648,878 UART: [rt]cmd =0x4d454153, len=108
33,668,075 >>> mbox cmd response data (12 bytes)
33,668,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,699,146 UART: [rt]cmd =0x4d454153, len=108
33,701,637 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,583 writing to cptra_bootfsm_go
4,125,686 ready_for_fw is high
4,126,060 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,063,861 >>> mbox cmd response: success
23,704,220 UART:
23,704,596 UART: Running Caliptra FMC ...
23,705,729 UART:
23,705,881 UART: [state] CFI Enabled
23,713,919 UART: [fht] FMC Alias Private Key: 7
26,044,431 UART: [art] Extend RT PCRs Done
26,045,651 UART: [art] Lock RT PCRs Done
26,047,490 UART: [art] Populate DV Done
26,053,076 UART: [fht] FMC Alias Private Key: 7
26,054,569 UART: [art] Derive CDI
26,055,541 UART: [art] Store in in slot 0x4
26,097,984 UART: [art] Derive Key Pair
26,098,994 UART: [art] Store priv key in slot 0x5
29,340,919 UART: [art] Derive Key Pair - Done
29,354,022 UART: [art] Signing Cert with AUTHO
29,355,325 UART: RITY.KEYID = 7
31,634,839 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,348 UART: [art] PUB.X = F23C5046DE2637A4FF3363B4B2F2CA217294D5A18FE11A6F437D575E8E312BC44F9E77CF924642D2F6C5BA24B6272B83
31,643,563 UART: [art] PUB.Y = 010A5AA498491476C112D36F84642A5F6CADD5F2C26C07FCB7F9449F81155664803059149E15810339EF8E29F616E5FA
31,650,767 UART: [art] SIG.R = 0F3773B601BEBDF4DDFD65ECBDFF3E15C0AE9F0922D2673D0DB3BFE80A2E2C5F5417CEC965D519B8457BBCFCC5C55D90
31,658,220 UART: [art] SIG.S = 0F6D2AE278CCE9DC326D9A78AA2BEAD88BFA26E33749C96DF0EC890C6D817D98BDB4234128DC694EEB69A606E7A392DC
32,962,952 UART: Caliptra RT
32,963,652 UART: [state] CFI Enabled
33,081,898 UART: [rt] RT listening for mailbox commands...
33,083,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,114,377 UART: [rt]cmd =0x4d454153, len=108
33,132,046 >>> mbox cmd response data (12 bytes)
33,132,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,163,462 UART: [rt]cmd =0x4d454153, len=108
33,182,251 >>> mbox cmd response data (12 bytes)
33,182,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,213,218 UART: [rt]cmd =0x4d454153, len=108
33,231,335 >>> mbox cmd response data (12 bytes)
33,231,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,262,468 UART: [rt]cmd =0x4d454153, len=108
33,281,228 >>> mbox cmd response data (12 bytes)
33,281,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,312,361 UART: [rt]cmd =0x4d454153, len=108
33,331,612 >>> mbox cmd response data (12 bytes)
33,332,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,362,801 UART: [rt]cmd =0x4d454153, len=108
33,381,385 >>> mbox cmd response data (12 bytes)
33,381,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,412,559 UART: [rt]cmd =0x4d454153, len=108
33,431,167 >>> mbox cmd response data (12 bytes)
33,431,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,462,452 UART: [rt]cmd =0x4d454153, len=108
33,480,950 >>> mbox cmd response data (12 bytes)
33,481,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,512,131 UART: [rt]cmd =0x4d454153, len=108
33,530,765 >>> mbox cmd response data (12 bytes)
33,531,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,562,039 UART: [rt]cmd =0x4d454153, len=108
33,580,157 >>> mbox cmd response data (12 bytes)
33,580,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,611,507 UART: [rt]cmd =0x4d454153, len=108
33,630,005 >>> mbox cmd response data (12 bytes)
33,630,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,661,051 UART: [rt]cmd =0x4d454153, len=108
33,679,801 >>> mbox cmd response data (12 bytes)
33,680,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,710,723 UART: [rt]cmd =0x4d454153, len=108
33,729,488 >>> mbox cmd response data (12 bytes)
33,729,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,760,293 UART: [rt]cmd =0x4d454153, len=108
33,778,877 >>> mbox cmd response data (12 bytes)
33,779,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,810,105 UART: [rt]cmd =0x4d454153, len=108
33,828,719 >>> mbox cmd response data (12 bytes)
33,829,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,859,811 UART: [rt]cmd =0x4d454153, len=108
33,862,196 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
192,769 UART:
193,135 UART: Running Caliptra ROM ...
194,322 UART:
194,478 UART: [state] CFI Enabled
263,546 UART: [state] LifecycleState = Unprovisioned
265,480 UART: [state] DebugLocked = No
267,308 UART: [state] WD Timer not started. Device not locked for debugging
271,195 UART: [kat] SHA2-256
450,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,939 UART: [kat] ++
462,491 UART: [kat] sha1
474,326 UART: [kat] SHA2-256
477,308 UART: [kat] SHA2-384
485,224 UART: [kat] SHA2-512-ACC
488,166 UART: [kat] ECC-384
2,946,797 UART: [kat] HMAC-384Kdf
2,971,132 UART: [kat] LMS
3,500,578 UART: [kat] --
3,506,344 UART: [cold-reset] ++
3,508,417 UART: [fht] FHT @ 0x50003400
3,519,764 UART: [idev] ++
3,520,366 UART: [idev] CDI.KEYID = 6
3,521,254 UART: [idev] SUBJECT.KEYID = 7
3,522,388 UART: [idev] UDS.KEYID = 0
3,523,350 ready_for_fw is high
3,523,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,238 UART: [idev] Erasing UDS.KEYID = 0
6,025,596 UART: [idev] Sha1 KeyId Algorithm
6,049,016 UART: [idev] --
6,053,073 UART: [ldev] ++
6,053,654 UART: [ldev] CDI.KEYID = 6
6,054,579 UART: [ldev] SUBJECT.KEYID = 5
6,055,744 UART: [ldev] AUTHORITY.KEYID = 7
6,056,983 UART: [ldev] FE.KEYID = 1
6,098,801 UART: [ldev] Erasing FE.KEYID = 1
8,602,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,918 UART: [ldev] --
10,411,791 UART: [fwproc] Wait for Commands...
10,414,130 UART: [fwproc] Recv command 0x46574c44
10,416,233 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,287,661 >>> mbox cmd response: success
14,291,224 UART: [afmc] ++
14,291,832 UART: [afmc] CDI.KEYID = 6
14,292,762 UART: [afmc] SUBJECT.KEYID = 7
14,293,925 UART: [afmc] AUTHORITY.KEYID = 5
16,830,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,821 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,956 UART: [afmc] --
18,631,418 UART: [cold-reset] --
18,634,697 UART: [state] Locking Datavault
18,640,523 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,180 UART: [state] Locking ICCM
18,644,819 UART: [exit] Launching FMC @ 0x40000130
18,653,273 UART:
18,653,520 UART: Running Caliptra FMC ...
18,654,625 UART:
18,654,789 UART: [state] CFI Enabled
18,712,497 UART: [fht] FMC Alias Private Key: 7
20,476,078 UART: [art] Extend RT PCRs Done
20,477,299 UART: [art] Lock RT PCRs Done
20,479,127 UART: [art] Populate DV Done
20,484,538 UART: [fht] FMC Alias Private Key: 7
20,486,181 UART: [art] Derive CDI
20,487,013 UART: [art] Store in in slot 0x4
20,544,758 UART: [art] Derive Key Pair
20,545,756 UART: [art] Store priv key in slot 0x5
23,008,584 UART: [art] Derive Key Pair - Done
23,021,802 UART: [art] Signing Cert with AUTHO
23,023,114 UART: RITY.KEYID = 7
24,733,746 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,243 UART: [art] PUB.X = BDAC456932B150D004D26EA679BF3764C86FC9903B7E493B9B3E0D5C9D11CEBA6696EE4C269A5DF04456FB4919869E40
24,742,523 UART: [art] PUB.Y = E85BE565163B8F5C77DA500D4C6E1A92CB3C5E560842669025E2223E56E982EAD23600D344025D0A2395E1A782C58FBF
24,749,727 UART: [art] SIG.R = EFE3A8A4F7DC21BB0728DB45174439142A97D78F98E581EF044ECDF81D964414974B9D1FA2AC05B0A08252CF1ABE3E2F
24,757,151 UART: [art] SIG.S = BABFDB323103E5B90CD5D831E262E2E34020F46012C0305ACB6BF3B88BE551EF1E5CCD7D7D212E55A899D39FC98C1059
25,735,845 UART: Caliptra RT
25,736,557 UART: [state] CFI Enabled
25,901,565 UART: [rt] RT listening for mailbox commands...
25,903,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,934,248 UART: [rt]cmd =0x4d454153, len=108
25,953,607 >>> mbox cmd response data (12 bytes)
25,954,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,984,867 UART: [rt]cmd =0x4d454153, len=108
26,004,070 >>> mbox cmd response data (12 bytes)
26,004,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,035,425 UART: [rt]cmd =0x4d454153, len=108
26,054,146 >>> mbox cmd response data (12 bytes)
26,054,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,085,273 UART: [rt]cmd =0x4d454153, len=108
26,104,349 >>> mbox cmd response data (12 bytes)
26,104,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,135,322 UART: [rt]cmd =0x4d454153, len=108
26,154,361 >>> mbox cmd response data (12 bytes)
26,154,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,185,569 UART: [rt]cmd =0x4d454153, len=108
26,204,930 >>> mbox cmd response data (12 bytes)
26,205,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,236,169 UART: [rt]cmd =0x4d454153, len=108
26,254,792 >>> mbox cmd response data (12 bytes)
26,255,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,285,756 UART: [rt]cmd =0x4d454153, len=108
26,304,684 >>> mbox cmd response data (12 bytes)
26,305,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,335,910 UART: [rt]cmd =0x4d454153, len=108
26,355,201 >>> mbox cmd response data (12 bytes)
26,355,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,386,008 UART: [rt]cmd =0x4d454153, len=108
26,405,267 >>> mbox cmd response data (12 bytes)
26,405,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,436,310 UART: [rt]cmd =0x4d454153, len=108
26,455,343 >>> mbox cmd response data (12 bytes)
26,455,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,486,327 UART: [rt]cmd =0x4d454153, len=108
26,505,449 >>> mbox cmd response data (12 bytes)
26,505,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,418 UART: [rt]cmd =0x4d454153, len=108
26,554,583 >>> mbox cmd response data (12 bytes)
26,555,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,585,579 UART: [rt]cmd =0x4d454153, len=108
26,604,559 >>> mbox cmd response data (12 bytes)
26,604,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,635,732 UART: [rt]cmd =0x4d454153, len=108
26,654,687 >>> mbox cmd response data (12 bytes)
26,655,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,921 UART: [rt]cmd =0x4d454153, len=108
26,688,247 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,486 UART:
192,866 UART: Running Caliptra ROM ...
193,959 UART:
194,102 UART: [state] CFI Enabled
261,738 UART: [state] LifecycleState = Unprovisioned
264,146 UART: [state] DebugLocked = No
266,396 UART: [state] WD Timer not started. Device not locked for debugging
271,847 UART: [kat] SHA2-256
461,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,492 UART: [kat] ++
472,990 UART: [kat] sha1
484,151 UART: [kat] SHA2-256
487,172 UART: [kat] SHA2-384
493,805 UART: [kat] SHA2-512-ACC
496,387 UART: [kat] ECC-384
2,946,859 UART: [kat] HMAC-384Kdf
2,970,601 UART: [kat] LMS
3,502,328 UART: [kat] --
3,505,933 UART: [cold-reset] ++
3,507,441 UART: [fht] FHT @ 0x50003400
3,518,150 UART: [idev] ++
3,518,802 UART: [idev] CDI.KEYID = 6
3,519,794 UART: [idev] SUBJECT.KEYID = 7
3,520,970 UART: [idev] UDS.KEYID = 0
3,521,900 ready_for_fw is high
3,522,108 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,021 UART: [idev] Erasing UDS.KEYID = 0
6,030,789 UART: [idev] Sha1 KeyId Algorithm
6,052,727 UART: [idev] --
6,057,406 UART: [ldev] ++
6,058,099 UART: [ldev] CDI.KEYID = 6
6,059,040 UART: [ldev] SUBJECT.KEYID = 5
6,060,152 UART: [ldev] AUTHORITY.KEYID = 7
6,061,386 UART: [ldev] FE.KEYID = 1
6,098,883 UART: [ldev] Erasing FE.KEYID = 1
8,606,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,278 UART: [ldev] --
10,413,758 UART: [fwproc] Wait for Commands...
10,416,659 UART: [fwproc] Recv command 0x46574c44
10,418,964 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,602,988 >>> mbox cmd response: success
14,606,661 UART: [afmc] ++
14,607,377 UART: [afmc] CDI.KEYID = 6
14,608,603 UART: [afmc] SUBJECT.KEYID = 7
14,610,060 UART: [afmc] AUTHORITY.KEYID = 5
17,147,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,868,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,870,853 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,886,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,901,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,916,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,939,403 UART: [afmc] --
18,943,118 UART: [cold-reset] --
18,948,121 UART: [state] Locking Datavault
18,953,221 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,382 UART: [state] Locking ICCM
18,956,749 UART: [exit] Launching FMC @ 0x40000130
18,965,434 UART:
18,965,674 UART: Running Caliptra FMC ...
18,966,778 UART:
18,966,942 UART: [state] CFI Enabled
19,026,563 UART: [fht] FMC Alias Private Key: 7
20,790,657 UART: [art] Extend RT PCRs Done
20,791,871 UART: [art] Lock RT PCRs Done
20,793,844 UART: [art] Populate DV Done
20,799,307 UART: [fht] FMC Alias Private Key: 7
20,800,957 UART: [art] Derive CDI
20,801,698 UART: [art] Store in in slot 0x4
20,859,005 UART: [art] Derive Key Pair
20,860,047 UART: [art] Store priv key in slot 0x5
23,322,896 UART: [art] Derive Key Pair - Done
23,335,947 UART: [art] Signing Cert with AUTHO
23,337,301 UART: RITY.KEYID = 7
25,048,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,127 UART: [art] PUB.X = 2017D4C1D6510A4B3DD3BEE6EECEDC13ABA1F6CA52022EE2ECFFDA85B7A0EDCD419F93631CF36FF81D1CEAA0D601F78D
25,057,465 UART: [art] PUB.Y = A7647A5B624814B7533072C049500D118250C0BE7E2BF22D6B886488F3B9BFACDACE2494E109234E2C2E7E815ECCB1C0
25,064,680 UART: [art] SIG.R = B69925BE6B583FF138252396B35B730E121527B980B1CCF399582424E731DAB8CC0A830BA8EF7103413731320856B1B1
25,072,056 UART: [art] SIG.S = 47A38FEF8957637E3D6A21A4F7514A9F4ED7606143F23C7AE5AA4F6ABFCDEA329B220858BFF0C7A5C743D9FFB3DAE437
26,051,728 UART: Caliptra RT
26,052,445 UART: [state] CFI Enabled
26,216,715 UART: [rt] RT listening for mailbox commands...
26,218,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,249,254 UART: [rt]cmd =0x4d454153, len=108
26,267,862 >>> mbox cmd response data (12 bytes)
26,268,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,298,984 UART: [rt]cmd =0x4d454153, len=108
26,316,280 >>> mbox cmd response data (12 bytes)
26,316,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,347,123 UART: [rt]cmd =0x4d454153, len=108
26,365,401 >>> mbox cmd response data (12 bytes)
26,365,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,396,591 UART: [rt]cmd =0x4d454153, len=108
26,415,608 >>> mbox cmd response data (12 bytes)
26,416,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,446,851 UART: [rt]cmd =0x4d454153, len=108
26,465,600 >>> mbox cmd response data (12 bytes)
26,466,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,496,733 UART: [rt]cmd =0x4d454153, len=108
26,514,961 >>> mbox cmd response data (12 bytes)
26,515,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,545,981 UART: [rt]cmd =0x4d454153, len=108
26,565,263 >>> mbox cmd response data (12 bytes)
26,565,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,596,283 UART: [rt]cmd =0x4d454153, len=108
26,615,127 >>> mbox cmd response data (12 bytes)
26,615,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,646,288 UART: [rt]cmd =0x4d454153, len=108
26,665,159 >>> mbox cmd response data (12 bytes)
26,665,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,696,173 UART: [rt]cmd =0x4d454153, len=108
26,714,912 >>> mbox cmd response data (12 bytes)
26,715,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,745,711 UART: [rt]cmd =0x4d454153, len=108
26,765,501 >>> mbox cmd response data (12 bytes)
26,765,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,796,573 UART: [rt]cmd =0x4d454153, len=108
26,815,320 >>> mbox cmd response data (12 bytes)
26,815,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,846,222 UART: [rt]cmd =0x4d454153, len=108
26,864,976 >>> mbox cmd response data (12 bytes)
26,865,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,895,868 UART: [rt]cmd =0x4d454153, len=108
26,915,119 >>> mbox cmd response data (12 bytes)
26,915,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,946,183 UART: [rt]cmd =0x4d454153, len=108
26,964,762 >>> mbox cmd response data (12 bytes)
26,965,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,995,668 UART: [rt]cmd =0x4d454153, len=108
26,998,050 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
3,435,665 ready_for_fw is high
3,436,174 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,734,161 >>> mbox cmd response: success
19,025,670 UART:
19,026,063 UART: Running Caliptra FMC ...
19,027,277 UART:
19,027,447 UART: [state] CFI Enabled
19,092,537 UART: [fht] FMC Alias Private Key: 7
20,856,783 UART: [art] Extend RT PCRs Done
20,858,003 UART: [art] Lock RT PCRs Done
20,859,419 UART: [art] Populate DV Done
20,864,783 UART: [fht] FMC Alias Private Key: 7
20,866,376 UART: [art] Derive CDI
20,867,190 UART: [art] Store in in slot 0x4
20,925,686 UART: [art] Derive Key Pair
20,926,685 UART: [art] Store priv key in slot 0x5
23,389,723 UART: [art] Derive Key Pair - Done
23,402,722 UART: [art] Signing Cert with AUTHO
23,404,035 UART: RITY.KEYID = 7
25,115,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,910 UART: [art] PUB.X = 52287920E3AF6B4406EADAC57E82FE5FFB4C278F87EEB168BF2C61B289A5FAA74EF8F3B0577047C137DD6199E23BC73E
25,124,186 UART: [art] PUB.Y = CD9C6AFCFC800F0DBA4A369FB41F04CB70FBFF7D396B7C9C64EA4B83069DC7E4BB707EB794ED1ABC0267AF55C492DAF0
25,131,458 UART: [art] SIG.R = 770E113FF7BD371E269FD01E612A73AAA29A77556A8ECD5B88B0032BA0485C42A1BDC8515CF492A2E439F414E57EF855
25,138,906 UART: [art] SIG.S = AC3CBC24A48AA8D72031F7DF4AB975F56AAFE3596CA13834D57AE91C6D85DC72492F6B1E3C129E28C66ACC583ADE13D1
26,117,603 UART: Caliptra RT
26,118,311 UART: [state] CFI Enabled
26,284,674 UART: [rt] RT listening for mailbox commands...
26,286,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,317,239 UART: [rt]cmd =0x4d454153, len=108
26,335,836 >>> mbox cmd response data (12 bytes)
26,336,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,367,115 UART: [rt]cmd =0x4d454153, len=108
26,385,736 >>> mbox cmd response data (12 bytes)
26,386,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,416,749 UART: [rt]cmd =0x4d454153, len=108
26,435,355 >>> mbox cmd response data (12 bytes)
26,435,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,466,320 UART: [rt]cmd =0x4d454153, len=108
26,484,878 >>> mbox cmd response data (12 bytes)
26,485,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,516,099 UART: [rt]cmd =0x4d454153, len=108
26,534,864 >>> mbox cmd response data (12 bytes)
26,535,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,565,999 UART: [rt]cmd =0x4d454153, len=108
26,584,695 >>> mbox cmd response data (12 bytes)
26,585,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,615,998 UART: [rt]cmd =0x4d454153, len=108
26,634,845 >>> mbox cmd response data (12 bytes)
26,635,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,666,142 UART: [rt]cmd =0x4d454153, len=108
26,684,849 >>> mbox cmd response data (12 bytes)
26,685,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,716,130 UART: [rt]cmd =0x4d454153, len=108
26,734,117 >>> mbox cmd response data (12 bytes)
26,734,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,765,163 UART: [rt]cmd =0x4d454153, len=108
26,783,551 >>> mbox cmd response data (12 bytes)
26,784,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,814,554 UART: [rt]cmd =0x4d454153, len=108
26,833,910 >>> mbox cmd response data (12 bytes)
26,834,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,864,977 UART: [rt]cmd =0x4d454153, len=108
26,883,075 >>> mbox cmd response data (12 bytes)
26,883,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,914,102 UART: [rt]cmd =0x4d454153, len=108
26,933,135 >>> mbox cmd response data (12 bytes)
26,933,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,964,258 UART: [rt]cmd =0x4d454153, len=108
26,982,679 >>> mbox cmd response data (12 bytes)
26,983,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,013,975 UART: [rt]cmd =0x4d454153, len=108
27,032,172 >>> mbox cmd response data (12 bytes)
27,032,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,063,368 UART: [rt]cmd =0x4d454153, len=108
27,065,701 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,297 UART:
192,668 UART: Running Caliptra ROM ...
193,783 UART:
603,351 UART: [state] CFI Enabled
618,012 UART: [state] LifecycleState = Unprovisioned
620,391 UART: [state] DebugLocked = No
621,979 UART: [state] WD Timer not started. Device not locked for debugging
627,495 UART: [kat] SHA2-256
817,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,126 UART: [kat] ++
828,645 UART: [kat] sha1
839,445 UART: [kat] SHA2-256
842,468 UART: [kat] SHA2-384
848,776 UART: [kat] SHA2-512-ACC
851,366 UART: [kat] ECC-384
3,291,638 UART: [kat] HMAC-384Kdf
3,304,939 UART: [kat] LMS
3,836,804 UART: [kat] --
3,842,448 UART: [cold-reset] ++
3,843,885 UART: [fht] FHT @ 0x50003400
3,855,719 UART: [idev] ++
3,856,427 UART: [idev] CDI.KEYID = 6
3,857,412 UART: [idev] SUBJECT.KEYID = 7
3,858,591 UART: [idev] UDS.KEYID = 0
3,859,515 ready_for_fw is high
3,859,702 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,703 UART: [idev] Erasing UDS.KEYID = 0
6,336,388 UART: [idev] Sha1 KeyId Algorithm
6,358,788 UART: [idev] --
6,363,994 UART: [ldev] ++
6,364,714 UART: [ldev] CDI.KEYID = 6
6,365,638 UART: [ldev] SUBJECT.KEYID = 5
6,366,793 UART: [ldev] AUTHORITY.KEYID = 7
6,367,972 UART: [ldev] FE.KEYID = 1
6,380,256 UART: [ldev] Erasing FE.KEYID = 1
8,856,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,738 UART: [ldev] --
10,647,407 UART: [fwproc] Wait for Commands...
10,649,227 UART: [fwproc] Recv command 0x46574c44
10,651,480 UART: [fwproc] Recv'd Img size: 114360 bytes
14,100,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,840,025 >>> mbox cmd response: success
14,843,333 UART: [afmc] ++
14,844,068 UART: [afmc] CDI.KEYID = 6
14,845,283 UART: [afmc] SUBJECT.KEYID = 7
14,846,721 UART: [afmc] AUTHORITY.KEYID = 5
17,352,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,087 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,392 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,448 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,870 UART: [afmc] --
19,146,651 UART: [cold-reset] --
19,152,506 UART: [state] Locking Datavault
19,160,287 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,452 UART: [state] Locking ICCM
19,164,705 UART: [exit] Launching FMC @ 0x40000130
19,173,365 UART:
19,173,605 UART: Running Caliptra FMC ...
19,174,654 UART:
19,174,801 UART: [state] CFI Enabled
19,182,903 UART: [fht] FMC Alias Private Key: 7
20,939,914 UART: [art] Extend RT PCRs Done
20,941,136 UART: [art] Lock RT PCRs Done
20,942,884 UART: [art] Populate DV Done
20,948,292 UART: [fht] FMC Alias Private Key: 7
20,949,991 UART: [art] Derive CDI
20,950,799 UART: [art] Store in in slot 0x4
20,993,495 UART: [art] Derive Key Pair
20,994,493 UART: [art] Store priv key in slot 0x5
23,421,397 UART: [art] Derive Key Pair - Done
23,434,333 UART: [art] Signing Cert with AUTHO
23,435,634 UART: RITY.KEYID = 7
25,141,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,749 UART: [art] PUB.X = 2C88F5D99B5FCE95166FBDC49D4EA4FA8F44CB3BC1130375ADAB30DE53693EEFF73E4A99696BCEFCFD89FD21C09478D4
25,150,079 UART: [art] PUB.Y = 9CD02C073DC062CE09051C8511152C8C9490B20A53A89E99CC723DE9C0020174D2F3C3A7242E03460973DC317B85CDF7
25,157,318 UART: [art] SIG.R = 87B4FD49425C7F6F70A3D021F6D4527E1F934CCEDFAB14971D63B89BB01A774AEF5001463C151317826C45E6EFBE6B1D
25,164,742 UART: [art] SIG.S = 9D765DEA17C9652C0E787DB95EEEFA22C445BE0207FEF389DD1B1DF3B4AC6D54333B12D16D57FE035BC54810969AD261
26,143,936 UART: Caliptra RT
26,144,620 UART: [state] CFI Enabled
26,261,723 UART: [rt] RT listening for mailbox commands...
26,263,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,294,394 UART: [rt]cmd =0x4d454153, len=108
26,312,868 >>> mbox cmd response data (12 bytes)
26,313,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,343,897 UART: [rt]cmd =0x4d454153, len=108
26,362,946 >>> mbox cmd response data (12 bytes)
26,363,418 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,394,014 UART: [rt]cmd =0x4d454153, len=108
26,412,623 >>> mbox cmd response data (12 bytes)
26,413,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,443,561 UART: [rt]cmd =0x4d454153, len=108
26,461,768 >>> mbox cmd response data (12 bytes)
26,462,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,492,681 UART: [rt]cmd =0x4d454153, len=108
26,511,496 >>> mbox cmd response data (12 bytes)
26,511,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,542,728 UART: [rt]cmd =0x4d454153, len=108
26,561,257 >>> mbox cmd response data (12 bytes)
26,561,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,592,225 UART: [rt]cmd =0x4d454153, len=108
26,611,194 >>> mbox cmd response data (12 bytes)
26,611,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,642,502 UART: [rt]cmd =0x4d454153, len=108
26,660,673 >>> mbox cmd response data (12 bytes)
26,661,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,691,846 UART: [rt]cmd =0x4d454153, len=108
26,710,175 >>> mbox cmd response data (12 bytes)
26,710,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,741,036 UART: [rt]cmd =0x4d454153, len=108
26,759,959 >>> mbox cmd response data (12 bytes)
26,760,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,790,937 UART: [rt]cmd =0x4d454153, len=108
26,808,946 >>> mbox cmd response data (12 bytes)
26,809,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,840,239 UART: [rt]cmd =0x4d454153, len=108
26,858,723 >>> mbox cmd response data (12 bytes)
26,859,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,889,803 UART: [rt]cmd =0x4d454153, len=108
26,908,726 >>> mbox cmd response data (12 bytes)
26,909,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,939,796 UART: [rt]cmd =0x4d454153, len=108
26,958,052 >>> mbox cmd response data (12 bytes)
26,958,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,989,311 UART: [rt]cmd =0x4d454153, len=108
27,008,240 >>> mbox cmd response data (12 bytes)
27,008,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,039,344 UART: [rt]cmd =0x4d454153, len=108
27,041,726 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
3,756,938 ready_for_fw is high
3,757,433 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,954,328 >>> mbox cmd response: success
19,209,919 UART:
19,210,318 UART: Running Caliptra FMC ...
19,211,424 UART:
19,211,575 UART: [state] CFI Enabled
19,219,741 UART: [fht] FMC Alias Private Key: 7
20,977,096 UART: [art] Extend RT PCRs Done
20,978,348 UART: [art] Lock RT PCRs Done
20,980,164 UART: [art] Populate DV Done
20,985,512 UART: [fht] FMC Alias Private Key: 7
20,987,122 UART: [art] Derive CDI
20,987,940 UART: [art] Store in in slot 0x4
21,030,482 UART: [art] Derive Key Pair
21,031,525 UART: [art] Store priv key in slot 0x5
23,458,032 UART: [art] Derive Key Pair - Done
23,471,248 UART: [art] Signing Cert with AUTHO
23,472,552 UART: RITY.KEYID = 7
25,178,094 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,602 UART: [art] PUB.X = F41D5B6E067AE9AD1ED260B20C5B03E1D67C2E0F360D50B404610D90BB9B0F984F31ED719FF63347C167BDD6D6CCA5C9
25,186,911 UART: [art] PUB.Y = E69A209888F8BB11555E61DD90C814EC84E1D7020CA7D0179DFFC74C6D66CB5949DC1A2741D678BDDBD1448651D09FE0
25,194,176 UART: [art] SIG.R = 8B4F4408733180611E2AE66A0D4CE0E54843A4E412B2E60F59B2818090B81C653C08B6DE9011E922CB79401A76538A46
25,201,540 UART: [art] SIG.S = AC037DDA36AE54DAE813CC2F60316DD270A73ED19E0EF8B15B51F862F209D225C13B490BCEB084BE685CFDD660A79696
26,180,623 UART: Caliptra RT
26,181,330 UART: [state] CFI Enabled
26,297,478 UART: [rt] RT listening for mailbox commands...
26,299,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,329,964 UART: [rt]cmd =0x4d454153, len=108
26,348,570 >>> mbox cmd response data (12 bytes)
26,349,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,379,920 UART: [rt]cmd =0x4d454153, len=108
26,399,526 >>> mbox cmd response data (12 bytes)
26,399,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,430,568 UART: [rt]cmd =0x4d454153, len=108
26,448,250 >>> mbox cmd response data (12 bytes)
26,448,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,479,597 UART: [rt]cmd =0x4d454153, len=108
26,497,831 >>> mbox cmd response data (12 bytes)
26,498,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,528,903 UART: [rt]cmd =0x4d454153, len=108
26,547,525 >>> mbox cmd response data (12 bytes)
26,547,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,578,641 UART: [rt]cmd =0x4d454153, len=108
26,596,598 >>> mbox cmd response data (12 bytes)
26,597,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,627,683 UART: [rt]cmd =0x4d454153, len=108
26,646,371 >>> mbox cmd response data (12 bytes)
26,646,801 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,677,388 UART: [rt]cmd =0x4d454153, len=108
26,696,321 >>> mbox cmd response data (12 bytes)
26,696,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,727,581 UART: [rt]cmd =0x4d454153, len=108
26,746,720 >>> mbox cmd response data (12 bytes)
26,747,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,777,795 UART: [rt]cmd =0x4d454153, len=108
26,796,862 >>> mbox cmd response data (12 bytes)
26,797,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,828,059 UART: [rt]cmd =0x4d454153, len=108
26,847,362 >>> mbox cmd response data (12 bytes)
26,847,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,878,216 UART: [rt]cmd =0x4d454153, len=108
26,897,554 >>> mbox cmd response data (12 bytes)
26,897,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,928,678 UART: [rt]cmd =0x4d454153, len=108
26,947,014 >>> mbox cmd response data (12 bytes)
26,947,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,978,047 UART: [rt]cmd =0x4d454153, len=108
26,996,550 >>> mbox cmd response data (12 bytes)
26,996,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,027,629 UART: [rt]cmd =0x4d454153, len=108
27,046,112 >>> mbox cmd response data (12 bytes)
27,046,544 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,077,313 UART: [rt]cmd =0x4d454153, len=108
27,079,539 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,473 UART: [kat] SHA2-256
882,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,519 UART: [kat] ++
886,671 UART: [kat] sha1
890,873 UART: [kat] SHA2-256
892,811 UART: [kat] SHA2-384
895,660 UART: [kat] SHA2-512-ACC
897,561 UART: [kat] ECC-384
903,102 UART: [kat] HMAC-384Kdf
907,638 UART: [kat] LMS
1,475,834 UART: [kat] --
1,476,701 UART: [cold-reset] ++
1,477,195 UART: [fht] Storing FHT @ 0x50003400
1,479,924 UART: [idev] ++
1,480,092 UART: [idev] CDI.KEYID = 6
1,480,452 UART: [idev] SUBJECT.KEYID = 7
1,480,876 UART: [idev] UDS.KEYID = 0
1,481,221 ready_for_fw is high
1,481,221 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,616 UART: [idev] Erasing UDS.KEYID = 0
1,504,888 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,462 UART: [idev] --
1,514,477 UART: [ldev] ++
1,514,645 UART: [ldev] CDI.KEYID = 6
1,515,008 UART: [ldev] SUBJECT.KEYID = 5
1,515,434 UART: [ldev] AUTHORITY.KEYID = 7
1,515,897 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,896 UART: [ldev] --
1,585,405 UART: [fwproc] Waiting for Commands...
1,586,232 UART: [fwproc] Received command 0x46574c44
1,587,023 UART: [fwproc] Received Image of size 114360 bytes
2,884,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,269 >>> mbox cmd response: success
3,078,451 UART: [afmc] ++
3,078,619 UART: [afmc] CDI.KEYID = 6
3,078,981 UART: [afmc] SUBJECT.KEYID = 7
3,079,406 UART: [afmc] AUTHORITY.KEYID = 5
3,114,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,076 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,766 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,503 UART: [afmc] --
3,157,529 UART: [cold-reset] --
3,158,443 UART: [state] Locking Datavault
3,159,526 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,130 UART: [state] Locking ICCM
3,160,634 UART: [exit] Launching FMC @ 0x40000130
3,165,963 UART:
3,165,979 UART: Running Caliptra FMC ...
3,166,387 UART:
3,166,441 UART: [state] CFI Enabled
3,176,888 UART: [fht] FMC Alias Private Key: 7
3,284,371 UART: [art] Extend RT PCRs Done
3,284,799 UART: [art] Lock RT PCRs Done
3,286,341 UART: [art] Populate DV Done
3,294,510 UART: [fht] FMC Alias Private Key: 7
3,295,650 UART: [art] Derive CDI
3,295,930 UART: [art] Store in in slot 0x4
3,381,815 UART: [art] Derive Key Pair
3,382,175 UART: [art] Store priv key in slot 0x5
3,394,987 UART: [art] Derive Key Pair - Done
3,409,794 UART: [art] Signing Cert with AUTHO
3,410,274 UART: RITY.KEYID = 7
3,425,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,097 UART: [art] PUB.X = 4BE4AF4DE12724456E5F80C33FEFEB3F66A7714F1ADA4DC7FC996B5FEC17048AFF6D860F40BABC313618A5046365C665
3,432,874 UART: [art] PUB.Y = 570414642E2ECA66B8CF8949B394F5A707879A85364CC0201ADCD7C809A1834AE1D290CEF01F7F97734CD8D8090FBD2C
3,439,815 UART: [art] SIG.R = 007E5A2BF1168D681351D4861506B8A2962D25E828122E323F544FC0291CABA7D484DACFB1EDEA36F3EA4A27AE962457
3,446,566 UART: [art] SIG.S = BA83297DB86E5C01700D46DC2235BE5BF3C3E6EB2FD80877E324C3A9F7B25CF91B99BA964A739F4313B744971C0DCB19
3,470,663 UART: Caliptra RT
3,470,917 UART: [state] CFI Enabled
3,580,245 UART: [rt] RT listening for mailbox commands...
3,580,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,278 UART: [rt]cmd =0x4d454153, len=108
3,631,855 >>> mbox cmd response data (12 bytes)
3,631,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,895 UART: [rt]cmd =0x4d454153, len=108
3,682,750 >>> mbox cmd response data (12 bytes)
3,682,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,804 UART: [rt]cmd =0x4d454153, len=108
3,733,489 >>> mbox cmd response data (12 bytes)
3,733,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,569 UART: [rt]cmd =0x4d454153, len=108
3,784,336 >>> mbox cmd response data (12 bytes)
3,784,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,224 UART: [rt]cmd =0x4d454153, len=108
3,834,977 >>> mbox cmd response data (12 bytes)
3,834,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,147 UART: [rt]cmd =0x4d454153, len=108
3,886,068 >>> mbox cmd response data (12 bytes)
3,886,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,952 UART: [rt]cmd =0x4d454153, len=108
3,936,199 >>> mbox cmd response data (12 bytes)
3,936,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,273 UART: [rt]cmd =0x4d454153, len=108
3,987,554 >>> mbox cmd response data (12 bytes)
3,987,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,318 UART: [rt]cmd =0x4d454153, len=108
4,038,079 >>> mbox cmd response data (12 bytes)
4,038,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,243 UART: [rt]cmd =0x4d454153, len=108
4,088,606 >>> mbox cmd response data (12 bytes)
4,088,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,762 UART: [rt]cmd =0x4d454153, len=108
4,139,727 >>> mbox cmd response data (12 bytes)
4,139,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,593 UART: [rt]cmd =0x4d454153, len=108
4,191,142 >>> mbox cmd response data (12 bytes)
4,191,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,358 UART: [rt]cmd =0x4d454153, len=108
4,242,707 >>> mbox cmd response data (12 bytes)
4,242,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,585 UART: [rt]cmd =0x4d454153, len=108
4,293,344 >>> mbox cmd response data (12 bytes)
4,293,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,354 UART: [rt]cmd =0x4d454153, len=108
4,344,529 >>> mbox cmd response data (12 bytes)
4,344,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,427 UART: [rt]cmd =0x4d454153, len=108
4,376,301 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,335 ready_for_fw is high
1,362,335 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,951 >>> mbox cmd response: success
2,987,643 UART:
2,987,659 UART: Running Caliptra FMC ...
2,988,067 UART:
2,988,121 UART: [state] CFI Enabled
2,998,774 UART: [fht] FMC Alias Private Key: 7
3,107,417 UART: [art] Extend RT PCRs Done
3,107,845 UART: [art] Lock RT PCRs Done
3,109,329 UART: [art] Populate DV Done
3,117,608 UART: [fht] FMC Alias Private Key: 7
3,118,774 UART: [art] Derive CDI
3,119,054 UART: [art] Store in in slot 0x4
3,205,049 UART: [art] Derive Key Pair
3,205,409 UART: [art] Store priv key in slot 0x5
3,218,555 UART: [art] Derive Key Pair - Done
3,233,435 UART: [art] Signing Cert with AUTHO
3,233,915 UART: RITY.KEYID = 7
3,249,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,284 UART: [art] PUB.X = 4107D22ADFE91702A2D80C031F82B9B6645B31728375EE2388A1C30F299AF909ABB7E4FCA662E11F575F58823139E22A
3,257,036 UART: [art] PUB.Y = 29430009EE332B84B24865BEC13BFAB613DC8DD2F7C7F1FB00C5A1E5523B1C5C9569D6AD7610A6D730BF2B23752A117B
3,263,949 UART: [art] SIG.R = 96FFF97FEEA3908E4EC9C4951C309AFBEEB317416011048068F7A2342BA22C44E7A37796541C37E59A190E7E1CF549E3
3,270,717 UART: [art] SIG.S = 17B4F326D84DBE63B85B39D1CBEFB247E752A13D651B3B359EAD9855C0E7D469DD145A65E8FADE87BC9659200A4653B7
3,294,563 UART: Caliptra RT
3,294,817 UART: [state] CFI Enabled
3,402,845 UART: [rt] RT listening for mailbox commands...
3,403,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,882 UART: [rt]cmd =0x4d454153, len=108
3,455,381 >>> mbox cmd response data (12 bytes)
3,455,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,449 UART: [rt]cmd =0x4d454153, len=108
3,506,402 >>> mbox cmd response data (12 bytes)
3,506,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,444 UART: [rt]cmd =0x4d454153, len=108
3,556,907 >>> mbox cmd response data (12 bytes)
3,556,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,117 UART: [rt]cmd =0x4d454153, len=108
3,607,336 >>> mbox cmd response data (12 bytes)
3,607,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,246 UART: [rt]cmd =0x4d454153, len=108
3,657,715 >>> mbox cmd response data (12 bytes)
3,657,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,977 UART: [rt]cmd =0x4d454153, len=108
3,709,098 >>> mbox cmd response data (12 bytes)
3,709,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,182 UART: [rt]cmd =0x4d454153, len=108
3,760,737 >>> mbox cmd response data (12 bytes)
3,760,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,693 UART: [rt]cmd =0x4d454153, len=108
3,811,702 >>> mbox cmd response data (12 bytes)
3,811,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,714 UART: [rt]cmd =0x4d454153, len=108
3,862,041 >>> mbox cmd response data (12 bytes)
3,862,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,161 UART: [rt]cmd =0x4d454153, len=108
3,912,796 >>> mbox cmd response data (12 bytes)
3,912,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,726 UART: [rt]cmd =0x4d454153, len=108
3,963,515 >>> mbox cmd response data (12 bytes)
3,963,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,993,569 UART: [rt]cmd =0x4d454153, len=108
4,014,286 >>> mbox cmd response data (12 bytes)
4,014,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,278 UART: [rt]cmd =0x4d454153, len=108
4,064,553 >>> mbox cmd response data (12 bytes)
4,064,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,599 UART: [rt]cmd =0x4d454153, len=108
4,115,662 >>> mbox cmd response data (12 bytes)
4,115,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,652 UART: [rt]cmd =0x4d454153, len=108
4,166,185 >>> mbox cmd response data (12 bytes)
4,166,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,196,119 UART: [rt]cmd =0x4d454153, len=108
4,198,103 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,864 UART: [kat] SHA2-256
881,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,910 UART: [kat] ++
886,062 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
895,197 UART: [kat] SHA2-512-ACC
897,098 UART: [kat] ECC-384
902,917 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,477,044 UART: [fht] Storing FHT @ 0x50003400
1,479,891 UART: [idev] ++
1,480,059 UART: [idev] CDI.KEYID = 6
1,480,419 UART: [idev] SUBJECT.KEYID = 7
1,480,843 UART: [idev] UDS.KEYID = 0
1,481,188 ready_for_fw is high
1,481,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,603 UART: [idev] Erasing UDS.KEYID = 0
1,505,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,601 UART: [idev] --
1,514,714 UART: [ldev] ++
1,514,882 UART: [ldev] CDI.KEYID = 6
1,515,245 UART: [ldev] SUBJECT.KEYID = 5
1,515,671 UART: [ldev] AUTHORITY.KEYID = 7
1,516,134 UART: [ldev] FE.KEYID = 1
1,521,456 UART: [ldev] Erasing FE.KEYID = 1
1,546,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,749 UART: [ldev] --
1,586,152 UART: [fwproc] Waiting for Commands...
1,586,867 UART: [fwproc] Received command 0x46574c44
1,587,658 UART: [fwproc] Received Image of size 114360 bytes
2,885,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,691 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,892 >>> mbox cmd response: success
3,079,116 UART: [afmc] ++
3,079,284 UART: [afmc] CDI.KEYID = 6
3,079,646 UART: [afmc] SUBJECT.KEYID = 7
3,080,071 UART: [afmc] AUTHORITY.KEYID = 5
3,115,340 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,791 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,481 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,540 UART: [afmc] --
3,158,504 UART: [cold-reset] --
3,159,382 UART: [state] Locking Datavault
3,160,629 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,233 UART: [state] Locking ICCM
3,161,761 UART: [exit] Launching FMC @ 0x40000130
3,167,090 UART:
3,167,106 UART: Running Caliptra FMC ...
3,167,514 UART:
3,167,657 UART: [state] CFI Enabled
3,177,848 UART: [fht] FMC Alias Private Key: 7
3,285,551 UART: [art] Extend RT PCRs Done
3,285,979 UART: [art] Lock RT PCRs Done
3,287,479 UART: [art] Populate DV Done
3,295,572 UART: [fht] FMC Alias Private Key: 7
3,296,602 UART: [art] Derive CDI
3,296,882 UART: [art] Store in in slot 0x4
3,382,997 UART: [art] Derive Key Pair
3,383,357 UART: [art] Store priv key in slot 0x5
3,396,477 UART: [art] Derive Key Pair - Done
3,411,235 UART: [art] Signing Cert with AUTHO
3,411,715 UART: RITY.KEYID = 7
3,427,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,766 UART: [art] PUB.X = 8B7483BEC286369E024560224CC52580A8024C4E61293FB98D662096D368782D8FD97F6B82E7FEA5EF655D532C00742A
3,434,502 UART: [art] PUB.Y = F54C562EE3CF48B5352BA809175CE787F45C7513BD42DF154E10ACB566034F3D145A1FFF729FF095799F839A0C73A7E1
3,441,449 UART: [art] SIG.R = 9621F2453D9A01ED90E1E633F968940CD923EE5F6F1772885E677EFE9351E237693AB440070D640504162049B94268CC
3,448,189 UART: [art] SIG.S = 3D87FFF7B73068144E6F616BC0F1647590B21E77D1D9F4C02E568084DDFE5CDA2CB02320AF94E5E5CD11C198BCF13067
3,472,068 UART: Caliptra RT
3,472,414 UART: [state] CFI Enabled
3,581,170 UART: [rt] RT listening for mailbox commands...
3,581,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,243 UART: [rt]cmd =0x4d454153, len=108
3,633,340 >>> mbox cmd response data (12 bytes)
3,633,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,346 UART: [rt]cmd =0x4d454153, len=108
3,683,231 >>> mbox cmd response data (12 bytes)
3,683,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,221 UART: [rt]cmd =0x4d454153, len=108
3,734,472 >>> mbox cmd response data (12 bytes)
3,734,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,464 UART: [rt]cmd =0x4d454153, len=108
3,784,599 >>> mbox cmd response data (12 bytes)
3,784,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,689 UART: [rt]cmd =0x4d454153, len=108
3,835,422 >>> mbox cmd response data (12 bytes)
3,835,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,408 UART: [rt]cmd =0x4d454153, len=108
3,886,657 >>> mbox cmd response data (12 bytes)
3,886,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,589 UART: [rt]cmd =0x4d454153, len=108
3,937,174 >>> mbox cmd response data (12 bytes)
3,937,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,300 UART: [rt]cmd =0x4d454153, len=108
3,988,227 >>> mbox cmd response data (12 bytes)
3,988,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,595 UART: [rt]cmd =0x4d454153, len=108
4,039,826 >>> mbox cmd response data (12 bytes)
4,039,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,870 UART: [rt]cmd =0x4d454153, len=108
4,090,767 >>> mbox cmd response data (12 bytes)
4,090,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,853 UART: [rt]cmd =0x4d454153, len=108
4,141,730 >>> mbox cmd response data (12 bytes)
4,141,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,562 UART: [rt]cmd =0x4d454153, len=108
4,193,345 >>> mbox cmd response data (12 bytes)
4,193,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,601 UART: [rt]cmd =0x4d454153, len=108
4,244,468 >>> mbox cmd response data (12 bytes)
4,244,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,274,756 UART: [rt]cmd =0x4d454153, len=108
4,295,907 >>> mbox cmd response data (12 bytes)
4,295,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,325,999 UART: [rt]cmd =0x4d454153, len=108
4,346,220 >>> mbox cmd response data (12 bytes)
4,346,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,142 UART: [rt]cmd =0x4d454153, len=108
4,377,928 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,298 ready_for_fw is high
1,363,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,268 >>> mbox cmd response: success
2,988,928 UART:
2,988,944 UART: Running Caliptra FMC ...
2,989,352 UART:
2,989,495 UART: [state] CFI Enabled
3,000,412 UART: [fht] FMC Alias Private Key: 7
3,108,167 UART: [art] Extend RT PCRs Done
3,108,595 UART: [art] Lock RT PCRs Done
3,110,151 UART: [art] Populate DV Done
3,118,508 UART: [fht] FMC Alias Private Key: 7
3,119,630 UART: [art] Derive CDI
3,119,910 UART: [art] Store in in slot 0x4
3,205,737 UART: [art] Derive Key Pair
3,206,097 UART: [art] Store priv key in slot 0x5
3,218,895 UART: [art] Derive Key Pair - Done
3,233,609 UART: [art] Signing Cert with AUTHO
3,234,089 UART: RITY.KEYID = 7
3,249,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,276 UART: [art] PUB.X = 0EB549298E87AFB88B3000E17D57275EDDB2A62BA9E51C2A420C32C6883ECC859459961B074EDF823EA78C23C37121C0
3,257,019 UART: [art] PUB.Y = C34476D94099CB1907A7FC38395C4F9DAC5FFEFFD21F270360AE07931E900913710DC5B2F5554627026B1314FC470AD5
3,263,948 UART: [art] SIG.R = 759967A8369F789FB242DDDCDCBCFF348FF9A92633B4437F07D4DEBE47FFD0B4322AB50BFFEA16240AAAA813366AEC68
3,270,731 UART: [art] SIG.S = 688C12AD3B66C7F3019A8044128FCBD4C3DA15AE548B926E4481E9C0158CD768FFE2DEC3835BAC4A0ED7DA8DF138A7F9
3,294,620 UART: Caliptra RT
3,294,966 UART: [state] CFI Enabled
3,402,935 UART: [rt] RT listening for mailbox commands...
3,403,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,720 UART: [rt]cmd =0x4d454153, len=108
3,454,283 >>> mbox cmd response data (12 bytes)
3,454,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,329 UART: [rt]cmd =0x4d454153, len=108
3,504,518 >>> mbox cmd response data (12 bytes)
3,504,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,424 UART: [rt]cmd =0x4d454153, len=108
3,555,423 >>> mbox cmd response data (12 bytes)
3,555,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,381 UART: [rt]cmd =0x4d454153, len=108
3,606,424 >>> mbox cmd response data (12 bytes)
3,606,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,334 UART: [rt]cmd =0x4d454153, len=108
3,656,753 >>> mbox cmd response data (12 bytes)
3,656,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,893 UART: [rt]cmd =0x4d454153, len=108
3,708,026 >>> mbox cmd response data (12 bytes)
3,708,027 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,066 UART: [rt]cmd =0x4d454153, len=108
3,759,197 >>> mbox cmd response data (12 bytes)
3,759,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,203 UART: [rt]cmd =0x4d454153, len=108
3,809,338 >>> mbox cmd response data (12 bytes)
3,809,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,478 UART: [rt]cmd =0x4d454153, len=108
3,860,727 >>> mbox cmd response data (12 bytes)
3,860,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,847 UART: [rt]cmd =0x4d454153, len=108
3,911,298 >>> mbox cmd response data (12 bytes)
3,911,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,144 UART: [rt]cmd =0x4d454153, len=108
3,962,215 >>> mbox cmd response data (12 bytes)
3,962,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,337 UART: [rt]cmd =0x4d454153, len=108
4,013,242 >>> mbox cmd response data (12 bytes)
4,013,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,392 UART: [rt]cmd =0x4d454153, len=108
4,063,783 >>> mbox cmd response data (12 bytes)
4,063,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,885 UART: [rt]cmd =0x4d454153, len=108
4,115,132 >>> mbox cmd response data (12 bytes)
4,115,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,098 UART: [rt]cmd =0x4d454153, len=108
4,165,561 >>> mbox cmd response data (12 bytes)
4,165,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,455 UART: [rt]cmd =0x4d454153, len=108
4,197,409 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
893,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,313 UART: [kat] ++
897,465 UART: [kat] sha1
901,527 UART: [kat] SHA2-256
903,467 UART: [kat] SHA2-384
906,160 UART: [kat] SHA2-512-ACC
908,061 UART: [kat] ECC-384
917,710 UART: [kat] HMAC-384Kdf
922,408 UART: [kat] LMS
1,170,736 UART: [kat] --
1,171,627 UART: [cold-reset] ++
1,172,105 UART: [fht] FHT @ 0x50003400
1,174,716 UART: [idev] ++
1,174,884 UART: [idev] CDI.KEYID = 6
1,175,244 UART: [idev] SUBJECT.KEYID = 7
1,175,668 UART: [idev] UDS.KEYID = 0
1,176,013 ready_for_fw is high
1,176,013 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,342 UART: [idev] Erasing UDS.KEYID = 0
1,200,445 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,572 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,296 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,056 >>> mbox cmd response: success
2,775,066 UART: [afmc] ++
2,775,234 UART: [afmc] CDI.KEYID = 6
2,775,596 UART: [afmc] SUBJECT.KEYID = 7
2,776,021 UART: [afmc] AUTHORITY.KEYID = 5
2,810,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,617 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,165 UART: [afmc] --
2,854,109 UART: [cold-reset] --
2,855,083 UART: [state] Locking Datavault
2,856,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,970 UART: [state] Locking ICCM
2,857,498 UART: [exit] Launching FMC @ 0x40000130
2,862,827 UART:
2,862,843 UART: Running Caliptra FMC ...
2,863,251 UART:
2,863,305 UART: [state] CFI Enabled
2,873,708 UART: [fht] FMC Alias Private Key: 7
2,982,165 UART: [art] Extend RT PCRs Done
2,982,593 UART: [art] Lock RT PCRs Done
2,984,053 UART: [art] Populate DV Done
2,992,290 UART: [fht] FMC Alias Private Key: 7
2,993,356 UART: [art] Derive CDI
2,993,636 UART: [art] Store in in slot 0x4
3,079,345 UART: [art] Derive Key Pair
3,079,705 UART: [art] Store priv key in slot 0x5
3,092,731 UART: [art] Derive Key Pair - Done
3,107,725 UART: [art] Signing Cert with AUTHO
3,108,205 UART: RITY.KEYID = 7
3,123,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,102 UART: [art] PUB.X = 59CB39A2D3B5C4981648A9A8FA7F06BE188A5C062CAE742DF8500F72F7D506D9BD013D821EFFE7A76E291701D6DF92C3
3,130,866 UART: [art] PUB.Y = 0BFC68C4D0AF53E0E3715430E1781E25DBDAB3BC4B9FFA1C6D7F5356B569AC4F5EF3981B009BDA32F25B7090D7D8BA9D
3,137,813 UART: [art] SIG.R = 56AE571BA07BF7B6D7C34BC2758B3338F3FCEB3664DD8BB14386745F3604C5BC4A455D92CD216BFAD0A3DA1174DCD52D
3,144,598 UART: [art] SIG.S = AD6346B4034EC7ECC2F7D3C24D4701973E4A96E87940BC1EF1BF8618A58061AF588797AE3056D32AFC35F1DB7FF74037
3,168,319 UART: Caliptra RT
3,168,573 UART: [state] CFI Enabled
3,275,991 UART: [rt] RT listening for mailbox commands...
3,276,661 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,710 UART: [rt]cmd =0x4d454153, len=108
3,327,005 >>> mbox cmd response data (12 bytes)
3,327,006 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,219 UART: [rt]cmd =0x4d454153, len=108
3,377,388 >>> mbox cmd response data (12 bytes)
3,377,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,310 UART: [rt]cmd =0x4d454153, len=108
3,427,219 >>> mbox cmd response data (12 bytes)
3,427,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,053 UART: [rt]cmd =0x4d454153, len=108
3,477,374 >>> mbox cmd response data (12 bytes)
3,477,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,102 UART: [rt]cmd =0x4d454153, len=108
3,527,655 >>> mbox cmd response data (12 bytes)
3,527,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,769 UART: [rt]cmd =0x4d454153, len=108
3,579,016 >>> mbox cmd response data (12 bytes)
3,579,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,078 UART: [rt]cmd =0x4d454153, len=108
3,629,521 >>> mbox cmd response data (12 bytes)
3,629,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,653 UART: [rt]cmd =0x4d454153, len=108
3,679,878 >>> mbox cmd response data (12 bytes)
3,679,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,896 UART: [rt]cmd =0x4d454153, len=108
3,730,579 >>> mbox cmd response data (12 bytes)
3,730,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,573 UART: [rt]cmd =0x4d454153, len=108
3,781,088 >>> mbox cmd response data (12 bytes)
3,781,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,848 UART: [rt]cmd =0x4d454153, len=108
3,832,169 >>> mbox cmd response data (12 bytes)
3,832,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,957 UART: [rt]cmd =0x4d454153, len=108
3,883,314 >>> mbox cmd response data (12 bytes)
3,883,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,296 UART: [rt]cmd =0x4d454153, len=108
3,934,529 >>> mbox cmd response data (12 bytes)
3,934,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,629 UART: [rt]cmd =0x4d454153, len=108
3,985,124 >>> mbox cmd response data (12 bytes)
3,985,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,184 UART: [rt]cmd =0x4d454153, len=108
4,036,047 >>> mbox cmd response data (12 bytes)
4,036,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,937 UART: [rt]cmd =0x4d454153, len=108
4,067,763 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,769 ready_for_fw is high
1,060,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,371 >>> mbox cmd response: success
2,687,579 UART:
2,687,595 UART: Running Caliptra FMC ...
2,688,003 UART:
2,688,057 UART: [state] CFI Enabled
2,698,682 UART: [fht] FMC Alias Private Key: 7
2,807,165 UART: [art] Extend RT PCRs Done
2,807,593 UART: [art] Lock RT PCRs Done
2,809,489 UART: [art] Populate DV Done
2,817,516 UART: [fht] FMC Alias Private Key: 7
2,818,662 UART: [art] Derive CDI
2,818,942 UART: [art] Store in in slot 0x4
2,904,659 UART: [art] Derive Key Pair
2,905,019 UART: [art] Store priv key in slot 0x5
2,918,297 UART: [art] Derive Key Pair - Done
2,933,252 UART: [art] Signing Cert with AUTHO
2,933,732 UART: RITY.KEYID = 7
2,948,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,755 UART: [art] PUB.X = 03277972127EF3E08B19ACA4C25815A11D8EEB3859AA5E032F2FB3F6AC765D7BAC36816F799FDFCC06B505C921657777
2,956,519 UART: [art] PUB.Y = BD0134FC402449127A6D9118B1E80D96EA19138EB6991B152605BF3B7DF58F87ED7B211CC061B2C52FD0E0C2CBAA0CE9
2,963,469 UART: [art] SIG.R = A16109690E38016A6DD6C822F7C03386578F68DFC27CDD6EB16AD2940B9C0A2BD6A24A1530700375A1CCC814E6EDAC33
2,970,229 UART: [art] SIG.S = 136E369248C3951A3F516F557900FD447A86567F711D936EB6922DD89A5653F5F0766AD765BFC0B161F279282C2CA8AE
2,994,218 UART: Caliptra RT
2,994,472 UART: [state] CFI Enabled
3,101,826 UART: [rt] RT listening for mailbox commands...
3,102,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,831 UART: [rt]cmd =0x4d454153, len=108
3,153,192 >>> mbox cmd response data (12 bytes)
3,153,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,358 UART: [rt]cmd =0x4d454153, len=108
3,203,781 >>> mbox cmd response data (12 bytes)
3,203,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,995 UART: [rt]cmd =0x4d454153, len=108
3,255,150 >>> mbox cmd response data (12 bytes)
3,255,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,202 UART: [rt]cmd =0x4d454153, len=108
3,306,007 >>> mbox cmd response data (12 bytes)
3,306,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,081 UART: [rt]cmd =0x4d454153, len=108
3,357,472 >>> mbox cmd response data (12 bytes)
3,357,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,396 UART: [rt]cmd =0x4d454153, len=108
3,408,571 >>> mbox cmd response data (12 bytes)
3,408,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,797 UART: [rt]cmd =0x4d454153, len=108
3,459,758 >>> mbox cmd response data (12 bytes)
3,459,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,626 UART: [rt]cmd =0x4d454153, len=108
3,510,425 >>> mbox cmd response data (12 bytes)
3,510,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,569 UART: [rt]cmd =0x4d454153, len=108
3,560,972 >>> mbox cmd response data (12 bytes)
3,560,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,918 UART: [rt]cmd =0x4d454153, len=108
3,611,625 >>> mbox cmd response data (12 bytes)
3,611,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,457 UART: [rt]cmd =0x4d454153, len=108
3,662,104 >>> mbox cmd response data (12 bytes)
3,662,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,206 UART: [rt]cmd =0x4d454153, len=108
3,713,563 >>> mbox cmd response data (12 bytes)
3,713,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,815 UART: [rt]cmd =0x4d454153, len=108
3,764,576 >>> mbox cmd response data (12 bytes)
3,764,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,390 UART: [rt]cmd =0x4d454153, len=108
3,815,175 >>> mbox cmd response data (12 bytes)
3,815,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,461 UART: [rt]cmd =0x4d454153, len=108
3,866,494 >>> mbox cmd response data (12 bytes)
3,866,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,550 UART: [rt]cmd =0x4d454153, len=108
3,898,364 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
893,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,668 UART: [kat] ++
897,820 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,759 UART: [kat] HMAC-384Kdf
923,393 UART: [kat] LMS
1,171,721 UART: [kat] --
1,172,804 UART: [cold-reset] ++
1,173,244 UART: [fht] FHT @ 0x50003400
1,176,079 UART: [idev] ++
1,176,247 UART: [idev] CDI.KEYID = 6
1,176,607 UART: [idev] SUBJECT.KEYID = 7
1,177,031 UART: [idev] UDS.KEYID = 0
1,177,376 ready_for_fw is high
1,177,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,047 UART: [idev] Erasing UDS.KEYID = 0
1,201,734 UART: [idev] Sha1 KeyId Algorithm
1,210,114 UART: [idev] --
1,211,286 UART: [ldev] ++
1,211,454 UART: [ldev] CDI.KEYID = 6
1,211,817 UART: [ldev] SUBJECT.KEYID = 5
1,212,243 UART: [ldev] AUTHORITY.KEYID = 7
1,212,706 UART: [ldev] FE.KEYID = 1
1,218,004 UART: [ldev] Erasing FE.KEYID = 1
1,244,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,538 UART: [ldev] --
1,283,833 UART: [fwproc] Wait for Commands...
1,284,451 UART: [fwproc] Recv command 0x46574c44
1,285,179 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,777,691 >>> mbox cmd response: success
2,778,739 UART: [afmc] ++
2,778,907 UART: [afmc] CDI.KEYID = 6
2,779,269 UART: [afmc] SUBJECT.KEYID = 7
2,779,694 UART: [afmc] AUTHORITY.KEYID = 5
2,815,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,006 UART: [afmc] --
2,859,020 UART: [cold-reset] --
2,859,848 UART: [state] Locking Datavault
2,860,827 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,431 UART: [state] Locking ICCM
2,861,889 UART: [exit] Launching FMC @ 0x40000130
2,867,218 UART:
2,867,234 UART: Running Caliptra FMC ...
2,867,642 UART:
2,867,785 UART: [state] CFI Enabled
2,878,812 UART: [fht] FMC Alias Private Key: 7
2,986,167 UART: [art] Extend RT PCRs Done
2,986,595 UART: [art] Lock RT PCRs Done
2,987,925 UART: [art] Populate DV Done
2,996,128 UART: [fht] FMC Alias Private Key: 7
2,997,274 UART: [art] Derive CDI
2,997,554 UART: [art] Store in in slot 0x4
3,083,055 UART: [art] Derive Key Pair
3,083,415 UART: [art] Store priv key in slot 0x5
3,096,811 UART: [art] Derive Key Pair - Done
3,111,479 UART: [art] Signing Cert with AUTHO
3,111,959 UART: RITY.KEYID = 7
3,126,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,612 UART: [art] PUB.X = B104C9501320DA751EFD60D57E9D550C162C48CFD1FF153E7B0F09D62B0C889C9F729EEF08086EF8F28627776AAFA4BC
3,134,373 UART: [art] PUB.Y = 3809F7F465A6403943AB5EADF6BA17F5BDE6DAB3042B4695426E21E1FCD67590E13EFA703D7359DD782526510822F449
3,141,316 UART: [art] SIG.R = 767008B1B8FEDC61EDBDA8CC9B347C6B2079A14B425756E6AEA1C4939264F9C77B328BB1B9FD0C250AF8C763B72726B1
3,148,089 UART: [art] SIG.S = 5583F2B6F79840CEFCF73086398E9C2F22DD1D40D7433A5A53C4BEC5373DE71B331EEDE9862D9DB6F581290A390A5FD8
3,171,618 UART: Caliptra RT
3,171,964 UART: [state] CFI Enabled
3,279,766 UART: [rt] RT listening for mailbox commands...
3,280,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,699 UART: [rt]cmd =0x4d454153, len=108
3,330,478 >>> mbox cmd response data (12 bytes)
3,330,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,652 UART: [rt]cmd =0x4d454153, len=108
3,382,041 >>> mbox cmd response data (12 bytes)
3,382,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,167 UART: [rt]cmd =0x4d454153, len=108
3,432,662 >>> mbox cmd response data (12 bytes)
3,432,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,642 UART: [rt]cmd =0x4d454153, len=108
3,482,173 >>> mbox cmd response data (12 bytes)
3,482,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,247 UART: [rt]cmd =0x4d454153, len=108
3,533,194 >>> mbox cmd response data (12 bytes)
3,533,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,024 UART: [rt]cmd =0x4d454153, len=108
3,583,305 >>> mbox cmd response data (12 bytes)
3,583,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,371 UART: [rt]cmd =0x4d454153, len=108
3,634,670 >>> mbox cmd response data (12 bytes)
3,634,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,828 UART: [rt]cmd =0x4d454153, len=108
3,685,001 >>> mbox cmd response data (12 bytes)
3,685,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,043 UART: [rt]cmd =0x4d454153, len=108
3,735,548 >>> mbox cmd response data (12 bytes)
3,735,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,326 UART: [rt]cmd =0x4d454153, len=108
3,786,083 >>> mbox cmd response data (12 bytes)
3,786,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,401 UART: [rt]cmd =0x4d454153, len=108
3,837,268 >>> mbox cmd response data (12 bytes)
3,837,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,296 UART: [rt]cmd =0x4d454153, len=108
3,888,175 >>> mbox cmd response data (12 bytes)
3,888,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,195 UART: [rt]cmd =0x4d454153, len=108
3,938,638 >>> mbox cmd response data (12 bytes)
3,938,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,682 UART: [rt]cmd =0x4d454153, len=108
3,988,469 >>> mbox cmd response data (12 bytes)
3,988,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,685 UART: [rt]cmd =0x4d454153, len=108
4,039,266 >>> mbox cmd response data (12 bytes)
4,039,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,364 UART: [rt]cmd =0x4d454153, len=108
4,071,328 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,258 ready_for_fw is high
1,060,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,224 >>> mbox cmd response: success
2,689,248 UART:
2,689,264 UART: Running Caliptra FMC ...
2,689,672 UART:
2,689,815 UART: [state] CFI Enabled
2,700,378 UART: [fht] FMC Alias Private Key: 7
2,808,897 UART: [art] Extend RT PCRs Done
2,809,325 UART: [art] Lock RT PCRs Done
2,810,903 UART: [art] Populate DV Done
2,819,072 UART: [fht] FMC Alias Private Key: 7
2,820,106 UART: [art] Derive CDI
2,820,386 UART: [art] Store in in slot 0x4
2,906,027 UART: [art] Derive Key Pair
2,906,387 UART: [art] Store priv key in slot 0x5
2,919,449 UART: [art] Derive Key Pair - Done
2,934,156 UART: [art] Signing Cert with AUTHO
2,934,636 UART: RITY.KEYID = 7
2,949,646 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,411 UART: [art] PUB.X = D902BA537F9E2868F8AC5C698A83EA8B30550B2BE6D8A468C816C957B2506B9908B393B8BEEF8CA2069C31D3AF8056EC
2,957,179 UART: [art] PUB.Y = 3CD96B71D4E07F0D3FD8C5A826D310C7F4CADEA12C07D6B89D82773E3D1EDCAF573B6F48EEEC9C653A4C3E3BB351E4E2
2,964,149 UART: [art] SIG.R = AD46111E4D88AEB8B7478484F1EDE630D2377E1940B0A2BBDBE01A1AACA6CB7F0204A0F7DD62B957EFB4BAB13CF0AF05
2,970,936 UART: [art] SIG.S = 28146DD4BC0DA6D36EACE20DDE8084E303D2FAB9DD0F333D3FFEAB773CB1B5182D8A44D408E098D812B0B6748B06213B
2,994,551 UART: Caliptra RT
2,994,897 UART: [state] CFI Enabled
3,103,335 UART: [rt] RT listening for mailbox commands...
3,104,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,190 UART: [rt]cmd =0x4d454153, len=108
3,154,021 >>> mbox cmd response data (12 bytes)
3,154,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,919 UART: [rt]cmd =0x4d454153, len=108
3,203,546 >>> mbox cmd response data (12 bytes)
3,203,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,748 UART: [rt]cmd =0x4d454153, len=108
3,255,263 >>> mbox cmd response data (12 bytes)
3,255,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,391 UART: [rt]cmd =0x4d454153, len=108
3,306,540 >>> mbox cmd response data (12 bytes)
3,306,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,682 UART: [rt]cmd =0x4d454153, len=108
3,357,139 >>> mbox cmd response data (12 bytes)
3,357,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,003 UART: [rt]cmd =0x4d454153, len=108
3,407,486 >>> mbox cmd response data (12 bytes)
3,407,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,686 UART: [rt]cmd =0x4d454153, len=108
3,458,275 >>> mbox cmd response data (12 bytes)
3,458,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,201 UART: [rt]cmd =0x4d454153, len=108
3,508,632 >>> mbox cmd response data (12 bytes)
3,508,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,686 UART: [rt]cmd =0x4d454153, len=108
3,559,443 >>> mbox cmd response data (12 bytes)
3,559,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,539 UART: [rt]cmd =0x4d454153, len=108
3,609,936 >>> mbox cmd response data (12 bytes)
3,609,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,786 UART: [rt]cmd =0x4d454153, len=108
3,660,695 >>> mbox cmd response data (12 bytes)
3,660,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,761 UART: [rt]cmd =0x4d454153, len=108
3,710,884 >>> mbox cmd response data (12 bytes)
3,710,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,576 UART: [rt]cmd =0x4d454153, len=108
3,761,393 >>> mbox cmd response data (12 bytes)
3,761,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,425 UART: [rt]cmd =0x4d454153, len=108
3,812,362 >>> mbox cmd response data (12 bytes)
3,812,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,560 UART: [rt]cmd =0x4d454153, len=108
3,863,179 >>> mbox cmd response data (12 bytes)
3,863,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,143 UART: [rt]cmd =0x4d454153, len=108
3,894,837 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,276 UART: [kat] LMS
1,168,588 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,095 UART: [fht] FHT @ 0x50003400
1,172,663 UART: [idev] ++
1,172,831 UART: [idev] CDI.KEYID = 6
1,173,192 UART: [idev] SUBJECT.KEYID = 7
1,173,617 UART: [idev] UDS.KEYID = 0
1,173,963 ready_for_fw is high
1,173,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,207,099 UART: [idev] --
1,208,226 UART: [ldev] ++
1,208,394 UART: [ldev] CDI.KEYID = 6
1,208,758 UART: [ldev] SUBJECT.KEYID = 5
1,209,185 UART: [ldev] AUTHORITY.KEYID = 7
1,209,648 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,030 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,237 UART: [fwproc] Recv command 0x46574c44
1,281,970 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,470 >>> mbox cmd response: success
2,773,603 UART: [afmc] ++
2,773,771 UART: [afmc] CDI.KEYID = 6
2,774,134 UART: [afmc] SUBJECT.KEYID = 7
2,774,560 UART: [afmc] AUTHORITY.KEYID = 5
2,809,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,505 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,796 UART: [afmc] --
2,852,756 UART: [cold-reset] --
2,853,482 UART: [state] Locking Datavault
2,854,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,175 UART: [state] Locking ICCM
2,855,729 UART: [exit] Launching FMC @ 0x40000130
2,861,058 UART:
2,861,074 UART: Running Caliptra FMC ...
2,861,482 UART:
2,861,536 UART: [state] CFI Enabled
2,871,777 UART: [fht] FMC Alias Private Key: 7
2,979,328 UART: [art] Extend RT PCRs Done
2,979,756 UART: [art] Lock RT PCRs Done
2,980,792 UART: [art] Populate DV Done
2,989,059 UART: [fht] FMC Alias Private Key: 7
2,990,037 UART: [art] Derive CDI
2,990,317 UART: [art] Store in in slot 0x4
3,075,958 UART: [art] Derive Key Pair
3,076,318 UART: [art] Store priv key in slot 0x5
3,089,296 UART: [art] Derive Key Pair - Done
3,103,895 UART: [art] Signing Cert with AUTHO
3,104,375 UART: RITY.KEYID = 7
3,119,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,698 UART: [art] PUB.X = 3DC912B4D57730A792092D7C5CD2473334573332CA26171024D19BA63691933A8B89384D5DA39FD8FC49CDACEFD60AC2
3,127,464 UART: [art] PUB.Y = 3050429C39E19303648CC2291CD0B06FB6B8083A27B35A1E6D513AEAB5BEB1B7850EB4C296DA4E98DE9386A3B4BE0D2A
3,134,414 UART: [art] SIG.R = DA6C7D078788CD22782133AC9A8B431EBA67232AC5568507BB492D094E6B625F12FDEC42E576C06E41397F6C6D6AE2CA
3,141,183 UART: [art] SIG.S = DAA0E49046DDCD284176DD927F6E58BE98E5A4700C29E0B1DCF8A94E36F7A84A598534E6E7E12512873BEF3C8F445D42
3,165,251 UART: Caliptra RT
3,165,505 UART: [state] CFI Enabled
3,273,158 UART: [rt] RT listening for mailbox commands...
3,273,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,989 UART: [rt]cmd =0x4d454153, len=108
3,325,178 >>> mbox cmd response data (12 bytes)
3,325,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,038 UART: [rt]cmd =0x4d454153, len=108
3,375,095 >>> mbox cmd response data (12 bytes)
3,375,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,159 UART: [rt]cmd =0x4d454153, len=108
3,425,316 >>> mbox cmd response data (12 bytes)
3,425,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,316 UART: [rt]cmd =0x4d454153, len=108
3,475,885 >>> mbox cmd response data (12 bytes)
3,475,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,021 UART: [rt]cmd =0x4d454153, len=108
3,526,512 >>> mbox cmd response data (12 bytes)
3,526,513 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,724 UART: [rt]cmd =0x4d454153, len=108
3,577,723 >>> mbox cmd response data (12 bytes)
3,577,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,637 UART: [rt]cmd =0x4d454153, len=108
3,628,444 >>> mbox cmd response data (12 bytes)
3,628,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,296 UART: [rt]cmd =0x4d454153, len=108
3,679,241 >>> mbox cmd response data (12 bytes)
3,679,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,389 UART: [rt]cmd =0x4d454153, len=108
3,729,584 >>> mbox cmd response data (12 bytes)
3,729,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,552 UART: [rt]cmd =0x4d454153, len=108
3,780,207 >>> mbox cmd response data (12 bytes)
3,780,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,187 UART: [rt]cmd =0x4d454153, len=108
3,831,252 >>> mbox cmd response data (12 bytes)
3,831,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,124 UART: [rt]cmd =0x4d454153, len=108
3,882,357 >>> mbox cmd response data (12 bytes)
3,882,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,349 UART: [rt]cmd =0x4d454153, len=108
3,933,434 >>> mbox cmd response data (12 bytes)
3,933,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,530 UART: [rt]cmd =0x4d454153, len=108
3,984,847 >>> mbox cmd response data (12 bytes)
3,984,848 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,995 UART: [rt]cmd =0x4d454153, len=108
4,035,642 >>> mbox cmd response data (12 bytes)
4,035,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,536 UART: [rt]cmd =0x4d454153, len=108
4,067,658 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,658 ready_for_fw is high
1,055,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,624 >>> mbox cmd response: success
2,684,192 UART:
2,684,208 UART: Running Caliptra FMC ...
2,684,616 UART:
2,684,670 UART: [state] CFI Enabled
2,694,949 UART: [fht] FMC Alias Private Key: 7
2,802,502 UART: [art] Extend RT PCRs Done
2,802,930 UART: [art] Lock RT PCRs Done
2,804,248 UART: [art] Populate DV Done
2,812,823 UART: [fht] FMC Alias Private Key: 7
2,813,955 UART: [art] Derive CDI
2,814,235 UART: [art] Store in in slot 0x4
2,899,820 UART: [art] Derive Key Pair
2,900,180 UART: [art] Store priv key in slot 0x5
2,913,004 UART: [art] Derive Key Pair - Done
2,927,580 UART: [art] Signing Cert with AUTHO
2,928,060 UART: RITY.KEYID = 7
2,943,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,111 UART: [art] PUB.X = FE3702CC4262B79886251197D0BC69B7299B5FC1CC1F0467988AC3CCCE4EC734756B54E86A25408A60962203868ABA57
2,950,870 UART: [art] PUB.Y = 9F9EDC543260B624624FC25011C5A8FD8BB979A6978E0EA6920B64B49743F9611CF098CC9CD494164FE7DFA8AD9DEEC7
2,957,826 UART: [art] SIG.R = 0495C158B695CA7FD92E0C99A2100616C5126D287C6E372512FBC994899E827AEEBF7AAA61EEDF19D7FC42DD7C0F4F8A
2,964,598 UART: [art] SIG.S = EBC7929FE7E3649085A1E48D958162E10EF8ED72EB1EFFE28EDA6179BC3A573778181E92CF1D30FD49E30D88454991E6
2,988,351 UART: Caliptra RT
2,988,605 UART: [state] CFI Enabled
3,097,355 UART: [rt] RT listening for mailbox commands...
3,098,025 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,286 UART: [rt]cmd =0x4d454153, len=108
3,149,583 >>> mbox cmd response data (12 bytes)
3,149,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,647 UART: [rt]cmd =0x4d454153, len=108
3,200,010 >>> mbox cmd response data (12 bytes)
3,200,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,290 UART: [rt]cmd =0x4d454153, len=108
3,251,069 >>> mbox cmd response data (12 bytes)
3,251,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,925 UART: [rt]cmd =0x4d454153, len=108
3,301,530 >>> mbox cmd response data (12 bytes)
3,301,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,560 UART: [rt]cmd =0x4d454153, len=108
3,352,495 >>> mbox cmd response data (12 bytes)
3,352,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,293 UART: [rt]cmd =0x4d454153, len=108
3,402,742 >>> mbox cmd response data (12 bytes)
3,402,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,878 UART: [rt]cmd =0x4d454153, len=108
3,453,809 >>> mbox cmd response data (12 bytes)
3,453,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,759 UART: [rt]cmd =0x4d454153, len=108
3,503,898 >>> mbox cmd response data (12 bytes)
3,503,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,052 UART: [rt]cmd =0x4d454153, len=108
3,555,129 >>> mbox cmd response data (12 bytes)
3,555,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,371 UART: [rt]cmd =0x4d454153, len=108
3,606,482 >>> mbox cmd response data (12 bytes)
3,606,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,546 UART: [rt]cmd =0x4d454153, len=108
3,657,291 >>> mbox cmd response data (12 bytes)
3,657,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,611 UART: [rt]cmd =0x4d454153, len=108
3,709,142 >>> mbox cmd response data (12 bytes)
3,709,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,150 UART: [rt]cmd =0x4d454153, len=108
3,760,083 >>> mbox cmd response data (12 bytes)
3,760,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,015 UART: [rt]cmd =0x4d454153, len=108
3,811,240 >>> mbox cmd response data (12 bytes)
3,811,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,122 UART: [rt]cmd =0x4d454153, len=108
3,862,383 >>> mbox cmd response data (12 bytes)
3,862,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,447 UART: [rt]cmd =0x4d454153, len=108
3,894,651 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
891,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,694 UART: [kat] ++
895,846 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,661 UART: [kat] LMS
1,169,973 UART: [kat] --
1,170,898 UART: [cold-reset] ++
1,171,444 UART: [fht] FHT @ 0x50003400
1,174,056 UART: [idev] ++
1,174,224 UART: [idev] CDI.KEYID = 6
1,174,585 UART: [idev] SUBJECT.KEYID = 7
1,175,010 UART: [idev] UDS.KEYID = 0
1,175,356 ready_for_fw is high
1,175,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,332 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,178 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,269 >>> mbox cmd response: success
2,774,360 UART: [afmc] ++
2,774,528 UART: [afmc] CDI.KEYID = 6
2,774,891 UART: [afmc] SUBJECT.KEYID = 7
2,775,317 UART: [afmc] AUTHORITY.KEYID = 5
2,811,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,216 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,643 UART: [afmc] --
2,854,679 UART: [cold-reset] --
2,855,647 UART: [state] Locking Datavault
2,857,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,614 UART: [state] Locking ICCM
2,858,174 UART: [exit] Launching FMC @ 0x40000130
2,863,503 UART:
2,863,519 UART: Running Caliptra FMC ...
2,863,927 UART:
2,864,070 UART: [state] CFI Enabled
2,875,083 UART: [fht] FMC Alias Private Key: 7
2,983,378 UART: [art] Extend RT PCRs Done
2,983,806 UART: [art] Lock RT PCRs Done
2,985,568 UART: [art] Populate DV Done
2,993,625 UART: [fht] FMC Alias Private Key: 7
2,994,633 UART: [art] Derive CDI
2,994,913 UART: [art] Store in in slot 0x4
3,080,650 UART: [art] Derive Key Pair
3,081,010 UART: [art] Store priv key in slot 0x5
3,093,766 UART: [art] Derive Key Pair - Done
3,108,351 UART: [art] Signing Cert with AUTHO
3,108,831 UART: RITY.KEYID = 7
3,123,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,722 UART: [art] PUB.X = 0AF08EB74D1E8AB3A43F41DC60ABD80850C042363A687AF60E56C3E0D0E65D0DE65A6127B8E91E6F7660C63F8CFFE7B1
3,131,496 UART: [art] PUB.Y = E2EE40C037023912F606611461614C295F5C332C57EE382FF59BD2B9209454CB7FFCF7F66401F93077C2B1B843EF43F1
3,138,435 UART: [art] SIG.R = 4146019F3C1112D7EE26A832AA0ECE53CABDD879FD76454BE3654A60DC2588B067D4DD220ABB49D8F7E98068D08F39AF
3,145,208 UART: [art] SIG.S = A68B4F2B69EE4773B7E7EE2A863111857130A75EFAC0E7BCB493FDF25E77B518BE3789EE02B9E21432D675DCAEAF4C35
3,168,832 UART: Caliptra RT
3,169,178 UART: [state] CFI Enabled
3,277,332 UART: [rt] RT listening for mailbox commands...
3,278,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,093 UART: [rt]cmd =0x4d454153, len=108
3,328,662 >>> mbox cmd response data (12 bytes)
3,328,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,768 UART: [rt]cmd =0x4d454153, len=108
3,379,743 >>> mbox cmd response data (12 bytes)
3,379,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,707 UART: [rt]cmd =0x4d454153, len=108
3,430,056 >>> mbox cmd response data (12 bytes)
3,430,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,122 UART: [rt]cmd =0x4d454153, len=108
3,480,795 >>> mbox cmd response data (12 bytes)
3,480,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,961 UART: [rt]cmd =0x4d454153, len=108
3,531,148 >>> mbox cmd response data (12 bytes)
3,531,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,160 UART: [rt]cmd =0x4d454153, len=108
3,582,249 >>> mbox cmd response data (12 bytes)
3,582,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,351 UART: [rt]cmd =0x4d454153, len=108
3,632,780 >>> mbox cmd response data (12 bytes)
3,632,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,064 UART: [rt]cmd =0x4d454153, len=108
3,683,657 >>> mbox cmd response data (12 bytes)
3,683,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,557 UART: [rt]cmd =0x4d454153, len=108
3,734,602 >>> mbox cmd response data (12 bytes)
3,734,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,692 UART: [rt]cmd =0x4d454153, len=108
3,785,923 >>> mbox cmd response data (12 bytes)
3,785,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,253 UART: [rt]cmd =0x4d454153, len=108
3,835,810 >>> mbox cmd response data (12 bytes)
3,835,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,806 UART: [rt]cmd =0x4d454153, len=108
3,886,551 >>> mbox cmd response data (12 bytes)
3,886,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,491 UART: [rt]cmd =0x4d454153, len=108
3,937,240 >>> mbox cmd response data (12 bytes)
3,937,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,328 UART: [rt]cmd =0x4d454153, len=108
3,988,263 >>> mbox cmd response data (12 bytes)
3,988,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,349 UART: [rt]cmd =0x4d454153, len=108
4,038,846 >>> mbox cmd response data (12 bytes)
4,038,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,834 UART: [rt]cmd =0x4d454153, len=108
4,070,854 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,347 ready_for_fw is high
1,056,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,153 >>> mbox cmd response: success
2,683,799 UART:
2,683,815 UART: Running Caliptra FMC ...
2,684,223 UART:
2,684,366 UART: [state] CFI Enabled
2,694,605 UART: [fht] FMC Alias Private Key: 7
2,801,744 UART: [art] Extend RT PCRs Done
2,802,172 UART: [art] Lock RT PCRs Done
2,803,722 UART: [art] Populate DV Done
2,812,227 UART: [fht] FMC Alias Private Key: 7
2,813,229 UART: [art] Derive CDI
2,813,509 UART: [art] Store in in slot 0x4
2,898,842 UART: [art] Derive Key Pair
2,899,202 UART: [art] Store priv key in slot 0x5
2,912,814 UART: [art] Derive Key Pair - Done
2,927,691 UART: [art] Signing Cert with AUTHO
2,928,171 UART: RITY.KEYID = 7
2,943,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,928 UART: [art] PUB.X = 1A86B9AC470610219774B740984CADCAEB873F8F60D2918897342A5A115D817FD33C2BC5EDA50E3A4C236C037FBB53DC
2,950,697 UART: [art] PUB.Y = 5B0D4091AC8810209FF20B9D227A5B68D39FE8410B960C8D7F67E6F436648DF62F0D857390CF7997250224BBEC4A7AA4
2,957,631 UART: [art] SIG.R = 3374EEF1D838E79A7EF77A33526E1932FB2D4B193A8B2D727ABF32985EF19057CD0F90D1E4EA5937E3FF38BC946F1ABE
2,964,412 UART: [art] SIG.S = A610D2443CBF41A00252E4509927B149D4D52810FBEDE7B6E8463BC14ECF8BE20A06B4A9B7F57409B50D3BFFD9D1C591
2,987,698 UART: Caliptra RT
2,988,044 UART: [state] CFI Enabled
3,095,484 UART: [rt] RT listening for mailbox commands...
3,096,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,227 UART: [rt]cmd =0x4d454153, len=108
3,146,196 >>> mbox cmd response data (12 bytes)
3,146,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,324 UART: [rt]cmd =0x4d454153, len=108
3,197,347 >>> mbox cmd response data (12 bytes)
3,197,348 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,497 UART: [rt]cmd =0x4d454153, len=108
3,248,468 >>> mbox cmd response data (12 bytes)
3,248,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,372 UART: [rt]cmd =0x4d454153, len=108
3,299,161 >>> mbox cmd response data (12 bytes)
3,299,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,247 UART: [rt]cmd =0x4d454153, len=108
3,349,848 >>> mbox cmd response data (12 bytes)
3,349,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,978 UART: [rt]cmd =0x4d454153, len=108
3,400,821 >>> mbox cmd response data (12 bytes)
3,400,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,137 UART: [rt]cmd =0x4d454153, len=108
3,451,010 >>> mbox cmd response data (12 bytes)
3,451,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,002 UART: [rt]cmd =0x4d454153, len=108
3,501,381 >>> mbox cmd response data (12 bytes)
3,501,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,299 UART: [rt]cmd =0x4d454153, len=108
3,551,968 >>> mbox cmd response data (12 bytes)
3,551,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,854 UART: [rt]cmd =0x4d454153, len=108
3,602,523 >>> mbox cmd response data (12 bytes)
3,602,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,271 UART: [rt]cmd =0x4d454153, len=108
3,653,432 >>> mbox cmd response data (12 bytes)
3,653,433 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,352 UART: [rt]cmd =0x4d454153, len=108
3,703,917 >>> mbox cmd response data (12 bytes)
3,703,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,841 UART: [rt]cmd =0x4d454153, len=108
3,754,224 >>> mbox cmd response data (12 bytes)
3,754,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,292 UART: [rt]cmd =0x4d454153, len=108
3,804,607 >>> mbox cmd response data (12 bytes)
3,804,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,569 UART: [rt]cmd =0x4d454153, len=108
3,855,232 >>> mbox cmd response data (12 bytes)
3,855,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,138 UART: [rt]cmd =0x4d454153, len=108
3,887,194 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,223,471 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,367,666 UART:
2,368,076 UART: Running Caliptra ROM ...
2,369,156 UART:
2,369,302 UART: [state] CFI Enabled
2,370,270 UART: [state] LifecycleState = Unprovisioned
2,371,927 UART: [state] DebugLocked = No
2,373,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,376,326 UART: [kat] SHA2-256
2,376,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,379,991 UART: [kat] ++
2,380,434 UART: [kat] sha1
2,380,960 UART: [kat] SHA2-256
2,381,700 UART: [kat] SHA2-384
2,382,361 UART: [kat] SHA2-512-ACC
2,383,156 UART: [kat] ECC-384
2,765,030 UART: [kat] HMAC-384Kdf
2,778,233 UART: [kat] LMS
3,968,578 UART: [kat] --
3,971,145 UART: [cold-reset] ++
3,973,405 UART: [fht] Storing FHT @ 0x50003400
3,986,017 UART: [idev] ++
3,986,633 UART: [idev] CDI.KEYID = 6
3,987,536 UART: [idev] SUBJECT.KEYID = 7
3,988,808 UART: [idev] UDS.KEYID = 0
4,011,999 UART: [idev] Erasing UDS.KEYID = 0
7,321,289 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,265 UART: [idev] --
7,346,518 UART: [ldev] ++
7,347,089 UART: [ldev] CDI.KEYID = 6
7,348,051 UART: [ldev] SUBJECT.KEYID = 5
7,349,265 UART: [ldev] AUTHORITY.KEYID = 7
7,350,543 UART: [ldev] FE.KEYID = 1
7,377,432 UART: [ldev] Erasing FE.KEYID = 1
10,712,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,007,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,036,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,051,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,658 UART: [ldev] --
13,075,847 UART: [fwproc] Waiting for Commands...
13,079,132 UART: [fwproc] Received command 0x46574c44
13,081,360 UART: [fwproc] Received Image of size 114036 bytes
17,132,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,211,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,280,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,597,840 >>> mbox cmd response: success
17,602,183 UART: [afmc] ++
17,602,778 UART: [afmc] CDI.KEYID = 6
17,603,659 UART: [afmc] SUBJECT.KEYID = 7
17,604,926 UART: [afmc] AUTHORITY.KEYID = 5
20,964,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,264,250 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,266,513 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,909 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,295,786 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,310,233 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,096 UART: [afmc] --
23,334,632 UART: [cold-reset] --
23,337,193 UART: [state] Locking Datavault
23,341,644 UART: [state] Locking PCR0, PCR1 and PCR31
23,343,399 UART: [state] Locking ICCM
23,344,842 UART: [exit] Launching FMC @ 0x40000130
23,353,238 UART:
23,353,465 UART: Running Caliptra FMC ...
23,354,560 UART:
23,354,712 UART: [state] CFI Enabled
23,404,907 UART: [fht] FMC Alias Private Key: 7
25,742,564 UART: [art] Extend RT PCRs Done
25,743,785 UART: [art] Lock RT PCRs Done
25,745,269 UART: [art] Populate DV Done
25,750,572 UART: [fht] FMC Alias Private Key: 7
25,752,264 UART: [art] Derive CDI
25,753,071 UART: [art] Store in in slot 0x4
25,814,330 UART: [art] Derive Key Pair
25,815,365 UART: [art] Store priv key in slot 0x5
29,108,888 UART: [art] Derive Key Pair - Done
29,121,769 UART: [art] Signing Cert with AUTHO
29,123,067 UART: RITY.KEYID = 7
31,410,299 UART: [art] Erasing AUTHORITY.KEYID = 7
31,411,807 UART: [art] PUB.X = F5486E0E5819F35AD0CAB0F393444148ECA4B87802D01C67FF83BD39954BA682ADB494E4ECF3191F0A855E4209570AED
31,419,026 UART: [art] PUB.Y = 2F1A96EBF4961C439F181981DDB7C2158D2836DDBD54A421E8E06AE8174A4490E564D71DF9ED218D0AE8CC6A59205910
31,426,285 UART: [art] SIG.R = 774E02834112AFB83332933513B82F58A4E5805407264754BE094B19AECF0E6ADEBF700E51BC9B0521F4BDE058BBA9F3
31,433,640 UART: [art] SIG.S = E952D496E4AFD93E9D7081ADDE6761E9A562A80E065B69A239801AB84157B4933493198B0252C6FDF6AA243FA21DEB1F
32,738,418 UART: Caliptra RT
32,739,129 UART: [state] CFI Enabled
32,901,225 UART: [rt] RT listening for mailbox commands...
32,903,164 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,933,720 UART: [rt]cmd =0x44504543, len=92
32,940,388 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,223,586 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,873,574 >>> mbox cmd response: success
23,564,279 UART:
23,564,693 UART: Running Caliptra FMC ...
23,565,823 UART:
23,565,976 UART: [state] CFI Enabled
23,636,339 UART: [fht] FMC Alias Private Key: 7
25,974,328 UART: [art] Extend RT PCRs Done
25,975,553 UART: [art] Lock RT PCRs Done
25,977,184 UART: [art] Populate DV Done
25,982,757 UART: [fht] FMC Alias Private Key: 7
25,984,398 UART: [art] Derive CDI
25,985,207 UART: [art] Store in in slot 0x4
26,044,301 UART: [art] Derive Key Pair
26,045,343 UART: [art] Store priv key in slot 0x5
29,338,280 UART: [art] Derive Key Pair - Done
29,350,909 UART: [art] Signing Cert with AUTHO
29,352,229 UART: RITY.KEYID = 7
31,639,623 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,130 UART: [art] PUB.X = 97026A8FC5C02D8218B89C77CB5AA995F6E3AC83F31159F12EF00148CED146A1E669190D57B93F31BC82951C64402D1A
31,648,400 UART: [art] PUB.Y = C1EC789EB7861A4C755CC266B05D01157EC9AF80CF1C7D3F75399199BB3979666D4F4119BB88064EA003CC1AE37C24CA
31,655,634 UART: [art] SIG.R = EBE4C183ABAC50C30147C2060C9BFBAC5A70E099036514397E88ECB9034272520A91D36D33B9B145578720F89A7A96FE
31,662,990 UART: [art] SIG.S = 2803BFAADB2F88DF1918EF5763C340D96FD175422D60E7112D4E85064B3C0F6D74C8D3C1BA9AB5464A7A1B9388247FA0
32,968,083 UART: Caliptra RT
32,968,783 UART: [state] CFI Enabled
33,129,435 UART: [rt] RT listening for mailbox commands...
33,131,396 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,161,703 UART: [rt]cmd =0x44504543, len=92
33,168,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
2,221,409 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,365,390 UART:
2,365,781 UART: Running Caliptra ROM ...
2,366,891 UART:
2,367,053 UART: [state] CFI Enabled
2,367,975 UART: [state] LifecycleState = Unprovisioned
2,369,638 UART: [state] DebugLocked = No
2,370,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,374,051 UART: [kat] SHA2-256
2,374,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,378,098 UART: [kat] ++
2,378,566 UART: [kat] sha1
2,379,079 UART: [kat] SHA2-256
2,379,763 UART: [kat] SHA2-384
2,380,423 UART: [kat] SHA2-512-ACC
2,381,221 UART: [kat] ECC-384
3,111,115 UART: [kat] HMAC-384Kdf
3,122,315 UART: [kat] LMS
4,312,453 UART: [kat] --
4,316,577 UART: [cold-reset] ++
4,318,189 UART: [fht] Storing FHT @ 0x50003400
4,330,297 UART: [idev] ++
4,330,868 UART: [idev] CDI.KEYID = 6
4,331,776 UART: [idev] SUBJECT.KEYID = 7
4,333,045 UART: [idev] UDS.KEYID = 0
4,347,038 UART: [idev] Erasing UDS.KEYID = 0
7,620,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,616 UART: [idev] --
7,646,016 UART: [ldev] ++
7,646,584 UART: [ldev] CDI.KEYID = 6
7,647,547 UART: [ldev] SUBJECT.KEYID = 5
7,648,756 UART: [ldev] AUTHORITY.KEYID = 7
7,650,043 UART: [ldev] FE.KEYID = 1
7,660,101 UART: [ldev] Erasing FE.KEYID = 1
10,946,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,110 UART: [ldev] --
13,305,620 UART: [fwproc] Waiting for Commands...
13,307,987 UART: [fwproc] Received command 0x46574c44
13,310,175 UART: [fwproc] Received Image of size 114036 bytes
17,363,600 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,763 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,821,030 >>> mbox cmd response: success
17,824,460 UART: [afmc] ++
17,825,044 UART: [afmc] CDI.KEYID = 6
17,825,992 UART: [afmc] SUBJECT.KEYID = 7
17,827,262 UART: [afmc] AUTHORITY.KEYID = 5
21,141,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,861 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,252 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,073 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,499 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,502,482 UART: [afmc] --
23,505,926 UART: [cold-reset] --
23,511,300 UART: [state] Locking Datavault
23,515,410 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,154 UART: [state] Locking ICCM
23,519,110 UART: [exit] Launching FMC @ 0x40000130
23,527,547 UART:
23,527,779 UART: Running Caliptra FMC ...
23,528,814 UART:
23,528,960 UART: [state] CFI Enabled
23,537,225 UART: [fht] FMC Alias Private Key: 7
25,868,174 UART: [art] Extend RT PCRs Done
25,869,414 UART: [art] Lock RT PCRs Done
25,870,799 UART: [art] Populate DV Done
25,876,156 UART: [fht] FMC Alias Private Key: 7
25,877,855 UART: [art] Derive CDI
25,878,672 UART: [art] Store in in slot 0x4
25,921,540 UART: [art] Derive Key Pair
25,922,578 UART: [art] Store priv key in slot 0x5
29,165,295 UART: [art] Derive Key Pair - Done
29,178,306 UART: [art] Signing Cert with AUTHO
29,179,642 UART: RITY.KEYID = 7
31,458,981 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,487 UART: [art] PUB.X = F16ED34362771F5AB18B55A84580A9D2A1F0D43091AC3C69FEE22925E63D16AE67D85D50BB666AFC8643D93A8E8B5F3F
31,467,756 UART: [art] PUB.Y = 3CB3F0EA65FC279C8030CF801AB53FBDBD8DEB3E78C1DA8F154C58267510D800636BF1484D82DD142C66520D84DD385D
31,474,996 UART: [art] SIG.R = 9A422E036759837D3AB3BAB87C1B2E0C0D00540D35A9DA37C96E4CE24180D1CF886C8A3F997B98F5A91B79DDB30DE6EF
31,482,348 UART: [art] SIG.S = 7C11F0B521F3A386B73D6B991B7E0422503305CA75C3A0956EC872BD1C625F90DC18FF0482F164CDE75E701AFF3FAB70
32,787,596 UART: Caliptra RT
32,788,314 UART: [state] CFI Enabled
32,906,052 UART: [rt] RT listening for mailbox commands...
32,907,992 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,938,720 UART: [rt]cmd =0x44504543, len=92
32,945,272 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,223,087 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,066,203 >>> mbox cmd response: success
23,703,921 UART:
23,704,314 UART: Running Caliptra FMC ...
23,705,447 UART:
23,705,634 UART: [state] CFI Enabled
23,713,430 UART: [fht] FMC Alias Private Key: 7
26,043,942 UART: [art] Extend RT PCRs Done
26,045,170 UART: [art] Lock RT PCRs Done
26,047,043 UART: [art] Populate DV Done
26,052,632 UART: [fht] FMC Alias Private Key: 7
26,054,335 UART: [art] Derive CDI
26,055,155 UART: [art] Store in in slot 0x4
26,098,028 UART: [art] Derive Key Pair
26,099,042 UART: [art] Store priv key in slot 0x5
29,340,823 UART: [art] Derive Key Pair - Done
29,353,884 UART: [art] Signing Cert with AUTHO
29,355,198 UART: RITY.KEYID = 7
31,634,543 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,047 UART: [art] PUB.X = 7A46D5869BEC8FC82347F26AED0996ABB6E724F5FDC993E58FD4B2D610F6131E88A456DEC435584F82886935FF0AC68A
31,643,358 UART: [art] PUB.Y = 3CF6BD524E18F16F322B9265FFDBF7625B4B26ADB726B505AAD4950629BA2083E5909B25F3A4E708E9360B1888AFEFFC
31,650,552 UART: [art] SIG.R = ABFEFF592E41D0BC3A09D35789BB2329A420C052D6D1213A2BA6969BE0DE110437D8979902B0C7FFA67D4FF16C6068E7
31,657,927 UART: [art] SIG.S = 979F615E14A04745A3A5262681C850FB87712C69046EB2CD1233E851D029EE7B9A323826D026E3ED1968EA130DA1A92F
32,963,397 UART: Caliptra RT
32,964,114 UART: [state] CFI Enabled
33,082,169 UART: [rt] RT listening for mailbox commands...
33,084,129 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,114,580 UART: [rt]cmd =0x44504543, len=92
33,120,716 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
2,213,135 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,358,388 UART:
2,358,820 UART: Running Caliptra ROM ...
2,359,997 UART:
2,360,169 UART: [state] CFI Enabled
2,361,130 UART: [state] LifecycleState = Unprovisioned
2,362,791 UART: [state] DebugLocked = No
2,363,851 UART: [state] WD Timer not started. Device not locked for debugging
2,366,324 UART: [kat] SHA2-256
2,366,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,005 UART: [kat] ++
2,370,464 UART: [kat] sha1
2,370,981 UART: [kat] SHA2-256
2,371,721 UART: [kat] SHA2-384
2,372,390 UART: [kat] SHA2-512-ACC
2,373,236 UART: [kat] ECC-384
2,949,321 UART: [kat] HMAC-384Kdf
2,970,785 UART: [kat] LMS
3,500,258 UART: [kat] --
3,503,839 UART: [cold-reset] ++
3,506,369 UART: [fht] FHT @ 0x50003400
3,517,352 UART: [idev] ++
3,517,929 UART: [idev] CDI.KEYID = 6
3,518,836 UART: [idev] SUBJECT.KEYID = 7
3,520,050 UART: [idev] UDS.KEYID = 0
3,542,946 UART: [idev] Erasing UDS.KEYID = 0
6,025,089 UART: [idev] Sha1 KeyId Algorithm
6,047,954 UART: [idev] --
6,052,280 UART: [ldev] ++
6,052,863 UART: [ldev] CDI.KEYID = 6
6,053,775 UART: [ldev] SUBJECT.KEYID = 5
6,054,959 UART: [ldev] AUTHORITY.KEYID = 7
6,056,200 UART: [ldev] FE.KEYID = 1
6,089,334 UART: [ldev] Erasing FE.KEYID = 1
8,594,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,340 UART: [ldev] --
10,399,218 UART: [fwproc] Wait for Commands...
10,401,752 UART: [fwproc] Recv command 0x46574c44
10,403,848 UART: [fwproc] Recv'd Img size: 114360 bytes
13,807,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,268,308 >>> mbox cmd response: success
14,272,539 UART: [afmc] ++
14,273,134 UART: [afmc] CDI.KEYID = 6
14,274,049 UART: [afmc] SUBJECT.KEYID = 7
14,275,213 UART: [afmc] AUTHORITY.KEYID = 5
16,820,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,541,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,543,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,575,462 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,336 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,614,382 UART: [afmc] --
18,618,471 UART: [cold-reset] --
18,622,177 UART: [state] Locking Datavault
18,627,572 UART: [state] Locking PCR0, PCR1 and PCR31
18,629,292 UART: [state] Locking ICCM
18,631,049 UART: [exit] Launching FMC @ 0x40000130
18,639,475 UART:
18,639,728 UART: Running Caliptra FMC ...
18,640,782 UART:
18,640,935 UART: [state] CFI Enabled
18,702,007 UART: [fht] FMC Alias Private Key: 7
20,465,935 UART: [art] Extend RT PCRs Done
20,467,162 UART: [art] Lock RT PCRs Done
20,468,623 UART: [art] Populate DV Done
20,474,253 UART: [fht] FMC Alias Private Key: 7
20,475,792 UART: [art] Derive CDI
20,476,607 UART: [art] Store in in slot 0x4
20,534,516 UART: [art] Derive Key Pair
20,535,516 UART: [art] Store priv key in slot 0x5
22,999,450 UART: [art] Derive Key Pair - Done
23,012,396 UART: [art] Signing Cert with AUTHO
23,013,705 UART: RITY.KEYID = 7
24,726,076 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,587 UART: [art] PUB.X = C1B49E9883DAF397C174A0F82149F9B01DC1D4AC3C5D9D323E74B7387D29B66ABBD9E4E670E9777C511A3DA883DA63B9
24,734,861 UART: [art] PUB.Y = 418F1759A3F2B6540A040AE6DD159AA2DBE1AD6B9C5118A923E5F18FA1E49F98B2E021AD7853C71F99118201DE00D356
24,742,086 UART: [art] SIG.R = E45E1F2163C85A6536DC1E055EE738BEF95DC0BF18CF02C3FD7638F39A70F1B263ECBED03C10C017B909A6729598D7AF
24,749,521 UART: [art] SIG.S = D6D9BE39ACD6F5D6B2146DB22513A8AE897A80CBBC1B3DF001F6E51B8AF26AE1B9F9267769D97A7F1CDFC2DFB4617CF4
25,728,213 UART: Caliptra RT
25,728,925 UART: [state] CFI Enabled
25,893,634 UART: [rt] RT listening for mailbox commands...
25,895,574 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,926,025 UART: [rt]cmd =0x44504543, len=92
25,932,575 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,633 writing to cptra_bootfsm_go
2,218,853 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,364,057 UART:
2,364,472 UART: Running Caliptra ROM ...
2,365,554 UART:
2,365,719 UART: [state] CFI Enabled
2,366,684 UART: [state] LifecycleState = Unprovisioned
2,368,349 UART: [state] DebugLocked = No
2,369,463 UART: [state] WD Timer not started. Device not locked for debugging
2,371,940 UART: [kat] SHA2-256
2,372,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,375,628 UART: [kat] ++
2,376,083 UART: [kat] sha1
2,376,600 UART: [kat] SHA2-256
2,377,313 UART: [kat] SHA2-384
2,377,973 UART: [kat] SHA2-512-ACC
2,378,774 UART: [kat] ECC-384
2,948,373 UART: [kat] HMAC-384Kdf
2,973,075 UART: [kat] LMS
3,504,846 UART: [kat] --
3,509,517 UART: [cold-reset] ++
3,511,294 UART: [fht] FHT @ 0x50003400
3,522,926 UART: [idev] ++
3,523,711 UART: [idev] CDI.KEYID = 6
3,524,603 UART: [idev] SUBJECT.KEYID = 7
3,525,772 UART: [idev] UDS.KEYID = 0
3,545,008 UART: [idev] Erasing UDS.KEYID = 0
6,029,241 UART: [idev] Sha1 KeyId Algorithm
6,051,251 UART: [idev] --
6,055,308 UART: [ldev] ++
6,056,015 UART: [ldev] CDI.KEYID = 6
6,056,944 UART: [ldev] SUBJECT.KEYID = 5
6,058,058 UART: [ldev] AUTHORITY.KEYID = 7
6,059,310 UART: [ldev] FE.KEYID = 1
6,102,712 UART: [ldev] Erasing FE.KEYID = 1
8,613,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,502 UART: [ldev] --
10,419,214 UART: [fwproc] Wait for Commands...
10,421,313 UART: [fwproc] Recv command 0x46574c44
10,423,577 UART: [fwproc] Recv'd Img size: 114360 bytes
13,869,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,204 >>> mbox cmd response: success
14,606,718 UART: [afmc] ++
14,607,426 UART: [afmc] CDI.KEYID = 6
14,608,669 UART: [afmc] SUBJECT.KEYID = 7
14,610,123 UART: [afmc] AUTHORITY.KEYID = 5
17,153,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,879,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,881,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,896,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,911,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,926,357 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,950,578 UART: [afmc] --
18,953,799 UART: [cold-reset] --
18,957,505 UART: [state] Locking Datavault
18,963,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,813 UART: [state] Locking ICCM
18,967,419 UART: [exit] Launching FMC @ 0x40000130
18,976,101 UART:
18,976,337 UART: Running Caliptra FMC ...
18,977,366 UART:
18,977,515 UART: [state] CFI Enabled
19,035,175 UART: [fht] FMC Alias Private Key: 7
20,799,413 UART: [art] Extend RT PCRs Done
20,800,612 UART: [art] Lock RT PCRs Done
20,802,043 UART: [art] Populate DV Done
20,807,725 UART: [fht] FMC Alias Private Key: 7
20,809,467 UART: [art] Derive CDI
20,810,212 UART: [art] Store in in slot 0x4
20,867,690 UART: [art] Derive Key Pair
20,868,697 UART: [art] Store priv key in slot 0x5
23,331,420 UART: [art] Derive Key Pair - Done
23,344,059 UART: [art] Signing Cert with AUTHO
23,345,372 UART: RITY.KEYID = 7
25,057,505 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,996 UART: [art] PUB.X = 4CA7C4E657A600F32C053E44F73DCF1CF4F1D690488A7E35B98F843CC8CD196D58E6A1858A65C42303F682CFF25843F7
25,066,279 UART: [art] PUB.Y = 114D1929E40BD8F366EBC2FC33589FF83D9E551E7153A8F6A9B74A7D72EFC77DD2505D46D749CDC33243A1EC6ECD3FCB
25,073,553 UART: [art] SIG.R = 7CCB977ECFA20946E6E9F5940F7B509C5E71BBE6A9D949060B299E34E2E5D6E8CE203B745F93E3BEFEBE99558F2766F8
25,080,941 UART: [art] SIG.S = 648BD868BF4A564A2B3CA425082C4E7E39A876A3F3991BE27E96F93031B8A8F7F8F8DAF6E0B9E458403BA6EB539B5DFE
26,059,152 UART: Caliptra RT
26,059,872 UART: [state] CFI Enabled
26,227,107 UART: [rt] RT listening for mailbox commands...
26,229,042 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,259,377 UART: [rt]cmd =0x44504543, len=92
26,266,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
2,215,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,709,552 >>> mbox cmd response: success
19,005,844 UART:
19,006,253 UART: Running Caliptra FMC ...
19,007,377 UART:
19,007,540 UART: [state] CFI Enabled
19,074,540 UART: [fht] FMC Alias Private Key: 7
20,838,542 UART: [art] Extend RT PCRs Done
20,839,773 UART: [art] Lock RT PCRs Done
20,841,455 UART: [art] Populate DV Done
20,846,782 UART: [fht] FMC Alias Private Key: 7
20,848,272 UART: [art] Derive CDI
20,849,008 UART: [art] Store in in slot 0x4
20,907,201 UART: [art] Derive Key Pair
20,908,240 UART: [art] Store priv key in slot 0x5
23,370,903 UART: [art] Derive Key Pair - Done
23,384,004 UART: [art] Signing Cert with AUTHO
23,385,344 UART: RITY.KEYID = 7
25,097,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,711 UART: [art] PUB.X = 4002B472B3ABBE3D4D534A1ECEB317DA42531BA9B4239848D8D77C5965C427E36FC53F6AED86118813D478C2E13EB4A3
25,105,990 UART: [art] PUB.Y = CAADCB273B30BE6C83B32876F4CD24A5B7BE59543C4EE8BC6DDAA99ED63BCE6515752606BCB315BA857F437519643962
25,113,281 UART: [art] SIG.R = FCDC905C47C6217FEE1ED570DAB9E3DF41718FB9847D46C31F117578BE3FF97FE99296DA7020A28CFDDA96AB0B235A91
25,120,660 UART: [art] SIG.S = FB56590FFDF62744F68774409400885BCCC881949F08737D0EA086D73C98C5A497553C17C74C52E700CF0F3D75DB2C72
26,099,543 UART: Caliptra RT
26,100,264 UART: [state] CFI Enabled
26,266,460 UART: [rt] RT listening for mailbox commands...
26,268,423 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,298,978 UART: [rt]cmd =0x44504543, len=92
26,305,494 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,222,076 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,366,743 UART:
2,367,133 UART: Running Caliptra ROM ...
2,368,297 UART:
2,368,519 UART: [state] CFI Enabled
2,369,485 UART: [state] LifecycleState = Unprovisioned
2,371,136 UART: [state] DebugLocked = No
2,372,248 UART: [state] WD Timer not started. Device not locked for debugging
2,374,718 UART: [kat] SHA2-256
2,375,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,397 UART: [kat] ++
2,378,847 UART: [kat] sha1
2,379,357 UART: [kat] SHA2-256
2,380,101 UART: [kat] SHA2-384
2,380,767 UART: [kat] SHA2-512-ACC
2,381,646 UART: [kat] ECC-384
3,290,454 UART: [kat] HMAC-384Kdf
3,303,934 UART: [kat] LMS
3,835,776 UART: [kat] --
3,838,964 UART: [cold-reset] ++
3,841,198 UART: [fht] FHT @ 0x50003400
3,852,069 UART: [idev] ++
3,852,744 UART: [idev] CDI.KEYID = 6
3,853,717 UART: [idev] SUBJECT.KEYID = 7
3,854,928 UART: [idev] UDS.KEYID = 0
3,872,578 UART: [idev] Erasing UDS.KEYID = 0
6,337,000 UART: [idev] Sha1 KeyId Algorithm
6,359,050 UART: [idev] --
6,362,768 UART: [ldev] ++
6,363,500 UART: [ldev] CDI.KEYID = 6
6,364,404 UART: [ldev] SUBJECT.KEYID = 5
6,365,563 UART: [ldev] AUTHORITY.KEYID = 7
6,366,956 UART: [ldev] FE.KEYID = 1
6,377,827 UART: [ldev] Erasing FE.KEYID = 1
8,856,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,834 UART: [ldev] --
10,648,638 UART: [fwproc] Wait for Commands...
10,650,247 UART: [fwproc] Recv command 0x46574c44
10,652,512 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,962 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,837,259 >>> mbox cmd response: success
14,841,799 UART: [afmc] ++
14,842,498 UART: [afmc] CDI.KEYID = 6
14,843,728 UART: [afmc] SUBJECT.KEYID = 7
14,845,206 UART: [afmc] AUTHORITY.KEYID = 5
17,343,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,184 UART: [afmc] --
19,143,263 UART: [cold-reset] --
19,146,203 UART: [state] Locking Datavault
19,152,419 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,600 UART: [state] Locking ICCM
19,156,567 UART: [exit] Launching FMC @ 0x40000130
19,165,279 UART:
19,165,512 UART: Running Caliptra FMC ...
19,166,817 UART:
19,166,986 UART: [state] CFI Enabled
19,174,768 UART: [fht] FMC Alias Private Key: 7
20,932,664 UART: [art] Extend RT PCRs Done
20,933,888 UART: [art] Lock RT PCRs Done
20,935,319 UART: [art] Populate DV Done
20,940,681 UART: [fht] FMC Alias Private Key: 7
20,942,379 UART: [art] Derive CDI
20,943,111 UART: [art] Store in in slot 0x4
20,986,298 UART: [art] Derive Key Pair
20,987,296 UART: [art] Store priv key in slot 0x5
23,413,962 UART: [art] Derive Key Pair - Done
23,426,684 UART: [art] Signing Cert with AUTHO
23,427,990 UART: RITY.KEYID = 7
25,133,866 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,377 UART: [art] PUB.X = 098970FDFB2432CB4D8FC4AE46B1040F3ECB3BEE6932202D8B85F9CD93CB3194A64FB1E6BFF6440E5DBEADF2226A4627
25,142,627 UART: [art] PUB.Y = 469B27B1CE7551112157532E9283F8A637D7C56F2EBE139724FE4C4B76080A6EFC30B1ABBED7BBBF6AC293C9539E2706
25,149,907 UART: [art] SIG.R = D14EC5E38C0AB2F855004DA34189702F20C16F8F5FD4023925BFD1B1D278E6A779AE5322CE27616D2DE62003F72AEBE9
25,157,294 UART: [art] SIG.S = E2CFF165A75FBF3C82B9BD392EF126A305B2BD4734733EFFB96FF5DEF9B67AB187DE1285A4AAAC0EB7F86A3F3CA610B2
26,136,222 UART: Caliptra RT
26,136,930 UART: [state] CFI Enabled
26,254,859 UART: [rt] RT listening for mailbox commands...
26,256,779 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,287,225 UART: [rt]cmd =0x44504543, len=92
26,293,821 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,223,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,952,736 >>> mbox cmd response: success
19,203,721 UART:
19,204,122 UART: Running Caliptra FMC ...
19,205,254 UART:
19,205,411 UART: [state] CFI Enabled
19,213,407 UART: [fht] FMC Alias Private Key: 7
20,970,773 UART: [art] Extend RT PCRs Done
20,972,019 UART: [art] Lock RT PCRs Done
20,973,743 UART: [art] Populate DV Done
20,979,031 UART: [fht] FMC Alias Private Key: 7
20,980,594 UART: [art] Derive CDI
20,981,366 UART: [art] Store in in slot 0x4
21,024,239 UART: [art] Derive Key Pair
21,025,244 UART: [art] Store priv key in slot 0x5
23,451,858 UART: [art] Derive Key Pair - Done
23,465,058 UART: [art] Signing Cert with AUTHO
23,466,387 UART: RITY.KEYID = 7
25,171,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,228 UART: [art] PUB.X = 95FF51FE4CF6835B17858A6AC23CF6C501B92B67963ED383BFE7893C75CCACE8F45D191A42CB77C9C4BD224BBA2A9ABD
25,180,492 UART: [art] PUB.Y = 2E3193761FE550540C9EA33D2A97E7C016780D3F472675F9E1732E831F650B936F159BC5D96DA60DE5F9C2798697C5F3
25,187,767 UART: [art] SIG.R = 610124EAA6F665F3A5FEAD61D138764FC8B3B0BFDDAD336D85DCA09D0E5D1E4E078E3EE133D41F16207B43AACFC46EF9
25,195,171 UART: [art] SIG.S = 588FBC6E00DCE7116AEA46024CEF9AB3938E0B5F599AD2661A4080143EA03882BAFE6309EA2EAE4A0947721865A5CB53
26,173,926 UART: Caliptra RT
26,174,770 UART: [state] CFI Enabled
26,291,892 UART: [rt] RT listening for mailbox commands...
26,293,824 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,324,499 UART: [rt]cmd =0x44504543, len=92
26,331,170 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,291 UART: [kat] SHA2-256
882,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,337 UART: [kat] ++
886,489 UART: [kat] sha1
890,669 UART: [kat] SHA2-256
892,607 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
902,806 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,183 UART: [cold-reset] ++
1,476,525 UART: [fht] Storing FHT @ 0x50003400
1,479,154 UART: [idev] ++
1,479,322 UART: [idev] CDI.KEYID = 6
1,479,682 UART: [idev] SUBJECT.KEYID = 7
1,480,106 UART: [idev] UDS.KEYID = 0
1,487,928 UART: [idev] Erasing UDS.KEYID = 0
1,504,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,562 UART: [idev] --
1,513,515 UART: [ldev] ++
1,513,683 UART: [ldev] CDI.KEYID = 6
1,514,046 UART: [ldev] SUBJECT.KEYID = 5
1,514,472 UART: [ldev] AUTHORITY.KEYID = 7
1,514,935 UART: [ldev] FE.KEYID = 1
1,520,137 UART: [ldev] Erasing FE.KEYID = 1
1,545,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,092 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,178 UART: [fwproc] Received command 0x46574c44
1,586,969 UART: [fwproc] Received Image of size 114360 bytes
2,884,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,825 >>> mbox cmd response: success
3,079,069 UART: [afmc] ++
3,079,237 UART: [afmc] CDI.KEYID = 6
3,079,599 UART: [afmc] SUBJECT.KEYID = 7
3,080,024 UART: [afmc] AUTHORITY.KEYID = 5
3,115,607 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,296 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,986 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,871 UART: [afmc] --
3,158,801 UART: [cold-reset] --
3,159,471 UART: [state] Locking Datavault
3,160,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,180 UART: [state] Locking ICCM
3,161,756 UART: [exit] Launching FMC @ 0x40000130
3,167,085 UART:
3,167,101 UART: Running Caliptra FMC ...
3,167,509 UART:
3,167,563 UART: [state] CFI Enabled
3,178,166 UART: [fht] FMC Alias Private Key: 7
3,285,781 UART: [art] Extend RT PCRs Done
3,286,209 UART: [art] Lock RT PCRs Done
3,288,027 UART: [art] Populate DV Done
3,296,174 UART: [fht] FMC Alias Private Key: 7
3,297,116 UART: [art] Derive CDI
3,297,396 UART: [art] Store in in slot 0x4
3,383,275 UART: [art] Derive Key Pair
3,383,635 UART: [art] Store priv key in slot 0x5
3,396,809 UART: [art] Derive Key Pair - Done
3,411,577 UART: [art] Signing Cert with AUTHO
3,412,057 UART: RITY.KEYID = 7
3,427,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,028 UART: [art] PUB.X = E42F16EFFBE6440481570BC1F0527950FC0B2F60E894A9CF8A4FD9B96C04A241C7869DAF3635DBF0E8BF91131F2BA272
3,434,798 UART: [art] PUB.Y = FA5D52120507874B0C07E70340E6DE51727E434D58C95A5985841B5DB37F52021ED3B8C3ECCC19A7746EAA394FE0A329
3,441,732 UART: [art] SIG.R = 5B4DD56A16EC5D06E34D743610849CADA3EFDEE2D5ABEEFE28AFA20860C31F636CB81DEE3294202C0B458ABC5192747A
3,448,513 UART: [art] SIG.S = 7A502C26D94C52F275F509A0CB3A878B4B75985EF9681F7553074649A56DD22666333B6093F73AA3974D57D47B7A0028
3,472,474 UART: Caliptra RT
3,472,728 UART: [state] CFI Enabled
3,581,121 UART: [rt] RT listening for mailbox commands...
3,581,791 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,000 UART: [rt]cmd =0x44504543, len=92
3,618,926 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,283 >>> mbox cmd response: success
2,986,883 UART:
2,986,899 UART: Running Caliptra FMC ...
2,987,307 UART:
2,987,361 UART: [state] CFI Enabled
2,998,178 UART: [fht] FMC Alias Private Key: 7
3,105,879 UART: [art] Extend RT PCRs Done
3,106,307 UART: [art] Lock RT PCRs Done
3,107,741 UART: [art] Populate DV Done
3,116,052 UART: [fht] FMC Alias Private Key: 7
3,117,172 UART: [art] Derive CDI
3,117,452 UART: [art] Store in in slot 0x4
3,202,713 UART: [art] Derive Key Pair
3,203,073 UART: [art] Store priv key in slot 0x5
3,216,021 UART: [art] Derive Key Pair - Done
3,230,698 UART: [art] Signing Cert with AUTHO
3,231,178 UART: RITY.KEYID = 7
3,246,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,213 UART: [art] PUB.X = 9059CD6CCCFC6BB1C495480CD51238099F49D3F0CACDA890E74ADD91322D9CA79138C980F781B502E8B5FF78507966A1
3,253,982 UART: [art] PUB.Y = D386E502133E7CBDA91EC513F0894595B0258C85362198C1A202EA5A539DED514F23FC9F338C9A37CC47B0CA01245ECC
3,260,929 UART: [art] SIG.R = CFB6AED3CDBBE1D89AF3197B7771C37818A3B8ADAA90A2E004593B8625CA53985642531B14C3C02294B1E0206D5795F3
3,267,702 UART: [art] SIG.S = 4E9122CBF91213B2AA8B369F81C0A3DE4E02E0AA03ED65D7401789AA954791A63E69DCC4A92D4115C4385479366CAC48
3,290,989 UART: Caliptra RT
3,291,243 UART: [state] CFI Enabled
3,399,697 UART: [rt] RT listening for mailbox commands...
3,400,367 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,484 UART: [rt]cmd =0x44504543, len=92
3,437,818 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,592 UART: [kat] SHA2-256
892,530 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
902,991 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,888 UART: [cold-reset] ++
1,477,348 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,551 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,243 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,522,208 UART: [ldev] Erasing FE.KEYID = 1
1,548,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,987 UART: [ldev] --
1,587,494 UART: [fwproc] Waiting for Commands...
1,588,341 UART: [fwproc] Received command 0x46574c44
1,589,132 UART: [fwproc] Received Image of size 114360 bytes
2,886,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,106 >>> mbox cmd response: success
3,080,354 UART: [afmc] ++
3,080,522 UART: [afmc] CDI.KEYID = 6
3,080,884 UART: [afmc] SUBJECT.KEYID = 7
3,081,309 UART: [afmc] AUTHORITY.KEYID = 5
3,116,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,518 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,911 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,601 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,418 UART: [afmc] --
3,159,456 UART: [cold-reset] --
3,160,304 UART: [state] Locking Datavault
3,161,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,009 UART: [state] Locking ICCM
3,162,673 UART: [exit] Launching FMC @ 0x40000130
3,168,002 UART:
3,168,018 UART: Running Caliptra FMC ...
3,168,426 UART:
3,168,569 UART: [state] CFI Enabled
3,179,206 UART: [fht] FMC Alias Private Key: 7
3,287,477 UART: [art] Extend RT PCRs Done
3,287,905 UART: [art] Lock RT PCRs Done
3,289,319 UART: [art] Populate DV Done
3,297,390 UART: [fht] FMC Alias Private Key: 7
3,298,560 UART: [art] Derive CDI
3,298,840 UART: [art] Store in in slot 0x4
3,384,359 UART: [art] Derive Key Pair
3,384,719 UART: [art] Store priv key in slot 0x5
3,398,613 UART: [art] Derive Key Pair - Done
3,413,239 UART: [art] Signing Cert with AUTHO
3,413,719 UART: RITY.KEYID = 7
3,428,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,728 UART: [art] PUB.X = E29814AA6A2D144F1706B25A01403CEC495C69F41D2C19096F78447D6834CBA96FC1F124C23BF9E3CBE0CD7EB5C35C25
3,436,499 UART: [art] PUB.Y = C4834312E59B70E0FA58DC45A3985086765E6DCF5ACA78BA0AF08CC69CF13DB5169591B54269CF959BFB8AF88772A34D
3,443,456 UART: [art] SIG.R = 818E052F55E4F4CAE19D93CC6E6E73F7F655645379C8859176BC02D8A3252EE7D8E3643B06DF831DB9655828D0157B5E
3,450,217 UART: [art] SIG.S = 6620A1A62D7362FF3451AAEE985E1B3D1F710D382122C4DE826021C425D2842989C1CBEDE9AF5E233DB30C8983400A82
3,473,969 UART: Caliptra RT
3,474,315 UART: [state] CFI Enabled
3,582,097 UART: [rt] RT listening for mailbox commands...
3,582,767 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,040 UART: [rt]cmd =0x44504543, len=92
3,620,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,284 >>> mbox cmd response: success
2,989,160 UART:
2,989,176 UART: Running Caliptra FMC ...
2,989,584 UART:
2,989,727 UART: [state] CFI Enabled
3,000,692 UART: [fht] FMC Alias Private Key: 7
3,109,045 UART: [art] Extend RT PCRs Done
3,109,473 UART: [art] Lock RT PCRs Done
3,110,705 UART: [art] Populate DV Done
3,118,906 UART: [fht] FMC Alias Private Key: 7
3,119,974 UART: [art] Derive CDI
3,120,254 UART: [art] Store in in slot 0x4
3,206,109 UART: [art] Derive Key Pair
3,206,469 UART: [art] Store priv key in slot 0x5
3,219,639 UART: [art] Derive Key Pair - Done
3,234,385 UART: [art] Signing Cert with AUTHO
3,234,865 UART: RITY.KEYID = 7
3,250,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,170 UART: [art] PUB.X = 5223B715961A48B707E863596BCA4D0BFE629D719A8CE6F2146EB0E22FCE99B6D69BF1825ED9F3E4C915F479E97D1346
3,257,940 UART: [art] PUB.Y = 4AE236149EF4B3101D56647999E44B7281D2A69883F174830E921F435964BDDAB202646BCBE05F5FF73CEF5AFA2585F6
3,264,886 UART: [art] SIG.R = 49C6C83F71B5FA7841BE2BFA9D7FF54613B7AE5E978AD42420544414B26EABBAF8F096B22F2B0F6FE46B4E84AF18A855
3,271,669 UART: [art] SIG.S = ADA00121BF77FCAA76C3BFC66D95FF545F5D83312082DD5FFBA554E6FCFFDB4447A05FBF642EF59B2AB15BF1495D0373
3,295,856 UART: Caliptra RT
3,296,202 UART: [state] CFI Enabled
3,405,200 UART: [rt] RT listening for mailbox commands...
3,405,870 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,025 UART: [rt]cmd =0x44504543, len=92
3,443,183 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
893,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,627 UART: [kat] ++
897,779 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,784 UART: [kat] SHA2-512-ACC
908,685 UART: [kat] ECC-384
918,678 UART: [kat] HMAC-384Kdf
923,144 UART: [kat] LMS
1,171,472 UART: [kat] --
1,172,269 UART: [cold-reset] ++
1,172,837 UART: [fht] FHT @ 0x50003400
1,175,552 UART: [idev] ++
1,175,720 UART: [idev] CDI.KEYID = 6
1,176,080 UART: [idev] SUBJECT.KEYID = 7
1,176,504 UART: [idev] UDS.KEYID = 0
1,184,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,913 UART: [idev] Sha1 KeyId Algorithm
1,209,449 UART: [idev] --
1,210,499 UART: [ldev] ++
1,210,667 UART: [ldev] CDI.KEYID = 6
1,211,030 UART: [ldev] SUBJECT.KEYID = 5
1,211,456 UART: [ldev] AUTHORITY.KEYID = 7
1,211,919 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,510 UART: [fwproc] Wait for Commands...
1,283,234 UART: [fwproc] Recv command 0x46574c44
1,283,962 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,082 >>> mbox cmd response: success
2,775,154 UART: [afmc] ++
2,775,322 UART: [afmc] CDI.KEYID = 6
2,775,684 UART: [afmc] SUBJECT.KEYID = 7
2,776,109 UART: [afmc] AUTHORITY.KEYID = 5
2,811,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,515 UART: [afmc] --
2,855,641 UART: [cold-reset] --
2,856,473 UART: [state] Locking Datavault
2,857,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,280 UART: [state] Locking ICCM
2,858,910 UART: [exit] Launching FMC @ 0x40000130
2,864,239 UART:
2,864,255 UART: Running Caliptra FMC ...
2,864,663 UART:
2,864,717 UART: [state] CFI Enabled
2,875,112 UART: [fht] FMC Alias Private Key: 7
2,983,101 UART: [art] Extend RT PCRs Done
2,983,529 UART: [art] Lock RT PCRs Done
2,985,269 UART: [art] Populate DV Done
2,993,596 UART: [fht] FMC Alias Private Key: 7
2,994,630 UART: [art] Derive CDI
2,994,910 UART: [art] Store in in slot 0x4
3,080,395 UART: [art] Derive Key Pair
3,080,755 UART: [art] Store priv key in slot 0x5
3,093,845 UART: [art] Derive Key Pair - Done
3,108,671 UART: [art] Signing Cert with AUTHO
3,109,151 UART: RITY.KEYID = 7
3,124,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,196 UART: [art] PUB.X = C2ADB87DB44A9C2840E539DCD0ECAD7F7BDB60C3259D441CFB9A8C0967120C28B9A00309DC466DD31705DE58A2613334
3,131,963 UART: [art] PUB.Y = 37112091B9992D01897527F07C5D1B516C6742C026AE2A91E14172688D5935F8CF645DAD84F476D710EFF56CFC3E758B
3,138,906 UART: [art] SIG.R = 20017D9DAB70FF005BEB3011DDBD14381F86F97B016CAD6940A6DDFEF46C4B8F19544E6B3F1A2518E54AFAC50B550E9F
3,145,660 UART: [art] SIG.S = D9BA7BEBCE8B35B02042EBD743F5828CBFF0DF89FFED2BB46442495B41DF4FD126F4B7471FA208391D12102FAF7E1016
3,169,498 UART: Caliptra RT
3,169,752 UART: [state] CFI Enabled
3,277,568 UART: [rt] RT listening for mailbox commands...
3,278,238 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,283 UART: [rt]cmd =0x44504543, len=92
3,315,369 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,717 >>> mbox cmd response: success
2,688,329 UART:
2,688,345 UART: Running Caliptra FMC ...
2,688,753 UART:
2,688,807 UART: [state] CFI Enabled
2,699,030 UART: [fht] FMC Alias Private Key: 7
2,806,569 UART: [art] Extend RT PCRs Done
2,806,997 UART: [art] Lock RT PCRs Done
2,808,229 UART: [art] Populate DV Done
2,816,418 UART: [fht] FMC Alias Private Key: 7
2,817,434 UART: [art] Derive CDI
2,817,714 UART: [art] Store in in slot 0x4
2,903,283 UART: [art] Derive Key Pair
2,903,643 UART: [art] Store priv key in slot 0x5
2,916,881 UART: [art] Derive Key Pair - Done
2,931,448 UART: [art] Signing Cert with AUTHO
2,931,928 UART: RITY.KEYID = 7
2,947,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,969 UART: [art] PUB.X = AB2856B000B4BECB2A280921AC9F42697CE233684ED2560FA1D5DA0C6297A42FD1D01DF07A017F28B02E64BAA536B32C
2,954,717 UART: [art] PUB.Y = A55726BF48013683D52968049439A3014476B530AAA14607C7421EF463CB2A0DA5EAA943FAFC43F256B0A28738F840BB
2,961,650 UART: [art] SIG.R = 060C49699C018FD9E04FB25A86290133EA6C8C1EF72FF01CAEFF3C3C9419A423C8672A0FCD3C6A5A78181E83CC1577A4
2,968,415 UART: [art] SIG.S = 212C2E048762CAF58ACD38924F310CC08617E2F1FFF40CDD4DC3581456208797671CDDA148B065EB2DE0B4E1626B7AB9
2,992,889 UART: Caliptra RT
2,993,143 UART: [state] CFI Enabled
3,102,413 UART: [rt] RT listening for mailbox commands...
3,103,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,234 UART: [rt]cmd =0x44504543, len=92
3,140,238 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,759 UART: [kat] SHA2-512-ACC
908,660 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,093 UART: [idev] ++
1,175,261 UART: [idev] CDI.KEYID = 6
1,175,621 UART: [idev] SUBJECT.KEYID = 7
1,176,045 UART: [idev] UDS.KEYID = 0
1,184,377 UART: [idev] Erasing UDS.KEYID = 0
1,201,702 UART: [idev] Sha1 KeyId Algorithm
1,210,308 UART: [idev] --
1,211,274 UART: [ldev] ++
1,211,442 UART: [ldev] CDI.KEYID = 6
1,211,805 UART: [ldev] SUBJECT.KEYID = 5
1,212,231 UART: [ldev] AUTHORITY.KEYID = 7
1,212,694 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,542 UART: [ldev] --
1,284,051 UART: [fwproc] Wait for Commands...
1,284,811 UART: [fwproc] Recv command 0x46574c44
1,285,539 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,289 >>> mbox cmd response: success
2,777,409 UART: [afmc] ++
2,777,577 UART: [afmc] CDI.KEYID = 6
2,777,939 UART: [afmc] SUBJECT.KEYID = 7
2,778,364 UART: [afmc] AUTHORITY.KEYID = 5
2,813,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,913 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,632 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,330 UART: [afmc] --
2,857,306 UART: [cold-reset] --
2,858,082 UART: [state] Locking Datavault
2,859,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,769 UART: [state] Locking ICCM
2,860,261 UART: [exit] Launching FMC @ 0x40000130
2,865,590 UART:
2,865,606 UART: Running Caliptra FMC ...
2,866,014 UART:
2,866,157 UART: [state] CFI Enabled
2,876,924 UART: [fht] FMC Alias Private Key: 7
2,984,735 UART: [art] Extend RT PCRs Done
2,985,163 UART: [art] Lock RT PCRs Done
2,986,923 UART: [art] Populate DV Done
2,995,192 UART: [fht] FMC Alias Private Key: 7
2,996,126 UART: [art] Derive CDI
2,996,406 UART: [art] Store in in slot 0x4
3,082,035 UART: [art] Derive Key Pair
3,082,395 UART: [art] Store priv key in slot 0x5
3,096,339 UART: [art] Derive Key Pair - Done
3,110,944 UART: [art] Signing Cert with AUTHO
3,111,424 UART: RITY.KEYID = 7
3,126,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,485 UART: [art] PUB.X = 1E586F9D8B56CEFB5FAD17B09EA6453A2DE7969DA236A6E32D080D141845E31D346A0E8CAF6E0FAB1F25382D434F091C
3,134,254 UART: [art] PUB.Y = 762912F1A44C488333064507110E1FC360CB2806F5B294390FD22F9DFC795EA923ADC512A8AB3BB2FCDCB904DB47B60A
3,141,191 UART: [art] SIG.R = B6FED529ADCD1A6A72EFCAF688D34FBDC6ECF060646BEA60C4D802B53F8F668788AE4F9424C9EC8D745B616429DBDFD6
3,147,984 UART: [art] SIG.S = 0DB35C33D4FA4DFD9CD7EBC84EE113509B29F992A5CA9497A8B0FE9E12BAAFF7CBCD5562F75B3E0AD9EA007C99377FD7
3,171,947 UART: Caliptra RT
3,172,293 UART: [state] CFI Enabled
3,281,111 UART: [rt] RT listening for mailbox commands...
3,281,781 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,968 UART: [rt]cmd =0x44504543, len=92
3,319,150 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,978 >>> mbox cmd response: success
2,686,460 UART:
2,686,476 UART: Running Caliptra FMC ...
2,686,884 UART:
2,687,027 UART: [state] CFI Enabled
2,697,720 UART: [fht] FMC Alias Private Key: 7
2,806,149 UART: [art] Extend RT PCRs Done
2,806,577 UART: [art] Lock RT PCRs Done
2,808,177 UART: [art] Populate DV Done
2,816,608 UART: [fht] FMC Alias Private Key: 7
2,817,658 UART: [art] Derive CDI
2,817,938 UART: [art] Store in in slot 0x4
2,903,303 UART: [art] Derive Key Pair
2,903,663 UART: [art] Store priv key in slot 0x5
2,917,183 UART: [art] Derive Key Pair - Done
2,931,819 UART: [art] Signing Cert with AUTHO
2,932,299 UART: RITY.KEYID = 7
2,947,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,040 UART: [art] PUB.X = 61AA688EF79BF8AA9461D96B0CA8E204446DEFD95C640FE603855EE7C67511527D8D98318762F3749010045776335938
2,954,785 UART: [art] PUB.Y = E6C40DA81DE207709813C6EF7894DCBB96EA53B7C0397A7CBFA481398DB26EAD23EABD7AF2894B25003B0AFBB5EA6D48
2,961,726 UART: [art] SIG.R = 27FC9DF55E6EFCB3A69420D9832AE3B8DBBB7EAE6D12471A5FF93878263D0E7D11ADCBA0FDA1F2A473F0B7250E034E39
2,968,509 UART: [art] SIG.S = F76D5DF0C8600F701EBE9C9C12B2F47F2729C83371B648ABC4F246CDD2F2C0D96788CE6DB540170977BA11B6670D572E
2,991,923 UART: Caliptra RT
2,992,269 UART: [state] CFI Enabled
3,099,805 UART: [rt] RT listening for mailbox commands...
3,100,475 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,330 UART: [rt]cmd =0x44504543, len=92
3,137,402 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,182,111 UART: [idev] Erasing UDS.KEYID = 0
1,199,795 UART: [idev] Sha1 KeyId Algorithm
1,208,845 UART: [idev] --
1,209,836 UART: [ldev] ++
1,210,004 UART: [ldev] CDI.KEYID = 6
1,210,368 UART: [ldev] SUBJECT.KEYID = 5
1,210,795 UART: [ldev] AUTHORITY.KEYID = 7
1,211,258 UART: [ldev] FE.KEYID = 1
1,216,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,700 UART: [ldev] --
1,281,062 UART: [fwproc] Wait for Commands...
1,281,729 UART: [fwproc] Recv command 0x46574c44
1,282,462 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,048 >>> mbox cmd response: success
2,772,065 UART: [afmc] ++
2,772,233 UART: [afmc] CDI.KEYID = 6
2,772,596 UART: [afmc] SUBJECT.KEYID = 7
2,773,022 UART: [afmc] AUTHORITY.KEYID = 5
2,808,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,836 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,555 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,402 UART: [afmc] --
2,851,412 UART: [cold-reset] --
2,852,142 UART: [state] Locking Datavault
2,853,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,081 UART: [state] Locking ICCM
2,854,593 UART: [exit] Launching FMC @ 0x40000130
2,859,922 UART:
2,859,938 UART: Running Caliptra FMC ...
2,860,346 UART:
2,860,400 UART: [state] CFI Enabled
2,870,823 UART: [fht] FMC Alias Private Key: 7
2,978,116 UART: [art] Extend RT PCRs Done
2,978,544 UART: [art] Lock RT PCRs Done
2,979,838 UART: [art] Populate DV Done
2,988,215 UART: [fht] FMC Alias Private Key: 7
2,989,385 UART: [art] Derive CDI
2,989,665 UART: [art] Store in in slot 0x4
3,075,358 UART: [art] Derive Key Pair
3,075,718 UART: [art] Store priv key in slot 0x5
3,089,156 UART: [art] Derive Key Pair - Done
3,103,896 UART: [art] Signing Cert with AUTHO
3,104,376 UART: RITY.KEYID = 7
3,119,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,179 UART: [art] PUB.X = 00B250D67C435B95756822A4BD49C2B84DE565A8D066B25661EE4DB83B0259D3AF184A4C27B1CF08356C5CCA9050B3AA
3,126,927 UART: [art] PUB.Y = 98E213EA8ABC75D4B4F2C7CC54C3733166CA776F0D849B3A2460F7A762D21DE7BD922EFF3FA35A58EC4F5484763CEC0C
3,133,887 UART: [art] SIG.R = 0617C973212E6ABA268E793A2C329E0486B18DEA16982744CBC2CF4B844E87BDF81AF8352B786780ECC7BDD16F6122B2
3,140,657 UART: [art] SIG.S = 086A189E386F6359E8E873078B557A01ADFDF21422520402BA210686B473AAAE51508DCF056ABCB99E0B5133F97BEF64
3,163,462 UART: Caliptra RT
3,163,716 UART: [state] CFI Enabled
3,271,438 UART: [rt] RT listening for mailbox commands...
3,272,108 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,189 UART: [rt]cmd =0x44504543, len=92
3,309,493 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,392 >>> mbox cmd response: success
2,682,962 UART:
2,682,978 UART: Running Caliptra FMC ...
2,683,386 UART:
2,683,440 UART: [state] CFI Enabled
2,693,975 UART: [fht] FMC Alias Private Key: 7
2,801,558 UART: [art] Extend RT PCRs Done
2,801,986 UART: [art] Lock RT PCRs Done
2,803,584 UART: [art] Populate DV Done
2,811,805 UART: [fht] FMC Alias Private Key: 7
2,812,733 UART: [art] Derive CDI
2,813,013 UART: [art] Store in in slot 0x4
2,898,882 UART: [art] Derive Key Pair
2,899,242 UART: [art] Store priv key in slot 0x5
2,911,998 UART: [art] Derive Key Pair - Done
2,926,927 UART: [art] Signing Cert with AUTHO
2,927,407 UART: RITY.KEYID = 7
2,942,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,678 UART: [art] PUB.X = CA245103489E5E6A59B0A2E14FC824607C3CB41644E852E6FE5842450D19D1E8761EED778FA42A038DD9E390E3F45DF3
2,950,443 UART: [art] PUB.Y = A2F9F0C25857969F037F72637BA553BA8ADDA1A8562EA96A4BB340B83962268343B5EB869D214C4B7C9E25E9B9A1B4A5
2,957,396 UART: [art] SIG.R = 7BDD97B5467B7D5EAEC883018496C7A55914E7AF831909A442E948CD69C25ECAC12FA391BEF5B16B627B4A7D7F2E2554
2,964,170 UART: [art] SIG.S = 541C0D703A22FB94558AB8134D269E4A76EA60C3BA2B7B2D19B770C6B6C9C5B1199ED6B7B8462AEFF039142832254F19
2,988,814 UART: Caliptra RT
2,989,068 UART: [state] CFI Enabled
3,096,608 UART: [rt] RT listening for mailbox commands...
3,097,278 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,067 UART: [rt]cmd =0x44504543, len=92
3,134,319 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,844 UART: [idev] Sha1 KeyId Algorithm
1,207,822 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,559 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,282,018 UART: [fwproc] Recv command 0x46574c44
1,282,751 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,065 >>> mbox cmd response: success
2,773,214 UART: [afmc] ++
2,773,382 UART: [afmc] CDI.KEYID = 6
2,773,745 UART: [afmc] SUBJECT.KEYID = 7
2,774,171 UART: [afmc] AUTHORITY.KEYID = 5
2,809,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,814 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,416 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,289 UART: [afmc] --
2,853,269 UART: [cold-reset] --
2,853,963 UART: [state] Locking Datavault
2,855,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,876 UART: [state] Locking ICCM
2,856,486 UART: [exit] Launching FMC @ 0x40000130
2,861,815 UART:
2,861,831 UART: Running Caliptra FMC ...
2,862,239 UART:
2,862,382 UART: [state] CFI Enabled
2,872,951 UART: [fht] FMC Alias Private Key: 7
2,981,100 UART: [art] Extend RT PCRs Done
2,981,528 UART: [art] Lock RT PCRs Done
2,983,026 UART: [art] Populate DV Done
2,991,361 UART: [fht] FMC Alias Private Key: 7
2,992,369 UART: [art] Derive CDI
2,992,649 UART: [art] Store in in slot 0x4
3,078,124 UART: [art] Derive Key Pair
3,078,484 UART: [art] Store priv key in slot 0x5
3,092,156 UART: [art] Derive Key Pair - Done
3,106,964 UART: [art] Signing Cert with AUTHO
3,107,444 UART: RITY.KEYID = 7
3,123,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,865 UART: [art] PUB.X = 23599F5C018FAAF2D832367DB8851D70BF1CADCADD8AB528CC92FD7572EC784A6270377508E2142E9535079A984E562A
3,130,630 UART: [art] PUB.Y = 254F81B891B6463693FFF27215DE5F5B1013F83405585B961B9BE23F93F5923E8D9856479444464F1167F701566E5213
3,137,556 UART: [art] SIG.R = 8C1175AA3F22D39CDB855790E9175A91EEF4EE4E44F36D89DDF5699E61364E13D9E0C5D55D19BC3F08B8EA755DFD6999
3,144,335 UART: [art] SIG.S = 63AC1ED19BBB70F50184F95499F9B228F63683B7BCD258488AA8A5F4528F2BF7B4F4AA522A06C6B8C350106E47370991
3,168,079 UART: Caliptra RT
3,168,425 UART: [state] CFI Enabled
3,277,019 UART: [rt] RT listening for mailbox commands...
3,277,689 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,600 UART: [rt]cmd =0x44504543, len=92
3,314,802 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,345 >>> mbox cmd response: success
2,686,157 UART:
2,686,173 UART: Running Caliptra FMC ...
2,686,581 UART:
2,686,724 UART: [state] CFI Enabled
2,697,739 UART: [fht] FMC Alias Private Key: 7
2,805,778 UART: [art] Extend RT PCRs Done
2,806,206 UART: [art] Lock RT PCRs Done
2,808,046 UART: [art] Populate DV Done
2,816,553 UART: [fht] FMC Alias Private Key: 7
2,817,609 UART: [art] Derive CDI
2,817,889 UART: [art] Store in in slot 0x4
2,902,948 UART: [art] Derive Key Pair
2,903,308 UART: [art] Store priv key in slot 0x5
2,916,554 UART: [art] Derive Key Pair - Done
2,931,108 UART: [art] Signing Cert with AUTHO
2,931,588 UART: RITY.KEYID = 7
2,946,854 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,619 UART: [art] PUB.X = 0B67AAA5D30384A922717C7155DA1E39D1779D2E4CA59429FE867EF2F1784FEE2395786D20B0CB598483ECBA764039B6
2,954,385 UART: [art] PUB.Y = 63F14872468BB0E3ED88C554975E05767A6EB045F1C42B374963F11AB75862D226944122E0F200A5777095804FB19940
2,961,294 UART: [art] SIG.R = 740FB746E309CFF799A602C24FF024535295E16694810265DE727F72D90BFF12084155C08A30A3F217DA3C0C57571643
2,968,033 UART: [art] SIG.S = B9F7A533B27A5C90B0B2E4158C127A78FCE4A017AF26A2E72F3FA831C6381E71B669CB518F5FB3CA8F582D7F9DC9C05A
2,991,834 UART: Caliptra RT
2,992,180 UART: [state] CFI Enabled
3,100,626 UART: [rt] RT listening for mailbox commands...
3,101,296 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,091 UART: [rt]cmd =0x44504543, len=92
3,138,259 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,386 UART:
192,745 UART: Running Caliptra ROM ...
193,844 UART:
193,999 UART: [state] CFI Enabled
265,621 UART: [state] LifecycleState = Unprovisioned
267,602 UART: [state] DebugLocked = No
269,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,481 UART: [kat] SHA2-256
443,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,684 UART: [kat] ++
454,126 UART: [kat] sha1
465,884 UART: [kat] SHA2-256
468,610 UART: [kat] SHA2-384
474,310 UART: [kat] SHA2-512-ACC
476,741 UART: [kat] ECC-384
2,769,196 UART: [kat] HMAC-384Kdf
2,800,679 UART: [kat] LMS
3,990,930 UART: [kat] --
3,995,794 UART: [cold-reset] ++
3,997,595 UART: [fht] Storing FHT @ 0x50003400
4,008,711 UART: [idev] ++
4,009,271 UART: [idev] CDI.KEYID = 6
4,010,266 UART: [idev] SUBJECT.KEYID = 7
4,011,500 UART: [idev] UDS.KEYID = 0
4,012,473 ready_for_fw is high
4,012,663 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,091 UART: [idev] Erasing UDS.KEYID = 0
7,349,432 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,068 UART: [idev] --
7,375,001 UART: [ldev] ++
7,375,565 UART: [ldev] CDI.KEYID = 6
7,376,517 UART: [ldev] SUBJECT.KEYID = 5
7,377,770 UART: [ldev] AUTHORITY.KEYID = 7
7,378,991 UART: [ldev] FE.KEYID = 1
7,421,977 UART: [ldev] Erasing FE.KEYID = 1
10,753,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,389 UART: [ldev] --
13,118,460 UART: [fwproc] Waiting for Commands...
13,121,196 UART: [fwproc] Received command 0x46574c44
13,123,372 UART: [fwproc] Received Image of size 114036 bytes
17,175,168 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,742 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,642,509 >>> mbox cmd response: success
17,643,049 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,646,919 UART: [afmc] ++
17,647,529 UART: [afmc] CDI.KEYID = 6
17,648,600 UART: [afmc] SUBJECT.KEYID = 7
17,649,707 UART: [afmc] AUTHORITY.KEYID = 5
21,006,600 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,035 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,485 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,315 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,706 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,210 UART: [afmc] --
23,381,930 UART: [cold-reset] --
23,385,997 UART: [state] Locking Datavault
23,390,590 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,341 UART: [state] Locking ICCM
23,393,889 UART: [exit] Launching FMC @ 0x40000130
23,402,277 UART:
23,402,508 UART: Running Caliptra FMC ...
23,403,623 UART:
23,403,981 UART: [state] CFI Enabled
23,469,416 UART: [fht] FMC Alias Private Key: 7
25,807,689 UART: [art] Extend RT PCRs Done
25,808,908 UART: [art] Lock RT PCRs Done
25,810,447 UART: [art] Populate DV Done
25,815,813 UART: [fht] FMC Alias Private Key: 7
25,817,393 UART: [art] Derive CDI
25,818,147 UART: [art] Store in in slot 0x4
25,878,664 UART: [art] Derive Key Pair
25,879,661 UART: [art] Store priv key in slot 0x5
29,172,733 UART: [art] Derive Key Pair - Done
29,185,728 UART: [art] Signing Cert with AUTHO
29,187,031 UART: RITY.KEYID = 7
31,475,051 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,561 UART: [art] PUB.X = 2B2839FA685FD6012EDF8945FBF552A43CA44D8CDEB8FF417D0E30E039DC8623DE4A2378895996859A032CBDCB6A76A6
31,484,004 UART: [art] PUB.Y = CC5A9D2CBFC816C06F7AB2535F868BB9272A13B386F3E60B4A64773F43D12911CCF2B7A8D4A3F16478D1D5AECED02AF9
31,491,080 UART: [art] SIG.R = BAC9E1CA53AC98724A9BABE15AC31FAAA7E80495264CE183FAC3755AB4131FA9CC67FA422231B3CF3D3BF5395E02756D
31,498,460 UART: [art] SIG.S = 0FC531EF73E0E67F5D315BA7DAFB7EBAAF0C46E24AFDC1EAFD3143ADB4508CB18C4595CC08A4AC4DC1BDB98E3E036373
32,803,251 UART: Caliptra RT
32,803,953 UART: [state] CFI Enabled
32,964,721 UART: [rt] RT listening for mailbox commands...
32,996,128 UART: [rt]cmd =0x50435245, len=56
32,997,985 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,284 writing to cptra_bootfsm_go
3,805,090 ready_for_fw is high
3,805,620 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,873,899 >>> mbox cmd response: success
17,874,573 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,571,517 UART:
23,571,896 UART: Running Caliptra FMC ...
23,573,074 UART:
23,573,238 UART: [state] CFI Enabled
23,640,216 UART: [fht] FMC Alias Private Key: 7
25,977,841 UART: [art] Extend RT PCRs Done
25,979,064 UART: [art] Lock RT PCRs Done
25,980,929 UART: [art] Populate DV Done
25,986,311 UART: [fht] FMC Alias Private Key: 7
25,988,013 UART: [art] Derive CDI
25,988,749 UART: [art] Store in in slot 0x4
26,049,769 UART: [art] Derive Key Pair
26,050,799 UART: [art] Store priv key in slot 0x5
29,343,433 UART: [art] Derive Key Pair - Done
29,356,481 UART: [art] Signing Cert with AUTHO
29,357,790 UART: RITY.KEYID = 7
31,645,424 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,932 UART: [art] PUB.X = 0CE658C97B5DABD64A71E9D77345A57529ED9F386B4B771144D99534FE902973D60EC02DA4CB46D96E7830568E8241FD
31,654,198 UART: [art] PUB.Y = 32419B1715E771779798281C96DC5191252A63BFD9704DDCD2E0C365AB8A325BEA640F6014F09511F57D8BD73BD21BF3
31,661,414 UART: [art] SIG.R = EEA162D230CC8AB74078D1E615F514E4229906A17D6530458C88D1694FAE1838E197711B198BC7328C3EF4217E7EF10D
31,668,744 UART: [art] SIG.S = 769EE3BB622D629FD7651B3D396B21524D07A065EE3EBCFE5B6C08C6279FAA1AA477B169FADDB17C878CF9BA119023AC
32,974,555 UART: Caliptra RT
32,975,257 UART: [state] CFI Enabled
33,135,482 UART: [rt] RT listening for mailbox commands...
33,167,096 UART: [rt]cmd =0x50435245, len=56
33,169,018 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,573 UART:
192,942 UART: Running Caliptra ROM ...
194,037 UART:
603,819 UART: [state] CFI Enabled
616,422 UART: [state] LifecycleState = Unprovisioned
618,365 UART: [state] DebugLocked = No
620,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,532 UART: [kat] SHA2-256
795,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,779 UART: [kat] ++
806,256 UART: [kat] sha1
817,366 UART: [kat] SHA2-256
820,052 UART: [kat] SHA2-384
825,560 UART: [kat] SHA2-512-ACC
827,933 UART: [kat] ECC-384
3,111,650 UART: [kat] HMAC-384Kdf
3,123,569 UART: [kat] LMS
4,313,713 UART: [kat] --
4,318,265 UART: [cold-reset] ++
4,320,757 UART: [fht] Storing FHT @ 0x50003400
4,331,682 UART: [idev] ++
4,332,342 UART: [idev] CDI.KEYID = 6
4,333,234 UART: [idev] SUBJECT.KEYID = 7
4,334,360 UART: [idev] UDS.KEYID = 0
4,335,429 ready_for_fw is high
4,335,651 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,793 UART: [idev] Erasing UDS.KEYID = 0
7,621,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,524 UART: [idev] --
7,648,405 UART: [ldev] ++
7,648,972 UART: [ldev] CDI.KEYID = 6
7,649,924 UART: [ldev] SUBJECT.KEYID = 5
7,651,140 UART: [ldev] AUTHORITY.KEYID = 7
7,652,367 UART: [ldev] FE.KEYID = 1
7,662,985 UART: [ldev] Erasing FE.KEYID = 1
10,952,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,221 UART: [ldev] --
13,312,273 UART: [fwproc] Waiting for Commands...
13,314,469 UART: [fwproc] Received command 0x46574c44
13,316,641 UART: [fwproc] Received Image of size 114036 bytes
17,369,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,826,845 >>> mbox cmd response: success
17,827,440 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,830,992 UART: [afmc] ++
17,831,633 UART: [afmc] CDI.KEYID = 6
17,832,513 UART: [afmc] SUBJECT.KEYID = 7
17,833,780 UART: [afmc] AUTHORITY.KEYID = 5
21,150,802 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,380 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,758 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,592 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,989 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,988 UART: [afmc] --
23,517,071 UART: [cold-reset] --
23,520,345 UART: [state] Locking Datavault
23,525,536 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,249 UART: [state] Locking ICCM
23,528,834 UART: [exit] Launching FMC @ 0x40000130
23,537,235 UART:
23,537,511 UART: Running Caliptra FMC ...
23,538,542 UART:
23,538,689 UART: [state] CFI Enabled
23,546,582 UART: [fht] FMC Alias Private Key: 7
25,878,639 UART: [art] Extend RT PCRs Done
25,879,851 UART: [art] Lock RT PCRs Done
25,881,668 UART: [art] Populate DV Done
25,887,184 UART: [fht] FMC Alias Private Key: 7
25,888,770 UART: [art] Derive CDI
25,889,502 UART: [art] Store in in slot 0x4
25,931,984 UART: [art] Derive Key Pair
25,933,026 UART: [art] Store priv key in slot 0x5
29,174,846 UART: [art] Derive Key Pair - Done
29,187,855 UART: [art] Signing Cert with AUTHO
29,189,151 UART: RITY.KEYID = 7
31,469,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,569 UART: [art] PUB.X = 787C73C0E3D64B53D9CC8486FC8261C25B6A77E7626FE4CC4EB7F8BFE956776AF929E225520DD5F04C3BFEB35EF87148
31,477,810 UART: [art] PUB.Y = DADBDE374EA22EF8E407AEE93AFE908E926F674A6E5D28B8847A3DB35AE1EA7EDED8314330E0BDD6D2AC49FEA5E6DC69
31,485,110 UART: [art] SIG.R = 597232F411D2836DB033489F940078C1A199767A9FC96CB42776E1A54A965486DF42D340DD5599C0A35DA29729922C5E
31,492,445 UART: [art] SIG.S = A3FF57F83C8130536A212DF5F70B18EBF577A3425F58B7C285AAE82B1C15ED23CED54F74A3A92EAF6378A1264EE5F072
32,797,491 UART: Caliptra RT
32,798,213 UART: [state] CFI Enabled
32,915,922 UART: [rt] RT listening for mailbox commands...
32,947,448 UART: [rt]cmd =0x50435245, len=56
32,949,252 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,133,670 ready_for_fw is high
4,134,047 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,086,252 >>> mbox cmd response: success
18,086,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,725,564 UART:
23,725,956 UART: Running Caliptra FMC ...
23,727,082 UART:
23,727,246 UART: [state] CFI Enabled
23,735,196 UART: [fht] FMC Alias Private Key: 7
26,065,664 UART: [art] Extend RT PCRs Done
26,066,892 UART: [art] Lock RT PCRs Done
26,068,578 UART: [art] Populate DV Done
26,074,053 UART: [fht] FMC Alias Private Key: 7
26,075,770 UART: [art] Derive CDI
26,076,590 UART: [art] Store in in slot 0x4
26,119,365 UART: [art] Derive Key Pair
26,120,364 UART: [art] Store priv key in slot 0x5
29,362,512 UART: [art] Derive Key Pair - Done
29,375,446 UART: [art] Signing Cert with AUTHO
29,376,745 UART: RITY.KEYID = 7
31,656,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,868 UART: [art] PUB.X = 15820BD07E12F70621D9CDDA1550E0EC40C88161AAD48AEB2F23A2874DA65912FAE319B41FA5F4F8E1C078B851F297CE
31,664,972 UART: [art] PUB.Y = A00272E9D44C09BE9EAC06A7CB06416D25E0486D0BBA655F3BFB50BF7284EFF0ACC0CAF90D93D304E0CA2D3672AA9F43
31,672,274 UART: [art] SIG.R = 3E6E1695AB8E761209CC5A0F2AAC3CBDBA683DA409508464B9781F51DD238D436FF135B2F418B6A0D2B1EFE30D033FF3
31,679,684 UART: [art] SIG.S = 0A87B26F6CE5AA09F1BB6662E89910DB31AA820DA0DAE5FD5DAAE04374A8AA6680B12A91FACA3B6B42969FCC474A771D
32,984,092 UART: Caliptra RT
32,984,805 UART: [state] CFI Enabled
33,102,537 UART: [rt] RT listening for mailbox commands...
33,134,015 UART: [rt]cmd =0x50435245, len=56
33,135,776 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,455 UART:
192,822 UART: Running Caliptra ROM ...
193,930 UART:
194,069 UART: [state] CFI Enabled
265,052 UART: [state] LifecycleState = Unprovisioned
266,901 UART: [state] DebugLocked = No
269,419 UART: [state] WD Timer not started. Device not locked for debugging
272,813 UART: [kat] SHA2-256
451,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,554 UART: [kat] ++
464,000 UART: [kat] sha1
475,184 UART: [kat] SHA2-256
478,262 UART: [kat] SHA2-384
484,113 UART: [kat] SHA2-512-ACC
487,053 UART: [kat] ECC-384
2,946,695 UART: [kat] HMAC-384Kdf
2,972,079 UART: [kat] LMS
3,501,529 UART: [kat] --
3,506,732 UART: [cold-reset] ++
3,507,958 UART: [fht] FHT @ 0x50003400
3,518,298 UART: [idev] ++
3,518,863 UART: [idev] CDI.KEYID = 6
3,519,898 UART: [idev] SUBJECT.KEYID = 7
3,521,005 UART: [idev] UDS.KEYID = 0
3,521,948 ready_for_fw is high
3,522,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,993 UART: [idev] Erasing UDS.KEYID = 0
6,026,553 UART: [idev] Sha1 KeyId Algorithm
6,049,506 UART: [idev] --
6,053,928 UART: [ldev] ++
6,054,498 UART: [ldev] CDI.KEYID = 6
6,055,380 UART: [ldev] SUBJECT.KEYID = 5
6,056,590 UART: [ldev] AUTHORITY.KEYID = 7
6,057,881 UART: [ldev] FE.KEYID = 1
6,099,718 UART: [ldev] Erasing FE.KEYID = 1
8,601,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,485 UART: [ldev] --
10,414,319 UART: [fwproc] Wait for Commands...
10,417,546 UART: [fwproc] Recv command 0x46574c44
10,419,659 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,279,994 >>> mbox cmd response: success
14,280,516 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,283,794 UART: [afmc] ++
14,284,375 UART: [afmc] CDI.KEYID = 6
14,285,250 UART: [afmc] SUBJECT.KEYID = 7
14,286,519 UART: [afmc] AUTHORITY.KEYID = 5
16,809,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,434 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,627 UART: [afmc] --
18,610,028 UART: [cold-reset] --
18,613,079 UART: [state] Locking Datavault
18,618,489 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,129 UART: [state] Locking ICCM
18,621,764 UART: [exit] Launching FMC @ 0x40000130
18,630,157 UART:
18,630,392 UART: Running Caliptra FMC ...
18,631,494 UART:
18,631,651 UART: [state] CFI Enabled
18,691,717 UART: [fht] FMC Alias Private Key: 7
20,456,639 UART: [art] Extend RT PCRs Done
20,457,861 UART: [art] Lock RT PCRs Done
20,459,692 UART: [art] Populate DV Done
20,465,212 UART: [fht] FMC Alias Private Key: 7
20,466,802 UART: [art] Derive CDI
20,467,565 UART: [art] Store in in slot 0x4
20,524,476 UART: [art] Derive Key Pair
20,525,514 UART: [art] Store priv key in slot 0x5
22,988,389 UART: [art] Derive Key Pair - Done
23,001,548 UART: [art] Signing Cert with AUTHO
23,002,855 UART: RITY.KEYID = 7
24,715,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,674 UART: [art] PUB.X = A569B871239CF25A37B54F05C09E2DB481CEFAFA31D099E17365BCA108011B8164E1B9E0DC93948A72FAF4C0DE714483
24,723,958 UART: [art] PUB.Y = 4B5AFFE0BA804C9D1F4AFAAB8E7BB399650BC8CF80CCD1395A7B5D9BF634248BEC4D763FA7BCB5CC55BE3E32E9FBC06E
24,731,289 UART: [art] SIG.R = C280AA8E9A857DDDF259034CCFCC7B69E2DBC0C9AA1F3D22C7682E7CC9640C1D559CC40C52662C2567F59F11C657451F
24,738,664 UART: [art] SIG.S = 285A5649C329391B5CA52D76D5BAA2EAED174D56F9909E80D2B0F86660404893FF10FEA41075B9162C51F22EBD95B8D2
25,717,283 UART: Caliptra RT
25,718,003 UART: [state] CFI Enabled
25,884,653 UART: [rt] RT listening for mailbox commands...
25,916,337 UART: [rt]cmd =0x50435245, len=56
25,918,040 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
192,501 UART:
192,864 UART: Running Caliptra ROM ...
194,064 UART:
194,250 UART: [state] CFI Enabled
266,182 UART: [state] LifecycleState = Unprovisioned
268,587 UART: [state] DebugLocked = No
270,508 UART: [state] WD Timer not started. Device not locked for debugging
274,967 UART: [kat] SHA2-256
464,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,633 UART: [kat] ++
476,109 UART: [kat] sha1
488,829 UART: [kat] SHA2-256
491,841 UART: [kat] SHA2-384
498,043 UART: [kat] SHA2-512-ACC
500,628 UART: [kat] ECC-384
2,948,025 UART: [kat] HMAC-384Kdf
2,971,364 UART: [kat] LMS
3,503,101 UART: [kat] --
3,508,800 UART: [cold-reset] ++
3,509,898 UART: [fht] FHT @ 0x50003400
3,519,993 UART: [idev] ++
3,520,738 UART: [idev] CDI.KEYID = 6
3,521,628 UART: [idev] SUBJECT.KEYID = 7
3,522,748 UART: [idev] UDS.KEYID = 0
3,523,733 ready_for_fw is high
3,523,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,965 UART: [idev] Erasing UDS.KEYID = 0
6,027,429 UART: [idev] Sha1 KeyId Algorithm
6,051,094 UART: [idev] --
6,056,012 UART: [ldev] ++
6,056,701 UART: [ldev] CDI.KEYID = 6
6,057,616 UART: [ldev] SUBJECT.KEYID = 5
6,058,833 UART: [ldev] AUTHORITY.KEYID = 7
6,060,013 UART: [ldev] FE.KEYID = 1
6,099,128 UART: [ldev] Erasing FE.KEYID = 1
8,605,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,240 UART: [ldev] --
10,413,382 UART: [fwproc] Wait for Commands...
10,416,132 UART: [fwproc] Recv command 0x46574c44
10,418,388 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,206 >>> mbox cmd response: success
14,600,793 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,604,618 UART: [afmc] ++
14,605,332 UART: [afmc] CDI.KEYID = 6
14,606,549 UART: [afmc] SUBJECT.KEYID = 7
14,607,991 UART: [afmc] AUTHORITY.KEYID = 5
17,146,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,868,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,870,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,885,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,900,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,915,833 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,938,991 UART: [afmc] --
18,942,260 UART: [cold-reset] --
18,945,905 UART: [state] Locking Datavault
18,949,212 UART: [state] Locking PCR0, PCR1 and PCR31
18,951,404 UART: [state] Locking ICCM
18,952,826 UART: [exit] Launching FMC @ 0x40000130
18,961,487 UART:
18,961,730 UART: Running Caliptra FMC ...
18,962,778 UART:
18,962,927 UART: [state] CFI Enabled
19,027,318 UART: [fht] FMC Alias Private Key: 7
20,791,013 UART: [art] Extend RT PCRs Done
20,792,234 UART: [art] Lock RT PCRs Done
20,794,216 UART: [art] Populate DV Done
20,799,835 UART: [fht] FMC Alias Private Key: 7
20,801,432 UART: [art] Derive CDI
20,802,249 UART: [art] Store in in slot 0x4
20,859,640 UART: [art] Derive Key Pair
20,860,643 UART: [art] Store priv key in slot 0x5
23,323,562 UART: [art] Derive Key Pair - Done
23,336,498 UART: [art] Signing Cert with AUTHO
23,337,806 UART: RITY.KEYID = 7
25,049,010 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,525 UART: [art] PUB.X = FE0AF41E818DDE0C0EC7CF0C29BE5BDFDDA5BA855A0C0C62675AE53207A9E11FB0C84C52FA41336097C96718D837BDF0
25,057,836 UART: [art] PUB.Y = 0AE5AF6BF6EF93AC58CF01FC332FC70DE06139E92A1D0A89DAD0C7AE7DB84548FE705A5DC8CCEA0D65674ABBA74DEAB9
25,065,119 UART: [art] SIG.R = 7C6C1BB8C3798177072DED65BB1A904EEA287166C863BD715C54CF301C83D47F7F56E73BC2A586B95BE4859CEEE37874
25,072,510 UART: [art] SIG.S = 64A4FB7E572B95EF0B519962B79B48C1F9CFB0BBA94BB67F3C8DE4C1EB54954C382E886361BA31E6BE2B0C17B5A0A7FF
26,051,729 UART: Caliptra RT
26,052,429 UART: [state] CFI Enabled
26,216,381 UART: [rt] RT listening for mailbox commands...
26,247,729 UART: [rt]cmd =0x50435245, len=56
26,249,402 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
3,428,864 ready_for_fw is high
3,429,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,719,806 >>> mbox cmd response: success
14,720,611 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,035,834 UART:
19,036,224 UART: Running Caliptra FMC ...
19,037,419 UART:
19,037,588 UART: [state] CFI Enabled
19,105,231 UART: [fht] FMC Alias Private Key: 7
20,869,679 UART: [art] Extend RT PCRs Done
20,870,901 UART: [art] Lock RT PCRs Done
20,872,479 UART: [art] Populate DV Done
20,877,726 UART: [fht] FMC Alias Private Key: 7
20,879,265 UART: [art] Derive CDI
20,880,081 UART: [art] Store in in slot 0x4
20,937,974 UART: [art] Derive Key Pair
20,939,027 UART: [art] Store priv key in slot 0x5
23,401,947 UART: [art] Derive Key Pair - Done
23,414,845 UART: [art] Signing Cert with AUTHO
23,416,181 UART: RITY.KEYID = 7
25,128,201 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,705 UART: [art] PUB.X = 2CA0EEB8F246A1193F5AE4E297271B3F2093C5542C5630DC635201FA15BCBE8D8FDCFFEE9F2F85429346FF56C3BF956D
25,137,001 UART: [art] PUB.Y = 1D3E8AE8A66D2A23D6769BFC444D1506C50EF00536078CB03D69BA65DDE160ADE49F93FA7F08C7CEBDB03CA7D4D99890
25,144,248 UART: [art] SIG.R = 0AFA0673EB5B74BAFE3B037C167F9533198EBA7F1F119740E7729560582C5A91958EFA5DDE5E129D865D42DC41240F1A
25,151,641 UART: [art] SIG.S = C033F21345D9D5DEAEBC793C8AD042737FD41F501260D7DAB2506E12E27DDBA8585C48E838CC77566CCAD0963F31B7DA
26,131,255 UART: Caliptra RT
26,131,968 UART: [state] CFI Enabled
26,298,477 UART: [rt] RT listening for mailbox commands...
26,330,009 UART: [rt]cmd =0x50435245, len=56
26,331,722 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,339 UART:
192,701 UART: Running Caliptra ROM ...
193,796 UART:
603,354 UART: [state] CFI Enabled
617,577 UART: [state] LifecycleState = Unprovisioned
619,944 UART: [state] DebugLocked = No
622,326 UART: [state] WD Timer not started. Device not locked for debugging
627,070 UART: [kat] SHA2-256
816,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,755 UART: [kat] ++
828,320 UART: [kat] sha1
838,839 UART: [kat] SHA2-256
841,849 UART: [kat] SHA2-384
847,270 UART: [kat] SHA2-512-ACC
849,847 UART: [kat] ECC-384
3,293,089 UART: [kat] HMAC-384Kdf
3,305,815 UART: [kat] LMS
3,837,644 UART: [kat] --
3,842,626 UART: [cold-reset] ++
3,843,844 UART: [fht] FHT @ 0x50003400
3,855,426 UART: [idev] ++
3,856,151 UART: [idev] CDI.KEYID = 6
3,857,033 UART: [idev] SUBJECT.KEYID = 7
3,858,279 UART: [idev] UDS.KEYID = 0
3,859,204 ready_for_fw is high
3,859,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,867 UART: [idev] Erasing UDS.KEYID = 0
6,331,477 UART: [idev] Sha1 KeyId Algorithm
6,353,187 UART: [idev] --
6,357,931 UART: [ldev] ++
6,358,608 UART: [ldev] CDI.KEYID = 6
6,359,489 UART: [ldev] SUBJECT.KEYID = 5
6,360,697 UART: [ldev] AUTHORITY.KEYID = 7
6,361,926 UART: [ldev] FE.KEYID = 1
6,374,431 UART: [ldev] Erasing FE.KEYID = 1
8,855,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,379 UART: [ldev] --
10,647,372 UART: [fwproc] Wait for Commands...
10,649,791 UART: [fwproc] Recv command 0x46574c44
10,652,103 UART: [fwproc] Recv'd Img size: 114360 bytes
14,093,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,164 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,824,936 >>> mbox cmd response: success
14,825,456 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,829,317 UART: [afmc] ++
14,830,008 UART: [afmc] CDI.KEYID = 6
14,831,191 UART: [afmc] SUBJECT.KEYID = 7
14,832,671 UART: [afmc] AUTHORITY.KEYID = 5
17,334,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,054,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,056,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,125,648 UART: [afmc] --
19,130,032 UART: [cold-reset] --
19,132,551 UART: [state] Locking Datavault
19,136,716 UART: [state] Locking PCR0, PCR1 and PCR31
19,138,845 UART: [state] Locking ICCM
19,140,553 UART: [exit] Launching FMC @ 0x40000130
19,149,217 UART:
19,149,453 UART: Running Caliptra FMC ...
19,150,549 UART:
19,150,704 UART: [state] CFI Enabled
19,159,285 UART: [fht] FMC Alias Private Key: 7
20,916,069 UART: [art] Extend RT PCRs Done
20,917,304 UART: [art] Lock RT PCRs Done
20,919,168 UART: [art] Populate DV Done
20,924,793 UART: [fht] FMC Alias Private Key: 7
20,926,300 UART: [art] Derive CDI
20,927,038 UART: [art] Store in in slot 0x4
20,969,575 UART: [art] Derive Key Pair
20,970,608 UART: [art] Store priv key in slot 0x5
23,397,401 UART: [art] Derive Key Pair - Done
23,410,343 UART: [art] Signing Cert with AUTHO
23,411,639 UART: RITY.KEYID = 7
25,117,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,537 UART: [art] PUB.X = BF3FE66E98BF498AA4B1771E1DF5B0786E80896D9DB685C36FE3A1A9419C290003FC8DB6237FF9FB4AD5091E633E28FA
25,125,812 UART: [art] PUB.Y = A072E7FBDA8A394824AA491F20A7E6F112EE844638BCE905DCC4F7CF7D8F0BB2874BD6BE33DBF232C166B269A1A5D1D9
25,133,053 UART: [art] SIG.R = 8649073BB50950BEE8FB72D66319AA1019993075A8A3B8AB8E2B493048F068440002375AC2DBF75CB22C7B7F803F9E7E
25,140,403 UART: [art] SIG.S = E556C26E5CE7F95A2DF59C9DFDD81EC5C185874291A9EB124A6627D15EB2C8593690636F5E7AF4F9FEE447189F6D7147
26,119,314 UART: Caliptra RT
26,120,001 UART: [state] CFI Enabled
26,236,686 UART: [rt] RT listening for mailbox commands...
26,267,959 UART: [rt]cmd =0x50435245, len=56
26,269,873 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,756,059 ready_for_fw is high
3,756,474 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,430 >>> mbox cmd response: success
14,957,191 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,216,658 UART:
19,217,037 UART: Running Caliptra FMC ...
19,218,260 UART:
19,218,428 UART: [state] CFI Enabled
19,226,539 UART: [fht] FMC Alias Private Key: 7
20,983,189 UART: [art] Extend RT PCRs Done
20,984,414 UART: [art] Lock RT PCRs Done
20,986,365 UART: [art] Populate DV Done
20,991,885 UART: [fht] FMC Alias Private Key: 7
20,993,478 UART: [art] Derive CDI
20,994,289 UART: [art] Store in in slot 0x4
21,036,835 UART: [art] Derive Key Pair
21,037,838 UART: [art] Store priv key in slot 0x5
23,463,952 UART: [art] Derive Key Pair - Done
23,477,110 UART: [art] Signing Cert with AUTHO
23,478,418 UART: RITY.KEYID = 7
25,183,964 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,486 UART: [art] PUB.X = B22E9421C21A1281A83739FB60F0BEB4DB3C75EFB1EB38E184A774F64A02682F9686C72EBB3B1B0D1FDD063D6483D887
25,192,754 UART: [art] PUB.Y = 0C912A96DB5061E8CD5AA2EC1C13E91F330F85CC77C80DC63FEE7C28E9E5B2A12F8B58A9CFD5B7E91F7FDB83B0865A9C
25,200,063 UART: [art] SIG.R = 2297ACCD42DF50199B76F842BF5FD27A095D55A41B6B391F1175E597743B38CD6BD5EBE5D79486D0EF4474A2A86BD2F1
25,207,448 UART: [art] SIG.S = 7F7A7D080FE13874815CF7328ED4A4F1CFD86F860DFFF66AC1F8E2A4173B8176DB3C8EA33C18BF17CE9CC1ADF8918B50
26,186,237 UART: Caliptra RT
26,186,930 UART: [state] CFI Enabled
26,304,525 UART: [rt] RT listening for mailbox commands...
26,336,092 UART: [rt]cmd =0x50435245, len=56
26,337,898 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
86,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,607 UART: [kat] SHA2-256
881,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,653 UART: [kat] ++
885,805 UART: [kat] sha1
890,003 UART: [kat] SHA2-256
891,941 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,084 UART: [kat] HMAC-384Kdf
906,684 UART: [kat] LMS
1,474,880 UART: [kat] --
1,475,683 UART: [cold-reset] ++
1,476,223 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 ready_for_fw is high
1,480,397 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,912 UART: [idev] Erasing UDS.KEYID = 0
1,504,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,540 UART: [idev] --
1,514,575 UART: [ldev] ++
1,514,743 UART: [ldev] CDI.KEYID = 6
1,515,106 UART: [ldev] SUBJECT.KEYID = 5
1,515,532 UART: [ldev] AUTHORITY.KEYID = 7
1,515,995 UART: [ldev] FE.KEYID = 1
1,520,963 UART: [ldev] Erasing FE.KEYID = 1
1,545,920 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,538 UART: [ldev] --
1,584,929 UART: [fwproc] Waiting for Commands...
1,585,766 UART: [fwproc] Received command 0x46574c44
1,586,557 UART: [fwproc] Received Image of size 114360 bytes
2,884,156 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,516 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,859 >>> mbox cmd response: success
3,076,859 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,078,023 UART: [afmc] ++
3,078,191 UART: [afmc] CDI.KEYID = 6
3,078,553 UART: [afmc] SUBJECT.KEYID = 7
3,078,978 UART: [afmc] AUTHORITY.KEYID = 5
3,113,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,325 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,718 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,408 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,497 UART: [afmc] --
3,156,567 UART: [cold-reset] --
3,157,559 UART: [state] Locking Datavault
3,158,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,346 UART: [state] Locking ICCM
3,159,870 UART: [exit] Launching FMC @ 0x40000130
3,165,199 UART:
3,165,215 UART: Running Caliptra FMC ...
3,165,623 UART:
3,165,677 UART: [state] CFI Enabled
3,176,556 UART: [fht] FMC Alias Private Key: 7
3,284,265 UART: [art] Extend RT PCRs Done
3,284,693 UART: [art] Lock RT PCRs Done
3,285,905 UART: [art] Populate DV Done
3,293,790 UART: [fht] FMC Alias Private Key: 7
3,294,862 UART: [art] Derive CDI
3,295,142 UART: [art] Store in in slot 0x4
3,380,635 UART: [art] Derive Key Pair
3,380,995 UART: [art] Store priv key in slot 0x5
3,394,453 UART: [art] Derive Key Pair - Done
3,409,295 UART: [art] Signing Cert with AUTHO
3,409,775 UART: RITY.KEYID = 7
3,425,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,832 UART: [art] PUB.X = 3F97328CDB04656A66597E83F57A8AD28F0C2105A4966530D132FE3A0BE7C352F36252A328280BE79DC604A519C4E805
3,432,577 UART: [art] PUB.Y = 9B2E5DAA80908E9DEACF8FDC91F257706D56A0A1AC3CC5B785D91ABE042FD55696101B7416E73AC58CD547B67C6A56E2
3,439,540 UART: [art] SIG.R = 610F2F82E7B87F1E93687040F6B437E4C739EF3B37515C0BA631F6418EE6FC1D2D35B09D757123B6FFE36DC9CFAF11BC
3,446,316 UART: [art] SIG.S = 7E38E90A6D5825846A98D3D34A57EEFBA47F8BABF025642157CACB51A09136669562E761DCB806D54F3F71B0AC3CF10F
3,470,052 UART: Caliptra RT
3,470,306 UART: [state] CFI Enabled
3,578,841 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,232 UART: [rt]cmd =0x50435245, len=56
3,610,825 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,939 ready_for_fw is high
1,362,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,369 >>> mbox cmd response: success
2,928,369 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,149 UART:
2,989,165 UART: Running Caliptra FMC ...
2,989,573 UART:
2,989,627 UART: [state] CFI Enabled
3,000,238 UART: [fht] FMC Alias Private Key: 7
3,108,639 UART: [art] Extend RT PCRs Done
3,109,067 UART: [art] Lock RT PCRs Done
3,110,447 UART: [art] Populate DV Done
3,118,692 UART: [fht] FMC Alias Private Key: 7
3,119,822 UART: [art] Derive CDI
3,120,102 UART: [art] Store in in slot 0x4
3,205,769 UART: [art] Derive Key Pair
3,206,129 UART: [art] Store priv key in slot 0x5
3,219,193 UART: [art] Derive Key Pair - Done
3,233,899 UART: [art] Signing Cert with AUTHO
3,234,379 UART: RITY.KEYID = 7
3,249,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,228 UART: [art] PUB.X = C6E927E80F4787527CC703C1861B3DCF7C03E487BEDBA1BE3CBFAABF18F185F128CD4CFB863760031893B66C2A86565B
3,257,000 UART: [art] PUB.Y = CCA810513D9DAEFA94F517D04C47189529043B581C55BBA1268E3ACBCE3891BD7C7C78ABC8CCA95B7682CCBA27D357DA
3,263,967 UART: [art] SIG.R = 660E4281EAD2536A9E1EC532EDA54D2D3D0840C4AE3F48B8B4E2409BA4568A1CE3A188594701B97B2C05ADA0F451E67B
3,270,735 UART: [art] SIG.S = ADB45D7793160D1D37D7CB9854DC8CE1E6BF29F5C9982131D899823974BBD5E96CE6560BBEA35AA072D0FDE17D60D476
3,294,688 UART: Caliptra RT
3,294,942 UART: [state] CFI Enabled
3,404,316 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,651 UART: [rt]cmd =0x50435245, len=56
3,436,136 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
902,919 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,262 UART: [cold-reset] ++
1,476,720 UART: [fht] Storing FHT @ 0x50003400
1,479,395 UART: [idev] ++
1,479,563 UART: [idev] CDI.KEYID = 6
1,479,923 UART: [idev] SUBJECT.KEYID = 7
1,480,347 UART: [idev] UDS.KEYID = 0
1,480,692 ready_for_fw is high
1,480,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,065 UART: [idev] Erasing UDS.KEYID = 0
1,505,035 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,567 UART: [idev] --
1,514,758 UART: [ldev] ++
1,514,926 UART: [ldev] CDI.KEYID = 6
1,515,289 UART: [ldev] SUBJECT.KEYID = 5
1,515,715 UART: [ldev] AUTHORITY.KEYID = 7
1,516,178 UART: [ldev] FE.KEYID = 1
1,521,416 UART: [ldev] Erasing FE.KEYID = 1
1,546,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,691 UART: [ldev] --
1,586,072 UART: [fwproc] Waiting for Commands...
1,586,861 UART: [fwproc] Received command 0x46574c44
1,587,652 UART: [fwproc] Received Image of size 114360 bytes
2,885,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,659 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,960 >>> mbox cmd response: success
3,078,960 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,988 UART: [afmc] ++
3,080,156 UART: [afmc] CDI.KEYID = 6
3,080,518 UART: [afmc] SUBJECT.KEYID = 7
3,080,943 UART: [afmc] AUTHORITY.KEYID = 5
3,116,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,253 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,943 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,982 UART: [afmc] --
3,159,872 UART: [cold-reset] --
3,160,556 UART: [state] Locking Datavault
3,161,459 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,063 UART: [state] Locking ICCM
3,162,595 UART: [exit] Launching FMC @ 0x40000130
3,167,924 UART:
3,167,940 UART: Running Caliptra FMC ...
3,168,348 UART:
3,168,491 UART: [state] CFI Enabled
3,179,374 UART: [fht] FMC Alias Private Key: 7
3,288,037 UART: [art] Extend RT PCRs Done
3,288,465 UART: [art] Lock RT PCRs Done
3,290,287 UART: [art] Populate DV Done
3,298,516 UART: [fht] FMC Alias Private Key: 7
3,299,536 UART: [art] Derive CDI
3,299,816 UART: [art] Store in in slot 0x4
3,385,217 UART: [art] Derive Key Pair
3,385,577 UART: [art] Store priv key in slot 0x5
3,398,907 UART: [art] Derive Key Pair - Done
3,413,659 UART: [art] Signing Cert with AUTHO
3,414,139 UART: RITY.KEYID = 7
3,429,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,564 UART: [art] PUB.X = 1B073CD670153610A1C4E0C2CCF4817E4C32B2C307F890DB507827C1D78E313C731574155176CE92FC61459331F94F2C
3,437,322 UART: [art] PUB.Y = 55C1BFC9E6734FAA50B0BB5E58BA1D86112DD361AF41F1988B51385CF4CDF9AC30728DD0BB564A22D9423D75EFF1189A
3,444,288 UART: [art] SIG.R = 7E72FAAAF482F168BB1425A8050321AF672727EF0DA6DACBDCC5F04C66ADE5C342BB7097B34F10557C2BF63A9F3F0223
3,451,062 UART: [art] SIG.S = 7BEBCE863A33BAB981A963B6B071A0F0F33061250C9728843806593B160331E3FE2C4E8F66387B33345A75D8ACF57BC6
3,474,918 UART: Caliptra RT
3,475,264 UART: [state] CFI Enabled
3,583,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,430 UART: [rt]cmd =0x50435245, len=56
3,614,969 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,016 ready_for_fw is high
1,362,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,408 >>> mbox cmd response: success
2,928,408 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,928 UART:
2,989,944 UART: Running Caliptra FMC ...
2,990,352 UART:
2,990,495 UART: [state] CFI Enabled
3,001,090 UART: [fht] FMC Alias Private Key: 7
3,108,771 UART: [art] Extend RT PCRs Done
3,109,199 UART: [art] Lock RT PCRs Done
3,110,933 UART: [art] Populate DV Done
3,118,990 UART: [fht] FMC Alias Private Key: 7
3,120,082 UART: [art] Derive CDI
3,120,362 UART: [art] Store in in slot 0x4
3,205,983 UART: [art] Derive Key Pair
3,206,343 UART: [art] Store priv key in slot 0x5
3,219,555 UART: [art] Derive Key Pair - Done
3,234,525 UART: [art] Signing Cert with AUTHO
3,235,005 UART: RITY.KEYID = 7
3,250,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,310 UART: [art] PUB.X = B49A8823767D091B1DCEE57D79AE3D4038BE174528602D61A3DEEC75105138D77712B6D612A36E402B54CE350B3E610B
3,258,071 UART: [art] PUB.Y = DE6FF2919C2820341705F8D6C09BFC42837FCAFE37097157E08492ACE6643FAF2FCF18E0C39E8C8BA038FBB24ACCB5BA
3,265,035 UART: [art] SIG.R = 244DBBAE58158A4C540B00106B75181D7B255A822224E14ED0FA20660F4CE6B5EC97BC2E2F0D3AC1426000374D260A86
3,271,751 UART: [art] SIG.S = EA8521A7A9BEC0EA0B728A6DE4FAE1D509A4EE6C72C6BDC87F41E51AB15A792B2C5BE373824AE7B7F7C7902BE7F319F3
3,295,216 UART: Caliptra RT
3,295,562 UART: [state] CFI Enabled
3,404,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,677 UART: [rt]cmd =0x50435245, len=56
3,435,870 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,525 UART: [kat] SHA2-256
903,465 UART: [kat] SHA2-384
906,238 UART: [kat] SHA2-512-ACC
908,139 UART: [kat] ECC-384
917,460 UART: [kat] HMAC-384Kdf
921,974 UART: [kat] LMS
1,170,302 UART: [kat] --
1,171,049 UART: [cold-reset] ++
1,171,609 UART: [fht] FHT @ 0x50003400
1,174,366 UART: [idev] ++
1,174,534 UART: [idev] CDI.KEYID = 6
1,174,894 UART: [idev] SUBJECT.KEYID = 7
1,175,318 UART: [idev] UDS.KEYID = 0
1,175,663 ready_for_fw is high
1,175,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,684 UART: [idev] Erasing UDS.KEYID = 0
1,200,781 UART: [idev] Sha1 KeyId Algorithm
1,209,393 UART: [idev] --
1,210,589 UART: [ldev] ++
1,210,757 UART: [ldev] CDI.KEYID = 6
1,211,120 UART: [ldev] SUBJECT.KEYID = 5
1,211,546 UART: [ldev] AUTHORITY.KEYID = 7
1,212,009 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,760 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,694 >>> mbox cmd response: success
2,771,694 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,772,854 UART: [afmc] ++
2,773,022 UART: [afmc] CDI.KEYID = 6
2,773,384 UART: [afmc] SUBJECT.KEYID = 7
2,773,809 UART: [afmc] AUTHORITY.KEYID = 5
2,809,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,384 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,103 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,037 UART: [afmc] --
2,853,053 UART: [cold-reset] --
2,854,089 UART: [state] Locking Datavault
2,855,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,018 UART: [state] Locking ICCM
2,856,664 UART: [exit] Launching FMC @ 0x40000130
2,861,993 UART:
2,862,009 UART: Running Caliptra FMC ...
2,862,417 UART:
2,862,471 UART: [state] CFI Enabled
2,873,064 UART: [fht] FMC Alias Private Key: 7
2,980,851 UART: [art] Extend RT PCRs Done
2,981,279 UART: [art] Lock RT PCRs Done
2,982,739 UART: [art] Populate DV Done
2,991,308 UART: [fht] FMC Alias Private Key: 7
2,992,348 UART: [art] Derive CDI
2,992,628 UART: [art] Store in in slot 0x4
3,078,223 UART: [art] Derive Key Pair
3,078,583 UART: [art] Store priv key in slot 0x5
3,091,941 UART: [art] Derive Key Pair - Done
3,106,786 UART: [art] Signing Cert with AUTHO
3,107,266 UART: RITY.KEYID = 7
3,122,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,009 UART: [art] PUB.X = 1089FEBF145768C7BA4151159CE59EFA2AF4486FC8C022BF04E35E245E73E19E9342ECAE72E3D2FCC43702CB8288401E
3,129,783 UART: [art] PUB.Y = 2CCFFD8E642E29FECC467A4CABEE126F46163C08E2BFC1947ED5901D5C7C92B332B0A1FFDC168D7F181757D429EAACB9
3,136,754 UART: [art] SIG.R = A6FB6573A5CC31BDE8E843E219C5943B0D2FBB74B597937DA3C3EDDE29B7BECA257C1F5054A0545A2C8BFB8E08D9164B
3,143,538 UART: [art] SIG.S = C024B273669E7CF248DFEDC8C5177F2F96E7EB31E411EBA5FB5E305DFF3449A841BAABB81F7065E555BE36DEA0CE84AB
3,167,425 UART: Caliptra RT
3,167,679 UART: [state] CFI Enabled
3,275,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,887 UART: [rt]cmd =0x50435245, len=56
3,307,148 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,253 ready_for_fw is high
1,060,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,849 >>> mbox cmd response: success
2,625,849 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,688,209 UART:
2,688,225 UART: Running Caliptra FMC ...
2,688,633 UART:
2,688,687 UART: [state] CFI Enabled
2,699,308 UART: [fht] FMC Alias Private Key: 7
2,806,069 UART: [art] Extend RT PCRs Done
2,806,497 UART: [art] Lock RT PCRs Done
2,807,987 UART: [art] Populate DV Done
2,816,040 UART: [fht] FMC Alias Private Key: 7
2,817,202 UART: [art] Derive CDI
2,817,482 UART: [art] Store in in slot 0x4
2,903,281 UART: [art] Derive Key Pair
2,903,641 UART: [art] Store priv key in slot 0x5
2,917,393 UART: [art] Derive Key Pair - Done
2,932,234 UART: [art] Signing Cert with AUTHO
2,932,714 UART: RITY.KEYID = 7
2,947,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,739 UART: [art] PUB.X = 4386A1C4B15512FC0260444938F561BCE8274385FF7210F749E7646B0862111BF1BA4BDCC24655E168EE64B8E36D1C82
2,955,499 UART: [art] PUB.Y = 96279BAA541ECE57EB70AE3A622DD14ABD150FD8AD80BB6EE0A88762F4A1BBBC9C841897CD3993B6294EF0760078A28C
2,962,440 UART: [art] SIG.R = EA5926DF993D346C7535F8D904CAD689FBC8F72AB562E4839496ED6FC9800F1C69B1684A66ED1F15EDB33CAFD0C21451
2,969,216 UART: [art] SIG.S = 1DCC23C7E5F7928F62569A5C87CB5F1CA08F5CE5A12F62922823FA26C39A68144E717CFE425936A8F31CCA7C5ABA5BA2
2,993,241 UART: Caliptra RT
2,993,495 UART: [state] CFI Enabled
3,100,617 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,236 UART: [rt]cmd =0x50435245, len=56
3,132,505 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,717 UART: [state] LifecycleState = Unprovisioned
85,372 UART: [state] DebugLocked = No
85,988 UART: [state] WD Timer not started. Device not locked for debugging
87,291 UART: [kat] SHA2-256
892,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,066 UART: [kat] ++
897,218 UART: [kat] sha1
901,482 UART: [kat] SHA2-256
903,422 UART: [kat] SHA2-384
906,141 UART: [kat] SHA2-512-ACC
908,042 UART: [kat] ECC-384
917,903 UART: [kat] HMAC-384Kdf
922,549 UART: [kat] LMS
1,170,877 UART: [kat] --
1,171,796 UART: [cold-reset] ++
1,172,188 UART: [fht] FHT @ 0x50003400
1,174,937 UART: [idev] ++
1,175,105 UART: [idev] CDI.KEYID = 6
1,175,465 UART: [idev] SUBJECT.KEYID = 7
1,175,889 UART: [idev] UDS.KEYID = 0
1,176,234 ready_for_fw is high
1,176,234 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,033 UART: [idev] Erasing UDS.KEYID = 0
1,200,534 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,210,014 UART: [ldev] ++
1,210,182 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,971 UART: [ldev] AUTHORITY.KEYID = 7
1,211,434 UART: [ldev] FE.KEYID = 1
1,216,706 UART: [ldev] Erasing FE.KEYID = 1
1,243,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,126 UART: [ldev] --
1,282,415 UART: [fwproc] Wait for Commands...
1,283,119 UART: [fwproc] Recv command 0x46574c44
1,283,847 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,831 >>> mbox cmd response: success
2,773,831 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,887 UART: [afmc] ++
2,775,055 UART: [afmc] CDI.KEYID = 6
2,775,417 UART: [afmc] SUBJECT.KEYID = 7
2,775,842 UART: [afmc] AUTHORITY.KEYID = 5
2,811,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,683 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,216 UART: [afmc] --
2,855,188 UART: [cold-reset] --
2,855,978 UART: [state] Locking Datavault
2,857,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,843 UART: [state] Locking ICCM
2,858,477 UART: [exit] Launching FMC @ 0x40000130
2,863,806 UART:
2,863,822 UART: Running Caliptra FMC ...
2,864,230 UART:
2,864,373 UART: [state] CFI Enabled
2,874,978 UART: [fht] FMC Alias Private Key: 7
2,982,391 UART: [art] Extend RT PCRs Done
2,982,819 UART: [art] Lock RT PCRs Done
2,984,363 UART: [art] Populate DV Done
2,992,610 UART: [fht] FMC Alias Private Key: 7
2,993,610 UART: [art] Derive CDI
2,993,890 UART: [art] Store in in slot 0x4
3,079,641 UART: [art] Derive Key Pair
3,080,001 UART: [art] Store priv key in slot 0x5
3,093,285 UART: [art] Derive Key Pair - Done
3,108,055 UART: [art] Signing Cert with AUTHO
3,108,535 UART: RITY.KEYID = 7
3,123,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,222 UART: [art] PUB.X = 0FE1F607B43047EB2E4C20E546E3D3F04840A17DFD227DA8A2B7C301F381AE0E5CF542D0DF0CA739EF7C92C12C002E36
3,130,969 UART: [art] PUB.Y = 676AB6385D55420CE13E369346ACAF00C631C2D085CCCABFFE37D157E6855D279D16B6E3DB813DB3AD5E3884CA6574BC
3,137,908 UART: [art] SIG.R = AB335C22C5C5C81E555D12CA918268CC651E571F6E5C677F5080D6DDBB8394D5BFFCF3F5EA67B42E471000184AFF8A80
3,144,668 UART: [art] SIG.S = 974A95DFF1EF77E9C38DED548EFE3D6E1A9C87B0D140AE99E1B11CA86C554711CA4183322FA9F6888D7F280D0848721A
3,169,005 UART: Caliptra RT
3,169,351 UART: [state] CFI Enabled
3,277,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,329 UART: [rt]cmd =0x50435245, len=56
3,309,862 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,014 ready_for_fw is high
1,061,014 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,054 >>> mbox cmd response: success
2,628,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,900 UART:
2,689,916 UART: Running Caliptra FMC ...
2,690,324 UART:
2,690,467 UART: [state] CFI Enabled
2,701,158 UART: [fht] FMC Alias Private Key: 7
2,808,683 UART: [art] Extend RT PCRs Done
2,809,111 UART: [art] Lock RT PCRs Done
2,810,509 UART: [art] Populate DV Done
2,818,748 UART: [fht] FMC Alias Private Key: 7
2,819,830 UART: [art] Derive CDI
2,820,110 UART: [art] Store in in slot 0x4
2,905,963 UART: [art] Derive Key Pair
2,906,323 UART: [art] Store priv key in slot 0x5
2,919,919 UART: [art] Derive Key Pair - Done
2,934,890 UART: [art] Signing Cert with AUTHO
2,935,370 UART: RITY.KEYID = 7
2,950,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,747 UART: [art] PUB.X = 3857711E56AD33072F5E37C5F3039A074173CAE96F71BE89250B42B170DE55627B90CD045B1801E78CC2B3818EE20B67
2,958,492 UART: [art] PUB.Y = 81B22763212D0D9AD39562E824036095A3FA08FC666EA396F0FB994D5FDF7D9E6AD7B25BD121169C01DE7BDC0FC998C8
2,965,437 UART: [art] SIG.R = 4C617049BC6604473E400A35A3FF6BFDACD1D436A2E9873EEAB159A8E6C13AE64E9B5EEA3DE2ADC2B95E2D12FCDC1C5A
2,972,229 UART: [art] SIG.S = 10C7F80A7ABA853D643F74F49E72B45FDA261E783B6EF104D979261F5CBABF125453F7196B26A7BA400517F1A33E1C9B
2,996,049 UART: Caliptra RT
2,996,395 UART: [state] CFI Enabled
3,104,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,786 UART: [rt]cmd =0x50435245, len=56
3,136,507 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
891,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,157 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,237 UART: [idev] ++
1,173,405 UART: [idev] CDI.KEYID = 6
1,173,766 UART: [idev] SUBJECT.KEYID = 7
1,174,191 UART: [idev] UDS.KEYID = 0
1,174,537 ready_for_fw is high
1,174,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,285 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,215,870 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,256 UART: [fwproc] Wait for Commands...
1,281,895 UART: [fwproc] Recv command 0x46574c44
1,282,628 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,274 >>> mbox cmd response: success
2,773,274 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,355 UART: [afmc] ++
2,774,523 UART: [afmc] CDI.KEYID = 6
2,774,886 UART: [afmc] SUBJECT.KEYID = 7
2,775,312 UART: [afmc] AUTHORITY.KEYID = 5
2,811,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,457 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,978 UART: [afmc] --
2,854,928 UART: [cold-reset] --
2,855,666 UART: [state] Locking Datavault
2,856,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,535 UART: [state] Locking ICCM
2,857,957 UART: [exit] Launching FMC @ 0x40000130
2,863,286 UART:
2,863,302 UART: Running Caliptra FMC ...
2,863,710 UART:
2,863,764 UART: [state] CFI Enabled
2,873,801 UART: [fht] FMC Alias Private Key: 7
2,981,902 UART: [art] Extend RT PCRs Done
2,982,330 UART: [art] Lock RT PCRs Done
2,984,004 UART: [art] Populate DV Done
2,992,321 UART: [fht] FMC Alias Private Key: 7
2,993,387 UART: [art] Derive CDI
2,993,667 UART: [art] Store in in slot 0x4
3,079,140 UART: [art] Derive Key Pair
3,079,500 UART: [art] Store priv key in slot 0x5
3,092,882 UART: [art] Derive Key Pair - Done
3,107,849 UART: [art] Signing Cert with AUTHO
3,108,329 UART: RITY.KEYID = 7
3,123,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,550 UART: [art] PUB.X = 2F47E1F66AB7F06BAEA41E3D883F4636E60D13ECE19E64D259A60E3FB5A66B4ACA3296D711013AC578F35E71F59BCE7C
3,131,327 UART: [art] PUB.Y = F7FCF741B74B5FE533AD0E9ABD68BBD466A20AFE6D1F01E8F159878B74351F9B6BEA35C4889D9A1CE4F741A4BEAFC538
3,138,292 UART: [art] SIG.R = 4F63C322E85CC2CAD778BFB332D49B058473FF520924C9307037DBDD4F3D2401BCB0220A98BFA67334D4E9EE52242266
3,145,054 UART: [art] SIG.S = 33AEAFA12D535E7A0AF393DACCBAADBA1784EECC85CCF4F6203B84CD73CAD2F1289815B2E555072897C28C2EAB061E52
3,168,942 UART: Caliptra RT
3,169,196 UART: [state] CFI Enabled
3,277,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,907 UART: [rt]cmd =0x50435245, len=56
3,309,342 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,942 ready_for_fw is high
1,055,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,574 >>> mbox cmd response: success
2,620,574 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,683,238 UART:
2,683,254 UART: Running Caliptra FMC ...
2,683,662 UART:
2,683,716 UART: [state] CFI Enabled
2,693,899 UART: [fht] FMC Alias Private Key: 7
2,801,428 UART: [art] Extend RT PCRs Done
2,801,856 UART: [art] Lock RT PCRs Done
2,803,598 UART: [art] Populate DV Done
2,811,931 UART: [fht] FMC Alias Private Key: 7
2,813,033 UART: [art] Derive CDI
2,813,313 UART: [art] Store in in slot 0x4
2,899,134 UART: [art] Derive Key Pair
2,899,494 UART: [art] Store priv key in slot 0x5
2,912,852 UART: [art] Derive Key Pair - Done
2,927,823 UART: [art] Signing Cert with AUTHO
2,928,303 UART: RITY.KEYID = 7
2,943,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,190 UART: [art] PUB.X = 4A4D96D6EDCCE3E3505BD6C882CD3B1883336AD83DA7E04718D305054BA5A6A1D7E84DEE3CD1FDAC5A443944D1D3A14E
2,950,974 UART: [art] PUB.Y = DC05A8BE5E054DE36083B781BA722F71C2CAAA0CC8A2D5C6DAE81074B0394147A19A3BC0D1767D500FE7E32A155CA866
2,957,926 UART: [art] SIG.R = D31B0DB2F6F398A10BB604FD47D2E9D65BDB3D22F35B5E11F5DBB7F0E64FFE037B7F3ED0B47910D71F1239DFAE6D72D4
2,964,708 UART: [art] SIG.S = 8B7198E78F2583E8058F0AC760C5DCADD6A0733596576E41180FA6010DD0334A6FA8DC9E190ADC22CAC084946817E709
2,988,156 UART: Caliptra RT
2,988,410 UART: [state] CFI Enabled
3,095,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,786 UART: [rt]cmd =0x50435245, len=56
3,127,259 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,174,332 ready_for_fw is high
1,174,332 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,198,852 UART: [idev] Sha1 KeyId Algorithm
1,207,718 UART: [idev] --
1,208,685 UART: [ldev] ++
1,208,853 UART: [ldev] CDI.KEYID = 6
1,209,217 UART: [ldev] SUBJECT.KEYID = 5
1,209,644 UART: [ldev] AUTHORITY.KEYID = 7
1,210,107 UART: [ldev] FE.KEYID = 1
1,215,115 UART: [ldev] Erasing FE.KEYID = 1
1,241,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,349 UART: [ldev] --
1,280,823 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,303 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,105 >>> mbox cmd response: success
2,772,105 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,773,262 UART: [afmc] ++
2,773,430 UART: [afmc] CDI.KEYID = 6
2,773,793 UART: [afmc] SUBJECT.KEYID = 7
2,774,219 UART: [afmc] AUTHORITY.KEYID = 5
2,810,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,187 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,906 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,935 UART: [afmc] --
2,853,915 UART: [cold-reset] --
2,854,833 UART: [state] Locking Datavault
2,855,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,572 UART: [state] Locking ICCM
2,857,080 UART: [exit] Launching FMC @ 0x40000130
2,862,409 UART:
2,862,425 UART: Running Caliptra FMC ...
2,862,833 UART:
2,862,976 UART: [state] CFI Enabled
2,873,741 UART: [fht] FMC Alias Private Key: 7
2,981,838 UART: [art] Extend RT PCRs Done
2,982,266 UART: [art] Lock RT PCRs Done
2,983,730 UART: [art] Populate DV Done
2,992,087 UART: [fht] FMC Alias Private Key: 7
2,993,217 UART: [art] Derive CDI
2,993,497 UART: [art] Store in in slot 0x4
3,079,288 UART: [art] Derive Key Pair
3,079,648 UART: [art] Store priv key in slot 0x5
3,093,162 UART: [art] Derive Key Pair - Done
3,107,967 UART: [art] Signing Cert with AUTHO
3,108,447 UART: RITY.KEYID = 7
3,123,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,646 UART: [art] PUB.X = AF72BCCDD57BFE05D1BF5B150C7DFCF221A78265716745F58C09DA4C7EAEF8B98BB7AE93E30714F40FFEDB78F87FB1BC
3,131,431 UART: [art] PUB.Y = 99C89A161CE99EAC02093F9A5435186BE557B7A32EB3CF4D2BAEC65BF6685C5E662AC12D58858C6C147951107D6B76BE
3,138,383 UART: [art] SIG.R = 93AFA5F3FF74A214EA6B86176B10B92391F52AC78175A96B1AAFCEC9A4204E7D3AE8C4D9F02F0CF4E95449E9D22FC40D
3,145,165 UART: [art] SIG.S = E04FB802C608FE0A2CB3115E70884E0DB42CE427623BEA2DAB3FD2F688E197131A6E5E21270D69E6BDFE128279D43379
3,168,899 UART: Caliptra RT
3,169,245 UART: [state] CFI Enabled
3,278,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,665 UART: [rt]cmd =0x50435245, len=56
3,309,972 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,593 ready_for_fw is high
1,056,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,883 >>> mbox cmd response: success
2,623,883 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,451 UART:
2,687,467 UART: Running Caliptra FMC ...
2,687,875 UART:
2,688,018 UART: [state] CFI Enabled
2,698,611 UART: [fht] FMC Alias Private Key: 7
2,806,374 UART: [art] Extend RT PCRs Done
2,806,802 UART: [art] Lock RT PCRs Done
2,808,582 UART: [art] Populate DV Done
2,816,853 UART: [fht] FMC Alias Private Key: 7
2,817,855 UART: [art] Derive CDI
2,818,135 UART: [art] Store in in slot 0x4
2,904,090 UART: [art] Derive Key Pair
2,904,450 UART: [art] Store priv key in slot 0x5
2,917,856 UART: [art] Derive Key Pair - Done
2,932,570 UART: [art] Signing Cert with AUTHO
2,933,050 UART: RITY.KEYID = 7
2,947,978 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,743 UART: [art] PUB.X = AB31F4AE3E987A5E7FE1A65A6222B0FC6E6E2BB29B6CDFD7D5F3012795D1793E34E567841DF23833466E44035339753A
2,955,511 UART: [art] PUB.Y = E7E46930312A656A6113B2BD77209960D151E17A4C4F97B148AD73900AA22972726D27324A46E59A9123B9E28BD7D031
2,962,448 UART: [art] SIG.R = 09493714F8E6DB1668770ECF55B354E7D139DFCD478CB850B4D0BBC135E671B88090D662EA61C3C8B678034E065BBBA4
2,969,212 UART: [art] SIG.S = 7115E8E0DC3D8043BCB513F72C2192CEC97E9FAC0422C8318FBEE47EAE24D28E68053E884D01EED5FB26699D711DF38C
2,992,772 UART: Caliptra RT
2,993,118 UART: [state] CFI Enabled
3,100,124 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,515 UART: [rt]cmd =0x50435245, len=56
3,131,946 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,443 UART:
192,816 UART: Running Caliptra ROM ...
194,012 UART:
194,185 UART: [state] CFI Enabled
267,642 UART: [state] LifecycleState = Unprovisioned
269,631 UART: [state] DebugLocked = No
271,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,784 UART: [kat] SHA2-256
446,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,962 UART: [kat] ++
457,559 UART: [kat] sha1
467,866 UART: [kat] SHA2-256
470,574 UART: [kat] SHA2-384
476,478 UART: [kat] SHA2-512-ACC
478,835 UART: [kat] ECC-384
2,769,938 UART: [kat] HMAC-384Kdf
2,801,338 UART: [kat] LMS
3,991,663 UART: [kat] --
3,996,790 UART: [cold-reset] ++
3,998,526 UART: [fht] Storing FHT @ 0x50003400
4,009,796 UART: [idev] ++
4,010,360 UART: [idev] CDI.KEYID = 6
4,011,340 UART: [idev] SUBJECT.KEYID = 7
4,012,585 UART: [idev] UDS.KEYID = 0
4,013,666 ready_for_fw is high
4,013,879 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,612 UART: [idev] Erasing UDS.KEYID = 0
7,347,564 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,054 UART: [idev] --
7,375,807 UART: [ldev] ++
7,376,368 UART: [ldev] CDI.KEYID = 6
7,377,302 UART: [ldev] SUBJECT.KEYID = 5
7,378,560 UART: [ldev] AUTHORITY.KEYID = 7
7,379,839 UART: [ldev] FE.KEYID = 1
7,423,561 UART: [ldev] Erasing FE.KEYID = 1
10,759,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,077 UART: [ldev] --
13,136,011 UART: [fwproc] Waiting for Commands...
13,138,811 UART: [fwproc] Received command 0x46574c44
13,140,985 UART: [fwproc] Received Image of size 114036 bytes
17,192,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,062 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,655,925 >>> mbox cmd response: success
17,656,504 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,660,516 UART: [afmc] ++
17,661,099 UART: [afmc] CDI.KEYID = 6
17,662,266 UART: [afmc] SUBJECT.KEYID = 7
17,663,440 UART: [afmc] AUTHORITY.KEYID = 5
21,028,612 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,421 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,824 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,654 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,097 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,137 UART: [afmc] --
23,400,257 UART: [cold-reset] --
23,404,292 UART: [state] Locking Datavault
23,410,616 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,371 UART: [state] Locking ICCM
23,414,139 UART: [exit] Launching FMC @ 0x40000130
23,422,525 UART:
23,422,751 UART: Running Caliptra FMC ...
23,423,865 UART:
23,424,021 UART: [state] CFI Enabled
23,489,879 UART: [fht] FMC Alias Private Key: 7
25,827,570 UART: [art] Extend RT PCRs Done
25,828,790 UART: [art] Lock RT PCRs Done
25,830,278 UART: [art] Populate DV Done
25,835,573 UART: [fht] FMC Alias Private Key: 7
25,837,159 UART: [art] Derive CDI
25,837,963 UART: [art] Store in in slot 0x4
25,897,610 UART: [art] Derive Key Pair
25,898,642 UART: [art] Store priv key in slot 0x5
29,193,415 UART: [art] Derive Key Pair - Done
29,206,634 UART: [art] Signing Cert with AUTHO
29,207,935 UART: RITY.KEYID = 7
31,496,056 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,577 UART: [art] PUB.X = 38DAE9A6EAF6A09CFD1F05960639E1FC7A01E878FB090A95B0E9405290D12FE0F4CA3977AD7ED4752FF00BD4CDD4A4B0
31,504,836 UART: [art] PUB.Y = B63BCDD4D53EC4C745BCCD9BEB805D9125D42DF4E3BD0F39A182B58540A044145F32FDFF10A797803A7591AC68BB0484
31,512,120 UART: [art] SIG.R = CDAE005C7AD2FE4CC0D366C9EB8827E5A1A9BEA9D520933794767364EF5AA37891A3E1D6E64CC556BB98EC38C61A7669
31,519,497 UART: [art] SIG.S = 9FD0418FEB9DE16CCCCEF1AB34467C2872201C88D051ED872FE90F19CB1FA754A6F047C7FE075A9474A5707417427C07
32,824,510 UART: Caliptra RT
32,825,214 UART: [state] CFI Enabled
32,985,664 UART: [rt] RT listening for mailbox commands...
33,017,121 UART: [rt]cmd =0x50435251, len=36
34,192,330 >>> mbox cmd response data (1848 bytes)
34,201,430 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,231,953 UART: [rt]cmd =0x50435245, len=56
34,235,024 >>> mbox cmd response data (8 bytes)
34,235,964 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,266,078 UART: [rt]cmd =0x50435251, len=36
35,429,418 >>> mbox cmd response data (1848 bytes)
35,439,372 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,469,616 UART: [rt]cmd =0x50435245, len=56
35,472,766 >>> mbox cmd response data (8 bytes)
35,473,496 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,503,723 UART: [rt]cmd =0x50435251, len=36
36,667,163 >>> mbox cmd response data (1848 bytes)
36,676,073 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,706,542 UART: [rt]cmd =0x50435245, len=56
36,709,836 >>> mbox cmd response data (8 bytes)
36,710,387 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,740,369 UART: [rt]cmd =0x50435251, len=36
37,903,580 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,806,494 ready_for_fw is high
3,806,914 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,881,771 >>> mbox cmd response: success
17,882,529 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,575,886 UART:
23,576,270 UART: Running Caliptra FMC ...
23,577,393 UART:
23,577,540 UART: [state] CFI Enabled
23,641,747 UART: [fht] FMC Alias Private Key: 7
25,979,983 UART: [art] Extend RT PCRs Done
25,981,206 UART: [art] Lock RT PCRs Done
25,983,271 UART: [art] Populate DV Done
25,988,570 UART: [fht] FMC Alias Private Key: 7
25,990,273 UART: [art] Derive CDI
25,991,081 UART: [art] Store in in slot 0x4
26,050,608 UART: [art] Derive Key Pair
26,051,651 UART: [art] Store priv key in slot 0x5
29,344,460 UART: [art] Derive Key Pair - Done
29,357,618 UART: [art] Signing Cert with AUTHO
29,358,926 UART: RITY.KEYID = 7
31,646,661 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,180 UART: [art] PUB.X = B0E08EBBA52CFEA13B5F1E95881867DBAD967B286793F20FA52DD5B0DB46E14EC77E637C315DF94ECDE353429D1AB6B5
31,655,422 UART: [art] PUB.Y = D3865EC5DC77E008325C72FA817A620CB822B078BCBADD6C5EF214475F125578848B7B9972981FAA147202453E01A94C
31,662,647 UART: [art] SIG.R = 54681028D44E622D8296F6C8DB83F2F485C7DB718640652AD8FD5609DC81DF31345F3A56185DA3826748898DCF3ED6B6
31,670,022 UART: [art] SIG.S = 4E4531A628DC99EBEAB4210FC992FAAE6DFC2F8442274DB57CD384BEE1D7968A8A806180F31B01A4DCB8FE1B883AE3DE
32,975,167 UART: Caliptra RT
32,975,884 UART: [state] CFI Enabled
33,137,145 UART: [rt] RT listening for mailbox commands...
33,168,555 UART: [rt]cmd =0x50435251, len=36
34,344,531 >>> mbox cmd response data (1848 bytes)
34,353,431 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,383,782 UART: [rt]cmd =0x50435245, len=56
34,386,943 >>> mbox cmd response data (8 bytes)
34,387,854 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,417,707 UART: [rt]cmd =0x50435251, len=36
35,581,178 >>> mbox cmd response data (1848 bytes)
35,591,158 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,621,261 UART: [rt]cmd =0x50435245, len=56
35,624,343 >>> mbox cmd response data (8 bytes)
35,625,053 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,655,308 UART: [rt]cmd =0x50435251, len=36
36,819,403 >>> mbox cmd response data (1848 bytes)
36,828,324 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,858,663 UART: [rt]cmd =0x50435245, len=56
36,862,047 >>> mbox cmd response data (8 bytes)
36,862,608 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,892,485 UART: [rt]cmd =0x50435251, len=36
38,056,367 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,459 UART:
192,820 UART: Running Caliptra ROM ...
193,957 UART:
603,599 UART: [state] CFI Enabled
615,757 UART: [state] LifecycleState = Unprovisioned
617,742 UART: [state] DebugLocked = No
619,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,845 UART: [kat] SHA2-256
793,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,165 UART: [kat] ++
804,716 UART: [kat] sha1
816,089 UART: [kat] SHA2-256
818,812 UART: [kat] SHA2-384
825,080 UART: [kat] SHA2-512-ACC
827,452 UART: [kat] ECC-384
3,111,432 UART: [kat] HMAC-384Kdf
3,123,152 UART: [kat] LMS
4,313,203 UART: [kat] --
4,316,168 UART: [cold-reset] ++
4,318,813 UART: [fht] Storing FHT @ 0x50003400
4,331,634 UART: [idev] ++
4,332,277 UART: [idev] CDI.KEYID = 6
4,333,161 UART: [idev] SUBJECT.KEYID = 7
4,334,357 UART: [idev] UDS.KEYID = 0
4,335,360 ready_for_fw is high
4,335,574 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,830 UART: [idev] Erasing UDS.KEYID = 0
7,618,454 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,115 UART: [idev] --
7,643,165 UART: [ldev] ++
7,644,018 UART: [ldev] CDI.KEYID = 6
7,644,933 UART: [ldev] SUBJECT.KEYID = 5
7,646,057 UART: [ldev] AUTHORITY.KEYID = 7
7,647,153 UART: [ldev] FE.KEYID = 1
7,658,361 UART: [ldev] Erasing FE.KEYID = 1
10,949,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,034 UART: [ldev] --
13,310,922 UART: [fwproc] Waiting for Commands...
13,314,004 UART: [fwproc] Received command 0x46574c44
13,316,189 UART: [fwproc] Received Image of size 114036 bytes
17,374,967 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,353 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,737 >>> mbox cmd response: success
17,832,325 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,835,424 UART: [afmc] ++
17,836,005 UART: [afmc] CDI.KEYID = 6
17,836,896 UART: [afmc] SUBJECT.KEYID = 7
17,838,162 UART: [afmc] AUTHORITY.KEYID = 5
21,154,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,180 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,581 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,416 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,865 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,122 UART: [afmc] --
23,518,422 UART: [cold-reset] --
23,521,363 UART: [state] Locking Datavault
23,528,066 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,815 UART: [state] Locking ICCM
23,531,885 UART: [exit] Launching FMC @ 0x40000130
23,540,286 UART:
23,540,520 UART: Running Caliptra FMC ...
23,541,542 UART:
23,541,689 UART: [state] CFI Enabled
23,549,896 UART: [fht] FMC Alias Private Key: 7
25,881,429 UART: [art] Extend RT PCRs Done
25,882,646 UART: [art] Lock RT PCRs Done
25,884,366 UART: [art] Populate DV Done
25,889,818 UART: [fht] FMC Alias Private Key: 7
25,891,433 UART: [art] Derive CDI
25,892,248 UART: [art] Store in in slot 0x4
25,934,365 UART: [art] Derive Key Pair
25,935,361 UART: [art] Store priv key in slot 0x5
29,177,638 UART: [art] Derive Key Pair - Done
29,190,586 UART: [art] Signing Cert with AUTHO
29,191,886 UART: RITY.KEYID = 7
31,471,132 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,640 UART: [art] PUB.X = C4EEFCDC4D2CC22B78BBA47DCDDFDB092018A70DD6106341B8B768A209E566C71F4DB15E100B53FB748CBD67EFC7A932
31,479,922 UART: [art] PUB.Y = 9CE04F14C440B8970BA922F9EBBA82657DC456A110600AFC5B1CF0570C80AEAAE2B7C3B92F999CD6287DE34C6ECDA420
31,487,175 UART: [art] SIG.R = 0E6ACC7AA75576EA6EBEF3BB58B240E5DA7C23C945C01758D3BDFE129764ADBE5729FD3DD040AF5C09A2BC1256DEA853
31,494,565 UART: [art] SIG.S = 5BD374A944A12E10E887A60DA9C218534A5C5305DFE234FA35D50F96481416AF0FCDE2B2073736E0F5B226EA53C47C34
32,799,805 UART: Caliptra RT
32,800,505 UART: [state] CFI Enabled
32,918,425 UART: [rt] RT listening for mailbox commands...
32,949,869 UART: [rt]cmd =0x50435251, len=36
34,105,340 >>> mbox cmd response data (1848 bytes)
34,114,273 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,144,605 UART: [rt]cmd =0x50435245, len=56
34,147,769 >>> mbox cmd response data (8 bytes)
34,148,682 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,178,531 UART: [rt]cmd =0x50435251, len=36
35,333,586 >>> mbox cmd response data (1848 bytes)
35,343,583 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,373,847 UART: [rt]cmd =0x50435245, len=56
35,377,141 >>> mbox cmd response data (8 bytes)
35,377,862 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,407,930 UART: [rt]cmd =0x50435251, len=36
36,563,134 >>> mbox cmd response data (1848 bytes)
36,572,036 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,602,417 UART: [rt]cmd =0x50435245, len=56
36,605,333 >>> mbox cmd response data (8 bytes)
36,605,947 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,635,939 UART: [rt]cmd =0x50435251, len=36
37,791,469 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,127,697 ready_for_fw is high
4,128,105 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,190 >>> mbox cmd response: success
18,071,986 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,711,166 UART:
23,711,542 UART: Running Caliptra FMC ...
23,712,648 UART:
23,712,801 UART: [state] CFI Enabled
23,720,755 UART: [fht] FMC Alias Private Key: 7
26,051,510 UART: [art] Extend RT PCRs Done
26,052,735 UART: [art] Lock RT PCRs Done
26,054,659 UART: [art] Populate DV Done
26,059,990 UART: [fht] FMC Alias Private Key: 7
26,061,695 UART: [art] Derive CDI
26,062,438 UART: [art] Store in in slot 0x4
26,105,312 UART: [art] Derive Key Pair
26,106,355 UART: [art] Store priv key in slot 0x5
29,348,408 UART: [art] Derive Key Pair - Done
29,361,395 UART: [art] Signing Cert with AUTHO
29,362,737 UART: RITY.KEYID = 7
31,642,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,846 UART: [art] PUB.X = 13DC48107B9DC70DBAD214B0A210019BD8BDC13CEC8F64AD898CC229B7E1F99466B909D457BDCE96EF7F5350CC09F5BF
31,651,123 UART: [art] PUB.Y = F6BE5295DB6604883B010F54E8302930D68C6052738C98F8ADC42BF11A802A2B7C0DDAA9D8C44EAF31A2E4237E117A59
31,658,338 UART: [art] SIG.R = 216E818122F8C52072503C2B76015D05605CC805A0C208EE4D52A0208B34F7B59612700C3823E7280D79C7AECE736D5C
31,665,732 UART: [art] SIG.S = 4A506FB3FA724D818B4398C38A992A87835653C5B7F3434F32516AF98016C8F3836F03484A3A8E5E76190E861DF7151A
32,970,887 UART: Caliptra RT
32,971,872 UART: [state] CFI Enabled
33,089,941 UART: [rt] RT listening for mailbox commands...
33,121,220 UART: [rt]cmd =0x50435251, len=36
34,276,596 >>> mbox cmd response data (1848 bytes)
34,285,633 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,316,048 UART: [rt]cmd =0x50435245, len=56
34,318,945 >>> mbox cmd response data (8 bytes)
34,319,979 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,349,978 UART: [rt]cmd =0x50435251, len=36
35,505,328 >>> mbox cmd response data (1848 bytes)
35,515,533 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,545,741 UART: [rt]cmd =0x50435245, len=56
35,548,750 >>> mbox cmd response data (8 bytes)
35,549,477 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,579,515 UART: [rt]cmd =0x50435251, len=36
36,735,180 >>> mbox cmd response data (1848 bytes)
36,744,106 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,774,277 UART: [rt]cmd =0x50435245, len=56
36,777,530 >>> mbox cmd response data (8 bytes)
36,778,087 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,808,201 UART: [rt]cmd =0x50435251, len=36
37,963,390 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,317 writing to cptra_bootfsm_go
193,602 UART:
193,956 UART: Running Caliptra ROM ...
195,149 UART:
195,303 UART: [state] CFI Enabled
263,525 UART: [state] LifecycleState = Unprovisioned
265,380 UART: [state] DebugLocked = No
267,494 UART: [state] WD Timer not started. Device not locked for debugging
271,311 UART: [kat] SHA2-256
450,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,017 UART: [kat] ++
462,576 UART: [kat] sha1
473,035 UART: [kat] SHA2-256
476,046 UART: [kat] SHA2-384
482,835 UART: [kat] SHA2-512-ACC
485,803 UART: [kat] ECC-384
2,951,894 UART: [kat] HMAC-384Kdf
2,974,415 UART: [kat] LMS
3,503,908 UART: [kat] --
3,507,997 UART: [cold-reset] ++
3,510,285 UART: [fht] FHT @ 0x50003400
3,520,974 UART: [idev] ++
3,521,702 UART: [idev] CDI.KEYID = 6
3,522,621 UART: [idev] SUBJECT.KEYID = 7
3,523,734 UART: [idev] UDS.KEYID = 0
3,524,635 ready_for_fw is high
3,524,841 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,600 UART: [idev] Erasing UDS.KEYID = 0
6,027,717 UART: [idev] Sha1 KeyId Algorithm
6,050,471 UART: [idev] --
6,054,309 UART: [ldev] ++
6,054,879 UART: [ldev] CDI.KEYID = 6
6,055,820 UART: [ldev] SUBJECT.KEYID = 5
6,056,980 UART: [ldev] AUTHORITY.KEYID = 7
6,058,270 UART: [ldev] FE.KEYID = 1
6,102,496 UART: [ldev] Erasing FE.KEYID = 1
8,606,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,207 UART: [ldev] --
10,415,880 UART: [fwproc] Wait for Commands...
10,417,993 UART: [fwproc] Recv command 0x46574c44
10,420,089 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,280,156 >>> mbox cmd response: success
14,280,710 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,284,230 UART: [afmc] ++
14,284,824 UART: [afmc] CDI.KEYID = 6
14,285,742 UART: [afmc] SUBJECT.KEYID = 7
14,286,904 UART: [afmc] AUTHORITY.KEYID = 5
16,824,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,277 UART: [afmc] --
18,624,141 UART: [cold-reset] --
18,628,497 UART: [state] Locking Datavault
18,632,021 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,667 UART: [state] Locking ICCM
18,634,844 UART: [exit] Launching FMC @ 0x40000130
18,643,299 UART:
18,643,572 UART: Running Caliptra FMC ...
18,644,685 UART:
18,644,840 UART: [state] CFI Enabled
18,704,439 UART: [fht] FMC Alias Private Key: 7
20,467,931 UART: [art] Extend RT PCRs Done
20,469,146 UART: [art] Lock RT PCRs Done
20,470,661 UART: [art] Populate DV Done
20,476,182 UART: [fht] FMC Alias Private Key: 7
20,477,905 UART: [art] Derive CDI
20,478,725 UART: [art] Store in in slot 0x4
20,536,557 UART: [art] Derive Key Pair
20,537,599 UART: [art] Store priv key in slot 0x5
23,000,667 UART: [art] Derive Key Pair - Done
23,014,200 UART: [art] Signing Cert with AUTHO
23,015,508 UART: RITY.KEYID = 7
24,726,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,805 UART: [art] PUB.X = 8AA6E23FD7E9D336101D5AE086A6BC77BD46DD3495F062D28F8A07D1D98B2AF4922F11B0B962F247200ECDCB2C55079A
24,735,097 UART: [art] PUB.Y = E8F574865452A520176C50BEE0E7A3B680A2DCC64195CC821120D3B5B4B00A1A6A7B70D260BFB24B2282AADF60A33028
24,742,373 UART: [art] SIG.R = 1F3F9D18DEB471ABB5C63D3E1B01D28CFF7E0579FBC1FC74424A9A6E69364695D80A257ED1B5267412552F9CDF372BFD
24,749,760 UART: [art] SIG.S = 0FF9D90E99C2A1BA89442D8C8245767F5D023486ECBD8AE847DE07A2B5B63FFB2048B4491E7B8EBA40639E7D32E9EEFF
25,729,299 UART: Caliptra RT
25,729,984 UART: [state] CFI Enabled
25,893,938 UART: [rt] RT listening for mailbox commands...
25,925,238 UART: [rt]cmd =0x50435251, len=36
26,853,925 >>> mbox cmd response data (1848 bytes)
26,862,843 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,893,016 UART: [rt]cmd =0x50435245, len=56
26,896,190 >>> mbox cmd response data (8 bytes)
26,896,825 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,926,799 UART: [rt]cmd =0x50435251, len=36
27,855,980 >>> mbox cmd response data (1848 bytes)
27,865,958 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,896,201 UART: [rt]cmd =0x50435245, len=56
27,899,393 >>> mbox cmd response data (8 bytes)
27,900,084 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,930,217 UART: [rt]cmd =0x50435251, len=36
28,858,622 >>> mbox cmd response data (1848 bytes)
28,867,539 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,897,983 UART: [rt]cmd =0x50435245, len=56
28,901,251 >>> mbox cmd response data (8 bytes)
28,901,870 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,931,745 UART: [rt]cmd =0x50435251, len=36
29,840,132 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,518 UART:
192,905 UART: Running Caliptra ROM ...
194,124 UART:
194,290 UART: [state] CFI Enabled
267,883 UART: [state] LifecycleState = Unprovisioned
270,284 UART: [state] DebugLocked = No
272,031 UART: [state] WD Timer not started. Device not locked for debugging
275,999 UART: [kat] SHA2-256
465,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,637 UART: [kat] ++
477,175 UART: [kat] sha1
489,408 UART: [kat] SHA2-256
492,487 UART: [kat] SHA2-384
499,995 UART: [kat] SHA2-512-ACC
502,547 UART: [kat] ECC-384
2,948,548 UART: [kat] HMAC-384Kdf
2,972,148 UART: [kat] LMS
3,503,907 UART: [kat] --
3,505,789 UART: [cold-reset] ++
3,508,369 UART: [fht] FHT @ 0x50003400
3,519,278 UART: [idev] ++
3,519,991 UART: [idev] CDI.KEYID = 6
3,520,943 UART: [idev] SUBJECT.KEYID = 7
3,522,115 UART: [idev] UDS.KEYID = 0
3,523,016 ready_for_fw is high
3,523,217 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,036 UART: [idev] Erasing UDS.KEYID = 0
6,030,381 UART: [idev] Sha1 KeyId Algorithm
6,053,073 UART: [idev] --
6,057,669 UART: [ldev] ++
6,058,410 UART: [ldev] CDI.KEYID = 6
6,059,343 UART: [ldev] SUBJECT.KEYID = 5
6,060,505 UART: [ldev] AUTHORITY.KEYID = 7
6,061,687 UART: [ldev] FE.KEYID = 1
6,099,905 UART: [ldev] Erasing FE.KEYID = 1
8,609,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,470 UART: [ldev] --
10,414,652 UART: [fwproc] Wait for Commands...
10,416,541 UART: [fwproc] Recv command 0x46574c44
10,418,851 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,608,801 >>> mbox cmd response: success
14,609,338 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,612,591 UART: [afmc] ++
14,613,311 UART: [afmc] CDI.KEYID = 6
14,614,503 UART: [afmc] SUBJECT.KEYID = 7
14,615,944 UART: [afmc] AUTHORITY.KEYID = 5
17,151,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,911 UART: [afmc] --
18,946,801 UART: [cold-reset] --
18,951,164 UART: [state] Locking Datavault
18,957,072 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,215 UART: [state] Locking ICCM
18,961,746 UART: [exit] Launching FMC @ 0x40000130
18,970,416 UART:
18,970,678 UART: Running Caliptra FMC ...
18,971,783 UART:
18,971,946 UART: [state] CFI Enabled
19,023,209 UART: [fht] FMC Alias Private Key: 7
20,787,387 UART: [art] Extend RT PCRs Done
20,788,606 UART: [art] Lock RT PCRs Done
20,790,201 UART: [art] Populate DV Done
20,795,445 UART: [fht] FMC Alias Private Key: 7
20,796,982 UART: [art] Derive CDI
20,797,800 UART: [art] Store in in slot 0x4
20,856,059 UART: [art] Derive Key Pair
20,857,100 UART: [art] Store priv key in slot 0x5
23,319,549 UART: [art] Derive Key Pair - Done
23,332,487 UART: [art] Signing Cert with AUTHO
23,333,793 UART: RITY.KEYID = 7
25,045,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,046,675 UART: [art] PUB.X = C4D1C7030B4239150DF59FFC7F3190A3072D5511A08207D0E59A9E0BC7306EC2F736DB74DE1D1224D2336EA30E5C18E2
25,053,980 UART: [art] PUB.Y = 0B36DF54088CFB774E9161B2F0B827417A96EECABBE2B81E447E01F7AC7EDC0F7542C289E4786B25A289F7D10A71BCB6
25,061,246 UART: [art] SIG.R = CF4F8AD544BF587ACA3EF2F84F1038D37A9AF1249F3AA8C52342FAE09E930C5456E48C52D9319A255BE7D0E7FC19075F
25,068,638 UART: [art] SIG.S = 91FA681BD728C1733323C7AB0A77EF824E3F68D531A8EBD2CB373380D8D00A46F925E3875124D3EC3F2064855496714F
26,047,709 UART: Caliptra RT
26,048,397 UART: [state] CFI Enabled
26,214,784 UART: [rt] RT listening for mailbox commands...
26,246,136 UART: [rt]cmd =0x50435251, len=36
27,172,790 >>> mbox cmd response data (1848 bytes)
27,181,691 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,211,689 UART: [rt]cmd =0x50435245, len=56
27,214,608 >>> mbox cmd response data (8 bytes)
27,215,410 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,245,738 UART: [rt]cmd =0x50435251, len=36
28,153,821 >>> mbox cmd response data (1848 bytes)
28,163,809 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,194,197 UART: [rt]cmd =0x50435245, len=56
28,197,263 >>> mbox cmd response data (8 bytes)
28,197,923 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,227,855 UART: [rt]cmd =0x50435251, len=36
29,156,450 >>> mbox cmd response data (1848 bytes)
29,165,376 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,195,490 UART: [rt]cmd =0x50435245, len=56
29,198,406 >>> mbox cmd response data (8 bytes)
29,198,967 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,228,815 UART: [rt]cmd =0x50435251, len=36
30,137,392 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,438,305 ready_for_fw is high
3,438,693 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,730,932 >>> mbox cmd response: success
14,731,553 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,049,975 UART:
19,050,364 UART: Running Caliptra FMC ...
19,051,562 UART:
19,051,728 UART: [state] CFI Enabled
19,118,128 UART: [fht] FMC Alias Private Key: 7
20,882,146 UART: [art] Extend RT PCRs Done
20,883,383 UART: [art] Lock RT PCRs Done
20,885,124 UART: [art] Populate DV Done
20,890,376 UART: [fht] FMC Alias Private Key: 7
20,892,082 UART: [art] Derive CDI
20,892,910 UART: [art] Store in in slot 0x4
20,951,133 UART: [art] Derive Key Pair
20,952,180 UART: [art] Store priv key in slot 0x5
23,414,701 UART: [art] Derive Key Pair - Done
23,427,878 UART: [art] Signing Cert with AUTHO
23,429,184 UART: RITY.KEYID = 7
25,140,877 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,386 UART: [art] PUB.X = 0E60CF785179A0566591A5EE26DFDEA63B4BDABDD30C5CE943C8C428EE645A7AE85BAD01E3DCF3926FF70E7C90F55688
25,149,675 UART: [art] PUB.Y = 6FCB44EAEBAB3CF33477803FE12C9EFB2D7D97C41B07889C77CC5ABD76336C36DBD15D4BFD09B2A213BF7B22211263BE
25,156,970 UART: [art] SIG.R = 4599B216E327A4389BE8E55C9128932A75EACF984FBA157744C63C7BD13A16B32B66AA30EC222A1DEFF1E7AA317234C0
25,164,347 UART: [art] SIG.S = 9E5E175ABF5A3C19CB17B05D3194C91C04388064F48F72A9C7EADA7D2088C48AC80F8B26A188154C6DBC92517604C03C
26,142,665 UART: Caliptra RT
26,143,380 UART: [state] CFI Enabled
26,308,858 UART: [rt] RT listening for mailbox commands...
26,340,169 UART: [rt]cmd =0x50435251, len=36
27,268,802 >>> mbox cmd response data (1848 bytes)
27,277,699 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,307,911 UART: [rt]cmd =0x50435245, len=56
27,311,036 >>> mbox cmd response data (8 bytes)
27,311,761 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,341,712 UART: [rt]cmd =0x50435251, len=36
28,250,108 >>> mbox cmd response data (1848 bytes)
28,260,060 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,290,369 UART: [rt]cmd =0x50435245, len=56
28,293,562 >>> mbox cmd response data (8 bytes)
28,294,264 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,324,258 UART: [rt]cmd =0x50435251, len=36
29,253,026 >>> mbox cmd response data (1848 bytes)
29,262,127 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,292,424 UART: [rt]cmd =0x50435245, len=56
29,295,713 >>> mbox cmd response data (8 bytes)
29,296,287 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,326,643 UART: [rt]cmd =0x50435251, len=36
30,255,279 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
192,414 UART:
192,873 UART: Running Caliptra ROM ...
194,009 UART:
603,659 UART: [state] CFI Enabled
615,845 UART: [state] LifecycleState = Unprovisioned
618,222 UART: [state] DebugLocked = No
619,598 UART: [state] WD Timer not started. Device not locked for debugging
623,349 UART: [kat] SHA2-256
813,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,803 UART: [kat] ++
824,322 UART: [kat] sha1
836,261 UART: [kat] SHA2-256
839,269 UART: [kat] SHA2-384
845,329 UART: [kat] SHA2-512-ACC
847,916 UART: [kat] ECC-384
3,288,055 UART: [kat] HMAC-384Kdf
3,299,890 UART: [kat] LMS
3,831,688 UART: [kat] --
3,836,335 UART: [cold-reset] ++
3,838,295 UART: [fht] FHT @ 0x50003400
3,851,265 UART: [idev] ++
3,851,972 UART: [idev] CDI.KEYID = 6
3,853,001 UART: [idev] SUBJECT.KEYID = 7
3,854,106 UART: [idev] UDS.KEYID = 0
3,855,032 ready_for_fw is high
3,855,242 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,998,913 UART: [idev] Erasing UDS.KEYID = 0
6,330,006 UART: [idev] Sha1 KeyId Algorithm
6,352,692 UART: [idev] --
6,357,325 UART: [ldev] ++
6,358,001 UART: [ldev] CDI.KEYID = 6
6,358,967 UART: [ldev] SUBJECT.KEYID = 5
6,360,141 UART: [ldev] AUTHORITY.KEYID = 7
6,361,319 UART: [ldev] FE.KEYID = 1
6,372,773 UART: [ldev] Erasing FE.KEYID = 1
8,852,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,152 UART: [ldev] --
10,641,322 UART: [fwproc] Wait for Commands...
10,644,392 UART: [fwproc] Recv command 0x46574c44
10,646,693 UART: [fwproc] Recv'd Img size: 114360 bytes
14,093,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,831,260 >>> mbox cmd response: success
14,831,812 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,835,655 UART: [afmc] ++
14,836,353 UART: [afmc] CDI.KEYID = 6
14,837,508 UART: [afmc] SUBJECT.KEYID = 7
14,839,040 UART: [afmc] AUTHORITY.KEYID = 5
17,341,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,821 UART: [afmc] --
19,136,055 UART: [cold-reset] --
19,140,034 UART: [state] Locking Datavault
19,146,249 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,432 UART: [state] Locking ICCM
19,149,948 UART: [exit] Launching FMC @ 0x40000130
19,158,612 UART:
19,158,847 UART: Running Caliptra FMC ...
19,159,945 UART:
19,160,100 UART: [state] CFI Enabled
19,168,087 UART: [fht] FMC Alias Private Key: 7
20,924,634 UART: [art] Extend RT PCRs Done
20,925,856 UART: [art] Lock RT PCRs Done
20,927,480 UART: [art] Populate DV Done
20,932,777 UART: [fht] FMC Alias Private Key: 7
20,934,264 UART: [art] Derive CDI
20,935,025 UART: [art] Store in in slot 0x4
20,977,830 UART: [art] Derive Key Pair
20,978,869 UART: [art] Store priv key in slot 0x5
23,405,952 UART: [art] Derive Key Pair - Done
23,419,168 UART: [art] Signing Cert with AUTHO
23,420,486 UART: RITY.KEYID = 7
25,125,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,193 UART: [art] PUB.X = 02D420F6CED84FAA4FBDEB7CE576E1315B3369E4ADD56C64BE8D80AF5316BCAD9973333368E1D7FD16BE47B26CCAE1D4
25,134,444 UART: [art] PUB.Y = F22B67AF14B072D70F685E3EFFD48B0AA49DEAFCF309B71366003BF629CAF48FEB4206AC7C23BDE30F335AB716CB80A3
25,141,781 UART: [art] SIG.R = B20A9656A9A94BC36BBA61E3A0641C61E5E3C0CB8E008179C6942375CBDEB424FE4333A543706D70C3B1C843583A51A9
25,149,123 UART: [art] SIG.S = 032F9CE7B6B8BB5A4B3A0C0F02B09BAD912E861671A76874452B8FDC88B15EFCB1CE3D9112F4F90ECE01E100397DB48D
26,127,677 UART: Caliptra RT
26,128,367 UART: [state] CFI Enabled
26,245,632 UART: [rt] RT listening for mailbox commands...
26,276,849 UART: [rt]cmd =0x50435251, len=36
27,184,949 >>> mbox cmd response data (1848 bytes)
27,194,027 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,224,326 UART: [rt]cmd =0x50435245, len=56
27,227,355 >>> mbox cmd response data (8 bytes)
27,228,205 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,258,126 UART: [rt]cmd =0x50435251, len=36
28,166,107 >>> mbox cmd response data (1848 bytes)
28,176,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,206,562 UART: [rt]cmd =0x50435245, len=56
28,209,597 >>> mbox cmd response data (8 bytes)
28,210,303 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,240,420 UART: [rt]cmd =0x50435251, len=36
29,148,523 >>> mbox cmd response data (1848 bytes)
29,157,425 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,187,811 UART: [rt]cmd =0x50435245, len=56
29,190,719 >>> mbox cmd response data (8 bytes)
29,191,216 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,221,386 UART: [rt]cmd =0x50435251, len=36
30,129,319 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,755,103 ready_for_fw is high
3,755,486 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,949,343 >>> mbox cmd response: success
14,950,206 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,207,952 UART:
19,208,332 UART: Running Caliptra FMC ...
19,209,434 UART:
19,209,603 UART: [state] CFI Enabled
19,217,487 UART: [fht] FMC Alias Private Key: 7
20,974,718 UART: [art] Extend RT PCRs Done
20,975,939 UART: [art] Lock RT PCRs Done
20,977,532 UART: [art] Populate DV Done
20,983,041 UART: [fht] FMC Alias Private Key: 7
20,984,572 UART: [art] Derive CDI
20,985,311 UART: [art] Store in in slot 0x4
21,028,089 UART: [art] Derive Key Pair
21,029,090 UART: [art] Store priv key in slot 0x5
23,456,004 UART: [art] Derive Key Pair - Done
23,469,271 UART: [art] Signing Cert with AUTHO
23,470,613 UART: RITY.KEYID = 7
25,175,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,332 UART: [art] PUB.X = C5F852BA754FFDD4BE5A34F757445DD1A3234BF04BF3B0587D09FF970F3F7695E473534BC8D2B2C837BB9C144DF3F8CF
25,184,630 UART: [art] PUB.Y = AE2C3C54995754D9B689A4E0A58CBD365AE58A569B6E4A3EF0B2B33F722D8A8271C0B8F4DD68177D41D1B927A161736B
25,191,895 UART: [art] SIG.R = 68E098A2795652B985165DED4F6ADA3B672784A3DE0E81B02374024E31AD5FCFC0D759A00513986B37E9405B2911916C
25,199,279 UART: [art] SIG.S = 30C5B99E991BDDB2BA1B4BFDFC2A7E8A59D2C0DE74DADA3183FB31B2691AA0CFA3925A76D3DA9A4DFF9FF22DB805DD8E
26,178,299 UART: Caliptra RT
26,179,009 UART: [state] CFI Enabled
26,296,328 UART: [rt] RT listening for mailbox commands...
26,327,657 UART: [rt]cmd =0x50435251, len=36
27,235,649 >>> mbox cmd response data (1848 bytes)
27,244,516 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,274,885 UART: [rt]cmd =0x50435245, len=56
27,278,066 >>> mbox cmd response data (8 bytes)
27,279,003 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,309,010 UART: [rt]cmd =0x50435251, len=36
28,216,778 >>> mbox cmd response data (1848 bytes)
28,226,720 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,257,040 UART: [rt]cmd =0x50435245, len=56
28,260,344 >>> mbox cmd response data (8 bytes)
28,261,067 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,291,094 UART: [rt]cmd =0x50435251, len=36
29,198,892 >>> mbox cmd response data (1848 bytes)
29,207,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,238,066 UART: [rt]cmd =0x50435245, len=56
29,240,908 >>> mbox cmd response data (8 bytes)
29,241,405 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,271,543 UART: [rt]cmd =0x50435251, len=36
30,179,456 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
894,946 UART: [kat] SHA2-512-ACC
896,847 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,256 UART: [kat] LMS
1,475,452 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 ready_for_fw is high
1,480,797 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,505,244 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,034 UART: [idev] --
1,515,097 UART: [ldev] ++
1,515,265 UART: [ldev] CDI.KEYID = 6
1,515,628 UART: [ldev] SUBJECT.KEYID = 5
1,516,054 UART: [ldev] AUTHORITY.KEYID = 7
1,516,517 UART: [ldev] FE.KEYID = 1
1,521,851 UART: [ldev] Erasing FE.KEYID = 1
1,547,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,968 UART: [ldev] --
1,586,269 UART: [fwproc] Waiting for Commands...
1,586,938 UART: [fwproc] Received command 0x46574c44
1,587,729 UART: [fwproc] Received Image of size 114360 bytes
2,886,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,346 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,687 >>> mbox cmd response: success
3,078,687 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,079,857 UART: [afmc] ++
3,080,025 UART: [afmc] CDI.KEYID = 6
3,080,387 UART: [afmc] SUBJECT.KEYID = 7
3,080,812 UART: [afmc] AUTHORITY.KEYID = 5
3,116,399 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,281 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,674 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,364 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,277 UART: [afmc] --
3,159,261 UART: [cold-reset] --
3,160,071 UART: [state] Locking Datavault
3,161,220 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,824 UART: [state] Locking ICCM
3,162,382 UART: [exit] Launching FMC @ 0x40000130
3,167,711 UART:
3,167,727 UART: Running Caliptra FMC ...
3,168,135 UART:
3,168,189 UART: [state] CFI Enabled
3,178,702 UART: [fht] FMC Alias Private Key: 7
3,286,773 UART: [art] Extend RT PCRs Done
3,287,201 UART: [art] Lock RT PCRs Done
3,288,799 UART: [art] Populate DV Done
3,296,974 UART: [fht] FMC Alias Private Key: 7
3,297,904 UART: [art] Derive CDI
3,298,184 UART: [art] Store in in slot 0x4
3,383,917 UART: [art] Derive Key Pair
3,384,277 UART: [art] Store priv key in slot 0x5
3,396,759 UART: [art] Derive Key Pair - Done
3,411,645 UART: [art] Signing Cert with AUTHO
3,412,125 UART: RITY.KEYID = 7
3,428,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,852 UART: [art] PUB.X = 96F7393A7A0F625A415AE572A40C64290D8662B5D8E073D7C7418E5D49C03F7471CB714BBC0FCA54D16A4076F60D209C
3,435,609 UART: [art] PUB.Y = 76B8F520AECD477DFE287A96B5CDB10BB007E15B63704D297AF09B706724901B9B3A796D36566C1A0FB303F337C9F512
3,442,551 UART: [art] SIG.R = 94231856CE540F3DAA3692A3997B345AB3C4A567C6AD2F5FF16A704FB8AD626DB14FD525E7536F45F6BB9BF2C663C732
3,449,328 UART: [art] SIG.S = 24B778C356921F42038CB12344B493C535CC499617D6D01E25BA9D38B408A3A3DFB8898337EFD85F404EA2D01367B655
3,472,629 UART: Caliptra RT
3,472,883 UART: [state] CFI Enabled
3,581,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,520 UART: [rt]cmd =0x50435251, len=36
3,778,769 >>> mbox cmd response data (1848 bytes)
3,778,770 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,391 UART: [rt]cmd =0x50435245, len=56
3,811,987 >>> mbox cmd response data (8 bytes)
3,811,988 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,741 UART: [rt]cmd =0x50435251, len=36
4,009,420 >>> mbox cmd response data (1848 bytes)
4,009,421 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,016 UART: [rt]cmd =0x50435245, len=56
4,042,790 >>> mbox cmd response data (8 bytes)
4,042,791 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,366 UART: [rt]cmd =0x50435251, len=36
4,239,519 >>> mbox cmd response data (1848 bytes)
4,239,520 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,187 UART: [rt]cmd =0x50435245, len=56
4,272,689 >>> mbox cmd response data (8 bytes)
4,272,690 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,302,285 UART: [rt]cmd =0x50435251, len=36
4,470,018 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,353 ready_for_fw is high
1,362,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,387 >>> mbox cmd response: success
2,928,387 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,990,353 UART:
2,990,369 UART: Running Caliptra FMC ...
2,990,777 UART:
2,990,831 UART: [state] CFI Enabled
3,001,526 UART: [fht] FMC Alias Private Key: 7
3,109,741 UART: [art] Extend RT PCRs Done
3,110,169 UART: [art] Lock RT PCRs Done
3,111,819 UART: [art] Populate DV Done
3,119,980 UART: [fht] FMC Alias Private Key: 7
3,121,094 UART: [art] Derive CDI
3,121,374 UART: [art] Store in in slot 0x4
3,206,835 UART: [art] Derive Key Pair
3,207,195 UART: [art] Store priv key in slot 0x5
3,219,579 UART: [art] Derive Key Pair - Done
3,233,997 UART: [art] Signing Cert with AUTHO
3,234,477 UART: RITY.KEYID = 7
3,249,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,622 UART: [art] PUB.X = D2E8F7DB38C7CAE4EF8B1E9502D5FC892DA261B6F1BA1B9DD582A6AA45F0DD1A4CC0B513F8185949BB65B9C776CF1882
3,257,411 UART: [art] PUB.Y = 7DF7AD8FB66E4FC274CCDF8354592265AFF1AF888111537CB32A3CCEA4B19B13F42A0FEBDFD5272FF94E6128CB33A405
3,264,375 UART: [art] SIG.R = 475EC9E2F258984D296B5D1E2048CC9BE18C3AC953B57860F5D099820762328133ED61738AE1CC673B7DDB8EE62C6EE3
3,271,146 UART: [art] SIG.S = BFF30E0381A0FBF5DBF898845D8D609C9446FAB3A4E225E6509403DA0600BD2E4A9A6C693045BDC44383586509506329
3,294,842 UART: Caliptra RT
3,295,096 UART: [state] CFI Enabled
3,403,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,345 UART: [rt]cmd =0x50435251, len=36
3,601,592 >>> mbox cmd response data (1848 bytes)
3,601,593 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,270 UART: [rt]cmd =0x50435245, len=56
3,634,792 >>> mbox cmd response data (8 bytes)
3,634,793 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,304 UART: [rt]cmd =0x50435251, len=36
3,831,885 >>> mbox cmd response data (1848 bytes)
3,831,886 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,593 UART: [rt]cmd =0x50435245, len=56
3,864,987 >>> mbox cmd response data (8 bytes)
3,864,988 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,463 UART: [rt]cmd =0x50435251, len=36
4,061,762 >>> mbox cmd response data (1848 bytes)
4,061,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,600 UART: [rt]cmd =0x50435245, len=56
4,095,316 >>> mbox cmd response data (8 bytes)
4,095,317 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,968 UART: [rt]cmd =0x50435251, len=36
4,292,257 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,576 UART: [kat] SHA2-256
882,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,622 UART: [kat] ++
886,774 UART: [kat] sha1
891,230 UART: [kat] SHA2-256
893,168 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,273 UART: [kat] HMAC-384Kdf
907,891 UART: [kat] LMS
1,476,087 UART: [kat] --
1,476,916 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 ready_for_fw is high
1,481,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,201 UART: [idev] Erasing UDS.KEYID = 0
1,506,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,049 UART: [idev] --
1,516,124 UART: [ldev] ++
1,516,292 UART: [ldev] CDI.KEYID = 6
1,516,655 UART: [ldev] SUBJECT.KEYID = 5
1,517,081 UART: [ldev] AUTHORITY.KEYID = 7
1,517,544 UART: [ldev] FE.KEYID = 1
1,522,920 UART: [ldev] Erasing FE.KEYID = 1
1,549,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,659 UART: [ldev] --
1,588,080 UART: [fwproc] Waiting for Commands...
1,588,779 UART: [fwproc] Received command 0x46574c44
1,589,570 UART: [fwproc] Received Image of size 114360 bytes
2,887,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,254 >>> mbox cmd response: success
3,080,254 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,081,274 UART: [afmc] ++
3,081,442 UART: [afmc] CDI.KEYID = 6
3,081,804 UART: [afmc] SUBJECT.KEYID = 7
3,082,229 UART: [afmc] AUTHORITY.KEYID = 5
3,117,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,276 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,669 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,359 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,216 UART: [afmc] --
3,161,230 UART: [cold-reset] --
3,161,996 UART: [state] Locking Datavault
3,163,105 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,709 UART: [state] Locking ICCM
3,164,365 UART: [exit] Launching FMC @ 0x40000130
3,169,694 UART:
3,169,710 UART: Running Caliptra FMC ...
3,170,118 UART:
3,170,261 UART: [state] CFI Enabled
3,180,814 UART: [fht] FMC Alias Private Key: 7
3,289,161 UART: [art] Extend RT PCRs Done
3,289,589 UART: [art] Lock RT PCRs Done
3,291,157 UART: [art] Populate DV Done
3,299,426 UART: [fht] FMC Alias Private Key: 7
3,300,514 UART: [art] Derive CDI
3,300,794 UART: [art] Store in in slot 0x4
3,386,965 UART: [art] Derive Key Pair
3,387,325 UART: [art] Store priv key in slot 0x5
3,399,861 UART: [art] Derive Key Pair - Done
3,414,402 UART: [art] Signing Cert with AUTHO
3,414,882 UART: RITY.KEYID = 7
3,429,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,567 UART: [art] PUB.X = 531D78BEB3675CFE8E9C19852D9C66AD8C4372B363599181A40BE1BF21BBE556F150F7B61B88E15B778C6B944DFD473B
3,437,342 UART: [art] PUB.Y = C9CF017A7DF0CB57C488F3DE94B03647D95F01993827615C690B32037EC6E8B98551B072D99A7081FA679F2FC96F364A
3,444,280 UART: [art] SIG.R = 38EDC8E809034756F39B1A2749D03DAFBC64679E5C582077C83E0742ADD9AB0D38DBBE123DCC2E87235D4846F6DBDF08
3,451,047 UART: [art] SIG.S = B3B86A48206E21832FECE8AAD47A1CD4EBC31518C869014C3C5D2062C83E26E7E36D5C26A593C054A669190C9492204D
3,475,024 UART: Caliptra RT
3,475,370 UART: [state] CFI Enabled
3,583,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,043 UART: [rt]cmd =0x50435251, len=36
3,781,460 >>> mbox cmd response data (1848 bytes)
3,781,461 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,090 UART: [rt]cmd =0x50435245, len=56
3,814,562 >>> mbox cmd response data (8 bytes)
3,814,563 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,844,092 UART: [rt]cmd =0x50435251, len=36
4,011,305 >>> mbox cmd response data (1848 bytes)
4,011,306 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,099 UART: [rt]cmd =0x50435245, len=56
4,044,963 >>> mbox cmd response data (8 bytes)
4,044,964 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,317 UART: [rt]cmd =0x50435251, len=36
4,242,002 >>> mbox cmd response data (1848 bytes)
4,242,003 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,556 UART: [rt]cmd =0x50435245, len=56
4,275,242 >>> mbox cmd response data (8 bytes)
4,275,243 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,304,878 UART: [rt]cmd =0x50435251, len=36
4,472,331 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,468 ready_for_fw is high
1,363,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,446 >>> mbox cmd response: success
2,929,446 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,990,878 UART:
2,990,894 UART: Running Caliptra FMC ...
2,991,302 UART:
2,991,445 UART: [state] CFI Enabled
3,001,746 UART: [fht] FMC Alias Private Key: 7
3,109,659 UART: [art] Extend RT PCRs Done
3,110,087 UART: [art] Lock RT PCRs Done
3,111,619 UART: [art] Populate DV Done
3,119,696 UART: [fht] FMC Alias Private Key: 7
3,120,638 UART: [art] Derive CDI
3,120,918 UART: [art] Store in in slot 0x4
3,206,911 UART: [art] Derive Key Pair
3,207,271 UART: [art] Store priv key in slot 0x5
3,220,659 UART: [art] Derive Key Pair - Done
3,235,762 UART: [art] Signing Cert with AUTHO
3,236,242 UART: RITY.KEYID = 7
3,251,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,747 UART: [art] PUB.X = 0D52C90945546C76BE09822D12795B12E3AF9C2968B26BA665F649C5C6539C6101CAED9B10A2FA6A2C70B82F8CE23CD6
3,259,511 UART: [art] PUB.Y = BA626778D34E0F5069D96492EF75E3E210FBC0C8FD1385D446DCC8764E5B35C864E8C6BA702B1E5A45DE3AD45A2EF3C2
3,266,472 UART: [art] SIG.R = C68AF17D892C5E17D65A52CC4AE14703703492007D848050854AA3CB585F2BCB7CF149561A4ABC77574E903CAF5373F0
3,273,219 UART: [art] SIG.S = 1CBCCD621FE973ACC2EE838DF8953D4E54BA8CBDFE48F88A34AB87E7F5AE053F4D432C4C6E631EA857879E485C865FE3
3,297,281 UART: Caliptra RT
3,297,627 UART: [state] CFI Enabled
3,406,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,044 UART: [rt]cmd =0x50435251, len=36
3,604,355 >>> mbox cmd response data (1848 bytes)
3,604,356 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,931 UART: [rt]cmd =0x50435245, len=56
3,637,253 >>> mbox cmd response data (8 bytes)
3,637,254 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,815 UART: [rt]cmd =0x50435251, len=36
3,834,528 >>> mbox cmd response data (1848 bytes)
3,834,529 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,402 UART: [rt]cmd =0x50435245, len=56
3,867,952 >>> mbox cmd response data (8 bytes)
3,867,953 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,432 UART: [rt]cmd =0x50435251, len=36
4,064,973 >>> mbox cmd response data (1848 bytes)
4,064,974 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,751 UART: [rt]cmd =0x50435245, len=56
4,098,511 >>> mbox cmd response data (8 bytes)
4,098,512 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,128,129 UART: [rt]cmd =0x50435251, len=36
4,295,578 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
892,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,991 UART: [kat] ++
897,143 UART: [kat] sha1
901,283 UART: [kat] SHA2-256
903,223 UART: [kat] SHA2-384
906,094 UART: [kat] SHA2-512-ACC
907,995 UART: [kat] ECC-384
917,804 UART: [kat] HMAC-384Kdf
922,510 UART: [kat] LMS
1,170,838 UART: [kat] --
1,171,663 UART: [cold-reset] ++
1,172,137 UART: [fht] FHT @ 0x50003400
1,174,878 UART: [idev] ++
1,175,046 UART: [idev] CDI.KEYID = 6
1,175,406 UART: [idev] SUBJECT.KEYID = 7
1,175,830 UART: [idev] UDS.KEYID = 0
1,176,175 ready_for_fw is high
1,176,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,894 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,511 UART: [idev] --
1,210,491 UART: [ldev] ++
1,210,659 UART: [ldev] CDI.KEYID = 6
1,211,022 UART: [ldev] SUBJECT.KEYID = 5
1,211,448 UART: [ldev] AUTHORITY.KEYID = 7
1,211,911 UART: [ldev] FE.KEYID = 1
1,217,539 UART: [ldev] Erasing FE.KEYID = 1
1,244,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,479 UART: [ldev] --
1,283,808 UART: [fwproc] Wait for Commands...
1,284,460 UART: [fwproc] Recv command 0x46574c44
1,285,188 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,510 >>> mbox cmd response: success
2,775,510 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,776,650 UART: [afmc] ++
2,776,818 UART: [afmc] CDI.KEYID = 6
2,777,180 UART: [afmc] SUBJECT.KEYID = 7
2,777,605 UART: [afmc] AUTHORITY.KEYID = 5
2,813,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,621 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,431 UART: [afmc] --
2,856,551 UART: [cold-reset] --
2,857,517 UART: [state] Locking Datavault
2,858,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,478 UART: [state] Locking ICCM
2,859,986 UART: [exit] Launching FMC @ 0x40000130
2,865,315 UART:
2,865,331 UART: Running Caliptra FMC ...
2,865,739 UART:
2,865,793 UART: [state] CFI Enabled
2,876,334 UART: [fht] FMC Alias Private Key: 7
2,984,753 UART: [art] Extend RT PCRs Done
2,985,181 UART: [art] Lock RT PCRs Done
2,986,637 UART: [art] Populate DV Done
2,994,824 UART: [fht] FMC Alias Private Key: 7
2,995,980 UART: [art] Derive CDI
2,996,260 UART: [art] Store in in slot 0x4
3,081,711 UART: [art] Derive Key Pair
3,082,071 UART: [art] Store priv key in slot 0x5
3,094,949 UART: [art] Derive Key Pair - Done
3,109,603 UART: [art] Signing Cert with AUTHO
3,110,083 UART: RITY.KEYID = 7
3,125,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,970 UART: [art] PUB.X = 18FDE9C5A3107EB5952D6325F6A2DE64BEAEBB33007C4CA5C053B7B20E4F17583AFAD81BBBD848D7CC7BA024632BEC17
3,132,737 UART: [art] PUB.Y = 886E39DE5698FA1B50067D4E38ED9609D0F4AD35F25C05B6DEBC32E1E443364CADF58D6AFB3C0ED21471A25595E79037
3,139,685 UART: [art] SIG.R = 1544C11DA5309EA23D78BF46118CB9930197285675BDA084CF002752D94872A2487454A79EE3BDF35173BE5FB66FC547
3,146,426 UART: [art] SIG.S = C86F77D237A39345C1EF1CD4F7EE944A1D0AE32DB5FD2B2C7AC8E9BA16B06060A08D6281D4BEBD54E735278B11612D39
3,170,432 UART: Caliptra RT
3,170,686 UART: [state] CFI Enabled
3,278,800 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,365 UART: [rt]cmd =0x50435251, len=36
3,476,702 >>> mbox cmd response data (1848 bytes)
3,476,703 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,466 UART: [rt]cmd =0x50435245, len=56
3,510,006 >>> mbox cmd response data (8 bytes)
3,510,007 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,630 UART: [rt]cmd =0x50435251, len=36
3,707,347 >>> mbox cmd response data (1848 bytes)
3,707,348 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,993 UART: [rt]cmd =0x50435245, len=56
3,740,443 >>> mbox cmd response data (8 bytes)
3,740,444 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,097 UART: [rt]cmd =0x50435251, len=36
3,937,574 >>> mbox cmd response data (1848 bytes)
3,937,575 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,338 UART: [rt]cmd =0x50435245, len=56
3,971,112 >>> mbox cmd response data (8 bytes)
3,971,113 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,674 UART: [rt]cmd =0x50435251, len=36
4,168,261 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,203 ready_for_fw is high
1,060,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,127 >>> mbox cmd response: success
2,626,127 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,687,687 UART:
2,687,703 UART: Running Caliptra FMC ...
2,688,111 UART:
2,688,165 UART: [state] CFI Enabled
2,698,360 UART: [fht] FMC Alias Private Key: 7
2,806,831 UART: [art] Extend RT PCRs Done
2,807,259 UART: [art] Lock RT PCRs Done
2,809,055 UART: [art] Populate DV Done
2,817,302 UART: [fht] FMC Alias Private Key: 7
2,818,238 UART: [art] Derive CDI
2,818,518 UART: [art] Store in in slot 0x4
2,904,201 UART: [art] Derive Key Pair
2,904,561 UART: [art] Store priv key in slot 0x5
2,917,967 UART: [art] Derive Key Pair - Done
2,932,935 UART: [art] Signing Cert with AUTHO
2,933,415 UART: RITY.KEYID = 7
2,948,473 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,238 UART: [art] PUB.X = 4578810362756CD4976CD4A1F5EDF85CC18FEC94560B41F67B4107FD603C9A3B5D2BB85C8D8357A557E320752DE5B7F5
2,956,003 UART: [art] PUB.Y = 0212FBF51B96EA5A8F15432027B1ED62A2829B03C26C06D40CCF578E503483B401D959ABEEAD06ED16476B9EB1C36A0E
2,962,942 UART: [art] SIG.R = 439AE1EEEC6C7C94690E6C82C081F6E6C130EA926200ED15619A0D0F457FEB41809FE9F0E246ACE09B902146D9956A5E
2,969,689 UART: [art] SIG.S = 7D49FF38090407853B7162328803C396CAD8EAC1A90DBCF000C789CD500FD159EF146B7B7C0496156B026BB8F8B1CDA0
2,993,924 UART: Caliptra RT
2,994,178 UART: [state] CFI Enabled
3,101,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,255 UART: [rt]cmd =0x50435251, len=36
3,299,604 >>> mbox cmd response data (1848 bytes)
3,299,605 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,400 UART: [rt]cmd =0x50435245, len=56
3,333,128 >>> mbox cmd response data (8 bytes)
3,333,129 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,846 UART: [rt]cmd =0x50435251, len=36
3,530,341 >>> mbox cmd response data (1848 bytes)
3,530,342 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,289 UART: [rt]cmd =0x50435245, len=56
3,563,937 >>> mbox cmd response data (8 bytes)
3,563,938 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,445 UART: [rt]cmd =0x50435251, len=36
3,760,794 >>> mbox cmd response data (1848 bytes)
3,760,795 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,668 UART: [rt]cmd =0x50435245, len=56
3,794,340 >>> mbox cmd response data (8 bytes)
3,794,341 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,058 UART: [rt]cmd =0x50435251, len=36
3,991,659 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
893,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,280 UART: [kat] ++
897,432 UART: [kat] sha1
901,614 UART: [kat] SHA2-256
903,554 UART: [kat] SHA2-384
906,227 UART: [kat] SHA2-512-ACC
908,128 UART: [kat] ECC-384
917,449 UART: [kat] HMAC-384Kdf
922,041 UART: [kat] LMS
1,170,369 UART: [kat] --
1,171,190 UART: [cold-reset] ++
1,171,730 UART: [fht] FHT @ 0x50003400
1,174,279 UART: [idev] ++
1,174,447 UART: [idev] CDI.KEYID = 6
1,174,807 UART: [idev] SUBJECT.KEYID = 7
1,175,231 UART: [idev] UDS.KEYID = 0
1,175,576 ready_for_fw is high
1,175,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,323 UART: [idev] Erasing UDS.KEYID = 0
1,200,550 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,746 UART: [ldev] ++
1,209,914 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,703 UART: [ldev] AUTHORITY.KEYID = 7
1,211,166 UART: [ldev] FE.KEYID = 1
1,216,532 UART: [ldev] Erasing FE.KEYID = 1
1,242,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,502 UART: [ldev] --
1,281,795 UART: [fwproc] Wait for Commands...
1,282,477 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,431 >>> mbox cmd response: success
2,772,431 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,595 UART: [afmc] ++
2,773,763 UART: [afmc] CDI.KEYID = 6
2,774,125 UART: [afmc] SUBJECT.KEYID = 7
2,774,550 UART: [afmc] AUTHORITY.KEYID = 5
2,809,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,966 UART: [afmc] --
2,852,924 UART: [cold-reset] --
2,853,736 UART: [state] Locking Datavault
2,854,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,595 UART: [state] Locking ICCM
2,856,189 UART: [exit] Launching FMC @ 0x40000130
2,861,518 UART:
2,861,534 UART: Running Caliptra FMC ...
2,861,942 UART:
2,862,085 UART: [state] CFI Enabled
2,872,856 UART: [fht] FMC Alias Private Key: 7
2,981,121 UART: [art] Extend RT PCRs Done
2,981,549 UART: [art] Lock RT PCRs Done
2,983,205 UART: [art] Populate DV Done
2,991,358 UART: [fht] FMC Alias Private Key: 7
2,992,518 UART: [art] Derive CDI
2,992,798 UART: [art] Store in in slot 0x4
3,078,573 UART: [art] Derive Key Pair
3,078,933 UART: [art] Store priv key in slot 0x5
3,092,481 UART: [art] Derive Key Pair - Done
3,107,151 UART: [art] Signing Cert with AUTHO
3,107,631 UART: RITY.KEYID = 7
3,122,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,646 UART: [art] PUB.X = 9CC5EC28E7D732AC0EFE00BA0385189172A2D99F7F366CE5314C7203A945A54F0B35B5CFB2FD1C86506A62B4894E39EA
3,130,392 UART: [art] PUB.Y = 9262DE5FA4974ACE5B8AF4E38C249D90DB499AB44554864BF33F59BD98A315346A3A03E6716EECDEC4AD580B02684B7B
3,137,345 UART: [art] SIG.R = C8C5CED1905C63EB625F15DB02248D50D942CDFA296FCDE46063EC8D2CD5DE99FEF25BA491513A641AB8A33821A18F0C
3,144,127 UART: [art] SIG.S = 6051DDD48E4C01F07BF704BDC01799AE9CCD6A52208B6E1AF0B8C3C9CAB0A9BBAAB205E5600306D2DFB4EAEAC3384B3A
3,168,425 UART: Caliptra RT
3,168,771 UART: [state] CFI Enabled
3,276,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,938 UART: [rt]cmd =0x50435251, len=36
3,474,337 >>> mbox cmd response data (1848 bytes)
3,474,338 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,099 UART: [rt]cmd =0x50435245, len=56
3,507,469 >>> mbox cmd response data (8 bytes)
3,507,470 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,043 UART: [rt]cmd =0x50435251, len=36
3,704,432 >>> mbox cmd response data (1848 bytes)
3,704,433 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,310 UART: [rt]cmd =0x50435245, len=56
3,737,772 >>> mbox cmd response data (8 bytes)
3,737,773 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,320 UART: [rt]cmd =0x50435251, len=36
3,934,689 >>> mbox cmd response data (1848 bytes)
3,934,690 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,255 UART: [rt]cmd =0x50435245, len=56
3,967,963 >>> mbox cmd response data (8 bytes)
3,967,964 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,323 UART: [rt]cmd =0x50435251, len=36
4,164,544 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 ready_for_fw is high
1,060,296 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,176 >>> mbox cmd response: success
2,626,176 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,689,466 UART:
2,689,482 UART: Running Caliptra FMC ...
2,689,890 UART:
2,690,033 UART: [state] CFI Enabled
2,700,998 UART: [fht] FMC Alias Private Key: 7
2,808,867 UART: [art] Extend RT PCRs Done
2,809,295 UART: [art] Lock RT PCRs Done
2,810,443 UART: [art] Populate DV Done
2,818,606 UART: [fht] FMC Alias Private Key: 7
2,819,622 UART: [art] Derive CDI
2,819,902 UART: [art] Store in in slot 0x4
2,906,163 UART: [art] Derive Key Pair
2,906,523 UART: [art] Store priv key in slot 0x5
2,919,761 UART: [art] Derive Key Pair - Done
2,934,485 UART: [art] Signing Cert with AUTHO
2,934,965 UART: RITY.KEYID = 7
2,950,211 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,976 UART: [art] PUB.X = 381DCEAFB68918D3FABFB443CDAA0CDCDEEF46714FC966143FB59F39C2C68B145B0975AA78D968F8A5C5988FFE822DF3
2,957,764 UART: [art] PUB.Y = B37AF0EF9F5F27AE00F984A43A11A4C76B00F1FBC08389C0024D585071104543569DA41F45F7590F27B6738E6F0873BA
2,964,661 UART: [art] SIG.R = D02CDA719977813A648821B1505F64C0A01ACCF8DF70EF6102B0EF46281A7D89180CD36FB4B9BF35FCF31C2AA671567C
2,971,435 UART: [art] SIG.S = 152EAF2E62196289DF0FB79067ECB64C01631201766A55D67E994602E974610AED58CBF62947AE0F73BC7805B1F1C85F
2,995,443 UART: Caliptra RT
2,995,789 UART: [state] CFI Enabled
3,103,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,032 UART: [rt]cmd =0x50435251, len=36
3,301,287 >>> mbox cmd response data (1848 bytes)
3,301,288 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,055 UART: [rt]cmd =0x50435245, len=56
3,334,507 >>> mbox cmd response data (8 bytes)
3,334,508 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,029 UART: [rt]cmd =0x50435251, len=36
3,531,684 >>> mbox cmd response data (1848 bytes)
3,531,685 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,470 UART: [rt]cmd =0x50435245, len=56
3,565,356 >>> mbox cmd response data (8 bytes)
3,565,357 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,960 UART: [rt]cmd =0x50435251, len=36
3,762,279 >>> mbox cmd response data (1848 bytes)
3,762,280 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,119 UART: [rt]cmd =0x50435245, len=56
3,795,727 >>> mbox cmd response data (8 bytes)
3,795,728 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,825,389 UART: [rt]cmd =0x50435251, len=36
3,993,006 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,531 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,679 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,510 UART: [ldev] Erasing FE.KEYID = 1
1,241,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,396 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,830 >>> mbox cmd response: success
2,772,830 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,975 UART: [afmc] ++
2,774,143 UART: [afmc] CDI.KEYID = 6
2,774,506 UART: [afmc] SUBJECT.KEYID = 7
2,774,932 UART: [afmc] AUTHORITY.KEYID = 5
2,810,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,488 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,217 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,819 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,624 UART: [afmc] --
2,853,624 UART: [cold-reset] --
2,854,566 UART: [state] Locking Datavault
2,855,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,369 UART: [state] Locking ICCM
2,856,857 UART: [exit] Launching FMC @ 0x40000130
2,862,186 UART:
2,862,202 UART: Running Caliptra FMC ...
2,862,610 UART:
2,862,664 UART: [state] CFI Enabled
2,873,327 UART: [fht] FMC Alias Private Key: 7
2,981,276 UART: [art] Extend RT PCRs Done
2,981,704 UART: [art] Lock RT PCRs Done
2,983,342 UART: [art] Populate DV Done
2,991,839 UART: [fht] FMC Alias Private Key: 7
2,992,823 UART: [art] Derive CDI
2,993,103 UART: [art] Store in in slot 0x4
3,078,644 UART: [art] Derive Key Pair
3,079,004 UART: [art] Store priv key in slot 0x5
3,091,894 UART: [art] Derive Key Pair - Done
3,106,732 UART: [art] Signing Cert with AUTHO
3,107,212 UART: RITY.KEYID = 7
3,122,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,081 UART: [art] PUB.X = 066B5A4D368DFFF2BF8BFFDD692CE662251110949DBD45FE7A3F39428C472344454DD0313D34D87D1283A82F12B431E7
3,129,852 UART: [art] PUB.Y = CF0B567598FF886E9B17B893C8104EE266ABBCA78AABD58B36E2A36C8C76E349D2749BE12C5127A31808EE9CC9B66E39
3,136,808 UART: [art] SIG.R = FDFC05FE47C9D19C729412EC1D383C6075B96E43FC6EC73BBF9160814582F1F9B99209542D297ABD080FC90341669DD5
3,143,567 UART: [art] SIG.S = C8181A5A2F477C190BD8AE44C8768DE0F1005F191A7AEE5E27E7A1FAC49964B5820D606382C0346FDFCBE15BA3072169
3,167,265 UART: Caliptra RT
3,167,519 UART: [state] CFI Enabled
3,275,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,589 UART: [rt]cmd =0x50435251, len=36
3,473,238 >>> mbox cmd response data (1848 bytes)
3,473,239 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,054 UART: [rt]cmd =0x50435245, len=56
3,506,526 >>> mbox cmd response data (8 bytes)
3,506,527 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,852 UART: [rt]cmd =0x50435251, len=36
3,703,339 >>> mbox cmd response data (1848 bytes)
3,703,340 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,955 UART: [rt]cmd =0x50435245, len=56
3,736,501 >>> mbox cmd response data (8 bytes)
3,736,502 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,139 UART: [rt]cmd =0x50435251, len=36
3,933,866 >>> mbox cmd response data (1848 bytes)
3,933,867 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,440 UART: [rt]cmd =0x50435245, len=56
3,967,248 >>> mbox cmd response data (8 bytes)
3,967,249 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,704 UART: [rt]cmd =0x50435251, len=36
4,164,511 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,978 ready_for_fw is high
1,055,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,618 >>> mbox cmd response: success
2,620,618 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,682,902 UART:
2,682,918 UART: Running Caliptra FMC ...
2,683,326 UART:
2,683,380 UART: [state] CFI Enabled
2,694,209 UART: [fht] FMC Alias Private Key: 7
2,802,344 UART: [art] Extend RT PCRs Done
2,802,772 UART: [art] Lock RT PCRs Done
2,804,178 UART: [art] Populate DV Done
2,812,631 UART: [fht] FMC Alias Private Key: 7
2,813,575 UART: [art] Derive CDI
2,813,855 UART: [art] Store in in slot 0x4
2,899,252 UART: [art] Derive Key Pair
2,899,612 UART: [art] Store priv key in slot 0x5
2,912,766 UART: [art] Derive Key Pair - Done
2,927,520 UART: [art] Signing Cert with AUTHO
2,928,000 UART: RITY.KEYID = 7
2,943,420 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,185 UART: [art] PUB.X = 712DF357FAF835A153A85FA46C8F997C188FAC01D2423B72CB0AE26331724CADD61714CEBF15BF9C978D53C9F4B67B17
2,950,961 UART: [art] PUB.Y = 4443D093F3561A3126A637F56A71D6192F9257F7B4DBDD93D7316F0F22EC49E4D6E0DB105C72312AC737C0D2D08C3A65
2,957,910 UART: [art] SIG.R = F0B6473A4AF04F2E998FF5F8CFC3DD13A6ED4CB5A762444EE83A4D7B56719D38AF254CF9E4E10D0C30E70EB897752083
2,964,685 UART: [art] SIG.S = 01A0EC8A04FFE7877A375BC2DE3664C89186F90374F76A7AF94CB6684725415E9CF0BAE11E8CC99FB2E6D17A3A235E07
2,988,330 UART: Caliptra RT
2,988,584 UART: [state] CFI Enabled
3,095,316 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,509 UART: [rt]cmd =0x50435251, len=36
3,292,918 >>> mbox cmd response data (1848 bytes)
3,292,919 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,544 UART: [rt]cmd =0x50435245, len=56
3,326,218 >>> mbox cmd response data (8 bytes)
3,326,219 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,932 UART: [rt]cmd =0x50435251, len=36
3,523,521 >>> mbox cmd response data (1848 bytes)
3,523,522 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,189 UART: [rt]cmd =0x50435245, len=56
3,556,633 >>> mbox cmd response data (8 bytes)
3,556,634 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,319 UART: [rt]cmd =0x50435251, len=36
3,753,630 >>> mbox cmd response data (1848 bytes)
3,753,631 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,624 UART: [rt]cmd =0x50435245, len=56
3,787,218 >>> mbox cmd response data (8 bytes)
3,787,219 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,812 UART: [rt]cmd =0x50435251, len=36
3,984,471 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,424 UART: [idev] ++
1,173,592 UART: [idev] CDI.KEYID = 6
1,173,953 UART: [idev] SUBJECT.KEYID = 7
1,174,378 UART: [idev] UDS.KEYID = 0
1,174,724 ready_for_fw is high
1,174,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,198,574 UART: [idev] Sha1 KeyId Algorithm
1,207,362 UART: [idev] --
1,208,463 UART: [ldev] ++
1,208,631 UART: [ldev] CDI.KEYID = 6
1,208,995 UART: [ldev] SUBJECT.KEYID = 5
1,209,422 UART: [ldev] AUTHORITY.KEYID = 7
1,209,885 UART: [ldev] FE.KEYID = 1
1,214,913 UART: [ldev] Erasing FE.KEYID = 1
1,241,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,297 UART: [ldev] --
1,280,669 UART: [fwproc] Wait for Commands...
1,281,388 UART: [fwproc] Recv command 0x46574c44
1,282,121 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,445 >>> mbox cmd response: success
2,772,445 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,676 UART: [afmc] ++
2,773,844 UART: [afmc] CDI.KEYID = 6
2,774,207 UART: [afmc] SUBJECT.KEYID = 7
2,774,633 UART: [afmc] AUTHORITY.KEYID = 5
2,809,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,289 UART: [afmc] --
2,852,333 UART: [cold-reset] --
2,853,049 UART: [state] Locking Datavault
2,854,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,040 UART: [state] Locking ICCM
2,855,614 UART: [exit] Launching FMC @ 0x40000130
2,860,943 UART:
2,860,959 UART: Running Caliptra FMC ...
2,861,367 UART:
2,861,510 UART: [state] CFI Enabled
2,872,519 UART: [fht] FMC Alias Private Key: 7
2,980,830 UART: [art] Extend RT PCRs Done
2,981,258 UART: [art] Lock RT PCRs Done
2,983,110 UART: [art] Populate DV Done
2,991,431 UART: [fht] FMC Alias Private Key: 7
2,992,477 UART: [art] Derive CDI
2,992,757 UART: [art] Store in in slot 0x4
3,078,474 UART: [art] Derive Key Pair
3,078,834 UART: [art] Store priv key in slot 0x5
3,092,300 UART: [art] Derive Key Pair - Done
3,107,043 UART: [art] Signing Cert with AUTHO
3,107,523 UART: RITY.KEYID = 7
3,122,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,532 UART: [art] PUB.X = 2A54947096A67C353A01A93A10D7CFDC4E8D866DC0DEB3868F32C3F8AAA1C6C9644788E6736F04A9768676AF51561183
3,130,296 UART: [art] PUB.Y = E5350BEF4250528FCA3B9937F21D7688BE42A5FD5737182E61FCD3D71AEAFBDF95AC987F3E62036BFB6D18C63DA4B3A1
3,137,258 UART: [art] SIG.R = BE0FCE8F6AFDA4D7D1452E68180FDC5AF9AAA5DA1C6509194049C54A0E38B707B006AD212718A4BA7A8FAC7C5C77C967
3,144,030 UART: [art] SIG.S = 9014256D8D18C569A3FEFC09F5F6080F7C570A3D38F022BDDEDB164ED1E2C7723A824DE51AB89BC5B6A4E428E4F7A3EC
3,168,335 UART: Caliptra RT
3,168,681 UART: [state] CFI Enabled
3,276,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,117 UART: [rt]cmd =0x50435251, len=36
3,474,406 >>> mbox cmd response data (1848 bytes)
3,474,407 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,028 UART: [rt]cmd =0x50435245, len=56
3,507,380 >>> mbox cmd response data (8 bytes)
3,507,381 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,802 UART: [rt]cmd =0x50435251, len=36
3,704,607 >>> mbox cmd response data (1848 bytes)
3,704,608 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,201 UART: [rt]cmd =0x50435245, len=56
3,737,651 >>> mbox cmd response data (8 bytes)
3,737,652 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,193 UART: [rt]cmd =0x50435251, len=36
3,934,448 >>> mbox cmd response data (1848 bytes)
3,934,449 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,172 UART: [rt]cmd =0x50435245, len=56
3,967,816 >>> mbox cmd response data (8 bytes)
3,967,817 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,576 UART: [rt]cmd =0x50435251, len=36
4,165,149 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,897 ready_for_fw is high
1,056,897 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,271 >>> mbox cmd response: success
2,624,271 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,686,339 UART:
2,686,355 UART: Running Caliptra FMC ...
2,686,763 UART:
2,686,906 UART: [state] CFI Enabled
2,697,639 UART: [fht] FMC Alias Private Key: 7
2,805,436 UART: [art] Extend RT PCRs Done
2,805,864 UART: [art] Lock RT PCRs Done
2,807,384 UART: [art] Populate DV Done
2,815,583 UART: [fht] FMC Alias Private Key: 7
2,816,549 UART: [art] Derive CDI
2,816,829 UART: [art] Store in in slot 0x4
2,902,460 UART: [art] Derive Key Pair
2,902,820 UART: [art] Store priv key in slot 0x5
2,916,726 UART: [art] Derive Key Pair - Done
2,931,615 UART: [art] Signing Cert with AUTHO
2,932,095 UART: RITY.KEYID = 7
2,946,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,744 UART: [art] PUB.X = 69859BF5B0BF4223A94F19BD4CE65BCEE084D94D5D7BB4CFA6F016286D79AD370907830B8DA4CAB4AE93A55A5CE209C8
2,954,520 UART: [art] PUB.Y = A71FEE4641AD24D61F0F85FDE40997A3A7E8E1B52982AD712735DC8943515F6EF1487A6D3A344B32FF180D80744DCF10
2,961,467 UART: [art] SIG.R = 80F92ADC2788A6EA397AA8A577AD1F3D8006C1E4543974065C482BF2EBEED3B22AFE89E2AF88D803488E2A2685F8ECE1
2,968,242 UART: [art] SIG.S = D9DEB5B1F2E300F35C873527308F765FFED715C93887DDB3B59D0BBEC793831BF9A7A7C43B51B314D090A32392F5E43D
2,992,526 UART: Caliptra RT
2,992,872 UART: [state] CFI Enabled
3,100,939 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,230 UART: [rt]cmd =0x50435251, len=36
3,298,755 >>> mbox cmd response data (1848 bytes)
3,298,756 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,557 UART: [rt]cmd =0x50435245, len=56
3,332,325 >>> mbox cmd response data (8 bytes)
3,332,326 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,151 UART: [rt]cmd =0x50435251, len=36
3,529,626 >>> mbox cmd response data (1848 bytes)
3,529,627 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,296 UART: [rt]cmd =0x50435245, len=56
3,563,094 >>> mbox cmd response data (8 bytes)
3,563,095 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,656 UART: [rt]cmd =0x50435251, len=36
3,760,121 >>> mbox cmd response data (1848 bytes)
3,760,122 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,943 UART: [rt]cmd =0x50435245, len=56
3,793,709 >>> mbox cmd response data (8 bytes)
3,793,710 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,423 UART: [rt]cmd =0x50435251, len=36
3,991,050 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,447 UART:
192,815 UART: Running Caliptra ROM ...
193,998 UART:
194,144 UART: [state] CFI Enabled
267,722 UART: [state] LifecycleState = Unprovisioned
269,716 UART: [state] DebugLocked = No
271,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,405 UART: [kat] SHA2-256
445,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,634 UART: [kat] ++
456,077 UART: [kat] sha1
466,404 UART: [kat] SHA2-256
469,107 UART: [kat] SHA2-384
475,545 UART: [kat] SHA2-512-ACC
477,919 UART: [kat] ECC-384
2,767,441 UART: [kat] HMAC-384Kdf
2,779,557 UART: [kat] LMS
3,969,815 UART: [kat] --
3,975,405 UART: [cold-reset] ++
3,977,763 UART: [fht] Storing FHT @ 0x50003400
3,988,606 UART: [idev] ++
3,989,213 UART: [idev] CDI.KEYID = 6
3,990,090 UART: [idev] SUBJECT.KEYID = 7
3,991,399 UART: [idev] UDS.KEYID = 0
3,992,463 ready_for_fw is high
3,992,678 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,400 UART: [idev] Erasing UDS.KEYID = 0
7,324,661 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,952 UART: [idev] --
7,351,156 UART: [ldev] ++
7,351,737 UART: [ldev] CDI.KEYID = 6
7,352,750 UART: [ldev] SUBJECT.KEYID = 5
7,353,898 UART: [ldev] AUTHORITY.KEYID = 7
7,355,177 UART: [ldev] FE.KEYID = 1
7,400,883 UART: [ldev] Erasing FE.KEYID = 1
10,731,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,943 UART: [ldev] --
13,095,037 UART: [fwproc] Waiting for Commands...
13,098,043 UART: [fwproc] Received command 0x46574c44
13,100,217 UART: [fwproc] Received Image of size 114036 bytes
17,153,484 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,450 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,616,143 >>> mbox cmd response: success
17,616,701 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,619,479 UART: [afmc] ++
17,620,057 UART: [afmc] CDI.KEYID = 6
17,621,070 UART: [afmc] SUBJECT.KEYID = 7
17,622,230 UART: [afmc] AUTHORITY.KEYID = 5
20,984,098 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,497 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,912 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,742 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,176 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,502 UART: [afmc] --
23,355,726 UART: [cold-reset] --
23,359,325 UART: [state] Locking Datavault
23,363,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,605 UART: [state] Locking ICCM
23,367,965 UART: [exit] Launching FMC @ 0x40000130
23,376,353 UART:
23,376,588 UART: Running Caliptra FMC ...
23,377,682 UART:
23,377,833 UART: [state] CFI Enabled
23,444,958 UART: [fht] FMC Alias Private Key: 7
25,782,828 UART: [art] Extend RT PCRs Done
25,784,039 UART: [art] Lock RT PCRs Done
25,785,771 UART: [art] Populate DV Done
25,790,956 UART: [fht] FMC Alias Private Key: 7
25,792,536 UART: [art] Derive CDI
25,793,339 UART: [art] Store in in slot 0x4
25,854,241 UART: [art] Derive Key Pair
25,855,292 UART: [art] Store priv key in slot 0x5
29,147,295 UART: [art] Derive Key Pair - Done
29,160,228 UART: [art] Signing Cert with AUTHO
29,161,516 UART: RITY.KEYID = 7
31,449,400 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,902 UART: [art] PUB.X = EEDD1B8EAA8071C6F6C490EE465AC7849450EBA5DF30C549BB887C06CAFC1A4126F8C47DBE0385BE446E910AF0D1C944
31,458,141 UART: [art] PUB.Y = 24D12A2B7BBCA4223A1B2A5CF08CCE7AE086F1B6ACEE3513535D88E4F11AF779D94F419C71090D9869370B295B12838E
31,465,408 UART: [art] SIG.R = 6A511BC245D3362ED0C07216AD695328714F5EB7C812353B2D70D6C0EFADAAE5D9F659A7A0AA00C6CFC5C8EB5331E154
31,472,787 UART: [art] SIG.S = B3D070AADC70767518445352FFAA33C356B5AC8F3B6E13201E1094EBC054F2D5844E633260D5AC5602E42C56540B3E5F
32,777,978 UART: Caliptra RT
32,778,679 UART: [state] CFI Enabled
32,959,543 UART: [rt] RT listening for mailbox commands...
32,990,844 UART: [rt]cmd =0x50435245, len=56
32,992,592 >>> mbox cmd response: failed
32,992,891 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,023,088 UART: [rt]cmd =0x50435245, len=56
33,025,007 >>> mbox cmd response: failed
33,025,281 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,055,368 UART: [rt]cmd =0x50435245, len=56
33,056,955 >>> mbox cmd response: failed
33,057,216 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,087,515 UART: [rt]cmd =0x50435245, len=56
33,089,094 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,783,618 ready_for_fw is high
3,783,982 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,874,625 >>> mbox cmd response: success
17,875,445 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,568,234 UART:
23,568,615 UART: Running Caliptra FMC ...
23,569,754 UART:
23,569,907 UART: [state] CFI Enabled
23,636,876 UART: [fht] FMC Alias Private Key: 7
25,974,627 UART: [art] Extend RT PCRs Done
25,975,852 UART: [art] Lock RT PCRs Done
25,977,589 UART: [art] Populate DV Done
25,983,265 UART: [fht] FMC Alias Private Key: 7
25,984,759 UART: [art] Derive CDI
25,985,487 UART: [art] Store in in slot 0x4
26,044,978 UART: [art] Derive Key Pair
26,046,045 UART: [art] Store priv key in slot 0x5
29,339,614 UART: [art] Derive Key Pair - Done
29,352,288 UART: [art] Signing Cert with AUTHO
29,353,605 UART: RITY.KEYID = 7
31,642,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,424 UART: [art] PUB.X = B4B2702DFA2E67420E0155A97A29EB767B80219D72C004CB707F60EA6763A3B1DEFB87327AB80F15AEE77313BC663317
31,651,653 UART: [art] PUB.Y = 24BC2E65E6A59C66AB25A49B99C41BA687EAA25D89112158D72FA709812E24EF3F1F00556D1180F6436A819DEA6EB8A8
31,658,927 UART: [art] SIG.R = 3D3C2861FE45E76FA8D48AA091707309BDF6A9B4064756799E114F96E051044CEF9240A745E29330BDE5D0774BE4454C
31,666,312 UART: [art] SIG.S = 3332E12D1CFBD7583ACFBBD42E633E0F0DE99BD77853A441CCCC99F4879AD027CC43510A76BD7EE597D4D180C836FB03
32,971,992 UART: Caliptra RT
32,972,707 UART: [state] CFI Enabled
33,132,710 UART: [rt] RT listening for mailbox commands...
33,164,232 UART: [rt]cmd =0x50435245, len=56
33,166,086 >>> mbox cmd response: failed
33,166,379 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,196,681 UART: [rt]cmd =0x50435245, len=56
33,198,581 >>> mbox cmd response: failed
33,198,848 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,228,765 UART: [rt]cmd =0x50435245, len=56
33,230,202 >>> mbox cmd response: failed
33,230,457 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,260,484 UART: [rt]cmd =0x50435245, len=56
33,262,392 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,384 UART:
192,735 UART: Running Caliptra ROM ...
193,912 UART:
603,717 UART: [state] CFI Enabled
618,363 UART: [state] LifecycleState = Unprovisioned
620,302 UART: [state] DebugLocked = No
622,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,630 UART: [kat] SHA2-256
797,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,927 UART: [kat] ++
808,463 UART: [kat] sha1
817,994 UART: [kat] SHA2-256
820,711 UART: [kat] SHA2-384
826,713 UART: [kat] SHA2-512-ACC
829,089 UART: [kat] ECC-384
3,113,837 UART: [kat] HMAC-384Kdf
3,125,363 UART: [kat] LMS
4,315,464 UART: [kat] --
4,319,478 UART: [cold-reset] ++
4,320,491 UART: [fht] Storing FHT @ 0x50003400
4,332,462 UART: [idev] ++
4,333,030 UART: [idev] CDI.KEYID = 6
4,334,083 UART: [idev] SUBJECT.KEYID = 7
4,335,192 UART: [idev] UDS.KEYID = 0
4,336,227 ready_for_fw is high
4,336,435 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,648 UART: [idev] Erasing UDS.KEYID = 0
7,623,051 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,939 UART: [idev] --
7,649,227 UART: [ldev] ++
7,649,795 UART: [ldev] CDI.KEYID = 6
7,650,771 UART: [ldev] SUBJECT.KEYID = 5
7,651,922 UART: [ldev] AUTHORITY.KEYID = 7
7,653,201 UART: [ldev] FE.KEYID = 1
7,661,629 UART: [ldev] Erasing FE.KEYID = 1
10,952,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,502 UART: [ldev] --
13,311,828 UART: [fwproc] Waiting for Commands...
13,314,947 UART: [fwproc] Received command 0x46574c44
13,317,121 UART: [fwproc] Received Image of size 114036 bytes
17,374,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,839,419 >>> mbox cmd response: success
17,839,991 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,843,644 UART: [afmc] ++
17,844,228 UART: [afmc] CDI.KEYID = 6
17,845,138 UART: [afmc] SUBJECT.KEYID = 7
17,846,406 UART: [afmc] AUTHORITY.KEYID = 5
21,157,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,914 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,301 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,146 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,538 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,472 UART: [afmc] --
23,522,196 UART: [cold-reset] --
23,525,197 UART: [state] Locking Datavault
23,530,495 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,247 UART: [state] Locking ICCM
23,533,636 UART: [exit] Launching FMC @ 0x40000130
23,542,036 UART:
23,542,315 UART: Running Caliptra FMC ...
23,543,424 UART:
23,543,584 UART: [state] CFI Enabled
23,551,741 UART: [fht] FMC Alias Private Key: 7
25,882,340 UART: [art] Extend RT PCRs Done
25,883,558 UART: [art] Lock RT PCRs Done
25,885,366 UART: [art] Populate DV Done
25,891,042 UART: [fht] FMC Alias Private Key: 7
25,892,689 UART: [art] Derive CDI
25,893,423 UART: [art] Store in in slot 0x4
25,936,388 UART: [art] Derive Key Pair
25,937,384 UART: [art] Store priv key in slot 0x5
29,179,408 UART: [art] Derive Key Pair - Done
29,192,555 UART: [art] Signing Cert with AUTHO
29,193,857 UART: RITY.KEYID = 7
31,473,484 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,985 UART: [art] PUB.X = 56017895D40DC6CEF47A9F9E8E4C76CDF799360C899713034DC039D15EBCA468CBA724D89FB8023A923CFAB59A02CF59
31,482,217 UART: [art] PUB.Y = 7E35F808DCC597B6839586DB4030883605A80FBA31450A6CDAA6AF79ABCC1D8F863E9106A8C18FEF8D8A9BD15DD739DA
31,489,488 UART: [art] SIG.R = ABEC79CADD488A9956E50FA8775A7D6C7EFBFE8B5BF3EEB4C7767812835673E3D624CC2985F591742BD0B3CD25974238
31,496,867 UART: [art] SIG.S = 034AC00B8F0F39F24D8E6D5ECC18BDF3353E78D7DE04391B723659764DA17871126DB4AFD822350E830D069EECC07CC4
32,802,221 UART: Caliptra RT
32,802,926 UART: [state] CFI Enabled
32,920,657 UART: [rt] RT listening for mailbox commands...
32,952,076 UART: [rt]cmd =0x50435245, len=56
32,954,000 >>> mbox cmd response: failed
32,954,333 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
32,984,568 UART: [rt]cmd =0x50435245, len=56
32,986,255 >>> mbox cmd response: failed
32,986,523 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,016,768 UART: [rt]cmd =0x50435245, len=56
33,018,358 >>> mbox cmd response: failed
33,018,621 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,048,650 UART: [rt]cmd =0x50435245, len=56
33,050,128 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,127,625 ready_for_fw is high
4,128,217 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,057,223 >>> mbox cmd response: success
18,057,921 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,696,452 UART:
23,696,833 UART: Running Caliptra FMC ...
23,697,965 UART:
23,698,142 UART: [state] CFI Enabled
23,705,991 UART: [fht] FMC Alias Private Key: 7
26,037,113 UART: [art] Extend RT PCRs Done
26,038,342 UART: [art] Lock RT PCRs Done
26,039,861 UART: [art] Populate DV Done
26,045,390 UART: [fht] FMC Alias Private Key: 7
26,046,927 UART: [art] Derive CDI
26,047,673 UART: [art] Store in in slot 0x4
26,090,432 UART: [art] Derive Key Pair
26,091,437 UART: [art] Store priv key in slot 0x5
29,333,186 UART: [art] Derive Key Pair - Done
29,346,023 UART: [art] Signing Cert with AUTHO
29,347,328 UART: RITY.KEYID = 7
31,626,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,356 UART: [art] PUB.X = 7123470B1E3CDE44E4437E32EF85FDAE65D7D85FA1A6BFFD495DC95D12FFBDC44DD8CDDC2432A09E90471F6464EC5597
31,635,578 UART: [art] PUB.Y = 85796BEE3EFCDCC66EB7842B5420F3042437971F03927CC8914454378EF9E2BE0EC17ADAB1552D9732C5718C00081710
31,642,808 UART: [art] SIG.R = 82BDF018E961F3E15B022A2CB7DD36C931D690E4C0BEF8450C5C6DD9BB2681660119BA947381324C7272E830CDD587C2
31,650,221 UART: [art] SIG.S = 99F84277B12A8AB97F42A0C9FECEA36FE8B0EE85B3D4DE2B91B7B19CBB2180EA4C08B2FA5A8CB33AE10EA883FD1ABB64
32,955,469 UART: Caliptra RT
32,956,189 UART: [state] CFI Enabled
33,072,826 UART: [rt] RT listening for mailbox commands...
33,104,339 UART: [rt]cmd =0x50435245, len=56
33,106,125 >>> mbox cmd response: failed
33,106,429 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,136,622 UART: [rt]cmd =0x50435245, len=56
33,138,501 >>> mbox cmd response: failed
33,138,762 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,168,642 UART: [rt]cmd =0x50435245, len=56
33,170,705 >>> mbox cmd response: failed
33,170,973 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,201,106 UART: [rt]cmd =0x50435245, len=56
33,202,916 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
192,715 UART:
193,076 UART: Running Caliptra ROM ...
194,281 UART:
194,435 UART: [state] CFI Enabled
265,880 UART: [state] LifecycleState = Unprovisioned
267,803 UART: [state] DebugLocked = No
269,768 UART: [state] WD Timer not started. Device not locked for debugging
273,663 UART: [kat] SHA2-256
452,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,406 UART: [kat] ++
464,860 UART: [kat] sha1
475,082 UART: [kat] SHA2-256
478,147 UART: [kat] SHA2-384
485,293 UART: [kat] SHA2-512-ACC
488,258 UART: [kat] ECC-384
2,946,666 UART: [kat] HMAC-384Kdf
2,970,192 UART: [kat] LMS
3,499,664 UART: [kat] --
3,503,892 UART: [cold-reset] ++
3,505,183 UART: [fht] FHT @ 0x50003400
3,517,139 UART: [idev] ++
3,517,717 UART: [idev] CDI.KEYID = 6
3,518,637 UART: [idev] SUBJECT.KEYID = 7
3,519,812 UART: [idev] UDS.KEYID = 0
3,520,864 ready_for_fw is high
3,521,060 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,752 UART: [idev] Erasing UDS.KEYID = 0
6,025,833 UART: [idev] Sha1 KeyId Algorithm
6,047,702 UART: [idev] --
6,053,099 UART: [ldev] ++
6,053,706 UART: [ldev] CDI.KEYID = 6
6,054,601 UART: [ldev] SUBJECT.KEYID = 5
6,055,701 UART: [ldev] AUTHORITY.KEYID = 7
6,056,989 UART: [ldev] FE.KEYID = 1
6,098,832 UART: [ldev] Erasing FE.KEYID = 1
8,600,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,472 UART: [ldev] --
10,412,738 UART: [fwproc] Wait for Commands...
10,414,513 UART: [fwproc] Recv command 0x46574c44
10,416,610 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,276,757 >>> mbox cmd response: success
14,277,277 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,281,516 UART: [afmc] ++
14,282,102 UART: [afmc] CDI.KEYID = 6
14,283,012 UART: [afmc] SUBJECT.KEYID = 7
14,284,175 UART: [afmc] AUTHORITY.KEYID = 5
16,825,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,915 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,122 UART: [afmc] --
18,626,978 UART: [cold-reset] --
18,631,143 UART: [state] Locking Datavault
18,637,763 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,418 UART: [state] Locking ICCM
18,641,760 UART: [exit] Launching FMC @ 0x40000130
18,650,151 UART:
18,650,387 UART: Running Caliptra FMC ...
18,651,410 UART:
18,651,556 UART: [state] CFI Enabled
18,708,421 UART: [fht] FMC Alias Private Key: 7
20,473,169 UART: [art] Extend RT PCRs Done
20,474,387 UART: [art] Lock RT PCRs Done
20,476,035 UART: [art] Populate DV Done
20,481,554 UART: [fht] FMC Alias Private Key: 7
20,483,263 UART: [art] Derive CDI
20,484,083 UART: [art] Store in in slot 0x4
20,541,213 UART: [art] Derive Key Pair
20,542,213 UART: [art] Store priv key in slot 0x5
23,005,239 UART: [art] Derive Key Pair - Done
23,018,465 UART: [art] Signing Cert with AUTHO
23,019,776 UART: RITY.KEYID = 7
24,731,333 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,831 UART: [art] PUB.X = 06B6D10F94330DC40A5FCED0D113528D2CE0A5DE36685DBAA3289DAE6329832E14A31F6C8BC2A5F00199485F622B0403
24,740,077 UART: [art] PUB.Y = 5DD27AD9D37C92D14CB30E0735E12404C3EF898B389DFFD8CE449E8C410DFB9C809BBFD21F2F193BD44551F764D86A8D
24,747,356 UART: [art] SIG.R = 673C74FEA1EC2F1A2A4F3C9389B88FAD68D6C126B0FB8BAAE18B84EFC85F285C9278AD5DE854B52FCCC4B1A53301CD19
24,754,793 UART: [art] SIG.S = 27EB8EF7F3A6B8522BAD5C2A05C678D2FEC44D660E307BE3974D5719C882158895291CA3A2191891AAD30057BD9CD046
25,733,659 UART: Caliptra RT
25,734,364 UART: [state] CFI Enabled
25,898,256 UART: [rt] RT listening for mailbox commands...
25,929,928 UART: [rt]cmd =0x50435245, len=56
25,931,878 >>> mbox cmd response: failed
25,932,167 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,962,469 UART: [rt]cmd =0x50435245, len=56
25,964,491 >>> mbox cmd response: failed
25,964,771 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,994,808 UART: [rt]cmd =0x50435245, len=56
25,996,546 >>> mbox cmd response: failed
25,996,818 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,026,685 UART: [rt]cmd =0x50435245, len=56
26,028,599 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
192,607 UART:
192,962 UART: Running Caliptra ROM ...
194,145 UART:
194,304 UART: [state] CFI Enabled
267,287 UART: [state] LifecycleState = Unprovisioned
269,691 UART: [state] DebugLocked = No
271,087 UART: [state] WD Timer not started. Device not locked for debugging
276,475 UART: [kat] SHA2-256
466,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,160 UART: [kat] ++
477,611 UART: [kat] sha1
489,833 UART: [kat] SHA2-256
492,839 UART: [kat] SHA2-384
498,766 UART: [kat] SHA2-512-ACC
501,349 UART: [kat] ECC-384
2,945,335 UART: [kat] HMAC-384Kdf
2,970,429 UART: [kat] LMS
3,502,169 UART: [kat] --
3,507,586 UART: [cold-reset] ++
3,509,093 UART: [fht] FHT @ 0x50003400
3,521,569 UART: [idev] ++
3,522,204 UART: [idev] CDI.KEYID = 6
3,523,236 UART: [idev] SUBJECT.KEYID = 7
3,524,412 UART: [idev] UDS.KEYID = 0
3,525,338 ready_for_fw is high
3,525,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,364 UART: [idev] Erasing UDS.KEYID = 0
6,028,582 UART: [idev] Sha1 KeyId Algorithm
6,051,937 UART: [idev] --
6,058,002 UART: [ldev] ++
6,058,685 UART: [ldev] CDI.KEYID = 6
6,059,600 UART: [ldev] SUBJECT.KEYID = 5
6,060,760 UART: [ldev] AUTHORITY.KEYID = 7
6,062,158 UART: [ldev] FE.KEYID = 1
6,102,089 UART: [ldev] Erasing FE.KEYID = 1
8,610,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,344 UART: [ldev] --
10,419,227 UART: [fwproc] Wait for Commands...
10,421,702 UART: [fwproc] Recv command 0x46574c44
10,423,957 UART: [fwproc] Recv'd Img size: 114360 bytes
13,874,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,612,450 >>> mbox cmd response: success
14,613,032 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,615,891 UART: [afmc] ++
14,616,588 UART: [afmc] CDI.KEYID = 6
14,617,833 UART: [afmc] SUBJECT.KEYID = 7
14,619,271 UART: [afmc] AUTHORITY.KEYID = 5
17,162,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,888,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,890,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,905,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,920,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,935,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,959,271 UART: [afmc] --
18,962,172 UART: [cold-reset] --
18,966,846 UART: [state] Locking Datavault
18,971,620 UART: [state] Locking PCR0, PCR1 and PCR31
18,973,816 UART: [state] Locking ICCM
18,976,133 UART: [exit] Launching FMC @ 0x40000130
18,984,800 UART:
18,985,037 UART: Running Caliptra FMC ...
18,986,139 UART:
18,986,303 UART: [state] CFI Enabled
19,045,265 UART: [fht] FMC Alias Private Key: 7
20,809,533 UART: [art] Extend RT PCRs Done
20,810,757 UART: [art] Lock RT PCRs Done
20,812,517 UART: [art] Populate DV Done
20,817,843 UART: [fht] FMC Alias Private Key: 7
20,819,437 UART: [art] Derive CDI
20,820,257 UART: [art] Store in in slot 0x4
20,877,602 UART: [art] Derive Key Pair
20,878,639 UART: [art] Store priv key in slot 0x5
23,341,607 UART: [art] Derive Key Pair - Done
23,354,546 UART: [art] Signing Cert with AUTHO
23,355,855 UART: RITY.KEYID = 7
25,067,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,374 UART: [art] PUB.X = 3EF80CD4D5DF1D12700677B4271C62D75A4F207232E06D8A1762C43B60BFF5C0660AFF2D5C19C4981F67A7CA2E243052
25,076,619 UART: [art] PUB.Y = 2F8A3CFC02FC6F0D857A971C734DC102CBD07D862222F6067D4C536EA015CA91660411CC7B4D22F48B860BBDE86C1305
25,083,894 UART: [art] SIG.R = D1905FE43B0D810DF3AB6ADC5EFDD41EF8EC467BAB6CD0BBF8643567D313F82E1AD92FC1C4A3D9D842ED0FF9368759B2
25,091,338 UART: [art] SIG.S = 6402C9F947F70547C665ED0A75B412650D9BFDAA662729789DF559BB18BE0FBC43CC060DFB0B7760C42D565B77274D1A
26,070,605 UART: Caliptra RT
26,071,318 UART: [state] CFI Enabled
26,236,574 UART: [rt] RT listening for mailbox commands...
26,267,927 UART: [rt]cmd =0x50435245, len=56
26,269,851 >>> mbox cmd response: failed
26,270,149 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,300,185 UART: [rt]cmd =0x50435245, len=56
26,302,151 >>> mbox cmd response: failed
26,302,426 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,332,451 UART: [rt]cmd =0x50435245, len=56
26,334,147 >>> mbox cmd response: failed
26,334,419 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,364,555 UART: [rt]cmd =0x50435245, len=56
26,366,305 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,440,472 ready_for_fw is high
3,440,863 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,729,202 >>> mbox cmd response: success
14,730,020 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,047,840 UART:
19,048,307 UART: Running Caliptra FMC ...
19,049,434 UART:
19,049,595 UART: [state] CFI Enabled
19,115,364 UART: [fht] FMC Alias Private Key: 7
20,879,528 UART: [art] Extend RT PCRs Done
20,880,756 UART: [art] Lock RT PCRs Done
20,882,549 UART: [art] Populate DV Done
20,887,596 UART: [fht] FMC Alias Private Key: 7
20,889,302 UART: [art] Derive CDI
20,890,117 UART: [art] Store in in slot 0x4
20,948,539 UART: [art] Derive Key Pair
20,949,577 UART: [art] Store priv key in slot 0x5
23,412,247 UART: [art] Derive Key Pair - Done
23,424,916 UART: [art] Signing Cert with AUTHO
23,426,256 UART: RITY.KEYID = 7
25,138,108 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,678 UART: [art] PUB.X = 45A7440046F688CDBD9EF3EDA08F5F7F8BBCA82C167B4506F660A37C17DE1612E5C91420BC0D33477AA7F8241FBCF225
25,146,929 UART: [art] PUB.Y = 57B62EC7B0293E1694531CEA88C641CE09688BDEFE9D65C311F992F74FA740D910BDA0BF39A6E568F0156AF476229B37
25,154,173 UART: [art] SIG.R = 19815D66389C0421A74BE63E15448AE02258F1A5CDEC9E70BCF8F159A0E542E0A8A315B4B266A6A8511CBD867E7759EF
25,161,565 UART: [art] SIG.S = B1BDCE54629EC1D4CC6F0E2E37F6382EF38665E87D2FF83899A05698C3EF572AA106AA4DED659026E5DCC33153CADB30
26,140,335 UART: Caliptra RT
26,141,021 UART: [state] CFI Enabled
26,307,939 UART: [rt] RT listening for mailbox commands...
26,339,292 UART: [rt]cmd =0x50435245, len=56
26,341,049 >>> mbox cmd response: failed
26,341,395 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,371,544 UART: [rt]cmd =0x50435245, len=56
26,373,021 >>> mbox cmd response: failed
26,373,292 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,403,471 UART: [rt]cmd =0x50435245, len=56
26,405,169 >>> mbox cmd response: failed
26,405,443 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,435,595 UART: [rt]cmd =0x50435245, len=56
26,437,297 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,396 UART:
192,758 UART: Running Caliptra ROM ...
193,857 UART:
603,702 UART: [state] CFI Enabled
617,240 UART: [state] LifecycleState = Unprovisioned
619,625 UART: [state] DebugLocked = No
622,420 UART: [state] WD Timer not started. Device not locked for debugging
626,947 UART: [kat] SHA2-256
816,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,632 UART: [kat] ++
828,157 UART: [kat] sha1
841,403 UART: [kat] SHA2-256
844,449 UART: [kat] SHA2-384
850,023 UART: [kat] SHA2-512-ACC
852,612 UART: [kat] ECC-384
3,294,133 UART: [kat] HMAC-384Kdf
3,307,371 UART: [kat] LMS
3,839,171 UART: [kat] --
3,842,451 UART: [cold-reset] ++
3,843,952 UART: [fht] FHT @ 0x50003400
3,856,494 UART: [idev] ++
3,857,197 UART: [idev] CDI.KEYID = 6
3,858,144 UART: [idev] SUBJECT.KEYID = 7
3,859,388 UART: [idev] UDS.KEYID = 0
3,860,322 ready_for_fw is high
3,860,543 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,218 UART: [idev] Erasing UDS.KEYID = 0
6,337,867 UART: [idev] Sha1 KeyId Algorithm
6,359,598 UART: [idev] --
6,363,620 UART: [ldev] ++
6,364,320 UART: [ldev] CDI.KEYID = 6
6,365,235 UART: [ldev] SUBJECT.KEYID = 5
6,366,394 UART: [ldev] AUTHORITY.KEYID = 7
6,367,624 UART: [ldev] FE.KEYID = 1
6,378,968 UART: [ldev] Erasing FE.KEYID = 1
8,859,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,217 UART: [ldev] --
10,648,050 UART: [fwproc] Wait for Commands...
10,650,256 UART: [fwproc] Recv command 0x46574c44
10,652,559 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,840,788 >>> mbox cmd response: success
14,841,365 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,845,514 UART: [afmc] ++
14,846,210 UART: [afmc] CDI.KEYID = 6
14,847,448 UART: [afmc] SUBJECT.KEYID = 7
14,848,875 UART: [afmc] AUTHORITY.KEYID = 5
17,352,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,907 UART: [afmc] --
19,150,039 UART: [cold-reset] --
19,154,820 UART: [state] Locking Datavault
19,162,371 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,534 UART: [state] Locking ICCM
19,166,252 UART: [exit] Launching FMC @ 0x40000130
19,174,920 UART:
19,175,159 UART: Running Caliptra FMC ...
19,176,259 UART:
19,176,418 UART: [state] CFI Enabled
19,184,489 UART: [fht] FMC Alias Private Key: 7
20,942,116 UART: [art] Extend RT PCRs Done
20,943,323 UART: [art] Lock RT PCRs Done
20,945,105 UART: [art] Populate DV Done
20,950,693 UART: [fht] FMC Alias Private Key: 7
20,952,449 UART: [art] Derive CDI
20,953,260 UART: [art] Store in in slot 0x4
20,996,007 UART: [art] Derive Key Pair
20,997,002 UART: [art] Store priv key in slot 0x5
23,423,387 UART: [art] Derive Key Pair - Done
23,436,539 UART: [art] Signing Cert with AUTHO
23,437,838 UART: RITY.KEYID = 7
25,142,811 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,310 UART: [art] PUB.X = 82EAA6BE7B91E77523C72EA21653D395175517A109AF961FEB73207D024E9FA0C3EC886929DEDEAEF5D7742D7EFFCEC3
25,151,625 UART: [art] PUB.Y = 195A864C200955AFE9FAE71A1CD28B5A7502082AC738B1339F3E58E8699134B54F3A9D2A72F912D73E10C8A0413D940A
25,158,861 UART: [art] SIG.R = FB3FB0E55855D0673A21B86D344B88A7179759DB1DD7C7346A6BB085D5D9C03C62F892171A9DD33C1150222832D555D3
25,166,288 UART: [art] SIG.S = 5C1FBEEFC2F61597A3775848171E542CA504D0562EB5FBB961F87CBEE56F894A2B7DDB2D14A7E49B4C6AA229FA9B7C0F
26,146,115 UART: Caliptra RT
26,146,799 UART: [state] CFI Enabled
26,263,875 UART: [rt] RT listening for mailbox commands...
26,295,172 UART: [rt]cmd =0x50435245, len=56
26,297,020 >>> mbox cmd response: failed
26,297,342 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,327,336 UART: [rt]cmd =0x50435245, len=56
26,329,088 >>> mbox cmd response: failed
26,329,353 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,359,379 UART: [rt]cmd =0x50435245, len=56
26,361,165 >>> mbox cmd response: failed
26,361,437 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,391,514 UART: [rt]cmd =0x50435245, len=56
26,393,371 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,753,581 ready_for_fw is high
3,754,221 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,046 >>> mbox cmd response: success
14,950,777 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,210,067 UART:
19,210,472 UART: Running Caliptra FMC ...
19,211,609 UART:
19,212,006 UART: [state] CFI Enabled
19,219,671 UART: [fht] FMC Alias Private Key: 7
20,976,221 UART: [art] Extend RT PCRs Done
20,977,436 UART: [art] Lock RT PCRs Done
20,979,437 UART: [art] Populate DV Done
20,984,899 UART: [fht] FMC Alias Private Key: 7
20,986,442 UART: [art] Derive CDI
20,987,259 UART: [art] Store in in slot 0x4
21,029,635 UART: [art] Derive Key Pair
21,030,627 UART: [art] Store priv key in slot 0x5
23,457,371 UART: [art] Derive Key Pair - Done
23,470,203 UART: [art] Signing Cert with AUTHO
23,471,509 UART: RITY.KEYID = 7
25,176,843 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,344 UART: [art] PUB.X = 15E44BCBC1B6BE188FD91DC49F4F92E0E8D3B1BA6543C4FB2A0C0A95EE57727B64E7897FC49588D8D8C6C1F969B2501D
25,185,637 UART: [art] PUB.Y = 59EAED8D14515EDDA594BC8A082C33E800568170646508A6C8EE48EBA13CBB8D142995068B855EE094C874FB56334C18
25,192,858 UART: [art] SIG.R = 9B683B785519DC206C1B2F3565A8A81AE0B7A4BA605E2AD1F8C1A5B22130C3B2A73CFF6F1A792B177C0F75F7125EC61C
25,200,249 UART: [art] SIG.S = 8924FEC3A32A956E0C2620DE16CA06B8F5FAD959EFB30E4021665624425E5A6E4E0B9690E94D507F5712D9A9AED891AE
26,178,850 UART: Caliptra RT
26,179,543 UART: [state] CFI Enabled
26,296,013 UART: [rt] RT listening for mailbox commands...
26,327,636 UART: [rt]cmd =0x50435245, len=56
26,329,448 >>> mbox cmd response: failed
26,329,760 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,360,127 UART: [rt]cmd =0x50435245, len=56
26,362,079 >>> mbox cmd response: failed
26,362,350 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,392,649 UART: [rt]cmd =0x50435245, len=56
26,394,278 >>> mbox cmd response: failed
26,394,537 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,424,573 UART: [rt]cmd =0x50435245, len=56
26,426,256 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,800 UART: [state] LifecycleState = Unprovisioned
86,455 UART: [state] DebugLocked = No
86,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,445 UART: [kat] SHA2-256
882,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,491 UART: [kat] ++
886,643 UART: [kat] sha1
890,967 UART: [kat] SHA2-256
892,905 UART: [kat] SHA2-384
895,542 UART: [kat] SHA2-512-ACC
897,443 UART: [kat] ECC-384
902,956 UART: [kat] HMAC-384Kdf
907,662 UART: [kat] LMS
1,475,858 UART: [kat] --
1,476,707 UART: [cold-reset] ++
1,477,091 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 ready_for_fw is high
1,481,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,892 UART: [idev] Erasing UDS.KEYID = 0
1,505,598 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,184 UART: [idev] --
1,515,297 UART: [ldev] ++
1,515,465 UART: [ldev] CDI.KEYID = 6
1,515,828 UART: [ldev] SUBJECT.KEYID = 5
1,516,254 UART: [ldev] AUTHORITY.KEYID = 7
1,516,717 UART: [ldev] FE.KEYID = 1
1,521,815 UART: [ldev] Erasing FE.KEYID = 1
1,546,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,223 UART: [fwproc] Waiting for Commands...
1,586,894 UART: [fwproc] Received command 0x46574c44
1,587,685 UART: [fwproc] Received Image of size 114360 bytes
2,885,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,802 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,154 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,953 >>> mbox cmd response: success
3,077,953 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,079,033 UART: [afmc] ++
3,079,201 UART: [afmc] CDI.KEYID = 6
3,079,563 UART: [afmc] SUBJECT.KEYID = 7
3,079,988 UART: [afmc] AUTHORITY.KEYID = 5
3,114,699 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,135 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,528 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,218 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,177 UART: [afmc] --
3,158,223 UART: [cold-reset] --
3,159,215 UART: [state] Locking Datavault
3,160,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,978 UART: [state] Locking ICCM
3,161,506 UART: [exit] Launching FMC @ 0x40000130
3,166,835 UART:
3,166,851 UART: Running Caliptra FMC ...
3,167,259 UART:
3,167,313 UART: [state] CFI Enabled
3,177,858 UART: [fht] FMC Alias Private Key: 7
3,286,277 UART: [art] Extend RT PCRs Done
3,286,705 UART: [art] Lock RT PCRs Done
3,288,087 UART: [art] Populate DV Done
3,296,448 UART: [fht] FMC Alias Private Key: 7
3,297,430 UART: [art] Derive CDI
3,297,710 UART: [art] Store in in slot 0x4
3,383,483 UART: [art] Derive Key Pair
3,383,843 UART: [art] Store priv key in slot 0x5
3,396,073 UART: [art] Derive Key Pair - Done
3,410,858 UART: [art] Signing Cert with AUTHO
3,411,338 UART: RITY.KEYID = 7
3,426,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,707 UART: [art] PUB.X = 00B0CFF978D8AD46432F27F2D10BB0071CD7347BCF4FCCF91C5E9D0DC99CA359D1F4F5BEEC31E8EF749012EA3154322B
3,434,466 UART: [art] PUB.Y = A16448D36F4FD6EEFE3B37C401AFE186867E54CF7A1D58FEF0CE65DC5CBD04D7788B52A886C78452DDE08EBF8585CAC1
3,441,432 UART: [art] SIG.R = BCFA5C23FDCEF8727FC905AEA034F18634ABE1CFA96327A12EAE92BA50C86FABD3AE9C5122BC87D6EE1D25C07F5BE40C
3,448,228 UART: [art] SIG.S = 871A0A85CC3360352CE74E165ACC679E72343E216A73CBB609F132F22CAB0D506C203C079F51DB422F7AF06D82949840
3,471,831 UART: Caliptra RT
3,472,085 UART: [state] CFI Enabled
3,580,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,301 UART: [rt]cmd =0x50435245, len=56
3,612,648 >>> mbox cmd response: failed
3,612,648 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,428 UART: [rt]cmd =0x50435245, len=56
3,643,623 >>> mbox cmd response: failed
3,643,623 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,409 UART: [rt]cmd =0x50435245, len=56
3,674,948 >>> mbox cmd response: failed
3,674,948 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,722 UART: [rt]cmd =0x50435245, len=56
3,706,121 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 ready_for_fw is high
1,362,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,653 >>> mbox cmd response: success
2,928,653 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,267 UART:
2,990,283 UART: Running Caliptra FMC ...
2,990,691 UART:
2,990,745 UART: [state] CFI Enabled
3,000,688 UART: [fht] FMC Alias Private Key: 7
3,108,339 UART: [art] Extend RT PCRs Done
3,108,767 UART: [art] Lock RT PCRs Done
3,110,381 UART: [art] Populate DV Done
3,118,812 UART: [fht] FMC Alias Private Key: 7
3,119,966 UART: [art] Derive CDI
3,120,246 UART: [art] Store in in slot 0x4
3,206,157 UART: [art] Derive Key Pair
3,206,517 UART: [art] Store priv key in slot 0x5
3,219,469 UART: [art] Derive Key Pair - Done
3,233,870 UART: [art] Signing Cert with AUTHO
3,234,350 UART: RITY.KEYID = 7
3,249,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,723 UART: [art] PUB.X = 82379FFE3DD5E40E6FEF1CEFAC5568CD616A2618952F9C06CC7F19EB8B58359EAD2BBD962CA3B493F9317C1702FBAE60
3,257,504 UART: [art] PUB.Y = 12672C6DD088EAE6A8557BF4EB74372AC51F69C1B36EF0A935D70DD0CB83F9FD692110B2A0F8BB446B3AD09A43C1AFD4
3,264,469 UART: [art] SIG.R = C47B636FFF93E87B8B65797F6F550892FF14E129FC77513390A7347DA50A99733B54402AC39577781AD90A2A84C06003
3,271,219 UART: [art] SIG.S = A841863312F00BB23665D91C905655EF80AEEF153C7D606BF89B5CD4481BF65BBCD488BAEF86DA37DA8DAC7B1C8DEE43
3,294,865 UART: Caliptra RT
3,295,119 UART: [state] CFI Enabled
3,402,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,219 UART: [rt]cmd =0x50435245, len=56
3,434,778 >>> mbox cmd response: failed
3,434,778 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,602 UART: [rt]cmd =0x50435245, len=56
3,466,203 >>> mbox cmd response: failed
3,466,203 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,135 UART: [rt]cmd =0x50435245, len=56
3,497,456 >>> mbox cmd response: failed
3,497,456 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,068 UART: [rt]cmd =0x50435245, len=56
3,528,549 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
87,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,510 UART: [kat] SHA2-256
882,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,556 UART: [kat] ++
886,708 UART: [kat] sha1
891,018 UART: [kat] SHA2-256
892,956 UART: [kat] SHA2-384
895,887 UART: [kat] SHA2-512-ACC
897,788 UART: [kat] ECC-384
903,453 UART: [kat] HMAC-384Kdf
908,091 UART: [kat] LMS
1,476,287 UART: [kat] --
1,477,478 UART: [cold-reset] ++
1,478,016 UART: [fht] Storing FHT @ 0x50003400
1,480,819 UART: [idev] ++
1,480,987 UART: [idev] CDI.KEYID = 6
1,481,347 UART: [idev] SUBJECT.KEYID = 7
1,481,771 UART: [idev] UDS.KEYID = 0
1,482,116 ready_for_fw is high
1,482,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,490,003 UART: [idev] Erasing UDS.KEYID = 0
1,506,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,913 UART: [idev] --
1,516,126 UART: [ldev] ++
1,516,294 UART: [ldev] CDI.KEYID = 6
1,516,657 UART: [ldev] SUBJECT.KEYID = 5
1,517,083 UART: [ldev] AUTHORITY.KEYID = 7
1,517,546 UART: [ldev] FE.KEYID = 1
1,522,628 UART: [ldev] Erasing FE.KEYID = 1
1,548,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,317 UART: [ldev] --
1,587,630 UART: [fwproc] Waiting for Commands...
1,588,281 UART: [fwproc] Received command 0x46574c44
1,589,072 UART: [fwproc] Received Image of size 114360 bytes
2,887,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,037 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,906 >>> mbox cmd response: success
3,080,906 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,082,048 UART: [afmc] ++
3,082,216 UART: [afmc] CDI.KEYID = 6
3,082,578 UART: [afmc] SUBJECT.KEYID = 7
3,083,003 UART: [afmc] AUTHORITY.KEYID = 5
3,117,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,218 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,998 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,726 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,611 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,301 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,254 UART: [afmc] --
3,161,132 UART: [cold-reset] --
3,161,982 UART: [state] Locking Datavault
3,163,021 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,625 UART: [state] Locking ICCM
3,164,261 UART: [exit] Launching FMC @ 0x40000130
3,169,590 UART:
3,169,606 UART: Running Caliptra FMC ...
3,170,014 UART:
3,170,157 UART: [state] CFI Enabled
3,180,442 UART: [fht] FMC Alias Private Key: 7
3,288,527 UART: [art] Extend RT PCRs Done
3,288,955 UART: [art] Lock RT PCRs Done
3,290,457 UART: [art] Populate DV Done
3,298,846 UART: [fht] FMC Alias Private Key: 7
3,299,948 UART: [art] Derive CDI
3,300,228 UART: [art] Store in in slot 0x4
3,386,281 UART: [art] Derive Key Pair
3,386,641 UART: [art] Store priv key in slot 0x5
3,399,929 UART: [art] Derive Key Pair - Done
3,414,874 UART: [art] Signing Cert with AUTHO
3,415,354 UART: RITY.KEYID = 7
3,430,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,419 UART: [art] PUB.X = 81BCDF5677F6AB84E20188E134671E907348C635C0A965BDAA04C22F03644CF7AD85C0AC72BA10E8DB3D953C554E48FD
3,438,190 UART: [art] PUB.Y = 5AF9EFA9F57F52FC07B8C535F60A052E40029E890C7DEBF4C0D08425D155FC5A688C1B3F39AD2A487A729AD09304BA97
3,445,134 UART: [art] SIG.R = C8ED4115C77F86B76FA0ADE3F8349E288E0CAEAAC8DA20D9C9F5669EBCB6B5EBB5AAF28CC6194F6C282057C5A911F438
3,451,925 UART: [art] SIG.S = 2299D86196DD92189E97CF753F2EE8537654F0BF24EDFF0A4790644482278AE96AA45073C3D9097A7E7A4DF961F6EFB3
3,475,498 UART: Caliptra RT
3,475,844 UART: [state] CFI Enabled
3,584,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,537 UART: [rt]cmd =0x50435245, len=56
3,616,006 >>> mbox cmd response: failed
3,616,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,688 UART: [rt]cmd =0x50435245, len=56
3,647,209 >>> mbox cmd response: failed
3,647,209 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,709 UART: [rt]cmd =0x50435245, len=56
3,678,210 >>> mbox cmd response: failed
3,678,210 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,088 UART: [rt]cmd =0x50435245, len=56
3,709,591 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 ready_for_fw is high
1,362,826 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,122 >>> mbox cmd response: success
2,928,122 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,990,226 UART:
2,990,242 UART: Running Caliptra FMC ...
2,990,650 UART:
2,990,793 UART: [state] CFI Enabled
3,001,444 UART: [fht] FMC Alias Private Key: 7
3,109,415 UART: [art] Extend RT PCRs Done
3,109,843 UART: [art] Lock RT PCRs Done
3,111,045 UART: [art] Populate DV Done
3,119,360 UART: [fht] FMC Alias Private Key: 7
3,120,296 UART: [art] Derive CDI
3,120,576 UART: [art] Store in in slot 0x4
3,206,175 UART: [art] Derive Key Pair
3,206,535 UART: [art] Store priv key in slot 0x5
3,219,995 UART: [art] Derive Key Pair - Done
3,234,718 UART: [art] Signing Cert with AUTHO
3,235,198 UART: RITY.KEYID = 7
3,250,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,015 UART: [art] PUB.X = ADC7B8E150736C93903F45CB063C4B047AF3E3051823B8A44E355458D2C33266C2B487E77A6DFCFB31DBE60B8B803D9D
3,257,781 UART: [art] PUB.Y = 68E9990C41D35D76243F12163C86BD45185F5A57523F2CCBB7DAC8885FDF2F608E35389AD9A41AD1654E8075325AAB1B
3,264,732 UART: [art] SIG.R = EC61B9450680D4BDF52972F6EEA708DB498C30C84E6ED38F428899F671BD96B4BB0062B068BAF014A8417D8612C8C41A
3,271,480 UART: [art] SIG.S = 275F69F4FE459858531D0A1063BB3B10B6005B6E579AB5788D06AE3B7C8422CF731DAE8C71F80A75F0EAA066A2EDCE1E
3,294,868 UART: Caliptra RT
3,295,214 UART: [state] CFI Enabled
3,403,690 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,227 UART: [rt]cmd =0x50435245, len=56
3,435,832 >>> mbox cmd response: failed
3,435,832 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,550 UART: [rt]cmd =0x50435245, len=56
3,466,967 >>> mbox cmd response: failed
3,466,967 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,653 UART: [rt]cmd =0x50435245, len=56
3,498,378 >>> mbox cmd response: failed
3,498,378 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,958 UART: [rt]cmd =0x50435245, len=56
3,529,065 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
893,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,471 UART: [kat] ++
897,623 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,364 UART: [kat] SHA2-512-ACC
908,265 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,630 UART: [kat] LMS
1,170,958 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,174,812 UART: [idev] ++
1,174,980 UART: [idev] CDI.KEYID = 6
1,175,340 UART: [idev] SUBJECT.KEYID = 7
1,175,764 UART: [idev] UDS.KEYID = 0
1,176,109 ready_for_fw is high
1,176,109 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,478 UART: [idev] Erasing UDS.KEYID = 0
1,200,247 UART: [idev] Sha1 KeyId Algorithm
1,208,775 UART: [idev] --
1,209,747 UART: [ldev] ++
1,209,915 UART: [ldev] CDI.KEYID = 6
1,210,278 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,480 UART: [fwproc] Wait for Commands...
1,282,058 UART: [fwproc] Recv command 0x46574c44
1,282,786 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,828 >>> mbox cmd response: success
2,773,828 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,936 UART: [afmc] ++
2,775,104 UART: [afmc] CDI.KEYID = 6
2,775,466 UART: [afmc] SUBJECT.KEYID = 7
2,775,891 UART: [afmc] AUTHORITY.KEYID = 5
2,811,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,348 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,067 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,827 UART: [afmc] --
2,854,795 UART: [cold-reset] --
2,855,603 UART: [state] Locking Datavault
2,856,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,400 UART: [state] Locking ICCM
2,857,884 UART: [exit] Launching FMC @ 0x40000130
2,863,213 UART:
2,863,229 UART: Running Caliptra FMC ...
2,863,637 UART:
2,863,691 UART: [state] CFI Enabled
2,874,256 UART: [fht] FMC Alias Private Key: 7
2,982,003 UART: [art] Extend RT PCRs Done
2,982,431 UART: [art] Lock RT PCRs Done
2,983,839 UART: [art] Populate DV Done
2,991,978 UART: [fht] FMC Alias Private Key: 7
2,992,944 UART: [art] Derive CDI
2,993,224 UART: [art] Store in in slot 0x4
3,078,807 UART: [art] Derive Key Pair
3,079,167 UART: [art] Store priv key in slot 0x5
3,091,749 UART: [art] Derive Key Pair - Done
3,106,458 UART: [art] Signing Cert with AUTHO
3,106,938 UART: RITY.KEYID = 7
3,122,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,903 UART: [art] PUB.X = C1DD041714A424D17B2FB1C7B9F2D1AD42A4D7E9D84639DAC96DCC4B3DF04FF4C86F10398D81F69E5481BC6BE2C9E9E8
3,129,690 UART: [art] PUB.Y = F3925B7411ED94A8A8AE4BA30B5679A7F30040ACDB2BF78BE6E5B0265A206302A920C4E651BEB4CB8813442811408673
3,136,614 UART: [art] SIG.R = 83BDEFE24A6F5B9ED232E26F366D1F1FD66BE19239562D378FBD1CF8978DD5AFB5AB47C23F3C85BA936A88D569926C40
3,143,400 UART: [art] SIG.S = 3FDB5B75BD772FEF90446F126BAE563EA7DBBE56E476DC818C8BAA09720A3A2A25F86D2AB13387AE4A8B646102A5A280
3,167,372 UART: Caliptra RT
3,167,626 UART: [state] CFI Enabled
3,275,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,573 UART: [rt]cmd =0x50435245, len=56
3,307,064 >>> mbox cmd response: failed
3,307,064 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,668 UART: [rt]cmd =0x50435245, len=56
3,337,979 >>> mbox cmd response: failed
3,337,979 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,861 UART: [rt]cmd =0x50435245, len=56
3,369,450 >>> mbox cmd response: failed
3,369,450 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,036 UART: [rt]cmd =0x50435245, len=56
3,400,551 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,695 ready_for_fw is high
1,059,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,129 >>> mbox cmd response: success
2,624,129 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,387 UART:
2,686,403 UART: Running Caliptra FMC ...
2,686,811 UART:
2,686,865 UART: [state] CFI Enabled
2,697,396 UART: [fht] FMC Alias Private Key: 7
2,805,725 UART: [art] Extend RT PCRs Done
2,806,153 UART: [art] Lock RT PCRs Done
2,807,615 UART: [art] Populate DV Done
2,815,948 UART: [fht] FMC Alias Private Key: 7
2,817,006 UART: [art] Derive CDI
2,817,286 UART: [art] Store in in slot 0x4
2,902,833 UART: [art] Derive Key Pair
2,903,193 UART: [art] Store priv key in slot 0x5
2,915,995 UART: [art] Derive Key Pair - Done
2,930,732 UART: [art] Signing Cert with AUTHO
2,931,212 UART: RITY.KEYID = 7
2,946,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,103 UART: [art] PUB.X = 161A1CDF33BCD7EE6053646A29D9C906D52DFF7D3B814C0CE4F98B0CB2F7A897711A12E5FDA574135BC5102100780B37
2,953,847 UART: [art] PUB.Y = EB981298C6AB5EF258E62741CEE5451617D6FD9E3309BBBBC1B9810DC9490439E7026709B58DE0734FE17274AA51812B
2,960,784 UART: [art] SIG.R = 4CEF3B004E789A2494D24E4A647CAB06BE7B6D1D2001EEEA8DB179522B46DC2C768D0EBC1692DFF69BAD31CE9E272E0F
2,967,542 UART: [art] SIG.S = DEB7E99AF37493EB166ACD30F85FBFE6DCC895B1AB6D573C1B84D4B7A23119FEA3FD4EE985770841ED316BF4DDAABCAD
2,991,540 UART: Caliptra RT
2,991,794 UART: [state] CFI Enabled
3,100,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,603 UART: [rt]cmd =0x50435245, len=56
3,132,028 >>> mbox cmd response: failed
3,132,028 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,904 UART: [rt]cmd =0x50435245, len=56
3,163,389 >>> mbox cmd response: failed
3,163,389 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,905 UART: [rt]cmd =0x50435245, len=56
3,194,542 >>> mbox cmd response: failed
3,194,542 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,242 UART: [rt]cmd =0x50435245, len=56
3,225,657 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
893,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,062 UART: [kat] ++
898,214 UART: [kat] sha1
902,448 UART: [kat] SHA2-256
904,388 UART: [kat] SHA2-384
907,165 UART: [kat] SHA2-512-ACC
909,066 UART: [kat] ECC-384
919,259 UART: [kat] HMAC-384Kdf
923,889 UART: [kat] LMS
1,172,217 UART: [kat] --
1,173,136 UART: [cold-reset] ++
1,173,666 UART: [fht] FHT @ 0x50003400
1,176,263 UART: [idev] ++
1,176,431 UART: [idev] CDI.KEYID = 6
1,176,791 UART: [idev] SUBJECT.KEYID = 7
1,177,215 UART: [idev] UDS.KEYID = 0
1,177,560 ready_for_fw is high
1,177,560 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,511 UART: [idev] Erasing UDS.KEYID = 0
1,203,056 UART: [idev] Sha1 KeyId Algorithm
1,211,546 UART: [idev] --
1,212,646 UART: [ldev] ++
1,212,814 UART: [ldev] CDI.KEYID = 6
1,213,177 UART: [ldev] SUBJECT.KEYID = 5
1,213,603 UART: [ldev] AUTHORITY.KEYID = 7
1,214,066 UART: [ldev] FE.KEYID = 1
1,219,442 UART: [ldev] Erasing FE.KEYID = 1
1,246,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,876 UART: [ldev] --
1,285,291 UART: [fwproc] Wait for Commands...
1,286,047 UART: [fwproc] Recv command 0x46574c44
1,286,775 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,777,139 >>> mbox cmd response: success
2,777,139 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,778,261 UART: [afmc] ++
2,778,429 UART: [afmc] CDI.KEYID = 6
2,778,791 UART: [afmc] SUBJECT.KEYID = 7
2,779,216 UART: [afmc] AUTHORITY.KEYID = 5
2,814,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,516 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,326 UART: [afmc] --
2,858,262 UART: [cold-reset] --
2,858,978 UART: [state] Locking Datavault
2,860,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,945 UART: [state] Locking ICCM
2,861,413 UART: [exit] Launching FMC @ 0x40000130
2,866,742 UART:
2,866,758 UART: Running Caliptra FMC ...
2,867,166 UART:
2,867,309 UART: [state] CFI Enabled
2,878,034 UART: [fht] FMC Alias Private Key: 7
2,985,857 UART: [art] Extend RT PCRs Done
2,986,285 UART: [art] Lock RT PCRs Done
2,987,681 UART: [art] Populate DV Done
2,995,960 UART: [fht] FMC Alias Private Key: 7
2,997,072 UART: [art] Derive CDI
2,997,352 UART: [art] Store in in slot 0x4
3,083,543 UART: [art] Derive Key Pair
3,083,903 UART: [art] Store priv key in slot 0x5
3,096,903 UART: [art] Derive Key Pair - Done
3,111,413 UART: [art] Signing Cert with AUTHO
3,111,893 UART: RITY.KEYID = 7
3,127,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,856 UART: [art] PUB.X = 5998752DCA3BEB81FFD287B6B583BBE9B2672528E0B47284D1E27B4AA9A433AAB06D7049FBA6DCC8D6C42A78E97B73E5
3,134,642 UART: [art] PUB.Y = BB1FABF278B52BA15434BDCEC3A2AE5B4B667BACA4EF6222A844EB4751C97C9E29C80D0D5559D3D6D8B819C1C9DAA97C
3,141,612 UART: [art] SIG.R = E4B3740F65ABBB332CF1206B260A37DEAAEBE8931B146A8FDAC872E4A4CA8D232A5245B0A9C4848F4920C7FE0F03431D
3,148,386 UART: [art] SIG.S = 089899B99957421DD316B3F8BC791DA1D2312B22FAD7735F856FDB8B58DFBD4C381AD103F944989FD91EBC7DF260B4D2
3,172,285 UART: Caliptra RT
3,172,631 UART: [state] CFI Enabled
3,280,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,062 UART: [rt]cmd =0x50435245, len=56
3,312,421 >>> mbox cmd response: failed
3,312,421 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,933 UART: [rt]cmd =0x50435245, len=56
3,343,588 >>> mbox cmd response: failed
3,343,588 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,150 UART: [rt]cmd =0x50435245, len=56
3,374,503 >>> mbox cmd response: failed
3,374,503 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,303 UART: [rt]cmd =0x50435245, len=56
3,405,998 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,114 ready_for_fw is high
1,060,114 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,608 >>> mbox cmd response: success
2,627,608 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,690,228 UART:
2,690,244 UART: Running Caliptra FMC ...
2,690,652 UART:
2,690,795 UART: [state] CFI Enabled
2,700,946 UART: [fht] FMC Alias Private Key: 7
2,808,947 UART: [art] Extend RT PCRs Done
2,809,375 UART: [art] Lock RT PCRs Done
2,810,965 UART: [art] Populate DV Done
2,819,244 UART: [fht] FMC Alias Private Key: 7
2,820,392 UART: [art] Derive CDI
2,820,672 UART: [art] Store in in slot 0x4
2,906,531 UART: [art] Derive Key Pair
2,906,891 UART: [art] Store priv key in slot 0x5
2,919,987 UART: [art] Derive Key Pair - Done
2,934,544 UART: [art] Signing Cert with AUTHO
2,935,024 UART: RITY.KEYID = 7
2,949,954 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,719 UART: [art] PUB.X = 5907323354D4B64BAB60635EE274C1B498DDA2053B6112EC98A7DF85DE7731F0BB3EEFB5FD4843F026E6053C76574C9A
2,957,486 UART: [art] PUB.Y = F64616BCCBD209A9CFAACEAD5D44E83C30E0AF3851A227837B8B502F868A4B3259B6323ABF220116DA83C5D4E20A2659
2,964,439 UART: [art] SIG.R = E72F6AB3619D80791E664E8A02B4188DFD5EB11A30949FC813FC800E8363CF7DE6CAFDAC40B1E08AC7CB95CAE0F97B66
2,971,223 UART: [art] SIG.S = 3D545C06A18862361445B2251AEBEC309D74EFFA2FBBCDB720EE81ADD5655F9A5F1CD6CC107621527D3C9B6E4B36DA51
2,995,355 UART: Caliptra RT
2,995,701 UART: [state] CFI Enabled
3,102,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,190 UART: [rt]cmd =0x50435245, len=56
3,134,571 >>> mbox cmd response: failed
3,134,571 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,341 UART: [rt]cmd =0x50435245, len=56
3,165,796 >>> mbox cmd response: failed
3,165,796 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,498 UART: [rt]cmd =0x50435245, len=56
3,196,811 >>> mbox cmd response: failed
3,196,811 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,621 UART: [rt]cmd =0x50435245, len=56
3,228,218 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,272 UART: [kat] LMS
1,169,584 UART: [kat] --
1,170,511 UART: [cold-reset] ++
1,170,953 UART: [fht] FHT @ 0x50003400
1,173,615 UART: [idev] ++
1,173,783 UART: [idev] CDI.KEYID = 6
1,174,144 UART: [idev] SUBJECT.KEYID = 7
1,174,569 UART: [idev] UDS.KEYID = 0
1,174,915 ready_for_fw is high
1,174,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,999 UART: [idev] Sha1 KeyId Algorithm
1,208,867 UART: [idev] --
1,209,904 UART: [ldev] ++
1,210,072 UART: [ldev] CDI.KEYID = 6
1,210,436 UART: [ldev] SUBJECT.KEYID = 5
1,210,863 UART: [ldev] AUTHORITY.KEYID = 7
1,211,326 UART: [ldev] FE.KEYID = 1
1,216,498 UART: [ldev] Erasing FE.KEYID = 1
1,243,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,692 UART: [ldev] --
1,282,156 UART: [fwproc] Wait for Commands...
1,282,747 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,666 >>> mbox cmd response: success
2,772,666 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,773,695 UART: [afmc] ++
2,773,863 UART: [afmc] CDI.KEYID = 6
2,774,226 UART: [afmc] SUBJECT.KEYID = 7
2,774,652 UART: [afmc] AUTHORITY.KEYID = 5
2,810,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,540 UART: [afmc] --
2,853,478 UART: [cold-reset] --
2,854,182 UART: [state] Locking Datavault
2,855,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,919 UART: [state] Locking ICCM
2,856,487 UART: [exit] Launching FMC @ 0x40000130
2,861,816 UART:
2,861,832 UART: Running Caliptra FMC ...
2,862,240 UART:
2,862,294 UART: [state] CFI Enabled
2,872,621 UART: [fht] FMC Alias Private Key: 7
2,980,198 UART: [art] Extend RT PCRs Done
2,980,626 UART: [art] Lock RT PCRs Done
2,982,192 UART: [art] Populate DV Done
2,990,503 UART: [fht] FMC Alias Private Key: 7
2,991,547 UART: [art] Derive CDI
2,991,827 UART: [art] Store in in slot 0x4
3,077,952 UART: [art] Derive Key Pair
3,078,312 UART: [art] Store priv key in slot 0x5
3,091,556 UART: [art] Derive Key Pair - Done
3,106,350 UART: [art] Signing Cert with AUTHO
3,106,830 UART: RITY.KEYID = 7
3,122,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,889 UART: [art] PUB.X = 675FA3CF5FA9C033B2763CA70D377D1005FBEEC22B30D19F6C2D2F0D54B3A961AEA0554E7B5C1F440F57373FADE5F9FA
3,129,667 UART: [art] PUB.Y = 98C94B1FCDDE06F908E34BFE8865CD2A53B2A7A8329674A2A0C570CB372ECC50CC2510DB66BB19C1B54D0773FF386741
3,136,620 UART: [art] SIG.R = FD3E37394C58075E40C3067DA459DCB865F42A66E2F63E51AFA84E05A45E5B8CA407B3B1216A729163E8750ECFAAA98A
3,143,385 UART: [art] SIG.S = A005675747676F86B5BA7E32A715E74E14976C4AAD53C719F0E37A58CE4C5FECE635ED4F8BA3A46F485C0AE0D47192C9
3,167,658 UART: Caliptra RT
3,167,912 UART: [state] CFI Enabled
3,276,151 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,564 UART: [rt]cmd =0x50435245, len=56
3,307,933 >>> mbox cmd response: failed
3,307,933 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,823 UART: [rt]cmd =0x50435245, len=56
3,339,244 >>> mbox cmd response: failed
3,339,244 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,796 UART: [rt]cmd =0x50435245, len=56
3,369,887 >>> mbox cmd response: failed
3,369,887 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,413 UART: [rt]cmd =0x50435245, len=56
3,400,806 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,886 ready_for_fw is high
1,055,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,936 >>> mbox cmd response: success
2,622,936 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,212 UART:
2,686,228 UART: Running Caliptra FMC ...
2,686,636 UART:
2,686,690 UART: [state] CFI Enabled
2,697,561 UART: [fht] FMC Alias Private Key: 7
2,805,098 UART: [art] Extend RT PCRs Done
2,805,526 UART: [art] Lock RT PCRs Done
2,806,660 UART: [art] Populate DV Done
2,814,777 UART: [fht] FMC Alias Private Key: 7
2,815,959 UART: [art] Derive CDI
2,816,239 UART: [art] Store in in slot 0x4
2,901,874 UART: [art] Derive Key Pair
2,902,234 UART: [art] Store priv key in slot 0x5
2,915,534 UART: [art] Derive Key Pair - Done
2,930,262 UART: [art] Signing Cert with AUTHO
2,930,742 UART: RITY.KEYID = 7
2,946,180 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,945 UART: [art] PUB.X = EA1BA6923944FDF26AEB5C81E2483671BF5C927DDF01C3625EBEB434CF1D30D1B47262ABBD4DE1A5F19357FA1DC8315C
2,953,732 UART: [art] PUB.Y = 79BCE69186477348147A618CE385E577FE6CA1336CF5192B18A4158B5726B33F627706622AD8B139FF8BABEFD1BE883F
2,960,681 UART: [art] SIG.R = C0AB4A0B7BD6E6493E5C93CBCD1F1BD52031229A44FD5DFBD5F5AF05929BAED12482C18758E5EA55BFB95D2EDEB381C5
2,967,471 UART: [art] SIG.S = B1F7885AA4080E8A7C50248689CFFD7742370386745F1599C1916241821988930FFD318594D59B55163FE713ECE8739F
2,991,486 UART: Caliptra RT
2,991,740 UART: [state] CFI Enabled
3,099,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,280 UART: [rt]cmd =0x50435245, len=56
3,131,811 >>> mbox cmd response: failed
3,131,811 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,197 UART: [rt]cmd =0x50435245, len=56
3,162,664 >>> mbox cmd response: failed
3,162,664 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,488 UART: [rt]cmd =0x50435245, len=56
3,193,797 >>> mbox cmd response: failed
3,193,797 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,325 UART: [rt]cmd =0x50435245, len=56
3,224,814 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,760 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,174,056 ready_for_fw is high
1,174,056 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,660 UART: [idev] Erasing UDS.KEYID = 0
1,198,622 UART: [idev] Sha1 KeyId Algorithm
1,207,404 UART: [idev] --
1,208,465 UART: [ldev] ++
1,208,633 UART: [ldev] CDI.KEYID = 6
1,208,997 UART: [ldev] SUBJECT.KEYID = 5
1,209,424 UART: [ldev] AUTHORITY.KEYID = 7
1,209,887 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,241,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,843 UART: [ldev] --
1,281,247 UART: [fwproc] Wait for Commands...
1,281,896 UART: [fwproc] Recv command 0x46574c44
1,282,629 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,985 >>> mbox cmd response: success
2,772,985 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,108 UART: [afmc] ++
2,774,276 UART: [afmc] CDI.KEYID = 6
2,774,639 UART: [afmc] SUBJECT.KEYID = 7
2,775,065 UART: [afmc] AUTHORITY.KEYID = 5
2,810,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,599 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,318 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,193 UART: [afmc] --
2,854,179 UART: [cold-reset] --
2,855,035 UART: [state] Locking Datavault
2,856,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,700 UART: [state] Locking ICCM
2,857,198 UART: [exit] Launching FMC @ 0x40000130
2,862,527 UART:
2,862,543 UART: Running Caliptra FMC ...
2,862,951 UART:
2,863,094 UART: [state] CFI Enabled
2,874,003 UART: [fht] FMC Alias Private Key: 7
2,981,262 UART: [art] Extend RT PCRs Done
2,981,690 UART: [art] Lock RT PCRs Done
2,983,448 UART: [art] Populate DV Done
2,991,639 UART: [fht] FMC Alias Private Key: 7
2,992,603 UART: [art] Derive CDI
2,992,883 UART: [art] Store in in slot 0x4
3,078,970 UART: [art] Derive Key Pair
3,079,330 UART: [art] Store priv key in slot 0x5
3,092,434 UART: [art] Derive Key Pair - Done
3,107,287 UART: [art] Signing Cert with AUTHO
3,107,767 UART: RITY.KEYID = 7
3,123,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,918 UART: [art] PUB.X = 27FA74C57490FB8A06686EAB775B670493F89AD810AD6C6580E49F8193CBD9131043109997FC847F5D360D8A9159B6DB
3,130,677 UART: [art] PUB.Y = EFAC3CBAA8A2698D9C7E63472C2F809AF35BB36E8648DBBAAAC1EF40C0C02D144667F83C42A85AA6218E82278A7D7FB2
3,137,647 UART: [art] SIG.R = 9B07660D2E23ABE854CA79B75A30F8DDCDB9D26C80C9555935FD48E614E20D7E32CDE7A90A2EDE3065E5A23219369369
3,144,413 UART: [art] SIG.S = 841A6659E1B3F02AA0E045D1745F6732A9C6D058F2001788A8A9A3AD9D1FA49AA8494537D8CDA02D658AA4ED34D70D68
3,167,879 UART: Caliptra RT
3,168,225 UART: [state] CFI Enabled
3,276,364 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,887 UART: [rt]cmd =0x50435245, len=56
3,308,306 >>> mbox cmd response: failed
3,308,306 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,348 UART: [rt]cmd =0x50435245, len=56
3,339,501 >>> mbox cmd response: failed
3,339,501 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,233 UART: [rt]cmd =0x50435245, len=56
3,370,442 >>> mbox cmd response: failed
3,370,442 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,038 UART: [rt]cmd =0x50435245, len=56
3,401,605 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,457 ready_for_fw is high
1,055,457 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,479 >>> mbox cmd response: success
2,622,479 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,684,847 UART:
2,684,863 UART: Running Caliptra FMC ...
2,685,271 UART:
2,685,414 UART: [state] CFI Enabled
2,695,961 UART: [fht] FMC Alias Private Key: 7
2,803,954 UART: [art] Extend RT PCRs Done
2,804,382 UART: [art] Lock RT PCRs Done
2,806,130 UART: [art] Populate DV Done
2,814,481 UART: [fht] FMC Alias Private Key: 7
2,815,567 UART: [art] Derive CDI
2,815,847 UART: [art] Store in in slot 0x4
2,901,582 UART: [art] Derive Key Pair
2,901,942 UART: [art] Store priv key in slot 0x5
2,914,614 UART: [art] Derive Key Pair - Done
2,929,765 UART: [art] Signing Cert with AUTHO
2,930,245 UART: RITY.KEYID = 7
2,945,879 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,644 UART: [art] PUB.X = D037933F6F389BFA03EFC7958998EA6DFAD9EBCDE8E1BE2BE26E869276AE29C56B3E2F4A72153DA939170961C6817B9A
2,953,422 UART: [art] PUB.Y = 68B117431C088824C2BE6B275648AFB8102BF882E214474F48F0DA8E1200220A85C4FF570C1A9AB4D129C711BEF23E4B
2,960,343 UART: [art] SIG.R = EEBDA169F5F855A8CDB0F9B146484ED6961B96BEB9FD5E07BB637E29D68ADDF335B9449E3134C330E43EA6B7C301D802
2,967,120 UART: [art] SIG.S = F08AB7AB13DF393F0A318D04F59EB16E33245C63695FC03715B3C3CE42E541D897D2F91371FA798E802B0EAD9C8D9E2C
2,991,040 UART: Caliptra RT
2,991,386 UART: [state] CFI Enabled
3,098,625 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,418 UART: [rt]cmd =0x50435245, len=56
3,130,899 >>> mbox cmd response: failed
3,130,899 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,713 UART: [rt]cmd =0x50435245, len=56
3,162,250 >>> mbox cmd response: failed
3,162,250 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,052 UART: [rt]cmd =0x50435245, len=56
3,193,263 >>> mbox cmd response: failed
3,193,263 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,849 UART: [rt]cmd =0x50435245, len=56
3,224,138 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,412 UART:
192,782 UART: Running Caliptra ROM ...
194,278 UART:
194,438 UART: [state] CFI Enabled
264,620 UART: [state] LifecycleState = Unprovisioned
266,557 UART: [state] DebugLocked = No
269,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,907 UART: [kat] SHA2-256
443,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,131 UART: [kat] ++
454,574 UART: [kat] sha1
466,292 UART: [kat] SHA2-256
469,013 UART: [kat] SHA2-384
474,859 UART: [kat] SHA2-512-ACC
477,217 UART: [kat] ECC-384
2,766,148 UART: [kat] HMAC-384Kdf
2,779,659 UART: [kat] LMS
3,969,995 UART: [kat] --
3,974,007 UART: [cold-reset] ++
3,976,014 UART: [fht] Storing FHT @ 0x50003400
3,988,054 UART: [idev] ++
3,988,692 UART: [idev] CDI.KEYID = 6
3,989,564 UART: [idev] SUBJECT.KEYID = 7
3,990,865 UART: [idev] UDS.KEYID = 0
3,991,813 ready_for_fw is high
3,991,999 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,403 UART: [idev] Erasing UDS.KEYID = 0
7,324,893 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,286 UART: [idev] --
7,352,142 UART: [ldev] ++
7,352,703 UART: [ldev] CDI.KEYID = 6
7,353,692 UART: [ldev] SUBJECT.KEYID = 5
7,354,896 UART: [ldev] AUTHORITY.KEYID = 7
7,356,171 UART: [ldev] FE.KEYID = 1
7,401,899 UART: [ldev] Erasing FE.KEYID = 1
10,731,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,634 UART: [ldev] --
13,092,255 UART: [fwproc] Waiting for Commands...
13,093,913 UART: [fwproc] Received command 0x46574c44
13,096,090 UART: [fwproc] Received Image of size 114036 bytes
17,147,354 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,217,325 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,286,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,602,300 >>> mbox cmd response: success
17,602,906 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,607,367 UART: [afmc] ++
17,608,001 UART: [afmc] CDI.KEYID = 6
17,608,883 UART: [afmc] SUBJECT.KEYID = 7
17,610,146 UART: [afmc] AUTHORITY.KEYID = 5
20,964,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,263,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,265,698 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,108 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,294,924 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,309,352 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,235 UART: [afmc] --
23,335,477 UART: [cold-reset] --
23,339,546 UART: [state] Locking Datavault
23,344,404 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,169 UART: [state] Locking ICCM
23,348,177 UART: [exit] Launching FMC @ 0x40000130
23,356,558 UART:
23,356,790 UART: Running Caliptra FMC ...
23,357,827 UART:
23,357,968 UART: [state] CFI Enabled
23,424,552 UART: [fht] FMC Alias Private Key: 7
25,762,249 UART: [art] Extend RT PCRs Done
25,763,468 UART: [art] Lock RT PCRs Done
25,765,081 UART: [art] Populate DV Done
25,770,384 UART: [fht] FMC Alias Private Key: 7
25,772,081 UART: [art] Derive CDI
25,772,892 UART: [art] Store in in slot 0x4
25,832,880 UART: [art] Derive Key Pair
25,833,916 UART: [art] Store priv key in slot 0x5
29,126,643 UART: [art] Derive Key Pair - Done
29,139,769 UART: [art] Signing Cert with AUTHO
29,141,067 UART: RITY.KEYID = 7
31,427,914 UART: [art] Erasing AUTHORITY.KEYID = 7
31,429,420 UART: [art] PUB.X = 7CC0DD9C9FBC3C658D1BB70E7163CE11D24ED40E4A332E9FDB2D31AA3617497CD534DAE5F9927D1A13F57CA1D4866BE5
31,436,665 UART: [art] PUB.Y = E65AFDB079349F49A54800487501DCF427051C1D68BC4FF4E2CC4CCA511CB3087B53FB2DDA4C5BE8AB3D4359A14D3AEE
31,443,937 UART: [art] SIG.R = 6AF2157484C94310B364355F6BF9DE45454A075D552549D4E0B00B5F14F2B0C37E0B4EA7FA4262CF7A80A911BDEC455E
31,451,313 UART: [art] SIG.S = 5D279B1E39222E951D171DE80BE6EF387775A5066764DB5323A30F6A46A9DF75B444864C22BF9CF7D8937524987EEB3E
32,756,164 UART: Caliptra RT
32,756,875 UART: [state] CFI Enabled
32,917,956 UART: [rt] RT listening for mailbox commands...
32,949,040 UART: [rt]cmd =0x50435252, len=8
32,950,825 >>> mbox cmd response data (8 bytes)
32,951,785 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
32,981,933 UART: [rt]cmd =0x50435251, len=36
34,145,746 >>> mbox cmd response data (1848 bytes)
34,155,982 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,185,854 UART: [rt]cmd =0x43455246, len=4
34,198,808 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,784,370 ready_for_fw is high
3,784,942 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,865,392 >>> mbox cmd response: success
17,866,133 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,551,773 UART:
23,552,159 UART: Running Caliptra FMC ...
23,553,256 UART:
23,553,406 UART: [state] CFI Enabled
23,620,384 UART: [fht] FMC Alias Private Key: 7
25,958,234 UART: [art] Extend RT PCRs Done
25,959,461 UART: [art] Lock RT PCRs Done
25,961,222 UART: [art] Populate DV Done
25,966,636 UART: [fht] FMC Alias Private Key: 7
25,968,168 UART: [art] Derive CDI
25,968,902 UART: [art] Store in in slot 0x4
26,029,385 UART: [art] Derive Key Pair
26,030,383 UART: [art] Store priv key in slot 0x5
29,322,656 UART: [art] Derive Key Pair - Done
29,335,658 UART: [art] Signing Cert with AUTHO
29,336,963 UART: RITY.KEYID = 7
31,623,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,885 UART: [art] PUB.X = 9E258E37D5668E3EF82B572A5EE2D92F17A7CC745D49A1D458C7972FA39D477C041F778069B48431B2C681C984AF390D
31,632,068 UART: [art] PUB.Y = 646603A62AFF8CF96143906B5196899AD78DB985A60FD9E22F59C157E57005F4EDE4479B4D5C5B4BE2F310ADE92D83DA
31,639,332 UART: [art] SIG.R = 3CED0EF30CDB565F29233CDBE6F03A87E72598E706962843C4BB84CC298CA400879068522557FF052882EC4395627043
31,646,680 UART: [art] SIG.S = CFD56EFE2B998E7801A5F5918A3736425A5523D30A72F79A2B3FFEE74F81967D219C8C83A44156ADC93933F53CB27E49
32,952,041 UART: Caliptra RT
32,952,737 UART: [state] CFI Enabled
33,114,265 UART: [rt] RT listening for mailbox commands...
33,145,367 UART: [rt]cmd =0x50435252, len=8
33,147,378 >>> mbox cmd response data (8 bytes)
33,148,371 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,178,335 UART: [rt]cmd =0x50435251, len=36
34,341,929 >>> mbox cmd response data (1848 bytes)
34,352,137 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,382,130 UART: [rt]cmd =0x43455246, len=4
34,394,981 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,437 UART:
192,806 UART: Running Caliptra ROM ...
193,896 UART:
603,590 UART: [state] CFI Enabled
616,242 UART: [state] LifecycleState = Unprovisioned
618,199 UART: [state] DebugLocked = No
619,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,948 UART: [kat] SHA2-256
794,675 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,186 UART: [kat] ++
805,716 UART: [kat] sha1
817,517 UART: [kat] SHA2-256
820,251 UART: [kat] SHA2-384
826,811 UART: [kat] SHA2-512-ACC
829,166 UART: [kat] ECC-384
3,113,996 UART: [kat] HMAC-384Kdf
3,126,756 UART: [kat] LMS
4,316,876 UART: [kat] --
4,324,163 UART: [cold-reset] ++
4,326,166 UART: [fht] Storing FHT @ 0x50003400
4,338,633 UART: [idev] ++
4,339,221 UART: [idev] CDI.KEYID = 6
4,340,181 UART: [idev] SUBJECT.KEYID = 7
4,341,423 UART: [idev] UDS.KEYID = 0
4,342,592 ready_for_fw is high
4,342,812 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,109 UART: [idev] Erasing UDS.KEYID = 0
7,629,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,360 UART: [idev] --
7,653,947 UART: [ldev] ++
7,654,516 UART: [ldev] CDI.KEYID = 6
7,655,453 UART: [ldev] SUBJECT.KEYID = 5
7,656,632 UART: [ldev] AUTHORITY.KEYID = 7
7,657,965 UART: [ldev] FE.KEYID = 1
7,670,307 UART: [ldev] Erasing FE.KEYID = 1
10,955,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,210 UART: [ldev] --
13,317,671 UART: [fwproc] Waiting for Commands...
13,320,520 UART: [fwproc] Received command 0x46574c44
13,322,703 UART: [fwproc] Received Image of size 114036 bytes
17,375,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,844,057 >>> mbox cmd response: success
17,844,633 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,847,371 UART: [afmc] ++
17,847,953 UART: [afmc] CDI.KEYID = 6
17,848,885 UART: [afmc] SUBJECT.KEYID = 7
17,850,150 UART: [afmc] AUTHORITY.KEYID = 5
21,165,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,771 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,144 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,969 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,415 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,646 UART: [afmc] --
23,531,748 UART: [cold-reset] --
23,535,660 UART: [state] Locking Datavault
23,540,417 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,175 UART: [state] Locking ICCM
23,544,543 UART: [exit] Launching FMC @ 0x40000130
23,552,896 UART:
23,553,174 UART: Running Caliptra FMC ...
23,554,284 UART:
23,554,443 UART: [state] CFI Enabled
23,562,293 UART: [fht] FMC Alias Private Key: 7
25,892,838 UART: [art] Extend RT PCRs Done
25,894,073 UART: [art] Lock RT PCRs Done
25,895,562 UART: [art] Populate DV Done
25,901,141 UART: [fht] FMC Alias Private Key: 7
25,902,674 UART: [art] Derive CDI
25,903,487 UART: [art] Store in in slot 0x4
25,945,863 UART: [art] Derive Key Pair
25,946,859 UART: [art] Store priv key in slot 0x5
29,189,325 UART: [art] Derive Key Pair - Done
29,202,371 UART: [art] Signing Cert with AUTHO
29,203,665 UART: RITY.KEYID = 7
31,483,241 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,745 UART: [art] PUB.X = A06D306FA9E4739E5670E87A87B99B2C796BEB3B643AEB42AF97A3255762856D910B67EEDFF86467021E510FAACFB46B
31,491,988 UART: [art] PUB.Y = 58BB9EA27ED9BE754B2C42FC97DADCB94FE484D9E56D2DEF22AFCFAFF626878E0F309C435F7A3B27F49230891E41FD80
31,499,226 UART: [art] SIG.R = 54C1DF5E3EB3E1CD18D0498C4505B18ADF45F188941938B2D4A1CB0FF85EE2FFEEF3C87C8532A163901BB8308A79A81B
31,506,635 UART: [art] SIG.S = 9E932F014866E5D7645923F62EF15F870C986B73EE9DC358E2EA3D1B2816F935824D37B235F4E51E961A9408CEBC6E19
32,811,519 UART: Caliptra RT
32,812,232 UART: [state] CFI Enabled
32,929,634 UART: [rt] RT listening for mailbox commands...
32,960,515 UART: [rt]cmd =0x50435252, len=8
32,962,642 >>> mbox cmd response data (8 bytes)
32,963,710 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
32,993,551 UART: [rt]cmd =0x50435251, len=36
34,149,071 >>> mbox cmd response data (1848 bytes)
34,159,318 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,189,200 UART: [rt]cmd =0x43455246, len=4
34,202,162 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,126,813 ready_for_fw is high
4,127,190 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,526 >>> mbox cmd response: success
18,069,547 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,708,630 UART:
23,709,001 UART: Running Caliptra FMC ...
23,710,205 UART:
23,710,383 UART: [state] CFI Enabled
23,718,008 UART: [fht] FMC Alias Private Key: 7
26,047,854 UART: [art] Extend RT PCRs Done
26,049,079 UART: [art] Lock RT PCRs Done
26,050,876 UART: [art] Populate DV Done
26,056,471 UART: [fht] FMC Alias Private Key: 7
26,058,124 UART: [art] Derive CDI
26,058,941 UART: [art] Store in in slot 0x4
26,101,399 UART: [art] Derive Key Pair
26,102,450 UART: [art] Store priv key in slot 0x5
29,344,742 UART: [art] Derive Key Pair - Done
29,357,741 UART: [art] Signing Cert with AUTHO
29,359,044 UART: RITY.KEYID = 7
31,638,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,045 UART: [art] PUB.X = E2EC615D8518FEFA2CDD3BC28BAAF11F33D3470193CE4DFE99B8F37816E952E67372AAD1AF11B6CCCAFD402F72A1831C
31,647,315 UART: [art] PUB.Y = D923C8DD6A26C8DEA5F02B1EA9767BDF84D07682D05830594DDBFB542F3A4FAEC5F7CE9DDC724FB4276EB6C015B117E1
31,654,619 UART: [art] SIG.R = 733BEF9817F3F8625DA7E67CE25C47A985F4914977C86EAE566353DD7D3576329FC2088858DA536676F8E9FCE39A8DE5
31,662,019 UART: [art] SIG.S = 3514FF363B4E0D9DB0F33CF58F6DB3922AE469043642FAD52E1216298CF850572DFC2B674AE991AC051525B291711709
32,967,121 UART: Caliptra RT
32,967,826 UART: [state] CFI Enabled
33,084,841 UART: [rt] RT listening for mailbox commands...
33,115,716 UART: [rt]cmd =0x50435252, len=8
33,117,652 >>> mbox cmd response data (8 bytes)
33,118,552 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,148,665 UART: [rt]cmd =0x50435251, len=36
34,303,990 >>> mbox cmd response data (1848 bytes)
34,314,197 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,344,172 UART: [rt]cmd =0x43455246, len=4
34,357,322 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
192,691 UART:
193,057 UART: Running Caliptra ROM ...
194,184 UART:
194,345 UART: [state] CFI Enabled
262,407 UART: [state] LifecycleState = Unprovisioned
264,122 UART: [state] DebugLocked = No
265,147 UART: [state] WD Timer not started. Device not locked for debugging
268,968 UART: [kat] SHA2-256
448,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,661 UART: [kat] ++
460,109 UART: [kat] sha1
472,044 UART: [kat] SHA2-256
475,122 UART: [kat] SHA2-384
481,607 UART: [kat] SHA2-512-ACC
484,551 UART: [kat] ECC-384
2,943,083 UART: [kat] HMAC-384Kdf
2,966,826 UART: [kat] LMS
3,496,221 UART: [kat] --
3,498,299 UART: [cold-reset] ++
3,500,747 UART: [fht] FHT @ 0x50003400
3,510,942 UART: [idev] ++
3,511,510 UART: [idev] CDI.KEYID = 6
3,512,435 UART: [idev] SUBJECT.KEYID = 7
3,513,611 UART: [idev] UDS.KEYID = 0
3,514,535 ready_for_fw is high
3,514,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,658,565 UART: [idev] Erasing UDS.KEYID = 0
6,020,963 UART: [idev] Sha1 KeyId Algorithm
6,043,999 UART: [idev] --
6,048,653 UART: [ldev] ++
6,049,224 UART: [ldev] CDI.KEYID = 6
6,050,118 UART: [ldev] SUBJECT.KEYID = 5
6,051,328 UART: [ldev] AUTHORITY.KEYID = 7
6,052,515 UART: [ldev] FE.KEYID = 1
6,089,775 UART: [ldev] Erasing FE.KEYID = 1
8,594,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,277 UART: [ldev] --
10,404,415 UART: [fwproc] Wait for Commands...
10,406,024 UART: [fwproc] Recv command 0x46574c44
10,408,122 UART: [fwproc] Recv'd Img size: 114360 bytes
13,814,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,271,568 >>> mbox cmd response: success
14,272,153 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,275,414 UART: [afmc] ++
14,276,002 UART: [afmc] CDI.KEYID = 6
14,276,937 UART: [afmc] SUBJECT.KEYID = 7
14,278,102 UART: [afmc] AUTHORITY.KEYID = 5
16,806,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,280 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,556 UART: [afmc] --
18,610,123 UART: [cold-reset] --
18,612,365 UART: [state] Locking Datavault
18,618,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,753 UART: [state] Locking ICCM
18,621,202 UART: [exit] Launching FMC @ 0x40000130
18,629,652 UART:
18,629,888 UART: Running Caliptra FMC ...
18,631,007 UART:
18,631,176 UART: [state] CFI Enabled
18,690,947 UART: [fht] FMC Alias Private Key: 7
20,455,174 UART: [art] Extend RT PCRs Done
20,456,399 UART: [art] Lock RT PCRs Done
20,457,971 UART: [art] Populate DV Done
20,463,490 UART: [fht] FMC Alias Private Key: 7
20,465,036 UART: [art] Derive CDI
20,465,857 UART: [art] Store in in slot 0x4
20,523,900 UART: [art] Derive Key Pair
20,524,942 UART: [art] Store priv key in slot 0x5
22,987,616 UART: [art] Derive Key Pair - Done
23,000,785 UART: [art] Signing Cert with AUTHO
23,002,102 UART: RITY.KEYID = 7
24,713,971 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,474 UART: [art] PUB.X = C02440AB8DD32752FB76004DF5D85A9FD18CB93045DDAAE9A240A3B854D6EDD17478F12CA4B522631439C051768F4655
24,722,735 UART: [art] PUB.Y = C92970781B144829332EC9E2532045E2032D0D0D53DC14DB8C2FD14B6F922CADAF091B0220BF1D38F5E2963FE979DF08
24,729,955 UART: [art] SIG.R = 174A0CF4A8FC67EA513B3D416D60AC8FA88ED6F810F0D0FF200720EE5E8A6F5B67837435D9579B602D4E84A95BE2F660
24,737,394 UART: [art] SIG.S = F8141F64F9FF9038EFBAC06D61B1CD360EC513EEF8E0E5273DD2F99CC9D6AE3D3D648A43287977F2F0A8409B95539418
25,715,993 UART: Caliptra RT
25,716,703 UART: [state] CFI Enabled
25,881,475 UART: [rt] RT listening for mailbox commands...
25,912,511 UART: [rt]cmd =0x50435252, len=8
25,914,469 >>> mbox cmd response data (8 bytes)
25,915,400 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,945,593 UART: [rt]cmd =0x50435251, len=36
26,861,775 >>> mbox cmd response data (1848 bytes)
26,872,071 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,902,091 UART: [rt]cmd =0x43455246, len=4
26,914,761 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,405 UART:
192,761 UART: Running Caliptra ROM ...
193,905 UART:
194,070 UART: [state] CFI Enabled
265,319 UART: [state] LifecycleState = Unprovisioned
267,738 UART: [state] DebugLocked = No
269,427 UART: [state] WD Timer not started. Device not locked for debugging
274,036 UART: [kat] SHA2-256
463,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,668 UART: [kat] ++
475,149 UART: [kat] sha1
486,308 UART: [kat] SHA2-256
489,316 UART: [kat] SHA2-384
494,109 UART: [kat] SHA2-512-ACC
496,693 UART: [kat] ECC-384
2,950,480 UART: [kat] HMAC-384Kdf
2,972,023 UART: [kat] LMS
3,503,777 UART: [kat] --
3,507,351 UART: [cold-reset] ++
3,509,591 UART: [fht] FHT @ 0x50003400
3,520,790 UART: [idev] ++
3,521,498 UART: [idev] CDI.KEYID = 6
3,522,407 UART: [idev] SUBJECT.KEYID = 7
3,523,647 UART: [idev] UDS.KEYID = 0
3,524,571 ready_for_fw is high
3,524,762 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,567 UART: [idev] Erasing UDS.KEYID = 0
6,029,087 UART: [idev] Sha1 KeyId Algorithm
6,051,447 UART: [idev] --
6,056,170 UART: [ldev] ++
6,056,857 UART: [ldev] CDI.KEYID = 6
6,057,742 UART: [ldev] SUBJECT.KEYID = 5
6,058,956 UART: [ldev] AUTHORITY.KEYID = 7
6,060,137 UART: [ldev] FE.KEYID = 1
6,100,042 UART: [ldev] Erasing FE.KEYID = 1
8,605,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,686 UART: [ldev] --
10,414,901 UART: [fwproc] Wait for Commands...
10,417,644 UART: [fwproc] Recv command 0x46574c44
10,419,894 UART: [fwproc] Recv'd Img size: 114360 bytes
13,871,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,608,344 >>> mbox cmd response: success
14,608,916 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,612,308 UART: [afmc] ++
14,613,005 UART: [afmc] CDI.KEYID = 6
14,614,268 UART: [afmc] SUBJECT.KEYID = 7
14,615,705 UART: [afmc] AUTHORITY.KEYID = 5
17,147,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,737 UART: [afmc] --
18,946,143 UART: [cold-reset] --
18,952,122 UART: [state] Locking Datavault
18,956,185 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,322 UART: [state] Locking ICCM
18,959,883 UART: [exit] Launching FMC @ 0x40000130
18,968,560 UART:
18,968,800 UART: Running Caliptra FMC ...
18,969,848 UART:
18,969,997 UART: [state] CFI Enabled
19,029,029 UART: [fht] FMC Alias Private Key: 7
20,793,427 UART: [art] Extend RT PCRs Done
20,794,643 UART: [art] Lock RT PCRs Done
20,796,668 UART: [art] Populate DV Done
20,802,130 UART: [fht] FMC Alias Private Key: 7
20,803,828 UART: [art] Derive CDI
20,804,563 UART: [art] Store in in slot 0x4
20,861,571 UART: [art] Derive Key Pair
20,862,616 UART: [art] Store priv key in slot 0x5
23,325,067 UART: [art] Derive Key Pair - Done
23,337,908 UART: [art] Signing Cert with AUTHO
23,339,209 UART: RITY.KEYID = 7
25,050,232 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,729 UART: [art] PUB.X = D31617F85CB1B824CBE6053B6E9C5D36E3C986DE321412A49FEAEA29F6EBD4F5F0C5895F58588B7E502EAAFC9D3B9332
25,058,982 UART: [art] PUB.Y = E97B025B9F3C76FE925BDD366F68ED5AF00172C1A92F6A06F8C44E76F95177F6BABA0DE1E9409C83045A11707777C815
25,066,266 UART: [art] SIG.R = AB7653D8343248125DD49E8C48C2CD87F71E144ED16D284F2A4E6BC79E7CA317669C89DD5ECB0E61C76DEEAF56A3F587
25,073,644 UART: [art] SIG.S = D90652E596C4A3466E07D431CE413A23926BD4CB19358657E7DBF2FF8554FC39FB74777A9FDE2D8C6E41C5D82BA54B53
26,052,370 UART: Caliptra RT
26,053,074 UART: [state] CFI Enabled
26,217,742 UART: [rt] RT listening for mailbox commands...
26,248,940 UART: [rt]cmd =0x50435252, len=8
26,250,930 >>> mbox cmd response data (8 bytes)
26,251,906 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,282,184 UART: [rt]cmd =0x50435251, len=36
27,198,584 >>> mbox cmd response data (1848 bytes)
27,208,820 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,238,914 UART: [rt]cmd =0x43455246, len=4
27,251,768 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,419,746 ready_for_fw is high
3,420,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,736,441 >>> mbox cmd response: success
14,737,242 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,022,507 UART:
19,022,908 UART: Running Caliptra FMC ...
19,024,017 UART:
19,024,175 UART: [state] CFI Enabled
19,094,239 UART: [fht] FMC Alias Private Key: 7
20,857,390 UART: [art] Extend RT PCRs Done
20,858,616 UART: [art] Lock RT PCRs Done
20,860,430 UART: [art] Populate DV Done
20,865,750 UART: [fht] FMC Alias Private Key: 7
20,867,402 UART: [art] Derive CDI
20,868,141 UART: [art] Store in in slot 0x4
20,926,015 UART: [art] Derive Key Pair
20,927,022 UART: [art] Store priv key in slot 0x5
23,389,624 UART: [art] Derive Key Pair - Done
23,402,621 UART: [art] Signing Cert with AUTHO
23,403,926 UART: RITY.KEYID = 7
25,115,380 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,890 UART: [art] PUB.X = 6F8ADE45EADBB419E6E763099F506B3A819B3457401726D492114B9AE947AFA14842F04D69A22C766B3C021273FF0320
25,124,129 UART: [art] PUB.Y = 30F98D7E8E2EA33AA9BEA49E722EDF9D6D5814A58D0DC23A2B7123107B6D3315F8C18CA069B5AE0243F6B1D2C001919A
25,131,430 UART: [art] SIG.R = BE4E03DFD419FB73D12224B1CDFB2EE95E6D563CF2B25A1013C8B43C838761009F00BA253171625E31608C02258DB4E0
25,138,756 UART: [art] SIG.S = 3D53561E3B6609B1F72ECC8518E185C3586556300F335A80859FEBFA1CB530441BB8A51C9BE17DCC489E74CCA33DF7D2
26,117,805 UART: Caliptra RT
26,118,496 UART: [state] CFI Enabled
26,282,351 UART: [rt] RT listening for mailbox commands...
26,313,507 UART: [rt]cmd =0x50435252, len=8
26,315,710 >>> mbox cmd response data (8 bytes)
26,316,718 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,346,835 UART: [rt]cmd =0x50435251, len=36
27,263,434 >>> mbox cmd response data (1848 bytes)
27,273,633 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,303,547 UART: [rt]cmd =0x43455246, len=4
27,316,482 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,428 UART:
192,794 UART: Running Caliptra ROM ...
193,986 UART:
603,764 UART: [state] CFI Enabled
621,259 UART: [state] LifecycleState = Unprovisioned
623,633 UART: [state] DebugLocked = No
625,515 UART: [state] WD Timer not started. Device not locked for debugging
629,902 UART: [kat] SHA2-256
819,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,579 UART: [kat] ++
831,060 UART: [kat] sha1
842,295 UART: [kat] SHA2-256
845,260 UART: [kat] SHA2-384
851,688 UART: [kat] SHA2-512-ACC
854,274 UART: [kat] ECC-384
3,295,142 UART: [kat] HMAC-384Kdf
3,308,294 UART: [kat] LMS
3,840,092 UART: [kat] --
3,843,950 UART: [cold-reset] ++
3,845,166 UART: [fht] FHT @ 0x50003400
3,857,281 UART: [idev] ++
3,857,985 UART: [idev] CDI.KEYID = 6
3,858,865 UART: [idev] SUBJECT.KEYID = 7
3,860,104 UART: [idev] UDS.KEYID = 0
3,861,002 ready_for_fw is high
3,861,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,174 UART: [idev] Erasing UDS.KEYID = 0
6,341,286 UART: [idev] Sha1 KeyId Algorithm
6,362,690 UART: [idev] --
6,367,004 UART: [ldev] ++
6,367,686 UART: [ldev] CDI.KEYID = 6
6,368,596 UART: [ldev] SUBJECT.KEYID = 5
6,369,753 UART: [ldev] AUTHORITY.KEYID = 7
6,370,984 UART: [ldev] FE.KEYID = 1
6,384,060 UART: [ldev] Erasing FE.KEYID = 1
8,864,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,963 UART: [ldev] --
10,656,614 UART: [fwproc] Wait for Commands...
10,659,842 UART: [fwproc] Recv command 0x46574c44
10,662,150 UART: [fwproc] Recv'd Img size: 114360 bytes
14,110,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,849,419 >>> mbox cmd response: success
14,849,958 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,853,544 UART: [afmc] ++
14,854,237 UART: [afmc] CDI.KEYID = 6
14,855,421 UART: [afmc] SUBJECT.KEYID = 7
14,856,902 UART: [afmc] AUTHORITY.KEYID = 5
17,357,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,911 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,870 UART: [afmc] --
19,154,748 UART: [cold-reset] --
19,159,156 UART: [state] Locking Datavault
19,165,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,607 UART: [state] Locking ICCM
19,169,320 UART: [exit] Launching FMC @ 0x40000130
19,177,983 UART:
19,178,223 UART: Running Caliptra FMC ...
19,179,322 UART:
19,179,478 UART: [state] CFI Enabled
19,187,440 UART: [fht] FMC Alias Private Key: 7
20,944,419 UART: [art] Extend RT PCRs Done
20,945,637 UART: [art] Lock RT PCRs Done
20,947,019 UART: [art] Populate DV Done
20,952,273 UART: [fht] FMC Alias Private Key: 7
20,953,915 UART: [art] Derive CDI
20,954,646 UART: [art] Store in in slot 0x4
20,997,488 UART: [art] Derive Key Pair
20,998,529 UART: [art] Store priv key in slot 0x5
23,425,112 UART: [art] Derive Key Pair - Done
23,437,613 UART: [art] Signing Cert with AUTHO
23,438,943 UART: RITY.KEYID = 7
25,144,403 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,908 UART: [art] PUB.X = E7B690B66828B548B6354131750128035DBDDE31D880BF33E5368312B420EA310897A1964265FE2A40BB392AD38805ED
25,153,172 UART: [art] PUB.Y = C126A4B15F535A3F7925F0270848D42B2B52799D14353BB99107FF0CBE2BD801AB65FEBFAB417EB6E500CC079B9CB9AE
25,160,411 UART: [art] SIG.R = C0CE14C34A7AEB212D4B98ECF0A2DBDFA2E76395B3E2FA0C56EF8760BE33594FFAAC96C5D73E99B2A27BFA8DB272D652
25,167,855 UART: [art] SIG.S = 2B801FDA186BCE0D5AA9C64F4E53A537995A2C9012C87963CA8CC29771E3C6F7D539F1BABFE1E8CD0B4B5D106F851444
26,146,940 UART: Caliptra RT
26,147,626 UART: [state] CFI Enabled
26,265,610 UART: [rt] RT listening for mailbox commands...
26,296,692 UART: [rt]cmd =0x50435252, len=8
26,298,755 >>> mbox cmd response data (8 bytes)
26,299,684 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,329,760 UART: [rt]cmd =0x50435251, len=36
27,237,500 >>> mbox cmd response data (1848 bytes)
27,247,765 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,277,744 UART: [rt]cmd =0x43455246, len=4
27,290,128 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,756,768 ready_for_fw is high
3,757,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,958,762 >>> mbox cmd response: success
14,959,593 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,206,501 UART:
19,206,872 UART: Running Caliptra FMC ...
19,207,980 UART:
19,208,129 UART: [state] CFI Enabled
19,216,460 UART: [fht] FMC Alias Private Key: 7
20,973,245 UART: [art] Extend RT PCRs Done
20,974,478 UART: [art] Lock RT PCRs Done
20,975,915 UART: [art] Populate DV Done
20,981,119 UART: [fht] FMC Alias Private Key: 7
20,982,861 UART: [art] Derive CDI
20,983,601 UART: [art] Store in in slot 0x4
21,026,146 UART: [art] Derive Key Pair
21,027,151 UART: [art] Store priv key in slot 0x5
23,453,540 UART: [art] Derive Key Pair - Done
23,466,512 UART: [art] Signing Cert with AUTHO
23,467,852 UART: RITY.KEYID = 7
25,172,964 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,475 UART: [art] PUB.X = AECB47A7ADDCFFA8B8625F3B92D6B3CCC625D8D1B80784B282407689BE0E19E4B5223DF7CB84EF140B62788F0CEFA248
25,181,725 UART: [art] PUB.Y = 781FFC667602F15C11681199623F5491AB12861C09A8F39148AB0DFFBE2AAC89299C7B1F23BCF250B966196BF7273654
25,188,975 UART: [art] SIG.R = E232150BE2B2DA176160F184B7B0A899E7AE1407816BC79A0954850247557A8E3A04FC6D25197EBCA33C24D51A977787
25,196,363 UART: [art] SIG.S = 6641D97BD2DAA8516C6FDA16A412B475975C16A04801DA8E641A60498C0B563E46B36AD975362E5E699CEA0EE86A315C
26,175,500 UART: Caliptra RT
26,176,207 UART: [state] CFI Enabled
26,293,339 UART: [rt] RT listening for mailbox commands...
26,324,481 UART: [rt]cmd =0x50435252, len=8
26,326,871 >>> mbox cmd response data (8 bytes)
26,327,895 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,358,142 UART: [rt]cmd =0x50435251, len=36
27,265,960 >>> mbox cmd response data (1848 bytes)
27,276,193 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,306,299 UART: [rt]cmd =0x43455246, len=4
27,318,785 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,637 UART: [kat] SHA2-256
881,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,683 UART: [kat] ++
885,835 UART: [kat] sha1
890,187 UART: [kat] SHA2-256
892,125 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
906,964 UART: [kat] LMS
1,475,160 UART: [kat] --
1,476,173 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 ready_for_fw is high
1,480,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,150 UART: [idev] Erasing UDS.KEYID = 0
1,504,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,410 UART: [idev] --
1,514,581 UART: [ldev] ++
1,514,749 UART: [ldev] CDI.KEYID = 6
1,515,112 UART: [ldev] SUBJECT.KEYID = 5
1,515,538 UART: [ldev] AUTHORITY.KEYID = 7
1,516,001 UART: [ldev] FE.KEYID = 1
1,520,827 UART: [ldev] Erasing FE.KEYID = 1
1,546,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,526 UART: [ldev] --
1,585,863 UART: [fwproc] Waiting for Commands...
1,586,594 UART: [fwproc] Received command 0x46574c44
1,587,385 UART: [fwproc] Received Image of size 114360 bytes
2,885,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,008 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,239 >>> mbox cmd response: success
3,078,239 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,079,351 UART: [afmc] ++
3,079,519 UART: [afmc] CDI.KEYID = 6
3,079,881 UART: [afmc] SUBJECT.KEYID = 7
3,080,306 UART: [afmc] AUTHORITY.KEYID = 5
3,115,547 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,091 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,871 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,484 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,174 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,095 UART: [afmc] --
3,159,015 UART: [cold-reset] --
3,159,737 UART: [state] Locking Datavault
3,160,914 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,518 UART: [state] Locking ICCM
3,162,058 UART: [exit] Launching FMC @ 0x40000130
3,167,387 UART:
3,167,403 UART: Running Caliptra FMC ...
3,167,811 UART:
3,167,865 UART: [state] CFI Enabled
3,178,848 UART: [fht] FMC Alias Private Key: 7
3,286,877 UART: [art] Extend RT PCRs Done
3,287,305 UART: [art] Lock RT PCRs Done
3,289,067 UART: [art] Populate DV Done
3,297,158 UART: [fht] FMC Alias Private Key: 7
3,298,302 UART: [art] Derive CDI
3,298,582 UART: [art] Store in in slot 0x4
3,383,983 UART: [art] Derive Key Pair
3,384,343 UART: [art] Store priv key in slot 0x5
3,397,689 UART: [art] Derive Key Pair - Done
3,412,434 UART: [art] Signing Cert with AUTHO
3,412,914 UART: RITY.KEYID = 7
3,427,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,547 UART: [art] PUB.X = 93DDF5A1406B63D8FE7290B783BB7603DED29C87C45DF67388F4990509AFA2CC456E88DB44A307C19AF3A3919CF39D69
3,435,313 UART: [art] PUB.Y = D30A157731100FE696B6C2D31319A6134FDE6A87924FF8A0BD4A09463979390165F0CAEE25F40751AA2B7FBBBBC90614
3,442,249 UART: [art] SIG.R = D02A5456F356787C54DA506E2C73FF8B3A80590BB2B734F640BDAACD51E6BD8DF95880712AB70A0AB8278C9283B7F3D6
3,449,020 UART: [art] SIG.S = 700C1686A6EF2D0F0745C4340DF315CC079D6E7AC35F591321DCA5655C064D35DE150B10FDB3116B4339F70D91744225
3,472,703 UART: Caliptra RT
3,472,957 UART: [state] CFI Enabled
3,581,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,538 UART: [rt]cmd =0x50435252, len=8
3,612,996 >>> mbox cmd response data (8 bytes)
3,612,997 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,616 UART: [rt]cmd =0x50435251, len=36
3,809,997 >>> mbox cmd response data (1848 bytes)
3,809,998 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,329 UART: [rt]cmd =0x43455246, len=4
3,851,688 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,921 ready_for_fw is high
1,361,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,985 >>> mbox cmd response: success
2,926,985 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,988,397 UART:
2,988,413 UART: Running Caliptra FMC ...
2,988,821 UART:
2,988,875 UART: [state] CFI Enabled
2,999,304 UART: [fht] FMC Alias Private Key: 7
3,106,687 UART: [art] Extend RT PCRs Done
3,107,115 UART: [art] Lock RT PCRs Done
3,108,477 UART: [art] Populate DV Done
3,116,648 UART: [fht] FMC Alias Private Key: 7
3,117,608 UART: [art] Derive CDI
3,117,888 UART: [art] Store in in slot 0x4
3,203,391 UART: [art] Derive Key Pair
3,203,751 UART: [art] Store priv key in slot 0x5
3,216,933 UART: [art] Derive Key Pair - Done
3,231,656 UART: [art] Signing Cert with AUTHO
3,232,136 UART: RITY.KEYID = 7
3,247,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,575 UART: [art] PUB.X = 866A8E29608929CAF2D40EAAFB90BD7AF9BEC57FD81FAF501DC9016195A840DB69D73550E60203317728725085C01603
3,255,330 UART: [art] PUB.Y = 19F8A9B838E8AEC3E446F40B4542602096FDF7F3CF616782707CDF847B5694C1A934F7163DF009EDC499978C493999BE
3,262,274 UART: [art] SIG.R = F2E6F508A82398F96DF11FC82CED22017005BA795E4EABDACC60D994E07907AF0A689BA852E254EF9DA7D00F91BB7F63
3,269,042 UART: [art] SIG.S = 8AAC13BB3F5F5FED4EDCAD1866C48839AC47B4DC3583099B3CFC098E77AEC2CD2788022C367B62CFB26F76024FFAEFF8
3,292,765 UART: Caliptra RT
3,293,019 UART: [state] CFI Enabled
3,400,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,193 UART: [rt]cmd =0x50435252, len=8
3,432,913 >>> mbox cmd response data (8 bytes)
3,432,914 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,721 UART: [rt]cmd =0x50435251, len=36
3,630,208 >>> mbox cmd response data (1848 bytes)
3,630,209 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,578 UART: [rt]cmd =0x43455246, len=4
3,671,869 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
903,189 UART: [kat] HMAC-384Kdf
907,735 UART: [kat] LMS
1,475,931 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,480,239 UART: [idev] ++
1,480,407 UART: [idev] CDI.KEYID = 6
1,480,767 UART: [idev] SUBJECT.KEYID = 7
1,481,191 UART: [idev] UDS.KEYID = 0
1,481,536 ready_for_fw is high
1,481,536 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,207 UART: [idev] Erasing UDS.KEYID = 0
1,505,621 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,194 UART: [ldev] ++
1,515,362 UART: [ldev] CDI.KEYID = 6
1,515,725 UART: [ldev] SUBJECT.KEYID = 5
1,516,151 UART: [ldev] AUTHORITY.KEYID = 7
1,516,614 UART: [ldev] FE.KEYID = 1
1,521,998 UART: [ldev] Erasing FE.KEYID = 1
1,547,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,559 UART: [ldev] --
1,587,034 UART: [fwproc] Waiting for Commands...
1,587,655 UART: [fwproc] Received command 0x46574c44
1,588,446 UART: [fwproc] Received Image of size 114360 bytes
2,887,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,779 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,924 >>> mbox cmd response: success
3,078,924 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,080,130 UART: [afmc] ++
3,080,298 UART: [afmc] CDI.KEYID = 6
3,080,660 UART: [afmc] SUBJECT.KEYID = 7
3,081,085 UART: [afmc] AUTHORITY.KEYID = 5
3,116,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,648 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,041 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,731 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,632 UART: [afmc] --
3,159,520 UART: [cold-reset] --
3,160,428 UART: [state] Locking Datavault
3,161,527 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,131 UART: [state] Locking ICCM
3,162,795 UART: [exit] Launching FMC @ 0x40000130
3,168,124 UART:
3,168,140 UART: Running Caliptra FMC ...
3,168,548 UART:
3,168,691 UART: [state] CFI Enabled
3,179,252 UART: [fht] FMC Alias Private Key: 7
3,287,763 UART: [art] Extend RT PCRs Done
3,288,191 UART: [art] Lock RT PCRs Done
3,289,941 UART: [art] Populate DV Done
3,298,120 UART: [fht] FMC Alias Private Key: 7
3,299,212 UART: [art] Derive CDI
3,299,492 UART: [art] Store in in slot 0x4
3,385,161 UART: [art] Derive Key Pair
3,385,521 UART: [art] Store priv key in slot 0x5
3,399,425 UART: [art] Derive Key Pair - Done
3,414,269 UART: [art] Signing Cert with AUTHO
3,414,749 UART: RITY.KEYID = 7
3,430,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,832 UART: [art] PUB.X = 13054534A6CD49DF67DF201F76C65F11E3AE30CBB914A94646E2276CDBD5369EE117DEF90B39E405ED94B99FB8590ED9
3,437,600 UART: [art] PUB.Y = AE94CCA1709011E56D0B6EE2CCB73720086FDB7D8B5959665C4BFFC374A51109A8C05261138851273523DAB1487408EF
3,444,538 UART: [art] SIG.R = A2D715AD9BFD9A2FC13D1BC1CA654DF0330043F2B7385EDCAEC08CF9DFCDD24B6FDBDD3C2512761E223EBC336DCE9411
3,451,316 UART: [art] SIG.S = 1744C639A6A7533AA860FFF2F5BD0007DA2940EFF3280B8CD9622C0C1259C1A5183F9FE3C15F60D2DDB351E657BD33B4
3,475,352 UART: Caliptra RT
3,475,698 UART: [state] CFI Enabled
3,582,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,143 UART: [rt]cmd =0x50435252, len=8
3,614,575 >>> mbox cmd response data (8 bytes)
3,614,576 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,363 UART: [rt]cmd =0x50435251, len=36
3,811,668 >>> mbox cmd response data (1848 bytes)
3,811,669 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,942 UART: [rt]cmd =0x43455246, len=4
3,853,219 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,926 ready_for_fw is high
1,362,926 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,352 >>> mbox cmd response: success
2,928,352 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,990,044 UART:
2,990,060 UART: Running Caliptra FMC ...
2,990,468 UART:
2,990,611 UART: [state] CFI Enabled
3,000,996 UART: [fht] FMC Alias Private Key: 7
3,108,567 UART: [art] Extend RT PCRs Done
3,108,995 UART: [art] Lock RT PCRs Done
3,110,279 UART: [art] Populate DV Done
3,118,518 UART: [fht] FMC Alias Private Key: 7
3,119,628 UART: [art] Derive CDI
3,119,908 UART: [art] Store in in slot 0x4
3,205,907 UART: [art] Derive Key Pair
3,206,267 UART: [art] Store priv key in slot 0x5
3,219,815 UART: [art] Derive Key Pair - Done
3,234,482 UART: [art] Signing Cert with AUTHO
3,234,962 UART: RITY.KEYID = 7
3,249,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,663 UART: [art] PUB.X = 85724778965F8589AB52936EA160745FB18280A70E9174827D65BF043C60021D739370E93F7365FA2DE25B9C43782C51
3,257,408 UART: [art] PUB.Y = E60A3F893D018985B9A91273CC007BD6BDE5A898051509A998E79372A0F01B48436FE87594C8209CCCB46DFF66333487
3,264,320 UART: [art] SIG.R = 6EE90125589910D7C97BAB85671E90879212BC636195C0735CCDC3C25ED3B3863C2DD0A323DC6C176575B8F379F5551D
3,271,085 UART: [art] SIG.S = 03DD9F8D17AEEF10F0E5B8A47B47FCDA6DDEEAD8F96474F0261952F7F877CA5A0710FC3FD23A7AE6AF57D3B2717410CA
3,295,088 UART: Caliptra RT
3,295,434 UART: [state] CFI Enabled
3,403,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,060 UART: [rt]cmd =0x50435252, len=8
3,434,804 >>> mbox cmd response data (8 bytes)
3,434,805 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,516 UART: [rt]cmd =0x50435251, len=36
3,631,981 >>> mbox cmd response data (1848 bytes)
3,631,982 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,371 UART: [rt]cmd =0x43455246, len=4
3,673,698 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
893,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,851 UART: [kat] ++
898,003 UART: [kat] sha1
902,305 UART: [kat] SHA2-256
904,245 UART: [kat] SHA2-384
907,050 UART: [kat] SHA2-512-ACC
908,951 UART: [kat] ECC-384
918,858 UART: [kat] HMAC-384Kdf
923,344 UART: [kat] LMS
1,171,672 UART: [kat] --
1,172,591 UART: [cold-reset] ++
1,173,047 UART: [fht] FHT @ 0x50003400
1,175,590 UART: [idev] ++
1,175,758 UART: [idev] CDI.KEYID = 6
1,176,118 UART: [idev] SUBJECT.KEYID = 7
1,176,542 UART: [idev] UDS.KEYID = 0
1,176,887 ready_for_fw is high
1,176,887 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,336 UART: [idev] Erasing UDS.KEYID = 0
1,201,521 UART: [idev] Sha1 KeyId Algorithm
1,209,841 UART: [idev] --
1,211,045 UART: [ldev] ++
1,211,213 UART: [ldev] CDI.KEYID = 6
1,211,576 UART: [ldev] SUBJECT.KEYID = 5
1,212,002 UART: [ldev] AUTHORITY.KEYID = 7
1,212,465 UART: [ldev] FE.KEYID = 1
1,217,481 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,257 UART: [ldev] --
1,282,562 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,664 >>> mbox cmd response: success
2,773,664 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,760 UART: [afmc] ++
2,774,928 UART: [afmc] CDI.KEYID = 6
2,775,290 UART: [afmc] SUBJECT.KEYID = 7
2,775,715 UART: [afmc] AUTHORITY.KEYID = 5
2,810,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,704 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,423 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,171 UART: [afmc] --
2,854,239 UART: [cold-reset] --
2,855,185 UART: [state] Locking Datavault
2,856,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,110 UART: [state] Locking ICCM
2,857,552 UART: [exit] Launching FMC @ 0x40000130
2,862,881 UART:
2,862,897 UART: Running Caliptra FMC ...
2,863,305 UART:
2,863,359 UART: [state] CFI Enabled
2,873,762 UART: [fht] FMC Alias Private Key: 7
2,982,225 UART: [art] Extend RT PCRs Done
2,982,653 UART: [art] Lock RT PCRs Done
2,984,211 UART: [art] Populate DV Done
2,992,456 UART: [fht] FMC Alias Private Key: 7
2,993,384 UART: [art] Derive CDI
2,993,664 UART: [art] Store in in slot 0x4
3,079,269 UART: [art] Derive Key Pair
3,079,629 UART: [art] Store priv key in slot 0x5
3,092,953 UART: [art] Derive Key Pair - Done
3,107,774 UART: [art] Signing Cert with AUTHO
3,108,254 UART: RITY.KEYID = 7
3,123,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,821 UART: [art] PUB.X = DEA86DF7683ED47386F0AA41B4912F9A538B6435843F12CF4360A2DD79F11BB70E09550125EE2C9022FF1B01C798FF3D
3,130,585 UART: [art] PUB.Y = 8F48D3577D33F56C7C165E6AB35505F14803398A873A3A6D1461DF387B23EF6A04A54B98B1E595D20F2B0F8869F1B640
3,137,518 UART: [art] SIG.R = FF750C93A27F938F3C55C1D72364DC4CDB737E9E3366408F1ED5DE481E6E8753E7779079BF1470D4F2FDADFC8E7D9986
3,144,295 UART: [art] SIG.S = B45010E45E25CAA273877A21AD4EF3E6CFEEC72D417CE7B0F4A89AF5B1AACF1FA67444E2800DA2A3D4751B4DB6D8669B
3,168,239 UART: Caliptra RT
3,168,493 UART: [state] CFI Enabled
3,276,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,443 UART: [rt]cmd =0x50435252, len=8
3,309,139 >>> mbox cmd response data (8 bytes)
3,309,140 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,761 UART: [rt]cmd =0x50435251, len=36
3,506,226 >>> mbox cmd response data (1848 bytes)
3,506,227 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,592 UART: [rt]cmd =0x43455246, len=4
3,547,801 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 ready_for_fw is high
1,060,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,209 >>> mbox cmd response: success
2,627,209 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,689,609 UART:
2,689,625 UART: Running Caliptra FMC ...
2,690,033 UART:
2,690,087 UART: [state] CFI Enabled
2,700,552 UART: [fht] FMC Alias Private Key: 7
2,808,503 UART: [art] Extend RT PCRs Done
2,808,931 UART: [art] Lock RT PCRs Done
2,810,453 UART: [art] Populate DV Done
2,818,508 UART: [fht] FMC Alias Private Key: 7
2,819,678 UART: [art] Derive CDI
2,819,958 UART: [art] Store in in slot 0x4
2,905,479 UART: [art] Derive Key Pair
2,905,839 UART: [art] Store priv key in slot 0x5
2,919,197 UART: [art] Derive Key Pair - Done
2,934,196 UART: [art] Signing Cert with AUTHO
2,934,676 UART: RITY.KEYID = 7
2,949,792 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,557 UART: [art] PUB.X = ACD89EBA92A555D564836078DDD576B1DB5FDDFE01EEF205D2F7012F60F02F683D5A0EFF5E529708CF0C235ABEDA8897
2,957,329 UART: [art] PUB.Y = 955F5E72BD1C726FB36B91E2BE5379B504817790616F8C404C02A54CDFCC9E005DA33C8D05515C78F333305E5A6E2233
2,964,248 UART: [art] SIG.R = 1460038F7FBD108563F0C674C36B56955E1BE362747F72CAF733E4B4007D72AD662B68EBDB86E624A86153E48AABF586
2,970,995 UART: [art] SIG.S = 81FFD854CB07D30A981D5E36738E2E534F47414985041EDFF9E203EE6A1F91D18539AD010AE4568BEFDCBEC8FB154C76
2,994,420 UART: Caliptra RT
2,994,674 UART: [state] CFI Enabled
3,102,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,833 UART: [rt]cmd =0x50435252, len=8
3,134,353 >>> mbox cmd response data (8 bytes)
3,134,354 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,137 UART: [rt]cmd =0x50435251, len=36
3,331,434 >>> mbox cmd response data (1848 bytes)
3,331,435 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,012 UART: [rt]cmd =0x43455246, len=4
3,373,215 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,621 UART: [kat] SHA2-512-ACC
908,522 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,257 UART: [kat] LMS
1,171,585 UART: [kat] --
1,172,536 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,431 UART: [idev] ++
1,175,599 UART: [idev] CDI.KEYID = 6
1,175,959 UART: [idev] SUBJECT.KEYID = 7
1,176,383 UART: [idev] UDS.KEYID = 0
1,176,728 ready_for_fw is high
1,176,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,977 UART: [idev] Erasing UDS.KEYID = 0
1,200,930 UART: [idev] Sha1 KeyId Algorithm
1,209,300 UART: [idev] --
1,210,330 UART: [ldev] ++
1,210,498 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,287 UART: [ldev] AUTHORITY.KEYID = 7
1,211,750 UART: [ldev] FE.KEYID = 1
1,216,932 UART: [ldev] Erasing FE.KEYID = 1
1,243,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,208 UART: [ldev] --
1,282,659 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,277 >>> mbox cmd response: success
2,774,277 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,775,391 UART: [afmc] ++
2,775,559 UART: [afmc] CDI.KEYID = 6
2,775,921 UART: [afmc] SUBJECT.KEYID = 7
2,776,346 UART: [afmc] AUTHORITY.KEYID = 5
2,811,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,770 UART: [afmc] --
2,854,820 UART: [cold-reset] --
2,855,508 UART: [state] Locking Datavault
2,856,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,555 UART: [state] Locking ICCM
2,858,079 UART: [exit] Launching FMC @ 0x40000130
2,863,408 UART:
2,863,424 UART: Running Caliptra FMC ...
2,863,832 UART:
2,863,975 UART: [state] CFI Enabled
2,874,870 UART: [fht] FMC Alias Private Key: 7
2,983,353 UART: [art] Extend RT PCRs Done
2,983,781 UART: [art] Lock RT PCRs Done
2,985,311 UART: [art] Populate DV Done
2,993,706 UART: [fht] FMC Alias Private Key: 7
2,994,826 UART: [art] Derive CDI
2,995,106 UART: [art] Store in in slot 0x4
3,081,023 UART: [art] Derive Key Pair
3,081,383 UART: [art] Store priv key in slot 0x5
3,094,793 UART: [art] Derive Key Pair - Done
3,109,776 UART: [art] Signing Cert with AUTHO
3,110,256 UART: RITY.KEYID = 7
3,125,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,259 UART: [art] PUB.X = B98A568015AD9D217D2CF72AF4F6B669A3D44B81E541E5D6803167416B0E7EFA06CCF5188F3AAB15D7D4E079AF705242
3,133,031 UART: [art] PUB.Y = 4B349E30D707D5068020FEF29F78E3D758B0C8F03BB6915D994C1E3A2B1E26715F0B301CDFC27F26F53C6310BB0B332D
3,139,975 UART: [art] SIG.R = D3076999F5DC5C274AFE770B58A32E4425B5B52DA0337C6B4348BA647F6B6C9ACBA1E559B71BDAD2A36D5C0CE1CDDFE8
3,146,758 UART: [art] SIG.S = CFF463B8F90A560F611F2FC23D31E4D218DD420CC2D6763FE02F464745BAF672AD2F46B792AD5EAF2E6788E11006B0A1
3,170,133 UART: Caliptra RT
3,170,479 UART: [state] CFI Enabled
3,278,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,295 UART: [rt]cmd =0x50435252, len=8
3,310,915 >>> mbox cmd response data (8 bytes)
3,310,916 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,463 UART: [rt]cmd =0x50435251, len=36
3,507,788 >>> mbox cmd response data (1848 bytes)
3,507,789 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,008 UART: [rt]cmd =0x43455246, len=4
3,548,913 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,522 ready_for_fw is high
1,060,522 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,562 >>> mbox cmd response: success
2,627,562 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,689,834 UART:
2,689,850 UART: Running Caliptra FMC ...
2,690,258 UART:
2,690,401 UART: [state] CFI Enabled
2,701,122 UART: [fht] FMC Alias Private Key: 7
2,809,375 UART: [art] Extend RT PCRs Done
2,809,803 UART: [art] Lock RT PCRs Done
2,811,799 UART: [art] Populate DV Done
2,820,148 UART: [fht] FMC Alias Private Key: 7
2,821,188 UART: [art] Derive CDI
2,821,468 UART: [art] Store in in slot 0x4
2,907,449 UART: [art] Derive Key Pair
2,907,809 UART: [art] Store priv key in slot 0x5
2,921,227 UART: [art] Derive Key Pair - Done
2,936,119 UART: [art] Signing Cert with AUTHO
2,936,599 UART: RITY.KEYID = 7
2,952,025 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,790 UART: [art] PUB.X = 26FD46232CC8C0D386273E1E87026562FB6B5BBD690D9F30FE86692B3970580C0FDD2C79DAC69BE08CCCBC7DBF96DEAA
2,959,568 UART: [art] PUB.Y = 0BDAE5C07F22AC8FDFEDC6A0CFC719DBF9A31D64AD2C16DDF10A56F37279CDA7E6F7A23526F8E125256EE8A67BCDDEF9
2,966,546 UART: [art] SIG.R = 5C481544A99299D48D521D263ABD97EC248CA47640B6C2365FDCD73642CC28C6E380CA287550465BE3CA5B9AE9679418
2,973,316 UART: [art] SIG.S = 60209DBADE2DB7580258A53328214B4D22C25FDB9CEA0E2A8D6686EF813360B7940F7EF1FA844CB331E7C6633A1B439A
2,997,334 UART: Caliptra RT
2,997,680 UART: [state] CFI Enabled
3,105,206 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,375 UART: [rt]cmd =0x50435252, len=8
3,136,863 >>> mbox cmd response data (8 bytes)
3,136,864 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,415 UART: [rt]cmd =0x50435251, len=36
3,334,182 >>> mbox cmd response data (1848 bytes)
3,334,183 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,522 UART: [rt]cmd =0x43455246, len=4
3,375,547 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,165 UART: [state] DebugLocked = No
86,879 UART: [state] WD Timer not started. Device not locked for debugging
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
905,138 UART: [kat] SHA2-512-ACC
907,039 UART: [kat] ECC-384
916,812 UART: [kat] HMAC-384Kdf
921,534 UART: [kat] LMS
1,169,846 UART: [kat] --
1,170,729 UART: [cold-reset] ++
1,171,191 UART: [fht] FHT @ 0x50003400
1,173,757 UART: [idev] ++
1,173,925 UART: [idev] CDI.KEYID = 6
1,174,286 UART: [idev] SUBJECT.KEYID = 7
1,174,711 UART: [idev] UDS.KEYID = 0
1,175,057 ready_for_fw is high
1,175,057 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,199,475 UART: [idev] Sha1 KeyId Algorithm
1,208,455 UART: [idev] --
1,209,384 UART: [ldev] ++
1,209,552 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,343 UART: [ldev] AUTHORITY.KEYID = 7
1,210,806 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,242,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,500 UART: [fwproc] Wait for Commands...
1,282,135 UART: [fwproc] Recv command 0x46574c44
1,282,868 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,377 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,564 >>> mbox cmd response: success
2,772,564 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,773,807 UART: [afmc] ++
2,773,975 UART: [afmc] CDI.KEYID = 6
2,774,338 UART: [afmc] SUBJECT.KEYID = 7
2,774,764 UART: [afmc] AUTHORITY.KEYID = 5
2,809,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,024 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,330 UART: [afmc] --
2,853,404 UART: [cold-reset] --
2,854,368 UART: [state] Locking Datavault
2,855,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,219 UART: [state] Locking ICCM
2,856,847 UART: [exit] Launching FMC @ 0x40000130
2,862,176 UART:
2,862,192 UART: Running Caliptra FMC ...
2,862,600 UART:
2,862,654 UART: [state] CFI Enabled
2,872,793 UART: [fht] FMC Alias Private Key: 7
2,980,810 UART: [art] Extend RT PCRs Done
2,981,238 UART: [art] Lock RT PCRs Done
2,982,868 UART: [art] Populate DV Done
2,991,183 UART: [fht] FMC Alias Private Key: 7
2,992,163 UART: [art] Derive CDI
2,992,443 UART: [art] Store in in slot 0x4
3,078,116 UART: [art] Derive Key Pair
3,078,476 UART: [art] Store priv key in slot 0x5
3,091,340 UART: [art] Derive Key Pair - Done
3,106,198 UART: [art] Signing Cert with AUTHO
3,106,678 UART: RITY.KEYID = 7
3,121,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,245 UART: [art] PUB.X = 8D250470FA158A5AF17C9B0D8C0BA7B5B802630FD3DCC271709F8975A3C4E49DB5C5E4F737FE0B023762D91E869F59AB
3,129,004 UART: [art] PUB.Y = 163F4E4493B81529F69EBF768FC165D6AA8905D4B7BC60E8222E8B8CCE8992184AD4D91D798D20DBC0370CBE4BA1FF8F
3,135,962 UART: [art] SIG.R = 37623BDB1AA77A4677F9C138E12D2528875D7C5C8679E2ABED9C0F6135FB0F95E31EFE019AC1942227231BBFA9D8C7AE
3,142,735 UART: [art] SIG.S = 097AC0E7EF382867A2322A85BC5E4CBB1D11FF291F96F22612DDA8E5B446F57B480DCE0DFA2A84AFEE754934BEC8AA57
3,166,269 UART: Caliptra RT
3,166,523 UART: [state] CFI Enabled
3,273,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,972 UART: [rt]cmd =0x50435252, len=8
3,305,470 >>> mbox cmd response data (8 bytes)
3,305,471 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,228 UART: [rt]cmd =0x50435251, len=36
3,502,481 >>> mbox cmd response data (1848 bytes)
3,502,482 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,855 UART: [rt]cmd =0x43455246, len=4
3,543,818 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,420 ready_for_fw is high
1,055,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,008 >>> mbox cmd response: success
2,621,008 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,681,902 UART:
2,681,918 UART: Running Caliptra FMC ...
2,682,326 UART:
2,682,380 UART: [state] CFI Enabled
2,692,767 UART: [fht] FMC Alias Private Key: 7
2,800,136 UART: [art] Extend RT PCRs Done
2,800,564 UART: [art] Lock RT PCRs Done
2,802,030 UART: [art] Populate DV Done
2,810,361 UART: [fht] FMC Alias Private Key: 7
2,811,379 UART: [art] Derive CDI
2,811,659 UART: [art] Store in in slot 0x4
2,896,970 UART: [art] Derive Key Pair
2,897,330 UART: [art] Store priv key in slot 0x5
2,910,674 UART: [art] Derive Key Pair - Done
2,925,148 UART: [art] Signing Cert with AUTHO
2,925,628 UART: RITY.KEYID = 7
2,940,154 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,919 UART: [art] PUB.X = C8B3F44156E5D5827333FF7DAC2C17F524B06E21BCDE70DB481CCB90C2F33AC84E116E47CCAB01AE114771DA96A635B8
2,947,702 UART: [art] PUB.Y = E094C11C6C4B68B80604813EE1F7E878F005DF795264BC2EAAC8E09B6D2C5F1F8BB1CA7390C694EA11AA84CB5935B04C
2,954,657 UART: [art] SIG.R = 5B380A873C86EF6DFADA32A8C19E88FC7748886FB3F7CD2203F1BB04A99463B8AB864629A1B72A74013379B4178172BA
2,961,419 UART: [art] SIG.S = 14B7C70CC75E48FF7D8259CD868F9730F4EA11747A8F0477260096A86F5CF21540754E40E6655FCD3DA21C304AE06B88
2,985,176 UART: Caliptra RT
2,985,430 UART: [state] CFI Enabled
3,092,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,061 UART: [rt]cmd =0x50435252, len=8
3,124,911 >>> mbox cmd response data (8 bytes)
3,124,912 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,154,517 UART: [rt]cmd =0x50435251, len=36
3,321,548 >>> mbox cmd response data (1848 bytes)
3,321,549 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,950 UART: [rt]cmd =0x43455246, len=4
3,362,987 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,951 UART: [state] LifecycleState = Unprovisioned
85,606 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
891,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,574 UART: [idev] ++
1,173,742 UART: [idev] CDI.KEYID = 6
1,174,103 UART: [idev] SUBJECT.KEYID = 7
1,174,528 UART: [idev] UDS.KEYID = 0
1,174,874 ready_for_fw is high
1,174,874 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,894 UART: [idev] Erasing UDS.KEYID = 0
1,200,648 UART: [idev] Sha1 KeyId Algorithm
1,209,414 UART: [idev] --
1,210,409 UART: [ldev] ++
1,210,577 UART: [ldev] CDI.KEYID = 6
1,210,941 UART: [ldev] SUBJECT.KEYID = 5
1,211,368 UART: [ldev] AUTHORITY.KEYID = 7
1,211,831 UART: [ldev] FE.KEYID = 1
1,217,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,445 UART: [fwproc] Wait for Commands...
1,283,052 UART: [fwproc] Recv command 0x46574c44
1,283,785 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,947 >>> mbox cmd response: success
2,774,947 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,776,074 UART: [afmc] ++
2,776,242 UART: [afmc] CDI.KEYID = 6
2,776,605 UART: [afmc] SUBJECT.KEYID = 7
2,777,031 UART: [afmc] AUTHORITY.KEYID = 5
2,813,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,817 UART: [afmc] --
2,856,709 UART: [cold-reset] --
2,857,567 UART: [state] Locking Datavault
2,858,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,468 UART: [state] Locking ICCM
2,860,060 UART: [exit] Launching FMC @ 0x40000130
2,865,389 UART:
2,865,405 UART: Running Caliptra FMC ...
2,865,813 UART:
2,865,956 UART: [state] CFI Enabled
2,876,737 UART: [fht] FMC Alias Private Key: 7
2,984,038 UART: [art] Extend RT PCRs Done
2,984,466 UART: [art] Lock RT PCRs Done
2,985,990 UART: [art] Populate DV Done
2,994,377 UART: [fht] FMC Alias Private Key: 7
2,995,329 UART: [art] Derive CDI
2,995,609 UART: [art] Store in in slot 0x4
3,081,290 UART: [art] Derive Key Pair
3,081,650 UART: [art] Store priv key in slot 0x5
3,095,204 UART: [art] Derive Key Pair - Done
3,109,967 UART: [art] Signing Cert with AUTHO
3,110,447 UART: RITY.KEYID = 7
3,125,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,334 UART: [art] PUB.X = 91EE240C521DF75F0ECC6D032E55E4CC1C760729A84D5D47019719F25C71046D838F86F59E57ADEFC3754D3D4C427437
3,133,088 UART: [art] PUB.Y = 649F49556E209180843242EF6DEADB1D555F18BF5BF3AC1EF08710B1A35F48D90F053B4D863DA7349692C68D1E77E26B
3,140,036 UART: [art] SIG.R = 8EA5E78E7B3009F1085E493EBB2B39A1B65B8782D85C763596C89F613A4FB15A64E2F898F77DB290B3E851478A19ACB8
3,146,804 UART: [art] SIG.S = 203ADF5726E33ED6044C78CACA99D577A6C7B2F3E98629CBA389B6750EBC6CEB3F02D7EA07C8F09D82AD4709CCAB605C
3,170,244 UART: Caliptra RT
3,170,590 UART: [state] CFI Enabled
3,277,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,989 UART: [rt]cmd =0x50435252, len=8
3,309,661 >>> mbox cmd response data (8 bytes)
3,309,662 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,169 UART: [rt]cmd =0x50435251, len=36
3,506,288 >>> mbox cmd response data (1848 bytes)
3,506,289 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,908 UART: [rt]cmd =0x43455246, len=4
3,548,031 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,981 ready_for_fw is high
1,055,981 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,129 >>> mbox cmd response: success
2,622,129 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,684,315 UART:
2,684,331 UART: Running Caliptra FMC ...
2,684,739 UART:
2,684,882 UART: [state] CFI Enabled
2,695,307 UART: [fht] FMC Alias Private Key: 7
2,804,184 UART: [art] Extend RT PCRs Done
2,804,612 UART: [art] Lock RT PCRs Done
2,806,054 UART: [art] Populate DV Done
2,814,207 UART: [fht] FMC Alias Private Key: 7
2,815,313 UART: [art] Derive CDI
2,815,593 UART: [art] Store in in slot 0x4
2,901,520 UART: [art] Derive Key Pair
2,901,880 UART: [art] Store priv key in slot 0x5
2,915,252 UART: [art] Derive Key Pair - Done
2,930,046 UART: [art] Signing Cert with AUTHO
2,930,526 UART: RITY.KEYID = 7
2,946,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,801 UART: [art] PUB.X = 9B146DDE3B464045B924E5707CA72988DBD38F380388441C55D1A097FB58F965740A27AACAD88B3EAA80B7525C297D7B
2,953,569 UART: [art] PUB.Y = 5C66452BF7B41EC8A6A9A5429F98AFF7612527F54825EEB22595FB7F1C30B0B98F532063800D9EA2D808CDCAAF85471D
2,960,521 UART: [art] SIG.R = A118D0FBD5BA775E34F81A3E453E0505DD2A63F6CE1FD1EC0DC0BC5E5C580EF3A0149B221E1D2C50F247FC0DD7A65A2A
2,967,300 UART: [art] SIG.S = 485120EC82D355EB93BCA7BA5FBBEB20BD74FEF2274E6C8BF8B47A4DE082F61D22557D3E1D043C32AA63E8C30BA11EA0
2,991,399 UART: Caliptra RT
2,991,745 UART: [state] CFI Enabled
3,100,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,356 UART: [rt]cmd =0x50435252, len=8
3,132,112 >>> mbox cmd response data (8 bytes)
3,132,113 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,886 UART: [rt]cmd =0x50435251, len=36
3,329,261 >>> mbox cmd response data (1848 bytes)
3,329,262 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,525 UART: [rt]cmd =0x43455246, len=4
3,370,498 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,459 UART:
192,832 UART: Running Caliptra ROM ...
194,027 UART:
194,176 UART: [state] CFI Enabled
266,758 UART: [state] LifecycleState = Unprovisioned
268,657 UART: [state] DebugLocked = No
271,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,564 UART: [kat] SHA2-256
445,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,770 UART: [kat] ++
456,210 UART: [kat] sha1
466,582 UART: [kat] SHA2-256
469,303 UART: [kat] SHA2-384
474,720 UART: [kat] SHA2-512-ACC
477,080 UART: [kat] ECC-384
2,769,066 UART: [kat] HMAC-384Kdf
2,800,639 UART: [kat] LMS
3,990,968 UART: [kat] --
3,994,274 UART: [cold-reset] ++
3,995,995 UART: [fht] Storing FHT @ 0x50003400
4,007,767 UART: [idev] ++
4,008,376 UART: [idev] CDI.KEYID = 6
4,009,295 UART: [idev] SUBJECT.KEYID = 7
4,010,491 UART: [idev] UDS.KEYID = 0
4,011,484 ready_for_fw is high
4,011,674 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,963 UART: [idev] Erasing UDS.KEYID = 0
7,348,481 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,985 UART: [idev] --
7,373,109 UART: [ldev] ++
7,373,680 UART: [ldev] CDI.KEYID = 6
7,374,691 UART: [ldev] SUBJECT.KEYID = 5
7,375,841 UART: [ldev] AUTHORITY.KEYID = 7
7,377,121 UART: [ldev] FE.KEYID = 1
7,422,649 UART: [ldev] Erasing FE.KEYID = 1
10,756,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,992 UART: [ldev] --
13,136,420 UART: [fwproc] Waiting for Commands...
13,138,674 UART: [fwproc] Received command 0x46574c44
13,140,853 UART: [fwproc] Received Image of size 114036 bytes
17,199,515 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,350,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,667,595 >>> mbox cmd response: success
17,671,849 UART: [afmc] ++
17,672,447 UART: [afmc] CDI.KEYID = 6
17,673,464 UART: [afmc] SUBJECT.KEYID = 7
17,674,616 UART: [afmc] AUTHORITY.KEYID = 5
21,050,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,623 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,365,053 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,379,836 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,394,273 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,414,571 UART: [afmc] --
23,418,908 UART: [cold-reset] --
23,421,948 UART: [state] Locking Datavault
23,426,214 UART: [state] Locking PCR0, PCR1 and PCR31
23,427,959 UART: [state] Locking ICCM
23,429,882 UART: [exit] Launching FMC @ 0x40000130
23,438,272 UART:
23,438,497 UART: Running Caliptra FMC ...
23,439,587 UART:
23,439,737 UART: [state] CFI Enabled
23,508,673 UART: [fht] FMC Alias Private Key: 7
25,846,362 UART: [art] Extend RT PCRs Done
25,848,082 UART: [art] Lock RT PCRs Done
25,849,515 UART: [art] Populate DV Done
25,854,983 UART: [fht] FMC Alias Private Key: 7
25,856,630 UART: [art] Derive CDI
25,857,439 UART: [art] Store in in slot 0x4
25,916,636 UART: [art] Derive Key Pair
25,917,630 UART: [art] Store priv key in slot 0x5
29,210,637 UART: [art] Derive Key Pair - Done
29,223,686 UART: [art] Signing Cert with AUTHO
29,224,988 UART: RITY.KEYID = 7
31,512,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,000 UART: [art] PUB.X = 748EE80704A414DAE6692A2668C05FE51B483AB4AC80244EB271491D92D4D85C942712B88B6EB6DAFB94280129DC33C4
31,521,248 UART: [art] PUB.Y = 9EC6006A73D273633DBD79418D3AAF08F69C46C2A15133E41325FBF5AC7095159ADF634473DD517D342D771B6D541C84
31,528,491 UART: [art] SIG.R = 346331075EA9F029CC0B7CE6F5A8EB0345503D9B32D2B92685AF1D641A2D88632A979C29C23FF9175CB897A1C0D1CDE5
31,535,864 UART: [art] SIG.S = 355168A8C1ED0F79FC9A4B56310C0639167BCC8688F857FE016BD71CDCFB6B4250F3526A43D46A3D1C7A76F3807BA1C8
32,842,087 UART: Caliptra RT
32,842,804 UART: [state] CFI Enabled
33,002,747 UART: [rt] RT listening for mailbox commands...
33,004,698 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,034,667 UART: [rt]cmd =0x44504543, len=28
33,085,426 >>> mbox cmd response data (2076 bytes)
33,095,450 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,125,511 UART: [rt]cmd =0x44504543, len=28
33,174,103 >>> mbox cmd response data (2076 bytes)
33,518,210 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,551,320 UART: [rt]cmd =0x49444550, len=352
33,562,653 >>> mbox cmd response data (8 bytes)
33,563,137 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,593,314 UART: [rt]cmd =0x44504543, len=28
33,643,772 >>> mbox cmd response data (2076 bytes)
33,653,783 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,683,956 UART: [rt]cmd =0x44504543, len=28
33,732,640 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,803,036 ready_for_fw is high
3,803,434 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,874,563 >>> mbox cmd response: success
23,570,193 UART:
23,570,586 UART: Running Caliptra FMC ...
23,571,709 UART:
23,571,860 UART: [state] CFI Enabled
23,637,927 UART: [fht] FMC Alias Private Key: 7
25,975,987 UART: [art] Extend RT PCRs Done
25,977,208 UART: [art] Lock RT PCRs Done
25,979,012 UART: [art] Populate DV Done
25,984,347 UART: [fht] FMC Alias Private Key: 7
25,985,934 UART: [art] Derive CDI
25,986,747 UART: [art] Store in in slot 0x4
26,046,826 UART: [art] Derive Key Pair
26,047,862 UART: [art] Store priv key in slot 0x5
29,340,925 UART: [art] Derive Key Pair - Done
29,353,767 UART: [art] Signing Cert with AUTHO
29,355,065 UART: RITY.KEYID = 7
31,642,952 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,451 UART: [art] PUB.X = 65A8BD0AB55B88FE3B45FCB967BC7FC11A31D784B31DC0057B2664EC7D802BF0816A4C116E72A84ECB9136371F55FF31
31,651,695 UART: [art] PUB.Y = D9E989FCC9186CFF3B5F7853AD7A04FCBFB71E98ADF70B516C882BBC763EC88004842A1E669DCC71B8BC2B4267BF1E9F
31,658,920 UART: [art] SIG.R = 31C74889DF338C443A58C9EE1A0AE5F7C432125C4E93B25D9C395D19246CFAD925D83C0B72E9F80E7BA80E7A66219886
31,666,347 UART: [art] SIG.S = DF5A8199974BB8ECB0B6678797C482ABE6631A25E1691F810258C41730A13D4876964EBAC5399E1AF49D437A79963F0E
32,971,714 UART: Caliptra RT
32,972,423 UART: [state] CFI Enabled
33,134,179 UART: [rt] RT listening for mailbox commands...
33,136,127 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,165,938 UART: [rt]cmd =0x44504543, len=28
33,216,352 >>> mbox cmd response data (2076 bytes)
33,226,350 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,256,262 UART: [rt]cmd =0x44504543, len=28
33,304,731 >>> mbox cmd response data (2076 bytes)
33,650,311 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,683,430 UART: [rt]cmd =0x49444550, len=353
33,697,217 >>> mbox cmd response data (8 bytes)
33,697,677 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,727,767 UART: [rt]cmd =0x44504543, len=28
33,778,136 >>> mbox cmd response data (2076 bytes)
33,788,030 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,818,121 UART: [rt]cmd =0x44504543, len=28
33,866,547 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,444 UART:
192,791 UART: Running Caliptra ROM ...
193,975 UART:
603,658 UART: [state] CFI Enabled
616,610 UART: [state] LifecycleState = Unprovisioned
618,565 UART: [state] DebugLocked = No
619,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,247 UART: [kat] SHA2-256
793,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,472 UART: [kat] ++
804,918 UART: [kat] sha1
815,932 UART: [kat] SHA2-256
818,628 UART: [kat] SHA2-384
825,263 UART: [kat] SHA2-512-ACC
827,626 UART: [kat] ECC-384
3,112,054 UART: [kat] HMAC-384Kdf
3,123,662 UART: [kat] LMS
4,313,824 UART: [kat] --
4,318,266 UART: [cold-reset] ++
4,320,342 UART: [fht] Storing FHT @ 0x50003400
4,331,391 UART: [idev] ++
4,332,091 UART: [idev] CDI.KEYID = 6
4,332,994 UART: [idev] SUBJECT.KEYID = 7
4,334,175 UART: [idev] UDS.KEYID = 0
4,335,214 ready_for_fw is high
4,335,426 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,700 UART: [idev] Erasing UDS.KEYID = 0
7,621,787 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,105 UART: [idev] --
7,648,420 UART: [ldev] ++
7,648,988 UART: [ldev] CDI.KEYID = 6
7,650,000 UART: [ldev] SUBJECT.KEYID = 5
7,651,159 UART: [ldev] AUTHORITY.KEYID = 7
7,652,384 UART: [ldev] FE.KEYID = 1
7,666,266 UART: [ldev] Erasing FE.KEYID = 1
10,954,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,847 UART: [ldev] --
13,314,787 UART: [fwproc] Waiting for Commands...
13,316,444 UART: [fwproc] Received command 0x46574c44
13,318,681 UART: [fwproc] Received Image of size 114036 bytes
17,377,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,888 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,841,337 >>> mbox cmd response: success
17,846,070 UART: [afmc] ++
17,846,724 UART: [afmc] CDI.KEYID = 6
17,847,634 UART: [afmc] SUBJECT.KEYID = 7
17,848,850 UART: [afmc] AUTHORITY.KEYID = 5
21,168,653 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,388 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,645 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,030 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,886 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,306 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,835 UART: [afmc] --
23,533,597 UART: [cold-reset] --
23,537,350 UART: [state] Locking Datavault
23,543,890 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,636 UART: [state] Locking ICCM
23,547,139 UART: [exit] Launching FMC @ 0x40000130
23,555,529 UART:
23,555,760 UART: Running Caliptra FMC ...
23,556,858 UART:
23,557,019 UART: [state] CFI Enabled
23,565,097 UART: [fht] FMC Alias Private Key: 7
25,895,701 UART: [art] Extend RT PCRs Done
25,896,924 UART: [art] Lock RT PCRs Done
25,898,817 UART: [art] Populate DV Done
25,904,341 UART: [fht] FMC Alias Private Key: 7
25,905,877 UART: [art] Derive CDI
25,906,616 UART: [art] Store in in slot 0x4
25,949,167 UART: [art] Derive Key Pair
25,950,204 UART: [art] Store priv key in slot 0x5
29,192,361 UART: [art] Derive Key Pair - Done
29,205,760 UART: [art] Signing Cert with AUTHO
29,207,073 UART: RITY.KEYID = 7
31,486,161 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,659 UART: [art] PUB.X = B22B39CFA509A6EB818B443958E82F3272FB692EBC0168CBC4B0460DE1874BECD4CFC272E1702929E50E27C4C307D980
31,494,858 UART: [art] PUB.Y = 8BB9702DFC71BA6C02B22431E954BCA86DEE9B33DD395EDC92308F9F60459521571163BBFC32406D40DF9D211B37E049
31,502,144 UART: [art] SIG.R = 3ADD8D0469B52A1F539FEE34DDAF98B7251A027A060B5FBA8D0976F6C8B768F11C3ADFA38A5793BC34093375B5753538
31,509,498 UART: [art] SIG.S = 66E6A3329FDDB6E978621FBCC4A4F6F23A4D90D12C7A1B258941E1C2011BFB7A54028332474C40D4BEED2E2E222C52D3
32,814,759 UART: Caliptra RT
32,815,465 UART: [state] CFI Enabled
32,933,610 UART: [rt] RT listening for mailbox commands...
32,935,549 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,965,617 UART: [rt]cmd =0x44504543, len=28
33,016,253 >>> mbox cmd response data (2076 bytes)
33,026,275 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,056,247 UART: [rt]cmd =0x44504543, len=28
33,104,236 >>> mbox cmd response data (2076 bytes)
33,449,062 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,482,039 UART: [rt]cmd =0x49444550, len=353
33,495,879 >>> mbox cmd response data (8 bytes)
33,496,347 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,526,483 UART: [rt]cmd =0x44504543, len=28
33,576,649 >>> mbox cmd response data (2076 bytes)
33,586,643 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,616,575 UART: [rt]cmd =0x44504543, len=28
33,665,713 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,131,586 ready_for_fw is high
4,132,232 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,380 >>> mbox cmd response: success
23,711,323 UART:
23,711,703 UART: Running Caliptra FMC ...
23,712,839 UART:
23,713,005 UART: [state] CFI Enabled
23,721,140 UART: [fht] FMC Alias Private Key: 7
26,051,537 UART: [art] Extend RT PCRs Done
26,052,774 UART: [art] Lock RT PCRs Done
26,054,733 UART: [art] Populate DV Done
26,060,326 UART: [fht] FMC Alias Private Key: 7
26,061,922 UART: [art] Derive CDI
26,062,742 UART: [art] Store in in slot 0x4
26,105,232 UART: [art] Derive Key Pair
26,106,227 UART: [art] Store priv key in slot 0x5
29,347,437 UART: [art] Derive Key Pair - Done
29,360,328 UART: [art] Signing Cert with AUTHO
29,361,643 UART: RITY.KEYID = 7
31,641,330 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,840 UART: [art] PUB.X = C4D98101FCBE09A2FE0ECBE4F3B7683B366A2E3A03B499BCBB8D7FF5443B666C49993227D90E9CCF3DA67A07D95D23EE
31,650,113 UART: [art] PUB.Y = 5D71B43E1EEE48C661791125E4D04A164A2688883289C22E0E6EB9074BB59EC6542E4BBC615307A73DA517A171CD9C5E
31,657,374 UART: [art] SIG.R = 557E7C1D9653195E1F1CF7461E1680B19182D38D3C036A9E30B0E7DAD758BF2DC2ABA0A8A817AB17C9C90B14DBD37B8F
31,664,747 UART: [art] SIG.S = 708402E7FBF8FACE2804DF87B757EEE5A38CE31DD5852997749ABC6D85737B15FBFE71F2A152DDF57D320B5C6F5A15B4
32,969,729 UART: Caliptra RT
32,970,444 UART: [state] CFI Enabled
33,088,292 UART: [rt] RT listening for mailbox commands...
33,090,248 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,120,166 UART: [rt]cmd =0x44504543, len=28
33,170,888 >>> mbox cmd response data (2076 bytes)
33,180,939 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,210,998 UART: [rt]cmd =0x44504543, len=28
33,259,186 >>> mbox cmd response data (2076 bytes)
33,603,999 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,636,986 UART: [rt]cmd =0x49444550, len=353
33,650,783 >>> mbox cmd response data (8 bytes)
33,651,309 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,681,452 UART: [rt]cmd =0x44504543, len=28
33,731,828 >>> mbox cmd response data (2076 bytes)
33,741,748 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,771,699 UART: [rt]cmd =0x44504543, len=28
33,820,456 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
192,557 UART:
192,918 UART: Running Caliptra ROM ...
194,103 UART:
194,258 UART: [state] CFI Enabled
266,094 UART: [state] LifecycleState = Unprovisioned
268,003 UART: [state] DebugLocked = No
270,391 UART: [state] WD Timer not started. Device not locked for debugging
274,068 UART: [kat] SHA2-256
453,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,722 UART: [kat] ++
465,263 UART: [kat] sha1
475,646 UART: [kat] SHA2-256
478,719 UART: [kat] SHA2-384
484,564 UART: [kat] SHA2-512-ACC
487,507 UART: [kat] ECC-384
2,950,461 UART: [kat] HMAC-384Kdf
2,972,367 UART: [kat] LMS
3,501,774 UART: [kat] --
3,507,621 UART: [cold-reset] ++
3,510,059 UART: [fht] FHT @ 0x50003400
3,520,710 UART: [idev] ++
3,521,280 UART: [idev] CDI.KEYID = 6
3,522,209 UART: [idev] SUBJECT.KEYID = 7
3,523,386 UART: [idev] UDS.KEYID = 0
3,524,311 ready_for_fw is high
3,524,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,412 UART: [idev] Erasing UDS.KEYID = 0
6,028,712 UART: [idev] Sha1 KeyId Algorithm
6,051,715 UART: [idev] --
6,055,199 UART: [ldev] ++
6,055,783 UART: [ldev] CDI.KEYID = 6
6,056,702 UART: [ldev] SUBJECT.KEYID = 5
6,057,817 UART: [ldev] AUTHORITY.KEYID = 7
6,059,107 UART: [ldev] FE.KEYID = 1
6,101,949 UART: [ldev] Erasing FE.KEYID = 1
8,606,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,024 UART: [ldev] --
10,415,177 UART: [fwproc] Wait for Commands...
10,418,132 UART: [fwproc] Recv command 0x46574c44
10,420,170 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,286,796 >>> mbox cmd response: success
14,291,489 UART: [afmc] ++
14,292,111 UART: [afmc] CDI.KEYID = 6
14,293,032 UART: [afmc] SUBJECT.KEYID = 7
14,294,078 UART: [afmc] AUTHORITY.KEYID = 5
16,823,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,925 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,802 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,308 UART: [afmc] --
18,623,264 UART: [cold-reset] --
18,625,779 UART: [state] Locking Datavault
18,630,708 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,355 UART: [state] Locking ICCM
18,633,912 UART: [exit] Launching FMC @ 0x40000130
18,642,315 UART:
18,642,550 UART: Running Caliptra FMC ...
18,643,655 UART:
18,643,815 UART: [state] CFI Enabled
18,704,449 UART: [fht] FMC Alias Private Key: 7
20,468,403 UART: [art] Extend RT PCRs Done
20,469,628 UART: [art] Lock RT PCRs Done
20,471,009 UART: [art] Populate DV Done
20,476,433 UART: [fht] FMC Alias Private Key: 7
20,478,024 UART: [art] Derive CDI
20,478,762 UART: [art] Store in in slot 0x4
20,536,562 UART: [art] Derive Key Pair
20,537,599 UART: [art] Store priv key in slot 0x5
23,000,812 UART: [art] Derive Key Pair - Done
23,013,705 UART: [art] Signing Cert with AUTHO
23,015,046 UART: RITY.KEYID = 7
24,725,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,401 UART: [art] PUB.X = 75B2D8701A60AFF709FEE2032934C55C49216CF377711AD40869255C87D61928687249E0DE997CC7FBF97A94539CE455
24,734,678 UART: [art] PUB.Y = B01BD9A1721FBDB1B5B64B2F0DC897F7DE551582423F7A7FB04D0FB5629D2A77397DF6829F7290E62CD6C2E95F13B3EA
24,741,939 UART: [art] SIG.R = 9F45A4143AEDC958AC7D3F713311A3A6FF5BD7F1A527F661B3382A76EDED78D6538F6E271E561967F5DA71385FE79203
24,749,330 UART: [art] SIG.S = 199E466FBF5CEAD4C77D913479203E94AD4F2440D36606868840C40E8B4726E563E84FFFD1E39931E96A90926B9D469C
25,727,953 UART: Caliptra RT
25,728,656 UART: [state] CFI Enabled
25,907,414 UART: [rt] RT listening for mailbox commands...
25,909,360 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,939,436 UART: [rt]cmd =0x44504543, len=28
25,990,134 >>> mbox cmd response data (2076 bytes)
26,000,220 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,030,400 UART: [rt]cmd =0x44504543, len=28
26,078,757 >>> mbox cmd response data (2076 bytes)
26,422,032 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,455,410 UART: [rt]cmd =0x49444550, len=353
26,469,020 >>> mbox cmd response data (8 bytes)
26,469,513 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,499,411 UART: [rt]cmd =0x44504543, len=28
26,549,834 >>> mbox cmd response data (2076 bytes)
26,559,858 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,589,710 UART: [rt]cmd =0x44504543, len=28
26,638,647 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,511 UART:
192,872 UART: Running Caliptra ROM ...
194,065 UART:
194,262 UART: [state] CFI Enabled
263,522 UART: [state] LifecycleState = Unprovisioned
265,944 UART: [state] DebugLocked = No
267,770 UART: [state] WD Timer not started. Device not locked for debugging
272,088 UART: [kat] SHA2-256
461,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,777 UART: [kat] ++
473,254 UART: [kat] sha1
483,271 UART: [kat] SHA2-256
486,355 UART: [kat] SHA2-384
492,702 UART: [kat] SHA2-512-ACC
495,293 UART: [kat] ECC-384
2,946,361 UART: [kat] HMAC-384Kdf
2,970,242 UART: [kat] LMS
3,502,033 UART: [kat] --
3,505,109 UART: [cold-reset] ++
3,506,795 UART: [fht] FHT @ 0x50003400
3,519,091 UART: [idev] ++
3,519,747 UART: [idev] CDI.KEYID = 6
3,520,707 UART: [idev] SUBJECT.KEYID = 7
3,521,886 UART: [idev] UDS.KEYID = 0
3,522,815 ready_for_fw is high
3,523,007 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,808 UART: [idev] Erasing UDS.KEYID = 0
6,028,387 UART: [idev] Sha1 KeyId Algorithm
6,050,378 UART: [idev] --
6,055,244 UART: [ldev] ++
6,055,935 UART: [ldev] CDI.KEYID = 6
6,056,850 UART: [ldev] SUBJECT.KEYID = 5
6,058,009 UART: [ldev] AUTHORITY.KEYID = 7
6,059,249 UART: [ldev] FE.KEYID = 1
6,097,880 UART: [ldev] Erasing FE.KEYID = 1
8,606,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,956 UART: [ldev] --
10,412,844 UART: [fwproc] Wait for Commands...
10,415,651 UART: [fwproc] Recv command 0x46574c44
10,417,961 UART: [fwproc] Recv'd Img size: 114360 bytes
13,872,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,611,568 >>> mbox cmd response: success
14,614,752 UART: [afmc] ++
14,615,469 UART: [afmc] CDI.KEYID = 6
14,616,635 UART: [afmc] SUBJECT.KEYID = 7
14,618,147 UART: [afmc] AUTHORITY.KEYID = 5
17,148,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,734 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,926 UART: [afmc] --
18,945,522 UART: [cold-reset] --
18,950,278 UART: [state] Locking Datavault
18,957,419 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,583 UART: [state] Locking ICCM
18,960,933 UART: [exit] Launching FMC @ 0x40000130
18,969,615 UART:
18,969,861 UART: Running Caliptra FMC ...
18,970,965 UART:
18,971,146 UART: [state] CFI Enabled
19,028,653 UART: [fht] FMC Alias Private Key: 7
20,793,189 UART: [art] Extend RT PCRs Done
20,794,389 UART: [art] Lock RT PCRs Done
20,796,224 UART: [art] Populate DV Done
20,801,740 UART: [fht] FMC Alias Private Key: 7
20,803,225 UART: [art] Derive CDI
20,803,986 UART: [art] Store in in slot 0x4
20,861,286 UART: [art] Derive Key Pair
20,862,287 UART: [art] Store priv key in slot 0x5
23,325,868 UART: [art] Derive Key Pair - Done
23,339,033 UART: [art] Signing Cert with AUTHO
23,340,344 UART: RITY.KEYID = 7
25,051,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,359 UART: [art] PUB.X = 735243D77C05B5C9567EC64B5598A2D90365EEA3822AFBBAD84E802A86B3D09130DEDE91E68AF0F52209B499E7DF8A91
25,060,636 UART: [art] PUB.Y = E8C7DCF5EF5B13B690F149745FF59317ED007CF7798ABA910ABE27DADA0DD38D615B266DB7ED09C060FD79B8E7D1837C
25,067,923 UART: [art] SIG.R = 5289CC3E3499569AC54ED7C1ABE2BC6A902B86671ADFA5CF4088E80E135E48D8F3DFAFC1DE8ACB9224AA043FFD13DFFB
25,075,355 UART: [art] SIG.S = E598E4453258828D4F41490D2CCE6C82E114EC1869300A3F214B12A6AF407BC6B43E9E8338AE8F2A97B92FFE973FCBCB
26,054,086 UART: Caliptra RT
26,054,806 UART: [state] CFI Enabled
26,220,577 UART: [rt] RT listening for mailbox commands...
26,222,524 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,252,612 UART: [rt]cmd =0x44504543, len=28
26,303,084 >>> mbox cmd response data (2076 bytes)
26,313,332 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,343,496 UART: [rt]cmd =0x44504543, len=28
26,391,994 >>> mbox cmd response data (2076 bytes)
26,735,745 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,769,061 UART: [rt]cmd =0x49444550, len=353
26,782,648 >>> mbox cmd response data (8 bytes)
26,783,128 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,813,067 UART: [rt]cmd =0x44504543, len=28
26,863,456 >>> mbox cmd response data (2076 bytes)
26,873,834 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,903,888 UART: [rt]cmd =0x44504543, len=28
26,952,766 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
3,438,390 ready_for_fw is high
3,438,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,725,841 >>> mbox cmd response: success
19,005,699 UART:
19,006,105 UART: Running Caliptra FMC ...
19,007,230 UART:
19,007,391 UART: [state] CFI Enabled
19,072,801 UART: [fht] FMC Alias Private Key: 7
20,836,563 UART: [art] Extend RT PCRs Done
20,837,785 UART: [art] Lock RT PCRs Done
20,839,706 UART: [art] Populate DV Done
20,845,013 UART: [fht] FMC Alias Private Key: 7
20,846,683 UART: [art] Derive CDI
20,847,425 UART: [art] Store in in slot 0x4
20,905,598 UART: [art] Derive Key Pair
20,906,604 UART: [art] Store priv key in slot 0x5
23,369,961 UART: [art] Derive Key Pair - Done
23,382,691 UART: [art] Signing Cert with AUTHO
23,383,993 UART: RITY.KEYID = 7
25,095,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,785 UART: [art] PUB.X = 06CD919E1AA2E1483EACB34AD87D7303F168ACA4DCA9733D7D4B6251BB1EFBEC6C334DCEBA0645254E04D1518BB95B54
25,104,065 UART: [art] PUB.Y = 56849951DE01890B708C67E96C4CEE058243DCE3CF6F39D1C77D767390D16CAB2C68FA3C482B0966E45B6BC8929D2AD3
25,111,307 UART: [art] SIG.R = F2F8DF33B21A97D39052ED72A3D972F3BB1E10ABB7691CB724E5C7B990564EAA07F3BC7E2858BA1A393EB43C10212545
25,118,735 UART: [art] SIG.S = F74080B3E7EAF32F7568A1EFF1C729C371013AB54F06623279AD934B909B8A661980BFC21F2421EA62B2618B3EB18184
26,097,633 UART: Caliptra RT
26,098,332 UART: [state] CFI Enabled
26,264,455 UART: [rt] RT listening for mailbox commands...
26,266,408 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,296,297 UART: [rt]cmd =0x44504543, len=28
26,346,934 >>> mbox cmd response data (2076 bytes)
26,357,094 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,387,127 UART: [rt]cmd =0x44504543, len=28
26,435,306 >>> mbox cmd response data (2076 bytes)
26,779,104 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,812,285 UART: [rt]cmd =0x49444550, len=353
26,825,915 >>> mbox cmd response data (8 bytes)
26,826,380 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,856,485 UART: [rt]cmd =0x44504543, len=28
26,907,247 >>> mbox cmd response data (2076 bytes)
26,917,506 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,947,382 UART: [rt]cmd =0x44504543, len=28
26,996,396 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,484 UART:
192,841 UART: Running Caliptra ROM ...
194,028 UART:
603,683 UART: [state] CFI Enabled
618,128 UART: [state] LifecycleState = Unprovisioned
620,493 UART: [state] DebugLocked = No
622,730 UART: [state] WD Timer not started. Device not locked for debugging
626,620 UART: [kat] SHA2-256
816,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,327 UART: [kat] ++
827,847 UART: [kat] sha1
840,440 UART: [kat] SHA2-256
843,452 UART: [kat] SHA2-384
850,009 UART: [kat] SHA2-512-ACC
852,533 UART: [kat] ECC-384
3,292,048 UART: [kat] HMAC-384Kdf
3,306,557 UART: [kat] LMS
3,838,348 UART: [kat] --
3,843,282 UART: [cold-reset] ++
3,844,287 UART: [fht] FHT @ 0x50003400
3,856,260 UART: [idev] ++
3,856,902 UART: [idev] CDI.KEYID = 6
3,857,857 UART: [idev] SUBJECT.KEYID = 7
3,859,103 UART: [idev] UDS.KEYID = 0
3,860,005 ready_for_fw is high
3,860,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,813 UART: [idev] Erasing UDS.KEYID = 0
6,334,550 UART: [idev] Sha1 KeyId Algorithm
6,358,164 UART: [idev] --
6,362,593 UART: [ldev] ++
6,363,322 UART: [ldev] CDI.KEYID = 6
6,364,203 UART: [ldev] SUBJECT.KEYID = 5
6,365,411 UART: [ldev] AUTHORITY.KEYID = 7
6,366,588 UART: [ldev] FE.KEYID = 1
6,376,561 UART: [ldev] Erasing FE.KEYID = 1
8,860,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,728 UART: [ldev] --
10,652,489 UART: [fwproc] Wait for Commands...
10,654,260 UART: [fwproc] Recv command 0x46574c44
10,656,531 UART: [fwproc] Recv'd Img size: 114360 bytes
14,095,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,382 >>> mbox cmd response: success
14,839,658 UART: [afmc] ++
14,840,368 UART: [afmc] CDI.KEYID = 6
14,841,474 UART: [afmc] SUBJECT.KEYID = 7
14,843,007 UART: [afmc] AUTHORITY.KEYID = 5
17,341,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,377 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,995 UART: [afmc] --
19,137,067 UART: [cold-reset] --
19,140,936 UART: [state] Locking Datavault
19,147,475 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,655 UART: [state] Locking ICCM
19,151,263 UART: [exit] Launching FMC @ 0x40000130
19,159,927 UART:
19,160,165 UART: Running Caliptra FMC ...
19,161,267 UART:
19,161,421 UART: [state] CFI Enabled
19,169,573 UART: [fht] FMC Alias Private Key: 7
20,926,819 UART: [art] Extend RT PCRs Done
20,928,031 UART: [art] Lock RT PCRs Done
20,929,625 UART: [art] Populate DV Done
20,935,192 UART: [fht] FMC Alias Private Key: 7
20,936,729 UART: [art] Derive CDI
20,937,459 UART: [art] Store in in slot 0x4
20,980,554 UART: [art] Derive Key Pair
20,981,598 UART: [art] Store priv key in slot 0x5
23,408,163 UART: [art] Derive Key Pair - Done
23,420,877 UART: [art] Signing Cert with AUTHO
23,422,182 UART: RITY.KEYID = 7
25,127,475 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,975 UART: [art] PUB.X = A595992B7D102EF51A659E28E1E8B1041DDC25BA4AB64B90073A2B549707DA6FF31CC0B3C99FCA6AA229BE3753CC383F
25,136,280 UART: [art] PUB.Y = 035873ED5778B5C205E92FA4738D9A894072C08F3B86A1C3F40C9B78E8C2E20C088AF48952312B17EEB8C252E6282325
25,143,512 UART: [art] SIG.R = 76D485FE61EBAB7809E340B518524A2DFB2C2AE1884605C993DA3E216483FF5DE95A95E2EE85E746D7F8AD625C75FA21
25,150,898 UART: [art] SIG.S = B02CF5E84CAE5C3C9E8A392FAE1AAA34B64CD685B879FB17C5C53F4344F6AC4B9F1037A23080F9201F4B6C4B693AF17B
26,130,006 UART: Caliptra RT
26,130,734 UART: [state] CFI Enabled
26,248,501 UART: [rt] RT listening for mailbox commands...
26,250,454 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,280,415 UART: [rt]cmd =0x44504543, len=28
26,330,914 >>> mbox cmd response data (2076 bytes)
26,340,963 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,370,865 UART: [rt]cmd =0x44504543, len=28
26,419,373 >>> mbox cmd response data (2076 bytes)
26,764,888 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,798,169 UART: [rt]cmd =0x49444550, len=353
26,811,778 >>> mbox cmd response data (8 bytes)
26,812,282 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,842,249 UART: [rt]cmd =0x44504543, len=28
26,892,883 >>> mbox cmd response data (2076 bytes)
26,902,915 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,933,047 UART: [rt]cmd =0x44504543, len=28
26,982,100 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,758,562 ready_for_fw is high
3,759,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,951,840 >>> mbox cmd response: success
19,201,632 UART:
19,202,016 UART: Running Caliptra FMC ...
19,203,218 UART:
19,203,391 UART: [state] CFI Enabled
19,211,143 UART: [fht] FMC Alias Private Key: 7
20,967,908 UART: [art] Extend RT PCRs Done
20,969,130 UART: [art] Lock RT PCRs Done
20,970,860 UART: [art] Populate DV Done
20,976,431 UART: [fht] FMC Alias Private Key: 7
20,978,191 UART: [art] Derive CDI
20,979,012 UART: [art] Store in in slot 0x4
21,021,510 UART: [art] Derive Key Pair
21,022,509 UART: [art] Store priv key in slot 0x5
23,449,048 UART: [art] Derive Key Pair - Done
23,461,834 UART: [art] Signing Cert with AUTHO
23,463,141 UART: RITY.KEYID = 7
25,168,823 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,339 UART: [art] PUB.X = 074BEF79B4F5DD63DE7FC2F5A08A3A9A724FD11A8FECFFC4311CC721DD0BC3514737C58510BF37210D5367F273202148
25,177,601 UART: [art] PUB.Y = 25DE0D22138ABC254316F6CF4BB9E76EBAD013BBFCA5A4286E46E1DF0B635B9782BCA8C394228E6830BD73A883E434C9
25,184,845 UART: [art] SIG.R = B2C08E77F11D54EEF4A64AAF421B948F5673E50EFF3B49849BBCA7C90315F05ED4082F5FE76D89480BF64469AAF2FAB4
25,192,254 UART: [art] SIG.S = C108451F16C141C5E9821102B616EF442AEAA5983047385C54030A61BF30E11F9BA654EFE0E4F5C255C6208833F7D6C8
26,170,972 UART: Caliptra RT
26,171,665 UART: [state] CFI Enabled
26,288,782 UART: [rt] RT listening for mailbox commands...
26,290,737 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,320,660 UART: [rt]cmd =0x44504543, len=28
26,371,081 >>> mbox cmd response data (2076 bytes)
26,381,087 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,411,497 UART: [rt]cmd =0x44504543, len=28
26,459,603 >>> mbox cmd response data (2076 bytes)
26,804,513 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,837,529 UART: [rt]cmd =0x49444550, len=353
26,851,363 >>> mbox cmd response data (8 bytes)
26,851,842 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,881,718 UART: [rt]cmd =0x44504543, len=28
26,932,534 >>> mbox cmd response data (2076 bytes)
26,942,420 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,972,511 UART: [rt]cmd =0x44504543, len=28
27,020,994 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,550 UART: [state] LifecycleState = Unprovisioned
85,205 UART: [state] DebugLocked = No
85,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,373 UART: [kat] SHA2-256
881,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,419 UART: [kat] ++
885,571 UART: [kat] sha1
889,817 UART: [kat] SHA2-256
891,755 UART: [kat] SHA2-384
894,664 UART: [kat] SHA2-512-ACC
896,565 UART: [kat] ECC-384
901,994 UART: [kat] HMAC-384Kdf
906,418 UART: [kat] LMS
1,474,614 UART: [kat] --
1,475,459 UART: [cold-reset] ++
1,476,009 UART: [fht] Storing FHT @ 0x50003400
1,478,864 UART: [idev] ++
1,479,032 UART: [idev] CDI.KEYID = 6
1,479,392 UART: [idev] SUBJECT.KEYID = 7
1,479,816 UART: [idev] UDS.KEYID = 0
1,480,161 ready_for_fw is high
1,480,161 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,674 UART: [idev] Erasing UDS.KEYID = 0
1,503,882 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,604 UART: [idev] --
1,513,563 UART: [ldev] ++
1,513,731 UART: [ldev] CDI.KEYID = 6
1,514,094 UART: [ldev] SUBJECT.KEYID = 5
1,514,520 UART: [ldev] AUTHORITY.KEYID = 7
1,514,983 UART: [ldev] FE.KEYID = 1
1,519,743 UART: [ldev] Erasing FE.KEYID = 1
1,545,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,340 UART: [ldev] --
1,584,745 UART: [fwproc] Waiting for Commands...
1,585,606 UART: [fwproc] Received command 0x46574c44
1,586,397 UART: [fwproc] Received Image of size 114360 bytes
2,884,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,718 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,007 >>> mbox cmd response: success
3,078,135 UART: [afmc] ++
3,078,303 UART: [afmc] CDI.KEYID = 6
3,078,665 UART: [afmc] SUBJECT.KEYID = 7
3,079,090 UART: [afmc] AUTHORITY.KEYID = 5
3,114,243 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,236 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,926 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,775 UART: [afmc] --
3,157,659 UART: [cold-reset] --
3,158,451 UART: [state] Locking Datavault
3,159,940 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,544 UART: [state] Locking ICCM
3,160,966 UART: [exit] Launching FMC @ 0x40000130
3,166,295 UART:
3,166,311 UART: Running Caliptra FMC ...
3,166,719 UART:
3,166,773 UART: [state] CFI Enabled
3,177,592 UART: [fht] FMC Alias Private Key: 7
3,285,541 UART: [art] Extend RT PCRs Done
3,285,969 UART: [art] Lock RT PCRs Done
3,287,675 UART: [art] Populate DV Done
3,295,950 UART: [fht] FMC Alias Private Key: 7
3,297,090 UART: [art] Derive CDI
3,297,370 UART: [art] Store in in slot 0x4
3,382,741 UART: [art] Derive Key Pair
3,383,101 UART: [art] Store priv key in slot 0x5
3,396,147 UART: [art] Derive Key Pair - Done
3,410,805 UART: [art] Signing Cert with AUTHO
3,411,285 UART: RITY.KEYID = 7
3,426,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,354 UART: [art] PUB.X = 4BD481C5A823DA1390C10CF0A5533FC1DB487350B5F6E86D041DDE34865E3033CA6FFD776AF3F9A318F1583293B53770
3,434,122 UART: [art] PUB.Y = DE568D2A5FD1127E1BB8B2C186D2A8D61A44AF0929544FC047C61B9CD5A168E0CE1A5A07885A9997ECE72E9104C4F656
3,441,073 UART: [art] SIG.R = FA751982A7ADA5ADAB82BB1939F20C21B9E12F11BD758B381C6D03A61C1E3EE30E61EC6F5ED3BC2616CB32B8A6DB89D3
3,447,856 UART: [art] SIG.S = E3D70949AA9FBF2650A03FACA68EEE8C35B3E201AC088BE7BEBCC8872FCDDC1FE65BC24C444950A26B352B70D8A053A2
3,471,564 UART: Caliptra RT
3,471,818 UART: [state] CFI Enabled
3,580,051 UART: [rt] RT listening for mailbox commands...
3,580,721 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,656 UART: [rt]cmd =0x44504543, len=28
3,661,848 >>> mbox cmd response data (2076 bytes)
3,661,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,086 UART: [rt]cmd =0x44504543, len=28
3,739,878 >>> mbox cmd response data (2076 bytes)
3,739,879 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,595 UART: [rt]cmd =0x49444550, len=353
3,784,730 >>> mbox cmd response data (8 bytes)
3,784,731 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,300 UART: [rt]cmd =0x44504543, len=28
3,864,966 >>> mbox cmd response data (2076 bytes)
3,864,967 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,268 UART: [rt]cmd =0x44504543, len=28
3,943,509 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,845 ready_for_fw is high
1,361,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,495 >>> mbox cmd response: success
2,989,417 UART:
2,989,433 UART: Running Caliptra FMC ...
2,989,841 UART:
2,989,895 UART: [state] CFI Enabled
3,000,302 UART: [fht] FMC Alias Private Key: 7
3,107,525 UART: [art] Extend RT PCRs Done
3,107,953 UART: [art] Lock RT PCRs Done
3,109,765 UART: [art] Populate DV Done
3,117,890 UART: [fht] FMC Alias Private Key: 7
3,118,964 UART: [art] Derive CDI
3,119,244 UART: [art] Store in in slot 0x4
3,205,015 UART: [art] Derive Key Pair
3,205,375 UART: [art] Store priv key in slot 0x5
3,218,503 UART: [art] Derive Key Pair - Done
3,233,295 UART: [art] Signing Cert with AUTHO
3,233,775 UART: RITY.KEYID = 7
3,248,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,698 UART: [art] PUB.X = 0BF7522D8EEB4467194D6CD41B9C3F52F1BEB16694FAC87906D22D24F35429C29D66B56501331AAC908276B73727DCB3
3,256,461 UART: [art] PUB.Y = 517F197F1D7C460A5DDB15A771E30EC87C49A0D122221EC29E9F2FFAFC55BD34ABF76AFBA06B5D7769367D4C023DE91E
3,263,420 UART: [art] SIG.R = 0D38BFD8640548891D3F517F8E14D10CC03561026FEE55C4A64C59ADAAEE90A3629BBFC7D6846CEC748CAB7F880CE491
3,270,189 UART: [art] SIG.S = DA690AE517405F217749825DEA25E54C26CCB2EFE6AE43019799E66C2B54C8E5CEB8E2DA7B724EB078A6691886CFFC22
3,294,170 UART: Caliptra RT
3,294,424 UART: [state] CFI Enabled
3,401,548 UART: [rt] RT listening for mailbox commands...
3,402,218 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,765 UART: [rt]cmd =0x44504543, len=28
3,482,961 >>> mbox cmd response data (2076 bytes)
3,482,962 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,539 UART: [rt]cmd =0x44504543, len=28
3,561,348 >>> mbox cmd response data (2076 bytes)
3,561,349 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,804 UART: [rt]cmd =0x49444550, len=354
3,605,999 >>> mbox cmd response data (8 bytes)
3,606,000 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,603 UART: [rt]cmd =0x44504543, len=28
3,686,539 >>> mbox cmd response data (2076 bytes)
3,686,540 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,223 UART: [rt]cmd =0x44504543, len=28
3,765,682 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,561 UART: [kat] SHA2-512-ACC
897,462 UART: [kat] ECC-384
903,211 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,477,032 UART: [cold-reset] ++
1,477,460 UART: [fht] Storing FHT @ 0x50003400
1,480,369 UART: [idev] ++
1,480,537 UART: [idev] CDI.KEYID = 6
1,480,897 UART: [idev] SUBJECT.KEYID = 7
1,481,321 UART: [idev] UDS.KEYID = 0
1,481,666 ready_for_fw is high
1,481,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,523 UART: [idev] Erasing UDS.KEYID = 0
1,506,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,155 UART: [idev] --
1,516,214 UART: [ldev] ++
1,516,382 UART: [ldev] CDI.KEYID = 6
1,516,745 UART: [ldev] SUBJECT.KEYID = 5
1,517,171 UART: [ldev] AUTHORITY.KEYID = 7
1,517,634 UART: [ldev] FE.KEYID = 1
1,523,046 UART: [ldev] Erasing FE.KEYID = 1
1,548,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,561 UART: [ldev] --
1,587,848 UART: [fwproc] Waiting for Commands...
1,588,643 UART: [fwproc] Received command 0x46574c44
1,589,434 UART: [fwproc] Received Image of size 114360 bytes
2,886,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,658 >>> mbox cmd response: success
3,080,850 UART: [afmc] ++
3,081,018 UART: [afmc] CDI.KEYID = 6
3,081,380 UART: [afmc] SUBJECT.KEYID = 7
3,081,805 UART: [afmc] AUTHORITY.KEYID = 5
3,117,278 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,347 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,037 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,818 UART: [afmc] --
3,160,872 UART: [cold-reset] --
3,161,700 UART: [state] Locking Datavault
3,162,627 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,231 UART: [state] Locking ICCM
3,163,713 UART: [exit] Launching FMC @ 0x40000130
3,169,042 UART:
3,169,058 UART: Running Caliptra FMC ...
3,169,466 UART:
3,169,609 UART: [state] CFI Enabled
3,180,070 UART: [fht] FMC Alias Private Key: 7
3,287,651 UART: [art] Extend RT PCRs Done
3,288,079 UART: [art] Lock RT PCRs Done
3,289,533 UART: [art] Populate DV Done
3,297,704 UART: [fht] FMC Alias Private Key: 7
3,298,818 UART: [art] Derive CDI
3,299,098 UART: [art] Store in in slot 0x4
3,384,883 UART: [art] Derive Key Pair
3,385,243 UART: [art] Store priv key in slot 0x5
3,398,909 UART: [art] Derive Key Pair - Done
3,413,781 UART: [art] Signing Cert with AUTHO
3,414,261 UART: RITY.KEYID = 7
3,429,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,382 UART: [art] PUB.X = 4A40C2EAF7F14CAE67D98C8B0CD35D17CADEAD54D05E4EC0926038C4CBC74969D6B09E683AFE4CEF029B0C4199E9C992
3,437,165 UART: [art] PUB.Y = 5C948BBFB6A0AB0A16C03DD273FEB87EEB7B496AFF1FFCE8750C31227F332E5782A604D7F663FB1F1BB67E559F125714
3,444,122 UART: [art] SIG.R = A5F2F6F6592025805A1CAC84CDB1DD3D66AA1B00F384615F4D4C83950072BDCDB6D5027D7B438768B870B47CDE8FE2AB
3,450,859 UART: [art] SIG.S = 294FAA442209F0B768C0F100CC5BFAA7AD0845B07E76EC5652932EFE6E7D520DA8F32EE17B1FEC47850803B3059DFEA4
3,474,644 UART: Caliptra RT
3,474,990 UART: [state] CFI Enabled
3,583,420 UART: [rt] RT listening for mailbox commands...
3,584,090 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,051 UART: [rt]cmd =0x44504543, len=28
3,665,251 >>> mbox cmd response data (2076 bytes)
3,665,252 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,689 UART: [rt]cmd =0x44504543, len=28
3,743,322 >>> mbox cmd response data (2076 bytes)
3,743,323 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,764 UART: [rt]cmd =0x49444550, len=354
3,787,947 >>> mbox cmd response data (8 bytes)
3,787,948 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,331 UART: [rt]cmd =0x44504543, len=28
3,868,087 >>> mbox cmd response data (2076 bytes)
3,868,088 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,845 UART: [rt]cmd =0x44504543, len=28
3,947,432 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,654 ready_for_fw is high
1,362,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,974 >>> mbox cmd response: success
2,990,706 UART:
2,990,722 UART: Running Caliptra FMC ...
2,991,130 UART:
2,991,273 UART: [state] CFI Enabled
3,001,960 UART: [fht] FMC Alias Private Key: 7
3,109,615 UART: [art] Extend RT PCRs Done
3,110,043 UART: [art] Lock RT PCRs Done
3,111,595 UART: [art] Populate DV Done
3,119,732 UART: [fht] FMC Alias Private Key: 7
3,120,796 UART: [art] Derive CDI
3,121,076 UART: [art] Store in in slot 0x4
3,206,859 UART: [art] Derive Key Pair
3,207,219 UART: [art] Store priv key in slot 0x5
3,220,707 UART: [art] Derive Key Pair - Done
3,235,359 UART: [art] Signing Cert with AUTHO
3,235,839 UART: RITY.KEYID = 7
3,251,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,894 UART: [art] PUB.X = 5BD402DF3B730A8661AC4DE6528AC6547E7453F138D94C31BA0DBE31B8B06551367629F645699F5FBC0F9455D4EFA881
3,258,656 UART: [art] PUB.Y = BF8C43CDBBFCFE866677BA0AE457F95430A663D137322B5EC41798B9B90547C517576B6771B9D2BAE0F2BB8832BBFC20
3,265,612 UART: [art] SIG.R = 4D99227A3997E293ED0A498ED761B58F91012581ADE73883C70B34E59EF50123172D314078033C2435ED63E52189408D
3,272,353 UART: [art] SIG.S = 875CBFFC4063DE8F30C5BEC3FEC07050C4C966B5712F71579747BA2E20859EC49F232AE713F19D835668482EED19BE78
3,296,024 UART: Caliptra RT
3,296,370 UART: [state] CFI Enabled
3,404,684 UART: [rt] RT listening for mailbox commands...
3,405,354 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,015 UART: [rt]cmd =0x44504543, len=28
3,486,333 >>> mbox cmd response data (2076 bytes)
3,486,334 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,193 UART: [rt]cmd =0x44504543, len=28
3,564,922 >>> mbox cmd response data (2076 bytes)
3,564,923 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,596,575 UART: [rt]cmd =0x49444550, len=353
3,609,819 >>> mbox cmd response data (8 bytes)
3,609,820 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,305 UART: [rt]cmd =0x44504543, len=28
3,690,735 >>> mbox cmd response data (2076 bytes)
3,690,736 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,155 UART: [rt]cmd =0x44504543, len=28
3,769,457 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,784 UART: [state] LifecycleState = Unprovisioned
85,439 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,218 UART: [kat] SHA2-512-ACC
908,119 UART: [kat] ECC-384
917,956 UART: [kat] HMAC-384Kdf
922,512 UART: [kat] LMS
1,170,840 UART: [kat] --
1,171,731 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,652 UART: [idev] ++
1,174,820 UART: [idev] CDI.KEYID = 6
1,175,180 UART: [idev] SUBJECT.KEYID = 7
1,175,604 UART: [idev] UDS.KEYID = 0
1,175,949 ready_for_fw is high
1,175,949 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,580 UART: [idev] Erasing UDS.KEYID = 0
1,200,201 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,649 UART: [ldev] ++
1,209,817 UART: [ldev] CDI.KEYID = 6
1,210,180 UART: [ldev] SUBJECT.KEYID = 5
1,210,606 UART: [ldev] AUTHORITY.KEYID = 7
1,211,069 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,485 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,396 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,279 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,066 >>> mbox cmd response: success
2,774,100 UART: [afmc] ++
2,774,268 UART: [afmc] CDI.KEYID = 6
2,774,630 UART: [afmc] SUBJECT.KEYID = 7
2,775,055 UART: [afmc] AUTHORITY.KEYID = 5
2,810,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,821 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,434 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,153 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,809 UART: [afmc] --
2,853,725 UART: [cold-reset] --
2,854,673 UART: [state] Locking Datavault
2,855,666 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,270 UART: [state] Locking ICCM
2,856,700 UART: [exit] Launching FMC @ 0x40000130
2,862,029 UART:
2,862,045 UART: Running Caliptra FMC ...
2,862,453 UART:
2,862,507 UART: [state] CFI Enabled
2,872,704 UART: [fht] FMC Alias Private Key: 7
2,981,137 UART: [art] Extend RT PCRs Done
2,981,565 UART: [art] Lock RT PCRs Done
2,982,963 UART: [art] Populate DV Done
2,991,254 UART: [fht] FMC Alias Private Key: 7
2,992,310 UART: [art] Derive CDI
2,992,590 UART: [art] Store in in slot 0x4
3,078,439 UART: [art] Derive Key Pair
3,078,799 UART: [art] Store priv key in slot 0x5
3,091,515 UART: [art] Derive Key Pair - Done
3,106,395 UART: [art] Signing Cert with AUTHO
3,106,875 UART: RITY.KEYID = 7
3,121,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,216 UART: [art] PUB.X = 1CD84BFF30D1D2C0F6E4BF6D42EB938BA05DE03A1F11253046A9921B770C1A3CC88867D618DA7C0EC53211AFA8F1E395
3,128,994 UART: [art] PUB.Y = 45022B5655F478390AC803F1AE1D4FBDA23E8F8203F1F82802017EDF183841650E1F55DC7EB06EE5B74BD4E3E7A2F762
3,135,929 UART: [art] SIG.R = E47B12F8F0288C75EC438D988A355979A8359063258957088C47BB22EC8CEC508FBC08CCF90DDF655A570C2CBD3BDBB4
3,142,697 UART: [art] SIG.S = C47F1EB10F8021ED9A824B61624E5B6A2F480E0979F73B90F02090E7940ECC9D70C0C216899AEA8C4C657E7E04939F37
3,166,491 UART: Caliptra RT
3,166,745 UART: [state] CFI Enabled
3,273,610 UART: [rt] RT listening for mailbox commands...
3,274,280 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,829 UART: [rt]cmd =0x44504543, len=28
3,354,921 >>> mbox cmd response data (2076 bytes)
3,354,922 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,579 UART: [rt]cmd =0x44504543, len=28
3,433,374 >>> mbox cmd response data (2076 bytes)
3,433,375 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,950 UART: [rt]cmd =0x49444550, len=352
3,475,562 >>> mbox cmd response data (8 bytes)
3,475,563 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,954 UART: [rt]cmd =0x44504543, len=28
3,556,250 >>> mbox cmd response data (2076 bytes)
3,556,251 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,780 UART: [rt]cmd =0x44504543, len=28
3,634,853 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,821 ready_for_fw is high
1,060,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,363 >>> mbox cmd response: success
2,687,785 UART:
2,687,801 UART: Running Caliptra FMC ...
2,688,209 UART:
2,688,263 UART: [state] CFI Enabled
2,698,636 UART: [fht] FMC Alias Private Key: 7
2,805,985 UART: [art] Extend RT PCRs Done
2,806,413 UART: [art] Lock RT PCRs Done
2,807,935 UART: [art] Populate DV Done
2,816,080 UART: [fht] FMC Alias Private Key: 7
2,817,106 UART: [art] Derive CDI
2,817,386 UART: [art] Store in in slot 0x4
2,903,141 UART: [art] Derive Key Pair
2,903,501 UART: [art] Store priv key in slot 0x5
2,917,135 UART: [art] Derive Key Pair - Done
2,932,050 UART: [art] Signing Cert with AUTHO
2,932,530 UART: RITY.KEYID = 7
2,947,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,587 UART: [art] PUB.X = A66B8B243BEB10A3BFA92DAA977A017F69E9360E949BE6B427502AAE74A35AC58582411B87C6AC2E499AA100E9851576
2,955,335 UART: [art] PUB.Y = 377D2C6FBD9678B4C64ADBB78D2F529FEEC1132939803A1A74B3E831129E146ED00D4EBBA8005F41DFC6D93C2C056ECE
2,962,273 UART: [art] SIG.R = 7AD94C5BE75EEF845E5CC8793E8EF5813244E6EBB681B6D14857A0D129BA58AF48796EA810C70E7574136D346756543E
2,969,042 UART: [art] SIG.S = 267878C0180DC1985F9E661ADC967A67D35BFFE133373347D66E519B2FD755F1C638C8A62EA959B2F323A2438E8DC223
2,992,510 UART: Caliptra RT
2,992,764 UART: [state] CFI Enabled
3,100,934 UART: [rt] RT listening for mailbox commands...
3,101,604 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,195 UART: [rt]cmd =0x44504543, len=28
3,182,405 >>> mbox cmd response data (2076 bytes)
3,182,406 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,211,839 UART: [rt]cmd =0x44504543, len=28
3,260,451 >>> mbox cmd response data (2076 bytes)
3,260,452 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,292,184 UART: [rt]cmd =0x49444550, len=353
3,305,434 >>> mbox cmd response data (8 bytes)
3,305,435 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,708 UART: [rt]cmd =0x44504543, len=28
3,385,694 >>> mbox cmd response data (2076 bytes)
3,385,695 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,202 UART: [rt]cmd =0x44504543, len=28
3,464,360 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,851 UART: [kat] HMAC-384Kdf
923,563 UART: [kat] LMS
1,171,891 UART: [kat] --
1,172,800 UART: [cold-reset] ++
1,173,142 UART: [fht] FHT @ 0x50003400
1,175,765 UART: [idev] ++
1,175,933 UART: [idev] CDI.KEYID = 6
1,176,293 UART: [idev] SUBJECT.KEYID = 7
1,176,717 UART: [idev] UDS.KEYID = 0
1,177,062 ready_for_fw is high
1,177,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,277 UART: [idev] Erasing UDS.KEYID = 0
1,201,294 UART: [idev] Sha1 KeyId Algorithm
1,209,764 UART: [idev] --
1,210,806 UART: [ldev] ++
1,210,974 UART: [ldev] CDI.KEYID = 6
1,211,337 UART: [ldev] SUBJECT.KEYID = 5
1,211,763 UART: [ldev] AUTHORITY.KEYID = 7
1,212,226 UART: [ldev] FE.KEYID = 1
1,217,528 UART: [ldev] Erasing FE.KEYID = 1
1,243,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,340 UART: [ldev] --
1,283,733 UART: [fwproc] Wait for Commands...
1,284,555 UART: [fwproc] Recv command 0x46574c44
1,285,283 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,199 >>> mbox cmd response: success
2,777,379 UART: [afmc] ++
2,777,547 UART: [afmc] CDI.KEYID = 6
2,777,909 UART: [afmc] SUBJECT.KEYID = 7
2,778,334 UART: [afmc] AUTHORITY.KEYID = 5
2,813,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,744 UART: [afmc] --
2,857,748 UART: [cold-reset] --
2,858,754 UART: [state] Locking Datavault
2,859,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,575 UART: [state] Locking ICCM
2,861,187 UART: [exit] Launching FMC @ 0x40000130
2,866,516 UART:
2,866,532 UART: Running Caliptra FMC ...
2,866,940 UART:
2,867,083 UART: [state] CFI Enabled
2,877,626 UART: [fht] FMC Alias Private Key: 7
2,986,309 UART: [art] Extend RT PCRs Done
2,986,737 UART: [art] Lock RT PCRs Done
2,987,797 UART: [art] Populate DV Done
2,996,076 UART: [fht] FMC Alias Private Key: 7
2,997,118 UART: [art] Derive CDI
2,997,398 UART: [art] Store in in slot 0x4
3,082,601 UART: [art] Derive Key Pair
3,082,961 UART: [art] Store priv key in slot 0x5
3,095,855 UART: [art] Derive Key Pair - Done
3,110,732 UART: [art] Signing Cert with AUTHO
3,111,212 UART: RITY.KEYID = 7
3,126,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,051 UART: [art] PUB.X = 918993846B0B2DCF408642E9208FD792D22FC465E5AAF3F82CC34777A1F21624EA18A3260FAE8243E8BDAAD2F9ACD489
3,133,825 UART: [art] PUB.Y = C354EE7CE3266C584E8675CE925064B04F9968AE27B2106218583860B0C69814E1CC2D2CBA19E9B456952BA39A1FA60D
3,140,772 UART: [art] SIG.R = 88DD84FF2A2ABD0A5ACA365A61AD3B461E41C1C2433A9EF64F3FAF20AB125B57474BDD7EE4281D1C8500ABD284BED1F8
3,147,541 UART: [art] SIG.S = 1B57BF49E5AB05D4DBFD725F9C340DBBE2D0AD059B09D6ADECF7C5C44AECAB7FE5463A5087958D4BE5760849902E1185
3,171,481 UART: Caliptra RT
3,171,827 UART: [state] CFI Enabled
3,279,633 UART: [rt] RT listening for mailbox commands...
3,280,303 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,038 UART: [rt]cmd =0x44504543, len=28
3,361,046 >>> mbox cmd response data (2076 bytes)
3,361,047 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,576 UART: [rt]cmd =0x44504543, len=28
3,439,440 >>> mbox cmd response data (2076 bytes)
3,439,441 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,028 UART: [rt]cmd =0x49444550, len=354
3,484,096 >>> mbox cmd response data (8 bytes)
3,484,097 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,686 UART: [rt]cmd =0x44504543, len=28
3,564,836 >>> mbox cmd response data (2076 bytes)
3,564,837 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,282 UART: [rt]cmd =0x44504543, len=28
3,643,268 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 ready_for_fw is high
1,060,342 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,836 >>> mbox cmd response: success
2,690,328 UART:
2,690,344 UART: Running Caliptra FMC ...
2,690,752 UART:
2,690,895 UART: [state] CFI Enabled
2,701,442 UART: [fht] FMC Alias Private Key: 7
2,809,377 UART: [art] Extend RT PCRs Done
2,809,805 UART: [art] Lock RT PCRs Done
2,811,687 UART: [art] Populate DV Done
2,819,636 UART: [fht] FMC Alias Private Key: 7
2,820,752 UART: [art] Derive CDI
2,821,032 UART: [art] Store in in slot 0x4
2,906,671 UART: [art] Derive Key Pair
2,907,031 UART: [art] Store priv key in slot 0x5
2,920,885 UART: [art] Derive Key Pair - Done
2,935,160 UART: [art] Signing Cert with AUTHO
2,935,640 UART: RITY.KEYID = 7
2,951,124 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,889 UART: [art] PUB.X = FD6E57AC0F7DCDF0D098D97BBA8453997301FF4B80DB14B4772F88812862D17A48A2F186F0FB59501C22824F7460FF5A
2,958,659 UART: [art] PUB.Y = 4835D89C8A00CA5B063945FA02EDC1AF3C4AE3E321B8025F6A881E4619B81518E364DEE24E9FBE1DE6F7C89A25181517
2,965,586 UART: [art] SIG.R = 98BF81D8A5EF1380A38933D30DFCFC4CF4DE5C24E6802992F89BF10D16EC1A6B8DBB27037D640D739E40531AA96634D9
2,972,354 UART: [art] SIG.S = 933818A1C4FA9F466952569575D0ABD56352C23FE0A1B305BCBFF64FEBBD8A86F7605D341697BC6F970717F16E67D78A
2,996,505 UART: Caliptra RT
2,996,851 UART: [state] CFI Enabled
3,104,350 UART: [rt] RT listening for mailbox commands...
3,105,020 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,771 UART: [rt]cmd =0x44504543, len=28
3,185,595 >>> mbox cmd response data (2076 bytes)
3,185,596 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,215,167 UART: [rt]cmd =0x44504543, len=28
3,263,848 >>> mbox cmd response data (2076 bytes)
3,263,849 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,486 UART: [rt]cmd =0x49444550, len=352
3,306,298 >>> mbox cmd response data (8 bytes)
3,306,299 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,612 UART: [rt]cmd =0x44504543, len=28
3,386,668 >>> mbox cmd response data (2076 bytes)
3,386,669 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,416,306 UART: [rt]cmd =0x44504543, len=28
3,466,083 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,853 UART: [state] WD Timer not started. Device not locked for debugging
86,970 UART: [kat] SHA2-256
890,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,649 UART: [kat] ++
894,801 UART: [kat] sha1
899,055 UART: [kat] SHA2-256
900,995 UART: [kat] SHA2-384
903,842 UART: [kat] SHA2-512-ACC
905,743 UART: [kat] ECC-384
915,392 UART: [kat] HMAC-384Kdf
919,872 UART: [kat] LMS
1,168,184 UART: [kat] --
1,168,901 UART: [cold-reset] ++
1,169,413 UART: [fht] FHT @ 0x50003400
1,172,171 UART: [idev] ++
1,172,339 UART: [idev] CDI.KEYID = 6
1,172,700 UART: [idev] SUBJECT.KEYID = 7
1,173,125 UART: [idev] UDS.KEYID = 0
1,173,471 ready_for_fw is high
1,173,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,011 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,207,998 UART: [ldev] ++
1,208,166 UART: [ldev] CDI.KEYID = 6
1,208,530 UART: [ldev] SUBJECT.KEYID = 5
1,208,957 UART: [ldev] AUTHORITY.KEYID = 7
1,209,420 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,240,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,138 UART: [ldev] --
1,279,554 UART: [fwproc] Wait for Commands...
1,280,379 UART: [fwproc] Recv command 0x46574c44
1,281,112 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,162 >>> mbox cmd response: success
2,771,191 UART: [afmc] ++
2,771,359 UART: [afmc] CDI.KEYID = 6
2,771,722 UART: [afmc] SUBJECT.KEYID = 7
2,772,148 UART: [afmc] AUTHORITY.KEYID = 5
2,807,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,116 UART: [afmc] --
2,851,244 UART: [cold-reset] --
2,852,112 UART: [state] Locking Datavault
2,852,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,549 UART: [state] Locking ICCM
2,854,129 UART: [exit] Launching FMC @ 0x40000130
2,859,458 UART:
2,859,474 UART: Running Caliptra FMC ...
2,859,882 UART:
2,859,936 UART: [state] CFI Enabled
2,870,289 UART: [fht] FMC Alias Private Key: 7
2,978,580 UART: [art] Extend RT PCRs Done
2,979,008 UART: [art] Lock RT PCRs Done
2,980,702 UART: [art] Populate DV Done
2,988,955 UART: [fht] FMC Alias Private Key: 7
2,990,059 UART: [art] Derive CDI
2,990,339 UART: [art] Store in in slot 0x4
3,075,900 UART: [art] Derive Key Pair
3,076,260 UART: [art] Store priv key in slot 0x5
3,089,906 UART: [art] Derive Key Pair - Done
3,104,578 UART: [art] Signing Cert with AUTHO
3,105,058 UART: RITY.KEYID = 7
3,119,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,687 UART: [art] PUB.X = 6D2BE6F8540A722C8AB3108A6E732556F7AD0672ABF2B2FA8C9CA0AA9F1C9E2BFBA6D2FA3B73EDF5A63C1356FB9D44CA
3,127,479 UART: [art] PUB.Y = F62AE6AA1E3818B8B4AAD2693EFAC219E658105BCCB9535222E50D5C2DB7C2C98058938CAD8D8D523BF9894317EC8E05
3,134,435 UART: [art] SIG.R = E22F613EEA269B1F785D31B96749ACD3D0DFA12DBCA079F13F4567BE899BC3CACC432FFF105EBC10CECA78A1AD1DFCB8
3,141,237 UART: [art] SIG.S = 398392B461D7E07050441FBDEDB2B52486A6A6C77466E213DCE877E70006BC73A1F19B6C11C05F7949AAA0D1E807487C
3,165,042 UART: Caliptra RT
3,165,296 UART: [state] CFI Enabled
3,273,326 UART: [rt] RT listening for mailbox commands...
3,273,996 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,631 UART: [rt]cmd =0x44504543, len=28
3,354,525 >>> mbox cmd response data (2076 bytes)
3,354,526 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,745 UART: [rt]cmd =0x44504543, len=28
3,432,775 >>> mbox cmd response data (2076 bytes)
3,432,776 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,461 UART: [rt]cmd =0x49444550, len=352
3,475,222 >>> mbox cmd response data (8 bytes)
3,475,223 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,818 UART: [rt]cmd =0x44504543, len=28
3,555,758 >>> mbox cmd response data (2076 bytes)
3,555,759 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,494 UART: [rt]cmd =0x44504543, len=28
3,634,410 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,132 ready_for_fw is high
1,056,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,436 >>> mbox cmd response: success
2,685,422 UART:
2,685,438 UART: Running Caliptra FMC ...
2,685,846 UART:
2,685,900 UART: [state] CFI Enabled
2,696,169 UART: [fht] FMC Alias Private Key: 7
2,803,450 UART: [art] Extend RT PCRs Done
2,803,878 UART: [art] Lock RT PCRs Done
2,805,316 UART: [art] Populate DV Done
2,813,339 UART: [fht] FMC Alias Private Key: 7
2,814,267 UART: [art] Derive CDI
2,814,547 UART: [art] Store in in slot 0x4
2,900,336 UART: [art] Derive Key Pair
2,900,696 UART: [art] Store priv key in slot 0x5
2,913,786 UART: [art] Derive Key Pair - Done
2,928,853 UART: [art] Signing Cert with AUTHO
2,929,333 UART: RITY.KEYID = 7
2,944,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,802 UART: [art] PUB.X = 0AE5998E4420EFCF39E119F9AF6434DE782C2F94698AE91164157744173EB87F9B203E004BD8BB749C5B9C863CA9B8A8
2,951,551 UART: [art] PUB.Y = 39471ACAAAAC20754E7BAED4B8792A68FA325CBEBD1011F90199CCA83BB3CED3B9E454F9DA49019F677A41511D53D70D
2,958,510 UART: [art] SIG.R = 4C52B36C60301314E8A8C19DCF441255EB16A2823A5B42DDF53478EEC5DDF074885B50F778E44BD35904DD1F79CA4C2F
2,965,285 UART: [art] SIG.S = 52051797E7AA40A687525ED60F31C3DB55052AE4FA9F1AB8767E31E500379BFE3135C292F8B99A65CB5E7879E3BFC48D
2,988,663 UART: Caliptra RT
2,988,917 UART: [state] CFI Enabled
3,097,111 UART: [rt] RT listening for mailbox commands...
3,097,781 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,494 UART: [rt]cmd =0x44504543, len=28
3,178,588 >>> mbox cmd response data (2076 bytes)
3,178,589 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,360 UART: [rt]cmd =0x44504543, len=28
3,257,058 >>> mbox cmd response data (2076 bytes)
3,257,059 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,288,449 UART: [rt]cmd =0x49444550, len=353
3,301,489 >>> mbox cmd response data (8 bytes)
3,301,490 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,101 UART: [rt]cmd =0x44504543, len=28
3,381,967 >>> mbox cmd response data (2076 bytes)
3,381,968 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,345 UART: [rt]cmd =0x44504543, len=28
3,460,769 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,174,396 ready_for_fw is high
1,174,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,207,824 UART: [idev] --
1,208,819 UART: [ldev] ++
1,208,987 UART: [ldev] CDI.KEYID = 6
1,209,351 UART: [ldev] SUBJECT.KEYID = 5
1,209,778 UART: [ldev] AUTHORITY.KEYID = 7
1,210,241 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,221 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,483 >>> mbox cmd response: success
2,773,692 UART: [afmc] ++
2,773,860 UART: [afmc] CDI.KEYID = 6
2,774,223 UART: [afmc] SUBJECT.KEYID = 7
2,774,649 UART: [afmc] AUTHORITY.KEYID = 5
2,811,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,453 UART: [afmc] --
2,854,377 UART: [cold-reset] --
2,855,203 UART: [state] Locking Datavault
2,856,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,002 UART: [state] Locking ICCM
2,857,658 UART: [exit] Launching FMC @ 0x40000130
2,862,987 UART:
2,863,003 UART: Running Caliptra FMC ...
2,863,411 UART:
2,863,554 UART: [state] CFI Enabled
2,874,425 UART: [fht] FMC Alias Private Key: 7
2,983,296 UART: [art] Extend RT PCRs Done
2,983,724 UART: [art] Lock RT PCRs Done
2,985,226 UART: [art] Populate DV Done
2,993,703 UART: [fht] FMC Alias Private Key: 7
2,994,793 UART: [art] Derive CDI
2,995,073 UART: [art] Store in in slot 0x4
3,080,910 UART: [art] Derive Key Pair
3,081,270 UART: [art] Store priv key in slot 0x5
3,094,542 UART: [art] Derive Key Pair - Done
3,109,111 UART: [art] Signing Cert with AUTHO
3,109,591 UART: RITY.KEYID = 7
3,124,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,550 UART: [art] PUB.X = C09026241F042BFE17946F800ECAEF9ED339D1A88D0AF9F6B8611BA1B2AC5FD6DE447E507BC696E42D04BADFD106B9E9
3,132,325 UART: [art] PUB.Y = 2EE75AC508F2D994D80ECCAF5C7ED773FB7544A433F8BCF170083190EE839EF8EB33059C3081213652F7DA03C4553034
3,139,264 UART: [art] SIG.R = 31E9302D021CC2D01CD08D5E6F5802C44B70E183BEB8CB86B2DCDFA8A761B00C8060DD780451627721A1AA53D1E17E94
3,146,030 UART: [art] SIG.S = 420C27430FB76D0B953DC78E52EC07B359EEF1FDB2C25DD12D11374AAAAF062927B4DE3D267E971D0D8BBF6850394E93
3,169,377 UART: Caliptra RT
3,169,723 UART: [state] CFI Enabled
3,277,299 UART: [rt] RT listening for mailbox commands...
3,277,969 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,818 UART: [rt]cmd =0x44504543, len=28
3,359,108 >>> mbox cmd response data (2076 bytes)
3,359,109 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,536 UART: [rt]cmd =0x44504543, len=28
3,437,336 >>> mbox cmd response data (2076 bytes)
3,437,337 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,907 UART: [rt]cmd =0x49444550, len=353
3,481,997 >>> mbox cmd response data (8 bytes)
3,481,998 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,565 UART: [rt]cmd =0x44504543, len=28
3,562,503 >>> mbox cmd response data (2076 bytes)
3,562,504 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,592,255 UART: [rt]cmd =0x44504543, len=28
3,641,461 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,751 ready_for_fw is high
1,055,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,703 >>> mbox cmd response: success
2,684,391 UART:
2,684,407 UART: Running Caliptra FMC ...
2,684,815 UART:
2,684,958 UART: [state] CFI Enabled
2,695,813 UART: [fht] FMC Alias Private Key: 7
2,803,554 UART: [art] Extend RT PCRs Done
2,803,982 UART: [art] Lock RT PCRs Done
2,805,644 UART: [art] Populate DV Done
2,813,961 UART: [fht] FMC Alias Private Key: 7
2,815,139 UART: [art] Derive CDI
2,815,419 UART: [art] Store in in slot 0x4
2,900,738 UART: [art] Derive Key Pair
2,901,098 UART: [art] Store priv key in slot 0x5
2,914,420 UART: [art] Derive Key Pair - Done
2,928,968 UART: [art] Signing Cert with AUTHO
2,929,448 UART: RITY.KEYID = 7
2,944,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,221 UART: [art] PUB.X = 686ACB61001844F9956A67B01FFCAEB435FD4FF2A7481E1E28AF0F7E0CB235ABC0EEADB9856C80CAE1BFD72D61ADA9D1
2,951,991 UART: [art] PUB.Y = 8C49E33A02910B98052B474D62FE6705B22145013076A660AD113ECA18865FBD50AF438E7DB4C1882008F7372E5F5D9C
2,958,919 UART: [art] SIG.R = 94D95B2E9E7967287E159114F2F5C70B34BE968A9FAC9D4BA0B354E25988E906F69A8A4D430989B769627F118316C20F
2,965,673 UART: [art] SIG.S = 585888D3691E32C24F5C2E1FDB1DE7079A9362DC0F4A65E42270BD7941E026EEE17649DB88FA86937D63DFB6C43BE379
2,989,316 UART: Caliptra RT
2,989,662 UART: [state] CFI Enabled
3,096,198 UART: [rt] RT listening for mailbox commands...
3,096,868 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,457 UART: [rt]cmd =0x44504543, len=28
3,177,517 >>> mbox cmd response data (2076 bytes)
3,177,518 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,206,999 UART: [rt]cmd =0x44504543, len=28
3,255,987 >>> mbox cmd response data (2076 bytes)
3,255,988 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,621 UART: [rt]cmd =0x49444550, len=354
3,300,797 >>> mbox cmd response data (8 bytes)
3,300,798 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,215 UART: [rt]cmd =0x44504543, len=28
3,381,615 >>> mbox cmd response data (2076 bytes)
3,381,616 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,103 UART: [rt]cmd =0x44504543, len=28
3,460,461 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
192,518 UART:
192,896 UART: Running Caliptra ROM ...
194,078 UART:
194,228 UART: [state] CFI Enabled
266,318 UART: [state] LifecycleState = Unprovisioned
268,242 UART: [state] DebugLocked = No
270,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,357 UART: [kat] SHA2-256
445,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,586 UART: [kat] ++
456,084 UART: [kat] sha1
467,738 UART: [kat] SHA2-256
470,399 UART: [kat] SHA2-384
476,772 UART: [kat] SHA2-512-ACC
479,109 UART: [kat] ECC-384
2,765,767 UART: [kat] HMAC-384Kdf
2,778,858 UART: [kat] LMS
3,969,154 UART: [kat] --
3,972,481 UART: [cold-reset] ++
3,974,908 UART: [fht] Storing FHT @ 0x50003400
3,985,881 UART: [idev] ++
3,986,515 UART: [idev] CDI.KEYID = 6
3,987,423 UART: [idev] SUBJECT.KEYID = 7
3,988,658 UART: [idev] UDS.KEYID = 0
3,989,724 ready_for_fw is high
3,989,937 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,101 UART: [idev] Erasing UDS.KEYID = 0
7,337,640 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,149 UART: [idev] --
7,361,840 UART: [ldev] ++
7,362,422 UART: [ldev] CDI.KEYID = 6
7,363,383 UART: [ldev] SUBJECT.KEYID = 5
7,364,590 UART: [ldev] AUTHORITY.KEYID = 7
7,365,815 UART: [ldev] FE.KEYID = 1
7,413,720 UART: [ldev] Erasing FE.KEYID = 1
10,744,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,696 UART: [ldev] --
13,107,002 UART: [fwproc] Waiting for Commands...
13,109,499 UART: [fwproc] Received command 0x46574c44
13,111,674 UART: [fwproc] Received Image of size 114036 bytes
17,169,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,521 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,633,378 >>> mbox cmd response: success
17,636,722 UART: [afmc] ++
17,637,324 UART: [afmc] CDI.KEYID = 6
17,638,229 UART: [afmc] SUBJECT.KEYID = 7
17,639,498 UART: [afmc] AUTHORITY.KEYID = 5
20,995,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,301,191 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,303,447 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,836 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,713 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,347,147 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,367,775 UART: [afmc] --
23,371,696 UART: [cold-reset] --
23,374,957 UART: [state] Locking Datavault
23,379,765 UART: [state] Locking PCR0, PCR1 and PCR31
23,381,459 UART: [state] Locking ICCM
23,382,851 UART: [exit] Launching FMC @ 0x40000130
23,391,243 UART:
23,391,470 UART: Running Caliptra FMC ...
23,392,560 UART:
23,392,709 UART: [state] CFI Enabled
23,460,204 UART: [fht] FMC Alias Private Key: 7
25,798,471 UART: [art] Extend RT PCRs Done
25,799,693 UART: [art] Lock RT PCRs Done
25,801,203 UART: [art] Populate DV Done
25,806,777 UART: [fht] FMC Alias Private Key: 7
25,808,310 UART: [art] Derive CDI
25,809,134 UART: [art] Store in in slot 0x4
25,868,338 UART: [art] Derive Key Pair
25,869,375 UART: [art] Store priv key in slot 0x5
29,161,776 UART: [art] Derive Key Pair - Done
29,174,936 UART: [art] Signing Cert with AUTHO
29,176,241 UART: RITY.KEYID = 7
31,464,364 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,869 UART: [art] PUB.X = 8B011B684EC87C4FFF7E8780EC1C543B5B0460F1D9708071F35501671F27AB3B16752CEBCD5AD5A11AF4FB13AB14F04C
31,473,138 UART: [art] PUB.Y = 592B0255A07453E1D365C39D5C25CC10CF827A5DE2EB08C6E7E379B0C3034A415AE0B956E2D96C6D280447E72D4E6EAB
31,480,399 UART: [art] SIG.R = BC9D08B91C8BF09CB5070D8A26DFCB5F6A64FA7C86FA39808BC94E29F176DB57B665232414DF511C414CA87EBE2F12A0
31,487,754 UART: [art] SIG.S = 336607247EA7028C4C89AD2B5F66C234F2EB424C88E1DE32EA7C10759BB96552FC88F3F22D480E59740DA540EFA006EE
32,792,889 UART: Caliptra RT
32,793,592 UART: [state] CFI Enabled
32,954,962 UART: [rt] RT listening for mailbox commands...
32,957,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,987,973 UART: [rt]cmd =0x44504543, len=96
38,760,152 >>> mbox cmd response data (6236 bytes)
38,789,233 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,819,590 UART: [rt]cmd =0x52564348, len=36
38,822,270 >>> mbox cmd response data (8 bytes)
38,822,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,853,147 UART: [rt]cmd =0x44504543, len=96
44,605,231 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
3,787,227 ready_for_fw is high
3,787,619 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,868,591 >>> mbox cmd response: success
23,586,835 UART:
23,587,219 UART: Running Caliptra FMC ...
23,588,375 UART:
23,588,533 UART: [state] CFI Enabled
23,657,245 UART: [fht] FMC Alias Private Key: 7
25,995,561 UART: [art] Extend RT PCRs Done
25,996,786 UART: [art] Lock RT PCRs Done
25,998,461 UART: [art] Populate DV Done
26,004,142 UART: [fht] FMC Alias Private Key: 7
26,005,789 UART: [art] Derive CDI
26,006,601 UART: [art] Store in in slot 0x4
26,066,072 UART: [art] Derive Key Pair
26,067,071 UART: [art] Store priv key in slot 0x5
29,359,972 UART: [art] Derive Key Pair - Done
29,373,348 UART: [art] Signing Cert with AUTHO
29,374,654 UART: RITY.KEYID = 7
31,660,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,505 UART: [art] PUB.X = F14EF80980942F9BD3C06975A72353FE78B36F8C6F41ECE7C370AA0AF7C0C6308D5B10C22ACF248F79BC30578E145D2F
31,669,812 UART: [art] PUB.Y = 99127C4CFA0F27409F784E827BD28F792FE542CB0BD0980B72C4B2645E6DBC8C6C7E31B7FF60A9A9DF4644615ABF65B1
31,677,055 UART: [art] SIG.R = 0129F8629C0C5F3362FFCF770E2A0FE9899DCD238DEEB943482CEEB8F8D7AE948E0316C919182F6628B95DE346EFB75E
31,684,429 UART: [art] SIG.S = 3B81EE595FE725D9E94EB43DD34F1AB482BC0F90942BBF54C993C83A990347B3B4C3628DC296677F8938FD943B9B0787
32,989,442 UART: Caliptra RT
32,990,141 UART: [state] CFI Enabled
33,150,921 UART: [rt] RT listening for mailbox commands...
33,153,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,183,758 UART: [rt]cmd =0x44504543, len=96
38,955,195 >>> mbox cmd response data (6236 bytes)
38,984,247 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,014,418 UART: [rt]cmd =0x52564348, len=36
39,016,907 >>> mbox cmd response data (8 bytes)
39,017,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,047,843 UART: [rt]cmd =0x44504543, len=96
44,820,256 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,324 UART:
192,689 UART: Running Caliptra ROM ...
193,876 UART:
603,733 UART: [state] CFI Enabled
619,814 UART: [state] LifecycleState = Unprovisioned
621,777 UART: [state] DebugLocked = No
623,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,599 UART: [kat] SHA2-256
798,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,893 UART: [kat] ++
809,426 UART: [kat] sha1
819,522 UART: [kat] SHA2-256
822,237 UART: [kat] SHA2-384
826,732 UART: [kat] SHA2-512-ACC
829,096 UART: [kat] ECC-384
3,115,125 UART: [kat] HMAC-384Kdf
3,127,423 UART: [kat] LMS
4,317,528 UART: [kat] --
4,321,255 UART: [cold-reset] ++
4,323,538 UART: [fht] Storing FHT @ 0x50003400
4,334,161 UART: [idev] ++
4,334,750 UART: [idev] CDI.KEYID = 6
4,335,660 UART: [idev] SUBJECT.KEYID = 7
4,336,904 UART: [idev] UDS.KEYID = 0
4,337,939 ready_for_fw is high
4,338,139 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,390 UART: [idev] Erasing UDS.KEYID = 0
7,621,883 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,053 UART: [idev] --
7,647,714 UART: [ldev] ++
7,648,285 UART: [ldev] CDI.KEYID = 6
7,649,244 UART: [ldev] SUBJECT.KEYID = 5
7,650,454 UART: [ldev] AUTHORITY.KEYID = 7
7,651,734 UART: [ldev] FE.KEYID = 1
7,662,783 UART: [ldev] Erasing FE.KEYID = 1
10,952,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,698 UART: [ldev] --
13,314,114 UART: [fwproc] Waiting for Commands...
13,316,742 UART: [fwproc] Received command 0x46574c44
13,318,973 UART: [fwproc] Received Image of size 114036 bytes
17,374,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,838,661 >>> mbox cmd response: success
17,842,624 UART: [afmc] ++
17,843,218 UART: [afmc] CDI.KEYID = 6
17,844,104 UART: [afmc] SUBJECT.KEYID = 7
17,845,377 UART: [afmc] AUTHORITY.KEYID = 5
21,158,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,636 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,016 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,834 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,263 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,666 UART: [afmc] --
23,521,244 UART: [cold-reset] --
23,524,786 UART: [state] Locking Datavault
23,529,492 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,242 UART: [state] Locking ICCM
23,532,819 UART: [exit] Launching FMC @ 0x40000130
23,541,210 UART:
23,541,445 UART: Running Caliptra FMC ...
23,542,546 UART:
23,542,700 UART: [state] CFI Enabled
23,550,906 UART: [fht] FMC Alias Private Key: 7
25,881,652 UART: [art] Extend RT PCRs Done
25,882,873 UART: [art] Lock RT PCRs Done
25,884,789 UART: [art] Populate DV Done
25,890,522 UART: [fht] FMC Alias Private Key: 7
25,892,166 UART: [art] Derive CDI
25,892,899 UART: [art] Store in in slot 0x4
25,935,923 UART: [art] Derive Key Pair
25,936,957 UART: [art] Store priv key in slot 0x5
29,179,340 UART: [art] Derive Key Pair - Done
29,192,253 UART: [art] Signing Cert with AUTHO
29,193,564 UART: RITY.KEYID = 7
31,472,849 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,358 UART: [art] PUB.X = 8B7A4012F8C40DE68A97F890A9669AC7A3706C986D0D46ECF36B57B7EE1C2DB8A5E2882111C3E8805D03C7EC7DB11D9A
31,481,619 UART: [art] PUB.Y = 710BC60394C7104B0585FB7F4964C69489DC44C5B2CB2397C0868934682E5678FBA7A2EDA237AF6F5BE7924F7F8AD9FF
31,488,863 UART: [art] SIG.R = AEF2AF94F7961C38637C7A912B6E1A6EF6F5966A43188530133906A77134E26DE0E7BB6EA4548171342C2AD6BEFF4D7E
31,496,268 UART: [art] SIG.S = DE66468BA4039E7D252B18C8D73308E48F794AD3EC7904795513A58A351C599C2E1263392B0A5CDB06C9788582A25544
32,801,600 UART: Caliptra RT
32,802,303 UART: [state] CFI Enabled
32,920,015 UART: [rt] RT listening for mailbox commands...
32,922,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,953,238 UART: [rt]cmd =0x44504543, len=96
38,633,376 >>> mbox cmd response data (6236 bytes)
38,662,720 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,692,908 UART: [rt]cmd =0x52564348, len=36
38,695,665 >>> mbox cmd response data (8 bytes)
38,696,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,726,778 UART: [rt]cmd =0x44504543, len=96
44,407,232 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,126,298 ready_for_fw is high
4,126,900 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,067,858 >>> mbox cmd response: success
23,707,376 UART:
23,707,775 UART: Running Caliptra FMC ...
23,708,892 UART:
23,709,046 UART: [state] CFI Enabled
23,716,741 UART: [fht] FMC Alias Private Key: 7
26,047,773 UART: [art] Extend RT PCRs Done
26,048,998 UART: [art] Lock RT PCRs Done
26,050,572 UART: [art] Populate DV Done
26,056,114 UART: [fht] FMC Alias Private Key: 7
26,057,655 UART: [art] Derive CDI
26,058,392 UART: [art] Store in in slot 0x4
26,101,092 UART: [art] Derive Key Pair
26,102,094 UART: [art] Store priv key in slot 0x5
29,344,497 UART: [art] Derive Key Pair - Done
29,357,334 UART: [art] Signing Cert with AUTHO
29,358,635 UART: RITY.KEYID = 7
31,638,621 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,128 UART: [art] PUB.X = DA0560AB1A99E7BB17DDB87684311BADD8C9AFF678D540AD5C7605B73C3B5EC4F6FE25D19120C6BE2E7F84E87D9FB018
31,647,396 UART: [art] PUB.Y = 68A9B27367ED5C08BB680E8AF3599C4472DD78C650547F56BA9672A91056584A85F0B699D27FDAA66526F38096217120
31,654,603 UART: [art] SIG.R = 39A0E5B733331F9D0474AA154CFD3A69D00814D5BD952928BE87CACB22F500AB2733FB026C07F8A8E24E64C94BFCB9BC
31,661,966 UART: [art] SIG.S = 9F14D64207C41E57E6BFA7F20314F645CB1DFAF1F61BDE4895560698BE9F60AB8CBD1AA5437585C7A7704BA14918D17E
32,966,963 UART: Caliptra RT
32,967,663 UART: [state] CFI Enabled
33,084,540 UART: [rt] RT listening for mailbox commands...
33,087,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,117,731 UART: [rt]cmd =0x44504543, len=96
38,798,508 >>> mbox cmd response data (6236 bytes)
38,827,554 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,857,573 UART: [rt]cmd =0x52564348, len=36
38,860,526 >>> mbox cmd response data (8 bytes)
38,860,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,891,433 UART: [rt]cmd =0x44504543, len=96
44,572,213 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,598 writing to cptra_bootfsm_go
192,722 UART:
193,090 UART: Running Caliptra ROM ...
194,283 UART:
194,439 UART: [state] CFI Enabled
262,827 UART: [state] LifecycleState = Unprovisioned
264,742 UART: [state] DebugLocked = No
266,495 UART: [state] WD Timer not started. Device not locked for debugging
269,464 UART: [kat] SHA2-256
448,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,162 UART: [kat] ++
460,612 UART: [kat] sha1
471,980 UART: [kat] SHA2-256
475,041 UART: [kat] SHA2-384
481,288 UART: [kat] SHA2-512-ACC
484,230 UART: [kat] ECC-384
2,947,006 UART: [kat] HMAC-384Kdf
2,970,860 UART: [kat] LMS
3,500,300 UART: [kat] --
3,505,663 UART: [cold-reset] ++
3,507,251 UART: [fht] FHT @ 0x50003400
3,518,183 UART: [idev] ++
3,518,790 UART: [idev] CDI.KEYID = 6
3,519,717 UART: [idev] SUBJECT.KEYID = 7
3,520,824 UART: [idev] UDS.KEYID = 0
3,521,879 ready_for_fw is high
3,522,117 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,829 UART: [idev] Erasing UDS.KEYID = 0
6,025,501 UART: [idev] Sha1 KeyId Algorithm
6,047,657 UART: [idev] --
6,051,553 UART: [ldev] ++
6,052,129 UART: [ldev] CDI.KEYID = 6
6,053,041 UART: [ldev] SUBJECT.KEYID = 5
6,054,204 UART: [ldev] AUTHORITY.KEYID = 7
6,055,486 UART: [ldev] FE.KEYID = 1
6,101,207 UART: [ldev] Erasing FE.KEYID = 1
8,603,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,184 UART: [ldev] --
10,413,237 UART: [fwproc] Wait for Commands...
10,414,901 UART: [fwproc] Recv command 0x46574c44
10,416,949 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,278,665 >>> mbox cmd response: success
14,282,703 UART: [afmc] ++
14,283,302 UART: [afmc] CDI.KEYID = 6
14,284,210 UART: [afmc] SUBJECT.KEYID = 7
14,285,427 UART: [afmc] AUTHORITY.KEYID = 5
16,828,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,578 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,266 UART: [afmc] --
18,626,510 UART: [cold-reset] --
18,629,404 UART: [state] Locking Datavault
18,633,086 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,833 UART: [state] Locking ICCM
18,637,527 UART: [exit] Launching FMC @ 0x40000130
18,645,981 UART:
18,646,224 UART: Running Caliptra FMC ...
18,647,329 UART:
18,647,489 UART: [state] CFI Enabled
18,710,177 UART: [fht] FMC Alias Private Key: 7
20,473,215 UART: [art] Extend RT PCRs Done
20,474,437 UART: [art] Lock RT PCRs Done
20,476,167 UART: [art] Populate DV Done
20,481,794 UART: [fht] FMC Alias Private Key: 7
20,483,408 UART: [art] Derive CDI
20,484,224 UART: [art] Store in in slot 0x4
20,541,909 UART: [art] Derive Key Pair
20,542,909 UART: [art] Store priv key in slot 0x5
23,005,640 UART: [art] Derive Key Pair - Done
23,018,648 UART: [art] Signing Cert with AUTHO
23,019,958 UART: RITY.KEYID = 7
24,731,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,595 UART: [art] PUB.X = DB4BD7BE98DCFA9261FC4119EE2B6511D1972604E64EE71BBF4E1CA6C2EA57E90CEA06DDDF2B0E356A66F4E712F69A60
24,739,858 UART: [art] PUB.Y = A215468B2C02358DA53806F3DDC36A361137D2CEEDC579DEF053326EF44525793D3C494D97BA1D5048A25B3FD7868B56
24,747,110 UART: [art] SIG.R = 409A4661B24D341B718A11CEF6FE2AC849D8718865751EE27DA7B10EB2209C97C0A7C319311023E685E2408BB93E619D
24,754,485 UART: [art] SIG.S = 4F294D758261966E71D6F9096F54EFD3DB2C308FC59856615FC14004445D29F6E7172941B237C60FAC830B466DA0D030
25,733,529 UART: Caliptra RT
25,734,231 UART: [state] CFI Enabled
25,897,670 UART: [rt] RT listening for mailbox commands...
25,900,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,930,608 UART: [rt]cmd =0x44504543, len=96
30,297,513 >>> mbox cmd response data (6236 bytes)
30,326,832 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,357,068 UART: [rt]cmd =0x52564348, len=36
30,359,996 >>> mbox cmd response data (8 bytes)
30,360,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,390,818 UART: [rt]cmd =0x44504543, len=96
34,776,621 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
192,650 UART:
193,031 UART: Running Caliptra ROM ...
194,124 UART:
194,267 UART: [state] CFI Enabled
265,965 UART: [state] LifecycleState = Unprovisioned
268,384 UART: [state] DebugLocked = No
269,992 UART: [state] WD Timer not started. Device not locked for debugging
274,024 UART: [kat] SHA2-256
463,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,713 UART: [kat] ++
475,200 UART: [kat] sha1
485,862 UART: [kat] SHA2-256
488,943 UART: [kat] SHA2-384
494,291 UART: [kat] SHA2-512-ACC
496,870 UART: [kat] ECC-384
2,948,788 UART: [kat] HMAC-384Kdf
2,973,316 UART: [kat] LMS
3,505,076 UART: [kat] --
3,510,136 UART: [cold-reset] ++
3,511,936 UART: [fht] FHT @ 0x50003400
3,523,413 UART: [idev] ++
3,524,123 UART: [idev] CDI.KEYID = 6
3,525,158 UART: [idev] SUBJECT.KEYID = 7
3,526,267 UART: [idev] UDS.KEYID = 0
3,527,194 ready_for_fw is high
3,527,385 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,217 UART: [idev] Erasing UDS.KEYID = 0
6,029,967 UART: [idev] Sha1 KeyId Algorithm
6,051,793 UART: [idev] --
6,056,732 UART: [ldev] ++
6,057,502 UART: [ldev] CDI.KEYID = 6
6,058,430 UART: [ldev] SUBJECT.KEYID = 5
6,059,542 UART: [ldev] AUTHORITY.KEYID = 7
6,060,739 UART: [ldev] FE.KEYID = 1
6,102,337 UART: [ldev] Erasing FE.KEYID = 1
8,606,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,906 UART: [ldev] --
10,419,330 UART: [fwproc] Wait for Commands...
10,422,501 UART: [fwproc] Recv command 0x46574c44
10,424,807 UART: [fwproc] Recv'd Img size: 114360 bytes
13,885,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,623,545 >>> mbox cmd response: success
14,627,155 UART: [afmc] ++
14,627,888 UART: [afmc] CDI.KEYID = 6
14,629,000 UART: [afmc] SUBJECT.KEYID = 7
14,630,555 UART: [afmc] AUTHORITY.KEYID = 5
17,171,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,300 UART: [afmc] --
18,969,741 UART: [cold-reset] --
18,974,147 UART: [state] Locking Datavault
18,980,483 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,628 UART: [state] Locking ICCM
18,984,563 UART: [exit] Launching FMC @ 0x40000130
18,993,194 UART:
18,993,451 UART: Running Caliptra FMC ...
18,994,556 UART:
18,994,717 UART: [state] CFI Enabled
19,053,077 UART: [fht] FMC Alias Private Key: 7
20,817,024 UART: [art] Extend RT PCRs Done
20,818,244 UART: [art] Lock RT PCRs Done
20,819,951 UART: [art] Populate DV Done
20,825,357 UART: [fht] FMC Alias Private Key: 7
20,826,894 UART: [art] Derive CDI
20,827,627 UART: [art] Store in in slot 0x4
20,885,525 UART: [art] Derive Key Pair
20,886,561 UART: [art] Store priv key in slot 0x5
23,349,409 UART: [art] Derive Key Pair - Done
23,362,674 UART: [art] Signing Cert with AUTHO
23,363,978 UART: RITY.KEYID = 7
25,075,912 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,452 UART: [art] PUB.X = E8DC399AB4AA55C6B8FD98337EA248CECD81465D462A871B06295F38760B8C3900FDB6EF514A2E172033F4E2BFB1E336
25,084,692 UART: [art] PUB.Y = 59A064F1D3F1A281ACC9C6E9FDAEF781F8AF9F071E28ED346769D105F13FC915C30015D98B4EC1A65FCC3D802C320112
25,091,914 UART: [art] SIG.R = DDDFE234EDCD37ACE22B8E85585521FF049EBB6D5B6C9876AA71813D62748D6B236B81CE69E776D485B574ECEA3D6DEC
25,099,383 UART: [art] SIG.S = D159B94108952AA060EED4F849D02466D93DE277997EB4913F23BBAE911DC916901CA7F26E8FB738C11BBD5BCDE4A642
26,078,131 UART: Caliptra RT
26,078,822 UART: [state] CFI Enabled
26,243,510 UART: [rt] RT listening for mailbox commands...
26,245,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,276,571 UART: [rt]cmd =0x44504543, len=96
30,644,312 >>> mbox cmd response data (6236 bytes)
30,673,606 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,703,859 UART: [rt]cmd =0x52564348, len=36
30,706,937 >>> mbox cmd response data (8 bytes)
30,707,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,737,945 UART: [rt]cmd =0x44504543, len=96
35,124,667 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,438,793 ready_for_fw is high
3,439,162 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,737,034 >>> mbox cmd response: success
19,024,215 UART:
19,024,621 UART: Running Caliptra FMC ...
19,025,736 UART:
19,025,889 UART: [state] CFI Enabled
19,092,058 UART: [fht] FMC Alias Private Key: 7
20,856,116 UART: [art] Extend RT PCRs Done
20,857,344 UART: [art] Lock RT PCRs Done
20,858,970 UART: [art] Populate DV Done
20,864,319 UART: [fht] FMC Alias Private Key: 7
20,865,924 UART: [art] Derive CDI
20,866,741 UART: [art] Store in in slot 0x4
20,924,643 UART: [art] Derive Key Pair
20,925,642 UART: [art] Store priv key in slot 0x5
23,388,367 UART: [art] Derive Key Pair - Done
23,401,047 UART: [art] Signing Cert with AUTHO
23,402,359 UART: RITY.KEYID = 7
25,113,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,274 UART: [art] PUB.X = 99804D62EC52A08BF63C3CDFC30A43CC7A866D044C84AD945E3FEEB75A08C61519601DA8529669F29223D5C9A5319706
25,122,552 UART: [art] PUB.Y = 89018F83B727EB59EF88E2E2784F15453E2CAD15418507FF56D1743B3ECD305705231512EF4F45C561CC796AFE226983
25,129,783 UART: [art] SIG.R = 8FB7B5DE19CC2997F89C8F5CBC988091364C44291C1BFFBBE100C5DB737099928130C9A67FF309957B730B9AAE1DCBB6
25,137,130 UART: [art] SIG.S = 8811E65DDB3F50D4E6CB8174A9E25BBC74BC63D0285A22FFEC58AE0FC179FB9E81BF87A9B0C8B3C5E64F40417F9DC65D
26,116,360 UART: Caliptra RT
26,117,074 UART: [state] CFI Enabled
26,281,877 UART: [rt] RT listening for mailbox commands...
26,284,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,314,993 UART: [rt]cmd =0x44504543, len=96
30,702,050 >>> mbox cmd response data (6236 bytes)
30,731,120 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,761,443 UART: [rt]cmd =0x52564348, len=36
30,763,937 >>> mbox cmd response data (8 bytes)
30,764,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,794,687 UART: [rt]cmd =0x44504543, len=96
35,181,607 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,493 UART:
192,850 UART: Running Caliptra ROM ...
194,039 UART:
603,540 UART: [state] CFI Enabled
614,806 UART: [state] LifecycleState = Unprovisioned
617,176 UART: [state] DebugLocked = No
619,072 UART: [state] WD Timer not started. Device not locked for debugging
623,885 UART: [kat] SHA2-256
813,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,548 UART: [kat] ++
825,072 UART: [kat] sha1
836,443 UART: [kat] SHA2-256
839,457 UART: [kat] SHA2-384
845,870 UART: [kat] SHA2-512-ACC
848,446 UART: [kat] ECC-384
3,289,892 UART: [kat] HMAC-384Kdf
3,303,049 UART: [kat] LMS
3,834,831 UART: [kat] --
3,839,745 UART: [cold-reset] ++
3,842,100 UART: [fht] FHT @ 0x50003400
3,853,784 UART: [idev] ++
3,854,413 UART: [idev] CDI.KEYID = 6
3,855,460 UART: [idev] SUBJECT.KEYID = 7
3,856,645 UART: [idev] UDS.KEYID = 0
3,857,545 ready_for_fw is high
3,857,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,347 UART: [idev] Erasing UDS.KEYID = 0
6,336,837 UART: [idev] Sha1 KeyId Algorithm
6,358,317 UART: [idev] --
6,363,525 UART: [ldev] ++
6,364,204 UART: [ldev] CDI.KEYID = 6
6,365,084 UART: [ldev] SUBJECT.KEYID = 5
6,366,289 UART: [ldev] AUTHORITY.KEYID = 7
6,367,514 UART: [ldev] FE.KEYID = 1
6,378,729 UART: [ldev] Erasing FE.KEYID = 1
8,855,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,231 UART: [ldev] --
10,644,842 UART: [fwproc] Wait for Commands...
10,646,934 UART: [fwproc] Recv command 0x46574c44
10,649,242 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,834,425 >>> mbox cmd response: success
14,838,165 UART: [afmc] ++
14,838,869 UART: [afmc] CDI.KEYID = 6
14,840,025 UART: [afmc] SUBJECT.KEYID = 7
14,841,558 UART: [afmc] AUTHORITY.KEYID = 5
17,342,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,631 UART: [afmc] --
19,141,136 UART: [cold-reset] --
19,143,862 UART: [state] Locking Datavault
19,149,592 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,782 UART: [state] Locking ICCM
19,153,091 UART: [exit] Launching FMC @ 0x40000130
19,161,756 UART:
19,161,987 UART: Running Caliptra FMC ...
19,163,084 UART:
19,163,239 UART: [state] CFI Enabled
19,171,389 UART: [fht] FMC Alias Private Key: 7
20,928,353 UART: [art] Extend RT PCRs Done
20,929,579 UART: [art] Lock RT PCRs Done
20,931,007 UART: [art] Populate DV Done
20,936,151 UART: [fht] FMC Alias Private Key: 7
20,937,679 UART: [art] Derive CDI
20,938,439 UART: [art] Store in in slot 0x4
20,981,403 UART: [art] Derive Key Pair
20,982,400 UART: [art] Store priv key in slot 0x5
23,409,249 UART: [art] Derive Key Pair - Done
23,422,354 UART: [art] Signing Cert with AUTHO
23,423,653 UART: RITY.KEYID = 7
25,129,249 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,745 UART: [art] PUB.X = A45ED0A7A8A3C304E2420828F28CE90050E14FAD15660197B8CD95104545251E6171A7738F9D955DA5B5BB40B41A437E
25,137,985 UART: [art] PUB.Y = 5F883AB176455C9F26DBCCE4435BF52A23DF48869EA5138CDDBA22947A234057145BA238EC7A1127641223391B5FCD29
25,145,263 UART: [art] SIG.R = 26D0555A8EC7F3EC918CF4EFA1EA279B3E9B706CADF2A38323CBB3E6B826300D0F6BB4B0B1B189750D05FC7AADC241D6
25,152,668 UART: [art] SIG.S = 901F9521CBE38F589487EF3531C1B1402448DBD2AF34BFCB2B8BDDB9770B9DB0D72953C994862B1612DEE272346F40E0
26,132,267 UART: Caliptra RT
26,132,994 UART: [state] CFI Enabled
26,250,707 UART: [rt] RT listening for mailbox commands...
26,252,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,283,556 UART: [rt]cmd =0x44504543, len=96
30,575,746 >>> mbox cmd response data (6236 bytes)
30,604,977 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,635,001 UART: [rt]cmd =0x52564348, len=36
30,637,927 >>> mbox cmd response data (8 bytes)
30,638,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,668,808 UART: [rt]cmd =0x44504543, len=96
34,960,517 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,751,189 ready_for_fw is high
3,751,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,953,586 >>> mbox cmd response: success
19,203,209 UART:
19,203,617 UART: Running Caliptra FMC ...
19,204,816 UART:
19,204,985 UART: [state] CFI Enabled
19,212,876 UART: [fht] FMC Alias Private Key: 7
20,969,772 UART: [art] Extend RT PCRs Done
20,971,005 UART: [art] Lock RT PCRs Done
20,972,858 UART: [art] Populate DV Done
20,978,167 UART: [fht] FMC Alias Private Key: 7
20,979,867 UART: [art] Derive CDI
20,980,679 UART: [art] Store in in slot 0x4
21,023,336 UART: [art] Derive Key Pair
21,024,378 UART: [art] Store priv key in slot 0x5
23,451,186 UART: [art] Derive Key Pair - Done
23,464,133 UART: [art] Signing Cert with AUTHO
23,465,426 UART: RITY.KEYID = 7
25,171,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,740 UART: [art] PUB.X = 0946787270A5A7FB55C6C3819113E78E4229E3CADBD08D9A04314D885E453ED970CD407E314FAFA25D884B91325E6B25
25,180,024 UART: [art] PUB.Y = 4C615A8EC4C6F1967810187581848B19C6518738B796803633227F73F8E079A116E7F5C3C0601E31A457DD50AB35F4A5
25,187,195 UART: [art] SIG.R = 0D265C9E2B807150E0EA11683984680DC99B084F89E367BDD5D26131C209087DA5D9896CD94351D20E288EA551F48C01
25,194,607 UART: [art] SIG.S = 2F7A4EE97A13DBB25085F89226AAE02590030AD74B02E3D10B268F63383B1042EB99B820120ABBD5AAE05FDCEAFCC49F
26,173,753 UART: Caliptra RT
26,174,440 UART: [state] CFI Enabled
26,292,332 UART: [rt] RT listening for mailbox commands...
26,294,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,558 UART: [rt]cmd =0x44504543, len=96
30,617,346 >>> mbox cmd response data (6236 bytes)
30,646,621 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,676,911 UART: [rt]cmd =0x52564348, len=36
30,679,832 >>> mbox cmd response data (8 bytes)
30,680,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,710,683 UART: [rt]cmd =0x44504543, len=96
35,003,256 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,391 UART: [kat] SHA2-256
882,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,437 UART: [kat] ++
886,589 UART: [kat] sha1
890,605 UART: [kat] SHA2-256
892,543 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
903,242 UART: [kat] HMAC-384Kdf
908,066 UART: [kat] LMS
1,476,262 UART: [kat] --
1,477,251 UART: [cold-reset] ++
1,477,811 UART: [fht] Storing FHT @ 0x50003400
1,480,806 UART: [idev] ++
1,480,974 UART: [idev] CDI.KEYID = 6
1,481,334 UART: [idev] SUBJECT.KEYID = 7
1,481,758 UART: [idev] UDS.KEYID = 0
1,482,103 ready_for_fw is high
1,482,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,686 UART: [idev] Erasing UDS.KEYID = 0
1,506,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,904 UART: [idev] --
1,516,031 UART: [ldev] ++
1,516,199 UART: [ldev] CDI.KEYID = 6
1,516,562 UART: [ldev] SUBJECT.KEYID = 5
1,516,988 UART: [ldev] AUTHORITY.KEYID = 7
1,517,451 UART: [ldev] FE.KEYID = 1
1,522,779 UART: [ldev] Erasing FE.KEYID = 1
1,547,882 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,970 UART: [ldev] --
1,587,305 UART: [fwproc] Waiting for Commands...
1,587,986 UART: [fwproc] Received command 0x46574c44
1,588,777 UART: [fwproc] Received Image of size 114360 bytes
2,887,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,582 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,951 >>> mbox cmd response: success
3,081,173 UART: [afmc] ++
3,081,341 UART: [afmc] CDI.KEYID = 6
3,081,703 UART: [afmc] SUBJECT.KEYID = 7
3,082,128 UART: [afmc] AUTHORITY.KEYID = 5
3,117,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,095 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,488 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,178 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,067 UART: [afmc] --
3,161,149 UART: [cold-reset] --
3,161,727 UART: [state] Locking Datavault
3,162,938 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,542 UART: [state] Locking ICCM
3,164,084 UART: [exit] Launching FMC @ 0x40000130
3,169,413 UART:
3,169,429 UART: Running Caliptra FMC ...
3,169,837 UART:
3,169,891 UART: [state] CFI Enabled
3,180,504 UART: [fht] FMC Alias Private Key: 7
3,288,253 UART: [art] Extend RT PCRs Done
3,288,681 UART: [art] Lock RT PCRs Done
3,290,063 UART: [art] Populate DV Done
3,298,318 UART: [fht] FMC Alias Private Key: 7
3,299,268 UART: [art] Derive CDI
3,299,548 UART: [art] Store in in slot 0x4
3,385,575 UART: [art] Derive Key Pair
3,385,935 UART: [art] Store priv key in slot 0x5
3,398,927 UART: [art] Derive Key Pair - Done
3,413,436 UART: [art] Signing Cert with AUTHO
3,413,916 UART: RITY.KEYID = 7
3,429,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,047 UART: [art] PUB.X = EEC1DA20327C17EE9FC86D305D48DF64E54C61FC138B2105E97DE6209A4AE9BDBEEAED61C4601EC20CF99DA5DC703D7B
3,436,837 UART: [art] PUB.Y = B275A504790F3AA9450343BF480703CB40B437C6FAC127923F0B8F2BF50A7DF48E0DB4EA6A3A3EE1FFE452820C67BD9E
3,443,774 UART: [art] SIG.R = 444F69AF4D596473DA0586633E909537E8A40A17795592C96D098C9BB00C2F4F7A9EE5258B69FE664A9B89876A6D98AF
3,450,530 UART: [art] SIG.S = 6361E68C571044811DC092CA9AAAB972521F96C99EFF797DE685CD407E64CCA67438E1541DD288A4AA7F3442EF74DB6F
3,474,525 UART: Caliptra RT
3,474,779 UART: [state] CFI Enabled
3,583,528 UART: [rt] RT listening for mailbox commands...
3,584,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,311 UART: [rt]cmd =0x44504543, len=96
3,801,925 >>> mbox cmd response data (6236 bytes)
3,801,926 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,715 UART: [rt]cmd =0x52564348, len=36
3,834,100 >>> mbox cmd response data (8 bytes)
3,834,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,906 UART: [rt]cmd =0x44504543, len=96
4,052,928 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,335 ready_for_fw is high
1,362,335 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,201 >>> mbox cmd response: success
2,989,369 UART:
2,989,385 UART: Running Caliptra FMC ...
2,989,793 UART:
2,989,847 UART: [state] CFI Enabled
3,000,152 UART: [fht] FMC Alias Private Key: 7
3,108,167 UART: [art] Extend RT PCRs Done
3,108,595 UART: [art] Lock RT PCRs Done
3,110,211 UART: [art] Populate DV Done
3,118,368 UART: [fht] FMC Alias Private Key: 7
3,119,334 UART: [art] Derive CDI
3,119,614 UART: [art] Store in in slot 0x4
3,205,639 UART: [art] Derive Key Pair
3,205,999 UART: [art] Store priv key in slot 0x5
3,218,827 UART: [art] Derive Key Pair - Done
3,233,496 UART: [art] Signing Cert with AUTHO
3,233,976 UART: RITY.KEYID = 7
3,248,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,621 UART: [art] PUB.X = 523F6205E0E5423A2470947DE708E21F65AA599E7C0E2E2A932521E851EACB6DC7A15113CB475B4F5D0E89CE08A5C2C5
3,256,382 UART: [art] PUB.Y = 5A420481F3AE8EA8917F9306E94C2EFBFA60BBF66E99C9858085D9E5BFC2ED845BAA47BF2FDEC7687B801B19DCF6C150
3,263,346 UART: [art] SIG.R = 06907458CADC5A659C8A13015ADA1658D8A405FA3A7334B8683DFE2AA1DA71ADBE5CA0030A89DF6A4E90CD48E41DDF81
3,270,119 UART: [art] SIG.S = EBEA50BA699307C3EF10FFB9876D29DFB742B9A8CA98FC761C877E39BC1537A6C0FD80BD8C144B786CF517A5C8689989
3,293,665 UART: Caliptra RT
3,293,919 UART: [state] CFI Enabled
3,402,359 UART: [rt] RT listening for mailbox commands...
3,403,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,308 UART: [rt]cmd =0x44504543, len=96
3,621,496 >>> mbox cmd response data (6236 bytes)
3,621,497 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,264 UART: [rt]cmd =0x52564348, len=36
3,653,325 >>> mbox cmd response data (8 bytes)
3,653,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,311 UART: [rt]cmd =0x44504543, len=96
3,871,067 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,278 UART: [kat] SHA2-256
882,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,324 UART: [kat] ++
886,476 UART: [kat] sha1
890,674 UART: [kat] SHA2-256
892,612 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,795 UART: [kat] HMAC-384Kdf
907,523 UART: [kat] LMS
1,475,719 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,936 UART: [fht] Storing FHT @ 0x50003400
1,479,829 UART: [idev] ++
1,479,997 UART: [idev] CDI.KEYID = 6
1,480,357 UART: [idev] SUBJECT.KEYID = 7
1,480,781 UART: [idev] UDS.KEYID = 0
1,481,126 ready_for_fw is high
1,481,126 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,639 UART: [idev] Erasing UDS.KEYID = 0
1,505,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,587 UART: [idev] --
1,514,746 UART: [ldev] ++
1,514,914 UART: [ldev] CDI.KEYID = 6
1,515,277 UART: [ldev] SUBJECT.KEYID = 5
1,515,703 UART: [ldev] AUTHORITY.KEYID = 7
1,516,166 UART: [ldev] FE.KEYID = 1
1,521,474 UART: [ldev] Erasing FE.KEYID = 1
1,546,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,917 UART: [ldev] --
1,586,222 UART: [fwproc] Waiting for Commands...
1,586,949 UART: [fwproc] Received command 0x46574c44
1,587,740 UART: [fwproc] Received Image of size 114360 bytes
2,885,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,160 >>> mbox cmd response: success
3,079,230 UART: [afmc] ++
3,079,398 UART: [afmc] CDI.KEYID = 6
3,079,760 UART: [afmc] SUBJECT.KEYID = 7
3,080,185 UART: [afmc] AUTHORITY.KEYID = 5
3,115,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,275 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,965 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,756 UART: [afmc] --
3,158,860 UART: [cold-reset] --
3,159,714 UART: [state] Locking Datavault
3,161,039 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,643 UART: [state] Locking ICCM
3,162,073 UART: [exit] Launching FMC @ 0x40000130
3,167,402 UART:
3,167,418 UART: Running Caliptra FMC ...
3,167,826 UART:
3,167,969 UART: [state] CFI Enabled
3,178,662 UART: [fht] FMC Alias Private Key: 7
3,286,793 UART: [art] Extend RT PCRs Done
3,287,221 UART: [art] Lock RT PCRs Done
3,288,615 UART: [art] Populate DV Done
3,296,554 UART: [fht] FMC Alias Private Key: 7
3,297,622 UART: [art] Derive CDI
3,297,902 UART: [art] Store in in slot 0x4
3,383,689 UART: [art] Derive Key Pair
3,384,049 UART: [art] Store priv key in slot 0x5
3,397,281 UART: [art] Derive Key Pair - Done
3,412,105 UART: [art] Signing Cert with AUTHO
3,412,585 UART: RITY.KEYID = 7
3,427,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,298 UART: [art] PUB.X = 83C8D64CD4CE3C76B9CA5AB2783B537D2FA5DDE7A1B535268038ED411EE02B66274F3336648D082821BEC1AD83211428
3,435,069 UART: [art] PUB.Y = 9836037ED0EB46E7732F641F1027CB1767EA1B4CA48CBCD755DCCA0A9FC0C87BE30D9E90FF9CDFA6C47C4979D0C87374
3,442,028 UART: [art] SIG.R = 4C4CE96D197F0E85FAD9546E0014D7C6BB665D7B8B75FDD5547A96EF7778ED272796163222939BF6D668EE149D4C6AA2
3,448,779 UART: [art] SIG.S = BAC99AF30AAA18271F9EF25AB3AAC8714B090B33A62FC74A52781EFBF81EC7690CCBB78870A555881519D28D112EEF4B
3,472,732 UART: Caliptra RT
3,473,078 UART: [state] CFI Enabled
3,581,396 UART: [rt] RT listening for mailbox commands...
3,582,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,125 UART: [rt]cmd =0x44504543, len=96
3,800,628 >>> mbox cmd response data (6236 bytes)
3,800,629 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,162 UART: [rt]cmd =0x52564348, len=36
3,832,139 >>> mbox cmd response data (8 bytes)
3,832,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,093 UART: [rt]cmd =0x44504543, len=96
4,051,526 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,244 ready_for_fw is high
1,362,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,624 >>> mbox cmd response: success
2,989,356 UART:
2,989,372 UART: Running Caliptra FMC ...
2,989,780 UART:
2,989,923 UART: [state] CFI Enabled
3,000,468 UART: [fht] FMC Alias Private Key: 7
3,108,581 UART: [art] Extend RT PCRs Done
3,109,009 UART: [art] Lock RT PCRs Done
3,110,539 UART: [art] Populate DV Done
3,119,038 UART: [fht] FMC Alias Private Key: 7
3,120,112 UART: [art] Derive CDI
3,120,392 UART: [art] Store in in slot 0x4
3,206,493 UART: [art] Derive Key Pair
3,206,853 UART: [art] Store priv key in slot 0x5
3,220,637 UART: [art] Derive Key Pair - Done
3,235,626 UART: [art] Signing Cert with AUTHO
3,236,106 UART: RITY.KEYID = 7
3,251,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,071 UART: [art] PUB.X = A3A45C0F83840813EAC35B6AE6874B04DBDDDF5ACE527448F59781E50702E1B6FF26EA8FFDC24F85078A3017C3D179BD
3,258,837 UART: [art] PUB.Y = A667DC284689112CBD0AA74BA332D3ED9674291C474DE182681B6887CAAB8AC9F1503C67776F3018510CA475B702A21D
3,265,778 UART: [art] SIG.R = EB11BE73B046ABF4735248BE3E2D0F008BEEB7F0562B63DE76C75212C6B2D867A1A30D53467B66E12BA07D046D2ED4AA
3,272,531 UART: [art] SIG.S = 9A82DA93B6BFA93E0D7FE574DCEC7259EC17E5E4EB15D6278CC2C299AFBA3F72857DA2E93E90616073CF5BE6DCFDE2AE
3,296,521 UART: Caliptra RT
3,296,867 UART: [state] CFI Enabled
3,405,354 UART: [rt] RT listening for mailbox commands...
3,406,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,087 UART: [rt]cmd =0x44504543, len=96
3,625,526 >>> mbox cmd response data (6236 bytes)
3,625,527 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,998 UART: [rt]cmd =0x52564348, len=36
3,657,073 >>> mbox cmd response data (8 bytes)
3,657,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,081 UART: [rt]cmd =0x44504543, len=96
3,875,936 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,413 UART: [kat] SHA2-256
903,353 UART: [kat] SHA2-384
906,134 UART: [kat] SHA2-512-ACC
908,035 UART: [kat] ECC-384
917,826 UART: [kat] HMAC-384Kdf
922,408 UART: [kat] LMS
1,170,736 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,267 UART: [fht] FHT @ 0x50003400
1,174,972 UART: [idev] ++
1,175,140 UART: [idev] CDI.KEYID = 6
1,175,500 UART: [idev] SUBJECT.KEYID = 7
1,175,924 UART: [idev] UDS.KEYID = 0
1,176,269 ready_for_fw is high
1,176,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,278 UART: [idev] Erasing UDS.KEYID = 0
1,201,327 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,619 UART: [ldev] ++
1,210,787 UART: [ldev] CDI.KEYID = 6
1,211,150 UART: [ldev] SUBJECT.KEYID = 5
1,211,576 UART: [ldev] AUTHORITY.KEYID = 7
1,212,039 UART: [ldev] FE.KEYID = 1
1,216,959 UART: [ldev] Erasing FE.KEYID = 1
1,243,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,134 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,834 >>> mbox cmd response: success
2,775,082 UART: [afmc] ++
2,775,250 UART: [afmc] CDI.KEYID = 6
2,775,612 UART: [afmc] SUBJECT.KEYID = 7
2,776,037 UART: [afmc] AUTHORITY.KEYID = 5
2,811,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,999 UART: [afmc] --
2,854,937 UART: [cold-reset] --
2,856,053 UART: [state] Locking Datavault
2,857,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,738 UART: [state] Locking ICCM
2,858,312 UART: [exit] Launching FMC @ 0x40000130
2,863,641 UART:
2,863,657 UART: Running Caliptra FMC ...
2,864,065 UART:
2,864,119 UART: [state] CFI Enabled
2,875,080 UART: [fht] FMC Alias Private Key: 7
2,983,487 UART: [art] Extend RT PCRs Done
2,983,915 UART: [art] Lock RT PCRs Done
2,985,589 UART: [art] Populate DV Done
2,993,806 UART: [fht] FMC Alias Private Key: 7
2,994,884 UART: [art] Derive CDI
2,995,164 UART: [art] Store in in slot 0x4
3,080,815 UART: [art] Derive Key Pair
3,081,175 UART: [art] Store priv key in slot 0x5
3,094,429 UART: [art] Derive Key Pair - Done
3,109,295 UART: [art] Signing Cert with AUTHO
3,109,775 UART: RITY.KEYID = 7
3,124,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,430 UART: [art] PUB.X = FE2443F358E308600CCBF7743804B20036FEF56C6B44170C173EDA987B7023C89A484623144111C349C163113FFDFDF2
3,132,162 UART: [art] PUB.Y = CB61F937A260938048E154A75EA82492D3DD9AE3113235BECAD14B8EE20B49AB1CB17C9003290A7E3113E7A4C21559FE
3,139,109 UART: [art] SIG.R = 07B93172980ED7E50C0D5F9CBA4739F2248A8E5CB08E0B060414B4578F31841EBF09E9F5388ABADB815090AAA7CE18B8
3,145,863 UART: [art] SIG.S = 90DDD0AF529CC7AEFAD0FFFCFACA71C22239AC505A3B0FC6605212C599621077017BB13D162C0A730D5F445E04D74B0C
3,169,422 UART: Caliptra RT
3,169,676 UART: [state] CFI Enabled
3,277,740 UART: [rt] RT listening for mailbox commands...
3,278,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,541 UART: [rt]cmd =0x44504543, len=96
3,496,783 >>> mbox cmd response data (6236 bytes)
3,496,784 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,375 UART: [rt]cmd =0x52564348, len=36
3,528,548 >>> mbox cmd response data (8 bytes)
3,528,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,558 UART: [rt]cmd =0x44504543, len=96
3,746,558 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 ready_for_fw is high
1,060,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,059 >>> mbox cmd response: success
2,687,631 UART:
2,687,647 UART: Running Caliptra FMC ...
2,688,055 UART:
2,688,109 UART: [state] CFI Enabled
2,698,308 UART: [fht] FMC Alias Private Key: 7
2,805,423 UART: [art] Extend RT PCRs Done
2,805,851 UART: [art] Lock RT PCRs Done
2,807,389 UART: [art] Populate DV Done
2,815,622 UART: [fht] FMC Alias Private Key: 7
2,816,762 UART: [art] Derive CDI
2,817,042 UART: [art] Store in in slot 0x4
2,902,187 UART: [art] Derive Key Pair
2,902,547 UART: [art] Store priv key in slot 0x5
2,915,637 UART: [art] Derive Key Pair - Done
2,930,281 UART: [art] Signing Cert with AUTHO
2,930,761 UART: RITY.KEYID = 7
2,945,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,268 UART: [art] PUB.X = 98D2416F95AC9A4B10B7500D4453ED23117332810333264C824430C84F5A316F71A2812E9A343F574D1076E81BC7441D
2,953,018 UART: [art] PUB.Y = AB5EA5E4474E96A3F661FA6939A27DD8478F90F45C7F0579F88498846F7188C471F8CDC1C5AB6984AC82152CDFB46671
2,959,969 UART: [art] SIG.R = E481460CC083944337E9CF57197C9E9DEA7E492C7798E5E1CBE1FBD23D2E675A76562967D2C6B4EECDFD88B6DAD7FD81
2,966,752 UART: [art] SIG.S = 9AB98C7674ABB1C78C3CBD3458CE7B59AB21439C1B5091DD42FB8487BED0BB4699B791A015F47029242871D06E4CFEE1
2,990,933 UART: Caliptra RT
2,991,187 UART: [state] CFI Enabled
3,098,058 UART: [rt] RT listening for mailbox commands...
3,098,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,777 UART: [rt]cmd =0x44504543, len=96
3,318,035 >>> mbox cmd response data (6236 bytes)
3,318,036 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,573 UART: [rt]cmd =0x52564348, len=36
3,349,754 >>> mbox cmd response data (8 bytes)
3,349,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,876 UART: [rt]cmd =0x44504543, len=96
3,568,386 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
893,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,038 UART: [kat] ++
898,190 UART: [kat] sha1
902,460 UART: [kat] SHA2-256
904,400 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,581 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,520 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 ready_for_fw is high
1,176,802 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,521 UART: [idev] Erasing UDS.KEYID = 0
1,201,708 UART: [idev] Sha1 KeyId Algorithm
1,210,138 UART: [idev] --
1,211,296 UART: [ldev] ++
1,211,464 UART: [ldev] CDI.KEYID = 6
1,211,827 UART: [ldev] SUBJECT.KEYID = 5
1,212,253 UART: [ldev] AUTHORITY.KEYID = 7
1,212,716 UART: [ldev] FE.KEYID = 1
1,218,276 UART: [ldev] Erasing FE.KEYID = 1
1,245,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,192 UART: [ldev] --
1,284,617 UART: [fwproc] Wait for Commands...
1,285,389 UART: [fwproc] Recv command 0x46574c44
1,286,117 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,863 >>> mbox cmd response: success
2,777,003 UART: [afmc] ++
2,777,171 UART: [afmc] CDI.KEYID = 6
2,777,533 UART: [afmc] SUBJECT.KEYID = 7
2,777,958 UART: [afmc] AUTHORITY.KEYID = 5
2,813,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,500 UART: [afmc] --
2,857,592 UART: [cold-reset] --
2,858,480 UART: [state] Locking Datavault
2,859,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,181 UART: [state] Locking ICCM
2,860,825 UART: [exit] Launching FMC @ 0x40000130
2,866,154 UART:
2,866,170 UART: Running Caliptra FMC ...
2,866,578 UART:
2,866,721 UART: [state] CFI Enabled
2,877,048 UART: [fht] FMC Alias Private Key: 7
2,984,889 UART: [art] Extend RT PCRs Done
2,985,317 UART: [art] Lock RT PCRs Done
2,986,699 UART: [art] Populate DV Done
2,994,922 UART: [fht] FMC Alias Private Key: 7
2,995,982 UART: [art] Derive CDI
2,996,262 UART: [art] Store in in slot 0x4
3,081,787 UART: [art] Derive Key Pair
3,082,147 UART: [art] Store priv key in slot 0x5
3,095,287 UART: [art] Derive Key Pair - Done
3,109,727 UART: [art] Signing Cert with AUTHO
3,110,207 UART: RITY.KEYID = 7
3,125,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,328 UART: [art] PUB.X = 7C29821078BA777DB0103E8C67003D32947584A63A40BCC242C266ED79009CA21B58FA94DDE79AAA491A5D2AE66BD8CD
3,133,062 UART: [art] PUB.Y = 162EEBD39B1CB1EA4B9698E639BE6642938BA60FAF4F3FFD19F82BA429C1E5E82BC5E3FD617A65A410600CC16F0DD98A
3,140,023 UART: [art] SIG.R = 4D28337C7CB5483CA4477FEEA23F20542897EE9F316439418BF96E9C156678133A45FBE70FE08EDD39247F43239D29DA
3,146,790 UART: [art] SIG.S = E9ED390C506C689F12D84172F84F5C62FDB8FCF98B8ACF623A34CDDDEEF3EE6EB9BF6F25F9263C09B8A4CC335A1675A8
3,170,477 UART: Caliptra RT
3,170,823 UART: [state] CFI Enabled
3,277,777 UART: [rt] RT listening for mailbox commands...
3,278,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,660 UART: [rt]cmd =0x44504543, len=96
3,497,925 >>> mbox cmd response data (6236 bytes)
3,497,926 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,529 UART: [rt]cmd =0x52564348, len=36
3,529,798 >>> mbox cmd response data (8 bytes)
3,529,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,658 UART: [rt]cmd =0x44504543, len=96
3,749,397 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,136 ready_for_fw is high
1,060,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,060 >>> mbox cmd response: success
2,688,112 UART:
2,688,128 UART: Running Caliptra FMC ...
2,688,536 UART:
2,688,679 UART: [state] CFI Enabled
2,699,290 UART: [fht] FMC Alias Private Key: 7
2,807,413 UART: [art] Extend RT PCRs Done
2,807,841 UART: [art] Lock RT PCRs Done
2,809,265 UART: [art] Populate DV Done
2,817,520 UART: [fht] FMC Alias Private Key: 7
2,818,478 UART: [art] Derive CDI
2,818,758 UART: [art] Store in in slot 0x4
2,904,767 UART: [art] Derive Key Pair
2,905,127 UART: [art] Store priv key in slot 0x5
2,918,431 UART: [art] Derive Key Pair - Done
2,933,022 UART: [art] Signing Cert with AUTHO
2,933,502 UART: RITY.KEYID = 7
2,948,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,579 UART: [art] PUB.X = 3A51C725A4713E5E6BA48E22D7C9723772B78E56B8097C44929123AC20CAAB1F7B0A27431D83B5D4538EF35B51F4B75E
2,956,345 UART: [art] PUB.Y = 14E3EA9F38C41AEEBC7EA6B72B7F7EC9E0E2CF0BBA535917EB4E216600A715CA980D1C31D10521C9B3CDE6BACC3F5C55
2,963,290 UART: [art] SIG.R = 62D425FAF915648E6CCCED73DB00D880378F3C7562D76B1B037D7AABAA659E2A987F441A18508B18B751081FA636A23D
2,970,038 UART: [art] SIG.S = 657E851AA8821652E9B0DDE123657E657A123BD9F13ABD4B25FE21EEC350DEC25D9687467D7D37D57C9543DDC5954509
2,993,762 UART: Caliptra RT
2,994,108 UART: [state] CFI Enabled
3,101,690 UART: [rt] RT listening for mailbox commands...
3,102,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,383 UART: [rt]cmd =0x44504543, len=96
3,321,080 >>> mbox cmd response data (6236 bytes)
3,321,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,684 UART: [rt]cmd =0x52564348, len=36
3,352,927 >>> mbox cmd response data (8 bytes)
3,352,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,171 UART: [rt]cmd =0x44504543, len=96
3,573,126 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
921,090 UART: [kat] LMS
1,169,402 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,171,053 UART: [fht] FHT @ 0x50003400
1,173,639 UART: [idev] ++
1,173,807 UART: [idev] CDI.KEYID = 6
1,174,168 UART: [idev] SUBJECT.KEYID = 7
1,174,593 UART: [idev] UDS.KEYID = 0
1,174,939 ready_for_fw is high
1,174,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,617 UART: [idev] Sha1 KeyId Algorithm
1,208,401 UART: [idev] --
1,209,486 UART: [ldev] ++
1,209,654 UART: [ldev] CDI.KEYID = 6
1,210,018 UART: [ldev] SUBJECT.KEYID = 5
1,210,445 UART: [ldev] AUTHORITY.KEYID = 7
1,210,908 UART: [ldev] FE.KEYID = 1
1,216,082 UART: [ldev] Erasing FE.KEYID = 1
1,242,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,220 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,217 UART: [fwproc] Recv command 0x46574c44
1,282,950 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,446 >>> mbox cmd response: success
2,773,677 UART: [afmc] ++
2,773,845 UART: [afmc] CDI.KEYID = 6
2,774,208 UART: [afmc] SUBJECT.KEYID = 7
2,774,634 UART: [afmc] AUTHORITY.KEYID = 5
2,810,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,384 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,715 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,612 UART: [afmc] --
2,853,588 UART: [cold-reset] --
2,854,452 UART: [state] Locking Datavault
2,855,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,057 UART: [state] Locking ICCM
2,856,527 UART: [exit] Launching FMC @ 0x40000130
2,861,856 UART:
2,861,872 UART: Running Caliptra FMC ...
2,862,280 UART:
2,862,334 UART: [state] CFI Enabled
2,872,961 UART: [fht] FMC Alias Private Key: 7
2,980,750 UART: [art] Extend RT PCRs Done
2,981,178 UART: [art] Lock RT PCRs Done
2,982,984 UART: [art] Populate DV Done
2,991,267 UART: [fht] FMC Alias Private Key: 7
2,992,239 UART: [art] Derive CDI
2,992,519 UART: [art] Store in in slot 0x4
3,078,250 UART: [art] Derive Key Pair
3,078,610 UART: [art] Store priv key in slot 0x5
3,092,124 UART: [art] Derive Key Pair - Done
3,107,206 UART: [art] Signing Cert with AUTHO
3,107,686 UART: RITY.KEYID = 7
3,122,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,741 UART: [art] PUB.X = D0BCD0A8B39FCEEFC67D9DBC2D535849B1DE56473779774D2BD746368D2B111F6402A2EDEF3E0C5AF332EDCFAABB70C6
3,130,531 UART: [art] PUB.Y = DF77D78058147B8B91FA68A5D2AF7FADC6D13365EA218693344CF9D11F7B8C27A9CF23D060296F7902252A838FEAB927
3,137,484 UART: [art] SIG.R = C5C513DF30A7402F9E557E3AFE25BC72427F3F504FF70178433CACFD90E7850F94A4DE462D3FE49662E8697C9082F8C9
3,144,254 UART: [art] SIG.S = 7821BF5662A27901E4C9B28BD1CA1CF0DDF6F5F247A4A021FA896868DF866D60461A09D2433086CBC3EDEF341D53F358
3,167,611 UART: Caliptra RT
3,167,865 UART: [state] CFI Enabled
3,275,217 UART: [rt] RT listening for mailbox commands...
3,275,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,174 UART: [rt]cmd =0x44504543, len=96
3,495,738 >>> mbox cmd response data (6236 bytes)
3,495,739 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,390 UART: [rt]cmd =0x52564348, len=36
3,527,305 >>> mbox cmd response data (8 bytes)
3,527,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,301 UART: [rt]cmd =0x44504543, len=96
3,746,059 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,190 ready_for_fw is high
1,057,190 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,974 >>> mbox cmd response: success
2,685,398 UART:
2,685,414 UART: Running Caliptra FMC ...
2,685,822 UART:
2,685,876 UART: [state] CFI Enabled
2,696,287 UART: [fht] FMC Alias Private Key: 7
2,804,178 UART: [art] Extend RT PCRs Done
2,804,606 UART: [art] Lock RT PCRs Done
2,806,134 UART: [art] Populate DV Done
2,814,347 UART: [fht] FMC Alias Private Key: 7
2,815,427 UART: [art] Derive CDI
2,815,707 UART: [art] Store in in slot 0x4
2,901,026 UART: [art] Derive Key Pair
2,901,386 UART: [art] Store priv key in slot 0x5
2,914,608 UART: [art] Derive Key Pair - Done
2,929,298 UART: [art] Signing Cert with AUTHO
2,929,778 UART: RITY.KEYID = 7
2,945,154 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,919 UART: [art] PUB.X = 1B8D5AD6539A0E638CB5582E546AFDC52B9ED17525513D03F67AEA25D95F5E141BC03EE054339CE5BD2E9BFC78160F40
2,952,692 UART: [art] PUB.Y = B7D89C4C0F5B88F036ED95E51FAE32EAFDF83F1C14964CB9B9581A1583D581A140143DD3C5F6912701EE8A292835CA4A
2,959,646 UART: [art] SIG.R = 78B59B2CA68A9D55D4ADDDDCD805FE1FD9CF99925CD5F6254B668A030390618768FFDCB0AC700A34DABD79BC019A3F1D
2,966,423 UART: [art] SIG.S = 3107620DD3AADA539E78C78D913236CF5F32771D121FE575CA304BBEB65399AF30FF0BF41BF56FD0944AC8A353EDDB87
2,990,191 UART: Caliptra RT
2,990,445 UART: [state] CFI Enabled
3,098,043 UART: [rt] RT listening for mailbox commands...
3,098,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,982 UART: [rt]cmd =0x44504543, len=96
3,317,474 >>> mbox cmd response data (6236 bytes)
3,317,475 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,810 UART: [rt]cmd =0x52564348, len=36
3,348,715 >>> mbox cmd response data (8 bytes)
3,348,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,773 UART: [rt]cmd =0x44504543, len=96
3,566,879 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,174,928 ready_for_fw is high
1,174,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,524 UART: [idev] Erasing UDS.KEYID = 0
1,199,834 UART: [idev] Sha1 KeyId Algorithm
1,208,662 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,289 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,305 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,349 >>> mbox cmd response: success
2,772,380 UART: [afmc] ++
2,772,548 UART: [afmc] CDI.KEYID = 6
2,772,911 UART: [afmc] SUBJECT.KEYID = 7
2,773,337 UART: [afmc] AUTHORITY.KEYID = 5
2,808,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,917 UART: [afmc] --
2,851,807 UART: [cold-reset] --
2,852,529 UART: [state] Locking Datavault
2,853,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,326 UART: [state] Locking ICCM
2,854,752 UART: [exit] Launching FMC @ 0x40000130
2,860,081 UART:
2,860,097 UART: Running Caliptra FMC ...
2,860,505 UART:
2,860,648 UART: [state] CFI Enabled
2,871,139 UART: [fht] FMC Alias Private Key: 7
2,979,542 UART: [art] Extend RT PCRs Done
2,979,970 UART: [art] Lock RT PCRs Done
2,981,676 UART: [art] Populate DV Done
2,989,815 UART: [fht] FMC Alias Private Key: 7
2,990,825 UART: [art] Derive CDI
2,991,105 UART: [art] Store in in slot 0x4
3,076,556 UART: [art] Derive Key Pair
3,076,916 UART: [art] Store priv key in slot 0x5
3,090,308 UART: [art] Derive Key Pair - Done
3,104,777 UART: [art] Signing Cert with AUTHO
3,105,257 UART: RITY.KEYID = 7
3,120,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,422 UART: [art] PUB.X = 7D0C2FC8BC8F8A00808B8A0EFD646127D139EFCC3AA990BBCC11026AECDA14B0C43C87C33BE85DB95CBD095588E61A73
3,128,180 UART: [art] PUB.Y = D5027088C27D83FFEE77E24A58AD95298DDA63D92FB171F5B1E8FCDBD26A40AB0CBC78112646B58095F65B6A9784072B
3,135,131 UART: [art] SIG.R = 7A2079C6FF2FE256E9A2AD8DCAEA6117D3A571422C02F8425622BB9E91A5F0373B03468C749C54C2A026A50E4E2EDACA
3,141,904 UART: [art] SIG.S = 8CEFB8ECCB4F5EB7BFA4C3FA96C9A8190704DF333168FC81BD6017BD8591610F797FE08D27CDB5A16FE3EDE316614FFD
3,164,980 UART: Caliptra RT
3,165,326 UART: [state] CFI Enabled
3,272,854 UART: [rt] RT listening for mailbox commands...
3,273,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,931 UART: [rt]cmd =0x44504543, len=96
3,492,649 >>> mbox cmd response data (6236 bytes)
3,492,650 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,351 UART: [rt]cmd =0x52564348, len=36
3,524,508 >>> mbox cmd response data (8 bytes)
3,524,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,420 UART: [rt]cmd =0x44504543, len=96
3,743,340 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,543 ready_for_fw is high
1,056,543 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,703 >>> mbox cmd response: success
2,683,561 UART:
2,683,577 UART: Running Caliptra FMC ...
2,683,985 UART:
2,684,128 UART: [state] CFI Enabled
2,694,533 UART: [fht] FMC Alias Private Key: 7
2,802,768 UART: [art] Extend RT PCRs Done
2,803,196 UART: [art] Lock RT PCRs Done
2,804,768 UART: [art] Populate DV Done
2,812,693 UART: [fht] FMC Alias Private Key: 7
2,813,777 UART: [art] Derive CDI
2,814,057 UART: [art] Store in in slot 0x4
2,900,074 UART: [art] Derive Key Pair
2,900,434 UART: [art] Store priv key in slot 0x5
2,914,062 UART: [art] Derive Key Pair - Done
2,929,050 UART: [art] Signing Cert with AUTHO
2,929,530 UART: RITY.KEYID = 7
2,945,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,135 UART: [art] PUB.X = 9E391F4BC8AA6A688D77CE2A419220FA18EEA95BF274EA116A2EDC699FF3F925A49A69457CAA0CBCCBB00AE6812F9641
2,952,919 UART: [art] PUB.Y = 47559273A436680E2C03A12C102CAA06AA2BC2770A42CA2599B5F176DBDB6B6E45F1849C758D8298DCD796A4288A9D01
2,959,856 UART: [art] SIG.R = 63DE8DDE1716B361DBBEE695B50E26485D3B9955808A3892C8ABDED339331EC694562ABFBC803924C9CC81082ACE5B32
2,966,630 UART: [art] SIG.S = 3AE7C4069067E5889078BB6F3B80760C093FE0585700E03B7B1EF437DB9351619D2252F1F307004626E2407A97D1F2A3
2,990,243 UART: Caliptra RT
2,990,589 UART: [state] CFI Enabled
3,099,081 UART: [rt] RT listening for mailbox commands...
3,099,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,702 UART: [rt]cmd =0x44504543, len=96
3,318,558 >>> mbox cmd response data (6236 bytes)
3,318,559 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,038 UART: [rt]cmd =0x52564348, len=36
3,349,967 >>> mbox cmd response data (8 bytes)
3,349,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,013 UART: [rt]cmd =0x44504543, len=96
3,569,721 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,446 UART:
192,838 UART: Running Caliptra ROM ...
194,022 UART:
194,178 UART: [state] CFI Enabled
262,400 UART: [state] LifecycleState = Unprovisioned
264,319 UART: [state] DebugLocked = No
266,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,545 UART: [kat] SHA2-256
441,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,736 UART: [kat] ++
452,206 UART: [kat] sha1
464,745 UART: [kat] SHA2-256
467,442 UART: [kat] SHA2-384
472,715 UART: [kat] SHA2-512-ACC
475,072 UART: [kat] ECC-384
2,767,906 UART: [kat] HMAC-384Kdf
2,780,371 UART: [kat] LMS
3,970,654 UART: [kat] --
3,973,442 UART: [cold-reset] ++
3,975,791 UART: [fht] Storing FHT @ 0x50003400
3,987,188 UART: [idev] ++
3,987,830 UART: [idev] CDI.KEYID = 6
3,988,704 UART: [idev] SUBJECT.KEYID = 7
3,990,010 UART: [idev] UDS.KEYID = 0
3,990,984 ready_for_fw is high
3,991,184 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,765 UART: [idev] Erasing UDS.KEYID = 0
7,326,611 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,257 UART: [idev] --
7,353,845 UART: [ldev] ++
7,354,409 UART: [ldev] CDI.KEYID = 6
7,355,368 UART: [ldev] SUBJECT.KEYID = 5
7,356,595 UART: [ldev] AUTHORITY.KEYID = 7
7,357,826 UART: [ldev] FE.KEYID = 1
7,403,849 UART: [ldev] Erasing FE.KEYID = 1
10,739,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,307 UART: [ldev] --
13,115,802 UART: [fwproc] Waiting for Commands...
13,118,486 UART: [fwproc] Received command 0x46574c44
13,120,665 UART: [fwproc] Received Image of size 114036 bytes
17,171,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,634,480 >>> mbox cmd response: success
17,637,971 UART: [afmc] ++
17,638,596 UART: [afmc] CDI.KEYID = 6
17,639,479 UART: [afmc] SUBJECT.KEYID = 7
17,640,690 UART: [afmc] AUTHORITY.KEYID = 5
21,006,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,029 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,436 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,256 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,683 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,686 UART: [afmc] --
23,380,706 UART: [cold-reset] --
23,384,881 UART: [state] Locking Datavault
23,390,134 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,926 UART: [state] Locking ICCM
23,393,025 UART: [exit] Launching FMC @ 0x40000130
23,401,439 UART:
23,401,669 UART: Running Caliptra FMC ...
23,402,763 UART:
23,402,912 UART: [state] CFI Enabled
23,469,589 UART: [fht] FMC Alias Private Key: 7
25,807,744 UART: [art] Extend RT PCRs Done
25,808,966 UART: [art] Lock RT PCRs Done
25,810,559 UART: [art] Populate DV Done
25,816,019 UART: [fht] FMC Alias Private Key: 7
25,817,726 UART: [art] Derive CDI
25,818,535 UART: [art] Store in in slot 0x4
25,878,986 UART: [art] Derive Key Pair
25,880,025 UART: [art] Store priv key in slot 0x5
29,173,175 UART: [art] Derive Key Pair - Done
29,186,113 UART: [art] Signing Cert with AUTHO
29,187,408 UART: RITY.KEYID = 7
31,473,918 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,427 UART: [art] PUB.X = A3479095AC52AB733E593D7B3AB666467EF70D172F1A04810461BC884E7E82363A9C9F3FB19D7AB117239181171FCD97
31,482,649 UART: [art] PUB.Y = 40680472BE81889AF548A63739FB6D0272CD62FEF3C3A42DB83B1A7AD72179890941D3B258A980B36222C10FD6CF0755
31,489,903 UART: [art] SIG.R = 9884DFA54F5B074C6B1F7B2CCDE74D1A5C8C3977CA50A091A43E597F56ABDA5E721460B50E540EBE019D2C4832D996DF
31,497,265 UART: [art] SIG.S = 85D89DB1FB77FE59BACB58FB0E588638A473DDEEE11CF4510D8D3B205AC6552FFA9DF3D2A8E262251A07A2C3C1484BE1
32,801,941 UART: Caliptra RT
32,802,648 UART: [state] CFI Enabled
32,965,548 UART: [rt] RT listening for mailbox commands...
32,967,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,997,969 UART: [rt]cmd =0x44504543, len=96
38,748,269 >>> mbox cmd response data (6236 bytes)
38,777,384 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,807,333 UART: [rt]cmd =0x52564348, len=36
38,809,926 >>> mbox cmd response data (8 bytes)
38,810,349 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,840,615 UART: [rt]cmd =0x52564348, len=36
38,842,373 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,803,689 ready_for_fw is high
3,804,107 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,877,678 >>> mbox cmd response: success
23,568,631 UART:
23,569,061 UART: Running Caliptra FMC ...
23,570,164 UART:
23,570,308 UART: [state] CFI Enabled
23,636,306 UART: [fht] FMC Alias Private Key: 7
25,974,775 UART: [art] Extend RT PCRs Done
25,976,001 UART: [art] Lock RT PCRs Done
25,977,637 UART: [art] Populate DV Done
25,983,216 UART: [fht] FMC Alias Private Key: 7
25,984,760 UART: [art] Derive CDI
25,985,571 UART: [art] Store in in slot 0x4
26,044,814 UART: [art] Derive Key Pair
26,045,832 UART: [art] Store priv key in slot 0x5
29,338,615 UART: [art] Derive Key Pair - Done
29,351,506 UART: [art] Signing Cert with AUTHO
29,352,806 UART: RITY.KEYID = 7
31,639,937 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,447 UART: [art] PUB.X = 59AB1B7A70ABADFCC036465360370AA8D4C7AE445D3C27152D1B118F0463D32D0318D4FD2EB4950A6A1672A1D50D787A
31,648,750 UART: [art] PUB.Y = 6B37BAC3C92BCD6035C1210DAF3ABB151B7334A75881E3FDCA39C3C6B27F7B354CCF4E30CF7033E8143F424CB9AE33D7
31,655,946 UART: [art] SIG.R = 5D19B464E44EFB62A6133CD789DB0F2051BB64E35ABC4BFA020A7C0D66A5F6964B26F9367C050D8B218F098E2A86B66C
31,663,360 UART: [art] SIG.S = CBAAE987661214CFB8FDE6FB430AB030611108F62E646EDEAB0562F58A2687D9C9558FD6D4C59D707B23FA378EB26378
32,968,341 UART: Caliptra RT
32,969,062 UART: [state] CFI Enabled
33,128,946 UART: [rt] RT listening for mailbox commands...
33,130,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,161,647 UART: [rt]cmd =0x44504543, len=96
38,933,985 >>> mbox cmd response data (6236 bytes)
38,963,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,993,531 UART: [rt]cmd =0x52564348, len=36
38,996,127 >>> mbox cmd response data (8 bytes)
38,996,533 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,026,509 UART: [rt]cmd =0x52564348, len=36
39,028,359 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,491 UART:
192,866 UART: Running Caliptra ROM ...
194,050 UART:
603,674 UART: [state] CFI Enabled
616,421 UART: [state] LifecycleState = Unprovisioned
618,339 UART: [state] DebugLocked = No
620,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,691 UART: [kat] SHA2-256
794,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,949 UART: [kat] ++
805,396 UART: [kat] sha1
816,551 UART: [kat] SHA2-256
819,270 UART: [kat] SHA2-384
824,686 UART: [kat] SHA2-512-ACC
827,050 UART: [kat] ECC-384
3,111,069 UART: [kat] HMAC-384Kdf
3,123,097 UART: [kat] LMS
4,313,176 UART: [kat] --
4,317,396 UART: [cold-reset] ++
4,319,041 UART: [fht] Storing FHT @ 0x50003400
4,332,296 UART: [idev] ++
4,332,860 UART: [idev] CDI.KEYID = 6
4,333,841 UART: [idev] SUBJECT.KEYID = 7
4,335,031 UART: [idev] UDS.KEYID = 0
4,336,077 ready_for_fw is high
4,336,299 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,573 UART: [idev] Erasing UDS.KEYID = 0
7,623,059 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,010 UART: [idev] --
7,648,543 UART: [ldev] ++
7,649,109 UART: [ldev] CDI.KEYID = 6
7,650,069 UART: [ldev] SUBJECT.KEYID = 5
7,651,484 UART: [ldev] AUTHORITY.KEYID = 7
7,652,675 UART: [ldev] FE.KEYID = 1
7,664,187 UART: [ldev] Erasing FE.KEYID = 1
10,952,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,533 UART: [ldev] --
13,311,257 UART: [fwproc] Waiting for Commands...
13,314,478 UART: [fwproc] Received command 0x46574c44
13,316,651 UART: [fwproc] Received Image of size 114036 bytes
17,375,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,692 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,573 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,835,315 >>> mbox cmd response: success
17,840,078 UART: [afmc] ++
17,840,704 UART: [afmc] CDI.KEYID = 6
17,841,616 UART: [afmc] SUBJECT.KEYID = 7
17,842,833 UART: [afmc] AUTHORITY.KEYID = 5
21,159,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,928 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,179 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,583 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,386 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,858 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,742 UART: [afmc] --
23,524,368 UART: [cold-reset] --
23,528,986 UART: [state] Locking Datavault
23,534,663 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,414 UART: [state] Locking ICCM
23,537,591 UART: [exit] Launching FMC @ 0x40000130
23,545,935 UART:
23,546,169 UART: Running Caliptra FMC ...
23,547,267 UART:
23,547,445 UART: [state] CFI Enabled
23,555,336 UART: [fht] FMC Alias Private Key: 7
25,885,937 UART: [art] Extend RT PCRs Done
25,887,157 UART: [art] Lock RT PCRs Done
25,889,100 UART: [art] Populate DV Done
25,894,441 UART: [fht] FMC Alias Private Key: 7
25,896,069 UART: [art] Derive CDI
25,896,892 UART: [art] Store in in slot 0x4
25,939,647 UART: [art] Derive Key Pair
25,940,646 UART: [art] Store priv key in slot 0x5
29,182,921 UART: [art] Derive Key Pair - Done
29,195,758 UART: [art] Signing Cert with AUTHO
29,197,058 UART: RITY.KEYID = 7
31,476,535 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,034 UART: [art] PUB.X = BB707FE5639ABEF1D08F3635270DBC108B4A1D78E5E1AFC52DFF57FAD013C9F12BB947B893A2AAC20947F101797A49C6
31,485,293 UART: [art] PUB.Y = F1A952CBDC7E6221E651904F6469050EFEAD63F1B7B956266A5DA476B76E25041E5E2EDEF69C352127CEABDE3052A237
31,492,573 UART: [art] SIG.R = B8B7B41967BDDA024068A307EDFFE7AD9B078E9D5654FD62A582E5816CDAEAB6E274C924DB0CF95383D7F6ECC5421E49
31,499,927 UART: [art] SIG.S = 4E229683C0CB41A6D155CC20697A1D34ADD91C09053A416E27A97CEEFBE06CA3CEE49BBCFCB788EED094A95C3788DB87
32,804,403 UART: Caliptra RT
32,805,118 UART: [state] CFI Enabled
32,922,256 UART: [rt] RT listening for mailbox commands...
32,924,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,954,841 UART: [rt]cmd =0x44504543, len=96
38,634,706 >>> mbox cmd response data (6236 bytes)
38,663,839 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,693,929 UART: [rt]cmd =0x52564348, len=36
38,696,666 >>> mbox cmd response data (8 bytes)
38,697,093 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,727,114 UART: [rt]cmd =0x52564348, len=36
38,729,135 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
4,133,886 ready_for_fw is high
4,134,314 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,074,035 >>> mbox cmd response: success
23,711,919 UART:
23,712,321 UART: Running Caliptra FMC ...
23,713,458 UART:
23,713,618 UART: [state] CFI Enabled
23,721,301 UART: [fht] FMC Alias Private Key: 7
26,052,075 UART: [art] Extend RT PCRs Done
26,053,302 UART: [art] Lock RT PCRs Done
26,055,013 UART: [art] Populate DV Done
26,060,543 UART: [fht] FMC Alias Private Key: 7
26,062,091 UART: [art] Derive CDI
26,062,911 UART: [art] Store in in slot 0x4
26,105,676 UART: [art] Derive Key Pair
26,106,717 UART: [art] Store priv key in slot 0x5
29,348,748 UART: [art] Derive Key Pair - Done
29,361,698 UART: [art] Signing Cert with AUTHO
29,363,042 UART: RITY.KEYID = 7
31,642,739 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,246 UART: [art] PUB.X = F7294CEA5C6763FDEF41E0953FA466C2AA94278300E53F054986B545AC7279F60DDA0FB7561B37A76740CA7B11A421D4
31,651,472 UART: [art] PUB.Y = CEDBFA7D6EA2AEED30C431604F57FEB244EB4C3D5ED72B08597ACB303B37DB2AC141C987A29A0714833B5A42DA5F47EC
31,658,783 UART: [art] SIG.R = D575AFBB05CEC0E7312DD6BC7F822104156697E4924A38BEBBBCA6C68556EABA3FEEB1ABDB4806B83CB1A318AAC8E4EF
31,666,200 UART: [art] SIG.S = BB67BC4E21FD6CED044E0A645467BCB652D56B2C6E272595E43041A00AFAF10BA82C27B6CB681013D22CFE9B35F45FE7
32,971,055 UART: Caliptra RT
32,971,768 UART: [state] CFI Enabled
33,089,257 UART: [rt] RT listening for mailbox commands...
33,091,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,121,702 UART: [rt]cmd =0x44504543, len=96
38,801,075 >>> mbox cmd response data (6236 bytes)
38,830,409 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,860,517 UART: [rt]cmd =0x52564348, len=36
38,862,832 >>> mbox cmd response data (8 bytes)
38,863,246 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,893,406 UART: [rt]cmd =0x52564348, len=36
38,895,144 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,568 UART:
192,940 UART: Running Caliptra ROM ...
194,076 UART:
194,228 UART: [state] CFI Enabled
264,461 UART: [state] LifecycleState = Unprovisioned
266,377 UART: [state] DebugLocked = No
268,840 UART: [state] WD Timer not started. Device not locked for debugging
272,303 UART: [kat] SHA2-256
451,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,957 UART: [kat] ++
463,501 UART: [kat] sha1
474,666 UART: [kat] SHA2-256
477,670 UART: [kat] SHA2-384
483,806 UART: [kat] SHA2-512-ACC
486,741 UART: [kat] ECC-384
2,948,569 UART: [kat] HMAC-384Kdf
2,972,171 UART: [kat] LMS
3,501,689 UART: [kat] --
3,506,508 UART: [cold-reset] ++
3,508,732 UART: [fht] FHT @ 0x50003400
3,520,427 UART: [idev] ++
3,520,991 UART: [idev] CDI.KEYID = 6
3,521,876 UART: [idev] SUBJECT.KEYID = 7
3,523,119 UART: [idev] UDS.KEYID = 0
3,524,018 ready_for_fw is high
3,524,235 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,598 UART: [idev] Erasing UDS.KEYID = 0
6,025,403 UART: [idev] Sha1 KeyId Algorithm
6,047,818 UART: [idev] --
6,052,601 UART: [ldev] ++
6,053,180 UART: [ldev] CDI.KEYID = 6
6,054,107 UART: [ldev] SUBJECT.KEYID = 5
6,055,267 UART: [ldev] AUTHORITY.KEYID = 7
6,056,522 UART: [ldev] FE.KEYID = 1
6,103,010 UART: [ldev] Erasing FE.KEYID = 1
8,607,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,055 UART: [ldev] --
10,414,458 UART: [fwproc] Wait for Commands...
10,415,964 UART: [fwproc] Recv command 0x46574c44
10,418,055 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,887 >>> mbox cmd response: success
14,288,196 UART: [afmc] ++
14,288,838 UART: [afmc] CDI.KEYID = 6
14,289,763 UART: [afmc] SUBJECT.KEYID = 7
14,290,805 UART: [afmc] AUTHORITY.KEYID = 5
16,829,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,425 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,378 UART: [afmc] --
18,629,328 UART: [cold-reset] --
18,634,213 UART: [state] Locking Datavault
18,640,483 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,128 UART: [state] Locking ICCM
18,644,792 UART: [exit] Launching FMC @ 0x40000130
18,653,181 UART:
18,653,439 UART: Running Caliptra FMC ...
18,654,545 UART:
18,654,702 UART: [state] CFI Enabled
18,712,364 UART: [fht] FMC Alias Private Key: 7
20,476,270 UART: [art] Extend RT PCRs Done
20,477,488 UART: [art] Lock RT PCRs Done
20,478,865 UART: [art] Populate DV Done
20,484,170 UART: [fht] FMC Alias Private Key: 7
20,485,709 UART: [art] Derive CDI
20,486,524 UART: [art] Store in in slot 0x4
20,545,833 UART: [art] Derive Key Pair
20,546,880 UART: [art] Store priv key in slot 0x5
23,009,983 UART: [art] Derive Key Pair - Done
23,022,874 UART: [art] Signing Cert with AUTHO
23,024,176 UART: RITY.KEYID = 7
24,735,663 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,183 UART: [art] PUB.X = 7B1806F72B20A3DEA0C155D39CA17CB6E4A1D208D6AB434D3DA852DCDC358D050EE310E73F3A652577837B10CEA02B79
24,744,456 UART: [art] PUB.Y = 9C89A732B82A4A90ED8D134DFEF3649CE718A8C6070566E8C80C6D4580D45A0E8208B7A28981DA55592D2D6B95325AE0
24,751,719 UART: [art] SIG.R = 5C23139D0B56102A408CE6EA986087A86922C22DDBFE8CDF521E5DDCE37BBF44C9EFD1FFA3ED8CCBB970C6CD73E99379
24,759,442 UART: [art] SIG.S = CA32684C387317FB6E9C240C57FD8C7C90BD9772B1888F6FC55E7ABBD83D613D41F42F8C5FCC20AAEC1768992697F3A4
25,738,269 UART: Caliptra RT
25,738,964 UART: [state] CFI Enabled
25,901,818 UART: [rt] RT listening for mailbox commands...
25,903,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,934,446 UART: [rt]cmd =0x44504543, len=96
30,300,626 >>> mbox cmd response data (6236 bytes)
30,329,759 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,359,949 UART: [rt]cmd =0x52564348, len=36
30,362,635 >>> mbox cmd response data (8 bytes)
30,363,088 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,393,272 UART: [rt]cmd =0x52564348, len=36
30,395,136 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,499 UART:
192,879 UART: Running Caliptra ROM ...
193,987 UART:
194,126 UART: [state] CFI Enabled
263,631 UART: [state] LifecycleState = Unprovisioned
266,022 UART: [state] DebugLocked = No
267,273 UART: [state] WD Timer not started. Device not locked for debugging
271,316 UART: [kat] SHA2-256
461,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,023 UART: [kat] ++
472,475 UART: [kat] sha1
483,842 UART: [kat] SHA2-256
486,868 UART: [kat] SHA2-384
493,361 UART: [kat] SHA2-512-ACC
495,952 UART: [kat] ECC-384
2,948,808 UART: [kat] HMAC-384Kdf
2,971,424 UART: [kat] LMS
3,503,164 UART: [kat] --
3,509,214 UART: [cold-reset] ++
3,511,147 UART: [fht] FHT @ 0x50003400
3,522,129 UART: [idev] ++
3,522,837 UART: [idev] CDI.KEYID = 6
3,523,872 UART: [idev] SUBJECT.KEYID = 7
3,524,977 UART: [idev] UDS.KEYID = 0
3,526,062 ready_for_fw is high
3,526,262 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,101 UART: [idev] Erasing UDS.KEYID = 0
6,047,415 UART: [idev] Sha1 KeyId Algorithm
6,069,532 UART: [idev] --
6,076,016 UART: [ldev] ++
6,076,753 UART: [ldev] CDI.KEYID = 6
6,077,817 UART: [ldev] SUBJECT.KEYID = 5
6,078,925 UART: [ldev] AUTHORITY.KEYID = 7
6,080,109 UART: [ldev] FE.KEYID = 1
6,119,223 UART: [ldev] Erasing FE.KEYID = 1
8,623,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,359,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,950 UART: [ldev] --
10,430,685 UART: [fwproc] Wait for Commands...
10,433,223 UART: [fwproc] Recv command 0x46574c44
10,435,483 UART: [fwproc] Recv'd Img size: 114360 bytes
13,883,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,622,315 >>> mbox cmd response: success
14,625,686 UART: [afmc] ++
14,626,432 UART: [afmc] CDI.KEYID = 6
14,627,634 UART: [afmc] SUBJECT.KEYID = 7
14,629,082 UART: [afmc] AUTHORITY.KEYID = 5
17,166,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,821 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,059 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,295 UART: [afmc] --
18,966,398 UART: [cold-reset] --
18,970,826 UART: [state] Locking Datavault
18,976,091 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,301 UART: [state] Locking ICCM
18,980,022 UART: [exit] Launching FMC @ 0x40000130
18,988,656 UART:
18,988,937 UART: Running Caliptra FMC ...
18,989,967 UART:
18,990,115 UART: [state] CFI Enabled
19,048,042 UART: [fht] FMC Alias Private Key: 7
20,811,809 UART: [art] Extend RT PCRs Done
20,813,030 UART: [art] Lock RT PCRs Done
20,814,845 UART: [art] Populate DV Done
20,820,095 UART: [fht] FMC Alias Private Key: 7
20,821,631 UART: [art] Derive CDI
20,822,361 UART: [art] Store in in slot 0x4
20,880,539 UART: [art] Derive Key Pair
20,881,599 UART: [art] Store priv key in slot 0x5
23,344,451 UART: [art] Derive Key Pair - Done
23,357,620 UART: [art] Signing Cert with AUTHO
23,358,924 UART: RITY.KEYID = 7
25,070,243 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,752 UART: [art] PUB.X = 6799E439CF954B7C0168AEE550E7F172B3E5DD55D4DFE5E4D8A639D3D7BD78134D20AF872C31C86487AEA4F8849ABD1D
25,079,033 UART: [art] PUB.Y = DE62C3EA59475DB08FC0C6EB4DE6302F5219E01384E7AD14F8A72239C56CC3B6470E26A64E6EFF0FBAE2B7AE4A90E78D
25,086,306 UART: [art] SIG.R = 5DE2888E34035BB000BEA4297BCEE473EBE0A2AD9404795BB018A6B68693C1EF6E654F5BDFCCB6DC150CF709B9AF6B86
25,093,694 UART: [art] SIG.S = CBA7679F420A7A2DF09B531AE0D0B780F89EDF1AED204D01ADF248E423965188F62807307DC557D9C916129E661E9C0F
26,072,687 UART: Caliptra RT
26,073,398 UART: [state] CFI Enabled
26,237,216 UART: [rt] RT listening for mailbox commands...
26,239,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,269,654 UART: [rt]cmd =0x44504543, len=96
30,637,325 >>> mbox cmd response data (6236 bytes)
30,666,813 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,696,849 UART: [rt]cmd =0x52564348, len=36
30,699,613 >>> mbox cmd response data (8 bytes)
30,700,061 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,730,248 UART: [rt]cmd =0x52564348, len=36
30,732,115 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,426,973 ready_for_fw is high
3,427,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,751,383 >>> mbox cmd response: success
19,062,326 UART:
19,062,726 UART: Running Caliptra FMC ...
19,063,836 UART:
19,063,995 UART: [state] CFI Enabled
19,129,141 UART: [fht] FMC Alias Private Key: 7
20,892,741 UART: [art] Extend RT PCRs Done
20,893,975 UART: [art] Lock RT PCRs Done
20,895,519 UART: [art] Populate DV Done
20,900,773 UART: [fht] FMC Alias Private Key: 7
20,902,485 UART: [art] Derive CDI
20,903,222 UART: [art] Store in in slot 0x4
20,961,227 UART: [art] Derive Key Pair
20,962,300 UART: [art] Store priv key in slot 0x5
23,425,372 UART: [art] Derive Key Pair - Done
23,438,266 UART: [art] Signing Cert with AUTHO
23,439,577 UART: RITY.KEYID = 7
25,151,657 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,170 UART: [art] PUB.X = F2BA0DEE5C5A2EDA9C609E535DF8C9E3F7119EE86F549B64919BB703E0A09F8C2D2B044B3D6D584746BECFB4748D3FDE
25,160,454 UART: [art] PUB.Y = 329820A89D6941695DB2BB3262EB92D244FFEEF1DF12A037CE30626119D80D54C248C60A964BEAB304D1368D52A1C391
25,167,718 UART: [art] SIG.R = F8A0671B3EA3A7DFF880274433C8ED56F27F5A4058E87413171808039A8DF28375EA440F9E08746435A20FCEA4EAFC63
25,175,107 UART: [art] SIG.S = 214D1F3FB7DC8EEBB3BF677B94292A4CDBE4BED0F6C9D4AD4B211DBAFDD322AC404FC5C69F81E9868D90AE72FAA61A49
26,154,247 UART: Caliptra RT
26,154,942 UART: [state] CFI Enabled
26,319,832 UART: [rt] RT listening for mailbox commands...
26,321,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,352,375 UART: [rt]cmd =0x44504543, len=96
30,719,195 >>> mbox cmd response data (6236 bytes)
30,748,272 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,778,619 UART: [rt]cmd =0x52564348, len=36
30,781,575 >>> mbox cmd response data (8 bytes)
30,782,002 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,812,129 UART: [rt]cmd =0x52564348, len=36
30,814,048 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,448 UART:
192,819 UART: Running Caliptra ROM ...
194,020 UART:
603,694 UART: [state] CFI Enabled
617,514 UART: [state] LifecycleState = Unprovisioned
619,897 UART: [state] DebugLocked = No
621,854 UART: [state] WD Timer not started. Device not locked for debugging
626,521 UART: [kat] SHA2-256
816,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,169 UART: [kat] ++
827,689 UART: [kat] sha1
838,796 UART: [kat] SHA2-256
841,810 UART: [kat] SHA2-384
847,509 UART: [kat] SHA2-512-ACC
850,083 UART: [kat] ECC-384
3,292,685 UART: [kat] HMAC-384Kdf
3,306,430 UART: [kat] LMS
3,838,294 UART: [kat] --
3,845,411 UART: [cold-reset] ++
3,847,906 UART: [fht] FHT @ 0x50003400
3,859,118 UART: [idev] ++
3,859,807 UART: [idev] CDI.KEYID = 6
3,860,697 UART: [idev] SUBJECT.KEYID = 7
3,861,945 UART: [idev] UDS.KEYID = 0
3,862,845 ready_for_fw is high
3,863,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,603 UART: [idev] Erasing UDS.KEYID = 0
6,336,917 UART: [idev] Sha1 KeyId Algorithm
6,359,764 UART: [idev] --
6,365,269 UART: [ldev] ++
6,365,952 UART: [ldev] CDI.KEYID = 6
6,366,875 UART: [ldev] SUBJECT.KEYID = 5
6,368,033 UART: [ldev] AUTHORITY.KEYID = 7
6,369,267 UART: [ldev] FE.KEYID = 1
6,380,774 UART: [ldev] Erasing FE.KEYID = 1
8,858,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,895 UART: [ldev] --
10,648,180 UART: [fwproc] Wait for Commands...
10,649,738 UART: [fwproc] Recv command 0x46574c44
10,651,990 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,430 >>> mbox cmd response: success
14,839,867 UART: [afmc] ++
14,840,609 UART: [afmc] CDI.KEYID = 6
14,841,799 UART: [afmc] SUBJECT.KEYID = 7
14,843,230 UART: [afmc] AUTHORITY.KEYID = 5
17,349,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,359 UART: [afmc] --
19,148,587 UART: [cold-reset] --
19,153,148 UART: [state] Locking Datavault
19,158,450 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,641 UART: [state] Locking ICCM
19,162,735 UART: [exit] Launching FMC @ 0x40000130
19,171,398 UART:
19,171,630 UART: Running Caliptra FMC ...
19,172,727 UART:
19,172,882 UART: [state] CFI Enabled
19,180,872 UART: [fht] FMC Alias Private Key: 7
20,938,606 UART: [art] Extend RT PCRs Done
20,939,825 UART: [art] Lock RT PCRs Done
20,941,614 UART: [art] Populate DV Done
20,946,968 UART: [fht] FMC Alias Private Key: 7
20,948,557 UART: [art] Derive CDI
20,949,367 UART: [art] Store in in slot 0x4
20,991,968 UART: [art] Derive Key Pair
20,993,012 UART: [art] Store priv key in slot 0x5
23,419,977 UART: [art] Derive Key Pair - Done
23,433,145 UART: [art] Signing Cert with AUTHO
23,434,447 UART: RITY.KEYID = 7
25,139,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,399 UART: [art] PUB.X = 86A51B48CC6CB20FD1A6B507C03524EA90DBC7B810FDACC82F5915055763EFFBB93D7D696879EE0520C23E7EFEAC1934
25,148,654 UART: [art] PUB.Y = 41AC3CC3B1E6A75F9F2028CA62277AF4D792784E106CBF0711C51BCFCA64CA363388A8FF10559D90BC5F997F5D70220E
25,155,953 UART: [art] SIG.R = 3CB2643F5C98FC30E74468EAAE9B65326C0BD5A6A85F19C894309690107CA6F997FC663138BD5C6531B26E62D6DC3023
25,163,344 UART: [art] SIG.S = 38D53C309D222C6B9AEFAB49401F0C5E8427DD3D676786A391FB720DF0BE534F43B02D778DA065C3FBA8C02CAD6C8845
26,142,237 UART: Caliptra RT
26,142,934 UART: [state] CFI Enabled
26,260,707 UART: [rt] RT listening for mailbox commands...
26,262,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,013 UART: [rt]cmd =0x44504543, len=96
30,584,233 >>> mbox cmd response data (6236 bytes)
30,613,402 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,643,626 UART: [rt]cmd =0x52564348, len=36
30,646,377 >>> mbox cmd response data (8 bytes)
30,646,814 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,676,965 UART: [rt]cmd =0x52564348, len=36
30,678,600 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,253 writing to cptra_bootfsm_go
3,756,473 ready_for_fw is high
3,757,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,247 >>> mbox cmd response: success
19,204,795 UART:
19,205,206 UART: Running Caliptra FMC ...
19,206,336 UART:
19,206,493 UART: [state] CFI Enabled
19,214,769 UART: [fht] FMC Alias Private Key: 7
20,971,336 UART: [art] Extend RT PCRs Done
20,972,539 UART: [art] Lock RT PCRs Done
20,974,263 UART: [art] Populate DV Done
20,979,406 UART: [fht] FMC Alias Private Key: 7
20,980,952 UART: [art] Derive CDI
20,981,709 UART: [art] Store in in slot 0x4
21,024,053 UART: [art] Derive Key Pair
21,025,061 UART: [art] Store priv key in slot 0x5
23,451,971 UART: [art] Derive Key Pair - Done
23,465,516 UART: [art] Signing Cert with AUTHO
23,466,817 UART: RITY.KEYID = 7
25,172,280 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,776 UART: [art] PUB.X = 80FA60272EFF7C7D8F24F6CBD15BC1A5B8B3A27FB769BD5CD0D09DC8C9CCB4FD1F190527DEEC580B9783E9C3DD899827
25,181,025 UART: [art] PUB.Y = 5FF0B950903A8688EBC9740704251AB0BA3CBF00801BFD11834CB938DA40D10B8CC9F54B0A62C2D84D461AFE67243A1F
25,188,290 UART: [art] SIG.R = EFE51AEF1246723208D2711BACAD662C06863613CBABA33D1B1F569F3EE11BF0520A86C214C3F60E439BB9D832A03E3D
25,195,706 UART: [art] SIG.S = 4718E01056B9572D121DE33FB81B0193C07460CC13412376992CED34BE2622C4B38E6A4AF9D76786DB63A50A95C61BE2
26,174,745 UART: Caliptra RT
26,175,451 UART: [state] CFI Enabled
26,292,941 UART: [rt] RT listening for mailbox commands...
26,294,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,362 UART: [rt]cmd =0x44504543, len=96
30,616,074 >>> mbox cmd response data (6236 bytes)
30,645,402 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,675,746 UART: [rt]cmd =0x52564348, len=36
30,678,670 >>> mbox cmd response data (8 bytes)
30,679,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,708,991 UART: [rt]cmd =0x52564348, len=36
30,710,695 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
85,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,669 UART: [kat] SHA2-256
881,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,715 UART: [kat] ++
885,867 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,872 UART: [kat] SHA2-512-ACC
896,773 UART: [kat] ECC-384
902,754 UART: [kat] HMAC-384Kdf
907,266 UART: [kat] LMS
1,475,462 UART: [kat] --
1,476,533 UART: [cold-reset] ++
1,476,909 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 ready_for_fw is high
1,480,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,770 UART: [idev] Erasing UDS.KEYID = 0
1,504,972 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,767 UART: [ldev] ++
1,514,935 UART: [ldev] CDI.KEYID = 6
1,515,298 UART: [ldev] SUBJECT.KEYID = 5
1,515,724 UART: [ldev] AUTHORITY.KEYID = 7
1,516,187 UART: [ldev] FE.KEYID = 1
1,521,517 UART: [ldev] Erasing FE.KEYID = 1
1,547,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,828 UART: [ldev] --
1,586,323 UART: [fwproc] Waiting for Commands...
1,587,154 UART: [fwproc] Received command 0x46574c44
1,587,945 UART: [fwproc] Received Image of size 114360 bytes
2,885,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,610 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,923 >>> mbox cmd response: success
3,079,019 UART: [afmc] ++
3,079,187 UART: [afmc] CDI.KEYID = 6
3,079,549 UART: [afmc] SUBJECT.KEYID = 7
3,079,974 UART: [afmc] AUTHORITY.KEYID = 5
3,114,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,109 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,722 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,412 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,253 UART: [afmc] --
3,158,253 UART: [cold-reset] --
3,158,943 UART: [state] Locking Datavault
3,160,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,698 UART: [state] Locking ICCM
3,161,168 UART: [exit] Launching FMC @ 0x40000130
3,166,497 UART:
3,166,513 UART: Running Caliptra FMC ...
3,166,921 UART:
3,166,975 UART: [state] CFI Enabled
3,177,370 UART: [fht] FMC Alias Private Key: 7
3,284,637 UART: [art] Extend RT PCRs Done
3,285,065 UART: [art] Lock RT PCRs Done
3,286,553 UART: [art] Populate DV Done
3,294,652 UART: [fht] FMC Alias Private Key: 7
3,295,660 UART: [art] Derive CDI
3,295,940 UART: [art] Store in in slot 0x4
3,381,341 UART: [art] Derive Key Pair
3,381,701 UART: [art] Store priv key in slot 0x5
3,394,835 UART: [art] Derive Key Pair - Done
3,409,409 UART: [art] Signing Cert with AUTHO
3,409,889 UART: RITY.KEYID = 7
3,425,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,330 UART: [art] PUB.X = E20F5FBE58B9D78C524E41432F08E52995733CEF826F4867696CE7BB5E29A4430ED43B18A56EF8F90E991337A6950F65
3,433,085 UART: [art] PUB.Y = 27F92DCA16C9D574A1860580420261378BF1DAECAB67B105B161BA51BFB8236EBDAED26B8D7BE47A23F08438AE02900F
3,440,032 UART: [art] SIG.R = 57849547B2BA78E13A6CF8E47C661C69EA61907F8272BE1EE322E0D0B52DAA5BC501CE2490AFA66D7A66D0FA5FB059A2
3,446,813 UART: [art] SIG.S = 8E7FB9A05A13ECB9CE905455FEEB9A6EF4740A7C7F145AD13F433D49F134B9739311FA3932BED8CF9870F10A40B7F786
3,470,392 UART: Caliptra RT
3,470,646 UART: [state] CFI Enabled
3,579,150 UART: [rt] RT listening for mailbox commands...
3,579,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,915 UART: [rt]cmd =0x44504543, len=96
3,797,452 >>> mbox cmd response data (6236 bytes)
3,797,453 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,896 UART: [rt]cmd =0x52564348, len=36
3,829,037 >>> mbox cmd response data (8 bytes)
3,829,038 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,657 UART: [rt]cmd =0x52564348, len=36
3,860,109 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 ready_for_fw is high
1,362,205 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,325 >>> mbox cmd response: success
2,988,353 UART:
2,988,369 UART: Running Caliptra FMC ...
2,988,777 UART:
2,988,831 UART: [state] CFI Enabled
2,999,454 UART: [fht] FMC Alias Private Key: 7
3,107,369 UART: [art] Extend RT PCRs Done
3,107,797 UART: [art] Lock RT PCRs Done
3,109,369 UART: [art] Populate DV Done
3,117,614 UART: [fht] FMC Alias Private Key: 7
3,118,706 UART: [art] Derive CDI
3,118,986 UART: [art] Store in in slot 0x4
3,204,467 UART: [art] Derive Key Pair
3,204,827 UART: [art] Store priv key in slot 0x5
3,217,597 UART: [art] Derive Key Pair - Done
3,232,873 UART: [art] Signing Cert with AUTHO
3,233,353 UART: RITY.KEYID = 7
3,248,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,202 UART: [art] PUB.X = DE558B8E128A3D08BDDAAF97697999E7DCF377A833971E513EE2EB58CAF389D30DC57EDB75DDEB44689ACD0623CDB22F
3,255,985 UART: [art] PUB.Y = A16A1053CC686890ACBF0CB2F060D3C509B99DED995489418F40598658DD243E20001C019E9748121F34B8B438B0E2C5
3,262,900 UART: [art] SIG.R = 5C78A0858ABBCE039C0582863F5F93A9C66542D52CB3A7E45D126D35904DB8517A129A8A88EEC2278B9EAF0560D9D5D3
3,269,667 UART: [art] SIG.S = B0A7DA1B264071FA3F22FF3931A1626743410AD9EE2B9FA47EC8F219B8CB5E737E827DABE582E878B0B0E8999E0CA1AB
3,293,304 UART: Caliptra RT
3,293,558 UART: [state] CFI Enabled
3,401,822 UART: [rt] RT listening for mailbox commands...
3,402,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,733 UART: [rt]cmd =0x44504543, len=96
3,621,095 >>> mbox cmd response data (6236 bytes)
3,621,096 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,671 UART: [rt]cmd =0x52564348, len=36
3,652,854 >>> mbox cmd response data (8 bytes)
3,652,855 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,628 UART: [rt]cmd =0x52564348, len=36
3,684,024 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Unprovisioned
85,552 UART: [state] DebugLocked = No
86,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,700 UART: [kat] SHA2-256
881,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,746 UART: [kat] ++
885,898 UART: [kat] sha1
890,122 UART: [kat] SHA2-256
892,060 UART: [kat] SHA2-384
894,833 UART: [kat] SHA2-512-ACC
896,734 UART: [kat] ECC-384
902,507 UART: [kat] HMAC-384Kdf
907,319 UART: [kat] LMS
1,475,515 UART: [kat] --
1,476,256 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,397 UART: [idev] ++
1,479,565 UART: [idev] CDI.KEYID = 6
1,479,925 UART: [idev] SUBJECT.KEYID = 7
1,480,349 UART: [idev] UDS.KEYID = 0
1,480,694 ready_for_fw is high
1,480,694 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,277 UART: [idev] Erasing UDS.KEYID = 0
1,505,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,875 UART: [idev] --
1,514,938 UART: [ldev] ++
1,515,106 UART: [ldev] CDI.KEYID = 6
1,515,469 UART: [ldev] SUBJECT.KEYID = 5
1,515,895 UART: [ldev] AUTHORITY.KEYID = 7
1,516,358 UART: [ldev] FE.KEYID = 1
1,521,508 UART: [ldev] Erasing FE.KEYID = 1
1,547,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,053 UART: [ldev] --
1,586,344 UART: [fwproc] Waiting for Commands...
1,586,963 UART: [fwproc] Received command 0x46574c44
1,587,754 UART: [fwproc] Received Image of size 114360 bytes
2,885,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,575 >>> mbox cmd response: success
3,079,793 UART: [afmc] ++
3,079,961 UART: [afmc] CDI.KEYID = 6
3,080,323 UART: [afmc] SUBJECT.KEYID = 7
3,080,748 UART: [afmc] AUTHORITY.KEYID = 5
3,115,543 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,583 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,091 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,976 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,666 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,729 UART: [afmc] --
3,158,813 UART: [cold-reset] --
3,159,467 UART: [state] Locking Datavault
3,160,704 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,308 UART: [state] Locking ICCM
3,161,820 UART: [exit] Launching FMC @ 0x40000130
3,167,149 UART:
3,167,165 UART: Running Caliptra FMC ...
3,167,573 UART:
3,167,716 UART: [state] CFI Enabled
3,178,123 UART: [fht] FMC Alias Private Key: 7
3,286,048 UART: [art] Extend RT PCRs Done
3,286,476 UART: [art] Lock RT PCRs Done
3,288,016 UART: [art] Populate DV Done
3,296,047 UART: [fht] FMC Alias Private Key: 7
3,297,087 UART: [art] Derive CDI
3,297,367 UART: [art] Store in in slot 0x4
3,383,220 UART: [art] Derive Key Pair
3,383,580 UART: [art] Store priv key in slot 0x5
3,397,436 UART: [art] Derive Key Pair - Done
3,412,667 UART: [art] Signing Cert with AUTHO
3,413,147 UART: RITY.KEYID = 7
3,428,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,302 UART: [art] PUB.X = ADE743ED1DB120E2ACA9C95CE597520EC0DD711D3780A1BD29C27DC939A648C8A3CE912ACEFA8D8449A2F55DAF3480A6
3,436,091 UART: [art] PUB.Y = E6A7127EE0A0B58AB43F96FCE6E9D8A5EB7BDFDD0F850247F5B070397F2D8D2F7C726A526129DADC93470681BD01724D
3,443,043 UART: [art] SIG.R = 137D20370C2BF01F6CEAFE0E83814B524003E9B8BAD507B9E4B47DB50874985AC3765D8BC50EC0F0795995FC0B926257
3,449,796 UART: [art] SIG.S = 55CEEBD60B077BC02658918593AD3575444D8C623A8ACBB0A9D806600BD39C2FB5C092E7E8D5D10A6FACE3459F678753
3,473,390 UART: Caliptra RT
3,473,736 UART: [state] CFI Enabled
3,581,357 UART: [rt] RT listening for mailbox commands...
3,582,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,124 UART: [rt]cmd =0x44504543, len=96
3,801,307 >>> mbox cmd response data (6236 bytes)
3,801,308 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,807 UART: [rt]cmd =0x52564348, len=36
3,832,942 >>> mbox cmd response data (8 bytes)
3,832,943 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,688 UART: [rt]cmd =0x52564348, len=36
3,864,134 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,686 >>> mbox cmd response: success
2,988,996 UART:
2,989,012 UART: Running Caliptra FMC ...
2,989,420 UART:
2,989,563 UART: [state] CFI Enabled
3,000,582 UART: [fht] FMC Alias Private Key: 7
3,108,015 UART: [art] Extend RT PCRs Done
3,108,443 UART: [art] Lock RT PCRs Done
3,109,505 UART: [art] Populate DV Done
3,117,714 UART: [fht] FMC Alias Private Key: 7
3,118,798 UART: [art] Derive CDI
3,119,078 UART: [art] Store in in slot 0x4
3,204,871 UART: [art] Derive Key Pair
3,205,231 UART: [art] Store priv key in slot 0x5
3,218,009 UART: [art] Derive Key Pair - Done
3,232,607 UART: [art] Signing Cert with AUTHO
3,233,087 UART: RITY.KEYID = 7
3,248,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,314 UART: [art] PUB.X = 4856845472491031D117300BD52681E0E3CAD03ED90D9B486A1720A7D5013DA967E766D960441C0F1CD2A23154E074CE
3,256,064 UART: [art] PUB.Y = 45F0B254DA7BB0BE2C72038B244577BF17A2AAFF518AD88D73C6CB9F0310659FFF826813CD8060D84DF16338589ED01B
3,263,016 UART: [art] SIG.R = 2D8B4F564944CA2F22D91AC19700DD083B8544E24560C1DD87A7FA4B42F8DAA65D1D86BB84EFB1C0794E9606FC6610AD
3,269,770 UART: [art] SIG.S = 3B85384D504FDA5C1ACCA2AC8D3674B13655C16452557644C3B96D003948D03307D1E59B5D257ED8915BB4966AD0B258
3,293,740 UART: Caliptra RT
3,294,086 UART: [state] CFI Enabled
3,402,271 UART: [rt] RT listening for mailbox commands...
3,402,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,018 UART: [rt]cmd =0x44504543, len=96
3,621,904 >>> mbox cmd response data (6236 bytes)
3,621,905 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,550 UART: [rt]cmd =0x52564348, len=36
3,653,539 >>> mbox cmd response data (8 bytes)
3,653,540 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,185 UART: [rt]cmd =0x52564348, len=36
3,684,605 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
902,017 UART: [kat] SHA2-256
903,957 UART: [kat] SHA2-384
906,802 UART: [kat] SHA2-512-ACC
908,703 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
922,696 UART: [kat] LMS
1,171,024 UART: [kat] --
1,171,893 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,174,898 UART: [idev] ++
1,175,066 UART: [idev] CDI.KEYID = 6
1,175,426 UART: [idev] SUBJECT.KEYID = 7
1,175,850 UART: [idev] UDS.KEYID = 0
1,176,195 ready_for_fw is high
1,176,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,509 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,650 UART: [ldev] SUBJECT.KEYID = 5
1,211,076 UART: [ldev] AUTHORITY.KEYID = 7
1,211,539 UART: [ldev] FE.KEYID = 1
1,216,821 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,970 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,010 >>> mbox cmd response: success
2,774,144 UART: [afmc] ++
2,774,312 UART: [afmc] CDI.KEYID = 6
2,774,674 UART: [afmc] SUBJECT.KEYID = 7
2,775,099 UART: [afmc] AUTHORITY.KEYID = 5
2,810,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,542 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,045 UART: [afmc] --
2,854,015 UART: [cold-reset] --
2,854,907 UART: [state] Locking Datavault
2,856,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,832 UART: [state] Locking ICCM
2,857,504 UART: [exit] Launching FMC @ 0x40000130
2,862,833 UART:
2,862,849 UART: Running Caliptra FMC ...
2,863,257 UART:
2,863,311 UART: [state] CFI Enabled
2,873,884 UART: [fht] FMC Alias Private Key: 7
2,981,591 UART: [art] Extend RT PCRs Done
2,982,019 UART: [art] Lock RT PCRs Done
2,983,375 UART: [art] Populate DV Done
2,991,564 UART: [fht] FMC Alias Private Key: 7
2,992,556 UART: [art] Derive CDI
2,992,836 UART: [art] Store in in slot 0x4
3,078,575 UART: [art] Derive Key Pair
3,078,935 UART: [art] Store priv key in slot 0x5
3,092,907 UART: [art] Derive Key Pair - Done
3,107,677 UART: [art] Signing Cert with AUTHO
3,108,157 UART: RITY.KEYID = 7
3,123,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,890 UART: [art] PUB.X = 443F0A80AE129239888223B243C4FA557AD9C3F2C6E4315C3AF01ABEB02584AF0239D96E8BB8886D89BC6E7AE34AAE7E
3,130,666 UART: [art] PUB.Y = B7EE2843DC442B77AD4C1C4A113FC9BF1F0377965279A1D2829D0AC8891CCF36A4E4CF0ECC7A7941E079DA717CE1B9C1
3,137,623 UART: [art] SIG.R = 3148DA1AC1C5DE4D0E67FA6D3F0AB1B54E14D1A58FDA5EE2728255D88E9B5A8F73493A6E3186FC778EC2F79C5CED2891
3,144,405 UART: [art] SIG.S = E1842BE36348004442816FEBD531B720F1E1B8DFE63F53D71F9386F6FFE8FAE32BD9CC7D20F97AE26F0FD648437F0259
3,168,016 UART: Caliptra RT
3,168,270 UART: [state] CFI Enabled
3,276,554 UART: [rt] RT listening for mailbox commands...
3,277,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,449 UART: [rt]cmd =0x44504543, len=96
3,495,084 >>> mbox cmd response data (6236 bytes)
3,495,085 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,652 UART: [rt]cmd =0x52564348, len=36
3,526,683 >>> mbox cmd response data (8 bytes)
3,526,684 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,199 UART: [rt]cmd =0x52564348, len=36
3,557,327 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 ready_for_fw is high
1,060,161 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,203 >>> mbox cmd response: success
2,687,155 UART:
2,687,171 UART: Running Caliptra FMC ...
2,687,579 UART:
2,687,633 UART: [state] CFI Enabled
2,698,246 UART: [fht] FMC Alias Private Key: 7
2,806,309 UART: [art] Extend RT PCRs Done
2,806,737 UART: [art] Lock RT PCRs Done
2,808,457 UART: [art] Populate DV Done
2,816,668 UART: [fht] FMC Alias Private Key: 7
2,817,748 UART: [art] Derive CDI
2,818,028 UART: [art] Store in in slot 0x4
2,904,049 UART: [art] Derive Key Pair
2,904,409 UART: [art] Store priv key in slot 0x5
2,917,703 UART: [art] Derive Key Pair - Done
2,932,176 UART: [art] Signing Cert with AUTHO
2,932,656 UART: RITY.KEYID = 7
2,947,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,603 UART: [art] PUB.X = B77D773E6A5DBBF250C078F972A4CA361DEB0B642D2871E85A0379E5FF4D8ABA2E7EBF4C2F58A9CCECC021B4BC4C9F33
2,955,393 UART: [art] PUB.Y = 077B4DD8EFD3396265ECD30CBF47EC2EAE6AAB5F5355C7A9FAA0AFDD147E3E3FE314181E6432D026E2EC9B5500D3609E
2,962,337 UART: [art] SIG.R = A574C23A4BDE389AADE6B04B294AC9637278488655DE1BF7DAA334F0F9397B8080FB034F94E616D769D36194CAD58224
2,969,108 UART: [art] SIG.S = 6C51B3BCFAE2BFC4A5C1A2166B72084A22107A84AF84B317CF285790029008D27857F4D15C0BB1C2D6400C867C533203
2,992,461 UART: Caliptra RT
2,992,715 UART: [state] CFI Enabled
3,100,329 UART: [rt] RT listening for mailbox commands...
3,100,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,168 UART: [rt]cmd =0x44504543, len=96
3,320,355 >>> mbox cmd response data (6236 bytes)
3,320,356 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,997 UART: [rt]cmd =0x52564348, len=36
3,352,080 >>> mbox cmd response data (8 bytes)
3,352,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,706 UART: [rt]cmd =0x52564348, len=36
3,383,144 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,197 UART: [kat] SHA2-512-ACC
909,098 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,339 UART: [kat] LMS
1,171,667 UART: [kat] --
1,172,784 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,727 UART: [idev] ++
1,175,895 UART: [idev] CDI.KEYID = 6
1,176,255 UART: [idev] SUBJECT.KEYID = 7
1,176,679 UART: [idev] UDS.KEYID = 0
1,177,024 ready_for_fw is high
1,177,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,935 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,738 UART: [ldev] ++
1,211,906 UART: [ldev] CDI.KEYID = 6
1,212,269 UART: [ldev] SUBJECT.KEYID = 5
1,212,695 UART: [ldev] AUTHORITY.KEYID = 7
1,213,158 UART: [ldev] FE.KEYID = 1
1,218,534 UART: [ldev] Erasing FE.KEYID = 1
1,245,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,144 UART: [ldev] --
1,284,431 UART: [fwproc] Wait for Commands...
1,285,155 UART: [fwproc] Recv command 0x46574c44
1,285,883 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,757 >>> mbox cmd response: success
2,776,997 UART: [afmc] ++
2,777,165 UART: [afmc] CDI.KEYID = 6
2,777,527 UART: [afmc] SUBJECT.KEYID = 7
2,777,952 UART: [afmc] AUTHORITY.KEYID = 5
2,813,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,762 UART: [afmc] --
2,856,852 UART: [cold-reset] --
2,857,702 UART: [state] Locking Datavault
2,858,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,271 UART: [state] Locking ICCM
2,859,691 UART: [exit] Launching FMC @ 0x40000130
2,865,020 UART:
2,865,036 UART: Running Caliptra FMC ...
2,865,444 UART:
2,865,587 UART: [state] CFI Enabled
2,875,994 UART: [fht] FMC Alias Private Key: 7
2,984,131 UART: [art] Extend RT PCRs Done
2,984,559 UART: [art] Lock RT PCRs Done
2,986,175 UART: [art] Populate DV Done
2,994,182 UART: [fht] FMC Alias Private Key: 7
2,995,342 UART: [art] Derive CDI
2,995,622 UART: [art] Store in in slot 0x4
3,081,341 UART: [art] Derive Key Pair
3,081,701 UART: [art] Store priv key in slot 0x5
3,095,005 UART: [art] Derive Key Pair - Done
3,109,602 UART: [art] Signing Cert with AUTHO
3,110,082 UART: RITY.KEYID = 7
3,125,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,315 UART: [art] PUB.X = 14B32211A542E3526D0B3BFE1DFB1D8178926B1307F5961521F1E088D1689DBE61BD14696AF144A6C2869E94160F16F8
3,133,072 UART: [art] PUB.Y = 9FFB68A8676B0FBF5955EC3E7C3DA306F999CEA4C3505FDF608C75A1AB752CC806F03805403208FEC8F1E9ABA251988C
3,140,021 UART: [art] SIG.R = BC9A5856EC36DA09AAD9FC11AFE6FB7D2DAA18EEB2A923165EEF24B617903CB53B66D2CC17D8ED726FE2F6C09B418D1A
3,146,816 UART: [art] SIG.S = 3E0276A539C96F0BCE0D88E8CB17EDCAD00993441EB10045319BD4549AD62ADCBC4697E1063749BBC537B3348351048F
3,170,643 UART: Caliptra RT
3,170,989 UART: [state] CFI Enabled
3,277,963 UART: [rt] RT listening for mailbox commands...
3,278,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,710 UART: [rt]cmd =0x44504543, len=96
3,497,616 >>> mbox cmd response data (6236 bytes)
3,497,617 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,286 UART: [rt]cmd =0x52564348, len=36
3,529,071 >>> mbox cmd response data (8 bytes)
3,529,072 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,731 UART: [rt]cmd =0x52564348, len=36
3,559,983 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,164 ready_for_fw is high
1,060,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,664 >>> mbox cmd response: success
2,688,900 UART:
2,688,916 UART: Running Caliptra FMC ...
2,689,324 UART:
2,689,467 UART: [state] CFI Enabled
2,700,114 UART: [fht] FMC Alias Private Key: 7
2,808,447 UART: [art] Extend RT PCRs Done
2,808,875 UART: [art] Lock RT PCRs Done
2,810,333 UART: [art] Populate DV Done
2,818,708 UART: [fht] FMC Alias Private Key: 7
2,819,866 UART: [art] Derive CDI
2,820,146 UART: [art] Store in in slot 0x4
2,905,373 UART: [art] Derive Key Pair
2,905,733 UART: [art] Store priv key in slot 0x5
2,919,407 UART: [art] Derive Key Pair - Done
2,934,101 UART: [art] Signing Cert with AUTHO
2,934,581 UART: RITY.KEYID = 7
2,949,997 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,762 UART: [art] PUB.X = AEE021D4CB364C694194F07923E4F1B5C4F196EF61721A48722E667767C84C2F0785CC856F260A18B3A319C3B8DF8456
2,957,524 UART: [art] PUB.Y = 92FA7ADD905337D71C970FA77B3F6013A54502B776146FD9165E8119CC37497B17FE9E449888D02FB157B1F09BB2EAD6
2,964,470 UART: [art] SIG.R = EB7243E127AD911B4665E9573D2F07F244F84C4CAD220858B592C2899F83A4E788961C9D256E8380B2364DF022A32186
2,971,226 UART: [art] SIG.S = 7F7BB099D5A5974BDA88194F6A9022496332BDDDC07AB5ACE886A562D0C24EBA9A8ABE91967C9E525469E030F7D2E0FB
2,994,661 UART: Caliptra RT
2,995,007 UART: [state] CFI Enabled
3,103,151 UART: [rt] RT listening for mailbox commands...
3,103,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,854 UART: [rt]cmd =0x44504543, len=96
3,321,622 >>> mbox cmd response data (6236 bytes)
3,321,623 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,408 UART: [rt]cmd =0x52564348, len=36
3,353,573 >>> mbox cmd response data (8 bytes)
3,353,574 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,049 UART: [rt]cmd =0x52564348, len=36
3,384,809 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,174,661 ready_for_fw is high
1,174,661 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,401 UART: [idev] Sha1 KeyId Algorithm
1,208,127 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,198 UART: [ldev] --
1,280,544 UART: [fwproc] Wait for Commands...
1,281,343 UART: [fwproc] Recv command 0x46574c44
1,282,076 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,208 >>> mbox cmd response: success
2,774,303 UART: [afmc] ++
2,774,471 UART: [afmc] CDI.KEYID = 6
2,774,834 UART: [afmc] SUBJECT.KEYID = 7
2,775,260 UART: [afmc] AUTHORITY.KEYID = 5
2,810,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,068 UART: [afmc] --
2,854,038 UART: [cold-reset] --
2,854,872 UART: [state] Locking Datavault
2,856,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,787 UART: [state] Locking ICCM
2,857,383 UART: [exit] Launching FMC @ 0x40000130
2,862,712 UART:
2,862,728 UART: Running Caliptra FMC ...
2,863,136 UART:
2,863,190 UART: [state] CFI Enabled
2,873,767 UART: [fht] FMC Alias Private Key: 7
2,982,208 UART: [art] Extend RT PCRs Done
2,982,636 UART: [art] Lock RT PCRs Done
2,984,142 UART: [art] Populate DV Done
2,992,499 UART: [fht] FMC Alias Private Key: 7
2,993,449 UART: [art] Derive CDI
2,993,729 UART: [art] Store in in slot 0x4
3,079,638 UART: [art] Derive Key Pair
3,079,998 UART: [art] Store priv key in slot 0x5
3,092,578 UART: [art] Derive Key Pair - Done
3,107,620 UART: [art] Signing Cert with AUTHO
3,108,100 UART: RITY.KEYID = 7
3,123,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,855 UART: [art] PUB.X = F8F85F4539AB5CF40E948E83E7D78CC039555A7227A3D41C8B2C1FAAECF6C4802EEB346C10A2108F7C6E34ECC1F0F007
3,130,635 UART: [art] PUB.Y = B93778CF74343D00FD0AC64C6D4CCF8FC3369B6DB1771ADF831E697605229D680A9409D93E5FACF5221F9734F4A00D3E
3,137,556 UART: [art] SIG.R = B4AB956EF5FB770C8BCD119C7B759BF700573A3DD958D08C99791FB24C4116A6266ED6A5CAAE8D86F1EADB9234C35BA0
3,144,319 UART: [art] SIG.S = E5A4EB3C1F1711A57B480A4A19354A4F197E667B4E131858B4F9395D89A538B83074C096F48B1689E7F22DA99D99ED37
3,167,797 UART: Caliptra RT
3,168,051 UART: [state] CFI Enabled
3,275,096 UART: [rt] RT listening for mailbox commands...
3,275,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,759 UART: [rt]cmd =0x44504543, len=96
3,492,986 >>> mbox cmd response data (6236 bytes)
3,492,987 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,480 UART: [rt]cmd =0x52564348, len=36
3,524,905 >>> mbox cmd response data (8 bytes)
3,524,906 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,167 UART: [rt]cmd =0x52564348, len=36
3,555,635 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,216 ready_for_fw is high
1,057,216 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,134 >>> mbox cmd response: success
2,684,966 UART:
2,684,982 UART: Running Caliptra FMC ...
2,685,390 UART:
2,685,444 UART: [state] CFI Enabled
2,696,117 UART: [fht] FMC Alias Private Key: 7
2,803,782 UART: [art] Extend RT PCRs Done
2,804,210 UART: [art] Lock RT PCRs Done
2,805,410 UART: [art] Populate DV Done
2,813,825 UART: [fht] FMC Alias Private Key: 7
2,814,769 UART: [art] Derive CDI
2,815,049 UART: [art] Store in in slot 0x4
2,900,334 UART: [art] Derive Key Pair
2,900,694 UART: [art] Store priv key in slot 0x5
2,914,500 UART: [art] Derive Key Pair - Done
2,929,363 UART: [art] Signing Cert with AUTHO
2,929,843 UART: RITY.KEYID = 7
2,944,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,586 UART: [art] PUB.X = 0C3C23A7858B117C6C3DB3BD1212F935B89A680D04FEAA6816038F29C7938E59800ECD8C88A77E440CAEE53673B24BB1
2,952,344 UART: [art] PUB.Y = DAA0D8DA08B3A82342942002EDD9C5BB50D6F727D1CA3D3B9C67EDBE46C15CCE7FA372684AB6BDA727A6C0FBE225C6D3
2,959,314 UART: [art] SIG.R = 8907F63D4E139BD9960F76376CF9EF44061BD8DB01072AA3E0DBDDEEFF90D26AB218ACE2C8573F8AB762B7B917FB6CF7
2,966,089 UART: [art] SIG.S = 4A37CE22B2C9A7FCE6B1DC2AB0696EC7B2059CB9B955A8EECE864572036522AF5985FCC1B31A3A1518CBC5D8916B61BD
2,989,764 UART: Caliptra RT
2,990,018 UART: [state] CFI Enabled
3,098,596 UART: [rt] RT listening for mailbox commands...
3,099,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,297 UART: [rt]cmd =0x44504543, len=96
3,316,633 >>> mbox cmd response data (6236 bytes)
3,316,634 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,151 UART: [rt]cmd =0x52564348, len=36
3,348,182 >>> mbox cmd response data (8 bytes)
3,348,183 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,378,030 UART: [rt]cmd =0x52564348, len=36
3,379,506 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,620 UART: [idev] ++
1,172,788 UART: [idev] CDI.KEYID = 6
1,173,149 UART: [idev] SUBJECT.KEYID = 7
1,173,574 UART: [idev] UDS.KEYID = 0
1,173,920 ready_for_fw is high
1,173,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,198,022 UART: [idev] Sha1 KeyId Algorithm
1,206,756 UART: [idev] --
1,207,789 UART: [ldev] ++
1,207,957 UART: [ldev] CDI.KEYID = 6
1,208,321 UART: [ldev] SUBJECT.KEYID = 5
1,208,748 UART: [ldev] AUTHORITY.KEYID = 7
1,209,211 UART: [ldev] FE.KEYID = 1
1,214,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,965 UART: [ldev] --
1,280,289 UART: [fwproc] Wait for Commands...
1,281,014 UART: [fwproc] Recv command 0x46574c44
1,281,747 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,071 >>> mbox cmd response: success
2,772,228 UART: [afmc] ++
2,772,396 UART: [afmc] CDI.KEYID = 6
2,772,759 UART: [afmc] SUBJECT.KEYID = 7
2,773,185 UART: [afmc] AUTHORITY.KEYID = 5
2,808,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,711 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,430 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,181 UART: [afmc] --
2,852,139 UART: [cold-reset] --
2,853,099 UART: [state] Locking Datavault
2,854,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,112 UART: [state] Locking ICCM
2,855,672 UART: [exit] Launching FMC @ 0x40000130
2,861,001 UART:
2,861,017 UART: Running Caliptra FMC ...
2,861,425 UART:
2,861,568 UART: [state] CFI Enabled
2,872,047 UART: [fht] FMC Alias Private Key: 7
2,980,216 UART: [art] Extend RT PCRs Done
2,980,644 UART: [art] Lock RT PCRs Done
2,982,250 UART: [art] Populate DV Done
2,990,611 UART: [fht] FMC Alias Private Key: 7
2,991,585 UART: [art] Derive CDI
2,991,865 UART: [art] Store in in slot 0x4
3,077,508 UART: [art] Derive Key Pair
3,077,868 UART: [art] Store priv key in slot 0x5
3,091,336 UART: [art] Derive Key Pair - Done
3,105,980 UART: [art] Signing Cert with AUTHO
3,106,460 UART: RITY.KEYID = 7
3,121,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,607 UART: [art] PUB.X = 67820EDC131BE291D3D42A5AC14754EB83A48BB12BD01A5809F96C3B8649C4987CDBCB16C43040188EDEE0034B4F639E
3,129,376 UART: [art] PUB.Y = 6E99D243FB8CA05FE8BE9282F8E431FED16D89C99BE44B1C552EF62807436FA8B67F4CF0012B5A76BAF2929D989940F4
3,136,330 UART: [art] SIG.R = 54986D7F9CFAA1B8E91E56354E10E07EFD9B062E9B845AA6109F31EF520511A89095C548C85C0DF1265F8FB03EB995A9
3,143,097 UART: [art] SIG.S = A674F655050FDBF2AC155E4C20B8C1FC84F90491BC0CB8D72E96C024BF72CD6930AD5E41EEA5BBE48CDF212C0FFF80C4
3,166,859 UART: Caliptra RT
3,167,205 UART: [state] CFI Enabled
3,275,129 UART: [rt] RT listening for mailbox commands...
3,275,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,608 UART: [rt]cmd =0x44504543, len=96
3,494,760 >>> mbox cmd response data (6236 bytes)
3,494,761 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,264 UART: [rt]cmd =0x52564348, len=36
3,526,099 >>> mbox cmd response data (8 bytes)
3,526,100 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,655 UART: [rt]cmd =0x52564348, len=36
3,557,159 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 ready_for_fw is high
1,056,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,173 >>> mbox cmd response: success
2,688,187 UART:
2,688,203 UART: Running Caliptra FMC ...
2,688,611 UART:
2,688,754 UART: [state] CFI Enabled
2,699,133 UART: [fht] FMC Alias Private Key: 7
2,807,118 UART: [art] Extend RT PCRs Done
2,807,546 UART: [art] Lock RT PCRs Done
2,809,116 UART: [art] Populate DV Done
2,817,459 UART: [fht] FMC Alias Private Key: 7
2,818,489 UART: [art] Derive CDI
2,818,769 UART: [art] Store in in slot 0x4
2,904,790 UART: [art] Derive Key Pair
2,905,150 UART: [art] Store priv key in slot 0x5
2,918,196 UART: [art] Derive Key Pair - Done
2,932,967 UART: [art] Signing Cert with AUTHO
2,933,447 UART: RITY.KEYID = 7
2,948,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,128 UART: [art] PUB.X = 0EE677BF61EAA1904302229BF67380B85FD3B1D9476511C0361336CBE7F83A7825D41FB8A57FF3467BFA94008000D802
2,955,843 UART: [art] PUB.Y = BAB6F4629EAC1133C83FE56BBEDD0250035668402B07D9CFA5A6AB3AE3D6EF5BD8B9EA8E66CF9EB2EE2D5F2E03B778E2
2,962,809 UART: [art] SIG.R = 87EAF24E630E55AC80819BD55B95847A297658B269FA7AF575BAC76F0ACBEABDB25AFC6C74EA991E807BBADA4078B07D
2,969,595 UART: [art] SIG.S = BFC0FE90C2E33994548987DDB7FC0AFAA0EB1CBA73174F1467DB79DEC7AC27A51908AC7B5E89F98A8B669BC6B8098313
2,993,607 UART: Caliptra RT
2,993,953 UART: [state] CFI Enabled
3,101,898 UART: [rt] RT listening for mailbox commands...
3,102,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,699 UART: [rt]cmd =0x44504543, len=96
3,321,565 >>> mbox cmd response data (6236 bytes)
3,321,566 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,227 UART: [rt]cmd =0x52564348, len=36
3,353,048 >>> mbox cmd response data (8 bytes)
3,353,049 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,702 UART: [rt]cmd =0x52564348, len=36
3,384,204 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,412 UART:
192,779 UART: Running Caliptra ROM ...
193,962 UART:
194,110 UART: [state] CFI Enabled
264,444 UART: [state] LifecycleState = Unprovisioned
266,426 UART: [state] DebugLocked = No
268,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,813 UART: [kat] SHA2-256
442,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,992 UART: [kat] ++
453,476 UART: [kat] sha1
464,695 UART: [kat] SHA2-256
467,407 UART: [kat] SHA2-384
473,744 UART: [kat] SHA2-512-ACC
476,137 UART: [kat] ECC-384
2,767,837 UART: [kat] HMAC-384Kdf
2,780,635 UART: [kat] LMS
3,970,992 UART: [kat] --
3,974,199 UART: [cold-reset] ++
3,975,903 UART: [fht] Storing FHT @ 0x50003400
3,988,081 UART: [idev] ++
3,988,635 UART: [idev] CDI.KEYID = 6
3,989,602 UART: [idev] SUBJECT.KEYID = 7
3,990,833 UART: [idev] UDS.KEYID = 0
3,991,856 ready_for_fw is high
3,992,050 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,456 UART: [idev] Erasing UDS.KEYID = 0
7,327,646 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,508 UART: [idev] --
7,352,337 UART: [ldev] ++
7,352,972 UART: [ldev] CDI.KEYID = 6
7,353,849 UART: [ldev] SUBJECT.KEYID = 5
7,355,105 UART: [ldev] AUTHORITY.KEYID = 7
7,356,383 UART: [ldev] FE.KEYID = 1
7,402,704 UART: [ldev] Erasing FE.KEYID = 1
10,737,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,731 UART: [ldev] --
13,115,902 UART: [fwproc] Waiting for Commands...
13,119,074 UART: [fwproc] Received command 0x46574c44
13,121,303 UART: [fwproc] Received Image of size 114036 bytes
17,175,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,895 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,639,108 >>> mbox cmd response: success
17,643,026 UART: [afmc] ++
17,643,641 UART: [afmc] CDI.KEYID = 6
17,644,560 UART: [afmc] SUBJECT.KEYID = 7
17,645,773 UART: [afmc] AUTHORITY.KEYID = 5
21,007,843 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,467 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,854 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,695 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,153 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,671 UART: [afmc] --
23,378,228 UART: [cold-reset] --
23,381,957 UART: [state] Locking Datavault
23,387,044 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,814 UART: [state] Locking ICCM
23,390,850 UART: [exit] Launching FMC @ 0x40000130
23,399,192 UART:
23,399,425 UART: Running Caliptra FMC ...
23,400,520 UART:
23,400,674 UART: [state] CFI Enabled
23,467,773 UART: [fht] FMC Alias Private Key: 7
25,805,902 UART: [art] Extend RT PCRs Done
25,807,128 UART: [art] Lock RT PCRs Done
25,808,505 UART: [art] Populate DV Done
25,813,701 UART: [fht] FMC Alias Private Key: 7
25,815,390 UART: [art] Derive CDI
25,816,196 UART: [art] Store in in slot 0x4
25,876,753 UART: [art] Derive Key Pair
25,877,792 UART: [art] Store priv key in slot 0x5
29,170,083 UART: [art] Derive Key Pair - Done
29,183,048 UART: [art] Signing Cert with AUTHO
29,184,358 UART: RITY.KEYID = 7
31,471,952 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,458 UART: [art] PUB.X = D1A6B9002B79310078A3ECEA04DFFD0425A79FBE8517BF71E82E68ABC8BC5A4F5744F9B2A384CE0CEC6B7174AC0E3453
31,480,681 UART: [art] PUB.Y = F0A2A07F7AEB4CA8D85DEAE7F9A5B285C3B49735096F67A93B4990986DE0E46C6961EF86E65574F6F2162DA95D1AD68A
31,487,940 UART: [art] SIG.R = 8739DCF2B3E82C84815CF24A5CE087757E5EB1095FF85C9146FACF755DE3EFCC0A6FA027775E0C011EF7A86F0A82BE81
31,495,353 UART: [art] SIG.S = 5EB01F5725F3EA1ED43D4F732D236248769547D53DCE7807C0B8BFAD2785F38DD11D9D89CAB9CE528A4DE9A22BD0B9D8
32,800,710 UART: Caliptra RT
32,801,402 UART: [state] CFI Enabled
32,961,158 UART: [rt] RT listening for mailbox commands...
32,963,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,993,728 UART: [rt]cmd =0x44504543, len=96
38,764,177 >>> mbox cmd response data (6236 bytes)
38,793,283 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,823,660 UART: [rt]cmd =0x52564348, len=36
38,826,222 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,783,806 ready_for_fw is high
3,784,295 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,866,531 >>> mbox cmd response: success
23,570,588 UART:
23,570,973 UART: Running Caliptra FMC ...
23,572,100 UART:
23,572,251 UART: [state] CFI Enabled
23,639,983 UART: [fht] FMC Alias Private Key: 7
25,977,392 UART: [art] Extend RT PCRs Done
25,978,617 UART: [art] Lock RT PCRs Done
25,980,314 UART: [art] Populate DV Done
25,985,809 UART: [fht] FMC Alias Private Key: 7
25,987,497 UART: [art] Derive CDI
25,988,235 UART: [art] Store in in slot 0x4
26,049,321 UART: [art] Derive Key Pair
26,050,321 UART: [art] Store priv key in slot 0x5
29,342,938 UART: [art] Derive Key Pair - Done
29,355,795 UART: [art] Signing Cert with AUTHO
29,357,100 UART: RITY.KEYID = 7
31,644,866 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,376 UART: [art] PUB.X = D6C870A5AE5E5BEB6026D3FE0AB45E8AC6F95ECA1CA23D447D3D0E79ED2C95A1A765B205C2EC0DB5CAA42BA735393C41
31,653,697 UART: [art] PUB.Y = 794AF36FD7706E829CD457AC001A788A8009029C02348D162B10FD988D7CAF09CA1FEFB541A3A92B7777AAA8CB0F4605
31,660,911 UART: [art] SIG.R = 7966DC5D1A73B4A639F7AADDC08E08AD4C194F9C629C1588CC31845C3612F2328DE17208C4EAE429BA8D8231A06D90E1
31,668,315 UART: [art] SIG.S = 5A84E0D1D48357F6AE34A402D72D79824E2F45DCF0AF3CC16D841473D658E51B881A237596DA676EABB60453C3AE2FDB
32,973,553 UART: Caliptra RT
32,974,267 UART: [state] CFI Enabled
33,135,228 UART: [rt] RT listening for mailbox commands...
33,137,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,167,902 UART: [rt]cmd =0x44504543, len=96
38,939,982 >>> mbox cmd response data (6236 bytes)
38,969,589 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,999,888 UART: [rt]cmd =0x52564348, len=36
39,002,432 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
192,521 UART:
192,874 UART: Running Caliptra ROM ...
193,983 UART:
603,763 UART: [state] CFI Enabled
617,561 UART: [state] LifecycleState = Unprovisioned
619,497 UART: [state] DebugLocked = No
621,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,792 UART: [kat] SHA2-256
796,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,088 UART: [kat] ++
807,563 UART: [kat] sha1
818,624 UART: [kat] SHA2-256
821,356 UART: [kat] SHA2-384
827,062 UART: [kat] SHA2-512-ACC
829,431 UART: [kat] ECC-384
3,112,689 UART: [kat] HMAC-384Kdf
3,124,080 UART: [kat] LMS
4,314,192 UART: [kat] --
4,318,965 UART: [cold-reset] ++
4,321,315 UART: [fht] Storing FHT @ 0x50003400
4,332,289 UART: [idev] ++
4,332,848 UART: [idev] CDI.KEYID = 6
4,333,797 UART: [idev] SUBJECT.KEYID = 7
4,335,034 UART: [idev] UDS.KEYID = 0
4,335,988 ready_for_fw is high
4,336,187 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,416 UART: [idev] Erasing UDS.KEYID = 0
7,622,674 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,376 UART: [idev] --
7,649,231 UART: [ldev] ++
7,649,803 UART: [ldev] CDI.KEYID = 6
7,650,763 UART: [ldev] SUBJECT.KEYID = 5
7,651,974 UART: [ldev] AUTHORITY.KEYID = 7
7,653,202 UART: [ldev] FE.KEYID = 1
7,664,099 UART: [ldev] Erasing FE.KEYID = 1
10,948,778 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,445 UART: [ldev] --
13,307,573 UART: [fwproc] Waiting for Commands...
13,310,709 UART: [fwproc] Received command 0x46574c44
13,312,898 UART: [fwproc] Received Image of size 114036 bytes
17,366,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,827,933 >>> mbox cmd response: success
17,832,451 UART: [afmc] ++
17,833,067 UART: [afmc] CDI.KEYID = 6
17,833,981 UART: [afmc] SUBJECT.KEYID = 7
17,835,203 UART: [afmc] AUTHORITY.KEYID = 5
21,145,914 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,484 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,797 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,124 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,984 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,411 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,641 UART: [afmc] --
23,510,248 UART: [cold-reset] --
23,514,225 UART: [state] Locking Datavault
23,519,905 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,656 UART: [state] Locking ICCM
23,524,398 UART: [exit] Launching FMC @ 0x40000130
23,532,799 UART:
23,533,035 UART: Running Caliptra FMC ...
23,534,137 UART:
23,534,299 UART: [state] CFI Enabled
23,542,156 UART: [fht] FMC Alias Private Key: 7
25,873,370 UART: [art] Extend RT PCRs Done
25,874,594 UART: [art] Lock RT PCRs Done
25,876,168 UART: [art] Populate DV Done
25,881,312 UART: [fht] FMC Alias Private Key: 7
25,882,957 UART: [art] Derive CDI
25,883,789 UART: [art] Store in in slot 0x4
25,926,718 UART: [art] Derive Key Pair
25,927,759 UART: [art] Store priv key in slot 0x5
29,169,964 UART: [art] Derive Key Pair - Done
29,183,001 UART: [art] Signing Cert with AUTHO
29,184,337 UART: RITY.KEYID = 7
31,464,041 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,542 UART: [art] PUB.X = 6F07DA839FA2D9FDDA0F09627C5E4CB826E7F112335433671C84CC8288DC38C2EA66717D8E45C6B1F8728B5961D9E616
31,472,777 UART: [art] PUB.Y = 53B44643B4FF453289387C6EC5A443839C025ED7CCDE16C3D66482AB44BDB2AB04C726BF327A533B5F1EE228E2B4D8F4
31,480,074 UART: [art] SIG.R = 7952038E70D88DF14AC10540A3DA9B1132298B403FC793449AA5D1949C084B4581DDC1210EB3901DC4351C8EAA97642A
31,487,422 UART: [art] SIG.S = 10717F5770650BF66A75F1CCB55FC477791981B41C9917839002FEF6DEEC92D9E10C82710B9955A767F21FBD10C8942E
32,792,538 UART: Caliptra RT
32,793,247 UART: [state] CFI Enabled
32,912,251 UART: [rt] RT listening for mailbox commands...
32,914,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,944,761 UART: [rt]cmd =0x44504543, len=96
38,623,759 >>> mbox cmd response data (6236 bytes)
38,652,839 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,682,791 UART: [rt]cmd =0x52564348, len=36
38,685,496 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,124,927 ready_for_fw is high
4,125,319 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,075,973 >>> mbox cmd response: success
23,717,790 UART:
23,718,189 UART: Running Caliptra FMC ...
23,719,308 UART:
23,719,461 UART: [state] CFI Enabled
23,727,358 UART: [fht] FMC Alias Private Key: 7
26,057,753 UART: [art] Extend RT PCRs Done
26,058,984 UART: [art] Lock RT PCRs Done
26,060,499 UART: [art] Populate DV Done
26,065,876 UART: [fht] FMC Alias Private Key: 7
26,067,371 UART: [art] Derive CDI
26,068,108 UART: [art] Store in in slot 0x4
26,110,770 UART: [art] Derive Key Pair
26,111,810 UART: [art] Store priv key in slot 0x5
29,354,379 UART: [art] Derive Key Pair - Done
29,367,103 UART: [art] Signing Cert with AUTHO
29,368,440 UART: RITY.KEYID = 7
31,647,904 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,419 UART: [art] PUB.X = 80D131F4ED14F4689378902299C901120B707ECBF1222FA546FE849606A067F8CE85C4DABF6BB8703D1723D1838C792F
31,656,644 UART: [art] PUB.Y = 12154F2A79CB186D8A5E8EDCB2368DD27BBE8236AD38E76AA5CAC9C80E5EF4283986E524373640E7BEB4DC6740BCC593
31,663,906 UART: [art] SIG.R = 924B15DBE686C979D958916A166F7921501CA11135F0555352FDEC69304287532B89E71604D6C002BC2592DD4E524A17
31,671,266 UART: [art] SIG.S = 5DD2710619A83929B9F6ED63DDEF9A2800C9B1EDD7DE309675076E42E7004E16B1541FC22E94B0BFBC54A3FAC99A7BA8
32,976,058 UART: Caliptra RT
32,976,767 UART: [state] CFI Enabled
33,094,872 UART: [rt] RT listening for mailbox commands...
33,096,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,397 UART: [rt]cmd =0x44504543, len=96
38,806,843 >>> mbox cmd response data (6236 bytes)
38,835,940 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,866,216 UART: [rt]cmd =0x52564348, len=36
38,868,807 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
192,684 UART:
193,081 UART: Running Caliptra ROM ...
194,241 UART:
194,384 UART: [state] CFI Enabled
262,355 UART: [state] LifecycleState = Unprovisioned
264,277 UART: [state] DebugLocked = No
265,584 UART: [state] WD Timer not started. Device not locked for debugging
268,840 UART: [kat] SHA2-256
447,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,534 UART: [kat] ++
459,980 UART: [kat] sha1
470,211 UART: [kat] SHA2-256
473,216 UART: [kat] SHA2-384
480,063 UART: [kat] SHA2-512-ACC
483,003 UART: [kat] ECC-384
2,945,426 UART: [kat] HMAC-384Kdf
2,968,827 UART: [kat] LMS
3,498,236 UART: [kat] --
3,502,403 UART: [cold-reset] ++
3,503,347 UART: [fht] FHT @ 0x50003400
3,515,320 UART: [idev] ++
3,515,894 UART: [idev] CDI.KEYID = 6
3,516,804 UART: [idev] SUBJECT.KEYID = 7
3,518,050 UART: [idev] UDS.KEYID = 0
3,518,982 ready_for_fw is high
3,519,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,438 UART: [idev] Erasing UDS.KEYID = 0
6,023,513 UART: [idev] Sha1 KeyId Algorithm
6,047,389 UART: [idev] --
6,052,037 UART: [ldev] ++
6,052,619 UART: [ldev] CDI.KEYID = 6
6,053,535 UART: [ldev] SUBJECT.KEYID = 5
6,054,748 UART: [ldev] AUTHORITY.KEYID = 7
6,056,002 UART: [ldev] FE.KEYID = 1
6,096,636 UART: [ldev] Erasing FE.KEYID = 1
8,604,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,115 UART: [ldev] --
10,409,942 UART: [fwproc] Wait for Commands...
10,412,956 UART: [fwproc] Recv command 0x46574c44
10,414,985 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,278,529 >>> mbox cmd response: success
14,283,397 UART: [afmc] ++
14,284,032 UART: [afmc] CDI.KEYID = 6
14,284,926 UART: [afmc] SUBJECT.KEYID = 7
14,286,086 UART: [afmc] AUTHORITY.KEYID = 5
16,827,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,396 UART: [afmc] --
18,626,609 UART: [cold-reset] --
18,629,709 UART: [state] Locking Datavault
18,634,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,163 UART: [state] Locking ICCM
18,638,827 UART: [exit] Launching FMC @ 0x40000130
18,647,216 UART:
18,647,470 UART: Running Caliptra FMC ...
18,648,572 UART:
18,648,730 UART: [state] CFI Enabled
18,709,579 UART: [fht] FMC Alias Private Key: 7
20,473,791 UART: [art] Extend RT PCRs Done
20,475,004 UART: [art] Lock RT PCRs Done
20,476,791 UART: [art] Populate DV Done
20,482,195 UART: [fht] FMC Alias Private Key: 7
20,483,787 UART: [art] Derive CDI
20,484,602 UART: [art] Store in in slot 0x4
20,542,668 UART: [art] Derive Key Pair
20,543,708 UART: [art] Store priv key in slot 0x5
23,006,357 UART: [art] Derive Key Pair - Done
23,019,577 UART: [art] Signing Cert with AUTHO
23,020,888 UART: RITY.KEYID = 7
24,732,123 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,775 UART: [art] PUB.X = A27CE48694BF287EB56EE1CC1DF1EC93F81D6A41A8888BA175FE49E16AE572506F1EE0ECD7AFD10D580B90911E778605
24,740,940 UART: [art] PUB.Y = DD8A079DA10657DD76ABCD8FA4F49F0F9AAAB758DD58D177035446ED7A24F71656C96BD951507A3BE1016691BD0CE4C5
24,748,195 UART: [art] SIG.R = 92B8BBDD1C02DF858AB4E3860CAFEFE276383A5464E0278F90397C349EE141DB4D3AE0FE3623A518DF343CD6D70D3F56
24,755,612 UART: [art] SIG.S = FD974FE4507FF34387657447E3554D1A76882F9BE584CC690210260CBBA95C7D65A6F576B0EE7BEACB0943CD540BBA47
25,735,259 UART: Caliptra RT
25,735,959 UART: [state] CFI Enabled
25,899,985 UART: [rt] RT listening for mailbox commands...
25,901,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,266 UART: [rt]cmd =0x44504543, len=96
30,298,601 >>> mbox cmd response data (6236 bytes)
30,327,711 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,357,941 UART: [rt]cmd =0x52564348, len=36
30,360,513 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,452 UART:
192,813 UART: Running Caliptra ROM ...
193,997 UART:
194,157 UART: [state] CFI Enabled
265,678 UART: [state] LifecycleState = Unprovisioned
267,734 UART: [state] DebugLocked = No
269,772 UART: [state] WD Timer not started. Device not locked for debugging
274,088 UART: [kat] SHA2-256
463,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,731 UART: [kat] ++
475,210 UART: [kat] sha1
487,696 UART: [kat] SHA2-256
490,710 UART: [kat] SHA2-384
498,493 UART: [kat] SHA2-512-ACC
501,088 UART: [kat] ECC-384
2,948,603 UART: [kat] HMAC-384Kdf
2,972,778 UART: [kat] LMS
3,504,568 UART: [kat] --
3,507,646 UART: [cold-reset] ++
3,508,800 UART: [fht] FHT @ 0x50003400
3,521,487 UART: [idev] ++
3,522,206 UART: [idev] CDI.KEYID = 6
3,523,116 UART: [idev] SUBJECT.KEYID = 7
3,524,363 UART: [idev] UDS.KEYID = 0
3,525,292 ready_for_fw is high
3,525,481 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,889 UART: [idev] Erasing UDS.KEYID = 0
6,029,942 UART: [idev] Sha1 KeyId Algorithm
6,052,598 UART: [idev] --
6,056,458 UART: [ldev] ++
6,057,196 UART: [ldev] CDI.KEYID = 6
6,058,116 UART: [ldev] SUBJECT.KEYID = 5
6,059,281 UART: [ldev] AUTHORITY.KEYID = 7
6,060,462 UART: [ldev] FE.KEYID = 1
6,100,982 UART: [ldev] Erasing FE.KEYID = 1
8,602,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,736 UART: [ldev] --
10,393,860 UART: [fwproc] Wait for Commands...
10,396,066 UART: [fwproc] Recv command 0x46574c44
10,398,325 UART: [fwproc] Recv'd Img size: 114360 bytes
13,846,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,037,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,580,681 >>> mbox cmd response: success
14,585,072 UART: [afmc] ++
14,585,828 UART: [afmc] CDI.KEYID = 6
14,587,034 UART: [afmc] SUBJECT.KEYID = 7
14,588,480 UART: [afmc] AUTHORITY.KEYID = 5
17,133,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,853,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,855,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,870,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,384 UART: [afmc] --
18,928,346 UART: [cold-reset] --
18,932,338 UART: [state] Locking Datavault
18,940,163 UART: [state] Locking PCR0, PCR1 and PCR31
18,942,317 UART: [state] Locking ICCM
18,944,850 UART: [exit] Launching FMC @ 0x40000130
18,953,479 UART:
18,953,721 UART: Running Caliptra FMC ...
18,954,826 UART:
18,954,988 UART: [state] CFI Enabled
19,013,023 UART: [fht] FMC Alias Private Key: 7
20,777,124 UART: [art] Extend RT PCRs Done
20,778,349 UART: [art] Lock RT PCRs Done
20,780,142 UART: [art] Populate DV Done
20,785,332 UART: [fht] FMC Alias Private Key: 7
20,786,869 UART: [art] Derive CDI
20,787,683 UART: [art] Store in in slot 0x4
20,845,531 UART: [art] Derive Key Pair
20,846,573 UART: [art] Store priv key in slot 0x5
23,309,879 UART: [art] Derive Key Pair - Done
23,322,562 UART: [art] Signing Cert with AUTHO
23,323,864 UART: RITY.KEYID = 7
25,035,982 UART: [art] Erasing AUTHORITY.KEYID = 7
25,037,495 UART: [art] PUB.X = 4F40B1E918898FB6397160EC324FF0788C825BBAA8E589D3AA9433C7AEC45435AA181954F5F1C3AE9FFFD531BE339806
25,044,732 UART: [art] PUB.Y = 6DF9CF4D1170C816F787DEBBFA942F8A552496246159643656216C682F42DA36DE34091E2063A359D6034BCAB6158E54
25,052,012 UART: [art] SIG.R = AB369519AF7DB0805C7505E976EED58A0E0287D51B346302BD69B8D2424623F0B57399660F25FFF170B225338185C7CA
25,059,337 UART: [art] SIG.S = 630C68A9425B9EC82D3F3EC1378AC3317427C6B57EA35ECBE115619C86C41F4A5C96B8304C7819978461FCC6BDE1DA6C
26,037,648 UART: Caliptra RT
26,038,341 UART: [state] CFI Enabled
26,204,049 UART: [rt] RT listening for mailbox commands...
26,205,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,236,580 UART: [rt]cmd =0x44504543, len=96
30,603,386 >>> mbox cmd response data (6236 bytes)
30,632,521 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,662,683 UART: [rt]cmd =0x52564348, len=36
30,665,079 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
3,440,197 ready_for_fw is high
3,440,945 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,731,665 >>> mbox cmd response: success
19,026,343 UART:
19,026,784 UART: Running Caliptra FMC ...
19,027,911 UART:
19,028,071 UART: [state] CFI Enabled
19,095,126 UART: [fht] FMC Alias Private Key: 7
20,859,132 UART: [art] Extend RT PCRs Done
20,860,350 UART: [art] Lock RT PCRs Done
20,862,141 UART: [art] Populate DV Done
20,867,448 UART: [fht] FMC Alias Private Key: 7
20,869,158 UART: [art] Derive CDI
20,869,979 UART: [art] Store in in slot 0x4
20,927,078 UART: [art] Derive Key Pair
20,928,083 UART: [art] Store priv key in slot 0x5
23,399,393 UART: [art] Derive Key Pair - Done
23,412,394 UART: [art] Signing Cert with AUTHO
23,413,710 UART: RITY.KEYID = 7
25,125,152 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,675 UART: [art] PUB.X = 3184746240CBF4114C17C067F0C0EA330E6F0C87AF6A0B7DD9BCB8E23041A4BCFF2670A597DF41D224EC5D14EAFD4851
25,133,957 UART: [art] PUB.Y = 0618B464F210054B76F89413495FBCD31A0F9495FF9F86DA4BEE07965ED8ED446A3EC14F4C0DE2C30DAB36FBB241FCC2
25,141,239 UART: [art] SIG.R = E819E278AD2954453690B56307D4C70C07280F0B0424FCF053DE91AD6E4D2B0D29BB67C8BCED29032C58EB934E9DC072
25,148,614 UART: [art] SIG.S = BCC4FFE7948821CB457F42CAEB1FFD6DD2F02801F4C513877EDF3ACB7FA1EBA1BA3D5593BFC0225CA5C96E703C09E54E
26,127,701 UART: Caliptra RT
26,128,387 UART: [state] CFI Enabled
26,292,578 UART: [rt] RT listening for mailbox commands...
26,294,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,401 UART: [rt]cmd =0x44504543, len=96
30,692,555 >>> mbox cmd response data (6236 bytes)
30,721,895 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,752,131 UART: [rt]cmd =0x52564348, len=36
30,754,950 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,271 UART:
192,637 UART: Running Caliptra ROM ...
193,729 UART:
603,325 UART: [state] CFI Enabled
618,113 UART: [state] LifecycleState = Unprovisioned
620,473 UART: [state] DebugLocked = No
623,267 UART: [state] WD Timer not started. Device not locked for debugging
627,148 UART: [kat] SHA2-256
817,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,819 UART: [kat] ++
828,333 UART: [kat] sha1
840,765 UART: [kat] SHA2-256
843,773 UART: [kat] SHA2-384
849,550 UART: [kat] SHA2-512-ACC
852,150 UART: [kat] ECC-384
3,294,588 UART: [kat] HMAC-384Kdf
3,307,039 UART: [kat] LMS
3,838,882 UART: [kat] --
3,843,229 UART: [cold-reset] ++
3,844,691 UART: [fht] FHT @ 0x50003400
3,856,840 UART: [idev] ++
3,857,481 UART: [idev] CDI.KEYID = 6
3,858,515 UART: [idev] SUBJECT.KEYID = 7
3,859,684 UART: [idev] UDS.KEYID = 0
3,860,608 ready_for_fw is high
3,860,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,267 UART: [idev] Erasing UDS.KEYID = 0
6,336,404 UART: [idev] Sha1 KeyId Algorithm
6,358,937 UART: [idev] --
6,364,166 UART: [ldev] ++
6,364,860 UART: [ldev] CDI.KEYID = 6
6,365,743 UART: [ldev] SUBJECT.KEYID = 5
6,366,952 UART: [ldev] AUTHORITY.KEYID = 7
6,368,125 UART: [ldev] FE.KEYID = 1
6,379,333 UART: [ldev] Erasing FE.KEYID = 1
8,858,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,812 UART: [ldev] --
10,649,195 UART: [fwproc] Wait for Commands...
10,651,779 UART: [fwproc] Recv command 0x46574c44
10,654,085 UART: [fwproc] Recv'd Img size: 114360 bytes
14,100,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,836,568 >>> mbox cmd response: success
14,839,869 UART: [afmc] ++
14,840,596 UART: [afmc] CDI.KEYID = 6
14,841,777 UART: [afmc] SUBJECT.KEYID = 7
14,843,204 UART: [afmc] AUTHORITY.KEYID = 5
17,347,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,560 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,547 UART: [afmc] --
19,144,094 UART: [cold-reset] --
19,147,255 UART: [state] Locking Datavault
19,153,198 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,345 UART: [state] Locking ICCM
19,156,847 UART: [exit] Launching FMC @ 0x40000130
19,165,507 UART:
19,165,743 UART: Running Caliptra FMC ...
19,166,839 UART:
19,166,996 UART: [state] CFI Enabled
19,175,145 UART: [fht] FMC Alias Private Key: 7
20,932,763 UART: [art] Extend RT PCRs Done
20,933,981 UART: [art] Lock RT PCRs Done
20,935,396 UART: [art] Populate DV Done
20,940,588 UART: [fht] FMC Alias Private Key: 7
20,942,181 UART: [art] Derive CDI
20,942,994 UART: [art] Store in in slot 0x4
20,985,582 UART: [art] Derive Key Pair
20,986,620 UART: [art] Store priv key in slot 0x5
23,413,230 UART: [art] Derive Key Pair - Done
23,426,080 UART: [art] Signing Cert with AUTHO
23,427,384 UART: RITY.KEYID = 7
25,132,521 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,026 UART: [art] PUB.X = 5104A2F6E89994CA69298F8CF86384A7C6784C2CFB2F974111AAE364F3CBACA2513F78A9033445B1368EFB0066220421
25,141,282 UART: [art] PUB.Y = 4CB904DF6C25F1BD14A8C6B3446FDF7559926CC124DB1FECF8C916BBEB97A1B1C8045189992E13BBE69782B84C7A9E3A
25,148,519 UART: [art] SIG.R = 5ADC604FFD9A38ECFD0CB0DC82773C895F4498A455954BC8611D968929D90F060D148E8979CE90331FD2D584E33A94B4
25,155,908 UART: [art] SIG.S = 066616E89AFE90020F6337BD817C57B8F753BD400310F32B99BEE5228496697E3BE462628211127B886FBF00B9FC10A1
26,134,972 UART: Caliptra RT
26,135,681 UART: [state] CFI Enabled
26,253,530 UART: [rt] RT listening for mailbox commands...
26,255,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,285,980 UART: [rt]cmd =0x44504543, len=96
30,576,868 >>> mbox cmd response data (6236 bytes)
30,605,982 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,636,100 UART: [rt]cmd =0x52564348, len=36
30,639,018 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,759,540 ready_for_fw is high
3,760,183 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,477 >>> mbox cmd response: success
19,205,114 UART:
19,205,509 UART: Running Caliptra FMC ...
19,206,710 UART:
19,206,875 UART: [state] CFI Enabled
19,214,828 UART: [fht] FMC Alias Private Key: 7
20,971,940 UART: [art] Extend RT PCRs Done
20,973,148 UART: [art] Lock RT PCRs Done
20,974,772 UART: [art] Populate DV Done
20,980,128 UART: [fht] FMC Alias Private Key: 7
20,981,825 UART: [art] Derive CDI
20,982,640 UART: [art] Store in in slot 0x4
21,025,398 UART: [art] Derive Key Pair
21,026,442 UART: [art] Store priv key in slot 0x5
23,453,144 UART: [art] Derive Key Pair - Done
23,466,429 UART: [art] Signing Cert with AUTHO
23,467,737 UART: RITY.KEYID = 7
25,173,200 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,691 UART: [art] PUB.X = FB613039F8F4018E94A8FDFD6882043B7AE8FC84150E2CA091D9086D1D14A9FEE3485B557EC877AA7BB515EB0F7611D0
25,181,993 UART: [art] PUB.Y = E45B6AFAACADD01CFE9224190826A36F5C7CAE418C8FB5E61591341FE035D1930E111151281B708E4ABEC22359D734EE
25,189,265 UART: [art] SIG.R = 65368B3941F45BD25664DC9E8EFC1F0070379B8A751A9FBE1799A895756202339A8DB988E3B97A572850FFD5AA53C4A0
25,196,614 UART: [art] SIG.S = FC09F0BEA553509946768C0B9DF79BC3DF18615FE46BAFCB76127F5D3C293FAA30C351388886A5E4CFC142EF6A8FBE7A
26,175,774 UART: Caliptra RT
26,176,482 UART: [state] CFI Enabled
26,293,079 UART: [rt] RT listening for mailbox commands...
26,295,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,549 UART: [rt]cmd =0x44504543, len=96
30,616,919 >>> mbox cmd response data (6236 bytes)
30,645,974 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,676,053 UART: [rt]cmd =0x52564348, len=36
30,678,841 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
85,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,377 UART: [kat] SHA2-256
881,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,423 UART: [kat] ++
885,575 UART: [kat] sha1
889,911 UART: [kat] SHA2-256
891,849 UART: [kat] SHA2-384
894,422 UART: [kat] SHA2-512-ACC
896,323 UART: [kat] ECC-384
901,894 UART: [kat] HMAC-384Kdf
906,558 UART: [kat] LMS
1,474,754 UART: [kat] --
1,475,635 UART: [cold-reset] ++
1,476,045 UART: [fht] Storing FHT @ 0x50003400
1,478,738 UART: [idev] ++
1,478,906 UART: [idev] CDI.KEYID = 6
1,479,266 UART: [idev] SUBJECT.KEYID = 7
1,479,690 UART: [idev] UDS.KEYID = 0
1,480,035 ready_for_fw is high
1,480,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,436 UART: [idev] Erasing UDS.KEYID = 0
1,504,684 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,473 UART: [ldev] ++
1,514,641 UART: [ldev] CDI.KEYID = 6
1,515,004 UART: [ldev] SUBJECT.KEYID = 5
1,515,430 UART: [ldev] AUTHORITY.KEYID = 7
1,515,893 UART: [ldev] FE.KEYID = 1
1,520,901 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,580 UART: [ldev] --
1,586,073 UART: [fwproc] Waiting for Commands...
1,586,814 UART: [fwproc] Received command 0x46574c44
1,587,605 UART: [fwproc] Received Image of size 114360 bytes
2,885,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,480 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,813 >>> mbox cmd response: success
3,077,871 UART: [afmc] ++
3,078,039 UART: [afmc] CDI.KEYID = 6
3,078,401 UART: [afmc] SUBJECT.KEYID = 7
3,078,826 UART: [afmc] AUTHORITY.KEYID = 5
3,113,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,321 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,101 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,714 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,404 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,427 UART: [afmc] --
3,157,325 UART: [cold-reset] --
3,158,263 UART: [state] Locking Datavault
3,159,586 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,190 UART: [state] Locking ICCM
3,160,722 UART: [exit] Launching FMC @ 0x40000130
3,166,051 UART:
3,166,067 UART: Running Caliptra FMC ...
3,166,475 UART:
3,166,529 UART: [state] CFI Enabled
3,177,166 UART: [fht] FMC Alias Private Key: 7
3,285,215 UART: [art] Extend RT PCRs Done
3,285,643 UART: [art] Lock RT PCRs Done
3,287,375 UART: [art] Populate DV Done
3,295,820 UART: [fht] FMC Alias Private Key: 7
3,296,802 UART: [art] Derive CDI
3,297,082 UART: [art] Store in in slot 0x4
3,382,693 UART: [art] Derive Key Pair
3,383,053 UART: [art] Store priv key in slot 0x5
3,396,929 UART: [art] Derive Key Pair - Done
3,411,555 UART: [art] Signing Cert with AUTHO
3,412,035 UART: RITY.KEYID = 7
3,427,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,942 UART: [art] PUB.X = CF1A9D7E01FA4ACB31A8CB480C2F82EB1756954FAB78961F4404B634AE167F27297547E28401820E3F0EA354C14083BC
3,434,698 UART: [art] PUB.Y = 68FBCB653B155985020D2C878E1D1E4FFDA9DEB3EA2DA74966D00ACC804A50B5D52F42990CA9546B4FDA73B2BBD5D219
3,441,654 UART: [art] SIG.R = 341F6A0046C58D1244A7735656B477AD796E600277ACF3145F273E64E3410F00677466E30630EF02801A17554F6861EC
3,448,352 UART: [art] SIG.S = 7D0C15D3F2FFD07BDC3FDA0955B3172DC9E671790087F11BDAE2B86DAAEBE094AFBCA891B02FBE5626A7B21546FDDD6B
3,472,255 UART: Caliptra RT
3,472,509 UART: [state] CFI Enabled
3,581,458 UART: [rt] RT listening for mailbox commands...
3,582,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,225 UART: [rt]cmd =0x44504543, len=96
3,799,916 >>> mbox cmd response data (6236 bytes)
3,799,917 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,570 UART: [rt]cmd =0x52564348, len=36
3,831,467 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,155 ready_for_fw is high
1,362,155 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,735 >>> mbox cmd response: success
2,987,993 UART:
2,988,009 UART: Running Caliptra FMC ...
2,988,417 UART:
2,988,471 UART: [state] CFI Enabled
2,999,060 UART: [fht] FMC Alias Private Key: 7
3,107,013 UART: [art] Extend RT PCRs Done
3,107,441 UART: [art] Lock RT PCRs Done
3,109,019 UART: [art] Populate DV Done
3,117,118 UART: [fht] FMC Alias Private Key: 7
3,118,136 UART: [art] Derive CDI
3,118,416 UART: [art] Store in in slot 0x4
3,203,953 UART: [art] Derive Key Pair
3,204,313 UART: [art] Store priv key in slot 0x5
3,216,869 UART: [art] Derive Key Pair - Done
3,231,640 UART: [art] Signing Cert with AUTHO
3,232,120 UART: RITY.KEYID = 7
3,247,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,589 UART: [art] PUB.X = EA832E96F56CB0823BBFB1A5951B90C31273D2BA0325EA2880FA4B5B93F6107F1C72211E760A270E21D3E0592EBC469C
3,255,356 UART: [art] PUB.Y = EB83D6403A17AFAA9330E6A4566C60550ECBC97158FFEAFCAC4331A5B9537E1D630057A590EB413CE9F962D82D73E717
3,262,291 UART: [art] SIG.R = 120842F35A4F8C17D40C18D6CC9CF38DE06EB83221CD62764070152FE2D491A0AF03C6E39D7CF0B3A58477E4954864BF
3,269,056 UART: [art] SIG.S = 85A2C595840DB8DEB0534A664BBF83B835E5E6DD720E0654CB911B18BFC022A2F9490F573DCAF32CE3D8F8E3F254E76C
3,293,049 UART: Caliptra RT
3,293,303 UART: [state] CFI Enabled
3,401,419 UART: [rt] RT listening for mailbox commands...
3,402,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,082 UART: [rt]cmd =0x44504543, len=96
3,619,977 >>> mbox cmd response data (6236 bytes)
3,619,978 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,465 UART: [rt]cmd =0x52564348, len=36
3,651,826 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
891,036 UART: [kat] SHA2-256
892,974 UART: [kat] SHA2-384
895,881 UART: [kat] SHA2-512-ACC
897,782 UART: [kat] ECC-384
903,451 UART: [kat] HMAC-384Kdf
908,255 UART: [kat] LMS
1,476,451 UART: [kat] --
1,477,302 UART: [cold-reset] ++
1,477,796 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 ready_for_fw is high
1,481,894 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,509 UART: [idev] Erasing UDS.KEYID = 0
1,506,119 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,659 UART: [idev] --
1,515,676 UART: [ldev] ++
1,515,844 UART: [ldev] CDI.KEYID = 6
1,516,207 UART: [ldev] SUBJECT.KEYID = 5
1,516,633 UART: [ldev] AUTHORITY.KEYID = 7
1,517,096 UART: [ldev] FE.KEYID = 1
1,522,422 UART: [ldev] Erasing FE.KEYID = 1
1,548,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,009 UART: [ldev] --
1,587,332 UART: [fwproc] Waiting for Commands...
1,587,997 UART: [fwproc] Received command 0x46574c44
1,588,788 UART: [fwproc] Received Image of size 114360 bytes
2,886,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,133 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,485 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,458 >>> mbox cmd response: success
3,080,612 UART: [afmc] ++
3,080,780 UART: [afmc] CDI.KEYID = 6
3,081,142 UART: [afmc] SUBJECT.KEYID = 7
3,081,567 UART: [afmc] AUTHORITY.KEYID = 5
3,116,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,150 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,543 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,233 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,242 UART: [afmc] --
3,160,136 UART: [cold-reset] --
3,161,154 UART: [state] Locking Datavault
3,162,431 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,035 UART: [state] Locking ICCM
3,163,641 UART: [exit] Launching FMC @ 0x40000130
3,168,970 UART:
3,168,986 UART: Running Caliptra FMC ...
3,169,394 UART:
3,169,537 UART: [state] CFI Enabled
3,180,262 UART: [fht] FMC Alias Private Key: 7
3,288,167 UART: [art] Extend RT PCRs Done
3,288,595 UART: [art] Lock RT PCRs Done
3,290,143 UART: [art] Populate DV Done
3,298,316 UART: [fht] FMC Alias Private Key: 7
3,299,276 UART: [art] Derive CDI
3,299,556 UART: [art] Store in in slot 0x4
3,385,489 UART: [art] Derive Key Pair
3,385,849 UART: [art] Store priv key in slot 0x5
3,398,791 UART: [art] Derive Key Pair - Done
3,413,396 UART: [art] Signing Cert with AUTHO
3,413,876 UART: RITY.KEYID = 7
3,428,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,757 UART: [art] PUB.X = 0F1F4DBC4AD52EF56428CC2E80484CC83762237B0390CAD2D0FC04303465DCF54C50ECCFC412DA929D90D97A873F65B8
3,436,530 UART: [art] PUB.Y = E6221F38FC24350E0DEF856EB638487C39B4FA3FA5CC74A95494D2459BB35D174F339FD76A8259A105FB2F3B1A41038E
3,443,474 UART: [art] SIG.R = F3B6EA7D17465EA4FD90DDB139A3A28B45FD28AF541A1876E7454A423BE2C67C9B06914A7B772CE0C99F97F06967C3B2
3,450,251 UART: [art] SIG.S = BB962D688306B4094BFF4AF584A27ECADAACC9375C4352631E40AE35035FA120B707E4CD089EB23E94A7E4C662BE32AC
3,474,727 UART: Caliptra RT
3,475,073 UART: [state] CFI Enabled
3,584,160 UART: [rt] RT listening for mailbox commands...
3,584,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,101 UART: [rt]cmd =0x44504543, len=96
3,803,281 >>> mbox cmd response data (6236 bytes)
3,803,282 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,011 UART: [rt]cmd =0x52564348, len=36
3,834,874 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,510 ready_for_fw is high
1,363,510 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,446 >>> mbox cmd response: success
2,988,954 UART:
2,988,970 UART: Running Caliptra FMC ...
2,989,378 UART:
2,989,521 UART: [state] CFI Enabled
2,999,970 UART: [fht] FMC Alias Private Key: 7
3,107,783 UART: [art] Extend RT PCRs Done
3,108,211 UART: [art] Lock RT PCRs Done
3,109,897 UART: [art] Populate DV Done
3,118,240 UART: [fht] FMC Alias Private Key: 7
3,119,314 UART: [art] Derive CDI
3,119,594 UART: [art] Store in in slot 0x4
3,205,029 UART: [art] Derive Key Pair
3,205,389 UART: [art] Store priv key in slot 0x5
3,218,853 UART: [art] Derive Key Pair - Done
3,233,668 UART: [art] Signing Cert with AUTHO
3,234,148 UART: RITY.KEYID = 7
3,249,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,225 UART: [art] PUB.X = 567E4681F1917FD950DAC7F2E9ACAF06CB5DE1E43B8CAB2B9534E93F707B15ABAA84EB2091502568BCC03E4886D01E25
3,257,006 UART: [art] PUB.Y = E1D77D30C53CEA0E1335B6D441B50D965D355BE3F7759980E94710E1CCDAE47F1DC137D6AC599A3DC21971115BB1A9D4
3,263,960 UART: [art] SIG.R = 5B8B1609758FBB435CD054A37EAC05F01046EF71D6F638BBDCEF225D866FDC1A1AADCFFA1FC938EDFB6E9BE7E2E3540D
3,270,751 UART: [art] SIG.S = 9675E64C9140E736277AAE0D3EC326E8586815102453FF4EBBA0E1CF10C3760C06AF221877A889F9B1FB78B369FC7ADE
3,294,743 UART: Caliptra RT
3,295,089 UART: [state] CFI Enabled
3,403,451 UART: [rt] RT listening for mailbox commands...
3,404,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,250 UART: [rt]cmd =0x44504543, len=96
3,622,194 >>> mbox cmd response data (6236 bytes)
3,622,195 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,548 UART: [rt]cmd =0x52564348, len=36
3,653,637 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
893,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,717 UART: [kat] ++
897,869 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,686 UART: [kat] SHA2-512-ACC
908,587 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,172,157 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,190 UART: [idev] ++
1,175,358 UART: [idev] CDI.KEYID = 6
1,175,718 UART: [idev] SUBJECT.KEYID = 7
1,176,142 UART: [idev] UDS.KEYID = 0
1,176,487 ready_for_fw is high
1,176,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,296 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,125 UART: [idev] --
1,210,243 UART: [ldev] ++
1,210,411 UART: [ldev] CDI.KEYID = 6
1,210,774 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,385 UART: [ldev] --
1,282,766 UART: [fwproc] Wait for Commands...
1,283,422 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,176 >>> mbox cmd response: success
2,775,290 UART: [afmc] ++
2,775,458 UART: [afmc] CDI.KEYID = 6
2,775,820 UART: [afmc] SUBJECT.KEYID = 7
2,776,245 UART: [afmc] AUTHORITY.KEYID = 5
2,812,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,589 UART: [afmc] --
2,855,489 UART: [cold-reset] --
2,856,165 UART: [state] Locking Datavault
2,857,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,036 UART: [state] Locking ICCM
2,858,684 UART: [exit] Launching FMC @ 0x40000130
2,864,013 UART:
2,864,029 UART: Running Caliptra FMC ...
2,864,437 UART:
2,864,491 UART: [state] CFI Enabled
2,874,966 UART: [fht] FMC Alias Private Key: 7
2,982,987 UART: [art] Extend RT PCRs Done
2,983,415 UART: [art] Lock RT PCRs Done
2,984,973 UART: [art] Populate DV Done
2,993,204 UART: [fht] FMC Alias Private Key: 7
2,994,158 UART: [art] Derive CDI
2,994,438 UART: [art] Store in in slot 0x4
3,080,477 UART: [art] Derive Key Pair
3,080,837 UART: [art] Store priv key in slot 0x5
3,094,251 UART: [art] Derive Key Pair - Done
3,109,059 UART: [art] Signing Cert with AUTHO
3,109,539 UART: RITY.KEYID = 7
3,124,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,674 UART: [art] PUB.X = 240EDF592058CF733C1DA29A0FF6F01C8E79C321A151388EDE1647CB054ED20A6E3B1A6F53C29625EEEFCA6B90444C61
3,132,444 UART: [art] PUB.Y = 9917427CC95F825DF8E3DB87ED8932792047BBC781C500206CE4ED4A33526100175D1F59D5CB0C62E5E7D2A1085CD102
3,139,341 UART: [art] SIG.R = 326E0C6D4F27538F301EA20F03A4CCBA44E4F48636D2EB9E0F80F789EB32A24553AF02017270EC17B7C9FC42748F97BC
3,146,101 UART: [art] SIG.S = E11B4A841F6D51F57853D43C9E91001B892969B71196CB163C01B93867793325EDDF0A056E4060544D29F53462D13A6E
3,169,899 UART: Caliptra RT
3,170,153 UART: [state] CFI Enabled
3,278,579 UART: [rt] RT listening for mailbox commands...
3,279,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,400 UART: [rt]cmd =0x44504543, len=96
3,496,717 >>> mbox cmd response data (6236 bytes)
3,496,718 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,335 UART: [rt]cmd =0x52564348, len=36
3,528,518 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,869 ready_for_fw is high
1,060,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,521 >>> mbox cmd response: success
2,688,731 UART:
2,688,747 UART: Running Caliptra FMC ...
2,689,155 UART:
2,689,209 UART: [state] CFI Enabled
2,699,436 UART: [fht] FMC Alias Private Key: 7
2,806,751 UART: [art] Extend RT PCRs Done
2,807,179 UART: [art] Lock RT PCRs Done
2,808,591 UART: [art] Populate DV Done
2,816,916 UART: [fht] FMC Alias Private Key: 7
2,818,046 UART: [art] Derive CDI
2,818,326 UART: [art] Store in in slot 0x4
2,903,671 UART: [art] Derive Key Pair
2,904,031 UART: [art] Store priv key in slot 0x5
2,917,049 UART: [art] Derive Key Pair - Done
2,931,546 UART: [art] Signing Cert with AUTHO
2,932,026 UART: RITY.KEYID = 7
2,947,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,063 UART: [art] PUB.X = BD2C45943B2CE8280C963E62F3D5271C2B532BDCD2C67293EA923B181B2DA9B24EAEF919EE88D2343E22513E7ACA3C75
2,954,842 UART: [art] PUB.Y = 79267CD350254BEA9FAC051141031C1218DDB39F9B7DBA8703BA719CCCBEE0C254FA63DCF2172A116AB23FC7F5DBD110
2,961,801 UART: [art] SIG.R = 2ECFF15E59D67913DF98B6F7CC4C5D485F5DC0F283A8729C361DBFA9B515052D41686CF97DD22ED1C083B316C5D1BAB3
2,968,584 UART: [art] SIG.S = A0320FFF9A2FC42B22235815407BED2276673273CFD1399876183F05BE33A423D55106F7DE0AF26D26C15B03D6B64B84
2,992,676 UART: Caliptra RT
2,992,930 UART: [state] CFI Enabled
3,101,998 UART: [rt] RT listening for mailbox commands...
3,102,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,847 UART: [rt]cmd =0x44504543, len=96
3,320,886 >>> mbox cmd response data (6236 bytes)
3,320,887 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,534 UART: [rt]cmd =0x52564348, len=36
3,352,533 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,006 UART: [kat] SHA2-256
903,946 UART: [kat] SHA2-384
906,549 UART: [kat] SHA2-512-ACC
908,450 UART: [kat] ECC-384
918,345 UART: [kat] HMAC-384Kdf
922,911 UART: [kat] LMS
1,171,239 UART: [kat] --
1,172,218 UART: [cold-reset] ++
1,172,554 UART: [fht] FHT @ 0x50003400
1,175,273 UART: [idev] ++
1,175,441 UART: [idev] CDI.KEYID = 6
1,175,801 UART: [idev] SUBJECT.KEYID = 7
1,176,225 UART: [idev] UDS.KEYID = 0
1,176,570 ready_for_fw is high
1,176,570 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,738 UART: [idev] --
1,210,802 UART: [ldev] ++
1,210,970 UART: [ldev] CDI.KEYID = 6
1,211,333 UART: [ldev] SUBJECT.KEYID = 5
1,211,759 UART: [ldev] AUTHORITY.KEYID = 7
1,212,222 UART: [ldev] FE.KEYID = 1
1,217,644 UART: [ldev] Erasing FE.KEYID = 1
1,244,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,088 UART: [ldev] --
1,283,591 UART: [fwproc] Wait for Commands...
1,284,413 UART: [fwproc] Recv command 0x46574c44
1,285,141 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,013 >>> mbox cmd response: success
2,777,179 UART: [afmc] ++
2,777,347 UART: [afmc] CDI.KEYID = 6
2,777,709 UART: [afmc] SUBJECT.KEYID = 7
2,778,134 UART: [afmc] AUTHORITY.KEYID = 5
2,814,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,400 UART: [afmc] --
2,857,416 UART: [cold-reset] --
2,858,170 UART: [state] Locking Datavault
2,859,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,883 UART: [state] Locking ICCM
2,860,317 UART: [exit] Launching FMC @ 0x40000130
2,865,646 UART:
2,865,662 UART: Running Caliptra FMC ...
2,866,070 UART:
2,866,213 UART: [state] CFI Enabled
2,876,676 UART: [fht] FMC Alias Private Key: 7
2,985,069 UART: [art] Extend RT PCRs Done
2,985,497 UART: [art] Lock RT PCRs Done
2,986,777 UART: [art] Populate DV Done
2,995,110 UART: [fht] FMC Alias Private Key: 7
2,996,260 UART: [art] Derive CDI
2,996,540 UART: [art] Store in in slot 0x4
3,081,773 UART: [art] Derive Key Pair
3,082,133 UART: [art] Store priv key in slot 0x5
3,096,161 UART: [art] Derive Key Pair - Done
3,111,056 UART: [art] Signing Cert with AUTHO
3,111,536 UART: RITY.KEYID = 7
3,127,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,777 UART: [art] PUB.X = 0FEE92B2695E1BA8DE5B18B699B553E92A5555141932016739FDF9A6491AA51DCC2C1EE0114E83969198C18BEF93EF7E
3,134,547 UART: [art] PUB.Y = E51CAC463A63128AB06B1B1CC0712AFE55FB2213C8154F98ED3E62D3B7DA44086A868EF81CF1ADB2906BF8489B1E9D58
3,141,508 UART: [art] SIG.R = 0B6E504D3BE82CD73118B03AEC25FF5339B0D5A6F33B92332CD7856D1CC3951F77001ED2F1412F24A884E4B41A2ED734
3,148,259 UART: [art] SIG.S = AC9E816F175D26BB3DDD1B6FB8EE962AA53DD4B1E403FBB6BB0C416EB546EF39FC847482412AD6288239DF7CBACFCFA0
3,171,906 UART: Caliptra RT
3,172,252 UART: [state] CFI Enabled
3,279,802 UART: [rt] RT listening for mailbox commands...
3,280,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,487 UART: [rt]cmd =0x44504543, len=96
3,498,080 >>> mbox cmd response data (6236 bytes)
3,498,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,764 UART: [rt]cmd =0x52564348, len=36
3,530,087 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,494 ready_for_fw is high
1,060,494 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,238 >>> mbox cmd response: success
2,689,370 UART:
2,689,386 UART: Running Caliptra FMC ...
2,689,794 UART:
2,689,937 UART: [state] CFI Enabled
2,700,442 UART: [fht] FMC Alias Private Key: 7
2,808,815 UART: [art] Extend RT PCRs Done
2,809,243 UART: [art] Lock RT PCRs Done
2,810,473 UART: [art] Populate DV Done
2,818,744 UART: [fht] FMC Alias Private Key: 7
2,819,906 UART: [art] Derive CDI
2,820,186 UART: [art] Store in in slot 0x4
2,905,667 UART: [art] Derive Key Pair
2,906,027 UART: [art] Store priv key in slot 0x5
2,919,801 UART: [art] Derive Key Pair - Done
2,934,536 UART: [art] Signing Cert with AUTHO
2,935,016 UART: RITY.KEYID = 7
2,949,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,595 UART: [art] PUB.X = 76C3AE52E46C8791289F45E345070C8F688D0D30170AB913CAAAF99945F1BA61EBC48039E16801491945C8622E818AD4
2,957,346 UART: [art] PUB.Y = 54DD472E827D63C2877FAA158B42E0D3EE2EBD079F4C6E0E3435B36BC3DD3D489F18CCF5B3062848126FF526E9AC3CFF
2,964,303 UART: [art] SIG.R = 1343B00F12027B57F6C8CC53967F6CBF21B9C1DF8F90C1734F734AE1A0F19140C654D32ED059A1B77CCA65E1105D8B6B
2,971,075 UART: [art] SIG.S = D345F94043792A5E16EF63AA74979CE647E66A7748D2FCE2AAB56094E50F316B8DF3A311C27EA9261E0C8EC650815045
2,995,052 UART: Caliptra RT
2,995,398 UART: [state] CFI Enabled
3,103,126 UART: [rt] RT listening for mailbox commands...
3,103,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,171 UART: [rt]cmd =0x44504543, len=96
3,322,371 >>> mbox cmd response data (6236 bytes)
3,322,372 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,911 UART: [rt]cmd =0x52564348, len=36
3,353,718 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,407 UART: [kat] SHA2-256
901,347 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,712 UART: [kat] HMAC-384Kdf
920,182 UART: [kat] LMS
1,168,494 UART: [kat] --
1,169,367 UART: [cold-reset] ++
1,169,819 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,173,743 ready_for_fw is high
1,173,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,565 UART: [idev] --
1,208,628 UART: [ldev] ++
1,208,796 UART: [ldev] CDI.KEYID = 6
1,209,160 UART: [ldev] SUBJECT.KEYID = 5
1,209,587 UART: [ldev] AUTHORITY.KEYID = 7
1,210,050 UART: [ldev] FE.KEYID = 1
1,215,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,394 UART: [fwproc] Wait for Commands...
1,281,135 UART: [fwproc] Recv command 0x46574c44
1,281,868 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,769,638 >>> mbox cmd response: success
2,770,835 UART: [afmc] ++
2,771,003 UART: [afmc] CDI.KEYID = 6
2,771,366 UART: [afmc] SUBJECT.KEYID = 7
2,771,792 UART: [afmc] AUTHORITY.KEYID = 5
2,807,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,836 UART: [afmc] --
2,850,942 UART: [cold-reset] --
2,851,982 UART: [state] Locking Datavault
2,853,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,947 UART: [state] Locking ICCM
2,854,467 UART: [exit] Launching FMC @ 0x40000130
2,859,796 UART:
2,859,812 UART: Running Caliptra FMC ...
2,860,220 UART:
2,860,274 UART: [state] CFI Enabled
2,870,519 UART: [fht] FMC Alias Private Key: 7
2,978,612 UART: [art] Extend RT PCRs Done
2,979,040 UART: [art] Lock RT PCRs Done
2,980,514 UART: [art] Populate DV Done
2,988,471 UART: [fht] FMC Alias Private Key: 7
2,989,551 UART: [art] Derive CDI
2,989,831 UART: [art] Store in in slot 0x4
3,075,428 UART: [art] Derive Key Pair
3,075,788 UART: [art] Store priv key in slot 0x5
3,089,176 UART: [art] Derive Key Pair - Done
3,103,852 UART: [art] Signing Cert with AUTHO
3,104,332 UART: RITY.KEYID = 7
3,119,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,121 UART: [art] PUB.X = DF92E46E1747A7FF62F49AFC6026EEA637BF155C6EDA67CED4AD536F3D4BF2DDC0A0DC8A69F8D2DD92355F9B4CB4BBCE
3,126,925 UART: [art] PUB.Y = 04E5FE6BFB9E939212598D5F3CF835ECB3D42357B1C727D2779F941640918A567DD4725379C624782FE331B3ADCE2A48
3,133,872 UART: [art] SIG.R = B7FBC5F5C9E0DDB17546AF471268A2B3A686F12934209EDE804588FA817186606859A24C0934ACA98FD535179BFACA75
3,140,643 UART: [art] SIG.S = 32ADCCFACEA21666599187C54C24A1E355F5A32090592B0F5458BF3AAE3CC87156A2208B19D65E80B522E3519A1FB1CC
3,164,549 UART: Caliptra RT
3,164,803 UART: [state] CFI Enabled
3,272,043 UART: [rt] RT listening for mailbox commands...
3,272,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,554 UART: [rt]cmd =0x44504543, len=96
3,489,051 >>> mbox cmd response data (6236 bytes)
3,489,052 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,595 UART: [rt]cmd =0x52564348, len=36
3,520,958 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,310 ready_for_fw is high
1,056,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,197 >>> mbox cmd response: success
2,686,213 UART:
2,686,229 UART: Running Caliptra FMC ...
2,686,637 UART:
2,686,691 UART: [state] CFI Enabled
2,697,076 UART: [fht] FMC Alias Private Key: 7
2,805,019 UART: [art] Extend RT PCRs Done
2,805,447 UART: [art] Lock RT PCRs Done
2,807,283 UART: [art] Populate DV Done
2,815,572 UART: [fht] FMC Alias Private Key: 7
2,816,676 UART: [art] Derive CDI
2,816,956 UART: [art] Store in in slot 0x4
2,903,041 UART: [art] Derive Key Pair
2,903,401 UART: [art] Store priv key in slot 0x5
2,916,071 UART: [art] Derive Key Pair - Done
2,931,054 UART: [art] Signing Cert with AUTHO
2,931,534 UART: RITY.KEYID = 7
2,946,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,407 UART: [art] PUB.X = 3C949B09C8DBB68F6B9D0F72DEF2E232AAB9D6D8360E7D7DB1AA399C6D3DC149020F749FA936B8A0609B73D7EBFAA2FB
2,954,186 UART: [art] PUB.Y = E59ADADDA130FBD42B7E5144AE8D50D333F065C93689732D22210176B76FA6FA7FB5CEBC48E845D304906899389DD9A2
2,961,138 UART: [art] SIG.R = 8C509A8CEC9512123FF733C8C66F13D880CA48FADB6F877FE24FCA9C8183645D0D9AF9CC4A694E499B31EB1C471A6B41
2,967,919 UART: [art] SIG.S = E583A7E4525CFD83505341FDC3C2E7AF147F0E44EF327633F74B1F15C7D5C2800E55BFE0087F87AFFEF58148CC5F6207
2,991,588 UART: Caliptra RT
2,991,842 UART: [state] CFI Enabled
3,100,127 UART: [rt] RT listening for mailbox commands...
3,100,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,690 UART: [rt]cmd =0x44504543, len=96
3,318,820 >>> mbox cmd response data (6236 bytes)
3,318,821 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,320 UART: [rt]cmd =0x52564348, len=36
3,350,359 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 ready_for_fw is high
1,174,222 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,776 UART: [idev] Erasing UDS.KEYID = 0
1,198,878 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,721 UART: [ldev] ++
1,208,889 UART: [ldev] CDI.KEYID = 6
1,209,253 UART: [ldev] SUBJECT.KEYID = 5
1,209,680 UART: [ldev] AUTHORITY.KEYID = 7
1,210,143 UART: [ldev] FE.KEYID = 1
1,215,739 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,695 UART: [ldev] --
1,281,151 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,361 >>> mbox cmd response: success
2,772,580 UART: [afmc] ++
2,772,748 UART: [afmc] CDI.KEYID = 6
2,773,111 UART: [afmc] SUBJECT.KEYID = 7
2,773,537 UART: [afmc] AUTHORITY.KEYID = 5
2,809,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,355 UART: [afmc] --
2,852,275 UART: [cold-reset] --
2,853,143 UART: [state] Locking Datavault
2,854,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,664 UART: [state] Locking ICCM
2,855,104 UART: [exit] Launching FMC @ 0x40000130
2,860,433 UART:
2,860,449 UART: Running Caliptra FMC ...
2,860,857 UART:
2,861,000 UART: [state] CFI Enabled
2,872,285 UART: [fht] FMC Alias Private Key: 7
2,979,832 UART: [art] Extend RT PCRs Done
2,980,260 UART: [art] Lock RT PCRs Done
2,981,742 UART: [art] Populate DV Done
2,990,071 UART: [fht] FMC Alias Private Key: 7
2,990,999 UART: [art] Derive CDI
2,991,279 UART: [art] Store in in slot 0x4
3,076,694 UART: [art] Derive Key Pair
3,077,054 UART: [art] Store priv key in slot 0x5
3,090,248 UART: [art] Derive Key Pair - Done
3,105,145 UART: [art] Signing Cert with AUTHO
3,105,625 UART: RITY.KEYID = 7
3,120,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,554 UART: [art] PUB.X = 1FCA0BF0AFB9FA98AF9A50D273178D777C229DEF1FF8A3CA3E36FE1AA3B5C44F8462A3D57541A68CFC88E13E318FF267
3,128,343 UART: [art] PUB.Y = E60D3EFD4FF3217C6BECB9981E4FFC49D65BB5333703497415D257346726E46B49F6D594BD6FCEBEFAC5308191A188CA
3,135,299 UART: [art] SIG.R = FF8AD0B6ECEB9083860A43660B72F413982DF9F86DB871409A791D4CDB5A98D4FEFFE1576DC66C25746485FE1744C7E5
3,142,073 UART: [art] SIG.S = BE5EA9F478D75A81606CE56A98F61FCDB2862D9389894845F41A6001A7544F2CF52CC6C09EC1282999C05954E5C5B585
3,165,761 UART: Caliptra RT
3,166,107 UART: [state] CFI Enabled
3,273,988 UART: [rt] RT listening for mailbox commands...
3,274,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,749 UART: [rt]cmd =0x44504543, len=96
3,493,343 >>> mbox cmd response data (6236 bytes)
3,493,344 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,733 UART: [rt]cmd =0x52564348, len=36
3,525,022 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,503 ready_for_fw is high
1,056,503 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,715 >>> mbox cmd response: success
2,684,937 UART:
2,684,953 UART: Running Caliptra FMC ...
2,685,361 UART:
2,685,504 UART: [state] CFI Enabled
2,696,383 UART: [fht] FMC Alias Private Key: 7
2,804,778 UART: [art] Extend RT PCRs Done
2,805,206 UART: [art] Lock RT PCRs Done
2,806,858 UART: [art] Populate DV Done
2,815,361 UART: [fht] FMC Alias Private Key: 7
2,816,457 UART: [art] Derive CDI
2,816,737 UART: [art] Store in in slot 0x4
2,902,472 UART: [art] Derive Key Pair
2,902,832 UART: [art] Store priv key in slot 0x5
2,915,892 UART: [art] Derive Key Pair - Done
2,930,543 UART: [art] Signing Cert with AUTHO
2,931,023 UART: RITY.KEYID = 7
2,945,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,740 UART: [art] PUB.X = A32D3460FF54DF21747BEFA0F67DCB20B1694A1505882419F63926987AAF5515150AB84B73B3FCD7827AEC963ADFBAB3
2,953,514 UART: [art] PUB.Y = 0E7993A46ED4D7ACD4908B3D2A6034B287A840853582354730B72C8F22FAD0EC8F9A475440932AD7E3905B35FF01F0B1
2,960,458 UART: [art] SIG.R = 34BB0307878E8B24CE502E734D626766AB77E308086325C4C0A5D8577FFD6514202C4F7F1350D3345BB6B32F00CA06D4
2,967,187 UART: [art] SIG.S = 677955C17BFB954EC0D8530AF63B945BC8CB91C57C7FCA9BBE7A3CCB04FBE04F5586920D9B5077A799A041E730CEE5FC
2,991,019 UART: Caliptra RT
2,991,365 UART: [state] CFI Enabled
3,099,599 UART: [rt] RT listening for mailbox commands...
3,100,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,234 UART: [rt]cmd =0x44504543, len=96
3,317,683 >>> mbox cmd response data (6236 bytes)
3,317,684 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,297 UART: [rt]cmd =0x52564348, len=36
3,349,346 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,316 UART:
192,694 UART: Running Caliptra ROM ...
193,879 UART:
194,025 UART: [state] CFI Enabled
262,922 UART: [state] LifecycleState = Unprovisioned
264,900 UART: [state] DebugLocked = No
267,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,514 UART: [kat] SHA2-256
441,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,703 UART: [kat] ++
452,151 UART: [kat] sha1
462,592 UART: [kat] SHA2-256
465,240 UART: [kat] SHA2-384
469,871 UART: [kat] SHA2-512-ACC
472,230 UART: [kat] ECC-384
2,769,383 UART: [kat] HMAC-384Kdf
2,800,748 UART: [kat] LMS
3,991,101 UART: [kat] --
3,994,033 UART: [cold-reset] ++
3,995,417 UART: [fht] Storing FHT @ 0x50003400
4,007,114 UART: [idev] ++
4,007,680 UART: [idev] CDI.KEYID = 6
4,008,636 UART: [idev] SUBJECT.KEYID = 7
4,009,874 UART: [idev] UDS.KEYID = 0
4,010,983 ready_for_fw is high
4,011,230 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,664 UART: [idev] Erasing UDS.KEYID = 0
7,349,375 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,912 UART: [idev] --
7,375,007 UART: [ldev] ++
7,375,586 UART: [ldev] CDI.KEYID = 6
7,376,541 UART: [ldev] SUBJECT.KEYID = 5
7,377,781 UART: [ldev] AUTHORITY.KEYID = 7
7,379,016 UART: [ldev] FE.KEYID = 1
7,422,933 UART: [ldev] Erasing FE.KEYID = 1
10,756,931 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,162 UART: [ldev] --
13,138,570 UART: [fwproc] Waiting for Commands...
13,140,723 UART: [fwproc] Received command 0x46574c44
13,142,898 UART: [fwproc] Received Image of size 114036 bytes
17,195,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,371 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,658,456 >>> mbox cmd response: success
17,662,878 UART: [afmc] ++
17,663,479 UART: [afmc] CDI.KEYID = 6
17,664,384 UART: [afmc] SUBJECT.KEYID = 7
17,665,601 UART: [afmc] AUTHORITY.KEYID = 5
21,030,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,767 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,170 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,039 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,487 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,428 UART: [afmc] --
23,401,993 UART: [cold-reset] --
23,406,658 UART: [state] Locking Datavault
23,410,286 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,042 UART: [state] Locking ICCM
23,414,756 UART: [exit] Launching FMC @ 0x40000130
23,423,142 UART:
23,423,370 UART: Running Caliptra FMC ...
23,424,388 UART:
23,424,527 UART: [state] CFI Enabled
23,491,104 UART: [fht] FMC Alias Private Key: 7
25,829,699 UART: [art] Extend RT PCRs Done
25,830,924 UART: [art] Lock RT PCRs Done
25,832,458 UART: [art] Populate DV Done
25,837,760 UART: [fht] FMC Alias Private Key: 7
25,839,308 UART: [art] Derive CDI
25,840,035 UART: [art] Store in in slot 0x4
25,899,613 UART: [art] Derive Key Pair
25,900,653 UART: [art] Store priv key in slot 0x5
29,193,285 UART: [art] Derive Key Pair - Done
29,206,228 UART: [art] Signing Cert with AUTHO
29,207,524 UART: RITY.KEYID = 7
31,494,607 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,124 UART: [art] PUB.X = DC573ED3E88B7645D94F7417252577208EFC31478F5B10D471989A83F9F9EBB593AFED441F01B9736BC4AC7EDAAD55B2
31,503,385 UART: [art] PUB.Y = D490D26E0C019EB4926E14BD3C04EE83F32229E4C1E9E3C3C8E2EF3681F8A48C1FE659B5048BDD48A831577CC7802D54
31,510,638 UART: [art] SIG.R = 89036E4B4298CB8E1B8D11174CF41DE354873CBC03F94D1A88614882A149530441E6B2BC7C514F9D59A57CA3D07E4BE5
31,517,996 UART: [art] SIG.S = B33DC83852B053D87165EE4108AEC65FBEC7E290AD8D4CBC1B5BF23E7896217800ACC8C6747ADBC3D79B7993DD9BFDB5
32,823,417 UART: Caliptra RT
32,824,136 UART: [state] CFI Enabled
32,984,808 UART: [rt] RT listening for mailbox commands...
32,986,684 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,016,738 UART: [rt]cmd =0x52564348, len=36
33,018,491 >>> mbox cmd response: failed
33,018,793 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,048,739 UART: [rt]cmd =0x52564348, len=36
33,050,520 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,782,143 ready_for_fw is high
3,782,582 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,856,674 >>> mbox cmd response: success
23,562,183 UART:
23,562,573 UART: Running Caliptra FMC ...
23,563,758 UART:
23,563,923 UART: [state] CFI Enabled
23,629,686 UART: [fht] FMC Alias Private Key: 7
25,967,816 UART: [art] Extend RT PCRs Done
25,969,037 UART: [art] Lock RT PCRs Done
25,970,663 UART: [art] Populate DV Done
25,975,965 UART: [fht] FMC Alias Private Key: 7
25,977,528 UART: [art] Derive CDI
25,978,345 UART: [art] Store in in slot 0x4
26,037,648 UART: [art] Derive Key Pair
26,038,643 UART: [art] Store priv key in slot 0x5
29,331,529 UART: [art] Derive Key Pair - Done
29,344,378 UART: [art] Signing Cert with AUTHO
29,345,680 UART: RITY.KEYID = 7
31,632,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,065 UART: [art] PUB.X = 46748D7856FF25A951EEDA9FBACD2A0809312998EDCF2C0B9672BFCE9A4DBB17824BB0467CA5E66A515FEE008A417008
31,641,432 UART: [art] PUB.Y = 8A7C22FE90DAD23432151E51FCD7A8844F95A782C299DB32590B15A62F8A14D04520CDDABA049195D84DD6BD773EAA9C
31,648,591 UART: [art] SIG.R = 5DBC95A60FE8532274C6857635C6B94BAC88C3FB003099AF27A1680D76E4D84A3CE7A924977F2892D1060E602A69C1D0
31,655,955 UART: [art] SIG.S = D4069F9AFC15846F479C257B5087B1CEB016C370448AF662220539C60FAC2C58741CB6AA94BC4358B6A756428BE4C062
32,960,832 UART: Caliptra RT
32,961,532 UART: [state] CFI Enabled
33,122,489 UART: [rt] RT listening for mailbox commands...
33,124,440 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,154,552 UART: [rt]cmd =0x52564348, len=36
33,156,261 >>> mbox cmd response: failed
33,156,555 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,186,624 UART: [rt]cmd =0x52564348, len=36
33,188,521 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,491 UART:
192,852 UART: Running Caliptra ROM ...
194,206 UART:
603,550 UART: [state] CFI Enabled
620,399 UART: [state] LifecycleState = Unprovisioned
622,338 UART: [state] DebugLocked = No
624,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,669 UART: [kat] SHA2-256
798,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,903 UART: [kat] ++
809,422 UART: [kat] sha1
819,864 UART: [kat] SHA2-256
822,589 UART: [kat] SHA2-384
828,808 UART: [kat] SHA2-512-ACC
831,178 UART: [kat] ECC-384
3,115,753 UART: [kat] HMAC-384Kdf
3,126,706 UART: [kat] LMS
4,316,829 UART: [kat] --
4,319,990 UART: [cold-reset] ++
4,321,287 UART: [fht] Storing FHT @ 0x50003400
4,332,982 UART: [idev] ++
4,333,618 UART: [idev] CDI.KEYID = 6
4,334,497 UART: [idev] SUBJECT.KEYID = 7
4,335,740 UART: [idev] UDS.KEYID = 0
4,336,697 ready_for_fw is high
4,336,892 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,086 UART: [idev] Erasing UDS.KEYID = 0
7,627,569 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,658 UART: [idev] --
7,654,890 UART: [ldev] ++
7,655,479 UART: [ldev] CDI.KEYID = 6
7,656,502 UART: [ldev] SUBJECT.KEYID = 5
7,657,662 UART: [ldev] AUTHORITY.KEYID = 7
7,658,890 UART: [ldev] FE.KEYID = 1
7,670,235 UART: [ldev] Erasing FE.KEYID = 1
10,956,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,444 UART: [ldev] --
13,313,842 UART: [fwproc] Waiting for Commands...
13,316,887 UART: [fwproc] Received command 0x46574c44
13,319,077 UART: [fwproc] Received Image of size 114036 bytes
17,368,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,832,546 >>> mbox cmd response: success
17,836,719 UART: [afmc] ++
17,837,318 UART: [afmc] CDI.KEYID = 6
17,838,226 UART: [afmc] SUBJECT.KEYID = 7
17,839,442 UART: [afmc] AUTHORITY.KEYID = 5
21,153,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,415 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,783 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,626 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,103 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,721 UART: [afmc] --
23,520,851 UART: [cold-reset] --
23,523,363 UART: [state] Locking Datavault
23,529,760 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,467 UART: [state] Locking ICCM
23,533,020 UART: [exit] Launching FMC @ 0x40000130
23,541,424 UART:
23,541,656 UART: Running Caliptra FMC ...
23,542,756 UART:
23,542,917 UART: [state] CFI Enabled
23,551,125 UART: [fht] FMC Alias Private Key: 7
25,881,684 UART: [art] Extend RT PCRs Done
25,882,906 UART: [art] Lock RT PCRs Done
25,884,633 UART: [art] Populate DV Done
25,890,156 UART: [fht] FMC Alias Private Key: 7
25,891,802 UART: [art] Derive CDI
25,892,616 UART: [art] Store in in slot 0x4
25,935,262 UART: [art] Derive Key Pair
25,936,263 UART: [art] Store priv key in slot 0x5
29,177,894 UART: [art] Derive Key Pair - Done
29,190,891 UART: [art] Signing Cert with AUTHO
29,192,190 UART: RITY.KEYID = 7
31,471,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,869 UART: [art] PUB.X = 05A9473CF4512BCE525575E3D6DA7A969163C6B0D68BF45D99C80FEA14F755F756697F90BC084C92F3FFBB74DAFC71FB
31,480,178 UART: [art] PUB.Y = 897FE9F89260F0FB3F1D02FFC16CDAD5FED837005EF35526AF3598E7E2AE5BF1BF676E6E8016036C29D2B3343845324E
31,487,407 UART: [art] SIG.R = E5C5F92560CA8E7DAE949783D88BF5468DB83ED7B545BA1E48DA05CC331314F5F778C85C223F9780AC14B3BF104081D5
31,494,784 UART: [art] SIG.S = 4DE416A509BAEAF08A21C75A4E3987C02A95188C8A3A43E90A317C59A49FE8614EAFDDFB0189A974B8501622C0245CDA
32,800,213 UART: Caliptra RT
32,800,923 UART: [state] CFI Enabled
32,917,835 UART: [rt] RT listening for mailbox commands...
32,919,714 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,949,792 UART: [rt]cmd =0x52564348, len=36
32,951,449 >>> mbox cmd response: failed
32,951,746 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,981,854 UART: [rt]cmd =0x52564348, len=36
32,983,354 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,128,369 ready_for_fw is high
4,129,049 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,073,495 >>> mbox cmd response: success
23,718,820 UART:
23,719,206 UART: Running Caliptra FMC ...
23,720,340 UART:
23,720,503 UART: [state] CFI Enabled
23,728,454 UART: [fht] FMC Alias Private Key: 7
26,059,622 UART: [art] Extend RT PCRs Done
26,060,869 UART: [art] Lock RT PCRs Done
26,062,506 UART: [art] Populate DV Done
26,067,880 UART: [fht] FMC Alias Private Key: 7
26,069,380 UART: [art] Derive CDI
26,070,197 UART: [art] Store in in slot 0x4
26,112,532 UART: [art] Derive Key Pair
26,113,534 UART: [art] Store priv key in slot 0x5
29,356,006 UART: [art] Derive Key Pair - Done
29,369,110 UART: [art] Signing Cert with AUTHO
29,370,420 UART: RITY.KEYID = 7
31,649,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,088 UART: [art] PUB.X = FAD506F7F784D310CE0A108DFD69EB9BEE82070320BBD481187549307387CDBDCE48A3AE1CD327168ADF8607BC6D83A7
31,658,367 UART: [art] PUB.Y = B2F471ABCCB4E7E0EDCBB6F608F50F71863554DE042D10D30A65454B792F320801193379752B4A4188B394CD9D5FBAA9
31,665,562 UART: [art] SIG.R = D25C78084C92010AEA7F8DECBFF3791E4FB62368577F2330AF88A4FAA19A1BD8BABAB58571D29C2181FFFBA3CCC4D9B3
31,672,988 UART: [art] SIG.S = BA245FAE9722E283806CA3618EABB3D03285CBF3D2447E6AF126647E1CD273137E88E898C50082BC0A00E453D64AFAE4
32,978,196 UART: Caliptra RT
32,978,932 UART: [state] CFI Enabled
33,096,115 UART: [rt] RT listening for mailbox commands...
33,097,998 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,128,186 UART: [rt]cmd =0x52564348, len=36
33,129,784 >>> mbox cmd response: failed
33,130,081 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,159,725 UART: [rt]cmd =0x52564348, len=36
33,161,575 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,458 UART:
192,832 UART: Running Caliptra ROM ...
193,985 UART:
194,136 UART: [state] CFI Enabled
267,193 UART: [state] LifecycleState = Unprovisioned
269,097 UART: [state] DebugLocked = No
271,633 UART: [state] WD Timer not started. Device not locked for debugging
276,021 UART: [kat] SHA2-256
455,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,740 UART: [kat] ++
467,274 UART: [kat] sha1
478,579 UART: [kat] SHA2-256
481,578 UART: [kat] SHA2-384
487,709 UART: [kat] SHA2-512-ACC
490,655 UART: [kat] ECC-384
2,950,617 UART: [kat] HMAC-384Kdf
2,974,278 UART: [kat] LMS
3,503,737 UART: [kat] --
3,508,661 UART: [cold-reset] ++
3,509,743 UART: [fht] FHT @ 0x50003400
3,520,651 UART: [idev] ++
3,521,213 UART: [idev] CDI.KEYID = 6
3,522,246 UART: [idev] SUBJECT.KEYID = 7
3,523,350 UART: [idev] UDS.KEYID = 0
3,524,273 ready_for_fw is high
3,524,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,355 UART: [idev] Erasing UDS.KEYID = 0
6,032,103 UART: [idev] Sha1 KeyId Algorithm
6,054,072 UART: [idev] --
6,057,397 UART: [ldev] ++
6,057,979 UART: [ldev] CDI.KEYID = 6
6,058,895 UART: [ldev] SUBJECT.KEYID = 5
6,060,058 UART: [ldev] AUTHORITY.KEYID = 7
6,061,293 UART: [ldev] FE.KEYID = 1
6,103,273 UART: [ldev] Erasing FE.KEYID = 1
8,608,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,276 UART: [ldev] --
10,416,286 UART: [fwproc] Wait for Commands...
10,419,085 UART: [fwproc] Recv command 0x46574c44
10,421,180 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,284,182 >>> mbox cmd response: success
14,289,244 UART: [afmc] ++
14,289,841 UART: [afmc] CDI.KEYID = 6
14,290,755 UART: [afmc] SUBJECT.KEYID = 7
14,291,918 UART: [afmc] AUTHORITY.KEYID = 5
16,833,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,673 UART: [afmc] --
18,634,198 UART: [cold-reset] --
18,638,704 UART: [state] Locking Datavault
18,642,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,565 UART: [state] Locking ICCM
18,646,984 UART: [exit] Launching FMC @ 0x40000130
18,655,381 UART:
18,655,616 UART: Running Caliptra FMC ...
18,656,716 UART:
18,656,882 UART: [state] CFI Enabled
18,715,910 UART: [fht] FMC Alias Private Key: 7
20,480,592 UART: [art] Extend RT PCRs Done
20,481,795 UART: [art] Lock RT PCRs Done
20,483,739 UART: [art] Populate DV Done
20,489,044 UART: [fht] FMC Alias Private Key: 7
20,490,550 UART: [art] Derive CDI
20,491,312 UART: [art] Store in in slot 0x4
20,548,833 UART: [art] Derive Key Pair
20,549,875 UART: [art] Store priv key in slot 0x5
23,012,602 UART: [art] Derive Key Pair - Done
23,025,278 UART: [art] Signing Cert with AUTHO
23,026,585 UART: RITY.KEYID = 7
24,738,977 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,465 UART: [art] PUB.X = DC30F5CE28CC2D3B43936C368CE655C49131B33818DF906E73B1554BAD2AA6B169777606D2D78C6E45F65FF3C5453489
24,747,734 UART: [art] PUB.Y = 0E5A76C47C69C1EA2D936673A2D82BE4330048D7C366E8499D4E89014804C506F445DBB14E532CAFBAE2A2F741584959
24,754,992 UART: [art] SIG.R = CB0F0A50761A89AD94F65E588FFF2DE83DD2C2F1994A0F223962C2D61C4FF9E4B85C51FC9A8F8230A822E2DE34D45E86
24,762,389 UART: [art] SIG.S = 4E541DFDFB1A3F399602ED2B90B8FB1C67072DABE7B37DC81160772B9AD374A90821FAA1BC6250C990934B07601403D9
25,741,233 UART: Caliptra RT
25,741,954 UART: [state] CFI Enabled
25,908,129 UART: [rt] RT listening for mailbox commands...
25,910,014 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,939,968 UART: [rt]cmd =0x52564348, len=36
25,941,732 >>> mbox cmd response: failed
25,942,039 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,972,165 UART: [rt]cmd =0x52564348, len=36
25,974,066 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,532 UART:
192,915 UART: Running Caliptra ROM ...
194,007 UART:
194,156 UART: [state] CFI Enabled
262,678 UART: [state] LifecycleState = Unprovisioned
265,042 UART: [state] DebugLocked = No
266,924 UART: [state] WD Timer not started. Device not locked for debugging
271,745 UART: [kat] SHA2-256
461,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,409 UART: [kat] ++
472,856 UART: [kat] sha1
485,427 UART: [kat] SHA2-256
488,459 UART: [kat] SHA2-384
493,984 UART: [kat] SHA2-512-ACC
496,607 UART: [kat] ECC-384
2,950,248 UART: [kat] HMAC-384Kdf
2,973,685 UART: [kat] LMS
3,505,476 UART: [kat] --
3,507,836 UART: [cold-reset] ++
3,510,268 UART: [fht] FHT @ 0x50003400
3,522,459 UART: [idev] ++
3,523,165 UART: [idev] CDI.KEYID = 6
3,524,081 UART: [idev] SUBJECT.KEYID = 7
3,525,334 UART: [idev] UDS.KEYID = 0
3,526,259 ready_for_fw is high
3,526,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,474 UART: [idev] Erasing UDS.KEYID = 0
6,028,591 UART: [idev] Sha1 KeyId Algorithm
6,050,934 UART: [idev] --
6,056,396 UART: [ldev] ++
6,057,081 UART: [ldev] CDI.KEYID = 6
6,057,995 UART: [ldev] SUBJECT.KEYID = 5
6,059,152 UART: [ldev] AUTHORITY.KEYID = 7
6,060,392 UART: [ldev] FE.KEYID = 1
6,101,658 UART: [ldev] Erasing FE.KEYID = 1
8,608,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,477 UART: [ldev] --
10,414,008 UART: [fwproc] Wait for Commands...
10,416,632 UART: [fwproc] Recv command 0x46574c44
10,418,892 UART: [fwproc] Recv'd Img size: 114360 bytes
13,863,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,598,389 >>> mbox cmd response: success
14,602,138 UART: [afmc] ++
14,602,852 UART: [afmc] CDI.KEYID = 6
14,604,046 UART: [afmc] SUBJECT.KEYID = 7
14,605,549 UART: [afmc] AUTHORITY.KEYID = 5
17,152,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,623 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,831 UART: [afmc] --
18,947,677 UART: [cold-reset] --
18,951,135 UART: [state] Locking Datavault
18,957,206 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,350 UART: [state] Locking ICCM
18,961,323 UART: [exit] Launching FMC @ 0x40000130
18,970,001 UART:
18,970,243 UART: Running Caliptra FMC ...
18,971,346 UART:
18,971,507 UART: [state] CFI Enabled
19,029,680 UART: [fht] FMC Alias Private Key: 7
20,793,834 UART: [art] Extend RT PCRs Done
20,795,046 UART: [art] Lock RT PCRs Done
20,796,857 UART: [art] Populate DV Done
20,802,158 UART: [fht] FMC Alias Private Key: 7
20,803,748 UART: [art] Derive CDI
20,804,484 UART: [art] Store in in slot 0x4
20,862,602 UART: [art] Derive Key Pair
20,863,657 UART: [art] Store priv key in slot 0x5
23,326,357 UART: [art] Derive Key Pair - Done
23,339,194 UART: [art] Signing Cert with AUTHO
23,340,495 UART: RITY.KEYID = 7
25,052,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,779 UART: [art] PUB.X = 3536EB462E0C45F47AC60D43EB3DBF42E9B7CB0DA322B87E49804A2B24F2BE422F7B3F0F7150C764F55BC8180EF6452B
25,060,956 UART: [art] PUB.Y = 21A9CBBBFC85D857BF7D07CA7948805D09BF26FA8AADAD0A8E61CC16D84935F238B86D89B118BD8F20F120697D8396B5
25,068,207 UART: [art] SIG.R = A5D3B01EEAF144461CA5783D9DD37469C8A7177C0E4F92C6C6A4A2EE0903F94892FE81E18388D8E1BAB70FF268BF55DA
25,075,588 UART: [art] SIG.S = BC26FB1B8A038AACB2202F97B53AE6DC078FB443C352F995F59D447B6C4D45110DAB08532B24F216214F122350839C89
26,054,356 UART: Caliptra RT
26,055,074 UART: [state] CFI Enabled
26,219,548 UART: [rt] RT listening for mailbox commands...
26,221,434 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,251,511 UART: [rt]cmd =0x52564348, len=36
26,253,434 >>> mbox cmd response: failed
26,253,769 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,283,750 UART: [rt]cmd =0x52564348, len=36
26,285,405 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,455,319 ready_for_fw is high
3,455,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,751,366 >>> mbox cmd response: success
19,034,496 UART:
19,034,906 UART: Running Caliptra FMC ...
19,036,015 UART:
19,036,171 UART: [state] CFI Enabled
19,105,106 UART: [fht] FMC Alias Private Key: 7
20,868,917 UART: [art] Extend RT PCRs Done
20,870,145 UART: [art] Lock RT PCRs Done
20,871,743 UART: [art] Populate DV Done
20,877,259 UART: [fht] FMC Alias Private Key: 7
20,878,965 UART: [art] Derive CDI
20,879,703 UART: [art] Store in in slot 0x4
20,937,848 UART: [art] Derive Key Pair
20,938,893 UART: [art] Store priv key in slot 0x5
23,401,913 UART: [art] Derive Key Pair - Done
23,415,128 UART: [art] Signing Cert with AUTHO
23,416,430 UART: RITY.KEYID = 7
25,128,372 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,886 UART: [art] PUB.X = C81672179FB34F5D0C33B15EA7AB301FD01C10DD551F95798C265B54164CD138B2F6A5A106955BA03E8B9714F84E2D95
25,137,156 UART: [art] PUB.Y = D39A397A13BE3BAE70C2377439B471F15303256D9B8D946660842A5FCC90B28913C1C37B66A8EEEDACA69578D0825215
25,144,377 UART: [art] SIG.R = 7E3FFDAE21D3E86EF499548625049F33A91848E249F654FEB3CA0AA6AA5F31716E40609C0B52673A3BCC5CBE1FB50A41
25,151,796 UART: [art] SIG.S = FF52CC497999329C685C2C0C0CB85E481F49956F0D477952D6CCD2E1B717E497EB5EA277288888C80F44ECC3E540E46E
26,130,479 UART: Caliptra RT
26,131,192 UART: [state] CFI Enabled
26,297,550 UART: [rt] RT listening for mailbox commands...
26,299,430 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,329,177 UART: [rt]cmd =0x52564348, len=36
26,331,205 >>> mbox cmd response: failed
26,331,523 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,361,404 UART: [rt]cmd =0x52564348, len=36
26,363,083 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,526 UART:
192,893 UART: Running Caliptra ROM ...
194,013 UART:
603,927 UART: [state] CFI Enabled
619,573 UART: [state] LifecycleState = Unprovisioned
621,939 UART: [state] DebugLocked = No
623,534 UART: [state] WD Timer not started. Device not locked for debugging
628,210 UART: [kat] SHA2-256
818,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,838 UART: [kat] ++
829,363 UART: [kat] sha1
840,801 UART: [kat] SHA2-256
843,810 UART: [kat] SHA2-384
851,433 UART: [kat] SHA2-512-ACC
854,015 UART: [kat] ECC-384
3,296,029 UART: [kat] HMAC-384Kdf
3,308,226 UART: [kat] LMS
3,840,050 UART: [kat] --
3,844,193 UART: [cold-reset] ++
3,845,341 UART: [fht] FHT @ 0x50003400
3,858,486 UART: [idev] ++
3,859,235 UART: [idev] CDI.KEYID = 6
3,860,123 UART: [idev] SUBJECT.KEYID = 7
3,861,370 UART: [idev] UDS.KEYID = 0
3,862,272 ready_for_fw is high
3,862,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,924 UART: [idev] Erasing UDS.KEYID = 0
6,338,796 UART: [idev] Sha1 KeyId Algorithm
6,359,838 UART: [idev] --
6,363,723 UART: [ldev] ++
6,364,397 UART: [ldev] CDI.KEYID = 6
6,365,321 UART: [ldev] SUBJECT.KEYID = 5
6,366,499 UART: [ldev] AUTHORITY.KEYID = 7
6,367,727 UART: [ldev] FE.KEYID = 1
6,378,154 UART: [ldev] Erasing FE.KEYID = 1
8,857,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,403 UART: [ldev] --
10,650,231 UART: [fwproc] Wait for Commands...
10,653,248 UART: [fwproc] Recv command 0x46574c44
10,655,500 UART: [fwproc] Recv'd Img size: 114360 bytes
14,100,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,013 >>> mbox cmd response: success
14,845,322 UART: [afmc] ++
14,846,047 UART: [afmc] CDI.KEYID = 6
14,847,237 UART: [afmc] SUBJECT.KEYID = 7
14,848,717 UART: [afmc] AUTHORITY.KEYID = 5
17,351,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,786 UART: [afmc] --
19,149,528 UART: [cold-reset] --
19,153,393 UART: [state] Locking Datavault
19,160,525 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,702 UART: [state] Locking ICCM
19,165,156 UART: [exit] Launching FMC @ 0x40000130
19,173,833 UART:
19,174,067 UART: Running Caliptra FMC ...
19,175,105 UART:
19,175,249 UART: [state] CFI Enabled
19,183,184 UART: [fht] FMC Alias Private Key: 7
20,940,298 UART: [art] Extend RT PCRs Done
20,941,510 UART: [art] Lock RT PCRs Done
20,943,264 UART: [art] Populate DV Done
20,948,456 UART: [fht] FMC Alias Private Key: 7
20,950,164 UART: [art] Derive CDI
20,950,977 UART: [art] Store in in slot 0x4
20,993,459 UART: [art] Derive Key Pair
20,994,499 UART: [art] Store priv key in slot 0x5
23,420,953 UART: [art] Derive Key Pair - Done
23,433,946 UART: [art] Signing Cert with AUTHO
23,435,243 UART: RITY.KEYID = 7
25,141,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,793 UART: [art] PUB.X = 4BFB8F713178CE9D79F8960ECDD91FA89938642902EAE32A353BC36F27ECF7AEA767AD3B32878E3386035DAA90E3324D
25,150,039 UART: [art] PUB.Y = 04CB58666169D5A9BD20179359C21FAF3F7B102686ECB9BD2A43696391998FF5497600741BAF1FC5CF17405701BD2E51
25,157,276 UART: [art] SIG.R = 00B098007564D0B9CF1791869B9823FC1227FBD5EE0FC28A00215C6B6DFB0EFCAC98ED141C897BD579EBCA43F3B0B9F8
25,164,621 UART: [art] SIG.S = 885E9E84289D5CAAC5D602C15930953E7C0BAEEE98B415AC9CF9FB17B5B585CE43DE6BB44CB9F4D6273BA2FF1B7D9DDC
26,143,238 UART: Caliptra RT
26,143,924 UART: [state] CFI Enabled
26,261,969 UART: [rt] RT listening for mailbox commands...
26,263,850 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,294,138 UART: [rt]cmd =0x52564348, len=36
26,296,053 >>> mbox cmd response: failed
26,296,354 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,326,359 UART: [rt]cmd =0x52564348, len=36
26,327,889 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,750,861 ready_for_fw is high
3,751,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,954,078 >>> mbox cmd response: success
19,204,841 UART:
19,205,222 UART: Running Caliptra FMC ...
19,206,347 UART:
19,206,513 UART: [state] CFI Enabled
19,214,517 UART: [fht] FMC Alias Private Key: 7
20,971,637 UART: [art] Extend RT PCRs Done
20,972,859 UART: [art] Lock RT PCRs Done
20,974,643 UART: [art] Populate DV Done
20,980,022 UART: [fht] FMC Alias Private Key: 7
20,981,627 UART: [art] Derive CDI
20,982,466 UART: [art] Store in in slot 0x4
21,025,172 UART: [art] Derive Key Pair
21,026,175 UART: [art] Store priv key in slot 0x5
23,452,721 UART: [art] Derive Key Pair - Done
23,465,762 UART: [art] Signing Cert with AUTHO
23,467,100 UART: RITY.KEYID = 7
25,172,435 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,933 UART: [art] PUB.X = 4064D080D2865DEBB8529BB8F99C0EE5770CFAAF4043A81B61A7C64E086FDBED4243293D6CD9EF3271F7D690EE006315
25,181,204 UART: [art] PUB.Y = 2137B1041FE937930BBC14D16FB27DD6FD1FB2091B54F6E4307107696812DB86238941D1461D95D4CD0D02C46D5E8696
25,188,463 UART: [art] SIG.R = C43C7FF488375A5F5AA430B5B400367A9DE4869D48A32EC3C52BD882995B0D1906474A48BC102D64C8809A8689F66878
25,195,807 UART: [art] SIG.S = F55471D894C477163724F1708D0D7F24048A3B1785705705D3C54B413CEED67A28072CE417A51F4A5FBB9433A2F008CB
26,174,861 UART: Caliptra RT
26,175,551 UART: [state] CFI Enabled
26,292,191 UART: [rt] RT listening for mailbox commands...
26,294,082 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,324,115 UART: [rt]cmd =0x52564348, len=36
26,325,865 >>> mbox cmd response: failed
26,326,169 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,356,016 UART: [rt]cmd =0x52564348, len=36
26,357,590 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,509 UART: [kat] SHA2-256
882,440 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,555 UART: [kat] ++
886,707 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,438 UART: [kat] SHA2-512-ACC
897,339 UART: [kat] ECC-384
903,178 UART: [kat] HMAC-384Kdf
907,772 UART: [kat] LMS
1,475,968 UART: [kat] --
1,477,001 UART: [cold-reset] ++
1,477,457 UART: [fht] Storing FHT @ 0x50003400
1,480,284 UART: [idev] ++
1,480,452 UART: [idev] CDI.KEYID = 6
1,480,812 UART: [idev] SUBJECT.KEYID = 7
1,481,236 UART: [idev] UDS.KEYID = 0
1,481,581 ready_for_fw is high
1,481,581 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,960 UART: [idev] Erasing UDS.KEYID = 0
1,506,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,864 UART: [idev] --
1,515,815 UART: [ldev] ++
1,515,983 UART: [ldev] CDI.KEYID = 6
1,516,346 UART: [ldev] SUBJECT.KEYID = 5
1,516,772 UART: [ldev] AUTHORITY.KEYID = 7
1,517,235 UART: [ldev] FE.KEYID = 1
1,522,455 UART: [ldev] Erasing FE.KEYID = 1
1,548,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,364 UART: [ldev] --
1,587,647 UART: [fwproc] Waiting for Commands...
1,588,364 UART: [fwproc] Received command 0x46574c44
1,589,155 UART: [fwproc] Received Image of size 114360 bytes
2,886,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,703 >>> mbox cmd response: success
3,080,737 UART: [afmc] ++
3,080,905 UART: [afmc] CDI.KEYID = 6
3,081,267 UART: [afmc] SUBJECT.KEYID = 7
3,081,692 UART: [afmc] AUTHORITY.KEYID = 5
3,116,877 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,607 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,220 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,910 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,937 UART: [afmc] --
3,159,881 UART: [cold-reset] --
3,160,555 UART: [state] Locking Datavault
3,161,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,254 UART: [state] Locking ICCM
3,162,840 UART: [exit] Launching FMC @ 0x40000130
3,168,169 UART:
3,168,185 UART: Running Caliptra FMC ...
3,168,593 UART:
3,168,647 UART: [state] CFI Enabled
3,179,138 UART: [fht] FMC Alias Private Key: 7
3,287,397 UART: [art] Extend RT PCRs Done
3,287,825 UART: [art] Lock RT PCRs Done
3,289,349 UART: [art] Populate DV Done
3,297,474 UART: [fht] FMC Alias Private Key: 7
3,298,440 UART: [art] Derive CDI
3,298,720 UART: [art] Store in in slot 0x4
3,384,281 UART: [art] Derive Key Pair
3,384,641 UART: [art] Store priv key in slot 0x5
3,397,879 UART: [art] Derive Key Pair - Done
3,412,476 UART: [art] Signing Cert with AUTHO
3,412,956 UART: RITY.KEYID = 7
3,427,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,543 UART: [art] PUB.X = 285EAF228D680A079D14091E6CDE243AC7D14B21ABAF63F2836879E3AE8716D9EFD1DE4D448BAEAC77314D99C4BCCD55
3,435,322 UART: [art] PUB.Y = DCEAF1096F24C77E7988B65FB8E10648611AEC89C9161CE4D8BB205A0B3A81C91BCEC301331739AF96159B9F1B58B43B
3,442,270 UART: [art] SIG.R = 0142FBD548E7D125CF9218B2A98477F301D51269DBE64E04C1D7A7FA31704B3F145A1FE2C2ABCA612F8B87AFCD424EDD
3,449,047 UART: [art] SIG.S = 3E2B75C55FF84682A22E6AE99BA5C4A5B2B846F6A8C657E0BCD2EB801F969EA43D939658BF7EFF09010A8040D80DB66F
3,472,144 UART: Caliptra RT
3,472,398 UART: [state] CFI Enabled
3,580,577 UART: [rt] RT listening for mailbox commands...
3,581,247 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,974 UART: [rt]cmd =0x52564348, len=36
3,612,234 >>> mbox cmd response: failed
3,612,234 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,948 UART: [rt]cmd =0x52564348, len=36
3,643,498 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,881 ready_for_fw is high
1,362,881 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,147 >>> mbox cmd response: success
2,990,063 UART:
2,990,079 UART: Running Caliptra FMC ...
2,990,487 UART:
2,990,541 UART: [state] CFI Enabled
3,001,014 UART: [fht] FMC Alias Private Key: 7
3,108,833 UART: [art] Extend RT PCRs Done
3,109,261 UART: [art] Lock RT PCRs Done
3,110,879 UART: [art] Populate DV Done
3,119,144 UART: [fht] FMC Alias Private Key: 7
3,120,254 UART: [art] Derive CDI
3,120,534 UART: [art] Store in in slot 0x4
3,206,091 UART: [art] Derive Key Pair
3,206,451 UART: [art] Store priv key in slot 0x5
3,219,411 UART: [art] Derive Key Pair - Done
3,234,174 UART: [art] Signing Cert with AUTHO
3,234,654 UART: RITY.KEYID = 7
3,250,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,175 UART: [art] PUB.X = C3FA77A8B6FDD0AFE5ABD364B81F28369913BDBBCEE2FB3FD81F652F37CEB3B149B3F8A02CC3C8C55E851D00EFFE35FC
3,257,957 UART: [art] PUB.Y = C7B1E453E1ACB592D970E258839E9C58407496839581D3F272C138BE1142FED123C0D9546BE4A6B692D2207821770EC8
3,264,898 UART: [art] SIG.R = 613682CA2B27DC676BF5659C3E33A6F1B03C6149723F5269E6DEF0788BC18F246F7F6D5B588F46E037222FC5F5E2093C
3,271,667 UART: [art] SIG.S = 90FBF0144EEB61B6AABAF14C7AD8B7C451112C30125FB7EDEF760D65A7B34084C80CBA1E76068CEFEB2AC4ED962DE573
3,295,625 UART: Caliptra RT
3,295,879 UART: [state] CFI Enabled
3,403,435 UART: [rt] RT listening for mailbox commands...
3,404,105 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,802 UART: [rt]cmd =0x52564348, len=36
3,435,260 >>> mbox cmd response: failed
3,435,260 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,732 UART: [rt]cmd =0x52564348, len=36
3,466,186 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,407 UART: [kat] SHA2-512-ACC
897,308 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,641 UART: [kat] LMS
1,475,837 UART: [kat] --
1,476,632 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 ready_for_fw is high
1,481,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,506,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,243 UART: [idev] --
1,516,114 UART: [ldev] ++
1,516,282 UART: [ldev] CDI.KEYID = 6
1,516,645 UART: [ldev] SUBJECT.KEYID = 5
1,517,071 UART: [ldev] AUTHORITY.KEYID = 7
1,517,534 UART: [ldev] FE.KEYID = 1
1,522,828 UART: [ldev] Erasing FE.KEYID = 1
1,548,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,605 UART: [ldev] --
1,588,084 UART: [fwproc] Waiting for Commands...
1,588,821 UART: [fwproc] Received command 0x46574c44
1,589,612 UART: [fwproc] Received Image of size 114360 bytes
2,888,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,916,345 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,945,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,081,632 >>> mbox cmd response: success
3,082,710 UART: [afmc] ++
3,082,878 UART: [afmc] CDI.KEYID = 6
3,083,240 UART: [afmc] SUBJECT.KEYID = 7
3,083,665 UART: [afmc] AUTHORITY.KEYID = 5
3,118,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,135,596 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,136,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,142,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,147,989 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,153,679 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,161,576 UART: [afmc] --
3,162,642 UART: [cold-reset] --
3,163,642 UART: [state] Locking Datavault
3,164,763 UART: [state] Locking PCR0, PCR1 and PCR31
3,165,367 UART: [state] Locking ICCM
3,165,871 UART: [exit] Launching FMC @ 0x40000130
3,171,200 UART:
3,171,216 UART: Running Caliptra FMC ...
3,171,624 UART:
3,171,767 UART: [state] CFI Enabled
3,182,466 UART: [fht] FMC Alias Private Key: 7
3,290,955 UART: [art] Extend RT PCRs Done
3,291,383 UART: [art] Lock RT PCRs Done
3,292,931 UART: [art] Populate DV Done
3,300,988 UART: [fht] FMC Alias Private Key: 7
3,301,998 UART: [art] Derive CDI
3,302,278 UART: [art] Store in in slot 0x4
3,388,135 UART: [art] Derive Key Pair
3,388,495 UART: [art] Store priv key in slot 0x5
3,401,627 UART: [art] Derive Key Pair - Done
3,416,505 UART: [art] Signing Cert with AUTHO
3,416,985 UART: RITY.KEYID = 7
3,431,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,432,702 UART: [art] PUB.X = 0CB86A7E2DD658B47216B550B939E1E36CFEEA91CAC55A80E0EADB745338BB60E135F74263C225DCF10CCEA735290C1A
3,439,479 UART: [art] PUB.Y = 545834D0424FEE1442A2E7BB459F6C1DC4888C1F8C69D83489C96F9F2ED85A8A2AF3AB01964AD2722FA1B8A01F6EC617
3,446,436 UART: [art] SIG.R = EC60F2362259DC862103487003CC00A2417BE61DD20EF1B3D5D29E7344DF29B2B267AA67F60D34B5364CEDBC6958C5DB
3,453,180 UART: [art] SIG.S = D44D0D8CDD0B3F0021CD1ADED7B22FC9B9C0B41C4545A8FAD527A745D7A686A606C600C30FB595C38998F6A7108CB782
3,477,035 UART: Caliptra RT
3,477,381 UART: [state] CFI Enabled
3,585,012 UART: [rt] RT listening for mailbox commands...
3,585,682 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,337 UART: [rt]cmd =0x52564348, len=36
3,616,629 >>> mbox cmd response: failed
3,616,629 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,423 UART: [rt]cmd =0x52564348, len=36
3,647,775 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,338 ready_for_fw is high
1,362,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,078 >>> mbox cmd response: success
2,991,966 UART:
2,991,982 UART: Running Caliptra FMC ...
2,992,390 UART:
2,992,533 UART: [state] CFI Enabled
3,002,880 UART: [fht] FMC Alias Private Key: 7
3,111,311 UART: [art] Extend RT PCRs Done
3,111,739 UART: [art] Lock RT PCRs Done
3,113,259 UART: [art] Populate DV Done
3,121,338 UART: [fht] FMC Alias Private Key: 7
3,122,456 UART: [art] Derive CDI
3,122,736 UART: [art] Store in in slot 0x4
3,208,573 UART: [art] Derive Key Pair
3,208,933 UART: [art] Store priv key in slot 0x5
3,222,415 UART: [art] Derive Key Pair - Done
3,236,918 UART: [art] Signing Cert with AUTHO
3,237,398 UART: RITY.KEYID = 7
3,252,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,555 UART: [art] PUB.X = 5C9AB9682B32ECBDC83F3D146998E92AE221C1EF5DB596157AE0CDB65CF8140BB2DE8964F628F627C9EEE1F13A68DCFC
3,260,344 UART: [art] PUB.Y = F87EB6BEEBE41A6D540F244F70CA2902D5F5A49F707B2830EF8BEFAC00EF26109062E9B9FFA9116A3C27C9A0E8D9D756
3,267,284 UART: [art] SIG.R = D02C5CAB076CA1A454C4FE47E7ECD552EA191DC72478516A0CFFDE4B02385A7C4A5F6DFFD576B14749CCC7C306BECD0E
3,274,065 UART: [art] SIG.S = 9B6F13A8BD41F8656F470CCC1BBFC7515FBD6F1625AD987D627FCC8DD9285A94FE09DEC14215A77F2D80E9DD53A0DAA0
3,297,572 UART: Caliptra RT
3,297,918 UART: [state] CFI Enabled
3,406,139 UART: [rt] RT listening for mailbox commands...
3,406,809 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,396 UART: [rt]cmd =0x52564348, len=36
3,438,038 >>> mbox cmd response: failed
3,438,038 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,708 UART: [rt]cmd =0x52564348, len=36
3,468,892 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
893,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,317 UART: [kat] ++
897,469 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,408 UART: [kat] SHA2-512-ACC
908,309 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,608 UART: [kat] LMS
1,170,936 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,080 UART: [idev] ++
1,175,248 UART: [idev] CDI.KEYID = 6
1,175,608 UART: [idev] SUBJECT.KEYID = 7
1,176,032 UART: [idev] UDS.KEYID = 0
1,176,377 ready_for_fw is high
1,176,377 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,898 UART: [idev] Erasing UDS.KEYID = 0
1,200,925 UART: [idev] Sha1 KeyId Algorithm
1,209,353 UART: [idev] --
1,210,587 UART: [ldev] ++
1,210,755 UART: [ldev] CDI.KEYID = 6
1,211,118 UART: [ldev] SUBJECT.KEYID = 5
1,211,544 UART: [ldev] AUTHORITY.KEYID = 7
1,212,007 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,940 UART: [fwproc] Wait for Commands...
1,282,726 UART: [fwproc] Recv command 0x46574c44
1,283,454 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,196 >>> mbox cmd response: success
2,774,256 UART: [afmc] ++
2,774,424 UART: [afmc] CDI.KEYID = 6
2,774,786 UART: [afmc] SUBJECT.KEYID = 7
2,775,211 UART: [afmc] AUTHORITY.KEYID = 5
2,810,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,721 UART: [afmc] --
2,853,827 UART: [cold-reset] --
2,854,791 UART: [state] Locking Datavault
2,856,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,658 UART: [state] Locking ICCM
2,857,244 UART: [exit] Launching FMC @ 0x40000130
2,862,573 UART:
2,862,589 UART: Running Caliptra FMC ...
2,862,997 UART:
2,863,051 UART: [state] CFI Enabled
2,873,278 UART: [fht] FMC Alias Private Key: 7
2,980,657 UART: [art] Extend RT PCRs Done
2,981,085 UART: [art] Lock RT PCRs Done
2,982,569 UART: [art] Populate DV Done
2,990,746 UART: [fht] FMC Alias Private Key: 7
2,991,850 UART: [art] Derive CDI
2,992,130 UART: [art] Store in in slot 0x4
3,077,783 UART: [art] Derive Key Pair
3,078,143 UART: [art] Store priv key in slot 0x5
3,091,097 UART: [art] Derive Key Pair - Done
3,105,965 UART: [art] Signing Cert with AUTHO
3,106,445 UART: RITY.KEYID = 7
3,121,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,240 UART: [art] PUB.X = 3A45CF9BBB5B867980DA85293DF26E8F68509383313B4C2048797DEB5CA8DAE8DE785E7CEB30BBB454B942480CB2FD3F
3,129,021 UART: [art] PUB.Y = 21E4992BC07315AAEDA228EF4E6B914B9940CD2397AAB131269F1448C03C29038C41557F8B87BD9DBE2DE64A3F62D100
3,135,952 UART: [art] SIG.R = 4122174FC4252C529EFF989E1DAE07D7DD71118B205783C2A47AFE58985EF06834164FC46ABF82F51DB8EB1E1BD04C3A
3,142,729 UART: [art] SIG.S = 996C3D600BB603D2220E2C2CF7A564073B29326C600C6AD06556B5AEB12A5DD0DFE2A4C6FF5CE0413DF75A0B5FB9C66B
3,166,770 UART: Caliptra RT
3,167,024 UART: [state] CFI Enabled
3,275,072 UART: [rt] RT listening for mailbox commands...
3,275,742 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,533 UART: [rt]cmd =0x52564348, len=36
3,306,959 >>> mbox cmd response: failed
3,306,959 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,733 UART: [rt]cmd =0x52564348, len=36
3,338,279 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 ready_for_fw is high
1,060,341 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,679 >>> mbox cmd response: success
2,689,423 UART:
2,689,439 UART: Running Caliptra FMC ...
2,689,847 UART:
2,689,901 UART: [state] CFI Enabled
2,700,110 UART: [fht] FMC Alias Private Key: 7
2,808,111 UART: [art] Extend RT PCRs Done
2,808,539 UART: [art] Lock RT PCRs Done
2,810,235 UART: [art] Populate DV Done
2,818,316 UART: [fht] FMC Alias Private Key: 7
2,819,314 UART: [art] Derive CDI
2,819,594 UART: [art] Store in in slot 0x4
2,905,431 UART: [art] Derive Key Pair
2,905,791 UART: [art] Store priv key in slot 0x5
2,919,261 UART: [art] Derive Key Pair - Done
2,933,979 UART: [art] Signing Cert with AUTHO
2,934,459 UART: RITY.KEYID = 7
2,949,689 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,454 UART: [art] PUB.X = 8CDA93D7FFD131CF01779A3B332A2CA3131747D049512BC4A0DA0493369BE299A1245FE251B67E7A67A6A8ED0DF13EB8
2,957,225 UART: [art] PUB.Y = A75E42660294ABF41D4F561F6E4564F2890C7151C767688B37DEB84BE353B1E3DBBD6EE41236DD30EDF877DB576F05DD
2,964,176 UART: [art] SIG.R = CFCAD11CED656AE271DCAFE452A915F0B4DC0D4D2C02C56CA827457C7F1EC0F9AB781F3A30728E70793CB45F3AADFBE7
2,970,968 UART: [art] SIG.S = D16448C9CA27541A699F8887F80D7CC90A4E01FBDAC14D223D43D7E579E3022B2C633893F5A6351D1DA20B740BAA3589
2,994,625 UART: Caliptra RT
2,994,879 UART: [state] CFI Enabled
3,102,240 UART: [rt] RT listening for mailbox commands...
3,102,910 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,787 UART: [rt]cmd =0x52564348, len=36
3,134,155 >>> mbox cmd response: failed
3,134,155 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,783 UART: [rt]cmd =0x52564348, len=36
3,165,185 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
893,683 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,808 UART: [kat] ++
897,960 UART: [kat] sha1
902,240 UART: [kat] SHA2-256
904,180 UART: [kat] SHA2-384
906,863 UART: [kat] SHA2-512-ACC
908,764 UART: [kat] ECC-384
918,297 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,439 UART: [idev] ++
1,175,607 UART: [idev] CDI.KEYID = 6
1,175,967 UART: [idev] SUBJECT.KEYID = 7
1,176,391 UART: [idev] UDS.KEYID = 0
1,176,736 ready_for_fw is high
1,176,736 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,931 UART: [idev] Erasing UDS.KEYID = 0
1,201,944 UART: [idev] Sha1 KeyId Algorithm
1,210,438 UART: [idev] --
1,211,516 UART: [ldev] ++
1,211,684 UART: [ldev] CDI.KEYID = 6
1,212,047 UART: [ldev] SUBJECT.KEYID = 5
1,212,473 UART: [ldev] AUTHORITY.KEYID = 7
1,212,936 UART: [ldev] FE.KEYID = 1
1,218,314 UART: [ldev] Erasing FE.KEYID = 1
1,245,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,524 UART: [ldev] --
1,284,959 UART: [fwproc] Wait for Commands...
1,285,605 UART: [fwproc] Recv command 0x46574c44
1,286,333 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,897 >>> mbox cmd response: success
2,778,019 UART: [afmc] ++
2,778,187 UART: [afmc] CDI.KEYID = 6
2,778,549 UART: [afmc] SUBJECT.KEYID = 7
2,778,974 UART: [afmc] AUTHORITY.KEYID = 5
2,814,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,802 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,415 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,134 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,880 UART: [afmc] --
2,857,882 UART: [cold-reset] --
2,858,732 UART: [state] Locking Datavault
2,859,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,197 UART: [state] Locking ICCM
2,860,725 UART: [exit] Launching FMC @ 0x40000130
2,866,054 UART:
2,866,070 UART: Running Caliptra FMC ...
2,866,478 UART:
2,866,621 UART: [state] CFI Enabled
2,877,420 UART: [fht] FMC Alias Private Key: 7
2,985,381 UART: [art] Extend RT PCRs Done
2,985,809 UART: [art] Lock RT PCRs Done
2,987,275 UART: [art] Populate DV Done
2,995,256 UART: [fht] FMC Alias Private Key: 7
2,996,392 UART: [art] Derive CDI
2,996,672 UART: [art] Store in in slot 0x4
3,082,353 UART: [art] Derive Key Pair
3,082,713 UART: [art] Store priv key in slot 0x5
3,096,113 UART: [art] Derive Key Pair - Done
3,110,735 UART: [art] Signing Cert with AUTHO
3,111,215 UART: RITY.KEYID = 7
3,126,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,246 UART: [art] PUB.X = EDB58EB25D062A57126F1BAF3E1E6D516C790DCFA7F8D808A9139C8982FD3A62D3ED0436867DB447019DB19CB44B023F
3,134,010 UART: [art] PUB.Y = D65485CC9ECB83F7A7C0DA9D7377467C21646E4BD6AD3234225644FD070F0F1630B57D711A942F01C822A23F676F1856
3,140,946 UART: [art] SIG.R = CDF2F6EF0C3792D711BD97897D18B9AA436EA645B08C5575EB33406E2687BC6C82FB7FCD7A48112E2394E5E2FBC654EE
3,147,727 UART: [art] SIG.S = 2A27E5653AC51073F1C005FF9807B614C04F52AA3FA6E0BDD5B8F47804F165B367AD399006BAC6B8DE047425F15954C2
3,171,467 UART: Caliptra RT
3,171,813 UART: [state] CFI Enabled
3,278,661 UART: [rt] RT listening for mailbox commands...
3,279,331 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,050 UART: [rt]cmd =0x52564348, len=36
3,310,614 >>> mbox cmd response: failed
3,310,614 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,292 UART: [rt]cmd =0x52564348, len=36
3,341,450 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,346 ready_for_fw is high
1,061,346 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,852 >>> mbox cmd response: success
2,690,550 UART:
2,690,566 UART: Running Caliptra FMC ...
2,690,974 UART:
2,691,117 UART: [state] CFI Enabled
2,701,620 UART: [fht] FMC Alias Private Key: 7
2,809,877 UART: [art] Extend RT PCRs Done
2,810,305 UART: [art] Lock RT PCRs Done
2,811,801 UART: [art] Populate DV Done
2,820,452 UART: [fht] FMC Alias Private Key: 7
2,821,456 UART: [art] Derive CDI
2,821,736 UART: [art] Store in in slot 0x4
2,907,135 UART: [art] Derive Key Pair
2,907,495 UART: [art] Store priv key in slot 0x5
2,920,995 UART: [art] Derive Key Pair - Done
2,936,024 UART: [art] Signing Cert with AUTHO
2,936,504 UART: RITY.KEYID = 7
2,951,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,429 UART: [art] PUB.X = CFBED04EF7324DED78DAF968A9EFF53037E57C17DB1F11F4CABA5BC1165A32599D562A440A690FA1DF55E9ACEAAF55D6
2,959,221 UART: [art] PUB.Y = C9C67EEC6E0C55E10DC19833EC18B937F205F93458C0E5E46F8F42F7A3C5F16E03BB03CE1A2BE2E849375F6A3D62FFEA
2,966,174 UART: [art] SIG.R = B51B1DB300009746EBFFD0C3D524C39A02075E474A5D5706E84E480E0B831F241F243B91EE8838338D35C87608409499
2,972,874 UART: [art] SIG.S = FF3BF726BA13811429FACD05E71D8E0187D6CCC6B184DC4C315BB040FBEE82BB322BE8AF05FFFFEA7F13E97C46440F66
2,997,075 UART: Caliptra RT
2,997,421 UART: [state] CFI Enabled
3,106,028 UART: [rt] RT listening for mailbox commands...
3,106,698 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,651 UART: [rt]cmd =0x52564348, len=36
3,138,169 >>> mbox cmd response: failed
3,138,169 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,695 UART: [rt]cmd =0x52564348, len=36
3,169,043 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,101 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,173,855 ready_for_fw is high
1,173,855 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,004 UART: [ldev] ++
1,209,172 UART: [ldev] CDI.KEYID = 6
1,209,536 UART: [ldev] SUBJECT.KEYID = 5
1,209,963 UART: [ldev] AUTHORITY.KEYID = 7
1,210,426 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,241,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,502 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,328 >>> mbox cmd response: success
2,773,511 UART: [afmc] ++
2,773,679 UART: [afmc] CDI.KEYID = 6
2,774,042 UART: [afmc] SUBJECT.KEYID = 7
2,774,468 UART: [afmc] AUTHORITY.KEYID = 5
2,809,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,770 UART: [afmc] --
2,852,814 UART: [cold-reset] --
2,853,782 UART: [state] Locking Datavault
2,854,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,579 UART: [state] Locking ICCM
2,856,231 UART: [exit] Launching FMC @ 0x40000130
2,861,560 UART:
2,861,576 UART: Running Caliptra FMC ...
2,861,984 UART:
2,862,038 UART: [state] CFI Enabled
2,872,365 UART: [fht] FMC Alias Private Key: 7
2,980,314 UART: [art] Extend RT PCRs Done
2,980,742 UART: [art] Lock RT PCRs Done
2,982,430 UART: [art] Populate DV Done
2,990,555 UART: [fht] FMC Alias Private Key: 7
2,991,719 UART: [art] Derive CDI
2,991,999 UART: [art] Store in in slot 0x4
3,077,866 UART: [art] Derive Key Pair
3,078,226 UART: [art] Store priv key in slot 0x5
3,091,064 UART: [art] Derive Key Pair - Done
3,105,809 UART: [art] Signing Cert with AUTHO
3,106,289 UART: RITY.KEYID = 7
3,121,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,352 UART: [art] PUB.X = D3FBAA38F64699ADC315B1E6F04B8B5653DB21A69768BB60A54F7C00FA4756246B153D8F81BD59815F7EFE13AB6DD1CE
3,129,116 UART: [art] PUB.Y = 0BCE1A3AA29B83B7D3A195B9770717808D41C1872962D534E5A364DE172604C5FFB68CF1565D87FE70B68C0E9F49F1BB
3,136,060 UART: [art] SIG.R = 47BDD4C17990C7930EAB39CAA6A66AB18CA209E02CA7C2A32539DE6CC3325CEB845068A19A34BAEA63E5839B6BD71E62
3,142,840 UART: [art] SIG.S = 51BADD0AECF8950B331C33343149238EF4B9DC069BA3B985B2D80A046C8C20DA7EE35F2A73D12E1AEC896CA3B533E321
3,166,650 UART: Caliptra RT
3,166,904 UART: [state] CFI Enabled
3,274,320 UART: [rt] RT listening for mailbox commands...
3,274,990 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,793 UART: [rt]cmd =0x52564348, len=36
3,306,247 >>> mbox cmd response: failed
3,306,247 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,579 UART: [rt]cmd =0x52564348, len=36
3,336,795 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,528 ready_for_fw is high
1,055,528 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,136 >>> mbox cmd response: success
2,683,076 UART:
2,683,092 UART: Running Caliptra FMC ...
2,683,500 UART:
2,683,554 UART: [state] CFI Enabled
2,694,635 UART: [fht] FMC Alias Private Key: 7
2,802,816 UART: [art] Extend RT PCRs Done
2,803,244 UART: [art] Lock RT PCRs Done
2,804,770 UART: [art] Populate DV Done
2,812,875 UART: [fht] FMC Alias Private Key: 7
2,813,809 UART: [art] Derive CDI
2,814,089 UART: [art] Store in in slot 0x4
2,899,472 UART: [art] Derive Key Pair
2,899,832 UART: [art] Store priv key in slot 0x5
2,912,970 UART: [art] Derive Key Pair - Done
2,927,530 UART: [art] Signing Cert with AUTHO
2,928,010 UART: RITY.KEYID = 7
2,943,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,405 UART: [art] PUB.X = EA70886B0266BF19851C60D9F902C70239ACBDDA1DCB32C638C737010356C6E4D06032049E6FCA582A8445C676F7E660
2,951,157 UART: [art] PUB.Y = 80B85317F5F3C3AF3DC721B544AA1FC811D0D5AE5C381D74CBF1DCF092CA8B70FE07EC1D840BE5A86601E98B7579B0F7
2,958,116 UART: [art] SIG.R = 20EBCB8A65871D09F96FC5A8E39F910E2B5065E141B67110E9425349623866FC3FA64914075C4A1F4EC572FF7973E2EF
2,964,877 UART: [art] SIG.S = 99430E43B8983DE5732B99594EB2C741E0A47607332DADA709EDD1F91DD3271BB16B1D8B382BD1F7CF005159837BEB3F
2,988,381 UART: Caliptra RT
2,988,635 UART: [state] CFI Enabled
3,095,879 UART: [rt] RT listening for mailbox commands...
3,096,549 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,102 UART: [rt]cmd =0x52564348, len=36
3,127,484 >>> mbox cmd response: failed
3,127,484 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,144 UART: [rt]cmd =0x52564348, len=36
3,158,348 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,350 UART: [kat] SHA2-256
902,290 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,171,030 UART: [cold-reset] ++
1,171,586 UART: [fht] FHT @ 0x50003400
1,174,184 UART: [idev] ++
1,174,352 UART: [idev] CDI.KEYID = 6
1,174,713 UART: [idev] SUBJECT.KEYID = 7
1,175,138 UART: [idev] UDS.KEYID = 0
1,175,484 ready_for_fw is high
1,175,484 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,908 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,429 UART: [ldev] SUBJECT.KEYID = 5
1,210,856 UART: [ldev] AUTHORITY.KEYID = 7
1,211,319 UART: [ldev] FE.KEYID = 1
1,216,339 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,713 UART: [ldev] --
1,282,097 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,471 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,675 >>> mbox cmd response: success
2,775,786 UART: [afmc] ++
2,775,954 UART: [afmc] CDI.KEYID = 6
2,776,317 UART: [afmc] SUBJECT.KEYID = 7
2,776,743 UART: [afmc] AUTHORITY.KEYID = 5
2,812,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,569 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,288 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,253 UART: [afmc] --
2,856,229 UART: [cold-reset] --
2,857,035 UART: [state] Locking Datavault
2,858,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,700 UART: [state] Locking ICCM
2,859,224 UART: [exit] Launching FMC @ 0x40000130
2,864,553 UART:
2,864,569 UART: Running Caliptra FMC ...
2,864,977 UART:
2,865,120 UART: [state] CFI Enabled
2,875,741 UART: [fht] FMC Alias Private Key: 7
2,983,622 UART: [art] Extend RT PCRs Done
2,984,050 UART: [art] Lock RT PCRs Done
2,985,458 UART: [art] Populate DV Done
2,993,713 UART: [fht] FMC Alias Private Key: 7
2,994,715 UART: [art] Derive CDI
2,994,995 UART: [art] Store in in slot 0x4
3,080,808 UART: [art] Derive Key Pair
3,081,168 UART: [art] Store priv key in slot 0x5
3,094,556 UART: [art] Derive Key Pair - Done
3,109,503 UART: [art] Signing Cert with AUTHO
3,109,983 UART: RITY.KEYID = 7
3,125,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,988 UART: [art] PUB.X = 6DDFBB2EB2B10CD8A9BF4F07D70654B953E39FB39C6E869B8E43DED971E395C4E4CE744CB97C512E74CF9544D29B447C
3,132,767 UART: [art] PUB.Y = 5DA3AC0E9B76977B581FAC9B2DD141A2D396681F8886E721D1D9ED34A44667038841109F705727C2444442C6A0C74807
3,139,700 UART: [art] SIG.R = 0C5D8FD3443F5B112B21B530A132D35EC699316D5081994D16F13C4D303C15BCE726ACE72AA355AAE28061692E73CBCE
3,146,473 UART: [art] SIG.S = 7766F8CB0AD442794667208BD776AC256B43B8956D9E63299A9376B71DFEA7A0F7E5548A20DF875E590F3A9BE258A95F
3,169,762 UART: Caliptra RT
3,170,108 UART: [state] CFI Enabled
3,277,652 UART: [rt] RT listening for mailbox commands...
3,278,322 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,897 UART: [rt]cmd =0x52564348, len=36
3,309,251 >>> mbox cmd response: failed
3,309,251 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,565 UART: [rt]cmd =0x52564348, len=36
3,339,979 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,889 ready_for_fw is high
1,055,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,541 >>> mbox cmd response: success
2,684,283 UART:
2,684,299 UART: Running Caliptra FMC ...
2,684,707 UART:
2,684,850 UART: [state] CFI Enabled
2,695,357 UART: [fht] FMC Alias Private Key: 7
2,803,462 UART: [art] Extend RT PCRs Done
2,803,890 UART: [art] Lock RT PCRs Done
2,805,512 UART: [art] Populate DV Done
2,813,785 UART: [fht] FMC Alias Private Key: 7
2,814,767 UART: [art] Derive CDI
2,815,047 UART: [art] Store in in slot 0x4
2,901,112 UART: [art] Derive Key Pair
2,901,472 UART: [art] Store priv key in slot 0x5
2,914,638 UART: [art] Derive Key Pair - Done
2,929,915 UART: [art] Signing Cert with AUTHO
2,930,395 UART: RITY.KEYID = 7
2,945,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,484 UART: [art] PUB.X = C7037D42B8E9E631E5BE73687B0CE444A4B7F1F07B8ADE3A2693F5FDC7122192A901BCE3CF8C62BDC46959D57E03AFD7
2,953,258 UART: [art] PUB.Y = 072FAEFA740B4ADF6748BC979BD087900FFCD1D8DB7394A883C1EACFEC7402295D3DFA68A03D8FC303B4BD0804BA94B4
2,960,209 UART: [art] SIG.R = 8D439072267C1E5A4828340B9079F634C2C08534E26F70FE3D04E67B994C331C1100C9E42603EBA5E6A7F71CBAC48A53
2,966,946 UART: [art] SIG.S = 870FA516535583164B5518276E6DA65025B9EB30E98DD238C84240406201A6F5D4102943EEEC00B12CD63536BD1CAFF3
2,990,767 UART: Caliptra RT
2,991,113 UART: [state] CFI Enabled
3,098,536 UART: [rt] RT listening for mailbox commands...
3,099,206 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,131 UART: [rt]cmd =0x52564348, len=36
3,130,569 >>> mbox cmd response: failed
3,130,569 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,279 UART: [rt]cmd =0x52564348, len=36
3,161,685 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,335 UART:
192,724 UART: Running Caliptra ROM ...
193,827 UART:
193,983 UART: [state] CFI Enabled
266,953 UART: [state] LifecycleState = Unprovisioned
268,935 UART: [state] DebugLocked = No
270,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,684 UART: [kat] SHA2-256
444,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,856 UART: [kat] ++
455,411 UART: [kat] sha1
467,556 UART: [kat] SHA2-256
470,276 UART: [kat] SHA2-384
476,681 UART: [kat] SHA2-512-ACC
479,041 UART: [kat] ECC-384
2,769,043 UART: [kat] HMAC-384Kdf
2,800,457 UART: [kat] LMS
3,990,773 UART: [kat] --
3,996,680 UART: [cold-reset] ++
3,998,552 UART: [fht] Storing FHT @ 0x50003400
4,010,453 UART: [idev] ++
4,011,020 UART: [idev] CDI.KEYID = 6
4,011,926 UART: [idev] SUBJECT.KEYID = 7
4,013,171 UART: [idev] UDS.KEYID = 0
4,014,123 ready_for_fw is high
4,014,319 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,726 UART: [idev] Erasing UDS.KEYID = 0
7,347,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,400 UART: [idev] --
7,373,658 UART: [ldev] ++
7,374,277 UART: [ldev] CDI.KEYID = 6
7,375,237 UART: [ldev] SUBJECT.KEYID = 5
7,376,440 UART: [ldev] AUTHORITY.KEYID = 7
7,377,795 UART: [ldev] FE.KEYID = 1
7,423,252 UART: [ldev] Erasing FE.KEYID = 1
10,757,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,345 UART: [ldev] --
13,138,565 UART: [fwproc] Waiting for Commands...
13,141,776 UART: [fwproc] Received command 0x46574c44
13,144,016 UART: [fwproc] Received Image of size 114036 bytes
21,544,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,627,339 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,696,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,013,308 >>> mbox cmd response: success
22,018,085 UART: [afmc] ++
22,018,703 UART: [afmc] CDI.KEYID = 6
22,019,781 UART: [afmc] SUBJECT.KEYID = 7
22,020,897 UART: [afmc] AUTHORITY.KEYID = 5
25,385,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,683,191 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,685,454 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,700,039 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,714,758 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,728,983 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,749,720 UART: [afmc] --
27,753,744 UART: [cold-reset] --
27,756,570 UART: [state] Locking Datavault
27,763,646 UART: [state] Locking PCR0, PCR1 and PCR31
27,765,337 UART: [state] Locking ICCM
27,766,832 UART: [exit] Launching FMC @ 0x40000130
27,775,222 UART:
27,775,449 UART: Running Caliptra FMC ...
27,776,539 UART:
27,776,712 UART: [state] CFI Enabled
27,843,740 UART: [fht] FMC Alias Private Key: 7
30,181,138 UART: [art] Extend RT PCRs Done
30,182,355 UART: [art] Lock RT PCRs Done
30,184,350 UART: [art] Populate DV Done
30,189,590 UART: [fht] FMC Alias Private Key: 7
30,191,116 UART: [art] Derive CDI
30,191,867 UART: [art] Store in in slot 0x4
30,251,107 UART: [art] Derive Key Pair
30,252,094 UART: [art] Store priv key in slot 0x5
33,544,763 UART: [art] Derive Key Pair - Done
33,557,658 UART: [art] Signing Cert with AUTHO
33,558,964 UART: RITY.KEYID = 7
35,845,682 UART: [art] Erasing AUTHORITY.KEYID = 7
35,847,186 UART: [art] PUB.X = CD33D9DFA040BF3BEF3D5EE36224BB7D2CA40E97701C2AE15EBD74EA9946CDFFEA8D2A1BBF1DAA1E277F5171321F6996
35,854,457 UART: [art] PUB.Y = EB32130BAA913C95CF64F9A49E3F6FEAC331D7384F48709DD217AC8EB3084285041DAF6AE6185C9F19B1788825E4830A
35,861,711 UART: [art] SIG.R = E1DAF0C07A887AEA8EC27DA45660E4D367A9F43AF8494408A35CBE9D85D15236C5FD761A247531DE48E998443EF77204
35,869,079 UART: [art] SIG.S = 9457ACD1A6F65195B6BE9895A1D31337103924070A730541C211861BE92EE60402B2955A55B6880DEC0A1A132BD741E5
37,174,165 UART: Caliptra RT
37,174,851 UART: [state] CFI Enabled
37,335,620 UART: [rt] RT listening for mailbox commands...
41,369,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,525,387 UART: [rt]cmd =0x41544d4e, len=14344
49,910,350 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,782,716 ready_for_fw is high
3,783,220 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,026,055 >>> mbox cmd response: success
27,722,337 UART:
27,722,751 UART: Running Caliptra FMC ...
27,723,889 UART:
27,724,043 UART: [state] CFI Enabled
27,793,668 UART: [fht] FMC Alias Private Key: 7
30,131,228 UART: [art] Extend RT PCRs Done
30,132,458 UART: [art] Lock RT PCRs Done
30,134,133 UART: [art] Populate DV Done
30,139,650 UART: [fht] FMC Alias Private Key: 7
30,141,298 UART: [art] Derive CDI
30,142,029 UART: [art] Store in in slot 0x4
30,202,149 UART: [art] Derive Key Pair
30,203,196 UART: [art] Store priv key in slot 0x5
33,496,057 UART: [art] Derive Key Pair - Done
33,509,288 UART: [art] Signing Cert with AUTHO
33,510,619 UART: RITY.KEYID = 7
35,797,124 UART: [art] Erasing AUTHORITY.KEYID = 7
35,798,654 UART: [art] PUB.X = 4B43E4FF11CE861D730D6C61751671F5B1C84E92441E953D601AD925922AD81181CF0B51134FD9B8FD54991028924591
35,805,828 UART: [art] PUB.Y = 25C7478AECB4B1A525AB768261CBD4290C82FAC64563B1DCA174648800962385DFD4AFC9B8ACA87C5A44B4E4C0D52F08
35,813,082 UART: [art] SIG.R = 6F15900E0AB16B7DF103C1BF3D9FB909F14EC897CF770830D89612DA3FE891A93673512CA0BF83823838361141FE5677
35,820,439 UART: [art] SIG.S = B55D79792011EFAEB7BFCEA4534AC28D45164D7489BB993C1118AD94F52F9DE57451884035DA1A8C019D12205B6A93A9
37,125,737 UART: Caliptra RT
37,126,450 UART: [state] CFI Enabled
37,285,630 UART: [rt] RT listening for mailbox commands...
41,316,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,471,543 UART: [rt]cmd =0x41544d4e, len=14344
49,960,042 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,529 UART:
192,893 UART: Running Caliptra ROM ...
194,079 UART:
603,874 UART: [state] CFI Enabled
618,609 UART: [state] LifecycleState = Unprovisioned
620,558 UART: [state] DebugLocked = No
622,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,091 UART: [kat] SHA2-256
797,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,350 UART: [kat] ++
808,827 UART: [kat] sha1
820,126 UART: [kat] SHA2-256
822,876 UART: [kat] SHA2-384
827,267 UART: [kat] SHA2-512-ACC
829,603 UART: [kat] ECC-384
3,114,829 UART: [kat] HMAC-384Kdf
3,126,754 UART: [kat] LMS
4,316,857 UART: [kat] --
4,318,176 UART: [cold-reset] ++
4,319,470 UART: [fht] Storing FHT @ 0x50003400
4,331,672 UART: [idev] ++
4,332,306 UART: [idev] CDI.KEYID = 6
4,333,191 UART: [idev] SUBJECT.KEYID = 7
4,334,435 UART: [idev] UDS.KEYID = 0
4,335,428 ready_for_fw is high
4,335,647 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,164 UART: [idev] Erasing UDS.KEYID = 0
7,622,049 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,081 UART: [idev] --
7,646,422 UART: [ldev] ++
7,646,998 UART: [ldev] CDI.KEYID = 6
7,647,960 UART: [ldev] SUBJECT.KEYID = 5
7,649,174 UART: [ldev] AUTHORITY.KEYID = 7
7,650,455 UART: [ldev] FE.KEYID = 1
7,661,745 UART: [ldev] Erasing FE.KEYID = 1
10,947,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,202 UART: [ldev] --
13,308,910 UART: [fwproc] Waiting for Commands...
13,311,708 UART: [fwproc] Received command 0x46574c44
13,313,942 UART: [fwproc] Received Image of size 114036 bytes
21,787,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,873,185 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,942,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,258,947 >>> mbox cmd response: success
22,263,915 UART: [afmc] ++
22,264,728 UART: [afmc] CDI.KEYID = 6
22,265,645 UART: [afmc] SUBJECT.KEYID = 7
22,266,750 UART: [afmc] AUTHORITY.KEYID = 5
25,580,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,877,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,879,297 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,893,858 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,908,595 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,922,842 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,944,305 UART: [afmc] --
27,948,476 UART: [cold-reset] --
27,952,365 UART: [state] Locking Datavault
27,959,235 UART: [state] Locking PCR0, PCR1 and PCR31
27,960,942 UART: [state] Locking ICCM
27,963,090 UART: [exit] Launching FMC @ 0x40000130
27,971,487 UART:
27,971,719 UART: Running Caliptra FMC ...
27,972,818 UART:
27,972,975 UART: [state] CFI Enabled
27,981,123 UART: [fht] FMC Alias Private Key: 7
30,311,935 UART: [art] Extend RT PCRs Done
30,313,157 UART: [art] Lock RT PCRs Done
30,314,721 UART: [art] Populate DV Done
30,320,185 UART: [fht] FMC Alias Private Key: 7
30,321,882 UART: [art] Derive CDI
30,322,695 UART: [art] Store in in slot 0x4
30,365,347 UART: [art] Derive Key Pair
30,366,407 UART: [art] Store priv key in slot 0x5
33,608,349 UART: [art] Derive Key Pair - Done
33,621,137 UART: [art] Signing Cert with AUTHO
33,622,442 UART: RITY.KEYID = 7
35,901,699 UART: [art] Erasing AUTHORITY.KEYID = 7
35,903,210 UART: [art] PUB.X = 590F570C7A4B10EEBB76DC9FDE2B176A3868E6DBADAD52D2819A4C200B7607B674F779412EC099A842314F1353F20EC1
35,910,425 UART: [art] PUB.Y = 2E14FEE8F2EE95D93F9F8C5A10CE248A1029C290493C69B0055AD303B80762B62556BE9A3C9D2360317AB7BFA2A40F39
35,917,670 UART: [art] SIG.R = 4FBB1CD266E3E3F119C0C55C3D0F268E3AAC5E835A664AF55154ADC1F9A37B7302E0772465D70CA49941A91C9969DDCC
35,925,079 UART: [art] SIG.S = CB90F034632AE678F9C18556D0385EA09304724BCE5E562A68348F9DE3E358A5C49C08D6B907DEAF0F882DB8ADF0E08C
37,230,161 UART: Caliptra RT
37,230,866 UART: [state] CFI Enabled
37,349,180 UART: [rt] RT listening for mailbox commands...
41,369,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,525,966 UART: [rt]cmd =0x41544d4e, len=14344
49,858,657 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,124,981 ready_for_fw is high
4,125,394 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,037,827 >>> mbox cmd response: success
27,679,623 UART:
27,680,019 UART: Running Caliptra FMC ...
27,681,134 UART:
27,681,315 UART: [state] CFI Enabled
27,689,375 UART: [fht] FMC Alias Private Key: 7
30,019,940 UART: [art] Extend RT PCRs Done
30,021,173 UART: [art] Lock RT PCRs Done
30,022,805 UART: [art] Populate DV Done
30,028,502 UART: [fht] FMC Alias Private Key: 7
30,030,157 UART: [art] Derive CDI
30,030,976 UART: [art] Store in in slot 0x4
30,073,249 UART: [art] Derive Key Pair
30,074,251 UART: [art] Store priv key in slot 0x5
33,316,056 UART: [art] Derive Key Pair - Done
33,329,265 UART: [art] Signing Cert with AUTHO
33,330,573 UART: RITY.KEYID = 7
35,610,204 UART: [art] Erasing AUTHORITY.KEYID = 7
35,611,716 UART: [art] PUB.X = 30D120BFF3CAFB74C2128A98E49F5BAA30DA330E4FA0C967CDE326D087638538DE867CF0A6CC62445021DE978A13F10D
35,618,963 UART: [art] PUB.Y = 248D205D28AFB44BFE8F1FE3376CE2054EE7F7C88B92073FA7267166C4DE063D173C3641C5FC45DF99CBE073C03185C0
35,626,191 UART: [art] SIG.R = 88A1FAC00CEE576D7E508C3A86489B9704033B8D7CCC7B9615B5FF6FAA09BB5F3C7F3231F489C06F208C4CF263924A7D
35,633,621 UART: [art] SIG.S = 7FDCF73D471048DEDD8AC18332F56A217144584A04AB0DC2FB6A7FD2A5AE7907F622DD5B48FFAF7725FC2B6BD635A2E7
36,939,096 UART: Caliptra RT
36,939,812 UART: [state] CFI Enabled
37,057,811 UART: [rt] RT listening for mailbox commands...
41,080,528 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,236,125 UART: [rt]cmd =0x41544d4e, len=14344
49,543,154 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,517 UART:
192,894 UART: Running Caliptra ROM ...
194,046 UART:
194,200 UART: [state] CFI Enabled
261,339 UART: [state] LifecycleState = Unprovisioned
263,210 UART: [state] DebugLocked = No
264,752 UART: [state] WD Timer not started. Device not locked for debugging
268,151 UART: [kat] SHA2-256
447,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,797 UART: [kat] ++
459,328 UART: [kat] sha1
470,870 UART: [kat] SHA2-256
473,875 UART: [kat] SHA2-384
480,290 UART: [kat] SHA2-512-ACC
483,235 UART: [kat] ECC-384
2,927,245 UART: [kat] HMAC-384Kdf
2,952,131 UART: [kat] LMS
3,481,598 UART: [kat] --
3,486,029 UART: [cold-reset] ++
3,487,779 UART: [fht] FHT @ 0x50003400
3,498,553 UART: [idev] ++
3,499,121 UART: [idev] CDI.KEYID = 6
3,500,034 UART: [idev] SUBJECT.KEYID = 7
3,501,212 UART: [idev] UDS.KEYID = 0
3,502,137 ready_for_fw is high
3,502,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,646,153 UART: [idev] Erasing UDS.KEYID = 0
6,007,400 UART: [idev] Sha1 KeyId Algorithm
6,031,060 UART: [idev] --
6,034,736 UART: [ldev] ++
6,035,307 UART: [ldev] CDI.KEYID = 6
6,036,219 UART: [ldev] SUBJECT.KEYID = 5
6,037,381 UART: [ldev] AUTHORITY.KEYID = 7
6,038,669 UART: [ldev] FE.KEYID = 1
6,080,751 UART: [ldev] Erasing FE.KEYID = 1
8,583,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,300 UART: [ldev] --
10,391,920 UART: [fwproc] Wait for Commands...
10,394,123 UART: [fwproc] Recv command 0x46574c44
10,396,238 UART: [fwproc] Recv'd Img size: 114360 bytes
14,957,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,033,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,102,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,420,079 >>> mbox cmd response: success
15,423,834 UART: [afmc] ++
15,424,434 UART: [afmc] CDI.KEYID = 6
15,425,347 UART: [afmc] SUBJECT.KEYID = 7
15,426,512 UART: [afmc] AUTHORITY.KEYID = 5
17,956,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,821 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,701,744 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,717,736 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,733,554 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,756,612 UART: [afmc] --
19,759,910 UART: [cold-reset] --
19,763,077 UART: [state] Locking Datavault
19,767,951 UART: [state] Locking PCR0, PCR1 and PCR31
19,769,595 UART: [state] Locking ICCM
19,771,153 UART: [exit] Launching FMC @ 0x40000130
19,779,611 UART:
19,779,849 UART: Running Caliptra FMC ...
19,780,954 UART:
19,781,119 UART: [state] CFI Enabled
19,841,813 UART: [fht] FMC Alias Private Key: 7
21,605,708 UART: [art] Extend RT PCRs Done
21,606,928 UART: [art] Lock RT PCRs Done
21,608,343 UART: [art] Populate DV Done
21,614,030 UART: [fht] FMC Alias Private Key: 7
21,615,678 UART: [art] Derive CDI
21,616,503 UART: [art] Store in in slot 0x4
21,673,840 UART: [art] Derive Key Pair
21,674,885 UART: [art] Store priv key in slot 0x5
24,137,969 UART: [art] Derive Key Pair - Done
24,151,125 UART: [art] Signing Cert with AUTHO
24,152,425 UART: RITY.KEYID = 7
25,863,730 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,237 UART: [art] PUB.X = BE9214866DFD948926440C5E840DE603E5C0A6098374C838C767E4BAB353E94FE3965BE5347C07D099D740A0F3EED424
25,872,456 UART: [art] PUB.Y = 22B855B8721AFB3F9757A2A98DF20A691F9F6FD30EA5A6B75D23EBC297493D501521D9995CAAAF668686477F8E280351
25,879,724 UART: [art] SIG.R = 9EF8778967E98E6ED3318660920C8F19EE38FD1728E4F030F85CA8A9BE7A38C658F07138FC098D6114D04A84BC43712A
25,887,117 UART: [art] SIG.S = 1B5B3515D296849A5D7447DF59983FED9DB8D3987B8F352D3B3B7C035B07AB1910B5021A202883D6CBF0916906604CD4
26,865,983 UART: Caliptra RT
26,866,666 UART: [state] CFI Enabled
27,031,018 UART: [rt] RT listening for mailbox commands...
31,054,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,209,784 UART: [rt]cmd =0x41544d4e, len=14344
36,008,464 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
192,718 UART:
193,075 UART: Running Caliptra ROM ...
194,272 UART:
194,427 UART: [state] CFI Enabled
262,711 UART: [state] LifecycleState = Unprovisioned
265,129 UART: [state] DebugLocked = No
266,370 UART: [state] WD Timer not started. Device not locked for debugging
270,974 UART: [kat] SHA2-256
460,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,582 UART: [kat] ++
472,085 UART: [kat] sha1
483,464 UART: [kat] SHA2-256
486,478 UART: [kat] SHA2-384
493,683 UART: [kat] SHA2-512-ACC
496,269 UART: [kat] ECC-384
2,949,661 UART: [kat] HMAC-384Kdf
2,971,850 UART: [kat] LMS
3,503,637 UART: [kat] --
3,507,234 UART: [cold-reset] ++
3,509,404 UART: [fht] FHT @ 0x50003400
3,521,226 UART: [idev] ++
3,521,954 UART: [idev] CDI.KEYID = 6
3,522,880 UART: [idev] SUBJECT.KEYID = 7
3,524,134 UART: [idev] UDS.KEYID = 0
3,525,061 ready_for_fw is high
3,525,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,160 UART: [idev] Erasing UDS.KEYID = 0
6,025,189 UART: [idev] Sha1 KeyId Algorithm
6,047,774 UART: [idev] --
6,053,500 UART: [ldev] ++
6,054,184 UART: [ldev] CDI.KEYID = 6
6,055,076 UART: [ldev] SUBJECT.KEYID = 5
6,056,250 UART: [ldev] AUTHORITY.KEYID = 7
6,057,404 UART: [ldev] FE.KEYID = 1
6,100,381 UART: [ldev] Erasing FE.KEYID = 1
8,609,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,203 UART: [ldev] --
10,415,393 UART: [fwproc] Wait for Commands...
10,418,408 UART: [fwproc] Recv command 0x46574c44
10,420,724 UART: [fwproc] Recv'd Img size: 114360 bytes
15,071,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,155,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,271,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,813,694 >>> mbox cmd response: success
15,818,015 UART: [afmc] ++
15,818,738 UART: [afmc] CDI.KEYID = 6
15,819,927 UART: [afmc] SUBJECT.KEYID = 7
15,821,424 UART: [afmc] AUTHORITY.KEYID = 5
18,366,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,090,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,092,753 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,107,788 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,123,000 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,137,864 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,160,530 UART: [afmc] --
20,164,460 UART: [cold-reset] --
20,169,631 UART: [state] Locking Datavault
20,175,812 UART: [state] Locking PCR0, PCR1 and PCR31
20,177,963 UART: [state] Locking ICCM
20,179,575 UART: [exit] Launching FMC @ 0x40000130
20,188,258 UART:
20,188,495 UART: Running Caliptra FMC ...
20,189,600 UART:
20,189,758 UART: [state] CFI Enabled
20,246,565 UART: [fht] FMC Alias Private Key: 7
22,009,866 UART: [art] Extend RT PCRs Done
22,011,089 UART: [art] Lock RT PCRs Done
22,012,529 UART: [art] Populate DV Done
22,017,521 UART: [fht] FMC Alias Private Key: 7
22,018,966 UART: [art] Derive CDI
22,019,700 UART: [art] Store in in slot 0x4
22,078,204 UART: [art] Derive Key Pair
22,079,248 UART: [art] Store priv key in slot 0x5
24,554,735 UART: [art] Derive Key Pair - Done
24,567,778 UART: [art] Signing Cert with AUTHO
24,569,074 UART: RITY.KEYID = 7
26,281,432 UART: [art] Erasing AUTHORITY.KEYID = 7
26,282,939 UART: [art] PUB.X = 6AC519709009267165981367AB0F0CBB50B887FB5083DACE9FD786762FFC1342AB7522CC3FCBCD165EAE55F89316BDBF
26,290,167 UART: [art] PUB.Y = 291E24AC658E1DDF21CBA39A75895C5EA1E2C0BAD946B3EEA08E96362EB6FB1EDCB37DFF8ABABA9BD3C4D4C3BF2E9C21
26,297,492 UART: [art] SIG.R = 20D52666B1B48A2D08D7B7FADA04960BB03871BD01EF5D0672A4BC90A687E47D95C7F9A5465F950490A0F191C1366BE7
26,304,915 UART: [art] SIG.S = 88F6C2D4737683CDABBE719160AD751BEA51960B0B275AB4591BEACF95BA282F4FD91FB40B6D5B3561BDE62839099130
27,283,507 UART: Caliptra RT
27,284,195 UART: [state] CFI Enabled
27,449,236 UART: [rt] RT listening for mailbox commands...
31,476,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,631,805 UART: [rt]cmd =0x41544d4e, len=14344
36,414,880 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,439,006 ready_for_fw is high
3,439,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,825,085 >>> mbox cmd response: success
20,115,250 UART:
20,115,645 UART: Running Caliptra FMC ...
20,116,760 UART:
20,116,913 UART: [state] CFI Enabled
20,183,580 UART: [fht] FMC Alias Private Key: 7
21,947,356 UART: [art] Extend RT PCRs Done
21,948,577 UART: [art] Lock RT PCRs Done
21,950,395 UART: [art] Populate DV Done
21,955,804 UART: [fht] FMC Alias Private Key: 7
21,957,513 UART: [art] Derive CDI
21,958,253 UART: [art] Store in in slot 0x4
22,015,911 UART: [art] Derive Key Pair
22,016,916 UART: [art] Store priv key in slot 0x5
24,479,606 UART: [art] Derive Key Pair - Done
24,492,547 UART: [art] Signing Cert with AUTHO
24,493,856 UART: RITY.KEYID = 7
26,205,221 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,739 UART: [art] PUB.X = 6FDC0F8E96FC072A0A9A9F3672EAF948940130B580B178DDFE88C0634FB194099DC1D3061FDAC23640004175B4A74355
26,213,978 UART: [art] PUB.Y = 5A6CE5B7F8E2C9A114315AC3C9E4CAD50C784549BACC229345DD10A425ED9BD0F85A4E9D26FCD14CDA9E3E8F68A3BEF1
26,221,255 UART: [art] SIG.R = 95EC128A31AE9E290CC7BC11E1C8E685B61E0E09FDC0456A04D9AD9563BFC10C7C28E3BFF352859852105458C6DFA67A
26,228,678 UART: [art] SIG.S = F1A0902190AAB5C7E13D1B3C0974F25116A46EE0D81FCF18445DA536F5459B6560B26C0C77C52D06C14D441C390BAF42
27,208,043 UART: Caliptra RT
27,208,733 UART: [state] CFI Enabled
27,371,724 UART: [rt] RT listening for mailbox commands...
31,395,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,551,137 UART: [rt]cmd =0x41544d4e, len=14344
36,336,662 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,506 UART:
192,864 UART: Running Caliptra ROM ...
194,409 UART:
603,739 UART: [state] CFI Enabled
616,190 UART: [state] LifecycleState = Unprovisioned
618,551 UART: [state] DebugLocked = No
620,211 UART: [state] WD Timer not started. Device not locked for debugging
625,455 UART: [kat] SHA2-256
815,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,089 UART: [kat] ++
826,612 UART: [kat] sha1
837,155 UART: [kat] SHA2-256
840,199 UART: [kat] SHA2-384
845,835 UART: [kat] SHA2-512-ACC
848,414 UART: [kat] ECC-384
3,293,206 UART: [kat] HMAC-384Kdf
3,305,970 UART: [kat] LMS
3,837,772 UART: [kat] --
3,842,431 UART: [cold-reset] ++
3,844,582 UART: [fht] FHT @ 0x50003400
3,854,921 UART: [idev] ++
3,855,565 UART: [idev] CDI.KEYID = 6
3,856,548 UART: [idev] SUBJECT.KEYID = 7
3,857,725 UART: [idev] UDS.KEYID = 0
3,858,652 ready_for_fw is high
3,858,847 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,479 UART: [idev] Erasing UDS.KEYID = 0
6,336,880 UART: [idev] Sha1 KeyId Algorithm
6,358,110 UART: [idev] --
6,362,509 UART: [ldev] ++
6,363,193 UART: [ldev] CDI.KEYID = 6
6,364,106 UART: [ldev] SUBJECT.KEYID = 5
6,365,336 UART: [ldev] AUTHORITY.KEYID = 7
6,366,513 UART: [ldev] FE.KEYID = 1
6,377,588 UART: [ldev] Erasing FE.KEYID = 1
8,856,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,819 UART: [ldev] --
10,650,144 UART: [fwproc] Wait for Commands...
10,651,693 UART: [fwproc] Recv command 0x46574c44
10,653,944 UART: [fwproc] Recv'd Img size: 114360 bytes
15,263,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,344,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,460,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,003,043 >>> mbox cmd response: success
16,007,932 UART: [afmc] ++
16,008,646 UART: [afmc] CDI.KEYID = 6
16,009,830 UART: [afmc] SUBJECT.KEYID = 7
16,011,317 UART: [afmc] AUTHORITY.KEYID = 5
18,515,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,237,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,239,452 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,254,527 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,269,698 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,284,580 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,308,931 UART: [afmc] --
20,312,579 UART: [cold-reset] --
20,316,335 UART: [state] Locking Datavault
20,321,469 UART: [state] Locking PCR0, PCR1 and PCR31
20,323,651 UART: [state] Locking ICCM
20,324,718 UART: [exit] Launching FMC @ 0x40000130
20,333,395 UART:
20,333,635 UART: Running Caliptra FMC ...
20,334,732 UART:
20,334,895 UART: [state] CFI Enabled
20,343,102 UART: [fht] FMC Alias Private Key: 7
22,099,828 UART: [art] Extend RT PCRs Done
22,101,049 UART: [art] Lock RT PCRs Done
22,102,673 UART: [art] Populate DV Done
22,107,978 UART: [fht] FMC Alias Private Key: 7
22,109,459 UART: [art] Derive CDI
22,110,217 UART: [art] Store in in slot 0x4
22,153,028 UART: [art] Derive Key Pair
22,154,073 UART: [art] Store priv key in slot 0x5
24,580,412 UART: [art] Derive Key Pair - Done
24,593,436 UART: [art] Signing Cert with AUTHO
24,594,781 UART: RITY.KEYID = 7
26,300,320 UART: [art] Erasing AUTHORITY.KEYID = 7
26,301,825 UART: [art] PUB.X = FCF3769A748D87B1E25E1C1930C25371AA9322D3D5A6C6322102F7789C65B26CF4D09ABAEB21F9FC715BFE30E768E938
26,309,134 UART: [art] PUB.Y = E4E44A6007BD2224C867E658656851B70658FEC8E7303BD7D485FBB7EAFF638F14F0FACCF9AE2DDB95A1C966A30C4F75
26,316,375 UART: [art] SIG.R = 56DB45ED300BEFE99B338C2FBCAFE098CE658EE5B73C63B2FC5CE3F4B1545A179176BCFAA0D4911B3A092063163D6203
26,323,823 UART: [art] SIG.S = F8100C4BA6065E6032D844CDE451ED45B8175A52AEE8E0B6D41214F4C7F86C1A75EC5C069D5B70AE3F0C1598CB7D1947
27,302,311 UART: Caliptra RT
27,303,002 UART: [state] CFI Enabled
27,419,531 UART: [rt] RT listening for mailbox commands...
31,440,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,596,372 UART: [rt]cmd =0x41544d4e, len=14344
36,383,856 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,752,996 ready_for_fw is high
3,753,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,070,847 >>> mbox cmd response: success
20,321,178 UART:
20,321,567 UART: Running Caliptra FMC ...
20,322,752 UART:
20,322,922 UART: [state] CFI Enabled
20,330,879 UART: [fht] FMC Alias Private Key: 7
22,087,222 UART: [art] Extend RT PCRs Done
22,088,456 UART: [art] Lock RT PCRs Done
22,090,224 UART: [art] Populate DV Done
22,095,800 UART: [fht] FMC Alias Private Key: 7
22,097,455 UART: [art] Derive CDI
22,098,197 UART: [art] Store in in slot 0x4
22,140,897 UART: [art] Derive Key Pair
22,141,897 UART: [art] Store priv key in slot 0x5
24,567,984 UART: [art] Derive Key Pair - Done
24,580,715 UART: [art] Signing Cert with AUTHO
24,582,015 UART: RITY.KEYID = 7
26,286,886 UART: [art] Erasing AUTHORITY.KEYID = 7
26,288,397 UART: [art] PUB.X = 4025561A53D0139FE97A234163CB9D730E9BA1D74780F88945223089ABB760FA01B6FA3C423A876CE9CF4FE9A1C2572F
26,295,650 UART: [art] PUB.Y = F2BC27C2330C9991543550943404114DEF3BD7E07759140FA7061FF1FA9786C84DC94C4164FA439E1FE56076DCA88FE6
26,302,914 UART: [art] SIG.R = C013EBC0C9ECE76E2D11412368BBE81FB6C68D84D42BA0C79F50E9760C297C3F9572B39234BB6344FB1AD99CBD047EF7
26,310,341 UART: [art] SIG.S = 7E787F57F734E4DE0FA3A1064B497C64A729935F0FC97D854C111F71871F1F97A048CAE5AE5823AB1D0CD1ACE0DD3E0E
27,289,946 UART: Caliptra RT
27,290,665 UART: [state] CFI Enabled
27,408,391 UART: [rt] RT listening for mailbox commands...
31,429,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,584,693 UART: [rt]cmd =0x41544d4e, len=14344
36,358,830 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,561 UART: [kat] SHA2-256
892,499 UART: [kat] SHA2-384
895,428 UART: [kat] SHA2-512-ACC
897,329 UART: [kat] ECC-384
902,832 UART: [kat] HMAC-384Kdf
907,302 UART: [kat] LMS
1,475,498 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,841 UART: [fht] Storing FHT @ 0x50003400
1,479,710 UART: [idev] ++
1,479,878 UART: [idev] CDI.KEYID = 6
1,480,238 UART: [idev] SUBJECT.KEYID = 7
1,480,662 UART: [idev] UDS.KEYID = 0
1,481,007 ready_for_fw is high
1,481,007 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,762 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,343 UART: [ldev] ++
1,514,511 UART: [ldev] CDI.KEYID = 6
1,514,874 UART: [ldev] SUBJECT.KEYID = 5
1,515,300 UART: [ldev] AUTHORITY.KEYID = 7
1,515,763 UART: [ldev] FE.KEYID = 1
1,520,705 UART: [ldev] Erasing FE.KEYID = 1
1,546,022 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,844 UART: [ldev] --
1,585,343 UART: [fwproc] Waiting for Commands...
1,586,074 UART: [fwproc] Received command 0x46574c44
1,586,865 UART: [fwproc] Received Image of size 114360 bytes
5,308,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,336,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,366,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,502,031 >>> mbox cmd response: success
5,503,187 UART: [afmc] ++
5,503,355 UART: [afmc] CDI.KEYID = 6
5,503,717 UART: [afmc] SUBJECT.KEYID = 7
5,504,142 UART: [afmc] AUTHORITY.KEYID = 5
5,538,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,554,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,555,752 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,561,461 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,567,353 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,573,054 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,581,030 UART: [afmc] --
5,582,110 UART: [cold-reset] --
5,582,998 UART: [state] Locking Datavault
5,584,339 UART: [state] Locking PCR0, PCR1 and PCR31
5,584,943 UART: [state] Locking ICCM
5,585,535 UART: [exit] Launching FMC @ 0x40000130
5,590,864 UART:
5,590,880 UART: Running Caliptra FMC ...
5,591,288 UART:
5,591,342 UART: [state] CFI Enabled
5,602,110 UART: [fht] FMC Alias Private Key: 7
5,709,250 UART: [art] Extend RT PCRs Done
5,709,678 UART: [art] Lock RT PCRs Done
5,711,214 UART: [art] Populate DV Done
5,719,454 UART: [fht] FMC Alias Private Key: 7
5,720,562 UART: [art] Derive CDI
5,720,842 UART: [art] Store in in slot 0x4
5,806,687 UART: [art] Derive Key Pair
5,807,047 UART: [art] Store priv key in slot 0x5
5,820,391 UART: [art] Derive Key Pair - Done
5,834,971 UART: [art] Signing Cert with AUTHO
5,835,451 UART: RITY.KEYID = 7
5,851,007 UART: [art] Erasing AUTHORITY.KEYID = 7
5,851,772 UART: [art] PUB.X = 7FECA255D45D5B0E38F95F4912B6B5355180BDF84B7E4223C5435844179F861E9D0F594774E7C7A06A7332D6D7D0682A
5,858,534 UART: [art] PUB.Y = BB1304E005FDFAECC9858494EC998B48265B700F99817DFB57F82876C0002E9CEBBE0E3D8DC126003FD9C35C1B8EE245
5,865,440 UART: [art] SIG.R = FBF94F52790D06B339D97B5741AB664259474107A13725A62FCCC1EA8588C8171BDA3F812AA836C73DD732ED3B54EF8C
5,872,207 UART: [art] SIG.S = 50F4AAF7AC7A175814747B8300B0E5296B07E9EC6DD5894C31780C973ED2FFDBCD80C1D352F4A8AFFE61E314AED5289F
5,896,126 UART: Caliptra RT
5,896,380 UART: [state] CFI Enabled
6,004,488 UART: [rt] RT listening for mailbox commands...
6,005,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,739 UART: [rt]cmd =0x41544d4e, len=14344
7,373,309 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,353 ready_for_fw is high
1,362,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,429,511 >>> mbox cmd response: success
5,491,060 UART:
5,491,076 UART: Running Caliptra FMC ...
5,491,484 UART:
5,491,538 UART: [state] CFI Enabled
5,501,674 UART: [fht] FMC Alias Private Key: 7
5,609,278 UART: [art] Extend RT PCRs Done
5,609,706 UART: [art] Lock RT PCRs Done
5,611,412 UART: [art] Populate DV Done
5,619,808 UART: [fht] FMC Alias Private Key: 7
5,620,876 UART: [art] Derive CDI
5,621,156 UART: [art] Store in in slot 0x4
5,707,141 UART: [art] Derive Key Pair
5,707,501 UART: [art] Store priv key in slot 0x5
5,720,819 UART: [art] Derive Key Pair - Done
5,735,400 UART: [art] Signing Cert with AUTHO
5,735,880 UART: RITY.KEYID = 7
5,751,116 UART: [art] Erasing AUTHORITY.KEYID = 7
5,751,881 UART: [art] PUB.X = B4BB19E66AEC5C8222AD2F5286312C1994313A3411F51AD07A1EB24E1A15BD5F57FA809B171D1F25D7F938486D4EFD97
5,758,659 UART: [art] PUB.Y = B6502748B1F0BD2BCE98B973A2FD870F13FF777543CA2F5482D14861F5912D237A2FD232F8F70AC6AD0CCC36085F9998
5,765,603 UART: [art] SIG.R = C341DD5C279571C80095D0E8FF07DC31CC451D61A390592AF78DAB6121164E1711526E31F60A854E436EE03C3B0D182F
5,772,342 UART: [art] SIG.S = 76149ACD6746F06FAB068B6696D31044AB03C39BC14EE54398A32CEA984049A16A5F57CA8AD9B6A1C0FF6F56A3077A77
5,796,886 UART: Caliptra RT
5,797,140 UART: [state] CFI Enabled
5,905,632 UART: [rt] RT listening for mailbox commands...
5,906,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,029,027 UART: [rt]cmd =0x41544d4e, len=14344
7,272,630 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,224 UART: [kat] SHA2-256
882,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,270 UART: [kat] ++
886,422 UART: [kat] sha1
890,780 UART: [kat] SHA2-256
892,718 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,675 UART: [kat] LMS
1,475,871 UART: [kat] --
1,476,892 UART: [cold-reset] ++
1,477,452 UART: [fht] Storing FHT @ 0x50003400
1,480,361 UART: [idev] ++
1,480,529 UART: [idev] CDI.KEYID = 6
1,480,889 UART: [idev] SUBJECT.KEYID = 7
1,481,313 UART: [idev] UDS.KEYID = 0
1,481,658 ready_for_fw is high
1,481,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,337 UART: [idev] Erasing UDS.KEYID = 0
1,505,653 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,445 UART: [idev] --
1,515,496 UART: [ldev] ++
1,515,664 UART: [ldev] CDI.KEYID = 6
1,516,027 UART: [ldev] SUBJECT.KEYID = 5
1,516,453 UART: [ldev] AUTHORITY.KEYID = 7
1,516,916 UART: [ldev] FE.KEYID = 1
1,522,100 UART: [ldev] Erasing FE.KEYID = 1
1,547,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,115 UART: [ldev] --
1,586,378 UART: [fwproc] Waiting for Commands...
1,587,045 UART: [fwproc] Received command 0x46574c44
1,587,836 UART: [fwproc] Received Image of size 114360 bytes
5,271,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,684 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,330,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,465,987 >>> mbox cmd response: success
5,467,135 UART: [afmc] ++
5,467,303 UART: [afmc] CDI.KEYID = 6
5,467,665 UART: [afmc] SUBJECT.KEYID = 7
5,468,090 UART: [afmc] AUTHORITY.KEYID = 5
5,503,230 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,284 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,525,993 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,531,885 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,586 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,290 UART: [afmc] --
5,546,192 UART: [cold-reset] --
5,547,042 UART: [state] Locking Datavault
5,548,139 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,743 UART: [state] Locking ICCM
5,549,217 UART: [exit] Launching FMC @ 0x40000130
5,554,546 UART:
5,554,562 UART: Running Caliptra FMC ...
5,554,970 UART:
5,555,113 UART: [state] CFI Enabled
5,565,671 UART: [fht] FMC Alias Private Key: 7
5,673,099 UART: [art] Extend RT PCRs Done
5,673,527 UART: [art] Lock RT PCRs Done
5,675,269 UART: [art] Populate DV Done
5,683,545 UART: [fht] FMC Alias Private Key: 7
5,684,479 UART: [art] Derive CDI
5,684,759 UART: [art] Store in in slot 0x4
5,770,216 UART: [art] Derive Key Pair
5,770,576 UART: [art] Store priv key in slot 0x5
5,783,570 UART: [art] Derive Key Pair - Done
5,798,390 UART: [art] Signing Cert with AUTHO
5,798,870 UART: RITY.KEYID = 7
5,814,582 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,347 UART: [art] PUB.X = 103A323F8CDDA0C76BE4B2EB436E9FC4E30FC0C3F2A9BCA420A1B8C9958B394AAD4758BF7FB5115CCDC852B952BEAFC1
5,822,142 UART: [art] PUB.Y = 224AE88FD3276048DE3F25CC8AE366ECC3B689B7C33F58017C134BC9603D93709F09F9F459CE476F7330A32AEE1C6F44
5,829,092 UART: [art] SIG.R = 5BC3CD0FC44BEC5F89B2BD8AE90261B8EABAE7D8B7CA835FA1D654CFBDC004A6219158644D349CBABFB7D25DB8BA2F14
5,835,885 UART: [art] SIG.S = 5D09A3B38E02F360A2CCF3E285984DA7DA61FF156EDF1893044ED53BB61D2DF56421AD7926BA74A4E1F45BCE54504631
5,859,527 UART: Caliptra RT
5,859,873 UART: [state] CFI Enabled
5,967,824 UART: [rt] RT listening for mailbox commands...
5,968,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,379 UART: [rt]cmd =0x41544d4e, len=14344
7,327,023 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,277,484 >>> mbox cmd response: success
5,339,753 UART:
5,339,769 UART: Running Caliptra FMC ...
5,340,177 UART:
5,340,320 UART: [state] CFI Enabled
5,350,840 UART: [fht] FMC Alias Private Key: 7
5,458,442 UART: [art] Extend RT PCRs Done
5,458,870 UART: [art] Lock RT PCRs Done
5,460,316 UART: [art] Populate DV Done
5,468,548 UART: [fht] FMC Alias Private Key: 7
5,469,720 UART: [art] Derive CDI
5,470,000 UART: [art] Store in in slot 0x4
5,556,151 UART: [art] Derive Key Pair
5,556,511 UART: [art] Store priv key in slot 0x5
5,570,081 UART: [art] Derive Key Pair - Done
5,585,057 UART: [art] Signing Cert with AUTHO
5,585,537 UART: RITY.KEYID = 7
5,601,103 UART: [art] Erasing AUTHORITY.KEYID = 7
5,601,868 UART: [art] PUB.X = C6F7AD05FAAEF4AE017FD24E6CFEEB3545B8F0469D2EF8730E2035474B39F600F538281004DF12609ABDE132E771B712
5,608,614 UART: [art] PUB.Y = 3B04C3F3941FE10AEC5272F5B8DA8A84DC52A4BA19D5192D2F3A84AF3760169F0534C8701E15D002B08D0705338ED301
5,615,545 UART: [art] SIG.R = 9FE234F6E186185307B5C305A6A8A9AA1FEE088933C2F8E9CFC6947D30105B6BF2BB0F1F62D9235B94F1AFADC8A673B6
5,622,317 UART: [art] SIG.S = 79F53E29379A46036AACBAF99E68698479A4028F78625CBF5F11820FF50441148FE696746A5414C731B9ED604A0FAC79
5,645,917 UART: Caliptra RT
5,646,263 UART: [state] CFI Enabled
5,754,933 UART: [rt] RT listening for mailbox commands...
5,755,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,374 UART: [rt]cmd =0x41544d4e, len=14344
7,104,278 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
892,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,025 UART: [kat] ++
897,177 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,092 UART: [kat] SHA2-512-ACC
907,993 UART: [kat] ECC-384
917,584 UART: [kat] HMAC-384Kdf
922,366 UART: [kat] LMS
1,170,694 UART: [kat] --
1,171,587 UART: [cold-reset] ++
1,172,143 UART: [fht] FHT @ 0x50003400
1,174,832 UART: [idev] ++
1,175,000 UART: [idev] CDI.KEYID = 6
1,175,360 UART: [idev] SUBJECT.KEYID = 7
1,175,784 UART: [idev] UDS.KEYID = 0
1,176,129 ready_for_fw is high
1,176,129 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,785 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,173 UART: [ldev] ++
1,210,341 UART: [ldev] CDI.KEYID = 6
1,210,704 UART: [ldev] SUBJECT.KEYID = 5
1,211,130 UART: [ldev] AUTHORITY.KEYID = 7
1,211,593 UART: [ldev] FE.KEYID = 1
1,217,119 UART: [ldev] Erasing FE.KEYID = 1
1,243,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,643 UART: [ldev] --
1,282,946 UART: [fwproc] Wait for Commands...
1,283,744 UART: [fwproc] Recv command 0x46574c44
1,284,472 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,311,339 >>> mbox cmd response: success
3,312,399 UART: [afmc] ++
3,312,567 UART: [afmc] CDI.KEYID = 6
3,312,929 UART: [afmc] SUBJECT.KEYID = 7
3,313,354 UART: [afmc] AUTHORITY.KEYID = 5
3,348,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,429 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,138 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,030 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,741 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,580 UART: [afmc] --
3,391,468 UART: [cold-reset] --
3,392,504 UART: [state] Locking Datavault
3,393,477 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,081 UART: [state] Locking ICCM
3,394,641 UART: [exit] Launching FMC @ 0x40000130
3,399,970 UART:
3,399,986 UART: Running Caliptra FMC ...
3,400,394 UART:
3,400,448 UART: [state] CFI Enabled
3,410,982 UART: [fht] FMC Alias Private Key: 7
3,518,706 UART: [art] Extend RT PCRs Done
3,519,134 UART: [art] Lock RT PCRs Done
3,520,406 UART: [art] Populate DV Done
3,528,602 UART: [fht] FMC Alias Private Key: 7
3,529,592 UART: [art] Derive CDI
3,529,872 UART: [art] Store in in slot 0x4
3,615,457 UART: [art] Derive Key Pair
3,615,817 UART: [art] Store priv key in slot 0x5
3,629,249 UART: [art] Derive Key Pair - Done
3,644,302 UART: [art] Signing Cert with AUTHO
3,644,782 UART: RITY.KEYID = 7
3,660,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,939 UART: [art] PUB.X = 1D06B046F8730F234554F7B3FA995AAF7468D7DAD6414790C09B19EF0525CEE0A5BF826775F2A79118A4ACD897407933
3,667,700 UART: [art] PUB.Y = 7A6C099CEFB5CFE0194F6C99A1014A20F9766DD7DDB4DDFDE915D361834E8EB3DA3EE6D303D52C447378F39CE6BB7DD7
3,674,663 UART: [art] SIG.R = A0B4F0F532DCB563996968B6973B8AC37423800483BF2EDD03F0A5609A63B0E61DEDF71183988977AC85635974EB6A7F
3,681,427 UART: [art] SIG.S = 085C2F7D2543907D28344ADB78D4D0D42E722B71A2D394C7A9B552C5B3472910DE9DA81ED0AECFE9E27CBE9A1E1D4457
3,705,245 UART: Caliptra RT
3,705,499 UART: [state] CFI Enabled
3,812,868 UART: [rt] RT listening for mailbox commands...
3,813,538 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,111 UART: [rt]cmd =0x41544d4e, len=14344
5,159,506 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 ready_for_fw is high
1,060,173 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,174,583 >>> mbox cmd response: success
3,237,210 UART:
3,237,226 UART: Running Caliptra FMC ...
3,237,634 UART:
3,237,688 UART: [state] CFI Enabled
3,248,342 UART: [fht] FMC Alias Private Key: 7
3,355,766 UART: [art] Extend RT PCRs Done
3,356,194 UART: [art] Lock RT PCRs Done
3,357,838 UART: [art] Populate DV Done
3,366,224 UART: [fht] FMC Alias Private Key: 7
3,367,188 UART: [art] Derive CDI
3,367,468 UART: [art] Store in in slot 0x4
3,453,139 UART: [art] Derive Key Pair
3,453,499 UART: [art] Store priv key in slot 0x5
3,466,567 UART: [art] Derive Key Pair - Done
3,481,453 UART: [art] Signing Cert with AUTHO
3,481,933 UART: RITY.KEYID = 7
3,497,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,862 UART: [art] PUB.X = B94305EE220E696D27116D307AB832774BBEEDF0DB58B6514FA30E0DBEBE366A55EE3AFAA368EB7853F4418312093B2D
3,504,629 UART: [art] PUB.Y = 18A42B16D74BADD22FFCFC2A2BE6DD6D8F6EC6C1AE0EC45657555BDB74C12DC08E60EA31F27F3BA10BB5D1223DEB6BBD
3,511,607 UART: [art] SIG.R = FE5314DDD53E2DBA5BDA55F1B82EBE57CDA56D561495FEA4A4A6D16E52EC3EFA1DF9EA98E3111DB936161597D0771B3B
3,518,401 UART: [art] SIG.S = 15966B1A3AF275C7ED00C6420EC8382E64CD27C22986C71B8CD2EF17136DD4E699229D26C545E21C4C0CB5DAC5804A72
3,541,992 UART: Caliptra RT
3,542,246 UART: [state] CFI Enabled
3,650,161 UART: [rt] RT listening for mailbox commands...
3,650,831 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,530 UART: [rt]cmd =0x41544d4e, len=14344
4,989,484 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,393 UART: [kat] SHA2-256
893,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,168 UART: [kat] ++
897,320 UART: [kat] sha1
901,442 UART: [kat] SHA2-256
903,382 UART: [kat] SHA2-384
906,111 UART: [kat] SHA2-512-ACC
908,012 UART: [kat] ECC-384
917,855 UART: [kat] HMAC-384Kdf
922,599 UART: [kat] LMS
1,170,927 UART: [kat] --
1,171,964 UART: [cold-reset] ++
1,172,366 UART: [fht] FHT @ 0x50003400
1,175,083 UART: [idev] ++
1,175,251 UART: [idev] CDI.KEYID = 6
1,175,611 UART: [idev] SUBJECT.KEYID = 7
1,176,035 UART: [idev] UDS.KEYID = 0
1,176,380 ready_for_fw is high
1,176,380 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,369 UART: [idev] Erasing UDS.KEYID = 0
1,200,982 UART: [idev] Sha1 KeyId Algorithm
1,209,398 UART: [idev] --
1,210,480 UART: [ldev] ++
1,210,648 UART: [ldev] CDI.KEYID = 6
1,211,011 UART: [ldev] SUBJECT.KEYID = 5
1,211,437 UART: [ldev] AUTHORITY.KEYID = 7
1,211,900 UART: [ldev] FE.KEYID = 1
1,216,960 UART: [ldev] Erasing FE.KEYID = 1
1,243,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,528 UART: [ldev] --
1,282,967 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 114360 bytes
3,122,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,086 >>> mbox cmd response: success
3,317,152 UART: [afmc] ++
3,317,320 UART: [afmc] CDI.KEYID = 6
3,317,682 UART: [afmc] SUBJECT.KEYID = 7
3,318,107 UART: [afmc] AUTHORITY.KEYID = 5
3,353,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,472 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,181 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,073 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,784 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,751 UART: [afmc] --
3,396,679 UART: [cold-reset] --
3,397,643 UART: [state] Locking Datavault
3,398,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,262 UART: [state] Locking ICCM
3,399,728 UART: [exit] Launching FMC @ 0x40000130
3,405,057 UART:
3,405,073 UART: Running Caliptra FMC ...
3,405,481 UART:
3,405,624 UART: [state] CFI Enabled
3,416,496 UART: [fht] FMC Alias Private Key: 7
3,524,940 UART: [art] Extend RT PCRs Done
3,525,368 UART: [art] Lock RT PCRs Done
3,526,828 UART: [art] Populate DV Done
3,534,918 UART: [fht] FMC Alias Private Key: 7
3,535,890 UART: [art] Derive CDI
3,536,170 UART: [art] Store in in slot 0x4
3,621,847 UART: [art] Derive Key Pair
3,622,207 UART: [art] Store priv key in slot 0x5
3,636,103 UART: [art] Derive Key Pair - Done
3,651,117 UART: [art] Signing Cert with AUTHO
3,651,597 UART: RITY.KEYID = 7
3,666,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,602 UART: [art] PUB.X = 426ABEBACCE6DD07EF7CFDF54D10DE7F410DE0FEA63A16CCF54074D3F7A91704B164796AB8AB68B4997AB3126A7DB75B
3,674,389 UART: [art] PUB.Y = CC5115EC53939EB4183AD4F2818CD4A8E2BA846A8B70CC39EAE6468517369AF6249CF1167CA743F380734C80BDE55BDF
3,681,349 UART: [art] SIG.R = FAE85BF430A6DF32EFB2F332FEB9C062484D80D32D2B23D30B272347F8C21735A7770B31DA939151AF184D908C82095E
3,688,114 UART: [art] SIG.S = 7935D9191D339E785762531BBC7753C9EC43C019BED5699203D30C4C9AB0BFCC64E78713573D57124B1D989BD7F6F701
3,711,772 UART: Caliptra RT
3,712,118 UART: [state] CFI Enabled
3,819,527 UART: [rt] RT listening for mailbox commands...
3,820,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,982 UART: [rt]cmd =0x41544d4e, len=14344
5,171,943 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,412 ready_for_fw is high
1,060,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,163,295 >>> mbox cmd response: success
3,226,250 UART:
3,226,266 UART: Running Caliptra FMC ...
3,226,674 UART:
3,226,817 UART: [state] CFI Enabled
3,237,355 UART: [fht] FMC Alias Private Key: 7
3,344,789 UART: [art] Extend RT PCRs Done
3,345,217 UART: [art] Lock RT PCRs Done
3,346,983 UART: [art] Populate DV Done
3,355,365 UART: [fht] FMC Alias Private Key: 7
3,356,315 UART: [art] Derive CDI
3,356,595 UART: [art] Store in in slot 0x4
3,442,242 UART: [art] Derive Key Pair
3,442,602 UART: [art] Store priv key in slot 0x5
3,456,188 UART: [art] Derive Key Pair - Done
3,470,710 UART: [art] Signing Cert with AUTHO
3,471,190 UART: RITY.KEYID = 7
3,486,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,887 UART: [art] PUB.X = F2BED1E117449808F4B3918E54E1F9277EC5CB949B464ECA3B04B9F2D1F4636A7CD8CCC51F60DB96C3C62DFBAB65509C
3,493,669 UART: [art] PUB.Y = 7E8216A9C752B1BB4830AC5854ABB6B9277E1A14CDF6ABB9BA172076682FC308052D4ADCC61AEDF576AFE9B2235A938E
3,500,629 UART: [art] SIG.R = B23A5060E2964FE07F7B5488E5F67EB6CD088D465CDEF9109B8DDE475FC8C10C063C107E3C062E09ECC356BEC66EEB18
3,507,400 UART: [art] SIG.S = E861C4433F09F9973CF3EA16E3DFF3BE79F23FCB775BE7940CBDB788502ABC2AE95F14A0DF79BCF115A5DCAB215B8A69
3,530,575 UART: Caliptra RT
3,530,921 UART: [state] CFI Enabled
3,638,699 UART: [rt] RT listening for mailbox commands...
3,639,369 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,060 UART: [rt]cmd =0x41544d4e, len=14344
5,012,452 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,169,697 UART: [cold-reset] ++
1,170,031 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,173,931 ready_for_fw is high
1,173,931 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,499 UART: [idev] --
1,208,452 UART: [ldev] ++
1,208,620 UART: [ldev] CDI.KEYID = 6
1,208,984 UART: [ldev] SUBJECT.KEYID = 5
1,209,411 UART: [ldev] AUTHORITY.KEYID = 7
1,209,874 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,273 UART: [fwproc] Recv command 0x46574c44
1,282,006 UART: [fwproc] Recv'd Img size: 114360 bytes
3,131,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,325,266 >>> mbox cmd response: success
3,326,349 UART: [afmc] ++
3,326,517 UART: [afmc] CDI.KEYID = 6
3,326,880 UART: [afmc] SUBJECT.KEYID = 7
3,327,306 UART: [afmc] AUTHORITY.KEYID = 5
3,362,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,191 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,901 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,791 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,502 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,432 UART: [afmc] --
3,406,340 UART: [cold-reset] --
3,407,194 UART: [state] Locking Datavault
3,408,303 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,907 UART: [state] Locking ICCM
3,409,417 UART: [exit] Launching FMC @ 0x40000130
3,414,746 UART:
3,414,762 UART: Running Caliptra FMC ...
3,415,170 UART:
3,415,224 UART: [state] CFI Enabled
3,425,836 UART: [fht] FMC Alias Private Key: 7
3,533,616 UART: [art] Extend RT PCRs Done
3,534,044 UART: [art] Lock RT PCRs Done
3,535,270 UART: [art] Populate DV Done
3,543,244 UART: [fht] FMC Alias Private Key: 7
3,544,254 UART: [art] Derive CDI
3,544,534 UART: [art] Store in in slot 0x4
3,629,963 UART: [art] Derive Key Pair
3,630,323 UART: [art] Store priv key in slot 0x5
3,643,663 UART: [art] Derive Key Pair - Done
3,658,320 UART: [art] Signing Cert with AUTHO
3,658,800 UART: RITY.KEYID = 7
3,674,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,831 UART: [art] PUB.X = C1C32D445A12947A859FD54A96F31C195348AC3F2A90EAEED40B2868EAFEEF73B0FD2137D52DF3273EA627DD046B086D
3,681,606 UART: [art] PUB.Y = F477FC0725300EA831B42142B2C61FD7D07E2D759C6213FC5C5706646B8ED8094149FEFDAB9063633D8CE013C506A415
3,688,541 UART: [art] SIG.R = 4D8D5ABF2288F9770281E2E7E436342E4BE98C228A55372F4B65083E68F2651885C41F0F6FF736CF09DA1003A27A0B56
3,695,291 UART: [art] SIG.S = AD45F8638A976233F04F967644EE42B93083FC6FC8E98B669750E2A1DD24C9E16DA0969415E2C8B97334EAC4B3E7F78F
3,719,250 UART: Caliptra RT
3,719,504 UART: [state] CFI Enabled
3,827,767 UART: [rt] RT listening for mailbox commands...
3,828,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,180 UART: [rt]cmd =0x41544d4e, len=14344
5,180,023 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,640 ready_for_fw is high
1,056,640 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,179,073 >>> mbox cmd response: success
3,241,442 UART:
3,241,458 UART: Running Caliptra FMC ...
3,241,866 UART:
3,241,920 UART: [state] CFI Enabled
3,252,054 UART: [fht] FMC Alias Private Key: 7
3,359,784 UART: [art] Extend RT PCRs Done
3,360,212 UART: [art] Lock RT PCRs Done
3,361,434 UART: [art] Populate DV Done
3,369,510 UART: [fht] FMC Alias Private Key: 7
3,370,500 UART: [art] Derive CDI
3,370,780 UART: [art] Store in in slot 0x4
3,456,361 UART: [art] Derive Key Pair
3,456,721 UART: [art] Store priv key in slot 0x5
3,470,073 UART: [art] Derive Key Pair - Done
3,484,709 UART: [art] Signing Cert with AUTHO
3,485,189 UART: RITY.KEYID = 7
3,500,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,022 UART: [art] PUB.X = 3558D1521C53491B921187CAF5A8AA1999AE0430D47125D9817AD9F95AE066B7832383A9566857B01FF7BC10229A1730
3,507,779 UART: [art] PUB.Y = 25CFE3FE6A8A4FE7BCF9AEBEAB9F5EC450C0EB6AE9BB1A55C18EBEF2A7F8FF29F97DC16C60DF56EB8DADC2C32B7AD22A
3,514,777 UART: [art] SIG.R = BD98D1B640B618E23CF096213C0A6AE357F6B124DE6261B73FC0BD4894BE51B8B7DA04A5201024FCE0922188623E82A9
3,521,545 UART: [art] SIG.S = 94F765B2FE51BE512DA93719EC43262E9C5539FAEB0366D598AF27B885E7B0276FD90ABC2FCF39E92D5AB5539460663F
3,545,184 UART: Caliptra RT
3,545,438 UART: [state] CFI Enabled
3,653,664 UART: [rt] RT listening for mailbox commands...
3,654,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,133 UART: [rt]cmd =0x41544d4e, len=14344
5,009,976 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,174,406 ready_for_fw is high
1,174,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,208,072 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,241,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,833 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,282,010 UART: [fwproc] Recv command 0x46574c44
1,282,743 UART: [fwproc] Recv'd Img size: 114360 bytes
3,127,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,320,219 >>> mbox cmd response: success
3,321,392 UART: [afmc] ++
3,321,560 UART: [afmc] CDI.KEYID = 6
3,321,923 UART: [afmc] SUBJECT.KEYID = 7
3,322,349 UART: [afmc] AUTHORITY.KEYID = 5
3,358,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,240 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,950 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,840 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,551 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,457 UART: [afmc] --
3,402,383 UART: [cold-reset] --
3,403,341 UART: [state] Locking Datavault
3,404,362 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,966 UART: [state] Locking ICCM
3,405,636 UART: [exit] Launching FMC @ 0x40000130
3,410,965 UART:
3,410,981 UART: Running Caliptra FMC ...
3,411,389 UART:
3,411,532 UART: [state] CFI Enabled
3,422,072 UART: [fht] FMC Alias Private Key: 7
3,530,046 UART: [art] Extend RT PCRs Done
3,530,474 UART: [art] Lock RT PCRs Done
3,532,120 UART: [art] Populate DV Done
3,540,276 UART: [fht] FMC Alias Private Key: 7
3,541,406 UART: [art] Derive CDI
3,541,686 UART: [art] Store in in slot 0x4
3,627,201 UART: [art] Derive Key Pair
3,627,561 UART: [art] Store priv key in slot 0x5
3,640,655 UART: [art] Derive Key Pair - Done
3,655,032 UART: [art] Signing Cert with AUTHO
3,655,512 UART: RITY.KEYID = 7
3,670,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,467 UART: [art] PUB.X = BF08DE421AD6AB95F212199C457859BB631F28FD136C00F8FCA6B90E267BFDB32DD957F59728FE1C3D11D943B98F7044
3,678,219 UART: [art] PUB.Y = B4781A616B02E675339383A003E696180F3F0B926603E594A957CEB6F078FBD223E3F2430699FDF389F0F545250BAAA5
3,685,144 UART: [art] SIG.R = F20A50F887D27FE232942E02096941223BB49EBD5F1C9D362738DAFF73C7854287723D76B5629C6F391A998FB39F396F
3,691,901 UART: [art] SIG.S = B0E8A3F6E00AE53FA08286A308BB5DBDC40ABB5D00CF03A6BD7A508B3D10B1A1095D0F7BA1CA860D6F6C90003FFFD0C7
3,715,613 UART: Caliptra RT
3,715,959 UART: [state] CFI Enabled
3,823,437 UART: [rt] RT listening for mailbox commands...
3,824,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,006 UART: [rt]cmd =0x41544d4e, len=14344
5,190,421 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,029 ready_for_fw is high
1,056,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,162,130 >>> mbox cmd response: success
3,224,657 UART:
3,224,673 UART: Running Caliptra FMC ...
3,225,081 UART:
3,225,224 UART: [state] CFI Enabled
3,235,890 UART: [fht] FMC Alias Private Key: 7
3,343,974 UART: [art] Extend RT PCRs Done
3,344,402 UART: [art] Lock RT PCRs Done
3,346,270 UART: [art] Populate DV Done
3,354,612 UART: [fht] FMC Alias Private Key: 7
3,355,636 UART: [art] Derive CDI
3,355,916 UART: [art] Store in in slot 0x4
3,441,615 UART: [art] Derive Key Pair
3,441,975 UART: [art] Store priv key in slot 0x5
3,455,407 UART: [art] Derive Key Pair - Done
3,470,099 UART: [art] Signing Cert with AUTHO
3,470,579 UART: RITY.KEYID = 7
3,485,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,728 UART: [art] PUB.X = E548A780651087DF8AC52D0BAE5E34CEE67AD627AC5F595A7BF02EAB6B68EA78DC20DC86C2051C32B653BA450E9EAF28
3,493,509 UART: [art] PUB.Y = 063185CF1DE37CCDE3A78533030C0BF8953CCD1A7E3CF296E36D584A4551571BA2CB7720F1F2D39B3ADA7567A776E9AF
3,500,459 UART: [art] SIG.R = F64F03771DCAAC73759BDBBF900ECE29E637765640281E88FA6515FDF2C0180A762006483951F729D0D418B0A0EA2ECB
3,507,223 UART: [art] SIG.S = B80F6BD1F93B461FFFDCD86D07E1D53C236C9B24F99678B2CDB980566736F478B16067857A38002F934858AB37DBC34D
3,531,118 UART: Caliptra RT
3,531,464 UART: [state] CFI Enabled
3,639,278 UART: [rt] RT listening for mailbox commands...
3,639,948 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,537 UART: [rt]cmd =0x41544d4e, len=14344
4,998,191 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,561 writing to cptra_bootfsm_go
192,655 UART:
193,009 UART: Running Caliptra ROM ...
194,184 UART:
194,329 UART: [state] CFI Enabled
264,380 UART: [state] LifecycleState = Unprovisioned
266,381 UART: [state] DebugLocked = No
268,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,202 UART: [kat] SHA2-256
443,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,395 UART: [kat] ++
454,935 UART: [kat] sha1
464,605 UART: [kat] SHA2-256
467,321 UART: [kat] SHA2-384
474,152 UART: [kat] SHA2-512-ACC
476,521 UART: [kat] ECC-384
2,768,788 UART: [kat] HMAC-384Kdf
2,781,024 UART: [kat] LMS
3,971,276 UART: [kat] --
3,977,367 UART: [cold-reset] ++
3,979,191 UART: [fht] Storing FHT @ 0x50003400
3,990,311 UART: [idev] ++
3,990,866 UART: [idev] CDI.KEYID = 6
3,991,741 UART: [idev] SUBJECT.KEYID = 7
3,993,044 UART: [idev] UDS.KEYID = 0
3,994,083 ready_for_fw is high
3,994,309 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,813 UART: [idev] Erasing UDS.KEYID = 0
7,329,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,095 UART: [idev] --
7,356,493 UART: [ldev] ++
7,357,067 UART: [ldev] CDI.KEYID = 6
7,358,031 UART: [ldev] SUBJECT.KEYID = 5
7,359,237 UART: [ldev] AUTHORITY.KEYID = 7
7,360,515 UART: [ldev] FE.KEYID = 1
7,402,639 UART: [ldev] Erasing FE.KEYID = 1
10,736,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,409 UART: [ldev] --
13,116,523 UART: [fwproc] Waiting for Commands...
13,119,315 UART: [fwproc] Received command 0x46574c44
13,121,497 UART: [fwproc] Received Image of size 114036 bytes
22,322,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,408,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,477,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,795,408 >>> mbox cmd response: success
22,799,965 UART: [afmc] ++
22,800,614 UART: [afmc] CDI.KEYID = 6
22,801,491 UART: [afmc] SUBJECT.KEYID = 7
22,802,760 UART: [afmc] AUTHORITY.KEYID = 5
26,169,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,470,453 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,472,717 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,487,318 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,502,027 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,516,290 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,537,582 UART: [afmc] --
28,541,489 UART: [cold-reset] --
28,546,161 UART: [state] Locking Datavault
28,552,320 UART: [state] Locking PCR0, PCR1 and PCR31
28,554,071 UART: [state] Locking ICCM
28,556,540 UART: [exit] Launching FMC @ 0x40000130
28,564,935 UART:
28,565,160 UART: Running Caliptra FMC ...
28,566,258 UART:
28,566,411 UART: [state] CFI Enabled
28,629,913 UART: [fht] FMC Alias Private Key: 7
30,967,800 UART: [art] Extend RT PCRs Done
30,969,019 UART: [art] Lock RT PCRs Done
30,970,290 UART: [art] Populate DV Done
30,975,918 UART: [fht] FMC Alias Private Key: 7
30,977,409 UART: [art] Derive CDI
30,978,139 UART: [art] Store in in slot 0x4
31,038,960 UART: [art] Derive Key Pair
31,040,000 UART: [art] Store priv key in slot 0x5
34,333,370 UART: [art] Derive Key Pair - Done
34,346,206 UART: [art] Signing Cert with AUTHO
34,347,511 UART: RITY.KEYID = 7
36,635,127 UART: [art] Erasing AUTHORITY.KEYID = 7
36,636,634 UART: [art] PUB.X = 3BBE6D707BB5D8949F03DE7DB5557C899A6DE287018B3CDA3D6268CC3CE78445B0AE9331A4284B436A19BB91246081D9
36,643,842 UART: [art] PUB.Y = 5576C851A1E71F67D3FD31C3430CC01FBE53396B344B0597A823D6AB43B703AF0CCEF1E789CAF0DFF58D46C36A422272
36,651,077 UART: [art] SIG.R = FAB79A60488892227A3A64EA789319D338E07C26AEAC10BF7380FA0F5AE11810999C03353EF2E6590CA5CE3EA65D1B57
36,658,441 UART: [art] SIG.S = 90369582FA92EA2ACA5BBAD501385532A2F83A5A60A2557756D5C51394EE7E5986EA4BA55EDEC14BEE40A3DA968859CC
37,963,428 UART: Caliptra RT
37,964,132 UART: [state] CFI Enabled
38,125,463 UART: [rt] RT listening for mailbox commands...
38,127,799 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,283,528 UART: [rt]cmd =0x41544d4e, len=14344
44,695,709 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
3,803,385 ready_for_fw is high
3,803,759 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,646,778 >>> mbox cmd response: success
27,345,870 UART:
27,346,251 UART: Running Caliptra FMC ...
27,347,427 UART:
27,347,596 UART: [state] CFI Enabled
27,414,454 UART: [fht] FMC Alias Private Key: 7
29,752,567 UART: [art] Extend RT PCRs Done
29,753,788 UART: [art] Lock RT PCRs Done
29,755,218 UART: [art] Populate DV Done
29,760,679 UART: [fht] FMC Alias Private Key: 7
29,762,269 UART: [art] Derive CDI
29,763,078 UART: [art] Store in in slot 0x4
29,824,394 UART: [art] Derive Key Pair
29,825,445 UART: [art] Store priv key in slot 0x5
33,118,190 UART: [art] Derive Key Pair - Done
33,130,912 UART: [art] Signing Cert with AUTHO
33,132,206 UART: RITY.KEYID = 7
35,420,964 UART: [art] Erasing AUTHORITY.KEYID = 7
35,422,470 UART: [art] PUB.X = 0ABEF8765F0BAE75DB58498D82E82F44A717AD47ADFAF580208BFEFBC918ABCD805E511A78FC3865D0C5957FD3A0322A
35,429,721 UART: [art] PUB.Y = B1A3E861521F3D3DF7C748EF3D7BB8584BA811F086FE56F9EE7851D009E48210C41D56150A22D4E6F12A6C99C63EE545
35,436,964 UART: [art] SIG.R = 11D5894CABBA2F0EA2BBEB5765ECF2F8C1056CD4EBC22695469C229DD742B303E6A598BBDE3508602753B56F552B71E6
35,444,328 UART: [art] SIG.S = 854DCE8A7895D4C31C2D7A836ED8F7BF5E1B7ABE3B38C08F0AA9B3F48049DD69E24D4E29AE126E59CC87A2F83D13F442
36,749,887 UART: Caliptra RT
36,750,592 UART: [state] CFI Enabled
36,909,684 UART: [rt] RT listening for mailbox commands...
36,912,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,067,334 UART: [rt]cmd =0x41544d4e, len=14344
43,194,361 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,515 UART:
192,859 UART: Running Caliptra ROM ...
194,033 UART:
603,655 UART: [state] CFI Enabled
618,257 UART: [state] LifecycleState = Unprovisioned
620,193 UART: [state] DebugLocked = No
621,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,930 UART: [kat] SHA2-256
796,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,246 UART: [kat] ++
807,693 UART: [kat] sha1
819,203 UART: [kat] SHA2-256
821,947 UART: [kat] SHA2-384
827,295 UART: [kat] SHA2-512-ACC
829,661 UART: [kat] ECC-384
3,115,279 UART: [kat] HMAC-384Kdf
3,127,747 UART: [kat] LMS
4,317,851 UART: [kat] --
4,323,897 UART: [cold-reset] ++
4,325,701 UART: [fht] Storing FHT @ 0x50003400
4,337,251 UART: [idev] ++
4,337,813 UART: [idev] CDI.KEYID = 6
4,338,845 UART: [idev] SUBJECT.KEYID = 7
4,340,019 UART: [idev] UDS.KEYID = 0
4,341,161 ready_for_fw is high
4,341,404 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,730 UART: [idev] Erasing UDS.KEYID = 0
7,628,116 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,816 UART: [idev] --
7,651,889 UART: [ldev] ++
7,652,513 UART: [ldev] CDI.KEYID = 6
7,653,425 UART: [ldev] SUBJECT.KEYID = 5
7,654,634 UART: [ldev] AUTHORITY.KEYID = 7
7,655,953 UART: [ldev] FE.KEYID = 1
7,667,752 UART: [ldev] Erasing FE.KEYID = 1
10,952,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,423 UART: [ldev] --
13,314,684 UART: [fwproc] Waiting for Commands...
13,316,718 UART: [fwproc] Received command 0x46574c44
13,318,929 UART: [fwproc] Received Image of size 114036 bytes
21,725,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,805,364 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,874,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,191,402 >>> mbox cmd response: success
22,194,799 UART: [afmc] ++
22,195,393 UART: [afmc] CDI.KEYID = 6
22,196,418 UART: [afmc] SUBJECT.KEYID = 7
22,197,585 UART: [afmc] AUTHORITY.KEYID = 5
25,512,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,810,524 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,812,785 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,827,403 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,842,110 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,856,332 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,878,007 UART: [afmc] --
27,881,095 UART: [cold-reset] --
27,885,338 UART: [state] Locking Datavault
27,891,449 UART: [state] Locking PCR0, PCR1 and PCR31
27,893,201 UART: [state] Locking ICCM
27,895,768 UART: [exit] Launching FMC @ 0x40000130
27,904,153 UART:
27,904,396 UART: Running Caliptra FMC ...
27,905,503 UART:
27,905,660 UART: [state] CFI Enabled
27,913,900 UART: [fht] FMC Alias Private Key: 7
30,244,781 UART: [art] Extend RT PCRs Done
30,246,009 UART: [art] Lock RT PCRs Done
30,247,843 UART: [art] Populate DV Done
30,253,209 UART: [fht] FMC Alias Private Key: 7
30,254,697 UART: [art] Derive CDI
30,255,466 UART: [art] Store in in slot 0x4
30,298,065 UART: [art] Derive Key Pair
30,299,100 UART: [art] Store priv key in slot 0x5
33,541,666 UART: [art] Derive Key Pair - Done
33,554,455 UART: [art] Signing Cert with AUTHO
33,555,758 UART: RITY.KEYID = 7
35,834,706 UART: [art] Erasing AUTHORITY.KEYID = 7
35,836,213 UART: [art] PUB.X = C0B3FB8BC54F356E2379296EC742CFFE4798F0A43DA5E0E09BFE445F7B175D953EC5E35C5ACEBB254306012B069EE9E0
35,843,483 UART: [art] PUB.Y = CBE52E1F7322DF452C4B7D525B0088C0F6D4162D369F3AF96051997286A4DB6B5703350ABF8CCCDE5335476F2FD99C00
35,850,726 UART: [art] SIG.R = 3279659AC380E90F03ED7D0651B2DCC14BF720A9D6CC23F40314B95530D0BC3A751F4B2719A32D8E3B67550318E78CAC
35,858,120 UART: [art] SIG.S = 0D8881472F00694CB55C0ED15DFB9DCA73A70F8F81D0566556EC1533551762058919EB01DA0028F6A96FDD933758B481
37,163,232 UART: Caliptra RT
37,163,939 UART: [state] CFI Enabled
37,281,784 UART: [rt] RT listening for mailbox commands...
37,284,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,439,475 UART: [rt]cmd =0x41544d4e, len=14344
43,695,934 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,128,867 ready_for_fw is high
4,129,464 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,266,628 >>> mbox cmd response: success
27,905,921 UART:
27,906,305 UART: Running Caliptra FMC ...
27,907,424 UART:
27,907,576 UART: [state] CFI Enabled
27,915,701 UART: [fht] FMC Alias Private Key: 7
30,246,641 UART: [art] Extend RT PCRs Done
30,247,862 UART: [art] Lock RT PCRs Done
30,249,466 UART: [art] Populate DV Done
30,254,720 UART: [fht] FMC Alias Private Key: 7
30,256,263 UART: [art] Derive CDI
30,257,078 UART: [art] Store in in slot 0x4
30,299,575 UART: [art] Derive Key Pair
30,300,623 UART: [art] Store priv key in slot 0x5
33,542,547 UART: [art] Derive Key Pair - Done
33,555,491 UART: [art] Signing Cert with AUTHO
33,556,798 UART: RITY.KEYID = 7
35,836,127 UART: [art] Erasing AUTHORITY.KEYID = 7
35,837,640 UART: [art] PUB.X = 1738294DF904D720C76C50B22885EE9C9567606F4ECB7B3449CF9101F2DF1CCFE8861DA28F64ABF7AE90F79E28CD2DA0
35,844,891 UART: [art] PUB.Y = 8FDC21B236CF2BFFB148FA53D7F33F30C5175BE2F561C5DDC860EDB68CCCE3A25015B2216DF723EC83785A1FA7A56ABB
35,852,175 UART: [art] SIG.R = A4D0FF81277AE1B7FD4E7654805EAB358AFD425EFA0CC286D69E3A137E613A3F8C0ED5D5A2F8D1309F895DF70D3853BE
35,859,542 UART: [art] SIG.S = F173F05E8A7D6AB8052A01391939555B4DB55E4D529E572C9D849738E841116C6C1846FF0DD6C1C1AF2715E26DFA4842
37,165,493 UART: Caliptra RT
37,166,211 UART: [state] CFI Enabled
37,283,607 UART: [rt] RT listening for mailbox commands...
37,285,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,441,172 UART: [rt]cmd =0x41544d4e, len=14344
43,879,463 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,515 UART:
192,875 UART: Running Caliptra ROM ...
194,073 UART:
194,237 UART: [state] CFI Enabled
263,537 UART: [state] LifecycleState = Unprovisioned
265,444 UART: [state] DebugLocked = No
268,332 UART: [state] WD Timer not started. Device not locked for debugging
272,711 UART: [kat] SHA2-256
451,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,376 UART: [kat] ++
463,905 UART: [kat] sha1
474,637 UART: [kat] SHA2-256
477,709 UART: [kat] SHA2-384
484,761 UART: [kat] SHA2-512-ACC
487,770 UART: [kat] ECC-384
2,946,366 UART: [kat] HMAC-384Kdf
2,971,256 UART: [kat] LMS
3,500,661 UART: [kat] --
3,504,579 UART: [cold-reset] ++
3,506,577 UART: [fht] FHT @ 0x50003400
3,517,578 UART: [idev] ++
3,518,149 UART: [idev] CDI.KEYID = 6
3,519,070 UART: [idev] SUBJECT.KEYID = 7
3,520,250 UART: [idev] UDS.KEYID = 0
3,521,306 ready_for_fw is high
3,521,503 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,762 UART: [idev] Erasing UDS.KEYID = 0
6,027,006 UART: [idev] Sha1 KeyId Algorithm
6,050,661 UART: [idev] --
6,054,010 UART: [ldev] ++
6,054,587 UART: [ldev] CDI.KEYID = 6
6,055,474 UART: [ldev] SUBJECT.KEYID = 5
6,056,686 UART: [ldev] AUTHORITY.KEYID = 7
6,057,920 UART: [ldev] FE.KEYID = 1
6,099,868 UART: [ldev] Erasing FE.KEYID = 1
8,605,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,733 UART: [ldev] --
10,412,913 UART: [fwproc] Wait for Commands...
10,415,384 UART: [fwproc] Recv command 0x46574c44
10,417,477 UART: [fwproc] Recv'd Img size: 114360 bytes
14,951,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,035,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,104,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,423,378 >>> mbox cmd response: success
15,426,942 UART: [afmc] ++
15,427,540 UART: [afmc] CDI.KEYID = 6
15,428,454 UART: [afmc] SUBJECT.KEYID = 7
15,429,669 UART: [afmc] AUTHORITY.KEYID = 5
17,958,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,355 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,701,377 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,717,265 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,733,024 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,755,673 UART: [afmc] --
19,760,298 UART: [cold-reset] --
19,763,957 UART: [state] Locking Datavault
19,767,526 UART: [state] Locking PCR0, PCR1 and PCR31
19,769,172 UART: [state] Locking ICCM
19,771,002 UART: [exit] Launching FMC @ 0x40000130
19,779,458 UART:
19,779,871 UART: Running Caliptra FMC ...
19,781,022 UART:
19,781,199 UART: [state] CFI Enabled
19,840,776 UART: [fht] FMC Alias Private Key: 7
21,604,163 UART: [art] Extend RT PCRs Done
21,605,388 UART: [art] Lock RT PCRs Done
21,606,798 UART: [art] Populate DV Done
21,612,211 UART: [fht] FMC Alias Private Key: 7
21,613,861 UART: [art] Derive CDI
21,614,677 UART: [art] Store in in slot 0x4
21,672,858 UART: [art] Derive Key Pair
21,673,901 UART: [art] Store priv key in slot 0x5
24,136,546 UART: [art] Derive Key Pair - Done
24,149,821 UART: [art] Signing Cert with AUTHO
24,151,128 UART: RITY.KEYID = 7
25,862,131 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,668 UART: [art] PUB.X = 43D4C3F4CB24ACBA4BCD436F3DC6D3AB2E2290F573EACD628F1B991D7F71E9A4D4CCA19205411E19896B56E7A6D3E2F6
25,870,914 UART: [art] PUB.Y = 3AFA683E3830E46F3407D1F515C7F46BAB13426285B9627831144D9AF9B6EAE43174D7E3B0FE8CF3EA5169507EC3B80A
25,878,188 UART: [art] SIG.R = A411B827F0B4D67FBB489892E4A80455B45FB4CF6679C7F052A64E6FC63B03F66909F6B61F0D5EEE38D0E692472E2BE6
25,885,638 UART: [art] SIG.S = FD3F4E9F4E746B6529F7FEF8EB568C72521CF99871CFF5BCF60987C0979594E4DEED0EE743E74F467479B897BE2EBCF3
26,864,295 UART: Caliptra RT
26,865,010 UART: [state] CFI Enabled
27,029,433 UART: [rt] RT listening for mailbox commands...
27,031,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,187,040 UART: [rt]cmd =0x41544d4e, len=14344
30,806,760 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
192,546 UART:
192,929 UART: Running Caliptra ROM ...
194,016 UART:
194,165 UART: [state] CFI Enabled
259,645 UART: [state] LifecycleState = Unprovisioned
262,029 UART: [state] DebugLocked = No
263,550 UART: [state] WD Timer not started. Device not locked for debugging
268,255 UART: [kat] SHA2-256
458,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,874 UART: [kat] ++
469,350 UART: [kat] sha1
479,584 UART: [kat] SHA2-256
482,585 UART: [kat] SHA2-384
488,585 UART: [kat] SHA2-512-ACC
491,168 UART: [kat] ECC-384
2,946,830 UART: [kat] HMAC-384Kdf
2,971,154 UART: [kat] LMS
3,502,972 UART: [kat] --
3,508,817 UART: [cold-reset] ++
3,510,676 UART: [fht] FHT @ 0x50003400
3,521,799 UART: [idev] ++
3,522,436 UART: [idev] CDI.KEYID = 6
3,523,395 UART: [idev] SUBJECT.KEYID = 7
3,524,659 UART: [idev] UDS.KEYID = 0
3,525,563 ready_for_fw is high
3,525,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,688 UART: [idev] Erasing UDS.KEYID = 0
6,029,774 UART: [idev] Sha1 KeyId Algorithm
6,051,929 UART: [idev] --
6,055,818 UART: [ldev] ++
6,056,498 UART: [ldev] CDI.KEYID = 6
6,057,417 UART: [ldev] SUBJECT.KEYID = 5
6,058,630 UART: [ldev] AUTHORITY.KEYID = 7
6,059,807 UART: [ldev] FE.KEYID = 1
6,099,405 UART: [ldev] Erasing FE.KEYID = 1
8,602,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,835 UART: [ldev] --
10,413,016 UART: [fwproc] Wait for Commands...
10,415,279 UART: [fwproc] Recv command 0x46574c44
10,417,590 UART: [fwproc] Recv'd Img size: 114360 bytes
15,029,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,109,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,225,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,768,174 >>> mbox cmd response: success
15,771,986 UART: [afmc] ++
15,772,703 UART: [afmc] CDI.KEYID = 6
15,773,821 UART: [afmc] SUBJECT.KEYID = 7
15,775,365 UART: [afmc] AUTHORITY.KEYID = 5
18,300,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,023,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,025,782 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,040,870 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,056,063 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,070,870 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,094,958 UART: [afmc] --
20,097,643 UART: [cold-reset] --
20,102,331 UART: [state] Locking Datavault
20,108,247 UART: [state] Locking PCR0, PCR1 and PCR31
20,110,517 UART: [state] Locking ICCM
20,111,686 UART: [exit] Launching FMC @ 0x40000130
20,120,375 UART:
20,120,615 UART: Running Caliptra FMC ...
20,121,722 UART:
20,121,882 UART: [state] CFI Enabled
20,181,767 UART: [fht] FMC Alias Private Key: 7
21,946,025 UART: [art] Extend RT PCRs Done
21,947,246 UART: [art] Lock RT PCRs Done
21,948,891 UART: [art] Populate DV Done
21,954,574 UART: [fht] FMC Alias Private Key: 7
21,956,060 UART: [art] Derive CDI
21,956,822 UART: [art] Store in in slot 0x4
22,014,294 UART: [art] Derive Key Pair
22,015,304 UART: [art] Store priv key in slot 0x5
24,478,060 UART: [art] Derive Key Pair - Done
24,490,895 UART: [art] Signing Cert with AUTHO
24,492,198 UART: RITY.KEYID = 7
26,203,886 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,395 UART: [art] PUB.X = DA9714E8B2CC81071C3193308CECE421047E7CA67B5E75BFCA82DA1CA92749DEA11DEEAF9784438CB38D7FFDCF8FB940
26,212,679 UART: [art] PUB.Y = 3A2B41E1B309F7FA6C6634BD5997BB0CDB311A0B0A6D8F8CF5F1FDF6DA665505A2D8226F39F6891C684EFA0C9BC80ECB
26,219,967 UART: [art] SIG.R = 188FD6976A3DC925C533A2694023299358C8E27FC1F381A0991353CE3690ECB00D4B1CA7D9C854EA994D5B5D5556D881
26,227,363 UART: [art] SIG.S = D4DDB37592535E5DBBAFFED171EEF34FC7C45F142326CB04ABA9B6186ACFDB81D37D98A4849D04677F808E72B7498177
27,206,477 UART: Caliptra RT
27,207,195 UART: [state] CFI Enabled
27,373,269 UART: [rt] RT listening for mailbox commands...
27,375,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,922 UART: [rt]cmd =0x41544d4e, len=14344
31,147,130 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
3,434,733 ready_for_fw is high
3,435,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,824,742 >>> mbox cmd response: success
20,112,931 UART:
20,113,348 UART: Running Caliptra FMC ...
20,114,454 UART:
20,114,607 UART: [state] CFI Enabled
20,181,374 UART: [fht] FMC Alias Private Key: 7
21,945,203 UART: [art] Extend RT PCRs Done
21,946,424 UART: [art] Lock RT PCRs Done
21,947,811 UART: [art] Populate DV Done
21,953,011 UART: [fht] FMC Alias Private Key: 7
21,954,518 UART: [art] Derive CDI
21,955,291 UART: [art] Store in in slot 0x4
22,013,628 UART: [art] Derive Key Pair
22,014,688 UART: [art] Store priv key in slot 0x5
24,477,910 UART: [art] Derive Key Pair - Done
24,491,080 UART: [art] Signing Cert with AUTHO
24,492,401 UART: RITY.KEYID = 7
26,203,130 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,656 UART: [art] PUB.X = 7E0BE204D4B0DFAE54CA12184455CB0ABF53F6118B1D1779C241C400468A69D8F7139B078FAD193E470BE33E2F9E2E3D
26,211,919 UART: [art] PUB.Y = C3D2AEF3FABDB2F3CC70226217A0CBFFA6B6E99AB82149264403B3BF1FD92E708297AAEF896DFB5B80AA41AB7E81D284
26,219,197 UART: [art] SIG.R = 590DA97B8158EE0B07E581B0FE94D81B680E3F22D546DDD242FA137BE6503B5C25E06063E5A62FBF891C9CB060287C80
26,226,555 UART: [art] SIG.S = 954D813A7A6CFE24CA829504D7630C16DF1A5337166E62C7269B34984A22E8453ED8BEC72C8735F5DDDB8E424AE191F6
27,205,559 UART: Caliptra RT
27,206,264 UART: [state] CFI Enabled
27,370,886 UART: [rt] RT listening for mailbox commands...
27,373,190 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,374 UART: [rt]cmd =0x41544d4e, len=14344
31,131,493 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,412 UART:
192,771 UART: Running Caliptra ROM ...
193,891 UART:
603,470 UART: [state] CFI Enabled
620,676 UART: [state] LifecycleState = Unprovisioned
623,066 UART: [state] DebugLocked = No
625,670 UART: [state] WD Timer not started. Device not locked for debugging
631,192 UART: [kat] SHA2-256
821,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,799 UART: [kat] ++
832,322 UART: [kat] sha1
842,979 UART: [kat] SHA2-256
845,982 UART: [kat] SHA2-384
851,470 UART: [kat] SHA2-512-ACC
854,119 UART: [kat] ECC-384
3,295,762 UART: [kat] HMAC-384Kdf
3,309,039 UART: [kat] LMS
3,840,847 UART: [kat] --
3,845,766 UART: [cold-reset] ++
3,848,271 UART: [fht] FHT @ 0x50003400
3,858,820 UART: [idev] ++
3,859,457 UART: [idev] CDI.KEYID = 6
3,860,539 UART: [idev] SUBJECT.KEYID = 7
3,861,565 UART: [idev] UDS.KEYID = 0
3,862,552 ready_for_fw is high
3,862,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,324 UART: [idev] Erasing UDS.KEYID = 0
6,341,582 UART: [idev] Sha1 KeyId Algorithm
6,363,911 UART: [idev] --
6,370,123 UART: [ldev] ++
6,370,802 UART: [ldev] CDI.KEYID = 6
6,371,718 UART: [ldev] SUBJECT.KEYID = 5
6,372,880 UART: [ldev] AUTHORITY.KEYID = 7
6,374,112 UART: [ldev] FE.KEYID = 1
6,386,373 UART: [ldev] Erasing FE.KEYID = 1
8,868,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,589,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,605,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,620,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,635,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,655,911 UART: [ldev] --
10,661,457 UART: [fwproc] Wait for Commands...
10,663,815 UART: [fwproc] Recv command 0x46574c44
10,666,078 UART: [fwproc] Recv'd Img size: 114360 bytes
15,292,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,372,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,488,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,031,608 >>> mbox cmd response: success
16,036,364 UART: [afmc] ++
16,037,067 UART: [afmc] CDI.KEYID = 6
16,038,304 UART: [afmc] SUBJECT.KEYID = 7
16,039,736 UART: [afmc] AUTHORITY.KEYID = 5
18,542,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,264,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,266,451 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,281,470 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,296,719 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,311,516 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,333,957 UART: [afmc] --
20,337,058 UART: [cold-reset] --
20,340,816 UART: [state] Locking Datavault
20,347,130 UART: [state] Locking PCR0, PCR1 and PCR31
20,349,325 UART: [state] Locking ICCM
20,350,366 UART: [exit] Launching FMC @ 0x40000130
20,359,020 UART:
20,359,250 UART: Running Caliptra FMC ...
20,360,272 UART:
20,360,420 UART: [state] CFI Enabled
20,368,409 UART: [fht] FMC Alias Private Key: 7
22,125,980 UART: [art] Extend RT PCRs Done
22,127,193 UART: [art] Lock RT PCRs Done
22,128,735 UART: [art] Populate DV Done
22,134,322 UART: [fht] FMC Alias Private Key: 7
22,136,078 UART: [art] Derive CDI
22,136,890 UART: [art] Store in in slot 0x4
22,179,153 UART: [art] Derive Key Pair
22,180,146 UART: [art] Store priv key in slot 0x5
24,607,265 UART: [art] Derive Key Pair - Done
24,619,669 UART: [art] Signing Cert with AUTHO
24,620,969 UART: RITY.KEYID = 7
26,326,388 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,891 UART: [art] PUB.X = E520F446F4550986A18A01AC973474630D7330B9686A2A2FCEC5A886D8293648BCA54F561D0C34E3C2A1977627A3AEA1
26,335,140 UART: [art] PUB.Y = 090258446E04FDA1C479956BCD13EBFB1AE3A1A7F8770B5E00879AA407D71CE44556F80D74E13A5A9B0EB003B96DC75F
26,342,348 UART: [art] SIG.R = 4C2040EAD39A336E8166DF82C4FBEB05E85BBC5F7A224EF525271F3F378018C1C812A37818E09B4227BA30775F3FB98B
26,349,759 UART: [art] SIG.S = 1F99D3EC3E1D91E1802C5F1CE565672F6D81E2B0E63562C2565FDC7407977BDCCBD3A07FEA7D2C4057583C27C91F6D4C
27,329,068 UART: Caliptra RT
27,329,768 UART: [state] CFI Enabled
27,447,423 UART: [rt] RT listening for mailbox commands...
27,449,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,605,095 UART: [rt]cmd =0x41544d4e, len=14344
31,222,139 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,755,532 ready_for_fw is high
3,756,047 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,035,978 >>> mbox cmd response: success
20,289,114 UART:
20,289,505 UART: Running Caliptra FMC ...
20,290,615 UART:
20,290,785 UART: [state] CFI Enabled
20,298,464 UART: [fht] FMC Alias Private Key: 7
22,055,406 UART: [art] Extend RT PCRs Done
22,056,617 UART: [art] Lock RT PCRs Done
22,058,106 UART: [art] Populate DV Done
22,063,681 UART: [fht] FMC Alias Private Key: 7
22,065,327 UART: [art] Derive CDI
22,066,141 UART: [art] Store in in slot 0x4
22,108,688 UART: [art] Derive Key Pair
22,109,777 UART: [art] Store priv key in slot 0x5
24,536,788 UART: [art] Derive Key Pair - Done
24,549,577 UART: [art] Signing Cert with AUTHO
24,550,891 UART: RITY.KEYID = 7
26,256,464 UART: [art] Erasing AUTHORITY.KEYID = 7
26,257,953 UART: [art] PUB.X = F71EAF65B2ED14CAFF8E83023B62A73CD75CF98BAC021FBDF14026C52348461FC04F8851843851D2405E68C5B576190E
26,265,206 UART: [art] PUB.Y = FAB405584330EAFA17AFF385AAEA6547E516B4567C6283A7A39E63BA10699ADA37A558CDD4F104A6B6B216FF28BBC059
26,272,497 UART: [art] SIG.R = F39F34423825BE7CECF9815DC48BBD1E998B41DF866160DB5C1F10D3FA8804612FE9D19D0B55ABE457668E44387F3EFD
26,279,898 UART: [art] SIG.S = 1B961D43B146A288AA7E1D32D3FB72A99D253425A80AEB2B2C0C574BDFCD79C753D8D40425C70DE4D14692B603465ED4
27,259,557 UART: Caliptra RT
27,260,273 UART: [state] CFI Enabled
27,377,954 UART: [rt] RT listening for mailbox commands...
27,380,285 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,535,625 UART: [rt]cmd =0x41544d4e, len=14344
31,144,103 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,547 UART: [kat] SHA2-256
882,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,593 UART: [kat] ++
886,745 UART: [kat] sha1
891,117 UART: [kat] SHA2-256
893,055 UART: [kat] SHA2-384
896,008 UART: [kat] SHA2-512-ACC
897,909 UART: [kat] ECC-384
903,598 UART: [kat] HMAC-384Kdf
908,280 UART: [kat] LMS
1,476,476 UART: [kat] --
1,477,163 UART: [cold-reset] ++
1,477,507 UART: [fht] Storing FHT @ 0x50003400
1,480,318 UART: [idev] ++
1,480,486 UART: [idev] CDI.KEYID = 6
1,480,846 UART: [idev] SUBJECT.KEYID = 7
1,481,270 UART: [idev] UDS.KEYID = 0
1,481,615 ready_for_fw is high
1,481,615 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,498 UART: [idev] Erasing UDS.KEYID = 0
1,506,006 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,656 UART: [idev] --
1,515,773 UART: [ldev] ++
1,515,941 UART: [ldev] CDI.KEYID = 6
1,516,304 UART: [ldev] SUBJECT.KEYID = 5
1,516,730 UART: [ldev] AUTHORITY.KEYID = 7
1,517,193 UART: [ldev] FE.KEYID = 1
1,522,681 UART: [ldev] Erasing FE.KEYID = 1
1,547,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,518 UART: [ldev] --
1,586,837 UART: [fwproc] Waiting for Commands...
1,587,550 UART: [fwproc] Received command 0x46574c44
1,588,341 UART: [fwproc] Received Image of size 114360 bytes
5,121,623 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,191 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,315,482 >>> mbox cmd response: success
5,316,602 UART: [afmc] ++
5,316,770 UART: [afmc] CDI.KEYID = 6
5,317,132 UART: [afmc] SUBJECT.KEYID = 7
5,317,557 UART: [afmc] AUTHORITY.KEYID = 5
5,352,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,368,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,369,103 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,374,812 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,704 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,386,405 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,394,295 UART: [afmc] --
5,395,179 UART: [cold-reset] --
5,395,823 UART: [state] Locking Datavault
5,397,124 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,728 UART: [state] Locking ICCM
5,398,230 UART: [exit] Launching FMC @ 0x40000130
5,403,559 UART:
5,403,575 UART: Running Caliptra FMC ...
5,403,983 UART:
5,404,037 UART: [state] CFI Enabled
5,414,531 UART: [fht] FMC Alias Private Key: 7
5,522,617 UART: [art] Extend RT PCRs Done
5,523,045 UART: [art] Lock RT PCRs Done
5,524,489 UART: [art] Populate DV Done
5,532,747 UART: [fht] FMC Alias Private Key: 7
5,533,911 UART: [art] Derive CDI
5,534,191 UART: [art] Store in in slot 0x4
5,619,756 UART: [art] Derive Key Pair
5,620,116 UART: [art] Store priv key in slot 0x5
5,633,096 UART: [art] Derive Key Pair - Done
5,647,873 UART: [art] Signing Cert with AUTHO
5,648,353 UART: RITY.KEYID = 7
5,663,563 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,328 UART: [art] PUB.X = 04B2DD0BE6FD8A8537839B0C2788B3DC2DA7BA1461FEF25622375792CE172E8D54496F2F7573F9FDA8A7C09DA9869DD6
5,671,099 UART: [art] PUB.Y = AADC259E4F1C70275CE5427B855DEB03A02EE0D8E0C525C8F2BF2EB11A08DF9AEE2F2F8E363D9B5E1CB264EDF9709BDA
5,678,071 UART: [art] SIG.R = 30E5EE7D178974979EF0E55A22D47A095923408C577A2F4188D51D102EE6C0AF317DD8CA678853BB22202DAE1BAC31C2
5,684,842 UART: [art] SIG.S = 8EFA8032D286D2D0E245CEF904FDCD47F982EEAC93A297176622FEBA6838007B9F102CE9EB3329E6A9868C2142424462
5,708,420 UART: Caliptra RT
5,708,674 UART: [state] CFI Enabled
5,817,020 UART: [rt] RT listening for mailbox commands...
5,817,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,345 UART: [rt]cmd =0x41544d4e, len=14344
6,897,676 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,235 ready_for_fw is high
1,362,235 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,352,239 >>> mbox cmd response: success
5,413,154 UART:
5,413,170 UART: Running Caliptra FMC ...
5,413,578 UART:
5,413,632 UART: [state] CFI Enabled
5,424,176 UART: [fht] FMC Alias Private Key: 7
5,531,994 UART: [art] Extend RT PCRs Done
5,532,422 UART: [art] Lock RT PCRs Done
5,534,228 UART: [art] Populate DV Done
5,542,232 UART: [fht] FMC Alias Private Key: 7
5,543,238 UART: [art] Derive CDI
5,543,518 UART: [art] Store in in slot 0x4
5,629,013 UART: [art] Derive Key Pair
5,629,373 UART: [art] Store priv key in slot 0x5
5,641,917 UART: [art] Derive Key Pair - Done
5,656,689 UART: [art] Signing Cert with AUTHO
5,657,169 UART: RITY.KEYID = 7
5,672,039 UART: [art] Erasing AUTHORITY.KEYID = 7
5,672,804 UART: [art] PUB.X = FF5309512229AABC4AC6480EF56CC5DB28F4A03087C699910E87B66E2AFDCB445891EDADE7F570456A0769CB2E52079E
5,679,569 UART: [art] PUB.Y = CD69DCC322996A8FDD300BAB3D89C6BFB467C78F42A647DDBDA4E0484DCD1798C68DBC9B1D8AD7918BDAF4059BE3A3B0
5,686,541 UART: [art] SIG.R = 80A4422CF1BE053A52FD07DD26B11CC2FFB40FD68FC1856F0C95C41E8017C5C81726A75435386996D739AE403E84E34C
5,693,303 UART: [art] SIG.S = BE058645E469B13DF6382B338BAC94DA918F64E2FDD4551A4193485AD138E8C0C28B1F3AED5C673A0E22867C11CC8630
5,717,324 UART: Caliptra RT
5,717,578 UART: [state] CFI Enabled
5,825,755 UART: [rt] RT listening for mailbox commands...
5,826,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,949,024 UART: [rt]cmd =0x41544d4e, len=14344
6,894,086 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,622 UART: [kat] SHA2-256
892,560 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,365 UART: [kat] LMS
1,475,561 UART: [kat] --
1,476,450 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,975 UART: [idev] ++
1,480,143 UART: [idev] CDI.KEYID = 6
1,480,503 UART: [idev] SUBJECT.KEYID = 7
1,480,927 UART: [idev] UDS.KEYID = 0
1,481,272 ready_for_fw is high
1,481,272 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,099 UART: [idev] Erasing UDS.KEYID = 0
1,506,481 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,995 UART: [idev] --
1,516,160 UART: [ldev] ++
1,516,328 UART: [ldev] CDI.KEYID = 6
1,516,691 UART: [ldev] SUBJECT.KEYID = 5
1,517,117 UART: [ldev] AUTHORITY.KEYID = 7
1,517,580 UART: [ldev] FE.KEYID = 1
1,523,046 UART: [ldev] Erasing FE.KEYID = 1
1,548,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,765 UART: [ldev] --
1,588,184 UART: [fwproc] Waiting for Commands...
1,588,933 UART: [fwproc] Received command 0x46574c44
1,589,724 UART: [fwproc] Received Image of size 114360 bytes
5,273,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,302,270 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,331,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,467,525 >>> mbox cmd response: success
5,468,769 UART: [afmc] ++
5,468,937 UART: [afmc] CDI.KEYID = 6
5,469,299 UART: [afmc] SUBJECT.KEYID = 7
5,469,724 UART: [afmc] AUTHORITY.KEYID = 5
5,505,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,521,434 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,522,214 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,527,923 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,533,815 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,539,516 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,547,434 UART: [afmc] --
5,548,318 UART: [cold-reset] --
5,548,886 UART: [state] Locking Datavault
5,550,005 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,609 UART: [state] Locking ICCM
5,551,143 UART: [exit] Launching FMC @ 0x40000130
5,556,472 UART:
5,556,488 UART: Running Caliptra FMC ...
5,556,896 UART:
5,557,039 UART: [state] CFI Enabled
5,567,595 UART: [fht] FMC Alias Private Key: 7
5,676,091 UART: [art] Extend RT PCRs Done
5,676,519 UART: [art] Lock RT PCRs Done
5,678,077 UART: [art] Populate DV Done
5,686,173 UART: [fht] FMC Alias Private Key: 7
5,687,151 UART: [art] Derive CDI
5,687,431 UART: [art] Store in in slot 0x4
5,772,954 UART: [art] Derive Key Pair
5,773,314 UART: [art] Store priv key in slot 0x5
5,786,628 UART: [art] Derive Key Pair - Done
5,801,576 UART: [art] Signing Cert with AUTHO
5,802,056 UART: RITY.KEYID = 7
5,817,326 UART: [art] Erasing AUTHORITY.KEYID = 7
5,818,091 UART: [art] PUB.X = 630B401880101C3F2F1EAC0B32D11B2B149A900F830FB097759E923B349B48127E9FA7E9E28212733A1B66F9F9D80B49
5,824,842 UART: [art] PUB.Y = 5DDEFE72D804883C17417B1D8A9A73AEDE6B82F2F6DAA39805B73F2CBE3F855E710871E8028F1ACF431D04CE1E3BA8BA
5,831,797 UART: [art] SIG.R = D9BC11FA764E62A2362A81B66A2C1500726A6C634DD491A979FA410B7A41A39248D840FAC1454D76D76821E8A559E026
5,838,540 UART: [art] SIG.S = A021D15CEAB7B982C7BA02F220D603287854BABE2FCE7FFEAA4618CBD74187B8EC2A0E60AA9F74F24A6B7E45E53524D9
5,862,338 UART: Caliptra RT
5,862,684 UART: [state] CFI Enabled
5,970,827 UART: [rt] RT listening for mailbox commands...
5,971,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,094,400 UART: [rt]cmd =0x41544d4e, len=14344
7,055,002 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,148 ready_for_fw is high
1,363,148 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,204,772 >>> mbox cmd response: success
5,266,229 UART:
5,266,245 UART: Running Caliptra FMC ...
5,266,653 UART:
5,266,796 UART: [state] CFI Enabled
5,277,274 UART: [fht] FMC Alias Private Key: 7
5,385,544 UART: [art] Extend RT PCRs Done
5,385,972 UART: [art] Lock RT PCRs Done
5,387,526 UART: [art] Populate DV Done
5,395,984 UART: [fht] FMC Alias Private Key: 7
5,397,140 UART: [art] Derive CDI
5,397,420 UART: [art] Store in in slot 0x4
5,483,363 UART: [art] Derive Key Pair
5,483,723 UART: [art] Store priv key in slot 0x5
5,497,135 UART: [art] Derive Key Pair - Done
5,511,713 UART: [art] Signing Cert with AUTHO
5,512,193 UART: RITY.KEYID = 7
5,527,191 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,956 UART: [art] PUB.X = E711E3E9645AA887C1E02C7429BD89028ECFB1FEE392692DB0B6B954C0FCDEF8C742E3084CDA665843FADEB25B4DFE61
5,534,740 UART: [art] PUB.Y = 3E85DE48529DD6B39ED5AC60A9496D364A66B18E09B851C93314B0CE3152FFDD344F9CE6A492991BADF6C19CEC6590F3
5,541,699 UART: [art] SIG.R = F88AAFF00B80B12CD3CD513CC6D6796BFB0695D547771DB5723A00E57A3B06784C6911A81F600B4DE7478E305289195F
5,548,437 UART: [art] SIG.S = 99BE8A307E535E6B3F89D8B1B177A46382626039C12C8CDC91CE7483365E8DAA5B34594065E8B53878BAA68580117E41
5,571,772 UART: Caliptra RT
5,572,118 UART: [state] CFI Enabled
5,679,877 UART: [rt] RT listening for mailbox commands...
5,680,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,803,148 UART: [rt]cmd =0x41544d4e, len=14344
6,760,939 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,002 UART: [kat] HMAC-384Kdf
922,540 UART: [kat] LMS
1,170,868 UART: [kat] --
1,171,591 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,572 UART: [idev] ++
1,174,740 UART: [idev] CDI.KEYID = 6
1,175,100 UART: [idev] SUBJECT.KEYID = 7
1,175,524 UART: [idev] UDS.KEYID = 0
1,175,869 ready_for_fw is high
1,175,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,201,053 UART: [idev] Sha1 KeyId Algorithm
1,209,635 UART: [idev] --
1,210,813 UART: [ldev] ++
1,210,981 UART: [ldev] CDI.KEYID = 6
1,211,344 UART: [ldev] SUBJECT.KEYID = 5
1,211,770 UART: [ldev] AUTHORITY.KEYID = 7
1,212,233 UART: [ldev] FE.KEYID = 1
1,217,367 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,496 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,860 UART: [fwproc] Recv'd Img size: 114360 bytes
3,114,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,306,551 >>> mbox cmd response: success
3,307,753 UART: [afmc] ++
3,307,921 UART: [afmc] CDI.KEYID = 6
3,308,283 UART: [afmc] SUBJECT.KEYID = 7
3,308,708 UART: [afmc] AUTHORITY.KEYID = 5
3,344,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,735 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,444 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,336 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,047 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,054 UART: [afmc] --
3,388,134 UART: [cold-reset] --
3,389,084 UART: [state] Locking Datavault
3,390,543 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,147 UART: [state] Locking ICCM
3,391,703 UART: [exit] Launching FMC @ 0x40000130
3,397,032 UART:
3,397,048 UART: Running Caliptra FMC ...
3,397,456 UART:
3,397,510 UART: [state] CFI Enabled
3,408,388 UART: [fht] FMC Alias Private Key: 7
3,516,782 UART: [art] Extend RT PCRs Done
3,517,210 UART: [art] Lock RT PCRs Done
3,518,744 UART: [art] Populate DV Done
3,526,996 UART: [fht] FMC Alias Private Key: 7
3,528,000 UART: [art] Derive CDI
3,528,280 UART: [art] Store in in slot 0x4
3,614,455 UART: [art] Derive Key Pair
3,614,815 UART: [art] Store priv key in slot 0x5
3,628,411 UART: [art] Derive Key Pair - Done
3,642,962 UART: [art] Signing Cert with AUTHO
3,643,442 UART: RITY.KEYID = 7
3,658,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,481 UART: [art] PUB.X = DF41D257451E4AC68B63BAD4D95EF32C594C5DD9B990928FEFCE3DE8C5981099A3F4B3D7CEDBAD706397668E783A8998
3,666,265 UART: [art] PUB.Y = 6B32B2C958B2EBE592CC8EB12116CA03DA5D9510889B406012DDAD2C14659DDD464D39DAFAE4033AAF4B8CCD56C2DAFE
3,673,233 UART: [art] SIG.R = C59459F850F724E33A234704AF4C7FF0FB5207BFD6CC4D4F3DC518C37390E705C751614089B30457747988334CF57893
3,679,983 UART: [art] SIG.S = 8A0C416E76E9A674048A46B448E907716AC048E88564123BCC2C087D10904C6732E267E2DD3C411902AB2C312197CD1B
3,703,907 UART: Caliptra RT
3,704,161 UART: [state] CFI Enabled
3,811,643 UART: [rt] RT listening for mailbox commands...
3,812,313 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,056 UART: [rt]cmd =0x41544d4e, len=14344
4,899,578 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 ready_for_fw is high
1,060,119 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,052 >>> mbox cmd response: success
3,233,577 UART:
3,233,593 UART: Running Caliptra FMC ...
3,234,001 UART:
3,234,055 UART: [state] CFI Enabled
3,244,239 UART: [fht] FMC Alias Private Key: 7
3,351,475 UART: [art] Extend RT PCRs Done
3,351,903 UART: [art] Lock RT PCRs Done
3,353,293 UART: [art] Populate DV Done
3,361,329 UART: [fht] FMC Alias Private Key: 7
3,362,279 UART: [art] Derive CDI
3,362,559 UART: [art] Store in in slot 0x4
3,448,194 UART: [art] Derive Key Pair
3,448,554 UART: [art] Store priv key in slot 0x5
3,462,158 UART: [art] Derive Key Pair - Done
3,476,726 UART: [art] Signing Cert with AUTHO
3,477,206 UART: RITY.KEYID = 7
3,492,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,115 UART: [art] PUB.X = 05EC2A5FE78774995F225319542D5382899FB4A4946BA8CF0D33FDB51630970A9D27ADEAAB525D64422A87B63B893101
3,499,871 UART: [art] PUB.Y = ED7941DF3DAF1BE755741E230A7B180D87DBBFBDEB76F30E29D1550B6120665942AB8E9253B677074E7D70C07A7F2572
3,506,812 UART: [art] SIG.R = B37EE4A50C00EBA0650EA4D52D7BA51D74768B1DC943D8993C3DA3624FED76FC75198B580A5D961E7EA82BCA53871F05
3,513,560 UART: [art] SIG.S = ECD31289EA873E78850520D072A3490E756BC35C54DD398C94A36DF8742637B8656B64DF32440893E3400D060F582585
3,537,299 UART: Caliptra RT
3,537,553 UART: [state] CFI Enabled
3,644,603 UART: [rt] RT listening for mailbox commands...
3,645,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,056 UART: [rt]cmd =0x41544d4e, len=14344
4,722,630 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
901,872 UART: [kat] SHA2-256
903,812 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
918,237 UART: [kat] HMAC-384Kdf
922,643 UART: [kat] LMS
1,170,971 UART: [kat] --
1,172,032 UART: [cold-reset] ++
1,172,496 UART: [fht] FHT @ 0x50003400
1,174,973 UART: [idev] ++
1,175,141 UART: [idev] CDI.KEYID = 6
1,175,501 UART: [idev] SUBJECT.KEYID = 7
1,175,925 UART: [idev] UDS.KEYID = 0
1,176,270 ready_for_fw is high
1,176,270 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,729 UART: [idev] Erasing UDS.KEYID = 0
1,201,106 UART: [idev] Sha1 KeyId Algorithm
1,209,584 UART: [idev] --
1,210,634 UART: [ldev] ++
1,210,802 UART: [ldev] CDI.KEYID = 6
1,211,165 UART: [ldev] SUBJECT.KEYID = 5
1,211,591 UART: [ldev] AUTHORITY.KEYID = 7
1,212,054 UART: [ldev] FE.KEYID = 1
1,217,366 UART: [ldev] Erasing FE.KEYID = 1
1,244,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,376 UART: [ldev] --
1,282,813 UART: [fwproc] Wait for Commands...
1,283,581 UART: [fwproc] Recv command 0x46574c44
1,284,309 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,319,017 >>> mbox cmd response: success
3,320,247 UART: [afmc] ++
3,320,415 UART: [afmc] CDI.KEYID = 6
3,320,777 UART: [afmc] SUBJECT.KEYID = 7
3,321,202 UART: [afmc] AUTHORITY.KEYID = 5
3,356,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,043 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,752 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,644 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,355 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,098 UART: [afmc] --
3,399,980 UART: [cold-reset] --
3,400,914 UART: [state] Locking Datavault
3,401,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,381 UART: [state] Locking ICCM
3,403,025 UART: [exit] Launching FMC @ 0x40000130
3,408,354 UART:
3,408,370 UART: Running Caliptra FMC ...
3,408,778 UART:
3,408,921 UART: [state] CFI Enabled
3,419,583 UART: [fht] FMC Alias Private Key: 7
3,528,181 UART: [art] Extend RT PCRs Done
3,528,609 UART: [art] Lock RT PCRs Done
3,530,063 UART: [art] Populate DV Done
3,538,249 UART: [fht] FMC Alias Private Key: 7
3,539,311 UART: [art] Derive CDI
3,539,591 UART: [art] Store in in slot 0x4
3,625,602 UART: [art] Derive Key Pair
3,625,962 UART: [art] Store priv key in slot 0x5
3,638,860 UART: [art] Derive Key Pair - Done
3,654,158 UART: [art] Signing Cert with AUTHO
3,654,638 UART: RITY.KEYID = 7
3,669,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,435 UART: [art] PUB.X = 081FE7A03A8F909D307264B92ECE48592CC9125A9AA537CECC04A21FC1F57C227D06AF106B7015695044E6337FF18AEB
3,677,202 UART: [art] PUB.Y = F652170AEF12569B849B6829B496CD98FBBF98D1758204ABC5754E9E98367DBCD8DE47BD7663D3ABD5A5C8BB3ED34589
3,684,158 UART: [art] SIG.R = C1FF9C782A7908C7169861739561A0641F97E9243020BCDB550C052E86F356C80A56B304F375861A3C8FD3D09B8382C7
3,690,905 UART: [art] SIG.S = 8E8184A4539C78A1CDC1000A2771B183647D8E3EC921A2E2A7CEFB62180BCA08301FCAE318331A56AD19C26A0A4C5B51
3,714,932 UART: Caliptra RT
3,715,278 UART: [state] CFI Enabled
3,822,072 UART: [rt] RT listening for mailbox commands...
3,822,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,211 UART: [rt]cmd =0x41544d4e, len=14344
4,907,850 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,156 ready_for_fw is high
1,060,156 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,176,804 >>> mbox cmd response: success
3,238,581 UART:
3,238,597 UART: Running Caliptra FMC ...
3,239,005 UART:
3,239,148 UART: [state] CFI Enabled
3,249,474 UART: [fht] FMC Alias Private Key: 7
3,357,630 UART: [art] Extend RT PCRs Done
3,358,058 UART: [art] Lock RT PCRs Done
3,359,802 UART: [art] Populate DV Done
3,368,198 UART: [fht] FMC Alias Private Key: 7
3,369,172 UART: [art] Derive CDI
3,369,452 UART: [art] Store in in slot 0x4
3,455,361 UART: [art] Derive Key Pair
3,455,721 UART: [art] Store priv key in slot 0x5
3,469,705 UART: [art] Derive Key Pair - Done
3,484,735 UART: [art] Signing Cert with AUTHO
3,485,215 UART: RITY.KEYID = 7
3,500,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,234 UART: [art] PUB.X = FB1B3948732ABEAAFC965EA8C1C293CCA5A5E0A03C1CCB318AD9CBB3115A41F5716C32AF5B3CED779149568EF221629F
3,508,024 UART: [art] PUB.Y = 3AC993EA63FDAE10DBE23BBFA8840A56BCFE3F321BD59830E22456B10AF64B71643E0DDFC4915719D3C2275F7D69D2ED
3,514,983 UART: [art] SIG.R = 5EE7494D3192C26EE84A9CFF6FC87A90953E91ED86AB90DF132D18C88855AEAEC02544990F7ED3629F5FA078C9C53EA8
3,521,762 UART: [art] SIG.S = 6C09787925708565A2468A389212CB0A2E7FFE91E4B84C2B4714E10B7D1EAAE665094D7E7E44D2A4FDD73D8C4ABC1683
3,545,499 UART: Caliptra RT
3,545,845 UART: [state] CFI Enabled
3,653,991 UART: [rt] RT listening for mailbox commands...
3,654,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,440 UART: [rt]cmd =0x41544d4e, len=14344
4,730,901 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,935 UART: [state] WD Timer not started. Device not locked for debugging
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,651 UART: [idev] ++
1,172,819 UART: [idev] CDI.KEYID = 6
1,173,180 UART: [idev] SUBJECT.KEYID = 7
1,173,605 UART: [idev] UDS.KEYID = 0
1,173,951 ready_for_fw is high
1,173,951 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,214,878 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 114360 bytes
3,130,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,323,365 >>> mbox cmd response: success
3,324,402 UART: [afmc] ++
3,324,570 UART: [afmc] CDI.KEYID = 6
3,324,933 UART: [afmc] SUBJECT.KEYID = 7
3,325,359 UART: [afmc] AUTHORITY.KEYID = 5
3,360,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,470 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,180 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,070 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,781 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,575 UART: [afmc] --
3,404,641 UART: [cold-reset] --
3,405,683 UART: [state] Locking Datavault
3,406,990 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,594 UART: [state] Locking ICCM
3,408,152 UART: [exit] Launching FMC @ 0x40000130
3,413,481 UART:
3,413,497 UART: Running Caliptra FMC ...
3,413,905 UART:
3,413,959 UART: [state] CFI Enabled
3,424,319 UART: [fht] FMC Alias Private Key: 7
3,531,849 UART: [art] Extend RT PCRs Done
3,532,277 UART: [art] Lock RT PCRs Done
3,533,301 UART: [art] Populate DV Done
3,541,557 UART: [fht] FMC Alias Private Key: 7
3,542,497 UART: [art] Derive CDI
3,542,777 UART: [art] Store in in slot 0x4
3,628,366 UART: [art] Derive Key Pair
3,628,726 UART: [art] Store priv key in slot 0x5
3,641,780 UART: [art] Derive Key Pair - Done
3,656,789 UART: [art] Signing Cert with AUTHO
3,657,269 UART: RITY.KEYID = 7
3,672,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,098 UART: [art] PUB.X = 6D02EBF9E54551CC19247CEB68E6DC7EE0FFDDCD40A4CBE432EE954683299788CFB744A770B104F12C48AEE112E8EC81
3,679,880 UART: [art] PUB.Y = 68A99327CAC8CBB58C11475BE6752266B3226730FF857D96CA629DB2EDF3BAEB88F0ECC50CB8F1C51DEDE3A385C17E6D
3,686,847 UART: [art] SIG.R = 6737193948D098EBA306E6AC4EB210B09A403B8BBDCDAFF1FCE812D07445883AC47E76ACA942C5EA2090663DC4CCB7BB
3,693,632 UART: [art] SIG.S = 0998AFC49E13AD3C93276BE3A8FF41D1CCC4ACCF446EF1C414D6F3CCBF38A8CC23DDA8892CFB3BBAF5B964468A1E08D2
3,717,417 UART: Caliptra RT
3,717,671 UART: [state] CFI Enabled
3,825,507 UART: [rt] RT listening for mailbox commands...
3,826,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,840 UART: [rt]cmd =0x41544d4e, len=14344
4,898,750 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,640 ready_for_fw is high
1,055,640 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,413 >>> mbox cmd response: success
3,234,520 UART:
3,234,536 UART: Running Caliptra FMC ...
3,234,944 UART:
3,234,998 UART: [state] CFI Enabled
3,245,650 UART: [fht] FMC Alias Private Key: 7
3,353,320 UART: [art] Extend RT PCRs Done
3,353,748 UART: [art] Lock RT PCRs Done
3,355,138 UART: [art] Populate DV Done
3,363,316 UART: [fht] FMC Alias Private Key: 7
3,364,418 UART: [art] Derive CDI
3,364,698 UART: [art] Store in in slot 0x4
3,450,363 UART: [art] Derive Key Pair
3,450,723 UART: [art] Store priv key in slot 0x5
3,464,623 UART: [art] Derive Key Pair - Done
3,479,488 UART: [art] Signing Cert with AUTHO
3,479,968 UART: RITY.KEYID = 7
3,494,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,639 UART: [art] PUB.X = 8A61138302E0CE8CA4E3E496BC7FCE95B87C102D260735F25924A4B56DE32689176FAFD58F467557027902D4E8C34525
3,502,393 UART: [art] PUB.Y = 392E0DB9C88D3950E3C1DFBD9EB96AC83A7D8C5AA1F724848810BB16C9508B716216FEF7245D7DEEC2E5197052FF0B32
3,509,349 UART: [art] SIG.R = 69444316CE7CE236F27EE34CE3E1F58E0CEA65DFCFCC7EF134E3F352F2F0AB1A2ABF393D89795AEB2B5390D07914CFFC
3,516,140 UART: [art] SIG.S = 6BC51FD51F11074B7BE658A974EAAACEB98F55C4E3CAAC5E2EECFB7A3C7FB91B28448CA6ADF33F39039D36655B15F28B
3,539,961 UART: Caliptra RT
3,540,215 UART: [state] CFI Enabled
3,647,499 UART: [rt] RT listening for mailbox commands...
3,648,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,012 UART: [rt]cmd =0x41544d4e, len=14344
4,721,194 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,174,622 ready_for_fw is high
1,174,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,194 UART: [idev] --
1,209,281 UART: [ldev] ++
1,209,449 UART: [ldev] CDI.KEYID = 6
1,209,813 UART: [ldev] SUBJECT.KEYID = 5
1,210,240 UART: [ldev] AUTHORITY.KEYID = 7
1,210,703 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,577 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,320,466 >>> mbox cmd response: success
3,321,687 UART: [afmc] ++
3,321,855 UART: [afmc] CDI.KEYID = 6
3,322,218 UART: [afmc] SUBJECT.KEYID = 7
3,322,644 UART: [afmc] AUTHORITY.KEYID = 5
3,357,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,803 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,513 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,403 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,114 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,152 UART: [afmc] --
3,401,184 UART: [cold-reset] --
3,402,116 UART: [state] Locking Datavault
3,403,329 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,933 UART: [state] Locking ICCM
3,404,585 UART: [exit] Launching FMC @ 0x40000130
3,409,914 UART:
3,409,930 UART: Running Caliptra FMC ...
3,410,338 UART:
3,410,481 UART: [state] CFI Enabled
3,421,607 UART: [fht] FMC Alias Private Key: 7
3,529,825 UART: [art] Extend RT PCRs Done
3,530,253 UART: [art] Lock RT PCRs Done
3,531,525 UART: [art] Populate DV Done
3,540,063 UART: [fht] FMC Alias Private Key: 7
3,541,007 UART: [art] Derive CDI
3,541,287 UART: [art] Store in in slot 0x4
3,627,058 UART: [art] Derive Key Pair
3,627,418 UART: [art] Store priv key in slot 0x5
3,640,574 UART: [art] Derive Key Pair - Done
3,655,388 UART: [art] Signing Cert with AUTHO
3,655,868 UART: RITY.KEYID = 7
3,671,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,287 UART: [art] PUB.X = 3AED39429190D8C70F5CFD55A8F8C0C11D4D442CBA90328BAF98B370D33829CC58623256A47AF02FAF19F6CDF835B78D
3,679,066 UART: [art] PUB.Y = F3DFF64E47141199C859354B37793EA06F021CDA8A53AA3A7F081BE3FCECA831F5B95484DBCD06708D50B39F46398C34
3,686,015 UART: [art] SIG.R = 2FDC11971C5A4D6E414973B844B103CB8179C22D21A71488090B341E4E8386657AB27A456637FFB84CC7B6951A7F6A85
3,692,772 UART: [art] SIG.S = AB052423BA44194B6C73340DF7B8E6994C14F3D7781CDB5F8D2F679563CB664A62326F839CDB1B2C43DE4C0EAF9BAAB1
3,716,736 UART: Caliptra RT
3,717,082 UART: [state] CFI Enabled
3,824,999 UART: [rt] RT listening for mailbox commands...
3,825,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,500 UART: [rt]cmd =0x41544d4e, len=14344
4,905,971 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,053 ready_for_fw is high
1,057,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,746 >>> mbox cmd response: success
3,235,013 UART:
3,235,029 UART: Running Caliptra FMC ...
3,235,437 UART:
3,235,580 UART: [state] CFI Enabled
3,246,092 UART: [fht] FMC Alias Private Key: 7
3,353,934 UART: [art] Extend RT PCRs Done
3,354,362 UART: [art] Lock RT PCRs Done
3,355,792 UART: [art] Populate DV Done
3,363,980 UART: [fht] FMC Alias Private Key: 7
3,365,026 UART: [art] Derive CDI
3,365,306 UART: [art] Store in in slot 0x4
3,450,663 UART: [art] Derive Key Pair
3,451,023 UART: [art] Store priv key in slot 0x5
3,464,253 UART: [art] Derive Key Pair - Done
3,479,041 UART: [art] Signing Cert with AUTHO
3,479,521 UART: RITY.KEYID = 7
3,495,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,860 UART: [art] PUB.X = E1E8995F2969BC0FB7947812F5261A135E7DFE761B2639EF0EDD2DCBBBD6CA90AB24FE0044FE4AFC226D79118939B7F4
3,502,618 UART: [art] PUB.Y = 434DFBA5B8A8A82AB778E83D926D6725692EDDF3BD0FAE1EC40C7D7427A5B450F6E55E3D2B8206C5A3D7A8B230022204
3,509,565 UART: [art] SIG.R = C980FE68C36C9CF80E4F41FE735B99E1622E05DCEFE5DB50BC0C93B56338EB022FB98969C3D7011838FE19688B161109
3,516,323 UART: [art] SIG.S = CB73575AAD9B039EE1EB35FFB13FAAF6A773EDB6E81CFC8CF5C1D5BDD132479EF327AEF2842FBB43C8C64B57815EDC43
3,540,825 UART: Caliptra RT
3,541,171 UART: [state] CFI Enabled
3,649,479 UART: [rt] RT listening for mailbox commands...
3,650,149 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,910 UART: [rt]cmd =0x41544d4e, len=14344
4,737,914 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,399 UART:
193,209 UART: Running Caliptra ROM ...
194,415 UART:
194,566 UART: [state] CFI Enabled
266,077 UART: [state] LifecycleState = Unprovisioned
268,033 UART: [state] DebugLocked = No
269,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,090 UART: [kat] SHA2-256
444,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,296 UART: [kat] ++
455,740 UART: [kat] sha1
465,820 UART: [kat] SHA2-256
468,467 UART: [kat] SHA2-384
473,463 UART: [kat] SHA2-512-ACC
475,824 UART: [kat] ECC-384
2,769,627 UART: [kat] HMAC-384Kdf
2,800,473 UART: [kat] LMS
3,990,710 UART: [kat] --
3,995,796 UART: [cold-reset] ++
3,997,585 UART: [fht] Storing FHT @ 0x50003400
4,008,061 UART: [idev] ++
4,008,624 UART: [idev] CDI.KEYID = 6
4,009,542 UART: [idev] SUBJECT.KEYID = 7
4,010,785 UART: [idev] UDS.KEYID = 0
4,011,884 ready_for_fw is high
4,012,109 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,637 UART: [idev] Erasing UDS.KEYID = 0
7,346,309 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,068 UART: [idev] --
7,372,438 UART: [ldev] ++
7,373,000 UART: [ldev] CDI.KEYID = 6
7,374,036 UART: [ldev] SUBJECT.KEYID = 5
7,375,140 UART: [ldev] AUTHORITY.KEYID = 7
7,376,416 UART: [ldev] FE.KEYID = 1
7,423,391 UART: [ldev] Erasing FE.KEYID = 1
10,759,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,926 UART: [ldev] --
13,137,069 UART: [fwproc] Waiting for Commands...
13,138,941 UART: [fwproc] Received command 0x46574c44
13,141,168 UART: [fwproc] Received Image of size 114036 bytes
22,498,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,582,327 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,651,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,968,552 >>> mbox cmd response: success
22,972,010 UART: [afmc] ++
22,972,603 UART: [afmc] CDI.KEYID = 6
22,973,513 UART: [afmc] SUBJECT.KEYID = 7
22,974,781 UART: [afmc] AUTHORITY.KEYID = 5
26,343,149 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,642,802 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,645,070 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,659,631 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,674,372 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,688,593 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,710,202 UART: [afmc] --
28,714,920 UART: [cold-reset] --
28,718,180 UART: [state] Locking Datavault
28,723,314 UART: [state] Locking PCR0, PCR1 and PCR31
28,725,008 UART: [state] Locking ICCM
28,727,715 UART: [exit] Launching FMC @ 0x40000130
28,736,109 UART:
28,736,339 UART: Running Caliptra FMC ...
28,737,431 UART:
28,737,583 UART: [state] CFI Enabled
28,801,615 UART: [fht] FMC Alias Private Key: 7
31,139,614 UART: [art] Extend RT PCRs Done
31,140,834 UART: [art] Lock RT PCRs Done
31,142,482 UART: [art] Populate DV Done
31,147,993 UART: [fht] FMC Alias Private Key: 7
31,149,640 UART: [art] Derive CDI
31,150,449 UART: [art] Store in in slot 0x4
31,209,757 UART: [art] Derive Key Pair
31,210,795 UART: [art] Store priv key in slot 0x5
34,503,739 UART: [art] Derive Key Pair - Done
34,516,894 UART: [art] Signing Cert with AUTHO
34,518,246 UART: RITY.KEYID = 7
36,804,820 UART: [art] Erasing AUTHORITY.KEYID = 7
36,806,326 UART: [art] PUB.X = 709AE330382CD0CB6A4AC591651D216D1CA1B2DEAFBE29E2027DE24D9CC01A88C5FA8F261942C7F9DA241872E2056ECE
36,813,619 UART: [art] PUB.Y = BE393769B4AF8484E0E1DEEFE22440F051CDAC08ECDD978502904C7BCDF56C9658045CD419D7FABBE090C804CD197B63
36,820,866 UART: [art] SIG.R = BF81629B71492CFFC804BA1F994149712C1753C50CE557DEF41B5F21B6B4E52FC135243E9A7EA03CE608EB858EBC3B88
36,828,225 UART: [art] SIG.S = FC3316257CDE80DDA2CC5C2A906D40B2CCA61324A130842E8FA8E06A4241D12F1A258075E4D7D13DECCF710832EBC4CA
38,133,268 UART: Caliptra RT
38,133,976 UART: [state] CFI Enabled
38,294,003 UART: [rt] RT listening for mailbox commands...
38,296,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,451,602 UART: [rt]cmd =0x41544d4e, len=14344
44,760,757 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
3,785,690 ready_for_fw is high
3,786,088 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,028,234 >>> mbox cmd response: success
27,723,770 UART:
27,724,165 UART: Running Caliptra FMC ...
27,725,258 UART:
27,725,404 UART: [state] CFI Enabled
27,775,559 UART: [fht] FMC Alias Private Key: 7
30,113,155 UART: [art] Extend RT PCRs Done
30,114,387 UART: [art] Lock RT PCRs Done
30,116,334 UART: [art] Populate DV Done
30,121,641 UART: [fht] FMC Alias Private Key: 7
30,123,230 UART: [art] Derive CDI
30,123,971 UART: [art] Store in in slot 0x4
30,184,908 UART: [art] Derive Key Pair
30,185,952 UART: [art] Store priv key in slot 0x5
33,478,515 UART: [art] Derive Key Pair - Done
33,491,573 UART: [art] Signing Cert with AUTHO
33,492,870 UART: RITY.KEYID = 7
35,779,755 UART: [art] Erasing AUTHORITY.KEYID = 7
35,781,258 UART: [art] PUB.X = 193AE7F9A7D032B5D4FCE5424257578BEEF979EDAC19DF06033506987B722D4071D337601F0A5A0AD330933C6DCFCDE8
35,788,506 UART: [art] PUB.Y = 069553B18172A28F373476CA90170389CB5EFF35E4F5DCC8D485240564453F0D05DEEFBA6F2758CA4E1B2C09315AF66D
35,795,788 UART: [art] SIG.R = 367C22B5FC7626024F4C79353580C1CB310B226FE7D1739D359F7DD64FEFB3F33A8F2DB6BDDBE16A19FCE035F8BC8670
35,803,161 UART: [art] SIG.S = 154C28B0BCBB7259456957944D4C52495A6A12F2FEFDD4B2D06A10B26C3F2B58202260F994C08EB37765DDBE2C155FE2
37,107,918 UART: Caliptra RT
37,108,638 UART: [state] CFI Enabled
37,270,077 UART: [rt] RT listening for mailbox commands...
37,272,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,427,692 UART: [rt]cmd =0x41544d4e, len=14344
43,892,080 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,547 UART:
192,921 UART: Running Caliptra ROM ...
194,033 UART:
603,678 UART: [state] CFI Enabled
615,506 UART: [state] LifecycleState = Unprovisioned
617,459 UART: [state] DebugLocked = No
619,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,290 UART: [kat] SHA2-256
794,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,546 UART: [kat] ++
805,339 UART: [kat] sha1
816,310 UART: [kat] SHA2-256
819,047 UART: [kat] SHA2-384
824,477 UART: [kat] SHA2-512-ACC
826,847 UART: [kat] ECC-384
3,108,916 UART: [kat] HMAC-384Kdf
3,121,353 UART: [kat] LMS
4,311,490 UART: [kat] --
4,315,727 UART: [cold-reset] ++
4,317,518 UART: [fht] Storing FHT @ 0x50003400
4,328,671 UART: [idev] ++
4,329,279 UART: [idev] CDI.KEYID = 6
4,330,214 UART: [idev] SUBJECT.KEYID = 7
4,331,463 UART: [idev] UDS.KEYID = 0
4,332,535 ready_for_fw is high
4,332,746 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,475,812 UART: [idev] Erasing UDS.KEYID = 0
7,620,347 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,720 UART: [idev] --
7,645,923 UART: [ldev] ++
7,646,490 UART: [ldev] CDI.KEYID = 6
7,647,451 UART: [ldev] SUBJECT.KEYID = 5
7,648,667 UART: [ldev] AUTHORITY.KEYID = 7
7,649,894 UART: [ldev] FE.KEYID = 1
7,660,970 UART: [ldev] Erasing FE.KEYID = 1
10,948,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,167 UART: [ldev] --
13,305,040 UART: [fwproc] Waiting for Commands...
13,308,222 UART: [fwproc] Received command 0x46574c44
13,310,401 UART: [fwproc] Received Image of size 114036 bytes
21,944,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,027,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,096,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,413,438 >>> mbox cmd response: success
22,418,346 UART: [afmc] ++
22,418,941 UART: [afmc] CDI.KEYID = 6
22,419,823 UART: [afmc] SUBJECT.KEYID = 7
22,421,092 UART: [afmc] AUTHORITY.KEYID = 5
25,738,859 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,033,190 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,035,473 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,050,027 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,064,788 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,079,013 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,100,012 UART: [afmc] --
28,103,729 UART: [cold-reset] --
28,107,052 UART: [state] Locking Datavault
28,113,272 UART: [state] Locking PCR0, PCR1 and PCR31
28,114,969 UART: [state] Locking ICCM
28,116,256 UART: [exit] Launching FMC @ 0x40000130
28,124,655 UART:
28,124,896 UART: Running Caliptra FMC ...
28,126,004 UART:
28,126,172 UART: [state] CFI Enabled
28,134,390 UART: [fht] FMC Alias Private Key: 7
30,465,303 UART: [art] Extend RT PCRs Done
30,466,539 UART: [art] Lock RT PCRs Done
30,468,406 UART: [art] Populate DV Done
30,473,611 UART: [fht] FMC Alias Private Key: 7
30,475,314 UART: [art] Derive CDI
30,476,131 UART: [art] Store in in slot 0x4
30,518,355 UART: [art] Derive Key Pair
30,519,393 UART: [art] Store priv key in slot 0x5
33,761,439 UART: [art] Derive Key Pair - Done
33,774,481 UART: [art] Signing Cert with AUTHO
33,775,813 UART: RITY.KEYID = 7
36,055,411 UART: [art] Erasing AUTHORITY.KEYID = 7
36,056,950 UART: [art] PUB.X = 81B22F5D1FAE683C3B764D0B44A2D06227C8E002BAC17C081D39E3D46E09092127FA40894EBD1231058A26757792F222
36,064,175 UART: [art] PUB.Y = 78C2A3E727292F7046FD7C0A44F79CA494CFC93281C1C0B13825AD2A1A227205135A40C51F3965D8565639172E7E671B
36,071,367 UART: [art] SIG.R = 06B5D808ACE8A83BD6C29A29A827167AE5DDC837FE351E3E0BF84E05DFE37F16CB37BED10410987D39F2841BC54C7784
36,078,778 UART: [art] SIG.S = 25CE6B0A7D913CE6488217D247B36B843ADE01E88250928E1508270B2441FA0F8D976D88762875746CC3B950A46E71D3
37,383,741 UART: Caliptra RT
37,384,472 UART: [state] CFI Enabled
37,501,351 UART: [rt] RT listening for mailbox commands...
37,503,699 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,658,981 UART: [rt]cmd =0x41544d4e, len=14344
43,993,542 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,123,699 ready_for_fw is high
4,124,269 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,103,603 >>> mbox cmd response: success
27,747,283 UART:
27,747,684 UART: Running Caliptra FMC ...
27,748,787 UART:
27,748,941 UART: [state] CFI Enabled
27,757,276 UART: [fht] FMC Alias Private Key: 7
30,087,845 UART: [art] Extend RT PCRs Done
30,089,079 UART: [art] Lock RT PCRs Done
30,090,959 UART: [art] Populate DV Done
30,096,279 UART: [fht] FMC Alias Private Key: 7
30,097,878 UART: [art] Derive CDI
30,098,719 UART: [art] Store in in slot 0x4
30,141,330 UART: [art] Derive Key Pair
30,142,372 UART: [art] Store priv key in slot 0x5
33,385,095 UART: [art] Derive Key Pair - Done
33,398,154 UART: [art] Signing Cert with AUTHO
33,399,494 UART: RITY.KEYID = 7
35,678,891 UART: [art] Erasing AUTHORITY.KEYID = 7
35,680,404 UART: [art] PUB.X = 14A4DEC3EF67B0B8C1ED3F27692C429266E1199CAB6903F4DC86C0DB497C125F85CEA999ACF9EC8D38A83CC56C8440EA
35,687,629 UART: [art] PUB.Y = 13077BBDAFEE3D501E1393F24EDF724F1396A40B1B9B78223F7E2296C41EE833C404A41212BF7408E05BD79967D8335D
35,694,853 UART: [art] SIG.R = 8F919ACC712A25461C70CC1295CCF4B868A2013DB47488964FB409DB0FB894912FFDBB160FFD6D62768FD3BC6F984C3B
35,702,270 UART: [art] SIG.S = 51D72623A4741AB47C1694B0438D72906E6548AC4FD1FE674F91B9842A05B91BEDBC7E4AD869E59462A195AC642846F0
37,007,466 UART: Caliptra RT
37,008,176 UART: [state] CFI Enabled
37,125,514 UART: [rt] RT listening for mailbox commands...
37,128,007 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,283,175 UART: [rt]cmd =0x41544d4e, len=14344
43,514,152 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,510 UART:
193,002 UART: Running Caliptra ROM ...
194,138 UART:
194,287 UART: [state] CFI Enabled
251,501 UART: [state] LifecycleState = Unprovisioned
253,370 UART: [state] DebugLocked = No
256,047 UART: [state] WD Timer not started. Device not locked for debugging
259,520 UART: [kat] SHA2-256
438,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,258 UART: [kat] ++
450,705 UART: [kat] sha1
461,931 UART: [kat] SHA2-256
464,932 UART: [kat] SHA2-384
471,494 UART: [kat] SHA2-512-ACC
474,443 UART: [kat] ECC-384
2,936,072 UART: [kat] HMAC-384Kdf
2,958,338 UART: [kat] LMS
3,487,821 UART: [kat] --
3,491,486 UART: [cold-reset] ++
3,492,719 UART: [fht] FHT @ 0x50003400
3,503,778 UART: [idev] ++
3,504,343 UART: [idev] CDI.KEYID = 6
3,505,273 UART: [idev] SUBJECT.KEYID = 7
3,506,451 UART: [idev] UDS.KEYID = 0
3,507,379 ready_for_fw is high
3,507,591 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,651,464 UART: [idev] Erasing UDS.KEYID = 0
6,012,736 UART: [idev] Sha1 KeyId Algorithm
6,035,364 UART: [idev] --
6,039,171 UART: [ldev] ++
6,039,749 UART: [ldev] CDI.KEYID = 6
6,040,635 UART: [ldev] SUBJECT.KEYID = 5
6,041,737 UART: [ldev] AUTHORITY.KEYID = 7
6,043,075 UART: [ldev] FE.KEYID = 1
6,077,704 UART: [ldev] Erasing FE.KEYID = 1
8,581,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,593 UART: [ldev] --
10,390,155 UART: [fwproc] Wait for Commands...
10,392,628 UART: [fwproc] Recv command 0x46574c44
10,394,721 UART: [fwproc] Recv'd Img size: 114360 bytes
14,974,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,047,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,115,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,434,274 >>> mbox cmd response: success
15,438,923 UART: [afmc] ++
15,439,519 UART: [afmc] CDI.KEYID = 6
15,440,401 UART: [afmc] SUBJECT.KEYID = 7
15,441,620 UART: [afmc] AUTHORITY.KEYID = 5
17,981,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,039 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,722,992 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,738,974 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,754,743 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,778,487 UART: [afmc] --
19,781,578 UART: [cold-reset] --
19,785,450 UART: [state] Locking Datavault
19,790,102 UART: [state] Locking PCR0, PCR1 and PCR31
19,791,754 UART: [state] Locking ICCM
19,792,851 UART: [exit] Launching FMC @ 0x40000130
19,801,301 UART:
19,801,541 UART: Running Caliptra FMC ...
19,802,645 UART:
19,802,806 UART: [state] CFI Enabled
19,863,958 UART: [fht] FMC Alias Private Key: 7
21,628,135 UART: [art] Extend RT PCRs Done
21,629,379 UART: [art] Lock RT PCRs Done
21,630,682 UART: [art] Populate DV Done
21,635,996 UART: [fht] FMC Alias Private Key: 7
21,637,482 UART: [art] Derive CDI
21,638,244 UART: [art] Store in in slot 0x4
21,696,904 UART: [art] Derive Key Pair
21,697,946 UART: [art] Store priv key in slot 0x5
24,160,856 UART: [art] Derive Key Pair - Done
24,173,803 UART: [art] Signing Cert with AUTHO
24,175,108 UART: RITY.KEYID = 7
25,886,894 UART: [art] Erasing AUTHORITY.KEYID = 7
25,888,389 UART: [art] PUB.X = 566B846277CBE21368897D7118A63D51F1BDDA9FDC6A0B6171B824905531C6397A20FBD3A1D6178B98AEDB2BA276C126
25,895,662 UART: [art] PUB.Y = 8EFC3BCD6160B5B85FC7B50DE261F5A270F58CCE9F1567EBFEF2453E932E25927F2F6214C6999F3E1EDF63DC0B9AEB50
25,902,978 UART: [art] SIG.R = EA8904A86DA51441CAC88FD17CF9347CACAA48A0822B6E29882E09FF120671553B86EB0DF4E517A670D586E21DD4010F
25,910,343 UART: [art] SIG.S = B4AA04ADA0ECFE295C941370B37A6EAC93AA15C35B79A59B525FD3830338126F9C8EDF7CB03D2F55D84FA570D36A268D
26,889,634 UART: Caliptra RT
26,890,376 UART: [state] CFI Enabled
27,053,983 UART: [rt] RT listening for mailbox commands...
27,056,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,051 UART: [rt]cmd =0x41544d4e, len=14344
30,830,989 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,475 UART:
192,849 UART: Running Caliptra ROM ...
193,932 UART:
194,072 UART: [state] CFI Enabled
263,149 UART: [state] LifecycleState = Unprovisioned
265,584 UART: [state] DebugLocked = No
266,961 UART: [state] WD Timer not started. Device not locked for debugging
270,782 UART: [kat] SHA2-256
460,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,406 UART: [kat] ++
471,898 UART: [kat] sha1
483,768 UART: [kat] SHA2-256
486,777 UART: [kat] SHA2-384
493,977 UART: [kat] SHA2-512-ACC
496,559 UART: [kat] ECC-384
2,947,204 UART: [kat] HMAC-384Kdf
2,971,590 UART: [kat] LMS
3,503,338 UART: [kat] --
3,506,552 UART: [cold-reset] ++
3,508,842 UART: [fht] FHT @ 0x50003400
3,521,028 UART: [idev] ++
3,521,752 UART: [idev] CDI.KEYID = 6
3,522,639 UART: [idev] SUBJECT.KEYID = 7
3,523,881 UART: [idev] UDS.KEYID = 0
3,524,780 ready_for_fw is high
3,524,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,222 UART: [idev] Erasing UDS.KEYID = 0
6,029,901 UART: [idev] Sha1 KeyId Algorithm
6,052,535 UART: [idev] --
6,056,941 UART: [ldev] ++
6,057,634 UART: [ldev] CDI.KEYID = 6
6,058,560 UART: [ldev] SUBJECT.KEYID = 5
6,059,723 UART: [ldev] AUTHORITY.KEYID = 7
6,060,962 UART: [ldev] FE.KEYID = 1
6,099,153 UART: [ldev] Erasing FE.KEYID = 1
8,604,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,207 UART: [ldev] --
10,412,171 UART: [fwproc] Wait for Commands...
10,415,238 UART: [fwproc] Recv command 0x46574c44
10,417,491 UART: [fwproc] Recv'd Img size: 114360 bytes
15,044,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,128,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,244,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,786,730 >>> mbox cmd response: success
15,791,392 UART: [afmc] ++
15,792,115 UART: [afmc] CDI.KEYID = 6
15,793,362 UART: [afmc] SUBJECT.KEYID = 7
15,794,799 UART: [afmc] AUTHORITY.KEYID = 5
18,344,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,086,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,088,579 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,103,633 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,118,840 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,133,701 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,157,814 UART: [afmc] --
20,162,172 UART: [cold-reset] --
20,166,364 UART: [state] Locking Datavault
20,171,136 UART: [state] Locking PCR0, PCR1 and PCR31
20,173,346 UART: [state] Locking ICCM
20,174,902 UART: [exit] Launching FMC @ 0x40000130
20,183,580 UART:
20,183,813 UART: Running Caliptra FMC ...
20,184,919 UART:
20,185,084 UART: [state] CFI Enabled
20,242,888 UART: [fht] FMC Alias Private Key: 7
22,006,481 UART: [art] Extend RT PCRs Done
22,007,693 UART: [art] Lock RT PCRs Done
22,009,026 UART: [art] Populate DV Done
22,014,438 UART: [fht] FMC Alias Private Key: 7
22,016,084 UART: [art] Derive CDI
22,016,903 UART: [art] Store in in slot 0x4
22,075,133 UART: [art] Derive Key Pair
22,076,176 UART: [art] Store priv key in slot 0x5
24,539,116 UART: [art] Derive Key Pair - Done
24,552,059 UART: [art] Signing Cert with AUTHO
24,553,360 UART: RITY.KEYID = 7
26,264,645 UART: [art] Erasing AUTHORITY.KEYID = 7
26,266,122 UART: [art] PUB.X = D216A8EE2AC66724FA87AC0440F2A0E6D8A08E45B63B92951CF8C2A6C347FE02C6E18E15A5E985FEE24039222E6A2A81
26,273,420 UART: [art] PUB.Y = 8EE2FB847FF82ECF5F84118531DED76548115FC385DE2C426AC86EB2CF032C25F811C199E3071B6921C69190B8EB05D4
26,280,739 UART: [art] SIG.R = DB13D5EC21B08D5ACAC617D39A47A08B45A4A008FCD8254912050FBE427605EDE6ACA4A3DFBB9FD9DAF0B7A70055CE0D
26,288,097 UART: [art] SIG.S = 305F21D29C02278B2E00BD4B4F27E77F81DF98A6C3122E5DE4796F464D572522FCB742DBB7BDB3F0FDB8C55786F45D83
27,266,613 UART: Caliptra RT
27,267,327 UART: [state] CFI Enabled
27,431,697 UART: [rt] RT listening for mailbox commands...
27,434,054 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,589,538 UART: [rt]cmd =0x41544d4e, len=14344
31,195,080 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,436,994 ready_for_fw is high
3,437,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,850,028 >>> mbox cmd response: success
20,138,595 UART:
20,138,997 UART: Running Caliptra FMC ...
20,140,199 UART:
20,140,369 UART: [state] CFI Enabled
20,205,104 UART: [fht] FMC Alias Private Key: 7
21,969,490 UART: [art] Extend RT PCRs Done
21,970,721 UART: [art] Lock RT PCRs Done
21,972,294 UART: [art] Populate DV Done
21,977,547 UART: [fht] FMC Alias Private Key: 7
21,979,262 UART: [art] Derive CDI
21,980,101 UART: [art] Store in in slot 0x4
22,038,410 UART: [art] Derive Key Pair
22,039,459 UART: [art] Store priv key in slot 0x5
24,502,260 UART: [art] Derive Key Pair - Done
24,515,365 UART: [art] Signing Cert with AUTHO
24,516,673 UART: RITY.KEYID = 7
26,228,350 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,854 UART: [art] PUB.X = FB2ED8CDDBF6C0886557EE3D984B842F139EFE3E91CF6F32F76BB20409927801800FEF9FB1F6B9DAF3C666497EE816C5
26,237,136 UART: [art] PUB.Y = E6F94818D147339235A2550297749F0FE6663DDE6D7C3613B9C5CE25B3A04B30592914C79C68D7EBED84C05AC7E360CE
26,244,393 UART: [art] SIG.R = 769345B89DE6895A3932F82558314BE4ECEBC9DA58FFFDC10A6743DBD459A6ABC5F12BF9A5BAD8F616C0D8869192CF22
26,251,759 UART: [art] SIG.S = 12750BD6D560633F756F6B661D28A43E9D65673C4C158889FD4CA9B2B81ABD6A97F77127856A0B39BF9CC9387D48B526
27,230,618 UART: Caliptra RT
27,231,341 UART: [state] CFI Enabled
27,398,082 UART: [rt] RT listening for mailbox commands...
27,400,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,692 UART: [rt]cmd =0x41544d4e, len=14344
31,168,914 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,556 UART:
192,910 UART: Running Caliptra ROM ...
194,021 UART:
603,895 UART: [state] CFI Enabled
616,424 UART: [state] LifecycleState = Unprovisioned
618,815 UART: [state] DebugLocked = No
620,483 UART: [state] WD Timer not started. Device not locked for debugging
625,646 UART: [kat] SHA2-256
815,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,265 UART: [kat] ++
826,884 UART: [kat] sha1
838,851 UART: [kat] SHA2-256
841,827 UART: [kat] SHA2-384
849,098 UART: [kat] SHA2-512-ACC
851,689 UART: [kat] ECC-384
3,292,065 UART: [kat] HMAC-384Kdf
3,304,946 UART: [kat] LMS
3,836,792 UART: [kat] --
3,842,937 UART: [cold-reset] ++
3,845,508 UART: [fht] FHT @ 0x50003400
3,857,268 UART: [idev] ++
3,857,901 UART: [idev] CDI.KEYID = 6
3,858,850 UART: [idev] SUBJECT.KEYID = 7
3,860,094 UART: [idev] UDS.KEYID = 0
3,860,996 ready_for_fw is high
3,861,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,810 UART: [idev] Erasing UDS.KEYID = 0
6,332,547 UART: [idev] Sha1 KeyId Algorithm
6,355,656 UART: [idev] --
6,360,928 UART: [ldev] ++
6,361,610 UART: [ldev] CDI.KEYID = 6
6,362,523 UART: [ldev] SUBJECT.KEYID = 5
6,363,682 UART: [ldev] AUTHORITY.KEYID = 7
6,364,914 UART: [ldev] FE.KEYID = 1
6,374,423 UART: [ldev] Erasing FE.KEYID = 1
8,854,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,453 UART: [ldev] --
10,644,278 UART: [fwproc] Wait for Commands...
10,647,248 UART: [fwproc] Recv command 0x46574c44
10,649,553 UART: [fwproc] Recv'd Img size: 114360 bytes
15,272,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,355,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,471,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,012,848 >>> mbox cmd response: success
16,016,415 UART: [afmc] ++
16,017,123 UART: [afmc] CDI.KEYID = 6
16,018,228 UART: [afmc] SUBJECT.KEYID = 7
16,019,761 UART: [afmc] AUTHORITY.KEYID = 5
18,523,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,246,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,248,083 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,263,106 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,278,317 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,293,172 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,316,279 UART: [afmc] --
20,319,599 UART: [cold-reset] --
20,324,373 UART: [state] Locking Datavault
20,329,994 UART: [state] Locking PCR0, PCR1 and PCR31
20,332,183 UART: [state] Locking ICCM
20,334,658 UART: [exit] Launching FMC @ 0x40000130
20,343,324 UART:
20,343,558 UART: Running Caliptra FMC ...
20,344,658 UART:
20,344,810 UART: [state] CFI Enabled
20,353,179 UART: [fht] FMC Alias Private Key: 7
22,109,847 UART: [art] Extend RT PCRs Done
22,111,064 UART: [art] Lock RT PCRs Done
22,113,064 UART: [art] Populate DV Done
22,118,642 UART: [fht] FMC Alias Private Key: 7
22,120,323 UART: [art] Derive CDI
22,121,160 UART: [art] Store in in slot 0x4
22,164,084 UART: [art] Derive Key Pair
22,165,084 UART: [art] Store priv key in slot 0x5
24,591,760 UART: [art] Derive Key Pair - Done
24,605,367 UART: [art] Signing Cert with AUTHO
24,606,717 UART: RITY.KEYID = 7
26,311,891 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,418 UART: [art] PUB.X = 56ED5D862118C5C817DF8B41B0C26DA89523AFC113D3D30B292507E93AAC10A3F5E21D326E7D4B841A2D89F89F2F6E16
26,320,617 UART: [art] PUB.Y = 117A01AF412F586F90F1392275EBCB89484B86B351DD7AB979824EFC1BBE378056B1BCA5F7F0A7F0CBC4668EFD4A9D5D
26,327,907 UART: [art] SIG.R = 91FF5D34D42928C4949BC4B048DEFD6796CBBF129A2B8D0DC4BB2A23039BEACB02D7156D396575C5449CD87284EDBAEE
26,335,295 UART: [art] SIG.S = CAFD4BE80E345E2BBDF5B705C0E29742E8161A3428293B61DCF804333D1A2716983FD16AD028D36EA313EA353DD9EB06
27,314,733 UART: Caliptra RT
27,315,432 UART: [state] CFI Enabled
27,432,708 UART: [rt] RT listening for mailbox commands...
27,435,054 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,590,295 UART: [rt]cmd =0x41544d4e, len=14344
31,197,564 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,757,991 ready_for_fw is high
3,758,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,080,672 >>> mbox cmd response: success
20,334,615 UART:
20,335,024 UART: Running Caliptra FMC ...
20,336,138 UART:
20,336,288 UART: [state] CFI Enabled
20,344,127 UART: [fht] FMC Alias Private Key: 7
22,101,041 UART: [art] Extend RT PCRs Done
22,102,266 UART: [art] Lock RT PCRs Done
22,103,862 UART: [art] Populate DV Done
22,109,271 UART: [fht] FMC Alias Private Key: 7
22,110,862 UART: [art] Derive CDI
22,111,801 UART: [art] Store in in slot 0x4
22,154,091 UART: [art] Derive Key Pair
22,155,094 UART: [art] Store priv key in slot 0x5
24,582,360 UART: [art] Derive Key Pair - Done
24,595,239 UART: [art] Signing Cert with AUTHO
24,596,593 UART: RITY.KEYID = 7
26,302,203 UART: [art] Erasing AUTHORITY.KEYID = 7
26,303,702 UART: [art] PUB.X = 59D0DE6897699B6007FA036CECF1D863A4388042225BF920231AA274DF59EFB2B4C0C6BD82E0B924CB030B9CE9C36D44
26,310,966 UART: [art] PUB.Y = ACEEAB2D3CA2328A8ADC0A76A87AA72954234DF11BE49303A2FC3B822CEF6C3923607CAF8B8E3EE55E032D3B84E432E8
26,318,235 UART: [art] SIG.R = 23C75FC594B3DD8314342B869E0F724219368DBCC7AD185D8512A4E08560992BC6F17E0A5D7C2969574F9AE3E0DB733C
26,325,635 UART: [art] SIG.S = C06BB86AE522D512F16380D45E7C7D7F9EF590A0B25D3838D647201E5EFFB79F54A46C3803D7C27F88D33D1A0841ED81
27,304,777 UART: Caliptra RT
27,305,478 UART: [state] CFI Enabled
27,422,325 UART: [rt] RT listening for mailbox commands...
27,424,659 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,580,195 UART: [rt]cmd =0x41544d4e, len=14344
31,198,496 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,629 UART: [kat] SHA2-256
892,567 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,816 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,585 UART: [cold-reset] ++
1,477,163 UART: [fht] Storing FHT @ 0x50003400
1,479,844 UART: [idev] ++
1,480,012 UART: [idev] CDI.KEYID = 6
1,480,372 UART: [idev] SUBJECT.KEYID = 7
1,480,796 UART: [idev] UDS.KEYID = 0
1,481,141 ready_for_fw is high
1,481,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,878 UART: [idev] Erasing UDS.KEYID = 0
1,505,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,322 UART: [idev] --
1,515,339 UART: [ldev] ++
1,515,507 UART: [ldev] CDI.KEYID = 6
1,515,870 UART: [ldev] SUBJECT.KEYID = 5
1,516,296 UART: [ldev] AUTHORITY.KEYID = 7
1,516,759 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,860 UART: [ldev] --
1,587,205 UART: [fwproc] Waiting for Commands...
1,587,912 UART: [fwproc] Received command 0x46574c44
1,588,703 UART: [fwproc] Received Image of size 114360 bytes
5,160,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,188,320 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,217,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,353,683 >>> mbox cmd response: success
5,354,835 UART: [afmc] ++
5,355,003 UART: [afmc] CDI.KEYID = 6
5,355,365 UART: [afmc] SUBJECT.KEYID = 7
5,355,790 UART: [afmc] AUTHORITY.KEYID = 5
5,390,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,407,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,408,012 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,413,721 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,419,613 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,425,314 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,433,320 UART: [afmc] --
5,434,366 UART: [cold-reset] --
5,435,148 UART: [state] Locking Datavault
5,436,211 UART: [state] Locking PCR0, PCR1 and PCR31
5,436,815 UART: [state] Locking ICCM
5,437,431 UART: [exit] Launching FMC @ 0x40000130
5,442,760 UART:
5,442,776 UART: Running Caliptra FMC ...
5,443,184 UART:
5,443,238 UART: [state] CFI Enabled
5,453,546 UART: [fht] FMC Alias Private Key: 7
5,561,948 UART: [art] Extend RT PCRs Done
5,562,376 UART: [art] Lock RT PCRs Done
5,563,996 UART: [art] Populate DV Done
5,572,036 UART: [fht] FMC Alias Private Key: 7
5,573,140 UART: [art] Derive CDI
5,573,420 UART: [art] Store in in slot 0x4
5,659,051 UART: [art] Derive Key Pair
5,659,411 UART: [art] Store priv key in slot 0x5
5,672,425 UART: [art] Derive Key Pair - Done
5,687,085 UART: [art] Signing Cert with AUTHO
5,687,565 UART: RITY.KEYID = 7
5,702,979 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,744 UART: [art] PUB.X = E2A482A57A7BA84B4DC210509594DA7168A5F90639C25448F1EA1B98F84B0D1FE13EABF49D40E3E0AD599299E9BE5FED
5,710,522 UART: [art] PUB.Y = F40CA6F9673F6869EE8C2E417FB5037E90C9CC41B07CA229E698BCA86B78D8A5A05755E685D84274497464D4C469E6FD
5,717,470 UART: [art] SIG.R = C0EA0CEF0ADB6B0F11F689DE865C1748C9BC1AAF179F5CB50C2EBBBF7A6E365CC64CF34DBA90FC6435031A5ED23D6B64
5,724,255 UART: [art] SIG.S = 6CE70CC5F76B4475E72EE296CF6C218061286EB7CD35E914348321761DC625689E1F7101BFB9DFE1A9143F8C854E060C
5,747,988 UART: Caliptra RT
5,748,242 UART: [state] CFI Enabled
5,856,078 UART: [rt] RT listening for mailbox commands...
5,856,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,579 UART: [rt]cmd =0x41544d4e, len=14344
6,939,815 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,577 ready_for_fw is high
1,362,577 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,050,367 >>> mbox cmd response: success
5,111,496 UART:
5,111,512 UART: Running Caliptra FMC ...
5,111,920 UART:
5,111,974 UART: [state] CFI Enabled
5,122,538 UART: [fht] FMC Alias Private Key: 7
5,230,620 UART: [art] Extend RT PCRs Done
5,231,048 UART: [art] Lock RT PCRs Done
5,232,222 UART: [art] Populate DV Done
5,240,822 UART: [fht] FMC Alias Private Key: 7
5,241,976 UART: [art] Derive CDI
5,242,256 UART: [art] Store in in slot 0x4
5,328,019 UART: [art] Derive Key Pair
5,328,379 UART: [art] Store priv key in slot 0x5
5,341,321 UART: [art] Derive Key Pair - Done
5,355,905 UART: [art] Signing Cert with AUTHO
5,356,385 UART: RITY.KEYID = 7
5,371,597 UART: [art] Erasing AUTHORITY.KEYID = 7
5,372,362 UART: [art] PUB.X = 7FBEFCCD1249A24B464AEBE0D805AB1F876582D99BA9B39191C08826BC4C4C7089C526F427BD0E47109C624FC7C76662
5,379,134 UART: [art] PUB.Y = 4C9480FAAA5B4BEF9FBBC945B0071BDBBC33067D41CE9C51A5F03364E3BEB8811FF7B8653894D336C50B323EFC00434C
5,386,069 UART: [art] SIG.R = E723DE45A2FF2BF72DBFC4089D1E640C79722EF69FD05079DEE48FED627A02A153B8988BE9BA7EE16C5A38F0B1711FAE
5,392,850 UART: [art] SIG.S = 660496076A389F1836C120FA6985B01420F85AE6E76F0C2C7C2691394B6ED2025BE1FCACA88B0EAEC6FB06771E5E0695
5,416,198 UART: Caliptra RT
5,416,452 UART: [state] CFI Enabled
5,522,978 UART: [rt] RT listening for mailbox commands...
5,523,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,499 UART: [rt]cmd =0x41544d4e, len=14344
6,609,286 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,607 UART: [kat] LMS
1,475,803 UART: [kat] --
1,476,780 UART: [cold-reset] ++
1,477,242 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 ready_for_fw is high
1,481,366 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,975 UART: [idev] Erasing UDS.KEYID = 0
1,505,719 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,219 UART: [idev] --
1,515,246 UART: [ldev] ++
1,515,414 UART: [ldev] CDI.KEYID = 6
1,515,777 UART: [ldev] SUBJECT.KEYID = 5
1,516,203 UART: [ldev] AUTHORITY.KEYID = 7
1,516,666 UART: [ldev] FE.KEYID = 1
1,521,956 UART: [ldev] Erasing FE.KEYID = 1
1,547,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,953 UART: [ldev] --
1,587,468 UART: [fwproc] Waiting for Commands...
1,588,143 UART: [fwproc] Received command 0x46574c44
1,588,934 UART: [fwproc] Received Image of size 114360 bytes
5,386,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,413,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,443,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,579,356 >>> mbox cmd response: success
5,580,380 UART: [afmc] ++
5,580,548 UART: [afmc] CDI.KEYID = 6
5,580,910 UART: [afmc] SUBJECT.KEYID = 7
5,581,335 UART: [afmc] AUTHORITY.KEYID = 5
5,616,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,633,079 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,633,859 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,639,568 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,645,460 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,651,161 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,658,903 UART: [afmc] --
5,659,821 UART: [cold-reset] --
5,660,395 UART: [state] Locking Datavault
5,661,614 UART: [state] Locking PCR0, PCR1 and PCR31
5,662,218 UART: [state] Locking ICCM
5,662,826 UART: [exit] Launching FMC @ 0x40000130
5,668,155 UART:
5,668,171 UART: Running Caliptra FMC ...
5,668,579 UART:
5,668,722 UART: [state] CFI Enabled
5,679,490 UART: [fht] FMC Alias Private Key: 7
5,786,762 UART: [art] Extend RT PCRs Done
5,787,190 UART: [art] Lock RT PCRs Done
5,788,906 UART: [art] Populate DV Done
5,796,992 UART: [fht] FMC Alias Private Key: 7
5,798,160 UART: [art] Derive CDI
5,798,440 UART: [art] Store in in slot 0x4
5,884,481 UART: [art] Derive Key Pair
5,884,841 UART: [art] Store priv key in slot 0x5
5,898,463 UART: [art] Derive Key Pair - Done
5,913,361 UART: [art] Signing Cert with AUTHO
5,913,841 UART: RITY.KEYID = 7
5,928,957 UART: [art] Erasing AUTHORITY.KEYID = 7
5,929,722 UART: [art] PUB.X = 71E4DE04943765016CDB0BFEB0344489EE47DC6BB86169019BD5166E569C4F2CB7D91EAA588353F01DCC3B80D7DE28D2
5,936,490 UART: [art] PUB.Y = 08ACA668F565D4010BC55452491D52415DC5932E363F34641E9D61D8CA5198C30B55BE9FCCF19AE0B1EAC109EE641A72
5,943,431 UART: [art] SIG.R = 171C425162294B0BB0F2A504407376E2E0E3E4E633EAE1667998C03379735085C2449458B900A1316A8C0BDD5563BD69
5,950,158 UART: [art] SIG.S = C5763F5D13970A05956CF4130F3F54A294F4193785B49AF7C92372EA3D2B906CC8FC9AC3D37941E6D4DC12C6721B7900
5,974,058 UART: Caliptra RT
5,974,404 UART: [state] CFI Enabled
6,083,032 UART: [rt] RT listening for mailbox commands...
6,083,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,206,353 UART: [rt]cmd =0x41544d4e, len=14344
7,173,944 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,216 ready_for_fw is high
1,362,216 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,237,955 >>> mbox cmd response: success
5,300,248 UART:
5,300,264 UART: Running Caliptra FMC ...
5,300,672 UART:
5,300,815 UART: [state] CFI Enabled
5,310,881 UART: [fht] FMC Alias Private Key: 7
5,418,533 UART: [art] Extend RT PCRs Done
5,418,961 UART: [art] Lock RT PCRs Done
5,420,719 UART: [art] Populate DV Done
5,428,909 UART: [fht] FMC Alias Private Key: 7
5,429,947 UART: [art] Derive CDI
5,430,227 UART: [art] Store in in slot 0x4
5,515,940 UART: [art] Derive Key Pair
5,516,300 UART: [art] Store priv key in slot 0x5
5,529,926 UART: [art] Derive Key Pair - Done
5,544,390 UART: [art] Signing Cert with AUTHO
5,544,870 UART: RITY.KEYID = 7
5,560,066 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,831 UART: [art] PUB.X = B2A71F783422779EDA308910E1E4128A0FAA7B06AD75DFDE0CDA58FE44D886568706F2AFE3BB0A9B9669E86A11692C19
5,567,596 UART: [art] PUB.Y = B2D2D5CB5B9B416C0B5D8C8EDB35DAA94BDA8C74816E056C05D37CB41DAE5D52DCA005CA5F06AF914A85847FDE3652AF
5,574,557 UART: [art] SIG.R = 01DD2876BFFAF97DBF2C69582A692CBB4C8B9F6EDC88D380638C6720BE1E188BC2E626116EA31D141A6DB7EBD79AE6A8
5,581,344 UART: [art] SIG.S = D5154E5DA57B50C3BC1D3D8DDCCCEC24682C8192D0AAAC47F44B5E306A6329E6F2D4D9CEB96A4E510BA45967609F00B2
5,605,844 UART: Caliptra RT
5,606,190 UART: [state] CFI Enabled
5,714,114 UART: [rt] RT listening for mailbox commands...
5,714,784 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,655 UART: [rt]cmd =0x41544d4e, len=14344
6,797,965 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,588 UART: [kat] HMAC-384Kdf
922,976 UART: [kat] LMS
1,171,304 UART: [kat] --
1,172,223 UART: [cold-reset] ++
1,172,699 UART: [fht] FHT @ 0x50003400
1,175,414 UART: [idev] ++
1,175,582 UART: [idev] CDI.KEYID = 6
1,175,942 UART: [idev] SUBJECT.KEYID = 7
1,176,366 UART: [idev] UDS.KEYID = 0
1,176,711 ready_for_fw is high
1,176,711 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,396 UART: [idev] Erasing UDS.KEYID = 0
1,201,213 UART: [idev] Sha1 KeyId Algorithm
1,209,695 UART: [idev] --
1,210,699 UART: [ldev] ++
1,210,867 UART: [ldev] CDI.KEYID = 6
1,211,230 UART: [ldev] SUBJECT.KEYID = 5
1,211,656 UART: [ldev] AUTHORITY.KEYID = 7
1,212,119 UART: [ldev] FE.KEYID = 1
1,217,451 UART: [ldev] Erasing FE.KEYID = 1
1,244,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,851 UART: [ldev] --
1,283,328 UART: [fwproc] Wait for Commands...
1,284,056 UART: [fwproc] Recv command 0x46574c44
1,284,784 UART: [fwproc] Recv'd Img size: 114360 bytes
3,132,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,324,552 >>> mbox cmd response: success
3,325,744 UART: [afmc] ++
3,325,912 UART: [afmc] CDI.KEYID = 6
3,326,274 UART: [afmc] SUBJECT.KEYID = 7
3,326,699 UART: [afmc] AUTHORITY.KEYID = 5
3,362,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,444 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,153 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,045 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,756 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,653 UART: [afmc] --
3,405,703 UART: [cold-reset] --
3,406,513 UART: [state] Locking Datavault
3,407,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,360 UART: [state] Locking ICCM
3,408,860 UART: [exit] Launching FMC @ 0x40000130
3,414,189 UART:
3,414,205 UART: Running Caliptra FMC ...
3,414,613 UART:
3,414,667 UART: [state] CFI Enabled
3,425,025 UART: [fht] FMC Alias Private Key: 7
3,532,457 UART: [art] Extend RT PCRs Done
3,532,885 UART: [art] Lock RT PCRs Done
3,534,455 UART: [art] Populate DV Done
3,542,689 UART: [fht] FMC Alias Private Key: 7
3,543,803 UART: [art] Derive CDI
3,544,083 UART: [art] Store in in slot 0x4
3,629,910 UART: [art] Derive Key Pair
3,630,270 UART: [art] Store priv key in slot 0x5
3,643,710 UART: [art] Derive Key Pair - Done
3,658,568 UART: [art] Signing Cert with AUTHO
3,659,048 UART: RITY.KEYID = 7
3,674,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,463 UART: [art] PUB.X = 99F7E1A436D30C4128A4CA49BFB0C5518E780ABCDC62B1E8F06ED1BEA2EF59E83A9B3E30A2F851EA61032BEFB8C6CAEF
3,682,252 UART: [art] PUB.Y = 7BB88233393771B7DC6010DCE80DAD8A92975AEE2B215113C6D1AFDB82764CC9A27A00A73B17CFA029481963CE2B8B59
3,689,185 UART: [art] SIG.R = DD2587B797C15528D565747E2D10D03FE26C036F90D537F07A199D5AF3DB1610775E311A9587E2901943C59D95630521
3,695,937 UART: [art] SIG.S = DDB965601059AF68D81F4EABA39407FA2D6C12447844E0B9454E2C2464E245895005CB99CD1D2AB690AC70BA7FC94857
3,719,654 UART: Caliptra RT
3,719,908 UART: [state] CFI Enabled
3,828,326 UART: [rt] RT listening for mailbox commands...
3,828,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,867 UART: [rt]cmd =0x41544d4e, len=14344
4,902,153 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,751 ready_for_fw is high
1,060,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,765 >>> mbox cmd response: success
3,237,886 UART:
3,237,902 UART: Running Caliptra FMC ...
3,238,310 UART:
3,238,364 UART: [state] CFI Enabled
3,248,680 UART: [fht] FMC Alias Private Key: 7
3,356,088 UART: [art] Extend RT PCRs Done
3,356,516 UART: [art] Lock RT PCRs Done
3,358,250 UART: [art] Populate DV Done
3,366,386 UART: [fht] FMC Alias Private Key: 7
3,367,564 UART: [art] Derive CDI
3,367,844 UART: [art] Store in in slot 0x4
3,453,403 UART: [art] Derive Key Pair
3,453,763 UART: [art] Store priv key in slot 0x5
3,467,517 UART: [art] Derive Key Pair - Done
3,481,975 UART: [art] Signing Cert with AUTHO
3,482,455 UART: RITY.KEYID = 7
3,497,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,220 UART: [art] PUB.X = 06D100466A9AF0928E661261DB70D4CB3618460F8CD51D9479A18A0817C47B5C93FF0A20D0019585591D4CE9D1017B2F
3,504,946 UART: [art] PUB.Y = 537C282B160DDC4978C7A2124E58169C5711277748D277DF613DC4A5F435FE9C712B637EC2448D99955688613EDC71DA
3,511,887 UART: [art] SIG.R = 90B919F7EC492223DE512D1EE0DE7FC45A3688ADA94889AAE8A8C6D33F0F3B1B67DC53A491E04EEE855FBAD69403452C
3,518,667 UART: [art] SIG.S = 14062F82237EEDAD5E43F6A8356AFF7886AFE5F6BAA8105152DA0C31EF914F8E1C5918D7DAB13066273093637CB237F5
3,542,840 UART: Caliptra RT
3,543,094 UART: [state] CFI Enabled
3,649,609 UART: [rt] RT listening for mailbox commands...
3,650,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,946 UART: [rt]cmd =0x41544d4e, len=14344
4,739,889 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
894,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,192 UART: [kat] ++
898,344 UART: [kat] sha1
902,582 UART: [kat] SHA2-256
904,522 UART: [kat] SHA2-384
907,125 UART: [kat] SHA2-512-ACC
909,026 UART: [kat] ECC-384
918,921 UART: [kat] HMAC-384Kdf
923,707 UART: [kat] LMS
1,172,035 UART: [kat] --
1,173,044 UART: [cold-reset] ++
1,173,462 UART: [fht] FHT @ 0x50003400
1,176,301 UART: [idev] ++
1,176,469 UART: [idev] CDI.KEYID = 6
1,176,829 UART: [idev] SUBJECT.KEYID = 7
1,177,253 UART: [idev] UDS.KEYID = 0
1,177,598 ready_for_fw is high
1,177,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,347 UART: [idev] Erasing UDS.KEYID = 0
1,202,394 UART: [idev] Sha1 KeyId Algorithm
1,210,780 UART: [idev] --
1,211,762 UART: [ldev] ++
1,211,930 UART: [ldev] CDI.KEYID = 6
1,212,293 UART: [ldev] SUBJECT.KEYID = 5
1,212,719 UART: [ldev] AUTHORITY.KEYID = 7
1,213,182 UART: [ldev] FE.KEYID = 1
1,218,354 UART: [ldev] Erasing FE.KEYID = 1
1,244,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,684 UART: [ldev] --
1,283,949 UART: [fwproc] Wait for Commands...
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,465 UART: [fwproc] Recv'd Img size: 114360 bytes
3,132,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,326,055 >>> mbox cmd response: success
3,327,073 UART: [afmc] ++
3,327,241 UART: [afmc] CDI.KEYID = 6
3,327,603 UART: [afmc] SUBJECT.KEYID = 7
3,328,028 UART: [afmc] AUTHORITY.KEYID = 5
3,363,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,189 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,898 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,790 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,501 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,368 UART: [afmc] --
3,406,280 UART: [cold-reset] --
3,407,162 UART: [state] Locking Datavault
3,408,301 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,905 UART: [state] Locking ICCM
3,409,337 UART: [exit] Launching FMC @ 0x40000130
3,414,666 UART:
3,414,682 UART: Running Caliptra FMC ...
3,415,090 UART:
3,415,233 UART: [state] CFI Enabled
3,426,055 UART: [fht] FMC Alias Private Key: 7
3,533,551 UART: [art] Extend RT PCRs Done
3,533,979 UART: [art] Lock RT PCRs Done
3,535,447 UART: [art] Populate DV Done
3,543,473 UART: [fht] FMC Alias Private Key: 7
3,544,611 UART: [art] Derive CDI
3,544,891 UART: [art] Store in in slot 0x4
3,630,396 UART: [art] Derive Key Pair
3,630,756 UART: [art] Store priv key in slot 0x5
3,643,926 UART: [art] Derive Key Pair - Done
3,658,699 UART: [art] Signing Cert with AUTHO
3,659,179 UART: RITY.KEYID = 7
3,674,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,806 UART: [art] PUB.X = A4D10DDFA6D631AA0CB62DAFFC88A5A79329F82B9A0ADD6699711573F2D84D81305C2C023D7D513F4C8925B3F3620CD6
3,681,573 UART: [art] PUB.Y = 919B1852D2136FEE74708689BE86963AD03C7C9FD3CE9265C722F504A1543DB070A1E3F86CDC0C74795C1661C9739123
3,688,513 UART: [art] SIG.R = 9A4650070CF7C6908724134DD5DEC3F3F9EF736FAC58CDA61039F874D8C6227C967F0CFD241D708229E4A52AFBE6D307
3,695,279 UART: [art] SIG.S = 86BA744880D3EAEC9D99C5CE595354A8DEC71C45EC1CACA7939296E50C84405220BE64A12A4BB57CDE36FDAA797ABCF1
3,719,117 UART: Caliptra RT
3,719,463 UART: [state] CFI Enabled
3,827,105 UART: [rt] RT listening for mailbox commands...
3,827,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,382 UART: [rt]cmd =0x41544d4e, len=14344
4,920,598 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,338 ready_for_fw is high
1,061,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,761 >>> mbox cmd response: success
3,232,812 UART:
3,232,828 UART: Running Caliptra FMC ...
3,233,236 UART:
3,233,379 UART: [state] CFI Enabled
3,244,321 UART: [fht] FMC Alias Private Key: 7
3,352,289 UART: [art] Extend RT PCRs Done
3,352,717 UART: [art] Lock RT PCRs Done
3,354,599 UART: [art] Populate DV Done
3,362,875 UART: [fht] FMC Alias Private Key: 7
3,364,017 UART: [art] Derive CDI
3,364,297 UART: [art] Store in in slot 0x4
3,449,898 UART: [art] Derive Key Pair
3,450,258 UART: [art] Store priv key in slot 0x5
3,463,448 UART: [art] Derive Key Pair - Done
3,478,354 UART: [art] Signing Cert with AUTHO
3,478,834 UART: RITY.KEYID = 7
3,494,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,117 UART: [art] PUB.X = 12758359A63AD12187A8A05AC77B1DA3E8BA93C3C8962A67A2A929E28594AB0CC1C392397E27FE5788119CEDF9C7877B
3,501,888 UART: [art] PUB.Y = AF196ABDD36FCB0F890D1B63C5DE84D730791F6D6B1FA44612015DA08FEC917B2A2617E1ECFCFE5648713B619ACE8342
3,508,845 UART: [art] SIG.R = 5315A1444DEF3C8A63DDA8E14B7180BE9C2BCD75603562C0FF2C8DBA46A71CAA190BE7671E33A37A30272519B3CDC048
3,515,624 UART: [art] SIG.S = 62B249968054F2B9B8EF52DF7C8AC30D81542C5D83DEE6D7F1423F748FB3281DB2389E5205B852DBCC1535B8342EA1D3
3,539,225 UART: Caliptra RT
3,539,571 UART: [state] CFI Enabled
3,647,607 UART: [rt] RT listening for mailbox commands...
3,648,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,972 UART: [rt]cmd =0x41544d4e, len=14344
4,738,645 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,490 UART: [kat] HMAC-384Kdf
920,078 UART: [kat] LMS
1,168,390 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,629 UART: [fht] FHT @ 0x50003400
1,172,177 UART: [idev] ++
1,172,345 UART: [idev] CDI.KEYID = 6
1,172,706 UART: [idev] SUBJECT.KEYID = 7
1,173,131 UART: [idev] UDS.KEYID = 0
1,173,477 ready_for_fw is high
1,173,477 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,563 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,241,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,100 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,713 >>> mbox cmd response: success
3,317,910 UART: [afmc] ++
3,318,078 UART: [afmc] CDI.KEYID = 6
3,318,441 UART: [afmc] SUBJECT.KEYID = 7
3,318,867 UART: [afmc] AUTHORITY.KEYID = 5
3,353,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,688 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,398 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,288 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,999 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,033 UART: [afmc] --
3,397,095 UART: [cold-reset] --
3,398,045 UART: [state] Locking Datavault
3,399,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,146 UART: [state] Locking ICCM
3,400,570 UART: [exit] Launching FMC @ 0x40000130
3,405,899 UART:
3,405,915 UART: Running Caliptra FMC ...
3,406,323 UART:
3,406,377 UART: [state] CFI Enabled
3,416,967 UART: [fht] FMC Alias Private Key: 7
3,524,917 UART: [art] Extend RT PCRs Done
3,525,345 UART: [art] Lock RT PCRs Done
3,526,891 UART: [art] Populate DV Done
3,535,051 UART: [fht] FMC Alias Private Key: 7
3,536,007 UART: [art] Derive CDI
3,536,287 UART: [art] Store in in slot 0x4
3,621,642 UART: [art] Derive Key Pair
3,622,002 UART: [art] Store priv key in slot 0x5
3,635,054 UART: [art] Derive Key Pair - Done
3,649,810 UART: [art] Signing Cert with AUTHO
3,650,290 UART: RITY.KEYID = 7
3,665,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,939 UART: [art] PUB.X = 3092831A72D04C79D1254B3BEBCC74B0D27135FBF243A833544C2048701D23E4E0D39C94F71E5076D32C95ABCDFDF787
3,672,713 UART: [art] PUB.Y = 3278A0A18C07C36C1D355196B2CE79B58051694C7BA32BC598C64EB4E9A70043640E47B1E7A23E930007A142AC8BF389
3,679,608 UART: [art] SIG.R = 4DA39007BD4AFFC36C2413F36F98B9CAFDF22DAA4D2A06ABEB473D7D7E4C9B9A98CC60EE7BD7135DBEC49AD9D4F73DA3
3,686,406 UART: [art] SIG.S = 6B1080F3924A385247AC57312C58E545607845BB8E37E83721B05648FF3A5B4C1B597CC5BC9B789EB7F98E9CD23434FF
3,710,193 UART: Caliptra RT
3,710,447 UART: [state] CFI Enabled
3,818,541 UART: [rt] RT listening for mailbox commands...
3,819,211 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,764 UART: [rt]cmd =0x41544d4e, len=14344
4,909,473 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 ready_for_fw is high
1,055,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,152,996 >>> mbox cmd response: success
3,215,113 UART:
3,215,129 UART: Running Caliptra FMC ...
3,215,537 UART:
3,215,591 UART: [state] CFI Enabled
3,226,103 UART: [fht] FMC Alias Private Key: 7
3,333,627 UART: [art] Extend RT PCRs Done
3,334,055 UART: [art] Lock RT PCRs Done
3,335,473 UART: [art] Populate DV Done
3,343,765 UART: [fht] FMC Alias Private Key: 7
3,344,873 UART: [art] Derive CDI
3,345,153 UART: [art] Store in in slot 0x4
3,431,068 UART: [art] Derive Key Pair
3,431,428 UART: [art] Store priv key in slot 0x5
3,444,346 UART: [art] Derive Key Pair - Done
3,458,789 UART: [art] Signing Cert with AUTHO
3,459,269 UART: RITY.KEYID = 7
3,474,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,475,082 UART: [art] PUB.X = 46C08454E4101D392457F8E527CC6DF33C2BFA806BDF391A2638F14380164B46E39FA9DF1DFCE3B4D412924873DC1BEC
3,481,860 UART: [art] PUB.Y = 71F92182C76A85D51C0681D4A3BEC5E331D9976D2726DD2799FF1FBB9C23210F3D23CFC91B223E5FAC3330CBE2217DE8
3,488,814 UART: [art] SIG.R = 5B6F06FBB819A4C8FAFC7C4318C7D5EBEB2AC0BA5605AE8DCF3DC6369562D92771612ADB2DB24E44A38852C3AEF08B59
3,495,600 UART: [art] SIG.S = FBF439D6CDAE1838BFDC3E66DC73B3D288F5D1555C93FEE1A381D7E53DA15D4249BE39D845E7E36FC63CCC810A12FCB8
3,519,156 UART: Caliptra RT
3,519,410 UART: [state] CFI Enabled
3,626,631 UART: [rt] RT listening for mailbox commands...
3,627,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,080 UART: [rt]cmd =0x41544d4e, len=14344
4,705,224 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 ready_for_fw is high
1,174,484 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,546 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,277 UART: [ldev] --
1,281,747 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46574c44
1,283,197 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,323,408 >>> mbox cmd response: success
3,324,485 UART: [afmc] ++
3,324,653 UART: [afmc] CDI.KEYID = 6
3,325,016 UART: [afmc] SUBJECT.KEYID = 7
3,325,442 UART: [afmc] AUTHORITY.KEYID = 5
3,360,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,445 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,155 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,045 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,756 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,706 UART: [afmc] --
3,404,662 UART: [cold-reset] --
3,405,434 UART: [state] Locking Datavault
3,406,767 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,371 UART: [state] Locking ICCM
3,408,037 UART: [exit] Launching FMC @ 0x40000130
3,413,366 UART:
3,413,382 UART: Running Caliptra FMC ...
3,413,790 UART:
3,413,933 UART: [state] CFI Enabled
3,424,491 UART: [fht] FMC Alias Private Key: 7
3,532,699 UART: [art] Extend RT PCRs Done
3,533,127 UART: [art] Lock RT PCRs Done
3,534,399 UART: [art] Populate DV Done
3,542,599 UART: [fht] FMC Alias Private Key: 7
3,543,665 UART: [art] Derive CDI
3,543,945 UART: [art] Store in in slot 0x4
3,629,870 UART: [art] Derive Key Pair
3,630,230 UART: [art] Store priv key in slot 0x5
3,643,012 UART: [art] Derive Key Pair - Done
3,658,103 UART: [art] Signing Cert with AUTHO
3,658,583 UART: RITY.KEYID = 7
3,673,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,698 UART: [art] PUB.X = CD2C20CE5835140190C14C986DCD10F37C36D9D2707F56DB1C6B5A2D3802018AA93BCE612338CAE47C076F478CE0AB05
3,681,461 UART: [art] PUB.Y = A141D59D1A1F008152EAE4CD8EDC58EDFB7EBB6311D46F1A8507A835564AC7CEB72450A2993633B5CC29310D44944E36
3,688,391 UART: [art] SIG.R = E3433AF7005DD522472110E2EA5E378B96F8B6CB3C545530957CAA499B20C8833F0863457C8F5E13C022DEE7FA786295
3,695,134 UART: [art] SIG.S = 45FE61E800394213BDB803D28E7998E522DC252C18E6D19936FF37561ABA8F7107020789414918E581A71840460CC012
3,718,940 UART: Caliptra RT
3,719,286 UART: [state] CFI Enabled
3,827,589 UART: [rt] RT listening for mailbox commands...
3,828,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,892 UART: [rt]cmd =0x41544d4e, len=14344
4,908,191 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,441 ready_for_fw is high
1,056,441 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,176,600 >>> mbox cmd response: success
3,239,009 UART:
3,239,025 UART: Running Caliptra FMC ...
3,239,433 UART:
3,239,576 UART: [state] CFI Enabled
3,250,104 UART: [fht] FMC Alias Private Key: 7
3,357,088 UART: [art] Extend RT PCRs Done
3,357,516 UART: [art] Lock RT PCRs Done
3,359,208 UART: [art] Populate DV Done
3,367,342 UART: [fht] FMC Alias Private Key: 7
3,368,468 UART: [art] Derive CDI
3,368,748 UART: [art] Store in in slot 0x4
3,454,175 UART: [art] Derive Key Pair
3,454,535 UART: [art] Store priv key in slot 0x5
3,467,795 UART: [art] Derive Key Pair - Done
3,482,563 UART: [art] Signing Cert with AUTHO
3,483,043 UART: RITY.KEYID = 7
3,498,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,380 UART: [art] PUB.X = 5722BD00F3682116996A3DF8472118BE7E7A754A4D429992E7562C135208FBB33978F49CB2CDBE2CDB61D6B5F386DA3E
3,506,129 UART: [art] PUB.Y = 1434E933499BD68BFC07448C7A7CA4DFDEE9709F5B90572DA01D3B92D581140E289B6D8F387D612FB087392D52D15A0F
3,513,074 UART: [art] SIG.R = F7E2DEAC47B5A423F1E3A3A9302977F3DF955294D0964A1109CB1FA04BEA8972B4E556727C54B5FB749044218D3A5F43
3,519,845 UART: [art] SIG.S = 0130DF16D3262259B5C32AF01DD3A18F2EB288F85176D8F893A04C751978762BF3AD0BD483483BAE976998C87C4F9C55
3,543,634 UART: Caliptra RT
3,543,980 UART: [state] CFI Enabled
3,650,973 UART: [rt] RT listening for mailbox commands...
3,651,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,558 UART: [rt]cmd =0x41544d4e, len=14344
4,739,838 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,399 UART:
192,777 UART: Running Caliptra ROM ...
193,898 UART:
194,057 UART: [state] CFI Enabled
262,341 UART: [state] LifecycleState = Unprovisioned
264,250 UART: [state] DebugLocked = No
265,994 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,702 UART: [kat] SHA2-256
440,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,887 UART: [kat] ++
451,483 UART: [kat] sha1
461,081 UART: [kat] SHA2-256
463,792 UART: [kat] SHA2-384
469,921 UART: [kat] SHA2-512-ACC
472,279 UART: [kat] ECC-384
2,767,572 UART: [kat] HMAC-384Kdf
2,800,762 UART: [kat] LMS
3,991,106 UART: [kat] --
3,996,807 UART: [cold-reset] ++
3,998,545 UART: [fht] Storing FHT @ 0x50003400
4,010,160 UART: [idev] ++
4,010,728 UART: [idev] CDI.KEYID = 6
4,011,709 UART: [idev] SUBJECT.KEYID = 7
4,012,877 UART: [idev] UDS.KEYID = 0
4,014,174 ready_for_fw is high
4,014,407 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,757 UART: [idev] Erasing UDS.KEYID = 0
7,345,674 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,030 UART: [idev] --
7,370,296 UART: [ldev] ++
7,370,916 UART: [ldev] CDI.KEYID = 6
7,371,873 UART: [ldev] SUBJECT.KEYID = 5
7,373,079 UART: [ldev] AUTHORITY.KEYID = 7
7,374,474 UART: [ldev] FE.KEYID = 1
7,401,035 UART: [ldev] Erasing FE.KEYID = 1
10,739,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,881 UART: [ldev] --
13,116,195 UART: [fwproc] Waiting for Commands...
13,118,604 UART: [fwproc] Received command 0x46574c44
13,120,775 UART: [fwproc] Received Image of size 114036 bytes
21,601,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,677,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,746,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,064,288 >>> mbox cmd response: success
22,068,531 UART: [afmc] ++
22,069,131 UART: [afmc] CDI.KEYID = 6
22,070,037 UART: [afmc] SUBJECT.KEYID = 7
22,071,326 UART: [afmc] AUTHORITY.KEYID = 5
25,443,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,743,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,745,363 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,759,932 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,774,679 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,788,897 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,810,006 UART: [afmc] --
27,813,435 UART: [cold-reset] --
27,819,178 UART: [state] Locking Datavault
27,824,749 UART: [state] Locking PCR0, PCR1 and PCR31
27,826,446 UART: [state] Locking ICCM
27,828,641 UART: [exit] Launching FMC @ 0x40000130
27,837,027 UART:
27,837,256 UART: Running Caliptra FMC ...
27,838,350 UART:
27,838,522 UART: [state] CFI Enabled
27,902,163 UART: [fht] FMC Alias Private Key: 7
30,240,495 UART: [art] Extend RT PCRs Done
30,241,715 UART: [art] Lock RT PCRs Done
30,243,358 UART: [art] Populate DV Done
30,248,762 UART: [fht] FMC Alias Private Key: 7
30,250,396 UART: [art] Derive CDI
30,251,121 UART: [art] Store in in slot 0x4
30,310,479 UART: [art] Derive Key Pair
30,311,517 UART: [art] Store priv key in slot 0x5
33,604,033 UART: [art] Derive Key Pair - Done
33,616,977 UART: [art] Signing Cert with AUTHO
33,618,310 UART: RITY.KEYID = 7
35,905,636 UART: [art] Erasing AUTHORITY.KEYID = 7
35,907,153 UART: [art] PUB.X = FD74C0ECD771F69C64759A108482095C3279E1BB5847F3EB03CD1DAE8574DCEB6F407279B2E8226DA995E7E419074E3C
35,914,370 UART: [art] PUB.Y = C51069AE586ED567BD94C492E35DD020C70F84B13107807D58F59A9625826AD9B6E407CF7F3A455D2CBD1E85FDA2C1F3
35,921,641 UART: [art] SIG.R = E1748695A13ABBAB91AA9634CDBBFCD92FBB3A30696F782A9A100356BA51CAA3086FBE2A26EB66F63D58EC6FC5FE28E2
35,929,008 UART: [art] SIG.S = 92F02B8778602AB2F039E669C3376A143E83EB19C82D7FD0339D4CF3C9AE1F5B40D55F6FD2B7474870415E249B11E4C1
37,234,887 UART: Caliptra RT
37,235,597 UART: [state] CFI Enabled
37,416,165 UART: [rt] RT listening for mailbox commands...
37,418,584 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,573,964 UART: [rt]cmd =0x41544d4e, len=14344
37,575,835 >>> mbox cmd response: failed
37,576,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,732,090 UART: [rt]cmd =0x41544d4e, len=14344
37,733,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
3,784,349 ready_for_fw is high
3,784,785 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,026,338 >>> mbox cmd response: success
27,727,752 UART:
27,728,288 UART: Running Caliptra FMC ...
27,729,397 UART:
27,729,543 UART: [state] CFI Enabled
27,799,859 UART: [fht] FMC Alias Private Key: 7
30,137,534 UART: [art] Extend RT PCRs Done
30,138,764 UART: [art] Lock RT PCRs Done
30,140,525 UART: [art] Populate DV Done
30,145,890 UART: [fht] FMC Alias Private Key: 7
30,147,536 UART: [art] Derive CDI
30,148,345 UART: [art] Store in in slot 0x4
30,208,343 UART: [art] Derive Key Pair
30,209,393 UART: [art] Store priv key in slot 0x5
33,502,146 UART: [art] Derive Key Pair - Done
33,515,035 UART: [art] Signing Cert with AUTHO
33,516,336 UART: RITY.KEYID = 7
35,803,725 UART: [art] Erasing AUTHORITY.KEYID = 7
35,805,233 UART: [art] PUB.X = A3C35C145EB81550CC2637EB740586BDFF8E10D02C849C62080ECFDFACD7E07CA92FFF63D3C3DE496E66DC73E9ABFBDD
35,812,548 UART: [art] PUB.Y = 4FA50DB83EBFD6B747B1BAA3C435E3032E44A0E5D23D4E0FCC4A8035D4B2BD10FA631D18EBA0B3532AB8F4C7892284BB
35,819,796 UART: [art] SIG.R = 90CE443CD24C7617555D387118B0109F749F03E415D14362BA5D96B4FA7EA2797AC3200169F52F7ABBFCADC2E8888876
35,827,156 UART: [art] SIG.S = EA2A4E12A492DA5CFE2D3F87FD0EEB41EA5F90C718A585B2960BF5CBF3FDC905009D86F244C4A262B91FBAA5C56F33E4
37,132,530 UART: Caliptra RT
37,133,216 UART: [state] CFI Enabled
37,293,230 UART: [rt] RT listening for mailbox commands...
37,295,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,451,204 UART: [rt]cmd =0x41544d4e, len=14344
37,453,231 >>> mbox cmd response: failed
37,453,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,609,043 UART: [rt]cmd =0x41544d4e, len=14344
37,610,753 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,451 UART:
192,805 UART: Running Caliptra ROM ...
193,892 UART:
603,816 UART: [state] CFI Enabled
618,891 UART: [state] LifecycleState = Unprovisioned
620,755 UART: [state] DebugLocked = No
622,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,566 UART: [kat] SHA2-256
797,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,869 UART: [kat] ++
808,318 UART: [kat] sha1
818,336 UART: [kat] SHA2-256
821,059 UART: [kat] SHA2-384
827,852 UART: [kat] SHA2-512-ACC
830,259 UART: [kat] ECC-384
3,113,806 UART: [kat] HMAC-384Kdf
3,125,585 UART: [kat] LMS
4,315,710 UART: [kat] --
4,319,944 UART: [cold-reset] ++
4,322,238 UART: [fht] Storing FHT @ 0x50003400
4,335,207 UART: [idev] ++
4,335,834 UART: [idev] CDI.KEYID = 6
4,336,716 UART: [idev] SUBJECT.KEYID = 7
4,338,046 UART: [idev] UDS.KEYID = 0
4,339,067 ready_for_fw is high
4,339,292 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,579 UART: [idev] Erasing UDS.KEYID = 0
7,626,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,654 UART: [idev] --
7,653,833 UART: [ldev] ++
7,654,460 UART: [ldev] CDI.KEYID = 6
7,655,341 UART: [ldev] SUBJECT.KEYID = 5
7,656,602 UART: [ldev] AUTHORITY.KEYID = 7
7,657,886 UART: [ldev] FE.KEYID = 1
7,669,023 UART: [ldev] Erasing FE.KEYID = 1
10,953,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,798 UART: [ldev] --
13,309,728 UART: [fwproc] Waiting for Commands...
13,312,722 UART: [fwproc] Received command 0x46574c44
13,314,905 UART: [fwproc] Received Image of size 114036 bytes
22,106,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,189,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,258,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,575,287 >>> mbox cmd response: success
22,579,766 UART: [afmc] ++
22,580,364 UART: [afmc] CDI.KEYID = 6
22,581,277 UART: [afmc] SUBJECT.KEYID = 7
22,582,557 UART: [afmc] AUTHORITY.KEYID = 5
25,890,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,184,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,186,407 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,200,995 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,215,718 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,229,916 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,252,743 UART: [afmc] --
28,256,989 UART: [cold-reset] --
28,260,530 UART: [state] Locking Datavault
28,265,722 UART: [state] Locking PCR0, PCR1 and PCR31
28,267,419 UART: [state] Locking ICCM
28,269,988 UART: [exit] Launching FMC @ 0x40000130
28,278,353 UART:
28,278,593 UART: Running Caliptra FMC ...
28,279,691 UART:
28,279,850 UART: [state] CFI Enabled
28,287,759 UART: [fht] FMC Alias Private Key: 7
30,618,765 UART: [art] Extend RT PCRs Done
30,619,987 UART: [art] Lock RT PCRs Done
30,621,493 UART: [art] Populate DV Done
30,626,914 UART: [fht] FMC Alias Private Key: 7
30,628,618 UART: [art] Derive CDI
30,629,434 UART: [art] Store in in slot 0x4
30,671,771 UART: [art] Derive Key Pair
30,672,804 UART: [art] Store priv key in slot 0x5
33,915,484 UART: [art] Derive Key Pair - Done
33,928,543 UART: [art] Signing Cert with AUTHO
33,929,846 UART: RITY.KEYID = 7
36,209,591 UART: [art] Erasing AUTHORITY.KEYID = 7
36,211,091 UART: [art] PUB.X = 2D730422AD7018856605C41995112193A668A29034625E715200B58A81E5E51A54F4FC4E3452088485D95B29BF3B150E
36,218,316 UART: [art] PUB.Y = C715EF7C97024856CE45EDD2FFBFFEEB05694C25AE247ACF31DACEE171468B7FB931027383A34F8296E7266AEB2B014F
36,225,565 UART: [art] SIG.R = 7006180C1B6D04D9EC7387BABD6D8543D49C950BC1B2CCD1D431792E584FEE3FBA41F42465D570A81ACB019776402B52
36,232,970 UART: [art] SIG.S = F81160A6E7C310F700EAD9100CAC2E89B652F6E1D12A346C273D04D0595D3351B759EA8F79FA86A541B51CF169C39AE1
37,538,023 UART: Caliptra RT
37,538,743 UART: [state] CFI Enabled
37,655,119 UART: [rt] RT listening for mailbox commands...
37,657,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,812,716 UART: [rt]cmd =0x41544d4e, len=14344
37,814,534 >>> mbox cmd response: failed
37,815,332 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,970,545 UART: [rt]cmd =0x41544d4e, len=14344
37,972,462 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,126,993 ready_for_fw is high
4,127,360 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,319,459 >>> mbox cmd response: success
27,961,465 UART:
27,961,888 UART: Running Caliptra FMC ...
27,963,194 UART:
27,963,360 UART: [state] CFI Enabled
27,971,204 UART: [fht] FMC Alias Private Key: 7
30,301,964 UART: [art] Extend RT PCRs Done
30,303,187 UART: [art] Lock RT PCRs Done
30,304,982 UART: [art] Populate DV Done
30,310,528 UART: [fht] FMC Alias Private Key: 7
30,312,059 UART: [art] Derive CDI
30,312,987 UART: [art] Store in in slot 0x4
30,355,281 UART: [art] Derive Key Pair
30,356,288 UART: [art] Store priv key in slot 0x5
33,598,225 UART: [art] Derive Key Pair - Done
33,611,118 UART: [art] Signing Cert with AUTHO
33,612,421 UART: RITY.KEYID = 7
35,891,650 UART: [art] Erasing AUTHORITY.KEYID = 7
35,893,151 UART: [art] PUB.X = F9A11BD3B0F33E74C9F59B5E94B3CFBCA2DB6718101D2C037AD16B67DE02DC4474E7B3D359E080FDEF5DA47433A7FA75
35,900,410 UART: [art] PUB.Y = 92D45AB2AF697120193493DEACD38729C6E40D00AE8E4A9BA6AABB5B72B80303D3F3126005DFC476D97FED82B3A0C442
35,907,670 UART: [art] SIG.R = 6BAB79450AB563D235F9F19E202C4256DE1CBE33384EC083E722B0C15ED69FECBDE693D5DA60649402B1A88E96EDE286
35,915,068 UART: [art] SIG.S = 6D5334109851CB473133810FC005C2B9FF80F8D125F8A7A7DAB39ABEC4E6D3462ABCEFB9245FC6740192049D843A705E
37,220,223 UART: Caliptra RT
37,220,946 UART: [state] CFI Enabled
37,338,706 UART: [rt] RT listening for mailbox commands...
37,341,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,497,021 UART: [rt]cmd =0x41544d4e, len=14344
37,499,004 >>> mbox cmd response: failed
37,499,733 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,655,325 UART: [rt]cmd =0x41544d4e, len=14344
37,657,240 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,555 UART:
192,925 UART: Running Caliptra ROM ...
194,114 UART:
194,265 UART: [state] CFI Enabled
260,987 UART: [state] LifecycleState = Unprovisioned
262,827 UART: [state] DebugLocked = No
265,094 UART: [state] WD Timer not started. Device not locked for debugging
268,213 UART: [kat] SHA2-256
447,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,906 UART: [kat] ++
459,448 UART: [kat] sha1
469,619 UART: [kat] SHA2-256
472,693 UART: [kat] SHA2-384
477,547 UART: [kat] SHA2-512-ACC
480,490 UART: [kat] ECC-384
2,924,765 UART: [kat] HMAC-384Kdf
2,949,090 UART: [kat] LMS
3,478,526 UART: [kat] --
3,483,525 UART: [cold-reset] ++
3,485,815 UART: [fht] FHT @ 0x50003400
3,496,395 UART: [idev] ++
3,497,009 UART: [idev] CDI.KEYID = 6
3,497,952 UART: [idev] SUBJECT.KEYID = 7
3,499,058 UART: [idev] UDS.KEYID = 0
3,499,988 ready_for_fw is high
3,500,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,643,897 UART: [idev] Erasing UDS.KEYID = 0
6,002,879 UART: [idev] Sha1 KeyId Algorithm
6,027,402 UART: [idev] --
6,032,478 UART: [ldev] ++
6,033,058 UART: [ldev] CDI.KEYID = 6
6,033,973 UART: [ldev] SUBJECT.KEYID = 5
6,035,138 UART: [ldev] AUTHORITY.KEYID = 7
6,036,374 UART: [ldev] FE.KEYID = 1
6,076,730 UART: [ldev] Erasing FE.KEYID = 1
8,580,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,027 UART: [ldev] --
10,373,274 UART: [fwproc] Wait for Commands...
10,375,234 UART: [fwproc] Recv command 0x46574c44
10,377,331 UART: [fwproc] Recv'd Img size: 114360 bytes
14,932,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,010,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,079,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,397,831 >>> mbox cmd response: success
15,402,197 UART: [afmc] ++
15,402,795 UART: [afmc] CDI.KEYID = 6
15,403,714 UART: [afmc] SUBJECT.KEYID = 7
15,404,878 UART: [afmc] AUTHORITY.KEYID = 5
17,939,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,661,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,663,631 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,679,592 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,695,559 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,711,317 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,733,358 UART: [afmc] --
19,737,424 UART: [cold-reset] --
19,741,402 UART: [state] Locking Datavault
19,746,544 UART: [state] Locking PCR0, PCR1 and PCR31
19,748,202 UART: [state] Locking ICCM
19,749,489 UART: [exit] Launching FMC @ 0x40000130
19,757,941 UART:
19,758,180 UART: Running Caliptra FMC ...
19,759,283 UART:
19,759,446 UART: [state] CFI Enabled
19,819,487 UART: [fht] FMC Alias Private Key: 7
21,583,793 UART: [art] Extend RT PCRs Done
21,585,032 UART: [art] Lock RT PCRs Done
21,586,724 UART: [art] Populate DV Done
21,592,080 UART: [fht] FMC Alias Private Key: 7
21,593,682 UART: [art] Derive CDI
21,594,501 UART: [art] Store in in slot 0x4
21,652,243 UART: [art] Derive Key Pair
21,653,279 UART: [art] Store priv key in slot 0x5
24,115,948 UART: [art] Derive Key Pair - Done
24,129,167 UART: [art] Signing Cert with AUTHO
24,130,495 UART: RITY.KEYID = 7
25,841,364 UART: [art] Erasing AUTHORITY.KEYID = 7
25,842,868 UART: [art] PUB.X = CF44206BB8CA4E1DE00C3492A9E1AE6632057FDAC273E733C2C9146D1EFBF9F25C9F2FFB13744D0CCA843590F49B8FFF
25,850,172 UART: [art] PUB.Y = 49C9D9358A6E918560086B07C0F45A849FB2CBADDEEB7E004E7808C396F50AD01CE44F729D60C9FDDA2A53C40B0CCCCA
25,857,428 UART: [art] SIG.R = 921CD28D7442E4476926EC0B3B5DD8939701F8E3CF9C50DD3A02681685FD32DA14C9BB6C119429990C7A31EBA5EDA7F8
25,864,845 UART: [art] SIG.S = 8F59FBACC60E26A83997DCDA0237B4D2EAD4363CE569F5AAB30BA8D8F5196B18DEA89A0D07BD2D4ED3C3A6FA4FD29886
26,843,489 UART: Caliptra RT
26,844,220 UART: [state] CFI Enabled
27,008,976 UART: [rt] RT listening for mailbox commands...
27,011,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,167,192 UART: [rt]cmd =0x41544d4e, len=14344
27,168,922 >>> mbox cmd response: failed
27,169,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,325,255 UART: [rt]cmd =0x41544d4e, len=14344
27,327,105 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
192,625 UART:
193,033 UART: Running Caliptra ROM ...
194,160 UART:
194,313 UART: [state] CFI Enabled
261,332 UART: [state] LifecycleState = Unprovisioned
263,779 UART: [state] DebugLocked = No
264,985 UART: [state] WD Timer not started. Device not locked for debugging
268,891 UART: [kat] SHA2-256
458,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,603 UART: [kat] ++
470,050 UART: [kat] sha1
481,594 UART: [kat] SHA2-256
484,572 UART: [kat] SHA2-384
491,713 UART: [kat] SHA2-512-ACC
494,298 UART: [kat] ECC-384
2,949,199 UART: [kat] HMAC-384Kdf
2,972,969 UART: [kat] LMS
3,504,753 UART: [kat] --
3,509,418 UART: [cold-reset] ++
3,511,170 UART: [fht] FHT @ 0x50003400
3,522,331 UART: [idev] ++
3,523,077 UART: [idev] CDI.KEYID = 6
3,523,999 UART: [idev] SUBJECT.KEYID = 7
3,525,178 UART: [idev] UDS.KEYID = 0
3,526,104 ready_for_fw is high
3,526,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,017 UART: [idev] Erasing UDS.KEYID = 0
6,030,741 UART: [idev] Sha1 KeyId Algorithm
6,053,265 UART: [idev] --
6,058,019 UART: [ldev] ++
6,058,710 UART: [ldev] CDI.KEYID = 6
6,059,625 UART: [ldev] SUBJECT.KEYID = 5
6,060,787 UART: [ldev] AUTHORITY.KEYID = 7
6,062,024 UART: [ldev] FE.KEYID = 1
6,102,660 UART: [ldev] Erasing FE.KEYID = 1
8,608,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,051 UART: [ldev] --
10,416,355 UART: [fwproc] Wait for Commands...
10,418,506 UART: [fwproc] Recv command 0x46574c44
10,420,767 UART: [fwproc] Recv'd Img size: 114360 bytes
15,061,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,142,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,258,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,801,299 >>> mbox cmd response: success
15,805,086 UART: [afmc] ++
15,805,807 UART: [afmc] CDI.KEYID = 6
15,807,001 UART: [afmc] SUBJECT.KEYID = 7
15,808,499 UART: [afmc] AUTHORITY.KEYID = 5
18,346,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,090,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,092,710 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,107,825 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,123,000 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,137,817 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,162,265 UART: [afmc] --
20,165,219 UART: [cold-reset] --
20,168,546 UART: [state] Locking Datavault
20,174,399 UART: [state] Locking PCR0, PCR1 and PCR31
20,176,611 UART: [state] Locking ICCM
20,178,981 UART: [exit] Launching FMC @ 0x40000130
20,187,606 UART:
20,187,840 UART: Running Caliptra FMC ...
20,188,944 UART:
20,189,120 UART: [state] CFI Enabled
20,246,839 UART: [fht] FMC Alias Private Key: 7
22,011,249 UART: [art] Extend RT PCRs Done
22,012,473 UART: [art] Lock RT PCRs Done
22,014,323 UART: [art] Populate DV Done
22,019,627 UART: [fht] FMC Alias Private Key: 7
22,021,394 UART: [art] Derive CDI
22,022,215 UART: [art] Store in in slot 0x4
22,079,856 UART: [art] Derive Key Pair
22,080,904 UART: [art] Store priv key in slot 0x5
24,543,700 UART: [art] Derive Key Pair - Done
24,557,065 UART: [art] Signing Cert with AUTHO
24,558,403 UART: RITY.KEYID = 7
26,269,475 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,974 UART: [art] PUB.X = C9B0659D6AFAD4EA79ECDD6E705BCA816BAE9F8CFEF734207D36C45618D99ED41034162BADD23A4C6B70265940095EC7
26,278,246 UART: [art] PUB.Y = DF8D475ADDD868AFFBD55CC55BB880236D6F1573995F333C508B3E4C318DF8171F7AB24A0D99ACF5BBFC2BD3701EC07A
26,285,541 UART: [art] SIG.R = BA0767D2D9FAE9F2587B626E107E2446C751F631A567FEE5BFB1DEBAFC4EA1E7A955061DC80F90628DB4AD0563A0F064
26,292,966 UART: [art] SIG.S = A970EBE1AFD62F09CFD4F86FDB68E3AB5752C880375EFB8E071CEBD5F97F05124BBC5314BE3A5FD1A8CEF4E86406F7D7
27,271,983 UART: Caliptra RT
27,272,677 UART: [state] CFI Enabled
27,438,004 UART: [rt] RT listening for mailbox commands...
27,440,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,595,555 UART: [rt]cmd =0x41544d4e, len=14344
27,597,525 >>> mbox cmd response: failed
27,598,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,753,831 UART: [rt]cmd =0x41544d4e, len=14344
27,755,643 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,440,818 ready_for_fw is high
3,441,190 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,838,573 >>> mbox cmd response: success
20,136,610 UART:
20,137,006 UART: Running Caliptra FMC ...
20,138,115 UART:
20,138,270 UART: [state] CFI Enabled
20,205,792 UART: [fht] FMC Alias Private Key: 7
21,969,060 UART: [art] Extend RT PCRs Done
21,970,296 UART: [art] Lock RT PCRs Done
21,971,891 UART: [art] Populate DV Done
21,977,294 UART: [fht] FMC Alias Private Key: 7
21,978,994 UART: [art] Derive CDI
21,979,732 UART: [art] Store in in slot 0x4
22,038,787 UART: [art] Derive Key Pair
22,039,835 UART: [art] Store priv key in slot 0x5
24,502,817 UART: [art] Derive Key Pair - Done
24,515,651 UART: [art] Signing Cert with AUTHO
24,516,956 UART: RITY.KEYID = 7
26,228,482 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,989 UART: [art] PUB.X = 5CAD2A66F98A6C6DFE7F17B8FA779A1FC03567AE07528923C885297A81464BF54E8A9277BBC53E3E4BCD054DDBAC8124
26,237,266 UART: [art] PUB.Y = 52ADAA92C2E3BEC9E737D004C31936A2CF09BF5E7AC274CAE522A7C9A2B13B70E9157E05FD5E038165A7279EDC483912
26,244,493 UART: [art] SIG.R = F059556D3EC19A8C6C03189F025E6B71CEA7439EE36B38C829331D901C3CA5213C3C64EA06A443AEA7019DB7B2633CC7
26,251,920 UART: [art] SIG.S = 18CD4CAD21A22BBCA397056BA2935A1D01AC6E29991288A35F40360433BC1C4C0598250F3C1C8D5735A6BD19B028A044
27,230,892 UART: Caliptra RT
27,231,603 UART: [state] CFI Enabled
27,397,031 UART: [rt] RT listening for mailbox commands...
27,399,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,009 UART: [rt]cmd =0x41544d4e, len=14344
27,556,617 >>> mbox cmd response: failed
27,557,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,712,784 UART: [rt]cmd =0x41544d4e, len=14344
27,714,859 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,463 UART:
192,815 UART: Running Caliptra ROM ...
193,999 UART:
603,816 UART: [state] CFI Enabled
617,119 UART: [state] LifecycleState = Unprovisioned
619,488 UART: [state] DebugLocked = No
621,799 UART: [state] WD Timer not started. Device not locked for debugging
626,460 UART: [kat] SHA2-256
816,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,150 UART: [kat] ++
827,745 UART: [kat] sha1
838,055 UART: [kat] SHA2-256
841,061 UART: [kat] SHA2-384
848,212 UART: [kat] SHA2-512-ACC
850,791 UART: [kat] ECC-384
3,294,088 UART: [kat] HMAC-384Kdf
3,307,414 UART: [kat] LMS
3,839,213 UART: [kat] --
3,844,464 UART: [cold-reset] ++
3,846,255 UART: [fht] FHT @ 0x50003400
3,858,151 UART: [idev] ++
3,858,785 UART: [idev] CDI.KEYID = 6
3,859,814 UART: [idev] SUBJECT.KEYID = 7
3,860,990 UART: [idev] UDS.KEYID = 0
3,861,937 ready_for_fw is high
3,862,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,297 UART: [idev] Erasing UDS.KEYID = 0
6,338,682 UART: [idev] Sha1 KeyId Algorithm
6,360,510 UART: [idev] --
6,365,817 UART: [ldev] ++
6,366,499 UART: [ldev] CDI.KEYID = 6
6,367,413 UART: [ldev] SUBJECT.KEYID = 5
6,368,566 UART: [ldev] AUTHORITY.KEYID = 7
6,369,790 UART: [ldev] FE.KEYID = 1
6,382,051 UART: [ldev] Erasing FE.KEYID = 1
8,860,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,763 UART: [ldev] --
10,654,591 UART: [fwproc] Wait for Commands...
10,656,098 UART: [fwproc] Recv command 0x46574c44
10,658,086 UART: [fwproc] Recv'd Img size: 114360 bytes
15,274,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,360,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,476,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,019,423 >>> mbox cmd response: success
16,023,106 UART: [afmc] ++
16,023,821 UART: [afmc] CDI.KEYID = 6
16,025,006 UART: [afmc] SUBJECT.KEYID = 7
16,026,498 UART: [afmc] AUTHORITY.KEYID = 5
18,527,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,249,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,251,909 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,266,988 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,282,217 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,297,057 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,321,268 UART: [afmc] --
20,325,677 UART: [cold-reset] --
20,331,265 UART: [state] Locking Datavault
20,336,203 UART: [state] Locking PCR0, PCR1 and PCR31
20,338,384 UART: [state] Locking ICCM
20,340,476 UART: [exit] Launching FMC @ 0x40000130
20,349,138 UART:
20,349,371 UART: Running Caliptra FMC ...
20,350,471 UART:
20,350,630 UART: [state] CFI Enabled
20,358,944 UART: [fht] FMC Alias Private Key: 7
22,115,089 UART: [art] Extend RT PCRs Done
22,116,295 UART: [art] Lock RT PCRs Done
22,117,858 UART: [art] Populate DV Done
22,123,261 UART: [fht] FMC Alias Private Key: 7
22,124,743 UART: [art] Derive CDI
22,125,500 UART: [art] Store in in slot 0x4
22,168,521 UART: [art] Derive Key Pair
22,169,558 UART: [art] Store priv key in slot 0x5
24,596,190 UART: [art] Derive Key Pair - Done
24,609,403 UART: [art] Signing Cert with AUTHO
24,610,705 UART: RITY.KEYID = 7
26,316,104 UART: [art] Erasing AUTHORITY.KEYID = 7
26,317,608 UART: [art] PUB.X = 0EC98D8AA2D56277AD3ADAF9F9E6D94C38F2CF8FECB0B39E242EF8B7698B5D8BBEDD044A7890028D8E521EAA2351ACDD
26,324,907 UART: [art] PUB.Y = FBEFB8587223881C59A9DB7BD51225FEA4F78F35B99AF81479727AE61D7678FE7E6F351CD3FC029CAE41B25CAE964810
26,332,140 UART: [art] SIG.R = BFBFFD34F220921027E6B838BE048C68FD577D3E615B3967AC8FFF3C6D4E89AF43A88D3F4057C400F9D1C2B218F2DD6A
26,339,529 UART: [art] SIG.S = 3EC61B2D0D3793A1174AFC50242B3A5CC6C9EC01193FACC037424833BBB12EF1079DE4D69A767CD3E8FCD571962D1053
27,318,676 UART: Caliptra RT
27,319,384 UART: [state] CFI Enabled
27,435,873 UART: [rt] RT listening for mailbox commands...
27,438,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,593,875 UART: [rt]cmd =0x41544d4e, len=14344
27,595,727 >>> mbox cmd response: failed
27,596,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,751,537 UART: [rt]cmd =0x41544d4e, len=14344
27,753,206 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,752,443 ready_for_fw is high
3,752,891 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,086,828 >>> mbox cmd response: success
20,336,060 UART:
20,336,449 UART: Running Caliptra FMC ...
20,337,581 UART:
20,337,762 UART: [state] CFI Enabled
20,345,763 UART: [fht] FMC Alias Private Key: 7
22,102,011 UART: [art] Extend RT PCRs Done
22,103,240 UART: [art] Lock RT PCRs Done
22,104,784 UART: [art] Populate DV Done
22,110,134 UART: [fht] FMC Alias Private Key: 7
22,111,779 UART: [art] Derive CDI
22,112,511 UART: [art] Store in in slot 0x4
22,155,434 UART: [art] Derive Key Pair
22,156,473 UART: [art] Store priv key in slot 0x5
24,583,783 UART: [art] Derive Key Pair - Done
24,596,776 UART: [art] Signing Cert with AUTHO
24,598,080 UART: RITY.KEYID = 7
26,303,594 UART: [art] Erasing AUTHORITY.KEYID = 7
26,305,101 UART: [art] PUB.X = B0325A40578B14E0C3493D20506AC6743FC45FC7A284BDA8944DAAB04034EF3153C1CC1C85AD980D56F84E84DAD582DB
26,312,370 UART: [art] PUB.Y = BBBDC4AD5B81D77661617BB8D36821CC6509E7FC0D9F70E52E4870D54FD05179F0024D72A55D1C520488C57F8D04EDDB
26,319,600 UART: [art] SIG.R = BA40C68938D3B6BEC6B63D5E39943703635966C31B9AC2C99AF3509D24E2EE38EE241556921EDF96BDF90AA88539A410
26,326,998 UART: [art] SIG.S = C161CD336E61CE7E8904D95C7CB3078F028462B75453E6A7F93F1142FF4EE4ADFF021AC065B898734D37C8B1D3E486C9
27,306,624 UART: Caliptra RT
27,307,332 UART: [state] CFI Enabled
27,424,133 UART: [rt] RT listening for mailbox commands...
27,426,640 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,582,067 UART: [rt]cmd =0x41544d4e, len=14344
27,584,147 >>> mbox cmd response: failed
27,584,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,740,342 UART: [rt]cmd =0x41544d4e, len=14344
27,742,139 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,079 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,091 UART: [kat] SHA2-256
892,029 UART: [kat] SHA2-384
894,584 UART: [kat] SHA2-512-ACC
896,485 UART: [kat] ECC-384
901,974 UART: [kat] HMAC-384Kdf
906,588 UART: [kat] LMS
1,474,784 UART: [kat] --
1,475,237 UART: [cold-reset] ++
1,475,619 UART: [fht] Storing FHT @ 0x50003400
1,478,330 UART: [idev] ++
1,478,498 UART: [idev] CDI.KEYID = 6
1,478,858 UART: [idev] SUBJECT.KEYID = 7
1,479,282 UART: [idev] UDS.KEYID = 0
1,479,627 ready_for_fw is high
1,479,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,250 UART: [idev] Erasing UDS.KEYID = 0
1,504,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,078 UART: [idev] --
1,513,991 UART: [ldev] ++
1,514,159 UART: [ldev] CDI.KEYID = 6
1,514,522 UART: [ldev] SUBJECT.KEYID = 5
1,514,948 UART: [ldev] AUTHORITY.KEYID = 7
1,515,411 UART: [ldev] FE.KEYID = 1
1,520,731 UART: [ldev] Erasing FE.KEYID = 1
1,546,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,536 UART: [ldev] --
1,584,861 UART: [fwproc] Waiting for Commands...
1,585,590 UART: [fwproc] Received command 0x46574c44
1,586,381 UART: [fwproc] Received Image of size 114360 bytes
5,082,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,838 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,276,195 >>> mbox cmd response: success
5,277,427 UART: [afmc] ++
5,277,595 UART: [afmc] CDI.KEYID = 6
5,277,957 UART: [afmc] SUBJECT.KEYID = 7
5,278,382 UART: [afmc] AUTHORITY.KEYID = 5
5,312,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,602 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,311 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,341,203 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,904 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,868 UART: [afmc] --
5,355,766 UART: [cold-reset] --
5,356,558 UART: [state] Locking Datavault
5,357,699 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,303 UART: [state] Locking ICCM
5,358,931 UART: [exit] Launching FMC @ 0x40000130
5,364,260 UART:
5,364,276 UART: Running Caliptra FMC ...
5,364,684 UART:
5,364,738 UART: [state] CFI Enabled
5,375,306 UART: [fht] FMC Alias Private Key: 7
5,483,162 UART: [art] Extend RT PCRs Done
5,483,590 UART: [art] Lock RT PCRs Done
5,485,304 UART: [art] Populate DV Done
5,493,686 UART: [fht] FMC Alias Private Key: 7
5,494,704 UART: [art] Derive CDI
5,494,984 UART: [art] Store in in slot 0x4
5,580,805 UART: [art] Derive Key Pair
5,581,165 UART: [art] Store priv key in slot 0x5
5,593,793 UART: [art] Derive Key Pair - Done
5,608,887 UART: [art] Signing Cert with AUTHO
5,609,367 UART: RITY.KEYID = 7
5,624,595 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,360 UART: [art] PUB.X = 49DC482E91870D0C85885E4E9D1B3E7863B85D8461C18F2ECA1F548349B1BA67E93135AB36F79528E8F99B1854412C3A
5,632,122 UART: [art] PUB.Y = FBDA5632C0743AE9FB50C0B860588C212DB4C70F9D00711ED769136BD3D43EDC6B5A6CFFEB368BC3CCDDD6A6F232C580
5,639,069 UART: [art] SIG.R = 93D018BDD96824F6323F76B597A8F9926026EBD7ECC6BF425E825650CCB7A440BA3E1FFC64263CA7F0994793A1E14006
5,645,840 UART: [art] SIG.S = 3C571DC793A2B7F4CBC4B9AAF5FA26397281A7DFFD821F1DCF9B260D45BE437E67C29FC7C1FA7F1FE5C9B9F6DC737D5E
5,669,872 UART: Caliptra RT
5,670,126 UART: [state] CFI Enabled
5,777,778 UART: [rt] RT listening for mailbox commands...
5,778,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,900,997 UART: [rt]cmd =0x41544d4e, len=14344
5,902,352 >>> mbox cmd response: failed
5,902,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,025,038 UART: [rt]cmd =0x41544d4e, len=14344
6,026,533 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,215 ready_for_fw is high
1,362,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,201,487 >>> mbox cmd response: success
5,263,322 UART:
5,263,338 UART: Running Caliptra FMC ...
5,263,746 UART:
5,263,800 UART: [state] CFI Enabled
5,274,126 UART: [fht] FMC Alias Private Key: 7
5,381,112 UART: [art] Extend RT PCRs Done
5,381,540 UART: [art] Lock RT PCRs Done
5,382,814 UART: [art] Populate DV Done
5,390,946 UART: [fht] FMC Alias Private Key: 7
5,391,914 UART: [art] Derive CDI
5,392,194 UART: [art] Store in in slot 0x4
5,478,037 UART: [art] Derive Key Pair
5,478,397 UART: [art] Store priv key in slot 0x5
5,490,979 UART: [art] Derive Key Pair - Done
5,505,584 UART: [art] Signing Cert with AUTHO
5,506,064 UART: RITY.KEYID = 7
5,521,192 UART: [art] Erasing AUTHORITY.KEYID = 7
5,521,957 UART: [art] PUB.X = 752BE0777A83B3339DB6544457EA83985DC6B750D4EAA3714AE9DB124357102832B548C0A94A6F61CD72E84623DD87B5
5,528,725 UART: [art] PUB.Y = 71618B4122BAE9D5464D9973C5954EF58D438338D85459BFD16FACCCE729C13B34F200884595907EEDF57F9B62A30B5F
5,535,652 UART: [art] SIG.R = EA986AF442DFB5CCC8437B6E517BAE389FBFC4896265F954462C8258BD753FF5FE1AB5A596FDD777AED143ACF575DA99
5,542,442 UART: [art] SIG.S = F942F34D55A16ACF1D74A21FC1E9B060934599299E31FD46155A13B76206F3B27DD350EA99400E426E2867041312F3D1
5,566,566 UART: Caliptra RT
5,566,820 UART: [state] CFI Enabled
5,674,525 UART: [rt] RT listening for mailbox commands...
5,675,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,797,822 UART: [rt]cmd =0x41544d4e, len=14344
5,799,341 >>> mbox cmd response: failed
5,799,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,921,779 UART: [rt]cmd =0x41544d4e, len=14344
5,923,292 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,151 UART: [kat] LMS
1,475,347 UART: [kat] --
1,476,184 UART: [cold-reset] ++
1,476,514 UART: [fht] Storing FHT @ 0x50003400
1,479,267 UART: [idev] ++
1,479,435 UART: [idev] CDI.KEYID = 6
1,479,795 UART: [idev] SUBJECT.KEYID = 7
1,480,219 UART: [idev] UDS.KEYID = 0
1,480,564 ready_for_fw is high
1,480,564 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,705 UART: [idev] Erasing UDS.KEYID = 0
1,505,033 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,669 UART: [idev] --
1,514,718 UART: [ldev] ++
1,514,886 UART: [ldev] CDI.KEYID = 6
1,515,249 UART: [ldev] SUBJECT.KEYID = 5
1,515,675 UART: [ldev] AUTHORITY.KEYID = 7
1,516,138 UART: [ldev] FE.KEYID = 1
1,521,360 UART: [ldev] Erasing FE.KEYID = 1
1,546,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,227 UART: [ldev] --
1,585,628 UART: [fwproc] Waiting for Commands...
1,586,257 UART: [fwproc] Received command 0x46574c44
1,587,048 UART: [fwproc] Received Image of size 114360 bytes
5,044,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,073,008 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,102,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,238,147 >>> mbox cmd response: success
5,239,337 UART: [afmc] ++
5,239,505 UART: [afmc] CDI.KEYID = 6
5,239,867 UART: [afmc] SUBJECT.KEYID = 7
5,240,292 UART: [afmc] AUTHORITY.KEYID = 5
5,275,956 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,292,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,292,814 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,298,523 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,304,415 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,310,116 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,317,920 UART: [afmc] --
5,318,934 UART: [cold-reset] --
5,319,850 UART: [state] Locking Datavault
5,321,211 UART: [state] Locking PCR0, PCR1 and PCR31
5,321,815 UART: [state] Locking ICCM
5,322,469 UART: [exit] Launching FMC @ 0x40000130
5,327,798 UART:
5,327,814 UART: Running Caliptra FMC ...
5,328,222 UART:
5,328,365 UART: [state] CFI Enabled
5,338,871 UART: [fht] FMC Alias Private Key: 7
5,446,573 UART: [art] Extend RT PCRs Done
5,447,001 UART: [art] Lock RT PCRs Done
5,448,587 UART: [art] Populate DV Done
5,456,559 UART: [fht] FMC Alias Private Key: 7
5,457,669 UART: [art] Derive CDI
5,457,949 UART: [art] Store in in slot 0x4
5,543,204 UART: [art] Derive Key Pair
5,543,564 UART: [art] Store priv key in slot 0x5
5,556,680 UART: [art] Derive Key Pair - Done
5,571,514 UART: [art] Signing Cert with AUTHO
5,571,994 UART: RITY.KEYID = 7
5,587,196 UART: [art] Erasing AUTHORITY.KEYID = 7
5,587,961 UART: [art] PUB.X = EBFB2248238EFB51077F42F67FCE47284C478317AA3A378470314C0A2DAD10E34AE21C153AFE229F939AC4553FE03FB3
5,594,733 UART: [art] PUB.Y = 28BEF3220DC4FE14CCB9FB10F3D4291B74F383C88A690D54DF3629EAD0BAA8C6C4419BF769C4B1339C92012CE3DEB7CF
5,601,694 UART: [art] SIG.R = 157DDBFBA1B8C4E3C4440AE02A6E4728B078084442800C072218B745D528D02C23A2821C5750624294CD18CD6CF43C93
5,608,448 UART: [art] SIG.S = 8BF293B3CE9E63A2FEAAEECB3DFB10E730179617573C12602BDDD45A5C113DE22F0C6421BC05A25A727A2BFDA1CB47AF
5,631,929 UART: Caliptra RT
5,632,275 UART: [state] CFI Enabled
5,739,745 UART: [rt] RT listening for mailbox commands...
5,740,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,862,964 UART: [rt]cmd =0x41544d4e, len=14344
5,864,591 >>> mbox cmd response: failed
5,864,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,987,101 UART: [rt]cmd =0x41544d4e, len=14344
5,988,482 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,314 ready_for_fw is high
1,363,314 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,164,421 >>> mbox cmd response: success
5,226,968 UART:
5,226,984 UART: Running Caliptra FMC ...
5,227,392 UART:
5,227,535 UART: [state] CFI Enabled
5,238,177 UART: [fht] FMC Alias Private Key: 7
5,345,565 UART: [art] Extend RT PCRs Done
5,345,993 UART: [art] Lock RT PCRs Done
5,347,643 UART: [art] Populate DV Done
5,355,855 UART: [fht] FMC Alias Private Key: 7
5,356,825 UART: [art] Derive CDI
5,357,105 UART: [art] Store in in slot 0x4
5,442,744 UART: [art] Derive Key Pair
5,443,104 UART: [art] Store priv key in slot 0x5
5,456,674 UART: [art] Derive Key Pair - Done
5,471,106 UART: [art] Signing Cert with AUTHO
5,471,586 UART: RITY.KEYID = 7
5,486,882 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,647 UART: [art] PUB.X = C8BE28CCD283A6C083CBF6D87E6E38F4A023C6AB1A29D16DCBFF573BCDF83DE1A0F753E47969D6A67765748ACD1227CE
5,494,439 UART: [art] PUB.Y = 401D02901A3861D0CF5B99F782BD709DA56C495D4DBC1675CBD8C44E5FCBF8E6550349184A1ADBC141805BDC149AFA2F
5,501,397 UART: [art] SIG.R = 0DC32A58DBDB3B9BC530D415076F5A3BA5F6F89724CD9B25F5A86523FA0D3F1F8FDFDEF8D2291EA45E30641861D856F9
5,508,174 UART: [art] SIG.S = 874485D231FCE4D8BAEA204692A45414DF36A452CF0D4A6B2814077F7AB47ABBEF50E8C5123C461B77327A15D8E8BA85
5,532,323 UART: Caliptra RT
5,532,669 UART: [state] CFI Enabled
5,640,607 UART: [rt] RT listening for mailbox commands...
5,641,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,812 UART: [rt]cmd =0x41544d4e, len=14344
5,765,357 >>> mbox cmd response: failed
5,765,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,888,107 UART: [rt]cmd =0x41544d4e, len=14344
5,889,716 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,726 UART: [kat] SHA2-512-ACC
908,627 UART: [kat] ECC-384
918,240 UART: [kat] HMAC-384Kdf
922,886 UART: [kat] LMS
1,171,214 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,477 UART: [fht] FHT @ 0x50003400
1,175,258 UART: [idev] ++
1,175,426 UART: [idev] CDI.KEYID = 6
1,175,786 UART: [idev] SUBJECT.KEYID = 7
1,176,210 UART: [idev] UDS.KEYID = 0
1,176,555 ready_for_fw is high
1,176,555 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,910 UART: [idev] Erasing UDS.KEYID = 0
1,200,769 UART: [idev] Sha1 KeyId Algorithm
1,209,213 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,702 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,294 UART: [fwproc] Recv'd Img size: 114360 bytes
3,125,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,318,740 >>> mbox cmd response: success
3,319,784 UART: [afmc] ++
3,319,952 UART: [afmc] CDI.KEYID = 6
3,320,314 UART: [afmc] SUBJECT.KEYID = 7
3,320,739 UART: [afmc] AUTHORITY.KEYID = 5
3,356,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,352 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,061 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,953 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,664 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,377 UART: [afmc] --
3,399,497 UART: [cold-reset] --
3,400,525 UART: [state] Locking Datavault
3,401,660 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,264 UART: [state] Locking ICCM
3,402,780 UART: [exit] Launching FMC @ 0x40000130
3,408,109 UART:
3,408,125 UART: Running Caliptra FMC ...
3,408,533 UART:
3,408,587 UART: [state] CFI Enabled
3,418,803 UART: [fht] FMC Alias Private Key: 7
3,527,225 UART: [art] Extend RT PCRs Done
3,527,653 UART: [art] Lock RT PCRs Done
3,529,257 UART: [art] Populate DV Done
3,537,671 UART: [fht] FMC Alias Private Key: 7
3,538,739 UART: [art] Derive CDI
3,539,019 UART: [art] Store in in slot 0x4
3,624,632 UART: [art] Derive Key Pair
3,624,992 UART: [art] Store priv key in slot 0x5
3,638,164 UART: [art] Derive Key Pair - Done
3,652,681 UART: [art] Signing Cert with AUTHO
3,653,161 UART: RITY.KEYID = 7
3,668,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,954 UART: [art] PUB.X = AA2D7580CF6E10E6970879436DC26B3343CEDF25564BE0A707A5AC5B5D386FA30126E70A1C68E377A8AC742697BF4809
3,675,713 UART: [art] PUB.Y = F6FABF76EEDF6F5356629CA746A7C4DE7D3C25B4AA2F6006215928AFBFC1C499D090F0DEC0854A215EBBEB9EEDCE47C6
3,682,688 UART: [art] SIG.R = 1B62CF03778D8E1A7442DA19DCFDC398D33D690D94D95392BF0C717596B99987D6346A42BC7D91A57DE67DA6A8819F19
3,689,453 UART: [art] SIG.S = 44961C83ECC54B0B5B5A0E67EBA71682AC835D5932F729D859A4A565A6203DC84DFE5CD7E5A008A2686B8A365A1929FD
3,712,941 UART: Caliptra RT
3,713,195 UART: [state] CFI Enabled
3,820,999 UART: [rt] RT listening for mailbox commands...
3,821,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,222 UART: [rt]cmd =0x41544d4e, len=14344
3,945,837 >>> mbox cmd response: failed
3,945,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,507 UART: [rt]cmd =0x41544d4e, len=14344
4,070,010 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 ready_for_fw is high
1,060,081 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,549 >>> mbox cmd response: success
3,231,916 UART:
3,231,932 UART: Running Caliptra FMC ...
3,232,340 UART:
3,232,394 UART: [state] CFI Enabled
3,242,930 UART: [fht] FMC Alias Private Key: 7
3,351,348 UART: [art] Extend RT PCRs Done
3,351,776 UART: [art] Lock RT PCRs Done
3,353,378 UART: [art] Populate DV Done
3,361,900 UART: [fht] FMC Alias Private Key: 7
3,362,960 UART: [art] Derive CDI
3,363,240 UART: [art] Store in in slot 0x4
3,448,887 UART: [art] Derive Key Pair
3,449,247 UART: [art] Store priv key in slot 0x5
3,462,401 UART: [art] Derive Key Pair - Done
3,477,337 UART: [art] Signing Cert with AUTHO
3,477,817 UART: RITY.KEYID = 7
3,493,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,862 UART: [art] PUB.X = F21AC83AAF1DFC3AAF47AC9C6DBC06860F71FA374B3E09A4328FDEA460FB057DB022F8C6C9D9173DE89D8A30FBEADEFE
3,500,654 UART: [art] PUB.Y = FF96E4126D321A591166656591E94C236C8991AB6103FD5838EE0215F2F2A2E12F621ACF242B3D9CD3559D7DDAEE9DC9
3,507,604 UART: [art] SIG.R = B94E48A08839072F06074CC887CF7C20C8D42048A3B0C0E42B16CC9740AA8F41CFA9632B7397FDEE8D866EE7008E3FFB
3,514,353 UART: [art] SIG.S = A9F241ECC2ACB331B68FB1631DBEAB1A174ED2A2C7602070A7BAE261D153EFF269CAEA16BE09AE0D6D39F678121A8768
3,538,710 UART: Caliptra RT
3,538,964 UART: [state] CFI Enabled
3,645,908 UART: [rt] RT listening for mailbox commands...
3,646,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,343 UART: [rt]cmd =0x41544d4e, len=14344
3,770,952 >>> mbox cmd response: failed
3,770,952 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,386 UART: [rt]cmd =0x41544d4e, len=14344
3,894,877 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,221 UART: [kat] HMAC-384Kdf
922,951 UART: [kat] LMS
1,171,279 UART: [kat] --
1,172,494 UART: [cold-reset] ++
1,173,060 UART: [fht] FHT @ 0x50003400
1,175,623 UART: [idev] ++
1,175,791 UART: [idev] CDI.KEYID = 6
1,176,151 UART: [idev] SUBJECT.KEYID = 7
1,176,575 UART: [idev] UDS.KEYID = 0
1,176,920 ready_for_fw is high
1,176,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,901 UART: [idev] Erasing UDS.KEYID = 0
1,202,106 UART: [idev] Sha1 KeyId Algorithm
1,210,538 UART: [idev] --
1,211,616 UART: [ldev] ++
1,211,784 UART: [ldev] CDI.KEYID = 6
1,212,147 UART: [ldev] SUBJECT.KEYID = 5
1,212,573 UART: [ldev] AUTHORITY.KEYID = 7
1,213,036 UART: [ldev] FE.KEYID = 1
1,218,220 UART: [ldev] Erasing FE.KEYID = 1
1,244,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,872 UART: [ldev] --
1,284,235 UART: [fwproc] Wait for Commands...
1,285,031 UART: [fwproc] Recv command 0x46574c44
1,285,759 UART: [fwproc] Recv'd Img size: 114360 bytes
3,135,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,192,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,328,404 >>> mbox cmd response: success
3,329,462 UART: [afmc] ++
3,329,630 UART: [afmc] CDI.KEYID = 6
3,329,992 UART: [afmc] SUBJECT.KEYID = 7
3,330,417 UART: [afmc] AUTHORITY.KEYID = 5
3,365,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,998 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,707 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,599 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,310 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,408,173 UART: [afmc] --
3,409,179 UART: [cold-reset] --
3,409,959 UART: [state] Locking Datavault
3,411,328 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,932 UART: [state] Locking ICCM
3,412,500 UART: [exit] Launching FMC @ 0x40000130
3,417,829 UART:
3,417,845 UART: Running Caliptra FMC ...
3,418,253 UART:
3,418,396 UART: [state] CFI Enabled
3,429,132 UART: [fht] FMC Alias Private Key: 7
3,536,750 UART: [art] Extend RT PCRs Done
3,537,178 UART: [art] Lock RT PCRs Done
3,538,546 UART: [art] Populate DV Done
3,546,462 UART: [fht] FMC Alias Private Key: 7
3,547,444 UART: [art] Derive CDI
3,547,724 UART: [art] Store in in slot 0x4
3,633,183 UART: [art] Derive Key Pair
3,633,543 UART: [art] Store priv key in slot 0x5
3,646,511 UART: [art] Derive Key Pair - Done
3,661,660 UART: [art] Signing Cert with AUTHO
3,662,140 UART: RITY.KEYID = 7
3,676,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,599 UART: [art] PUB.X = D2CBF05DEE68DDB9253F8BB99A5ED24E75B831D412A70AE8B7FA62AAEF7EDF448DA17FBFEB679BB5F6E9BE9A8B61C820
3,684,400 UART: [art] PUB.Y = C6ED28367BCA06659D6C0F098833474B9F71F0A47329F7E4AA603BF1457BB3D4029E40D840598E50BD25F19EA2A7BF93
3,691,342 UART: [art] SIG.R = C8D2146BC4D35D9E442845FB449C9C21E069EC5FD698742B9F1FD7B3942AAA6C6265ACC1F0C9E6C867A0BE1A2B9FF469
3,698,128 UART: [art] SIG.S = E3F71FE92B76F6DEEBF4E41A092CD6EF564579AD2E41A041B0582FB93BA113E471CF853169DD7E6E35C9420C6DD0E8A1
3,721,603 UART: Caliptra RT
3,721,949 UART: [state] CFI Enabled
3,828,569 UART: [rt] RT listening for mailbox commands...
3,829,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,814 UART: [rt]cmd =0x41544d4e, len=14344
3,953,539 >>> mbox cmd response: failed
3,953,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,107 UART: [rt]cmd =0x41544d4e, len=14344
4,077,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 ready_for_fw is high
1,060,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,173,687 >>> mbox cmd response: success
3,236,160 UART:
3,236,176 UART: Running Caliptra FMC ...
3,236,584 UART:
3,236,727 UART: [state] CFI Enabled
3,247,155 UART: [fht] FMC Alias Private Key: 7
3,355,303 UART: [art] Extend RT PCRs Done
3,355,731 UART: [art] Lock RT PCRs Done
3,357,195 UART: [art] Populate DV Done
3,365,527 UART: [fht] FMC Alias Private Key: 7
3,366,511 UART: [art] Derive CDI
3,366,791 UART: [art] Store in in slot 0x4
3,452,462 UART: [art] Derive Key Pair
3,452,822 UART: [art] Store priv key in slot 0x5
3,466,154 UART: [art] Derive Key Pair - Done
3,480,878 UART: [art] Signing Cert with AUTHO
3,481,358 UART: RITY.KEYID = 7
3,496,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,605 UART: [art] PUB.X = D61B691680E36CC3313680AFED1D2E5F86DB01382C7A66D2B05E6408CEB2208B07F57BA9017C3B5C769335473D572B5C
3,504,365 UART: [art] PUB.Y = D4D3048A2D7E1BFFA0BDBF25299DD267818509C9CB506BED334C78B9A9C60EB63A1B460C5AF08782304517BFC348876B
3,511,313 UART: [art] SIG.R = 5054A051AFCEE6E1339C503E4D9FD92B31C558756DA5082E4355B8AB6D33B885EF0BB3E36F527AD6DED2260560B97544
3,518,080 UART: [art] SIG.S = 001F8E11E145C2B02D950B18456D4947F6A3ADD83FD5214A80C0728DA3101662CDE64D417E3849BA8638428374012523
3,542,157 UART: Caliptra RT
3,542,503 UART: [state] CFI Enabled
3,650,863 UART: [rt] RT listening for mailbox commands...
3,651,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,494 UART: [rt]cmd =0x41544d4e, len=14344
3,776,319 >>> mbox cmd response: failed
3,776,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,825 UART: [rt]cmd =0x41544d4e, len=14344
3,900,240 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
904,000 UART: [kat] SHA2-512-ACC
905,901 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,312 UART: [kat] LMS
1,168,624 UART: [kat] --
1,169,519 UART: [cold-reset] ++
1,169,893 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,174,049 ready_for_fw is high
1,174,049 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,280,892 UART: [fwproc] Wait for Commands...
1,281,587 UART: [fwproc] Recv command 0x46574c44
1,282,320 UART: [fwproc] Recv'd Img size: 114360 bytes
3,122,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,314,606 >>> mbox cmd response: success
3,315,781 UART: [afmc] ++
3,315,949 UART: [afmc] CDI.KEYID = 6
3,316,312 UART: [afmc] SUBJECT.KEYID = 7
3,316,738 UART: [afmc] AUTHORITY.KEYID = 5
3,352,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,589 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,299 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,189 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,900 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,718 UART: [afmc] --
3,395,628 UART: [cold-reset] --
3,396,362 UART: [state] Locking Datavault
3,397,661 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,265 UART: [state] Locking ICCM
3,398,779 UART: [exit] Launching FMC @ 0x40000130
3,404,108 UART:
3,404,124 UART: Running Caliptra FMC ...
3,404,532 UART:
3,404,586 UART: [state] CFI Enabled
3,414,878 UART: [fht] FMC Alias Private Key: 7
3,522,602 UART: [art] Extend RT PCRs Done
3,523,030 UART: [art] Lock RT PCRs Done
3,524,508 UART: [art] Populate DV Done
3,532,492 UART: [fht] FMC Alias Private Key: 7
3,533,466 UART: [art] Derive CDI
3,533,746 UART: [art] Store in in slot 0x4
3,619,331 UART: [art] Derive Key Pair
3,619,691 UART: [art] Store priv key in slot 0x5
3,632,877 UART: [art] Derive Key Pair - Done
3,647,949 UART: [art] Signing Cert with AUTHO
3,648,429 UART: RITY.KEYID = 7
3,664,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,188 UART: [art] PUB.X = 9751F0C56D569364FB30B020F2366D2F9BBD8712AB112A7C992610F785BBA0E53A75CD15587C2A45F630FFA7227BC3C4
3,671,962 UART: [art] PUB.Y = 87D749E5B024C5EB09C2EEF0619C1273F2927F8F550B3D445A41E41B8A03F2DC6E238143A910ADB6714DFA003E3E439B
3,678,887 UART: [art] SIG.R = 40C5C4B0BB376D6E6B8A72A409ABF3B17157A8A1AFE9BBE253F02BDBD5ED51F20B0C22A3D5060C934C0D19731D5B2C70
3,685,657 UART: [art] SIG.S = BE8F8AF39639D657CE3DDC27D5F50FCE819219CAEF469C7C8384BE5AA47E78B510CE3D28F1D5A844AC3FF95E0142378E
3,709,276 UART: Caliptra RT
3,709,530 UART: [state] CFI Enabled
3,816,623 UART: [rt] RT listening for mailbox commands...
3,817,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,022 UART: [rt]cmd =0x41544d4e, len=14344
3,941,911 >>> mbox cmd response: failed
3,941,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,575 UART: [rt]cmd =0x41544d4e, len=14344
4,066,166 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,732 ready_for_fw is high
1,056,732 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,168,249 >>> mbox cmd response: success
3,230,496 UART:
3,230,512 UART: Running Caliptra FMC ...
3,230,920 UART:
3,230,974 UART: [state] CFI Enabled
3,241,594 UART: [fht] FMC Alias Private Key: 7
3,348,892 UART: [art] Extend RT PCRs Done
3,349,320 UART: [art] Lock RT PCRs Done
3,350,974 UART: [art] Populate DV Done
3,358,998 UART: [fht] FMC Alias Private Key: 7
3,360,032 UART: [art] Derive CDI
3,360,312 UART: [art] Store in in slot 0x4
3,445,843 UART: [art] Derive Key Pair
3,446,203 UART: [art] Store priv key in slot 0x5
3,459,259 UART: [art] Derive Key Pair - Done
3,474,234 UART: [art] Signing Cert with AUTHO
3,474,714 UART: RITY.KEYID = 7
3,489,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,555 UART: [art] PUB.X = 3C744F34F7A4475CC5451A4DB631556B7FA25D1D8EBBB8F083F86ADF443BB4E9A07D1B0A3EBB9DF60D08EDDFC6079D36
3,497,335 UART: [art] PUB.Y = 17F0C4BA9E90997D882B8D11E0D4A53B8C4350225900904AD0D1686721D5F1FC77C3C61E0C479C8F2264A13F75B4CC0A
3,504,259 UART: [art] SIG.R = 24769F9A3FDDED88262A38D4361B36CEBFD54E85C4D16E97DFE8F82E731950D006C02EC30F18F06D42586DE21F5CA8BB
3,511,037 UART: [art] SIG.S = 02B8DA61ACFA13E7515817A49D3C93F1C9785B9F4BE36C9A1A17405ED755B8EF4BD8306720C2F41ED1CCBB34BF591C93
3,535,779 UART: Caliptra RT
3,536,033 UART: [state] CFI Enabled
3,643,799 UART: [rt] RT listening for mailbox commands...
3,644,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,298 UART: [rt]cmd =0x41544d4e, len=14344
3,768,661 >>> mbox cmd response: failed
3,768,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,891,087 UART: [rt]cmd =0x41544d4e, len=14344
3,892,768 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,312 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,174,054 ready_for_fw is high
1,174,054 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,558 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 114360 bytes
3,122,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,215 >>> mbox cmd response: success
3,317,340 UART: [afmc] ++
3,317,508 UART: [afmc] CDI.KEYID = 6
3,317,871 UART: [afmc] SUBJECT.KEYID = 7
3,318,297 UART: [afmc] AUTHORITY.KEYID = 5
3,353,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,764 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,474 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,364 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,075 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,695 UART: [afmc] --
3,396,729 UART: [cold-reset] --
3,397,365 UART: [state] Locking Datavault
3,398,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,924 UART: [state] Locking ICCM
3,399,420 UART: [exit] Launching FMC @ 0x40000130
3,404,749 UART:
3,404,765 UART: Running Caliptra FMC ...
3,405,173 UART:
3,405,316 UART: [state] CFI Enabled
3,416,048 UART: [fht] FMC Alias Private Key: 7
3,524,786 UART: [art] Extend RT PCRs Done
3,525,214 UART: [art] Lock RT PCRs Done
3,527,072 UART: [art] Populate DV Done
3,534,956 UART: [fht] FMC Alias Private Key: 7
3,536,030 UART: [art] Derive CDI
3,536,310 UART: [art] Store in in slot 0x4
3,621,841 UART: [art] Derive Key Pair
3,622,201 UART: [art] Store priv key in slot 0x5
3,636,121 UART: [art] Derive Key Pair - Done
3,650,538 UART: [art] Signing Cert with AUTHO
3,651,018 UART: RITY.KEYID = 7
3,665,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,699 UART: [art] PUB.X = 1511FD9D79F919EEF1F3C5BC463BF1D725BE9D0DCB4CC3431E3196C9EA41B0F54FB12600EFE1F694848765AB0C8AB9B3
3,673,459 UART: [art] PUB.Y = AE8E9060F12312ABC7142703AB776F95258A2C7B6A992D0BE3ECF28B0D36E565D24A2F488189F84D85EE70421CEE9C8C
3,680,408 UART: [art] SIG.R = D25F967074DA8EFA50723D9FD920B4ED459FBCBB50218FECE94A0F0334707C3F08B28213BFE6DC61464BEE02C60D2D96
3,687,177 UART: [art] SIG.S = 1CD602759161B3B76A18D4A5C5AF32C9EB0E326D91AFE95728A743B9631A23FEE4DC462BD2FA7F6EC527353331F52268
3,711,232 UART: Caliptra RT
3,711,578 UART: [state] CFI Enabled
3,820,581 UART: [rt] RT listening for mailbox commands...
3,821,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,162 UART: [rt]cmd =0x41544d4e, len=14344
3,945,757 >>> mbox cmd response: failed
3,945,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,061 UART: [rt]cmd =0x41544d4e, len=14344
4,069,352 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,599 ready_for_fw is high
1,056,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,177,572 >>> mbox cmd response: success
3,239,557 UART:
3,239,573 UART: Running Caliptra FMC ...
3,239,981 UART:
3,240,124 UART: [state] CFI Enabled
3,251,010 UART: [fht] FMC Alias Private Key: 7
3,358,914 UART: [art] Extend RT PCRs Done
3,359,342 UART: [art] Lock RT PCRs Done
3,361,060 UART: [art] Populate DV Done
3,369,194 UART: [fht] FMC Alias Private Key: 7
3,370,230 UART: [art] Derive CDI
3,370,510 UART: [art] Store in in slot 0x4
3,456,323 UART: [art] Derive Key Pair
3,456,683 UART: [art] Store priv key in slot 0x5
3,470,297 UART: [art] Derive Key Pair - Done
3,485,102 UART: [art] Signing Cert with AUTHO
3,485,582 UART: RITY.KEYID = 7
3,500,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,211 UART: [art] PUB.X = 73F748DAB7CC7B2213FE2AF0B6D161F749A72DFE9897BA2C11B5F711D385C1A6EB3310EA338811787A75307DA3A2C5B2
3,507,991 UART: [art] PUB.Y = 9A48F6486B1FC2C580245A882E5D5D1C92CDBEAB9767955494E4553A5D41CAE86A2C1B7E097FEDF1DB061D0C93EA8599
3,514,944 UART: [art] SIG.R = 7910A2B4BC160B280D0ACBB3B93D6FDAAF8B63E1BAEF70BC663A6A78C7D450D4EBB107F58700AD4791A7AC9DC965B8B1
3,521,704 UART: [art] SIG.S = 5C7959835B770D7A73EC63598236DC12EFE118101E89EEF66BB31EE3A1BA4D43C6D7D4DF1EB11A8CB965DCEC0FCF656C
3,545,069 UART: Caliptra RT
3,545,415 UART: [state] CFI Enabled
3,652,589 UART: [rt] RT listening for mailbox commands...
3,653,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,954 UART: [rt]cmd =0x41544d4e, len=14344
3,777,259 >>> mbox cmd response: failed
3,777,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,735 UART: [rt]cmd =0x41544d4e, len=14344
3,901,278 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,490 UART:
192,844 UART: Running Caliptra ROM ...
194,019 UART:
194,169 UART: [state] CFI Enabled
262,664 UART: [state] LifecycleState = Unprovisioned
264,683 UART: [state] DebugLocked = No
265,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,344 UART: [kat] SHA2-256
440,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,528 UART: [kat] ++
451,057 UART: [kat] sha1
463,212 UART: [kat] SHA2-256
465,923 UART: [kat] SHA2-384
471,262 UART: [kat] SHA2-512-ACC
473,629 UART: [kat] ECC-384
2,767,290 UART: [kat] HMAC-384Kdf
2,799,773 UART: [kat] LMS
3,990,107 UART: [kat] --
3,995,758 UART: [cold-reset] ++
3,997,123 UART: [fht] Storing FHT @ 0x50003400
4,008,606 UART: [idev] ++
4,009,170 UART: [idev] CDI.KEYID = 6
4,010,198 UART: [idev] SUBJECT.KEYID = 7
4,011,376 UART: [idev] UDS.KEYID = 0
4,012,380 ready_for_fw is high
4,012,597 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,012 UART: [idev] Erasing UDS.KEYID = 0
7,345,157 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,038 UART: [idev] --
7,371,867 UART: [ldev] ++
7,372,430 UART: [ldev] CDI.KEYID = 6
7,373,398 UART: [ldev] SUBJECT.KEYID = 5
7,374,602 UART: [ldev] AUTHORITY.KEYID = 7
7,375,829 UART: [ldev] FE.KEYID = 1
7,421,034 UART: [ldev] Erasing FE.KEYID = 1
10,754,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,590 UART: [ldev] --
13,115,838 UART: [fwproc] Waiting for Commands...
13,118,635 UART: [fwproc] Received command 0x46574c44
13,120,867 UART: [fwproc] Received Image of size 114036 bytes
22,071,941 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,146,934 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,215,843 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,533,148 >>> mbox cmd response: success
22,538,080 UART: [afmc] ++
22,538,682 UART: [afmc] CDI.KEYID = 6
22,539,644 UART: [afmc] SUBJECT.KEYID = 7
22,540,851 UART: [afmc] AUTHORITY.KEYID = 5
25,907,171 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,212,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,214,535 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,229,088 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,243,856 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,258,091 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,279,399 UART: [afmc] --
28,283,332 UART: [cold-reset] --
28,286,327 UART: [state] Locking Datavault
28,291,735 UART: [state] Locking PCR0, PCR1 and PCR31
28,293,431 UART: [state] Locking ICCM
28,295,412 UART: [exit] Launching FMC @ 0x40000130
28,303,799 UART:
28,304,036 UART: Running Caliptra FMC ...
28,305,129 UART:
28,305,280 UART: [state] CFI Enabled
28,371,593 UART: [fht] FMC Alias Private Key: 7
30,709,629 UART: [art] Extend RT PCRs Done
30,710,854 UART: [art] Lock RT PCRs Done
30,712,396 UART: [art] Populate DV Done
30,717,854 UART: [fht] FMC Alias Private Key: 7
30,719,405 UART: [art] Derive CDI
30,720,216 UART: [art] Store in in slot 0x4
30,780,720 UART: [art] Derive Key Pair
30,781,760 UART: [art] Store priv key in slot 0x5
34,074,595 UART: [art] Derive Key Pair - Done
34,087,863 UART: [art] Signing Cert with AUTHO
34,089,168 UART: RITY.KEYID = 7
36,376,114 UART: [art] Erasing AUTHORITY.KEYID = 7
36,377,621 UART: [art] PUB.X = FCDFF53CF0D0AEF4CFC02AC31123A197FC1E4077087535C2EA3148BFACDF1E8FB00B772E6B07931B644F60900945E962
36,384,836 UART: [art] PUB.Y = 8DAFE24D24204D983E785D25DF93577DA68EE343C0237F85B79C975E4583BA56C35151EDA125B6D4E5A421FE2AD34DC8
36,392,087 UART: [art] SIG.R = E9AFD9DC1B5F5A5F65EE260435B81235C640371F9EB6DBA72C9C096EB96BEDC7595B135E7E71A80D468C1FD9C589A264
36,399,504 UART: [art] SIG.S = D7A03B9A3C08F904840F442BB4D1C42E7A5C3C8398C749F0962EB8BDC1727D9C6565DC5FD2E79BA6BC6B5F4841CA5C5E
37,704,599 UART: Caliptra RT
37,705,309 UART: [state] CFI Enabled
37,867,358 UART: [rt] RT listening for mailbox commands...
37,869,656 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,024,748 UART: [rt]cmd =0x41544d4e, len=14344
46,593,091 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,781,626 ready_for_fw is high
3,782,034 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,631,085 >>> mbox cmd response: success
27,320,340 UART:
27,320,755 UART: Running Caliptra FMC ...
27,321,931 UART:
27,322,095 UART: [state] CFI Enabled
27,391,771 UART: [fht] FMC Alias Private Key: 7
29,729,325 UART: [art] Extend RT PCRs Done
29,730,573 UART: [art] Lock RT PCRs Done
29,732,092 UART: [art] Populate DV Done
29,737,806 UART: [fht] FMC Alias Private Key: 7
29,739,312 UART: [art] Derive CDI
29,740,071 UART: [art] Store in in slot 0x4
29,801,977 UART: [art] Derive Key Pair
29,803,007 UART: [art] Store priv key in slot 0x5
33,095,905 UART: [art] Derive Key Pair - Done
33,108,419 UART: [art] Signing Cert with AUTHO
33,109,723 UART: RITY.KEYID = 7
35,397,503 UART: [art] Erasing AUTHORITY.KEYID = 7
35,399,005 UART: [art] PUB.X = 000908223E11B9FAF29E732D1C0FEA6901098630BB1BE6B28593B3828393B92CF2A85000E58E4D7119547650D1212550
35,406,216 UART: [art] PUB.Y = AFFDA1E970521A2F8897532936E912C61E4C1C344112DA55E54175FE2E657C2E95A22378E1E202FA496FAD0B7C61AD28
35,413,440 UART: [art] SIG.R = 1968B5EAFD13F0F7401D798106C3FAD57F64632C14170336AEF6260BA61981A58806E66F69F151246E68A27AF922A91E
35,420,801 UART: [art] SIG.S = A1C00FDB2517A73C1AAB863C5CF26BC06A5B7775E4476BDD91C1C5761D83D603638668B2C83880B73D22174417FB98CF
36,726,020 UART: Caliptra RT
36,726,727 UART: [state] CFI Enabled
36,887,024 UART: [rt] RT listening for mailbox commands...
36,889,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,044,986 UART: [rt]cmd =0x41544d4e, len=14344
45,535,380 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,373 UART:
192,720 UART: Running Caliptra ROM ...
193,897 UART:
603,557 UART: [state] CFI Enabled
617,804 UART: [state] LifecycleState = Unprovisioned
619,759 UART: [state] DebugLocked = No
622,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,049 UART: [kat] SHA2-256
796,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,316 UART: [kat] ++
807,757 UART: [kat] sha1
820,474 UART: [kat] SHA2-256
823,188 UART: [kat] SHA2-384
829,386 UART: [kat] SHA2-512-ACC
831,755 UART: [kat] ECC-384
3,114,247 UART: [kat] HMAC-384Kdf
3,126,339 UART: [kat] LMS
4,316,426 UART: [kat] --
4,319,734 UART: [cold-reset] ++
4,321,387 UART: [fht] Storing FHT @ 0x50003400
4,331,729 UART: [idev] ++
4,332,300 UART: [idev] CDI.KEYID = 6
4,333,280 UART: [idev] SUBJECT.KEYID = 7
4,334,524 UART: [idev] UDS.KEYID = 0
4,335,470 ready_for_fw is high
4,335,665 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,860 UART: [idev] Erasing UDS.KEYID = 0
7,623,870 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,771 UART: [idev] --
7,648,762 UART: [ldev] ++
7,649,330 UART: [ldev] CDI.KEYID = 6
7,650,309 UART: [ldev] SUBJECT.KEYID = 5
7,651,522 UART: [ldev] AUTHORITY.KEYID = 7
7,652,913 UART: [ldev] FE.KEYID = 1
7,664,110 UART: [ldev] Erasing FE.KEYID = 1
10,951,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,580 UART: [ldev] --
13,313,223 UART: [fwproc] Waiting for Commands...
13,314,829 UART: [fwproc] Received command 0x46574c44
13,317,067 UART: [fwproc] Received Image of size 114036 bytes
22,426,653 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,511,307 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,580,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,898,022 >>> mbox cmd response: success
22,902,674 UART: [afmc] ++
22,903,267 UART: [afmc] CDI.KEYID = 6
22,904,174 UART: [afmc] SUBJECT.KEYID = 7
22,905,448 UART: [afmc] AUTHORITY.KEYID = 5
26,216,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,510,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,512,649 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,527,199 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,541,977 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,556,215 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,577,046 UART: [afmc] --
28,581,624 UART: [cold-reset] --
28,585,377 UART: [state] Locking Datavault
28,590,136 UART: [state] Locking PCR0, PCR1 and PCR31
28,591,832 UART: [state] Locking ICCM
28,592,977 UART: [exit] Launching FMC @ 0x40000130
28,601,328 UART:
28,601,565 UART: Running Caliptra FMC ...
28,602,592 UART:
28,602,746 UART: [state] CFI Enabled
28,611,233 UART: [fht] FMC Alias Private Key: 7
30,942,935 UART: [art] Extend RT PCRs Done
30,944,167 UART: [art] Lock RT PCRs Done
30,945,689 UART: [art] Populate DV Done
30,951,375 UART: [fht] FMC Alias Private Key: 7
30,952,912 UART: [art] Derive CDI
30,953,675 UART: [art] Store in in slot 0x4
30,995,944 UART: [art] Derive Key Pair
30,996,941 UART: [art] Store priv key in slot 0x5
34,238,659 UART: [art] Derive Key Pair - Done
34,251,871 UART: [art] Signing Cert with AUTHO
34,253,191 UART: RITY.KEYID = 7
36,532,531 UART: [art] Erasing AUTHORITY.KEYID = 7
36,534,039 UART: [art] PUB.X = 0739422EA9BA20AB6B5D4D619556A9C319837DB8E2CB59C39DE1AAD3E0C971EAA4D536240F211417CEB87372491100FE
36,541,167 UART: [art] PUB.Y = A974535520DB98DC64672557FCF10F0D3B9C7C53C38B5AB6E99344D498F2180D0E84AA219D5B4E73ED4E5F6F90637128
36,548,445 UART: [art] SIG.R = 72180357783ACEBED3AE540BD570E34E8190C179E55CC04337AE2A50296CDD7D0CEA2E475EE340225AC504AEC8F3A1EF
36,555,821 UART: [art] SIG.S = 96DAC58A486D7F071E759B055190BF684D437AEE2830FE9812B442BEF7620FE0AF9B601F191D1466C93712D50F3465F6
37,860,902 UART: Caliptra RT
37,861,592 UART: [state] CFI Enabled
37,979,099 UART: [rt] RT listening for mailbox commands...
37,981,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,136,818 UART: [rt]cmd =0x41544d4e, len=14344
46,731,087 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,126,417 ready_for_fw is high
4,126,985 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,319,775 >>> mbox cmd response: success
27,961,841 UART:
27,962,235 UART: Running Caliptra FMC ...
27,963,360 UART:
27,963,525 UART: [state] CFI Enabled
27,971,222 UART: [fht] FMC Alias Private Key: 7
30,301,993 UART: [art] Extend RT PCRs Done
30,303,215 UART: [art] Lock RT PCRs Done
30,304,807 UART: [art] Populate DV Done
30,310,150 UART: [fht] FMC Alias Private Key: 7
30,311,848 UART: [art] Derive CDI
30,312,669 UART: [art] Store in in slot 0x4
30,355,599 UART: [art] Derive Key Pair
30,356,639 UART: [art] Store priv key in slot 0x5
33,598,279 UART: [art] Derive Key Pair - Done
33,611,444 UART: [art] Signing Cert with AUTHO
33,612,743 UART: RITY.KEYID = 7
35,891,792 UART: [art] Erasing AUTHORITY.KEYID = 7
35,893,300 UART: [art] PUB.X = 158F10CCFCC760B8D0E83DD2D09AA608ACDB8DA49E30F7646CCC99157BFE205118EE1C63CA4E73A4984120A470C43F43
35,900,577 UART: [art] PUB.Y = 333D61111772A56922A3C4F0350FD49B99EB2F7614103D9FD3E2A848CB3CF138B37A8A147A3A08940AD922E2DAAA66AF
35,907,809 UART: [art] SIG.R = D7AE9648EB9C5249DE6111CFA6BCBCEBA0295BCC35C0E2B55BD5A474AA6C789623B55A70063B1ABAA971D400AE6E3740
35,915,164 UART: [art] SIG.S = FCC9D4747805C025E185C42CA36F3F60E3155B55048DD77121217DEEEFF74006562E4C643FC4BB1225D17EB417DC41F9
37,220,248 UART: Caliptra RT
37,220,963 UART: [state] CFI Enabled
37,338,861 UART: [rt] RT listening for mailbox commands...
37,341,156 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,496,570 UART: [rt]cmd =0x41544d4e, len=14344
45,857,566 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,606 UART:
192,959 UART: Running Caliptra ROM ...
194,132 UART:
194,285 UART: [state] CFI Enabled
264,731 UART: [state] LifecycleState = Unprovisioned
266,593 UART: [state] DebugLocked = No
268,119 UART: [state] WD Timer not started. Device not locked for debugging
271,238 UART: [kat] SHA2-256
450,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,921 UART: [kat] ++
462,461 UART: [kat] sha1
473,625 UART: [kat] SHA2-256
476,643 UART: [kat] SHA2-384
482,566 UART: [kat] SHA2-512-ACC
485,502 UART: [kat] ECC-384
2,946,510 UART: [kat] HMAC-384Kdf
2,971,051 UART: [kat] LMS
3,500,488 UART: [kat] --
3,506,758 UART: [cold-reset] ++
3,508,978 UART: [fht] FHT @ 0x50003400
3,519,977 UART: [idev] ++
3,520,552 UART: [idev] CDI.KEYID = 6
3,521,471 UART: [idev] SUBJECT.KEYID = 7
3,522,645 UART: [idev] UDS.KEYID = 0
3,523,571 ready_for_fw is high
3,523,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,762 UART: [idev] Erasing UDS.KEYID = 0
6,026,497 UART: [idev] Sha1 KeyId Algorithm
6,050,200 UART: [idev] --
6,053,588 UART: [ldev] ++
6,054,167 UART: [ldev] CDI.KEYID = 6
6,055,052 UART: [ldev] SUBJECT.KEYID = 5
6,056,157 UART: [ldev] AUTHORITY.KEYID = 7
6,057,500 UART: [ldev] FE.KEYID = 1
6,100,528 UART: [ldev] Erasing FE.KEYID = 1
8,600,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,522 UART: [ldev] --
10,391,974 UART: [fwproc] Wait for Commands...
10,394,455 UART: [fwproc] Recv command 0x46574c44
10,396,549 UART: [fwproc] Recv'd Img size: 114360 bytes
14,962,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,039,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,108,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,426,455 >>> mbox cmd response: success
15,429,844 UART: [afmc] ++
15,430,444 UART: [afmc] CDI.KEYID = 6
15,431,357 UART: [afmc] SUBJECT.KEYID = 7
15,432,514 UART: [afmc] AUTHORITY.KEYID = 5
17,957,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,680,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,681,929 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,697,876 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,713,876 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,729,659 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,752,466 UART: [afmc] --
19,756,439 UART: [cold-reset] --
19,760,136 UART: [state] Locking Datavault
19,764,518 UART: [state] Locking PCR0, PCR1 and PCR31
19,766,164 UART: [state] Locking ICCM
19,768,419 UART: [exit] Launching FMC @ 0x40000130
19,776,875 UART:
19,777,111 UART: Running Caliptra FMC ...
19,778,213 UART:
19,778,372 UART: [state] CFI Enabled
19,839,998 UART: [fht] FMC Alias Private Key: 7
21,603,110 UART: [art] Extend RT PCRs Done
21,604,328 UART: [art] Lock RT PCRs Done
21,605,949 UART: [art] Populate DV Done
21,611,199 UART: [fht] FMC Alias Private Key: 7
21,612,905 UART: [art] Derive CDI
21,613,720 UART: [art] Store in in slot 0x4
21,672,035 UART: [art] Derive Key Pair
21,673,071 UART: [art] Store priv key in slot 0x5
24,135,700 UART: [art] Derive Key Pair - Done
24,148,636 UART: [art] Signing Cert with AUTHO
24,149,945 UART: RITY.KEYID = 7
25,861,563 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,062 UART: [art] PUB.X = 3AA796DECF65A8207D463B6F4A638F49BDE58D3489347E9C7D2379A32143211A67B38BDCCFE3260F94FC685887DCF7D4
25,870,630 UART: [art] PUB.Y = B93728F483B8D66D7DF3FB7DA3C8ECD3785E9C326E6577FA23C9AA2266730AFAB28EFF57D65D7E7AE7FF14ABA8488D50
25,877,632 UART: [art] SIG.R = 10E8C542874A3BD580DE3DB05B4BEAC35C7281E8070729469CE5168C1BCF9F285A2EFE6DB4019CAA77EAF06A0187930E
25,885,019 UART: [art] SIG.S = 3895B27EFC215ECF5A1093BE92613ED291EE9D951D16C2C70F20816C4F9C898533EC9638DB1448E58F3263A573AC3B78
26,864,258 UART: Caliptra RT
26,864,950 UART: [state] CFI Enabled
27,029,041 UART: [rt] RT listening for mailbox commands...
27,031,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,186,751 UART: [rt]cmd =0x41544d4e, len=14344
31,980,800 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
192,658 UART:
193,003 UART: Running Caliptra ROM ...
194,198 UART:
194,356 UART: [state] CFI Enabled
266,019 UART: [state] LifecycleState = Unprovisioned
268,419 UART: [state] DebugLocked = No
270,524 UART: [state] WD Timer not started. Device not locked for debugging
274,829 UART: [kat] SHA2-256
464,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,494 UART: [kat] ++
475,978 UART: [kat] sha1
486,996 UART: [kat] SHA2-256
490,017 UART: [kat] SHA2-384
497,010 UART: [kat] SHA2-512-ACC
499,597 UART: [kat] ECC-384
2,947,701 UART: [kat] HMAC-384Kdf
2,972,224 UART: [kat] LMS
3,503,981 UART: [kat] --
3,508,577 UART: [cold-reset] ++
3,509,695 UART: [fht] FHT @ 0x50003400
3,520,491 UART: [idev] ++
3,521,204 UART: [idev] CDI.KEYID = 6
3,522,113 UART: [idev] SUBJECT.KEYID = 7
3,523,360 UART: [idev] UDS.KEYID = 0
3,524,301 ready_for_fw is high
3,524,517 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,461 UART: [idev] Erasing UDS.KEYID = 0
6,028,919 UART: [idev] Sha1 KeyId Algorithm
6,052,043 UART: [idev] --
6,055,934 UART: [ldev] ++
6,056,675 UART: [ldev] CDI.KEYID = 6
6,057,592 UART: [ldev] SUBJECT.KEYID = 5
6,058,751 UART: [ldev] AUTHORITY.KEYID = 7
6,059,981 UART: [ldev] FE.KEYID = 1
6,101,173 UART: [ldev] Erasing FE.KEYID = 1
8,608,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,351 UART: [ldev] --
10,413,905 UART: [fwproc] Wait for Commands...
10,415,732 UART: [fwproc] Recv command 0x46574c44
10,417,985 UART: [fwproc] Recv'd Img size: 114360 bytes
15,040,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,124,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,240,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,783,717 >>> mbox cmd response: success
15,788,036 UART: [afmc] ++
15,788,700 UART: [afmc] CDI.KEYID = 6
15,789,945 UART: [afmc] SUBJECT.KEYID = 7
15,791,389 UART: [afmc] AUTHORITY.KEYID = 5
18,321,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,043,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,045,509 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,060,625 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,075,833 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,090,653 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,114,218 UART: [afmc] --
20,117,436 UART: [cold-reset] --
20,120,231 UART: [state] Locking Datavault
20,126,087 UART: [state] Locking PCR0, PCR1 and PCR31
20,128,243 UART: [state] Locking ICCM
20,130,341 UART: [exit] Launching FMC @ 0x40000130
20,139,023 UART:
20,139,267 UART: Running Caliptra FMC ...
20,140,375 UART:
20,140,544 UART: [state] CFI Enabled
20,203,291 UART: [fht] FMC Alias Private Key: 7
21,967,943 UART: [art] Extend RT PCRs Done
21,969,145 UART: [art] Lock RT PCRs Done
21,971,086 UART: [art] Populate DV Done
21,976,554 UART: [fht] FMC Alias Private Key: 7
21,978,221 UART: [art] Derive CDI
21,979,040 UART: [art] Store in in slot 0x4
22,036,201 UART: [art] Derive Key Pair
22,037,266 UART: [art] Store priv key in slot 0x5
24,500,357 UART: [art] Derive Key Pair - Done
24,513,190 UART: [art] Signing Cert with AUTHO
24,514,497 UART: RITY.KEYID = 7
26,226,065 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,570 UART: [art] PUB.X = E12F5C6B0B8A05EF75F3FC948691027B6CBCCBAA5C10AD4FC8DF0185774A55BA0FEF43EB5747CF322477F478472C510A
26,234,851 UART: [art] PUB.Y = 23AAD656E69F16E316E21551DAFA7BBC4CCC3D74167172790B36E014AF142A2EE9BDB574B53708FDD37A4760C9DF76B3
26,242,142 UART: [art] SIG.R = 2186DCA432E1C276A63E79F851963E64754C2D3CC09B8F3315B3DF3720D08A292FAC772AD5AA03FED8EA1A35A8E88B29
26,249,518 UART: [art] SIG.S = 42FF88FB877646020AB27AABD58F4DF4F5239E9455F9C7F426E852B743460C91303269EA2B37194A9AE1919E246520B1
27,228,785 UART: Caliptra RT
27,229,476 UART: [state] CFI Enabled
27,405,030 UART: [rt] RT listening for mailbox commands...
27,407,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,562,781 UART: [rt]cmd =0x41544d4e, len=14344
32,362,849 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
3,438,095 ready_for_fw is high
3,438,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,872,673 >>> mbox cmd response: success
20,155,513 UART:
20,155,904 UART: Running Caliptra FMC ...
20,157,110 UART:
20,157,281 UART: [state] CFI Enabled
20,220,992 UART: [fht] FMC Alias Private Key: 7
21,985,007 UART: [art] Extend RT PCRs Done
21,986,235 UART: [art] Lock RT PCRs Done
21,987,754 UART: [art] Populate DV Done
21,993,087 UART: [fht] FMC Alias Private Key: 7
21,994,629 UART: [art] Derive CDI
21,995,445 UART: [art] Store in in slot 0x4
22,053,955 UART: [art] Derive Key Pair
22,055,005 UART: [art] Store priv key in slot 0x5
24,517,738 UART: [art] Derive Key Pair - Done
24,530,574 UART: [art] Signing Cert with AUTHO
24,531,886 UART: RITY.KEYID = 7
26,243,159 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,662 UART: [art] PUB.X = 7730866A8981CE945AF4778FE3790DC6AAF6574EA707E24A9BF92A5B3015BB7B222991D66B9607E44B3223E85B64767D
26,251,928 UART: [art] PUB.Y = 5221A04361966B310596E17F8605855BF502F01ED7FEB60C6DF77B92E827F588FDA45B053772DC080C0A4A9C014DFE60
26,259,153 UART: [art] SIG.R = EDB39C6F572DABBF1B917AD5DA18C0DDE75C8A196F6C199364706BBB2DAFD22418B8C8AE1D4E3ED7E1312C8DB003C9E4
26,266,625 UART: [art] SIG.S = FED61517392EEF0F0D6706A7E74A4C532CF1106DEF745F6E86A05E2C88F9CE87118693566467805663EE7EAF4FB1D1CE
27,245,687 UART: Caliptra RT
27,246,375 UART: [state] CFI Enabled
27,411,478 UART: [rt] RT listening for mailbox commands...
27,413,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,569,008 UART: [rt]cmd =0x41544d4e, len=14344
32,351,786 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,389 UART:
192,732 UART: Running Caliptra ROM ...
193,923 UART:
603,717 UART: [state] CFI Enabled
615,616 UART: [state] LifecycleState = Unprovisioned
617,974 UART: [state] DebugLocked = No
619,360 UART: [state] WD Timer not started. Device not locked for debugging
623,444 UART: [kat] SHA2-256
813,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,122 UART: [kat] ++
824,651 UART: [kat] sha1
835,875 UART: [kat] SHA2-256
838,878 UART: [kat] SHA2-384
844,513 UART: [kat] SHA2-512-ACC
847,096 UART: [kat] ECC-384
3,287,872 UART: [kat] HMAC-384Kdf
3,300,956 UART: [kat] LMS
3,832,800 UART: [kat] --
3,836,665 UART: [cold-reset] ++
3,839,305 UART: [fht] FHT @ 0x50003400
3,852,425 UART: [idev] ++
3,853,127 UART: [idev] CDI.KEYID = 6
3,854,078 UART: [idev] SUBJECT.KEYID = 7
3,855,321 UART: [idev] UDS.KEYID = 0
3,856,217 ready_for_fw is high
3,856,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,010 UART: [idev] Erasing UDS.KEYID = 0
6,337,070 UART: [idev] Sha1 KeyId Algorithm
6,357,973 UART: [idev] --
6,363,258 UART: [ldev] ++
6,363,932 UART: [ldev] CDI.KEYID = 6
6,364,861 UART: [ldev] SUBJECT.KEYID = 5
6,366,065 UART: [ldev] AUTHORITY.KEYID = 7
6,367,194 UART: [ldev] FE.KEYID = 1
6,379,933 UART: [ldev] Erasing FE.KEYID = 1
8,856,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,376 UART: [ldev] --
10,645,215 UART: [fwproc] Wait for Commands...
10,647,629 UART: [fwproc] Recv command 0x46574c44
10,649,929 UART: [fwproc] Recv'd Img size: 114360 bytes
15,293,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,371,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,487,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,029,903 >>> mbox cmd response: success
16,033,516 UART: [afmc] ++
16,034,279 UART: [afmc] CDI.KEYID = 6
16,035,465 UART: [afmc] SUBJECT.KEYID = 7
16,036,895 UART: [afmc] AUTHORITY.KEYID = 5
18,540,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,261,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,263,770 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,278,835 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,294,078 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,308,927 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,332,975 UART: [afmc] --
20,335,825 UART: [cold-reset] --
20,340,445 UART: [state] Locking Datavault
20,344,505 UART: [state] Locking PCR0, PCR1 and PCR31
20,346,696 UART: [state] Locking ICCM
20,347,816 UART: [exit] Launching FMC @ 0x40000130
20,356,493 UART:
20,356,737 UART: Running Caliptra FMC ...
20,357,787 UART:
20,357,935 UART: [state] CFI Enabled
20,365,921 UART: [fht] FMC Alias Private Key: 7
22,122,231 UART: [art] Extend RT PCRs Done
22,123,456 UART: [art] Lock RT PCRs Done
22,124,942 UART: [art] Populate DV Done
22,130,245 UART: [fht] FMC Alias Private Key: 7
22,131,781 UART: [art] Derive CDI
22,132,539 UART: [art] Store in in slot 0x4
22,175,347 UART: [art] Derive Key Pair
22,176,388 UART: [art] Store priv key in slot 0x5
24,603,424 UART: [art] Derive Key Pair - Done
24,616,415 UART: [art] Signing Cert with AUTHO
24,617,712 UART: RITY.KEYID = 7
26,323,144 UART: [art] Erasing AUTHORITY.KEYID = 7
26,324,647 UART: [art] PUB.X = 05F3E61007915E87A5CE1B87901BC6F2D4148FE92461C88A11AE064C27F5F0E6875419F1B8DAA206E9559AA30D9AEE3E
26,331,895 UART: [art] PUB.Y = E222983F36CB43362DEBC9FC2987C96521260FCD6F7114B536FFC3D0A092D9D5752718B264B606BF702061961A886C4E
26,339,182 UART: [art] SIG.R = 9B94D2105AF35AB6699083B5043D8C733D17CACEE45D556F971B0B3F6B17D5C1239C899CB3B31865D42635331B3644E9
26,346,548 UART: [art] SIG.S = 9A5E73A31ADEAB3BEA9960696CDB348E2BD6F1C958DE81028F733E236783314A24780BA8B5A4A192BCDB4198198F5F64
27,325,719 UART: Caliptra RT
27,326,405 UART: [state] CFI Enabled
27,443,415 UART: [rt] RT listening for mailbox commands...
27,445,706 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,600,959 UART: [rt]cmd =0x41544d4e, len=14344
32,396,604 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,755,280 ready_for_fw is high
3,755,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,043,458 >>> mbox cmd response: success
20,300,783 UART:
20,301,176 UART: Running Caliptra FMC ...
20,302,379 UART:
20,302,551 UART: [state] CFI Enabled
20,310,625 UART: [fht] FMC Alias Private Key: 7
22,067,740 UART: [art] Extend RT PCRs Done
22,068,962 UART: [art] Lock RT PCRs Done
22,070,535 UART: [art] Populate DV Done
22,076,027 UART: [fht] FMC Alias Private Key: 7
22,077,513 UART: [art] Derive CDI
22,078,272 UART: [art] Store in in slot 0x4
22,120,755 UART: [art] Derive Key Pair
22,121,767 UART: [art] Store priv key in slot 0x5
24,548,858 UART: [art] Derive Key Pair - Done
24,561,855 UART: [art] Signing Cert with AUTHO
24,563,155 UART: RITY.KEYID = 7
26,268,993 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,502 UART: [art] PUB.X = 5CA595DEB41A4D8C3D72B930B96DA581D08BDDE1AD3061EBBFD7762B594DC0DF103127FE5F8678979561999FB311BAE9
26,277,769 UART: [art] PUB.Y = 59ADD09A4B1D2F489E7E430093F2981DF8DE678926BC9B59EFA6F3C1DFC807FB479B5EBA0B0F0DD0F8DE7EA9CED2265B
26,285,055 UART: [art] SIG.R = 6C6D658F3ED4131134A62D9C3DCAA5E6818F1A42B1BC9B365318F90D066AFE2512307A56D04F90F511ABA4C2A5E49ABE
26,292,406 UART: [art] SIG.S = 2DD1C12C4E6F2C4BB2C94977CFE25260B01A2F4637145B50D2D280CD345B8061DE2172313BC55FE867196FB1910BEB0B
27,271,346 UART: Caliptra RT
27,272,032 UART: [state] CFI Enabled
27,390,334 UART: [rt] RT listening for mailbox commands...
27,392,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,001 UART: [rt]cmd =0x41544d4e, len=14344
32,341,318 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,616 UART: [state] LifecycleState = Unprovisioned
86,271 UART: [state] DebugLocked = No
86,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,563 UART: [kat] SHA2-256
882,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,609 UART: [kat] ++
886,761 UART: [kat] sha1
890,847 UART: [kat] SHA2-256
892,785 UART: [kat] SHA2-384
895,452 UART: [kat] SHA2-512-ACC
897,353 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
907,064 UART: [kat] LMS
1,475,260 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,620 UART: [idev] ++
1,479,788 UART: [idev] CDI.KEYID = 6
1,480,148 UART: [idev] SUBJECT.KEYID = 7
1,480,572 UART: [idev] UDS.KEYID = 0
1,480,917 ready_for_fw is high
1,480,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,786 UART: [idev] --
1,514,739 UART: [ldev] ++
1,514,907 UART: [ldev] CDI.KEYID = 6
1,515,270 UART: [ldev] SUBJECT.KEYID = 5
1,515,696 UART: [ldev] AUTHORITY.KEYID = 7
1,516,159 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,646 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,992 UART: [fwproc] Received command 0x46574c44
1,587,783 UART: [fwproc] Received Image of size 114360 bytes
5,197,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,224,891 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,254,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,390,274 >>> mbox cmd response: success
5,391,298 UART: [afmc] ++
5,391,466 UART: [afmc] CDI.KEYID = 6
5,391,828 UART: [afmc] SUBJECT.KEYID = 7
5,392,253 UART: [afmc] AUTHORITY.KEYID = 5
5,427,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,443,467 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,444,247 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,449,956 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,455,848 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,461,549 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,469,609 UART: [afmc] --
5,470,535 UART: [cold-reset] --
5,471,363 UART: [state] Locking Datavault
5,472,574 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,178 UART: [state] Locking ICCM
5,473,808 UART: [exit] Launching FMC @ 0x40000130
5,479,137 UART:
5,479,153 UART: Running Caliptra FMC ...
5,479,561 UART:
5,479,615 UART: [state] CFI Enabled
5,490,019 UART: [fht] FMC Alias Private Key: 7
5,597,839 UART: [art] Extend RT PCRs Done
5,598,267 UART: [art] Lock RT PCRs Done
5,599,771 UART: [art] Populate DV Done
5,608,209 UART: [fht] FMC Alias Private Key: 7
5,609,373 UART: [art] Derive CDI
5,609,653 UART: [art] Store in in slot 0x4
5,695,304 UART: [art] Derive Key Pair
5,695,664 UART: [art] Store priv key in slot 0x5
5,708,258 UART: [art] Derive Key Pair - Done
5,722,942 UART: [art] Signing Cert with AUTHO
5,723,422 UART: RITY.KEYID = 7
5,738,720 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,485 UART: [art] PUB.X = 3B6AF2F08899C9CFAA76C26697F27EBB0D8D45CC72F5B683114ABE21F2A42AFA8A284893AE32C277361EAF5E92EFF101
5,746,265 UART: [art] PUB.Y = 36E74F7EF61C95C8919212DD5AC4DCE1E600A4060846CE0155BAD9216D2D9D5A743C715753CD7E56282C7DD56F9DB8E8
5,753,192 UART: [art] SIG.R = 0CE70361B9B445E2FE9D1A9BBEF72FA8095351314995E804030937C5732A22FE5837555CCDF78E2FE272B8D76C5C1D3D
5,759,948 UART: [art] SIG.S = DF6E81BEC37AA22E771F7DFC8CE93B1C5928E1099457F089EB6D8F6AB160C2F9647E65D59D22184F88D2A9EFA9F898E8
5,783,874 UART: Caliptra RT
5,784,128 UART: [state] CFI Enabled
5,892,644 UART: [rt] RT listening for mailbox commands...
5,893,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,007 UART: [rt]cmd =0x41544d4e, len=14344
7,256,210 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,309 ready_for_fw is high
1,363,309 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,504,493 >>> mbox cmd response: success
5,566,670 UART:
5,566,686 UART: Running Caliptra FMC ...
5,567,094 UART:
5,567,148 UART: [state] CFI Enabled
5,577,858 UART: [fht] FMC Alias Private Key: 7
5,685,818 UART: [art] Extend RT PCRs Done
5,686,246 UART: [art] Lock RT PCRs Done
5,687,766 UART: [art] Populate DV Done
5,695,992 UART: [fht] FMC Alias Private Key: 7
5,697,094 UART: [art] Derive CDI
5,697,374 UART: [art] Store in in slot 0x4
5,782,861 UART: [art] Derive Key Pair
5,783,221 UART: [art] Store priv key in slot 0x5
5,796,803 UART: [art] Derive Key Pair - Done
5,811,572 UART: [art] Signing Cert with AUTHO
5,812,052 UART: RITY.KEYID = 7
5,827,206 UART: [art] Erasing AUTHORITY.KEYID = 7
5,827,971 UART: [art] PUB.X = 1F1F934CB1BBF27173B9CB14CF9355E1E8F05C8D73E0BEE3BCFA725604FB923DB4F6519223AA996C2D7E561497572029
5,834,746 UART: [art] PUB.Y = DC1E3A5F36EF625C73C51152A353013C084EA5744B7135950F58534DA3290288EA12ABFAE2E80179EEF6CC886329A9E2
5,841,683 UART: [art] SIG.R = 3C103F5EFE0D41ADFADF4769D0B077B91F56AEB00D98723D96669BA50E4CAA89B8D3F2E9CC5ED59D3EE7957A063790CE
5,848,461 UART: [art] SIG.S = EE7D92D99DEC75339E88E0C5FC7956A73CE89D9176EF5234196C73B3BB92FF7A470B3DC2E7EBC96B084F3D1A36A226B1
5,871,910 UART: Caliptra RT
5,872,164 UART: [state] CFI Enabled
5,981,166 UART: [rt] RT listening for mailbox commands...
5,981,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,104,385 UART: [rt]cmd =0x41544d4e, len=14344
7,332,149 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,746 UART: [kat] SHA2-256
892,684 UART: [kat] SHA2-384
895,375 UART: [kat] SHA2-512-ACC
897,276 UART: [kat] ECC-384
903,243 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,476,990 UART: [cold-reset] ++
1,477,540 UART: [fht] Storing FHT @ 0x50003400
1,480,395 UART: [idev] ++
1,480,563 UART: [idev] CDI.KEYID = 6
1,480,923 UART: [idev] SUBJECT.KEYID = 7
1,481,347 UART: [idev] UDS.KEYID = 0
1,481,692 ready_for_fw is high
1,481,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,439 UART: [idev] Erasing UDS.KEYID = 0
1,506,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,041 UART: [idev] --
1,516,154 UART: [ldev] ++
1,516,322 UART: [ldev] CDI.KEYID = 6
1,516,685 UART: [ldev] SUBJECT.KEYID = 5
1,517,111 UART: [ldev] AUTHORITY.KEYID = 7
1,517,574 UART: [ldev] FE.KEYID = 1
1,522,918 UART: [ldev] Erasing FE.KEYID = 1
1,548,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,370 UART: [fwproc] Waiting for Commands...
1,588,075 UART: [fwproc] Received command 0x46574c44
1,588,866 UART: [fwproc] Received Image of size 114360 bytes
5,158,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,185,917 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,215,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,351,124 >>> mbox cmd response: success
5,352,230 UART: [afmc] ++
5,352,398 UART: [afmc] CDI.KEYID = 6
5,352,760 UART: [afmc] SUBJECT.KEYID = 7
5,353,185 UART: [afmc] AUTHORITY.KEYID = 5
5,388,537 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,881 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,661 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,370 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,262 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,963 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,719 UART: [afmc] --
5,431,763 UART: [cold-reset] --
5,432,651 UART: [state] Locking Datavault
5,433,878 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,482 UART: [state] Locking ICCM
5,434,944 UART: [exit] Launching FMC @ 0x40000130
5,440,273 UART:
5,440,289 UART: Running Caliptra FMC ...
5,440,697 UART:
5,440,840 UART: [state] CFI Enabled
5,451,668 UART: [fht] FMC Alias Private Key: 7
5,560,064 UART: [art] Extend RT PCRs Done
5,560,492 UART: [art] Lock RT PCRs Done
5,562,102 UART: [art] Populate DV Done
5,570,316 UART: [fht] FMC Alias Private Key: 7
5,571,326 UART: [art] Derive CDI
5,571,606 UART: [art] Store in in slot 0x4
5,657,263 UART: [art] Derive Key Pair
5,657,623 UART: [art] Store priv key in slot 0x5
5,671,437 UART: [art] Derive Key Pair - Done
5,686,333 UART: [art] Signing Cert with AUTHO
5,686,813 UART: RITY.KEYID = 7
5,701,989 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,754 UART: [art] PUB.X = 1B9DD6EDB7564BC41F5E6B0C5909FC375A890AFA483724085FF76733955CC65DA255D8EEF19F8E715A0392C5283B20F9
5,709,515 UART: [art] PUB.Y = D6E613993A93A32BEEDF5A3826F0ED6B198589D4E7C50246837EDE12D1231087FB2413A0F5463EB015B3396F50A481C5
5,716,462 UART: [art] SIG.R = AFED00DE00C18C66AB075FF3B113920D0FC1263C1C10E9C942842D1ABEE2A81F36282B984089B0A04DFD6EDED6DA5301
5,723,192 UART: [art] SIG.S = D0C9390CD408F840A37A768AD07D3250FF3826C548C7188E5D65A3245E4DBD3E55A5B80224DEBA76CCAFA58E9DD3C513
5,747,274 UART: Caliptra RT
5,747,620 UART: [state] CFI Enabled
5,855,651 UART: [rt] RT listening for mailbox commands...
5,856,321 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,014 UART: [rt]cmd =0x41544d4e, len=14344
7,216,926 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,010 ready_for_fw is high
1,363,010 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,239,125 >>> mbox cmd response: success
5,300,536 UART:
5,300,552 UART: Running Caliptra FMC ...
5,300,960 UART:
5,301,103 UART: [state] CFI Enabled
5,311,591 UART: [fht] FMC Alias Private Key: 7
5,418,659 UART: [art] Extend RT PCRs Done
5,419,087 UART: [art] Lock RT PCRs Done
5,420,859 UART: [art] Populate DV Done
5,429,051 UART: [fht] FMC Alias Private Key: 7
5,430,039 UART: [art] Derive CDI
5,430,319 UART: [art] Store in in slot 0x4
5,515,960 UART: [art] Derive Key Pair
5,516,320 UART: [art] Store priv key in slot 0x5
5,529,748 UART: [art] Derive Key Pair - Done
5,544,591 UART: [art] Signing Cert with AUTHO
5,545,071 UART: RITY.KEYID = 7
5,560,041 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,806 UART: [art] PUB.X = E783C57F6135C65223419CBFC0F66E23277D81867AE199C5303C42CE01CB9C8E02DBD3C748819A3B46205300A06986EE
5,567,546 UART: [art] PUB.Y = EEF733FA48AB88DE69AE4717D579803247C624A4266915E02242A733F19A91189F7F3679C9129605A8466D463110F277
5,574,479 UART: [art] SIG.R = 6E79D860F9C1E5253C36682BD772525DE00DF5D57E38347DD49E90500CB147B5087C629310D7EB0AD5E7CF7F56A4758A
5,581,239 UART: [art] SIG.S = 5B7310CD59447BD6E4810E68C3E21CAD563A19F5470F5B9EAA9311CD6CAEF77B88EE7FB7AEBD271DA06563E1A6FDBFC5
5,604,864 UART: Caliptra RT
5,605,210 UART: [state] CFI Enabled
5,713,815 UART: [rt] RT listening for mailbox commands...
5,714,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,188 UART: [rt]cmd =0x41544d4e, len=14344
7,086,977 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
902,239 UART: [kat] SHA2-256
904,179 UART: [kat] SHA2-384
907,126 UART: [kat] SHA2-512-ACC
909,027 UART: [kat] ECC-384
918,510 UART: [kat] HMAC-384Kdf
923,218 UART: [kat] LMS
1,171,546 UART: [kat] --
1,172,425 UART: [cold-reset] ++
1,172,953 UART: [fht] FHT @ 0x50003400
1,175,656 UART: [idev] ++
1,175,824 UART: [idev] CDI.KEYID = 6
1,176,184 UART: [idev] SUBJECT.KEYID = 7
1,176,608 UART: [idev] UDS.KEYID = 0
1,176,953 ready_for_fw is high
1,176,953 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,352 UART: [idev] Erasing UDS.KEYID = 0
1,201,485 UART: [idev] Sha1 KeyId Algorithm
1,210,099 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,745 UART: [ldev] Erasing FE.KEYID = 1
1,243,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,117 UART: [ldev] --
1,283,610 UART: [fwproc] Wait for Commands...
1,284,354 UART: [fwproc] Recv command 0x46574c44
1,285,082 UART: [fwproc] Recv'd Img size: 114360 bytes
3,137,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,165,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,194,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,330,578 >>> mbox cmd response: success
3,331,754 UART: [afmc] ++
3,331,922 UART: [afmc] CDI.KEYID = 6
3,332,284 UART: [afmc] SUBJECT.KEYID = 7
3,332,709 UART: [afmc] AUTHORITY.KEYID = 5
3,368,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,682 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,391,391 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,397,283 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,402,994 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,410,861 UART: [afmc] --
3,411,791 UART: [cold-reset] --
3,412,777 UART: [state] Locking Datavault
3,413,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,290 UART: [state] Locking ICCM
3,414,800 UART: [exit] Launching FMC @ 0x40000130
3,420,129 UART:
3,420,145 UART: Running Caliptra FMC ...
3,420,553 UART:
3,420,607 UART: [state] CFI Enabled
3,430,995 UART: [fht] FMC Alias Private Key: 7
3,538,293 UART: [art] Extend RT PCRs Done
3,538,721 UART: [art] Lock RT PCRs Done
3,540,421 UART: [art] Populate DV Done
3,548,475 UART: [fht] FMC Alias Private Key: 7
3,549,567 UART: [art] Derive CDI
3,549,847 UART: [art] Store in in slot 0x4
3,635,016 UART: [art] Derive Key Pair
3,635,376 UART: [art] Store priv key in slot 0x5
3,648,470 UART: [art] Derive Key Pair - Done
3,663,349 UART: [art] Signing Cert with AUTHO
3,663,829 UART: RITY.KEYID = 7
3,678,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,676 UART: [art] PUB.X = 807B30943C58B8C36F76E4911183E53D9756DED8D1050E9C0635D8477E8136E9A8503D2FF5AD87969FAA3CF7BAB38CEF
3,686,443 UART: [art] PUB.Y = F3FFAF99BDA3CB7F0ECF8EF77BC2B2E95D434A63B5D1235A338D20C5715E65CAC4893324FF5E83F7EDC48A9F2950D74A
3,693,412 UART: [art] SIG.R = 2AF7F5E9E01C5FF89E31A5234AD0411C0AF2C6CE42D5F02F54BD964293E6D4AFBEE57A4FF37B59117EB6059AAEFDC67B
3,700,200 UART: [art] SIG.S = DB45B9319820C50218A5CD6F400F5F0F2DD5DFBC0B0F6C46E53DE4AD7AB8C40D2E07A7A867870FE5DBA8AF0DD102963B
3,724,017 UART: Caliptra RT
3,724,271 UART: [state] CFI Enabled
3,832,554 UART: [rt] RT listening for mailbox commands...
3,833,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,787 UART: [rt]cmd =0x41544d4e, len=14344
5,200,886 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 ready_for_fw is high
1,059,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,234 >>> mbox cmd response: success
3,237,243 UART:
3,237,259 UART: Running Caliptra FMC ...
3,237,667 UART:
3,237,721 UART: [state] CFI Enabled
3,248,001 UART: [fht] FMC Alias Private Key: 7
3,355,763 UART: [art] Extend RT PCRs Done
3,356,191 UART: [art] Lock RT PCRs Done
3,357,729 UART: [art] Populate DV Done
3,365,819 UART: [fht] FMC Alias Private Key: 7
3,366,747 UART: [art] Derive CDI
3,367,027 UART: [art] Store in in slot 0x4
3,452,694 UART: [art] Derive Key Pair
3,453,054 UART: [art] Store priv key in slot 0x5
3,465,814 UART: [art] Derive Key Pair - Done
3,480,758 UART: [art] Signing Cert with AUTHO
3,481,238 UART: RITY.KEYID = 7
3,496,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,451 UART: [art] PUB.X = E83B84A547B67D9C080EE2240634AF40B84BF70F2221DD340B75558A5EB17F3408D0695DA1CAEC9446CEE248C9B231A8
3,504,209 UART: [art] PUB.Y = 9E6C56E85AF0CE61B60AEFE097FC8AB5A43E346014027CE785779782EF86C42A2E547A07BDB05C09DC57E34DCA0FD155
3,511,158 UART: [art] SIG.R = 4B7509B27773DD65D8E643B33BE97DB2E8E0C673264A6A358C585AB31DF3F7FD4FFBE8961D43BE130F5EAC9B2FA2283D
3,517,938 UART: [art] SIG.S = D325B850CF57856512E6EEDEA1A3D1A273B65FF0BA507A6B9DCA4B2698A1EC1D8BCF86ABC5E98D4095124760FF89A8DE
3,541,701 UART: Caliptra RT
3,541,955 UART: [state] CFI Enabled
3,649,558 UART: [rt] RT listening for mailbox commands...
3,650,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,985 UART: [rt]cmd =0x41544d4e, len=14344
5,008,324 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
893,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,972 UART: [kat] ++
898,124 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,753 UART: [idev] ++
1,175,921 UART: [idev] CDI.KEYID = 6
1,176,281 UART: [idev] SUBJECT.KEYID = 7
1,176,705 UART: [idev] UDS.KEYID = 0
1,177,050 ready_for_fw is high
1,177,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,202,190 UART: [idev] Sha1 KeyId Algorithm
1,210,716 UART: [idev] --
1,211,774 UART: [ldev] ++
1,211,942 UART: [ldev] CDI.KEYID = 6
1,212,305 UART: [ldev] SUBJECT.KEYID = 5
1,212,731 UART: [ldev] AUTHORITY.KEYID = 7
1,213,194 UART: [ldev] FE.KEYID = 1
1,218,526 UART: [ldev] Erasing FE.KEYID = 1
1,245,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,744 UART: [ldev] --
1,284,225 UART: [fwproc] Wait for Commands...
1,284,893 UART: [fwproc] Recv command 0x46574c44
1,285,621 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,339 >>> mbox cmd response: success
3,317,555 UART: [afmc] ++
3,317,723 UART: [afmc] CDI.KEYID = 6
3,318,085 UART: [afmc] SUBJECT.KEYID = 7
3,318,510 UART: [afmc] AUTHORITY.KEYID = 5
3,354,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,415 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,124 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,016 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,727 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,360 UART: [afmc] --
3,397,362 UART: [cold-reset] --
3,398,246 UART: [state] Locking Datavault
3,399,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,887 UART: [state] Locking ICCM
3,400,355 UART: [exit] Launching FMC @ 0x40000130
3,405,684 UART:
3,405,700 UART: Running Caliptra FMC ...
3,406,108 UART:
3,406,251 UART: [state] CFI Enabled
3,416,665 UART: [fht] FMC Alias Private Key: 7
3,524,535 UART: [art] Extend RT PCRs Done
3,524,963 UART: [art] Lock RT PCRs Done
3,526,919 UART: [art] Populate DV Done
3,535,137 UART: [fht] FMC Alias Private Key: 7
3,536,271 UART: [art] Derive CDI
3,536,551 UART: [art] Store in in slot 0x4
3,622,488 UART: [art] Derive Key Pair
3,622,848 UART: [art] Store priv key in slot 0x5
3,636,184 UART: [art] Derive Key Pair - Done
3,650,851 UART: [art] Signing Cert with AUTHO
3,651,331 UART: RITY.KEYID = 7
3,666,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,672 UART: [art] PUB.X = 43CCEFECDA09BF6F59EA107A32D4B6F1705D73934E5A85EBAB6CC82ECC91A9433C729F2D739CE38608C6A7F4A6F6993E
3,674,456 UART: [art] PUB.Y = E9C87A6AEF5FDFDB325C45427E02E09CEEB1458281C39D7342AF43956BCA022DABD63096C74CC65AE14E8B9D194DE708
3,681,413 UART: [art] SIG.R = EEAE21C361EE1973E889CFB8C96803905B573E93478F6CB1B6F186AFF8C324E633F3F27A6A6D6F919FF93934A18A7CAC
3,688,192 UART: [art] SIG.S = AE6ADE7ECADD21521A9F1791797F65215A77B0C8276493509539A1F6E0B87EB1644E0E08727793AEEE08FD68C3FE520C
3,712,775 UART: Caliptra RT
3,713,121 UART: [state] CFI Enabled
3,820,097 UART: [rt] RT listening for mailbox commands...
3,820,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,588 UART: [rt]cmd =0x41544d4e, len=14344
5,171,036 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 ready_for_fw is high
1,060,670 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,157,064 >>> mbox cmd response: success
3,218,479 UART:
3,218,495 UART: Running Caliptra FMC ...
3,218,903 UART:
3,219,046 UART: [state] CFI Enabled
3,229,728 UART: [fht] FMC Alias Private Key: 7
3,337,836 UART: [art] Extend RT PCRs Done
3,338,264 UART: [art] Lock RT PCRs Done
3,339,802 UART: [art] Populate DV Done
3,347,914 UART: [fht] FMC Alias Private Key: 7
3,348,976 UART: [art] Derive CDI
3,349,256 UART: [art] Store in in slot 0x4
3,434,785 UART: [art] Derive Key Pair
3,435,145 UART: [art] Store priv key in slot 0x5
3,449,041 UART: [art] Derive Key Pair - Done
3,464,268 UART: [art] Signing Cert with AUTHO
3,464,748 UART: RITY.KEYID = 7
3,479,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,529 UART: [art] PUB.X = F30B094548956D6C6A4C7159A1CB1D19D4072E99C916DECF3EC52E49A6AAD4C5A3B69691679814EF7AD34AC098D41620
3,487,296 UART: [art] PUB.Y = 24B73D803A84ECAA7E10340AF449844D11A95871CDA3575C381A870287BF809467547923C5AB2C853E173C24564FE43D
3,494,234 UART: [art] SIG.R = 1FC0FD48B1AB9EA81BF41EB72F67B54816E411360134314B35115523DF149E1B4E7637F14F6948FB8E03EAD5B8AC4A60
3,501,004 UART: [art] SIG.S = 90B1411FDEBFF61E09AB24051CD7B2728E98258106C7BC490D843FEB831B92009FD586232CD69E368B69398D27EC016B
3,524,676 UART: Caliptra RT
3,525,022 UART: [state] CFI Enabled
3,633,135 UART: [rt] RT listening for mailbox commands...
3,633,805 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,418 UART: [rt]cmd =0x41544d4e, len=14344
4,986,599 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,174,499 ready_for_fw is high
1,174,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,520 UART: [ldev] ++
1,208,688 UART: [ldev] CDI.KEYID = 6
1,209,052 UART: [ldev] SUBJECT.KEYID = 5
1,209,479 UART: [ldev] AUTHORITY.KEYID = 7
1,209,942 UART: [ldev] FE.KEYID = 1
1,215,116 UART: [ldev] Erasing FE.KEYID = 1
1,241,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,026 UART: [fwproc] Wait for Commands...
1,280,689 UART: [fwproc] Recv command 0x46574c44
1,281,422 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,731 >>> mbox cmd response: success
3,317,860 UART: [afmc] ++
3,318,028 UART: [afmc] CDI.KEYID = 6
3,318,391 UART: [afmc] SUBJECT.KEYID = 7
3,318,817 UART: [afmc] AUTHORITY.KEYID = 5
3,354,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,804 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,514 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,404 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,115 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,935 UART: [afmc] --
3,397,899 UART: [cold-reset] --
3,398,695 UART: [state] Locking Datavault
3,399,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,522 UART: [state] Locking ICCM
3,401,122 UART: [exit] Launching FMC @ 0x40000130
3,406,451 UART:
3,406,467 UART: Running Caliptra FMC ...
3,406,875 UART:
3,406,929 UART: [state] CFI Enabled
3,417,479 UART: [fht] FMC Alias Private Key: 7
3,524,881 UART: [art] Extend RT PCRs Done
3,525,309 UART: [art] Lock RT PCRs Done
3,526,533 UART: [art] Populate DV Done
3,534,739 UART: [fht] FMC Alias Private Key: 7
3,535,681 UART: [art] Derive CDI
3,535,961 UART: [art] Store in in slot 0x4
3,621,778 UART: [art] Derive Key Pair
3,622,138 UART: [art] Store priv key in slot 0x5
3,635,438 UART: [art] Derive Key Pair - Done
3,650,125 UART: [art] Signing Cert with AUTHO
3,650,605 UART: RITY.KEYID = 7
3,666,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,900 UART: [art] PUB.X = 9092D12EA658E00851105A45F3C07CD4E3C3F7D2DE13D33574FCF30715F3DD0D1C27755D66AE35E96EAE9581D51A6A42
3,673,667 UART: [art] PUB.Y = 30ADD9207B76E9537A791F824DF40840FBF61530E956A9037A375E0F1BCF94F2FCD7D6FEC379BFFBFDD39BA6159A6A64
3,680,624 UART: [art] SIG.R = 47AE82CA29E120890B28493890B6A5DF8EFA9FC08C748D9C6360D87B03CD5A925E1F9084953881D7FA17B96F59886478
3,687,386 UART: [art] SIG.S = 7B3CEBE8BEF9561C13347F0E6F8B18B66326A2C478B7E497BE635234662B3D46480A828E67292FF45ED05DCF70F24FBA
3,711,023 UART: Caliptra RT
3,711,277 UART: [state] CFI Enabled
3,819,019 UART: [rt] RT listening for mailbox commands...
3,819,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,420 UART: [rt]cmd =0x41544d4e, len=14344
5,174,982 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,078 ready_for_fw is high
1,056,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,128 >>> mbox cmd response: success
3,237,087 UART:
3,237,103 UART: Running Caliptra FMC ...
3,237,511 UART:
3,237,565 UART: [state] CFI Enabled
3,247,939 UART: [fht] FMC Alias Private Key: 7
3,355,583 UART: [art] Extend RT PCRs Done
3,356,011 UART: [art] Lock RT PCRs Done
3,357,619 UART: [art] Populate DV Done
3,366,147 UART: [fht] FMC Alias Private Key: 7
3,367,263 UART: [art] Derive CDI
3,367,543 UART: [art] Store in in slot 0x4
3,452,738 UART: [art] Derive Key Pair
3,453,098 UART: [art] Store priv key in slot 0x5
3,466,470 UART: [art] Derive Key Pair - Done
3,481,231 UART: [art] Signing Cert with AUTHO
3,481,711 UART: RITY.KEYID = 7
3,496,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,572 UART: [art] PUB.X = 315EC79FDC7ED93C6F0413936C21069338A070E302DC1240B07F6C75AE9F6F863602342BF20B32A9E3AF6549726BF1B1
3,504,327 UART: [art] PUB.Y = 385FEF46012B57082F665B404AFA53D80FB6FE24BD9E682F02E286C91C6BA2F20E7CC9965916164BE58CC21A70339F66
3,511,266 UART: [art] SIG.R = 408795771E34EDCD4F757160335E56D943FC580B97100F626456459F8367014744650A66E42AA006C0EDFA53029634B7
3,518,002 UART: [art] SIG.S = 1893FB1833AE825663B1FA4AE18C372EB5BCAFE0D6C9DE255B9F6E190585B51F1352AC329CF74FE4893A786BEE8F42D3
3,541,896 UART: Caliptra RT
3,542,150 UART: [state] CFI Enabled
3,649,752 UART: [rt] RT listening for mailbox commands...
3,650,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,197 UART: [rt]cmd =0x41544d4e, len=14344
5,018,630 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,174,330 ready_for_fw is high
1,174,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,978 UART: [idev] Erasing UDS.KEYID = 0
1,198,824 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,209,091 UART: [ldev] ++
1,209,259 UART: [ldev] CDI.KEYID = 6
1,209,623 UART: [ldev] SUBJECT.KEYID = 5
1,210,050 UART: [ldev] AUTHORITY.KEYID = 7
1,210,513 UART: [ldev] FE.KEYID = 1
1,215,461 UART: [ldev] Erasing FE.KEYID = 1
1,241,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,281,918 UART: [fwproc] Recv command 0x46574c44
1,282,651 UART: [fwproc] Recv'd Img size: 114360 bytes
3,111,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,139,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,304,841 >>> mbox cmd response: success
3,305,970 UART: [afmc] ++
3,306,138 UART: [afmc] CDI.KEYID = 6
3,306,501 UART: [afmc] SUBJECT.KEYID = 7
3,306,927 UART: [afmc] AUTHORITY.KEYID = 5
3,342,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,112 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,822 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,712 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,423 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,161 UART: [afmc] --
3,386,189 UART: [cold-reset] --
3,387,011 UART: [state] Locking Datavault
3,388,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,389,022 UART: [state] Locking ICCM
3,389,472 UART: [exit] Launching FMC @ 0x40000130
3,394,801 UART:
3,394,817 UART: Running Caliptra FMC ...
3,395,225 UART:
3,395,368 UART: [state] CFI Enabled
3,406,118 UART: [fht] FMC Alias Private Key: 7
3,514,272 UART: [art] Extend RT PCRs Done
3,514,700 UART: [art] Lock RT PCRs Done
3,516,096 UART: [art] Populate DV Done
3,524,470 UART: [fht] FMC Alias Private Key: 7
3,525,410 UART: [art] Derive CDI
3,525,690 UART: [art] Store in in slot 0x4
3,611,165 UART: [art] Derive Key Pair
3,611,525 UART: [art] Store priv key in slot 0x5
3,624,493 UART: [art] Derive Key Pair - Done
3,639,632 UART: [art] Signing Cert with AUTHO
3,640,112 UART: RITY.KEYID = 7
3,655,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,211 UART: [art] PUB.X = 3D6F9704E53989D9120040BB9F6ECDBE3C862AFFC1F4A1EAFB4ADA89A223C9F6179BBF27D043636F37A2DD6A18187DB4
3,662,974 UART: [art] PUB.Y = FF50E05B4D7831F4C66F88F7EA81EFFB6D3BB6856FF0300F9C536E7F21A707E5F40B08555AE5725C9159C52814671269
3,669,914 UART: [art] SIG.R = C60E68F1FF5EA8AE309E0CA38E2B0AD3E5145D065C645423FB0C0D40C1DA662C186CB8B8C2E196108D40EC68D87FBC0B
3,676,681 UART: [art] SIG.S = B50AE668982091FA1B2E8ADEF6F25BDAB3D617A3675294F8D608649197EC570B66E80D5C3AC2ACC1322B32AE638B3367
3,700,914 UART: Caliptra RT
3,701,260 UART: [state] CFI Enabled
3,808,162 UART: [rt] RT listening for mailbox commands...
3,808,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,379 UART: [rt]cmd =0x41544d4e, len=14344
5,169,223 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,355 ready_for_fw is high
1,056,355 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,163,642 >>> mbox cmd response: success
3,225,243 UART:
3,225,259 UART: Running Caliptra FMC ...
3,225,667 UART:
3,225,810 UART: [state] CFI Enabled
3,236,260 UART: [fht] FMC Alias Private Key: 7
3,344,490 UART: [art] Extend RT PCRs Done
3,344,918 UART: [art] Lock RT PCRs Done
3,346,394 UART: [art] Populate DV Done
3,354,472 UART: [fht] FMC Alias Private Key: 7
3,355,606 UART: [art] Derive CDI
3,355,886 UART: [art] Store in in slot 0x4
3,441,319 UART: [art] Derive Key Pair
3,441,679 UART: [art] Store priv key in slot 0x5
3,454,691 UART: [art] Derive Key Pair - Done
3,469,791 UART: [art] Signing Cert with AUTHO
3,470,271 UART: RITY.KEYID = 7
3,485,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,744 UART: [art] PUB.X = 4C1898B80210C1763A7DE503E278C3088C2F24DF5D33E2BF810D903B6DE327D7C98C38C97BD218586DD93D2F9C1769EF
3,493,506 UART: [art] PUB.Y = 4F832CEF2F618BE145F296769FE10CBD116F65F4CDD1A99DED4DF927EA5231BF600D7EBEE1A0D46D35DCD1A6BB5DE06F
3,500,478 UART: [art] SIG.R = 4BDADEEBE2B4F2BE48C3D503525E39927ABD2EA830813FD127867FD0BCF3EF01A5691FA0FD7443A1F2CC592485205205
3,507,253 UART: [art] SIG.S = 36588EE5D6242A44A4225D592DFF8A941AB59C786A371CB24B5B686018A7ABEACD1B74AA3DFB077C12D518701E2A9BCB
3,531,081 UART: Caliptra RT
3,531,427 UART: [state] CFI Enabled
3,639,493 UART: [rt] RT listening for mailbox commands...
3,640,163 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,712 UART: [rt]cmd =0x41544d4e, len=14344
4,985,720 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
192,573 UART:
192,933 UART: Running Caliptra ROM ...
194,129 UART:
194,283 UART: [state] CFI Enabled
262,816 UART: [state] LifecycleState = Unprovisioned
264,714 UART: [state] DebugLocked = No
267,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,089 UART: [kat] SHA2-256
440,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,316 UART: [kat] ++
451,760 UART: [kat] sha1
463,224 UART: [kat] SHA2-256
465,930 UART: [kat] SHA2-384
471,997 UART: [kat] SHA2-512-ACC
474,373 UART: [kat] ECC-384
2,765,203 UART: [kat] HMAC-384Kdf
2,776,378 UART: [kat] LMS
3,966,660 UART: [kat] --
3,971,181 UART: [cold-reset] ++
3,972,548 UART: [fht] Storing FHT @ 0x50003400
3,984,410 UART: [idev] ++
3,985,011 UART: [idev] CDI.KEYID = 6
3,985,964 UART: [idev] SUBJECT.KEYID = 7
3,987,204 UART: [idev] UDS.KEYID = 0
3,988,122 ready_for_fw is high
3,988,300 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,131,551 UART: [idev] Erasing UDS.KEYID = 0
7,320,759 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,396 UART: [idev] --
7,346,311 UART: [ldev] ++
7,346,885 UART: [ldev] CDI.KEYID = 6
7,347,847 UART: [ldev] SUBJECT.KEYID = 5
7,349,054 UART: [ldev] AUTHORITY.KEYID = 7
7,350,334 UART: [ldev] FE.KEYID = 1
7,377,251 UART: [ldev] Erasing FE.KEYID = 1
10,712,437 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,637 UART: [ldev] --
13,089,600 UART: [fwproc] Waiting for Commands...
13,091,254 UART: [fwproc] Received command 0x46574c44
13,093,432 UART: [fwproc] Received Image of size 114036 bytes
22,045,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,124,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,193,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,509,379 >>> mbox cmd response: success
22,513,583 UART: [afmc] ++
22,514,175 UART: [afmc] CDI.KEYID = 6
22,515,098 UART: [afmc] SUBJECT.KEYID = 7
22,516,315 UART: [afmc] AUTHORITY.KEYID = 5
25,888,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,188,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,191,050 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,205,622 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,220,371 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,234,542 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,256,040 UART: [afmc] --
28,260,508 UART: [cold-reset] --
28,263,285 UART: [state] Locking Datavault
28,268,473 UART: [state] Locking PCR0, PCR1 and PCR31
28,270,166 UART: [state] Locking ICCM
28,272,632 UART: [exit] Launching FMC @ 0x40000130
28,281,019 UART:
28,281,259 UART: Running Caliptra FMC ...
28,282,374 UART:
28,282,528 UART: [state] CFI Enabled
28,348,083 UART: [fht] FMC Alias Private Key: 7
30,686,213 UART: [art] Extend RT PCRs Done
30,687,433 UART: [art] Lock RT PCRs Done
30,689,267 UART: [art] Populate DV Done
30,694,779 UART: [fht] FMC Alias Private Key: 7
30,696,300 UART: [art] Derive CDI
30,697,040 UART: [art] Store in in slot 0x4
30,755,871 UART: [art] Derive Key Pair
30,756,873 UART: [art] Store priv key in slot 0x5
34,050,032 UART: [art] Derive Key Pair - Done
34,063,035 UART: [art] Signing Cert with AUTHO
34,064,368 UART: RITY.KEYID = 7
36,351,142 UART: [art] Erasing AUTHORITY.KEYID = 7
36,352,656 UART: [art] PUB.X = 5D7CFF0124567A6FD2E10BB3EC5469EE9219FA12BB44472FB19030D331DEB6289A03AFE85D72450DC6EFC9E0973E4F5B
36,359,942 UART: [art] PUB.Y = 1B4F30E66437379FD22A73350C0FE85E7BEB68B803AE15ED7EE955B09E2F322D598709875222DEC61117E41FD0306B00
36,367,146 UART: [art] SIG.R = 958041BB709C20503518732A6B450972C06DFA9326DA02B7731297EDD7FB78372BF0FBB2F3856FC7C181EEB8C18F934E
36,374,513 UART: [art] SIG.S = CC423F7B4F4115985E99013F1AF86FF3B24F48CF296D5C8C27691D5D48883D56FEC60F938813F03CE8012ABC9BACB090
37,680,260 UART: Caliptra RT
37,680,950 UART: [state] CFI Enabled
37,841,348 UART: [rt] RT listening for mailbox commands...
37,843,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,998,938 UART: [rt]cmd =0x41544d4e, len=14344
42,106,356 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,560 writing to cptra_bootfsm_go
3,784,459 ready_for_fw is high
3,785,257 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,811,993 >>> mbox cmd response: success
27,516,684 UART:
27,517,067 UART: Running Caliptra FMC ...
27,518,164 UART:
27,518,309 UART: [state] CFI Enabled
27,583,402 UART: [fht] FMC Alias Private Key: 7
29,921,356 UART: [art] Extend RT PCRs Done
29,922,578 UART: [art] Lock RT PCRs Done
29,924,439 UART: [art] Populate DV Done
29,929,992 UART: [fht] FMC Alias Private Key: 7
29,931,633 UART: [art] Derive CDI
29,932,439 UART: [art] Store in in slot 0x4
29,991,218 UART: [art] Derive Key Pair
29,992,255 UART: [art] Store priv key in slot 0x5
33,284,976 UART: [art] Derive Key Pair - Done
33,298,139 UART: [art] Signing Cert with AUTHO
33,299,449 UART: RITY.KEYID = 7
35,585,943 UART: [art] Erasing AUTHORITY.KEYID = 7
35,587,449 UART: [art] PUB.X = 8D9FA12E262A845718958D403D1D932B010799755B15BC01CF6AE3DC287E4B3F3DC3A90E986F2B4995ADC87539DA98B7
35,594,714 UART: [art] PUB.Y = 3A71703CB8ADADA475A0D0A9A4D08F0B0D49BF3EF07698CBCCEB9F84B95B50D419F0A93A4B72B3CC8E89DD98B9AB3D49
35,601,994 UART: [art] SIG.R = 85DD29ADAC67B9E951DBBB152A5B408E7D7F63D026491AB799A1DB3BE63609848FC91035126E73D20EA05572CA6C123B
35,609,333 UART: [art] SIG.S = 3E1AADD0FEA7395DAB627656E605FCBA9669363802E5F0D91302456B022BB78482994A0EF8EF547B4414842C1F55840F
36,914,591 UART: Caliptra RT
36,915,307 UART: [state] CFI Enabled
37,075,084 UART: [rt] RT listening for mailbox commands...
37,077,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,232,809 UART: [rt]cmd =0x41544d4e, len=14344
41,339,768 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,469 UART:
192,832 UART: Running Caliptra ROM ...
193,961 UART:
603,689 UART: [state] CFI Enabled
618,766 UART: [state] LifecycleState = Unprovisioned
620,689 UART: [state] DebugLocked = No
622,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,401 UART: [kat] SHA2-256
797,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,643 UART: [kat] ++
808,160 UART: [kat] sha1
819,171 UART: [kat] SHA2-256
821,820 UART: [kat] SHA2-384
827,740 UART: [kat] SHA2-512-ACC
830,115 UART: [kat] ECC-384
3,114,979 UART: [kat] HMAC-384Kdf
3,127,089 UART: [kat] LMS
4,317,209 UART: [kat] --
4,320,521 UART: [cold-reset] ++
4,322,596 UART: [fht] Storing FHT @ 0x50003400
4,334,711 UART: [idev] ++
4,335,279 UART: [idev] CDI.KEYID = 6
4,336,165 UART: [idev] SUBJECT.KEYID = 7
4,337,478 UART: [idev] UDS.KEYID = 0
4,338,439 ready_for_fw is high
4,338,653 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,318 UART: [idev] Erasing UDS.KEYID = 0
7,627,675 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,996 UART: [idev] --
7,653,828 UART: [ldev] ++
7,654,402 UART: [ldev] CDI.KEYID = 6
7,655,420 UART: [ldev] SUBJECT.KEYID = 5
7,656,576 UART: [ldev] AUTHORITY.KEYID = 7
7,657,804 UART: [ldev] FE.KEYID = 1
7,668,607 UART: [ldev] Erasing FE.KEYID = 1
10,958,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,654 UART: [ldev] --
13,319,115 UART: [fwproc] Waiting for Commands...
13,321,300 UART: [fwproc] Received command 0x46574c44
13,323,483 UART: [fwproc] Received Image of size 114036 bytes
22,120,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,202,500 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,271,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,587,735 >>> mbox cmd response: success
22,591,199 UART: [afmc] ++
22,591,797 UART: [afmc] CDI.KEYID = 6
22,592,712 UART: [afmc] SUBJECT.KEYID = 7
22,593,992 UART: [afmc] AUTHORITY.KEYID = 5
25,911,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,206,710 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,208,957 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,223,509 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,238,288 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,252,489 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,274,003 UART: [afmc] --
28,277,924 UART: [cold-reset] --
28,281,197 UART: [state] Locking Datavault
28,286,837 UART: [state] Locking PCR0, PCR1 and PCR31
28,288,536 UART: [state] Locking ICCM
28,290,416 UART: [exit] Launching FMC @ 0x40000130
28,298,813 UART:
28,299,056 UART: Running Caliptra FMC ...
28,300,159 UART:
28,300,322 UART: [state] CFI Enabled
28,308,203 UART: [fht] FMC Alias Private Key: 7
30,639,495 UART: [art] Extend RT PCRs Done
30,640,718 UART: [art] Lock RT PCRs Done
30,642,665 UART: [art] Populate DV Done
30,648,048 UART: [fht] FMC Alias Private Key: 7
30,649,762 UART: [art] Derive CDI
30,650,580 UART: [art] Store in in slot 0x4
30,693,678 UART: [art] Derive Key Pair
30,694,723 UART: [art] Store priv key in slot 0x5
33,937,258 UART: [art] Derive Key Pair - Done
33,950,157 UART: [art] Signing Cert with AUTHO
33,951,462 UART: RITY.KEYID = 7
36,230,819 UART: [art] Erasing AUTHORITY.KEYID = 7
36,232,320 UART: [art] PUB.X = CE2B5426400352149A6799133D3E31F1B0B578CB0C7DE3EB2B2CCB7F0502495ADF6FF004BA148760E13AEE982CAD3273
36,239,524 UART: [art] PUB.Y = F17D8CF09B42C5F9DF7ADFED3E22B948901112A3656D5195E9E63E5AA21FF0B27204CFF63ABD7D30C04D838320DB6215
36,246,817 UART: [art] SIG.R = 2AFEC0BF29BFA1BC36C2CCDA68205889C64DB4F0884ABCF0DC25D0641EA913813368804F5F55822B45370790071E8178
36,254,163 UART: [art] SIG.S = 2A2C166BDE9648E0F97D8473F3DD681BAB482E8ED3FA90372EA5A5697BFC80A16D9EDB027F1D2B6993E73F5FA1423EC9
37,559,265 UART: Caliptra RT
37,559,974 UART: [state] CFI Enabled
37,678,008 UART: [rt] RT listening for mailbox commands...
37,680,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,835,724 UART: [rt]cmd =0x41544d4e, len=14344
41,994,203 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,122,046 ready_for_fw is high
4,122,638 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,841,564 >>> mbox cmd response: success
27,478,973 UART:
27,479,373 UART: Running Caliptra FMC ...
27,480,521 UART:
27,480,681 UART: [state] CFI Enabled
27,488,593 UART: [fht] FMC Alias Private Key: 7
29,819,025 UART: [art] Extend RT PCRs Done
29,820,243 UART: [art] Lock RT PCRs Done
29,821,541 UART: [art] Populate DV Done
29,826,891 UART: [fht] FMC Alias Private Key: 7
29,828,503 UART: [art] Derive CDI
29,829,345 UART: [art] Store in in slot 0x4
29,871,744 UART: [art] Derive Key Pair
29,872,785 UART: [art] Store priv key in slot 0x5
33,115,289 UART: [art] Derive Key Pair - Done
33,128,456 UART: [art] Signing Cert with AUTHO
33,129,955 UART: RITY.KEYID = 7
35,408,863 UART: [art] Erasing AUTHORITY.KEYID = 7
35,410,367 UART: [art] PUB.X = DF2E8125851EBBF2FABA93FAE811D1D73A450C4501D06E51CD7E1905611338822E82C4DD34534C2DB106B3F18EF5CE95
35,417,584 UART: [art] PUB.Y = 8F3861DCDABFA47E4E4684B9A617C0E48FE98D8E53340CBB5D76C2E10425E573D669558AF6312E286D8C5928F8D78FEA
35,424,870 UART: [art] SIG.R = B3150976A34A953A4D7344DB61CF22D8386E438C98FAF6042435BF63ECC080866576955FE9A67B01741ADE2EC5C1DD35
35,432,232 UART: [art] SIG.S = BA4C18C1E4739154D5D4D813440B8BAF08D0E611C4D23665358A6F8D03D5DD147D56E40D5EA9DD315E8D28B549591CCC
36,736,601 UART: Caliptra RT
36,737,318 UART: [state] CFI Enabled
36,856,332 UART: [rt] RT listening for mailbox commands...
36,858,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,014,170 UART: [rt]cmd =0x41544d4e, len=14344
41,172,334 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,553 writing to cptra_bootfsm_go
192,811 UART:
193,193 UART: Running Caliptra ROM ...
194,384 UART:
194,554 UART: [state] CFI Enabled
265,994 UART: [state] LifecycleState = Unprovisioned
267,910 UART: [state] DebugLocked = No
270,293 UART: [state] WD Timer not started. Device not locked for debugging
274,557 UART: [kat] SHA2-256
453,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,254 UART: [kat] ++
465,790 UART: [kat] sha1
475,320 UART: [kat] SHA2-256
478,393 UART: [kat] SHA2-384
485,875 UART: [kat] SHA2-512-ACC
488,891 UART: [kat] ECC-384
2,948,737 UART: [kat] HMAC-384Kdf
2,974,121 UART: [kat] LMS
3,503,555 UART: [kat] --
3,506,996 UART: [cold-reset] ++
3,509,217 UART: [fht] FHT @ 0x50003400
3,521,409 UART: [idev] ++
3,521,975 UART: [idev] CDI.KEYID = 6
3,522,885 UART: [idev] SUBJECT.KEYID = 7
3,524,060 UART: [idev] UDS.KEYID = 0
3,524,992 ready_for_fw is high
3,525,187 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,163 UART: [idev] Erasing UDS.KEYID = 0
6,028,978 UART: [idev] Sha1 KeyId Algorithm
6,051,833 UART: [idev] --
6,054,697 UART: [ldev] ++
6,055,271 UART: [ldev] CDI.KEYID = 6
6,056,177 UART: [ldev] SUBJECT.KEYID = 5
6,057,399 UART: [ldev] AUTHORITY.KEYID = 7
6,058,635 UART: [ldev] FE.KEYID = 1
6,102,992 UART: [ldev] Erasing FE.KEYID = 1
8,608,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,070 UART: [ldev] --
10,415,131 UART: [fwproc] Wait for Commands...
10,416,962 UART: [fwproc] Recv command 0x46574c44
10,419,059 UART: [fwproc] Recv'd Img size: 114360 bytes
14,991,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,063,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,131,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,449,230 >>> mbox cmd response: success
15,453,141 UART: [afmc] ++
15,453,762 UART: [afmc] CDI.KEYID = 6
15,454,678 UART: [afmc] SUBJECT.KEYID = 7
15,455,774 UART: [afmc] AUTHORITY.KEYID = 5
17,983,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,509 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,724,490 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,740,478 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,756,241 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,777,619 UART: [afmc] --
19,781,713 UART: [cold-reset] --
19,786,059 UART: [state] Locking Datavault
19,792,386 UART: [state] Locking PCR0, PCR1 and PCR31
19,794,032 UART: [state] Locking ICCM
19,796,393 UART: [exit] Launching FMC @ 0x40000130
19,804,790 UART:
19,805,027 UART: Running Caliptra FMC ...
19,806,133 UART:
19,806,288 UART: [state] CFI Enabled
19,867,825 UART: [fht] FMC Alias Private Key: 7
21,631,782 UART: [art] Extend RT PCRs Done
21,632,987 UART: [art] Lock RT PCRs Done
21,634,498 UART: [art] Populate DV Done
21,640,178 UART: [fht] FMC Alias Private Key: 7
21,641,716 UART: [art] Derive CDI
21,642,479 UART: [art] Store in in slot 0x4
21,700,430 UART: [art] Derive Key Pair
21,701,466 UART: [art] Store priv key in slot 0x5
24,164,168 UART: [art] Derive Key Pair - Done
24,176,787 UART: [art] Signing Cert with AUTHO
24,178,139 UART: RITY.KEYID = 7
25,889,547 UART: [art] Erasing AUTHORITY.KEYID = 7
25,891,040 UART: [art] PUB.X = 58B2853446F8B8DC601B5903BB23481777E6E44E01D7870B998B6B7B851925555960E657805BE14A2A25C5B5CF6697B8
25,898,327 UART: [art] PUB.Y = D1E1B35528756184C8B543F317402CC2202E5074CB069A793CDAF84B74BF26F7B8090982B4DF469B259B4F08035429C5
25,905,550 UART: [art] SIG.R = 0C8E63965AF8805EB1213214C39ACEC87458047B3564F6E625CD91FB01B465B72B7B51497661333E68A5D8269298D580
25,912,917 UART: [art] SIG.S = 78325C543A5C65B4777A05BE69A6E811981013E81815018D478ED9B04C0A665E5453A912F8E1D7C3C48677FF0C10C5B1
26,892,109 UART: Caliptra RT
26,892,822 UART: [state] CFI Enabled
27,056,812 UART: [rt] RT listening for mailbox commands...
27,059,134 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,214,489 UART: [rt]cmd =0x41544d4e, len=14344
29,563,324 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,348 UART:
192,728 UART: Running Caliptra ROM ...
193,865 UART:
194,013 UART: [state] CFI Enabled
262,813 UART: [state] LifecycleState = Unprovisioned
265,220 UART: [state] DebugLocked = No
267,474 UART: [state] WD Timer not started. Device not locked for debugging
272,418 UART: [kat] SHA2-256
462,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,098 UART: [kat] ++
473,552 UART: [kat] sha1
484,567 UART: [kat] SHA2-256
487,636 UART: [kat] SHA2-384
494,264 UART: [kat] SHA2-512-ACC
496,846 UART: [kat] ECC-384
2,948,811 UART: [kat] HMAC-384Kdf
2,972,147 UART: [kat] LMS
3,503,892 UART: [kat] --
3,508,893 UART: [cold-reset] ++
3,509,912 UART: [fht] FHT @ 0x50003400
3,522,528 UART: [idev] ++
3,523,167 UART: [idev] CDI.KEYID = 6
3,524,202 UART: [idev] SUBJECT.KEYID = 7
3,525,306 UART: [idev] UDS.KEYID = 0
3,526,239 ready_for_fw is high
3,526,430 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,262 UART: [idev] Erasing UDS.KEYID = 0
6,030,957 UART: [idev] Sha1 KeyId Algorithm
6,053,167 UART: [idev] --
6,058,026 UART: [ldev] ++
6,058,712 UART: [ldev] CDI.KEYID = 6
6,059,626 UART: [ldev] SUBJECT.KEYID = 5
6,060,805 UART: [ldev] AUTHORITY.KEYID = 7
6,061,988 UART: [ldev] FE.KEYID = 1
6,100,996 UART: [ldev] Erasing FE.KEYID = 1
8,607,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,875 UART: [ldev] --
10,403,494 UART: [fwproc] Wait for Commands...
10,405,912 UART: [fwproc] Recv command 0x46574c44
10,408,227 UART: [fwproc] Recv'd Img size: 114360 bytes
15,018,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,096,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,213,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,754,951 >>> mbox cmd response: success
15,758,473 UART: [afmc] ++
15,759,185 UART: [afmc] CDI.KEYID = 6
15,760,375 UART: [afmc] SUBJECT.KEYID = 7
15,761,872 UART: [afmc] AUTHORITY.KEYID = 5
18,289,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,014,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,016,259 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,031,332 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,046,502 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,061,333 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,086,366 UART: [afmc] --
20,090,722 UART: [cold-reset] --
20,094,433 UART: [state] Locking Datavault
20,099,055 UART: [state] Locking PCR0, PCR1 and PCR31
20,101,252 UART: [state] Locking ICCM
20,103,103 UART: [exit] Launching FMC @ 0x40000130
20,111,751 UART:
20,111,993 UART: Running Caliptra FMC ...
20,113,097 UART:
20,113,258 UART: [state] CFI Enabled
20,171,618 UART: [fht] FMC Alias Private Key: 7
21,935,535 UART: [art] Extend RT PCRs Done
21,936,753 UART: [art] Lock RT PCRs Done
21,938,481 UART: [art] Populate DV Done
21,943,925 UART: [fht] FMC Alias Private Key: 7
21,945,590 UART: [art] Derive CDI
21,946,411 UART: [art] Store in in slot 0x4
22,004,857 UART: [art] Derive Key Pair
22,005,864 UART: [art] Store priv key in slot 0x5
24,468,736 UART: [art] Derive Key Pair - Done
24,482,051 UART: [art] Signing Cert with AUTHO
24,483,359 UART: RITY.KEYID = 7
26,194,575 UART: [art] Erasing AUTHORITY.KEYID = 7
26,196,080 UART: [art] PUB.X = 78E8EDCE852EDD92FDCC0CEBF32FA1D2307497B38B9F6AE4B06E7F1FA3149AF71B90EE221DE3CCDD44F15E05F05735D1
26,203,423 UART: [art] PUB.Y = 2B531ECCC2AE4A7D38E272A67AFD0849B71BB6141B6E7BD349F83A84C09F458795DA1126A40A449D418D080554DC35FA
26,210,666 UART: [art] SIG.R = 457BE6965B168BB156EE865E7D00CA9BF8C37160CC4936653439E006ED1054C26D2EC1D418502CA1BDBD0B559FE0541A
26,218,041 UART: [art] SIG.S = D9E30D9D2F0B97FBB938EE7B33FD539746E4D318B68D3338CBCC26A54379598129382AB4FDEB366C6A1A956B3047CCD1
27,197,095 UART: Caliptra RT
27,197,791 UART: [state] CFI Enabled
27,363,321 UART: [rt] RT listening for mailbox commands...
27,365,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,521,245 UART: [rt]cmd =0x41544d4e, len=14344
29,884,370 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
3,437,861 ready_for_fw is high
3,438,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,857,966 >>> mbox cmd response: success
20,174,331 UART:
20,174,750 UART: Running Caliptra FMC ...
20,175,886 UART:
20,176,046 UART: [state] CFI Enabled
20,238,898 UART: [fht] FMC Alias Private Key: 7
22,003,090 UART: [art] Extend RT PCRs Done
22,004,302 UART: [art] Lock RT PCRs Done
22,006,093 UART: [art] Populate DV Done
22,011,492 UART: [fht] FMC Alias Private Key: 7
22,013,089 UART: [art] Derive CDI
22,013,927 UART: [art] Store in in slot 0x4
22,070,979 UART: [art] Derive Key Pair
22,072,019 UART: [art] Store priv key in slot 0x5
24,535,078 UART: [art] Derive Key Pair - Done
24,548,039 UART: [art] Signing Cert with AUTHO
24,549,347 UART: RITY.KEYID = 7
26,260,293 UART: [art] Erasing AUTHORITY.KEYID = 7
26,261,859 UART: [art] PUB.X = 65C4C779438E7E81E1B97F240E0EF5F0101E0F5D679F815E3C59981DC91FD7B99458CE4551BE40CBECD212307C194275
26,269,082 UART: [art] PUB.Y = 1E6B6A7B0B8D0A8FFF5B551FEC14BCFFB654F2E0BB9F0C086786FD9B9E9020CE0252373B17825BA2B8F49726BAC353E1
26,276,334 UART: [art] SIG.R = 906A9F271DF6390C5322A74F30540EFF8DE65CA62D4F3E89A746E4B1D5EB1A56CF852FC00E1CEF951C737107F929030D
26,283,763 UART: [art] SIG.S = 0936CED835F94639E14E3C91EC56BF927D3975E4A42EBFDEE6368D7AA003F1115F2D1F0B0DAD347258E4D5C424572506
27,262,780 UART: Caliptra RT
27,263,491 UART: [state] CFI Enabled
27,428,183 UART: [rt] RT listening for mailbox commands...
27,430,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,585,445 UART: [rt]cmd =0x41544d4e, len=14344
29,944,226 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,410 UART:
192,777 UART: Running Caliptra ROM ...
193,977 UART:
603,669 UART: [state] CFI Enabled
618,041 UART: [state] LifecycleState = Unprovisioned
620,471 UART: [state] DebugLocked = No
621,715 UART: [state] WD Timer not started. Device not locked for debugging
627,004 UART: [kat] SHA2-256
816,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,731 UART: [kat] ++
828,227 UART: [kat] sha1
839,315 UART: [kat] SHA2-256
842,329 UART: [kat] SHA2-384
848,388 UART: [kat] SHA2-512-ACC
851,037 UART: [kat] ECC-384
3,292,034 UART: [kat] HMAC-384Kdf
3,304,342 UART: [kat] LMS
3,836,126 UART: [kat] --
3,839,815 UART: [cold-reset] ++
3,841,783 UART: [fht] FHT @ 0x50003400
3,852,339 UART: [idev] ++
3,853,039 UART: [idev] CDI.KEYID = 6
3,853,991 UART: [idev] SUBJECT.KEYID = 7
3,855,233 UART: [idev] UDS.KEYID = 0
3,856,135 ready_for_fw is high
3,856,320 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,971 UART: [idev] Erasing UDS.KEYID = 0
6,330,515 UART: [idev] Sha1 KeyId Algorithm
6,353,468 UART: [idev] --
6,358,808 UART: [ldev] ++
6,359,479 UART: [ldev] CDI.KEYID = 6
6,360,355 UART: [ldev] SUBJECT.KEYID = 5
6,361,557 UART: [ldev] AUTHORITY.KEYID = 7
6,362,780 UART: [ldev] FE.KEYID = 1
6,373,717 UART: [ldev] Erasing FE.KEYID = 1
8,854,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,995 UART: [ldev] --
10,644,178 UART: [fwproc] Wait for Commands...
10,647,082 UART: [fwproc] Recv command 0x46574c44
10,649,397 UART: [fwproc] Recv'd Img size: 114360 bytes
15,292,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,366,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,482,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,024,655 >>> mbox cmd response: success
16,028,331 UART: [afmc] ++
16,029,036 UART: [afmc] CDI.KEYID = 6
16,030,142 UART: [afmc] SUBJECT.KEYID = 7
16,031,670 UART: [afmc] AUTHORITY.KEYID = 5
18,535,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,258,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,260,809 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,275,828 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,291,051 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,305,898 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,330,675 UART: [afmc] --
20,334,979 UART: [cold-reset] --
20,338,029 UART: [state] Locking Datavault
20,343,974 UART: [state] Locking PCR0, PCR1 and PCR31
20,346,155 UART: [state] Locking ICCM
20,348,248 UART: [exit] Launching FMC @ 0x40000130
20,356,907 UART:
20,357,139 UART: Running Caliptra FMC ...
20,358,235 UART:
20,358,390 UART: [state] CFI Enabled
20,366,807 UART: [fht] FMC Alias Private Key: 7
22,123,626 UART: [art] Extend RT PCRs Done
22,124,851 UART: [art] Lock RT PCRs Done
22,126,418 UART: [art] Populate DV Done
22,131,985 UART: [fht] FMC Alias Private Key: 7
22,133,567 UART: [art] Derive CDI
22,134,391 UART: [art] Store in in slot 0x4
22,177,108 UART: [art] Derive Key Pair
22,178,146 UART: [art] Store priv key in slot 0x5
24,604,928 UART: [art] Derive Key Pair - Done
24,617,878 UART: [art] Signing Cert with AUTHO
24,619,183 UART: RITY.KEYID = 7
26,324,872 UART: [art] Erasing AUTHORITY.KEYID = 7
26,326,365 UART: [art] PUB.X = 9D9CD3F04F3FBF979F1639D36FF47C62F31BB11E87C1442BABC25E825A00C383C3CA5FA76291F6115D8C481CDC61191A
26,333,656 UART: [art] PUB.Y = 984A539DFB627BB1EE1CAB3DB8EC81E39B23DD1E330A0010C8F53B982660E5A5A9AA414B168E83239AFA8B8B0C46C3BB
26,340,892 UART: [art] SIG.R = C6EF2C9FE6E894170C04D8E9382425BE02C6AD244DF8AE484090CAC0D9D2E8293BC3E8419F596665B8175191274847E2
26,348,283 UART: [art] SIG.S = FDAC0A651A97C5BA06938BC6B21AE47D8C5161DDDBA8D3441949824FE3095BBFB600F843BC39142F82A9342E8B194C74
27,327,321 UART: Caliptra RT
27,328,029 UART: [state] CFI Enabled
27,445,377 UART: [rt] RT listening for mailbox commands...
27,447,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,602,843 UART: [rt]cmd =0x41544d4e, len=14344
29,966,933 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,756,977 ready_for_fw is high
3,757,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,078,047 >>> mbox cmd response: success
20,331,981 UART:
20,332,366 UART: Running Caliptra FMC ...
20,333,499 UART:
20,333,657 UART: [state] CFI Enabled
20,341,549 UART: [fht] FMC Alias Private Key: 7
22,098,708 UART: [art] Extend RT PCRs Done
22,099,960 UART: [art] Lock RT PCRs Done
22,101,674 UART: [art] Populate DV Done
22,107,285 UART: [fht] FMC Alias Private Key: 7
22,108,882 UART: [art] Derive CDI
22,109,846 UART: [art] Store in in slot 0x4
22,152,045 UART: [art] Derive Key Pair
22,153,058 UART: [art] Store priv key in slot 0x5
24,580,134 UART: [art] Derive Key Pair - Done
24,593,225 UART: [art] Signing Cert with AUTHO
24,594,551 UART: RITY.KEYID = 7
26,300,050 UART: [art] Erasing AUTHORITY.KEYID = 7
26,301,565 UART: [art] PUB.X = 51F8E6E6D036E69D218CDA6B79A030EDCDEDDBB998FA3386B78BCA89165C2536FB71B4B5D7018252F04BB7951C59857F
26,308,836 UART: [art] PUB.Y = 5F21A0B25B9B9743DBB938DF46BD0F91E08CEF9722321080AC1F186443494EF971BC93314426A913AAA59B5646506E4C
26,316,070 UART: [art] SIG.R = 73E327AA4FE1B2CD7F03B7E51D09A3145951C8FA6F5CED30A7EEF61548B4414874E2CBA228DBE6F24C01D31AD3A117DE
26,323,477 UART: [art] SIG.S = 01FE69A2F23AE7505063C6EB02B33F368890C78B0CA613CCF0EEEB7A4EADA88CA62D77D22782C874D6610295809D4893
27,302,566 UART: Caliptra RT
27,303,298 UART: [state] CFI Enabled
27,421,109 UART: [rt] RT listening for mailbox commands...
27,423,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,050 UART: [rt]cmd =0x41544d4e, len=14344
29,935,988 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,363 UART: [kat] SHA2-256
882,294 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,409 UART: [kat] ++
886,561 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,098 UART: [kat] LMS
1,475,294 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,471 UART: [fht] Storing FHT @ 0x50003400
1,479,404 UART: [idev] ++
1,479,572 UART: [idev] CDI.KEYID = 6
1,479,932 UART: [idev] SUBJECT.KEYID = 7
1,480,356 UART: [idev] UDS.KEYID = 0
1,480,701 ready_for_fw is high
1,480,701 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,504,870 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,326 UART: [idev] --
1,514,279 UART: [ldev] ++
1,514,447 UART: [ldev] CDI.KEYID = 6
1,514,810 UART: [ldev] SUBJECT.KEYID = 5
1,515,236 UART: [ldev] AUTHORITY.KEYID = 7
1,515,699 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,048 UART: [ldev] --
1,585,495 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 114360 bytes
5,081,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,109,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,139,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,275,059 >>> mbox cmd response: success
5,276,321 UART: [afmc] ++
5,276,489 UART: [afmc] CDI.KEYID = 6
5,276,851 UART: [afmc] SUBJECT.KEYID = 7
5,277,276 UART: [afmc] AUTHORITY.KEYID = 5
5,311,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,536 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,316 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,025 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,917 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,618 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,502 UART: [afmc] --
5,355,514 UART: [cold-reset] --
5,356,646 UART: [state] Locking Datavault
5,357,809 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,413 UART: [state] Locking ICCM
5,358,999 UART: [exit] Launching FMC @ 0x40000130
5,364,328 UART:
5,364,344 UART: Running Caliptra FMC ...
5,364,752 UART:
5,364,806 UART: [state] CFI Enabled
5,375,240 UART: [fht] FMC Alias Private Key: 7
5,482,464 UART: [art] Extend RT PCRs Done
5,482,892 UART: [art] Lock RT PCRs Done
5,484,166 UART: [art] Populate DV Done
5,492,548 UART: [fht] FMC Alias Private Key: 7
5,493,552 UART: [art] Derive CDI
5,493,832 UART: [art] Store in in slot 0x4
5,579,015 UART: [art] Derive Key Pair
5,579,375 UART: [art] Store priv key in slot 0x5
5,592,405 UART: [art] Derive Key Pair - Done
5,607,237 UART: [art] Signing Cert with AUTHO
5,607,717 UART: RITY.KEYID = 7
5,623,059 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,824 UART: [art] PUB.X = C4663CE6B7A4CBA2B003C2F47E1C211DFE58BD98B9D72D604E4656478888D721C07667966367336EC643F5269B221AA3
5,630,589 UART: [art] PUB.Y = B67AFC4569944E25BF7A9DFFE5D3CEB0E5416DC3BD2EA2323267EEA29008771846EEA4CD806157B2782160D6F6DD21D7
5,637,548 UART: [art] SIG.R = 41A84BE09F81E82DA41F38B86EB9984AF8A4B1EDA300E7166BCC37A6286101686769EEE63AC9BE3B99B249073DD1C4E6
5,644,300 UART: [art] SIG.S = F3929854A4BA42CC1CAF615152B252D76DD973397AA58506F275465EDC40F107D0EAFC83E4E26D093F3E9047FE9A316C
5,668,324 UART: Caliptra RT
5,668,578 UART: [state] CFI Enabled
5,776,912 UART: [rt] RT listening for mailbox commands...
5,777,582 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,900,383 UART: [rt]cmd =0x41544d4e, len=14344
6,458,575 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,513 ready_for_fw is high
1,362,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,051,061 >>> mbox cmd response: success
5,112,036 UART:
5,112,052 UART: Running Caliptra FMC ...
5,112,460 UART:
5,112,514 UART: [state] CFI Enabled
5,123,124 UART: [fht] FMC Alias Private Key: 7
5,230,520 UART: [art] Extend RT PCRs Done
5,230,948 UART: [art] Lock RT PCRs Done
5,232,454 UART: [art] Populate DV Done
5,240,388 UART: [fht] FMC Alias Private Key: 7
5,241,364 UART: [art] Derive CDI
5,241,644 UART: [art] Store in in slot 0x4
5,327,665 UART: [art] Derive Key Pair
5,328,025 UART: [art] Store priv key in slot 0x5
5,341,623 UART: [art] Derive Key Pair - Done
5,356,558 UART: [art] Signing Cert with AUTHO
5,357,038 UART: RITY.KEYID = 7
5,372,400 UART: [art] Erasing AUTHORITY.KEYID = 7
5,373,165 UART: [art] PUB.X = 2EEA274C9C11D6708FDA3BED5E3A8F670EE1E6D31C95F033F3AE84CFD0AF08683779B3661655722DDCAF75D136A05A98
5,379,943 UART: [art] PUB.Y = A129E6A9423BBC45871EFDA0DD53D8031DD2A0219BF6D240B64168571006F3B1CF79D811CDE7F52A55DDB57B418AB540
5,386,897 UART: [art] SIG.R = 2C900E2E5A57C9CEE2C9BF21C0E0EE9C3E9830AD1CE0CA915A94DA93CCD4C98CE33F7A7656ED97E1C93027B93AE3ECAC
5,393,692 UART: [art] SIG.S = 0D563F8E97F524EDD54BBF30C0FD780848A9F0A3B29CFFCEA233EF838AB3EF5DE8BD8D9397AB24F0FDD6F87F1D304571
5,417,165 UART: Caliptra RT
5,417,419 UART: [state] CFI Enabled
5,525,666 UART: [rt] RT listening for mailbox commands...
5,526,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,251 UART: [rt]cmd =0x41544d4e, len=14344
6,212,227 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
903,341 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,476,782 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,480,173 UART: [idev] ++
1,480,341 UART: [idev] CDI.KEYID = 6
1,480,701 UART: [idev] SUBJECT.KEYID = 7
1,481,125 UART: [idev] UDS.KEYID = 0
1,481,470 ready_for_fw is high
1,481,470 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,767 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,354 UART: [ldev] Erasing FE.KEYID = 1
1,548,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,005 UART: [ldev] --
1,587,472 UART: [fwproc] Waiting for Commands...
1,588,261 UART: [fwproc] Received command 0x46574c44
1,589,052 UART: [fwproc] Received Image of size 114360 bytes
5,235,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,263,315 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,292,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,428,536 >>> mbox cmd response: success
5,429,596 UART: [afmc] ++
5,429,764 UART: [afmc] CDI.KEYID = 6
5,430,126 UART: [afmc] SUBJECT.KEYID = 7
5,430,551 UART: [afmc] AUTHORITY.KEYID = 5
5,465,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,481,399 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,482,179 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,487,888 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,493,780 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,499,481 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,507,571 UART: [afmc] --
5,508,703 UART: [cold-reset] --
5,509,599 UART: [state] Locking Datavault
5,510,766 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,370 UART: [state] Locking ICCM
5,512,022 UART: [exit] Launching FMC @ 0x40000130
5,517,351 UART:
5,517,367 UART: Running Caliptra FMC ...
5,517,775 UART:
5,517,918 UART: [state] CFI Enabled
5,528,488 UART: [fht] FMC Alias Private Key: 7
5,635,860 UART: [art] Extend RT PCRs Done
5,636,288 UART: [art] Lock RT PCRs Done
5,637,914 UART: [art] Populate DV Done
5,646,062 UART: [fht] FMC Alias Private Key: 7
5,647,140 UART: [art] Derive CDI
5,647,420 UART: [art] Store in in slot 0x4
5,733,439 UART: [art] Derive Key Pair
5,733,799 UART: [art] Store priv key in slot 0x5
5,747,173 UART: [art] Derive Key Pair - Done
5,762,007 UART: [art] Signing Cert with AUTHO
5,762,487 UART: RITY.KEYID = 7
5,777,905 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,670 UART: [art] PUB.X = FDB7DA9AEEA9BA78E9CA4A9954E4944287AE77AACD30C02097742B52CD550F2FC6FCE16D3F29D6C728D85BCB6DDFD8F8
5,785,465 UART: [art] PUB.Y = 55F595374A928163184144B591E50269B45305A25F614C31F1D7CA7835D43069E30B6B500EE4BDDB9EBDF2126F0D1AC5
5,792,398 UART: [art] SIG.R = 8DE64A180D22909A96070AB2BCAD08FC302CE2C1241623855EA08779266C600EF9818D41C83330016E70442619BC2ED7
5,799,144 UART: [art] SIG.S = 12DE109FD80E68C2729A088C36096B65CB8F0626D0785C15AB5FD1F429D69F22BBAA459A20CE756651953F6B35691588
5,823,125 UART: Caliptra RT
5,823,471 UART: [state] CFI Enabled
5,931,919 UART: [rt] RT listening for mailbox commands...
5,932,589 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,055,266 UART: [rt]cmd =0x41544d4e, len=14344
6,608,652 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,316,411 >>> mbox cmd response: success
5,378,270 UART:
5,378,286 UART: Running Caliptra FMC ...
5,378,694 UART:
5,378,837 UART: [state] CFI Enabled
5,389,431 UART: [fht] FMC Alias Private Key: 7
5,496,635 UART: [art] Extend RT PCRs Done
5,497,063 UART: [art] Lock RT PCRs Done
5,498,639 UART: [art] Populate DV Done
5,506,783 UART: [fht] FMC Alias Private Key: 7
5,507,899 UART: [art] Derive CDI
5,508,179 UART: [art] Store in in slot 0x4
5,594,262 UART: [art] Derive Key Pair
5,594,622 UART: [art] Store priv key in slot 0x5
5,607,182 UART: [art] Derive Key Pair - Done
5,621,582 UART: [art] Signing Cert with AUTHO
5,622,062 UART: RITY.KEYID = 7
5,637,098 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,863 UART: [art] PUB.X = 421A4086A2C2189204F0E9AF8C11A9C62FEC1E8912EC208BA80FE4476A19A5C2F45ACDD6196B39D6B7C772E3D1AB6CEE
5,644,643 UART: [art] PUB.Y = A0AC65AFF40E4019C7F2786F28C33CC74395C31259338A53474969C2A3DD75613D5B36A418848E23CDD3EE4E67A5DA9D
5,651,594 UART: [art] SIG.R = 3E4ADB4414BBE7FB8DC5A201562FECE88F4E6CD4576D3838A488E0952393E2C608B690082060FBB04E7CE6EF1E748B0E
5,658,364 UART: [art] SIG.S = 9F90B3C8BDAD76CF484C2103BB277B20410E5C4646A8B31332A9D4832929297DE5AF6770CBD1F6E4E0F01C9018B96752
5,681,763 UART: Caliptra RT
5,682,109 UART: [state] CFI Enabled
5,789,259 UART: [rt] RT listening for mailbox commands...
5,789,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,912,646 UART: [rt]cmd =0x41544d4e, len=14344
6,463,977 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
893,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,173 UART: [kat] ++
897,325 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,218 UART: [kat] SHA2-512-ACC
908,119 UART: [kat] ECC-384
917,648 UART: [kat] HMAC-384Kdf
922,236 UART: [kat] LMS
1,170,564 UART: [kat] --
1,171,705 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,175,056 UART: [idev] ++
1,175,224 UART: [idev] CDI.KEYID = 6
1,175,584 UART: [idev] SUBJECT.KEYID = 7
1,176,008 UART: [idev] UDS.KEYID = 0
1,176,353 ready_for_fw is high
1,176,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,210 UART: [idev] Erasing UDS.KEYID = 0
1,201,047 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,651 UART: [ldev] ++
1,210,819 UART: [ldev] CDI.KEYID = 6
1,211,182 UART: [ldev] SUBJECT.KEYID = 5
1,211,608 UART: [ldev] AUTHORITY.KEYID = 7
1,212,071 UART: [ldev] FE.KEYID = 1
1,217,665 UART: [ldev] Erasing FE.KEYID = 1
1,244,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,129 UART: [ldev] --
1,283,518 UART: [fwproc] Wait for Commands...
1,284,342 UART: [fwproc] Recv command 0x46574c44
1,285,070 UART: [fwproc] Recv'd Img size: 114360 bytes
3,132,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,324,808 >>> mbox cmd response: success
3,325,880 UART: [afmc] ++
3,326,048 UART: [afmc] CDI.KEYID = 6
3,326,410 UART: [afmc] SUBJECT.KEYID = 7
3,326,835 UART: [afmc] AUTHORITY.KEYID = 5
3,361,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,914 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,623 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,515 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,226 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,193 UART: [afmc] --
3,405,189 UART: [cold-reset] --
3,406,105 UART: [state] Locking Datavault
3,407,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,864 UART: [state] Locking ICCM
3,408,500 UART: [exit] Launching FMC @ 0x40000130
3,413,829 UART:
3,413,845 UART: Running Caliptra FMC ...
3,414,253 UART:
3,414,307 UART: [state] CFI Enabled
3,424,833 UART: [fht] FMC Alias Private Key: 7
3,532,335 UART: [art] Extend RT PCRs Done
3,532,763 UART: [art] Lock RT PCRs Done
3,534,197 UART: [art] Populate DV Done
3,542,317 UART: [fht] FMC Alias Private Key: 7
3,543,399 UART: [art] Derive CDI
3,543,679 UART: [art] Store in in slot 0x4
3,629,412 UART: [art] Derive Key Pair
3,629,772 UART: [art] Store priv key in slot 0x5
3,643,310 UART: [art] Derive Key Pair - Done
3,658,073 UART: [art] Signing Cert with AUTHO
3,658,553 UART: RITY.KEYID = 7
3,673,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,244 UART: [art] PUB.X = DB791B2666BBC6B428D079C39E38EB2DF732DD073A70C394251D4E32E3A4AD0536CE27C6ED7C433C3D07B3CEEB842874
3,681,017 UART: [art] PUB.Y = 84D1D71FD7B539EEE21861846D4B102B702827676E4E5F3DF5F62D099CE9DAF9A57C44062C539705B29EC2197B762FC0
3,687,960 UART: [art] SIG.R = 749A32CEB81BA088584FB22D1C4A938A35F79F9CC9EA872CE5F76A9DD7B810B707321DAE677F7AFC997E96CF51E9E3B8
3,694,743 UART: [art] SIG.S = 314E68E98016F3361B8BA0BAE699DAE45FAB5E11ABDA91A42D812BDD77B4F17792BB34A27B2E4411CD10D7586F3D4C6A
3,717,918 UART: Caliptra RT
3,718,172 UART: [state] CFI Enabled
3,824,700 UART: [rt] RT listening for mailbox commands...
3,825,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,137 UART: [rt]cmd =0x41544d4e, len=14344
4,503,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,991 ready_for_fw is high
1,058,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,158,783 >>> mbox cmd response: success
3,220,524 UART:
3,220,540 UART: Running Caliptra FMC ...
3,220,948 UART:
3,221,002 UART: [state] CFI Enabled
3,231,286 UART: [fht] FMC Alias Private Key: 7
3,339,088 UART: [art] Extend RT PCRs Done
3,339,516 UART: [art] Lock RT PCRs Done
3,341,010 UART: [art] Populate DV Done
3,349,164 UART: [fht] FMC Alias Private Key: 7
3,350,292 UART: [art] Derive CDI
3,350,572 UART: [art] Store in in slot 0x4
3,436,201 UART: [art] Derive Key Pair
3,436,561 UART: [art] Store priv key in slot 0x5
3,448,845 UART: [art] Derive Key Pair - Done
3,463,689 UART: [art] Signing Cert with AUTHO
3,464,169 UART: RITY.KEYID = 7
3,479,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,244 UART: [art] PUB.X = 04A64729D895B211110D363700D7A00492A5DA975A4549033CFAFF640CDBEB9F93A7FD072AEB1798B41585C7A9DBCF87
3,486,980 UART: [art] PUB.Y = E6CD12B421E738FD798EED600AFB0B9B833F5E470924932A91F4D5289F2DAD88127A69FD8A84F4611AB01FC394287C84
3,493,927 UART: [art] SIG.R = B4441043260CB939AF5C725053D8A00D2A6ED415B4000F2C037AC08D28057C6ED73E3BAD3E906B0748A4D8255B18AD58
3,500,659 UART: [art] SIG.S = D5648A6A0ADD124180888045CF417A0538EB7AB9D1A6251C1A680F2978B04390E0DC2E6E685EF6837501DC19BCEF12CF
3,524,696 UART: Caliptra RT
3,524,950 UART: [state] CFI Enabled
3,632,320 UART: [rt] RT listening for mailbox commands...
3,632,990 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,601 UART: [rt]cmd =0x41544d4e, len=14344
4,309,025 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
907,023 UART: [kat] SHA2-512-ACC
908,924 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,178 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,419 UART: [idev] ++
1,175,587 UART: [idev] CDI.KEYID = 6
1,175,947 UART: [idev] SUBJECT.KEYID = 7
1,176,371 UART: [idev] UDS.KEYID = 0
1,176,716 ready_for_fw is high
1,176,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,200,922 UART: [idev] Sha1 KeyId Algorithm
1,209,618 UART: [idev] --
1,210,610 UART: [ldev] ++
1,210,778 UART: [ldev] CDI.KEYID = 6
1,211,141 UART: [ldev] SUBJECT.KEYID = 5
1,211,567 UART: [ldev] AUTHORITY.KEYID = 7
1,212,030 UART: [ldev] FE.KEYID = 1
1,217,338 UART: [ldev] Erasing FE.KEYID = 1
1,244,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,502 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,507 UART: [fwproc] Recv command 0x46574c44
1,285,235 UART: [fwproc] Recv'd Img size: 114360 bytes
3,117,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,310,837 >>> mbox cmd response: success
3,312,091 UART: [afmc] ++
3,312,259 UART: [afmc] CDI.KEYID = 6
3,312,621 UART: [afmc] SUBJECT.KEYID = 7
3,313,046 UART: [afmc] AUTHORITY.KEYID = 5
3,348,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,471 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,180 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,072 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,783 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,482 UART: [afmc] --
3,391,584 UART: [cold-reset] --
3,392,440 UART: [state] Locking Datavault
3,393,687 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,291 UART: [state] Locking ICCM
3,394,849 UART: [exit] Launching FMC @ 0x40000130
3,400,178 UART:
3,400,194 UART: Running Caliptra FMC ...
3,400,602 UART:
3,400,745 UART: [state] CFI Enabled
3,411,859 UART: [fht] FMC Alias Private Key: 7
3,519,975 UART: [art] Extend RT PCRs Done
3,520,403 UART: [art] Lock RT PCRs Done
3,521,923 UART: [art] Populate DV Done
3,530,137 UART: [fht] FMC Alias Private Key: 7
3,531,283 UART: [art] Derive CDI
3,531,563 UART: [art] Store in in slot 0x4
3,617,068 UART: [art] Derive Key Pair
3,617,428 UART: [art] Store priv key in slot 0x5
3,630,458 UART: [art] Derive Key Pair - Done
3,645,108 UART: [art] Signing Cert with AUTHO
3,645,588 UART: RITY.KEYID = 7
3,661,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,859 UART: [art] PUB.X = EA38BCB3298262F43FEAE70960F1B3775C4802C28B2E0AF26FD2F0DAA90BE11642D7AA823E58FF971C99CBFC57ED52BD
3,668,637 UART: [art] PUB.Y = 7352363EE15C8C9909652ECB6AFD611DD4D683868E52B5790E3FB69BA046EC1418A2A7DC1736535D4BE9D3312BA0172B
3,675,585 UART: [art] SIG.R = BDFB6AF53A7305EDA042F589D37CCE60A6E8D49C3C6570822F5384669244049E61D1DE149A3AB1A0C5FCE561C2B2150E
3,682,356 UART: [art] SIG.S = D2810821A32987B30873AFBE1B2E5037C4C89593BECB6C1B31EF60FC56798A3F5AD29B64A3131D8A39FF40130F3537FA
3,706,576 UART: Caliptra RT
3,706,922 UART: [state] CFI Enabled
3,814,010 UART: [rt] RT listening for mailbox commands...
3,814,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,287 UART: [rt]cmd =0x41544d4e, len=14344
4,503,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,924 ready_for_fw is high
1,060,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,165,140 >>> mbox cmd response: success
3,227,453 UART:
3,227,469 UART: Running Caliptra FMC ...
3,227,877 UART:
3,228,020 UART: [state] CFI Enabled
3,238,490 UART: [fht] FMC Alias Private Key: 7
3,346,114 UART: [art] Extend RT PCRs Done
3,346,542 UART: [art] Lock RT PCRs Done
3,348,168 UART: [art] Populate DV Done
3,356,416 UART: [fht] FMC Alias Private Key: 7
3,357,372 UART: [art] Derive CDI
3,357,652 UART: [art] Store in in slot 0x4
3,443,425 UART: [art] Derive Key Pair
3,443,785 UART: [art] Store priv key in slot 0x5
3,457,121 UART: [art] Derive Key Pair - Done
3,472,049 UART: [art] Signing Cert with AUTHO
3,472,529 UART: RITY.KEYID = 7
3,488,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,946 UART: [art] PUB.X = 3FEA41DB3FE28B1C09AB6F734B7C420024DC3B2FCD48E7EFEEAD668FCA08EA1941EDC9284B5745EB8D9C9A3FE32AA660
3,495,716 UART: [art] PUB.Y = B5EAFBCB70AB8C4431847105C39FD2603E02538576649C30C353E31D65981E5371A335DD8D8668A78D6E3D0AA8A73365
3,502,655 UART: [art] SIG.R = D0CE833490F3EBDF057AF264973F6DE8E126C588AB25B7F92444869DFE515BE442A193851017419DCDC8CA94D69C7C5D
3,509,430 UART: [art] SIG.S = 005C31FE665E05B3B18CBF689023A91A2DF98F6F8A5EAE1AAD12305F8895AB5564386062D21669802F6F222E9A915868
3,533,530 UART: Caliptra RT
3,533,876 UART: [state] CFI Enabled
3,641,425 UART: [rt] RT listening for mailbox commands...
3,642,095 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,846 UART: [rt]cmd =0x41544d4e, len=14344
4,320,913 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,476 UART: [state] LifecycleState = Unprovisioned
85,131 UART: [state] DebugLocked = No
85,631 UART: [state] WD Timer not started. Device not locked for debugging
86,784 UART: [kat] SHA2-256
890,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,463 UART: [kat] ++
894,615 UART: [kat] sha1
898,839 UART: [kat] SHA2-256
900,779 UART: [kat] SHA2-384
903,546 UART: [kat] SHA2-512-ACC
905,447 UART: [kat] ECC-384
915,146 UART: [kat] HMAC-384Kdf
919,590 UART: [kat] LMS
1,167,902 UART: [kat] --
1,168,791 UART: [cold-reset] ++
1,169,199 UART: [fht] FHT @ 0x50003400
1,171,813 UART: [idev] ++
1,171,981 UART: [idev] CDI.KEYID = 6
1,172,342 UART: [idev] SUBJECT.KEYID = 7
1,172,767 UART: [idev] UDS.KEYID = 0
1,173,113 ready_for_fw is high
1,173,113 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,093 UART: [idev] Erasing UDS.KEYID = 0
1,198,003 UART: [idev] Sha1 KeyId Algorithm
1,206,893 UART: [idev] --
1,207,842 UART: [ldev] ++
1,208,010 UART: [ldev] CDI.KEYID = 6
1,208,374 UART: [ldev] SUBJECT.KEYID = 5
1,208,801 UART: [ldev] AUTHORITY.KEYID = 7
1,209,264 UART: [ldev] FE.KEYID = 1
1,214,506 UART: [ldev] Erasing FE.KEYID = 1
1,241,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,805 UART: [fwproc] Recv command 0x46574c44
1,282,538 UART: [fwproc] Recv'd Img size: 114360 bytes
3,124,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,317,773 >>> mbox cmd response: success
3,318,794 UART: [afmc] ++
3,318,962 UART: [afmc] CDI.KEYID = 6
3,319,325 UART: [afmc] SUBJECT.KEYID = 7
3,319,751 UART: [afmc] AUTHORITY.KEYID = 5
3,355,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,434 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,144 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,034 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,745 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,727 UART: [afmc] --
3,398,717 UART: [cold-reset] --
3,399,533 UART: [state] Locking Datavault
3,400,662 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,266 UART: [state] Locking ICCM
3,401,910 UART: [exit] Launching FMC @ 0x40000130
3,407,239 UART:
3,407,255 UART: Running Caliptra FMC ...
3,407,663 UART:
3,407,717 UART: [state] CFI Enabled
3,417,977 UART: [fht] FMC Alias Private Key: 7
3,525,331 UART: [art] Extend RT PCRs Done
3,525,759 UART: [art] Lock RT PCRs Done
3,527,367 UART: [art] Populate DV Done
3,535,633 UART: [fht] FMC Alias Private Key: 7
3,536,595 UART: [art] Derive CDI
3,536,875 UART: [art] Store in in slot 0x4
3,622,354 UART: [art] Derive Key Pair
3,622,714 UART: [art] Store priv key in slot 0x5
3,635,712 UART: [art] Derive Key Pair - Done
3,650,381 UART: [art] Signing Cert with AUTHO
3,650,861 UART: RITY.KEYID = 7
3,665,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,690 UART: [art] PUB.X = 48CC306C63AF0334D02EB719E9CF0E5424C19D931152F758ABA07BBCC7E8D6A1D09DD16282CCB44388224002FD38434E
3,673,457 UART: [art] PUB.Y = 2BBBEBB9B43367FBC33B17EE1A884BB5F17E16469F7A3FA78751F9975E7E7B08B330D27627F694E1E54D8B808DBB921E
3,680,416 UART: [art] SIG.R = A03215305AC600BAA6C7E785316AD1E344EA2A70292B2D9AC664B60654F38111DFFB128AE981608B930652D29ED3F0EE
3,687,162 UART: [art] SIG.S = C4D3C29B53F50597EE1DC93ED5164074FB20CCE750590B7FA3B74DFC99B1389E0C1AA13201CD263953173824BB4CC988
3,710,837 UART: Caliptra RT
3,711,091 UART: [state] CFI Enabled
3,818,377 UART: [rt] RT listening for mailbox commands...
3,819,047 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,654 UART: [rt]cmd =0x41544d4e, len=14344
4,502,165 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,656 ready_for_fw is high
1,055,656 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,165,804 >>> mbox cmd response: success
3,227,153 UART:
3,227,169 UART: Running Caliptra FMC ...
3,227,577 UART:
3,227,631 UART: [state] CFI Enabled
3,238,059 UART: [fht] FMC Alias Private Key: 7
3,345,949 UART: [art] Extend RT PCRs Done
3,346,377 UART: [art] Lock RT PCRs Done
3,348,081 UART: [art] Populate DV Done
3,356,133 UART: [fht] FMC Alias Private Key: 7
3,357,143 UART: [art] Derive CDI
3,357,423 UART: [art] Store in in slot 0x4
3,443,064 UART: [art] Derive Key Pair
3,443,424 UART: [art] Store priv key in slot 0x5
3,456,438 UART: [art] Derive Key Pair - Done
3,471,524 UART: [art] Signing Cert with AUTHO
3,472,004 UART: RITY.KEYID = 7
3,486,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,565 UART: [art] PUB.X = 0F6464301484242F7F1B7AFDD805B7256B417413542043A7665E7DAECCD3566AEEAB55149485B53A61B665B9CC90EA16
3,494,329 UART: [art] PUB.Y = 70A000F62DECAB3DF87E61C49A71AAD5DBC7F5997486B44C1E6B007FFCE9C32B808795B1B2B8894B1556E58EEBC132BC
3,501,253 UART: [art] SIG.R = 0E34658647CB950FD815B00E0E61D30993B4846E587AE528389093A8A6C9BE2DBED2EB4995BA7E957564DD1E68D8A567
3,508,010 UART: [art] SIG.S = E01FC230A0FF501945B10C875B0451FD3C57825F5D9E894A39F30F17A5FB0EE772B4FF550D5D5CFBFEAADF3C608DB529
3,532,258 UART: Caliptra RT
3,532,512 UART: [state] CFI Enabled
3,640,359 UART: [rt] RT listening for mailbox commands...
3,641,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,698 UART: [rt]cmd =0x41544d4e, len=14344
4,314,943 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,174,948 ready_for_fw is high
1,174,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,882 UART: [idev] Erasing UDS.KEYID = 0
1,200,288 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,231 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,577 UART: [fwproc] Recv'd Img size: 114360 bytes
3,138,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,166,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,195,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,331,229 >>> mbox cmd response: success
3,332,424 UART: [afmc] ++
3,332,592 UART: [afmc] CDI.KEYID = 6
3,332,955 UART: [afmc] SUBJECT.KEYID = 7
3,333,381 UART: [afmc] AUTHORITY.KEYID = 5
3,369,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,385,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,386,484 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,392,194 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,398,084 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,403,795 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,411,847 UART: [afmc] --
3,412,971 UART: [cold-reset] --
3,413,787 UART: [state] Locking Datavault
3,415,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,415,856 UART: [state] Locking ICCM
3,416,348 UART: [exit] Launching FMC @ 0x40000130
3,421,677 UART:
3,421,693 UART: Running Caliptra FMC ...
3,422,101 UART:
3,422,244 UART: [state] CFI Enabled
3,433,066 UART: [fht] FMC Alias Private Key: 7
3,541,510 UART: [art] Extend RT PCRs Done
3,541,938 UART: [art] Lock RT PCRs Done
3,543,296 UART: [art] Populate DV Done
3,551,818 UART: [fht] FMC Alias Private Key: 7
3,552,770 UART: [art] Derive CDI
3,553,050 UART: [art] Store in in slot 0x4
3,638,841 UART: [art] Derive Key Pair
3,639,201 UART: [art] Store priv key in slot 0x5
3,652,479 UART: [art] Derive Key Pair - Done
3,667,261 UART: [art] Signing Cert with AUTHO
3,667,741 UART: RITY.KEYID = 7
3,682,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,683,724 UART: [art] PUB.X = 80FCD4AD16ABCA5F2E50C63CCB84F648413636A9DB3759FC3B857D2775063CD1A7384A59714753F0A4A4AA894EC4188E
3,690,499 UART: [art] PUB.Y = 9360061F1A45C78424502A0919D19AD1A0F39B75BA416ACDB4FD6EA92640871FCF833641CEED691CC2911634D5A357FB
3,697,447 UART: [art] SIG.R = 24C35AD93E1CEF6B8CCB5EACE24FCB509A2DCBFC403D81CCF0CC998BDCA80FB635999FA69C4AC8231ABBD1EDD17FDC4E
3,704,256 UART: [art] SIG.S = C2B22E287DBA45061F1B6395DF78188844FDF4A7455482B92BA410DBE524F9605D0D4DE4F5288D8E0E58A1BA9B4AEDAE
3,727,612 UART: Caliptra RT
3,727,958 UART: [state] CFI Enabled
3,835,621 UART: [rt] RT listening for mailbox commands...
3,836,291 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,122 UART: [rt]cmd =0x41544d4e, len=14344
4,524,831 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,521 ready_for_fw is high
1,056,521 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,168,336 >>> mbox cmd response: success
3,230,485 UART:
3,230,501 UART: Running Caliptra FMC ...
3,230,909 UART:
3,231,052 UART: [state] CFI Enabled
3,242,038 UART: [fht] FMC Alias Private Key: 7
3,349,892 UART: [art] Extend RT PCRs Done
3,350,320 UART: [art] Lock RT PCRs Done
3,351,818 UART: [art] Populate DV Done
3,360,066 UART: [fht] FMC Alias Private Key: 7
3,361,010 UART: [art] Derive CDI
3,361,290 UART: [art] Store in in slot 0x4
3,447,373 UART: [art] Derive Key Pair
3,447,733 UART: [art] Store priv key in slot 0x5
3,461,183 UART: [art] Derive Key Pair - Done
3,475,998 UART: [art] Signing Cert with AUTHO
3,476,478 UART: RITY.KEYID = 7
3,491,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,643 UART: [art] PUB.X = C1C1FF37D4F13E8E58429C724ED583060AABAFDD83855B95CCF2AA33A9C7104C1DE0E73498D9D4D9991B612792F410EC
3,499,419 UART: [art] PUB.Y = BBCBFDD8E09B416C219A21E98E4B9583913AC545A258266679B99B17131469D02C48EBCF856EF918BE33B61860648D80
3,506,369 UART: [art] SIG.R = BEEC5246CC868AC1C8B69A2D3974C75381A4B8FFF59854CED43D873D01A69B76695B82E76A0666A3BBB3D30110AC2ABA
3,513,144 UART: [art] SIG.S = CF4B54437C0C89DA57EEA6F7BAE8C86AE8A6A00CFDA39CBF5D7245D6D24969EA3C4914C307723761EACB3EED7BF138D1
3,537,034 UART: Caliptra RT
3,537,380 UART: [state] CFI Enabled
3,646,012 UART: [rt] RT listening for mailbox commands...
3,646,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,307 UART: [rt]cmd =0x41544d4e, len=14344
4,322,485 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,530 UART:
192,904 UART: Running Caliptra ROM ...
194,037 UART:
194,186 UART: [state] CFI Enabled
264,824 UART: [state] LifecycleState = Unprovisioned
266,815 UART: [state] DebugLocked = No
268,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,207 UART: [kat] SHA2-256
443,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,419 UART: [kat] ++
454,949 UART: [kat] sha1
466,462 UART: [kat] SHA2-256
469,108 UART: [kat] SHA2-384
474,733 UART: [kat] SHA2-512-ACC
477,092 UART: [kat] ECC-384
2,768,973 UART: [kat] HMAC-384Kdf
2,800,662 UART: [kat] LMS
3,990,930 UART: [kat] --
3,995,397 UART: [cold-reset] ++
3,997,043 UART: [fht] Storing FHT @ 0x50003400
4,009,035 UART: [idev] ++
4,009,643 UART: [idev] CDI.KEYID = 6
4,010,530 UART: [idev] SUBJECT.KEYID = 7
4,011,771 UART: [idev] UDS.KEYID = 0
4,012,777 ready_for_fw is high
4,012,994 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,315 UART: [idev] Erasing UDS.KEYID = 0
7,348,801 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,867 UART: [idev] --
7,375,353 UART: [ldev] ++
7,375,927 UART: [ldev] CDI.KEYID = 6
7,376,886 UART: [ldev] SUBJECT.KEYID = 5
7,378,092 UART: [ldev] AUTHORITY.KEYID = 7
7,379,383 UART: [ldev] FE.KEYID = 1
7,421,985 UART: [ldev] Erasing FE.KEYID = 1
10,757,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,553 UART: [ldev] --
13,138,518 UART: [fwproc] Waiting for Commands...
13,141,365 UART: [fwproc] Received command 0x46574c44
13,143,540 UART: [fwproc] Received Image of size 114036 bytes
22,254,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,336,356 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,405,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,721,545 >>> mbox cmd response: success
22,725,780 UART: [afmc] ++
22,726,395 UART: [afmc] CDI.KEYID = 6
22,727,302 UART: [afmc] SUBJECT.KEYID = 7
22,728,516 UART: [afmc] AUTHORITY.KEYID = 5
26,087,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,385,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,387,905 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,402,461 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,417,220 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,431,417 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,452,820 UART: [afmc] --
28,457,376 UART: [cold-reset] --
28,460,808 UART: [state] Locking Datavault
28,464,974 UART: [state] Locking PCR0, PCR1 and PCR31
28,466,727 UART: [state] Locking ICCM
28,469,520 UART: [exit] Launching FMC @ 0x40000130
28,477,913 UART:
28,478,151 UART: Running Caliptra FMC ...
28,479,244 UART:
28,479,398 UART: [state] CFI Enabled
28,547,466 UART: [fht] FMC Alias Private Key: 7
30,885,153 UART: [art] Extend RT PCRs Done
30,886,533 UART: [art] Lock RT PCRs Done
30,887,937 UART: [art] Populate DV Done
30,893,190 UART: [fht] FMC Alias Private Key: 7
30,894,690 UART: [art] Derive CDI
30,895,445 UART: [art] Store in in slot 0x4
30,955,445 UART: [art] Derive Key Pair
30,956,440 UART: [art] Store priv key in slot 0x5
34,249,230 UART: [art] Derive Key Pair - Done
34,261,908 UART: [art] Signing Cert with AUTHO
34,263,206 UART: RITY.KEYID = 7
36,550,351 UART: [art] Erasing AUTHORITY.KEYID = 7
36,551,859 UART: [art] PUB.X = D56527F1E3A8C2B62BAB406FAB586909948FFE46DA018CF80F7B37F6BBE46BC3F81C04822F3386C30D725AA3A88F78BD
36,559,065 UART: [art] PUB.Y = 4EFC21F2F473A22FC3C4A1920204A1AFC9B20A7ACF54E18990B6F609EE1D63620A03823A6F9459C5BA61E757DA4D1FCF
36,566,356 UART: [art] SIG.R = 3D0F4A0CEB39BCFB2D6396396BA4E8946C2D2091B2979E81666BD6839972E6F2CCF1935C90263483D82CB3E1094A4666
36,573,734 UART: [art] SIG.S = 88BD9617F1F76D94660AFFEE9429B73C2759FFC844CB7D7E5535650860C8E982148F509961BAE380024491F1D22CEDFA
37,879,061 UART: Caliptra RT
37,879,749 UART: [state] CFI Enabled
38,039,672 UART: [rt] RT listening for mailbox commands...
38,042,083 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,197,443 UART: [rt]cmd =0x41544d4e, len=14344
42,381,830 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,805,241 ready_for_fw is high
3,805,638 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,271,577 >>> mbox cmd response: success
27,961,129 UART:
27,961,515 UART: Running Caliptra FMC ...
27,962,610 UART:
27,962,775 UART: [state] CFI Enabled
28,027,680 UART: [fht] FMC Alias Private Key: 7
30,366,441 UART: [art] Extend RT PCRs Done
30,367,663 UART: [art] Lock RT PCRs Done
30,369,360 UART: [art] Populate DV Done
30,374,622 UART: [fht] FMC Alias Private Key: 7
30,376,145 UART: [art] Derive CDI
30,376,876 UART: [art] Store in in slot 0x4
30,436,121 UART: [art] Derive Key Pair
30,437,115 UART: [art] Store priv key in slot 0x5
33,730,106 UART: [art] Derive Key Pair - Done
33,742,966 UART: [art] Signing Cert with AUTHO
33,744,295 UART: RITY.KEYID = 7
36,031,507 UART: [art] Erasing AUTHORITY.KEYID = 7
36,033,017 UART: [art] PUB.X = 248866B7C474FC5B890DC065D3E258475479A2033CAD03B1107DCA54C440D31077F70A13270BDA097F6AE769D31391D7
36,040,247 UART: [art] PUB.Y = ED2AC53DB73E3EB7C54B8CBA2CD5C4166DB84D2C873001CD5A8D15EAC9DAA0AC26853AD9515C3D27EACD427F6FA4692E
36,047,516 UART: [art] SIG.R = F4ADAD674398645C6309EA83EB55999BB9926E8627BFE3C42C4F07AD198F39A4DEDB2353963DB251D0D5E230CE41FACC
36,054,941 UART: [art] SIG.S = D19283DF4F118DCE0B6CF083479E1E595CDA0ACCAE18F47F58E9AAA6F488F2607C8CCED790D79238E7FA2ECAA79CC980
37,359,950 UART: Caliptra RT
37,360,640 UART: [state] CFI Enabled
37,521,191 UART: [rt] RT listening for mailbox commands...
37,523,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,678,705 UART: [rt]cmd =0x41544d4e, len=14344
41,889,379 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,544 UART:
192,904 UART: Running Caliptra ROM ...
194,208 UART:
603,757 UART: [state] CFI Enabled
615,543 UART: [state] LifecycleState = Unprovisioned
617,506 UART: [state] DebugLocked = No
619,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,612 UART: [kat] SHA2-256
793,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,943 UART: [kat] ++
804,420 UART: [kat] sha1
816,075 UART: [kat] SHA2-256
818,725 UART: [kat] SHA2-384
825,778 UART: [kat] SHA2-512-ACC
828,155 UART: [kat] ECC-384
3,110,381 UART: [kat] HMAC-384Kdf
3,121,191 UART: [kat] LMS
4,311,282 UART: [kat] --
4,315,995 UART: [cold-reset] ++
4,318,348 UART: [fht] Storing FHT @ 0x50003400
4,330,125 UART: [idev] ++
4,330,767 UART: [idev] CDI.KEYID = 6
4,331,676 UART: [idev] SUBJECT.KEYID = 7
4,332,918 UART: [idev] UDS.KEYID = 0
4,333,982 ready_for_fw is high
4,334,187 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,477,788 UART: [idev] Erasing UDS.KEYID = 0
7,618,102 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,093 UART: [idev] --
7,644,173 UART: [ldev] ++
7,644,782 UART: [ldev] CDI.KEYID = 6
7,645,851 UART: [ldev] SUBJECT.KEYID = 5
7,646,956 UART: [ldev] AUTHORITY.KEYID = 7
7,648,187 UART: [ldev] FE.KEYID = 1
7,658,832 UART: [ldev] Erasing FE.KEYID = 1
10,948,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,205 UART: [ldev] --
13,309,733 UART: [fwproc] Waiting for Commands...
13,313,119 UART: [fwproc] Received command 0x46574c44
13,315,295 UART: [fwproc] Received Image of size 114036 bytes
22,267,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,343,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,412,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,729,967 >>> mbox cmd response: success
22,733,934 UART: [afmc] ++
22,734,535 UART: [afmc] CDI.KEYID = 6
22,735,447 UART: [afmc] SUBJECT.KEYID = 7
22,736,721 UART: [afmc] AUTHORITY.KEYID = 5
26,051,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,347,499 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,349,763 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,364,393 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,379,058 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,393,306 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,415,066 UART: [afmc] --
28,418,283 UART: [cold-reset] --
28,421,874 UART: [state] Locking Datavault
28,426,695 UART: [state] Locking PCR0, PCR1 and PCR31
28,428,446 UART: [state] Locking ICCM
28,429,619 UART: [exit] Launching FMC @ 0x40000130
28,438,016 UART:
28,438,254 UART: Running Caliptra FMC ...
28,439,351 UART:
28,439,507 UART: [state] CFI Enabled
28,447,584 UART: [fht] FMC Alias Private Key: 7
30,778,649 UART: [art] Extend RT PCRs Done
30,779,865 UART: [art] Lock RT PCRs Done
30,781,648 UART: [art] Populate DV Done
30,787,113 UART: [fht] FMC Alias Private Key: 7
30,788,814 UART: [art] Derive CDI
30,789,629 UART: [art] Store in in slot 0x4
30,832,667 UART: [art] Derive Key Pair
30,833,669 UART: [art] Store priv key in slot 0x5
34,075,324 UART: [art] Derive Key Pair - Done
34,088,168 UART: [art] Signing Cert with AUTHO
34,089,484 UART: RITY.KEYID = 7
36,368,897 UART: [art] Erasing AUTHORITY.KEYID = 7
36,370,409 UART: [art] PUB.X = DD6EE7C24716895F5EE3D93C681A132B25DE21491AA9231CE2297E208AC28861E0483E541CE74377165771D11EC73EFB
36,377,630 UART: [art] PUB.Y = DD2FB187BE4A2871177824E33B1E693DDB022841C88ABBC2D86E73E2CCD780041F42B5CA57290D2E04A3EC6527E8EFE9
36,384,871 UART: [art] SIG.R = B919B31C6D500E101FFEBF8BC592B8D2B7CB5A60CBF79B89682C2E365493B96FB272351DEB587539C985DA27E1411D1A
36,392,299 UART: [art] SIG.S = BE8B50CC1EC82FE5BA9261421F1E319466460DA6F24DD8FE0314FE531C04A93D2A742731E22D5C6082B71A219D6B49E8
37,698,083 UART: Caliptra RT
37,698,779 UART: [state] CFI Enabled
37,815,997 UART: [rt] RT listening for mailbox commands...
37,818,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,973,393 UART: [rt]cmd =0x41544d4e, len=14344
42,106,313 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,134,866 ready_for_fw is high
4,135,506 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,737,656 >>> mbox cmd response: success
28,377,560 UART:
28,377,952 UART: Running Caliptra FMC ...
28,379,089 UART:
28,379,257 UART: [state] CFI Enabled
28,387,263 UART: [fht] FMC Alias Private Key: 7
30,717,564 UART: [art] Extend RT PCRs Done
30,718,787 UART: [art] Lock RT PCRs Done
30,720,199 UART: [art] Populate DV Done
30,725,738 UART: [fht] FMC Alias Private Key: 7
30,727,449 UART: [art] Derive CDI
30,728,262 UART: [art] Store in in slot 0x4
30,770,760 UART: [art] Derive Key Pair
30,771,798 UART: [art] Store priv key in slot 0x5
34,014,179 UART: [art] Derive Key Pair - Done
34,027,130 UART: [art] Signing Cert with AUTHO
34,028,461 UART: RITY.KEYID = 7
36,307,387 UART: [art] Erasing AUTHORITY.KEYID = 7
36,308,900 UART: [art] PUB.X = 91ED2121ABB5F67C2659F4D9456E4687F2382DD2481AA68B3A5504948E5C7F7C1BD807B45582FF148915FE9CE243C700
36,316,077 UART: [art] PUB.Y = 8FFF7FDA276CB57981516DF1047E103E58D5CCD2B1F3634A7337378B28C13B3309DB33FEB24063CFF834A0188E26B26C
36,323,363 UART: [art] SIG.R = 344F08A5379913794E0491643B3A955645958A490C8A1F64DCA5BD3A3961E7B46E927DE23D2EE37443CF707E996DDD97
36,330,721 UART: [art] SIG.S = 626474CA9275E3B73E9612948F940FF379F19DB4A9EB0AD2D30C79F885F95763C9B6061DD3AA03045E55B239895889C8
37,635,134 UART: Caliptra RT
37,635,842 UART: [state] CFI Enabled
37,752,981 UART: [rt] RT listening for mailbox commands...
37,755,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,910,775 UART: [rt]cmd =0x41544d4e, len=14344
42,147,362 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,449 UART:
192,817 UART: Running Caliptra ROM ...
193,921 UART:
194,081 UART: [state] CFI Enabled
261,097 UART: [state] LifecycleState = Unprovisioned
263,025 UART: [state] DebugLocked = No
265,222 UART: [state] WD Timer not started. Device not locked for debugging
269,115 UART: [kat] SHA2-256
448,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,794 UART: [kat] ++
460,333 UART: [kat] sha1
470,223 UART: [kat] SHA2-256
473,228 UART: [kat] SHA2-384
478,791 UART: [kat] SHA2-512-ACC
481,720 UART: [kat] ECC-384
2,947,192 UART: [kat] HMAC-384Kdf
2,970,472 UART: [kat] LMS
3,499,967 UART: [kat] --
3,502,783 UART: [cold-reset] ++
3,505,316 UART: [fht] FHT @ 0x50003400
3,516,298 UART: [idev] ++
3,516,868 UART: [idev] CDI.KEYID = 6
3,517,778 UART: [idev] SUBJECT.KEYID = 7
3,518,950 UART: [idev] UDS.KEYID = 0
3,519,872 ready_for_fw is high
3,520,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,875 UART: [idev] Erasing UDS.KEYID = 0
6,024,834 UART: [idev] Sha1 KeyId Algorithm
6,047,162 UART: [idev] --
6,052,193 UART: [ldev] ++
6,052,769 UART: [ldev] CDI.KEYID = 6
6,053,679 UART: [ldev] SUBJECT.KEYID = 5
6,054,898 UART: [ldev] AUTHORITY.KEYID = 7
6,056,139 UART: [ldev] FE.KEYID = 1
6,097,416 UART: [ldev] Erasing FE.KEYID = 1
8,605,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,259 UART: [ldev] --
10,412,396 UART: [fwproc] Wait for Commands...
10,414,368 UART: [fwproc] Recv command 0x46574c44
10,416,416 UART: [fwproc] Recv'd Img size: 114360 bytes
14,988,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,064,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,133,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,451,726 >>> mbox cmd response: success
15,455,679 UART: [afmc] ++
15,456,290 UART: [afmc] CDI.KEYID = 6
15,457,205 UART: [afmc] SUBJECT.KEYID = 7
15,458,385 UART: [afmc] AUTHORITY.KEYID = 5
17,995,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,720,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,722,207 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,738,130 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,754,142 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,770,098 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,791,644 UART: [afmc] --
19,796,105 UART: [cold-reset] --
19,799,211 UART: [state] Locking Datavault
19,804,241 UART: [state] Locking PCR0, PCR1 and PCR31
19,805,944 UART: [state] Locking ICCM
19,806,903 UART: [exit] Launching FMC @ 0x40000130
19,815,357 UART:
19,815,596 UART: Running Caliptra FMC ...
19,816,700 UART:
19,816,879 UART: [state] CFI Enabled
19,878,752 UART: [fht] FMC Alias Private Key: 7
21,642,563 UART: [art] Extend RT PCRs Done
21,643,782 UART: [art] Lock RT PCRs Done
21,645,239 UART: [art] Populate DV Done
21,650,653 UART: [fht] FMC Alias Private Key: 7
21,652,137 UART: [art] Derive CDI
21,652,900 UART: [art] Store in in slot 0x4
21,711,079 UART: [art] Derive Key Pair
21,712,127 UART: [art] Store priv key in slot 0x5
24,175,775 UART: [art] Derive Key Pair - Done
24,188,713 UART: [art] Signing Cert with AUTHO
24,190,021 UART: RITY.KEYID = 7
25,901,228 UART: [art] Erasing AUTHORITY.KEYID = 7
25,902,730 UART: [art] PUB.X = 2DD679C2F10F532D6DEF372CCA3C53500CF9033F0F05714B674A30AE387A37369D16CE5DA943DA727038449580B121A3
25,909,993 UART: [art] PUB.Y = 780B42640C0DED24978EF543499F7F41281739980CF188586ADB038285EBB8F13647BA745CA76E1F43ADC5E6D29C3D98
25,917,213 UART: [art] SIG.R = 84A4F79CDDD1C4733CD37E6FCFA6BEFE0BFBB181003AC3AFF4AC2DD5DA5593B6D8016BAE66D721ED78B8AF0B765F7B6E
25,924,643 UART: [art] SIG.S = 1BFDD0FBAD4898937C63577CE96EE1F4669DBF96FB36C838A31F81D28295B8A345A9BBFD3EA2E99BDF7163374F111F3B
26,903,383 UART: Caliptra RT
26,904,069 UART: [state] CFI Enabled
27,068,744 UART: [rt] RT listening for mailbox commands...
27,071,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,378 UART: [rt]cmd =0x41544d4e, len=14344
29,591,755 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,543 writing to cptra_bootfsm_go
192,630 UART:
192,986 UART: Running Caliptra ROM ...
194,178 UART:
194,333 UART: [state] CFI Enabled
267,530 UART: [state] LifecycleState = Unprovisioned
269,932 UART: [state] DebugLocked = No
272,589 UART: [state] WD Timer not started. Device not locked for debugging
277,136 UART: [kat] SHA2-256
467,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,785 UART: [kat] ++
478,235 UART: [kat] sha1
490,884 UART: [kat] SHA2-256
493,895 UART: [kat] SHA2-384
498,838 UART: [kat] SHA2-512-ACC
501,426 UART: [kat] ECC-384
2,950,343 UART: [kat] HMAC-384Kdf
2,972,459 UART: [kat] LMS
3,504,168 UART: [kat] --
3,508,448 UART: [cold-reset] ++
3,509,746 UART: [fht] FHT @ 0x50003400
3,521,084 UART: [idev] ++
3,521,724 UART: [idev] CDI.KEYID = 6
3,522,722 UART: [idev] SUBJECT.KEYID = 7
3,523,895 UART: [idev] UDS.KEYID = 0
3,524,823 ready_for_fw is high
3,525,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,072 UART: [idev] Erasing UDS.KEYID = 0
6,032,733 UART: [idev] Sha1 KeyId Algorithm
6,055,824 UART: [idev] --
6,060,421 UART: [ldev] ++
6,061,120 UART: [ldev] CDI.KEYID = 6
6,062,038 UART: [ldev] SUBJECT.KEYID = 5
6,063,203 UART: [ldev] AUTHORITY.KEYID = 7
6,064,441 UART: [ldev] FE.KEYID = 1
6,101,556 UART: [ldev] Erasing FE.KEYID = 1
8,609,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,413 UART: [ldev] --
10,414,030 UART: [fwproc] Wait for Commands...
10,415,800 UART: [fwproc] Recv command 0x46574c44
10,418,110 UART: [fwproc] Recv'd Img size: 114360 bytes
15,019,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,102,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,218,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,761,890 >>> mbox cmd response: success
15,766,056 UART: [afmc] ++
15,766,767 UART: [afmc] CDI.KEYID = 6
15,767,958 UART: [afmc] SUBJECT.KEYID = 7
15,769,452 UART: [afmc] AUTHORITY.KEYID = 5
18,302,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,026,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,028,087 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,043,203 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,058,348 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,073,204 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,097,381 UART: [afmc] --
20,100,118 UART: [cold-reset] --
20,103,829 UART: [state] Locking Datavault
20,110,890 UART: [state] Locking PCR0, PCR1 and PCR31
20,113,114 UART: [state] Locking ICCM
20,115,533 UART: [exit] Launching FMC @ 0x40000130
20,124,219 UART:
20,124,491 UART: Running Caliptra FMC ...
20,125,604 UART:
20,125,783 UART: [state] CFI Enabled
20,182,576 UART: [fht] FMC Alias Private Key: 7
21,946,874 UART: [art] Extend RT PCRs Done
21,948,084 UART: [art] Lock RT PCRs Done
21,949,883 UART: [art] Populate DV Done
21,955,402 UART: [fht] FMC Alias Private Key: 7
21,957,096 UART: [art] Derive CDI
21,957,914 UART: [art] Store in in slot 0x4
22,016,085 UART: [art] Derive Key Pair
22,017,123 UART: [art] Store priv key in slot 0x5
24,480,323 UART: [art] Derive Key Pair - Done
24,493,578 UART: [art] Signing Cert with AUTHO
24,494,886 UART: RITY.KEYID = 7
26,205,795 UART: [art] Erasing AUTHORITY.KEYID = 7
26,207,298 UART: [art] PUB.X = F4E36424445DB3B3C6C69442B251CA6E8A327D9E4E4FA293FB3447E2EBBFF23EF79C7849927C4C2D2CD41A989FFD1151
26,214,586 UART: [art] PUB.Y = 594726FB19E628B1BFF1F813C53716E324B0F1D8AB809148DDF56F21B62255EB9869DFB0FF0934F8552590BE7A26F2BE
26,221,801 UART: [art] SIG.R = D2C5AA5D1C6CDE1723E767C0783CCD0A54360EEA1BA0980F3CC05E6E15F7EF569B1AED5C1722B1A02EA41EB3DAC521BC
26,229,228 UART: [art] SIG.S = 16E212537B3B8554EC508C2D1198B2989A6D190721BF1E6B3FC1FEC96AD6CA8B79E70DEB1473A0AD3ADD78EAFD69A509
27,207,779 UART: Caliptra RT
27,208,464 UART: [state] CFI Enabled
27,373,879 UART: [rt] RT listening for mailbox commands...
27,376,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,560 UART: [rt]cmd =0x41544d4e, len=14344
29,894,947 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
3,427,218 ready_for_fw is high
3,427,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,817,240 >>> mbox cmd response: success
20,102,415 UART:
20,102,810 UART: Running Caliptra FMC ...
20,104,008 UART:
20,104,182 UART: [state] CFI Enabled
20,168,430 UART: [fht] FMC Alias Private Key: 7
21,932,716 UART: [art] Extend RT PCRs Done
21,933,945 UART: [art] Lock RT PCRs Done
21,935,361 UART: [art] Populate DV Done
21,940,792 UART: [fht] FMC Alias Private Key: 7
21,942,370 UART: [art] Derive CDI
21,943,198 UART: [art] Store in in slot 0x4
22,001,756 UART: [art] Derive Key Pair
22,002,757 UART: [art] Store priv key in slot 0x5
24,465,875 UART: [art] Derive Key Pair - Done
24,478,827 UART: [art] Signing Cert with AUTHO
24,480,136 UART: RITY.KEYID = 7
26,191,854 UART: [art] Erasing AUTHORITY.KEYID = 7
26,193,349 UART: [art] PUB.X = 4E19973E287EC7143D72CAC515F740FA21CD21CCA8F6D95B031E08E924727B8AD052B51F9F86688D52E66E7A9CD3955A
26,200,624 UART: [art] PUB.Y = 0994D6FC7750ADBA4BD7F4F259F9FB06D03E0B586D269B326AA68661DF74737908BDD21051BA6A08946C98ACD55F4EF7
26,207,868 UART: [art] SIG.R = 6D099C660FDD5F408842151D6F30FF2E6FCFF179A5EFCF121F8676FA4284FF914FE98A7F8C45744289196853CA68313C
26,215,244 UART: [art] SIG.S = 17AB053FEBA39C5A85A41D8E06F6C8658FBFDE9532E022340F3A3157F48D9FA59E2B1C5C8CB2E7790169E48E55E99626
27,193,622 UART: Caliptra RT
27,194,331 UART: [state] CFI Enabled
27,360,247 UART: [rt] RT listening for mailbox commands...
27,362,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,517,962 UART: [rt]cmd =0x41544d4e, len=14344
29,888,070 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,567 UART:
192,921 UART: Running Caliptra ROM ...
194,050 UART:
603,862 UART: [state] CFI Enabled
617,912 UART: [state] LifecycleState = Unprovisioned
620,323 UART: [state] DebugLocked = No
621,786 UART: [state] WD Timer not started. Device not locked for debugging
625,818 UART: [kat] SHA2-256
815,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,473 UART: [kat] ++
826,996 UART: [kat] sha1
838,119 UART: [kat] SHA2-256
841,172 UART: [kat] SHA2-384
846,667 UART: [kat] SHA2-512-ACC
849,250 UART: [kat] ECC-384
3,291,694 UART: [kat] HMAC-384Kdf
3,304,745 UART: [kat] LMS
3,836,558 UART: [kat] --
3,841,637 UART: [cold-reset] ++
3,842,861 UART: [fht] FHT @ 0x50003400
3,853,765 UART: [idev] ++
3,854,428 UART: [idev] CDI.KEYID = 6
3,855,462 UART: [idev] SUBJECT.KEYID = 7
3,856,562 UART: [idev] UDS.KEYID = 0
3,857,501 ready_for_fw is high
3,857,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,447 UART: [idev] Erasing UDS.KEYID = 0
6,334,396 UART: [idev] Sha1 KeyId Algorithm
6,356,282 UART: [idev] --
6,362,900 UART: [ldev] ++
6,363,579 UART: [ldev] CDI.KEYID = 6
6,364,483 UART: [ldev] SUBJECT.KEYID = 5
6,365,694 UART: [ldev] AUTHORITY.KEYID = 7
6,366,867 UART: [ldev] FE.KEYID = 1
6,379,559 UART: [ldev] Erasing FE.KEYID = 1
8,860,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,392 UART: [ldev] --
10,652,580 UART: [fwproc] Wait for Commands...
10,655,644 UART: [fwproc] Recv command 0x46574c44
10,657,951 UART: [fwproc] Recv'd Img size: 114360 bytes
15,285,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,362,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,478,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,020,392 >>> mbox cmd response: success
16,024,621 UART: [afmc] ++
16,025,333 UART: [afmc] CDI.KEYID = 6
16,026,517 UART: [afmc] SUBJECT.KEYID = 7
16,027,949 UART: [afmc] AUTHORITY.KEYID = 5
18,529,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,251,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,253,931 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,269,015 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,284,229 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,299,040 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,322,797 UART: [afmc] --
20,326,172 UART: [cold-reset] --
20,330,949 UART: [state] Locking Datavault
20,335,984 UART: [state] Locking PCR0, PCR1 and PCR31
20,338,164 UART: [state] Locking ICCM
20,340,526 UART: [exit] Launching FMC @ 0x40000130
20,349,189 UART:
20,349,421 UART: Running Caliptra FMC ...
20,350,529 UART:
20,350,685 UART: [state] CFI Enabled
20,359,026 UART: [fht] FMC Alias Private Key: 7
22,115,466 UART: [art] Extend RT PCRs Done
22,116,693 UART: [art] Lock RT PCRs Done
22,118,287 UART: [art] Populate DV Done
22,123,587 UART: [fht] FMC Alias Private Key: 7
22,125,175 UART: [art] Derive CDI
22,125,910 UART: [art] Store in in slot 0x4
22,168,931 UART: [art] Derive Key Pair
22,169,932 UART: [art] Store priv key in slot 0x5
24,596,598 UART: [art] Derive Key Pair - Done
24,609,587 UART: [art] Signing Cert with AUTHO
24,610,889 UART: RITY.KEYID = 7
26,316,263 UART: [art] Erasing AUTHORITY.KEYID = 7
26,317,773 UART: [art] PUB.X = DB7A26169D511855C08CD9A06E867A92494590D43254B6C7FAF944268955E8AC82871A7B45163A7F83166F65850AD705
26,324,974 UART: [art] PUB.Y = AAF9E47C826B315EB86D237429249DDD966BD847508FDF27D8A171DAD6EB4170AFCBAE669C05FA4E5B17BCAC0F522C8F
26,332,269 UART: [art] SIG.R = 66A6A51A607A40883F12EE87B2482499A018814C98241D40138764F7553C7F0D612578B63BFA2B29E972C4380263856A
26,339,600 UART: [art] SIG.S = 8EA54601D6EC8122E0578B2BB92122856FED68EADC8116149FA51FCEA4151110CE857AF04F8157A37608A5AA8D884471
27,318,671 UART: Caliptra RT
27,319,363 UART: [state] CFI Enabled
27,436,416 UART: [rt] RT listening for mailbox commands...
27,438,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,593,736 UART: [rt]cmd =0x41544d4e, len=14344
29,958,222 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,753,232 ready_for_fw is high
3,753,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,054,976 >>> mbox cmd response: success
20,309,809 UART:
20,310,206 UART: Running Caliptra FMC ...
20,311,316 UART:
20,311,469 UART: [state] CFI Enabled
20,319,307 UART: [fht] FMC Alias Private Key: 7
22,076,278 UART: [art] Extend RT PCRs Done
22,077,522 UART: [art] Lock RT PCRs Done
22,079,283 UART: [art] Populate DV Done
22,084,550 UART: [fht] FMC Alias Private Key: 7
22,086,090 UART: [art] Derive CDI
22,086,833 UART: [art] Store in in slot 0x4
22,129,653 UART: [art] Derive Key Pair
22,130,691 UART: [art] Store priv key in slot 0x5
24,557,479 UART: [art] Derive Key Pair - Done
24,570,536 UART: [art] Signing Cert with AUTHO
24,571,842 UART: RITY.KEYID = 7
26,276,903 UART: [art] Erasing AUTHORITY.KEYID = 7
26,278,410 UART: [art] PUB.X = 34DFBFE85D1D9822848C1BED03411BDD7EF2FCA808F60937997371A0CEE545811E29280F13EF26BF9E28E5C4202E193D
26,285,669 UART: [art] PUB.Y = E672A9A6A21A71B333BEC6DE4FB9E4A2D4AF474831AE98B812739127185D21F5217A67CB8DEFA49C94E86C49BFF4D09F
26,292,948 UART: [art] SIG.R = 8903797958B3CED192EC93D1E253748C8DD75D4E9E1FF6767F218E358DDD9A4C260F55411595E0EEE420EC112D24F240
26,300,352 UART: [art] SIG.S = F99162325FD89F76A75A3B75639E68BAC9C905053A6447CA6F0CCC9BE75192873EC2DC641DECA4F48D4C6ABC1E13A771
27,279,171 UART: Caliptra RT
27,279,902 UART: [state] CFI Enabled
27,397,416 UART: [rt] RT listening for mailbox commands...
27,399,714 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,554,869 UART: [rt]cmd =0x41544d4e, len=14344
29,923,351 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,340 UART: [kat] SHA2-512-ACC
897,241 UART: [kat] ECC-384
902,958 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,617 UART: [cold-reset] ++
1,476,971 UART: [fht] Storing FHT @ 0x50003400
1,479,820 UART: [idev] ++
1,479,988 UART: [idev] CDI.KEYID = 6
1,480,348 UART: [idev] SUBJECT.KEYID = 7
1,480,772 UART: [idev] UDS.KEYID = 0
1,481,117 ready_for_fw is high
1,481,117 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,612 UART: [idev] Erasing UDS.KEYID = 0
1,505,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,430 UART: [idev] --
1,515,477 UART: [ldev] ++
1,515,645 UART: [ldev] CDI.KEYID = 6
1,516,008 UART: [ldev] SUBJECT.KEYID = 5
1,516,434 UART: [ldev] AUTHORITY.KEYID = 7
1,516,897 UART: [ldev] FE.KEYID = 1
1,522,183 UART: [ldev] Erasing FE.KEYID = 1
1,547,762 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,508 UART: [ldev] --
1,586,883 UART: [fwproc] Waiting for Commands...
1,587,616 UART: [fwproc] Received command 0x46574c44
1,588,407 UART: [fwproc] Received Image of size 114360 bytes
4,970,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,998,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,027,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,163,392 >>> mbox cmd response: success
5,164,538 UART: [afmc] ++
5,164,706 UART: [afmc] CDI.KEYID = 6
5,165,068 UART: [afmc] SUBJECT.KEYID = 7
5,165,493 UART: [afmc] AUTHORITY.KEYID = 5
5,200,399 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,216,565 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,217,345 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,223,054 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,228,946 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,234,647 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,242,437 UART: [afmc] --
5,243,381 UART: [cold-reset] --
5,244,521 UART: [state] Locking Datavault
5,245,908 UART: [state] Locking PCR0, PCR1 and PCR31
5,246,512 UART: [state] Locking ICCM
5,247,022 UART: [exit] Launching FMC @ 0x40000130
5,252,351 UART:
5,252,367 UART: Running Caliptra FMC ...
5,252,775 UART:
5,252,829 UART: [state] CFI Enabled
5,263,229 UART: [fht] FMC Alias Private Key: 7
5,370,627 UART: [art] Extend RT PCRs Done
5,371,055 UART: [art] Lock RT PCRs Done
5,372,679 UART: [art] Populate DV Done
5,380,985 UART: [fht] FMC Alias Private Key: 7
5,382,099 UART: [art] Derive CDI
5,382,379 UART: [art] Store in in slot 0x4
5,468,412 UART: [art] Derive Key Pair
5,468,772 UART: [art] Store priv key in slot 0x5
5,481,628 UART: [art] Derive Key Pair - Done
5,496,181 UART: [art] Signing Cert with AUTHO
5,496,661 UART: RITY.KEYID = 7
5,511,827 UART: [art] Erasing AUTHORITY.KEYID = 7
5,512,592 UART: [art] PUB.X = 699512A462298F401D4F6A8AC6ED14A11F6A6E9DAB738E56747AF0BBCD74BED56BB4F8F529A04D161BD6539349C8A3DB
5,519,376 UART: [art] PUB.Y = 01DA22D2611B45A4B40C6C533A191DBE143C60520C5048A894961902325601F0B3E6D80EE3D5524A73C9C8DBDA045E0E
5,526,302 UART: [art] SIG.R = E69A4A4D7A605D1C4416548D1B481D9B22C586D0D90679684D14D42E433072849E397E206978F69AB55E1213468D225D
5,533,057 UART: [art] SIG.S = 12B68A2B33AFE6EB178BEB4CE8467CA11A7A4A7748056E36E278A2C03FD4DA76C390C949BEEE55329F76F0B1C1FA446F
5,557,403 UART: Caliptra RT
5,557,657 UART: [state] CFI Enabled
5,665,903 UART: [rt] RT listening for mailbox commands...
5,666,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,789,372 UART: [rt]cmd =0x41544d4e, len=14344
6,355,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,381 ready_for_fw is high
1,361,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,125,107 >>> mbox cmd response: success
5,186,060 UART:
5,186,076 UART: Running Caliptra FMC ...
5,186,484 UART:
5,186,538 UART: [state] CFI Enabled
5,197,058 UART: [fht] FMC Alias Private Key: 7
5,305,786 UART: [art] Extend RT PCRs Done
5,306,214 UART: [art] Lock RT PCRs Done
5,307,618 UART: [art] Populate DV Done
5,315,976 UART: [fht] FMC Alias Private Key: 7
5,316,944 UART: [art] Derive CDI
5,317,224 UART: [art] Store in in slot 0x4
5,402,801 UART: [art] Derive Key Pair
5,403,161 UART: [art] Store priv key in slot 0x5
5,416,571 UART: [art] Derive Key Pair - Done
5,431,099 UART: [art] Signing Cert with AUTHO
5,431,579 UART: RITY.KEYID = 7
5,446,789 UART: [art] Erasing AUTHORITY.KEYID = 7
5,447,554 UART: [art] PUB.X = 77A76BFDF4248C515760A478B07FEFC577AF7D3E52DCB51AD755D813FEA3BC2721BF23E1F10E854850E02E01E77039B0
5,454,328 UART: [art] PUB.Y = 309CB0992F8D2C4C350E663F9CE4DB2E9546244FEB233754AE4089AB9300600EE982E96119FD63EF242D669B1E4DDF3C
5,461,256 UART: [art] SIG.R = 23DCE1A3EBFCED489EF60AA206D198BE9D3F7F0A1C2FA4B9F715B0116399A4F32134BFA788790DDD8328504522FA5803
5,468,023 UART: [art] SIG.S = 74D3D2B98B3026D7BDD335455DB5EFB2EE0C6875FC97C17E34BBF6770383331B55B07196631E6B7181F3029B68B674B2
5,491,185 UART: Caliptra RT
5,491,439 UART: [state] CFI Enabled
5,600,400 UART: [rt] RT listening for mailbox commands...
5,601,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,649 UART: [rt]cmd =0x41544d4e, len=14344
6,286,735 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,276 UART: [kat] SHA2-256
882,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,322 UART: [kat] ++
886,474 UART: [kat] sha1
890,566 UART: [kat] SHA2-256
892,504 UART: [kat] SHA2-384
895,347 UART: [kat] SHA2-512-ACC
897,248 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,541 UART: [kat] LMS
1,475,737 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,006 UART: [fht] Storing FHT @ 0x50003400
1,479,703 UART: [idev] ++
1,479,871 UART: [idev] CDI.KEYID = 6
1,480,231 UART: [idev] SUBJECT.KEYID = 7
1,480,655 UART: [idev] UDS.KEYID = 0
1,481,000 ready_for_fw is high
1,481,000 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,661 UART: [idev] Erasing UDS.KEYID = 0
1,505,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,139 UART: [idev] --
1,515,394 UART: [ldev] ++
1,515,562 UART: [ldev] CDI.KEYID = 6
1,515,925 UART: [ldev] SUBJECT.KEYID = 5
1,516,351 UART: [ldev] AUTHORITY.KEYID = 7
1,516,814 UART: [ldev] FE.KEYID = 1
1,522,024 UART: [ldev] Erasing FE.KEYID = 1
1,547,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,999 UART: [ldev] --
1,586,268 UART: [fwproc] Waiting for Commands...
1,587,067 UART: [fwproc] Received command 0x46574c44
1,587,858 UART: [fwproc] Received Image of size 114360 bytes
5,159,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,215,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,351,850 >>> mbox cmd response: success
5,352,890 UART: [afmc] ++
5,353,058 UART: [afmc] CDI.KEYID = 6
5,353,420 UART: [afmc] SUBJECT.KEYID = 7
5,353,845 UART: [afmc] AUTHORITY.KEYID = 5
5,388,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,293 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,002 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,894 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,595 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,249 UART: [afmc] --
5,432,379 UART: [cold-reset] --
5,433,163 UART: [state] Locking Datavault
5,434,440 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,044 UART: [state] Locking ICCM
5,435,628 UART: [exit] Launching FMC @ 0x40000130
5,440,957 UART:
5,440,973 UART: Running Caliptra FMC ...
5,441,381 UART:
5,441,524 UART: [state] CFI Enabled
5,452,230 UART: [fht] FMC Alias Private Key: 7
5,559,924 UART: [art] Extend RT PCRs Done
5,560,352 UART: [art] Lock RT PCRs Done
5,561,628 UART: [art] Populate DV Done
5,569,980 UART: [fht] FMC Alias Private Key: 7
5,571,104 UART: [art] Derive CDI
5,571,384 UART: [art] Store in in slot 0x4
5,656,781 UART: [art] Derive Key Pair
5,657,141 UART: [art] Store priv key in slot 0x5
5,670,583 UART: [art] Derive Key Pair - Done
5,685,413 UART: [art] Signing Cert with AUTHO
5,685,893 UART: RITY.KEYID = 7
5,701,479 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,244 UART: [art] PUB.X = B9F37D310EBEB513E0E0FC49DCFD0D01E6A53EC67149888C72B86EC61EE4F2D4FC788E870C89F6C7F2A67E9F9D5A0D0C
5,709,018 UART: [art] PUB.Y = A2834D4D65D19CF10FE4411B32993991DDD677711CB9E90361B8AE34E58975D17990132B4AB9B41B85DB7F2D8FE152B7
5,715,964 UART: [art] SIG.R = 8B571B1C0DDD1D12BDF6AD7E43EB1B35B2A3F34309B23011D777B510EC266971E95CF89AFABD4AC62126D73E5E650200
5,722,715 UART: [art] SIG.S = 49F5176A5C74627CEB2A14094B96DE0D286A674B160447870D17202C312A47E649CA4CC05703F0BA3098C8D290973D3A
5,747,081 UART: Caliptra RT
5,747,427 UART: [state] CFI Enabled
5,856,153 UART: [rt] RT listening for mailbox commands...
5,856,823 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,386 UART: [rt]cmd =0x41544d4e, len=14344
6,541,844 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 ready_for_fw is high
1,362,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,276,980 >>> mbox cmd response: success
5,339,081 UART:
5,339,097 UART: Running Caliptra FMC ...
5,339,505 UART:
5,339,648 UART: [state] CFI Enabled
5,350,436 UART: [fht] FMC Alias Private Key: 7
5,458,212 UART: [art] Extend RT PCRs Done
5,458,640 UART: [art] Lock RT PCRs Done
5,460,398 UART: [art] Populate DV Done
5,468,762 UART: [fht] FMC Alias Private Key: 7
5,469,872 UART: [art] Derive CDI
5,470,152 UART: [art] Store in in slot 0x4
5,555,725 UART: [art] Derive Key Pair
5,556,085 UART: [art] Store priv key in slot 0x5
5,569,533 UART: [art] Derive Key Pair - Done
5,583,833 UART: [art] Signing Cert with AUTHO
5,584,313 UART: RITY.KEYID = 7
5,599,987 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,752 UART: [art] PUB.X = 7ADFE04037EF73158D0A9A8A0B329AE4F12A31F0B6CF11DDDA43831A416F0B39CC4371DA0CC1AACAF7CDE2515AE39DFF
5,607,538 UART: [art] PUB.Y = 0730B7705033ED0E263548949143B97BE212791AB0477B1BF5C718B6D7AE69B71B1147A5C3C82999A75CBD8F0D77CD60
5,614,477 UART: [art] SIG.R = CCB14A69E98F9E977338EB1A06B4DF203A559C20DCC3063BACD32A16A3BEC3E68CCCA9B2753D503259A723D5A7D23BB6
5,621,259 UART: [art] SIG.S = FAB76AE93BF40BE86A4D40F28DDB20F454B267679650A744387711C4FFA52243551C3257FD1811EFFFFABCAA15A22BC2
5,644,675 UART: Caliptra RT
5,645,021 UART: [state] CFI Enabled
5,752,598 UART: [rt] RT listening for mailbox commands...
5,753,268 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,987 UART: [rt]cmd =0x41544d4e, len=14344
6,441,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
901,989 UART: [kat] SHA2-256
903,929 UART: [kat] SHA2-384
906,706 UART: [kat] SHA2-512-ACC
908,607 UART: [kat] ECC-384
917,674 UART: [kat] HMAC-384Kdf
922,254 UART: [kat] LMS
1,170,582 UART: [kat] --
1,171,499 UART: [cold-reset] ++
1,171,857 UART: [fht] FHT @ 0x50003400
1,174,338 UART: [idev] ++
1,174,506 UART: [idev] CDI.KEYID = 6
1,174,866 UART: [idev] SUBJECT.KEYID = 7
1,175,290 UART: [idev] UDS.KEYID = 0
1,175,635 ready_for_fw is high
1,175,635 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,210 UART: [idev] Erasing UDS.KEYID = 0
1,200,175 UART: [idev] Sha1 KeyId Algorithm
1,208,727 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,506 UART: [ldev] SUBJECT.KEYID = 5
1,210,932 UART: [ldev] AUTHORITY.KEYID = 7
1,211,395 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,107 UART: [ldev] --
1,281,426 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 114360 bytes
3,137,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,165,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,194,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,330,383 >>> mbox cmd response: success
3,331,439 UART: [afmc] ++
3,331,607 UART: [afmc] CDI.KEYID = 6
3,331,969 UART: [afmc] SUBJECT.KEYID = 7
3,332,394 UART: [afmc] AUTHORITY.KEYID = 5
3,367,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,384,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,385,261 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,390,970 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,396,862 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,402,573 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,410,430 UART: [afmc] --
3,411,490 UART: [cold-reset] --
3,412,346 UART: [state] Locking Datavault
3,413,425 UART: [state] Locking PCR0, PCR1 and PCR31
3,414,029 UART: [state] Locking ICCM
3,414,491 UART: [exit] Launching FMC @ 0x40000130
3,419,820 UART:
3,419,836 UART: Running Caliptra FMC ...
3,420,244 UART:
3,420,298 UART: [state] CFI Enabled
3,430,466 UART: [fht] FMC Alias Private Key: 7
3,538,040 UART: [art] Extend RT PCRs Done
3,538,468 UART: [art] Lock RT PCRs Done
3,540,142 UART: [art] Populate DV Done
3,548,336 UART: [fht] FMC Alias Private Key: 7
3,549,308 UART: [art] Derive CDI
3,549,588 UART: [art] Store in in slot 0x4
3,635,133 UART: [art] Derive Key Pair
3,635,493 UART: [art] Store priv key in slot 0x5
3,649,041 UART: [art] Derive Key Pair - Done
3,663,687 UART: [art] Signing Cert with AUTHO
3,664,167 UART: RITY.KEYID = 7
3,679,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,680,196 UART: [art] PUB.X = 6D67594EB43AE629334944CB7E9E1C3F2474386195A2A650D53541475D90A1816DD8561868062007D603FE406DC63387
3,686,941 UART: [art] PUB.Y = 06BA2317BA9906C2BF2486F569649F83547FC039CDA9C28C6F9A145E0EB905E2876091234542590358A06B2BD6191AF3
3,693,870 UART: [art] SIG.R = C07C052A048C52A74B109E95D6EFE4EDA2FA73E4535E4712190AE845F212B44D3A1D39A99950B52254E8C5F1AF6D84B4
3,700,637 UART: [art] SIG.S = 8350E07584C5ECCF5F82D4155423CE995AF17E8C2E09B57BF83F6C1448FB1356C58F88EA2613A445599F1A23B34134B3
3,723,791 UART: Caliptra RT
3,724,045 UART: [state] CFI Enabled
3,832,209 UART: [rt] RT listening for mailbox commands...
3,832,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,350 UART: [rt]cmd =0x41544d4e, len=14344
4,508,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,779 ready_for_fw is high
1,059,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,176,069 >>> mbox cmd response: success
3,237,268 UART:
3,237,284 UART: Running Caliptra FMC ...
3,237,692 UART:
3,237,746 UART: [state] CFI Enabled
3,248,186 UART: [fht] FMC Alias Private Key: 7
3,355,260 UART: [art] Extend RT PCRs Done
3,355,688 UART: [art] Lock RT PCRs Done
3,356,766 UART: [art] Populate DV Done
3,365,092 UART: [fht] FMC Alias Private Key: 7
3,366,146 UART: [art] Derive CDI
3,366,426 UART: [art] Store in in slot 0x4
3,452,213 UART: [art] Derive Key Pair
3,452,573 UART: [art] Store priv key in slot 0x5
3,465,455 UART: [art] Derive Key Pair - Done
3,480,272 UART: [art] Signing Cert with AUTHO
3,480,752 UART: RITY.KEYID = 7
3,495,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,451 UART: [art] PUB.X = C18D796A084633305751657A97C1C812148A14DCCD8BE1B18710FD5CC1E5D6E707F9A139D97C2291F07323D5AD1E68A3
3,503,215 UART: [art] PUB.Y = 1B19A10530FB51ACE94274C20054F41C2DD0F08007215CD47BF3A7B8BB0F76DB26B11FAC56B0CB861E82C96EAA6DC8F8
3,510,150 UART: [art] SIG.R = 8DDFDF2B1CC14130FDF1FB913D35871C2A969FEB62381BC7937F917BAFAA9BE9B03B7482F4C4A7B55EAF3D3D39224DAD
3,516,944 UART: [art] SIG.S = 548771B6EDA3F17A8FFA992BB5EBD674A0F8B7924AFE486A388EE80027356E6EF649971B238FD197CA433C559CFBAE10
3,540,639 UART: Caliptra RT
3,540,893 UART: [state] CFI Enabled
3,648,580 UART: [rt] RT listening for mailbox commands...
3,649,250 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,941 UART: [rt]cmd =0x41544d4e, len=14344
4,330,355 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,797 UART: [kat] SHA2-512-ACC
908,698 UART: [kat] ECC-384
918,427 UART: [kat] HMAC-384Kdf
923,011 UART: [kat] LMS
1,171,339 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,185 UART: [idev] ++
1,175,353 UART: [idev] CDI.KEYID = 6
1,175,713 UART: [idev] SUBJECT.KEYID = 7
1,176,137 UART: [idev] UDS.KEYID = 0
1,176,482 ready_for_fw is high
1,176,482 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,064 UART: [idev] Sha1 KeyId Algorithm
1,209,458 UART: [idev] --
1,210,488 UART: [ldev] ++
1,210,656 UART: [ldev] CDI.KEYID = 6
1,211,019 UART: [ldev] SUBJECT.KEYID = 5
1,211,445 UART: [ldev] AUTHORITY.KEYID = 7
1,211,908 UART: [ldev] FE.KEYID = 1
1,217,154 UART: [ldev] Erasing FE.KEYID = 1
1,243,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,310 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,277 UART: [fwproc] Recv command 0x46574c44
1,284,005 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,317,414 >>> mbox cmd response: success
3,318,490 UART: [afmc] ++
3,318,658 UART: [afmc] CDI.KEYID = 6
3,319,020 UART: [afmc] SUBJECT.KEYID = 7
3,319,445 UART: [afmc] AUTHORITY.KEYID = 5
3,355,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,114 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,823 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,715 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,426 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,267 UART: [afmc] --
3,399,389 UART: [cold-reset] --
3,400,237 UART: [state] Locking Datavault
3,401,660 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,264 UART: [state] Locking ICCM
3,402,770 UART: [exit] Launching FMC @ 0x40000130
3,408,099 UART:
3,408,115 UART: Running Caliptra FMC ...
3,408,523 UART:
3,408,666 UART: [state] CFI Enabled
3,419,314 UART: [fht] FMC Alias Private Key: 7
3,527,260 UART: [art] Extend RT PCRs Done
3,527,688 UART: [art] Lock RT PCRs Done
3,529,128 UART: [art] Populate DV Done
3,537,452 UART: [fht] FMC Alias Private Key: 7
3,538,404 UART: [art] Derive CDI
3,538,684 UART: [art] Store in in slot 0x4
3,624,223 UART: [art] Derive Key Pair
3,624,583 UART: [art] Store priv key in slot 0x5
3,637,745 UART: [art] Derive Key Pair - Done
3,652,395 UART: [art] Signing Cert with AUTHO
3,652,875 UART: RITY.KEYID = 7
3,667,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,464 UART: [art] PUB.X = A76F94FA1BDEEF38AA330153F1B1AA97D6DB3B3EAE12F6095E9E31CDED6922E40DCABEC1A110D5EB4869B8ABB7C32588
3,675,253 UART: [art] PUB.Y = DE224761AD27CC315FFBA5A4589AA4AE60BA31C6D35FA0BB45854DD6A41E4E1D9E178CECE63B7AF9319CBCE6A098BE16
3,682,229 UART: [art] SIG.R = 0302F69E9623469F33F71E8C7041F32D0A0312A97253B10706ADC9AF4496E51CD259397F020FBC92814DAB84CBE3B340
3,688,973 UART: [art] SIG.S = 5CB6D3B141A61557CD7B50C1A5104B8AD3DAD8EC687032838A15976C57357419526C3FD16346F92638326227EED82127
3,713,092 UART: Caliptra RT
3,713,438 UART: [state] CFI Enabled
3,820,592 UART: [rt] RT listening for mailbox commands...
3,821,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,177 UART: [rt]cmd =0x41544d4e, len=14344
4,516,981 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,392 ready_for_fw is high
1,061,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,166,512 >>> mbox cmd response: success
3,228,905 UART:
3,228,921 UART: Running Caliptra FMC ...
3,229,329 UART:
3,229,472 UART: [state] CFI Enabled
3,240,296 UART: [fht] FMC Alias Private Key: 7
3,348,098 UART: [art] Extend RT PCRs Done
3,348,526 UART: [art] Lock RT PCRs Done
3,349,988 UART: [art] Populate DV Done
3,358,298 UART: [fht] FMC Alias Private Key: 7
3,359,382 UART: [art] Derive CDI
3,359,662 UART: [art] Store in in slot 0x4
3,445,061 UART: [art] Derive Key Pair
3,445,421 UART: [art] Store priv key in slot 0x5
3,458,099 UART: [art] Derive Key Pair - Done
3,472,555 UART: [art] Signing Cert with AUTHO
3,473,035 UART: RITY.KEYID = 7
3,488,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,180 UART: [art] PUB.X = 22A047A16CD2EB17FE3B62CD9EB9E360E9834174431750C70BF51561F3A348AB2DCAE0946A4CC53A8FAB1EA3E17F8B2C
3,495,963 UART: [art] PUB.Y = E5C6D2CBF23C3A7613135ACD1447907874EDC34E36B60E32C6C5E74949BD98C02091F71CEAD5102AAED312948F0C1AD8
3,502,917 UART: [art] SIG.R = 1F63CEDC0F4D1350C40005AED320D037AFBC151E4219ED1D696F52FAE32E42F95AE12F3082566CB9BDAE0CC0552840F3
3,509,670 UART: [art] SIG.S = FF5D64F5FF2F0668BDCEB88D63456A8FC3687BD2083ECC83927A1D2CC05F700188A6D8ECE81E9B27E62F6A5425126135
3,533,408 UART: Caliptra RT
3,533,754 UART: [state] CFI Enabled
3,641,557 UART: [rt] RT listening for mailbox commands...
3,642,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,168 UART: [rt]cmd =0x41544d4e, len=14344
4,313,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Unprovisioned
86,335 UART: [state] DebugLocked = No
87,015 UART: [state] WD Timer not started. Device not locked for debugging
88,262 UART: [kat] SHA2-256
891,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,941 UART: [kat] ++
896,093 UART: [kat] sha1
900,281 UART: [kat] SHA2-256
902,221 UART: [kat] SHA2-384
904,754 UART: [kat] SHA2-512-ACC
906,655 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,131 UART: [idev] ++
1,173,299 UART: [idev] CDI.KEYID = 6
1,173,660 UART: [idev] SUBJECT.KEYID = 7
1,174,085 UART: [idev] UDS.KEYID = 0
1,174,431 ready_for_fw is high
1,174,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,198,433 UART: [idev] Sha1 KeyId Algorithm
1,207,347 UART: [idev] --
1,208,576 UART: [ldev] ++
1,208,744 UART: [ldev] CDI.KEYID = 6
1,209,108 UART: [ldev] SUBJECT.KEYID = 5
1,209,535 UART: [ldev] AUTHORITY.KEYID = 7
1,209,998 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,460 UART: [ldev] --
1,280,810 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46574c44
1,282,286 UART: [fwproc] Recv'd Img size: 114360 bytes
3,133,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,327,519 >>> mbox cmd response: success
3,328,698 UART: [afmc] ++
3,328,866 UART: [afmc] CDI.KEYID = 6
3,329,229 UART: [afmc] SUBJECT.KEYID = 7
3,329,655 UART: [afmc] AUTHORITY.KEYID = 5
3,365,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,936 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,646 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,536 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,247 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,408,293 UART: [afmc] --
3,409,351 UART: [cold-reset] --
3,410,175 UART: [state] Locking Datavault
3,411,378 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,982 UART: [state] Locking ICCM
3,412,544 UART: [exit] Launching FMC @ 0x40000130
3,417,873 UART:
3,417,889 UART: Running Caliptra FMC ...
3,418,297 UART:
3,418,351 UART: [state] CFI Enabled
3,429,035 UART: [fht] FMC Alias Private Key: 7
3,536,233 UART: [art] Extend RT PCRs Done
3,536,661 UART: [art] Lock RT PCRs Done
3,537,877 UART: [art] Populate DV Done
3,545,843 UART: [fht] FMC Alias Private Key: 7
3,546,807 UART: [art] Derive CDI
3,547,087 UART: [art] Store in in slot 0x4
3,632,966 UART: [art] Derive Key Pair
3,633,326 UART: [art] Store priv key in slot 0x5
3,645,936 UART: [art] Derive Key Pair - Done
3,660,502 UART: [art] Signing Cert with AUTHO
3,660,982 UART: RITY.KEYID = 7
3,676,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,797 UART: [art] PUB.X = C1ED6F892AE9701563926583A584740FD3643ADB509B8B3EE8DB722356F615C0E22BBD26959F2A0185654530F0DA8155
3,683,557 UART: [art] PUB.Y = C942DA1C832F0FD9AE3327B2FD337512A962912A3F6CCB0D433DC62390FA3F82C5418DE75D72076F0683A35420CB2C2F
3,690,501 UART: [art] SIG.R = C1236F48DD82982128C35724092AA7C264CD812EB97918989C7A809C83E0388ACAD74EAFF2709A6CAF9D34480543AEF5
3,697,267 UART: [art] SIG.S = B1824B68E408AC79E0A4719407F8917F4A583598C444B5761A43026210BA1E0028A37EFFB73FEC2CC4D28790DD63C0C2
3,720,845 UART: Caliptra RT
3,721,099 UART: [state] CFI Enabled
3,828,295 UART: [rt] RT listening for mailbox commands...
3,828,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,700 UART: [rt]cmd =0x41544d4e, len=14344
4,517,455 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,920 ready_for_fw is high
1,055,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,171,895 >>> mbox cmd response: success
3,234,276 UART:
3,234,292 UART: Running Caliptra FMC ...
3,234,700 UART:
3,234,754 UART: [state] CFI Enabled
3,245,246 UART: [fht] FMC Alias Private Key: 7
3,353,082 UART: [art] Extend RT PCRs Done
3,353,510 UART: [art] Lock RT PCRs Done
3,354,966 UART: [art] Populate DV Done
3,362,984 UART: [fht] FMC Alias Private Key: 7
3,364,042 UART: [art] Derive CDI
3,364,322 UART: [art] Store in in slot 0x4
3,450,025 UART: [art] Derive Key Pair
3,450,385 UART: [art] Store priv key in slot 0x5
3,463,891 UART: [art] Derive Key Pair - Done
3,478,533 UART: [art] Signing Cert with AUTHO
3,479,013 UART: RITY.KEYID = 7
3,494,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,094 UART: [art] PUB.X = EEB226D5721B7B4D93A4D446E8C911B5CF31D2A33E10FD179131F362FB3BD14A19343F489B14359DBC036CE0030B11C8
3,501,861 UART: [art] PUB.Y = E1AC90923EA6758686FC4A0C501737345E345CAB11868DD544510E1060FEB330A4DB81B6A157D610AA40F81679D500D4
3,508,781 UART: [art] SIG.R = 5ADA1E33853E70ABA3896E92CF3E5C600877FEB031D87E3B449D4ECEE9C12CCE64C29221D0367FD89360195BCD1D2E35
3,515,560 UART: [art] SIG.S = A665416B310836966CAD56EE6908DF90DBE9F3C26749A1E7A25E124901192F610FA04E2A59E73A872F1176B9F3D39F01
3,539,656 UART: Caliptra RT
3,539,910 UART: [state] CFI Enabled
3,646,641 UART: [rt] RT listening for mailbox commands...
3,647,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,120 UART: [rt]cmd =0x41544d4e, len=14344
4,340,331 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 ready_for_fw is high
1,174,494 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,207,990 UART: [idev] --
1,208,835 UART: [ldev] ++
1,209,003 UART: [ldev] CDI.KEYID = 6
1,209,367 UART: [ldev] SUBJECT.KEYID = 5
1,209,794 UART: [ldev] AUTHORITY.KEYID = 7
1,210,257 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,282,004 UART: [fwproc] Recv command 0x46574c44
1,282,737 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,538 >>> mbox cmd response: success
3,323,559 UART: [afmc] ++
3,323,727 UART: [afmc] CDI.KEYID = 6
3,324,090 UART: [afmc] SUBJECT.KEYID = 7
3,324,516 UART: [afmc] AUTHORITY.KEYID = 5
3,360,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,793 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,503 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,393 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,104 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,956 UART: [afmc] --
3,403,834 UART: [cold-reset] --
3,404,766 UART: [state] Locking Datavault
3,406,125 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,729 UART: [state] Locking ICCM
3,407,153 UART: [exit] Launching FMC @ 0x40000130
3,412,482 UART:
3,412,498 UART: Running Caliptra FMC ...
3,412,906 UART:
3,413,049 UART: [state] CFI Enabled
3,423,691 UART: [fht] FMC Alias Private Key: 7
3,531,333 UART: [art] Extend RT PCRs Done
3,531,761 UART: [art] Lock RT PCRs Done
3,533,151 UART: [art] Populate DV Done
3,541,391 UART: [fht] FMC Alias Private Key: 7
3,542,361 UART: [art] Derive CDI
3,542,641 UART: [art] Store in in slot 0x4
3,627,892 UART: [art] Derive Key Pair
3,628,252 UART: [art] Store priv key in slot 0x5
3,641,312 UART: [art] Derive Key Pair - Done
3,655,825 UART: [art] Signing Cert with AUTHO
3,656,305 UART: RITY.KEYID = 7
3,671,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,348 UART: [art] PUB.X = 180788CE771E38B5BD1EE5EB61C777B029670E5A23750905559F1BDFE3816E5238C9B943477462B4A65C9CBBA0D647F3
3,679,106 UART: [art] PUB.Y = 61A0D53C6652E64634CABAE1D0193305B2FE5D84BA88425B04CD725D0741DA656DBB2DF85C4A93A38E58F95ACF90EF58
3,686,059 UART: [art] SIG.R = 31C6A966713BB0206AA06E8251C86310256A3330A3758F0EBA917978DF2B901743297C016C766867C8612FE8940BD921
3,692,806 UART: [art] SIG.S = A7509CAC64C5CEF9A176EB8C8406FD15D72CF6070AC662195352921E7645AF286EE36D1CA9459C0EDD0AC4BCE19B239E
3,716,682 UART: Caliptra RT
3,717,028 UART: [state] CFI Enabled
3,825,411 UART: [rt] RT listening for mailbox commands...
3,826,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,776 UART: [rt]cmd =0x41544d4e, len=14344
4,511,956 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,321 ready_for_fw is high
1,056,321 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,548 >>> mbox cmd response: success
3,234,811 UART:
3,234,827 UART: Running Caliptra FMC ...
3,235,235 UART:
3,235,378 UART: [state] CFI Enabled
3,245,776 UART: [fht] FMC Alias Private Key: 7
3,354,002 UART: [art] Extend RT PCRs Done
3,354,430 UART: [art] Lock RT PCRs Done
3,356,034 UART: [art] Populate DV Done
3,364,272 UART: [fht] FMC Alias Private Key: 7
3,365,442 UART: [art] Derive CDI
3,365,722 UART: [art] Store in in slot 0x4
3,450,963 UART: [art] Derive Key Pair
3,451,323 UART: [art] Store priv key in slot 0x5
3,464,411 UART: [art] Derive Key Pair - Done
3,479,293 UART: [art] Signing Cert with AUTHO
3,479,773 UART: RITY.KEYID = 7
3,495,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,830 UART: [art] PUB.X = 34163E716EA83CA7E2C325114C097D5155F08F7C36C0C2294FB3D202C744C54172CF527BF241FF9BB6D0210635B5D231
3,502,589 UART: [art] PUB.Y = E974C1EEC39BF1A72A08B4A3B32F43F2EC42B58327560A22A1D4307ED776E90E77CD380980924DB57B7DE57D86886F42
3,509,531 UART: [art] SIG.R = 3AF17DFD3FE260A30DEFDD265C02CA5C7FB98DBF961B7B503684D582E3A96A081B6429304F06EBDEE2AF1E00EF40FE19
3,516,289 UART: [art] SIG.S = 6B4B425C3FDF2A4326297FE25E58C87BB88F106502F43AF22B604CA5EA1D3C382F8CC70E7BD7BDB8902E3E80D5C3EB9B
3,540,800 UART: Caliptra RT
3,541,146 UART: [state] CFI Enabled
3,648,702 UART: [rt] RT listening for mailbox commands...
3,649,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,243 UART: [rt]cmd =0x41544d4e, len=14344
4,322,812 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,802 writing to cptra_bootfsm_go
193,902 UART:
194,258 UART: Running Caliptra ROM ...
195,437 UART:
195,582 UART: [state] CFI Enabled
265,833 UART: [state] LifecycleState = Unprovisioned
267,734 UART: [state] DebugLocked = No
269,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,276 UART: [kat] SHA2-256
444,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,493 UART: [kat] ++
454,962 UART: [kat] sha1
467,035 UART: [kat] SHA2-256
469,684 UART: [kat] SHA2-384
475,241 UART: [kat] SHA2-512-ACC
477,598 UART: [kat] ECC-384
2,766,504 UART: [kat] HMAC-384Kdf
2,779,950 UART: [kat] LMS
3,970,260 UART: [kat] --
3,975,703 UART: [cold-reset] ++
3,977,279 UART: [fht] Storing FHT @ 0x50003400
3,988,463 UART: [idev] ++
3,989,021 UART: [idev] CDI.KEYID = 6
3,989,996 UART: [idev] SUBJECT.KEYID = 7
3,991,255 UART: [idev] UDS.KEYID = 0
3,992,325 ready_for_fw is high
3,992,514 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,931 UART: [idev] Erasing UDS.KEYID = 0
7,326,621 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,877 UART: [idev] --
7,354,187 UART: [ldev] ++
7,354,748 UART: [ldev] CDI.KEYID = 6
7,355,702 UART: [ldev] SUBJECT.KEYID = 5
7,356,909 UART: [ldev] AUTHORITY.KEYID = 7
7,358,180 UART: [ldev] FE.KEYID = 1
7,402,096 UART: [ldev] Erasing FE.KEYID = 1
10,733,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,881 UART: [ldev] --
13,095,136 UART: [fwproc] Waiting for Commands...
13,096,794 UART: [fwproc] Received command 0x46574c44
13,099,026 UART: [fwproc] Received Image of size 114036 bytes
21,656,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,733,428 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,802,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,119,522 >>> mbox cmd response: success
22,122,937 UART: [afmc] ++
22,123,535 UART: [afmc] CDI.KEYID = 6
22,124,499 UART: [afmc] SUBJECT.KEYID = 7
22,125,705 UART: [afmc] AUTHORITY.KEYID = 5
25,481,085 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,783,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,786,160 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,800,745 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,815,464 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,829,683 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,851,543 UART: [afmc] --
27,855,680 UART: [cold-reset] --
27,858,410 UART: [state] Locking Datavault
27,865,005 UART: [state] Locking PCR0, PCR1 and PCR31
27,866,757 UART: [state] Locking ICCM
27,868,789 UART: [exit] Launching FMC @ 0x40000130
27,877,179 UART:
27,877,417 UART: Running Caliptra FMC ...
27,878,510 UART:
27,878,661 UART: [state] CFI Enabled
27,944,914 UART: [fht] FMC Alias Private Key: 7
30,282,632 UART: [art] Extend RT PCRs Done
30,283,883 UART: [art] Lock RT PCRs Done
30,285,444 UART: [art] Populate DV Done
30,290,807 UART: [fht] FMC Alias Private Key: 7
30,292,335 UART: [art] Derive CDI
30,293,060 UART: [art] Store in in slot 0x4
30,353,340 UART: [art] Derive Key Pair
30,354,378 UART: [art] Store priv key in slot 0x5
33,647,338 UART: [art] Derive Key Pair - Done
33,660,243 UART: [art] Signing Cert with AUTHO
33,661,557 UART: RITY.KEYID = 7
35,948,824 UART: [art] Erasing AUTHORITY.KEYID = 7
35,950,333 UART: [art] PUB.X = E7FE236210DD608EB2A4A155B660469DD47A3EAAB3E0F6D817AF2885485153A855645653998A875691CA97D7E650D09C
35,957,579 UART: [art] PUB.Y = F7359BF116D555E138F362786E1E1A08C94B2B9766067EF10BCBCCD4AB7D31843BB71F688550EC56AC7F7BD9C06F163F
35,964,830 UART: [art] SIG.R = A55DD4CCEC3D2018D0611A1102F11335A7328287E4FFA9E230F579B13C445EF3497EF8777C22227E672DD96D7E4B993E
35,972,201 UART: [art] SIG.S = 45486A11C7954291877E01A6C1F7CE8BC78788126E12312CBF1829F3A9C026200E28B166EC2804A4BEB4233C90BC3C5D
37,277,329 UART: Caliptra RT
37,278,039 UART: [state] CFI Enabled
37,438,163 UART: [rt] RT listening for mailbox commands...
37,440,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,595,969 UART: [rt]cmd =0x41544d4e, len=14344
41,651,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,805,475 ready_for_fw is high
3,805,847 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,665,999 >>> mbox cmd response: success
27,366,084 UART:
27,366,466 UART: Running Caliptra FMC ...
27,367,569 UART:
27,367,714 UART: [state] CFI Enabled
27,436,714 UART: [fht] FMC Alias Private Key: 7
29,774,392 UART: [art] Extend RT PCRs Done
29,775,617 UART: [art] Lock RT PCRs Done
29,777,426 UART: [art] Populate DV Done
29,782,778 UART: [fht] FMC Alias Private Key: 7
29,784,335 UART: [art] Derive CDI
29,785,149 UART: [art] Store in in slot 0x4
29,846,083 UART: [art] Derive Key Pair
29,847,124 UART: [art] Store priv key in slot 0x5
33,139,761 UART: [art] Derive Key Pair - Done
33,152,766 UART: [art] Signing Cert with AUTHO
33,154,072 UART: RITY.KEYID = 7
35,441,880 UART: [art] Erasing AUTHORITY.KEYID = 7
35,443,387 UART: [art] PUB.X = E9AC20B095A5154FC5E37D46B0770972EC2FCC5E63E1D2D27E43A36750BC98ED9EB2B94957BCAA164B268CA4F67BA36B
35,450,605 UART: [art] PUB.Y = 98243DCC7C751FE9BED20F758BC4FB01BB9F9630030FCBF340D7E28211C3D09AE6EF772F9993120B1BF7A94596EA0E42
35,457,892 UART: [art] SIG.R = 6DC1EBB5DBADF1CBAE1E48A9B88DE4210298937288D51C4AB855449E4E6B242D9620EEBA0B2B1AA08B3664117315459D
35,465,244 UART: [art] SIG.S = 46D300EB6E0DD50B8D9D561CE1CAA7FB97D1CB0C20C1429DF6441B4C27BACF8CBD7779C2B94B120CC49892C219D895E1
36,770,266 UART: Caliptra RT
36,770,987 UART: [state] CFI Enabled
36,933,448 UART: [rt] RT listening for mailbox commands...
36,935,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,091,275 UART: [rt]cmd =0x41544d4e, len=14344
41,249,821 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,432 UART:
192,848 UART: Running Caliptra ROM ...
193,955 UART:
603,579 UART: [state] CFI Enabled
622,105 UART: [state] LifecycleState = Unprovisioned
624,060 UART: [state] DebugLocked = No
626,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,712 UART: [kat] SHA2-256
800,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,025 UART: [kat] ++
811,473 UART: [kat] sha1
822,270 UART: [kat] SHA2-256
824,989 UART: [kat] SHA2-384
830,191 UART: [kat] SHA2-512-ACC
832,589 UART: [kat] ECC-384
3,116,742 UART: [kat] HMAC-384Kdf
3,128,116 UART: [kat] LMS
4,318,218 UART: [kat] --
4,323,717 UART: [cold-reset] ++
4,325,868 UART: [fht] Storing FHT @ 0x50003400
4,337,221 UART: [idev] ++
4,337,793 UART: [idev] CDI.KEYID = 6
4,338,779 UART: [idev] SUBJECT.KEYID = 7
4,339,961 UART: [idev] UDS.KEYID = 0
4,341,096 ready_for_fw is high
4,341,333 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,660 UART: [idev] Erasing UDS.KEYID = 0
7,626,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,135 UART: [idev] --
7,653,974 UART: [ldev] ++
7,654,551 UART: [ldev] CDI.KEYID = 6
7,655,516 UART: [ldev] SUBJECT.KEYID = 5
7,656,726 UART: [ldev] AUTHORITY.KEYID = 7
7,658,007 UART: [ldev] FE.KEYID = 1
7,667,250 UART: [ldev] Erasing FE.KEYID = 1
10,960,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,076 UART: [ldev] --
13,323,615 UART: [fwproc] Waiting for Commands...
13,326,945 UART: [fwproc] Received command 0x46574c44
13,329,121 UART: [fwproc] Received Image of size 114036 bytes
22,360,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,435,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,504,817 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,821,820 >>> mbox cmd response: success
22,825,696 UART: [afmc] ++
22,826,287 UART: [afmc] CDI.KEYID = 6
22,827,226 UART: [afmc] SUBJECT.KEYID = 7
22,828,498 UART: [afmc] AUTHORITY.KEYID = 5
26,138,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,431,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,433,533 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,448,109 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,462,867 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,477,076 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,497,592 UART: [afmc] --
28,501,291 UART: [cold-reset] --
28,504,933 UART: [state] Locking Datavault
28,510,669 UART: [state] Locking PCR0, PCR1 and PCR31
28,512,366 UART: [state] Locking ICCM
28,513,972 UART: [exit] Launching FMC @ 0x40000130
28,522,380 UART:
28,522,614 UART: Running Caliptra FMC ...
28,523,641 UART:
28,523,787 UART: [state] CFI Enabled
28,532,170 UART: [fht] FMC Alias Private Key: 7
30,862,411 UART: [art] Extend RT PCRs Done
30,863,630 UART: [art] Lock RT PCRs Done
30,865,227 UART: [art] Populate DV Done
30,870,697 UART: [fht] FMC Alias Private Key: 7
30,872,292 UART: [art] Derive CDI
30,873,109 UART: [art] Store in in slot 0x4
30,915,928 UART: [art] Derive Key Pair
30,916,972 UART: [art] Store priv key in slot 0x5
34,159,501 UART: [art] Derive Key Pair - Done
34,172,718 UART: [art] Signing Cert with AUTHO
34,174,023 UART: RITY.KEYID = 7
36,453,434 UART: [art] Erasing AUTHORITY.KEYID = 7
36,454,947 UART: [art] PUB.X = 647E37421648646F0E92C90A74DBB74EAD2F0B757331274F19C38CCF610EECB3156887BB10E4F348A6A3A2F7350A2D41
36,462,213 UART: [art] PUB.Y = 0007EA11FDB07C6DC54A24A1C5229FD4BDC8D6744053FD555463C1D6F7996E7B31027427C15A9520670DC3C9D450BA03
36,469,446 UART: [art] SIG.R = B311DBCA9C66999F383D4F8E39DF047189E174696688089325720F268AFDF49C8B42B7AAA0F384B3E0B652D03BF44B5A
36,476,934 UART: [art] SIG.S = 3204FB760FCD6CCA17D6F4E383D706963F42725619ECB4C58424836B4816E7D61F3C23A12BC479EC825E24ABE4B3EBB6
37,782,287 UART: Caliptra RT
37,782,985 UART: [state] CFI Enabled
37,900,848 UART: [rt] RT listening for mailbox commands...
37,903,147 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,058,286 UART: [rt]cmd =0x41544d4e, len=14344
42,139,120 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
4,127,966 ready_for_fw is high
4,128,358 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,322,639 >>> mbox cmd response: success
27,957,138 UART:
27,957,518 UART: Running Caliptra FMC ...
27,958,821 UART:
27,958,983 UART: [state] CFI Enabled
27,966,814 UART: [fht] FMC Alias Private Key: 7
30,297,955 UART: [art] Extend RT PCRs Done
30,299,181 UART: [art] Lock RT PCRs Done
30,300,759 UART: [art] Populate DV Done
30,306,221 UART: [fht] FMC Alias Private Key: 7
30,307,761 UART: [art] Derive CDI
30,308,577 UART: [art] Store in in slot 0x4
30,351,068 UART: [art] Derive Key Pair
30,352,069 UART: [art] Store priv key in slot 0x5
33,594,254 UART: [art] Derive Key Pair - Done
33,607,257 UART: [art] Signing Cert with AUTHO
33,608,592 UART: RITY.KEYID = 7
35,887,926 UART: [art] Erasing AUTHORITY.KEYID = 7
35,889,427 UART: [art] PUB.X = 7464878E241E5C132803A9199B4426898E2205E044FE36B12244A161F6841137DD8527B5D134AE7DDE169C964930BF98
35,896,638 UART: [art] PUB.Y = 5A983ADA4DD0DBB480B9BB8F3F6CB6DE0C140C8C591A725DCDFA86A7BC51D93A77909EC56BC0C7F915F9855BDB7E87A2
35,903,908 UART: [art] SIG.R = 37A32728CCC81FF351AB6B6EB4F5A5B80527501FDFE54710AD0EBF031E351AFE4E4BBE32551B2BC307EB2D511F0B6721
35,911,339 UART: [art] SIG.S = 93BC1010B99D52B07DBF9730491EFEEABDD2724A5D423BBD70587FA8F340EF282CB321A33EC7A9F7A516F9E89751C4EC
37,217,053 UART: Caliptra RT
37,217,763 UART: [state] CFI Enabled
37,335,221 UART: [rt] RT listening for mailbox commands...
37,337,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,492,999 UART: [rt]cmd =0x41544d4e, len=14344
41,574,053 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
192,557 UART:
192,916 UART: Running Caliptra ROM ...
194,041 UART:
194,193 UART: [state] CFI Enabled
261,261 UART: [state] LifecycleState = Unprovisioned
263,172 UART: [state] DebugLocked = No
265,334 UART: [state] WD Timer not started. Device not locked for debugging
268,515 UART: [kat] SHA2-256
447,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,183 UART: [kat] ++
459,636 UART: [kat] sha1
470,742 UART: [kat] SHA2-256
473,792 UART: [kat] SHA2-384
480,857 UART: [kat] SHA2-512-ACC
483,804 UART: [kat] ECC-384
2,946,710 UART: [kat] HMAC-384Kdf
2,969,652 UART: [kat] LMS
3,499,038 UART: [kat] --
3,503,396 UART: [cold-reset] ++
3,505,042 UART: [fht] FHT @ 0x50003400
3,515,068 UART: [idev] ++
3,515,648 UART: [idev] CDI.KEYID = 6
3,516,534 UART: [idev] SUBJECT.KEYID = 7
3,517,786 UART: [idev] UDS.KEYID = 0
3,518,706 ready_for_fw is high
3,518,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,678 UART: [idev] Erasing UDS.KEYID = 0
6,024,429 UART: [idev] Sha1 KeyId Algorithm
6,047,672 UART: [idev] --
6,052,547 UART: [ldev] ++
6,053,125 UART: [ldev] CDI.KEYID = 6
6,054,044 UART: [ldev] SUBJECT.KEYID = 5
6,055,209 UART: [ldev] AUTHORITY.KEYID = 7
6,056,456 UART: [ldev] FE.KEYID = 1
6,097,039 UART: [ldev] Erasing FE.KEYID = 1
8,600,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,338 UART: [ldev] --
10,390,651 UART: [fwproc] Wait for Commands...
10,393,032 UART: [fwproc] Recv command 0x46574c44
10,395,132 UART: [fwproc] Recv'd Img size: 114360 bytes
14,990,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,069,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,137,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,455,273 >>> mbox cmd response: success
15,458,969 UART: [afmc] ++
15,459,563 UART: [afmc] CDI.KEYID = 6
15,460,453 UART: [afmc] SUBJECT.KEYID = 7
15,461,672 UART: [afmc] AUTHORITY.KEYID = 5
17,996,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,723,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,725,212 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,741,192 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,757,174 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,772,929 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,794,753 UART: [afmc] --
19,798,141 UART: [cold-reset] --
19,803,353 UART: [state] Locking Datavault
19,806,710 UART: [state] Locking PCR0, PCR1 and PCR31
19,808,359 UART: [state] Locking ICCM
19,809,644 UART: [exit] Launching FMC @ 0x40000130
19,818,097 UART:
19,818,345 UART: Running Caliptra FMC ...
19,819,452 UART:
19,819,611 UART: [state] CFI Enabled
19,881,200 UART: [fht] FMC Alias Private Key: 7
21,644,730 UART: [art] Extend RT PCRs Done
21,645,952 UART: [art] Lock RT PCRs Done
21,647,443 UART: [art] Populate DV Done
21,652,923 UART: [fht] FMC Alias Private Key: 7
21,654,405 UART: [art] Derive CDI
21,655,137 UART: [art] Store in in slot 0x4
21,713,860 UART: [art] Derive Key Pair
21,714,903 UART: [art] Store priv key in slot 0x5
24,178,220 UART: [art] Derive Key Pair - Done
24,191,176 UART: [art] Signing Cert with AUTHO
24,192,482 UART: RITY.KEYID = 7
25,904,310 UART: [art] Erasing AUTHORITY.KEYID = 7
25,905,966 UART: [art] PUB.X = 06FC003729E991FA4AD3E392D4C8CCF85593F190F57F4E5EBDD94945652B44B7A17FFA11F50C8642F6501F956AF15785
25,913,081 UART: [art] PUB.Y = 66585D957522C696F4715E8CFAC5797354F14DA0847998E45507B58AD0179FD307F293AFC6EFEA99AF63BDDCE30EA041
25,920,310 UART: [art] SIG.R = E71EB9DB4F08D4E4C6C49013D1679F239ED483932F3F3251FEF8515F80E21AB38D5339AE95EDE69F0620471A68FA899B
25,927,692 UART: [art] SIG.S = 6246A4A40504CEEA73300106A61F825EAEFD605BD10514DF7FAAFF7C46D70074A135ED0ED4C226B37E5BC338F953A9B3
26,906,769 UART: Caliptra RT
26,907,482 UART: [state] CFI Enabled
27,071,330 UART: [rt] RT listening for mailbox commands...
27,073,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,228,884 UART: [rt]cmd =0x41544d4e, len=14344
29,580,666 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
192,618 UART:
192,980 UART: Running Caliptra ROM ...
194,090 UART:
194,237 UART: [state] CFI Enabled
262,785 UART: [state] LifecycleState = Unprovisioned
265,193 UART: [state] DebugLocked = No
268,063 UART: [state] WD Timer not started. Device not locked for debugging
273,300 UART: [kat] SHA2-256
463,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,938 UART: [kat] ++
474,390 UART: [kat] sha1
485,119 UART: [kat] SHA2-256
488,135 UART: [kat] SHA2-384
494,551 UART: [kat] SHA2-512-ACC
497,133 UART: [kat] ECC-384
2,945,437 UART: [kat] HMAC-384Kdf
2,969,081 UART: [kat] LMS
3,500,844 UART: [kat] --
3,508,188 UART: [cold-reset] ++
3,509,130 UART: [fht] FHT @ 0x50003400
3,521,379 UART: [idev] ++
3,522,045 UART: [idev] CDI.KEYID = 6
3,522,937 UART: [idev] SUBJECT.KEYID = 7
3,524,189 UART: [idev] UDS.KEYID = 0
3,525,095 ready_for_fw is high
3,525,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,965 UART: [idev] Erasing UDS.KEYID = 0
6,028,560 UART: [idev] Sha1 KeyId Algorithm
6,050,200 UART: [idev] --
6,055,663 UART: [ldev] ++
6,056,348 UART: [ldev] CDI.KEYID = 6
6,057,237 UART: [ldev] SUBJECT.KEYID = 5
6,058,474 UART: [ldev] AUTHORITY.KEYID = 7
6,059,659 UART: [ldev] FE.KEYID = 1
6,099,486 UART: [ldev] Erasing FE.KEYID = 1
8,610,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,144 UART: [ldev] --
10,413,962 UART: [fwproc] Wait for Commands...
10,417,141 UART: [fwproc] Recv command 0x46574c44
10,419,449 UART: [fwproc] Recv'd Img size: 114360 bytes
15,041,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,127,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,243,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,786,780 >>> mbox cmd response: success
15,790,457 UART: [afmc] ++
15,791,174 UART: [afmc] CDI.KEYID = 6
15,792,294 UART: [afmc] SUBJECT.KEYID = 7
15,793,846 UART: [afmc] AUTHORITY.KEYID = 5
18,322,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,066,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,067,918 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,083,000 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,098,203 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,014 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,136,200 UART: [afmc] --
20,140,500 UART: [cold-reset] --
20,145,069 UART: [state] Locking Datavault
20,149,843 UART: [state] Locking PCR0, PCR1 and PCR31
20,152,061 UART: [state] Locking ICCM
20,154,147 UART: [exit] Launching FMC @ 0x40000130
20,162,806 UART:
20,163,048 UART: Running Caliptra FMC ...
20,164,077 UART:
20,164,225 UART: [state] CFI Enabled
20,221,721 UART: [fht] FMC Alias Private Key: 7
21,985,586 UART: [art] Extend RT PCRs Done
21,986,796 UART: [art] Lock RT PCRs Done
21,988,722 UART: [art] Populate DV Done
21,993,973 UART: [fht] FMC Alias Private Key: 7
21,995,553 UART: [art] Derive CDI
21,996,295 UART: [art] Store in in slot 0x4
22,054,575 UART: [art] Derive Key Pair
22,055,580 UART: [art] Store priv key in slot 0x5
24,518,861 UART: [art] Derive Key Pair - Done
24,531,540 UART: [art] Signing Cert with AUTHO
24,532,847 UART: RITY.KEYID = 7
26,245,719 UART: [art] Erasing AUTHORITY.KEYID = 7
26,247,219 UART: [art] PUB.X = 363EC2CA46BA71266E2773B972AFDB4DDA29C7DE478D882D743E82EFEF7178297D50C69F831CF6B1990DB4963492E4D9
26,254,507 UART: [art] PUB.Y = D17EE6031CC7243260390E4B274739EEFB0079420F16F33EBD0C4789CC47348686806B204347891A546D470E5CEB0AFF
26,261,728 UART: [art] SIG.R = 3B72FD10B19494A1C830E2296A562BC26EDDD597AC100407734C357E2789BF9E05D1A0B8AB71168DC765F24681327B2D
26,269,112 UART: [art] SIG.S = 7ECACC0055895EBE7A53093E49AFC7A57951B90E745E0FCDCBD0BE5E01DB974F2FA52C340966FAC0593A57C6A0DF1A91
27,248,168 UART: Caliptra RT
27,248,887 UART: [state] CFI Enabled
27,414,771 UART: [rt] RT listening for mailbox commands...
27,417,074 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,556 UART: [rt]cmd =0x41544d4e, len=14344
29,945,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,569 writing to cptra_bootfsm_go
3,439,116 ready_for_fw is high
3,439,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,846,369 >>> mbox cmd response: success
20,136,328 UART:
20,136,731 UART: Running Caliptra FMC ...
20,137,866 UART:
20,138,035 UART: [state] CFI Enabled
20,203,515 UART: [fht] FMC Alias Private Key: 7
21,967,222 UART: [art] Extend RT PCRs Done
21,968,451 UART: [art] Lock RT PCRs Done
21,970,080 UART: [art] Populate DV Done
21,975,329 UART: [fht] FMC Alias Private Key: 7
21,977,031 UART: [art] Derive CDI
21,977,773 UART: [art] Store in in slot 0x4
22,035,883 UART: [art] Derive Key Pair
22,036,895 UART: [art] Store priv key in slot 0x5
24,499,950 UART: [art] Derive Key Pair - Done
24,512,947 UART: [art] Signing Cert with AUTHO
24,514,252 UART: RITY.KEYID = 7
26,225,357 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,879 UART: [art] PUB.X = ACBE2ED06A46AF95B748E390D827B76453136E89601A437B8189E9A7960E5E8F0621A426F8DF42F0008B6D5CA266E5A1
26,234,120 UART: [art] PUB.Y = CA325F907EF91A2D8BB9AC16D1776EA1737179B94F565765972E48AA2B78DFE0ED3AC45AB8F301EBAEE92270AD9660BB
26,241,392 UART: [art] SIG.R = AB773756C797613809809828CE570225A2269AD16F0591B5882D32D990C2F58B27ABD9A6C5F93B97EAAF0A1251CDCFEC
26,248,768 UART: [art] SIG.S = CEF070E4698A653E66CE03FA4475219C6E91EDB004EB833E9990DBE695DB0673DA5F33EFE24DCCB07A6EB2FA88976D59
27,228,169 UART: Caliptra RT
27,228,888 UART: [state] CFI Enabled
27,393,312 UART: [rt] RT listening for mailbox commands...
27,395,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,861 UART: [rt]cmd =0x41544d4e, len=14344
29,908,936 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,345 UART:
192,699 UART: Running Caliptra ROM ...
193,785 UART:
603,718 UART: [state] CFI Enabled
618,021 UART: [state] LifecycleState = Unprovisioned
620,395 UART: [state] DebugLocked = No
622,427 UART: [state] WD Timer not started. Device not locked for debugging
627,800 UART: [kat] SHA2-256
817,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,470 UART: [kat] ++
828,992 UART: [kat] sha1
839,292 UART: [kat] SHA2-256
842,300 UART: [kat] SHA2-384
849,505 UART: [kat] SHA2-512-ACC
852,085 UART: [kat] ECC-384
3,294,249 UART: [kat] HMAC-384Kdf
3,307,676 UART: [kat] LMS
3,839,488 UART: [kat] --
3,844,775 UART: [cold-reset] ++
3,847,273 UART: [fht] FHT @ 0x50003400
3,859,095 UART: [idev] ++
3,859,800 UART: [idev] CDI.KEYID = 6
3,860,741 UART: [idev] SUBJECT.KEYID = 7
3,861,915 UART: [idev] UDS.KEYID = 0
3,862,839 ready_for_fw is high
3,863,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,654 UART: [idev] Erasing UDS.KEYID = 0
6,338,246 UART: [idev] Sha1 KeyId Algorithm
6,359,864 UART: [idev] --
6,365,530 UART: [ldev] ++
6,366,203 UART: [ldev] CDI.KEYID = 6
6,367,111 UART: [ldev] SUBJECT.KEYID = 5
6,368,317 UART: [ldev] AUTHORITY.KEYID = 7
6,369,542 UART: [ldev] FE.KEYID = 1
6,382,241 UART: [ldev] Erasing FE.KEYID = 1
8,858,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,200 UART: [ldev] --
10,650,935 UART: [fwproc] Wait for Commands...
10,654,161 UART: [fwproc] Recv command 0x46574c44
10,656,424 UART: [fwproc] Recv'd Img size: 114360 bytes
15,298,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,382,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,498,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,040,597 >>> mbox cmd response: success
16,043,902 UART: [afmc] ++
16,044,615 UART: [afmc] CDI.KEYID = 6
16,045,798 UART: [afmc] SUBJECT.KEYID = 7
16,047,283 UART: [afmc] AUTHORITY.KEYID = 5
18,549,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,271,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,273,799 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,288,828 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,304,057 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,318,933 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,343,338 UART: [afmc] --
20,346,609 UART: [cold-reset] --
20,349,760 UART: [state] Locking Datavault
20,354,463 UART: [state] Locking PCR0, PCR1 and PCR31
20,356,642 UART: [state] Locking ICCM
20,357,951 UART: [exit] Launching FMC @ 0x40000130
20,366,611 UART:
20,366,850 UART: Running Caliptra FMC ...
20,367,870 UART:
20,368,014 UART: [state] CFI Enabled
20,376,280 UART: [fht] FMC Alias Private Key: 7
22,132,968 UART: [art] Extend RT PCRs Done
22,134,203 UART: [art] Lock RT PCRs Done
22,135,954 UART: [art] Populate DV Done
22,141,425 UART: [fht] FMC Alias Private Key: 7
22,143,068 UART: [art] Derive CDI
22,143,807 UART: [art] Store in in slot 0x4
22,186,731 UART: [art] Derive Key Pair
22,187,771 UART: [art] Store priv key in slot 0x5
24,614,193 UART: [art] Derive Key Pair - Done
24,626,802 UART: [art] Signing Cert with AUTHO
24,628,105 UART: RITY.KEYID = 7
26,333,624 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,134 UART: [art] PUB.X = 4F1012FFA1FDC490874A23E2C19ADA8DF29AB194BA6749C704BDF2A65E4AC1AAD6114EFF2E6EA412252B8411DF70EEB6
26,342,439 UART: [art] PUB.Y = 69F24A5770EAD4A2B897DD2E816F14969F72B3CA2A5DE8F546FC7A00BA1D980F7752B29C52CB2A98861E4E0A15664C8C
26,349,725 UART: [art] SIG.R = 48CC802B799D6894DBD06553A5CAB9B53306B57E7045639EAB32B93990B90116F5CA7F70EF1E99BF5095292363611966
26,357,059 UART: [art] SIG.S = 67237192709B82E2E9F9BDC720279CCC40FE239DA52508C566392839A68B9E80C42E60209733A880EF88647D1B7C9335
27,336,077 UART: Caliptra RT
27,336,784 UART: [state] CFI Enabled
27,454,773 UART: [rt] RT listening for mailbox commands...
27,457,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,612,519 UART: [rt]cmd =0x41544d4e, len=14344
29,970,641 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,751,519 ready_for_fw is high
3,752,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,060,846 >>> mbox cmd response: success
20,313,493 UART:
20,313,886 UART: Running Caliptra FMC ...
20,315,031 UART:
20,315,192 UART: [state] CFI Enabled
20,323,404 UART: [fht] FMC Alias Private Key: 7
22,080,768 UART: [art] Extend RT PCRs Done
22,081,990 UART: [art] Lock RT PCRs Done
22,083,344 UART: [art] Populate DV Done
22,088,701 UART: [fht] FMC Alias Private Key: 7
22,090,457 UART: [art] Derive CDI
22,091,274 UART: [art] Store in in slot 0x4
22,133,553 UART: [art] Derive Key Pair
22,134,593 UART: [art] Store priv key in slot 0x5
24,561,077 UART: [art] Derive Key Pair - Done
24,574,147 UART: [art] Signing Cert with AUTHO
24,575,456 UART: RITY.KEYID = 7
26,281,098 UART: [art] Erasing AUTHORITY.KEYID = 7
26,282,883 UART: [art] PUB.X = 584985D5505A9729FB7F7A75A94EFCD120786DD0F4AE3CEE7903B0CF4013D5689FC613A8C94476F37D20177F6AEE9BEA
26,289,882 UART: [art] PUB.Y = BDDAD54D3EF95023D69F78D77F0357A27A5012B61104287AC0A35BFF0BB80D2774DE10036F18A6F8DB9A30899404294C
26,297,143 UART: [art] SIG.R = DD500465DC55330A399D2171CD624B53E81A0A400A34CC73B41E6F71409B2870BB7DF2AF20BDC1ED2B1BEF2F87CCEDBB
26,304,496 UART: [art] SIG.S = F3AE346852D8F6F98D47AA8DF280006BF59404A2763BE58FC15BBA71554C7A0EE697C44DF802F18FA7629F0172873495
27,283,395 UART: Caliptra RT
27,284,255 UART: [state] CFI Enabled
27,400,692 UART: [rt] RT listening for mailbox commands...
27,403,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,558,472 UART: [rt]cmd =0x41544d4e, len=14344
29,925,184 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,869 UART: [kat] SHA2-256
892,807 UART: [kat] SHA2-384
895,716 UART: [kat] SHA2-512-ACC
897,617 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,679 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 ready_for_fw is high
1,481,287 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,048 UART: [idev] Erasing UDS.KEYID = 0
1,505,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,682 UART: [idev] --
1,515,775 UART: [ldev] ++
1,515,943 UART: [ldev] CDI.KEYID = 6
1,516,306 UART: [ldev] SUBJECT.KEYID = 5
1,516,732 UART: [ldev] AUTHORITY.KEYID = 7
1,517,195 UART: [ldev] FE.KEYID = 1
1,522,371 UART: [ldev] Erasing FE.KEYID = 1
1,547,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,266 UART: [ldev] --
1,587,675 UART: [fwproc] Waiting for Commands...
1,588,364 UART: [fwproc] Received command 0x46574c44
1,589,155 UART: [fwproc] Received Image of size 114360 bytes
5,198,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,226,459 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,255,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,391,800 >>> mbox cmd response: success
5,392,924 UART: [afmc] ++
5,393,092 UART: [afmc] CDI.KEYID = 6
5,393,454 UART: [afmc] SUBJECT.KEYID = 7
5,393,879 UART: [afmc] AUTHORITY.KEYID = 5
5,428,945 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,445,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,446,079 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,451,788 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,457,680 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,463,381 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,471,273 UART: [afmc] --
5,472,273 UART: [cold-reset] --
5,473,277 UART: [state] Locking Datavault
5,474,696 UART: [state] Locking PCR0, PCR1 and PCR31
5,475,300 UART: [state] Locking ICCM
5,475,804 UART: [exit] Launching FMC @ 0x40000130
5,481,133 UART:
5,481,149 UART: Running Caliptra FMC ...
5,481,557 UART:
5,481,611 UART: [state] CFI Enabled
5,491,931 UART: [fht] FMC Alias Private Key: 7
5,599,651 UART: [art] Extend RT PCRs Done
5,600,079 UART: [art] Lock RT PCRs Done
5,601,657 UART: [art] Populate DV Done
5,609,669 UART: [fht] FMC Alias Private Key: 7
5,610,679 UART: [art] Derive CDI
5,610,959 UART: [art] Store in in slot 0x4
5,696,520 UART: [art] Derive Key Pair
5,696,880 UART: [art] Store priv key in slot 0x5
5,709,656 UART: [art] Derive Key Pair - Done
5,724,516 UART: [art] Signing Cert with AUTHO
5,724,996 UART: RITY.KEYID = 7
5,740,430 UART: [art] Erasing AUTHORITY.KEYID = 7
5,741,195 UART: [art] PUB.X = C243BE1592804A1A67F327C282EBCAC39B8683237C9D684FF57BCF0C66965A8C1F6C26FF0314EFF06E499EAA230A0C66
5,747,963 UART: [art] PUB.Y = B4B34FA442C291B9C104A24672A13DC9E1B03D3150706191CB713770832F47C1D8519560B4F44F9149CB6DD372098993
5,754,897 UART: [art] SIG.R = CADBFF3564148507CF470916704318DE995807CE61EB528ECFEFABB252D471E7975BD347535CB32790AD880542F91E02
5,761,654 UART: [art] SIG.S = D81685753F15F7728731FFC137A812C18C5998F6C726E1E3F24BC9B995835BCF3F3871CF39921C6C1BBCDDBA407E9153
5,785,141 UART: Caliptra RT
5,785,395 UART: [state] CFI Enabled
5,894,390 UART: [rt] RT listening for mailbox commands...
5,895,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,825 UART: [rt]cmd =0x41544d4e, len=14344
6,570,957 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,939 ready_for_fw is high
1,362,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,276,883 >>> mbox cmd response: success
5,338,104 UART:
5,338,120 UART: Running Caliptra FMC ...
5,338,528 UART:
5,338,582 UART: [state] CFI Enabled
5,348,838 UART: [fht] FMC Alias Private Key: 7
5,456,394 UART: [art] Extend RT PCRs Done
5,456,822 UART: [art] Lock RT PCRs Done
5,458,578 UART: [art] Populate DV Done
5,466,714 UART: [fht] FMC Alias Private Key: 7
5,467,858 UART: [art] Derive CDI
5,468,138 UART: [art] Store in in slot 0x4
5,553,471 UART: [art] Derive Key Pair
5,553,831 UART: [art] Store priv key in slot 0x5
5,566,893 UART: [art] Derive Key Pair - Done
5,581,689 UART: [art] Signing Cert with AUTHO
5,582,169 UART: RITY.KEYID = 7
5,597,217 UART: [art] Erasing AUTHORITY.KEYID = 7
5,597,982 UART: [art] PUB.X = B6428343783A78C7754BA5EC2472DB6EDC2FF504AE8CF7A95046862CBE3FC72091CA7F4D2C8D5D0817F954EEC7A20531
5,604,753 UART: [art] PUB.Y = 7A8DFEDB2A975D3738E9251BF42C2667429B8C857DFB22401601B9CBB3035E73EE461B0F4ECDF320975D4EB6BBBE1F22
5,611,708 UART: [art] SIG.R = 6BAD9611743673E78B73B87371D4642AEA38295111898643AC9091198E1460EBA0ADC11815C4C0D3818C77E84FA5662D
5,618,470 UART: [art] SIG.S = B40A458B13D7B9794335C17520C2018A409083D6E0FCBC7F6533288272D2385E40F59AEF3460C544F71C14D176E70D6E
5,642,218 UART: Caliptra RT
5,642,472 UART: [state] CFI Enabled
5,748,860 UART: [rt] RT listening for mailbox commands...
5,749,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,872,497 UART: [rt]cmd =0x41544d4e, len=14344
6,423,022 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,758 UART: [kat] SHA2-256
892,696 UART: [kat] SHA2-384
895,519 UART: [kat] SHA2-512-ACC
897,420 UART: [kat] ECC-384
903,339 UART: [kat] HMAC-384Kdf
908,071 UART: [kat] LMS
1,476,267 UART: [kat] --
1,477,298 UART: [cold-reset] ++
1,477,864 UART: [fht] Storing FHT @ 0x50003400
1,480,651 UART: [idev] ++
1,480,819 UART: [idev] CDI.KEYID = 6
1,481,179 UART: [idev] SUBJECT.KEYID = 7
1,481,603 UART: [idev] UDS.KEYID = 0
1,481,948 ready_for_fw is high
1,481,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,631 UART: [idev] Erasing UDS.KEYID = 0
1,506,257 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,989 UART: [idev] --
1,515,914 UART: [ldev] ++
1,516,082 UART: [ldev] CDI.KEYID = 6
1,516,445 UART: [ldev] SUBJECT.KEYID = 5
1,516,871 UART: [ldev] AUTHORITY.KEYID = 7
1,517,334 UART: [ldev] FE.KEYID = 1
1,522,386 UART: [ldev] Erasing FE.KEYID = 1
1,547,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,643 UART: [ldev] --
1,586,940 UART: [fwproc] Waiting for Commands...
1,587,709 UART: [fwproc] Received command 0x46574c44
1,588,500 UART: [fwproc] Received Image of size 114360 bytes
5,197,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,226,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,255,478 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,391,331 >>> mbox cmd response: success
5,392,549 UART: [afmc] ++
5,392,717 UART: [afmc] CDI.KEYID = 6
5,393,079 UART: [afmc] SUBJECT.KEYID = 7
5,393,504 UART: [afmc] AUTHORITY.KEYID = 5
5,428,756 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,444,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,445,436 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,451,145 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,457,037 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,462,738 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,470,626 UART: [afmc] --
5,471,634 UART: [cold-reset] --
5,472,260 UART: [state] Locking Datavault
5,473,323 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,927 UART: [state] Locking ICCM
5,474,521 UART: [exit] Launching FMC @ 0x40000130
5,479,850 UART:
5,479,866 UART: Running Caliptra FMC ...
5,480,274 UART:
5,480,417 UART: [state] CFI Enabled
5,491,131 UART: [fht] FMC Alias Private Key: 7
5,598,849 UART: [art] Extend RT PCRs Done
5,599,277 UART: [art] Lock RT PCRs Done
5,600,843 UART: [art] Populate DV Done
5,609,073 UART: [fht] FMC Alias Private Key: 7
5,610,153 UART: [art] Derive CDI
5,610,433 UART: [art] Store in in slot 0x4
5,695,870 UART: [art] Derive Key Pair
5,696,230 UART: [art] Store priv key in slot 0x5
5,709,458 UART: [art] Derive Key Pair - Done
5,724,186 UART: [art] Signing Cert with AUTHO
5,724,666 UART: RITY.KEYID = 7
5,739,468 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,233 UART: [art] PUB.X = A0EE286B68DE9B2E7E4E4B2AA08C30693F3C36D965C13E16372CF05D1F4A50074DE3C989C21D9CCE19685656B2F55DFD
5,747,012 UART: [art] PUB.Y = 65D3459B739FBFD68BE37F7F83F6EE37ADE335E30CFE9EBE11EEC94BBB60D19CF0FD1CACE18BD178ACBC0083B314B27F
5,753,969 UART: [art] SIG.R = 295DA9E0B445DCDA051338363B4F36A2CCBC4C6F9B360BD383FE7E4443873CCC6E6F4BAE162259AD67EE0BF5EF60CE83
5,760,750 UART: [art] SIG.S = 637C0958AD00D69A68615C1ABC4680AF5F5705D4277D0A14BAEA6B9F2F9B1EA1DEA06AD1907643534C1C239D6E86C3C8
5,784,818 UART: Caliptra RT
5,785,164 UART: [state] CFI Enabled
5,893,219 UART: [rt] RT listening for mailbox commands...
5,893,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,546 UART: [rt]cmd =0x41544d4e, len=14344
6,572,341 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,176 ready_for_fw is high
1,363,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,353,266 >>> mbox cmd response: success
5,416,099 UART:
5,416,115 UART: Running Caliptra FMC ...
5,416,523 UART:
5,416,666 UART: [state] CFI Enabled
5,427,354 UART: [fht] FMC Alias Private Key: 7
5,534,782 UART: [art] Extend RT PCRs Done
5,535,210 UART: [art] Lock RT PCRs Done
5,536,762 UART: [art] Populate DV Done
5,544,862 UART: [fht] FMC Alias Private Key: 7
5,545,900 UART: [art] Derive CDI
5,546,180 UART: [art] Store in in slot 0x4
5,631,935 UART: [art] Derive Key Pair
5,632,295 UART: [art] Store priv key in slot 0x5
5,645,967 UART: [art] Derive Key Pair - Done
5,660,652 UART: [art] Signing Cert with AUTHO
5,661,132 UART: RITY.KEYID = 7
5,675,912 UART: [art] Erasing AUTHORITY.KEYID = 7
5,676,677 UART: [art] PUB.X = 785A7FF62B06F87B2E2F5FA7D1EB4A05C554ACAC78D281E0808E3EB2F776CBEBA702ADCFBA0A8F436446830F13B1AF17
5,683,454 UART: [art] PUB.Y = 2BC6D08C4A63B96D1FEDFCD233077AB074215E316E6BF5EB5C0A9D80D8A0E61F2ABCC3542ABEEED84161524921DA2B86
5,690,418 UART: [art] SIG.R = D845F494B659C98EEBA3013AE3F01B4D8A10F2A91A5352E827FB63A4082C23BB1BCAA1AEDA09B908B20DE27F7FC7C7BF
5,697,195 UART: [art] SIG.S = 57C54C0A6AA39655AB8A4637C61894635E1D7B248E24C4FD7584EC5B30C6167D3BABAED72152E8D98D53318E49D5763C
5,721,377 UART: Caliptra RT
5,721,723 UART: [state] CFI Enabled
5,829,831 UART: [rt] RT listening for mailbox commands...
5,830,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,953,124 UART: [rt]cmd =0x41544d4e, len=14344
6,506,496 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,378 UART: [kat] HMAC-384Kdf
923,074 UART: [kat] LMS
1,171,402 UART: [kat] --
1,172,317 UART: [cold-reset] ++
1,172,649 UART: [fht] FHT @ 0x50003400
1,175,390 UART: [idev] ++
1,175,558 UART: [idev] CDI.KEYID = 6
1,175,918 UART: [idev] SUBJECT.KEYID = 7
1,176,342 UART: [idev] UDS.KEYID = 0
1,176,687 ready_for_fw is high
1,176,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,201,115 UART: [idev] Sha1 KeyId Algorithm
1,209,549 UART: [idev] --
1,210,839 UART: [ldev] ++
1,211,007 UART: [ldev] CDI.KEYID = 6
1,211,370 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,439 UART: [ldev] Erasing FE.KEYID = 1
1,244,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,319 UART: [ldev] --
1,283,760 UART: [fwproc] Wait for Commands...
1,284,584 UART: [fwproc] Recv command 0x46574c44
1,285,312 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,311,361 >>> mbox cmd response: success
3,312,461 UART: [afmc] ++
3,312,629 UART: [afmc] CDI.KEYID = 6
3,312,991 UART: [afmc] SUBJECT.KEYID = 7
3,313,416 UART: [afmc] AUTHORITY.KEYID = 5
3,348,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,391 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,100 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,992 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,703 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,484 UART: [afmc] --
3,391,514 UART: [cold-reset] --
3,392,326 UART: [state] Locking Datavault
3,393,429 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,033 UART: [state] Locking ICCM
3,394,683 UART: [exit] Launching FMC @ 0x40000130
3,400,012 UART:
3,400,028 UART: Running Caliptra FMC ...
3,400,436 UART:
3,400,490 UART: [state] CFI Enabled
3,410,822 UART: [fht] FMC Alias Private Key: 7
3,518,804 UART: [art] Extend RT PCRs Done
3,519,232 UART: [art] Lock RT PCRs Done
3,521,242 UART: [art] Populate DV Done
3,529,272 UART: [fht] FMC Alias Private Key: 7
3,530,298 UART: [art] Derive CDI
3,530,578 UART: [art] Store in in slot 0x4
3,616,021 UART: [art] Derive Key Pair
3,616,381 UART: [art] Store priv key in slot 0x5
3,629,715 UART: [art] Derive Key Pair - Done
3,644,325 UART: [art] Signing Cert with AUTHO
3,644,805 UART: RITY.KEYID = 7
3,660,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,908 UART: [art] PUB.X = 8688074C2B0B93ACAFBE841CC059C8309EB6D16293C48D0AA776EB9E6825B1216D639AECA9027018AAE127A1B6670239
3,667,667 UART: [art] PUB.Y = 6D27F3B4B2F2FD3A888016B15DD74A6F5E3902158930AF22A13E76A3710CCA5FAF3E07D35DF76A93290AE3B7D4E28A9B
3,674,617 UART: [art] SIG.R = 1E05AE24C41B38E4EDACFE5BF6AE32A4B753D7605B80591EC54E9D900657C89C49A758E200781E59691896BB827006FC
3,681,360 UART: [art] SIG.S = 7D4C7CC6C64C3F209AB85EBCAC1834B08F7549EB13FDFB087FA60612B263662230EA8302EBDEE16106E95AD77D9FD560
3,704,985 UART: Caliptra RT
3,705,239 UART: [state] CFI Enabled
3,812,913 UART: [rt] RT listening for mailbox commands...
3,813,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,374 UART: [rt]cmd =0x41544d4e, len=14344
4,499,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,601 ready_for_fw is high
1,059,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,767 >>> mbox cmd response: success
3,232,706 UART:
3,232,722 UART: Running Caliptra FMC ...
3,233,130 UART:
3,233,184 UART: [state] CFI Enabled
3,243,406 UART: [fht] FMC Alias Private Key: 7
3,350,374 UART: [art] Extend RT PCRs Done
3,350,802 UART: [art] Lock RT PCRs Done
3,352,372 UART: [art] Populate DV Done
3,360,392 UART: [fht] FMC Alias Private Key: 7
3,361,436 UART: [art] Derive CDI
3,361,716 UART: [art] Store in in slot 0x4
3,447,225 UART: [art] Derive Key Pair
3,447,585 UART: [art] Store priv key in slot 0x5
3,461,019 UART: [art] Derive Key Pair - Done
3,475,871 UART: [art] Signing Cert with AUTHO
3,476,351 UART: RITY.KEYID = 7
3,491,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,384 UART: [art] PUB.X = AC36489AACB21CFEEA9216DDD7DE291D03D11ED2995BDD595E2255F0A454EA78A74003871F26C8EADB896D44B3D4CA6A
3,499,168 UART: [art] PUB.Y = 7CEF01082EC49F6D09DA36A59F21F5C75D8F51899C9FBB5CB8CE4B31071E340861D4FB8A1A25F9264D73AB6B151AE5EC
3,506,119 UART: [art] SIG.R = 1C22CBBBA578B080C3BB2B643B5A91D0FE965BF0D8BE02C8CD6951521673BB78A688DFD19687A3DA127B0A780095755D
3,512,871 UART: [art] SIG.S = 4FE290B6090204CD1AE7E3DBC4ADC07DF8088CCE6CB1C02A3EAF7851E5D4C3122336A7D9A565D37E15A5207CEB6B9582
3,536,792 UART: Caliptra RT
3,537,046 UART: [state] CFI Enabled
3,644,920 UART: [rt] RT listening for mailbox commands...
3,645,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,407 UART: [rt]cmd =0x41544d4e, len=14344
4,343,550 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,341 UART: [kat] SHA2-512-ACC
908,242 UART: [kat] ECC-384
917,797 UART: [kat] HMAC-384Kdf
922,503 UART: [kat] LMS
1,170,831 UART: [kat] --
1,171,440 UART: [cold-reset] ++
1,171,898 UART: [fht] FHT @ 0x50003400
1,174,451 UART: [idev] ++
1,174,619 UART: [idev] CDI.KEYID = 6
1,174,979 UART: [idev] SUBJECT.KEYID = 7
1,175,403 UART: [idev] UDS.KEYID = 0
1,175,748 ready_for_fw is high
1,175,748 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,557 UART: [idev] Erasing UDS.KEYID = 0
1,200,734 UART: [idev] Sha1 KeyId Algorithm
1,209,164 UART: [idev] --
1,210,106 UART: [ldev] ++
1,210,274 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,063 UART: [ldev] AUTHORITY.KEYID = 7
1,211,526 UART: [ldev] FE.KEYID = 1
1,216,688 UART: [ldev] Erasing FE.KEYID = 1
1,242,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,698 UART: [ldev] --
1,282,089 UART: [fwproc] Wait for Commands...
1,282,867 UART: [fwproc] Recv command 0x46574c44
1,283,595 UART: [fwproc] Recv'd Img size: 114360 bytes
3,133,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,305 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,326,176 >>> mbox cmd response: success
3,327,290 UART: [afmc] ++
3,327,458 UART: [afmc] CDI.KEYID = 6
3,327,820 UART: [afmc] SUBJECT.KEYID = 7
3,328,245 UART: [afmc] AUTHORITY.KEYID = 5
3,363,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,934 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,643 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,535 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,246 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,927 UART: [afmc] --
3,406,989 UART: [cold-reset] --
3,407,977 UART: [state] Locking Datavault
3,409,130 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,734 UART: [state] Locking ICCM
3,410,154 UART: [exit] Launching FMC @ 0x40000130
3,415,483 UART:
3,415,499 UART: Running Caliptra FMC ...
3,415,907 UART:
3,416,050 UART: [state] CFI Enabled
3,426,462 UART: [fht] FMC Alias Private Key: 7
3,534,244 UART: [art] Extend RT PCRs Done
3,534,672 UART: [art] Lock RT PCRs Done
3,536,242 UART: [art] Populate DV Done
3,544,362 UART: [fht] FMC Alias Private Key: 7
3,545,498 UART: [art] Derive CDI
3,545,778 UART: [art] Store in in slot 0x4
3,631,323 UART: [art] Derive Key Pair
3,631,683 UART: [art] Store priv key in slot 0x5
3,645,273 UART: [art] Derive Key Pair - Done
3,660,394 UART: [art] Signing Cert with AUTHO
3,660,874 UART: RITY.KEYID = 7
3,676,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,177 UART: [art] PUB.X = 1D52AC9559B5A4C435823FB9AC8F10F4BC4093DDC684610F38174BCCDBB4801B229FAECA48108D8824FB42546153E961
3,683,950 UART: [art] PUB.Y = 4570F86CC96AE831E4B9A5C5B0D787CAC04700AA24E7E8C831CEA5447AEFD14E66AB7EB8CFB6649C911B681625F78B09
3,690,889 UART: [art] SIG.R = A5B156B8E8E3D1D36AE5162BA2D28B31A7F32F5418B4C1871EA86D99F1162DF2A5EEA1736881B7727057977FA13DF58F
3,697,665 UART: [art] SIG.S = 20BBFA17CB94C6FC6833F5D6B78AF7209C5895BADE7431CFE2CD2F8F56DB90B381856D1E6A72AFD6ABD47BFE2D2D8DEE
3,721,696 UART: Caliptra RT
3,722,042 UART: [state] CFI Enabled
3,830,111 UART: [rt] RT listening for mailbox commands...
3,830,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,432 UART: [rt]cmd =0x41544d4e, len=14344
4,518,857 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,138 ready_for_fw is high
1,061,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,161,484 >>> mbox cmd response: success
3,224,163 UART:
3,224,179 UART: Running Caliptra FMC ...
3,224,587 UART:
3,224,730 UART: [state] CFI Enabled
3,234,922 UART: [fht] FMC Alias Private Key: 7
3,342,636 UART: [art] Extend RT PCRs Done
3,343,064 UART: [art] Lock RT PCRs Done
3,344,462 UART: [art] Populate DV Done
3,352,744 UART: [fht] FMC Alias Private Key: 7
3,353,726 UART: [art] Derive CDI
3,354,006 UART: [art] Store in in slot 0x4
3,439,963 UART: [art] Derive Key Pair
3,440,323 UART: [art] Store priv key in slot 0x5
3,453,719 UART: [art] Derive Key Pair - Done
3,468,770 UART: [art] Signing Cert with AUTHO
3,469,250 UART: RITY.KEYID = 7
3,484,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,769 UART: [art] PUB.X = C9C8B61CB22F71E341BCC33A9F609C700C61164EC5D1E6187B87FB025E50E2962F0FD2D00B260884A9DEEC0C68A1D07F
3,491,533 UART: [art] PUB.Y = 027691C86024B3E12DB4BA67B9F24A795329759823ED0BB91E62BC16960F210A35547A307756C2DC74030BD546F3C883
3,498,457 UART: [art] SIG.R = ABBD82E2EDB25281AF1F57B2948463EF8EF281331B2E431823481EAA7276A4E6177EE5E031FA64A8064A8016C871EC58
3,505,228 UART: [art] SIG.S = A640EF25A9E44293B2CE83C5A17B36AE34BD6DEE06CA10894BE8A5E7DC96B489B7F817B6BC15591FE86A5B9552436D10
3,529,088 UART: Caliptra RT
3,529,434 UART: [state] CFI Enabled
3,636,462 UART: [rt] RT listening for mailbox commands...
3,637,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,931 UART: [rt]cmd =0x41544d4e, len=14344
4,313,375 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
903,960 UART: [kat] SHA2-512-ACC
905,861 UART: [kat] ECC-384
915,498 UART: [kat] HMAC-384Kdf
920,138 UART: [kat] LMS
1,168,450 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,857 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,173,911 ready_for_fw is high
1,173,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,402 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,754 UART: [ldev] --
1,280,092 UART: [fwproc] Wait for Commands...
1,280,709 UART: [fwproc] Recv command 0x46574c44
1,281,442 UART: [fwproc] Recv'd Img size: 114360 bytes
3,120,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,772 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,313,726 >>> mbox cmd response: success
3,314,861 UART: [afmc] ++
3,315,029 UART: [afmc] CDI.KEYID = 6
3,315,392 UART: [afmc] SUBJECT.KEYID = 7
3,315,818 UART: [afmc] AUTHORITY.KEYID = 5
3,351,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,745 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,455 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,345 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,056 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,870 UART: [afmc] --
3,394,870 UART: [cold-reset] --
3,395,812 UART: [state] Locking Datavault
3,396,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,479 UART: [state] Locking ICCM
3,397,983 UART: [exit] Launching FMC @ 0x40000130
3,403,312 UART:
3,403,328 UART: Running Caliptra FMC ...
3,403,736 UART:
3,403,790 UART: [state] CFI Enabled
3,414,304 UART: [fht] FMC Alias Private Key: 7
3,522,540 UART: [art] Extend RT PCRs Done
3,522,968 UART: [art] Lock RT PCRs Done
3,524,656 UART: [art] Populate DV Done
3,532,860 UART: [fht] FMC Alias Private Key: 7
3,533,984 UART: [art] Derive CDI
3,534,264 UART: [art] Store in in slot 0x4
3,620,179 UART: [art] Derive Key Pair
3,620,539 UART: [art] Store priv key in slot 0x5
3,633,601 UART: [art] Derive Key Pair - Done
3,648,349 UART: [art] Signing Cert with AUTHO
3,648,829 UART: RITY.KEYID = 7
3,663,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,364 UART: [art] PUB.X = D1991DAF7FDCE1EA7AAF369853123154124E25AC8A1A5C6044A3363ACF0168D1C3CE562494A80DFE100D52FC8E937112
3,671,133 UART: [art] PUB.Y = 603A9F5CCDFAD7278F171CC8C936150506A6194FF5D08102B44D65F7FBBAE294EF6FB54FBFA0446F9D557A879941B937
3,678,084 UART: [art] SIG.R = 3301F15B8988B3896D3E7865B6F9952E05D69CC30852A81A55C8FCF507D85BCBB0EF4CFBCDCA00675C6274726F51FF8D
3,684,830 UART: [art] SIG.S = AB41ED2ABE5917D47FB41DC9739C8D774E1C83965EDA619F6FDA518E1AA37B4E92AAD131AC64CF2AE59CC229B002A850
3,708,996 UART: Caliptra RT
3,709,250 UART: [state] CFI Enabled
3,816,981 UART: [rt] RT listening for mailbox commands...
3,817,651 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,534 UART: [rt]cmd =0x41544d4e, len=14344
4,486,613 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,078 ready_for_fw is high
1,055,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,146,307 >>> mbox cmd response: success
3,209,600 UART:
3,209,616 UART: Running Caliptra FMC ...
3,210,024 UART:
3,210,078 UART: [state] CFI Enabled
3,220,470 UART: [fht] FMC Alias Private Key: 7
3,328,474 UART: [art] Extend RT PCRs Done
3,328,902 UART: [art] Lock RT PCRs Done
3,330,512 UART: [art] Populate DV Done
3,338,496 UART: [fht] FMC Alias Private Key: 7
3,339,518 UART: [art] Derive CDI
3,339,798 UART: [art] Store in in slot 0x4
3,425,831 UART: [art] Derive Key Pair
3,426,191 UART: [art] Store priv key in slot 0x5
3,439,205 UART: [art] Derive Key Pair - Done
3,453,821 UART: [art] Signing Cert with AUTHO
3,454,301 UART: RITY.KEYID = 7
3,469,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,470,532 UART: [art] PUB.X = 4D180BB7231641CF8B14F5583A36CB6D5632F168820008FC67754046B336A364431D410F3E10907D620B3EF246E2368F
3,477,256 UART: [art] PUB.Y = 7A58465C08B8CC812A08537A9A2F7C5BD46C4F3F2C370B1E9EBA496159B74B0872AF7EC1B4A090522628304E1B780507
3,484,188 UART: [art] SIG.R = 5221EC6213C8CC079C700D1F01129E67E57B319EB03B20720ED2CAF946B4755F7D3573596ED0704D9258676F532D8A48
3,490,940 UART: [art] SIG.S = B72860C51E228F22602AB5F7A1F78F7CE4CE6FC20A6D88A51C227779C09B46029D074C09967FCB8385DA5D0DE656A5B0
3,514,566 UART: Caliptra RT
3,514,820 UART: [state] CFI Enabled
3,622,463 UART: [rt] RT listening for mailbox commands...
3,623,133 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,920 UART: [rt]cmd =0x41544d4e, len=14344
4,308,732 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,174,066 ready_for_fw is high
1,174,066 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,402 UART: [idev] Erasing UDS.KEYID = 0
1,198,300 UART: [idev] Sha1 KeyId Algorithm
1,207,288 UART: [idev] --
1,208,253 UART: [ldev] ++
1,208,421 UART: [ldev] CDI.KEYID = 6
1,208,785 UART: [ldev] SUBJECT.KEYID = 5
1,209,212 UART: [ldev] AUTHORITY.KEYID = 7
1,209,675 UART: [ldev] FE.KEYID = 1
1,215,135 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,451 UART: [ldev] --
1,280,897 UART: [fwproc] Wait for Commands...
1,281,688 UART: [fwproc] Recv command 0x46574c44
1,282,421 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,736 >>> mbox cmd response: success
3,323,885 UART: [afmc] ++
3,324,053 UART: [afmc] CDI.KEYID = 6
3,324,416 UART: [afmc] SUBJECT.KEYID = 7
3,324,842 UART: [afmc] AUTHORITY.KEYID = 5
3,360,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,541 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,251 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,141 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,852 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,864 UART: [afmc] --
3,403,842 UART: [cold-reset] --
3,404,640 UART: [state] Locking Datavault
3,405,911 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,515 UART: [state] Locking ICCM
3,407,161 UART: [exit] Launching FMC @ 0x40000130
3,412,490 UART:
3,412,506 UART: Running Caliptra FMC ...
3,412,914 UART:
3,413,057 UART: [state] CFI Enabled
3,423,645 UART: [fht] FMC Alias Private Key: 7
3,531,915 UART: [art] Extend RT PCRs Done
3,532,343 UART: [art] Lock RT PCRs Done
3,533,837 UART: [art] Populate DV Done
3,542,099 UART: [fht] FMC Alias Private Key: 7
3,543,081 UART: [art] Derive CDI
3,543,361 UART: [art] Store in in slot 0x4
3,629,202 UART: [art] Derive Key Pair
3,629,562 UART: [art] Store priv key in slot 0x5
3,642,798 UART: [art] Derive Key Pair - Done
3,657,308 UART: [art] Signing Cert with AUTHO
3,657,788 UART: RITY.KEYID = 7
3,672,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,527 UART: [art] PUB.X = 5131C0A6F01A9B6EE5DECAAD1294893F53B83243C952317C2C2A3530C676C95063A5053A1899C32A602BC433E356800A
3,680,287 UART: [art] PUB.Y = D0B9FE8296A71169B5A5D968591D3BDC1FD4A75F514E5B5A16585143A19B6CB1537602DEAB2FCA4F671591A0C094A3DD
3,687,244 UART: [art] SIG.R = B7153BC04DED9E1D459356A11663CB3BB3C8C8D8CFD50E819EFAF220F061EDC2644C1BD50BE6E5F6CB1121027A48947D
3,694,021 UART: [art] SIG.S = DA9C20D16D195C9FAA4C352AC956042A1AA0759887B3D5BD82FF35B76A3F3E17AE7FD18BA0FFC988122E3B16A09348E1
3,717,807 UART: Caliptra RT
3,718,153 UART: [state] CFI Enabled
3,825,961 UART: [rt] RT listening for mailbox commands...
3,826,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,172 UART: [rt]cmd =0x41544d4e, len=14344
4,507,896 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,245 ready_for_fw is high
1,056,245 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,167,400 >>> mbox cmd response: success
3,229,743 UART:
3,229,759 UART: Running Caliptra FMC ...
3,230,167 UART:
3,230,310 UART: [state] CFI Enabled
3,241,054 UART: [fht] FMC Alias Private Key: 7
3,349,458 UART: [art] Extend RT PCRs Done
3,349,886 UART: [art] Lock RT PCRs Done
3,351,406 UART: [art] Populate DV Done
3,359,328 UART: [fht] FMC Alias Private Key: 7
3,360,274 UART: [art] Derive CDI
3,360,554 UART: [art] Store in in slot 0x4
3,446,077 UART: [art] Derive Key Pair
3,446,437 UART: [art] Store priv key in slot 0x5
3,460,647 UART: [art] Derive Key Pair - Done
3,475,602 UART: [art] Signing Cert with AUTHO
3,476,082 UART: RITY.KEYID = 7
3,491,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,157 UART: [art] PUB.X = 926871BB1BD609366D3D5D1D4ED738072FB738B8C38B0DBE053D18AA8959EBE7B28B0A87664C0DC788673B3A111C08BF
3,498,914 UART: [art] PUB.Y = 5EB2B9836F2A7FA9A1058B215C55C538DA9101B36D66822E9A7F959BC00D69473488C5DD09B2A850C8B3ED344FE4D505
3,505,853 UART: [art] SIG.R = B8BF4512DD0FDAA22CFE0663A465976E352E309F97FEE05D54BF9F37ECD0C283A3CF9218484028AD30E22E92364B2A13
3,512,627 UART: [art] SIG.S = 92BBE2B2E94A83B88A1A385DDB8BC2031BD5956B723CFAB26008D712D4BE4E0A898E92A3C0A5C9FFE3E211D7128E5039
3,536,227 UART: Caliptra RT
3,536,573 UART: [state] CFI Enabled
3,643,459 UART: [rt] RT listening for mailbox commands...
3,644,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,018 UART: [rt]cmd =0x41544d4e, len=14344
4,327,413 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,522 writing to cptra_bootfsm_go
192,686 UART:
193,077 UART: Running Caliptra ROM ...
194,195 UART:
194,334 UART: [state] CFI Enabled
264,682 UART: [state] LifecycleState = Unprovisioned
266,666 UART: [state] DebugLocked = No
269,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,655 UART: [kat] SHA2-256
444,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,833 UART: [kat] ++
455,271 UART: [kat] sha1
465,073 UART: [kat] SHA2-256
467,723 UART: [kat] SHA2-384
474,136 UART: [kat] SHA2-512-ACC
476,504 UART: [kat] ECC-384
2,767,562 UART: [kat] HMAC-384Kdf
2,799,151 UART: [kat] LMS
3,989,439 UART: [kat] --
3,994,746 UART: [cold-reset] ++
3,995,707 UART: [fht] Storing FHT @ 0x50003400
4,006,803 UART: [idev] ++
4,007,370 UART: [idev] CDI.KEYID = 6
4,008,251 UART: [idev] SUBJECT.KEYID = 7
4,009,561 UART: [idev] UDS.KEYID = 0
4,010,578 ready_for_fw is high
4,010,781 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,128 UART: [idev] Erasing UDS.KEYID = 0
7,346,784 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,777 UART: [idev] --
7,374,124 UART: [ldev] ++
7,374,745 UART: [ldev] CDI.KEYID = 6
7,375,648 UART: [ldev] SUBJECT.KEYID = 5
7,376,909 UART: [ldev] AUTHORITY.KEYID = 7
7,378,134 UART: [ldev] FE.KEYID = 1
7,421,440 UART: [ldev] Erasing FE.KEYID = 1
10,751,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,705 UART: [ldev] --
13,112,669 UART: [fwproc] Waiting for Commands...
13,115,091 UART: [fwproc] Received command 0x46574c44
13,117,315 UART: [fwproc] Received Image of size 114036 bytes
21,837,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,909,055 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,977,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,294,330 >>> mbox cmd response: success
22,298,771 UART: [afmc] ++
22,299,354 UART: [afmc] CDI.KEYID = 6
22,300,314 UART: [afmc] SUBJECT.KEYID = 7
22,301,525 UART: [afmc] AUTHORITY.KEYID = 5
25,659,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,956,999 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,959,319 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,973,821 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,988,579 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,002,841 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,025,112 UART: [afmc] --
28,028,980 UART: [cold-reset] --
28,030,836 UART: [state] Locking Datavault
28,038,130 UART: [state] Locking PCR0, PCR1 and PCR31
28,039,886 UART: [state] Locking ICCM
28,041,871 UART: [exit] Launching FMC @ 0x40000130
28,050,263 UART:
28,050,492 UART: Running Caliptra FMC ...
28,051,586 UART:
28,051,740 UART: [state] CFI Enabled
28,117,690 UART: [fht] FMC Alias Private Key: 7
30,456,094 UART: [art] Extend RT PCRs Done
30,457,322 UART: [art] Lock RT PCRs Done
30,459,209 UART: [art] Populate DV Done
30,464,563 UART: [fht] FMC Alias Private Key: 7
30,466,308 UART: [art] Derive CDI
30,467,117 UART: [art] Store in in slot 0x4
30,526,114 UART: [art] Derive Key Pair
30,527,152 UART: [art] Store priv key in slot 0x5
33,820,098 UART: [art] Derive Key Pair - Done
33,833,152 UART: [art] Signing Cert with AUTHO
33,834,641 UART: RITY.KEYID = 7
36,120,267 UART: [art] Erasing AUTHORITY.KEYID = 7
36,121,784 UART: [art] PUB.X = 6F1A78532F53D41939B67CEB80A23D82A610F76C2D7BE27EE85CD72AC5BFA3311E56A78A5CD2A9A53A04B1E015AE03D0
36,129,055 UART: [art] PUB.Y = 6E480FA259F913B12731B4B214B033C74F3327BC83303AA6A65A9E9947D5CC6A73A6729B7EF3A5BD204DE3912B270AC4
36,136,275 UART: [art] SIG.R = 8498763BEE06439AFAC56CD4D7B12F064D77A53385D3F9654055B4FBDD458257C675EDE0CF8479ECF6EC7BC556F66704
36,143,653 UART: [art] SIG.S = C88E32A4A0A7AD5A3C6C9BA29AF6346C52922403AA9D778B6C5CE9F1E11420C79D91053E7FF74B90C4A7D7120E0042F3
37,449,235 UART: Caliptra RT
37,449,944 UART: [state] CFI Enabled
37,609,443 UART: [rt] RT listening for mailbox commands...
37,611,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,766,970 UART: [rt]cmd =0x41544d4e, len=14344
39,824,886 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
3,783,299 ready_for_fw is high
3,783,707 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,761,245 >>> mbox cmd response: success
27,453,532 UART:
27,453,909 UART: Running Caliptra FMC ...
27,455,089 UART:
27,455,255 UART: [state] CFI Enabled
27,520,480 UART: [fht] FMC Alias Private Key: 7
29,859,052 UART: [art] Extend RT PCRs Done
29,860,278 UART: [art] Lock RT PCRs Done
29,862,173 UART: [art] Populate DV Done
29,867,414 UART: [fht] FMC Alias Private Key: 7
29,869,127 UART: [art] Derive CDI
29,869,860 UART: [art] Store in in slot 0x4
29,929,387 UART: [art] Derive Key Pair
29,930,424 UART: [art] Store priv key in slot 0x5
33,223,395 UART: [art] Derive Key Pair - Done
33,236,500 UART: [art] Signing Cert with AUTHO
33,237,794 UART: RITY.KEYID = 7
35,525,222 UART: [art] Erasing AUTHORITY.KEYID = 7
35,526,728 UART: [art] PUB.X = 3AA26D17D0521F359FADB3E1411B346BC3E223F261DFF8351CA38FE98A7D40C94E47A3059D10AE47E7DDCEA115BA38E0
35,534,006 UART: [art] PUB.Y = 0BB52D3837D66D09E4082C4D7A8856FFE2D417BE37F5D9FC065710B154844EBA702F76D1A3D4E17A7679BD6D46278118
35,541,242 UART: [art] SIG.R = 20455A0698557A1B046CFF0B9987B225820F68EAB41B14F9358DF10E301389801C886D6B917729A52A295CF2ACACA276
35,548,617 UART: [art] SIG.S = 0346ABCB0841A8B718C930500168029B4DBB0E1427A4546762E8F9752BD09E4F5171E4A7979E9DBBE107681E3449CD63
36,853,680 UART: Caliptra RT
36,854,397 UART: [state] CFI Enabled
37,016,704 UART: [rt] RT listening for mailbox commands...
37,019,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,174,288 UART: [rt]cmd =0x41544d4e, len=14344
39,283,804 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,553 UART:
192,910 UART: Running Caliptra ROM ...
194,040 UART:
603,855 UART: [state] CFI Enabled
619,732 UART: [state] LifecycleState = Unprovisioned
621,708 UART: [state] DebugLocked = No
623,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,889 UART: [kat] SHA2-256
797,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,140 UART: [kat] ++
808,741 UART: [kat] sha1
819,404 UART: [kat] SHA2-256
822,059 UART: [kat] SHA2-384
826,912 UART: [kat] SHA2-512-ACC
829,275 UART: [kat] ECC-384
3,111,683 UART: [kat] HMAC-384Kdf
3,124,005 UART: [kat] LMS
4,314,063 UART: [kat] --
4,316,509 UART: [cold-reset] ++
4,318,224 UART: [fht] Storing FHT @ 0x50003400
4,330,912 UART: [idev] ++
4,331,546 UART: [idev] CDI.KEYID = 6
4,332,424 UART: [idev] SUBJECT.KEYID = 7
4,333,663 UART: [idev] UDS.KEYID = 0
4,334,648 ready_for_fw is high
4,334,850 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,057 UART: [idev] Erasing UDS.KEYID = 0
7,619,398 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,888 UART: [idev] --
7,645,478 UART: [ldev] ++
7,646,050 UART: [ldev] CDI.KEYID = 6
7,647,016 UART: [ldev] SUBJECT.KEYID = 5
7,648,249 UART: [ldev] AUTHORITY.KEYID = 7
7,649,486 UART: [ldev] FE.KEYID = 1
7,660,633 UART: [ldev] Erasing FE.KEYID = 1
10,951,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,719 UART: [ldev] --
13,308,847 UART: [fwproc] Waiting for Commands...
13,310,943 UART: [fwproc] Received command 0x46574c44
13,313,181 UART: [fwproc] Received Image of size 114036 bytes
22,195,624 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,275,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,344,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,661,143 >>> mbox cmd response: success
22,665,640 UART: [afmc] ++
22,666,242 UART: [afmc] CDI.KEYID = 6
22,667,208 UART: [afmc] SUBJECT.KEYID = 7
22,668,425 UART: [afmc] AUTHORITY.KEYID = 5
25,979,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,276,416 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,278,673 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,293,255 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,307,971 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,322,178 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,343,224 UART: [afmc] --
28,346,822 UART: [cold-reset] --
28,350,520 UART: [state] Locking Datavault
28,356,685 UART: [state] Locking PCR0, PCR1 and PCR31
28,358,439 UART: [state] Locking ICCM
28,359,997 UART: [exit] Launching FMC @ 0x40000130
28,368,415 UART:
28,368,664 UART: Running Caliptra FMC ...
28,369,767 UART:
28,369,927 UART: [state] CFI Enabled
28,377,952 UART: [fht] FMC Alias Private Key: 7
30,709,047 UART: [art] Extend RT PCRs Done
30,710,272 UART: [art] Lock RT PCRs Done
30,712,189 UART: [art] Populate DV Done
30,717,658 UART: [fht] FMC Alias Private Key: 7
30,719,251 UART: [art] Derive CDI
30,719,989 UART: [art] Store in in slot 0x4
30,762,524 UART: [art] Derive Key Pair
30,763,524 UART: [art] Store priv key in slot 0x5
34,005,786 UART: [art] Derive Key Pair - Done
34,018,901 UART: [art] Signing Cert with AUTHO
34,020,204 UART: RITY.KEYID = 7
36,299,607 UART: [art] Erasing AUTHORITY.KEYID = 7
36,301,111 UART: [art] PUB.X = A0A54AC36E0F77C24E7AE91F707712D7FD8405DAFCDAD7B924598C0BDC871F9D98319A25AD9099C6FDCE0490B1AC620C
36,308,373 UART: [art] PUB.Y = E886B36603872F16A82C0047842030CCF8F20D7853C97C4E8A0450E7FDBE247F049A7C0701BB96C984BE16153A45BA92
36,315,616 UART: [art] SIG.R = 5372A339BBAFCE6C4C600BE3D0F66C0A4B400C6AAB2E6A7D3187E4AEDE91F0E2D5B42B9AF18B28A0C3B9D62824CA0284
36,323,022 UART: [art] SIG.S = F541C1F73EE1FD773D6C0A0C7A653D6E86EB6E1751222EC608F54633863C2C196676717E911A2C2057E4419E78936693
37,628,354 UART: Caliptra RT
37,629,064 UART: [state] CFI Enabled
37,745,820 UART: [rt] RT listening for mailbox commands...
37,748,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,903,478 UART: [rt]cmd =0x41544d4e, len=14344
40,012,751 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,555 writing to cptra_bootfsm_go
4,130,802 ready_for_fw is high
4,131,195 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,408,042 >>> mbox cmd response: success
28,044,819 UART:
28,045,259 UART: Running Caliptra FMC ...
28,046,374 UART:
28,046,543 UART: [state] CFI Enabled
28,054,635 UART: [fht] FMC Alias Private Key: 7
30,385,299 UART: [art] Extend RT PCRs Done
30,386,526 UART: [art] Lock RT PCRs Done
30,388,212 UART: [art] Populate DV Done
30,393,630 UART: [fht] FMC Alias Private Key: 7
30,395,194 UART: [art] Derive CDI
30,396,013 UART: [art] Store in in slot 0x4
30,438,461 UART: [art] Derive Key Pair
30,439,504 UART: [art] Store priv key in slot 0x5
33,681,914 UART: [art] Derive Key Pair - Done
33,694,911 UART: [art] Signing Cert with AUTHO
33,696,247 UART: RITY.KEYID = 7
35,975,883 UART: [art] Erasing AUTHORITY.KEYID = 7
35,977,394 UART: [art] PUB.X = 7B5E7A4B18110A4B66C631D762D59DC080692F7D18BE586AC13910213C4FD62235590ECE395A154CE9FADEEB7ACF4650
35,984,616 UART: [art] PUB.Y = 87CFFE0FDB90B40189CC8D36ED8234F917E12B3352A8417611276770266B2A2B55D5E5AE7850426EF5F95A379B4F267D
35,991,845 UART: [art] SIG.R = 0056C66C5529E6BD98F2E988BBA0BE5C6B2C79654E3679F47F5098865C039E1815F6FE2A657A72CB16A0D2A04EBE1E59
35,999,260 UART: [art] SIG.S = 048CCCD6C6C6311EBC865C9490B8324349189FCA4A8A1222CAAFBF67A4E8DC1302614346B35536AEC06602BE1F8D13CF
37,304,536 UART: Caliptra RT
37,305,249 UART: [state] CFI Enabled
37,423,020 UART: [rt] RT listening for mailbox commands...
37,425,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,580,680 UART: [rt]cmd =0x41544d4e, len=14344
39,638,257 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,563 writing to cptra_bootfsm_go
192,734 UART:
193,097 UART: Running Caliptra ROM ...
194,499 UART:
194,654 UART: [state] CFI Enabled
268,844 UART: [state] LifecycleState = Unprovisioned
270,643 UART: [state] DebugLocked = No
272,817 UART: [state] WD Timer not started. Device not locked for debugging
275,719 UART: [kat] SHA2-256
454,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,365 UART: [kat] ++
466,909 UART: [kat] sha1
476,305 UART: [kat] SHA2-256
479,313 UART: [kat] SHA2-384
486,151 UART: [kat] SHA2-512-ACC
489,093 UART: [kat] ECC-384
2,951,150 UART: [kat] HMAC-384Kdf
2,973,487 UART: [kat] LMS
3,502,955 UART: [kat] --
3,508,185 UART: [cold-reset] ++
3,509,273 UART: [fht] FHT @ 0x50003400
3,518,897 UART: [idev] ++
3,519,459 UART: [idev] CDI.KEYID = 6
3,520,341 UART: [idev] SUBJECT.KEYID = 7
3,521,586 UART: [idev] UDS.KEYID = 0
3,522,486 ready_for_fw is high
3,522,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,662 UART: [idev] Erasing UDS.KEYID = 0
6,026,869 UART: [idev] Sha1 KeyId Algorithm
6,051,233 UART: [idev] --
6,055,324 UART: [ldev] ++
6,055,900 UART: [ldev] CDI.KEYID = 6
6,056,787 UART: [ldev] SUBJECT.KEYID = 5
6,057,998 UART: [ldev] AUTHORITY.KEYID = 7
6,059,240 UART: [ldev] FE.KEYID = 1
6,102,050 UART: [ldev] Erasing FE.KEYID = 1
8,604,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,917 UART: [ldev] --
10,416,441 UART: [fwproc] Wait for Commands...
10,419,021 UART: [fwproc] Recv command 0x46574c44
10,421,118 UART: [fwproc] Recv'd Img size: 114360 bytes
14,981,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,054,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,123,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,441,642 >>> mbox cmd response: success
15,445,708 UART: [afmc] ++
15,446,304 UART: [afmc] CDI.KEYID = 6
15,447,223 UART: [afmc] SUBJECT.KEYID = 7
15,448,386 UART: [afmc] AUTHORITY.KEYID = 5
17,980,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,616 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,723,615 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,558 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,755,341 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,778,885 UART: [afmc] --
19,783,237 UART: [cold-reset] --
19,788,233 UART: [state] Locking Datavault
19,792,719 UART: [state] Locking PCR0, PCR1 and PCR31
19,794,863 UART: [state] Locking ICCM
19,796,676 UART: [exit] Launching FMC @ 0x40000130
19,805,140 UART:
19,805,388 UART: Running Caliptra FMC ...
19,806,416 UART:
19,806,566 UART: [state] CFI Enabled
19,864,869 UART: [fht] FMC Alias Private Key: 7
21,628,594 UART: [art] Extend RT PCRs Done
21,629,805 UART: [art] Lock RT PCRs Done
21,631,455 UART: [art] Populate DV Done
21,636,965 UART: [fht] FMC Alias Private Key: 7
21,638,720 UART: [art] Derive CDI
21,639,548 UART: [art] Store in in slot 0x4
21,697,944 UART: [art] Derive Key Pair
21,698,945 UART: [art] Store priv key in slot 0x5
24,161,816 UART: [art] Derive Key Pair - Done
24,174,983 UART: [art] Signing Cert with AUTHO
24,176,288 UART: RITY.KEYID = 7
25,887,981 UART: [art] Erasing AUTHORITY.KEYID = 7
25,889,473 UART: [art] PUB.X = 156A177BDE6A22F8ECD7A0BF87842F173B76A712BEA81C696CE4886FB262DA4A7FBF0DAF59876CB7395D0FF97E5D7654
25,896,736 UART: [art] PUB.Y = 61A1BC516EE0D91AAC47E73B60DFC5C379150669F186C9A739E90515AF6552DF85E3E78050AC470FD0BC3ED89713A452
25,904,007 UART: [art] SIG.R = 2E928D38F89024F15B10B77FE10B823F9F799283314EFE3C96C751207AB886B07F8846C1920CC8E579BE9492908A4908
25,911,375 UART: [art] SIG.S = 70C81EA38B746DAA4270EE46E07D2164EC9FD7ED37B3A99F68C10457B6358BD80CA4D16A65A353560C44733CC729D50F
26,890,122 UART: Caliptra RT
26,890,833 UART: [state] CFI Enabled
27,056,921 UART: [rt] RT listening for mailbox commands...
27,059,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,215,194 UART: [rt]cmd =0x41544d4e, len=14344
28,401,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,575 UART:
192,983 UART: Running Caliptra ROM ...
194,199 UART:
194,361 UART: [state] CFI Enabled
263,413 UART: [state] LifecycleState = Unprovisioned
265,751 UART: [state] DebugLocked = No
267,063 UART: [state] WD Timer not started. Device not locked for debugging
270,952 UART: [kat] SHA2-256
460,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,597 UART: [kat] ++
472,044 UART: [kat] sha1
483,201 UART: [kat] SHA2-256
486,206 UART: [kat] SHA2-384
492,054 UART: [kat] SHA2-512-ACC
494,641 UART: [kat] ECC-384
2,949,979 UART: [kat] HMAC-384Kdf
2,970,529 UART: [kat] LMS
3,502,281 UART: [kat] --
3,507,205 UART: [cold-reset] ++
3,509,636 UART: [fht] FHT @ 0x50003400
3,521,323 UART: [idev] ++
3,521,959 UART: [idev] CDI.KEYID = 6
3,522,909 UART: [idev] SUBJECT.KEYID = 7
3,524,148 UART: [idev] UDS.KEYID = 0
3,525,046 ready_for_fw is high
3,525,241 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,188 UART: [idev] Erasing UDS.KEYID = 0
6,024,931 UART: [idev] Sha1 KeyId Algorithm
6,047,042 UART: [idev] --
6,052,610 UART: [ldev] ++
6,053,292 UART: [ldev] CDI.KEYID = 6
6,054,227 UART: [ldev] SUBJECT.KEYID = 5
6,055,387 UART: [ldev] AUTHORITY.KEYID = 7
6,056,642 UART: [ldev] FE.KEYID = 1
6,098,187 UART: [ldev] Erasing FE.KEYID = 1
8,607,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,714 UART: [ldev] --
10,409,761 UART: [fwproc] Wait for Commands...
10,412,130 UART: [fwproc] Recv command 0x46574c44
10,414,440 UART: [fwproc] Recv'd Img size: 114360 bytes
15,040,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,116,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,232,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,774,382 >>> mbox cmd response: success
15,779,178 UART: [afmc] ++
15,779,925 UART: [afmc] CDI.KEYID = 6
15,781,068 UART: [afmc] SUBJECT.KEYID = 7
15,782,509 UART: [afmc] AUTHORITY.KEYID = 5
18,322,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,066,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,068,019 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,083,087 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,098,279 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,162 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,136,670 UART: [afmc] --
20,140,971 UART: [cold-reset] --
20,146,247 UART: [state] Locking Datavault
20,152,265 UART: [state] Locking PCR0, PCR1 and PCR31
20,154,413 UART: [state] Locking ICCM
20,157,082 UART: [exit] Launching FMC @ 0x40000130
20,165,770 UART:
20,166,029 UART: Running Caliptra FMC ...
20,167,143 UART:
20,167,307 UART: [state] CFI Enabled
20,221,018 UART: [fht] FMC Alias Private Key: 7
21,984,212 UART: [art] Extend RT PCRs Done
21,985,436 UART: [art] Lock RT PCRs Done
21,987,413 UART: [art] Populate DV Done
21,993,090 UART: [fht] FMC Alias Private Key: 7
21,994,627 UART: [art] Derive CDI
21,995,361 UART: [art] Store in in slot 0x4
22,053,314 UART: [art] Derive Key Pair
22,054,367 UART: [art] Store priv key in slot 0x5
24,517,388 UART: [art] Derive Key Pair - Done
24,530,119 UART: [art] Signing Cert with AUTHO
24,531,431 UART: RITY.KEYID = 7
26,242,013 UART: [art] Erasing AUTHORITY.KEYID = 7
26,243,528 UART: [art] PUB.X = 8649415D807BEB2222E83C40C190A3B17523230D9E0E30B835F7DAD7A4C5BF2BE3D287AD8E9141DE3C72FE9B2FD4B142
26,250,807 UART: [art] PUB.Y = 56D87E6D955B14E931DC4C0578AAF086F6F2405E5F5B62D04B9163661F00D99F017E9E4466446C591EC99CB5DA8B6E61
26,258,042 UART: [art] SIG.R = 1AD5E230A2395701829E33BBC09BA1FBCBB1BD52A27B3FAD1CA1635293040DDEA5F6D7609DCE8D7017BC6FA92B4639F5
26,265,513 UART: [art] SIG.S = D337732741D86EE3354BE76219FBC9186693461B0B5888EBE476200F8D86AC817EAF90C415937659271868E37E5BB29D
27,243,997 UART: Caliptra RT
27,244,710 UART: [state] CFI Enabled
27,408,960 UART: [rt] RT listening for mailbox commands...
27,411,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,566,693 UART: [rt]cmd =0x41544d4e, len=14344
28,750,019 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
3,438,050 ready_for_fw is high
3,438,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,834,861 >>> mbox cmd response: success
20,114,101 UART:
20,114,484 UART: Running Caliptra FMC ...
20,115,678 UART:
20,115,844 UART: [state] CFI Enabled
20,182,480 UART: [fht] FMC Alias Private Key: 7
21,946,118 UART: [art] Extend RT PCRs Done
21,947,344 UART: [art] Lock RT PCRs Done
21,949,101 UART: [art] Populate DV Done
21,954,617 UART: [fht] FMC Alias Private Key: 7
21,956,158 UART: [art] Derive CDI
21,956,980 UART: [art] Store in in slot 0x4
22,013,868 UART: [art] Derive Key Pair
22,014,915 UART: [art] Store priv key in slot 0x5
24,477,873 UART: [art] Derive Key Pair - Done
24,490,924 UART: [art] Signing Cert with AUTHO
24,492,234 UART: RITY.KEYID = 7
26,202,981 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,476 UART: [art] PUB.X = F97B805A84CF9C7643A8DB149E1692BC294E0E982CB6660EB4A5E4EDE009A100196F4C0633F36C93DF74C5E3F2DB028E
26,211,694 UART: [art] PUB.Y = 455E0F0A6E4196E5B6C0328944F0A514464B2AF05BA61C9A3F150F49F948B749919933FB23270D2D1309DF04F7909D8A
26,218,973 UART: [art] SIG.R = 23E4124AC62AC7CFE1ECBACFE67BBBB838F763BEFF00F83E3079FFF9FF691A2606AC9D40B463C9BB35C1D0FBB677CA5B
26,226,384 UART: [art] SIG.S = 9079FBADF73068430614F8948CEADD95D08B0934772FE00BE9FBB80CCB3AB9F432BA2D3764B8CB1263E1D10AA67E6E69
27,205,215 UART: Caliptra RT
27,205,930 UART: [state] CFI Enabled
27,371,022 UART: [rt] RT listening for mailbox commands...
27,373,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,512 UART: [rt]cmd =0x41544d4e, len=14344
28,707,267 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,381 UART:
192,751 UART: Running Caliptra ROM ...
193,846 UART:
603,404 UART: [state] CFI Enabled
615,383 UART: [state] LifecycleState = Unprovisioned
617,756 UART: [state] DebugLocked = No
620,270 UART: [state] WD Timer not started. Device not locked for debugging
625,577 UART: [kat] SHA2-256
815,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,216 UART: [kat] ++
826,734 UART: [kat] sha1
837,485 UART: [kat] SHA2-256
840,487 UART: [kat] SHA2-384
846,839 UART: [kat] SHA2-512-ACC
849,421 UART: [kat] ECC-384
3,294,059 UART: [kat] HMAC-384Kdf
3,306,863 UART: [kat] LMS
3,838,652 UART: [kat] --
3,844,707 UART: [cold-reset] ++
3,845,645 UART: [fht] FHT @ 0x50003400
3,857,182 UART: [idev] ++
3,857,890 UART: [idev] CDI.KEYID = 6
3,858,801 UART: [idev] SUBJECT.KEYID = 7
3,860,042 UART: [idev] UDS.KEYID = 0
3,860,970 ready_for_fw is high
3,861,158 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,807 UART: [idev] Erasing UDS.KEYID = 0
6,337,957 UART: [idev] Sha1 KeyId Algorithm
6,359,293 UART: [idev] --
6,364,118 UART: [ldev] ++
6,364,688 UART: [ldev] CDI.KEYID = 6
6,365,593 UART: [ldev] SUBJECT.KEYID = 5
6,366,747 UART: [ldev] AUTHORITY.KEYID = 7
6,367,972 UART: [ldev] FE.KEYID = 1
6,380,342 UART: [ldev] Erasing FE.KEYID = 1
8,858,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,444 UART: [ldev] --
10,648,596 UART: [fwproc] Wait for Commands...
10,651,009 UART: [fwproc] Recv command 0x46574c44
10,653,328 UART: [fwproc] Recv'd Img size: 114360 bytes
15,291,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,370,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,486,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,028,498 >>> mbox cmd response: success
16,033,312 UART: [afmc] ++
16,034,022 UART: [afmc] CDI.KEYID = 6
16,035,265 UART: [afmc] SUBJECT.KEYID = 7
16,036,747 UART: [afmc] AUTHORITY.KEYID = 5
18,544,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,268,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,270,026 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,285,147 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,300,321 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,315,112 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,338,749 UART: [afmc] --
20,343,206 UART: [cold-reset] --
20,347,364 UART: [state] Locking Datavault
20,351,694 UART: [state] Locking PCR0, PCR1 and PCR31
20,353,873 UART: [state] Locking ICCM
20,355,360 UART: [exit] Launching FMC @ 0x40000130
20,364,021 UART:
20,364,283 UART: Running Caliptra FMC ...
20,365,382 UART:
20,365,535 UART: [state] CFI Enabled
20,373,736 UART: [fht] FMC Alias Private Key: 7
22,130,481 UART: [art] Extend RT PCRs Done
22,131,698 UART: [art] Lock RT PCRs Done
22,133,486 UART: [art] Populate DV Done
22,138,894 UART: [fht] FMC Alias Private Key: 7
22,140,480 UART: [art] Derive CDI
22,141,292 UART: [art] Store in in slot 0x4
22,183,992 UART: [art] Derive Key Pair
22,185,006 UART: [art] Store priv key in slot 0x5
24,611,483 UART: [art] Derive Key Pair - Done
24,624,316 UART: [art] Signing Cert with AUTHO
24,625,622 UART: RITY.KEYID = 7
26,331,686 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,190 UART: [art] PUB.X = 0896C010CBBC2E75877273A0D9FDCB7507483A179C598C252BD339BFEFFAE21CF3742A1EF13F0C8DAAC5CB0EEB98C9F6
26,340,501 UART: [art] PUB.Y = 167070C92B9B8908B1FCFD51B66D0DEDB65A958C13C265A15D2E232BA34DC5ABCA13DAAB541DECB32D2946A40D6D3FCC
26,347,790 UART: [art] SIG.R = A32191C366F08022160578AE7211C680ABA2CAE91B2A8F36D31EED40BB428500A7D1620A9283F9E10C6AE628EDE399DC
26,355,180 UART: [art] SIG.S = F85554C6A5087B4DFB1487135997692A0702894997A2010E20AEE835485B5C3B83A3CB0E0D4EA20B83D8D8742533A638
27,333,802 UART: Caliptra RT
27,334,518 UART: [state] CFI Enabled
27,451,148 UART: [rt] RT listening for mailbox commands...
27,453,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,608,518 UART: [rt]cmd =0x41544d4e, len=14344
28,794,049 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,757,455 ready_for_fw is high
3,757,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,087,564 >>> mbox cmd response: success
20,337,459 UART:
20,337,927 UART: Running Caliptra FMC ...
20,339,056 UART:
20,339,444 UART: [state] CFI Enabled
20,347,444 UART: [fht] FMC Alias Private Key: 7
22,103,944 UART: [art] Extend RT PCRs Done
22,105,165 UART: [art] Lock RT PCRs Done
22,106,797 UART: [art] Populate DV Done
22,112,476 UART: [fht] FMC Alias Private Key: 7
22,114,191 UART: [art] Derive CDI
22,115,010 UART: [art] Store in in slot 0x4
22,157,557 UART: [art] Derive Key Pair
22,158,560 UART: [art] Store priv key in slot 0x5
24,585,302 UART: [art] Derive Key Pair - Done
24,598,354 UART: [art] Signing Cert with AUTHO
24,599,658 UART: RITY.KEYID = 7
26,305,125 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,636 UART: [art] PUB.X = 263C738699E12A9A011ACD19A96C275AC7FFD536E8EB31F7C2D7AB94B678183C4A2837430C28AB9B9CFA8F185DBDD242
26,313,976 UART: [art] PUB.Y = FCCB75DAC9B95DD78DEFC9948A7D908CBA2025A17C806E996C52D9BC2007FB89B60E418AD484DF88FBDB4C85A11A2E1D
26,321,200 UART: [art] SIG.R = D50FEB51A2D1B94C2844B19B3512A784681C93138C48F33C565BC1C1A966BAD27871A05ACE5395D93C541DB5792BA2AD
26,328,609 UART: [art] SIG.S = 0E4C0BDE31A642EE4E6B893A16E0F44F4622AC58D5AD20B60F2D1B35EF04636321E51EDFAF34409A22AE18CA38772A48
27,307,473 UART: Caliptra RT
27,308,180 UART: [state] CFI Enabled
27,425,574 UART: [rt] RT listening for mailbox commands...
27,427,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,583,177 UART: [rt]cmd =0x41544d4e, len=14344
28,776,463 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,018 UART: [kat] LMS
1,475,214 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,866 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,382 UART: [idev] --
1,515,455 UART: [ldev] ++
1,515,623 UART: [ldev] CDI.KEYID = 6
1,515,986 UART: [ldev] SUBJECT.KEYID = 5
1,516,412 UART: [ldev] AUTHORITY.KEYID = 7
1,516,875 UART: [ldev] FE.KEYID = 1
1,521,655 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,334 UART: [ldev] --
1,585,757 UART: [fwproc] Waiting for Commands...
1,586,422 UART: [fwproc] Received command 0x46574c44
1,587,213 UART: [fwproc] Received Image of size 114360 bytes
5,307,948 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,335,924 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,365,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,501,287 >>> mbox cmd response: success
5,502,373 UART: [afmc] ++
5,502,541 UART: [afmc] CDI.KEYID = 6
5,502,903 UART: [afmc] SUBJECT.KEYID = 7
5,503,328 UART: [afmc] AUTHORITY.KEYID = 5
5,538,422 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,554,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,555,636 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,561,345 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,567,237 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,572,938 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,580,904 UART: [afmc] --
5,581,972 UART: [cold-reset] --
5,582,860 UART: [state] Locking Datavault
5,583,911 UART: [state] Locking PCR0, PCR1 and PCR31
5,584,515 UART: [state] Locking ICCM
5,585,097 UART: [exit] Launching FMC @ 0x40000130
5,590,426 UART:
5,590,442 UART: Running Caliptra FMC ...
5,590,850 UART:
5,590,904 UART: [state] CFI Enabled
5,601,240 UART: [fht] FMC Alias Private Key: 7
5,709,346 UART: [art] Extend RT PCRs Done
5,709,774 UART: [art] Lock RT PCRs Done
5,711,272 UART: [art] Populate DV Done
5,719,368 UART: [fht] FMC Alias Private Key: 7
5,720,382 UART: [art] Derive CDI
5,720,662 UART: [art] Store in in slot 0x4
5,806,305 UART: [art] Derive Key Pair
5,806,665 UART: [art] Store priv key in slot 0x5
5,820,405 UART: [art] Derive Key Pair - Done
5,835,281 UART: [art] Signing Cert with AUTHO
5,835,761 UART: RITY.KEYID = 7
5,850,351 UART: [art] Erasing AUTHORITY.KEYID = 7
5,851,116 UART: [art] PUB.X = 27AB32C8BA52A3831B8724DAD3453F31676DB473B96CAFEA22B62D3ED66C83DF9BE071B510FE9C9A0770E86F8407A7D4
5,857,892 UART: [art] PUB.Y = 1FCD5A0A2A9C1655B2D24AEEB1A9B2DA708A3476690321420B08C55BE40E831950753B572C825950EB799C309CD07380
5,864,825 UART: [art] SIG.R = 6B52D3F16D99E448721A09EEA775DAF6246A13ABA13E1B62B46646B3A9C3EAE715D82587EAD4C2551EF74DA62B1C31CD
5,871,606 UART: [art] SIG.S = F9956070C943A6AE9BD0D264265A402EBA510BA6E95F6A68AF1CC1CA83BB88118BE9985480911B4AFCD9030A3E93AACA
5,895,792 UART: Caliptra RT
5,896,046 UART: [state] CFI Enabled
6,003,948 UART: [rt] RT listening for mailbox commands...
6,004,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,273 UART: [rt]cmd =0x41544d4e, len=14344
6,420,312 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,049 ready_for_fw is high
1,362,049 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,201,805 >>> mbox cmd response: success
5,262,762 UART:
5,262,778 UART: Running Caliptra FMC ...
5,263,186 UART:
5,263,240 UART: [state] CFI Enabled
5,273,498 UART: [fht] FMC Alias Private Key: 7
5,380,574 UART: [art] Extend RT PCRs Done
5,381,002 UART: [art] Lock RT PCRs Done
5,382,456 UART: [art] Populate DV Done
5,390,552 UART: [fht] FMC Alias Private Key: 7
5,391,562 UART: [art] Derive CDI
5,391,842 UART: [art] Store in in slot 0x4
5,477,895 UART: [art] Derive Key Pair
5,478,255 UART: [art] Store priv key in slot 0x5
5,491,799 UART: [art] Derive Key Pair - Done
5,506,907 UART: [art] Signing Cert with AUTHO
5,507,387 UART: RITY.KEYID = 7
5,522,651 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,416 UART: [art] PUB.X = F24D5DBA3959E997C2632750E1FF277E83D3EE970BDF525EFA91C72B03AB9C0AAFEB2E657AC6C860C37AC8A164E9412C
5,530,195 UART: [art] PUB.Y = 6C7F7D1041FFFAF027742B3691E259F774DF4FBADF0CAA5D0CAEA1B0751B6AAC52AB08B3BBF812EEE7C3590031830FC2
5,537,135 UART: [art] SIG.R = B371708F23D8961B79A72ACC3801C64D1DF5D21B6C67B1E14FA6F7E67976414819479AC3B4D0039ED877D6968AE3535D
5,543,899 UART: [art] SIG.S = 0A93298567D8CE3621BCC72069F9E2A8699700644BA2057BDE8AA5860878D42A393C108997DD73E84A9FFBB3479B836E
5,567,395 UART: Caliptra RT
5,567,649 UART: [state] CFI Enabled
5,675,321 UART: [rt] RT listening for mailbox commands...
5,675,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,798,788 UART: [rt]cmd =0x41544d4e, len=14344
6,084,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,642 UART: [kat] SHA2-256
892,580 UART: [kat] SHA2-384
895,257 UART: [kat] SHA2-512-ACC
897,158 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,462 UART: [cold-reset] ++
1,476,886 UART: [fht] Storing FHT @ 0x50003400
1,479,569 UART: [idev] ++
1,479,737 UART: [idev] CDI.KEYID = 6
1,480,097 UART: [idev] SUBJECT.KEYID = 7
1,480,521 UART: [idev] UDS.KEYID = 0
1,480,866 ready_for_fw is high
1,480,866 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,727 UART: [idev] Erasing UDS.KEYID = 0
1,505,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,963 UART: [idev] --
1,515,080 UART: [ldev] ++
1,515,248 UART: [ldev] CDI.KEYID = 6
1,515,611 UART: [ldev] SUBJECT.KEYID = 5
1,516,037 UART: [ldev] AUTHORITY.KEYID = 7
1,516,500 UART: [ldev] FE.KEYID = 1
1,522,044 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,351 UART: [ldev] --
1,586,794 UART: [fwproc] Waiting for Commands...
1,587,547 UART: [fwproc] Received command 0x46574c44
1,588,338 UART: [fwproc] Received Image of size 114360 bytes
5,121,911 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,180,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,316,232 >>> mbox cmd response: success
5,317,406 UART: [afmc] ++
5,317,574 UART: [afmc] CDI.KEYID = 6
5,317,936 UART: [afmc] SUBJECT.KEYID = 7
5,318,361 UART: [afmc] AUTHORITY.KEYID = 5
5,353,431 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,369,721 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,501 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,376,210 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,382,102 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,387,803 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,395,835 UART: [afmc] --
5,396,911 UART: [cold-reset] --
5,397,763 UART: [state] Locking Datavault
5,398,912 UART: [state] Locking PCR0, PCR1 and PCR31
5,399,516 UART: [state] Locking ICCM
5,399,994 UART: [exit] Launching FMC @ 0x40000130
5,405,323 UART:
5,405,339 UART: Running Caliptra FMC ...
5,405,747 UART:
5,405,890 UART: [state] CFI Enabled
5,416,332 UART: [fht] FMC Alias Private Key: 7
5,524,054 UART: [art] Extend RT PCRs Done
5,524,482 UART: [art] Lock RT PCRs Done
5,525,798 UART: [art] Populate DV Done
5,534,142 UART: [fht] FMC Alias Private Key: 7
5,535,320 UART: [art] Derive CDI
5,535,600 UART: [art] Store in in slot 0x4
5,621,713 UART: [art] Derive Key Pair
5,622,073 UART: [art] Store priv key in slot 0x5
5,635,373 UART: [art] Derive Key Pair - Done
5,650,267 UART: [art] Signing Cert with AUTHO
5,650,747 UART: RITY.KEYID = 7
5,665,517 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,282 UART: [art] PUB.X = DED5B3924D079B24EE5C02C77882EB47996D73883FFB5FA01EB65A9DC00ED008823AC125764AC92A0872D0B431E4D837
5,673,043 UART: [art] PUB.Y = 213DD0A4AA92CF0B7A94D81ADE74CB6BD04C569C52A69BDA3C177848A577CF7329A95FC724AAB1D4A6BF6AC3E3445220
5,680,008 UART: [art] SIG.R = E860BE2DDC10A5BC2A9D777FB0275F114A20B3B65279C91A40BFC9E472D0D021639B9B9F429BCAD20094AE249A5F5B36
5,686,768 UART: [art] SIG.S = A4257001D6BB676E0BD97135A5968D82AF601FBB026E2207A857E095C76E76F2D7D657FE6BA086907FE6AB882999957D
5,711,051 UART: Caliptra RT
5,711,397 UART: [state] CFI Enabled
5,819,786 UART: [rt] RT listening for mailbox commands...
5,820,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,259 UART: [rt]cmd =0x41544d4e, len=14344
6,229,249 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,958 ready_for_fw is high
1,362,958 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,204,718 >>> mbox cmd response: success
5,266,107 UART:
5,266,123 UART: Running Caliptra FMC ...
5,266,531 UART:
5,266,674 UART: [state] CFI Enabled
5,277,422 UART: [fht] FMC Alias Private Key: 7
5,385,284 UART: [art] Extend RT PCRs Done
5,385,712 UART: [art] Lock RT PCRs Done
5,387,238 UART: [art] Populate DV Done
5,395,352 UART: [fht] FMC Alias Private Key: 7
5,396,450 UART: [art] Derive CDI
5,396,730 UART: [art] Store in in slot 0x4
5,482,277 UART: [art] Derive Key Pair
5,482,637 UART: [art] Store priv key in slot 0x5
5,495,973 UART: [art] Derive Key Pair - Done
5,511,280 UART: [art] Signing Cert with AUTHO
5,511,760 UART: RITY.KEYID = 7
5,527,196 UART: [art] Erasing AUTHORITY.KEYID = 7
5,527,961 UART: [art] PUB.X = C4BB3B3162A7991B986B7D95E8E774389BFAD21833E8683C4559727E0DFF210DEE335BF7B0C6D16180C690FB7A91C457
5,534,729 UART: [art] PUB.Y = 1765065321F6FA4D3D6F66CE27C27A807E72658F657539D53731AB420DE730ABC7BAC646A82F983FA49D5689746C2658
5,541,669 UART: [art] SIG.R = C1A1CC1BE916FB3792ABE80A3D0BBC6124722259A1E608C310B36EBDB24C8425332FCAD224ABDA0B61FD9C14F6C4404E
5,548,445 UART: [art] SIG.S = 9CA1EEEDD69C8016295E49E15FE0A65137BBAAA215B806938C155F63E5E9840888ADC02D29F7BBAD825009FBDB8DA53E
5,572,997 UART: Caliptra RT
5,573,343 UART: [state] CFI Enabled
5,681,692 UART: [rt] RT listening for mailbox commands...
5,682,362 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,804,979 UART: [rt]cmd =0x41544d4e, len=14344
6,098,612 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
893,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,273 UART: [kat] ++
897,425 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,316 UART: [kat] SHA2-512-ACC
908,217 UART: [kat] ECC-384
917,740 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,710 UART: [idev] ++
1,174,878 UART: [idev] CDI.KEYID = 6
1,175,238 UART: [idev] SUBJECT.KEYID = 7
1,175,662 UART: [idev] UDS.KEYID = 0
1,176,007 ready_for_fw is high
1,176,007 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,104 UART: [idev] Erasing UDS.KEYID = 0
1,201,535 UART: [idev] Sha1 KeyId Algorithm
1,210,151 UART: [idev] --
1,211,379 UART: [ldev] ++
1,211,547 UART: [ldev] CDI.KEYID = 6
1,211,910 UART: [ldev] SUBJECT.KEYID = 5
1,212,336 UART: [ldev] AUTHORITY.KEYID = 7
1,212,799 UART: [ldev] FE.KEYID = 1
1,217,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,575 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,570 UART: [fwproc] Recv command 0x46574c44
1,284,298 UART: [fwproc] Recv'd Img size: 114360 bytes
3,128,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,321,309 >>> mbox cmd response: success
3,322,513 UART: [afmc] ++
3,322,681 UART: [afmc] CDI.KEYID = 6
3,323,043 UART: [afmc] SUBJECT.KEYID = 7
3,323,468 UART: [afmc] AUTHORITY.KEYID = 5
3,358,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,091 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,800 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,692 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,403 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,284 UART: [afmc] --
3,402,340 UART: [cold-reset] --
3,403,150 UART: [state] Locking Datavault
3,404,335 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,939 UART: [state] Locking ICCM
3,405,361 UART: [exit] Launching FMC @ 0x40000130
3,410,690 UART:
3,410,706 UART: Running Caliptra FMC ...
3,411,114 UART:
3,411,168 UART: [state] CFI Enabled
3,421,336 UART: [fht] FMC Alias Private Key: 7
3,529,424 UART: [art] Extend RT PCRs Done
3,529,852 UART: [art] Lock RT PCRs Done
3,531,472 UART: [art] Populate DV Done
3,539,786 UART: [fht] FMC Alias Private Key: 7
3,540,936 UART: [art] Derive CDI
3,541,216 UART: [art] Store in in slot 0x4
3,626,919 UART: [art] Derive Key Pair
3,627,279 UART: [art] Store priv key in slot 0x5
3,639,971 UART: [art] Derive Key Pair - Done
3,654,841 UART: [art] Signing Cert with AUTHO
3,655,321 UART: RITY.KEYID = 7
3,670,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,222 UART: [art] PUB.X = C6AA60EB412EC8F7A4171DB7B66985357BECF7129064A7AC6CAE4F50CDAF11D5B846CD181BFD7D398DF65200E86305C1
3,677,983 UART: [art] PUB.Y = 74BFA413CB0465D964227736B51ED05611B7B6F605D91954C45BD7CED9DA9E6688F61947349B7E22305ACC57B6DC8A9D
3,684,931 UART: [art] SIG.R = 05F2720E73849DB84484E09A96AA6384B3A1A068A34E66C460A215F68EFCB562C38C7D25CBC4C7FD69E8C32ADC0BB7C8
3,691,704 UART: [art] SIG.S = 1A4F5D46A5ECBB538FF77E55A0016A63A302D724D896A1A40705B0E1BC28683EEEE63222FA3ED36DF85D76F06C227A4C
3,715,869 UART: Caliptra RT
3,716,123 UART: [state] CFI Enabled
3,823,075 UART: [rt] RT listening for mailbox commands...
3,823,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,410 UART: [rt]cmd =0x41544d4e, len=14344
4,232,532 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,663 ready_for_fw is high
1,060,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,181,105 >>> mbox cmd response: success
3,244,406 UART:
3,244,422 UART: Running Caliptra FMC ...
3,244,830 UART:
3,244,884 UART: [state] CFI Enabled
3,254,988 UART: [fht] FMC Alias Private Key: 7
3,362,936 UART: [art] Extend RT PCRs Done
3,363,364 UART: [art] Lock RT PCRs Done
3,364,882 UART: [art] Populate DV Done
3,372,888 UART: [fht] FMC Alias Private Key: 7
3,373,920 UART: [art] Derive CDI
3,374,200 UART: [art] Store in in slot 0x4
3,459,673 UART: [art] Derive Key Pair
3,460,033 UART: [art] Store priv key in slot 0x5
3,472,867 UART: [art] Derive Key Pair - Done
3,487,570 UART: [art] Signing Cert with AUTHO
3,488,050 UART: RITY.KEYID = 7
3,503,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,813 UART: [art] PUB.X = AC32BCF419F9DD806AD9FD98819FD3FF9DC9C4D254D9F2C9058ECED7321292F45791E92376E272E2F801B561E85FB099
3,510,587 UART: [art] PUB.Y = 5DFF6FFA4711E69951DE15FB046CBC4426E6A6468279DAED6443C354A2CFF4B5468F718D3E82EFEA22C82C62F05E2644
3,517,546 UART: [art] SIG.R = 53137D3680C1E17C4BF10F1DC801C40781E069CED813A539BF45A37E032C5279E9780CE35F99C308889A3DC2C54D757D
3,524,298 UART: [art] SIG.S = 96FE65D9D41467D9036113E6EAF9C44976364F78BE3A0AB1A53762663CF8B4D1BFFCB33D4D627A03E82A938E9F7301A9
3,547,689 UART: Caliptra RT
3,547,943 UART: [state] CFI Enabled
3,655,822 UART: [rt] RT listening for mailbox commands...
3,656,492 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,139 UART: [rt]cmd =0x41544d4e, len=14344
4,067,304 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,232 UART: [state] WD Timer not started. Device not locked for debugging
88,567 UART: [kat] SHA2-256
894,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,342 UART: [kat] ++
898,494 UART: [kat] sha1
902,732 UART: [kat] SHA2-256
904,672 UART: [kat] SHA2-384
907,399 UART: [kat] SHA2-512-ACC
909,300 UART: [kat] ECC-384
919,297 UART: [kat] HMAC-384Kdf
924,111 UART: [kat] LMS
1,172,439 UART: [kat] --
1,173,102 UART: [cold-reset] ++
1,173,576 UART: [fht] FHT @ 0x50003400
1,176,189 UART: [idev] ++
1,176,357 UART: [idev] CDI.KEYID = 6
1,176,717 UART: [idev] SUBJECT.KEYID = 7
1,177,141 UART: [idev] UDS.KEYID = 0
1,177,486 ready_for_fw is high
1,177,486 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,063 UART: [idev] Erasing UDS.KEYID = 0
1,201,860 UART: [idev] Sha1 KeyId Algorithm
1,210,348 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,218,006 UART: [ldev] Erasing FE.KEYID = 1
1,244,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,726 UART: [ldev] --
1,284,193 UART: [fwproc] Wait for Commands...
1,284,989 UART: [fwproc] Recv command 0x46574c44
1,285,717 UART: [fwproc] Recv'd Img size: 114360 bytes
3,130,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,111 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,324,072 >>> mbox cmd response: success
3,325,314 UART: [afmc] ++
3,325,482 UART: [afmc] CDI.KEYID = 6
3,325,844 UART: [afmc] SUBJECT.KEYID = 7
3,326,269 UART: [afmc] AUTHORITY.KEYID = 5
3,361,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,726 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,435 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,327 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,038 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,699 UART: [afmc] --
3,404,609 UART: [cold-reset] --
3,405,425 UART: [state] Locking Datavault
3,406,794 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,398 UART: [state] Locking ICCM
3,407,846 UART: [exit] Launching FMC @ 0x40000130
3,413,175 UART:
3,413,191 UART: Running Caliptra FMC ...
3,413,599 UART:
3,413,742 UART: [state] CFI Enabled
3,424,204 UART: [fht] FMC Alias Private Key: 7
3,532,786 UART: [art] Extend RT PCRs Done
3,533,214 UART: [art] Lock RT PCRs Done
3,534,834 UART: [art] Populate DV Done
3,543,058 UART: [fht] FMC Alias Private Key: 7
3,543,990 UART: [art] Derive CDI
3,544,270 UART: [art] Store in in slot 0x4
3,629,585 UART: [art] Derive Key Pair
3,629,945 UART: [art] Store priv key in slot 0x5
3,643,033 UART: [art] Derive Key Pair - Done
3,657,817 UART: [art] Signing Cert with AUTHO
3,658,297 UART: RITY.KEYID = 7
3,673,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,208 UART: [art] PUB.X = 456A7D26ADBFEB82FFCDA4AEE3709A8019254FB26B81BA1DB8C5F2725B7B5BDE437F221B1B705BCD4299CD13A68902F9
3,680,995 UART: [art] PUB.Y = A1BFE9108B9CDED71B0B68314382F2BC37F676CBBF67C69898EB2AE8CB2B86C6698574EDFFC6DFA608CE6A60F932C7CA
3,687,963 UART: [art] SIG.R = FF8F67D52B43E595DEB488BA0FEE66D3916014EF83649EEA620639D305E02E1ACFDB652EE6A63749F87BD7FA5DF3ED91
3,694,742 UART: [art] SIG.S = 1970DA27ECDB438068E7F5D66FDB53CA013D8B6B2CF3D169AA856C20845442DA99B92F63F9FB482E319B9440FD6D69BA
3,718,676 UART: Caliptra RT
3,719,022 UART: [state] CFI Enabled
3,825,943 UART: [rt] RT listening for mailbox commands...
3,826,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,570 UART: [rt]cmd =0x41544d4e, len=14344
4,240,446 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,224 ready_for_fw is high
1,060,224 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,160,221 >>> mbox cmd response: success
3,222,480 UART:
3,222,496 UART: Running Caliptra FMC ...
3,222,904 UART:
3,223,047 UART: [state] CFI Enabled
3,233,651 UART: [fht] FMC Alias Private Key: 7
3,341,013 UART: [art] Extend RT PCRs Done
3,341,441 UART: [art] Lock RT PCRs Done
3,343,131 UART: [art] Populate DV Done
3,351,087 UART: [fht] FMC Alias Private Key: 7
3,352,089 UART: [art] Derive CDI
3,352,369 UART: [art] Store in in slot 0x4
3,437,914 UART: [art] Derive Key Pair
3,438,274 UART: [art] Store priv key in slot 0x5
3,451,994 UART: [art] Derive Key Pair - Done
3,467,082 UART: [art] Signing Cert with AUTHO
3,467,562 UART: RITY.KEYID = 7
3,482,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,637 UART: [art] PUB.X = 5D93A4DE8185CE40448B4A25E6686675766ABBB76057269252EB0E9BFFED08631239DEF9D9EB58AA253AB9D0AD4E10E5
3,490,411 UART: [art] PUB.Y = B983ED6D8923303DDB5005693EC32F595BDDE8680CD7469A595C3ED7C6D8BEADC3B0A492656E6F2FB2A16991B4BFDF6A
3,497,373 UART: [art] SIG.R = 193A5AAE379AE6ECA5BBE2136A6533926773884984AEC241B43F3710A4BE9FFD6CFFC3FCDDA739C93B2BA094BC439CFF
3,504,165 UART: [art] SIG.S = 3A00908681A15881DB9243BE01E4F20FA4A9D461E80CF1C36752E99019B5D980F655A5DF4A14200FB9C6D72738AC140E
3,527,527 UART: Caliptra RT
3,527,873 UART: [state] CFI Enabled
3,635,661 UART: [rt] RT listening for mailbox commands...
3,636,331 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,000 UART: [rt]cmd =0x41544d4e, len=14344
4,045,278 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 ready_for_fw is high
1,174,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,198,559 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,214,956 UART: [ldev] Erasing FE.KEYID = 1
1,241,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,010 UART: [ldev] --
1,280,274 UART: [fwproc] Wait for Commands...
1,280,997 UART: [fwproc] Recv command 0x46574c44
1,281,730 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,415 >>> mbox cmd response: success
3,317,578 UART: [afmc] ++
3,317,746 UART: [afmc] CDI.KEYID = 6
3,318,109 UART: [afmc] SUBJECT.KEYID = 7
3,318,535 UART: [afmc] AUTHORITY.KEYID = 5
3,353,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,352 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,062 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,952 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,663 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,553 UART: [afmc] --
3,396,625 UART: [cold-reset] --
3,397,325 UART: [state] Locking Datavault
3,398,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,436 UART: [state] Locking ICCM
3,400,084 UART: [exit] Launching FMC @ 0x40000130
3,405,413 UART:
3,405,429 UART: Running Caliptra FMC ...
3,405,837 UART:
3,405,891 UART: [state] CFI Enabled
3,416,279 UART: [fht] FMC Alias Private Key: 7
3,523,999 UART: [art] Extend RT PCRs Done
3,524,427 UART: [art] Lock RT PCRs Done
3,525,669 UART: [art] Populate DV Done
3,534,077 UART: [fht] FMC Alias Private Key: 7
3,535,111 UART: [art] Derive CDI
3,535,391 UART: [art] Store in in slot 0x4
3,620,784 UART: [art] Derive Key Pair
3,621,144 UART: [art] Store priv key in slot 0x5
3,634,258 UART: [art] Derive Key Pair - Done
3,648,750 UART: [art] Signing Cert with AUTHO
3,649,230 UART: RITY.KEYID = 7
3,665,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,779 UART: [art] PUB.X = 0642A84066F697B442908038AFC92EF7B1BA10324035CA1BC8F4C9EDAB28C54A01FF9B0A4A17442F6890914B865A27E0
3,672,542 UART: [art] PUB.Y = 254468A20BED87D456622EAE0CA3FDF2DC61E73BD4276F9911E35D8857EF67CAC8A70406986184CD280CBCB1AA3E6838
3,679,487 UART: [art] SIG.R = 07F0B4ECB1858FFE65E71D06018AFC47FF8E7DF631FA0EE763086F3330DBCA909C04EF131923579B49DE4806406026CE
3,686,244 UART: [art] SIG.S = 9F714FF320EC0F8D86217226019441E75D6DE3949E8F27DEE9AFF9CEBC2EEFBB2B2E6B08128C95DE0C0FD62C03A52BC1
3,710,575 UART: Caliptra RT
3,710,829 UART: [state] CFI Enabled
3,818,362 UART: [rt] RT listening for mailbox commands...
3,819,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,835 UART: [rt]cmd =0x41544d4e, len=14344
4,225,278 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,798 ready_for_fw is high
1,055,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,164,880 >>> mbox cmd response: success
3,226,651 UART:
3,226,667 UART: Running Caliptra FMC ...
3,227,075 UART:
3,227,129 UART: [state] CFI Enabled
3,237,371 UART: [fht] FMC Alias Private Key: 7
3,344,731 UART: [art] Extend RT PCRs Done
3,345,159 UART: [art] Lock RT PCRs Done
3,346,557 UART: [art] Populate DV Done
3,354,919 UART: [fht] FMC Alias Private Key: 7
3,355,917 UART: [art] Derive CDI
3,356,197 UART: [art] Store in in slot 0x4
3,441,502 UART: [art] Derive Key Pair
3,441,862 UART: [art] Store priv key in slot 0x5
3,454,956 UART: [art] Derive Key Pair - Done
3,469,479 UART: [art] Signing Cert with AUTHO
3,469,959 UART: RITY.KEYID = 7
3,484,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,648 UART: [art] PUB.X = DBBBF40A1F5B239A873BFA35F63C1F6C49768D92772344B75C44304481FA77DB46BE56F0310E4E8C995B061BE552E215
3,492,413 UART: [art] PUB.Y = BBC5B160FAC943D068E752DBAC9F4158AE979EFC3A47706FA332FF14D61BF6FF18F634AAA8DA7E9FF95F84E3723C351D
3,499,385 UART: [art] SIG.R = EA4588106108E37E98BE10768227E0889BE024D5C53F832F6548952DA047568B1F1D0B0277DC885051246912E648D3CA
3,506,134 UART: [art] SIG.S = 162A629730AC4ED03C9831ACBFC5A166A04B262FFC6F16BD42D1DD05A5D42507938C95457B77131B82B8B60F615F3805
3,529,669 UART: Caliptra RT
3,529,923 UART: [state] CFI Enabled
3,638,078 UART: [rt] RT listening for mailbox commands...
3,638,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,355 UART: [rt]cmd =0x41544d4e, len=14344
4,042,777 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 ready_for_fw is high
1,174,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,012 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,709 UART: [fwproc] Wait for Commands...
1,282,438 UART: [fwproc] Recv command 0x46574c44
1,283,171 UART: [fwproc] Recv'd Img size: 114360 bytes
3,132,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,325,061 >>> mbox cmd response: success
3,326,198 UART: [afmc] ++
3,326,366 UART: [afmc] CDI.KEYID = 6
3,326,729 UART: [afmc] SUBJECT.KEYID = 7
3,327,155 UART: [afmc] AUTHORITY.KEYID = 5
3,361,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,868 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,578 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,179 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,023 UART: [afmc] --
3,404,901 UART: [cold-reset] --
3,405,595 UART: [state] Locking Datavault
3,406,824 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,428 UART: [state] Locking ICCM
3,407,858 UART: [exit] Launching FMC @ 0x40000130
3,413,187 UART:
3,413,203 UART: Running Caliptra FMC ...
3,413,611 UART:
3,413,754 UART: [state] CFI Enabled
3,424,310 UART: [fht] FMC Alias Private Key: 7
3,532,208 UART: [art] Extend RT PCRs Done
3,532,636 UART: [art] Lock RT PCRs Done
3,534,214 UART: [art] Populate DV Done
3,542,536 UART: [fht] FMC Alias Private Key: 7
3,543,534 UART: [art] Derive CDI
3,543,814 UART: [art] Store in in slot 0x4
3,629,335 UART: [art] Derive Key Pair
3,629,695 UART: [art] Store priv key in slot 0x5
3,642,699 UART: [art] Derive Key Pair - Done
3,657,625 UART: [art] Signing Cert with AUTHO
3,658,105 UART: RITY.KEYID = 7
3,673,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,020 UART: [art] PUB.X = E337C9E891451E126816DDB50DAF3C2B46F29D0410CC556227BB9E9F234BFCE08CC18AA0F221E2B0DF84F0970BF38DB4
3,680,795 UART: [art] PUB.Y = 96F11B264BB62B0BF10CACED5645D2C192E5E26D5B549FEB90781FE2934BEB7D3197B9778F6C367BB18FB210881E7C89
3,687,749 UART: [art] SIG.R = 37C488154CD03DDAFD515A1E15D133B436C8345A9F9230CD35C8720C1484A3770B1FFA45E51B081989C19FF710FBF56D
3,694,514 UART: [art] SIG.S = 8B94948E7F4B0D4A438F01ECB7C0AECA8069CABFC4CE89288C158A66B0804C0ED355219BE215CB488A19E922D0051A67
3,719,389 UART: Caliptra RT
3,719,735 UART: [state] CFI Enabled
3,826,926 UART: [rt] RT listening for mailbox commands...
3,827,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,299 UART: [rt]cmd =0x41544d4e, len=14344
4,236,025 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,371 ready_for_fw is high
1,056,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,166,924 >>> mbox cmd response: success
3,228,523 UART:
3,228,539 UART: Running Caliptra FMC ...
3,228,947 UART:
3,229,090 UART: [state] CFI Enabled
3,239,778 UART: [fht] FMC Alias Private Key: 7
3,347,862 UART: [art] Extend RT PCRs Done
3,348,290 UART: [art] Lock RT PCRs Done
3,349,670 UART: [art] Populate DV Done
3,357,752 UART: [fht] FMC Alias Private Key: 7
3,358,854 UART: [art] Derive CDI
3,359,134 UART: [art] Store in in slot 0x4
3,444,975 UART: [art] Derive Key Pair
3,445,335 UART: [art] Store priv key in slot 0x5
3,458,265 UART: [art] Derive Key Pair - Done
3,473,186 UART: [art] Signing Cert with AUTHO
3,473,666 UART: RITY.KEYID = 7
3,489,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,771 UART: [art] PUB.X = 51EF690CEA74C612AA0DE1C94046433E5529D55158374011D4809747BD651752F8F3DAC9BB1B0734594D0980281A5CA1
3,496,523 UART: [art] PUB.Y = C72157BB04764C48D921252AB64A617BC2C20EB5C0D1729CD0A8A2D75FD5F36AC5134CE6A5FD8B11E6E7005736F1E0E1
3,503,455 UART: [art] SIG.R = DA657FC6E58FE5AAB68CE766A16FEB617B34A2DAB6147324A8185CC90F7055E7B8963D28DA59C409C38313F4EAE6FF5C
3,510,235 UART: [art] SIG.S = FFA3E0A74F817F69BFE29E5D3844F94C15D5BBC4DE06793D7BB922C46C7F3D130C719DC2D29989E8E09B358FAD16EA24
3,534,008 UART: Caliptra RT
3,534,354 UART: [state] CFI Enabled
3,642,132 UART: [rt] RT listening for mailbox commands...
3,642,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,687 UART: [rt]cmd =0x41544d4e, len=14344
4,056,737 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,540 writing to cptra_bootfsm_go
192,643 UART:
192,994 UART: Running Caliptra ROM ...
194,082 UART:
194,223 UART: [state] CFI Enabled
262,944 UART: [state] LifecycleState = Unprovisioned
264,847 UART: [state] DebugLocked = No
266,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,387 UART: [kat] SHA2-256
442,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,615 UART: [kat] ++
453,084 UART: [kat] sha1
465,518 UART: [kat] SHA2-256
468,231 UART: [kat] SHA2-384
472,393 UART: [kat] SHA2-512-ACC
474,763 UART: [kat] ECC-384
2,767,494 UART: [kat] HMAC-384Kdf
2,800,918 UART: [kat] LMS
3,991,243 UART: [kat] --
3,998,370 UART: [cold-reset] ++
4,000,510 UART: [fht] Storing FHT @ 0x50003400
4,011,849 UART: [idev] ++
4,012,411 UART: [idev] CDI.KEYID = 6
4,013,404 UART: [idev] SUBJECT.KEYID = 7
4,014,575 UART: [idev] UDS.KEYID = 0
4,015,660 ready_for_fw is high
4,015,854 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,264 UART: [idev] Erasing UDS.KEYID = 0
7,349,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,661 UART: [idev] --
7,374,540 UART: [ldev] ++
7,375,098 UART: [ldev] CDI.KEYID = 6
7,376,060 UART: [ldev] SUBJECT.KEYID = 5
7,377,263 UART: [ldev] AUTHORITY.KEYID = 7
7,378,542 UART: [ldev] FE.KEYID = 1
7,423,450 UART: [ldev] Erasing FE.KEYID = 1
10,757,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,522 UART: [ldev] --
13,136,720 UART: [fwproc] Waiting for Commands...
13,138,489 UART: [fwproc] Received command 0x46574c44
13,140,669 UART: [fwproc] Received Image of size 114036 bytes
21,936,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,015,112 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,084,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,400,198 >>> mbox cmd response: success
22,404,997 UART: [afmc] ++
22,405,594 UART: [afmc] CDI.KEYID = 6
22,406,467 UART: [afmc] SUBJECT.KEYID = 7
22,407,735 UART: [afmc] AUTHORITY.KEYID = 5
25,766,014 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,064,380 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,066,619 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,081,207 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,095,937 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,110,163 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,131,506 UART: [afmc] --
28,134,827 UART: [cold-reset] --
28,138,359 UART: [state] Locking Datavault
28,145,114 UART: [state] Locking PCR0, PCR1 and PCR31
28,146,861 UART: [state] Locking ICCM
28,148,546 UART: [exit] Launching FMC @ 0x40000130
28,156,926 UART:
28,157,168 UART: Running Caliptra FMC ...
28,158,200 UART:
28,158,340 UART: [state] CFI Enabled
28,226,371 UART: [fht] FMC Alias Private Key: 7
30,564,344 UART: [art] Extend RT PCRs Done
30,565,586 UART: [art] Lock RT PCRs Done
30,567,020 UART: [art] Populate DV Done
30,572,711 UART: [fht] FMC Alias Private Key: 7
30,574,189 UART: [art] Derive CDI
30,574,912 UART: [art] Store in in slot 0x4
30,634,538 UART: [art] Derive Key Pair
30,635,565 UART: [art] Store priv key in slot 0x5
33,928,576 UART: [art] Derive Key Pair - Done
33,941,361 UART: [art] Signing Cert with AUTHO
33,942,664 UART: RITY.KEYID = 7
36,229,688 UART: [art] Erasing AUTHORITY.KEYID = 7
36,231,197 UART: [art] PUB.X = EDAF52E9839AAAC78545D280718055E1576DC7CE716DA96CF9349CCCED896B0007CA149BE89A5E3AC235069855AD31B1
36,238,410 UART: [art] PUB.Y = 683E3D589C85B31C14D40FF6A40E3E18192BD476770ACD62D0A7980E5B3D65587F77E9CCB7A163C0AD6C5E8BF243BA0E
36,245,714 UART: [art] SIG.R = 6349BECCB26E78A0451D693463AE7C3C6203F38239321FCA83835B7AEC7D77AB6DFAE6703FDA495C8CFD875141C9F3EC
36,253,067 UART: [art] SIG.S = 624715852048505FD1DAB6AA5DD07C29F939DFA593DE33937C4FDD32E05E67FA50E8E7FC725695F0287E24F431EC0999
37,558,479 UART: Caliptra RT
37,559,186 UART: [state] CFI Enabled
37,720,023 UART: [rt] RT listening for mailbox commands...
37,722,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,877,874 UART: [rt]cmd =0x41544d4e, len=14344
41,223,474 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,804,680 ready_for_fw is high
3,805,148 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,966,779 >>> mbox cmd response: success
27,664,520 UART:
27,664,919 UART: Running Caliptra FMC ...
27,666,048 UART:
27,666,202 UART: [state] CFI Enabled
27,734,577 UART: [fht] FMC Alias Private Key: 7
30,072,469 UART: [art] Extend RT PCRs Done
30,073,697 UART: [art] Lock RT PCRs Done
30,075,295 UART: [art] Populate DV Done
30,080,808 UART: [fht] FMC Alias Private Key: 7
30,082,292 UART: [art] Derive CDI
30,083,024 UART: [art] Store in in slot 0x4
30,143,032 UART: [art] Derive Key Pair
30,144,026 UART: [art] Store priv key in slot 0x5
33,437,062 UART: [art] Derive Key Pair - Done
33,450,660 UART: [art] Signing Cert with AUTHO
33,451,960 UART: RITY.KEYID = 7
35,737,906 UART: [art] Erasing AUTHORITY.KEYID = 7
35,739,421 UART: [art] PUB.X = 168206A1343C224ECD4880D4817FC9E0B8035D4B63A31D47516CEE0B218260EC03FBB3829B37B92B5931BA5647EC2DB7
35,746,624 UART: [art] PUB.Y = 33A821BC921986CFD4A9B7AAFD2BC2A849282CCB9D1B09BAFC8C57A89A02D693BC38AEB2839C8675DDB96CF168679405
35,753,910 UART: [art] SIG.R = EF771A37E56F23822792B861B17B4390C01F32BB9A69CD9833A0F7177D557A258678ED16EFAAC64567DEF48F471E599F
35,761,296 UART: [art] SIG.S = BE34B48028D7235AC797225C32284C90D9919AAA7F6EA37DC7A6ECF408CAF55299E55C18241F097AC8A023709637DE10
37,066,074 UART: Caliptra RT
37,066,766 UART: [state] CFI Enabled
37,227,672 UART: [rt] RT listening for mailbox commands...
37,230,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,385,181 UART: [rt]cmd =0x41544d4e, len=14344
40,731,171 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,481 UART:
193,003 UART: Running Caliptra ROM ...
194,165 UART:
603,836 UART: [state] CFI Enabled
615,163 UART: [state] LifecycleState = Unprovisioned
617,111 UART: [state] DebugLocked = No
619,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,640 UART: [kat] SHA2-256
793,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,893 UART: [kat] ++
804,381 UART: [kat] sha1
816,627 UART: [kat] SHA2-256
819,290 UART: [kat] SHA2-384
823,859 UART: [kat] SHA2-512-ACC
826,229 UART: [kat] ECC-384
3,110,798 UART: [kat] HMAC-384Kdf
3,122,169 UART: [kat] LMS
4,312,317 UART: [kat] --
4,316,117 UART: [cold-reset] ++
4,318,546 UART: [fht] Storing FHT @ 0x50003400
4,330,449 UART: [idev] ++
4,331,009 UART: [idev] CDI.KEYID = 6
4,331,971 UART: [idev] SUBJECT.KEYID = 7
4,333,227 UART: [idev] UDS.KEYID = 0
4,334,241 ready_for_fw is high
4,334,454 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,477,679 UART: [idev] Erasing UDS.KEYID = 0
7,613,245 UART: [idev] Using Sha1 for KeyId Algorithm
7,634,726 UART: [idev] --
7,639,520 UART: [ldev] ++
7,640,123 UART: [ldev] CDI.KEYID = 6
7,641,062 UART: [ldev] SUBJECT.KEYID = 5
7,642,278 UART: [ldev] AUTHORITY.KEYID = 7
7,643,561 UART: [ldev] FE.KEYID = 1
7,653,854 UART: [ldev] Erasing FE.KEYID = 1
10,944,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,206 UART: [ldev] --
13,305,680 UART: [fwproc] Waiting for Commands...
13,309,009 UART: [fwproc] Received command 0x46574c44
13,311,209 UART: [fwproc] Received Image of size 114036 bytes
22,269,780 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,345,362 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,414,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,731,231 >>> mbox cmd response: success
22,735,550 UART: [afmc] ++
22,736,146 UART: [afmc] CDI.KEYID = 6
22,737,055 UART: [afmc] SUBJECT.KEYID = 7
22,738,333 UART: [afmc] AUTHORITY.KEYID = 5
26,052,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,344,157 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,346,410 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,360,972 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,375,736 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,389,923 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,410,524 UART: [afmc] --
28,413,703 UART: [cold-reset] --
28,417,622 UART: [state] Locking Datavault
28,422,113 UART: [state] Locking PCR0, PCR1 and PCR31
28,423,810 UART: [state] Locking ICCM
28,426,067 UART: [exit] Launching FMC @ 0x40000130
28,434,460 UART:
28,434,699 UART: Running Caliptra FMC ...
28,435,799 UART:
28,435,963 UART: [state] CFI Enabled
28,443,845 UART: [fht] FMC Alias Private Key: 7
30,775,344 UART: [art] Extend RT PCRs Done
30,776,562 UART: [art] Lock RT PCRs Done
30,778,246 UART: [art] Populate DV Done
30,783,551 UART: [fht] FMC Alias Private Key: 7
30,785,095 UART: [art] Derive CDI
30,785,910 UART: [art] Store in in slot 0x4
30,828,093 UART: [art] Derive Key Pair
30,829,093 UART: [art] Store priv key in slot 0x5
34,071,371 UART: [art] Derive Key Pair - Done
34,084,481 UART: [art] Signing Cert with AUTHO
34,085,800 UART: RITY.KEYID = 7
36,365,091 UART: [art] Erasing AUTHORITY.KEYID = 7
36,366,598 UART: [art] PUB.X = C7ABBD95F77EB1FA744DC7232DF229FD7E5DF280BF38277437C3844BF11059C6AA3C416DDCB65CB08F738E3619A10122
36,373,854 UART: [art] PUB.Y = 10352D7DEE2EA0FF25B0DDBC5F34A3864A24EE1799626491E0CA40E9AE3150005520D9A2EAE72C16F9A925EFE1270CFD
36,381,142 UART: [art] SIG.R = 75C8548D99838C4D896CD7327FA8EE6FDA2BEDD945EA15C1018C515F00A6D392495EBE147185BFC54C93CD9B081069D3
36,388,481 UART: [art] SIG.S = 4263C44C8F32AD9D6E6C89D5790530DD554DFAFEC435B87CB12B1E1B43A1E230C0A5886C60C7E3BB3CE357087E1CAE63
37,693,731 UART: Caliptra RT
37,694,433 UART: [state] CFI Enabled
37,811,879 UART: [rt] RT listening for mailbox commands...
37,814,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,969,607 UART: [rt]cmd =0x41544d4e, len=14344
41,314,626 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,125,112 ready_for_fw is high
4,125,499 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,381,604 >>> mbox cmd response: success
28,017,869 UART:
28,018,248 UART: Running Caliptra FMC ...
28,019,436 UART:
28,019,603 UART: [state] CFI Enabled
28,027,227 UART: [fht] FMC Alias Private Key: 7
30,357,856 UART: [art] Extend RT PCRs Done
30,359,076 UART: [art] Lock RT PCRs Done
30,360,786 UART: [art] Populate DV Done
30,366,472 UART: [fht] FMC Alias Private Key: 7
30,367,959 UART: [art] Derive CDI
30,368,723 UART: [art] Store in in slot 0x4
30,411,376 UART: [art] Derive Key Pair
30,412,417 UART: [art] Store priv key in slot 0x5
33,654,331 UART: [art] Derive Key Pair - Done
33,667,491 UART: [art] Signing Cert with AUTHO
33,668,833 UART: RITY.KEYID = 7
35,948,267 UART: [art] Erasing AUTHORITY.KEYID = 7
35,949,784 UART: [art] PUB.X = 19608A968B260EAD410A392FBD90A4E530DFDCA5C92A01FE05B1F8D66D46C0C3A71692DD6A20C2DA4FEE55F61D21D79D
35,957,063 UART: [art] PUB.Y = 35C1B9C9F874422D9B7A9866B60AA9C853743C6F1CC3F64E6E9609209188C138688104BE09D5C402296CB402E7658000
35,964,250 UART: [art] SIG.R = D434C1732B7FE8EF2BBC6FF9F86670BB4A96CE2EFE4805BFAFFA38B46AE025A1B74762CF4A97918EDCB728A426E4653A
35,971,676 UART: [art] SIG.S = 9101111527E08A2D484A673A7423A76E97DE07AEBD5A8F9EBB87A81933703A47D46DBCB849CC51A1B6B201CD1EC9256B
37,276,598 UART: Caliptra RT
37,277,308 UART: [state] CFI Enabled
37,395,739 UART: [rt] RT listening for mailbox commands...
37,398,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,553,519 UART: [rt]cmd =0x41544d4e, len=14344
40,976,231 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
192,668 UART:
193,071 UART: Running Caliptra ROM ...
194,252 UART:
194,404 UART: [state] CFI Enabled
263,450 UART: [state] LifecycleState = Unprovisioned
265,356 UART: [state] DebugLocked = No
268,030 UART: [state] WD Timer not started. Device not locked for debugging
271,933 UART: [kat] SHA2-256
451,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,661 UART: [kat] ++
463,198 UART: [kat] sha1
475,172 UART: [kat] SHA2-256
478,246 UART: [kat] SHA2-384
484,884 UART: [kat] SHA2-512-ACC
487,824 UART: [kat] ECC-384
2,950,167 UART: [kat] HMAC-384Kdf
2,972,931 UART: [kat] LMS
3,502,367 UART: [kat] --
3,507,595 UART: [cold-reset] ++
3,509,312 UART: [fht] FHT @ 0x50003400
3,520,051 UART: [idev] ++
3,520,658 UART: [idev] CDI.KEYID = 6
3,521,546 UART: [idev] SUBJECT.KEYID = 7
3,522,725 UART: [idev] UDS.KEYID = 0
3,523,657 ready_for_fw is high
3,523,883 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,633 UART: [idev] Erasing UDS.KEYID = 0
6,026,397 UART: [idev] Sha1 KeyId Algorithm
6,048,065 UART: [idev] --
6,051,420 UART: [ldev] ++
6,052,001 UART: [ldev] CDI.KEYID = 6
6,052,923 UART: [ldev] SUBJECT.KEYID = 5
6,054,085 UART: [ldev] AUTHORITY.KEYID = 7
6,055,321 UART: [ldev] FE.KEYID = 1
6,100,864 UART: [ldev] Erasing FE.KEYID = 1
8,604,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,589 UART: [ldev] --
10,393,875 UART: [fwproc] Wait for Commands...
10,396,714 UART: [fwproc] Recv command 0x46574c44
10,398,823 UART: [fwproc] Recv'd Img size: 114360 bytes
14,964,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,037,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,106,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,425,422 >>> mbox cmd response: success
15,429,330 UART: [afmc] ++
15,429,927 UART: [afmc] CDI.KEYID = 6
15,430,814 UART: [afmc] SUBJECT.KEYID = 7
15,432,026 UART: [afmc] AUTHORITY.KEYID = 5
17,964,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,315 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,723,291 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,264 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,755,044 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,777,993 UART: [afmc] --
19,781,753 UART: [cold-reset] --
19,785,402 UART: [state] Locking Datavault
19,791,035 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,688 UART: [state] Locking ICCM
19,794,676 UART: [exit] Launching FMC @ 0x40000130
19,803,134 UART:
19,803,372 UART: Running Caliptra FMC ...
19,804,473 UART:
19,804,639 UART: [state] CFI Enabled
19,863,495 UART: [fht] FMC Alias Private Key: 7
21,627,102 UART: [art] Extend RT PCRs Done
21,628,326 UART: [art] Lock RT PCRs Done
21,630,159 UART: [art] Populate DV Done
21,635,241 UART: [fht] FMC Alias Private Key: 7
21,636,957 UART: [art] Derive CDI
21,637,695 UART: [art] Store in in slot 0x4
21,695,716 UART: [art] Derive Key Pair
21,696,756 UART: [art] Store priv key in slot 0x5
24,159,781 UART: [art] Derive Key Pair - Done
24,173,101 UART: [art] Signing Cert with AUTHO
24,174,409 UART: RITY.KEYID = 7
25,885,022 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,532 UART: [art] PUB.X = 43B3B9A4EC7BF73F9F36A27A78315F2C07A4C96084DD26A9B3DB7FDF4B14D43D935EFF7C8F04FD40F1332EAB1C65373B
25,893,792 UART: [art] PUB.Y = C1D0CDEF7467E42607C72BF50DEFF69FC562C5086649616E341A911EF3A3FB33DDF921E21D32937E2DF3ED2528E2AFA2
25,901,059 UART: [art] SIG.R = 43FF6D2943B62E2E03E6B0D400B9CAFDD8BDE7C8CEF706ADDCA047408B39E61DEB282B121319F6B8AB85224E34219273
25,908,501 UART: [art] SIG.S = 26982D3E6F6EA2AECFBA0722AA99B3E276D695A23C8F65BD41FE19ABD2DAE5EFDDC1CB9D9F05BEE6C496B47CF38045AA
26,887,071 UART: Caliptra RT
26,887,785 UART: [state] CFI Enabled
27,050,911 UART: [rt] RT listening for mailbox commands...
27,053,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,298 UART: [rt]cmd =0x41544d4e, len=14344
29,351,340 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,563 writing to cptra_bootfsm_go
192,657 UART:
193,028 UART: Running Caliptra ROM ...
194,236 UART:
194,391 UART: [state] CFI Enabled
261,106 UART: [state] LifecycleState = Unprovisioned
263,185 UART: [state] DebugLocked = No
265,365 UART: [state] WD Timer not started. Device not locked for debugging
269,178 UART: [kat] SHA2-256
459,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,779 UART: [kat] ++
470,274 UART: [kat] sha1
482,141 UART: [kat] SHA2-256
485,145 UART: [kat] SHA2-384
489,787 UART: [kat] SHA2-512-ACC
492,380 UART: [kat] ECC-384
2,946,413 UART: [kat] HMAC-384Kdf
2,969,246 UART: [kat] LMS
3,501,006 UART: [kat] --
3,506,577 UART: [cold-reset] ++
3,507,612 UART: [fht] FHT @ 0x50003400
3,518,381 UART: [idev] ++
3,519,099 UART: [idev] CDI.KEYID = 6
3,520,023 UART: [idev] SUBJECT.KEYID = 7
3,521,201 UART: [idev] UDS.KEYID = 0
3,522,156 ready_for_fw is high
3,522,367 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,428 UART: [idev] Erasing UDS.KEYID = 0
6,023,894 UART: [idev] Sha1 KeyId Algorithm
6,046,539 UART: [idev] --
6,051,293 UART: [ldev] ++
6,051,981 UART: [ldev] CDI.KEYID = 6
6,052,896 UART: [ldev] SUBJECT.KEYID = 5
6,054,058 UART: [ldev] AUTHORITY.KEYID = 7
6,055,296 UART: [ldev] FE.KEYID = 1
6,097,206 UART: [ldev] Erasing FE.KEYID = 1
8,604,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,060 UART: [ldev] --
10,411,607 UART: [fwproc] Wait for Commands...
10,414,086 UART: [fwproc] Recv command 0x46574c44
10,416,345 UART: [fwproc] Recv'd Img size: 114360 bytes
15,047,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,128,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,245,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,788,441 >>> mbox cmd response: success
15,792,652 UART: [afmc] ++
15,793,365 UART: [afmc] CDI.KEYID = 6
15,794,620 UART: [afmc] SUBJECT.KEYID = 7
15,796,068 UART: [afmc] AUTHORITY.KEYID = 5
18,323,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,047,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,049,377 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,064,491 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,079,662 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,094,459 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,118,541 UART: [afmc] --
20,122,728 UART: [cold-reset] --
20,126,812 UART: [state] Locking Datavault
20,134,452 UART: [state] Locking PCR0, PCR1 and PCR31
20,136,602 UART: [state] Locking ICCM
20,139,161 UART: [exit] Launching FMC @ 0x40000130
20,147,787 UART:
20,148,060 UART: Running Caliptra FMC ...
20,149,093 UART:
20,149,244 UART: [state] CFI Enabled
20,203,981 UART: [fht] FMC Alias Private Key: 7
21,967,609 UART: [art] Extend RT PCRs Done
21,968,830 UART: [art] Lock RT PCRs Done
21,970,328 UART: [art] Populate DV Done
21,975,758 UART: [fht] FMC Alias Private Key: 7
21,977,404 UART: [art] Derive CDI
21,978,143 UART: [art] Store in in slot 0x4
22,036,963 UART: [art] Derive Key Pair
22,038,010 UART: [art] Store priv key in slot 0x5
24,500,481 UART: [art] Derive Key Pair - Done
24,513,647 UART: [art] Signing Cert with AUTHO
24,514,951 UART: RITY.KEYID = 7
26,226,743 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,256 UART: [art] PUB.X = 83039BA8307D4A9200322A85F47DA502BC28F92E1E86EF6416EFED20188C73DB9904E03BB0BB0E9BC34D7C0D5128884D
26,235,494 UART: [art] PUB.Y = B8D2E3465DC08B0AFE1482757DC6F05DE099A347954A0033B05A4288F66417912ECEE62A3F5D972000BE269754C4ADA7
26,242,723 UART: [art] SIG.R = 3B886837113E9B25C909DE26D9552EF78A0FB86F8064D7D0F813D1EA79EBA0DB8938156A62708CAE7AC85906C3DB2C8A
26,250,095 UART: [art] SIG.S = B83D0F56ED6ECAAFABD44D738112762B120A53580A10FAC555CADED8EFFB00EE28D9B7EAE37A8A102A2F96EABCD25A9A
27,228,919 UART: Caliptra RT
27,229,612 UART: [state] CFI Enabled
27,395,454 UART: [rt] RT listening for mailbox commands...
27,397,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,552,992 UART: [rt]cmd =0x41544d4e, len=14344
29,695,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
3,442,024 ready_for_fw is high
3,442,791 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,834,379 >>> mbox cmd response: success
20,112,265 UART:
20,112,658 UART: Running Caliptra FMC ...
20,113,768 UART:
20,113,919 UART: [state] CFI Enabled
20,181,988 UART: [fht] FMC Alias Private Key: 7
21,945,892 UART: [art] Extend RT PCRs Done
21,947,102 UART: [art] Lock RT PCRs Done
21,948,966 UART: [art] Populate DV Done
21,954,159 UART: [fht] FMC Alias Private Key: 7
21,955,755 UART: [art] Derive CDI
21,956,495 UART: [art] Store in in slot 0x4
22,014,495 UART: [art] Derive Key Pair
22,015,553 UART: [art] Store priv key in slot 0x5
24,478,295 UART: [art] Derive Key Pair - Done
24,491,400 UART: [art] Signing Cert with AUTHO
24,492,706 UART: RITY.KEYID = 7
26,204,074 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,570 UART: [art] PUB.X = 84B97DB79292EA62E83968E100F2DA3E15FB946C71439E7C21EF5DD58364A540E852937A3E821DB8DEDD993BAEFD733D
26,212,792 UART: [art] PUB.Y = E9D85B4AC16B8FF4974161CED9330ADB4F8C6F51B3AB9E484D0626B0FF2F7D1C354A3085A390ED2C2DF2747202662405
26,220,072 UART: [art] SIG.R = ED3B39DA9F351376A4C96BD03C875CDD851F373DB238A5B17C6EFAC1448037D6C4EE20DA5988AA3091C75F9CCA98F83A
26,227,480 UART: [art] SIG.S = CE38684FF6657281706D136423638B075B04D81936E8AD42E1D580CE8A5B65C72BF00C72AA6BF3ACFA8043948AADBE27
27,206,199 UART: Caliptra RT
27,206,899 UART: [state] CFI Enabled
27,372,235 UART: [rt] RT listening for mailbox commands...
27,374,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,009 UART: [rt]cmd =0x41544d4e, len=14344
29,677,249 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,352 UART:
192,706 UART: Running Caliptra ROM ...
193,894 UART:
603,365 UART: [state] CFI Enabled
615,497 UART: [state] LifecycleState = Unprovisioned
617,891 UART: [state] DebugLocked = No
619,139 UART: [state] WD Timer not started. Device not locked for debugging
623,319 UART: [kat] SHA2-256
813,213 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,013 UART: [kat] ++
824,622 UART: [kat] sha1
835,785 UART: [kat] SHA2-256
838,794 UART: [kat] SHA2-384
844,923 UART: [kat] SHA2-512-ACC
847,468 UART: [kat] ECC-384
3,288,459 UART: [kat] HMAC-384Kdf
3,302,106 UART: [kat] LMS
3,833,947 UART: [kat] --
3,839,807 UART: [cold-reset] ++
3,841,643 UART: [fht] FHT @ 0x50003400
3,852,915 UART: [idev] ++
3,853,629 UART: [idev] CDI.KEYID = 6
3,854,605 UART: [idev] SUBJECT.KEYID = 7
3,855,775 UART: [idev] UDS.KEYID = 0
3,856,700 ready_for_fw is high
3,856,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,909 UART: [idev] Erasing UDS.KEYID = 0
6,335,599 UART: [idev] Sha1 KeyId Algorithm
6,358,443 UART: [idev] --
6,362,753 UART: [ldev] ++
6,363,481 UART: [ldev] CDI.KEYID = 6
6,364,392 UART: [ldev] SUBJECT.KEYID = 5
6,365,549 UART: [ldev] AUTHORITY.KEYID = 7
6,366,927 UART: [ldev] FE.KEYID = 1
6,376,312 UART: [ldev] Erasing FE.KEYID = 1
8,850,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,082 UART: [ldev] --
10,637,189 UART: [fwproc] Wait for Commands...
10,640,193 UART: [fwproc] Recv command 0x46574c44
10,642,499 UART: [fwproc] Recv'd Img size: 114360 bytes
15,269,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,347,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,463,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,005,608 >>> mbox cmd response: success
16,009,802 UART: [afmc] ++
16,010,516 UART: [afmc] CDI.KEYID = 6
16,011,756 UART: [afmc] SUBJECT.KEYID = 7
16,013,212 UART: [afmc] AUTHORITY.KEYID = 5
18,513,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,238,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,240,377 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,255,412 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,270,634 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,285,477 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,309,693 UART: [afmc] --
20,313,567 UART: [cold-reset] --
20,318,516 UART: [state] Locking Datavault
20,323,390 UART: [state] Locking PCR0, PCR1 and PCR31
20,325,575 UART: [state] Locking ICCM
20,328,217 UART: [exit] Launching FMC @ 0x40000130
20,336,879 UART:
20,337,124 UART: Running Caliptra FMC ...
20,338,223 UART:
20,338,404 UART: [state] CFI Enabled
20,346,019 UART: [fht] FMC Alias Private Key: 7
22,102,371 UART: [art] Extend RT PCRs Done
22,103,593 UART: [art] Lock RT PCRs Done
22,105,439 UART: [art] Populate DV Done
22,110,737 UART: [fht] FMC Alias Private Key: 7
22,112,377 UART: [art] Derive CDI
22,113,112 UART: [art] Store in in slot 0x4
22,155,538 UART: [art] Derive Key Pair
22,156,579 UART: [art] Store priv key in slot 0x5
24,583,160 UART: [art] Derive Key Pair - Done
24,596,095 UART: [art] Signing Cert with AUTHO
24,597,402 UART: RITY.KEYID = 7
26,303,113 UART: [art] Erasing AUTHORITY.KEYID = 7
26,304,620 UART: [art] PUB.X = AE19AFA62CF9AC52FC028159CE48045B60DD5DAAC703D64760FE3B598D29AAB3E479338C3A7A3AD00C0259CE4320E0E4
26,311,869 UART: [art] PUB.Y = 6F7B5CC8AAE9A268ECF6BC183E311D5C6767D583A8E1DE10E51358C3ECF20FAA4E469BA27173D4FAFA41FF65D4D34C9A
26,319,176 UART: [art] SIG.R = 7054E05B516E4969C5F3AF8D229F1079B23BC38EA2BD1A8FBFEAFB10972A97AD96E341C847FBA110866E166129941BEB
26,326,576 UART: [art] SIG.S = E7B7FCFBB234C3D269CC3E7C17045D5160E6A70AC5F1BB27A0284283999FF258E4D98CD255FE6FB42576BDC130B2DEFB
27,305,615 UART: Caliptra RT
27,306,322 UART: [state] CFI Enabled
27,423,445 UART: [rt] RT listening for mailbox commands...
27,425,753 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,581,279 UART: [rt]cmd =0x41544d4e, len=14344
29,730,813 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,754,245 ready_for_fw is high
3,754,671 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,044,308 >>> mbox cmd response: success
20,295,196 UART:
20,295,580 UART: Running Caliptra FMC ...
20,296,672 UART:
20,296,822 UART: [state] CFI Enabled
20,304,855 UART: [fht] FMC Alias Private Key: 7
22,062,341 UART: [art] Extend RT PCRs Done
22,063,584 UART: [art] Lock RT PCRs Done
22,065,404 UART: [art] Populate DV Done
22,070,981 UART: [fht] FMC Alias Private Key: 7
22,072,629 UART: [art] Derive CDI
22,073,374 UART: [art] Store in in slot 0x4
22,115,751 UART: [art] Derive Key Pair
22,116,748 UART: [art] Store priv key in slot 0x5
24,543,433 UART: [art] Derive Key Pair - Done
24,556,213 UART: [art] Signing Cert with AUTHO
24,557,520 UART: RITY.KEYID = 7
26,262,782 UART: [art] Erasing AUTHORITY.KEYID = 7
26,264,284 UART: [art] PUB.X = 77D949C89662D3889F1A73537E8AC725896DBCB636895BB51B93B9119F10D5BA518580AC66429BAF5C8BF65FA57CEB39
26,271,551 UART: [art] PUB.Y = BBD3D9FA9C447759AAD916F4E5C9BB18821C559836C21F6380C582A1CCBF011C4E98DA4864DE6A2043277F2D1A50E55E
26,278,783 UART: [art] SIG.R = 3BC82F94ED3D91AB1300119F9C363FB800852A63161A9A43E111DB3F97AD241D6E8B1104CCEEF698F0624071E94D9302
26,286,140 UART: [art] SIG.S = CFF2BF2F269675A39B8035FAC43D0C4C6A2EB3BD0BEA93F341393BC541C3509CAA7D7C5D52540B18F2B5F55B401D0312
27,265,100 UART: Caliptra RT
27,265,803 UART: [state] CFI Enabled
27,382,654 UART: [rt] RT listening for mailbox commands...
27,384,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,540,126 UART: [rt]cmd =0x41544d4e, len=14344
29,691,937 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,067 UART: [kat] SHA2-256
881,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,113 UART: [kat] ++
886,265 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
894,814 UART: [kat] SHA2-512-ACC
896,715 UART: [kat] ECC-384
902,208 UART: [kat] HMAC-384Kdf
906,874 UART: [kat] LMS
1,475,070 UART: [kat] --
1,475,791 UART: [cold-reset] ++
1,476,167 UART: [fht] Storing FHT @ 0x50003400
1,479,012 UART: [idev] ++
1,479,180 UART: [idev] CDI.KEYID = 6
1,479,540 UART: [idev] SUBJECT.KEYID = 7
1,479,964 UART: [idev] UDS.KEYID = 0
1,480,309 ready_for_fw is high
1,480,309 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,400 UART: [idev] Erasing UDS.KEYID = 0
1,504,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,870 UART: [idev] --
1,514,053 UART: [ldev] ++
1,514,221 UART: [ldev] CDI.KEYID = 6
1,514,584 UART: [ldev] SUBJECT.KEYID = 5
1,515,010 UART: [ldev] AUTHORITY.KEYID = 7
1,515,473 UART: [ldev] FE.KEYID = 1
1,520,911 UART: [ldev] Erasing FE.KEYID = 1
1,546,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,412 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,582 UART: [fwproc] Received command 0x46574c44
1,587,373 UART: [fwproc] Received Image of size 114360 bytes
5,006,246 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,034,990 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,064,342 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,200,291 >>> mbox cmd response: success
5,201,423 UART: [afmc] ++
5,201,591 UART: [afmc] CDI.KEYID = 6
5,201,953 UART: [afmc] SUBJECT.KEYID = 7
5,202,378 UART: [afmc] AUTHORITY.KEYID = 5
5,236,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,253,280 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,254,060 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,259,769 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,265,661 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,271,362 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,279,260 UART: [afmc] --
5,280,172 UART: [cold-reset] --
5,281,144 UART: [state] Locking Datavault
5,282,361 UART: [state] Locking PCR0, PCR1 and PCR31
5,282,965 UART: [state] Locking ICCM
5,283,587 UART: [exit] Launching FMC @ 0x40000130
5,288,916 UART:
5,288,932 UART: Running Caliptra FMC ...
5,289,340 UART:
5,289,394 UART: [state] CFI Enabled
5,299,868 UART: [fht] FMC Alias Private Key: 7
5,408,390 UART: [art] Extend RT PCRs Done
5,408,818 UART: [art] Lock RT PCRs Done
5,410,160 UART: [art] Populate DV Done
5,418,248 UART: [fht] FMC Alias Private Key: 7
5,419,216 UART: [art] Derive CDI
5,419,496 UART: [art] Store in in slot 0x4
5,505,043 UART: [art] Derive Key Pair
5,505,403 UART: [art] Store priv key in slot 0x5
5,518,119 UART: [art] Derive Key Pair - Done
5,533,002 UART: [art] Signing Cert with AUTHO
5,533,482 UART: RITY.KEYID = 7
5,548,214 UART: [art] Erasing AUTHORITY.KEYID = 7
5,548,979 UART: [art] PUB.X = 926749F5774E8D12ACF64CDDB96F2C427E8E5FF5B4240F3406FDD6801E7A909927A888BAF26E32C70CA82FCF4D78B6D9
5,555,752 UART: [art] PUB.Y = 4DF77860E256FFD668EB9A53475A0EBF923F4F77AEDB301028A5154A3003760EC9B289CF01FA7958409832247D0AA77B
5,562,689 UART: [art] SIG.R = B5C07A16E5E5D6CE25A5EC2421635DE7CA4FB4113D16AB8D4109370380E5D2DA1B12A2EB24E6A016187BA68B74999D83
5,569,461 UART: [art] SIG.S = 3E4ABB7222FE46E116276C74A902B85A9BA404B05E2F073D3C707EE1D702C18A20E0415DCD9F3E09A722EE2E7554CF19
5,593,371 UART: Caliptra RT
5,593,625 UART: [state] CFI Enabled
5,701,721 UART: [rt] RT listening for mailbox commands...
5,702,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,825,160 UART: [rt]cmd =0x41544d4e, len=14344
6,105,888 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,089 ready_for_fw is high
1,362,089 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,048,317 >>> mbox cmd response: success
5,109,394 UART:
5,109,410 UART: Running Caliptra FMC ...
5,109,818 UART:
5,109,872 UART: [state] CFI Enabled
5,120,734 UART: [fht] FMC Alias Private Key: 7
5,228,400 UART: [art] Extend RT PCRs Done
5,228,828 UART: [art] Lock RT PCRs Done
5,230,448 UART: [art] Populate DV Done
5,238,530 UART: [fht] FMC Alias Private Key: 7
5,239,516 UART: [art] Derive CDI
5,239,796 UART: [art] Store in in slot 0x4
5,324,993 UART: [art] Derive Key Pair
5,325,353 UART: [art] Store priv key in slot 0x5
5,338,637 UART: [art] Derive Key Pair - Done
5,353,644 UART: [art] Signing Cert with AUTHO
5,354,124 UART: RITY.KEYID = 7
5,369,508 UART: [art] Erasing AUTHORITY.KEYID = 7
5,370,273 UART: [art] PUB.X = FF0E32175E2B3227D30D36325B597EA6E580C91441D4A279BA9AE2CD2AE878AC244B716CCD673F33862225BF80DD0402
5,377,035 UART: [art] PUB.Y = 4EF3DF7C422530AB04F52630A785CF020DDD76A1982CA8BA4C43BC9F22E5509D0BD294A5F5AD38C2C3591C7C1AA760A1
5,383,987 UART: [art] SIG.R = FCBD489B7005597B74DEFBA4442FE8F0AB8078E6EA2215BF7F48568AB4D1A369BABFCD54DF5B993089F19282C76EAE68
5,390,772 UART: [art] SIG.S = 91177686A199D0754DEFE89F4D6E06BF1347C636A73B94F7CABBD3C594317C910EBDFE48395BFF79536EFD1432D89093
5,414,409 UART: Caliptra RT
5,414,663 UART: [state] CFI Enabled
5,522,844 UART: [rt] RT listening for mailbox commands...
5,523,514 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,049 UART: [rt]cmd =0x41544d4e, len=14344
5,938,734 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,789 UART: [kat] SHA2-512-ACC
897,690 UART: [kat] ECC-384
903,303 UART: [kat] HMAC-384Kdf
908,053 UART: [kat] LMS
1,476,249 UART: [kat] --
1,477,106 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,401 UART: [idev] ++
1,480,569 UART: [idev] CDI.KEYID = 6
1,480,929 UART: [idev] SUBJECT.KEYID = 7
1,481,353 UART: [idev] UDS.KEYID = 0
1,481,698 ready_for_fw is high
1,481,698 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,573 UART: [idev] Erasing UDS.KEYID = 0
1,506,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,961 UART: [idev] --
1,516,072 UART: [ldev] ++
1,516,240 UART: [ldev] CDI.KEYID = 6
1,516,603 UART: [ldev] SUBJECT.KEYID = 5
1,517,029 UART: [ldev] AUTHORITY.KEYID = 7
1,517,492 UART: [ldev] FE.KEYID = 1
1,522,834 UART: [ldev] Erasing FE.KEYID = 1
1,548,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,403 UART: [ldev] --
1,587,782 UART: [fwproc] Waiting for Commands...
1,588,435 UART: [fwproc] Received command 0x46574c44
1,589,226 UART: [fwproc] Received Image of size 114360 bytes
5,047,244 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,076,192 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,105,544 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,241,439 >>> mbox cmd response: success
5,242,475 UART: [afmc] ++
5,242,643 UART: [afmc] CDI.KEYID = 6
5,243,005 UART: [afmc] SUBJECT.KEYID = 7
5,243,430 UART: [afmc] AUTHORITY.KEYID = 5
5,278,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,294,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,295,588 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,301,297 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,307,189 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,312,890 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,320,786 UART: [afmc] --
5,321,794 UART: [cold-reset] --
5,322,714 UART: [state] Locking Datavault
5,323,823 UART: [state] Locking PCR0, PCR1 and PCR31
5,324,427 UART: [state] Locking ICCM
5,324,995 UART: [exit] Launching FMC @ 0x40000130
5,330,324 UART:
5,330,340 UART: Running Caliptra FMC ...
5,330,748 UART:
5,330,891 UART: [state] CFI Enabled
5,341,801 UART: [fht] FMC Alias Private Key: 7
5,450,611 UART: [art] Extend RT PCRs Done
5,451,039 UART: [art] Lock RT PCRs Done
5,452,989 UART: [art] Populate DV Done
5,461,399 UART: [fht] FMC Alias Private Key: 7
5,462,431 UART: [art] Derive CDI
5,462,711 UART: [art] Store in in slot 0x4
5,548,516 UART: [art] Derive Key Pair
5,548,876 UART: [art] Store priv key in slot 0x5
5,561,942 UART: [art] Derive Key Pair - Done
5,576,437 UART: [art] Signing Cert with AUTHO
5,576,917 UART: RITY.KEYID = 7
5,591,967 UART: [art] Erasing AUTHORITY.KEYID = 7
5,592,732 UART: [art] PUB.X = 766561B10C530731004D9924AAE3441160E291B19037D0F337C321333D94251CD16E41820588AF56189021DEEF66566C
5,599,453 UART: [art] PUB.Y = 8167AA68DF91C35CFAA2B4DB721BFB6D93CFEB4F8FCB972EB0154F0A2E05680831DF4AECBAB6B797D4E80C569C013839
5,606,410 UART: [art] SIG.R = C3E5F342B7FF310402D1417F145609A08D85E7A151E1E89EF122C4795DB265B34E7E1C90D7C93D06447F116FEAF89C66
5,613,170 UART: [art] SIG.S = 3BFD107692FF8960116700543E9DE6D0BDFB8D0EF437B95BCE2E0733475A9B740DC504462C041424FB93ABEA1B5C64F2
5,636,620 UART: Caliptra RT
5,636,966 UART: [state] CFI Enabled
5,744,894 UART: [rt] RT listening for mailbox commands...
5,745,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,867,989 UART: [rt]cmd =0x41544d4e, len=14344
6,146,036 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 ready_for_fw is high
1,363,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,353,862 >>> mbox cmd response: success
5,415,205 UART:
5,415,221 UART: Running Caliptra FMC ...
5,415,629 UART:
5,415,772 UART: [state] CFI Enabled
5,426,336 UART: [fht] FMC Alias Private Key: 7
5,533,746 UART: [art] Extend RT PCRs Done
5,534,174 UART: [art] Lock RT PCRs Done
5,535,350 UART: [art] Populate DV Done
5,543,640 UART: [fht] FMC Alias Private Key: 7
5,544,790 UART: [art] Derive CDI
5,545,070 UART: [art] Store in in slot 0x4
5,631,281 UART: [art] Derive Key Pair
5,631,641 UART: [art] Store priv key in slot 0x5
5,644,553 UART: [art] Derive Key Pair - Done
5,659,230 UART: [art] Signing Cert with AUTHO
5,659,710 UART: RITY.KEYID = 7
5,675,074 UART: [art] Erasing AUTHORITY.KEYID = 7
5,675,839 UART: [art] PUB.X = FE22580D44FC0F6732A12B89CACE133261B91AD2D0475AC44A74C95A5CB4D53B631BD63185997A52B62F498A344C1207
5,682,602 UART: [art] PUB.Y = 47FD623E1956C534CEF0A930EB0A03C36D8827904682834BF4CD65E2879D99EFC59FDA80933C899D1A0449C02BBF8C72
5,689,547 UART: [art] SIG.R = E968866A616D3EC233CAF383169DE1CEDA54A8D1066913359AB0C693EA32C6A8DA0359313F534D87CF2A58BBE440C868
5,696,317 UART: [art] SIG.S = B2E46035E57E3EB42B1BC382385F3558FA56EA3934C7959F48AC2D493C8BBBE795E969EBA096FB915978F09CDCAA5ED6
5,720,326 UART: Caliptra RT
5,720,672 UART: [state] CFI Enabled
5,828,597 UART: [rt] RT listening for mailbox commands...
5,829,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,952,218 UART: [rt]cmd =0x41544d4e, len=14344
6,238,300 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,700 UART: [kat] LMS
1,171,028 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,158 UART: [idev] ++
1,175,326 UART: [idev] CDI.KEYID = 6
1,175,686 UART: [idev] SUBJECT.KEYID = 7
1,176,110 UART: [idev] UDS.KEYID = 0
1,176,455 ready_for_fw is high
1,176,455 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,060 UART: [idev] Erasing UDS.KEYID = 0
1,201,015 UART: [idev] Sha1 KeyId Algorithm
1,209,439 UART: [idev] --
1,210,557 UART: [ldev] ++
1,210,725 UART: [ldev] CDI.KEYID = 6
1,211,088 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,164 UART: [fwproc] Wait for Commands...
1,282,854 UART: [fwproc] Recv command 0x46574c44
1,283,582 UART: [fwproc] Recv'd Img size: 114360 bytes
3,130,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,323,160 >>> mbox cmd response: success
3,324,398 UART: [afmc] ++
3,324,566 UART: [afmc] CDI.KEYID = 6
3,324,928 UART: [afmc] SUBJECT.KEYID = 7
3,325,353 UART: [afmc] AUTHORITY.KEYID = 5
3,360,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,728 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,437 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,329 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,040 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,897 UART: [afmc] --
3,403,979 UART: [cold-reset] --
3,404,757 UART: [state] Locking Datavault
3,405,634 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,238 UART: [state] Locking ICCM
3,406,746 UART: [exit] Launching FMC @ 0x40000130
3,412,075 UART:
3,412,091 UART: Running Caliptra FMC ...
3,412,499 UART:
3,412,553 UART: [state] CFI Enabled
3,422,399 UART: [fht] FMC Alias Private Key: 7
3,530,335 UART: [art] Extend RT PCRs Done
3,530,763 UART: [art] Lock RT PCRs Done
3,532,015 UART: [art] Populate DV Done
3,540,015 UART: [fht] FMC Alias Private Key: 7
3,541,021 UART: [art] Derive CDI
3,541,301 UART: [art] Store in in slot 0x4
3,626,938 UART: [art] Derive Key Pair
3,627,298 UART: [art] Store priv key in slot 0x5
3,640,670 UART: [art] Derive Key Pair - Done
3,655,426 UART: [art] Signing Cert with AUTHO
3,655,906 UART: RITY.KEYID = 7
3,671,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,865 UART: [art] PUB.X = 5A25042E27FB6ABEF5E76A3699E02F7D8C4FE5E65B94DF5DFC2C2B2DA5D762AF259EBEA6853AA3D16962CBAECCB55786
3,678,658 UART: [art] PUB.Y = 250402A8A634FC559B5FBD451C8A6C28B80D07C0D4CEEA5E75BC65E5FACAA64F9CDF2632AD1A9EB74257CD8C678E98C0
3,685,618 UART: [art] SIG.R = 7CA27B876158C99A38234ED82C734BEA8D7B83D482A7D57DA2173BFA3AE153311E78F2F82AAED25B458A51F68EE9CF71
3,692,400 UART: [art] SIG.S = 019DB9414A09F56383EBD16BD367D290D7E6C909ABC86F6AC38254EB6B04CECC34D3F98957E57E122AF754971FE05D48
3,715,771 UART: Caliptra RT
3,716,025 UART: [state] CFI Enabled
3,824,007 UART: [rt] RT listening for mailbox commands...
3,824,677 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,418 UART: [rt]cmd =0x41544d4e, len=14344
4,240,755 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,069 ready_for_fw is high
1,060,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,173,086 >>> mbox cmd response: success
3,234,617 UART:
3,234,633 UART: Running Caliptra FMC ...
3,235,041 UART:
3,235,095 UART: [state] CFI Enabled
3,245,351 UART: [fht] FMC Alias Private Key: 7
3,352,887 UART: [art] Extend RT PCRs Done
3,353,315 UART: [art] Lock RT PCRs Done
3,354,901 UART: [art] Populate DV Done
3,363,183 UART: [fht] FMC Alias Private Key: 7
3,364,293 UART: [art] Derive CDI
3,364,573 UART: [art] Store in in slot 0x4
3,450,356 UART: [art] Derive Key Pair
3,450,716 UART: [art] Store priv key in slot 0x5
3,464,294 UART: [art] Derive Key Pair - Done
3,479,251 UART: [art] Signing Cert with AUTHO
3,479,731 UART: RITY.KEYID = 7
3,495,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,852 UART: [art] PUB.X = D0B3CE709028CF927B2C876BAF58CBAB9C1D4EF4DFFF7394A054BE652CE8DA18C7EF15C136604CF6F3CFF67220177920
3,502,640 UART: [art] PUB.Y = F9D508078ED32DA4A92C4E05EC0672F10A6F9D30890779A580C28A531F1DCF1E93F70998057A7E952A440D0695194134
3,509,554 UART: [art] SIG.R = 5F1713B2C6BAA96B931A6DDA48FA213B0DDC4B2717781908D0D18CAF6C90A71E5E63136CDAD23C14D391AE277DD4E7E8
3,516,334 UART: [art] SIG.S = 6AA68321FEB92A760DF3DB35F6082BDEF2E29177127AF51043424922A58F359C1831D3B88F47655CFDB4CF95ED0F8BA0
3,540,062 UART: Caliptra RT
3,540,316 UART: [state] CFI Enabled
3,648,604 UART: [rt] RT listening for mailbox commands...
3,649,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,919 UART: [rt]cmd =0x41544d4e, len=14344
4,059,740 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,011 UART: [kat] HMAC-384Kdf
922,661 UART: [kat] LMS
1,170,989 UART: [kat] --
1,171,844 UART: [cold-reset] ++
1,172,242 UART: [fht] FHT @ 0x50003400
1,174,957 UART: [idev] ++
1,175,125 UART: [idev] CDI.KEYID = 6
1,175,485 UART: [idev] SUBJECT.KEYID = 7
1,175,909 UART: [idev] UDS.KEYID = 0
1,176,254 ready_for_fw is high
1,176,254 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,785 UART: [idev] Erasing UDS.KEYID = 0
1,200,314 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,728 UART: [ldev] ++
1,209,896 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,685 UART: [ldev] AUTHORITY.KEYID = 7
1,211,148 UART: [ldev] FE.KEYID = 1
1,216,258 UART: [ldev] Erasing FE.KEYID = 1
1,242,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,268 UART: [ldev] --
1,281,713 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,011 UART: [fwproc] Recv'd Img size: 114360 bytes
3,124,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,317,971 >>> mbox cmd response: success
3,319,005 UART: [afmc] ++
3,319,173 UART: [afmc] CDI.KEYID = 6
3,319,535 UART: [afmc] SUBJECT.KEYID = 7
3,319,960 UART: [afmc] AUTHORITY.KEYID = 5
3,355,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,099 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,808 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,700 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,411 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,232 UART: [afmc] --
3,399,158 UART: [cold-reset] --
3,400,046 UART: [state] Locking Datavault
3,401,069 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,673 UART: [state] Locking ICCM
3,402,201 UART: [exit] Launching FMC @ 0x40000130
3,407,530 UART:
3,407,546 UART: Running Caliptra FMC ...
3,407,954 UART:
3,408,097 UART: [state] CFI Enabled
3,418,347 UART: [fht] FMC Alias Private Key: 7
3,527,037 UART: [art] Extend RT PCRs Done
3,527,465 UART: [art] Lock RT PCRs Done
3,529,259 UART: [art] Populate DV Done
3,537,563 UART: [fht] FMC Alias Private Key: 7
3,538,643 UART: [art] Derive CDI
3,538,923 UART: [art] Store in in slot 0x4
3,625,180 UART: [art] Derive Key Pair
3,625,540 UART: [art] Store priv key in slot 0x5
3,639,126 UART: [art] Derive Key Pair - Done
3,654,100 UART: [art] Signing Cert with AUTHO
3,654,580 UART: RITY.KEYID = 7
3,669,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,159 UART: [art] PUB.X = D4854C966DD31FC962B5D2953A1C1E1F15CBB2C9501E0A4491C3A39FCF43FDFC70719252405F5E6867BD5CE22F569A1A
3,676,936 UART: [art] PUB.Y = 3B8048FBBB15CD34949B46563BD4ED8BCB3F11256ECBEAF35CABCF18548A3594FB65C430CC45A1B3A977617BC88AD8BB
3,683,908 UART: [art] SIG.R = E24C73192CB717435E3F77ED7C850700545A204D614FEA5BFC14F70DDF602CF59948EAA4E4CD7E5598F33EBA2E9BBEF1
3,690,666 UART: [art] SIG.S = 5F78175CE9362EE0FBCF0A695FFE7E70F491FE60193D96D8EB30CBE3A73D7F7069F8E29A83BDFEC93BA2FBFE1DE674AC
3,715,252 UART: Caliptra RT
3,715,598 UART: [state] CFI Enabled
3,823,625 UART: [rt] RT listening for mailbox commands...
3,824,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,078 UART: [rt]cmd =0x41544d4e, len=14344
4,232,476 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,680 ready_for_fw is high
1,060,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,025 >>> mbox cmd response: success
3,232,350 UART:
3,232,366 UART: Running Caliptra FMC ...
3,232,774 UART:
3,232,917 UART: [state] CFI Enabled
3,243,911 UART: [fht] FMC Alias Private Key: 7
3,351,187 UART: [art] Extend RT PCRs Done
3,351,615 UART: [art] Lock RT PCRs Done
3,353,139 UART: [art] Populate DV Done
3,361,227 UART: [fht] FMC Alias Private Key: 7
3,362,257 UART: [art] Derive CDI
3,362,537 UART: [art] Store in in slot 0x4
3,448,078 UART: [art] Derive Key Pair
3,448,438 UART: [art] Store priv key in slot 0x5
3,461,754 UART: [art] Derive Key Pair - Done
3,476,548 UART: [art] Signing Cert with AUTHO
3,477,028 UART: RITY.KEYID = 7
3,492,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,977 UART: [art] PUB.X = 6C520267011D9527E47795ECE5613AE863DD71DB2DC3FE9F743E0DE7B143BCB7350EC5B2902C0CBDEB42323AF2F29EFF
3,499,748 UART: [art] PUB.Y = BBAD6C15092B7CC497D38F7F6210D71808E7C7A66094B2B271655B2160606781EC4BB6177BC970C19A7D3A6A682C8A17
3,506,692 UART: [art] SIG.R = DB12DC0C5BFABD649842D5E7F4E4A0498728DEA26CED5B8A13CF7EB5DF6A757E68C86D8D531A996AB567DBA919B7017E
3,513,478 UART: [art] SIG.S = AE31629138C3E79770643605867610CC7A9201536501B76A7D3B57BB5A0154E97C8608C77722FF4D2D54939C029FD7FB
3,536,933 UART: Caliptra RT
3,537,279 UART: [state] CFI Enabled
3,644,991 UART: [rt] RT listening for mailbox commands...
3,645,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,676 UART: [rt]cmd =0x41544d4e, len=14344
4,056,891 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,174,579 ready_for_fw is high
1,174,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,539 UART: [idev] Erasing UDS.KEYID = 0
1,199,821 UART: [idev] Sha1 KeyId Algorithm
1,208,677 UART: [idev] --
1,209,702 UART: [ldev] ++
1,209,870 UART: [ldev] CDI.KEYID = 6
1,210,234 UART: [ldev] SUBJECT.KEYID = 5
1,210,661 UART: [ldev] AUTHORITY.KEYID = 7
1,211,124 UART: [ldev] FE.KEYID = 1
1,216,290 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,030 UART: [ldev] --
1,282,448 UART: [fwproc] Wait for Commands...
1,283,173 UART: [fwproc] Recv command 0x46574c44
1,283,906 UART: [fwproc] Recv'd Img size: 114360 bytes
3,122,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,472 >>> mbox cmd response: success
3,317,681 UART: [afmc] ++
3,317,849 UART: [afmc] CDI.KEYID = 6
3,318,212 UART: [afmc] SUBJECT.KEYID = 7
3,318,638 UART: [afmc] AUTHORITY.KEYID = 5
3,354,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,629 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,339 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,229 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,940 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,584 UART: [afmc] --
3,397,594 UART: [cold-reset] --
3,398,356 UART: [state] Locking Datavault
3,399,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,295 UART: [state] Locking ICCM
3,400,915 UART: [exit] Launching FMC @ 0x40000130
3,406,244 UART:
3,406,260 UART: Running Caliptra FMC ...
3,406,668 UART:
3,406,722 UART: [state] CFI Enabled
3,417,064 UART: [fht] FMC Alias Private Key: 7
3,524,798 UART: [art] Extend RT PCRs Done
3,525,226 UART: [art] Lock RT PCRs Done
3,526,560 UART: [art] Populate DV Done
3,534,746 UART: [fht] FMC Alias Private Key: 7
3,535,862 UART: [art] Derive CDI
3,536,142 UART: [art] Store in in slot 0x4
3,621,641 UART: [art] Derive Key Pair
3,622,001 UART: [art] Store priv key in slot 0x5
3,635,305 UART: [art] Derive Key Pair - Done
3,650,108 UART: [art] Signing Cert with AUTHO
3,650,588 UART: RITY.KEYID = 7
3,665,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,975 UART: [art] PUB.X = C3088E41E2CC3DCFCD24236E6F3C2711B468F9217D8033C379DAE9B8BB62A67BADA76098B36E027A7A7804D9FE70DFA5
3,672,750 UART: [art] PUB.Y = D1CC29421238FB547CB248C1BF10B8B8CF665B17F6609CD0040AB6582D0584E35E0DCD0523BAE03768A750A6335A8F25
3,679,689 UART: [art] SIG.R = DDCC927F9D776E1BE6D4F3D54102AE614535369565FECD4B219B5FF652B8E8673AA6FADBA7781A417D15D9B84197AECF
3,686,472 UART: [art] SIG.S = 2670794CADF977A0DD15642F68EAE47618571CBE6E951BB7BAE25DF262B8B36E0E22810C7FF3DCD94E62077972A486DC
3,710,236 UART: Caliptra RT
3,710,490 UART: [state] CFI Enabled
3,818,579 UART: [rt] RT listening for mailbox commands...
3,819,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,018 UART: [rt]cmd =0x41544d4e, len=14344
4,233,034 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,170 ready_for_fw is high
1,056,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,165,900 >>> mbox cmd response: success
3,228,187 UART:
3,228,203 UART: Running Caliptra FMC ...
3,228,611 UART:
3,228,665 UART: [state] CFI Enabled
3,239,023 UART: [fht] FMC Alias Private Key: 7
3,346,535 UART: [art] Extend RT PCRs Done
3,346,963 UART: [art] Lock RT PCRs Done
3,348,829 UART: [art] Populate DV Done
3,356,861 UART: [fht] FMC Alias Private Key: 7
3,357,843 UART: [art] Derive CDI
3,358,123 UART: [art] Store in in slot 0x4
3,443,724 UART: [art] Derive Key Pair
3,444,084 UART: [art] Store priv key in slot 0x5
3,458,000 UART: [art] Derive Key Pair - Done
3,472,870 UART: [art] Signing Cert with AUTHO
3,473,350 UART: RITY.KEYID = 7
3,488,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,289 UART: [art] PUB.X = E740A945CBE73E49B73A81F6E335CCC875A70084FC92B8F2CC749575BDD1A655726A6F96B9B0B09246A1C228FA4209E1
3,496,040 UART: [art] PUB.Y = 303E643C3A9B0CFFBE42B2DB08A6C115EF00CF16701E90C0D6786998F59391FDC303C8FC9836465E70D011C0DC872410
3,502,963 UART: [art] SIG.R = FAF189E111E0B9E315E8DC803FD997FC91461CB13D81C23704639E3A18DF8B710B995D99C83A5F503B1F9292682EFA57
3,509,731 UART: [art] SIG.S = F4B2B86903E4A58099CD8378B83F5FD59A3807691A0DECF20900727C731C98F01308CF6EE01BCAEDB73A0A4492D8CA99
3,533,762 UART: Caliptra RT
3,534,016 UART: [state] CFI Enabled
3,641,670 UART: [rt] RT listening for mailbox commands...
3,642,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,233 UART: [rt]cmd =0x41544d4e, len=14344
4,051,183 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,310 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,174,828 ready_for_fw is high
1,174,828 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,959 UART: [ldev] --
1,282,453 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 114360 bytes
3,125,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,318,738 >>> mbox cmd response: success
3,319,933 UART: [afmc] ++
3,320,101 UART: [afmc] CDI.KEYID = 6
3,320,464 UART: [afmc] SUBJECT.KEYID = 7
3,320,890 UART: [afmc] AUTHORITY.KEYID = 5
3,355,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,089 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,799 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,689 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,400 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,198 UART: [afmc] --
3,399,086 UART: [cold-reset] --
3,399,898 UART: [state] Locking Datavault
3,401,255 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,859 UART: [state] Locking ICCM
3,402,295 UART: [exit] Launching FMC @ 0x40000130
3,407,624 UART:
3,407,640 UART: Running Caliptra FMC ...
3,408,048 UART:
3,408,191 UART: [state] CFI Enabled
3,418,909 UART: [fht] FMC Alias Private Key: 7
3,527,165 UART: [art] Extend RT PCRs Done
3,527,593 UART: [art] Lock RT PCRs Done
3,529,295 UART: [art] Populate DV Done
3,537,425 UART: [fht] FMC Alias Private Key: 7
3,538,407 UART: [art] Derive CDI
3,538,687 UART: [art] Store in in slot 0x4
3,624,602 UART: [art] Derive Key Pair
3,624,962 UART: [art] Store priv key in slot 0x5
3,638,744 UART: [art] Derive Key Pair - Done
3,653,066 UART: [art] Signing Cert with AUTHO
3,653,546 UART: RITY.KEYID = 7
3,668,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,655 UART: [art] PUB.X = 8A9F7DE494256CAD1378C93228B6818CAF62AC67E83DF750D99233FEB077D23DA1FDEA4BC5F20339AEA157A0265D73E7
3,676,434 UART: [art] PUB.Y = 01E50E3FB42A453D90BB0D7F34D819240759CAAF616A08D301D5265850B2E4662EEF8E6CE7FA5B0645B525596C7A8BDE
3,683,371 UART: [art] SIG.R = B7FA7FF76F67BA48B6ED554A96B9D073B56913050463C8D63E6E8299E419A4D0DD16F23219017647B87224FCB917E2A6
3,690,132 UART: [art] SIG.S = 5D3D319FE33E5A57015C14EC3E04B44CAACEFA92DA8311E5C5DE729FDA533075E3D429DD1B687B15FE7C4D99E0DE845C
3,713,729 UART: Caliptra RT
3,714,075 UART: [state] CFI Enabled
3,822,524 UART: [rt] RT listening for mailbox commands...
3,823,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,101 UART: [rt]cmd =0x41544d4e, len=14344
4,237,021 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,985 ready_for_fw is high
1,056,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,163,330 >>> mbox cmd response: success
3,225,243 UART:
3,225,259 UART: Running Caliptra FMC ...
3,225,667 UART:
3,225,810 UART: [state] CFI Enabled
3,236,262 UART: [fht] FMC Alias Private Key: 7
3,344,352 UART: [art] Extend RT PCRs Done
3,344,780 UART: [art] Lock RT PCRs Done
3,346,016 UART: [art] Populate DV Done
3,354,206 UART: [fht] FMC Alias Private Key: 7
3,355,262 UART: [art] Derive CDI
3,355,542 UART: [art] Store in in slot 0x4
3,441,631 UART: [art] Derive Key Pair
3,441,991 UART: [art] Store priv key in slot 0x5
3,455,171 UART: [art] Derive Key Pair - Done
3,469,761 UART: [art] Signing Cert with AUTHO
3,470,241 UART: RITY.KEYID = 7
3,485,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,508 UART: [art] PUB.X = 33593A2AC33ED8CDF37E5613ACF3393E8713167716B21E3D23293FE69F0B4C4FF3DB1DDF446BE394657257102BAF1AEB
3,493,285 UART: [art] PUB.Y = 50DEEE87E8AD68FA05C44D458CEE8C15F93A4A074EB6170DBBBCB85A83FDF3C0C7A84D4B24609033CC86F0EFB6C8F27C
3,500,252 UART: [art] SIG.R = CD685A300D40F3ECD3DC5BB42955CF7436C6832655D64ACD91844E2FBB8EA74A0037828749D18028DA2F312CD767BBA2
3,507,005 UART: [art] SIG.S = E2AD01EF0440E6FC4E922A4939563AE86675E0F5C2A85CD0927BC892A18665D2C47F21637A0AA242A3393A2B4E7E161A
3,530,681 UART: Caliptra RT
3,531,027 UART: [state] CFI Enabled
3,638,577 UART: [rt] RT listening for mailbox commands...
3,639,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,964 UART: [rt]cmd =0x41544d4e, len=14344
4,042,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,525 UART:
192,902 UART: Running Caliptra ROM ...
194,046 UART:
194,193 UART: [state] CFI Enabled
266,904 UART: [state] LifecycleState = Unprovisioned
268,886 UART: [state] DebugLocked = No
271,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,289 UART: [kat] SHA2-256
445,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,545 UART: [kat] ++
456,077 UART: [kat] sha1
468,306 UART: [kat] SHA2-256
471,026 UART: [kat] SHA2-384
476,013 UART: [kat] SHA2-512-ACC
478,443 UART: [kat] ECC-384
2,768,182 UART: [kat] HMAC-384Kdf
2,800,356 UART: [kat] LMS
3,990,700 UART: [kat] --
3,995,205 UART: [cold-reset] ++
3,997,200 UART: [fht] Storing FHT @ 0x50003400
4,007,679 UART: [idev] ++
4,008,253 UART: [idev] CDI.KEYID = 6
4,009,227 UART: [idev] SUBJECT.KEYID = 7
4,010,488 UART: [idev] UDS.KEYID = 0
4,011,567 ready_for_fw is high
4,011,785 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,250 UART: [idev] Erasing UDS.KEYID = 0
7,348,489 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,326 UART: [idev] --
7,375,154 UART: [ldev] ++
7,375,772 UART: [ldev] CDI.KEYID = 6
7,376,730 UART: [ldev] SUBJECT.KEYID = 5
7,377,938 UART: [ldev] AUTHORITY.KEYID = 7
7,379,108 UART: [ldev] FE.KEYID = 1
7,423,397 UART: [ldev] Erasing FE.KEYID = 1
10,758,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,359 UART: [ldev] --
13,135,694 UART: [fwproc] Waiting for Commands...
13,137,455 UART: [fwproc] Received command 0x46574c44
13,139,685 UART: [fwproc] Received Image of size 114036 bytes
17,194,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,503 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,657,376 >>> mbox cmd response: success
17,662,234 UART: [afmc] ++
17,662,823 UART: [afmc] CDI.KEYID = 6
17,663,726 UART: [afmc] SUBJECT.KEYID = 7
17,664,989 UART: [afmc] AUTHORITY.KEYID = 5
21,032,067 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,332,204 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,460 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,880 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,704 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,378,104 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,944 UART: [afmc] --
23,402,957 UART: [cold-reset] --
23,407,256 UART: [state] Locking Datavault
23,411,755 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,504 UART: [state] Locking ICCM
23,414,725 UART: [exit] Launching FMC @ 0x40000130
23,423,113 UART:
23,423,349 UART: Running Caliptra FMC ...
23,424,449 UART:
23,424,602 UART: [state] CFI Enabled
23,490,231 UART: [fht] FMC Alias Private Key: 7
25,827,995 UART: [art] Extend RT PCRs Done
25,829,209 UART: [art] Lock RT PCRs Done
25,830,952 UART: [art] Populate DV Done
25,836,629 UART: [fht] FMC Alias Private Key: 7
25,838,277 UART: [art] Derive CDI
25,839,082 UART: [art] Store in in slot 0x4
25,898,262 UART: [art] Derive Key Pair
25,899,307 UART: [art] Store priv key in slot 0x5
29,191,369 UART: [art] Derive Key Pair - Done
29,204,523 UART: [art] Signing Cert with AUTHO
29,205,817 UART: RITY.KEYID = 7
31,493,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,203 UART: [art] PUB.X = 230FC2EE978471816CE32C59A4E118822282752E034273CB207702E2B588F0DBD245B96585123850B087505E1BED4DA4
31,502,440 UART: [art] PUB.Y = 84F4D1F856AE97E820FB69C80EA34F3A56E1FEF69E706121F6BB0772CBCDA4A8654EB93417497DDD5E79A4F26038C45A
31,509,691 UART: [art] SIG.R = 518304884A6B758B884F2CB150F8ED356BFA46C0D9085803B91C61AAA34B09C2BD71C893A9656EF651A8B513919E1232
31,517,053 UART: [art] SIG.S = BF411675C9788BCBCD4451A2544B3B8262F18A05CB1BDE256344443157827E381B2B9D8B1BC517F7573C723EAF975478
32,822,018 UART: Caliptra RT
32,822,709 UART: [state] CFI Enabled
32,985,185 UART: [rt] RT listening for mailbox commands...
32,987,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,142,899 UART: [rt]cmd =0x41544d4e, len=14344
38,378,078 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,808,038 ready_for_fw is high
3,808,438 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,896,234 >>> mbox cmd response: success
23,593,153 UART:
23,593,592 UART: Running Caliptra FMC ...
23,594,711 UART:
23,594,860 UART: [state] CFI Enabled
23,660,808 UART: [fht] FMC Alias Private Key: 7
25,998,947 UART: [art] Extend RT PCRs Done
26,000,173 UART: [art] Lock RT PCRs Done
26,002,046 UART: [art] Populate DV Done
26,007,478 UART: [fht] FMC Alias Private Key: 7
26,009,128 UART: [art] Derive CDI
26,009,945 UART: [art] Store in in slot 0x4
26,071,589 UART: [art] Derive Key Pair
26,072,625 UART: [art] Store priv key in slot 0x5
29,364,757 UART: [art] Derive Key Pair - Done
29,377,764 UART: [art] Signing Cert with AUTHO
29,379,070 UART: RITY.KEYID = 7
31,666,561 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,068 UART: [art] PUB.X = 88A0E6AC2133794CE2217CD339C4EDDE457A11EC2EE9C08014220C83CFBEE2EA4F26FF6E1FF997D4173175DA3684A9CB
31,675,372 UART: [art] PUB.Y = BC8CFBEFE6CDCE639F6441C3378CD7B4B9AA497E452E0127842CC4F9F375F96C9C4A6628724279131B1CA0CFBF0A2312
31,682,608 UART: [art] SIG.R = 3BA94D45FDF2EC5AF67656A9B827E34C527F07E8E52BEC8405DBD2EA44EAEC8E1AF579A61E277D4B32B1F457CFF1FD6A
31,690,024 UART: [art] SIG.S = D9EB266A5D4FB46194925489CD9F2C8B51AEC2FE5736CFB146D07541D4D965635704CE3D4A106E2428DE52FFCE703933
32,995,290 UART: Caliptra RT
32,996,003 UART: [state] CFI Enabled
33,156,688 UART: [rt] RT listening for mailbox commands...
33,158,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,314,396 UART: [rt]cmd =0x41544d4e, len=14344
38,550,188 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,449 UART:
192,821 UART: Running Caliptra ROM ...
193,915 UART:
603,849 UART: [state] CFI Enabled
620,070 UART: [state] LifecycleState = Unprovisioned
621,957 UART: [state] DebugLocked = No
624,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,693 UART: [kat] SHA2-256
799,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,016 UART: [kat] ++
810,478 UART: [kat] sha1
820,998 UART: [kat] SHA2-256
823,751 UART: [kat] SHA2-384
829,953 UART: [kat] SHA2-512-ACC
832,322 UART: [kat] ECC-384
3,117,472 UART: [kat] HMAC-384Kdf
3,129,712 UART: [kat] LMS
4,319,799 UART: [kat] --
4,325,887 UART: [cold-reset] ++
4,327,259 UART: [fht] Storing FHT @ 0x50003400
4,337,769 UART: [idev] ++
4,338,384 UART: [idev] CDI.KEYID = 6
4,339,320 UART: [idev] SUBJECT.KEYID = 7
4,340,575 UART: [idev] UDS.KEYID = 0
4,341,681 ready_for_fw is high
4,341,916 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,485,066 UART: [idev] Erasing UDS.KEYID = 0
7,631,489 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,324 UART: [idev] --
7,658,745 UART: [ldev] ++
7,659,365 UART: [ldev] CDI.KEYID = 6
7,660,322 UART: [ldev] SUBJECT.KEYID = 5
7,661,528 UART: [ldev] AUTHORITY.KEYID = 7
7,662,756 UART: [ldev] FE.KEYID = 1
7,675,180 UART: [ldev] Erasing FE.KEYID = 1
10,968,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,261,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,276,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,291,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,305,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,324,460 UART: [ldev] --
13,329,235 UART: [fwproc] Waiting for Commands...
13,332,515 UART: [fwproc] Received command 0x46574c44
13,334,702 UART: [fwproc] Received Image of size 114036 bytes
17,389,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,464,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,533,608 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,851,222 >>> mbox cmd response: success
17,855,768 UART: [afmc] ++
17,856,388 UART: [afmc] CDI.KEYID = 6
17,857,303 UART: [afmc] SUBJECT.KEYID = 7
17,858,528 UART: [afmc] AUTHORITY.KEYID = 5
21,174,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,467,686 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,907 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,484,289 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,499,140 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,513,561 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,651 UART: [afmc] --
23,537,690 UART: [cold-reset] --
23,541,394 UART: [state] Locking Datavault
23,545,452 UART: [state] Locking PCR0, PCR1 and PCR31
23,547,214 UART: [state] Locking ICCM
23,548,441 UART: [exit] Launching FMC @ 0x40000130
23,556,836 UART:
23,557,072 UART: Running Caliptra FMC ...
23,558,178 UART:
23,558,337 UART: [state] CFI Enabled
23,565,814 UART: [fht] FMC Alias Private Key: 7
25,895,926 UART: [art] Extend RT PCRs Done
25,897,164 UART: [art] Lock RT PCRs Done
25,898,923 UART: [art] Populate DV Done
25,904,496 UART: [fht] FMC Alias Private Key: 7
25,905,979 UART: [art] Derive CDI
25,906,712 UART: [art] Store in in slot 0x4
25,949,613 UART: [art] Derive Key Pair
25,950,670 UART: [art] Store priv key in slot 0x5
29,192,601 UART: [art] Derive Key Pair - Done
29,205,658 UART: [art] Signing Cert with AUTHO
29,206,955 UART: RITY.KEYID = 7
31,486,682 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,185 UART: [art] PUB.X = D6519069AEC55A79480F7927E4875DE12C8B08F2D0390E0BB74193BF6129E33D6300CA3BFBED81F7DB488E00F6D1E88F
31,495,461 UART: [art] PUB.Y = 63AF4030600DE8181904CB673EFD9764253789CA2B01CF3FE04FC782059370A536408C82D7280A41625084626CA07F3E
31,502,654 UART: [art] SIG.R = 580AC6D9AD883DF2D4CC95107C9C56F0194B92F7545795E315DE97DD74F3F0ABA6771AC7854D8C551BD649B5068C8AA7
31,510,056 UART: [art] SIG.S = 766469174FEF04998C046DCC5508D6A2E9ECE13876369D903F3B2478DC96C138FE0D6611C92707BCE1260AC04E110D4B
32,815,478 UART: Caliptra RT
32,816,209 UART: [state] CFI Enabled
32,934,412 UART: [rt] RT listening for mailbox commands...
32,936,805 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,092,115 UART: [rt]cmd =0x41544d4e, len=14344
38,327,743 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
4,129,472 ready_for_fw is high
4,130,078 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,082,144 >>> mbox cmd response: success
23,720,539 UART:
23,720,923 UART: Running Caliptra FMC ...
23,722,017 UART:
23,722,170 UART: [state] CFI Enabled
23,730,063 UART: [fht] FMC Alias Private Key: 7
26,060,733 UART: [art] Extend RT PCRs Done
26,061,967 UART: [art] Lock RT PCRs Done
26,063,948 UART: [art] Populate DV Done
26,069,274 UART: [fht] FMC Alias Private Key: 7
26,070,875 UART: [art] Derive CDI
26,071,701 UART: [art] Store in in slot 0x4
26,114,152 UART: [art] Derive Key Pair
26,115,198 UART: [art] Store priv key in slot 0x5
29,357,554 UART: [art] Derive Key Pair - Done
29,370,886 UART: [art] Signing Cert with AUTHO
29,372,203 UART: RITY.KEYID = 7
31,651,393 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,284 UART: [art] PUB.X = 61B1D31E5ED1A0E87B227913E34E4A5EE9230BB2513EAD6E9DA9453DAFA647574F69CDAC5BB35BC2D38DA0EAB6AC4B76
31,660,180 UART: [art] PUB.Y = C006BCFDA52C751FC2D4800C58DEA59D7D584607834CAE3ADF0B81F810BD7458D2B06AC66985E6D43C7ECDB9E7D3127D
31,667,453 UART: [art] SIG.R = 1932AAB684E5037BEF91F1B5195E010ED8E719020986C299542979C7A106E127E429E4364E04A928FDBC6F80C7F18D15
31,674,826 UART: [art] SIG.S = 523398A63230A960BF63B149BB6C0BD3A680E1C43C040AA2C2A3E0EFE730C3B3EA008085A2342EAE4A39738AEB2403D0
32,979,932 UART: Caliptra RT
32,980,651 UART: [state] CFI Enabled
33,098,388 UART: [rt] RT listening for mailbox commands...
33,100,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,256,055 UART: [rt]cmd =0x41544d4e, len=14344
38,491,703 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,516 UART:
192,885 UART: Running Caliptra ROM ...
194,117 UART:
194,276 UART: [state] CFI Enabled
261,929 UART: [state] LifecycleState = Unprovisioned
263,837 UART: [state] DebugLocked = No
265,441 UART: [state] WD Timer not started. Device not locked for debugging
269,548 UART: [kat] SHA2-256
448,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,304 UART: [kat] ++
460,841 UART: [kat] sha1
470,445 UART: [kat] SHA2-256
473,455 UART: [kat] SHA2-384
479,939 UART: [kat] SHA2-512-ACC
482,874 UART: [kat] ECC-384
2,929,357 UART: [kat] HMAC-384Kdf
2,951,964 UART: [kat] LMS
3,481,406 UART: [kat] --
3,486,765 UART: [cold-reset] ++
3,488,633 UART: [fht] FHT @ 0x50003400
3,499,326 UART: [idev] ++
3,499,894 UART: [idev] CDI.KEYID = 6
3,500,813 UART: [idev] SUBJECT.KEYID = 7
3,501,988 UART: [idev] UDS.KEYID = 0
3,503,005 ready_for_fw is high
3,503,210 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,647,058 UART: [idev] Erasing UDS.KEYID = 0
6,006,832 UART: [idev] Sha1 KeyId Algorithm
6,030,118 UART: [idev] --
6,033,735 UART: [ldev] ++
6,034,311 UART: [ldev] CDI.KEYID = 6
6,035,199 UART: [ldev] SUBJECT.KEYID = 5
6,036,414 UART: [ldev] AUTHORITY.KEYID = 7
6,037,824 UART: [ldev] FE.KEYID = 1
6,080,473 UART: [ldev] Erasing FE.KEYID = 1
8,581,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,985 UART: [ldev] --
10,373,078 UART: [fwproc] Wait for Commands...
10,374,582 UART: [fwproc] Recv command 0x46574c44
10,376,681 UART: [fwproc] Recv'd Img size: 114360 bytes
13,773,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,842,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,910,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,229,714 >>> mbox cmd response: success
14,234,619 UART: [afmc] ++
14,235,221 UART: [afmc] CDI.KEYID = 6
14,236,133 UART: [afmc] SUBJECT.KEYID = 7
14,237,301 UART: [afmc] AUTHORITY.KEYID = 5
16,767,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,507,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,523,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,539,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,561,885 UART: [afmc] --
18,565,927 UART: [cold-reset] --
18,569,201 UART: [state] Locking Datavault
18,575,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,576,757 UART: [state] Locking ICCM
18,577,991 UART: [exit] Launching FMC @ 0x40000130
18,586,394 UART:
18,586,644 UART: Running Caliptra FMC ...
18,587,751 UART:
18,587,915 UART: [state] CFI Enabled
18,648,452 UART: [fht] FMC Alias Private Key: 7
20,411,990 UART: [art] Extend RT PCRs Done
20,413,215 UART: [art] Lock RT PCRs Done
20,414,513 UART: [art] Populate DV Done
20,419,900 UART: [fht] FMC Alias Private Key: 7
20,421,498 UART: [art] Derive CDI
20,422,316 UART: [art] Store in in slot 0x4
20,480,987 UART: [art] Derive Key Pair
20,482,027 UART: [art] Store priv key in slot 0x5
22,944,484 UART: [art] Derive Key Pair - Done
22,957,374 UART: [art] Signing Cert with AUTHO
22,958,681 UART: RITY.KEYID = 7
24,669,723 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,233 UART: [art] PUB.X = BD21D3BC730939CA19A8C8F443E5E4D19BF3744F8F0B107EDBFD059843E18E9FAA4E19A645687A4752B73DF24ADA30D6
24,678,532 UART: [art] PUB.Y = 160E0BC6769279DF122EDF410F3BF5A9771D1F2CC5752DC495430912C0AB38B368496847D75DBF38D53DFD7687DDD511
24,685,753 UART: [art] SIG.R = 0A929B8ED0FAC27E47AC92D7BBEEBBF32FCEAA7791CDB3D2345663847A425648C8C5CA39515A5FA5B380E6FE98554342
24,693,140 UART: [art] SIG.S = 1F8EEFA42D19D9431C7A194C0E514B602C584CC9243225390840C123F065396833626065CC8B1A36369AAC9F326C9613
25,672,265 UART: Caliptra RT
25,672,977 UART: [state] CFI Enabled
25,837,005 UART: [rt] RT listening for mailbox commands...
25,839,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,994,901 UART: [rt]cmd =0x41544d4e, len=14344
29,925,139 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
192,471 UART:
192,846 UART: Running Caliptra ROM ...
193,940 UART:
194,083 UART: [state] CFI Enabled
267,997 UART: [state] LifecycleState = Unprovisioned
270,400 UART: [state] DebugLocked = No
273,217 UART: [state] WD Timer not started. Device not locked for debugging
277,390 UART: [kat] SHA2-256
467,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,056 UART: [kat] ++
478,512 UART: [kat] sha1
490,165 UART: [kat] SHA2-256
493,171 UART: [kat] SHA2-384
499,312 UART: [kat] SHA2-512-ACC
501,899 UART: [kat] ECC-384
2,948,472 UART: [kat] HMAC-384Kdf
2,971,578 UART: [kat] LMS
3,503,391 UART: [kat] --
3,506,315 UART: [cold-reset] ++
3,507,819 UART: [fht] FHT @ 0x50003400
3,520,640 UART: [idev] ++
3,521,353 UART: [idev] CDI.KEYID = 6
3,522,356 UART: [idev] SUBJECT.KEYID = 7
3,523,532 UART: [idev] UDS.KEYID = 0
3,524,457 ready_for_fw is high
3,524,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,598 UART: [idev] Erasing UDS.KEYID = 0
6,028,014 UART: [idev] Sha1 KeyId Algorithm
6,051,547 UART: [idev] --
6,057,597 UART: [ldev] ++
6,058,295 UART: [ldev] CDI.KEYID = 6
6,059,369 UART: [ldev] SUBJECT.KEYID = 5
6,060,478 UART: [ldev] AUTHORITY.KEYID = 7
6,061,655 UART: [ldev] FE.KEYID = 1
6,100,603 UART: [ldev] Erasing FE.KEYID = 1
8,606,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,015 UART: [ldev] --
10,413,927 UART: [fwproc] Wait for Commands...
10,416,621 UART: [fwproc] Recv command 0x46574c44
10,418,929 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,599,445 >>> mbox cmd response: success
14,603,506 UART: [afmc] ++
14,604,241 UART: [afmc] CDI.KEYID = 6
14,605,440 UART: [afmc] SUBJECT.KEYID = 7
14,606,883 UART: [afmc] AUTHORITY.KEYID = 5
17,146,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,757 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,808 UART: [afmc] --
18,948,737 UART: [cold-reset] --
18,953,046 UART: [state] Locking Datavault
18,959,331 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,484 UART: [state] Locking ICCM
18,963,311 UART: [exit] Launching FMC @ 0x40000130
18,971,992 UART:
18,972,237 UART: Running Caliptra FMC ...
18,973,345 UART:
18,973,529 UART: [state] CFI Enabled
19,031,191 UART: [fht] FMC Alias Private Key: 7
20,795,274 UART: [art] Extend RT PCRs Done
20,796,503 UART: [art] Lock RT PCRs Done
20,798,133 UART: [art] Populate DV Done
20,803,487 UART: [fht] FMC Alias Private Key: 7
20,805,236 UART: [art] Derive CDI
20,806,050 UART: [art] Store in in slot 0x4
20,864,156 UART: [art] Derive Key Pair
20,865,187 UART: [art] Store priv key in slot 0x5
23,328,147 UART: [art] Derive Key Pair - Done
23,341,028 UART: [art] Signing Cert with AUTHO
23,342,332 UART: RITY.KEYID = 7
25,054,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,533 UART: [art] PUB.X = 6BFD6681064E53E8A3ADDE627A7985283D07F23ADAD6324BACC0566DA4FEC0CEEF9C464BAB5580EFF167D92DAF843C86
25,062,819 UART: [art] PUB.Y = C751D2A0E93D2B9D45A5BF9014CD38F23108F1F079557CCDD6A8130E5B34AA57EDBC15CA904BD57AA0416167C028B897
25,070,144 UART: [art] SIG.R = 9B32366B7CF6F061B3CB8D89BFCD7CE3177FC42A1860579A7B1565CFAB9893D47A2EBF4F6CB98B9D91B9B0B55B204286
25,077,531 UART: [art] SIG.S = E29F164B9DC23669CF601429437F61E5C37C969A323CDA9FC879BF9F08217AEEA6B3AA51597CCFFE782B44366FD7C259
26,056,314 UART: Caliptra RT
26,057,033 UART: [state] CFI Enabled
26,223,240 UART: [rt] RT listening for mailbox commands...
26,225,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,381,023 UART: [rt]cmd =0x41544d4e, len=14344
30,311,223 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
3,437,748 ready_for_fw is high
3,438,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,712,128 >>> mbox cmd response: success
19,006,332 UART:
19,006,727 UART: Running Caliptra FMC ...
19,007,936 UART:
19,008,113 UART: [state] CFI Enabled
19,072,701 UART: [fht] FMC Alias Private Key: 7
20,836,670 UART: [art] Extend RT PCRs Done
20,837,878 UART: [art] Lock RT PCRs Done
20,839,721 UART: [art] Populate DV Done
20,844,867 UART: [fht] FMC Alias Private Key: 7
20,846,462 UART: [art] Derive CDI
20,847,201 UART: [art] Store in in slot 0x4
20,905,541 UART: [art] Derive Key Pair
20,906,579 UART: [art] Store priv key in slot 0x5
23,369,262 UART: [art] Derive Key Pair - Done
23,382,100 UART: [art] Signing Cert with AUTHO
23,383,414 UART: RITY.KEYID = 7
25,095,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,117 UART: [art] PUB.X = 32E75BE3B5ADCAB09A0372ECCD2CCCF26A4CC30E7D34B636E1CF2BE8EA8679FECC9AE25D466D7E31CD029C1CBDFC031A
25,104,458 UART: [art] PUB.Y = F9D15458A6F1D7CA2B9E01CCC9A07B14BA4FBE5CA343E2D065E97B0BA0A8BAC047A570BC1EC1B3FE153A47D031855976
25,111,740 UART: [art] SIG.R = EBA6EA5313FC743BF0F30A37B8CA4791A8167A2B103417BB62FDFF515BA7921C3966E8F60D99530E1EA51A97246B878C
25,119,143 UART: [art] SIG.S = E7F06C73DEECAEE313CDA279A4DD8F3F90DF78049446BE52413DC4ECDE558898935F9E25EB9EC38BD42E7F4FEA79E64C
26,098,488 UART: Caliptra RT
26,099,211 UART: [state] CFI Enabled
26,263,471 UART: [rt] RT listening for mailbox commands...
26,265,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,421,130 UART: [rt]cmd =0x41544d4e, len=14344
30,351,079 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,560 UART:
192,914 UART: Running Caliptra ROM ...
194,098 UART:
603,743 UART: [state] CFI Enabled
616,831 UART: [state] LifecycleState = Unprovisioned
619,196 UART: [state] DebugLocked = No
621,637 UART: [state] WD Timer not started. Device not locked for debugging
626,654 UART: [kat] SHA2-256
816,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,355 UART: [kat] ++
827,807 UART: [kat] sha1
838,967 UART: [kat] SHA2-256
841,972 UART: [kat] SHA2-384
847,465 UART: [kat] SHA2-512-ACC
850,064 UART: [kat] ECC-384
3,293,273 UART: [kat] HMAC-384Kdf
3,305,643 UART: [kat] LMS
3,837,476 UART: [kat] --
3,840,986 UART: [cold-reset] ++
3,841,992 UART: [fht] FHT @ 0x50003400
3,853,388 UART: [idev] ++
3,854,086 UART: [idev] CDI.KEYID = 6
3,854,966 UART: [idev] SUBJECT.KEYID = 7
3,856,207 UART: [idev] UDS.KEYID = 0
3,857,184 ready_for_fw is high
3,857,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,990 UART: [idev] Erasing UDS.KEYID = 0
6,336,803 UART: [idev] Sha1 KeyId Algorithm
6,358,569 UART: [idev] --
6,363,100 UART: [ldev] ++
6,363,796 UART: [ldev] CDI.KEYID = 6
6,364,677 UART: [ldev] SUBJECT.KEYID = 5
6,365,829 UART: [ldev] AUTHORITY.KEYID = 7
6,367,113 UART: [ldev] FE.KEYID = 1
6,378,215 UART: [ldev] Erasing FE.KEYID = 1
8,857,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,198 UART: [ldev] --
10,646,087 UART: [fwproc] Wait for Commands...
10,648,341 UART: [fwproc] Recv command 0x46574c44
10,650,590 UART: [fwproc] Recv'd Img size: 114360 bytes
14,100,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,837,983 >>> mbox cmd response: success
14,842,799 UART: [afmc] ++
14,843,505 UART: [afmc] CDI.KEYID = 6
14,844,660 UART: [afmc] SUBJECT.KEYID = 7
14,846,192 UART: [afmc] AUTHORITY.KEYID = 5
17,347,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,263 UART: [afmc] --
19,144,450 UART: [cold-reset] --
19,148,581 UART: [state] Locking Datavault
19,153,726 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,929 UART: [state] Locking ICCM
19,157,213 UART: [exit] Launching FMC @ 0x40000130
19,165,880 UART:
19,166,115 UART: Running Caliptra FMC ...
19,167,211 UART:
19,167,363 UART: [state] CFI Enabled
19,175,407 UART: [fht] FMC Alias Private Key: 7
20,931,797 UART: [art] Extend RT PCRs Done
20,933,022 UART: [art] Lock RT PCRs Done
20,934,777 UART: [art] Populate DV Done
20,940,398 UART: [fht] FMC Alias Private Key: 7
20,942,038 UART: [art] Derive CDI
20,942,777 UART: [art] Store in in slot 0x4
20,985,262 UART: [art] Derive Key Pair
20,986,300 UART: [art] Store priv key in slot 0x5
23,413,109 UART: [art] Derive Key Pair - Done
23,426,174 UART: [art] Signing Cert with AUTHO
23,427,476 UART: RITY.KEYID = 7
25,132,729 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,234 UART: [art] PUB.X = 40CBBFFB274BB1BDEB77D141BF717F83C132B06521AB88A79903470FB57C3C4A0F046F0CEE224304C3A59DCDCB0840A4
25,141,534 UART: [art] PUB.Y = 08A724533AA27389D6FAE434B311BB2FE4B98DBADF1BB747914C806B09EC69C2F60ECB122DE17B5D3399BECA958B67E8
25,148,829 UART: [art] SIG.R = 5C2EE94FD61108579DF246BF656C1738DD28BB637DBEB51B42D4BB7767E4C25F8F67363FCABF5E6CECF1FA15B8C9DDC7
25,156,218 UART: [art] SIG.S = 6BA224ACF255F02A4860CB7FC6BC70AA1CDE49CEE87972AED99F3AB1910F15606BCB7B51AA5B8D0171FA033F105B1DB0
26,135,557 UART: Caliptra RT
26,136,263 UART: [state] CFI Enabled
26,253,181 UART: [rt] RT listening for mailbox commands...
26,255,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,410,605 UART: [rt]cmd =0x41544d4e, len=14344
30,341,249 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,752,685 ready_for_fw is high
3,753,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,214 >>> mbox cmd response: success
19,208,053 UART:
19,208,463 UART: Running Caliptra FMC ...
19,209,570 UART:
19,209,719 UART: [state] CFI Enabled
19,217,488 UART: [fht] FMC Alias Private Key: 7
20,974,881 UART: [art] Extend RT PCRs Done
20,976,120 UART: [art] Lock RT PCRs Done
20,978,077 UART: [art] Populate DV Done
20,983,195 UART: [fht] FMC Alias Private Key: 7
20,984,684 UART: [art] Derive CDI
20,985,447 UART: [art] Store in in slot 0x4
21,027,951 UART: [art] Derive Key Pair
21,029,002 UART: [art] Store priv key in slot 0x5
23,455,674 UART: [art] Derive Key Pair - Done
23,469,213 UART: [art] Signing Cert with AUTHO
23,470,520 UART: RITY.KEYID = 7
25,175,893 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,394 UART: [art] PUB.X = 28BA2DB294F9638570256BA985B68CFC77BA3E5C8C781FEDCB2737829FB259C1D6F065EA5D0CC07DB660A6CA4D07AB17
25,184,713 UART: [art] PUB.Y = 866B4C8AA05CB58FDCC38556DDE9758AC8B85AEB46E8E118F63CF1C8CC57A6F970FE54D0E675849D2615E38FB1815390
25,191,941 UART: [art] SIG.R = 544CACE779F01E0590374A3036716723821722D39FC43B12277555A2AD8A944FF7A9C9422B06FCB3437D96FB8DABB17A
25,199,345 UART: [art] SIG.S = 31F0C997BE3F6960785350326E00D9AC60E65A9B82BA1CC58B895099B72A23488E2159A788B3FBD553FB1624BE7B1F37
26,177,889 UART: Caliptra RT
26,178,605 UART: [state] CFI Enabled
26,294,876 UART: [rt] RT listening for mailbox commands...
26,297,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,452,581 UART: [rt]cmd =0x41544d4e, len=14344
30,382,987 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,801 UART: [kat] SHA2-256
881,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,847 UART: [kat] ++
885,999 UART: [kat] sha1
890,231 UART: [kat] SHA2-256
892,169 UART: [kat] SHA2-384
894,856 UART: [kat] SHA2-512-ACC
896,757 UART: [kat] ECC-384
902,232 UART: [kat] HMAC-384Kdf
906,762 UART: [kat] LMS
1,474,958 UART: [kat] --
1,475,537 UART: [cold-reset] ++
1,476,005 UART: [fht] Storing FHT @ 0x50003400
1,478,766 UART: [idev] ++
1,478,934 UART: [idev] CDI.KEYID = 6
1,479,294 UART: [idev] SUBJECT.KEYID = 7
1,479,718 UART: [idev] UDS.KEYID = 0
1,480,063 ready_for_fw is high
1,480,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,996 UART: [idev] Erasing UDS.KEYID = 0
1,504,340 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,910 UART: [idev] --
1,513,861 UART: [ldev] ++
1,514,029 UART: [ldev] CDI.KEYID = 6
1,514,392 UART: [ldev] SUBJECT.KEYID = 5
1,514,818 UART: [ldev] AUTHORITY.KEYID = 7
1,515,281 UART: [ldev] FE.KEYID = 1
1,520,675 UART: [ldev] Erasing FE.KEYID = 1
1,546,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,568 UART: [ldev] --
1,586,007 UART: [fwproc] Waiting for Commands...
1,586,714 UART: [fwproc] Received command 0x46574c44
1,587,505 UART: [fwproc] Received Image of size 114360 bytes
2,883,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,202 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,493 >>> mbox cmd response: success
3,077,747 UART: [afmc] ++
3,077,915 UART: [afmc] CDI.KEYID = 6
3,078,277 UART: [afmc] SUBJECT.KEYID = 7
3,078,702 UART: [afmc] AUTHORITY.KEYID = 5
3,114,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,830 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,520 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,215 UART: [afmc] --
3,157,307 UART: [cold-reset] --
3,158,019 UART: [state] Locking Datavault
3,159,186 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,790 UART: [state] Locking ICCM
3,160,436 UART: [exit] Launching FMC @ 0x40000130
3,165,765 UART:
3,165,781 UART: Running Caliptra FMC ...
3,166,189 UART:
3,166,243 UART: [state] CFI Enabled
3,176,996 UART: [fht] FMC Alias Private Key: 7
3,284,871 UART: [art] Extend RT PCRs Done
3,285,299 UART: [art] Lock RT PCRs Done
3,286,861 UART: [art] Populate DV Done
3,294,910 UART: [fht] FMC Alias Private Key: 7
3,295,958 UART: [art] Derive CDI
3,296,238 UART: [art] Store in in slot 0x4
3,381,967 UART: [art] Derive Key Pair
3,382,327 UART: [art] Store priv key in slot 0x5
3,395,373 UART: [art] Derive Key Pair - Done
3,410,099 UART: [art] Signing Cert with AUTHO
3,410,579 UART: RITY.KEYID = 7
3,425,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,380 UART: [art] PUB.X = AF712DD5CD4ECCFFD51B4FEB0A474F80EC42D7B1ED65F6EF3385324C14230C2B286A442D69AA513B6EE16569755C13DA
3,433,162 UART: [art] PUB.Y = C7FE59E43815EB6BFA522966D45D547218BF6535E73263245EB3370EBFE9605E87898C68B730410CA337FA7991EA0674
3,440,099 UART: [art] SIG.R = 3CBE883CA7979E1274C011A639C2C0427D29C4990DD9DC8B2E74C5A6968986054A1FF63EC7F80F95B03639A6CDFBD26F
3,446,868 UART: [art] SIG.S = 242B8F3B39B16F47A5004BC926A996D1CAD1BB1F5052B510F06D50EA7F58491E01570133116FF094E4F3BAE06BACB0F3
3,470,311 UART: Caliptra RT
3,470,565 UART: [state] CFI Enabled
3,578,658 UART: [rt] RT listening for mailbox commands...
3,579,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,093 UART: [rt]cmd =0x41544d4e, len=14344
3,847,557 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,067 ready_for_fw is high
1,362,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,511 >>> mbox cmd response: success
2,989,905 UART:
2,989,921 UART: Running Caliptra FMC ...
2,990,329 UART:
2,990,383 UART: [state] CFI Enabled
3,001,162 UART: [fht] FMC Alias Private Key: 7
3,108,835 UART: [art] Extend RT PCRs Done
3,109,263 UART: [art] Lock RT PCRs Done
3,110,495 UART: [art] Populate DV Done
3,118,940 UART: [fht] FMC Alias Private Key: 7
3,119,914 UART: [art] Derive CDI
3,120,194 UART: [art] Store in in slot 0x4
3,205,853 UART: [art] Derive Key Pair
3,206,213 UART: [art] Store priv key in slot 0x5
3,219,235 UART: [art] Derive Key Pair - Done
3,233,672 UART: [art] Signing Cert with AUTHO
3,234,152 UART: RITY.KEYID = 7
3,249,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,097 UART: [art] PUB.X = A74A5D949CB101C6861031642444903A970F59FC6BFDC11BAEED1C7A640C64CA1F24B8753C9581623F2BB6D29DFE72A4
3,256,866 UART: [art] PUB.Y = DE3BF645CB7BAAE2467C6CE792585D99C0991EBDFE12DDB3B9434507CD90B641D821C41F2C2F55852173F658759B1EA1
3,263,823 UART: [art] SIG.R = 573C3020C80DC413D455738D13AD406F52D94E0DE6F48DB0DC5A9CF30B3176C44B4CEFDAF3EDA7E133C6C992B9B884DA
3,270,602 UART: [art] SIG.S = 118CB49A1631903005120F2410C4AB13D956D1BEE2C988EAD7413C4EF5A0EF7B862BDF4A2BE199BDC13AB7157A930E6F
3,294,330 UART: Caliptra RT
3,294,584 UART: [state] CFI Enabled
3,402,883 UART: [rt] RT listening for mailbox commands...
3,403,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,302 UART: [rt]cmd =0x41544d4e, len=14344
3,671,680 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,284 UART: [kat] SHA2-256
882,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,330 UART: [kat] ++
886,482 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,573 UART: [kat] SHA2-512-ACC
897,474 UART: [kat] ECC-384
903,359 UART: [kat] HMAC-384Kdf
907,941 UART: [kat] LMS
1,476,137 UART: [kat] --
1,476,878 UART: [cold-reset] ++
1,477,368 UART: [fht] Storing FHT @ 0x50003400
1,480,157 UART: [idev] ++
1,480,325 UART: [idev] CDI.KEYID = 6
1,480,685 UART: [idev] SUBJECT.KEYID = 7
1,481,109 UART: [idev] UDS.KEYID = 0
1,481,454 ready_for_fw is high
1,481,454 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,387 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,945 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,546,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,691 UART: [ldev] --
1,586,116 UART: [fwproc] Waiting for Commands...
1,586,743 UART: [fwproc] Received command 0x46574c44
1,587,534 UART: [fwproc] Received Image of size 114360 bytes
2,884,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,378 >>> mbox cmd response: success
3,078,456 UART: [afmc] ++
3,078,624 UART: [afmc] CDI.KEYID = 6
3,078,986 UART: [afmc] SUBJECT.KEYID = 7
3,079,411 UART: [afmc] AUTHORITY.KEYID = 5
3,115,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,619 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,309 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,276 UART: [afmc] --
3,158,160 UART: [cold-reset] --
3,159,216 UART: [state] Locking Datavault
3,160,383 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,987 UART: [state] Locking ICCM
3,161,585 UART: [exit] Launching FMC @ 0x40000130
3,166,914 UART:
3,166,930 UART: Running Caliptra FMC ...
3,167,338 UART:
3,167,481 UART: [state] CFI Enabled
3,178,132 UART: [fht] FMC Alias Private Key: 7
3,285,985 UART: [art] Extend RT PCRs Done
3,286,413 UART: [art] Lock RT PCRs Done
3,287,661 UART: [art] Populate DV Done
3,295,938 UART: [fht] FMC Alias Private Key: 7
3,296,908 UART: [art] Derive CDI
3,297,188 UART: [art] Store in in slot 0x4
3,382,699 UART: [art] Derive Key Pair
3,383,059 UART: [art] Store priv key in slot 0x5
3,396,343 UART: [art] Derive Key Pair - Done
3,410,784 UART: [art] Signing Cert with AUTHO
3,411,264 UART: RITY.KEYID = 7
3,426,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,625 UART: [art] PUB.X = E9A268E4DE0613675AA9C9B61EF18D64AC8A3B19BC514AC41B077480CD03EA90F1986107C2751DE2E3FE0E1F206F3FDF
3,434,394 UART: [art] PUB.Y = 52A530B3F77E6CAE18CCD664B684F41F8E098ED2945529C57406F664B2591D9692317BB780C7C9FF88D918A6D92DD649
3,441,338 UART: [art] SIG.R = 7680F0499DC572FD2B54EE2F8C88F3F3FA96549A52A5298598D62527E3AC2BEE8C71FC9F283C213550D0F0111C88B58D
3,448,112 UART: [art] SIG.S = F413A675E9AFE44D3A3B3D173ACB30FFDC309A4C2E09280B8A5AF9B762A2E9E2697959B378C610264C23A6939039885C
3,472,245 UART: Caliptra RT
3,472,591 UART: [state] CFI Enabled
3,580,823 UART: [rt] RT listening for mailbox commands...
3,581,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,326 UART: [rt]cmd =0x41544d4e, len=14344
3,849,360 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,922 >>> mbox cmd response: success
2,992,110 UART:
2,992,126 UART: Running Caliptra FMC ...
2,992,534 UART:
2,992,677 UART: [state] CFI Enabled
3,003,888 UART: [fht] FMC Alias Private Key: 7
3,112,295 UART: [art] Extend RT PCRs Done
3,112,723 UART: [art] Lock RT PCRs Done
3,114,211 UART: [art] Populate DV Done
3,122,556 UART: [fht] FMC Alias Private Key: 7
3,123,722 UART: [art] Derive CDI
3,124,002 UART: [art] Store in in slot 0x4
3,209,611 UART: [art] Derive Key Pair
3,209,971 UART: [art] Store priv key in slot 0x5
3,223,051 UART: [art] Derive Key Pair - Done
3,238,194 UART: [art] Signing Cert with AUTHO
3,238,674 UART: RITY.KEYID = 7
3,254,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,963 UART: [art] PUB.X = 402D041C7C3644E0341FCF54C72D03D2F07D792A0382C0A5F43B4E369E2FF58722FEF34E24DD907D39041EDEFDDC0391
3,261,726 UART: [art] PUB.Y = 78E58271FC8BB6698123A2E9CA45BD027D94E684005ECD12446F00A87473F9BAED6FD15E894D2C581EC89EBB44279460
3,268,633 UART: [art] SIG.R = 28CE687EF92B2DBE3CE142DE5CA10CA27848223A07CFD2DBABA7241B8A5F59615BC6974404ECB55FE187582F25D16475
3,275,406 UART: [art] SIG.S = F017D0D78D390C367F2CC1C6CB6F6E1FE7AD065A9BDE1BC43CF52A50EC4E510D615FCB2349F3F158A02F2854BA05C78B
3,299,609 UART: Caliptra RT
3,299,955 UART: [state] CFI Enabled
3,408,885 UART: [rt] RT listening for mailbox commands...
3,409,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,262 UART: [rt]cmd =0x41544d4e, len=14344
3,677,384 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,447 UART: [kat] SHA2-256
903,387 UART: [kat] SHA2-384
906,106 UART: [kat] SHA2-512-ACC
908,007 UART: [kat] ECC-384
917,398 UART: [kat] HMAC-384Kdf
921,998 UART: [kat] LMS
1,170,326 UART: [kat] --
1,171,273 UART: [cold-reset] ++
1,171,795 UART: [fht] FHT @ 0x50003400
1,174,494 UART: [idev] ++
1,174,662 UART: [idev] CDI.KEYID = 6
1,175,022 UART: [idev] SUBJECT.KEYID = 7
1,175,446 UART: [idev] UDS.KEYID = 0
1,175,791 ready_for_fw is high
1,175,791 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,200,801 UART: [idev] Sha1 KeyId Algorithm
1,209,105 UART: [idev] --
1,210,027 UART: [ldev] ++
1,210,195 UART: [ldev] CDI.KEYID = 6
1,210,558 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,491 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,440 >>> mbox cmd response: success
2,773,488 UART: [afmc] ++
2,773,656 UART: [afmc] CDI.KEYID = 6
2,774,018 UART: [afmc] SUBJECT.KEYID = 7
2,774,443 UART: [afmc] AUTHORITY.KEYID = 5
2,809,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,351 UART: [afmc] --
2,853,341 UART: [cold-reset] --
2,854,445 UART: [state] Locking Datavault
2,855,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,266 UART: [state] Locking ICCM
2,856,756 UART: [exit] Launching FMC @ 0x40000130
2,862,085 UART:
2,862,101 UART: Running Caliptra FMC ...
2,862,509 UART:
2,862,563 UART: [state] CFI Enabled
2,873,386 UART: [fht] FMC Alias Private Key: 7
2,981,487 UART: [art] Extend RT PCRs Done
2,981,915 UART: [art] Lock RT PCRs Done
2,983,627 UART: [art] Populate DV Done
2,992,026 UART: [fht] FMC Alias Private Key: 7
2,993,190 UART: [art] Derive CDI
2,993,470 UART: [art] Store in in slot 0x4
3,079,303 UART: [art] Derive Key Pair
3,079,663 UART: [art] Store priv key in slot 0x5
3,092,735 UART: [art] Derive Key Pair - Done
3,107,497 UART: [art] Signing Cert with AUTHO
3,107,977 UART: RITY.KEYID = 7
3,123,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,986 UART: [art] PUB.X = CA5D62186B8B6972100AE1BD225A464AFB5DBD53FC4E352CE57C417E5F461000CD08752DA9F7B40E3C0A4ED314351789
3,130,730 UART: [art] PUB.Y = E85EC2CF379DA631366ED58FDE71A481D4C983B91FCBEE376A6A26A39D5315E2E03D9F57E996B98784357EBE9675051B
3,137,685 UART: [art] SIG.R = 1EF87AD7A1F11A0BB1426235C4C521C8F02CD3B72B1905528E32322705E02B7801DF707C2A1595BDC7BBC00E4D2B6256
3,144,444 UART: [art] SIG.S = 4ADED602238AA3EBA8D91A854D82FB3DF7D69E1F7ECED84BFA36D3989C9A83D2654E2862B53A33289C2FCB718583A5D6
3,168,442 UART: Caliptra RT
3,168,696 UART: [state] CFI Enabled
3,276,494 UART: [rt] RT listening for mailbox commands...
3,277,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,773 UART: [rt]cmd =0x41544d4e, len=14344
3,544,069 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,683 ready_for_fw is high
1,060,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,641 >>> mbox cmd response: success
2,688,645 UART:
2,688,661 UART: Running Caliptra FMC ...
2,689,069 UART:
2,689,123 UART: [state] CFI Enabled
2,699,490 UART: [fht] FMC Alias Private Key: 7
2,807,789 UART: [art] Extend RT PCRs Done
2,808,217 UART: [art] Lock RT PCRs Done
2,809,771 UART: [art] Populate DV Done
2,818,242 UART: [fht] FMC Alias Private Key: 7
2,819,322 UART: [art] Derive CDI
2,819,602 UART: [art] Store in in slot 0x4
2,905,025 UART: [art] Derive Key Pair
2,905,385 UART: [art] Store priv key in slot 0x5
2,917,971 UART: [art] Derive Key Pair - Done
2,932,719 UART: [art] Signing Cert with AUTHO
2,933,199 UART: RITY.KEYID = 7
2,948,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,408 UART: [art] PUB.X = A0FB922740403F8DAE81F28EA8E224F07F9741D0E4EB6DBC8D38AFC6DDAFD5F6026327649D3258016DC1192A68C11DD3
2,956,184 UART: [art] PUB.Y = 4330F459134F5E16390407EB6929F6258CCFEF2A4A2CFECDA111835C3819E8DDFD52A9477642F9D74B534B5A66FF662B
2,963,134 UART: [art] SIG.R = 43FAC8F7C6AB3074DD01CCB4E9F875CDD0D64EB162D27E4FAAD8B8DA5EE5A020F4FFCED20F2CCA6806A1F020C0942F44
2,969,925 UART: [art] SIG.S = 76A59B32E34E59A9CF51497BB298DB64113C37D83DDCDE04A8AD163C07C71763FF39BCC4A7A814F8E9BB0FA1ED46B9AC
2,993,795 UART: Caliptra RT
2,994,049 UART: [state] CFI Enabled
3,102,673 UART: [rt] RT listening for mailbox commands...
3,103,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,296 UART: [rt]cmd =0x41544d4e, len=14344
3,372,090 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
907,095 UART: [kat] SHA2-512-ACC
908,996 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,410 UART: [cold-reset] ++
1,172,884 UART: [fht] FHT @ 0x50003400
1,175,555 UART: [idev] ++
1,175,723 UART: [idev] CDI.KEYID = 6
1,176,083 UART: [idev] SUBJECT.KEYID = 7
1,176,507 UART: [idev] UDS.KEYID = 0
1,176,852 ready_for_fw is high
1,176,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,599 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,066 UART: [idev] --
1,211,076 UART: [ldev] ++
1,211,244 UART: [ldev] CDI.KEYID = 6
1,211,607 UART: [ldev] SUBJECT.KEYID = 5
1,212,033 UART: [ldev] AUTHORITY.KEYID = 7
1,212,496 UART: [ldev] FE.KEYID = 1
1,217,782 UART: [ldev] Erasing FE.KEYID = 1
1,244,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,034 UART: [ldev] --
1,283,303 UART: [fwproc] Wait for Commands...
1,284,113 UART: [fwproc] Recv command 0x46574c44
1,284,841 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,771 >>> mbox cmd response: success
2,776,993 UART: [afmc] ++
2,777,161 UART: [afmc] CDI.KEYID = 6
2,777,523 UART: [afmc] SUBJECT.KEYID = 7
2,777,948 UART: [afmc] AUTHORITY.KEYID = 5
2,814,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,362 UART: [afmc] --
2,857,338 UART: [cold-reset] --
2,858,346 UART: [state] Locking Datavault
2,859,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,081 UART: [state] Locking ICCM
2,860,559 UART: [exit] Launching FMC @ 0x40000130
2,865,888 UART:
2,865,904 UART: Running Caliptra FMC ...
2,866,312 UART:
2,866,455 UART: [state] CFI Enabled
2,877,160 UART: [fht] FMC Alias Private Key: 7
2,985,561 UART: [art] Extend RT PCRs Done
2,985,989 UART: [art] Lock RT PCRs Done
2,987,433 UART: [art] Populate DV Done
2,995,788 UART: [fht] FMC Alias Private Key: 7
2,996,726 UART: [art] Derive CDI
2,997,006 UART: [art] Store in in slot 0x4
3,082,879 UART: [art] Derive Key Pair
3,083,239 UART: [art] Store priv key in slot 0x5
3,096,805 UART: [art] Derive Key Pair - Done
3,111,436 UART: [art] Signing Cert with AUTHO
3,111,916 UART: RITY.KEYID = 7
3,127,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,939 UART: [art] PUB.X = C4345072CEBF60CC535AE2747FED9A9171B10C93F5682909AA27804B63743A580026C2DE407BF9A8E8922657E9B9B3AA
3,134,683 UART: [art] PUB.Y = AF5D3A7F67BEC2C6D8EA494D62737D4511C939572A139918D9612D302E3465DE6F1051F64DE0C086EC2503CCBD3374EA
3,141,636 UART: [art] SIG.R = 1968725D3C6E32CB81ECF1488FF4FDFE1627AD7ACD41F8512B6165EEB67579C83DAE59C6D75BF2BEE95AAF6BBD50847B
3,148,428 UART: [art] SIG.S = 7CED3CD796FE84561AADECF4101E1CBFB7AF3A06D462D4B58CDACD9DCBAF7718FC3CBF079436592A3936AEB6F738033F
3,172,702 UART: Caliptra RT
3,173,048 UART: [state] CFI Enabled
3,280,760 UART: [rt] RT listening for mailbox commands...
3,281,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,129 UART: [rt]cmd =0x41544d4e, len=14344
3,549,737 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,146 ready_for_fw is high
1,061,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,306 >>> mbox cmd response: success
2,689,232 UART:
2,689,248 UART: Running Caliptra FMC ...
2,689,656 UART:
2,689,799 UART: [state] CFI Enabled
2,700,430 UART: [fht] FMC Alias Private Key: 7
2,808,687 UART: [art] Extend RT PCRs Done
2,809,115 UART: [art] Lock RT PCRs Done
2,810,945 UART: [art] Populate DV Done
2,819,282 UART: [fht] FMC Alias Private Key: 7
2,820,374 UART: [art] Derive CDI
2,820,654 UART: [art] Store in in slot 0x4
2,905,985 UART: [art] Derive Key Pair
2,906,345 UART: [art] Store priv key in slot 0x5
2,919,451 UART: [art] Derive Key Pair - Done
2,934,011 UART: [art] Signing Cert with AUTHO
2,934,491 UART: RITY.KEYID = 7
2,949,541 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,306 UART: [art] PUB.X = DDC66BB4B6F831D2EE953E3CC2FFEB291F77265F7CE009EE9408407909795CD6DF6FCEF3118896C7DDEC456C78EBB711
2,957,085 UART: [art] PUB.Y = 38C659A76970C83F43C64A2E4EA1647B26A2EA37C98D11EEC43099EA46310BEA164F516C4647E0A6FE3281403CB76D03
2,964,031 UART: [art] SIG.R = 154EC3F8ED9F399F0475DBD5504A8EBB2119E4592D20C01FC3EF72D98236D54489E75774A8AEC2625270D4FA628EAC6E
2,970,806 UART: [art] SIG.S = 4B14ADD256B79704EAE221A15159C558C7BF142CB6EEB3DE6A9FBA1831361836EEA5988C3C26FCE8059338994CD469FD
2,994,659 UART: Caliptra RT
2,995,005 UART: [state] CFI Enabled
3,101,927 UART: [rt] RT listening for mailbox commands...
3,102,597 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,622 UART: [rt]cmd =0x41544d4e, len=14344
3,370,372 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,891 UART: [kat] ++
895,043 UART: [kat] sha1
899,249 UART: [kat] SHA2-256
901,189 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,857 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 ready_for_fw is high
1,173,707 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,583 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,147 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,214,694 UART: [ldev] Erasing FE.KEYID = 1
1,240,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,152 UART: [ldev] --
1,279,510 UART: [fwproc] Wait for Commands...
1,280,309 UART: [fwproc] Recv command 0x46574c44
1,281,042 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,194 >>> mbox cmd response: success
2,772,295 UART: [afmc] ++
2,772,463 UART: [afmc] CDI.KEYID = 6
2,772,826 UART: [afmc] SUBJECT.KEYID = 7
2,773,252 UART: [afmc] AUTHORITY.KEYID = 5
2,808,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,405 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,198 UART: [afmc] --
2,852,296 UART: [cold-reset] --
2,852,958 UART: [state] Locking Datavault
2,854,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,787 UART: [state] Locking ICCM
2,855,299 UART: [exit] Launching FMC @ 0x40000130
2,860,628 UART:
2,860,644 UART: Running Caliptra FMC ...
2,861,052 UART:
2,861,106 UART: [state] CFI Enabled
2,871,475 UART: [fht] FMC Alias Private Key: 7
2,979,792 UART: [art] Extend RT PCRs Done
2,980,220 UART: [art] Lock RT PCRs Done
2,981,690 UART: [art] Populate DV Done
2,989,905 UART: [fht] FMC Alias Private Key: 7
2,991,009 UART: [art] Derive CDI
2,991,289 UART: [art] Store in in slot 0x4
3,077,540 UART: [art] Derive Key Pair
3,077,900 UART: [art] Store priv key in slot 0x5
3,090,926 UART: [art] Derive Key Pair - Done
3,105,837 UART: [art] Signing Cert with AUTHO
3,106,317 UART: RITY.KEYID = 7
3,121,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,016 UART: [art] PUB.X = 2EBC2C7CB766D887F5C341F37CE472E8646CCADC3C989A3BC151955339013AA24B5068C6F16435880510A5F9574B753F
3,128,780 UART: [art] PUB.Y = F0322AAC5A926CD183C412F020849F53A8FC67AD99A72B5F7E4C5014518BEA5177F27534CBD3D9AC17830DA32C699DE3
3,135,735 UART: [art] SIG.R = F4E06FC53F2BD008964700EFDA7AD4F53D0F8523995DEEE3D63E4D3B336463EB055BD35E344FE7B66F2B24792FC921F7
3,142,486 UART: [art] SIG.S = CA41F87CE1E29A2A0490D27FBE7A629B57A8A0FC673D1993CE3BB0DB5E83F0AEB1EA9D1F502E039B87D68BA619C9366A
3,165,735 UART: Caliptra RT
3,165,989 UART: [state] CFI Enabled
3,273,610 UART: [rt] RT listening for mailbox commands...
3,274,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,205 UART: [rt]cmd =0x41544d4e, len=14344
3,541,833 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,188 ready_for_fw is high
1,055,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,354 >>> mbox cmd response: success
2,683,420 UART:
2,683,436 UART: Running Caliptra FMC ...
2,683,844 UART:
2,683,898 UART: [state] CFI Enabled
2,694,643 UART: [fht] FMC Alias Private Key: 7
2,801,944 UART: [art] Extend RT PCRs Done
2,802,372 UART: [art] Lock RT PCRs Done
2,804,088 UART: [art] Populate DV Done
2,812,325 UART: [fht] FMC Alias Private Key: 7
2,813,441 UART: [art] Derive CDI
2,813,721 UART: [art] Store in in slot 0x4
2,899,546 UART: [art] Derive Key Pair
2,899,906 UART: [art] Store priv key in slot 0x5
2,912,668 UART: [art] Derive Key Pair - Done
2,927,604 UART: [art] Signing Cert with AUTHO
2,928,084 UART: RITY.KEYID = 7
2,943,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,151 UART: [art] PUB.X = 751DF20FBB0B982BCA87B91B61F6E142978916CFCC21D43C61E860EDEA8D0D44498C892C61EE746D7F2802EEDA6AD132
2,950,923 UART: [art] PUB.Y = A734C7739843A116A91FFA993DFE029450E7B4C84DEF18872390EA41DAF576869277A0D9BB4ADE9080E12776CDAFAAF4
2,957,880 UART: [art] SIG.R = 81D1AE4AE83759ECDF14B69C74911C65B24758E17B69D14FD0434A630EC4EFC6FB31DA41165B15E0C58751EF0300E932
2,964,628 UART: [art] SIG.S = 9B957AEDF6BF34187ACEB6CF7E76E8242ED6FD924C9509BD3D6BAC4C1E0EB3A3B8C0A7346FF7369B7E49ED8A5906186A
2,987,778 UART: Caliptra RT
2,988,032 UART: [state] CFI Enabled
3,096,133 UART: [rt] RT listening for mailbox commands...
3,096,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,528 UART: [rt]cmd =0x41544d4e, len=14344
3,364,212 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,174,568 ready_for_fw is high
1,174,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,759 UART: [ldev] ++
1,208,927 UART: [ldev] CDI.KEYID = 6
1,209,291 UART: [ldev] SUBJECT.KEYID = 5
1,209,718 UART: [ldev] AUTHORITY.KEYID = 7
1,210,181 UART: [ldev] FE.KEYID = 1
1,215,721 UART: [ldev] Erasing FE.KEYID = 1
1,241,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,557 UART: [ldev] --
1,280,961 UART: [fwproc] Wait for Commands...
1,281,544 UART: [fwproc] Recv command 0x46574c44
1,282,277 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,501 >>> mbox cmd response: success
2,772,752 UART: [afmc] ++
2,772,920 UART: [afmc] CDI.KEYID = 6
2,773,283 UART: [afmc] SUBJECT.KEYID = 7
2,773,709 UART: [afmc] AUTHORITY.KEYID = 5
2,809,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,850 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,687 UART: [afmc] --
2,852,599 UART: [cold-reset] --
2,853,381 UART: [state] Locking Datavault
2,854,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,356 UART: [state] Locking ICCM
2,856,012 UART: [exit] Launching FMC @ 0x40000130
2,861,341 UART:
2,861,357 UART: Running Caliptra FMC ...
2,861,765 UART:
2,861,908 UART: [state] CFI Enabled
2,872,541 UART: [fht] FMC Alias Private Key: 7
2,980,404 UART: [art] Extend RT PCRs Done
2,980,832 UART: [art] Lock RT PCRs Done
2,982,226 UART: [art] Populate DV Done
2,990,545 UART: [fht] FMC Alias Private Key: 7
2,991,663 UART: [art] Derive CDI
2,991,943 UART: [art] Store in in slot 0x4
3,077,422 UART: [art] Derive Key Pair
3,077,782 UART: [art] Store priv key in slot 0x5
3,091,130 UART: [art] Derive Key Pair - Done
3,105,966 UART: [art] Signing Cert with AUTHO
3,106,446 UART: RITY.KEYID = 7
3,121,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,631 UART: [art] PUB.X = C9678E48B99F3A4A2CD8787F08FE778F9E7146278FB40E57C6B99FB1F3B50D5D0DEE433C403821C43225BCD1CC968AA5
3,129,399 UART: [art] PUB.Y = 3D1A1AACB8CF8947B0F03F4A1BC9ED138B02CE9E5E20128155917C7A7E2DFBFD2937AC1F30C4B702B68CBBC16CEA8247
3,136,365 UART: [art] SIG.R = F6677CAEDB77DFDB3D68097B9CFD20D6E8514D70EBE07F6E805E9039E1266E0B8B30601022EDC6BA0718B3D03E183985
3,143,136 UART: [art] SIG.S = 0CE4801C07972408029BECD8AC2BA3BED8F02BD85EE13BC3B272D8CA732C51C36DACB134A69E240E6FA460C8EF5A4FFB
3,166,958 UART: Caliptra RT
3,167,304 UART: [state] CFI Enabled
3,275,536 UART: [rt] RT listening for mailbox commands...
3,276,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,003 UART: [rt]cmd =0x41544d4e, len=14344
3,544,253 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,133 ready_for_fw is high
1,056,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,133 >>> mbox cmd response: success
2,684,767 UART:
2,684,783 UART: Running Caliptra FMC ...
2,685,191 UART:
2,685,334 UART: [state] CFI Enabled
2,695,845 UART: [fht] FMC Alias Private Key: 7
2,803,364 UART: [art] Extend RT PCRs Done
2,803,792 UART: [art] Lock RT PCRs Done
2,805,658 UART: [art] Populate DV Done
2,813,799 UART: [fht] FMC Alias Private Key: 7
2,814,931 UART: [art] Derive CDI
2,815,211 UART: [art] Store in in slot 0x4
2,900,762 UART: [art] Derive Key Pair
2,901,122 UART: [art] Store priv key in slot 0x5
2,914,102 UART: [art] Derive Key Pair - Done
2,928,955 UART: [art] Signing Cert with AUTHO
2,929,435 UART: RITY.KEYID = 7
2,944,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,068 UART: [art] PUB.X = 3803B9D2652247D48350A10EF31297BDA748408EA2C9A44D01B012C27F520ACDEA3BEAC18498668BDFBF357D6C7467BD
2,951,834 UART: [art] PUB.Y = 5A52DDA2DD273A9987053251CB30E50C840303E1C4F775D74F0FB5F5E04C0C573A5D0C8E2BFAE944E6603F5E2DB5A232
2,958,773 UART: [art] SIG.R = 48E0F5453A63AC5CE846704E50CF67F4579B981BA7DEF8F703BB11E535D11ABE0C0D9A59C518CA0949F548E78719DCE2
2,965,541 UART: [art] SIG.S = A1D885686DDDE4547CB97FE5A91ABB67A88A2E09FC8C24A65FD77BD811FE01B611611E5CE83A740C2EE7BC6FE4EA9468
2,989,169 UART: Caliptra RT
2,989,515 UART: [state] CFI Enabled
3,097,343 UART: [rt] RT listening for mailbox commands...
3,098,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,604 UART: [rt]cmd =0x41544d4e, len=14344
3,365,548 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,506 UART:
192,874 UART: Running Caliptra ROM ...
193,973 UART:
194,110 UART: [state] CFI Enabled
265,321 UART: [state] LifecycleState = Unprovisioned
267,298 UART: [state] DebugLocked = No
269,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,513 UART: [kat] SHA2-256
444,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,705 UART: [kat] ++
455,148 UART: [kat] sha1
465,802 UART: [kat] SHA2-256
468,447 UART: [kat] SHA2-384
474,432 UART: [kat] SHA2-512-ACC
476,812 UART: [kat] ECC-384
2,769,013 UART: [kat] HMAC-384Kdf
2,782,038 UART: [kat] LMS
3,972,343 UART: [kat] --
3,976,092 UART: [cold-reset] ++
3,978,459 UART: [fht] Storing FHT @ 0x50003400
3,989,726 UART: [idev] ++
3,990,361 UART: [idev] CDI.KEYID = 6
3,991,425 UART: [idev] SUBJECT.KEYID = 7
3,992,524 UART: [idev] UDS.KEYID = 0
3,993,620 ready_for_fw is high
3,993,830 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,335 UART: [idev] Erasing UDS.KEYID = 0
7,326,838 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,451 UART: [idev] --
7,352,091 UART: [ldev] ++
7,352,732 UART: [ldev] CDI.KEYID = 6
7,353,641 UART: [ldev] SUBJECT.KEYID = 5
7,354,844 UART: [ldev] AUTHORITY.KEYID = 7
7,356,121 UART: [ldev] FE.KEYID = 1
7,404,318 UART: [ldev] Erasing FE.KEYID = 1
10,737,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,562 UART: [ldev] --
13,120,235 UART: [fwproc] Waiting for Commands...
13,121,946 UART: [fwproc] Received command 0x46574c44
13,124,120 UART: [fwproc] Received Image of size 114036 bytes
21,766,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,850,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,919,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,236,807 >>> mbox cmd response: success
22,241,362 UART: [afmc] ++
22,241,956 UART: [afmc] CDI.KEYID = 6
22,242,860 UART: [afmc] SUBJECT.KEYID = 7
22,244,073 UART: [afmc] AUTHORITY.KEYID = 5
25,617,637 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,915,209 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,917,461 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,932,052 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,946,776 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,960,998 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,982,814 UART: [afmc] --
27,986,794 UART: [cold-reset] --
27,992,003 UART: [state] Locking Datavault
27,996,981 UART: [state] Locking PCR0, PCR1 and PCR31
27,998,694 UART: [state] Locking ICCM
28,001,439 UART: [exit] Launching FMC @ 0x40000130
28,009,846 UART:
28,010,084 UART: Running Caliptra FMC ...
28,011,187 UART:
28,011,355 UART: [state] CFI Enabled
28,077,134 UART: [fht] FMC Alias Private Key: 7
30,415,490 UART: [art] Extend RT PCRs Done
30,416,747 UART: [art] Lock RT PCRs Done
30,418,327 UART: [art] Populate DV Done
30,423,695 UART: [fht] FMC Alias Private Key: 7
30,425,390 UART: [art] Derive CDI
30,426,200 UART: [art] Store in in slot 0x4
30,487,410 UART: [art] Derive Key Pair
30,488,449 UART: [art] Store priv key in slot 0x5
33,781,059 UART: [art] Derive Key Pair - Done
33,794,196 UART: [art] Signing Cert with AUTHO
33,795,513 UART: RITY.KEYID = 7
36,082,336 UART: [art] Erasing AUTHORITY.KEYID = 7
36,083,854 UART: [art] PUB.X = C87F219C65E74A9107F3031B0FE4349313BDFB0AA15AD61FD142AF75890D3C09358511FBBB1237E823B60405220F97F4
36,091,072 UART: [art] PUB.Y = 7EA7CFFACEBE958A576C291334DBD8AAB3BF6DC6754EE12D7D3A3D7C3F2DA9BD4FBBAA100E0FE83F8387C3CE18D9DCF9
36,098,341 UART: [art] SIG.R = 7BD5459868C38EF064C71385F4899E1130A6B5650DF654A3A641ACC0C3435BA7769D4AFA557FD79BFBBEEE853E4B6767
36,105,754 UART: [art] SIG.S = 8DD6B4BA2CEDAF31C6A46DB095A0ADC1EA7294CF2ECE5BCE29F685074141AA1A967BC498630D98F680952155B0ADF616
37,410,492 UART: Caliptra RT
37,411,208 UART: [state] CFI Enabled
37,571,448 UART: [rt] RT listening for mailbox commands...
37,573,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,728,971 UART: [rt]cmd =0x41544d4e, len=14344
44,101,794 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,634 writing to cptra_bootfsm_go
3,786,445 ready_for_fw is high
3,786,912 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,862,712 >>> mbox cmd response: success
27,559,285 UART:
27,559,675 UART: Running Caliptra FMC ...
27,560,880 UART:
27,561,042 UART: [state] CFI Enabled
27,625,024 UART: [fht] FMC Alias Private Key: 7
29,964,053 UART: [art] Extend RT PCRs Done
29,965,280 UART: [art] Lock RT PCRs Done
29,966,529 UART: [art] Populate DV Done
29,972,150 UART: [fht] FMC Alias Private Key: 7
29,973,698 UART: [art] Derive CDI
29,974,530 UART: [art] Store in in slot 0x4
30,033,845 UART: [art] Derive Key Pair
30,034,841 UART: [art] Store priv key in slot 0x5
33,327,565 UART: [art] Derive Key Pair - Done
33,340,618 UART: [art] Signing Cert with AUTHO
33,341,913 UART: RITY.KEYID = 7
35,628,762 UART: [art] Erasing AUTHORITY.KEYID = 7
35,630,263 UART: [art] PUB.X = 4F6C9A59F997B649BF442697DD76C7EA03A8C5E28FC37923EB794482D4EA9B89789191C0256ACC23B0391F0E4FB95AD5
35,637,491 UART: [art] PUB.Y = 59C4145DD2A5BB60250FD55CE9B84B75A9A22C93A898F3BBF114C8353E96273CD7F771D8B4930B6F7850AA4785B9A6F1
35,644,730 UART: [art] SIG.R = 08BC9B9FD02A255B38C61641234954E994ADDCFC7597F2A35D9EE7D91EB5EE29C84EE3E3A12F6B84BDE4ABB71940F1DE
35,652,161 UART: [art] SIG.S = 65DF9D81D08C13DDA622FDEC868A061604DA4FBB08AC7221D0566CDD0AF5433385F8245365A50842E041F4A22F6FD1A0
36,957,536 UART: Caliptra RT
36,958,248 UART: [state] CFI Enabled
37,118,155 UART: [rt] RT listening for mailbox commands...
37,120,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,275,884 UART: [rt]cmd =0x41544d4e, len=14344
43,467,033 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,349 UART:
192,713 UART: Running Caliptra ROM ...
193,817 UART:
603,522 UART: [state] CFI Enabled
617,258 UART: [state] LifecycleState = Unprovisioned
619,132 UART: [state] DebugLocked = No
622,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,590 UART: [kat] SHA2-256
797,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,905 UART: [kat] ++
808,353 UART: [kat] sha1
819,718 UART: [kat] SHA2-256
822,410 UART: [kat] SHA2-384
827,554 UART: [kat] SHA2-512-ACC
829,922 UART: [kat] ECC-384
3,114,105 UART: [kat] HMAC-384Kdf
3,126,123 UART: [kat] LMS
4,316,295 UART: [kat] --
4,321,325 UART: [cold-reset] ++
4,322,622 UART: [fht] Storing FHT @ 0x50003400
4,334,551 UART: [idev] ++
4,335,157 UART: [idev] CDI.KEYID = 6
4,336,082 UART: [idev] SUBJECT.KEYID = 7
4,337,350 UART: [idev] UDS.KEYID = 0
4,338,424 ready_for_fw is high
4,338,636 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,758 UART: [idev] Erasing UDS.KEYID = 0
7,622,319 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,386 UART: [idev] --
7,649,291 UART: [ldev] ++
7,649,909 UART: [ldev] CDI.KEYID = 6
7,650,846 UART: [ldev] SUBJECT.KEYID = 5
7,652,050 UART: [ldev] AUTHORITY.KEYID = 7
7,653,339 UART: [ldev] FE.KEYID = 1
7,664,767 UART: [ldev] Erasing FE.KEYID = 1
10,956,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,019 UART: [ldev] --
13,319,427 UART: [fwproc] Waiting for Commands...
13,322,548 UART: [fwproc] Received command 0x46574c44
13,324,730 UART: [fwproc] Received Image of size 114036 bytes
21,800,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,879,135 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,947,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,264,587 >>> mbox cmd response: success
22,268,794 UART: [afmc] ++
22,269,397 UART: [afmc] CDI.KEYID = 6
22,270,284 UART: [afmc] SUBJECT.KEYID = 7
22,271,556 UART: [afmc] AUTHORITY.KEYID = 5
25,590,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,884,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,887,046 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,901,603 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,916,341 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,930,546 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,952,084 UART: [afmc] --
27,955,964 UART: [cold-reset] --
27,959,773 UART: [state] Locking Datavault
27,965,398 UART: [state] Locking PCR0, PCR1 and PCR31
27,967,152 UART: [state] Locking ICCM
27,969,626 UART: [exit] Launching FMC @ 0x40000130
27,978,020 UART:
27,978,257 UART: Running Caliptra FMC ...
27,979,357 UART:
27,979,515 UART: [state] CFI Enabled
27,987,675 UART: [fht] FMC Alias Private Key: 7
30,318,673 UART: [art] Extend RT PCRs Done
30,319,892 UART: [art] Lock RT PCRs Done
30,321,726 UART: [art] Populate DV Done
30,327,087 UART: [fht] FMC Alias Private Key: 7
30,328,791 UART: [art] Derive CDI
30,329,606 UART: [art] Store in in slot 0x4
30,371,974 UART: [art] Derive Key Pair
30,373,015 UART: [art] Store priv key in slot 0x5
33,614,874 UART: [art] Derive Key Pair - Done
33,627,552 UART: [art] Signing Cert with AUTHO
33,628,857 UART: RITY.KEYID = 7
35,908,381 UART: [art] Erasing AUTHORITY.KEYID = 7
35,909,888 UART: [art] PUB.X = 99CD03BC1161A58B84FAD99CE730CD077942E02E8BD819A644ED368555637707BA9D190701DCCA9BB9FA2058CFC3F5F9
35,917,152 UART: [art] PUB.Y = BC8B5693B548A542E520F254529A55103B4A94F9C8F2E72C791FE13D7A4ECD1B1E5CA590B4B6CA4741506E33C46B1C78
35,924,406 UART: [art] SIG.R = 4E5FEE77A7385FE0E4C75781B5BBC11321E2B4217888271C3D31F4434EFF00681765FB80958EF55D6D7D6D353526D55C
35,931,766 UART: [art] SIG.S = 8C9B0DCF5C4CBAB2188880A1909743E832B062AFB51845F51C3D7CE94869B132BD3C74FB18F7EA9C8569F643FBFEDE9C
37,237,565 UART: Caliptra RT
37,238,321 UART: [state] CFI Enabled
37,355,524 UART: [rt] RT listening for mailbox commands...
37,357,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,513,512 UART: [rt]cmd =0x41544d4e, len=14344
43,730,262 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
4,126,510 ready_for_fw is high
4,126,919 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,970,108 >>> mbox cmd response: success
27,612,583 UART:
27,612,986 UART: Running Caliptra FMC ...
27,614,112 UART:
27,614,267 UART: [state] CFI Enabled
27,622,050 UART: [fht] FMC Alias Private Key: 7
29,952,516 UART: [art] Extend RT PCRs Done
29,953,749 UART: [art] Lock RT PCRs Done
29,954,942 UART: [art] Populate DV Done
29,960,463 UART: [fht] FMC Alias Private Key: 7
29,962,014 UART: [art] Derive CDI
29,962,838 UART: [art] Store in in slot 0x4
30,005,326 UART: [art] Derive Key Pair
30,006,330 UART: [art] Store priv key in slot 0x5
33,248,364 UART: [art] Derive Key Pair - Done
33,261,093 UART: [art] Signing Cert with AUTHO
33,262,408 UART: RITY.KEYID = 7
35,541,727 UART: [art] Erasing AUTHORITY.KEYID = 7
35,543,259 UART: [art] PUB.X = 23B4D71CBB47891FC81C2759FD43AC10280AD976F21BC969FAF40ECC165E9DA2E9491000914DA3D6E392C0672C880A3B
35,550,499 UART: [art] PUB.Y = 714318E9E4FAE6A33D916DB5C32569C5DDF5E9E043AB3CFE287F3C7129BEC5576F2D5F5F37BB772B2E367DC79C6C3D27
35,557,731 UART: [art] SIG.R = 2222F2C7C01F5BD96688FBFEF494BE76B62B6DD36B9FDB215D70B873C0087F86868C46FF6D7B0F9E889261AB9229506C
35,565,161 UART: [art] SIG.S = 72A835E4BF033C44ABE36AD0039B94695DBD6F8D443C7E08491EC90288DD2C0CEC31E197E0C01D087F14101137FC5D33
36,870,234 UART: Caliptra RT
36,870,949 UART: [state] CFI Enabled
36,988,951 UART: [rt] RT listening for mailbox commands...
36,991,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,146,531 UART: [rt]cmd =0x41544d4e, len=14344
43,441,352 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,714 UART:
193,062 UART: Running Caliptra ROM ...
194,302 UART:
194,460 UART: [state] CFI Enabled
263,010 UART: [state] LifecycleState = Unprovisioned
264,935 UART: [state] DebugLocked = No
267,166 UART: [state] WD Timer not started. Device not locked for debugging
270,136 UART: [kat] SHA2-256
449,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,863 UART: [kat] ++
462,114 UART: [kat] sha1
473,147 UART: [kat] SHA2-256
476,199 UART: [kat] SHA2-384
480,854 UART: [kat] SHA2-512-ACC
483,793 UART: [kat] ECC-384
2,946,259 UART: [kat] HMAC-384Kdf
2,970,495 UART: [kat] LMS
3,499,913 UART: [kat] --
3,504,155 UART: [cold-reset] ++
3,506,636 UART: [fht] FHT @ 0x50003400
3,516,842 UART: [idev] ++
3,517,411 UART: [idev] CDI.KEYID = 6
3,518,324 UART: [idev] SUBJECT.KEYID = 7
3,519,572 UART: [idev] UDS.KEYID = 0
3,520,499 ready_for_fw is high
3,520,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,524 UART: [idev] Erasing UDS.KEYID = 0
6,022,348 UART: [idev] Sha1 KeyId Algorithm
6,045,602 UART: [idev] --
6,048,416 UART: [ldev] ++
6,048,990 UART: [ldev] CDI.KEYID = 6
6,049,906 UART: [ldev] SUBJECT.KEYID = 5
6,051,067 UART: [ldev] AUTHORITY.KEYID = 7
6,052,303 UART: [ldev] FE.KEYID = 1
6,097,683 UART: [ldev] Erasing FE.KEYID = 1
8,601,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,706 UART: [ldev] --
10,409,949 UART: [fwproc] Wait for Commands...
10,411,880 UART: [fwproc] Recv command 0x46574c44
10,413,971 UART: [fwproc] Recv'd Img size: 114360 bytes
14,969,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,050,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,119,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,436,687 >>> mbox cmd response: success
15,440,805 UART: [afmc] ++
15,441,412 UART: [afmc] CDI.KEYID = 6
15,442,332 UART: [afmc] SUBJECT.KEYID = 7
15,443,493 UART: [afmc] AUTHORITY.KEYID = 5
17,979,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,702,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,704,412 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,720,342 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,736,333 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,752,094 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,774,913 UART: [afmc] --
19,778,078 UART: [cold-reset] --
19,781,536 UART: [state] Locking Datavault
19,787,813 UART: [state] Locking PCR0, PCR1 and PCR31
19,789,460 UART: [state] Locking ICCM
19,791,505 UART: [exit] Launching FMC @ 0x40000130
19,799,964 UART:
19,800,211 UART: Running Caliptra FMC ...
19,801,320 UART:
19,801,483 UART: [state] CFI Enabled
19,860,871 UART: [fht] FMC Alias Private Key: 7
21,624,327 UART: [art] Extend RT PCRs Done
21,625,550 UART: [art] Lock RT PCRs Done
21,627,120 UART: [art] Populate DV Done
21,632,590 UART: [fht] FMC Alias Private Key: 7
21,634,241 UART: [art] Derive CDI
21,635,059 UART: [art] Store in in slot 0x4
21,693,725 UART: [art] Derive Key Pair
21,694,790 UART: [art] Store priv key in slot 0x5
24,157,852 UART: [art] Derive Key Pair - Done
24,170,363 UART: [art] Signing Cert with AUTHO
24,171,668 UART: RITY.KEYID = 7
25,884,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,885,608 UART: [art] PUB.X = 41F26ADD7608FFE9F789556F611F017A8D12C07C179CDED677BDFDBB39E0F897FE0BEC43CCF418DA6A07CCE477A0745E
25,892,933 UART: [art] PUB.Y = 64A5173633B36E271DAF0D4A1CA4E1931C81400B44614294A15A225DE185DB4BCFCC8C08D9DE5AF8F1DA0856B68DDAC7
25,900,194 UART: [art] SIG.R = 4B86D523D59639AAE16A3821FB5D22D7B5FAF6C61F0A8E4952CF14E37CA2AEE5E634F98CBB18A758085FEE035982F7D3
25,907,606 UART: [art] SIG.S = A3593708E90F75B527F078CB0D6FF2AADA955D01ABBF2D5126170C688BB970367B99CBD4B548F14A29E8295DFB15CEBD
26,886,658 UART: Caliptra RT
26,887,343 UART: [state] CFI Enabled
27,051,816 UART: [rt] RT listening for mailbox commands...
27,054,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,261 UART: [rt]cmd =0x41544d4e, len=14344
30,772,382 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
192,600 UART:
192,966 UART: Running Caliptra ROM ...
194,111 UART:
194,259 UART: [state] CFI Enabled
261,132 UART: [state] LifecycleState = Unprovisioned
263,537 UART: [state] DebugLocked = No
265,713 UART: [state] WD Timer not started. Device not locked for debugging
271,091 UART: [kat] SHA2-256
461,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,761 UART: [kat] ++
472,240 UART: [kat] sha1
484,461 UART: [kat] SHA2-256
487,493 UART: [kat] SHA2-384
494,415 UART: [kat] SHA2-512-ACC
496,999 UART: [kat] ECC-384
2,948,876 UART: [kat] HMAC-384Kdf
2,970,703 UART: [kat] LMS
3,502,421 UART: [kat] --
3,506,797 UART: [cold-reset] ++
3,508,589 UART: [fht] FHT @ 0x50003400
3,521,266 UART: [idev] ++
3,521,904 UART: [idev] CDI.KEYID = 6
3,522,859 UART: [idev] SUBJECT.KEYID = 7
3,524,101 UART: [idev] UDS.KEYID = 0
3,525,024 ready_for_fw is high
3,525,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,170 UART: [idev] Erasing UDS.KEYID = 0
6,028,013 UART: [idev] Sha1 KeyId Algorithm
6,051,082 UART: [idev] --
6,056,309 UART: [ldev] ++
6,057,003 UART: [ldev] CDI.KEYID = 6
6,057,896 UART: [ldev] SUBJECT.KEYID = 5
6,059,108 UART: [ldev] AUTHORITY.KEYID = 7
6,060,349 UART: [ldev] FE.KEYID = 1
6,099,165 UART: [ldev] Erasing FE.KEYID = 1
8,605,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,373 UART: [ldev] --
10,413,292 UART: [fwproc] Wait for Commands...
10,416,200 UART: [fwproc] Recv command 0x46574c44
10,418,457 UART: [fwproc] Recv'd Img size: 114360 bytes
15,032,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,108,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,224,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,767,940 >>> mbox cmd response: success
15,772,699 UART: [afmc] ++
15,773,412 UART: [afmc] CDI.KEYID = 6
15,774,586 UART: [afmc] SUBJECT.KEYID = 7
15,776,077 UART: [afmc] AUTHORITY.KEYID = 5
18,318,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,042,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,044,788 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,059,851 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,075,066 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,089,867 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,113,688 UART: [afmc] --
20,117,126 UART: [cold-reset] --
20,121,344 UART: [state] Locking Datavault
20,126,643 UART: [state] Locking PCR0, PCR1 and PCR31
20,128,803 UART: [state] Locking ICCM
20,130,224 UART: [exit] Launching FMC @ 0x40000130
20,138,911 UART:
20,139,156 UART: Running Caliptra FMC ...
20,140,264 UART:
20,140,423 UART: [state] CFI Enabled
20,200,952 UART: [fht] FMC Alias Private Key: 7
21,964,687 UART: [art] Extend RT PCRs Done
21,965,890 UART: [art] Lock RT PCRs Done
21,967,547 UART: [art] Populate DV Done
21,972,794 UART: [fht] FMC Alias Private Key: 7
21,974,441 UART: [art] Derive CDI
21,975,180 UART: [art] Store in in slot 0x4
22,033,410 UART: [art] Derive Key Pair
22,034,432 UART: [art] Store priv key in slot 0x5
24,497,497 UART: [art] Derive Key Pair - Done
24,509,961 UART: [art] Signing Cert with AUTHO
24,511,266 UART: RITY.KEYID = 7
26,223,062 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,572 UART: [art] PUB.X = 770E50D22908B97E930266846A1932BC731738E152CBFB04CC60FFB79164F2A7F6D49158132971F1627DFC53C7512245
26,231,817 UART: [art] PUB.Y = 30E791B5066769069216626F2E0089F4A89AC7643B6D9AF0D6FF9C7088C11861450C544F062D2D7BAB5C796B231C3BA4
26,239,004 UART: [art] SIG.R = B341EF5954428BE87A4B46FFEA7D9F2AFD27566598BF69AB1CF3EDA272444FFEC86D845F5A05EA7C7D787DC4C6C20498
26,246,438 UART: [art] SIG.S = 7A9F69941957A88B3C887DA769DD5463932E22EE0931AE899FDE2AE567170B9A5B93B3EA24C51532881E979E622AE243
27,224,637 UART: Caliptra RT
27,225,330 UART: [state] CFI Enabled
27,390,716 UART: [rt] RT listening for mailbox commands...
27,393,109 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,413 UART: [rt]cmd =0x41544d4e, len=14344
31,128,287 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,439,467 ready_for_fw is high
3,439,860 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,828,452 >>> mbox cmd response: success
20,110,244 UART:
20,110,624 UART: Running Caliptra FMC ...
20,111,813 UART:
20,111,980 UART: [state] CFI Enabled
20,181,926 UART: [fht] FMC Alias Private Key: 7
21,945,472 UART: [art] Extend RT PCRs Done
21,946,712 UART: [art] Lock RT PCRs Done
21,948,684 UART: [art] Populate DV Done
21,954,210 UART: [fht] FMC Alias Private Key: 7
21,955,793 UART: [art] Derive CDI
21,956,622 UART: [art] Store in in slot 0x4
22,014,536 UART: [art] Derive Key Pair
22,015,545 UART: [art] Store priv key in slot 0x5
24,478,592 UART: [art] Derive Key Pair - Done
24,491,807 UART: [art] Signing Cert with AUTHO
24,493,118 UART: RITY.KEYID = 7
26,204,454 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,965 UART: [art] PUB.X = 95E94C2E8D4FDE4B8ED3108BFD92C479F5D1BC10AD7F25C9A95C1B30FD73DF828D422C15DD517A7D6A016554ACA585C6
26,213,239 UART: [art] PUB.Y = C3A927C02588FE5723B4C4632D50E7D18E5E9C487C61B0D680E99C4D37FEAD7F44A3E25938CBBF5DB4BF488029581584
26,220,531 UART: [art] SIG.R = B0DC49AAFE51AAA5ADD816C8D10E6EFE7F11F22885A9AEAAF2FF66C633BC1BB8CDDEBDCD006B9B255C485B1B0A11399A
26,227,979 UART: [art] SIG.S = 908F2C90B10DBBF624CEAA558CB6FA6EF4A1B2E5114946E908B87E2B56014B9A92A15C49654CD1AA08A3746E76AC1068
27,206,858 UART: Caliptra RT
27,207,571 UART: [state] CFI Enabled
27,370,743 UART: [rt] RT listening for mailbox commands...
27,373,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,600 UART: [rt]cmd =0x41544d4e, len=14344
31,100,512 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,540 UART:
192,909 UART: Running Caliptra ROM ...
194,128 UART:
603,655 UART: [state] CFI Enabled
617,321 UART: [state] LifecycleState = Unprovisioned
619,707 UART: [state] DebugLocked = No
622,233 UART: [state] WD Timer not started. Device not locked for debugging
626,269 UART: [kat] SHA2-256
816,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,974 UART: [kat] ++
827,418 UART: [kat] sha1
838,290 UART: [kat] SHA2-256
841,301 UART: [kat] SHA2-384
847,149 UART: [kat] SHA2-512-ACC
849,730 UART: [kat] ECC-384
3,291,088 UART: [kat] HMAC-384Kdf
3,304,613 UART: [kat] LMS
3,836,410 UART: [kat] --
3,842,351 UART: [cold-reset] ++
3,843,214 UART: [fht] FHT @ 0x50003400
3,854,894 UART: [idev] ++
3,855,592 UART: [idev] CDI.KEYID = 6
3,856,474 UART: [idev] SUBJECT.KEYID = 7
3,857,713 UART: [idev] UDS.KEYID = 0
3,858,611 ready_for_fw is high
3,858,815 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,483 UART: [idev] Erasing UDS.KEYID = 0
6,336,678 UART: [idev] Sha1 KeyId Algorithm
6,358,929 UART: [idev] --
6,364,702 UART: [ldev] ++
6,365,377 UART: [ldev] CDI.KEYID = 6
6,366,354 UART: [ldev] SUBJECT.KEYID = 5
6,367,511 UART: [ldev] AUTHORITY.KEYID = 7
6,368,737 UART: [ldev] FE.KEYID = 1
6,378,257 UART: [ldev] Erasing FE.KEYID = 1
8,857,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,124 UART: [ldev] --
10,649,604 UART: [fwproc] Wait for Commands...
10,652,235 UART: [fwproc] Recv command 0x46574c44
10,654,493 UART: [fwproc] Recv'd Img size: 114360 bytes
15,297,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,379,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,495,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,038,042 >>> mbox cmd response: success
16,042,454 UART: [afmc] ++
16,043,169 UART: [afmc] CDI.KEYID = 6
16,044,356 UART: [afmc] SUBJECT.KEYID = 7
16,045,843 UART: [afmc] AUTHORITY.KEYID = 5
18,542,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,262,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,264,245 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,279,335 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,294,560 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,309,444 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,333,768 UART: [afmc] --
20,337,521 UART: [cold-reset] --
20,342,514 UART: [state] Locking Datavault
20,346,413 UART: [state] Locking PCR0, PCR1 and PCR31
20,348,541 UART: [state] Locking ICCM
20,350,228 UART: [exit] Launching FMC @ 0x40000130
20,358,944 UART:
20,359,177 UART: Running Caliptra FMC ...
20,360,270 UART:
20,360,431 UART: [state] CFI Enabled
20,368,203 UART: [fht] FMC Alias Private Key: 7
22,124,979 UART: [art] Extend RT PCRs Done
22,126,210 UART: [art] Lock RT PCRs Done
22,128,097 UART: [art] Populate DV Done
22,133,774 UART: [fht] FMC Alias Private Key: 7
22,135,256 UART: [art] Derive CDI
22,136,015 UART: [art] Store in in slot 0x4
22,178,397 UART: [art] Derive Key Pair
22,179,439 UART: [art] Store priv key in slot 0x5
24,606,229 UART: [art] Derive Key Pair - Done
24,619,126 UART: [art] Signing Cert with AUTHO
24,620,481 UART: RITY.KEYID = 7
26,325,973 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,461 UART: [art] PUB.X = 3F44919290F9577D65A931774569A05F04D129DC8BCF23263CEA9F7549C79FA40F8D099BC0CE52AD71F48A9927742334
26,334,704 UART: [art] PUB.Y = 99D647EFFC3B5793A423E53FF28DCB26DDA101DFFBDB4AA13DE03C2B681DCDB38504A15277E11B62CFFE5C8675067D2E
26,341,992 UART: [art] SIG.R = F8DFE3709839EC631555371E215AEEEDD506BBE6A7441A017C7E673ACD78695978607AA61B6B91E52F797AC77DC43EF0
26,349,386 UART: [art] SIG.S = 0B7B4C7AD2594774A0517641890E567ECA02C3408509EE1BF3D6744BC290EFD45CABA99FA27F8489D04F2A944B3F3A9F
27,328,560 UART: Caliptra RT
27,329,267 UART: [state] CFI Enabled
27,446,449 UART: [rt] RT listening for mailbox commands...
27,448,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,604,075 UART: [rt]cmd =0x41544d4e, len=14344
31,167,345 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,753,093 ready_for_fw is high
3,753,496 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,060,390 >>> mbox cmd response: success
20,311,239 UART:
20,311,629 UART: Running Caliptra FMC ...
20,312,753 UART:
20,312,914 UART: [state] CFI Enabled
20,321,060 UART: [fht] FMC Alias Private Key: 7
22,077,314 UART: [art] Extend RT PCRs Done
22,078,543 UART: [art] Lock RT PCRs Done
22,080,545 UART: [art] Populate DV Done
22,086,171 UART: [fht] FMC Alias Private Key: 7
22,087,769 UART: [art] Derive CDI
22,088,588 UART: [art] Store in in slot 0x4
22,131,028 UART: [art] Derive Key Pair
22,132,031 UART: [art] Store priv key in slot 0x5
24,559,049 UART: [art] Derive Key Pair - Done
24,571,461 UART: [art] Signing Cert with AUTHO
24,572,770 UART: RITY.KEYID = 7
26,277,787 UART: [art] Erasing AUTHORITY.KEYID = 7
26,279,298 UART: [art] PUB.X = 2B51A2E57C0039FB3623342597A18BECE239AFED15A5BF3DA33D3650EBAA390B6398DD85CD722AC3ED097237D6042639
26,286,509 UART: [art] PUB.Y = 64198FF7F02F89F9758319D7FF6705527131A38F035F52B2EF2292D0D788A1F2D35A4F86F165727A369FEEC4012AC7C2
26,293,805 UART: [art] SIG.R = DCA3D27862610612C8F059121A83B7F0ADE9844BFBD98D783D0F61B29C23BB8E0D1F672997775B24C488D6C0F8F89511
26,301,171 UART: [art] SIG.S = C72CE83AA8E88A59D05E6D2C419A86AD6E89A63FB0E9CE05CAE26074688C682398B429879A71D31D0C34369E015FC019
27,280,002 UART: Caliptra RT
27,280,720 UART: [state] CFI Enabled
27,398,492 UART: [rt] RT listening for mailbox commands...
27,400,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,835 UART: [rt]cmd =0x41544d4e, len=14344
31,141,121 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
85,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,493 UART: [kat] SHA2-256
881,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,539 UART: [kat] ++
885,691 UART: [kat] sha1
889,867 UART: [kat] SHA2-256
891,805 UART: [kat] SHA2-384
894,530 UART: [kat] SHA2-512-ACC
896,431 UART: [kat] ECC-384
902,084 UART: [kat] HMAC-384Kdf
906,652 UART: [kat] LMS
1,474,848 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,193 UART: [fht] Storing FHT @ 0x50003400
1,478,882 UART: [idev] ++
1,479,050 UART: [idev] CDI.KEYID = 6
1,479,410 UART: [idev] SUBJECT.KEYID = 7
1,479,834 UART: [idev] UDS.KEYID = 0
1,480,179 ready_for_fw is high
1,480,179 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,082 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,518 UART: [idev] --
1,514,473 UART: [ldev] ++
1,514,641 UART: [ldev] CDI.KEYID = 6
1,515,004 UART: [ldev] SUBJECT.KEYID = 5
1,515,430 UART: [ldev] AUTHORITY.KEYID = 7
1,515,893 UART: [ldev] FE.KEYID = 1
1,521,057 UART: [ldev] Erasing FE.KEYID = 1
1,547,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,306 UART: [ldev] --
1,586,603 UART: [fwproc] Waiting for Commands...
1,587,340 UART: [fwproc] Received command 0x46574c44
1,588,131 UART: [fwproc] Received Image of size 114360 bytes
5,158,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,186,980 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,332 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,352,155 >>> mbox cmd response: success
5,353,371 UART: [afmc] ++
5,353,539 UART: [afmc] CDI.KEYID = 6
5,353,901 UART: [afmc] SUBJECT.KEYID = 7
5,354,326 UART: [afmc] AUTHORITY.KEYID = 5
5,389,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,282 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,062 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,771 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,663 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,364 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,238 UART: [afmc] --
5,432,210 UART: [cold-reset] --
5,433,110 UART: [state] Locking Datavault
5,434,461 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,065 UART: [state] Locking ICCM
5,435,625 UART: [exit] Launching FMC @ 0x40000130
5,440,954 UART:
5,440,970 UART: Running Caliptra FMC ...
5,441,378 UART:
5,441,432 UART: [state] CFI Enabled
5,451,988 UART: [fht] FMC Alias Private Key: 7
5,559,460 UART: [art] Extend RT PCRs Done
5,559,888 UART: [art] Lock RT PCRs Done
5,561,416 UART: [art] Populate DV Done
5,569,570 UART: [fht] FMC Alias Private Key: 7
5,570,730 UART: [art] Derive CDI
5,571,010 UART: [art] Store in in slot 0x4
5,656,547 UART: [art] Derive Key Pair
5,656,907 UART: [art] Store priv key in slot 0x5
5,670,201 UART: [art] Derive Key Pair - Done
5,684,742 UART: [art] Signing Cert with AUTHO
5,685,222 UART: RITY.KEYID = 7
5,700,400 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,165 UART: [art] PUB.X = 823AFA164DBD93584CA783F6AE00372DED377F7B7700246F0E7D7C6317D748924FD1F3C38C350B152C5FF29C6E865B61
5,707,889 UART: [art] PUB.Y = 5427EB26809C913CACB51653CD662AABA9F2C42B2D339528C62D5CBACD93F1C788B4F00818BFC46D4DC97D5A536D0E68
5,714,847 UART: [art] SIG.R = 786D3C2BF63D49FA7779AD8240293DC78472FE517A6D590AB3D18200F31AB8D77F67077DF133F3B54ED037FF81C3C118
5,721,593 UART: [art] SIG.S = EB3B97E6048DD8A9C9831F5E5BEA9B5B61D84B967846B4865C3DEDFE5EE04656AA51281366F78BF7147B074D59E5BD5A
5,745,078 UART: Caliptra RT
5,745,332 UART: [state] CFI Enabled
5,853,872 UART: [rt] RT listening for mailbox commands...
5,854,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,059 UART: [rt]cmd =0x41544d4e, len=14344
6,892,577 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,003 ready_for_fw is high
1,363,003 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,354,535 >>> mbox cmd response: success
5,414,708 UART:
5,414,724 UART: Running Caliptra FMC ...
5,415,132 UART:
5,415,186 UART: [state] CFI Enabled
5,425,786 UART: [fht] FMC Alias Private Key: 7
5,533,458 UART: [art] Extend RT PCRs Done
5,533,886 UART: [art] Lock RT PCRs Done
5,535,560 UART: [art] Populate DV Done
5,543,790 UART: [fht] FMC Alias Private Key: 7
5,544,844 UART: [art] Derive CDI
5,545,124 UART: [art] Store in in slot 0x4
5,631,089 UART: [art] Derive Key Pair
5,631,449 UART: [art] Store priv key in slot 0x5
5,644,395 UART: [art] Derive Key Pair - Done
5,659,283 UART: [art] Signing Cert with AUTHO
5,659,763 UART: RITY.KEYID = 7
5,675,021 UART: [art] Erasing AUTHORITY.KEYID = 7
5,675,786 UART: [art] PUB.X = 34F61E64A3CCF4E5245E5C499670679356D301714746797B7B5FE8375F09A687FB8B31DA15B3CF9DDA5402D53BF47069
5,682,545 UART: [art] PUB.Y = 5B96140F7BF7BF40CA7D93F79E30481CBBCCB137C46CCD9E6B413300E269BDF6E7473B0A1E9244E0F4F7B06D7D1DCFA0
5,689,487 UART: [art] SIG.R = B3C5660128756D2036040A1A4C2D13B0A72A9D2CE82AA5A03921115FCBD4F1ED702E950A6B334045D9A29B76DE178CBA
5,696,251 UART: [art] SIG.S = D36CBC3DD558225452048A6C97B65043D2C393E1124F3803F2CC4FF0D57A505FF782D0DCD8880E7929C7E8C9B0B2E706
5,720,486 UART: Caliptra RT
5,720,740 UART: [state] CFI Enabled
5,828,943 UART: [rt] RT listening for mailbox commands...
5,829,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,952,380 UART: [rt]cmd =0x41544d4e, len=14344
6,877,398 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,699 UART: [kat] HMAC-384Kdf
907,291 UART: [kat] LMS
1,475,487 UART: [kat] --
1,476,426 UART: [cold-reset] ++
1,476,814 UART: [fht] Storing FHT @ 0x50003400
1,479,557 UART: [idev] ++
1,479,725 UART: [idev] CDI.KEYID = 6
1,480,085 UART: [idev] SUBJECT.KEYID = 7
1,480,509 UART: [idev] UDS.KEYID = 0
1,480,854 ready_for_fw is high
1,480,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,675 UART: [idev] Erasing UDS.KEYID = 0
1,504,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,657 UART: [idev] --
1,514,534 UART: [ldev] ++
1,514,702 UART: [ldev] CDI.KEYID = 6
1,515,065 UART: [ldev] SUBJECT.KEYID = 5
1,515,491 UART: [ldev] AUTHORITY.KEYID = 7
1,515,954 UART: [ldev] FE.KEYID = 1
1,521,346 UART: [ldev] Erasing FE.KEYID = 1
1,547,169 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,069 UART: [ldev] --
1,586,342 UART: [fwproc] Waiting for Commands...
1,586,999 UART: [fwproc] Received command 0x46574c44
1,587,790 UART: [fwproc] Received Image of size 114360 bytes
5,121,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,150,074 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,426 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,315,325 >>> mbox cmd response: success
5,316,567 UART: [afmc] ++
5,316,735 UART: [afmc] CDI.KEYID = 6
5,317,097 UART: [afmc] SUBJECT.KEYID = 7
5,317,522 UART: [afmc] AUTHORITY.KEYID = 5
5,353,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,370,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,370,790 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,376,499 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,382,391 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,388,092 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,396,164 UART: [afmc] --
5,397,156 UART: [cold-reset] --
5,397,976 UART: [state] Locking Datavault
5,398,933 UART: [state] Locking PCR0, PCR1 and PCR31
5,399,537 UART: [state] Locking ICCM
5,400,065 UART: [exit] Launching FMC @ 0x40000130
5,405,394 UART:
5,405,410 UART: Running Caliptra FMC ...
5,405,818 UART:
5,405,961 UART: [state] CFI Enabled
5,416,549 UART: [fht] FMC Alias Private Key: 7
5,524,193 UART: [art] Extend RT PCRs Done
5,524,621 UART: [art] Lock RT PCRs Done
5,525,997 UART: [art] Populate DV Done
5,534,053 UART: [fht] FMC Alias Private Key: 7
5,535,099 UART: [art] Derive CDI
5,535,379 UART: [art] Store in in slot 0x4
5,620,740 UART: [art] Derive Key Pair
5,621,100 UART: [art] Store priv key in slot 0x5
5,634,024 UART: [art] Derive Key Pair - Done
5,648,905 UART: [art] Signing Cert with AUTHO
5,649,385 UART: RITY.KEYID = 7
5,664,739 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,504 UART: [art] PUB.X = 9403924EB81272447273B75F5EAC9C0E2BAE3C38A3F77ABC5DB5F6F5D95E420A44484AD94544BF57269ED856D701177C
5,672,266 UART: [art] PUB.Y = B6598FC69700D7003611C8BB2B60129F21F6E28D781A912731C4D98DECABB0C5A75FF04E86B616B3A8EC1B219A33BEAA
5,679,184 UART: [art] SIG.R = 83897721C958C802FBD5430E8216D40ACCF14764D2E5A03EADFAE10D42A2EC4631317302F7DF39AEB99EE363ABBDEC57
5,685,953 UART: [art] SIG.S = 78DDA01AB840CBE1BB3D2DB6B612A5295DF3C30D779958D8FFB34F2F9C3F861266A95B8E57B9A1E853CA1E440E7502AE
5,710,379 UART: Caliptra RT
5,710,725 UART: [state] CFI Enabled
5,820,161 UART: [rt] RT listening for mailbox commands...
5,820,831 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,528 UART: [rt]cmd =0x41544d4e, len=14344
6,873,932 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,668 ready_for_fw is high
1,362,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,088,079 >>> mbox cmd response: success
5,149,354 UART:
5,149,370 UART: Running Caliptra FMC ...
5,149,778 UART:
5,149,921 UART: [state] CFI Enabled
5,160,653 UART: [fht] FMC Alias Private Key: 7
5,268,647 UART: [art] Extend RT PCRs Done
5,269,075 UART: [art] Lock RT PCRs Done
5,270,913 UART: [art] Populate DV Done
5,279,333 UART: [fht] FMC Alias Private Key: 7
5,280,485 UART: [art] Derive CDI
5,280,765 UART: [art] Store in in slot 0x4
5,366,620 UART: [art] Derive Key Pair
5,366,980 UART: [art] Store priv key in slot 0x5
5,380,186 UART: [art] Derive Key Pair - Done
5,394,576 UART: [art] Signing Cert with AUTHO
5,395,056 UART: RITY.KEYID = 7
5,410,744 UART: [art] Erasing AUTHORITY.KEYID = 7
5,411,509 UART: [art] PUB.X = 191928BE50FA2B9F0C410E24295EA70F64F61E0DFC1813064A6968AD72F5E09747BA18BB26605A3D16614AD95C3DBD32
5,418,268 UART: [art] PUB.Y = C5B2A0513BF126BDF5121B5057265305CCF5332F2F55C27FBF6CD2A5EB1EDC891220BA07BEFEEF59EBBE4F3F821741F4
5,425,232 UART: [art] SIG.R = EDA09F617DC773260CBDF5DA6C0C84055B673422D1BC2875216A029B94F01FC5CA8F5E9388C0EF75DF8B9D8D5AEB27D7
5,432,006 UART: [art] SIG.S = 1384E8355C5EB989EBCA6AA1EA7B9C47FAD54C3C7CD652EFC330523BA57F9035070FE273DE5D7A980C5513CCE996D689
5,456,014 UART: Caliptra RT
5,456,360 UART: [state] CFI Enabled
5,564,068 UART: [rt] RT listening for mailbox commands...
5,564,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,687,497 UART: [rt]cmd =0x41544d4e, len=14344
6,617,947 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
893,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,649 UART: [kat] ++
897,801 UART: [kat] sha1
901,941 UART: [kat] SHA2-256
903,881 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,040 UART: [idev] ++
1,175,208 UART: [idev] CDI.KEYID = 6
1,175,568 UART: [idev] SUBJECT.KEYID = 7
1,175,992 UART: [idev] UDS.KEYID = 0
1,176,337 ready_for_fw is high
1,176,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,986 UART: [idev] Erasing UDS.KEYID = 0
1,201,359 UART: [idev] Sha1 KeyId Algorithm
1,209,749 UART: [idev] --
1,210,977 UART: [ldev] ++
1,211,145 UART: [ldev] CDI.KEYID = 6
1,211,508 UART: [ldev] SUBJECT.KEYID = 5
1,211,934 UART: [ldev] AUTHORITY.KEYID = 7
1,212,397 UART: [ldev] FE.KEYID = 1
1,217,743 UART: [ldev] Erasing FE.KEYID = 1
1,244,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,079 UART: [ldev] --
1,283,452 UART: [fwproc] Wait for Commands...
1,284,074 UART: [fwproc] Recv command 0x46574c44
1,284,802 UART: [fwproc] Recv'd Img size: 114360 bytes
3,127,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,320,100 >>> mbox cmd response: success
3,321,172 UART: [afmc] ++
3,321,340 UART: [afmc] CDI.KEYID = 6
3,321,702 UART: [afmc] SUBJECT.KEYID = 7
3,322,127 UART: [afmc] AUTHORITY.KEYID = 5
3,357,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,596 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,305 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,197 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,908 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,717 UART: [afmc] --
3,400,673 UART: [cold-reset] --
3,401,503 UART: [state] Locking Datavault
3,402,834 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,438 UART: [state] Locking ICCM
3,403,916 UART: [exit] Launching FMC @ 0x40000130
3,409,245 UART:
3,409,261 UART: Running Caliptra FMC ...
3,409,669 UART:
3,409,723 UART: [state] CFI Enabled
3,419,827 UART: [fht] FMC Alias Private Key: 7
3,527,215 UART: [art] Extend RT PCRs Done
3,527,643 UART: [art] Lock RT PCRs Done
3,529,139 UART: [art] Populate DV Done
3,537,449 UART: [fht] FMC Alias Private Key: 7
3,538,617 UART: [art] Derive CDI
3,538,897 UART: [art] Store in in slot 0x4
3,624,314 UART: [art] Derive Key Pair
3,624,674 UART: [art] Store priv key in slot 0x5
3,637,464 UART: [art] Derive Key Pair - Done
3,652,180 UART: [art] Signing Cert with AUTHO
3,652,660 UART: RITY.KEYID = 7
3,667,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,547 UART: [art] PUB.X = 2788023896323FC9F76859499412743D93F3A21BD0A116196B9A3C6FC62158C8167A510B142EF526A4EC38C1141A102A
3,675,299 UART: [art] PUB.Y = DC658E060B3D08B7C7EC8A466536815A071DDBF8AC662B4D6CE70253F23ADD046E526B2A3F938D4975EC3CBBAE905DA8
3,682,247 UART: [art] SIG.R = 2E8727BF177D20D2BB1573951FAAD7320804250AB60FAA88A2C16B71C6242907993446479632CD2D002E7FCD2C1C37C1
3,688,978 UART: [art] SIG.S = 3E2BFA12484A533E1703B67C7B7E01D0DB16A82FA58485049D96170E0B6720C21B9ACFF1126362BD02E5864013BA5687
3,712,973 UART: Caliptra RT
3,713,227 UART: [state] CFI Enabled
3,820,525 UART: [rt] RT listening for mailbox commands...
3,821,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,848 UART: [rt]cmd =0x41544d4e, len=14344
4,862,197 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,159 ready_for_fw is high
1,060,159 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,180,611 >>> mbox cmd response: success
3,241,670 UART:
3,241,686 UART: Running Caliptra FMC ...
3,242,094 UART:
3,242,148 UART: [state] CFI Enabled
3,252,648 UART: [fht] FMC Alias Private Key: 7
3,360,260 UART: [art] Extend RT PCRs Done
3,360,688 UART: [art] Lock RT PCRs Done
3,362,486 UART: [art] Populate DV Done
3,370,300 UART: [fht] FMC Alias Private Key: 7
3,371,230 UART: [art] Derive CDI
3,371,510 UART: [art] Store in in slot 0x4
3,457,319 UART: [art] Derive Key Pair
3,457,679 UART: [art] Store priv key in slot 0x5
3,470,639 UART: [art] Derive Key Pair - Done
3,485,242 UART: [art] Signing Cert with AUTHO
3,485,722 UART: RITY.KEYID = 7
3,500,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,575 UART: [art] PUB.X = 979509A4880915C09DB29941C92EEA21B6D14864DE7DA7221997EA8CB9CCA2DC0D599C373EF506F9545BCE17E03D8A89
3,508,339 UART: [art] PUB.Y = CE3FA9F2300AAC706553491A0C9607D269F5FB5F07AE96D4FD5777FA76633269A50328F4419F142BD23C774BF8F4EEC2
3,515,280 UART: [art] SIG.R = 1D6DC947EB98FF57968E55B7525B85D486AEEBEC13455BCD29F22200E31FF8C52986520ABF761AFDF2F9F97CB9A0C94C
3,522,041 UART: [art] SIG.S = B155BFB7002ABB8F8CF1D593A879BBADBF38F23EB9D75F0ABD634FF5A2713227C19D920736903F71E3069AC23EFE7AB5
3,545,285 UART: Caliptra RT
3,545,539 UART: [state] CFI Enabled
3,653,114 UART: [rt] RT listening for mailbox commands...
3,653,784 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,423 UART: [rt]cmd =0x41544d4e, len=14344
4,687,403 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,556 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,779 UART: [idev] ++
1,175,947 UART: [idev] CDI.KEYID = 6
1,176,307 UART: [idev] SUBJECT.KEYID = 7
1,176,731 UART: [idev] UDS.KEYID = 0
1,177,076 ready_for_fw is high
1,177,076 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,513 UART: [idev] Erasing UDS.KEYID = 0
1,201,322 UART: [idev] Sha1 KeyId Algorithm
1,209,930 UART: [idev] --
1,210,978 UART: [ldev] ++
1,211,146 UART: [ldev] CDI.KEYID = 6
1,211,509 UART: [ldev] SUBJECT.KEYID = 5
1,211,935 UART: [ldev] AUTHORITY.KEYID = 7
1,212,398 UART: [ldev] FE.KEYID = 1
1,217,782 UART: [ldev] Erasing FE.KEYID = 1
1,244,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,148 UART: [ldev] --
1,283,541 UART: [fwproc] Wait for Commands...
1,284,203 UART: [fwproc] Recv command 0x46574c44
1,284,931 UART: [fwproc] Recv'd Img size: 114360 bytes
3,116,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,310,167 >>> mbox cmd response: success
3,311,197 UART: [afmc] ++
3,311,365 UART: [afmc] CDI.KEYID = 6
3,311,727 UART: [afmc] SUBJECT.KEYID = 7
3,312,152 UART: [afmc] AUTHORITY.KEYID = 5
3,348,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,165 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,874 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,766 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,477 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,446 UART: [afmc] --
3,391,478 UART: [cold-reset] --
3,392,288 UART: [state] Locking Datavault
3,393,591 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,195 UART: [state] Locking ICCM
3,394,719 UART: [exit] Launching FMC @ 0x40000130
3,400,048 UART:
3,400,064 UART: Running Caliptra FMC ...
3,400,472 UART:
3,400,615 UART: [state] CFI Enabled
3,411,577 UART: [fht] FMC Alias Private Key: 7
3,519,653 UART: [art] Extend RT PCRs Done
3,520,081 UART: [art] Lock RT PCRs Done
3,521,787 UART: [art] Populate DV Done
3,530,097 UART: [fht] FMC Alias Private Key: 7
3,531,069 UART: [art] Derive CDI
3,531,349 UART: [art] Store in in slot 0x4
3,617,146 UART: [art] Derive Key Pair
3,617,506 UART: [art] Store priv key in slot 0x5
3,630,794 UART: [art] Derive Key Pair - Done
3,645,468 UART: [art] Signing Cert with AUTHO
3,645,948 UART: RITY.KEYID = 7
3,661,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,209 UART: [art] PUB.X = 22FC8C275C1CEE3190428AA463183F3DAD9F1B1386D5D016B8F86C76A4CD0973906E73B75AFD0F918D05D901445BF6B1
3,668,973 UART: [art] PUB.Y = 236264203853D17231547103CEF9CDCE99ED6DEAF59E86D92334C5E46747BBA0ECB3D6B7A3861CB0ADEB5FED845630B2
3,675,932 UART: [art] SIG.R = 08CBDDEECD1CC2894C6FF69C466F4763755A0467BEC48C1AE05BECCB955D9C8BCFB6B7AEE6928E9060BA78B8E8096B87
3,682,717 UART: [art] SIG.S = 2F6263BDC3AFAB15590ED50D558BF3A3B5006097E8AFC756213FEA9110670F9CFA3ED01597781B049A5C6B2125BF0D9F
3,706,281 UART: Caliptra RT
3,706,627 UART: [state] CFI Enabled
3,814,761 UART: [rt] RT listening for mailbox commands...
3,815,431 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,008 UART: [rt]cmd =0x41544d4e, len=14344
4,851,099 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 ready_for_fw is high
1,060,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,656 >>> mbox cmd response: success
3,235,135 UART:
3,235,151 UART: Running Caliptra FMC ...
3,235,559 UART:
3,235,702 UART: [state] CFI Enabled
3,246,446 UART: [fht] FMC Alias Private Key: 7
3,354,060 UART: [art] Extend RT PCRs Done
3,354,488 UART: [art] Lock RT PCRs Done
3,356,000 UART: [art] Populate DV Done
3,364,424 UART: [fht] FMC Alias Private Key: 7
3,365,470 UART: [art] Derive CDI
3,365,750 UART: [art] Store in in slot 0x4
3,451,399 UART: [art] Derive Key Pair
3,451,759 UART: [art] Store priv key in slot 0x5
3,464,891 UART: [art] Derive Key Pair - Done
3,479,621 UART: [art] Signing Cert with AUTHO
3,480,101 UART: RITY.KEYID = 7
3,495,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,166 UART: [art] PUB.X = 9E7A275744C5C1AD241191767F89031170B5438A34EE7F3549956D8B4BCBAF2A0E6AA6399F55CA9CB1F95F12E938DA66
3,502,934 UART: [art] PUB.Y = B570FF8082EFFDA9CC79F8BAC12C40806EBABE17C35E59CB326A7681327ABC107ED6EEC7A64C08E92F75EEE7B89EF368
3,509,905 UART: [art] SIG.R = D47431B7EBEE57C4B58B126C07B640FA49E0D4D21B58491FC025FD431B4E1F56B4BF045F72E94071421EC5630F828F85
3,516,670 UART: [art] SIG.S = 2DFB5542869CCAC86907141B4AB2782156A5B63310E05DBEBAF913315BB0F1B28D50090CA1AFC7EA99C48972BFE770BB
3,540,454 UART: Caliptra RT
3,540,800 UART: [state] CFI Enabled
3,648,609 UART: [rt] RT listening for mailbox commands...
3,649,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,952 UART: [rt]cmd =0x41544d4e, len=14344
4,692,022 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,017 UART: [kat] ++
895,169 UART: [kat] sha1
899,187 UART: [kat] SHA2-256
901,127 UART: [kat] SHA2-384
903,788 UART: [kat] SHA2-512-ACC
905,689 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
919,976 UART: [kat] LMS
1,168,288 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,687 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,173,867 ready_for_fw is high
1,173,867 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,231 UART: [idev] Erasing UDS.KEYID = 0
1,197,823 UART: [idev] Sha1 KeyId Algorithm
1,206,799 UART: [idev] --
1,207,930 UART: [ldev] ++
1,208,098 UART: [ldev] CDI.KEYID = 6
1,208,462 UART: [ldev] SUBJECT.KEYID = 5
1,208,889 UART: [ldev] AUTHORITY.KEYID = 7
1,209,352 UART: [ldev] FE.KEYID = 1
1,214,456 UART: [ldev] Erasing FE.KEYID = 1
1,240,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,254 UART: [ldev] --
1,279,626 UART: [fwproc] Wait for Commands...
1,280,295 UART: [fwproc] Recv command 0x46574c44
1,281,028 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,310,997 >>> mbox cmd response: success
3,312,028 UART: [afmc] ++
3,312,196 UART: [afmc] CDI.KEYID = 6
3,312,559 UART: [afmc] SUBJECT.KEYID = 7
3,312,985 UART: [afmc] AUTHORITY.KEYID = 5
3,348,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,798 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,508 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,398 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,109 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,987 UART: [afmc] --
3,392,067 UART: [cold-reset] --
3,393,161 UART: [state] Locking Datavault
3,394,334 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,938 UART: [state] Locking ICCM
3,395,422 UART: [exit] Launching FMC @ 0x40000130
3,400,751 UART:
3,400,767 UART: Running Caliptra FMC ...
3,401,175 UART:
3,401,229 UART: [state] CFI Enabled
3,411,495 UART: [fht] FMC Alias Private Key: 7
3,519,409 UART: [art] Extend RT PCRs Done
3,519,837 UART: [art] Lock RT PCRs Done
3,521,409 UART: [art] Populate DV Done
3,529,621 UART: [fht] FMC Alias Private Key: 7
3,530,695 UART: [art] Derive CDI
3,530,975 UART: [art] Store in in slot 0x4
3,616,848 UART: [art] Derive Key Pair
3,617,208 UART: [art] Store priv key in slot 0x5
3,630,716 UART: [art] Derive Key Pair - Done
3,645,516 UART: [art] Signing Cert with AUTHO
3,645,996 UART: RITY.KEYID = 7
3,661,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,177 UART: [art] PUB.X = F5B210AB0FA5D14B3619FC4676CA4C5151392C6F48381A5B24C052654C25E95E0EA68B6EA026C7A9B07AE4048B32311B
3,668,942 UART: [art] PUB.Y = 89E2952F16CF160FC375A20547DACCEABFFACB512942922DB7F27D80CCAE9C4C915F538038D8B77DF1F1DBC7130B4A26
3,675,901 UART: [art] SIG.R = 16753081F69ECB0BB0BF749EAF76E03DD080040FBDEC15E7DACBD4CA05A8DFB03FAABDB3FB8BCB88E1E0F2207A18977A
3,682,691 UART: [art] SIG.S = FB7AA4117C7B037EBF1F4A80A134F90C1292A36AAD0DEABD56211E6861066D009080490C8DC07B16AEDC36625A3180CD
3,706,067 UART: Caliptra RT
3,706,321 UART: [state] CFI Enabled
3,814,840 UART: [rt] RT listening for mailbox commands...
3,815,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,005 UART: [rt]cmd =0x41544d4e, len=14344
4,871,010 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,760 ready_for_fw is high
1,055,760 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,171,437 >>> mbox cmd response: success
3,232,862 UART:
3,232,878 UART: Running Caliptra FMC ...
3,233,286 UART:
3,233,340 UART: [state] CFI Enabled
3,243,538 UART: [fht] FMC Alias Private Key: 7
3,351,378 UART: [art] Extend RT PCRs Done
3,351,806 UART: [art] Lock RT PCRs Done
3,353,728 UART: [art] Populate DV Done
3,361,864 UART: [fht] FMC Alias Private Key: 7
3,362,932 UART: [art] Derive CDI
3,363,212 UART: [art] Store in in slot 0x4
3,449,235 UART: [art] Derive Key Pair
3,449,595 UART: [art] Store priv key in slot 0x5
3,462,643 UART: [art] Derive Key Pair - Done
3,477,199 UART: [art] Signing Cert with AUTHO
3,477,679 UART: RITY.KEYID = 7
3,492,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,256 UART: [art] PUB.X = 0C0157D96E0ED1E791FA907E69009759DEF1851A263FD209CD5029A56FB99509DC34DBE41D61466A1D480E08B39F7AB2
3,499,987 UART: [art] PUB.Y = AF97767B55088A9B646348DF9C1D42267979309E8760618EEBA5B0FB3455E76511BB3D6DFAE7C6DCC500CDD1B2768E2F
3,506,920 UART: [art] SIG.R = EF8A7DE7189018BB17B9C1936CC21129C93BAC328BE2B8797AF2DEDAB1F71D51885997F857B82118377320370BCCD7FC
3,513,695 UART: [art] SIG.S = F7D788E07262B1DF982410C5CF44E130B6594DFCC9261ADE8DD632D9AC4D53F45F389B4A88086A9AB5BFD26A7492767B
3,537,775 UART: Caliptra RT
3,538,029 UART: [state] CFI Enabled
3,645,369 UART: [rt] RT listening for mailbox commands...
3,646,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,606 UART: [rt]cmd =0x41544d4e, len=14344
4,689,220 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,907 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,500 UART: [idev] ++
1,173,668 UART: [idev] CDI.KEYID = 6
1,174,029 UART: [idev] SUBJECT.KEYID = 7
1,174,454 UART: [idev] UDS.KEYID = 0
1,174,800 ready_for_fw is high
1,174,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,768 UART: [idev] Erasing UDS.KEYID = 0
1,199,986 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,763 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,609 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,037 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,310,659 >>> mbox cmd response: success
3,311,674 UART: [afmc] ++
3,311,842 UART: [afmc] CDI.KEYID = 6
3,312,205 UART: [afmc] SUBJECT.KEYID = 7
3,312,631 UART: [afmc] AUTHORITY.KEYID = 5
3,348,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,086 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,796 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,686 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,397 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,397 UART: [afmc] --
3,392,457 UART: [cold-reset] --
3,393,461 UART: [state] Locking Datavault
3,394,762 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,366 UART: [state] Locking ICCM
3,395,802 UART: [exit] Launching FMC @ 0x40000130
3,401,131 UART:
3,401,147 UART: Running Caliptra FMC ...
3,401,555 UART:
3,401,698 UART: [state] CFI Enabled
3,412,060 UART: [fht] FMC Alias Private Key: 7
3,520,464 UART: [art] Extend RT PCRs Done
3,520,892 UART: [art] Lock RT PCRs Done
3,522,114 UART: [art] Populate DV Done
3,530,376 UART: [fht] FMC Alias Private Key: 7
3,531,336 UART: [art] Derive CDI
3,531,616 UART: [art] Store in in slot 0x4
3,617,119 UART: [art] Derive Key Pair
3,617,479 UART: [art] Store priv key in slot 0x5
3,630,369 UART: [art] Derive Key Pair - Done
3,645,369 UART: [art] Signing Cert with AUTHO
3,645,849 UART: RITY.KEYID = 7
3,660,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,444 UART: [art] PUB.X = 6A9805D9AA4D45E3D0906CDFD954F68C3CA00D9221E221B3E628B86EBC343B7307020A8709DD25F971FF1AFB5B3C0261
3,668,201 UART: [art] PUB.Y = B3543E36F88851809F75438D697DF2DC2F6FD9D88E3EA0B7693D2499F3FC1F5706F1F90C0343D58551E1A21F1F49C728
3,675,142 UART: [art] SIG.R = 6954365B9FEDD431C7A518EED0911524F23249A81B2651F6A155BFAFC642B052F32ABA4A9D8AE7622573397B90F3484B
3,681,914 UART: [art] SIG.S = EBD3B78D93715FD68781B1081C2EA45FC36DF889D76BD482A16D94DA77FDCF1C81C10AC515ACDE562B997E9DE971ED96
3,705,617 UART: Caliptra RT
3,705,963 UART: [state] CFI Enabled
3,814,458 UART: [rt] RT listening for mailbox commands...
3,815,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,845 UART: [rt]cmd =0x41544d4e, len=14344
4,855,508 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,777 ready_for_fw is high
1,056,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,529 >>> mbox cmd response: success
3,237,660 UART:
3,237,676 UART: Running Caliptra FMC ...
3,238,084 UART:
3,238,227 UART: [state] CFI Enabled
3,248,917 UART: [fht] FMC Alias Private Key: 7
3,356,723 UART: [art] Extend RT PCRs Done
3,357,151 UART: [art] Lock RT PCRs Done
3,358,579 UART: [art] Populate DV Done
3,366,563 UART: [fht] FMC Alias Private Key: 7
3,367,713 UART: [art] Derive CDI
3,367,993 UART: [art] Store in in slot 0x4
3,453,192 UART: [art] Derive Key Pair
3,453,552 UART: [art] Store priv key in slot 0x5
3,466,452 UART: [art] Derive Key Pair - Done
3,481,212 UART: [art] Signing Cert with AUTHO
3,481,692 UART: RITY.KEYID = 7
3,497,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,931 UART: [art] PUB.X = D5D75B535B7002F4FB468E4F1E2C2BA985B85367E998AA323E54E3BA391C0F371D47678B7DAE870D371C6457ED7A83AB
3,504,700 UART: [art] PUB.Y = 46E5D13DFC5C1F5A00A6592FC5DD3969E1D18A1E5ADEB6C613EE44E82C87B4E38A534FC0E62C51B0235D08DF9DEEE9B7
3,511,647 UART: [art] SIG.R = E684F7319CBCC04F5E4E8EB76E71EA4299247C55CD6993BE287B2F6107AF118F1AC9827E0414433F9595146465DFCF25
3,518,413 UART: [art] SIG.S = 246E27B0337C054A3047146C1CF200B4ECD40941ACB771E265020007E507C11664FB14490832C7A838AE1C73CE0F37DA
3,542,355 UART: Caliptra RT
3,542,701 UART: [state] CFI Enabled
3,650,458 UART: [rt] RT listening for mailbox commands...
3,651,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,043 UART: [rt]cmd =0x41544d4e, len=14344
4,696,592 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,418 UART:
192,905 UART: Running Caliptra ROM ...
194,054 UART:
194,205 UART: [state] CFI Enabled
265,487 UART: [state] LifecycleState = Unprovisioned
267,474 UART: [state] DebugLocked = No
269,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,723 UART: [kat] SHA2-256
443,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,941 UART: [kat] ++
454,389 UART: [kat] sha1
465,113 UART: [kat] SHA2-256
467,847 UART: [kat] SHA2-384
473,478 UART: [kat] SHA2-512-ACC
475,847 UART: [kat] ECC-384
2,767,413 UART: [kat] HMAC-384Kdf
2,798,841 UART: [kat] LMS
3,989,165 UART: [kat] --
3,993,115 UART: [cold-reset] ++
3,994,985 UART: [fht] Storing FHT @ 0x50003400
4,006,033 UART: [idev] ++
4,006,597 UART: [idev] CDI.KEYID = 6
4,007,505 UART: [idev] SUBJECT.KEYID = 7
4,008,744 UART: [idev] UDS.KEYID = 0
4,009,824 ready_for_fw is high
4,010,039 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,153,540 UART: [idev] Erasing UDS.KEYID = 0
7,346,082 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,098 UART: [idev] --
7,370,224 UART: [ldev] ++
7,370,797 UART: [ldev] CDI.KEYID = 6
7,371,759 UART: [ldev] SUBJECT.KEYID = 5
7,372,964 UART: [ldev] AUTHORITY.KEYID = 7
7,374,245 UART: [ldev] FE.KEYID = 1
7,422,584 UART: [ldev] Erasing FE.KEYID = 1
10,756,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,879 UART: [ldev] --
13,114,056 UART: [fwproc] Waiting for Commands...
13,115,769 UART: [fwproc] Received command 0x46574c44
13,117,952 UART: [fwproc] Received Image of size 114036 bytes
22,075,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,161,003 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,229,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,546,575 >>> mbox cmd response: success
22,550,772 UART: [afmc] ++
22,551,361 UART: [afmc] CDI.KEYID = 6
22,552,323 UART: [afmc] SUBJECT.KEYID = 7
22,553,532 UART: [afmc] AUTHORITY.KEYID = 5
25,917,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,216,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,218,986 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,233,547 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,248,284 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,262,547 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,282,927 UART: [afmc] --
28,287,119 UART: [cold-reset] --
28,292,455 UART: [state] Locking Datavault
28,297,488 UART: [state] Locking PCR0, PCR1 and PCR31
28,299,244 UART: [state] Locking ICCM
28,300,791 UART: [exit] Launching FMC @ 0x40000130
28,309,183 UART:
28,309,414 UART: Running Caliptra FMC ...
28,310,507 UART:
28,310,656 UART: [state] CFI Enabled
28,374,228 UART: [fht] FMC Alias Private Key: 7
30,712,306 UART: [art] Extend RT PCRs Done
30,713,527 UART: [art] Lock RT PCRs Done
30,715,008 UART: [art] Populate DV Done
30,720,532 UART: [fht] FMC Alias Private Key: 7
30,722,012 UART: [art] Derive CDI
30,722,770 UART: [art] Store in in slot 0x4
30,782,836 UART: [art] Derive Key Pair
30,783,890 UART: [art] Store priv key in slot 0x5
34,076,941 UART: [art] Derive Key Pair - Done
34,089,669 UART: [art] Signing Cert with AUTHO
34,090,973 UART: RITY.KEYID = 7
36,378,924 UART: [art] Erasing AUTHORITY.KEYID = 7
36,380,426 UART: [art] PUB.X = 5A2BED8B27ED77826DEF054CEA747A75B1CFB2657C571A362AE7BF23F0BC73369855D43994E17424CD926E467EE1CE5F
36,387,658 UART: [art] PUB.Y = FA2B97CCD832DAF0FE80B9D8E0F889ED85C5752D69093EE21BB41C7A1417F2C563CD2CDD1455CAF9579322F105F2454C
36,394,915 UART: [art] SIG.R = 94BEA1F100146BF065C8953A632CD8FE190A2C3D0247B2A5912CD73D671922EB8C106B05F39737997CCEA7A60FAE25B6
36,402,269 UART: [art] SIG.S = 34D72752855E50D9877946DFBAA636A162D6456F0593AA981A97BD6A9889FDFE8CB21BEBEE4660573500D38422849500
37,706,960 UART: Caliptra RT
37,707,650 UART: [state] CFI Enabled
37,870,322 UART: [rt] RT listening for mailbox commands...
37,872,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,027,847 UART: [rt]cmd =0x41544d4e, len=14344
45,662,130 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
3,783,717 ready_for_fw is high
3,784,106 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,886,173 >>> mbox cmd response: success
27,574,110 UART:
27,574,499 UART: Running Caliptra FMC ...
27,575,682 UART:
27,575,848 UART: [state] CFI Enabled
27,643,660 UART: [fht] FMC Alias Private Key: 7
29,982,034 UART: [art] Extend RT PCRs Done
29,983,254 UART: [art] Lock RT PCRs Done
29,984,929 UART: [art] Populate DV Done
29,990,415 UART: [fht] FMC Alias Private Key: 7
29,992,120 UART: [art] Derive CDI
29,992,928 UART: [art] Store in in slot 0x4
30,052,508 UART: [art] Derive Key Pair
30,053,522 UART: [art] Store priv key in slot 0x5
33,346,169 UART: [art] Derive Key Pair - Done
33,358,913 UART: [art] Signing Cert with AUTHO
33,360,240 UART: RITY.KEYID = 7
35,648,623 UART: [art] Erasing AUTHORITY.KEYID = 7
35,650,130 UART: [art] PUB.X = 9AAA8624AB8AA9A36F51B88E868D0F50F24D22DFAA98BA075D890308C4E2468260F7F1017B1892EE8109E919EE5E3B2A
35,657,351 UART: [art] PUB.Y = 94E292597B262779CEA41D9C676169EAD02144A2A0B3E60DCDABE9ED49563996F47E18A38911FC40BF61A7B9ABE038D3
35,664,580 UART: [art] SIG.R = 17F260065952FDDCC6CD118C8664BB99325F3F0219017E8A7423F27158B6C5F0A55ACC26CD12CBAB8EAC52A4E4A93807
35,672,006 UART: [art] SIG.S = 6718AEE5D34D20FB2958FFAD44516E05A222ECDB9B9C5E880DDD7EA3236020B9CB1D5FB271D04B4457DE5F372A999385
36,976,984 UART: Caliptra RT
36,977,694 UART: [state] CFI Enabled
37,139,944 UART: [rt] RT listening for mailbox commands...
37,142,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,297,760 UART: [rt]cmd =0x41544d4e, len=14344
44,854,491 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,516 UART:
192,885 UART: Running Caliptra ROM ...
194,010 UART:
603,745 UART: [state] CFI Enabled
616,572 UART: [state] LifecycleState = Unprovisioned
618,549 UART: [state] DebugLocked = No
620,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,150 UART: [kat] SHA2-256
794,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,397 UART: [kat] ++
806,021 UART: [kat] sha1
817,331 UART: [kat] SHA2-256
820,048 UART: [kat] SHA2-384
826,111 UART: [kat] SHA2-512-ACC
828,476 UART: [kat] ECC-384
3,114,600 UART: [kat] HMAC-384Kdf
3,126,686 UART: [kat] LMS
4,316,802 UART: [kat] --
4,320,967 UART: [cold-reset] ++
4,323,113 UART: [fht] Storing FHT @ 0x50003400
4,332,887 UART: [idev] ++
4,333,518 UART: [idev] CDI.KEYID = 6
4,334,426 UART: [idev] SUBJECT.KEYID = 7
4,335,664 UART: [idev] UDS.KEYID = 0
4,336,725 ready_for_fw is high
4,336,928 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,163 UART: [idev] Erasing UDS.KEYID = 0
7,622,112 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,776 UART: [idev] --
7,647,921 UART: [ldev] ++
7,648,499 UART: [ldev] CDI.KEYID = 6
7,649,463 UART: [ldev] SUBJECT.KEYID = 5
7,650,671 UART: [ldev] AUTHORITY.KEYID = 7
7,651,898 UART: [ldev] FE.KEYID = 1
7,662,271 UART: [ldev] Erasing FE.KEYID = 1
10,954,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,607 UART: [ldev] --
13,315,052 UART: [fwproc] Waiting for Commands...
13,317,760 UART: [fwproc] Received command 0x46574c44
13,319,949 UART: [fwproc] Received Image of size 114036 bytes
22,191,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,263,996 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,332,895 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,649,953 >>> mbox cmd response: success
22,654,425 UART: [afmc] ++
22,655,020 UART: [afmc] CDI.KEYID = 6
22,655,932 UART: [afmc] SUBJECT.KEYID = 7
22,657,148 UART: [afmc] AUTHORITY.KEYID = 5
25,969,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,267,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,269,996 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,284,546 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,299,324 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,313,546 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,335,813 UART: [afmc] --
28,339,578 UART: [cold-reset] --
28,345,113 UART: [state] Locking Datavault
28,350,843 UART: [state] Locking PCR0, PCR1 and PCR31
28,352,543 UART: [state] Locking ICCM
28,354,692 UART: [exit] Launching FMC @ 0x40000130
28,363,095 UART:
28,363,330 UART: Running Caliptra FMC ...
28,364,427 UART:
28,364,604 UART: [state] CFI Enabled
28,372,863 UART: [fht] FMC Alias Private Key: 7
30,703,253 UART: [art] Extend RT PCRs Done
30,704,466 UART: [art] Lock RT PCRs Done
30,705,985 UART: [art] Populate DV Done
30,711,561 UART: [fht] FMC Alias Private Key: 7
30,713,259 UART: [art] Derive CDI
30,714,014 UART: [art] Store in in slot 0x4
30,756,562 UART: [art] Derive Key Pair
30,757,560 UART: [art] Store priv key in slot 0x5
33,999,254 UART: [art] Derive Key Pair - Done
34,012,413 UART: [art] Signing Cert with AUTHO
34,013,717 UART: RITY.KEYID = 7
36,293,474 UART: [art] Erasing AUTHORITY.KEYID = 7
36,294,974 UART: [art] PUB.X = 17857C600975E8FD8A022FD7927CCAABF618C11B7F23ED054C227EAAA738DB08FDD3025D9907543169B363FF8F6B47CF
36,302,207 UART: [art] PUB.Y = 4787E0217BA90FA7A30FB67CA3F90E282AD0166539691D656060688EE47221AAD80F7DFBFF4B4F14793CE9585ACEB1F4
36,309,473 UART: [art] SIG.R = 54B62EDA9A3945CF1ADB7089C5CAF5D85A7D6F7BA2F3D0296A760818AE13D18FD1EBB8244A46B42FEA5F02F8D2A56733
36,316,896 UART: [art] SIG.S = 9F88F05806B9D80A0C94C4A26A5FCF8C6C77B538E98A6D8C38B4978DB63B1CDA5676B807F7BE1E5BD627E9C662365624
37,621,598 UART: Caliptra RT
37,622,307 UART: [state] CFI Enabled
37,740,786 UART: [rt] RT listening for mailbox commands...
37,743,114 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,898,410 UART: [rt]cmd =0x41544d4e, len=14344
45,429,264 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,129,872 ready_for_fw is high
4,130,289 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,607,927 >>> mbox cmd response: success
28,250,950 UART:
28,251,350 UART: Running Caliptra FMC ...
28,252,477 UART:
28,252,634 UART: [state] CFI Enabled
28,260,524 UART: [fht] FMC Alias Private Key: 7
30,591,387 UART: [art] Extend RT PCRs Done
30,592,632 UART: [art] Lock RT PCRs Done
30,594,378 UART: [art] Populate DV Done
30,599,854 UART: [fht] FMC Alias Private Key: 7
30,601,549 UART: [art] Derive CDI
30,602,376 UART: [art] Store in in slot 0x4
30,645,251 UART: [art] Derive Key Pair
30,646,250 UART: [art] Store priv key in slot 0x5
33,888,673 UART: [art] Derive Key Pair - Done
33,901,358 UART: [art] Signing Cert with AUTHO
33,902,666 UART: RITY.KEYID = 7
36,181,742 UART: [art] Erasing AUTHORITY.KEYID = 7
36,183,249 UART: [art] PUB.X = ECA41E39A3899C96302D9C3EB994220B5BD63244A9A7872F403B58529CCEB48F365E930021B65FE50C2A0593FAE835B2
36,190,481 UART: [art] PUB.Y = BC1E85D9005A5EDC0960D20A960F205C40DC6D1CEC99A7D6F4BB32C588012A94CACE2A7BF20C04E606D4833218B45E6A
36,197,721 UART: [art] SIG.R = 80D7B96ECD11BED3D2FC749DF6F6153B2D5002AD3C2B6D73391C7A22C901B5F3CB52750EEF28DB763D63F54B1FC646D9
36,205,189 UART: [art] SIG.S = 23CFD9E1BF7F0606CE77AD7AE3F7219E235CB3122BE993075E2565BB0020D563FE21668BA1094715649672981ACC30A7
37,509,730 UART: Caliptra RT
37,510,453 UART: [state] CFI Enabled
37,627,631 UART: [rt] RT listening for mailbox commands...
37,630,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,785,494 UART: [rt]cmd =0x41544d4e, len=14344
45,212,400 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,385 writing to cptra_bootfsm_go
193,652 UART:
194,019 UART: Running Caliptra ROM ...
195,216 UART:
195,363 UART: [state] CFI Enabled
262,079 UART: [state] LifecycleState = Unprovisioned
263,942 UART: [state] DebugLocked = No
265,478 UART: [state] WD Timer not started. Device not locked for debugging
268,882 UART: [kat] SHA2-256
447,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,590 UART: [kat] ++
460,124 UART: [kat] sha1
470,717 UART: [kat] SHA2-256
473,755 UART: [kat] SHA2-384
480,813 UART: [kat] SHA2-512-ACC
483,747 UART: [kat] ECC-384
2,948,986 UART: [kat] HMAC-384Kdf
2,971,256 UART: [kat] LMS
3,500,687 UART: [kat] --
3,505,894 UART: [cold-reset] ++
3,506,838 UART: [fht] FHT @ 0x50003400
3,516,822 UART: [idev] ++
3,517,388 UART: [idev] CDI.KEYID = 6
3,518,299 UART: [idev] SUBJECT.KEYID = 7
3,519,470 UART: [idev] UDS.KEYID = 0
3,520,517 ready_for_fw is high
3,520,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,686 UART: [idev] Erasing UDS.KEYID = 0
6,025,081 UART: [idev] Sha1 KeyId Algorithm
6,046,708 UART: [idev] --
6,050,288 UART: [ldev] ++
6,050,874 UART: [ldev] CDI.KEYID = 6
6,051,786 UART: [ldev] SUBJECT.KEYID = 5
6,052,944 UART: [ldev] AUTHORITY.KEYID = 7
6,054,227 UART: [ldev] FE.KEYID = 1
6,101,168 UART: [ldev] Erasing FE.KEYID = 1
8,602,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,239 UART: [ldev] --
10,415,339 UART: [fwproc] Wait for Commands...
10,417,432 UART: [fwproc] Recv command 0x46574c44
10,419,468 UART: [fwproc] Recv'd Img size: 114360 bytes
15,006,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,084,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,153,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,471,666 >>> mbox cmd response: success
15,475,085 UART: [afmc] ++
15,475,686 UART: [afmc] CDI.KEYID = 6
15,476,597 UART: [afmc] SUBJECT.KEYID = 7
15,477,813 UART: [afmc] AUTHORITY.KEYID = 5
17,999,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,724,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,726,191 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,742,180 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,758,120 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,773,876 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,796,619 UART: [afmc] --
19,799,616 UART: [cold-reset] --
19,803,713 UART: [state] Locking Datavault
19,808,486 UART: [state] Locking PCR0, PCR1 and PCR31
19,810,175 UART: [state] Locking ICCM
19,812,224 UART: [exit] Launching FMC @ 0x40000130
19,820,679 UART:
19,820,915 UART: Running Caliptra FMC ...
19,822,013 UART:
19,822,177 UART: [state] CFI Enabled
19,883,293 UART: [fht] FMC Alias Private Key: 7
21,647,158 UART: [art] Extend RT PCRs Done
21,648,376 UART: [art] Lock RT PCRs Done
21,649,919 UART: [art] Populate DV Done
21,655,166 UART: [fht] FMC Alias Private Key: 7
21,656,913 UART: [art] Derive CDI
21,657,649 UART: [art] Store in in slot 0x4
21,715,442 UART: [art] Derive Key Pair
21,716,459 UART: [art] Store priv key in slot 0x5
24,179,192 UART: [art] Derive Key Pair - Done
24,192,095 UART: [art] Signing Cert with AUTHO
24,193,415 UART: RITY.KEYID = 7
25,904,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,905,951 UART: [art] PUB.X = DA887B82593322189EAF64C3F93EFFAF8C4723FC3646FCF84871A7779FBB222D77A32D6BB74249CB009D518F75D5C708
25,913,175 UART: [art] PUB.Y = DD9712139CFBE3D32C4C21DF28FA56B6EAAA3F939F31569B1A0232228F68E430AA8BF0DEE649AAE5C676FDB142079F2F
25,920,456 UART: [art] SIG.R = F7F1095A2382637545DAE219CD04585B6DBCDBAF005A482218C634E74AE53C03B911FE209696E3FDF7BD75350231AF4D
25,927,841 UART: [art] SIG.S = C6EA31081DBAF9276372B11A676FF2B5F9640C7F404638EE3CE3E22ACEC62C1D60C133B87609D34EAF292916197D5B1F
26,906,416 UART: Caliptra RT
26,907,106 UART: [state] CFI Enabled
27,071,256 UART: [rt] RT listening for mailbox commands...
27,073,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,229,175 UART: [rt]cmd =0x41544d4e, len=14344
31,771,261 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,483 UART:
192,856 UART: Running Caliptra ROM ...
194,076 UART:
194,238 UART: [state] CFI Enabled
251,588 UART: [state] LifecycleState = Unprovisioned
253,997 UART: [state] DebugLocked = No
256,597 UART: [state] WD Timer not started. Device not locked for debugging
260,987 UART: [kat] SHA2-256
450,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,628 UART: [kat] ++
462,113 UART: [kat] sha1
473,435 UART: [kat] SHA2-256
476,450 UART: [kat] SHA2-384
482,940 UART: [kat] SHA2-512-ACC
485,522 UART: [kat] ECC-384
2,937,705 UART: [kat] HMAC-384Kdf
2,961,603 UART: [kat] LMS
3,493,387 UART: [kat] --
3,496,292 UART: [cold-reset] ++
3,498,450 UART: [fht] FHT @ 0x50003400
3,510,143 UART: [idev] ++
3,510,852 UART: [idev] CDI.KEYID = 6
3,511,739 UART: [idev] SUBJECT.KEYID = 7
3,512,982 UART: [idev] UDS.KEYID = 0
3,513,915 ready_for_fw is high
3,514,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,658,196 UART: [idev] Erasing UDS.KEYID = 0
6,017,526 UART: [idev] Sha1 KeyId Algorithm
6,040,430 UART: [idev] --
6,046,472 UART: [ldev] ++
6,047,173 UART: [ldev] CDI.KEYID = 6
6,048,091 UART: [ldev] SUBJECT.KEYID = 5
6,049,255 UART: [ldev] AUTHORITY.KEYID = 7
6,050,487 UART: [ldev] FE.KEYID = 1
6,090,540 UART: [ldev] Erasing FE.KEYID = 1
8,597,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,890 UART: [ldev] --
10,404,019 UART: [fwproc] Wait for Commands...
10,405,576 UART: [fwproc] Recv command 0x46574c44
10,407,888 UART: [fwproc] Recv'd Img size: 114360 bytes
15,033,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,113,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,229,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,772,450 >>> mbox cmd response: success
15,775,814 UART: [afmc] ++
15,776,522 UART: [afmc] CDI.KEYID = 6
15,777,740 UART: [afmc] SUBJECT.KEYID = 7
15,779,188 UART: [afmc] AUTHORITY.KEYID = 5
18,308,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,035,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,037,701 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,052,782 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,067,980 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,082,812 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,107,411 UART: [afmc] --
20,110,313 UART: [cold-reset] --
20,114,619 UART: [state] Locking Datavault
20,123,013 UART: [state] Locking PCR0, PCR1 and PCR31
20,125,212 UART: [state] Locking ICCM
20,127,649 UART: [exit] Launching FMC @ 0x40000130
20,136,282 UART:
20,136,526 UART: Running Caliptra FMC ...
20,137,655 UART:
20,137,818 UART: [state] CFI Enabled
20,191,366 UART: [fht] FMC Alias Private Key: 7
21,956,105 UART: [art] Extend RT PCRs Done
21,957,323 UART: [art] Lock RT PCRs Done
21,958,845 UART: [art] Populate DV Done
21,964,349 UART: [fht] FMC Alias Private Key: 7
21,965,960 UART: [art] Derive CDI
21,966,792 UART: [art] Store in in slot 0x4
22,024,213 UART: [art] Derive Key Pair
22,025,214 UART: [art] Store priv key in slot 0x5
24,488,375 UART: [art] Derive Key Pair - Done
24,501,586 UART: [art] Signing Cert with AUTHO
24,502,890 UART: RITY.KEYID = 7
26,213,664 UART: [art] Erasing AUTHORITY.KEYID = 7
26,215,176 UART: [art] PUB.X = 4CEE5C176B6A884E5EAEF482396CF57EE59C052F9AC9D23BF3D0173513C3BE410A352540E5E4DA772C385FD5FC6489A8
26,222,422 UART: [art] PUB.Y = C7F08C310A3FAA74B1AF608E1D811D9CA4626F6EC0CEAC2D4A28FDD01C3D567F1820C2517F22E8E84D9426ABD470F2B4
26,229,716 UART: [art] SIG.R = E3E70B13EA10987633DAEF0AE6D44F8BF4010E3DA513DBF9012D614E11E3FEEB7FCF5FF884BB9F00728DF82855AE96F1
26,237,091 UART: [art] SIG.S = B743DBBBA6263382EE2AC2A193CE64E1432524F95765D21E8823080CC0A3AFE285044BA329AA9EFF27F6533ED7772A72
27,215,547 UART: Caliptra RT
27,216,263 UART: [state] CFI Enabled
27,382,527 UART: [rt] RT listening for mailbox commands...
27,384,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,540,503 UART: [rt]cmd =0x41544d4e, len=14344
32,081,343 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,438,670 ready_for_fw is high
3,439,265 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,832,768 >>> mbox cmd response: success
20,129,143 UART:
20,129,568 UART: Running Caliptra FMC ...
20,130,880 UART:
20,131,053 UART: [state] CFI Enabled
20,200,581 UART: [fht] FMC Alias Private Key: 7
21,964,814 UART: [art] Extend RT PCRs Done
21,966,042 UART: [art] Lock RT PCRs Done
21,967,970 UART: [art] Populate DV Done
21,973,596 UART: [fht] FMC Alias Private Key: 7
21,975,185 UART: [art] Derive CDI
21,975,926 UART: [art] Store in in slot 0x4
22,032,693 UART: [art] Derive Key Pair
22,033,698 UART: [art] Store priv key in slot 0x5
24,496,744 UART: [art] Derive Key Pair - Done
24,509,819 UART: [art] Signing Cert with AUTHO
24,511,124 UART: RITY.KEYID = 7
26,222,005 UART: [art] Erasing AUTHORITY.KEYID = 7
26,223,519 UART: [art] PUB.X = 7AFA31D7B95B11AAE3ECF9F833EADDCFB767F95BCF383E6556DB2AE725A38E187A900955E0DCCA5DBB4B4503E203543B
26,230,860 UART: [art] PUB.Y = DC1EFC2BF8515A0F963D81EA098470602345655843455789E061110344F00F7E5C55EEB12E912EF2758EECD2048E46D6
26,238,093 UART: [art] SIG.R = 0EB02BC33E93B1AE005A01EBB356627D6CE5A97A277A84FB81AA24D36070280A08D573C948C6AD6E223B1C7914DD1E05
26,245,469 UART: [art] SIG.S = FA0772E55A475AEC71D9A65F5B09C1772D0EF272EA1A91BD63EB47178F3C723D46C0621CD8559CA9BAA8A0881C604E83
27,224,634 UART: Caliptra RT
27,225,327 UART: [state] CFI Enabled
27,389,261 UART: [rt] RT listening for mailbox commands...
27,391,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,546,650 UART: [rt]cmd =0x41544d4e, len=14344
32,097,458 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,534 UART:
192,911 UART: Running Caliptra ROM ...
194,013 UART:
603,908 UART: [state] CFI Enabled
617,434 UART: [state] LifecycleState = Unprovisioned
619,802 UART: [state] DebugLocked = No
621,603 UART: [state] WD Timer not started. Device not locked for debugging
625,351 UART: [kat] SHA2-256
815,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,787 UART: [kat] ++
826,396 UART: [kat] sha1
837,487 UART: [kat] SHA2-256
840,492 UART: [kat] SHA2-384
845,703 UART: [kat] SHA2-512-ACC
848,280 UART: [kat] ECC-384
3,291,404 UART: [kat] HMAC-384Kdf
3,305,289 UART: [kat] LMS
3,837,144 UART: [kat] --
3,840,602 UART: [cold-reset] ++
3,841,540 UART: [fht] FHT @ 0x50003400
3,852,252 UART: [idev] ++
3,852,927 UART: [idev] CDI.KEYID = 6
3,853,814 UART: [idev] SUBJECT.KEYID = 7
3,855,061 UART: [idev] UDS.KEYID = 0
3,855,991 ready_for_fw is high
3,856,233 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,839 UART: [idev] Erasing UDS.KEYID = 0
6,336,513 UART: [idev] Sha1 KeyId Algorithm
6,360,338 UART: [idev] --
6,365,416 UART: [ldev] ++
6,366,145 UART: [ldev] CDI.KEYID = 6
6,367,030 UART: [ldev] SUBJECT.KEYID = 5
6,368,238 UART: [ldev] AUTHORITY.KEYID = 7
6,369,414 UART: [ldev] FE.KEYID = 1
6,379,059 UART: [ldev] Erasing FE.KEYID = 1
8,853,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,805 UART: [ldev] --
10,642,622 UART: [fwproc] Wait for Commands...
10,644,549 UART: [fwproc] Recv command 0x46574c44
10,646,876 UART: [fwproc] Recv'd Img size: 114360 bytes
15,276,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,361,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,477,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,020,448 >>> mbox cmd response: success
16,024,229 UART: [afmc] ++
16,024,931 UART: [afmc] CDI.KEYID = 6
16,026,036 UART: [afmc] SUBJECT.KEYID = 7
16,027,574 UART: [afmc] AUTHORITY.KEYID = 5
18,530,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,252,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,254,837 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,269,907 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,285,086 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,299,959 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,324,077 UART: [afmc] --
20,327,041 UART: [cold-reset] --
20,329,398 UART: [state] Locking Datavault
20,336,114 UART: [state] Locking PCR0, PCR1 and PCR31
20,338,294 UART: [state] Locking ICCM
20,340,521 UART: [exit] Launching FMC @ 0x40000130
20,349,182 UART:
20,349,410 UART: Running Caliptra FMC ...
20,350,431 UART:
20,350,576 UART: [state] CFI Enabled
20,359,215 UART: [fht] FMC Alias Private Key: 7
22,115,433 UART: [art] Extend RT PCRs Done
22,116,662 UART: [art] Lock RT PCRs Done
22,118,153 UART: [art] Populate DV Done
22,123,560 UART: [fht] FMC Alias Private Key: 7
22,125,170 UART: [art] Derive CDI
22,125,910 UART: [art] Store in in slot 0x4
22,168,723 UART: [art] Derive Key Pair
22,169,763 UART: [art] Store priv key in slot 0x5
24,596,336 UART: [art] Derive Key Pair - Done
24,609,220 UART: [art] Signing Cert with AUTHO
24,610,513 UART: RITY.KEYID = 7
26,316,015 UART: [art] Erasing AUTHORITY.KEYID = 7
26,317,526 UART: [art] PUB.X = A993F63931260C26537F24FFDE4E0B3B1104800DC05440BD5B064FCB6520A0CC663A618BDC67561E62552C68655115FA
26,324,775 UART: [art] PUB.Y = A3C4297EAE2723574E2350389E52D73A62A82E94F5714D3DC32BFB1F65D8477D5C86980A32E40920ABF0E0FEDE420F9D
26,332,043 UART: [art] SIG.R = 7360353D4E8544C9F3404E880449F77F4C983BD36CA5D591EDE34C6DB58C5E1852D89E1FF06B68C6B539696389CDE9B9
26,339,455 UART: [art] SIG.S = 352F2566C2434029DDE45B7E42D9176EDD857C46D70340F3B9A0C145ED3CB1756BE9D5E90E15000210D86564B7D62673
27,318,344 UART: Caliptra RT
27,319,055 UART: [state] CFI Enabled
27,436,333 UART: [rt] RT listening for mailbox commands...
27,438,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,594,195 UART: [rt]cmd =0x41544d4e, len=14344
32,132,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,755,109 ready_for_fw is high
3,755,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,074,485 >>> mbox cmd response: success
20,324,619 UART:
20,324,994 UART: Running Caliptra FMC ...
20,326,176 UART:
20,326,342 UART: [state] CFI Enabled
20,334,199 UART: [fht] FMC Alias Private Key: 7
22,091,035 UART: [art] Extend RT PCRs Done
22,092,264 UART: [art] Lock RT PCRs Done
22,094,003 UART: [art] Populate DV Done
22,099,576 UART: [fht] FMC Alias Private Key: 7
22,101,169 UART: [art] Derive CDI
22,101,999 UART: [art] Store in in slot 0x4
22,144,547 UART: [art] Derive Key Pair
22,145,587 UART: [art] Store priv key in slot 0x5
24,572,719 UART: [art] Derive Key Pair - Done
24,585,289 UART: [art] Signing Cert with AUTHO
24,586,589 UART: RITY.KEYID = 7
26,291,989 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,491 UART: [art] PUB.X = 204A914767076CDF2DA8F083C2CAFD96CFF3DCE2F4FCB6F4F291426E258CA050985D69F62AB72928B2F38209F2ECC4E1
26,300,829 UART: [art] PUB.Y = FB91B1E8EE53D055B48469865FFB7D44CFAE0C9F9846A727697C344199F75D88ABD0E12AE09F4A929B1F9E0C38A1AF98
26,308,060 UART: [art] SIG.R = 22666C3245B4D5F3477F285040578A3B4A91D2A5D724E9EB3E59F7098F24B173F6C00273CA4B5A3735D742D92EDB6A17
26,315,412 UART: [art] SIG.S = 9F1CAB64D8F6A71ECD9D96D040F2B2254508EE59AE35A80AFFFDF3BAF9567EBE2D65C772A8246754AB7E5265F6E077F3
27,294,730 UART: Caliptra RT
27,295,416 UART: [state] CFI Enabled
27,412,806 UART: [rt] RT listening for mailbox commands...
27,415,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,532 UART: [rt]cmd =0x41544d4e, len=14344
32,110,458 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,123 UART: [kat] SHA2-256
882,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,169 UART: [kat] ++
886,321 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,571 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 ready_for_fw is high
1,480,653 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,954 UART: [idev] Erasing UDS.KEYID = 0
1,504,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,900 UART: [idev] --
1,513,987 UART: [ldev] ++
1,514,155 UART: [ldev] CDI.KEYID = 6
1,514,518 UART: [ldev] SUBJECT.KEYID = 5
1,514,944 UART: [ldev] AUTHORITY.KEYID = 7
1,515,407 UART: [ldev] FE.KEYID = 1
1,520,601 UART: [ldev] Erasing FE.KEYID = 1
1,546,220 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,964 UART: [ldev] --
1,585,381 UART: [fwproc] Waiting for Commands...
1,586,030 UART: [fwproc] Received command 0x46574c44
1,586,821 UART: [fwproc] Received Image of size 114360 bytes
5,271,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,299,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,464,902 >>> mbox cmd response: success
5,466,012 UART: [afmc] ++
5,466,180 UART: [afmc] CDI.KEYID = 6
5,466,542 UART: [afmc] SUBJECT.KEYID = 7
5,466,967 UART: [afmc] AUTHORITY.KEYID = 5
5,501,019 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,517,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,518,281 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,523,990 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,529,882 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,535,583 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,543,471 UART: [afmc] --
5,544,487 UART: [cold-reset] --
5,545,303 UART: [state] Locking Datavault
5,546,462 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,066 UART: [state] Locking ICCM
5,547,522 UART: [exit] Launching FMC @ 0x40000130
5,552,851 UART:
5,552,867 UART: Running Caliptra FMC ...
5,553,275 UART:
5,553,329 UART: [state] CFI Enabled
5,563,793 UART: [fht] FMC Alias Private Key: 7
5,671,705 UART: [art] Extend RT PCRs Done
5,672,133 UART: [art] Lock RT PCRs Done
5,673,509 UART: [art] Populate DV Done
5,681,833 UART: [fht] FMC Alias Private Key: 7
5,682,855 UART: [art] Derive CDI
5,683,135 UART: [art] Store in in slot 0x4
5,768,526 UART: [art] Derive Key Pair
5,768,886 UART: [art] Store priv key in slot 0x5
5,781,642 UART: [art] Derive Key Pair - Done
5,796,660 UART: [art] Signing Cert with AUTHO
5,797,140 UART: RITY.KEYID = 7
5,812,334 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,099 UART: [art] PUB.X = 629B0162D3ABE7EEA527BEE9D2693F83A894863DADBA13C7842C4480293BF8B909D8471007FF593B145D8B1829487862
5,819,858 UART: [art] PUB.Y = F3CFFD255B952966A3F676BFD8D238AC2809F183AA9332F2D1C0CD90ADCAC66BF18168908621785818C62F8D52EBBFE9
5,826,817 UART: [art] SIG.R = 45FC66F498B3E587F046FC918A44E54F6004764621A11E107790C4ECF1B3C9BF3609DE4810192484C29A0E3DCB8C4D49
5,833,578 UART: [art] SIG.S = F7E801AA789855A83DE2439CF6077E386E4F25D9657F7994DE0913A3FD95AEE317FA4D7ABC5030D5F6A7E15BD79DC01A
5,857,948 UART: Caliptra RT
5,858,202 UART: [state] CFI Enabled
5,966,076 UART: [rt] RT listening for mailbox commands...
5,966,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,089,379 UART: [rt]cmd =0x41544d4e, len=14344
6,997,253 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,377 ready_for_fw is high
1,362,377 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,200,203 >>> mbox cmd response: success
5,262,314 UART:
5,262,330 UART: Running Caliptra FMC ...
5,262,738 UART:
5,262,792 UART: [state] CFI Enabled
5,273,616 UART: [fht] FMC Alias Private Key: 7
5,381,414 UART: [art] Extend RT PCRs Done
5,381,842 UART: [art] Lock RT PCRs Done
5,383,202 UART: [art] Populate DV Done
5,391,148 UART: [fht] FMC Alias Private Key: 7
5,392,306 UART: [art] Derive CDI
5,392,586 UART: [art] Store in in slot 0x4
5,478,275 UART: [art] Derive Key Pair
5,478,635 UART: [art] Store priv key in slot 0x5
5,491,865 UART: [art] Derive Key Pair - Done
5,506,636 UART: [art] Signing Cert with AUTHO
5,507,116 UART: RITY.KEYID = 7
5,522,002 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,767 UART: [art] PUB.X = A8EE381990908CFEC847CEBC55ABF2026AF7E6F98413EC59645F1F26BD7FB594B978EAB8BB5D7708A455B8DFB525AA8E
5,529,551 UART: [art] PUB.Y = C3A8BEDBAADEFDBFC1F1B386490B91B377CDE6F8A45E355BD48E64738227FE85ECF4A8E5B490D6FC9FC8DC19F81F7C14
5,536,528 UART: [art] SIG.R = 51DADE66F1F65FFDD27E8385314CE497FD032E0AFED29A1188E16ECB2B0483A99A8861C5EDA2EF7F63B32898E776A641
5,543,303 UART: [art] SIG.S = 08D5588348332D8E5B16561311A44D66C4B5C6C6BE7D0025E6937CC831991E7C466366EFD8B7676FBC76CF94F1B8316B
5,567,409 UART: Caliptra RT
5,567,663 UART: [state] CFI Enabled
5,675,302 UART: [rt] RT listening for mailbox commands...
5,675,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,798,811 UART: [rt]cmd =0x41544d4e, len=14344
6,719,140 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,631 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,754 UART: [fht] Storing FHT @ 0x50003400
1,479,607 UART: [idev] ++
1,479,775 UART: [idev] CDI.KEYID = 6
1,480,135 UART: [idev] SUBJECT.KEYID = 7
1,480,559 UART: [idev] UDS.KEYID = 0
1,480,904 ready_for_fw is high
1,480,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,547 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,175 UART: [idev] --
1,515,236 UART: [ldev] ++
1,515,404 UART: [ldev] CDI.KEYID = 6
1,515,767 UART: [ldev] SUBJECT.KEYID = 5
1,516,193 UART: [ldev] AUTHORITY.KEYID = 7
1,516,656 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,548,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,203 UART: [ldev] --
1,587,632 UART: [fwproc] Waiting for Commands...
1,588,299 UART: [fwproc] Received command 0x46574c44
1,589,090 UART: [fwproc] Received Image of size 114360 bytes
5,122,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,149,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,179,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,314,985 >>> mbox cmd response: success
5,316,091 UART: [afmc] ++
5,316,259 UART: [afmc] CDI.KEYID = 6
5,316,621 UART: [afmc] SUBJECT.KEYID = 7
5,317,046 UART: [afmc] AUTHORITY.KEYID = 5
5,352,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,368,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,369,182 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,374,891 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,783 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,386,484 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,394,324 UART: [afmc] --
5,395,270 UART: [cold-reset] --
5,395,972 UART: [state] Locking Datavault
5,397,163 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,767 UART: [state] Locking ICCM
5,398,343 UART: [exit] Launching FMC @ 0x40000130
5,403,672 UART:
5,403,688 UART: Running Caliptra FMC ...
5,404,096 UART:
5,404,239 UART: [state] CFI Enabled
5,415,153 UART: [fht] FMC Alias Private Key: 7
5,523,211 UART: [art] Extend RT PCRs Done
5,523,639 UART: [art] Lock RT PCRs Done
5,525,289 UART: [art] Populate DV Done
5,533,339 UART: [fht] FMC Alias Private Key: 7
5,534,347 UART: [art] Derive CDI
5,534,627 UART: [art] Store in in slot 0x4
5,620,230 UART: [art] Derive Key Pair
5,620,590 UART: [art] Store priv key in slot 0x5
5,633,632 UART: [art] Derive Key Pair - Done
5,648,574 UART: [art] Signing Cert with AUTHO
5,649,054 UART: RITY.KEYID = 7
5,664,614 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,379 UART: [art] PUB.X = A9EC89E333EF92A417778111F379E549D6DAB6E7241C2BAC6CE40A6232607940CE6BBBBBDC9A2514D88BC2ADA44BAC67
5,672,164 UART: [art] PUB.Y = 84B69FB75B5EE6EE016DA91CEF49AC2E88A1B9FBD8499A01263C82CDD57D0B479BB255E23192CB2B355B1508CA95486E
5,679,116 UART: [art] SIG.R = 9F9FC89B91840FA94CBC6EC2983047A85D89AA34D4BB1D8C318A25681C96C88D85C718FCA14837A692C0DEAD8C0835D6
5,685,890 UART: [art] SIG.S = 244E3B25F244C0034C86B7C3BF55B2AEE78AC1353CB925349C4853CD0A56EE5CEF6C536FB1D6DD754CFBA18CD947DF18
5,709,667 UART: Caliptra RT
5,710,013 UART: [state] CFI Enabled
5,818,227 UART: [rt] RT listening for mailbox commands...
5,818,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,688 UART: [rt]cmd =0x41544d4e, len=14344
6,856,441 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,380 ready_for_fw is high
1,363,380 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,126,832 >>> mbox cmd response: success
5,188,717 UART:
5,188,733 UART: Running Caliptra FMC ...
5,189,141 UART:
5,189,284 UART: [state] CFI Enabled
5,199,978 UART: [fht] FMC Alias Private Key: 7
5,308,094 UART: [art] Extend RT PCRs Done
5,308,522 UART: [art] Lock RT PCRs Done
5,310,220 UART: [art] Populate DV Done
5,318,568 UART: [fht] FMC Alias Private Key: 7
5,319,716 UART: [art] Derive CDI
5,319,996 UART: [art] Store in in slot 0x4
5,405,655 UART: [art] Derive Key Pair
5,406,015 UART: [art] Store priv key in slot 0x5
5,418,597 UART: [art] Derive Key Pair - Done
5,433,138 UART: [art] Signing Cert with AUTHO
5,433,618 UART: RITY.KEYID = 7
5,448,476 UART: [art] Erasing AUTHORITY.KEYID = 7
5,449,241 UART: [art] PUB.X = B7828BBABB69B25F95A8FF4A4948B7420710FC391C578188F6C4FC69BF3635FD67368CB0D00E804CFFAD24AB2E726BB0
5,456,019 UART: [art] PUB.Y = A9B3EEA778EBF8E8AA15A1885EC7984CD7E4791D2BC91DD4E0943C1EE713DD5C945A6DDEDF123DDCCE0A3DF0D6358BE8
5,462,996 UART: [art] SIG.R = 9682BEEAF4827D1AA96A981C7FB63D2D4E02E0D4EEF4EB528A43EAB8FDCEC9925B50B69AD00209681AD88A9D918BAA9B
5,469,781 UART: [art] SIG.S = 9CBD4E43B8E215316440CB05E3C84FE7779439C7A06B64E0F68C65B456A21879F5C13CD38C4D471A8A6A60BB32B8DD6E
5,493,627 UART: Caliptra RT
5,493,973 UART: [state] CFI Enabled
5,602,448 UART: [rt] RT listening for mailbox commands...
5,603,118 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,003 UART: [rt]cmd =0x41544d4e, len=14344
6,648,249 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
893,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,675 UART: [kat] ++
897,827 UART: [kat] sha1
902,187 UART: [kat] SHA2-256
904,127 UART: [kat] SHA2-384
906,984 UART: [kat] SHA2-512-ACC
908,885 UART: [kat] ECC-384
918,272 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,667 UART: [fht] FHT @ 0x50003400
1,175,302 UART: [idev] ++
1,175,470 UART: [idev] CDI.KEYID = 6
1,175,830 UART: [idev] SUBJECT.KEYID = 7
1,176,254 UART: [idev] UDS.KEYID = 0
1,176,599 ready_for_fw is high
1,176,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,792 UART: [idev] Erasing UDS.KEYID = 0
1,201,027 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,411 UART: [ldev] --
1,282,752 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 114360 bytes
3,132,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,326,289 >>> mbox cmd response: success
3,327,299 UART: [afmc] ++
3,327,467 UART: [afmc] CDI.KEYID = 6
3,327,829 UART: [afmc] SUBJECT.KEYID = 7
3,328,254 UART: [afmc] AUTHORITY.KEYID = 5
3,363,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,953 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,662 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,554 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,265 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,254 UART: [afmc] --
3,407,252 UART: [cold-reset] --
3,407,996 UART: [state] Locking Datavault
3,409,145 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,749 UART: [state] Locking ICCM
3,410,187 UART: [exit] Launching FMC @ 0x40000130
3,415,516 UART:
3,415,532 UART: Running Caliptra FMC ...
3,415,940 UART:
3,415,994 UART: [state] CFI Enabled
3,426,666 UART: [fht] FMC Alias Private Key: 7
3,534,014 UART: [art] Extend RT PCRs Done
3,534,442 UART: [art] Lock RT PCRs Done
3,535,760 UART: [art] Populate DV Done
3,543,796 UART: [fht] FMC Alias Private Key: 7
3,544,740 UART: [art] Derive CDI
3,545,020 UART: [art] Store in in slot 0x4
3,630,619 UART: [art] Derive Key Pair
3,630,979 UART: [art] Store priv key in slot 0x5
3,644,339 UART: [art] Derive Key Pair - Done
3,658,997 UART: [art] Signing Cert with AUTHO
3,659,477 UART: RITY.KEYID = 7
3,675,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,675,866 UART: [art] PUB.X = 3AC6CACE9683D4244FAE525B91D758B37DCC78664A0B9F2D8DC35D5A08BA9C367173947031B9B220D6C2EF866F16C574
3,682,638 UART: [art] PUB.Y = 680CA07FDCA7AFEC401FB2A2F3205A0FCDC6FBEDE36BE80BA61F2A5A16553B20C3B6936115383CE864BDB7C55773166A
3,689,599 UART: [art] SIG.R = 3B597A6D0E6C3DE5CD2841F397CBFB2856A109BB97AA0E50791FBF3E65CAB2EEC5C3202EC53472AA1B3B228FA2762AD0
3,696,380 UART: [art] SIG.S = AE5D7D27BDFF946FE759CE4D66F5BE8E56993F70756B7B9986315CC44EDD77D78BB30E45B696C36D3963E5DA67B625B0
3,720,460 UART: Caliptra RT
3,720,714 UART: [state] CFI Enabled
3,829,167 UART: [rt] RT listening for mailbox commands...
3,829,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,498 UART: [rt]cmd =0x41544d4e, len=14344
4,875,406 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,351 ready_for_fw is high
1,059,351 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,203 >>> mbox cmd response: success
3,231,740 UART:
3,231,756 UART: Running Caliptra FMC ...
3,232,164 UART:
3,232,218 UART: [state] CFI Enabled
3,242,758 UART: [fht] FMC Alias Private Key: 7
3,350,820 UART: [art] Extend RT PCRs Done
3,351,248 UART: [art] Lock RT PCRs Done
3,352,378 UART: [art] Populate DV Done
3,360,554 UART: [fht] FMC Alias Private Key: 7
3,361,518 UART: [art] Derive CDI
3,361,798 UART: [art] Store in in slot 0x4
3,447,577 UART: [art] Derive Key Pair
3,447,937 UART: [art] Store priv key in slot 0x5
3,461,007 UART: [art] Derive Key Pair - Done
3,475,772 UART: [art] Signing Cert with AUTHO
3,476,252 UART: RITY.KEYID = 7
3,491,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,221 UART: [art] PUB.X = 311111EA157209C945FB7EC59779607CADD6AA61C6C90EC210B86E91B856B1FA2EB5C53ED638356CADD6BCB4FCB593A0
3,499,001 UART: [art] PUB.Y = 51B4A5023EC31E650797D33EC1DB15FFA2C97747FC1581C4DCFA535A3E8D0AE41E66C3DE65C251E5259B1DC2A01236BB
3,505,956 UART: [art] SIG.R = 5DD9C2EB5618054CAFE836868D5574CEE21358CB02F2B3C11AE6D017A18B2EAB2ABC65E163D73E9BF356664B68D3B223
3,512,732 UART: [art] SIG.S = FEB2A9986BD104A24F07AB9572B7F7FFB8EF6641143056AD0DF951A807DA899876C539C406CB9C9A6DEDCECA5AB98F27
3,536,982 UART: Caliptra RT
3,537,236 UART: [state] CFI Enabled
3,645,217 UART: [rt] RT listening for mailbox commands...
3,645,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,570 UART: [rt]cmd =0x41544d4e, len=14344
4,686,540 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,529 UART: [kat] SHA2-256
893,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,304 UART: [kat] ++
897,456 UART: [kat] sha1
901,702 UART: [kat] SHA2-256
903,642 UART: [kat] SHA2-384
906,325 UART: [kat] SHA2-512-ACC
908,226 UART: [kat] ECC-384
917,719 UART: [kat] HMAC-384Kdf
922,459 UART: [kat] LMS
1,170,787 UART: [kat] --
1,171,862 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,175,221 UART: [idev] ++
1,175,389 UART: [idev] CDI.KEYID = 6
1,175,749 UART: [idev] SUBJECT.KEYID = 7
1,176,173 UART: [idev] UDS.KEYID = 0
1,176,518 ready_for_fw is high
1,176,518 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,141 UART: [idev] Erasing UDS.KEYID = 0
1,200,892 UART: [idev] Sha1 KeyId Algorithm
1,209,206 UART: [idev] --
1,210,482 UART: [ldev] ++
1,210,650 UART: [ldev] CDI.KEYID = 6
1,211,013 UART: [ldev] SUBJECT.KEYID = 5
1,211,439 UART: [ldev] AUTHORITY.KEYID = 7
1,211,902 UART: [ldev] FE.KEYID = 1
1,217,122 UART: [ldev] Erasing FE.KEYID = 1
1,243,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,938 UART: [ldev] --
1,282,239 UART: [fwproc] Wait for Commands...
1,282,851 UART: [fwproc] Recv command 0x46574c44
1,283,579 UART: [fwproc] Recv'd Img size: 114360 bytes
3,128,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,321,266 >>> mbox cmd response: success
3,322,356 UART: [afmc] ++
3,322,524 UART: [afmc] CDI.KEYID = 6
3,322,886 UART: [afmc] SUBJECT.KEYID = 7
3,323,311 UART: [afmc] AUTHORITY.KEYID = 5
3,358,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,596 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,305 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,197 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,908 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,641 UART: [afmc] --
3,402,717 UART: [cold-reset] --
3,403,409 UART: [state] Locking Datavault
3,404,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,176 UART: [state] Locking ICCM
3,405,790 UART: [exit] Launching FMC @ 0x40000130
3,411,119 UART:
3,411,135 UART: Running Caliptra FMC ...
3,411,543 UART:
3,411,686 UART: [state] CFI Enabled
3,422,512 UART: [fht] FMC Alias Private Key: 7
3,530,238 UART: [art] Extend RT PCRs Done
3,530,666 UART: [art] Lock RT PCRs Done
3,532,518 UART: [art] Populate DV Done
3,540,972 UART: [fht] FMC Alias Private Key: 7
3,541,936 UART: [art] Derive CDI
3,542,216 UART: [art] Store in in slot 0x4
3,627,581 UART: [art] Derive Key Pair
3,627,941 UART: [art] Store priv key in slot 0x5
3,641,633 UART: [art] Derive Key Pair - Done
3,656,543 UART: [art] Signing Cert with AUTHO
3,657,023 UART: RITY.KEYID = 7
3,671,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,694 UART: [art] PUB.X = A1C50C8791163FCB5FFFB1A4A5478CB4E13593447A707E61DB520020E7239813CDBC49ABA873197DD83E9B2DF9AC9E16
3,679,449 UART: [art] PUB.Y = 8992B22001746133F471066621D3A97818CB9B37BE436C38771CB0A1A81F2AC3C4C877236F4A5AAFC38C370E83D56401
3,686,381 UART: [art] SIG.R = 64F633B4CD556D4CE93C8FD76F3D1630640F8F693F2D0E73075E7FA15F8FBCEE82B29709B49F4C33907A7DEB33BED180
3,693,151 UART: [art] SIG.S = A06296A686F5A35F3C5E265ABEE20D408B03A54D0900E15DA230F8B9898213EF11E00FABC17EA172E286300989FBC66B
3,716,829 UART: Caliptra RT
3,717,175 UART: [state] CFI Enabled
3,825,708 UART: [rt] RT listening for mailbox commands...
3,826,378 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,023 UART: [rt]cmd =0x41544d4e, len=14344
4,871,917 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 ready_for_fw is high
1,060,478 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,159,175 >>> mbox cmd response: success
3,221,922 UART:
3,221,938 UART: Running Caliptra FMC ...
3,222,346 UART:
3,222,489 UART: [state] CFI Enabled
3,233,153 UART: [fht] FMC Alias Private Key: 7
3,341,413 UART: [art] Extend RT PCRs Done
3,341,841 UART: [art] Lock RT PCRs Done
3,343,429 UART: [art] Populate DV Done
3,351,557 UART: [fht] FMC Alias Private Key: 7
3,352,493 UART: [art] Derive CDI
3,352,773 UART: [art] Store in in slot 0x4
3,438,650 UART: [art] Derive Key Pair
3,439,010 UART: [art] Store priv key in slot 0x5
3,452,460 UART: [art] Derive Key Pair - Done
3,467,160 UART: [art] Signing Cert with AUTHO
3,467,640 UART: RITY.KEYID = 7
3,482,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,673 UART: [art] PUB.X = 3A7E7D9FACAF454E41D28C3AB00DBCCE587CE39675525E1FD2E8CCE78262F5D28CB2B92CC90E7243D36232421363F0B3
3,490,451 UART: [art] PUB.Y = 796126B73B2EAE1BCA9E3EA9E61F011C3ED72596EC0DDF7BA4D62536F458F0E061A2321254FC453C0FD1AEBCF8F98E02
3,497,407 UART: [art] SIG.R = DB2F943B34FF8141643B1CA4E5C014ABDBA2230ECFEBC24DD5F8A5862931A970CD0E1AA257091BCECABAC6DB6FE14A19
3,504,196 UART: [art] SIG.S = BCAD529CEA10C3C824FEE0259DC257F730115ACAE0CE810520685B5A3BDB5D044C230D3F22F2769C3839A7148C321EB0
3,527,962 UART: Caliptra RT
3,528,308 UART: [state] CFI Enabled
3,635,496 UART: [rt] RT listening for mailbox commands...
3,636,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,783 UART: [rt]cmd =0x41544d4e, len=14344
4,661,505 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,883 UART: [kat] ++
895,035 UART: [kat] sha1
899,213 UART: [kat] SHA2-256
901,153 UART: [kat] SHA2-384
903,936 UART: [kat] SHA2-512-ACC
905,837 UART: [kat] ECC-384
915,520 UART: [kat] HMAC-384Kdf
920,104 UART: [kat] LMS
1,168,416 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,625 UART: [idev] ++
1,172,793 UART: [idev] CDI.KEYID = 6
1,173,154 UART: [idev] SUBJECT.KEYID = 7
1,173,579 UART: [idev] UDS.KEYID = 0
1,173,925 ready_for_fw is high
1,173,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,012 UART: [ldev] Erasing FE.KEYID = 1
1,241,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,156 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114360 bytes
3,136,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,164,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,329,308 >>> mbox cmd response: success
3,330,485 UART: [afmc] ++
3,330,653 UART: [afmc] CDI.KEYID = 6
3,331,016 UART: [afmc] SUBJECT.KEYID = 7
3,331,442 UART: [afmc] AUTHORITY.KEYID = 5
3,367,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,597 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,390,307 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,396,197 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,401,908 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,409,786 UART: [afmc] --
3,410,878 UART: [cold-reset] --
3,411,742 UART: [state] Locking Datavault
3,412,923 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,527 UART: [state] Locking ICCM
3,413,989 UART: [exit] Launching FMC @ 0x40000130
3,419,318 UART:
3,419,334 UART: Running Caliptra FMC ...
3,419,742 UART:
3,419,796 UART: [state] CFI Enabled
3,430,170 UART: [fht] FMC Alias Private Key: 7
3,537,492 UART: [art] Extend RT PCRs Done
3,537,920 UART: [art] Lock RT PCRs Done
3,539,492 UART: [art] Populate DV Done
3,547,716 UART: [fht] FMC Alias Private Key: 7
3,548,880 UART: [art] Derive CDI
3,549,160 UART: [art] Store in in slot 0x4
3,635,245 UART: [art] Derive Key Pair
3,635,605 UART: [art] Store priv key in slot 0x5
3,649,031 UART: [art] Derive Key Pair - Done
3,663,650 UART: [art] Signing Cert with AUTHO
3,664,130 UART: RITY.KEYID = 7
3,679,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,680,287 UART: [art] PUB.X = 4018CC77DB813EBD90CE18254D1AE4398A3682F24B34F4684B8AE41142A535D7592DA8BCC1A3FD0EF7E18F85FE4DF894
3,687,066 UART: [art] PUB.Y = AF53D078F530686CC3E95F7AF47213378E29AC73BA862F58CCD46EFA3EEF315FA626580B03953E48A2F0127ED8131D33
3,694,016 UART: [art] SIG.R = 4805CEACE0BFCEE6936B2168E350FD73677F3072F54D92A27B163C3DBD42662193974A2D2FC6D53766123B0182946583
3,700,776 UART: [art] SIG.S = 8C0AD68E7D70F7DE6872F6C634CE7C9FBD377429E9BB1CC9A2296F26410454D8B65FBC9D93372D19EE88480C6FC9082F
3,724,717 UART: Caliptra RT
3,724,971 UART: [state] CFI Enabled
3,832,112 UART: [rt] RT listening for mailbox commands...
3,832,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,563 UART: [rt]cmd =0x41544d4e, len=14344
4,873,061 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,668 ready_for_fw is high
1,055,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,161,047 >>> mbox cmd response: success
3,223,442 UART:
3,223,458 UART: Running Caliptra FMC ...
3,223,866 UART:
3,223,920 UART: [state] CFI Enabled
3,234,232 UART: [fht] FMC Alias Private Key: 7
3,341,442 UART: [art] Extend RT PCRs Done
3,341,870 UART: [art] Lock RT PCRs Done
3,343,280 UART: [art] Populate DV Done
3,351,294 UART: [fht] FMC Alias Private Key: 7
3,352,306 UART: [art] Derive CDI
3,352,586 UART: [art] Store in in slot 0x4
3,438,159 UART: [art] Derive Key Pair
3,438,519 UART: [art] Store priv key in slot 0x5
3,451,797 UART: [art] Derive Key Pair - Done
3,466,428 UART: [art] Signing Cert with AUTHO
3,466,908 UART: RITY.KEYID = 7
3,481,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,751 UART: [art] PUB.X = 20782F2E4AF4A90F7A5458DCA9CA4DCA00B56D5B5FEA96B1BBA8ABCB06D247D4816F32D8AAACFB3A553970568A8E480E
3,489,514 UART: [art] PUB.Y = 0AAA887CF4A16BA9B3CDC51880182F92B544D820BCB53C1623609A86CF19A4909402F646277ACECE09D44C4243C1DD53
3,496,461 UART: [art] SIG.R = E6C9F54702382C9267E869A910DDF1160CFFAFF40FD6EDA20D66147515B2065FA731B3B9B77AEBD9F6BB33A2F808CFE8
3,503,229 UART: [art] SIG.S = 7EA9D9515F1D868C5551BAC2536A1BD3277B4703274D396F071506122950EFD09B2413FC79FA2FE92ACEE1E473A05198
3,526,773 UART: Caliptra RT
3,527,027 UART: [state] CFI Enabled
3,634,046 UART: [rt] RT listening for mailbox commands...
3,634,716 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,529 UART: [rt]cmd =0x41544d4e, len=14344
4,675,803 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,810 UART: [kat] SHA2-256
901,750 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,170,050 UART: [fht] FHT @ 0x50003400
1,172,588 UART: [idev] ++
1,172,756 UART: [idev] CDI.KEYID = 6
1,173,117 UART: [idev] SUBJECT.KEYID = 7
1,173,542 UART: [idev] UDS.KEYID = 0
1,173,888 ready_for_fw is high
1,173,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,362 UART: [idev] Erasing UDS.KEYID = 0
1,198,500 UART: [idev] Sha1 KeyId Algorithm
1,207,412 UART: [idev] --
1,208,465 UART: [ldev] ++
1,208,633 UART: [ldev] CDI.KEYID = 6
1,208,997 UART: [ldev] SUBJECT.KEYID = 5
1,209,424 UART: [ldev] AUTHORITY.KEYID = 7
1,209,887 UART: [ldev] FE.KEYID = 1
1,215,163 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,740 >>> mbox cmd response: success
3,317,889 UART: [afmc] ++
3,318,057 UART: [afmc] CDI.KEYID = 6
3,318,420 UART: [afmc] SUBJECT.KEYID = 7
3,318,846 UART: [afmc] AUTHORITY.KEYID = 5
3,354,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,805 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,515 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,405 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,116 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,908 UART: [afmc] --
3,398,010 UART: [cold-reset] --
3,399,022 UART: [state] Locking Datavault
3,400,291 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,895 UART: [state] Locking ICCM
3,401,453 UART: [exit] Launching FMC @ 0x40000130
3,406,782 UART:
3,406,798 UART: Running Caliptra FMC ...
3,407,206 UART:
3,407,349 UART: [state] CFI Enabled
3,417,693 UART: [fht] FMC Alias Private Key: 7
3,525,781 UART: [art] Extend RT PCRs Done
3,526,209 UART: [art] Lock RT PCRs Done
3,527,635 UART: [art] Populate DV Done
3,535,909 UART: [fht] FMC Alias Private Key: 7
3,537,085 UART: [art] Derive CDI
3,537,365 UART: [art] Store in in slot 0x4
3,623,620 UART: [art] Derive Key Pair
3,623,980 UART: [art] Store priv key in slot 0x5
3,637,228 UART: [art] Derive Key Pair - Done
3,651,937 UART: [art] Signing Cert with AUTHO
3,652,417 UART: RITY.KEYID = 7
3,668,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,904 UART: [art] PUB.X = 1E950D0D1CBAEB5066ACC9B300E9229852DA2ECADB5C5D6E012587DD85B3A0EC113D70DEC24B549E1099D9273E189D2B
3,675,659 UART: [art] PUB.Y = 8E1B01BC45F208C4BF6E55872DF0A62BD01B2FBF322D1AC9A8AFDB2678F0376DC02431F2E794C60C787869B691B69D8C
3,682,612 UART: [art] SIG.R = AAD36C370B18731ECD3F0BF5EB546AAA86381404E0E5BF852ED79984D4A50CCD50B5B8F9433C61DC3A4219B54CA1710B
3,689,381 UART: [art] SIG.S = D94DD803D515B68226B86FAB833F4A8E145474B5721608122B06A5CE0B59CBDA2346B81E8F0CADADDD7CCFFC09901796
3,713,124 UART: Caliptra RT
3,713,470 UART: [state] CFI Enabled
3,821,332 UART: [rt] RT listening for mailbox commands...
3,822,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,889 UART: [rt]cmd =0x41544d4e, len=14344
4,869,946 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,691 ready_for_fw is high
1,055,691 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,168,347 >>> mbox cmd response: success
3,229,650 UART:
3,229,666 UART: Running Caliptra FMC ...
3,230,074 UART:
3,230,217 UART: [state] CFI Enabled
3,240,807 UART: [fht] FMC Alias Private Key: 7
3,349,041 UART: [art] Extend RT PCRs Done
3,349,469 UART: [art] Lock RT PCRs Done
3,350,917 UART: [art] Populate DV Done
3,359,075 UART: [fht] FMC Alias Private Key: 7
3,360,135 UART: [art] Derive CDI
3,360,415 UART: [art] Store in in slot 0x4
3,446,390 UART: [art] Derive Key Pair
3,446,750 UART: [art] Store priv key in slot 0x5
3,460,034 UART: [art] Derive Key Pair - Done
3,474,670 UART: [art] Signing Cert with AUTHO
3,475,150 UART: RITY.KEYID = 7
3,490,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,165 UART: [art] PUB.X = EFE1782EC629EE937A60C34DC038685A3ED7E07636B2C93A8E1DAFEFDCE79D78E8C8992A24774F7F452326889511E082
3,497,941 UART: [art] PUB.Y = F16B0FEB984200941335737E73842AA40ABE62F8D1361304AD0C207B4A44820986B1135C56578092F4A15969CB859704
3,504,837 UART: [art] SIG.R = CF7172D58FAC6BAAC5C0D31926894E594586F561584BF199748A527D4175E0EDAEE79BEF06E67F93D2550D3DE624E1CA
3,511,611 UART: [art] SIG.S = BD531D554754BB1A30D4D39356FBB088117F87F274624BE1D67C05AB94E13E53DC06CD990AC86610417C59400AC67284
3,535,182 UART: Caliptra RT
3,535,528 UART: [state] CFI Enabled
3,643,206 UART: [rt] RT listening for mailbox commands...
3,643,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,519 UART: [rt]cmd =0x41544d4e, len=14344
4,679,071 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,528 UART:
192,897 UART: Running Caliptra ROM ...
194,025 UART:
194,169 UART: [state] CFI Enabled
264,637 UART: [state] LifecycleState = Unprovisioned
266,640 UART: [state] DebugLocked = No
268,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,388 UART: [kat] SHA2-256
443,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,560 UART: [kat] ++
454,056 UART: [kat] sha1
465,145 UART: [kat] SHA2-256
467,789 UART: [kat] SHA2-384
474,410 UART: [kat] SHA2-512-ACC
476,782 UART: [kat] ECC-384
2,768,352 UART: [kat] HMAC-384Kdf
2,799,120 UART: [kat] LMS
3,989,419 UART: [kat] --
3,993,991 UART: [cold-reset] ++
3,996,411 UART: [fht] Storing FHT @ 0x50003400
4,008,597 UART: [idev] ++
4,009,160 UART: [idev] CDI.KEYID = 6
4,010,187 UART: [idev] SUBJECT.KEYID = 7
4,011,356 UART: [idev] UDS.KEYID = 0
4,012,436 ready_for_fw is high
4,012,631 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,058 UART: [idev] Erasing UDS.KEYID = 0
7,343,220 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,695 UART: [idev] --
7,367,927 UART: [ldev] ++
7,368,490 UART: [ldev] CDI.KEYID = 6
7,369,447 UART: [ldev] SUBJECT.KEYID = 5
7,370,707 UART: [ldev] AUTHORITY.KEYID = 7
7,371,932 UART: [ldev] FE.KEYID = 1
7,399,589 UART: [ldev] Erasing FE.KEYID = 1
10,733,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,712 UART: [ldev] --
13,091,216 UART: [fwproc] Waiting for Commands...
13,093,272 UART: [fwproc] Received command 0x46574c44
13,095,511 UART: [fwproc] Received Image of size 114036 bytes
17,154,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,149 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,617,434 >>> mbox cmd response: success
17,621,042 UART: [afmc] ++
17,621,632 UART: [afmc] CDI.KEYID = 6
17,622,509 UART: [afmc] SUBJECT.KEYID = 7
17,623,769 UART: [afmc] AUTHORITY.KEYID = 5
20,977,511 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,369 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,297,791 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,312,615 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,017 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,348,589 UART: [afmc] --
23,353,037 UART: [cold-reset] --
23,358,297 UART: [state] Locking Datavault
23,362,727 UART: [state] Locking PCR0, PCR1 and PCR31
23,364,472 UART: [state] Locking ICCM
23,366,433 UART: [exit] Launching FMC @ 0x40000130
23,375,083 UART:
23,375,373 UART: Running Caliptra FMC ...
23,376,400 UART:
23,376,543 UART: [state] CFI Enabled
23,440,788 UART: [fht] FMC Alias Private Key: 7
25,778,519 UART: [art] Extend RT PCRs Done
25,779,735 UART: [art] Lock RT PCRs Done
25,781,537 UART: [art] Populate DV Done
25,786,775 UART: [fht] FMC Alias Private Key: 7
25,788,474 UART: [art] Derive CDI
25,789,225 UART: [art] Store in in slot 0x4
25,849,932 UART: [art] Derive Key Pair
25,850,929 UART: [art] Store priv key in slot 0x5
29,143,994 UART: [art] Derive Key Pair - Done
29,156,834 UART: [art] Signing Cert with AUTHO
29,158,127 UART: RITY.KEYID = 7
31,445,908 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,419 UART: [art] PUB.X = 2D91663778664FD790CB983A63733904C70B89BC46B950731CB1DC462BD49E1377C52760165A46C64343552EFD74182D
31,454,647 UART: [art] PUB.Y = EB79E11C7762B6ADFADFC2406EF73BD07876FBD9CEA3A46F9F931D3FF39A43E8CDD741032D7890D337F5736A54FEF689
31,461,891 UART: [art] SIG.R = 6805A4F0A2D690C72DCAEA5398B8E335CE3B64EB572B4AFC0EDA8A086D1F83E752F2CB12CDF742A1C5C45F4B1582F259
31,469,312 UART: [art] SIG.S = A395FED9F27DD0DCABB978639ECED31B5AFEA158B32FA229716FD64B3D0E6B9EC1616021AAFB87340E1AD321F9FC2ADA
32,773,772 UART: Caliptra RT
32,774,479 UART: [state] CFI Enabled
32,936,572 UART: [rt] RT listening for mailbox commands...
32,938,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,094,102 UART: [rt]cmd =0x41544d4e, len=14344
38,329,881 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,802,804 ready_for_fw is high
3,803,186 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,843,084 >>> mbox cmd response: success
23,545,464 UART:
23,545,853 UART: Running Caliptra FMC ...
23,546,994 UART:
23,547,148 UART: [state] CFI Enabled
23,615,731 UART: [fht] FMC Alias Private Key: 7
25,954,125 UART: [art] Extend RT PCRs Done
25,955,342 UART: [art] Lock RT PCRs Done
25,957,205 UART: [art] Populate DV Done
25,962,389 UART: [fht] FMC Alias Private Key: 7
25,964,032 UART: [art] Derive CDI
25,964,848 UART: [art] Store in in slot 0x4
26,024,483 UART: [art] Derive Key Pair
26,025,543 UART: [art] Store priv key in slot 0x5
29,318,626 UART: [art] Derive Key Pair - Done
29,331,683 UART: [art] Signing Cert with AUTHO
29,332,976 UART: RITY.KEYID = 7
31,620,452 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,950 UART: [art] PUB.X = CEC85A265805A69AEC46E8B0A7B0D4D9F45CA2DC0CC25D012F99BBCA5024FEC2F91216E7E578101ABC2981E587D990A6
31,629,295 UART: [art] PUB.Y = BB9669339DFD5012B8E845B605133DF5A9314204A31BDBB91D62E111FC8BFF9DB25C040FD8589D7D139B188F4852A791
31,636,478 UART: [art] SIG.R = 926368CC85BDB197B7F10FC778E33EDE2A4911B686DBC834E630EF05817A9D8EA99879929E4B1EECF345550ECEA5E2A4
31,643,841 UART: [art] SIG.S = C6925505DA91D1280B2A2965A0587162CAB7D7794AB957AD5FD065BB6A9D0B05E04FAE92549DFFE25B162469541315D0
32,948,470 UART: Caliptra RT
32,949,186 UART: [state] CFI Enabled
33,110,656 UART: [rt] RT listening for mailbox commands...
33,113,115 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,268,243 UART: [rt]cmd =0x41544d4e, len=14344
38,503,793 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,362 UART:
192,719 UART: Running Caliptra ROM ...
193,908 UART:
603,671 UART: [state] CFI Enabled
616,200 UART: [state] LifecycleState = Unprovisioned
618,149 UART: [state] DebugLocked = No
620,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,084 UART: [kat] SHA2-256
794,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,392 UART: [kat] ++
805,833 UART: [kat] sha1
815,922 UART: [kat] SHA2-256
818,569 UART: [kat] SHA2-384
825,050 UART: [kat] SHA2-512-ACC
827,423 UART: [kat] ECC-384
3,111,768 UART: [kat] HMAC-384Kdf
3,123,715 UART: [kat] LMS
4,313,797 UART: [kat] --
4,319,423 UART: [cold-reset] ++
4,321,846 UART: [fht] Storing FHT @ 0x50003400
4,333,534 UART: [idev] ++
4,334,174 UART: [idev] CDI.KEYID = 6
4,335,082 UART: [idev] SUBJECT.KEYID = 7
4,336,334 UART: [idev] UDS.KEYID = 0
4,337,394 ready_for_fw is high
4,337,592 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,806 UART: [idev] Erasing UDS.KEYID = 0
7,624,124 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,906 UART: [idev] --
7,649,923 UART: [ldev] ++
7,650,545 UART: [ldev] CDI.KEYID = 6
7,651,527 UART: [ldev] SUBJECT.KEYID = 5
7,652,689 UART: [ldev] AUTHORITY.KEYID = 7
7,653,970 UART: [ldev] FE.KEYID = 1
7,663,859 UART: [ldev] Erasing FE.KEYID = 1
10,957,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,557 UART: [ldev] --
13,317,410 UART: [fwproc] Waiting for Commands...
13,319,714 UART: [fwproc] Received command 0x46574c44
13,321,890 UART: [fwproc] Received Image of size 114036 bytes
17,377,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,839,872 >>> mbox cmd response: success
17,843,666 UART: [afmc] ++
17,844,267 UART: [afmc] CDI.KEYID = 6
17,845,240 UART: [afmc] SUBJECT.KEYID = 7
17,846,458 UART: [afmc] AUTHORITY.KEYID = 5
21,163,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,907 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,293 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,106 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,605 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,630 UART: [afmc] --
23,526,680 UART: [cold-reset] --
23,530,107 UART: [state] Locking Datavault
23,535,028 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,725 UART: [state] Locking ICCM
23,537,979 UART: [exit] Launching FMC @ 0x40000130
23,546,384 UART:
23,546,623 UART: Running Caliptra FMC ...
23,547,725 UART:
23,547,890 UART: [state] CFI Enabled
23,555,782 UART: [fht] FMC Alias Private Key: 7
25,886,607 UART: [art] Extend RT PCRs Done
25,887,877 UART: [art] Lock RT PCRs Done
25,889,528 UART: [art] Populate DV Done
25,895,056 UART: [fht] FMC Alias Private Key: 7
25,896,757 UART: [art] Derive CDI
25,897,576 UART: [art] Store in in slot 0x4
25,939,902 UART: [art] Derive Key Pair
25,940,949 UART: [art] Store priv key in slot 0x5
29,182,470 UART: [art] Derive Key Pair - Done
29,195,576 UART: [art] Signing Cert with AUTHO
29,196,902 UART: RITY.KEYID = 7
31,476,251 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,757 UART: [art] PUB.X = CD29156724F059585FD9EA31FB944666E4565306ADD8CD063BF8094240C5F2E4CD03E24EF67FB66D65A35E1AF3D87C61
31,485,014 UART: [art] PUB.Y = DED82A3560DCC696E1ECA81945A1203D55D943CBB5CBF508CA95AF9FC734FD6D701A6E9DACE530A57B42C37424BFB768
31,492,258 UART: [art] SIG.R = 162CAF5AD845D939045F4FBB82A2CF7B175CF35D8D895B10F6783B6E3D7257287A9C069265E1AE6AF8EF0DF227EBBB21
31,499,823 UART: [art] SIG.S = 280AD6FE9B6A56337408B8D22CA000811D4C8E54A8B3C85B16F9C24C7CEDE67342487C31582DBFDEE7B5076A868956ED
32,805,547 UART: Caliptra RT
32,806,264 UART: [state] CFI Enabled
32,924,569 UART: [rt] RT listening for mailbox commands...
32,926,883 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,082,255 UART: [rt]cmd =0x41544d4e, len=14344
38,317,243 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
4,126,724 ready_for_fw is high
4,127,140 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,073,084 >>> mbox cmd response: success
23,714,870 UART:
23,715,242 UART: Running Caliptra FMC ...
23,716,423 UART:
23,716,596 UART: [state] CFI Enabled
23,724,322 UART: [fht] FMC Alias Private Key: 7
26,055,303 UART: [art] Extend RT PCRs Done
26,056,536 UART: [art] Lock RT PCRs Done
26,058,079 UART: [art] Populate DV Done
26,063,288 UART: [fht] FMC Alias Private Key: 7
26,064,842 UART: [art] Derive CDI
26,065,662 UART: [art] Store in in slot 0x4
26,108,265 UART: [art] Derive Key Pair
26,109,857 UART: [art] Store priv key in slot 0x5
29,350,489 UART: [art] Derive Key Pair - Done
29,363,436 UART: [art] Signing Cert with AUTHO
29,364,744 UART: RITY.KEYID = 7
31,644,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,676 UART: [art] PUB.X = 5398E1FF5237BE35A6D698C0AA5E095D9A9CE7202F8DC2FD2E62F9AD1743EA135950C90D612DBF634878E398A3E8EAAE
31,652,947 UART: [art] PUB.Y = 2B083CCD676AA5C3A933E6435CA49A4E6B4CAAE375127ECAF34BB0DA990E2F99AE413A16C2C0DE4D25B65A95FE2FC000
31,660,174 UART: [art] SIG.R = 58FF23A08EACB6AF1468A6AD655DAEC42DCECA8DDA1A80E22C3F290C7B75F5359B4BD74F9E7F123505A753336A0F66FC
31,667,592 UART: [art] SIG.S = 60A1A3149931C3EEABF1C67AFC92D014042DF3FA4CD8513FD319A6C7ACB2394D166F2FF6949D36E39DF82D75A4130A81
32,972,694 UART: Caliptra RT
32,973,404 UART: [state] CFI Enabled
33,091,104 UART: [rt] RT listening for mailbox commands...
33,093,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,248,691 UART: [rt]cmd =0x41544d4e, len=14344
38,484,274 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,332 writing to cptra_bootfsm_go
193,565 UART:
193,920 UART: Running Caliptra ROM ...
195,128 UART:
195,280 UART: [state] CFI Enabled
265,673 UART: [state] LifecycleState = Unprovisioned
267,569 UART: [state] DebugLocked = No
268,901 UART: [state] WD Timer not started. Device not locked for debugging
273,576 UART: [kat] SHA2-256
452,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,222 UART: [kat] ++
464,763 UART: [kat] sha1
474,440 UART: [kat] SHA2-256
477,442 UART: [kat] SHA2-384
483,245 UART: [kat] SHA2-512-ACC
486,223 UART: [kat] ECC-384
2,951,174 UART: [kat] HMAC-384Kdf
2,972,911 UART: [kat] LMS
3,502,307 UART: [kat] --
3,507,438 UART: [cold-reset] ++
3,509,437 UART: [fht] FHT @ 0x50003400
3,519,915 UART: [idev] ++
3,520,497 UART: [idev] CDI.KEYID = 6
3,521,384 UART: [idev] SUBJECT.KEYID = 7
3,522,636 UART: [idev] UDS.KEYID = 0
3,523,826 ready_for_fw is high
3,524,043 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,350 UART: [idev] Erasing UDS.KEYID = 0
6,029,117 UART: [idev] Sha1 KeyId Algorithm
6,053,159 UART: [idev] --
6,058,076 UART: [ldev] ++
6,058,656 UART: [ldev] CDI.KEYID = 6
6,059,570 UART: [ldev] SUBJECT.KEYID = 5
6,060,786 UART: [ldev] AUTHORITY.KEYID = 7
6,062,019 UART: [ldev] FE.KEYID = 1
6,102,441 UART: [ldev] Erasing FE.KEYID = 1
8,605,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,782 UART: [ldev] --
10,414,110 UART: [fwproc] Wait for Commands...
10,417,121 UART: [fwproc] Recv command 0x46574c44
10,419,213 UART: [fwproc] Recv'd Img size: 114360 bytes
13,824,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,290,144 >>> mbox cmd response: success
14,294,691 UART: [afmc] ++
14,295,299 UART: [afmc] CDI.KEYID = 6
14,296,188 UART: [afmc] SUBJECT.KEYID = 7
14,297,409 UART: [afmc] AUTHORITY.KEYID = 5
16,831,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,557,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,731 UART: [afmc] --
18,630,786 UART: [cold-reset] --
18,634,002 UART: [state] Locking Datavault
18,639,580 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,226 UART: [state] Locking ICCM
18,643,974 UART: [exit] Launching FMC @ 0x40000130
18,652,361 UART:
18,652,605 UART: Running Caliptra FMC ...
18,653,708 UART:
18,653,874 UART: [state] CFI Enabled
18,715,158 UART: [fht] FMC Alias Private Key: 7
20,478,955 UART: [art] Extend RT PCRs Done
20,480,165 UART: [art] Lock RT PCRs Done
20,481,464 UART: [art] Populate DV Done
20,486,820 UART: [fht] FMC Alias Private Key: 7
20,488,508 UART: [art] Derive CDI
20,489,334 UART: [art] Store in in slot 0x4
20,547,892 UART: [art] Derive Key Pair
20,548,885 UART: [art] Store priv key in slot 0x5
23,012,031 UART: [art] Derive Key Pair - Done
23,025,239 UART: [art] Signing Cert with AUTHO
23,026,543 UART: RITY.KEYID = 7
24,737,664 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,173 UART: [art] PUB.X = B4E2EC702FAADCFC1A4A16F974B5D42DAD854CCAC9359194DF481FC00FFDBCB7C15DAF1062F28E5038F358C1EF476E20
24,746,466 UART: [art] PUB.Y = 839CBD13E1ECDE2F04F0E669095F36D7FBC8F3B592AA71DB2FE6C852ECEB829B8E0D70831A17931ACF61E818B4430388
24,753,739 UART: [art] SIG.R = C7C9F8B0408AA370D8B7723195AA786D4DE63BA64F473534D319B95944A50A81F19FBA6C3C0DE00CFD50B0F68C1917F1
24,761,122 UART: [art] SIG.S = 07343794FD45611A1FA143E6C26D1573BEFB5CE4E793D9475DFEABE4040768ECEDAF52A2D501FDE8E377987B7D8FD049
25,740,055 UART: Caliptra RT
25,740,766 UART: [state] CFI Enabled
25,905,422 UART: [rt] RT listening for mailbox commands...
25,907,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,063,210 UART: [rt]cmd =0x41544d4e, len=14344
29,993,682 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
192,558 UART:
192,932 UART: Running Caliptra ROM ...
194,126 UART:
194,282 UART: [state] CFI Enabled
262,954 UART: [state] LifecycleState = Unprovisioned
265,373 UART: [state] DebugLocked = No
267,112 UART: [state] WD Timer not started. Device not locked for debugging
271,701 UART: [kat] SHA2-256
461,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,337 UART: [kat] ++
472,789 UART: [kat] sha1
485,010 UART: [kat] SHA2-256
488,024 UART: [kat] SHA2-384
494,658 UART: [kat] SHA2-512-ACC
497,246 UART: [kat] ECC-384
2,947,680 UART: [kat] HMAC-384Kdf
2,970,669 UART: [kat] LMS
3,502,453 UART: [kat] --
3,506,816 UART: [cold-reset] ++
3,508,396 UART: [fht] FHT @ 0x50003400
3,520,391 UART: [idev] ++
3,521,098 UART: [idev] CDI.KEYID = 6
3,521,984 UART: [idev] SUBJECT.KEYID = 7
3,523,230 UART: [idev] UDS.KEYID = 0
3,524,162 ready_for_fw is high
3,524,367 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,277 UART: [idev] Erasing UDS.KEYID = 0
6,030,237 UART: [idev] Sha1 KeyId Algorithm
6,053,197 UART: [idev] --
6,058,573 UART: [ldev] ++
6,059,261 UART: [ldev] CDI.KEYID = 6
6,060,176 UART: [ldev] SUBJECT.KEYID = 5
6,061,338 UART: [ldev] AUTHORITY.KEYID = 7
6,062,569 UART: [ldev] FE.KEYID = 1
6,099,842 UART: [ldev] Erasing FE.KEYID = 1
8,609,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,521 UART: [ldev] --
10,416,358 UART: [fwproc] Wait for Commands...
10,418,401 UART: [fwproc] Recv command 0x46574c44
10,420,709 UART: [fwproc] Recv'd Img size: 114360 bytes
13,870,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,608,220 >>> mbox cmd response: success
14,612,557 UART: [afmc] ++
14,613,268 UART: [afmc] CDI.KEYID = 6
14,614,438 UART: [afmc] SUBJECT.KEYID = 7
14,615,934 UART: [afmc] AUTHORITY.KEYID = 5
17,150,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,748 UART: [afmc] --
18,953,052 UART: [cold-reset] --
18,957,792 UART: [state] Locking Datavault
18,963,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,258 UART: [state] Locking ICCM
18,966,988 UART: [exit] Launching FMC @ 0x40000130
18,975,674 UART:
18,975,911 UART: Running Caliptra FMC ...
18,977,011 UART:
18,977,168 UART: [state] CFI Enabled
19,033,382 UART: [fht] FMC Alias Private Key: 7
20,797,399 UART: [art] Extend RT PCRs Done
20,798,605 UART: [art] Lock RT PCRs Done
20,800,223 UART: [art] Populate DV Done
20,805,745 UART: [fht] FMC Alias Private Key: 7
20,807,284 UART: [art] Derive CDI
20,808,102 UART: [art] Store in in slot 0x4
20,865,781 UART: [art] Derive Key Pair
20,866,836 UART: [art] Store priv key in slot 0x5
23,330,361 UART: [art] Derive Key Pair - Done
23,343,331 UART: [art] Signing Cert with AUTHO
23,344,634 UART: RITY.KEYID = 7
25,069,875 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,360 UART: [art] PUB.X = 8AA7AEF4ED7AA4BF87C01607B33C30A6557CD26A88B1B97CFA67E1EFC645579E686FEAA688846C0902043C6705345445
25,078,641 UART: [art] PUB.Y = 6426DB31E33AE11479307AECEF040EF6648A9F5ECB37C1DBA5AC1125383C9CF9A3FCC4F06FA5E6882C795039FF5065B2
25,085,907 UART: [art] SIG.R = 0D98AE2824500664827DDF521BC103AA4D5BCFBE3D53F21F3076BC9195CF1D37FEDF24FF45D19EC383102B6C2DA0BB86
25,093,351 UART: [art] SIG.S = 15C21BD36A541890A7942313B58CDD7A601EEBACF975038740AB7192BB704D68BBDBE67E0299FA4C9EDFC40522752FEF
26,071,606 UART: Caliptra RT
26,072,322 UART: [state] CFI Enabled
26,237,205 UART: [rt] RT listening for mailbox commands...
26,239,532 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,394,743 UART: [rt]cmd =0x41544d4e, len=14344
30,325,883 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
3,440,330 ready_for_fw is high
3,440,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,740,387 >>> mbox cmd response: success
19,023,909 UART:
19,024,313 UART: Running Caliptra FMC ...
19,025,462 UART:
19,025,625 UART: [state] CFI Enabled
19,092,650 UART: [fht] FMC Alias Private Key: 7
20,856,216 UART: [art] Extend RT PCRs Done
20,857,461 UART: [art] Lock RT PCRs Done
20,859,253 UART: [art] Populate DV Done
20,864,665 UART: [fht] FMC Alias Private Key: 7
20,866,205 UART: [art] Derive CDI
20,866,942 UART: [art] Store in in slot 0x4
20,925,150 UART: [art] Derive Key Pair
20,926,205 UART: [art] Store priv key in slot 0x5
23,389,402 UART: [art] Derive Key Pair - Done
23,402,463 UART: [art] Signing Cert with AUTHO
23,403,761 UART: RITY.KEYID = 7
25,114,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,353 UART: [art] PUB.X = 81CEAB437AD8B7918F97FA7BCC76553DD063CD6A11FD3473B8D1E4A728EFFBD5A47C8262B4353DA817774B1FCB847103
25,123,638 UART: [art] PUB.Y = 23B0923061FD2A97C0583B71BC5CD4D29967F7137000C513F5144C04339551D96D6E8FE2BDE95685E2B48E2B62F907A6
25,130,870 UART: [art] SIG.R = C18646232D9E74BADFA90D7B56A7035051D1ACBFB563E42F498522E1D505929AB60E185D2A1A093F716CD66B3A807486
25,138,231 UART: [art] SIG.S = 6283C1299338C3D98F63353EFF1EF48CDB763B040717C2FB3B7DA2BF545FB3A786496AF8384330ABC8F9B0F0BF75BFBB
26,117,381 UART: Caliptra RT
26,118,104 UART: [state] CFI Enabled
26,282,949 UART: [rt] RT listening for mailbox commands...
26,285,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,440,519 UART: [rt]cmd =0x41544d4e, len=14344
30,371,211 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,434 UART:
192,823 UART: Running Caliptra ROM ...
193,954 UART:
603,674 UART: [state] CFI Enabled
621,243 UART: [state] LifecycleState = Unprovisioned
623,620 UART: [state] DebugLocked = No
625,649 UART: [state] WD Timer not started. Device not locked for debugging
630,700 UART: [kat] SHA2-256
820,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,402 UART: [kat] ++
831,849 UART: [kat] sha1
844,848 UART: [kat] SHA2-256
847,853 UART: [kat] SHA2-384
854,551 UART: [kat] SHA2-512-ACC
857,124 UART: [kat] ECC-384
3,296,375 UART: [kat] HMAC-384Kdf
3,309,395 UART: [kat] LMS
3,841,237 UART: [kat] --
3,845,668 UART: [cold-reset] ++
3,847,382 UART: [fht] FHT @ 0x50003400
3,859,778 UART: [idev] ++
3,860,487 UART: [idev] CDI.KEYID = 6
3,861,398 UART: [idev] SUBJECT.KEYID = 7
3,862,656 UART: [idev] UDS.KEYID = 0
3,863,581 ready_for_fw is high
3,863,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,879 UART: [idev] Erasing UDS.KEYID = 0
6,340,781 UART: [idev] Sha1 KeyId Algorithm
6,362,336 UART: [idev] --
6,365,921 UART: [ldev] ++
6,366,602 UART: [ldev] CDI.KEYID = 6
6,367,511 UART: [ldev] SUBJECT.KEYID = 5
6,368,669 UART: [ldev] AUTHORITY.KEYID = 7
6,369,899 UART: [ldev] FE.KEYID = 1
6,379,195 UART: [ldev] Erasing FE.KEYID = 1
8,859,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,886 UART: [ldev] --
10,649,986 UART: [fwproc] Wait for Commands...
10,651,480 UART: [fwproc] Recv command 0x46574c44
10,653,464 UART: [fwproc] Recv'd Img size: 114360 bytes
14,100,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,841,358 >>> mbox cmd response: success
14,844,656 UART: [afmc] ++
14,845,368 UART: [afmc] CDI.KEYID = 6
14,846,562 UART: [afmc] SUBJECT.KEYID = 7
14,847,998 UART: [afmc] AUTHORITY.KEYID = 5
17,357,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,886 UART: [afmc] --
19,156,733 UART: [cold-reset] --
19,160,538 UART: [state] Locking Datavault
19,165,564 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,752 UART: [state] Locking ICCM
19,170,197 UART: [exit] Launching FMC @ 0x40000130
19,178,859 UART:
19,179,091 UART: Running Caliptra FMC ...
19,180,187 UART:
19,180,341 UART: [state] CFI Enabled
19,188,649 UART: [fht] FMC Alias Private Key: 7
20,945,764 UART: [art] Extend RT PCRs Done
20,946,986 UART: [art] Lock RT PCRs Done
20,948,714 UART: [art] Populate DV Done
20,953,916 UART: [fht] FMC Alias Private Key: 7
20,955,453 UART: [art] Derive CDI
20,956,183 UART: [art] Store in in slot 0x4
20,998,883 UART: [art] Derive Key Pair
20,999,924 UART: [art] Store priv key in slot 0x5
23,426,852 UART: [art] Derive Key Pair - Done
23,439,916 UART: [art] Signing Cert with AUTHO
23,441,220 UART: RITY.KEYID = 7
25,146,479 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,980 UART: [art] PUB.X = A165BA88024C13D4A6C8622247626BFAF2C6ED144FE12F880BC063496D203E6BA320C82CB9D3361714E163DD76B89D1B
25,155,266 UART: [art] PUB.Y = 866A8A1A69E0B45D7C5BA451F19884C2615200A3043090CD49980E0A6E32060D02EB303C037987600268A2B423B0C7A1
25,162,511 UART: [art] SIG.R = 963328801967339C06A8580607A83AD40A7B97B56CCA08487ACFDF30A807E616F00610ABBFA32B57959E5DE6D07E939B
25,169,848 UART: [art] SIG.S = 33CB803B123AEE53C5F50EB3D3D5D99824962BDAB27F51765B10457FBF60549F85BE2E90936CF960304BEE257CC7FF57
26,149,039 UART: Caliptra RT
26,149,742 UART: [state] CFI Enabled
26,267,956 UART: [rt] RT listening for mailbox commands...
26,270,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,425,743 UART: [rt]cmd =0x41544d4e, len=14344
30,356,478 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,757,649 ready_for_fw is high
3,758,102 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,946,701 >>> mbox cmd response: success
19,199,038 UART:
19,199,430 UART: Running Caliptra FMC ...
19,200,518 UART:
19,200,687 UART: [state] CFI Enabled
19,208,337 UART: [fht] FMC Alias Private Key: 7
20,965,299 UART: [art] Extend RT PCRs Done
20,966,516 UART: [art] Lock RT PCRs Done
20,968,518 UART: [art] Populate DV Done
20,973,916 UART: [fht] FMC Alias Private Key: 7
20,975,616 UART: [art] Derive CDI
20,976,431 UART: [art] Store in in slot 0x4
21,019,164 UART: [art] Derive Key Pair
21,020,233 UART: [art] Store priv key in slot 0x5
23,447,304 UART: [art] Derive Key Pair - Done
23,460,091 UART: [art] Signing Cert with AUTHO
23,461,399 UART: RITY.KEYID = 7
25,166,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,263 UART: [art] PUB.X = 4FC3B346AE810C8CB9D4BC7B1A472661E6FBFFCCEDAEDD8577DEFCB9B4F3998415E9137EFCC09FC2F3D4BF25931C8FA8
25,175,578 UART: [art] PUB.Y = 5C2CCD6EFA26E8009185FAE5ACD3CCB031DD209DD7896E974EB3832C700841FA934ADF42B2E12231284AC08F4D2B0B7D
25,182,865 UART: [art] SIG.R = 2653E7D606D63DA5C9044C0AE5B8E959BB9B8D66B2F7DD542447A4472A691F5978EDF087AB70A933CD5AED2F31A27FD9
25,190,266 UART: [art] SIG.S = 6E307A685FAADE5E7E73D769F228C95D090DC9DBBC6EA30C95225E1E00E72C00B814108F25C7E8959C4545F4D3EFC276
26,168,799 UART: Caliptra RT
26,169,505 UART: [state] CFI Enabled
26,286,861 UART: [rt] RT listening for mailbox commands...
26,289,201 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,444,426 UART: [rt]cmd =0x41544d4e, len=14344
30,375,169 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Unprovisioned
86,357 UART: [state] DebugLocked = No
86,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,541 UART: [kat] SHA2-256
882,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,587 UART: [kat] ++
886,739 UART: [kat] sha1
891,023 UART: [kat] SHA2-256
892,961 UART: [kat] SHA2-384
895,702 UART: [kat] SHA2-512-ACC
897,603 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,632 UART: [kat] LMS
1,475,828 UART: [kat] --
1,476,707 UART: [cold-reset] ++
1,477,079 UART: [fht] Storing FHT @ 0x50003400
1,479,822 UART: [idev] ++
1,479,990 UART: [idev] CDI.KEYID = 6
1,480,350 UART: [idev] SUBJECT.KEYID = 7
1,480,774 UART: [idev] UDS.KEYID = 0
1,481,119 ready_for_fw is high
1,481,119 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,544 UART: [idev] Erasing UDS.KEYID = 0
1,504,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,722 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,520,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,988 UART: [ldev] --
1,585,467 UART: [fwproc] Waiting for Commands...
1,586,232 UART: [fwproc] Received command 0x46574c44
1,587,023 UART: [fwproc] Received Image of size 114360 bytes
2,884,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,853 >>> mbox cmd response: success
3,079,007 UART: [afmc] ++
3,079,175 UART: [afmc] CDI.KEYID = 6
3,079,537 UART: [afmc] SUBJECT.KEYID = 7
3,079,962 UART: [afmc] AUTHORITY.KEYID = 5
3,114,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,869 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,377 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,262 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,952 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,903 UART: [afmc] --
3,157,893 UART: [cold-reset] --
3,158,909 UART: [state] Locking Datavault
3,160,174 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,778 UART: [state] Locking ICCM
3,161,426 UART: [exit] Launching FMC @ 0x40000130
3,166,755 UART:
3,166,771 UART: Running Caliptra FMC ...
3,167,179 UART:
3,167,233 UART: [state] CFI Enabled
3,178,082 UART: [fht] FMC Alias Private Key: 7
3,285,629 UART: [art] Extend RT PCRs Done
3,286,057 UART: [art] Lock RT PCRs Done
3,287,655 UART: [art] Populate DV Done
3,296,004 UART: [fht] FMC Alias Private Key: 7
3,297,100 UART: [art] Derive CDI
3,297,380 UART: [art] Store in in slot 0x4
3,383,081 UART: [art] Derive Key Pair
3,383,441 UART: [art] Store priv key in slot 0x5
3,396,189 UART: [art] Derive Key Pair - Done
3,410,731 UART: [art] Signing Cert with AUTHO
3,411,211 UART: RITY.KEYID = 7
3,426,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,962 UART: [art] PUB.X = 7A7A6718AF2D2E77A87C08AB3CFE5E2C87166868A2E69AAE4A39DF24B2899369A026241D22591F7441FF8D2DB886B14B
3,433,735 UART: [art] PUB.Y = 2241CCB1C1E33A5AD31B488B6217DA48C670EFD682CDD991BADD50AEA79D5F3435839B5CF05237CAE22AC592537FE722
3,440,699 UART: [art] SIG.R = AF4E4F4066B65DD30E8D2895508917A085787BE034664545D15704CB61B105F367E80DF697B75E185BA50386B853225E
3,447,444 UART: [art] SIG.S = 7AE4785E457C81BDB3DF631A8C0236F830F27241F8275D6FAFF0AF93356020F5B86538BBD6D38990302C124A62721951
3,470,982 UART: Caliptra RT
3,471,236 UART: [state] CFI Enabled
3,578,764 UART: [rt] RT listening for mailbox commands...
3,579,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,173 UART: [rt]cmd =0x41544d4e, len=14344
3,847,137 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,809 ready_for_fw is high
1,361,809 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,617 >>> mbox cmd response: success
2,989,163 UART:
2,989,179 UART: Running Caliptra FMC ...
2,989,587 UART:
2,989,641 UART: [state] CFI Enabled
3,000,084 UART: [fht] FMC Alias Private Key: 7
3,108,155 UART: [art] Extend RT PCRs Done
3,108,583 UART: [art] Lock RT PCRs Done
3,110,043 UART: [art] Populate DV Done
3,118,242 UART: [fht] FMC Alias Private Key: 7
3,119,212 UART: [art] Derive CDI
3,119,492 UART: [art] Store in in slot 0x4
3,204,841 UART: [art] Derive Key Pair
3,205,201 UART: [art] Store priv key in slot 0x5
3,218,723 UART: [art] Derive Key Pair - Done
3,233,277 UART: [art] Signing Cert with AUTHO
3,233,757 UART: RITY.KEYID = 7
3,248,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,608 UART: [art] PUB.X = 87756B33040D65F0A495B61EF9335C5E225387D23C7C5B452DC7D5F41C197E80A56CA071F38CC8C8C55F67AEC9CE17E2
3,256,378 UART: [art] PUB.Y = 8ACDE885CB88BD5368AB3DAC962FDBAD1D78BA394301BB0136B1CC3638636EEF4C14E46772B3F27F5D75643328E82824
3,263,332 UART: [art] SIG.R = B99083CB176B7D527B986E581202977C4456C949F380C39D3D14547FA8D0F40F16AA08F35B3CCF047C892BDBF3B9513F
3,270,092 UART: [art] SIG.S = 83307E89D6F6FB59C0217FA9C71A173F239E05C2C1DDEA0B002333DE1F964262DD5B96AAD678355F59F50D4FE627056E
3,293,341 UART: Caliptra RT
3,293,595 UART: [state] CFI Enabled
3,401,654 UART: [rt] RT listening for mailbox commands...
3,402,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,921 UART: [rt]cmd =0x41544d4e, len=14344
3,669,819 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,110 UART: [kat] SHA2-256
882,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,156 UART: [kat] ++
886,308 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,113 UART: [kat] SHA2-512-ACC
897,014 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,393 UART: [kat] LMS
1,475,589 UART: [kat] --
1,476,210 UART: [cold-reset] ++
1,476,694 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 ready_for_fw is high
1,480,784 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,497 UART: [idev] Erasing UDS.KEYID = 0
1,504,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,245 UART: [idev] --
1,514,444 UART: [ldev] ++
1,514,612 UART: [ldev] CDI.KEYID = 6
1,514,975 UART: [ldev] SUBJECT.KEYID = 5
1,515,401 UART: [ldev] AUTHORITY.KEYID = 7
1,515,864 UART: [ldev] FE.KEYID = 1
1,521,250 UART: [ldev] Erasing FE.KEYID = 1
1,547,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,925 UART: [ldev] --
1,586,234 UART: [fwproc] Waiting for Commands...
1,586,995 UART: [fwproc] Received command 0x46574c44
1,587,786 UART: [fwproc] Received Image of size 114360 bytes
2,885,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,488 >>> mbox cmd response: success
3,078,594 UART: [afmc] ++
3,078,762 UART: [afmc] CDI.KEYID = 6
3,079,124 UART: [afmc] SUBJECT.KEYID = 7
3,079,549 UART: [afmc] AUTHORITY.KEYID = 5
3,114,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,647 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,337 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,238 UART: [afmc] --
3,157,308 UART: [cold-reset] --
3,158,226 UART: [state] Locking Datavault
3,159,523 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,127 UART: [state] Locking ICCM
3,160,765 UART: [exit] Launching FMC @ 0x40000130
3,166,094 UART:
3,166,110 UART: Running Caliptra FMC ...
3,166,518 UART:
3,166,661 UART: [state] CFI Enabled
3,177,218 UART: [fht] FMC Alias Private Key: 7
3,285,631 UART: [art] Extend RT PCRs Done
3,286,059 UART: [art] Lock RT PCRs Done
3,287,977 UART: [art] Populate DV Done
3,296,090 UART: [fht] FMC Alias Private Key: 7
3,297,038 UART: [art] Derive CDI
3,297,318 UART: [art] Store in in slot 0x4
3,382,807 UART: [art] Derive Key Pair
3,383,167 UART: [art] Store priv key in slot 0x5
3,396,531 UART: [art] Derive Key Pair - Done
3,411,234 UART: [art] Signing Cert with AUTHO
3,411,714 UART: RITY.KEYID = 7
3,427,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,821 UART: [art] PUB.X = 74A6070427F611B1FCDE308856C5C5102A8AA60C12675C807BEE6DB4A84D01FD763ED4F78DA9746A3598EF4D092E68C8
3,434,582 UART: [art] PUB.Y = 71893413E40DC7130F70E956177F942FCC7BECA4DEA3F7E66981CD417013E8C3234F708EBC7F73AA70514B919BEE4FB8
3,441,534 UART: [art] SIG.R = 2DEC98DB225E071099A3FEB383E2F131888CF8195BD9A8ACD0A621D15F703FDB9D76FBA58872D3BEEFE492590A722402
3,448,307 UART: [art] SIG.S = 6F0470BB86A838055E63A69DCE3A5800433CC6DFCE0927093287AB79B17CE293BE3AC5B82DDD1D1AB39B481462F8D96B
3,472,526 UART: Caliptra RT
3,472,872 UART: [state] CFI Enabled
3,581,233 UART: [rt] RT listening for mailbox commands...
3,581,903 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,778 UART: [rt]cmd =0x41544d4e, len=14344
3,849,404 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,958 ready_for_fw is high
1,362,958 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,198 >>> mbox cmd response: success
2,991,454 UART:
2,991,470 UART: Running Caliptra FMC ...
2,991,878 UART:
2,992,021 UART: [state] CFI Enabled
3,002,852 UART: [fht] FMC Alias Private Key: 7
3,110,771 UART: [art] Extend RT PCRs Done
3,111,199 UART: [art] Lock RT PCRs Done
3,112,603 UART: [art] Populate DV Done
3,120,888 UART: [fht] FMC Alias Private Key: 7
3,121,846 UART: [art] Derive CDI
3,122,126 UART: [art] Store in in slot 0x4
3,207,841 UART: [art] Derive Key Pair
3,208,201 UART: [art] Store priv key in slot 0x5
3,221,637 UART: [art] Derive Key Pair - Done
3,236,576 UART: [art] Signing Cert with AUTHO
3,237,056 UART: RITY.KEYID = 7
3,252,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,103 UART: [art] PUB.X = F039117AC40354C468A03F94138C7FAA30126C148DA4CC8191FF66D3E147291EFA1FC8B067A1FCEFC49F8639155F6ACC
3,259,880 UART: [art] PUB.Y = D2150DDA7FAD8D0E9E4027120D167C71F03FD8078FA3A7643C9E8C83887921263A8442EF433AC46E0D99CFC2F37171CC
3,266,821 UART: [art] SIG.R = 8139B0D3EDBC2069D00A127CFA7E1BEA4F96F813FD1E772B0A99605781958652C55219E916465837AD0EEA7B86B572BA
3,273,586 UART: [art] SIG.S = F2EA0CC7202E480BDF588195D968BFAE156F4C0AD24F4AB423BA4E55D8DDC5638FB3814FF870DBF082A9F179B64C365B
3,297,018 UART: Caliptra RT
3,297,364 UART: [state] CFI Enabled
3,406,177 UART: [rt] RT listening for mailbox commands...
3,406,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,610 UART: [rt]cmd =0x41544d4e, len=14344
3,674,022 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
893,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,227 UART: [kat] ++
897,379 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
918,038 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,172,065 UART: [cold-reset] ++
1,172,553 UART: [fht] FHT @ 0x50003400
1,175,282 UART: [idev] ++
1,175,450 UART: [idev] CDI.KEYID = 6
1,175,810 UART: [idev] SUBJECT.KEYID = 7
1,176,234 UART: [idev] UDS.KEYID = 0
1,176,579 ready_for_fw is high
1,176,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,480 UART: [idev] Erasing UDS.KEYID = 0
1,201,395 UART: [idev] Sha1 KeyId Algorithm
1,209,839 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,355 UART: [ldev] Erasing FE.KEYID = 1
1,243,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,807 UART: [ldev] --
1,283,310 UART: [fwproc] Wait for Commands...
1,283,906 UART: [fwproc] Recv command 0x46574c44
1,284,634 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,626 >>> mbox cmd response: success
2,776,882 UART: [afmc] ++
2,777,050 UART: [afmc] CDI.KEYID = 6
2,777,412 UART: [afmc] SUBJECT.KEYID = 7
2,777,837 UART: [afmc] AUTHORITY.KEYID = 5
2,813,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,405 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,431 UART: [afmc] --
2,857,445 UART: [cold-reset] --
2,858,315 UART: [state] Locking Datavault
2,859,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,088 UART: [state] Locking ICCM
2,860,752 UART: [exit] Launching FMC @ 0x40000130
2,866,081 UART:
2,866,097 UART: Running Caliptra FMC ...
2,866,505 UART:
2,866,559 UART: [state] CFI Enabled
2,877,082 UART: [fht] FMC Alias Private Key: 7
2,984,793 UART: [art] Extend RT PCRs Done
2,985,221 UART: [art] Lock RT PCRs Done
2,986,849 UART: [art] Populate DV Done
2,995,080 UART: [fht] FMC Alias Private Key: 7
2,996,232 UART: [art] Derive CDI
2,996,512 UART: [art] Store in in slot 0x4
3,082,245 UART: [art] Derive Key Pair
3,082,605 UART: [art] Store priv key in slot 0x5
3,096,027 UART: [art] Derive Key Pair - Done
3,110,866 UART: [art] Signing Cert with AUTHO
3,111,346 UART: RITY.KEYID = 7
3,126,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,989 UART: [art] PUB.X = 582D53049611D414A285D0EBC710F20C6CA82A98B13417781DC97A5F3ABEBBC474A205A6D77B8A74A0558B1293AABF7B
3,133,758 UART: [art] PUB.Y = A3C11064EDFDB82847338FA2E7646D5A844C030E052B01174FCA02193AF7FC0AF2DF79ACCF1FEC45418B97795B2AC96F
3,140,704 UART: [art] SIG.R = E1C7665134247B8AC7832838AEBCB0962CAAF65D75A617F09E4810DFB32167D1B85339C33720889468C9949DDBA30F56
3,147,469 UART: [art] SIG.S = 0685066A5310100091D0E44DBC3174F08F48ED3D51F6DAAB91B3A9F0A0A8D44CBF201CCCE54616E8A1DE95B79E246CA4
3,171,952 UART: Caliptra RT
3,172,206 UART: [state] CFI Enabled
3,281,088 UART: [rt] RT listening for mailbox commands...
3,281,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,531 UART: [rt]cmd =0x41544d4e, len=14344
3,549,445 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,993 ready_for_fw is high
1,059,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,907 >>> mbox cmd response: success
2,688,201 UART:
2,688,217 UART: Running Caliptra FMC ...
2,688,625 UART:
2,688,679 UART: [state] CFI Enabled
2,699,472 UART: [fht] FMC Alias Private Key: 7
2,807,389 UART: [art] Extend RT PCRs Done
2,807,817 UART: [art] Lock RT PCRs Done
2,809,247 UART: [art] Populate DV Done
2,817,472 UART: [fht] FMC Alias Private Key: 7
2,818,646 UART: [art] Derive CDI
2,818,926 UART: [art] Store in in slot 0x4
2,904,727 UART: [art] Derive Key Pair
2,905,087 UART: [art] Store priv key in slot 0x5
2,917,649 UART: [art] Derive Key Pair - Done
2,932,535 UART: [art] Signing Cert with AUTHO
2,933,015 UART: RITY.KEYID = 7
2,947,827 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,592 UART: [art] PUB.X = 561328AD759B04F37A49492A23A86D7A17A6078EF5F4CE66CFDBC69661947CBFF77DB1148705FD45CD737B7F43FC7B49
2,955,361 UART: [art] PUB.Y = 7EA382839FE452246AD3FAFBB06E70FDE5045BD97204A1B400E9A6C933171FCC851BE277B909C45228232DD0BDE19707
2,962,283 UART: [art] SIG.R = EE914F1AC547E69D2D777D28354C9D20E32E3693D7CA88A9DDC029DEAF2266E1EF14C4384F5BF0A47B97F586F9F84B3A
2,969,067 UART: [art] SIG.S = FB56686FFBDD86A42EA7F4C44A28993458246FF61E55569995752F71F0A29C2BABC1144CA0AF8C7C45DC408DDF3275A3
2,992,304 UART: Caliptra RT
2,992,558 UART: [state] CFI Enabled
3,100,157 UART: [rt] RT listening for mailbox commands...
3,100,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,550 UART: [rt]cmd =0x41544d4e, len=14344
3,368,368 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
893,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,278 UART: [kat] ++
897,430 UART: [kat] sha1
901,594 UART: [kat] SHA2-256
903,534 UART: [kat] SHA2-384
906,117 UART: [kat] SHA2-512-ACC
908,018 UART: [kat] ECC-384
917,557 UART: [kat] HMAC-384Kdf
922,223 UART: [kat] LMS
1,170,551 UART: [kat] --
1,171,586 UART: [cold-reset] ++
1,171,952 UART: [fht] FHT @ 0x50003400
1,174,771 UART: [idev] ++
1,174,939 UART: [idev] CDI.KEYID = 6
1,175,299 UART: [idev] SUBJECT.KEYID = 7
1,175,723 UART: [idev] UDS.KEYID = 0
1,176,068 ready_for_fw is high
1,176,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,845 UART: [idev] Erasing UDS.KEYID = 0
1,200,990 UART: [idev] Sha1 KeyId Algorithm
1,209,492 UART: [idev] --
1,210,350 UART: [ldev] ++
1,210,518 UART: [ldev] CDI.KEYID = 6
1,210,881 UART: [ldev] SUBJECT.KEYID = 5
1,211,307 UART: [ldev] AUTHORITY.KEYID = 7
1,211,770 UART: [ldev] FE.KEYID = 1
1,216,986 UART: [ldev] Erasing FE.KEYID = 1
1,243,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,904 UART: [ldev] --
1,282,397 UART: [fwproc] Wait for Commands...
1,283,131 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,042 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,913 >>> mbox cmd response: success
2,775,035 UART: [afmc] ++
2,775,203 UART: [afmc] CDI.KEYID = 6
2,775,565 UART: [afmc] SUBJECT.KEYID = 7
2,775,990 UART: [afmc] AUTHORITY.KEYID = 5
2,811,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,793 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,512 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,544 UART: [afmc] --
2,855,460 UART: [cold-reset] --
2,856,072 UART: [state] Locking Datavault
2,857,211 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,815 UART: [state] Locking ICCM
2,858,313 UART: [exit] Launching FMC @ 0x40000130
2,863,642 UART:
2,863,658 UART: Running Caliptra FMC ...
2,864,066 UART:
2,864,209 UART: [state] CFI Enabled
2,874,886 UART: [fht] FMC Alias Private Key: 7
2,982,809 UART: [art] Extend RT PCRs Done
2,983,237 UART: [art] Lock RT PCRs Done
2,984,973 UART: [art] Populate DV Done
2,993,356 UART: [fht] FMC Alias Private Key: 7
2,994,472 UART: [art] Derive CDI
2,994,752 UART: [art] Store in in slot 0x4
3,080,561 UART: [art] Derive Key Pair
3,080,921 UART: [art] Store priv key in slot 0x5
3,094,165 UART: [art] Derive Key Pair - Done
3,108,656 UART: [art] Signing Cert with AUTHO
3,109,136 UART: RITY.KEYID = 7
3,124,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,931 UART: [art] PUB.X = 2E2BD4C4364F91CD45C5F798E14D3E9455189633A2D5B1FD49F8DCAEE7D268B16294DE020F2CFEEF0318034F8E4CB009
3,131,698 UART: [art] PUB.Y = BC9D7843CC6956AA649C090E8A586B2058B2749A9DF6D4F13395E1B771D4F6C205AF14D08F70338A93119845AC2545C0
3,138,637 UART: [art] SIG.R = 1ED501F88F97BAA2A6C3CED9AB1B08A4AFC4A403C6FAB970DDFFED7FB48D0A8150821402F9C3F874C38825ED6B0E96C9
3,145,413 UART: [art] SIG.S = 57595F7E1CE8E99C294B47934E8BF1691D2DC62EC322AF29BD5F04CCDB3347CB92C2201069AE1A43BF40415F1EEDE7C5
3,169,265 UART: Caliptra RT
3,169,611 UART: [state] CFI Enabled
3,276,677 UART: [rt] RT listening for mailbox commands...
3,277,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,206 UART: [rt]cmd =0x41544d4e, len=14344
3,545,220 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,244 ready_for_fw is high
1,061,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,784 >>> mbox cmd response: success
2,691,568 UART:
2,691,584 UART: Running Caliptra FMC ...
2,691,992 UART:
2,692,135 UART: [state] CFI Enabled
2,702,668 UART: [fht] FMC Alias Private Key: 7
2,810,523 UART: [art] Extend RT PCRs Done
2,810,951 UART: [art] Lock RT PCRs Done
2,812,327 UART: [art] Populate DV Done
2,820,664 UART: [fht] FMC Alias Private Key: 7
2,821,836 UART: [art] Derive CDI
2,822,116 UART: [art] Store in in slot 0x4
2,908,107 UART: [art] Derive Key Pair
2,908,467 UART: [art] Store priv key in slot 0x5
2,921,505 UART: [art] Derive Key Pair - Done
2,936,343 UART: [art] Signing Cert with AUTHO
2,936,823 UART: RITY.KEYID = 7
2,952,019 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,784 UART: [art] PUB.X = E04FF0F1F5ECE4CB7A83650831E59FA4D8F4CBD1392A5491C4714D1C52BF86F6579DD5E8F1D024F53446B42881CDB8B3
2,959,563 UART: [art] PUB.Y = 7CAAFA34588967DF6D79BAFDA7D2296457D27F15FDAAD8928677F11E87B1D8424315900FD6E8D05148FDA8E36F339F84
2,966,518 UART: [art] SIG.R = B6218945198EE76C8372BB11F42096A1908DB1EF534676793DE01BD8E3C816E53CC8655F841C59421484035CBC73AFCD
2,973,283 UART: [art] SIG.S = E7504E81112DF060A583059779E39DA0B32997AD826B88021328E48F86F7B77A4FB69D8B0B0DF2691C8847ECA688D9B3
2,996,798 UART: Caliptra RT
2,997,144 UART: [state] CFI Enabled
3,104,663 UART: [rt] RT listening for mailbox commands...
3,105,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,956 UART: [rt]cmd =0x41544d4e, len=14344
3,372,392 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,169,977 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,173,831 ready_for_fw is high
1,173,831 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,231 UART: [idev] Sha1 KeyId Algorithm
1,207,241 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,830 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,748 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,536 >>> mbox cmd response: success
2,773,745 UART: [afmc] ++
2,773,913 UART: [afmc] CDI.KEYID = 6
2,774,276 UART: [afmc] SUBJECT.KEYID = 7
2,774,702 UART: [afmc] AUTHORITY.KEYID = 5
2,810,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,058 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,777 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,646 UART: [afmc] --
2,853,764 UART: [cold-reset] --
2,854,538 UART: [state] Locking Datavault
2,855,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,227 UART: [state] Locking ICCM
2,856,737 UART: [exit] Launching FMC @ 0x40000130
2,862,066 UART:
2,862,082 UART: Running Caliptra FMC ...
2,862,490 UART:
2,862,544 UART: [state] CFI Enabled
2,873,329 UART: [fht] FMC Alias Private Key: 7
2,981,216 UART: [art] Extend RT PCRs Done
2,981,644 UART: [art] Lock RT PCRs Done
2,983,426 UART: [art] Populate DV Done
2,991,543 UART: [fht] FMC Alias Private Key: 7
2,992,603 UART: [art] Derive CDI
2,992,883 UART: [art] Store in in slot 0x4
3,078,626 UART: [art] Derive Key Pair
3,078,986 UART: [art] Store priv key in slot 0x5
3,092,642 UART: [art] Derive Key Pair - Done
3,107,515 UART: [art] Signing Cert with AUTHO
3,107,995 UART: RITY.KEYID = 7
3,122,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,536 UART: [art] PUB.X = 5917F46EDE165C944F12F21DB11F53F4C8DF856189D1AE33B29E06792339FAD21796C2F6165FC7C49C84BD0534953E41
3,130,300 UART: [art] PUB.Y = A92D3B0807630D22FCF50457EE653A64324E9164340F1F1A7F08FA3F5F99543A1D52AC34FD7E21892471EFE87AE6BB69
3,137,236 UART: [art] SIG.R = F6B59F827A9CC3EA58D701AE2B2A9FDB89D1F410C912DA7A980CD41D4929D10A5F3912633E46192089308A7E057487E1
3,143,996 UART: [art] SIG.S = 3FED94BE99EF48F84CE78B668FE1A51F8631AB6F1EB3C89236D008AAF41374D4CD79D2E7A16BD7B8072795B0C3667921
3,167,571 UART: Caliptra RT
3,167,825 UART: [state] CFI Enabled
3,276,147 UART: [rt] RT listening for mailbox commands...
3,276,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,470 UART: [rt]cmd =0x41544d4e, len=14344
3,544,456 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,126 ready_for_fw is high
1,055,126 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,106 >>> mbox cmd response: success
2,683,212 UART:
2,683,228 UART: Running Caliptra FMC ...
2,683,636 UART:
2,683,690 UART: [state] CFI Enabled
2,694,031 UART: [fht] FMC Alias Private Key: 7
2,801,906 UART: [art] Extend RT PCRs Done
2,802,334 UART: [art] Lock RT PCRs Done
2,803,804 UART: [art] Populate DV Done
2,811,997 UART: [fht] FMC Alias Private Key: 7
2,813,161 UART: [art] Derive CDI
2,813,441 UART: [art] Store in in slot 0x4
2,899,052 UART: [art] Derive Key Pair
2,899,412 UART: [art] Store priv key in slot 0x5
2,912,924 UART: [art] Derive Key Pair - Done
2,928,204 UART: [art] Signing Cert with AUTHO
2,928,684 UART: RITY.KEYID = 7
2,943,852 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,617 UART: [art] PUB.X = 4BB8A0103AF4C7C26042E3CAD6EAE87576FB1E62826B47453BA77AB21F12DF65E3DD9029EC38983C1CB99028F07A3DBA
2,951,401 UART: [art] PUB.Y = E0988E3436F84993BF87B84838C7AEAE714A76FA25447944585BF4D8EE157765CB34FAF787AFEEA024D045F1C89887FC
2,958,357 UART: [art] SIG.R = 8B2BE17E198D716433F4EB8815FF35DCF5BB31DBD090589632834A98E80C90759561FF975B93D0E6940342DDACE6963A
2,965,123 UART: [art] SIG.S = 43E51538522167B2F22EABC18A95FB2E506652E8C71F090B93334F3F0DE650D019B04C1FF036F630119809523E56FCF3
2,988,576 UART: Caliptra RT
2,988,830 UART: [state] CFI Enabled
3,096,610 UART: [rt] RT listening for mailbox commands...
3,097,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,919 UART: [rt]cmd =0x41544d4e, len=14344
3,365,075 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,174,406 ready_for_fw is high
1,174,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,483 UART: [ldev] --
1,282,951 UART: [fwproc] Wait for Commands...
1,283,582 UART: [fwproc] Recv command 0x46574c44
1,284,315 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,501 >>> mbox cmd response: success
2,774,730 UART: [afmc] ++
2,774,898 UART: [afmc] CDI.KEYID = 6
2,775,261 UART: [afmc] SUBJECT.KEYID = 7
2,775,687 UART: [afmc] AUTHORITY.KEYID = 5
2,811,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,229 UART: [afmc] --
2,854,277 UART: [cold-reset] --
2,855,049 UART: [state] Locking Datavault
2,856,270 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,874 UART: [state] Locking ICCM
2,857,528 UART: [exit] Launching FMC @ 0x40000130
2,862,857 UART:
2,862,873 UART: Running Caliptra FMC ...
2,863,281 UART:
2,863,424 UART: [state] CFI Enabled
2,874,051 UART: [fht] FMC Alias Private Key: 7
2,982,066 UART: [art] Extend RT PCRs Done
2,982,494 UART: [art] Lock RT PCRs Done
2,984,370 UART: [art] Populate DV Done
2,992,651 UART: [fht] FMC Alias Private Key: 7
2,993,597 UART: [art] Derive CDI
2,993,877 UART: [art] Store in in slot 0x4
3,079,760 UART: [art] Derive Key Pair
3,080,120 UART: [art] Store priv key in slot 0x5
3,093,276 UART: [art] Derive Key Pair - Done
3,107,897 UART: [art] Signing Cert with AUTHO
3,108,377 UART: RITY.KEYID = 7
3,123,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,168 UART: [art] PUB.X = 193BDE37CC27C9E2AA4C232F8214B11217BF998E99FBCA3F32FBD9272E7C6B05CFB4F7482487C5A803E5AEAB25CD4896
3,130,948 UART: [art] PUB.Y = 25A8C3F66891858201538C53787321087FE02FF9921C8BB8CBB3FDF8DD4BB221317CEAEB86E878EFDFCF805A84F4FE8F
3,137,906 UART: [art] SIG.R = C0B30F740563BEE94B82A562CB1458D71E87BBE822CC5712AC2B8FABB249D08B2200C69740A00B21A8AF5E13F40CF991
3,144,652 UART: [art] SIG.S = 8BD04E5FFBD69176F281DE21DABE03F9F8135AC4E3366B6B9D7F1B4C5C9DC0F931C8A2B04E7C8EF10BBC73B6355875B2
3,168,533 UART: Caliptra RT
3,168,879 UART: [state] CFI Enabled
3,276,808 UART: [rt] RT listening for mailbox commands...
3,277,478 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,115 UART: [rt]cmd =0x41544d4e, len=14344
3,545,013 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 ready_for_fw is high
1,056,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,001 >>> mbox cmd response: success
2,684,357 UART:
2,684,373 UART: Running Caliptra FMC ...
2,684,781 UART:
2,684,924 UART: [state] CFI Enabled
2,695,603 UART: [fht] FMC Alias Private Key: 7
2,803,728 UART: [art] Extend RT PCRs Done
2,804,156 UART: [art] Lock RT PCRs Done
2,805,714 UART: [art] Populate DV Done
2,813,973 UART: [fht] FMC Alias Private Key: 7
2,815,059 UART: [art] Derive CDI
2,815,339 UART: [art] Store in in slot 0x4
2,900,876 UART: [art] Derive Key Pair
2,901,236 UART: [art] Store priv key in slot 0x5
2,914,312 UART: [art] Derive Key Pair - Done
2,929,312 UART: [art] Signing Cert with AUTHO
2,929,792 UART: RITY.KEYID = 7
2,945,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,103 UART: [art] PUB.X = 23B43645DFDFA789FD6ADC9ED480F294CDD05921DDB268ED9C48C54B5996306BE36ADC64D52894C3DCC8294BE278755A
2,952,887 UART: [art] PUB.Y = 1C090EF8DF9AE851E4F9B886342A8433F02FCDD1B6480683FD845A09C825314E6FD2AC3A4BC5FC3CEF708E10DAB15AA1
2,959,843 UART: [art] SIG.R = 328FE6DB646DDB7CEEB65DDA467EC3C6D39106BA080F5B07A934470BF567781F7CDD6050FA8241F35393C2A102E89842
2,966,603 UART: [art] SIG.S = 72D1BBA364FC09801A8CD45A001123883B97A184F6AE9428944C207353D89998B31024D354D8C341AF499CB53773C351
2,990,901 UART: Caliptra RT
2,991,247 UART: [state] CFI Enabled
3,098,481 UART: [rt] RT listening for mailbox commands...
3,099,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,800 UART: [rt]cmd =0x41544d4e, len=14344
3,366,312 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,550 writing to cptra_bootfsm_go
192,658 UART:
193,007 UART: Running Caliptra ROM ...
194,202 UART:
194,370 UART: [state] CFI Enabled
262,630 UART: [state] LifecycleState = Unprovisioned
264,621 UART: [state] DebugLocked = No
266,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,347 UART: [kat] SHA2-256
441,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,557 UART: [kat] ++
452,156 UART: [kat] sha1
461,747 UART: [kat] SHA2-256
464,493 UART: [kat] SHA2-384
469,518 UART: [kat] SHA2-512-ACC
471,899 UART: [kat] ECC-384
2,768,890 UART: [kat] HMAC-384Kdf
2,801,317 UART: [kat] LMS
3,991,622 UART: [kat] --
3,996,705 UART: [cold-reset] ++
3,998,779 UART: [fht] Storing FHT @ 0x50003400
4,010,608 UART: [idev] ++
4,011,176 UART: [idev] CDI.KEYID = 6
4,012,061 UART: [idev] SUBJECT.KEYID = 7
4,013,368 UART: [idev] UDS.KEYID = 0
4,014,413 ready_for_fw is high
4,014,614 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,095 UART: [idev] Erasing UDS.KEYID = 0
7,348,416 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,565 UART: [idev] --
7,373,331 UART: [ldev] ++
7,373,888 UART: [ldev] CDI.KEYID = 6
7,374,817 UART: [ldev] SUBJECT.KEYID = 5
7,376,092 UART: [ldev] AUTHORITY.KEYID = 7
7,377,320 UART: [ldev] FE.KEYID = 1
7,422,226 UART: [ldev] Erasing FE.KEYID = 1
10,753,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,383 UART: [ldev] --
13,114,243 UART: [fwproc] Waiting for Commands...
13,116,166 UART: [fwproc] Received command 0x46574c44
13,118,337 UART: [fwproc] Received Image of size 114036 bytes
21,752,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,823,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,892,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,210,343 >>> mbox cmd response: success
22,213,939 UART: [afmc] ++
22,214,541 UART: [afmc] CDI.KEYID = 6
22,215,454 UART: [afmc] SUBJECT.KEYID = 7
22,216,670 UART: [afmc] AUTHORITY.KEYID = 5
25,582,119 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,883,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,885,320 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,899,872 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,914,620 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,928,838 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,949,696 UART: [afmc] --
27,953,169 UART: [cold-reset] --
27,956,429 UART: [state] Locking Datavault
27,961,666 UART: [state] Locking PCR0, PCR1 and PCR31
27,963,423 UART: [state] Locking ICCM
27,965,192 UART: [exit] Launching FMC @ 0x40000130
27,973,605 UART:
27,973,838 UART: Running Caliptra FMC ...
27,974,929 UART:
27,975,084 UART: [state] CFI Enabled
28,043,820 UART: [fht] FMC Alias Private Key: 7
30,381,812 UART: [art] Extend RT PCRs Done
30,383,162 UART: [art] Lock RT PCRs Done
30,384,807 UART: [art] Populate DV Done
30,390,211 UART: [fht] FMC Alias Private Key: 7
30,391,897 UART: [art] Derive CDI
30,392,631 UART: [art] Store in in slot 0x4
30,452,199 UART: [art] Derive Key Pair
30,453,190 UART: [art] Store priv key in slot 0x5
33,746,480 UART: [art] Derive Key Pair - Done
33,759,642 UART: [art] Signing Cert with AUTHO
33,760,938 UART: RITY.KEYID = 7
36,048,158 UART: [art] Erasing AUTHORITY.KEYID = 7
36,049,671 UART: [art] PUB.X = 47B9000981A77B919B3CF72FB645376F21A90945C8F29D4273F4AA1F55BFDAD32B38A786743CBD88019C938369A57807
36,056,863 UART: [art] PUB.Y = BC736A71E783EB94157BFCD62EC5C03D9E372D7B7F25C2B814D856916D6F9A2060FFC5FB3E0B89FCB166E483B1FA8284
36,064,150 UART: [art] SIG.R = 7A64955E9BED1148A965CDE182097DA5C1C2A3BBD156762FBB4E445E4527AF42F2014784650DB978BA41E9935CFFDCB6
36,071,516 UART: [art] SIG.S = 5C13B9CBD57D2161279FADC62D59700CE84047FBE1DF05989A2699E5E99144D069FD5671B58D3C9ACACFF909F21219A9
37,376,460 UART: Caliptra RT
37,377,172 UART: [state] CFI Enabled
37,538,982 UART: [rt] RT listening for mailbox commands...
37,541,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,696,549 UART: [rt]cmd =0x41544d4e, len=14344
37,698,453 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,785,501 ready_for_fw is high
3,786,096 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,172,297 >>> mbox cmd response: success
27,857,054 UART:
27,857,473 UART: Running Caliptra FMC ...
27,858,602 UART:
27,858,779 UART: [state] CFI Enabled
27,927,017 UART: [fht] FMC Alias Private Key: 7
30,264,942 UART: [art] Extend RT PCRs Done
30,266,164 UART: [art] Lock RT PCRs Done
30,267,736 UART: [art] Populate DV Done
30,273,074 UART: [fht] FMC Alias Private Key: 7
30,274,689 UART: [art] Derive CDI
30,275,499 UART: [art] Store in in slot 0x4
30,335,125 UART: [art] Derive Key Pair
30,336,116 UART: [art] Store priv key in slot 0x5
33,629,397 UART: [art] Derive Key Pair - Done
33,642,285 UART: [art] Signing Cert with AUTHO
33,643,590 UART: RITY.KEYID = 7
35,930,779 UART: [art] Erasing AUTHORITY.KEYID = 7
35,932,284 UART: [art] PUB.X = A9C007E3421D4A9A2D65435DBCDA92A28A2B00498049286131555D6694B0CE57B8E9FD766875EA235505063B6F346043
35,939,504 UART: [art] PUB.Y = 174DACA710A8733C99B790382F4717544C1911B130627FDD462B22B12CE28D1A074F2633A56B5733D3368D8EC7858020
35,946,731 UART: [art] SIG.R = D64B5215E8DB9DDFA9A0D77DBD43F84EF4B9336533235C9EFC335CC7C335FC279B580A653E3DE8CCC99453662B19335A
35,954,145 UART: [art] SIG.S = DFF9EC6746F47E4199A1C90F74FDD345A5AF7F8250A39FFEAED275BF8154FE5DEFFBD78E40D37E72752766E3D8AB5285
37,259,981 UART: Caliptra RT
37,260,720 UART: [state] CFI Enabled
37,441,364 UART: [rt] RT listening for mailbox commands...
37,443,685 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,598,884 UART: [rt]cmd =0x41544d4e, len=14344
37,600,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,489 UART:
192,838 UART: Running Caliptra ROM ...
193,956 UART:
603,530 UART: [state] CFI Enabled
617,129 UART: [state] LifecycleState = Unprovisioned
619,000 UART: [state] DebugLocked = No
621,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,310 UART: [kat] SHA2-256
797,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,543 UART: [kat] ++
808,142 UART: [kat] sha1
820,159 UART: [kat] SHA2-256
822,881 UART: [kat] SHA2-384
828,515 UART: [kat] SHA2-512-ACC
830,878 UART: [kat] ECC-384
3,115,231 UART: [kat] HMAC-384Kdf
3,126,187 UART: [kat] LMS
4,316,331 UART: [kat] --
4,321,202 UART: [cold-reset] ++
4,322,666 UART: [fht] Storing FHT @ 0x50003400
4,334,297 UART: [idev] ++
4,334,860 UART: [idev] CDI.KEYID = 6
4,335,809 UART: [idev] SUBJECT.KEYID = 7
4,337,050 UART: [idev] UDS.KEYID = 0
4,338,072 ready_for_fw is high
4,338,279 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,502 UART: [idev] Erasing UDS.KEYID = 0
7,628,457 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,283 UART: [idev] --
7,652,839 UART: [ldev] ++
7,653,405 UART: [ldev] CDI.KEYID = 6
7,654,341 UART: [ldev] SUBJECT.KEYID = 5
7,655,607 UART: [ldev] AUTHORITY.KEYID = 7
7,656,833 UART: [ldev] FE.KEYID = 1
7,667,268 UART: [ldev] Erasing FE.KEYID = 1
10,956,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,383 UART: [ldev] --
13,318,348 UART: [fwproc] Waiting for Commands...
13,321,038 UART: [fwproc] Received command 0x46574c44
13,323,225 UART: [fwproc] Received Image of size 114036 bytes
22,126,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,207,907 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,276,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,594,651 >>> mbox cmd response: success
22,599,339 UART: [afmc] ++
22,599,942 UART: [afmc] CDI.KEYID = 6
22,600,851 UART: [afmc] SUBJECT.KEYID = 7
22,602,151 UART: [afmc] AUTHORITY.KEYID = 5
25,915,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,210,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,212,286 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,226,835 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,241,542 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,255,814 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,277,659 UART: [afmc] --
28,281,903 UART: [cold-reset] --
28,285,928 UART: [state] Locking Datavault
28,289,606 UART: [state] Locking PCR0, PCR1 and PCR31
28,291,365 UART: [state] Locking ICCM
28,293,601 UART: [exit] Launching FMC @ 0x40000130
28,301,992 UART:
28,302,224 UART: Running Caliptra FMC ...
28,303,248 UART:
28,303,412 UART: [state] CFI Enabled
28,311,899 UART: [fht] FMC Alias Private Key: 7
30,642,214 UART: [art] Extend RT PCRs Done
30,643,432 UART: [art] Lock RT PCRs Done
30,645,022 UART: [art] Populate DV Done
30,650,542 UART: [fht] FMC Alias Private Key: 7
30,652,132 UART: [art] Derive CDI
30,652,865 UART: [art] Store in in slot 0x4
30,695,509 UART: [art] Derive Key Pair
30,696,506 UART: [art] Store priv key in slot 0x5
33,939,013 UART: [art] Derive Key Pair - Done
33,952,070 UART: [art] Signing Cert with AUTHO
33,953,381 UART: RITY.KEYID = 7
36,232,591 UART: [art] Erasing AUTHORITY.KEYID = 7
36,234,094 UART: [art] PUB.X = C9E4783896D94E4784F019B3DE86CC64D73E45BBC85F87658A09EFAB33F1B6822765588F82AD1AE204686CED60E4B213
36,241,359 UART: [art] PUB.Y = 5364DD41354EB79344F0D4DAAE30E96F942AC34F25BEEE44E876853A5CCEA94810F9E68B1FB4CF22D2961F3593DB1DAD
36,248,621 UART: [art] SIG.R = 4E0B38D3F41D093B1C55C76A7642BC9D593DE18907CC13DEB4E38A52C558FEE8F8D7318EC24E3D0AE36831B903A2BB44
36,255,982 UART: [art] SIG.S = 5154D904E3BC7C620FEC2B58C038666478DD73CA4939726822B34D6A1CD2FD7AB68F49B5E2B61EF860DD7F6FD6283C71
37,560,676 UART: Caliptra RT
37,561,386 UART: [state] CFI Enabled
37,678,683 UART: [rt] RT listening for mailbox commands...
37,680,988 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,836,131 UART: [rt]cmd =0x41544d4e, len=14344
37,838,030 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,128,672 ready_for_fw is high
4,129,075 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,516,564 >>> mbox cmd response: success
28,158,623 UART:
28,159,001 UART: Running Caliptra FMC ...
28,160,136 UART:
28,160,293 UART: [state] CFI Enabled
28,168,624 UART: [fht] FMC Alias Private Key: 7
30,499,285 UART: [art] Extend RT PCRs Done
30,500,515 UART: [art] Lock RT PCRs Done
30,501,958 UART: [art] Populate DV Done
30,507,172 UART: [fht] FMC Alias Private Key: 7
30,508,890 UART: [art] Derive CDI
30,509,713 UART: [art] Store in in slot 0x4
30,552,418 UART: [art] Derive Key Pair
30,553,419 UART: [art] Store priv key in slot 0x5
33,795,530 UART: [art] Derive Key Pair - Done
33,808,152 UART: [art] Signing Cert with AUTHO
33,809,459 UART: RITY.KEYID = 7
36,088,749 UART: [art] Erasing AUTHORITY.KEYID = 7
36,090,273 UART: [art] PUB.X = CC18EB4594AB1F9410DD962CC6B8BCA885EED338B00FFD6AD560F053C7EE46F592B1BFB731037ED89DB1578A52FFAF00
36,097,508 UART: [art] PUB.Y = CAA5635015B17705A5641EB2B784488CE7B2F209E89657119D3ABB73C3631FAC3D361542012D4B7B40E972F445EC463C
36,104,722 UART: [art] SIG.R = 1B5D9E6043648E90E69F7425B660258EC46F8A0B692A5B7D8A90964B31861D3181F564D40E509CC32016C6F64671E4EB
36,112,107 UART: [art] SIG.S = 1A388122606E633522D51A177B89D2CD91D78CD0B45B004FBA08C558C9EC6DDF42DAC104AFEEB4A1DCEBB5A6D9F16EEE
37,417,530 UART: Caliptra RT
37,418,309 UART: [state] CFI Enabled
37,536,788 UART: [rt] RT listening for mailbox commands...
37,539,130 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,694,411 UART: [rt]cmd =0x41544d4e, len=14344
37,696,280 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
192,524 UART:
192,889 UART: Running Caliptra ROM ...
194,041 UART:
194,190 UART: [state] CFI Enabled
266,029 UART: [state] LifecycleState = Unprovisioned
267,875 UART: [state] DebugLocked = No
269,694 UART: [state] WD Timer not started. Device not locked for debugging
274,293 UART: [kat] SHA2-256
453,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,995 UART: [kat] ++
465,537 UART: [kat] sha1
476,420 UART: [kat] SHA2-256
479,440 UART: [kat] SHA2-384
485,739 UART: [kat] SHA2-512-ACC
488,681 UART: [kat] ECC-384
2,946,460 UART: [kat] HMAC-384Kdf
2,971,916 UART: [kat] LMS
3,501,356 UART: [kat] --
3,505,590 UART: [cold-reset] ++
3,506,818 UART: [fht] FHT @ 0x50003400
3,518,101 UART: [idev] ++
3,518,671 UART: [idev] CDI.KEYID = 6
3,519,624 UART: [idev] SUBJECT.KEYID = 7
3,520,795 UART: [idev] UDS.KEYID = 0
3,521,769 ready_for_fw is high
3,521,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,108 UART: [idev] Erasing UDS.KEYID = 0
6,024,494 UART: [idev] Sha1 KeyId Algorithm
6,046,382 UART: [idev] --
6,051,405 UART: [ldev] ++
6,051,993 UART: [ldev] CDI.KEYID = 6
6,052,907 UART: [ldev] SUBJECT.KEYID = 5
6,054,073 UART: [ldev] AUTHORITY.KEYID = 7
6,055,309 UART: [ldev] FE.KEYID = 1
6,098,959 UART: [ldev] Erasing FE.KEYID = 1
8,603,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,785 UART: [ldev] --
10,416,261 UART: [fwproc] Wait for Commands...
10,419,061 UART: [fwproc] Recv command 0x46574c44
10,421,157 UART: [fwproc] Recv'd Img size: 114360 bytes
14,997,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,074,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,143,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,461,153 >>> mbox cmd response: success
15,465,636 UART: [afmc] ++
15,466,236 UART: [afmc] CDI.KEYID = 6
15,467,148 UART: [afmc] SUBJECT.KEYID = 7
15,468,309 UART: [afmc] AUTHORITY.KEYID = 5
18,003,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,727,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,729,774 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,745,738 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,761,672 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,777,470 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,800,495 UART: [afmc] --
19,804,394 UART: [cold-reset] --
19,808,749 UART: [state] Locking Datavault
19,813,906 UART: [state] Locking PCR0, PCR1 and PCR31
19,815,569 UART: [state] Locking ICCM
19,817,938 UART: [exit] Launching FMC @ 0x40000130
19,826,389 UART:
19,826,628 UART: Running Caliptra FMC ...
19,827,729 UART:
19,827,890 UART: [state] CFI Enabled
19,885,701 UART: [fht] FMC Alias Private Key: 7
21,649,721 UART: [art] Extend RT PCRs Done
21,650,954 UART: [art] Lock RT PCRs Done
21,652,853 UART: [art] Populate DV Done
21,657,995 UART: [fht] FMC Alias Private Key: 7
21,659,489 UART: [art] Derive CDI
21,660,254 UART: [art] Store in in slot 0x4
21,719,613 UART: [art] Derive Key Pair
21,720,651 UART: [art] Store priv key in slot 0x5
24,183,520 UART: [art] Derive Key Pair - Done
24,196,681 UART: [art] Signing Cert with AUTHO
24,197,990 UART: RITY.KEYID = 7
25,908,562 UART: [art] Erasing AUTHORITY.KEYID = 7
25,910,070 UART: [art] PUB.X = D93AADC175A8ABAD2C52D22A631372C7E9909FE90891F30E0B249049C03E762356B305B49EAFA7FE30E2D4C78A20CBBC
25,917,367 UART: [art] PUB.Y = 53926E2F74A07C94BEC5DF3B916289CDD064335C295ED83076E5F917518D341F99406C6E5E1D502118B9478CF9002401
25,924,581 UART: [art] SIG.R = 9FCDC5EA39BC5ECDFF35AE02E3CFD78DD2F73905E550C6D7C0984F1D8239D3650B14E1984756B23B3CDD0A05F2886C6F
25,931,947 UART: [art] SIG.S = CE0CAFDC42438ED3A3BB9B2349E05C5C174CE21FB17254800C0FBA1D33CB7DFE42407BAB5B2BDEC0B625564654414ADD
26,911,361 UART: Caliptra RT
26,912,082 UART: [state] CFI Enabled
27,076,830 UART: [rt] RT listening for mailbox commands...
27,079,291 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,577 UART: [rt]cmd =0x41544d4e, len=14344
27,236,654 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,438 UART:
192,808 UART: Running Caliptra ROM ...
193,941 UART:
194,092 UART: [state] CFI Enabled
266,091 UART: [state] LifecycleState = Unprovisioned
268,465 UART: [state] DebugLocked = No
270,160 UART: [state] WD Timer not started. Device not locked for debugging
275,129 UART: [kat] SHA2-256
465,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,771 UART: [kat] ++
476,251 UART: [kat] sha1
488,046 UART: [kat] SHA2-256
491,066 UART: [kat] SHA2-384
496,659 UART: [kat] SHA2-512-ACC
499,249 UART: [kat] ECC-384
2,950,581 UART: [kat] HMAC-384Kdf
2,972,263 UART: [kat] LMS
3,504,076 UART: [kat] --
3,508,087 UART: [cold-reset] ++
3,509,179 UART: [fht] FHT @ 0x50003400
3,521,220 UART: [idev] ++
3,521,854 UART: [idev] CDI.KEYID = 6
3,522,888 UART: [idev] SUBJECT.KEYID = 7
3,524,065 UART: [idev] UDS.KEYID = 0
3,524,996 ready_for_fw is high
3,525,181 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,330 UART: [idev] Erasing UDS.KEYID = 0
6,028,859 UART: [idev] Sha1 KeyId Algorithm
6,050,903 UART: [idev] --
6,054,102 UART: [ldev] ++
6,054,787 UART: [ldev] CDI.KEYID = 6
6,055,703 UART: [ldev] SUBJECT.KEYID = 5
6,056,868 UART: [ldev] AUTHORITY.KEYID = 7
6,058,105 UART: [ldev] FE.KEYID = 1
6,102,192 UART: [ldev] Erasing FE.KEYID = 1
8,606,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,233 UART: [ldev] --
10,417,414 UART: [fwproc] Wait for Commands...
10,419,132 UART: [fwproc] Recv command 0x46574c44
10,421,441 UART: [fwproc] Recv'd Img size: 114360 bytes
15,031,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,118,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,234,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,776,946 >>> mbox cmd response: success
15,781,890 UART: [afmc] ++
15,782,602 UART: [afmc] CDI.KEYID = 6
15,783,799 UART: [afmc] SUBJECT.KEYID = 7
15,785,295 UART: [afmc] AUTHORITY.KEYID = 5
18,325,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,049,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,051,171 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,066,235 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,081,444 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,096,267 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,119,821 UART: [afmc] --
20,123,541 UART: [cold-reset] --
20,127,743 UART: [state] Locking Datavault
20,132,969 UART: [state] Locking PCR0, PCR1 and PCR31
20,135,179 UART: [state] Locking ICCM
20,137,417 UART: [exit] Launching FMC @ 0x40000130
20,146,102 UART:
20,146,340 UART: Running Caliptra FMC ...
20,147,365 UART:
20,147,510 UART: [state] CFI Enabled
20,206,954 UART: [fht] FMC Alias Private Key: 7
21,970,748 UART: [art] Extend RT PCRs Done
21,971,970 UART: [art] Lock RT PCRs Done
21,973,675 UART: [art] Populate DV Done
21,979,249 UART: [fht] FMC Alias Private Key: 7
21,980,845 UART: [art] Derive CDI
21,981,661 UART: [art] Store in in slot 0x4
22,039,538 UART: [art] Derive Key Pair
22,040,567 UART: [art] Store priv key in slot 0x5
24,503,778 UART: [art] Derive Key Pair - Done
24,517,199 UART: [art] Signing Cert with AUTHO
24,518,530 UART: RITY.KEYID = 7
26,230,382 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,924 UART: [art] PUB.X = 814C2A23B3726DF5542DD2649015028CC176B5FD5EA992BB5FFE07B661111C5F2C65CB0CA581B770C1A386C71D41626E
26,239,155 UART: [art] PUB.Y = A08B21C4496AAFDD07BD18D958EFDD3A5161FDC09C2C1DDAF2B2BBFAFF85C36B2D6CC73AF35B391FF57D1B4D8AADA5D5
26,246,445 UART: [art] SIG.R = EA18FC63688B67E3BE4CDD0754E955278604727C000E8B24D6EE5EECAA3AC1ED76E13856A4E27EAAAC0661CCFCE51FEC
26,253,840 UART: [art] SIG.S = 092869D6429DD9A033A4CD4F50C9B04EB6834CC94B407DDFB21D5BCB05C6BC6CEB26D60EF0939F66C98386241DF66529
27,232,598 UART: Caliptra RT
27,233,310 UART: [state] CFI Enabled
27,413,246 UART: [rt] RT listening for mailbox commands...
27,415,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,727 UART: [rt]cmd =0x41544d4e, len=14344
27,572,971 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,436,302 ready_for_fw is high
3,436,698 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,835,952 >>> mbox cmd response: success
20,153,774 UART:
20,154,158 UART: Running Caliptra FMC ...
20,155,293 UART:
20,155,455 UART: [state] CFI Enabled
20,221,190 UART: [fht] FMC Alias Private Key: 7
21,985,604 UART: [art] Extend RT PCRs Done
21,986,823 UART: [art] Lock RT PCRs Done
21,988,664 UART: [art] Populate DV Done
21,993,855 UART: [fht] FMC Alias Private Key: 7
21,995,450 UART: [art] Derive CDI
21,996,190 UART: [art] Store in in slot 0x4
22,054,004 UART: [art] Derive Key Pair
22,055,055 UART: [art] Store priv key in slot 0x5
24,517,894 UART: [art] Derive Key Pair - Done
24,530,778 UART: [art] Signing Cert with AUTHO
24,532,109 UART: RITY.KEYID = 7
26,243,318 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,826 UART: [art] PUB.X = 4484CD90473740D5674565143112810EB5DC544DA61066E0510D1F45FB403AD46DE82355ECDFD1513A5FE9259ACCB5AD
26,252,073 UART: [art] PUB.Y = FDACF7A11FE6219D0C58A20C1EB4FF6E9CD1D0F8D685E6849AB9FD69952106C2E193C4A744A2B9ACC0BF01F9F4D17BCB
26,259,377 UART: [art] SIG.R = 7D33AE305EBE5472556AE16E964451A161EE1026A28030232C50A5572848F40ECB7CB063071B37642E01350335FD4EF6
26,266,738 UART: [art] SIG.S = EFD56B5A6F6BC44983EE95046B35B65E4CC18D196A534A7A78F018A02D93E59C4725E1F0B18618CE18CD63421A60FC88
27,245,857 UART: Caliptra RT
27,246,572 UART: [state] CFI Enabled
27,411,641 UART: [rt] RT listening for mailbox commands...
27,413,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,569,157 UART: [rt]cmd =0x41544d4e, len=14344
27,571,344 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,422 UART:
192,796 UART: Running Caliptra ROM ...
193,926 UART:
603,568 UART: [state] CFI Enabled
615,324 UART: [state] LifecycleState = Unprovisioned
617,697 UART: [state] DebugLocked = No
619,286 UART: [state] WD Timer not started. Device not locked for debugging
624,661 UART: [kat] SHA2-256
814,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,340 UART: [kat] ++
825,860 UART: [kat] sha1
836,943 UART: [kat] SHA2-256
839,953 UART: [kat] SHA2-384
845,591 UART: [kat] SHA2-512-ACC
848,169 UART: [kat] ECC-384
3,289,597 UART: [kat] HMAC-384Kdf
3,302,829 UART: [kat] LMS
3,834,610 UART: [kat] --
3,838,404 UART: [cold-reset] ++
3,839,842 UART: [fht] FHT @ 0x50003400
3,851,050 UART: [idev] ++
3,851,736 UART: [idev] CDI.KEYID = 6
3,852,722 UART: [idev] SUBJECT.KEYID = 7
3,853,900 UART: [idev] UDS.KEYID = 0
3,854,982 ready_for_fw is high
3,855,183 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,998,672 UART: [idev] Erasing UDS.KEYID = 0
6,333,053 UART: [idev] Sha1 KeyId Algorithm
6,355,209 UART: [idev] --
6,361,740 UART: [ldev] ++
6,362,415 UART: [ldev] CDI.KEYID = 6
6,363,477 UART: [ldev] SUBJECT.KEYID = 5
6,364,586 UART: [ldev] AUTHORITY.KEYID = 7
6,365,781 UART: [ldev] FE.KEYID = 1
6,376,262 UART: [ldev] Erasing FE.KEYID = 1
8,850,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,456 UART: [ldev] --
10,640,390 UART: [fwproc] Wait for Commands...
10,642,691 UART: [fwproc] Recv command 0x46574c44
10,644,996 UART: [fwproc] Recv'd Img size: 114360 bytes
15,271,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,351,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,467,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,010,211 >>> mbox cmd response: success
16,015,144 UART: [afmc] ++
16,015,873 UART: [afmc] CDI.KEYID = 6
16,016,982 UART: [afmc] SUBJECT.KEYID = 7
16,018,517 UART: [afmc] AUTHORITY.KEYID = 5
18,520,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,240,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,241,984 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,257,082 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,272,266 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,287,065 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,310,266 UART: [afmc] --
20,313,967 UART: [cold-reset] --
20,319,824 UART: [state] Locking Datavault
20,325,824 UART: [state] Locking PCR0, PCR1 and PCR31
20,328,002 UART: [state] Locking ICCM
20,330,275 UART: [exit] Launching FMC @ 0x40000130
20,338,961 UART:
20,339,220 UART: Running Caliptra FMC ...
20,340,324 UART:
20,340,481 UART: [state] CFI Enabled
20,348,526 UART: [fht] FMC Alias Private Key: 7
22,104,793 UART: [art] Extend RT PCRs Done
22,106,013 UART: [art] Lock RT PCRs Done
22,107,934 UART: [art] Populate DV Done
22,113,289 UART: [fht] FMC Alias Private Key: 7
22,114,775 UART: [art] Derive CDI
22,115,510 UART: [art] Store in in slot 0x4
22,158,750 UART: [art] Derive Key Pair
22,159,744 UART: [art] Store priv key in slot 0x5
24,586,493 UART: [art] Derive Key Pair - Done
24,599,475 UART: [art] Signing Cert with AUTHO
24,600,774 UART: RITY.KEYID = 7
26,306,098 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,636 UART: [art] PUB.X = 05594AD4A01BDF2D346110A99953D1809023D3540BB5F3124A41816241BAFD5FC97989A3A8B83A7A823C222A0DB2E34B
26,314,896 UART: [art] PUB.Y = CADC2632180FAE264D83E856009EF30D252AEAB69C6BF4A4AB7B147374711069F1E0B6C4527EFE4A268C27D229127023
26,322,132 UART: [art] SIG.R = F2473F0E4A8F7EA47A24F971C7D325728477B95EE8C2B890D71CB9CB47FA625225099673B17FC1C8EFDA8A5A0DA09782
26,329,571 UART: [art] SIG.S = CB1E3E80606D28EF8F2A3121A8535EB473047FCDAB8FD7FD8FDAE0CB119E09E6774936FE303F4D91CDA4D5C556B4D75B
27,308,450 UART: Caliptra RT
27,309,139 UART: [state] CFI Enabled
27,425,659 UART: [rt] RT listening for mailbox commands...
27,427,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,583,323 UART: [rt]cmd =0x41544d4e, len=14344
27,585,388 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,755,478 ready_for_fw is high
3,756,044 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,032,422 >>> mbox cmd response: success
20,284,751 UART:
20,285,145 UART: Running Caliptra FMC ...
20,286,285 UART:
20,286,442 UART: [state] CFI Enabled
20,294,697 UART: [fht] FMC Alias Private Key: 7
22,050,636 UART: [art] Extend RT PCRs Done
22,051,867 UART: [art] Lock RT PCRs Done
22,053,658 UART: [art] Populate DV Done
22,059,227 UART: [fht] FMC Alias Private Key: 7
22,060,753 UART: [art] Derive CDI
22,061,502 UART: [art] Store in in slot 0x4
22,104,152 UART: [art] Derive Key Pair
22,105,151 UART: [art] Store priv key in slot 0x5
24,531,591 UART: [art] Derive Key Pair - Done
24,544,439 UART: [art] Signing Cert with AUTHO
24,545,801 UART: RITY.KEYID = 7
26,251,387 UART: [art] Erasing AUTHORITY.KEYID = 7
26,252,898 UART: [art] PUB.X = 39BA372B0613A46C9EB15E083C55F84EC75A1EEC10E564DAD53D949B712F860E30411A5DA40821EC9BFA54C09F49C495
26,260,226 UART: [art] PUB.Y = D5394850D18B37FD7283375E34913F8E76E3502EDE5E4E6B77F24063E67E068AC0DC7EA76212498547928EDBBC4BE2B1
26,267,445 UART: [art] SIG.R = 4111ED89B297AC31B090273D570A7F519C4EEC16180F855F163B687DD620B74A817B7629493BCE42BA4485CB1FBAD14D
26,274,848 UART: [art] SIG.S = 1EA88BDC03BBB7F18E64E1E3E2D9B53FC8FE3EED2D4EA7A49B13C627270CE2A6F7887526B3A392F95F068A9681E40E99
27,254,163 UART: Caliptra RT
27,254,854 UART: [state] CFI Enabled
27,372,141 UART: [rt] RT listening for mailbox commands...
27,374,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,529,474 UART: [rt]cmd =0x41544d4e, len=14344
27,531,118 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,364 UART: [kat] SHA2-512-ACC
897,265 UART: [kat] ECC-384
902,956 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 ready_for_fw is high
1,481,189 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,916 UART: [idev] Erasing UDS.KEYID = 0
1,505,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,926 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,171 UART: [ldev] Erasing FE.KEYID = 1
1,546,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,206 UART: [ldev] --
1,585,477 UART: [fwproc] Waiting for Commands...
1,586,120 UART: [fwproc] Received command 0x46574c44
1,586,911 UART: [fwproc] Received Image of size 114360 bytes
5,157,944 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,185,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,214,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,350,689 >>> mbox cmd response: success
5,351,915 UART: [afmc] ++
5,352,083 UART: [afmc] CDI.KEYID = 6
5,352,445 UART: [afmc] SUBJECT.KEYID = 7
5,352,870 UART: [afmc] AUTHORITY.KEYID = 5
5,388,330 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,384 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,093 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,416,985 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,686 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,642 UART: [afmc] --
5,431,568 UART: [cold-reset] --
5,432,522 UART: [state] Locking Datavault
5,433,525 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,129 UART: [state] Locking ICCM
5,434,693 UART: [exit] Launching FMC @ 0x40000130
5,440,022 UART:
5,440,038 UART: Running Caliptra FMC ...
5,440,446 UART:
5,440,500 UART: [state] CFI Enabled
5,450,968 UART: [fht] FMC Alias Private Key: 7
5,558,916 UART: [art] Extend RT PCRs Done
5,559,344 UART: [art] Lock RT PCRs Done
5,561,018 UART: [art] Populate DV Done
5,569,188 UART: [fht] FMC Alias Private Key: 7
5,570,250 UART: [art] Derive CDI
5,570,530 UART: [art] Store in in slot 0x4
5,655,655 UART: [art] Derive Key Pair
5,656,015 UART: [art] Store priv key in slot 0x5
5,669,253 UART: [art] Derive Key Pair - Done
5,683,947 UART: [art] Signing Cert with AUTHO
5,684,427 UART: RITY.KEYID = 7
5,699,197 UART: [art] Erasing AUTHORITY.KEYID = 7
5,699,962 UART: [art] PUB.X = 5F0B42B07ABF571EEE15D3EB4A1F8FA8024682CC1163F65C4DC2F100D755CB25D5F7ACABA6912E90BAF7CEE2E8031D47
5,706,723 UART: [art] PUB.Y = 211C8FAE0633F888F6332B852EAB86B3C274E38F4273BCE40E362619A696282066C01CF95D5107E787FD46DF76A50A79
5,713,659 UART: [art] SIG.R = E3EC758124D18A985899FD7AFCB2D6F6D77CB18758FB3F25E05B301584E0ED9CF3A80F6BEE44D76F95C17D9E5C95FE69
5,720,442 UART: [art] SIG.S = AC8C2C2FAF396CCB360FC42C76E47865617D0026BCEF22036B363E07650439436017446E64910D2511717C360CCB93D8
5,743,935 UART: Caliptra RT
5,744,189 UART: [state] CFI Enabled
5,851,866 UART: [rt] RT listening for mailbox commands...
5,852,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,183 UART: [rt]cmd =0x41544d4e, len=14344
5,976,712 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,757 ready_for_fw is high
1,362,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,164,346 >>> mbox cmd response: success
5,225,351 UART:
5,225,367 UART: Running Caliptra FMC ...
5,225,775 UART:
5,225,829 UART: [state] CFI Enabled
5,236,355 UART: [fht] FMC Alias Private Key: 7
5,343,643 UART: [art] Extend RT PCRs Done
5,344,071 UART: [art] Lock RT PCRs Done
5,345,543 UART: [art] Populate DV Done
5,353,789 UART: [fht] FMC Alias Private Key: 7
5,354,923 UART: [art] Derive CDI
5,355,203 UART: [art] Store in in slot 0x4
5,440,706 UART: [art] Derive Key Pair
5,441,066 UART: [art] Store priv key in slot 0x5
5,454,382 UART: [art] Derive Key Pair - Done
5,469,589 UART: [art] Signing Cert with AUTHO
5,470,069 UART: RITY.KEYID = 7
5,484,839 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,604 UART: [art] PUB.X = 92E642EF6A1C07C433D63A01B48F06A4C1DBCB513C54E0D0521BD4D2986618556214BFFBFB44704A76E2B5FB758290CE
5,492,373 UART: [art] PUB.Y = 3BC20C92527DD52485E60719BA4DD16537EBED59075AB79795E9EC751C9B23321E3D7A8A35066DE8973C3E13B27162CB
5,499,313 UART: [art] SIG.R = 3EAD986376CEADE26591F831432C1B031E11D456AE9CE987D9C4174D57CF56E044F6B2196067F3950DA328589D8E201C
5,506,077 UART: [art] SIG.S = 2BF5B4293404568EF3A9A6037EF813A867C102C17B0A66F50313A06E1683DBD694A3EAB2C57744F6F6BEF425351DF80F
5,530,538 UART: Caliptra RT
5,530,792 UART: [state] CFI Enabled
5,639,659 UART: [rt] RT listening for mailbox commands...
5,640,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,898 UART: [rt]cmd =0x41544d4e, len=14344
5,764,511 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,880 UART: [kat] SHA2-256
881,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,926 UART: [kat] ++
886,078 UART: [kat] sha1
890,174 UART: [kat] SHA2-256
892,112 UART: [kat] SHA2-384
894,993 UART: [kat] SHA2-512-ACC
896,894 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,836 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 ready_for_fw is high
1,480,862 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,323 UART: [idev] Erasing UDS.KEYID = 0
1,505,263 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,703 UART: [idev] --
1,514,770 UART: [ldev] ++
1,514,938 UART: [ldev] CDI.KEYID = 6
1,515,301 UART: [ldev] SUBJECT.KEYID = 5
1,515,727 UART: [ldev] AUTHORITY.KEYID = 7
1,516,190 UART: [ldev] FE.KEYID = 1
1,521,154 UART: [ldev] Erasing FE.KEYID = 1
1,546,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,097 UART: [ldev] --
1,585,430 UART: [fwproc] Waiting for Commands...
1,586,199 UART: [fwproc] Received command 0x46574c44
1,586,990 UART: [fwproc] Received Image of size 114360 bytes
5,158,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,185,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,215,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,351,038 >>> mbox cmd response: success
5,352,164 UART: [afmc] ++
5,352,332 UART: [afmc] CDI.KEYID = 6
5,352,694 UART: [afmc] SUBJECT.KEYID = 7
5,353,119 UART: [afmc] AUTHORITY.KEYID = 5
5,388,431 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,663 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,372 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,264 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,965 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,821 UART: [afmc] --
5,431,797 UART: [cold-reset] --
5,432,559 UART: [state] Locking Datavault
5,433,674 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,278 UART: [state] Locking ICCM
5,434,852 UART: [exit] Launching FMC @ 0x40000130
5,440,181 UART:
5,440,197 UART: Running Caliptra FMC ...
5,440,605 UART:
5,440,748 UART: [state] CFI Enabled
5,451,104 UART: [fht] FMC Alias Private Key: 7
5,559,706 UART: [art] Extend RT PCRs Done
5,560,134 UART: [art] Lock RT PCRs Done
5,561,954 UART: [art] Populate DV Done
5,570,296 UART: [fht] FMC Alias Private Key: 7
5,571,478 UART: [art] Derive CDI
5,571,758 UART: [art] Store in in slot 0x4
5,657,187 UART: [art] Derive Key Pair
5,657,547 UART: [art] Store priv key in slot 0x5
5,670,673 UART: [art] Derive Key Pair - Done
5,685,530 UART: [art] Signing Cert with AUTHO
5,686,010 UART: RITY.KEYID = 7
5,700,986 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,751 UART: [art] PUB.X = 90D21292E2713BC109A826923C4F15ED9B16D815720416158BB61570BC504E3AFF5E3F636193E3B35F150642DCC599FF
5,708,508 UART: [art] PUB.Y = E1681E7729465514F64C3FE420071CE193D6860C97038EB7BA9F5D3184DA6E8FE7E5FC859D5D7155BF45B3127D029AC4
5,715,448 UART: [art] SIG.R = 2E67EACAB67D35D765DDB55C21690AD6970CED7258DE89A3DE451035580BEDFEFA360DB6E5C3C4367BB2B55D1D21DECA
5,722,230 UART: [art] SIG.S = 9CC1F2FE42A0F4B7A9176C7132A9912F55E167BD781100FE9A42670CF968889A130077E472DE0FE7C5EC15057D7441EF
5,745,576 UART: Caliptra RT
5,745,922 UART: [state] CFI Enabled
5,854,042 UART: [rt] RT listening for mailbox commands...
5,854,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,399 UART: [rt]cmd =0x41544d4e, len=14344
5,978,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 ready_for_fw is high
1,362,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,050,952 >>> mbox cmd response: success
5,113,567 UART:
5,113,583 UART: Running Caliptra FMC ...
5,113,991 UART:
5,114,134 UART: [state] CFI Enabled
5,124,636 UART: [fht] FMC Alias Private Key: 7
5,231,838 UART: [art] Extend RT PCRs Done
5,232,266 UART: [art] Lock RT PCRs Done
5,233,936 UART: [art] Populate DV Done
5,242,232 UART: [fht] FMC Alias Private Key: 7
5,243,170 UART: [art] Derive CDI
5,243,450 UART: [art] Store in in slot 0x4
5,329,237 UART: [art] Derive Key Pair
5,329,597 UART: [art] Store priv key in slot 0x5
5,342,929 UART: [art] Derive Key Pair - Done
5,357,623 UART: [art] Signing Cert with AUTHO
5,358,103 UART: RITY.KEYID = 7
5,373,237 UART: [art] Erasing AUTHORITY.KEYID = 7
5,374,002 UART: [art] PUB.X = ECDE72C6385F86F39A5B7AA99FD982210FB1A771B6E81E4EA132EB430349781C9FBC92E8A6376E71F6DB52736C2C0015
5,380,752 UART: [art] PUB.Y = 693F1A9BBB5FB26929917C6C7EDE875EEB5456642D3901BA79F35FAF50D9DF011EEBBA01C3D3FB2E5C673AEB5FEE345B
5,387,717 UART: [art] SIG.R = 80C14341739FE309ED1782A4B3188EEB51B423FE3BC4193AEC4303B655D82C2E62C99C8FA704D8A2BEE310DF0964786D
5,394,481 UART: [art] SIG.S = 9A43821041F91D6DF90CD15E262C7847898710CFB526CB5968EDA5507174B4A5C031889741D32D1B0441294E200F43D8
5,418,421 UART: Caliptra RT
5,418,767 UART: [state] CFI Enabled
5,526,888 UART: [rt] RT listening for mailbox commands...
5,527,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,650,037 UART: [rt]cmd =0x41544d4e, len=14344
5,651,240 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,600 UART: [kat] HMAC-384Kdf
923,086 UART: [kat] LMS
1,171,414 UART: [kat] --
1,172,255 UART: [cold-reset] ++
1,172,705 UART: [fht] FHT @ 0x50003400
1,175,396 UART: [idev] ++
1,175,564 UART: [idev] CDI.KEYID = 6
1,175,924 UART: [idev] SUBJECT.KEYID = 7
1,176,348 UART: [idev] UDS.KEYID = 0
1,176,693 ready_for_fw is high
1,176,693 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,620 UART: [idev] Erasing UDS.KEYID = 0
1,201,899 UART: [idev] Sha1 KeyId Algorithm
1,210,275 UART: [idev] --
1,211,327 UART: [ldev] ++
1,211,495 UART: [ldev] CDI.KEYID = 6
1,211,858 UART: [ldev] SUBJECT.KEYID = 5
1,212,284 UART: [ldev] AUTHORITY.KEYID = 7
1,212,747 UART: [ldev] FE.KEYID = 1
1,217,617 UART: [ldev] Erasing FE.KEYID = 1
1,244,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,885 UART: [ldev] --
1,283,306 UART: [fwproc] Wait for Commands...
1,284,066 UART: [fwproc] Recv command 0x46574c44
1,284,794 UART: [fwproc] Recv'd Img size: 114360 bytes
3,120,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,313,036 >>> mbox cmd response: success
3,314,288 UART: [afmc] ++
3,314,456 UART: [afmc] CDI.KEYID = 6
3,314,818 UART: [afmc] SUBJECT.KEYID = 7
3,315,243 UART: [afmc] AUTHORITY.KEYID = 5
3,350,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,202 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,911 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,803 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,514 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,289 UART: [afmc] --
3,393,241 UART: [cold-reset] --
3,393,919 UART: [state] Locking Datavault
3,394,804 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,408 UART: [state] Locking ICCM
3,395,866 UART: [exit] Launching FMC @ 0x40000130
3,401,195 UART:
3,401,211 UART: Running Caliptra FMC ...
3,401,619 UART:
3,401,673 UART: [state] CFI Enabled
3,412,225 UART: [fht] FMC Alias Private Key: 7
3,519,283 UART: [art] Extend RT PCRs Done
3,519,711 UART: [art] Lock RT PCRs Done
3,520,939 UART: [art] Populate DV Done
3,529,217 UART: [fht] FMC Alias Private Key: 7
3,530,269 UART: [art] Derive CDI
3,530,549 UART: [art] Store in in slot 0x4
3,616,194 UART: [art] Derive Key Pair
3,616,554 UART: [art] Store priv key in slot 0x5
3,629,712 UART: [art] Derive Key Pair - Done
3,644,481 UART: [art] Signing Cert with AUTHO
3,644,961 UART: RITY.KEYID = 7
3,660,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,224 UART: [art] PUB.X = 09EECE4C5A3E2610D46B976CBA6D72DF306BC1C03A3746676B4A5755179ECD73CEE353BDF3E7B98E3C88EBA217B0E162
3,668,007 UART: [art] PUB.Y = 36CACD769C69EA8EA034AB55C02E457171E18EADB2AC155CAB7007A407D8D7D008A8B3219EF7E62417EA1079FDB0707C
3,674,962 UART: [art] SIG.R = 544E9344EB5E8C7855150189A9FA57653017C587B2CB3F8C7703CA0D64BCB1AEF701ED58500511F8308B5761DF8DAD16
3,681,719 UART: [art] SIG.S = 12955EE73D315F410787A11D5ED3B7970ABEE8C44E911D0EAB0387D1C854490C99141293CF9F26357C0FC6F2D8731005
3,704,901 UART: Caliptra RT
3,705,155 UART: [state] CFI Enabled
3,812,487 UART: [rt] RT listening for mailbox commands...
3,813,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,832 UART: [rt]cmd =0x41544d4e, len=14344
3,937,273 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 ready_for_fw is high
1,060,233 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,167,796 >>> mbox cmd response: success
3,230,057 UART:
3,230,073 UART: Running Caliptra FMC ...
3,230,481 UART:
3,230,535 UART: [state] CFI Enabled
3,240,795 UART: [fht] FMC Alias Private Key: 7
3,347,941 UART: [art] Extend RT PCRs Done
3,348,369 UART: [art] Lock RT PCRs Done
3,349,957 UART: [art] Populate DV Done
3,358,479 UART: [fht] FMC Alias Private Key: 7
3,359,499 UART: [art] Derive CDI
3,359,779 UART: [art] Store in in slot 0x4
3,444,860 UART: [art] Derive Key Pair
3,445,220 UART: [art] Store priv key in slot 0x5
3,458,210 UART: [art] Derive Key Pair - Done
3,472,873 UART: [art] Signing Cert with AUTHO
3,473,353 UART: RITY.KEYID = 7
3,488,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,636 UART: [art] PUB.X = D645B2AC364D11E87981646E221F575D7F5B68F56C21B0D5756288631A3EF6A2598FF0EE546C949A2DE9D02788586186
3,496,400 UART: [art] PUB.Y = DB5DF4BE6115BB9D36AB7CE35A0C578CFABD4CA9D77A7D8FC02390CAE34DC24CA65AB7D9869BF60EF752A2B58705F337
3,503,367 UART: [art] SIG.R = 903003B2CCE6056CEFF9006A2DD2C7B61B316C10C2418333D569896104465AF37E46E0507818C8EE604777245620CEC3
3,510,098 UART: [art] SIG.S = 2ECA798A1CAE6D92140F8706AC915A7F0CB636FA10471936E95A73BF5A34975E0952E57C0DAF9AE3C4C0D38BBA9E8C2C
3,534,502 UART: Caliptra RT
3,534,756 UART: [state] CFI Enabled
3,642,505 UART: [rt] RT listening for mailbox commands...
3,643,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,064 UART: [rt]cmd =0x41544d4e, len=14344
3,767,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
893,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,396 UART: [kat] ++
897,548 UART: [kat] sha1
901,742 UART: [kat] SHA2-256
903,682 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,250 UART: [cold-reset] ++
1,172,600 UART: [fht] FHT @ 0x50003400
1,175,307 UART: [idev] ++
1,175,475 UART: [idev] CDI.KEYID = 6
1,175,835 UART: [idev] SUBJECT.KEYID = 7
1,176,259 UART: [idev] UDS.KEYID = 0
1,176,604 ready_for_fw is high
1,176,604 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,383 UART: [idev] Erasing UDS.KEYID = 0
1,201,614 UART: [idev] Sha1 KeyId Algorithm
1,210,080 UART: [idev] --
1,211,090 UART: [ldev] ++
1,211,258 UART: [ldev] CDI.KEYID = 6
1,211,621 UART: [ldev] SUBJECT.KEYID = 5
1,212,047 UART: [ldev] AUTHORITY.KEYID = 7
1,212,510 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,399 UART: [fwproc] Wait for Commands...
1,284,045 UART: [fwproc] Recv command 0x46574c44
1,284,773 UART: [fwproc] Recv'd Img size: 114360 bytes
3,134,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,191,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,327,514 >>> mbox cmd response: success
3,328,550 UART: [afmc] ++
3,328,718 UART: [afmc] CDI.KEYID = 6
3,329,080 UART: [afmc] SUBJECT.KEYID = 7
3,329,505 UART: [afmc] AUTHORITY.KEYID = 5
3,365,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,246 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,387,955 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,393,847 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,399,558 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,407,229 UART: [afmc] --
3,408,311 UART: [cold-reset] --
3,409,145 UART: [state] Locking Datavault
3,410,536 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,140 UART: [state] Locking ICCM
3,411,668 UART: [exit] Launching FMC @ 0x40000130
3,416,997 UART:
3,417,013 UART: Running Caliptra FMC ...
3,417,421 UART:
3,417,564 UART: [state] CFI Enabled
3,428,338 UART: [fht] FMC Alias Private Key: 7
3,535,826 UART: [art] Extend RT PCRs Done
3,536,254 UART: [art] Lock RT PCRs Done
3,537,886 UART: [art] Populate DV Done
3,545,850 UART: [fht] FMC Alias Private Key: 7
3,546,994 UART: [art] Derive CDI
3,547,274 UART: [art] Store in in slot 0x4
3,633,111 UART: [art] Derive Key Pair
3,633,471 UART: [art] Store priv key in slot 0x5
3,646,389 UART: [art] Derive Key Pair - Done
3,661,194 UART: [art] Signing Cert with AUTHO
3,661,674 UART: RITY.KEYID = 7
3,677,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,043 UART: [art] PUB.X = 30E730A84B49B07A76E6B0F9B11CB7C3883A9132353BDE844121D3995DB75207C2D8E3F0A2AF6D580AFD14136C01908D
3,684,806 UART: [art] PUB.Y = E60B3DB998887A359A32259C28280DFB353C37A5E5B8024890499B4245070AD9E7D8157EE98A6DB18587D82D33DD9D2D
3,691,739 UART: [art] SIG.R = 37EADC9DD08C3D6A8F1F7C441BD2F0182169EBAFE20F427B730D16CE92B56869AD161FD2D4CF7EFBBB27058B12DA7E78
3,698,522 UART: [art] SIG.S = 9AE663BC049CAFA3960E9DA609E94044A282EE22141040123CCDB0B12DE6B7F6DD717FEE252FF545F103A277C518E85F
3,722,181 UART: Caliptra RT
3,722,527 UART: [state] CFI Enabled
3,830,054 UART: [rt] RT listening for mailbox commands...
3,830,724 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,487 UART: [rt]cmd =0x41544d4e, len=14344
3,954,870 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,674 ready_for_fw is high
1,060,674 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,837 >>> mbox cmd response: success
3,232,900 UART:
3,232,916 UART: Running Caliptra FMC ...
3,233,324 UART:
3,233,467 UART: [state] CFI Enabled
3,244,047 UART: [fht] FMC Alias Private Key: 7
3,352,415 UART: [art] Extend RT PCRs Done
3,352,843 UART: [art] Lock RT PCRs Done
3,354,455 UART: [art] Populate DV Done
3,362,653 UART: [fht] FMC Alias Private Key: 7
3,363,665 UART: [art] Derive CDI
3,363,945 UART: [art] Store in in slot 0x4
3,449,866 UART: [art] Derive Key Pair
3,450,226 UART: [art] Store priv key in slot 0x5
3,462,908 UART: [art] Derive Key Pair - Done
3,477,931 UART: [art] Signing Cert with AUTHO
3,478,411 UART: RITY.KEYID = 7
3,493,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,338 UART: [art] PUB.X = 476361FEEAE8440453D9258B40826DB716681DADC5E5C8119DB2F42A22686C505D8DD0E0DAC85E1CA9A06AC06C5AF92F
3,501,117 UART: [art] PUB.Y = 41AA492D5EACFFB6B5D48F0AF799F5AD527C81DACC1CCCD9FCEB854B07C7B596B6586C3C2912D2E1B8EED31E9462D6CF
3,508,091 UART: [art] SIG.R = FB2F4DE5B4539072295D48E236A55E254D791F7DDA46D8DCE462B9D170CE03BBA87F0237FD0D59CB977D01AD5AE55464
3,514,861 UART: [art] SIG.S = DEC1F1ECF895C624F299C051CE9A07470DF9AA74C4A56A55C429232A167E60CCCFB59F51D706B538BBA7EC81CDCC9F47
3,538,543 UART: Caliptra RT
3,538,889 UART: [state] CFI Enabled
3,646,577 UART: [rt] RT listening for mailbox commands...
3,647,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,780 UART: [rt]cmd =0x41544d4e, len=14344
3,771,407 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,631 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,511 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 114360 bytes
3,125,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,318,643 >>> mbox cmd response: success
3,319,842 UART: [afmc] ++
3,320,010 UART: [afmc] CDI.KEYID = 6
3,320,373 UART: [afmc] SUBJECT.KEYID = 7
3,320,799 UART: [afmc] AUTHORITY.KEYID = 5
3,356,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,442 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,152 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,042 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,753 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,743 UART: [afmc] --
3,399,715 UART: [cold-reset] --
3,400,391 UART: [state] Locking Datavault
3,401,596 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,200 UART: [state] Locking ICCM
3,402,666 UART: [exit] Launching FMC @ 0x40000130
3,407,995 UART:
3,408,011 UART: Running Caliptra FMC ...
3,408,419 UART:
3,408,473 UART: [state] CFI Enabled
3,418,723 UART: [fht] FMC Alias Private Key: 7
3,526,001 UART: [art] Extend RT PCRs Done
3,526,429 UART: [art] Lock RT PCRs Done
3,527,993 UART: [art] Populate DV Done
3,536,183 UART: [fht] FMC Alias Private Key: 7
3,537,141 UART: [art] Derive CDI
3,537,421 UART: [art] Store in in slot 0x4
3,623,106 UART: [art] Derive Key Pair
3,623,466 UART: [art] Store priv key in slot 0x5
3,636,418 UART: [art] Derive Key Pair - Done
3,651,402 UART: [art] Signing Cert with AUTHO
3,651,882 UART: RITY.KEYID = 7
3,667,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,165 UART: [art] PUB.X = E4FDB63EF153D5A7793997F3DB090D464035583BB85B3F6C8A0E33B3FB34CF61BE43D4CA8289C56300D59809FE68E82A
3,674,909 UART: [art] PUB.Y = 143C230DB7EAC7054CFB9EB0F4B1235F0A9D2DDEB49520A33100D67552E1AD2D0962137E13E22C35FD05BAC502E6EE4A
3,681,833 UART: [art] SIG.R = 369925E7CE47AD1192485B6DF7AC01F0A6F8E674CF4181278B7C20F4CFE6E1799850CCCA8970CD3BAC0B273D79147BDC
3,688,609 UART: [art] SIG.S = AF68B7A3E3B75098AA5E579C93F0133FB4688A412F37C2965D5CDDFBF8B3A1BA055C074BC1CCA1E3A4F485E5DEDB604A
3,712,496 UART: Caliptra RT
3,712,750 UART: [state] CFI Enabled
3,820,817 UART: [rt] RT listening for mailbox commands...
3,821,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,248 UART: [rt]cmd =0x41544d4e, len=14344
3,945,947 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,294 ready_for_fw is high
1,056,294 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,165,572 >>> mbox cmd response: success
3,227,241 UART:
3,227,257 UART: Running Caliptra FMC ...
3,227,665 UART:
3,227,719 UART: [state] CFI Enabled
3,238,283 UART: [fht] FMC Alias Private Key: 7
3,345,901 UART: [art] Extend RT PCRs Done
3,346,329 UART: [art] Lock RT PCRs Done
3,348,015 UART: [art] Populate DV Done
3,356,253 UART: [fht] FMC Alias Private Key: 7
3,357,277 UART: [art] Derive CDI
3,357,557 UART: [art] Store in in slot 0x4
3,442,894 UART: [art] Derive Key Pair
3,443,254 UART: [art] Store priv key in slot 0x5
3,456,830 UART: [art] Derive Key Pair - Done
3,471,715 UART: [art] Signing Cert with AUTHO
3,472,195 UART: RITY.KEYID = 7
3,487,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,242 UART: [art] PUB.X = FD944F466E7F980AC744DC5033A0D85239763C56A9220215539827D1502DFB8DD608B13FBCFCE6F755787F557DD87A77
3,495,003 UART: [art] PUB.Y = 0259048E5146476FC784C448A00D3B6273ECA01E0778075234B8A94417CF0FCDF2DB5024B7F156A8B9F3100B4563382A
3,501,926 UART: [art] SIG.R = 325E3F295399EAE2D11CBA9CFD4A07715D7E12CF3FE2609C1923C4E026FB12DB6372DF0977914DA5E4CBF142CE506AF1
3,508,704 UART: [art] SIG.S = 925500FF2339EE1A964C938585AAFDB1A7348D0624CA14CF3B8F8D8E8C8588F7A16932A0EE1458EF90A39BD1FC2C1032
3,532,580 UART: Caliptra RT
3,532,834 UART: [state] CFI Enabled
3,640,537 UART: [rt] RT listening for mailbox commands...
3,641,207 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,974 UART: [rt]cmd =0x41544d4e, len=14344
3,765,411 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 ready_for_fw is high
1,174,434 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,650 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,932 UART: [fwproc] Recv command 0x46574c44
1,283,665 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,972 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,323,912 >>> mbox cmd response: success
3,325,087 UART: [afmc] ++
3,325,255 UART: [afmc] CDI.KEYID = 6
3,325,618 UART: [afmc] SUBJECT.KEYID = 7
3,326,044 UART: [afmc] AUTHORITY.KEYID = 5
3,361,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,185 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,895 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,785 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,496 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,326 UART: [afmc] --
3,404,354 UART: [cold-reset] --
3,405,216 UART: [state] Locking Datavault
3,406,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,175 UART: [state] Locking ICCM
3,407,759 UART: [exit] Launching FMC @ 0x40000130
3,413,088 UART:
3,413,104 UART: Running Caliptra FMC ...
3,413,512 UART:
3,413,655 UART: [state] CFI Enabled
3,424,235 UART: [fht] FMC Alias Private Key: 7
3,532,529 UART: [art] Extend RT PCRs Done
3,532,957 UART: [art] Lock RT PCRs Done
3,534,459 UART: [art] Populate DV Done
3,542,805 UART: [fht] FMC Alias Private Key: 7
3,543,817 UART: [art] Derive CDI
3,544,097 UART: [art] Store in in slot 0x4
3,629,954 UART: [art] Derive Key Pair
3,630,314 UART: [art] Store priv key in slot 0x5
3,643,412 UART: [art] Derive Key Pair - Done
3,657,690 UART: [art] Signing Cert with AUTHO
3,658,170 UART: RITY.KEYID = 7
3,673,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,953 UART: [art] PUB.X = 7B937713A7B578F3568611555E9E0F90895775342B89DEE6583AFD353FF004407D0A735BD6FFD81F709165EAD64E3204
3,680,705 UART: [art] PUB.Y = C45DDDBED3479A809BECE8E12B9B5DB3B4D1AF079A9DDA14AF1CD8DC41895256294B05B62CA7E8986CD85B257BEA68B5
3,687,673 UART: [art] SIG.R = 917879F1B9A51C54B745EF4C9E02042BBEDC4700163DCFFEBC365C281803E81098EA5219EE555F0F93B4EC0975A18610
3,694,410 UART: [art] SIG.S = D20913E0E4DE09679614BE99BBFC41BD6665BE6DC8C1A2127217CB9730AFA12F99D231FAFB149C79793F64238998B994
3,718,231 UART: Caliptra RT
3,718,577 UART: [state] CFI Enabled
3,826,903 UART: [rt] RT listening for mailbox commands...
3,827,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,324 UART: [rt]cmd =0x41544d4e, len=14344
3,951,813 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 ready_for_fw is high
1,056,121 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,155,813 >>> mbox cmd response: success
3,218,456 UART:
3,218,472 UART: Running Caliptra FMC ...
3,218,880 UART:
3,219,023 UART: [state] CFI Enabled
3,229,637 UART: [fht] FMC Alias Private Key: 7
3,337,077 UART: [art] Extend RT PCRs Done
3,337,505 UART: [art] Lock RT PCRs Done
3,338,977 UART: [art] Populate DV Done
3,346,905 UART: [fht] FMC Alias Private Key: 7
3,348,005 UART: [art] Derive CDI
3,348,285 UART: [art] Store in in slot 0x4
3,434,028 UART: [art] Derive Key Pair
3,434,388 UART: [art] Store priv key in slot 0x5
3,447,710 UART: [art] Derive Key Pair - Done
3,462,216 UART: [art] Signing Cert with AUTHO
3,462,696 UART: RITY.KEYID = 7
3,477,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,478,313 UART: [art] PUB.X = 6A9F7F88543414011D6160FFAC8FAFDD2937B8730C5C89EC2C52080101C2D3520F1C2816CBDFA12E994E27A547E69448
3,485,067 UART: [art] PUB.Y = 77CBF641E3F76A3994AC3287B437EBA7BB81BC4F076C73F0FED7DC37C4F816F214C33FB1359A2D2A05CF006911983016
3,491,997 UART: [art] SIG.R = FC03D1BB97CD9165B52560945AD195653CE902570AF59C1CC6E549FC6A3C063EEABDC424493E5A74D8187A0F6F434D3D
3,498,762 UART: [art] SIG.S = E021FC42781874E77BD5932C05AC6E9D5839FDCEE401E49BD353E6A3FA7A209A4E910676821037A77CD82FAEBD398390
3,522,774 UART: Caliptra RT
3,523,120 UART: [state] CFI Enabled
3,630,136 UART: [rt] RT listening for mailbox commands...
3,630,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,471 UART: [rt]cmd =0x41544d4e, len=14344
3,755,048 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,339 UART:
192,715 UART: Running Caliptra ROM ...
193,899 UART:
194,051 UART: [state] CFI Enabled
261,787 UART: [state] LifecycleState = Unprovisioned
263,695 UART: [state] DebugLocked = No
266,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,859 UART: [kat] SHA2-256
440,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,055 UART: [kat] ++
451,541 UART: [kat] sha1
462,764 UART: [kat] SHA2-256
465,420 UART: [kat] SHA2-384
471,405 UART: [kat] SHA2-512-ACC
473,766 UART: [kat] ECC-384
2,767,322 UART: [kat] HMAC-384Kdf
2,778,790 UART: [kat] LMS
3,969,088 UART: [kat] --
3,974,090 UART: [cold-reset] ++
3,976,517 UART: [fht] Storing FHT @ 0x50003400
3,988,914 UART: [idev] ++
3,989,549 UART: [idev] CDI.KEYID = 6
3,990,449 UART: [idev] SUBJECT.KEYID = 7
3,991,682 UART: [idev] UDS.KEYID = 0
3,992,747 ready_for_fw is high
3,992,939 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,359 UART: [idev] Erasing UDS.KEYID = 0
7,328,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,793 UART: [idev] --
7,355,886 UART: [ldev] ++
7,356,502 UART: [ldev] CDI.KEYID = 6
7,357,433 UART: [ldev] SUBJECT.KEYID = 5
7,358,655 UART: [ldev] AUTHORITY.KEYID = 7
7,359,935 UART: [ldev] FE.KEYID = 1
7,402,338 UART: [ldev] Erasing FE.KEYID = 1
10,737,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,310 UART: [ldev] --
13,118,649 UART: [fwproc] Waiting for Commands...
13,121,113 UART: [fwproc] Received command 0x46574c44
13,123,287 UART: [fwproc] Received Image of size 114036 bytes
21,437,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,523,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,592,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,909,908 >>> mbox cmd response: success
21,914,717 UART: [afmc] ++
21,915,314 UART: [afmc] CDI.KEYID = 6
21,916,218 UART: [afmc] SUBJECT.KEYID = 7
21,917,485 UART: [afmc] AUTHORITY.KEYID = 5
25,278,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,573,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,575,889 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,590,432 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,605,196 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,619,414 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,639,758 UART: [afmc] --
27,642,832 UART: [cold-reset] --
27,646,438 UART: [state] Locking Datavault
27,651,198 UART: [state] Locking PCR0, PCR1 and PCR31
27,652,947 UART: [state] Locking ICCM
27,655,090 UART: [exit] Launching FMC @ 0x40000130
27,663,451 UART:
27,663,684 UART: Running Caliptra FMC ...
27,664,778 UART:
27,664,928 UART: [state] CFI Enabled
27,733,748 UART: [fht] FMC Alias Private Key: 7
30,072,286 UART: [art] Extend RT PCRs Done
30,073,517 UART: [art] Lock RT PCRs Done
30,074,893 UART: [art] Populate DV Done
30,080,411 UART: [fht] FMC Alias Private Key: 7
30,081,945 UART: [art] Derive CDI
30,082,704 UART: [art] Store in in slot 0x4
30,141,907 UART: [art] Derive Key Pair
30,142,943 UART: [art] Store priv key in slot 0x5
33,435,773 UART: [art] Derive Key Pair - Done
33,448,823 UART: [art] Signing Cert with AUTHO
33,450,127 UART: RITY.KEYID = 7
35,737,103 UART: [art] Erasing AUTHORITY.KEYID = 7
35,738,604 UART: [art] PUB.X = 6600AB392A144A9E0A0A4024DF4B5B8EAA819637B909EF0F173584B2BCD34E51F46CAAE403715CAE951B98F62F3FD785
35,745,843 UART: [art] PUB.Y = 60E09DDE04B56B57AF631B71E8475DEF8B152F4DE0824761BFC92DE9C5F591CF8088EE91641DE33529F8C67F51771BF2
35,753,104 UART: [art] SIG.R = E1FDEABD17EBB835BFB857ED1AB75B8AEBFAA47E76B8E7CBB7F1F52CE5381B1706C1B351769F13F50C4895934712E180
35,760,519 UART: [art] SIG.S = 85E4D44CEEBCA23FD14E7F0E33302EDAC1B63C699048331260C7D21071A4F581DFF852FAD0CCE7F6FBF917F8F63DB8D8
37,065,511 UART: Caliptra RT
37,066,225 UART: [state] CFI Enabled
37,226,688 UART: [rt] RT listening for mailbox commands...
37,228,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,384,263 UART: [rt]cmd =0x41544d4e, len=14344
37,386,012 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,806,554 ready_for_fw is high
3,806,972 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,943,999 >>> mbox cmd response: success
27,627,772 UART:
27,628,166 UART: Running Caliptra FMC ...
27,629,363 UART:
27,629,529 UART: [state] CFI Enabled
27,700,095 UART: [fht] FMC Alias Private Key: 7
30,038,326 UART: [art] Extend RT PCRs Done
30,039,549 UART: [art] Lock RT PCRs Done
30,041,397 UART: [art] Populate DV Done
30,046,646 UART: [fht] FMC Alias Private Key: 7
30,048,266 UART: [art] Derive CDI
30,049,086 UART: [art] Store in in slot 0x4
30,108,463 UART: [art] Derive Key Pair
30,109,506 UART: [art] Store priv key in slot 0x5
33,402,615 UART: [art] Derive Key Pair - Done
33,415,402 UART: [art] Signing Cert with AUTHO
33,416,696 UART: RITY.KEYID = 7
35,704,324 UART: [art] Erasing AUTHORITY.KEYID = 7
35,705,823 UART: [art] PUB.X = 57D7031EF679FE4A351C440FC1D10B101E10C5027A1D24898494FCC302B8800A7ED72289E63E6C3B4C2D464732E0C749
35,713,051 UART: [art] PUB.Y = A7DB50E9A449521504223C319EEC8283B296FE70B45819CD00A8D09E352744FA4853E531EFC148FE338930F48F64A534
35,720,284 UART: [art] SIG.R = C22B2154E033DCED5648539FE874BBBF18B038FFFEF8A60632EB7E0C06B2CC95769EEFCFFB3E5B059998D82E137F5A73
35,727,681 UART: [art] SIG.S = DC7F23B0425516A3D6C4F4B2E23339E411CC813875EF3E2519BD321153FE638B094EB8C72883554D77A487C48FF62E96
37,032,711 UART: Caliptra RT
37,033,436 UART: [state] CFI Enabled
37,196,283 UART: [rt] RT listening for mailbox commands...
37,198,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,353,937 UART: [rt]cmd =0x41544d4e, len=14344
37,355,949 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,579 UART:
192,932 UART: Running Caliptra ROM ...
194,120 UART:
603,732 UART: [state] CFI Enabled
617,401 UART: [state] LifecycleState = Unprovisioned
619,272 UART: [state] DebugLocked = No
621,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,357 UART: [kat] SHA2-256
797,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,688 UART: [kat] ++
808,136 UART: [kat] sha1
819,647 UART: [kat] SHA2-256
822,375 UART: [kat] SHA2-384
829,214 UART: [kat] SHA2-512-ACC
831,648 UART: [kat] ECC-384
3,115,701 UART: [kat] HMAC-384Kdf
3,127,431 UART: [kat] LMS
4,317,583 UART: [kat] --
4,325,081 UART: [cold-reset] ++
4,326,308 UART: [fht] Storing FHT @ 0x50003400
4,337,860 UART: [idev] ++
4,338,432 UART: [idev] CDI.KEYID = 6
4,339,341 UART: [idev] SUBJECT.KEYID = 7
4,340,585 UART: [idev] UDS.KEYID = 0
4,341,655 ready_for_fw is high
4,341,882 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,485,074 UART: [idev] Erasing UDS.KEYID = 0
7,627,778 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,691 UART: [idev] --
7,652,171 UART: [ldev] ++
7,652,791 UART: [ldev] CDI.KEYID = 6
7,653,699 UART: [ldev] SUBJECT.KEYID = 5
7,655,012 UART: [ldev] AUTHORITY.KEYID = 7
7,656,142 UART: [ldev] FE.KEYID = 1
7,668,635 UART: [ldev] Erasing FE.KEYID = 1
10,959,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,333 UART: [ldev] --
13,317,618 UART: [fwproc] Waiting for Commands...
13,319,872 UART: [fwproc] Received command 0x46574c44
13,322,049 UART: [fwproc] Received Image of size 114036 bytes
22,199,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,281,740 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,350,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,667,915 >>> mbox cmd response: success
22,672,637 UART: [afmc] ++
22,673,237 UART: [afmc] CDI.KEYID = 6
22,674,150 UART: [afmc] SUBJECT.KEYID = 7
22,675,419 UART: [afmc] AUTHORITY.KEYID = 5
25,989,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,285,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,288,146 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,302,703 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,317,477 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,331,725 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,352,748 UART: [afmc] --
28,357,208 UART: [cold-reset] --
28,358,748 UART: [state] Locking Datavault
28,364,589 UART: [state] Locking PCR0, PCR1 and PCR31
28,366,342 UART: [state] Locking ICCM
28,368,279 UART: [exit] Launching FMC @ 0x40000130
28,376,682 UART:
28,376,917 UART: Running Caliptra FMC ...
28,378,019 UART:
28,378,188 UART: [state] CFI Enabled
28,386,173 UART: [fht] FMC Alias Private Key: 7
30,717,238 UART: [art] Extend RT PCRs Done
30,718,460 UART: [art] Lock RT PCRs Done
30,719,865 UART: [art] Populate DV Done
30,725,392 UART: [fht] FMC Alias Private Key: 7
30,726,947 UART: [art] Derive CDI
30,727,767 UART: [art] Store in in slot 0x4
30,769,878 UART: [art] Derive Key Pair
30,770,879 UART: [art] Store priv key in slot 0x5
34,013,517 UART: [art] Derive Key Pair - Done
34,026,406 UART: [art] Signing Cert with AUTHO
34,027,704 UART: RITY.KEYID = 7
36,307,142 UART: [art] Erasing AUTHORITY.KEYID = 7
36,308,661 UART: [art] PUB.X = D2ECC2ED5B6E3EE35F96AFBB615E4BBBCA4261AF08F2E8318C86A9012D3BF959028DE6F0632F00670E4552D6AB524289
36,315,868 UART: [art] PUB.Y = 84454224F98C21C03C346998FB31FE2E0CA91A5C98A9831CC3DEB54862478887C301DDE7B9A8BDDB9EEB963EE5F184E0
36,323,164 UART: [art] SIG.R = 4C0446D0C9A662EAB4A1F93D226D7FC44264872BC64FDD4B838E9CEAEEC98CB40453813DECB680B0E0A8F19830756D90
36,330,563 UART: [art] SIG.S = 0061108128A01F29A061CB48AF0BAAA7114294BB6CDA0DB4E674C5B650CFDF8D136A6AA0377A37A5A90222AED4F30B18
37,635,959 UART: Caliptra RT
37,636,665 UART: [state] CFI Enabled
37,753,941 UART: [rt] RT listening for mailbox commands...
37,756,250 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,911,745 UART: [rt]cmd =0x41544d4e, len=14344
37,913,662 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,127,296 ready_for_fw is high
4,127,668 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,770,717 >>> mbox cmd response: success
27,406,702 UART:
27,407,091 UART: Running Caliptra FMC ...
27,408,226 UART:
27,408,385 UART: [state] CFI Enabled
27,416,217 UART: [fht] FMC Alias Private Key: 7
29,747,483 UART: [art] Extend RT PCRs Done
29,748,727 UART: [art] Lock RT PCRs Done
29,750,623 UART: [art] Populate DV Done
29,755,981 UART: [fht] FMC Alias Private Key: 7
29,757,633 UART: [art] Derive CDI
29,758,607 UART: [art] Store in in slot 0x4
29,801,124 UART: [art] Derive Key Pair
29,802,127 UART: [art] Store priv key in slot 0x5
33,043,937 UART: [art] Derive Key Pair - Done
33,056,893 UART: [art] Signing Cert with AUTHO
33,058,205 UART: RITY.KEYID = 7
35,337,364 UART: [art] Erasing AUTHORITY.KEYID = 7
35,338,876 UART: [art] PUB.X = C722980C077D834DF25B9E8CCE8EECCAD11EB404C40D715E705FACB8C813A9066631E477C168C3A1E6D02F71D3015379
35,346,096 UART: [art] PUB.Y = F992CBA4D232C3F218EC0B6ED5F37710D06CFEE886E3CA2B76BDCC01E22DA85D8E6C65AA30D045B29789AEC701F6718C
35,353,395 UART: [art] SIG.R = E7768639092D82C904D965FA4F1C7988216EB2C2322485BE7B0B36BD41F8D749EAB2C433685080F1BF04249661886C6E
35,360,798 UART: [art] SIG.S = BDD6D2EC81F6383F452C95EB8CF2F3E93B5A341BEDC605641BD89B4D14669519108A2031F78E386B9A3EA797248B2F3F
36,666,219 UART: Caliptra RT
36,666,949 UART: [state] CFI Enabled
36,785,311 UART: [rt] RT listening for mailbox commands...
36,787,630 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
36,942,925 UART: [rt]cmd =0x41544d4e, len=14344
36,944,576 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,502 UART:
192,886 UART: Running Caliptra ROM ...
194,056 UART:
194,210 UART: [state] CFI Enabled
263,807 UART: [state] LifecycleState = Unprovisioned
265,660 UART: [state] DebugLocked = No
267,701 UART: [state] WD Timer not started. Device not locked for debugging
271,030 UART: [kat] SHA2-256
450,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,734 UART: [kat] ++
462,274 UART: [kat] sha1
473,861 UART: [kat] SHA2-256
476,860 UART: [kat] SHA2-384
482,994 UART: [kat] SHA2-512-ACC
485,932 UART: [kat] ECC-384
2,948,193 UART: [kat] HMAC-384Kdf
2,970,857 UART: [kat] LMS
3,500,270 UART: [kat] --
3,504,271 UART: [cold-reset] ++
3,505,354 UART: [fht] FHT @ 0x50003400
3,516,116 UART: [idev] ++
3,516,675 UART: [idev] CDI.KEYID = 6
3,517,562 UART: [idev] SUBJECT.KEYID = 7
3,518,809 UART: [idev] UDS.KEYID = 0
3,519,903 ready_for_fw is high
3,520,129 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,167 UART: [idev] Erasing UDS.KEYID = 0
6,025,331 UART: [idev] Sha1 KeyId Algorithm
6,047,323 UART: [idev] --
6,051,507 UART: [ldev] ++
6,052,096 UART: [ldev] CDI.KEYID = 6
6,053,052 UART: [ldev] SUBJECT.KEYID = 5
6,054,167 UART: [ldev] AUTHORITY.KEYID = 7
6,055,402 UART: [ldev] FE.KEYID = 1
6,099,487 UART: [ldev] Erasing FE.KEYID = 1
8,599,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,161 UART: [ldev] --
10,392,272 UART: [fwproc] Wait for Commands...
10,394,583 UART: [fwproc] Recv command 0x46574c44
10,396,681 UART: [fwproc] Recv'd Img size: 114360 bytes
14,941,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,017,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,086,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,403,515 >>> mbox cmd response: success
15,407,367 UART: [afmc] ++
15,408,163 UART: [afmc] CDI.KEYID = 6
15,409,083 UART: [afmc] SUBJECT.KEYID = 7
15,410,191 UART: [afmc] AUTHORITY.KEYID = 5
17,934,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,661,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,662,935 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,678,907 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,694,896 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,710,659 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,734,085 UART: [afmc] --
19,737,676 UART: [cold-reset] --
19,741,655 UART: [state] Locking Datavault
19,745,494 UART: [state] Locking PCR0, PCR1 and PCR31
19,747,194 UART: [state] Locking ICCM
19,748,798 UART: [exit] Launching FMC @ 0x40000130
19,757,203 UART:
19,757,436 UART: Running Caliptra FMC ...
19,758,459 UART:
19,758,605 UART: [state] CFI Enabled
19,819,338 UART: [fht] FMC Alias Private Key: 7
21,582,597 UART: [art] Extend RT PCRs Done
21,583,815 UART: [art] Lock RT PCRs Done
21,585,571 UART: [art] Populate DV Done
21,591,201 UART: [fht] FMC Alias Private Key: 7
21,592,848 UART: [art] Derive CDI
21,593,662 UART: [art] Store in in slot 0x4
21,651,091 UART: [art] Derive Key Pair
21,652,138 UART: [art] Store priv key in slot 0x5
24,115,262 UART: [art] Derive Key Pair - Done
24,128,083 UART: [art] Signing Cert with AUTHO
24,129,439 UART: RITY.KEYID = 7
25,840,569 UART: [art] Erasing AUTHORITY.KEYID = 7
25,842,072 UART: [art] PUB.X = 2121A49D668DF46BEA8E1199A9CC972670244028D05FE5264B90EAEBE2240A65EC8C401BAFF45023935EC6F16A73AC2E
25,849,347 UART: [art] PUB.Y = 6175F70EAB84BF36A12BD8A0B8772400D3DCC1FDA546AF9BFC17532B29900D3936557C892082F1B0BF7C5E74EFFB6394
25,856,615 UART: [art] SIG.R = D60744F03D0AA11E2E589E7F6CFB0C14E850E177D4155CB98C6AE8B3AF5A8FEC27048F33F5039839631C562545B94016
25,863,979 UART: [art] SIG.S = 760B8A0B547C91FAF15591F7C23102564AE204BFED9FD482FFAE25A7F4C119AA938EA85F12CB5F14A4A0509450C6DD4D
26,842,302 UART: Caliptra RT
26,843,014 UART: [state] CFI Enabled
27,006,258 UART: [rt] RT listening for mailbox commands...
27,008,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,164,049 UART: [rt]cmd =0x41544d4e, len=14344
27,166,182 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
192,583 UART:
192,943 UART: Running Caliptra ROM ...
194,136 UART:
194,297 UART: [state] CFI Enabled
260,292 UART: [state] LifecycleState = Unprovisioned
262,710 UART: [state] DebugLocked = No
263,958 UART: [state] WD Timer not started. Device not locked for debugging
268,909 UART: [kat] SHA2-256
458,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,572 UART: [kat] ++
470,074 UART: [kat] sha1
480,594 UART: [kat] SHA2-256
483,621 UART: [kat] SHA2-384
490,540 UART: [kat] SHA2-512-ACC
493,129 UART: [kat] ECC-384
2,950,040 UART: [kat] HMAC-384Kdf
2,972,517 UART: [kat] LMS
3,504,287 UART: [kat] --
3,509,589 UART: [cold-reset] ++
3,511,107 UART: [fht] FHT @ 0x50003400
3,522,441 UART: [idev] ++
3,523,148 UART: [idev] CDI.KEYID = 6
3,524,065 UART: [idev] SUBJECT.KEYID = 7
3,525,315 UART: [idev] UDS.KEYID = 0
3,526,241 ready_for_fw is high
3,526,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,523 UART: [idev] Erasing UDS.KEYID = 0
6,029,727 UART: [idev] Sha1 KeyId Algorithm
6,052,433 UART: [idev] --
6,057,190 UART: [ldev] ++
6,057,876 UART: [ldev] CDI.KEYID = 6
6,058,843 UART: [ldev] SUBJECT.KEYID = 5
6,060,003 UART: [ldev] AUTHORITY.KEYID = 7
6,061,192 UART: [ldev] FE.KEYID = 1
6,100,190 UART: [ldev] Erasing FE.KEYID = 1
8,611,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,145 UART: [ldev] --
10,414,010 UART: [fwproc] Wait for Commands...
10,416,917 UART: [fwproc] Recv command 0x46574c44
10,419,172 UART: [fwproc] Recv'd Img size: 114360 bytes
15,040,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,121,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,238,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,781,046 >>> mbox cmd response: success
15,784,611 UART: [afmc] ++
15,785,325 UART: [afmc] CDI.KEYID = 6
15,786,529 UART: [afmc] SUBJECT.KEYID = 7
15,787,978 UART: [afmc] AUTHORITY.KEYID = 5
18,321,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,048,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,050,438 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,065,538 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,080,741 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,095,544 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,119,141 UART: [afmc] --
20,122,250 UART: [cold-reset] --
20,126,464 UART: [state] Locking Datavault
20,132,593 UART: [state] Locking PCR0, PCR1 and PCR31
20,134,743 UART: [state] Locking ICCM
20,136,733 UART: [exit] Launching FMC @ 0x40000130
20,145,374 UART:
20,145,657 UART: Running Caliptra FMC ...
20,146,770 UART:
20,146,942 UART: [state] CFI Enabled
20,205,739 UART: [fht] FMC Alias Private Key: 7
21,970,053 UART: [art] Extend RT PCRs Done
21,971,272 UART: [art] Lock RT PCRs Done
21,972,952 UART: [art] Populate DV Done
21,978,364 UART: [fht] FMC Alias Private Key: 7
21,980,012 UART: [art] Derive CDI
21,980,829 UART: [art] Store in in slot 0x4
22,038,680 UART: [art] Derive Key Pair
22,039,735 UART: [art] Store priv key in slot 0x5
24,502,588 UART: [art] Derive Key Pair - Done
24,515,975 UART: [art] Signing Cert with AUTHO
24,517,281 UART: RITY.KEYID = 7
26,228,554 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,063 UART: [art] PUB.X = EA0EEF6390D48FA34AC4C4FE3FB7A239D8BEACCA82638DD0383974D0B0AAEA1F0DCB4071B94014B52B20DEC916DC3E6E
26,237,350 UART: [art] PUB.Y = D8B9A3281490A8023078273C29CF8FE5782C487145E8AAA8916F8D96678A244223A47669BD199E7EADC461A7C62EDC20
26,244,587 UART: [art] SIG.R = 67D3591B1A9A5B6A6FC4AA6E9B9B983CD8968A000489EB97BCCD42EA1F594F3CD58892E063460A3DB2CB8317F7AD8388
26,251,962 UART: [art] SIG.S = DC59EBC38939E5C4733DE981AA8BE79C89E61598EA5EEDA89EB414E32B43F6EE92F6B57B57BC335075D94A238D4E369A
27,230,674 UART: Caliptra RT
27,231,368 UART: [state] CFI Enabled
27,396,915 UART: [rt] RT listening for mailbox commands...
27,399,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,554,693 UART: [rt]cmd =0x41544d4e, len=14344
27,556,465 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,435,881 ready_for_fw is high
3,436,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,844,316 >>> mbox cmd response: success
20,156,661 UART:
20,157,086 UART: Running Caliptra FMC ...
20,158,200 UART:
20,158,358 UART: [state] CFI Enabled
20,225,710 UART: [fht] FMC Alias Private Key: 7
21,989,537 UART: [art] Extend RT PCRs Done
21,990,767 UART: [art] Lock RT PCRs Done
21,992,367 UART: [art] Populate DV Done
21,997,994 UART: [fht] FMC Alias Private Key: 7
21,999,590 UART: [art] Derive CDI
22,000,332 UART: [art] Store in in slot 0x4
22,058,736 UART: [art] Derive Key Pair
22,059,782 UART: [art] Store priv key in slot 0x5
24,522,941 UART: [art] Derive Key Pair - Done
24,536,097 UART: [art] Signing Cert with AUTHO
24,537,412 UART: RITY.KEYID = 7
26,249,350 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,877 UART: [art] PUB.X = 7E74D64DF19994F235F3934F33F8086D2044B7E031C237D6ACF3EA6B379B622F4CBB780B90DC7887F68C4A3E30C7E7F7
26,258,132 UART: [art] PUB.Y = 243D13E407FFA7DA28C0D862112030725E4D932E9900E232594EBFFAD4249829E9EC881BE64572632725DE416A50BAEB
26,265,398 UART: [art] SIG.R = CF9AB9CE231CD0F2B44ADBFBBB8A90EA5227BD353B52AB1AAF8F77F93F44940948F0F107B1E4324F4FB692D908A65241
26,272,772 UART: [art] SIG.S = 9E7C6CEB15EA501599B1C130E1F84DF8B6729B474C5DC36069D84DB36CC97CF8D37A0758ED0F6CEA9CAB4EA4301578D0
27,251,387 UART: Caliptra RT
27,252,082 UART: [state] CFI Enabled
27,416,931 UART: [rt] RT listening for mailbox commands...
27,419,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,574,278 UART: [rt]cmd =0x41544d4e, len=14344
27,576,408 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,387 UART:
192,772 UART: Running Caliptra ROM ...
193,902 UART:
603,714 UART: [state] CFI Enabled
617,889 UART: [state] LifecycleState = Unprovisioned
620,262 UART: [state] DebugLocked = No
622,142 UART: [state] WD Timer not started. Device not locked for debugging
626,025 UART: [kat] SHA2-256
815,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,675 UART: [kat] ++
827,209 UART: [kat] sha1
839,663 UART: [kat] SHA2-256
842,710 UART: [kat] SHA2-384
849,768 UART: [kat] SHA2-512-ACC
852,346 UART: [kat] ECC-384
3,293,159 UART: [kat] HMAC-384Kdf
3,306,321 UART: [kat] LMS
3,838,192 UART: [kat] --
3,842,927 UART: [cold-reset] ++
3,845,220 UART: [fht] FHT @ 0x50003400
3,857,328 UART: [idev] ++
3,858,030 UART: [idev] CDI.KEYID = 6
3,859,060 UART: [idev] SUBJECT.KEYID = 7
3,860,234 UART: [idev] UDS.KEYID = 0
3,861,169 ready_for_fw is high
3,861,373 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,107 UART: [idev] Erasing UDS.KEYID = 0
6,337,338 UART: [idev] Sha1 KeyId Algorithm
6,359,947 UART: [idev] --
6,364,072 UART: [ldev] ++
6,364,755 UART: [ldev] CDI.KEYID = 6
6,365,663 UART: [ldev] SUBJECT.KEYID = 5
6,366,870 UART: [ldev] AUTHORITY.KEYID = 7
6,368,064 UART: [ldev] FE.KEYID = 1
6,380,280 UART: [ldev] Erasing FE.KEYID = 1
8,861,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,943 UART: [ldev] --
10,654,934 UART: [fwproc] Wait for Commands...
10,657,729 UART: [fwproc] Recv command 0x46574c44
10,659,979 UART: [fwproc] Recv'd Img size: 114360 bytes
15,292,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,371,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,488,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,030,324 >>> mbox cmd response: success
16,034,134 UART: [afmc] ++
16,034,862 UART: [afmc] CDI.KEYID = 6
16,036,054 UART: [afmc] SUBJECT.KEYID = 7
16,037,460 UART: [afmc] AUTHORITY.KEYID = 5
18,541,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,264,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,266,155 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,281,199 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,296,430 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,311,225 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,334,636 UART: [afmc] --
20,337,954 UART: [cold-reset] --
20,341,700 UART: [state] Locking Datavault
20,346,618 UART: [state] Locking PCR0, PCR1 and PCR31
20,348,752 UART: [state] Locking ICCM
20,350,144 UART: [exit] Launching FMC @ 0x40000130
20,358,816 UART:
20,359,110 UART: Running Caliptra FMC ...
20,360,213 UART:
20,360,372 UART: [state] CFI Enabled
20,367,928 UART: [fht] FMC Alias Private Key: 7
22,125,390 UART: [art] Extend RT PCRs Done
22,126,589 UART: [art] Lock RT PCRs Done
22,128,552 UART: [art] Populate DV Done
22,133,952 UART: [fht] FMC Alias Private Key: 7
22,135,532 UART: [art] Derive CDI
22,136,274 UART: [art] Store in in slot 0x4
22,178,858 UART: [art] Derive Key Pair
22,179,852 UART: [art] Store priv key in slot 0x5
24,606,685 UART: [art] Derive Key Pair - Done
24,619,411 UART: [art] Signing Cert with AUTHO
24,620,708 UART: RITY.KEYID = 7
26,326,090 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,607 UART: [art] PUB.X = 9DC22C7D8A9BB1788CC1C1F6A575C68157B41EEEC1B8CCFFE3AE88E319DB768EED568D09B019B58D374E358A9220A616
26,334,853 UART: [art] PUB.Y = 4CDB36E9E7A7D435A88AC9453556A028F8D1F7F6850FE6B701D8BA5ADE505651AB7FAAA694547B7036182DFE28A35CD2
26,342,137 UART: [art] SIG.R = C5A347D03A2012D69CD9CA6409F55CFA76D1E7CD3CB203BAC492902EFAA4CA13F85256DA93CFD72F49BB5321D921C793
26,349,521 UART: [art] SIG.S = 2955AA3087B8B5DE3BE0EB629241758DEFEF9A4293DF5012F1214E48936BD804E2552C604B73AB47875B0BC1F7B844AD
27,328,805 UART: Caliptra RT
27,329,506 UART: [state] CFI Enabled
27,446,240 UART: [rt] RT listening for mailbox commands...
27,448,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,603,677 UART: [rt]cmd =0x41544d4e, len=14344
27,605,313 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,752,385 ready_for_fw is high
3,752,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,053,630 >>> mbox cmd response: success
20,304,055 UART:
20,304,460 UART: Running Caliptra FMC ...
20,305,598 UART:
20,305,762 UART: [state] CFI Enabled
20,314,015 UART: [fht] FMC Alias Private Key: 7
22,070,744 UART: [art] Extend RT PCRs Done
22,071,975 UART: [art] Lock RT PCRs Done
22,073,660 UART: [art] Populate DV Done
22,078,909 UART: [fht] FMC Alias Private Key: 7
22,080,457 UART: [art] Derive CDI
22,081,274 UART: [art] Store in in slot 0x4
22,124,246 UART: [art] Derive Key Pair
22,125,287 UART: [art] Store priv key in slot 0x5
24,551,578 UART: [art] Derive Key Pair - Done
24,564,743 UART: [art] Signing Cert with AUTHO
24,566,046 UART: RITY.KEYID = 7
26,271,301 UART: [art] Erasing AUTHORITY.KEYID = 7
26,272,810 UART: [art] PUB.X = 3A6FA2C95C9B3A4FCB8837F3E3521F95DEAD5749A36E244F3F8136CB88441BF558F1B7850AACDF591B83B68F74AC79B6
26,280,120 UART: [art] PUB.Y = D40AB884A728CC0FA13D6CD3DD209644C09B790EBC4D09B0B556CC7EF23FB74E2B0A9397F9036A326210D9ADD32062DE
26,287,361 UART: [art] SIG.R = 1C4AE2A20B5F706A1F4DF27E0A0E43A86B2F06EEC4D7510D61D3C3351161E46A6631A1ECA7E40D025DF5AAD5171F3459
26,294,774 UART: [art] SIG.S = E4FFD241B66852212FAEB15610F7A3750D719497A0B76BB80B4E94230DA5739749C25A638BBAE3B1FA5505D8AD04FF80
27,273,942 UART: Caliptra RT
27,274,653 UART: [state] CFI Enabled
27,391,175 UART: [rt] RT listening for mailbox commands...
27,393,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,904 UART: [rt]cmd =0x41544d4e, len=14344
27,550,658 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,534 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,476,049 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,248 UART: [idev] ++
1,479,416 UART: [idev] CDI.KEYID = 6
1,479,776 UART: [idev] SUBJECT.KEYID = 7
1,480,200 UART: [idev] UDS.KEYID = 0
1,480,545 ready_for_fw is high
1,480,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,262 UART: [idev] Erasing UDS.KEYID = 0
1,504,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,452 UART: [idev] --
1,514,417 UART: [ldev] ++
1,514,585 UART: [ldev] CDI.KEYID = 6
1,514,948 UART: [ldev] SUBJECT.KEYID = 5
1,515,374 UART: [ldev] AUTHORITY.KEYID = 7
1,515,837 UART: [ldev] FE.KEYID = 1
1,520,811 UART: [ldev] Erasing FE.KEYID = 1
1,546,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,256 UART: [ldev] --
1,585,651 UART: [fwproc] Waiting for Commands...
1,586,438 UART: [fwproc] Received command 0x46574c44
1,587,229 UART: [fwproc] Received Image of size 114360 bytes
5,272,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,465,826 >>> mbox cmd response: success
5,467,048 UART: [afmc] ++
5,467,216 UART: [afmc] CDI.KEYID = 6
5,467,578 UART: [afmc] SUBJECT.KEYID = 7
5,468,003 UART: [afmc] AUTHORITY.KEYID = 5
5,503,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,673 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,520,453 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,526,162 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,532,054 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,755 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,697 UART: [afmc] --
5,546,773 UART: [cold-reset] --
5,547,575 UART: [state] Locking Datavault
5,548,400 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,004 UART: [state] Locking ICCM
5,549,552 UART: [exit] Launching FMC @ 0x40000130
5,554,881 UART:
5,554,897 UART: Running Caliptra FMC ...
5,555,305 UART:
5,555,359 UART: [state] CFI Enabled
5,565,913 UART: [fht] FMC Alias Private Key: 7
5,674,025 UART: [art] Extend RT PCRs Done
5,674,453 UART: [art] Lock RT PCRs Done
5,676,097 UART: [art] Populate DV Done
5,684,465 UART: [fht] FMC Alias Private Key: 7
5,685,393 UART: [art] Derive CDI
5,685,673 UART: [art] Store in in slot 0x4
5,771,112 UART: [art] Derive Key Pair
5,771,472 UART: [art] Store priv key in slot 0x5
5,784,620 UART: [art] Derive Key Pair - Done
5,799,092 UART: [art] Signing Cert with AUTHO
5,799,572 UART: RITY.KEYID = 7
5,815,370 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,135 UART: [art] PUB.X = 3852B3237A9748BE555894066A3246780098C8169FFEA350039B349434F17B696D727C7DDD6A825E8E4D24899FE23A7B
5,822,867 UART: [art] PUB.Y = DA558B78F53E33788A56FA0D9720E87D708CDB342509C21F2672289B9EDFF36F42E3DFEC01C8E236DC4361E95BED7888
5,829,816 UART: [art] SIG.R = 78E11DCB598DFA24F80E488ED769EE3EF795294B01D32FB99029758356DB1CD146C81F0CFB4B8780C9D9F6454FF60964
5,836,580 UART: [art] SIG.S = 30E12D4BF6E21A6712888B254768D5683F0D57E83D51344C445FE9C2B51F313DCACF257057231E82D7D9540B312770F9
5,860,139 UART: Caliptra RT
5,860,393 UART: [state] CFI Enabled
5,968,868 UART: [rt] RT listening for mailbox commands...
5,969,538 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,092,299 UART: [rt]cmd =0x41544d4e, len=14344
6,093,960 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 ready_for_fw is high
1,362,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,126,461 >>> mbox cmd response: success
5,188,192 UART:
5,188,208 UART: Running Caliptra FMC ...
5,188,616 UART:
5,188,670 UART: [state] CFI Enabled
5,198,996 UART: [fht] FMC Alias Private Key: 7
5,306,552 UART: [art] Extend RT PCRs Done
5,306,980 UART: [art] Lock RT PCRs Done
5,308,802 UART: [art] Populate DV Done
5,317,092 UART: [fht] FMC Alias Private Key: 7
5,318,058 UART: [art] Derive CDI
5,318,338 UART: [art] Store in in slot 0x4
5,404,171 UART: [art] Derive Key Pair
5,404,531 UART: [art] Store priv key in slot 0x5
5,417,445 UART: [art] Derive Key Pair - Done
5,432,302 UART: [art] Signing Cert with AUTHO
5,432,782 UART: RITY.KEYID = 7
5,447,770 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,535 UART: [art] PUB.X = F148193CA19BC793C8480D5684254557A7FCC4B8CDCCAC7844035912262120E36766D97A485B4DFE728427F179B8D4FB
5,455,297 UART: [art] PUB.Y = 1975C39CFB1BD7594FCD2D4027161E8D0DFA80E859C1F2BDE63C68A6C9A63C24CAE2604963910B5B2B31C170603BC0F0
5,462,251 UART: [art] SIG.R = F454ABE7A6B79DB8783F36682FCF6720709926619A4DC039F3812F77240A0FE1ACB9FBC376447F01E0B4F2F094F88297
5,469,014 UART: [art] SIG.S = 153223BCBC45EE3E0F2945AD2FC814872AFC7A7BFE0B06449EA8C2A130FF5152D4D4B89672EE51CE7DAFCBC2F2CB62D6
5,492,240 UART: Caliptra RT
5,492,494 UART: [state] CFI Enabled
5,600,910 UART: [rt] RT listening for mailbox commands...
5,601,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,125 UART: [rt]cmd =0x41544d4e, len=14344
5,725,696 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,966 UART: [kat] SHA2-256
881,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,012 UART: [kat] ++
886,164 UART: [kat] sha1
890,604 UART: [kat] SHA2-256
892,542 UART: [kat] SHA2-384
895,281 UART: [kat] SHA2-512-ACC
897,182 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,263 UART: [kat] LMS
1,475,459 UART: [kat] --
1,476,420 UART: [cold-reset] ++
1,476,938 UART: [fht] Storing FHT @ 0x50003400
1,479,789 UART: [idev] ++
1,479,957 UART: [idev] CDI.KEYID = 6
1,480,317 UART: [idev] SUBJECT.KEYID = 7
1,480,741 UART: [idev] UDS.KEYID = 0
1,481,086 ready_for_fw is high
1,481,086 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,739 UART: [idev] Erasing UDS.KEYID = 0
1,505,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,383 UART: [idev] --
1,515,388 UART: [ldev] ++
1,515,556 UART: [ldev] CDI.KEYID = 6
1,515,919 UART: [ldev] SUBJECT.KEYID = 5
1,516,345 UART: [ldev] AUTHORITY.KEYID = 7
1,516,808 UART: [ldev] FE.KEYID = 1
1,521,848 UART: [ldev] Erasing FE.KEYID = 1
1,547,187 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,313 UART: [ldev] --
1,586,766 UART: [fwproc] Waiting for Commands...
1,587,417 UART: [fwproc] Received command 0x46574c44
1,588,208 UART: [fwproc] Received Image of size 114360 bytes
5,235,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,263,923 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,293,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,429,084 >>> mbox cmd response: success
5,430,186 UART: [afmc] ++
5,430,354 UART: [afmc] CDI.KEYID = 6
5,430,716 UART: [afmc] SUBJECT.KEYID = 7
5,431,141 UART: [afmc] AUTHORITY.KEYID = 5
5,466,533 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,483,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,483,821 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,489,530 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,495,422 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,501,123 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,508,951 UART: [afmc] --
5,509,893 UART: [cold-reset] --
5,510,779 UART: [state] Locking Datavault
5,511,880 UART: [state] Locking PCR0, PCR1 and PCR31
5,512,484 UART: [state] Locking ICCM
5,513,014 UART: [exit] Launching FMC @ 0x40000130
5,518,343 UART:
5,518,359 UART: Running Caliptra FMC ...
5,518,767 UART:
5,518,910 UART: [state] CFI Enabled
5,529,342 UART: [fht] FMC Alias Private Key: 7
5,637,158 UART: [art] Extend RT PCRs Done
5,637,586 UART: [art] Lock RT PCRs Done
5,638,986 UART: [art] Populate DV Done
5,647,256 UART: [fht] FMC Alias Private Key: 7
5,648,370 UART: [art] Derive CDI
5,648,650 UART: [art] Store in in slot 0x4
5,734,311 UART: [art] Derive Key Pair
5,734,671 UART: [art] Store priv key in slot 0x5
5,748,459 UART: [art] Derive Key Pair - Done
5,763,075 UART: [art] Signing Cert with AUTHO
5,763,555 UART: RITY.KEYID = 7
5,778,851 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,616 UART: [art] PUB.X = A7DC89DD68F59F8BFA6A428AC793B68F22CDCC38DD624E1FBB02CD1D006EDBD97B5203B7A145F30FFECF7AFDB42B9626
5,786,385 UART: [art] PUB.Y = 52983FBEDD18BA688C2C429A9D20AF027AF73FB076C07FD37F72E5BE97F01134255DD77FB7762523226D4C7A86D6AC79
5,793,340 UART: [art] SIG.R = 30E5426F12D7044FBEADBAD203AD47383A87B9C1D1194C591C6197EFC0E68F5AE12F3128D0C0F7B3BCFBB92CA1D672B1
5,800,122 UART: [art] SIG.S = 45771A5889CDDAAE19419FDEA106731716FAA7FA27AC3089F91513D0C2E22BCD05C39BEAECE9FBC90F03270BE27E4DF1
5,823,800 UART: Caliptra RT
5,824,146 UART: [state] CFI Enabled
5,931,895 UART: [rt] RT listening for mailbox commands...
5,932,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,055,364 UART: [rt]cmd =0x41544d4e, len=14344
6,057,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,858 ready_for_fw is high
1,362,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,164,167 >>> mbox cmd response: success
5,225,378 UART:
5,225,394 UART: Running Caliptra FMC ...
5,225,802 UART:
5,225,945 UART: [state] CFI Enabled
5,236,351 UART: [fht] FMC Alias Private Key: 7
5,344,241 UART: [art] Extend RT PCRs Done
5,344,669 UART: [art] Lock RT PCRs Done
5,346,321 UART: [art] Populate DV Done
5,354,565 UART: [fht] FMC Alias Private Key: 7
5,355,619 UART: [art] Derive CDI
5,355,899 UART: [art] Store in in slot 0x4
5,441,328 UART: [art] Derive Key Pair
5,441,688 UART: [art] Store priv key in slot 0x5
5,454,420 UART: [art] Derive Key Pair - Done
5,468,886 UART: [art] Signing Cert with AUTHO
5,469,366 UART: RITY.KEYID = 7
5,485,066 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,831 UART: [art] PUB.X = 6A6107FC9FC32213AF82E113EDA744F08FEE367A3A98EFD07D6C283E7602DFAF5142CDF5F970C0FF51BB0CC9078AB884
5,492,607 UART: [art] PUB.Y = 32C1A00066574719B63D3F71CFC47789039B732FE64C6EE8CAA5C69BA89324F1A24D787AD0914BA7680780D39F3D9143
5,499,527 UART: [art] SIG.R = D3FD76659E15B11E686E0C93C082E554535AE42B34F4929F9001C4557EE97BB5C04FD7F898A49F44F26B4E6307400273
5,506,281 UART: [art] SIG.S = AD801EA10BF9190DBABB4A46E21A5D177188FF52A2E4F6B693EDC965090F9ED9C69B3E771B13AC64A0107D6468D6D55A
5,530,014 UART: Caliptra RT
5,530,360 UART: [state] CFI Enabled
5,638,433 UART: [rt] RT listening for mailbox commands...
5,639,103 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,806 UART: [rt]cmd =0x41544d4e, len=14344
5,763,227 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,446 UART: [kat] SHA2-512-ACC
908,347 UART: [kat] ECC-384
918,508 UART: [kat] HMAC-384Kdf
922,910 UART: [kat] LMS
1,171,238 UART: [kat] --
1,172,093 UART: [cold-reset] ++
1,172,433 UART: [fht] FHT @ 0x50003400
1,174,990 UART: [idev] ++
1,175,158 UART: [idev] CDI.KEYID = 6
1,175,518 UART: [idev] SUBJECT.KEYID = 7
1,175,942 UART: [idev] UDS.KEYID = 0
1,176,287 ready_for_fw is high
1,176,287 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,831 UART: [idev] Sha1 KeyId Algorithm
1,209,351 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,010 UART: [ldev] SUBJECT.KEYID = 5
1,211,436 UART: [ldev] AUTHORITY.KEYID = 7
1,211,899 UART: [ldev] FE.KEYID = 1
1,217,259 UART: [ldev] Erasing FE.KEYID = 1
1,243,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,311,573 >>> mbox cmd response: success
3,312,747 UART: [afmc] ++
3,312,915 UART: [afmc] CDI.KEYID = 6
3,313,277 UART: [afmc] SUBJECT.KEYID = 7
3,313,702 UART: [afmc] AUTHORITY.KEYID = 5
3,349,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,453 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,162 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,054 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,765 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,594 UART: [afmc] --
3,392,538 UART: [cold-reset] --
3,393,266 UART: [state] Locking Datavault
3,394,503 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,107 UART: [state] Locking ICCM
3,395,717 UART: [exit] Launching FMC @ 0x40000130
3,401,046 UART:
3,401,062 UART: Running Caliptra FMC ...
3,401,470 UART:
3,401,524 UART: [state] CFI Enabled
3,411,978 UART: [fht] FMC Alias Private Key: 7
3,519,276 UART: [art] Extend RT PCRs Done
3,519,704 UART: [art] Lock RT PCRs Done
3,521,354 UART: [art] Populate DV Done
3,529,732 UART: [fht] FMC Alias Private Key: 7
3,530,874 UART: [art] Derive CDI
3,531,154 UART: [art] Store in in slot 0x4
3,616,769 UART: [art] Derive Key Pair
3,617,129 UART: [art] Store priv key in slot 0x5
3,630,533 UART: [art] Derive Key Pair - Done
3,645,481 UART: [art] Signing Cert with AUTHO
3,645,961 UART: RITY.KEYID = 7
3,661,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,770 UART: [art] PUB.X = 6BE2BFFDE0CFF02A89D13DD1536ADEF48605AC1187170C4552D80B2D3D863C52EF47CA0CCBE8A37F87EDAF47D342806A
3,668,550 UART: [art] PUB.Y = 642A414E7AC828C58BC5CC56F6305C52BC31B93F703A74A9251D2D62C6CDFCDE3C93AE6CC4D104DD6CED7371C9D75332
3,675,513 UART: [art] SIG.R = CFA7632D7A1E40A6832370282F7D3827AD4C578DE6A1D73D5E371EC35D5D95CC4E85A428A8B6CED7C86DB6F28CECF385
3,682,299 UART: [art] SIG.S = 53EFD3231B44EB19D579D24CCA4A2B6FC1ECCD4F57B092E73BEC45D0797F6D1D625867B40F4C5E408BA72CA46FB52372
3,706,043 UART: Caliptra RT
3,706,297 UART: [state] CFI Enabled
3,813,806 UART: [rt] RT listening for mailbox commands...
3,814,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,109 UART: [rt]cmd =0x41544d4e, len=14344
3,938,496 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,257 ready_for_fw is high
1,060,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,835 >>> mbox cmd response: success
3,238,536 UART:
3,238,552 UART: Running Caliptra FMC ...
3,238,960 UART:
3,239,014 UART: [state] CFI Enabled
3,249,524 UART: [fht] FMC Alias Private Key: 7
3,357,030 UART: [art] Extend RT PCRs Done
3,357,458 UART: [art] Lock RT PCRs Done
3,358,992 UART: [art] Populate DV Done
3,366,950 UART: [fht] FMC Alias Private Key: 7
3,368,014 UART: [art] Derive CDI
3,368,294 UART: [art] Store in in slot 0x4
3,453,947 UART: [art] Derive Key Pair
3,454,307 UART: [art] Store priv key in slot 0x5
3,467,637 UART: [art] Derive Key Pair - Done
3,482,546 UART: [art] Signing Cert with AUTHO
3,483,026 UART: RITY.KEYID = 7
3,498,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,211 UART: [art] PUB.X = 478E273107521785468FDB7B641721C1CF0B4D33E94EF1B5F149184FA49B2873869DCF5577A926961E12FDFEF6E531D7
3,505,973 UART: [art] PUB.Y = E6DD10B37BD4B04F91D3450350F3382DDE2BA2336A2EC8C60C5059892BE939A568DAC8214EE447EAC4F2E69BFCC5C138
3,512,931 UART: [art] SIG.R = 095281F2C334847CB7843B5DC6701B065211967437A2C575621302015EEE4C07878F61A35D68FA72F802D3134A2BEEF9
3,519,673 UART: [art] SIG.S = C5EE271B657FA3228180B78B326EBF3B3D5624D88EA262811CB3B9FD195546C9C60DDD6D9D92B31756651E7D78BC6DFD
3,543,637 UART: Caliptra RT
3,543,891 UART: [state] CFI Enabled
3,651,620 UART: [rt] RT listening for mailbox commands...
3,652,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,693 UART: [rt]cmd =0x41544d4e, len=14344
3,776,302 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
918,613 UART: [kat] HMAC-384Kdf
923,115 UART: [kat] LMS
1,171,443 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,173,002 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 ready_for_fw is high
1,176,892 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,789 UART: [idev] Erasing UDS.KEYID = 0
1,202,010 UART: [idev] Sha1 KeyId Algorithm
1,210,500 UART: [idev] --
1,211,484 UART: [ldev] ++
1,211,652 UART: [ldev] CDI.KEYID = 6
1,212,015 UART: [ldev] SUBJECT.KEYID = 5
1,212,441 UART: [ldev] AUTHORITY.KEYID = 7
1,212,904 UART: [ldev] FE.KEYID = 1
1,218,274 UART: [ldev] Erasing FE.KEYID = 1
1,244,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,700 UART: [ldev] --
1,284,201 UART: [fwproc] Wait for Commands...
1,284,775 UART: [fwproc] Recv command 0x46574c44
1,285,503 UART: [fwproc] Recv'd Img size: 114360 bytes
3,130,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,324,480 >>> mbox cmd response: success
3,325,672 UART: [afmc] ++
3,325,840 UART: [afmc] CDI.KEYID = 6
3,326,202 UART: [afmc] SUBJECT.KEYID = 7
3,326,627 UART: [afmc] AUTHORITY.KEYID = 5
3,362,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,308 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,017 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,909 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,620 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,663 UART: [afmc] --
3,405,661 UART: [cold-reset] --
3,406,623 UART: [state] Locking Datavault
3,407,700 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,304 UART: [state] Locking ICCM
3,408,902 UART: [exit] Launching FMC @ 0x40000130
3,414,231 UART:
3,414,247 UART: Running Caliptra FMC ...
3,414,655 UART:
3,414,798 UART: [state] CFI Enabled
3,425,172 UART: [fht] FMC Alias Private Key: 7
3,533,254 UART: [art] Extend RT PCRs Done
3,533,682 UART: [art] Lock RT PCRs Done
3,535,406 UART: [art] Populate DV Done
3,543,460 UART: [fht] FMC Alias Private Key: 7
3,544,468 UART: [art] Derive CDI
3,544,748 UART: [art] Store in in slot 0x4
3,630,191 UART: [art] Derive Key Pair
3,630,551 UART: [art] Store priv key in slot 0x5
3,643,783 UART: [art] Derive Key Pair - Done
3,658,435 UART: [art] Signing Cert with AUTHO
3,658,915 UART: RITY.KEYID = 7
3,673,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,642 UART: [art] PUB.X = 4888ACD3331B480D6C388530B930592578F1AF2DFDDF2068FBDE8E361C8C9D6563EFD11E1994A4D16FCCEDE7F2A2F7C3
3,681,425 UART: [art] PUB.Y = ACC3E6F917A58FB71E118C4499DFDEE6EE0C1E2D81757FEF2256D60D4BBE32E2812A7BC84D0D7F1E586D791EACFD51A7
3,688,390 UART: [art] SIG.R = 100CA895159A5811FD0860BC6A9A867A812A167D51C1A96D53F7A0EB5722BBED02CC01EB653CBA18D84A9A86BF20C358
3,695,158 UART: [art] SIG.S = 10257876451924338F16C7FA7C008743723A0E537E50B697657B090CFFDB060E168D612C85EA32BD09C0232384AA5D0A
3,719,172 UART: Caliptra RT
3,719,518 UART: [state] CFI Enabled
3,827,260 UART: [rt] RT listening for mailbox commands...
3,827,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,669 UART: [rt]cmd =0x41544d4e, len=14344
3,952,210 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,080 ready_for_fw is high
1,061,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,168,923 >>> mbox cmd response: success
3,231,590 UART:
3,231,606 UART: Running Caliptra FMC ...
3,232,014 UART:
3,232,157 UART: [state] CFI Enabled
3,242,475 UART: [fht] FMC Alias Private Key: 7
3,349,637 UART: [art] Extend RT PCRs Done
3,350,065 UART: [art] Lock RT PCRs Done
3,351,543 UART: [art] Populate DV Done
3,359,485 UART: [fht] FMC Alias Private Key: 7
3,360,483 UART: [art] Derive CDI
3,360,763 UART: [art] Store in in slot 0x4
3,446,848 UART: [art] Derive Key Pair
3,447,208 UART: [art] Store priv key in slot 0x5
3,460,584 UART: [art] Derive Key Pair - Done
3,475,494 UART: [art] Signing Cert with AUTHO
3,475,974 UART: RITY.KEYID = 7
3,491,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,163 UART: [art] PUB.X = 447D0E1EB574AECD2AE043B293F3C543AAE52707E2DA432FBAA15C370B094251DFF77835972693AAADA38AA27B9EF5E8
3,498,937 UART: [art] PUB.Y = 5F18A4AA1A5BB570D10E95F4FAE04ADC1D959461873A64312932212FA64181AC48CF4BA23D185DF1DFF3B43F13C4AA92
3,505,896 UART: [art] SIG.R = D3F9A1C0BF59CCFA5B4928AB842112D9390E553DFD6428C78D0B0B4123B4DD247280139CF2D3AE8FFFF92BBFE096955F
3,512,673 UART: [art] SIG.S = 5FA66FD516B86BD18376DC925C7ACC8C377073332CB77D598836A93025C0E8B6852574351E98D09784CD369A9BC0F585
3,536,528 UART: Caliptra RT
3,536,874 UART: [state] CFI Enabled
3,644,461 UART: [rt] RT listening for mailbox commands...
3,645,131 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,010 UART: [rt]cmd =0x41544d4e, len=14344
3,769,605 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,174,399 ready_for_fw is high
1,174,399 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,379 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,342 UART: [ldev] ++
1,209,510 UART: [ldev] CDI.KEYID = 6
1,209,874 UART: [ldev] SUBJECT.KEYID = 5
1,210,301 UART: [ldev] AUTHORITY.KEYID = 7
1,210,764 UART: [ldev] FE.KEYID = 1
1,216,162 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,458 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,583 UART: [fwproc] Recv command 0x46574c44
1,282,316 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,311,787 >>> mbox cmd response: success
3,312,824 UART: [afmc] ++
3,312,992 UART: [afmc] CDI.KEYID = 6
3,313,355 UART: [afmc] SUBJECT.KEYID = 7
3,313,781 UART: [afmc] AUTHORITY.KEYID = 5
3,348,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,216 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,926 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,816 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,527 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,325 UART: [afmc] --
3,392,225 UART: [cold-reset] --
3,392,915 UART: [state] Locking Datavault
3,394,038 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,642 UART: [state] Locking ICCM
3,395,094 UART: [exit] Launching FMC @ 0x40000130
3,400,423 UART:
3,400,439 UART: Running Caliptra FMC ...
3,400,847 UART:
3,400,901 UART: [state] CFI Enabled
3,411,207 UART: [fht] FMC Alias Private Key: 7
3,519,581 UART: [art] Extend RT PCRs Done
3,520,009 UART: [art] Lock RT PCRs Done
3,521,477 UART: [art] Populate DV Done
3,529,821 UART: [fht] FMC Alias Private Key: 7
3,530,891 UART: [art] Derive CDI
3,531,171 UART: [art] Store in in slot 0x4
3,616,806 UART: [art] Derive Key Pair
3,617,166 UART: [art] Store priv key in slot 0x5
3,629,970 UART: [art] Derive Key Pair - Done
3,644,811 UART: [art] Signing Cert with AUTHO
3,645,291 UART: RITY.KEYID = 7
3,660,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,972 UART: [art] PUB.X = 43294A699BD7E6AA3A2F3FBC44422EB479FE3A41007E46C9D3003079A9C1F688EB394909FF4208FDCD500C13B3745121
3,667,691 UART: [art] PUB.Y = F919CCE39AD9C06846F407BA82CE1022F592B8EB4881CE92E854A5AAF4DE9368C7F726F188B3CF5B91B1F9EF7F5CF10B
3,674,653 UART: [art] SIG.R = A264C3DBE77E7AFD8E841BD96C66EEEA0DCA7BDFD73A19DEFC3FAD7889FEDCD8FD25438699AD0F2DA2B5B606A198A624
3,681,448 UART: [art] SIG.S = 1B223ABAB0C272D9940C8A238848FEE3D40D374EFE2AE2AE3307AE57DAA606C9973A99BBB4188BF42DD448A3AA09ECCA
3,705,468 UART: Caliptra RT
3,705,722 UART: [state] CFI Enabled
3,813,031 UART: [rt] RT listening for mailbox commands...
3,813,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,596 UART: [rt]cmd =0x41544d4e, len=14344
3,938,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,300 ready_for_fw is high
1,055,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,163,462 >>> mbox cmd response: success
3,225,213 UART:
3,225,229 UART: Running Caliptra FMC ...
3,225,637 UART:
3,225,691 UART: [state] CFI Enabled
3,236,125 UART: [fht] FMC Alias Private Key: 7
3,344,139 UART: [art] Extend RT PCRs Done
3,344,567 UART: [art] Lock RT PCRs Done
3,346,129 UART: [art] Populate DV Done
3,354,259 UART: [fht] FMC Alias Private Key: 7
3,355,413 UART: [art] Derive CDI
3,355,693 UART: [art] Store in in slot 0x4
3,441,956 UART: [art] Derive Key Pair
3,442,316 UART: [art] Store priv key in slot 0x5
3,455,880 UART: [art] Derive Key Pair - Done
3,470,842 UART: [art] Signing Cert with AUTHO
3,471,322 UART: RITY.KEYID = 7
3,486,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,217 UART: [art] PUB.X = 73C33976DD8DEED154EDF8701E3C2985EB0B2A3779B0790D21B4448979B8CD614147BE1EE2EF820037D30DFFDD8DB88E
3,493,968 UART: [art] PUB.Y = 3486B2F5C198083E59837B6B0996C9DBE5D00CD5D386CF05980B0AE3F1920C11B15F2E12A6766AF56CD2D9A9286122B8
3,500,899 UART: [art] SIG.R = 6268B508A73BD74A14970B5A929A8164E66302A932EF90EC156D22DADC3DF87080C650A102F3BEBB67CDFB945237D617
3,507,661 UART: [art] SIG.S = 9F46F71F0AE19EECECBE1C0DCF87BDD6A28712A51E365BBE59E1EFE721AB8DFCF0089E9D04889DF54C23B16C73F9A361
3,530,998 UART: Caliptra RT
3,531,252 UART: [state] CFI Enabled
3,638,715 UART: [rt] RT listening for mailbox commands...
3,639,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,996 UART: [rt]cmd =0x41544d4e, len=14344
3,763,499 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,446 UART: [kat] SHA2-256
901,386 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,174,272 ready_for_fw is high
1,174,272 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,096 UART: [idev] --
1,208,907 UART: [ldev] ++
1,209,075 UART: [ldev] CDI.KEYID = 6
1,209,439 UART: [ldev] SUBJECT.KEYID = 5
1,209,866 UART: [ldev] AUTHORITY.KEYID = 7
1,210,329 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,831 UART: [ldev] --
1,281,221 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114360 bytes
3,115,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,308,364 >>> mbox cmd response: success
3,309,605 UART: [afmc] ++
3,309,773 UART: [afmc] CDI.KEYID = 6
3,310,136 UART: [afmc] SUBJECT.KEYID = 7
3,310,562 UART: [afmc] AUTHORITY.KEYID = 5
3,345,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,981 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,691 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,581 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,292 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,998 UART: [afmc] --
3,389,014 UART: [cold-reset] --
3,390,176 UART: [state] Locking Datavault
3,391,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,921 UART: [state] Locking ICCM
3,392,573 UART: [exit] Launching FMC @ 0x40000130
3,397,902 UART:
3,397,918 UART: Running Caliptra FMC ...
3,398,326 UART:
3,398,469 UART: [state] CFI Enabled
3,409,251 UART: [fht] FMC Alias Private Key: 7
3,516,869 UART: [art] Extend RT PCRs Done
3,517,297 UART: [art] Lock RT PCRs Done
3,519,065 UART: [art] Populate DV Done
3,527,121 UART: [fht] FMC Alias Private Key: 7
3,528,225 UART: [art] Derive CDI
3,528,505 UART: [art] Store in in slot 0x4
3,614,548 UART: [art] Derive Key Pair
3,614,908 UART: [art] Store priv key in slot 0x5
3,628,892 UART: [art] Derive Key Pair - Done
3,643,783 UART: [art] Signing Cert with AUTHO
3,644,263 UART: RITY.KEYID = 7
3,659,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,036 UART: [art] PUB.X = 5EC253F2098A1C35276E5F5CF519A94FCF653163BE8B9BB340F4B053886219B379A2853FF863DDD69A7FDF2435FC7FE4
3,666,811 UART: [art] PUB.Y = 0DD0E391814A538720744D1960D31E316896E0608E759079591E2E7F5A0FDB87F6188EF9317CD533860B1B0243B1F052
3,673,737 UART: [art] SIG.R = 1D5BBA36550E9DE7DF9770B08329DDDAE010618FDD49741849F5FABB821405799BD01D0612592473DF626E5976DD8EC7
3,680,502 UART: [art] SIG.S = 9F5D2F77F784651F474B70510307D4F30DBAA1DBB9CD522D0EF26C23E13F7BD824BCE0CBFFE27F0FD5E40481CCE8454C
3,704,035 UART: Caliptra RT
3,704,381 UART: [state] CFI Enabled
3,812,816 UART: [rt] RT listening for mailbox commands...
3,813,486 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,117 UART: [rt]cmd =0x41544d4e, len=14344
3,937,692 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 ready_for_fw is high
1,056,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,178,140 >>> mbox cmd response: success
3,240,303 UART:
3,240,319 UART: Running Caliptra FMC ...
3,240,727 UART:
3,240,870 UART: [state] CFI Enabled
3,251,598 UART: [fht] FMC Alias Private Key: 7
3,360,032 UART: [art] Extend RT PCRs Done
3,360,460 UART: [art] Lock RT PCRs Done
3,361,922 UART: [art] Populate DV Done
3,370,216 UART: [fht] FMC Alias Private Key: 7
3,371,226 UART: [art] Derive CDI
3,371,506 UART: [art] Store in in slot 0x4
3,456,783 UART: [art] Derive Key Pair
3,457,143 UART: [art] Store priv key in slot 0x5
3,470,117 UART: [art] Derive Key Pair - Done
3,485,047 UART: [art] Signing Cert with AUTHO
3,485,527 UART: RITY.KEYID = 7
3,500,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,434 UART: [art] PUB.X = 0A458912A33D3F054911A2E8664E7C412AF895DB2F5D26AF866D603FA3B3BD73D32FE70FBCE9B0CF99971C83308C95B2
3,508,203 UART: [art] PUB.Y = 25428591BECBE7E2EA0A58FE9C58BB87F457B8938606F433883CABB1FC7A3CE90BE5E5B29EB8019667748987A4D4E76C
3,515,151 UART: [art] SIG.R = 3ADAD219BC4A221EB0B6697E38DE973690428784DA7149B75E889CC53EEDB853ED1CA539573AC4D354F6C9BC8E367B64
3,521,931 UART: [art] SIG.S = 5F3D3AF8378E0B5787A72AFEF79B27BFC7CF6920782B058F3C5EA5AE7FEB5EA217EA61BF1CCDC6B6CA1E61FA464D62FD
3,545,766 UART: Caliptra RT
3,546,112 UART: [state] CFI Enabled
3,653,808 UART: [rt] RT listening for mailbox commands...
3,654,478 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,181 UART: [rt]cmd =0x41544d4e, len=14344
3,778,810 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,007 writing to cptra_bootfsm_go
194,204 UART:
194,552 UART: Running Caliptra ROM ...
195,737 UART:
195,888 UART: [state] CFI Enabled
264,560 UART: [state] LifecycleState = Unprovisioned
266,529 UART: [state] DebugLocked = No
268,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,984 UART: [kat] SHA2-256
442,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,214 UART: [kat] ++
453,689 UART: [kat] sha1
465,913 UART: [kat] SHA2-256
468,634 UART: [kat] SHA2-384
474,830 UART: [kat] SHA2-512-ACC
477,193 UART: [kat] ECC-384
2,768,569 UART: [kat] HMAC-384Kdf
2,800,124 UART: [kat] LMS
3,990,419 UART: [kat] --
3,994,720 UART: [cold-reset] ++
3,996,583 UART: [fht] Storing FHT @ 0x50003400
4,008,005 UART: [idev] ++
4,008,619 UART: [idev] CDI.KEYID = 6
4,009,508 UART: [idev] SUBJECT.KEYID = 7
4,010,750 UART: [idev] UDS.KEYID = 0
4,011,793 ready_for_fw is high
4,011,978 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,232 UART: [idev] Erasing UDS.KEYID = 0
7,344,447 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,488 UART: [idev] --
7,372,102 UART: [ldev] ++
7,372,725 UART: [ldev] CDI.KEYID = 6
7,373,657 UART: [ldev] SUBJECT.KEYID = 5
7,374,857 UART: [ldev] AUTHORITY.KEYID = 7
7,376,137 UART: [ldev] FE.KEYID = 1
7,422,256 UART: [ldev] Erasing FE.KEYID = 1
10,753,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,419 UART: [ldev] --
13,116,294 UART: [fwproc] Waiting for Commands...
13,119,675 UART: [fwproc] Received command 0x46574c44
13,122,033 UART: [fwproc] Received Image of size 114036 bytes
21,754,943 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,837,977 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,906,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,223,477 >>> mbox cmd response: success
22,228,224 UART: [afmc] ++
22,228,818 UART: [afmc] CDI.KEYID = 6
22,229,724 UART: [afmc] SUBJECT.KEYID = 7
22,230,933 UART: [afmc] AUTHORITY.KEYID = 5
25,591,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,888,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,890,332 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,904,893 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,919,628 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,933,876 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,954,931 UART: [afmc] --
27,958,905 UART: [cold-reset] --
27,963,080 UART: [state] Locking Datavault
27,967,509 UART: [state] Locking PCR0, PCR1 and PCR31
27,969,255 UART: [state] Locking ICCM
27,971,529 UART: [exit] Launching FMC @ 0x40000130
27,979,917 UART:
27,980,155 UART: Running Caliptra FMC ...
27,981,248 UART:
27,981,398 UART: [state] CFI Enabled
28,048,207 UART: [fht] FMC Alias Private Key: 7
30,385,889 UART: [art] Extend RT PCRs Done
30,387,108 UART: [art] Lock RT PCRs Done
30,389,092 UART: [art] Populate DV Done
30,394,463 UART: [fht] FMC Alias Private Key: 7
30,396,108 UART: [art] Derive CDI
30,396,915 UART: [art] Store in in slot 0x4
30,456,392 UART: [art] Derive Key Pair
30,457,430 UART: [art] Store priv key in slot 0x5
33,752,046 UART: [art] Derive Key Pair - Done
33,765,204 UART: [art] Signing Cert with AUTHO
33,766,542 UART: RITY.KEYID = 7
36,053,416 UART: [art] Erasing AUTHORITY.KEYID = 7
36,054,929 UART: [art] PUB.X = 322A4FEACADC571AB9C77D1A129D3D7731EA884C037EE36E9B0B5938A8CB2F0D97E1631694C990214F7EF18FA0AA0121
36,062,144 UART: [art] PUB.Y = CCF3B96B869D1481CC764A9A006E092FCE6DD2F0768E4F0663F2A02A17938DDC32F54277CF43F1D27F2D938523C4B0E3
36,069,443 UART: [art] SIG.R = 410845EF775DA8467EDA146F97877D4A7951F8590C06975F6051B26B51F2E8123EA16285BC001D109826BE9A82BFF0ED
36,076,799 UART: [art] SIG.S = DAF9BE29AB2DFDF29C76561B727F717CC10FA67E84F9B0CE60026F997C99E1B45BC9353350C12395366BA354D7776E92
37,382,505 UART: Caliptra RT
37,383,212 UART: [state] CFI Enabled
37,543,003 UART: [rt] RT listening for mailbox commands...
37,545,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,700,541 UART: [rt]cmd =0x41544d4e, len=14344
37,705,961 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,785,070 ready_for_fw is high
3,785,467 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,122,930 >>> mbox cmd response: success
27,812,766 UART:
27,813,146 UART: Running Caliptra FMC ...
27,814,230 UART:
27,814,397 UART: [state] CFI Enabled
27,882,050 UART: [fht] FMC Alias Private Key: 7
30,220,059 UART: [art] Extend RT PCRs Done
30,221,296 UART: [art] Lock RT PCRs Done
30,222,833 UART: [art] Populate DV Done
30,228,338 UART: [fht] FMC Alias Private Key: 7
30,229,979 UART: [art] Derive CDI
30,230,711 UART: [art] Store in in slot 0x4
30,290,243 UART: [art] Derive Key Pair
30,291,284 UART: [art] Store priv key in slot 0x5
33,584,141 UART: [art] Derive Key Pair - Done
33,597,249 UART: [art] Signing Cert with AUTHO
33,598,555 UART: RITY.KEYID = 7
35,886,582 UART: [art] Erasing AUTHORITY.KEYID = 7
35,888,095 UART: [art] PUB.X = 1B115094BF03A9A248C4E79F1B1981842652EF15F5286703E323AD9CBEA158700DCC52A59BE72FD1AA04A2E7746592ED
35,895,319 UART: [art] PUB.Y = 67B77C05CA3ADFA0C541931B21FF23F94A9870DCAE1F7AB53C2F4C59096356E21238AA722D5B6F1CEBE44B189AFE1131
35,902,578 UART: [art] SIG.R = 1BA36C5D38801642CC37EA0C90A79B34AA87CDA97950AAB04EC119264EEEDE2170D3E1243214CDB25B68238418BEFC3B
35,909,995 UART: [art] SIG.S = D784D6B3B43FBE22D98E558A9F67D012C988EA3E28F7EAAC1214535A9DBFC7F0562AC9B9C83BCA0DEFDD094346C66872
37,215,369 UART: Caliptra RT
37,216,085 UART: [state] CFI Enabled
37,377,368 UART: [rt] RT listening for mailbox commands...
37,379,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,535,079 UART: [rt]cmd =0x41544d4e, len=14344
37,540,238 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,568 UART:
192,910 UART: Running Caliptra ROM ...
194,102 UART:
603,803 UART: [state] CFI Enabled
622,104 UART: [state] LifecycleState = Unprovisioned
624,057 UART: [state] DebugLocked = No
626,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,594 UART: [kat] SHA2-256
802,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,904 UART: [kat] ++
813,359 UART: [kat] sha1
824,324 UART: [kat] SHA2-256
826,980 UART: [kat] SHA2-384
833,254 UART: [kat] SHA2-512-ACC
835,618 UART: [kat] ECC-384
3,121,219 UART: [kat] HMAC-384Kdf
3,132,895 UART: [kat] LMS
4,322,998 UART: [kat] --
4,326,858 UART: [cold-reset] ++
4,327,862 UART: [fht] Storing FHT @ 0x50003400
4,339,016 UART: [idev] ++
4,339,578 UART: [idev] CDI.KEYID = 6
4,340,525 UART: [idev] SUBJECT.KEYID = 7
4,341,762 UART: [idev] UDS.KEYID = 0
4,342,760 ready_for_fw is high
4,342,976 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,219 UART: [idev] Erasing UDS.KEYID = 0
7,628,483 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,018 UART: [idev] --
7,654,492 UART: [ldev] ++
7,655,065 UART: [ldev] CDI.KEYID = 6
7,656,030 UART: [ldev] SUBJECT.KEYID = 5
7,657,245 UART: [ldev] AUTHORITY.KEYID = 7
7,658,474 UART: [ldev] FE.KEYID = 1
7,670,283 UART: [ldev] Erasing FE.KEYID = 1
10,960,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,828 UART: [ldev] --
13,320,495 UART: [fwproc] Waiting for Commands...
13,322,907 UART: [fwproc] Received command 0x46574c44
13,325,102 UART: [fwproc] Received Image of size 114036 bytes
22,201,021 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,282,386 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,351,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,668,255 >>> mbox cmd response: success
22,673,247 UART: [afmc] ++
22,673,840 UART: [afmc] CDI.KEYID = 6
22,674,720 UART: [afmc] SUBJECT.KEYID = 7
22,675,995 UART: [afmc] AUTHORITY.KEYID = 5
25,990,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,287,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,289,378 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,303,959 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,318,673 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,332,944 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,355,147 UART: [afmc] --
28,359,464 UART: [cold-reset] --
28,362,626 UART: [state] Locking Datavault
28,366,957 UART: [state] Locking PCR0, PCR1 and PCR31
28,368,707 UART: [state] Locking ICCM
28,370,531 UART: [exit] Launching FMC @ 0x40000130
28,378,924 UART:
28,379,159 UART: Running Caliptra FMC ...
28,380,259 UART:
28,380,410 UART: [state] CFI Enabled
28,388,497 UART: [fht] FMC Alias Private Key: 7
30,719,099 UART: [art] Extend RT PCRs Done
30,720,331 UART: [art] Lock RT PCRs Done
30,722,144 UART: [art] Populate DV Done
30,727,669 UART: [fht] FMC Alias Private Key: 7
30,729,376 UART: [art] Derive CDI
30,730,194 UART: [art] Store in in slot 0x4
30,772,490 UART: [art] Derive Key Pair
30,773,491 UART: [art] Store priv key in slot 0x5
34,015,708 UART: [art] Derive Key Pair - Done
34,028,659 UART: [art] Signing Cert with AUTHO
34,029,963 UART: RITY.KEYID = 7
36,308,876 UART: [art] Erasing AUTHORITY.KEYID = 7
36,310,388 UART: [art] PUB.X = 1380F83BCA7541A8987494320EC5ABF4BDF552A6B1EA291359042B52B5F81668AE6C308E2B3E23610B2EED3A9CD65C50
36,317,652 UART: [art] PUB.Y = 101890602E1579150E190EF7D44C9BB20C6B54989E528E383064E992E12AFEF21D419EA61E5EF3174CC7C19A5EA9F4CD
36,324,887 UART: [art] SIG.R = 85C0BBBB19C7E1C9A6D4FE67A342DD96350958251CB41574341D2E653563933CC729114B72CE4788254ED5FC55880ABA
36,332,278 UART: [art] SIG.S = 477CC33301B6EA27A203B97FB0F3A38F73814953132E07ED61BF886F24FF85E60CD75BAA2A60DFEEBD264D483F19D4C9
37,636,928 UART: Caliptra RT
37,637,623 UART: [state] CFI Enabled
37,755,236 UART: [rt] RT listening for mailbox commands...
37,757,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,912,784 UART: [rt]cmd =0x41544d4e, len=14344
37,917,989 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
4,127,347 ready_for_fw is high
4,127,964 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,327,712 >>> mbox cmd response: success
27,972,766 UART:
27,973,190 UART: Running Caliptra FMC ...
27,974,308 UART:
27,974,462 UART: [state] CFI Enabled
27,982,519 UART: [fht] FMC Alias Private Key: 7
30,312,800 UART: [art] Extend RT PCRs Done
30,314,029 UART: [art] Lock RT PCRs Done
30,315,577 UART: [art] Populate DV Done
30,320,936 UART: [fht] FMC Alias Private Key: 7
30,322,420 UART: [art] Derive CDI
30,323,151 UART: [art] Store in in slot 0x4
30,365,533 UART: [art] Derive Key Pair
30,366,575 UART: [art] Store priv key in slot 0x5
33,608,003 UART: [art] Derive Key Pair - Done
33,621,392 UART: [art] Signing Cert with AUTHO
33,622,703 UART: RITY.KEYID = 7
35,901,983 UART: [art] Erasing AUTHORITY.KEYID = 7
35,903,494 UART: [art] PUB.X = E584E99533D039D4B9EE83CF083B525B92D0DED94DAB32C3DE7534B7DC3A0B8FB02B6ACE9FD06C28721163AEC89287B9
35,910,763 UART: [art] PUB.Y = 54B73C3ADAE5F22236DE6F78C56F1C4DD74C92045A5401211EDD0EA7DA55971175661976FA3C842D2DF669E629866769
35,917,998 UART: [art] SIG.R = 9327E456F128D0DA9173E5B0650E66122EDAADB561CEE821058E9F190FA7938D3028F2FE66766755AA4C1ABB2AD81246
35,925,367 UART: [art] SIG.S = CE28029741FB1A804E191A1892DBFA1A306764E12823676404B360768CA457BDEA6D4B3CDEAF2908E156FAC9539F7596
37,230,520 UART: Caliptra RT
37,231,213 UART: [state] CFI Enabled
37,348,542 UART: [rt] RT listening for mailbox commands...
37,350,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,506,099 UART: [rt]cmd =0x41544d4e, len=14344
37,511,521 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
192,696 UART:
193,060 UART: Running Caliptra ROM ...
194,269 UART:
194,422 UART: [state] CFI Enabled
262,744 UART: [state] LifecycleState = Unprovisioned
264,683 UART: [state] DebugLocked = No
266,085 UART: [state] WD Timer not started. Device not locked for debugging
270,485 UART: [kat] SHA2-256
449,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,187 UART: [kat] ++
461,727 UART: [kat] sha1
473,483 UART: [kat] SHA2-256
476,563 UART: [kat] SHA2-384
482,415 UART: [kat] SHA2-512-ACC
485,423 UART: [kat] ECC-384
2,947,801 UART: [kat] HMAC-384Kdf
2,972,119 UART: [kat] LMS
3,501,554 UART: [kat] --
3,507,672 UART: [cold-reset] ++
3,508,549 UART: [fht] FHT @ 0x50003400
3,520,881 UART: [idev] ++
3,521,447 UART: [idev] CDI.KEYID = 6
3,522,329 UART: [idev] SUBJECT.KEYID = 7
3,523,576 UART: [idev] UDS.KEYID = 0
3,524,477 ready_for_fw is high
3,524,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,605 UART: [idev] Erasing UDS.KEYID = 0
6,027,652 UART: [idev] Sha1 KeyId Algorithm
6,050,872 UART: [idev] --
6,056,000 UART: [ldev] ++
6,056,593 UART: [ldev] CDI.KEYID = 6
6,057,512 UART: [ldev] SUBJECT.KEYID = 5
6,058,675 UART: [ldev] AUTHORITY.KEYID = 7
6,059,918 UART: [ldev] FE.KEYID = 1
6,100,591 UART: [ldev] Erasing FE.KEYID = 1
8,601,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,591 UART: [ldev] --
10,392,277 UART: [fwproc] Wait for Commands...
10,394,811 UART: [fwproc] Recv command 0x46574c44
10,396,867 UART: [fwproc] Recv'd Img size: 114360 bytes
14,968,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,040,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,109,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,426,604 >>> mbox cmd response: success
15,430,007 UART: [afmc] ++
15,430,607 UART: [afmc] CDI.KEYID = 6
15,431,521 UART: [afmc] SUBJECT.KEYID = 7
15,432,679 UART: [afmc] AUTHORITY.KEYID = 5
17,960,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,696,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,697,976 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,713,944 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,729,898 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,745,684 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,768,349 UART: [afmc] --
19,771,474 UART: [cold-reset] --
19,773,931 UART: [state] Locking Datavault
19,779,503 UART: [state] Locking PCR0, PCR1 and PCR31
19,781,155 UART: [state] Locking ICCM
19,783,362 UART: [exit] Launching FMC @ 0x40000130
19,791,762 UART:
19,792,005 UART: Running Caliptra FMC ...
19,793,114 UART:
19,793,273 UART: [state] CFI Enabled
19,856,285 UART: [fht] FMC Alias Private Key: 7
21,619,432 UART: [art] Extend RT PCRs Done
21,620,655 UART: [art] Lock RT PCRs Done
21,622,498 UART: [art] Populate DV Done
21,628,184 UART: [fht] FMC Alias Private Key: 7
21,629,735 UART: [art] Derive CDI
21,630,557 UART: [art] Store in in slot 0x4
21,688,866 UART: [art] Derive Key Pair
21,689,912 UART: [art] Store priv key in slot 0x5
24,152,653 UART: [art] Derive Key Pair - Done
24,165,593 UART: [art] Signing Cert with AUTHO
24,166,907 UART: RITY.KEYID = 7
25,878,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,880,048 UART: [art] PUB.X = ACF568972A37C3A2C5959A19AE73F220750EF87653044B332621DCBD6F300B83B82BE8503598C96060E36A7A4A03D4AD
25,887,264 UART: [art] PUB.Y = 70F1FF3A72E9EB950D020B02FEE821DE8FD8796935898BBFB6D801227945DC157651ABC1F7695097C66776889C12FA21
25,894,547 UART: [art] SIG.R = 1DB780C410FA98A2311C00B8E8AA7C4C7B6E8EEA0BD845E080269B74CDBDDADAA5A01B20962403702E23015029975B52
25,901,890 UART: [art] SIG.S = 25D034ADE042F7DE03B82271FEB91DEFA10F922C054446B76A479FDE00E1C3A98522E220669B6D6533DA5A071FB9F9C6
26,880,347 UART: Caliptra RT
26,881,037 UART: [state] CFI Enabled
27,045,154 UART: [rt] RT listening for mailbox commands...
27,047,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,202,456 UART: [rt]cmd =0x41544d4e, len=14344
27,207,821 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,645 UART:
193,014 UART: Running Caliptra ROM ...
194,151 UART:
194,298 UART: [state] CFI Enabled
261,330 UART: [state] LifecycleState = Unprovisioned
263,698 UART: [state] DebugLocked = No
266,209 UART: [state] WD Timer not started. Device not locked for debugging
270,936 UART: [kat] SHA2-256
460,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,574 UART: [kat] ++
472,021 UART: [kat] sha1
483,960 UART: [kat] SHA2-256
486,968 UART: [kat] SHA2-384
493,036 UART: [kat] SHA2-512-ACC
495,628 UART: [kat] ECC-384
2,947,185 UART: [kat] HMAC-384Kdf
2,971,212 UART: [kat] LMS
3,502,978 UART: [kat] --
3,508,350 UART: [cold-reset] ++
3,510,289 UART: [fht] FHT @ 0x50003400
3,520,352 UART: [idev] ++
3,521,067 UART: [idev] CDI.KEYID = 6
3,522,103 UART: [idev] SUBJECT.KEYID = 7
3,523,210 UART: [idev] UDS.KEYID = 0
3,524,152 ready_for_fw is high
3,524,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,211 UART: [idev] Erasing UDS.KEYID = 0
6,025,835 UART: [idev] Sha1 KeyId Algorithm
6,049,109 UART: [idev] --
6,053,543 UART: [ldev] ++
6,054,242 UART: [ldev] CDI.KEYID = 6
6,055,155 UART: [ldev] SUBJECT.KEYID = 5
6,056,317 UART: [ldev] AUTHORITY.KEYID = 7
6,057,552 UART: [ldev] FE.KEYID = 1
6,098,304 UART: [ldev] Erasing FE.KEYID = 1
8,604,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,295 UART: [ldev] --
10,410,830 UART: [fwproc] Wait for Commands...
10,412,549 UART: [fwproc] Recv command 0x46574c44
10,414,857 UART: [fwproc] Recv'd Img size: 114360 bytes
15,011,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,091,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,208,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,750,180 >>> mbox cmd response: success
15,753,468 UART: [afmc] ++
15,754,183 UART: [afmc] CDI.KEYID = 6
15,755,449 UART: [afmc] SUBJECT.KEYID = 7
15,756,891 UART: [afmc] AUTHORITY.KEYID = 5
18,302,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,023,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,025,030 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,040,104 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,055,263 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,070,177 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,092,464 UART: [afmc] --
20,095,739 UART: [cold-reset] --
20,099,016 UART: [state] Locking Datavault
20,102,447 UART: [state] Locking PCR0, PCR1 and PCR31
20,104,653 UART: [state] Locking ICCM
20,106,642 UART: [exit] Launching FMC @ 0x40000130
20,115,282 UART:
20,115,556 UART: Running Caliptra FMC ...
20,116,689 UART:
20,116,851 UART: [state] CFI Enabled
20,183,220 UART: [fht] FMC Alias Private Key: 7
21,947,470 UART: [art] Extend RT PCRs Done
21,948,689 UART: [art] Lock RT PCRs Done
21,950,585 UART: [art] Populate DV Done
21,955,934 UART: [fht] FMC Alias Private Key: 7
21,957,591 UART: [art] Derive CDI
21,958,413 UART: [art] Store in in slot 0x4
22,016,535 UART: [art] Derive Key Pair
22,017,540 UART: [art] Store priv key in slot 0x5
24,480,778 UART: [art] Derive Key Pair - Done
24,493,827 UART: [art] Signing Cert with AUTHO
24,495,135 UART: RITY.KEYID = 7
26,206,484 UART: [art] Erasing AUTHORITY.KEYID = 7
26,207,983 UART: [art] PUB.X = 1994B787587EDFCA90ECEBFE5D00CBE453A4A19E8C1F72FECBC40170741C731D4694CCC78C66F71ED4B142CE6F477481
26,215,225 UART: [art] PUB.Y = CF206B41C74B0CAB07D5E248EF6B10BC7F138F05822F78513052D24408747E5FFB82A95BF66DA120E07E24392F319DCE
26,222,508 UART: [art] SIG.R = 20B8B02A92C523D71A160BC5427C3B3221E955FBFE5EBBBE8769D02B737A4F862C70B70BD6D79D2E0C80CB4CA781D99E
26,229,892 UART: [art] SIG.S = D84C75E6EE2F2C278801222B4F5E00079FC3F6AFF1826D6677652B5444B168C030A75CDB46A720E495E77DB1F66C7386
27,208,856 UART: Caliptra RT
27,209,566 UART: [state] CFI Enabled
27,374,366 UART: [rt] RT listening for mailbox commands...
27,376,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,532,142 UART: [rt]cmd =0x41544d4e, len=14344
27,537,027 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,439,871 ready_for_fw is high
3,440,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,873,728 >>> mbox cmd response: success
20,162,112 UART:
20,162,494 UART: Running Caliptra FMC ...
20,163,691 UART:
20,163,877 UART: [state] CFI Enabled
20,231,481 UART: [fht] FMC Alias Private Key: 7
21,994,944 UART: [art] Extend RT PCRs Done
21,996,161 UART: [art] Lock RT PCRs Done
21,997,684 UART: [art] Populate DV Done
22,003,043 UART: [fht] FMC Alias Private Key: 7
22,004,550 UART: [art] Derive CDI
22,005,326 UART: [art] Store in in slot 0x4
22,064,489 UART: [art] Derive Key Pair
22,065,533 UART: [art] Store priv key in slot 0x5
24,527,876 UART: [art] Derive Key Pair - Done
24,540,886 UART: [art] Signing Cert with AUTHO
24,542,217 UART: RITY.KEYID = 7
26,253,583 UART: [art] Erasing AUTHORITY.KEYID = 7
26,255,096 UART: [art] PUB.X = 5F121B753FE6526C83ED6BADFF3F72DD57B648DA67D5E1C345F60269094C6482CFB1EAAD2B4EFEF40E2B82ECAF94B9E3
26,262,369 UART: [art] PUB.Y = EB96B82704C6EBC4775C3A460F779A2D403AC8D73694FA074B18E79B1B38E17783C1B389AE72198AB229BE4991F01D3F
26,269,647 UART: [art] SIG.R = FFC58D5E4E8B6E5FE249372235D0C12E5C3B62195F9C84E633ECCCDEC43C57348F950696BDFCBC9E0F86B934D4F5FB66
26,277,046 UART: [art] SIG.S = D7A2770073A6E95AC39325BD349BD4C860276DEB3E436CF46168765D27ED11321A1960EA02582CF1A44CA043851AB0FD
27,256,029 UART: Caliptra RT
27,256,742 UART: [state] CFI Enabled
27,421,601 UART: [rt] RT listening for mailbox commands...
27,423,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,390 UART: [rt]cmd =0x41544d4e, len=14344
27,584,328 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,373 UART:
192,736 UART: Running Caliptra ROM ...
193,836 UART:
603,462 UART: [state] CFI Enabled
615,148 UART: [state] LifecycleState = Unprovisioned
617,450 UART: [state] DebugLocked = No
619,324 UART: [state] WD Timer not started. Device not locked for debugging
623,633 UART: [kat] SHA2-256
813,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,333 UART: [kat] ++
824,857 UART: [kat] sha1
836,174 UART: [kat] SHA2-256
839,193 UART: [kat] SHA2-384
845,867 UART: [kat] SHA2-512-ACC
848,420 UART: [kat] ECC-384
3,291,433 UART: [kat] HMAC-384Kdf
3,304,444 UART: [kat] LMS
3,836,215 UART: [kat] --
3,840,574 UART: [cold-reset] ++
3,842,078 UART: [fht] FHT @ 0x50003400
3,852,922 UART: [idev] ++
3,853,631 UART: [idev] CDI.KEYID = 6
3,854,512 UART: [idev] SUBJECT.KEYID = 7
3,855,752 UART: [idev] UDS.KEYID = 0
3,856,681 ready_for_fw is high
3,856,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,453 UART: [idev] Erasing UDS.KEYID = 0
6,334,285 UART: [idev] Sha1 KeyId Algorithm
6,356,805 UART: [idev] --
6,362,201 UART: [ldev] ++
6,362,913 UART: [ldev] CDI.KEYID = 6
6,363,796 UART: [ldev] SUBJECT.KEYID = 5
6,364,893 UART: [ldev] AUTHORITY.KEYID = 7
6,366,177 UART: [ldev] FE.KEYID = 1
6,375,740 UART: [ldev] Erasing FE.KEYID = 1
8,855,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,545 UART: [ldev] --
10,646,375 UART: [fwproc] Wait for Commands...
10,649,389 UART: [fwproc] Recv command 0x46574c44
10,651,660 UART: [fwproc] Recv'd Img size: 114360 bytes
15,298,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,385,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,501,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,044,062 >>> mbox cmd response: success
16,049,033 UART: [afmc] ++
16,049,745 UART: [afmc] CDI.KEYID = 6
16,050,995 UART: [afmc] SUBJECT.KEYID = 7
16,052,433 UART: [afmc] AUTHORITY.KEYID = 5
18,554,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,275,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,277,522 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,292,629 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,307,806 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,322,607 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,346,624 UART: [afmc] --
20,349,427 UART: [cold-reset] --
20,353,836 UART: [state] Locking Datavault
20,358,809 UART: [state] Locking PCR0, PCR1 and PCR31
20,360,940 UART: [state] Locking ICCM
20,362,049 UART: [exit] Launching FMC @ 0x40000130
20,370,745 UART:
20,370,989 UART: Running Caliptra FMC ...
20,372,092 UART:
20,372,249 UART: [state] CFI Enabled
20,380,185 UART: [fht] FMC Alias Private Key: 7
22,137,184 UART: [art] Extend RT PCRs Done
22,138,403 UART: [art] Lock RT PCRs Done
22,140,021 UART: [art] Populate DV Done
22,145,540 UART: [fht] FMC Alias Private Key: 7
22,147,240 UART: [art] Derive CDI
22,148,056 UART: [art] Store in in slot 0x4
22,190,574 UART: [art] Derive Key Pair
22,191,574 UART: [art] Store priv key in slot 0x5
24,618,682 UART: [art] Derive Key Pair - Done
24,631,663 UART: [art] Signing Cert with AUTHO
24,632,957 UART: RITY.KEYID = 7
26,338,657 UART: [art] Erasing AUTHORITY.KEYID = 7
26,340,161 UART: [art] PUB.X = CB1FD18E825E7C05EB47842499C2494E1257B2EBD8499CF4A6F4917181F3CB145811A89F661B26B210C83EB5EB735FE5
26,347,410 UART: [art] PUB.Y = 9F198DA0A7541313507EE5831F3A0B074B5F1AD2DCDD11099CEC2E420351398E2383A303CF46781BB016378CFE4B6B98
26,354,709 UART: [art] SIG.R = 5FDDD3C36DCF6B39FFFE62ECCE3CA5FB8C291E812021065579914A4AF79F7A59BD36DF737101A60F3BEBFBAA55E248C3
26,362,194 UART: [art] SIG.S = 22F204A42DD9D0C458F4BA98B84B9E5695F1C78903C8658FD724222D9A95FE221AA076D7E29A4D57EA3EEA3584343C86
27,341,128 UART: Caliptra RT
27,341,811 UART: [state] CFI Enabled
27,459,403 UART: [rt] RT listening for mailbox commands...
27,461,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,617,573 UART: [rt]cmd =0x41544d4e, len=14344
27,622,619 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,771,340 ready_for_fw is high
3,771,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,076,976 >>> mbox cmd response: success
20,327,656 UART:
20,328,046 UART: Running Caliptra FMC ...
20,329,259 UART:
20,329,432 UART: [state] CFI Enabled
20,336,815 UART: [fht] FMC Alias Private Key: 7
22,093,179 UART: [art] Extend RT PCRs Done
22,094,427 UART: [art] Lock RT PCRs Done
22,095,738 UART: [art] Populate DV Done
22,101,150 UART: [fht] FMC Alias Private Key: 7
22,102,740 UART: [art] Derive CDI
22,103,553 UART: [art] Store in in slot 0x4
22,145,874 UART: [art] Derive Key Pair
22,146,875 UART: [art] Store priv key in slot 0x5
24,573,847 UART: [art] Derive Key Pair - Done
24,586,681 UART: [art] Signing Cert with AUTHO
24,587,983 UART: RITY.KEYID = 7
26,293,639 UART: [art] Erasing AUTHORITY.KEYID = 7
26,295,149 UART: [art] PUB.X = 62D30A46E961C1515F37BD06D9CFA56B3E2111366DF16D704A3387BCF63BD08D75400B95848EA984B2C5F952F173FA33
26,302,373 UART: [art] PUB.Y = BCF3A15E4110D220316AFAF75398DEC8CAA4063A599C34CFBED7462DA1B4F3EA4C4D1B67A275F075F560418B74F40AB3
26,309,656 UART: [art] SIG.R = 89A1CEAAEE952C9116BDE6B426EF830A43A367139303498447B20CD583C2DFD8F31027892A2AC3909CD6E1C8E0A0CBFF
26,317,062 UART: [art] SIG.S = 423FF71AB6BDF949789324BC51B1569CACAEE701304E66EA7B48567EC1EEC9D0054949C7BAB8BDC17EFAC331851CD774
27,295,814 UART: Caliptra RT
27,296,503 UART: [state] CFI Enabled
27,413,776 UART: [rt] RT listening for mailbox commands...
27,416,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,571,363 UART: [rt]cmd =0x41544d4e, len=14344
27,576,792 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,734 UART: [kat] HMAC-384Kdf
907,414 UART: [kat] LMS
1,475,610 UART: [kat] --
1,476,637 UART: [cold-reset] ++
1,476,967 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 ready_for_fw is high
1,480,875 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,504,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,526 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,521,029 UART: [ldev] Erasing FE.KEYID = 1
1,546,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,976 UART: [fwproc] Received command 0x46574c44
1,587,767 UART: [fwproc] Received Image of size 114360 bytes
5,348,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,377,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,406,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,542,302 >>> mbox cmd response: success
5,543,370 UART: [afmc] ++
5,543,538 UART: [afmc] CDI.KEYID = 6
5,543,900 UART: [afmc] SUBJECT.KEYID = 7
5,544,325 UART: [afmc] AUTHORITY.KEYID = 5
5,578,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,595,065 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,595,845 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,601,554 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,607,446 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,613,147 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,620,947 UART: [afmc] --
5,621,933 UART: [cold-reset] --
5,622,651 UART: [state] Locking Datavault
5,623,644 UART: [state] Locking PCR0, PCR1 and PCR31
5,624,248 UART: [state] Locking ICCM
5,624,886 UART: [exit] Launching FMC @ 0x40000130
5,630,215 UART:
5,630,231 UART: Running Caliptra FMC ...
5,630,639 UART:
5,630,693 UART: [state] CFI Enabled
5,641,363 UART: [fht] FMC Alias Private Key: 7
5,748,623 UART: [art] Extend RT PCRs Done
5,749,051 UART: [art] Lock RT PCRs Done
5,750,895 UART: [art] Populate DV Done
5,759,137 UART: [fht] FMC Alias Private Key: 7
5,760,247 UART: [art] Derive CDI
5,760,527 UART: [art] Store in in slot 0x4
5,846,308 UART: [art] Derive Key Pair
5,846,668 UART: [art] Store priv key in slot 0x5
5,860,186 UART: [art] Derive Key Pair - Done
5,874,879 UART: [art] Signing Cert with AUTHO
5,875,359 UART: RITY.KEYID = 7
5,890,569 UART: [art] Erasing AUTHORITY.KEYID = 7
5,891,334 UART: [art] PUB.X = 8D563B29D97F422E1059682E2BF2A3A5B7504FB62D7E13EDE69665F441060EE70AF0D5865C0CDC6FD1ACA2408D3F47E6
5,898,102 UART: [art] PUB.Y = 0CBB7C6DC2561A8B6CB46917DC0AA6864C0507CD0ACF922003474E2A5A6FC46A7CC2E78BD237D820AF1A9BCD44B4FD8B
5,905,056 UART: [art] SIG.R = E3169A1F4881A21B9D310C42A5B02EDEA5DCA26E11EAE75F3625DC0985AF095685EA2E0A56AE939DDDC8B8B7E93D5B3E
5,911,834 UART: [art] SIG.S = A151AD834AF6A36F15259C280AAC2F888403647EF0710F6288CAE9E83E69B2BE4082AEF955DD1AF7D66064D2991CDC37
5,935,326 UART: Caliptra RT
5,935,580 UART: [state] CFI Enabled
6,044,041 UART: [rt] RT listening for mailbox commands...
6,044,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,508 UART: [rt]cmd =0x41544d4e, len=14344
6,173,891 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,579 ready_for_fw is high
1,361,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,352,697 >>> mbox cmd response: success
5,413,878 UART:
5,413,894 UART: Running Caliptra FMC ...
5,414,302 UART:
5,414,356 UART: [state] CFI Enabled
5,424,816 UART: [fht] FMC Alias Private Key: 7
5,532,090 UART: [art] Extend RT PCRs Done
5,532,518 UART: [art] Lock RT PCRs Done
5,534,380 UART: [art] Populate DV Done
5,542,678 UART: [fht] FMC Alias Private Key: 7
5,543,632 UART: [art] Derive CDI
5,543,912 UART: [art] Store in in slot 0x4
5,629,477 UART: [art] Derive Key Pair
5,629,837 UART: [art] Store priv key in slot 0x5
5,643,215 UART: [art] Derive Key Pair - Done
5,657,790 UART: [art] Signing Cert with AUTHO
5,658,270 UART: RITY.KEYID = 7
5,673,340 UART: [art] Erasing AUTHORITY.KEYID = 7
5,674,105 UART: [art] PUB.X = 887BE61CF3C04771E4C88B259127C266D659F64830FF325022700DB9DCE3B91EDD3A0B246F7E77D00ABD1254CECC1302
5,680,869 UART: [art] PUB.Y = E21BA54BD31B9E017A9F4EF79C09E86D13E7289205A2590A678E8039B3245A608A0E57974F3836229FFB6154A004CB6A
5,687,799 UART: [art] SIG.R = 6FE3FBA25EC35BBA7E20063EC8213A0174CF1C647452AA136C0A4DF8D53754C62BE4399D7C9794E3C87ADCBCB1D7230A
5,694,573 UART: [art] SIG.S = C772FE10CA637A8FAFF9366FDCEA0EA400A06C69ED045F8BA5BCA22E2228C29C50E6BAB7059A1C07BA1DC652AEC345C7
5,718,318 UART: Caliptra RT
5,718,572 UART: [state] CFI Enabled
5,826,480 UART: [rt] RT listening for mailbox commands...
5,827,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,949,717 UART: [rt]cmd =0x41544d4e, len=14344
5,956,400 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
890,854 UART: [kat] SHA2-256
892,792 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,143 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,930 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 ready_for_fw is high
1,481,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,041 UART: [idev] Erasing UDS.KEYID = 0
1,505,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,195 UART: [idev] --
1,515,022 UART: [ldev] ++
1,515,190 UART: [ldev] CDI.KEYID = 6
1,515,553 UART: [ldev] SUBJECT.KEYID = 5
1,515,979 UART: [ldev] AUTHORITY.KEYID = 7
1,516,442 UART: [ldev] FE.KEYID = 1
1,521,726 UART: [ldev] Erasing FE.KEYID = 1
1,546,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,997 UART: [ldev] --
1,586,370 UART: [fwproc] Waiting for Commands...
1,587,057 UART: [fwproc] Received command 0x46574c44
1,587,848 UART: [fwproc] Received Image of size 114360 bytes
5,272,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,299,896 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,465,237 >>> mbox cmd response: success
5,466,347 UART: [afmc] ++
5,466,515 UART: [afmc] CDI.KEYID = 6
5,466,877 UART: [afmc] SUBJECT.KEYID = 7
5,467,302 UART: [afmc] AUTHORITY.KEYID = 5
5,502,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,518,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,519,600 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,525,309 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,531,201 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,536,902 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,544,874 UART: [afmc] --
5,545,992 UART: [cold-reset] --
5,546,852 UART: [state] Locking Datavault
5,547,995 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,599 UART: [state] Locking ICCM
5,549,141 UART: [exit] Launching FMC @ 0x40000130
5,554,470 UART:
5,554,486 UART: Running Caliptra FMC ...
5,554,894 UART:
5,555,037 UART: [state] CFI Enabled
5,565,601 UART: [fht] FMC Alias Private Key: 7
5,673,227 UART: [art] Extend RT PCRs Done
5,673,655 UART: [art] Lock RT PCRs Done
5,675,137 UART: [art] Populate DV Done
5,683,581 UART: [fht] FMC Alias Private Key: 7
5,684,695 UART: [art] Derive CDI
5,684,975 UART: [art] Store in in slot 0x4
5,770,588 UART: [art] Derive Key Pair
5,770,948 UART: [art] Store priv key in slot 0x5
5,784,692 UART: [art] Derive Key Pair - Done
5,799,421 UART: [art] Signing Cert with AUTHO
5,799,901 UART: RITY.KEYID = 7
5,815,497 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,262 UART: [art] PUB.X = 2D1BA8261EB771C050F0414E28397B2842203CAF20E33E2A31302194CC5133D9C85A787E25141C5710EF078A79A67CBD
5,823,025 UART: [art] PUB.Y = 342F1F96C860CF909453268F80A0D8E7D9E8105AFC3B8C7C13D58E425C1AA261C70F91E301CC94987A1C5BCF5C5CED5E
5,829,981 UART: [art] SIG.R = 36A71534AAF21AEFD64715A0CEA1B6EDA774894E6039B83B786F57B5786DBAED8CCC982AB9CE02559B91FDE5CCC3A02E
5,836,770 UART: [art] SIG.S = 076BF4604FB2CD32916837FAF7ED81DB5F2863F912E1DC9331BF5E952C94AC07050F2F31653DBB1D9C1EFEB163EF970D
5,860,794 UART: Caliptra RT
5,861,140 UART: [state] CFI Enabled
5,969,897 UART: [rt] RT listening for mailbox commands...
5,970,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,472 UART: [rt]cmd =0x41544d4e, len=14344
6,100,131 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,742 ready_for_fw is high
1,362,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,277,202 >>> mbox cmd response: success
5,338,731 UART:
5,338,747 UART: Running Caliptra FMC ...
5,339,155 UART:
5,339,298 UART: [state] CFI Enabled
5,349,724 UART: [fht] FMC Alias Private Key: 7
5,458,320 UART: [art] Extend RT PCRs Done
5,458,748 UART: [art] Lock RT PCRs Done
5,460,182 UART: [art] Populate DV Done
5,468,594 UART: [fht] FMC Alias Private Key: 7
5,469,774 UART: [art] Derive CDI
5,470,054 UART: [art] Store in in slot 0x4
5,555,851 UART: [art] Derive Key Pair
5,556,211 UART: [art] Store priv key in slot 0x5
5,569,735 UART: [art] Derive Key Pair - Done
5,584,444 UART: [art] Signing Cert with AUTHO
5,584,924 UART: RITY.KEYID = 7
5,600,202 UART: [art] Erasing AUTHORITY.KEYID = 7
5,600,967 UART: [art] PUB.X = 136A9E6915D35020337B0CABAAD1B66335049427F9CBF972C806CD0F690118FBACEBEE645B7A219BD864EC0A096F49E5
5,607,726 UART: [art] PUB.Y = 11E685887E3050453D640F295A542A897B66F70702F59C03D64E4C1509B7674B7B69527C891CEF071CAB70A16567B8A6
5,614,648 UART: [art] SIG.R = 469DABACEA2DD36913F55C89D1722C9E966B7F1FD1D22FE86F39F45CF9D0207E7CE31811854BA945F7FB33D6E2B205FF
5,621,431 UART: [art] SIG.S = 6F98F103D837F14A1CEBB786A7DF783EBB5D1C4989C7F81752FF42737AD7B6CB7E973CBF2870D50BE4B3EED4A213CE15
5,645,384 UART: Caliptra RT
5,645,730 UART: [state] CFI Enabled
5,754,219 UART: [rt] RT listening for mailbox commands...
5,754,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,550 UART: [rt]cmd =0x41544d4e, len=14344
5,884,129 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,252 UART: [kat] SHA2-256
892,902 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,027 UART: [kat] ++
897,179 UART: [kat] sha1
901,413 UART: [kat] SHA2-256
903,353 UART: [kat] SHA2-384
906,060 UART: [kat] SHA2-512-ACC
907,961 UART: [kat] ECC-384
917,718 UART: [kat] HMAC-384Kdf
922,210 UART: [kat] LMS
1,170,538 UART: [kat] --
1,171,747 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 ready_for_fw is high
1,176,205 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,736 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,744 UART: [ldev] SUBJECT.KEYID = 5
1,211,170 UART: [ldev] AUTHORITY.KEYID = 7
1,211,633 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,188 UART: [fwproc] Wait for Commands...
1,282,790 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 114360 bytes
3,125,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,318,496 >>> mbox cmd response: success
3,319,572 UART: [afmc] ++
3,319,740 UART: [afmc] CDI.KEYID = 6
3,320,102 UART: [afmc] SUBJECT.KEYID = 7
3,320,527 UART: [afmc] AUTHORITY.KEYID = 5
3,356,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,606 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,315 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,207 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,918 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,953 UART: [afmc] --
3,399,987 UART: [cold-reset] --
3,400,811 UART: [state] Locking Datavault
3,401,930 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,534 UART: [state] Locking ICCM
3,403,090 UART: [exit] Launching FMC @ 0x40000130
3,408,419 UART:
3,408,435 UART: Running Caliptra FMC ...
3,408,843 UART:
3,408,897 UART: [state] CFI Enabled
3,419,441 UART: [fht] FMC Alias Private Key: 7
3,526,827 UART: [art] Extend RT PCRs Done
3,527,255 UART: [art] Lock RT PCRs Done
3,528,859 UART: [art] Populate DV Done
3,536,881 UART: [fht] FMC Alias Private Key: 7
3,537,905 UART: [art] Derive CDI
3,538,185 UART: [art] Store in in slot 0x4
3,624,188 UART: [art] Derive Key Pair
3,624,548 UART: [art] Store priv key in slot 0x5
3,637,590 UART: [art] Derive Key Pair - Done
3,652,181 UART: [art] Signing Cert with AUTHO
3,652,661 UART: RITY.KEYID = 7
3,667,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,320 UART: [art] PUB.X = D9A49E1CAAF1B2B000D691DFB3C46E24D266E89F0BBBC2E4C14742911FEAB4AA3AEC45404B4D32D6C3A48A522AAD021D
3,675,086 UART: [art] PUB.Y = 467C17DC1F1A32BA012093C32151779D922FE1E129216C6F3D704511C80434CE9868C46F038D0AD601E7D9293471681D
3,682,011 UART: [art] SIG.R = CCBDE3C896B0ADB5ABECF9BE445E69878A754F630E07CCB385A3329328F92BCD4B3FBAED65DBB698115BA56D149ED1C7
3,688,801 UART: [art] SIG.S = 1C614BBDC0E3683EBC05B6BA50AD538D94EF857E9E92672CA05E8667F0E860B34DD496AF9299F0F30C0A6534ECD91C04
3,712,320 UART: Caliptra RT
3,712,574 UART: [state] CFI Enabled
3,820,395 UART: [rt] RT listening for mailbox commands...
3,821,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,746 UART: [rt]cmd =0x41544d4e, len=14344
3,949,941 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,191 ready_for_fw is high
1,060,191 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,176,631 >>> mbox cmd response: success
3,238,774 UART:
3,238,790 UART: Running Caliptra FMC ...
3,239,198 UART:
3,239,252 UART: [state] CFI Enabled
3,249,996 UART: [fht] FMC Alias Private Key: 7
3,358,518 UART: [art] Extend RT PCRs Done
3,358,946 UART: [art] Lock RT PCRs Done
3,360,418 UART: [art] Populate DV Done
3,368,672 UART: [fht] FMC Alias Private Key: 7
3,369,780 UART: [art] Derive CDI
3,370,060 UART: [art] Store in in slot 0x4
3,455,709 UART: [art] Derive Key Pair
3,456,069 UART: [art] Store priv key in slot 0x5
3,469,695 UART: [art] Derive Key Pair - Done
3,484,477 UART: [art] Signing Cert with AUTHO
3,484,957 UART: RITY.KEYID = 7
3,500,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,008 UART: [art] PUB.X = 322B7DF73B8FA64FF346781F92057D185752DD143DEF361B803D2A1999912565CDA67C4F182BD564C9D13A0121934AE6
3,507,770 UART: [art] PUB.Y = B0322C8C6F1E4BA5C2BBBC0D1F2792192D3C853B0013DF4EACC113D0A49B94D8F8561A7C3CB07198AC02953FCA9993E2
3,514,706 UART: [art] SIG.R = 3A5080D13907FDEF48F3270B1E9DC796FBC834AF09ADD3B2BA7EA2B0E8F417D528850AF989C23A3C8FA8DD64489DA03D
3,521,482 UART: [art] SIG.S = 8C4D0AEBE2700950955A3655E9B1C0C82E75476B219C1D313167456F39FB2432E1BCE63F1D8A4BCAC4443A0A0943F03C
3,544,933 UART: Caliptra RT
3,545,187 UART: [state] CFI Enabled
3,652,294 UART: [rt] RT listening for mailbox commands...
3,652,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,645 UART: [rt]cmd =0x41544d4e, len=14344
3,782,242 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,173,058 UART: [fht] FHT @ 0x50003400
1,175,665 UART: [idev] ++
1,175,833 UART: [idev] CDI.KEYID = 6
1,176,193 UART: [idev] SUBJECT.KEYID = 7
1,176,617 UART: [idev] UDS.KEYID = 0
1,176,962 ready_for_fw is high
1,176,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,293 UART: [idev] Erasing UDS.KEYID = 0
1,201,534 UART: [idev] Sha1 KeyId Algorithm
1,209,948 UART: [idev] --
1,210,780 UART: [ldev] ++
1,210,948 UART: [ldev] CDI.KEYID = 6
1,211,311 UART: [ldev] SUBJECT.KEYID = 5
1,211,737 UART: [ldev] AUTHORITY.KEYID = 7
1,212,200 UART: [ldev] FE.KEYID = 1
1,217,164 UART: [ldev] Erasing FE.KEYID = 1
1,243,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,100 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 114360 bytes
3,124,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,317,538 >>> mbox cmd response: success
3,318,740 UART: [afmc] ++
3,318,908 UART: [afmc] CDI.KEYID = 6
3,319,270 UART: [afmc] SUBJECT.KEYID = 7
3,319,695 UART: [afmc] AUTHORITY.KEYID = 5
3,355,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,408 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,117 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,009 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,720 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,653 UART: [afmc] --
3,398,705 UART: [cold-reset] --
3,399,627 UART: [state] Locking Datavault
3,400,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,396 UART: [state] Locking ICCM
3,402,012 UART: [exit] Launching FMC @ 0x40000130
3,407,341 UART:
3,407,357 UART: Running Caliptra FMC ...
3,407,765 UART:
3,407,908 UART: [state] CFI Enabled
3,418,530 UART: [fht] FMC Alias Private Key: 7
3,526,972 UART: [art] Extend RT PCRs Done
3,527,400 UART: [art] Lock RT PCRs Done
3,528,832 UART: [art] Populate DV Done
3,537,062 UART: [fht] FMC Alias Private Key: 7
3,538,080 UART: [art] Derive CDI
3,538,360 UART: [art] Store in in slot 0x4
3,624,537 UART: [art] Derive Key Pair
3,624,897 UART: [art] Store priv key in slot 0x5
3,637,787 UART: [art] Derive Key Pair - Done
3,652,787 UART: [art] Signing Cert with AUTHO
3,653,267 UART: RITY.KEYID = 7
3,668,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,242 UART: [art] PUB.X = 476D3B8CA1316A9171F7D92B094CBCD4A71EDF21CF0D4D74160B6F3383AA9FC7F6FF769EBAB950E1D752FAA8C47B9BE4
3,676,025 UART: [art] PUB.Y = B8FE7E0920D1891C6A630E105815D6332A846EF8048BB70B35509D775DD28FA2C4857387F22A2A40FC1DC3587CC180E7
3,682,963 UART: [art] SIG.R = 927B7194FAF24ED0CEA15EBEEA9B5A9B2823312A60B2A6EA1272941445D972CEEF551650BF9FBBC7CBA89BBF7A9BAF5F
3,689,759 UART: [art] SIG.S = C11F0698B9736843D31137A936F303E244971965BF794A7220A3A3D295958808870A8C1290A57561834F48069F86CCE2
3,713,767 UART: Caliptra RT
3,714,113 UART: [state] CFI Enabled
3,821,527 UART: [rt] RT listening for mailbox commands...
3,822,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,842 UART: [rt]cmd =0x41544d4e, len=14344
3,951,137 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,640 ready_for_fw is high
1,060,640 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,182,115 >>> mbox cmd response: success
3,243,996 UART:
3,244,012 UART: Running Caliptra FMC ...
3,244,420 UART:
3,244,563 UART: [state] CFI Enabled
3,255,161 UART: [fht] FMC Alias Private Key: 7
3,362,959 UART: [art] Extend RT PCRs Done
3,363,387 UART: [art] Lock RT PCRs Done
3,364,877 UART: [art] Populate DV Done
3,373,403 UART: [fht] FMC Alias Private Key: 7
3,374,423 UART: [art] Derive CDI
3,374,703 UART: [art] Store in in slot 0x4
3,460,386 UART: [art] Derive Key Pair
3,460,746 UART: [art] Store priv key in slot 0x5
3,473,706 UART: [art] Derive Key Pair - Done
3,488,415 UART: [art] Signing Cert with AUTHO
3,488,895 UART: RITY.KEYID = 7
3,503,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,610 UART: [art] PUB.X = 540C1EC4A3F9413F0BB559DCF3A833AFF951DE049548DA4FF3A399595C7080AA31D8E1706D91BB221079088AEEC8854E
3,511,376 UART: [art] PUB.Y = AC2EB01BD14CB1D13E0A54A0A49A1F5FE9086327E57DFBBB90FE4CF50B77A6DE6901285BBB17153F62FCAAD152ABD671
3,518,338 UART: [art] SIG.R = 6332FE2A4BE739233FA9326FA152EC8CE085B4637F92DF210F1D9E3612713A7678B1232493D17657CFCE6BE7916EB82C
3,525,107 UART: [art] SIG.S = 108E46660AE39AA4A6A7B9E23D63B62656174BF93AE43442B78E29497D2CDB7CD33F47773B00996064460F4E3103CBE3
3,549,647 UART: Caliptra RT
3,549,993 UART: [state] CFI Enabled
3,658,715 UART: [rt] RT listening for mailbox commands...
3,659,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,782,204 UART: [rt]cmd =0x41544d4e, len=14344
3,788,113 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,280 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,242 UART: [ldev] --
1,280,740 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,319,510 >>> mbox cmd response: success
3,320,587 UART: [afmc] ++
3,320,755 UART: [afmc] CDI.KEYID = 6
3,321,118 UART: [afmc] SUBJECT.KEYID = 7
3,321,544 UART: [afmc] AUTHORITY.KEYID = 5
3,356,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,351 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,061 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,951 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,662 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,498 UART: [afmc] --
3,400,536 UART: [cold-reset] --
3,401,534 UART: [state] Locking Datavault
3,402,741 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,345 UART: [state] Locking ICCM
3,403,847 UART: [exit] Launching FMC @ 0x40000130
3,409,176 UART:
3,409,192 UART: Running Caliptra FMC ...
3,409,600 UART:
3,409,654 UART: [state] CFI Enabled
3,420,138 UART: [fht] FMC Alias Private Key: 7
3,528,220 UART: [art] Extend RT PCRs Done
3,528,648 UART: [art] Lock RT PCRs Done
3,530,220 UART: [art] Populate DV Done
3,538,486 UART: [fht] FMC Alias Private Key: 7
3,539,464 UART: [art] Derive CDI
3,539,744 UART: [art] Store in in slot 0x4
3,625,805 UART: [art] Derive Key Pair
3,626,165 UART: [art] Store priv key in slot 0x5
3,639,409 UART: [art] Derive Key Pair - Done
3,654,635 UART: [art] Signing Cert with AUTHO
3,655,115 UART: RITY.KEYID = 7
3,670,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,078 UART: [art] PUB.X = 803ED92CE8EC98AEA1AE971E75ABB791584B53817B453C2EFC1935C2608D560D8D6E3DE88ADE8D0BFD9BC548CB77E9DF
3,677,864 UART: [art] PUB.Y = 918EF61DE83BCD9283A7E3F38A77F30706963935586E6F57F97C55AFD633D3B518F310E5122D3D1DDC3C358ADAA97B1A
3,684,816 UART: [art] SIG.R = 5E0586EFF01683912A9CEC5D5B00EB5B24729A857D2981CE5DFF2A1007EA2B3E32020210AADEF26E6231871FE1C3592B
3,691,560 UART: [art] SIG.S = 6B48D1514F8154631678F97661A5DA94767BA2A899EE6A3971C922FF5083F8A77395F937FCCE341E034AEC0314FA3926
3,715,035 UART: Caliptra RT
3,715,289 UART: [state] CFI Enabled
3,823,343 UART: [rt] RT listening for mailbox commands...
3,824,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,754 UART: [rt]cmd =0x41544d4e, len=14344
3,952,659 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,908 ready_for_fw is high
1,055,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,098 >>> mbox cmd response: success
3,232,021 UART:
3,232,037 UART: Running Caliptra FMC ...
3,232,445 UART:
3,232,499 UART: [state] CFI Enabled
3,242,733 UART: [fht] FMC Alias Private Key: 7
3,350,553 UART: [art] Extend RT PCRs Done
3,350,981 UART: [art] Lock RT PCRs Done
3,352,523 UART: [art] Populate DV Done
3,360,815 UART: [fht] FMC Alias Private Key: 7
3,361,911 UART: [art] Derive CDI
3,362,191 UART: [art] Store in in slot 0x4
3,447,856 UART: [art] Derive Key Pair
3,448,216 UART: [art] Store priv key in slot 0x5
3,461,436 UART: [art] Derive Key Pair - Done
3,476,665 UART: [art] Signing Cert with AUTHO
3,477,145 UART: RITY.KEYID = 7
3,492,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,842 UART: [art] PUB.X = 4457272050B1D269DA113008D60F8743E536AB6F358CB5A471EFD9FDDAB41F87AEC34B95D322ED8A6B47574B7428A004
3,499,607 UART: [art] PUB.Y = FD15DFD51BB05B78F0F63DF652B2D515A59402281591827609EDDFF7ACCA87F92ACCD1C41C2E7CD2F7EA174EA6337AFB
3,506,573 UART: [art] SIG.R = 289A459CA347C724BB9E40824598A109175115B2761BCF64038722BC346A1060DE08D85A5078E4A6AAC8CC4EC3B53C3B
3,513,334 UART: [art] SIG.S = 6D1000180DD2D7FCDCAE05494B57D4A45CD2033D282F95AAFED87CAFAF53E254478E4847EDCB6B24FE2D32524BACA062
3,537,224 UART: Caliptra RT
3,537,478 UART: [state] CFI Enabled
3,644,028 UART: [rt] RT listening for mailbox commands...
3,644,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,295 UART: [rt]cmd =0x41544d4e, len=14344
3,774,098 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,938 UART: [kat] ++
896,090 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 ready_for_fw is high
1,174,590 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,108 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,487 UART: [ldev] SUBJECT.KEYID = 5
1,209,914 UART: [ldev] AUTHORITY.KEYID = 7
1,210,377 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,343 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,496 UART: [fwproc] Recv command 0x46574c44
1,283,229 UART: [fwproc] Recv'd Img size: 114360 bytes
3,116,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,309,361 >>> mbox cmd response: success
3,310,490 UART: [afmc] ++
3,310,658 UART: [afmc] CDI.KEYID = 6
3,311,021 UART: [afmc] SUBJECT.KEYID = 7
3,311,447 UART: [afmc] AUTHORITY.KEYID = 5
3,346,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,220 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,930 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,820 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,531 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,353 UART: [afmc] --
3,389,321 UART: [cold-reset] --
3,390,113 UART: [state] Locking Datavault
3,391,294 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,898 UART: [state] Locking ICCM
3,392,504 UART: [exit] Launching FMC @ 0x40000130
3,397,833 UART:
3,397,849 UART: Running Caliptra FMC ...
3,398,257 UART:
3,398,400 UART: [state] CFI Enabled
3,408,990 UART: [fht] FMC Alias Private Key: 7
3,516,382 UART: [art] Extend RT PCRs Done
3,516,810 UART: [art] Lock RT PCRs Done
3,518,212 UART: [art] Populate DV Done
3,526,504 UART: [fht] FMC Alias Private Key: 7
3,527,476 UART: [art] Derive CDI
3,527,756 UART: [art] Store in in slot 0x4
3,613,347 UART: [art] Derive Key Pair
3,613,707 UART: [art] Store priv key in slot 0x5
3,626,795 UART: [art] Derive Key Pair - Done
3,641,754 UART: [art] Signing Cert with AUTHO
3,642,234 UART: RITY.KEYID = 7
3,657,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,271 UART: [art] PUB.X = ED0EE5A02D46A3A0D2832A62A38251363F3C0D0F88A146142116FA6CC22E6B2E0B007610A4DAE716F7E2CB897EA1256C
3,665,015 UART: [art] PUB.Y = 774B24E03D5A906037B6BA82AC0B1403EDA3498727FB1E9DDEC1354EEF82323420E784590CF0411BAA3BC06815A35624
3,671,958 UART: [art] SIG.R = 14FB8950E4153AFFCF143CF8D4BA140B45FABF608A064B2498BA65BCCD687C2131566CF490B9FBC4AC2388C0A8A60EB6
3,678,737 UART: [art] SIG.S = 2DD11B88D7FCFD4D7BF2FB4C8C49F80954CBDAC747609688FF5B212D508487D11565470CD74A77543DA5119EFCF002D4
3,702,805 UART: Caliptra RT
3,703,151 UART: [state] CFI Enabled
3,811,009 UART: [rt] RT listening for mailbox commands...
3,811,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,350 UART: [rt]cmd =0x41544d4e, len=14344
3,940,651 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,757 ready_for_fw is high
1,056,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,164,058 >>> mbox cmd response: success
3,226,411 UART:
3,226,427 UART: Running Caliptra FMC ...
3,226,835 UART:
3,226,978 UART: [state] CFI Enabled
3,237,934 UART: [fht] FMC Alias Private Key: 7
3,345,560 UART: [art] Extend RT PCRs Done
3,345,988 UART: [art] Lock RT PCRs Done
3,347,652 UART: [art] Populate DV Done
3,355,864 UART: [fht] FMC Alias Private Key: 7
3,356,918 UART: [art] Derive CDI
3,357,198 UART: [art] Store in in slot 0x4
3,443,091 UART: [art] Derive Key Pair
3,443,451 UART: [art] Store priv key in slot 0x5
3,456,715 UART: [art] Derive Key Pair - Done
3,471,313 UART: [art] Signing Cert with AUTHO
3,471,793 UART: RITY.KEYID = 7
3,487,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,860 UART: [art] PUB.X = 769D4D01F33927A0218C8776458D80C4818CAEB68B9316E15F90792D215CEC6CE403CCDFF263A96F2AED59968D2C2883
3,494,626 UART: [art] PUB.Y = 85CDDEE97DF4CA9ACAAB5E3381DC6758462FCE1EF98D71DF6FD01E1867E0BEE31A407FFE1950996CA8690EC5709E0D4D
3,501,594 UART: [art] SIG.R = 504BE6C8E252AD9A9160B718F8547AE8EF1AD3523EC694370EB502622C93164C0BDF91C08CC6EEACF380E797D82F089C
3,508,362 UART: [art] SIG.S = CDF3955E427D28A8647CBAA35558474BA04AA4E65734686E5CA8ED46F64D3D7E36AB850C1B0726A7069F6F7287F9E04A
3,531,732 UART: Caliptra RT
3,532,078 UART: [state] CFI Enabled
3,640,373 UART: [rt] RT listening for mailbox commands...
3,641,043 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,750 UART: [rt]cmd =0x41544d4e, len=14344
3,770,213 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
192,562 UART:
193,002 UART: Running Caliptra ROM ...
194,135 UART:
194,286 UART: [state] CFI Enabled
267,405 UART: [state] LifecycleState = Unprovisioned
269,357 UART: [state] DebugLocked = No
271,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,464 UART: [kat] SHA2-256
446,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,614 UART: [kat] ++
457,217 UART: [kat] sha1
468,871 UART: [kat] SHA2-256
471,508 UART: [kat] SHA2-384
476,066 UART: [kat] SHA2-512-ACC
478,429 UART: [kat] ECC-384
2,767,422 UART: [kat] HMAC-384Kdf
2,801,181 UART: [kat] LMS
3,991,472 UART: [kat] --
3,995,683 UART: [cold-reset] ++
3,998,325 UART: [fht] Storing FHT @ 0x50003400
4,009,656 UART: [idev] ++
4,010,218 UART: [idev] CDI.KEYID = 6
4,011,195 UART: [idev] SUBJECT.KEYID = 7
4,012,434 UART: [idev] UDS.KEYID = 0
4,013,515 ready_for_fw is high
4,013,711 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,110 UART: [idev] Erasing UDS.KEYID = 0
7,347,695 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,444 UART: [idev] --
7,373,702 UART: [ldev] ++
7,374,263 UART: [ldev] CDI.KEYID = 6
7,375,217 UART: [ldev] SUBJECT.KEYID = 5
7,376,480 UART: [ldev] AUTHORITY.KEYID = 7
7,377,702 UART: [ldev] FE.KEYID = 1
7,421,721 UART: [ldev] Erasing FE.KEYID = 1
10,751,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,946 UART: [ldev] --
13,115,206 UART: [fwproc] Waiting for Commands...
13,117,676 UART: [fwproc] Received command 0x46574c44
13,119,851 UART: [fwproc] Received Image of size 114036 bytes
22,071,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,156,575 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,225,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,542,854 >>> mbox cmd response: success
22,546,366 UART: [afmc] ++
22,546,956 UART: [afmc] CDI.KEYID = 6
22,547,866 UART: [afmc] SUBJECT.KEYID = 7
22,549,129 UART: [afmc] AUTHORITY.KEYID = 5
25,910,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,211,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,213,609 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,228,166 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,242,892 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,257,106 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,278,974 UART: [afmc] --
28,282,178 UART: [cold-reset] --
28,286,099 UART: [state] Locking Datavault
28,291,400 UART: [state] Locking PCR0, PCR1 and PCR31
28,293,095 UART: [state] Locking ICCM
28,294,753 UART: [exit] Launching FMC @ 0x40000130
28,303,147 UART:
28,303,382 UART: Running Caliptra FMC ...
28,304,475 UART:
28,304,629 UART: [state] CFI Enabled
28,373,250 UART: [fht] FMC Alias Private Key: 7
30,710,825 UART: [art] Extend RT PCRs Done
30,712,055 UART: [art] Lock RT PCRs Done
30,714,001 UART: [art] Populate DV Done
30,719,380 UART: [fht] FMC Alias Private Key: 7
30,720,966 UART: [art] Derive CDI
30,721,775 UART: [art] Store in in slot 0x4
30,782,158 UART: [art] Derive Key Pair
30,783,191 UART: [art] Store priv key in slot 0x5
34,075,553 UART: [art] Derive Key Pair - Done
34,088,679 UART: [art] Signing Cert with AUTHO
34,089,984 UART: RITY.KEYID = 7
36,377,156 UART: [art] Erasing AUTHORITY.KEYID = 7
36,378,663 UART: [art] PUB.X = 43233AE968D94682A20E236D0C2144AE53C4106B59149B7BC9E70F8DCF1BEAD7FEF3F89903D18F263CCE58222789EA7D
36,385,874 UART: [art] PUB.Y = E7EBBA43C80B06C7C01EF33CFD080CFDAEB02660063F8994DD4B01E36E63E4AC1AE4D180B14ED0D7017181F81C618FF4
36,393,181 UART: [art] SIG.R = 176628335F6CD13C3A655663BBB9798D64E2FE36CF2100112F5C82D8BB63459B5AEF604E0FE9668010C1C493030E39F1
36,400,486 UART: [art] SIG.S = 69EE55D14DEA24CD364D6C4CF7A21E784738E36393C87E3DD48D3F32B78D7EA6FBA21378326E56EBDCD27E4F2867BACD
37,705,628 UART: Caliptra RT
37,706,318 UART: [state] CFI Enabled
37,866,153 UART: [rt] RT listening for mailbox commands...
37,868,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,023,891 UART: [rt]cmd =0x41544d4e, len=14344
39,317,054 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,796,207 ready_for_fw is high
3,796,721 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,178,534 >>> mbox cmd response: success
27,873,277 UART:
27,873,695 UART: Running Caliptra FMC ...
27,875,010 UART:
27,875,174 UART: [state] CFI Enabled
27,940,423 UART: [fht] FMC Alias Private Key: 7
30,278,255 UART: [art] Extend RT PCRs Done
30,279,476 UART: [art] Lock RT PCRs Done
30,281,124 UART: [art] Populate DV Done
30,286,531 UART: [fht] FMC Alias Private Key: 7
30,288,128 UART: [art] Derive CDI
30,288,874 UART: [art] Store in in slot 0x4
30,349,098 UART: [art] Derive Key Pair
30,350,143 UART: [art] Store priv key in slot 0x5
33,644,102 UART: [art] Derive Key Pair - Done
33,656,946 UART: [art] Signing Cert with AUTHO
33,658,245 UART: RITY.KEYID = 7
35,945,597 UART: [art] Erasing AUTHORITY.KEYID = 7
35,947,126 UART: [art] PUB.X = 2D3A13EC19B8143A54D131C514DC909E71B3F479F3CC95013B15C35944541448735E53C0DB56969ABF1CD327C8B06E42
35,954,352 UART: [art] PUB.Y = 93AD85440F2860469704AA5A7FC114C3FF9BFB02F34A1D72135A9C4691CCD48026C1EF7BCD8244566265529FBE0718E0
35,961,582 UART: [art] SIG.R = E780045759D231991F165A60FF4A93B3C2C3F5C936BDA379085340AF0B94F18FCD3101671C19868EC33D105488CF3900
35,968,950 UART: [art] SIG.S = D71C2E9A3445B4E02D92D75697EEFBD0698C45328010FA5C134926374633BCF73121EA6DED5A70E966027A7A3FD415A0
37,274,180 UART: Caliptra RT
37,274,876 UART: [state] CFI Enabled
37,437,014 UART: [rt] RT listening for mailbox commands...
37,439,360 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,594,658 UART: [rt]cmd =0x41544d4e, len=14344
38,887,639 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,297 UART:
192,651 UART: Running Caliptra ROM ...
193,836 UART:
603,370 UART: [state] CFI Enabled
618,122 UART: [state] LifecycleState = Unprovisioned
620,016 UART: [state] DebugLocked = No
621,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,831 UART: [kat] SHA2-256
796,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,113 UART: [kat] ++
807,585 UART: [kat] sha1
819,950 UART: [kat] SHA2-256
822,611 UART: [kat] SHA2-384
829,099 UART: [kat] SHA2-512-ACC
831,466 UART: [kat] ECC-384
3,113,530 UART: [kat] HMAC-384Kdf
3,123,996 UART: [kat] LMS
4,314,074 UART: [kat] --
4,317,598 UART: [cold-reset] ++
4,319,558 UART: [fht] Storing FHT @ 0x50003400
4,329,976 UART: [idev] ++
4,330,559 UART: [idev] CDI.KEYID = 6
4,331,469 UART: [idev] SUBJECT.KEYID = 7
4,332,710 UART: [idev] UDS.KEYID = 0
4,333,779 ready_for_fw is high
4,333,978 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,477,546 UART: [idev] Erasing UDS.KEYID = 0
7,618,779 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,952 UART: [idev] --
7,645,694 UART: [ldev] ++
7,646,259 UART: [ldev] CDI.KEYID = 6
7,647,222 UART: [ldev] SUBJECT.KEYID = 5
7,648,431 UART: [ldev] AUTHORITY.KEYID = 7
7,649,713 UART: [ldev] FE.KEYID = 1
7,660,137 UART: [ldev] Erasing FE.KEYID = 1
10,944,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,505 UART: [ldev] --
13,302,578 UART: [fwproc] Waiting for Commands...
13,304,773 UART: [fwproc] Received command 0x46574c44
13,306,952 UART: [fwproc] Received Image of size 114036 bytes
22,178,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,260,116 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,329,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,645,870 >>> mbox cmd response: success
22,650,124 UART: [afmc] ++
22,650,718 UART: [afmc] CDI.KEYID = 6
22,651,683 UART: [afmc] SUBJECT.KEYID = 7
22,652,898 UART: [afmc] AUTHORITY.KEYID = 5
25,969,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,264,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,267,054 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,281,612 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,296,325 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,310,578 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,331,554 UART: [afmc] --
28,334,785 UART: [cold-reset] --
28,338,862 UART: [state] Locking Datavault
28,344,489 UART: [state] Locking PCR0, PCR1 and PCR31
28,346,237 UART: [state] Locking ICCM
28,349,035 UART: [exit] Launching FMC @ 0x40000130
28,357,432 UART:
28,357,666 UART: Running Caliptra FMC ...
28,358,767 UART:
28,358,926 UART: [state] CFI Enabled
28,367,215 UART: [fht] FMC Alias Private Key: 7
30,697,569 UART: [art] Extend RT PCRs Done
30,698,790 UART: [art] Lock RT PCRs Done
30,700,362 UART: [art] Populate DV Done
30,705,775 UART: [fht] FMC Alias Private Key: 7
30,707,371 UART: [art] Derive CDI
30,708,188 UART: [art] Store in in slot 0x4
30,750,674 UART: [art] Derive Key Pair
30,751,718 UART: [art] Store priv key in slot 0x5
33,994,498 UART: [art] Derive Key Pair - Done
34,007,493 UART: [art] Signing Cert with AUTHO
34,008,827 UART: RITY.KEYID = 7
36,288,318 UART: [art] Erasing AUTHORITY.KEYID = 7
36,289,856 UART: [art] PUB.X = 109BCDBDB15FA9F8580E8C118F78FF5927BAB33D43F432C8AB7F8C63C08EB7C7A6212D816B7A647E1FECC792519943AC
36,297,137 UART: [art] PUB.Y = B6DF718263EE64AA281428FC529C76F6093F0A968C86701396D894C02216222F7B7F49AB543E51F254E3A319C8461180
36,304,335 UART: [art] SIG.R = 528C089B2FD4C05005D63F9B90CF1A33B0AF0CB94E4E7630A79E81E05A15320649BE374BC9321EAAE4AB365405C45BB9
36,311,688 UART: [art] SIG.S = D473126488ED6F54132EEA16027FA9979F081C589DB103A7C9B77ADD88C3CC0541E96DB8F5E0A312BB85031118D3649B
37,617,509 UART: Caliptra RT
37,618,200 UART: [state] CFI Enabled
37,735,955 UART: [rt] RT listening for mailbox commands...
37,738,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,894,040 UART: [rt]cmd =0x41544d4e, len=14344
39,187,024 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,133,723 ready_for_fw is high
4,134,122 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,053,316 >>> mbox cmd response: success
27,696,417 UART:
27,696,803 UART: Running Caliptra FMC ...
27,697,989 UART:
27,698,156 UART: [state] CFI Enabled
27,706,217 UART: [fht] FMC Alias Private Key: 7
30,036,752 UART: [art] Extend RT PCRs Done
30,037,986 UART: [art] Lock RT PCRs Done
30,039,784 UART: [art] Populate DV Done
30,045,055 UART: [fht] FMC Alias Private Key: 7
30,046,588 UART: [art] Derive CDI
30,047,358 UART: [art] Store in in slot 0x4
30,089,791 UART: [art] Derive Key Pair
30,090,817 UART: [art] Store priv key in slot 0x5
33,333,284 UART: [art] Derive Key Pair - Done
33,346,070 UART: [art] Signing Cert with AUTHO
33,347,379 UART: RITY.KEYID = 7
35,626,596 UART: [art] Erasing AUTHORITY.KEYID = 7
35,628,101 UART: [art] PUB.X = B715981409AF3432E138A7DB95B9D66BD5774982579BE688CF0E53C6B95A5CBFF0D9470BCB9484F5A7E521A1F0A16588
35,635,380 UART: [art] PUB.Y = 4DB1A647B49B4AABF7410CF70768632F67789429F29D77E3621A0C8F75A9A5B56034FAE68709DB49D6F4948FD59327B9
35,642,589 UART: [art] SIG.R = 84B88F208DDCC5092467602B30778A33432735EA98057BE5B66F93506A8AFA3CEBAB716D64AEA97D7FAF77385CBB2A1A
35,650,022 UART: [art] SIG.S = 316285BC5C78752DF88BD41C3A72CEE7885053F4BCC5DE8D00A386D99FA84E503E9AFE0C15AB76A743D6010049CC5B3A
36,955,141 UART: Caliptra RT
36,955,851 UART: [state] CFI Enabled
37,074,640 UART: [rt] RT listening for mailbox commands...
37,077,117 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,232,522 UART: [rt]cmd =0x41544d4e, len=14344
38,525,772 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
192,789 UART:
193,142 UART: Running Caliptra ROM ...
194,353 UART:
194,504 UART: [state] CFI Enabled
261,971 UART: [state] LifecycleState = Unprovisioned
263,887 UART: [state] DebugLocked = No
265,850 UART: [state] WD Timer not started. Device not locked for debugging
269,817 UART: [kat] SHA2-256
448,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,572 UART: [kat] ++
461,019 UART: [kat] sha1
471,541 UART: [kat] SHA2-256
474,587 UART: [kat] SHA2-384
481,403 UART: [kat] SHA2-512-ACC
484,351 UART: [kat] ECC-384
2,947,935 UART: [kat] HMAC-384Kdf
2,969,440 UART: [kat] LMS
3,498,896 UART: [kat] --
3,503,725 UART: [cold-reset] ++
3,505,098 UART: [fht] FHT @ 0x50003400
3,515,502 UART: [idev] ++
3,516,125 UART: [idev] CDI.KEYID = 6
3,517,045 UART: [idev] SUBJECT.KEYID = 7
3,518,095 UART: [idev] UDS.KEYID = 0
3,519,082 ready_for_fw is high
3,519,295 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,031 UART: [idev] Erasing UDS.KEYID = 0
6,023,576 UART: [idev] Sha1 KeyId Algorithm
6,047,428 UART: [idev] --
6,051,486 UART: [ldev] ++
6,052,062 UART: [ldev] CDI.KEYID = 6
6,052,978 UART: [ldev] SUBJECT.KEYID = 5
6,054,155 UART: [ldev] AUTHORITY.KEYID = 7
6,055,393 UART: [ldev] FE.KEYID = 1
6,097,136 UART: [ldev] Erasing FE.KEYID = 1
8,602,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,052 UART: [ldev] --
10,411,627 UART: [fwproc] Wait for Commands...
10,414,207 UART: [fwproc] Recv command 0x46574c44
10,416,243 UART: [fwproc] Recv'd Img size: 114360 bytes
14,989,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,067,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,136,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,453,782 >>> mbox cmd response: success
15,458,804 UART: [afmc] ++
15,459,406 UART: [afmc] CDI.KEYID = 6
15,460,291 UART: [afmc] SUBJECT.KEYID = 7
15,461,508 UART: [afmc] AUTHORITY.KEYID = 5
18,002,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,726,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,728,564 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,744,527 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,760,463 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,776,227 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,800,396 UART: [afmc] --
19,804,267 UART: [cold-reset] --
19,806,342 UART: [state] Locking Datavault
19,810,236 UART: [state] Locking PCR0, PCR1 and PCR31
19,811,935 UART: [state] Locking ICCM
19,814,465 UART: [exit] Launching FMC @ 0x40000130
19,822,887 UART:
19,823,130 UART: Running Caliptra FMC ...
19,824,229 UART:
19,824,388 UART: [state] CFI Enabled
19,883,825 UART: [fht] FMC Alias Private Key: 7
21,646,916 UART: [art] Extend RT PCRs Done
21,648,138 UART: [art] Lock RT PCRs Done
21,650,061 UART: [art] Populate DV Done
21,655,638 UART: [fht] FMC Alias Private Key: 7
21,657,335 UART: [art] Derive CDI
21,658,069 UART: [art] Store in in slot 0x4
21,716,406 UART: [art] Derive Key Pair
21,717,448 UART: [art] Store priv key in slot 0x5
24,180,976 UART: [art] Derive Key Pair - Done
24,193,859 UART: [art] Signing Cert with AUTHO
24,195,158 UART: RITY.KEYID = 7
25,906,532 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,053 UART: [art] PUB.X = 45250329D2CFA0D935FF653391A53050D5DDC20CDBC56B0856BF65752B9AC86349AE96E09737DF74A5621386485BE912
25,915,356 UART: [art] PUB.Y = 3CC1153679E48FF485D0E784DC557196407208E4B080482F9FF50D0C06204F9FEA5E95D344FCF88A54C952B7473F0F34
25,922,545 UART: [art] SIG.R = 8BA490CAD4A64102F6975474F2A743B1806AF460B5BF8EF7C38C585A326281210A7A1B7F585B8A6AD3A58B03A3B6D269
25,929,974 UART: [art] SIG.S = E102332941BBB6AD850A114467AE2893D5191AE9818F9A04130CE4E858F3B32B9EC6589991A8EDCFA97D72C18B6A7BB7
26,909,369 UART: Caliptra RT
26,910,060 UART: [state] CFI Enabled
27,074,849 UART: [rt] RT listening for mailbox commands...
27,077,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,396 UART: [rt]cmd =0x41544d4e, len=14344
28,199,635 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,537 UART:
192,899 UART: Running Caliptra ROM ...
194,050 UART:
194,202 UART: [state] CFI Enabled
264,030 UART: [state] LifecycleState = Unprovisioned
266,450 UART: [state] DebugLocked = No
268,578 UART: [state] WD Timer not started. Device not locked for debugging
273,533 UART: [kat] SHA2-256
463,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,193 UART: [kat] ++
474,638 UART: [kat] sha1
486,007 UART: [kat] SHA2-256
489,083 UART: [kat] SHA2-384
495,018 UART: [kat] SHA2-512-ACC
497,605 UART: [kat] ECC-384
2,947,390 UART: [kat] HMAC-384Kdf
2,972,688 UART: [kat] LMS
3,504,441 UART: [kat] --
3,509,654 UART: [cold-reset] ++
3,510,876 UART: [fht] FHT @ 0x50003400
3,522,538 UART: [idev] ++
3,523,204 UART: [idev] CDI.KEYID = 6
3,524,184 UART: [idev] SUBJECT.KEYID = 7
3,525,306 UART: [idev] UDS.KEYID = 0
3,526,275 ready_for_fw is high
3,526,664 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,485 UART: [idev] Erasing UDS.KEYID = 0
6,030,508 UART: [idev] Sha1 KeyId Algorithm
6,053,474 UART: [idev] --
6,058,826 UART: [ldev] ++
6,059,512 UART: [ldev] CDI.KEYID = 6
6,060,429 UART: [ldev] SUBJECT.KEYID = 5
6,061,594 UART: [ldev] AUTHORITY.KEYID = 7
6,062,829 UART: [ldev] FE.KEYID = 1
6,102,423 UART: [ldev] Erasing FE.KEYID = 1
8,609,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,159 UART: [ldev] --
10,415,893 UART: [fwproc] Wait for Commands...
10,419,082 UART: [fwproc] Recv command 0x46574c44
10,421,400 UART: [fwproc] Recv'd Img size: 114360 bytes
15,047,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,126,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,242,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,784,865 >>> mbox cmd response: success
15,789,033 UART: [afmc] ++
15,789,740 UART: [afmc] CDI.KEYID = 6
15,790,932 UART: [afmc] SUBJECT.KEYID = 7
15,792,377 UART: [afmc] AUTHORITY.KEYID = 5
18,326,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,050,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,052,242 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,067,306 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,082,507 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,097,373 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,121,588 UART: [afmc] --
20,125,561 UART: [cold-reset] --
20,130,464 UART: [state] Locking Datavault
20,137,509 UART: [state] Locking PCR0, PCR1 and PCR31
20,139,716 UART: [state] Locking ICCM
20,141,895 UART: [exit] Launching FMC @ 0x40000130
20,150,574 UART:
20,150,818 UART: Running Caliptra FMC ...
20,151,839 UART:
20,151,982 UART: [state] CFI Enabled
20,205,213 UART: [fht] FMC Alias Private Key: 7
21,969,211 UART: [art] Extend RT PCRs Done
21,970,453 UART: [art] Lock RT PCRs Done
21,972,377 UART: [art] Populate DV Done
21,977,999 UART: [fht] FMC Alias Private Key: 7
21,979,592 UART: [art] Derive CDI
21,980,334 UART: [art] Store in in slot 0x4
22,037,208 UART: [art] Derive Key Pair
22,038,253 UART: [art] Store priv key in slot 0x5
24,502,636 UART: [art] Derive Key Pair - Done
24,515,467 UART: [art] Signing Cert with AUTHO
24,516,776 UART: RITY.KEYID = 7
26,228,525 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,028 UART: [art] PUB.X = 81DCD5BDEF8FC35BDE1C98B2EFD420D0264C91E2E9989BF7FA679F50E406EE20C346920D91444E334D077205C9D4C571
26,237,313 UART: [art] PUB.Y = D4746B723A6E41DFE2BDFDB6CEAD810BBE56C7331D3E3F7F0B4F8C0440A17B798E4B4D4E5BB92418C9AA92872C104B2D
26,244,552 UART: [art] SIG.R = A6789CE8F12EC683BA46C3711DE824D168F25A3B085A9B3E73AE238CC4E8CF7FF169634B70048F1D742DE95F6B104FE2
26,252,026 UART: [art] SIG.S = 5EA1C8B1BA6A7CB99C77EFC98F57825507FE1D5D37B369D74AA3D80DA1DF31121BAE709AF5FC1A662CCC4F2CAEBDF062
27,231,112 UART: Caliptra RT
27,231,837 UART: [state] CFI Enabled
27,398,174 UART: [rt] RT listening for mailbox commands...
27,400,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,556,098 UART: [rt]cmd =0x41544d4e, len=14344
28,522,995 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,440,364 ready_for_fw is high
3,440,953 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,833,920 >>> mbox cmd response: success
20,136,729 UART:
20,137,118 UART: Running Caliptra FMC ...
20,138,325 UART:
20,138,501 UART: [state] CFI Enabled
20,202,487 UART: [fht] FMC Alias Private Key: 7
21,966,390 UART: [art] Extend RT PCRs Done
21,967,606 UART: [art] Lock RT PCRs Done
21,969,396 UART: [art] Populate DV Done
21,974,698 UART: [fht] FMC Alias Private Key: 7
21,976,412 UART: [art] Derive CDI
21,977,255 UART: [art] Store in in slot 0x4
22,035,328 UART: [art] Derive Key Pair
22,036,332 UART: [art] Store priv key in slot 0x5
24,499,345 UART: [art] Derive Key Pair - Done
24,512,241 UART: [art] Signing Cert with AUTHO
24,513,551 UART: RITY.KEYID = 7
26,225,381 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,894 UART: [art] PUB.X = A78ADECFBF12B16BC1423025C608433382407DE6D658B36F644AE909CFAEAE60BF2FEE12F336E5314F75180C068DE65B
26,234,147 UART: [art] PUB.Y = BE50BE6AF95469C891ACE754DB236677BE02089A43112E1863E78F5A0DA3EBDD9D301B0D8D8454EC4120C37241455B40
26,241,409 UART: [art] SIG.R = FC5AAC07AD49D9D4B7E1628DC9FEC5A1087F849506289478629943096C05769087B645DA9D04F117045BF7908243A2D0
26,248,731 UART: [art] SIG.S = 404C2385F3D29E30BC75640AE0DD6D022EEB189997D8C3A5C0DE8A271719F17CBD05035982424700E4D3FE9EAC07C684
27,227,534 UART: Caliptra RT
27,228,230 UART: [state] CFI Enabled
27,392,639 UART: [rt] RT listening for mailbox commands...
27,394,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,462 UART: [rt]cmd =0x41544d4e, len=14344
28,517,467 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,528 UART:
192,887 UART: Running Caliptra ROM ...
194,073 UART:
603,733 UART: [state] CFI Enabled
618,193 UART: [state] LifecycleState = Unprovisioned
620,572 UART: [state] DebugLocked = No
622,598 UART: [state] WD Timer not started. Device not locked for debugging
627,642 UART: [kat] SHA2-256
817,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,291 UART: [kat] ++
828,889 UART: [kat] sha1
839,295 UART: [kat] SHA2-256
842,334 UART: [kat] SHA2-384
847,969 UART: [kat] SHA2-512-ACC
850,553 UART: [kat] ECC-384
3,290,963 UART: [kat] HMAC-384Kdf
3,304,556 UART: [kat] LMS
3,836,364 UART: [kat] --
3,839,694 UART: [cold-reset] ++
3,841,344 UART: [fht] FHT @ 0x50003400
3,852,038 UART: [idev] ++
3,852,753 UART: [idev] CDI.KEYID = 6
3,853,667 UART: [idev] SUBJECT.KEYID = 7
3,854,931 UART: [idev] UDS.KEYID = 0
3,855,860 ready_for_fw is high
3,856,065 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,703 UART: [idev] Erasing UDS.KEYID = 0
6,331,738 UART: [idev] Sha1 KeyId Algorithm
6,353,224 UART: [idev] --
6,357,675 UART: [ldev] ++
6,358,359 UART: [ldev] CDI.KEYID = 6
6,359,272 UART: [ldev] SUBJECT.KEYID = 5
6,360,427 UART: [ldev] AUTHORITY.KEYID = 7
6,361,654 UART: [ldev] FE.KEYID = 1
6,372,620 UART: [ldev] Erasing FE.KEYID = 1
8,849,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,441 UART: [ldev] --
10,639,030 UART: [fwproc] Wait for Commands...
10,641,554 UART: [fwproc] Recv command 0x46574c44
10,643,816 UART: [fwproc] Recv'd Img size: 114360 bytes
15,280,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,362,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,478,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,020,948 >>> mbox cmd response: success
16,024,130 UART: [afmc] ++
16,024,834 UART: [afmc] CDI.KEYID = 6
16,026,017 UART: [afmc] SUBJECT.KEYID = 7
16,027,498 UART: [afmc] AUTHORITY.KEYID = 5
18,534,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,255,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,257,944 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,273,077 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,288,213 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,303,065 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,326,806 UART: [afmc] --
20,330,341 UART: [cold-reset] --
20,335,880 UART: [state] Locking Datavault
20,341,451 UART: [state] Locking PCR0, PCR1 and PCR31
20,343,634 UART: [state] Locking ICCM
20,345,082 UART: [exit] Launching FMC @ 0x40000130
20,353,758 UART:
20,354,041 UART: Running Caliptra FMC ...
20,355,153 UART:
20,355,313 UART: [state] CFI Enabled
20,363,466 UART: [fht] FMC Alias Private Key: 7
22,120,388 UART: [art] Extend RT PCRs Done
22,121,606 UART: [art] Lock RT PCRs Done
22,123,650 UART: [art] Populate DV Done
22,128,846 UART: [fht] FMC Alias Private Key: 7
22,130,491 UART: [art] Derive CDI
22,131,302 UART: [art] Store in in slot 0x4
22,173,624 UART: [art] Derive Key Pair
22,174,625 UART: [art] Store priv key in slot 0x5
24,601,553 UART: [art] Derive Key Pair - Done
24,614,667 UART: [art] Signing Cert with AUTHO
24,615,975 UART: RITY.KEYID = 7
26,321,404 UART: [art] Erasing AUTHORITY.KEYID = 7
26,322,911 UART: [art] PUB.X = 61BDFC099410F0544AF77FF3EAD392BEC901023F536AF20682022762844277C354D287BEAC9BF4741D99B643AFFB2355
26,330,219 UART: [art] PUB.Y = 91603284D2026F1BD3F8ECCF88FD376C52C8440BCE82BDAC5A851DF818511DE3BBA735972C07F5D8843FD511FC74E0BE
26,337,504 UART: [art] SIG.R = CE42A185127575273DB70740FF9F796210ED76DF5E20CFFABF89FD9D13B622547803C0E65C189A2B5AE0D93FF96B5FFD
26,344,836 UART: [art] SIG.S = FEA90A3502F5FBE332806C6B5734FFF99206ADEDF514502DA448FCF3349B8E7E43418E6DC41AC197B4D4C985E1203DF8
27,324,127 UART: Caliptra RT
27,324,837 UART: [state] CFI Enabled
27,442,294 UART: [rt] RT listening for mailbox commands...
27,444,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,599,710 UART: [rt]cmd =0x41544d4e, len=14344
28,566,659 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,755,939 ready_for_fw is high
3,756,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,071,511 >>> mbox cmd response: success
20,326,072 UART:
20,326,488 UART: Running Caliptra FMC ...
20,327,618 UART:
20,327,796 UART: [state] CFI Enabled
20,336,056 UART: [fht] FMC Alias Private Key: 7
22,092,921 UART: [art] Extend RT PCRs Done
22,094,147 UART: [art] Lock RT PCRs Done
22,095,945 UART: [art] Populate DV Done
22,101,358 UART: [fht] FMC Alias Private Key: 7
22,103,059 UART: [art] Derive CDI
22,103,878 UART: [art] Store in in slot 0x4
22,146,530 UART: [art] Derive Key Pair
22,147,573 UART: [art] Store priv key in slot 0x5
24,574,450 UART: [art] Derive Key Pair - Done
24,587,411 UART: [art] Signing Cert with AUTHO
24,588,718 UART: RITY.KEYID = 7
26,294,515 UART: [art] Erasing AUTHORITY.KEYID = 7
26,296,014 UART: [art] PUB.X = 56F71FBB73347C094491B4190E23FA24D3CA2714759F52B568E09DB8FB3672A80064D864E9C1A0DC16C7820173104C38
26,303,286 UART: [art] PUB.Y = E14EB48FDB6EFB36D36C2CF417CCA300ED82AFDFAFB68BB4A41C4D677362645ADC5B191EE0F47F852F6EBE87CE2ED462
26,310,534 UART: [art] SIG.R = 8FC2763DCCDBF9BCD1D791989D55AA6AE851B4755B220609308DB8C21AF29B6B144066909647CFB9A0E33B10FF8D0CBA
26,317,939 UART: [art] SIG.S = A06C01D823A3D0181CA18167767F72847A236BF2151F45F22AB0A55D71FA76DD992E2791675ECE4952BAF77A15A0CDFB
27,296,686 UART: Caliptra RT
27,297,403 UART: [state] CFI Enabled
27,415,087 UART: [rt] RT listening for mailbox commands...
27,417,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,877 UART: [rt]cmd =0x41544d4e, len=14344
28,539,897 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,363 UART: [kat] SHA2-256
892,301 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,422 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,475,861 UART: [cold-reset] ++
1,476,273 UART: [fht] Storing FHT @ 0x50003400
1,479,034 UART: [idev] ++
1,479,202 UART: [idev] CDI.KEYID = 6
1,479,562 UART: [idev] SUBJECT.KEYID = 7
1,479,986 UART: [idev] UDS.KEYID = 0
1,480,331 ready_for_fw is high
1,480,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,152 UART: [idev] Erasing UDS.KEYID = 0
1,504,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,220 UART: [idev] --
1,514,385 UART: [ldev] ++
1,514,553 UART: [ldev] CDI.KEYID = 6
1,514,916 UART: [ldev] SUBJECT.KEYID = 5
1,515,342 UART: [ldev] AUTHORITY.KEYID = 7
1,515,805 UART: [ldev] FE.KEYID = 1
1,520,817 UART: [ldev] Erasing FE.KEYID = 1
1,545,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,492 UART: [ldev] --
1,585,001 UART: [fwproc] Waiting for Commands...
1,585,756 UART: [fwproc] Received command 0x46574c44
1,586,547 UART: [fwproc] Received Image of size 114360 bytes
5,270,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,298,465 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,327,817 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,463,610 >>> mbox cmd response: success
5,464,684 UART: [afmc] ++
5,464,852 UART: [afmc] CDI.KEYID = 6
5,465,214 UART: [afmc] SUBJECT.KEYID = 7
5,465,639 UART: [afmc] AUTHORITY.KEYID = 5
5,500,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,517,117 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,517,897 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,523,606 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,529,498 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,535,199 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,542,983 UART: [afmc] --
5,543,987 UART: [cold-reset] --
5,544,891 UART: [state] Locking Datavault
5,545,806 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,410 UART: [state] Locking ICCM
5,546,990 UART: [exit] Launching FMC @ 0x40000130
5,552,319 UART:
5,552,335 UART: Running Caliptra FMC ...
5,552,743 UART:
5,552,797 UART: [state] CFI Enabled
5,563,365 UART: [fht] FMC Alias Private Key: 7
5,671,219 UART: [art] Extend RT PCRs Done
5,671,647 UART: [art] Lock RT PCRs Done
5,672,997 UART: [art] Populate DV Done
5,681,065 UART: [fht] FMC Alias Private Key: 7
5,682,015 UART: [art] Derive CDI
5,682,295 UART: [art] Store in in slot 0x4
5,767,756 UART: [art] Derive Key Pair
5,768,116 UART: [art] Store priv key in slot 0x5
5,781,544 UART: [art] Derive Key Pair - Done
5,796,114 UART: [art] Signing Cert with AUTHO
5,796,594 UART: RITY.KEYID = 7
5,811,888 UART: [art] Erasing AUTHORITY.KEYID = 7
5,812,653 UART: [art] PUB.X = E54BDC4F06E6614438444BBA6D71154A7059BDCC175FA648448AF25CD80D4035ED49CC7D83C11527400BA7141A13370C
5,819,413 UART: [art] PUB.Y = 06E13ED1DF260201061EDD6C43F8C15A8D00E22CE4B9C86E3F420DE18BE7ADF9384642922E1C91AB39FA9515D8C439FD
5,826,338 UART: [art] SIG.R = F5C0F15AA0D9A49B5185231A62DFFDB7C494E1C48F694986389167A11F80463BC6DA4C0B3C0DC8A3DEE2A8B1269F87F8
5,833,114 UART: [art] SIG.S = 1CC94216C874105ACA8E5D7D1B5B64B7477276E6EF72B93542790D15578E570A3F4314D6D4A3751A548F4FE1A5B7A5CD
5,856,167 UART: Caliptra RT
5,856,421 UART: [state] CFI Enabled
5,964,497 UART: [rt] RT listening for mailbox commands...
5,965,167 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,944 UART: [rt]cmd =0x41544d4e, len=14344
6,096,306 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,033 ready_for_fw is high
1,363,033 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,163,624 >>> mbox cmd response: success
5,224,695 UART:
5,224,711 UART: Running Caliptra FMC ...
5,225,119 UART:
5,225,173 UART: [state] CFI Enabled
5,235,655 UART: [fht] FMC Alias Private Key: 7
5,343,363 UART: [art] Extend RT PCRs Done
5,343,791 UART: [art] Lock RT PCRs Done
5,345,723 UART: [art] Populate DV Done
5,353,951 UART: [fht] FMC Alias Private Key: 7
5,355,007 UART: [art] Derive CDI
5,355,287 UART: [art] Store in in slot 0x4
5,441,114 UART: [art] Derive Key Pair
5,441,474 UART: [art] Store priv key in slot 0x5
5,454,266 UART: [art] Derive Key Pair - Done
5,468,948 UART: [art] Signing Cert with AUTHO
5,469,428 UART: RITY.KEYID = 7
5,484,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,531 UART: [art] PUB.X = C6886A3989FB977FDDA5B1B372FAC750897286133AD5D0D9C9C763B1A4101BD2D6299410F3358A15319A640BFEE14CB6
5,492,302 UART: [art] PUB.Y = F4CB949B7518C9469581DFF8B4C0DAEDFA61A90A11710B5EBD7B3523259066AAF14E519147BB66F65D0301484557C742
5,499,242 UART: [art] SIG.R = ED856BAE0653D307CC97EDF568A09A7911119ED96DF486143BC19C841E55CE58BA69F759AE028893E5B35D764199AD8D
5,506,009 UART: [art] SIG.S = E79079CA4FF43D30687F38A9CFF3821ED225976AEA61EC8453942DCEAC8D187AEAF72D87BEB377F0B09EFACDFE243990
5,530,252 UART: Caliptra RT
5,530,506 UART: [state] CFI Enabled
5,638,169 UART: [rt] RT listening for mailbox commands...
5,638,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,504 UART: [rt]cmd =0x41544d4e, len=14344
5,769,960 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,050 UART: [kat] SHA2-256
881,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,096 UART: [kat] ++
886,248 UART: [kat] sha1
890,604 UART: [kat] SHA2-256
892,542 UART: [kat] SHA2-384
895,471 UART: [kat] SHA2-512-ACC
897,372 UART: [kat] ECC-384
903,141 UART: [kat] HMAC-384Kdf
907,601 UART: [kat] LMS
1,475,797 UART: [kat] --
1,476,668 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,479,857 UART: [idev] ++
1,480,025 UART: [idev] CDI.KEYID = 6
1,480,385 UART: [idev] SUBJECT.KEYID = 7
1,480,809 UART: [idev] UDS.KEYID = 0
1,481,154 ready_for_fw is high
1,481,154 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,699 UART: [idev] Erasing UDS.KEYID = 0
1,505,537 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,121 UART: [idev] --
1,515,204 UART: [ldev] ++
1,515,372 UART: [ldev] CDI.KEYID = 6
1,515,735 UART: [ldev] SUBJECT.KEYID = 5
1,516,161 UART: [ldev] AUTHORITY.KEYID = 7
1,516,624 UART: [ldev] FE.KEYID = 1
1,521,894 UART: [ldev] Erasing FE.KEYID = 1
1,547,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,551 UART: [ldev] --
1,586,832 UART: [fwproc] Waiting for Commands...
1,587,587 UART: [fwproc] Received command 0x46574c44
1,588,378 UART: [fwproc] Received Image of size 114360 bytes
5,158,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,187,153 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,216,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,352,330 >>> mbox cmd response: success
5,353,404 UART: [afmc] ++
5,353,572 UART: [afmc] CDI.KEYID = 6
5,353,934 UART: [afmc] SUBJECT.KEYID = 7
5,354,359 UART: [afmc] AUTHORITY.KEYID = 5
5,389,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,405,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,406,319 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,412,028 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,920 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,423,621 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,431,547 UART: [afmc] --
5,432,505 UART: [cold-reset] --
5,433,511 UART: [state] Locking Datavault
5,434,770 UART: [state] Locking PCR0, PCR1 and PCR31
5,435,374 UART: [state] Locking ICCM
5,436,034 UART: [exit] Launching FMC @ 0x40000130
5,441,363 UART:
5,441,379 UART: Running Caliptra FMC ...
5,441,787 UART:
5,441,930 UART: [state] CFI Enabled
5,452,204 UART: [fht] FMC Alias Private Key: 7
5,560,104 UART: [art] Extend RT PCRs Done
5,560,532 UART: [art] Lock RT PCRs Done
5,562,238 UART: [art] Populate DV Done
5,570,448 UART: [fht] FMC Alias Private Key: 7
5,571,560 UART: [art] Derive CDI
5,571,840 UART: [art] Store in in slot 0x4
5,657,953 UART: [art] Derive Key Pair
5,658,313 UART: [art] Store priv key in slot 0x5
5,671,597 UART: [art] Derive Key Pair - Done
5,686,445 UART: [art] Signing Cert with AUTHO
5,686,925 UART: RITY.KEYID = 7
5,702,297 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,062 UART: [art] PUB.X = 20B2991E34C30518FFFFDDA8A3E8F279BD3375A29CC7016489725F043AF8DCDF6E660FF8487465227FFBDA270E2E84C5
5,709,827 UART: [art] PUB.Y = 0D5887299D4ECACD2BA3A43B7E4A74A7EE856B5CAE8D3CC795DF567506F61F7028C30D1A43F6DE8EE8453990DCEE4313
5,716,784 UART: [art] SIG.R = 98E7A010BACCEBB486E622EB4E9E51A0C6451AFD4B5395741961E91703BC7F4A351086558BE8CB13DCE35EC587C416CB
5,723,563 UART: [art] SIG.S = D226D0FC00A4D3FA5D1D4FB44DDE2BFEEAE296B8CFD98E677931DD6DC0FF0403AE63268162231F05AAB94C773A4D4860
5,746,837 UART: Caliptra RT
5,747,183 UART: [state] CFI Enabled
5,855,308 UART: [rt] RT listening for mailbox commands...
5,855,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,769 UART: [rt]cmd =0x41544d4e, len=14344
5,986,963 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,708 ready_for_fw is high
1,362,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,354,072 >>> mbox cmd response: success
5,415,439 UART:
5,415,455 UART: Running Caliptra FMC ...
5,415,863 UART:
5,416,006 UART: [state] CFI Enabled
5,426,504 UART: [fht] FMC Alias Private Key: 7
5,534,092 UART: [art] Extend RT PCRs Done
5,534,520 UART: [art] Lock RT PCRs Done
5,536,494 UART: [art] Populate DV Done
5,544,982 UART: [fht] FMC Alias Private Key: 7
5,546,046 UART: [art] Derive CDI
5,546,326 UART: [art] Store in in slot 0x4
5,631,861 UART: [art] Derive Key Pair
5,632,221 UART: [art] Store priv key in slot 0x5
5,645,691 UART: [art] Derive Key Pair - Done
5,660,498 UART: [art] Signing Cert with AUTHO
5,660,978 UART: RITY.KEYID = 7
5,675,992 UART: [art] Erasing AUTHORITY.KEYID = 7
5,676,757 UART: [art] PUB.X = 017A7F7CA3BD32F7540E18E7A8996E1CD6A7270C8B4A00B88F1E396DC4D92A3050069577A9CE7603BDBF71980EF908A7
5,683,490 UART: [art] PUB.Y = C0FB5D6085181736831AFAD6C6C641E000757D7489351357B86A31A1110043B11B2682454D26ABAA361A954CA74C716C
5,690,388 UART: [art] SIG.R = E362F9E9E1FF9F22A66999E2DE2C70B5BE8038D09982213352A360E20852B44D0AE3F6A6FF81384913B068C2B372DDC5
5,697,154 UART: [art] SIG.S = A865996B5D0C40B80137390DA638B2DBCDAC912C8EC793BD5D273BBF76878F012AC13BEEB26499A35ACDBB5DC56FAC9F
5,720,971 UART: Caliptra RT
5,721,317 UART: [state] CFI Enabled
5,829,866 UART: [rt] RT listening for mailbox commands...
5,830,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,953,189 UART: [rt]cmd =0x41544d4e, len=14344
5,961,707 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
893,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,447 UART: [kat] ++
897,599 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,514 UART: [kat] HMAC-384Kdf
922,998 UART: [kat] LMS
1,171,326 UART: [kat] --
1,172,197 UART: [cold-reset] ++
1,172,707 UART: [fht] FHT @ 0x50003400
1,175,444 UART: [idev] ++
1,175,612 UART: [idev] CDI.KEYID = 6
1,175,972 UART: [idev] SUBJECT.KEYID = 7
1,176,396 UART: [idev] UDS.KEYID = 0
1,176,741 ready_for_fw is high
1,176,741 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,094 UART: [idev] Erasing UDS.KEYID = 0
1,201,031 UART: [idev] Sha1 KeyId Algorithm
1,209,455 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,217,261 UART: [ldev] Erasing FE.KEYID = 1
1,243,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,621 UART: [ldev] --
1,283,026 UART: [fwproc] Wait for Commands...
1,283,784 UART: [fwproc] Recv command 0x46574c44
1,284,512 UART: [fwproc] Recv'd Img size: 114360 bytes
3,130,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,323,208 >>> mbox cmd response: success
3,324,452 UART: [afmc] ++
3,324,620 UART: [afmc] CDI.KEYID = 6
3,324,982 UART: [afmc] SUBJECT.KEYID = 7
3,325,407 UART: [afmc] AUTHORITY.KEYID = 5
3,360,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,194 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,903 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,795 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,506 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,453 UART: [afmc] --
3,404,359 UART: [cold-reset] --
3,405,235 UART: [state] Locking Datavault
3,406,494 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,098 UART: [state] Locking ICCM
3,407,578 UART: [exit] Launching FMC @ 0x40000130
3,412,907 UART:
3,412,923 UART: Running Caliptra FMC ...
3,413,331 UART:
3,413,385 UART: [state] CFI Enabled
3,423,767 UART: [fht] FMC Alias Private Key: 7
3,531,383 UART: [art] Extend RT PCRs Done
3,531,811 UART: [art] Lock RT PCRs Done
3,533,413 UART: [art] Populate DV Done
3,541,725 UART: [fht] FMC Alias Private Key: 7
3,542,901 UART: [art] Derive CDI
3,543,181 UART: [art] Store in in slot 0x4
3,628,314 UART: [art] Derive Key Pair
3,628,674 UART: [art] Store priv key in slot 0x5
3,641,730 UART: [art] Derive Key Pair - Done
3,656,370 UART: [art] Signing Cert with AUTHO
3,656,850 UART: RITY.KEYID = 7
3,671,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,717 UART: [art] PUB.X = BC2667937E0D761E19E210BE8D97D25EB85FA9494704F676B97ED2F6E740B0B682A880F285906097A9E82FD09296F95A
3,679,479 UART: [art] PUB.Y = 436E7B62B15883C9D63E39CE9450DC72B11F2A47E168AA88DF95D601A43F910D0B3D979E62CE17B323B8D1CCB7C902C7
3,686,425 UART: [art] SIG.R = 1CB1433562C4D595D7DC0D6D782ADE693B53DAD2D91FB32D55726C8908E03F2A7865EDC2DDC995EC7D3634454131C17B
3,693,197 UART: [art] SIG.S = 2E364673E70ADEB1B651AF719B7AF6DE962122C9C8B95663EC88644FC38176F583514351E25388636284120685F95B61
3,716,026 UART: Caliptra RT
3,716,280 UART: [state] CFI Enabled
3,823,702 UART: [rt] RT listening for mailbox commands...
3,824,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,251 UART: [rt]cmd =0x41544d4e, len=14344
3,955,343 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,807 ready_for_fw is high
1,060,807 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,173,758 >>> mbox cmd response: success
3,235,717 UART:
3,235,733 UART: Running Caliptra FMC ...
3,236,141 UART:
3,236,195 UART: [state] CFI Enabled
3,246,847 UART: [fht] FMC Alias Private Key: 7
3,354,351 UART: [art] Extend RT PCRs Done
3,354,779 UART: [art] Lock RT PCRs Done
3,356,671 UART: [art] Populate DV Done
3,364,641 UART: [fht] FMC Alias Private Key: 7
3,365,595 UART: [art] Derive CDI
3,365,875 UART: [art] Store in in slot 0x4
3,451,374 UART: [art] Derive Key Pair
3,451,734 UART: [art] Store priv key in slot 0x5
3,464,896 UART: [art] Derive Key Pair - Done
3,479,749 UART: [art] Signing Cert with AUTHO
3,480,229 UART: RITY.KEYID = 7
3,495,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,446 UART: [art] PUB.X = 3590B926C55BE88C85FFFF3A1E8C61F96D86D664BE1B6639F1262A142CB7EF56E8F6977459A1B1513138626ACC19DFA7
3,503,222 UART: [art] PUB.Y = 0D16BD42E81F4CDFAD5CB3C9E4A0A9B07F7F50693E5153B7A56AE0CE17D9BFB65EE44C9578E0094AEAF6045CCC6A41C4
3,510,187 UART: [art] SIG.R = 675BF5E8804D83AB1A23CF3E90121BC2ED777CB4C8A22D36B145BEB547CF011E4DA38F802CD3FEB43A4FDFF0B72BA69B
3,516,978 UART: [art] SIG.S = 61FCA2B1BCF0EEE333F846914DC96D80B149534B0C731E01A500EEC3CECCD8C6CB9247BD4F3985C745B50CBBF1E93E96
3,540,408 UART: Caliptra RT
3,540,662 UART: [state] CFI Enabled
3,648,320 UART: [rt] RT listening for mailbox commands...
3,648,990 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,833 UART: [rt]cmd =0x41544d4e, len=14344
3,780,343 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
893,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,458 UART: [kat] ++
897,610 UART: [kat] sha1
901,862 UART: [kat] SHA2-256
903,802 UART: [kat] SHA2-384
906,379 UART: [kat] SHA2-512-ACC
908,280 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,757 UART: [kat] LMS
1,171,085 UART: [kat] --
1,171,904 UART: [cold-reset] ++
1,172,312 UART: [fht] FHT @ 0x50003400
1,174,907 UART: [idev] ++
1,175,075 UART: [idev] CDI.KEYID = 6
1,175,435 UART: [idev] SUBJECT.KEYID = 7
1,175,859 UART: [idev] UDS.KEYID = 0
1,176,204 ready_for_fw is high
1,176,204 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,823 UART: [idev] Erasing UDS.KEYID = 0
1,201,086 UART: [idev] Sha1 KeyId Algorithm
1,209,762 UART: [idev] --
1,210,996 UART: [ldev] ++
1,211,164 UART: [ldev] CDI.KEYID = 6
1,211,527 UART: [ldev] SUBJECT.KEYID = 5
1,211,953 UART: [ldev] AUTHORITY.KEYID = 7
1,212,416 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,243,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,890 UART: [ldev] --
1,283,195 UART: [fwproc] Wait for Commands...
1,284,001 UART: [fwproc] Recv command 0x46574c44
1,284,729 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,404 >>> mbox cmd response: success
3,323,644 UART: [afmc] ++
3,323,812 UART: [afmc] CDI.KEYID = 6
3,324,174 UART: [afmc] SUBJECT.KEYID = 7
3,324,599 UART: [afmc] AUTHORITY.KEYID = 5
3,360,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,010 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,719 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,611 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,322 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,191 UART: [afmc] --
3,403,247 UART: [cold-reset] --
3,404,051 UART: [state] Locking Datavault
3,405,238 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,842 UART: [state] Locking ICCM
3,406,294 UART: [exit] Launching FMC @ 0x40000130
3,411,623 UART:
3,411,639 UART: Running Caliptra FMC ...
3,412,047 UART:
3,412,190 UART: [state] CFI Enabled
3,423,102 UART: [fht] FMC Alias Private Key: 7
3,531,548 UART: [art] Extend RT PCRs Done
3,531,976 UART: [art] Lock RT PCRs Done
3,533,374 UART: [art] Populate DV Done
3,541,542 UART: [fht] FMC Alias Private Key: 7
3,542,522 UART: [art] Derive CDI
3,542,802 UART: [art] Store in in slot 0x4
3,628,693 UART: [art] Derive Key Pair
3,629,053 UART: [art] Store priv key in slot 0x5
3,642,335 UART: [art] Derive Key Pair - Done
3,656,978 UART: [art] Signing Cert with AUTHO
3,657,458 UART: RITY.KEYID = 7
3,672,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,453 UART: [art] PUB.X = 661B05D043D4852829CB09A5B94AEE519F538F2581AB82F6A9ACD9076032A3DA6BA9B4391FFAB09468F2983CB378A005
3,680,215 UART: [art] PUB.Y = B6AA1AC73C03517DF8B45D9191B9F4AB2670E4FBCDA2400D5CE30EE94BA12C1C64CBD8FB178994190074565D9CBCFB64
3,687,152 UART: [art] SIG.R = CB377EA616164D2550A36711773BF6EAEFB30EC519A05AB5CB7DF09093C59F8F679A1A67CAE11F2B368C9DFF300ADF00
3,693,910 UART: [art] SIG.S = CF1CAA19539962991265E07D0F0CCB9D925A7CC77801E66C814C278B9574EE59CD2EBC217F90FA261827CC4D7F11246A
3,717,400 UART: Caliptra RT
3,717,746 UART: [state] CFI Enabled
3,825,370 UART: [rt] RT listening for mailbox commands...
3,826,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,761 UART: [rt]cmd =0x41544d4e, len=14344
3,957,219 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,350 ready_for_fw is high
1,061,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,171,930 >>> mbox cmd response: success
3,234,615 UART:
3,234,631 UART: Running Caliptra FMC ...
3,235,039 UART:
3,235,182 UART: [state] CFI Enabled
3,245,556 UART: [fht] FMC Alias Private Key: 7
3,353,472 UART: [art] Extend RT PCRs Done
3,353,900 UART: [art] Lock RT PCRs Done
3,355,540 UART: [art] Populate DV Done
3,363,830 UART: [fht] FMC Alias Private Key: 7
3,364,974 UART: [art] Derive CDI
3,365,254 UART: [art] Store in in slot 0x4
3,450,773 UART: [art] Derive Key Pair
3,451,133 UART: [art] Store priv key in slot 0x5
3,464,223 UART: [art] Derive Key Pair - Done
3,479,051 UART: [art] Signing Cert with AUTHO
3,479,531 UART: RITY.KEYID = 7
3,494,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,710 UART: [art] PUB.X = A5E976E83F0DEBCA76C740D640B6314FB509B41E3D964AFCD947A74D2F3F033768BF4F57AA2DBE739FCCEB3F3AD9B7AA
3,502,497 UART: [art] PUB.Y = FBD445DE1D396425193D519BCCEBDBD6CCF8496F1ECE5EACE6142ED4DE182534F61D329EFB2473EE19C030BE6F10B081
3,509,469 UART: [art] SIG.R = 08A75AB5EE6D2899C52A97F560ADFA830C68CA61D303CEA3402DE49B86EF3E2B93640AA1772DC5DEFBBB49C21F2BD706
3,516,244 UART: [art] SIG.S = BE561DA992FFFCE75D36222335F8135CF205151E2BB529892CD27EFA3B6795D5C7CB2C122E7A5CB671A8FD90AB9AC215
3,540,168 UART: Caliptra RT
3,540,514 UART: [state] CFI Enabled
3,648,559 UART: [rt] RT listening for mailbox commands...
3,649,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,804 UART: [rt]cmd =0x41544d4e, len=14344
3,780,484 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,169,889 UART: [fht] FHT @ 0x50003400
1,172,697 UART: [idev] ++
1,172,865 UART: [idev] CDI.KEYID = 6
1,173,226 UART: [idev] SUBJECT.KEYID = 7
1,173,651 UART: [idev] UDS.KEYID = 0
1,173,997 ready_for_fw is high
1,173,997 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,456 UART: [ldev] ++
1,208,624 UART: [ldev] CDI.KEYID = 6
1,208,988 UART: [ldev] SUBJECT.KEYID = 5
1,209,415 UART: [ldev] AUTHORITY.KEYID = 7
1,209,878 UART: [ldev] FE.KEYID = 1
1,214,908 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,281,965 UART: [fwproc] Recv command 0x46574c44
1,282,698 UART: [fwproc] Recv'd Img size: 114360 bytes
3,114,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,308,459 >>> mbox cmd response: success
3,309,636 UART: [afmc] ++
3,309,804 UART: [afmc] CDI.KEYID = 6
3,310,167 UART: [afmc] SUBJECT.KEYID = 7
3,310,593 UART: [afmc] AUTHORITY.KEYID = 5
3,346,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,268 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,978 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,868 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,579 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,389 UART: [afmc] --
3,389,315 UART: [cold-reset] --
3,389,973 UART: [state] Locking Datavault
3,391,058 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,662 UART: [state] Locking ICCM
3,392,256 UART: [exit] Launching FMC @ 0x40000130
3,397,585 UART:
3,397,601 UART: Running Caliptra FMC ...
3,398,009 UART:
3,398,063 UART: [state] CFI Enabled
3,408,463 UART: [fht] FMC Alias Private Key: 7
3,515,959 UART: [art] Extend RT PCRs Done
3,516,387 UART: [art] Lock RT PCRs Done
3,517,999 UART: [art] Populate DV Done
3,526,059 UART: [fht] FMC Alias Private Key: 7
3,527,115 UART: [art] Derive CDI
3,527,395 UART: [art] Store in in slot 0x4
3,613,204 UART: [art] Derive Key Pair
3,613,564 UART: [art] Store priv key in slot 0x5
3,626,474 UART: [art] Derive Key Pair - Done
3,641,377 UART: [art] Signing Cert with AUTHO
3,641,857 UART: RITY.KEYID = 7
3,657,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,056 UART: [art] PUB.X = 0C8DBFD247629E7EAEBBB9BA637EE68D0B0FD40F63AE97AD4B0F9CEDF461D797AA9A3F5E66C0947856DBC4FA7AE602A5
3,664,838 UART: [art] PUB.Y = 1383AF4DEF1999E3C934CFB7C08C8E2F2A30C51CCA7825C4F81177714DF38E4F02C2F36B5EC6C0CBFFA00530FD4459E7
3,671,798 UART: [art] SIG.R = 1737D5568404F02CCEEEBC7159A57C486288B79CE5297634ECF49CDA8C696EABDE5C60F6F23CE29E2CB2F1B1AF1DF2A3
3,678,585 UART: [art] SIG.S = 3B5A23901CAFEA6CDC18CC94F078E3E9E878B38453CCFC3EADB69BB20C74AEDB29143E8C0FBD831367D692670A55F86C
3,702,339 UART: Caliptra RT
3,702,593 UART: [state] CFI Enabled
3,810,343 UART: [rt] RT listening for mailbox commands...
3,811,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,778 UART: [rt]cmd =0x41544d4e, len=14344
3,942,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,962 ready_for_fw is high
1,055,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,163,984 >>> mbox cmd response: success
3,226,749 UART:
3,226,765 UART: Running Caliptra FMC ...
3,227,173 UART:
3,227,227 UART: [state] CFI Enabled
3,237,923 UART: [fht] FMC Alias Private Key: 7
3,345,535 UART: [art] Extend RT PCRs Done
3,345,963 UART: [art] Lock RT PCRs Done
3,347,441 UART: [art] Populate DV Done
3,355,769 UART: [fht] FMC Alias Private Key: 7
3,356,865 UART: [art] Derive CDI
3,357,145 UART: [art] Store in in slot 0x4
3,442,772 UART: [art] Derive Key Pair
3,443,132 UART: [art] Store priv key in slot 0x5
3,456,078 UART: [art] Derive Key Pair - Done
3,470,973 UART: [art] Signing Cert with AUTHO
3,471,453 UART: RITY.KEYID = 7
3,486,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,328 UART: [art] PUB.X = 89D08825AD7E9428D6451566CB879E187F54DF7A7CBA410B5B60E936A8E215B556D31686EF559FE39AE29F5EDFE3D63D
3,494,103 UART: [art] PUB.Y = FB5911C1AD5075F5C0CC59B6179A6B70C517FBFBB6DBA7B31A36371437C6C567F46FC05321002B6192F959BA619B63E8
3,501,037 UART: [art] SIG.R = C333E1145CA80D82C3FAE3726E723431A34022DB7EEAFFC3E70F406C1C1C3EEE3BD48D0D56E41C28D31306433452D38A
3,507,805 UART: [art] SIG.S = AC921639D7EE6E69519053AD452D539E8F2D2D3E8FCB1251DB4B7F7E738F9AB6175F00EF203A7AF1A0F5ADF448DB770E
3,531,335 UART: Caliptra RT
3,531,589 UART: [state] CFI Enabled
3,639,789 UART: [rt] RT listening for mailbox commands...
3,640,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,156 UART: [rt]cmd =0x41544d4e, len=14344
3,771,884 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,476 UART: [idev] ++
1,173,644 UART: [idev] CDI.KEYID = 6
1,174,005 UART: [idev] SUBJECT.KEYID = 7
1,174,430 UART: [idev] UDS.KEYID = 0
1,174,776 ready_for_fw is high
1,174,776 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,200,246 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,109 UART: [ldev] ++
1,210,277 UART: [ldev] CDI.KEYID = 6
1,210,641 UART: [ldev] SUBJECT.KEYID = 5
1,211,068 UART: [ldev] AUTHORITY.KEYID = 7
1,211,531 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,759 UART: [fwproc] Recv'd Img size: 114360 bytes
3,120,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,313,714 >>> mbox cmd response: success
3,314,791 UART: [afmc] ++
3,314,959 UART: [afmc] CDI.KEYID = 6
3,315,322 UART: [afmc] SUBJECT.KEYID = 7
3,315,748 UART: [afmc] AUTHORITY.KEYID = 5
3,351,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,371 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,081 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,971 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,682 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,636 UART: [afmc] --
3,395,518 UART: [cold-reset] --
3,396,196 UART: [state] Locking Datavault
3,397,267 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,871 UART: [state] Locking ICCM
3,398,323 UART: [exit] Launching FMC @ 0x40000130
3,403,652 UART:
3,403,668 UART: Running Caliptra FMC ...
3,404,076 UART:
3,404,219 UART: [state] CFI Enabled
3,414,809 UART: [fht] FMC Alias Private Key: 7
3,522,711 UART: [art] Extend RT PCRs Done
3,523,139 UART: [art] Lock RT PCRs Done
3,524,819 UART: [art] Populate DV Done
3,533,199 UART: [fht] FMC Alias Private Key: 7
3,534,355 UART: [art] Derive CDI
3,534,635 UART: [art] Store in in slot 0x4
3,620,588 UART: [art] Derive Key Pair
3,620,948 UART: [art] Store priv key in slot 0x5
3,633,788 UART: [art] Derive Key Pair - Done
3,648,268 UART: [art] Signing Cert with AUTHO
3,648,748 UART: RITY.KEYID = 7
3,663,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,635 UART: [art] PUB.X = 044B94098D07FA3EEB7471B8CD4B1E7D36844CC6B38647FDDBA12AA7A0733D87E81F04A7E6766ECCD8C5C7A837DBBF57
3,671,411 UART: [art] PUB.Y = 5D21452C2D5C8E496114CB31388F2D7F837DFDC8E596D6A044578EEC4456E37ECBAD7B49127AD31A461F65C86B3669B0
3,678,367 UART: [art] SIG.R = 04E6954307D3EF728C6D6397A8CEEF339DE862330EDEC0DFFEBD270F3DBAE1C9CC3A3A6C34969F82259D21FEFAD5FF76
3,685,149 UART: [art] SIG.S = CC6CDDC4CE5289B7CF58DACABA89C6428562266103D19DBFAC9E1910CD67DFF5FCD740CC7CC7932B87312655C64483C9
3,709,019 UART: Caliptra RT
3,709,365 UART: [state] CFI Enabled
3,817,840 UART: [rt] RT listening for mailbox commands...
3,818,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,253 UART: [rt]cmd =0x41544d4e, len=14344
3,950,119 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,523 ready_for_fw is high
1,055,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,727 >>> mbox cmd response: success
3,232,380 UART:
3,232,396 UART: Running Caliptra FMC ...
3,232,804 UART:
3,232,947 UART: [state] CFI Enabled
3,243,363 UART: [fht] FMC Alias Private Key: 7
3,351,207 UART: [art] Extend RT PCRs Done
3,351,635 UART: [art] Lock RT PCRs Done
3,353,199 UART: [art] Populate DV Done
3,361,235 UART: [fht] FMC Alias Private Key: 7
3,362,229 UART: [art] Derive CDI
3,362,509 UART: [art] Store in in slot 0x4
3,448,504 UART: [art] Derive Key Pair
3,448,864 UART: [art] Store priv key in slot 0x5
3,462,374 UART: [art] Derive Key Pair - Done
3,477,025 UART: [art] Signing Cert with AUTHO
3,477,505 UART: RITY.KEYID = 7
3,492,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,472 UART: [art] PUB.X = 9406F4E692F6EFCB4031546ECC9176B9195994D2CD53A79192CEEA9E45B0E2BF04088234FBC203BFF6302132A45FC400
3,500,212 UART: [art] PUB.Y = 940EC5283FBFB405FFEA6854CB2887E72419939C958D72289F18DF446698364A433577615F5111772BEEC141C9CCC239
3,507,150 UART: [art] SIG.R = D46E37FECA493E4C10C09568DC0D8B38023730DB79DF41F4B4140F6F91C3505579D90B0FD4BB9AF5A20F8358ADA9691A
3,513,912 UART: [art] SIG.S = EF2F0DD353CC6BFA834F167091AB5C92DC5455A5DE0EAD744D8DF78C65072A7004426B5EB3A38E5E5CC859207E8DEB3C
3,537,695 UART: Caliptra RT
3,538,041 UART: [state] CFI Enabled
3,645,891 UART: [rt] RT listening for mailbox commands...
3,646,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,522 UART: [rt]cmd =0x41544d4e, len=14344
3,778,010 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,586 UART:
192,951 UART: Running Caliptra ROM ...
194,131 UART:
194,298 UART: [state] CFI Enabled
262,842 UART: [state] LifecycleState = Unprovisioned
264,760 UART: [state] DebugLocked = No
267,147 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,061 UART: [kat] SHA2-256
441,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,230 UART: [kat] ++
452,825 UART: [kat] sha1
464,054 UART: [kat] SHA2-256
466,773 UART: [kat] SHA2-384
471,785 UART: [kat] SHA2-512-ACC
474,191 UART: [kat] ECC-384
2,768,352 UART: [kat] HMAC-384Kdf
2,798,278 UART: [kat] LMS
3,988,575 UART: [kat] --
3,993,638 UART: [cold-reset] ++
3,994,587 UART: [fht] Storing FHT @ 0x50003400
4,007,347 UART: [idev] ++
4,007,906 UART: [idev] CDI.KEYID = 6
4,008,888 UART: [idev] SUBJECT.KEYID = 7
4,010,054 UART: [idev] UDS.KEYID = 0
4,011,121 ready_for_fw is high
4,011,313 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,713 UART: [idev] Erasing UDS.KEYID = 0
7,349,216 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,429 UART: [idev] --
7,374,465 UART: [ldev] ++
7,375,026 UART: [ldev] CDI.KEYID = 6
7,375,959 UART: [ldev] SUBJECT.KEYID = 5
7,377,163 UART: [ldev] AUTHORITY.KEYID = 7
7,378,438 UART: [ldev] FE.KEYID = 1
7,421,460 UART: [ldev] Erasing FE.KEYID = 1
10,752,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,161 UART: [ldev] --
13,114,137 UART: [fwproc] Waiting for Commands...
13,116,179 UART: [fwproc] Received command 0x46574c44
13,118,351 UART: [fwproc] Received Image of size 114036 bytes
17,169,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,631,700 >>> mbox cmd response: success
17,635,952 UART: [afmc] ++
17,636,539 UART: [afmc] CDI.KEYID = 6
17,637,420 UART: [afmc] SUBJECT.KEYID = 7
17,638,702 UART: [afmc] AUTHORITY.KEYID = 5
21,007,324 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,892 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,154 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,543 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,363 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,866 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,958 UART: [afmc] --
23,380,415 UART: [cold-reset] --
23,383,352 UART: [state] Locking Datavault
23,391,185 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,937 UART: [state] Locking ICCM
23,395,456 UART: [exit] Launching FMC @ 0x40000130
23,403,845 UART:
23,404,073 UART: Running Caliptra FMC ...
23,405,170 UART:
23,405,338 UART: [state] CFI Enabled
23,467,254 UART: [fht] FMC Alias Private Key: 7
25,805,200 UART: [art] Extend RT PCRs Done
25,806,429 UART: [art] Lock RT PCRs Done
25,808,090 UART: [art] Populate DV Done
25,813,662 UART: [fht] FMC Alias Private Key: 7
25,815,196 UART: [art] Derive CDI
25,815,952 UART: [art] Store in in slot 0x4
25,876,187 UART: [art] Derive Key Pair
25,877,227 UART: [art] Store priv key in slot 0x5
29,169,659 UART: [art] Derive Key Pair - Done
29,182,819 UART: [art] Signing Cert with AUTHO
29,184,123 UART: RITY.KEYID = 7
31,472,158 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,699 UART: [art] PUB.X = 9B2101EE75097F220EA389AA2BDD184A721BA89ADCC566172A976D4A1AB99753BF25AA06D97670A8CE8E5E021B4C4624
31,480,914 UART: [art] PUB.Y = 2D4B3E5ECC24E7DFBF5CFECEBE09F7C90118311982FBB6DA0280B3A9E34561E022C7A05E4740670F3FE0283D9E5B3A8F
31,488,181 UART: [art] SIG.R = 3FD2070C9B4B0580405265140F303C9E6ED19FCCC59DA87B76D560AA5CAC3E58194A95D88AA6797853A256FC8A36C5E6
31,495,546 UART: [art] SIG.S = 24BE67A414C5E43FA019B847EAE77E5ED4E2CADFBC5BE560077C012C3F176AD8D6F0DA67DAB6BAB5F0B37D97D8D06CA7
32,800,669 UART: Caliptra RT
32,801,406 UART: [state] CFI Enabled
32,962,676 UART: [rt] RT listening for mailbox commands...
32,965,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,120,447 UART: [rt]cmd =0x41544d4e, len=14344
38,355,879 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,784,604 ready_for_fw is high
3,784,971 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,870,454 >>> mbox cmd response: success
23,565,324 UART:
23,565,710 UART: Running Caliptra FMC ...
23,566,902 UART:
23,567,065 UART: [state] CFI Enabled
23,619,016 UART: [fht] FMC Alias Private Key: 7
25,957,567 UART: [art] Extend RT PCRs Done
25,958,822 UART: [art] Lock RT PCRs Done
25,960,289 UART: [art] Populate DV Done
25,965,415 UART: [fht] FMC Alias Private Key: 7
25,966,936 UART: [art] Derive CDI
25,967,676 UART: [art] Store in in slot 0x4
26,030,352 UART: [art] Derive Key Pair
26,031,351 UART: [art] Store priv key in slot 0x5
29,324,023 UART: [art] Derive Key Pair - Done
29,337,283 UART: [art] Signing Cert with AUTHO
29,338,581 UART: RITY.KEYID = 7
31,625,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,225 UART: [art] PUB.X = FD2F7641868E282E4D1DCD3BECB6452757978BE239F09B4F3616A9E741D917A4AB839EACB21D0ADB5C37B012B97577A4
31,634,553 UART: [art] PUB.Y = 8EDCAEAF4F92327976A4D207DA4B0E5C4B198FC7AB72D9207ABD433E061B7DDB5C2A3FB5533019926B83EB29F6E1101B
31,641,712 UART: [art] SIG.R = CAF82A4F0270242244703E8C3DBBDD2CCCA1CD18CD171C77B908B557E0C20D2B4946563D094754D107FB09C1879C227D
31,649,126 UART: [art] SIG.S = B70404C81472B0B38563D4BD48756803EF4CEE733B930E102EEA3572E299FD9D32121BA3B8A89C2EC01A253B36F0BD6D
32,954,722 UART: Caliptra RT
32,955,426 UART: [state] CFI Enabled
33,116,269 UART: [rt] RT listening for mailbox commands...
33,118,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,273,638 UART: [rt]cmd =0x41544d4e, len=14344
38,509,201 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,528 UART:
192,871 UART: Running Caliptra ROM ...
194,056 UART:
603,590 UART: [state] CFI Enabled
615,539 UART: [state] LifecycleState = Unprovisioned
617,490 UART: [state] DebugLocked = No
620,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,231 UART: [kat] SHA2-256
794,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,492 UART: [kat] ++
806,095 UART: [kat] sha1
815,844 UART: [kat] SHA2-256
818,562 UART: [kat] SHA2-384
825,214 UART: [kat] SHA2-512-ACC
827,548 UART: [kat] ECC-384
3,111,252 UART: [kat] HMAC-384Kdf
3,122,040 UART: [kat] LMS
4,312,147 UART: [kat] --
4,316,952 UART: [cold-reset] ++
4,318,037 UART: [fht] Storing FHT @ 0x50003400
4,328,662 UART: [idev] ++
4,329,235 UART: [idev] CDI.KEYID = 6
4,330,160 UART: [idev] SUBJECT.KEYID = 7
4,331,401 UART: [idev] UDS.KEYID = 0
4,332,471 ready_for_fw is high
4,332,697 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,475,984 UART: [idev] Erasing UDS.KEYID = 0
7,617,187 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,042 UART: [idev] --
7,643,389 UART: [ldev] ++
7,643,966 UART: [ldev] CDI.KEYID = 6
7,644,929 UART: [ldev] SUBJECT.KEYID = 5
7,646,161 UART: [ldev] AUTHORITY.KEYID = 7
7,647,394 UART: [ldev] FE.KEYID = 1
7,659,277 UART: [ldev] Erasing FE.KEYID = 1
10,950,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,833 UART: [ldev] --
13,313,269 UART: [fwproc] Waiting for Commands...
13,316,439 UART: [fwproc] Received command 0x46574c44
13,318,615 UART: [fwproc] Received Image of size 114036 bytes
17,370,833 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,543 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,839,834 >>> mbox cmd response: success
17,843,537 UART: [afmc] ++
17,844,136 UART: [afmc] CDI.KEYID = 6
17,845,044 UART: [afmc] SUBJECT.KEYID = 7
17,846,271 UART: [afmc] AUTHORITY.KEYID = 5
21,164,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,653 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,078 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,882 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,312 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,312 UART: [afmc] --
23,529,932 UART: [cold-reset] --
23,534,390 UART: [state] Locking Datavault
23,538,290 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,043 UART: [state] Locking ICCM
23,542,531 UART: [exit] Launching FMC @ 0x40000130
23,550,935 UART:
23,551,181 UART: Running Caliptra FMC ...
23,552,285 UART:
23,552,442 UART: [state] CFI Enabled
23,560,568 UART: [fht] FMC Alias Private Key: 7
25,891,081 UART: [art] Extend RT PCRs Done
25,892,302 UART: [art] Lock RT PCRs Done
25,893,873 UART: [art] Populate DV Done
25,899,285 UART: [fht] FMC Alias Private Key: 7
25,900,985 UART: [art] Derive CDI
25,901,723 UART: [art] Store in in slot 0x4
25,944,363 UART: [art] Derive Key Pair
25,945,421 UART: [art] Store priv key in slot 0x5
29,187,401 UART: [art] Derive Key Pair - Done
29,200,243 UART: [art] Signing Cert with AUTHO
29,201,551 UART: RITY.KEYID = 7
31,480,922 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,435 UART: [art] PUB.X = 659226F328F3A503948A2017E1FCBB53BD8D03C490E3FF6F60F97952280B785B48847C31CCBD7041E8C75FA6DE98DFEE
31,489,643 UART: [art] PUB.Y = D2DFA45A024BCD3DC565D6A5233FDC14E93F2E191769878FF907A517A377E29862ABC0842C8CC26A7321200A418BE53E
31,496,929 UART: [art] SIG.R = E0CDF48127E2ED94DCBD4A4BA8FBFB020BB1419626161BCD79A08544E3248B91A8E38557AE801C4DC1A1ACED82642213
31,504,285 UART: [art] SIG.S = AEDED448B621B9EC012537FBCA3DC8E85CB5C4C465E6194E49428EAC4308E5BB3173630B744C7E5C3F22740C8498B37F
32,808,937 UART: Caliptra RT
32,809,632 UART: [state] CFI Enabled
32,927,234 UART: [rt] RT listening for mailbox commands...
32,929,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,084,882 UART: [rt]cmd =0x41544d4e, len=14344
38,320,337 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
4,130,801 ready_for_fw is high
4,131,340 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,069,314 >>> mbox cmd response: success
23,714,670 UART:
23,715,083 UART: Running Caliptra FMC ...
23,716,200 UART:
23,716,352 UART: [state] CFI Enabled
23,724,201 UART: [fht] FMC Alias Private Key: 7
26,055,659 UART: [art] Extend RT PCRs Done
26,056,894 UART: [art] Lock RT PCRs Done
26,058,421 UART: [art] Populate DV Done
26,063,784 UART: [fht] FMC Alias Private Key: 7
26,065,275 UART: [art] Derive CDI
26,066,046 UART: [art] Store in in slot 0x4
26,108,686 UART: [art] Derive Key Pair
26,109,737 UART: [art] Store priv key in slot 0x5
29,351,746 UART: [art] Derive Key Pair - Done
29,364,552 UART: [art] Signing Cert with AUTHO
29,365,863 UART: RITY.KEYID = 7
31,645,605 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,113 UART: [art] PUB.X = 88FEC19F5F1CAD28DEC41C86628C97EEFD6DDAF9AEA844097E834EE7CC5962BE89AB765EBD289BE95CB540FD2975D377
31,654,385 UART: [art] PUB.Y = 714AB073F9F2D5BACD41B058016C8942F24D2FEC7AD04F154CDE25E94F751DD5CBB1AC731A7985AAF91B97D4E72BB79E
31,661,673 UART: [art] SIG.R = 4CE1DB7092F67BFDE84C45BAF615E03F5CF83D7F9F53B2A3F4B9411577A28E462DC7607FE91FD92DFC92408E705ADB05
31,669,044 UART: [art] SIG.S = 90F10CC5DC37F05FB0AE9A4FB23F74D8DC7908CED7ED4A913D8E6FD37A22F8CC0AF039D75225DE222E90BDF38EA11196
32,974,225 UART: Caliptra RT
32,974,915 UART: [state] CFI Enabled
33,092,470 UART: [rt] RT listening for mailbox commands...
33,094,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,250,140 UART: [rt]cmd =0x41544d4e, len=14344
38,486,040 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
192,772 UART:
193,127 UART: Running Caliptra ROM ...
194,351 UART:
194,507 UART: [state] CFI Enabled
263,085 UART: [state] LifecycleState = Unprovisioned
265,004 UART: [state] DebugLocked = No
266,322 UART: [state] WD Timer not started. Device not locked for debugging
270,220 UART: [kat] SHA2-256
449,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,899 UART: [kat] ++
461,343 UART: [kat] sha1
472,378 UART: [kat] SHA2-256
475,440 UART: [kat] SHA2-384
482,152 UART: [kat] SHA2-512-ACC
485,092 UART: [kat] ECC-384
2,948,488 UART: [kat] HMAC-384Kdf
2,971,819 UART: [kat] LMS
3,501,264 UART: [kat] --
3,505,400 UART: [cold-reset] ++
3,507,122 UART: [fht] FHT @ 0x50003400
3,518,077 UART: [idev] ++
3,518,712 UART: [idev] CDI.KEYID = 6
3,519,627 UART: [idev] SUBJECT.KEYID = 7
3,520,810 UART: [idev] UDS.KEYID = 0
3,521,740 ready_for_fw is high
3,521,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,590 UART: [idev] Erasing UDS.KEYID = 0
6,025,114 UART: [idev] Sha1 KeyId Algorithm
6,047,427 UART: [idev] --
6,052,012 UART: [ldev] ++
6,052,598 UART: [ldev] CDI.KEYID = 6
6,053,527 UART: [ldev] SUBJECT.KEYID = 5
6,054,693 UART: [ldev] AUTHORITY.KEYID = 7
6,055,982 UART: [ldev] FE.KEYID = 1
6,102,041 UART: [ldev] Erasing FE.KEYID = 1
8,608,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,143 UART: [ldev] --
10,414,366 UART: [fwproc] Wait for Commands...
10,415,871 UART: [fwproc] Recv command 0x46574c44
10,417,976 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,287,984 >>> mbox cmd response: success
14,291,568 UART: [afmc] ++
14,292,173 UART: [afmc] CDI.KEYID = 6
14,293,088 UART: [afmc] SUBJECT.KEYID = 7
14,294,263 UART: [afmc] AUTHORITY.KEYID = 5
16,829,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,786 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,715 UART: [afmc] --
18,627,145 UART: [cold-reset] --
18,630,912 UART: [state] Locking Datavault
18,635,831 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,487 UART: [state] Locking ICCM
18,640,143 UART: [exit] Launching FMC @ 0x40000130
18,648,542 UART:
18,648,781 UART: Running Caliptra FMC ...
18,649,886 UART:
18,650,059 UART: [state] CFI Enabled
18,710,700 UART: [fht] FMC Alias Private Key: 7
20,474,435 UART: [art] Extend RT PCRs Done
20,475,647 UART: [art] Lock RT PCRs Done
20,477,239 UART: [art] Populate DV Done
20,482,654 UART: [fht] FMC Alias Private Key: 7
20,484,302 UART: [art] Derive CDI
20,485,122 UART: [art] Store in in slot 0x4
20,543,890 UART: [art] Derive Key Pair
20,544,894 UART: [art] Store priv key in slot 0x5
23,007,488 UART: [art] Derive Key Pair - Done
23,020,548 UART: [art] Signing Cert with AUTHO
23,021,880 UART: RITY.KEYID = 7
24,733,642 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,161 UART: [art] PUB.X = D933E96788E9F8A3CEC0F78CBA461F3B548D94A91D5685F275DF8909EA21129744527CBFFDB27974CD56A8DA274A4518
24,742,429 UART: [art] PUB.Y = 71D06DB77A7205AFF55C4903C67B5A792EDD6EAD2C527C079F5903D75481DD7E192C0D5EC977F0CEF5E9B4F27F1FF960
24,749,699 UART: [art] SIG.R = E71F55145DA12FA06CCA42E4264E144BA6961905E24D4FF9EB7789CDCA2D2D44F9744F342D953351B2F101AA0C24434B
24,757,079 UART: [art] SIG.S = EFAEDA4DC0F8C594C2EA2BE6093FB49D5C2C900B28B0CC0640F0F4FCADA028324FD82AD0F1359A93F09C965CE035BC6F
25,736,208 UART: Caliptra RT
25,736,924 UART: [state] CFI Enabled
25,901,385 UART: [rt] RT listening for mailbox commands...
25,903,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,074 UART: [rt]cmd =0x41544d4e, len=14344
29,989,440 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,555 UART:
192,921 UART: Running Caliptra ROM ...
194,570 UART:
194,737 UART: [state] CFI Enabled
267,317 UART: [state] LifecycleState = Unprovisioned
269,680 UART: [state] DebugLocked = No
270,875 UART: [state] WD Timer not started. Device not locked for debugging
274,262 UART: [kat] SHA2-256
464,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,827 UART: [kat] ++
475,277 UART: [kat] sha1
486,428 UART: [kat] SHA2-256
489,433 UART: [kat] SHA2-384
494,215 UART: [kat] SHA2-512-ACC
496,802 UART: [kat] ECC-384
2,949,146 UART: [kat] HMAC-384Kdf
2,972,755 UART: [kat] LMS
3,504,499 UART: [kat] --
3,508,588 UART: [cold-reset] ++
3,509,818 UART: [fht] FHT @ 0x50003400
3,520,730 UART: [idev] ++
3,521,375 UART: [idev] CDI.KEYID = 6
3,522,433 UART: [idev] SUBJECT.KEYID = 7
3,523,542 UART: [idev] UDS.KEYID = 0
3,524,807 ready_for_fw is high
3,525,003 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,833 UART: [idev] Erasing UDS.KEYID = 0
6,030,279 UART: [idev] Sha1 KeyId Algorithm
6,052,059 UART: [idev] --
6,056,200 UART: [ldev] ++
6,056,887 UART: [ldev] CDI.KEYID = 6
6,057,855 UART: [ldev] SUBJECT.KEYID = 5
6,059,020 UART: [ldev] AUTHORITY.KEYID = 7
6,060,202 UART: [ldev] FE.KEYID = 1
6,101,960 UART: [ldev] Erasing FE.KEYID = 1
8,609,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,570 UART: [ldev] --
10,414,453 UART: [fwproc] Wait for Commands...
10,416,013 UART: [fwproc] Recv command 0x46574c44
10,418,277 UART: [fwproc] Recv'd Img size: 114360 bytes
13,869,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,601,975 >>> mbox cmd response: success
14,606,775 UART: [afmc] ++
14,607,488 UART: [afmc] CDI.KEYID = 6
14,608,683 UART: [afmc] SUBJECT.KEYID = 7
14,610,128 UART: [afmc] AUTHORITY.KEYID = 5
17,149,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,327 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,705 UART: [afmc] --
18,947,873 UART: [cold-reset] --
18,952,394 UART: [state] Locking Datavault
18,957,653 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,804 UART: [state] Locking ICCM
18,962,370 UART: [exit] Launching FMC @ 0x40000130
18,971,043 UART:
18,971,290 UART: Running Caliptra FMC ...
18,972,392 UART:
18,972,549 UART: [state] CFI Enabled
19,029,933 UART: [fht] FMC Alias Private Key: 7
20,793,456 UART: [art] Extend RT PCRs Done
20,794,712 UART: [art] Lock RT PCRs Done
20,796,471 UART: [art] Populate DV Done
20,801,881 UART: [fht] FMC Alias Private Key: 7
20,803,424 UART: [art] Derive CDI
20,804,159 UART: [art] Store in in slot 0x4
20,863,149 UART: [art] Derive Key Pair
20,864,193 UART: [art] Store priv key in slot 0x5
23,326,934 UART: [art] Derive Key Pair - Done
23,339,931 UART: [art] Signing Cert with AUTHO
23,341,238 UART: RITY.KEYID = 7
25,052,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,816 UART: [art] PUB.X = F3EE158E1859F9F8ED2D3C9C91C24D093FAF45A3B68AE705B965928CB714B3C57A49C09549650293C7C50C4EF5CBE0CE
25,061,104 UART: [art] PUB.Y = 69730BDF51536AB298AB28ABB18A4889F63BBC5AA0913E4F1BD68F773A088A838AE0C607CA9A31D0C1F19A773C32F10B
25,068,394 UART: [art] SIG.R = 5C972E93815E16DA5463F40C182BB249A7D3B95DA759EC579A6696454FD93CE4A2F007E35BF9C39B143592D18C12AE80
25,075,809 UART: [art] SIG.S = 4C6DF41310C44121419898CDDF956DFFB60538BF2CA7FAEC6BC2B69577E3A3AF321F8AFF7140CBDBA6A2069BE59E9776
26,054,949 UART: Caliptra RT
26,055,685 UART: [state] CFI Enabled
26,218,277 UART: [rt] RT listening for mailbox commands...
26,220,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,375,640 UART: [rt]cmd =0x41544d4e, len=14344
30,305,773 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,505 writing to cptra_bootfsm_go
3,435,178 ready_for_fw is high
3,435,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,735,249 >>> mbox cmd response: success
19,024,732 UART:
19,025,142 UART: Running Caliptra FMC ...
19,026,285 UART:
19,026,454 UART: [state] CFI Enabled
19,093,265 UART: [fht] FMC Alias Private Key: 7
20,857,966 UART: [art] Extend RT PCRs Done
20,859,184 UART: [art] Lock RT PCRs Done
20,860,925 UART: [art] Populate DV Done
20,866,177 UART: [fht] FMC Alias Private Key: 7
20,867,716 UART: [art] Derive CDI
20,868,533 UART: [art] Store in in slot 0x4
20,926,377 UART: [art] Derive Key Pair
20,927,436 UART: [art] Store priv key in slot 0x5
23,390,171 UART: [art] Derive Key Pair - Done
23,403,225 UART: [art] Signing Cert with AUTHO
23,404,530 UART: RITY.KEYID = 7
25,116,225 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,881 UART: [art] PUB.X = D288D2D188B3C18A2DE9EC7823353D66769C58019985BA63847F9EB27E3D9B1583ECDA8B8EC0EB18452C7697E5493E2A
25,125,011 UART: [art] PUB.Y = 53F3063090C22BB693457A0156F3667102A6FA22FE9DFCC53ED6751C6F3A04E98C89FB66665188538439EA474D7AC6B9
25,132,200 UART: [art] SIG.R = 393DB293648F691D21112DA1EB4088DEF3DF8DA8D6D503340EF1603264524154ADB252FEBBA6DF626DA6AD4864DCD6A9
25,139,613 UART: [art] SIG.S = 52FA55B1F868A18784DB3ECCAE9161B316A9D803F935445F0E429B8895194649A5256FC834B136EBB4E925DB9CBB1CA6
26,118,393 UART: Caliptra RT
26,119,101 UART: [state] CFI Enabled
26,285,528 UART: [rt] RT listening for mailbox commands...
26,287,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,443,033 UART: [rt]cmd =0x41544d4e, len=14344
30,373,085 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,346 UART:
192,704 UART: Running Caliptra ROM ...
193,805 UART:
603,588 UART: [state] CFI Enabled
619,745 UART: [state] LifecycleState = Unprovisioned
622,117 UART: [state] DebugLocked = No
623,433 UART: [state] WD Timer not started. Device not locked for debugging
628,881 UART: [kat] SHA2-256
818,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,557 UART: [kat] ++
830,155 UART: [kat] sha1
840,206 UART: [kat] SHA2-256
843,249 UART: [kat] SHA2-384
849,244 UART: [kat] SHA2-512-ACC
851,832 UART: [kat] ECC-384
3,295,085 UART: [kat] HMAC-384Kdf
3,308,134 UART: [kat] LMS
3,839,984 UART: [kat] --
3,845,478 UART: [cold-reset] ++
3,847,205 UART: [fht] FHT @ 0x50003400
3,859,252 UART: [idev] ++
3,859,955 UART: [idev] CDI.KEYID = 6
3,860,981 UART: [idev] SUBJECT.KEYID = 7
3,862,082 UART: [idev] UDS.KEYID = 0
3,863,009 ready_for_fw is high
3,863,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,841 UART: [idev] Erasing UDS.KEYID = 0
6,338,651 UART: [idev] Sha1 KeyId Algorithm
6,361,010 UART: [idev] --
6,366,538 UART: [ldev] ++
6,367,220 UART: [ldev] CDI.KEYID = 6
6,368,183 UART: [ldev] SUBJECT.KEYID = 5
6,369,361 UART: [ldev] AUTHORITY.KEYID = 7
6,370,536 UART: [ldev] FE.KEYID = 1
6,381,339 UART: [ldev] Erasing FE.KEYID = 1
8,859,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,618 UART: [ldev] --
10,652,037 UART: [fwproc] Wait for Commands...
10,655,043 UART: [fwproc] Recv command 0x46574c44
10,657,349 UART: [fwproc] Recv'd Img size: 114360 bytes
14,101,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,839,424 >>> mbox cmd response: success
14,843,383 UART: [afmc] ++
14,844,115 UART: [afmc] CDI.KEYID = 6
14,845,361 UART: [afmc] SUBJECT.KEYID = 7
14,846,797 UART: [afmc] AUTHORITY.KEYID = 5
17,354,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,973 UART: [afmc] --
19,151,050 UART: [cold-reset] --
19,153,127 UART: [state] Locking Datavault
19,157,722 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,904 UART: [state] Locking ICCM
19,162,210 UART: [exit] Launching FMC @ 0x40000130
19,170,850 UART:
19,171,088 UART: Running Caliptra FMC ...
19,172,189 UART:
19,172,345 UART: [state] CFI Enabled
19,180,709 UART: [fht] FMC Alias Private Key: 7
20,937,529 UART: [art] Extend RT PCRs Done
20,938,745 UART: [art] Lock RT PCRs Done
20,940,637 UART: [art] Populate DV Done
20,946,043 UART: [fht] FMC Alias Private Key: 7
20,947,687 UART: [art] Derive CDI
20,948,499 UART: [art] Store in in slot 0x4
20,990,982 UART: [art] Derive Key Pair
20,991,971 UART: [art] Store priv key in slot 0x5
23,418,984 UART: [art] Derive Key Pair - Done
23,432,028 UART: [art] Signing Cert with AUTHO
23,433,340 UART: RITY.KEYID = 7
25,138,384 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,880 UART: [art] PUB.X = CF2441C4A18DE63B262FCF3C6133B755A4C4098549BF5750FA3FC1DED5F9C78DA1D94FD28A4B8051E401BEB9E94D1C52
25,147,129 UART: [art] PUB.Y = A3446AFD528CC386C88D1FF69DF547B8CDD7234E8BF5845D0FB78D81217F773F9F55DC7AA0ACD69D00858B6949CAF529
25,154,428 UART: [art] SIG.R = B6C920BE601469A108A81ABBF1F1FD9D2EE986DD479C115630C40F34B9CFA562EA5B93783D3F3DEC4C50831638ECB89F
25,161,862 UART: [art] SIG.S = B17F707E620090492D1CAB4C2BF56C33304A76C92BFF95740023714FB6C5142944D711EE8A84DF57263C670E60D1232F
26,140,981 UART: Caliptra RT
26,141,675 UART: [state] CFI Enabled
26,259,322 UART: [rt] RT listening for mailbox commands...
26,261,644 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,417,052 UART: [rt]cmd =0x41544d4e, len=14344
30,347,476 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
3,751,156 ready_for_fw is high
3,751,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,937,001 >>> mbox cmd response: success
19,193,682 UART:
19,194,063 UART: Running Caliptra FMC ...
19,195,252 UART:
19,195,421 UART: [state] CFI Enabled
19,203,503 UART: [fht] FMC Alias Private Key: 7
20,960,163 UART: [art] Extend RT PCRs Done
20,961,379 UART: [art] Lock RT PCRs Done
20,963,003 UART: [art] Populate DV Done
20,968,357 UART: [fht] FMC Alias Private Key: 7
20,969,876 UART: [art] Derive CDI
20,970,639 UART: [art] Store in in slot 0x4
21,013,176 UART: [art] Derive Key Pair
21,014,180 UART: [art] Store priv key in slot 0x5
23,440,794 UART: [art] Derive Key Pair - Done
23,453,842 UART: [art] Signing Cert with AUTHO
23,455,139 UART: RITY.KEYID = 7
25,160,958 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,466 UART: [art] PUB.X = AC45CB7C193C565A92737CA63B1EAE957DA91FF94DBBBBE5979F7D571A13A54A707E6B79522F76A06F4BCBCBAC33EFF3
25,169,731 UART: [art] PUB.Y = B4F79466191BB495C6BE86D3EE288FF1A72252E33456B474A2FCADE7C976146ADFF922D45C9526F45EB12F0A59B473AA
25,177,037 UART: [art] SIG.R = 0CC934F93A3D91E7F0668616393146AC7F2150F33196B31E795F4ECD78750C4E60D6D91CCB07D9FA61355F801AAD27C0
25,184,462 UART: [art] SIG.S = 3A212F7ACD76B82A4CD1E5DC377541AF00E80ACD3D6C03881128C6B107728EB576F34E470A9AF95BB471474E5027A3B2
26,163,825 UART: Caliptra RT
26,164,525 UART: [state] CFI Enabled
26,281,861 UART: [rt] RT listening for mailbox commands...
26,284,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,595 UART: [rt]cmd =0x41544d4e, len=14344
30,370,149 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,529 UART: [kat] SHA2-256
892,467 UART: [kat] SHA2-384
895,124 UART: [kat] SHA2-512-ACC
897,025 UART: [kat] ECC-384
902,614 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,477,091 UART: [fht] Storing FHT @ 0x50003400
1,479,706 UART: [idev] ++
1,479,874 UART: [idev] CDI.KEYID = 6
1,480,234 UART: [idev] SUBJECT.KEYID = 7
1,480,658 UART: [idev] UDS.KEYID = 0
1,481,003 ready_for_fw is high
1,481,003 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,650 UART: [idev] Erasing UDS.KEYID = 0
1,504,870 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,572 UART: [idev] --
1,514,617 UART: [ldev] ++
1,514,785 UART: [ldev] CDI.KEYID = 6
1,515,148 UART: [ldev] SUBJECT.KEYID = 5
1,515,574 UART: [ldev] AUTHORITY.KEYID = 7
1,516,037 UART: [ldev] FE.KEYID = 1
1,521,337 UART: [ldev] Erasing FE.KEYID = 1
1,547,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,852 UART: [ldev] --
1,586,361 UART: [fwproc] Waiting for Commands...
1,587,218 UART: [fwproc] Received command 0x46574c44
1,588,009 UART: [fwproc] Received Image of size 114360 bytes
2,885,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,351 >>> mbox cmd response: success
3,079,423 UART: [afmc] ++
3,079,591 UART: [afmc] CDI.KEYID = 6
3,079,953 UART: [afmc] SUBJECT.KEYID = 7
3,080,378 UART: [afmc] AUTHORITY.KEYID = 5
3,115,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,857 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,250 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,940 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,757 UART: [afmc] --
3,158,825 UART: [cold-reset] --
3,159,879 UART: [state] Locking Datavault
3,161,116 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,720 UART: [state] Locking ICCM
3,162,270 UART: [exit] Launching FMC @ 0x40000130
3,167,599 UART:
3,167,615 UART: Running Caliptra FMC ...
3,168,023 UART:
3,168,077 UART: [state] CFI Enabled
3,178,218 UART: [fht] FMC Alias Private Key: 7
3,285,713 UART: [art] Extend RT PCRs Done
3,286,141 UART: [art] Lock RT PCRs Done
3,287,741 UART: [art] Populate DV Done
3,295,938 UART: [fht] FMC Alias Private Key: 7
3,297,108 UART: [art] Derive CDI
3,297,388 UART: [art] Store in in slot 0x4
3,382,979 UART: [art] Derive Key Pair
3,383,339 UART: [art] Store priv key in slot 0x5
3,396,595 UART: [art] Derive Key Pair - Done
3,411,540 UART: [art] Signing Cert with AUTHO
3,412,020 UART: RITY.KEYID = 7
3,426,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,455 UART: [art] PUB.X = E69239498809987699A354E788F4A6D592769C898345C16DBE00F2CFAEF99AD806D5588408849E1F4B32178290C92580
3,434,180 UART: [art] PUB.Y = 69E80EB8174BA28E670D7FF0F7BB95E8D5F6DE5E77C72DFF34F510D9165275710C183B9B09FAA27A49CB25CEC366CB0D
3,441,131 UART: [art] SIG.R = D4C4A021D4414BF99E754526E83C3875B0F150E5EB744432A015EAF1698B6B2A79DC0FED20ADFFB0A8A7350B1F78A832
3,447,905 UART: [art] SIG.S = 81DAD6E66D960D890D3F364039968C03BD6225DC044906657259A807724D0534922CB2E6BB67C71952E48033E5940A28
3,472,158 UART: Caliptra RT
3,472,412 UART: [state] CFI Enabled
3,580,057 UART: [rt] RT listening for mailbox commands...
3,580,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,274 UART: [rt]cmd =0x41544d4e, len=14344
3,848,156 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,337 ready_for_fw is high
1,363,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,327 >>> mbox cmd response: success
2,989,569 UART:
2,989,585 UART: Running Caliptra FMC ...
2,989,993 UART:
2,990,047 UART: [state] CFI Enabled
3,000,544 UART: [fht] FMC Alias Private Key: 7
3,108,659 UART: [art] Extend RT PCRs Done
3,109,087 UART: [art] Lock RT PCRs Done
3,110,405 UART: [art] Populate DV Done
3,118,418 UART: [fht] FMC Alias Private Key: 7
3,119,524 UART: [art] Derive CDI
3,119,804 UART: [art] Store in in slot 0x4
3,205,285 UART: [art] Derive Key Pair
3,205,645 UART: [art] Store priv key in slot 0x5
3,218,699 UART: [art] Derive Key Pair - Done
3,233,495 UART: [art] Signing Cert with AUTHO
3,233,975 UART: RITY.KEYID = 7
3,249,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,454 UART: [art] PUB.X = 46696F9FACEAD3D9E7D7708E2921FB77B7333ED6DC15A98461D5008CE8D2B73E3E2F280BD85A58FC3722F0CC612BBCBD
3,257,217 UART: [art] PUB.Y = 4962F9D353618A9D6A0FA5C2AC91B30A1DB39C8426D629CC4178DCDEFBF89A26C047FDB3755133680116E0912185C590
3,264,160 UART: [art] SIG.R = 54B02B10BF6A47882A83C719E4618E77AC1CA07B3803A7C709C2FF7E093CC0B2EBE46693898381AE19152E77B174C217
3,270,921 UART: [art] SIG.S = 4DFE12E7339742D182A9E6E61BD6BD5A9676EF06AC4BA3DC0A7D13988400E7B281D0DF47BDB5738135E2AC8999CE07FF
3,294,897 UART: Caliptra RT
3,295,151 UART: [state] CFI Enabled
3,403,572 UART: [rt] RT listening for mailbox commands...
3,404,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,889 UART: [rt]cmd =0x41544d4e, len=14344
3,671,823 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
903,245 UART: [kat] HMAC-384Kdf
907,711 UART: [kat] LMS
1,475,907 UART: [kat] --
1,476,672 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,480,131 UART: [idev] ++
1,480,299 UART: [idev] CDI.KEYID = 6
1,480,659 UART: [idev] SUBJECT.KEYID = 7
1,481,083 UART: [idev] UDS.KEYID = 0
1,481,428 ready_for_fw is high
1,481,428 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,219 UART: [idev] Erasing UDS.KEYID = 0
1,505,469 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,201 UART: [idev] --
1,515,350 UART: [ldev] ++
1,515,518 UART: [ldev] CDI.KEYID = 6
1,515,881 UART: [ldev] SUBJECT.KEYID = 5
1,516,307 UART: [ldev] AUTHORITY.KEYID = 7
1,516,770 UART: [ldev] FE.KEYID = 1
1,521,906 UART: [ldev] Erasing FE.KEYID = 1
1,547,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,045 UART: [ldev] --
1,587,528 UART: [fwproc] Waiting for Commands...
1,588,383 UART: [fwproc] Received command 0x46574c44
1,589,174 UART: [fwproc] Received Image of size 114360 bytes
2,886,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,327 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,608 >>> mbox cmd response: success
3,080,796 UART: [afmc] ++
3,080,964 UART: [afmc] CDI.KEYID = 6
3,081,326 UART: [afmc] SUBJECT.KEYID = 7
3,081,751 UART: [afmc] AUTHORITY.KEYID = 5
3,116,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,211 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,901 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,804 UART: [afmc] --
3,159,734 UART: [cold-reset] --
3,160,518 UART: [state] Locking Datavault
3,161,627 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,231 UART: [state] Locking ICCM
3,162,681 UART: [exit] Launching FMC @ 0x40000130
3,168,010 UART:
3,168,026 UART: Running Caliptra FMC ...
3,168,434 UART:
3,168,577 UART: [state] CFI Enabled
3,178,824 UART: [fht] FMC Alias Private Key: 7
3,287,227 UART: [art] Extend RT PCRs Done
3,287,655 UART: [art] Lock RT PCRs Done
3,288,949 UART: [art] Populate DV Done
3,297,054 UART: [fht] FMC Alias Private Key: 7
3,298,028 UART: [art] Derive CDI
3,298,308 UART: [art] Store in in slot 0x4
3,384,497 UART: [art] Derive Key Pair
3,384,857 UART: [art] Store priv key in slot 0x5
3,398,185 UART: [art] Derive Key Pair - Done
3,413,256 UART: [art] Signing Cert with AUTHO
3,413,736 UART: RITY.KEYID = 7
3,428,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,521 UART: [art] PUB.X = C1CDCBFB9F05DE3AFE53077236022DBB7A011FCC846A0FD89EC5ED1B7AEE926F30CAC5644DECEC8598D1BCA9D38E100E
3,436,305 UART: [art] PUB.Y = 988EBE521FCB48AE0489F7E0BFBEC8F84CDF88358FA7C9F22C0CDB511F6C387098B5F5DC39CE887B4F3D8881AE272CF2
3,443,271 UART: [art] SIG.R = 05204C82B35C165FB5A73EAB9EE682CF1EEFEE6EDDF9F9479FFC59EF7643E472874D43AB6086378979E1F307AE1C36CC
3,450,051 UART: [art] SIG.S = 8C7009832B4E23EED2ED46E7A02C32557374623E6F949803D1655064DBE0CF6B968850181FCA4244A93293C2F0F940AD
3,474,250 UART: Caliptra RT
3,474,596 UART: [state] CFI Enabled
3,582,646 UART: [rt] RT listening for mailbox commands...
3,583,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,931 UART: [rt]cmd =0x41544d4e, len=14344
3,850,173 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,864 ready_for_fw is high
1,362,864 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,014 >>> mbox cmd response: success
2,990,002 UART:
2,990,018 UART: Running Caliptra FMC ...
2,990,426 UART:
2,990,569 UART: [state] CFI Enabled
3,001,266 UART: [fht] FMC Alias Private Key: 7
3,109,169 UART: [art] Extend RT PCRs Done
3,109,597 UART: [art] Lock RT PCRs Done
3,111,293 UART: [art] Populate DV Done
3,119,384 UART: [fht] FMC Alias Private Key: 7
3,120,462 UART: [art] Derive CDI
3,120,742 UART: [art] Store in in slot 0x4
3,206,177 UART: [art] Derive Key Pair
3,206,537 UART: [art] Store priv key in slot 0x5
3,220,069 UART: [art] Derive Key Pair - Done
3,234,832 UART: [art] Signing Cert with AUTHO
3,235,312 UART: RITY.KEYID = 7
3,250,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,167 UART: [art] PUB.X = 75190E06A40F214CA156651F9473536AFFD00EF76690B48D95F37174EF10DD565C5FB284B459B025470DC9D1416F4DF8
3,257,920 UART: [art] PUB.Y = 7163E7D8F330FA05418779202E7A98740C6BBB09477FE17FA8C906195B01A782D693486AF360FD7DFE540303868A3A49
3,264,843 UART: [art] SIG.R = 0A3306FD37482C5CC0B8CDBA2437029270D5D45D03F0CC49CF0263AC961FB6DB813E1423A582966318E2490C5C56DCEE
3,271,601 UART: [art] SIG.S = 4D04AC7E135332DD4013AE55F6A1CC065BDC31331B31ED0A4B2DB1C048E42AA0CA8C2B598E3DA502ECE0659912310D07
3,295,238 UART: Caliptra RT
3,295,584 UART: [state] CFI Enabled
3,404,527 UART: [rt] RT listening for mailbox commands...
3,405,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,880 UART: [rt]cmd =0x41544d4e, len=14344
3,672,714 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
893,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,677 UART: [kat] ++
897,829 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
922,894 UART: [kat] LMS
1,171,222 UART: [kat] --
1,172,265 UART: [cold-reset] ++
1,172,685 UART: [fht] FHT @ 0x50003400
1,175,468 UART: [idev] ++
1,175,636 UART: [idev] CDI.KEYID = 6
1,175,996 UART: [idev] SUBJECT.KEYID = 7
1,176,420 UART: [idev] UDS.KEYID = 0
1,176,765 ready_for_fw is high
1,176,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,826 UART: [idev] Erasing UDS.KEYID = 0
1,201,699 UART: [idev] Sha1 KeyId Algorithm
1,210,243 UART: [idev] --
1,211,403 UART: [ldev] ++
1,211,571 UART: [ldev] CDI.KEYID = 6
1,211,934 UART: [ldev] SUBJECT.KEYID = 5
1,212,360 UART: [ldev] AUTHORITY.KEYID = 7
1,212,823 UART: [ldev] FE.KEYID = 1
1,218,095 UART: [ldev] Erasing FE.KEYID = 1
1,244,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,677 UART: [ldev] --
1,283,994 UART: [fwproc] Wait for Commands...
1,284,584 UART: [fwproc] Recv command 0x46574c44
1,285,312 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,624 >>> mbox cmd response: success
2,775,724 UART: [afmc] ++
2,775,892 UART: [afmc] CDI.KEYID = 6
2,776,254 UART: [afmc] SUBJECT.KEYID = 7
2,776,679 UART: [afmc] AUTHORITY.KEYID = 5
2,812,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,097 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,982 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,701 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,459 UART: [afmc] --
2,855,571 UART: [cold-reset] --
2,856,541 UART: [state] Locking Datavault
2,857,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,222 UART: [state] Locking ICCM
2,858,884 UART: [exit] Launching FMC @ 0x40000130
2,864,213 UART:
2,864,229 UART: Running Caliptra FMC ...
2,864,637 UART:
2,864,691 UART: [state] CFI Enabled
2,875,356 UART: [fht] FMC Alias Private Key: 7
2,982,743 UART: [art] Extend RT PCRs Done
2,983,171 UART: [art] Lock RT PCRs Done
2,984,595 UART: [art] Populate DV Done
2,993,232 UART: [fht] FMC Alias Private Key: 7
2,994,176 UART: [art] Derive CDI
2,994,456 UART: [art] Store in in slot 0x4
3,080,147 UART: [art] Derive Key Pair
3,080,507 UART: [art] Store priv key in slot 0x5
3,093,557 UART: [art] Derive Key Pair - Done
3,108,393 UART: [art] Signing Cert with AUTHO
3,108,873 UART: RITY.KEYID = 7
3,124,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,814 UART: [art] PUB.X = FEF4789F7D9A3A1E8D01270E38B4E64F47AE667C2474DFEA7E1A49D6DF162097D9DB8612B076511DFA21020E5A3FCB10
3,131,584 UART: [art] PUB.Y = A5FB30DAA4A70DC45B137DE3F5A7E86CF9F3D1E8040A03C1E7E7F1B17FC6696EDB4AF9D63EAAE58FFD731EBDD07CF403
3,138,551 UART: [art] SIG.R = 93FA0E2817C463E1A81BEE61575EDF52A0F830384DC4A0F195152ED06ADEA8DF23B390E1855DA8A649150C1BBF091F61
3,145,322 UART: [art] SIG.S = 9E1D220C71C8B77114A88525E728DC61CF81BA7A8E8C71F46CF4C37CDE13D79CE8C0745B2610695FBEAA2B065E574D89
3,169,463 UART: Caliptra RT
3,169,717 UART: [state] CFI Enabled
3,277,754 UART: [rt] RT listening for mailbox commands...
3,278,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,285 UART: [rt]cmd =0x41544d4e, len=14344
3,545,901 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,909 ready_for_fw is high
1,059,909 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,821 >>> mbox cmd response: success
2,688,173 UART:
2,688,189 UART: Running Caliptra FMC ...
2,688,597 UART:
2,688,651 UART: [state] CFI Enabled
2,699,028 UART: [fht] FMC Alias Private Key: 7
2,806,713 UART: [art] Extend RT PCRs Done
2,807,141 UART: [art] Lock RT PCRs Done
2,808,567 UART: [art] Populate DV Done
2,816,820 UART: [fht] FMC Alias Private Key: 7
2,817,762 UART: [art] Derive CDI
2,818,042 UART: [art] Store in in slot 0x4
2,903,431 UART: [art] Derive Key Pair
2,903,791 UART: [art] Store priv key in slot 0x5
2,916,727 UART: [art] Derive Key Pair - Done
2,931,538 UART: [art] Signing Cert with AUTHO
2,932,018 UART: RITY.KEYID = 7
2,947,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,949 UART: [art] PUB.X = A20BA50E8EEACD14C794D92ECCCC5E20C75D0D7BF857A160AC0D3E24B8FEADAA36A687E4B4BEADBCDB6E87BABFF8D41D
2,954,751 UART: [art] PUB.Y = 0B98F9EC1351D5C0201F1FFF338CE6D979CAD4E4FEF431A6896DEC9A52AB72785B482B81649AB6820FBDEC44D3F9080F
2,961,705 UART: [art] SIG.R = 41E3F8D30573A28638F16B21FFE004024F401352ECCBF595070143155445C72CEADEF32EC716A9EBFC78B193B2F7390D
2,968,461 UART: [art] SIG.S = 7CB607666DCE4E4D6DF9601004FC9415CDBEEA77FCE0517EDFBA72DA236FC9F0779F0ABEAEB3A175B3EBEB176064BFBD
2,992,649 UART: Caliptra RT
2,992,903 UART: [state] CFI Enabled
3,101,449 UART: [rt] RT listening for mailbox commands...
3,102,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,822 UART: [rt]cmd =0x41544d4e, len=14344
3,369,698 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,561 UART: [kat] SHA2-512-ACC
908,462 UART: [kat] ECC-384
918,181 UART: [kat] HMAC-384Kdf
922,807 UART: [kat] LMS
1,171,135 UART: [kat] --
1,172,134 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,425 UART: [idev] ++
1,175,593 UART: [idev] CDI.KEYID = 6
1,175,953 UART: [idev] SUBJECT.KEYID = 7
1,176,377 UART: [idev] UDS.KEYID = 0
1,176,722 ready_for_fw is high
1,176,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,541 UART: [idev] Erasing UDS.KEYID = 0
1,202,006 UART: [idev] Sha1 KeyId Algorithm
1,210,474 UART: [idev] --
1,211,662 UART: [ldev] ++
1,211,830 UART: [ldev] CDI.KEYID = 6
1,212,193 UART: [ldev] SUBJECT.KEYID = 5
1,212,619 UART: [ldev] AUTHORITY.KEYID = 7
1,213,082 UART: [ldev] FE.KEYID = 1
1,218,138 UART: [ldev] Erasing FE.KEYID = 1
1,244,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,823 UART: [fwproc] Wait for Commands...
1,284,551 UART: [fwproc] Recv command 0x46574c44
1,285,279 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,705 >>> mbox cmd response: success
2,776,783 UART: [afmc] ++
2,776,951 UART: [afmc] CDI.KEYID = 6
2,777,313 UART: [afmc] SUBJECT.KEYID = 7
2,777,738 UART: [afmc] AUTHORITY.KEYID = 5
2,813,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,546 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,431 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,150 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,936 UART: [afmc] --
2,856,932 UART: [cold-reset] --
2,858,034 UART: [state] Locking Datavault
2,859,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,713 UART: [state] Locking ICCM
2,860,339 UART: [exit] Launching FMC @ 0x40000130
2,865,668 UART:
2,865,684 UART: Running Caliptra FMC ...
2,866,092 UART:
2,866,235 UART: [state] CFI Enabled
2,876,480 UART: [fht] FMC Alias Private Key: 7
2,984,527 UART: [art] Extend RT PCRs Done
2,984,955 UART: [art] Lock RT PCRs Done
2,986,283 UART: [art] Populate DV Done
2,994,486 UART: [fht] FMC Alias Private Key: 7
2,995,622 UART: [art] Derive CDI
2,995,902 UART: [art] Store in in slot 0x4
3,081,551 UART: [art] Derive Key Pair
3,081,911 UART: [art] Store priv key in slot 0x5
3,095,407 UART: [art] Derive Key Pair - Done
3,110,220 UART: [art] Signing Cert with AUTHO
3,110,700 UART: RITY.KEYID = 7
3,125,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,471 UART: [art] PUB.X = A295B876CECE62BC0B1BC03846209299092297962CE0E59EE4E5B933A3EBDDC9A9745B32C30B5FA9D54B9AF28774A1EF
3,133,244 UART: [art] PUB.Y = 6112B7ACF4705E91323C998640D8CE10D1A3AE47CBC74B057E6B3E3358B07B585BD971A73D8684BCD1FA97867966CD76
3,140,195 UART: [art] SIG.R = 9DC73DE764A9BA13867949728E18516BA065E91B544064CFA44BCB521128FE8CFEB0E5D575E9709893EAF207C39F01D6
3,146,963 UART: [art] SIG.S = B0216FE5291460E2C42FFF043452977E270B745479F17ADB1F6A6DFF29CDB8D22D878CCABD77CCFBFB2757A7A765A07C
3,171,280 UART: Caliptra RT
3,171,626 UART: [state] CFI Enabled
3,279,905 UART: [rt] RT listening for mailbox commands...
3,280,575 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,238 UART: [rt]cmd =0x41544d4e, len=14344
3,548,020 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,614 ready_for_fw is high
1,060,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,076 >>> mbox cmd response: success
2,689,548 UART:
2,689,564 UART: Running Caliptra FMC ...
2,689,972 UART:
2,690,115 UART: [state] CFI Enabled
2,700,446 UART: [fht] FMC Alias Private Key: 7
2,808,229 UART: [art] Extend RT PCRs Done
2,808,657 UART: [art] Lock RT PCRs Done
2,810,243 UART: [art] Populate DV Done
2,818,492 UART: [fht] FMC Alias Private Key: 7
2,819,430 UART: [art] Derive CDI
2,819,710 UART: [art] Store in in slot 0x4
2,905,515 UART: [art] Derive Key Pair
2,905,875 UART: [art] Store priv key in slot 0x5
2,919,713 UART: [art] Derive Key Pair - Done
2,934,473 UART: [art] Signing Cert with AUTHO
2,934,953 UART: RITY.KEYID = 7
2,950,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,098 UART: [art] PUB.X = 1239256357B792BDDA9C9195EC43C6B0C1E57CC404703EC9BC3EED2762A2590BE84BF48D1BCDB9E11561308215E0FA85
2,957,870 UART: [art] PUB.Y = E0896408B84C6B79750EBE04B74525BE42FCBC2F54659172DF5D7F6530A7659998E7754289C3E5D9A1FEF25F26AD5223
2,964,811 UART: [art] SIG.R = 782430D9091AD8B71EADA50BDE1350648F17A0A4361E24F94F9AE0A8B11C368C66D3999B5CE2B799AD5764E01ADC33FA
2,971,585 UART: [art] SIG.S = E0E39704CFF4A99BE0DEE4E9BB0E77573C3DAA0E82651F6B47796AC98B9FECAF07A2DB7CAF166038A69C0A9694B00467
2,995,664 UART: Caliptra RT
2,996,010 UART: [state] CFI Enabled
3,104,104 UART: [rt] RT listening for mailbox commands...
3,104,774 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,809 UART: [rt]cmd =0x41544d4e, len=14344
3,372,989 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,174,079 ready_for_fw is high
1,174,079 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,311 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,262 UART: [ldev] Erasing FE.KEYID = 1
1,242,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,488 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,579 UART: [fwproc] Recv command 0x46574c44
1,283,312 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,024 >>> mbox cmd response: success
2,773,229 UART: [afmc] ++
2,773,397 UART: [afmc] CDI.KEYID = 6
2,773,760 UART: [afmc] SUBJECT.KEYID = 7
2,774,186 UART: [afmc] AUTHORITY.KEYID = 5
2,809,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,918 UART: [afmc] --
2,852,902 UART: [cold-reset] --
2,853,676 UART: [state] Locking Datavault
2,854,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,441 UART: [state] Locking ICCM
2,856,003 UART: [exit] Launching FMC @ 0x40000130
2,861,332 UART:
2,861,348 UART: Running Caliptra FMC ...
2,861,756 UART:
2,861,810 UART: [state] CFI Enabled
2,872,305 UART: [fht] FMC Alias Private Key: 7
2,980,746 UART: [art] Extend RT PCRs Done
2,981,174 UART: [art] Lock RT PCRs Done
2,982,878 UART: [art] Populate DV Done
2,991,345 UART: [fht] FMC Alias Private Key: 7
2,992,427 UART: [art] Derive CDI
2,992,707 UART: [art] Store in in slot 0x4
3,078,368 UART: [art] Derive Key Pair
3,078,728 UART: [art] Store priv key in slot 0x5
3,091,834 UART: [art] Derive Key Pair - Done
3,106,690 UART: [art] Signing Cert with AUTHO
3,107,170 UART: RITY.KEYID = 7
3,122,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,517 UART: [art] PUB.X = 4AA27187A35CBEE01E8FFFCCED8F002790E492FBE82AAA981D0DC347D6927DEE4EBA19E8BA5E7B52F19C734DB12D4EC9
3,130,290 UART: [art] PUB.Y = C0B8CC7EED79CD3CFB9D419FFAE0485AFC434B8E2A824BD8363BD0FE82A523D8566BC87938AD95AC83BDCD70E107B64E
3,137,263 UART: [art] SIG.R = C538616D82C99DA6C71E511E228F5D50D6F47749551956701E60DAF6AFDB807F75BF05EC02D78341706B6F3AF53915B1
3,144,027 UART: [art] SIG.S = EADCBAEF4B2BCD550D71E89F780EB4E14EB5F573B70338ED8906C188BF20E5F675234035524BC98F3344C82D74771D23
3,167,898 UART: Caliptra RT
3,168,152 UART: [state] CFI Enabled
3,276,109 UART: [rt] RT listening for mailbox commands...
3,276,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,312 UART: [rt]cmd =0x41544d4e, len=14344
3,543,684 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,760 ready_for_fw is high
1,056,760 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,178 >>> mbox cmd response: success
2,684,020 UART:
2,684,036 UART: Running Caliptra FMC ...
2,684,444 UART:
2,684,498 UART: [state] CFI Enabled
2,695,025 UART: [fht] FMC Alias Private Key: 7
2,802,658 UART: [art] Extend RT PCRs Done
2,803,086 UART: [art] Lock RT PCRs Done
2,804,698 UART: [art] Populate DV Done
2,812,851 UART: [fht] FMC Alias Private Key: 7
2,813,905 UART: [art] Derive CDI
2,814,185 UART: [art] Store in in slot 0x4
2,900,084 UART: [art] Derive Key Pair
2,900,444 UART: [art] Store priv key in slot 0x5
2,913,594 UART: [art] Derive Key Pair - Done
2,928,216 UART: [art] Signing Cert with AUTHO
2,928,696 UART: RITY.KEYID = 7
2,943,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,715 UART: [art] PUB.X = A6D163BF85C332D8547C7A5BB4EE6CE139323E03A3BDCF6CE33F70B230E8E5B245981D58FCE144412397B41E74861A9A
2,951,490 UART: [art] PUB.Y = 073292A77930DA8DC6035020F8986709D3C6F65B9C81F155828F5BDFFC34AE8001CB208731754701BDDC8F8437059FD3
2,958,418 UART: [art] SIG.R = 2DF178E24FBEA65527B852A7E44770AF7533F954454AC5CCFBB31A3D1044AE658465B5053210A015557954BC8B19DEC9
2,965,187 UART: [art] SIG.S = A891D624B5D4758B42D5F725BF8C961E466AE5E798255DB65E6938E7C772F47F98DC01CF5F453A179F7F7A002BCD9D2E
2,988,905 UART: Caliptra RT
2,989,159 UART: [state] CFI Enabled
3,096,469 UART: [rt] RT listening for mailbox commands...
3,097,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,770 UART: [rt]cmd =0x41544d4e, len=14344
3,364,636 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 ready_for_fw is high
1,174,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,243,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,611 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x46574c44
1,284,127 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,707 >>> mbox cmd response: success
2,775,854 UART: [afmc] ++
2,776,022 UART: [afmc] CDI.KEYID = 6
2,776,385 UART: [afmc] SUBJECT.KEYID = 7
2,776,811 UART: [afmc] AUTHORITY.KEYID = 5
2,812,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,603 UART: [afmc] --
2,855,609 UART: [cold-reset] --
2,856,403 UART: [state] Locking Datavault
2,857,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,356 UART: [state] Locking ICCM
2,858,984 UART: [exit] Launching FMC @ 0x40000130
2,864,313 UART:
2,864,329 UART: Running Caliptra FMC ...
2,864,737 UART:
2,864,880 UART: [state] CFI Enabled
2,875,611 UART: [fht] FMC Alias Private Key: 7
2,983,544 UART: [art] Extend RT PCRs Done
2,983,972 UART: [art] Lock RT PCRs Done
2,985,232 UART: [art] Populate DV Done
2,993,431 UART: [fht] FMC Alias Private Key: 7
2,994,579 UART: [art] Derive CDI
2,994,859 UART: [art] Store in in slot 0x4
3,080,270 UART: [art] Derive Key Pair
3,080,630 UART: [art] Store priv key in slot 0x5
3,094,394 UART: [art] Derive Key Pair - Done
3,109,158 UART: [art] Signing Cert with AUTHO
3,109,638 UART: RITY.KEYID = 7
3,125,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,207 UART: [art] PUB.X = DCF7702F339591EF0B1A19A47E25D4472654BC4FDDB1FDBB0E8FF9A11B8D3F6F2FB7775604B0247C5C0283B8B6EF274B
3,132,981 UART: [art] PUB.Y = C995241125675D91814E69279E0C18F90AB1A55BB40609535B20E0B5EF7E7E88E6D6690A7D5CAA373206EE4F8398CB6C
3,139,913 UART: [art] SIG.R = B73C3F3B31F2702CB781D999332DCEC0515701CC5015BC63A99CCCD8602E6232E7CC63F77AD19D3BD03DE9F091908FAE
3,146,692 UART: [art] SIG.S = 8336D38789EE08A3ABD7D5B1E60AB9EBD2C7CB6E2946E4F018A68A8FA6140C1A2F612F7A979E9A3F4F8DCD86B1E1F7A2
3,170,818 UART: Caliptra RT
3,171,164 UART: [state] CFI Enabled
3,279,827 UART: [rt] RT listening for mailbox commands...
3,280,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,248 UART: [rt]cmd =0x41544d4e, len=14344
3,548,506 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,353 >>> mbox cmd response: success
2,686,839 UART:
2,686,855 UART: Running Caliptra FMC ...
2,687,263 UART:
2,687,406 UART: [state] CFI Enabled
2,698,455 UART: [fht] FMC Alias Private Key: 7
2,806,678 UART: [art] Extend RT PCRs Done
2,807,106 UART: [art] Lock RT PCRs Done
2,808,638 UART: [art] Populate DV Done
2,816,797 UART: [fht] FMC Alias Private Key: 7
2,817,735 UART: [art] Derive CDI
2,818,015 UART: [art] Store in in slot 0x4
2,903,712 UART: [art] Derive Key Pair
2,904,072 UART: [art] Store priv key in slot 0x5
2,917,194 UART: [art] Derive Key Pair - Done
2,932,349 UART: [art] Signing Cert with AUTHO
2,932,829 UART: RITY.KEYID = 7
2,947,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,738 UART: [art] PUB.X = DF28D9B3CB981E77EF8014F2B216C1F81C9F147C631479DEE7B12CABF5F0D8ED8579E460434DFB44133088343C2C708E
2,955,516 UART: [art] PUB.Y = 8A90243DDF33E3A6DA55FBB9EA854DD478BA99027A52C7CB318C7CB36AC12F23E2A3245AF44205F4B0E1F3F9DC4920BE
2,962,478 UART: [art] SIG.R = A0BC1E2CB8D66F6D84A77CFE4B6F742ADFDD9AFF1635F7ACD962BB79B88E78D3DEEA713C5C9BF07B82E6A2859B82E53A
2,969,278 UART: [art] SIG.S = 381DFDEA9C473734429D0699087148F09D6025E764670FD879973F8C016B1745DA6D6CBEDCB5EA858229F047C2A8438F
2,993,347 UART: Caliptra RT
2,993,693 UART: [state] CFI Enabled
3,101,411 UART: [rt] RT listening for mailbox commands...
3,102,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,670 UART: [rt]cmd =0x41544d4e, len=14344
3,369,028 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
192,559 UART:
192,932 UART: Running Caliptra ROM ...
194,065 UART:
194,212 UART: [state] CFI Enabled
266,814 UART: [state] LifecycleState = Unprovisioned
268,756 UART: [state] DebugLocked = No
270,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,448 UART: [kat] SHA2-256
445,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,654 UART: [kat] ++
456,185 UART: [kat] sha1
467,132 UART: [kat] SHA2-256
469,836 UART: [kat] SHA2-384
474,840 UART: [kat] SHA2-512-ACC
477,204 UART: [kat] ECC-384
2,767,816 UART: [kat] HMAC-384Kdf
2,800,291 UART: [kat] LMS
3,990,655 UART: [kat] --
3,995,320 UART: [cold-reset] ++
3,996,611 UART: [fht] Storing FHT @ 0x50003400
4,006,750 UART: [idev] ++
4,007,356 UART: [idev] CDI.KEYID = 6
4,008,266 UART: [idev] SUBJECT.KEYID = 7
4,009,509 UART: [idev] UDS.KEYID = 0
4,010,589 ready_for_fw is high
4,010,795 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,100 UART: [idev] Erasing UDS.KEYID = 0
7,346,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,064 UART: [idev] --
7,372,583 UART: [ldev] ++
7,373,158 UART: [ldev] CDI.KEYID = 6
7,374,113 UART: [ldev] SUBJECT.KEYID = 5
7,375,319 UART: [ldev] AUTHORITY.KEYID = 7
7,376,599 UART: [ldev] FE.KEYID = 1
7,424,067 UART: [ldev] Erasing FE.KEYID = 1
10,753,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,685 UART: [ldev] --
13,116,917 UART: [fwproc] Waiting for Commands...
13,120,083 UART: [fwproc] Received command 0x46574c44
13,122,270 UART: [fwproc] Received Image of size 114036 bytes
22,157,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,231,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,299,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,617,383 >>> mbox cmd response: success
22,621,859 UART: [afmc] ++
22,622,510 UART: [afmc] CDI.KEYID = 6
22,623,419 UART: [afmc] SUBJECT.KEYID = 7
22,624,629 UART: [afmc] AUTHORITY.KEYID = 5
25,998,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,298,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,300,459 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,315,025 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,329,764 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,343,970 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,365,621 UART: [afmc] --
28,369,099 UART: [cold-reset] --
28,372,855 UART: [state] Locking Datavault
28,379,089 UART: [state] Locking PCR0, PCR1 and PCR31
28,380,845 UART: [state] Locking ICCM
28,382,716 UART: [exit] Launching FMC @ 0x40000130
28,391,105 UART:
28,391,338 UART: Running Caliptra FMC ...
28,392,433 UART:
28,392,586 UART: [state] CFI Enabled
28,456,239 UART: [fht] FMC Alias Private Key: 7
30,794,388 UART: [art] Extend RT PCRs Done
30,795,607 UART: [art] Lock RT PCRs Done
30,797,118 UART: [art] Populate DV Done
30,802,530 UART: [fht] FMC Alias Private Key: 7
30,804,014 UART: [art] Derive CDI
30,805,075 UART: [art] Store in in slot 0x4
30,864,037 UART: [art] Derive Key Pair
30,865,042 UART: [art] Store priv key in slot 0x5
34,157,166 UART: [art] Derive Key Pair - Done
34,170,220 UART: [art] Signing Cert with AUTHO
34,171,547 UART: RITY.KEYID = 7
36,458,268 UART: [art] Erasing AUTHORITY.KEYID = 7
36,459,773 UART: [art] PUB.X = D8BD7AC8FDA5835C382CFE56A9062361A257B1626E32BEF2D211641AAD06C63D2EB0C166B6777D7CDA3FC2EF714B9FB9
36,467,046 UART: [art] PUB.Y = 71F5BD241A89C85B98AF436E09F98FC6FA29051845C7C0864A6B49BA49EF5900D56454F6859A02EB85EB82E989B068C1
36,474,261 UART: [art] SIG.R = 780E2FD78CCBF10FE09A19F3366DC82FA127D5854E44077C007F17158E469CA646874CC4BB95A9B7510CAD3747629F82
36,481,618 UART: [art] SIG.S = 57E820E1ACC3879E3964A9AA66E2A0B1AB5516AB3E88EDFBA3A0348839ACC7B82BD9B215D036408DBF6383EE72C03481
37,786,776 UART: Caliptra RT
37,787,462 UART: [state] CFI Enabled
37,947,855 UART: [rt] RT listening for mailbox commands...
37,950,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,105,605 UART: [rt]cmd =0x41544d4e, len=14344
42,349,913 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
3,783,744 ready_for_fw is high
3,784,248 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,902,811 >>> mbox cmd response: success
27,601,550 UART:
27,601,954 UART: Running Caliptra FMC ...
27,603,140 UART:
27,603,304 UART: [state] CFI Enabled
27,667,713 UART: [fht] FMC Alias Private Key: 7
30,005,522 UART: [art] Extend RT PCRs Done
30,006,754 UART: [art] Lock RT PCRs Done
30,008,348 UART: [art] Populate DV Done
30,014,089 UART: [fht] FMC Alias Private Key: 7
30,015,743 UART: [art] Derive CDI
30,016,554 UART: [art] Store in in slot 0x4
30,077,876 UART: [art] Derive Key Pair
30,078,920 UART: [art] Store priv key in slot 0x5
33,371,267 UART: [art] Derive Key Pair - Done
33,384,599 UART: [art] Signing Cert with AUTHO
33,385,904 UART: RITY.KEYID = 7
35,672,873 UART: [art] Erasing AUTHORITY.KEYID = 7
35,674,397 UART: [art] PUB.X = 82FBB23D033F124708ED24506B055F37D5AB3D962B770872B6EF12252E0C112EFFFCD663C678034F949ACD5D521DF1B0
35,681,633 UART: [art] PUB.Y = 703093B9AE93872C552002182F669315573E97F7797D87B7D152F29305DF5D82F4935F54C3A2A181C0477A5E6AF9F11F
35,688,814 UART: [art] SIG.R = 2A085EB50EE963CA4F01B733AA8F172327CE8B720726D3424AF1794E631772FAB388EBAC7E921987989A07463394BA0B
35,696,178 UART: [art] SIG.S = F24839B3342BBD1E6358F5046C9C7311D6AA81F77DE0EAB8415AEF8DFF018FA4041D985E2B0443BC83E07FFD6915595B
37,001,512 UART: Caliptra RT
37,002,231 UART: [state] CFI Enabled
37,163,254 UART: [rt] RT listening for mailbox commands...
37,165,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,320,713 UART: [rt]cmd =0x41544d4e, len=14344
41,487,353 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,519 UART:
192,872 UART: Running Caliptra ROM ...
194,048 UART:
603,494 UART: [state] CFI Enabled
614,888 UART: [state] LifecycleState = Unprovisioned
616,827 UART: [state] DebugLocked = No
619,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,445 UART: [kat] SHA2-256
793,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,722 UART: [kat] ++
804,169 UART: [kat] sha1
813,692 UART: [kat] SHA2-256
816,413 UART: [kat] SHA2-384
822,399 UART: [kat] SHA2-512-ACC
824,763 UART: [kat] ECC-384
3,107,964 UART: [kat] HMAC-384Kdf
3,118,773 UART: [kat] LMS
4,308,871 UART: [kat] --
4,315,083 UART: [cold-reset] ++
4,317,169 UART: [fht] Storing FHT @ 0x50003400
4,329,069 UART: [idev] ++
4,329,635 UART: [idev] CDI.KEYID = 6
4,330,684 UART: [idev] SUBJECT.KEYID = 7
4,331,859 UART: [idev] UDS.KEYID = 0
4,332,920 ready_for_fw is high
4,333,126 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,476,343 UART: [idev] Erasing UDS.KEYID = 0
7,616,294 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,003 UART: [idev] --
7,643,407 UART: [ldev] ++
7,643,984 UART: [ldev] CDI.KEYID = 6
7,644,945 UART: [ldev] SUBJECT.KEYID = 5
7,646,155 UART: [ldev] AUTHORITY.KEYID = 7
7,647,389 UART: [ldev] FE.KEYID = 1
7,659,704 UART: [ldev] Erasing FE.KEYID = 1
10,950,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,589 UART: [ldev] --
13,311,717 UART: [fwproc] Waiting for Commands...
13,313,796 UART: [fwproc] Received command 0x46574c44
13,316,035 UART: [fwproc] Received Image of size 114036 bytes
22,429,189 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,509,516 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,578,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,894,554 >>> mbox cmd response: success
22,899,126 UART: [afmc] ++
22,899,719 UART: [afmc] CDI.KEYID = 6
22,900,628 UART: [afmc] SUBJECT.KEYID = 7
22,901,900 UART: [afmc] AUTHORITY.KEYID = 5
26,217,098 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,508,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,510,410 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,524,968 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,539,720 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,553,927 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,576,989 UART: [afmc] --
28,580,046 UART: [cold-reset] --
28,585,530 UART: [state] Locking Datavault
28,590,403 UART: [state] Locking PCR0, PCR1 and PCR31
28,592,141 UART: [state] Locking ICCM
28,594,026 UART: [exit] Launching FMC @ 0x40000130
28,602,429 UART:
28,602,671 UART: Running Caliptra FMC ...
28,603,772 UART:
28,603,931 UART: [state] CFI Enabled
28,612,249 UART: [fht] FMC Alias Private Key: 7
30,942,636 UART: [art] Extend RT PCRs Done
30,943,875 UART: [art] Lock RT PCRs Done
30,945,126 UART: [art] Populate DV Done
30,950,535 UART: [fht] FMC Alias Private Key: 7
30,952,233 UART: [art] Derive CDI
30,953,048 UART: [art] Store in in slot 0x4
30,995,919 UART: [art] Derive Key Pair
30,996,956 UART: [art] Store priv key in slot 0x5
34,239,004 UART: [art] Derive Key Pair - Done
34,251,951 UART: [art] Signing Cert with AUTHO
34,253,249 UART: RITY.KEYID = 7
36,532,197 UART: [art] Erasing AUTHORITY.KEYID = 7
36,533,712 UART: [art] PUB.X = 67EE60685A13B1DDDC437338CCBE89EDDDC20BFDFF49FFE68E78D8220CA7FF1910CDBDF52E65C70288470677ECD334E8
36,540,924 UART: [art] PUB.Y = 8ECCBFBFC0375895FDA1272E21C1ACAEA6E3FE6C89E0F932EFBD9908B1DDFCE1515F3106EEE7F72DBD12299D77D3D927
36,548,225 UART: [art] SIG.R = 1FDD4BDABCE9ED6FB37D581CCBB0482A6088490063A22F81B29732BA51CDE4DD03963D77547EE92459DED8CC0BF7E0A2
36,555,577 UART: [art] SIG.S = E1027F960DA37B7DAD0CC118BE56D04F26519B8B39419B726C4ED92BA99517E81F91D9B45EEEE8E90C8810FDA2B681C5
37,861,273 UART: Caliptra RT
37,862,003 UART: [state] CFI Enabled
37,979,251 UART: [rt] RT listening for mailbox commands...
37,981,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,136,890 UART: [rt]cmd =0x41544d4e, len=14344
42,277,533 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,128,442 ready_for_fw is high
4,128,826 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,379,500 >>> mbox cmd response: success
28,020,678 UART:
28,021,064 UART: Running Caliptra FMC ...
28,022,215 UART:
28,022,381 UART: [state] CFI Enabled
28,030,119 UART: [fht] FMC Alias Private Key: 7
30,361,513 UART: [art] Extend RT PCRs Done
30,362,746 UART: [art] Lock RT PCRs Done
30,364,321 UART: [art] Populate DV Done
30,369,842 UART: [fht] FMC Alias Private Key: 7
30,371,547 UART: [art] Derive CDI
30,372,365 UART: [art] Store in in slot 0x4
30,414,553 UART: [art] Derive Key Pair
30,415,599 UART: [art] Store priv key in slot 0x5
33,657,918 UART: [art] Derive Key Pair - Done
33,671,040 UART: [art] Signing Cert with AUTHO
33,672,380 UART: RITY.KEYID = 7
35,951,811 UART: [art] Erasing AUTHORITY.KEYID = 7
35,953,315 UART: [art] PUB.X = 26D4DE69D0A301427632492F4EE8495D567BCAF9E8F2358EC8497936FB5B94CAFC87399D5B0C3EEE1AE70F75DB4AF41B
35,960,596 UART: [art] PUB.Y = 13DF83C44C357499231F60CA87E5063814212977135AC9955D45C666C42D15955FEC1847298AD9C6BAEFD2ED91C5B690
35,967,831 UART: [art] SIG.R = DA38B8BE2776AF1AF821099BCABCB29AA8E0E6EAF08472B66B0BB54C72396F0C4D823D93A1F71B1D37C1DBD03A8BA0BB
35,975,258 UART: [art] SIG.S = C2520F7EB0DB2EB57F7C6E11CA81E86E94BECEFC45A2EEEFBB8AA52CFEFD044875D7EB21F74C0B32997C341357CC421D
37,279,721 UART: Caliptra RT
37,280,451 UART: [state] CFI Enabled
37,397,945 UART: [rt] RT listening for mailbox commands...
37,400,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,555,710 UART: [rt]cmd =0x41544d4e, len=14344
41,825,876 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
192,520 UART:
192,883 UART: Running Caliptra ROM ...
194,038 UART:
194,190 UART: [state] CFI Enabled
264,121 UART: [state] LifecycleState = Unprovisioned
266,309 UART: [state] DebugLocked = No
268,141 UART: [state] WD Timer not started. Device not locked for debugging
271,551 UART: [kat] SHA2-256
450,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,258 UART: [kat] ++
462,791 UART: [kat] sha1
474,239 UART: [kat] SHA2-256
477,255 UART: [kat] SHA2-384
483,888 UART: [kat] SHA2-512-ACC
486,826 UART: [kat] ECC-384
2,949,742 UART: [kat] HMAC-384Kdf
2,971,525 UART: [kat] LMS
3,501,009 UART: [kat] --
3,504,562 UART: [cold-reset] ++
3,505,436 UART: [fht] FHT @ 0x50003400
3,515,348 UART: [idev] ++
3,515,928 UART: [idev] CDI.KEYID = 6
3,516,812 UART: [idev] SUBJECT.KEYID = 7
3,518,058 UART: [idev] UDS.KEYID = 0
3,518,960 ready_for_fw is high
3,519,179 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,080 UART: [idev] Erasing UDS.KEYID = 0
6,028,921 UART: [idev] Sha1 KeyId Algorithm
6,052,915 UART: [idev] --
6,057,884 UART: [ldev] ++
6,058,462 UART: [ldev] CDI.KEYID = 6
6,059,392 UART: [ldev] SUBJECT.KEYID = 5
6,060,554 UART: [ldev] AUTHORITY.KEYID = 7
6,061,845 UART: [ldev] FE.KEYID = 1
6,099,935 UART: [ldev] Erasing FE.KEYID = 1
8,604,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,481 UART: [ldev] --
10,413,484 UART: [fwproc] Wait for Commands...
10,415,579 UART: [fwproc] Recv command 0x46574c44
10,417,678 UART: [fwproc] Recv'd Img size: 114360 bytes
14,984,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,062,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,130,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,448,554 >>> mbox cmd response: success
15,452,141 UART: [afmc] ++
15,452,738 UART: [afmc] CDI.KEYID = 6
15,453,808 UART: [afmc] SUBJECT.KEYID = 7
15,454,913 UART: [afmc] AUTHORITY.KEYID = 5
17,998,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,723,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,724,890 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,740,867 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,756,848 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,772,615 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,796,127 UART: [afmc] --
19,800,111 UART: [cold-reset] --
19,803,431 UART: [state] Locking Datavault
19,809,702 UART: [state] Locking PCR0, PCR1 and PCR31
19,811,348 UART: [state] Locking ICCM
19,813,444 UART: [exit] Launching FMC @ 0x40000130
19,821,892 UART:
19,822,131 UART: Running Caliptra FMC ...
19,823,231 UART:
19,823,389 UART: [state] CFI Enabled
19,881,753 UART: [fht] FMC Alias Private Key: 7
21,646,140 UART: [art] Extend RT PCRs Done
21,647,397 UART: [art] Lock RT PCRs Done
21,648,971 UART: [art] Populate DV Done
21,654,227 UART: [fht] FMC Alias Private Key: 7
21,655,930 UART: [art] Derive CDI
21,656,749 UART: [art] Store in in slot 0x4
21,714,173 UART: [art] Derive Key Pair
21,715,216 UART: [art] Store priv key in slot 0x5
24,178,310 UART: [art] Derive Key Pair - Done
24,191,460 UART: [art] Signing Cert with AUTHO
24,192,798 UART: RITY.KEYID = 7
25,903,357 UART: [art] Erasing AUTHORITY.KEYID = 7
25,904,867 UART: [art] PUB.X = 0D63539024A6BAE9B8D9BF4A1DA2B5F2852D2844C05ABAD4CB0C4E47E8A77BA2E55156BD46E64F4A3DDD8CAA76810987
25,912,136 UART: [art] PUB.Y = 80E5279F585AD807443375DCC182E7F8EE285BB2F16875B4E4FAC592B144B1E09C41E05B91C502E3A34CCE1BF91EC4EF
25,919,408 UART: [art] SIG.R = 8E3121BC8E16EF8F7047BB3D713817F061517B0D62092C38DB11678002C0E00760FDD0DC5ECE9233B1D7955B86E9E0B6
25,926,787 UART: [art] SIG.S = 72D6328C56A58A1F5288DF914C9ABB7819DE3E878C38D4B9C7E31A2816AFE88E42016B8A795FECB93FD5A9AA4724A074
26,906,111 UART: Caliptra RT
26,906,817 UART: [state] CFI Enabled
27,070,903 UART: [rt] RT listening for mailbox commands...
27,073,240 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,228,243 UART: [rt]cmd =0x41544d4e, len=14344
29,627,550 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
192,634 UART:
193,005 UART: Running Caliptra ROM ...
194,200 UART:
194,350 UART: [state] CFI Enabled
266,687 UART: [state] LifecycleState = Unprovisioned
269,105 UART: [state] DebugLocked = No
271,493 UART: [state] WD Timer not started. Device not locked for debugging
275,592 UART: [kat] SHA2-256
465,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,243 UART: [kat] ++
476,696 UART: [kat] sha1
489,271 UART: [kat] SHA2-256
492,285 UART: [kat] SHA2-384
498,205 UART: [kat] SHA2-512-ACC
500,792 UART: [kat] ECC-384
2,951,820 UART: [kat] HMAC-384Kdf
2,974,934 UART: [kat] LMS
3,506,692 UART: [kat] --
3,513,035 UART: [cold-reset] ++
3,514,687 UART: [fht] FHT @ 0x50003400
3,526,876 UART: [idev] ++
3,527,586 UART: [idev] CDI.KEYID = 6
3,528,622 UART: [idev] SUBJECT.KEYID = 7
3,529,725 UART: [idev] UDS.KEYID = 0
3,530,665 ready_for_fw is high
3,530,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,674,908 UART: [idev] Erasing UDS.KEYID = 0
6,053,014 UART: [idev] Sha1 KeyId Algorithm
6,074,414 UART: [idev] --
6,079,598 UART: [ldev] ++
6,080,276 UART: [ldev] CDI.KEYID = 6
6,081,205 UART: [ldev] SUBJECT.KEYID = 5
6,082,369 UART: [ldev] AUTHORITY.KEYID = 7
6,083,600 UART: [ldev] FE.KEYID = 1
6,126,174 UART: [ldev] Erasing FE.KEYID = 1
8,632,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,367,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,382,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,398,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,413,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,433,326 UART: [ldev] --
10,438,858 UART: [fwproc] Wait for Commands...
10,440,294 UART: [fwproc] Recv command 0x46574c44
10,442,616 UART: [fwproc] Recv'd Img size: 114360 bytes
15,087,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,170,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,286,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,828,838 >>> mbox cmd response: success
15,833,219 UART: [afmc] ++
15,833,930 UART: [afmc] CDI.KEYID = 6
15,835,122 UART: [afmc] SUBJECT.KEYID = 7
15,836,559 UART: [afmc] AUTHORITY.KEYID = 5
18,370,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,112,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,114,775 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,129,855 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,145,056 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,159,851 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,184,479 UART: [afmc] --
20,188,455 UART: [cold-reset] --
20,191,946 UART: [state] Locking Datavault
20,196,132 UART: [state] Locking PCR0, PCR1 and PCR31
20,198,292 UART: [state] Locking ICCM
20,200,614 UART: [exit] Launching FMC @ 0x40000130
20,209,265 UART:
20,209,505 UART: Running Caliptra FMC ...
20,210,608 UART:
20,210,772 UART: [state] CFI Enabled
20,270,265 UART: [fht] FMC Alias Private Key: 7
22,034,217 UART: [art] Extend RT PCRs Done
22,035,454 UART: [art] Lock RT PCRs Done
22,037,161 UART: [art] Populate DV Done
22,042,430 UART: [fht] FMC Alias Private Key: 7
22,044,069 UART: [art] Derive CDI
22,044,847 UART: [art] Store in in slot 0x4
22,103,567 UART: [art] Derive Key Pair
22,104,562 UART: [art] Store priv key in slot 0x5
24,567,620 UART: [art] Derive Key Pair - Done
24,580,724 UART: [art] Signing Cert with AUTHO
24,582,047 UART: RITY.KEYID = 7
26,293,334 UART: [art] Erasing AUTHORITY.KEYID = 7
26,294,851 UART: [art] PUB.X = 066AC6F67F55FFD57C25AF83A17AE01520C44C03661852A6A2C3B91CEC49CB800861ADE6E3933575A8B6EC29E134BB21
26,302,130 UART: [art] PUB.Y = 2DCC1635CA936CDCB7E13F50BDB9BB7824F83A5FA673EDD0C5226251FEE9605D9BA0DF62B3DFE93470C999C7E951D4C1
26,309,423 UART: [art] SIG.R = 84376612B2BCDA3AAA81E3B5CD1B502698E5E8854F0E5DA4A197C175BF6AFF8EF95805C7B3B1BF6B7014AC2FBC17EAF6
26,316,799 UART: [art] SIG.S = E0623415EFE8D3C0978DEE53D614A90DC347B7F62BEF28BDB278120A709C098A3690E914E5252AB2B6780F90FCC70170
27,295,981 UART: Caliptra RT
27,296,674 UART: [state] CFI Enabled
27,462,372 UART: [rt] RT listening for mailbox commands...
27,464,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,620,289 UART: [rt]cmd =0x41544d4e, len=14344
30,006,298 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,439,751 ready_for_fw is high
3,440,150 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,825,228 >>> mbox cmd response: success
20,115,718 UART:
20,116,107 UART: Running Caliptra FMC ...
20,117,224 UART:
20,117,378 UART: [state] CFI Enabled
20,183,797 UART: [fht] FMC Alias Private Key: 7
21,947,844 UART: [art] Extend RT PCRs Done
21,949,069 UART: [art] Lock RT PCRs Done
21,950,833 UART: [art] Populate DV Done
21,956,347 UART: [fht] FMC Alias Private Key: 7
21,957,837 UART: [art] Derive CDI
21,958,573 UART: [art] Store in in slot 0x4
22,016,694 UART: [art] Derive Key Pair
22,017,739 UART: [art] Store priv key in slot 0x5
24,480,691 UART: [art] Derive Key Pair - Done
24,493,816 UART: [art] Signing Cert with AUTHO
24,495,125 UART: RITY.KEYID = 7
26,207,281 UART: [art] Erasing AUTHORITY.KEYID = 7
26,208,788 UART: [art] PUB.X = 4832F39D7E10CF7CACE3FF8D318EBF0CC2EEFA881B98480E1B83C993BA7F0236131C26F51FB71BA885B4C4E4E24380C5
26,216,065 UART: [art] PUB.Y = 1006BBEB1399D45DF6CDF98AF782D921A05ED2C1F8698D9860B0E90A0FDA809637FF2F9FE857B710619A6579B0FD87A8
26,223,349 UART: [art] SIG.R = F82F06494B2DDC4A0D7F8B992F06BF29F67F5B8A1A32D481FF50F238DB6CFC0BF9FE655ECAB7D06ACD6B45AF46AB76DA
26,230,751 UART: [art] SIG.S = 78E62316BA08E9D06C88FADBD9F36CC091CCA5B53C27E258F459319764691B6A3B9309C3B024D776AFB9C86E8D517C85
27,209,324 UART: Caliptra RT
27,210,038 UART: [state] CFI Enabled
27,375,077 UART: [rt] RT listening for mailbox commands...
27,377,676 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,532,798 UART: [rt]cmd =0x41544d4e, len=14344
29,929,479 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,440 UART:
192,798 UART: Running Caliptra ROM ...
193,985 UART:
603,521 UART: [state] CFI Enabled
619,880 UART: [state] LifecycleState = Unprovisioned
622,251 UART: [state] DebugLocked = No
623,421 UART: [state] WD Timer not started. Device not locked for debugging
627,518 UART: [kat] SHA2-256
817,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,202 UART: [kat] ++
828,805 UART: [kat] sha1
840,254 UART: [kat] SHA2-256
843,262 UART: [kat] SHA2-384
850,317 UART: [kat] SHA2-512-ACC
852,893 UART: [kat] ECC-384
3,293,202 UART: [kat] HMAC-384Kdf
3,306,463 UART: [kat] LMS
3,838,246 UART: [kat] --
3,841,996 UART: [cold-reset] ++
3,843,603 UART: [fht] FHT @ 0x50003400
3,855,225 UART: [idev] ++
3,855,934 UART: [idev] CDI.KEYID = 6
3,856,854 UART: [idev] SUBJECT.KEYID = 7
3,858,318 UART: [idev] UDS.KEYID = 0
3,859,234 ready_for_fw is high
3,859,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,001 UART: [idev] Erasing UDS.KEYID = 0
6,334,608 UART: [idev] Sha1 KeyId Algorithm
6,356,750 UART: [idev] --
6,360,231 UART: [ldev] ++
6,360,917 UART: [ldev] CDI.KEYID = 6
6,361,828 UART: [ldev] SUBJECT.KEYID = 5
6,362,982 UART: [ldev] AUTHORITY.KEYID = 7
6,364,210 UART: [ldev] FE.KEYID = 1
6,378,092 UART: [ldev] Erasing FE.KEYID = 1
8,858,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,330 UART: [ldev] --
10,652,267 UART: [fwproc] Wait for Commands...
10,654,578 UART: [fwproc] Recv command 0x46574c44
10,656,834 UART: [fwproc] Recv'd Img size: 114360 bytes
15,284,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,367,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,483,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,026,500 >>> mbox cmd response: success
16,029,889 UART: [afmc] ++
16,030,600 UART: [afmc] CDI.KEYID = 6
16,031,790 UART: [afmc] SUBJECT.KEYID = 7
16,033,299 UART: [afmc] AUTHORITY.KEYID = 5
18,536,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,262,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,264,005 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,279,050 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,294,280 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,309,080 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,332,925 UART: [afmc] --
20,335,817 UART: [cold-reset] --
20,341,303 UART: [state] Locking Datavault
20,348,809 UART: [state] Locking PCR0, PCR1 and PCR31
20,351,001 UART: [state] Locking ICCM
20,352,772 UART: [exit] Launching FMC @ 0x40000130
20,361,443 UART:
20,361,684 UART: Running Caliptra FMC ...
20,362,779 UART:
20,362,951 UART: [state] CFI Enabled
20,371,536 UART: [fht] FMC Alias Private Key: 7
22,128,580 UART: [art] Extend RT PCRs Done
22,129,793 UART: [art] Lock RT PCRs Done
22,131,224 UART: [art] Populate DV Done
22,136,525 UART: [fht] FMC Alias Private Key: 7
22,138,057 UART: [art] Derive CDI
22,138,822 UART: [art] Store in in slot 0x4
22,181,291 UART: [art] Derive Key Pair
22,182,321 UART: [art] Store priv key in slot 0x5
24,608,680 UART: [art] Derive Key Pair - Done
24,621,774 UART: [art] Signing Cert with AUTHO
24,623,078 UART: RITY.KEYID = 7
26,328,539 UART: [art] Erasing AUTHORITY.KEYID = 7
26,330,038 UART: [art] PUB.X = 740A2578256E0FA236F135CEB53DCA9FCAF89CB2148E7597BE53AF593EF40787D9C58F5E6473E361FC629DB39FE834DB
26,337,341 UART: [art] PUB.Y = 750539BD6DA21C91B369945E3305B90C3CFDA33B9F10C8DF1AFDD6AC2D99826C290D0BC6C9B703D4D5CAE7766C019972
26,344,634 UART: [art] SIG.R = D350E2C1F980A9828DC5A19F1874B86CEBB4A99B8514B01BA98717DEB4B00516F2E259CA7494908FC59B855E8235426E
26,351,985 UART: [art] SIG.S = 57FEB0AFB3A5BE796A58AF098D487719D3ED403600FD77EEA5893CD84821A2EA09377A8EB3C5C4D2CE1A92F335C25A56
27,331,662 UART: Caliptra RT
27,332,349 UART: [state] CFI Enabled
27,449,185 UART: [rt] RT listening for mailbox commands...
27,451,474 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,607,171 UART: [rt]cmd =0x41544d4e, len=14344
30,008,393 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,755,224 ready_for_fw is high
3,755,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,074,951 >>> mbox cmd response: success
20,329,792 UART:
20,330,187 UART: Running Caliptra FMC ...
20,331,307 UART:
20,331,466 UART: [state] CFI Enabled
20,339,493 UART: [fht] FMC Alias Private Key: 7
22,096,495 UART: [art] Extend RT PCRs Done
22,097,717 UART: [art] Lock RT PCRs Done
22,099,370 UART: [art] Populate DV Done
22,104,786 UART: [fht] FMC Alias Private Key: 7
22,106,439 UART: [art] Derive CDI
22,107,178 UART: [art] Store in in slot 0x4
22,150,155 UART: [art] Derive Key Pair
22,151,151 UART: [art] Store priv key in slot 0x5
24,577,808 UART: [art] Derive Key Pair - Done
24,590,958 UART: [art] Signing Cert with AUTHO
24,592,275 UART: RITY.KEYID = 7
26,297,632 UART: [art] Erasing AUTHORITY.KEYID = 7
26,299,143 UART: [art] PUB.X = 63C0A5263A8F8F0D7CA74094F08BB62BF3110968C5B098E2BBB4DF5044332D7C9CD8ACFD0009E3CCCFE6B9D61C33F4EF
26,306,404 UART: [art] PUB.Y = 0EFFC7D2892150E52BCE1D655B026CBCD5753C341719545AC3B34686A043525F1572A04BF1ED2AD4AD9E9D578E4D3956
26,313,675 UART: [art] SIG.R = 9AD582539D8AA6012DE62487F0E61688964D89DFAC27CEBAEBA78D98BBF5B2FA75597298B2CF0AED491A7D07F234D064
26,321,033 UART: [art] SIG.S = 7F045D6AEDED6E0A0CD8899866128ECEA63537628758FB366AA5093074C7F55C8608A197D93C62522C4ADD40B1BFA4E3
27,300,287 UART: Caliptra RT
27,300,980 UART: [state] CFI Enabled
27,418,038 UART: [rt] RT listening for mailbox commands...
27,420,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,575,592 UART: [rt]cmd =0x41544d4e, len=14344
29,969,184 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,691 UART: [kat] SHA2-256
892,629 UART: [kat] SHA2-384
895,424 UART: [kat] SHA2-512-ACC
897,325 UART: [kat] ECC-384
902,864 UART: [kat] HMAC-384Kdf
907,558 UART: [kat] LMS
1,475,754 UART: [kat] --
1,476,659 UART: [cold-reset] ++
1,477,205 UART: [fht] Storing FHT @ 0x50003400
1,480,116 UART: [idev] ++
1,480,284 UART: [idev] CDI.KEYID = 6
1,480,644 UART: [idev] SUBJECT.KEYID = 7
1,481,068 UART: [idev] UDS.KEYID = 0
1,481,413 ready_for_fw is high
1,481,413 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,016 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,424 UART: [idev] --
1,515,397 UART: [ldev] ++
1,515,565 UART: [ldev] CDI.KEYID = 6
1,515,928 UART: [ldev] SUBJECT.KEYID = 5
1,516,354 UART: [ldev] AUTHORITY.KEYID = 7
1,516,817 UART: [ldev] FE.KEYID = 1
1,522,241 UART: [ldev] Erasing FE.KEYID = 1
1,547,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,506 UART: [ldev] --
1,586,855 UART: [fwproc] Waiting for Commands...
1,587,556 UART: [fwproc] Received command 0x46574c44
1,588,347 UART: [fwproc] Received Image of size 114360 bytes
5,197,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,225,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,254,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,390,662 >>> mbox cmd response: success
5,391,774 UART: [afmc] ++
5,391,942 UART: [afmc] CDI.KEYID = 6
5,392,304 UART: [afmc] SUBJECT.KEYID = 7
5,392,729 UART: [afmc] AUTHORITY.KEYID = 5
5,427,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,443,985 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,444,765 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,450,474 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,456,366 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,462,067 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,469,931 UART: [afmc] --
5,471,047 UART: [cold-reset] --
5,471,891 UART: [state] Locking Datavault
5,473,192 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,796 UART: [state] Locking ICCM
5,474,280 UART: [exit] Launching FMC @ 0x40000130
5,479,609 UART:
5,479,625 UART: Running Caliptra FMC ...
5,480,033 UART:
5,480,087 UART: [state] CFI Enabled
5,490,635 UART: [fht] FMC Alias Private Key: 7
5,597,881 UART: [art] Extend RT PCRs Done
5,598,309 UART: [art] Lock RT PCRs Done
5,599,829 UART: [art] Populate DV Done
5,607,811 UART: [fht] FMC Alias Private Key: 7
5,608,975 UART: [art] Derive CDI
5,609,255 UART: [art] Store in in slot 0x4
5,694,902 UART: [art] Derive Key Pair
5,695,262 UART: [art] Store priv key in slot 0x5
5,709,046 UART: [art] Derive Key Pair - Done
5,723,886 UART: [art] Signing Cert with AUTHO
5,724,366 UART: RITY.KEYID = 7
5,739,820 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,585 UART: [art] PUB.X = 51F426EAA44CD62656E89913E5190653F9C20DFC61BA891D892FC4ECD8BED1184FFCF8BD078AD6C9509A8E92997054FE
5,747,358 UART: [art] PUB.Y = 85B55331C29F0BB5425EC51531A70412B6D81A007FF90DC8FEA2A1DE5721159DEB65222022557C157769FECA67631D73
5,754,275 UART: [art] SIG.R = D1C3419C8AA1926FF3D560C85420C88EB28D32A5951AF494C689FF3602866204CCC0CDBC4DD23F48AD1238AC1A3664CC
5,761,049 UART: [art] SIG.S = D835D233B60FBE386174D6EFF5D2F90516E95A99874EB2B64E0CCD58D5AA34A42448D4A5F4C2D9F0530F52828F35F3C3
5,784,362 UART: Caliptra RT
5,784,616 UART: [state] CFI Enabled
5,893,279 UART: [rt] RT listening for mailbox commands...
5,893,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,664 UART: [rt]cmd =0x41544d4e, len=14344
6,653,874 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,013 ready_for_fw is high
1,363,013 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,240,644 >>> mbox cmd response: success
5,301,947 UART:
5,301,963 UART: Running Caliptra FMC ...
5,302,371 UART:
5,302,425 UART: [state] CFI Enabled
5,312,949 UART: [fht] FMC Alias Private Key: 7
5,421,077 UART: [art] Extend RT PCRs Done
5,421,505 UART: [art] Lock RT PCRs Done
5,423,003 UART: [art] Populate DV Done
5,431,209 UART: [fht] FMC Alias Private Key: 7
5,432,207 UART: [art] Derive CDI
5,432,487 UART: [art] Store in in slot 0x4
5,518,506 UART: [art] Derive Key Pair
5,518,866 UART: [art] Store priv key in slot 0x5
5,531,682 UART: [art] Derive Key Pair - Done
5,546,450 UART: [art] Signing Cert with AUTHO
5,546,930 UART: RITY.KEYID = 7
5,561,822 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,587 UART: [art] PUB.X = BA18647FFEC272C0E4F7D0E85C6A86CCA5D11C67A8A4A125ACD56C0941539E10449989D4149E2B2FEE288B1296E722CA
5,569,364 UART: [art] PUB.Y = 0FC11B3E57DB6339CD5DE0DA16D317B651927E0772CE3D2A1642A0415B4752040DEF81C7B7280249D7AD86166F1FDD4A
5,576,305 UART: [art] SIG.R = F750102AB72F9F9C390F2404615F34ACA32C5D6A3AF91B88FD901774784D92B0B46FD278C1EFA876E7E728303AB8D0E0
5,583,075 UART: [art] SIG.S = 287DACFBE58BB7A66E4BD9DD691D4A1042272EAF112BA71343B4837162E3FB955452A0D3BEA0645429E161B5C885AAE7
5,607,020 UART: Caliptra RT
5,607,274 UART: [state] CFI Enabled
5,715,406 UART: [rt] RT listening for mailbox commands...
5,716,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,819 UART: [rt]cmd =0x41544d4e, len=14344
6,483,520 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
903,107 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,714 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,479,959 UART: [idev] ++
1,480,127 UART: [idev] CDI.KEYID = 6
1,480,487 UART: [idev] SUBJECT.KEYID = 7
1,480,911 UART: [idev] UDS.KEYID = 0
1,481,256 ready_for_fw is high
1,481,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,503 UART: [idev] Erasing UDS.KEYID = 0
1,505,075 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,881 UART: [idev] --
1,514,896 UART: [ldev] ++
1,515,064 UART: [ldev] CDI.KEYID = 6
1,515,427 UART: [ldev] SUBJECT.KEYID = 5
1,515,853 UART: [ldev] AUTHORITY.KEYID = 7
1,516,316 UART: [ldev] FE.KEYID = 1
1,521,884 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,830 UART: [fwproc] Waiting for Commands...
1,587,553 UART: [fwproc] Received command 0x46574c44
1,588,344 UART: [fwproc] Received Image of size 114360 bytes
5,310,823 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,338,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,368,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,504,032 >>> mbox cmd response: success
5,505,288 UART: [afmc] ++
5,505,456 UART: [afmc] CDI.KEYID = 6
5,505,818 UART: [afmc] SUBJECT.KEYID = 7
5,506,243 UART: [afmc] AUTHORITY.KEYID = 5
5,541,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,558,291 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,559,071 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,564,780 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,570,672 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,576,373 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,584,083 UART: [afmc] --
5,585,177 UART: [cold-reset] --
5,585,795 UART: [state] Locking Datavault
5,586,992 UART: [state] Locking PCR0, PCR1 and PCR31
5,587,596 UART: [state] Locking ICCM
5,588,176 UART: [exit] Launching FMC @ 0x40000130
5,593,505 UART:
5,593,521 UART: Running Caliptra FMC ...
5,593,929 UART:
5,594,072 UART: [state] CFI Enabled
5,604,932 UART: [fht] FMC Alias Private Key: 7
5,713,676 UART: [art] Extend RT PCRs Done
5,714,104 UART: [art] Lock RT PCRs Done
5,715,868 UART: [art] Populate DV Done
5,724,072 UART: [fht] FMC Alias Private Key: 7
5,725,068 UART: [art] Derive CDI
5,725,348 UART: [art] Store in in slot 0x4
5,811,177 UART: [art] Derive Key Pair
5,811,537 UART: [art] Store priv key in slot 0x5
5,824,531 UART: [art] Derive Key Pair - Done
5,839,295 UART: [art] Signing Cert with AUTHO
5,839,775 UART: RITY.KEYID = 7
5,855,279 UART: [art] Erasing AUTHORITY.KEYID = 7
5,856,044 UART: [art] PUB.X = AD5DFBA3E0E1E7940A4D555E668828D1A956F1A234553F032783CD235D79850EB31AEDAAE645AD214BA5109F49542C58
5,862,811 UART: [art] PUB.Y = 90A17295B5C71BD67CBF0359CBA86A3E2FA59B382E5B72D49AE9648CBB82736CF5BA90451557C9BD41F50B8CD850A537
5,869,765 UART: [art] SIG.R = D39536D9ABF7BD8EDC20C1AB3636EAFFDD443FE4D30C49873A55293C6076BFA3BBB36F09B5C7B369DD4C280EDA55B652
5,876,548 UART: [art] SIG.S = C913477AED8D4C97720E2EA7B6F322EA0886A67850F74A32E79438BE1C654A8E5D52B73B5DF695FFCF1E236B9403DA1B
5,900,690 UART: Caliptra RT
5,901,036 UART: [state] CFI Enabled
6,008,487 UART: [rt] RT listening for mailbox commands...
6,009,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,131,972 UART: [rt]cmd =0x41544d4e, len=14344
6,771,645 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,858 ready_for_fw is high
1,362,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,276,704 >>> mbox cmd response: success
5,338,369 UART:
5,338,385 UART: Running Caliptra FMC ...
5,338,793 UART:
5,338,936 UART: [state] CFI Enabled
5,349,486 UART: [fht] FMC Alias Private Key: 7
5,457,200 UART: [art] Extend RT PCRs Done
5,457,628 UART: [art] Lock RT PCRs Done
5,459,416 UART: [art] Populate DV Done
5,467,706 UART: [fht] FMC Alias Private Key: 7
5,468,650 UART: [art] Derive CDI
5,468,930 UART: [art] Store in in slot 0x4
5,554,499 UART: [art] Derive Key Pair
5,554,859 UART: [art] Store priv key in slot 0x5
5,567,947 UART: [art] Derive Key Pair - Done
5,582,699 UART: [art] Signing Cert with AUTHO
5,583,179 UART: RITY.KEYID = 7
5,598,723 UART: [art] Erasing AUTHORITY.KEYID = 7
5,599,488 UART: [art] PUB.X = 7C7D550AB1A5D6D13FC7835B054ACE9BEAC721FB38015AFCE2316850AD815294DE2F5EF864E73E46CBCED19D0F4773A4
5,606,264 UART: [art] PUB.Y = 401CF84A6119ABF66F02A0F6A03423694BD228BE0F68BB3DB78B3D6556E8A4706C8C3D9D1076A215D911FB8D4A4EFA56
5,613,218 UART: [art] SIG.R = EDAD10BF6010A36AEC23DCFC7AAAA385B707BC419432F37C860BAAEC762EF796D39426D6EA5711DD7CE596C0C42B80DD
5,620,006 UART: [art] SIG.S = 75210D5A3A8A46F54DDD420D95FEB3F5519FDC4A61C78B831EBE447BA5B6D71C778E6AE72F5DE3F8F2A7BCBD4CAB990C
5,643,990 UART: Caliptra RT
5,644,336 UART: [state] CFI Enabled
5,752,044 UART: [rt] RT listening for mailbox commands...
5,752,714 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,363 UART: [rt]cmd =0x41544d4e, len=14344
6,515,398 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
893,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,645 UART: [kat] ++
897,797 UART: [kat] sha1
902,223 UART: [kat] SHA2-256
904,163 UART: [kat] SHA2-384
906,840 UART: [kat] SHA2-512-ACC
908,741 UART: [kat] ECC-384
918,390 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,159 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,182 UART: [idev] ++
1,175,350 UART: [idev] CDI.KEYID = 6
1,175,710 UART: [idev] SUBJECT.KEYID = 7
1,176,134 UART: [idev] UDS.KEYID = 0
1,176,479 ready_for_fw is high
1,176,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,476 UART: [idev] Erasing UDS.KEYID = 0
1,201,471 UART: [idev] Sha1 KeyId Algorithm
1,209,765 UART: [idev] --
1,210,863 UART: [ldev] ++
1,211,031 UART: [ldev] CDI.KEYID = 6
1,211,394 UART: [ldev] SUBJECT.KEYID = 5
1,211,820 UART: [ldev] AUTHORITY.KEYID = 7
1,212,283 UART: [ldev] FE.KEYID = 1
1,217,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,543 UART: [ldev] --
1,282,806 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,220 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,319,136 >>> mbox cmd response: success
3,320,370 UART: [afmc] ++
3,320,538 UART: [afmc] CDI.KEYID = 6
3,320,900 UART: [afmc] SUBJECT.KEYID = 7
3,321,325 UART: [afmc] AUTHORITY.KEYID = 5
3,356,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,608 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,317 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,209 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,920 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,641 UART: [afmc] --
3,399,659 UART: [cold-reset] --
3,400,349 UART: [state] Locking Datavault
3,401,522 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,126 UART: [state] Locking ICCM
3,402,558 UART: [exit] Launching FMC @ 0x40000130
3,407,887 UART:
3,407,903 UART: Running Caliptra FMC ...
3,408,311 UART:
3,408,365 UART: [state] CFI Enabled
3,418,931 UART: [fht] FMC Alias Private Key: 7
3,526,739 UART: [art] Extend RT PCRs Done
3,527,167 UART: [art] Lock RT PCRs Done
3,528,847 UART: [art] Populate DV Done
3,537,005 UART: [fht] FMC Alias Private Key: 7
3,537,983 UART: [art] Derive CDI
3,538,263 UART: [art] Store in in slot 0x4
3,624,264 UART: [art] Derive Key Pair
3,624,624 UART: [art] Store priv key in slot 0x5
3,637,284 UART: [art] Derive Key Pair - Done
3,652,485 UART: [art] Signing Cert with AUTHO
3,652,965 UART: RITY.KEYID = 7
3,668,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,168 UART: [art] PUB.X = EDDE926C80FFA01EA610D45A5CE9BA9C431684AC1E61C9AE4CC4C4EF0E4026D75D8D90432CC4128BF5290DAB75E56009
3,675,947 UART: [art] PUB.Y = 55A007CEDCB19A611F43BE66D6CCA07067C4DF63C176C10BB767ECF75F95DE67788988228A0CFC8754A3F3783CF2F795
3,682,898 UART: [art] SIG.R = 2C2D3D87E06D34C05B0EF76471374E192A4283E954BF6DE35ECEE3BFCAB9D2DDB4B0FD9CAE61A5E00513B6AE57F74988
3,689,682 UART: [art] SIG.S = BB650BE78719E4E1359EAAFF480FA6818E5585947CDEB42733E7235BC5517A8B18FE9DB03DA999C4F4D8E85BAA2FBE61
3,713,557 UART: Caliptra RT
3,713,811 UART: [state] CFI Enabled
3,820,980 UART: [rt] RT listening for mailbox commands...
3,821,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,367 UART: [rt]cmd =0x41544d4e, len=14344
4,581,811 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 ready_for_fw is high
1,059,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,168,992 >>> mbox cmd response: success
3,230,729 UART:
3,230,745 UART: Running Caliptra FMC ...
3,231,153 UART:
3,231,207 UART: [state] CFI Enabled
3,241,267 UART: [fht] FMC Alias Private Key: 7
3,349,029 UART: [art] Extend RT PCRs Done
3,349,457 UART: [art] Lock RT PCRs Done
3,351,119 UART: [art] Populate DV Done
3,359,395 UART: [fht] FMC Alias Private Key: 7
3,360,429 UART: [art] Derive CDI
3,360,709 UART: [art] Store in in slot 0x4
3,446,624 UART: [art] Derive Key Pair
3,446,984 UART: [art] Store priv key in slot 0x5
3,459,812 UART: [art] Derive Key Pair - Done
3,474,261 UART: [art] Signing Cert with AUTHO
3,474,741 UART: RITY.KEYID = 7
3,489,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,170 UART: [art] PUB.X = 806B3024A0E0BDB7930445BB7CAC7A102DAE79071CCCA80D218FCC888762DE1D7692636909D0D8E998249F6020F1246E
3,496,930 UART: [art] PUB.Y = C3A3CF462134A1402CE258253DA6B307ED1DAF37E459182FD420C01BD029A87F6934F6C01A6360EF7C4C807FA5229E37
3,503,881 UART: [art] SIG.R = B35A23A1951988436692EEB2CFA7F6BCC8B3190B0038769447880ABF85131C06B5A8455DBF8594E479DF1D3CF0CD0DC8
3,510,623 UART: [art] SIG.S = 51FD339361546F05D3C0BE27EB0C35E1BFD42C9CE60E97CD98CB094EFEE91DDD8DDA18EADCDBF4074624A38B94A91878
3,534,605 UART: Caliptra RT
3,534,859 UART: [state] CFI Enabled
3,641,964 UART: [rt] RT listening for mailbox commands...
3,642,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,533 UART: [rt]cmd =0x41544d4e, len=14344
4,407,469 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,211 UART: [kat] LMS
1,171,539 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,173,074 UART: [fht] FHT @ 0x50003400
1,175,863 UART: [idev] ++
1,176,031 UART: [idev] CDI.KEYID = 6
1,176,391 UART: [idev] SUBJECT.KEYID = 7
1,176,815 UART: [idev] UDS.KEYID = 0
1,177,160 ready_for_fw is high
1,177,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,427 UART: [idev] Erasing UDS.KEYID = 0
1,201,642 UART: [idev] Sha1 KeyId Algorithm
1,210,182 UART: [idev] --
1,211,188 UART: [ldev] ++
1,211,356 UART: [ldev] CDI.KEYID = 6
1,211,719 UART: [ldev] SUBJECT.KEYID = 5
1,212,145 UART: [ldev] AUTHORITY.KEYID = 7
1,212,608 UART: [ldev] FE.KEYID = 1
1,218,086 UART: [ldev] Erasing FE.KEYID = 1
1,244,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,536 UART: [ldev] --
1,283,985 UART: [fwproc] Wait for Commands...
1,284,613 UART: [fwproc] Recv command 0x46574c44
1,285,341 UART: [fwproc] Recv'd Img size: 114360 bytes
3,122,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,315,947 >>> mbox cmd response: success
3,317,149 UART: [afmc] ++
3,317,317 UART: [afmc] CDI.KEYID = 6
3,317,679 UART: [afmc] SUBJECT.KEYID = 7
3,318,104 UART: [afmc] AUTHORITY.KEYID = 5
3,353,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,847 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,556 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,448 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,159 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,952 UART: [afmc] --
3,396,934 UART: [cold-reset] --
3,397,752 UART: [state] Locking Datavault
3,398,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,431 UART: [state] Locking ICCM
3,399,857 UART: [exit] Launching FMC @ 0x40000130
3,405,186 UART:
3,405,202 UART: Running Caliptra FMC ...
3,405,610 UART:
3,405,753 UART: [state] CFI Enabled
3,416,319 UART: [fht] FMC Alias Private Key: 7
3,524,021 UART: [art] Extend RT PCRs Done
3,524,449 UART: [art] Lock RT PCRs Done
3,525,783 UART: [art] Populate DV Done
3,534,079 UART: [fht] FMC Alias Private Key: 7
3,535,009 UART: [art] Derive CDI
3,535,289 UART: [art] Store in in slot 0x4
3,620,666 UART: [art] Derive Key Pair
3,621,026 UART: [art] Store priv key in slot 0x5
3,634,082 UART: [art] Derive Key Pair - Done
3,649,113 UART: [art] Signing Cert with AUTHO
3,649,593 UART: RITY.KEYID = 7
3,665,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,058 UART: [art] PUB.X = 05C200CA0F79F31B94F9A7A77A4387F64A941F51CC1EB069806FA8436F04B491625B2FAE70F8FB598A34D880A5AC14BB
3,672,805 UART: [art] PUB.Y = D20A90B87AB489D95C5AA1C668D3A15F00106FD4E22C6E62646296EF0920CD1FE4A588A4176BFE5350B2B02536C4EAFB
3,679,737 UART: [art] SIG.R = 0376ABC0E03E633DE3BBC42AE5344029D45AF05EF1D591C38928806FEFFA246E4AA84056F54AC9B71BA3C30A0D6DC3D6
3,686,514 UART: [art] SIG.S = 1B3748B1E9778571A019628DD97DBEC2287CA5CF0C025952C01FD33404300597196B659A168592AD74A655E07021064C
3,710,144 UART: Caliptra RT
3,710,490 UART: [state] CFI Enabled
3,818,114 UART: [rt] RT listening for mailbox commands...
3,818,784 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,611 UART: [rt]cmd =0x41544d4e, len=14344
4,584,067 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,178 ready_for_fw is high
1,061,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,172,726 >>> mbox cmd response: success
3,235,353 UART:
3,235,369 UART: Running Caliptra FMC ...
3,235,777 UART:
3,235,920 UART: [state] CFI Enabled
3,246,778 UART: [fht] FMC Alias Private Key: 7
3,354,616 UART: [art] Extend RT PCRs Done
3,355,044 UART: [art] Lock RT PCRs Done
3,356,502 UART: [art] Populate DV Done
3,364,728 UART: [fht] FMC Alias Private Key: 7
3,365,798 UART: [art] Derive CDI
3,366,078 UART: [art] Store in in slot 0x4
3,452,123 UART: [art] Derive Key Pair
3,452,483 UART: [art] Store priv key in slot 0x5
3,466,007 UART: [art] Derive Key Pair - Done
3,480,978 UART: [art] Signing Cert with AUTHO
3,481,458 UART: RITY.KEYID = 7
3,496,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,635 UART: [art] PUB.X = 9313B8395F8A761A6EC4DFA5337D3AB0CE10F806A613DB0110308E8572552C9983CFAE53CBC74F7A81B1609516C601F3
3,504,398 UART: [art] PUB.Y = E38128DBF16FA6056FCC2DC34E575566920C7E39685F62E9673DF353019D9E158A7B15306E458271283E301C70900699
3,511,324 UART: [art] SIG.R = F62CF453D084E4502B149DC3DC67B930C3BFF7606E922D239C1651467FA3367C2DE873D62749BF9DB778C4F52A7AC95E
3,518,100 UART: [art] SIG.S = E09641CFB0D8E8BD01DB48A3BE183277DCA018B9066D7B64322412B3E66C3329E4838ACE33E13D45F315AFD6D70698F1
3,541,954 UART: Caliptra RT
3,542,300 UART: [state] CFI Enabled
3,650,750 UART: [rt] RT listening for mailbox commands...
3,651,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,087 UART: [rt]cmd =0x41544d4e, len=14344
4,406,685 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
903,874 UART: [kat] SHA2-512-ACC
905,775 UART: [kat] ECC-384
915,410 UART: [kat] HMAC-384Kdf
920,062 UART: [kat] LMS
1,168,374 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,537 UART: [idev] ++
1,172,705 UART: [idev] CDI.KEYID = 6
1,173,066 UART: [idev] SUBJECT.KEYID = 7
1,173,491 UART: [idev] UDS.KEYID = 0
1,173,837 ready_for_fw is high
1,173,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,013 UART: [idev] Erasing UDS.KEYID = 0
1,197,865 UART: [idev] Sha1 KeyId Algorithm
1,206,543 UART: [idev] --
1,207,400 UART: [ldev] ++
1,207,568 UART: [ldev] CDI.KEYID = 6
1,207,932 UART: [ldev] SUBJECT.KEYID = 5
1,208,359 UART: [ldev] AUTHORITY.KEYID = 7
1,208,822 UART: [ldev] FE.KEYID = 1
1,213,964 UART: [ldev] Erasing FE.KEYID = 1
1,240,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,308 UART: [ldev] --
1,279,758 UART: [fwproc] Wait for Commands...
1,280,465 UART: [fwproc] Recv command 0x46574c44
1,281,198 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,136 >>> mbox cmd response: success
3,323,353 UART: [afmc] ++
3,323,521 UART: [afmc] CDI.KEYID = 6
3,323,884 UART: [afmc] SUBJECT.KEYID = 7
3,324,310 UART: [afmc] AUTHORITY.KEYID = 5
3,359,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,845 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,555 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,445 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,156 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,970 UART: [afmc] --
3,402,900 UART: [cold-reset] --
3,403,724 UART: [state] Locking Datavault
3,404,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,361 UART: [state] Locking ICCM
3,405,845 UART: [exit] Launching FMC @ 0x40000130
3,411,174 UART:
3,411,190 UART: Running Caliptra FMC ...
3,411,598 UART:
3,411,652 UART: [state] CFI Enabled
3,422,336 UART: [fht] FMC Alias Private Key: 7
3,529,890 UART: [art] Extend RT PCRs Done
3,530,318 UART: [art] Lock RT PCRs Done
3,531,750 UART: [art] Populate DV Done
3,539,800 UART: [fht] FMC Alias Private Key: 7
3,540,766 UART: [art] Derive CDI
3,541,046 UART: [art] Store in in slot 0x4
3,626,299 UART: [art] Derive Key Pair
3,626,659 UART: [art] Store priv key in slot 0x5
3,640,099 UART: [art] Derive Key Pair - Done
3,655,154 UART: [art] Signing Cert with AUTHO
3,655,634 UART: RITY.KEYID = 7
3,671,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,153 UART: [art] PUB.X = F6F79E9B03A94699C9D3898C3591B08788987B4F30CAAAA46F8BF1A7DC0F51FFDAB90DFA42E95B01ADF88BB707BCF5A1
3,678,930 UART: [art] PUB.Y = 6BBA8EB97138153C18E7438E14C4143BF7748140BCAC71BE3473792297AB19B69A450997F7E6F76DD17293D80F38B7FE
3,685,874 UART: [art] SIG.R = BF92A98AC62A7803D318388F40D6FBEC8ED29CD488D850506EE6F94012E98BA360E2C366281A0565419AED96AA7107A7
3,692,639 UART: [art] SIG.S = 4EFCDCA754ECFA0E460FEFBE6B3DFE70A81EBE01090A5AAF79776BF8AB4DB60DE32A9BE825EFE1AE1C3C198BB0FA3402
3,716,331 UART: Caliptra RT
3,716,585 UART: [state] CFI Enabled
3,824,094 UART: [rt] RT listening for mailbox commands...
3,824,764 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,145 UART: [rt]cmd =0x41544d4e, len=14344
4,589,147 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,966 ready_for_fw is high
1,055,966 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,162,087 >>> mbox cmd response: success
3,223,620 UART:
3,223,636 UART: Running Caliptra FMC ...
3,224,044 UART:
3,224,098 UART: [state] CFI Enabled
3,234,534 UART: [fht] FMC Alias Private Key: 7
3,341,942 UART: [art] Extend RT PCRs Done
3,342,370 UART: [art] Lock RT PCRs Done
3,344,014 UART: [art] Populate DV Done
3,352,152 UART: [fht] FMC Alias Private Key: 7
3,353,222 UART: [art] Derive CDI
3,353,502 UART: [art] Store in in slot 0x4
3,439,683 UART: [art] Derive Key Pair
3,440,043 UART: [art] Store priv key in slot 0x5
3,453,551 UART: [art] Derive Key Pair - Done
3,468,144 UART: [art] Signing Cert with AUTHO
3,468,624 UART: RITY.KEYID = 7
3,484,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,907 UART: [art] PUB.X = C734F272BC359057117DD1B43BE487BA917ACA75752BA130FB9C788FE0881B243A84C1EE7FB42E79964B813200A740B7
3,491,657 UART: [art] PUB.Y = 0398A8320F0CC405ED41F87B318BBD47EE8556E2EF8C931111845DE5D260730E2ED0F64788094EB5B71172C3E4D57839
3,498,587 UART: [art] SIG.R = 6D4889BD8668E8EAD010E7542E2530C65DA0C6F7E22D36AA453C267DC28A8CC4BEACC1C094C5959D965B96C6010076BE
3,505,342 UART: [art] SIG.S = 02D209132806634F9CD14FFD17A0C77258400FB4C933787DE6AE835354C69D428F52E69E2A158F3A755D2B75B3248911
3,529,947 UART: Caliptra RT
3,530,201 UART: [state] CFI Enabled
3,637,863 UART: [rt] RT listening for mailbox commands...
3,638,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,480 UART: [rt]cmd =0x41544d4e, len=14344
4,406,253 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
915,649 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,482 UART: [cold-reset] ++
1,170,050 UART: [fht] FHT @ 0x50003400
1,172,620 UART: [idev] ++
1,172,788 UART: [idev] CDI.KEYID = 6
1,173,149 UART: [idev] SUBJECT.KEYID = 7
1,173,574 UART: [idev] UDS.KEYID = 0
1,173,920 ready_for_fw is high
1,173,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,716 UART: [idev] Erasing UDS.KEYID = 0
1,198,554 UART: [idev] Sha1 KeyId Algorithm
1,207,502 UART: [idev] --
1,208,567 UART: [ldev] ++
1,208,735 UART: [ldev] CDI.KEYID = 6
1,209,099 UART: [ldev] SUBJECT.KEYID = 5
1,209,526 UART: [ldev] AUTHORITY.KEYID = 7
1,209,989 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,241,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,280,975 UART: [fwproc] Wait for Commands...
1,281,678 UART: [fwproc] Recv command 0x46574c44
1,282,411 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,318,519 >>> mbox cmd response: success
3,319,616 UART: [afmc] ++
3,319,784 UART: [afmc] CDI.KEYID = 6
3,320,147 UART: [afmc] SUBJECT.KEYID = 7
3,320,573 UART: [afmc] AUTHORITY.KEYID = 5
3,355,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,954 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,664 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,554 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,265 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,905 UART: [afmc] --
3,399,025 UART: [cold-reset] --
3,400,009 UART: [state] Locking Datavault
3,400,906 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,510 UART: [state] Locking ICCM
3,402,022 UART: [exit] Launching FMC @ 0x40000130
3,407,351 UART:
3,407,367 UART: Running Caliptra FMC ...
3,407,775 UART:
3,407,918 UART: [state] CFI Enabled
3,418,638 UART: [fht] FMC Alias Private Key: 7
3,526,068 UART: [art] Extend RT PCRs Done
3,526,496 UART: [art] Lock RT PCRs Done
3,527,802 UART: [art] Populate DV Done
3,536,170 UART: [fht] FMC Alias Private Key: 7
3,537,206 UART: [art] Derive CDI
3,537,486 UART: [art] Store in in slot 0x4
3,623,195 UART: [art] Derive Key Pair
3,623,555 UART: [art] Store priv key in slot 0x5
3,636,443 UART: [art] Derive Key Pair - Done
3,651,127 UART: [art] Signing Cert with AUTHO
3,651,607 UART: RITY.KEYID = 7
3,666,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,618 UART: [art] PUB.X = FBE9D72D5C93CC957255F0B9DDC03EF37E66E2C55384A565616ADF54448CA9766EA6B3F5F44A0AE418D51D38D6AC633D
3,674,399 UART: [art] PUB.Y = ED3910FC52EF2B61F017A21C3B13FD7C5AF7FFE66E6685B640B7EF7A1498C7357137E97F4567C0A46FF24E21E0BC63F8
3,681,361 UART: [art] SIG.R = 9A31923713BA6DFF1183CD0017CF6C6731445BBB7C64BC1D3C87451C319FD95BB846AC0D9764C4579467D1453FA509A7
3,688,105 UART: [art] SIG.S = 644FEB3071D07511048C0E5103C28A5FE46E3D6904534AD9358284C21BA6D960C6A16087938B7048139C616A87DCE79C
3,712,200 UART: Caliptra RT
3,712,546 UART: [state] CFI Enabled
3,819,429 UART: [rt] RT listening for mailbox commands...
3,820,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,642 UART: [rt]cmd =0x41544d4e, len=14344
4,589,700 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,491 ready_for_fw is high
1,055,491 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,179,168 >>> mbox cmd response: success
3,241,055 UART:
3,241,071 UART: Running Caliptra FMC ...
3,241,479 UART:
3,241,622 UART: [state] CFI Enabled
3,251,944 UART: [fht] FMC Alias Private Key: 7
3,359,334 UART: [art] Extend RT PCRs Done
3,359,762 UART: [art] Lock RT PCRs Done
3,361,554 UART: [art] Populate DV Done
3,369,790 UART: [fht] FMC Alias Private Key: 7
3,370,880 UART: [art] Derive CDI
3,371,160 UART: [art] Store in in slot 0x4
3,457,123 UART: [art] Derive Key Pair
3,457,483 UART: [art] Store priv key in slot 0x5
3,471,175 UART: [art] Derive Key Pair - Done
3,485,804 UART: [art] Signing Cert with AUTHO
3,486,284 UART: RITY.KEYID = 7
3,501,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,271 UART: [art] PUB.X = 17F1DDF34498F42A5978331EAA3A42D4F6983B981FA4F08B38DCFD877BE7EAEC84A6B3379801E5F5C39F8974C1B9212C
3,509,048 UART: [art] PUB.Y = B2AE4212FD0EA6AFE0D46A28D904CA7864A583AB35A31B6016CED59B5493D02C8B7639B27331AE5B039A2ECF8401FB6B
3,516,000 UART: [art] SIG.R = EA5544371197E65A8E30C2210049C71CD7C6E6E6754C33AB78675410C4138C51D7E2A5F4CFBE87575D46127316C3CEC1
3,522,746 UART: [art] SIG.S = 9C51AA0602408A57F0BDA26F893C4DA25A44CF568347FA73EA2024C77341BBAE0BC924E2379BA72391CBEF278CBB02B9
3,546,911 UART: Caliptra RT
3,547,257 UART: [state] CFI Enabled
3,655,087 UART: [rt] RT listening for mailbox commands...
3,655,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,440 UART: [rt]cmd =0x41544d4e, len=14344
4,423,553 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,952 writing to cptra_bootfsm_go
193,022 UART:
193,393 UART: Running Caliptra ROM ...
194,631 UART:
194,787 UART: [state] CFI Enabled
262,528 UART: [state] LifecycleState = Unprovisioned
264,517 UART: [state] DebugLocked = No
265,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,762 UART: [kat] SHA2-256
440,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,989 UART: [kat] ++
451,667 UART: [kat] sha1
463,071 UART: [kat] SHA2-256
465,740 UART: [kat] SHA2-384
471,869 UART: [kat] SHA2-512-ACC
474,237 UART: [kat] ECC-384
2,766,145 UART: [kat] HMAC-384Kdf
2,798,447 UART: [kat] LMS
3,988,785 UART: [kat] --
3,994,174 UART: [cold-reset] ++
3,996,461 UART: [fht] Storing FHT @ 0x50003400
4,006,657 UART: [idev] ++
4,007,290 UART: [idev] CDI.KEYID = 6
4,008,194 UART: [idev] SUBJECT.KEYID = 7
4,009,435 UART: [idev] UDS.KEYID = 0
4,010,502 ready_for_fw is high
4,010,705 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,138 UART: [idev] Erasing UDS.KEYID = 0
7,345,697 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,436 UART: [idev] --
7,370,658 UART: [ldev] ++
7,371,221 UART: [ldev] CDI.KEYID = 6
7,372,176 UART: [ldev] SUBJECT.KEYID = 5
7,373,377 UART: [ldev] AUTHORITY.KEYID = 7
7,374,652 UART: [ldev] FE.KEYID = 1
7,419,812 UART: [ldev] Erasing FE.KEYID = 1
10,753,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,178 UART: [ldev] --
13,113,536 UART: [fwproc] Waiting for Commands...
13,115,463 UART: [fwproc] Received command 0x46574c44
13,117,637 UART: [fwproc] Received Image of size 114036 bytes
22,074,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,163,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,232,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,548,592 >>> mbox cmd response: success
22,552,482 UART: [afmc] ++
22,553,127 UART: [afmc] CDI.KEYID = 6
22,554,053 UART: [afmc] SUBJECT.KEYID = 7
22,555,269 UART: [afmc] AUTHORITY.KEYID = 5
25,910,550 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,214,326 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,216,584 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,231,147 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,245,915 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,260,138 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,280,928 UART: [afmc] --
28,284,087 UART: [cold-reset] --
28,288,377 UART: [state] Locking Datavault
28,294,211 UART: [state] Locking PCR0, PCR1 and PCR31
28,296,020 UART: [state] Locking ICCM
28,297,742 UART: [exit] Launching FMC @ 0x40000130
28,306,138 UART:
28,306,375 UART: Running Caliptra FMC ...
28,307,494 UART:
28,307,652 UART: [state] CFI Enabled
28,373,315 UART: [fht] FMC Alias Private Key: 7
30,711,717 UART: [art] Extend RT PCRs Done
30,712,948 UART: [art] Lock RT PCRs Done
30,714,597 UART: [art] Populate DV Done
30,720,000 UART: [fht] FMC Alias Private Key: 7
30,721,697 UART: [art] Derive CDI
30,722,426 UART: [art] Store in in slot 0x4
30,782,368 UART: [art] Derive Key Pair
30,783,419 UART: [art] Store priv key in slot 0x5
34,076,191 UART: [art] Derive Key Pair - Done
34,089,223 UART: [art] Signing Cert with AUTHO
34,090,533 UART: RITY.KEYID = 7
36,378,101 UART: [art] Erasing AUTHORITY.KEYID = 7
36,379,608 UART: [art] PUB.X = 0453AA0A764681E0EAD9CD62C004512516AC05D81CF4BD15C2FA82765C55BBC884C2DA65C51A040E40CAAC2BAB8259CF
36,386,904 UART: [art] PUB.Y = 844F4F58F800A06AD0F5B9B2FCAC029570F24F5E065F62CB7F3342EBACF4C55F6D233A84EF679FA6EDE6926D79223964
36,394,160 UART: [art] SIG.R = 75D1C9FA685BB9C211560A3D1B98477B73D175FEA40B04E25E0AC39E3337EA049A6351F5C6675CE8AFB6EE6D7FDF6092
36,401,525 UART: [art] SIG.S = D6E56A28110D4E889BBB3724FF19244640EE52DD4D711AAAF697DF7548DDE061F9441ECC874BC71DF43FA6E3722BDAFD
37,706,944 UART: Caliptra RT
37,707,652 UART: [state] CFI Enabled
37,869,490 UART: [rt] RT listening for mailbox commands...
37,871,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,026,938 UART: [rt]cmd =0x41544d4e, len=14344
43,585,136 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,785,301 ready_for_fw is high
3,785,859 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,928,208 >>> mbox cmd response: success
27,619,811 UART:
27,620,625 UART: Running Caliptra FMC ...
27,621,742 UART:
27,621,891 UART: [state] CFI Enabled
27,688,733 UART: [fht] FMC Alias Private Key: 7
30,027,001 UART: [art] Extend RT PCRs Done
30,028,243 UART: [art] Lock RT PCRs Done
30,029,569 UART: [art] Populate DV Done
30,035,049 UART: [fht] FMC Alias Private Key: 7
30,036,697 UART: [art] Derive CDI
30,037,529 UART: [art] Store in in slot 0x4
30,097,291 UART: [art] Derive Key Pair
30,098,331 UART: [art] Store priv key in slot 0x5
33,391,564 UART: [art] Derive Key Pair - Done
33,404,408 UART: [art] Signing Cert with AUTHO
33,405,713 UART: RITY.KEYID = 7
35,692,669 UART: [art] Erasing AUTHORITY.KEYID = 7
35,694,174 UART: [art] PUB.X = 9D08AFD3DCA542F6FCA87ED1019F0639DE09433423707B6008F2215FA655BBF57C911A84A5FC7067B37547A9CFC1A221
35,701,434 UART: [art] PUB.Y = 0A71D2AD2949A8D3F6E6BE8EC95E53C94937EECFD5AB1595A2C1A68CA335DAF35BC2881015ECC138A87E21402F43C1DC
35,708,724 UART: [art] SIG.R = 61A1238D361AB26714AFE1248A2DCEA54085648137407E5FC3EC17BE1BD59B161A78B52F838D87B2739377D33B751738
35,716,095 UART: [art] SIG.S = A84B733ED7CD3BFCCAE7F066F79D398D2CC14F6608E07DAD82FE1A9D5E13E3009E6D5F5687620C95F2928167252E0CD3
37,021,493 UART: Caliptra RT
37,022,206 UART: [state] CFI Enabled
37,183,585 UART: [rt] RT listening for mailbox commands...
37,185,923 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,341,147 UART: [rt]cmd =0x41544d4e, len=14344
42,925,300 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
193,556 UART:
193,917 UART: Running Caliptra ROM ...
195,096 UART:
604,707 UART: [state] CFI Enabled
617,658 UART: [state] LifecycleState = Unprovisioned
619,596 UART: [state] DebugLocked = No
622,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,824 UART: [kat] SHA2-256
797,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,086 UART: [kat] ++
808,541 UART: [kat] sha1
820,549 UART: [kat] SHA2-256
823,199 UART: [kat] SHA2-384
830,466 UART: [kat] SHA2-512-ACC
832,842 UART: [kat] ECC-384
3,116,300 UART: [kat] HMAC-384Kdf
3,128,044 UART: [kat] LMS
4,318,207 UART: [kat] --
4,323,278 UART: [cold-reset] ++
4,325,807 UART: [fht] Storing FHT @ 0x50003400
4,337,301 UART: [idev] ++
4,337,948 UART: [idev] CDI.KEYID = 6
4,338,863 UART: [idev] SUBJECT.KEYID = 7
4,340,110 UART: [idev] UDS.KEYID = 0
4,341,198 ready_for_fw is high
4,341,411 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,610 UART: [idev] Erasing UDS.KEYID = 0
7,621,163 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,635 UART: [idev] --
7,647,270 UART: [ldev] ++
7,647,844 UART: [ldev] CDI.KEYID = 6
7,648,860 UART: [ldev] SUBJECT.KEYID = 5
7,650,025 UART: [ldev] AUTHORITY.KEYID = 7
7,651,255 UART: [ldev] FE.KEYID = 1
7,663,141 UART: [ldev] Erasing FE.KEYID = 1
10,952,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,279 UART: [ldev] --
13,312,412 UART: [fwproc] Waiting for Commands...
13,315,045 UART: [fwproc] Received command 0x46574c44
13,317,278 UART: [fwproc] Received Image of size 114036 bytes
22,271,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,348,351 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,417,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,734,477 >>> mbox cmd response: success
22,739,482 UART: [afmc] ++
22,740,131 UART: [afmc] CDI.KEYID = 6
22,741,040 UART: [afmc] SUBJECT.KEYID = 7
22,742,255 UART: [afmc] AUTHORITY.KEYID = 5
26,058,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,349,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,352,038 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,366,588 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,381,365 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,395,580 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,417,027 UART: [afmc] --
28,421,065 UART: [cold-reset] --
28,425,468 UART: [state] Locking Datavault
28,431,418 UART: [state] Locking PCR0, PCR1 and PCR31
28,433,122 UART: [state] Locking ICCM
28,434,787 UART: [exit] Launching FMC @ 0x40000130
28,443,187 UART:
28,443,422 UART: Running Caliptra FMC ...
28,444,525 UART:
28,444,684 UART: [state] CFI Enabled
28,453,108 UART: [fht] FMC Alias Private Key: 7
30,784,314 UART: [art] Extend RT PCRs Done
30,785,559 UART: [art] Lock RT PCRs Done
30,786,994 UART: [art] Populate DV Done
30,792,694 UART: [fht] FMC Alias Private Key: 7
30,794,233 UART: [art] Derive CDI
30,794,965 UART: [art] Store in in slot 0x4
30,837,828 UART: [art] Derive Key Pair
30,838,870 UART: [art] Store priv key in slot 0x5
34,081,217 UART: [art] Derive Key Pair - Done
34,094,314 UART: [art] Signing Cert with AUTHO
34,095,698 UART: RITY.KEYID = 7
36,375,261 UART: [art] Erasing AUTHORITY.KEYID = 7
36,376,764 UART: [art] PUB.X = B5CD0D8B42FAC288C981504566312137E646DA7D5FCA2DD43836AEF486EB9FC41C0B23D030FB39E25F004901C2CA8CF0
36,384,005 UART: [art] PUB.Y = CF58DD8050AC5ECFE9057F6D14C4E9CE4B0BA488DE01EBA5786FEEE8F2D29BD0E435035D5622A8702A9942583EEACC9A
36,391,277 UART: [art] SIG.R = 1ACADAA83090D467A0803406E5BF010BBE4AED093A9A94BAEB741C095269C775F8AA47866DBDA0C82081B22178DD73C1
36,398,660 UART: [art] SIG.S = E9EEA4A0BA62019C67A5139C0BAE50A2C655D1C826E382F101B37948332FB8EFA788D3F26668EC738103CFD0682ED59E
37,703,220 UART: Caliptra RT
37,703,930 UART: [state] CFI Enabled
37,822,005 UART: [rt] RT listening for mailbox commands...
37,824,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,979,689 UART: [rt]cmd =0x41544d4e, len=14344
43,434,397 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,127,686 ready_for_fw is high
4,128,118 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,043,930 >>> mbox cmd response: success
27,684,965 UART:
27,685,355 UART: Running Caliptra FMC ...
27,686,453 UART:
27,686,608 UART: [state] CFI Enabled
27,695,118 UART: [fht] FMC Alias Private Key: 7
30,025,318 UART: [art] Extend RT PCRs Done
30,026,546 UART: [art] Lock RT PCRs Done
30,027,937 UART: [art] Populate DV Done
30,033,407 UART: [fht] FMC Alias Private Key: 7
30,034,952 UART: [art] Derive CDI
30,035,694 UART: [art] Store in in slot 0x4
30,078,343 UART: [art] Derive Key Pair
30,079,346 UART: [art] Store priv key in slot 0x5
33,321,879 UART: [art] Derive Key Pair - Done
33,334,824 UART: [art] Signing Cert with AUTHO
33,336,124 UART: RITY.KEYID = 7
35,615,523 UART: [art] Erasing AUTHORITY.KEYID = 7
35,617,171 UART: [art] PUB.X = 19065BC81E5C505E68755A46A287930F2C5DF63901B5312CE6FA2FB2BA24DF7820EECE17FFC06C20AEE0D698D7A50AEA
35,624,278 UART: [art] PUB.Y = 62B7E53DC3079B4FF86C6B816B25FFE5ED00BE325DFAE18A7344121F7B48C4A1D9930A31061FADEEC90A1710BB624AAC
35,631,566 UART: [art] SIG.R = 8C4A34D7BBE06BCA57433B41E09EB0316EEAC695D68532E7AE1BF76F6B92DC3DC68E9589DA30CFA435E53FD036CDDB0E
35,639,004 UART: [art] SIG.S = 2071E5D3C2F9C173E5760359BBC17B2847DF482FD722217B16B41F49C1B78BD8B8E8A557D27ADDF7CD0D1D08DCB4D2F5
36,944,610 UART: Caliptra RT
36,945,309 UART: [state] CFI Enabled
37,063,146 UART: [rt] RT listening for mailbox commands...
37,065,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,220,668 UART: [rt]cmd =0x41544d4e, len=14344
42,778,722 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,620 writing to cptra_bootfsm_go
192,708 UART:
193,077 UART: Running Caliptra ROM ...
194,208 UART:
194,351 UART: [state] CFI Enabled
267,263 UART: [state] LifecycleState = Unprovisioned
269,128 UART: [state] DebugLocked = No
270,644 UART: [state] WD Timer not started. Device not locked for debugging
274,274 UART: [kat] SHA2-256
453,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,960 UART: [kat] ++
465,406 UART: [kat] sha1
476,700 UART: [kat] SHA2-256
479,732 UART: [kat] SHA2-384
485,940 UART: [kat] SHA2-512-ACC
488,877 UART: [kat] ECC-384
2,950,372 UART: [kat] HMAC-384Kdf
2,971,349 UART: [kat] LMS
3,500,829 UART: [kat] --
3,506,315 UART: [cold-reset] ++
3,508,669 UART: [fht] FHT @ 0x50003400
3,519,219 UART: [idev] ++
3,519,790 UART: [idev] CDI.KEYID = 6
3,520,676 UART: [idev] SUBJECT.KEYID = 7
3,521,918 UART: [idev] UDS.KEYID = 0
3,522,820 ready_for_fw is high
3,523,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,971 UART: [idev] Erasing UDS.KEYID = 0
6,025,329 UART: [idev] Sha1 KeyId Algorithm
6,049,098 UART: [idev] --
6,052,708 UART: [ldev] ++
6,053,287 UART: [ldev] CDI.KEYID = 6
6,054,178 UART: [ldev] SUBJECT.KEYID = 5
6,055,279 UART: [ldev] AUTHORITY.KEYID = 7
6,056,622 UART: [ldev] FE.KEYID = 1
6,099,594 UART: [ldev] Erasing FE.KEYID = 1
8,604,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,622 UART: [ldev] --
10,412,342 UART: [fwproc] Wait for Commands...
10,415,355 UART: [fwproc] Recv command 0x46574c44
10,417,451 UART: [fwproc] Recv'd Img size: 114360 bytes
14,985,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,067,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,136,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,454,044 >>> mbox cmd response: success
15,458,109 UART: [afmc] ++
15,458,701 UART: [afmc] CDI.KEYID = 6
15,459,588 UART: [afmc] SUBJECT.KEYID = 7
15,460,803 UART: [afmc] AUTHORITY.KEYID = 5
18,002,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,727,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,729,378 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,745,346 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,761,321 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,777,061 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,800,583 UART: [afmc] --
19,804,403 UART: [cold-reset] --
19,809,202 UART: [state] Locking Datavault
19,815,688 UART: [state] Locking PCR0, PCR1 and PCR31
19,817,388 UART: [state] Locking ICCM
19,818,916 UART: [exit] Launching FMC @ 0x40000130
19,827,310 UART:
19,827,542 UART: Running Caliptra FMC ...
19,828,566 UART:
19,828,710 UART: [state] CFI Enabled
19,885,126 UART: [fht] FMC Alias Private Key: 7
21,648,892 UART: [art] Extend RT PCRs Done
21,650,117 UART: [art] Lock RT PCRs Done
21,651,874 UART: [art] Populate DV Done
21,657,286 UART: [fht] FMC Alias Private Key: 7
21,658,829 UART: [art] Derive CDI
21,659,563 UART: [art] Store in in slot 0x4
21,717,954 UART: [art] Derive Key Pair
21,719,006 UART: [art] Store priv key in slot 0x5
24,182,149 UART: [art] Derive Key Pair - Done
24,195,209 UART: [art] Signing Cert with AUTHO
24,196,550 UART: RITY.KEYID = 7
25,907,113 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,619 UART: [art] PUB.X = DEF25E027442D91B95520AFC4EB2DA0712AA38D0FE8CADFC7E91F957334E2DAC235150D755139BF2E5BD0936FD5E3CB6
25,915,890 UART: [art] PUB.Y = B1939AD6C362347F1DC30198FAB0F4A212927AD7771FCD4B0FA081B895A8A945C4A9FCA707FE4A3D514C5ABED6CA12B8
25,923,169 UART: [art] SIG.R = 31AAD8F129A860CB9A6DD343A60056990F30984348CFA5E7C9AA376E878FC89F46FC102DD3A44A34764FACDC24AB3807
25,930,532 UART: [art] SIG.S = F743FD73BC08228A33F03DFD1CE3969D1260CD67066752751753197BDA01E33805272B8D1EB703EFB58E44E1E6C74F6C
26,909,759 UART: Caliptra RT
26,910,474 UART: [state] CFI Enabled
27,075,043 UART: [rt] RT listening for mailbox commands...
27,077,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,765 UART: [rt]cmd =0x41544d4e, len=14344
30,587,751 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
192,647 UART:
193,022 UART: Running Caliptra ROM ...
194,165 UART:
194,335 UART: [state] CFI Enabled
265,623 UART: [state] LifecycleState = Unprovisioned
267,978 UART: [state] DebugLocked = No
270,865 UART: [state] WD Timer not started. Device not locked for debugging
276,087 UART: [kat] SHA2-256
465,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,638 UART: [kat] ++
477,116 UART: [kat] sha1
488,205 UART: [kat] SHA2-256
491,214 UART: [kat] SHA2-384
497,558 UART: [kat] SHA2-512-ACC
500,141 UART: [kat] ECC-384
2,951,006 UART: [kat] HMAC-384Kdf
2,972,977 UART: [kat] LMS
3,504,708 UART: [kat] --
3,509,138 UART: [cold-reset] ++
3,510,731 UART: [fht] FHT @ 0x50003400
3,522,634 UART: [idev] ++
3,523,268 UART: [idev] CDI.KEYID = 6
3,524,301 UART: [idev] SUBJECT.KEYID = 7
3,525,474 UART: [idev] UDS.KEYID = 0
3,526,401 ready_for_fw is high
3,526,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,460 UART: [idev] Erasing UDS.KEYID = 0
6,028,401 UART: [idev] Sha1 KeyId Algorithm
6,050,840 UART: [idev] --
6,055,757 UART: [ldev] ++
6,056,449 UART: [ldev] CDI.KEYID = 6
6,057,367 UART: [ldev] SUBJECT.KEYID = 5
6,058,528 UART: [ldev] AUTHORITY.KEYID = 7
6,059,763 UART: [ldev] FE.KEYID = 1
6,101,518 UART: [ldev] Erasing FE.KEYID = 1
8,607,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,287 UART: [ldev] --
10,415,305 UART: [fwproc] Wait for Commands...
10,418,152 UART: [fwproc] Recv command 0x46574c44
10,420,459 UART: [fwproc] Recv'd Img size: 114360 bytes
15,054,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,139,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,255,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,797,743 >>> mbox cmd response: success
15,801,668 UART: [afmc] ++
15,802,371 UART: [afmc] CDI.KEYID = 6
15,803,487 UART: [afmc] SUBJECT.KEYID = 7
15,805,052 UART: [afmc] AUTHORITY.KEYID = 5
18,349,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,088,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,090,214 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,105,278 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,120,504 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,135,364 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,159,599 UART: [afmc] --
20,162,712 UART: [cold-reset] --
20,165,496 UART: [state] Locking Datavault
20,171,082 UART: [state] Locking PCR0, PCR1 and PCR31
20,173,232 UART: [state] Locking ICCM
20,174,463 UART: [exit] Launching FMC @ 0x40000130
20,183,147 UART:
20,183,386 UART: Running Caliptra FMC ...
20,184,490 UART:
20,184,669 UART: [state] CFI Enabled
20,245,957 UART: [fht] FMC Alias Private Key: 7
22,010,595 UART: [art] Extend RT PCRs Done
22,011,819 UART: [art] Lock RT PCRs Done
22,013,472 UART: [art] Populate DV Done
22,018,956 UART: [fht] FMC Alias Private Key: 7
22,020,654 UART: [art] Derive CDI
22,021,476 UART: [art] Store in in slot 0x4
22,078,692 UART: [art] Derive Key Pair
22,079,736 UART: [art] Store priv key in slot 0x5
24,543,040 UART: [art] Derive Key Pair - Done
24,555,930 UART: [art] Signing Cert with AUTHO
24,557,229 UART: RITY.KEYID = 7
26,283,004 UART: [art] Erasing AUTHORITY.KEYID = 7
26,284,525 UART: [art] PUB.X = 531F5A4BC3B6D3F2D13EE9F85524C383F21CD81F9865F0395C0586975900AB066FCAB90248D7B6DE29167341389A0D30
26,291,751 UART: [art] PUB.Y = ADD6653EBCD674E04AA8DF2320B71156091648E9A847A72893B7AD1A688646FC38F713827C4037576DE4991A8ECAF8F5
26,299,000 UART: [art] SIG.R = CCCC9D8ECDF0463C3A35EFCEBBE02BB9DC3251FB662332E6E4DBB79995804A4ECEAAE443E6AFF8995F3FD0A2C1905DD7
26,306,448 UART: [art] SIG.S = 5F60CEE1FE7E1CD0D98D06BE30171D3520F3A6A1FA2175B073026B2344D9A6D8A5344BB7E9C6E68C1B4B4391594A9B2B
27,285,316 UART: Caliptra RT
27,286,005 UART: [state] CFI Enabled
27,450,369 UART: [rt] RT listening for mailbox commands...
27,452,667 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,607,990 UART: [rt]cmd =0x41544d4e, len=14344
30,962,424 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,866 writing to cptra_bootfsm_go
3,438,332 ready_for_fw is high
3,438,918 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,828,686 >>> mbox cmd response: success
20,114,016 UART:
20,114,425 UART: Running Caliptra FMC ...
20,115,538 UART:
20,115,694 UART: [state] CFI Enabled
20,180,602 UART: [fht] FMC Alias Private Key: 7
21,944,935 UART: [art] Extend RT PCRs Done
21,946,155 UART: [art] Lock RT PCRs Done
21,947,916 UART: [art] Populate DV Done
21,953,547 UART: [fht] FMC Alias Private Key: 7
21,955,195 UART: [art] Derive CDI
21,955,934 UART: [art] Store in in slot 0x4
22,015,141 UART: [art] Derive Key Pair
22,016,186 UART: [art] Store priv key in slot 0x5
24,478,779 UART: [art] Derive Key Pair - Done
24,491,822 UART: [art] Signing Cert with AUTHO
24,493,165 UART: RITY.KEYID = 7
26,203,871 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,390 UART: [art] PUB.X = CF7E41621B91768B7989584CAA2026CD0BF501FA570026E39CACA12163137AA8FD5A9C71321616F79A66224784A44F61
26,212,619 UART: [art] PUB.Y = ABDD80406508C456FAD3E791F8831BF345EE57B30D41B9D68BB311C737226564C37F88F776376B78C0355275E4CF7DB5
26,219,853 UART: [art] SIG.R = 82E4B850B60B6D816F328364994BF70951D9112812E625246D8A0ADC4DE302E0D64F86C20C3D186DB3F358ED580BBF85
26,227,206 UART: [art] SIG.S = B4E8116284945ED8FAE0CC5EFEBD4FBD6EC44250E17B6D45CD3A35324FAB9E9F3AE50A62D4EF3643A720E5108DAA1002
27,206,223 UART: Caliptra RT
27,206,914 UART: [state] CFI Enabled
27,370,919 UART: [rt] RT listening for mailbox commands...
27,373,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,460 UART: [rt]cmd =0x41544d4e, len=14344
30,898,028 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,590 UART:
192,953 UART: Running Caliptra ROM ...
194,093 UART:
603,824 UART: [state] CFI Enabled
620,187 UART: [state] LifecycleState = Unprovisioned
622,496 UART: [state] DebugLocked = No
623,881 UART: [state] WD Timer not started. Device not locked for debugging
627,836 UART: [kat] SHA2-256
817,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,521 UART: [kat] ++
829,040 UART: [kat] sha1
839,558 UART: [kat] SHA2-256
842,585 UART: [kat] SHA2-384
849,289 UART: [kat] SHA2-512-ACC
851,875 UART: [kat] ECC-384
3,296,767 UART: [kat] HMAC-384Kdf
3,310,121 UART: [kat] LMS
3,841,907 UART: [kat] --
3,846,479 UART: [cold-reset] ++
3,848,977 UART: [fht] FHT @ 0x50003400
3,860,969 UART: [idev] ++
3,861,709 UART: [idev] CDI.KEYID = 6
3,862,598 UART: [idev] SUBJECT.KEYID = 7
3,863,839 UART: [idev] UDS.KEYID = 0
3,864,742 ready_for_fw is high
3,864,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,413 UART: [idev] Erasing UDS.KEYID = 0
6,337,071 UART: [idev] Sha1 KeyId Algorithm
6,359,461 UART: [idev] --
6,363,508 UART: [ldev] ++
6,364,074 UART: [ldev] CDI.KEYID = 6
6,365,141 UART: [ldev] SUBJECT.KEYID = 5
6,366,249 UART: [ldev] AUTHORITY.KEYID = 7
6,367,424 UART: [ldev] FE.KEYID = 1
6,376,390 UART: [ldev] Erasing FE.KEYID = 1
8,853,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,692 UART: [ldev] --
10,643,305 UART: [fwproc] Wait for Commands...
10,646,316 UART: [fwproc] Recv command 0x46574c44
10,648,616 UART: [fwproc] Recv'd Img size: 114360 bytes
15,273,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,351,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,467,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,010,408 >>> mbox cmd response: success
16,013,787 UART: [afmc] ++
16,014,533 UART: [afmc] CDI.KEYID = 6
16,015,724 UART: [afmc] SUBJECT.KEYID = 7
16,017,153 UART: [afmc] AUTHORITY.KEYID = 5
18,520,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,242,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,244,281 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,259,392 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,274,579 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,289,421 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,313,147 UART: [afmc] --
20,316,096 UART: [cold-reset] --
20,319,868 UART: [state] Locking Datavault
20,325,600 UART: [state] Locking PCR0, PCR1 and PCR31
20,327,780 UART: [state] Locking ICCM
20,329,953 UART: [exit] Launching FMC @ 0x40000130
20,338,617 UART:
20,338,889 UART: Running Caliptra FMC ...
20,339,992 UART:
20,340,148 UART: [state] CFI Enabled
20,348,082 UART: [fht] FMC Alias Private Key: 7
22,104,760 UART: [art] Extend RT PCRs Done
22,105,973 UART: [art] Lock RT PCRs Done
22,107,794 UART: [art] Populate DV Done
22,113,207 UART: [fht] FMC Alias Private Key: 7
22,114,794 UART: [art] Derive CDI
22,115,527 UART: [art] Store in in slot 0x4
22,158,385 UART: [art] Derive Key Pair
22,159,400 UART: [art] Store priv key in slot 0x5
24,585,998 UART: [art] Derive Key Pair - Done
24,598,833 UART: [art] Signing Cert with AUTHO
24,600,141 UART: RITY.KEYID = 7
26,306,038 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,550 UART: [art] PUB.X = DEDEB7812DFDCFB5E43C653D79FD0FA45A2FD3438051E74FC0D273418950AEFB6C8779CBED17C74AFD3DB4FAA7EBA56A
26,314,864 UART: [art] PUB.Y = 080EA61907460F7FE424D8D9B15FF4E617A7D4DB3D8EE9CA5396B43CF3EA8D199363B59817DF90F84DCC99B1896B6BED
26,322,096 UART: [art] SIG.R = 547E93F6027A97A2C5CB557593A8053D6072768D0C562A5E20667292D78D87FF75BFFA58B0C3D4F2835BEC8A9F578097
26,329,493 UART: [art] SIG.S = 33BC573517CC2E8BE2B765000C5FF19E5A624C6CEBACC6EF70EEC3D6FBE6E267B676CC1CCBBAD7FF27A6C4141154225B
27,308,476 UART: Caliptra RT
27,309,188 UART: [state] CFI Enabled
27,427,387 UART: [rt] RT listening for mailbox commands...
27,429,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,584,980 UART: [rt]cmd =0x41544d4e, len=14344
30,942,561 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,754,226 ready_for_fw is high
3,754,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,088,409 >>> mbox cmd response: success
20,340,203 UART:
20,340,593 UART: Running Caliptra FMC ...
20,341,728 UART:
20,341,888 UART: [state] CFI Enabled
20,349,505 UART: [fht] FMC Alias Private Key: 7
22,105,740 UART: [art] Extend RT PCRs Done
22,106,967 UART: [art] Lock RT PCRs Done
22,108,548 UART: [art] Populate DV Done
22,113,794 UART: [fht] FMC Alias Private Key: 7
22,115,329 UART: [art] Derive CDI
22,116,144 UART: [art] Store in in slot 0x4
22,158,575 UART: [art] Derive Key Pair
22,159,582 UART: [art] Store priv key in slot 0x5
24,585,838 UART: [art] Derive Key Pair - Done
24,599,440 UART: [art] Signing Cert with AUTHO
24,600,795 UART: RITY.KEYID = 7
26,306,246 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,741 UART: [art] PUB.X = 1E83CCFD685144F3C8E0B54A81DEDD15A084F35184515996314F16D2134725C84D86A04AF6CEDBE7E72A9ED66AF98AE5
26,315,048 UART: [art] PUB.Y = E9CB1E4283EC9DE2EDFAAC0CD9DE73AB994BDEB31D0CE089095135CE4262872BBE90B881CD63358D6CD501EC51980024
26,322,319 UART: [art] SIG.R = 825B6684594C732E76793288F6CBFC1C3B03427C5453ED5DBB3E9FD1AE2F01B52F3C7DF79A627596F2284C8CC5F0B3C8
26,329,725 UART: [art] SIG.S = FEBA74D08C6DDF114C15D3A2383DF60BC8950BC51B1CA26A97C22F600341EC7AB22CED3D7E984F5880B0DDDD690C4EDF
27,308,728 UART: Caliptra RT
27,309,438 UART: [state] CFI Enabled
27,426,518 UART: [rt] RT listening for mailbox commands...
27,428,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,584,084 UART: [rt]cmd =0x41544d4e, len=14344
30,944,230 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,487 UART: [kat] SHA2-256
882,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,533 UART: [kat] ++
886,685 UART: [kat] sha1
890,897 UART: [kat] SHA2-256
892,835 UART: [kat] SHA2-384
895,578 UART: [kat] SHA2-512-ACC
897,479 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,586 UART: [kat] LMS
1,475,782 UART: [kat] --
1,476,673 UART: [cold-reset] ++
1,477,231 UART: [fht] Storing FHT @ 0x50003400
1,480,126 UART: [idev] ++
1,480,294 UART: [idev] CDI.KEYID = 6
1,480,654 UART: [idev] SUBJECT.KEYID = 7
1,481,078 UART: [idev] UDS.KEYID = 0
1,481,423 ready_for_fw is high
1,481,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,682 UART: [idev] Erasing UDS.KEYID = 0
1,506,170 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,830 UART: [idev] --
1,515,785 UART: [ldev] ++
1,515,953 UART: [ldev] CDI.KEYID = 6
1,516,316 UART: [ldev] SUBJECT.KEYID = 5
1,516,742 UART: [ldev] AUTHORITY.KEYID = 7
1,517,205 UART: [ldev] FE.KEYID = 1
1,522,337 UART: [ldev] Erasing FE.KEYID = 1
1,547,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,254 UART: [ldev] --
1,587,575 UART: [fwproc] Waiting for Commands...
1,588,342 UART: [fwproc] Received command 0x46574c44
1,589,133 UART: [fwproc] Received Image of size 114360 bytes
5,047,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,076,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,105,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,241,340 >>> mbox cmd response: success
5,242,502 UART: [afmc] ++
5,242,670 UART: [afmc] CDI.KEYID = 6
5,243,032 UART: [afmc] SUBJECT.KEYID = 7
5,243,457 UART: [afmc] AUTHORITY.KEYID = 5
5,278,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,294,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,295,175 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,300,884 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,306,776 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,312,477 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,320,241 UART: [afmc] --
5,321,321 UART: [cold-reset] --
5,322,075 UART: [state] Locking Datavault
5,323,476 UART: [state] Locking PCR0, PCR1 and PCR31
5,324,080 UART: [state] Locking ICCM
5,324,686 UART: [exit] Launching FMC @ 0x40000130
5,330,015 UART:
5,330,031 UART: Running Caliptra FMC ...
5,330,439 UART:
5,330,493 UART: [state] CFI Enabled
5,341,017 UART: [fht] FMC Alias Private Key: 7
5,448,355 UART: [art] Extend RT PCRs Done
5,448,783 UART: [art] Lock RT PCRs Done
5,450,289 UART: [art] Populate DV Done
5,458,557 UART: [fht] FMC Alias Private Key: 7
5,459,585 UART: [art] Derive CDI
5,459,865 UART: [art] Store in in slot 0x4
5,545,958 UART: [art] Derive Key Pair
5,546,318 UART: [art] Store priv key in slot 0x5
5,559,494 UART: [art] Derive Key Pair - Done
5,574,189 UART: [art] Signing Cert with AUTHO
5,574,669 UART: RITY.KEYID = 7
5,589,651 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,416 UART: [art] PUB.X = 8F95B4466763B0309D73E7F0EBB2E9051D6E04A1BC9F581896581FA00197F3FAF32D9D5C04367B848AC4BD6629DB452A
5,597,178 UART: [art] PUB.Y = E364D8766AC957C5445F35F9246095F1E6846CF0A344BC7EA6FE6E6780307074D7F18472AEF277B63367FE38057E4662
5,604,119 UART: [art] SIG.R = 01B95DA2A328620D3B2CC0D027C692A1EFE022CC3091D499362BEED9B397B94B836B35A6C364BB4835A28606E040C325
5,610,882 UART: [art] SIG.S = 5E63849C8BF676FE225A4E831DB77111A67CBBFCE5B3CA8DA34C1863DD9B21756E61443F79D945BCF73CF74251CA7BD6
5,634,669 UART: Caliptra RT
5,634,923 UART: [state] CFI Enabled
5,743,050 UART: [rt] RT listening for mailbox commands...
5,743,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,866,407 UART: [rt]cmd =0x41544d4e, len=14344
6,506,391 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 ready_for_fw is high
1,362,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,390,792 >>> mbox cmd response: success
5,452,329 UART:
5,452,345 UART: Running Caliptra FMC ...
5,452,753 UART:
5,452,807 UART: [state] CFI Enabled
5,463,267 UART: [fht] FMC Alias Private Key: 7
5,571,155 UART: [art] Extend RT PCRs Done
5,571,583 UART: [art] Lock RT PCRs Done
5,573,167 UART: [art] Populate DV Done
5,581,579 UART: [fht] FMC Alias Private Key: 7
5,582,533 UART: [art] Derive CDI
5,582,813 UART: [art] Store in in slot 0x4
5,668,820 UART: [art] Derive Key Pair
5,669,180 UART: [art] Store priv key in slot 0x5
5,681,544 UART: [art] Derive Key Pair - Done
5,696,383 UART: [art] Signing Cert with AUTHO
5,696,863 UART: RITY.KEYID = 7
5,711,749 UART: [art] Erasing AUTHORITY.KEYID = 7
5,712,514 UART: [art] PUB.X = 66FE1BC71B56DAF2B296CF23949BBA10A30B54FE35FBC93CC09281C8B763B7E433B2F8788D4EC2E3DAF5BF01CF3C544F
5,719,300 UART: [art] PUB.Y = 5DAF46BCA03A1E1E475390C944CCD7F7177DE273FD3A59DD5BF7AB4C7B528479AD9235361A3937C4763D5F1A8AB9743A
5,726,262 UART: [art] SIG.R = 80FC137EFAA0B52AF2EEBC675F0FEA568DA5FDFE7CFB66884AA877A9C9A7131183BB2A5053EE9E6CAEDA60D0AD60CE60
5,733,061 UART: [art] SIG.S = 51D4A2A53B47D63CFB2786CDA0F6FF0ADCD494ECD7548E22C41135F33472CAA51895D86CB9DECF6887744E4115BDE371
5,757,119 UART: Caliptra RT
5,757,373 UART: [state] CFI Enabled
5,866,535 UART: [rt] RT listening for mailbox commands...
5,867,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,028 UART: [rt]cmd =0x41544d4e, len=14344
6,646,931 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,462 UART: [kat] SHA2-256
892,400 UART: [kat] SHA2-384
895,101 UART: [kat] SHA2-512-ACC
897,002 UART: [kat] ECC-384
902,907 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,944 UART: [fht] Storing FHT @ 0x50003400
1,479,653 UART: [idev] ++
1,479,821 UART: [idev] CDI.KEYID = 6
1,480,181 UART: [idev] SUBJECT.KEYID = 7
1,480,605 UART: [idev] UDS.KEYID = 0
1,480,950 ready_for_fw is high
1,480,950 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,827 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,515,150 UART: [ldev] ++
1,515,318 UART: [ldev] CDI.KEYID = 6
1,515,681 UART: [ldev] SUBJECT.KEYID = 5
1,516,107 UART: [ldev] AUTHORITY.KEYID = 7
1,516,570 UART: [ldev] FE.KEYID = 1
1,521,708 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,435 UART: [ldev] --
1,586,728 UART: [fwproc] Waiting for Commands...
1,587,395 UART: [fwproc] Received command 0x46574c44
1,588,186 UART: [fwproc] Received Image of size 114360 bytes
5,008,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,037,015 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,066,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,202,196 >>> mbox cmd response: success
5,203,250 UART: [afmc] ++
5,203,418 UART: [afmc] CDI.KEYID = 6
5,203,780 UART: [afmc] SUBJECT.KEYID = 7
5,204,205 UART: [afmc] AUTHORITY.KEYID = 5
5,239,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,256,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,256,821 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,262,530 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,268,422 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,274,123 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,281,919 UART: [afmc] --
5,282,971 UART: [cold-reset] --
5,283,847 UART: [state] Locking Datavault
5,284,830 UART: [state] Locking PCR0, PCR1 and PCR31
5,285,434 UART: [state] Locking ICCM
5,286,004 UART: [exit] Launching FMC @ 0x40000130
5,291,333 UART:
5,291,349 UART: Running Caliptra FMC ...
5,291,757 UART:
5,291,900 UART: [state] CFI Enabled
5,302,066 UART: [fht] FMC Alias Private Key: 7
5,410,480 UART: [art] Extend RT PCRs Done
5,410,908 UART: [art] Lock RT PCRs Done
5,412,550 UART: [art] Populate DV Done
5,420,876 UART: [fht] FMC Alias Private Key: 7
5,422,010 UART: [art] Derive CDI
5,422,290 UART: [art] Store in in slot 0x4
5,508,035 UART: [art] Derive Key Pair
5,508,395 UART: [art] Store priv key in slot 0x5
5,521,721 UART: [art] Derive Key Pair - Done
5,536,498 UART: [art] Signing Cert with AUTHO
5,536,978 UART: RITY.KEYID = 7
5,551,948 UART: [art] Erasing AUTHORITY.KEYID = 7
5,552,713 UART: [art] PUB.X = BCF9C1137F4832F654AB0A9F2F2D37ABFF43EA59A7CFA2DD02C2ABDEF1D6DE7668B28487E2F162ED2310479F08912852
5,559,490 UART: [art] PUB.Y = 98107F43975EAEAB7CB1C07188D7D856FA6A1B26960FAAB9064402A1007277E6C752676146F34E3E3E22667E3D1DB647
5,566,407 UART: [art] SIG.R = 8AF3291B72E4AB97A032CBE382FBE69FBE444CE5D2B329ED5463A731391287F6B1622E2BA29158ACDEE48DBCF48B3BDF
5,573,197 UART: [art] SIG.S = C7DC0D076995649D60DDF3D982AE38BB12549647106068CF2ECB1151E6F71FC2ECB598568D35473F6B5501D8CAA176BF
5,597,043 UART: Caliptra RT
5,597,389 UART: [state] CFI Enabled
5,705,706 UART: [rt] RT listening for mailbox commands...
5,706,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,829,127 UART: [rt]cmd =0x41544d4e, len=14344
6,480,448 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,092 ready_for_fw is high
1,363,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,316,361 >>> mbox cmd response: success
5,377,290 UART:
5,377,306 UART: Running Caliptra FMC ...
5,377,714 UART:
5,377,857 UART: [state] CFI Enabled
5,388,719 UART: [fht] FMC Alias Private Key: 7
5,496,821 UART: [art] Extend RT PCRs Done
5,497,249 UART: [art] Lock RT PCRs Done
5,498,987 UART: [art] Populate DV Done
5,507,315 UART: [fht] FMC Alias Private Key: 7
5,508,435 UART: [art] Derive CDI
5,508,715 UART: [art] Store in in slot 0x4
5,594,434 UART: [art] Derive Key Pair
5,594,794 UART: [art] Store priv key in slot 0x5
5,608,102 UART: [art] Derive Key Pair - Done
5,622,987 UART: [art] Signing Cert with AUTHO
5,623,467 UART: RITY.KEYID = 7
5,638,623 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,388 UART: [art] PUB.X = 5CABB8CF5507212599796CCE9D32719461515B7B73B5ABB7543126FA2BBDC34D56350BF37339CAC24D1659D34CA93648
5,646,154 UART: [art] PUB.Y = 26BA90776B89BDF70E3E265E69FEFC07B1C4CDE7F6698C56AE1C0F9251EC5E700EC93A9C1CDA1C9C79C890FB76381494
5,653,108 UART: [art] SIG.R = 9792A0EE409FB669A45480FC1751E911B97564C23CDE02F503BABB35257C76E1087F9D1D5FBA6AD6713D18E250089197
5,659,866 UART: [art] SIG.S = D22B6A9B45EBE4283267B0F557114C3FAB8432E5B304F1867CE82651CD67E1C9A23B41911C809601B9E5C94A74FFF630
5,683,257 UART: Caliptra RT
5,683,603 UART: [state] CFI Enabled
5,791,074 UART: [rt] RT listening for mailbox commands...
5,791,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,914,513 UART: [rt]cmd =0x41544d4e, len=14344
6,563,879 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
893,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,551 UART: [kat] ++
897,703 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
918,040 UART: [kat] HMAC-384Kdf
922,622 UART: [kat] LMS
1,170,950 UART: [kat] --
1,171,817 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,174,966 UART: [idev] ++
1,175,134 UART: [idev] CDI.KEYID = 6
1,175,494 UART: [idev] SUBJECT.KEYID = 7
1,175,918 UART: [idev] UDS.KEYID = 0
1,176,263 ready_for_fw is high
1,176,263 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,639 UART: [idev] Sha1 KeyId Algorithm
1,209,001 UART: [idev] --
1,210,225 UART: [ldev] ++
1,210,393 UART: [ldev] CDI.KEYID = 6
1,210,756 UART: [ldev] SUBJECT.KEYID = 5
1,211,182 UART: [ldev] AUTHORITY.KEYID = 7
1,211,645 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,856 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 114360 bytes
3,118,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,311,495 >>> mbox cmd response: success
3,312,659 UART: [afmc] ++
3,312,827 UART: [afmc] CDI.KEYID = 6
3,313,189 UART: [afmc] SUBJECT.KEYID = 7
3,313,614 UART: [afmc] AUTHORITY.KEYID = 5
3,349,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,091 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,800 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,692 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,403 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,280 UART: [afmc] --
3,393,332 UART: [cold-reset] --
3,394,334 UART: [state] Locking Datavault
3,395,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,921 UART: [state] Locking ICCM
3,396,481 UART: [exit] Launching FMC @ 0x40000130
3,401,810 UART:
3,401,826 UART: Running Caliptra FMC ...
3,402,234 UART:
3,402,288 UART: [state] CFI Enabled
3,412,634 UART: [fht] FMC Alias Private Key: 7
3,521,140 UART: [art] Extend RT PCRs Done
3,521,568 UART: [art] Lock RT PCRs Done
3,523,026 UART: [art] Populate DV Done
3,531,564 UART: [fht] FMC Alias Private Key: 7
3,532,734 UART: [art] Derive CDI
3,533,014 UART: [art] Store in in slot 0x4
3,618,371 UART: [art] Derive Key Pair
3,618,731 UART: [art] Store priv key in slot 0x5
3,631,823 UART: [art] Derive Key Pair - Done
3,646,409 UART: [art] Signing Cert with AUTHO
3,646,889 UART: RITY.KEYID = 7
3,662,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,776 UART: [art] PUB.X = 60274BB8266724557E0B41788626B0CDFD3074CDFE154EB8C1B55FDF1E21298BEDA7ABEDB6636EB8D8D3F40A6674AA9C
3,669,556 UART: [art] PUB.Y = F66F409B1FDDB7266E5FF160B8DD3EFEB26BEA13687DA5F756FD58D1BBD9787B8A55D10604299D237636B7810FBEC3AB
3,676,515 UART: [art] SIG.R = BE50FAF609E50A87C78AC0F3C2E159BB96DEDF5851A018CA58A7ECA1E36ABD207BEDA348C79A2AC57D740A32B9FB11D8
3,683,302 UART: [art] SIG.S = 8A332249177E0B0AF0A905B230C9B6FBC98C2111048369DD4767910382D7EC9929583A44EB2B04657CDC2FA79DA808B4
3,706,850 UART: Caliptra RT
3,707,104 UART: [state] CFI Enabled
3,814,330 UART: [rt] RT listening for mailbox commands...
3,815,000 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,443 UART: [rt]cmd =0x41544d4e, len=14344
4,581,993 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,009 ready_for_fw is high
1,061,009 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,179,372 >>> mbox cmd response: success
3,241,237 UART:
3,241,253 UART: Running Caliptra FMC ...
3,241,661 UART:
3,241,715 UART: [state] CFI Enabled
3,252,103 UART: [fht] FMC Alias Private Key: 7
3,360,343 UART: [art] Extend RT PCRs Done
3,360,771 UART: [art] Lock RT PCRs Done
3,362,089 UART: [art] Populate DV Done
3,370,165 UART: [fht] FMC Alias Private Key: 7
3,371,133 UART: [art] Derive CDI
3,371,413 UART: [art] Store in in slot 0x4
3,456,890 UART: [art] Derive Key Pair
3,457,250 UART: [art] Store priv key in slot 0x5
3,470,224 UART: [art] Derive Key Pair - Done
3,484,974 UART: [art] Signing Cert with AUTHO
3,485,454 UART: RITY.KEYID = 7
3,500,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,433 UART: [art] PUB.X = 14A3A5AAD57B9680D2F3C970B1E857093C13F2ABC46F58CAB8A5016EB26205A1E8AF1CE3051E39A589D7E1F5CB127CCB
3,508,207 UART: [art] PUB.Y = 02175B620D167D316CDA8390E260E556810B7BBC123F8F31D9C65525EE23E80C110D5954846654454589BB9BA1D91245
3,515,132 UART: [art] SIG.R = E0E9530FB72FD358B5E5B07B3C842F676764D78CE6A8C85506B3DF90363A5B01799BA2E6F1D7C29616FB75F543A5B3E4
3,521,899 UART: [art] SIG.S = 112B9C55861D6CC7C562EFDBFFF1101C6E83E66F2A0E40AED67CEC70EE067DB71BFE1A8BACEA967CA2D38A7D420DDE26
3,546,171 UART: Caliptra RT
3,546,425 UART: [state] CFI Enabled
3,654,846 UART: [rt] RT listening for mailbox commands...
3,655,516 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,005 UART: [rt]cmd =0x41544d4e, len=14344
4,432,269 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
893,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,662 UART: [kat] ++
897,814 UART: [kat] sha1
902,248 UART: [kat] SHA2-256
904,188 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,455 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,349 UART: [idev] ++
1,175,517 UART: [idev] CDI.KEYID = 6
1,175,877 UART: [idev] SUBJECT.KEYID = 7
1,176,301 UART: [idev] UDS.KEYID = 0
1,176,646 ready_for_fw is high
1,176,646 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,659 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,506 UART: [ldev] --
1,283,983 UART: [fwproc] Wait for Commands...
1,284,779 UART: [fwproc] Recv command 0x46574c44
1,285,507 UART: [fwproc] Recv'd Img size: 114360 bytes
3,124,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,317,918 >>> mbox cmd response: success
3,319,084 UART: [afmc] ++
3,319,252 UART: [afmc] CDI.KEYID = 6
3,319,614 UART: [afmc] SUBJECT.KEYID = 7
3,320,039 UART: [afmc] AUTHORITY.KEYID = 5
3,356,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,362 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,071 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,963 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,674 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,469 UART: [afmc] --
3,399,363 UART: [cold-reset] --
3,399,983 UART: [state] Locking Datavault
3,401,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,742 UART: [state] Locking ICCM
3,402,290 UART: [exit] Launching FMC @ 0x40000130
3,407,619 UART:
3,407,635 UART: Running Caliptra FMC ...
3,408,043 UART:
3,408,186 UART: [state] CFI Enabled
3,418,566 UART: [fht] FMC Alias Private Key: 7
3,526,848 UART: [art] Extend RT PCRs Done
3,527,276 UART: [art] Lock RT PCRs Done
3,528,550 UART: [art] Populate DV Done
3,536,610 UART: [fht] FMC Alias Private Key: 7
3,537,742 UART: [art] Derive CDI
3,538,022 UART: [art] Store in in slot 0x4
3,623,259 UART: [art] Derive Key Pair
3,623,619 UART: [art] Store priv key in slot 0x5
3,636,843 UART: [art] Derive Key Pair - Done
3,651,747 UART: [art] Signing Cert with AUTHO
3,652,227 UART: RITY.KEYID = 7
3,667,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,968 UART: [art] PUB.X = 0D9B48D9A164A5D3FA6416CDDF2B4CF3F01454936CA992F9EA2D637D0A291F75FB200411121629B9AF9A451176E4113C
3,674,733 UART: [art] PUB.Y = 8735123FD36C21101EDC02FCB52AFD622AAF48B195E5642F72C7E06200CFDB6F97E5582C0E46CEEEB7E6322D68654E08
3,681,662 UART: [art] SIG.R = 8C87E2EA1335DFF85F9D82351211F99AB3B318BE2871774487203C34B1F931BC6781DAB37D6E0AA8C05A42B0BD2FACE3
3,688,439 UART: [art] SIG.S = 45B62223F713EFCEF8CF309DB9353F297905E15AF1E4A9E26DE21BE0136D5A1E327043D7FC025C635B3C730F776DA93C
3,712,667 UART: Caliptra RT
3,713,013 UART: [state] CFI Enabled
3,820,492 UART: [rt] RT listening for mailbox commands...
3,821,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,839 UART: [rt]cmd =0x41544d4e, len=14344
4,590,864 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,070 ready_for_fw is high
1,061,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,173,727 >>> mbox cmd response: success
3,236,068 UART:
3,236,084 UART: Running Caliptra FMC ...
3,236,492 UART:
3,236,635 UART: [state] CFI Enabled
3,247,253 UART: [fht] FMC Alias Private Key: 7
3,355,027 UART: [art] Extend RT PCRs Done
3,355,455 UART: [art] Lock RT PCRs Done
3,356,851 UART: [art] Populate DV Done
3,365,037 UART: [fht] FMC Alias Private Key: 7
3,366,213 UART: [art] Derive CDI
3,366,493 UART: [art] Store in in slot 0x4
3,452,102 UART: [art] Derive Key Pair
3,452,462 UART: [art] Store priv key in slot 0x5
3,465,026 UART: [art] Derive Key Pair - Done
3,479,912 UART: [art] Signing Cert with AUTHO
3,480,392 UART: RITY.KEYID = 7
3,495,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,433 UART: [art] PUB.X = BDB00924B201BEE82B5FEEC2E6D2CDC6C80C3457A8C1F204400AA8C4BD211D766089AD16F2208FD26EA664C2BC224C93
3,503,204 UART: [art] PUB.Y = AA7DDA72F08D6DB8B7E2AC0FC7D8C901FB076D3E776E463E8FD31A663571CCC0D77BAAC0CD3195BB05BE5FC267F5DB24
3,510,170 UART: [art] SIG.R = 8FB41E1B17399761647CA6B2249C9A5586906457EF8A450196054FEFBA58154AEA44B66D39CF86FE1FCD10630E315572
3,516,929 UART: [art] SIG.S = 0CAAC4AE4E90A0EACD0818CCCCC03686B66EFB77CAE281611619210120FD8B63E88EFE8D16E9F4A743BB4BE21600069D
3,540,492 UART: Caliptra RT
3,540,838 UART: [state] CFI Enabled
3,648,885 UART: [rt] RT listening for mailbox commands...
3,649,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,398 UART: [rt]cmd =0x41544d4e, len=14344
4,421,920 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
891,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,707 UART: [kat] ++
895,859 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,174,617 ready_for_fw is high
1,174,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,839 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,656 UART: [ldev] --
1,282,168 UART: [fwproc] Wait for Commands...
1,282,883 UART: [fwproc] Recv command 0x46574c44
1,283,616 UART: [fwproc] Recv'd Img size: 114360 bytes
3,123,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,316,168 >>> mbox cmd response: success
3,317,217 UART: [afmc] ++
3,317,385 UART: [afmc] CDI.KEYID = 6
3,317,748 UART: [afmc] SUBJECT.KEYID = 7
3,318,174 UART: [afmc] AUTHORITY.KEYID = 5
3,353,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,481 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,191 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,081 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,792 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,714 UART: [afmc] --
3,396,824 UART: [cold-reset] --
3,397,648 UART: [state] Locking Datavault
3,398,827 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,431 UART: [state] Locking ICCM
3,400,091 UART: [exit] Launching FMC @ 0x40000130
3,405,420 UART:
3,405,436 UART: Running Caliptra FMC ...
3,405,844 UART:
3,405,898 UART: [state] CFI Enabled
3,416,522 UART: [fht] FMC Alias Private Key: 7
3,524,238 UART: [art] Extend RT PCRs Done
3,524,666 UART: [art] Lock RT PCRs Done
3,526,138 UART: [art] Populate DV Done
3,534,302 UART: [fht] FMC Alias Private Key: 7
3,535,456 UART: [art] Derive CDI
3,535,736 UART: [art] Store in in slot 0x4
3,621,215 UART: [art] Derive Key Pair
3,621,575 UART: [art] Store priv key in slot 0x5
3,634,501 UART: [art] Derive Key Pair - Done
3,649,792 UART: [art] Signing Cert with AUTHO
3,650,272 UART: RITY.KEYID = 7
3,665,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,007 UART: [art] PUB.X = 2D7F43D0CBFA94A8198CAC9671C671216ABF590587B30051B7F791859B55019D3428AC8C23C676773B443D6A4005991C
3,672,740 UART: [art] PUB.Y = 4C11C771A737B5D638CD6B73BB6EA326E390C94419BDFCA7795E85235963A95F32B9B3BBF3948AB8F8975D105B1DBDFC
3,679,702 UART: [art] SIG.R = 9D577B18059CA0D4A3A3A3E12258940C6FBBC501D7A39E4E930275967A797D101FD9640FFDCAF4B5AE585961299F772C
3,686,461 UART: [art] SIG.S = 66589DDE09A17A727055E3EEED049C72B4E529909C64BA9799A7C7CC7E031F2D1061EEF1D5408C2E5F755386A832CB80
3,710,411 UART: Caliptra RT
3,710,665 UART: [state] CFI Enabled
3,818,148 UART: [rt] RT listening for mailbox commands...
3,818,818 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,591 UART: [rt]cmd =0x41544d4e, len=14344
4,585,963 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,260 ready_for_fw is high
1,056,260 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,805 >>> mbox cmd response: success
3,233,404 UART:
3,233,420 UART: Running Caliptra FMC ...
3,233,828 UART:
3,233,882 UART: [state] CFI Enabled
3,244,386 UART: [fht] FMC Alias Private Key: 7
3,352,342 UART: [art] Extend RT PCRs Done
3,352,770 UART: [art] Lock RT PCRs Done
3,354,476 UART: [art] Populate DV Done
3,362,746 UART: [fht] FMC Alias Private Key: 7
3,363,716 UART: [art] Derive CDI
3,363,996 UART: [art] Store in in slot 0x4
3,449,455 UART: [art] Derive Key Pair
3,449,815 UART: [art] Store priv key in slot 0x5
3,462,439 UART: [art] Derive Key Pair - Done
3,477,075 UART: [art] Signing Cert with AUTHO
3,477,555 UART: RITY.KEYID = 7
3,492,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,254 UART: [art] PUB.X = DDFDFE62301CBFA3E69CBE1995AA7116CC0818954C081ACC928976A61CEE822984BD9F26B633D2ABCE4FD3AA9FC864E4
3,500,040 UART: [art] PUB.Y = 2F8B402077F5C2ADC87ADD9D2EE3BEBD68E6B23322F659D1058A4494278EFED042F966C8445BDBD382E19BA1727F33AA
3,507,001 UART: [art] SIG.R = C583D9E6FD9018230628EAE28583D9AEF1A5B66DF32C2874FFB36A1433AEBE5350CCB6130983A97FB878CEDA84CC1A6C
3,513,781 UART: [art] SIG.S = B28D1AB4EC094F99085AE6DCDCCD374F279D5D7A681F33C17FD9CC7727EC105BD1CEB6BC04143CB9B3CF362DD9AF25B1
3,537,437 UART: Caliptra RT
3,537,691 UART: [state] CFI Enabled
3,645,217 UART: [rt] RT listening for mailbox commands...
3,645,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,392 UART: [rt]cmd =0x41544d4e, len=14344
4,417,908 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,173,992 ready_for_fw is high
1,173,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,644 UART: [idev] Erasing UDS.KEYID = 0
1,199,260 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,209,003 UART: [ldev] ++
1,209,171 UART: [ldev] CDI.KEYID = 6
1,209,535 UART: [ldev] SUBJECT.KEYID = 5
1,209,962 UART: [ldev] AUTHORITY.KEYID = 7
1,210,425 UART: [ldev] FE.KEYID = 1
1,215,869 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,237 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,428 UART: [fwproc] Recv command 0x46574c44
1,283,161 UART: [fwproc] Recv'd Img size: 114360 bytes
3,122,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,314,959 >>> mbox cmd response: success
3,316,008 UART: [afmc] ++
3,316,176 UART: [afmc] CDI.KEYID = 6
3,316,539 UART: [afmc] SUBJECT.KEYID = 7
3,316,965 UART: [afmc] AUTHORITY.KEYID = 5
3,353,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,264 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,974 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,864 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,575 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,365 UART: [afmc] --
3,396,395 UART: [cold-reset] --
3,397,505 UART: [state] Locking Datavault
3,398,618 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,222 UART: [state] Locking ICCM
3,399,834 UART: [exit] Launching FMC @ 0x40000130
3,405,163 UART:
3,405,179 UART: Running Caliptra FMC ...
3,405,587 UART:
3,405,730 UART: [state] CFI Enabled
3,416,212 UART: [fht] FMC Alias Private Key: 7
3,523,958 UART: [art] Extend RT PCRs Done
3,524,386 UART: [art] Lock RT PCRs Done
3,526,050 UART: [art] Populate DV Done
3,534,054 UART: [fht] FMC Alias Private Key: 7
3,535,112 UART: [art] Derive CDI
3,535,392 UART: [art] Store in in slot 0x4
3,621,405 UART: [art] Derive Key Pair
3,621,765 UART: [art] Store priv key in slot 0x5
3,635,365 UART: [art] Derive Key Pair - Done
3,649,903 UART: [art] Signing Cert with AUTHO
3,650,383 UART: RITY.KEYID = 7
3,665,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,314 UART: [art] PUB.X = 7320B01070336BE874751627B27711CB1155F31ECD66DC8BE28BC36C42384A339CB7010723047542BBDBFAFFDE91994E
3,673,075 UART: [art] PUB.Y = 7F52EC04722265C86A1F742D7516C5411DDCAF227ED391DA600980D53FF28F69525FC2B5194CA5C58D8BF60E2EDAE4C4
3,680,026 UART: [art] SIG.R = E369B56E46795677745E8EC70DE2CA661290F46FF71FA7E1E96D3EA58A2CB1BAD24838024949110B53ED14DC28C6993B
3,686,791 UART: [art] SIG.S = C462C00EECDA16E1B8E7E0D48C25B6BCBB1B88DB66EE0B183AFC1C3AAC07DD3F510E6841FC16C9FFE71E01AB75C773EB
3,710,701 UART: Caliptra RT
3,711,047 UART: [state] CFI Enabled
3,818,623 UART: [rt] RT listening for mailbox commands...
3,819,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,046 UART: [rt]cmd =0x41544d4e, len=14344
4,590,954 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 ready_for_fw is high
1,056,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,170,563 >>> mbox cmd response: success
3,232,954 UART:
3,232,970 UART: Running Caliptra FMC ...
3,233,378 UART:
3,233,521 UART: [state] CFI Enabled
3,244,209 UART: [fht] FMC Alias Private Key: 7
3,352,783 UART: [art] Extend RT PCRs Done
3,353,211 UART: [art] Lock RT PCRs Done
3,354,667 UART: [art] Populate DV Done
3,363,113 UART: [fht] FMC Alias Private Key: 7
3,364,277 UART: [art] Derive CDI
3,364,557 UART: [art] Store in in slot 0x4
3,450,094 UART: [art] Derive Key Pair
3,450,454 UART: [art] Store priv key in slot 0x5
3,463,860 UART: [art] Derive Key Pair - Done
3,479,017 UART: [art] Signing Cert with AUTHO
3,479,497 UART: RITY.KEYID = 7
3,495,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,990 UART: [art] PUB.X = 48AE3DAFFA131D90D7F5170692A40A7E8B093B9EE177AB3328B5D041620E76488B0647873C057CF7478A71B0EB63E7EB
3,502,746 UART: [art] PUB.Y = AAA54C8E9B3C4E88AC51B7455A986DA74354916C82804351AA3998F418ACC8336BC9727D88775E5D28CC483AB05811AB
3,509,698 UART: [art] SIG.R = C6ABEFEC632E4BF463CF31FB804A25A1890987C8337E8E041F09AD1551EB985E61DC513383493D1862DB95B21CA67DFA
3,516,469 UART: [art] SIG.S = 7430DF5A1F39B6C6F2B18630B7EDDF228EF11F6D6B5494064EF58D551EB7FFEE008668C90064A3540C949C25365F5CB2
3,539,816 UART: Caliptra RT
3,540,162 UART: [state] CFI Enabled
3,647,787 UART: [rt] RT listening for mailbox commands...
3,648,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,240 UART: [rt]cmd =0x41544d4e, len=14344
4,418,433 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,446 UART:
192,806 UART: Running Caliptra ROM ...
193,940 UART:
194,080 UART: [state] CFI Enabled
262,926 UART: [state] LifecycleState = Unprovisioned
264,920 UART: [state] DebugLocked = No
267,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,512 UART: [kat] SHA2-256
441,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,747 UART: [kat] ++
452,196 UART: [kat] sha1
463,060 UART: [kat] SHA2-256
465,715 UART: [kat] SHA2-384
471,910 UART: [kat] SHA2-512-ACC
474,270 UART: [kat] ECC-384
2,769,233 UART: [kat] HMAC-384Kdf
2,802,211 UART: [kat] LMS
3,992,503 UART: [kat] --
3,998,081 UART: [cold-reset] ++
3,999,730 UART: [fht] Storing FHT @ 0x50003400
4,012,213 UART: [idev] ++
4,012,773 UART: [idev] CDI.KEYID = 6
4,013,723 UART: [idev] SUBJECT.KEYID = 7
4,014,963 UART: [idev] UDS.KEYID = 0
4,015,945 ready_for_fw is high
4,016,132 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,548 UART: [idev] Erasing UDS.KEYID = 0
7,349,810 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,521 UART: [idev] --
7,375,021 UART: [ldev] ++
7,375,581 UART: [ldev] CDI.KEYID = 6
7,376,550 UART: [ldev] SUBJECT.KEYID = 5
7,377,749 UART: [ldev] AUTHORITY.KEYID = 7
7,379,032 UART: [ldev] FE.KEYID = 1
7,424,354 UART: [ldev] Erasing FE.KEYID = 1
10,755,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,381 UART: [ldev] --
13,119,317 UART: [fwproc] Waiting for Commands...
13,122,485 UART: [fwproc] Received command 0x46574c44
13,124,668 UART: [fwproc] Received Image of size 114036 bytes
17,168,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,632,850 >>> mbox cmd response: success
17,637,483 UART: [afmc] ++
17,638,073 UART: [afmc] CDI.KEYID = 6
17,639,036 UART: [afmc] SUBJECT.KEYID = 7
17,640,248 UART: [afmc] AUTHORITY.KEYID = 5
21,009,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,950 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,203 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,616 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,476 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,916 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,241 UART: [afmc] --
23,381,403 UART: [cold-reset] --
23,385,205 UART: [state] Locking Datavault
23,390,392 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,145 UART: [state] Locking ICCM
23,393,640 UART: [exit] Launching FMC @ 0x40000130
23,402,038 UART:
23,402,268 UART: Running Caliptra FMC ...
23,403,364 UART:
23,403,513 UART: [state] CFI Enabled
23,473,063 UART: [fht] FMC Alias Private Key: 7
25,810,871 UART: [art] Extend RT PCRs Done
25,812,559 UART: [art] Lock RT PCRs Done
25,813,626 UART: [art] Populate DV Done
25,819,053 UART: [fht] FMC Alias Private Key: 7
25,820,531 UART: [art] Derive CDI
25,821,288 UART: [art] Store in in slot 0x4
25,882,102 UART: [art] Derive Key Pair
25,883,102 UART: [art] Store priv key in slot 0x5
29,175,915 UART: [art] Derive Key Pair - Done
29,188,920 UART: [art] Signing Cert with AUTHO
29,190,227 UART: RITY.KEYID = 7
31,477,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,070 UART: [art] PUB.X = 42F45990ABF93E1F8D7CB1B4C82988411991D720636B069E1A929CD50AB7B54FF01F1F831CEAFA1D68816115D75FEBCC
31,486,296 UART: [art] PUB.Y = 5844B80B0304F55B7CD6C8513FEAE31787261106399D40C4214941C0158E3CADA3CDBCD9B054BFC50B5D88644BF8DB7E
31,493,589 UART: [art] SIG.R = BA57BBA9EBC15E2431A3ECB01871BAAE3DE2D667DDDB92455C85B527FB26958A6A5500BEE633C2380CC74756E4469744
31,500,981 UART: [art] SIG.S = 267B18D71CC72549D5783AB2ACBDF47082B881BF5E8034111B3E81A9B4E0F51052CDDF9E06BD05A332F2A1AC40161D95
32,805,401 UART: Caliptra RT
32,806,088 UART: [state] CFI Enabled
32,967,076 UART: [rt] RT listening for mailbox commands...
32,969,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,124,586 UART: [rt]cmd =0x41544d4e, len=14344
38,360,143 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,805,926 ready_for_fw is high
3,806,480 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,644 >>> mbox cmd response: success
23,570,660 UART:
23,571,050 UART: Running Caliptra FMC ...
23,572,154 UART:
23,572,302 UART: [state] CFI Enabled
23,640,298 UART: [fht] FMC Alias Private Key: 7
25,978,147 UART: [art] Extend RT PCRs Done
25,979,373 UART: [art] Lock RT PCRs Done
25,981,129 UART: [art] Populate DV Done
25,986,380 UART: [fht] FMC Alias Private Key: 7
25,987,920 UART: [art] Derive CDI
25,988,729 UART: [art] Store in in slot 0x4
26,049,555 UART: [art] Derive Key Pair
26,050,594 UART: [art] Store priv key in slot 0x5
29,343,130 UART: [art] Derive Key Pair - Done
29,356,298 UART: [art] Signing Cert with AUTHO
29,357,598 UART: RITY.KEYID = 7
31,647,716 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,223 UART: [art] PUB.X = 588E6E40AF31A7D1AB7E1BC8DC00CC361EFA855187A03D31217CFDD11AF24E8A22C2118D2C7A5FEFB129B8683A298A51
31,656,493 UART: [art] PUB.Y = 9068CE9A43B424CDE9907924CBC4E727C7B29FE455856641AF259C829BFC8BC0F36F3DC70839F1E495156A410B78B5BE
31,663,727 UART: [art] SIG.R = 04E69C5DC757F243266C85AD8C94060B45044795178A6761EAF607F1109DEF4D55477D751AA6E061548ADD0866549DB5
31,671,141 UART: [art] SIG.S = 3A2215320B92AB597EFCAD7BF00D0346EE6603135586EBA8A9D75EB92238ED82026508252E4DD278414CE2961975DFDE
32,976,626 UART: Caliptra RT
32,977,330 UART: [state] CFI Enabled
33,138,174 UART: [rt] RT listening for mailbox commands...
33,140,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,295,995 UART: [rt]cmd =0x41544d4e, len=14344
38,531,213 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,538 UART:
192,890 UART: Running Caliptra ROM ...
193,986 UART:
603,773 UART: [state] CFI Enabled
617,785 UART: [state] LifecycleState = Unprovisioned
619,728 UART: [state] DebugLocked = No
621,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,741 UART: [kat] SHA2-256
795,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,976 UART: [kat] ++
806,494 UART: [kat] sha1
817,508 UART: [kat] SHA2-256
820,235 UART: [kat] SHA2-384
824,686 UART: [kat] SHA2-512-ACC
827,023 UART: [kat] ECC-384
3,110,834 UART: [kat] HMAC-384Kdf
3,123,510 UART: [kat] LMS
4,313,555 UART: [kat] --
4,317,792 UART: [cold-reset] ++
4,320,222 UART: [fht] Storing FHT @ 0x50003400
4,330,492 UART: [idev] ++
4,331,058 UART: [idev] CDI.KEYID = 6
4,332,095 UART: [idev] SUBJECT.KEYID = 7
4,333,276 UART: [idev] UDS.KEYID = 0
4,334,346 ready_for_fw is high
4,334,557 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,477,780 UART: [idev] Erasing UDS.KEYID = 0
7,620,480 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,537 UART: [idev] --
7,644,856 UART: [ldev] ++
7,645,430 UART: [ldev] CDI.KEYID = 6
7,646,395 UART: [ldev] SUBJECT.KEYID = 5
7,647,627 UART: [ldev] AUTHORITY.KEYID = 7
7,648,854 UART: [ldev] FE.KEYID = 1
7,661,658 UART: [ldev] Erasing FE.KEYID = 1
10,945,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,227 UART: [ldev] --
13,306,770 UART: [fwproc] Waiting for Commands...
13,309,177 UART: [fwproc] Received command 0x46574c44
13,311,364 UART: [fwproc] Received Image of size 114036 bytes
17,366,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,823,616 >>> mbox cmd response: success
17,828,392 UART: [afmc] ++
17,828,986 UART: [afmc] CDI.KEYID = 6
17,829,899 UART: [afmc] SUBJECT.KEYID = 7
17,831,119 UART: [afmc] AUTHORITY.KEYID = 5
21,150,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,584 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,951 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,769 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,244 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,469 UART: [afmc] --
23,517,172 UART: [cold-reset] --
23,519,794 UART: [state] Locking Datavault
23,525,092 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,851 UART: [state] Locking ICCM
23,528,944 UART: [exit] Launching FMC @ 0x40000130
23,537,363 UART:
23,537,601 UART: Running Caliptra FMC ...
23,538,702 UART:
23,538,860 UART: [state] CFI Enabled
23,546,922 UART: [fht] FMC Alias Private Key: 7
25,877,157 UART: [art] Extend RT PCRs Done
25,878,368 UART: [art] Lock RT PCRs Done
25,880,257 UART: [art] Populate DV Done
25,885,884 UART: [fht] FMC Alias Private Key: 7
25,887,367 UART: [art] Derive CDI
25,888,179 UART: [art] Store in in slot 0x4
25,930,336 UART: [art] Derive Key Pair
25,931,335 UART: [art] Store priv key in slot 0x5
29,173,593 UART: [art] Derive Key Pair - Done
29,186,697 UART: [art] Signing Cert with AUTHO
29,188,007 UART: RITY.KEYID = 7
31,467,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,797 UART: [art] PUB.X = DDEFA10BF20E23B2523E9FFEB5B80768B7A1343A0FB58BBC0CC4846AB5DFA20D38F6F0E2A86C78975908105C3E208B89
31,476,056 UART: [art] PUB.Y = 3FB410A5D9258874C204483F7C2A6870A771628515A9FF90131FFC8FD95340CDB54F2ADDDAF199C74D9BB6B0AE8ECC55
31,483,304 UART: [art] SIG.R = E53F62BEC82A36A5B60489198B3FA25AFC75D7A7B7ACA3DE50DBF1211822099AB8B859DBD3549B2A326F68CA0387283E
31,490,711 UART: [art] SIG.S = A3BB95C3496228D15FA3F0921E29C350BB4DC0938EC7514002C7C2ACE2973BDDE0080DE006027D96D1BE683FD3FD9D5D
32,796,002 UART: Caliptra RT
32,796,715 UART: [state] CFI Enabled
32,914,961 UART: [rt] RT listening for mailbox commands...
32,917,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,072,570 UART: [rt]cmd =0x41544d4e, len=14344
38,308,196 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,123,331 ready_for_fw is high
4,123,730 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,048,016 >>> mbox cmd response: success
23,687,210 UART:
23,687,608 UART: Running Caliptra FMC ...
23,688,760 UART:
23,688,924 UART: [state] CFI Enabled
23,696,550 UART: [fht] FMC Alias Private Key: 7
26,026,866 UART: [art] Extend RT PCRs Done
26,028,093 UART: [art] Lock RT PCRs Done
26,029,891 UART: [art] Populate DV Done
26,035,478 UART: [fht] FMC Alias Private Key: 7
26,036,971 UART: [art] Derive CDI
26,037,740 UART: [art] Store in in slot 0x4
26,080,394 UART: [art] Derive Key Pair
26,081,438 UART: [art] Store priv key in slot 0x5
29,323,307 UART: [art] Derive Key Pair - Done
29,336,578 UART: [art] Signing Cert with AUTHO
29,337,886 UART: RITY.KEYID = 7
31,616,737 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,241 UART: [art] PUB.X = 621506F240E09AEF79792A5D18AC91BD99366663DA0BFAF0B9D0402AA64F5A1EEE5467122C34691997DC0A3F940ACD46
31,625,534 UART: [art] PUB.Y = 42B0F5C771B01A45631AF5E3A4CE0370D7501C24E8B974890E181E5B96966146743BD4AB995C260418ABF913C142C66A
31,632,704 UART: [art] SIG.R = 36418F2781552BE6C913404E0DAD9FADCAD6CFD6C186A837C3DEAAFDFD3F63DD23A61A2C17D50DD454C7A6C50FAC9BFC
31,640,216 UART: [art] SIG.S = 9919D578D387050A961B601BF8EDD81BC251C4DD90F2E4889DD7CBC1D90B79CC7DB925823E9061F55BA730DA23ABC12A
32,945,457 UART: Caliptra RT
32,946,167 UART: [state] CFI Enabled
33,063,615 UART: [rt] RT listening for mailbox commands...
33,065,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,221,354 UART: [rt]cmd =0x41544d4e, len=14344
38,456,232 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
192,675 UART:
193,027 UART: Running Caliptra ROM ...
194,214 UART:
194,373 UART: [state] CFI Enabled
264,011 UART: [state] LifecycleState = Unprovisioned
265,912 UART: [state] DebugLocked = No
267,449 UART: [state] WD Timer not started. Device not locked for debugging
270,564 UART: [kat] SHA2-256
449,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,259 UART: [kat] ++
461,799 UART: [kat] sha1
473,602 UART: [kat] SHA2-256
476,608 UART: [kat] SHA2-384
482,882 UART: [kat] SHA2-512-ACC
485,817 UART: [kat] ECC-384
2,948,969 UART: [kat] HMAC-384Kdf
2,971,860 UART: [kat] LMS
3,501,342 UART: [kat] --
3,505,908 UART: [cold-reset] ++
3,506,991 UART: [fht] FHT @ 0x50003400
3,518,401 UART: [idev] ++
3,518,975 UART: [idev] CDI.KEYID = 6
3,520,012 UART: [idev] SUBJECT.KEYID = 7
3,521,120 UART: [idev] UDS.KEYID = 0
3,522,066 ready_for_fw is high
3,522,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,193 UART: [idev] Erasing UDS.KEYID = 0
6,030,302 UART: [idev] Sha1 KeyId Algorithm
6,054,192 UART: [idev] --
6,058,674 UART: [ldev] ++
6,059,263 UART: [ldev] CDI.KEYID = 6
6,060,181 UART: [ldev] SUBJECT.KEYID = 5
6,061,346 UART: [ldev] AUTHORITY.KEYID = 7
6,062,633 UART: [ldev] FE.KEYID = 1
6,100,944 UART: [ldev] Erasing FE.KEYID = 1
8,606,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,399 UART: [ldev] --
10,406,641 UART: [fwproc] Wait for Commands...
10,408,142 UART: [fwproc] Recv command 0x46574c44
10,410,231 UART: [fwproc] Recv'd Img size: 114360 bytes
13,814,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,272,863 >>> mbox cmd response: success
14,277,125 UART: [afmc] ++
14,277,719 UART: [afmc] CDI.KEYID = 6
14,278,606 UART: [afmc] SUBJECT.KEYID = 7
14,279,820 UART: [afmc] AUTHORITY.KEYID = 5
16,823,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,562,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,578,638 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,594,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,617,646 UART: [afmc] --
18,621,956 UART: [cold-reset] --
18,625,174 UART: [state] Locking Datavault
18,630,530 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,238 UART: [state] Locking ICCM
18,633,851 UART: [exit] Launching FMC @ 0x40000130
18,642,245 UART:
18,642,482 UART: Running Caliptra FMC ...
18,643,583 UART:
18,643,740 UART: [state] CFI Enabled
18,703,448 UART: [fht] FMC Alias Private Key: 7
20,467,944 UART: [art] Extend RT PCRs Done
20,469,164 UART: [art] Lock RT PCRs Done
20,471,057 UART: [art] Populate DV Done
20,476,605 UART: [fht] FMC Alias Private Key: 7
20,478,263 UART: [art] Derive CDI
20,479,084 UART: [art] Store in in slot 0x4
20,536,943 UART: [art] Derive Key Pair
20,537,979 UART: [art] Store priv key in slot 0x5
23,000,900 UART: [art] Derive Key Pair - Done
23,014,130 UART: [art] Signing Cert with AUTHO
23,015,449 UART: RITY.KEYID = 7
24,726,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,728,434 UART: [art] PUB.X = 1B526AD2C4FCE9217045C122A1534CF0C1CBA11B0734D6053DEF80C56875EDE20048EE2BA1101E894244F3C226D5F2E5
24,735,669 UART: [art] PUB.Y = 95C5D920DA35C5419EA32FD7FBC4A8D3DFE8FC73622598C80A142D408F2A8E530E83F1B14EE7DE6B1E8F187B069F2FBB
24,742,911 UART: [art] SIG.R = 5BC1713B16709E4CEFB3368562010D3E6D630C18B1F8CF5A8107D32F93E933A9FB2C7671E711CC01CFD4F1493033469B
24,750,350 UART: [art] SIG.S = E13428F07CD00A4839B4259F94071F8B3C620B6F1AC85A4692BF2079515420533AE2C6485185003DBC5F7DE3370CEA2D
25,729,245 UART: Caliptra RT
25,729,963 UART: [state] CFI Enabled
25,895,760 UART: [rt] RT listening for mailbox commands...
25,898,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,053,446 UART: [rt]cmd =0x41544d4e, len=14344
29,984,179 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
192,611 UART:
192,967 UART: Running Caliptra ROM ...
194,108 UART:
194,258 UART: [state] CFI Enabled
264,516 UART: [state] LifecycleState = Unprovisioned
266,925 UART: [state] DebugLocked = No
269,037 UART: [state] WD Timer not started. Device not locked for debugging
274,062 UART: [kat] SHA2-256
463,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,716 UART: [kat] ++
475,195 UART: [kat] sha1
485,497 UART: [kat] SHA2-256
488,499 UART: [kat] SHA2-384
494,222 UART: [kat] SHA2-512-ACC
496,746 UART: [kat] ECC-384
2,949,033 UART: [kat] HMAC-384Kdf
2,971,858 UART: [kat] LMS
3,503,621 UART: [kat] --
3,508,490 UART: [cold-reset] ++
3,510,782 UART: [fht] FHT @ 0x50003400
3,522,401 UART: [idev] ++
3,523,117 UART: [idev] CDI.KEYID = 6
3,524,007 UART: [idev] SUBJECT.KEYID = 7
3,525,259 UART: [idev] UDS.KEYID = 0
3,526,185 ready_for_fw is high
3,526,375 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,315 UART: [idev] Erasing UDS.KEYID = 0
6,029,533 UART: [idev] Sha1 KeyId Algorithm
6,052,343 UART: [idev] --
6,057,633 UART: [ldev] ++
6,058,330 UART: [ldev] CDI.KEYID = 6
6,059,221 UART: [ldev] SUBJECT.KEYID = 5
6,060,429 UART: [ldev] AUTHORITY.KEYID = 7
6,061,634 UART: [ldev] FE.KEYID = 1
6,101,441 UART: [ldev] Erasing FE.KEYID = 1
8,610,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,296 UART: [ldev] --
10,416,592 UART: [fwproc] Wait for Commands...
10,418,250 UART: [fwproc] Recv command 0x46574c44
10,420,715 UART: [fwproc] Recv'd Img size: 114360 bytes
13,875,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,609,993 >>> mbox cmd response: success
14,614,577 UART: [afmc] ++
14,615,287 UART: [afmc] CDI.KEYID = 6
14,616,474 UART: [afmc] SUBJECT.KEYID = 7
14,617,967 UART: [afmc] AUTHORITY.KEYID = 5
17,155,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,889,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,891,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,906,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,921,915 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,936,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,960,879 UART: [afmc] --
18,964,907 UART: [cold-reset] --
18,970,450 UART: [state] Locking Datavault
18,975,729 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,938 UART: [state] Locking ICCM
18,980,587 UART: [exit] Launching FMC @ 0x40000130
18,989,258 UART:
18,989,511 UART: Running Caliptra FMC ...
18,990,542 UART:
18,990,693 UART: [state] CFI Enabled
19,045,798 UART: [fht] FMC Alias Private Key: 7
20,809,163 UART: [art] Extend RT PCRs Done
20,810,382 UART: [art] Lock RT PCRs Done
20,811,979 UART: [art] Populate DV Done
20,817,555 UART: [fht] FMC Alias Private Key: 7
20,819,042 UART: [art] Derive CDI
20,819,806 UART: [art] Store in in slot 0x4
20,878,441 UART: [art] Derive Key Pair
20,879,457 UART: [art] Store priv key in slot 0x5
23,342,928 UART: [art] Derive Key Pair - Done
23,355,815 UART: [art] Signing Cert with AUTHO
23,357,125 UART: RITY.KEYID = 7
25,068,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,070,012 UART: [art] PUB.X = 713B9BBDB11009800A6479C1DFD9DD42614D837E116C54CB7975FEB7AAD91B70CAB6288C2E1ADCE8A0ED17B506224E31
25,077,294 UART: [art] PUB.Y = A47D14CA6D7C4A1E483BB466EE6969496D81FE7E0C3EDBEA5F7CB2B0947CB76D6B22FCEED8EBC285987E454F474D1719
25,084,578 UART: [art] SIG.R = 1D856E7553C7FFDC98C30D602B542AEC35DFA5A246CD17C5C01BC041BA88F761E7146124234EF7CFE2C9E5F48DE18042
25,091,964 UART: [art] SIG.S = 92D9BF339FD7DD22A8E3544AA2F6DFD294F1318E63E9F88DECB879B63400DA728DD6D418EDA63BE562BAB8F698344D0A
26,071,351 UART: Caliptra RT
26,072,063 UART: [state] CFI Enabled
26,236,121 UART: [rt] RT listening for mailbox commands...
26,238,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,393,635 UART: [rt]cmd =0x41544d4e, len=14344
30,323,592 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
3,412,999 ready_for_fw is high
3,413,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,711,797 >>> mbox cmd response: success
19,026,102 UART:
19,026,502 UART: Running Caliptra FMC ...
19,027,706 UART:
19,027,894 UART: [state] CFI Enabled
19,095,223 UART: [fht] FMC Alias Private Key: 7
20,858,780 UART: [art] Extend RT PCRs Done
20,860,018 UART: [art] Lock RT PCRs Done
20,861,651 UART: [art] Populate DV Done
20,867,168 UART: [fht] FMC Alias Private Key: 7
20,868,813 UART: [art] Derive CDI
20,869,659 UART: [art] Store in in slot 0x4
20,927,674 UART: [art] Derive Key Pair
20,928,679 UART: [art] Store priv key in slot 0x5
23,392,063 UART: [art] Derive Key Pair - Done
23,404,961 UART: [art] Signing Cert with AUTHO
23,406,270 UART: RITY.KEYID = 7
25,117,442 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,923 UART: [art] PUB.X = 4730AF5CEE4731CC1E1E35EDA9728A33A6D52AE9D7F8AF289A52C93373B7B0864CDDC3126CCB49C1964148BCE01F3FE4
25,126,251 UART: [art] PUB.Y = B97C55FB8D6F1FBFE49F250F7843D46D6F4E4B71124E114894C04A00A0B679C3747510B4C872D7182A4A05CD93F17A51
25,133,457 UART: [art] SIG.R = 6A122F99C380C5A5443FCCE8F1424D88F0DE3274618EB058DD5F8191E484462D6F09053B640B6763D403490FE0D082F8
25,140,852 UART: [art] SIG.S = B42C95B7DE1009873CBF916FB4FCC42E694F098BBFD9035EDC0B6CEFA94D7A41F3A9B93D71075FB15F3D519E6B1A7648
26,119,299 UART: Caliptra RT
26,120,036 UART: [state] CFI Enabled
26,287,379 UART: [rt] RT listening for mailbox commands...
26,289,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,444,895 UART: [rt]cmd =0x41544d4e, len=14344
30,375,666 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,436 UART:
192,788 UART: Running Caliptra ROM ...
193,889 UART:
603,737 UART: [state] CFI Enabled
619,613 UART: [state] LifecycleState = Unprovisioned
621,981 UART: [state] DebugLocked = No
624,069 UART: [state] WD Timer not started. Device not locked for debugging
628,032 UART: [kat] SHA2-256
817,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,677 UART: [kat] ++
829,279 UART: [kat] sha1
840,111 UART: [kat] SHA2-256
843,152 UART: [kat] SHA2-384
848,862 UART: [kat] SHA2-512-ACC
851,447 UART: [kat] ECC-384
3,291,886 UART: [kat] HMAC-384Kdf
3,305,819 UART: [kat] LMS
3,837,625 UART: [kat] --
3,842,004 UART: [cold-reset] ++
3,844,176 UART: [fht] FHT @ 0x50003400
3,855,297 UART: [idev] ++
3,856,012 UART: [idev] CDI.KEYID = 6
3,856,920 UART: [idev] SUBJECT.KEYID = 7
3,858,164 UART: [idev] UDS.KEYID = 0
3,859,085 ready_for_fw is high
3,859,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,885 UART: [idev] Erasing UDS.KEYID = 0
6,335,619 UART: [idev] Sha1 KeyId Algorithm
6,357,388 UART: [idev] --
6,362,478 UART: [ldev] ++
6,363,166 UART: [ldev] CDI.KEYID = 6
6,364,072 UART: [ldev] SUBJECT.KEYID = 5
6,365,229 UART: [ldev] AUTHORITY.KEYID = 7
6,366,458 UART: [ldev] FE.KEYID = 1
6,376,667 UART: [ldev] Erasing FE.KEYID = 1
8,855,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,569 UART: [ldev] --
10,646,160 UART: [fwproc] Wait for Commands...
10,649,276 UART: [fwproc] Recv command 0x46574c44
10,651,586 UART: [fwproc] Recv'd Img size: 114360 bytes
14,094,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,832,442 >>> mbox cmd response: success
14,837,292 UART: [afmc] ++
14,838,125 UART: [afmc] CDI.KEYID = 6
14,839,205 UART: [afmc] SUBJECT.KEYID = 7
14,840,708 UART: [afmc] AUTHORITY.KEYID = 5
17,342,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,157 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,289 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,299 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,933 UART: [afmc] --
19,139,933 UART: [cold-reset] --
19,145,902 UART: [state] Locking Datavault
19,152,059 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,244 UART: [state] Locking ICCM
19,156,011 UART: [exit] Launching FMC @ 0x40000130
19,164,670 UART:
19,164,925 UART: Running Caliptra FMC ...
19,166,029 UART:
19,166,211 UART: [state] CFI Enabled
19,174,474 UART: [fht] FMC Alias Private Key: 7
20,930,860 UART: [art] Extend RT PCRs Done
20,932,082 UART: [art] Lock RT PCRs Done
20,933,678 UART: [art] Populate DV Done
20,939,139 UART: [fht] FMC Alias Private Key: 7
20,940,782 UART: [art] Derive CDI
20,941,516 UART: [art] Store in in slot 0x4
20,984,162 UART: [art] Derive Key Pair
20,985,157 UART: [art] Store priv key in slot 0x5
23,412,338 UART: [art] Derive Key Pair - Done
23,425,275 UART: [art] Signing Cert with AUTHO
23,426,578 UART: RITY.KEYID = 7
25,131,509 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,009 UART: [art] PUB.X = 1F880C947F219C51E4C4CF789F08466D45E778C31EAC5A66F513202F8687F08674853A5A0D2B0946700BFDFC6E52DFC0
25,140,274 UART: [art] PUB.Y = A17A199AF20B63BFF2CD68A3E2CBED681AB69F8F7216348497C32EA4AC72D05D7D5F3D5F1012AED7FD8F71002682A2CA
25,147,522 UART: [art] SIG.R = 891AD8F635CFEF8D91422786411A731929D072295B5FCCBC6CBEF2DD05A8353CCBC6A2F8DC736873CA99B5224EDECBB5
25,154,969 UART: [art] SIG.S = 08351A3CF4DD9DE91BFE240BEB543D7D118A279E7EA0BEA845054BCFA04B8337E541FA22C74469CC0FB9BD771F9215A2
26,133,872 UART: Caliptra RT
26,134,566 UART: [state] CFI Enabled
26,252,107 UART: [rt] RT listening for mailbox commands...
26,254,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,409,638 UART: [rt]cmd =0x41544d4e, len=14344
30,340,219 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,753,501 ready_for_fw is high
3,753,882 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,952,034 >>> mbox cmd response: success
19,210,466 UART:
19,210,860 UART: Running Caliptra FMC ...
19,212,053 UART:
19,212,220 UART: [state] CFI Enabled
19,220,191 UART: [fht] FMC Alias Private Key: 7
20,977,325 UART: [art] Extend RT PCRs Done
20,978,556 UART: [art] Lock RT PCRs Done
20,980,129 UART: [art] Populate DV Done
20,985,484 UART: [fht] FMC Alias Private Key: 7
20,987,075 UART: [art] Derive CDI
20,987,895 UART: [art] Store in in slot 0x4
21,030,546 UART: [art] Derive Key Pair
21,031,600 UART: [art] Store priv key in slot 0x5
23,458,131 UART: [art] Derive Key Pair - Done
23,471,180 UART: [art] Signing Cert with AUTHO
23,472,487 UART: RITY.KEYID = 7
25,177,588 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,103 UART: [art] PUB.X = 60A5F77E8238A14557D5681713B2B4CD3099E86CD1FC0492311D29D50A2E425258583D9F1094F77ED47F1E1E2BF4E254
25,186,314 UART: [art] PUB.Y = 4B40D2666E74E98AE39DF0F26C4787F8647FF1D02DB359984CCB76EC69C6A84538C03C2681F61BBB6B6E74B9DCF28E22
25,193,593 UART: [art] SIG.R = 92B534D4027DB1E8A4F580CCB75FDF4CB814E61A177BD9E98528BE0096E9E066959B89BA770300D4CF9D379D22A4688E
25,200,947 UART: [art] SIG.S = A0BB7CE66050798137262BF25F8B0115514D6723A998F1B99AA4597D0E735DDD07356FE3349CD2396256FD62ED8E1190
26,179,350 UART: Caliptra RT
26,180,056 UART: [state] CFI Enabled
26,297,114 UART: [rt] RT listening for mailbox commands...
26,299,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,454,604 UART: [rt]cmd =0x41544d4e, len=14344
30,385,451 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,091 UART: [kat] SHA2-256
882,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,137 UART: [kat] ++
886,289 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,278 UART: [kat] SHA2-512-ACC
897,179 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,262 UART: [kat] LMS
1,475,458 UART: [kat] --
1,476,289 UART: [cold-reset] ++
1,476,695 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 ready_for_fw is high
1,480,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,434 UART: [idev] Erasing UDS.KEYID = 0
1,504,546 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,194 UART: [idev] --
1,514,149 UART: [ldev] ++
1,514,317 UART: [ldev] CDI.KEYID = 6
1,514,680 UART: [ldev] SUBJECT.KEYID = 5
1,515,106 UART: [ldev] AUTHORITY.KEYID = 7
1,515,569 UART: [ldev] FE.KEYID = 1
1,520,641 UART: [ldev] Erasing FE.KEYID = 1
1,545,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,200 UART: [ldev] --
1,584,581 UART: [fwproc] Waiting for Commands...
1,585,342 UART: [fwproc] Received command 0x46574c44
1,586,133 UART: [fwproc] Received Image of size 114360 bytes
2,883,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,701 >>> mbox cmd response: success
3,077,847 UART: [afmc] ++
3,078,015 UART: [afmc] CDI.KEYID = 6
3,078,377 UART: [afmc] SUBJECT.KEYID = 7
3,078,802 UART: [afmc] AUTHORITY.KEYID = 5
3,113,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,819 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,599 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,327 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,212 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,902 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,741 UART: [afmc] --
3,156,727 UART: [cold-reset] --
3,157,385 UART: [state] Locking Datavault
3,158,636 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,240 UART: [state] Locking ICCM
3,159,746 UART: [exit] Launching FMC @ 0x40000130
3,165,075 UART:
3,165,091 UART: Running Caliptra FMC ...
3,165,499 UART:
3,165,553 UART: [state] CFI Enabled
3,176,082 UART: [fht] FMC Alias Private Key: 7
3,283,861 UART: [art] Extend RT PCRs Done
3,284,289 UART: [art] Lock RT PCRs Done
3,285,799 UART: [art] Populate DV Done
3,294,038 UART: [fht] FMC Alias Private Key: 7
3,295,012 UART: [art] Derive CDI
3,295,292 UART: [art] Store in in slot 0x4
3,381,143 UART: [art] Derive Key Pair
3,381,503 UART: [art] Store priv key in slot 0x5
3,394,655 UART: [art] Derive Key Pair - Done
3,409,481 UART: [art] Signing Cert with AUTHO
3,409,961 UART: RITY.KEYID = 7
3,424,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,760 UART: [art] PUB.X = 72316B80995A502EDCA4625C2E51418CD9C12896A03058244389D57C6DFFF30F4C6C04A65A227931DBBF37169BE7EF84
3,432,524 UART: [art] PUB.Y = 3E1866642ABDD8C3B244385BB5E0EBA09C902FF4C556050E1D2A3A5CDED431A361E9F9A3F63837B2C0759F5C36612A1B
3,439,478 UART: [art] SIG.R = 3B700B71D04D4177597F27080BE5A12FD95807E4FED248AB1DF247354DFF682D97E2909EF0FDEC6DCE0DB6840F36407B
3,446,240 UART: [art] SIG.S = DC702EDF215C63703E0C829BF6F15F13A54A5079EB522E4C09ED52519E00D623EA4DEA1CA2B20F6F9257BD3C5FC7780D
3,469,429 UART: Caliptra RT
3,469,683 UART: [state] CFI Enabled
3,578,079 UART: [rt] RT listening for mailbox commands...
3,578,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,322 UART: [rt]cmd =0x41544d4e, len=14344
3,846,386 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,523 ready_for_fw is high
1,362,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,975 >>> mbox cmd response: success
2,988,753 UART:
2,988,769 UART: Running Caliptra FMC ...
2,989,177 UART:
2,989,231 UART: [state] CFI Enabled
2,999,922 UART: [fht] FMC Alias Private Key: 7
3,108,193 UART: [art] Extend RT PCRs Done
3,108,621 UART: [art] Lock RT PCRs Done
3,110,147 UART: [art] Populate DV Done
3,118,624 UART: [fht] FMC Alias Private Key: 7
3,119,734 UART: [art] Derive CDI
3,120,014 UART: [art] Store in in slot 0x4
3,205,525 UART: [art] Derive Key Pair
3,205,885 UART: [art] Store priv key in slot 0x5
3,218,909 UART: [art] Derive Key Pair - Done
3,233,589 UART: [art] Signing Cert with AUTHO
3,234,069 UART: RITY.KEYID = 7
3,249,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,302 UART: [art] PUB.X = 9D2D200A18A048C89E1BFB4D5AB8621DAE7BADF29DE88D90863DC4131A68FF75A51A8B9B859E02B8C740A3FC417BF375
3,257,082 UART: [art] PUB.Y = CBC71A19C09F1157E35F4EEB91182275744383BA87E3022FBBD01C9BFFD201BBC28F1C2B1E035CAFC8BEBCADD849DB58
3,264,047 UART: [art] SIG.R = 847B522DD385776040DB7B05BBBC703A07E40C732827189EE38D82BEDFCE482B7F6DCA1706DAE1620B53C1B8F83B94D3
3,270,812 UART: [art] SIG.S = E62F2DCB12AA3590D4E24DB1EC760C4749A92BD56778199F700083EF6ABC4E3AA83668D74C54E349CBB830EE2475B554
3,294,312 UART: Caliptra RT
3,294,566 UART: [state] CFI Enabled
3,403,873 UART: [rt] RT listening for mailbox commands...
3,404,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,100 UART: [rt]cmd =0x41544d4e, len=14344
3,672,060 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,394 UART: [kat] SHA2-256
892,332 UART: [kat] SHA2-384
894,979 UART: [kat] SHA2-512-ACC
896,880 UART: [kat] ECC-384
902,711 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,272 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,351 UART: [idev] ++
1,479,519 UART: [idev] CDI.KEYID = 6
1,479,879 UART: [idev] SUBJECT.KEYID = 7
1,480,303 UART: [idev] UDS.KEYID = 0
1,480,648 ready_for_fw is high
1,480,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,389 UART: [idev] Erasing UDS.KEYID = 0
1,505,701 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,610 UART: [ldev] ++
1,515,778 UART: [ldev] CDI.KEYID = 6
1,516,141 UART: [ldev] SUBJECT.KEYID = 5
1,516,567 UART: [ldev] AUTHORITY.KEYID = 7
1,517,030 UART: [ldev] FE.KEYID = 1
1,522,462 UART: [ldev] Erasing FE.KEYID = 1
1,548,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,999 UART: [ldev] --
1,587,464 UART: [fwproc] Waiting for Commands...
1,588,175 UART: [fwproc] Received command 0x46574c44
1,588,966 UART: [fwproc] Received Image of size 114360 bytes
2,887,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,369 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,528 >>> mbox cmd response: success
3,080,718 UART: [afmc] ++
3,080,886 UART: [afmc] CDI.KEYID = 6
3,081,248 UART: [afmc] SUBJECT.KEYID = 7
3,081,673 UART: [afmc] AUTHORITY.KEYID = 5
3,116,318 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,506 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,899 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,589 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,362 UART: [afmc] --
3,159,436 UART: [cold-reset] --
3,160,430 UART: [state] Locking Datavault
3,161,791 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,395 UART: [state] Locking ICCM
3,162,915 UART: [exit] Launching FMC @ 0x40000130
3,168,244 UART:
3,168,260 UART: Running Caliptra FMC ...
3,168,668 UART:
3,168,811 UART: [state] CFI Enabled
3,179,306 UART: [fht] FMC Alias Private Key: 7
3,287,281 UART: [art] Extend RT PCRs Done
3,287,709 UART: [art] Lock RT PCRs Done
3,289,013 UART: [art] Populate DV Done
3,297,196 UART: [fht] FMC Alias Private Key: 7
3,298,356 UART: [art] Derive CDI
3,298,636 UART: [art] Store in in slot 0x4
3,384,307 UART: [art] Derive Key Pair
3,384,667 UART: [art] Store priv key in slot 0x5
3,396,985 UART: [art] Derive Key Pair - Done
3,411,437 UART: [art] Signing Cert with AUTHO
3,411,917 UART: RITY.KEYID = 7
3,427,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,082 UART: [art] PUB.X = CC67D1EB50A67B44FEA17520EA066D148CE7F6AB1435298645B37375BD400603294E22F72FAC6A0E09DE4C4774CC29B3
3,434,843 UART: [art] PUB.Y = 64AA5F759B8D3E17FD675CE86DE432A6F329936E04A22756B9968E55F53436B6DA06742E4200A4DA5092028A1C5CD9C5
3,441,762 UART: [art] SIG.R = 7262E2909E61AB8823E0B2063B8EFF1F0BE24BF9D99147B555184097D235EDD64C9EF71B91D1F7E17ED11E712447DAF5
3,448,532 UART: [art] SIG.S = 51B6F0BBF7F58E43FA96A6990490544375F0BEA24B9AB5BC5D733EDA990B69243D93146401898A25C742EA1BB06F912E
3,472,238 UART: Caliptra RT
3,472,584 UART: [state] CFI Enabled
3,580,827 UART: [rt] RT listening for mailbox commands...
3,581,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,318 UART: [rt]cmd =0x41544d4e, len=14344
3,848,850 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 ready_for_fw is high
1,362,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,498 >>> mbox cmd response: success
2,989,562 UART:
2,989,578 UART: Running Caliptra FMC ...
2,989,986 UART:
2,990,129 UART: [state] CFI Enabled
3,000,962 UART: [fht] FMC Alias Private Key: 7
3,109,239 UART: [art] Extend RT PCRs Done
3,109,667 UART: [art] Lock RT PCRs Done
3,111,015 UART: [art] Populate DV Done
3,119,404 UART: [fht] FMC Alias Private Key: 7
3,120,534 UART: [art] Derive CDI
3,120,814 UART: [art] Store in in slot 0x4
3,206,265 UART: [art] Derive Key Pair
3,206,625 UART: [art] Store priv key in slot 0x5
3,219,925 UART: [art] Derive Key Pair - Done
3,234,956 UART: [art] Signing Cert with AUTHO
3,235,436 UART: RITY.KEYID = 7
3,250,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,269 UART: [art] PUB.X = 51C8581ECA9D4BAC4C8A296EF613ACC52F430DBE6872A91A796D33EE1B5C9B4B78453F47AD733C28D738C6168C585DFF
3,258,050 UART: [art] PUB.Y = 929534102CA806613E37245929EA4D7D99E67B831E1B23BC3BA46A53D27957F8AB7B456F1AF2F1CD8C2098DB6AB6728D
3,265,001 UART: [art] SIG.R = 4908799E655B228B7F70E21FD8CCC9B47D3DCAA5D90A152D3B34E111F9CFC3538E31B4EC74177FAF0B4B90C51B85C64E
3,271,776 UART: [art] SIG.S = D378AEE55517062A0A73798932761262C53343C606DCC8036D720169FE5DDB7649252C90256702C80963C2B83522C327
3,295,228 UART: Caliptra RT
3,295,574 UART: [state] CFI Enabled
3,403,488 UART: [rt] RT listening for mailbox commands...
3,404,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,145 UART: [rt]cmd =0x41544d4e, len=14344
3,671,855 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
893,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,671 UART: [kat] ++
897,823 UART: [kat] sha1
902,181 UART: [kat] SHA2-256
904,121 UART: [kat] SHA2-384
906,630 UART: [kat] SHA2-512-ACC
908,531 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,466 UART: [kat] LMS
1,170,794 UART: [kat] --
1,171,801 UART: [cold-reset] ++
1,172,189 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 ready_for_fw is high
1,176,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,770 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,283 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,686 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x46574c44
1,283,060 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,926 >>> mbox cmd response: success
2,774,974 UART: [afmc] ++
2,775,142 UART: [afmc] CDI.KEYID = 6
2,775,504 UART: [afmc] SUBJECT.KEYID = 7
2,775,929 UART: [afmc] AUTHORITY.KEYID = 5
2,811,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,871 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,785 UART: [afmc] --
2,854,835 UART: [cold-reset] --
2,855,681 UART: [state] Locking Datavault
2,857,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,802 UART: [state] Locking ICCM
2,858,230 UART: [exit] Launching FMC @ 0x40000130
2,863,559 UART:
2,863,575 UART: Running Caliptra FMC ...
2,863,983 UART:
2,864,037 UART: [state] CFI Enabled
2,874,556 UART: [fht] FMC Alias Private Key: 7
2,982,249 UART: [art] Extend RT PCRs Done
2,982,677 UART: [art] Lock RT PCRs Done
2,983,931 UART: [art] Populate DV Done
2,992,002 UART: [fht] FMC Alias Private Key: 7
2,993,164 UART: [art] Derive CDI
2,993,444 UART: [art] Store in in slot 0x4
3,078,971 UART: [art] Derive Key Pair
3,079,331 UART: [art] Store priv key in slot 0x5
3,092,709 UART: [art] Derive Key Pair - Done
3,107,241 UART: [art] Signing Cert with AUTHO
3,107,721 UART: RITY.KEYID = 7
3,122,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,334 UART: [art] PUB.X = F3D0B09D4928BA016FF802B0016CE60EBF3E2919E0F48CAA1E737B0C296B80B73F0F046BB41E56842BA8360583E0AE3B
3,130,090 UART: [art] PUB.Y = 811D2BF3458D94915B4E07A5F650709C6D39EA6BFE230115CB4D3F232701714F98D54A35CDEF0F0107B4694FC4FF64A8
3,137,026 UART: [art] SIG.R = 40AD82529CAEEFAC62D3DB80A3BB1A5149AC6099EC8EAC9C3D2DA4CE4FF8F7C22848FA12464A9DBF2A0D1437830CAE62
3,143,816 UART: [art] SIG.S = 333991F9283C61013A0406C3E86C58DA0B9EE01F0D1AE0B518038570B8BD038C40597343AF8D63CD919A8F11D0022726
3,167,747 UART: Caliptra RT
3,168,001 UART: [state] CFI Enabled
3,275,327 UART: [rt] RT listening for mailbox commands...
3,275,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,578 UART: [rt]cmd =0x41544d4e, len=14344
3,543,442 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,327 ready_for_fw is high
1,060,327 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,505 >>> mbox cmd response: success
2,688,113 UART:
2,688,129 UART: Running Caliptra FMC ...
2,688,537 UART:
2,688,591 UART: [state] CFI Enabled
2,698,984 UART: [fht] FMC Alias Private Key: 7
2,806,683 UART: [art] Extend RT PCRs Done
2,807,111 UART: [art] Lock RT PCRs Done
2,808,799 UART: [art] Populate DV Done
2,817,120 UART: [fht] FMC Alias Private Key: 7
2,818,196 UART: [art] Derive CDI
2,818,476 UART: [art] Store in in slot 0x4
2,904,391 UART: [art] Derive Key Pair
2,904,751 UART: [art] Store priv key in slot 0x5
2,918,035 UART: [art] Derive Key Pair - Done
2,932,717 UART: [art] Signing Cert with AUTHO
2,933,197 UART: RITY.KEYID = 7
2,948,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,242 UART: [art] PUB.X = 209BE461C555CF17A76A20B708E3907F4179FFC3DE0A950E34A614F81A9DF99ADDAFA42C36528236469240C9A393FEE4
2,956,009 UART: [art] PUB.Y = 44962C3343D7372A23DCF36708ADE5425A84C20F2DF17A0C43325CD442FEE82AB8289E03B84370EC48A223B4FDB65758
2,962,949 UART: [art] SIG.R = 536AE59CFD87805536814B6AA58D7C9A13C9E26B11EA0A2514A645F342E1D35B945BD497FA9BF868722507ADC667AB1E
2,969,719 UART: [art] SIG.S = 82E5B6CCE8D1642813298C57E35EB45D963E895F1308DB40CF64D605A8361C5C289DD0D282C2451EA7A206984698DFE0
2,993,645 UART: Caliptra RT
2,993,899 UART: [state] CFI Enabled
3,101,325 UART: [rt] RT listening for mailbox commands...
3,101,995 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,896 UART: [rt]cmd =0x41544d4e, len=14344
3,369,540 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
893,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,264 UART: [kat] ++
897,416 UART: [kat] sha1
901,434 UART: [kat] SHA2-256
903,374 UART: [kat] SHA2-384
906,097 UART: [kat] SHA2-512-ACC
907,998 UART: [kat] ECC-384
917,703 UART: [kat] HMAC-384Kdf
922,467 UART: [kat] LMS
1,170,795 UART: [kat] --
1,171,840 UART: [cold-reset] ++
1,172,220 UART: [fht] FHT @ 0x50003400
1,174,895 UART: [idev] ++
1,175,063 UART: [idev] CDI.KEYID = 6
1,175,423 UART: [idev] SUBJECT.KEYID = 7
1,175,847 UART: [idev] UDS.KEYID = 0
1,176,192 ready_for_fw is high
1,176,192 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,927 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,546 UART: [ldev] ++
1,210,714 UART: [ldev] CDI.KEYID = 6
1,211,077 UART: [ldev] SUBJECT.KEYID = 5
1,211,503 UART: [ldev] AUTHORITY.KEYID = 7
1,211,966 UART: [ldev] FE.KEYID = 1
1,217,460 UART: [ldev] Erasing FE.KEYID = 1
1,243,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,416 UART: [ldev] --
1,282,825 UART: [fwproc] Wait for Commands...
1,283,397 UART: [fwproc] Recv command 0x46574c44
1,284,125 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,007 >>> mbox cmd response: success
2,776,111 UART: [afmc] ++
2,776,279 UART: [afmc] CDI.KEYID = 6
2,776,641 UART: [afmc] SUBJECT.KEYID = 7
2,777,066 UART: [afmc] AUTHORITY.KEYID = 5
2,813,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,252 UART: [afmc] --
2,857,362 UART: [cold-reset] --
2,858,152 UART: [state] Locking Datavault
2,859,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,943 UART: [state] Locking ICCM
2,860,487 UART: [exit] Launching FMC @ 0x40000130
2,865,816 UART:
2,865,832 UART: Running Caliptra FMC ...
2,866,240 UART:
2,866,383 UART: [state] CFI Enabled
2,877,114 UART: [fht] FMC Alias Private Key: 7
2,984,637 UART: [art] Extend RT PCRs Done
2,985,065 UART: [art] Lock RT PCRs Done
2,986,639 UART: [art] Populate DV Done
2,994,888 UART: [fht] FMC Alias Private Key: 7
2,995,906 UART: [art] Derive CDI
2,996,186 UART: [art] Store in in slot 0x4
3,082,017 UART: [art] Derive Key Pair
3,082,377 UART: [art] Store priv key in slot 0x5
3,095,775 UART: [art] Derive Key Pair - Done
3,110,569 UART: [art] Signing Cert with AUTHO
3,111,049 UART: RITY.KEYID = 7
3,126,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,104 UART: [art] PUB.X = 7D5E4B073738536A01BEF7E265CED31B9457E855810643AFCDE57A6D3A76CA24E1786BC547A39992E174B44BE10A1129
3,133,864 UART: [art] PUB.Y = F10A9EC4B19355E7FCCB94FCFA7CDE66046DA91CF5B43604C48BCA1DCA8F5840D6EDFC14D611C129FE08B697DF5100E8
3,140,804 UART: [art] SIG.R = 79667F93AB2A3D59647CDB3873141FDF6836BFDD3F0D9AD175B608CFCE754EA97F22FD902BB61C8EEAA4B9710A1CB3CD
3,147,587 UART: [art] SIG.S = 9E3DE1224C3D2FA3CEB9A26B467FC7F7043A39D1FDD809D157498BEF609EC92DF1CB516CCD019898CE4BB6A61ACFFC94
3,171,499 UART: Caliptra RT
3,171,845 UART: [state] CFI Enabled
3,280,003 UART: [rt] RT listening for mailbox commands...
3,280,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,274 UART: [rt]cmd =0x41544d4e, len=14344
3,548,752 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,614 ready_for_fw is high
1,060,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,800 >>> mbox cmd response: success
2,689,282 UART:
2,689,298 UART: Running Caliptra FMC ...
2,689,706 UART:
2,689,849 UART: [state] CFI Enabled
2,700,506 UART: [fht] FMC Alias Private Key: 7
2,808,289 UART: [art] Extend RT PCRs Done
2,808,717 UART: [art] Lock RT PCRs Done
2,810,277 UART: [art] Populate DV Done
2,818,336 UART: [fht] FMC Alias Private Key: 7
2,819,492 UART: [art] Derive CDI
2,819,772 UART: [art] Store in in slot 0x4
2,905,625 UART: [art] Derive Key Pair
2,905,985 UART: [art] Store priv key in slot 0x5
2,919,161 UART: [art] Derive Key Pair - Done
2,933,790 UART: [art] Signing Cert with AUTHO
2,934,270 UART: RITY.KEYID = 7
2,949,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,577 UART: [art] PUB.X = DB170B4A9D6B38706ADAC33E530D02AA3CF2703C3FDA808D8E84C17E20B1A7CE16C2C2AFA635D144BB3ECA8E07F33ED3
2,957,359 UART: [art] PUB.Y = 662CC83275D8B9555DE4B10EEE0F46E4313470C4C5D190939F141DD44BD300DDA2462CDC3E9F9DFF27FA4173CA034331
2,964,286 UART: [art] SIG.R = 3AA95DB5EAC0A938B5407B916C332105A246E5432E501738B2B6D0FB508B9ACA1FC3DE51EF20FF8E3CA44ED4B9A70AF0
2,971,068 UART: [art] SIG.S = 9A3D4D04DE48A25F53468E0016BEDDF898E939BD994A220FAF049A7AEF9ADCA5DA40BFF1A01B6C4249DDABE5FCE63B53
2,995,032 UART: Caliptra RT
2,995,378 UART: [state] CFI Enabled
3,103,898 UART: [rt] RT listening for mailbox commands...
3,104,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,193 UART: [rt]cmd =0x41544d4e, len=14344
3,372,099 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,686 UART: [kat] HMAC-384Kdf
920,218 UART: [kat] LMS
1,168,530 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,173,833 ready_for_fw is high
1,173,833 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,465 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,158 UART: [ldev] ++
1,208,326 UART: [ldev] CDI.KEYID = 6
1,208,690 UART: [ldev] SUBJECT.KEYID = 5
1,209,117 UART: [ldev] AUTHORITY.KEYID = 7
1,209,580 UART: [ldev] FE.KEYID = 1
1,214,664 UART: [ldev] Erasing FE.KEYID = 1
1,241,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,948 UART: [ldev] --
1,280,460 UART: [fwproc] Wait for Commands...
1,281,075 UART: [fwproc] Recv command 0x46574c44
1,281,808 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,816 >>> mbox cmd response: success
2,771,939 UART: [afmc] ++
2,772,107 UART: [afmc] CDI.KEYID = 6
2,772,470 UART: [afmc] SUBJECT.KEYID = 7
2,772,896 UART: [afmc] AUTHORITY.KEYID = 5
2,808,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,604 UART: [afmc] --
2,851,666 UART: [cold-reset] --
2,852,304 UART: [state] Locking Datavault
2,853,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,877 UART: [state] Locking ICCM
2,854,421 UART: [exit] Launching FMC @ 0x40000130
2,859,750 UART:
2,859,766 UART: Running Caliptra FMC ...
2,860,174 UART:
2,860,228 UART: [state] CFI Enabled
2,870,771 UART: [fht] FMC Alias Private Key: 7
2,978,832 UART: [art] Extend RT PCRs Done
2,979,260 UART: [art] Lock RT PCRs Done
2,980,678 UART: [art] Populate DV Done
2,989,157 UART: [fht] FMC Alias Private Key: 7
2,990,329 UART: [art] Derive CDI
2,990,609 UART: [art] Store in in slot 0x4
3,076,108 UART: [art] Derive Key Pair
3,076,468 UART: [art] Store priv key in slot 0x5
3,089,778 UART: [art] Derive Key Pair - Done
3,104,749 UART: [art] Signing Cert with AUTHO
3,105,229 UART: RITY.KEYID = 7
3,120,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,192 UART: [art] PUB.X = 4F0753B9F09144BE89EFBCB98D90F4B7A7C9EBEFFEE86BF50FC948E1C426A76679CE38C1425AAA043A6D4A473713E5E8
3,127,971 UART: [art] PUB.Y = C5EA31F002E286965E4245094BB397DC325FE1940271B011F1E29E22B3BAD0E88F0D5BFFFD202C5169BEDEA1C978E8A3
3,134,921 UART: [art] SIG.R = 22AE31089EAB2BAAFF9AE60628D7E210BFBBB2E394F6305EE7A4D11572D526B8474BF385CE274A74F3AA288DE45A82CA
3,141,703 UART: [art] SIG.S = 0F8617E4A2670FFFF0467A0D4E01A7FDDFAD625D4CACAE659CA78FF493869532C9EC2194A3B294AE8CE27E874305F9D7
3,164,731 UART: Caliptra RT
3,164,985 UART: [state] CFI Enabled
3,272,379 UART: [rt] RT listening for mailbox commands...
3,273,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,866 UART: [rt]cmd =0x41544d4e, len=14344
3,540,624 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,064 ready_for_fw is high
1,056,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,978 >>> mbox cmd response: success
2,683,942 UART:
2,683,958 UART: Running Caliptra FMC ...
2,684,366 UART:
2,684,420 UART: [state] CFI Enabled
2,695,169 UART: [fht] FMC Alias Private Key: 7
2,802,542 UART: [art] Extend RT PCRs Done
2,802,970 UART: [art] Lock RT PCRs Done
2,804,518 UART: [art] Populate DV Done
2,812,805 UART: [fht] FMC Alias Private Key: 7
2,813,899 UART: [art] Derive CDI
2,814,179 UART: [art] Store in in slot 0x4
2,900,252 UART: [art] Derive Key Pair
2,900,612 UART: [art] Store priv key in slot 0x5
2,914,214 UART: [art] Derive Key Pair - Done
2,929,120 UART: [art] Signing Cert with AUTHO
2,929,600 UART: RITY.KEYID = 7
2,945,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,099 UART: [art] PUB.X = BED2C9AC5BF7294C39955A8DEF5B32ECD19A28A08104DD5494F14EDBEA31E72795F18D1405BC19CD7AF19C656FF53631
2,952,879 UART: [art] PUB.Y = A960C4D2D55E37DEAEFCAA3FE450A586A76C3B04B7ACF3AE95ADE443989FFCA4C4475F4AD1CAF71338DCBA41E693DB9C
2,959,858 UART: [art] SIG.R = 9762FD9DDEE0B668278F6F83286DA4279CB5D89A4D7DC77BCC570C3A4ECEC7DE0944F299F2E8BF31F2F312694A4875E5
2,966,636 UART: [art] SIG.S = F3CD4F99D23A239FE0CF28DF72E6AB744E72223EF4D70E7AB738D929DE9534679633C9E178749BFBB653C7764E4FF7C8
2,990,374 UART: Caliptra RT
2,990,628 UART: [state] CFI Enabled
3,098,707 UART: [rt] RT listening for mailbox commands...
3,099,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,318 UART: [rt]cmd =0x41544d4e, len=14344
3,367,140 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,843 UART: [kat] LMS
1,169,155 UART: [kat] --
1,169,990 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,174,372 ready_for_fw is high
1,174,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,716 UART: [idev] Erasing UDS.KEYID = 0
1,198,634 UART: [idev] Sha1 KeyId Algorithm
1,207,426 UART: [idev] --
1,208,341 UART: [ldev] ++
1,208,509 UART: [ldev] CDI.KEYID = 6
1,208,873 UART: [ldev] SUBJECT.KEYID = 5
1,209,300 UART: [ldev] AUTHORITY.KEYID = 7
1,209,763 UART: [ldev] FE.KEYID = 1
1,214,975 UART: [ldev] Erasing FE.KEYID = 1
1,241,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,784 UART: [fwproc] Recv command 0x46574c44
1,282,517 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,277 >>> mbox cmd response: success
2,773,412 UART: [afmc] ++
2,773,580 UART: [afmc] CDI.KEYID = 6
2,773,943 UART: [afmc] SUBJECT.KEYID = 7
2,774,369 UART: [afmc] AUTHORITY.KEYID = 5
2,810,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,270 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,121 UART: [afmc] --
2,854,219 UART: [cold-reset] --
2,855,023 UART: [state] Locking Datavault
2,855,948 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,552 UART: [state] Locking ICCM
2,857,036 UART: [exit] Launching FMC @ 0x40000130
2,862,365 UART:
2,862,381 UART: Running Caliptra FMC ...
2,862,789 UART:
2,862,932 UART: [state] CFI Enabled
2,873,315 UART: [fht] FMC Alias Private Key: 7
2,981,780 UART: [art] Extend RT PCRs Done
2,982,208 UART: [art] Lock RT PCRs Done
2,983,566 UART: [art] Populate DV Done
2,991,713 UART: [fht] FMC Alias Private Key: 7
2,992,811 UART: [art] Derive CDI
2,993,091 UART: [art] Store in in slot 0x4
3,078,804 UART: [art] Derive Key Pair
3,079,164 UART: [art] Store priv key in slot 0x5
3,092,394 UART: [art] Derive Key Pair - Done
3,107,115 UART: [art] Signing Cert with AUTHO
3,107,595 UART: RITY.KEYID = 7
3,122,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,500 UART: [art] PUB.X = 7566246CF178A538A31DBA27F9C6624BD2085D36C83443F4252B4A74C0B8C8569F11316882FAD87BABA475B67225B151
3,130,263 UART: [art] PUB.Y = 453C63425E057052CA636627FC202A3BBE083AC25717041F26E33BD8D333F93E7C932902DFA07BD8695E0D6FF8F44088
3,137,196 UART: [art] SIG.R = B617B7ECD717F753EA8C294957EC76B5D864F987867A5E8AC583C8F271D9D4F073B6B91C09C3C65D5FA2A14C946BB5CD
3,143,975 UART: [art] SIG.S = 361160D6E23381CFC21ADE984EA3B29AD35EEC60D47E2244D77445C2A5A5F315F5545979CA916B7BC0F16A554BDE3484
3,168,082 UART: Caliptra RT
3,168,428 UART: [state] CFI Enabled
3,276,340 UART: [rt] RT listening for mailbox commands...
3,277,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,825 UART: [rt]cmd =0x41544d4e, len=14344
3,544,487 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,789 ready_for_fw is high
1,056,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,949 >>> mbox cmd response: success
2,684,973 UART:
2,684,989 UART: Running Caliptra FMC ...
2,685,397 UART:
2,685,540 UART: [state] CFI Enabled
2,696,241 UART: [fht] FMC Alias Private Key: 7
2,803,868 UART: [art] Extend RT PCRs Done
2,804,296 UART: [art] Lock RT PCRs Done
2,805,852 UART: [art] Populate DV Done
2,813,991 UART: [fht] FMC Alias Private Key: 7
2,814,979 UART: [art] Derive CDI
2,815,259 UART: [art] Store in in slot 0x4
2,900,980 UART: [art] Derive Key Pair
2,901,340 UART: [art] Store priv key in slot 0x5
2,914,718 UART: [art] Derive Key Pair - Done
2,929,349 UART: [art] Signing Cert with AUTHO
2,929,829 UART: RITY.KEYID = 7
2,945,145 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,910 UART: [art] PUB.X = A4D0AD178D5B62BD5CC1633B80AB06022FDEF4940CBB990606424ACE2F560838E9CABFDCEC01BFB7D3778A8571A92FD1
2,952,679 UART: [art] PUB.Y = EA44C57CB42CBD2A1D7BDBF1363FC345D7F1B85F79003E2500E69BDD6ED1BE70A0C73339D00C3FE1EAF12E44AD5C1786
2,959,604 UART: [art] SIG.R = 774446633A238977A5E60254414E737979D19F526418596B06F0938428AF75F6DC39154FAAB34A19308AB084693F6A3A
2,966,352 UART: [art] SIG.S = D126E9E0681CA7697CF39484C1C192770BC6BB8452FF09CE1673996A547B7019C499EBB30883BAFDDD51AC796617482C
2,989,854 UART: Caliptra RT
2,990,200 UART: [state] CFI Enabled
3,097,992 UART: [rt] RT listening for mailbox commands...
3,098,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,101 UART: [rt]cmd =0x41544d4e, len=14344
3,365,641 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,382 UART:
192,785 UART: Running Caliptra ROM ...
193,939 UART:
194,087 UART: [state] CFI Enabled
265,626 UART: [state] LifecycleState = Unprovisioned
267,531 UART: [state] DebugLocked = No
268,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,281 UART: [kat] SHA2-256
442,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,537 UART: [kat] ++
454,070 UART: [kat] sha1
465,515 UART: [kat] SHA2-256
468,226 UART: [kat] SHA2-384
474,780 UART: [kat] SHA2-512-ACC
477,138 UART: [kat] ECC-384
2,768,413 UART: [kat] HMAC-384Kdf
2,800,635 UART: [kat] LMS
3,990,944 UART: [kat] --
3,994,746 UART: [cold-reset] ++
3,995,683 UART: [fht] Storing FHT @ 0x50003400
4,006,510 UART: [idev] ++
4,007,070 UART: [idev] CDI.KEYID = 6
4,008,025 UART: [idev] SUBJECT.KEYID = 7
4,009,267 UART: [idev] UDS.KEYID = 0
4,010,306 ready_for_fw is high
4,010,520 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,006 UART: [idev] Erasing UDS.KEYID = 0
7,349,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,117 UART: [idev] --
7,375,152 UART: [ldev] ++
7,375,718 UART: [ldev] CDI.KEYID = 6
7,376,674 UART: [ldev] SUBJECT.KEYID = 5
7,377,899 UART: [ldev] AUTHORITY.KEYID = 7
7,379,343 UART: [ldev] FE.KEYID = 1
7,424,482 UART: [ldev] Erasing FE.KEYID = 1
10,755,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,068 UART: [ldev] --
13,119,199 UART: [fwproc] Waiting for Commands...
13,121,393 UART: [fwproc] Received command 0x46574c44
13,123,566 UART: [fwproc] Received Image of size 114036 bytes
17,174,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,043 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,637,312 >>> mbox cmd response: success
17,642,167 UART: [afmc] ++
17,642,764 UART: [afmc] CDI.KEYID = 6
17,643,694 UART: [afmc] SUBJECT.KEYID = 7
17,644,956 UART: [afmc] AUTHORITY.KEYID = 5
21,005,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,486 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,751 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,156 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,973 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,402 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,473 UART: [afmc] --
23,380,935 UART: [cold-reset] --
23,386,509 UART: [state] Locking Datavault
23,391,325 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,076 UART: [state] Locking ICCM
23,395,897 UART: [exit] Launching FMC @ 0x40000130
23,404,252 UART:
23,404,486 UART: Running Caliptra FMC ...
23,405,576 UART:
23,405,740 UART: [state] CFI Enabled
23,467,370 UART: [fht] FMC Alias Private Key: 7
25,805,352 UART: [art] Extend RT PCRs Done
25,806,576 UART: [art] Lock RT PCRs Done
25,808,437 UART: [art] Populate DV Done
25,813,676 UART: [fht] FMC Alias Private Key: 7
25,815,260 UART: [art] Derive CDI
25,815,988 UART: [art] Store in in slot 0x4
25,875,602 UART: [art] Derive Key Pair
25,876,637 UART: [art] Store priv key in slot 0x5
29,169,305 UART: [art] Derive Key Pair - Done
29,182,512 UART: [art] Signing Cert with AUTHO
29,183,813 UART: RITY.KEYID = 7
31,470,568 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,071 UART: [art] PUB.X = 9F589605777834421551FA085AA9B47F6E62AC99B165F19248891E76711096A0346D30E36C7E8919005C5103016E5433
31,479,271 UART: [art] PUB.Y = 693B6A91BB91F7FA06147211185DF87D48B0AC7D48BB6E00114E4720E1CD559A83E58A29D65B3DF2E27EF0E094DAABA6
31,486,529 UART: [art] SIG.R = 96624388927A96FA7B5EFA656E927C6D11B57D23ABC2BA6CA53F858DF8C747E75CE0B985193CECB2779005E02C9CB781
31,493,889 UART: [art] SIG.S = A87EC43660E283A764D97A63675039988E93C8DC2702C9DD200DCE91BFF7213EEADECF50981C0950853CDF2A95CCCAB2
32,798,613 UART: Caliptra RT
32,799,306 UART: [state] CFI Enabled
32,960,551 UART: [rt] RT listening for mailbox commands...
32,962,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,993,209 UART: [rt]cmd =0x44504543, len=96
38,785,273 >>> mbox cmd response data (6236 bytes)
38,814,675 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,845,353 UART: [rt]cmd =0x53574545, len=84
44,422,599 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,785,910 ready_for_fw is high
3,786,505 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,853,229 >>> mbox cmd response: success
23,548,624 UART:
23,549,009 UART: Running Caliptra FMC ...
23,550,208 UART:
23,550,375 UART: [state] CFI Enabled
23,615,172 UART: [fht] FMC Alias Private Key: 7
25,952,742 UART: [art] Extend RT PCRs Done
25,954,014 UART: [art] Lock RT PCRs Done
25,955,397 UART: [art] Populate DV Done
25,960,931 UART: [fht] FMC Alias Private Key: 7
25,962,521 UART: [art] Derive CDI
25,963,283 UART: [art] Store in in slot 0x4
26,023,148 UART: [art] Derive Key Pair
26,024,223 UART: [art] Store priv key in slot 0x5
29,317,251 UART: [art] Derive Key Pair - Done
29,329,982 UART: [art] Signing Cert with AUTHO
29,331,303 UART: RITY.KEYID = 7
31,618,278 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,776 UART: [art] PUB.X = 680245F6F107E924A929BB946595B7134E2038A29423C154C23B5E1C1BDD113F7A4450A3D449A7758838D226AF19863D
31,627,005 UART: [art] PUB.Y = A6DC9830775E277737590759081EABE1F6B4AD0F8045BDB473ED48C5F922F3ADC5E71762445AC27A9FA813B5DADD6791
31,634,264 UART: [art] SIG.R = F12C4AF39FD62DE01E193501ECA55EBF1CD94D3AA96436D0381B30A4A9BDFA62E6356B2FD7257E6358652B94F3DE8F85
31,641,625 UART: [art] SIG.S = 28EEE1A97D2C9E7B8CB0C85F35A766D07616202BAE660522BAA8060E93E53C7E110855373D02B57E5A5CE51496C73ABD
32,946,323 UART: Caliptra RT
32,947,034 UART: [state] CFI Enabled
33,106,165 UART: [rt] RT listening for mailbox commands...
33,108,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,138,691 UART: [rt]cmd =0x44504543, len=96
38,890,943 >>> mbox cmd response data (6236 bytes)
38,920,639 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,951,251 UART: [rt]cmd =0x53574545, len=84
44,529,829 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,573 UART:
192,915 UART: Running Caliptra ROM ...
194,003 UART:
603,693 UART: [state] CFI Enabled
620,431 UART: [state] LifecycleState = Unprovisioned
622,351 UART: [state] DebugLocked = No
625,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,301 UART: [kat] SHA2-256
800,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,558 UART: [kat] ++
811,003 UART: [kat] sha1
822,520 UART: [kat] SHA2-256
825,248 UART: [kat] SHA2-384
830,175 UART: [kat] SHA2-512-ACC
832,541 UART: [kat] ECC-384
3,117,639 UART: [kat] HMAC-384Kdf
3,129,503 UART: [kat] LMS
4,319,608 UART: [kat] --
4,324,667 UART: [cold-reset] ++
4,325,743 UART: [fht] Storing FHT @ 0x50003400
4,336,868 UART: [idev] ++
4,337,457 UART: [idev] CDI.KEYID = 6
4,338,363 UART: [idev] SUBJECT.KEYID = 7
4,339,611 UART: [idev] UDS.KEYID = 0
4,340,585 ready_for_fw is high
4,340,769 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,961 UART: [idev] Erasing UDS.KEYID = 0
7,627,867 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,729 UART: [idev] --
7,654,121 UART: [ldev] ++
7,654,741 UART: [ldev] CDI.KEYID = 6
7,655,652 UART: [ldev] SUBJECT.KEYID = 5
7,656,869 UART: [ldev] AUTHORITY.KEYID = 7
7,658,154 UART: [ldev] FE.KEYID = 1
7,670,419 UART: [ldev] Erasing FE.KEYID = 1
10,953,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,952 UART: [ldev] --
13,311,939 UART: [fwproc] Waiting for Commands...
13,315,219 UART: [fwproc] Received command 0x46574c44
13,317,395 UART: [fwproc] Received Image of size 114036 bytes
17,368,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,747 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,797 >>> mbox cmd response: success
17,837,124 UART: [afmc] ++
17,837,719 UART: [afmc] CDI.KEYID = 6
17,838,684 UART: [afmc] SUBJECT.KEYID = 7
17,839,898 UART: [afmc] AUTHORITY.KEYID = 5
21,156,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,162 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,551 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,364 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,881 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,630 UART: [afmc] --
23,523,199 UART: [cold-reset] --
23,525,435 UART: [state] Locking Datavault
23,530,425 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,178 UART: [state] Locking ICCM
23,534,736 UART: [exit] Launching FMC @ 0x40000130
23,543,126 UART:
23,543,360 UART: Running Caliptra FMC ...
23,544,454 UART:
23,544,604 UART: [state] CFI Enabled
23,552,705 UART: [fht] FMC Alias Private Key: 7
25,882,785 UART: [art] Extend RT PCRs Done
25,884,011 UART: [art] Lock RT PCRs Done
25,885,715 UART: [art] Populate DV Done
25,890,962 UART: [fht] FMC Alias Private Key: 7
25,892,447 UART: [art] Derive CDI
25,893,349 UART: [art] Store in in slot 0x4
25,935,848 UART: [art] Derive Key Pair
25,936,852 UART: [art] Store priv key in slot 0x5
29,179,173 UART: [art] Derive Key Pair - Done
29,192,055 UART: [art] Signing Cert with AUTHO
29,193,355 UART: RITY.KEYID = 7
31,473,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,566 UART: [art] PUB.X = B00C1CD450BD19BD0C95B90A942B27CEEF4B4F43ED01AEBDA163289B1258D152E097D88AE31950E2D6218BDB2C634AA9
31,481,826 UART: [art] PUB.Y = 55A328FD6C2DF5F1B5E656AE8D8E5984A1ACFEF34C4F1B86A521FAEA4779DD06227E430FCC70E4DCED6DC3C88C2C0934
31,489,113 UART: [art] SIG.R = 965D786B88921667989327518AC33B28A631C087D7F21F725698C0DC3C7A0FE5D3B90165779AE827A44DDAFB55AF64EA
31,496,500 UART: [art] SIG.S = 79014D2FFD071F9AD26527385260C0DF770FC4662E56F9FF6D3456B5F3A492F361D8C65E46EEEF4FA558AA1ADE36995E
32,801,472 UART: Caliptra RT
32,802,183 UART: [state] CFI Enabled
32,919,515 UART: [rt] RT listening for mailbox commands...
32,921,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,951,951 UART: [rt]cmd =0x44504543, len=96
38,631,051 >>> mbox cmd response data (6236 bytes)
38,660,850 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,691,410 UART: [rt]cmd =0x53574545, len=84
44,215,441 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,127,801 ready_for_fw is high
4,128,182 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,066,429 >>> mbox cmd response: success
23,709,062 UART:
23,709,446 UART: Running Caliptra FMC ...
23,710,577 UART:
23,710,757 UART: [state] CFI Enabled
23,718,489 UART: [fht] FMC Alias Private Key: 7
26,049,752 UART: [art] Extend RT PCRs Done
26,050,973 UART: [art] Lock RT PCRs Done
26,052,715 UART: [art] Populate DV Done
26,058,194 UART: [fht] FMC Alias Private Key: 7
26,059,735 UART: [art] Derive CDI
26,060,553 UART: [art] Store in in slot 0x4
26,103,322 UART: [art] Derive Key Pair
26,104,369 UART: [art] Store priv key in slot 0x5
29,346,403 UART: [art] Derive Key Pair - Done
29,359,293 UART: [art] Signing Cert with AUTHO
29,360,596 UART: RITY.KEYID = 7
31,639,951 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,457 UART: [art] PUB.X = 08F273BC71DDB30EF465E23D59AFE5D95709CD6AB96FE78E9E50B6A868521E90569E01863B1FA3760EC112E0827B56DD
31,648,676 UART: [art] PUB.Y = 432B8F54885E318326BDABDA8689865F6B0C77ECB87F08275BB4ABEC585F4486C9804319175148B75BBBA8DACFA2CB9E
31,655,942 UART: [art] SIG.R = CBF82F7CA0E2D70C82D4A8BF8683973A7DE3659CF8BC2FF12D2A126FD62321D28C52E58362E3E85B860279C7F0EA7B9B
31,663,357 UART: [art] SIG.S = A19BBF8A8265F12167099D302DA34EF524E55B79DB459FBB863B5FAE183D5F9EAEB0C661C74C66198EDC709E2C2E7E60
32,969,116 UART: Caliptra RT
32,969,833 UART: [state] CFI Enabled
33,087,441 UART: [rt] RT listening for mailbox commands...
33,089,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,120,020 UART: [rt]cmd =0x44504543, len=96
38,799,880 >>> mbox cmd response data (6236 bytes)
38,829,635 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,860,149 UART: [rt]cmd =0x53574545, len=84
44,384,720 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
192,563 UART:
192,925 UART: Running Caliptra ROM ...
194,103 UART:
194,258 UART: [state] CFI Enabled
265,230 UART: [state] LifecycleState = Unprovisioned
267,104 UART: [state] DebugLocked = No
269,131 UART: [state] WD Timer not started. Device not locked for debugging
273,017 UART: [kat] SHA2-256
452,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,679 UART: [kat] ++
464,231 UART: [kat] sha1
475,685 UART: [kat] SHA2-256
478,685 UART: [kat] SHA2-384
484,965 UART: [kat] SHA2-512-ACC
487,903 UART: [kat] ECC-384
2,947,766 UART: [kat] HMAC-384Kdf
2,970,524 UART: [kat] LMS
3,499,955 UART: [kat] --
3,506,728 UART: [cold-reset] ++
3,509,302 UART: [fht] FHT @ 0x50003400
3,520,352 UART: [idev] ++
3,520,929 UART: [idev] CDI.KEYID = 6
3,521,842 UART: [idev] SUBJECT.KEYID = 7
3,523,020 UART: [idev] UDS.KEYID = 0
3,524,074 ready_for_fw is high
3,524,274 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,125 UART: [idev] Erasing UDS.KEYID = 0
6,027,371 UART: [idev] Sha1 KeyId Algorithm
6,050,458 UART: [idev] --
6,055,021 UART: [ldev] ++
6,055,606 UART: [ldev] CDI.KEYID = 6
6,056,521 UART: [ldev] SUBJECT.KEYID = 5
6,057,684 UART: [ldev] AUTHORITY.KEYID = 7
6,058,921 UART: [ldev] FE.KEYID = 1
6,101,217 UART: [ldev] Erasing FE.KEYID = 1
8,608,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,349 UART: [ldev] --
10,413,910 UART: [fwproc] Wait for Commands...
10,416,887 UART: [fwproc] Recv command 0x46574c44
10,418,990 UART: [fwproc] Recv'd Img size: 114360 bytes
13,828,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,287,215 >>> mbox cmd response: success
14,292,323 UART: [afmc] ++
14,292,925 UART: [afmc] CDI.KEYID = 6
14,293,838 UART: [afmc] SUBJECT.KEYID = 7
14,294,997 UART: [afmc] AUTHORITY.KEYID = 5
16,829,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,150 UART: [afmc] --
18,631,487 UART: [cold-reset] --
18,636,916 UART: [state] Locking Datavault
18,641,953 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,604 UART: [state] Locking ICCM
18,644,840 UART: [exit] Launching FMC @ 0x40000130
18,653,235 UART:
18,653,475 UART: Running Caliptra FMC ...
18,654,579 UART:
18,654,741 UART: [state] CFI Enabled
18,713,653 UART: [fht] FMC Alias Private Key: 7
20,478,289 UART: [art] Extend RT PCRs Done
20,479,527 UART: [art] Lock RT PCRs Done
20,481,420 UART: [art] Populate DV Done
20,486,940 UART: [fht] FMC Alias Private Key: 7
20,488,654 UART: [art] Derive CDI
20,489,497 UART: [art] Store in in slot 0x4
20,546,373 UART: [art] Derive Key Pair
20,547,412 UART: [art] Store priv key in slot 0x5
23,010,667 UART: [art] Derive Key Pair - Done
23,023,716 UART: [art] Signing Cert with AUTHO
23,025,028 UART: RITY.KEYID = 7
24,750,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,031 UART: [art] PUB.X = C287FFFD2F413B8AAC384276EE5DA3CFD3B2A9BC63530D9775184B8F5E24755EE484E684E619E0748829588D5AAB9A44
24,759,339 UART: [art] PUB.Y = 810A675CFE3F6E65AF7E93BED6C5CC3FF2E252557788F9D6E3550C269345B3BAFC2A82DCF2854A6FEA3230DB1A2EF57A
24,766,609 UART: [art] SIG.R = CA02D726A31F0ED47B90B86809FD8067D587AA553BEDE9C564120AF615F3350BCB1FC43A50E8E97CCA036970E5967012
24,773,976 UART: [art] SIG.S = 1F2613ABEE84DDE7AF281223AE80D3F9FA93E5B45CD5DF3675AC93DAE9E90C4F668D56EBCCC44612039A1960A0A811DE
25,753,070 UART: Caliptra RT
25,753,762 UART: [state] CFI Enabled
25,919,016 UART: [rt] RT listening for mailbox commands...
25,920,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,951,414 UART: [rt]cmd =0x44504543, len=96
30,318,994 >>> mbox cmd response data (6236 bytes)
30,348,587 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,379,325 UART: [rt]cmd =0x53574545, len=84
34,548,804 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,521 UART:
192,878 UART: Running Caliptra ROM ...
193,988 UART:
194,134 UART: [state] CFI Enabled
268,403 UART: [state] LifecycleState = Unprovisioned
270,762 UART: [state] DebugLocked = No
272,397 UART: [state] WD Timer not started. Device not locked for debugging
276,380 UART: [kat] SHA2-256
466,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,098 UART: [kat] ++
477,583 UART: [kat] sha1
489,453 UART: [kat] SHA2-256
492,535 UART: [kat] SHA2-384
497,816 UART: [kat] SHA2-512-ACC
500,402 UART: [kat] ECC-384
2,951,738 UART: [kat] HMAC-384Kdf
2,973,709 UART: [kat] LMS
3,505,430 UART: [kat] --
3,511,393 UART: [cold-reset] ++
3,512,473 UART: [fht] FHT @ 0x50003400
3,522,557 UART: [idev] ++
3,523,259 UART: [idev] CDI.KEYID = 6
3,524,146 UART: [idev] SUBJECT.KEYID = 7
3,525,388 UART: [idev] UDS.KEYID = 0
3,526,489 ready_for_fw is high
3,526,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,707 UART: [idev] Erasing UDS.KEYID = 0
6,031,454 UART: [idev] Sha1 KeyId Algorithm
6,053,298 UART: [idev] --
6,058,808 UART: [ldev] ++
6,059,488 UART: [ldev] CDI.KEYID = 6
6,060,371 UART: [ldev] SUBJECT.KEYID = 5
6,061,583 UART: [ldev] AUTHORITY.KEYID = 7
6,062,824 UART: [ldev] FE.KEYID = 1
6,100,341 UART: [ldev] Erasing FE.KEYID = 1
8,604,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,137 UART: [ldev] --
10,416,577 UART: [fwproc] Wait for Commands...
10,419,484 UART: [fwproc] Recv command 0x46574c44
10,421,792 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,601,382 >>> mbox cmd response: success
14,605,404 UART: [afmc] ++
14,606,119 UART: [afmc] CDI.KEYID = 6
14,607,373 UART: [afmc] SUBJECT.KEYID = 7
14,608,814 UART: [afmc] AUTHORITY.KEYID = 5
17,147,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,065 UART: [afmc] --
18,948,236 UART: [cold-reset] --
18,952,268 UART: [state] Locking Datavault
18,957,742 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,946 UART: [state] Locking ICCM
18,962,210 UART: [exit] Launching FMC @ 0x40000130
18,970,841 UART:
18,971,078 UART: Running Caliptra FMC ...
18,972,184 UART:
18,972,343 UART: [state] CFI Enabled
19,030,866 UART: [fht] FMC Alias Private Key: 7
20,794,857 UART: [art] Extend RT PCRs Done
20,796,083 UART: [art] Lock RT PCRs Done
20,797,735 UART: [art] Populate DV Done
20,803,272 UART: [fht] FMC Alias Private Key: 7
20,804,866 UART: [art] Derive CDI
20,805,603 UART: [art] Store in in slot 0x4
20,863,740 UART: [art] Derive Key Pair
20,864,779 UART: [art] Store priv key in slot 0x5
23,327,602 UART: [art] Derive Key Pair - Done
23,340,814 UART: [art] Signing Cert with AUTHO
23,342,115 UART: RITY.KEYID = 7
25,053,753 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,266 UART: [art] PUB.X = 00A7B50C48C3B089517828FF448E759B3EE202C0C8688458076F5B540F6341C12D8267E4139D18AADE2022ED4E85C8D8
25,062,494 UART: [art] PUB.Y = 3BB9A4A66CC75E255B1C0C3A7440AFD21618BBDAA5E5A974F25AC0C8B399F5D2A6CD3D520F6E9A8BC6309373251B782A
25,069,769 UART: [art] SIG.R = CE12E6322F3FC7958F916C3749D2B5E0D2CE29EA32AB0E04334CDAF1AFB62A7F6A7345F421C26F315EE9E4FA5DAE7F6C
25,077,181 UART: [art] SIG.S = DBC81A3E25415FED83D0C97D05FB41227503BBCE06889DD142FA1AABA5061F7085D7BB3F952EAA3FD1154A6C0474A33F
26,056,340 UART: Caliptra RT
26,057,030 UART: [state] CFI Enabled
26,221,817 UART: [rt] RT listening for mailbox commands...
26,223,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,410 UART: [rt]cmd =0x44504543, len=96
30,621,203 >>> mbox cmd response data (6236 bytes)
30,650,936 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,681,492 UART: [rt]cmd =0x53574545, len=84
34,852,679 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
3,441,080 ready_for_fw is high
3,441,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,734,148 >>> mbox cmd response: success
19,022,559 UART:
19,022,959 UART: Running Caliptra FMC ...
19,024,158 UART:
19,024,336 UART: [state] CFI Enabled
19,088,177 UART: [fht] FMC Alias Private Key: 7
20,852,140 UART: [art] Extend RT PCRs Done
20,853,360 UART: [art] Lock RT PCRs Done
20,854,992 UART: [art] Populate DV Done
20,860,566 UART: [fht] FMC Alias Private Key: 7
20,862,214 UART: [art] Derive CDI
20,863,032 UART: [art] Store in in slot 0x4
20,920,884 UART: [art] Derive Key Pair
20,921,923 UART: [art] Store priv key in slot 0x5
23,385,081 UART: [art] Derive Key Pair - Done
23,398,009 UART: [art] Signing Cert with AUTHO
23,399,342 UART: RITY.KEYID = 7
25,111,024 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,543 UART: [art] PUB.X = 1D15E42BCCDBB9D2E8099B9F8762747A1326FFE1D320A5BE56D26CE26F3D71B20DB23B5FE6ECA4D94A4BA92BCB5EE897
25,119,821 UART: [art] PUB.Y = 4107C047614DF63FC189DA84A5FBDA72D2A2653A13AC0CFEC74297B6E7C83763C3B39BF7B45AE2FE282FE1E5549BCED7
25,127,092 UART: [art] SIG.R = FA85159957F950570BA815D92D220BEACDB54263FF0A9BB2398DACD880BFCC7B8E53E44EF1F6455ECFF9B8251E2DF7FB
25,134,514 UART: [art] SIG.S = FE113574189FB094E0BA3118BF4588412E8A6AB70CB78EC4BB548713C23F70315058B6ED1C718E1FF24278D85E636232
26,112,690 UART: Caliptra RT
26,113,404 UART: [state] CFI Enabled
26,278,842 UART: [rt] RT listening for mailbox commands...
26,280,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,311,362 UART: [rt]cmd =0x44504543, len=96
30,678,659 >>> mbox cmd response data (6236 bytes)
30,708,318 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,738,860 UART: [rt]cmd =0x53574545, len=84
34,922,985 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,287 UART:
192,653 UART: Running Caliptra ROM ...
193,786 UART:
603,510 UART: [state] CFI Enabled
621,791 UART: [state] LifecycleState = Unprovisioned
624,172 UART: [state] DebugLocked = No
626,558 UART: [state] WD Timer not started. Device not locked for debugging
631,584 UART: [kat] SHA2-256
821,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,289 UART: [kat] ++
832,764 UART: [kat] sha1
844,585 UART: [kat] SHA2-256
847,564 UART: [kat] SHA2-384
853,913 UART: [kat] SHA2-512-ACC
856,487 UART: [kat] ECC-384
3,299,252 UART: [kat] HMAC-384Kdf
3,311,649 UART: [kat] LMS
3,843,504 UART: [kat] --
3,847,965 UART: [cold-reset] ++
3,848,834 UART: [fht] FHT @ 0x50003400
3,860,236 UART: [idev] ++
3,860,938 UART: [idev] CDI.KEYID = 6
3,861,965 UART: [idev] SUBJECT.KEYID = 7
3,863,065 UART: [idev] UDS.KEYID = 0
3,864,113 ready_for_fw is high
3,864,309 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,949 UART: [idev] Erasing UDS.KEYID = 0
6,340,895 UART: [idev] Sha1 KeyId Algorithm
6,364,199 UART: [idev] --
6,368,431 UART: [ldev] ++
6,369,113 UART: [ldev] CDI.KEYID = 6
6,370,019 UART: [ldev] SUBJECT.KEYID = 5
6,371,252 UART: [ldev] AUTHORITY.KEYID = 7
6,372,428 UART: [ldev] FE.KEYID = 1
6,384,370 UART: [ldev] Erasing FE.KEYID = 1
8,862,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,804 UART: [ldev] --
10,649,796 UART: [fwproc] Wait for Commands...
10,652,966 UART: [fwproc] Recv command 0x46574c44
10,655,273 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,834,840 >>> mbox cmd response: success
14,838,066 UART: [afmc] ++
14,838,971 UART: [afmc] CDI.KEYID = 6
14,839,951 UART: [afmc] SUBJECT.KEYID = 7
14,841,438 UART: [afmc] AUTHORITY.KEYID = 5
17,342,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,308 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,687 UART: [afmc] --
19,136,389 UART: [cold-reset] --
19,139,437 UART: [state] Locking Datavault
19,144,148 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,330 UART: [state] Locking ICCM
19,148,370 UART: [exit] Launching FMC @ 0x40000130
19,157,059 UART:
19,157,300 UART: Running Caliptra FMC ...
19,158,397 UART:
19,158,556 UART: [state] CFI Enabled
19,166,550 UART: [fht] FMC Alias Private Key: 7
20,923,201 UART: [art] Extend RT PCRs Done
20,924,412 UART: [art] Lock RT PCRs Done
20,926,138 UART: [art] Populate DV Done
20,931,648 UART: [fht] FMC Alias Private Key: 7
20,933,132 UART: [art] Derive CDI
20,933,893 UART: [art] Store in in slot 0x4
20,976,428 UART: [art] Derive Key Pair
20,977,424 UART: [art] Store priv key in slot 0x5
23,404,688 UART: [art] Derive Key Pair - Done
23,417,625 UART: [art] Signing Cert with AUTHO
23,418,923 UART: RITY.KEYID = 7
25,124,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,649 UART: [art] PUB.X = AF888D1EA4192ABCA80606045A0555F558BDFA0D1FB443BC990879F6616B80473EDB65DEE309EFB641E5B392FDA1270D
25,132,900 UART: [art] PUB.Y = 78DF659049E1E1916D769B93E38A5AC7B6E591769AB82385C233ACCA97044B10D83FAE8EED35962E26EFA37C1792ACFA
25,140,185 UART: [art] SIG.R = F4F8D5F07B12DFEF11DD136E7066AB133A2DEB4769F3B00952B9F2AEB401BDEBC233459B31AB8107928F93576C476067
25,147,580 UART: [art] SIG.S = 95B2E08D03B495AD4B15D51893C2F199153EDC5916B7F1B0D94D5216214792A849E7B58F2988CBDE2D9C14C905641604
26,126,582 UART: Caliptra RT
26,127,272 UART: [state] CFI Enabled
26,244,816 UART: [rt] RT listening for mailbox commands...
26,246,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,277,334 UART: [rt]cmd =0x44504543, len=96
30,567,179 >>> mbox cmd response data (6236 bytes)
30,597,000 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,627,698 UART: [rt]cmd =0x53574545, len=84
34,762,865 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,758,595 ready_for_fw is high
3,759,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,962,258 >>> mbox cmd response: success
19,218,176 UART:
19,218,562 UART: Running Caliptra FMC ...
19,219,757 UART:
19,219,926 UART: [state] CFI Enabled
19,227,985 UART: [fht] FMC Alias Private Key: 7
20,984,875 UART: [art] Extend RT PCRs Done
20,986,098 UART: [art] Lock RT PCRs Done
20,987,996 UART: [art] Populate DV Done
20,993,351 UART: [fht] FMC Alias Private Key: 7
20,995,052 UART: [art] Derive CDI
20,995,872 UART: [art] Store in in slot 0x4
21,038,196 UART: [art] Derive Key Pair
21,039,218 UART: [art] Store priv key in slot 0x5
23,466,372 UART: [art] Derive Key Pair - Done
23,479,153 UART: [art] Signing Cert with AUTHO
23,480,455 UART: RITY.KEYID = 7
25,186,135 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,643 UART: [art] PUB.X = D31DC4B83EFDE2774761ACBCCDDF5E32AA4212EF3D91859CFD79D83267E0A1B4735BCE2EFB45B63C4B622897C164E734
25,194,904 UART: [art] PUB.Y = 494F4553D8C9DB36C168C100A7FFC41EFB0CC029895A92C5D9093C1B5BC265DD7F8457FEE26645FBC59134A9C0BC537A
25,202,174 UART: [art] SIG.R = E66550346CC5875AFA5D562BC948B852DF85CE87AB7C0B21308E8B4108AB0299EB11434EEC9784BB9780E22CD41C7C98
25,209,573 UART: [art] SIG.S = 0E545C2A260A4D438A4DD1737A2CB327D8EA0F1121D6563256F4B6A5354A089B117A1F7A995558DBED4F3980823AFB96
26,188,509 UART: Caliptra RT
26,189,196 UART: [state] CFI Enabled
26,306,795 UART: [rt] RT listening for mailbox commands...
26,308,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,434 UART: [rt]cmd =0x44504543, len=96
30,630,901 >>> mbox cmd response data (6236 bytes)
30,660,714 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,691,300 UART: [rt]cmd =0x53574545, len=84
34,827,024 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,349 UART: [kat] SHA2-256
892,287 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,089 UART: [cold-reset] ++
1,476,599 UART: [fht] Storing FHT @ 0x50003400
1,479,244 UART: [idev] ++
1,479,412 UART: [idev] CDI.KEYID = 6
1,479,772 UART: [idev] SUBJECT.KEYID = 7
1,480,196 UART: [idev] UDS.KEYID = 0
1,480,541 ready_for_fw is high
1,480,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,505,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,200 UART: [idev] --
1,515,115 UART: [ldev] ++
1,515,283 UART: [ldev] CDI.KEYID = 6
1,515,646 UART: [ldev] SUBJECT.KEYID = 5
1,516,072 UART: [ldev] AUTHORITY.KEYID = 7
1,516,535 UART: [ldev] FE.KEYID = 1
1,521,557 UART: [ldev] Erasing FE.KEYID = 1
1,546,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,740 UART: [ldev] --
1,586,119 UART: [fwproc] Waiting for Commands...
1,586,884 UART: [fwproc] Received command 0x46574c44
1,587,675 UART: [fwproc] Received Image of size 114360 bytes
2,884,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,136 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,451 >>> mbox cmd response: success
3,078,627 UART: [afmc] ++
3,078,795 UART: [afmc] CDI.KEYID = 6
3,079,157 UART: [afmc] SUBJECT.KEYID = 7
3,079,582 UART: [afmc] AUTHORITY.KEYID = 5
3,114,943 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,007 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,400 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,090 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,863 UART: [afmc] --
3,157,761 UART: [cold-reset] --
3,158,723 UART: [state] Locking Datavault
3,159,694 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,298 UART: [state] Locking ICCM
3,160,786 UART: [exit] Launching FMC @ 0x40000130
3,166,115 UART:
3,166,131 UART: Running Caliptra FMC ...
3,166,539 UART:
3,166,593 UART: [state] CFI Enabled
3,176,872 UART: [fht] FMC Alias Private Key: 7
3,284,901 UART: [art] Extend RT PCRs Done
3,285,329 UART: [art] Lock RT PCRs Done
3,287,017 UART: [art] Populate DV Done
3,295,322 UART: [fht] FMC Alias Private Key: 7
3,296,432 UART: [art] Derive CDI
3,296,712 UART: [art] Store in in slot 0x4
3,382,557 UART: [art] Derive Key Pair
3,382,917 UART: [art] Store priv key in slot 0x5
3,395,847 UART: [art] Derive Key Pair - Done
3,410,710 UART: [art] Signing Cert with AUTHO
3,411,190 UART: RITY.KEYID = 7
3,426,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,207 UART: [art] PUB.X = CFF8E0B9A014E3921BFA442648C00DD56051C069CBBC4A63AA901E9FEFA34C84EE49E07DEFBD1DB2A98E0B24989653E1
3,433,991 UART: [art] PUB.Y = 9371E364D9C416A3EFBCC9153A12888ED5F4CA2284ABD2C9ED58702D2A18360D548B65409A6297B12DCEBC83102A166D
3,440,944 UART: [art] SIG.R = AA3A2DF4E3055A7AF87E3CD518307A33EF38738193537E6EF971D1B97AFA37742FD78F53C6E3A8033A35CD0604CA43CF
3,447,712 UART: [art] SIG.S = 1BD060A73675FB5AA1AA8C2E789C5749D0EABC476D3BAC8B3F40F4AA4E561AD06CF3FC7A7EE71817AF2CDB3D0245D0F4
3,471,524 UART: Caliptra RT
3,471,778 UART: [state] CFI Enabled
3,580,032 UART: [rt] RT listening for mailbox commands...
3,580,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,739 UART: [rt]cmd =0x44504543, len=96
3,798,468 >>> mbox cmd response data (6236 bytes)
3,798,469 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,572 UART: [rt]cmd =0x53574545, len=84
3,853,845 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 ready_for_fw is high
1,362,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,559 >>> mbox cmd response: success
2,989,547 UART:
2,989,563 UART: Running Caliptra FMC ...
2,989,971 UART:
2,990,025 UART: [state] CFI Enabled
3,000,558 UART: [fht] FMC Alias Private Key: 7
3,109,121 UART: [art] Extend RT PCRs Done
3,109,549 UART: [art] Lock RT PCRs Done
3,111,323 UART: [art] Populate DV Done
3,119,874 UART: [fht] FMC Alias Private Key: 7
3,120,842 UART: [art] Derive CDI
3,121,122 UART: [art] Store in in slot 0x4
3,206,557 UART: [art] Derive Key Pair
3,206,917 UART: [art] Store priv key in slot 0x5
3,220,597 UART: [art] Derive Key Pair - Done
3,235,115 UART: [art] Signing Cert with AUTHO
3,235,595 UART: RITY.KEYID = 7
3,250,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,254 UART: [art] PUB.X = 0A3857ED2E952987603A84001725211A98972F48C8D16D554EE972622059F6D1497F94BB5DAA1CCDF5EE3946A5DB5801
3,257,992 UART: [art] PUB.Y = 8AF5455C24706D4B98DC0E794B5744B2695D4EDB89316C793EBD6684067BCF20384E915C540A77E363897F8C8FB9EB56
3,264,933 UART: [art] SIG.R = 959C882FE2A23E3FE7618492DEA0E689C2F34B7AB3B00A5D93BBD661F88274A0AF71153AE2A4C166A71F88E02AF0EAE5
3,271,714 UART: [art] SIG.S = 25761D5D4E6218013F09270A08E7BE68CE3C0B54E9505F8623D6871C90FF737E6F3976E852942C1D8B4419971E23F99B
3,295,336 UART: Caliptra RT
3,295,590 UART: [state] CFI Enabled
3,403,394 UART: [rt] RT listening for mailbox commands...
3,404,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,391 UART: [rt]cmd =0x44504543, len=96
3,622,770 >>> mbox cmd response data (6236 bytes)
3,622,771 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,510 UART: [rt]cmd =0x53574545, len=84
3,678,127 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,317 UART: [kat] SHA2-512-ACC
897,218 UART: [kat] ECC-384
903,141 UART: [kat] HMAC-384Kdf
907,865 UART: [kat] LMS
1,476,061 UART: [kat] --
1,476,808 UART: [cold-reset] ++
1,477,218 UART: [fht] Storing FHT @ 0x50003400
1,480,121 UART: [idev] ++
1,480,289 UART: [idev] CDI.KEYID = 6
1,480,649 UART: [idev] SUBJECT.KEYID = 7
1,481,073 UART: [idev] UDS.KEYID = 0
1,481,418 ready_for_fw is high
1,481,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,505,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,909 UART: [idev] --
1,514,886 UART: [ldev] ++
1,515,054 UART: [ldev] CDI.KEYID = 6
1,515,417 UART: [ldev] SUBJECT.KEYID = 5
1,515,843 UART: [ldev] AUTHORITY.KEYID = 7
1,516,306 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,547,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,023 UART: [ldev] --
1,586,420 UART: [fwproc] Waiting for Commands...
1,587,289 UART: [fwproc] Received command 0x46574c44
1,588,080 UART: [fwproc] Received Image of size 114360 bytes
2,886,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,360 >>> mbox cmd response: success
3,080,586 UART: [afmc] ++
3,080,754 UART: [afmc] CDI.KEYID = 6
3,081,116 UART: [afmc] SUBJECT.KEYID = 7
3,081,541 UART: [afmc] AUTHORITY.KEYID = 5
3,116,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,006 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,399 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,089 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,148 UART: [afmc] --
3,159,278 UART: [cold-reset] --
3,160,302 UART: [state] Locking Datavault
3,161,605 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,209 UART: [state] Locking ICCM
3,162,781 UART: [exit] Launching FMC @ 0x40000130
3,168,110 UART:
3,168,126 UART: Running Caliptra FMC ...
3,168,534 UART:
3,168,677 UART: [state] CFI Enabled
3,179,436 UART: [fht] FMC Alias Private Key: 7
3,287,259 UART: [art] Extend RT PCRs Done
3,287,687 UART: [art] Lock RT PCRs Done
3,289,383 UART: [art] Populate DV Done
3,297,710 UART: [fht] FMC Alias Private Key: 7
3,298,768 UART: [art] Derive CDI
3,299,048 UART: [art] Store in in slot 0x4
3,384,505 UART: [art] Derive Key Pair
3,384,865 UART: [art] Store priv key in slot 0x5
3,398,231 UART: [art] Derive Key Pair - Done
3,412,779 UART: [art] Signing Cert with AUTHO
3,413,259 UART: RITY.KEYID = 7
3,428,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,738 UART: [art] PUB.X = D7630B8229464562AF29D01DE3699A953C7948C2101CED9AA30707CD7E5FE8D69B4F627329011B3CC962428856F48208
3,436,485 UART: [art] PUB.Y = 7FD0EAD9FC689A150F2FE9C7AA9F16D81073266E7CEF34B3F1EA6EFE7652974395CF1F64844C2056C1C3DED39A5CE403
3,443,445 UART: [art] SIG.R = CE328C22900CE5F7A2C8A8ADD2201C4F49BE62B39A00D6D25580D579C6FA147C847BC5C1BF8BAB87B8E1E8456D4AD109
3,450,203 UART: [art] SIG.S = 60AC946FE0FFDE17489047A3AAB5B23680CBEB7AB0C03C0374BBB8187A1949D180E874C8458A34249A56FA2EEABEC9DB
3,474,183 UART: Caliptra RT
3,474,529 UART: [state] CFI Enabled
3,582,901 UART: [rt] RT listening for mailbox commands...
3,583,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,818 UART: [rt]cmd =0x44504543, len=96
3,802,303 >>> mbox cmd response data (6236 bytes)
3,802,304 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,349 UART: [rt]cmd =0x53574545, len=84
3,857,722 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,502 ready_for_fw is high
1,362,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,566 >>> mbox cmd response: success
2,989,402 UART:
2,989,418 UART: Running Caliptra FMC ...
2,989,826 UART:
2,989,969 UART: [state] CFI Enabled
3,001,066 UART: [fht] FMC Alias Private Key: 7
3,108,871 UART: [art] Extend RT PCRs Done
3,109,299 UART: [art] Lock RT PCRs Done
3,110,843 UART: [art] Populate DV Done
3,118,928 UART: [fht] FMC Alias Private Key: 7
3,119,908 UART: [art] Derive CDI
3,120,188 UART: [art] Store in in slot 0x4
3,205,699 UART: [art] Derive Key Pair
3,206,059 UART: [art] Store priv key in slot 0x5
3,219,651 UART: [art] Derive Key Pair - Done
3,234,536 UART: [art] Signing Cert with AUTHO
3,235,016 UART: RITY.KEYID = 7
3,250,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,029 UART: [art] PUB.X = 84544BEB053407D6188CCFF0169C6737988E295FB895F3EEB06999EACABFEA7A5FA957FCEA9122624C834BBF5E140467
3,257,800 UART: [art] PUB.Y = 0003DCA027D78DAD31586F764CC0087B6BF8D620D36B634FB40053CE90E686CE7C09D703320B2A4C602B79C1862C7FB4
3,264,695 UART: [art] SIG.R = 59F9F4768D58B1D44AF3C22D2F7CAA969B49398BBB952FA3F081F3100433E5D9E9B86B7128BC89CE03BB0C1C8E7FAF1C
3,271,472 UART: [art] SIG.S = F6D26BF5F7A4B08C415B8E118E539123BB870F9EB5F2E77BD7FD58B45C345F457AFC9E8525E3223AE332736A119AB3C7
3,295,998 UART: Caliptra RT
3,296,344 UART: [state] CFI Enabled
3,404,374 UART: [rt] RT listening for mailbox commands...
3,405,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,081 UART: [rt]cmd =0x44504543, len=96
3,623,747 >>> mbox cmd response data (6236 bytes)
3,623,748 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,451 UART: [rt]cmd =0x53574545, len=84
3,679,020 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,763 UART: [kat] SHA2-256
903,703 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,634 UART: [kat] LMS
1,170,962 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,848 UART: [idev] ++
1,175,016 UART: [idev] CDI.KEYID = 6
1,175,376 UART: [idev] SUBJECT.KEYID = 7
1,175,800 UART: [idev] UDS.KEYID = 0
1,176,145 ready_for_fw is high
1,176,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,534 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,453 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,932 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,216,927 UART: [ldev] Erasing FE.KEYID = 1
1,244,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,005 UART: [ldev] --
1,283,278 UART: [fwproc] Wait for Commands...
1,284,062 UART: [fwproc] Recv command 0x46574c44
1,284,790 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,190 >>> mbox cmd response: success
2,774,222 UART: [afmc] ++
2,774,390 UART: [afmc] CDI.KEYID = 6
2,774,752 UART: [afmc] SUBJECT.KEYID = 7
2,775,177 UART: [afmc] AUTHORITY.KEYID = 5
2,810,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,607 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,827 UART: [afmc] --
2,853,715 UART: [cold-reset] --
2,854,733 UART: [state] Locking Datavault
2,855,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,422 UART: [state] Locking ICCM
2,856,938 UART: [exit] Launching FMC @ 0x40000130
2,862,267 UART:
2,862,283 UART: Running Caliptra FMC ...
2,862,691 UART:
2,862,745 UART: [state] CFI Enabled
2,873,256 UART: [fht] FMC Alias Private Key: 7
2,981,481 UART: [art] Extend RT PCRs Done
2,981,909 UART: [art] Lock RT PCRs Done
2,983,553 UART: [art] Populate DV Done
2,991,820 UART: [fht] FMC Alias Private Key: 7
2,992,768 UART: [art] Derive CDI
2,993,048 UART: [art] Store in in slot 0x4
3,078,803 UART: [art] Derive Key Pair
3,079,163 UART: [art] Store priv key in slot 0x5
3,092,519 UART: [art] Derive Key Pair - Done
3,107,350 UART: [art] Signing Cert with AUTHO
3,107,830 UART: RITY.KEYID = 7
3,123,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,971 UART: [art] PUB.X = A083DE478810D1A4AE15DD2245E2B2ABDFABE7574C06AAA999B2C823BFD07674BD59E03A24FA58FE29FD870B54E69A94
3,130,753 UART: [art] PUB.Y = 79E20F60719176F25663D34E9C44654B23260A41EBFEE7902FBC755B9697CA78233A7F35D763EB790429070C449880CA
3,137,680 UART: [art] SIG.R = 9BFCC4BBF95813F24AA847760FDB940858EF03F37AE41AABD176A08A5BCFF93ECDCCE2D699C8FF1773CE801D7CF50F3E
3,144,466 UART: [art] SIG.S = 5B55BA93610763910B29BBA56F16A7E21DE74B4B533C32D0C789140C1084216B29A0E678B833A0897ADC4297ED6ADF30
3,168,428 UART: Caliptra RT
3,168,682 UART: [state] CFI Enabled
3,276,926 UART: [rt] RT listening for mailbox commands...
3,277,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,765 UART: [rt]cmd =0x44504543, len=96
3,495,274 >>> mbox cmd response data (6236 bytes)
3,495,275 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,052 UART: [rt]cmd =0x53574545, len=84
3,550,125 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,817 ready_for_fw is high
1,060,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,485 >>> mbox cmd response: success
2,689,051 UART:
2,689,067 UART: Running Caliptra FMC ...
2,689,475 UART:
2,689,529 UART: [state] CFI Enabled
2,699,646 UART: [fht] FMC Alias Private Key: 7
2,807,539 UART: [art] Extend RT PCRs Done
2,807,967 UART: [art] Lock RT PCRs Done
2,809,439 UART: [art] Populate DV Done
2,817,696 UART: [fht] FMC Alias Private Key: 7
2,818,710 UART: [art] Derive CDI
2,818,990 UART: [art] Store in in slot 0x4
2,904,531 UART: [art] Derive Key Pair
2,904,891 UART: [art] Store priv key in slot 0x5
2,917,911 UART: [art] Derive Key Pair - Done
2,932,627 UART: [art] Signing Cert with AUTHO
2,933,107 UART: RITY.KEYID = 7
2,948,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,928 UART: [art] PUB.X = 4EB65358115045E46BF23F723A36443B343FAB216A7669BAEFD534CFDFB818E944D559027EC6852D04E6E71B2E870353
2,955,689 UART: [art] PUB.Y = 2024463E3B5BAAE1F25E9C486A019034DCDD4D48C00109DC4D2733EE1BBBC05B9FD3F80DF735C57723E584F838525F3C
2,962,637 UART: [art] SIG.R = 0A9A0AC7D56EA3AEA14CA520F1D11D8B5C975F60ECAC547717A826E3E71C6F8E479E7B1B9FABFD4DDA72576CD76D89AF
2,969,427 UART: [art] SIG.S = EC8738CF6ED4466E377B518FD46382226DE92BFAAAB23BD0A27AFF142A0596964B0F50907B8664982BBD223339EFBD8D
2,993,170 UART: Caliptra RT
2,993,424 UART: [state] CFI Enabled
3,101,056 UART: [rt] RT listening for mailbox commands...
3,101,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,869 UART: [rt]cmd =0x44504543, len=96
3,319,006 >>> mbox cmd response data (6236 bytes)
3,319,007 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,182 UART: [rt]cmd =0x53574545, len=84
3,375,015 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
893,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,932 UART: [kat] ++
898,084 UART: [kat] sha1
902,490 UART: [kat] SHA2-256
904,430 UART: [kat] SHA2-384
907,217 UART: [kat] SHA2-512-ACC
909,118 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,293 UART: [kat] LMS
1,171,621 UART: [kat] --
1,172,556 UART: [cold-reset] ++
1,172,962 UART: [fht] FHT @ 0x50003400
1,175,703 UART: [idev] ++
1,175,871 UART: [idev] CDI.KEYID = 6
1,176,231 UART: [idev] SUBJECT.KEYID = 7
1,176,655 UART: [idev] UDS.KEYID = 0
1,177,000 ready_for_fw is high
1,177,000 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,571 UART: [idev] Erasing UDS.KEYID = 0
1,201,528 UART: [idev] Sha1 KeyId Algorithm
1,209,968 UART: [idev] --
1,210,924 UART: [ldev] ++
1,211,092 UART: [ldev] CDI.KEYID = 6
1,211,455 UART: [ldev] SUBJECT.KEYID = 5
1,211,881 UART: [ldev] AUTHORITY.KEYID = 7
1,212,344 UART: [ldev] FE.KEYID = 1
1,217,802 UART: [ldev] Erasing FE.KEYID = 1
1,243,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,504 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,743 UART: [fwproc] Recv command 0x46574c44
1,284,471 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,839 >>> mbox cmd response: success
2,776,069 UART: [afmc] ++
2,776,237 UART: [afmc] CDI.KEYID = 6
2,776,599 UART: [afmc] SUBJECT.KEYID = 7
2,777,024 UART: [afmc] AUTHORITY.KEYID = 5
2,813,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,292 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,724 UART: [afmc] --
2,856,852 UART: [cold-reset] --
2,857,658 UART: [state] Locking Datavault
2,859,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,837 UART: [state] Locking ICCM
2,860,265 UART: [exit] Launching FMC @ 0x40000130
2,865,594 UART:
2,865,610 UART: Running Caliptra FMC ...
2,866,018 UART:
2,866,161 UART: [state] CFI Enabled
2,876,972 UART: [fht] FMC Alias Private Key: 7
2,984,611 UART: [art] Extend RT PCRs Done
2,985,039 UART: [art] Lock RT PCRs Done
2,986,445 UART: [art] Populate DV Done
2,994,492 UART: [fht] FMC Alias Private Key: 7
2,995,592 UART: [art] Derive CDI
2,995,872 UART: [art] Store in in slot 0x4
3,081,543 UART: [art] Derive Key Pair
3,081,903 UART: [art] Store priv key in slot 0x5
3,095,089 UART: [art] Derive Key Pair - Done
3,110,190 UART: [art] Signing Cert with AUTHO
3,110,670 UART: RITY.KEYID = 7
3,125,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,745 UART: [art] PUB.X = C8A7CB04FB0DC8644CA5C07E70B11D02D0900D0CB87E9905F3BB271C24E66426F3A1040D86F2D4D614DF4089A5CC2ED1
3,133,503 UART: [art] PUB.Y = 861094467786D3C96A7613D523ED459B8F234E06F858845B3AD47357614FB8CBC4BCC99A7D3AF5C40AF408313F8EB521
3,140,444 UART: [art] SIG.R = B777A23C3B4DD5C6FE24221EA2294F65F5DFCC2694FF4AF7ED3B38D95DD258DE96A56817633FAEC2CD4D0C019FE518E8
3,147,228 UART: [art] SIG.S = FBC32006F7A4B8BD49C311E431BCFB55E72A56ED7BA4389595F5B81AC02E84B9AE858147A2151B2AA783DF17815428E6
3,171,086 UART: Caliptra RT
3,171,432 UART: [state] CFI Enabled
3,279,063 UART: [rt] RT listening for mailbox commands...
3,279,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,668 UART: [rt]cmd =0x44504543, len=96
3,497,382 >>> mbox cmd response data (6236 bytes)
3,497,383 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,296 UART: [rt]cmd =0x53574545, len=84
3,553,253 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,544 ready_for_fw is high
1,060,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,358 >>> mbox cmd response: success
2,690,014 UART:
2,690,030 UART: Running Caliptra FMC ...
2,690,438 UART:
2,690,581 UART: [state] CFI Enabled
2,700,910 UART: [fht] FMC Alias Private Key: 7
2,808,767 UART: [art] Extend RT PCRs Done
2,809,195 UART: [art] Lock RT PCRs Done
2,810,697 UART: [art] Populate DV Done
2,818,724 UART: [fht] FMC Alias Private Key: 7
2,819,822 UART: [art] Derive CDI
2,820,102 UART: [art] Store in in slot 0x4
2,905,881 UART: [art] Derive Key Pair
2,906,241 UART: [art] Store priv key in slot 0x5
2,919,235 UART: [art] Derive Key Pair - Done
2,934,238 UART: [art] Signing Cert with AUTHO
2,934,718 UART: RITY.KEYID = 7
2,950,396 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,161 UART: [art] PUB.X = B1FB1F03B1068DB11628516DC4075198D85B9295153F8794158C6764E8EF42B2E9364E1D759E5A04D77DFD68EB5145AE
2,957,917 UART: [art] PUB.Y = 95D0C2B5CE309E60AB888F99FAAC954CC4173EB4943321246B6BF4C9F6E85E07122C6B257548D31294173F7197ECC08C
2,964,866 UART: [art] SIG.R = 8648A3EB68338DE8FFE27FE06A1475FC6FE87FB8AD67448D754CE202F32276F04741E424231135F11DFE5E1876926A2C
2,971,635 UART: [art] SIG.S = 737181E770B6D22C8FDBF4FC092E815CE9FB4509F933C9B8B0907AA49DC7F86F1FC11D624F4C77A00D18CB6749700828
2,995,638 UART: Caliptra RT
2,995,984 UART: [state] CFI Enabled
3,104,216 UART: [rt] RT listening for mailbox commands...
3,104,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,897 UART: [rt]cmd =0x44504543, len=96
3,322,684 >>> mbox cmd response data (6236 bytes)
3,322,685 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,728 UART: [rt]cmd =0x53574545, len=84
3,379,217 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
915,486 UART: [kat] HMAC-384Kdf
920,088 UART: [kat] LMS
1,168,400 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 ready_for_fw is high
1,173,987 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,176 UART: [ldev] ++
1,208,344 UART: [ldev] CDI.KEYID = 6
1,208,708 UART: [ldev] SUBJECT.KEYID = 5
1,209,135 UART: [ldev] AUTHORITY.KEYID = 7
1,209,598 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,362 UART: [ldev] --
1,280,840 UART: [fwproc] Wait for Commands...
1,281,535 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,620 >>> mbox cmd response: success
2,773,869 UART: [afmc] ++
2,774,037 UART: [afmc] CDI.KEYID = 6
2,774,400 UART: [afmc] SUBJECT.KEYID = 7
2,774,826 UART: [afmc] AUTHORITY.KEYID = 5
2,810,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,940 UART: [afmc] --
2,853,944 UART: [cold-reset] --
2,854,824 UART: [state] Locking Datavault
2,856,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,789 UART: [state] Locking ICCM
2,857,281 UART: [exit] Launching FMC @ 0x40000130
2,862,610 UART:
2,862,626 UART: Running Caliptra FMC ...
2,863,034 UART:
2,863,088 UART: [state] CFI Enabled
2,873,521 UART: [fht] FMC Alias Private Key: 7
2,981,828 UART: [art] Extend RT PCRs Done
2,982,256 UART: [art] Lock RT PCRs Done
2,984,068 UART: [art] Populate DV Done
2,992,371 UART: [fht] FMC Alias Private Key: 7
2,993,515 UART: [art] Derive CDI
2,993,795 UART: [art] Store in in slot 0x4
3,079,536 UART: [art] Derive Key Pair
3,079,896 UART: [art] Store priv key in slot 0x5
3,093,112 UART: [art] Derive Key Pair - Done
3,107,785 UART: [art] Signing Cert with AUTHO
3,108,265 UART: RITY.KEYID = 7
3,123,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,160 UART: [art] PUB.X = D32787848A1627422CFB8A189D055A254E8A81E1490CF39D490E226C82695AC79B363F4026AD540D9D1833B3F377A951
3,130,910 UART: [art] PUB.Y = 05668664C055ED730E145F0FD3D9B23D6EF5AFF214B624A58AF4DDDC8B98157358C2936C82A8E53F156382CB4B20C096
3,137,855 UART: [art] SIG.R = B7D9F5FDF45725DF794EBAD487CE77F5A3DB159A5B8242FA0165F01117CE1DA283E5EFA70957E5AE137B29675EE1511E
3,144,633 UART: [art] SIG.S = 1C2B0EC3F6EDD336477EE32A2ECEE2C420DBF62008F0D0F92566AB817A325F7471479781B73E69F2F97FA7D18EF55661
3,168,504 UART: Caliptra RT
3,168,758 UART: [state] CFI Enabled
3,276,698 UART: [rt] RT listening for mailbox commands...
3,277,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,737 UART: [rt]cmd =0x44504543, len=96
3,494,775 >>> mbox cmd response data (6236 bytes)
3,494,776 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,575 UART: [rt]cmd =0x53574545, len=84
3,549,786 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,960 ready_for_fw is high
1,055,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,916 >>> mbox cmd response: success
2,684,522 UART:
2,684,538 UART: Running Caliptra FMC ...
2,684,946 UART:
2,685,000 UART: [state] CFI Enabled
2,695,741 UART: [fht] FMC Alias Private Key: 7
2,803,746 UART: [art] Extend RT PCRs Done
2,804,174 UART: [art] Lock RT PCRs Done
2,805,920 UART: [art] Populate DV Done
2,814,327 UART: [fht] FMC Alias Private Key: 7
2,815,477 UART: [art] Derive CDI
2,815,757 UART: [art] Store in in slot 0x4
2,901,518 UART: [art] Derive Key Pair
2,901,878 UART: [art] Store priv key in slot 0x5
2,915,662 UART: [art] Derive Key Pair - Done
2,930,213 UART: [art] Signing Cert with AUTHO
2,930,693 UART: RITY.KEYID = 7
2,946,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,950 UART: [art] PUB.X = 2F2110799E39317434F538C64D2E350215381C394A235632A28CDB6BBDA41E51BFF0554D55A7B3E38686DCF5BA486BC5
2,953,717 UART: [art] PUB.Y = 69AEE697A25746975DFE1F31619DCAD5DFFD77C2E7627DA721053E8B2309D7168A42F75BC93AC09F630D4C736229B293
2,960,662 UART: [art] SIG.R = 6335DD177CDBB91577274CFD8550EB83B08C98BFF734500295F6C638530DB587FAEFADDBCB4B2D55ED59B3ED93E7452F
2,967,442 UART: [art] SIG.S = 085D10C6A74E2C9CD3EB6E07A9EEC4D202E597E80CB7A135A8FB5F6D639E7BFC479309F066C0593CACA4DA7FF02426F5
2,991,394 UART: Caliptra RT
2,991,648 UART: [state] CFI Enabled
3,098,906 UART: [rt] RT listening for mailbox commands...
3,099,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,847 UART: [rt]cmd =0x44504543, len=96
3,318,458 >>> mbox cmd response data (6236 bytes)
3,318,459 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,338 UART: [rt]cmd =0x53574545, len=84
3,374,511 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,390 UART: [kat] SHA2-256
902,330 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,168 UART: [fht] FHT @ 0x50003400
1,173,838 UART: [idev] ++
1,174,006 UART: [idev] CDI.KEYID = 6
1,174,367 UART: [idev] SUBJECT.KEYID = 7
1,174,792 UART: [idev] UDS.KEYID = 0
1,175,138 ready_for_fw is high
1,175,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,200,194 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,189 UART: [ldev] ++
1,210,357 UART: [ldev] CDI.KEYID = 6
1,210,721 UART: [ldev] SUBJECT.KEYID = 5
1,211,148 UART: [ldev] AUTHORITY.KEYID = 7
1,211,611 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,097 UART: [ldev] --
1,282,391 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,011 >>> mbox cmd response: success
2,774,142 UART: [afmc] ++
2,774,310 UART: [afmc] CDI.KEYID = 6
2,774,673 UART: [afmc] SUBJECT.KEYID = 7
2,775,099 UART: [afmc] AUTHORITY.KEYID = 5
2,810,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,671 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,390 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,197 UART: [afmc] --
2,854,211 UART: [cold-reset] --
2,855,213 UART: [state] Locking Datavault
2,856,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,796 UART: [state] Locking ICCM
2,857,248 UART: [exit] Launching FMC @ 0x40000130
2,862,577 UART:
2,862,593 UART: Running Caliptra FMC ...
2,863,001 UART:
2,863,144 UART: [state] CFI Enabled
2,873,805 UART: [fht] FMC Alias Private Key: 7
2,981,520 UART: [art] Extend RT PCRs Done
2,981,948 UART: [art] Lock RT PCRs Done
2,983,644 UART: [art] Populate DV Done
2,992,031 UART: [fht] FMC Alias Private Key: 7
2,992,999 UART: [art] Derive CDI
2,993,279 UART: [art] Store in in slot 0x4
3,078,796 UART: [art] Derive Key Pair
3,079,156 UART: [art] Store priv key in slot 0x5
3,092,422 UART: [art] Derive Key Pair - Done
3,107,274 UART: [art] Signing Cert with AUTHO
3,107,754 UART: RITY.KEYID = 7
3,123,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,793 UART: [art] PUB.X = 4F444805151A607984FD8974D6CBBF17759072D74876FC5CB4BD1504874B8011D26E83A5B7B064B8D8BA6CCE52713CF5
3,130,557 UART: [art] PUB.Y = 2195BD27585D8E6C2FA89573792D1202850B1E4FBFDC6E8BD04D888E547F5954A6A773285865FF1CA440B9751607D1FA
3,137,498 UART: [art] SIG.R = 9DD125AA1AE129C6529970BDB0D6AD41B5481331CEC5115AAE63E061A5DECF4A2C74009138F69E7FB95869A62C8DEEF8
3,144,260 UART: [art] SIG.S = 954B9000F29D42D90C1677C0916831790988E5FE15F08B3BC72E8326728E9BE545347EF58AA0B818F6A6CE434AAA773B
3,167,877 UART: Caliptra RT
3,168,223 UART: [state] CFI Enabled
3,275,884 UART: [rt] RT listening for mailbox commands...
3,276,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,483 UART: [rt]cmd =0x44504543, len=96
3,495,170 >>> mbox cmd response data (6236 bytes)
3,495,171 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,074 UART: [rt]cmd =0x53574545, len=84
3,550,249 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 ready_for_fw is high
1,056,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,039 >>> mbox cmd response: success
2,686,113 UART:
2,686,129 UART: Running Caliptra FMC ...
2,686,537 UART:
2,686,680 UART: [state] CFI Enabled
2,697,081 UART: [fht] FMC Alias Private Key: 7
2,805,466 UART: [art] Extend RT PCRs Done
2,805,894 UART: [art] Lock RT PCRs Done
2,807,544 UART: [art] Populate DV Done
2,816,019 UART: [fht] FMC Alias Private Key: 7
2,817,059 UART: [art] Derive CDI
2,817,339 UART: [art] Store in in slot 0x4
2,902,816 UART: [art] Derive Key Pair
2,903,176 UART: [art] Store priv key in slot 0x5
2,916,608 UART: [art] Derive Key Pair - Done
2,931,206 UART: [art] Signing Cert with AUTHO
2,931,686 UART: RITY.KEYID = 7
2,946,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,537 UART: [art] PUB.X = 04805B6EF13721CFCD91E4728520B03DEA66AE39B0F67D8A1D47DB23A0D2914605EA6BFD3C76A1638F64B7970117E33A
2,954,304 UART: [art] PUB.Y = 4CF20382018075E532C4813FDFABF3F69685EA71562DE0D2000224000725CAAF32E0FDA2AE8DE827326DAB14AECD7FDB
2,961,212 UART: [art] SIG.R = 76D557385D4FB53EA7D450C088189EB0A89918FDEF8802AD680ADA5DEAD51863052D0E79B7E73AD607B4B8E4286D3D5F
2,967,977 UART: [art] SIG.S = DE13EB2F104230344EF82030C30A56C976A5925C8FD00C6B06B12A97AC7087E399CEF3A0E38E22EF8B43BEE60ADFC394
2,991,526 UART: Caliptra RT
2,991,872 UART: [state] CFI Enabled
3,099,374 UART: [rt] RT listening for mailbox commands...
3,100,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,047 UART: [rt]cmd =0x44504543, len=96
3,317,802 >>> mbox cmd response data (6236 bytes)
3,317,803 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,676 UART: [rt]cmd =0x53574545, len=84
3,373,013 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,335 UART:
192,709 UART: Running Caliptra ROM ...
193,851 UART:
193,992 UART: [state] CFI Enabled
264,244 UART: [state] LifecycleState = Unprovisioned
266,246 UART: [state] DebugLocked = No
269,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,282 UART: [kat] SHA2-256
443,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,505 UART: [kat] ++
454,952 UART: [kat] sha1
464,986 UART: [kat] SHA2-256
467,707 UART: [kat] SHA2-384
472,268 UART: [kat] SHA2-512-ACC
474,626 UART: [kat] ECC-384
2,768,298 UART: [kat] HMAC-384Kdf
2,799,707 UART: [kat] LMS
3,990,034 UART: [kat] --
3,996,811 UART: [cold-reset] ++
3,997,739 UART: [fht] Storing FHT @ 0x50003400
4,010,198 UART: [idev] ++
4,010,780 UART: [idev] CDI.KEYID = 6
4,011,670 UART: [idev] SUBJECT.KEYID = 7
4,012,907 UART: [idev] UDS.KEYID = 0
4,013,892 ready_for_fw is high
4,014,103 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,583 UART: [idev] Erasing UDS.KEYID = 0
7,348,725 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,779 UART: [idev] --
7,373,985 UART: [ldev] ++
7,374,548 UART: [ldev] CDI.KEYID = 6
7,375,520 UART: [ldev] SUBJECT.KEYID = 5
7,376,723 UART: [ldev] AUTHORITY.KEYID = 7
7,377,998 UART: [ldev] FE.KEYID = 1
7,422,123 UART: [ldev] Erasing FE.KEYID = 1
10,753,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,720 UART: [ldev] --
13,114,865 UART: [fwproc] Waiting for Commands...
13,116,728 UART: [fwproc] Received command 0x46574c44
13,118,900 UART: [fwproc] Received Image of size 114036 bytes
17,170,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,395 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,716 >>> mbox cmd response: success
17,635,322 UART: [afmc] ++
17,635,938 UART: [afmc] CDI.KEYID = 6
17,636,819 UART: [afmc] SUBJECT.KEYID = 7
17,637,913 UART: [afmc] AUTHORITY.KEYID = 5
21,003,970 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,140 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,565 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,339 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,802 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,971 UART: [afmc] --
23,380,556 UART: [cold-reset] --
23,384,897 UART: [state] Locking Datavault
23,389,441 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,190 UART: [state] Locking ICCM
23,393,980 UART: [exit] Launching FMC @ 0x40000130
23,402,366 UART:
23,402,609 UART: Running Caliptra FMC ...
23,403,654 UART:
23,403,799 UART: [state] CFI Enabled
23,467,011 UART: [fht] FMC Alias Private Key: 7
25,804,745 UART: [art] Extend RT PCRs Done
25,805,962 UART: [art] Lock RT PCRs Done
25,807,501 UART: [art] Populate DV Done
25,813,020 UART: [fht] FMC Alias Private Key: 7
25,814,770 UART: [art] Derive CDI
25,815,579 UART: [art] Store in in slot 0x4
25,876,190 UART: [art] Derive Key Pair
25,877,225 UART: [art] Store priv key in slot 0x5
29,170,153 UART: [art] Derive Key Pair - Done
29,183,304 UART: [art] Signing Cert with AUTHO
29,184,601 UART: RITY.KEYID = 7
31,471,563 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,078 UART: [art] PUB.X = 4D05FDF33E8DD485900711C88E159F6A43C32D237972B68551661CE75E78CEA90874CE2F067532C4291ED126A0E32576
31,480,337 UART: [art] PUB.Y = 398DA9FAF180F7E51BBB6075B94671C5AB986FF1C909576FE5D71F65250DFDDE88953832B1949CFE766AC4BE327ECC77
31,487,529 UART: [art] SIG.R = E7F0BCBF03604F92524511C84ABAE2E2BA8912E3006C76F5A35EF04495AFBB78A6FE440DA2219D4B3C4FE52369D54531
31,494,891 UART: [art] SIG.S = 9E9CC11483597826BD4E02A76B975933EF09BD1DF5AE1C28203AE92D1B83AC2A5F64F11A6C26E5EAFCDE7E59AC7CF278
32,799,736 UART: Caliptra RT
32,800,451 UART: [state] CFI Enabled
32,962,268 UART: [rt] RT listening for mailbox commands...
32,964,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,995,263 UART: [rt]cmd =0x44504543, len=96
38,788,430 >>> mbox cmd response data (6236 bytes)
38,817,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,848,330 UART: [rt]cmd =0x44504543, len=96
38,886,603 >>> mbox cmd response data (56 bytes)
38,887,324 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,917,521 UART: [rt]cmd =0x52564348, len=36
38,920,036 >>> mbox cmd response data (8 bytes)
38,920,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,951,211 UART: [rt]cmd =0x44504543, len=96
44,739,997 >>> mbox cmd response data (6236 bytes)
44,768,984 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,799,392 UART: [rt]cmd =0x53574545, len=84
50,376,958 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,781,576 ready_for_fw is high
3,782,132 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,869,823 >>> mbox cmd response: success
23,566,927 UART:
23,567,332 UART: Running Caliptra FMC ...
23,568,520 UART:
23,568,682 UART: [state] CFI Enabled
23,637,541 UART: [fht] FMC Alias Private Key: 7
25,975,960 UART: [art] Extend RT PCRs Done
25,977,201 UART: [art] Lock RT PCRs Done
25,978,633 UART: [art] Populate DV Done
25,984,106 UART: [fht] FMC Alias Private Key: 7
25,985,827 UART: [art] Derive CDI
25,986,563 UART: [art] Store in in slot 0x4
26,046,792 UART: [art] Derive Key Pair
26,047,835 UART: [art] Store priv key in slot 0x5
29,340,453 UART: [art] Derive Key Pair - Done
29,353,557 UART: [art] Signing Cert with AUTHO
29,354,855 UART: RITY.KEYID = 7
31,643,221 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,731 UART: [art] PUB.X = D21BE7A1B1DC7828906BF279560709D4A90EAE3F5797BE20A2EF3235F40D3D96F89249A330D0792AB8FFC5134BBCF33F
31,651,958 UART: [art] PUB.Y = 779007D280BC4FD611AD2B8DAC8BCA932D229047F1808141F4ACB8868CE173C0E50D9F4DAF4894BBBCB4FA8287B137F4
31,659,208 UART: [art] SIG.R = 1C0E17B27B2149411C33E5BC5760F996144F763DBC29716C02C70A63BCDD44964C438017D750D0B6C98A6817B452EC22
31,666,575 UART: [art] SIG.S = F38D522AC7D3DBE13A3BB04C28CDBE2B5668426E40CF189FBE507F42EE0E6C35057416471FCE92CAD68541F45E804116
32,971,861 UART: Caliptra RT
32,972,571 UART: [state] CFI Enabled
33,133,795 UART: [rt] RT listening for mailbox commands...
33,136,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,167,103 UART: [rt]cmd =0x44504543, len=96
38,959,622 >>> mbox cmd response data (6236 bytes)
38,988,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,019,768 UART: [rt]cmd =0x44504543, len=96
39,059,273 >>> mbox cmd response data (56 bytes)
39,060,024 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,090,108 UART: [rt]cmd =0x52564348, len=36
39,092,590 >>> mbox cmd response data (8 bytes)
39,093,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,123,877 UART: [rt]cmd =0x44504543, len=96
44,909,360 >>> mbox cmd response data (6236 bytes)
44,938,135 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,968,522 UART: [rt]cmd =0x53574545, len=84
50,545,183 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,399 UART:
192,755 UART: Running Caliptra ROM ...
193,900 UART:
603,697 UART: [state] CFI Enabled
618,217 UART: [state] LifecycleState = Unprovisioned
620,160 UART: [state] DebugLocked = No
623,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,627 UART: [kat] SHA2-256
797,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,868 UART: [kat] ++
808,314 UART: [kat] sha1
820,461 UART: [kat] SHA2-256
823,183 UART: [kat] SHA2-384
829,237 UART: [kat] SHA2-512-ACC
831,671 UART: [kat] ECC-384
3,114,024 UART: [kat] HMAC-384Kdf
3,127,393 UART: [kat] LMS
4,317,520 UART: [kat] --
4,322,798 UART: [cold-reset] ++
4,324,723 UART: [fht] Storing FHT @ 0x50003400
4,337,406 UART: [idev] ++
4,337,975 UART: [idev] CDI.KEYID = 6
4,339,003 UART: [idev] SUBJECT.KEYID = 7
4,340,183 UART: [idev] UDS.KEYID = 0
4,341,216 ready_for_fw is high
4,341,417 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,636 UART: [idev] Erasing UDS.KEYID = 0
7,632,064 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,962 UART: [idev] --
7,658,913 UART: [ldev] ++
7,659,543 UART: [ldev] CDI.KEYID = 6
7,660,470 UART: [ldev] SUBJECT.KEYID = 5
7,661,680 UART: [ldev] AUTHORITY.KEYID = 7
7,662,965 UART: [ldev] FE.KEYID = 1
7,672,200 UART: [ldev] Erasing FE.KEYID = 1
10,962,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,732 UART: [ldev] --
13,325,407 UART: [fwproc] Waiting for Commands...
13,327,861 UART: [fwproc] Received command 0x46574c44
13,330,049 UART: [fwproc] Received Image of size 114036 bytes
17,391,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,469,433 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,538,286 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,854,992 >>> mbox cmd response: success
17,858,890 UART: [afmc] ++
17,859,480 UART: [afmc] CDI.KEYID = 6
17,860,448 UART: [afmc] SUBJECT.KEYID = 7
17,861,663 UART: [afmc] AUTHORITY.KEYID = 5
21,178,079 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,472,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,475,112 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,489,537 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,504,315 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,518,732 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,539,369 UART: [afmc] --
23,542,633 UART: [cold-reset] --
23,545,845 UART: [state] Locking Datavault
23,549,632 UART: [state] Locking PCR0, PCR1 and PCR31
23,551,381 UART: [state] Locking ICCM
23,553,523 UART: [exit] Launching FMC @ 0x40000130
23,561,917 UART:
23,562,148 UART: Running Caliptra FMC ...
23,563,170 UART:
23,563,527 UART: [state] CFI Enabled
23,571,421 UART: [fht] FMC Alias Private Key: 7
25,901,895 UART: [art] Extend RT PCRs Done
25,903,115 UART: [art] Lock RT PCRs Done
25,904,991 UART: [art] Populate DV Done
25,910,616 UART: [fht] FMC Alias Private Key: 7
25,912,312 UART: [art] Derive CDI
25,913,043 UART: [art] Store in in slot 0x4
25,955,854 UART: [art] Derive Key Pair
25,956,852 UART: [art] Store priv key in slot 0x5
29,199,078 UART: [art] Derive Key Pair - Done
29,212,191 UART: [art] Signing Cert with AUTHO
29,213,511 UART: RITY.KEYID = 7
31,492,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,181 UART: [art] PUB.X = 88DFC73D82DD4046F24001F0ADDF31FCD09DFD0C4B083E4442EAF4EFAF0C0F9B061FC5E873CC7766351050B6C47908B2
31,501,445 UART: [art] PUB.Y = F720E42C41C7435B0516A56107825D3D272454AA61EE8EA24675C1DFEEE0FA27AB8B5A71D1C2A7D734ADA4F1B01D126B
31,508,739 UART: [art] SIG.R = 25C0B39CAE3DAD0F42BAC8B4E3CF0EA4595D4C3FB7D541050A49A98E39852D331BEBD753CD81821B587EA7978A308B2D
31,516,145 UART: [art] SIG.S = 97F7B2E653BF876FA97198A46B29E07328052DC7E76B4C8FD6DBCFC3B3BF976CC5C33BCABC9D9665746DDDF116C44C4D
32,821,332 UART: Caliptra RT
32,822,051 UART: [state] CFI Enabled
32,939,077 UART: [rt] RT listening for mailbox commands...
32,941,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,971,839 UART: [rt]cmd =0x44504543, len=96
38,652,731 >>> mbox cmd response data (6236 bytes)
38,681,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,712,552 UART: [rt]cmd =0x44504543, len=96
38,752,022 >>> mbox cmd response data (56 bytes)
38,752,746 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,782,807 UART: [rt]cmd =0x52564348, len=36
38,785,434 >>> mbox cmd response data (8 bytes)
38,785,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,816,534 UART: [rt]cmd =0x44504543, len=96
44,497,578 >>> mbox cmd response data (6236 bytes)
44,526,552 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,557,041 UART: [rt]cmd =0x53574545, len=84
50,081,291 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,124,678 ready_for_fw is high
4,125,256 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,066,430 >>> mbox cmd response: success
23,706,933 UART:
23,707,318 UART: Running Caliptra FMC ...
23,708,460 UART:
23,708,621 UART: [state] CFI Enabled
23,716,686 UART: [fht] FMC Alias Private Key: 7
26,046,881 UART: [art] Extend RT PCRs Done
26,048,587 UART: [art] Lock RT PCRs Done
26,049,601 UART: [art] Populate DV Done
26,054,969 UART: [fht] FMC Alias Private Key: 7
26,056,680 UART: [art] Derive CDI
26,057,422 UART: [art] Store in in slot 0x4
26,100,259 UART: [art] Derive Key Pair
26,101,262 UART: [art] Store priv key in slot 0x5
29,343,409 UART: [art] Derive Key Pair - Done
29,356,244 UART: [art] Signing Cert with AUTHO
29,357,553 UART: RITY.KEYID = 7
31,636,873 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,377 UART: [art] PUB.X = 70904425C85627D2664ADE9A682E02E687224E757264845E7ED4CB7239A84921F564496028CA663A3C5E055163E8930B
31,645,599 UART: [art] PUB.Y = E06F4C2000CE520B1D1FD9CE4D830DF2C94C8BD4FF96565F892D7A194D50BBB19021A8894E2A6C60A9C6D2767136EB7D
31,652,866 UART: [art] SIG.R = 85B61B51F7146CBE8784B44233802D8D504D77B940AE217963E0A90764E7537DCDDEFA614D02FE5A76A3307CAD14DDF3
31,660,229 UART: [art] SIG.S = 16CE6E6AD7B3A7ECA8FF37CC8D78591786961EAC50FC5A7335148091E5CFF3A710A1598EB9062565781B925D4FBBD256
32,965,192 UART: Caliptra RT
32,965,905 UART: [state] CFI Enabled
33,083,740 UART: [rt] RT listening for mailbox commands...
33,086,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,600 UART: [rt]cmd =0x44504543, len=96
38,796,653 >>> mbox cmd response data (6236 bytes)
38,825,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,856,533 UART: [rt]cmd =0x44504543, len=96
38,895,617 >>> mbox cmd response data (56 bytes)
38,896,339 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,926,307 UART: [rt]cmd =0x52564348, len=36
38,929,178 >>> mbox cmd response data (8 bytes)
38,929,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,960,249 UART: [rt]cmd =0x44504543, len=96
44,640,220 >>> mbox cmd response data (6236 bytes)
44,668,985 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,699,363 UART: [rt]cmd =0x53574545, len=84
50,224,396 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,531 UART:
192,905 UART: Running Caliptra ROM ...
194,099 UART:
194,263 UART: [state] CFI Enabled
266,755 UART: [state] LifecycleState = Unprovisioned
268,660 UART: [state] DebugLocked = No
271,118 UART: [state] WD Timer not started. Device not locked for debugging
274,157 UART: [kat] SHA2-256
453,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,800 UART: [kat] ++
465,343 UART: [kat] sha1
476,011 UART: [kat] SHA2-256
479,020 UART: [kat] SHA2-384
485,175 UART: [kat] SHA2-512-ACC
488,120 UART: [kat] ECC-384
2,946,969 UART: [kat] HMAC-384Kdf
2,972,916 UART: [kat] LMS
3,502,401 UART: [kat] --
3,507,487 UART: [cold-reset] ++
3,509,640 UART: [fht] FHT @ 0x50003400
3,520,689 UART: [idev] ++
3,521,256 UART: [idev] CDI.KEYID = 6
3,522,180 UART: [idev] SUBJECT.KEYID = 7
3,523,352 UART: [idev] UDS.KEYID = 0
3,524,279 ready_for_fw is high
3,524,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,262 UART: [idev] Erasing UDS.KEYID = 0
6,027,177 UART: [idev] Sha1 KeyId Algorithm
6,049,486 UART: [idev] --
6,052,778 UART: [ldev] ++
6,053,365 UART: [ldev] CDI.KEYID = 6
6,054,255 UART: [ldev] SUBJECT.KEYID = 5
6,055,361 UART: [ldev] AUTHORITY.KEYID = 7
6,056,704 UART: [ldev] FE.KEYID = 1
6,100,489 UART: [ldev] Erasing FE.KEYID = 1
8,603,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,430 UART: [ldev] --
10,413,421 UART: [fwproc] Wait for Commands...
10,415,399 UART: [fwproc] Recv command 0x46574c44
10,417,493 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,278,269 >>> mbox cmd response: success
14,282,646 UART: [afmc] ++
14,283,249 UART: [afmc] CDI.KEYID = 6
14,284,132 UART: [afmc] SUBJECT.KEYID = 7
14,285,353 UART: [afmc] AUTHORITY.KEYID = 5
16,827,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,160 UART: [afmc] --
18,630,701 UART: [cold-reset] --
18,635,154 UART: [state] Locking Datavault
18,640,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,956 UART: [state] Locking ICCM
18,643,426 UART: [exit] Launching FMC @ 0x40000130
18,651,872 UART:
18,652,102 UART: Running Caliptra FMC ...
18,653,125 UART:
18,653,272 UART: [state] CFI Enabled
18,712,548 UART: [fht] FMC Alias Private Key: 7
20,477,119 UART: [art] Extend RT PCRs Done
20,478,342 UART: [art] Lock RT PCRs Done
20,479,888 UART: [art] Populate DV Done
20,485,515 UART: [fht] FMC Alias Private Key: 7
20,486,992 UART: [art] Derive CDI
20,487,727 UART: [art] Store in in slot 0x4
20,545,191 UART: [art] Derive Key Pair
20,546,227 UART: [art] Store priv key in slot 0x5
23,008,893 UART: [art] Derive Key Pair - Done
23,021,570 UART: [art] Signing Cert with AUTHO
23,022,873 UART: RITY.KEYID = 7
24,734,942 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,460 UART: [art] PUB.X = 519EA5BFFEF8A8FCAB277A8307E1ADBFA3A10891FEDF4A67EE72666710644778BA371477F5668895A16668615F8BB450
24,743,686 UART: [art] PUB.Y = 5384982CB2EE84CF266626A0FAD57B711309500604FB0606B8E959CDFBEA7899870A45570E60086C88FC7E2B66E758F0
24,750,955 UART: [art] SIG.R = AF922C59C3C8CDF127FD5BB7BBBBD01E5ECB4776075D1F2D95AFC44FC695B885EA28A609EDCF5AFC483762B971C36A35
24,758,411 UART: [art] SIG.S = 9646C0DEFDFD8BACC294AB48C891FCDBBF824B11DC22FAC2C9D1B085E35FA26F997E94CA6ADB5245195A4465C1B829C1
25,736,890 UART: Caliptra RT
25,737,609 UART: [state] CFI Enabled
25,902,941 UART: [rt] RT listening for mailbox commands...
25,905,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,935,806 UART: [rt]cmd =0x44504543, len=96
30,302,430 >>> mbox cmd response data (6236 bytes)
30,331,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,362,156 UART: [rt]cmd =0x44504543, len=96
30,401,204 >>> mbox cmd response data (56 bytes)
30,401,940 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,432,065 UART: [rt]cmd =0x52564348, len=36
30,434,819 >>> mbox cmd response data (8 bytes)
30,435,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,465,966 UART: [rt]cmd =0x44504543, len=96
34,846,470 >>> mbox cmd response data (6236 bytes)
34,875,291 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,905,820 UART: [rt]cmd =0x53574545, len=84
39,076,050 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,206 writing to cptra_bootfsm_go
193,331 UART:
193,698 UART: Running Caliptra ROM ...
194,889 UART:
195,047 UART: [state] CFI Enabled
266,101 UART: [state] LifecycleState = Unprovisioned
268,516 UART: [state] DebugLocked = No
271,387 UART: [state] WD Timer not started. Device not locked for debugging
276,341 UART: [kat] SHA2-256
466,215 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,955 UART: [kat] ++
477,402 UART: [kat] sha1
490,142 UART: [kat] SHA2-256
493,191 UART: [kat] SHA2-384
500,823 UART: [kat] SHA2-512-ACC
503,405 UART: [kat] ECC-384
2,949,269 UART: [kat] HMAC-384Kdf
2,972,461 UART: [kat] LMS
3,504,231 UART: [kat] --
3,508,170 UART: [cold-reset] ++
3,509,534 UART: [fht] FHT @ 0x50003400
3,522,186 UART: [idev] ++
3,522,936 UART: [idev] CDI.KEYID = 6
3,523,856 UART: [idev] SUBJECT.KEYID = 7
3,525,036 UART: [idev] UDS.KEYID = 0
3,525,965 ready_for_fw is high
3,526,151 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,815 UART: [idev] Erasing UDS.KEYID = 0
6,028,529 UART: [idev] Sha1 KeyId Algorithm
6,051,666 UART: [idev] --
6,057,556 UART: [ldev] ++
6,058,238 UART: [ldev] CDI.KEYID = 6
6,059,159 UART: [ldev] SUBJECT.KEYID = 5
6,060,260 UART: [ldev] AUTHORITY.KEYID = 7
6,061,545 UART: [ldev] FE.KEYID = 1
6,101,911 UART: [ldev] Erasing FE.KEYID = 1
8,609,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,483 UART: [ldev] --
10,415,674 UART: [fwproc] Wait for Commands...
10,417,283 UART: [fwproc] Recv command 0x46574c44
10,419,593 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,606,799 >>> mbox cmd response: success
14,610,922 UART: [afmc] ++
14,611,629 UART: [afmc] CDI.KEYID = 6
14,612,882 UART: [afmc] SUBJECT.KEYID = 7
14,614,322 UART: [afmc] AUTHORITY.KEYID = 5
17,151,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,414 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,698 UART: [afmc] --
18,952,457 UART: [cold-reset] --
18,955,409 UART: [state] Locking Datavault
18,961,156 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,177 UART: [state] Locking ICCM
18,966,182 UART: [exit] Launching FMC @ 0x40000130
18,974,817 UART:
18,975,060 UART: Running Caliptra FMC ...
18,976,087 UART:
18,976,235 UART: [state] CFI Enabled
19,033,424 UART: [fht] FMC Alias Private Key: 7
20,797,694 UART: [art] Extend RT PCRs Done
20,798,920 UART: [art] Lock RT PCRs Done
20,800,576 UART: [art] Populate DV Done
20,805,982 UART: [fht] FMC Alias Private Key: 7
20,807,636 UART: [art] Derive CDI
20,808,456 UART: [art] Store in in slot 0x4
20,866,371 UART: [art] Derive Key Pair
20,867,370 UART: [art] Store priv key in slot 0x5
23,330,414 UART: [art] Derive Key Pair - Done
23,343,519 UART: [art] Signing Cert with AUTHO
23,344,824 UART: RITY.KEYID = 7
25,056,349 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,863 UART: [art] PUB.X = 57EDE1DD7CC4BE7F011A6C3AC785682FF1F99464DDB8E423AB1AB386FEC61E34BC9E2E912DFAE0887C0687AB0629C544
25,065,156 UART: [art] PUB.Y = 89BDCB1203438AFF304621B7ACE64CF4C12EE9445456C531D84C9D7A04C960D88178C924FF28B27C3D339FAFEBE74833
25,072,432 UART: [art] SIG.R = C271E7E083718A14E360BD86378354EF4BAA24D6C32FF16A691F202891132651C1C82F42C24072C9A6DBA38B24D84DCA
25,079,828 UART: [art] SIG.S = 2650770BFF8AEB5FEF5A91F5C2EA967AA62E9DFEAE750105C50FC02A1256BD6E44675C5810FCF2419C9DC0C73CC506F5
26,059,184 UART: Caliptra RT
26,059,904 UART: [state] CFI Enabled
26,238,483 UART: [rt] RT listening for mailbox commands...
26,240,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,271,236 UART: [rt]cmd =0x44504543, len=96
30,658,792 >>> mbox cmd response data (6236 bytes)
30,687,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,718,627 UART: [rt]cmd =0x44504543, len=96
30,757,968 >>> mbox cmd response data (56 bytes)
30,758,742 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,788,819 UART: [rt]cmd =0x52564348, len=36
30,791,739 >>> mbox cmd response data (8 bytes)
30,792,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,822,824 UART: [rt]cmd =0x44504543, len=96
35,202,688 >>> mbox cmd response data (6236 bytes)
35,231,552 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,262,246 UART: [rt]cmd =0x53574545, len=84
39,433,190 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,435,799 ready_for_fw is high
3,436,223 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,734,087 >>> mbox cmd response: success
19,025,974 UART:
19,026,403 UART: Running Caliptra FMC ...
19,027,522 UART:
19,027,677 UART: [state] CFI Enabled
19,092,356 UART: [fht] FMC Alias Private Key: 7
20,855,777 UART: [art] Extend RT PCRs Done
20,857,004 UART: [art] Lock RT PCRs Done
20,858,345 UART: [art] Populate DV Done
20,863,610 UART: [fht] FMC Alias Private Key: 7
20,865,255 UART: [art] Derive CDI
20,865,994 UART: [art] Store in in slot 0x4
20,925,204 UART: [art] Derive Key Pair
20,926,269 UART: [art] Store priv key in slot 0x5
23,389,390 UART: [art] Derive Key Pair - Done
23,402,179 UART: [art] Signing Cert with AUTHO
23,403,485 UART: RITY.KEYID = 7
25,114,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,059 UART: [art] PUB.X = D1161789BD43F0FCAA8AD017DF138EC8E1F7F1CBCFDA775468F85D697C0845A2B66F854BF4E16C45A93CF1DC215C2157
25,123,403 UART: [art] PUB.Y = BEEB9ED70A71250082D1EF5CB4D11041AF86179FC34F6D9C7E3FEA5AED2903A2A4CA6EA03BC04DAE962C7406AC97533B
25,130,616 UART: [art] SIG.R = 400C925BE394AA78DF5D72009FEADB5A22871DB270309DF733B8D9EBFAE9B1E476B8A56584CF90341908003DF2624AC8
25,137,997 UART: [art] SIG.S = 5B533EDB2EC73725D21923DAC8A89B004350892A1D7B43692468358EC96E06ADB30889F09D2ABF0DB4742EF5D3FB70D4
26,117,275 UART: Caliptra RT
26,117,989 UART: [state] CFI Enabled
26,284,096 UART: [rt] RT listening for mailbox commands...
26,286,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,317,116 UART: [rt]cmd =0x44504543, len=96
30,704,366 >>> mbox cmd response data (6236 bytes)
30,733,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,764,558 UART: [rt]cmd =0x44504543, len=96
30,804,162 >>> mbox cmd response data (56 bytes)
30,804,875 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,835,199 UART: [rt]cmd =0x52564348, len=36
30,837,984 >>> mbox cmd response data (8 bytes)
30,838,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,868,823 UART: [rt]cmd =0x44504543, len=96
35,249,449 >>> mbox cmd response data (6236 bytes)
35,278,344 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,308,952 UART: [rt]cmd =0x53574545, len=84
39,479,567 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,293 UART:
192,646 UART: Running Caliptra ROM ...
193,831 UART:
603,548 UART: [state] CFI Enabled
616,571 UART: [state] LifecycleState = Unprovisioned
618,937 UART: [state] DebugLocked = No
620,668 UART: [state] WD Timer not started. Device not locked for debugging
626,188 UART: [kat] SHA2-256
816,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,842 UART: [kat] ++
827,363 UART: [kat] sha1
837,452 UART: [kat] SHA2-256
840,533 UART: [kat] SHA2-384
846,834 UART: [kat] SHA2-512-ACC
849,458 UART: [kat] ECC-384
3,289,375 UART: [kat] HMAC-384Kdf
3,303,096 UART: [kat] LMS
3,834,947 UART: [kat] --
3,840,737 UART: [cold-reset] ++
3,842,888 UART: [fht] FHT @ 0x50003400
3,854,716 UART: [idev] ++
3,855,423 UART: [idev] CDI.KEYID = 6
3,856,454 UART: [idev] SUBJECT.KEYID = 7
3,857,557 UART: [idev] UDS.KEYID = 0
3,858,481 ready_for_fw is high
3,858,694 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,343 UART: [idev] Erasing UDS.KEYID = 0
6,327,859 UART: [idev] Sha1 KeyId Algorithm
6,349,576 UART: [idev] --
6,354,752 UART: [ldev] ++
6,355,423 UART: [ldev] CDI.KEYID = 6
6,356,306 UART: [ldev] SUBJECT.KEYID = 5
6,357,513 UART: [ldev] AUTHORITY.KEYID = 7
6,358,740 UART: [ldev] FE.KEYID = 1
6,372,066 UART: [ldev] Erasing FE.KEYID = 1
8,850,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,325 UART: [ldev] --
10,641,279 UART: [fwproc] Wait for Commands...
10,643,640 UART: [fwproc] Recv command 0x46574c44
10,645,939 UART: [fwproc] Recv'd Img size: 114360 bytes
14,090,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,826,672 >>> mbox cmd response: success
14,831,060 UART: [afmc] ++
14,831,768 UART: [afmc] CDI.KEYID = 6
14,832,945 UART: [afmc] SUBJECT.KEYID = 7
14,834,422 UART: [afmc] AUTHORITY.KEYID = 5
17,339,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,838 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,126 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,311 UART: [afmc] --
19,134,225 UART: [cold-reset] --
19,137,056 UART: [state] Locking Datavault
19,139,979 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,159 UART: [state] Locking ICCM
19,144,251 UART: [exit] Launching FMC @ 0x40000130
19,152,911 UART:
19,153,146 UART: Running Caliptra FMC ...
19,154,243 UART:
19,154,403 UART: [state] CFI Enabled
19,162,391 UART: [fht] FMC Alias Private Key: 7
20,919,481 UART: [art] Extend RT PCRs Done
20,920,696 UART: [art] Lock RT PCRs Done
20,922,481 UART: [art] Populate DV Done
20,927,710 UART: [fht] FMC Alias Private Key: 7
20,929,171 UART: [art] Derive CDI
20,929,906 UART: [art] Store in in slot 0x4
20,972,495 UART: [art] Derive Key Pair
20,973,490 UART: [art] Store priv key in slot 0x5
23,400,475 UART: [art] Derive Key Pair - Done
23,413,263 UART: [art] Signing Cert with AUTHO
23,414,594 UART: RITY.KEYID = 7
25,120,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,749 UART: [art] PUB.X = 5188AA968A0E533E8D1AEAE2AAA7D2F91442A9D6059D3BBDF9FA96496B2345FAB8570E25772D997549BA4DFD05CAC94B
25,129,046 UART: [art] PUB.Y = 1318FF1C9215D59D1DF95AC41C0973F6B027822BF6DD584C9AA4F1A322642385F848BFBE74D71EF57C1F9BDE1D4BB03F
25,136,330 UART: [art] SIG.R = 6A76C264C17BB3974E894F7F6F0D43467130C8FE4F80EB35EAA7DCE89BCF178CAC84D239B1CFFCC11CD7E92F4F63C8F2
25,143,777 UART: [art] SIG.S = 0810A2D953F2EA7980FEE06EC15957527025AF359CC0D727B9AC66133B88A6B49719F5A2D26415EF92415B4DC63E7F0F
26,122,062 UART: Caliptra RT
26,122,777 UART: [state] CFI Enabled
26,239,568 UART: [rt] RT listening for mailbox commands...
26,241,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,272,694 UART: [rt]cmd =0x44504543, len=96
30,564,480 >>> mbox cmd response data (6236 bytes)
30,593,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,624,332 UART: [rt]cmd =0x44504543, len=96
30,662,929 >>> mbox cmd response data (56 bytes)
30,663,649 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,693,792 UART: [rt]cmd =0x52564348, len=36
30,696,310 >>> mbox cmd response data (8 bytes)
30,696,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,727,549 UART: [rt]cmd =0x44504543, len=96
35,018,377 >>> mbox cmd response data (6236 bytes)
35,047,170 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,077,762 UART: [rt]cmd =0x53574545, len=84
39,213,715 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,752,423 ready_for_fw is high
3,753,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,948,457 >>> mbox cmd response: success
19,196,094 UART:
19,196,487 UART: Running Caliptra FMC ...
19,197,672 UART:
19,197,844 UART: [state] CFI Enabled
19,205,951 UART: [fht] FMC Alias Private Key: 7
20,962,758 UART: [art] Extend RT PCRs Done
20,963,984 UART: [art] Lock RT PCRs Done
20,965,607 UART: [art] Populate DV Done
20,970,965 UART: [fht] FMC Alias Private Key: 7
20,972,462 UART: [art] Derive CDI
20,973,249 UART: [art] Store in in slot 0x4
21,016,121 UART: [art] Derive Key Pair
21,017,175 UART: [art] Store priv key in slot 0x5
23,443,669 UART: [art] Derive Key Pair - Done
23,457,034 UART: [art] Signing Cert with AUTHO
23,458,346 UART: RITY.KEYID = 7
25,163,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,194 UART: [art] PUB.X = F3B00676C5B901047FA644A380F0B7EDB5D96FB076C933FA51ADB3175D32C91683F5CF786892E198F1292E46BCFE2AE7
25,172,452 UART: [art] PUB.Y = B1E78FECE5D4777667ED1CC8F7968E800D381CA7C506778CE9E05CDA18F4DE04CEDBC72E98F7CEF335AFC0C45C89F5B0
25,179,717 UART: [art] SIG.R = 7E9BE122A69561A6E2C94B11A131AFD52CF7C52BFAE2918ED8946212EBB5788C5244E4523C58027D2343BF01AACD3AE0
25,187,122 UART: [art] SIG.S = 421E36A871E809A9B009BD842C4B0E37EEE01FEFF0AE1F06349571F87B325A3402A25FD783015E3A1B2F4F1B79BAD703
26,165,881 UART: Caliptra RT
26,166,592 UART: [state] CFI Enabled
26,283,620 UART: [rt] RT listening for mailbox commands...
26,285,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,316,864 UART: [rt]cmd =0x44504543, len=96
30,608,072 >>> mbox cmd response data (6236 bytes)
30,637,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,667,932 UART: [rt]cmd =0x44504543, len=96
30,707,034 >>> mbox cmd response data (56 bytes)
30,707,787 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,737,759 UART: [rt]cmd =0x52564348, len=36
30,740,029 >>> mbox cmd response data (8 bytes)
30,740,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,771,290 UART: [rt]cmd =0x44504543, len=96
35,062,771 >>> mbox cmd response data (6236 bytes)
35,091,733 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,122,554 UART: [rt]cmd =0x53574545, len=84
39,257,742 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
907,146 UART: [kat] LMS
1,475,342 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,477,019 UART: [fht] Storing FHT @ 0x50003400
1,479,846 UART: [idev] ++
1,480,014 UART: [idev] CDI.KEYID = 6
1,480,374 UART: [idev] SUBJECT.KEYID = 7
1,480,798 UART: [idev] UDS.KEYID = 0
1,481,143 ready_for_fw is high
1,481,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,180 UART: [idev] Erasing UDS.KEYID = 0
1,505,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,076 UART: [idev] --
1,515,213 UART: [ldev] ++
1,515,381 UART: [ldev] CDI.KEYID = 6
1,515,744 UART: [ldev] SUBJECT.KEYID = 5
1,516,170 UART: [ldev] AUTHORITY.KEYID = 7
1,516,633 UART: [ldev] FE.KEYID = 1
1,521,833 UART: [ldev] Erasing FE.KEYID = 1
1,546,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,962 UART: [ldev] --
1,586,263 UART: [fwproc] Waiting for Commands...
1,587,116 UART: [fwproc] Received command 0x46574c44
1,587,907 UART: [fwproc] Received Image of size 114360 bytes
2,885,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,826 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,057 >>> mbox cmd response: success
3,079,287 UART: [afmc] ++
3,079,455 UART: [afmc] CDI.KEYID = 6
3,079,817 UART: [afmc] SUBJECT.KEYID = 7
3,080,242 UART: [afmc] AUTHORITY.KEYID = 5
3,115,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,586 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,276 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,201 UART: [afmc] --
3,158,207 UART: [cold-reset] --
3,158,937 UART: [state] Locking Datavault
3,160,042 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,646 UART: [state] Locking ICCM
3,161,292 UART: [exit] Launching FMC @ 0x40000130
3,166,621 UART:
3,166,637 UART: Running Caliptra FMC ...
3,167,045 UART:
3,167,099 UART: [state] CFI Enabled
3,177,476 UART: [fht] FMC Alias Private Key: 7
3,285,573 UART: [art] Extend RT PCRs Done
3,286,001 UART: [art] Lock RT PCRs Done
3,287,389 UART: [art] Populate DV Done
3,295,500 UART: [fht] FMC Alias Private Key: 7
3,296,444 UART: [art] Derive CDI
3,296,724 UART: [art] Store in in slot 0x4
3,382,407 UART: [art] Derive Key Pair
3,382,767 UART: [art] Store priv key in slot 0x5
3,395,221 UART: [art] Derive Key Pair - Done
3,410,013 UART: [art] Signing Cert with AUTHO
3,410,493 UART: RITY.KEYID = 7
3,426,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,986 UART: [art] PUB.X = 6E6A30DB93B4958EA9A7CD93C3334A4B1909CB305F2A70B4AB38480231D1FA73CD0C06E76C727B8B520FD502ABC4068E
3,433,745 UART: [art] PUB.Y = 855AA5ADC5C215F3092B09DB9526926B8A6C8519A35AB9B9A41FF4921EABE61EF288A744ADF083AC2264BB546D31D6C6
3,440,701 UART: [art] SIG.R = 0450561F865D64BBB0F69A780E2CCFE6BD01DE84A3026CEF939FF3E6600252B59B2234C05D774AA40F73D8159D71C2E6
3,447,459 UART: [art] SIG.S = F5B15A5090444D6500B4957973AC0765919CF575C3A906046FEE92C0BE5732F7E1BB69ABDA5ABB0C5A9B180E13B3E424
3,471,025 UART: Caliptra RT
3,471,279 UART: [state] CFI Enabled
3,579,593 UART: [rt] RT listening for mailbox commands...
3,580,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,462 UART: [rt]cmd =0x44504543, len=96
3,798,555 >>> mbox cmd response data (6236 bytes)
3,798,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,463 UART: [rt]cmd =0x44504543, len=96
3,868,434 >>> mbox cmd response data (56 bytes)
3,868,435 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,854 UART: [rt]cmd =0x52564348, len=36
3,899,811 >>> mbox cmd response data (8 bytes)
3,899,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,003 UART: [rt]cmd =0x44504543, len=96
4,118,563 >>> mbox cmd response data (6236 bytes)
4,118,564 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,555 UART: [rt]cmd =0x53574545, len=84
4,174,358 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 ready_for_fw is high
1,362,549 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,499 >>> mbox cmd response: success
2,988,329 UART:
2,988,345 UART: Running Caliptra FMC ...
2,988,753 UART:
2,988,807 UART: [state] CFI Enabled
2,999,412 UART: [fht] FMC Alias Private Key: 7
3,107,813 UART: [art] Extend RT PCRs Done
3,108,241 UART: [art] Lock RT PCRs Done
3,109,927 UART: [art] Populate DV Done
3,118,308 UART: [fht] FMC Alias Private Key: 7
3,119,278 UART: [art] Derive CDI
3,119,558 UART: [art] Store in in slot 0x4
3,205,105 UART: [art] Derive Key Pair
3,205,465 UART: [art] Store priv key in slot 0x5
3,219,025 UART: [art] Derive Key Pair - Done
3,234,055 UART: [art] Signing Cert with AUTHO
3,234,535 UART: RITY.KEYID = 7
3,249,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,372 UART: [art] PUB.X = 8A044019338BD7343123F1F2664BFD09010E7FBB9AF30F7D91A5CD25A0E1FA3E6D18CE7604796421C4DF7FC66D800323
3,257,125 UART: [art] PUB.Y = 593C3A7E240FC138204AE368BCC97B8B015192F7A4B2B4A30DEFD4AA6B6307C502A73679A52597EC7667115ADBEF44E9
3,264,068 UART: [art] SIG.R = 2A0D9697E17A070F1FE18F04753E55BCC2ADD9F77932DAE52CCB2A6E2E972C90785FDF6EFF768FF102E3C23B885D1ED4
3,270,841 UART: [art] SIG.S = 19730481F6FA2E1CC41DA1C39405F2E7ECD91E6E17427B0F968C37F3C853AEF5F7B4B5B78165B5907EC39A9CDD57489D
3,294,633 UART: Caliptra RT
3,294,887 UART: [state] CFI Enabled
3,402,622 UART: [rt] RT listening for mailbox commands...
3,403,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,117 UART: [rt]cmd =0x44504543, len=96
3,621,627 >>> mbox cmd response data (6236 bytes)
3,621,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,827 UART: [rt]cmd =0x44504543, len=96
3,691,300 >>> mbox cmd response data (56 bytes)
3,691,301 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,812 UART: [rt]cmd =0x52564348, len=36
3,722,943 >>> mbox cmd response data (8 bytes)
3,722,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,981 UART: [rt]cmd =0x44504543, len=96
3,941,844 >>> mbox cmd response data (6236 bytes)
3,941,845 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,496 UART: [rt]cmd =0x53574545, len=84
3,997,741 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,446 UART: [kat] SHA2-256
882,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,492 UART: [kat] ++
886,644 UART: [kat] sha1
890,990 UART: [kat] SHA2-256
892,928 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
903,281 UART: [kat] HMAC-384Kdf
907,903 UART: [kat] LMS
1,476,099 UART: [kat] --
1,477,048 UART: [cold-reset] ++
1,477,544 UART: [fht] Storing FHT @ 0x50003400
1,480,419 UART: [idev] ++
1,480,587 UART: [idev] CDI.KEYID = 6
1,480,947 UART: [idev] SUBJECT.KEYID = 7
1,481,371 UART: [idev] UDS.KEYID = 0
1,481,716 ready_for_fw is high
1,481,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,141 UART: [idev] Erasing UDS.KEYID = 0
1,505,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,423 UART: [idev] --
1,515,596 UART: [ldev] ++
1,515,764 UART: [ldev] CDI.KEYID = 6
1,516,127 UART: [ldev] SUBJECT.KEYID = 5
1,516,553 UART: [ldev] AUTHORITY.KEYID = 7
1,517,016 UART: [ldev] FE.KEYID = 1
1,522,518 UART: [ldev] Erasing FE.KEYID = 1
1,548,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,437 UART: [ldev] --
1,587,836 UART: [fwproc] Waiting for Commands...
1,588,521 UART: [fwproc] Received command 0x46574c44
1,589,312 UART: [fwproc] Received Image of size 114360 bytes
2,887,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,654 >>> mbox cmd response: success
3,081,706 UART: [afmc] ++
3,081,874 UART: [afmc] CDI.KEYID = 6
3,082,236 UART: [afmc] SUBJECT.KEYID = 7
3,082,661 UART: [afmc] AUTHORITY.KEYID = 5
3,117,058 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,937 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,627 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,600 UART: [afmc] --
3,160,574 UART: [cold-reset] --
3,161,472 UART: [state] Locking Datavault
3,162,625 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,229 UART: [state] Locking ICCM
3,163,767 UART: [exit] Launching FMC @ 0x40000130
3,169,096 UART:
3,169,112 UART: Running Caliptra FMC ...
3,169,520 UART:
3,169,663 UART: [state] CFI Enabled
3,180,316 UART: [fht] FMC Alias Private Key: 7
3,287,559 UART: [art] Extend RT PCRs Done
3,287,987 UART: [art] Lock RT PCRs Done
3,289,727 UART: [art] Populate DV Done
3,297,776 UART: [fht] FMC Alias Private Key: 7
3,298,914 UART: [art] Derive CDI
3,299,194 UART: [art] Store in in slot 0x4
3,384,889 UART: [art] Derive Key Pair
3,385,249 UART: [art] Store priv key in slot 0x5
3,398,559 UART: [art] Derive Key Pair - Done
3,413,207 UART: [art] Signing Cert with AUTHO
3,413,687 UART: RITY.KEYID = 7
3,429,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,880 UART: [art] PUB.X = 46A92678AC9AE632BFFC86E4D9C08015BFF1A95C0C40506EE34F5904A97DC56AB7185D387B0E29C74DF8F14A5DCD066C
3,436,652 UART: [art] PUB.Y = 17B420650D35091AFC0AB7CE365EC19A4DE870928861D03C0BC8EFFF7D2CEFEF63E168E6E4BFCA129B887EB00F7E2F84
3,443,607 UART: [art] SIG.R = 2F6780242A70620F95681FB12BDF742C37CE5EFB08FFFE7E676620D9057E9CD953040715B63EDE2A313C13BC3976372C
3,450,364 UART: [art] SIG.S = 32A73FBE933C21D45860E65092BB270080B06DE2FE36200CDE5AABE164943AB4DA822C9E0055238B90D0DC829FFF6933
3,474,258 UART: Caliptra RT
3,474,604 UART: [state] CFI Enabled
3,582,319 UART: [rt] RT listening for mailbox commands...
3,582,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,062 UART: [rt]cmd =0x44504543, len=96
3,801,148 >>> mbox cmd response data (6236 bytes)
3,801,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,890 UART: [rt]cmd =0x44504543, len=96
3,870,491 >>> mbox cmd response data (56 bytes)
3,870,492 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,937 UART: [rt]cmd =0x52564348, len=36
3,901,992 >>> mbox cmd response data (8 bytes)
3,901,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,970 UART: [rt]cmd =0x44504543, len=96
4,121,383 >>> mbox cmd response data (6236 bytes)
4,121,384 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,051 UART: [rt]cmd =0x53574545, len=84
4,176,806 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 ready_for_fw is high
1,362,486 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,362 >>> mbox cmd response: success
2,986,498 UART:
2,986,514 UART: Running Caliptra FMC ...
2,986,922 UART:
2,987,065 UART: [state] CFI Enabled
2,997,458 UART: [fht] FMC Alias Private Key: 7
3,105,377 UART: [art] Extend RT PCRs Done
3,105,805 UART: [art] Lock RT PCRs Done
3,107,081 UART: [art] Populate DV Done
3,115,518 UART: [fht] FMC Alias Private Key: 7
3,116,472 UART: [art] Derive CDI
3,116,752 UART: [art] Store in in slot 0x4
3,202,347 UART: [art] Derive Key Pair
3,202,707 UART: [art] Store priv key in slot 0x5
3,216,369 UART: [art] Derive Key Pair - Done
3,230,988 UART: [art] Signing Cert with AUTHO
3,231,468 UART: RITY.KEYID = 7
3,246,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,527 UART: [art] PUB.X = 379900551079F38970FCEF74F2F36E487F8774400B7C78A2EDC7DC24CAF49B59817E92E67719DEDC5967BEE70C44E8D5
3,254,273 UART: [art] PUB.Y = 3D2E1B0599D0D20950703D9D6CE1A7B7D79CA8DA07D4A4F4F53AD600CFA98A8B7407B36015857542C027953E7D13FD01
3,261,190 UART: [art] SIG.R = 989FFD371C6679A3DD34592EEA40B12D44599D62C9C2794B02CD392C9109B1FB0916667BC299E692A7FF643366CCAEB0
3,267,955 UART: [art] SIG.S = E2303ABDD52E6284DA663E4265B57F35F853E285005ADB55EFD6705B2FD3BCD8292478520220B9DA7579F1181AC9AC67
3,292,119 UART: Caliptra RT
3,292,465 UART: [state] CFI Enabled
3,401,484 UART: [rt] RT listening for mailbox commands...
3,402,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,223 UART: [rt]cmd =0x44504543, len=96
3,620,694 >>> mbox cmd response data (6236 bytes)
3,620,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,584 UART: [rt]cmd =0x44504543, len=96
3,689,025 >>> mbox cmd response data (56 bytes)
3,689,026 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,677 UART: [rt]cmd =0x52564348, len=36
3,720,756 >>> mbox cmd response data (8 bytes)
3,720,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,924 UART: [rt]cmd =0x44504543, len=96
3,940,285 >>> mbox cmd response data (6236 bytes)
3,940,286 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,325 UART: [rt]cmd =0x53574545, len=84
3,996,622 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,244 UART: [kat] SHA2-256
892,894 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,019 UART: [kat] ++
897,171 UART: [kat] sha1
901,483 UART: [kat] SHA2-256
903,423 UART: [kat] SHA2-384
906,226 UART: [kat] SHA2-512-ACC
908,127 UART: [kat] ECC-384
917,514 UART: [kat] HMAC-384Kdf
922,112 UART: [kat] LMS
1,170,440 UART: [kat] --
1,171,569 UART: [cold-reset] ++
1,172,021 UART: [fht] FHT @ 0x50003400
1,174,902 UART: [idev] ++
1,175,070 UART: [idev] CDI.KEYID = 6
1,175,430 UART: [idev] SUBJECT.KEYID = 7
1,175,854 UART: [idev] UDS.KEYID = 0
1,176,199 ready_for_fw is high
1,176,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,836 UART: [idev] Erasing UDS.KEYID = 0
1,200,599 UART: [idev] Sha1 KeyId Algorithm
1,209,167 UART: [idev] --
1,210,285 UART: [ldev] ++
1,210,453 UART: [ldev] CDI.KEYID = 6
1,210,816 UART: [ldev] SUBJECT.KEYID = 5
1,211,242 UART: [ldev] AUTHORITY.KEYID = 7
1,211,705 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,592 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,750 >>> mbox cmd response: success
2,774,968 UART: [afmc] ++
2,775,136 UART: [afmc] CDI.KEYID = 6
2,775,498 UART: [afmc] SUBJECT.KEYID = 7
2,775,923 UART: [afmc] AUTHORITY.KEYID = 5
2,812,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,701 UART: [afmc] --
2,855,759 UART: [cold-reset] --
2,856,605 UART: [state] Locking Datavault
2,857,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,332 UART: [state] Locking ICCM
2,858,830 UART: [exit] Launching FMC @ 0x40000130
2,864,159 UART:
2,864,175 UART: Running Caliptra FMC ...
2,864,583 UART:
2,864,637 UART: [state] CFI Enabled
2,875,244 UART: [fht] FMC Alias Private Key: 7
2,983,389 UART: [art] Extend RT PCRs Done
2,983,817 UART: [art] Lock RT PCRs Done
2,985,317 UART: [art] Populate DV Done
2,993,674 UART: [fht] FMC Alias Private Key: 7
2,994,606 UART: [art] Derive CDI
2,994,886 UART: [art] Store in in slot 0x4
3,080,585 UART: [art] Derive Key Pair
3,080,945 UART: [art] Store priv key in slot 0x5
3,094,009 UART: [art] Derive Key Pair - Done
3,108,916 UART: [art] Signing Cert with AUTHO
3,109,396 UART: RITY.KEYID = 7
3,124,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,543 UART: [art] PUB.X = 94CB877911109E2430C9D1343D49ABF323A32204D863E88A940E96B8D94F6C1853632CD765ED64679CA300E540687CE2
3,132,277 UART: [art] PUB.Y = 3A5ED4BFBA10221C79A142DC77A548D10ECF3194C76A459215CD891CDD3D1EDCBA32E89B0A427769F6D7AE6D8A692324
3,139,235 UART: [art] SIG.R = E819111ECFE46E6401F4D69409D942B102AA8242474395299E87DB5B3607AE2B33E6A6EA214C224B81F4107D0071EDAD
3,145,971 UART: [art] SIG.S = 6C443E9BF017919E3E493BE65AB342830D203AED916F54A847C0165A1948C5FE94E69621ADBFE1F9B55E9AA513928CE0
3,169,763 UART: Caliptra RT
3,170,017 UART: [state] CFI Enabled
3,277,063 UART: [rt] RT listening for mailbox commands...
3,277,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,960 UART: [rt]cmd =0x44504543, len=96
3,496,266 >>> mbox cmd response data (6236 bytes)
3,496,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,002 UART: [rt]cmd =0x44504543, len=96
3,565,035 >>> mbox cmd response data (56 bytes)
3,565,036 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,663 UART: [rt]cmd =0x52564348, len=36
3,596,786 >>> mbox cmd response data (8 bytes)
3,596,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,720 UART: [rt]cmd =0x44504543, len=96
3,815,754 >>> mbox cmd response data (6236 bytes)
3,815,755 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,650 UART: [rt]cmd =0x53574545, len=84
3,870,989 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,325 ready_for_fw is high
1,059,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,037 >>> mbox cmd response: success
2,687,331 UART:
2,687,347 UART: Running Caliptra FMC ...
2,687,755 UART:
2,687,809 UART: [state] CFI Enabled
2,698,362 UART: [fht] FMC Alias Private Key: 7
2,806,505 UART: [art] Extend RT PCRs Done
2,806,933 UART: [art] Lock RT PCRs Done
2,808,355 UART: [art] Populate DV Done
2,816,516 UART: [fht] FMC Alias Private Key: 7
2,817,548 UART: [art] Derive CDI
2,817,828 UART: [art] Store in in slot 0x4
2,903,865 UART: [art] Derive Key Pair
2,904,225 UART: [art] Store priv key in slot 0x5
2,917,085 UART: [art] Derive Key Pair - Done
2,931,847 UART: [art] Signing Cert with AUTHO
2,932,327 UART: RITY.KEYID = 7
2,947,971 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,736 UART: [art] PUB.X = FBEDE2895D65988F438F208815F3AF66C53976E7B9223380871BC46414386F324E041E2A2F5C080B6678534F188B8597
2,955,485 UART: [art] PUB.Y = 8F7A3C3D934D0BA041F48AE2B1B301BEBBB80F050E01B409BBA1BEEC314AB3D67469491D625D37DF359FAB778528F670
2,962,428 UART: [art] SIG.R = 94E6A91F18FD5215D314551D822B1DA35046A3D79513E3706504B45E4C4A9870D3DB14FCE7D9DC9983A96F87C60A2474
2,969,190 UART: [art] SIG.S = FC269D02DD8743C0A5DB02E5102C7587BBB3B4A3FC901B29FDBF6F4A2E478896378D727DC6D11F893AD5505252FF7554
2,992,755 UART: Caliptra RT
2,993,009 UART: [state] CFI Enabled
3,100,556 UART: [rt] RT listening for mailbox commands...
3,101,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,461 UART: [rt]cmd =0x44504543, len=96
3,320,638 >>> mbox cmd response data (6236 bytes)
3,320,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,660 UART: [rt]cmd =0x44504543, len=96
3,391,021 >>> mbox cmd response data (56 bytes)
3,391,022 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,719 UART: [rt]cmd =0x52564348, len=36
3,422,952 >>> mbox cmd response data (8 bytes)
3,422,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,452,908 UART: [rt]cmd =0x44504543, len=96
3,642,442 >>> mbox cmd response data (6236 bytes)
3,642,443 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,626 UART: [rt]cmd =0x53574545, len=84
3,698,461 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,311 UART: [kat] SHA2-256
893,961 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,086 UART: [kat] ++
898,238 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,819 UART: [kat] HMAC-384Kdf
923,233 UART: [kat] LMS
1,171,561 UART: [kat] --
1,172,460 UART: [cold-reset] ++
1,172,986 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,200,918 UART: [idev] Sha1 KeyId Algorithm
1,209,396 UART: [idev] --
1,210,402 UART: [ldev] ++
1,210,570 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,359 UART: [ldev] AUTHORITY.KEYID = 7
1,211,822 UART: [ldev] FE.KEYID = 1
1,217,120 UART: [ldev] Erasing FE.KEYID = 1
1,243,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,322 UART: [ldev] --
1,282,765 UART: [fwproc] Wait for Commands...
1,283,359 UART: [fwproc] Recv command 0x46574c44
1,284,087 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,125 >>> mbox cmd response: success
2,775,229 UART: [afmc] ++
2,775,397 UART: [afmc] CDI.KEYID = 6
2,775,759 UART: [afmc] SUBJECT.KEYID = 7
2,776,184 UART: [afmc] AUTHORITY.KEYID = 5
2,811,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,398 UART: [afmc] --
2,855,482 UART: [cold-reset] --
2,856,372 UART: [state] Locking Datavault
2,857,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,071 UART: [state] Locking ICCM
2,858,629 UART: [exit] Launching FMC @ 0x40000130
2,863,958 UART:
2,863,974 UART: Running Caliptra FMC ...
2,864,382 UART:
2,864,525 UART: [state] CFI Enabled
2,875,450 UART: [fht] FMC Alias Private Key: 7
2,982,923 UART: [art] Extend RT PCRs Done
2,983,351 UART: [art] Lock RT PCRs Done
2,984,717 UART: [art] Populate DV Done
2,992,702 UART: [fht] FMC Alias Private Key: 7
2,993,800 UART: [art] Derive CDI
2,994,080 UART: [art] Store in in slot 0x4
3,079,757 UART: [art] Derive Key Pair
3,080,117 UART: [art] Store priv key in slot 0x5
3,093,437 UART: [art] Derive Key Pair - Done
3,108,071 UART: [art] Signing Cert with AUTHO
3,108,551 UART: RITY.KEYID = 7
3,124,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,832 UART: [art] PUB.X = 0262DAF8095CA39D1CC398EC2B3FACB414183F5A2AF395C64B31934249AA76A05E5503CDCDFBD1F626F1BCEC4058EB26
3,131,611 UART: [art] PUB.Y = 52E1888DC70B332570832425665757FE9C2501E1DF69B8B289F7C9DD54619C6C0AD674244DFB989219484CEC3EFF9C28
3,138,550 UART: [art] SIG.R = BA44FCD394D8F3C6E8F4666D7CB75C7064AA8A457412FFAA761BFDB80FFE7508BA98397952E54CA34D7BC50859CFDAAA
3,145,333 UART: [art] SIG.S = BA511EB13721DB504573E436E2C07AB273E288CA2BA66537CEA2570462F8CAA79E4B937EFE4D58AED4F8EE8D42248BBD
3,169,537 UART: Caliptra RT
3,169,883 UART: [state] CFI Enabled
3,276,576 UART: [rt] RT listening for mailbox commands...
3,277,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,323 UART: [rt]cmd =0x44504543, len=96
3,496,829 >>> mbox cmd response data (6236 bytes)
3,496,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,711 UART: [rt]cmd =0x44504543, len=96
3,566,662 >>> mbox cmd response data (56 bytes)
3,566,663 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,596,366 UART: [rt]cmd =0x52564348, len=36
3,598,807 >>> mbox cmd response data (8 bytes)
3,598,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,793 UART: [rt]cmd =0x44504543, len=96
3,817,414 >>> mbox cmd response data (6236 bytes)
3,817,415 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,202 UART: [rt]cmd =0x53574545, len=84
3,873,867 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,926 ready_for_fw is high
1,060,926 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,654 >>> mbox cmd response: success
2,690,266 UART:
2,690,282 UART: Running Caliptra FMC ...
2,690,690 UART:
2,690,833 UART: [state] CFI Enabled
2,701,610 UART: [fht] FMC Alias Private Key: 7
2,810,187 UART: [art] Extend RT PCRs Done
2,810,615 UART: [art] Lock RT PCRs Done
2,812,029 UART: [art] Populate DV Done
2,820,238 UART: [fht] FMC Alias Private Key: 7
2,821,196 UART: [art] Derive CDI
2,821,476 UART: [art] Store in in slot 0x4
2,907,309 UART: [art] Derive Key Pair
2,907,669 UART: [art] Store priv key in slot 0x5
2,920,263 UART: [art] Derive Key Pair - Done
2,935,186 UART: [art] Signing Cert with AUTHO
2,935,666 UART: RITY.KEYID = 7
2,951,080 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,845 UART: [art] PUB.X = F879915F3D2444F964CB4D9D2791CE7A988A90EAD7F06CA22C5226092B1B278E9FAD5C4AFA7517CCB3E1C80218ED255C
2,958,621 UART: [art] PUB.Y = 9AB2703D310594F76DDDE515BC231A7091C7B0894FFFCD086A559F14D150767EA74C174482D671BA307EC426ED0A670A
2,965,563 UART: [art] SIG.R = 46622DCA9314E2A37B1F0B15B41BE183C77A8C059F1B64E959B4979893F2334A030E34F97E5633323FF1CFC27ADB941D
2,972,323 UART: [art] SIG.S = 378C6EF2506DACE4AB697C06594907F0AB860BDE760BABDF608DB754084528F67D92C8D79E8C5B6C974305C3A4E4D6A5
2,995,642 UART: Caliptra RT
2,995,988 UART: [state] CFI Enabled
3,104,062 UART: [rt] RT listening for mailbox commands...
3,104,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,755 UART: [rt]cmd =0x44504543, len=96
3,324,309 >>> mbox cmd response data (6236 bytes)
3,324,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,215 UART: [rt]cmd =0x44504543, len=96
3,394,538 >>> mbox cmd response data (56 bytes)
3,394,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,424,132 UART: [rt]cmd =0x52564348, len=36
3,425,999 >>> mbox cmd response data (8 bytes)
3,426,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,891 UART: [rt]cmd =0x44504543, len=96
3,646,010 >>> mbox cmd response data (6236 bytes)
3,646,011 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,860 UART: [rt]cmd =0x53574545, len=84
3,701,709 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,967 UART: [kat] ++
895,119 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,560 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,573 UART: [idev] ++
1,172,741 UART: [idev] CDI.KEYID = 6
1,173,102 UART: [idev] SUBJECT.KEYID = 7
1,173,527 UART: [idev] UDS.KEYID = 0
1,173,873 ready_for_fw is high
1,173,873 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,363 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,342 UART: [ldev] ++
1,208,510 UART: [ldev] CDI.KEYID = 6
1,208,874 UART: [ldev] SUBJECT.KEYID = 5
1,209,301 UART: [ldev] AUTHORITY.KEYID = 7
1,209,764 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,787 UART: [fwproc] Recv command 0x46574c44
1,282,520 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,832 >>> mbox cmd response: success
2,774,061 UART: [afmc] ++
2,774,229 UART: [afmc] CDI.KEYID = 6
2,774,592 UART: [afmc] SUBJECT.KEYID = 7
2,775,018 UART: [afmc] AUTHORITY.KEYID = 5
2,810,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,799 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,668 UART: [afmc] --
2,853,660 UART: [cold-reset] --
2,854,438 UART: [state] Locking Datavault
2,855,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,159 UART: [state] Locking ICCM
2,856,755 UART: [exit] Launching FMC @ 0x40000130
2,862,084 UART:
2,862,100 UART: Running Caliptra FMC ...
2,862,508 UART:
2,862,562 UART: [state] CFI Enabled
2,872,505 UART: [fht] FMC Alias Private Key: 7
2,980,036 UART: [art] Extend RT PCRs Done
2,980,464 UART: [art] Lock RT PCRs Done
2,982,024 UART: [art] Populate DV Done
2,990,221 UART: [fht] FMC Alias Private Key: 7
2,991,261 UART: [art] Derive CDI
2,991,541 UART: [art] Store in in slot 0x4
3,077,002 UART: [art] Derive Key Pair
3,077,362 UART: [art] Store priv key in slot 0x5
3,090,448 UART: [art] Derive Key Pair - Done
3,105,076 UART: [art] Signing Cert with AUTHO
3,105,556 UART: RITY.KEYID = 7
3,120,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,185 UART: [art] PUB.X = F38DCCC0BE169E0D3CCA3A6D2BB64DDD57CFCB31FB3D146A0AECAE63807AF78A4E8A11BE03E2F3ACBA9F905032592E22
3,127,978 UART: [art] PUB.Y = 3F459A3B798F89643CF3EA92D2FD39933642AD37F16A4DB8302F5E4F7CB2B6A64CCC23757F6D6789FB685B352173A75D
3,134,934 UART: [art] SIG.R = 9187EE4E7B98E4CB9913FFBD8588DB36CD25757911AF637C4C8677248A776F37E1CC7A4B98172EEC1B297DD88144A4D9
3,141,710 UART: [art] SIG.S = DDA48ECD0D269BD3F47E7C74B54A9C6DDDFA32A38E6D2762EBCFD872F7C377447CCDA9D68351CB8C6FBC434B975E13F5
3,165,826 UART: Caliptra RT
3,166,080 UART: [state] CFI Enabled
3,272,947 UART: [rt] RT listening for mailbox commands...
3,273,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,752 UART: [rt]cmd =0x44504543, len=96
3,491,587 >>> mbox cmd response data (6236 bytes)
3,491,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,681 UART: [rt]cmd =0x44504543, len=96
3,561,320 >>> mbox cmd response data (56 bytes)
3,561,321 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,700 UART: [rt]cmd =0x52564348, len=36
3,592,755 >>> mbox cmd response data (8 bytes)
3,592,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,667 UART: [rt]cmd =0x44504543, len=96
3,812,018 >>> mbox cmd response data (6236 bytes)
3,812,019 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,040 UART: [rt]cmd =0x53574545, len=84
3,867,389 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,652 ready_for_fw is high
1,056,652 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,682 >>> mbox cmd response: success
2,685,310 UART:
2,685,326 UART: Running Caliptra FMC ...
2,685,734 UART:
2,685,788 UART: [state] CFI Enabled
2,696,331 UART: [fht] FMC Alias Private Key: 7
2,804,370 UART: [art] Extend RT PCRs Done
2,804,798 UART: [art] Lock RT PCRs Done
2,806,488 UART: [art] Populate DV Done
2,814,487 UART: [fht] FMC Alias Private Key: 7
2,815,539 UART: [art] Derive CDI
2,815,819 UART: [art] Store in in slot 0x4
2,901,324 UART: [art] Derive Key Pair
2,901,684 UART: [art] Store priv key in slot 0x5
2,915,362 UART: [art] Derive Key Pair - Done
2,930,453 UART: [art] Signing Cert with AUTHO
2,930,933 UART: RITY.KEYID = 7
2,945,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,598 UART: [art] PUB.X = 07298D5B9A8269BE039CF183562F570E91ED70D65E785FAE461364AFEC7FC08241419CB785C5D8276CFF032975A7938E
2,953,356 UART: [art] PUB.Y = 6D40774A213428C7547B2F2AE78F0D9622E4E578E3F393F22FA771BB82CD208623E558D3A140A517770ABD9193B25F7F
2,960,298 UART: [art] SIG.R = 6AC2B6AA44C92B7B695BC1D9BEEF657E0BA01AE5231917FBB6F6F45457DEDEA7C5138CDC7149DBDBEC7CD056252B2A2C
2,967,093 UART: [art] SIG.S = C693F9BB5BCB0152FDAB9CB132E558A98FF7A7E877268D0C361B3C21A6322B9FDD1F37E22A98D212C3F25BDD8E093DE9
2,990,439 UART: Caliptra RT
2,990,693 UART: [state] CFI Enabled
3,098,423 UART: [rt] RT listening for mailbox commands...
3,099,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,210 UART: [rt]cmd =0x44504543, len=96
3,317,648 >>> mbox cmd response data (6236 bytes)
3,317,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,536 UART: [rt]cmd =0x44504543, len=96
3,386,911 >>> mbox cmd response data (56 bytes)
3,386,912 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,416,599 UART: [rt]cmd =0x52564348, len=36
3,418,962 >>> mbox cmd response data (8 bytes)
3,418,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,792 UART: [rt]cmd =0x44504543, len=96
3,637,835 >>> mbox cmd response data (6236 bytes)
3,637,836 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,667,695 UART: [rt]cmd =0x53574545, len=84
3,692,976 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,021 UART: [state] LifecycleState = Unprovisioned
86,676 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,976 UART: [kat] ++
896,128 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 ready_for_fw is high
1,174,450 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,576 UART: [idev] --
1,208,623 UART: [ldev] ++
1,208,791 UART: [ldev] CDI.KEYID = 6
1,209,155 UART: [ldev] SUBJECT.KEYID = 5
1,209,582 UART: [ldev] AUTHORITY.KEYID = 7
1,210,045 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,241,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,221 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,314 UART: [fwproc] Recv command 0x46574c44
1,282,047 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,677 >>> mbox cmd response: success
2,772,912 UART: [afmc] ++
2,773,080 UART: [afmc] CDI.KEYID = 6
2,773,443 UART: [afmc] SUBJECT.KEYID = 7
2,773,869 UART: [afmc] AUTHORITY.KEYID = 5
2,809,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,031 UART: [afmc] --
2,853,159 UART: [cold-reset] --
2,854,055 UART: [state] Locking Datavault
2,855,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,614 UART: [state] Locking ICCM
2,856,228 UART: [exit] Launching FMC @ 0x40000130
2,861,557 UART:
2,861,573 UART: Running Caliptra FMC ...
2,861,981 UART:
2,862,124 UART: [state] CFI Enabled
2,872,815 UART: [fht] FMC Alias Private Key: 7
2,981,278 UART: [art] Extend RT PCRs Done
2,981,706 UART: [art] Lock RT PCRs Done
2,983,318 UART: [art] Populate DV Done
2,991,623 UART: [fht] FMC Alias Private Key: 7
2,992,593 UART: [art] Derive CDI
2,992,873 UART: [art] Store in in slot 0x4
3,078,410 UART: [art] Derive Key Pair
3,078,770 UART: [art] Store priv key in slot 0x5
3,092,484 UART: [art] Derive Key Pair - Done
3,107,181 UART: [art] Signing Cert with AUTHO
3,107,661 UART: RITY.KEYID = 7
3,123,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,812 UART: [art] PUB.X = 7843D4EA1595CC51F1AA1996906539E2ABD266258EAAF08B918A65F9DACEE3088293BE3AD6751F097326CCCB5E3446F1
3,130,584 UART: [art] PUB.Y = 93077CC5BB410F5438B0ECB34B7DEF1B8D432D67DBDEE51EA1A94A7BCCE222AC3433DD4F5401D25D57C143642BE8AB87
3,137,545 UART: [art] SIG.R = 918B25398C9DDD666604E8C263D5D13B49E9A6A6E52E5885CCFF069921EB86C2120E5467ACFF67EC3BD8120C73564236
3,144,305 UART: [art] SIG.S = 610063F3A43165670D1A8329AAA7FDA7B58C06D569A80D5E3ED6530E9A9702B32E76FE859D06FDEABEA0FEE254FE8456
3,168,094 UART: Caliptra RT
3,168,440 UART: [state] CFI Enabled
3,275,776 UART: [rt] RT listening for mailbox commands...
3,276,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,707 UART: [rt]cmd =0x44504543, len=96
3,495,002 >>> mbox cmd response data (6236 bytes)
3,495,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,042 UART: [rt]cmd =0x44504543, len=96
3,564,315 >>> mbox cmd response data (56 bytes)
3,564,316 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,999 UART: [rt]cmd =0x52564348, len=36
3,596,218 >>> mbox cmd response data (8 bytes)
3,596,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,070 UART: [rt]cmd =0x44504543, len=96
3,815,238 >>> mbox cmd response data (6236 bytes)
3,815,239 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,090 UART: [rt]cmd =0x53574545, len=84
3,870,675 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,769 >>> mbox cmd response: success
2,684,855 UART:
2,684,871 UART: Running Caliptra FMC ...
2,685,279 UART:
2,685,422 UART: [state] CFI Enabled
2,695,781 UART: [fht] FMC Alias Private Key: 7
2,803,626 UART: [art] Extend RT PCRs Done
2,804,054 UART: [art] Lock RT PCRs Done
2,806,032 UART: [art] Populate DV Done
2,814,229 UART: [fht] FMC Alias Private Key: 7
2,815,285 UART: [art] Derive CDI
2,815,565 UART: [art] Store in in slot 0x4
2,901,078 UART: [art] Derive Key Pair
2,901,438 UART: [art] Store priv key in slot 0x5
2,915,926 UART: [art] Derive Key Pair - Done
2,930,589 UART: [art] Signing Cert with AUTHO
2,931,069 UART: RITY.KEYID = 7
2,946,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,140 UART: [art] PUB.X = DDD5D751455FBF50C94C76324D72DD4FA109B18822EA6962787AB6BF8573788FC3A73ECA3C8ADBB7723E5FF2AAEEB52E
2,953,927 UART: [art] PUB.Y = F9131A130ADF3734CF6823D82F5FC85B76329922EE4A2D0895E4509043559633057E5B0FA36317E21FC416A6EA7C1D4F
2,960,863 UART: [art] SIG.R = 9EE21ED1C9BC5EA428B4886594DF66840251D2F7E4C211C41CE47B078799FAEE372BA74F4783CD86CB143631EC9407F8
2,967,630 UART: [art] SIG.S = F27E60054FB9815672E52AE9C51EBDFCF3B7C640793E6FC6B27509E4E859DEDA0EE521FDEEF7FE401AE132767B870CC8
2,991,467 UART: Caliptra RT
2,991,813 UART: [state] CFI Enabled
3,100,176 UART: [rt] RT listening for mailbox commands...
3,100,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,099 UART: [rt]cmd =0x44504543, len=96
3,319,973 >>> mbox cmd response data (6236 bytes)
3,319,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,073 UART: [rt]cmd =0x44504543, len=96
3,389,668 >>> mbox cmd response data (56 bytes)
3,389,669 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,178 UART: [rt]cmd =0x52564348, len=36
3,421,197 >>> mbox cmd response data (8 bytes)
3,421,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,331 UART: [rt]cmd =0x44504543, len=96
3,640,963 >>> mbox cmd response data (6236 bytes)
3,640,964 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,803 UART: [rt]cmd =0x53574545, len=84
3,696,374 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,264 UART:
192,650 UART: Running Caliptra ROM ...
193,768 UART:
193,906 UART: [state] CFI Enabled
265,754 UART: [state] LifecycleState = Unprovisioned
267,685 UART: [state] DebugLocked = No
268,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,006 UART: [kat] SHA2-256
442,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,252 UART: [kat] ++
453,722 UART: [kat] sha1
465,581 UART: [kat] SHA2-256
468,302 UART: [kat] SHA2-384
472,937 UART: [kat] SHA2-512-ACC
475,299 UART: [kat] ECC-384
2,766,810 UART: [kat] HMAC-384Kdf
2,799,365 UART: [kat] LMS
3,989,679 UART: [kat] --
3,994,921 UART: [cold-reset] ++
3,996,571 UART: [fht] Storing FHT @ 0x50003400
4,007,187 UART: [idev] ++
4,007,756 UART: [idev] CDI.KEYID = 6
4,008,708 UART: [idev] SUBJECT.KEYID = 7
4,009,945 UART: [idev] UDS.KEYID = 0
4,010,903 ready_for_fw is high
4,011,090 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,497 UART: [idev] Erasing UDS.KEYID = 0
7,346,127 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,763 UART: [idev] --
7,372,127 UART: [ldev] ++
7,372,744 UART: [ldev] CDI.KEYID = 6
7,373,752 UART: [ldev] SUBJECT.KEYID = 5
7,374,904 UART: [ldev] AUTHORITY.KEYID = 7
7,376,179 UART: [ldev] FE.KEYID = 1
7,420,872 UART: [ldev] Erasing FE.KEYID = 1
10,755,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,561 UART: [ldev] --
13,135,760 UART: [fwproc] Waiting for Commands...
13,138,866 UART: [fwproc] Received command 0x46574c44
13,141,035 UART: [fwproc] Received Image of size 114036 bytes
17,190,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,192 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,651,938 >>> mbox cmd response: success
17,655,751 UART: [afmc] ++
17,656,398 UART: [afmc] CDI.KEYID = 6
17,657,463 UART: [afmc] SUBJECT.KEYID = 7
17,658,567 UART: [afmc] AUTHORITY.KEYID = 5
21,025,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,278 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,573 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,031 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,775 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,206 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,461 UART: [afmc] --
23,401,934 UART: [cold-reset] --
23,404,401 UART: [state] Locking Datavault
23,410,027 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,780 UART: [state] Locking ICCM
23,413,816 UART: [exit] Launching FMC @ 0x40000130
23,422,206 UART:
23,422,445 UART: Running Caliptra FMC ...
23,423,561 UART:
23,423,724 UART: [state] CFI Enabled
23,490,094 UART: [fht] FMC Alias Private Key: 7
25,827,387 UART: [art] Extend RT PCRs Done
25,828,611 UART: [art] Lock RT PCRs Done
25,830,230 UART: [art] Populate DV Done
25,835,692 UART: [fht] FMC Alias Private Key: 7
25,837,233 UART: [art] Derive CDI
25,838,040 UART: [art] Store in in slot 0x4
25,900,161 UART: [art] Derive Key Pair
25,901,195 UART: [art] Store priv key in slot 0x5
29,193,399 UART: [art] Derive Key Pair - Done
29,206,363 UART: [art] Signing Cert with AUTHO
29,207,666 UART: RITY.KEYID = 7
31,494,736 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,241 UART: [art] PUB.X = A2E75E0482FCD913F0B843CFC6EB6BF44DE0E5E65372ABD816B22E41E0168F15BC5979874D09742486C882E2BD9CCE30
31,503,529 UART: [art] PUB.Y = 75444B4723F92E8277E1D6C2358D5FC42A18A6DB8DFE6A55290682C4EB7B86ACA537B0C75B770E0D91636503DD378E2C
31,510,769 UART: [art] SIG.R = A2868CDDEFB08A1A779C84FA808C202F17A24630A54BF7DA9623E8AD64375A38B64C562AAB92A60EC1E42D34EF75F250
31,518,142 UART: [art] SIG.S = A83A5D9F1FD8154899FEA6991E503026966897FD42EFDB8E677204DF13071C2BB07D06DBE7B1DB640F028CE419F92DB8
32,823,399 UART: Caliptra RT
32,824,112 UART: [state] CFI Enabled
32,984,094 UART: [rt] RT listening for mailbox commands...
32,986,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,017,107 UART: [rt]cmd =0x44504543, len=96
38,809,460 >>> mbox cmd response data (6236 bytes)
38,838,752 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,869,262 UART: [rt]cmd =0x53574545, len=84
44,446,087 >>> mbox cmd response data (200 bytes)
44,830,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,861,347 UART: [rt]cmd =0x44504543, len=96
44,900,505 >>> mbox cmd response data (56 bytes)
44,901,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,931,841 UART: [rt]cmd =0x44504543, len=96
44,977,109 >>> mbox cmd response data (24 bytes)
44,977,668 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,008,098 UART: [rt]cmd =0x53574545, len=84
50,588,991 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
3,788,557 ready_for_fw is high
3,788,947 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,860,804 >>> mbox cmd response: success
23,555,056 UART:
23,555,449 UART: Running Caliptra FMC ...
23,556,547 UART:
23,556,690 UART: [state] CFI Enabled
23,624,366 UART: [fht] FMC Alias Private Key: 7
25,961,944 UART: [art] Extend RT PCRs Done
25,963,165 UART: [art] Lock RT PCRs Done
25,964,699 UART: [art] Populate DV Done
25,970,060 UART: [fht] FMC Alias Private Key: 7
25,971,595 UART: [art] Derive CDI
25,972,322 UART: [art] Store in in slot 0x4
26,032,708 UART: [art] Derive Key Pair
26,033,750 UART: [art] Store priv key in slot 0x5
29,306,535 UART: [art] Derive Key Pair - Done
29,319,581 UART: [art] Signing Cert with AUTHO
29,320,895 UART: RITY.KEYID = 7
31,608,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,610,264 UART: [art] PUB.X = C591C24B8A2BAA62185D189F85FBE2135D18F4227D74F1256462D3B6AD06631120F3B460E4443DB3A353A12951A9C4DF
31,617,540 UART: [art] PUB.Y = 7EA3922A2AF373F86C4D44AC8A2C569DA6A6B4FBACADF9E11892A50E023C6F50E335E605698A25298B27089EC46EF531
31,624,798 UART: [art] SIG.R = F4C8AE8FFD1EE1909E514E22AFDF67A806CEA01F5A243BF42E7DC8DD5B89740226112B7914C79905109E773990B477EC
31,632,154 UART: [art] SIG.S = E86AC1550C7D6A875C3007C89D229C97853B5944BDF55EE541C1D861D98CB8095119963DB6DDC40ED8DBCDFB0291ECD0
32,936,779 UART: Caliptra RT
32,937,496 UART: [state] CFI Enabled
33,099,642 UART: [rt] RT listening for mailbox commands...
33,101,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,132,696 UART: [rt]cmd =0x44504543, len=96
38,924,383 >>> mbox cmd response data (6236 bytes)
38,953,583 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,984,147 UART: [rt]cmd =0x53574545, len=84
44,561,769 >>> mbox cmd response data (200 bytes)
44,944,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,975,630 UART: [rt]cmd =0x44504543, len=96
45,014,308 >>> mbox cmd response data (56 bytes)
45,015,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,045,640 UART: [rt]cmd =0x44504543, len=96
45,091,454 >>> mbox cmd response data (24 bytes)
45,092,009 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,122,554 UART: [rt]cmd =0x53574545, len=84
50,704,141 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,364 UART:
192,723 UART: Running Caliptra ROM ...
193,821 UART:
603,427 UART: [state] CFI Enabled
619,292 UART: [state] LifecycleState = Unprovisioned
621,240 UART: [state] DebugLocked = No
623,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,388 UART: [kat] SHA2-256
799,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,702 UART: [kat] ++
810,150 UART: [kat] sha1
820,841 UART: [kat] SHA2-256
823,530 UART: [kat] SHA2-384
830,673 UART: [kat] SHA2-512-ACC
833,042 UART: [kat] ECC-384
3,117,512 UART: [kat] HMAC-384Kdf
3,129,175 UART: [kat] LMS
4,319,297 UART: [kat] --
4,325,374 UART: [cold-reset] ++
4,327,804 UART: [fht] Storing FHT @ 0x50003400
4,339,662 UART: [idev] ++
4,340,265 UART: [idev] CDI.KEYID = 6
4,341,182 UART: [idev] SUBJECT.KEYID = 7
4,342,432 UART: [idev] UDS.KEYID = 0
4,343,476 ready_for_fw is high
4,343,684 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,754 UART: [idev] Erasing UDS.KEYID = 0
7,630,769 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,542 UART: [idev] --
7,655,126 UART: [ldev] ++
7,655,697 UART: [ldev] CDI.KEYID = 6
7,656,657 UART: [ldev] SUBJECT.KEYID = 5
7,657,868 UART: [ldev] AUTHORITY.KEYID = 7
7,659,106 UART: [ldev] FE.KEYID = 1
7,670,075 UART: [ldev] Erasing FE.KEYID = 1
10,959,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,762 UART: [ldev] --
13,316,689 UART: [fwproc] Waiting for Commands...
13,319,377 UART: [fwproc] Received command 0x46574c44
13,321,561 UART: [fwproc] Received Image of size 114036 bytes
17,378,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,158 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,038 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,841,448 >>> mbox cmd response: success
17,846,456 UART: [afmc] ++
17,847,050 UART: [afmc] CDI.KEYID = 6
17,847,961 UART: [afmc] SUBJECT.KEYID = 7
17,849,179 UART: [afmc] AUTHORITY.KEYID = 5
21,165,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,721 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,987 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,371 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,186 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,611 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,079 UART: [afmc] --
23,531,354 UART: [cold-reset] --
23,534,672 UART: [state] Locking Datavault
23,538,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,807 UART: [state] Locking ICCM
23,541,098 UART: [exit] Launching FMC @ 0x40000130
23,549,498 UART:
23,549,744 UART: Running Caliptra FMC ...
23,550,845 UART:
23,551,007 UART: [state] CFI Enabled
23,559,356 UART: [fht] FMC Alias Private Key: 7
25,890,879 UART: [art] Extend RT PCRs Done
25,892,096 UART: [art] Lock RT PCRs Done
25,893,830 UART: [art] Populate DV Done
25,899,566 UART: [fht] FMC Alias Private Key: 7
25,901,263 UART: [art] Derive CDI
25,902,073 UART: [art] Store in in slot 0x4
25,944,517 UART: [art] Derive Key Pair
25,945,557 UART: [art] Store priv key in slot 0x5
29,187,735 UART: [art] Derive Key Pair - Done
29,200,781 UART: [art] Signing Cert with AUTHO
29,202,082 UART: RITY.KEYID = 7
31,481,781 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,283 UART: [art] PUB.X = 4C4F2BF4AB38B7E0119ADCB4EE0B60482A430C68A8274246D1FDA6EDDE65E293B38E56EBAABED91CF271474E39ABA513
31,490,539 UART: [art] PUB.Y = 02A0E60290DEDA181C1ACDB863EC428C1112B55E7BBA0752AA74D52BBCDCAF245B4E3EBCA07ED77F6542FCA40560D4DF
31,497,852 UART: [art] SIG.R = CDBBD50D1D727BAD883501F9216F8EF0FF6D9271094B93E1FD63AA45AF45790BC102E1B6E88FFA191232B98F3D99EFFE
31,505,210 UART: [art] SIG.S = A272A94058813E749FE5D22DB34B9F28D20A89424E05D0EA9A0A5DDF23440069316E2A6BD4E9C6AD076CC3375C4EF5E1
32,810,322 UART: Caliptra RT
32,811,032 UART: [state] CFI Enabled
32,929,410 UART: [rt] RT listening for mailbox commands...
32,931,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,962,165 UART: [rt]cmd =0x44504543, len=96
38,641,305 >>> mbox cmd response data (6236 bytes)
38,670,585 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,701,205 UART: [rt]cmd =0x53574545, len=84
44,225,279 >>> mbox cmd response data (200 bytes)
44,609,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,640,521 UART: [rt]cmd =0x44504543, len=96
44,680,185 >>> mbox cmd response data (56 bytes)
44,680,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,711,199 UART: [rt]cmd =0x44504543, len=96
44,748,811 >>> mbox cmd response data (24 bytes)
44,749,400 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,779,975 UART: [rt]cmd =0x53574545, len=84
50,304,157 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,123,285 ready_for_fw is high
4,123,662 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,069,892 >>> mbox cmd response: success
23,708,640 UART:
23,709,049 UART: Running Caliptra FMC ...
23,710,183 UART:
23,710,349 UART: [state] CFI Enabled
23,718,410 UART: [fht] FMC Alias Private Key: 7
26,048,488 UART: [art] Extend RT PCRs Done
26,049,718 UART: [art] Lock RT PCRs Done
26,051,621 UART: [art] Populate DV Done
26,057,101 UART: [fht] FMC Alias Private Key: 7
26,058,711 UART: [art] Derive CDI
26,059,535 UART: [art] Store in in slot 0x4
26,101,871 UART: [art] Derive Key Pair
26,102,869 UART: [art] Store priv key in slot 0x5
29,345,138 UART: [art] Derive Key Pair - Done
29,358,245 UART: [art] Signing Cert with AUTHO
29,359,552 UART: RITY.KEYID = 7
31,638,990 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,496 UART: [art] PUB.X = 35561AFC29889E23D57C45999D0037EEB2C999FDD7096E0AE37A300602888F73F1C2E542C767B1548F261906058C5F58
31,647,733 UART: [art] PUB.Y = A731FEFE4A885FCE77B4B3C59B16C9C3541C7438AD45B436EA643D1332FEE8121FFCBD2D33D70263FE14F8CD95E0F828
31,654,993 UART: [art] SIG.R = B18EA7DD9D4B60BB22164DBB789F6DA0B7AA4563F0085BDCBFC3B2D58DCDAEB66BFE8DCFA7222A8EC9CC346D3789AE75
31,662,469 UART: [art] SIG.S = 172A253BFADE777C2B7E218D464D6B63A4F1E1291310F7E74C2C8F792FE1D9E174C9BC34F4582230E2638D757CE4B8EB
32,967,638 UART: Caliptra RT
32,968,342 UART: [state] CFI Enabled
33,087,425 UART: [rt] RT listening for mailbox commands...
33,089,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,120,808 UART: [rt]cmd =0x44504543, len=96
38,801,294 >>> mbox cmd response data (6236 bytes)
38,830,330 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,860,922 UART: [rt]cmd =0x53574545, len=84
44,385,603 >>> mbox cmd response data (200 bytes)
44,772,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,802,954 UART: [rt]cmd =0x44504543, len=96
44,841,923 >>> mbox cmd response data (56 bytes)
44,842,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,873,151 UART: [rt]cmd =0x44504543, len=96
44,911,345 >>> mbox cmd response data (24 bytes)
44,911,906 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,942,460 UART: [rt]cmd =0x53574545, len=84
50,466,651 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,459 UART:
192,829 UART: Running Caliptra ROM ...
193,978 UART:
194,126 UART: [state] CFI Enabled
266,055 UART: [state] LifecycleState = Unprovisioned
268,268 UART: [state] DebugLocked = No
270,761 UART: [state] WD Timer not started. Device not locked for debugging
274,379 UART: [kat] SHA2-256
453,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,093 UART: [kat] ++
465,637 UART: [kat] sha1
477,227 UART: [kat] SHA2-256
480,300 UART: [kat] SHA2-384
486,573 UART: [kat] SHA2-512-ACC
489,508 UART: [kat] ECC-384
2,947,957 UART: [kat] HMAC-384Kdf
2,963,675 UART: [kat] LMS
3,493,095 UART: [kat] --
3,497,870 UART: [cold-reset] ++
3,499,942 UART: [fht] FHT @ 0x50003400
3,510,773 UART: [idev] ++
3,511,342 UART: [idev] CDI.KEYID = 6
3,512,313 UART: [idev] SUBJECT.KEYID = 7
3,513,486 UART: [idev] UDS.KEYID = 0
3,514,391 ready_for_fw is high
3,514,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,658,431 UART: [idev] Erasing UDS.KEYID = 0
6,017,364 UART: [idev] Sha1 KeyId Algorithm
6,040,028 UART: [idev] --
6,044,320 UART: [ldev] ++
6,044,903 UART: [ldev] CDI.KEYID = 6
6,045,827 UART: [ldev] SUBJECT.KEYID = 5
6,046,989 UART: [ldev] AUTHORITY.KEYID = 7
6,048,226 UART: [ldev] FE.KEYID = 1
6,091,225 UART: [ldev] Erasing FE.KEYID = 1
8,596,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,186 UART: [ldev] --
10,404,207 UART: [fwproc] Wait for Commands...
10,406,679 UART: [fwproc] Recv command 0x46574c44
10,408,780 UART: [fwproc] Recv'd Img size: 114360 bytes
13,802,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,263,159 >>> mbox cmd response: success
14,267,887 UART: [afmc] ++
14,268,507 UART: [afmc] CDI.KEYID = 6
14,269,427 UART: [afmc] SUBJECT.KEYID = 7
14,270,591 UART: [afmc] AUTHORITY.KEYID = 5
16,802,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,541,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,543,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,575,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,190 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,613,585 UART: [afmc] --
18,618,101 UART: [cold-reset] --
18,621,903 UART: [state] Locking Datavault
18,627,205 UART: [state] Locking PCR0, PCR1 and PCR31
18,628,903 UART: [state] Locking ICCM
18,631,056 UART: [exit] Launching FMC @ 0x40000130
18,639,460 UART:
18,639,698 UART: Running Caliptra FMC ...
18,640,798 UART:
18,640,956 UART: [state] CFI Enabled
18,701,087 UART: [fht] FMC Alias Private Key: 7
20,465,171 UART: [art] Extend RT PCRs Done
20,466,409 UART: [art] Lock RT PCRs Done
20,467,822 UART: [art] Populate DV Done
20,473,445 UART: [fht] FMC Alias Private Key: 7
20,475,094 UART: [art] Derive CDI
20,475,909 UART: [art] Store in in slot 0x4
20,534,024 UART: [art] Derive Key Pair
20,535,067 UART: [art] Store priv key in slot 0x5
22,997,786 UART: [art] Derive Key Pair - Done
23,010,838 UART: [art] Signing Cert with AUTHO
23,012,151 UART: RITY.KEYID = 7
24,724,114 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,595 UART: [art] PUB.X = 68FCE1DC826CE127EFF1AD11CE7482486C17E13DC8AECF2E0541450165ACEE7A91FD7A5839C41F8CEA3F3AD191E1FAFD
24,732,923 UART: [art] PUB.Y = 885E98AAD7F0AE19E74CBF0380BF33B8CEC49B13282BD4136846DD51723F7881F4B82058AC34BCFA620B83A74907CAE5
24,740,214 UART: [art] SIG.R = 09CFD42A9D6964E337A0759BF3E3ADE209751EF9F6993B089E47ED8634C01FBABC5340DCED34B0F3CF1847EF90E92A80
24,747,742 UART: [art] SIG.S = 1802EDFEEC5A43D4F73D1CD770BC9620B5788DC046CB8183410FC420FD8A5F063830BB44A0919ED1336DDC06EC32BB3E
25,726,585 UART: Caliptra RT
25,727,314 UART: [state] CFI Enabled
25,892,820 UART: [rt] RT listening for mailbox commands...
25,895,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,925,729 UART: [rt]cmd =0x44504543, len=96
30,313,094 >>> mbox cmd response data (6236 bytes)
30,342,170 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,372,562 UART: [rt]cmd =0x53574545, len=84
34,542,236 >>> mbox cmd response data (200 bytes)
34,928,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,959,316 UART: [rt]cmd =0x44504543, len=96
34,997,789 >>> mbox cmd response data (56 bytes)
34,998,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,029,134 UART: [rt]cmd =0x44504543, len=96
35,070,099 >>> mbox cmd response data (24 bytes)
35,070,691 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,101,048 UART: [rt]cmd =0x53574545, len=84
39,276,923 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,538 UART:
192,904 UART: Running Caliptra ROM ...
194,098 UART:
194,259 UART: [state] CFI Enabled
263,158 UART: [state] LifecycleState = Unprovisioned
265,568 UART: [state] DebugLocked = No
266,983 UART: [state] WD Timer not started. Device not locked for debugging
272,371 UART: [kat] SHA2-256
462,257 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,997 UART: [kat] ++
473,456 UART: [kat] sha1
484,849 UART: [kat] SHA2-256
487,863 UART: [kat] SHA2-384
492,715 UART: [kat] SHA2-512-ACC
495,305 UART: [kat] ECC-384
2,948,706 UART: [kat] HMAC-384Kdf
2,972,841 UART: [kat] LMS
3,504,639 UART: [kat] --
3,510,302 UART: [cold-reset] ++
3,511,415 UART: [fht] FHT @ 0x50003400
3,523,052 UART: [idev] ++
3,523,765 UART: [idev] CDI.KEYID = 6
3,524,711 UART: [idev] SUBJECT.KEYID = 7
3,525,892 UART: [idev] UDS.KEYID = 0
3,526,820 ready_for_fw is high
3,527,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,939 UART: [idev] Erasing UDS.KEYID = 0
6,029,350 UART: [idev] Sha1 KeyId Algorithm
6,050,925 UART: [idev] --
6,056,442 UART: [ldev] ++
6,057,124 UART: [ldev] CDI.KEYID = 6
6,058,046 UART: [ldev] SUBJECT.KEYID = 5
6,059,259 UART: [ldev] AUTHORITY.KEYID = 7
6,060,439 UART: [ldev] FE.KEYID = 1
6,101,341 UART: [ldev] Erasing FE.KEYID = 1
8,607,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,148 UART: [ldev] --
10,415,149 UART: [fwproc] Wait for Commands...
10,418,377 UART: [fwproc] Recv command 0x46574c44
10,420,628 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,607,994 >>> mbox cmd response: success
14,612,019 UART: [afmc] ++
14,612,727 UART: [afmc] CDI.KEYID = 6
14,613,973 UART: [afmc] SUBJECT.KEYID = 7
14,615,413 UART: [afmc] AUTHORITY.KEYID = 5
17,151,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,999 UART: [afmc] --
18,948,888 UART: [cold-reset] --
18,952,743 UART: [state] Locking Datavault
18,959,091 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,246 UART: [state] Locking ICCM
18,963,349 UART: [exit] Launching FMC @ 0x40000130
18,972,034 UART:
18,972,283 UART: Running Caliptra FMC ...
18,973,315 UART:
18,973,462 UART: [state] CFI Enabled
19,032,363 UART: [fht] FMC Alias Private Key: 7
20,796,310 UART: [art] Extend RT PCRs Done
20,797,546 UART: [art] Lock RT PCRs Done
20,799,141 UART: [art] Populate DV Done
20,804,598 UART: [fht] FMC Alias Private Key: 7
20,806,243 UART: [art] Derive CDI
20,806,980 UART: [art] Store in in slot 0x4
20,865,419 UART: [art] Derive Key Pair
20,866,418 UART: [art] Store priv key in slot 0x5
23,330,007 UART: [art] Derive Key Pair - Done
23,343,276 UART: [art] Signing Cert with AUTHO
23,344,581 UART: RITY.KEYID = 7
25,068,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,070,036 UART: [art] PUB.X = 2A5B00CC8CDF952AFA707751B6B1C959ECBF633AEEA03C7A28DEEB9D7BE3E830B6986352CA67D9D3BC16DD97DBC1485E
25,077,325 UART: [art] PUB.Y = DD94C25670AC2B9B129A84EF8A724EADDA588E67FAC6BFABE82051364818DB69D0D80434431872CCD44304E8186611E9
25,084,597 UART: [art] SIG.R = 7F8E3739A91402428BE98BAF2AFDBCC5D24438B8427914266756E9E815B3B7BA2093B492EA8196C3F056AAF1A9AE28DF
25,091,981 UART: [art] SIG.S = B80FE2CF0836A9AD52A078A97EB0C114FB102D819A44FBC5E2535455CC04DE46681A4720759093B7AFEC3222915268DC
26,070,900 UART: Caliptra RT
26,071,603 UART: [state] CFI Enabled
26,236,863 UART: [rt] RT listening for mailbox commands...
26,239,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,269,870 UART: [rt]cmd =0x44504543, len=96
30,656,898 >>> mbox cmd response data (6236 bytes)
30,685,991 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,716,434 UART: [rt]cmd =0x53574545, len=84
34,886,217 >>> mbox cmd response data (200 bytes)
35,272,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,303,965 UART: [rt]cmd =0x44504543, len=96
35,342,936 >>> mbox cmd response data (56 bytes)
35,343,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,374,488 UART: [rt]cmd =0x44504543, len=96
35,414,119 >>> mbox cmd response data (24 bytes)
35,414,677 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,445,156 UART: [rt]cmd =0x53574545, len=84
39,621,389 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,441,253 ready_for_fw is high
3,441,831 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,743,269 >>> mbox cmd response: success
19,046,331 UART:
19,046,717 UART: Running Caliptra FMC ...
19,047,919 UART:
19,048,099 UART: [state] CFI Enabled
19,115,407 UART: [fht] FMC Alias Private Key: 7
20,879,635 UART: [art] Extend RT PCRs Done
20,880,857 UART: [art] Lock RT PCRs Done
20,882,429 UART: [art] Populate DV Done
20,887,691 UART: [fht] FMC Alias Private Key: 7
20,889,236 UART: [art] Derive CDI
20,890,072 UART: [art] Store in in slot 0x4
20,948,323 UART: [art] Derive Key Pair
20,949,365 UART: [art] Store priv key in slot 0x5
23,411,651 UART: [art] Derive Key Pair - Done
23,424,600 UART: [art] Signing Cert with AUTHO
23,425,911 UART: RITY.KEYID = 7
25,137,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,926 UART: [art] PUB.X = 3A9CAD7C312DA16A70FBD8478366AD1AB561F809550718C5EBB9ADA2219D8DC05B0092F4DAA3F852E45C55BD2E0E26F0
25,146,159 UART: [art] PUB.Y = 52EB47DFB05E7DABE38EBEABCDB11BB2B117AE5183D637EA90E892B9191C75EC134A0561CACF96981A2F9493841F7F54
25,153,423 UART: [art] SIG.R = 5F42936A9876F3CB2D853E1C3C16190D3E37471124CCF80B051BE08AD77C97B4E8C034B576A3837E1E7E0CDF9E40305B
25,160,800 UART: [art] SIG.S = DA508AD8FC823362E81740AAA6C39EB7CA566727672BC04DFFF5BA74940DD808B75A937A5B98A6FFAAB9FD205DE8867C
26,139,800 UART: Caliptra RT
26,140,490 UART: [state] CFI Enabled
26,305,120 UART: [rt] RT listening for mailbox commands...
26,307,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,106 UART: [rt]cmd =0x44504543, len=96
30,724,226 >>> mbox cmd response data (6236 bytes)
30,753,435 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,783,949 UART: [rt]cmd =0x53574545, len=84
34,953,535 >>> mbox cmd response data (200 bytes)
35,339,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,370,685 UART: [rt]cmd =0x44504543, len=96
35,409,745 >>> mbox cmd response data (56 bytes)
35,410,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,441,081 UART: [rt]cmd =0x44504543, len=96
35,482,026 >>> mbox cmd response data (24 bytes)
35,482,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,512,850 UART: [rt]cmd =0x53574545, len=84
39,689,996 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,577 UART:
192,942 UART: Running Caliptra ROM ...
194,075 UART:
603,809 UART: [state] CFI Enabled
616,915 UART: [state] LifecycleState = Unprovisioned
619,284 UART: [state] DebugLocked = No
622,234 UART: [state] WD Timer not started. Device not locked for debugging
627,116 UART: [kat] SHA2-256
817,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,799 UART: [kat] ++
828,318 UART: [kat] sha1
838,479 UART: [kat] SHA2-256
841,493 UART: [kat] SHA2-384
848,196 UART: [kat] SHA2-512-ACC
850,846 UART: [kat] ECC-384
3,294,086 UART: [kat] HMAC-384Kdf
3,308,326 UART: [kat] LMS
3,840,132 UART: [kat] --
3,844,971 UART: [cold-reset] ++
3,845,831 UART: [fht] FHT @ 0x50003400
3,857,655 UART: [idev] ++
3,858,368 UART: [idev] CDI.KEYID = 6
3,859,347 UART: [idev] SUBJECT.KEYID = 7
3,860,520 UART: [idev] UDS.KEYID = 0
3,861,443 ready_for_fw is high
3,861,633 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,254 UART: [idev] Erasing UDS.KEYID = 0
6,338,431 UART: [idev] Sha1 KeyId Algorithm
6,361,190 UART: [idev] --
6,366,850 UART: [ldev] ++
6,367,532 UART: [ldev] CDI.KEYID = 6
6,368,601 UART: [ldev] SUBJECT.KEYID = 5
6,369,727 UART: [ldev] AUTHORITY.KEYID = 7
6,370,901 UART: [ldev] FE.KEYID = 1
6,381,154 UART: [ldev] Erasing FE.KEYID = 1
8,857,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,976 UART: [ldev] --
10,648,843 UART: [fwproc] Wait for Commands...
10,650,997 UART: [fwproc] Recv command 0x46574c44
10,653,308 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,834,864 >>> mbox cmd response: success
14,838,263 UART: [afmc] ++
14,839,010 UART: [afmc] CDI.KEYID = 6
14,840,320 UART: [afmc] SUBJECT.KEYID = 7
14,841,641 UART: [afmc] AUTHORITY.KEYID = 5
17,348,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,479 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,745 UART: [afmc] --
19,145,169 UART: [cold-reset] --
19,149,089 UART: [state] Locking Datavault
19,156,439 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,620 UART: [state] Locking ICCM
19,160,716 UART: [exit] Launching FMC @ 0x40000130
19,169,400 UART:
19,169,632 UART: Running Caliptra FMC ...
19,170,729 UART:
19,170,888 UART: [state] CFI Enabled
19,179,361 UART: [fht] FMC Alias Private Key: 7
20,935,880 UART: [art] Extend RT PCRs Done
20,937,088 UART: [art] Lock RT PCRs Done
20,939,063 UART: [art] Populate DV Done
20,944,308 UART: [fht] FMC Alias Private Key: 7
20,946,002 UART: [art] Derive CDI
20,946,741 UART: [art] Store in in slot 0x4
20,989,011 UART: [art] Derive Key Pair
20,990,052 UART: [art] Store priv key in slot 0x5
23,417,268 UART: [art] Derive Key Pair - Done
23,430,322 UART: [art] Signing Cert with AUTHO
23,431,624 UART: RITY.KEYID = 7
25,137,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,040 UART: [art] PUB.X = 5B6A41AC6951AD1A5D3B2D580D85C56F61D4536C62A578B3F60AD71760931099543379DF07D5C00B0255E1C809B5C696
25,146,283 UART: [art] PUB.Y = A4E65E8900FB490BD72639A3A0DF40AD44717F2E89CE0C25BC6981ECBC74E06E1FCC73C7F1F8E4738466B95345AC2F1C
25,153,515 UART: [art] SIG.R = 4F0168DEA08CBA0E3AB78339967F8C7CF5194B5780741D5B0D4EE09DDC81FDDBDDDD652C815C6A4FF9290066708A4C09
25,160,916 UART: [art] SIG.S = B635CB4E8AD4FC63D64AA723BB06E99CBD5A364943C8AB28BC56C1732E1E3F0BD6184AF78EAFE708952B89847AFED98D
26,139,998 UART: Caliptra RT
26,140,716 UART: [state] CFI Enabled
26,258,584 UART: [rt] RT listening for mailbox commands...
26,260,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,291,585 UART: [rt]cmd =0x44504543, len=96
30,583,543 >>> mbox cmd response data (6236 bytes)
30,612,601 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,643,222 UART: [rt]cmd =0x53574545, len=84
34,778,689 >>> mbox cmd response data (200 bytes)
35,162,392 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,193,288 UART: [rt]cmd =0x44504543, len=96
35,233,115 >>> mbox cmd response data (56 bytes)
35,233,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,264,563 UART: [rt]cmd =0x44504543, len=96
35,302,713 >>> mbox cmd response data (24 bytes)
35,303,299 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,333,711 UART: [rt]cmd =0x53574545, len=84
39,468,814 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,754,724 ready_for_fw is high
3,755,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,951,815 >>> mbox cmd response: success
19,203,722 UART:
19,204,112 UART: Running Caliptra FMC ...
19,205,326 UART:
19,205,496 UART: [state] CFI Enabled
19,213,398 UART: [fht] FMC Alias Private Key: 7
20,970,220 UART: [art] Extend RT PCRs Done
20,971,434 UART: [art] Lock RT PCRs Done
20,973,190 UART: [art] Populate DV Done
20,978,489 UART: [fht] FMC Alias Private Key: 7
20,980,196 UART: [art] Derive CDI
20,980,935 UART: [art] Store in in slot 0x4
21,023,448 UART: [art] Derive Key Pair
21,024,519 UART: [art] Store priv key in slot 0x5
23,451,380 UART: [art] Derive Key Pair - Done
23,464,049 UART: [art] Signing Cert with AUTHO
23,465,352 UART: RITY.KEYID = 7
25,170,456 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,953 UART: [art] PUB.X = 196761249AD809462980C688D2ACF1C44BDC33CD1143A3F950449C32A5EAFF5CFB7CA9F259D0C632AE05FB99524816AF
25,179,290 UART: [art] PUB.Y = 0724E422D9D8C3384E0F822B5AE98C77D3E27B5E5CE0095B18B93DE60546273FFB08E1A60B6A5072DA527C360E3F872D
25,186,501 UART: [art] SIG.R = 6A8602C4479419C5638104AF165BDDEF6CD18FB8713D26DF8723AD1CC00EE8A16D69AF5DC07053DE81554525370FC370
25,193,907 UART: [art] SIG.S = E314541ADD1B249F4DD2B530DF43386894E3B99D42EB0E2450A70BBD6C7224B242195D8D90E9D26A0488C2E53C386A70
26,172,682 UART: Caliptra RT
26,173,375 UART: [state] CFI Enabled
26,291,956 UART: [rt] RT listening for mailbox commands...
26,294,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,324,956 UART: [rt]cmd =0x44504543, len=96
30,616,979 >>> mbox cmd response data (6236 bytes)
30,646,871 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,677,480 UART: [rt]cmd =0x53574545, len=84
34,812,694 >>> mbox cmd response data (200 bytes)
35,197,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,229,031 UART: [rt]cmd =0x44504543, len=96
35,268,276 >>> mbox cmd response data (56 bytes)
35,269,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,299,510 UART: [rt]cmd =0x44504543, len=96
35,338,251 >>> mbox cmd response data (24 bytes)
35,338,843 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,369,198 UART: [rt]cmd =0x53574545, len=84
39,504,649 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,595 UART: [kat] SHA2-256
881,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,641 UART: [kat] ++
885,793 UART: [kat] sha1
890,157 UART: [kat] SHA2-256
892,095 UART: [kat] SHA2-384
894,856 UART: [kat] SHA2-512-ACC
896,757 UART: [kat] ECC-384
902,688 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,475,953 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,144 UART: [idev] ++
1,479,312 UART: [idev] CDI.KEYID = 6
1,479,672 UART: [idev] SUBJECT.KEYID = 7
1,480,096 UART: [idev] UDS.KEYID = 0
1,480,441 ready_for_fw is high
1,480,441 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,088 UART: [idev] Erasing UDS.KEYID = 0
1,504,846 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,628 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,128 UART: [ldev] --
1,585,499 UART: [fwproc] Waiting for Commands...
1,586,344 UART: [fwproc] Received command 0x46574c44
1,587,135 UART: [fwproc] Received Image of size 114360 bytes
2,884,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,802 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,715 >>> mbox cmd response: success
3,078,971 UART: [afmc] ++
3,079,139 UART: [afmc] CDI.KEYID = 6
3,079,501 UART: [afmc] SUBJECT.KEYID = 7
3,079,926 UART: [afmc] AUTHORITY.KEYID = 5
3,114,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,499 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,892 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,582 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,507 UART: [afmc] --
3,158,391 UART: [cold-reset] --
3,159,377 UART: [state] Locking Datavault
3,160,662 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,266 UART: [state] Locking ICCM
3,161,718 UART: [exit] Launching FMC @ 0x40000130
3,167,047 UART:
3,167,063 UART: Running Caliptra FMC ...
3,167,471 UART:
3,167,525 UART: [state] CFI Enabled
3,178,176 UART: [fht] FMC Alias Private Key: 7
3,286,319 UART: [art] Extend RT PCRs Done
3,286,747 UART: [art] Lock RT PCRs Done
3,288,245 UART: [art] Populate DV Done
3,296,482 UART: [fht] FMC Alias Private Key: 7
3,297,410 UART: [art] Derive CDI
3,297,690 UART: [art] Store in in slot 0x4
3,383,457 UART: [art] Derive Key Pair
3,383,817 UART: [art] Store priv key in slot 0x5
3,396,307 UART: [art] Derive Key Pair - Done
3,411,152 UART: [art] Signing Cert with AUTHO
3,411,632 UART: RITY.KEYID = 7
3,426,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,479 UART: [art] PUB.X = 3159EC4ECDB6E5A552FE6B1B1D9451A7B191EFA79BA8440E05B691879991B54B47081738D74F822B464BDFC0EAE6EBDA
3,434,254 UART: [art] PUB.Y = 416370867947F3A16C1A87123869750599544B3F012FA5A4EC1F91DFDC39155E80E7B6C50A62D3BCF223671BC8D00FF9
3,441,190 UART: [art] SIG.R = 6B487D1C2172500E859554E91D4FBB4B4EF91BAAF9E4E910E8CD3D2718F763048ABE3442CDC47DFC8660EBFCD3D95352
3,447,968 UART: [art] SIG.S = C1109D455526A09A1BDBF9D358E0DB655F6AD96B0AD5D55B6E8C45A979CD6D49588F97E57CB0FFA65EE497DC93DF73DC
3,471,984 UART: Caliptra RT
3,472,238 UART: [state] CFI Enabled
3,580,296 UART: [rt] RT listening for mailbox commands...
3,580,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,277 UART: [rt]cmd =0x44504543, len=96
3,799,806 >>> mbox cmd response data (6236 bytes)
3,799,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,614 UART: [rt]cmd =0x53574545, len=84
3,855,891 >>> mbox cmd response data (200 bytes)
3,855,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,965 UART: [rt]cmd =0x44504543, len=96
3,926,078 >>> mbox cmd response data (56 bytes)
3,926,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,822 UART: [rt]cmd =0x44504543, len=96
3,995,277 >>> mbox cmd response data (24 bytes)
3,995,278 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,025,301 UART: [rt]cmd =0x53574545, len=84
4,051,434 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 ready_for_fw is high
1,361,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,013 >>> mbox cmd response: success
2,988,023 UART:
2,988,039 UART: Running Caliptra FMC ...
2,988,447 UART:
2,988,501 UART: [state] CFI Enabled
2,998,924 UART: [fht] FMC Alias Private Key: 7
3,107,021 UART: [art] Extend RT PCRs Done
3,107,449 UART: [art] Lock RT PCRs Done
3,109,167 UART: [art] Populate DV Done
3,117,586 UART: [fht] FMC Alias Private Key: 7
3,118,590 UART: [art] Derive CDI
3,118,870 UART: [art] Store in in slot 0x4
3,204,517 UART: [art] Derive Key Pair
3,204,877 UART: [art] Store priv key in slot 0x5
3,217,791 UART: [art] Derive Key Pair - Done
3,232,474 UART: [art] Signing Cert with AUTHO
3,232,954 UART: RITY.KEYID = 7
3,248,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,153 UART: [art] PUB.X = 7367E563BE49D0BF55B87F5C949F3B156BB49A00ADC13C02479F2D87C2F050E0EE88739AE764C88F1E4921A5E4A8A1FF
3,255,908 UART: [art] PUB.Y = 275746F6B1E4EDFAD2A087F1B1F09E6A105A340C94787EEB52E2EED1D8438CED11032FC2B5C767D24A47EBD8567B6680
3,262,864 UART: [art] SIG.R = C81E15F719E7D509F859BBCF643C70F38F53DDBFF87A11945E6FF5C2364D101F72B16B26F303237C3756931D51AA8B08
3,269,629 UART: [art] SIG.S = 71FC6F82B89ED455699EBDEA54A4CEF172BFB9AB79AFB82DBDDC364A52E7EDDDC753330E122410C77075626BA76305E2
3,293,334 UART: Caliptra RT
3,293,588 UART: [state] CFI Enabled
3,402,488 UART: [rt] RT listening for mailbox commands...
3,403,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,409 UART: [rt]cmd =0x44504543, len=96
3,622,687 >>> mbox cmd response data (6236 bytes)
3,622,688 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,513 UART: [rt]cmd =0x53574545, len=84
3,677,996 >>> mbox cmd response data (200 bytes)
3,677,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,988 UART: [rt]cmd =0x44504543, len=96
3,747,989 >>> mbox cmd response data (56 bytes)
3,747,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,891 UART: [rt]cmd =0x44504543, len=96
3,817,352 >>> mbox cmd response data (24 bytes)
3,817,353 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,310 UART: [rt]cmd =0x53574545, len=84
3,872,695 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,157 UART: [kat] SHA2-512-ACC
897,058 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,603 UART: [kat] LMS
1,475,799 UART: [kat] --
1,476,828 UART: [cold-reset] ++
1,477,334 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 ready_for_fw is high
1,481,432 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,199 UART: [idev] Erasing UDS.KEYID = 0
1,505,817 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,325 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,521,908 UART: [ldev] Erasing FE.KEYID = 1
1,548,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,947 UART: [ldev] --
1,587,418 UART: [fwproc] Waiting for Commands...
1,588,141 UART: [fwproc] Received command 0x46574c44
1,588,932 UART: [fwproc] Received Image of size 114360 bytes
2,886,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,812 >>> mbox cmd response: success
3,079,918 UART: [afmc] ++
3,080,086 UART: [afmc] CDI.KEYID = 6
3,080,448 UART: [afmc] SUBJECT.KEYID = 7
3,080,873 UART: [afmc] AUTHORITY.KEYID = 5
3,115,730 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,704 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,097 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,787 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,696 UART: [afmc] --
3,158,780 UART: [cold-reset] --
3,159,684 UART: [state] Locking Datavault
3,160,955 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,559 UART: [state] Locking ICCM
3,162,127 UART: [exit] Launching FMC @ 0x40000130
3,167,456 UART:
3,167,472 UART: Running Caliptra FMC ...
3,167,880 UART:
3,168,023 UART: [state] CFI Enabled
3,178,562 UART: [fht] FMC Alias Private Key: 7
3,286,683 UART: [art] Extend RT PCRs Done
3,287,111 UART: [art] Lock RT PCRs Done
3,288,987 UART: [art] Populate DV Done
3,297,250 UART: [fht] FMC Alias Private Key: 7
3,298,400 UART: [art] Derive CDI
3,298,680 UART: [art] Store in in slot 0x4
3,384,687 UART: [art] Derive Key Pair
3,385,047 UART: [art] Store priv key in slot 0x5
3,398,287 UART: [art] Derive Key Pair - Done
3,412,994 UART: [art] Signing Cert with AUTHO
3,413,474 UART: RITY.KEYID = 7
3,428,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,443 UART: [art] PUB.X = 48EA4CA7375A9915D8957353DA7B45ADF758E062DE691EDDD4D512F40258E7AEFE7CDBBE7EB6BC6029E795AA20214882
3,436,224 UART: [art] PUB.Y = 34AB18FBD7DA5E1FE0913DC7FB6A79B44E56C84C04EBA58E45608CD9381F1B1FBDA66A9CBCDC1608975E942D0B9E13E2
3,443,187 UART: [art] SIG.R = 256CCF8FF3CE86963B7ECE6E2ED53A91CC08899BA296084EC1F4435EE0FD8FEA6A0C8ADB7E24DC29BBD07398EC7B8399
3,449,972 UART: [art] SIG.S = 9EC7945B551777A21132D639305B1ED2B299DF96328C4610CD2067C4D212C2AA9FD23603C6DD5E7C36AD35247AD04A5C
3,473,730 UART: Caliptra RT
3,474,076 UART: [state] CFI Enabled
3,582,696 UART: [rt] RT listening for mailbox commands...
3,583,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,439 UART: [rt]cmd =0x44504543, len=96
3,801,955 >>> mbox cmd response data (6236 bytes)
3,801,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,645 UART: [rt]cmd =0x53574545, len=84
3,857,416 >>> mbox cmd response data (200 bytes)
3,857,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,244 UART: [rt]cmd =0x44504543, len=96
3,927,237 >>> mbox cmd response data (56 bytes)
3,927,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,956,889 UART: [rt]cmd =0x44504543, len=96
3,997,218 >>> mbox cmd response data (24 bytes)
3,997,219 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,027,032 UART: [rt]cmd =0x53574545, len=84
4,052,915 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,654 ready_for_fw is high
1,362,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,224 >>> mbox cmd response: success
2,988,846 UART:
2,988,862 UART: Running Caliptra FMC ...
2,989,270 UART:
2,989,413 UART: [state] CFI Enabled
2,999,866 UART: [fht] FMC Alias Private Key: 7
3,108,005 UART: [art] Extend RT PCRs Done
3,108,433 UART: [art] Lock RT PCRs Done
3,110,121 UART: [art] Populate DV Done
3,118,254 UART: [fht] FMC Alias Private Key: 7
3,119,434 UART: [art] Derive CDI
3,119,714 UART: [art] Store in in slot 0x4
3,205,611 UART: [art] Derive Key Pair
3,205,971 UART: [art] Store priv key in slot 0x5
3,219,267 UART: [art] Derive Key Pair - Done
3,234,465 UART: [art] Signing Cert with AUTHO
3,234,945 UART: RITY.KEYID = 7
3,249,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,686 UART: [art] PUB.X = AEFD1DA8B3267A113335EE5C971A3E012D578D7E2A2ED34AC95A5D35B9CA64C3F409EB105529C804DDAACF2D651BA5E0
3,257,467 UART: [art] PUB.Y = D6CF189F63BF668B7C964ED212875CA136603B37E0335C60965612502742DFAAA8D05405FA45DBC52F6BEE569ADB8792
3,264,418 UART: [art] SIG.R = 7148D1D87C2723AD37B6DE775B5D99E2563D64EF1234BE276994666C006E68CBF126432934EDCB40126A91268608F9FC
3,271,159 UART: [art] SIG.S = F7D297CE57672BA5740B85535B6FC0FD66EFBAF28652A8E8D2B8B04E4158BB67A2ECC46433480343CCC49005E216A84F
3,293,955 UART: Caliptra RT
3,294,301 UART: [state] CFI Enabled
3,403,427 UART: [rt] RT listening for mailbox commands...
3,404,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,348 UART: [rt]cmd =0x44504543, len=96
3,623,603 >>> mbox cmd response data (6236 bytes)
3,623,604 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,663 UART: [rt]cmd =0x53574545, len=84
3,679,160 >>> mbox cmd response data (200 bytes)
3,679,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,986 UART: [rt]cmd =0x44504543, len=96
3,748,217 >>> mbox cmd response data (56 bytes)
3,748,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,077 UART: [rt]cmd =0x44504543, len=96
3,818,526 >>> mbox cmd response data (24 bytes)
3,818,527 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,848,284 UART: [rt]cmd =0x53574545, len=84
3,874,551 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
893,106 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,231 UART: [kat] ++
897,383 UART: [kat] sha1
901,623 UART: [kat] SHA2-256
903,563 UART: [kat] SHA2-384
906,332 UART: [kat] SHA2-512-ACC
908,233 UART: [kat] ECC-384
917,980 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,961 UART: [cold-reset] ++
1,172,367 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 ready_for_fw is high
1,176,183 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,382 UART: [idev] Erasing UDS.KEYID = 0
1,200,101 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,242,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,892 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,786 >>> mbox cmd response: success
2,774,926 UART: [afmc] ++
2,775,094 UART: [afmc] CDI.KEYID = 6
2,775,456 UART: [afmc] SUBJECT.KEYID = 7
2,775,881 UART: [afmc] AUTHORITY.KEYID = 5
2,811,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,201 UART: [afmc] --
2,855,189 UART: [cold-reset] --
2,856,255 UART: [state] Locking Datavault
2,857,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,260 UART: [state] Locking ICCM
2,858,680 UART: [exit] Launching FMC @ 0x40000130
2,864,009 UART:
2,864,025 UART: Running Caliptra FMC ...
2,864,433 UART:
2,864,487 UART: [state] CFI Enabled
2,875,434 UART: [fht] FMC Alias Private Key: 7
2,983,875 UART: [art] Extend RT PCRs Done
2,984,303 UART: [art] Lock RT PCRs Done
2,985,771 UART: [art] Populate DV Done
2,993,920 UART: [fht] FMC Alias Private Key: 7
2,995,034 UART: [art] Derive CDI
2,995,314 UART: [art] Store in in slot 0x4
3,080,725 UART: [art] Derive Key Pair
3,081,085 UART: [art] Store priv key in slot 0x5
3,093,633 UART: [art] Derive Key Pair - Done
3,108,421 UART: [art] Signing Cert with AUTHO
3,108,901 UART: RITY.KEYID = 7
3,124,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,204 UART: [art] PUB.X = 4F7D9B12282EA1EB5CC3A045FB845AE26F2F7A91D15C58602E8056FE72629D8A412A9C03BC277634BE2C501BAB1016D3
3,131,979 UART: [art] PUB.Y = 8161C54EE8F47355D15678AC2555F437D13095F5013AA9E93974088E3567D93E928549E640CF9185487C0DB49029762E
3,138,904 UART: [art] SIG.R = A0CBD11080D25A9AD09FCA94D2117376EC5593D69B6FFD7CDD7E078C41DDE5EEC449DB5115DFC705413A32D14AF8FF97
3,145,688 UART: [art] SIG.S = A5594CED38C2CCF6592BD215411E5BC2928B3C43AC77C80A2B97C8779E1BD3D39AEDB53DEA140502816D2FD957CE9E15
3,169,646 UART: Caliptra RT
3,169,900 UART: [state] CFI Enabled
3,278,153 UART: [rt] RT listening for mailbox commands...
3,278,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,894 UART: [rt]cmd =0x44504543, len=96
3,497,899 >>> mbox cmd response data (6236 bytes)
3,497,900 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,891 UART: [rt]cmd =0x53574545, len=84
3,553,000 >>> mbox cmd response data (200 bytes)
3,553,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,964 UART: [rt]cmd =0x44504543, len=96
3,622,197 >>> mbox cmd response data (56 bytes)
3,622,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,011 UART: [rt]cmd =0x44504543, len=96
3,691,544 >>> mbox cmd response data (24 bytes)
3,691,545 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,574 UART: [rt]cmd =0x53574545, len=84
3,747,151 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,597 ready_for_fw is high
1,059,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,177 >>> mbox cmd response: success
2,687,561 UART:
2,687,577 UART: Running Caliptra FMC ...
2,687,985 UART:
2,688,039 UART: [state] CFI Enabled
2,698,330 UART: [fht] FMC Alias Private Key: 7
2,806,705 UART: [art] Extend RT PCRs Done
2,807,133 UART: [art] Lock RT PCRs Done
2,808,763 UART: [art] Populate DV Done
2,816,870 UART: [fht] FMC Alias Private Key: 7
2,817,844 UART: [art] Derive CDI
2,818,124 UART: [art] Store in in slot 0x4
2,903,475 UART: [art] Derive Key Pair
2,903,835 UART: [art] Store priv key in slot 0x5
2,917,145 UART: [art] Derive Key Pair - Done
2,931,884 UART: [art] Signing Cert with AUTHO
2,932,364 UART: RITY.KEYID = 7
2,947,146 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,911 UART: [art] PUB.X = BF5D7696237CAD7F20B66378CE9422AD15B57F4122CCB074267879AB59F366309265F1EF815A1BAF4EAE91A40424B464
2,954,680 UART: [art] PUB.Y = 9609B692640DC5574212CA16B56EF8288D2D0FC1574D7C1368447AAD1670EC4804398D0CD01F52F71F844AB1F21822F6
2,961,611 UART: [art] SIG.R = 360E3D10BFF6886A628B186E432305B0703929E449F5E77DB78B9C5311C20CD91213268FACB563BF7B49B60D5195D020
2,968,365 UART: [art] SIG.S = F9202BA64157B23C5BC8BE109F998A1D663011F19962FCE2C884BAF23D95F917BB890BC60AD6D20712BC2A8132CA0023
2,991,929 UART: Caliptra RT
2,992,183 UART: [state] CFI Enabled
3,099,791 UART: [rt] RT listening for mailbox commands...
3,100,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,596 UART: [rt]cmd =0x44504543, len=96
3,318,679 >>> mbox cmd response data (6236 bytes)
3,318,680 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,455 UART: [rt]cmd =0x53574545, len=84
3,374,168 >>> mbox cmd response data (200 bytes)
3,374,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,024 UART: [rt]cmd =0x44504543, len=96
3,443,833 >>> mbox cmd response data (56 bytes)
3,443,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,775 UART: [rt]cmd =0x44504543, len=96
3,514,052 >>> mbox cmd response data (24 bytes)
3,514,053 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,896 UART: [rt]cmd =0x53574545, len=84
3,569,157 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,885 UART: [state] LifecycleState = Unprovisioned
85,540 UART: [state] DebugLocked = No
86,108 UART: [state] WD Timer not started. Device not locked for debugging
87,319 UART: [kat] SHA2-256
892,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,094 UART: [kat] ++
897,246 UART: [kat] sha1
901,474 UART: [kat] SHA2-256
903,414 UART: [kat] SHA2-384
906,031 UART: [kat] SHA2-512-ACC
907,932 UART: [kat] ECC-384
917,427 UART: [kat] HMAC-384Kdf
922,025 UART: [kat] LMS
1,170,353 UART: [kat] --
1,171,216 UART: [cold-reset] ++
1,171,726 UART: [fht] FHT @ 0x50003400
1,174,395 UART: [idev] ++
1,174,563 UART: [idev] CDI.KEYID = 6
1,174,923 UART: [idev] SUBJECT.KEYID = 7
1,175,347 UART: [idev] UDS.KEYID = 0
1,175,692 ready_for_fw is high
1,175,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,487 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,330 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,933 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,216,200 UART: [ldev] Erasing FE.KEYID = 1
1,242,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,844 UART: [ldev] --
1,281,317 UART: [fwproc] Wait for Commands...
1,282,017 UART: [fwproc] Recv command 0x46574c44
1,282,745 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,695 >>> mbox cmd response: success
2,772,889 UART: [afmc] ++
2,773,057 UART: [afmc] CDI.KEYID = 6
2,773,419 UART: [afmc] SUBJECT.KEYID = 7
2,773,844 UART: [afmc] AUTHORITY.KEYID = 5
2,809,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,846 UART: [afmc] --
2,852,974 UART: [cold-reset] --
2,853,918 UART: [state] Locking Datavault
2,854,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,595 UART: [state] Locking ICCM
2,856,161 UART: [exit] Launching FMC @ 0x40000130
2,861,490 UART:
2,861,506 UART: Running Caliptra FMC ...
2,861,914 UART:
2,862,057 UART: [state] CFI Enabled
2,872,650 UART: [fht] FMC Alias Private Key: 7
2,980,415 UART: [art] Extend RT PCRs Done
2,980,843 UART: [art] Lock RT PCRs Done
2,982,351 UART: [art] Populate DV Done
2,990,956 UART: [fht] FMC Alias Private Key: 7
2,991,948 UART: [art] Derive CDI
2,992,228 UART: [art] Store in in slot 0x4
3,078,223 UART: [art] Derive Key Pair
3,078,583 UART: [art] Store priv key in slot 0x5
3,091,933 UART: [art] Derive Key Pair - Done
3,106,485 UART: [art] Signing Cert with AUTHO
3,106,965 UART: RITY.KEYID = 7
3,122,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,092 UART: [art] PUB.X = 1151FB49C970DAC250F81F44D6A6D78A4518527CFE14C2D50E20B80FB86DF0E3FBCE8310BBCF6D9BAD1157AF4A58F193
3,129,874 UART: [art] PUB.Y = 33732021BF2225A59709D3D3AD29D595CB3B8705BE5CBE1A4100163B5276B6A7F60F2EF8D39DF60256B33D2374F97E71
3,136,790 UART: [art] SIG.R = 9BF0E8C838B1D53729BEE5DE1457751AA9B38366CCA9AEB9B12D4C9E2C06D7AFAB83891E25259406B19531C6B32CAD71
3,143,566 UART: [art] SIG.S = DF0925E2134B3AEB3706BF5B4B23A1AF716D6A3B9F085B69C7D1658AB7CA025E9AB467F1BA136FA8A1FFADB417A2609E
3,167,215 UART: Caliptra RT
3,167,561 UART: [state] CFI Enabled
3,275,236 UART: [rt] RT listening for mailbox commands...
3,275,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,009 UART: [rt]cmd =0x44504543, len=96
3,494,415 >>> mbox cmd response data (6236 bytes)
3,494,416 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,405 UART: [rt]cmd =0x53574545, len=84
3,549,738 >>> mbox cmd response data (200 bytes)
3,549,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,706 UART: [rt]cmd =0x44504543, len=96
3,619,715 >>> mbox cmd response data (56 bytes)
3,619,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,559 UART: [rt]cmd =0x44504543, len=96
3,688,890 >>> mbox cmd response data (24 bytes)
3,688,891 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,924 UART: [rt]cmd =0x53574545, len=84
3,744,785 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,484 ready_for_fw is high
1,059,484 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,643 >>> mbox cmd response: success
2,687,933 UART:
2,687,949 UART: Running Caliptra FMC ...
2,688,357 UART:
2,688,500 UART: [state] CFI Enabled
2,698,799 UART: [fht] FMC Alias Private Key: 7
2,806,948 UART: [art] Extend RT PCRs Done
2,807,376 UART: [art] Lock RT PCRs Done
2,809,030 UART: [art] Populate DV Done
2,817,235 UART: [fht] FMC Alias Private Key: 7
2,818,243 UART: [art] Derive CDI
2,818,523 UART: [art] Store in in slot 0x4
2,904,540 UART: [art] Derive Key Pair
2,904,900 UART: [art] Store priv key in slot 0x5
2,918,198 UART: [art] Derive Key Pair - Done
2,932,995 UART: [art] Signing Cert with AUTHO
2,933,475 UART: RITY.KEYID = 7
2,948,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,308 UART: [art] PUB.X = 03CB14E7AB950BB874DEECD8BA92B85A80164DD4756BDE4A5768CB7D83940A31F8B8646F0942979C741E263308A41997
2,956,065 UART: [art] PUB.Y = DE9C98FF8D79C920ADED993256867266226CE250A7BD649889E6D8F4884FB37BA5CA7DCAC51B672B0DA7D0FBA618D9B5
2,963,028 UART: [art] SIG.R = A7E7A1A5E3C832D24DE48F5CF1354E0EBC94B22FA6AE780BF676B3A8FCBCA9E3E57535793D3BECEE8317962C8509124A
2,969,807 UART: [art] SIG.S = 364075689C40DCE09DE896070BC4011807C8F580B7789B8776C5B5AD5CBB1CF3E321D53CEAD8725811767E65ABA63910
2,993,976 UART: Caliptra RT
2,994,322 UART: [state] CFI Enabled
3,101,202 UART: [rt] RT listening for mailbox commands...
3,101,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,861 UART: [rt]cmd =0x44504543, len=96
3,320,405 >>> mbox cmd response data (6236 bytes)
3,320,406 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,251 UART: [rt]cmd =0x53574545, len=84
3,376,406 >>> mbox cmd response data (200 bytes)
3,376,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,574 UART: [rt]cmd =0x44504543, len=96
3,446,197 >>> mbox cmd response data (56 bytes)
3,446,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,133 UART: [rt]cmd =0x44504543, len=96
3,516,422 >>> mbox cmd response data (24 bytes)
3,516,423 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,350 UART: [rt]cmd =0x53574545, len=84
3,572,349 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,174,151 ready_for_fw is high
1,174,151 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,199,027 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0x46574c44
1,281,968 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,898 >>> mbox cmd response: success
2,772,959 UART: [afmc] ++
2,773,127 UART: [afmc] CDI.KEYID = 6
2,773,490 UART: [afmc] SUBJECT.KEYID = 7
2,773,916 UART: [afmc] AUTHORITY.KEYID = 5
2,809,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,867 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,626 UART: [afmc] --
2,852,688 UART: [cold-reset] --
2,853,482 UART: [state] Locking Datavault
2,854,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,093 UART: [state] Locking ICCM
2,855,607 UART: [exit] Launching FMC @ 0x40000130
2,860,936 UART:
2,860,952 UART: Running Caliptra FMC ...
2,861,360 UART:
2,861,414 UART: [state] CFI Enabled
2,871,575 UART: [fht] FMC Alias Private Key: 7
2,979,522 UART: [art] Extend RT PCRs Done
2,979,950 UART: [art] Lock RT PCRs Done
2,981,664 UART: [art] Populate DV Done
2,989,979 UART: [fht] FMC Alias Private Key: 7
2,990,963 UART: [art] Derive CDI
2,991,243 UART: [art] Store in in slot 0x4
3,077,120 UART: [art] Derive Key Pair
3,077,480 UART: [art] Store priv key in slot 0x5
3,090,552 UART: [art] Derive Key Pair - Done
3,105,309 UART: [art] Signing Cert with AUTHO
3,105,789 UART: RITY.KEYID = 7
3,120,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,582 UART: [art] PUB.X = 50705F967180B15D551E4BFA5E8FFFB231A2C5310AE8044FE09A0279640C3FEE67A19B356E0300E86DC227927F7F95D2
3,128,317 UART: [art] PUB.Y = 781C1DEDF362C46236B6EBF399232DCE626B659485DA773FAC531D4A36A62A89D87D3024775481E779FE0CB56F83E04B
3,135,268 UART: [art] SIG.R = E1B1F5797B88980ADC2407812D164C1A6D8E22FBA71F03CBCAAB4B9F352C6DE840B787FCD014EEB64DFD947BF42E4A48
3,142,049 UART: [art] SIG.S = 91A248907F652EF5D43AE97C223685E41EE4BAD60F09A030D013FEED4BB8D79CF9104B6C2CAD607AA96E73AAC6C93540
3,165,544 UART: Caliptra RT
3,165,798 UART: [state] CFI Enabled
3,272,963 UART: [rt] RT listening for mailbox commands...
3,273,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,674 UART: [rt]cmd =0x44504543, len=96
3,492,258 >>> mbox cmd response data (6236 bytes)
3,492,259 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,084 UART: [rt]cmd =0x53574545, len=84
3,548,197 >>> mbox cmd response data (200 bytes)
3,548,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,121 UART: [rt]cmd =0x44504543, len=96
3,617,690 >>> mbox cmd response data (56 bytes)
3,617,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,830 UART: [rt]cmd =0x44504543, len=96
3,687,931 >>> mbox cmd response data (24 bytes)
3,687,932 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,509 UART: [rt]cmd =0x53574545, len=84
3,743,494 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,634 ready_for_fw is high
1,055,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,846 >>> mbox cmd response: success
2,682,374 UART:
2,682,390 UART: Running Caliptra FMC ...
2,682,798 UART:
2,682,852 UART: [state] CFI Enabled
2,693,177 UART: [fht] FMC Alias Private Key: 7
2,801,652 UART: [art] Extend RT PCRs Done
2,802,080 UART: [art] Lock RT PCRs Done
2,803,728 UART: [art] Populate DV Done
2,811,651 UART: [fht] FMC Alias Private Key: 7
2,812,639 UART: [art] Derive CDI
2,812,919 UART: [art] Store in in slot 0x4
2,898,632 UART: [art] Derive Key Pair
2,898,992 UART: [art] Store priv key in slot 0x5
2,912,384 UART: [art] Derive Key Pair - Done
2,927,279 UART: [art] Signing Cert with AUTHO
2,927,759 UART: RITY.KEYID = 7
2,942,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,610 UART: [art] PUB.X = BEF62ADDF6A665872D7485BE2DD91C204F50E9A01987B499D07106B59A86C1F123BFC3B90EB0497C2BD0F9C47BDA0731
2,950,383 UART: [art] PUB.Y = A5E6A7E88DD32334FF234CFCD76E7083701AFFC4BA434281A868236AE39E732927C6A12DB527EFC646199EC93F871352
2,957,337 UART: [art] SIG.R = 03EBA73F8C24D89BCDB33B6FFE4E1F4870109EBCD1F631CE312CDBA7DDDA17A3047A59078596C3245BC8B9559FDA82A0
2,964,118 UART: [art] SIG.S = 312799E303EF5F0D8FB0877CC7BD244FC7825522F7153CF939362AE2FD5E164B3AFE26472357BC0D27C6A8D3B9891CF8
2,988,050 UART: Caliptra RT
2,988,304 UART: [state] CFI Enabled
3,095,536 UART: [rt] RT listening for mailbox commands...
3,096,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,263 UART: [rt]cmd =0x44504543, len=96
3,314,932 >>> mbox cmd response data (6236 bytes)
3,314,933 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,864 UART: [rt]cmd =0x53574545, len=84
3,369,933 >>> mbox cmd response data (200 bytes)
3,369,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,749 UART: [rt]cmd =0x44504543, len=96
3,439,052 >>> mbox cmd response data (56 bytes)
3,439,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,046 UART: [rt]cmd =0x44504543, len=96
3,508,393 >>> mbox cmd response data (24 bytes)
3,508,394 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,161 UART: [rt]cmd =0x53574545, len=84
3,564,286 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,223 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,174,662 ready_for_fw is high
1,174,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,598 UART: [idev] Sha1 KeyId Algorithm
1,209,634 UART: [idev] --
1,210,727 UART: [ldev] ++
1,210,895 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,686 UART: [ldev] AUTHORITY.KEYID = 7
1,212,149 UART: [ldev] FE.KEYID = 1
1,217,519 UART: [ldev] Erasing FE.KEYID = 1
1,244,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,401 UART: [ldev] --
1,283,741 UART: [fwproc] Wait for Commands...
1,284,442 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,789 >>> mbox cmd response: success
2,775,914 UART: [afmc] ++
2,776,082 UART: [afmc] CDI.KEYID = 6
2,776,445 UART: [afmc] SUBJECT.KEYID = 7
2,776,871 UART: [afmc] AUTHORITY.KEYID = 5
2,812,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,405 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,537 UART: [afmc] --
2,855,663 UART: [cold-reset] --
2,856,405 UART: [state] Locking Datavault
2,857,744 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,348 UART: [state] Locking ICCM
2,858,882 UART: [exit] Launching FMC @ 0x40000130
2,864,211 UART:
2,864,227 UART: Running Caliptra FMC ...
2,864,635 UART:
2,864,778 UART: [state] CFI Enabled
2,875,431 UART: [fht] FMC Alias Private Key: 7
2,983,098 UART: [art] Extend RT PCRs Done
2,983,526 UART: [art] Lock RT PCRs Done
2,985,176 UART: [art] Populate DV Done
2,993,485 UART: [fht] FMC Alias Private Key: 7
2,994,551 UART: [art] Derive CDI
2,994,831 UART: [art] Store in in slot 0x4
3,080,406 UART: [art] Derive Key Pair
3,080,766 UART: [art] Store priv key in slot 0x5
3,094,272 UART: [art] Derive Key Pair - Done
3,108,908 UART: [art] Signing Cert with AUTHO
3,109,388 UART: RITY.KEYID = 7
3,124,708 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,473 UART: [art] PUB.X = 6C80BD92B3BF845EEB73C657A0BCE2B5126D96131337E89A2F9E27DED4F13CAB9890F6A3099A07F95397844B9E54B5B0
3,132,245 UART: [art] PUB.Y = E9320EE79EB9907947A41D7086E01C1E125848E9FF2BC924F28F0ADD65908B7B6ACDD6A2F57CD1E6F6A7D20704BC4ABE
3,139,199 UART: [art] SIG.R = E3122062F710779F4E3BB6358B5D889F1F50671AD6566804974195023B9C8D25F207067A88A847F6CC64190DA95118C4
3,145,940 UART: [art] SIG.S = ED24009765CB07B9CA053AE13520312A97F94B131F7BBF5B982655472BBF3BE0E52CC51B7A238DCCD89A1FF15E7C75AF
3,169,855 UART: Caliptra RT
3,170,201 UART: [state] CFI Enabled
3,278,000 UART: [rt] RT listening for mailbox commands...
3,278,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,831 UART: [rt]cmd =0x44504543, len=96
3,497,321 >>> mbox cmd response data (6236 bytes)
3,497,322 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,057 UART: [rt]cmd =0x53574545, len=84
3,554,088 >>> mbox cmd response data (200 bytes)
3,554,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,070 UART: [rt]cmd =0x44504543, len=96
3,623,783 >>> mbox cmd response data (56 bytes)
3,623,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,835 UART: [rt]cmd =0x44504543, len=96
3,693,612 >>> mbox cmd response data (24 bytes)
3,693,613 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,723,308 UART: [rt]cmd =0x53574545, len=84
3,749,493 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,059 ready_for_fw is high
1,056,059 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,675 >>> mbox cmd response: success
2,682,289 UART:
2,682,305 UART: Running Caliptra FMC ...
2,682,713 UART:
2,682,856 UART: [state] CFI Enabled
2,693,459 UART: [fht] FMC Alias Private Key: 7
2,801,492 UART: [art] Extend RT PCRs Done
2,801,920 UART: [art] Lock RT PCRs Done
2,803,420 UART: [art] Populate DV Done
2,811,673 UART: [fht] FMC Alias Private Key: 7
2,812,617 UART: [art] Derive CDI
2,812,897 UART: [art] Store in in slot 0x4
2,898,058 UART: [art] Derive Key Pair
2,898,418 UART: [art] Store priv key in slot 0x5
2,911,126 UART: [art] Derive Key Pair - Done
2,926,197 UART: [art] Signing Cert with AUTHO
2,926,677 UART: RITY.KEYID = 7
2,942,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,060 UART: [art] PUB.X = 5794C0B567A3CD56E54EC339ED9CEA4293327EB506E8E36E1CAC02DC45C407140E28246F444FE10CC3CB968E83963FD2
2,949,823 UART: [art] PUB.Y = 92BC7911E7C6AFE5E12F74B4B6117BCAF7E4A599FD77BF15231129EF23EBF1B18B83BECADF3E5338FE52EFE436805590
2,956,791 UART: [art] SIG.R = 6559B6345D2C8FC54931C853F813D67BDF9E98C3F48091AD05482FE2D5EA3153395219914137678BF1CE4A26147615EC
2,963,552 UART: [art] SIG.S = 5E94096756CD9473CD83C04A5C32332C1B2A5468AD6CE64E828CFAAB6FB869F373138A59E8CBE77B340F79F4FE91ED9E
2,987,703 UART: Caliptra RT
2,988,049 UART: [state] CFI Enabled
3,095,299 UART: [rt] RT listening for mailbox commands...
3,095,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,244 UART: [rt]cmd =0x44504543, len=96
3,315,919 >>> mbox cmd response data (6236 bytes)
3,315,920 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,749 UART: [rt]cmd =0x53574545, len=84
3,370,740 >>> mbox cmd response data (200 bytes)
3,370,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,764 UART: [rt]cmd =0x44504543, len=96
3,440,481 >>> mbox cmd response data (56 bytes)
3,440,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,567 UART: [rt]cmd =0x44504543, len=96
3,510,706 >>> mbox cmd response data (24 bytes)
3,510,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,400 UART: [rt]cmd =0x53574545, len=84
3,565,375 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,479 UART:
192,837 UART: Running Caliptra ROM ...
194,011 UART:
194,164 UART: [state] CFI Enabled
264,477 UART: [state] LifecycleState = Unprovisioned
266,473 UART: [state] DebugLocked = No
269,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,916 UART: [kat] SHA2-256
443,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,119 UART: [kat] ++
454,716 UART: [kat] sha1
466,249 UART: [kat] SHA2-256
468,942 UART: [kat] SHA2-384
474,148 UART: [kat] SHA2-512-ACC
476,516 UART: [kat] ECC-384
2,765,020 UART: [kat] HMAC-384Kdf
2,776,828 UART: [kat] LMS
3,967,157 UART: [kat] --
3,971,057 UART: [cold-reset] ++
3,972,422 UART: [fht] Storing FHT @ 0x50003400
3,983,893 UART: [idev] ++
3,984,463 UART: [idev] CDI.KEYID = 6
3,985,339 UART: [idev] SUBJECT.KEYID = 7
3,986,548 UART: [idev] UDS.KEYID = 0
3,987,672 ready_for_fw is high
3,987,862 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,131,121 UART: [idev] Erasing UDS.KEYID = 0
7,321,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,968 UART: [idev] --
7,348,260 UART: [ldev] ++
7,348,891 UART: [ldev] CDI.KEYID = 6
7,349,818 UART: [ldev] SUBJECT.KEYID = 5
7,350,973 UART: [ldev] AUTHORITY.KEYID = 7
7,352,260 UART: [ldev] FE.KEYID = 1
7,399,017 UART: [ldev] Erasing FE.KEYID = 1
10,730,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,406 UART: [ldev] --
13,091,369 UART: [fwproc] Waiting for Commands...
13,093,240 UART: [fwproc] Received command 0x46574c44
13,095,414 UART: [fwproc] Received Image of size 114036 bytes
17,143,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,142 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,038 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,604,269 >>> mbox cmd response: success
17,607,784 UART: [afmc] ++
17,608,385 UART: [afmc] CDI.KEYID = 6
17,609,270 UART: [afmc] SUBJECT.KEYID = 7
17,610,479 UART: [afmc] AUTHORITY.KEYID = 5
20,984,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,015 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,431 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,251 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,664 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,846 UART: [afmc] --
23,354,313 UART: [cold-reset] --
23,357,643 UART: [state] Locking Datavault
23,364,883 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,633 UART: [state] Locking ICCM
23,367,753 UART: [exit] Launching FMC @ 0x40000130
23,376,141 UART:
23,376,379 UART: Running Caliptra FMC ...
23,377,472 UART:
23,377,624 UART: [state] CFI Enabled
23,443,687 UART: [fht] FMC Alias Private Key: 7
25,782,031 UART: [art] Extend RT PCRs Done
25,783,271 UART: [art] Lock RT PCRs Done
25,784,811 UART: [art] Populate DV Done
25,790,490 UART: [fht] FMC Alias Private Key: 7
25,791,966 UART: [art] Derive CDI
25,792,694 UART: [art] Store in in slot 0x4
25,852,650 UART: [art] Derive Key Pair
25,853,681 UART: [art] Store priv key in slot 0x5
29,146,311 UART: [art] Derive Key Pair - Done
29,159,214 UART: [art] Signing Cert with AUTHO
29,160,512 UART: RITY.KEYID = 7
31,448,273 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,779 UART: [art] PUB.X = 7D86777C8BA6E505E866910ACF6E5EAF815835D8C458F2C03B4146879B8D40F91E8622A21F16A9E593E66E226422B7EF
31,456,988 UART: [art] PUB.Y = 529F22013660BAE2EB521221F97602A7972995BF7992B71A3E4F6DE4E8796E93AA93BD38537416F42E8C001B54D66892
31,464,186 UART: [art] SIG.R = 48A6EB5B02A2DF6AC86E25777C92BBA161C1EDC1A733596A019B655AFC49BA73A189DBA2C87BF600C6E5E7789D31AE43
31,471,608 UART: [art] SIG.S = 1E0D4CF89DC8186315A767BC9A06CF32190DA793513DE4B71AF6646F5C7936A2A7C2AF19C8411AC0509D5E18F5CDF389
32,776,718 UART: Caliptra RT
32,777,433 UART: [state] CFI Enabled
32,938,288 UART: [rt] RT listening for mailbox commands...
32,940,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,970,812 UART: [rt]cmd =0x44504543, len=96
38,741,874 >>> mbox cmd response data (6236 bytes)
38,771,016 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,801,638 UART: [rt]cmd =0x53574545, len=84
38,805,117 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
3,804,194 ready_for_fw is high
3,804,563 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,888,794 >>> mbox cmd response: success
23,590,262 UART:
23,590,701 UART: Running Caliptra FMC ...
23,591,982 UART:
23,592,138 UART: [state] CFI Enabled
23,657,453 UART: [fht] FMC Alias Private Key: 7
25,995,791 UART: [art] Extend RT PCRs Done
25,997,015 UART: [art] Lock RT PCRs Done
25,998,934 UART: [art] Populate DV Done
26,004,562 UART: [fht] FMC Alias Private Key: 7
26,006,190 UART: [art] Derive CDI
26,007,011 UART: [art] Store in in slot 0x4
26,066,375 UART: [art] Derive Key Pair
26,067,368 UART: [art] Store priv key in slot 0x5
29,360,460 UART: [art] Derive Key Pair - Done
29,373,247 UART: [art] Signing Cert with AUTHO
29,374,543 UART: RITY.KEYID = 7
31,661,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,993 UART: [art] PUB.X = 6207FD1882568E6ED54B58923FEEBF3FD122F2434143EFE2A4EBDBB0698BAF80827EB77D17924C5636AEA9D5D26E692C
31,670,261 UART: [art] PUB.Y = 59825DD4F23B5FC65BBFC6E7432BB29300AC6942AF58891F7DB7009609A9B87F09C7880CC093F29258967A84B67A96AD
31,677,438 UART: [art] SIG.R = 4D239D79BFEF55F0F9282E6A2B798F4B2F1408A02379C0A59194AB59D00B32D0E36AA2FDB8F876EC5B83735FD84D1FE2
31,684,865 UART: [art] SIG.S = D3E0E352E2E5CBB9811476168A0874754AA4527E525AD46E9926B067EC0118DA2D386F1CBDD7C493F507621F139687AB
32,989,541 UART: Caliptra RT
32,990,254 UART: [state] CFI Enabled
33,150,402 UART: [rt] RT listening for mailbox commands...
33,152,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,183,098 UART: [rt]cmd =0x44504543, len=96
38,954,340 >>> mbox cmd response data (6236 bytes)
38,983,726 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,014,153 UART: [rt]cmd =0x53574545, len=84
39,018,032 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,352 UART:
192,727 UART: Running Caliptra ROM ...
193,817 UART:
603,380 UART: [state] CFI Enabled
617,533 UART: [state] LifecycleState = Unprovisioned
619,469 UART: [state] DebugLocked = No
620,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,626 UART: [kat] SHA2-256
796,368 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,912 UART: [kat] ++
807,358 UART: [kat] sha1
817,804 UART: [kat] SHA2-256
820,527 UART: [kat] SHA2-384
826,726 UART: [kat] SHA2-512-ACC
829,053 UART: [kat] ECC-384
3,114,320 UART: [kat] HMAC-384Kdf
3,124,834 UART: [kat] LMS
4,314,954 UART: [kat] --
4,320,115 UART: [cold-reset] ++
4,321,622 UART: [fht] Storing FHT @ 0x50003400
4,334,091 UART: [idev] ++
4,334,662 UART: [idev] CDI.KEYID = 6
4,335,621 UART: [idev] SUBJECT.KEYID = 7
4,336,860 UART: [idev] UDS.KEYID = 0
4,337,894 ready_for_fw is high
4,338,137 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,427 UART: [idev] Erasing UDS.KEYID = 0
7,629,833 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,560 UART: [idev] --
7,654,067 UART: [ldev] ++
7,654,691 UART: [ldev] CDI.KEYID = 6
7,655,630 UART: [ldev] SUBJECT.KEYID = 5
7,656,844 UART: [ldev] AUTHORITY.KEYID = 7
7,658,074 UART: [ldev] FE.KEYID = 1
7,668,347 UART: [ldev] Erasing FE.KEYID = 1
10,952,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,331 UART: [ldev] --
13,313,787 UART: [fwproc] Waiting for Commands...
13,316,210 UART: [fwproc] Received command 0x46574c44
13,318,441 UART: [fwproc] Received Image of size 114036 bytes
17,370,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,597 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,833,238 >>> mbox cmd response: success
17,838,284 UART: [afmc] ++
17,838,881 UART: [afmc] CDI.KEYID = 6
17,839,823 UART: [afmc] SUBJECT.KEYID = 7
17,841,039 UART: [afmc] AUTHORITY.KEYID = 5
21,158,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,280 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,544 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,937 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,752 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,224 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,616 UART: [afmc] --
23,524,858 UART: [cold-reset] --
23,529,416 UART: [state] Locking Datavault
23,534,114 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,863 UART: [state] Locking ICCM
23,537,719 UART: [exit] Launching FMC @ 0x40000130
23,546,108 UART:
23,546,338 UART: Running Caliptra FMC ...
23,547,357 UART:
23,547,501 UART: [state] CFI Enabled
23,555,469 UART: [fht] FMC Alias Private Key: 7
25,886,260 UART: [art] Extend RT PCRs Done
25,887,473 UART: [art] Lock RT PCRs Done
25,889,497 UART: [art] Populate DV Done
25,895,077 UART: [fht] FMC Alias Private Key: 7
25,896,744 UART: [art] Derive CDI
25,897,480 UART: [art] Store in in slot 0x4
25,940,393 UART: [art] Derive Key Pair
25,941,391 UART: [art] Store priv key in slot 0x5
29,183,655 UART: [art] Derive Key Pair - Done
29,196,439 UART: [art] Signing Cert with AUTHO
29,197,743 UART: RITY.KEYID = 7
31,477,071 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,577 UART: [art] PUB.X = 91014591FE0C0CCDAF5190AE4500E5F8DDDD9284A62A1E47DA6CB878338B9FF0D5ADEC917785A695655476ED9EB8F901
31,485,807 UART: [art] PUB.Y = 0B44EAD7448C801FBB9AEFAC044BA1E990619C8A3586D681FBAAB8E23F989FC2DD56AC489BCCFABC5BF645ACF8B271B6
31,493,133 UART: [art] SIG.R = F8E3D6F4757BABD4B51A72FCFBABAD6F63FA315C395D6813026F2C6F1CAD58F088759C46DAE0178968CA237389F54EBB
31,500,557 UART: [art] SIG.S = 96C0E3547ABBD70049F15EF9C6790200FBCF8C877130632D7F40F932E95DA9CF000DF04E7D83D957C5C9E18C103B46F5
32,805,461 UART: Caliptra RT
32,806,176 UART: [state] CFI Enabled
32,922,714 UART: [rt] RT listening for mailbox commands...
32,924,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,955,416 UART: [rt]cmd =0x44504543, len=96
38,634,712 >>> mbox cmd response data (6236 bytes)
38,663,971 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,694,486 UART: [rt]cmd =0x53574545, len=84
38,698,073 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
4,126,428 ready_for_fw is high
4,127,066 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,061,994 >>> mbox cmd response: success
23,704,213 UART:
23,704,609 UART: Running Caliptra FMC ...
23,705,721 UART:
23,705,876 UART: [state] CFI Enabled
23,714,042 UART: [fht] FMC Alias Private Key: 7
26,044,765 UART: [art] Extend RT PCRs Done
26,045,990 UART: [art] Lock RT PCRs Done
26,047,485 UART: [art] Populate DV Done
26,052,910 UART: [fht] FMC Alias Private Key: 7
26,054,454 UART: [art] Derive CDI
26,055,194 UART: [art] Store in in slot 0x4
26,098,164 UART: [art] Derive Key Pair
26,099,165 UART: [art] Store priv key in slot 0x5
29,341,365 UART: [art] Derive Key Pair - Done
29,354,016 UART: [art] Signing Cert with AUTHO
29,355,327 UART: RITY.KEYID = 7
31,634,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,130 UART: [art] PUB.X = D08EFF3ED3D45F62E1A951D4B4243A4064D86C05280F3A70C80F8CDFF4B27E2C3EC3A5E2B86EBCD3827B042A668C104F
31,643,392 UART: [art] PUB.Y = D6DA7E131566540AB0C6295D988F2A3785B1A7C9BE3FD30F4E200DF4BED1C56CC77E7DCE6D2A81F64B37B6C3A2956241
31,650,663 UART: [art] SIG.R = 9C935EB44F24A95C6AE420D09D7FAB7981EF6D8A6E58D5273ACD0CF6F88E1BDC037030B1D9408AB3204526BCCFB68C82
31,658,020 UART: [art] SIG.S = DCC69092226E4F049F3972CF692011E1A588CF2B7A366CC038665F223C5AE3459119F816B82218549C86D26C429B7D69
32,963,665 UART: Caliptra RT
32,964,382 UART: [state] CFI Enabled
33,081,928 UART: [rt] RT listening for mailbox commands...
33,083,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,114,358 UART: [rt]cmd =0x44504543, len=96
38,794,435 >>> mbox cmd response data (6236 bytes)
38,823,809 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,854,374 UART: [rt]cmd =0x53574545, len=84
38,857,699 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
192,519 UART:
192,898 UART: Running Caliptra ROM ...
194,001 UART:
194,150 UART: [state] CFI Enabled
264,593 UART: [state] LifecycleState = Unprovisioned
266,516 UART: [state] DebugLocked = No
267,896 UART: [state] WD Timer not started. Device not locked for debugging
270,717 UART: [kat] SHA2-256
449,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,456 UART: [kat] ++
461,923 UART: [kat] sha1
472,584 UART: [kat] SHA2-256
475,597 UART: [kat] SHA2-384
481,168 UART: [kat] SHA2-512-ACC
484,106 UART: [kat] ECC-384
2,948,998 UART: [kat] HMAC-384Kdf
2,972,660 UART: [kat] LMS
3,502,095 UART: [kat] --
3,506,645 UART: [cold-reset] ++
3,509,015 UART: [fht] FHT @ 0x50003400
3,519,214 UART: [idev] ++
3,519,781 UART: [idev] CDI.KEYID = 6
3,520,782 UART: [idev] SUBJECT.KEYID = 7
3,521,899 UART: [idev] UDS.KEYID = 0
3,522,881 ready_for_fw is high
3,523,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,046 UART: [idev] Erasing UDS.KEYID = 0
6,027,200 UART: [idev] Sha1 KeyId Algorithm
6,050,083 UART: [idev] --
6,053,745 UART: [ldev] ++
6,054,330 UART: [ldev] CDI.KEYID = 6
6,055,247 UART: [ldev] SUBJECT.KEYID = 5
6,056,461 UART: [ldev] AUTHORITY.KEYID = 7
6,057,742 UART: [ldev] FE.KEYID = 1
6,103,519 UART: [ldev] Erasing FE.KEYID = 1
8,603,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,822 UART: [ldev] --
10,395,685 UART: [fwproc] Wait for Commands...
10,398,929 UART: [fwproc] Recv command 0x46574c44
10,401,022 UART: [fwproc] Recv'd Img size: 114360 bytes
13,807,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,268,036 >>> mbox cmd response: success
14,273,012 UART: [afmc] ++
14,273,610 UART: [afmc] CDI.KEYID = 6
14,274,497 UART: [afmc] SUBJECT.KEYID = 7
14,275,713 UART: [afmc] AUTHORITY.KEYID = 5
16,808,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,149 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,694 UART: [afmc] --
18,609,199 UART: [cold-reset] --
18,613,288 UART: [state] Locking Datavault
18,617,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,217 UART: [state] Locking ICCM
18,621,689 UART: [exit] Launching FMC @ 0x40000130
18,630,086 UART:
18,630,336 UART: Running Caliptra FMC ...
18,631,443 UART:
18,631,600 UART: [state] CFI Enabled
18,690,883 UART: [fht] FMC Alias Private Key: 7
20,454,550 UART: [art] Extend RT PCRs Done
20,455,769 UART: [art] Lock RT PCRs Done
20,457,312 UART: [art] Populate DV Done
20,462,669 UART: [fht] FMC Alias Private Key: 7
20,464,258 UART: [art] Derive CDI
20,465,014 UART: [art] Store in in slot 0x4
20,523,679 UART: [art] Derive Key Pair
20,524,721 UART: [art] Store priv key in slot 0x5
22,987,803 UART: [art] Derive Key Pair - Done
23,000,852 UART: [art] Signing Cert with AUTHO
23,002,161 UART: RITY.KEYID = 7
24,713,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,341 UART: [art] PUB.X = 342446F0EDD9C7675D97516B3C5AD6F55930E8A55EF71FA6021FDD9DF3C8DE45B29F28BA22EDD9DA167CC597E41EBD85
24,722,626 UART: [art] PUB.Y = 229D788CD5824376E4BACF70FCD8BE3412C868107918E44D5459AB5F14A4FAE266D3C1E28257BC77AAC5B7A871856309
24,729,839 UART: [art] SIG.R = 7F05BEE5593370F5DAED1F789682657C592FC449AF2FC6554A96A725D7CBDB955D93F7B60207E596268095AA2750784A
24,737,262 UART: [art] SIG.S = DE86E572505AE8044DC4E137E8EA2D26127F121E355A19BE0AD38B23C30AA95867C3ED36BED0EE0C08E5BE9CFA954CFF
25,715,637 UART: Caliptra RT
25,716,364 UART: [state] CFI Enabled
25,882,527 UART: [rt] RT listening for mailbox commands...
25,884,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,915,192 UART: [rt]cmd =0x44504543, len=96
30,281,090 >>> mbox cmd response data (6236 bytes)
30,310,422 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,340,982 UART: [rt]cmd =0x53574545, len=84
30,344,438 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,546 writing to cptra_bootfsm_go
192,731 UART:
193,227 UART: Running Caliptra ROM ...
194,358 UART:
194,510 UART: [state] CFI Enabled
264,278 UART: [state] LifecycleState = Unprovisioned
266,663 UART: [state] DebugLocked = No
268,277 UART: [state] WD Timer not started. Device not locked for debugging
273,669 UART: [kat] SHA2-256
463,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,301 UART: [kat] ++
474,791 UART: [kat] sha1
485,169 UART: [kat] SHA2-256
488,179 UART: [kat] SHA2-384
495,236 UART: [kat] SHA2-512-ACC
497,826 UART: [kat] ECC-384
2,948,969 UART: [kat] HMAC-384Kdf
2,972,671 UART: [kat] LMS
3,504,490 UART: [kat] --
3,508,198 UART: [cold-reset] ++
3,509,773 UART: [fht] FHT @ 0x50003400
3,521,249 UART: [idev] ++
3,521,986 UART: [idev] CDI.KEYID = 6
3,522,906 UART: [idev] SUBJECT.KEYID = 7
3,524,152 UART: [idev] UDS.KEYID = 0
3,525,083 ready_for_fw is high
3,525,312 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,987 UART: [idev] Erasing UDS.KEYID = 0
6,027,139 UART: [idev] Sha1 KeyId Algorithm
6,049,173 UART: [idev] --
6,052,602 UART: [ldev] ++
6,053,291 UART: [ldev] CDI.KEYID = 6
6,054,206 UART: [ldev] SUBJECT.KEYID = 5
6,055,418 UART: [ldev] AUTHORITY.KEYID = 7
6,056,596 UART: [ldev] FE.KEYID = 1
6,101,592 UART: [ldev] Erasing FE.KEYID = 1
8,609,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,540 UART: [ldev] --
10,412,909 UART: [fwproc] Wait for Commands...
10,415,378 UART: [fwproc] Recv command 0x46574c44
10,417,682 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,597,972 >>> mbox cmd response: success
14,602,861 UART: [afmc] ++
14,603,593 UART: [afmc] CDI.KEYID = 6
14,604,716 UART: [afmc] SUBJECT.KEYID = 7
14,606,266 UART: [afmc] AUTHORITY.KEYID = 5
17,148,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,566 UART: [afmc] --
18,946,545 UART: [cold-reset] --
18,951,385 UART: [state] Locking Datavault
18,953,950 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,103 UART: [state] Locking ICCM
18,959,016 UART: [exit] Launching FMC @ 0x40000130
18,967,702 UART:
18,967,944 UART: Running Caliptra FMC ...
18,969,045 UART:
18,969,205 UART: [state] CFI Enabled
19,030,402 UART: [fht] FMC Alias Private Key: 7
20,794,849 UART: [art] Extend RT PCRs Done
20,796,063 UART: [art] Lock RT PCRs Done
20,797,663 UART: [art] Populate DV Done
20,803,076 UART: [fht] FMC Alias Private Key: 7
20,804,725 UART: [art] Derive CDI
20,805,461 UART: [art] Store in in slot 0x4
20,864,394 UART: [art] Derive Key Pair
20,865,436 UART: [art] Store priv key in slot 0x5
23,328,670 UART: [art] Derive Key Pair - Done
23,341,344 UART: [art] Signing Cert with AUTHO
23,342,653 UART: RITY.KEYID = 7
25,054,165 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,660 UART: [art] PUB.X = EF0B6D11303F460FA4D468CCE0FE27E6E578CAE2D1E4C7534B8F5390EEA4080A7C1537EDA05AE77D82FF88B098F8677F
25,062,932 UART: [art] PUB.Y = 46E81227C6F71E51284023C20923E54A6641A740F9CD8367B64A96B290A2B2C7D5261F0DD1EC37480FF53F19BD291597
25,070,202 UART: [art] SIG.R = DDCE69AC7C8B8A53B6D5482532677D2121F63D8BEC95D4BA4A7770614468A22424E021E43AAAD429BE69E22C571C6B36
25,077,581 UART: [art] SIG.S = 26EB802599D292CB2791AF1F2931F87683CCEF06D0786F5028377DBA88052A8E1A4CBEC09D23B0FBAD06CDB0F1DB4663
26,056,749 UART: Caliptra RT
26,057,460 UART: [state] CFI Enabled
26,224,201 UART: [rt] RT listening for mailbox commands...
26,226,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,256,772 UART: [rt]cmd =0x44504543, len=96
30,624,058 >>> mbox cmd response data (6236 bytes)
30,653,214 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,683,728 UART: [rt]cmd =0x53574545, len=84
30,686,881 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,439,041 ready_for_fw is high
3,439,433 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,742,787 >>> mbox cmd response: success
19,019,663 UART:
19,020,074 UART: Running Caliptra FMC ...
19,021,281 UART:
19,021,458 UART: [state] CFI Enabled
19,091,239 UART: [fht] FMC Alias Private Key: 7
20,855,231 UART: [art] Extend RT PCRs Done
20,856,459 UART: [art] Lock RT PCRs Done
20,858,088 UART: [art] Populate DV Done
20,863,553 UART: [fht] FMC Alias Private Key: 7
20,865,098 UART: [art] Derive CDI
20,865,918 UART: [art] Store in in slot 0x4
20,924,161 UART: [art] Derive Key Pair
20,925,207 UART: [art] Store priv key in slot 0x5
23,388,164 UART: [art] Derive Key Pair - Done
23,401,241 UART: [art] Signing Cert with AUTHO
23,402,558 UART: RITY.KEYID = 7
25,114,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,613 UART: [art] PUB.X = 61166603D814A83122510C55C63E834992E8A11EBDAE2CFF17148737E1310F5895D10622D20573FEF1BD1959A8B43B0F
25,122,846 UART: [art] PUB.Y = 15581BB39BDD4F2EFBCF28FF848F95E39181D6CC783F7A20704185826DDBCDDC3D38AEE48D0173CADF329E49532D3021
25,130,105 UART: [art] SIG.R = 400F63669780B52E0386145EABCA2C72A35CA2B7C25C44C977F0EE64D3999D436649B15437A829A0DE9AC2DB51A0D008
25,137,476 UART: [art] SIG.S = BCFE47FA6A21A10946DA5EA94B7D31927C68930CCB8CDA5F02BA2FE0E408E99944965567B2AB56F9874F37E28D764760
26,116,455 UART: Caliptra RT
26,117,423 UART: [state] CFI Enabled
26,284,058 UART: [rt] RT listening for mailbox commands...
26,286,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,316,755 UART: [rt]cmd =0x44504543, len=96
30,703,474 >>> mbox cmd response data (6236 bytes)
30,733,124 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,763,639 UART: [rt]cmd =0x53574545, len=84
30,767,414 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,349 UART:
192,712 UART: Running Caliptra ROM ...
193,802 UART:
603,648 UART: [state] CFI Enabled
615,955 UART: [state] LifecycleState = Unprovisioned
618,329 UART: [state] DebugLocked = No
620,645 UART: [state] WD Timer not started. Device not locked for debugging
625,388 UART: [kat] SHA2-256
815,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,016 UART: [kat] ++
826,538 UART: [kat] sha1
837,997 UART: [kat] SHA2-256
841,037 UART: [kat] SHA2-384
846,818 UART: [kat] SHA2-512-ACC
849,396 UART: [kat] ECC-384
3,290,269 UART: [kat] HMAC-384Kdf
3,302,611 UART: [kat] LMS
3,834,389 UART: [kat] --
3,836,704 UART: [cold-reset] ++
3,838,780 UART: [fht] FHT @ 0x50003400
3,850,393 UART: [idev] ++
3,851,101 UART: [idev] CDI.KEYID = 6
3,852,004 UART: [idev] SUBJECT.KEYID = 7
3,853,253 UART: [idev] UDS.KEYID = 0
3,854,180 ready_for_fw is high
3,854,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,998,043 UART: [idev] Erasing UDS.KEYID = 0
6,329,847 UART: [idev] Sha1 KeyId Algorithm
6,353,276 UART: [idev] --
6,359,082 UART: [ldev] ++
6,359,764 UART: [ldev] CDI.KEYID = 6
6,360,641 UART: [ldev] SUBJECT.KEYID = 5
6,361,853 UART: [ldev] AUTHORITY.KEYID = 7
6,363,078 UART: [ldev] FE.KEYID = 1
6,376,509 UART: [ldev] Erasing FE.KEYID = 1
8,858,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,704 UART: [ldev] --
10,647,589 UART: [fwproc] Wait for Commands...
10,650,538 UART: [fwproc] Recv command 0x46574c44
10,652,838 UART: [fwproc] Recv'd Img size: 114360 bytes
14,110,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,849,717 >>> mbox cmd response: success
14,853,440 UART: [afmc] ++
14,854,131 UART: [afmc] CDI.KEYID = 6
14,855,285 UART: [afmc] SUBJECT.KEYID = 7
14,856,815 UART: [afmc] AUTHORITY.KEYID = 5
17,363,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,087,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,926 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,930 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,158 UART: [afmc] --
19,159,588 UART: [cold-reset] --
19,163,026 UART: [state] Locking Datavault
19,168,488 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,667 UART: [state] Locking ICCM
19,173,113 UART: [exit] Launching FMC @ 0x40000130
19,181,769 UART:
19,182,005 UART: Running Caliptra FMC ...
19,183,040 UART:
19,183,189 UART: [state] CFI Enabled
19,191,776 UART: [fht] FMC Alias Private Key: 7
20,948,919 UART: [art] Extend RT PCRs Done
20,950,166 UART: [art] Lock RT PCRs Done
20,952,032 UART: [art] Populate DV Done
20,957,440 UART: [fht] FMC Alias Private Key: 7
20,959,022 UART: [art] Derive CDI
20,959,759 UART: [art] Store in in slot 0x4
21,002,037 UART: [art] Derive Key Pair
21,003,082 UART: [art] Store priv key in slot 0x5
23,429,441 UART: [art] Derive Key Pair - Done
23,442,399 UART: [art] Signing Cert with AUTHO
23,443,705 UART: RITY.KEYID = 7
25,149,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,979 UART: [art] PUB.X = 06EE276EDAD5D4C17EC9AAAA4439DCE731980722E62773059B7116F091024BDB4D55EFC2AB38D85AD6FA452EC7317976
25,158,291 UART: [art] PUB.Y = FD3B0466B50391FA0A078E8421D67434986EAF77DA0C0F238B75DDEC11B5512FA03411B8003E03D239D33137B213C195
25,165,471 UART: [art] SIG.R = B3AA0C3D9466DFDC952CA6940236478DE0614F9F362C92FE8C520DDDCDB7051F4CF331E08FF0093A0A2F164F5B80BA16
25,172,911 UART: [art] SIG.S = 6E52D30C8FF6E161B5AF5015C4E71496E219862322775EAE5110B410A5ECCFFA6673A55C570082E9CD8EBFDA2E403B41
26,151,435 UART: Caliptra RT
26,152,140 UART: [state] CFI Enabled
26,269,185 UART: [rt] RT listening for mailbox commands...
26,271,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,301,671 UART: [rt]cmd =0x44504543, len=96
30,591,877 >>> mbox cmd response data (6236 bytes)
30,621,184 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,651,630 UART: [rt]cmd =0x53574545, len=84
30,655,716 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,755,932 ready_for_fw is high
3,756,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,991 >>> mbox cmd response: success
19,203,671 UART:
19,204,046 UART: Running Caliptra FMC ...
19,205,142 UART:
19,205,314 UART: [state] CFI Enabled
19,213,263 UART: [fht] FMC Alias Private Key: 7
20,969,906 UART: [art] Extend RT PCRs Done
20,971,128 UART: [art] Lock RT PCRs Done
20,972,774 UART: [art] Populate DV Done
20,978,126 UART: [fht] FMC Alias Private Key: 7
20,979,821 UART: [art] Derive CDI
20,980,568 UART: [art] Store in in slot 0x4
21,023,107 UART: [art] Derive Key Pair
21,024,107 UART: [art] Store priv key in slot 0x5
23,450,405 UART: [art] Derive Key Pair - Done
23,463,300 UART: [art] Signing Cert with AUTHO
23,464,627 UART: RITY.KEYID = 7
25,170,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,753 UART: [art] PUB.X = 652FD0E6E3A3DFCAE5E3D0AD17745149ED85E2DCDBCA51ED7D24B6E0F313942BC2F14CD23C81B53ABC2C6F4E8291142D
25,179,018 UART: [art] PUB.Y = E421C036CFE3188AA85F75A0E24E185B682D06B556D32B675E930353BF3FA8BEC457403B5318B9624480DACF87E39101
25,186,245 UART: [art] SIG.R = 72682302799C9EBCB6B498C729BBA4483F8C891A002B7D0583D53F0D85D961A200403111841123CD9500A04EB6FEB40A
25,193,588 UART: [art] SIG.S = 8286FB969F446CCF3A41F9A42C111C69213A0193A5D3FBBB2567F5C8186476CDB97798F7380F8F3F043815D2FFB3C0B3
26,172,810 UART: Caliptra RT
26,173,494 UART: [state] CFI Enabled
26,291,090 UART: [rt] RT listening for mailbox commands...
26,293,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,323,810 UART: [rt]cmd =0x44504543, len=96
30,614,487 >>> mbox cmd response data (6236 bytes)
30,643,844 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,674,597 UART: [rt]cmd =0x53574545, len=84
30,678,499 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,265 UART: [kat] SHA2-256
882,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,311 UART: [kat] ++
886,463 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,528 UART: [kat] SHA2-512-ACC
897,429 UART: [kat] ECC-384
903,390 UART: [kat] HMAC-384Kdf
907,936 UART: [kat] LMS
1,476,132 UART: [kat] --
1,477,177 UART: [cold-reset] ++
1,477,647 UART: [fht] Storing FHT @ 0x50003400
1,480,354 UART: [idev] ++
1,480,522 UART: [idev] CDI.KEYID = 6
1,480,882 UART: [idev] SUBJECT.KEYID = 7
1,481,306 UART: [idev] UDS.KEYID = 0
1,481,651 ready_for_fw is high
1,481,651 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,004 UART: [idev] Erasing UDS.KEYID = 0
1,505,720 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,446 UART: [idev] --
1,515,393 UART: [ldev] ++
1,515,561 UART: [ldev] CDI.KEYID = 6
1,515,924 UART: [ldev] SUBJECT.KEYID = 5
1,516,350 UART: [ldev] AUTHORITY.KEYID = 7
1,516,813 UART: [ldev] FE.KEYID = 1
1,521,893 UART: [ldev] Erasing FE.KEYID = 1
1,547,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,944 UART: [ldev] --
1,586,285 UART: [fwproc] Waiting for Commands...
1,587,084 UART: [fwproc] Received command 0x46574c44
1,587,875 UART: [fwproc] Received Image of size 114360 bytes
2,885,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,454 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,667 >>> mbox cmd response: success
3,079,861 UART: [afmc] ++
3,080,029 UART: [afmc] CDI.KEYID = 6
3,080,391 UART: [afmc] SUBJECT.KEYID = 7
3,080,816 UART: [afmc] AUTHORITY.KEYID = 5
3,115,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,397 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,790 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,480 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,349 UART: [afmc] --
3,159,235 UART: [cold-reset] --
3,159,911 UART: [state] Locking Datavault
3,161,014 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,618 UART: [state] Locking ICCM
3,162,112 UART: [exit] Launching FMC @ 0x40000130
3,167,441 UART:
3,167,457 UART: Running Caliptra FMC ...
3,167,865 UART:
3,167,919 UART: [state] CFI Enabled
3,178,268 UART: [fht] FMC Alias Private Key: 7
3,286,541 UART: [art] Extend RT PCRs Done
3,286,969 UART: [art] Lock RT PCRs Done
3,288,663 UART: [art] Populate DV Done
3,296,758 UART: [fht] FMC Alias Private Key: 7
3,297,804 UART: [art] Derive CDI
3,298,084 UART: [art] Store in in slot 0x4
3,384,099 UART: [art] Derive Key Pair
3,384,459 UART: [art] Store priv key in slot 0x5
3,397,369 UART: [art] Derive Key Pair - Done
3,412,227 UART: [art] Signing Cert with AUTHO
3,412,707 UART: RITY.KEYID = 7
3,428,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,018 UART: [art] PUB.X = F479C98C45965D3453054E46F916FAC5530CCF41B47694F2CD05BDB0E61040FD244D6649B04EBD27301FF59E1C724723
3,435,779 UART: [art] PUB.Y = 339374B33F6728770E732BAB99B177E36F451B76F8953C525CAD55D93AF493D958D6A25C890421940FA8A3FB761A8148
3,442,714 UART: [art] SIG.R = 316EE90AF2975A4F2710539B0F9AE881AB106E7FCA17B03BA8C50B5A37CA678D30BBD6DED304EEDFF8167B142BE10915
3,449,485 UART: [art] SIG.S = 2DC0627AF30798747D96ABE2E2E6AEC9232FD7E289F89982E09FA38647043E27F7D5A58276A66273C44C6E7961838465
3,473,210 UART: Caliptra RT
3,473,464 UART: [state] CFI Enabled
3,581,157 UART: [rt] RT listening for mailbox commands...
3,581,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,902 UART: [rt]cmd =0x44504543, len=96
3,800,912 >>> mbox cmd response data (6236 bytes)
3,800,913 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,750 UART: [rt]cmd =0x53574545, len=84
3,833,797 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,007 ready_for_fw is high
1,362,007 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,219 >>> mbox cmd response: success
2,987,725 UART:
2,987,741 UART: Running Caliptra FMC ...
2,988,149 UART:
2,988,203 UART: [state] CFI Enabled
2,998,726 UART: [fht] FMC Alias Private Key: 7
3,106,865 UART: [art] Extend RT PCRs Done
3,107,293 UART: [art] Lock RT PCRs Done
3,108,785 UART: [art] Populate DV Done
3,117,066 UART: [fht] FMC Alias Private Key: 7
3,118,086 UART: [art] Derive CDI
3,118,366 UART: [art] Store in in slot 0x4
3,203,965 UART: [art] Derive Key Pair
3,204,325 UART: [art] Store priv key in slot 0x5
3,217,661 UART: [art] Derive Key Pair - Done
3,232,691 UART: [art] Signing Cert with AUTHO
3,233,171 UART: RITY.KEYID = 7
3,248,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,294 UART: [art] PUB.X = A2EB28DA91DFC3B9D4F0936AC52873A3F3C8D5FD1EF0338F28FCF768E1EE72494C3BB42D912595C4548BFA1181AB50E7
3,256,080 UART: [art] PUB.Y = 3015208FB250E20E245492B7ABAB26FFCC8FB3C9EF9FDDEA771FAA760D6646AE56554C169C568C8C42C038A098D2212D
3,263,036 UART: [art] SIG.R = 56EB176F8900CF66378DDE86384CB8CA69CFAF7EC5A75CA193458E3360E4B05A1AE5045BCB4B7AFB967407FB11F7D933
3,269,792 UART: [art] SIG.S = A2CFF3C4CE8FB11FF8683BDF1BC0062FE6C02C19B629969DFEFE3159E0C7C1B72E9EDB88B3C64D4A2F2349285CFDBC44
3,293,854 UART: Caliptra RT
3,294,108 UART: [state] CFI Enabled
3,401,834 UART: [rt] RT listening for mailbox commands...
3,402,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,529 UART: [rt]cmd =0x44504543, len=96
3,620,894 >>> mbox cmd response data (6236 bytes)
3,620,895 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,726 UART: [rt]cmd =0x53574545, len=84
3,654,053 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
895,033 UART: [kat] SHA2-512-ACC
896,934 UART: [kat] ECC-384
902,689 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,308 UART: [cold-reset] ++
1,476,752 UART: [fht] Storing FHT @ 0x50003400
1,479,601 UART: [idev] ++
1,479,769 UART: [idev] CDI.KEYID = 6
1,480,129 UART: [idev] SUBJECT.KEYID = 7
1,480,553 UART: [idev] UDS.KEYID = 0
1,480,898 ready_for_fw is high
1,480,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,853 UART: [idev] Erasing UDS.KEYID = 0
1,505,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,431 UART: [idev] --
1,515,464 UART: [ldev] ++
1,515,632 UART: [ldev] CDI.KEYID = 6
1,515,995 UART: [ldev] SUBJECT.KEYID = 5
1,516,421 UART: [ldev] AUTHORITY.KEYID = 7
1,516,884 UART: [ldev] FE.KEYID = 1
1,522,354 UART: [ldev] Erasing FE.KEYID = 1
1,547,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,785 UART: [ldev] --
1,587,196 UART: [fwproc] Waiting for Commands...
1,587,893 UART: [fwproc] Received command 0x46574c44
1,588,684 UART: [fwproc] Received Image of size 114360 bytes
2,886,495 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,849 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,872 >>> mbox cmd response: success
3,080,070 UART: [afmc] ++
3,080,238 UART: [afmc] CDI.KEYID = 6
3,080,600 UART: [afmc] SUBJECT.KEYID = 7
3,081,025 UART: [afmc] AUTHORITY.KEYID = 5
3,116,728 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,479 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,169 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,142 UART: [afmc] --
3,160,172 UART: [cold-reset] --
3,161,060 UART: [state] Locking Datavault
3,162,289 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,893 UART: [state] Locking ICCM
3,163,491 UART: [exit] Launching FMC @ 0x40000130
3,168,820 UART:
3,168,836 UART: Running Caliptra FMC ...
3,169,244 UART:
3,169,387 UART: [state] CFI Enabled
3,180,022 UART: [fht] FMC Alias Private Key: 7
3,287,373 UART: [art] Extend RT PCRs Done
3,287,801 UART: [art] Lock RT PCRs Done
3,289,167 UART: [art] Populate DV Done
3,297,330 UART: [fht] FMC Alias Private Key: 7
3,298,416 UART: [art] Derive CDI
3,298,696 UART: [art] Store in in slot 0x4
3,384,705 UART: [art] Derive Key Pair
3,385,065 UART: [art] Store priv key in slot 0x5
3,397,815 UART: [art] Derive Key Pair - Done
3,412,685 UART: [art] Signing Cert with AUTHO
3,413,165 UART: RITY.KEYID = 7
3,428,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,116 UART: [art] PUB.X = 93931E50D3D75FB85E7848C67A533C2BE2B7E89D8260A168C736A95C55D6E7DA878A72AB0F6A5A1DD2C37BC981F280F1
3,435,891 UART: [art] PUB.Y = B492772C27EF13E5A64AB6921BFEC3189C6715E6824BF9E604E34A2524799084C60E06750BC62EC2C835D6D68B52CF3A
3,442,831 UART: [art] SIG.R = CEB599D8BED715235C95234430DB15F6DF07E54949140402CE35497E5BEB96AD6EE743E97C9FB4B0BE946CA473C6726D
3,449,600 UART: [art] SIG.S = C6EA8E68C491F588AEEE2B14B8AAD0650150908DA8E36DED00C50FA8F2E9E46EF73DBB283F8D66E066B83996D738D54C
3,473,217 UART: Caliptra RT
3,473,563 UART: [state] CFI Enabled
3,581,940 UART: [rt] RT listening for mailbox commands...
3,582,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,975 UART: [rt]cmd =0x44504543, len=96
3,801,347 >>> mbox cmd response data (6236 bytes)
3,801,348 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,281 UART: [rt]cmd =0x53574545, len=84
3,834,480 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,586 ready_for_fw is high
1,363,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,800 >>> mbox cmd response: success
2,990,810 UART:
2,990,826 UART: Running Caliptra FMC ...
2,991,234 UART:
2,991,377 UART: [state] CFI Enabled
3,002,240 UART: [fht] FMC Alias Private Key: 7
3,110,373 UART: [art] Extend RT PCRs Done
3,110,801 UART: [art] Lock RT PCRs Done
3,112,081 UART: [art] Populate DV Done
3,120,124 UART: [fht] FMC Alias Private Key: 7
3,121,288 UART: [art] Derive CDI
3,121,568 UART: [art] Store in in slot 0x4
3,207,295 UART: [art] Derive Key Pair
3,207,655 UART: [art] Store priv key in slot 0x5
3,221,171 UART: [art] Derive Key Pair - Done
3,235,869 UART: [art] Signing Cert with AUTHO
3,236,349 UART: RITY.KEYID = 7
3,251,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,842 UART: [art] PUB.X = FF6678E1778F0A5DF9F96E7AEA2B125222D6457FE1782E80006E30BDD6E1523199C3486726D16357E29FC31011620F19
3,258,578 UART: [art] PUB.Y = 0F4D37F9B4F882D9D157B03BA66EEEF287A1EF94BC2B01359A08E2D9FA13AF1BB40C3AED0318A43506188F235203E0AB
3,265,521 UART: [art] SIG.R = 831D16E2D69563A7FB076A415E8B7E5502AEA7B1CBD5304699B02E80A38223B9E0DF4B06F5952EFC9DAA36A059964C39
3,272,288 UART: [art] SIG.S = E6C1CF483EA83F39144B09121514952CD4EB079BA63B548394699661CA1522F575380356EBC15CF6DD298610ED22697E
3,296,344 UART: Caliptra RT
3,296,690 UART: [state] CFI Enabled
3,405,551 UART: [rt] RT listening for mailbox commands...
3,406,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,394 UART: [rt]cmd =0x44504543, len=96
3,623,987 >>> mbox cmd response data (6236 bytes)
3,623,988 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,889 UART: [rt]cmd =0x53574545, len=84
3,656,728 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,398 UART: [kat] HMAC-384Kdf
922,968 UART: [kat] LMS
1,171,296 UART: [kat] --
1,172,047 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,108 UART: [idev] ++
1,175,276 UART: [idev] CDI.KEYID = 6
1,175,636 UART: [idev] SUBJECT.KEYID = 7
1,176,060 UART: [idev] UDS.KEYID = 0
1,176,405 ready_for_fw is high
1,176,405 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,970 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,661 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,304 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,513 UART: [ldev] --
1,282,876 UART: [fwproc] Wait for Commands...
1,283,552 UART: [fwproc] Recv command 0x46574c44
1,284,280 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,340 >>> mbox cmd response: success
2,776,440 UART: [afmc] ++
2,776,608 UART: [afmc] CDI.KEYID = 6
2,776,970 UART: [afmc] SUBJECT.KEYID = 7
2,777,395 UART: [afmc] AUTHORITY.KEYID = 5
2,813,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,384 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,103 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,901 UART: [afmc] --
2,856,931 UART: [cold-reset] --
2,857,557 UART: [state] Locking Datavault
2,858,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,410 UART: [state] Locking ICCM
2,859,838 UART: [exit] Launching FMC @ 0x40000130
2,865,167 UART:
2,865,183 UART: Running Caliptra FMC ...
2,865,591 UART:
2,865,645 UART: [state] CFI Enabled
2,876,178 UART: [fht] FMC Alias Private Key: 7
2,984,213 UART: [art] Extend RT PCRs Done
2,984,641 UART: [art] Lock RT PCRs Done
2,986,209 UART: [art] Populate DV Done
2,994,412 UART: [fht] FMC Alias Private Key: 7
2,995,434 UART: [art] Derive CDI
2,995,714 UART: [art] Store in in slot 0x4
3,081,475 UART: [art] Derive Key Pair
3,081,835 UART: [art] Store priv key in slot 0x5
3,094,861 UART: [art] Derive Key Pair - Done
3,109,586 UART: [art] Signing Cert with AUTHO
3,110,066 UART: RITY.KEYID = 7
3,125,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,163 UART: [art] PUB.X = D1BDF0A592E0A3A12D71097CB8707291A08285FE19E8AF12E7BFBED9457E8929D058E2AC28755C24605B8224D50573E4
3,132,929 UART: [art] PUB.Y = D17C6C4AB24BEE5AB38B7B2A4EB308347899E6C1B2D71C403B5150816ECDD44CDBB347E718EDFFAC6354E0B23887298B
3,139,892 UART: [art] SIG.R = 2C9FF3AC31CD03AE45FA1E6D86C5A22ABD11FA1D232E834A359EBAFE118E32FB4C95BFE4485CD9294969EA8F191A7056
3,146,679 UART: [art] SIG.S = 4869DEC1F00B45D821F1636BB24B8569B0DF5579EA421647A54AF85AFED0274841EA6A6F9852EDBD16DDE0C1CBCDEB1E
3,171,051 UART: Caliptra RT
3,171,305 UART: [state] CFI Enabled
3,279,477 UART: [rt] RT listening for mailbox commands...
3,280,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,084 UART: [rt]cmd =0x44504543, len=96
3,498,071 >>> mbox cmd response data (6236 bytes)
3,498,072 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,075 UART: [rt]cmd =0x53574545, len=84
3,531,248 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,593 ready_for_fw is high
1,060,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,471 >>> mbox cmd response: success
2,689,555 UART:
2,689,571 UART: Running Caliptra FMC ...
2,689,979 UART:
2,690,033 UART: [state] CFI Enabled
2,700,816 UART: [fht] FMC Alias Private Key: 7
2,808,431 UART: [art] Extend RT PCRs Done
2,808,859 UART: [art] Lock RT PCRs Done
2,810,019 UART: [art] Populate DV Done
2,817,934 UART: [fht] FMC Alias Private Key: 7
2,818,982 UART: [art] Derive CDI
2,819,262 UART: [art] Store in in slot 0x4
2,904,507 UART: [art] Derive Key Pair
2,904,867 UART: [art] Store priv key in slot 0x5
2,917,689 UART: [art] Derive Key Pair - Done
2,932,501 UART: [art] Signing Cert with AUTHO
2,932,981 UART: RITY.KEYID = 7
2,948,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,068 UART: [art] PUB.X = 8878109700C6C62C3C7C9C88A79BCDE3B92B3CDF35C68A0011783D27251D0427CA9889E067A13023DCA633BC41066180
2,955,784 UART: [art] PUB.Y = 22984D8BAFDCD704016D35B2628EA6D2E05D6657F6AB26201A7DBAAD12944EB7360EFFA938B7E71F31FE4A7B6F08E8ED
2,962,740 UART: [art] SIG.R = 353B34706A07571B2AC3E1E09D03AC840D5CAC646DFE6CB1DCB112AB9FABBD42BB9A3C2F1764305D21402BF74FB09BB5
2,969,521 UART: [art] SIG.S = 10B26E4CB041531B58603D1901C30A47BF639203F464773EE7C4EDBB1BC8029B4FDBB05BC9D420908C0C5855080215B0
2,993,115 UART: Caliptra RT
2,993,369 UART: [state] CFI Enabled
3,101,285 UART: [rt] RT listening for mailbox commands...
3,101,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,994 UART: [rt]cmd =0x44504543, len=96
3,320,467 >>> mbox cmd response data (6236 bytes)
3,320,468 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,563 UART: [rt]cmd =0x53574545, len=84
3,353,610 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,676 UART: [cold-reset] ++
1,172,256 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 ready_for_fw is high
1,176,312 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,069 UART: [idev] Erasing UDS.KEYID = 0
1,201,378 UART: [idev] Sha1 KeyId Algorithm
1,209,846 UART: [idev] --
1,211,028 UART: [ldev] ++
1,211,196 UART: [ldev] CDI.KEYID = 6
1,211,559 UART: [ldev] SUBJECT.KEYID = 5
1,211,985 UART: [ldev] AUTHORITY.KEYID = 7
1,212,448 UART: [ldev] FE.KEYID = 1
1,217,728 UART: [ldev] Erasing FE.KEYID = 1
1,244,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,864 UART: [ldev] --
1,283,223 UART: [fwproc] Wait for Commands...
1,283,911 UART: [fwproc] Recv command 0x46574c44
1,284,639 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,795 >>> mbox cmd response: success
2,776,815 UART: [afmc] ++
2,776,983 UART: [afmc] CDI.KEYID = 6
2,777,345 UART: [afmc] SUBJECT.KEYID = 7
2,777,770 UART: [afmc] AUTHORITY.KEYID = 5
2,814,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,880 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,765 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,264 UART: [afmc] --
2,857,178 UART: [cold-reset] --
2,858,086 UART: [state] Locking Datavault
2,859,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,829 UART: [state] Locking ICCM
2,860,259 UART: [exit] Launching FMC @ 0x40000130
2,865,588 UART:
2,865,604 UART: Running Caliptra FMC ...
2,866,012 UART:
2,866,155 UART: [state] CFI Enabled
2,876,630 UART: [fht] FMC Alias Private Key: 7
2,984,891 UART: [art] Extend RT PCRs Done
2,985,319 UART: [art] Lock RT PCRs Done
2,986,847 UART: [art] Populate DV Done
2,995,284 UART: [fht] FMC Alias Private Key: 7
2,996,318 UART: [art] Derive CDI
2,996,598 UART: [art] Store in in slot 0x4
3,082,071 UART: [art] Derive Key Pair
3,082,431 UART: [art] Store priv key in slot 0x5
3,095,731 UART: [art] Derive Key Pair - Done
3,110,248 UART: [art] Signing Cert with AUTHO
3,110,728 UART: RITY.KEYID = 7
3,125,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,607 UART: [art] PUB.X = DB1D1B1ADE26DC0F8E8080263C8DA99E00F697D8505825EFE01044C3D3F248A4604917799FF25F6A6421D33CB2584CB9
3,133,356 UART: [art] PUB.Y = BF19DF49C070FC3F976C7B557C90ED26E4AB947973843378EC21C830D42AEC312D973D4AAADFF8FEA132A6AD655C55BB
3,140,324 UART: [art] SIG.R = BF61E614CB08B825FEB7568E874337514391D62008BE33424002DAAE544E0D6B33F131E1141B9F31B8A3FDDE38CF51A9
3,147,086 UART: [art] SIG.S = B930B2221509315FA5B49E35C01AF5697DB0E5BD127289FB0FDDC5E04F15FE267AFDC8D01D3CAE875D88D4B643F6ED31
3,171,477 UART: Caliptra RT
3,171,823 UART: [state] CFI Enabled
3,279,550 UART: [rt] RT listening for mailbox commands...
3,280,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,455 UART: [rt]cmd =0x44504543, len=96
3,498,903 >>> mbox cmd response data (6236 bytes)
3,498,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,711 UART: [rt]cmd =0x53574545, len=84
3,531,522 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,298 ready_for_fw is high
1,060,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,552 >>> mbox cmd response: success
2,687,420 UART:
2,687,436 UART: Running Caliptra FMC ...
2,687,844 UART:
2,687,987 UART: [state] CFI Enabled
2,698,540 UART: [fht] FMC Alias Private Key: 7
2,806,337 UART: [art] Extend RT PCRs Done
2,806,765 UART: [art] Lock RT PCRs Done
2,808,445 UART: [art] Populate DV Done
2,816,768 UART: [fht] FMC Alias Private Key: 7
2,817,828 UART: [art] Derive CDI
2,818,108 UART: [art] Store in in slot 0x4
2,903,719 UART: [art] Derive Key Pair
2,904,079 UART: [art] Store priv key in slot 0x5
2,917,699 UART: [art] Derive Key Pair - Done
2,932,614 UART: [art] Signing Cert with AUTHO
2,933,094 UART: RITY.KEYID = 7
2,948,290 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,055 UART: [art] PUB.X = 922F08B73DD085365D4BB8E8EEAF0A4DD4A152AD27507FFF13F6D264B46D1AA98150B0F3C774636FA8DD1E48891265A2
2,955,829 UART: [art] PUB.Y = 9F1C3BD63E72B8075BB65A6234C9530ACFCEFF582773952D4FA98A638392BAA11F87BA7E4ED4FFB4901692DAB227CACB
2,962,791 UART: [art] SIG.R = 3D16236E5DD73AB29950FA7A748AFC66181B744A3C6F4F695407952FF68D277EF219CCB4056F9603001E3A0EBA7AC8A0
2,969,533 UART: [art] SIG.S = 13FA5156C97A9F2620E9BBCFFF40B6399B227F88A85B6750F66603E8275B0993BFE20ACF7A6787E102E268157A5D5528
2,993,170 UART: Caliptra RT
2,993,516 UART: [state] CFI Enabled
3,101,544 UART: [rt] RT listening for mailbox commands...
3,102,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,151 UART: [rt]cmd =0x44504543, len=96
3,319,269 >>> mbox cmd response data (6236 bytes)
3,319,270 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,337 UART: [rt]cmd =0x53574545, len=84
3,352,474 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,951 UART: [kat] ++
895,103 UART: [kat] sha1
899,243 UART: [kat] SHA2-256
901,183 UART: [kat] SHA2-384
903,908 UART: [kat] SHA2-512-ACC
905,809 UART: [kat] ECC-384
915,638 UART: [kat] HMAC-384Kdf
920,146 UART: [kat] LMS
1,168,458 UART: [kat] --
1,169,329 UART: [cold-reset] ++
1,169,727 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,173,609 ready_for_fw is high
1,173,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,740 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x46574c44
1,282,224 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,958 >>> mbox cmd response: success
2,775,159 UART: [afmc] ++
2,775,327 UART: [afmc] CDI.KEYID = 6
2,775,690 UART: [afmc] SUBJECT.KEYID = 7
2,776,116 UART: [afmc] AUTHORITY.KEYID = 5
2,811,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,405 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,200 UART: [afmc] --
2,855,258 UART: [cold-reset] --
2,856,298 UART: [state] Locking Datavault
2,857,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,939 UART: [state] Locking ICCM
2,858,493 UART: [exit] Launching FMC @ 0x40000130
2,863,822 UART:
2,863,838 UART: Running Caliptra FMC ...
2,864,246 UART:
2,864,300 UART: [state] CFI Enabled
2,874,657 UART: [fht] FMC Alias Private Key: 7
2,982,994 UART: [art] Extend RT PCRs Done
2,983,422 UART: [art] Lock RT PCRs Done
2,984,828 UART: [art] Populate DV Done
2,992,921 UART: [fht] FMC Alias Private Key: 7
2,994,043 UART: [art] Derive CDI
2,994,323 UART: [art] Store in in slot 0x4
3,079,850 UART: [art] Derive Key Pair
3,080,210 UART: [art] Store priv key in slot 0x5
3,092,954 UART: [art] Derive Key Pair - Done
3,107,778 UART: [art] Signing Cert with AUTHO
3,108,258 UART: RITY.KEYID = 7
3,123,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,009 UART: [art] PUB.X = 43C27EB1E904064E13D176979BED9815B301579B9A78537058EDC6FB61EA1A18798FA857CF438AF61A0BCB6AA05B5B6A
3,130,775 UART: [art] PUB.Y = FB69CE071A56E9AE8C4049A4425AE04D05DB7687802EF677417A97D84B25C790D786A58413459045D5CB7D0FD11397AF
3,137,716 UART: [art] SIG.R = 876B50B5F7E971D3D395F0BA9AF03FAE0A25C7ED87DF4061C05B7F6142FBBC38797218094E0B45F35E0D5AF7F25121BF
3,144,486 UART: [art] SIG.S = 227516DCCF112C6A14D6CD4A5AF329ADF33D515D21FF22230CD06514FA801CE3D5B973C134B0F5F04149EBB3ABEBC6A7
3,169,232 UART: Caliptra RT
3,169,486 UART: [state] CFI Enabled
3,277,022 UART: [rt] RT listening for mailbox commands...
3,277,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,671 UART: [rt]cmd =0x44504543, len=96
3,495,788 >>> mbox cmd response data (6236 bytes)
3,495,789 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,760 UART: [rt]cmd =0x53574545, len=84
3,529,229 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 ready_for_fw is high
1,055,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,213 >>> mbox cmd response: success
2,684,207 UART:
2,684,223 UART: Running Caliptra FMC ...
2,684,631 UART:
2,684,685 UART: [state] CFI Enabled
2,695,150 UART: [fht] FMC Alias Private Key: 7
2,802,899 UART: [art] Extend RT PCRs Done
2,803,327 UART: [art] Lock RT PCRs Done
2,804,767 UART: [art] Populate DV Done
2,812,828 UART: [fht] FMC Alias Private Key: 7
2,813,848 UART: [art] Derive CDI
2,814,128 UART: [art] Store in in slot 0x4
2,899,711 UART: [art] Derive Key Pair
2,900,071 UART: [art] Store priv key in slot 0x5
2,913,399 UART: [art] Derive Key Pair - Done
2,928,175 UART: [art] Signing Cert with AUTHO
2,928,655 UART: RITY.KEYID = 7
2,943,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,724 UART: [art] PUB.X = 6A58901EF46F47918A38C7D44E8CFE7ECD0313D35D271DD59C80D776DE9514964681FF652C3FEFCD481260780C8C6C6B
2,951,494 UART: [art] PUB.Y = 526AA2D7957B8C7855D5D4619D822A6B7AC45C645A5ABC1B7A6292E4760176283D81932BD5C244A83AF4779F60DCA909
2,958,438 UART: [art] SIG.R = AB8FB6D079C4FE4388E704ADD1E80C71C99A7264798E16B3954BF569A2569AF4AF242DAF358DB7E31324392D2A568DB4
2,965,210 UART: [art] SIG.S = FA13DBB7562C481E1395DDE3A77F17DFA6D8DEA505B8C56FF799393CBE5B3DAF4625F919DD7F4FE13A4DB92D5DAD636A
2,988,876 UART: Caliptra RT
2,989,130 UART: [state] CFI Enabled
3,097,129 UART: [rt] RT listening for mailbox commands...
3,097,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,830 UART: [rt]cmd =0x44504543, len=96
3,315,787 >>> mbox cmd response data (6236 bytes)
3,315,788 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,659 UART: [rt]cmd =0x53574545, len=84
3,348,896 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,355 UART: [kat] LMS
1,169,667 UART: [kat] --
1,170,590 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,175,018 ready_for_fw is high
1,175,018 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,545 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,267 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,741 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,295 >>> mbox cmd response: success
2,774,468 UART: [afmc] ++
2,774,636 UART: [afmc] CDI.KEYID = 6
2,774,999 UART: [afmc] SUBJECT.KEYID = 7
2,775,425 UART: [afmc] AUTHORITY.KEYID = 5
2,810,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,511 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,230 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,189 UART: [afmc] --
2,854,185 UART: [cold-reset] --
2,854,987 UART: [state] Locking Datavault
2,856,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,682 UART: [state] Locking ICCM
2,857,196 UART: [exit] Launching FMC @ 0x40000130
2,862,525 UART:
2,862,541 UART: Running Caliptra FMC ...
2,862,949 UART:
2,863,092 UART: [state] CFI Enabled
2,873,621 UART: [fht] FMC Alias Private Key: 7
2,981,082 UART: [art] Extend RT PCRs Done
2,981,510 UART: [art] Lock RT PCRs Done
2,982,946 UART: [art] Populate DV Done
2,990,849 UART: [fht] FMC Alias Private Key: 7
2,991,817 UART: [art] Derive CDI
2,992,097 UART: [art] Store in in slot 0x4
3,078,016 UART: [art] Derive Key Pair
3,078,376 UART: [art] Store priv key in slot 0x5
3,091,794 UART: [art] Derive Key Pair - Done
3,106,798 UART: [art] Signing Cert with AUTHO
3,107,278 UART: RITY.KEYID = 7
3,122,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,487 UART: [art] PUB.X = 3ACFB22EC5A9F6E6CC235389BBF61C3A8BFAAC231182E817173B797D3DC63EB03095FCA51EF9CA16A6B2BF0071F56C22
3,130,255 UART: [art] PUB.Y = 9419B035377DF59CF1C01D90C96BD08C24886440598EC74A0F4580DF6CC316D5FDE30FC3C26862A380D86F2643724C59
3,137,197 UART: [art] SIG.R = 458CE424709218D5AD2D84F5CCE2801E5253743859E6504EC93FB4D972E8B347FA31F04DBC3FEB990C838E9830ADE4CC
3,143,972 UART: [art] SIG.S = E64A33CA69DAA2082F8F03BCE50839E83B65988172B640AD92D8E5A3E6B270AF4D47EFC9C07D61ABD3FF81204A50561B
3,167,892 UART: Caliptra RT
3,168,238 UART: [state] CFI Enabled
3,276,626 UART: [rt] RT listening for mailbox commands...
3,277,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,565 UART: [rt]cmd =0x44504543, len=96
3,496,242 >>> mbox cmd response data (6236 bytes)
3,496,243 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,870 UART: [rt]cmd =0x53574545, len=84
3,528,843 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,585 ready_for_fw is high
1,056,585 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,571 >>> mbox cmd response: success
2,684,285 UART:
2,684,301 UART: Running Caliptra FMC ...
2,684,709 UART:
2,684,852 UART: [state] CFI Enabled
2,695,671 UART: [fht] FMC Alias Private Key: 7
2,803,942 UART: [art] Extend RT PCRs Done
2,804,370 UART: [art] Lock RT PCRs Done
2,806,092 UART: [art] Populate DV Done
2,814,319 UART: [fht] FMC Alias Private Key: 7
2,815,369 UART: [art] Derive CDI
2,815,649 UART: [art] Store in in slot 0x4
2,901,394 UART: [art] Derive Key Pair
2,901,754 UART: [art] Store priv key in slot 0x5
2,915,748 UART: [art] Derive Key Pair - Done
2,930,736 UART: [art] Signing Cert with AUTHO
2,931,216 UART: RITY.KEYID = 7
2,946,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,549 UART: [art] PUB.X = E0699EF3A29827CACEC9B71665346CA1322D222DC07CF87DF73BC8278864EE8A10D8897DBA8766567BEA30300AF19DAD
2,954,326 UART: [art] PUB.Y = 7C94DA78E887EBB6D940E26AEF33FFBE9EF59EAF10A462E33CD1557DC59A1FE686EB2EE54795E7ABF000B9D9F26B8660
2,961,276 UART: [art] SIG.R = 0E57DB878E90B07127A6275805E90DF41ABF49ADAB7FA288BEEBD4F26363C23510FA6B34003A0A24CE12B8A1B5CF1427
2,968,024 UART: [art] SIG.S = EBE73DB4516D9824C05FD4D44A392CC5166ADBCF0AB1701FA30A5CCC12191186F8BBA49F6EFD941C3B6B10EC6D2EA567
2,991,733 UART: Caliptra RT
2,992,079 UART: [state] CFI Enabled
3,099,627 UART: [rt] RT listening for mailbox commands...
3,100,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,598 UART: [rt]cmd =0x44504543, len=96
3,318,583 >>> mbox cmd response data (6236 bytes)
3,318,584 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,449 UART: [rt]cmd =0x53574545, len=84
3,351,828 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,363 UART:
192,739 UART: Running Caliptra ROM ...
193,920 UART:
194,073 UART: [state] CFI Enabled
263,336 UART: [state] LifecycleState = Unprovisioned
265,318 UART: [state] DebugLocked = No
266,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,505 UART: [kat] SHA2-256
442,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,699 UART: [kat] ++
453,177 UART: [kat] sha1
464,468 UART: [kat] SHA2-256
467,185 UART: [kat] SHA2-384
472,668 UART: [kat] SHA2-512-ACC
475,038 UART: [kat] ECC-384
2,768,016 UART: [kat] HMAC-384Kdf
2,800,649 UART: [kat] LMS
3,990,919 UART: [kat] --
3,993,987 UART: [cold-reset] ++
3,995,496 UART: [fht] Storing FHT @ 0x50003400
4,008,047 UART: [idev] ++
4,008,648 UART: [idev] CDI.KEYID = 6
4,009,530 UART: [idev] SUBJECT.KEYID = 7
4,010,862 UART: [idev] UDS.KEYID = 0
4,011,866 ready_for_fw is high
4,012,077 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,630 UART: [idev] Erasing UDS.KEYID = 0
7,347,001 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,542 UART: [idev] --
7,371,751 UART: [ldev] ++
7,372,332 UART: [ldev] CDI.KEYID = 6
7,373,302 UART: [ldev] SUBJECT.KEYID = 5
7,374,511 UART: [ldev] AUTHORITY.KEYID = 7
7,375,735 UART: [ldev] FE.KEYID = 1
7,423,125 UART: [ldev] Erasing FE.KEYID = 1
10,756,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,793 UART: [ldev] --
13,134,927 UART: [fwproc] Waiting for Commands...
13,136,797 UART: [fwproc] Received command 0x46574c44
13,139,025 UART: [fwproc] Received Image of size 114036 bytes
17,191,417 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,930 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,843 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,659,102 >>> mbox cmd response: success
17,662,704 UART: [afmc] ++
17,663,356 UART: [afmc] CDI.KEYID = 6
17,664,261 UART: [afmc] SUBJECT.KEYID = 7
17,665,472 UART: [afmc] AUTHORITY.KEYID = 5
21,026,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,677 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,939 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,359 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,184 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,657 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,240 UART: [afmc] --
23,399,101 UART: [cold-reset] --
23,403,442 UART: [state] Locking Datavault
23,408,740 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,486 UART: [state] Locking ICCM
23,412,675 UART: [exit] Launching FMC @ 0x40000130
23,421,073 UART:
23,421,306 UART: Running Caliptra FMC ...
23,422,397 UART:
23,422,545 UART: [state] CFI Enabled
23,488,748 UART: [fht] FMC Alias Private Key: 7
25,827,307 UART: [art] Extend RT PCRs Done
25,828,528 UART: [art] Lock RT PCRs Done
25,830,333 UART: [art] Populate DV Done
25,835,573 UART: [fht] FMC Alias Private Key: 7
25,837,264 UART: [art] Derive CDI
25,838,074 UART: [art] Store in in slot 0x4
25,897,219 UART: [art] Derive Key Pair
25,898,255 UART: [art] Store priv key in slot 0x5
29,191,391 UART: [art] Derive Key Pair - Done
29,204,338 UART: [art] Signing Cert with AUTHO
29,205,675 UART: RITY.KEYID = 7
31,493,331 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,836 UART: [art] PUB.X = 4B6053B6AD17F400D1F7EB4A81A821660C12D3B461120DD5D58D2BDF02B02A30D80024167C1EEB958EC7BB4F70AA4282
31,502,069 UART: [art] PUB.Y = E091B35D82977D2CA729EE6072ECB7B4A5DCDC2857A59ECDE5E86FD00DDB6053CE6C5DD229751D46094742462AACF60A
31,509,389 UART: [art] SIG.R = 6164D078125EC06A87B14785289898DA48C17E152C7CB3B27F6C91A4928EE9ED0E04A57C7C4A4DB0AC1DA11B64F35099
31,516,747 UART: [art] SIG.S = E58C61735D34FC6E50F9121ECA59056561208A70CD5018F9100B1E23BC634DD74ADD40BFE2122669FF13D9B1CEF1F7AB
32,821,714 UART: Caliptra RT
32,822,476 UART: [state] CFI Enabled
32,984,124 UART: [rt] RT listening for mailbox commands...
32,986,020 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,016,203 UART: [rt]cmd =0x53574545, len=84
33,020,262 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,787,121 ready_for_fw is high
3,787,531 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,708 >>> mbox cmd response: success
23,579,027 UART:
23,579,980 UART: Running Caliptra FMC ...
23,581,097 UART:
23,581,246 UART: [state] CFI Enabled
23,647,425 UART: [fht] FMC Alias Private Key: 7
25,985,319 UART: [art] Extend RT PCRs Done
25,986,539 UART: [art] Lock RT PCRs Done
25,988,432 UART: [art] Populate DV Done
25,993,794 UART: [fht] FMC Alias Private Key: 7
25,995,333 UART: [art] Derive CDI
25,996,090 UART: [art] Store in in slot 0x4
26,055,678 UART: [art] Derive Key Pair
26,056,715 UART: [art] Store priv key in slot 0x5
29,349,693 UART: [art] Derive Key Pair - Done
29,362,744 UART: [art] Signing Cert with AUTHO
29,364,042 UART: RITY.KEYID = 7
31,651,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,680 UART: [art] PUB.X = 5F73EFC7C603B184B503EA1AA04E25EB875E667784C5BD75AB08CF99F1D34A0D6D75D9EEA687B9B5F00616AE963F4954
31,660,469 UART: [art] PUB.Y = 033C6E17B6CDB3E6742798F4E0B129BA99F5988763B159DDFF3CE8CA16221A8AB94D2ED7F99B9C7B42096014907827D3
31,667,704 UART: [art] SIG.R = 5E70B4361F8B2A5523DB1A52D283FF55CCB5D274461FED4744C8C0E7E93C271D569F5CBF91404B15D6570175CE8967CD
31,675,073 UART: [art] SIG.S = 007DEE366D281363A5903FAF3BA91A743AA64146739DC5B39FE66A971B15E2EC50754920D8A9A59543EC20898B3E1BCA
32,980,313 UART: Caliptra RT
32,981,035 UART: [state] CFI Enabled
33,143,234 UART: [rt] RT listening for mailbox commands...
33,145,132 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,175,684 UART: [rt]cmd =0x53574545, len=84
33,179,097 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,573 UART:
192,921 UART: Running Caliptra ROM ...
194,100 UART:
603,842 UART: [state] CFI Enabled
621,897 UART: [state] LifecycleState = Unprovisioned
623,887 UART: [state] DebugLocked = No
625,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,879 UART: [kat] SHA2-256
800,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,154 UART: [kat] ++
811,753 UART: [kat] sha1
823,130 UART: [kat] SHA2-256
825,773 UART: [kat] SHA2-384
830,836 UART: [kat] SHA2-512-ACC
833,199 UART: [kat] ECC-384
3,118,638 UART: [kat] HMAC-384Kdf
3,131,733 UART: [kat] LMS
4,321,827 UART: [kat] --
4,325,841 UART: [cold-reset] ++
4,327,063 UART: [fht] Storing FHT @ 0x50003400
4,339,104 UART: [idev] ++
4,339,765 UART: [idev] CDI.KEYID = 6
4,340,675 UART: [idev] SUBJECT.KEYID = 7
4,341,920 UART: [idev] UDS.KEYID = 0
4,342,906 ready_for_fw is high
4,343,126 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,447 UART: [idev] Erasing UDS.KEYID = 0
7,630,025 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,563 UART: [idev] --
7,655,507 UART: [ldev] ++
7,656,125 UART: [ldev] CDI.KEYID = 6
7,657,083 UART: [ldev] SUBJECT.KEYID = 5
7,658,295 UART: [ldev] AUTHORITY.KEYID = 7
7,659,529 UART: [ldev] FE.KEYID = 1
7,671,900 UART: [ldev] Erasing FE.KEYID = 1
10,959,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,317 UART: [ldev] --
13,319,472 UART: [fwproc] Waiting for Commands...
13,322,643 UART: [fwproc] Received command 0x46574c44
13,324,877 UART: [fwproc] Received Image of size 114036 bytes
17,375,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,074 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,837,633 >>> mbox cmd response: success
17,841,685 UART: [afmc] ++
17,842,311 UART: [afmc] CDI.KEYID = 6
17,843,221 UART: [afmc] SUBJECT.KEYID = 7
17,844,441 UART: [afmc] AUTHORITY.KEYID = 5
21,159,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,232 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,638 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,503 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,923 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,049 UART: [afmc] --
23,522,791 UART: [cold-reset] --
23,526,499 UART: [state] Locking Datavault
23,531,524 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,270 UART: [state] Locking ICCM
23,534,746 UART: [exit] Launching FMC @ 0x40000130
23,543,134 UART:
23,543,365 UART: Running Caliptra FMC ...
23,544,386 UART:
23,544,530 UART: [state] CFI Enabled
23,552,737 UART: [fht] FMC Alias Private Key: 7
25,883,733 UART: [art] Extend RT PCRs Done
25,884,953 UART: [art] Lock RT PCRs Done
25,886,707 UART: [art] Populate DV Done
25,892,179 UART: [fht] FMC Alias Private Key: 7
25,893,664 UART: [art] Derive CDI
25,894,426 UART: [art] Store in in slot 0x4
25,937,017 UART: [art] Derive Key Pair
25,938,062 UART: [art] Store priv key in slot 0x5
29,179,851 UART: [art] Derive Key Pair - Done
29,192,801 UART: [art] Signing Cert with AUTHO
29,194,105 UART: RITY.KEYID = 7
31,473,390 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,900 UART: [art] PUB.X = 2346242C3AFE7679BF2218ABF5E6FE603128EB7E4B67C9F8E6DCB90D4A5C861A8886FC9341D79CBC2916B55C18F9B259
31,482,104 UART: [art] PUB.Y = D62222664F07A9C70D1762B040CA318971FFC09FEC98870C92F5397D0289BBF8E5E7F80A9E1E0633747B16C9CE03ADF0
31,489,395 UART: [art] SIG.R = 1810AB80ED486CDCF93B217EE9DD15A346578E96E3504D612FAE0BD042D332C2AE851DC8D165BC60232AE9FCEB093126
31,496,761 UART: [art] SIG.S = 04350483198212BD0AED260037EF03E09C381B15BE43F61C8B657EF24C05E2E8FB166E7014980F4A49E401714E6BE78E
32,802,091 UART: Caliptra RT
32,802,801 UART: [state] CFI Enabled
32,919,981 UART: [rt] RT listening for mailbox commands...
32,921,864 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,952,174 UART: [rt]cmd =0x53574545, len=84
32,956,195 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
4,124,319 ready_for_fw is high
4,124,935 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,059,712 >>> mbox cmd response: success
23,704,687 UART:
23,705,079 UART: Running Caliptra FMC ...
23,706,187 UART:
23,706,341 UART: [state] CFI Enabled
23,714,131 UART: [fht] FMC Alias Private Key: 7
26,045,328 UART: [art] Extend RT PCRs Done
26,047,056 UART: [art] Lock RT PCRs Done
26,048,081 UART: [art] Populate DV Done
26,052,950 UART: [fht] FMC Alias Private Key: 7
26,054,465 UART: [art] Derive CDI
26,055,210 UART: [art] Store in in slot 0x4
26,098,198 UART: [art] Derive Key Pair
26,099,248 UART: [art] Store priv key in slot 0x5
29,340,980 UART: [art] Derive Key Pair - Done
29,354,184 UART: [art] Signing Cert with AUTHO
29,355,603 UART: RITY.KEYID = 7
31,635,040 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,929 UART: [art] PUB.X = BD3FA0986432197061BCA70A222954ADFCD899BDFCE28F4B77F359D68604B0DBE4AEA5768A1BF658FD78F3D94C668DC3
31,643,932 UART: [art] PUB.Y = 5C4057FBC3075F1F676C3AFC8956B59BE3A976F16895BB9680BF451F196B26A2F0FD2E1D48B57C47031A3A04FF8F3563
31,651,079 UART: [art] SIG.R = 299B797E186AC73FA14C12805817EE38D7248C9F30785488337595960FDD3822BE09359791C31BC2D622C7A4CD42D5BB
31,658,408 UART: [art] SIG.S = 245AB221D0449964FCDE2D6358470C0F586D9CBDF60AD98ADD91DA956DF10C0166893AB3D9F169E8A260D1428CC5434B
32,964,077 UART: Caliptra RT
32,964,795 UART: [state] CFI Enabled
33,082,537 UART: [rt] RT listening for mailbox commands...
33,084,438 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,115,105 UART: [rt]cmd =0x53574545, len=84
33,118,876 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,468 UART:
192,854 UART: Running Caliptra ROM ...
193,956 UART:
194,096 UART: [state] CFI Enabled
266,964 UART: [state] LifecycleState = Unprovisioned
268,925 UART: [state] DebugLocked = No
271,731 UART: [state] WD Timer not started. Device not locked for debugging
274,995 UART: [kat] SHA2-256
454,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,698 UART: [kat] ++
466,230 UART: [kat] sha1
477,540 UART: [kat] SHA2-256
480,556 UART: [kat] SHA2-384
486,337 UART: [kat] SHA2-512-ACC
489,324 UART: [kat] ECC-384
2,939,722 UART: [kat] HMAC-384Kdf
2,963,273 UART: [kat] LMS
3,492,712 UART: [kat] --
3,497,423 UART: [cold-reset] ++
3,499,294 UART: [fht] FHT @ 0x50003400
3,510,349 UART: [idev] ++
3,510,918 UART: [idev] CDI.KEYID = 6
3,511,950 UART: [idev] SUBJECT.KEYID = 7
3,513,058 UART: [idev] UDS.KEYID = 0
3,514,042 ready_for_fw is high
3,514,261 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,658,159 UART: [idev] Erasing UDS.KEYID = 0
6,018,010 UART: [idev] Sha1 KeyId Algorithm
6,039,737 UART: [idev] --
6,044,494 UART: [ldev] ++
6,045,095 UART: [ldev] CDI.KEYID = 6
6,045,987 UART: [ldev] SUBJECT.KEYID = 5
6,047,157 UART: [ldev] AUTHORITY.KEYID = 7
6,048,401 UART: [ldev] FE.KEYID = 1
6,090,274 UART: [ldev] Erasing FE.KEYID = 1
8,596,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,286 UART: [ldev] --
10,403,950 UART: [fwproc] Wait for Commands...
10,406,419 UART: [fwproc] Recv command 0x46574c44
10,408,552 UART: [fwproc] Recv'd Img size: 114360 bytes
13,812,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,277,161 >>> mbox cmd response: success
14,282,033 UART: [afmc] ++
14,282,637 UART: [afmc] CDI.KEYID = 6
14,283,530 UART: [afmc] SUBJECT.KEYID = 7
14,284,633 UART: [afmc] AUTHORITY.KEYID = 5
16,820,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,482 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,562,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,578,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,594,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,615,810 UART: [afmc] --
18,619,022 UART: [cold-reset] --
18,622,445 UART: [state] Locking Datavault
18,626,177 UART: [state] Locking PCR0, PCR1 and PCR31
18,627,894 UART: [state] Locking ICCM
18,629,101 UART: [exit] Launching FMC @ 0x40000130
18,637,552 UART:
18,637,787 UART: Running Caliptra FMC ...
18,638,888 UART:
18,639,047 UART: [state] CFI Enabled
18,703,583 UART: [fht] FMC Alias Private Key: 7
20,466,973 UART: [art] Extend RT PCRs Done
20,468,192 UART: [art] Lock RT PCRs Done
20,470,056 UART: [art] Populate DV Done
20,475,416 UART: [fht] FMC Alias Private Key: 7
20,476,954 UART: [art] Derive CDI
20,477,773 UART: [art] Store in in slot 0x4
20,535,950 UART: [art] Derive Key Pair
20,536,981 UART: [art] Store priv key in slot 0x5
23,000,351 UART: [art] Derive Key Pair - Done
23,012,990 UART: [art] Signing Cert with AUTHO
23,014,292 UART: RITY.KEYID = 7
24,726,119 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,623 UART: [art] PUB.X = 37006CCBF68224DC2004D43AA64AB795920D143F2AECF892584368D9A6C8E9A19D1BCBEB56168A02537C835CD1B41275
24,734,850 UART: [art] PUB.Y = D40441C1D62C358C356C7C4FFF620385E96567D27EC036B5719835737E630917CF304C74ED6BC0465B30B616B520AB2A
24,742,064 UART: [art] SIG.R = 21FF8CD3DCFC2B41E738617DF4D62C5CDE298BA4F631F4FB5A9658C89F76E432CBE47B6E13BC62FE7DB8677032C29820
24,749,490 UART: [art] SIG.S = 07A7DAD8A69E613094A6909844D01CAE43E3940459E4CD7EBCE3F09BDF5D8A7D3DACA9EE5FE7D93B63DBD0F1E417B5E1
25,728,395 UART: Caliptra RT
25,729,104 UART: [state] CFI Enabled
25,895,339 UART: [rt] RT listening for mailbox commands...
25,897,226 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,927,894 UART: [rt]cmd =0x53574545, len=84
25,931,685 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,354 UART:
192,728 UART: Running Caliptra ROM ...
193,919 UART:
194,078 UART: [state] CFI Enabled
262,636 UART: [state] LifecycleState = Unprovisioned
265,060 UART: [state] DebugLocked = No
267,126 UART: [state] WD Timer not started. Device not locked for debugging
272,602 UART: [kat] SHA2-256
462,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,254 UART: [kat] ++
473,732 UART: [kat] sha1
485,598 UART: [kat] SHA2-256
488,613 UART: [kat] SHA2-384
495,173 UART: [kat] SHA2-512-ACC
497,753 UART: [kat] ECC-384
2,949,881 UART: [kat] HMAC-384Kdf
2,970,079 UART: [kat] LMS
3,501,840 UART: [kat] --
3,506,764 UART: [cold-reset] ++
3,508,266 UART: [fht] FHT @ 0x50003400
3,519,525 UART: [idev] ++
3,520,170 UART: [idev] CDI.KEYID = 6
3,521,205 UART: [idev] SUBJECT.KEYID = 7
3,522,332 UART: [idev] UDS.KEYID = 0
3,523,312 ready_for_fw is high
3,523,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,336 UART: [idev] Erasing UDS.KEYID = 0
6,029,022 UART: [idev] Sha1 KeyId Algorithm
6,053,119 UART: [idev] --
6,057,116 UART: [ldev] ++
6,057,796 UART: [ldev] CDI.KEYID = 6
6,058,679 UART: [ldev] SUBJECT.KEYID = 5
6,059,892 UART: [ldev] AUTHORITY.KEYID = 7
6,061,124 UART: [ldev] FE.KEYID = 1
6,098,908 UART: [ldev] Erasing FE.KEYID = 1
8,614,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,382,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,322 UART: [ldev] --
10,424,339 UART: [fwproc] Wait for Commands...
10,426,224 UART: [fwproc] Recv command 0x46574c44
10,428,533 UART: [fwproc] Recv'd Img size: 114360 bytes
13,871,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,611,086 >>> mbox cmd response: success
14,615,972 UART: [afmc] ++
14,616,683 UART: [afmc] CDI.KEYID = 6
14,617,793 UART: [afmc] SUBJECT.KEYID = 7
14,619,340 UART: [afmc] AUTHORITY.KEYID = 5
17,157,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,885,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,887,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,902,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,917,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,932,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,956,424 UART: [afmc] --
18,959,436 UART: [cold-reset] --
18,963,737 UART: [state] Locking Datavault
18,969,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,971,204 UART: [state] Locking ICCM
18,972,654 UART: [exit] Launching FMC @ 0x40000130
18,981,355 UART:
18,981,649 UART: Running Caliptra FMC ...
18,982,764 UART:
18,982,923 UART: [state] CFI Enabled
19,042,035 UART: [fht] FMC Alias Private Key: 7
20,805,328 UART: [art] Extend RT PCRs Done
20,806,547 UART: [art] Lock RT PCRs Done
20,808,028 UART: [art] Populate DV Done
20,813,333 UART: [fht] FMC Alias Private Key: 7
20,814,816 UART: [art] Derive CDI
20,815,595 UART: [art] Store in in slot 0x4
20,875,290 UART: [art] Derive Key Pair
20,876,329 UART: [art] Store priv key in slot 0x5
23,340,013 UART: [art] Derive Key Pair - Done
23,353,068 UART: [art] Signing Cert with AUTHO
23,354,378 UART: RITY.KEYID = 7
25,065,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,066,946 UART: [art] PUB.X = DF7F83034279FA887507D0FF18F2C4D989A9D785844603B656068F938106ECD93D45CEC76AAEFAF2CFDD26B0FD51D035
25,074,227 UART: [art] PUB.Y = 19A356BD3A361D3BF2AC2559AF1FB52902F5138F3C55C53C05B0B864BEF648DE31C4C2176C2C2BE9DDBEF7E46FA6500A
25,081,486 UART: [art] SIG.R = 3E3CC4A7594390284D87BED3D3EF49430B980901B581CD8ADF5988DD12AFABF886CCA88454F72E905B879B5AABCA02CB
25,088,893 UART: [art] SIG.S = BF78F2135DC5DDE6DBE881AB9EBCFA3D2B76614B2EF6F47A1AB1D8DD6DFC04ABE80AC88536A03AF790B2275761D66B05
26,068,454 UART: Caliptra RT
26,069,163 UART: [state] CFI Enabled
26,232,288 UART: [rt] RT listening for mailbox commands...
26,234,176 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,264,695 UART: [rt]cmd =0x53574545, len=84
26,268,747 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
3,414,339 ready_for_fw is high
3,414,750 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,705,497 >>> mbox cmd response: success
19,003,138 UART:
19,003,539 UART: Running Caliptra FMC ...
19,004,671 UART:
19,004,862 UART: [state] CFI Enabled
19,072,502 UART: [fht] FMC Alias Private Key: 7
20,836,466 UART: [art] Extend RT PCRs Done
20,837,734 UART: [art] Lock RT PCRs Done
20,839,328 UART: [art] Populate DV Done
20,844,992 UART: [fht] FMC Alias Private Key: 7
20,846,600 UART: [art] Derive CDI
20,847,418 UART: [art] Store in in slot 0x4
20,904,519 UART: [art] Derive Key Pair
20,905,557 UART: [art] Store priv key in slot 0x5
23,368,480 UART: [art] Derive Key Pair - Done
23,381,431 UART: [art] Signing Cert with AUTHO
23,382,734 UART: RITY.KEYID = 7
25,094,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,376 UART: [art] PUB.X = 97CE9BC93B0857A416C9A410A68D9030EECA94932E900EFEACF53BD7AA1535DC0475C35EECCEF8C9E5B83ACDB26E629F
25,103,713 UART: [art] PUB.Y = 73FF1CA925D8C90AD81882B65969BBF432AB4E27D4D0FE2E6339777EA94F3B894EB9DC3CA297523AFB075192801CAD74
25,110,967 UART: [art] SIG.R = 3635BCCA4E77F022AAED8D77E3226D3D7F760D4EA4787A7886874FD2498B8B94885ED9E9F1E7EE405E90222B98E5F2DC
25,118,337 UART: [art] SIG.S = 456670F55972775B098B70D32189E1F121ADC70D58624960099D329BFAE94A06E21DE23104713F72D5946AE139FC671D
26,096,681 UART: Caliptra RT
26,097,398 UART: [state] CFI Enabled
26,263,492 UART: [rt] RT listening for mailbox commands...
26,265,385 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,295,858 UART: [rt]cmd =0x53574545, len=84
26,299,586 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,457 UART:
192,829 UART: Running Caliptra ROM ...
193,955 UART:
603,749 UART: [state] CFI Enabled
615,593 UART: [state] LifecycleState = Unprovisioned
617,921 UART: [state] DebugLocked = No
619,244 UART: [state] WD Timer not started. Device not locked for debugging
623,490 UART: [kat] SHA2-256
813,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,181 UART: [kat] ++
824,726 UART: [kat] sha1
836,098 UART: [kat] SHA2-256
839,111 UART: [kat] SHA2-384
845,548 UART: [kat] SHA2-512-ACC
848,108 UART: [kat] ECC-384
3,291,772 UART: [kat] HMAC-384Kdf
3,304,359 UART: [kat] LMS
3,836,200 UART: [kat] --
3,841,044 UART: [cold-reset] ++
3,843,543 UART: [fht] FHT @ 0x50003400
3,856,084 UART: [idev] ++
3,856,791 UART: [idev] CDI.KEYID = 6
3,857,774 UART: [idev] SUBJECT.KEYID = 7
3,858,944 UART: [idev] UDS.KEYID = 0
3,859,866 ready_for_fw is high
3,860,049 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,676 UART: [idev] Erasing UDS.KEYID = 0
6,338,814 UART: [idev] Sha1 KeyId Algorithm
6,359,610 UART: [idev] --
6,364,344 UART: [ldev] ++
6,365,015 UART: [ldev] CDI.KEYID = 6
6,366,101 UART: [ldev] SUBJECT.KEYID = 5
6,367,219 UART: [ldev] AUTHORITY.KEYID = 7
6,368,363 UART: [ldev] FE.KEYID = 1
6,380,519 UART: [ldev] Erasing FE.KEYID = 1
8,859,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,701 UART: [ldev] --
10,650,417 UART: [fwproc] Wait for Commands...
10,652,830 UART: [fwproc] Recv command 0x46574c44
10,655,079 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,838,810 >>> mbox cmd response: success
14,842,689 UART: [afmc] ++
14,843,417 UART: [afmc] CDI.KEYID = 6
14,844,603 UART: [afmc] SUBJECT.KEYID = 7
14,846,130 UART: [afmc] AUTHORITY.KEYID = 5
17,348,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,073 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,370 UART: [afmc] --
19,144,677 UART: [cold-reset] --
19,148,809 UART: [state] Locking Datavault
19,154,751 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,939 UART: [state] Locking ICCM
19,158,385 UART: [exit] Launching FMC @ 0x40000130
19,167,035 UART:
19,167,330 UART: Running Caliptra FMC ...
19,168,442 UART:
19,168,600 UART: [state] CFI Enabled
19,176,912 UART: [fht] FMC Alias Private Key: 7
20,934,372 UART: [art] Extend RT PCRs Done
20,935,597 UART: [art] Lock RT PCRs Done
20,937,464 UART: [art] Populate DV Done
20,942,549 UART: [fht] FMC Alias Private Key: 7
20,944,244 UART: [art] Derive CDI
20,944,975 UART: [art] Store in in slot 0x4
20,988,215 UART: [art] Derive Key Pair
20,989,213 UART: [art] Store priv key in slot 0x5
23,415,700 UART: [art] Derive Key Pair - Done
23,429,176 UART: [art] Signing Cert with AUTHO
23,430,471 UART: RITY.KEYID = 7
25,136,052 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,579 UART: [art] PUB.X = E837C68EC26BF2A5801965CD26AD0D329929EDF030C90E60A592B234234EA63C31E84DB781303A011BD4978DF16D8041
25,144,836 UART: [art] PUB.Y = 3C6EF182122E509D5B27CA62EF2EC4FDAEEAB895C1231D75327E0B976E8A86C00A3E9D2C238E070CA2186E53A0B2A2E4
25,152,068 UART: [art] SIG.R = 74C426E937EE1747ECD0D35723BA7C27AE4960B34A27D7D08B45E373808549F16579571E513D3F9D3B91AA80E49ED98F
25,159,458 UART: [art] SIG.S = 676D8E8A36CBB2A3C3EB0E76F7C6B1342148F63CB8A957C988E3E2B42115086A5BD6C66D51C2E7C003615D5AB23BA19F
26,138,706 UART: Caliptra RT
26,139,417 UART: [state] CFI Enabled
26,256,208 UART: [rt] RT listening for mailbox commands...
26,258,084 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,288,546 UART: [rt]cmd =0x53574545, len=84
26,291,845 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,757,267 ready_for_fw is high
3,757,670 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,889 >>> mbox cmd response: success
19,212,495 UART:
19,212,901 UART: Running Caliptra FMC ...
19,214,015 UART:
19,214,191 UART: [state] CFI Enabled
19,222,037 UART: [fht] FMC Alias Private Key: 7
20,979,034 UART: [art] Extend RT PCRs Done
20,980,257 UART: [art] Lock RT PCRs Done
20,982,124 UART: [art] Populate DV Done
20,987,535 UART: [fht] FMC Alias Private Key: 7
20,989,019 UART: [art] Derive CDI
20,989,754 UART: [art] Store in in slot 0x4
21,032,513 UART: [art] Derive Key Pair
21,033,513 UART: [art] Store priv key in slot 0x5
23,459,851 UART: [art] Derive Key Pair - Done
23,472,685 UART: [art] Signing Cert with AUTHO
23,473,993 UART: RITY.KEYID = 7
25,179,127 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,636 UART: [art] PUB.X = 02D1039F37DD4FE21698C41C7DB3DBB68D4FE7E371313BE9C3CDA6E361229DFCCF2F1374F965C7933D68CD051AF473ED
25,187,898 UART: [art] PUB.Y = 18CB52970FB13A02E19F183737BBEED56C2583BE12FC61D7E96A1059BFA5CFF91EDC93F1995D7FBA8C698433D9243D64
25,195,374 UART: [art] SIG.R = 3369726EE6CE8264767B7326EACF7F356ED7CE07C52244A27613122B63BFD4E7BACD58D5BFC8BA9CE446CAD9FA602932
25,202,580 UART: [art] SIG.S = 0FE368C98FEB544CF68E8D9E2CEC41741E52D19AB3978FAAE880511B5F8AF0B5582CD2C3C716ED0DEE4B21EBC34F59CE
26,181,378 UART: Caliptra RT
26,182,071 UART: [state] CFI Enabled
26,299,621 UART: [rt] RT listening for mailbox commands...
26,301,508 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,331,891 UART: [rt]cmd =0x53574545, len=84
26,335,328 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,123 UART: [kat] SHA2-256
882,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,169 UART: [kat] ++
886,321 UART: [kat] sha1
890,737 UART: [kat] SHA2-256
892,675 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
903,066 UART: [kat] HMAC-384Kdf
907,682 UART: [kat] LMS
1,475,878 UART: [kat] --
1,476,731 UART: [cold-reset] ++
1,477,249 UART: [fht] Storing FHT @ 0x50003400
1,479,950 UART: [idev] ++
1,480,118 UART: [idev] CDI.KEYID = 6
1,480,478 UART: [idev] SUBJECT.KEYID = 7
1,480,902 UART: [idev] UDS.KEYID = 0
1,481,247 ready_for_fw is high
1,481,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,992 UART: [idev] Erasing UDS.KEYID = 0
1,505,500 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,136 UART: [idev] --
1,515,215 UART: [ldev] ++
1,515,383 UART: [ldev] CDI.KEYID = 6
1,515,746 UART: [ldev] SUBJECT.KEYID = 5
1,516,172 UART: [ldev] AUTHORITY.KEYID = 7
1,516,635 UART: [ldev] FE.KEYID = 1
1,521,711 UART: [ldev] Erasing FE.KEYID = 1
1,546,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,634 UART: [ldev] --
1,585,919 UART: [fwproc] Waiting for Commands...
1,586,732 UART: [fwproc] Received command 0x46574c44
1,587,523 UART: [fwproc] Received Image of size 114360 bytes
2,886,796 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,022 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,313 >>> mbox cmd response: success
3,080,363 UART: [afmc] ++
3,080,531 UART: [afmc] CDI.KEYID = 6
3,080,893 UART: [afmc] SUBJECT.KEYID = 7
3,081,318 UART: [afmc] AUTHORITY.KEYID = 5
3,116,481 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,006 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,696 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,533 UART: [afmc] --
3,159,469 UART: [cold-reset] --
3,160,549 UART: [state] Locking Datavault
3,161,830 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,434 UART: [state] Locking ICCM
3,162,932 UART: [exit] Launching FMC @ 0x40000130
3,168,261 UART:
3,168,277 UART: Running Caliptra FMC ...
3,168,685 UART:
3,168,739 UART: [state] CFI Enabled
3,179,398 UART: [fht] FMC Alias Private Key: 7
3,287,765 UART: [art] Extend RT PCRs Done
3,288,193 UART: [art] Lock RT PCRs Done
3,289,663 UART: [art] Populate DV Done
3,297,580 UART: [fht] FMC Alias Private Key: 7
3,298,562 UART: [art] Derive CDI
3,298,842 UART: [art] Store in in slot 0x4
3,384,147 UART: [art] Derive Key Pair
3,384,507 UART: [art] Store priv key in slot 0x5
3,397,719 UART: [art] Derive Key Pair - Done
3,412,177 UART: [art] Signing Cert with AUTHO
3,412,657 UART: RITY.KEYID = 7
3,427,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,660 UART: [art] PUB.X = 8200EF65046563C75EE6158D4832EC58909077F46D2DAB95D7C5FE6EFDABDE4DB4A80876F21374811A19365D731AABF5
3,435,408 UART: [art] PUB.Y = 0AA97E3FF3765B0F4C8E15955F2246B240A1F6A432732881675F6F8BB1EC6F7DD4C86A1E432A74B26550301DAA0CD03C
3,442,355 UART: [art] SIG.R = 2BC3F697579F7A231676AEE336E911F395C3CEA6C7BF08E23324B968856C338E00E6D425432C9CE42F0F5CD548A82A20
3,449,099 UART: [art] SIG.S = D7F88200905F4C4CE5A182F70A187F5B6B45F6F8D4B9B832DF02B60D0F4CF5F66CFE272AEE90D84C7579C60E0D1557D1
3,472,922 UART: Caliptra RT
3,473,176 UART: [state] CFI Enabled
3,581,266 UART: [rt] RT listening for mailbox commands...
3,581,936 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,973 UART: [rt]cmd =0x53574545, len=84
3,614,895 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,487 ready_for_fw is high
1,362,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,663 >>> mbox cmd response: success
2,989,901 UART:
2,989,917 UART: Running Caliptra FMC ...
2,990,325 UART:
2,990,379 UART: [state] CFI Enabled
3,001,454 UART: [fht] FMC Alias Private Key: 7
3,109,491 UART: [art] Extend RT PCRs Done
3,109,919 UART: [art] Lock RT PCRs Done
3,111,541 UART: [art] Populate DV Done
3,119,630 UART: [fht] FMC Alias Private Key: 7
3,120,676 UART: [art] Derive CDI
3,120,956 UART: [art] Store in in slot 0x4
3,206,727 UART: [art] Derive Key Pair
3,207,087 UART: [art] Store priv key in slot 0x5
3,219,935 UART: [art] Derive Key Pair - Done
3,234,459 UART: [art] Signing Cert with AUTHO
3,234,939 UART: RITY.KEYID = 7
3,250,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,356 UART: [art] PUB.X = 03065C2F0BECFBEF9F96416606FDFC8D381EE9A665CB40DA0B2B358749F8B5714480212E1624ABE8AEDC0200AF7627D0
3,258,098 UART: [art] PUB.Y = 031B2E20A408AAAE49F2580E95082EC2EBDCB59A65DBC99D807AEC469CEB623134F64AC523DF6D6BFC3700950BE73CDD
3,265,031 UART: [art] SIG.R = D8184DEED751158BA6825C16F8DEEAB99835AEBEA7882391C051C807BFA819BF9D2325719277690A5E5B65E2F14590C2
3,271,799 UART: [art] SIG.S = 29C221498B757B8ECE046956E2B94F12F808E9CAAC8EFC9EB3BCCE57DB24DA8A6F5402F08AF56F02A4A0AA67D496DEF1
3,295,824 UART: Caliptra RT
3,296,078 UART: [state] CFI Enabled
3,403,962 UART: [rt] RT listening for mailbox commands...
3,404,632 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,719 UART: [rt]cmd =0x53574545, len=84
3,438,399 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,203 UART: [kat] SHA2-512-ACC
897,104 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,542 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 ready_for_fw is high
1,481,108 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,506,069 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,727 UART: [idev] --
1,515,768 UART: [ldev] ++
1,515,936 UART: [ldev] CDI.KEYID = 6
1,516,299 UART: [ldev] SUBJECT.KEYID = 5
1,516,725 UART: [ldev] AUTHORITY.KEYID = 7
1,517,188 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,548,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,293 UART: [ldev] --
1,587,728 UART: [fwproc] Waiting for Commands...
1,588,367 UART: [fwproc] Received command 0x46574c44
1,589,158 UART: [fwproc] Received Image of size 114360 bytes
2,887,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,504 >>> mbox cmd response: success
3,080,716 UART: [afmc] ++
3,080,884 UART: [afmc] CDI.KEYID = 6
3,081,246 UART: [afmc] SUBJECT.KEYID = 7
3,081,671 UART: [afmc] AUTHORITY.KEYID = 5
3,117,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,506 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,234 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,119 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,809 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,608 UART: [afmc] --
3,160,488 UART: [cold-reset] --
3,161,462 UART: [state] Locking Datavault
3,162,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,137 UART: [state] Locking ICCM
3,163,811 UART: [exit] Launching FMC @ 0x40000130
3,169,140 UART:
3,169,156 UART: Running Caliptra FMC ...
3,169,564 UART:
3,169,707 UART: [state] CFI Enabled
3,180,248 UART: [fht] FMC Alias Private Key: 7
3,287,869 UART: [art] Extend RT PCRs Done
3,288,297 UART: [art] Lock RT PCRs Done
3,289,595 UART: [art] Populate DV Done
3,298,016 UART: [fht] FMC Alias Private Key: 7
3,299,120 UART: [art] Derive CDI
3,299,400 UART: [art] Store in in slot 0x4
3,385,113 UART: [art] Derive Key Pair
3,385,473 UART: [art] Store priv key in slot 0x5
3,398,695 UART: [art] Derive Key Pair - Done
3,413,635 UART: [art] Signing Cert with AUTHO
3,414,115 UART: RITY.KEYID = 7
3,429,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,930 UART: [art] PUB.X = 95981B03D7078D51E092AE396F9F13E9330644CEBD4D5337D3A7E2CF944BD46A22FC81AD3F4717EBCE9467A662E0E4DC
3,436,701 UART: [art] PUB.Y = 52A5117DBF9F3C98A300A54B1392AE07ACF540C7256C45D3156B6C06DD2EA401C239F78FEC55912A6C11DD17E440AF61
3,443,628 UART: [art] SIG.R = 9145EE8B8061A287B9F0DFDBD3ED543F720AF01092081F5868BF4665925866339D18DC661D4EF1884B503687B34A0FFF
3,450,389 UART: [art] SIG.S = 23A1899A82798BB0D09EB62017A78FABBCD507673E337B407ECC4AF21C0CC0A072691DBDEC6552BB8B793431E66B799C
3,474,378 UART: Caliptra RT
3,474,724 UART: [state] CFI Enabled
3,584,292 UART: [rt] RT listening for mailbox commands...
3,584,962 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,099 UART: [rt]cmd =0x53574545, len=84
3,618,517 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 ready_for_fw is high
1,362,706 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,206 >>> mbox cmd response: success
2,989,994 UART:
2,990,010 UART: Running Caliptra FMC ...
2,990,418 UART:
2,990,561 UART: [state] CFI Enabled
3,001,356 UART: [fht] FMC Alias Private Key: 7
3,109,147 UART: [art] Extend RT PCRs Done
3,109,575 UART: [art] Lock RT PCRs Done
3,111,031 UART: [art] Populate DV Done
3,119,294 UART: [fht] FMC Alias Private Key: 7
3,120,328 UART: [art] Derive CDI
3,120,608 UART: [art] Store in in slot 0x4
3,206,227 UART: [art] Derive Key Pair
3,206,587 UART: [art] Store priv key in slot 0x5
3,219,979 UART: [art] Derive Key Pair - Done
3,234,783 UART: [art] Signing Cert with AUTHO
3,235,263 UART: RITY.KEYID = 7
3,250,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,400 UART: [art] PUB.X = BDCF93EC3671FD7ED286F06E28E07F0E5976BB2C58FADF29D971A5B6F79E919A97C2E242E934A623AAEC53B85EE4C057
3,258,185 UART: [art] PUB.Y = 5EC16E43949949BE7D94D4021879E2780FF78031BE7A00739D94378CBAC2CC2ED1F7B24A60CB6B2AD35B6B03508FB796
3,265,110 UART: [art] SIG.R = 5FEFC777A19A5A884F33D72B53D07FFFD29E2D4EC2AC3DA50ACE5EAABDA117D5F2796F9EE0EA7B8A21BC7884576BD13F
3,271,907 UART: [art] SIG.S = C6C4D54CF38285BC74CCAFAB2148E7514ED9EEF0EF4356990C857E484569BFF527013FD70D5B8B61056931D7CAFE5B61
3,295,816 UART: Caliptra RT
3,296,162 UART: [state] CFI Enabled
3,404,144 UART: [rt] RT listening for mailbox commands...
3,404,814 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,965 UART: [rt]cmd =0x53574545, len=84
3,438,359 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
902,233 UART: [kat] SHA2-256
904,173 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
922,978 UART: [kat] LMS
1,171,306 UART: [kat] --
1,172,379 UART: [cold-reset] ++
1,172,931 UART: [fht] FHT @ 0x50003400
1,175,598 UART: [idev] ++
1,175,766 UART: [idev] CDI.KEYID = 6
1,176,126 UART: [idev] SUBJECT.KEYID = 7
1,176,550 UART: [idev] UDS.KEYID = 0
1,176,895 ready_for_fw is high
1,176,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,446 UART: [idev] Erasing UDS.KEYID = 0
1,201,585 UART: [idev] Sha1 KeyId Algorithm
1,209,865 UART: [idev] --
1,210,861 UART: [ldev] ++
1,211,029 UART: [ldev] CDI.KEYID = 6
1,211,392 UART: [ldev] SUBJECT.KEYID = 5
1,211,818 UART: [ldev] AUTHORITY.KEYID = 7
1,212,281 UART: [ldev] FE.KEYID = 1
1,217,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,282,998 UART: [fwproc] Recv command 0x46574c44
1,283,726 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,956 >>> mbox cmd response: success
2,773,092 UART: [afmc] ++
2,773,260 UART: [afmc] CDI.KEYID = 6
2,773,622 UART: [afmc] SUBJECT.KEYID = 7
2,774,047 UART: [afmc] AUTHORITY.KEYID = 5
2,808,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,440 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,963 UART: [afmc] --
2,851,993 UART: [cold-reset] --
2,852,925 UART: [state] Locking Datavault
2,854,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,906 UART: [state] Locking ICCM
2,855,376 UART: [exit] Launching FMC @ 0x40000130
2,860,705 UART:
2,860,721 UART: Running Caliptra FMC ...
2,861,129 UART:
2,861,183 UART: [state] CFI Enabled
2,871,282 UART: [fht] FMC Alias Private Key: 7
2,979,055 UART: [art] Extend RT PCRs Done
2,979,483 UART: [art] Lock RT PCRs Done
2,981,265 UART: [art] Populate DV Done
2,989,584 UART: [fht] FMC Alias Private Key: 7
2,990,524 UART: [art] Derive CDI
2,990,804 UART: [art] Store in in slot 0x4
3,076,451 UART: [art] Derive Key Pair
3,076,811 UART: [art] Store priv key in slot 0x5
3,089,825 UART: [art] Derive Key Pair - Done
3,104,631 UART: [art] Signing Cert with AUTHO
3,105,111 UART: RITY.KEYID = 7
3,120,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,982 UART: [art] PUB.X = 396C428CBC48B18F6C9DE9A6AA5D19FD32C598E34EB45EC36FC0BDF49E7CBF6B09CDC25FEA6C81BE8B9DB64E05766D22
3,127,774 UART: [art] PUB.Y = 94213330B0A5DD7301A67A328B397B63DF386782480602DCC0671515637D5B85DDEFA3D05BC24C29801B228958F45B69
3,134,707 UART: [art] SIG.R = D316EFBEC999643842C86FAB835FC3CB67392DC312E42BC26E3A2BA058F522009D37E9BED6583E6D9E752C44B50898DA
3,141,462 UART: [art] SIG.S = 0AE93360694DC8823FBDC4D3EEB89D147A0A53CD844A1985D2F081A173DE9FD6CADAFC91CC473DEB4B47114184F9923D
3,165,043 UART: Caliptra RT
3,165,297 UART: [state] CFI Enabled
3,273,509 UART: [rt] RT listening for mailbox commands...
3,274,179 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,968 UART: [rt]cmd =0x53574545, len=84
3,307,214 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,899 ready_for_fw is high
1,059,899 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,831 >>> mbox cmd response: success
2,685,983 UART:
2,685,999 UART: Running Caliptra FMC ...
2,686,407 UART:
2,686,461 UART: [state] CFI Enabled
2,696,844 UART: [fht] FMC Alias Private Key: 7
2,805,497 UART: [art] Extend RT PCRs Done
2,805,925 UART: [art] Lock RT PCRs Done
2,807,269 UART: [art] Populate DV Done
2,815,460 UART: [fht] FMC Alias Private Key: 7
2,816,542 UART: [art] Derive CDI
2,816,822 UART: [art] Store in in slot 0x4
2,902,469 UART: [art] Derive Key Pair
2,902,829 UART: [art] Store priv key in slot 0x5
2,915,713 UART: [art] Derive Key Pair - Done
2,930,546 UART: [art] Signing Cert with AUTHO
2,931,026 UART: RITY.KEYID = 7
2,945,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,573 UART: [art] PUB.X = 56814704E3EE510F0D159DDF9542C3AD72651BD78C5EABD0F314447950E56167BAC082E79AC8C1D8B10C2A940C26C638
2,953,332 UART: [art] PUB.Y = 48A12B01876A0790E5868355506100FEBD05ECE20DBFABAF0F97DF2BBD0A57C71A05E8D1A2FF89C9025660F42C57BD16
2,960,248 UART: [art] SIG.R = 463790788DD970825CFFC51E8EA02CD9C7BDAAEEA7A064ABE074F65A27277B46317D838D880DCF56777E4B76E85E4E44
2,967,025 UART: [art] SIG.S = 7D890F84B1DAF515F39A6A1D67CD7BFE84D1DFBA75D6BB5869BADCFE0EB33F8DEC332A7229773E27370B994CA5934B48
2,990,719 UART: Caliptra RT
2,990,973 UART: [state] CFI Enabled
3,098,713 UART: [rt] RT listening for mailbox commands...
3,099,383 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,490 UART: [rt]cmd =0x53574545, len=84
3,132,764 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,814 UART: [kat] SHA2-256
904,754 UART: [kat] SHA2-384
907,397 UART: [kat] SHA2-512-ACC
909,298 UART: [kat] ECC-384
919,503 UART: [kat] HMAC-384Kdf
924,097 UART: [kat] LMS
1,172,425 UART: [kat] --
1,173,522 UART: [cold-reset] ++
1,174,062 UART: [fht] FHT @ 0x50003400
1,176,751 UART: [idev] ++
1,176,919 UART: [idev] CDI.KEYID = 6
1,177,279 UART: [idev] SUBJECT.KEYID = 7
1,177,703 UART: [idev] UDS.KEYID = 0
1,178,048 ready_for_fw is high
1,178,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,317 UART: [idev] Erasing UDS.KEYID = 0
1,202,264 UART: [idev] Sha1 KeyId Algorithm
1,210,934 UART: [idev] --
1,211,904 UART: [ldev] ++
1,212,072 UART: [ldev] CDI.KEYID = 6
1,212,435 UART: [ldev] SUBJECT.KEYID = 5
1,212,861 UART: [ldev] AUTHORITY.KEYID = 7
1,213,324 UART: [ldev] FE.KEYID = 1
1,218,562 UART: [ldev] Erasing FE.KEYID = 1
1,245,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,438 UART: [ldev] --
1,284,793 UART: [fwproc] Wait for Commands...
1,285,417 UART: [fwproc] Recv command 0x46574c44
1,286,145 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,973 >>> mbox cmd response: success
2,777,225 UART: [afmc] ++
2,777,393 UART: [afmc] CDI.KEYID = 6
2,777,755 UART: [afmc] SUBJECT.KEYID = 7
2,778,180 UART: [afmc] AUTHORITY.KEYID = 5
2,813,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,541 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,260 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,028 UART: [afmc] --
2,857,024 UART: [cold-reset] --
2,857,950 UART: [state] Locking Datavault
2,859,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,747 UART: [state] Locking ICCM
2,860,315 UART: [exit] Launching FMC @ 0x40000130
2,865,644 UART:
2,865,660 UART: Running Caliptra FMC ...
2,866,068 UART:
2,866,211 UART: [state] CFI Enabled
2,876,670 UART: [fht] FMC Alias Private Key: 7
2,984,575 UART: [art] Extend RT PCRs Done
2,985,003 UART: [art] Lock RT PCRs Done
2,986,735 UART: [art] Populate DV Done
2,994,910 UART: [fht] FMC Alias Private Key: 7
2,996,074 UART: [art] Derive CDI
2,996,354 UART: [art] Store in in slot 0x4
3,082,281 UART: [art] Derive Key Pair
3,082,641 UART: [art] Store priv key in slot 0x5
3,096,287 UART: [art] Derive Key Pair - Done
3,110,916 UART: [art] Signing Cert with AUTHO
3,111,396 UART: RITY.KEYID = 7
3,126,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,317 UART: [art] PUB.X = 979C7673D738FF953534F7ADA2E98A89401BF2D2F4C0B5BEDDA034C807FF901668342E90220B415781B28953EAF04362
3,134,079 UART: [art] PUB.Y = D63594681C5AD653CAA8B7B210FF998A4BF868AFA3C13EFF8B13FDD264BDBD3C30CE6156F5AA479CDAC96F6E2E54642D
3,141,053 UART: [art] SIG.R = 4CFE6FF4795B352815695D2372E150890A098DA6175DCB37246C2C2B045B78848720BC98892810800086227435C3B3B1
3,147,776 UART: [art] SIG.S = 940665F4AE6FA441EBF46B3448746F788D1C6B94BBC82FF6D525F1E59AC930C703EC02702C195AFFE2CCB3EBF4AE6B7C
3,171,776 UART: Caliptra RT
3,172,122 UART: [state] CFI Enabled
3,280,396 UART: [rt] RT listening for mailbox commands...
3,281,066 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,063 UART: [rt]cmd =0x53574545, len=84
3,313,801 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,178 ready_for_fw is high
1,061,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,274 >>> mbox cmd response: success
2,689,886 UART:
2,689,902 UART: Running Caliptra FMC ...
2,690,310 UART:
2,690,453 UART: [state] CFI Enabled
2,701,042 UART: [fht] FMC Alias Private Key: 7
2,809,447 UART: [art] Extend RT PCRs Done
2,809,875 UART: [art] Lock RT PCRs Done
2,811,475 UART: [art] Populate DV Done
2,819,662 UART: [fht] FMC Alias Private Key: 7
2,820,720 UART: [art] Derive CDI
2,821,000 UART: [art] Store in in slot 0x4
2,906,653 UART: [art] Derive Key Pair
2,907,013 UART: [art] Store priv key in slot 0x5
2,920,331 UART: [art] Derive Key Pair - Done
2,935,116 UART: [art] Signing Cert with AUTHO
2,935,596 UART: RITY.KEYID = 7
2,950,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,511 UART: [art] PUB.X = 25E33529E7721D29B03462E54ED6DBCAA3C7F4F2A4ADF1F00BBD5F2A274F2DD7E5C34268A27A6CEB7A16561282D62D36
2,958,292 UART: [art] PUB.Y = 83BD8F2486209F6884296867A5C1380773ECF7858C55062AF914D758264D5A61E90404A4810141DD61461C3D0BC5E477
2,965,210 UART: [art] SIG.R = 5ED8B54C3EC2309B4AB54A73AA6257696D3E7C86BB169D3BE40329E419C9DC8024F746136BEB2C617DB86818C7A0BE07
2,971,982 UART: [art] SIG.S = E1F358EEC0EBF86AF957772EE3A72A47276A5C155EB20E972D57A9A5B11D64706842AC5143FDF1B3AB438EC5BF333161
2,995,440 UART: Caliptra RT
2,995,786 UART: [state] CFI Enabled
3,104,218 UART: [rt] RT listening for mailbox commands...
3,104,888 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,143 UART: [rt]cmd =0x53574545, len=84
3,137,831 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,267 UART: [idev] ++
1,173,435 UART: [idev] CDI.KEYID = 6
1,173,796 UART: [idev] SUBJECT.KEYID = 7
1,174,221 UART: [idev] UDS.KEYID = 0
1,174,567 ready_for_fw is high
1,174,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,593 UART: [idev] Erasing UDS.KEYID = 0
1,200,293 UART: [idev] Sha1 KeyId Algorithm
1,209,175 UART: [idev] --
1,210,254 UART: [ldev] ++
1,210,422 UART: [ldev] CDI.KEYID = 6
1,210,786 UART: [ldev] SUBJECT.KEYID = 5
1,211,213 UART: [ldev] AUTHORITY.KEYID = 7
1,211,676 UART: [ldev] FE.KEYID = 1
1,216,888 UART: [ldev] Erasing FE.KEYID = 1
1,243,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,388 UART: [ldev] --
1,282,784 UART: [fwproc] Wait for Commands...
1,283,545 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,020 >>> mbox cmd response: success
2,776,127 UART: [afmc] ++
2,776,295 UART: [afmc] CDI.KEYID = 6
2,776,658 UART: [afmc] SUBJECT.KEYID = 7
2,777,084 UART: [afmc] AUTHORITY.KEYID = 5
2,812,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,446 UART: [afmc] --
2,855,562 UART: [cold-reset] --
2,856,250 UART: [state] Locking Datavault
2,857,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,705 UART: [state] Locking ICCM
2,858,255 UART: [exit] Launching FMC @ 0x40000130
2,863,584 UART:
2,863,600 UART: Running Caliptra FMC ...
2,864,008 UART:
2,864,062 UART: [state] CFI Enabled
2,874,643 UART: [fht] FMC Alias Private Key: 7
2,983,256 UART: [art] Extend RT PCRs Done
2,983,684 UART: [art] Lock RT PCRs Done
2,985,260 UART: [art] Populate DV Done
2,993,349 UART: [fht] FMC Alias Private Key: 7
2,994,307 UART: [art] Derive CDI
2,994,587 UART: [art] Store in in slot 0x4
3,080,090 UART: [art] Derive Key Pair
3,080,450 UART: [art] Store priv key in slot 0x5
3,093,590 UART: [art] Derive Key Pair - Done
3,108,554 UART: [art] Signing Cert with AUTHO
3,109,034 UART: RITY.KEYID = 7
3,124,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,841 UART: [art] PUB.X = 84D335EE665A4DD46E1F53D33B24FD736C7583316F3C8430FEBBB67CE438693054769995144A2B5A8D3FE0A46E7FBA69
3,131,615 UART: [art] PUB.Y = 1603E90E0D3662FFC44655C2A2648CF20FD57D0E0D0D918744994F7EA4B1CDEEB2712F09B482739BED9EB71FA2E96533
3,138,549 UART: [art] SIG.R = 240D03192D1D6F8FFC0D4304B8E63CA36CCE00F109925E9BB9E0FE7E08FB6E46473CF57336BFE80430626A65D36C97D9
3,145,284 UART: [art] SIG.S = 9C5653D35B2518CE7F5713B536764390B0093857CBBCFA7E002220E33E77CE0709C0863ED47361FBDE538F7C8DB3FC69
3,168,976 UART: Caliptra RT
3,169,230 UART: [state] CFI Enabled
3,276,630 UART: [rt] RT listening for mailbox commands...
3,277,300 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,315 UART: [rt]cmd =0x53574545, len=84
3,310,767 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,498 ready_for_fw is high
1,055,498 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,402 >>> mbox cmd response: success
2,684,438 UART:
2,684,454 UART: Running Caliptra FMC ...
2,684,862 UART:
2,684,916 UART: [state] CFI Enabled
2,695,427 UART: [fht] FMC Alias Private Key: 7
2,804,098 UART: [art] Extend RT PCRs Done
2,804,526 UART: [art] Lock RT PCRs Done
2,806,238 UART: [art] Populate DV Done
2,814,513 UART: [fht] FMC Alias Private Key: 7
2,815,679 UART: [art] Derive CDI
2,815,959 UART: [art] Store in in slot 0x4
2,901,420 UART: [art] Derive Key Pair
2,901,780 UART: [art] Store priv key in slot 0x5
2,915,138 UART: [art] Derive Key Pair - Done
2,930,034 UART: [art] Signing Cert with AUTHO
2,930,514 UART: RITY.KEYID = 7
2,945,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,375 UART: [art] PUB.X = 55F90850383B94DD8B00B420352FE6C14831D48F81D80E01425A712B97E91804C2D2E199690C94F13D003ABB7AE42A4E
2,953,082 UART: [art] PUB.Y = D35DEC92CE10E3A59E454F047C4ADDDB86D66B5699D5D4B694841DCA4BFB7757BE1C60BD75F962EDA4F38BCBF7324671
2,960,049 UART: [art] SIG.R = 143DB4C8C3E60ED258D4F8944153E9811E355D3F7B76A61BE79BB67143E4A00DCDF911ECD24FEECA4A377AA23C77502E
2,966,827 UART: [art] SIG.S = D5B6B4FA54B1CCA8C5F268D1FF498AEAC293754A801CD4C84E73BCDD31031139C323FB48E9C5C234D1E35BA7915A72E4
2,990,665 UART: Caliptra RT
2,990,919 UART: [state] CFI Enabled
3,098,337 UART: [rt] RT listening for mailbox commands...
3,099,007 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,948 UART: [rt]cmd =0x53574545, len=84
3,132,432 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,395 UART: [kat] SHA2-512-ACC
906,296 UART: [kat] ECC-384
915,987 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,864 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,256 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,649 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,211 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,567 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,539 >>> mbox cmd response: success
2,772,580 UART: [afmc] ++
2,772,748 UART: [afmc] CDI.KEYID = 6
2,773,111 UART: [afmc] SUBJECT.KEYID = 7
2,773,537 UART: [afmc] AUTHORITY.KEYID = 5
2,809,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,259 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,978 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,757 UART: [afmc] --
2,852,765 UART: [cold-reset] --
2,853,807 UART: [state] Locking Datavault
2,854,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,410 UART: [state] Locking ICCM
2,856,072 UART: [exit] Launching FMC @ 0x40000130
2,861,401 UART:
2,861,417 UART: Running Caliptra FMC ...
2,861,825 UART:
2,861,968 UART: [state] CFI Enabled
2,872,691 UART: [fht] FMC Alias Private Key: 7
2,980,398 UART: [art] Extend RT PCRs Done
2,980,826 UART: [art] Lock RT PCRs Done
2,982,450 UART: [art] Populate DV Done
2,990,659 UART: [fht] FMC Alias Private Key: 7
2,991,771 UART: [art] Derive CDI
2,992,051 UART: [art] Store in in slot 0x4
3,078,016 UART: [art] Derive Key Pair
3,078,376 UART: [art] Store priv key in slot 0x5
3,092,088 UART: [art] Derive Key Pair - Done
3,107,363 UART: [art] Signing Cert with AUTHO
3,107,843 UART: RITY.KEYID = 7
3,122,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,664 UART: [art] PUB.X = 948BE8C5C16742A7CFC9099AB45171D09B0935EF90F4C2FA7EE264BBAB18DF18FC71FDD43FFFEA7AC6A156233B9B56F3
3,130,450 UART: [art] PUB.Y = E3EE1E9E24F7CCE9C3CAB1CEC7F2D575067419E96C27AD4FF02C5B3E5F708BF131D9ECEAA5B5B98CA421EF8030B04E44
3,137,423 UART: [art] SIG.R = AB4492EF6CF7D59117AB1186584BD323425F2B7CDCED8E6A9C79ADFE2A23774E1AF27B806DAE14C13715CBA329F12E7D
3,144,211 UART: [art] SIG.S = 3EFA520A9C6B3247005212256320991D43394A7EE10F0F27A51BA5D0DA77363DBA929F863A90296F4816B7BBF88BBDC9
3,167,797 UART: Caliptra RT
3,168,143 UART: [state] CFI Enabled
3,275,731 UART: [rt] RT listening for mailbox commands...
3,276,401 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,412 UART: [rt]cmd =0x53574545, len=84
3,309,576 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,801 ready_for_fw is high
1,055,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,709 >>> mbox cmd response: success
2,685,427 UART:
2,685,443 UART: Running Caliptra FMC ...
2,685,851 UART:
2,685,994 UART: [state] CFI Enabled
2,696,679 UART: [fht] FMC Alias Private Key: 7
2,804,152 UART: [art] Extend RT PCRs Done
2,804,580 UART: [art] Lock RT PCRs Done
2,806,062 UART: [art] Populate DV Done
2,814,351 UART: [fht] FMC Alias Private Key: 7
2,815,279 UART: [art] Derive CDI
2,815,559 UART: [art] Store in in slot 0x4
2,901,658 UART: [art] Derive Key Pair
2,902,018 UART: [art] Store priv key in slot 0x5
2,915,092 UART: [art] Derive Key Pair - Done
2,929,943 UART: [art] Signing Cert with AUTHO
2,930,423 UART: RITY.KEYID = 7
2,945,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,026 UART: [art] PUB.X = C10C0C18704C4E51E0F5B9D687C4E17B4BCAED6E04A422A3DD2F8290C4493E98DACB1F3B25826524B086F4EB9809E8E2
2,952,796 UART: [art] PUB.Y = 502B7749B938CEB3C1D14ED5434646E901924AFF2EECE9B6A627FFEFA6D7004D10AB99177795D7CE4B0EBF08A293B1AD
2,959,731 UART: [art] SIG.R = 0B2064E913BB4E84C81E5C719320766D7FDA3A2563FB661E014990C374E5674E36913A335E9A715421811137C326736D
2,966,481 UART: [art] SIG.S = FB56FF527ABF952C3A230B22DAE46A374183AA5C096B1C288C96468AB59A9A5601049FC195F9378FD976CB0915E52AAE
2,990,365 UART: Caliptra RT
2,990,711 UART: [state] CFI Enabled
3,098,565 UART: [rt] RT listening for mailbox commands...
3,099,235 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,344 UART: [rt]cmd =0x53574545, len=84
3,132,238 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,420 UART:
192,818 UART: Running Caliptra ROM ...
193,920 UART:
194,055 UART: [state] CFI Enabled
267,031 UART: [state] LifecycleState = Unprovisioned
269,013 UART: [state] DebugLocked = No
271,875 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,986 UART: [kat] SHA2-256
446,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,852 UART: [kat] ++
457,331 UART: [kat] sha1
467,629 UART: [kat] SHA2-256
470,269 UART: [kat] SHA2-384
477,383 UART: [kat] SHA2-512-ACC
479,751 UART: [kat] ECC-384
2,765,689 UART: [kat] HMAC-384Kdf
2,777,152 UART: [kat] LMS
3,967,525 UART: [kat] --
3,970,481 UART: [cold-reset] ++
3,971,554 UART: [fht] Storing FHT @ 0x50003400
3,982,258 UART: [idev] ++
3,982,816 UART: [idev] CDI.KEYID = 6
3,983,693 UART: [idev] SUBJECT.KEYID = 7
3,984,998 UART: [idev] UDS.KEYID = 0
3,985,946 ready_for_fw is high
3,986,134 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,129,555 UART: [idev] Erasing UDS.KEYID = 0
7,323,477 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,421 UART: [idev] --
7,350,545 UART: [ldev] ++
7,351,106 UART: [ldev] CDI.KEYID = 6
7,352,063 UART: [ldev] SUBJECT.KEYID = 5
7,353,269 UART: [ldev] AUTHORITY.KEYID = 7
7,354,568 UART: [ldev] FE.KEYID = 1
7,400,016 UART: [ldev] Erasing FE.KEYID = 1
10,733,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,436 UART: [ldev] --
13,113,639 UART: [fwproc] Waiting for Commands...
13,116,106 UART: [fwproc] Received command 0x46574c44
13,118,281 UART: [fwproc] Received Image of size 114036 bytes
17,166,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,189 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,103 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,625,576 >>> mbox cmd response: success
17,630,450 UART: [afmc] ++
17,631,122 UART: [afmc] CDI.KEYID = 6
17,632,003 UART: [afmc] SUBJECT.KEYID = 7
17,633,225 UART: [afmc] AUTHORITY.KEYID = 5
21,003,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,933 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,371 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,174 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,615 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,265 UART: [afmc] --
23,375,583 UART: [cold-reset] --
23,380,246 UART: [state] Locking Datavault
23,385,216 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,909 UART: [state] Locking ICCM
23,388,623 UART: [exit] Launching FMC @ 0x40000130
23,397,024 UART:
23,397,318 UART: Running Caliptra FMC ...
23,398,430 UART:
23,398,585 UART: [state] CFI Enabled
23,463,811 UART: [fht] FMC Alias Private Key: 7
25,802,119 UART: [art] Extend RT PCRs Done
25,803,339 UART: [art] Lock RT PCRs Done
25,804,795 UART: [art] Populate DV Done
25,810,370 UART: [fht] FMC Alias Private Key: 7
25,812,019 UART: [art] Derive CDI
25,812,828 UART: [art] Store in in slot 0x4
25,871,867 UART: [art] Derive Key Pair
25,872,856 UART: [art] Store priv key in slot 0x5
29,165,602 UART: [art] Derive Key Pair - Done
29,178,514 UART: [art] Signing Cert with AUTHO
29,179,813 UART: RITY.KEYID = 7
31,468,329 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,867 UART: [art] PUB.X = 3F138E55C38C2927C97C148183FFC78AA862FCF3DFF15612369FC5CD3B0FF32AA4991628195CBDC02597069772F4EC95
31,477,123 UART: [art] PUB.Y = E72EB9F88DF7F509F1810AE71262D79E494E4CE9492CDF9DFDD09790324204B95ED3A701F04372AA8B1FDCFA09A533E6
31,484,338 UART: [art] SIG.R = 511378CA78ACB92AF6643D720231A8D310F309576CC2C637C64D4397D6B22850EEB7291ACE7AD3B84941298359F168A0
31,491,701 UART: [art] SIG.S = 64B1E7E6B848F1E6B5CAA923F86718AC44416B0CA03A29607F59B91BD78F8B61193FB58F645FC133477993C28A54D07C
32,797,095 UART: Caliptra RT
32,797,813 UART: [state] CFI Enabled
32,958,438 UART: [rt] RT listening for mailbox commands...
32,960,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,991,566 UART: [rt]cmd =0x44504543, len=96
38,783,357 >>> mbox cmd response data (6236 bytes)
38,812,565 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,843,144 UART: [rt]cmd =0x53574545, len=84
44,419,973 >>> mbox cmd response data (200 bytes)
44,803,584 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,833,838 UART: [rt]cmd =0x52564348, len=36
44,836,387 >>> mbox cmd response data (8 bytes)
44,836,777 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,867,176 UART: [rt]cmd =0x53574545, len=84
44,870,948 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,796,279 ready_for_fw is high
3,796,675 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,865,910 >>> mbox cmd response: success
23,558,835 UART:
23,559,271 UART: Running Caliptra FMC ...
23,560,380 UART:
23,560,534 UART: [state] CFI Enabled
23,631,018 UART: [fht] FMC Alias Private Key: 7
25,968,889 UART: [art] Extend RT PCRs Done
25,970,111 UART: [art] Lock RT PCRs Done
25,971,792 UART: [art] Populate DV Done
25,977,121 UART: [fht] FMC Alias Private Key: 7
25,978,713 UART: [art] Derive CDI
25,979,527 UART: [art] Store in in slot 0x4
26,039,754 UART: [art] Derive Key Pair
26,040,798 UART: [art] Store priv key in slot 0x5
29,333,731 UART: [art] Derive Key Pair - Done
29,346,611 UART: [art] Signing Cert with AUTHO
29,347,947 UART: RITY.KEYID = 7
31,636,175 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,684 UART: [art] PUB.X = 82ED48E0B0E0E643943683844888D8E102315D5B3CD5F5DFB3C3DE809C994954286DFCB16C7EC6BA8FD4943624F3AA70
31,644,901 UART: [art] PUB.Y = 503954E3B09FF2F9DA3547CD280AA57714F137C0C6A896A4D81F4B285AD5BC23FF089F85B8A118921FC08F3C33CFC470
31,652,170 UART: [art] SIG.R = D8562DA70AB9ED622160A21571D1BCA9BDEF886CD52CFA488C0F06A8F2D89B2E0BAFEE6E56D9FF9C53A5712D64FB8952
31,659,585 UART: [art] SIG.S = 1C2C9D45C1C1885F5CE7FC9AE416371AB7C167B404B409EB82F39AE243EA6F7DF910F7FDE497B1A0DB1163A290565DEC
32,964,600 UART: Caliptra RT
32,965,291 UART: [state] CFI Enabled
33,127,235 UART: [rt] RT listening for mailbox commands...
33,129,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,160,567 UART: [rt]cmd =0x44504543, len=96
38,952,651 >>> mbox cmd response data (6236 bytes)
38,981,790 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,012,287 UART: [rt]cmd =0x53574545, len=84
44,591,851 >>> mbox cmd response data (200 bytes)
44,973,293 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
45,003,626 UART: [rt]cmd =0x52564348, len=36
45,006,415 >>> mbox cmd response data (8 bytes)
45,006,771 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,036,998 UART: [rt]cmd =0x53574545, len=84
45,040,688 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,387 UART:
192,764 UART: Running Caliptra ROM ...
193,893 UART:
603,741 UART: [state] CFI Enabled
617,619 UART: [state] LifecycleState = Unprovisioned
619,486 UART: [state] DebugLocked = No
621,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,273 UART: [kat] SHA2-256
797,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,589 UART: [kat] ++
808,037 UART: [kat] sha1
818,843 UART: [kat] SHA2-256
821,560 UART: [kat] SHA2-384
827,870 UART: [kat] SHA2-512-ACC
830,278 UART: [kat] ECC-384
3,115,339 UART: [kat] HMAC-384Kdf
3,127,357 UART: [kat] LMS
4,317,478 UART: [kat] --
4,321,850 UART: [cold-reset] ++
4,324,206 UART: [fht] Storing FHT @ 0x50003400
4,336,958 UART: [idev] ++
4,337,526 UART: [idev] CDI.KEYID = 6
4,338,435 UART: [idev] SUBJECT.KEYID = 7
4,339,678 UART: [idev] UDS.KEYID = 0
4,340,720 ready_for_fw is high
4,340,928 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,161 UART: [idev] Erasing UDS.KEYID = 0
7,621,838 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,919 UART: [idev] --
7,646,915 UART: [ldev] ++
7,647,501 UART: [ldev] CDI.KEYID = 6
7,648,445 UART: [ldev] SUBJECT.KEYID = 5
7,649,659 UART: [ldev] AUTHORITY.KEYID = 7
7,650,941 UART: [ldev] FE.KEYID = 1
7,660,968 UART: [ldev] Erasing FE.KEYID = 1
10,950,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,227 UART: [ldev] --
13,310,258 UART: [fwproc] Waiting for Commands...
13,312,668 UART: [fwproc] Received command 0x46574c44
13,314,852 UART: [fwproc] Received Image of size 114036 bytes
17,364,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,935 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,826,163 >>> mbox cmd response: success
17,831,196 UART: [afmc] ++
17,831,790 UART: [afmc] CDI.KEYID = 6
17,832,760 UART: [afmc] SUBJECT.KEYID = 7
17,833,975 UART: [afmc] AUTHORITY.KEYID = 5
21,145,296 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,117 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,486 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,302 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,779 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,308 UART: [afmc] --
23,510,353 UART: [cold-reset] --
23,514,315 UART: [state] Locking Datavault
23,520,117 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,873 UART: [state] Locking ICCM
23,523,188 UART: [exit] Launching FMC @ 0x40000130
23,531,576 UART:
23,531,807 UART: Running Caliptra FMC ...
23,532,827 UART:
23,532,973 UART: [state] CFI Enabled
23,541,015 UART: [fht] FMC Alias Private Key: 7
25,871,497 UART: [art] Extend RT PCRs Done
25,872,724 UART: [art] Lock RT PCRs Done
25,874,160 UART: [art] Populate DV Done
25,879,593 UART: [fht] FMC Alias Private Key: 7
25,881,129 UART: [art] Derive CDI
25,881,950 UART: [art] Store in in slot 0x4
25,924,164 UART: [art] Derive Key Pair
25,925,152 UART: [art] Store priv key in slot 0x5
29,167,071 UART: [art] Derive Key Pair - Done
29,179,914 UART: [art] Signing Cert with AUTHO
29,181,217 UART: RITY.KEYID = 7
31,460,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,164 UART: [art] PUB.X = 60529F669FE1BBBC2A67C2ADD9E114D3075236AABDDB9DB2F269C618582738D8B3BD5CD453DF6F965DB2D22676962823
31,469,394 UART: [art] PUB.Y = B80DFABDBF7BCEB1ED955A4050E1F7E9364E68A021C9D42B9FC42A226BE01214875A3EA2A202BEB4B60487D55CBAC369
31,476,695 UART: [art] SIG.R = 804152137C91155B895C483B57BC731FF34FBC1F801794D423C7CF1826C8E1759793B4AF5118FE013AAFB3581CF2EE67
31,484,045 UART: [art] SIG.S = A25DB09A72737463FB447410894D54DDA444F0346CBB7AE13E1E611853128A951DC374AF443E748E8E8B31F43C7B0CF8
32,788,662 UART: Caliptra RT
32,789,361 UART: [state] CFI Enabled
32,906,262 UART: [rt] RT listening for mailbox commands...
32,908,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,939,756 UART: [rt]cmd =0x44504543, len=96
38,618,554 >>> mbox cmd response data (6236 bytes)
38,647,799 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,678,485 UART: [rt]cmd =0x53574545, len=84
44,203,043 >>> mbox cmd response data (200 bytes)
44,586,642 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,616,757 UART: [rt]cmd =0x52564348, len=36
44,619,635 >>> mbox cmd response data (8 bytes)
44,620,084 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,650,645 UART: [rt]cmd =0x53574545, len=84
44,653,991 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,132,704 ready_for_fw is high
4,133,126 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,073,541 >>> mbox cmd response: success
23,715,703 UART:
23,716,090 UART: Running Caliptra FMC ...
23,717,288 UART:
23,717,467 UART: [state] CFI Enabled
23,725,523 UART: [fht] FMC Alias Private Key: 7
26,056,335 UART: [art] Extend RT PCRs Done
26,057,561 UART: [art] Lock RT PCRs Done
26,059,165 UART: [art] Populate DV Done
26,064,812 UART: [fht] FMC Alias Private Key: 7
26,066,485 UART: [art] Derive CDI
26,067,230 UART: [art] Store in in slot 0x4
26,109,959 UART: [art] Derive Key Pair
26,110,999 UART: [art] Store priv key in slot 0x5
29,353,590 UART: [art] Derive Key Pair - Done
29,366,749 UART: [art] Signing Cert with AUTHO
29,368,050 UART: RITY.KEYID = 7
31,647,331 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,835 UART: [art] PUB.X = 1DE4F7D5A457DD5C9D882950E6E5EDB72471C1E5A61169E8A24AEB76ACD1F8BB0CF94706FD6EBEB7D785472150618AF6
31,656,108 UART: [art] PUB.Y = 29FEDC7F5C3F31E5C735C37700C12087CDC89AB13E801B55367032B5D03B26E067E6C8A1AA3E858303C674A6078F9547
31,663,362 UART: [art] SIG.R = 7FC113772FA71E1E33CCF40C96B82A1F08A1835694A9B2F65F237AACD8E5807003F1CB2432FBB26DCD4653DF082FD700
31,670,736 UART: [art] SIG.S = 9A334AFD02C89FF868FE616D15EAB74DDA5B2EEFEE7E209045F97B08E2C1533ABF29794CB74E14172CA16AFE292BB047
32,975,813 UART: Caliptra RT
32,976,517 UART: [state] CFI Enabled
33,094,553 UART: [rt] RT listening for mailbox commands...
33,096,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,566 UART: [rt]cmd =0x44504543, len=96
38,807,344 >>> mbox cmd response data (6236 bytes)
38,836,694 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,867,523 UART: [rt]cmd =0x53574545, len=84
44,391,385 >>> mbox cmd response data (200 bytes)
44,776,833 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,807,075 UART: [rt]cmd =0x52564348, len=36
44,809,499 >>> mbox cmd response data (8 bytes)
44,809,976 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,840,320 UART: [rt]cmd =0x53574545, len=84
44,844,110 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,480 writing to cptra_bootfsm_go
192,615 UART:
192,999 UART: Running Caliptra ROM ...
194,187 UART:
194,346 UART: [state] CFI Enabled
262,366 UART: [state] LifecycleState = Unprovisioned
264,211 UART: [state] DebugLocked = No
265,676 UART: [state] WD Timer not started. Device not locked for debugging
269,992 UART: [kat] SHA2-256
449,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,659 UART: [kat] ++
461,197 UART: [kat] sha1
472,006 UART: [kat] SHA2-256
475,025 UART: [kat] SHA2-384
481,446 UART: [kat] SHA2-512-ACC
484,382 UART: [kat] ECC-384
2,948,779 UART: [kat] HMAC-384Kdf
2,972,023 UART: [kat] LMS
3,501,508 UART: [kat] --
3,505,759 UART: [cold-reset] ++
3,506,856 UART: [fht] FHT @ 0x50003400
3,518,755 UART: [idev] ++
3,519,316 UART: [idev] CDI.KEYID = 6
3,520,200 UART: [idev] SUBJECT.KEYID = 7
3,521,443 UART: [idev] UDS.KEYID = 0
3,522,344 ready_for_fw is high
3,522,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,457 UART: [idev] Erasing UDS.KEYID = 0
6,028,575 UART: [idev] Sha1 KeyId Algorithm
6,052,822 UART: [idev] --
6,057,225 UART: [ldev] ++
6,057,807 UART: [ldev] CDI.KEYID = 6
6,058,739 UART: [ldev] SUBJECT.KEYID = 5
6,059,901 UART: [ldev] AUTHORITY.KEYID = 7
6,061,154 UART: [ldev] FE.KEYID = 1
6,099,893 UART: [ldev] Erasing FE.KEYID = 1
8,599,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,245 UART: [ldev] --
10,390,252 UART: [fwproc] Wait for Commands...
10,391,704 UART: [fwproc] Recv command 0x46574c44
10,393,799 UART: [fwproc] Recv'd Img size: 114360 bytes
13,792,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,259,124 >>> mbox cmd response: success
14,262,902 UART: [afmc] ++
14,263,520 UART: [afmc] CDI.KEYID = 6
14,264,440 UART: [afmc] SUBJECT.KEYID = 7
14,265,604 UART: [afmc] AUTHORITY.KEYID = 5
16,804,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,446 UART: [afmc] --
18,604,258 UART: [cold-reset] --
18,609,419 UART: [state] Locking Datavault
18,614,835 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,580 UART: [state] Locking ICCM
18,619,305 UART: [exit] Launching FMC @ 0x40000130
18,627,707 UART:
18,627,974 UART: Running Caliptra FMC ...
18,629,085 UART:
18,629,250 UART: [state] CFI Enabled
18,688,960 UART: [fht] FMC Alias Private Key: 7
20,452,653 UART: [art] Extend RT PCRs Done
20,453,874 UART: [art] Lock RT PCRs Done
20,455,470 UART: [art] Populate DV Done
20,460,832 UART: [fht] FMC Alias Private Key: 7
20,462,423 UART: [art] Derive CDI
20,463,159 UART: [art] Store in in slot 0x4
20,521,492 UART: [art] Derive Key Pair
20,522,494 UART: [art] Store priv key in slot 0x5
22,985,171 UART: [art] Derive Key Pair - Done
22,998,276 UART: [art] Signing Cert with AUTHO
22,999,578 UART: RITY.KEYID = 7
24,711,474 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,013 UART: [art] PUB.X = 5B0A861B7AD8F02AD67D23B8CE386A4A04526F1FBE4E9BFA41C0A7BDD13A7AB03388C25734DEFEE3BD1C3F2AB4929EFF
24,720,296 UART: [art] PUB.Y = 4720646C997470CB4D384B4AD68FB0757A4DA2C1E1FFEEE6BA5A03339B219EA15BA540A281964FE69AF885343A60E7D6
24,727,611 UART: [art] SIG.R = 9F6CDEACD2201DD8622807945324180D45786CD8502053FBB0523D5A8E77F0799926F0C70469D4C30C078D2FB6A278F5
24,734,982 UART: [art] SIG.S = 98E68A173E9508B60872DE47D1339BAC2C222B6BDA248499B1BE104FC02BC0626B74966DB93A9F9383E390EA2D4BBC4B
25,713,811 UART: Caliptra RT
25,714,516 UART: [state] CFI Enabled
25,880,394 UART: [rt] RT listening for mailbox commands...
25,882,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,913,420 UART: [rt]cmd =0x44504543, len=96
30,300,736 >>> mbox cmd response data (6236 bytes)
30,329,872 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,360,475 UART: [rt]cmd =0x53574545, len=84
34,532,062 >>> mbox cmd response data (200 bytes)
34,916,550 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,946,779 UART: [rt]cmd =0x52564348, len=36
34,949,283 >>> mbox cmd response data (8 bytes)
34,949,640 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,980,090 UART: [rt]cmd =0x53574545, len=84
34,984,139 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,709 writing to cptra_bootfsm_go
193,882 UART:
194,248 UART: Running Caliptra ROM ...
195,353 UART:
195,492 UART: [state] CFI Enabled
262,424 UART: [state] LifecycleState = Unprovisioned
264,840 UART: [state] DebugLocked = No
266,572 UART: [state] WD Timer not started. Device not locked for debugging
270,687 UART: [kat] SHA2-256
460,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,334 UART: [kat] ++
471,871 UART: [kat] sha1
482,462 UART: [kat] SHA2-256
485,523 UART: [kat] SHA2-384
491,093 UART: [kat] SHA2-512-ACC
493,681 UART: [kat] ECC-384
2,948,963 UART: [kat] HMAC-384Kdf
2,971,792 UART: [kat] LMS
3,503,593 UART: [kat] --
3,508,079 UART: [cold-reset] ++
3,510,223 UART: [fht] FHT @ 0x50003400
3,520,701 UART: [idev] ++
3,521,415 UART: [idev] CDI.KEYID = 6
3,522,488 UART: [idev] SUBJECT.KEYID = 7
3,523,606 UART: [idev] UDS.KEYID = 0
3,524,505 ready_for_fw is high
3,524,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,474 UART: [idev] Erasing UDS.KEYID = 0
6,027,664 UART: [idev] Sha1 KeyId Algorithm
6,049,194 UART: [idev] --
6,053,840 UART: [ldev] ++
6,054,525 UART: [ldev] CDI.KEYID = 6
6,055,415 UART: [ldev] SUBJECT.KEYID = 5
6,056,490 UART: [ldev] AUTHORITY.KEYID = 7
6,057,833 UART: [ldev] FE.KEYID = 1
6,099,946 UART: [ldev] Erasing FE.KEYID = 1
8,606,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,009 UART: [ldev] --
10,415,293 UART: [fwproc] Wait for Commands...
10,417,602 UART: [fwproc] Recv command 0x46574c44
10,419,916 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,606,191 >>> mbox cmd response: success
14,609,859 UART: [afmc] ++
14,610,570 UART: [afmc] CDI.KEYID = 6
14,611,761 UART: [afmc] SUBJECT.KEYID = 7
14,613,197 UART: [afmc] AUTHORITY.KEYID = 5
17,150,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,482 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,829 UART: [afmc] --
18,950,692 UART: [cold-reset] --
18,953,767 UART: [state] Locking Datavault
18,958,283 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,431 UART: [state] Locking ICCM
18,962,348 UART: [exit] Launching FMC @ 0x40000130
18,971,003 UART:
18,971,256 UART: Running Caliptra FMC ...
18,972,359 UART:
18,972,522 UART: [state] CFI Enabled
19,032,070 UART: [fht] FMC Alias Private Key: 7
20,796,280 UART: [art] Extend RT PCRs Done
20,797,497 UART: [art] Lock RT PCRs Done
20,799,550 UART: [art] Populate DV Done
20,804,914 UART: [fht] FMC Alias Private Key: 7
20,806,382 UART: [art] Derive CDI
20,807,122 UART: [art] Store in in slot 0x4
20,864,640 UART: [art] Derive Key Pair
20,865,660 UART: [art] Store priv key in slot 0x5
23,328,547 UART: [art] Derive Key Pair - Done
23,341,324 UART: [art] Signing Cert with AUTHO
23,342,634 UART: RITY.KEYID = 7
25,054,419 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,925 UART: [art] PUB.X = 52424E3696605D14FF17F3BEEDEA28E9D4088366EDC2573C6F3D9CB2A223CD8231AE3C978D45F277596FDF131734363A
25,063,212 UART: [art] PUB.Y = 8C2F28C3A23817E2B1F79E7A749960A9CC27E6F3A18EBD8755A8D334FF6DE9D3D27F2EEEA1F23171B143BE46D0A7979C
25,070,481 UART: [art] SIG.R = 4BBDB7A392A211CF24D82CDE95AE04E3318E1CA0D1F14FB437227475F9654648E3EC9688A7A48E56F34C8D1F77DEC603
25,077,920 UART: [art] SIG.S = 81646CB65A8EC1A3DADF410E9851411AD033149818A69A0E1E5E663B7B00C08E6C0AF435BDC18F32AC552D4CE880DE4A
26,057,003 UART: Caliptra RT
26,057,700 UART: [state] CFI Enabled
26,222,097 UART: [rt] RT listening for mailbox commands...
26,224,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,864 UART: [rt]cmd =0x44504543, len=96
30,622,114 >>> mbox cmd response data (6236 bytes)
30,651,494 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,682,181 UART: [rt]cmd =0x53574545, len=84
34,852,822 >>> mbox cmd response data (200 bytes)
35,237,194 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,267,618 UART: [rt]cmd =0x52564348, len=36
35,270,356 >>> mbox cmd response data (8 bytes)
35,270,794 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,301,128 UART: [rt]cmd =0x53574545, len=84
35,305,206 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,436,619 ready_for_fw is high
3,437,012 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,727,325 >>> mbox cmd response: success
19,022,012 UART:
19,022,409 UART: Running Caliptra FMC ...
19,023,570 UART:
19,023,733 UART: [state] CFI Enabled
19,092,181 UART: [fht] FMC Alias Private Key: 7
20,855,486 UART: [art] Extend RT PCRs Done
20,856,740 UART: [art] Lock RT PCRs Done
20,858,528 UART: [art] Populate DV Done
20,863,835 UART: [fht] FMC Alias Private Key: 7
20,865,548 UART: [art] Derive CDI
20,866,364 UART: [art] Store in in slot 0x4
20,925,419 UART: [art] Derive Key Pair
20,926,461 UART: [art] Store priv key in slot 0x5
23,389,943 UART: [art] Derive Key Pair - Done
23,402,833 UART: [art] Signing Cert with AUTHO
23,404,140 UART: RITY.KEYID = 7
25,115,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,548 UART: [art] PUB.X = CA0AB49315489992FC986B30116114FC89376E6BD3F1FD00389546E13E1095BBEBE41BC4D3688B0E9BC1D8A7ECCBF3F0
25,123,771 UART: [art] PUB.Y = 2E6763E5A4FE677530F859EE4381D0167E2CB394CA3EF4FC576710680FC6B83705095E65052831548637F2AA9E7B3B7E
25,131,020 UART: [art] SIG.R = 88980C9F2046D27237568C23DEA463FFFF4AA721E714ACFD9CF8118874A757712735936B817BB222F235009FE45BB4EB
25,138,405 UART: [art] SIG.S = ABFC8007F1379A131F7FBBFF0CA3C5AE67860B06430C19242B81EB19541B27CD26C4F7D98DEFD7B921E21912F4838EA8
26,117,447 UART: Caliptra RT
26,118,157 UART: [state] CFI Enabled
26,283,866 UART: [rt] RT listening for mailbox commands...
26,286,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,316,915 UART: [rt]cmd =0x44504543, len=96
30,704,008 >>> mbox cmd response data (6236 bytes)
30,733,329 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,763,896 UART: [rt]cmd =0x53574545, len=84
34,934,208 >>> mbox cmd response data (200 bytes)
35,320,634 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,350,958 UART: [rt]cmd =0x52564348, len=36
35,353,723 >>> mbox cmd response data (8 bytes)
35,354,170 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,384,725 UART: [rt]cmd =0x53574545, len=84
35,388,327 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,501 UART:
192,906 UART: Running Caliptra ROM ...
194,022 UART:
603,771 UART: [state] CFI Enabled
616,888 UART: [state] LifecycleState = Unprovisioned
619,261 UART: [state] DebugLocked = No
620,853 UART: [state] WD Timer not started. Device not locked for debugging
625,896 UART: [kat] SHA2-256
815,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,569 UART: [kat] ++
827,016 UART: [kat] sha1
839,313 UART: [kat] SHA2-256
842,322 UART: [kat] SHA2-384
849,873 UART: [kat] SHA2-512-ACC
852,448 UART: [kat] ECC-384
3,294,575 UART: [kat] HMAC-384Kdf
3,307,805 UART: [kat] LMS
3,839,654 UART: [kat] --
3,843,861 UART: [cold-reset] ++
3,844,999 UART: [fht] FHT @ 0x50003400
3,856,911 UART: [idev] ++
3,857,589 UART: [idev] CDI.KEYID = 6
3,858,510 UART: [idev] SUBJECT.KEYID = 7
3,859,757 UART: [idev] UDS.KEYID = 0
3,860,683 ready_for_fw is high
3,860,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,424 UART: [idev] Erasing UDS.KEYID = 0
6,342,002 UART: [idev] Sha1 KeyId Algorithm
6,365,114 UART: [idev] --
6,368,981 UART: [ldev] ++
6,369,665 UART: [ldev] CDI.KEYID = 6
6,370,592 UART: [ldev] SUBJECT.KEYID = 5
6,371,747 UART: [ldev] AUTHORITY.KEYID = 7
6,372,975 UART: [ldev] FE.KEYID = 1
6,384,101 UART: [ldev] Erasing FE.KEYID = 1
8,865,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,035 UART: [ldev] --
10,653,325 UART: [fwproc] Wait for Commands...
10,654,809 UART: [fwproc] Recv command 0x46574c44
10,657,072 UART: [fwproc] Recv'd Img size: 114360 bytes
14,101,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,837,763 >>> mbox cmd response: success
14,842,046 UART: [afmc] ++
14,842,760 UART: [afmc] CDI.KEYID = 6
14,843,998 UART: [afmc] SUBJECT.KEYID = 7
14,845,421 UART: [afmc] AUTHORITY.KEYID = 5
17,345,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,917 UART: [afmc] --
19,138,844 UART: [cold-reset] --
19,143,951 UART: [state] Locking Datavault
19,149,952 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,133 UART: [state] Locking ICCM
19,154,569 UART: [exit] Launching FMC @ 0x40000130
19,163,234 UART:
19,163,479 UART: Running Caliptra FMC ...
19,164,579 UART:
19,164,736 UART: [state] CFI Enabled
19,172,831 UART: [fht] FMC Alias Private Key: 7
20,929,602 UART: [art] Extend RT PCRs Done
20,930,817 UART: [art] Lock RT PCRs Done
20,932,596 UART: [art] Populate DV Done
20,938,162 UART: [fht] FMC Alias Private Key: 7
20,939,804 UART: [art] Derive CDI
20,940,612 UART: [art] Store in in slot 0x4
20,983,387 UART: [art] Derive Key Pair
20,984,444 UART: [art] Store priv key in slot 0x5
23,410,805 UART: [art] Derive Key Pair - Done
23,423,580 UART: [art] Signing Cert with AUTHO
23,424,900 UART: RITY.KEYID = 7
25,130,268 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,765 UART: [art] PUB.X = ACA0AE0AF99108943FB4DFEE32226D4DB695B08327E99AB48771AFF726A09B56F48D31F96BB6BA2B769252C3C3E8B165
25,139,088 UART: [art] PUB.Y = 41D0141145D75172DCB5A4D0B849AE20628A2EBA200C5D4C91AEA3AFA5AE74F801188AC19398C8B0DDC41A81B7059FE9
25,146,341 UART: [art] SIG.R = E88D8124925BF5F2E5EBE1A937A66D2F9A14A47D46F134181ABE9C87FDAC2F0E2962F1721EB0CFF9BFDE4A75AFEC8938
25,153,733 UART: [art] SIG.S = 3FA5254A5A2D508E745251E560594BFD6D59296B076E9E6194C03640687FE471271512CB4F8F18A0E08BD47C1E296E99
26,132,892 UART: Caliptra RT
26,133,580 UART: [state] CFI Enabled
26,250,748 UART: [rt] RT listening for mailbox commands...
26,253,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,014 UART: [rt]cmd =0x44504543, len=96
30,574,213 >>> mbox cmd response data (6236 bytes)
30,603,391 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,634,049 UART: [rt]cmd =0x53574545, len=84
34,769,011 >>> mbox cmd response data (200 bytes)
35,155,110 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,185,804 UART: [rt]cmd =0x52564348, len=36
35,188,100 >>> mbox cmd response data (8 bytes)
35,188,540 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,219,035 UART: [rt]cmd =0x53574545, len=84
35,222,625 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,757,618 ready_for_fw is high
3,758,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,956,907 >>> mbox cmd response: success
19,214,431 UART:
19,214,828 UART: Running Caliptra FMC ...
19,216,033 UART:
19,216,230 UART: [state] CFI Enabled
19,223,963 UART: [fht] FMC Alias Private Key: 7
20,980,916 UART: [art] Extend RT PCRs Done
20,982,131 UART: [art] Lock RT PCRs Done
20,983,757 UART: [art] Populate DV Done
20,989,166 UART: [fht] FMC Alias Private Key: 7
20,990,652 UART: [art] Derive CDI
20,991,417 UART: [art] Store in in slot 0x4
21,034,086 UART: [art] Derive Key Pair
21,035,093 UART: [art] Store priv key in slot 0x5
23,462,240 UART: [art] Derive Key Pair - Done
23,474,924 UART: [art] Signing Cert with AUTHO
23,476,235 UART: RITY.KEYID = 7
25,181,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,774 UART: [art] PUB.X = 31E7F1E02C45A44D0F97DFFA499A8C90E0A6B54E0E86CFF093CEC1DEFFE44AA7B32154F788133117A9E774AD9EB1A90E
25,190,087 UART: [art] PUB.Y = BA7224B747F1F594A18668F0D537B8C79E96A58A050AB48916F99F92804520FB591D7D0A6863CEC0993775A4685D41EA
25,197,307 UART: [art] SIG.R = 2EF56ED89A394F0EDE5F4F539CCB58C58A9FCD160C9A7A0411A57128E085011EB68C30D625A073848FA4DD7B158647CA
25,204,763 UART: [art] SIG.S = 8A011B53A1325EB320E1DC3CCF4DA182789338C4625C5B4AA7894F50BAE8E20E45B2D82FC6777CF707B6EFF9D798C4A1
26,183,875 UART: Caliptra RT
26,184,568 UART: [state] CFI Enabled
26,301,793 UART: [rt] RT listening for mailbox commands...
26,304,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,806 UART: [rt]cmd =0x44504543, len=96
30,625,533 >>> mbox cmd response data (6236 bytes)
30,654,860 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,685,368 UART: [rt]cmd =0x53574545, len=84
34,821,536 >>> mbox cmd response data (200 bytes)
35,206,446 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,236,756 UART: [rt]cmd =0x52564348, len=36
35,239,758 >>> mbox cmd response data (8 bytes)
35,240,194 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,270,607 UART: [rt]cmd =0x53574545, len=84
35,274,382 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,688 UART: [kat] HMAC-384Kdf
907,244 UART: [kat] LMS
1,475,440 UART: [kat] --
1,476,359 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,660 UART: [idev] ++
1,479,828 UART: [idev] CDI.KEYID = 6
1,480,188 UART: [idev] SUBJECT.KEYID = 7
1,480,612 UART: [idev] UDS.KEYID = 0
1,480,957 ready_for_fw is high
1,480,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,510 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,112 UART: [idev] --
1,515,285 UART: [ldev] ++
1,515,453 UART: [ldev] CDI.KEYID = 6
1,515,816 UART: [ldev] SUBJECT.KEYID = 5
1,516,242 UART: [ldev] AUTHORITY.KEYID = 7
1,516,705 UART: [ldev] FE.KEYID = 1
1,521,833 UART: [ldev] Erasing FE.KEYID = 1
1,547,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,646 UART: [ldev] --
1,587,039 UART: [fwproc] Waiting for Commands...
1,587,722 UART: [fwproc] Received command 0x46574c44
1,588,513 UART: [fwproc] Received Image of size 114360 bytes
2,886,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,862 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,214 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,091 >>> mbox cmd response: success
3,080,183 UART: [afmc] ++
3,080,351 UART: [afmc] CDI.KEYID = 6
3,080,713 UART: [afmc] SUBJECT.KEYID = 7
3,081,138 UART: [afmc] AUTHORITY.KEYID = 5
3,115,555 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,314 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,004 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,865 UART: [afmc] --
3,158,827 UART: [cold-reset] --
3,159,739 UART: [state] Locking Datavault
3,161,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,742 UART: [state] Locking ICCM
3,162,200 UART: [exit] Launching FMC @ 0x40000130
3,167,529 UART:
3,167,545 UART: Running Caliptra FMC ...
3,167,953 UART:
3,168,007 UART: [state] CFI Enabled
3,178,482 UART: [fht] FMC Alias Private Key: 7
3,285,889 UART: [art] Extend RT PCRs Done
3,286,317 UART: [art] Lock RT PCRs Done
3,287,797 UART: [art] Populate DV Done
3,295,962 UART: [fht] FMC Alias Private Key: 7
3,297,094 UART: [art] Derive CDI
3,297,374 UART: [art] Store in in slot 0x4
3,383,205 UART: [art] Derive Key Pair
3,383,565 UART: [art] Store priv key in slot 0x5
3,396,737 UART: [art] Derive Key Pair - Done
3,411,380 UART: [art] Signing Cert with AUTHO
3,411,860 UART: RITY.KEYID = 7
3,427,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,251 UART: [art] PUB.X = F4EA075745940BED2B57F907CF21816FF104657F1E8468D7B7C7295EABE3C60EFA4870F49BC3F75C25FBDCA8629869E4
3,435,016 UART: [art] PUB.Y = 65A504CB6628DC38D176A81EFCAFBAA3B71B69704AF6F783B69C076D2D5B4ABEF913B0E09F3943E768A915C60CCDD091
3,441,973 UART: [art] SIG.R = 43F130E5F59D345ED8B83EE3068A98E0C5E29AF1D47D8CC44DD2789D343F0269057C3D1D21CAA2F9EF007FF60DE930D3
3,448,721 UART: [art] SIG.S = 23BA489BF1D290D9C51510CC0ECD0796350E357BA9DC3982D517ABD9B527C0E3C3333F37B2616FBB92FFF5ACB62C4875
3,472,403 UART: Caliptra RT
3,472,657 UART: [state] CFI Enabled
3,580,358 UART: [rt] RT listening for mailbox commands...
3,581,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,149 UART: [rt]cmd =0x44504543, len=96
3,799,145 >>> mbox cmd response data (6236 bytes)
3,799,146 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,037 UART: [rt]cmd =0x53574545, len=84
3,854,924 >>> mbox cmd response data (200 bytes)
3,854,925 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,430 UART: [rt]cmd =0x52564348, len=36
3,886,591 >>> mbox cmd response data (8 bytes)
3,886,592 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,439 UART: [rt]cmd =0x53574545, len=84
3,919,669 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,087 ready_for_fw is high
1,363,087 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,053 >>> mbox cmd response: success
2,990,287 UART:
2,990,303 UART: Running Caliptra FMC ...
2,990,711 UART:
2,990,765 UART: [state] CFI Enabled
3,001,580 UART: [fht] FMC Alias Private Key: 7
3,109,555 UART: [art] Extend RT PCRs Done
3,109,983 UART: [art] Lock RT PCRs Done
3,111,611 UART: [art] Populate DV Done
3,119,820 UART: [fht] FMC Alias Private Key: 7
3,120,882 UART: [art] Derive CDI
3,121,162 UART: [art] Store in in slot 0x4
3,206,813 UART: [art] Derive Key Pair
3,207,173 UART: [art] Store priv key in slot 0x5
3,220,443 UART: [art] Derive Key Pair - Done
3,234,554 UART: [art] Signing Cert with AUTHO
3,235,034 UART: RITY.KEYID = 7
3,250,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,113 UART: [art] PUB.X = 7D55CAE98051ACBABC42330D5B2CC7D1A59AEC960F666A9CD1A3FA5411DD6729AE748F98099E62E5CB37E569CD6E40DF
3,257,894 UART: [art] PUB.Y = A7ADC55B9610194494824174E5502DFBB1DF9AB4663F6EA072C9B13284AD0E74667DED35B47B45E537689F180BDA5D52
3,264,842 UART: [art] SIG.R = 4F0DA572828ADE819E8EE0735FDA9C5EA89B6C3463677CA5F45E928CEF36D6A5CF27290786F17E86A5FC5E51511CCB51
3,271,618 UART: [art] SIG.S = D1A1C1BA0E8666E8EC8F4840937D46280E917433069E2389AFA75F385F7839C30402A3ABBD8789AD2C1DDD7D16988F4B
3,295,566 UART: Caliptra RT
3,295,820 UART: [state] CFI Enabled
3,405,324 UART: [rt] RT listening for mailbox commands...
3,405,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,111 UART: [rt]cmd =0x44504543, len=96
3,624,092 >>> mbox cmd response data (6236 bytes)
3,624,093 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,992 UART: [rt]cmd =0x53574545, len=84
3,679,945 >>> mbox cmd response data (200 bytes)
3,679,946 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,659 UART: [rt]cmd =0x52564348, len=36
3,711,714 >>> mbox cmd response data (8 bytes)
3,711,715 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,808 UART: [rt]cmd =0x53574545, len=84
3,744,940 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,173 UART: [kat] LMS
1,475,369 UART: [kat] --
1,476,088 UART: [cold-reset] ++
1,476,568 UART: [fht] Storing FHT @ 0x50003400
1,479,581 UART: [idev] ++
1,479,749 UART: [idev] CDI.KEYID = 6
1,480,109 UART: [idev] SUBJECT.KEYID = 7
1,480,533 UART: [idev] UDS.KEYID = 0
1,480,878 ready_for_fw is high
1,480,878 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,577 UART: [idev] Erasing UDS.KEYID = 0
1,505,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,955 UART: [idev] --
1,514,964 UART: [ldev] ++
1,515,132 UART: [ldev] CDI.KEYID = 6
1,515,495 UART: [ldev] SUBJECT.KEYID = 5
1,515,921 UART: [ldev] AUTHORITY.KEYID = 7
1,516,384 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,547,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,405 UART: [ldev] --
1,586,686 UART: [fwproc] Waiting for Commands...
1,587,357 UART: [fwproc] Received command 0x46574c44
1,588,148 UART: [fwproc] Received Image of size 114360 bytes
2,885,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,811 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,163 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,152 >>> mbox cmd response: success
3,080,290 UART: [afmc] ++
3,080,458 UART: [afmc] CDI.KEYID = 6
3,080,820 UART: [afmc] SUBJECT.KEYID = 7
3,081,245 UART: [afmc] AUTHORITY.KEYID = 5
3,116,602 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,916 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,309 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,999 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,762 UART: [afmc] --
3,159,776 UART: [cold-reset] --
3,160,698 UART: [state] Locking Datavault
3,161,839 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,443 UART: [state] Locking ICCM
3,162,929 UART: [exit] Launching FMC @ 0x40000130
3,168,258 UART:
3,168,274 UART: Running Caliptra FMC ...
3,168,682 UART:
3,168,825 UART: [state] CFI Enabled
3,179,658 UART: [fht] FMC Alias Private Key: 7
3,287,287 UART: [art] Extend RT PCRs Done
3,287,715 UART: [art] Lock RT PCRs Done
3,289,005 UART: [art] Populate DV Done
3,297,188 UART: [fht] FMC Alias Private Key: 7
3,298,342 UART: [art] Derive CDI
3,298,622 UART: [art] Store in in slot 0x4
3,384,223 UART: [art] Derive Key Pair
3,384,583 UART: [art] Store priv key in slot 0x5
3,398,145 UART: [art] Derive Key Pair - Done
3,413,028 UART: [art] Signing Cert with AUTHO
3,413,508 UART: RITY.KEYID = 7
3,428,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,285 UART: [art] PUB.X = 35CB438FA221913E2D75583310B3AD40FDAAE8A6823BA33DEBC790F04BE512FD7BD7EE37C3574661654103C3DB66C1E9
3,436,062 UART: [art] PUB.Y = 7CABD6227C2AEE0C56E9F1DE82D6A2ABAB48E08A2FB07AD586FBE4A825C5D0490F8105C567D5EBC7AB1B1E69920777CC
3,443,024 UART: [art] SIG.R = CD677E5F1920B6DAF5B0FC5F9C94ECA040FE64FC5F19D64D2B5BEC11C90C9253F992E986B47B69FC5B55DC32630DB175
3,449,806 UART: [art] SIG.S = B82D0F3E5217D273109362BC504C0963C5D5E71E5797DE136C6CB26439A4793153F8AB53963914AF2A3F9E08B019AA3F
3,472,810 UART: Caliptra RT
3,473,156 UART: [state] CFI Enabled
3,582,265 UART: [rt] RT listening for mailbox commands...
3,582,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,872 UART: [rt]cmd =0x44504543, len=96
3,801,518 >>> mbox cmd response data (6236 bytes)
3,801,519 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,831,300 UART: [rt]cmd =0x53574545, len=84
3,857,307 >>> mbox cmd response data (200 bytes)
3,857,308 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,819 UART: [rt]cmd =0x52564348, len=36
3,888,768 >>> mbox cmd response data (8 bytes)
3,888,769 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,786 UART: [rt]cmd =0x53574545, len=84
3,921,754 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,590 ready_for_fw is high
1,363,590 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,890 >>> mbox cmd response: success
2,988,786 UART:
2,988,802 UART: Running Caliptra FMC ...
2,989,210 UART:
2,989,353 UART: [state] CFI Enabled
3,000,008 UART: [fht] FMC Alias Private Key: 7
3,108,495 UART: [art] Extend RT PCRs Done
3,108,923 UART: [art] Lock RT PCRs Done
3,110,405 UART: [art] Populate DV Done
3,118,730 UART: [fht] FMC Alias Private Key: 7
3,119,666 UART: [art] Derive CDI
3,119,946 UART: [art] Store in in slot 0x4
3,205,713 UART: [art] Derive Key Pair
3,206,073 UART: [art] Store priv key in slot 0x5
3,219,225 UART: [art] Derive Key Pair - Done
3,233,754 UART: [art] Signing Cert with AUTHO
3,234,234 UART: RITY.KEYID = 7
3,249,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,459 UART: [art] PUB.X = 9FF83428E4B8B367B27CB10FECB436398EAB9E1AB11EDC162F2D93957BB724D1A2C6709440A4C78BDFBBD93DAF4DD7BA
3,257,250 UART: [art] PUB.Y = 288B35F4FE02775517881B78F2817954EB84C316801BE3CB265C0BCEB8D9A6994D0D09C3CFD166A385C2E638F0D568B1
3,264,190 UART: [art] SIG.R = C8B6B67A76755370F3DC1864C99DA3B533F7B40AF0D0B337E835C07A81B1D7B0364179636377862B4190E7AE7EDE5C98
3,270,957 UART: [art] SIG.S = AECE98C87AAD2148D6133A246B971C5B55A840630E2D5DBB1D3B2E7DE3FB46ACDD37A14F6767178FDCA51EBA671EBC1D
3,294,977 UART: Caliptra RT
3,295,323 UART: [state] CFI Enabled
3,405,190 UART: [rt] RT listening for mailbox commands...
3,405,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,921 UART: [rt]cmd =0x44504543, len=96
3,623,811 >>> mbox cmd response data (6236 bytes)
3,623,812 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,721 UART: [rt]cmd =0x53574545, len=84
3,679,084 >>> mbox cmd response data (200 bytes)
3,679,085 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,498 UART: [rt]cmd =0x52564348, len=36
3,710,721 >>> mbox cmd response data (8 bytes)
3,710,722 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,621 UART: [rt]cmd =0x53574545, len=84
3,743,653 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,216 UART: [kat] LMS
1,170,544 UART: [kat] --
1,171,555 UART: [cold-reset] ++
1,171,887 UART: [fht] FHT @ 0x50003400
1,174,400 UART: [idev] ++
1,174,568 UART: [idev] CDI.KEYID = 6
1,174,928 UART: [idev] SUBJECT.KEYID = 7
1,175,352 UART: [idev] UDS.KEYID = 0
1,175,697 ready_for_fw is high
1,175,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,369 UART: [ldev] Erasing FE.KEYID = 1
1,241,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,305 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,184 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,842 >>> mbox cmd response: success
2,773,070 UART: [afmc] ++
2,773,238 UART: [afmc] CDI.KEYID = 6
2,773,600 UART: [afmc] SUBJECT.KEYID = 7
2,774,025 UART: [afmc] AUTHORITY.KEYID = 5
2,809,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,653 UART: [afmc] --
2,852,783 UART: [cold-reset] --
2,853,819 UART: [state] Locking Datavault
2,855,146 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,750 UART: [state] Locking ICCM
2,856,238 UART: [exit] Launching FMC @ 0x40000130
2,861,567 UART:
2,861,583 UART: Running Caliptra FMC ...
2,861,991 UART:
2,862,045 UART: [state] CFI Enabled
2,872,430 UART: [fht] FMC Alias Private Key: 7
2,980,503 UART: [art] Extend RT PCRs Done
2,980,931 UART: [art] Lock RT PCRs Done
2,982,549 UART: [art] Populate DV Done
2,990,760 UART: [fht] FMC Alias Private Key: 7
2,991,926 UART: [art] Derive CDI
2,992,206 UART: [art] Store in in slot 0x4
3,077,595 UART: [art] Derive Key Pair
3,077,955 UART: [art] Store priv key in slot 0x5
3,091,807 UART: [art] Derive Key Pair - Done
3,106,724 UART: [art] Signing Cert with AUTHO
3,107,204 UART: RITY.KEYID = 7
3,122,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,413 UART: [art] PUB.X = 3A730B2623643147A843AB40F6FF08253F579B600A4D879EDDAC9A9C46E5FD934AB8CF22458B0C24739D05D8C452505C
3,130,170 UART: [art] PUB.Y = 4559DBDF6E10C83DCF28354611E76F9508564101CFF83B0831A0B900AA78D08642BA6DA64F697B47FDE351D6CB487583
3,137,091 UART: [art] SIG.R = 341A3A261887F04086A57C9C1ECF57201061980FF4A41DF963A9B7717F59B6C377D7A21E8CD0A09330DF13ADB781CEE0
3,143,862 UART: [art] SIG.S = 23837B5D2A79990AB91257E85D04D5A6ACD5DBBF9889329B3CF9DE88E9695F348F2518C6686D7004CF65F6706A9E9585
3,167,310 UART: Caliptra RT
3,167,564 UART: [state] CFI Enabled
3,276,102 UART: [rt] RT listening for mailbox commands...
3,276,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,775 UART: [rt]cmd =0x44504543, len=96
3,495,406 >>> mbox cmd response data (6236 bytes)
3,495,407 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,112 UART: [rt]cmd =0x53574545, len=84
3,549,999 >>> mbox cmd response data (200 bytes)
3,550,000 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,501 UART: [rt]cmd =0x52564348, len=36
3,581,772 >>> mbox cmd response data (8 bytes)
3,581,773 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,840 UART: [rt]cmd =0x53574545, len=84
3,614,948 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,849 ready_for_fw is high
1,060,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,845 >>> mbox cmd response: success
2,687,743 UART:
2,687,759 UART: Running Caliptra FMC ...
2,688,167 UART:
2,688,221 UART: [state] CFI Enabled
2,698,494 UART: [fht] FMC Alias Private Key: 7
2,805,625 UART: [art] Extend RT PCRs Done
2,806,053 UART: [art] Lock RT PCRs Done
2,807,577 UART: [art] Populate DV Done
2,815,640 UART: [fht] FMC Alias Private Key: 7
2,816,652 UART: [art] Derive CDI
2,816,932 UART: [art] Store in in slot 0x4
2,902,543 UART: [art] Derive Key Pair
2,902,903 UART: [art] Store priv key in slot 0x5
2,915,899 UART: [art] Derive Key Pair - Done
2,930,716 UART: [art] Signing Cert with AUTHO
2,931,196 UART: RITY.KEYID = 7
2,946,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,233 UART: [art] PUB.X = 23086135FA3F93870A49D0445D1D1CAC3D99D6248E05F5F005CB6E14414AAA972D27D92CBA912FEBE0EFD2A53BD36652
2,954,001 UART: [art] PUB.Y = 085836E550428B6ABF0735941E5998B2098DC52B84D2814A02A2935432493B256D7B2C3AEDA200271A4FFE65D9012E10
2,960,906 UART: [art] SIG.R = E81767AE7CE9C4380EC6A4EAEFEAF287A180D04A49CCCD5DEFE486963EF68EF5DCCFB0EEF6B5AAA3437F1B6D2ADEA9F9
2,967,713 UART: [art] SIG.S = 553587EB8AEB0EB11DED774C2D21DF1C46C9F46B329BEF75CE692B6D0C55113A508C7DC92B8C3E0563F1EA7B8E242CA4
2,991,379 UART: Caliptra RT
2,991,633 UART: [state] CFI Enabled
3,098,637 UART: [rt] RT listening for mailbox commands...
3,099,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,384 UART: [rt]cmd =0x44504543, len=96
3,318,231 >>> mbox cmd response data (6236 bytes)
3,318,232 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,287 UART: [rt]cmd =0x53574545, len=84
3,373,520 >>> mbox cmd response data (200 bytes)
3,373,521 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,186 UART: [rt]cmd =0x52564348, len=36
3,405,161 >>> mbox cmd response data (8 bytes)
3,405,162 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,015 UART: [rt]cmd =0x53574545, len=84
3,438,365 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
893,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,052 UART: [kat] ++
898,204 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
907,127 UART: [kat] SHA2-512-ACC
909,028 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
923,051 UART: [kat] LMS
1,171,379 UART: [kat] --
1,172,586 UART: [cold-reset] ++
1,173,166 UART: [fht] FHT @ 0x50003400
1,175,749 UART: [idev] ++
1,175,917 UART: [idev] CDI.KEYID = 6
1,176,277 UART: [idev] SUBJECT.KEYID = 7
1,176,701 UART: [idev] UDS.KEYID = 0
1,177,046 ready_for_fw is high
1,177,046 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,739 UART: [idev] Erasing UDS.KEYID = 0
1,201,718 UART: [idev] Sha1 KeyId Algorithm
1,210,304 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,217,788 UART: [ldev] Erasing FE.KEYID = 1
1,243,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,466 UART: [ldev] --
1,282,941 UART: [fwproc] Wait for Commands...
1,283,533 UART: [fwproc] Recv command 0x46574c44
1,284,261 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,765 >>> mbox cmd response: success
2,773,915 UART: [afmc] ++
2,774,083 UART: [afmc] CDI.KEYID = 6
2,774,445 UART: [afmc] SUBJECT.KEYID = 7
2,774,870 UART: [afmc] AUTHORITY.KEYID = 5
2,810,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,426 UART: [afmc] --
2,854,326 UART: [cold-reset] --
2,855,144 UART: [state] Locking Datavault
2,856,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,839 UART: [state] Locking ICCM
2,857,363 UART: [exit] Launching FMC @ 0x40000130
2,862,692 UART:
2,862,708 UART: Running Caliptra FMC ...
2,863,116 UART:
2,863,259 UART: [state] CFI Enabled
2,873,838 UART: [fht] FMC Alias Private Key: 7
2,981,875 UART: [art] Extend RT PCRs Done
2,982,303 UART: [art] Lock RT PCRs Done
2,983,613 UART: [art] Populate DV Done
2,991,650 UART: [fht] FMC Alias Private Key: 7
2,992,832 UART: [art] Derive CDI
2,993,112 UART: [art] Store in in slot 0x4
3,078,787 UART: [art] Derive Key Pair
3,079,147 UART: [art] Store priv key in slot 0x5
3,092,427 UART: [art] Derive Key Pair - Done
3,106,934 UART: [art] Signing Cert with AUTHO
3,107,414 UART: RITY.KEYID = 7
3,122,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,059 UART: [art] PUB.X = B526C7582010D93EA4AA36F30096AC505B5D5373B6910904D4A026BF787FEB57413CC780E47E6AAC1BC81C1302255939
3,129,796 UART: [art] PUB.Y = 8BE220569AB34484BDE980503FD93F39D5265ABCFC68DD3DC1B776833983322DD87361B95ECB219802209706DA854D09
3,136,735 UART: [art] SIG.R = A31265672F6F89CCCF1414B6F2F2C54DA948973EDBA6A8135671F0764AD46E053F401D822AF658E8528B78B48CF92676
3,143,502 UART: [art] SIG.S = DF200E897F89FF360E2904C53728042613D3B760CAB4F8CEE98BB2D3AB50746D9375071FE4571F4063EFC9323A76918D
3,167,912 UART: Caliptra RT
3,168,258 UART: [state] CFI Enabled
3,276,145 UART: [rt] RT listening for mailbox commands...
3,276,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,916 UART: [rt]cmd =0x44504543, len=96
3,493,700 >>> mbox cmd response data (6236 bytes)
3,493,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,562 UART: [rt]cmd =0x53574545, len=84
3,549,485 >>> mbox cmd response data (200 bytes)
3,549,486 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,063 UART: [rt]cmd =0x52564348, len=36
3,581,260 >>> mbox cmd response data (8 bytes)
3,581,261 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,364 UART: [rt]cmd =0x53574545, len=84
3,614,188 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,628 ready_for_fw is high
1,059,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,196 >>> mbox cmd response: success
2,687,844 UART:
2,687,860 UART: Running Caliptra FMC ...
2,688,268 UART:
2,688,411 UART: [state] CFI Enabled
2,699,344 UART: [fht] FMC Alias Private Key: 7
2,807,469 UART: [art] Extend RT PCRs Done
2,807,897 UART: [art] Lock RT PCRs Done
2,809,379 UART: [art] Populate DV Done
2,817,620 UART: [fht] FMC Alias Private Key: 7
2,818,758 UART: [art] Derive CDI
2,819,038 UART: [art] Store in in slot 0x4
2,905,145 UART: [art] Derive Key Pair
2,905,505 UART: [art] Store priv key in slot 0x5
2,919,321 UART: [art] Derive Key Pair - Done
2,933,835 UART: [art] Signing Cert with AUTHO
2,934,315 UART: RITY.KEYID = 7
2,949,601 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,366 UART: [art] PUB.X = E7F7B4D7ACF0CF55257B41903A205097E5DDAA89B708016740716D58476DBE5E0E6CABABA6C847E59E7775444E1AADD1
2,957,139 UART: [art] PUB.Y = 95145676F4E59ED3C4DD0E026F7A3C93B5219A8373018DF011468D0FAA919738EBFCFDAA34362C03821235B581C45BE7
2,964,076 UART: [art] SIG.R = 5C6FA24B34C19DD6896350C98C617DEDB6AACF2AB40EF240975031AA15F29EC2897EF36EA7BE08C847D2B5B56B60254B
2,970,854 UART: [art] SIG.S = C9FEB38A14132A381F31A18E816791D02F7E854763C844C62DDF4C7E153D9C32DC71BDF28FBEC9FB5C42F22EE18CC3E4
2,994,833 UART: Caliptra RT
2,995,179 UART: [state] CFI Enabled
3,102,639 UART: [rt] RT listening for mailbox commands...
3,103,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,606 UART: [rt]cmd =0x44504543, len=96
3,320,985 >>> mbox cmd response data (6236 bytes)
3,320,986 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,817 UART: [rt]cmd =0x53574545, len=84
3,376,834 >>> mbox cmd response data (200 bytes)
3,376,835 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,502 UART: [rt]cmd =0x52564348, len=36
3,408,547 >>> mbox cmd response data (8 bytes)
3,408,548 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,431 UART: [rt]cmd =0x53574545, len=84
3,442,171 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,493 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,174,627 ready_for_fw is high
1,174,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,199,077 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,764 UART: [ldev] --
1,281,150 UART: [fwproc] Wait for Commands...
1,281,835 UART: [fwproc] Recv command 0x46574c44
1,282,568 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,506 >>> mbox cmd response: success
2,773,667 UART: [afmc] ++
2,773,835 UART: [afmc] CDI.KEYID = 6
2,774,198 UART: [afmc] SUBJECT.KEYID = 7
2,774,624 UART: [afmc] AUTHORITY.KEYID = 5
2,809,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,418 UART: [afmc] --
2,853,370 UART: [cold-reset] --
2,854,320 UART: [state] Locking Datavault
2,855,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,851 UART: [state] Locking ICCM
2,856,435 UART: [exit] Launching FMC @ 0x40000130
2,861,764 UART:
2,861,780 UART: Running Caliptra FMC ...
2,862,188 UART:
2,862,242 UART: [state] CFI Enabled
2,872,901 UART: [fht] FMC Alias Private Key: 7
2,980,440 UART: [art] Extend RT PCRs Done
2,980,868 UART: [art] Lock RT PCRs Done
2,982,494 UART: [art] Populate DV Done
2,990,603 UART: [fht] FMC Alias Private Key: 7
2,991,639 UART: [art] Derive CDI
2,991,919 UART: [art] Store in in slot 0x4
3,077,368 UART: [art] Derive Key Pair
3,077,728 UART: [art] Store priv key in slot 0x5
3,090,514 UART: [art] Derive Key Pair - Done
3,104,983 UART: [art] Signing Cert with AUTHO
3,105,463 UART: RITY.KEYID = 7
3,120,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,216 UART: [art] PUB.X = 8495EF580B5C9FE357CF9772F6CBF819267E52C29CDA5BF72890C29C95674A1E49111EF6D7802B32A2F3ABF138F00D78
3,127,986 UART: [art] PUB.Y = 1B024C2ED98E7897C5AB0EDECB70F612F3B0D559F073AD2B2DA2D387F747DD583950F232A633FE57799CB25FED4AC14F
3,134,946 UART: [art] SIG.R = 12060634C61E22469D3EA378FE75220B4447197400A0110FC6D803C0397D6CDB68D4C8FE8742B8D1E317F20B9EA5F30B
3,141,671 UART: [art] SIG.S = 6BD7C1EF45B6813DA12E8FF71B86E9B426D7AE3EB97D50A0F97B23C9797D664406A843CA30991B39A7B17E3F91A19782
3,165,655 UART: Caliptra RT
3,165,909 UART: [state] CFI Enabled
3,273,639 UART: [rt] RT listening for mailbox commands...
3,274,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,536 UART: [rt]cmd =0x44504543, len=96
3,491,701 >>> mbox cmd response data (6236 bytes)
3,491,702 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,663 UART: [rt]cmd =0x53574545, len=84
3,547,488 >>> mbox cmd response data (200 bytes)
3,547,489 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,140 UART: [rt]cmd =0x52564348, len=36
3,579,483 >>> mbox cmd response data (8 bytes)
3,579,484 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,331 UART: [rt]cmd =0x53574545, len=84
3,612,649 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,488 ready_for_fw is high
1,055,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,200 >>> mbox cmd response: success
2,683,930 UART:
2,683,946 UART: Running Caliptra FMC ...
2,684,354 UART:
2,684,408 UART: [state] CFI Enabled
2,695,029 UART: [fht] FMC Alias Private Key: 7
2,802,870 UART: [art] Extend RT PCRs Done
2,803,298 UART: [art] Lock RT PCRs Done
2,805,048 UART: [art] Populate DV Done
2,813,287 UART: [fht] FMC Alias Private Key: 7
2,814,365 UART: [art] Derive CDI
2,814,645 UART: [art] Store in in slot 0x4
2,900,058 UART: [art] Derive Key Pair
2,900,418 UART: [art] Store priv key in slot 0x5
2,914,160 UART: [art] Derive Key Pair - Done
2,928,911 UART: [art] Signing Cert with AUTHO
2,929,391 UART: RITY.KEYID = 7
2,944,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,496 UART: [art] PUB.X = F1ACFB470159D33DD854FAA0B6F3DA2D434993BC5F6BE9B1D2FA24E4F4723BD6A5639AEE703C39F584E0C0900719E365
2,952,274 UART: [art] PUB.Y = E295268905EC3FB7070EE4D0B0E64403F8AA05BD37522F7AB47BB6BE41646CE6923CAD03D204968CD22E3883414A1EF5
2,959,209 UART: [art] SIG.R = 9BA1A96EE3167DC4443798A5DE89DE35035884F021ED203508A0EFCC71A4D0B10C5AFA0267D3051DC20F4E975F84D69F
2,965,969 UART: [art] SIG.S = DA1213E8829BB3B186C57495720CADB3CE6189BB6EDB2D57527BFF5C1E6E3D5D845DD298C7E521307286C0AD1F08EA3D
2,989,956 UART: Caliptra RT
2,990,210 UART: [state] CFI Enabled
3,098,351 UART: [rt] RT listening for mailbox commands...
3,099,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,148 UART: [rt]cmd =0x44504543, len=96
3,318,000 >>> mbox cmd response data (6236 bytes)
3,318,001 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,894 UART: [rt]cmd =0x53574545, len=84
3,373,203 >>> mbox cmd response data (200 bytes)
3,373,204 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,849 UART: [rt]cmd =0x52564348, len=36
3,405,340 >>> mbox cmd response data (8 bytes)
3,405,341 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,198 UART: [rt]cmd =0x53574545, len=84
3,438,592 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,198,854 UART: [idev] Sha1 KeyId Algorithm
1,207,706 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,243 UART: [ldev] Erasing FE.KEYID = 1
1,242,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,761 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,239 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,189 >>> mbox cmd response: success
2,775,212 UART: [afmc] ++
2,775,380 UART: [afmc] CDI.KEYID = 6
2,775,743 UART: [afmc] SUBJECT.KEYID = 7
2,776,169 UART: [afmc] AUTHORITY.KEYID = 5
2,812,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,091 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,810 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,653 UART: [afmc] --
2,855,721 UART: [cold-reset] --
2,856,561 UART: [state] Locking Datavault
2,857,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,282 UART: [state] Locking ICCM
2,858,922 UART: [exit] Launching FMC @ 0x40000130
2,864,251 UART:
2,864,267 UART: Running Caliptra FMC ...
2,864,675 UART:
2,864,818 UART: [state] CFI Enabled
2,875,339 UART: [fht] FMC Alias Private Key: 7
2,982,922 UART: [art] Extend RT PCRs Done
2,983,350 UART: [art] Lock RT PCRs Done
2,984,984 UART: [art] Populate DV Done
2,993,147 UART: [fht] FMC Alias Private Key: 7
2,994,291 UART: [art] Derive CDI
2,994,571 UART: [art] Store in in slot 0x4
3,079,808 UART: [art] Derive Key Pair
3,080,168 UART: [art] Store priv key in slot 0x5
3,093,570 UART: [art] Derive Key Pair - Done
3,108,420 UART: [art] Signing Cert with AUTHO
3,108,900 UART: RITY.KEYID = 7
3,124,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,059 UART: [art] PUB.X = A6120014A96765ADD777CF39914060228D4243E78035F7644C3C2DF73847512A827923988C0EA92E8521C2A85ABF48C4
3,131,792 UART: [art] PUB.Y = 670E855A77CA873E17718F8CE00F6A3D9A1D68912D04758D7DCBC81FC86FCA9A99D1C7BA39BBBA559EF46EFF3DA619E0
3,138,753 UART: [art] SIG.R = 633B1569F9FD3555D86F0F89CD0C1B490C60BB32E1362F76C07EC82F283A6525477B9AE47326137945D03C47D86D22F0
3,145,510 UART: [art] SIG.S = 5599C3CAC12334BFEFE6D7B428F877AEEF8CA6692C630C7342C13C9A2CA8E26F9C4E51426C27D74935FF0A02C818A06C
3,169,636 UART: Caliptra RT
3,169,982 UART: [state] CFI Enabled
3,277,762 UART: [rt] RT listening for mailbox commands...
3,278,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,401 UART: [rt]cmd =0x44504543, len=96
3,496,273 >>> mbox cmd response data (6236 bytes)
3,496,274 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,195 UART: [rt]cmd =0x53574545, len=84
3,552,144 >>> mbox cmd response data (200 bytes)
3,552,145 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,496 UART: [rt]cmd =0x52564348, len=36
3,583,537 >>> mbox cmd response data (8 bytes)
3,583,538 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,319 UART: [rt]cmd =0x53574545, len=84
3,616,831 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,793 ready_for_fw is high
1,055,793 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,927 >>> mbox cmd response: success
2,683,831 UART:
2,683,847 UART: Running Caliptra FMC ...
2,684,255 UART:
2,684,398 UART: [state] CFI Enabled
2,695,303 UART: [fht] FMC Alias Private Key: 7
2,803,632 UART: [art] Extend RT PCRs Done
2,804,060 UART: [art] Lock RT PCRs Done
2,805,856 UART: [art] Populate DV Done
2,814,141 UART: [fht] FMC Alias Private Key: 7
2,815,207 UART: [art] Derive CDI
2,815,487 UART: [art] Store in in slot 0x4
2,901,040 UART: [art] Derive Key Pair
2,901,400 UART: [art] Store priv key in slot 0x5
2,914,216 UART: [art] Derive Key Pair - Done
2,929,116 UART: [art] Signing Cert with AUTHO
2,929,596 UART: RITY.KEYID = 7
2,944,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,321 UART: [art] PUB.X = 16B5DF611A620E395E24F18FE46D9875E1DBC3125C973213CA490679D8B064BBD1E5DBEBFB1397110579A9790F8D0956
2,952,078 UART: [art] PUB.Y = 8924BE56968DF5F4BFE0BE699FF88C330941576D45727DF1B76E079C1323D916DF92C95C26E56F33B0783FE7AB11677B
2,959,024 UART: [art] SIG.R = 2CDDBD3C255966CD2049FDAEEF55EA4FD8B7D6122BD76190DB304EDB537EE77E1296CE2C0271742782B22D572FF6516A
2,965,805 UART: [art] SIG.S = 065349D32A9D8D2DA868525ED32BA0C672211108F3325BA787CD569D065229D00E455AA3C38399122071BA5E60717E49
2,989,452 UART: Caliptra RT
2,989,798 UART: [state] CFI Enabled
3,097,742 UART: [rt] RT listening for mailbox commands...
3,098,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,589 UART: [rt]cmd =0x44504543, len=96
3,317,296 >>> mbox cmd response data (6236 bytes)
3,317,297 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,126 UART: [rt]cmd =0x53574545, len=84
3,372,901 >>> mbox cmd response data (200 bytes)
3,372,902 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,443 UART: [rt]cmd =0x52564348, len=36
3,404,252 >>> mbox cmd response data (8 bytes)
3,404,253 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,890 UART: [rt]cmd =0x53574545, len=84
3,437,100 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.21s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,119,707 UART: [fwproc] Received Image of size 78676 bytes
16,736,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,818,213 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,887,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,080,632 >>> mbox cmd response: success
17,081,124 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,084,699 UART: [afmc] ++
17,085,282 UART: [afmc] CDI.KEYID = 6
17,086,245 UART: [afmc] SUBJECT.KEYID = 7
17,087,460 UART: [afmc] AUTHORITY.KEYID = 5
20,453,171 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,751,225 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,753,541 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,767,898 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,782,764 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,797,167 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,818,848 UART: [afmc] --
22,823,044 UART: [cold-reset] --
22,826,311 UART: [state] Locking Datavault
22,829,768 UART: [state] Locking PCR0, PCR1 and PCR31
22,831,522 UART: [state] Locking ICCM
22,833,825 UART: [exit] Launching FMC @ 0x40000130
22,842,210 UART:
22,842,436 UART: Running Caliptra FMC ...
22,843,473 UART:
22,843,614 UART: [state] CFI Enabled
22,911,445 UART: [fht] FMC Alias Private Key: 7
25,249,140 UART: [art] Extend RT PCRs Done
25,250,362 UART: [art] Lock RT PCRs Done
25,252,143 UART: [art] Populate DV Done
25,257,656 UART: [fht] FMC Alias Private Key: 7
25,259,119 UART: [art] Derive CDI
25,259,887 UART: [art] Store in in slot 0x4
25,319,890 UART: [art] Derive Key Pair
25,320,886 UART: [art] Store priv key in slot 0x5
28,614,303 UART: [art] Derive Key Pair - Done
28,627,310 UART: [art] Signing Cert with AUTHO
28,628,624 UART: RITY.KEYID = 7
30,917,093 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,644 UART: [art] PUB.X = 3ED83C47791FC62EDE062295FA650DD6A15F08B1EFB25ACD0AC64092691964B77A9174EC61EE730DFF8DE4E1E2D14E63
30,925,842 UART: [art] PUB.Y = 78550076118D12749B88A3F11E619CD9C1C18E95123EE83FA4BEEE1EEEF9780B85B31DE3F9289AA1CFC3D950E18FB48F
30,933,118 UART: [art] SIG.R = 51BAE61F182CAC035AEA3921763AE4B031E67D5CB2F999FE528EBF816DF4AE3E63CEB5DA093A29F092DF15D716513DC7
30,940,536 UART: [art] SIG.S = EE6AD4A46879171AE72580DBC3B2F06CB789BC277318C4D5D37AC4F365EEAA7C0C9CFC142C437D792AF77FEE64D0724A
32,245,545 UART: mbox::rt_entry...
32,246,485 UART: ____ _ _ _ ____ _____
32,248,508 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,522 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,442 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,369 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,315 UART: |_|
32,257,118 UART:
32,370,337 UART: [rt] Runtime listening for mailbox commands...
32,372,461 >>> mbox cmd response data (48 bytes)
34,433,331 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,577,589 UART:
34,577,969 UART: Running Caliptra ROM ...
34,579,100 UART:
34,579,263 UART: [state] CFI Enabled
34,650,958 UART: [state] LifecycleState = Unprovisioned
34,652,904 UART: [state] DebugLocked = No
34,655,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,660,815 UART: [kat] SHA2-256
34,830,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,841,010 UART: [kat] ++
34,841,490 UART: [kat] sha1
34,851,884 UART: [kat] SHA2-256
34,854,588 UART: [kat] SHA2-384
34,859,870 UART: [kat] SHA2-512-ACC
34,862,219 UART: [kat] ECC-384
37,155,021 UART: [kat] HMAC-384Kdf
37,187,227 UART: [kat] LMS
38,377,603 UART: [kat] --
38,382,516 UART: [update-reset] ++
42,517,254 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,521,741 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,903,722 >>> mbox cmd response: success
42,904,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,905,481 UART: [update-reset] Copying MAN_2 To MAN_1
42,927,910 UART: [update-reset Success] --
42,932,789 UART: [state] Locking Datavault
42,935,721 UART: [state] Locking PCR0, PCR1 and PCR31
42,937,488 UART: [state] Locking ICCM
42,939,699 UART: [exit] Launching FMC @ 0x40000130
42,948,092 UART:
42,948,336 UART: Running Caliptra FMC ...
42,949,435 UART:
42,949,585 UART: [state] CFI Enabled
43,042,612 UART: [art] Extend RT PCRs Done
43,043,797 UART: [art] Lock RT PCRs Done
43,045,030 UART: [art] Populate DV Done
43,050,600 UART: [fht] FMC Alias Private Key: 7
43,052,157 UART: [art] Derive CDI
43,052,971 UART: [art] Store in in slot 0x4
43,111,505 UART: [art] Derive Key Pair
43,112,541 UART: [art] Store priv key in slot 0x5
46,405,212 UART: [art] Derive Key Pair - Done
46,418,314 UART: [art] Signing Cert with AUTHO
46,419,612 UART: RITY.KEYID = 7
48,708,225 UART: [art] Erasing AUTHORITY.KEYID = 7
48,709,725 UART: [art] PUB.X = EB3AEA4A23FEC501FBD096082EC61A05B7C1E1896FA722C0B137A25385B098B2CB9FD1ACBA3390D3CC6171338EC452DC
48,716,962 UART: [art] PUB.Y = 8D00832ED8D16DE339489582CEFDCCD2369F2D40A8DC435803E9DB6CF9DAACC3BE924D8E58CFAB8B11C32F35B35EF43B
48,724,293 UART: [art] SIG.R = 9E56FDA3730BCD39393192ED3879B77BB0FF0678CAA67BC5CB1D6727EEFBD1213364FA56C5438BCD02A92DD8F898D0BA
48,731,677 UART: [art] SIG.S = 10D0ED8C4629D2134FE42F8C2EE942AD864F9B02526C19F1BED50A4849D78B5D3D1B81862572F2BAD32BFDFD7601253C
50,036,693 UART: Caliptra RT
50,037,413 UART: [state] CFI Enabled
50,369,422 UART: [rt] RT listening for mailbox commands...
50,401,181 UART: [rt]cmd =0x4d454153, len=108
50,420,147 >>> mbox cmd response data (12 bytes)
52,467,068 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,567,791 UART:
52,568,146 UART: Running Caliptra ROM ...
52,569,187 UART:
52,569,334 UART: [state] CFI Enabled
52,633,624 UART: [state] LifecycleState = Unprovisioned
52,635,561 UART: [state] DebugLocked = No
52,637,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,641,329 UART: [kat] SHA2-256
52,811,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,821,510 UART: [kat] ++
52,821,960 UART: [kat] sha1
52,832,516 UART: [kat] SHA2-256
52,835,215 UART: [kat] SHA2-384
52,840,657 UART: [kat] SHA2-512-ACC
52,843,062 UART: [kat] ECC-384
55,136,510 UART: [kat] HMAC-384Kdf
55,169,215 UART: [kat] LMS
56,359,547 UART: [kat] --
56,363,828 UART: [update-reset] ++
60,071,584 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,074,783 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
60,332,944 >>> mbox cmd response: success
62,378,029 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
62,477,519 UART: [update-reset] Copying MAN_2 To MAN_1
62,479,207 UART: [update-reset Success] --
62,480,389 UART: [state] Locking Datavault
62,481,528 UART: [state] Locking PCR0, PCR1 and PCR31
62,483,053 UART: [state] Locking ICCM
62,483,958 UART: [exit] Launching FMC @ 0x40000130
62,485,372 UART:
62,485,526 UART: Running Caliptra FMC ...
62,486,618 UART:
62,486,764 UART: [state] CFI Enabled
62,487,623 UART: [art] Extend RT PCRs Done
62,488,758 UART: [art] Lock RT PCRs Done
62,489,817 UART: [art] Populate DV Done
62,490,836 UART: [fht] FMC Alias Private Key: 7
62,492,145 UART: [art] Derive CDI
62,492,871 UART: [art] Store in in slot 0x4
62,494,029 UART: [art] Derive Key Pair
62,495,015 UART: [art] Store priv key in slot 0x5
63,834,457 UART: [art] Derive Key Pair - Done
63,847,139 UART: [art] Signing Cert with AUTHO
63,848,434 UART: RITY.KEYID = 7
66,136,873 UART: [art] Erasing AUTHORITY.KEYID = 7
66,138,381 UART: [art] PUB.X = 6D28C77CA113BBAABD2A382AA0DFEB1BE2F0B510E867ACED3BBF6EEA243FDC0FE1182C0A791C771AED49E25E5DE17336
66,145,673 UART: [art] PUB.Y = 60A72BF473287049EBA47F05599389C0AF1E17108F7C50B56921AA0956686D1C865DD3A0E9191A0E8BE95D55116C7069
66,152,894 UART: [art] SIG.R = 499088EBEF41BCD85C139F8720C8FCF6B0C5183DC2A2E0510171D790CF4F4C96E983F94DD2838A731686C0DACF425B9C
66,160,279 UART: [art] SIG.S = DE46239B156442062C1E2F065E85C27F4D7DE3E61042C666871528B5B9B3EC2D509E6FB28FDBD715BD6A6615F5555FFD
67,465,475 UART: mbox::rt_entry...
67,466,433 UART: ____ _ _ _ ____ _____
67,468,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,470,323 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,472,196 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,474,115 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,475,987 UART: |_|
67,476,807 UART:
67,759,794 UART: [rt] Runtime listening for mailbox commands...
67,761,822 UART:
67,761,982 UART: Running Caliptra ROM ...
67,763,049 UART:
67,763,237 UART: [state] CFI Enabled
67,821,516 UART: [state] LifecycleState = Unprovisioned
67,823,442 UART: [state] DebugLocked = No
67,825,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,831,062 UART: [kat] SHA2-256
68,000,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,011,299 UART: [kat] ++
68,011,749 UART: [kat] sha1
68,023,652 UART: [kat] SHA2-256
68,026,331 UART: [kat] SHA2-384
68,032,360 UART: [kat] SHA2-512-ACC
68,034,757 UART: [kat] ECC-384
70,324,427 UART: [kat] HMAC-384Kdf
70,356,089 UART: [kat] LMS
71,546,428 UART: [kat] --
71,548,628 UART: [update-reset] ++
75,256,865 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,260,098 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
75,518,318 >>> mbox cmd response: success
75,518,668 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,518,943 UART: [update-reset] Copying MAN_2 To MAN_1
75,541,011 UART: [update-reset Success] --
75,546,966 UART: [state] Locking Datavault
75,550,155 UART: [state] Locking PCR0, PCR1 and PCR31
75,551,903 UART: [state] Locking ICCM
75,552,993 UART: [exit] Launching FMC @ 0x40000130
75,561,432 UART:
75,561,656 UART: Running Caliptra FMC ...
75,562,693 UART:
75,562,834 UART: [state] CFI Enabled
75,656,884 UART: [art] Extend RT PCRs Done
75,658,073 UART: [art] Lock RT PCRs Done
75,659,659 UART: [art] Populate DV Done
75,664,840 UART: [fht] FMC Alias Private Key: 7
75,666,370 UART: [art] Derive CDI
75,667,176 UART: [art] Store in in slot 0x4
75,726,010 UART: [art] Derive Key Pair
75,727,003 UART: [art] Store priv key in slot 0x5
79,019,528 UART: [art] Derive Key Pair - Done
79,032,307 UART: [art] Signing Cert with AUTHO
79,033,604 UART: RITY.KEYID = 7
81,320,750 UART: [art] Erasing AUTHORITY.KEYID = 7
81,322,267 UART: [art] PUB.X = 685AF9A6EF115D8274C9DE2C676894F211EF13EB59A2B3963E944F16EA41FD01D3764E31175753A6302B878A54C80873
81,329,505 UART: [art] PUB.Y = EE9613164EC93AE3947D99E63AE49FE74F6B3F4D461ECAE9B76AED11F5D464375F3496E790AE7F6ADC3E4FD9EB7BCDD3
81,336,821 UART: [art] SIG.R = 9D39B2E93F43B6E3A1A5576CAA716ACBBC2F34C8B8CFD7399EC4957A6B51B5E33F86CF273B09CC00D619E8E8B940C943
81,344,178 UART: [art] SIG.S = FE381CFE227C4A1A31513F29D6D665E7642F0EB6CB65F4990CD30E72794622AB28D9E047DCC033EF6E135592E93EFD7B
82,649,161 UART: mbox::rt_entry...
82,650,123 UART: ____ _ _ _ ____ _____
82,652,106 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,654,106 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,656,031 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,657,955 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,659,799 UART: |_|
82,660,592 UART:
82,945,419 UART: [rt] Runtime listening for mailbox commands...
82,947,528 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
3,807,047 ready_for_fw is high
3,807,648 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,155,796 >>> mbox cmd response: success
17,156,704 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,847,618 UART:
22,848,016 UART: Running Caliptra FMC ...
22,849,141 UART:
22,849,291 UART: [state] CFI Enabled
22,915,794 UART: [fht] FMC Alias Private Key: 7
25,252,721 UART: [art] Extend RT PCRs Done
25,253,946 UART: [art] Lock RT PCRs Done
25,255,700 UART: [art] Populate DV Done
25,260,895 UART: [fht] FMC Alias Private Key: 7
25,262,533 UART: [art] Derive CDI
25,263,264 UART: [art] Store in in slot 0x4
25,323,842 UART: [art] Derive Key Pair
25,324,875 UART: [art] Store priv key in slot 0x5
28,617,131 UART: [art] Derive Key Pair - Done
28,630,173 UART: [art] Signing Cert with AUTHO
28,631,475 UART: RITY.KEYID = 7
30,919,165 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,667 UART: [art] PUB.X = CED71C76DBDAAD0DBEBF2725B4DB6D5249061BD3689FF71D6AD5E85931369B791AEF99A37AE2E29690B15B832161796B
30,927,959 UART: [art] PUB.Y = A25BD369F67F3AB6AF6C413A4035CA0BAF33ADFED103D004B9B0B02D9541FF7B7A8DED48D3DF70968625378EA49716D0
30,935,178 UART: [art] SIG.R = 11AC025436D454F6946DF5CE1C2C8DE3EBD9CD9FC16CCC0A2FA8168A04A193147E056F9BD355AB78AAB28AA50BEC3A3E
30,942,632 UART: [art] SIG.S = FE745C7289F5876ED3DCEDBE386735958DF1A5FA89F3F7745EA4F31889957F5FD454C7748C53F9E70BCD9656CE992581
32,247,417 UART: mbox::rt_entry...
32,248,379 UART: ____ _ _ _ ____ _____
32,250,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,993 UART: |_|
32,258,796 UART:
32,371,277 UART: [rt] Runtime listening for mailbox commands...
32,373,400 >>> mbox cmd response data (48 bytes)
34,434,677 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,142,633 >>> mbox cmd response: success
43,143,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,178,179 UART:
43,178,499 UART: Running Caliptra FMC ...
43,179,623 UART:
43,179,780 UART: [state] CFI Enabled
43,268,621 UART: [art] Extend RT PCRs Done
43,269,798 UART: [art] Lock RT PCRs Done
43,271,111 UART: [art] Populate DV Done
43,276,782 UART: [fht] FMC Alias Private Key: 7
43,278,361 UART: [art] Derive CDI
43,279,085 UART: [art] Store in in slot 0x4
43,337,222 UART: [art] Derive Key Pair
43,338,256 UART: [art] Store priv key in slot 0x5
46,630,442 UART: [art] Derive Key Pair - Done
46,643,059 UART: [art] Signing Cert with AUTHO
46,644,375 UART: RITY.KEYID = 7
48,933,178 UART: [art] Erasing AUTHORITY.KEYID = 7
48,934,691 UART: [art] PUB.X = A2D5CDEF79CFAA84BCA7F881834513EA4621AB36D20D945CCC67F08F310413716AA46F49019A2523C140A7C23F1AF31B
48,941,926 UART: [art] PUB.Y = 9B326F9B489C212553D6C3EB58A270D6B799E522F37927654585BD956BBEE3BC14829C0DD24A3E2203C65347BA9B87EB
48,949,142 UART: [art] SIG.R = 08FE99AD87A7E790CFA216D73BA4C75580E8DF14965DFFF59B9EBFA8FB2DD0EAA5E9F39BC6127FC76801F0144E73621E
48,956,523 UART: [art] SIG.S = D2F844FF79B3B5AF4B8E7155D033BF85AE7A5F692E009D72CC64C34FDD682F2905CE9E21CBCEC4900A67D91315C996AD
50,261,690 UART: Caliptra RT
50,262,387 UART: [state] CFI Enabled
50,594,357 UART: [rt] RT listening for mailbox commands...
50,626,309 UART: [rt]cmd =0x4d454153, len=108
50,645,027 >>> mbox cmd response data (12 bytes)
52,693,129 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
60,644,589 >>> mbox cmd response: success
62,690,299 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
62,789,867 UART:
62,790,229 UART: Running Caliptra FMC ...
62,791,349 UART:
62,791,514 UART: [state] CFI Enabled
62,792,428 UART: [art] Extend RT PCRs Done
62,793,560 UART: [art] Lock RT PCRs Done
62,794,616 UART: [art] Populate DV Done
62,795,635 UART: [fht] FMC Alias Private Key: 7
62,796,944 UART: [art] Derive CDI
62,797,671 UART: [art] Store in in slot 0x4
62,798,830 UART: [art] Derive Key Pair
62,799,771 UART: [art] Store priv key in slot 0x5
64,145,547 UART: [art] Derive Key Pair - Done
64,158,499 UART: [art] Signing Cert with AUTHO
64,159,797 UART: RITY.KEYID = 7
66,447,364 UART: [art] Erasing AUTHORITY.KEYID = 7
66,448,866 UART: [art] PUB.X = 79292D81D12F0935E330961BAA23073FDD2C727983DD9FD263E2383E39849167A36AB9D31ECB148D5CBC3B09710E2B38
66,456,101 UART: [art] PUB.Y = 83549902E0B7F21E84687867C1EDA5FF545513DFFF35A225C61C60471A5AF46A86AA57144EE2FFEC7CAAC6358441279F
66,463,381 UART: [art] SIG.R = 1F1E6560B146CCDD664F8114C01D458B0B9EF58AB56A8ECAF7A5410805808A732B00997113DA28052F283E26E7805E53
66,470,699 UART: [art] SIG.S = 8AA0FA12661BCA50D1F320A66E174F74978F518A77472CBD2401533C7DBE038BEE6B5CA6272D6177CDADED0B4D9112C0
67,775,521 UART: mbox::rt_entry...
67,776,492 UART: ____ _ _ _ ____ _____
67,778,471 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,780,465 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,782,385 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,784,513 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,786,451 UART: |_|
67,787,249 UART:
68,072,448 UART: [rt] Runtime listening for mailbox commands...
75,943,069 >>> mbox cmd response: success
75,943,457 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,977,445 UART:
75,977,736 UART: Running Caliptra FMC ...
75,978,764 UART:
75,978,904 UART: [state] CFI Enabled
76,077,511 UART: [art] Extend RT PCRs Done
76,078,697 UART: [art] Lock RT PCRs Done
76,080,230 UART: [art] Populate DV Done
76,085,955 UART: [fht] FMC Alias Private Key: 7
76,087,649 UART: [art] Derive CDI
76,088,379 UART: [art] Store in in slot 0x4
76,146,680 UART: [art] Derive Key Pair
76,147,714 UART: [art] Store priv key in slot 0x5
79,441,097 UART: [art] Derive Key Pair - Done
79,454,066 UART: [art] Signing Cert with AUTHO
79,455,380 UART: RITY.KEYID = 7
81,743,361 UART: [art] Erasing AUTHORITY.KEYID = 7
81,744,872 UART: [art] PUB.X = 959153E395589EF930089A7C33B5BA1ED37ECC6BF77542D219DE3963D1CAB5463AEB2066F3F8C2991631FA9E541B7515
81,752,111 UART: [art] PUB.Y = 5D69D07B9DAA348686B41FF7AE9AE4D43CBF5C992539651F62DA140FB9DF049CC86625CD9B0EA2B0EC411438FC761C10
81,759,378 UART: [art] SIG.R = D77C7B9EC57247F864739764E950B3F0364F267FDD2575ECC2E70DC976F84738148AC0FB06DE85018F299EA1A002EAC0
81,766,748 UART: [art] SIG.S = 3CA0D5CCD452AFB941671DE0C99D0CC7B87B64E309EA5FA6BC2AC8753E5A9C62A7F6069E51068CBB4484197BC3FFA978
83,070,904 UART: mbox::rt_entry...
83,071,879 UART: ____ _ _ _ ____ _____
83,073,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,075,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,077,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,079,790 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,081,710 UART: |_|
83,082,516 UART:
83,365,662 UART: [rt] Runtime listening for mailbox commands...
83,367,793 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.28s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,311,587 UART: [fwproc] Received Image of size 78676 bytes
16,931,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,005,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,074,383 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,267,907 >>> mbox cmd response: success
17,268,382 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,271,696 UART: [afmc] ++
17,272,271 UART: [afmc] CDI.KEYID = 6
17,273,234 UART: [afmc] SUBJECT.KEYID = 7
17,274,449 UART: [afmc] AUTHORITY.KEYID = 5
20,589,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,884,107 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,886,408 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,900,755 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,915,573 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,930,008 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,950,939 UART: [afmc] --
22,954,656 UART: [cold-reset] --
22,958,243 UART: [state] Locking Datavault
22,962,084 UART: [state] Locking PCR0, PCR1 and PCR31
22,963,840 UART: [state] Locking ICCM
22,966,309 UART: [exit] Launching FMC @ 0x40000130
22,974,710 UART:
22,974,943 UART: Running Caliptra FMC ...
22,976,040 UART:
22,976,197 UART: [state] CFI Enabled
22,984,746 UART: [fht] FMC Alias Private Key: 7
25,315,899 UART: [art] Extend RT PCRs Done
25,317,118 UART: [art] Lock RT PCRs Done
25,318,817 UART: [art] Populate DV Done
25,324,068 UART: [fht] FMC Alias Private Key: 7
25,325,553 UART: [art] Derive CDI
25,326,313 UART: [art] Store in in slot 0x4
25,369,183 UART: [art] Derive Key Pair
25,370,221 UART: [art] Store priv key in slot 0x5
28,612,185 UART: [art] Derive Key Pair - Done
28,624,855 UART: [art] Signing Cert with AUTHO
28,626,154 UART: RITY.KEYID = 7
30,905,890 UART: [art] Erasing AUTHORITY.KEYID = 7
30,907,392 UART: [art] PUB.X = 12CD5B4CEC5EECC2BA7CB7F998EC58314B0E7AFE10070F219D2A0B2753CC9DAFED66058937F28FDFEBFFD48E6C0B17B8
30,914,676 UART: [art] PUB.Y = E86BEDE8340F222514A0014F18FFA5B000C04B15AB2BF21308CEC4861E77E3333314CC5B0491D99D81B8119D213036F6
30,921,915 UART: [art] SIG.R = E9124F5F9D369FDBC1F326B95722B7EF111BDCD1335BA2B0F185DA89FB8A57431DDB755DE9F319BD9F98CC39892C772B
30,929,381 UART: [art] SIG.S = 5B6CD3C474DFBEE9CEE49D6234BE732E99073230CC89E17EB0C198CC4CE643CBD0EC273FA96034D997F38A180051FD64
32,234,499 UART: mbox::rt_entry...
32,235,463 UART: ____ _ _ _ ____ _____
32,237,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,239,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,241,384 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,243,313 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,245,163 UART: |_|
32,245,964 UART:
32,360,606 UART: [rt] Runtime listening for mailbox commands...
32,362,769 >>> mbox cmd response data (48 bytes)
34,422,256 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,566,503 UART:
34,566,868 UART: Running Caliptra ROM ...
34,567,944 UART:
34,568,159 UART: [state] CFI Enabled
34,583,406 UART: [state] LifecycleState = Unprovisioned
34,585,344 UART: [state] DebugLocked = No
34,587,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,592,834 UART: [kat] SHA2-256
34,762,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,773,055 UART: [kat] ++
34,773,519 UART: [kat] sha1
34,784,618 UART: [kat] SHA2-256
34,787,312 UART: [kat] SHA2-384
34,793,568 UART: [kat] SHA2-512-ACC
34,795,989 UART: [kat] ECC-384
37,081,674 UART: [kat] HMAC-384Kdf
37,093,578 UART: [kat] LMS
38,283,606 UART: [kat] --
38,286,595 UART: [update-reset] ++
42,430,651 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,434,214 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,816,173 >>> mbox cmd response: success
42,816,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,817,939 UART: [update-reset] Copying MAN_2 To MAN_1
42,840,377 UART: [update-reset Success] --
42,843,638 UART: [state] Locking Datavault
42,848,186 UART: [state] Locking PCR0, PCR1 and PCR31
42,849,921 UART: [state] Locking ICCM
42,851,525 UART: [exit] Launching FMC @ 0x40000130
42,859,963 UART:
42,860,222 UART: Running Caliptra FMC ...
42,861,326 UART:
42,861,479 UART: [state] CFI Enabled
42,905,706 UART: [art] Extend RT PCRs Done
42,906,850 UART: [art] Lock RT PCRs Done
42,908,290 UART: [art] Populate DV Done
42,913,689 UART: [fht] FMC Alias Private Key: 7
42,915,390 UART: [art] Derive CDI
42,916,202 UART: [art] Store in in slot 0x4
42,958,898 UART: [art] Derive Key Pair
42,959,941 UART: [art] Store priv key in slot 0x5
46,201,880 UART: [art] Derive Key Pair - Done
46,214,701 UART: [art] Signing Cert with AUTHO
46,216,028 UART: RITY.KEYID = 7
48,495,582 UART: [art] Erasing AUTHORITY.KEYID = 7
48,497,088 UART: [art] PUB.X = D56BC7B4FC9E7E248CF3202EF2DA8C36B531A4853AA67978FE0C472218CB34798C540ADC94A6D65B3D3BEFC8718A76DC
48,504,363 UART: [art] PUB.Y = A0A557D279F5F0CBF1B0561E98E5E82A1FDE0BDA10BEAE1A1DFC3AEF25E7DF650526F722AF60510FA80C7AFE2DA3A990
48,511,659 UART: [art] SIG.R = 6457ED3DD19BB18996667D49733DE94D98FDC0DF395B83FBE3F2351088A53EFA980DD5E6FDAFA6FE862C92B9AD361209
48,519,051 UART: [art] SIG.S = D2E998E6228B577E18878C1296D8CC9F1002FECB41287E9675E7F4AB35CCF69DF50A05D36E18FC65C0EFD4E3BABB3F4B
49,824,127 UART: Caliptra RT
49,824,843 UART: [state] CFI Enabled
50,113,011 UART: [rt] RT listening for mailbox commands...
50,144,745 UART: [rt]cmd =0x4d454153, len=108
50,162,834 >>> mbox cmd response data (12 bytes)
52,209,227 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,310,036 UART:
52,310,432 UART: Running Caliptra ROM ...
52,311,503 UART:
52,311,716 UART: [state] CFI Enabled
52,328,579 UART: [state] LifecycleState = Unprovisioned
52,330,494 UART: [state] DebugLocked = No
52,332,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,337,257 UART: [kat] SHA2-256
52,507,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,517,556 UART: [kat] ++
52,518,089 UART: [kat] sha1
52,529,686 UART: [kat] SHA2-256
52,532,384 UART: [kat] SHA2-384
52,538,356 UART: [kat] SHA2-512-ACC
52,540,722 UART: [kat] ECC-384
54,826,947 UART: [kat] HMAC-384Kdf
54,839,015 UART: [kat] LMS
56,029,064 UART: [kat] --
56,033,565 UART: [update-reset] ++
59,750,071 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,752,933 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
60,011,121 >>> mbox cmd response: success
62,055,342 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
62,154,808 UART: [update-reset] Copying MAN_2 To MAN_1
62,156,486 UART: [update-reset Success] --
62,157,647 UART: [state] Locking Datavault
62,158,788 UART: [state] Locking PCR0, PCR1 and PCR31
62,160,322 UART: [state] Locking ICCM
62,161,230 UART: [exit] Launching FMC @ 0x40000130
62,162,656 UART:
62,162,816 UART: Running Caliptra FMC ...
62,163,912 UART:
62,164,063 UART: [state] CFI Enabled
62,164,983 UART: [art] Extend RT PCRs Done
62,166,134 UART: [art] Lock RT PCRs Done
62,167,200 UART: [art] Populate DV Done
62,168,229 UART: [fht] FMC Alias Private Key: 7
62,169,545 UART: [art] Derive CDI
62,170,281 UART: [art] Store in in slot 0x4
62,171,446 UART: [art] Derive Key Pair
62,172,383 UART: [art] Store priv key in slot 0x5
63,396,763 UART: [art] Derive Key Pair - Done
63,409,984 UART: [art] Signing Cert with AUTHO
63,411,445 UART: RITY.KEYID = 7
65,690,502 UART: [art] Erasing AUTHORITY.KEYID = 7
65,692,011 UART: [art] PUB.X = 610633C10EB56463DF85F1C0172CAFEC09B63E5B84C0921804DC381CD6C026CDC984A719B08C4BE754455A1925AAACC4
65,699,300 UART: [art] PUB.Y = C1FFEF226E7106633A9A0F69C2C140B3392F15552F738A4FE6AF898EF61AA4AE3101DC6B6652FBC925F2F0F7FF2A17AD
65,706,574 UART: [art] SIG.R = 7E6804DC2B26B311EF2D9522532E182502BA1E12E338A630D5BBBD5D07880218F533DDCC5EBEBDABD97F86F88D5C391A
65,713,915 UART: [art] SIG.S = 96DB1A20FEB2AD320169A2E7361DA9D2EA23AD7D28EE76661485659A20DD6C047FA06CBC872E2708F924B2A19C6ECCC5
67,018,959 UART: mbox::rt_entry...
67,019,924 UART: ____ _ _ _ ____ _____
67,021,914 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,023,921 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,025,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,027,786 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,029,644 UART: |_|
67,030,523 UART:
67,319,236 UART: [rt] Runtime listening for mailbox commands...
67,321,249 UART:
67,321,409 UART: Running Caliptra ROM ...
67,322,424 UART:
67,322,895 UART: [state] CFI Enabled
67,338,694 UART: [state] LifecycleState = Unprovisioned
67,340,673 UART: [state] DebugLocked = No
67,342,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,347,453 UART: [kat] SHA2-256
67,517,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,527,682 UART: [kat] ++
67,528,220 UART: [kat] sha1
67,538,949 UART: [kat] SHA2-256
67,541,643 UART: [kat] SHA2-384
67,546,275 UART: [kat] SHA2-512-ACC
67,548,671 UART: [kat] ECC-384
69,833,947 UART: [kat] HMAC-384Kdf
69,846,109 UART: [kat] LMS
71,036,163 UART: [kat] --
71,040,095 UART: [update-reset] ++
74,743,969 UART: [update-reset] Image verified using Vendor ECC Key Index 0
74,748,551 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
75,006,773 >>> mbox cmd response: success
75,007,140 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,008,510 UART: [update-reset] Copying MAN_2 To MAN_1
75,030,924 UART: [update-reset Success] --
75,034,663 UART: [state] Locking Datavault
75,039,165 UART: [state] Locking PCR0, PCR1 and PCR31
75,040,872 UART: [state] Locking ICCM
75,042,132 UART: [exit] Launching FMC @ 0x40000130
75,050,523 UART:
75,050,757 UART: Running Caliptra FMC ...
75,051,783 UART:
75,051,930 UART: [state] CFI Enabled
75,096,644 UART: [art] Extend RT PCRs Done
75,097,825 UART: [art] Lock RT PCRs Done
75,099,466 UART: [art] Populate DV Done
75,104,921 UART: [fht] FMC Alias Private Key: 7
75,106,566 UART: [art] Derive CDI
75,107,299 UART: [art] Store in in slot 0x4
75,149,777 UART: [art] Derive Key Pair
75,150,791 UART: [art] Store priv key in slot 0x5
78,393,065 UART: [art] Derive Key Pair - Done
78,406,011 UART: [art] Signing Cert with AUTHO
78,407,314 UART: RITY.KEYID = 7
80,686,362 UART: [art] Erasing AUTHORITY.KEYID = 7
80,687,863 UART: [art] PUB.X = B464D5086B767C4B36A8181C6AE13A7BF22BF0B2D9D552668CB51F87D66DBE81C17B4DF643FE935A87E6DC8BEFE871CA
80,695,122 UART: [art] PUB.Y = 8F67379ED195A97658FA3E6CB0FAA9F2AAF9FD2827920D2F9E3208139A8A6BFBC62AFC8BE142465C0D15BC4F4CB48625
80,702,368 UART: [art] SIG.R = AF57FCD081883B74E8645E7D9314FD90E9068A9D020B6974B5144815E07BDECA4C1A1DD7308FE7904327BC130FC36CBE
80,709,769 UART: [art] SIG.S = 367152204FD0997516D6EDCACF0C41622EDF871B3DA8C98FAD0B5B081C7C49C90E9F4D6F16E25343EA2357661C85E493
82,014,370 UART: mbox::rt_entry...
82,015,309 UART: ____ _ _ _ ____ _____
82,017,232 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,019,240 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,021,090 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,022,940 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,024,879 UART: |_|
82,025,739 UART:
82,305,948 UART: [rt] Runtime listening for mailbox commands...
82,308,088 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,445 writing to cptra_bootfsm_go
4,127,897 ready_for_fw is high
4,128,317 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,354,249 >>> mbox cmd response: success
17,354,831 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,997,481 UART:
22,997,858 UART: Running Caliptra FMC ...
22,998,987 UART:
22,999,146 UART: [state] CFI Enabled
23,007,149 UART: [fht] FMC Alias Private Key: 7
25,337,556 UART: [art] Extend RT PCRs Done
25,338,777 UART: [art] Lock RT PCRs Done
25,340,643 UART: [art] Populate DV Done
25,345,897 UART: [fht] FMC Alias Private Key: 7
25,347,654 UART: [art] Derive CDI
25,348,391 UART: [art] Store in in slot 0x4
25,391,052 UART: [art] Derive Key Pair
25,392,094 UART: [art] Store priv key in slot 0x5
28,633,863 UART: [art] Derive Key Pair - Done
28,646,674 UART: [art] Signing Cert with AUTHO
28,648,015 UART: RITY.KEYID = 7
30,927,582 UART: [art] Erasing AUTHORITY.KEYID = 7
30,929,084 UART: [art] PUB.X = 7ACA7230A14953181D0E4F9D84746F3BD6F27E19C7D764A9FBDA5353631C4EAC7D875A42DA4574AD5E63BA1F4168834D
30,936,295 UART: [art] PUB.Y = 22FF36633AEDDC9437A35343E46EA36D947A55835894AD0594555C4B55F048D295234ECD7D2D2D8AC6094ECFD9BDB2AE
30,943,580 UART: [art] SIG.R = 515F262AC56800DB0B04CDFA3FE6513941E1FF9151C659206A5D053051F2628AAA571D8D3FB67762A55C4D0019323D6A
30,950,906 UART: [art] SIG.S = 2519015A7E9D21F506A08E7703B5ADEBD75BE58CF05573CFFC0B65B2D667F53E94E0FCABA2ED0C905C751C6F5529624F
32,255,491 UART: mbox::rt_entry...
32,256,460 UART: ____ _ _ _ ____ _____
32,258,442 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,260,444 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,262,372 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,264,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,266,261 UART: |_|
32,267,091 UART:
32,380,405 UART: [rt] Runtime listening for mailbox commands...
32,382,519 >>> mbox cmd response data (48 bytes)
34,441,062 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,098,573 >>> mbox cmd response: success
43,099,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,131,443 UART:
43,131,763 UART: Running Caliptra FMC ...
43,132,887 UART:
43,133,046 UART: [state] CFI Enabled
43,177,122 UART: [art] Extend RT PCRs Done
43,178,267 UART: [art] Lock RT PCRs Done
43,180,093 UART: [art] Populate DV Done
43,185,683 UART: [fht] FMC Alias Private Key: 7
43,187,386 UART: [art] Derive CDI
43,188,198 UART: [art] Store in in slot 0x4
43,230,582 UART: [art] Derive Key Pair
43,231,625 UART: [art] Store priv key in slot 0x5
46,473,884 UART: [art] Derive Key Pair - Done
46,486,661 UART: [art] Signing Cert with AUTHO
46,487,994 UART: RITY.KEYID = 7
48,767,515 UART: [art] Erasing AUTHORITY.KEYID = 7
48,769,072 UART: [art] PUB.X = C402066ABE6003D2CD4DCC9FB60F503321746F6332E8AD09D1FA5C1166E940A3845C5578A8B29BC9F454CFA1C643442A
48,776,252 UART: [art] PUB.Y = F157F9EC45629A25B1E6D580CF41A619825A56621F1CC25733A6F8CCC1C360637FE457745DAB610DC9719BFC51D7D551
48,783,459 UART: [art] SIG.R = A3F47EF1FA971324053F0EF2285B456B38BDD6F30645B0E4BD1EA0D1173590BDE09BBD9C9C0564CF9E7B4B563DD85D8B
48,790,885 UART: [art] SIG.S = 341547DFE38B571FE3B4B1A2CD92D532B37C0C899D8D2D84DE8A8A6171D027080E902256F25D01EC57D2BECAB1D4550A
50,096,085 UART: Caliptra RT
50,096,788 UART: [state] CFI Enabled
50,382,629 UART: [rt] RT listening for mailbox commands...
50,414,465 UART: [rt]cmd =0x4d454153, len=108
50,434,079 >>> mbox cmd response data (12 bytes)
52,479,113 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
60,373,114 >>> mbox cmd response: success
62,418,424 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
62,517,882 UART:
62,518,224 UART: Running Caliptra FMC ...
62,519,300 UART:
62,519,457 UART: [state] CFI Enabled
62,520,390 UART: [art] Extend RT PCRs Done
62,521,564 UART: [art] Lock RT PCRs Done
62,522,634 UART: [art] Populate DV Done
62,523,665 UART: [fht] FMC Alias Private Key: 7
62,524,982 UART: [art] Derive CDI
62,525,716 UART: [art] Store in in slot 0x4
62,526,881 UART: [art] Derive Key Pair
62,527,797 UART: [art] Store priv key in slot 0x5
63,747,689 UART: [art] Derive Key Pair - Done
63,760,571 UART: [art] Signing Cert with AUTHO
63,762,034 UART: RITY.KEYID = 7
66,041,278 UART: [art] Erasing AUTHORITY.KEYID = 7
66,042,785 UART: [art] PUB.X = 06836A56EAFE5D2B38FE800EBC406ADE32CC6D10024E66533CED2344948D4B710589843C305E10CC54E9AAE0E55B3C22
66,050,026 UART: [art] PUB.Y = D1B4E61D2055C0EA3039E2D9B81B59EEE3197A38B4AD7203B9387134F1B6DBF825AA75832C39E2AB86F5893107F08200
66,057,245 UART: [art] SIG.R = 2FD9F06B6B6897610A116B47AD135BA7C56FB8DA890A9B9D09348C5103759BC3983E43ABF38B6132B56C96F1CAAC6FED
66,064,662 UART: [art] SIG.S = 64B50AF3AE72EDDB83B4D67CBC13022CC3BEA935A3FE9F2B50C5353579F546D037AC2AF327309F3669431FDF40535E75
67,369,941 UART: mbox::rt_entry...
67,370,912 UART: ____ _ _ _ ____ _____
67,372,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,374,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,376,832 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,378,764 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,380,702 UART: |_|
67,381,511 UART:
67,662,388 UART: [rt] Runtime listening for mailbox commands...
75,457,007 >>> mbox cmd response: success
75,457,411 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,490,962 UART:
75,491,220 UART: Running Caliptra FMC ...
75,492,248 UART:
75,492,394 UART: [state] CFI Enabled
75,536,357 UART: [art] Extend RT PCRs Done
75,537,545 UART: [art] Lock RT PCRs Done
75,538,671 UART: [art] Populate DV Done
75,543,919 UART: [fht] FMC Alias Private Key: 7
75,545,503 UART: [art] Derive CDI
75,546,239 UART: [art] Store in in slot 0x4
75,588,342 UART: [art] Derive Key Pair
75,589,336 UART: [art] Store priv key in slot 0x5
78,831,023 UART: [art] Derive Key Pair - Done
78,843,747 UART: [art] Signing Cert with AUTHO
78,845,044 UART: RITY.KEYID = 7
81,125,171 UART: [art] Erasing AUTHORITY.KEYID = 7
81,126,683 UART: [art] PUB.X = 6B0E2EC69943AEF85AD9323901D49A9F75857DEDF3DD3306BE1636F6580F7A1FB3AF855E068D03AF0112E9950F350AEA
81,133,946 UART: [art] PUB.Y = 6A94C0C4451415E5417BBA1FAA9F28055568B5DD7E6AAF80F240E791634A4270B000BD1AFD3978F156B6CDDC099D3816
81,141,211 UART: [art] SIG.R = F680EA9200F26CB04206825AAD8032FDD6D7A923CBEC8C3E1575AF01B3D414FE6C16DFAF44CF6C776598611DC2E87148
81,148,568 UART: [art] SIG.S = 3877B2EE0AAF6C57F212022480EDBF165E8FFE2574640C6ADF167377B1457852C3380AFE3FCB9BA5BA0640C48723A7A0
82,453,403 UART: mbox::rt_entry...
82,454,371 UART: ____ _ _ _ ____ _____
82,456,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,458,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,460,256 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,462,189 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,464,121 UART: |_|
82,464,929 UART:
82,748,361 UART: [rt] Runtime listening for mailbox commands...
82,750,477 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.25s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,411,402 UART: [ldev] --
10,415,488 UART: [fwproc] Wait for Commands...
10,416,978 UART: [fwproc] Recv command 0x46574c44
10,419,030 UART: [fwproc] Recv'd Img size: 78632 bytes
13,389,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,462,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,531,045 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,724,052 >>> mbox cmd response: success
13,724,583 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,728,236 UART: [afmc] ++
13,728,842 UART: [afmc] CDI.KEYID = 6
13,729,730 UART: [afmc] SUBJECT.KEYID = 7
13,730,889 UART: [afmc] AUTHORITY.KEYID = 5
16,257,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,980,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,982,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,998,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,014,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,029,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,053,164 UART: [afmc] --
18,056,765 UART: [cold-reset] --
18,061,547 UART: [state] Locking Datavault
18,068,473 UART: [state] Locking PCR0, PCR1 and PCR31
18,070,191 UART: [state] Locking ICCM
18,071,699 UART: [exit] Launching FMC @ 0x40000130
18,080,102 UART:
18,080,367 UART: Running Caliptra FMC ...
18,081,479 UART:
18,081,647 UART: [state] CFI Enabled
18,140,488 UART: [fht] FMC Alias Private Key: 7
19,904,815 UART: [art] Extend RT PCRs Done
19,906,051 UART: [art] Lock RT PCRs Done
19,907,894 UART: [art] Populate DV Done
19,913,304 UART: [fht] FMC Alias Private Key: 7
19,914,795 UART: [art] Derive CDI
19,915,559 UART: [art] Store in in slot 0x4
19,972,905 UART: [art] Derive Key Pair
19,973,943 UART: [art] Store priv key in slot 0x5
22,437,145 UART: [art] Derive Key Pair - Done
22,449,876 UART: [art] Signing Cert with AUTHO
22,451,188 UART: RITY.KEYID = 7
24,163,162 UART: [art] Erasing AUTHORITY.KEYID = 7
24,164,678 UART: [art] PUB.X = 676E3CD8929AC755C5903E9D852A97965FDAE3B6CA12313AEC29ADAA203BCCA1CE19CF2CF4EFA8934D7A8E0309FB0147
24,171,975 UART: [art] PUB.Y = 02078970B6B402B791BDC332B8D2385B4F62322F29FD24A1C0C5984B6DE208A26E60B4F174152D06C75BF148A0B7E0EF
24,179,229 UART: [art] SIG.R = 7177DCE972C178EBD50D7137E991FDEDE393DEC46C7767708C1E317D0B5E31922E32CAD2014A656E63CEA007478C3AD8
24,186,623 UART: [art] SIG.S = 7660571557A7068DFF43CC73ADADA142DEBECC9367E1EE671038080774D4EC470B11A1666584A6E38CC51340E7AE5D71
25,165,158 UART: mbox::rt_entry...
25,166,131 UART: ____ _ _ _ ____ _____
25,168,121 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,170,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,172,059 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,173,992 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,175,935 UART: |_|
25,176,768 UART:
25,289,364 UART: [rt] Runtime listening for mailbox commands...
25,291,475 >>> mbox cmd response data (48 bytes)
27,353,900 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,498,607 UART:
27,499,007 UART: Running Caliptra ROM ...
27,500,153 UART:
27,500,326 UART: [state] CFI Enabled
27,572,712 UART: [state] LifecycleState = Unprovisioned
27,574,598 UART: [state] DebugLocked = No
27,575,825 UART: [state] WD Timer not started. Device not locked for debugging
27,578,866 UART: [kat] SHA2-256
27,757,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,769,535 UART: [kat] ++
27,770,073 UART: [kat] sha1
27,781,042 UART: [kat] SHA2-256
27,784,106 UART: [kat] SHA2-384
27,790,261 UART: [kat] SHA2-512-ACC
27,793,205 UART: [kat] ECC-384
30,255,976 UART: [kat] HMAC-384Kdf
30,280,737 UART: [kat] LMS
30,810,192 UART: [kat] --
30,813,838 UART: [update-reset] ++
34,253,622 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,257,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
34,640,685 >>> mbox cmd response: success
34,641,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,642,365 UART: [update-reset] Copying MAN_2 To MAN_1
34,664,691 UART: [update-reset Success] --
34,668,846 UART: [state] Locking Datavault
34,672,157 UART: [state] Locking PCR0, PCR1 and PCR31
34,673,825 UART: [state] Locking ICCM
34,675,228 UART: [exit] Launching FMC @ 0x40000130
34,683,679 UART:
34,683,917 UART: Running Caliptra FMC ...
34,685,331 UART:
34,685,500 UART: [state] CFI Enabled
34,773,126 UART: [art] Extend RT PCRs Done
34,774,328 UART: [art] Lock RT PCRs Done
34,775,596 UART: [art] Populate DV Done
34,780,955 UART: [fht] FMC Alias Private Key: 7
34,782,615 UART: [art] Derive CDI
34,783,440 UART: [art] Store in in slot 0x4
34,842,091 UART: [art] Derive Key Pair
34,843,139 UART: [art] Store priv key in slot 0x5
37,305,642 UART: [art] Derive Key Pair - Done
37,318,593 UART: [art] Signing Cert with AUTHO
37,319,925 UART: RITY.KEYID = 7
39,031,828 UART: [art] Erasing AUTHORITY.KEYID = 7
39,033,315 UART: [art] PUB.X = 14C1E97000F0CB464F1E7719066DD9603F67FBDAC36B6F0399781FC42A4013F574F2D846F12EF360731A7F2807A489D7
39,040,554 UART: [art] PUB.Y = 2F6E50B1739842E470226EE201A14BC067DC251F270CB8C9DBFADE82F4B2F45C124053A9806A6EF86A1ABC817A70A196
39,047,775 UART: [art] SIG.R = E38B892D6D73B57A87C356244B85BC7C45C2BE163A72466E951FC3BFF59AAAB1FF5AA6BE62443F9187DB206DE1BB97DB
39,055,240 UART: [art] SIG.S = 46AA1236DA0C580D189EEBF95065AD617E74428CE2676130F4F6B2A2CC0EC859F7327DDC873956C9232E23EE4B192B78
40,033,984 UART: Caliptra RT
40,034,706 UART: [state] CFI Enabled
40,369,482 UART: [rt] RT listening for mailbox commands...
40,401,277 UART: [rt]cmd =0x4d454153, len=108
40,420,314 >>> mbox cmd response data (12 bytes)
42,467,234 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,567,758 UART:
42,568,117 UART: Running Caliptra ROM ...
42,569,276 UART:
42,569,448 UART: [state] CFI Enabled
42,634,647 UART: [state] LifecycleState = Unprovisioned
42,636,532 UART: [state] DebugLocked = No
42,637,921 UART: [state] WD Timer not started. Device not locked for debugging
42,642,314 UART: [kat] SHA2-256
42,821,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,833,049 UART: [kat] ++
42,833,594 UART: [kat] sha1
42,844,433 UART: [kat] SHA2-256
42,847,439 UART: [kat] SHA2-384
42,853,476 UART: [kat] SHA2-512-ACC
42,856,429 UART: [kat] ECC-384
45,318,863 UART: [kat] HMAC-384Kdf
45,342,550 UART: [kat] LMS
45,872,002 UART: [kat] --
45,877,281 UART: [update-reset] ++
48,875,980 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,879,138 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,137,061 >>> mbox cmd response: success
51,181,003 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
51,280,433 UART: [update-reset] Copying MAN_2 To MAN_1
51,282,124 UART: [update-reset Success] --
51,283,210 UART: [state] Locking Datavault
51,284,367 UART: [state] Locking PCR0, PCR1 and PCR31
51,285,914 UART: [state] Locking ICCM
51,286,792 UART: [exit] Launching FMC @ 0x40000130
51,288,136 UART:
51,288,280 UART: Running Caliptra FMC ...
51,289,381 UART:
51,289,560 UART: [state] CFI Enabled
51,290,439 UART: [art] Extend RT PCRs Done
51,291,583 UART: [art] Lock RT PCRs Done
51,292,599 UART: [art] Populate DV Done
51,293,566 UART: [fht] FMC Alias Private Key: 7
51,295,111 UART: [art] Derive CDI
51,295,859 UART: [art] Store in in slot 0x4
51,296,946 UART: [art] Derive Key Pair
51,297,939 UART: [art] Store priv key in slot 0x5
51,811,346 UART: [art] Derive Key Pair - Done
51,824,346 UART: [art] Signing Cert with AUTHO
51,825,646 UART: RITY.KEYID = 7
53,537,621 UART: [art] Erasing AUTHORITY.KEYID = 7
53,539,142 UART: [art] PUB.X = 662A2B7B20670C4B8464E20DDFC6540C1663342D48FE0B7FDB548525695DE92289DCCB2EBB013A9AC7CE67CEEF4F1C9F
53,546,441 UART: [art] PUB.Y = 14E400CAC440240C1841FE2199FD2E09FA0254CCF98392D0CFFAD90B1BA064E704009987278D9D3B8D537C0FB5BCF0AA
53,553,620 UART: [art] SIG.R = EBD42FC2A17F4A39676A35A3698393F777E6434AA72830B97FEB61429AD6F424EA1E1FADA923DB7F16F9FD64D34C10C8
53,561,084 UART: [art] SIG.S = A85F23B2A56565EC1E8EEFDFFDD4F382C9FF85F407ECD2075AC039183F29AC2F8B8A4EA1DF151497C5F7E6E33B696D8A
54,539,743 UART: mbox::rt_entry...
54,540,712 UART: ____ _ _ _ ____ _____
54,542,644 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,544,652 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,546,591 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,548,521 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,550,456 UART: |_|
54,551,264 UART:
54,833,356 UART: [rt] Runtime listening for mailbox commands...
54,835,386 UART:
54,835,553 UART: Running Caliptra ROM ...
54,836,659 UART:
54,836,819 UART: [state] CFI Enabled
54,898,605 UART: [state] LifecycleState = Unprovisioned
54,900,475 UART: [state] DebugLocked = No
54,901,934 UART: [state] WD Timer not started. Device not locked for debugging
54,906,007 UART: [kat] SHA2-256
55,085,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
55,096,737 UART: [kat] ++
55,097,199 UART: [kat] sha1
55,108,553 UART: [kat] SHA2-256
55,111,580 UART: [kat] SHA2-384
55,118,324 UART: [kat] SHA2-512-ACC
55,121,321 UART: [kat] ECC-384
57,584,210 UART: [kat] HMAC-384Kdf
57,607,400 UART: [kat] LMS
58,136,855 UART: [kat] --
58,142,593 UART: [update-reset] ++
61,134,909 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,138,832 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
61,396,788 >>> mbox cmd response: success
61,397,169 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,397,778 UART: [update-reset] Copying MAN_2 To MAN_1
61,420,117 UART: [update-reset Success] --
61,423,922 UART: [state] Locking Datavault
61,426,686 UART: [state] Locking PCR0, PCR1 and PCR31
61,428,391 UART: [state] Locking ICCM
61,429,731 UART: [exit] Launching FMC @ 0x40000130
61,438,182 UART:
61,438,428 UART: Running Caliptra FMC ...
61,439,536 UART:
61,439,691 UART: [state] CFI Enabled
61,545,054 UART: [art] Extend RT PCRs Done
61,546,251 UART: [art] Lock RT PCRs Done
61,547,768 UART: [art] Populate DV Done
61,553,285 UART: [fht] FMC Alias Private Key: 7
61,554,983 UART: [art] Derive CDI
61,555,822 UART: [art] Store in in slot 0x4
61,614,248 UART: [art] Derive Key Pair
61,615,280 UART: [art] Store priv key in slot 0x5
64,078,230 UART: [art] Derive Key Pair - Done
64,091,127 UART: [art] Signing Cert with AUTHO
64,092,433 UART: RITY.KEYID = 7
65,804,408 UART: [art] Erasing AUTHORITY.KEYID = 7
65,805,928 UART: [art] PUB.X = 392D582D4C38D39CF6DE99EBFF996CC8B4A501DB641DBFAACAEA49688A22BD6F37B4B3BB75F1B9D4CC95671F60F28AA0
65,813,172 UART: [art] PUB.Y = 1E094108DC207908D3B36DE2D3B1F1D8EE9CF68510027D9674070171847FBBC526D476557E81A287DBEE07724770014C
65,820,405 UART: [art] SIG.R = EE33FE510619CC6BC8BBAB75408D1D4C6099C822C02A70B6B80E34F63F20013109D546BCCA37078611E934BC81EAA7B4
65,827,805 UART: [art] SIG.S = 5F7E0F58F8580C45B615DF5D0ABCB97AF9F1D507209E4927460984397D7517B5F1E65FBBB0256DCF5F5DCC6F07D0FA1A
66,806,693 UART: mbox::rt_entry...
66,807,658 UART: ____ _ _ _ ____ _____
66,809,562 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,811,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,813,506 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,815,639 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,817,587 UART: |_|
66,818,425 UART:
67,103,993 UART: [rt] Runtime listening for mailbox commands...
67,106,132 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.47s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,400,012 UART: [ldev] --
10,404,742 UART: [fwproc] Wait for Commands...
10,406,684 UART: [fwproc] Recv command 0x46574c44
10,408,954 UART: [fwproc] Recv'd Img size: 78632 bytes
13,417,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,490,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,606,750 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,935,836 >>> mbox cmd response: success
13,936,312 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,940,393 UART: [afmc] ++
13,941,164 UART: [afmc] CDI.KEYID = 6
13,942,355 UART: [afmc] SUBJECT.KEYID = 7
13,943,794 UART: [afmc] AUTHORITY.KEYID = 5
16,481,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,207,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,209,816 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,224,992 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,240,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,255,181 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,279,310 UART: [afmc] --
18,283,181 UART: [cold-reset] --
18,288,235 UART: [state] Locking Datavault
18,293,329 UART: [state] Locking PCR0, PCR1 and PCR31
18,295,465 UART: [state] Locking ICCM
18,297,629 UART: [exit] Launching FMC @ 0x40000130
18,306,312 UART:
18,306,568 UART: Running Caliptra FMC ...
18,307,597 UART:
18,307,746 UART: [state] CFI Enabled
18,363,622 UART: [fht] FMC Alias Private Key: 7
20,127,635 UART: [art] Extend RT PCRs Done
20,128,858 UART: [art] Lock RT PCRs Done
20,130,616 UART: [art] Populate DV Done
20,136,134 UART: [fht] FMC Alias Private Key: 7
20,137,617 UART: [art] Derive CDI
20,138,350 UART: [art] Store in in slot 0x4
20,196,117 UART: [art] Derive Key Pair
20,197,154 UART: [art] Store priv key in slot 0x5
22,659,652 UART: [art] Derive Key Pair - Done
22,672,229 UART: [art] Signing Cert with AUTHO
22,673,540 UART: RITY.KEYID = 7
24,386,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,387,672 UART: [art] PUB.X = F9E7F190808F230BE55F45A59F3BE4584B94070C2B82D994461AD59C203D24D1222C0062A04624AAAC4855B33580C57A
24,394,876 UART: [art] PUB.Y = 11EFA4F972268C163720E34704B8FB45BE3B2AB877832D86DC39B4F2CAA1D2330129A068AF408D50F2EBB2CE2D9A7010
24,402,154 UART: [art] SIG.R = 516EE1ACD3FC8F86460A2AAFF7AF78953708C4928C6E72BFD45091AE3CCF05FC6FE06D01EE3A572F71790F41150F2BF7
24,409,590 UART: [art] SIG.S = 8244E2AF58D773A04E2F090E4C336D4E8CE30AAF8F0F36C6AB1BFAED155EAEC97A9C328807B4FD1ECE47D2CFAFC37A32
25,388,338 UART: mbox::rt_entry...
25,389,305 UART: ____ _ _ _ ____ _____
25,391,295 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,393,303 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,395,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,397,178 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,399,035 UART: |_|
25,399,838 UART:
25,512,646 UART: [rt] Runtime listening for mailbox commands...
25,514,760 >>> mbox cmd response data (48 bytes)
27,574,273 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,718,975 UART:
27,719,344 UART: Running Caliptra ROM ...
27,720,399 UART:
27,720,551 UART: [state] CFI Enabled
27,776,585 UART: [state] LifecycleState = Unprovisioned
27,778,631 UART: [state] DebugLocked = No
27,781,067 UART: [state] WD Timer not started. Device not locked for debugging
27,785,101 UART: [kat] SHA2-256
27,974,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,985,725 UART: [kat] ++
27,986,177 UART: [kat] sha1
27,997,619 UART: [kat] SHA2-256
28,000,596 UART: [kat] SHA2-384
28,007,521 UART: [kat] SHA2-512-ACC
28,010,083 UART: [kat] ECC-384
30,461,929 UART: [kat] HMAC-384Kdf
30,484,035 UART: [kat] LMS
31,015,619 UART: [kat] --
31,019,878 UART: [update-reset] ++
34,485,711 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,488,724 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,096,402 >>> mbox cmd response: success
35,096,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,097,247 UART: [update-reset] Copying MAN_2 To MAN_1
35,134,499 UART: [update-reset Success] --
35,138,281 UART: [state] Locking Datavault
35,141,653 UART: [state] Locking PCR0, PCR1 and PCR31
35,143,815 UART: [state] Locking ICCM
35,145,352 UART: [exit] Launching FMC @ 0x40000130
35,154,023 UART:
35,154,264 UART: Running Caliptra FMC ...
35,155,530 UART:
35,155,695 UART: [state] CFI Enabled
35,252,754 UART: [art] Extend RT PCRs Done
35,253,944 UART: [art] Lock RT PCRs Done
35,255,404 UART: [art] Populate DV Done
35,261,084 UART: [fht] FMC Alias Private Key: 7
35,262,626 UART: [art] Derive CDI
35,263,443 UART: [art] Store in in slot 0x4
35,321,539 UART: [art] Derive Key Pair
35,322,579 UART: [art] Store priv key in slot 0x5
37,785,508 UART: [art] Derive Key Pair - Done
37,798,346 UART: [art] Signing Cert with AUTHO
37,799,674 UART: RITY.KEYID = 7
39,511,725 UART: [art] Erasing AUTHORITY.KEYID = 7
39,513,212 UART: [art] PUB.X = B4E7F881FB19880910AB892449FCD6E92A8E11B23621847E67277B749D50D827A1C93AD404BE6641DBD104623FB9D45A
39,520,503 UART: [art] PUB.Y = F785FC8BDD03181E4E99FD1C91135DC0F675C50684C02803A88D76F42E3BF9C670935181005B7427BC45E738FABC37AF
39,527,734 UART: [art] SIG.R = E7C4B16B8961F22906A6E48021482C0C48F3C72D7EF937A18DEF6FC663ABC1697AFD9B332B3D86DADE39156672E300E0
39,535,135 UART: [art] SIG.S = AF3FF624A9ED9E50D4826685E74DB8BA07A7A6E7CB0CA300F49F9C12864EE6E55FF89B2EFBE840CD7B940F31025116F2
40,513,917 UART: Caliptra RT
40,514,620 UART: [state] CFI Enabled
40,854,257 UART: [rt] RT listening for mailbox commands...
40,885,821 UART: [rt]cmd =0x4d454153, len=108
40,904,293 >>> mbox cmd response data (12 bytes)
42,950,746 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
43,051,188 UART:
43,051,571 UART: Running Caliptra ROM ...
43,052,647 UART:
43,052,805 UART: [state] CFI Enabled
43,115,528 UART: [state] LifecycleState = Unprovisioned
43,117,593 UART: [state] DebugLocked = No
43,120,030 UART: [state] WD Timer not started. Device not locked for debugging
43,124,773 UART: [kat] SHA2-256
43,314,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,325,393 UART: [kat] ++
43,325,847 UART: [kat] sha1
43,337,491 UART: [kat] SHA2-256
43,340,507 UART: [kat] SHA2-384
43,345,740 UART: [kat] SHA2-512-ACC
43,348,368 UART: [kat] ECC-384
45,798,809 UART: [kat] HMAC-384Kdf
45,822,007 UART: [kat] LMS
46,353,543 UART: [kat] --
46,355,549 UART: [update-reset] ++
49,377,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,380,651 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,773,979 >>> mbox cmd response: success
51,819,395 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
51,918,887 UART: [update-reset] Copying MAN_2 To MAN_1
51,920,585 UART: [update-reset Success] --
51,921,667 UART: [state] Locking Datavault
51,922,817 UART: [state] Locking PCR0, PCR1 and PCR31
51,925,575 UART: [state] Locking ICCM
51,926,470 UART: [exit] Launching FMC @ 0x40000130
51,927,906 UART:
51,928,069 UART: Running Caliptra FMC ...
51,929,111 UART:
51,929,263 UART: [state] CFI Enabled
51,930,103 UART: [art] Extend RT PCRs Done
51,931,184 UART: [art] Lock RT PCRs Done
51,932,187 UART: [art] Populate DV Done
51,933,154 UART: [fht] FMC Alias Private Key: 7
51,934,474 UART: [art] Derive CDI
51,935,214 UART: [art] Store in in slot 0x4
51,936,390 UART: [art] Derive Key Pair
51,937,303 UART: [art] Store priv key in slot 0x5
52,461,536 UART: [art] Derive Key Pair - Done
52,474,600 UART: [art] Signing Cert with AUTHO
52,475,905 UART: RITY.KEYID = 7
54,187,317 UART: [art] Erasing AUTHORITY.KEYID = 7
54,188,819 UART: [art] PUB.X = 874A0694E04069C7E9212E8A7F6D6468BC4A5C90196CA15DB9CF111C0909864D3630FA44C6004D3D1BB3E815C747357B
54,196,059 UART: [art] PUB.Y = A8E64DB7FA30B9FC42C5AAD8A813BD6EBF964B8BDCF88A965773B2C4EB59C038252D5F7FD6E27D2FFCCB29E0478468B4
54,203,351 UART: [art] SIG.R = F6A5D581C31502BA38287AAACBDB19724E3248034A5147AA02333AE0A18840EA190774A99DC123FE63098605DAEB72CF
54,210,737 UART: [art] SIG.S = A769219CC85416B826456A4C3A039F1F9F2BD9EEB7B90CCBEA77D4FC9D038CB6EBD41AEF06891EC76644D2393B360B51
55,188,630 UART: mbox::rt_entry...
55,189,583 UART: ____ _ _ _ ____ _____
55,191,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,193,519 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,195,373 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,197,293 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,199,189 UART: |_|
55,200,070 UART:
55,482,632 UART: [rt] Runtime listening for mailbox commands...
55,484,635 UART:
55,484,796 UART: Running Caliptra ROM ...
55,485,811 UART:
55,485,953 UART: [state] CFI Enabled
55,548,177 UART: [state] LifecycleState = Unprovisioned
55,550,289 UART: [state] DebugLocked = No
55,551,587 UART: [state] WD Timer not started. Device not locked for debugging
55,556,317 UART: [kat] SHA2-256
55,746,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,756,932 UART: [kat] ++
55,757,386 UART: [kat] sha1
55,770,155 UART: [kat] SHA2-256
55,773,202 UART: [kat] SHA2-384
55,777,679 UART: [kat] SHA2-512-ACC
55,780,255 UART: [kat] ECC-384
58,235,386 UART: [kat] HMAC-384Kdf
58,256,681 UART: [kat] LMS
58,788,232 UART: [kat] --
58,793,140 UART: [update-reset] ++
61,825,195 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,828,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
62,222,128 >>> mbox cmd response: success
62,222,497 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,223,153 UART: [update-reset] Copying MAN_2 To MAN_1
62,260,712 UART: [update-reset Success] --
62,266,060 UART: [state] Locking Datavault
62,269,055 UART: [state] Locking PCR0, PCR1 and PCR31
62,271,199 UART: [state] Locking ICCM
62,273,516 UART: [exit] Launching FMC @ 0x40000130
62,282,135 UART:
62,282,379 UART: Running Caliptra FMC ...
62,283,485 UART:
62,283,645 UART: [state] CFI Enabled
62,383,023 UART: [art] Extend RT PCRs Done
62,384,210 UART: [art] Lock RT PCRs Done
62,385,770 UART: [art] Populate DV Done
62,391,393 UART: [fht] FMC Alias Private Key: 7
62,392,959 UART: [art] Derive CDI
62,393,730 UART: [art] Store in in slot 0x4
62,452,803 UART: [art] Derive Key Pair
62,453,870 UART: [art] Store priv key in slot 0x5
64,916,524 UART: [art] Derive Key Pair - Done
64,929,635 UART: [art] Signing Cert with AUTHO
64,930,950 UART: RITY.KEYID = 7
66,642,713 UART: [art] Erasing AUTHORITY.KEYID = 7
66,644,378 UART: [art] PUB.X = F2F1471C5E5DDEF5FEBA5F527C2A7F11C73001C7F8123A35DB8A78504E099D0011D434118102123B209300698B23EA27
66,651,399 UART: [art] PUB.Y = 6D28955329F9EDB9AB92A4AC56D1D7325FF0D85EEB412979CE8349644F09E203400661D80AA3BCFCC3A3341CBC0668C6
66,658,672 UART: [art] SIG.R = FE2041F7C05A1E48A94C6B51C266D1D6F3E63F5F30046FAB1E340855DF9644A6BBE32AECFEFCEA47267C2C5FDEB24992
66,666,125 UART: [art] SIG.S = 6A166C7CE32122ABAE154C9B6C92FBBE6F84D7A3CB7C4F607499AD7049E972395EB0556CC7C17AF7288DECE91A6D2BC1
67,644,680 UART: mbox::rt_entry...
67,645,639 UART: ____ _ _ _ ____ _____
67,647,567 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,649,577 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,651,452 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,653,380 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,655,433 UART: |_|
67,656,241 UART:
67,940,155 UART: [rt] Runtime listening for mailbox commands...
67,942,276 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,437,019 ready_for_fw is high
3,437,463 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,960,708 >>> mbox cmd response: success
13,961,268 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,254,166 UART:
18,254,543 UART: Running Caliptra FMC ...
18,255,642 UART:
18,255,796 UART: [state] CFI Enabled
18,325,636 UART: [fht] FMC Alias Private Key: 7
20,089,554 UART: [art] Extend RT PCRs Done
20,090,791 UART: [art] Lock RT PCRs Done
20,092,515 UART: [art] Populate DV Done
20,097,883 UART: [fht] FMC Alias Private Key: 7
20,099,591 UART: [art] Derive CDI
20,100,333 UART: [art] Store in in slot 0x4
20,157,622 UART: [art] Derive Key Pair
20,158,622 UART: [art] Store priv key in slot 0x5
22,621,273 UART: [art] Derive Key Pair - Done
22,634,412 UART: [art] Signing Cert with AUTHO
22,635,720 UART: RITY.KEYID = 7
24,346,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,347,811 UART: [art] PUB.X = 7578F8678C30C06957D865D0716E80C441E3353127BCC54C102D6DDDA165CB820C567DBED96920872578161E10A91106
24,355,054 UART: [art] PUB.Y = 756E1EAE06347745C00A3CE531A49A80C60E87DF22D6A6FC5BB240BE40363C59DD8ED659A362467A8580CC6F47CBDFB8
24,362,336 UART: [art] SIG.R = B87C4C420922EA43607725770E3822C99BA1FC91C242AEADC8E73C40B540D3766699193AACBF9A9FBFEE21D7AD02DECB
24,369,719 UART: [art] SIG.S = 9858EB2AC53B993504E8098D5301FDD5509A9C5272D9BCFFCDE91249F986D926DF9331DF2EBE038FCB11420F3548D7BE
25,348,653 UART: mbox::rt_entry...
25,349,629 UART: ____ _ _ _ ____ _____
25,351,563 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,353,567 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,355,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,357,375 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,359,259 UART: |_|
25,360,141 UART:
25,471,953 UART: [rt] Runtime listening for mailbox commands...
25,474,087 >>> mbox cmd response data (48 bytes)
27,532,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,337,224 >>> mbox cmd response: success
35,337,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,371,238 UART:
35,371,566 UART: Running Caliptra FMC ...
35,372,611 UART:
35,372,760 UART: [state] CFI Enabled
35,467,816 UART: [art] Extend RT PCRs Done
35,469,036 UART: [art] Lock RT PCRs Done
35,470,529 UART: [art] Populate DV Done
35,476,207 UART: [fht] FMC Alias Private Key: 7
35,477,826 UART: [art] Derive CDI
35,478,565 UART: [art] Store in in slot 0x4
35,536,457 UART: [art] Derive Key Pair
35,537,507 UART: [art] Store priv key in slot 0x5
38,000,507 UART: [art] Derive Key Pair - Done
38,013,502 UART: [art] Signing Cert with AUTHO
38,014,835 UART: RITY.KEYID = 7
39,726,441 UART: [art] Erasing AUTHORITY.KEYID = 7
39,727,945 UART: [art] PUB.X = CB4E6ACC4FB617FF36147472337EF6B423B240854D5B9791A719AB2C4C846771C420F083F93491F5E6E6F2025B95319F
39,735,197 UART: [art] PUB.Y = 24DB0634FD5116970D03217C9DA6ADA4FF05A145800249A117078DC143110B815E963D3EACB4CDD0E3A31DFA7521AF7B
39,742,419 UART: [art] SIG.R = 1ACE95D635583B3DF9468172109C75383652E973C964DF88F4C74EF46F904B0614D6B80EBF6041C20998A08E380FC49E
39,749,796 UART: [art] SIG.S = 2DBE26D14C0BA37B42097249D5170C48238D3384993E5438A9780728BD91F11290DBE1627BDBC38C97E5CB649FF21527
40,728,928 UART: Caliptra RT
40,729,623 UART: [state] CFI Enabled
41,064,592 UART: [rt] RT listening for mailbox commands...
41,096,521 UART: [rt]cmd =0x4d454153, len=108
41,115,640 >>> mbox cmd response data (12 bytes)
43,164,186 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
50,167,422 >>> mbox cmd response: success
52,212,173 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
52,311,675 UART:
52,312,055 UART: Running Caliptra FMC ...
52,313,109 UART:
52,313,260 UART: [state] CFI Enabled
52,314,140 UART: [art] Extend RT PCRs Done
52,315,286 UART: [art] Lock RT PCRs Done
52,316,384 UART: [art] Populate DV Done
52,317,340 UART: [fht] FMC Alias Private Key: 7
52,318,661 UART: [art] Derive CDI
52,319,398 UART: [art] Store in in slot 0x4
52,320,574 UART: [art] Derive Key Pair
52,321,491 UART: [art] Store priv key in slot 0x5
52,824,969 UART: [art] Derive Key Pair - Done
52,837,942 UART: [art] Signing Cert with AUTHO
52,839,241 UART: RITY.KEYID = 7
54,550,593 UART: [art] Erasing AUTHORITY.KEYID = 7
54,552,103 UART: [art] PUB.X = 5F4001CC2C4334FE52FB43CEFD8689CD2A3DC941ABC9F9F145A0BAECE7FB3174764A904A678BBFD6173112A395FE6B26
54,559,399 UART: [art] PUB.Y = 86C6A03A37D03EBAD9E01CCE8C1F1FBAA559C5B8B52C5D6A6FD7F88EC9C9400E403C0973ACADF5972DFC9A83ADD9452E
54,566,980 UART: [art] SIG.R = 9BFD0014763E9DF7BCF79EDCDCC7BC4F3BA9C6A94CFFA7182BBC013096D42B2D2345D7107D039DF7709E25BB6222560D
54,574,069 UART: [art] SIG.S = C1B009C31D2760CFFA329B9FA0D33ED2C51F769A2AC3AD749354D4982A489930A4611CAD72D9C082183FA4F2631B04E8
55,552,729 UART: mbox::rt_entry...
55,553,685 UART: ____ _ _ _ ____ _____
55,555,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,557,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,559,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,561,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,563,505 UART: |_|
55,564,314 UART:
55,846,930 UART: [rt] Runtime listening for mailbox commands...
62,746,829 >>> mbox cmd response: success
62,747,238 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,780,896 UART:
62,781,158 UART: Running Caliptra FMC ...
62,782,189 UART:
62,782,337 UART: [state] CFI Enabled
62,875,786 UART: [art] Extend RT PCRs Done
62,876,974 UART: [art] Lock RT PCRs Done
62,878,452 UART: [art] Populate DV Done
62,884,207 UART: [fht] FMC Alias Private Key: 7
62,885,725 UART: [art] Derive CDI
62,886,472 UART: [art] Store in in slot 0x4
62,944,868 UART: [art] Derive Key Pair
62,945,869 UART: [art] Store priv key in slot 0x5
65,408,204 UART: [art] Derive Key Pair - Done
65,421,472 UART: [art] Signing Cert with AUTHO
65,422,781 UART: RITY.KEYID = 7
67,134,299 UART: [art] Erasing AUTHORITY.KEYID = 7
67,135,826 UART: [art] PUB.X = 5CCBBEFD3F64E6DBF921A2594CA044F499DEBE8AE5D75C6B7F709558845527617B26FBFB008C0754251E5B8523F67ACF
67,143,119 UART: [art] PUB.Y = 2F17AB82A14A8216D58622975A3640235AE3E3D68CD2FF22A72B12DC6A48F6D9FB38FD250752C603166E4FE34F770EC4
67,150,393 UART: [art] SIG.R = 75888128BCC86A3A391F736CCABD52470B36A89D256F957B004A7775DF81CA3F84CB4D93E90C7151CDECA62A2FEBB89F
67,157,768 UART: [art] SIG.S = E6FBD376FF6DFCDE08163BB15650655DE23C9DBA911D64FC959685576844F9D234FE92A5E7C94ED75AAC76FD37845D3F
68,136,895 UART: mbox::rt_entry...
68,137,842 UART: ____ _ _ _ ____ _____
68,139,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,141,872 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,143,810 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,145,741 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,147,669 UART: |_|
68,148,503 UART:
68,433,279 UART: [rt] Runtime listening for mailbox commands...
68,435,394 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.54s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,650,526 UART: [ldev] --
10,655,348 UART: [fwproc] Wait for Commands...
10,658,000 UART: [fwproc] Recv command 0x46574c44
10,660,269 UART: [fwproc] Recv'd Img size: 78632 bytes
13,669,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,746,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,862,558 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,190,703 >>> mbox cmd response: success
14,191,205 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,195,385 UART: [afmc] ++
14,196,152 UART: [afmc] CDI.KEYID = 6
14,197,342 UART: [afmc] SUBJECT.KEYID = 7
14,198,771 UART: [afmc] AUTHORITY.KEYID = 5
16,701,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,426,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,428,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,443,542 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,458,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,473,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,497,015 UART: [afmc] --
18,500,164 UART: [cold-reset] --
18,504,361 UART: [state] Locking Datavault
18,507,228 UART: [state] Locking PCR0, PCR1 and PCR31
18,509,414 UART: [state] Locking ICCM
18,510,837 UART: [exit] Launching FMC @ 0x40000130
18,519,495 UART:
18,519,746 UART: Running Caliptra FMC ...
18,520,768 UART:
18,520,913 UART: [state] CFI Enabled
18,529,575 UART: [fht] FMC Alias Private Key: 7
20,286,762 UART: [art] Extend RT PCRs Done
20,287,981 UART: [art] Lock RT PCRs Done
20,289,309 UART: [art] Populate DV Done
20,294,777 UART: [fht] FMC Alias Private Key: 7
20,296,373 UART: [art] Derive CDI
20,297,187 UART: [art] Store in in slot 0x4
20,339,730 UART: [art] Derive Key Pair
20,340,763 UART: [art] Store priv key in slot 0x5
22,767,787 UART: [art] Derive Key Pair - Done
22,780,930 UART: [art] Signing Cert with AUTHO
22,782,238 UART: RITY.KEYID = 7
24,487,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,375 UART: [art] PUB.X = 5F1FB8EFAFE5233CAF5236D5A443541E70F2C4CC3906DACA6982B3F32C11E12BF7C61CC1C24E6C292FDCFEF1BC015F81
24,496,712 UART: [art] PUB.Y = B2D486B972A9D569B100133007B47918A94B44D6B92FC4E9197745C08B3A8A41A616B185580A5CFD3063CFE4C5BE015C
24,503,920 UART: [art] SIG.R = 7B92621119A8FEB53EF100DB48B5294C99E0370606AC9CB20126F72B5C5C32940D268D0A1F5A2F8C67DE9A1C059E3065
24,511,270 UART: [art] SIG.S = 1E0E3FC2E7579667ABC1C52DD29F7E6BF1EB69A8FDD0CECCCEB417473CB23F259214E8533B4E3227B44CB4B55B7877D2
25,489,325 UART: mbox::rt_entry...
25,490,293 UART: ____ _ _ _ ____ _____
25,492,274 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,494,275 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,496,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,498,143 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,499,997 UART: |_|
25,500,837 UART:
25,613,720 UART: [rt] Runtime listening for mailbox commands...
25,615,835 >>> mbox cmd response data (48 bytes)
27,674,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,819,795 UART:
27,820,165 UART: Running Caliptra ROM ...
27,821,214 UART:
27,821,421 UART: [state] CFI Enabled
27,838,072 UART: [state] LifecycleState = Unprovisioned
27,839,964 UART: [state] DebugLocked = No
27,841,854 UART: [state] WD Timer not started. Device not locked for debugging
27,846,288 UART: [kat] SHA2-256
28,036,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,046,947 UART: [kat] ++
28,047,461 UART: [kat] sha1
28,058,805 UART: [kat] SHA2-256
28,061,782 UART: [kat] SHA2-384
28,068,202 UART: [kat] SHA2-512-ACC
28,070,775 UART: [kat] ECC-384
30,513,771 UART: [kat] HMAC-384Kdf
30,527,234 UART: [kat] LMS
31,058,855 UART: [kat] --
31,064,531 UART: [update-reset] ++
34,532,510 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,535,835 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,143,578 >>> mbox cmd response: success
35,144,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,144,757 UART: [update-reset] Copying MAN_2 To MAN_1
35,182,362 UART: [update-reset Success] --
35,185,623 UART: [state] Locking Datavault
35,189,682 UART: [state] Locking PCR0, PCR1 and PCR31
35,191,885 UART: [state] Locking ICCM
35,194,299 UART: [exit] Launching FMC @ 0x40000130
35,202,971 UART:
35,203,206 UART: Running Caliptra FMC ...
35,204,468 UART:
35,204,627 UART: [state] CFI Enabled
35,248,384 UART: [art] Extend RT PCRs Done
35,249,570 UART: [art] Lock RT PCRs Done
35,251,075 UART: [art] Populate DV Done
35,256,265 UART: [fht] FMC Alias Private Key: 7
35,257,964 UART: [art] Derive CDI
35,258,772 UART: [art] Store in in slot 0x4
35,301,521 UART: [art] Derive Key Pair
35,302,558 UART: [art] Store priv key in slot 0x5
37,729,015 UART: [art] Derive Key Pair - Done
37,741,410 UART: [art] Signing Cert with AUTHO
37,742,724 UART: RITY.KEYID = 7
39,447,986 UART: [art] Erasing AUTHORITY.KEYID = 7
39,449,481 UART: [art] PUB.X = FC448760AA2D4794AFB45C12F7AE41A63906D88248F13EE4F753435DAEE26CDEECC8163D7CB9D89F23C963C6F8A32756
39,456,824 UART: [art] PUB.Y = EA9B9B155A54D258274ED8A54077C686FC6A8B16AB4E9B1219C9836D3507AF969446A4B170E7207142747330A18B2CC5
39,464,011 UART: [art] SIG.R = 88A06E02DDCE46880F7800A17AE319F294F0298B3D577A90EB28C004BE02506147DBBE698445E34ECE8CFDD2E1B30EE5
39,471,409 UART: [art] SIG.S = 2447F1C0571352C1A50CAD686454949931F2EC76BE239D34C93596D09D7B6D98BC6B0F1EE349F1A4211190B7D3EFA9A5
40,450,158 UART: Caliptra RT
40,450,865 UART: [state] CFI Enabled
40,741,456 UART: [rt] RT listening for mailbox commands...
40,773,255 UART: [rt]cmd =0x4d454153, len=108
40,791,807 >>> mbox cmd response data (12 bytes)
42,838,750 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,939,328 UART:
42,939,809 UART: Running Caliptra ROM ...
42,940,876 UART:
42,941,039 UART: [state] CFI Enabled
42,957,038 UART: [state] LifecycleState = Unprovisioned
42,958,894 UART: [state] DebugLocked = No
42,960,546 UART: [state] WD Timer not started. Device not locked for debugging
42,964,290 UART: [kat] SHA2-256
43,154,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,164,923 UART: [kat] ++
43,165,623 UART: [kat] sha1
43,177,758 UART: [kat] SHA2-256
43,180,764 UART: [kat] SHA2-384
43,186,206 UART: [kat] SHA2-512-ACC
43,188,829 UART: [kat] ECC-384
45,629,832 UART: [kat] HMAC-384Kdf
45,643,032 UART: [kat] LMS
46,174,561 UART: [kat] --
46,179,223 UART: [update-reset] ++
49,200,859 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,204,011 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,597,363 >>> mbox cmd response: success
51,641,743 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
51,741,154 UART: [update-reset] Copying MAN_2 To MAN_1
51,742,848 UART: [update-reset Success] --
51,743,925 UART: [state] Locking Datavault
51,744,981 UART: [state] Locking PCR0, PCR1 and PCR31
51,746,530 UART: [state] Locking ICCM
51,747,415 UART: [exit] Launching FMC @ 0x40000130
51,748,781 UART:
51,748,933 UART: Running Caliptra FMC ...
51,750,049 UART:
51,750,217 UART: [state] CFI Enabled
51,751,133 UART: [art] Extend RT PCRs Done
51,752,269 UART: [art] Lock RT PCRs Done
51,753,328 UART: [art] Populate DV Done
51,754,353 UART: [fht] FMC Alias Private Key: 7
51,755,665 UART: [art] Derive CDI
51,756,398 UART: [art] Store in in slot 0x4
51,757,567 UART: [art] Derive Key Pair
51,758,504 UART: [art] Store priv key in slot 0x5
52,183,866 UART: [art] Derive Key Pair - Done
52,196,734 UART: [art] Signing Cert with AUTHO
52,198,026 UART: RITY.KEYID = 7
53,903,247 UART: [art] Erasing AUTHORITY.KEYID = 7
53,904,774 UART: [art] PUB.X = BE9B8100D359A0371F16519DC5612B94945F6F6524D933A0A883105F7B8F1993E763B51A83085ECDB1678DE62E66A4A8
53,911,976 UART: [art] PUB.Y = 00D5AD7DBA06D070BBE3E9B0FF96556B2C1910460A16E8EC1263CDBDDEE44AE528F295F7E82792FD7F9574B17B2463CD
53,919,231 UART: [art] SIG.R = 1DDC1E2261AFA9A3C634A0D702C92B8CCEF6AC8750E22B6C3750052E3A31B68CCC39F69ECEE40DD8A76425886249CAE3
53,926,629 UART: [art] SIG.S = BC16F317278A0C3465DA4457457C895B62189039BEBF8ECA969ECA91187129B69A2ED7819121303F860632CE3E1C7937
54,906,031 UART: mbox::rt_entry...
54,906,997 UART: ____ _ _ _ ____ _____
54,908,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,910,980 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,912,904 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,914,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,916,752 UART: |_|
54,917,583 UART:
55,198,303 UART: [rt] Runtime listening for mailbox commands...
55,200,307 UART:
55,200,471 UART: Running Caliptra ROM ...
55,201,582 UART:
55,201,957 UART: [state] CFI Enabled
55,214,919 UART: [state] LifecycleState = Unprovisioned
55,216,858 UART: [state] DebugLocked = No
55,219,474 UART: [state] WD Timer not started. Device not locked for debugging
55,224,250 UART: [kat] SHA2-256
55,414,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,424,889 UART: [kat] ++
55,425,482 UART: [kat] sha1
55,436,589 UART: [kat] SHA2-256
55,439,604 UART: [kat] SHA2-384
55,444,290 UART: [kat] SHA2-512-ACC
55,446,910 UART: [kat] ECC-384
57,890,406 UART: [kat] HMAC-384Kdf
57,903,711 UART: [kat] LMS
58,435,309 UART: [kat] --
58,439,196 UART: [update-reset] ++
61,466,958 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,469,755 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
61,863,126 >>> mbox cmd response: success
61,864,155 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,864,489 UART: [update-reset] Copying MAN_2 To MAN_1
61,901,185 UART: [update-reset Success] --
61,905,205 UART: [state] Locking Datavault
61,907,802 UART: [state] Locking PCR0, PCR1 and PCR31
61,909,989 UART: [state] Locking ICCM
61,912,950 UART: [exit] Launching FMC @ 0x40000130
61,921,629 UART:
61,921,865 UART: Running Caliptra FMC ...
61,922,966 UART:
61,923,121 UART: [state] CFI Enabled
61,967,101 UART: [art] Extend RT PCRs Done
61,968,286 UART: [art] Lock RT PCRs Done
61,969,412 UART: [art] Populate DV Done
61,974,762 UART: [fht] FMC Alias Private Key: 7
61,976,488 UART: [art] Derive CDI
61,977,306 UART: [art] Store in in slot 0x4
62,019,635 UART: [art] Derive Key Pair
62,020,678 UART: [art] Store priv key in slot 0x5
64,447,322 UART: [art] Derive Key Pair - Done
64,460,098 UART: [art] Signing Cert with AUTHO
64,461,405 UART: RITY.KEYID = 7
66,167,168 UART: [art] Erasing AUTHORITY.KEYID = 7
66,168,677 UART: [art] PUB.X = AAF8B54FFDF8D9D1F6B5FF7D74617D029BF55FDB12270AAB0759E462BB406916B7A600806391A92A5183FB869A460B66
66,175,954 UART: [art] PUB.Y = E40AF8F878423E6A17F3A8794AB107CEC8E89C26E6E1FD0F907D3F0E74FAEF56A5B0F38AA9B4FD4E865EDE3410107BB3
66,183,199 UART: [art] SIG.R = A92E8F44ECE4A49A208DA4B9767EF60776B913E5D6AACDA7B8DA860E66D7EA850A63287AEBA634C07022F0DD20F01947
66,190,624 UART: [art] SIG.S = AFD878196C0280426669293DDD86994F90FBFA069B4E937ED5DA40D37616E80D19C93B979713EC41168F65598C3FE017
67,169,048 UART: mbox::rt_entry...
67,169,989 UART: ____ _ _ _ ____ _____
67,171,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,173,968 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,175,920 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,177,851 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,179,701 UART: |_|
67,180,498 UART:
67,463,722 UART: [rt] Runtime listening for mailbox commands...
67,465,863 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,753,655 ready_for_fw is high
3,754,070 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,182,111 >>> mbox cmd response: success
14,182,846 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,435,986 UART:
18,436,373 UART: Running Caliptra FMC ...
18,437,671 UART:
18,437,842 UART: [state] CFI Enabled
18,445,369 UART: [fht] FMC Alias Private Key: 7
20,202,225 UART: [art] Extend RT PCRs Done
20,203,439 UART: [art] Lock RT PCRs Done
20,204,794 UART: [art] Populate DV Done
20,210,322 UART: [fht] FMC Alias Private Key: 7
20,211,913 UART: [art] Derive CDI
20,212,727 UART: [art] Store in in slot 0x4
20,255,331 UART: [art] Derive Key Pair
20,256,334 UART: [art] Store priv key in slot 0x5
22,683,153 UART: [art] Derive Key Pair - Done
22,696,106 UART: [art] Signing Cert with AUTHO
22,697,433 UART: RITY.KEYID = 7
24,402,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,404,200 UART: [art] PUB.X = AD32E890D7FB636279CB8DD9C3A93AFD38ED540B63D1DF81641B028530712A07EBD6AA0738717A1846349276C701C8F4
24,411,495 UART: [art] PUB.Y = D79867A15E6BB03EAE609C19FBE81CE669801516A31631DC342DC5F350699653FD5A3198D7425F5CC273DC2065375FC8
24,418,766 UART: [art] SIG.R = 9B43520690191D0FAE41DEEB90FBFCEDEB1669FDCA27F3094440EF0691543947CF3EA7B6698F73805994FB372745194B
24,426,097 UART: [art] SIG.S = 5BFB4FED2E6380807007C5132EC623FCB031BB0FA43721BE25962973EC6CFA8B15E2F86937B769780FD81E191B8487D8
25,404,329 UART: mbox::rt_entry...
25,405,305 UART: ____ _ _ _ ____ _____
25,407,233 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,409,245 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,411,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,413,053 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,414,913 UART: |_|
25,415,741 UART:
25,530,228 UART: [rt] Runtime listening for mailbox commands...
25,532,337 >>> mbox cmd response data (48 bytes)
27,591,149 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,307,978 >>> mbox cmd response: success
35,308,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,343,055 UART:
35,343,391 UART: Running Caliptra FMC ...
35,344,521 UART:
35,344,684 UART: [state] CFI Enabled
35,388,215 UART: [art] Extend RT PCRs Done
35,389,362 UART: [art] Lock RT PCRs Done
35,390,759 UART: [art] Populate DV Done
35,396,168 UART: [fht] FMC Alias Private Key: 7
35,397,756 UART: [art] Derive CDI
35,398,588 UART: [art] Store in in slot 0x4
35,441,238 UART: [art] Derive Key Pair
35,442,275 UART: [art] Store priv key in slot 0x5
37,868,842 UART: [art] Derive Key Pair - Done
37,882,001 UART: [art] Signing Cert with AUTHO
37,883,348 UART: RITY.KEYID = 7
39,588,808 UART: [art] Erasing AUTHORITY.KEYID = 7
39,590,310 UART: [art] PUB.X = C9621AC920D7D0F373C1B5CCC82C6C4C7090D1D4E25E731F3EAF50B06640286D06059F3A4E5FD19E7B842F27BD6409DA
39,597,615 UART: [art] PUB.Y = FD0136B510BEE88186578F9CD36C3F6785322A66125B82C6F41667A76A67E70B730734F0219DE197C07FF8696CE4C861
39,604,842 UART: [art] SIG.R = 7D30025D02B24038A697144B3A351CFF646A31C7D4C4F6FF54F09752D5691F9BFFBAAAD111A247483E791C1CA5188B84
39,612,223 UART: [art] SIG.S = 6B3EF5E71AEEDA130BC5414797D6033890BB53844AD6CF6C9B24534DEF39FF2D982890B7A6E4BEE21157AED5C7F1A450
40,591,099 UART: Caliptra RT
40,591,808 UART: [state] CFI Enabled
40,882,993 UART: [rt] RT listening for mailbox commands...
40,914,736 UART: [rt]cmd =0x4d454153, len=108
40,934,154 >>> mbox cmd response data (12 bytes)
42,981,099 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
49,892,509 >>> mbox cmd response: success
51,936,746 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
52,036,163 UART:
52,036,533 UART: Running Caliptra FMC ...
52,037,587 UART:
52,037,741 UART: [state] CFI Enabled
52,038,632 UART: [art] Extend RT PCRs Done
52,039,687 UART: [art] Lock RT PCRs Done
52,040,890 UART: [art] Populate DV Done
52,041,897 UART: [fht] FMC Alias Private Key: 7
52,043,237 UART: [art] Derive CDI
52,043,982 UART: [art] Store in in slot 0x4
52,045,160 UART: [art] Derive Key Pair
52,046,101 UART: [art] Store priv key in slot 0x5
52,453,326 UART: [art] Derive Key Pair - Done
52,466,308 UART: [art] Signing Cert with AUTHO
52,467,608 UART: RITY.KEYID = 7
54,173,054 UART: [art] Erasing AUTHORITY.KEYID = 7
54,174,567 UART: [art] PUB.X = 588928247BF58C225D32EA71AA3A4016A8BE7394AB6CFD0EC3D17EB1A1D317F53C28586C9ED7FEFDCE5762A260247F68
54,181,864 UART: [art] PUB.Y = C00389607B720EF6DAA47EA6FFBECC0D2ED96AF569B33330E7021EF9445B423B864511A8EAF4A259AB88A19F3EDBAA56
54,189,157 UART: [art] SIG.R = 9D7E825C407AC3DC9E7112CEDAE462F1AF9DC42D3A10FD5F032F92E23D828D4624C8BED0679E57B97C7DC746562D934F
54,196,544 UART: [art] SIG.S = B9D2D24462B2AD1BBE8610A552E6279BF00F60BB4AA13F7FAB6DB301F6446751497F15DA4592589456C1F442F54CBDA8
55,175,207 UART: mbox::rt_entry...
55,176,162 UART: ____ _ _ _ ____ _____
55,178,146 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,180,169 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,182,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,184,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,185,952 UART: |_|
55,186,784 UART:
55,468,312 UART: [rt] Runtime listening for mailbox commands...
62,296,180 >>> mbox cmd response: success
62,297,223 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,330,470 UART:
62,330,736 UART: Running Caliptra FMC ...
62,331,851 UART:
62,332,011 UART: [state] CFI Enabled
62,376,216 UART: [art] Extend RT PCRs Done
62,377,410 UART: [art] Lock RT PCRs Done
62,378,593 UART: [art] Populate DV Done
62,383,896 UART: [fht] FMC Alias Private Key: 7
62,385,448 UART: [art] Derive CDI
62,386,260 UART: [art] Store in in slot 0x4
62,428,965 UART: [art] Derive Key Pair
62,429,963 UART: [art] Store priv key in slot 0x5
64,857,311 UART: [art] Derive Key Pair - Done
64,870,425 UART: [art] Signing Cert with AUTHO
64,871,737 UART: RITY.KEYID = 7
66,577,405 UART: [art] Erasing AUTHORITY.KEYID = 7
66,578,913 UART: [art] PUB.X = 4A76F48408FE7940C2E70FCB813FFA51B5C6AA8926CB4EF9B4106529DB6DB442718AF35F9CB07F2B21F8AED6562180E6
66,586,215 UART: [art] PUB.Y = 4AFAEEC67B7F0C9FFA713D2462897822A525048091A06C2E0945BD275AFE76CC791D4ED9B798F616ADCFBD3253186039
66,593,496 UART: [art] SIG.R = C5174E7457A8A99C7B7FB5C7B5A42651C85BC0B3CA5B91029AF1475D22686AD962E03FE737FD70985BCB074E3808626A
66,600,930 UART: [art] SIG.S = CACD7DDF21AD0AC9DE8496A3D2DBA6A21D0D461AB6A2F0C0119218E23466D60F34148B060B4C1C3D09D9FBDDD579F95E
67,579,398 UART: mbox::rt_entry...
67,580,354 UART: ____ _ _ _ ____ _____
67,582,396 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,584,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,586,356 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,588,292 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,590,144 UART: |_|
67,590,943 UART:
67,875,672 UART: [rt] Runtime listening for mailbox commands...
67,877,793 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,504,714 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,616,401 >>> mbox cmd response: success
2,616,401 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,617,409 UART: [afmc] ++
2,617,577 UART: [afmc] CDI.KEYID = 6
2,617,939 UART: [afmc] SUBJECT.KEYID = 7
2,618,364 UART: [afmc] AUTHORITY.KEYID = 5
2,653,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,735 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,128 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,818 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,697 UART: [afmc] --
2,696,665 UART: [cold-reset] --
2,697,631 UART: [state] Locking Datavault
2,699,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,634 UART: [state] Locking ICCM
2,700,100 UART: [exit] Launching FMC @ 0x40000130
2,705,429 UART:
2,705,445 UART: Running Caliptra FMC ...
2,705,853 UART:
2,705,907 UART: [state] CFI Enabled
2,716,704 UART: [fht] FMC Alias Private Key: 7
2,824,321 UART: [art] Extend RT PCRs Done
2,824,749 UART: [art] Lock RT PCRs Done
2,826,553 UART: [art] Populate DV Done
2,834,960 UART: [fht] FMC Alias Private Key: 7
2,835,930 UART: [art] Derive CDI
2,836,210 UART: [art] Store in in slot 0x4
2,921,525 UART: [art] Derive Key Pair
2,921,885 UART: [art] Store priv key in slot 0x5
2,935,297 UART: [art] Derive Key Pair - Done
2,949,985 UART: [art] Signing Cert with AUTHO
2,950,465 UART: RITY.KEYID = 7
2,965,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,172 UART: [art] PUB.X = 394B306C91D05A8983997AF2F918385D7DC04CFD52E822C78CE5FBD724FE6E7DF6BA1DFF7481A2C2BC2F574D2F6CA163
2,972,958 UART: [art] PUB.Y = CB7BD59B1FA486C3E0BF43960FEA390F8585C693A1134753F709B7C15CB20FEE756D63B7D74C794F17513BF151DACAE6
2,979,908 UART: [art] SIG.R = E7855DCB0A1DD5CEC21EBC01EBF27E4EA7CC48F715F6E9F437C8180CA47B1ED12A56A5F28DBBCC45008711B6DF4F7BE0
2,986,675 UART: [art] SIG.S = 14EFB65A35970088A32D7861DA18B517D666759EB0CC6F02CD92CAE81ABBFDF32B5C787B4B9D70A82B889962E2EA678A
3,010,179 UART: mbox::rt_entry...
3,010,551 UART: ____ _ _ _ ____ _____
3,011,335 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,135 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,903 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,671 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,439 UART: |_|
3,014,751 UART:
3,122,937 UART: [rt] Runtime listening for mailbox commands...
3,124,114 >>> mbox cmd response data (48 bytes)
3,124,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,124,229 UART:
3,124,245 UART: Running Caliptra ROM ...
3,124,653 UART:
3,124,707 UART: [state] CFI Enabled
3,126,931 UART: [state] LifecycleState = Unprovisioned
3,127,586 UART: [state] DebugLocked = No
3,128,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,737 UART: [kat] SHA2-256
3,923,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,783 UART: [kat] ++
3,927,935 UART: [kat] sha1
3,932,225 UART: [kat] SHA2-256
3,934,163 UART: [kat] SHA2-384
3,936,774 UART: [kat] SHA2-512-ACC
3,938,674 UART: [kat] ECC-384
3,944,261 UART: [kat] HMAC-384Kdf
3,948,945 UART: [kat] LMS
4,517,141 UART: [kat] --
4,518,114 UART: [update-reset] ++
5,851,947 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,233 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,003,151 >>> mbox cmd response: success
6,003,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,003,280 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,294 UART: [update-reset Success] --
6,012,519 UART: [state] Locking Datavault
6,013,315 UART: [state] Locking PCR0, PCR1 and PCR31
6,013,919 UART: [state] Locking ICCM
6,014,371 UART: [exit] Launching FMC @ 0x40000130
6,019,700 UART:
6,019,716 UART: Running Caliptra FMC ...
6,020,124 UART:
6,020,178 UART: [state] CFI Enabled
6,109,419 UART: [art] Extend RT PCRs Done
6,109,847 UART: [art] Lock RT PCRs Done
6,111,138 UART: [art] Populate DV Done
6,119,115 UART: [fht] FMC Alias Private Key: 7
6,120,143 UART: [art] Derive CDI
6,120,423 UART: [art] Store in in slot 0x4
6,206,378 UART: [art] Derive Key Pair
6,206,738 UART: [art] Store priv key in slot 0x5
6,220,242 UART: [art] Derive Key Pair - Done
6,235,014 UART: [art] Signing Cert with AUTHO
6,235,494 UART: RITY.KEYID = 7
6,250,648 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,413 UART: [art] PUB.X = D17DFC93F470FD2C9765950A0D534942B74DFD85E74923C604A8915CA3CA7CF426943F74CE98922536D07BC080800986
6,258,167 UART: [art] PUB.Y = 3B56B1BFED5168069D788B951EDEF692CDB2B42777ABD254A0D10CA7216643756B933195395A02D2723D84210D917CE7
6,265,103 UART: [art] SIG.R = 26878728467B29005AF89CA62D5B9A23127C9AA9C22DB4CF1B9D9944D4667916B0F56A91037EDF1AABE9A62442449351
6,271,846 UART: [art] SIG.S = 8B72A65B7C1D3C32D73971CA86FDE6C99512999BDAA44E76588CF6123B6BF177750D7D23DF4196E9A6DDAC27133C5089
6,295,334 UART: Caliptra RT
6,295,588 UART: [state] CFI Enabled
6,581,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,818 UART: [rt]cmd =0x4d454153, len=108
6,631,541 >>> mbox cmd response data (12 bytes)
6,631,542 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,632,353 UART:
6,632,369 UART: Running Caliptra ROM ...
6,632,777 UART:
6,632,831 UART: [state] CFI Enabled
6,635,435 UART: [state] LifecycleState = Unprovisioned
6,636,090 UART: [state] DebugLocked = No
6,636,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,638,267 UART: [kat] SHA2-256
7,432,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,436,313 UART: [kat] ++
7,436,465 UART: [kat] sha1
7,440,659 UART: [kat] SHA2-256
7,442,597 UART: [kat] SHA2-384
7,445,336 UART: [kat] SHA2-512-ACC
7,447,236 UART: [kat] ECC-384
7,452,845 UART: [kat] HMAC-384Kdf
7,457,345 UART: [kat] LMS
8,025,541 UART: [kat] --
8,026,302 UART: [update-reset] ++
8,951,278 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,952,362 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
9,048,688 >>> mbox cmd response: success
9,048,688 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
9,049,033 UART: [update-reset] Copying MAN_2 To MAN_1
9,057,047 UART: [update-reset Success] --
9,058,122 UART: [state] Locking Datavault
9,058,918 UART: [state] Locking PCR0, PCR1 and PCR31
9,059,522 UART: [state] Locking ICCM
9,060,100 UART: [exit] Launching FMC @ 0x40000130
9,065,429 UART:
9,065,445 UART: Running Caliptra FMC ...
9,065,853 UART:
9,065,907 UART: [state] CFI Enabled
9,154,974 UART: [art] Extend RT PCRs Done
9,155,402 UART: [art] Lock RT PCRs Done
9,156,933 UART: [art] Populate DV Done
9,165,346 UART: [fht] FMC Alias Private Key: 7
9,166,300 UART: [art] Derive CDI
9,166,580 UART: [art] Store in in slot 0x4
9,252,527 UART: [art] Derive Key Pair
9,252,887 UART: [art] Store priv key in slot 0x5
9,266,621 UART: [art] Derive Key Pair - Done
9,281,658 UART: [art] Signing Cert with AUTHO
9,282,138 UART: RITY.KEYID = 7
9,296,902 UART: [art] Erasing AUTHORITY.KEYID = 7
9,297,667 UART: [art] PUB.X = 2D7610F42DF4AA86DA7AD5CD9A1FA511384E9F996B6E16DCA6D3BDAEE01D047F9664BE838F60570017040F2FD52CD4DE
9,304,424 UART: [art] PUB.Y = 2A601A3904197E1ACD35B76CB9B7B474F8833CFE35055A1CCF56AB469A463332E39BD4DB2F2F367C78319EE79B5D37DE
9,311,378 UART: [art] SIG.R = 545EFBA4BAA1940007D0C64F11EC03D970B33650163230223D14923A98818BE8A60E6047E74BFD8E73D3069D8385D8BC
9,318,112 UART: [art] SIG.S = 482433DF48328DD477AB20AD1CB93186C82935BAE631D901F5450C52049B1CDBD2D04E970E0445FF0CC03687206865A7
9,341,849 UART: mbox::rt_entry...
9,342,221 UART: ____ _ _ _ ____ _____
9,343,005 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,343,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,344,573 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,345,341 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,346,109 UART: |_|
9,346,421 UART:
9,629,414 UART: [rt] Runtime listening for mailbox commands...
9,630,362 UART:
9,630,378 UART: Running Caliptra ROM ...
9,630,786 UART:
9,630,840 UART: [state] CFI Enabled
9,633,652 UART: [state] LifecycleState = Unprovisioned
9,634,307 UART: [state] DebugLocked = No
9,634,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,636,534 UART: [kat] SHA2-256
10,430,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,434,580 UART: [kat] ++
10,434,732 UART: [kat] sha1
10,438,778 UART: [kat] SHA2-256
10,440,716 UART: [kat] SHA2-384
10,443,275 UART: [kat] SHA2-512-ACC
10,445,175 UART: [kat] ECC-384
10,450,842 UART: [kat] HMAC-384Kdf
10,455,362 UART: [kat] LMS
11,023,558 UART: [kat] --
11,024,367 UART: [update-reset] ++
11,949,098 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,950,196 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
12,046,522 >>> mbox cmd response: success
12,046,522 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,046,685 UART: [update-reset] Copying MAN_2 To MAN_1
12,054,699 UART: [update-reset Success] --
12,055,776 UART: [state] Locking Datavault
12,056,630 UART: [state] Locking PCR0, PCR1 and PCR31
12,057,234 UART: [state] Locking ICCM
12,057,688 UART: [exit] Launching FMC @ 0x40000130
12,063,017 UART:
12,063,033 UART: Running Caliptra FMC ...
12,063,441 UART:
12,063,495 UART: [state] CFI Enabled
12,152,134 UART: [art] Extend RT PCRs Done
12,152,562 UART: [art] Lock RT PCRs Done
12,153,813 UART: [art] Populate DV Done
12,162,426 UART: [fht] FMC Alias Private Key: 7
12,163,382 UART: [art] Derive CDI
12,163,662 UART: [art] Store in in slot 0x4
12,249,423 UART: [art] Derive Key Pair
12,249,783 UART: [art] Store priv key in slot 0x5
12,263,415 UART: [art] Derive Key Pair - Done
12,278,586 UART: [art] Signing Cert with AUTHO
12,279,066 UART: RITY.KEYID = 7
12,294,404 UART: [art] Erasing AUTHORITY.KEYID = 7
12,295,169 UART: [art] PUB.X = 7508D06D8FD2B169F0CFC6F94CC46E0F7070E085C19B664DCB3872E87198998E1BC8923F319C2D78C48B22A4E96994B8
12,301,935 UART: [art] PUB.Y = 20799968F406505CD043F6BCA4D5ED164FB2743A675A5B90523CE91DC17B030C304C791EFD525960F6FDA35D29EF2F67
12,308,880 UART: [art] SIG.R = 82AF06497118F0DBE9CBD434A20736999716070D03840110F6BFD0214B04CE24FB789E01672E92B7AE19589CD74620D7
12,315,620 UART: [art] SIG.S = 55865FA543F3D29DA620CC682EA1949135167477B50ACC2390748F4A6ED9EED2949A4C8FD401E492DC8DC3ACBCFB5F8B
12,339,189 UART: mbox::rt_entry...
12,339,561 UART: ____ _ _ _ ____ _____
12,340,345 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,341,145 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,341,913 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,342,681 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,343,449 UART: |_|
12,343,761 UART:
12,623,561 UART: [rt] Runtime listening for mailbox commands...
12,624,738 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,053 ready_for_fw is high
1,363,053 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,466,419 >>> mbox cmd response: success
2,466,419 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,527,745 UART:
2,527,761 UART: Running Caliptra FMC ...
2,528,169 UART:
2,528,223 UART: [state] CFI Enabled
2,538,716 UART: [fht] FMC Alias Private Key: 7
2,645,515 UART: [art] Extend RT PCRs Done
2,645,943 UART: [art] Lock RT PCRs Done
2,647,255 UART: [art] Populate DV Done
2,655,502 UART: [fht] FMC Alias Private Key: 7
2,656,498 UART: [art] Derive CDI
2,656,778 UART: [art] Store in in slot 0x4
2,742,303 UART: [art] Derive Key Pair
2,742,663 UART: [art] Store priv key in slot 0x5
2,755,415 UART: [art] Derive Key Pair - Done
2,769,893 UART: [art] Signing Cert with AUTHO
2,770,373 UART: RITY.KEYID = 7
2,785,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,490 UART: [art] PUB.X = CFAD4C4C6BEDFEC1EA84601B43722DEC66A50A4DF26C85D4A7D0EBAD9458C1BB0B8CD4F9BC0C742024B75B8AD7E6DCB9
2,793,285 UART: [art] PUB.Y = 05F7E3259386605B8630B26C44E0D7F29BAB5FF7995A9EA5C089827041E4A53A4ECF1570E7D48450AB80E8CBE8F62594
2,800,234 UART: [art] SIG.R = F25ECCED3BCBAC46F1DA9E89A376E6D4149DCFEB2EC63706CAE1DE60BED462142977DE8394EED26BD71B1829BDA5E910
2,807,029 UART: [art] SIG.S = 149AFB915F5C5CBBA88748F61DA4DF5D49893773C237E27EFE5CE9C83AB6BAC16D86114164829B05DEB92A08A913B03D
2,830,488 UART: mbox::rt_entry...
2,830,860 UART: ____ _ _ _ ____ _____
2,831,644 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,832,444 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,980 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,748 UART: |_|
2,835,060 UART:
2,942,500 UART: [rt] Runtime listening for mailbox commands...
2,943,677 >>> mbox cmd response data (48 bytes)
2,943,678 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,704,800 >>> mbox cmd response: success
5,704,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,718,253 UART:
5,718,269 UART: Running Caliptra FMC ...
5,718,677 UART:
5,718,731 UART: [state] CFI Enabled
5,807,866 UART: [art] Extend RT PCRs Done
5,808,294 UART: [art] Lock RT PCRs Done
5,809,711 UART: [art] Populate DV Done
5,817,828 UART: [fht] FMC Alias Private Key: 7
5,818,928 UART: [art] Derive CDI
5,819,208 UART: [art] Store in in slot 0x4
5,904,563 UART: [art] Derive Key Pair
5,904,923 UART: [art] Store priv key in slot 0x5
5,918,071 UART: [art] Derive Key Pair - Done
5,932,914 UART: [art] Signing Cert with AUTHO
5,933,394 UART: RITY.KEYID = 7
5,948,996 UART: [art] Erasing AUTHORITY.KEYID = 7
5,949,761 UART: [art] PUB.X = 5BF3720E5F3D8D02BFF6C58EC13C061189774575D09F3F7D423EACAB1AD946F48D34C786AC4C1DE8700FCB03CCAE9868
5,956,532 UART: [art] PUB.Y = 1B6AB2063FA6A1CC69A4DA7A28334E50C092488E70A9412667240D15857A314E4F10002319439B6C775ED898BF352677
5,963,444 UART: [art] SIG.R = 92F4CEF5F262F4E38E263613706553561DBB52DBC36C3007A2180CF04FA4ACBC15343DE93FB9E5D8908D1457D9797E07
5,970,209 UART: [art] SIG.S = 575ECA4DE30E2C7AFC4052CB35D2526D4A3D8A6756043088A95E081AA38E5AA1D8D1B1872D0FBF1FBE87299242025864
5,993,611 UART: Caliptra RT
5,993,865 UART: [state] CFI Enabled
6,274,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,305,025 UART: [rt]cmd =0x4d454153, len=108
6,325,938 >>> mbox cmd response data (12 bytes)
6,325,939 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,624,044 >>> mbox cmd response: success
8,624,044 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,637,415 UART:
8,637,431 UART: Running Caliptra FMC ...
8,637,839 UART:
8,637,893 UART: [state] CFI Enabled
8,726,504 UART: [art] Extend RT PCRs Done
8,726,932 UART: [art] Lock RT PCRs Done
8,728,125 UART: [art] Populate DV Done
8,736,288 UART: [fht] FMC Alias Private Key: 7
8,737,290 UART: [art] Derive CDI
8,737,570 UART: [art] Store in in slot 0x4
8,823,299 UART: [art] Derive Key Pair
8,823,659 UART: [art] Store priv key in slot 0x5
8,837,029 UART: [art] Derive Key Pair - Done
8,852,093 UART: [art] Signing Cert with AUTHO
8,852,573 UART: RITY.KEYID = 7
8,867,773 UART: [art] Erasing AUTHORITY.KEYID = 7
8,868,538 UART: [art] PUB.X = 3633FCFE8969BEFD7E1A8EC95667422F600C440A12EB1B46A2C47309C0FB70CCBEFFCB10A64F224960644ECB471DB5CD
8,875,317 UART: [art] PUB.Y = F413AD9DB87219F2AC6AA403E6FDC1D144C28A480E3C483872579D61BA5518F7EDE473663BD893BF4C69FC99FBC83DD1
8,882,275 UART: [art] SIG.R = 366B285170C7C5FF41ABBE4FFCBBAF7786B86436075D79225B89AD3F04016A4970610C8A04D900CE61358F11C7FA7ED8
8,889,014 UART: [art] SIG.S = 322863D6865F4292C9B0AAAC86A20C2A54BF7B2B3533B05E8E8961BA81F27D6D59C27941E8E8DEC9B910C644D4999FAF
8,912,432 UART: mbox::rt_entry...
8,912,804 UART: ____ _ _ _ ____ _____
8,913,588 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,914,388 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,915,156 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,915,924 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,916,692 UART: |_|
8,917,004 UART:
9,202,525 UART: [rt] Runtime listening for mailbox commands...
11,502,985 >>> mbox cmd response: success
11,502,985 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,516,676 UART:
11,516,692 UART: Running Caliptra FMC ...
11,517,100 UART:
11,517,154 UART: [state] CFI Enabled
11,605,649 UART: [art] Extend RT PCRs Done
11,606,077 UART: [art] Lock RT PCRs Done
11,607,238 UART: [art] Populate DV Done
11,615,409 UART: [fht] FMC Alias Private Key: 7
11,616,427 UART: [art] Derive CDI
11,616,707 UART: [art] Store in in slot 0x4
11,702,436 UART: [art] Derive Key Pair
11,702,796 UART: [art] Store priv key in slot 0x5
11,715,664 UART: [art] Derive Key Pair - Done
11,729,954 UART: [art] Signing Cert with AUTHO
11,730,434 UART: RITY.KEYID = 7
11,745,430 UART: [art] Erasing AUTHORITY.KEYID = 7
11,746,195 UART: [art] PUB.X = 1DD956BF18075FC5B5CB1CB1DF371D8A0CEF4AF71870DFAE6546389A184B49DBDF3C58A12DE56E67F0BA7BB2EC01A9B9
11,752,982 UART: [art] PUB.Y = 91F8A2CFDD92922B546D35700C065CE944D7D1E024694183BE868A3841593C01BF98CE9E7A5614DB7982D6F0E5DD4BF3
11,759,927 UART: [art] SIG.R = 3B8CA4BC32D2BB188F691328B2E4424350C56E9D1675159F9ECC8D048A1797D49013BAF7A4C4FCDCDBD26688D5A00D26
11,766,701 UART: [art] SIG.S = 1140EE3A13E1B92CF41A7566AE1B87AA9D4CBEB7D1B81DFFED040ACE14DF0D5C4DCD7F35846C0A2777BFEBBF7D277406
11,790,187 UART: mbox::rt_entry...
11,790,559 UART: ____ _ _ _ ____ _____
11,791,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,792,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,792,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,793,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,794,447 UART: |_|
11,794,759 UART:
12,078,114 UART: [rt] Runtime listening for mailbox commands...
12,079,291 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.69s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,506,319 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,535,671 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,617,912 >>> mbox cmd response: success
2,617,912 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,619,136 UART: [afmc] ++
2,619,304 UART: [afmc] CDI.KEYID = 6
2,619,666 UART: [afmc] SUBJECT.KEYID = 7
2,620,091 UART: [afmc] AUTHORITY.KEYID = 5
2,654,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,946 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,726 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,339 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,689,029 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,958 UART: [afmc] --
2,698,012 UART: [cold-reset] --
2,698,698 UART: [state] Locking Datavault
2,699,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,487 UART: [state] Locking ICCM
2,700,945 UART: [exit] Launching FMC @ 0x40000130
2,706,274 UART:
2,706,290 UART: Running Caliptra FMC ...
2,706,698 UART:
2,706,841 UART: [state] CFI Enabled
2,717,218 UART: [fht] FMC Alias Private Key: 7
2,825,693 UART: [art] Extend RT PCRs Done
2,826,121 UART: [art] Lock RT PCRs Done
2,827,769 UART: [art] Populate DV Done
2,835,968 UART: [fht] FMC Alias Private Key: 7
2,837,148 UART: [art] Derive CDI
2,837,428 UART: [art] Store in in slot 0x4
2,922,895 UART: [art] Derive Key Pair
2,923,255 UART: [art] Store priv key in slot 0x5
2,936,979 UART: [art] Derive Key Pair - Done
2,951,507 UART: [art] Signing Cert with AUTHO
2,951,987 UART: RITY.KEYID = 7
2,967,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,968,048 UART: [art] PUB.X = 46CDA62237A809FAAFE6C10D2B3EFBA9B91E142EBE010676F6F9141EAAF6878BBAE165205DD594CA473AA704364489B2
2,974,817 UART: [art] PUB.Y = 02863B6472657DA4E3137F1BC302B0F6C45EF7D57CB235A027FE021A2E90B91FD10ACF72DFF308AD94123A3C4DD948F0
2,981,762 UART: [art] SIG.R = 5B90A5F65F2DBF7F0A5D8B0CF4350636965347A0150BFC9A86042E106D2C0336CAE4E1B1AD64B3CA5349D2733DEF8705
2,988,519 UART: [art] SIG.S = C589AA3338EEA7D76916F0EEC483948243B5585A71C16C2713BD87D3278CAADF8200028BDBA242F6999EBFBACEDAB373
3,012,527 UART: mbox::rt_entry...
3,012,899 UART: ____ _ _ _ ____ _____
3,013,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,014,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,015,251 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,016,019 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,787 UART: |_|
3,017,099 UART:
3,123,407 UART: [rt] Runtime listening for mailbox commands...
3,124,584 >>> mbox cmd response data (48 bytes)
3,124,585 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,124,699 UART:
3,124,715 UART: Running Caliptra ROM ...
3,125,123 UART:
3,125,264 UART: [state] CFI Enabled
3,127,986 UART: [state] LifecycleState = Unprovisioned
3,128,641 UART: [state] DebugLocked = No
3,129,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,886 UART: [kat] SHA2-256
3,924,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,928,932 UART: [kat] ++
3,929,084 UART: [kat] sha1
3,933,350 UART: [kat] SHA2-256
3,935,288 UART: [kat] SHA2-384
3,937,981 UART: [kat] SHA2-512-ACC
3,939,881 UART: [kat] ECC-384
3,945,654 UART: [kat] HMAC-384Kdf
3,950,226 UART: [kat] LMS
4,518,422 UART: [kat] --
4,519,281 UART: [update-reset] ++
5,853,409 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,854,675 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,004,593 >>> mbox cmd response: success
6,004,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,004,762 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,776 UART: [update-reset Success] --
6,013,853 UART: [state] Locking Datavault
6,014,587 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,191 UART: [state] Locking ICCM
6,015,795 UART: [exit] Launching FMC @ 0x40000130
6,021,124 UART:
6,021,140 UART: Running Caliptra FMC ...
6,021,548 UART:
6,021,691 UART: [state] CFI Enabled
6,111,006 UART: [art] Extend RT PCRs Done
6,111,434 UART: [art] Lock RT PCRs Done
6,112,633 UART: [art] Populate DV Done
6,120,798 UART: [fht] FMC Alias Private Key: 7
6,121,846 UART: [art] Derive CDI
6,122,126 UART: [art] Store in in slot 0x4
6,207,549 UART: [art] Derive Key Pair
6,207,909 UART: [art] Store priv key in slot 0x5
6,221,115 UART: [art] Derive Key Pair - Done
6,236,069 UART: [art] Signing Cert with AUTHO
6,236,549 UART: RITY.KEYID = 7
6,251,505 UART: [art] Erasing AUTHORITY.KEYID = 7
6,252,270 UART: [art] PUB.X = 54165E626FA07E42F8B8202D38195C80E32E4E51E09E5C64749F55B0F369B1B4418458060AA96A4D2268368F3B89C0E5
6,259,026 UART: [art] PUB.Y = 4F923CF65C0D3C2AF68B7631357EECAA406F27830972B163E18C7E4B09378260F4F9FDE4B64CA8566BB13291571CA6F6
6,265,971 UART: [art] SIG.R = C7E31B328D308E8786BCA2512CA83CE00EEAB2879D94518F5611A68E1F78624EC5B49B36BB6B63BF33536FF4AD55AA7E
6,272,750 UART: [art] SIG.S = 7100FB271FA4459CC87F930BCD4A6A8F830BEAB931257AE6D3C1B7F6FFF6C39CFBACD10112BD3BD0DF0C61A80E9DA1EE
6,296,344 UART: Caliptra RT
6,296,690 UART: [state] CFI Enabled
6,576,219 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,607,136 UART: [rt]cmd =0x4d454153, len=108
6,629,063 >>> mbox cmd response data (12 bytes)
6,629,064 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,630,133 UART:
6,630,149 UART: Running Caliptra ROM ...
6,630,557 UART:
6,630,698 UART: [state] CFI Enabled
6,633,564 UART: [state] LifecycleState = Unprovisioned
6,634,219 UART: [state] DebugLocked = No
6,634,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,636,202 UART: [kat] SHA2-256
7,430,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,434,248 UART: [kat] ++
7,434,400 UART: [kat] sha1
7,438,670 UART: [kat] SHA2-256
7,440,608 UART: [kat] SHA2-384
7,443,391 UART: [kat] SHA2-512-ACC
7,445,291 UART: [kat] ECC-384
7,451,188 UART: [kat] HMAC-384Kdf
7,455,874 UART: [kat] LMS
8,024,070 UART: [kat] --
8,025,175 UART: [update-reset] ++
8,951,350 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,952,532 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
9,048,858 >>> mbox cmd response: success
9,048,858 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
9,048,969 UART: [update-reset] Copying MAN_2 To MAN_1
9,056,983 UART: [update-reset Success] --
9,057,842 UART: [state] Locking Datavault
9,058,602 UART: [state] Locking PCR0, PCR1 and PCR31
9,059,206 UART: [state] Locking ICCM
9,059,712 UART: [exit] Launching FMC @ 0x40000130
9,065,041 UART:
9,065,057 UART: Running Caliptra FMC ...
9,065,465 UART:
9,065,608 UART: [state] CFI Enabled
9,155,183 UART: [art] Extend RT PCRs Done
9,155,611 UART: [art] Lock RT PCRs Done
9,156,620 UART: [art] Populate DV Done
9,164,789 UART: [fht] FMC Alias Private Key: 7
9,165,803 UART: [art] Derive CDI
9,166,083 UART: [art] Store in in slot 0x4
9,251,850 UART: [art] Derive Key Pair
9,252,210 UART: [art] Store priv key in slot 0x5
9,265,534 UART: [art] Derive Key Pair - Done
9,280,397 UART: [art] Signing Cert with AUTHO
9,280,877 UART: RITY.KEYID = 7
9,295,659 UART: [art] Erasing AUTHORITY.KEYID = 7
9,296,424 UART: [art] PUB.X = 68D758C8BD1DBBAB4A940737840E80FC332EFCD64A5D87B8FFAF8648AE5184B0E0883CF4EE865263904AC7FBCCF70591
9,303,201 UART: [art] PUB.Y = 1772657F490211BC29B583E11A0A6D2388C8A9E0937B5336F3989D218778D2089A4A3EF925FECB4DB5C341DCDB1DF8E6
9,310,146 UART: [art] SIG.R = E849EDF2D40EC4AFBE696AF74E312AFA458C74A733056BBDC00C987C8526327BC265833FB7126EDC92702119AC3AA8F9
9,316,919 UART: [art] SIG.S = 162D7429645C2ABA2C85D74AA72B49DB576E7E554CACDD81305E3F8111F4DFF65874EACCCA77045D915132B4BBFDC1D0
9,340,653 UART: mbox::rt_entry...
9,341,025 UART: ____ _ _ _ ____ _____
9,341,809 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,342,609 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,343,377 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,344,145 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,344,913 UART: |_|
9,345,225 UART:
9,621,757 UART: [rt] Runtime listening for mailbox commands...
9,622,705 UART:
9,622,721 UART: Running Caliptra ROM ...
9,623,129 UART:
9,623,270 UART: [state] CFI Enabled
9,625,774 UART: [state] LifecycleState = Unprovisioned
9,626,429 UART: [state] DebugLocked = No
9,627,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,628,836 UART: [kat] SHA2-256
10,422,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,426,882 UART: [kat] ++
10,427,034 UART: [kat] sha1
10,431,160 UART: [kat] SHA2-256
10,433,098 UART: [kat] SHA2-384
10,436,021 UART: [kat] SHA2-512-ACC
10,437,921 UART: [kat] ECC-384
10,443,680 UART: [kat] HMAC-384Kdf
10,448,390 UART: [kat] LMS
11,016,586 UART: [kat] --
11,017,455 UART: [update-reset] ++
11,943,302 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,944,444 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
12,040,770 >>> mbox cmd response: success
12,040,770 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,041,043 UART: [update-reset] Copying MAN_2 To MAN_1
12,049,057 UART: [update-reset Success] --
12,049,976 UART: [state] Locking Datavault
12,050,732 UART: [state] Locking PCR0, PCR1 and PCR31
12,051,336 UART: [state] Locking ICCM
12,051,786 UART: [exit] Launching FMC @ 0x40000130
12,057,115 UART:
12,057,131 UART: Running Caliptra FMC ...
12,057,539 UART:
12,057,682 UART: [state] CFI Enabled
12,146,257 UART: [art] Extend RT PCRs Done
12,146,685 UART: [art] Lock RT PCRs Done
12,148,142 UART: [art] Populate DV Done
12,156,219 UART: [fht] FMC Alias Private Key: 7
12,157,389 UART: [art] Derive CDI
12,157,669 UART: [art] Store in in slot 0x4
12,243,656 UART: [art] Derive Key Pair
12,244,016 UART: [art] Store priv key in slot 0x5
12,257,956 UART: [art] Derive Key Pair - Done
12,272,281 UART: [art] Signing Cert with AUTHO
12,272,761 UART: RITY.KEYID = 7
12,287,803 UART: [art] Erasing AUTHORITY.KEYID = 7
12,288,568 UART: [art] PUB.X = 3D985714C501B7B95DE94EA7A43695231585ABFB2708C4BFDB88E4B8E65EC2AB0EB70AE8D3D0C19599654DF5DD34AB1F
12,295,342 UART: [art] PUB.Y = 285DAA54E4F61FAF78DF92D432EE85B731C2801312912B5BECCA5AD0DE0D4A02C6CCFD323C8F55AB463D909E69EAC8CE
12,302,310 UART: [art] SIG.R = C76918CC7822A68CB7C6C39BC2B2F665C6B3747F104E2CB21C39E3EB3E724B09C2B21040A3E8C6415E14BE0699F4C8A5
12,309,082 UART: [art] SIG.S = 4589B45E6773BB269237DAC5988F07E7DC48B867F5312E9295A5C2EC49F5A0D0889D47C3B174AC6C5AC889FFD5F7DF21
12,332,346 UART: mbox::rt_entry...
12,332,718 UART: ____ _ _ _ ____ _____
12,333,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,334,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,335,070 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,335,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,336,606 UART: |_|
12,336,918 UART:
12,616,730 UART: [rt] Runtime listening for mailbox commands...
12,617,907 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 ready_for_fw is high
1,362,908 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,467,136 >>> mbox cmd response: success
2,467,136 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,528,962 UART:
2,528,978 UART: Running Caliptra FMC ...
2,529,386 UART:
2,529,529 UART: [state] CFI Enabled
2,540,244 UART: [fht] FMC Alias Private Key: 7
2,648,707 UART: [art] Extend RT PCRs Done
2,649,135 UART: [art] Lock RT PCRs Done
2,650,875 UART: [art] Populate DV Done
2,659,068 UART: [fht] FMC Alias Private Key: 7
2,660,048 UART: [art] Derive CDI
2,660,328 UART: [art] Store in in slot 0x4
2,746,021 UART: [art] Derive Key Pair
2,746,381 UART: [art] Store priv key in slot 0x5
2,760,399 UART: [art] Derive Key Pair - Done
2,775,079 UART: [art] Signing Cert with AUTHO
2,775,559 UART: RITY.KEYID = 7
2,790,619 UART: [art] Erasing AUTHORITY.KEYID = 7
2,791,384 UART: [art] PUB.X = F587D851064A4B8694F5FFE5EB1AF06412B011DCED4B790B0D10A0C1557FE8E13B57543E7B64AD65D75618009A2F3BDC
2,798,133 UART: [art] PUB.Y = 73B4D6FA2D093ED4A0659EF6044ADC6A0A6178DEB4B13B965B42F77AEC726942F030ED145B0D0FDC1663CA46FE0E5CDD
2,805,085 UART: [art] SIG.R = E6600075C1B7A1BC5240E57CC8448A5CAF2D3124B743D66FDAA1470CA51D751C4BD55D16A8C623D446B10B8774C048A2
2,811,833 UART: [art] SIG.S = 9D53D81EF04DB8CA1EA89D19766FC622D4B2D5BBA3B8DCBD925B93155BFF960343BFF662DE07E741C4E6225B67C33F75
2,835,374 UART: mbox::rt_entry...
2,835,746 UART: ____ _ _ _ ____ _____
2,836,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,837,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,838,098 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,838,866 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,839,634 UART: |_|
2,839,946 UART:
2,947,473 UART: [rt] Runtime listening for mailbox commands...
2,948,650 >>> mbox cmd response data (48 bytes)
2,948,651 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,710,882 >>> mbox cmd response: success
5,710,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,723,961 UART:
5,723,977 UART: Running Caliptra FMC ...
5,724,385 UART:
5,724,528 UART: [state] CFI Enabled
5,813,437 UART: [art] Extend RT PCRs Done
5,813,865 UART: [art] Lock RT PCRs Done
5,814,836 UART: [art] Populate DV Done
5,823,117 UART: [fht] FMC Alias Private Key: 7
5,824,263 UART: [art] Derive CDI
5,824,543 UART: [art] Store in in slot 0x4
5,910,090 UART: [art] Derive Key Pair
5,910,450 UART: [art] Store priv key in slot 0x5
5,923,684 UART: [art] Derive Key Pair - Done
5,938,674 UART: [art] Signing Cert with AUTHO
5,939,154 UART: RITY.KEYID = 7
5,954,658 UART: [art] Erasing AUTHORITY.KEYID = 7
5,955,423 UART: [art] PUB.X = 44E98BDEC1DA3A9B1A3DE297FB4F33E42A15E24DA86C8A72D83ED31BE04741702702AEC5C9CBB8DE1720BAB09B53F7E3
5,962,212 UART: [art] PUB.Y = 44C60715617FD9D0858463B9F3915B2E4CEB51061388F6F8BFFEF81CE5A9A868AE007F3A8F2D91F8FFEAF65C80A136E1
5,969,146 UART: [art] SIG.R = 01A5F3232844813609D76715310BC6650423894555B653B1A0EE07CCDCC79EB2B0269D202BD9A5501597BB81BA252877
5,975,891 UART: [art] SIG.S = BCBF2C66962578B94CA5EADFDC260ED3B79F16E4271E0EDFA1D867C1F377D78A6B6B944E0FE8426A6A583B40525F6F3E
5,999,379 UART: Caliptra RT
5,999,725 UART: [state] CFI Enabled
6,282,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,313,751 UART: [rt]cmd =0x4d454153, len=108
6,333,840 >>> mbox cmd response data (12 bytes)
6,333,841 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,631,863 >>> mbox cmd response: success
8,631,863 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,645,380 UART:
8,645,396 UART: Running Caliptra FMC ...
8,645,804 UART:
8,645,947 UART: [state] CFI Enabled
8,735,164 UART: [art] Extend RT PCRs Done
8,735,592 UART: [art] Lock RT PCRs Done
8,736,685 UART: [art] Populate DV Done
8,744,906 UART: [fht] FMC Alias Private Key: 7
8,745,960 UART: [art] Derive CDI
8,746,240 UART: [art] Store in in slot 0x4
8,832,457 UART: [art] Derive Key Pair
8,832,817 UART: [art] Store priv key in slot 0x5
8,846,565 UART: [art] Derive Key Pair - Done
8,861,079 UART: [art] Signing Cert with AUTHO
8,861,559 UART: RITY.KEYID = 7
8,876,669 UART: [art] Erasing AUTHORITY.KEYID = 7
8,877,434 UART: [art] PUB.X = 6C62F5C36A9AAA352A08C9824C99A623CA64AE53E9E827A6897C9B36098F84F720D2371375E31984F8DEA11EE9752368
8,884,196 UART: [art] PUB.Y = FDB4766B01BC2EA0AA2216E0E8A5DCF4E5271A01174DADA0E5511C9B0C045D99258A156673F52D5742E5D57F50782E14
8,891,140 UART: [art] SIG.R = 7594269C15A9DAF0780EE13FC58E9635EC5095566C2B5C0DC8DAE590D3E522F651061C1F12CEF6CDEA5768FF2CB040CB
8,897,915 UART: [art] SIG.S = B3DD1C5399054F638A2C4C1728FB2166883DBE05A10D576958C66C18102FBD6CB3295A7401643DCA1E237FF99EEACC4C
8,921,242 UART: mbox::rt_entry...
8,921,614 UART: ____ _ _ _ ____ _____
8,922,398 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,923,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,923,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,924,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,925,502 UART: |_|
8,925,814 UART:
9,202,070 UART: [rt] Runtime listening for mailbox commands...
11,503,005 >>> mbox cmd response: success
11,503,005 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,516,170 UART:
11,516,186 UART: Running Caliptra FMC ...
11,516,594 UART:
11,516,737 UART: [state] CFI Enabled
11,605,694 UART: [art] Extend RT PCRs Done
11,606,122 UART: [art] Lock RT PCRs Done
11,607,593 UART: [art] Populate DV Done
11,615,960 UART: [fht] FMC Alias Private Key: 7
11,617,074 UART: [art] Derive CDI
11,617,354 UART: [art] Store in in slot 0x4
11,703,333 UART: [art] Derive Key Pair
11,703,693 UART: [art] Store priv key in slot 0x5
11,716,847 UART: [art] Derive Key Pair - Done
11,731,447 UART: [art] Signing Cert with AUTHO
11,731,927 UART: RITY.KEYID = 7
11,747,071 UART: [art] Erasing AUTHORITY.KEYID = 7
11,747,836 UART: [art] PUB.X = 946E4217ECA5C8EDF56D4E86A2001606FB1E39685FE89083412729E91061F57725FE398669D422D1CE150439AA01F7D8
11,754,569 UART: [art] PUB.Y = 466DFBCB79FE183C69A1E5923B0F2D34C72B90E170846BAC989C94768DB1E4A60DE02675D8B9EB842A9E925DE7D4A94A
11,761,525 UART: [art] SIG.R = C1EE3C771BB4656DDE5ACBE44CC01AFE920266DF221F8F98BF61F366D021306847475AD72F7B6E8134B0695C8A0EBEA3
11,768,303 UART: [art] SIG.S = 028268BA524C56E0D18CA1AF774C6A000D0A5CB678699E08CA5B72483CF3E66F825E4B0D3044F40661EF31BA28D28EB0
11,791,682 UART: mbox::rt_entry...
11,792,054 UART: ____ _ _ _ ____ _____
11,792,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,793,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,794,406 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,795,174 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,795,942 UART: |_|
11,796,254 UART:
12,074,234 UART: [rt] Runtime listening for mailbox commands...
12,075,411 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.61s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,644 UART: [fwproc] Recv'd Img size: 78632 bytes
2,173,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,221 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,313,554 >>> mbox cmd response: success
2,313,554 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,314,738 UART: [afmc] ++
2,314,906 UART: [afmc] CDI.KEYID = 6
2,315,268 UART: [afmc] SUBJECT.KEYID = 7
2,315,693 UART: [afmc] AUTHORITY.KEYID = 5
2,351,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,193 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,781 UART: [afmc] --
2,394,755 UART: [cold-reset] --
2,395,619 UART: [state] Locking Datavault
2,396,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,432 UART: [state] Locking ICCM
2,398,008 UART: [exit] Launching FMC @ 0x40000130
2,403,337 UART:
2,403,353 UART: Running Caliptra FMC ...
2,403,761 UART:
2,403,815 UART: [state] CFI Enabled
2,414,124 UART: [fht] FMC Alias Private Key: 7
2,521,879 UART: [art] Extend RT PCRs Done
2,522,307 UART: [art] Lock RT PCRs Done
2,523,995 UART: [art] Populate DV Done
2,532,278 UART: [fht] FMC Alias Private Key: 7
2,533,314 UART: [art] Derive CDI
2,533,594 UART: [art] Store in in slot 0x4
2,619,447 UART: [art] Derive Key Pair
2,619,807 UART: [art] Store priv key in slot 0x5
2,632,767 UART: [art] Derive Key Pair - Done
2,647,680 UART: [art] Signing Cert with AUTHO
2,648,160 UART: RITY.KEYID = 7
2,663,652 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,417 UART: [art] PUB.X = 369775F137E78001EC59C52BDECCE8FBEBAB7CE4C6D6E2BC9D777D2B7A70534658146CF7056E58928294461CB4B67DF5
2,671,191 UART: [art] PUB.Y = 5C06B640AAD6F02E75076BBB65EE2DD9AF392DD2E1C7007ED1640B00132DA9B49D61438ECF167DEA33B49280D0AB8552
2,678,100 UART: [art] SIG.R = 339D28032A60704A6B59FCF23EF07C45F91F5B84DC998B88D223B9F0C2FE9251C036A6972E2A60D3677F15A0DE7F055B
2,684,868 UART: [art] SIG.S = 69D21D6FEE3B1422D41EBEA69E82050C35C360298F1E8359B9D07E6D2E5B8830BEBF586AC9E707708A7082D37064FA9B
2,708,034 UART: mbox::rt_entry...
2,708,406 UART: ____ _ _ _ ____ _____
2,709,190 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,990 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,758 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,526 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,294 UART: |_|
2,712,606 UART:
2,819,522 UART: [rt] Runtime listening for mailbox commands...
2,820,699 >>> mbox cmd response data (48 bytes)
2,820,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,820,811 UART:
2,820,827 UART: Running Caliptra ROM ...
2,821,235 UART:
2,821,290 UART: [state] CFI Enabled
2,823,896 UART: [state] LifecycleState = Unprovisioned
2,824,551 UART: [state] DebugLocked = No
2,825,159 UART: [state] WD Timer not started. Device not locked for debugging
2,826,417 UART: [kat] SHA2-256
3,632,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,192 UART: [kat] ++
3,636,344 UART: [kat] sha1
3,640,614 UART: [kat] SHA2-256
3,642,554 UART: [kat] SHA2-384
3,645,373 UART: [kat] SHA2-512-ACC
3,647,273 UART: [kat] ECC-384
3,656,918 UART: [kat] HMAC-384Kdf
3,661,384 UART: [kat] LMS
3,909,712 UART: [kat] --
3,910,590 UART: [update-reset] ++
5,223,455 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,622 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,374,488 >>> mbox cmd response: success
5,374,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,374,719 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,733 UART: [update-reset Success] --
5,383,532 UART: [state] Locking Datavault
5,384,236 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,840 UART: [state] Locking ICCM
5,385,372 UART: [exit] Launching FMC @ 0x40000130
5,390,701 UART:
5,390,717 UART: Running Caliptra FMC ...
5,391,125 UART:
5,391,179 UART: [state] CFI Enabled
5,480,590 UART: [art] Extend RT PCRs Done
5,481,018 UART: [art] Lock RT PCRs Done
5,482,111 UART: [art] Populate DV Done
5,490,222 UART: [fht] FMC Alias Private Key: 7
5,491,288 UART: [art] Derive CDI
5,491,568 UART: [art] Store in in slot 0x4
5,576,879 UART: [art] Derive Key Pair
5,577,239 UART: [art] Store priv key in slot 0x5
5,590,335 UART: [art] Derive Key Pair - Done
5,605,384 UART: [art] Signing Cert with AUTHO
5,605,864 UART: RITY.KEYID = 7
5,620,968 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,733 UART: [art] PUB.X = BE5FC376DAA4E1B7D849749DFB05A1A067E94A6F4E38158E1DBB6C2F9C19FEB5A11935E3220D8C8E0F85E01CA58F1485
5,628,510 UART: [art] PUB.Y = E1E3DCC59D1BD80AB76EBB3C2C6B5DFCC779A894691519624F48784930BAA6984FC6636FDD5AE99AAB9C702267B62E66
5,635,471 UART: [art] SIG.R = 017C7E8F6E0380E8280DA416DF6CCBCC708542CA2577A48627A7A6356E5FB6D9DFFB3BAA3177E12853F204E945478C39
5,642,235 UART: [art] SIG.S = F7A06A23D2B9192EA79F97CFA096F89B47D6FC0B7250BD6C672F988A63C678AA57EFF88942079D7A9E3AB4E29A4D1F51
5,665,844 UART: Caliptra RT
5,666,098 UART: [state] CFI Enabled
5,949,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,688 UART: [rt]cmd =0x4d454153, len=108
6,000,457 >>> mbox cmd response data (12 bytes)
6,000,458 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,001,286 UART:
6,001,302 UART: Running Caliptra ROM ...
6,001,710 UART:
6,001,765 UART: [state] CFI Enabled
6,004,509 UART: [state] LifecycleState = Unprovisioned
6,005,164 UART: [state] DebugLocked = No
6,005,780 UART: [state] WD Timer not started. Device not locked for debugging
6,007,048 UART: [kat] SHA2-256
6,812,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,816,823 UART: [kat] ++
6,816,975 UART: [kat] sha1
6,821,417 UART: [kat] SHA2-256
6,823,357 UART: [kat] SHA2-384
6,826,326 UART: [kat] SHA2-512-ACC
6,828,226 UART: [kat] ECC-384
6,837,863 UART: [kat] HMAC-384Kdf
6,842,333 UART: [kat] LMS
7,090,661 UART: [kat] --
7,091,337 UART: [update-reset] ++
7,994,414 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,995,595 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,091,869 >>> mbox cmd response: success
8,091,869 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,092,088 UART: [update-reset] Copying MAN_2 To MAN_1
8,100,102 UART: [update-reset Success] --
8,101,155 UART: [state] Locking Datavault
8,101,879 UART: [state] Locking PCR0, PCR1 and PCR31
8,102,483 UART: [state] Locking ICCM
8,103,115 UART: [exit] Launching FMC @ 0x40000130
8,108,444 UART:
8,108,460 UART: Running Caliptra FMC ...
8,108,868 UART:
8,108,922 UART: [state] CFI Enabled
8,197,841 UART: [art] Extend RT PCRs Done
8,198,269 UART: [art] Lock RT PCRs Done
8,199,166 UART: [art] Populate DV Done
8,207,445 UART: [fht] FMC Alias Private Key: 7
8,208,381 UART: [art] Derive CDI
8,208,661 UART: [art] Store in in slot 0x4
8,294,328 UART: [art] Derive Key Pair
8,294,688 UART: [art] Store priv key in slot 0x5
8,308,596 UART: [art] Derive Key Pair - Done
8,323,714 UART: [art] Signing Cert with AUTHO
8,324,194 UART: RITY.KEYID = 7
8,339,126 UART: [art] Erasing AUTHORITY.KEYID = 7
8,339,891 UART: [art] PUB.X = A419D8BA03B8154CAC0EF9F23678BA299EB44E0A4155B479070A9AA6BB066066CDDC748B65B17EF358C397326F13AAF6
8,346,653 UART: [art] PUB.Y = 751A31511DF13A19D81BDDC451FD4F8A08FD4108AFE70FAF12F322D2601DA80F17991A7E13B6F7147983BA47417F24C5
8,353,597 UART: [art] SIG.R = FD1C9B781C8CCE9ADE6C465D05FBC8A7EDA33F3545E7F7CEBD17953D07B3474F105057EB55628DBCAA5C7BD409288365
8,360,376 UART: [art] SIG.S = 18DCF082F26233B88BE7BAAB6C43A9C40CBCB6D9F3EA6705BA48B7720DEE6092651A20C5028D0308A0867B2B198A922A
8,383,635 UART: mbox::rt_entry...
8,384,007 UART: ____ _ _ _ ____ _____
8,384,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,385,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,386,359 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,387,127 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,387,895 UART: |_|
8,388,207 UART:
8,666,067 UART: [rt] Runtime listening for mailbox commands...
8,667,012 UART:
8,667,028 UART: Running Caliptra ROM ...
8,667,436 UART:
8,667,491 UART: [state] CFI Enabled
8,670,343 UART: [state] LifecycleState = Unprovisioned
8,670,998 UART: [state] DebugLocked = No
8,671,520 UART: [state] WD Timer not started. Device not locked for debugging
8,672,664 UART: [kat] SHA2-256
9,478,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,482,439 UART: [kat] ++
9,482,591 UART: [kat] sha1
9,486,835 UART: [kat] SHA2-256
9,488,775 UART: [kat] SHA2-384
9,491,468 UART: [kat] SHA2-512-ACC
9,493,368 UART: [kat] ECC-384
9,503,409 UART: [kat] HMAC-384Kdf
9,508,063 UART: [kat] LMS
9,756,391 UART: [kat] --
9,757,073 UART: [update-reset] ++
10,660,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,661,205 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
10,757,479 >>> mbox cmd response: success
10,757,479 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,757,732 UART: [update-reset] Copying MAN_2 To MAN_1
10,765,746 UART: [update-reset Success] --
10,766,923 UART: [state] Locking Datavault
10,767,707 UART: [state] Locking PCR0, PCR1 and PCR31
10,768,311 UART: [state] Locking ICCM
10,768,951 UART: [exit] Launching FMC @ 0x40000130
10,774,280 UART:
10,774,296 UART: Running Caliptra FMC ...
10,774,704 UART:
10,774,758 UART: [state] CFI Enabled
10,863,533 UART: [art] Extend RT PCRs Done
10,863,961 UART: [art] Lock RT PCRs Done
10,865,372 UART: [art] Populate DV Done
10,873,505 UART: [fht] FMC Alias Private Key: 7
10,874,647 UART: [art] Derive CDI
10,874,927 UART: [art] Store in in slot 0x4
10,960,424 UART: [art] Derive Key Pair
10,960,784 UART: [art] Store priv key in slot 0x5
10,974,066 UART: [art] Derive Key Pair - Done
10,988,456 UART: [art] Signing Cert with AUTHO
10,988,936 UART: RITY.KEYID = 7
11,004,252 UART: [art] Erasing AUTHORITY.KEYID = 7
11,005,017 UART: [art] PUB.X = E46C21C4E28FFBC1CAE913AB9E5DDD626601E347DCD568B9FF6C0A1AFE2217D62048D49A7D99FEB1CC4AB57EC0F9725E
11,011,807 UART: [art] PUB.Y = 5115594AC969259E2C7B4E31FDCFEF9D19DD6FFD14F5442D68B9CF53A932D5E6AEF78351675833770A64308ACCB771B3
11,018,762 UART: [art] SIG.R = 2138D791D73BD83547550DF4003D2C5A5C7D561BAA2FBF1C4FB6489F95F940A6022411EF72C3CA22A293C277660B7210
11,025,501 UART: [art] SIG.S = C25E140E42FBF1A473A40CB928D0D2D517DCDC229F734B1F50D37FF15B71F8996B771502B6CC960E986A61FD8ECA12A5
11,049,642 UART: mbox::rt_entry...
11,050,014 UART: ____ _ _ _ ____ _____
11,050,798 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,051,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,052,366 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,053,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,053,902 UART: |_|
11,054,214 UART:
11,335,128 UART: [rt] Runtime listening for mailbox commands...
11,336,305 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,181 ready_for_fw is high
1,059,181 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,161,357 >>> mbox cmd response: success
2,161,357 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,222,837 UART:
2,222,853 UART: Running Caliptra FMC ...
2,223,261 UART:
2,223,315 UART: [state] CFI Enabled
2,233,694 UART: [fht] FMC Alias Private Key: 7
2,341,693 UART: [art] Extend RT PCRs Done
2,342,121 UART: [art] Lock RT PCRs Done
2,343,407 UART: [art] Populate DV Done
2,351,590 UART: [fht] FMC Alias Private Key: 7
2,352,570 UART: [art] Derive CDI
2,352,850 UART: [art] Store in in slot 0x4
2,438,323 UART: [art] Derive Key Pair
2,438,683 UART: [art] Store priv key in slot 0x5
2,451,811 UART: [art] Derive Key Pair - Done
2,466,322 UART: [art] Signing Cert with AUTHO
2,466,802 UART: RITY.KEYID = 7
2,482,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,389 UART: [art] PUB.X = 3B321D8BD6BB2EB2F471A76BD82A825144F119092A6058F042432C039752C6556B55826ABD03D0BD9BAAD95985A0CF7F
2,490,154 UART: [art] PUB.Y = 46B49F0AF2F61A5E34D0DFBAF006CF11C45D538146165C1E9D502E1D317C0F4F3F946873A8A56BB60D9D75D2D277790F
2,497,097 UART: [art] SIG.R = 571922BFBFAB83F4A5168594E810944453A08577C45F81AF53737DE8B6A94426C2F581E7CBD1728445BEBB40EC5AFC17
2,503,871 UART: [art] SIG.S = D37096B7812C29999A9BE32FC5A7FFEAA8F0B4D51103256732D053CF398BBDAD6DBCA2FE8896741D72EB8C8A77D18B5F
2,527,719 UART: mbox::rt_entry...
2,528,091 UART: ____ _ _ _ ____ _____
2,528,875 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,443 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,211 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,979 UART: |_|
2,532,291 UART:
2,639,003 UART: [rt] Runtime listening for mailbox commands...
2,640,180 >>> mbox cmd response data (48 bytes)
2,640,181 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,077,726 >>> mbox cmd response: success
5,077,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,090,838 UART:
5,090,854 UART: Running Caliptra FMC ...
5,091,262 UART:
5,091,316 UART: [state] CFI Enabled
5,179,969 UART: [art] Extend RT PCRs Done
5,180,397 UART: [art] Lock RT PCRs Done
5,181,822 UART: [art] Populate DV Done
5,190,101 UART: [fht] FMC Alias Private Key: 7
5,191,085 UART: [art] Derive CDI
5,191,365 UART: [art] Store in in slot 0x4
5,276,886 UART: [art] Derive Key Pair
5,277,246 UART: [art] Store priv key in slot 0x5
5,290,232 UART: [art] Derive Key Pair - Done
5,304,883 UART: [art] Signing Cert with AUTHO
5,305,363 UART: RITY.KEYID = 7
5,320,337 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,102 UART: [art] PUB.X = 0F1B86C19634D3FA62D24CEE12A24DE591549BE63BAA1C493F0185B8052E1563B094949445C90DC18A84EDD9E6EDD93F
5,327,868 UART: [art] PUB.Y = 1B90AB817C0E8177F479F38E072998A04F9972D7BBACA3A7311CECA26ADB2EA546E27331F697D307611CB37DD236AE70
5,334,817 UART: [art] SIG.R = 1401CB7C5FE26F0E40A59AD31A924B43672FD15DC5AC2AA7A643C5515987D3A8B0C87CF138A659EF90BE386D452E42B0
5,341,591 UART: [art] SIG.S = 645A94728606AB8C8B1FCE2F9DE862B4B329B34656B55863B4D2A066340E3E1F2E31C1EBF7249A7A0FE08D8F9F784F3D
5,366,239 UART: Caliptra RT
5,366,493 UART: [state] CFI Enabled
5,642,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,672,739 UART: [rt]cmd =0x4d454153, len=108
5,693,496 >>> mbox cmd response data (12 bytes)
5,693,497 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,668,009 >>> mbox cmd response: success
7,668,009 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,681,591 UART:
7,681,607 UART: Running Caliptra FMC ...
7,682,015 UART:
7,682,069 UART: [state] CFI Enabled
7,771,240 UART: [art] Extend RT PCRs Done
7,771,668 UART: [art] Lock RT PCRs Done
7,772,801 UART: [art] Populate DV Done
7,780,966 UART: [fht] FMC Alias Private Key: 7
7,781,926 UART: [art] Derive CDI
7,782,206 UART: [art] Store in in slot 0x4
7,867,553 UART: [art] Derive Key Pair
7,867,913 UART: [art] Store priv key in slot 0x5
7,880,665 UART: [art] Derive Key Pair - Done
7,895,767 UART: [art] Signing Cert with AUTHO
7,896,247 UART: RITY.KEYID = 7
7,911,521 UART: [art] Erasing AUTHORITY.KEYID = 7
7,912,286 UART: [art] PUB.X = F4CBA0FE79AD7B3C8BA46265A34B663FD5B3149524FF770648CB60C78A634796D948163170E7BACEB2CF5F76CEC3CD68
7,919,067 UART: [art] PUB.Y = AB94FF6E651A6D26AECBBF8C4296F62BABE9144F402D487B19F6A64DCF42D31B35BD6CE96691943CC31CCA690DBC6FA4
7,926,038 UART: [art] SIG.R = CE965AF54B0F21D92507DA5A659900C904FC189492EE448E4BC9F2A17DBB351BDDD0A05C39FE6B4E7B3A16D5A8C56160
7,932,791 UART: [art] SIG.S = B80E167E8717A6D2339D6009F846A3374746D8C8A089F6ACAD243ED99A7D4D0D9016A767E276276D8504F11EA7FF35D3
7,956,958 UART: mbox::rt_entry...
7,957,330 UART: ____ _ _ _ ____ _____
7,958,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,958,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,959,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,960,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,961,218 UART: |_|
7,961,530 UART:
8,244,911 UART: [rt] Runtime listening for mailbox commands...
10,219,070 >>> mbox cmd response: success
10,219,070 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,232,484 UART:
10,232,500 UART: Running Caliptra FMC ...
10,232,908 UART:
10,232,962 UART: [state] CFI Enabled
10,321,891 UART: [art] Extend RT PCRs Done
10,322,319 UART: [art] Lock RT PCRs Done
10,323,516 UART: [art] Populate DV Done
10,331,755 UART: [fht] FMC Alias Private Key: 7
10,332,813 UART: [art] Derive CDI
10,333,093 UART: [art] Store in in slot 0x4
10,418,948 UART: [art] Derive Key Pair
10,419,308 UART: [art] Store priv key in slot 0x5
10,432,596 UART: [art] Derive Key Pair - Done
10,447,332 UART: [art] Signing Cert with AUTHO
10,447,812 UART: RITY.KEYID = 7
10,462,960 UART: [art] Erasing AUTHORITY.KEYID = 7
10,463,725 UART: [art] PUB.X = 55C3695AC7489BE7AF02D2B1FD5BB593287700A71F492EFB2BB9541E3F4C917BAE42D1712096831498B45ADA3CF3541F
10,470,476 UART: [art] PUB.Y = 629B5A454112F4CB534FBAF9E40AD88AFF13D0FDFE49CACBD8776DFCCFB2065BC045341A4E316E8FA11B6411A6A7FA78
10,477,444 UART: [art] SIG.R = 1BA83E71A81E0E22184E6E673523F1530C3DA5AE54E88345036DD4C7DD22518B85E1C2C6687713FE0B11A6E4FF8BCDE8
10,484,210 UART: [art] SIG.S = DD4FD091EF05234CEA4BA46D3CD162FDD2118CC5D0DDB788BD9DE2AD2C68D192F01902341B10B31299307608183FA040
10,508,076 UART: mbox::rt_entry...
10,508,448 UART: ____ _ _ _ ____ _____
10,509,232 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,510,032 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,510,800 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,511,568 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,512,336 UART: |_|
10,512,648 UART:
10,788,024 UART: [rt] Runtime listening for mailbox commands...
10,789,201 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.32s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,285,641 UART: [fwproc] Recv'd Img size: 78632 bytes
2,174,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,724 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,311,881 >>> mbox cmd response: success
2,311,881 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,313,001 UART: [afmc] ++
2,313,169 UART: [afmc] CDI.KEYID = 6
2,313,531 UART: [afmc] SUBJECT.KEYID = 7
2,313,956 UART: [afmc] AUTHORITY.KEYID = 5
2,349,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,818 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,274 UART: [afmc] --
2,393,328 UART: [cold-reset] --
2,394,136 UART: [state] Locking Datavault
2,395,295 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,899 UART: [state] Locking ICCM
2,396,541 UART: [exit] Launching FMC @ 0x40000130
2,401,870 UART:
2,401,886 UART: Running Caliptra FMC ...
2,402,294 UART:
2,402,437 UART: [state] CFI Enabled
2,413,148 UART: [fht] FMC Alias Private Key: 7
2,521,245 UART: [art] Extend RT PCRs Done
2,521,673 UART: [art] Lock RT PCRs Done
2,523,267 UART: [art] Populate DV Done
2,531,598 UART: [fht] FMC Alias Private Key: 7
2,532,774 UART: [art] Derive CDI
2,533,054 UART: [art] Store in in slot 0x4
2,618,993 UART: [art] Derive Key Pair
2,619,353 UART: [art] Store priv key in slot 0x5
2,632,203 UART: [art] Derive Key Pair - Done
2,647,184 UART: [art] Signing Cert with AUTHO
2,647,664 UART: RITY.KEYID = 7
2,662,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,427 UART: [art] PUB.X = CEA5D0C1D3ADDC09C3E1CC5236A816A8681B6EB6ABE98993D33E2BE955BA020EAD2E4B51CBF0ACE40C883F0777514D3C
2,670,206 UART: [art] PUB.Y = 3A685CBFEAC52FDB1D5E02F37AC540430B8A31FF1B2595567EF534941C0A95C9C592DE68E34688253BFFB8D63A6BA93A
2,677,161 UART: [art] SIG.R = 7BC630069B0107CAE504F6823AFC6B2EBF82CC8EAC7BE08D4F5B8A939303056CC841FFE0DCC71F8CFEB5029DF960513F
2,683,930 UART: [art] SIG.S = E5E40EE86AA120F12357A54FB40545C619B308FE6EF28ED5562BB40CC11DB9ACA36A4DB4EE0E519773814BBCB14521F3
2,707,914 UART: mbox::rt_entry...
2,708,286 UART: ____ _ _ _ ____ _____
2,709,070 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,870 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,406 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,174 UART: |_|
2,712,486 UART:
2,819,242 UART: [rt] Runtime listening for mailbox commands...
2,820,419 >>> mbox cmd response data (48 bytes)
2,820,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,820,531 UART:
2,820,547 UART: Running Caliptra ROM ...
2,820,955 UART:
2,821,097 UART: [state] CFI Enabled
2,823,917 UART: [state] LifecycleState = Unprovisioned
2,824,572 UART: [state] DebugLocked = No
2,825,266 UART: [state] WD Timer not started. Device not locked for debugging
2,826,576 UART: [kat] SHA2-256
3,632,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,636,351 UART: [kat] ++
3,636,503 UART: [kat] sha1
3,640,733 UART: [kat] SHA2-256
3,642,673 UART: [kat] SHA2-384
3,645,386 UART: [kat] SHA2-512-ACC
3,647,286 UART: [kat] ECC-384
3,656,999 UART: [kat] HMAC-384Kdf
3,661,793 UART: [kat] LMS
3,910,121 UART: [kat] --
3,911,035 UART: [update-reset] ++
5,223,476 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,224,673 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,374,539 >>> mbox cmd response: success
5,374,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,374,644 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,658 UART: [update-reset Success] --
5,383,495 UART: [state] Locking Datavault
5,384,367 UART: [state] Locking PCR0, PCR1 and PCR31
5,384,971 UART: [state] Locking ICCM
5,385,453 UART: [exit] Launching FMC @ 0x40000130
5,390,782 UART:
5,390,798 UART: Running Caliptra FMC ...
5,391,206 UART:
5,391,349 UART: [state] CFI Enabled
5,480,838 UART: [art] Extend RT PCRs Done
5,481,266 UART: [art] Lock RT PCRs Done
5,482,587 UART: [art] Populate DV Done
5,490,576 UART: [fht] FMC Alias Private Key: 7
5,491,736 UART: [art] Derive CDI
5,492,016 UART: [art] Store in in slot 0x4
5,578,121 UART: [art] Derive Key Pair
5,578,481 UART: [art] Store priv key in slot 0x5
5,591,587 UART: [art] Derive Key Pair - Done
5,606,423 UART: [art] Signing Cert with AUTHO
5,606,903 UART: RITY.KEYID = 7
5,622,203 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,968 UART: [art] PUB.X = 6E6D720AC339EA852B5E381CCAA83AB3779E74D4A54EB474C75EE5BD51C7651251A150BBBEC60755A0797140334A439E
5,629,738 UART: [art] PUB.Y = FD3E70364BF62A4B82F3613A3488B950EB2F64560AC2CA1E8E3CB256F0216EACC89FD08F73DE0756656C2F6E2A99415A
5,636,692 UART: [art] SIG.R = C63714BA702B221E5C6D1C46E9DB76CAF79E03B567B1BF9C9AD751FAE9A1B23DC8424AB4BB21A474397B72D6DE09047D
5,643,469 UART: [art] SIG.S = E2B7E2624B390E47D03BEA7B2293343D3696A33C522B9407BDB71753B8C22E7F512B2F83FECE3D8ACD4547653E775E12
5,666,734 UART: Caliptra RT
5,667,080 UART: [state] CFI Enabled
5,947,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,857 UART: [rt]cmd =0x4d454153, len=108
5,998,392 >>> mbox cmd response data (12 bytes)
5,998,393 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,233 UART:
5,999,249 UART: Running Caliptra ROM ...
5,999,657 UART:
5,999,799 UART: [state] CFI Enabled
6,002,671 UART: [state] LifecycleState = Unprovisioned
6,003,326 UART: [state] DebugLocked = No
6,004,036 UART: [state] WD Timer not started. Device not locked for debugging
6,005,206 UART: [kat] SHA2-256
6,810,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,814,981 UART: [kat] ++
6,815,133 UART: [kat] sha1
6,819,441 UART: [kat] SHA2-256
6,821,381 UART: [kat] SHA2-384
6,824,228 UART: [kat] SHA2-512-ACC
6,826,128 UART: [kat] ECC-384
6,835,919 UART: [kat] HMAC-384Kdf
6,840,675 UART: [kat] LMS
7,089,003 UART: [kat] --
7,090,105 UART: [update-reset] ++
7,993,808 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,994,825 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,091,099 >>> mbox cmd response: success
8,091,099 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,091,370 UART: [update-reset] Copying MAN_2 To MAN_1
8,099,384 UART: [update-reset Success] --
8,100,529 UART: [state] Locking Datavault
8,101,497 UART: [state] Locking PCR0, PCR1 and PCR31
8,102,101 UART: [state] Locking ICCM
8,102,537 UART: [exit] Launching FMC @ 0x40000130
8,107,866 UART:
8,107,882 UART: Running Caliptra FMC ...
8,108,290 UART:
8,108,433 UART: [state] CFI Enabled
8,197,740 UART: [art] Extend RT PCRs Done
8,198,168 UART: [art] Lock RT PCRs Done
8,199,239 UART: [art] Populate DV Done
8,207,486 UART: [fht] FMC Alias Private Key: 7
8,208,634 UART: [art] Derive CDI
8,208,914 UART: [art] Store in in slot 0x4
8,294,511 UART: [art] Derive Key Pair
8,294,871 UART: [art] Store priv key in slot 0x5
8,308,417 UART: [art] Derive Key Pair - Done
8,323,210 UART: [art] Signing Cert with AUTHO
8,323,690 UART: RITY.KEYID = 7
8,338,998 UART: [art] Erasing AUTHORITY.KEYID = 7
8,339,763 UART: [art] PUB.X = 747A45FB39311D83596A418127127CCDDAC3DDD80410AF930AF591ED7128F0C3ECE91F36F6338B170F72D9725073E690
8,346,524 UART: [art] PUB.Y = 3B0F60CB335450488F46838CBAE5A3BE96757314F4114D54DB281ED02EE36D5E44A679EAEF69319FA0DDC7248711BB43
8,353,477 UART: [art] SIG.R = EF21AD2AEBB951951C2F13F24F7FA358AE08DE0E1A6F81E810049CCD8219A3D8BB87F86CDF00C2E38895A2216FCBD7BC
8,360,238 UART: [art] SIG.S = 716625A7000252121AF13B4B508C3A201FE7BA74F6F682BC3F9AD1253F1D4AC0090CE1A65C7FE0E73452A44C1F937ACD
8,383,788 UART: mbox::rt_entry...
8,384,160 UART: ____ _ _ _ ____ _____
8,384,944 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,385,744 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,386,512 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,387,280 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,388,048 UART: |_|
8,388,360 UART:
8,664,964 UART: [rt] Runtime listening for mailbox commands...
8,665,909 UART:
8,665,925 UART: Running Caliptra ROM ...
8,666,333 UART:
8,666,475 UART: [state] CFI Enabled
8,669,371 UART: [state] LifecycleState = Unprovisioned
8,670,026 UART: [state] DebugLocked = No
8,670,544 UART: [state] WD Timer not started. Device not locked for debugging
8,671,704 UART: [kat] SHA2-256
9,477,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,481,479 UART: [kat] ++
9,481,631 UART: [kat] sha1
9,485,755 UART: [kat] SHA2-256
9,487,695 UART: [kat] SHA2-384
9,490,292 UART: [kat] SHA2-512-ACC
9,492,192 UART: [kat] ECC-384
9,501,373 UART: [kat] HMAC-384Kdf
9,506,225 UART: [kat] LMS
9,754,553 UART: [kat] --
9,755,367 UART: [update-reset] ++
10,659,598 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,660,733 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
10,757,007 >>> mbox cmd response: success
10,757,007 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,757,170 UART: [update-reset] Copying MAN_2 To MAN_1
10,765,184 UART: [update-reset Success] --
10,765,933 UART: [state] Locking Datavault
10,766,757 UART: [state] Locking PCR0, PCR1 and PCR31
10,767,361 UART: [state] Locking ICCM
10,768,017 UART: [exit] Launching FMC @ 0x40000130
10,773,346 UART:
10,773,362 UART: Running Caliptra FMC ...
10,773,770 UART:
10,773,913 UART: [state] CFI Enabled
10,863,326 UART: [art] Extend RT PCRs Done
10,863,754 UART: [art] Lock RT PCRs Done
10,865,037 UART: [art] Populate DV Done
10,873,188 UART: [fht] FMC Alias Private Key: 7
10,874,336 UART: [art] Derive CDI
10,874,616 UART: [art] Store in in slot 0x4
10,960,545 UART: [art] Derive Key Pair
10,960,905 UART: [art] Store priv key in slot 0x5
10,974,053 UART: [art] Derive Key Pair - Done
10,989,048 UART: [art] Signing Cert with AUTHO
10,989,528 UART: RITY.KEYID = 7
11,004,926 UART: [art] Erasing AUTHORITY.KEYID = 7
11,005,691 UART: [art] PUB.X = 1B58A590D1F66DE9E68CBC5EE30A7D70D4243D632E0A09977650E7E4A104FE134FA95A627EF9CABEF1A5612E38E309E9
11,012,458 UART: [art] PUB.Y = 37B1B0184A0A20E18FBB3788ACBB871FD85F7ED0FD6FEADF59D536340DA050B85D5B2A31282AF1143289ACCA4860136D
11,019,416 UART: [art] SIG.R = 1D3703F81BF7A2FCA1CA7CEFE75A0BE959C6FB5FFD5ECBE2697A87DCE568C3C0BD603CF1E5325A0BA5A3C88B5C9929CF
11,026,209 UART: [art] SIG.S = 5D3F3BEFE0F5A5F2C978CB673A5100BF2DDB8FDFFFE085ED65D3E4C1F38BC439A20E6A3485439DF58A3A596F1FE48E3F
11,049,069 UART: mbox::rt_entry...
11,049,441 UART: ____ _ _ _ ____ _____
11,050,225 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,051,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,051,793 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,052,561 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,053,329 UART: |_|
11,053,641 UART:
11,331,231 UART: [rt] Runtime listening for mailbox commands...
11,332,408 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,680 >>> mbox cmd response: success
2,163,680 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,225,318 UART:
2,225,334 UART: Running Caliptra FMC ...
2,225,742 UART:
2,225,885 UART: [state] CFI Enabled
2,236,604 UART: [fht] FMC Alias Private Key: 7
2,344,749 UART: [art] Extend RT PCRs Done
2,345,177 UART: [art] Lock RT PCRs Done
2,346,741 UART: [art] Populate DV Done
2,354,928 UART: [fht] FMC Alias Private Key: 7
2,355,972 UART: [art] Derive CDI
2,356,252 UART: [art] Store in in slot 0x4
2,442,019 UART: [art] Derive Key Pair
2,442,379 UART: [art] Store priv key in slot 0x5
2,455,059 UART: [art] Derive Key Pair - Done
2,469,686 UART: [art] Signing Cert with AUTHO
2,470,166 UART: RITY.KEYID = 7
2,485,766 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,531 UART: [art] PUB.X = EF5223B1D8890F61721074A8458CDD805C0CBC3CDF274937B384D789F73444C2DA4589FC6205AB78003780ED66D79C8D
2,493,270 UART: [art] PUB.Y = ECFC7388933EF7265CC7DDF23C2704529C62647A802AABFE9BFB94DC7E36BFEC05553049C795EB17CA1496DE38626611
2,500,224 UART: [art] SIG.R = BDD8742E22A0DEC23982B0897343411E8D0D94D2B29C7F68F04E3D0D70372A9238FB56D64E8B61E0C358E53AB6008926
2,506,966 UART: [art] SIG.S = F83B2447603F65E3346A163B4E59F60D505D45A4319E1A5B45BE3F8086E84EBDB39EDA6005975EDFE6E4B70136082442
2,529,825 UART: mbox::rt_entry...
2,530,197 UART: ____ _ _ _ ____ _____
2,530,981 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,781 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,549 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,317 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,085 UART: |_|
2,534,397 UART:
2,640,418 UART: [rt] Runtime listening for mailbox commands...
2,641,595 >>> mbox cmd response data (48 bytes)
2,641,596 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,079,120 >>> mbox cmd response: success
5,079,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,092,484 UART:
5,092,500 UART: Running Caliptra FMC ...
5,092,908 UART:
5,093,051 UART: [state] CFI Enabled
5,181,892 UART: [art] Extend RT PCRs Done
5,182,320 UART: [art] Lock RT PCRs Done
5,183,699 UART: [art] Populate DV Done
5,191,676 UART: [fht] FMC Alias Private Key: 7
5,192,658 UART: [art] Derive CDI
5,192,938 UART: [art] Store in in slot 0x4
5,278,811 UART: [art] Derive Key Pair
5,279,171 UART: [art] Store priv key in slot 0x5
5,292,843 UART: [art] Derive Key Pair - Done
5,307,669 UART: [art] Signing Cert with AUTHO
5,308,149 UART: RITY.KEYID = 7
5,323,141 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,906 UART: [art] PUB.X = F87D634EC79F3464C2B4989E5011262B7CE57DC449B33117939AD738FB8CF67BF5B5EAE210EE8329E6D3DAA5A5B500B6
5,330,664 UART: [art] PUB.Y = 8049CAFD6EE5341DE1D1E613138FE57195088AC119992C8EF3E8763132576CC30AEDD544F6AF1374C2DB21BF4878292E
5,337,612 UART: [art] SIG.R = 1E14F4E48BD8BF7DA1E39BFC79BC6B29597DBA7C599FDB66DC08C929950E180B977D032F088BCB5D4B9D63155DE46A08
5,344,380 UART: [art] SIG.S = B905B6DC581B2CB591415D2C5FED1B0D1FBC8A7F812161769637C8A052F829D37916C60D759E5E1CD523F670FB53C184
5,368,460 UART: Caliptra RT
5,368,806 UART: [state] CFI Enabled
5,651,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,682,604 UART: [rt]cmd =0x4d454153, len=108
5,702,643 >>> mbox cmd response data (12 bytes)
5,702,644 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,678,437 >>> mbox cmd response: success
7,678,437 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,691,745 UART:
7,691,761 UART: Running Caliptra FMC ...
7,692,169 UART:
7,692,312 UART: [state] CFI Enabled
7,781,259 UART: [art] Extend RT PCRs Done
7,781,687 UART: [art] Lock RT PCRs Done
7,783,132 UART: [art] Populate DV Done
7,791,227 UART: [fht] FMC Alias Private Key: 7
7,792,301 UART: [art] Derive CDI
7,792,581 UART: [art] Store in in slot 0x4
7,878,426 UART: [art] Derive Key Pair
7,878,786 UART: [art] Store priv key in slot 0x5
7,891,818 UART: [art] Derive Key Pair - Done
7,906,686 UART: [art] Signing Cert with AUTHO
7,907,166 UART: RITY.KEYID = 7
7,922,234 UART: [art] Erasing AUTHORITY.KEYID = 7
7,922,999 UART: [art] PUB.X = 15B04AAAE15C353D3358A109D8915B95EFC38A9CEE7A1C83ED7D89F20ED736A661E2F06511BB5E795C4C1D0208C419C7
7,929,767 UART: [art] PUB.Y = AF333FD8DFEF33F8B984E3E7CBDF036528ECBEA5EEB6C5A665B5CC5005930CFA3FF2975F999785679E6A46A4BEE16ACE
7,936,734 UART: [art] SIG.R = CC21910EDB78F2A8CFB16E5A5FBF28273BA803037610661FE050ED6A4CA27330C4F3704DE2978D5CAE4D527D55F6D800
7,943,483 UART: [art] SIG.S = 0E65099CE78FAF56A3272979EF4C7AC20C8C1DB11C0BFF715888F82CD849C8287FEE14052D019C90A5746B4CE5681461
7,967,160 UART: mbox::rt_entry...
7,967,532 UART: ____ _ _ _ ____ _____
7,968,316 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,969,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,969,884 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,970,652 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,971,420 UART: |_|
7,971,732 UART:
8,255,124 UART: [rt] Runtime listening for mailbox commands...
10,230,994 >>> mbox cmd response: success
10,230,994 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,244,444 UART:
10,244,460 UART: Running Caliptra FMC ...
10,244,868 UART:
10,245,011 UART: [state] CFI Enabled
10,334,098 UART: [art] Extend RT PCRs Done
10,334,526 UART: [art] Lock RT PCRs Done
10,335,841 UART: [art] Populate DV Done
10,344,080 UART: [fht] FMC Alias Private Key: 7
10,345,162 UART: [art] Derive CDI
10,345,442 UART: [art] Store in in slot 0x4
10,431,047 UART: [art] Derive Key Pair
10,431,407 UART: [art] Store priv key in slot 0x5
10,444,275 UART: [art] Derive Key Pair - Done
10,458,888 UART: [art] Signing Cert with AUTHO
10,459,368 UART: RITY.KEYID = 7
10,475,024 UART: [art] Erasing AUTHORITY.KEYID = 7
10,475,789 UART: [art] PUB.X = 836155BAB9622ED4B1DCE2DCD64CEF17944FC3DE976FF02B24175D8A1236C73D6DBDB83E8B42AE3D98523823F74DBEA0
10,482,577 UART: [art] PUB.Y = 64486573E8127D0B40D735090E9C06F99648335117E945A75FDEE35DBD63E99E3E124CC694BC2D74D343FB7C2AAB9690
10,489,515 UART: [art] SIG.R = B14ADA4BE3E81A3EA9B63028223037B8778E54A77DD14EDBAFB881A11B4FDE3D553D430275829E199E37A1AB118351EF
10,496,292 UART: [art] SIG.S = C3745C973CE33ACF221D11A61FC3FD7966FBD883BF3034CB89A642ECAE7B79B61E5947DAB00565ABDA93254872D5A31D
10,519,990 UART: mbox::rt_entry...
10,520,362 UART: ____ _ _ _ ____ _____
10,521,146 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,521,946 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,522,714 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,523,482 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,524,250 UART: |_|
10,524,562 UART:
10,811,001 UART: [rt] Runtime listening for mailbox commands...
10,812,178 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.40s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,281,982 UART: [fwproc] Recv'd Img size: 78632 bytes
2,170,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,080 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,309,266 >>> mbox cmd response: success
2,309,266 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,310,435 UART: [afmc] ++
2,310,603 UART: [afmc] CDI.KEYID = 6
2,310,966 UART: [afmc] SUBJECT.KEYID = 7
2,311,392 UART: [afmc] AUTHORITY.KEYID = 5
2,346,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,796 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,525 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,127 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,918 UART: [afmc] --
2,390,046 UART: [cold-reset] --
2,390,966 UART: [state] Locking Datavault
2,392,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,829 UART: [state] Locking ICCM
2,393,291 UART: [exit] Launching FMC @ 0x40000130
2,398,620 UART:
2,398,636 UART: Running Caliptra FMC ...
2,399,044 UART:
2,399,098 UART: [state] CFI Enabled
2,409,713 UART: [fht] FMC Alias Private Key: 7
2,517,900 UART: [art] Extend RT PCRs Done
2,518,328 UART: [art] Lock RT PCRs Done
2,519,508 UART: [art] Populate DV Done
2,527,807 UART: [fht] FMC Alias Private Key: 7
2,528,861 UART: [art] Derive CDI
2,529,141 UART: [art] Store in in slot 0x4
2,614,942 UART: [art] Derive Key Pair
2,615,302 UART: [art] Store priv key in slot 0x5
2,628,464 UART: [art] Derive Key Pair - Done
2,643,144 UART: [art] Signing Cert with AUTHO
2,643,624 UART: RITY.KEYID = 7
2,659,192 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,957 UART: [art] PUB.X = FC1B135594BCCB56622883375D59BB8FFF78946F8976529D9123A98FCBE29F162FCFBA725F5EFB3F275AE545E450C444
2,666,735 UART: [art] PUB.Y = 86F236D7A35B5ED47DF82ED6B5AD9BE500FFB151BE8CE145A6E39EE44150CE3BDA065DD8BA639E24090E23467803E466
2,673,665 UART: [art] SIG.R = C883FE1865445FC74D0E9512CF6773844E9858323D10485088BBD8E44460B2B74E1D57B1E03053236470EEA79D0AAAA9
2,680,425 UART: [art] SIG.S = B2C9F84FB465C52506F29B6049C4BF1697125C831851CD1F791908560D6F8CB198BD501617EA73D9BC8B49579FB100B0
2,704,219 UART: mbox::rt_entry...
2,704,591 UART: ____ _ _ _ ____ _____
2,705,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,943 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,479 UART: |_|
2,708,791 UART:
2,814,748 UART: [rt] Runtime listening for mailbox commands...
2,815,925 >>> mbox cmd response data (48 bytes)
2,815,926 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,816,037 UART:
2,816,053 UART: Running Caliptra ROM ...
2,816,461 UART:
2,816,516 UART: [state] CFI Enabled
2,819,380 UART: [state] LifecycleState = Unprovisioned
2,820,035 UART: [state] DebugLocked = No
2,820,757 UART: [state] WD Timer not started. Device not locked for debugging
2,822,069 UART: [kat] SHA2-256
3,625,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,629,748 UART: [kat] ++
3,629,900 UART: [kat] sha1
3,634,250 UART: [kat] SHA2-256
3,636,190 UART: [kat] SHA2-384
3,638,959 UART: [kat] SHA2-512-ACC
3,640,859 UART: [kat] ECC-384
3,650,444 UART: [kat] HMAC-384Kdf
3,654,940 UART: [kat] LMS
3,903,252 UART: [kat] --
3,903,898 UART: [update-reset] ++
5,217,760 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,218,741 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,368,607 >>> mbox cmd response: success
5,368,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,368,872 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,886 UART: [update-reset Success] --
5,378,013 UART: [state] Locking Datavault
5,379,035 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,639 UART: [state] Locking ICCM
5,380,157 UART: [exit] Launching FMC @ 0x40000130
5,385,486 UART:
5,385,502 UART: Running Caliptra FMC ...
5,385,910 UART:
5,385,964 UART: [state] CFI Enabled
5,475,159 UART: [art] Extend RT PCRs Done
5,475,587 UART: [art] Lock RT PCRs Done
5,477,116 UART: [art] Populate DV Done
5,485,421 UART: [fht] FMC Alias Private Key: 7
5,486,515 UART: [art] Derive CDI
5,486,795 UART: [art] Store in in slot 0x4
5,572,160 UART: [art] Derive Key Pair
5,572,520 UART: [art] Store priv key in slot 0x5
5,585,814 UART: [art] Derive Key Pair - Done
5,600,591 UART: [art] Signing Cert with AUTHO
5,601,071 UART: RITY.KEYID = 7
5,616,531 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,296 UART: [art] PUB.X = 773661403817261EAD8639C4FFD956D3F54C019252205253BD0685182E32B30EA68E3E37471E571797A09B0D18E7F77C
5,624,042 UART: [art] PUB.Y = 15E0D3ED40B217BE497B934DBF759DB03DB3DD27EF9F0202633D8B76CE799D4FF6E536A49F8CECB9A8D7A01D521F2216
5,631,002 UART: [art] SIG.R = 122A5F5B4A9D9A0652E389F7776D2BE24A9B70B3C5C42EE2A593C77CFD10237088CC1E46FF217A068143B4A55E13A722
5,637,770 UART: [art] SIG.S = 00D7FA34C2571D1340BFC65FA96D043B76A4BC8F1EDCF22977B35BD72214E795459D8F21CB539C6D05658F4508D02881
5,660,866 UART: Caliptra RT
5,661,120 UART: [state] CFI Enabled
5,943,604 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,467 UART: [rt]cmd =0x4d454153, len=108
5,996,418 >>> mbox cmd response data (12 bytes)
5,996,419 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,987 UART:
5,997,003 UART: Running Caliptra ROM ...
5,997,411 UART:
5,997,466 UART: [state] CFI Enabled
6,000,014 UART: [state] LifecycleState = Unprovisioned
6,000,669 UART: [state] DebugLocked = No
6,001,385 UART: [state] WD Timer not started. Device not locked for debugging
6,002,745 UART: [kat] SHA2-256
6,806,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,810,424 UART: [kat] ++
6,810,576 UART: [kat] sha1
6,814,866 UART: [kat] SHA2-256
6,816,806 UART: [kat] SHA2-384
6,819,641 UART: [kat] SHA2-512-ACC
6,821,541 UART: [kat] ECC-384
6,831,234 UART: [kat] HMAC-384Kdf
6,835,914 UART: [kat] LMS
7,084,226 UART: [kat] --
7,085,190 UART: [update-reset] ++
7,987,352 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,988,345 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,084,619 >>> mbox cmd response: success
8,084,619 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,084,916 UART: [update-reset] Copying MAN_2 To MAN_1
8,092,930 UART: [update-reset Success] --
8,093,835 UART: [state] Locking Datavault
8,094,547 UART: [state] Locking PCR0, PCR1 and PCR31
8,095,151 UART: [state] Locking ICCM
8,095,817 UART: [exit] Launching FMC @ 0x40000130
8,101,146 UART:
8,101,162 UART: Running Caliptra FMC ...
8,101,570 UART:
8,101,624 UART: [state] CFI Enabled
8,190,373 UART: [art] Extend RT PCRs Done
8,190,801 UART: [art] Lock RT PCRs Done
8,192,072 UART: [art] Populate DV Done
8,200,283 UART: [fht] FMC Alias Private Key: 7
8,201,445 UART: [art] Derive CDI
8,201,725 UART: [art] Store in in slot 0x4
8,287,108 UART: [art] Derive Key Pair
8,287,468 UART: [art] Store priv key in slot 0x5
8,301,358 UART: [art] Derive Key Pair - Done
8,316,186 UART: [art] Signing Cert with AUTHO
8,316,666 UART: RITY.KEYID = 7
8,331,962 UART: [art] Erasing AUTHORITY.KEYID = 7
8,332,727 UART: [art] PUB.X = F56A4FC5CE8CDDDF0444CCD99E7CA620E0F08C732D8EE8B4D34CF71B0D8E4203D4C5D6E0FDB7F0E2B36361E0659E1E01
8,339,509 UART: [art] PUB.Y = C571834814B11D8164199E833F6FB8468FFFC4F3B18D783DD6AE555F31AB84E1FE4F2A8BABCF3E5122A8D6CAE5F8E050
8,346,475 UART: [art] SIG.R = BC4119C0E721944F109D0AC18CF7E4162A939CBBED1FD8282380BDF3E1C1BB3AF1DE684EB30F697EF5FF8C1A06771E14
8,353,254 UART: [art] SIG.S = A03F731EC9FDAB019A32BF3C49509975CE24B9422A08328CC73CCAA4BD9EA2104EC6696C20572FFE491236F71C7FD196
8,377,167 UART: mbox::rt_entry...
8,377,539 UART: ____ _ _ _ ____ _____
8,378,323 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,379,123 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,379,891 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,380,659 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,381,427 UART: |_|
8,381,739 UART:
8,657,502 UART: [rt] Runtime listening for mailbox commands...
8,658,447 UART:
8,658,463 UART: Running Caliptra ROM ...
8,658,871 UART:
8,658,926 UART: [state] CFI Enabled
8,661,572 UART: [state] LifecycleState = Unprovisioned
8,662,227 UART: [state] DebugLocked = No
8,662,871 UART: [state] WD Timer not started. Device not locked for debugging
8,664,097 UART: [kat] SHA2-256
9,467,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,471,776 UART: [kat] ++
9,471,928 UART: [kat] sha1
9,476,118 UART: [kat] SHA2-256
9,478,058 UART: [kat] SHA2-384
9,480,815 UART: [kat] SHA2-512-ACC
9,482,715 UART: [kat] ECC-384
9,492,590 UART: [kat] HMAC-384Kdf
9,497,182 UART: [kat] LMS
9,745,494 UART: [kat] --
9,746,394 UART: [update-reset] ++
10,649,204 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,650,383 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
10,746,657 >>> mbox cmd response: success
10,746,657 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,746,890 UART: [update-reset] Copying MAN_2 To MAN_1
10,754,904 UART: [update-reset Success] --
10,755,981 UART: [state] Locking Datavault
10,756,559 UART: [state] Locking PCR0, PCR1 and PCR31
10,757,163 UART: [state] Locking ICCM
10,757,597 UART: [exit] Launching FMC @ 0x40000130
10,762,926 UART:
10,762,942 UART: Running Caliptra FMC ...
10,763,350 UART:
10,763,404 UART: [state] CFI Enabled
10,852,659 UART: [art] Extend RT PCRs Done
10,853,087 UART: [art] Lock RT PCRs Done
10,854,092 UART: [art] Populate DV Done
10,862,169 UART: [fht] FMC Alias Private Key: 7
10,863,229 UART: [art] Derive CDI
10,863,509 UART: [art] Store in in slot 0x4
10,949,310 UART: [art] Derive Key Pair
10,949,670 UART: [art] Store priv key in slot 0x5
10,962,418 UART: [art] Derive Key Pair - Done
10,977,388 UART: [art] Signing Cert with AUTHO
10,977,868 UART: RITY.KEYID = 7
10,993,002 UART: [art] Erasing AUTHORITY.KEYID = 7
10,993,767 UART: [art] PUB.X = 91001B73BE8F5754725B283788ADB7EF88AE1B46F913DD6E635690A770C974C45D717B7999F4E8F92679FD18DF247AA5
11,000,515 UART: [art] PUB.Y = 7815098AEFA8224BA40842AFDE26E645BA6C49553C437BC74A0CCBEC8F8EE2ABD86317B2C96903AAE7F1DFEEF653E740
11,007,473 UART: [art] SIG.R = F840F59A84D07129329BB23C0796BE0CE4B2882BF77EEAA29ECF3CC0DAFC60899CEDEAF9FD3416E61CF9179FA31AA617
11,014,259 UART: [art] SIG.S = 6AEA0EFBA8AEAB5D4CA1B87EFE1C191ECDF7E669FE752F61C59BC899EB3D44E45BAF8E70A6FDAA8253D34EAF9D377E91
11,038,191 UART: mbox::rt_entry...
11,038,563 UART: ____ _ _ _ ____ _____
11,039,347 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,040,147 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,040,915 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,041,683 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,042,451 UART: |_|
11,042,763 UART:
11,319,951 UART: [rt] Runtime listening for mailbox commands...
11,321,128 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,652 ready_for_fw is high
1,056,652 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,161,742 >>> mbox cmd response: success
2,161,742 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,223,548 UART:
2,223,564 UART: Running Caliptra FMC ...
2,223,972 UART:
2,224,026 UART: [state] CFI Enabled
2,234,559 UART: [fht] FMC Alias Private Key: 7
2,342,390 UART: [art] Extend RT PCRs Done
2,342,818 UART: [art] Lock RT PCRs Done
2,344,048 UART: [art] Populate DV Done
2,352,129 UART: [fht] FMC Alias Private Key: 7
2,353,199 UART: [art] Derive CDI
2,353,479 UART: [art] Store in in slot 0x4
2,439,184 UART: [art] Derive Key Pair
2,439,544 UART: [art] Store priv key in slot 0x5
2,452,982 UART: [art] Derive Key Pair - Done
2,467,698 UART: [art] Signing Cert with AUTHO
2,468,178 UART: RITY.KEYID = 7
2,483,694 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,459 UART: [art] PUB.X = C72D1F8E6C8054A0015B776707401A61160922FD02AF2A06EDFEE4CA724FB29A10E4E6FF7F8E5C5C6661C57520CF70E7
2,491,222 UART: [art] PUB.Y = ADB6BC0DA510CFA93D0698854CDFD209916BB100DF7B39657789822800E77F470ED96A2BC50850FEC5AACE68C8CDF1B5
2,498,129 UART: [art] SIG.R = FDBDD82B9B17575D7D1BA050CF387829F2897E1689E6179075C56359D898220A5112E6CEAE851CF87F3AA1ECDB04978E
2,504,899 UART: [art] SIG.S = 74A5DE6E9BB981767833ADC5BE4131F7767ADD3A34AB94FA7713C6317A57810C656355E4BD7963C66B7840D3F2D19CC0
2,528,629 UART: mbox::rt_entry...
2,529,001 UART: ____ _ _ _ ____ _____
2,529,785 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,353 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,889 UART: |_|
2,533,201 UART:
2,638,517 UART: [rt] Runtime listening for mailbox commands...
2,639,694 >>> mbox cmd response data (48 bytes)
2,639,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,071,297 >>> mbox cmd response: success
5,071,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,084,441 UART:
5,084,457 UART: Running Caliptra FMC ...
5,084,865 UART:
5,084,919 UART: [state] CFI Enabled
5,174,528 UART: [art] Extend RT PCRs Done
5,174,956 UART: [art] Lock RT PCRs Done
5,176,217 UART: [art] Populate DV Done
5,184,348 UART: [fht] FMC Alias Private Key: 7
5,185,528 UART: [art] Derive CDI
5,185,808 UART: [art] Store in in slot 0x4
5,271,777 UART: [art] Derive Key Pair
5,272,137 UART: [art] Store priv key in slot 0x5
5,284,987 UART: [art] Derive Key Pair - Done
5,299,869 UART: [art] Signing Cert with AUTHO
5,300,349 UART: RITY.KEYID = 7
5,315,403 UART: [art] Erasing AUTHORITY.KEYID = 7
5,316,168 UART: [art] PUB.X = B61BCAB31676BD043C1FB5B947014295F960E3B3C8333D84A8DCF677553C69CE0DF5B0076ECF264AC94548DAE494B2BB
5,322,938 UART: [art] PUB.Y = CAB5D2CD3A8D5C72E57D28199845038119E7573E680B1571ADA616013CED85C974B7DC1FD76E286C0F6ED1DB96A30F2A
5,329,883 UART: [art] SIG.R = D6EBDFFD66E87004312E48A452701B559A142435A72823DB30F1850822D42296B4AF5FB143B5949EF1CA44385C9E20B6
5,336,645 UART: [art] SIG.S = 1FCE9C7352666718765ADC99230CDC8E2994452A5E41ED0139240D5A26D879D596B337BFB101F449ADEFF03A6CE81356
5,359,994 UART: Caliptra RT
5,360,248 UART: [state] CFI Enabled
5,637,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,668,350 UART: [rt]cmd =0x4d454153, len=108
5,689,317 >>> mbox cmd response data (12 bytes)
5,689,318 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,659,565 >>> mbox cmd response: success
7,659,565 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,673,173 UART:
7,673,189 UART: Running Caliptra FMC ...
7,673,597 UART:
7,673,651 UART: [state] CFI Enabled
7,762,306 UART: [art] Extend RT PCRs Done
7,762,734 UART: [art] Lock RT PCRs Done
7,764,117 UART: [art] Populate DV Done
7,772,312 UART: [fht] FMC Alias Private Key: 7
7,773,488 UART: [art] Derive CDI
7,773,768 UART: [art] Store in in slot 0x4
7,859,351 UART: [art] Derive Key Pair
7,859,711 UART: [art] Store priv key in slot 0x5
7,872,975 UART: [art] Derive Key Pair - Done
7,888,067 UART: [art] Signing Cert with AUTHO
7,888,547 UART: RITY.KEYID = 7
7,903,565 UART: [art] Erasing AUTHORITY.KEYID = 7
7,904,330 UART: [art] PUB.X = 10AF127584FC398A2C8198D00B9DA8D3469A01E0217A28CB414845211F5467800F7B81C6F7A59536C3317C5438929487
7,911,077 UART: [art] PUB.Y = 7275FCAFD759550D608D4E3F0964CA83E14BD82120E51377FE4AFCF18BEDD67BB15A650F8900B0DD1AE38785B86FE44A
7,918,010 UART: [art] SIG.R = 739FBCE6C7283F25466CBFB8CD5ABBC4C6A4DB10480F0833992C7709BD42FCB66E2BD632EC86A9EC0FDED3D972FD1F6F
7,924,794 UART: [art] SIG.S = 124ACA3F7E669E2A386B020F9F172093BA0F3EC8984F826BC5A33B5B2539180ADD407318D98AADD1E5035F469CCB6D5E
7,947,948 UART: mbox::rt_entry...
7,948,320 UART: ____ _ _ _ ____ _____
7,949,104 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,949,904 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,950,672 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,951,440 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,952,208 UART: |_|
7,952,520 UART:
8,231,740 UART: [rt] Runtime listening for mailbox commands...
10,203,158 >>> mbox cmd response: success
10,203,158 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,216,412 UART:
10,216,428 UART: Running Caliptra FMC ...
10,216,836 UART:
10,216,890 UART: [state] CFI Enabled
10,306,133 UART: [art] Extend RT PCRs Done
10,306,561 UART: [art] Lock RT PCRs Done
10,307,960 UART: [art] Populate DV Done
10,316,189 UART: [fht] FMC Alias Private Key: 7
10,317,319 UART: [art] Derive CDI
10,317,599 UART: [art] Store in in slot 0x4
10,403,184 UART: [art] Derive Key Pair
10,403,544 UART: [art] Store priv key in slot 0x5
10,417,050 UART: [art] Derive Key Pair - Done
10,431,569 UART: [art] Signing Cert with AUTHO
10,432,049 UART: RITY.KEYID = 7
10,447,287 UART: [art] Erasing AUTHORITY.KEYID = 7
10,448,052 UART: [art] PUB.X = A7DD6B02FE35836D93749719D50C54A12A71026F099C2362687ADA9350CD1B2D96C8E992D3B9287C5422B645A4DA6517
10,454,806 UART: [art] PUB.Y = 316FEBD6EB123654DA728D06C9F2323F1AA18BB9F9F666F454824B3404EAF90618D223FA6589420653A614DAE0CC50B0
10,461,748 UART: [art] SIG.R = 2464AECAB990563247F29547643D48069F34619476CA90CF2A2EEB15A248DF175BA9FB6A136CC0FCE2F6646F4D1C7368
10,468,519 UART: [art] SIG.S = 225D61D079ADA0830E40272AB9654F42A33798052BEAD069750E1B0C22AB0C8983FA5C1F9E081603D76769B8A801A58A
10,492,534 UART: mbox::rt_entry...
10,492,906 UART: ____ _ _ _ ____ _____
10,493,690 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,494,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,495,258 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,496,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,496,794 UART: |_|
10,497,106 UART:
10,777,134 UART: [rt] Runtime listening for mailbox commands...
10,778,311 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.34s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,495 UART: [fwproc] Recv'd Img size: 78632 bytes
2,171,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,835 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,113 >>> mbox cmd response: success
2,310,113 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,311,226 UART: [afmc] ++
2,311,394 UART: [afmc] CDI.KEYID = 6
2,311,757 UART: [afmc] SUBJECT.KEYID = 7
2,312,183 UART: [afmc] AUTHORITY.KEYID = 5
2,347,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,305 UART: [afmc] --
2,391,283 UART: [cold-reset] --
2,392,167 UART: [state] Locking Datavault
2,393,162 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,766 UART: [state] Locking ICCM
2,394,272 UART: [exit] Launching FMC @ 0x40000130
2,399,601 UART:
2,399,617 UART: Running Caliptra FMC ...
2,400,025 UART:
2,400,168 UART: [state] CFI Enabled
2,410,961 UART: [fht] FMC Alias Private Key: 7
2,518,482 UART: [art] Extend RT PCRs Done
2,518,910 UART: [art] Lock RT PCRs Done
2,520,118 UART: [art] Populate DV Done
2,528,263 UART: [fht] FMC Alias Private Key: 7
2,529,215 UART: [art] Derive CDI
2,529,495 UART: [art] Store in in slot 0x4
2,615,148 UART: [art] Derive Key Pair
2,615,508 UART: [art] Store priv key in slot 0x5
2,629,018 UART: [art] Derive Key Pair - Done
2,643,983 UART: [art] Signing Cert with AUTHO
2,644,463 UART: RITY.KEYID = 7
2,659,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,416 UART: [art] PUB.X = 76FDC39EE5156D2AE812EAD8E0292F0BBFA8E259AC93AF9966EA63040B8801E534B85D86806AB585B8E6F71E77CBDF74
2,667,188 UART: [art] PUB.Y = 6D7F28E3B32A95711A85A52AB0F46583A37A87A0F23CE01BD0188F63CEC19B9967B87A936F3B0DD102818B54ABD828BB
2,674,140 UART: [art] SIG.R = 150CB6587D30FA5C127E78A1B2D82A8196914D4CC4D78E6F9FDE42F3762667C8D7DE047424EF2FD8D0F5C3EB0B616EB2
2,680,913 UART: [art] SIG.S = E27E4616D8D51A41B2B4155B5CE1BCD85ACB9578C1109D32D2168C6FEBD29312DBC0D9E9E661F55E66219EC639C5AB5F
2,704,498 UART: mbox::rt_entry...
2,704,870 UART: ____ _ _ _ ____ _____
2,705,654 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,454 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,222 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,990 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,758 UART: |_|
2,709,070 UART:
2,815,604 UART: [rt] Runtime listening for mailbox commands...
2,816,781 >>> mbox cmd response data (48 bytes)
2,816,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,816,893 UART:
2,816,909 UART: Running Caliptra ROM ...
2,817,317 UART:
2,817,459 UART: [state] CFI Enabled
2,820,643 UART: [state] LifecycleState = Unprovisioned
2,821,298 UART: [state] DebugLocked = No
2,821,990 UART: [state] WD Timer not started. Device not locked for debugging
2,823,238 UART: [kat] SHA2-256
3,626,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,917 UART: [kat] ++
3,631,069 UART: [kat] sha1
3,635,385 UART: [kat] SHA2-256
3,637,325 UART: [kat] SHA2-384
3,640,062 UART: [kat] SHA2-512-ACC
3,641,962 UART: [kat] ECC-384
3,651,939 UART: [kat] HMAC-384Kdf
3,656,491 UART: [kat] LMS
3,904,803 UART: [kat] --
3,905,677 UART: [update-reset] ++
5,218,071 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,200 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,369,066 >>> mbox cmd response: success
5,369,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,369,371 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,385 UART: [update-reset Success] --
5,378,436 UART: [state] Locking Datavault
5,379,246 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,850 UART: [state] Locking ICCM
5,380,456 UART: [exit] Launching FMC @ 0x40000130
5,385,785 UART:
5,385,801 UART: Running Caliptra FMC ...
5,386,209 UART:
5,386,352 UART: [state] CFI Enabled
5,475,283 UART: [art] Extend RT PCRs Done
5,475,711 UART: [art] Lock RT PCRs Done
5,477,156 UART: [art] Populate DV Done
5,485,451 UART: [fht] FMC Alias Private Key: 7
5,486,617 UART: [art] Derive CDI
5,486,897 UART: [art] Store in in slot 0x4
5,572,372 UART: [art] Derive Key Pair
5,572,732 UART: [art] Store priv key in slot 0x5
5,586,278 UART: [art] Derive Key Pair - Done
5,601,088 UART: [art] Signing Cert with AUTHO
5,601,568 UART: RITY.KEYID = 7
5,616,862 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,627 UART: [art] PUB.X = 0773E3FB4A76582BE2F4ED2538AA0224358ADD497636939390C90204CABE18955FD669A60575EC4A2CBCC6121AFF6E54
5,624,386 UART: [art] PUB.Y = 1295CC1FF321CD3D7E1FB5C23D6724CE05221BAD9DB02F44C0A5E65958E17974AF2F737890C64FAA08349AA1A30EB6F5
5,631,339 UART: [art] SIG.R = 988DEAA756E436C5A8A0FA386ED756A4DF80A7E0C26F0D113EFC146DFF656B37282DC8B46D50068A1A5C0D6ACE4A5BCC
5,638,122 UART: [art] SIG.S = 9890B0A9E939B7C9FADA28F7654FC1B33F1E7D1232EB4F117446A904B1F8D1ED16E10C398B9E8076BCDF5944A313FFB7
5,661,363 UART: Caliptra RT
5,661,709 UART: [state] CFI Enabled
5,945,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,030 UART: [rt]cmd =0x4d454153, len=108
5,996,255 >>> mbox cmd response data (12 bytes)
5,996,256 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,028 UART:
5,997,044 UART: Running Caliptra ROM ...
5,997,452 UART:
5,997,594 UART: [state] CFI Enabled
6,000,774 UART: [state] LifecycleState = Unprovisioned
6,001,429 UART: [state] DebugLocked = No
6,001,929 UART: [state] WD Timer not started. Device not locked for debugging
6,003,219 UART: [kat] SHA2-256
6,806,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,810,898 UART: [kat] ++
6,811,050 UART: [kat] sha1
6,815,150 UART: [kat] SHA2-256
6,817,090 UART: [kat] SHA2-384
6,819,863 UART: [kat] SHA2-512-ACC
6,821,763 UART: [kat] ECC-384
6,831,736 UART: [kat] HMAC-384Kdf
6,836,218 UART: [kat] LMS
7,084,530 UART: [kat] --
7,085,230 UART: [update-reset] ++
7,989,452 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,990,515 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,086,789 >>> mbox cmd response: success
8,086,789 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,087,138 UART: [update-reset] Copying MAN_2 To MAN_1
8,095,152 UART: [update-reset Success] --
8,096,345 UART: [state] Locking Datavault
8,097,073 UART: [state] Locking PCR0, PCR1 and PCR31
8,097,677 UART: [state] Locking ICCM
8,098,189 UART: [exit] Launching FMC @ 0x40000130
8,103,518 UART:
8,103,534 UART: Running Caliptra FMC ...
8,103,942 UART:
8,104,085 UART: [state] CFI Enabled
8,193,424 UART: [art] Extend RT PCRs Done
8,193,852 UART: [art] Lock RT PCRs Done
8,195,165 UART: [art] Populate DV Done
8,203,292 UART: [fht] FMC Alias Private Key: 7
8,204,352 UART: [art] Derive CDI
8,204,632 UART: [art] Store in in slot 0x4
8,290,437 UART: [art] Derive Key Pair
8,290,797 UART: [art] Store priv key in slot 0x5
8,304,147 UART: [art] Derive Key Pair - Done
8,318,886 UART: [art] Signing Cert with AUTHO
8,319,366 UART: RITY.KEYID = 7
8,334,068 UART: [art] Erasing AUTHORITY.KEYID = 7
8,334,833 UART: [art] PUB.X = 0461E9D0FDCBAE1D47E236C3ADE03316D04CE2B1A491CAAF7FFBB2758E33EEC5625C9C189AF428EEE5EF11DBD1CB96AE
8,341,632 UART: [art] PUB.Y = C89BE5FB064D2EC9EBE63AE085A379212F7878090574B79C964CE38A38FCC62A96B192C583A44665229DA2E195D7DC86
8,348,577 UART: [art] SIG.R = 69F5388F4039247B51E8EB2AB127861DCC870D931E73B32A5B441478A6797F3015353298F32FFB8FE79B3818C5DCB2E3
8,355,342 UART: [art] SIG.S = 9D7EE836A15D298F186067E8576375025D7F2DD130FAF1069C02D91C38E98DB6C4FE1955B2AA4D67052844B578EFDED2
8,378,759 UART: mbox::rt_entry...
8,379,131 UART: ____ _ _ _ ____ _____
8,379,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,380,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,381,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,382,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,383,019 UART: |_|
8,383,331 UART:
8,664,067 UART: [rt] Runtime listening for mailbox commands...
8,665,012 UART:
8,665,028 UART: Running Caliptra ROM ...
8,665,436 UART:
8,665,578 UART: [state] CFI Enabled
8,668,688 UART: [state] LifecycleState = Unprovisioned
8,669,343 UART: [state] DebugLocked = No
8,669,865 UART: [state] WD Timer not started. Device not locked for debugging
8,671,091 UART: [kat] SHA2-256
9,474,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,478,770 UART: [kat] ++
9,478,922 UART: [kat] sha1
9,483,180 UART: [kat] SHA2-256
9,485,120 UART: [kat] SHA2-384
9,487,947 UART: [kat] SHA2-512-ACC
9,489,847 UART: [kat] ECC-384
9,499,696 UART: [kat] HMAC-384Kdf
9,504,414 UART: [kat] LMS
9,752,726 UART: [kat] --
9,753,442 UART: [update-reset] ++
10,656,028 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,657,145 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
10,753,419 >>> mbox cmd response: success
10,753,419 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,753,624 UART: [update-reset] Copying MAN_2 To MAN_1
10,761,638 UART: [update-reset Success] --
10,762,743 UART: [state] Locking Datavault
10,763,441 UART: [state] Locking PCR0, PCR1 and PCR31
10,764,045 UART: [state] Locking ICCM
10,764,653 UART: [exit] Launching FMC @ 0x40000130
10,769,982 UART:
10,769,998 UART: Running Caliptra FMC ...
10,770,406 UART:
10,770,549 UART: [state] CFI Enabled
10,859,564 UART: [art] Extend RT PCRs Done
10,859,992 UART: [art] Lock RT PCRs Done
10,861,195 UART: [art] Populate DV Done
10,869,434 UART: [fht] FMC Alias Private Key: 7
10,870,486 UART: [art] Derive CDI
10,870,766 UART: [art] Store in in slot 0x4
10,956,537 UART: [art] Derive Key Pair
10,956,897 UART: [art] Store priv key in slot 0x5
10,970,463 UART: [art] Derive Key Pair - Done
10,985,013 UART: [art] Signing Cert with AUTHO
10,985,493 UART: RITY.KEYID = 7
11,001,007 UART: [art] Erasing AUTHORITY.KEYID = 7
11,001,772 UART: [art] PUB.X = DBEE5A2DBA849742F5E9D86A79500DB73B10ACA3C24DE41858BFADB226CF6188953D3EB615E00485B7ADD84697BAE9B9
11,008,554 UART: [art] PUB.Y = 12B80B3EE64AFDDCE82ADB8CC28FC35F536730D89D1684E5951EBAE1B2C321B5DFF9C3AF16301DE4B2FA06AF32C9B001
11,015,519 UART: [art] SIG.R = 0347B7E7902B430B67BADAC1B7C95F64F6459BC26BEF300C10C5D1346EA1DCC746CF8909EDF58C9AA128EF33F89C2489
11,022,291 UART: [art] SIG.S = 6D24702DCF8870329E748B7C94F97549A2CC19FA60BAAEE25EEC0DAD51DC1BFF70DFA38FE7AB6E40C23C3478CBB2D706
11,046,198 UART: mbox::rt_entry...
11,046,570 UART: ____ _ _ _ ____ _____
11,047,354 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,048,154 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,048,922 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,049,690 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,050,458 UART: |_|
11,050,770 UART:
11,332,752 UART: [rt] Runtime listening for mailbox commands...
11,333,929 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,083 ready_for_fw is high
1,056,083 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,159,579 >>> mbox cmd response: success
2,159,579 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,222,275 UART:
2,222,291 UART: Running Caliptra FMC ...
2,222,699 UART:
2,222,842 UART: [state] CFI Enabled
2,233,181 UART: [fht] FMC Alias Private Key: 7
2,341,724 UART: [art] Extend RT PCRs Done
2,342,152 UART: [art] Lock RT PCRs Done
2,343,618 UART: [art] Populate DV Done
2,351,913 UART: [fht] FMC Alias Private Key: 7
2,352,917 UART: [art] Derive CDI
2,353,197 UART: [art] Store in in slot 0x4
2,438,970 UART: [art] Derive Key Pair
2,439,330 UART: [art] Store priv key in slot 0x5
2,452,556 UART: [art] Derive Key Pair - Done
2,467,433 UART: [art] Signing Cert with AUTHO
2,467,913 UART: RITY.KEYID = 7
2,482,897 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,662 UART: [art] PUB.X = A86227889F0F200CF8FDBDBE753CDF7359409441CDE4545E1FDF6185CF03ED86380FD5DBDD00701C97414BE3BAF6F083
2,490,412 UART: [art] PUB.Y = 8A058703668A27F388C6AEBE9EC46222C11928D60FA3B9C2D6BFAEF965E4A544278B2EEEF6181B5FF886496B037CBB9F
2,497,362 UART: [art] SIG.R = 3CC98BA603AFE875D7D8AB6990F7027BE9CC25096D7AB2115D7EC8913299543CD76EB3262D4E1ABD492692F0C70EB03F
2,504,130 UART: [art] SIG.S = 1CDD7DE480039B28827E12DB0CD79AF25D5A7CF3A2C235C1CB4A7BB74C66EFD6EBBAEFDFD1EAAA5E18390497A3FA915D
2,528,224 UART: mbox::rt_entry...
2,528,596 UART: ____ _ _ _ ____ _____
2,529,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,716 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,484 UART: |_|
2,532,796 UART:
2,638,992 UART: [rt] Runtime listening for mailbox commands...
2,640,169 >>> mbox cmd response data (48 bytes)
2,640,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,072,449 >>> mbox cmd response: success
5,072,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,086,107 UART:
5,086,123 UART: Running Caliptra FMC ...
5,086,531 UART:
5,086,674 UART: [state] CFI Enabled
5,175,891 UART: [art] Extend RT PCRs Done
5,176,319 UART: [art] Lock RT PCRs Done
5,177,542 UART: [art] Populate DV Done
5,185,899 UART: [fht] FMC Alias Private Key: 7
5,187,055 UART: [art] Derive CDI
5,187,335 UART: [art] Store in in slot 0x4
5,273,136 UART: [art] Derive Key Pair
5,273,496 UART: [art] Store priv key in slot 0x5
5,287,066 UART: [art] Derive Key Pair - Done
5,302,095 UART: [art] Signing Cert with AUTHO
5,302,575 UART: RITY.KEYID = 7
5,317,467 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,232 UART: [art] PUB.X = 26DACDF6D32F311643F0A1CDE969F91B34A83B05C1467196AEB4B21D3715E44E91AA49527662BEF8CB8B85295DB8E6AA
5,325,011 UART: [art] PUB.Y = 358BA37BFB2D68CEBF7ADB301C0DE0CFFA8D55074D36672AEC944FF8C37DF5CC412E2AC12B12B3BBFA952E5D704D2E16
5,331,983 UART: [art] SIG.R = 85CEC8021841DAFF24D73FE432BC66291B73FB30EB4F3B1BB180172C809956154F8E1CE8A5E39C585D2376C47CB6DDFF
5,338,762 UART: [art] SIG.S = C95054432A273A7694E0FBF3DC3C4B92F0BE5258DDAD2E8A826F680AE1C2684C417649E69B436D3021A5E713EE99F10E
5,362,885 UART: Caliptra RT
5,363,231 UART: [state] CFI Enabled
5,646,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,676,926 UART: [rt]cmd =0x4d454153, len=108
5,697,881 >>> mbox cmd response data (12 bytes)
5,697,882 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,669,632 >>> mbox cmd response: success
7,669,632 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,683,236 UART:
7,683,252 UART: Running Caliptra FMC ...
7,683,660 UART:
7,683,803 UART: [state] CFI Enabled
7,772,948 UART: [art] Extend RT PCRs Done
7,773,376 UART: [art] Lock RT PCRs Done
7,774,697 UART: [art] Populate DV Done
7,782,896 UART: [fht] FMC Alias Private Key: 7
7,783,942 UART: [art] Derive CDI
7,784,222 UART: [art] Store in in slot 0x4
7,869,693 UART: [art] Derive Key Pair
7,870,053 UART: [art] Store priv key in slot 0x5
7,883,901 UART: [art] Derive Key Pair - Done
7,898,804 UART: [art] Signing Cert with AUTHO
7,899,284 UART: RITY.KEYID = 7
7,914,472 UART: [art] Erasing AUTHORITY.KEYID = 7
7,915,237 UART: [art] PUB.X = 065F4B09EC212971BD11999AED89DC1E4314BEFBEC28D51BC3A2B5AABE88A5C1B5D3B81D677AB6C956D7089E6D422F69
7,922,016 UART: [art] PUB.Y = 89C888E387BE22400217AD36AE4393B8A306C619EFC69C2700CECE2EAA0021CE76329B3EF0D19476B19AFF32F006CAEE
7,928,925 UART: [art] SIG.R = A2B8966B408095C1AAF0E15C0F271729DA1DE63175629561448BEAA398345AB50F1E78E4ED31D01143A23FC8B393C445
7,935,689 UART: [art] SIG.S = 8FCC9633A776F57E84557127EF0BF23382FF0FD72B3899F60523CBC93A7EAF4F29A5568CCF724F254030D25BA9A11394
7,959,443 UART: mbox::rt_entry...
7,959,815 UART: ____ _ _ _ ____ _____
7,960,599 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,961,399 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,962,167 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,962,935 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,963,703 UART: |_|
7,964,015 UART:
8,244,460 UART: [rt] Runtime listening for mailbox commands...
10,216,391 >>> mbox cmd response: success
10,216,391 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,229,907 UART:
10,229,923 UART: Running Caliptra FMC ...
10,230,331 UART:
10,230,474 UART: [state] CFI Enabled
10,319,813 UART: [art] Extend RT PCRs Done
10,320,241 UART: [art] Lock RT PCRs Done
10,321,780 UART: [art] Populate DV Done
10,329,825 UART: [fht] FMC Alias Private Key: 7
10,330,891 UART: [art] Derive CDI
10,331,171 UART: [art] Store in in slot 0x4
10,416,628 UART: [art] Derive Key Pair
10,416,988 UART: [art] Store priv key in slot 0x5
10,430,506 UART: [art] Derive Key Pair - Done
10,445,183 UART: [art] Signing Cert with AUTHO
10,445,663 UART: RITY.KEYID = 7
10,460,605 UART: [art] Erasing AUTHORITY.KEYID = 7
10,461,370 UART: [art] PUB.X = E5019849B4EFB1630ABD5A9203AAFEA666C0D5234B7005BC2FAB65B3D0B6DC4DA86DBEFC6597DA8BB7E2CC89EAA78DE3
10,468,158 UART: [art] PUB.Y = 7835D991C7B878AA0133D9EEB1B1A1801D0F61CE99D67C006EC818ECDF5F135B45F79488191725ECF2437825956C61C8
10,475,080 UART: [art] SIG.R = 3CD5BF9E629227FADB36167CC1108B5E8AED266EA695EEF5109AA006189EB7416D1D4EF25DE655EED9AAB6213A9CD6E7
10,481,867 UART: [art] SIG.S = ACC684401BB645AE5D079C9F2BD67D5259C358E8E0D1B1B16A56D2915FB906E54B753BE250F9FB0737BFA87041173828
10,505,145 UART: mbox::rt_entry...
10,505,517 UART: ____ _ _ _ ____ _____
10,506,301 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,507,101 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,507,869 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,508,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,509,405 UART: |_|
10,509,717 UART:
10,788,431 UART: [rt] Runtime listening for mailbox commands...
10,789,608 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 3.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
192,522 UART:
192,906 UART: Running Caliptra ROM ...
194,090 UART:
194,242 UART: [state] CFI Enabled
264,705 UART: [state] LifecycleState = Unprovisioned
266,619 UART: [state] DebugLocked = No
268,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,078 UART: [kat] SHA2-256
442,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,234 UART: [kat] ++
453,774 UART: [kat] sha1
465,562 UART: [kat] SHA2-256
468,200 UART: [kat] SHA2-384
472,935 UART: [kat] SHA2-512-ACC
475,337 UART: [kat] ECC-384
2,766,338 UART: [kat] HMAC-384Kdf
2,778,785 UART: [kat] LMS
3,969,091 UART: [kat] --
3,974,797 UART: [cold-reset] ++
3,977,358 UART: [fht] Storing FHT @ 0x50003400
3,988,058 UART: [idev] ++
3,988,615 UART: [idev] CDI.KEYID = 6
3,989,585 UART: [idev] SUBJECT.KEYID = 7
3,990,926 UART: [idev] UDS.KEYID = 0
3,991,972 ready_for_fw is high
3,992,161 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,393 UART: [idev] Erasing UDS.KEYID = 0
7,325,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,003 UART: [idev] --
7,350,977 UART: [ldev] ++
7,351,575 UART: [ldev] CDI.KEYID = 6
7,352,481 UART: [ldev] SUBJECT.KEYID = 5
7,353,693 UART: [ldev] AUTHORITY.KEYID = 7
7,354,973 UART: [ldev] FE.KEYID = 1
7,401,933 UART: [ldev] Erasing FE.KEYID = 1
10,732,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,559 UART: [ldev] --
13,096,897 UART: [fwproc] Waiting for Commands...
13,098,764 UART: [fwproc] Received command 0x46574c44
13,100,948 UART: [fwproc] Received Image of size 114036 bytes
17,158,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,620,772 >>> mbox cmd response: success
17,625,411 UART: [afmc] ++
17,626,009 UART: [afmc] CDI.KEYID = 6
17,626,890 UART: [afmc] SUBJECT.KEYID = 7
17,628,158 UART: [afmc] AUTHORITY.KEYID = 5
20,987,323 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,864 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,263 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,130 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,524 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,542 UART: [afmc] --
23,356,738 UART: [cold-reset] --
23,361,945 UART: [state] Locking Datavault
23,366,159 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,902 UART: [state] Locking ICCM
23,369,226 UART: [exit] Launching FMC @ 0x40000130
23,377,618 UART:
23,377,854 UART: Running Caliptra FMC ...
23,378,882 UART:
23,379,021 UART: [state] CFI Enabled
23,446,779 UART: [fht] FMC Alias Private Key: 7
25,784,248 UART: [art] Extend RT PCRs Done
25,785,500 UART: [art] Lock RT PCRs Done
25,786,912 UART: [art] Populate DV Done
25,792,426 UART: [fht] FMC Alias Private Key: 7
25,793,955 UART: [art] Derive CDI
25,794,762 UART: [art] Store in in slot 0x4
25,854,830 UART: [art] Derive Key Pair
25,855,867 UART: [art] Store priv key in slot 0x5
29,148,581 UART: [art] Derive Key Pair - Done
29,161,578 UART: [art] Signing Cert with AUTHO
29,162,891 UART: RITY.KEYID = 7
31,449,809 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,316 UART: [art] PUB.X = E6B3667D2793FD326A9A8295B690F8C47D8776D9384857C0A41DACE5A0C5D1A1178E5808B08431BB9384E4931CFCC257
31,458,528 UART: [art] PUB.Y = 2B41F52D619C99B5D038F1F693BB14E3E501E1D9117272B62C79E22CA830F84DCF15B806D7CE342D36A427991D5E0CA2
31,465,829 UART: [art] SIG.R = 4BA5AD360D72A257A3BBDEB5691366C59FCE70402C962B886EDBF0F0BFDF163A6BEB70E0ED624591FAC8B1F3CDBC9D20
31,473,192 UART: [art] SIG.S = FBE3EB7FC6EA15D41B9DD2FE2EED3B0712A7920312A7CBEE3C6BA238943D58E640679E27E1FC4BB191696D330E16EC65
32,778,500 UART: Caliptra RT
32,779,200 UART: [state] CFI Enabled
32,939,464 UART: [rt] RT listening for mailbox commands...
32,941,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,972,441 UART: [rt]cmd =0x4d454153, len=108
32,990,871 >>> mbox cmd response data (12 bytes)
35,044,924 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,145,777 UART:
35,146,148 UART: Running Caliptra ROM ...
35,147,274 UART:
35,147,439 UART: [state] CFI Enabled
35,202,279 UART: [state] LifecycleState = Unprovisioned
35,204,211 UART: [state] DebugLocked = No
35,205,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,209,578 UART: [kat] SHA2-256
35,379,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,389,761 UART: [kat] ++
35,390,209 UART: [kat] sha1
35,401,194 UART: [kat] SHA2-256
35,403,880 UART: [kat] SHA2-384
35,411,424 UART: [kat] SHA2-512-ACC
35,413,764 UART: [kat] ECC-384
37,706,554 UART: [kat] HMAC-384Kdf
37,737,907 UART: [kat] LMS
38,928,234 UART: [kat] --
38,931,410 UART: [update-reset] ++
42,639,465 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,643,468 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,901,645 >>> mbox cmd response: success
42,902,082 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,903,450 UART: [update-reset] Copying MAN_2 To MAN_1
42,925,888 UART: [update-reset Success] --
42,930,273 UART: [state] Locking Datavault
42,933,730 UART: [state] Locking PCR0, PCR1 and PCR31
42,935,478 UART: [state] Locking ICCM
42,937,087 UART: [exit] Launching FMC @ 0x40000130
42,945,534 UART:
42,945,770 UART: Running Caliptra FMC ...
42,946,885 UART:
42,947,036 UART: [state] CFI Enabled
43,040,275 UART: [art] Extend RT PCRs Done
43,041,459 UART: [art] Lock RT PCRs Done
43,042,800 UART: [art] Populate DV Done
43,048,147 UART: [fht] FMC Alias Private Key: 7
43,049,637 UART: [art] Derive CDI
43,050,400 UART: [art] Store in in slot 0x4
43,109,516 UART: [art] Derive Key Pair
43,110,708 UART: [art] Store priv key in slot 0x5
46,403,621 UART: [art] Derive Key Pair - Done
46,416,888 UART: [art] Signing Cert with AUTHO
46,418,183 UART: RITY.KEYID = 7
48,704,571 UART: [art] Erasing AUTHORITY.KEYID = 7
48,706,069 UART: [art] PUB.X = 68E1670DC785D75D3FBD03172DA3A83B09985A2433DC095970DB0AA96E0D95432DBA64979DB803A3F46E32F45635453F
48,713,337 UART: [art] PUB.Y = 28FE24D83DE158A247981A4D009D4C1461D1C46F512480E30722D48A3B0CC1AA19DA08A215F17B1F933D260615264F42
48,720,535 UART: [art] SIG.R = 520C879D4ED3511D96E9BBB68853DDA25B6D949B3FF6FBD0F8E1E9EED53462717C0E32CA397A8A4E47A1B59EDF73805D
48,727,970 UART: [art] SIG.S = 1D1A5A4B428BC7C2BF394C1AE03A4619B102874DED65439DAFD70146F298390195D25E073435CC2F565F49201FDD0601
50,033,836 UART: mbox::rt_entry...
50,034,799 UART: ____ _ _ _ ____ _____
50,036,774 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,038,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,040,612 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,042,460 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,044,376 UART: |_|
50,045,177 UART:
50,329,791 UART: [rt] Runtime listening for mailbox commands...
50,331,902 >>> mbox cmd response data (48 bytes)
50,332,466 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,334,779 >>> mbox cmd response data (48 bytes)
50,335,681 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,349,511 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
3,804,216 ready_for_fw is high
3,804,606 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,877,841 >>> mbox cmd response: success
23,597,847 UART:
23,598,241 UART: Running Caliptra FMC ...
23,599,373 UART:
23,599,526 UART: [state] CFI Enabled
23,670,776 UART: [fht] FMC Alias Private Key: 7
26,008,590 UART: [art] Extend RT PCRs Done
26,009,828 UART: [art] Lock RT PCRs Done
26,011,403 UART: [art] Populate DV Done
26,016,770 UART: [fht] FMC Alias Private Key: 7
26,018,308 UART: [art] Derive CDI
26,019,117 UART: [art] Store in in slot 0x4
26,078,543 UART: [art] Derive Key Pair
26,079,587 UART: [art] Store priv key in slot 0x5
29,372,889 UART: [art] Derive Key Pair - Done
29,385,836 UART: [art] Signing Cert with AUTHO
29,387,182 UART: RITY.KEYID = 7
31,673,608 UART: [art] Erasing AUTHORITY.KEYID = 7
31,675,115 UART: [art] PUB.X = EA6F9EBEAAA70D75CB2308FD9A372C0A002CEB5A11744DD2BF782205ADD4A4B21BB957E78A064238B45B97FCF206EF32
31,682,328 UART: [art] PUB.Y = 44383A14C7CB2CB6476F8026078FD56B5F4827C979F10A575EC6811254924406C800FD094D7F9D98FE8F99E934AB195B
31,689,577 UART: [art] SIG.R = E6B94C2F47708AFC857F55C3FC89E4CD9E6BF022A47EE962F6C9D56B047A8C6CDD3972E0704DF43294D78E734362B8BB
31,697,022 UART: [art] SIG.S = 2F8B5DD7A1946E9D240829866CE13C21E09FB82D5AAD344DD1A4A757B2CB540015D45846B6B6639D95101AD4D2DB0E99
33,001,862 UART: Caliptra RT
33,002,582 UART: [state] CFI Enabled
33,163,437 UART: [rt] RT listening for mailbox commands...
33,165,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,196,403 UART: [rt]cmd =0x4d454153, len=108
33,214,806 >>> mbox cmd response data (12 bytes)
35,266,817 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,235,549 >>> mbox cmd response: success
43,236,043 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,271,646 UART:
43,271,922 UART: Running Caliptra FMC ...
43,272,970 UART:
43,273,114 UART: [state] CFI Enabled
43,370,713 UART: [art] Extend RT PCRs Done
43,371,901 UART: [art] Lock RT PCRs Done
43,373,413 UART: [art] Populate DV Done
43,378,983 UART: [fht] FMC Alias Private Key: 7
43,380,746 UART: [art] Derive CDI
43,381,601 UART: [art] Store in in slot 0x4
43,440,069 UART: [art] Derive Key Pair
43,441,068 UART: [art] Store priv key in slot 0x5
46,733,278 UART: [art] Derive Key Pair - Done
46,746,051 UART: [art] Signing Cert with AUTHO
46,747,377 UART: RITY.KEYID = 7
49,035,842 UART: [art] Erasing AUTHORITY.KEYID = 7
49,037,357 UART: [art] PUB.X = B2CCE7AE73C5263E8D9AAAC02FD5E436C2D8295A43C11718ECAD693C890C106B07699E9C2E67A29E98B375D33010AB40
49,044,594 UART: [art] PUB.Y = 2A00AF16001473773AB05CCB1B3F07BF1A84F10DB0EE5BAFBB251DC71886E06B16F37B26738A5FAED3D5AE2511FC7805
49,051,827 UART: [art] SIG.R = 554051D1345048967F4F1C2E0F81440F0198504009552A6110587B2BE2E3C00F8404C48BC9F5063699D95DDD7B991C0B
49,059,157 UART: [art] SIG.S = 5141A10452469F920CEDA05658B2B239509EF555C994C794AFF4B1AB542522040F91E7F2296BDE085A6A65898A552C0B
50,364,159 UART: mbox::rt_entry...
50,365,121 UART: ____ _ _ _ ____ _____
50,367,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,369,102 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,371,025 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,372,949 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,374,870 UART: |_|
50,375,668 UART:
50,659,066 UART: [rt] Runtime listening for mailbox commands...
50,661,267 >>> mbox cmd response data (48 bytes)
50,661,820 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,664,141 >>> mbox cmd response data (48 bytes)
50,665,030 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,679,057 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,460 UART:
192,845 UART: Running Caliptra ROM ...
193,979 UART:
603,603 UART: [state] CFI Enabled
617,346 UART: [state] LifecycleState = Unprovisioned
619,296 UART: [state] DebugLocked = No
622,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,489 UART: [kat] SHA2-256
796,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,846 UART: [kat] ++
807,320 UART: [kat] sha1
817,908 UART: [kat] SHA2-256
820,647 UART: [kat] SHA2-384
827,347 UART: [kat] SHA2-512-ACC
829,710 UART: [kat] ECC-384
3,115,247 UART: [kat] HMAC-384Kdf
3,126,857 UART: [kat] LMS
4,317,001 UART: [kat] --
4,322,028 UART: [cold-reset] ++
4,324,391 UART: [fht] Storing FHT @ 0x50003400
4,336,761 UART: [idev] ++
4,337,378 UART: [idev] CDI.KEYID = 6
4,338,297 UART: [idev] SUBJECT.KEYID = 7
4,339,474 UART: [idev] UDS.KEYID = 0
4,340,540 ready_for_fw is high
4,340,766 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,895 UART: [idev] Erasing UDS.KEYID = 0
7,629,718 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,197 UART: [idev] --
7,655,727 UART: [ldev] ++
7,656,348 UART: [ldev] CDI.KEYID = 6
7,657,287 UART: [ldev] SUBJECT.KEYID = 5
7,658,519 UART: [ldev] AUTHORITY.KEYID = 7
7,659,673 UART: [ldev] FE.KEYID = 1
7,672,718 UART: [ldev] Erasing FE.KEYID = 1
10,954,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,005 UART: [ldev] --
13,312,922 UART: [fwproc] Waiting for Commands...
13,315,066 UART: [fwproc] Received command 0x46574c44
13,317,248 UART: [fwproc] Received Image of size 114036 bytes
17,373,839 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,158 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,840,684 >>> mbox cmd response: success
17,845,755 UART: [afmc] ++
17,846,349 UART: [afmc] CDI.KEYID = 6
17,847,453 UART: [afmc] SUBJECT.KEYID = 7
17,848,508 UART: [afmc] AUTHORITY.KEYID = 5
21,162,046 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,129 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,514 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,382 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,801 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,887 UART: [afmc] --
23,527,185 UART: [cold-reset] --
23,529,303 UART: [state] Locking Datavault
23,536,446 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,196 UART: [state] Locking ICCM
23,540,940 UART: [exit] Launching FMC @ 0x40000130
23,549,296 UART:
23,549,536 UART: Running Caliptra FMC ...
23,550,643 UART:
23,550,800 UART: [state] CFI Enabled
23,558,898 UART: [fht] FMC Alias Private Key: 7
25,889,168 UART: [art] Extend RT PCRs Done
25,890,379 UART: [art] Lock RT PCRs Done
25,891,627 UART: [art] Populate DV Done
25,897,416 UART: [fht] FMC Alias Private Key: 7
25,899,010 UART: [art] Derive CDI
25,899,827 UART: [art] Store in in slot 0x4
25,942,529 UART: [art] Derive Key Pair
25,943,569 UART: [art] Store priv key in slot 0x5
29,185,172 UART: [art] Derive Key Pair - Done
29,197,895 UART: [art] Signing Cert with AUTHO
29,199,192 UART: RITY.KEYID = 7
31,478,354 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,874 UART: [art] PUB.X = 4756CDF5A252FF67B6EA1F010CBC91C5397E34753764C676D7D9FA2016286AED4567CE53BE150E1100F1F50CF9AF31CE
31,487,087 UART: [art] PUB.Y = 7D1887CDCB48531D8039D406F3A520E5F91ED397D92173B2E1EA647323E4687F8E37ADF413B7A87742E3823A120150CA
31,494,335 UART: [art] SIG.R = 89358000B6767A23E14A1202ECF20DA08553601CC978E7D88A3431FFB24B658A205498D9E39700C9EB2A49EDEC5B96AE
31,501,685 UART: [art] SIG.S = D723E7276604D93F6A7BF49D59373D4B97D2560E2FB1317A0019B446D84667F196957829603D01C0F526475C391C37EB
32,806,638 UART: Caliptra RT
32,807,485 UART: [state] CFI Enabled
32,925,036 UART: [rt] RT listening for mailbox commands...
32,927,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,958,034 UART: [rt]cmd =0x4d454153, len=108
32,976,798 >>> mbox cmd response data (12 bytes)
35,030,499 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,131,211 UART:
35,131,564 UART: Running Caliptra ROM ...
35,132,691 UART:
35,132,861 UART: [state] CFI Enabled
35,144,641 UART: [state] LifecycleState = Unprovisioned
35,146,583 UART: [state] DebugLocked = No
35,148,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,153,393 UART: [kat] SHA2-256
35,323,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,333,631 UART: [kat] ++
35,334,171 UART: [kat] sha1
35,344,846 UART: [kat] SHA2-256
35,347,580 UART: [kat] SHA2-384
35,352,909 UART: [kat] SHA2-512-ACC
35,355,313 UART: [kat] ECC-384
37,639,139 UART: [kat] HMAC-384Kdf
37,650,039 UART: [kat] LMS
38,840,086 UART: [kat] --
38,845,343 UART: [update-reset] ++
42,551,114 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,554,900 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,813,106 >>> mbox cmd response: success
42,813,459 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,814,281 UART: [update-reset] Copying MAN_2 To MAN_1
42,836,713 UART: [update-reset Success] --
42,841,536 UART: [state] Locking Datavault
42,846,241 UART: [state] Locking PCR0, PCR1 and PCR31
42,847,995 UART: [state] Locking ICCM
42,849,874 UART: [exit] Launching FMC @ 0x40000130
42,858,270 UART:
42,858,503 UART: Running Caliptra FMC ...
42,859,603 UART:
42,859,778 UART: [state] CFI Enabled
42,904,496 UART: [art] Extend RT PCRs Done
42,905,679 UART: [art] Lock RT PCRs Done
42,906,994 UART: [art] Populate DV Done
42,912,399 UART: [fht] FMC Alias Private Key: 7
42,914,139 UART: [art] Derive CDI
42,914,872 UART: [art] Store in in slot 0x4
42,957,676 UART: [art] Derive Key Pair
42,958,671 UART: [art] Store priv key in slot 0x5
46,201,047 UART: [art] Derive Key Pair - Done
46,214,216 UART: [art] Signing Cert with AUTHO
46,215,526 UART: RITY.KEYID = 7
48,495,581 UART: [art] Erasing AUTHORITY.KEYID = 7
48,497,083 UART: [art] PUB.X = 5B759D9A67F39FE3A58637FAC9D60121A03F2147B390C126331E033669DF16F1CA00807832862150C17E50E6EAFA28CB
48,504,337 UART: [art] PUB.Y = E612C015696E1471BA686AB4150FBCDFAA61A30FD14B6B1CA0D57AF7C2389DD30545BD94F9BA7E72D470AFF0B9CF5A8B
48,511,630 UART: [art] SIG.R = 3A3AFC1555ABCBDFB7266C18D749DCEF66EB7AF6A8CE62F3F4CCBD166BA3D71E32F34D569CA6945A87FE59521C66ADDC
48,519,039 UART: [art] SIG.S = BB030C9E5BB13B47D32AB9E7F41DA3C8C5CCBDF1DB0BAA008AD1FEF679DA7A4D0226378C78014F82D01621A06624813C
49,823,802 UART: mbox::rt_entry...
49,824,755 UART: ____ _ _ _ ____ _____
49,826,731 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,828,738 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,830,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,832,593 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,834,519 UART: |_|
49,835,327 UART:
50,116,311 UART: [rt] Runtime listening for mailbox commands...
50,118,415 >>> mbox cmd response data (48 bytes)
50,118,984 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,121,297 >>> mbox cmd response data (48 bytes)
50,122,189 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,136,024 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,125,821 ready_for_fw is high
4,126,394 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,070,491 >>> mbox cmd response: success
23,717,194 UART:
23,717,596 UART: Running Caliptra FMC ...
23,718,731 UART:
23,718,886 UART: [state] CFI Enabled
23,726,468 UART: [fht] FMC Alias Private Key: 7
26,057,122 UART: [art] Extend RT PCRs Done
26,058,344 UART: [art] Lock RT PCRs Done
26,060,190 UART: [art] Populate DV Done
26,065,722 UART: [fht] FMC Alias Private Key: 7
26,067,269 UART: [art] Derive CDI
26,068,034 UART: [art] Store in in slot 0x4
26,111,002 UART: [art] Derive Key Pair
26,112,049 UART: [art] Store priv key in slot 0x5
29,354,428 UART: [art] Derive Key Pair - Done
29,367,265 UART: [art] Signing Cert with AUTHO
29,368,571 UART: RITY.KEYID = 7
31,648,111 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,646 UART: [art] PUB.X = F4859B02B31BC412158470FECDDAAFF9B74A0E3DA6A187D839205DE6129CC8744FA0C34AA1A2B3A16414A27BB4BD60D8
31,656,870 UART: [art] PUB.Y = EB2DCEFD0017C8C3BFF13339D9B073412EC08A16B9FCCDDCF319E6CA4B29609EF6E569A853E47D55EC67EECF8693D4B0
31,664,174 UART: [art] SIG.R = 63CCF7B6388F383A5655CE887B0638D4D3FE218449DBD9EEF17B9789C73D837F7167799F042A22888995F78F246E7612
31,671,576 UART: [art] SIG.S = 5A7F8DB17AACCFA3B21586B5D9BA413E970BBD675C2244474839A81D17DB2C526242EE27ED2AF9B5BF9551850DB9ECCE
32,976,277 UART: Caliptra RT
32,976,990 UART: [state] CFI Enabled
33,095,302 UART: [rt] RT listening for mailbox commands...
33,097,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,128,226 UART: [rt]cmd =0x4d454153, len=108
33,147,316 >>> mbox cmd response data (12 bytes)
35,200,019 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,085,149 >>> mbox cmd response: success
43,085,738 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,121,475 UART:
43,121,799 UART: Running Caliptra FMC ...
43,122,870 UART:
43,123,019 UART: [state] CFI Enabled
43,167,153 UART: [art] Extend RT PCRs Done
43,168,310 UART: [art] Lock RT PCRs Done
43,169,999 UART: [art] Populate DV Done
43,175,577 UART: [fht] FMC Alias Private Key: 7
43,177,276 UART: [art] Derive CDI
43,178,011 UART: [art] Store in in slot 0x4
43,220,621 UART: [art] Derive Key Pair
43,221,657 UART: [art] Store priv key in slot 0x5
46,464,021 UART: [art] Derive Key Pair - Done
46,477,299 UART: [art] Signing Cert with AUTHO
46,478,639 UART: RITY.KEYID = 7
48,758,110 UART: [art] Erasing AUTHORITY.KEYID = 7
48,759,615 UART: [art] PUB.X = 7FCFDDEAB63334D8DB6CAD4E61FBC8763458E490BDCD124A8D9FFE5EB9C57B5C56DA0B68AE4911744B6F3FACF883ACEE
48,766,883 UART: [art] PUB.Y = 69385052A2DAB3A6203F2A0BF6A5E2CB217576BBE99552D51624966739AD591CFB71A955B7ACD834BC3F4EFB27F87198
48,774,142 UART: [art] SIG.R = 11E1464E52322DF37EC4583F8625BA99F77440225D5F0DC325EBF1BDC5F0F04E4711ED3D1ECAAD0BAF32FA9842078635
48,781,521 UART: [art] SIG.S = EED32FD67BECF77B839B1351F112E673F059929631DDC04D188495507465C925052AC5B24D77B8B030D45C81237C7794
50,086,452 UART: mbox::rt_entry...
50,087,411 UART: ____ _ _ _ ____ _____
50,089,346 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,091,351 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,093,210 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,095,139 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,097,021 UART: |_|
50,097,908 UART:
50,381,865 UART: [rt] Runtime listening for mailbox commands...
50,383,975 >>> mbox cmd response data (48 bytes)
50,384,533 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,386,867 >>> mbox cmd response data (48 bytes)
50,387,755 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,401,613 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,436 UART:
192,828 UART: Running Caliptra ROM ...
194,020 UART:
194,181 UART: [state] CFI Enabled
263,922 UART: [state] LifecycleState = Unprovisioned
265,830 UART: [state] DebugLocked = No
268,323 UART: [state] WD Timer not started. Device not locked for debugging
271,654 UART: [kat] SHA2-256
450,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,323 UART: [kat] ++
462,861 UART: [kat] sha1
473,297 UART: [kat] SHA2-256
476,381 UART: [kat] SHA2-384
482,870 UART: [kat] SHA2-512-ACC
485,808 UART: [kat] ECC-384
2,933,594 UART: [kat] HMAC-384Kdf
2,955,984 UART: [kat] LMS
3,485,444 UART: [kat] --
3,488,046 UART: [cold-reset] ++
3,490,059 UART: [fht] FHT @ 0x50003400
3,501,473 UART: [idev] ++
3,502,037 UART: [idev] CDI.KEYID = 6
3,502,962 UART: [idev] SUBJECT.KEYID = 7
3,504,137 UART: [idev] UDS.KEYID = 0
3,505,185 ready_for_fw is high
3,505,385 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,649,226 UART: [idev] Erasing UDS.KEYID = 0
6,014,682 UART: [idev] Sha1 KeyId Algorithm
6,038,091 UART: [idev] --
6,040,662 UART: [ldev] ++
6,041,251 UART: [ldev] CDI.KEYID = 6
6,042,138 UART: [ldev] SUBJECT.KEYID = 5
6,043,268 UART: [ldev] AUTHORITY.KEYID = 7
6,044,629 UART: [ldev] FE.KEYID = 1
6,085,334 UART: [ldev] Erasing FE.KEYID = 1
8,589,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,033 UART: [ldev] --
10,398,893 UART: [fwproc] Wait for Commands...
10,400,986 UART: [fwproc] Recv command 0x46574c44
10,403,080 UART: [fwproc] Recv'd Img size: 114360 bytes
13,807,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,269,299 >>> mbox cmd response: success
14,272,752 UART: [afmc] ++
14,273,372 UART: [afmc] CDI.KEYID = 6
14,274,291 UART: [afmc] SUBJECT.KEYID = 7
14,275,335 UART: [afmc] AUTHORITY.KEYID = 5
16,813,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,568 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,236 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,762 UART: [afmc] --
18,611,365 UART: [cold-reset] --
18,613,874 UART: [state] Locking Datavault
18,618,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,691 UART: [state] Locking ICCM
18,620,976 UART: [exit] Launching FMC @ 0x40000130
18,629,370 UART:
18,629,636 UART: Running Caliptra FMC ...
18,630,741 UART:
18,630,904 UART: [state] CFI Enabled
18,693,695 UART: [fht] FMC Alias Private Key: 7
20,457,681 UART: [art] Extend RT PCRs Done
20,458,908 UART: [art] Lock RT PCRs Done
20,460,346 UART: [art] Populate DV Done
20,465,924 UART: [fht] FMC Alias Private Key: 7
20,467,618 UART: [art] Derive CDI
20,468,351 UART: [art] Store in in slot 0x4
20,526,475 UART: [art] Derive Key Pair
20,527,516 UART: [art] Store priv key in slot 0x5
22,990,360 UART: [art] Derive Key Pair - Done
23,003,031 UART: [art] Signing Cert with AUTHO
23,004,346 UART: RITY.KEYID = 7
24,715,992 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,519 UART: [art] PUB.X = 8F11156394B8D0A8BEC6132F0285E82DA82BD96F4E37121EF93D38A515A68CAFE05C2690F6C41B28112903CAFE017679
24,724,746 UART: [art] PUB.Y = 2AF01AF3FBA318F1800700C80FBAD0B513B5030CBF13F71B252BC17EFA6F5F601A83077507F2434167678ADA5CE04855
24,732,013 UART: [art] SIG.R = 95AC75F8AFBB290A24C0024D119A2B40183FCE9EFD65D7E0CECA7CBC5D373E6ECC93E68EC66FC7FBDB7828928F396811
24,739,458 UART: [art] SIG.S = DA036E0B3EBA767DD429843FB7DEDDDFA90B4F1F7FD181FC3CA890826E56797B9253310AAA6E5F6C2A00778CE16F8087
25,718,558 UART: Caliptra RT
25,719,246 UART: [state] CFI Enabled
25,883,272 UART: [rt] RT listening for mailbox commands...
25,885,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,916,424 UART: [rt]cmd =0x4d454153, len=108
25,934,710 >>> mbox cmd response data (12 bytes)
27,986,837 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,087,420 UART:
28,087,814 UART: Running Caliptra ROM ...
28,088,950 UART:
28,089,124 UART: [state] CFI Enabled
28,145,085 UART: [state] LifecycleState = Unprovisioned
28,146,993 UART: [state] DebugLocked = No
28,149,629 UART: [state] WD Timer not started. Device not locked for debugging
28,153,050 UART: [kat] SHA2-256
28,332,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,343,774 UART: [kat] ++
28,344,239 UART: [kat] sha1
28,354,749 UART: [kat] SHA2-256
28,357,815 UART: [kat] SHA2-384
28,364,404 UART: [kat] SHA2-512-ACC
28,367,403 UART: [kat] ECC-384
30,831,256 UART: [kat] HMAC-384Kdf
30,855,209 UART: [kat] LMS
31,384,633 UART: [kat] --
31,389,427 UART: [update-reset] ++
34,384,504 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,388,750 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
34,646,717 >>> mbox cmd response: success
34,647,076 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,647,950 UART: [update-reset] Copying MAN_2 To MAN_1
34,670,259 UART: [update-reset Success] --
34,673,193 UART: [state] Locking Datavault
34,676,186 UART: [state] Locking PCR0, PCR1 and PCR31
34,677,834 UART: [state] Locking ICCM
34,680,446 UART: [exit] Launching FMC @ 0x40000130
34,688,894 UART:
34,689,132 UART: Running Caliptra FMC ...
34,690,169 UART:
34,690,318 UART: [state] CFI Enabled
34,792,528 UART: [art] Extend RT PCRs Done
34,793,709 UART: [art] Lock RT PCRs Done
34,795,241 UART: [art] Populate DV Done
34,800,976 UART: [fht] FMC Alias Private Key: 7
34,802,569 UART: [art] Derive CDI
34,803,384 UART: [art] Store in in slot 0x4
34,861,426 UART: [art] Derive Key Pair
34,862,462 UART: [art] Store priv key in slot 0x5
37,325,774 UART: [art] Derive Key Pair - Done
37,339,050 UART: [art] Signing Cert with AUTHO
37,340,374 UART: RITY.KEYID = 7
39,051,271 UART: [art] Erasing AUTHORITY.KEYID = 7
39,052,783 UART: [art] PUB.X = 150A03F039E2AB0309B1FC4767A2524FAB4C195DBA3D6091AE4C4A0583B48D0CA3F77D126C17BD1798A7529B724C4FFA
39,060,044 UART: [art] PUB.Y = 354B97FCEF9170544FA41DE5199F647ABD023F117292994BAC4F5DF6B9C9731E8ACE180A402E0D1026A38F4E76E08464
39,067,281 UART: [art] SIG.R = BBC66814C68C30C708E6046C6DE1D57398DCF2DDF04E7FD0EA4B96460EEE07031E9912FF0CA005795DB4DFE5FEDC8BB5
39,074,733 UART: [art] SIG.S = CD83CBEEBFF58CBA7AE7A5BA1AB02341AF59BC2897C156D85D229D82870D7CF2E2294D4FEFC08308DB7004DA6BF7257D
40,052,883 UART: mbox::rt_entry...
40,053,838 UART: ____ _ _ _ ____ _____
40,055,824 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,057,831 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,059,772 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,061,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,063,645 UART: |_|
40,064,459 UART:
40,348,343 UART: [rt] Runtime listening for mailbox commands...
40,350,460 >>> mbox cmd response data (48 bytes)
40,351,036 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,353,356 >>> mbox cmd response data (48 bytes)
40,354,253 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,368,147 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,364 UART:
192,753 UART: Running Caliptra ROM ...
193,968 UART:
194,128 UART: [state] CFI Enabled
262,532 UART: [state] LifecycleState = Unprovisioned
264,873 UART: [state] DebugLocked = No
266,837 UART: [state] WD Timer not started. Device not locked for debugging
272,156 UART: [kat] SHA2-256
462,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,797 UART: [kat] ++
473,248 UART: [kat] sha1
484,047 UART: [kat] SHA2-256
487,086 UART: [kat] SHA2-384
491,986 UART: [kat] SHA2-512-ACC
494,576 UART: [kat] ECC-384
2,947,080 UART: [kat] HMAC-384Kdf
2,971,844 UART: [kat] LMS
3,503,563 UART: [kat] --
3,507,794 UART: [cold-reset] ++
3,510,232 UART: [fht] FHT @ 0x50003400
3,522,279 UART: [idev] ++
3,522,916 UART: [idev] CDI.KEYID = 6
3,523,947 UART: [idev] SUBJECT.KEYID = 7
3,525,124 UART: [idev] UDS.KEYID = 0
3,526,214 ready_for_fw is high
3,526,419 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,135 UART: [idev] Erasing UDS.KEYID = 0
6,051,060 UART: [idev] Sha1 KeyId Algorithm
6,071,764 UART: [idev] --
6,076,033 UART: [ldev] ++
6,076,719 UART: [ldev] CDI.KEYID = 6
6,077,636 UART: [ldev] SUBJECT.KEYID = 5
6,078,795 UART: [ldev] AUTHORITY.KEYID = 7
6,080,028 UART: [ldev] FE.KEYID = 1
6,120,539 UART: [ldev] Erasing FE.KEYID = 1
8,625,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,176 UART: [ldev] --
10,435,729 UART: [fwproc] Wait for Commands...
10,438,586 UART: [fwproc] Recv command 0x46574c44
10,440,927 UART: [fwproc] Recv'd Img size: 114360 bytes
13,887,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,623,869 >>> mbox cmd response: success
14,628,476 UART: [afmc] ++
14,629,192 UART: [afmc] CDI.KEYID = 6
14,630,462 UART: [afmc] SUBJECT.KEYID = 7
14,631,851 UART: [afmc] AUTHORITY.KEYID = 5
17,160,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,885,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,887,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,902,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,917,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,932,906 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,955,957 UART: [afmc] --
18,959,231 UART: [cold-reset] --
18,963,744 UART: [state] Locking Datavault
18,968,317 UART: [state] Locking PCR0, PCR1 and PCR31
18,970,557 UART: [state] Locking ICCM
18,973,261 UART: [exit] Launching FMC @ 0x40000130
18,981,946 UART:
18,982,185 UART: Running Caliptra FMC ...
18,983,314 UART:
18,983,482 UART: [state] CFI Enabled
19,042,166 UART: [fht] FMC Alias Private Key: 7
20,806,475 UART: [art] Extend RT PCRs Done
20,807,693 UART: [art] Lock RT PCRs Done
20,809,264 UART: [art] Populate DV Done
20,814,784 UART: [fht] FMC Alias Private Key: 7
20,816,430 UART: [art] Derive CDI
20,817,247 UART: [art] Store in in slot 0x4
20,875,478 UART: [art] Derive Key Pair
20,876,482 UART: [art] Store priv key in slot 0x5
23,339,756 UART: [art] Derive Key Pair - Done
23,352,540 UART: [art] Signing Cert with AUTHO
23,353,855 UART: RITY.KEYID = 7
25,065,455 UART: [art] Erasing AUTHORITY.KEYID = 7
25,066,972 UART: [art] PUB.X = 885E7AA5ABE01AFFEBED383F093BBBF39CB1ACA32F9BC25146D90C0779AC021C8CC844B13B45C7C297D0A729E1D7ADC3
25,074,278 UART: [art] PUB.Y = BF3D9931F7ECFCC7AF8D2AC66DC50C89C9E50BA9169C00240C80A5229719FD995A3A05CEEF353556DEC1C908EC8ABC15
25,081,493 UART: [art] SIG.R = 9EA08E73F4BA14E97395E3481C1A28F9CF66EDDE886B118FBE7BECC4A9086D281FE3ADA25D32D242DFD07F87FEDD98F3
25,088,935 UART: [art] SIG.S = 43B565774133E4652DF4C96FAE6AF2B8C66D300A68947D8E1E848704C932724973B41031AF08B33450126ECB4484BEA0
26,067,976 UART: Caliptra RT
26,068,693 UART: [state] CFI Enabled
26,233,123 UART: [rt] RT listening for mailbox commands...
26,235,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,266,265 UART: [rt]cmd =0x4d454153, len=108
26,284,699 >>> mbox cmd response data (12 bytes)
28,336,803 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,437,547 UART:
28,437,898 UART: Running Caliptra ROM ...
28,438,976 UART:
28,439,130 UART: [state] CFI Enabled
28,496,727 UART: [state] LifecycleState = Unprovisioned
28,498,829 UART: [state] DebugLocked = No
28,501,381 UART: [state] WD Timer not started. Device not locked for debugging
28,506,063 UART: [kat] SHA2-256
28,695,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,706,699 UART: [kat] ++
28,707,153 UART: [kat] sha1
28,717,873 UART: [kat] SHA2-256
28,720,841 UART: [kat] SHA2-384
28,727,749 UART: [kat] SHA2-512-ACC
28,730,352 UART: [kat] ECC-384
31,182,720 UART: [kat] HMAC-384Kdf
31,207,230 UART: [kat] LMS
31,738,775 UART: [kat] --
31,743,048 UART: [update-reset] ++
34,765,950 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,769,756 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,163,113 >>> mbox cmd response: success
35,163,506 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,164,117 UART: [update-reset] Copying MAN_2 To MAN_1
35,201,689 UART: [update-reset Success] --
35,205,439 UART: [state] Locking Datavault
35,209,140 UART: [state] Locking PCR0, PCR1 and PCR31
35,211,290 UART: [state] Locking ICCM
35,212,798 UART: [exit] Launching FMC @ 0x40000130
35,221,482 UART:
35,221,722 UART: Running Caliptra FMC ...
35,222,826 UART:
35,222,984 UART: [state] CFI Enabled
35,315,080 UART: [art] Extend RT PCRs Done
35,316,290 UART: [art] Lock RT PCRs Done
35,317,910 UART: [art] Populate DV Done
35,323,104 UART: [fht] FMC Alias Private Key: 7
35,324,864 UART: [art] Derive CDI
35,325,678 UART: [art] Store in in slot 0x4
35,383,939 UART: [art] Derive Key Pair
35,384,981 UART: [art] Store priv key in slot 0x5
37,848,189 UART: [art] Derive Key Pair - Done
37,860,861 UART: [art] Signing Cert with AUTHO
37,862,169 UART: RITY.KEYID = 7
39,573,889 UART: [art] Erasing AUTHORITY.KEYID = 7
39,575,386 UART: [art] PUB.X = E5FFA6380CA69DFE723BD5506DF8B3B2AF9647A2CBFD1242038BEA15FCE7590D6A77A08116FD1D90F38DA7DA0A7FB5E0
39,582,684 UART: [art] PUB.Y = 256C1816F06496D5A2F5813B1D021B0F073F6D27366FDD4F8C20D465A7E4700B6017A66540A6B23EBE707D3D987B747D
39,589,961 UART: [art] SIG.R = 3E9134B3AD7824FC7CD8BF6313A8AB3E9D784E961110F2645D49EDA98CE1FF9FFDF9FB00B4E0EA1E3EABB461735F8D41
39,597,341 UART: [art] SIG.S = 5DD4AB57BCCC5F9251BECACF7DDD0D3AE7693E73657C2532A4BD1E07D4FE7438B4B03BCB7109806B6727B4DB2AEC7161
40,575,616 UART: mbox::rt_entry...
40,576,610 UART: ____ _ _ _ ____ _____
40,578,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,580,619 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,582,560 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,584,410 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,586,261 UART: |_|
40,587,056 UART:
40,873,121 UART: [rt] Runtime listening for mailbox commands...
40,875,284 >>> mbox cmd response data (48 bytes)
40,875,888 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,878,308 >>> mbox cmd response data (48 bytes)
40,879,212 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,893,152 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
3,437,499 ready_for_fw is high
3,437,873 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,745,703 >>> mbox cmd response: success
19,026,158 UART:
19,026,548 UART: Running Caliptra FMC ...
19,027,843 UART:
19,028,011 UART: [state] CFI Enabled
19,093,386 UART: [fht] FMC Alias Private Key: 7
20,857,509 UART: [art] Extend RT PCRs Done
20,858,730 UART: [art] Lock RT PCRs Done
20,860,436 UART: [art] Populate DV Done
20,866,069 UART: [fht] FMC Alias Private Key: 7
20,867,603 UART: [art] Derive CDI
20,868,368 UART: [art] Store in in slot 0x4
20,926,002 UART: [art] Derive Key Pair
20,927,012 UART: [art] Store priv key in slot 0x5
23,390,067 UART: [art] Derive Key Pair - Done
23,403,279 UART: [art] Signing Cert with AUTHO
23,404,578 UART: RITY.KEYID = 7
25,116,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,715 UART: [art] PUB.X = 47F0AE8812944ECDFC554D6C6D220F2469EAFE352748998924F160216F46DBF2C9F2ED157D9ABEFEA86432922115A109
25,124,997 UART: [art] PUB.Y = 84D25630C285232099272985CA86D16CC3C84160AF02DD8AC91A60E39C7319DEB64A32E2838CB70DFF3B9B1BC972A95F
25,132,264 UART: [art] SIG.R = 4A19C4A6D868BB411AA9CE05870086F36DF6564746EAA21BA6AB8C816F405915A3A1791DB7FDE049702B6B4792636B08
25,139,631 UART: [art] SIG.S = 5BE8BD9642063805346264152FC9372216BEB05C29B3F1A080ABCC24103B4597129389AD6FCDCB48FDF0702058E230F3
26,118,680 UART: Caliptra RT
26,119,373 UART: [state] CFI Enabled
26,284,387 UART: [rt] RT listening for mailbox commands...
26,286,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,317,478 UART: [rt]cmd =0x4d454153, len=108
26,336,144 >>> mbox cmd response data (12 bytes)
28,395,250 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,412,217 >>> mbox cmd response: success
35,412,707 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,444,603 UART:
35,444,928 UART: Running Caliptra FMC ...
35,445,966 UART:
35,446,113 UART: [state] CFI Enabled
35,534,533 UART: [art] Extend RT PCRs Done
35,535,725 UART: [art] Lock RT PCRs Done
35,537,116 UART: [art] Populate DV Done
35,542,648 UART: [fht] FMC Alias Private Key: 7
35,544,372 UART: [art] Derive CDI
35,545,113 UART: [art] Store in in slot 0x4
35,603,378 UART: [art] Derive Key Pair
35,604,417 UART: [art] Store priv key in slot 0x5
38,067,059 UART: [art] Derive Key Pair - Done
38,080,002 UART: [art] Signing Cert with AUTHO
38,081,315 UART: RITY.KEYID = 7
39,793,900 UART: [art] Erasing AUTHORITY.KEYID = 7
39,795,410 UART: [art] PUB.X = AA5C9996798B85572B9649E5824509F4C648A6D4E5064AF1A6616B0FC8EE363F2466E1E46B1F8DC0A630D6345EE4AA9D
39,802,649 UART: [art] PUB.Y = 606A3043BDA65C2D5196F5B4A0E8264BD5BFB6EA625A0657642478D7F0DF1EC12E0FE3ED4011B1D07F8A6DE9DE449AAE
39,809,925 UART: [art] SIG.R = B2B523525487A3A1C1E60B20D835B7D877274BB856D03FBAC8D5BC101D7E4B274539CC98DA8B854296124FB8DD904E94
39,817,370 UART: [art] SIG.S = 036F1944F06FDFFE7FC8B332C5A071BEDF8618995B53F349FE033C9A7D5365FC91DCAD3F8D26D312714B3D70CFFBFF62
40,796,071 UART: mbox::rt_entry...
40,797,043 UART: ____ _ _ _ ____ _____
40,799,036 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,801,049 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,803,002 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,804,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,806,875 UART: |_|
40,807,710 UART:
41,090,057 UART: [rt] Runtime listening for mailbox commands...
41,092,220 >>> mbox cmd response data (48 bytes)
41,092,801 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,095,123 >>> mbox cmd response data (48 bytes)
41,096,026 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,109,889 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,362 UART:
192,744 UART: Running Caliptra ROM ...
193,865 UART:
603,449 UART: [state] CFI Enabled
619,610 UART: [state] LifecycleState = Unprovisioned
622,008 UART: [state] DebugLocked = No
623,831 UART: [state] WD Timer not started. Device not locked for debugging
629,286 UART: [kat] SHA2-256
819,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,909 UART: [kat] ++
830,512 UART: [kat] sha1
842,171 UART: [kat] SHA2-256
845,171 UART: [kat] SHA2-384
851,795 UART: [kat] SHA2-512-ACC
854,379 UART: [kat] ECC-384
3,298,745 UART: [kat] HMAC-384Kdf
3,310,243 UART: [kat] LMS
3,842,074 UART: [kat] --
3,846,414 UART: [cold-reset] ++
3,848,916 UART: [fht] FHT @ 0x50003400
3,861,800 UART: [idev] ++
3,862,534 UART: [idev] CDI.KEYID = 6
3,863,447 UART: [idev] SUBJECT.KEYID = 7
3,864,619 UART: [idev] UDS.KEYID = 0
3,865,543 ready_for_fw is high
3,865,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,009,558 UART: [idev] Erasing UDS.KEYID = 0
6,341,651 UART: [idev] Sha1 KeyId Algorithm
6,363,803 UART: [idev] --
6,368,220 UART: [ldev] ++
6,368,894 UART: [ldev] CDI.KEYID = 6
6,369,777 UART: [ldev] SUBJECT.KEYID = 5
6,370,983 UART: [ldev] AUTHORITY.KEYID = 7
6,372,207 UART: [ldev] FE.KEYID = 1
6,381,744 UART: [ldev] Erasing FE.KEYID = 1
8,855,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,646 UART: [ldev] --
10,649,670 UART: [fwproc] Wait for Commands...
10,651,686 UART: [fwproc] Recv command 0x46574c44
10,653,997 UART: [fwproc] Recv'd Img size: 114360 bytes
14,105,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,842,763 >>> mbox cmd response: success
14,847,157 UART: [afmc] ++
14,847,859 UART: [afmc] CDI.KEYID = 6
14,849,035 UART: [afmc] SUBJECT.KEYID = 7
14,850,521 UART: [afmc] AUTHORITY.KEYID = 5
17,355,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,005 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,855 UART: [afmc] --
19,150,130 UART: [cold-reset] --
19,154,905 UART: [state] Locking Datavault
19,161,555 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,736 UART: [state] Locking ICCM
19,166,043 UART: [exit] Launching FMC @ 0x40000130
19,174,709 UART:
19,174,944 UART: Running Caliptra FMC ...
19,176,039 UART:
19,176,197 UART: [state] CFI Enabled
19,184,295 UART: [fht] FMC Alias Private Key: 7
20,940,770 UART: [art] Extend RT PCRs Done
20,941,992 UART: [art] Lock RT PCRs Done
20,943,638 UART: [art] Populate DV Done
20,949,103 UART: [fht] FMC Alias Private Key: 7
20,950,693 UART: [art] Derive CDI
20,951,503 UART: [art] Store in in slot 0x4
20,994,045 UART: [art] Derive Key Pair
20,995,091 UART: [art] Store priv key in slot 0x5
23,421,891 UART: [art] Derive Key Pair - Done
23,435,268 UART: [art] Signing Cert with AUTHO
23,436,576 UART: RITY.KEYID = 7
25,141,384 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,871 UART: [art] PUB.X = F17A2DDA0995B79E5BC890292745EA2C7797439D654EF76AE2CC23BF23277AB38C480F9E369AD411201903975F30F1EE
25,150,168 UART: [art] PUB.Y = C758E286B3C825A9BCF9CF5DA3722A798D6BE5A03D68AE295527EBFAD10C6A13055A9AD57306A19EBE9D9C6CE5F702FD
25,157,457 UART: [art] SIG.R = FFE638ADF0ED54C7D580AA9BAD4EA04D75E56B00D61EF6516CC17535268FAEEE2F69CF44A0411EA420293329F40B7C8D
25,164,841 UART: [art] SIG.S = 4A8AA995036B445F6D3044C19646CCCF779284733BC7D350A53201822CC6C84670C851E58EB1BD84EDE513FCF9F055F8
26,143,442 UART: Caliptra RT
26,144,151 UART: [state] CFI Enabled
26,263,005 UART: [rt] RT listening for mailbox commands...
26,265,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,296,094 UART: [rt]cmd =0x4d454153, len=108
26,314,991 >>> mbox cmd response data (12 bytes)
28,367,291 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,467,793 UART:
28,468,142 UART: Running Caliptra ROM ...
28,469,275 UART:
28,469,443 UART: [state] CFI Enabled
28,484,515 UART: [state] LifecycleState = Unprovisioned
28,486,421 UART: [state] DebugLocked = No
28,488,665 UART: [state] WD Timer not started. Device not locked for debugging
28,493,442 UART: [kat] SHA2-256
28,683,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,694,103 UART: [kat] ++
28,694,695 UART: [kat] sha1
28,706,345 UART: [kat] SHA2-256
28,709,305 UART: [kat] SHA2-384
28,714,961 UART: [kat] SHA2-512-ACC
28,717,577 UART: [kat] ECC-384
31,159,251 UART: [kat] HMAC-384Kdf
31,172,575 UART: [kat] LMS
31,704,154 UART: [kat] --
31,709,025 UART: [update-reset] ++
34,732,477 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,735,904 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,129,264 >>> mbox cmd response: success
35,129,775 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,130,058 UART: [update-reset] Copying MAN_2 To MAN_1
35,167,619 UART: [update-reset Success] --
35,172,113 UART: [state] Locking Datavault
35,174,818 UART: [state] Locking PCR0, PCR1 and PCR31
35,176,998 UART: [state] Locking ICCM
35,179,852 UART: [exit] Launching FMC @ 0x40000130
35,188,514 UART:
35,188,746 UART: Running Caliptra FMC ...
35,189,842 UART:
35,189,996 UART: [state] CFI Enabled
35,234,011 UART: [art] Extend RT PCRs Done
35,235,198 UART: [art] Lock RT PCRs Done
35,236,648 UART: [art] Populate DV Done
35,241,786 UART: [fht] FMC Alias Private Key: 7
35,243,341 UART: [art] Derive CDI
35,244,153 UART: [art] Store in in slot 0x4
35,286,531 UART: [art] Derive Key Pair
35,287,525 UART: [art] Store priv key in slot 0x5
37,714,184 UART: [art] Derive Key Pair - Done
37,727,128 UART: [art] Signing Cert with AUTHO
37,728,422 UART: RITY.KEYID = 7
39,433,858 UART: [art] Erasing AUTHORITY.KEYID = 7
39,435,358 UART: [art] PUB.X = BCF70F060F041C666781A0F66FAE53749F37E486E6E84E97E9C103068C96BFC0C54B055C7127A8BC1E414AFD0F1E0FA6
39,442,664 UART: [art] PUB.Y = 7B1825B0E273701B48CB21795ABFEAAD01525462EABD09604E32B2B20C1F7A7D88DD5BB561AE3D821C8F445E19647C7A
39,449,933 UART: [art] SIG.R = BF2972434F517383FFFF3BA4FF843DC72845A842A6CB99C21F76ADAA412E52BA597D19ED488CF0702EFEA633CD8332CA
39,457,346 UART: [art] SIG.S = A1ACE0601D6B3279D2A5E38F79DFC5AD358F2DDED380839C2DB91A10917F7F4C745C939A93A94E07F506BD2195E91291
40,435,740 UART: mbox::rt_entry...
40,436,703 UART: ____ _ _ _ ____ _____
40,438,636 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,440,641 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,442,596 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,444,522 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,446,447 UART: |_|
40,447,435 UART:
40,730,598 UART: [rt] Runtime listening for mailbox commands...
40,732,718 >>> mbox cmd response data (48 bytes)
40,733,306 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,735,659 >>> mbox cmd response data (48 bytes)
40,736,555 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,750,450 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,757,697 ready_for_fw is high
3,758,130 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,971,469 >>> mbox cmd response: success
19,223,191 UART:
19,223,605 UART: Running Caliptra FMC ...
19,224,737 UART:
19,224,895 UART: [state] CFI Enabled
19,232,641 UART: [fht] FMC Alias Private Key: 7
20,989,622 UART: [art] Extend RT PCRs Done
20,990,843 UART: [art] Lock RT PCRs Done
20,992,477 UART: [art] Populate DV Done
20,997,840 UART: [fht] FMC Alias Private Key: 7
20,999,431 UART: [art] Derive CDI
21,000,244 UART: [art] Store in in slot 0x4
21,042,867 UART: [art] Derive Key Pair
21,043,870 UART: [art] Store priv key in slot 0x5
23,470,894 UART: [art] Derive Key Pair - Done
23,483,944 UART: [art] Signing Cert with AUTHO
23,485,239 UART: RITY.KEYID = 7
25,190,780 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,285 UART: [art] PUB.X = 344D51D65ABB48D2DFACAA7BE6D87455452EFBD45CAC7EA2E1A28E878F3DA42CF62BA723909A0CA1EA728F743B89B8AC
25,199,590 UART: [art] PUB.Y = D7D8515F910BA3D2F5C2558A5C1C560E44153F2CC5E8A8B472F61175058D294ADB9274178CD84375A365A5D5E280B657
25,206,849 UART: [art] SIG.R = 739E0E21304A9D0B4580EE5994D6E616EF4B5BB8C577F746107472FDDAA5B8CDA66BC3B8CB5B411EA3AE9625AAA3BE75
25,214,255 UART: [art] SIG.S = 6EB40FF7D51F1D118D3A18F66D445E6E58DBB669A47F0219B60C0EB16C5F9F1FD2BFEFB55CAD26F38C2E0CA6A6058301
26,193,738 UART: Caliptra RT
26,194,421 UART: [state] CFI Enabled
26,312,239 UART: [rt] RT listening for mailbox commands...
26,314,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,345,471 UART: [rt]cmd =0x4d454153, len=108
26,364,175 >>> mbox cmd response data (12 bytes)
28,415,275 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,337,457 >>> mbox cmd response: success
35,337,943 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,374,359 UART:
35,374,642 UART: Running Caliptra FMC ...
35,375,758 UART:
35,375,912 UART: [state] CFI Enabled
35,419,822 UART: [art] Extend RT PCRs Done
35,421,007 UART: [art] Lock RT PCRs Done
35,422,504 UART: [art] Populate DV Done
35,427,969 UART: [fht] FMC Alias Private Key: 7
35,429,667 UART: [art] Derive CDI
35,430,499 UART: [art] Store in in slot 0x4
35,473,264 UART: [art] Derive Key Pair
35,474,303 UART: [art] Store priv key in slot 0x5
37,901,641 UART: [art] Derive Key Pair - Done
37,914,320 UART: [art] Signing Cert with AUTHO
37,915,614 UART: RITY.KEYID = 7
39,621,055 UART: [art] Erasing AUTHORITY.KEYID = 7
39,622,566 UART: [art] PUB.X = 47EB371F1F5E4D5204D0A4B6EA868133E2963D9889F155889E136B631780C00A806785451AB326D082CB22A0D6BE086B
39,629,750 UART: [art] PUB.Y = 585BEDE506EEDC87E11D8DD54A9F8B44E5B589E2BDFFAD67E42D4C3670978516FA12595DEBFD84F052F5F24293B1364A
39,637,080 UART: [art] SIG.R = 776DCBB8A521DAE37C2E01641E2FF05B827C5AC7DFACC03F0D7851DF4DBFD57E8A402740F67EBD1BC4460854D06E6E1E
39,644,468 UART: [art] SIG.S = C6C83FB7D96539F899C2EA3EBA9B6B31E0DF40289CD1652CAA9888A3AEB71496721BA976B27ED6A6E5C9A7C53801F5F6
40,623,272 UART: mbox::rt_entry...
40,624,226 UART: ____ _ _ _ ____ _____
40,626,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,628,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,630,081 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,632,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,633,955 UART: |_|
40,634,803 UART:
40,916,169 UART: [rt] Runtime listening for mailbox commands...
40,918,289 >>> mbox cmd response data (48 bytes)
40,918,862 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,921,187 >>> mbox cmd response data (48 bytes)
40,922,088 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,936,020 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,405 UART: [kat] SHA2-256
892,343 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,546 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,209 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,398 UART: [idev] ++
1,479,566 UART: [idev] CDI.KEYID = 6
1,479,926 UART: [idev] SUBJECT.KEYID = 7
1,480,350 UART: [idev] UDS.KEYID = 0
1,480,695 ready_for_fw is high
1,480,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,242 UART: [idev] --
1,514,193 UART: [ldev] ++
1,514,361 UART: [ldev] CDI.KEYID = 6
1,514,724 UART: [ldev] SUBJECT.KEYID = 5
1,515,150 UART: [ldev] AUTHORITY.KEYID = 7
1,515,613 UART: [ldev] FE.KEYID = 1
1,520,663 UART: [ldev] Erasing FE.KEYID = 1
1,545,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,830 UART: [ldev] --
1,585,267 UART: [fwproc] Waiting for Commands...
1,585,970 UART: [fwproc] Received command 0x46574c44
1,586,761 UART: [fwproc] Received Image of size 114360 bytes
2,883,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,466 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,767 >>> mbox cmd response: success
3,077,991 UART: [afmc] ++
3,078,159 UART: [afmc] CDI.KEYID = 6
3,078,521 UART: [afmc] SUBJECT.KEYID = 7
3,078,946 UART: [afmc] AUTHORITY.KEYID = 5
3,113,515 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,267 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,660 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,350 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,069 UART: [afmc] --
3,156,113 UART: [cold-reset] --
3,156,879 UART: [state] Locking Datavault
3,158,064 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,668 UART: [state] Locking ICCM
3,159,196 UART: [exit] Launching FMC @ 0x40000130
3,164,525 UART:
3,164,541 UART: Running Caliptra FMC ...
3,164,949 UART:
3,165,003 UART: [state] CFI Enabled
3,175,202 UART: [fht] FMC Alias Private Key: 7
3,283,817 UART: [art] Extend RT PCRs Done
3,284,245 UART: [art] Lock RT PCRs Done
3,285,973 UART: [art] Populate DV Done
3,294,256 UART: [fht] FMC Alias Private Key: 7
3,295,386 UART: [art] Derive CDI
3,295,666 UART: [art] Store in in slot 0x4
3,381,183 UART: [art] Derive Key Pair
3,381,543 UART: [art] Store priv key in slot 0x5
3,394,813 UART: [art] Derive Key Pair - Done
3,409,861 UART: [art] Signing Cert with AUTHO
3,410,341 UART: RITY.KEYID = 7
3,425,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,638 UART: [art] PUB.X = 6D641A2D574E69C526C4387A190BE8219CA80BBEF69CAC559959A417998E25634660EF35DD59B1A0951A31DF346F67E2
3,433,402 UART: [art] PUB.Y = D0ED0D2239B1E1007AF35A2B3C14FD060D66CC7DB48F8C9C8E58B0C5EC2CC796D07176F19E686A13533CD81BE5B68994
3,440,333 UART: [art] SIG.R = C4FFBE4AB1105DB13A6EBFAA427EF58038467045B1CA645FB1464A93189CB6ABF235ECDC971DCF0001EA2FE6EBCC076B
3,447,101 UART: [art] SIG.S = 9E0655C7B7DF2FF03D78BDB01F67EC22CEC2ADFBDA865B442CBBDC195C33C53F7070F05BE2FF6524A0838949CDD61813
3,471,393 UART: Caliptra RT
3,471,647 UART: [state] CFI Enabled
3,578,674 UART: [rt] RT listening for mailbox commands...
3,579,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,187 UART: [rt]cmd =0x4d454153, len=108
3,629,898 >>> mbox cmd response data (12 bytes)
3,629,899 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,734 UART:
3,630,750 UART: Running Caliptra ROM ...
3,631,158 UART:
3,631,212 UART: [state] CFI Enabled
3,633,890 UART: [state] LifecycleState = Unprovisioned
3,634,545 UART: [state] DebugLocked = No
3,635,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,636,786 UART: [kat] SHA2-256
4,430,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,434,832 UART: [kat] ++
4,434,984 UART: [kat] sha1
4,439,236 UART: [kat] SHA2-256
4,441,174 UART: [kat] SHA2-384
4,443,969 UART: [kat] SHA2-512-ACC
4,445,869 UART: [kat] ECC-384
4,451,518 UART: [kat] HMAC-384Kdf
4,456,112 UART: [kat] LMS
5,024,308 UART: [kat] --
5,024,845 UART: [update-reset] ++
5,949,792 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,950,830 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,047,156 >>> mbox cmd response: success
6,047,156 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,047,437 UART: [update-reset] Copying MAN_2 To MAN_1
6,055,451 UART: [update-reset Success] --
6,056,300 UART: [state] Locking Datavault
6,057,250 UART: [state] Locking PCR0, PCR1 and PCR31
6,057,854 UART: [state] Locking ICCM
6,058,354 UART: [exit] Launching FMC @ 0x40000130
6,063,683 UART:
6,063,699 UART: Running Caliptra FMC ...
6,064,107 UART:
6,064,161 UART: [state] CFI Enabled
6,153,092 UART: [art] Extend RT PCRs Done
6,153,520 UART: [art] Lock RT PCRs Done
6,154,623 UART: [art] Populate DV Done
6,162,704 UART: [fht] FMC Alias Private Key: 7
6,163,786 UART: [art] Derive CDI
6,164,066 UART: [art] Store in in slot 0x4
6,249,811 UART: [art] Derive Key Pair
6,250,171 UART: [art] Store priv key in slot 0x5
6,263,427 UART: [art] Derive Key Pair - Done
6,278,505 UART: [art] Signing Cert with AUTHO
6,278,985 UART: RITY.KEYID = 7
6,294,003 UART: [art] Erasing AUTHORITY.KEYID = 7
6,294,768 UART: [art] PUB.X = 195C6E3760B97AE6B6F07D326C1E0CB285622CFEC5AFE80A04268695003906C3D549B23C26D58E551C43F1302863E4A9
6,301,502 UART: [art] PUB.Y = AA93205E39BF98DDCB21273683E8FD62AB7A24D00B19E997F81D861E7315245A8E68BCE6B010AC4E733B590158A3FD02
6,308,449 UART: [art] SIG.R = C22C21E0B35619595EE17BFBA7D859D1FA2B03F53E93B01AC9C7A22AC2037D60EBE72856CC390D1A968264DF86CAD8F4
6,315,224 UART: [art] SIG.S = 5881B2AA3AE25ED42DDBB8FBE7838D76FA20907995F3E8A387C42FBE678E483FC54A016099EA1154FB14126E81149018
6,338,918 UART: mbox::rt_entry...
6,339,290 UART: ____ _ _ _ ____ _____
6,340,074 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,340,874 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,341,642 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,342,410 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,343,178 UART: |_|
6,343,490 UART:
6,629,062 UART: [rt] Runtime listening for mailbox commands...
6,630,233 >>> mbox cmd response data (48 bytes)
6,630,234 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,633,017 >>> mbox cmd response data (48 bytes)
6,633,018 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,648,154 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,245 ready_for_fw is high
1,362,245 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,499 >>> mbox cmd response: success
2,987,541 UART:
2,987,557 UART: Running Caliptra FMC ...
2,987,965 UART:
2,988,019 UART: [state] CFI Enabled
2,998,992 UART: [fht] FMC Alias Private Key: 7
3,107,401 UART: [art] Extend RT PCRs Done
3,107,829 UART: [art] Lock RT PCRs Done
3,109,417 UART: [art] Populate DV Done
3,117,544 UART: [fht] FMC Alias Private Key: 7
3,118,702 UART: [art] Derive CDI
3,118,982 UART: [art] Store in in slot 0x4
3,204,729 UART: [art] Derive Key Pair
3,205,089 UART: [art] Store priv key in slot 0x5
3,218,671 UART: [art] Derive Key Pair - Done
3,233,580 UART: [art] Signing Cert with AUTHO
3,234,060 UART: RITY.KEYID = 7
3,249,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,151 UART: [art] PUB.X = 029F8872581B36D78B300190DC9077863A8798F555F70C64795C49C0857B9CB02D09335D4245F46F3AA754AF45588038
3,256,893 UART: [art] PUB.Y = 41B46A09F420AB03E03575F012CB1F2826812C644A6CC7D700198EC6EC3B69BB3F023E93C5AE9626A3515153F1719BFC
3,263,814 UART: [art] SIG.R = 27B3174C6E82E3FB365413301561C47C382B2EED471BFECFDCF4F4A10A53860EDFE51285B40F39F2CF292A01625195AB
3,270,580 UART: [art] SIG.S = BD870B81D79E7260D40E76E8C7462B4970643E508ECE8624771EC09FC55035B369DD5B96960A83C1E2881FA56D6B49FC
3,294,132 UART: Caliptra RT
3,294,386 UART: [state] CFI Enabled
3,402,714 UART: [rt] RT listening for mailbox commands...
3,403,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,527 UART: [rt]cmd =0x4d454153, len=108
3,454,452 >>> mbox cmd response data (12 bytes)
3,454,453 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,753,622 >>> mbox cmd response: success
5,753,622 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,767,147 UART:
5,767,163 UART: Running Caliptra FMC ...
5,767,571 UART:
5,767,625 UART: [state] CFI Enabled
5,857,150 UART: [art] Extend RT PCRs Done
5,857,578 UART: [art] Lock RT PCRs Done
5,858,939 UART: [art] Populate DV Done
5,867,268 UART: [fht] FMC Alias Private Key: 7
5,868,286 UART: [art] Derive CDI
5,868,566 UART: [art] Store in in slot 0x4
5,954,151 UART: [art] Derive Key Pair
5,954,511 UART: [art] Store priv key in slot 0x5
5,968,065 UART: [art] Derive Key Pair - Done
5,982,820 UART: [art] Signing Cert with AUTHO
5,983,300 UART: RITY.KEYID = 7
5,998,676 UART: [art] Erasing AUTHORITY.KEYID = 7
5,999,441 UART: [art] PUB.X = 51B0EC6DCEDE5343F2F5AC91CC836A588D3DF28BBE09E623B1B56520994122F2244597170FF2A326B96B6836721882FA
6,006,207 UART: [art] PUB.Y = 8C55FE87D9D98EA72477B2193AA9EAA120DCF368F0F7250F8ACA32D88D1ABCCD6268125BA282B667EEC2951E4BBBFF5A
6,013,176 UART: [art] SIG.R = 801E072570693216A4B28D4C8766566C34F0A6B296732F73CEB6DD942FA55EA305039115278ED8D5752AE6F0F0907292
6,019,927 UART: [art] SIG.S = 7C0CA4BC90B7E23BDBDC080869CC10F7670D5C58CB3A2E968B3C5D33CFE9F1B21ACD0176B924E60BDDA51747F8C6E847
6,043,374 UART: mbox::rt_entry...
6,043,746 UART: ____ _ _ _ ____ _____
6,044,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,045,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,046,098 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,046,866 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,047,634 UART: |_|
6,047,946 UART:
6,327,072 UART: [rt] Runtime listening for mailbox commands...
6,328,243 >>> mbox cmd response data (48 bytes)
6,328,244 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,331,027 >>> mbox cmd response data (48 bytes)
6,331,028 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,346,164 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,324 UART: [kat] SHA2-256
892,262 UART: [kat] SHA2-384
894,987 UART: [kat] SHA2-512-ACC
896,888 UART: [kat] ECC-384
902,443 UART: [kat] HMAC-384Kdf
906,927 UART: [kat] LMS
1,475,123 UART: [kat] --
1,476,028 UART: [cold-reset] ++
1,476,540 UART: [fht] Storing FHT @ 0x50003400
1,479,397 UART: [idev] ++
1,479,565 UART: [idev] CDI.KEYID = 6
1,479,925 UART: [idev] SUBJECT.KEYID = 7
1,480,349 UART: [idev] UDS.KEYID = 0
1,480,694 ready_for_fw is high
1,480,694 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,023 UART: [idev] Erasing UDS.KEYID = 0
1,505,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,695 UART: [idev] --
1,514,680 UART: [ldev] ++
1,514,848 UART: [ldev] CDI.KEYID = 6
1,515,211 UART: [ldev] SUBJECT.KEYID = 5
1,515,637 UART: [ldev] AUTHORITY.KEYID = 7
1,516,100 UART: [ldev] FE.KEYID = 1
1,521,278 UART: [ldev] Erasing FE.KEYID = 1
1,546,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,261 UART: [ldev] --
1,585,730 UART: [fwproc] Waiting for Commands...
1,586,357 UART: [fwproc] Received command 0x46574c44
1,587,148 UART: [fwproc] Received Image of size 114360 bytes
2,884,781 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,919 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,090 >>> mbox cmd response: success
3,078,258 UART: [afmc] ++
3,078,426 UART: [afmc] CDI.KEYID = 6
3,078,788 UART: [afmc] SUBJECT.KEYID = 7
3,079,213 UART: [afmc] AUTHORITY.KEYID = 5
3,113,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,587 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,277 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,166 UART: [afmc] --
3,157,276 UART: [cold-reset] --
3,158,054 UART: [state] Locking Datavault
3,159,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,815 UART: [state] Locking ICCM
3,160,415 UART: [exit] Launching FMC @ 0x40000130
3,165,744 UART:
3,165,760 UART: Running Caliptra FMC ...
3,166,168 UART:
3,166,311 UART: [state] CFI Enabled
3,176,952 UART: [fht] FMC Alias Private Key: 7
3,284,441 UART: [art] Extend RT PCRs Done
3,284,869 UART: [art] Lock RT PCRs Done
3,286,209 UART: [art] Populate DV Done
3,294,508 UART: [fht] FMC Alias Private Key: 7
3,295,486 UART: [art] Derive CDI
3,295,766 UART: [art] Store in in slot 0x4
3,381,349 UART: [art] Derive Key Pair
3,381,709 UART: [art] Store priv key in slot 0x5
3,394,517 UART: [art] Derive Key Pair - Done
3,409,483 UART: [art] Signing Cert with AUTHO
3,409,963 UART: RITY.KEYID = 7
3,425,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,264 UART: [art] PUB.X = 5B5860F31FFF8AB059ABB2AEFE0DBC94B0DD2DC4195C67953CCC20D1A858C8625DB091AF2B9CD13374131EB0E0CB4548
3,433,051 UART: [art] PUB.Y = 9B02644837E55E98821311A0F50C6885F8FE2973A33077C46C764AB8847DE0860B7760A4CC854130D46BCA89A50034A9
3,439,960 UART: [art] SIG.R = BAF3FA15F65D6F2AB1ACBC6437243F8202B6A4854FF6CE9AB816BAC8B8144BFB9382E806C759C12ADA14DC5D817B46CA
3,446,746 UART: [art] SIG.S = 51C72C7702DFE53DF70770DE2664EF415067511F09FC4567F1389951B63D253942E4A0C83B3524A9DBA80C603DD2CDEC
3,470,495 UART: Caliptra RT
3,470,841 UART: [state] CFI Enabled
3,580,027 UART: [rt] RT listening for mailbox commands...
3,580,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,018 UART: [rt]cmd =0x4d454153, len=108
3,631,575 >>> mbox cmd response data (12 bytes)
3,631,576 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,207 UART:
3,632,223 UART: Running Caliptra ROM ...
3,632,631 UART:
3,632,772 UART: [state] CFI Enabled
3,636,002 UART: [state] LifecycleState = Unprovisioned
3,636,657 UART: [state] DebugLocked = No
3,637,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,638,962 UART: [kat] SHA2-256
4,432,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,437,008 UART: [kat] ++
4,437,160 UART: [kat] sha1
4,441,308 UART: [kat] SHA2-256
4,443,246 UART: [kat] SHA2-384
4,445,965 UART: [kat] SHA2-512-ACC
4,447,865 UART: [kat] ECC-384
4,453,386 UART: [kat] HMAC-384Kdf
4,458,112 UART: [kat] LMS
5,026,308 UART: [kat] --
5,027,133 UART: [update-reset] ++
5,952,894 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,954,158 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,050,484 >>> mbox cmd response: success
6,050,484 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,050,831 UART: [update-reset] Copying MAN_2 To MAN_1
6,058,845 UART: [update-reset Success] --
6,060,140 UART: [state] Locking Datavault
6,061,090 UART: [state] Locking PCR0, PCR1 and PCR31
6,061,694 UART: [state] Locking ICCM
6,062,216 UART: [exit] Launching FMC @ 0x40000130
6,067,545 UART:
6,067,561 UART: Running Caliptra FMC ...
6,067,969 UART:
6,068,112 UART: [state] CFI Enabled
6,157,259 UART: [art] Extend RT PCRs Done
6,157,687 UART: [art] Lock RT PCRs Done
6,158,788 UART: [art] Populate DV Done
6,167,031 UART: [fht] FMC Alias Private Key: 7
6,167,975 UART: [art] Derive CDI
6,168,255 UART: [art] Store in in slot 0x4
6,253,826 UART: [art] Derive Key Pair
6,254,186 UART: [art] Store priv key in slot 0x5
6,267,734 UART: [art] Derive Key Pair - Done
6,282,513 UART: [art] Signing Cert with AUTHO
6,282,993 UART: RITY.KEYID = 7
6,298,033 UART: [art] Erasing AUTHORITY.KEYID = 7
6,298,798 UART: [art] PUB.X = AF76D3BFA4B84209DAEB748D9B3391AB3BBAC701288A6B57251A1CE1AAED25D5953DFC984E8D9AB0E92522E0BD0B010F
6,305,575 UART: [art] PUB.Y = 7CE8C0753620C8543870B88C6DFE40041A95DCC9D8792D5FFC01B152C783F8E6703F9A42906C5C512A271F7FD5C6ABEB
6,312,527 UART: [art] SIG.R = 4650AD954083D4AC4B67EE7A7CD3B926A7E47C97AF54F8BE049768B1AD97EA0E9AC3734D23DB6294512B4855403057F2
6,319,295 UART: [art] SIG.S = 9CA616CD802F76108D1A9545616AD78E9524A3BF751A3125A8A1D4791493342B7F571150AE5A456D85353DE7F1FAF0D7
6,343,032 UART: mbox::rt_entry...
6,343,404 UART: ____ _ _ _ ____ _____
6,344,188 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,344,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,345,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,346,524 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,347,292 UART: |_|
6,347,604 UART:
6,627,580 UART: [rt] Runtime listening for mailbox commands...
6,628,751 >>> mbox cmd response data (48 bytes)
6,628,752 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,631,535 >>> mbox cmd response data (48 bytes)
6,631,536 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,646,672 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 ready_for_fw is high
1,362,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,008 >>> mbox cmd response: success
2,989,852 UART:
2,989,868 UART: Running Caliptra FMC ...
2,990,276 UART:
2,990,419 UART: [state] CFI Enabled
3,000,728 UART: [fht] FMC Alias Private Key: 7
3,108,307 UART: [art] Extend RT PCRs Done
3,108,735 UART: [art] Lock RT PCRs Done
3,109,909 UART: [art] Populate DV Done
3,118,210 UART: [fht] FMC Alias Private Key: 7
3,119,228 UART: [art] Derive CDI
3,119,508 UART: [art] Store in in slot 0x4
3,205,407 UART: [art] Derive Key Pair
3,205,767 UART: [art] Store priv key in slot 0x5
3,219,687 UART: [art] Derive Key Pair - Done
3,234,209 UART: [art] Signing Cert with AUTHO
3,234,689 UART: RITY.KEYID = 7
3,250,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,996 UART: [art] PUB.X = B4A0873202BF975A746B1C88AFD8F2D8CCF784EDE8582C6DC12A084E447E790A9A3AEC3D56A4A907313310676E43B8D5
3,257,762 UART: [art] PUB.Y = 9AA7EC2783063F1AF03A5AD8750C7EFCF1FCFD03471C95444DD68E3833FD6CD043883A124AA445FAD1BA9C4E2B4DF61F
3,264,723 UART: [art] SIG.R = 3B510958014E04829F4E4C7E3BB8D65D135225A5671FDB472ABD02AB44D422D9646838ED4CAD57B3CA6F205A2C5BF3B3
3,271,489 UART: [art] SIG.S = 1860DA47DB1D7A31F501CDBFEF3BE7A4D2F1E437DDA5647AD712C233DAF83E55C96372B72EB7418F9AD48DFEAA6E562B
3,294,973 UART: Caliptra RT
3,295,319 UART: [state] CFI Enabled
3,404,064 UART: [rt] RT listening for mailbox commands...
3,404,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,069 UART: [rt]cmd =0x4d454153, len=108
3,455,356 >>> mbox cmd response data (12 bytes)
3,455,357 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,915 >>> mbox cmd response: success
5,755,915 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,769,656 UART:
5,769,672 UART: Running Caliptra FMC ...
5,770,080 UART:
5,770,223 UART: [state] CFI Enabled
5,860,202 UART: [art] Extend RT PCRs Done
5,860,630 UART: [art] Lock RT PCRs Done
5,861,507 UART: [art] Populate DV Done
5,869,858 UART: [fht] FMC Alias Private Key: 7
5,870,982 UART: [art] Derive CDI
5,871,262 UART: [art] Store in in slot 0x4
5,956,847 UART: [art] Derive Key Pair
5,957,207 UART: [art] Store priv key in slot 0x5
5,970,463 UART: [art] Derive Key Pair - Done
5,985,069 UART: [art] Signing Cert with AUTHO
5,985,549 UART: RITY.KEYID = 7
6,000,341 UART: [art] Erasing AUTHORITY.KEYID = 7
6,001,106 UART: [art] PUB.X = FF59D3D71E25694D0A1E04008FD5B2901C1E6D2BCA399A02DB567BA44D3AEB3D81AF9410CD9BCC742F20EA5682E719E1
6,007,861 UART: [art] PUB.Y = 6CEF3D71FC2F1B9636596E6780150190B0DC49D0136A4C592568507E8C36D2B151B6AD6178E202E78F027D0294F92E13
6,014,793 UART: [art] SIG.R = F6CF6C30ADA0ABD60B451A4C3E843EFD1CD7B8E9480B302DDC4B8E51DC0F539D040B366F7112C1A5B0613C649D9053FA
6,021,566 UART: [art] SIG.S = E22E44ACAB1F374F82ABDFE760E8AA6F28F54DCCE6ED23358A00967B54228AC935D243D37A20FD80C03A28F8A6226376
6,045,367 UART: mbox::rt_entry...
6,045,739 UART: ____ _ _ _ ____ _____
6,046,523 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,047,323 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,048,091 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,048,859 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,049,627 UART: |_|
6,049,939 UART:
6,329,564 UART: [rt] Runtime listening for mailbox commands...
6,330,735 >>> mbox cmd response data (48 bytes)
6,330,736 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,333,519 >>> mbox cmd response data (48 bytes)
6,333,520 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,348,656 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,192 UART: [kat] SHA2-256
893,842 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,967 UART: [kat] ++
898,119 UART: [kat] sha1
902,555 UART: [kat] SHA2-256
904,495 UART: [kat] SHA2-384
907,258 UART: [kat] SHA2-512-ACC
909,159 UART: [kat] ECC-384
919,238 UART: [kat] HMAC-384Kdf
923,806 UART: [kat] LMS
1,172,134 UART: [kat] --
1,173,013 UART: [cold-reset] ++
1,173,369 UART: [fht] FHT @ 0x50003400
1,175,990 UART: [idev] ++
1,176,158 UART: [idev] CDI.KEYID = 6
1,176,518 UART: [idev] SUBJECT.KEYID = 7
1,176,942 UART: [idev] UDS.KEYID = 0
1,177,287 ready_for_fw is high
1,177,287 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,752 UART: [idev] Erasing UDS.KEYID = 0
1,201,641 UART: [idev] Sha1 KeyId Algorithm
1,210,191 UART: [idev] --
1,211,385 UART: [ldev] ++
1,211,553 UART: [ldev] CDI.KEYID = 6
1,211,916 UART: [ldev] SUBJECT.KEYID = 5
1,212,342 UART: [ldev] AUTHORITY.KEYID = 7
1,212,805 UART: [ldev] FE.KEYID = 1
1,217,957 UART: [ldev] Erasing FE.KEYID = 1
1,244,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,143 UART: [ldev] --
1,283,410 UART: [fwproc] Wait for Commands...
1,284,036 UART: [fwproc] Recv command 0x46574c44
1,284,764 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,404 >>> mbox cmd response: success
2,776,524 UART: [afmc] ++
2,776,692 UART: [afmc] CDI.KEYID = 6
2,777,054 UART: [afmc] SUBJECT.KEYID = 7
2,777,479 UART: [afmc] AUTHORITY.KEYID = 5
2,813,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,489 UART: [afmc] --
2,856,397 UART: [cold-reset] --
2,857,235 UART: [state] Locking Datavault
2,858,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,966 UART: [state] Locking ICCM
2,859,620 UART: [exit] Launching FMC @ 0x40000130
2,864,949 UART:
2,864,965 UART: Running Caliptra FMC ...
2,865,373 UART:
2,865,427 UART: [state] CFI Enabled
2,875,400 UART: [fht] FMC Alias Private Key: 7
2,983,353 UART: [art] Extend RT PCRs Done
2,983,781 UART: [art] Lock RT PCRs Done
2,985,317 UART: [art] Populate DV Done
2,993,500 UART: [fht] FMC Alias Private Key: 7
2,994,438 UART: [art] Derive CDI
2,994,718 UART: [art] Store in in slot 0x4
3,080,355 UART: [art] Derive Key Pair
3,080,715 UART: [art] Store priv key in slot 0x5
3,094,121 UART: [art] Derive Key Pair - Done
3,108,938 UART: [art] Signing Cert with AUTHO
3,109,418 UART: RITY.KEYID = 7
3,124,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,357 UART: [art] PUB.X = 46D3481F029B28A2D78DAF64168D9B1D7714295F952E651AF217E261A3B65F287982C7681ED157DCC802A5A552A43ED4
3,132,119 UART: [art] PUB.Y = C207844688AFCACE38C0E28056D380EF270BFDD159C1967188597105AFDBEF8E3F2B6851A218335A3F9C79A6EF473E8A
3,139,068 UART: [art] SIG.R = 5FE0B6420F27EB71AFAF50608AF89DE2601507AE6423928FE5DF25A79EDB6A01EF059A51EA9E8D066BE1C6B358428B98
3,145,835 UART: [art] SIG.S = 8AE35205C64E44C1E5FE8D9C8CEE1817B07C86A6A15E2474430F9436D18F49B42A12D60029199E2EC86DC2B2C9CF1383
3,169,994 UART: Caliptra RT
3,170,248 UART: [state] CFI Enabled
3,277,580 UART: [rt] RT listening for mailbox commands...
3,278,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,225 UART: [rt]cmd =0x4d454153, len=108
3,328,876 >>> mbox cmd response data (12 bytes)
3,328,877 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,581 UART:
3,329,597 UART: Running Caliptra ROM ...
3,330,005 UART:
3,330,060 UART: [state] CFI Enabled
3,332,684 UART: [state] LifecycleState = Unprovisioned
3,333,339 UART: [state] DebugLocked = No
3,334,019 UART: [state] WD Timer not started. Device not locked for debugging
3,335,373 UART: [kat] SHA2-256
4,141,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,145,148 UART: [kat] ++
4,145,300 UART: [kat] sha1
4,149,586 UART: [kat] SHA2-256
4,151,526 UART: [kat] SHA2-384
4,154,315 UART: [kat] SHA2-512-ACC
4,156,215 UART: [kat] ECC-384
4,165,886 UART: [kat] HMAC-384Kdf
4,170,470 UART: [kat] LMS
4,418,798 UART: [kat] --
4,419,454 UART: [update-reset] ++
5,323,421 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,324,496 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,420,770 >>> mbox cmd response: success
5,420,770 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,421,109 UART: [update-reset] Copying MAN_2 To MAN_1
5,429,123 UART: [update-reset Success] --
5,430,050 UART: [state] Locking Datavault
5,430,986 UART: [state] Locking PCR0, PCR1 and PCR31
5,431,590 UART: [state] Locking ICCM
5,432,228 UART: [exit] Launching FMC @ 0x40000130
5,437,557 UART:
5,437,573 UART: Running Caliptra FMC ...
5,437,981 UART:
5,438,035 UART: [state] CFI Enabled
5,527,042 UART: [art] Extend RT PCRs Done
5,527,470 UART: [art] Lock RT PCRs Done
5,528,939 UART: [art] Populate DV Done
5,537,110 UART: [fht] FMC Alias Private Key: 7
5,538,090 UART: [art] Derive CDI
5,538,370 UART: [art] Store in in slot 0x4
5,624,185 UART: [art] Derive Key Pair
5,624,545 UART: [art] Store priv key in slot 0x5
5,637,685 UART: [art] Derive Key Pair - Done
5,652,821 UART: [art] Signing Cert with AUTHO
5,653,301 UART: RITY.KEYID = 7
5,668,493 UART: [art] Erasing AUTHORITY.KEYID = 7
5,669,258 UART: [art] PUB.X = 0F6077FC87BDC93F62F6F2D8DC792A5944E45C45210EDB31BFDA29ABDF6993A629BB6603F0792BBB137BB50E0F31395F
5,676,027 UART: [art] PUB.Y = 40D3A247D46E631A042250C6DE6708262BF8B7D6AF3CE8F620F4A6DE233C0A388E07ABF67CB7E7140C90AED117F92EBD
5,682,976 UART: [art] SIG.R = D01C633317223E792A46A82FA41AFC639E1C193999ECC98CC504F888707D9327AD0DE33F1EB12A1310A7944BB040173A
5,689,740 UART: [art] SIG.S = F223804376ED5F17A80718B146BA593EB2CFE9AE5DE235514B234A49EA97483551BB45DBE03FEC48CCF5B114CD6A2842
5,713,370 UART: mbox::rt_entry...
5,713,742 UART: ____ _ _ _ ____ _____
5,714,526 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,715,326 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,716,094 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,716,862 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,717,630 UART: |_|
5,717,942 UART:
5,997,723 UART: [rt] Runtime listening for mailbox commands...
5,998,894 >>> mbox cmd response data (48 bytes)
5,998,895 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,001,678 >>> mbox cmd response data (48 bytes)
6,001,679 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,016,815 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,533 ready_for_fw is high
1,059,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,899 >>> mbox cmd response: success
2,687,407 UART:
2,687,423 UART: Running Caliptra FMC ...
2,687,831 UART:
2,687,885 UART: [state] CFI Enabled
2,698,532 UART: [fht] FMC Alias Private Key: 7
2,806,295 UART: [art] Extend RT PCRs Done
2,806,723 UART: [art] Lock RT PCRs Done
2,808,391 UART: [art] Populate DV Done
2,816,618 UART: [fht] FMC Alias Private Key: 7
2,817,674 UART: [art] Derive CDI
2,817,954 UART: [art] Store in in slot 0x4
2,903,621 UART: [art] Derive Key Pair
2,903,981 UART: [art] Store priv key in slot 0x5
2,916,989 UART: [art] Derive Key Pair - Done
2,931,739 UART: [art] Signing Cert with AUTHO
2,932,219 UART: RITY.KEYID = 7
2,947,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,118 UART: [art] PUB.X = 371FF9BCB7B31DE2AE489308F359845CFB6FB2DDE12E4DBDB0591AF5F855D84534B709B71D3EE7C649035A56C9A4029C
2,954,890 UART: [art] PUB.Y = 747548E84864FE4A5A86627C28946F2E1914D64CDC3A0AF07F4091D016AB10D332C125677E01A2BAECCCFA095585229B
2,961,833 UART: [art] SIG.R = E3CDB7F159325DEE07EB77BAF3DD6B60305C63C093B7EAED1E37EA814B48ED618896B9D2D86EE5EE8286BF2D89AFD03A
2,968,624 UART: [art] SIG.S = 26B6C2542ED1881613DD2BCE160AC345FB4C6034BDFE8D3BEF07BC3740C30C5780D93CCA9608266F9BCDD783165949B7
2,992,201 UART: Caliptra RT
2,992,455 UART: [state] CFI Enabled
3,100,491 UART: [rt] RT listening for mailbox commands...
3,101,161 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,366 UART: [rt]cmd =0x4d454153, len=108
3,152,065 >>> mbox cmd response data (12 bytes)
3,152,066 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,127,896 >>> mbox cmd response: success
5,127,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,141,154 UART:
5,141,170 UART: Running Caliptra FMC ...
5,141,578 UART:
5,141,632 UART: [state] CFI Enabled
5,230,491 UART: [art] Extend RT PCRs Done
5,230,919 UART: [art] Lock RT PCRs Done
5,231,954 UART: [art] Populate DV Done
5,240,027 UART: [fht] FMC Alias Private Key: 7
5,241,073 UART: [art] Derive CDI
5,241,353 UART: [art] Store in in slot 0x4
5,327,204 UART: [art] Derive Key Pair
5,327,564 UART: [art] Store priv key in slot 0x5
5,341,046 UART: [art] Derive Key Pair - Done
5,355,756 UART: [art] Signing Cert with AUTHO
5,356,236 UART: RITY.KEYID = 7
5,371,386 UART: [art] Erasing AUTHORITY.KEYID = 7
5,372,151 UART: [art] PUB.X = 21C540894519363E237D9A750A92E1DB5347D634D60D6E58EDC7A0ECA9AFA03F45D4AC6A35B10F2723948AD28563FAB2
5,378,918 UART: [art] PUB.Y = B72CCF6D77FF1B6ECEDDD39B55D713CA1FB306CE4BEA9D361FA670B954770CAD626A38259CC46C71927AFC80EC3A2182
5,385,884 UART: [art] SIG.R = 715931102E0C50655B3086FB35F631D5535F015856B41A3BB4BEC214A15AF2CDEBDD4C8D4C530135750CFADC7FE4DCE8
5,392,654 UART: [art] SIG.S = 35C1EC8FB72C8C996E1CDB7BAF6905EA1271BD7BE31C433B3766E98F34464B834ED3D70B830C68872848FCD3F6B6B6AB
5,416,562 UART: mbox::rt_entry...
5,416,934 UART: ____ _ _ _ ____ _____
5,417,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,418,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,419,286 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,420,054 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,420,822 UART: |_|
5,421,134 UART:
5,700,796 UART: [rt] Runtime listening for mailbox commands...
5,701,967 >>> mbox cmd response data (48 bytes)
5,701,968 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,704,751 >>> mbox cmd response data (48 bytes)
5,704,752 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,719,888 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
893,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,722 UART: [kat] ++
897,874 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
907,113 UART: [kat] SHA2-512-ACC
909,014 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,704 UART: [cold-reset] ++
1,173,234 UART: [fht] FHT @ 0x50003400
1,175,839 UART: [idev] ++
1,176,007 UART: [idev] CDI.KEYID = 6
1,176,367 UART: [idev] SUBJECT.KEYID = 7
1,176,791 UART: [idev] UDS.KEYID = 0
1,177,136 ready_for_fw is high
1,177,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,683 UART: [idev] Erasing UDS.KEYID = 0
1,202,072 UART: [idev] Sha1 KeyId Algorithm
1,210,358 UART: [idev] --
1,211,322 UART: [ldev] ++
1,211,490 UART: [ldev] CDI.KEYID = 6
1,211,853 UART: [ldev] SUBJECT.KEYID = 5
1,212,279 UART: [ldev] AUTHORITY.KEYID = 7
1,212,742 UART: [ldev] FE.KEYID = 1
1,218,158 UART: [ldev] Erasing FE.KEYID = 1
1,244,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,068 UART: [ldev] --
1,283,567 UART: [fwproc] Wait for Commands...
1,284,301 UART: [fwproc] Recv command 0x46574c44
1,285,029 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,289 >>> mbox cmd response: success
2,777,323 UART: [afmc] ++
2,777,491 UART: [afmc] CDI.KEYID = 6
2,777,853 UART: [afmc] SUBJECT.KEYID = 7
2,778,278 UART: [afmc] AUTHORITY.KEYID = 5
2,814,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,897 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,580 UART: [afmc] --
2,857,674 UART: [cold-reset] --
2,858,466 UART: [state] Locking Datavault
2,859,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,341 UART: [state] Locking ICCM
2,860,971 UART: [exit] Launching FMC @ 0x40000130
2,866,300 UART:
2,866,316 UART: Running Caliptra FMC ...
2,866,724 UART:
2,866,867 UART: [state] CFI Enabled
2,877,256 UART: [fht] FMC Alias Private Key: 7
2,985,491 UART: [art] Extend RT PCRs Done
2,985,919 UART: [art] Lock RT PCRs Done
2,987,485 UART: [art] Populate DV Done
2,995,524 UART: [fht] FMC Alias Private Key: 7
2,996,464 UART: [art] Derive CDI
2,996,744 UART: [art] Store in in slot 0x4
3,082,869 UART: [art] Derive Key Pair
3,083,229 UART: [art] Store priv key in slot 0x5
3,096,885 UART: [art] Derive Key Pair - Done
3,111,545 UART: [art] Signing Cert with AUTHO
3,112,025 UART: RITY.KEYID = 7
3,127,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,312 UART: [art] PUB.X = 784DC29C9AC65ADF37E8E5761A61722934662AF5D79A2049F78B77845DE7B9C9C03AED8648864C9972E12F3FFEAF42B1
3,135,088 UART: [art] PUB.Y = 4C41FB1C4BC568284894E56388FC55B78842983E5CCC5250F7A069178BD8C15C4E13576973442C84B018AAB9E975D94D
3,142,034 UART: [art] SIG.R = 818012E3872835EFFAE67FF11433B2E942882DC4B3089B000C736F2E012AC8785B31AFFADED2474CDF4C67E9AC73DB80
3,148,783 UART: [art] SIG.S = CE3162FD27E4A3FA1958578BA2E6BDF083E46B327C9D27D8ECA666370F5977A4A5A68ACD7E4D496705158896FCD50BBC
3,171,921 UART: Caliptra RT
3,172,267 UART: [state] CFI Enabled
3,279,670 UART: [rt] RT listening for mailbox commands...
3,280,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,665 UART: [rt]cmd =0x4d454153, len=108
3,331,308 >>> mbox cmd response data (12 bytes)
3,331,309 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,023 UART:
3,332,039 UART: Running Caliptra ROM ...
3,332,447 UART:
3,332,589 UART: [state] CFI Enabled
3,335,537 UART: [state] LifecycleState = Unprovisioned
3,336,192 UART: [state] DebugLocked = No
3,336,728 UART: [state] WD Timer not started. Device not locked for debugging
3,337,982 UART: [kat] SHA2-256
4,143,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,147,757 UART: [kat] ++
4,147,909 UART: [kat] sha1
4,152,357 UART: [kat] SHA2-256
4,154,297 UART: [kat] SHA2-384
4,157,060 UART: [kat] SHA2-512-ACC
4,158,960 UART: [kat] ECC-384
4,168,591 UART: [kat] HMAC-384Kdf
4,173,109 UART: [kat] LMS
4,421,437 UART: [kat] --
4,422,223 UART: [update-reset] ++
5,326,360 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,327,421 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,423,695 >>> mbox cmd response: success
5,423,695 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,423,992 UART: [update-reset] Copying MAN_2 To MAN_1
5,432,006 UART: [update-reset Success] --
5,432,867 UART: [state] Locking Datavault
5,433,463 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,067 UART: [state] Locking ICCM
5,434,573 UART: [exit] Launching FMC @ 0x40000130
5,439,902 UART:
5,439,918 UART: Running Caliptra FMC ...
5,440,326 UART:
5,440,469 UART: [state] CFI Enabled
5,530,016 UART: [art] Extend RT PCRs Done
5,530,444 UART: [art] Lock RT PCRs Done
5,531,663 UART: [art] Populate DV Done
5,539,878 UART: [fht] FMC Alias Private Key: 7
5,540,956 UART: [art] Derive CDI
5,541,236 UART: [art] Store in in slot 0x4
5,626,729 UART: [art] Derive Key Pair
5,627,089 UART: [art] Store priv key in slot 0x5
5,640,205 UART: [art] Derive Key Pair - Done
5,655,000 UART: [art] Signing Cert with AUTHO
5,655,480 UART: RITY.KEYID = 7
5,671,086 UART: [art] Erasing AUTHORITY.KEYID = 7
5,671,851 UART: [art] PUB.X = 44219A810360DC9BD5334AE1DE8340977EB5A2238553098FAB9D45E9A6DA3893779866017A810ADFADDBE5CE6129E192
5,678,611 UART: [art] PUB.Y = E6E17401DA56269816F31C63C65B703A004FBB509C7C277B2CA5231B532F6F256177A35DB5C3C6FEFA778A6FB2E06F47
5,685,542 UART: [art] SIG.R = 282214C996310F68E8B4F949489378A81FF8ACE2ACC85CFCC04FBD1D8D60852A4973570C7AC685D5D94EB42F8EBE07FB
5,692,315 UART: [art] SIG.S = D4C1EF6E55B106AAD09BF1A2E8D296C331CB18A51FCB69AA39C87CA1F3E50975500880BFDE256AC3DDA7180A9EBA5430
5,716,434 UART: mbox::rt_entry...
5,716,806 UART: ____ _ _ _ ____ _____
5,717,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,718,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,719,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,719,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,720,694 UART: |_|
5,721,006 UART:
5,999,846 UART: [rt] Runtime listening for mailbox commands...
6,001,017 >>> mbox cmd response data (48 bytes)
6,001,018 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,003,801 >>> mbox cmd response data (48 bytes)
6,003,802 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,018,938 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,494 ready_for_fw is high
1,060,494 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,876 >>> mbox cmd response: success
2,688,126 UART:
2,688,142 UART: Running Caliptra FMC ...
2,688,550 UART:
2,688,693 UART: [state] CFI Enabled
2,699,178 UART: [fht] FMC Alias Private Key: 7
2,807,635 UART: [art] Extend RT PCRs Done
2,808,063 UART: [art] Lock RT PCRs Done
2,809,543 UART: [art] Populate DV Done
2,817,890 UART: [fht] FMC Alias Private Key: 7
2,819,066 UART: [art] Derive CDI
2,819,346 UART: [art] Store in in slot 0x4
2,904,949 UART: [art] Derive Key Pair
2,905,309 UART: [art] Store priv key in slot 0x5
2,918,417 UART: [art] Derive Key Pair - Done
2,933,318 UART: [art] Signing Cert with AUTHO
2,933,798 UART: RITY.KEYID = 7
2,948,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,697 UART: [art] PUB.X = BEBF2F3B524A62564745434EAF9CCB17E3C760FE3296AA7F05AB4CB98F398234F47B5A7813495E5AF686D13F14ECC7AA
2,956,478 UART: [art] PUB.Y = D3BCEC7B7E979BE55B60B998A8CA160CA6EBC698068FCCC56F3FC423DF230A4A924978E85E35A0298C5F81AE32F8AAD3
2,963,439 UART: [art] SIG.R = F0B5C76C8B88C8C385E50E2EC5BB87362FDE4E9C2C281A0986FDC8CFE1853E1C7D720B10B56F680F2E10C874B1FAE8F0
2,970,215 UART: [art] SIG.S = AFAE69F2D0D85BE0481AE0CB2D2CF3D78AC305298E54A405780579C00098239D90957F5E0008EE1C0FCB236F0F17129C
2,993,672 UART: Caliptra RT
2,994,018 UART: [state] CFI Enabled
3,100,879 UART: [rt] RT listening for mailbox commands...
3,101,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,790 UART: [rt]cmd =0x4d454153, len=108
3,152,133 >>> mbox cmd response data (12 bytes)
3,152,134 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,126,751 >>> mbox cmd response: success
5,126,751 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,140,535 UART:
5,140,551 UART: Running Caliptra FMC ...
5,140,959 UART:
5,141,102 UART: [state] CFI Enabled
5,230,157 UART: [art] Extend RT PCRs Done
5,230,585 UART: [art] Lock RT PCRs Done
5,232,040 UART: [art] Populate DV Done
5,240,623 UART: [fht] FMC Alias Private Key: 7
5,241,629 UART: [art] Derive CDI
5,241,909 UART: [art] Store in in slot 0x4
5,327,884 UART: [art] Derive Key Pair
5,328,244 UART: [art] Store priv key in slot 0x5
5,341,722 UART: [art] Derive Key Pair - Done
5,356,055 UART: [art] Signing Cert with AUTHO
5,356,535 UART: RITY.KEYID = 7
5,371,361 UART: [art] Erasing AUTHORITY.KEYID = 7
5,372,126 UART: [art] PUB.X = 8ACFFCB930D17767BF28D159FAF81647F7D116E72238D0F3007A105A1FB12DEC58184BF613DADFE49EB5503EC8D2A7D7
5,378,890 UART: [art] PUB.Y = D92AA34B3B0A2944D183EF35BE55F491316BBF4B08120EE4AE331F6EFEB44FF8CD69E24AF05AEE63B39A4DACC79DB2C0
5,385,857 UART: [art] SIG.R = 698FB13218B4B866AC7DA07C6CB7E69FE35CD114DB101C713FD0E2399B413D2A184A2E3F6427FF8D06193B85335E5C9D
5,392,632 UART: [art] SIG.S = 54B10D52AD8FD865E46FACF33AB0CE2728A7BCC58ECB88F71E286F47ED0557770B7C06E42E4B5A1BD2064C51499D0EDD
5,415,497 UART: mbox::rt_entry...
5,415,869 UART: ____ _ _ _ ____ _____
5,416,653 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,417,453 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,418,221 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,418,989 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,419,757 UART: |_|
5,420,069 UART:
5,698,683 UART: [rt] Runtime listening for mailbox commands...
5,699,854 >>> mbox cmd response data (48 bytes)
5,699,855 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,702,638 >>> mbox cmd response data (48 bytes)
5,702,639 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,717,775 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,722 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,641 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 ready_for_fw is high
1,173,987 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,433 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,321 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,582 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,864 >>> mbox cmd response: success
2,774,053 UART: [afmc] ++
2,774,221 UART: [afmc] CDI.KEYID = 6
2,774,584 UART: [afmc] SUBJECT.KEYID = 7
2,775,010 UART: [afmc] AUTHORITY.KEYID = 5
2,810,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,392 UART: [afmc] --
2,854,474 UART: [cold-reset] --
2,855,110 UART: [state] Locking Datavault
2,856,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,873 UART: [state] Locking ICCM
2,857,351 UART: [exit] Launching FMC @ 0x40000130
2,862,680 UART:
2,862,696 UART: Running Caliptra FMC ...
2,863,104 UART:
2,863,158 UART: [state] CFI Enabled
2,873,685 UART: [fht] FMC Alias Private Key: 7
2,982,012 UART: [art] Extend RT PCRs Done
2,982,440 UART: [art] Lock RT PCRs Done
2,984,204 UART: [art] Populate DV Done
2,992,185 UART: [fht] FMC Alias Private Key: 7
2,993,313 UART: [art] Derive CDI
2,993,593 UART: [art] Store in in slot 0x4
3,079,476 UART: [art] Derive Key Pair
3,079,836 UART: [art] Store priv key in slot 0x5
3,093,096 UART: [art] Derive Key Pair - Done
3,108,242 UART: [art] Signing Cert with AUTHO
3,108,722 UART: RITY.KEYID = 7
3,123,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,313 UART: [art] PUB.X = 9735ED450F8B072E1720ED8CB6B40A5BE4313F833B59DA1B4170A86017577B5AFD6AD64B0EC79E3B5F862EBCC9580C4F
3,131,080 UART: [art] PUB.Y = B9AB35F51F41007BB95DB7CF4132B6C29F3A87CD255C6A7BFBDFB5CA3F8EBC2766788F7B0E4F022FA18344AC54DBDC7B
3,138,028 UART: [art] SIG.R = 53C8401E808A3C853692E1C8497C4F90FC4DA925835ED01558807B8E682F8D33F6BFEB3FA53C3306FB8D27C77BF4155E
3,144,799 UART: [art] SIG.S = C8609461DDA493343C03EE8A30E29569830286908EDE4B08025BCD99A9A5752F28B5013E720C92A18A1919CBB298AA9E
3,168,350 UART: Caliptra RT
3,168,604 UART: [state] CFI Enabled
3,275,928 UART: [rt] RT listening for mailbox commands...
3,276,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,827 UART: [rt]cmd =0x4d454153, len=108
3,326,738 >>> mbox cmd response data (12 bytes)
3,326,739 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,351 UART:
3,327,367 UART: Running Caliptra ROM ...
3,327,775 UART:
3,327,830 UART: [state] CFI Enabled
3,330,088 UART: [state] LifecycleState = Unprovisioned
3,330,743 UART: [state] DebugLocked = No
3,331,467 UART: [state] WD Timer not started. Device not locked for debugging
3,332,613 UART: [kat] SHA2-256
4,136,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,140,292 UART: [kat] ++
4,140,444 UART: [kat] sha1
4,144,834 UART: [kat] SHA2-256
4,146,774 UART: [kat] SHA2-384
4,149,431 UART: [kat] SHA2-512-ACC
4,151,331 UART: [kat] ECC-384
4,160,862 UART: [kat] HMAC-384Kdf
4,165,692 UART: [kat] LMS
4,414,004 UART: [kat] --
4,414,778 UART: [update-reset] ++
5,317,364 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,318,415 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,414,689 >>> mbox cmd response: success
5,414,689 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,414,980 UART: [update-reset] Copying MAN_2 To MAN_1
5,422,994 UART: [update-reset Success] --
5,424,029 UART: [state] Locking Datavault
5,424,863 UART: [state] Locking PCR0, PCR1 and PCR31
5,425,467 UART: [state] Locking ICCM
5,426,107 UART: [exit] Launching FMC @ 0x40000130
5,431,436 UART:
5,431,452 UART: Running Caliptra FMC ...
5,431,860 UART:
5,431,914 UART: [state] CFI Enabled
5,520,617 UART: [art] Extend RT PCRs Done
5,521,045 UART: [art] Lock RT PCRs Done
5,522,368 UART: [art] Populate DV Done
5,530,629 UART: [fht] FMC Alias Private Key: 7
5,531,719 UART: [art] Derive CDI
5,531,999 UART: [art] Store in in slot 0x4
5,617,534 UART: [art] Derive Key Pair
5,617,894 UART: [art] Store priv key in slot 0x5
5,631,042 UART: [art] Derive Key Pair - Done
5,645,858 UART: [art] Signing Cert with AUTHO
5,646,338 UART: RITY.KEYID = 7
5,661,664 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,429 UART: [art] PUB.X = B6F38C411430FBACD07F0F76186272DEF1D4374892807F471A5E1203A2CEBEF144B8F67406D4C63C5D091A6DA4369308
5,669,186 UART: [art] PUB.Y = 14A4181D9AA8E05DFCC9CEFCAA5E38E330658D38405088D9B0B899B260F5DAD8FBCAC0D183DEB023A907F0FA8C5A918C
5,676,155 UART: [art] SIG.R = F8C91333A2E53C69A8BAF8EA50713AC0884FFE139498B3E2AB2A2F00835E012054EF54DA58682B2DDB42B987F75D3053
5,682,906 UART: [art] SIG.S = 9223C3B31B28DA2E42BD405D668DC7C494D7A6F3991A3C64FD2D2E405AA83A817DE0176AE9A1D882308F0796528D9416
5,706,448 UART: mbox::rt_entry...
5,706,820 UART: ____ _ _ _ ____ _____
5,707,604 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,708,404 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,709,172 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,709,940 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,710,708 UART: |_|
5,711,020 UART:
5,991,029 UART: [rt] Runtime listening for mailbox commands...
5,992,200 >>> mbox cmd response data (48 bytes)
5,992,201 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,994,984 >>> mbox cmd response data (48 bytes)
5,994,985 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,010,121 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,884 ready_for_fw is high
1,056,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,150 >>> mbox cmd response: success
2,683,248 UART:
2,683,264 UART: Running Caliptra FMC ...
2,683,672 UART:
2,683,726 UART: [state] CFI Enabled
2,694,121 UART: [fht] FMC Alias Private Key: 7
2,801,922 UART: [art] Extend RT PCRs Done
2,802,350 UART: [art] Lock RT PCRs Done
2,803,996 UART: [art] Populate DV Done
2,812,363 UART: [fht] FMC Alias Private Key: 7
2,813,539 UART: [art] Derive CDI
2,813,819 UART: [art] Store in in slot 0x4
2,899,574 UART: [art] Derive Key Pair
2,899,934 UART: [art] Store priv key in slot 0x5
2,913,306 UART: [art] Derive Key Pair - Done
2,928,038 UART: [art] Signing Cert with AUTHO
2,928,518 UART: RITY.KEYID = 7
2,943,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,267 UART: [art] PUB.X = 563A75620663459FC62459601DC6258811FA2CF9CA717EFDA474A543E59DD1D7B774611081544A35482C312A130B5596
2,951,019 UART: [art] PUB.Y = 90E46F1B3A7E020FF88BE4F208844A8611F220B323A901DE8AB7B666E11DB8530A18E1C5D8AB80FB36FE062755AD54CF
2,957,961 UART: [art] SIG.R = 99B738FB166AA12FA5D3C17E045B2F941BE47CAE353C00BBA6FE87A10F8E6C6C585CEB36B276303F50E49FD5EAD8A704
2,964,718 UART: [art] SIG.S = 7062ADC3AABA41FD9687CA42C3CC1971763393B8C37C2B8A4F1F5173BA37CA049404623A5834B20FA9ED14FBF1838F48
2,988,428 UART: Caliptra RT
2,988,682 UART: [state] CFI Enabled
3,096,312 UART: [rt] RT listening for mailbox commands...
3,096,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,179 UART: [rt]cmd =0x4d454153, len=108
3,148,576 >>> mbox cmd response data (12 bytes)
3,148,577 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,119,874 >>> mbox cmd response: success
5,119,874 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,133,428 UART:
5,133,444 UART: Running Caliptra FMC ...
5,133,852 UART:
5,133,906 UART: [state] CFI Enabled
5,222,933 UART: [art] Extend RT PCRs Done
5,223,361 UART: [art] Lock RT PCRs Done
5,224,436 UART: [art] Populate DV Done
5,232,535 UART: [fht] FMC Alias Private Key: 7
5,233,713 UART: [art] Derive CDI
5,233,993 UART: [art] Store in in slot 0x4
5,319,528 UART: [art] Derive Key Pair
5,319,888 UART: [art] Store priv key in slot 0x5
5,332,966 UART: [art] Derive Key Pair - Done
5,348,045 UART: [art] Signing Cert with AUTHO
5,348,525 UART: RITY.KEYID = 7
5,363,935 UART: [art] Erasing AUTHORITY.KEYID = 7
5,364,700 UART: [art] PUB.X = 70059FCCD2D805508C358FAED2BBCDBD0CB96EF35F8F1341B7512687A9D73C00D17DBD079C77D621D949C5417953B66C
5,371,446 UART: [art] PUB.Y = B2D973DF105E0A0767EF78742EE0AB08B670674A10AD9633F69D4B965EC9AE1D29A1DA9C353218D93FA2E6A40DD2E5E7
5,378,396 UART: [art] SIG.R = FACBEF93DFF104E7E6C9D60D67C1811919C92A35878C3C44C348CC5D92DC78AA365AD4C1603C675D99667AC9DBA233F1
5,385,174 UART: [art] SIG.S = 2E8CC1DFA56E728BA7496624A2371BA1269ED21B46FCB9C4F5A4A2BA9E98B86D149D9E42ECBDE8D9252343110CF2AB72
5,408,804 UART: mbox::rt_entry...
5,409,176 UART: ____ _ _ _ ____ _____
5,409,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,410,760 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,411,528 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,412,296 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,413,064 UART: |_|
5,413,376 UART:
5,690,126 UART: [rt] Runtime listening for mailbox commands...
5,691,297 >>> mbox cmd response data (48 bytes)
5,691,298 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,694,081 >>> mbox cmd response data (48 bytes)
5,694,082 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,709,218 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
915,661 UART: [kat] HMAC-384Kdf
920,225 UART: [kat] LMS
1,168,537 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,173,866 ready_for_fw is high
1,173,866 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,207,706 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,152 UART: [fwproc] Recv command 0x46574c44
1,282,885 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,203 >>> mbox cmd response: success
2,774,442 UART: [afmc] ++
2,774,610 UART: [afmc] CDI.KEYID = 6
2,774,973 UART: [afmc] SUBJECT.KEYID = 7
2,775,399 UART: [afmc] AUTHORITY.KEYID = 5
2,810,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,752 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,635 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,354 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,235 UART: [afmc] --
2,854,247 UART: [cold-reset] --
2,855,189 UART: [state] Locking Datavault
2,856,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,970 UART: [state] Locking ICCM
2,857,474 UART: [exit] Launching FMC @ 0x40000130
2,862,803 UART:
2,862,819 UART: Running Caliptra FMC ...
2,863,227 UART:
2,863,370 UART: [state] CFI Enabled
2,874,027 UART: [fht] FMC Alias Private Key: 7
2,982,300 UART: [art] Extend RT PCRs Done
2,982,728 UART: [art] Lock RT PCRs Done
2,984,090 UART: [art] Populate DV Done
2,992,505 UART: [fht] FMC Alias Private Key: 7
2,993,437 UART: [art] Derive CDI
2,993,717 UART: [art] Store in in slot 0x4
3,079,426 UART: [art] Derive Key Pair
3,079,786 UART: [art] Store priv key in slot 0x5
3,093,166 UART: [art] Derive Key Pair - Done
3,107,978 UART: [art] Signing Cert with AUTHO
3,108,458 UART: RITY.KEYID = 7
3,123,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,709 UART: [art] PUB.X = CF04338BA572114F14921BF1BDFDB81FA5638A480F09AEAA02F4D273D0D03C1FE5E94A65691C2B5D475740CBD7B742F8
3,131,479 UART: [art] PUB.Y = E3A36AD8FC3DA4D6029AA153C73817493DE352E1E3B1548AC0E1932950DC2B811D296FB837F4153766155F80E3A367CC
3,138,428 UART: [art] SIG.R = 6067410DD74F41457F6123881EB48AFF9DE7BC30540B66D82732293CB63564CA099BC5D855075B56E74EF37BA736D36B
3,145,184 UART: [art] SIG.S = 2FAFED2FE0FF703170FC83D7C9D2ED1439F56F5DCD98B46ACB93BE92419BEFA8AF299AC6D1988EE9A7D20524CDE08D00
3,168,608 UART: Caliptra RT
3,168,954 UART: [state] CFI Enabled
3,276,042 UART: [rt] RT listening for mailbox commands...
3,276,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,825 UART: [rt]cmd =0x4d454153, len=108
3,327,018 >>> mbox cmd response data (12 bytes)
3,327,019 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,907 UART:
3,327,923 UART: Running Caliptra ROM ...
3,328,331 UART:
3,328,473 UART: [state] CFI Enabled
3,331,327 UART: [state] LifecycleState = Unprovisioned
3,331,982 UART: [state] DebugLocked = No
3,332,512 UART: [state] WD Timer not started. Device not locked for debugging
3,333,720 UART: [kat] SHA2-256
4,137,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,141,399 UART: [kat] ++
4,141,551 UART: [kat] sha1
4,145,815 UART: [kat] SHA2-256
4,147,755 UART: [kat] SHA2-384
4,150,602 UART: [kat] SHA2-512-ACC
4,152,502 UART: [kat] ECC-384
4,162,789 UART: [kat] HMAC-384Kdf
4,167,525 UART: [kat] LMS
4,415,837 UART: [kat] --
4,416,753 UART: [update-reset] ++
5,320,691 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,321,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,418,064 >>> mbox cmd response: success
5,418,064 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,418,301 UART: [update-reset] Copying MAN_2 To MAN_1
5,426,315 UART: [update-reset Success] --
5,427,268 UART: [state] Locking Datavault
5,428,090 UART: [state] Locking PCR0, PCR1 and PCR31
5,428,694 UART: [state] Locking ICCM
5,429,142 UART: [exit] Launching FMC @ 0x40000130
5,434,471 UART:
5,434,487 UART: Running Caliptra FMC ...
5,434,895 UART:
5,435,038 UART: [state] CFI Enabled
5,524,005 UART: [art] Extend RT PCRs Done
5,524,433 UART: [art] Lock RT PCRs Done
5,525,776 UART: [art] Populate DV Done
5,533,941 UART: [fht] FMC Alias Private Key: 7
5,535,073 UART: [art] Derive CDI
5,535,353 UART: [art] Store in in slot 0x4
5,620,862 UART: [art] Derive Key Pair
5,621,222 UART: [art] Store priv key in slot 0x5
5,634,258 UART: [art] Derive Key Pair - Done
5,648,969 UART: [art] Signing Cert with AUTHO
5,649,449 UART: RITY.KEYID = 7
5,664,631 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,396 UART: [art] PUB.X = C0E67F40F1CED01BF4EB0148A8C7CB4826C64BD2353CDB6B0F4FEC3B50D259AE1EC2F84CD351446DC545003B3CD4494A
5,672,158 UART: [art] PUB.Y = 21773B3CBD314D380A90CAE759C164ABF66ED1FF189C569D86C4ADC47C927403998E23BF707EF3B23EE1A4FA5517B019
5,679,112 UART: [art] SIG.R = EBEA5257024493C3E56B4478CF42F66FA7B366923E1DECAC603AC200E4D190D8F7758291939404DFE2E61D83FE1EBEA8
5,685,864 UART: [art] SIG.S = CD2D99FC96FD4D9D9FDB4CE1FDBC5FD74EE1F28D19BAF08EA0B9521F72272FACA6D0C781B1FC86CDAEF811F7B368CCCC
5,709,479 UART: mbox::rt_entry...
5,709,851 UART: ____ _ _ _ ____ _____
5,710,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,711,435 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,712,203 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,712,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,713,739 UART: |_|
5,714,051 UART:
5,996,762 UART: [rt] Runtime listening for mailbox commands...
5,997,933 >>> mbox cmd response data (48 bytes)
5,997,934 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,000,717 >>> mbox cmd response data (48 bytes)
6,000,718 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,015,854 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,737 ready_for_fw is high
1,056,737 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,033 >>> mbox cmd response: success
2,686,909 UART:
2,686,925 UART: Running Caliptra FMC ...
2,687,333 UART:
2,687,476 UART: [state] CFI Enabled
2,697,931 UART: [fht] FMC Alias Private Key: 7
2,805,728 UART: [art] Extend RT PCRs Done
2,806,156 UART: [art] Lock RT PCRs Done
2,807,842 UART: [art] Populate DV Done
2,815,979 UART: [fht] FMC Alias Private Key: 7
2,816,947 UART: [art] Derive CDI
2,817,227 UART: [art] Store in in slot 0x4
2,902,864 UART: [art] Derive Key Pair
2,903,224 UART: [art] Store priv key in slot 0x5
2,916,812 UART: [art] Derive Key Pair - Done
2,931,222 UART: [art] Signing Cert with AUTHO
2,931,702 UART: RITY.KEYID = 7
2,946,726 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,491 UART: [art] PUB.X = 13CF134DF4700F7130ED14AF39346CF32CE454B71B08253C88E9B3B9CD58D2977AE58E34279EB68AFB90D53CC03D00C9
2,954,241 UART: [art] PUB.Y = 276124255B40EA0DD116ACB0F09A2A0B5241EBED2977138A3E1355832F189C322AE0690A6B1AC7278A4DE764FD1D0799
2,961,181 UART: [art] SIG.R = 2181A953165812373F81D2EF78F4876CF51409F6E23B50658DCE1F0B070083C5DC150C613BEF280220E7D7749384BCF4
2,967,908 UART: [art] SIG.S = 77B96253DFD2E6C1ACBFF1522384B4F12D172764182FD5533E5BF4627BDFD1BBE70C9F2D8987D509A97135D649CF4780
2,991,739 UART: Caliptra RT
2,992,085 UART: [state] CFI Enabled
3,100,055 UART: [rt] RT listening for mailbox commands...
3,100,725 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,776 UART: [rt]cmd =0x4d454153, len=108
3,151,851 >>> mbox cmd response data (12 bytes)
3,151,852 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,122,638 >>> mbox cmd response: success
5,122,638 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,135,806 UART:
5,135,822 UART: Running Caliptra FMC ...
5,136,230 UART:
5,136,373 UART: [state] CFI Enabled
5,225,468 UART: [art] Extend RT PCRs Done
5,225,896 UART: [art] Lock RT PCRs Done
5,227,249 UART: [art] Populate DV Done
5,235,472 UART: [fht] FMC Alias Private Key: 7
5,236,606 UART: [art] Derive CDI
5,236,886 UART: [art] Store in in slot 0x4
5,322,915 UART: [art] Derive Key Pair
5,323,275 UART: [art] Store priv key in slot 0x5
5,336,817 UART: [art] Derive Key Pair - Done
5,351,978 UART: [art] Signing Cert with AUTHO
5,352,458 UART: RITY.KEYID = 7
5,367,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,368,071 UART: [art] PUB.X = 0A8834C7300299282F9F0AC09366171CBC5007B57A9539CDCF8A0832CF4CAC329CEF922C2A349E3BA186B566BC69F924
5,374,830 UART: [art] PUB.Y = 11DA14DC0AD1CF61FBA2865E6050D1E9DE86C1BE5F4433327C2C4562A21C689DE711809F67F1F16AE335E7EEAB1897D7
5,381,789 UART: [art] SIG.R = 2B8836D96039A62D99826D4BF54A74A5FC90ECC9E7E5BF7FD0CEB572536FF5CB73C011BD256854261EDF3F0BB0E21D72
5,388,570 UART: [art] SIG.S = 310F34AE75DE648285835F68867FFA9EBD645E7A850D4A48C0C10B9FA079350444A1B912523F1374D78226F315681082
5,412,811 UART: mbox::rt_entry...
5,413,183 UART: ____ _ _ _ ____ _____
5,413,967 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,414,767 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,415,535 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,416,303 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,417,071 UART: |_|
5,417,383 UART:
5,694,141 UART: [rt] Runtime listening for mailbox commands...
5,695,312 >>> mbox cmd response data (48 bytes)
5,695,313 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,698,096 >>> mbox cmd response data (48 bytes)
5,698,097 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,713,233 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,431 UART:
192,799 UART: Running Caliptra ROM ...
193,927 UART:
194,065 UART: [state] CFI Enabled
265,734 UART: [state] LifecycleState = Unprovisioned
267,708 UART: [state] DebugLocked = No
269,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,208 UART: [kat] SHA2-256
444,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,401 UART: [kat] ++
455,998 UART: [kat] sha1
468,116 UART: [kat] SHA2-256
470,817 UART: [kat] SHA2-384
477,304 UART: [kat] SHA2-512-ACC
479,666 UART: [kat] ECC-384
2,768,192 UART: [kat] HMAC-384Kdf
2,799,749 UART: [kat] LMS
3,990,062 UART: [kat] --
3,994,218 UART: [cold-reset] ++
3,996,714 UART: [fht] Storing FHT @ 0x50003400
4,008,824 UART: [idev] ++
4,009,395 UART: [idev] CDI.KEYID = 6
4,010,423 UART: [idev] SUBJECT.KEYID = 7
4,011,592 UART: [idev] UDS.KEYID = 0
4,012,636 ready_for_fw is high
4,012,853 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,342 UART: [idev] Erasing UDS.KEYID = 0
7,348,025 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,397 UART: [idev] --
7,373,820 UART: [ldev] ++
7,374,383 UART: [ldev] CDI.KEYID = 6
7,375,330 UART: [ldev] SUBJECT.KEYID = 5
7,376,589 UART: [ldev] AUTHORITY.KEYID = 7
7,377,733 UART: [ldev] FE.KEYID = 1
7,422,205 UART: [ldev] Erasing FE.KEYID = 1
10,754,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,687 UART: [ldev] --
13,138,275 UART: [fwproc] Waiting for Commands...
13,140,852 UART: [fwproc] Received command 0x46574c44
13,143,081 UART: [fwproc] Received Image of size 114036 bytes
17,191,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,947 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,650,615 >>> mbox cmd response: success
17,651,165 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,654,239 UART: [afmc] ++
17,654,819 UART: [afmc] CDI.KEYID = 6
17,655,778 UART: [afmc] SUBJECT.KEYID = 7
17,656,988 UART: [afmc] AUTHORITY.KEYID = 5
21,032,321 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,757 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,016 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,456 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,240 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,717 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,934 UART: [afmc] --
23,401,117 UART: [cold-reset] --
23,404,750 UART: [state] Locking Datavault
23,409,013 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,781 UART: [state] Locking ICCM
23,412,329 UART: [exit] Launching FMC @ 0x40000130
23,420,717 UART:
23,420,944 UART: Running Caliptra FMC ...
23,422,038 UART:
23,422,191 UART: [state] CFI Enabled
23,490,779 UART: [fht] FMC Alias Private Key: 7
25,828,326 UART: [art] Extend RT PCRs Done
25,829,544 UART: [art] Lock RT PCRs Done
25,831,378 UART: [art] Populate DV Done
25,836,884 UART: [fht] FMC Alias Private Key: 7
25,838,522 UART: [art] Derive CDI
25,839,339 UART: [art] Store in in slot 0x4
25,899,047 UART: [art] Derive Key Pair
25,900,042 UART: [art] Store priv key in slot 0x5
29,193,266 UART: [art] Derive Key Pair - Done
29,206,794 UART: [art] Signing Cert with AUTHO
29,208,097 UART: RITY.KEYID = 7
31,495,119 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,624 UART: [art] PUB.X = 2D39F2D2DF07674F4768BE85CDA94D990A4C60C496793A9C021464CAF0348D650A6982EF9975311C47911AECABFA4906
31,503,877 UART: [art] PUB.Y = AA94F504412F4079505DA940E7BC431FD7814E86D6D6411D93E20FE5B14BB1E43797878DD5E29118ABE73BE04969AEC2
31,511,134 UART: [art] SIG.R = BA8912E3214ACB5E7A46CB7F8DAA81BE0E2D43C256EECED3FFF20A93AD59D4B6994539411E99655B9BEF4EF46B657D8C
31,518,514 UART: [art] SIG.S = C6ABDEC2B8786557A07D2AC725FB9AD1664AAB7C4858293EFC10996910BD7F228E8688F780447FC4F36F1FEE48D4ED4A
32,824,016 UART: Caliptra RT
32,824,716 UART: [state] CFI Enabled
32,986,197 UART: [rt] RT listening for mailbox commands...
33,017,443 UART: [rt]cmd =0x54514754, len=24
33,019,756 >>> mbox cmd response data (8 bytes)
33,020,208 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,050,280 UART: [rt]cmd =0x54514754, len=24
33,052,068 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,781 writing to cptra_bootfsm_go
3,806,867 ready_for_fw is high
3,807,378 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,909,447 >>> mbox cmd response: success
17,910,111 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,604,354 UART:
23,604,746 UART: Running Caliptra FMC ...
23,605,939 UART:
23,606,100 UART: [state] CFI Enabled
23,658,269 UART: [fht] FMC Alias Private Key: 7
25,995,745 UART: [art] Extend RT PCRs Done
25,997,032 UART: [art] Lock RT PCRs Done
25,998,575 UART: [art] Populate DV Done
26,004,198 UART: [fht] FMC Alias Private Key: 7
26,005,788 UART: [art] Derive CDI
26,006,618 UART: [art] Store in in slot 0x4
26,066,184 UART: [art] Derive Key Pair
26,067,186 UART: [art] Store priv key in slot 0x5
29,360,298 UART: [art] Derive Key Pair - Done
29,373,421 UART: [art] Signing Cert with AUTHO
29,374,755 UART: RITY.KEYID = 7
31,662,372 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,874 UART: [art] PUB.X = B389625939E46D141A3CEBF581764DB1437E741F7A4D92D1AC7E720B3F830CC3693573EFE777091C50D60E7D408D3EA9
31,671,106 UART: [art] PUB.Y = 42DF25497FF260CF15D269D6DEA0F893F587B27A49BE218605CC0484FFBB3FEE638605D34F0572E4EEB8F500838CD87A
31,678,326 UART: [art] SIG.R = DAB6B7501DC7DA3CD26F7700BCE2092B5290F6EAC00D8C07C18C9A9A5E6C7AE4DF19296CD01023ABDF5ACDFC7D559ED8
31,685,755 UART: [art] SIG.S = 68E8E58A1B98F841C5171C632A6B35B84298F03ADF2906A81100CB71923C90F78071D78AE8695D7907FB2E8DA9070B31
32,991,644 UART: Caliptra RT
32,992,381 UART: [state] CFI Enabled
33,153,642 UART: [rt] RT listening for mailbox commands...
33,184,911 UART: [rt]cmd =0x54514754, len=24
33,187,599 >>> mbox cmd response data (8 bytes)
33,188,159 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,217,990 UART: [rt]cmd =0x54514754, len=24
33,219,729 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,363 UART:
192,824 UART: Running Caliptra ROM ...
193,974 UART:
603,719 UART: [state] CFI Enabled
618,673 UART: [state] LifecycleState = Unprovisioned
620,546 UART: [state] DebugLocked = No
623,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,935 UART: [kat] SHA2-256
797,675 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,263 UART: [kat] ++
808,816 UART: [kat] sha1
819,625 UART: [kat] SHA2-256
822,342 UART: [kat] SHA2-384
826,905 UART: [kat] SHA2-512-ACC
829,266 UART: [kat] ECC-384
3,114,323 UART: [kat] HMAC-384Kdf
3,126,560 UART: [kat] LMS
4,316,689 UART: [kat] --
4,320,891 UART: [cold-reset] ++
4,322,178 UART: [fht] Storing FHT @ 0x50003400
4,332,731 UART: [idev] ++
4,333,299 UART: [idev] CDI.KEYID = 6
4,334,182 UART: [idev] SUBJECT.KEYID = 7
4,335,448 UART: [idev] UDS.KEYID = 0
4,336,407 ready_for_fw is high
4,336,626 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,945 UART: [idev] Erasing UDS.KEYID = 0
7,623,412 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,275 UART: [idev] --
7,649,113 UART: [ldev] ++
7,649,681 UART: [ldev] CDI.KEYID = 6
7,650,619 UART: [ldev] SUBJECT.KEYID = 5
7,651,825 UART: [ldev] AUTHORITY.KEYID = 7
7,653,108 UART: [ldev] FE.KEYID = 1
7,665,993 UART: [ldev] Erasing FE.KEYID = 1
10,950,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,729 UART: [ldev] --
13,308,858 UART: [fwproc] Waiting for Commands...
13,311,021 UART: [fwproc] Received command 0x46574c44
13,313,202 UART: [fwproc] Received Image of size 114036 bytes
17,367,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,832,543 >>> mbox cmd response: success
17,833,089 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,836,432 UART: [afmc] ++
17,837,012 UART: [afmc] CDI.KEYID = 6
17,837,980 UART: [afmc] SUBJECT.KEYID = 7
17,839,192 UART: [afmc] AUTHORITY.KEYID = 5
21,150,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,717 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,117 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,934 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,443 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,184 UART: [afmc] --
23,512,454 UART: [cold-reset] --
23,515,831 UART: [state] Locking Datavault
23,520,588 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,349 UART: [state] Locking ICCM
23,524,204 UART: [exit] Launching FMC @ 0x40000130
23,532,596 UART:
23,532,832 UART: Running Caliptra FMC ...
23,533,933 UART:
23,534,092 UART: [state] CFI Enabled
23,542,192 UART: [fht] FMC Alias Private Key: 7
25,873,036 UART: [art] Extend RT PCRs Done
25,874,260 UART: [art] Lock RT PCRs Done
25,875,856 UART: [art] Populate DV Done
25,880,959 UART: [fht] FMC Alias Private Key: 7
25,882,503 UART: [art] Derive CDI
25,883,275 UART: [art] Store in in slot 0x4
25,925,979 UART: [art] Derive Key Pair
25,926,983 UART: [art] Store priv key in slot 0x5
29,169,109 UART: [art] Derive Key Pair - Done
29,182,369 UART: [art] Signing Cert with AUTHO
29,183,664 UART: RITY.KEYID = 7
31,462,972 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,475 UART: [art] PUB.X = 89F3972145020EFB03A68756389C76A7392D62FC731DEF01EBB8BDB6066A679A839F4E2CF60ECB0F8B540785CFFC3399
31,471,728 UART: [art] PUB.Y = B357906846E9A04C7FB012B9226E266C74D3EA92079F82BBB54D519EFDDE2207027AC06C5FBAE18858D028BFAD25DF3A
31,479,017 UART: [art] SIG.R = 318250BD7DE2326E2801449200C9E9BAA5D4E119A283B596E5730CA610DA4B04F71AB8DCBCFB1060532AB1E5D398D36A
31,486,391 UART: [art] SIG.S = B7B44DD6E6FB8B552DEE051CA81B606649C6A579F2C57A3B4013497894931D09AE836FFC45966139A8DA9103DC9947C1
32,792,018 UART: Caliptra RT
32,792,731 UART: [state] CFI Enabled
32,909,734 UART: [rt] RT listening for mailbox commands...
32,941,076 UART: [rt]cmd =0x54514754, len=24
32,943,657 >>> mbox cmd response data (8 bytes)
32,944,163 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,973,956 UART: [rt]cmd =0x54514754, len=24
32,975,928 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
4,127,321 ready_for_fw is high
4,127,885 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,065,223 >>> mbox cmd response: success
18,065,870 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,708,377 UART:
23,708,769 UART: Running Caliptra FMC ...
23,709,880 UART:
23,710,035 UART: [state] CFI Enabled
23,717,874 UART: [fht] FMC Alias Private Key: 7
26,048,837 UART: [art] Extend RT PCRs Done
26,050,058 UART: [art] Lock RT PCRs Done
26,051,628 UART: [art] Populate DV Done
26,057,150 UART: [fht] FMC Alias Private Key: 7
26,058,858 UART: [art] Derive CDI
26,059,676 UART: [art] Store in in slot 0x4
26,102,546 UART: [art] Derive Key Pair
26,103,589 UART: [art] Store priv key in slot 0x5
29,346,082 UART: [art] Derive Key Pair - Done
29,358,804 UART: [art] Signing Cert with AUTHO
29,360,106 UART: RITY.KEYID = 7
31,639,274 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,785 UART: [art] PUB.X = AE8B4BF1E9F73BD94A6F4E0C94CC381839115DCF6AE11DBF01C6FC5FD8CD79912E3EAB1EB95E4C72487BFC21CEF6EFE8
31,648,049 UART: [art] PUB.Y = 93C90832C8FB3B86553F3552285271A1D557FBE7F4C744D8C28F304B84CB158F14EC8EA76722E5D9DEB0A580BFB6F7D8
31,655,299 UART: [art] SIG.R = 1520FFD6AFB2A46AFFC1D3572CC941B8DF4B3C484007783745E36813EC2531F8857A2E830F167C0176F77D4DDC6585B4
31,662,670 UART: [art] SIG.S = 142DAA8E30445715A729BE12B5460DD5765C12AC7E8584C588DF02F95F6A44C4B721D3687655750AAA47F3FB9B358E1F
32,967,905 UART: Caliptra RT
32,968,592 UART: [state] CFI Enabled
33,087,237 UART: [rt] RT listening for mailbox commands...
33,118,325 UART: [rt]cmd =0x54514754, len=24
33,121,014 >>> mbox cmd response data (8 bytes)
33,121,446 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,151,412 UART: [rt]cmd =0x54514754, len=24
33,153,195 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
192,672 UART:
193,036 UART: Running Caliptra ROM ...
194,179 UART:
194,327 UART: [state] CFI Enabled
262,904 UART: [state] LifecycleState = Unprovisioned
264,779 UART: [state] DebugLocked = No
266,448 UART: [state] WD Timer not started. Device not locked for debugging
269,339 UART: [kat] SHA2-256
448,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,064 UART: [kat] ++
460,614 UART: [kat] sha1
473,201 UART: [kat] SHA2-256
476,278 UART: [kat] SHA2-384
482,485 UART: [kat] SHA2-512-ACC
485,492 UART: [kat] ECC-384
2,948,418 UART: [kat] HMAC-384Kdf
2,971,132 UART: [kat] LMS
3,500,590 UART: [kat] --
3,504,256 UART: [cold-reset] ++
3,506,200 UART: [fht] FHT @ 0x50003400
3,517,250 UART: [idev] ++
3,517,822 UART: [idev] CDI.KEYID = 6
3,518,706 UART: [idev] SUBJECT.KEYID = 7
3,519,827 UART: [idev] UDS.KEYID = 0
3,520,810 ready_for_fw is high
3,521,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,931 UART: [idev] Erasing UDS.KEYID = 0
6,025,237 UART: [idev] Sha1 KeyId Algorithm
6,047,964 UART: [idev] --
6,051,936 UART: [ldev] ++
6,052,522 UART: [ldev] CDI.KEYID = 6
6,053,430 UART: [ldev] SUBJECT.KEYID = 5
6,054,538 UART: [ldev] AUTHORITY.KEYID = 7
6,055,832 UART: [ldev] FE.KEYID = 1
6,098,205 UART: [ldev] Erasing FE.KEYID = 1
8,602,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,496 UART: [ldev] --
10,410,814 UART: [fwproc] Wait for Commands...
10,413,174 UART: [fwproc] Recv command 0x46574c44
10,415,266 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,287,870 >>> mbox cmd response: success
14,288,404 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,291,310 UART: [afmc] ++
14,291,894 UART: [afmc] CDI.KEYID = 6
14,292,779 UART: [afmc] SUBJECT.KEYID = 7
14,293,996 UART: [afmc] AUTHORITY.KEYID = 5
16,823,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,657 UART: [afmc] --
18,625,578 UART: [cold-reset] --
18,630,625 UART: [state] Locking Datavault
18,637,167 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,839 UART: [state] Locking ICCM
18,641,370 UART: [exit] Launching FMC @ 0x40000130
18,649,774 UART:
18,650,008 UART: Running Caliptra FMC ...
18,651,117 UART:
18,651,273 UART: [state] CFI Enabled
18,707,729 UART: [fht] FMC Alias Private Key: 7
20,471,949 UART: [art] Extend RT PCRs Done
20,473,164 UART: [art] Lock RT PCRs Done
20,474,865 UART: [art] Populate DV Done
20,480,487 UART: [fht] FMC Alias Private Key: 7
20,482,030 UART: [art] Derive CDI
20,482,771 UART: [art] Store in in slot 0x4
20,540,384 UART: [art] Derive Key Pair
20,541,424 UART: [art] Store priv key in slot 0x5
23,004,580 UART: [art] Derive Key Pair - Done
23,017,503 UART: [art] Signing Cert with AUTHO
23,018,816 UART: RITY.KEYID = 7
24,729,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,365 UART: [art] PUB.X = 20CC07D2214D268DF578CCCE05A0133EB8380D96101410EF75709A6EBB58B6980ECFD42EB5116CB7591F2598BB6D114D
24,738,661 UART: [art] PUB.Y = 0F13BF0583F8CBE1A1964D147A89A072C381F294DFA62ED230540AE18D08E1A5D98729C806F3C45594DED034FD7A18C9
24,745,881 UART: [art] SIG.R = 92E1B8F11ABDD613185D2A113AA7D4D6670AF5F7858BDE1A3BD5E15003F45792CDED376F9CFE19BCE12886236F1AA02D
24,753,347 UART: [art] SIG.S = 52195AEEA3FC83C4E9C9FC9BC7E7070ECB28969B509E8EB52E590F76D3ABE8CEF9739693EECF33E6B2A7CDCBC98FFCFD
25,731,862 UART: Caliptra RT
25,732,551 UART: [state] CFI Enabled
25,897,148 UART: [rt] RT listening for mailbox commands...
25,928,343 UART: [rt]cmd =0x54514754, len=24
25,931,198 >>> mbox cmd response data (8 bytes)
25,931,639 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,961,317 UART: [rt]cmd =0x54514754, len=24
25,963,166 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,412 UART:
192,814 UART: Running Caliptra ROM ...
193,990 UART:
194,149 UART: [state] CFI Enabled
267,815 UART: [state] LifecycleState = Unprovisioned
270,245 UART: [state] DebugLocked = No
272,492 UART: [state] WD Timer not started. Device not locked for debugging
277,380 UART: [kat] SHA2-256
467,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,029 UART: [kat] ++
478,479 UART: [kat] sha1
491,265 UART: [kat] SHA2-256
494,269 UART: [kat] SHA2-384
501,638 UART: [kat] SHA2-512-ACC
504,261 UART: [kat] ECC-384
2,969,796 UART: [kat] HMAC-384Kdf
2,992,913 UART: [kat] LMS
3,524,730 UART: [kat] --
3,528,372 UART: [cold-reset] ++
3,529,736 UART: [fht] FHT @ 0x50003400
3,541,442 UART: [idev] ++
3,542,121 UART: [idev] CDI.KEYID = 6
3,543,076 UART: [idev] SUBJECT.KEYID = 7
3,544,204 UART: [idev] UDS.KEYID = 0
3,545,191 ready_for_fw is high
3,545,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,689,072 UART: [idev] Erasing UDS.KEYID = 0
6,048,536 UART: [idev] Sha1 KeyId Algorithm
6,070,127 UART: [idev] --
6,074,830 UART: [ldev] ++
6,075,575 UART: [ldev] CDI.KEYID = 6
6,076,493 UART: [ldev] SUBJECT.KEYID = 5
6,077,655 UART: [ldev] AUTHORITY.KEYID = 7
6,078,852 UART: [ldev] FE.KEYID = 1
6,121,111 UART: [ldev] Erasing FE.KEYID = 1
8,628,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,845 UART: [ldev] --
10,434,232 UART: [fwproc] Wait for Commands...
10,436,392 UART: [fwproc] Recv command 0x46574c44
10,438,649 UART: [fwproc] Recv'd Img size: 114360 bytes
13,885,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,624,254 >>> mbox cmd response: success
14,624,814 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,628,459 UART: [afmc] ++
14,629,161 UART: [afmc] CDI.KEYID = 6
14,630,351 UART: [afmc] SUBJECT.KEYID = 7
14,631,844 UART: [afmc] AUTHORITY.KEYID = 5
17,173,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,916,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,918,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,933,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,948,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,963,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,986,992 UART: [afmc] --
18,990,680 UART: [cold-reset] --
18,994,548 UART: [state] Locking Datavault
18,999,913 UART: [state] Locking PCR0, PCR1 and PCR31
19,002,106 UART: [state] Locking ICCM
19,003,452 UART: [exit] Launching FMC @ 0x40000130
19,012,150 UART:
19,012,391 UART: Running Caliptra FMC ...
19,013,497 UART:
19,013,656 UART: [state] CFI Enabled
19,072,685 UART: [fht] FMC Alias Private Key: 7
20,836,742 UART: [art] Extend RT PCRs Done
20,837,960 UART: [art] Lock RT PCRs Done
20,839,450 UART: [art] Populate DV Done
20,844,915 UART: [fht] FMC Alias Private Key: 7
20,846,562 UART: [art] Derive CDI
20,847,375 UART: [art] Store in in slot 0x4
20,905,475 UART: [art] Derive Key Pair
20,906,515 UART: [art] Store priv key in slot 0x5
23,369,350 UART: [art] Derive Key Pair - Done
23,382,496 UART: [art] Signing Cert with AUTHO
23,383,829 UART: RITY.KEYID = 7
25,095,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,535 UART: [art] PUB.X = C69534B18AC69A0F7776FCD170BB185BC96F46E5BCBCB0CA90729D7F5429C6BA4B2D28EE484FDA0E0439F928E8D8CAA5
25,103,772 UART: [art] PUB.Y = CC9E9FFEC636B2FC5B8EB39E346736E6D6059F919B70527665A663F74D4654E45EEF371F5BBA272051847FACA4BC17E0
25,111,047 UART: [art] SIG.R = 8AB7D44AE90BEEAD1E595FD3A518E3185FE85EFF5407539F73A62A4393EB3E55B69B53AF3959A0D92FD1382ED5F3A632
25,118,488 UART: [art] SIG.S = 5903E59AD73F651ADB1FD3C4D707D279787098E5C64DD46CF52DAF6A4AFD77ECEC2913BBD6191C7C5ED6A65CB8CD14A5
26,097,140 UART: Caliptra RT
26,097,834 UART: [state] CFI Enabled
26,261,955 UART: [rt] RT listening for mailbox commands...
26,293,109 UART: [rt]cmd =0x54514754, len=24
26,295,806 >>> mbox cmd response data (8 bytes)
26,296,339 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,326,241 UART: [rt]cmd =0x54514754, len=24
26,327,942 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,438,855 ready_for_fw is high
3,439,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,734,196 >>> mbox cmd response: success
14,735,019 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,025,784 UART:
19,026,162 UART: Running Caliptra FMC ...
19,027,370 UART:
19,027,555 UART: [state] CFI Enabled
19,094,124 UART: [fht] FMC Alias Private Key: 7
20,858,450 UART: [art] Extend RT PCRs Done
20,859,682 UART: [art] Lock RT PCRs Done
20,861,528 UART: [art] Populate DV Done
20,867,158 UART: [fht] FMC Alias Private Key: 7
20,868,651 UART: [art] Derive CDI
20,869,417 UART: [art] Store in in slot 0x4
20,918,340 UART: [art] Derive Key Pair
20,919,387 UART: [art] Store priv key in slot 0x5
23,382,531 UART: [art] Derive Key Pair - Done
23,395,640 UART: [art] Signing Cert with AUTHO
23,396,953 UART: RITY.KEYID = 7
25,107,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,506 UART: [art] PUB.X = F4DD488A01D08CBF383C0A3E3A29A5A7F44A15FC6E22C4C97AC528D8F0892536EAD94B1A5F27985E5CE97F19BB7E784F
25,116,745 UART: [art] PUB.Y = BFE09F784FBD0F74742DC7A2BF94F88792C5ACEF81F34064AC3C6A75DDE060B1F17A38B4A389B492104A7020438077BD
25,124,050 UART: [art] SIG.R = 5F7F59BB17E1A0FC0BFF94FE80D6DB2BE379E29E8EE098CED911680C12F3740B2FC6B346579A90E6FFE7F944A5C37474
25,131,449 UART: [art] SIG.S = 4577A29ED94D709D0DB798B7A549AB695763503035BA6816871ADE3706D3E25035FD0EEE2452336DCFEF062D7FA89D63
26,110,254 UART: Caliptra RT
26,110,946 UART: [state] CFI Enabled
26,275,821 UART: [rt] RT listening for mailbox commands...
26,306,903 UART: [rt]cmd =0x54514754, len=24
26,309,325 >>> mbox cmd response data (8 bytes)
26,309,861 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,339,709 UART: [rt]cmd =0x54514754, len=24
26,341,453 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,216 writing to cptra_bootfsm_go
193,466 UART:
193,827 UART: Running Caliptra ROM ...
194,913 UART:
604,403 UART: [state] CFI Enabled
617,201 UART: [state] LifecycleState = Unprovisioned
619,570 UART: [state] DebugLocked = No
620,730 UART: [state] WD Timer not started. Device not locked for debugging
624,551 UART: [kat] SHA2-256
814,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,149 UART: [kat] ++
825,697 UART: [kat] sha1
838,008 UART: [kat] SHA2-256
841,027 UART: [kat] SHA2-384
847,521 UART: [kat] SHA2-512-ACC
850,111 UART: [kat] ECC-384
3,295,434 UART: [kat] HMAC-384Kdf
3,309,585 UART: [kat] LMS
3,841,464 UART: [kat] --
3,845,337 UART: [cold-reset] ++
3,846,774 UART: [fht] FHT @ 0x50003400
3,858,461 UART: [idev] ++
3,859,166 UART: [idev] CDI.KEYID = 6
3,860,071 UART: [idev] SUBJECT.KEYID = 7
3,861,320 UART: [idev] UDS.KEYID = 0
3,862,250 ready_for_fw is high
3,862,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,065 UART: [idev] Erasing UDS.KEYID = 0
6,335,107 UART: [idev] Sha1 KeyId Algorithm
6,357,567 UART: [idev] --
6,362,147 UART: [ldev] ++
6,362,873 UART: [ldev] CDI.KEYID = 6
6,363,753 UART: [ldev] SUBJECT.KEYID = 5
6,364,958 UART: [ldev] AUTHORITY.KEYID = 7
6,366,183 UART: [ldev] FE.KEYID = 1
6,376,694 UART: [ldev] Erasing FE.KEYID = 1
8,853,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,833 UART: [ldev] --
10,646,541 UART: [fwproc] Wait for Commands...
10,649,446 UART: [fwproc] Recv command 0x46574c44
10,651,775 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,838,080 >>> mbox cmd response: success
14,838,629 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,842,778 UART: [afmc] ++
14,843,472 UART: [afmc] CDI.KEYID = 6
14,844,711 UART: [afmc] SUBJECT.KEYID = 7
14,846,139 UART: [afmc] AUTHORITY.KEYID = 5
17,352,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,433 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,883 UART: [afmc] --
19,148,855 UART: [cold-reset] --
19,152,929 UART: [state] Locking Datavault
19,158,983 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,174 UART: [state] Locking ICCM
19,163,532 UART: [exit] Launching FMC @ 0x40000130
19,172,191 UART:
19,172,421 UART: Running Caliptra FMC ...
19,173,517 UART:
19,173,670 UART: [state] CFI Enabled
19,181,767 UART: [fht] FMC Alias Private Key: 7
20,938,972 UART: [art] Extend RT PCRs Done
20,940,189 UART: [art] Lock RT PCRs Done
20,941,594 UART: [art] Populate DV Done
20,947,115 UART: [fht] FMC Alias Private Key: 7
20,948,811 UART: [art] Derive CDI
20,949,642 UART: [art] Store in in slot 0x4
20,991,975 UART: [art] Derive Key Pair
20,993,011 UART: [art] Store priv key in slot 0x5
23,419,342 UART: [art] Derive Key Pair - Done
23,432,172 UART: [art] Signing Cert with AUTHO
23,433,471 UART: RITY.KEYID = 7
25,138,875 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,382 UART: [art] PUB.X = 65A7DA7BED011774A9D9709DDCAF8FD2E651F3F1FD3C5D2DEBF572AAD60B529F4A8DDE41AE5963DFA8C6B190EA307B96
25,147,680 UART: [art] PUB.Y = 754A01C5A99CBA4C1B22D73CA0A597915E1A3F4EAA1BC6A5CEB1158115698C937842049E957D77E3D5D9B7C6039CCB2B
25,154,916 UART: [art] SIG.R = B8412866DF4302A97594CAA02344F5CC88BF3A66C5A2A1BADF98FB2C9C09292D854D1051C1284BE20CE999145C2AEA97
25,162,305 UART: [art] SIG.S = B579334303D859EFDE82CA3A3E6241E7F701AEB1036022BF2A3E5C1378F44889DC1F7DEDB798740CCBE1D4F09685C937
26,140,466 UART: Caliptra RT
26,141,159 UART: [state] CFI Enabled
26,258,230 UART: [rt] RT listening for mailbox commands...
26,289,531 UART: [rt]cmd =0x54514754, len=24
26,292,111 >>> mbox cmd response data (8 bytes)
26,292,557 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,322,463 UART: [rt]cmd =0x54514754, len=24
26,323,984 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,756,260 ready_for_fw is high
3,756,795 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,953,795 >>> mbox cmd response: success
14,954,476 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,210,561 UART:
19,210,961 UART: Running Caliptra FMC ...
19,212,108 UART:
19,212,273 UART: [state] CFI Enabled
19,220,169 UART: [fht] FMC Alias Private Key: 7
20,976,707 UART: [art] Extend RT PCRs Done
20,977,929 UART: [art] Lock RT PCRs Done
20,979,660 UART: [art] Populate DV Done
20,984,953 UART: [fht] FMC Alias Private Key: 7
20,986,595 UART: [art] Derive CDI
20,987,406 UART: [art] Store in in slot 0x4
21,029,638 UART: [art] Derive Key Pair
21,030,650 UART: [art] Store priv key in slot 0x5
23,457,604 UART: [art] Derive Key Pair - Done
23,470,330 UART: [art] Signing Cert with AUTHO
23,471,635 UART: RITY.KEYID = 7
25,176,933 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,443 UART: [art] PUB.X = 8E28DF8510029ABACB4FCE0190AFD1515C0884E3360D1F86418439B941C389BB60253E61E9E4CF0CFDDED344BCB06F0D
25,185,737 UART: [art] PUB.Y = 3F8B5D341C9CCFABEA61D568AFC1708694667F2F572E96B0771878B496BB17EE8EBCB68FCA144AD97876E6805D043052
25,192,982 UART: [art] SIG.R = 3590A2A9D1425996F591B99B8F6CB530B91E276DCB276777B85411C828BD4018C9FEC65F8DE5359CC82F96294A9C27F8
25,200,407 UART: [art] SIG.S = B5A88FB948FEE03A72D53E454E929D2516F716C68FC39C73EB0468953E9D8A07F65933248DCCE146CF101F012441C041
26,179,011 UART: Caliptra RT
26,179,701 UART: [state] CFI Enabled
26,297,409 UART: [rt] RT listening for mailbox commands...
26,328,537 UART: [rt]cmd =0x54514754, len=24
26,331,097 >>> mbox cmd response data (8 bytes)
26,331,585 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,361,619 UART: [rt]cmd =0x54514754, len=24
26,363,540 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,735 UART: [kat] SHA2-256
881,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,781 UART: [kat] ++
885,933 UART: [kat] sha1
890,129 UART: [kat] SHA2-256
892,067 UART: [kat] SHA2-384
895,004 UART: [kat] SHA2-512-ACC
896,905 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,356 UART: [kat] LMS
1,475,552 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,915 UART: [fht] Storing FHT @ 0x50003400
1,479,532 UART: [idev] ++
1,479,700 UART: [idev] CDI.KEYID = 6
1,480,060 UART: [idev] SUBJECT.KEYID = 7
1,480,484 UART: [idev] UDS.KEYID = 0
1,480,829 ready_for_fw is high
1,480,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,430 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,040 UART: [idev] --
1,514,967 UART: [ldev] ++
1,515,135 UART: [ldev] CDI.KEYID = 6
1,515,498 UART: [ldev] SUBJECT.KEYID = 5
1,515,924 UART: [ldev] AUTHORITY.KEYID = 7
1,516,387 UART: [ldev] FE.KEYID = 1
1,521,407 UART: [ldev] Erasing FE.KEYID = 1
1,546,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,764 UART: [ldev] --
1,586,033 UART: [fwproc] Waiting for Commands...
1,586,858 UART: [fwproc] Received command 0x46574c44
1,587,649 UART: [fwproc] Received Image of size 114360 bytes
2,886,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,693 >>> mbox cmd response: success
3,079,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,701 UART: [afmc] ++
3,080,869 UART: [afmc] CDI.KEYID = 6
3,081,231 UART: [afmc] SUBJECT.KEYID = 7
3,081,656 UART: [afmc] AUTHORITY.KEYID = 5
3,117,427 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,538 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,228 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,363 UART: [afmc] --
3,161,329 UART: [cold-reset] --
3,162,163 UART: [state] Locking Datavault
3,163,366 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,970 UART: [state] Locking ICCM
3,164,468 UART: [exit] Launching FMC @ 0x40000130
3,169,797 UART:
3,169,813 UART: Running Caliptra FMC ...
3,170,221 UART:
3,170,275 UART: [state] CFI Enabled
3,180,762 UART: [fht] FMC Alias Private Key: 7
3,288,703 UART: [art] Extend RT PCRs Done
3,289,131 UART: [art] Lock RT PCRs Done
3,290,617 UART: [art] Populate DV Done
3,298,830 UART: [fht] FMC Alias Private Key: 7
3,299,946 UART: [art] Derive CDI
3,300,226 UART: [art] Store in in slot 0x4
3,385,887 UART: [art] Derive Key Pair
3,386,247 UART: [art] Store priv key in slot 0x5
3,399,177 UART: [art] Derive Key Pair - Done
3,413,827 UART: [art] Signing Cert with AUTHO
3,414,307 UART: RITY.KEYID = 7
3,429,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,118 UART: [art] PUB.X = E78B35289304305C7BFF310C60576DCACFCEFEC2EC3947691497C774FE2AFBC0F9142231613C1EA815014A90A2E3CB99
3,436,887 UART: [art] PUB.Y = 27255D797238C5FDA971425AA6CA12751E44588B8DF7DE3D575A1F38312D28A1AE3B187E3DC59AF1F5BBEA9CABC6CE2B
3,443,855 UART: [art] SIG.R = AE3CBB1E36AB7BAC6CD110E1EE6CB33A05CF97BF0C752C18356ED28B6148A8C15898570B090CFBF230CC9D5F97A24EF7
3,450,632 UART: [art] SIG.S = 23EB1971B15BF302C83428D60ADFF2932CCFC44969D2DAF427732AADD425739181CC30B5811ABCFD27BE8D919CF3976A
3,473,743 UART: Caliptra RT
3,473,997 UART: [state] CFI Enabled
3,582,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,034 UART: [rt]cmd =0x54514754, len=24
3,615,247 >>> mbox cmd response data (8 bytes)
3,615,248 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,637 UART: [rt]cmd =0x54514754, len=24
3,646,109 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,695 ready_for_fw is high
1,362,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,459 >>> mbox cmd response: success
2,928,459 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,361 UART:
2,990,377 UART: Running Caliptra FMC ...
2,990,785 UART:
2,990,839 UART: [state] CFI Enabled
3,001,348 UART: [fht] FMC Alias Private Key: 7
3,108,567 UART: [art] Extend RT PCRs Done
3,108,995 UART: [art] Lock RT PCRs Done
3,110,533 UART: [art] Populate DV Done
3,118,812 UART: [fht] FMC Alias Private Key: 7
3,119,838 UART: [art] Derive CDI
3,120,118 UART: [art] Store in in slot 0x4
3,205,795 UART: [art] Derive Key Pair
3,206,155 UART: [art] Store priv key in slot 0x5
3,218,909 UART: [art] Derive Key Pair - Done
3,233,541 UART: [art] Signing Cert with AUTHO
3,234,021 UART: RITY.KEYID = 7
3,248,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,494 UART: [art] PUB.X = 00F4AAC899431BA5C8C0D533DDFBC716446C4B0F260933B6EFDD10E866D0E981D6CDDE550DAFD0933288BADD27403374
3,256,247 UART: [art] PUB.Y = C58154D958F6B37DCA6C8D6158E9B6B07E77434D850101E7B163222842D2E7155EE25B417AD8D2E66B337A388A284698
3,263,185 UART: [art] SIG.R = A8961EE159803E3DAAF1E5D8108797AEC4C20CB82EE0D0FEF752B73200B0189F21397A73A7E307648D0E3559E8CA80E5
3,269,930 UART: [art] SIG.S = 83C17553751198D6A4887003F5B863BC58C782862084DA3722804CCE92CF446464737F384123F5D5307FFB3C331D1043
3,293,334 UART: Caliptra RT
3,293,588 UART: [state] CFI Enabled
3,402,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,316 UART: [rt]cmd =0x54514754, len=24
3,434,451 >>> mbox cmd response data (8 bytes)
3,434,452 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,947 UART: [rt]cmd =0x54514754, len=24
3,465,513 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,847 UART: [state] LifecycleState = Unprovisioned
85,502 UART: [state] DebugLocked = No
86,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,688 UART: [kat] SHA2-256
881,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,734 UART: [kat] ++
885,886 UART: [kat] sha1
890,176 UART: [kat] SHA2-256
892,114 UART: [kat] SHA2-384
894,761 UART: [kat] SHA2-512-ACC
896,662 UART: [kat] ECC-384
902,287 UART: [kat] HMAC-384Kdf
906,865 UART: [kat] LMS
1,475,061 UART: [kat] --
1,475,704 UART: [cold-reset] ++
1,476,090 UART: [fht] Storing FHT @ 0x50003400
1,479,051 UART: [idev] ++
1,479,219 UART: [idev] CDI.KEYID = 6
1,479,579 UART: [idev] SUBJECT.KEYID = 7
1,480,003 UART: [idev] UDS.KEYID = 0
1,480,348 ready_for_fw is high
1,480,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,103 UART: [idev] Erasing UDS.KEYID = 0
1,504,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,315 UART: [idev] --
1,514,398 UART: [ldev] ++
1,514,566 UART: [ldev] CDI.KEYID = 6
1,514,929 UART: [ldev] SUBJECT.KEYID = 5
1,515,355 UART: [ldev] AUTHORITY.KEYID = 7
1,515,818 UART: [ldev] FE.KEYID = 1
1,521,188 UART: [ldev] Erasing FE.KEYID = 1
1,547,255 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,333 UART: [ldev] --
1,586,708 UART: [fwproc] Waiting for Commands...
1,587,437 UART: [fwproc] Received command 0x46574c44
1,588,228 UART: [fwproc] Received Image of size 114360 bytes
2,885,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,579 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,946 >>> mbox cmd response: success
3,078,946 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,002 UART: [afmc] ++
3,080,170 UART: [afmc] CDI.KEYID = 6
3,080,532 UART: [afmc] SUBJECT.KEYID = 7
3,080,957 UART: [afmc] AUTHORITY.KEYID = 5
3,116,654 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,960 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,740 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,353 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,043 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,074 UART: [afmc] --
3,159,968 UART: [cold-reset] --
3,160,654 UART: [state] Locking Datavault
3,161,967 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,571 UART: [state] Locking ICCM
3,163,029 UART: [exit] Launching FMC @ 0x40000130
3,168,358 UART:
3,168,374 UART: Running Caliptra FMC ...
3,168,782 UART:
3,168,925 UART: [state] CFI Enabled
3,179,780 UART: [fht] FMC Alias Private Key: 7
3,287,413 UART: [art] Extend RT PCRs Done
3,287,841 UART: [art] Lock RT PCRs Done
3,289,199 UART: [art] Populate DV Done
3,297,764 UART: [fht] FMC Alias Private Key: 7
3,298,842 UART: [art] Derive CDI
3,299,122 UART: [art] Store in in slot 0x4
3,384,583 UART: [art] Derive Key Pair
3,384,943 UART: [art] Store priv key in slot 0x5
3,398,093 UART: [art] Derive Key Pair - Done
3,412,628 UART: [art] Signing Cert with AUTHO
3,413,108 UART: RITY.KEYID = 7
3,428,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,809 UART: [art] PUB.X = E646012AAAFE4B63E5FCCBECEB0F835171AD9F10E6F167A041939E1A5C76F4B68AB4886853051DC611463950B60F766A
3,435,575 UART: [art] PUB.Y = E245AAF5D2B19A8DD8BAD112C046027433BFE6DB3FE31F00C1420B854841938268F24618E863C7EAF0AFD39A3CA3EFD9
3,442,511 UART: [art] SIG.R = A9E5794CE19B77E8FE3B7129764A63A4C599DD1F25538076A14E9BC59F89A6BC669891E2B7AA1EC2468433C45E4B2D23
3,449,285 UART: [art] SIG.S = 1DAF5E34CE70EF69FD6F1EF757786CF1AD6916B3020E62095DCCBFF47A6F3B2DB28BA1262BF0983DD1D3AB7EE55B6B9C
3,473,105 UART: Caliptra RT
3,473,451 UART: [state] CFI Enabled
3,581,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,404 UART: [rt]cmd =0x54514754, len=24
3,613,713 >>> mbox cmd response data (8 bytes)
3,613,714 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,213 UART: [rt]cmd =0x54514754, len=24
3,644,761 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,424 ready_for_fw is high
1,362,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,884 >>> mbox cmd response: success
2,928,884 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,768 UART:
2,990,784 UART: Running Caliptra FMC ...
2,991,192 UART:
2,991,335 UART: [state] CFI Enabled
3,002,188 UART: [fht] FMC Alias Private Key: 7
3,110,199 UART: [art] Extend RT PCRs Done
3,110,627 UART: [art] Lock RT PCRs Done
3,111,909 UART: [art] Populate DV Done
3,119,950 UART: [fht] FMC Alias Private Key: 7
3,121,108 UART: [art] Derive CDI
3,121,388 UART: [art] Store in in slot 0x4
3,206,847 UART: [art] Derive Key Pair
3,207,207 UART: [art] Store priv key in slot 0x5
3,220,423 UART: [art] Derive Key Pair - Done
3,235,166 UART: [art] Signing Cert with AUTHO
3,235,646 UART: RITY.KEYID = 7
3,250,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,701 UART: [art] PUB.X = F910CF7A361E4FB78DA30FB39BCF012838F87E47791F5D4D5A5E09D6A1415F721679CFE00601C08F03C9816195D6649B
3,258,455 UART: [art] PUB.Y = EFE0E463D9906BF76384466B18E2D68167345C664AE058043BECFAE759DC0357B56AD6477852CA641DD0426996BD5319
3,265,397 UART: [art] SIG.R = DEEC8571832BC9FB773BA43FAFCF29C11222C56B73DEB5B1AD3C79FA9E63B0BD9BD780E50CEFBCDDE162437C10A12CD4
3,272,194 UART: [art] SIG.S = 09DDBF073C5C9FC4635CA400A4C47471CC72C2E877276C5AC25D0E08BD00A75D413A95DED74CCFCD633FD891DEE9CCC2
3,295,635 UART: Caliptra RT
3,295,981 UART: [state] CFI Enabled
3,403,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,784 UART: [rt]cmd =0x54514754, len=24
3,435,849 >>> mbox cmd response data (8 bytes)
3,435,850 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,483 UART: [rt]cmd =0x54514754, len=24
3,466,959 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,707 UART: [kat] SHA2-256
903,647 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
918,006 UART: [kat] HMAC-384Kdf
922,484 UART: [kat] LMS
1,170,812 UART: [kat] --
1,171,559 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,766 UART: [idev] ++
1,174,934 UART: [idev] CDI.KEYID = 6
1,175,294 UART: [idev] SUBJECT.KEYID = 7
1,175,718 UART: [idev] UDS.KEYID = 0
1,176,063 ready_for_fw is high
1,176,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,777 UART: [idev] Sha1 KeyId Algorithm
1,209,455 UART: [idev] --
1,210,747 UART: [ldev] ++
1,210,915 UART: [ldev] CDI.KEYID = 6
1,211,278 UART: [ldev] SUBJECT.KEYID = 5
1,211,704 UART: [ldev] AUTHORITY.KEYID = 7
1,212,167 UART: [ldev] FE.KEYID = 1
1,217,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,380 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,816 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,934 >>> mbox cmd response: success
2,772,934 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,100 UART: [afmc] ++
2,774,268 UART: [afmc] CDI.KEYID = 6
2,774,630 UART: [afmc] SUBJECT.KEYID = 7
2,775,055 UART: [afmc] AUTHORITY.KEYID = 5
2,810,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,895 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,805 UART: [afmc] --
2,853,793 UART: [cold-reset] --
2,854,731 UART: [state] Locking Datavault
2,855,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,190 UART: [state] Locking ICCM
2,856,706 UART: [exit] Launching FMC @ 0x40000130
2,862,035 UART:
2,862,051 UART: Running Caliptra FMC ...
2,862,459 UART:
2,862,513 UART: [state] CFI Enabled
2,872,822 UART: [fht] FMC Alias Private Key: 7
2,981,103 UART: [art] Extend RT PCRs Done
2,981,531 UART: [art] Lock RT PCRs Done
2,983,353 UART: [art] Populate DV Done
2,991,476 UART: [fht] FMC Alias Private Key: 7
2,992,656 UART: [art] Derive CDI
2,992,936 UART: [art] Store in in slot 0x4
3,078,403 UART: [art] Derive Key Pair
3,078,763 UART: [art] Store priv key in slot 0x5
3,091,751 UART: [art] Derive Key Pair - Done
3,106,462 UART: [art] Signing Cert with AUTHO
3,106,942 UART: RITY.KEYID = 7
3,122,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,871 UART: [art] PUB.X = 58B5F12F7B4963E2B36BBFE0CBC4641B934389C8F7EA85B8C8815468328F8212971DE966321E62E62DBC8EE6C74FEC2C
3,129,649 UART: [art] PUB.Y = 4D4C146838F1EBDBE9662CDBECDF576E34032207C2C63955B4555DBCCF4ACC6058FE2EA86C987EE95C1C4AA7250EF75F
3,136,610 UART: [art] SIG.R = 1295A8F6360994C77CF32DB8D6641CD396D50EB924F8B6394EF4F2E7E12EF0A13217AAC9633CE53E9949E678F7841F8E
3,143,378 UART: [art] SIG.S = 6E389A61BEC16A4C916B5F5E0E341FC32ACF1BD74533EB5343BAC2B5BEA75AAC4BBFDE8F5AF946899B2F9D5D8B8E4F96
3,167,244 UART: Caliptra RT
3,167,498 UART: [state] CFI Enabled
3,274,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,781 UART: [rt]cmd =0x54514754, len=24
3,306,958 >>> mbox cmd response data (8 bytes)
3,306,959 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,402 UART: [rt]cmd =0x54514754, len=24
3,337,742 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 ready_for_fw is high
1,060,323 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,219 >>> mbox cmd response: success
2,627,219 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,429 UART:
2,689,445 UART: Running Caliptra FMC ...
2,689,853 UART:
2,689,907 UART: [state] CFI Enabled
2,700,402 UART: [fht] FMC Alias Private Key: 7
2,808,251 UART: [art] Extend RT PCRs Done
2,808,679 UART: [art] Lock RT PCRs Done
2,810,109 UART: [art] Populate DV Done
2,818,462 UART: [fht] FMC Alias Private Key: 7
2,819,562 UART: [art] Derive CDI
2,819,842 UART: [art] Store in in slot 0x4
2,905,499 UART: [art] Derive Key Pair
2,905,859 UART: [art] Store priv key in slot 0x5
2,918,979 UART: [art] Derive Key Pair - Done
2,933,574 UART: [art] Signing Cert with AUTHO
2,934,054 UART: RITY.KEYID = 7
2,949,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,301 UART: [art] PUB.X = C543A1E846D02AD8AA443725D5584D1236BD3352E5EDEC8DC0881AD50A7A6B5A421B8D5FAC19877C114EF41EF40F4062
2,957,075 UART: [art] PUB.Y = BE986BA4710C7731B3847595773E6924A560DAE199487970818119789D58DF0932CA311B9E4C973727B6C04640E31BF9
2,964,005 UART: [art] SIG.R = 053084FB607C23E73BA75B997738F0EF4C1B743D3AFA24E5C1504810F6A3B7200D08C4A2C6BB4420EECF3BEBD1734D88
2,970,776 UART: [art] SIG.S = 94C305CCD8CE4FF4A96305152921FA267A02C42D106F18FE843C51BCA1AEC2643E610069B91B7B00A5490D597B094BB9
2,994,344 UART: Caliptra RT
2,994,598 UART: [state] CFI Enabled
3,102,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,159 UART: [rt]cmd =0x54514754, len=24
3,134,882 >>> mbox cmd response data (8 bytes)
3,134,883 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,300 UART: [rt]cmd =0x54514754, len=24
3,165,750 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,492 UART: [kat] SHA2-256
904,432 UART: [kat] SHA2-384
907,189 UART: [kat] SHA2-512-ACC
909,090 UART: [kat] ECC-384
918,833 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,400 UART: [cold-reset] ++
1,172,768 UART: [fht] FHT @ 0x50003400
1,175,557 UART: [idev] ++
1,175,725 UART: [idev] CDI.KEYID = 6
1,176,085 UART: [idev] SUBJECT.KEYID = 7
1,176,509 UART: [idev] UDS.KEYID = 0
1,176,854 ready_for_fw is high
1,176,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,655 UART: [idev] Erasing UDS.KEYID = 0
1,202,090 UART: [idev] Sha1 KeyId Algorithm
1,210,562 UART: [idev] --
1,211,584 UART: [ldev] ++
1,211,752 UART: [ldev] CDI.KEYID = 6
1,212,115 UART: [ldev] SUBJECT.KEYID = 5
1,212,541 UART: [ldev] AUTHORITY.KEYID = 7
1,213,004 UART: [ldev] FE.KEYID = 1
1,218,714 UART: [ldev] Erasing FE.KEYID = 1
1,244,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,708 UART: [ldev] --
1,284,219 UART: [fwproc] Wait for Commands...
1,284,959 UART: [fwproc] Recv command 0x46574c44
1,285,687 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,647 >>> mbox cmd response: success
2,775,647 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,909 UART: [afmc] ++
2,777,077 UART: [afmc] CDI.KEYID = 6
2,777,439 UART: [afmc] SUBJECT.KEYID = 7
2,777,864 UART: [afmc] AUTHORITY.KEYID = 5
2,813,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,548 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,161 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,592 UART: [afmc] --
2,856,554 UART: [cold-reset] --
2,857,414 UART: [state] Locking Datavault
2,858,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,263 UART: [state] Locking ICCM
2,859,931 UART: [exit] Launching FMC @ 0x40000130
2,865,260 UART:
2,865,276 UART: Running Caliptra FMC ...
2,865,684 UART:
2,865,827 UART: [state] CFI Enabled
2,876,328 UART: [fht] FMC Alias Private Key: 7
2,985,025 UART: [art] Extend RT PCRs Done
2,985,453 UART: [art] Lock RT PCRs Done
2,987,211 UART: [art] Populate DV Done
2,995,302 UART: [fht] FMC Alias Private Key: 7
2,996,428 UART: [art] Derive CDI
2,996,708 UART: [art] Store in in slot 0x4
3,082,469 UART: [art] Derive Key Pair
3,082,829 UART: [art] Store priv key in slot 0x5
3,096,413 UART: [art] Derive Key Pair - Done
3,111,004 UART: [art] Signing Cert with AUTHO
3,111,484 UART: RITY.KEYID = 7
3,127,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,991 UART: [art] PUB.X = 514A805DFDF99F852A27BD1CF88579330B204E73B58A9FAE0B3E81951C79CC8B15BF9415D0768C67E9D61CD8759B985B
3,134,761 UART: [art] PUB.Y = 781BB450A6EE91988CD8B133629E549C06961FD8C461476B8D1F6DDDA3C91E549011243191BED6FD766819BCED569A0F
3,141,709 UART: [art] SIG.R = A8E000732FE697A231E6A2F5CEE4D7FFEF9786046BBCA7817E605823DB397219DFC37E067AEE01A7BC607983C3C605B3
3,148,455 UART: [art] SIG.S = 018C5953900BB54EA3E091E8F5E4061A74A60592AEEDF27D64B50EED69746350FE57B4DBD25973C81EAE366826762934
3,171,813 UART: Caliptra RT
3,172,159 UART: [state] CFI Enabled
3,279,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,078 UART: [rt]cmd =0x54514754, len=24
3,311,951 >>> mbox cmd response data (8 bytes)
3,311,952 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,439 UART: [rt]cmd =0x54514754, len=24
3,343,193 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 ready_for_fw is high
1,060,612 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,116 >>> mbox cmd response: success
2,626,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,140 UART:
2,688,156 UART: Running Caliptra FMC ...
2,688,564 UART:
2,688,707 UART: [state] CFI Enabled
2,699,112 UART: [fht] FMC Alias Private Key: 7
2,806,981 UART: [art] Extend RT PCRs Done
2,807,409 UART: [art] Lock RT PCRs Done
2,808,629 UART: [art] Populate DV Done
2,816,848 UART: [fht] FMC Alias Private Key: 7
2,817,796 UART: [art] Derive CDI
2,818,076 UART: [art] Store in in slot 0x4
2,903,947 UART: [art] Derive Key Pair
2,904,307 UART: [art] Store priv key in slot 0x5
2,917,597 UART: [art] Derive Key Pair - Done
2,932,329 UART: [art] Signing Cert with AUTHO
2,932,809 UART: RITY.KEYID = 7
2,947,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,530 UART: [art] PUB.X = 128EB3993AC3C0FA0DAAF92DD0BE5C8E0318F6479CF9F0BE230F5B7C67A07F5DB2D588213539F67D3A850D132168E684
2,955,298 UART: [art] PUB.Y = 403737F6F90712806BD03FDE2EF2B8D7B9216A1AD373937B8673A9AD92E4BD5754A038910E4DAF7748807D4365ED417C
2,962,242 UART: [art] SIG.R = 6B6A26E0533C6C2E1124495F3CEB903623BFCE96AB328F6796A9CD139C780AA0E8B07DDC900AC8B0A6D534B1C3735AAC
2,969,020 UART: [art] SIG.S = 5D8DEFD4658B1BC0AEFD305F82F724957231C337B60763C3CC4DB8B861237B9796DCA3767778B410D6F056FEC7472741
2,992,858 UART: Caliptra RT
2,993,204 UART: [state] CFI Enabled
3,101,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,005 UART: [rt]cmd =0x54514754, len=24
3,134,174 >>> mbox cmd response data (8 bytes)
3,134,175 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,608 UART: [rt]cmd =0x54514754, len=24
3,164,850 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,405 UART: [cold-reset] ++
1,170,775 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,174,673 ready_for_fw is high
1,174,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,281 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,522 UART: [ldev] --
1,280,822 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,598 >>> mbox cmd response: success
2,772,598 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,815 UART: [afmc] ++
2,773,983 UART: [afmc] CDI.KEYID = 6
2,774,346 UART: [afmc] SUBJECT.KEYID = 7
2,774,772 UART: [afmc] AUTHORITY.KEYID = 5
2,810,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,798 UART: [afmc] --
2,853,906 UART: [cold-reset] --
2,854,612 UART: [state] Locking Datavault
2,855,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,597 UART: [state] Locking ICCM
2,857,137 UART: [exit] Launching FMC @ 0x40000130
2,862,466 UART:
2,862,482 UART: Running Caliptra FMC ...
2,862,890 UART:
2,862,944 UART: [state] CFI Enabled
2,873,479 UART: [fht] FMC Alias Private Key: 7
2,981,278 UART: [art] Extend RT PCRs Done
2,981,706 UART: [art] Lock RT PCRs Done
2,983,236 UART: [art] Populate DV Done
2,991,173 UART: [fht] FMC Alias Private Key: 7
2,992,217 UART: [art] Derive CDI
2,992,497 UART: [art] Store in in slot 0x4
3,078,326 UART: [art] Derive Key Pair
3,078,686 UART: [art] Store priv key in slot 0x5
3,091,884 UART: [art] Derive Key Pair - Done
3,106,917 UART: [art] Signing Cert with AUTHO
3,107,397 UART: RITY.KEYID = 7
3,122,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,556 UART: [art] PUB.X = FD0C86F252C87EFF08D2EB2B4F703C40ABC5F5ABCE834E79D5CDC1253A7F7BB5030F17A0048FFD86932A976CD9921198
3,130,327 UART: [art] PUB.Y = 9DAAAAED5C4CB3652F7E76F0063626E5E6278720E12F7E863D8394F7113853493F4EF9A8B5AC6A54A28384315CF720E6
3,137,276 UART: [art] SIG.R = BDC4EC69CD24475112DD3A57FF0B49950AF4F588B85BC5BAA6F81FBEB43DE538027BBE66DB69A13D1A1ECD22E8A2EBB3
3,144,065 UART: [art] SIG.S = ECC5532F90BD3BE56EC2A06C7579FB2C0BC45EC78D7F2446B678183F49DCAD803FECA38D97C9A343F5140C1E8181B983
3,167,958 UART: Caliptra RT
3,168,212 UART: [state] CFI Enabled
3,277,051 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,494 UART: [rt]cmd =0x54514754, len=24
3,309,433 >>> mbox cmd response data (8 bytes)
3,309,434 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,931 UART: [rt]cmd =0x54514754, len=24
3,340,125 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 ready_for_fw is high
1,056,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,980 >>> mbox cmd response: success
2,622,980 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,588 UART:
2,684,604 UART: Running Caliptra FMC ...
2,685,012 UART:
2,685,066 UART: [state] CFI Enabled
2,695,415 UART: [fht] FMC Alias Private Key: 7
2,802,998 UART: [art] Extend RT PCRs Done
2,803,426 UART: [art] Lock RT PCRs Done
2,805,058 UART: [art] Populate DV Done
2,813,321 UART: [fht] FMC Alias Private Key: 7
2,814,455 UART: [art] Derive CDI
2,814,735 UART: [art] Store in in slot 0x4
2,900,296 UART: [art] Derive Key Pair
2,900,656 UART: [art] Store priv key in slot 0x5
2,913,126 UART: [art] Derive Key Pair - Done
2,927,934 UART: [art] Signing Cert with AUTHO
2,928,414 UART: RITY.KEYID = 7
2,943,644 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,409 UART: [art] PUB.X = 631D21A301CE014154325D49ADB5AF2B3D12247EF4A6E285969E314BAE4713FD0DAE6D60960EFF8909AD68430DF03A6B
2,951,169 UART: [art] PUB.Y = 3093E658E253A50D0064BBEB7C0A25DDC4F8DA946A9ED1AF2F8512EE9DDA21D5B30937102206CF443A387BA4FB9917D4
2,958,097 UART: [art] SIG.R = BE38769C57C52BAC7B587B24C3C39EFE506A27D6D87699C821D39BA06A713F00ABB25C5C21D004BB612D552D9502D0B3
2,964,847 UART: [art] SIG.S = E398FEF346C2E338B947890D35743E6BE6D72B08EA9A5151E3D603AA90439452C1F3241011FFC3D7FBAE14E9483D3D47
2,989,379 UART: Caliptra RT
2,989,633 UART: [state] CFI Enabled
3,096,512 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,831 UART: [rt]cmd =0x54514754, len=24
3,129,080 >>> mbox cmd response data (8 bytes)
3,129,081 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,712 UART: [rt]cmd =0x54514754, len=24
3,160,170 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
915,973 UART: [kat] HMAC-384Kdf
920,439 UART: [kat] LMS
1,168,751 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,060 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,174,056 ready_for_fw is high
1,174,056 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,428 UART: [idev] Erasing UDS.KEYID = 0
1,198,700 UART: [idev] Sha1 KeyId Algorithm
1,207,616 UART: [idev] --
1,208,585 UART: [ldev] ++
1,208,753 UART: [ldev] CDI.KEYID = 6
1,209,117 UART: [ldev] SUBJECT.KEYID = 5
1,209,544 UART: [ldev] AUTHORITY.KEYID = 7
1,210,007 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,767 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,675 >>> mbox cmd response: success
2,772,675 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,938 UART: [afmc] ++
2,774,106 UART: [afmc] CDI.KEYID = 6
2,774,469 UART: [afmc] SUBJECT.KEYID = 7
2,774,895 UART: [afmc] AUTHORITY.KEYID = 5
2,810,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,675 UART: [afmc] --
2,853,799 UART: [cold-reset] --
2,854,905 UART: [state] Locking Datavault
2,856,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,820 UART: [state] Locking ICCM
2,857,404 UART: [exit] Launching FMC @ 0x40000130
2,862,733 UART:
2,862,749 UART: Running Caliptra FMC ...
2,863,157 UART:
2,863,300 UART: [state] CFI Enabled
2,874,135 UART: [fht] FMC Alias Private Key: 7
2,983,058 UART: [art] Extend RT PCRs Done
2,983,486 UART: [art] Lock RT PCRs Done
2,985,336 UART: [art] Populate DV Done
2,993,359 UART: [fht] FMC Alias Private Key: 7
2,994,361 UART: [art] Derive CDI
2,994,641 UART: [art] Store in in slot 0x4
3,080,394 UART: [art] Derive Key Pair
3,080,754 UART: [art] Store priv key in slot 0x5
3,093,586 UART: [art] Derive Key Pair - Done
3,108,338 UART: [art] Signing Cert with AUTHO
3,108,818 UART: RITY.KEYID = 7
3,124,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,029 UART: [art] PUB.X = AF2BC9B78720D957E8E5CC6825BB7DA448E7EC7C6E4A4BE03D9A1B2DDD9ECAE9DA4114C4D8EFA020EA9B37EEE2CD605A
3,131,833 UART: [art] PUB.Y = E29E68C177A1B5FA2D90F2CE80B36F0EC7D022B102D28928C23697831FA99B53D9DEFF46C09C6060E14BA13EAFDCA13A
3,138,793 UART: [art] SIG.R = 82AB8FF385ACF1D86CB868DD65B27516161274B9C6313CE6DB28EEDF8936EFBD0C1BCD55AF092FC6B1C936379650DF69
3,145,573 UART: [art] SIG.S = E2E7679ABD7CAE7F0D7A0A520164B0E803D9D445A1617B6CE46D35FA6940B3FE913CB5F369B05D622329EB181645C5C0
3,169,570 UART: Caliptra RT
3,169,916 UART: [state] CFI Enabled
3,277,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,466 UART: [rt]cmd =0x54514754, len=24
3,309,441 >>> mbox cmd response data (8 bytes)
3,309,442 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,825 UART: [rt]cmd =0x54514754, len=24
3,340,371 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,361 ready_for_fw is high
1,056,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,219 >>> mbox cmd response: success
2,622,219 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,637 UART:
2,684,653 UART: Running Caliptra FMC ...
2,685,061 UART:
2,685,204 UART: [state] CFI Enabled
2,695,611 UART: [fht] FMC Alias Private Key: 7
2,803,494 UART: [art] Extend RT PCRs Done
2,803,922 UART: [art] Lock RT PCRs Done
2,805,324 UART: [art] Populate DV Done
2,813,409 UART: [fht] FMC Alias Private Key: 7
2,814,411 UART: [art] Derive CDI
2,814,691 UART: [art] Store in in slot 0x4
2,900,454 UART: [art] Derive Key Pair
2,900,814 UART: [art] Store priv key in slot 0x5
2,914,250 UART: [art] Derive Key Pair - Done
2,929,115 UART: [art] Signing Cert with AUTHO
2,929,595 UART: RITY.KEYID = 7
2,944,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,528 UART: [art] PUB.X = 6F6133CE99C24EC3F0142424D1E1241B9AE8BE8B4C5507217C734A626F71BCCC19B0BC1A5CFB0A57384C84F35033E9C8
2,952,300 UART: [art] PUB.Y = A205C4526591DFFF213A771FB67D91405F568137430D5A7729D54DA805D9395C8388D5136150F9BA6829E0178ACEAAFD
2,959,239 UART: [art] SIG.R = 8D1CABE929F5B3FA4E3CAA6DBB6345DEF6593B3B9ABAFA138E92618A50B2B53AB71725FFA0D4803BE71274ADB811CE27
2,966,033 UART: [art] SIG.S = 5F1A8D4D0FD3CAD4B33906666650DF08E49D0F547BE7E47A4D6E8A87AFE1E3B1389ED19BBC041C4C0E9DADD78D0B1748
2,990,291 UART: Caliptra RT
2,990,637 UART: [state] CFI Enabled
3,098,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,942 UART: [rt]cmd =0x54514754, len=24
3,131,063 >>> mbox cmd response data (8 bytes)
3,131,064 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,751 UART: [rt]cmd =0x54514754, len=24
3,162,277 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,476 UART:
192,849 UART: Running Caliptra ROM ...
194,055 UART:
194,211 UART: [state] CFI Enabled
265,948 UART: [state] LifecycleState = Unprovisioned
267,928 UART: [state] DebugLocked = No
269,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,524 UART: [kat] SHA2-256
444,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,753 UART: [kat] ++
455,273 UART: [kat] sha1
466,571 UART: [kat] SHA2-256
469,225 UART: [kat] SHA2-384
474,391 UART: [kat] SHA2-512-ACC
476,735 UART: [kat] ECC-384
2,770,536 UART: [kat] HMAC-384Kdf
2,801,215 UART: [kat] LMS
3,991,485 UART: [kat] --
3,996,139 UART: [cold-reset] ++
3,997,953 UART: [fht] Storing FHT @ 0x50003400
4,007,934 UART: [idev] ++
4,008,495 UART: [idev] CDI.KEYID = 6
4,009,447 UART: [idev] SUBJECT.KEYID = 7
4,010,685 UART: [idev] UDS.KEYID = 0
4,011,648 ready_for_fw is high
4,011,841 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,659 UART: [idev] Erasing UDS.KEYID = 0
7,347,945 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,115 UART: [idev] --
7,374,086 UART: [ldev] ++
7,374,664 UART: [ldev] CDI.KEYID = 6
7,375,633 UART: [ldev] SUBJECT.KEYID = 5
7,376,782 UART: [ldev] AUTHORITY.KEYID = 7
7,378,060 UART: [ldev] FE.KEYID = 1
7,424,905 UART: [ldev] Erasing FE.KEYID = 1
10,759,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,737 UART: [ldev] --
13,138,974 UART: [fwproc] Waiting for Commands...
13,141,761 UART: [fwproc] Received command 0x46574c44
13,143,992 UART: [fwproc] Received Image of size 114036 bytes
17,197,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,501 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,660,979 >>> mbox cmd response: success
17,661,555 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,664,326 UART: [afmc] ++
17,664,922 UART: [afmc] CDI.KEYID = 6
17,665,826 UART: [afmc] SUBJECT.KEYID = 7
17,667,093 UART: [afmc] AUTHORITY.KEYID = 5
21,034,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,334,017 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,336,274 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,350,683 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,365,488 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,379,944 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,402,155 UART: [afmc] --
23,406,764 UART: [cold-reset] --
23,411,368 UART: [state] Locking Datavault
23,415,200 UART: [state] Locking PCR0, PCR1 and PCR31
23,416,887 UART: [state] Locking ICCM
23,418,160 UART: [exit] Launching FMC @ 0x40000130
23,426,556 UART:
23,426,798 UART: Running Caliptra FMC ...
23,427,892 UART:
23,428,045 UART: [state] CFI Enabled
23,493,882 UART: [fht] FMC Alias Private Key: 7
25,832,429 UART: [art] Extend RT PCRs Done
25,833,759 UART: [art] Lock RT PCRs Done
25,835,239 UART: [art] Populate DV Done
25,840,449 UART: [fht] FMC Alias Private Key: 7
25,842,150 UART: [art] Derive CDI
25,842,955 UART: [art] Store in in slot 0x4
25,902,822 UART: [art] Derive Key Pair
25,903,813 UART: [art] Store priv key in slot 0x5
29,196,089 UART: [art] Derive Key Pair - Done
29,208,817 UART: [art] Signing Cert with AUTHO
29,210,110 UART: RITY.KEYID = 7
31,496,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,209 UART: [art] PUB.X = 66075A8D8A31AD5BABADDB27D76686AF069991E5B6DA52448E802BEAB0DFAA2EC3D6B2E512F40757C3B52E2F7DF59843
31,505,449 UART: [art] PUB.Y = 1A8E7D12FF017EA40A0D795D36F59902E762275DB51B1049698204151DCD7BEBFB54F2E1437C18683646363F409BB1BF
31,512,735 UART: [art] SIG.R = F77B779ACFD26C51DDF6D0116D671DBFEBAF76C8DC5E9D5B9C1587CD6B315F6D80B0641FE18BC865B4C25B3DF66BA249
31,520,150 UART: [art] SIG.S = A264B3ED49C447B9071FD2B725743476445CABE14796C7763111ABDC2B9F5793AB81D79EF1BB5986C0FCD419965194B8
32,825,619 UART: Caliptra RT
32,826,310 UART: [state] CFI Enabled
32,987,184 UART: [rt] RT listening for mailbox commands...
33,018,213 UART: [rt]cmd =0x47544744, len=8
33,020,035 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,425 writing to cptra_bootfsm_go
3,803,347 ready_for_fw is high
3,803,725 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,879,577 >>> mbox cmd response: success
17,880,376 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,563,907 UART:
23,564,307 UART: Running Caliptra FMC ...
23,565,407 UART:
23,565,559 UART: [state] CFI Enabled
23,632,047 UART: [fht] FMC Alias Private Key: 7
25,969,498 UART: [art] Extend RT PCRs Done
25,970,722 UART: [art] Lock RT PCRs Done
25,972,454 UART: [art] Populate DV Done
25,977,865 UART: [fht] FMC Alias Private Key: 7
25,979,427 UART: [art] Derive CDI
25,980,238 UART: [art] Store in in slot 0x4
26,040,382 UART: [art] Derive Key Pair
26,041,424 UART: [art] Store priv key in slot 0x5
29,334,293 UART: [art] Derive Key Pair - Done
29,347,339 UART: [art] Signing Cert with AUTHO
29,348,634 UART: RITY.KEYID = 7
31,636,838 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,408 UART: [art] PUB.X = AD7C879EEAFAB00BA08617F568C0E8D3AA2AB45AB225E6A4C49931509647C880FE9D25013AFA0862AFA15564AF03EA42
31,645,595 UART: [art] PUB.Y = 13EB267914A1F993656430FE8DD512C56815266C98F549B92FB6DB799D2147DEF761BB70F6DDF0E119D19C64C7DFFC29
31,652,847 UART: [art] SIG.R = 7E65284EDAE72D662BDA776395109099410BD158381652961052479F736C7CB611B41204E226A4ABF17A4FF148E1D59A
31,660,234 UART: [art] SIG.S = 2E279204288925C335BA7399C72A886E2130F8B0CA9011FD7C1AD6C60CF6E662C93AC99E12CCB10502B84AA1DAF62B49
32,965,573 UART: Caliptra RT
32,966,300 UART: [state] CFI Enabled
33,126,858 UART: [rt] RT listening for mailbox commands...
33,157,733 UART: [rt]cmd =0x47544744, len=8
33,159,627 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,439 UART:
192,794 UART: Running Caliptra ROM ...
193,921 UART:
603,564 UART: [state] CFI Enabled
618,664 UART: [state] LifecycleState = Unprovisioned
620,539 UART: [state] DebugLocked = No
623,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,116 UART: [kat] SHA2-256
798,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,433 UART: [kat] ++
809,879 UART: [kat] sha1
821,603 UART: [kat] SHA2-256
824,326 UART: [kat] SHA2-384
829,889 UART: [kat] SHA2-512-ACC
832,277 UART: [kat] ECC-384
3,115,826 UART: [kat] HMAC-384Kdf
3,128,486 UART: [kat] LMS
4,318,542 UART: [kat] --
4,323,053 UART: [cold-reset] ++
4,324,354 UART: [fht] Storing FHT @ 0x50003400
4,336,405 UART: [idev] ++
4,337,042 UART: [idev] CDI.KEYID = 6
4,337,925 UART: [idev] SUBJECT.KEYID = 7
4,339,171 UART: [idev] UDS.KEYID = 0
4,340,125 ready_for_fw is high
4,340,314 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,906 UART: [idev] Erasing UDS.KEYID = 0
7,621,792 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,976 UART: [idev] --
7,646,144 UART: [ldev] ++
7,646,794 UART: [ldev] CDI.KEYID = 6
7,647,713 UART: [ldev] SUBJECT.KEYID = 5
7,648,924 UART: [ldev] AUTHORITY.KEYID = 7
7,650,154 UART: [ldev] FE.KEYID = 1
7,661,549 UART: [ldev] Erasing FE.KEYID = 1
10,950,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,222 UART: [ldev] --
13,311,622 UART: [fwproc] Waiting for Commands...
13,313,281 UART: [fwproc] Received command 0x46574c44
13,315,457 UART: [fwproc] Received Image of size 114036 bytes
17,366,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,154 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,827,370 >>> mbox cmd response: success
17,827,929 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,832,015 UART: [afmc] ++
17,832,605 UART: [afmc] CDI.KEYID = 6
17,833,568 UART: [afmc] SUBJECT.KEYID = 7
17,834,782 UART: [afmc] AUTHORITY.KEYID = 5
21,151,069 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,036 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,294 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,676 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,504 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,943 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,621 UART: [afmc] --
23,518,115 UART: [cold-reset] --
23,522,192 UART: [state] Locking Datavault
23,526,860 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,610 UART: [state] Locking ICCM
23,530,864 UART: [exit] Launching FMC @ 0x40000130
23,539,264 UART:
23,539,496 UART: Running Caliptra FMC ...
23,540,593 UART:
23,540,756 UART: [state] CFI Enabled
23,548,259 UART: [fht] FMC Alias Private Key: 7
25,879,504 UART: [art] Extend RT PCRs Done
25,880,726 UART: [art] Lock RT PCRs Done
25,882,548 UART: [art] Populate DV Done
25,887,837 UART: [fht] FMC Alias Private Key: 7
25,889,325 UART: [art] Derive CDI
25,890,057 UART: [art] Store in in slot 0x4
25,932,973 UART: [art] Derive Key Pair
25,933,969 UART: [art] Store priv key in slot 0x5
29,176,088 UART: [art] Derive Key Pair - Done
29,189,250 UART: [art] Signing Cert with AUTHO
29,190,550 UART: RITY.KEYID = 7
31,470,179 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,678 UART: [art] PUB.X = 0567BB0B0622D216C9E692AFDBCBD128FFF1F208EECBEEDCE4EDD08B66F18C07C18EB01062CC96E8C13568A43989AD38
31,478,974 UART: [art] PUB.Y = E0A9CD35DFB0165AAFCAEEACB6DD9146AC96933E41F46AB00C21D9E41ADC62AAF38A56D016694AE5FF0D562938359FAF
31,486,223 UART: [art] SIG.R = DDD03CD65436DCEC2267802532F955719C9D690EB8FA6D935B59F01CC5D60690679310E96DC5F6B45CCE1F7931840585
31,493,585 UART: [art] SIG.S = CB31ED0D907DE3FBA784658CBEACD114D550F9528F240E13C307D3EF879273CE6C19CA30505B9F5912F029D16CB23FC7
32,798,890 UART: Caliptra RT
32,799,585 UART: [state] CFI Enabled
32,916,753 UART: [rt] RT listening for mailbox commands...
32,947,713 UART: [rt]cmd =0x47544744, len=8
32,949,840 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,129,991 ready_for_fw is high
4,130,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,071,714 >>> mbox cmd response: success
18,072,466 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,717,898 UART:
23,718,328 UART: Running Caliptra FMC ...
23,719,428 UART:
23,719,580 UART: [state] CFI Enabled
23,727,701 UART: [fht] FMC Alias Private Key: 7
26,058,893 UART: [art] Extend RT PCRs Done
26,060,123 UART: [art] Lock RT PCRs Done
26,061,903 UART: [art] Populate DV Done
26,067,266 UART: [fht] FMC Alias Private Key: 7
26,068,979 UART: [art] Derive CDI
26,069,799 UART: [art] Store in in slot 0x4
26,111,960 UART: [art] Derive Key Pair
26,112,961 UART: [art] Store priv key in slot 0x5
29,355,311 UART: [art] Derive Key Pair - Done
29,368,388 UART: [art] Signing Cert with AUTHO
29,369,701 UART: RITY.KEYID = 7
31,648,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,353 UART: [art] PUB.X = 4E9A237CA36A21D84A525D4A7BF5D6981B298D1E32CDE19786C116150F90A2B446A3BB106AC719EEBFE28D431538F7AA
31,657,569 UART: [art] PUB.Y = 45E47DBE586CE172A91225E2D175F1B0C413AFFAA5FEDBB8323AFB207CEC2E27CB2B2608A69BF4E503D488CA680C0103
31,664,853 UART: [art] SIG.R = DB6FEE0B1626D59068824B634855BC0F0CFA4F56E9F092A352693990D521F74800E40E4E1665AD80D91E02F8A535AC60
31,672,223 UART: [art] SIG.S = 2AEBDC9E1EB93C9439A0F9BA8D4633774E291458031B1FE5AAAD18A92718F2139BCA9C60C41C48A37AD55C45D01FFA15
32,977,789 UART: Caliptra RT
32,978,499 UART: [state] CFI Enabled
33,096,269 UART: [rt] RT listening for mailbox commands...
33,127,650 UART: [rt]cmd =0x47544744, len=8
33,129,613 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
192,540 UART:
192,919 UART: Running Caliptra ROM ...
194,130 UART:
194,308 UART: [state] CFI Enabled
267,344 UART: [state] LifecycleState = Unprovisioned
269,281 UART: [state] DebugLocked = No
271,181 UART: [state] WD Timer not started. Device not locked for debugging
274,439 UART: [kat] SHA2-256
453,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,126 UART: [kat] ++
465,663 UART: [kat] sha1
477,018 UART: [kat] SHA2-256
480,037 UART: [kat] SHA2-384
486,673 UART: [kat] SHA2-512-ACC
489,680 UART: [kat] ECC-384
2,948,053 UART: [kat] HMAC-384Kdf
2,972,321 UART: [kat] LMS
3,501,825 UART: [kat] --
3,506,253 UART: [cold-reset] ++
3,508,560 UART: [fht] FHT @ 0x50003400
3,518,699 UART: [idev] ++
3,519,274 UART: [idev] CDI.KEYID = 6
3,520,193 UART: [idev] SUBJECT.KEYID = 7
3,521,369 UART: [idev] UDS.KEYID = 0
3,522,419 ready_for_fw is high
3,522,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,574 UART: [idev] Erasing UDS.KEYID = 0
6,026,908 UART: [idev] Sha1 KeyId Algorithm
6,049,434 UART: [idev] --
6,052,437 UART: [ldev] ++
6,053,024 UART: [ldev] CDI.KEYID = 6
6,054,101 UART: [ldev] SUBJECT.KEYID = 5
6,055,214 UART: [ldev] AUTHORITY.KEYID = 7
6,056,406 UART: [ldev] FE.KEYID = 1
6,099,568 UART: [ldev] Erasing FE.KEYID = 1
8,604,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,349 UART: [ldev] --
10,410,748 UART: [fwproc] Wait for Commands...
10,413,432 UART: [fwproc] Recv command 0x46574c44
10,415,533 UART: [fwproc] Recv'd Img size: 114360 bytes
13,815,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,274,279 >>> mbox cmd response: success
14,274,812 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,278,840 UART: [afmc] ++
14,279,419 UART: [afmc] CDI.KEYID = 6
14,280,353 UART: [afmc] SUBJECT.KEYID = 7
14,281,518 UART: [afmc] AUTHORITY.KEYID = 5
16,823,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,682 UART: [afmc] --
18,624,724 UART: [cold-reset] --
18,628,103 UART: [state] Locking Datavault
18,635,238 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,039 UART: [state] Locking ICCM
18,638,044 UART: [exit] Launching FMC @ 0x40000130
18,646,488 UART:
18,646,735 UART: Running Caliptra FMC ...
18,647,901 UART:
18,648,066 UART: [state] CFI Enabled
18,706,468 UART: [fht] FMC Alias Private Key: 7
20,470,683 UART: [art] Extend RT PCRs Done
20,471,903 UART: [art] Lock RT PCRs Done
20,473,527 UART: [art] Populate DV Done
20,478,992 UART: [fht] FMC Alias Private Key: 7
20,480,586 UART: [art] Derive CDI
20,481,402 UART: [art] Store in in slot 0x4
20,538,962 UART: [art] Derive Key Pair
20,539,998 UART: [art] Store priv key in slot 0x5
23,002,531 UART: [art] Derive Key Pair - Done
23,015,514 UART: [art] Signing Cert with AUTHO
23,016,864 UART: RITY.KEYID = 7
24,728,518 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,029 UART: [art] PUB.X = FF789ABBC5077265B6BE11521DE25DE9798800FFBE7A1457A254378663313663CF5999EC6E8C0C65AB76124852D90F3A
24,737,290 UART: [art] PUB.Y = D859115761ED707CAC7F2813A1C69BB0502F511FB92545275A8B62EA5FCAC078F2FF4DDCF0E2DB79645EB0AFDB417B6B
24,744,582 UART: [art] SIG.R = FBF64CB4642FF026522DAA0ACB2344DBBC241F1897F0DEDBCDFC3AB63391AAD239F30A54F4B8ECFC3851602E2425E951
24,751,965 UART: [art] SIG.S = D9412C5B12EF8676C9CDEF6D4A1A607C6F34D653FAAC3FF46AD343AC2BBC682DD9D02BF8F7AEE9891173E1CDF47BB28D
25,730,998 UART: Caliptra RT
25,731,718 UART: [state] CFI Enabled
25,897,737 UART: [rt] RT listening for mailbox commands...
25,928,947 UART: [rt]cmd =0x47544744, len=8
25,930,829 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
192,742 UART:
193,119 UART: Running Caliptra ROM ...
195,167 UART:
195,338 UART: [state] CFI Enabled
267,691 UART: [state] LifecycleState = Unprovisioned
270,061 UART: [state] DebugLocked = No
271,544 UART: [state] WD Timer not started. Device not locked for debugging
276,601 UART: [kat] SHA2-256
466,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,212 UART: [kat] ++
477,697 UART: [kat] sha1
488,928 UART: [kat] SHA2-256
491,933 UART: [kat] SHA2-384
498,570 UART: [kat] SHA2-512-ACC
501,225 UART: [kat] ECC-384
2,948,511 UART: [kat] HMAC-384Kdf
2,971,830 UART: [kat] LMS
3,503,566 UART: [kat] --
3,508,057 UART: [cold-reset] ++
3,509,991 UART: [fht] FHT @ 0x50003400
3,520,486 UART: [idev] ++
3,521,194 UART: [idev] CDI.KEYID = 6
3,522,124 UART: [idev] SUBJECT.KEYID = 7
3,523,377 UART: [idev] UDS.KEYID = 0
3,524,305 ready_for_fw is high
3,524,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,330 UART: [idev] Erasing UDS.KEYID = 0
6,029,194 UART: [idev] Sha1 KeyId Algorithm
6,051,177 UART: [idev] --
6,056,610 UART: [ldev] ++
6,057,302 UART: [ldev] CDI.KEYID = 6
6,058,216 UART: [ldev] SUBJECT.KEYID = 5
6,059,378 UART: [ldev] AUTHORITY.KEYID = 7
6,060,611 UART: [ldev] FE.KEYID = 1
6,101,611 UART: [ldev] Erasing FE.KEYID = 1
8,607,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,625 UART: [ldev] --
10,416,490 UART: [fwproc] Wait for Commands...
10,418,859 UART: [fwproc] Recv command 0x46574c44
10,421,171 UART: [fwproc] Recv'd Img size: 114360 bytes
13,864,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,602,429 >>> mbox cmd response: success
14,602,977 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,605,658 UART: [afmc] ++
14,606,362 UART: [afmc] CDI.KEYID = 6
14,607,610 UART: [afmc] SUBJECT.KEYID = 7
14,609,049 UART: [afmc] AUTHORITY.KEYID = 5
17,155,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,656 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,041 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,930 UART: [afmc] --
18,954,126 UART: [cold-reset] --
18,957,941 UART: [state] Locking Datavault
18,963,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,173 UART: [state] Locking ICCM
18,967,545 UART: [exit] Launching FMC @ 0x40000130
18,976,218 UART:
18,976,452 UART: Running Caliptra FMC ...
18,977,557 UART:
18,977,720 UART: [state] CFI Enabled
19,033,919 UART: [fht] FMC Alias Private Key: 7
20,798,259 UART: [art] Extend RT PCRs Done
20,799,470 UART: [art] Lock RT PCRs Done
20,801,091 UART: [art] Populate DV Done
20,806,771 UART: [fht] FMC Alias Private Key: 7
20,808,413 UART: [art] Derive CDI
20,809,225 UART: [art] Store in in slot 0x4
20,867,264 UART: [art] Derive Key Pair
20,868,305 UART: [art] Store priv key in slot 0x5
23,330,914 UART: [art] Derive Key Pair - Done
23,344,019 UART: [art] Signing Cert with AUTHO
23,345,327 UART: RITY.KEYID = 7
25,056,984 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,483 UART: [art] PUB.X = EDDCAD1115C9ABDD2F08BA519E3E3365A8B311E4B5BD6EC8762892863AC20FA1F9D6CD93428AFBC2794F9EF5E01AFA55
25,065,779 UART: [art] PUB.Y = 9A568E2B9D13E4ABB761F4C8A082C7092CC69E6221EE02DEDEE767B25965E769BC256F1C58E292075AA07D58E2AF47D0
25,073,061 UART: [art] SIG.R = 1B0B6B1D53AC353B11F3A16A876B03779BA5FACFCCA5073FC65F0E8C63F9B92937EA070A38F89A57E7DCCE99553B4E62
25,080,496 UART: [art] SIG.S = 670ACAC3246AA15BF8D888C31350A02197097CC7FEF427E15D2DBC90EE483AB7A3898F0DFDB6B7829CEF2A6F0C4A5AB8
26,060,028 UART: Caliptra RT
26,060,750 UART: [state] CFI Enabled
26,225,954 UART: [rt] RT listening for mailbox commands...
26,257,040 UART: [rt]cmd =0x47544744, len=8
26,259,088 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,418,702 ready_for_fw is high
3,419,096 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,726,324 >>> mbox cmd response: success
14,727,140 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,007,263 UART:
19,007,668 UART: Running Caliptra FMC ...
19,008,780 UART:
19,008,937 UART: [state] CFI Enabled
19,075,726 UART: [fht] FMC Alias Private Key: 7
20,839,872 UART: [art] Extend RT PCRs Done
20,841,096 UART: [art] Lock RT PCRs Done
20,842,661 UART: [art] Populate DV Done
20,847,702 UART: [fht] FMC Alias Private Key: 7
20,849,305 UART: [art] Derive CDI
20,850,045 UART: [art] Store in in slot 0x4
20,908,963 UART: [art] Derive Key Pair
20,910,001 UART: [art] Store priv key in slot 0x5
23,372,600 UART: [art] Derive Key Pair - Done
23,385,324 UART: [art] Signing Cert with AUTHO
23,386,658 UART: RITY.KEYID = 7
25,098,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,750 UART: [art] PUB.X = 07DA3A0EF6A84CE2FDB79B75E5680D3A579A8BAF2BD8631CDC1F70C29D06B719C54B58C449D012694B1BA706D853613F
25,107,015 UART: [art] PUB.Y = 317E137CF52D8FA0B07B0B893E7646255750DFA6017D02E601675F84B46AC00F5F5EC7B445B536671DA0DF5C61856011
25,114,292 UART: [art] SIG.R = FE02B2E2FF697C0DF10BDAD3D11629C2D483BCA02ABF671F1EA53F9C35C1FD743BCBC0006AF97CE7D990325D28A746CA
25,121,696 UART: [art] SIG.S = 62DE7BC4E43501E16FAC4DC4EAE6EAF40C4D235F2E97DE18A8B83FDC966976234497DD8D37B45B3A30EF879F0E92BD3F
26,100,379 UART: Caliptra RT
26,101,069 UART: [state] CFI Enabled
26,267,432 UART: [rt] RT listening for mailbox commands...
26,298,633 UART: [rt]cmd =0x47544744, len=8
26,300,842 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,381 UART:
192,901 UART: Running Caliptra ROM ...
194,032 UART:
603,695 UART: [state] CFI Enabled
616,653 UART: [state] LifecycleState = Unprovisioned
619,022 UART: [state] DebugLocked = No
620,260 UART: [state] WD Timer not started. Device not locked for debugging
624,435 UART: [kat] SHA2-256
814,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,080 UART: [kat] ++
825,604 UART: [kat] sha1
837,133 UART: [kat] SHA2-256
840,110 UART: [kat] SHA2-384
847,312 UART: [kat] SHA2-512-ACC
849,893 UART: [kat] ECC-384
3,293,701 UART: [kat] HMAC-384Kdf
3,306,647 UART: [kat] LMS
3,838,457 UART: [kat] --
3,844,086 UART: [cold-reset] ++
3,846,299 UART: [fht] FHT @ 0x50003400
3,858,340 UART: [idev] ++
3,858,983 UART: [idev] CDI.KEYID = 6
3,860,014 UART: [idev] SUBJECT.KEYID = 7
3,861,070 UART: [idev] UDS.KEYID = 0
3,862,084 ready_for_fw is high
3,862,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,967 UART: [idev] Erasing UDS.KEYID = 0
6,332,335 UART: [idev] Sha1 KeyId Algorithm
6,354,097 UART: [idev] --
6,359,737 UART: [ldev] ++
6,360,415 UART: [ldev] CDI.KEYID = 6
6,361,349 UART: [ldev] SUBJECT.KEYID = 5
6,362,500 UART: [ldev] AUTHORITY.KEYID = 7
6,363,730 UART: [ldev] FE.KEYID = 1
6,373,051 UART: [ldev] Erasing FE.KEYID = 1
8,853,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,821 UART: [ldev] --
10,645,948 UART: [fwproc] Wait for Commands...
10,648,466 UART: [fwproc] Recv command 0x46574c44
10,650,777 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,832,722 >>> mbox cmd response: success
14,833,251 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,836,200 UART: [afmc] ++
14,836,944 UART: [afmc] CDI.KEYID = 6
14,838,127 UART: [afmc] SUBJECT.KEYID = 7
14,839,611 UART: [afmc] AUTHORITY.KEYID = 5
17,340,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,216 UART: [afmc] --
19,136,915 UART: [cold-reset] --
19,142,071 UART: [state] Locking Datavault
19,147,429 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,817 UART: [state] Locking ICCM
19,152,625 UART: [exit] Launching FMC @ 0x40000130
19,161,291 UART:
19,161,522 UART: Running Caliptra FMC ...
19,162,617 UART:
19,162,773 UART: [state] CFI Enabled
19,170,975 UART: [fht] FMC Alias Private Key: 7
20,927,679 UART: [art] Extend RT PCRs Done
20,928,894 UART: [art] Lock RT PCRs Done
20,930,430 UART: [art] Populate DV Done
20,935,625 UART: [fht] FMC Alias Private Key: 7
20,937,373 UART: [art] Derive CDI
20,938,184 UART: [art] Store in in slot 0x4
20,980,337 UART: [art] Derive Key Pair
20,981,334 UART: [art] Store priv key in slot 0x5
23,408,049 UART: [art] Derive Key Pair - Done
23,420,669 UART: [art] Signing Cert with AUTHO
23,421,961 UART: RITY.KEYID = 7
25,126,977 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,486 UART: [art] PUB.X = 381305B466FCC07A5076A8C5D5D776BA9273BC8AFDB5A02D70F5AAE1A3C56B5AFBDE5180894A630EE99EDEA290732532
25,135,788 UART: [art] PUB.Y = DFEE9DC24FDE418A1D0BDBE4FBCDA07EE58C5934FDB7BC71D6B2403B1AF2C2C840743C4BC50B9046B453B722EBAC57BB
25,143,081 UART: [art] SIG.R = 8F18B3529E83B5A3C4315595B4E9BC04B9BF38A10D0412A868F4FCAC5303A1584DDB038C037ED814C4E475D10ACE4D3B
25,150,516 UART: [art] SIG.S = B20BD04670F91DC853CAC89DAFE88731C2BF544E8A62068A8FC4DA5C1C358A50F03B23443EBAAA1FF4ABAFC157DB8487
26,129,269 UART: Caliptra RT
26,129,976 UART: [state] CFI Enabled
26,247,752 UART: [rt] RT listening for mailbox commands...
26,278,727 UART: [rt]cmd =0x47544744, len=8
26,280,848 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
3,757,518 ready_for_fw is high
3,757,900 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,954,400 >>> mbox cmd response: success
14,955,214 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,206,554 UART:
19,206,934 UART: Running Caliptra FMC ...
19,208,066 UART:
19,208,227 UART: [state] CFI Enabled
19,216,119 UART: [fht] FMC Alias Private Key: 7
20,973,463 UART: [art] Extend RT PCRs Done
20,974,688 UART: [art] Lock RT PCRs Done
20,976,204 UART: [art] Populate DV Done
20,981,713 UART: [fht] FMC Alias Private Key: 7
20,983,413 UART: [art] Derive CDI
20,984,224 UART: [art] Store in in slot 0x4
21,026,822 UART: [art] Derive Key Pair
21,027,864 UART: [art] Store priv key in slot 0x5
23,454,492 UART: [art] Derive Key Pair - Done
23,467,372 UART: [art] Signing Cert with AUTHO
23,468,691 UART: RITY.KEYID = 7
25,174,071 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,580 UART: [art] PUB.X = D30A114E4A101032A1C355BC538C5ECE1EFD04A59CFAFD5273833117EE56E43466ABB8981EFF62A25AE936C2C56F7D00
25,182,766 UART: [art] PUB.Y = 8F034C4882CCDBE5D4648D38410CEA7A8405764B017036608C5BF59C116B8EF7BE7C4804967B5CBEBF06010158134E55
25,190,046 UART: [art] SIG.R = C01779AF7870F5DCD968FD062561908F3151DDFA104CFE149D78104B05D63DDE9F8F78A3C36C5C1B2B8F20F1F307C863
25,197,452 UART: [art] SIG.S = 408E2DF9C92D2397DA2E6317B1ACA7B828F1F05DEB393C37B206C7AB15AD71368A0C7A87216BCDD2C2D3D89B41333105
26,176,052 UART: Caliptra RT
26,176,739 UART: [state] CFI Enabled
26,294,115 UART: [rt] RT listening for mailbox commands...
26,325,190 UART: [rt]cmd =0x47544744, len=8
26,327,315 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,877 UART: [kat] SHA2-256
881,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,923 UART: [kat] ++
886,075 UART: [kat] sha1
890,473 UART: [kat] SHA2-256
892,411 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,642 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,637 UART: [cold-reset] ++
1,477,191 UART: [fht] Storing FHT @ 0x50003400
1,479,738 UART: [idev] ++
1,479,906 UART: [idev] CDI.KEYID = 6
1,480,266 UART: [idev] SUBJECT.KEYID = 7
1,480,690 UART: [idev] UDS.KEYID = 0
1,481,035 ready_for_fw is high
1,481,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,888 UART: [idev] Erasing UDS.KEYID = 0
1,505,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,037 UART: [ldev] ++
1,515,205 UART: [ldev] CDI.KEYID = 6
1,515,568 UART: [ldev] SUBJECT.KEYID = 5
1,515,994 UART: [ldev] AUTHORITY.KEYID = 7
1,516,457 UART: [ldev] FE.KEYID = 1
1,521,581 UART: [ldev] Erasing FE.KEYID = 1
1,547,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,156 UART: [ldev] --
1,586,417 UART: [fwproc] Waiting for Commands...
1,587,086 UART: [fwproc] Received command 0x46574c44
1,587,877 UART: [fwproc] Received Image of size 114360 bytes
2,886,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,147 >>> mbox cmd response: success
3,079,147 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,080,387 UART: [afmc] ++
3,080,555 UART: [afmc] CDI.KEYID = 6
3,080,917 UART: [afmc] SUBJECT.KEYID = 7
3,081,342 UART: [afmc] AUTHORITY.KEYID = 5
3,116,655 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,320 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,010 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,961 UART: [afmc] --
3,159,839 UART: [cold-reset] --
3,160,701 UART: [state] Locking Datavault
3,161,978 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,582 UART: [state] Locking ICCM
3,163,202 UART: [exit] Launching FMC @ 0x40000130
3,168,531 UART:
3,168,547 UART: Running Caliptra FMC ...
3,168,955 UART:
3,169,009 UART: [state] CFI Enabled
3,179,630 UART: [fht] FMC Alias Private Key: 7
3,287,449 UART: [art] Extend RT PCRs Done
3,287,877 UART: [art] Lock RT PCRs Done
3,289,303 UART: [art] Populate DV Done
3,297,610 UART: [fht] FMC Alias Private Key: 7
3,298,642 UART: [art] Derive CDI
3,298,922 UART: [art] Store in in slot 0x4
3,384,313 UART: [art] Derive Key Pair
3,384,673 UART: [art] Store priv key in slot 0x5
3,397,649 UART: [art] Derive Key Pair - Done
3,412,534 UART: [art] Signing Cert with AUTHO
3,413,014 UART: RITY.KEYID = 7
3,428,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,967 UART: [art] PUB.X = 13E6C9F0D7A5A7D004572CE358B13DDD1079A37B6542858DABC75742F415616BC14AF4C64B6228A832ADD5D613D6F0E4
3,435,740 UART: [art] PUB.Y = B14B10E45AA0817E246B320D4EEAE96A7B7C0F9DD348204CECC30E1597AE50DF712EC8F7A051DCA3EE3D0B6CFA9724F0
3,442,700 UART: [art] SIG.R = FA52B8FF6CBAC7BE24E233545AD82A2F951B30ACEDDEBDB09E1DC1A659114534CF985A773C6D032F9BC8C31D05AFE58F
3,449,490 UART: [art] SIG.S = ADAFD9B4C3152B6950076AD0668D563FBDAFD7E4990FC2D5078CAF7625ADAE8494219431DFE69ADEFDBD1D871F6F000D
3,474,161 UART: Caliptra RT
3,474,415 UART: [state] CFI Enabled
3,582,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,897 UART: [rt]cmd =0x47544744, len=8
3,614,520 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,513 ready_for_fw is high
1,362,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,637 >>> mbox cmd response: success
2,926,637 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,988,115 UART:
2,988,131 UART: Running Caliptra FMC ...
2,988,539 UART:
2,988,593 UART: [state] CFI Enabled
2,999,330 UART: [fht] FMC Alias Private Key: 7
3,107,335 UART: [art] Extend RT PCRs Done
3,107,763 UART: [art] Lock RT PCRs Done
3,109,329 UART: [art] Populate DV Done
3,117,568 UART: [fht] FMC Alias Private Key: 7
3,118,708 UART: [art] Derive CDI
3,118,988 UART: [art] Store in in slot 0x4
3,204,763 UART: [art] Derive Key Pair
3,205,123 UART: [art] Store priv key in slot 0x5
3,218,223 UART: [art] Derive Key Pair - Done
3,232,742 UART: [art] Signing Cert with AUTHO
3,233,222 UART: RITY.KEYID = 7
3,248,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,117 UART: [art] PUB.X = 29B0862AFC7F4B18C7DB80715D1703A579F84BE31E1B9A7F7B641757E0C8FCA1974A185313BB6F234B060978E2100BA3
3,255,877 UART: [art] PUB.Y = F1FBAC9A8EEAFBCDFDF3699890F2277A6819ADA8980498437B3B121582C483AE16179FAB8E51D4232DF3255A1EC04306
3,262,831 UART: [art] SIG.R = 39E201B3B9624110CE780DD008654A224708956B76187F26E7695491A0134D0337CBDC6FA1665506817626B006DCD851
3,269,564 UART: [art] SIG.S = 869FB4056EB89B11CC81D1342115974572B6367EAA5B38192B3BD6D01210E3955694A1F99FF770E4EF5F2801672DBB50
3,293,167 UART: Caliptra RT
3,293,421 UART: [state] CFI Enabled
3,401,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,604 UART: [rt]cmd =0x47544744, len=8
3,433,059 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
891,002 UART: [kat] SHA2-256
892,940 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,195 UART: [kat] HMAC-384Kdf
908,011 UART: [kat] LMS
1,476,207 UART: [kat] --
1,477,302 UART: [cold-reset] ++
1,477,710 UART: [fht] Storing FHT @ 0x50003400
1,480,459 UART: [idev] ++
1,480,627 UART: [idev] CDI.KEYID = 6
1,480,987 UART: [idev] SUBJECT.KEYID = 7
1,481,411 UART: [idev] UDS.KEYID = 0
1,481,756 ready_for_fw is high
1,481,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,997 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,503 UART: [idev] --
1,515,424 UART: [ldev] ++
1,515,592 UART: [ldev] CDI.KEYID = 6
1,515,955 UART: [ldev] SUBJECT.KEYID = 5
1,516,381 UART: [ldev] AUTHORITY.KEYID = 7
1,516,844 UART: [ldev] FE.KEYID = 1
1,522,380 UART: [ldev] Erasing FE.KEYID = 1
1,548,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,063 UART: [ldev] --
1,587,456 UART: [fwproc] Waiting for Commands...
1,588,217 UART: [fwproc] Received command 0x46574c44
1,589,008 UART: [fwproc] Received Image of size 114360 bytes
2,887,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,411 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,763 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,710 >>> mbox cmd response: success
3,080,710 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,081,938 UART: [afmc] ++
3,082,106 UART: [afmc] CDI.KEYID = 6
3,082,468 UART: [afmc] SUBJECT.KEYID = 7
3,082,893 UART: [afmc] AUTHORITY.KEYID = 5
3,117,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,764 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,157 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,847 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,726 UART: [afmc] --
3,160,836 UART: [cold-reset] --
3,161,732 UART: [state] Locking Datavault
3,162,841 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,445 UART: [state] Locking ICCM
3,163,931 UART: [exit] Launching FMC @ 0x40000130
3,169,260 UART:
3,169,276 UART: Running Caliptra FMC ...
3,169,684 UART:
3,169,827 UART: [state] CFI Enabled
3,180,620 UART: [fht] FMC Alias Private Key: 7
3,289,131 UART: [art] Extend RT PCRs Done
3,289,559 UART: [art] Lock RT PCRs Done
3,291,419 UART: [art] Populate DV Done
3,299,708 UART: [fht] FMC Alias Private Key: 7
3,300,642 UART: [art] Derive CDI
3,300,922 UART: [art] Store in in slot 0x4
3,386,657 UART: [art] Derive Key Pair
3,387,017 UART: [art] Store priv key in slot 0x5
3,400,299 UART: [art] Derive Key Pair - Done
3,415,518 UART: [art] Signing Cert with AUTHO
3,415,998 UART: RITY.KEYID = 7
3,430,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,731 UART: [art] PUB.X = 3FB7D77B9C34B6AED0AE94DF5EE54B71B55CFFE4ECBB8C9D086E38F17260524935254B7738D0A8367690ACDF19566667
3,438,508 UART: [art] PUB.Y = D13FD7394AC4505B60912EA00A6280822D2A87F493101D069629FE417BC829F508C53A5F861542F24585B97F98476417
3,445,435 UART: [art] SIG.R = DAB99EC5033835828370BE845A567A18FF21596B8CBF66B18140B37C6284DA4D400314E670AA296F247A6929253B4672
3,452,191 UART: [art] SIG.S = BF27DBC39EA66FBFF1D5FC8346E1E318981E34A1894B69E38FD5B5753DDF7D086F5E8BF6F357B9FCA8BC03E4E064DA20
3,476,310 UART: Caliptra RT
3,476,656 UART: [state] CFI Enabled
3,585,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,350 UART: [rt]cmd =0x47544744, len=8
3,616,853 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,844 ready_for_fw is high
1,362,844 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,384 >>> mbox cmd response: success
2,927,384 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,990,134 UART:
2,990,150 UART: Running Caliptra FMC ...
2,990,558 UART:
2,990,701 UART: [state] CFI Enabled
3,001,412 UART: [fht] FMC Alias Private Key: 7
3,109,765 UART: [art] Extend RT PCRs Done
3,110,193 UART: [art] Lock RT PCRs Done
3,111,729 UART: [art] Populate DV Done
3,120,054 UART: [fht] FMC Alias Private Key: 7
3,120,994 UART: [art] Derive CDI
3,121,274 UART: [art] Store in in slot 0x4
3,206,827 UART: [art] Derive Key Pair
3,207,187 UART: [art] Store priv key in slot 0x5
3,220,443 UART: [art] Derive Key Pair - Done
3,235,371 UART: [art] Signing Cert with AUTHO
3,235,851 UART: RITY.KEYID = 7
3,251,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,872 UART: [art] PUB.X = 2195F94242A1FA61324A9057706B604C907C988DB9690F5FFBEBE3DC3D0DFEEE606341F4351A7E9B4304BA47229090C6
3,258,635 UART: [art] PUB.Y = 3AD3C9DB0E2DBEB58C5741D2D94FD75B78AB3816BF26CEEBBFF5A5069C3D852585E2015FED764A3A4DC8D28161B8E69D
3,265,598 UART: [art] SIG.R = 45F9BE049E4DE4E8B55191988BFB994FA3A3847A9AE7503A49BEC5DF36E721BD4040F6D8F42178CC8C56705FA0C11126
3,272,373 UART: [art] SIG.S = 2F1199BDF17B186E6E503917986FBE0E781B4979FA497311F7DD5EA7B12686785376AFA76C2D8AB86106F1A48D72AB3D
3,296,790 UART: Caliptra RT
3,297,136 UART: [state] CFI Enabled
3,405,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,974 UART: [rt]cmd =0x47544744, len=8
3,437,449 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,584 UART: [kat] SHA2-512-ACC
908,485 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,300 UART: [kat] LMS
1,170,628 UART: [kat] --
1,171,233 UART: [cold-reset] ++
1,171,761 UART: [fht] FHT @ 0x50003400
1,174,502 UART: [idev] ++
1,174,670 UART: [idev] CDI.KEYID = 6
1,175,030 UART: [idev] SUBJECT.KEYID = 7
1,175,454 UART: [idev] UDS.KEYID = 0
1,175,799 ready_for_fw is high
1,175,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,368 UART: [idev] Erasing UDS.KEYID = 0
1,200,169 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,256 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,282,110 UART: [fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,474 >>> mbox cmd response: success
2,773,474 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,628 UART: [afmc] ++
2,774,796 UART: [afmc] CDI.KEYID = 6
2,775,158 UART: [afmc] SUBJECT.KEYID = 7
2,775,583 UART: [afmc] AUTHORITY.KEYID = 5
2,811,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,927 UART: [afmc] --
2,854,895 UART: [cold-reset] --
2,855,719 UART: [state] Locking Datavault
2,856,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,396 UART: [state] Locking ICCM
2,857,934 UART: [exit] Launching FMC @ 0x40000130
2,863,263 UART:
2,863,279 UART: Running Caliptra FMC ...
2,863,687 UART:
2,863,741 UART: [state] CFI Enabled
2,873,926 UART: [fht] FMC Alias Private Key: 7
2,982,313 UART: [art] Extend RT PCRs Done
2,982,741 UART: [art] Lock RT PCRs Done
2,983,967 UART: [art] Populate DV Done
2,992,418 UART: [fht] FMC Alias Private Key: 7
2,993,416 UART: [art] Derive CDI
2,993,696 UART: [art] Store in in slot 0x4
3,079,081 UART: [art] Derive Key Pair
3,079,441 UART: [art] Store priv key in slot 0x5
3,093,177 UART: [art] Derive Key Pair - Done
3,107,686 UART: [art] Signing Cert with AUTHO
3,108,166 UART: RITY.KEYID = 7
3,123,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,267 UART: [art] PUB.X = E6793D82AB868ABE76289D8D52023DFEB7411A48685379C90B7EC96961C99BBF54E54F14153F1656E3EB07E615F7B61A
3,131,030 UART: [art] PUB.Y = B0E4BD68FCAB4D927E5300A9CF9158E37664A08762D23DF50A1F915D7D7A23D38D130D4E26154E204CA111A3F84F7BB7
3,137,960 UART: [art] SIG.R = FC690A2B5952686213994E69C81617DB4A309DC4E7F8543834131853F9313CA3C94AAB629072C23A759BE6837E6A58CD
3,144,721 UART: [art] SIG.S = C5E561C4BC8187031B0DDCF5836B9536BBC46D05071FFE826AC6EBFFD4AAAC086812B4997A7D0FCB4D35484C78FA70DA
3,167,726 UART: Caliptra RT
3,167,980 UART: [state] CFI Enabled
3,276,903 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,930 UART: [rt]cmd =0x47544744, len=8
3,308,551 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,275 ready_for_fw is high
1,060,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,349 >>> mbox cmd response: success
2,626,349 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,689,441 UART:
2,689,457 UART: Running Caliptra FMC ...
2,689,865 UART:
2,689,919 UART: [state] CFI Enabled
2,700,216 UART: [fht] FMC Alias Private Key: 7
2,808,727 UART: [art] Extend RT PCRs Done
2,809,155 UART: [art] Lock RT PCRs Done
2,810,417 UART: [art] Populate DV Done
2,818,664 UART: [fht] FMC Alias Private Key: 7
2,819,762 UART: [art] Derive CDI
2,820,042 UART: [art] Store in in slot 0x4
2,906,215 UART: [art] Derive Key Pair
2,906,575 UART: [art] Store priv key in slot 0x5
2,920,087 UART: [art] Derive Key Pair - Done
2,934,868 UART: [art] Signing Cert with AUTHO
2,935,348 UART: RITY.KEYID = 7
2,950,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,003 UART: [art] PUB.X = 1D6DA29B2CEA3C3A9192D4EFA04DA3487D3DF6565AA74AB5AFEAF0B5558FFF418C095AA5B05870BA0631359BAC541CF7
2,957,789 UART: [art] PUB.Y = 4D28DA62033470D13E978EECB5BCC4C33657D2A7399EF8747210BB44BAD459DB69B60256AE0C3DBA221FFFD31B4C1614
2,964,742 UART: [art] SIG.R = 8DA18359BEDF7210BC6A395C8200B03B3B70F156859183B095477EE09210FC4D8D439918C02FC2D19D1CEEB831571C6D
2,971,492 UART: [art] SIG.S = 116D588B50FBCBD462EE1C2575B30EDC7092CED70244EB953CC47C0BCE57E4C83E75978DA6E9AA72368A8A2E00DD2868
2,995,774 UART: Caliptra RT
2,996,028 UART: [state] CFI Enabled
3,104,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,131 UART: [rt]cmd =0x47544744, len=8
3,135,684 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,828 UART: [fht] FHT @ 0x50003400
1,175,493 UART: [idev] ++
1,175,661 UART: [idev] CDI.KEYID = 6
1,176,021 UART: [idev] SUBJECT.KEYID = 7
1,176,445 UART: [idev] UDS.KEYID = 0
1,176,790 ready_for_fw is high
1,176,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,585 UART: [idev] Erasing UDS.KEYID = 0
1,201,876 UART: [idev] Sha1 KeyId Algorithm
1,210,456 UART: [idev] --
1,211,484 UART: [ldev] ++
1,211,652 UART: [ldev] CDI.KEYID = 6
1,212,015 UART: [ldev] SUBJECT.KEYID = 5
1,212,441 UART: [ldev] AUTHORITY.KEYID = 7
1,212,904 UART: [ldev] FE.KEYID = 1
1,218,140 UART: [ldev] Erasing FE.KEYID = 1
1,245,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,994 UART: [ldev] --
1,284,363 UART: [fwproc] Wait for Commands...
1,285,171 UART: [fwproc] Recv command 0x46574c44
1,285,899 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,283 >>> mbox cmd response: success
2,776,283 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,777,429 UART: [afmc] ++
2,777,597 UART: [afmc] CDI.KEYID = 6
2,777,959 UART: [afmc] SUBJECT.KEYID = 7
2,778,384 UART: [afmc] AUTHORITY.KEYID = 5
2,814,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,615 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,334 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,090 UART: [afmc] --
2,857,974 UART: [cold-reset] --
2,858,922 UART: [state] Locking Datavault
2,860,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,655 UART: [state] Locking ICCM
2,861,125 UART: [exit] Launching FMC @ 0x40000130
2,866,454 UART:
2,866,470 UART: Running Caliptra FMC ...
2,866,878 UART:
2,867,021 UART: [state] CFI Enabled
2,877,630 UART: [fht] FMC Alias Private Key: 7
2,985,123 UART: [art] Extend RT PCRs Done
2,985,551 UART: [art] Lock RT PCRs Done
2,987,145 UART: [art] Populate DV Done
2,995,284 UART: [fht] FMC Alias Private Key: 7
2,996,212 UART: [art] Derive CDI
2,996,492 UART: [art] Store in in slot 0x4
3,082,031 UART: [art] Derive Key Pair
3,082,391 UART: [art] Store priv key in slot 0x5
3,095,313 UART: [art] Derive Key Pair - Done
3,109,936 UART: [art] Signing Cert with AUTHO
3,110,416 UART: RITY.KEYID = 7
3,125,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,319 UART: [art] PUB.X = 537EED462E5229E7B907AF75A06DB81DD86D91A13B655A30AD04A81AFBC0913A46E92CBABCA931B20F90D25930202E23
3,133,090 UART: [art] PUB.Y = CD6A661208F4A2A6DB9D47D979FFE537C2B568EBF989EA6D609D1C277663781D500D53EE671156EA105C944B0F59BA6E
3,140,039 UART: [art] SIG.R = 841C9D13F99438E838174A46F6395205483940ABCDB9E6444C34AC9078F31A5D161BB96A341AAE1439B12094A97E507A
3,146,800 UART: [art] SIG.S = 6891390F3010C25ED1AC3714C1FD97B268A79EDD7C62293584A1BE5DBFB5445C67DA78BC30A7E54BC3A8F9EAB6F3AF94
3,171,262 UART: Caliptra RT
3,171,608 UART: [state] CFI Enabled
3,279,580 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,823 UART: [rt]cmd =0x47544744, len=8
3,311,232 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,740 ready_for_fw is high
1,061,740 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,116 >>> mbox cmd response: success
2,628,116 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,690,328 UART:
2,690,344 UART: Running Caliptra FMC ...
2,690,752 UART:
2,690,895 UART: [state] CFI Enabled
2,701,648 UART: [fht] FMC Alias Private Key: 7
2,809,801 UART: [art] Extend RT PCRs Done
2,810,229 UART: [art] Lock RT PCRs Done
2,812,007 UART: [art] Populate DV Done
2,820,166 UART: [fht] FMC Alias Private Key: 7
2,821,286 UART: [art] Derive CDI
2,821,566 UART: [art] Store in in slot 0x4
2,907,397 UART: [art] Derive Key Pair
2,907,757 UART: [art] Store priv key in slot 0x5
2,921,111 UART: [art] Derive Key Pair - Done
2,936,077 UART: [art] Signing Cert with AUTHO
2,936,557 UART: RITY.KEYID = 7
2,951,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,254 UART: [art] PUB.X = 7A72101508294915DDD33520AB8BE05AE8D87DDABB57890D5C2DC75CA554390D2F0B1FE8B1CDC6BDA78211E8A47A99D8
2,959,026 UART: [art] PUB.Y = 21B4F1369245F8887154FD7AE6680D3FD4622FE05182E20781C426A881166C47BF3B64B5C88139635A48202FF7DC67ED
2,965,964 UART: [art] SIG.R = 420F4793F52704462C5132ABE5B19379270886B326F20215A835E438333850899007A838BBE0C04941711C106516F340
2,972,693 UART: [art] SIG.S = 214A4B8AAB626FCF1D80D9D36EB65C7420B6A0D8B4C70E8EBB12468EAFEA722B95D1A264B16E3673B5AFA6174A9FDBB9
2,996,187 UART: Caliptra RT
2,996,533 UART: [state] CFI Enabled
3,104,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,914 UART: [rt]cmd =0x47544744, len=8
3,136,449 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,207,921 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,490 UART: [ldev] Erasing FE.KEYID = 1
1,242,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,498 UART: [ldev] --
1,281,802 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,528 >>> mbox cmd response: success
2,773,528 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,593 UART: [afmc] ++
2,774,761 UART: [afmc] CDI.KEYID = 6
2,775,124 UART: [afmc] SUBJECT.KEYID = 7
2,775,550 UART: [afmc] AUTHORITY.KEYID = 5
2,811,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,698 UART: [afmc] --
2,854,808 UART: [cold-reset] --
2,855,636 UART: [state] Locking Datavault
2,856,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,301 UART: [state] Locking ICCM
2,857,963 UART: [exit] Launching FMC @ 0x40000130
2,863,292 UART:
2,863,308 UART: Running Caliptra FMC ...
2,863,716 UART:
2,863,770 UART: [state] CFI Enabled
2,874,531 UART: [fht] FMC Alias Private Key: 7
2,982,844 UART: [art] Extend RT PCRs Done
2,983,272 UART: [art] Lock RT PCRs Done
2,985,100 UART: [art] Populate DV Done
2,993,373 UART: [fht] FMC Alias Private Key: 7
2,994,455 UART: [art] Derive CDI
2,994,735 UART: [art] Store in in slot 0x4
3,080,342 UART: [art] Derive Key Pair
3,080,702 UART: [art] Store priv key in slot 0x5
3,094,922 UART: [art] Derive Key Pair - Done
3,109,713 UART: [art] Signing Cert with AUTHO
3,110,193 UART: RITY.KEYID = 7
3,125,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,072 UART: [art] PUB.X = 362265A777F2CD696A6EA7C35F7BC57CE3A8F85607E58EFDC1D64077F1E1EFB139AA0ACDCD91FCECFCBFB031922BCD52
3,132,864 UART: [art] PUB.Y = E35CA7F200FB8D1D39A52B9371A9C8852FAE40FCC08A951BA408281C4A8FCEE3AA0D0C0D33E7A7E496C65D354F381B8D
3,139,798 UART: [art] SIG.R = CF9FA29D2B438C96512BB5D6ED9D77D0572CA38D3900E98101D3AE7FF60875EB20E22AA3D625F2A1D643388CEC47EDA5
3,146,554 UART: [art] SIG.S = 5411161819EC18A9F64E24DD14384794DD17502F5A8E6E9EAB06BE3A02C549692A21475E8BF07DD2270E5B3BC8AE4482
3,170,454 UART: Caliptra RT
3,170,708 UART: [state] CFI Enabled
3,278,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,005 UART: [rt]cmd =0x47544744, len=8
3,310,346 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,300 ready_for_fw is high
1,055,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,566 >>> mbox cmd response: success
2,622,566 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,684,516 UART:
2,684,532 UART: Running Caliptra FMC ...
2,684,940 UART:
2,684,994 UART: [state] CFI Enabled
2,695,507 UART: [fht] FMC Alias Private Key: 7
2,803,202 UART: [art] Extend RT PCRs Done
2,803,630 UART: [art] Lock RT PCRs Done
2,804,836 UART: [art] Populate DV Done
2,813,219 UART: [fht] FMC Alias Private Key: 7
2,814,257 UART: [art] Derive CDI
2,814,537 UART: [art] Store in in slot 0x4
2,900,420 UART: [art] Derive Key Pair
2,900,780 UART: [art] Store priv key in slot 0x5
2,913,830 UART: [art] Derive Key Pair - Done
2,928,908 UART: [art] Signing Cert with AUTHO
2,929,388 UART: RITY.KEYID = 7
2,944,856 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,621 UART: [art] PUB.X = 3583D0876FBED1FF91E56A49B91F9DFD7A138CF811AE09CE36BC344F28B7A263C55F77C4B688C6021E710C4F3E95FA19
2,952,394 UART: [art] PUB.Y = 865EBE2D60A6BB37D655B255F9FED9F9AA5E09DD0F325A07129F9229FAFBD2CC182516F2706D837349A321C0D1CD47C8
2,959,347 UART: [art] SIG.R = 0F025428DC20315C0FC8BD0C82C1F364B661C2475AD0914074DB1572C14A6B5F46DDCB224064C1CE2BEB57DF66BCB2E2
2,966,117 UART: [art] SIG.S = 538354D845C6A00711DB49503E442ABEE663060533EEA1FB8903BE151BF1236A870EC213FD7B7244AA88A81CB0509936
2,989,945 UART: Caliptra RT
2,990,199 UART: [state] CFI Enabled
3,097,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,522 UART: [rt]cmd =0x47544744, len=8
3,129,169 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,855 UART: [state] LifecycleState = Unprovisioned
85,510 UART: [state] DebugLocked = No
86,108 UART: [state] WD Timer not started. Device not locked for debugging
87,395 UART: [kat] SHA2-256
890,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,074 UART: [kat] ++
895,226 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
916,021 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,556 UART: [cold-reset] ++
1,170,066 UART: [fht] FHT @ 0x50003400
1,172,614 UART: [idev] ++
1,172,782 UART: [idev] CDI.KEYID = 6
1,173,143 UART: [idev] SUBJECT.KEYID = 7
1,173,568 UART: [idev] UDS.KEYID = 0
1,173,914 ready_for_fw is high
1,173,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,398 UART: [idev] Erasing UDS.KEYID = 0
1,198,502 UART: [idev] Sha1 KeyId Algorithm
1,207,496 UART: [idev] --
1,208,541 UART: [ldev] ++
1,208,709 UART: [ldev] CDI.KEYID = 6
1,209,073 UART: [ldev] SUBJECT.KEYID = 5
1,209,500 UART: [ldev] AUTHORITY.KEYID = 7
1,209,963 UART: [ldev] FE.KEYID = 1
1,215,351 UART: [ldev] Erasing FE.KEYID = 1
1,241,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,199 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,435 >>> mbox cmd response: success
2,772,435 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,773,634 UART: [afmc] ++
2,773,802 UART: [afmc] CDI.KEYID = 6
2,774,165 UART: [afmc] SUBJECT.KEYID = 7
2,774,591 UART: [afmc] AUTHORITY.KEYID = 5
2,810,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,065 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,784 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,661 UART: [afmc] --
2,853,707 UART: [cold-reset] --
2,854,631 UART: [state] Locking Datavault
2,855,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,246 UART: [state] Locking ICCM
2,856,782 UART: [exit] Launching FMC @ 0x40000130
2,862,111 UART:
2,862,127 UART: Running Caliptra FMC ...
2,862,535 UART:
2,862,678 UART: [state] CFI Enabled
2,873,217 UART: [fht] FMC Alias Private Key: 7
2,981,504 UART: [art] Extend RT PCRs Done
2,981,932 UART: [art] Lock RT PCRs Done
2,983,578 UART: [art] Populate DV Done
2,991,669 UART: [fht] FMC Alias Private Key: 7
2,992,599 UART: [art] Derive CDI
2,992,879 UART: [art] Store in in slot 0x4
3,078,688 UART: [art] Derive Key Pair
3,079,048 UART: [art] Store priv key in slot 0x5
3,092,388 UART: [art] Derive Key Pair - Done
3,106,910 UART: [art] Signing Cert with AUTHO
3,107,390 UART: RITY.KEYID = 7
3,122,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,515 UART: [art] PUB.X = 7AD7D3BD3FB1DC34E1B88D15CD4AA4B04C75093E2B7A48DD3F6809E312C6BA3CBB521FFE220CFA7434FB9632627E102C
3,130,296 UART: [art] PUB.Y = D59D1E122A07BBC41F5606CD741E280D8BC77D57740C7AD58D6B00A0D6731829FBE7A0E0C90CF04654077A5DC8F68701
3,137,209 UART: [art] SIG.R = 4B8F31BBAD50C85CF854B1103EC843747E6C04ABD29793AEF4902197FAB162A44E63422B7D4DB0DA7259872C89070DD0
3,143,976 UART: [art] SIG.S = 3D4709DB9673CBBB0B210B24A9E9A47A088F97754BCC59E9526AFC0AD6D2F9E61A5772942E13B4AD3E73CC71CF12C27C
3,167,608 UART: Caliptra RT
3,167,954 UART: [state] CFI Enabled
3,275,848 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,837 UART: [rt]cmd =0x47544744, len=8
3,307,386 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,579 ready_for_fw is high
1,056,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,989 >>> mbox cmd response: success
2,622,989 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,495 UART:
2,685,511 UART: Running Caliptra FMC ...
2,685,919 UART:
2,686,062 UART: [state] CFI Enabled
2,696,785 UART: [fht] FMC Alias Private Key: 7
2,805,280 UART: [art] Extend RT PCRs Done
2,805,708 UART: [art] Lock RT PCRs Done
2,807,084 UART: [art] Populate DV Done
2,815,191 UART: [fht] FMC Alias Private Key: 7
2,816,149 UART: [art] Derive CDI
2,816,429 UART: [art] Store in in slot 0x4
2,902,212 UART: [art] Derive Key Pair
2,902,572 UART: [art] Store priv key in slot 0x5
2,916,096 UART: [art] Derive Key Pair - Done
2,930,889 UART: [art] Signing Cert with AUTHO
2,931,369 UART: RITY.KEYID = 7
2,946,771 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,536 UART: [art] PUB.X = FA8B3EBDB52F8B3465E82552B248791093D9FE99D628A387C4893579480DAEB08B943D4D60FE9B96E078229FDDB37D0F
2,954,306 UART: [art] PUB.Y = BBCB8CB589C54E3E907ECBDF1B4A0647E16E50D4FCBB20D41972A8901BD913B55DDDA9702EAEE53385EB1DBBDBEF633F
2,961,283 UART: [art] SIG.R = E79E9873D0DD64862FEBE19CF8844362FE4BE956F13951FCCB6D9E267C4B54B6231C095091D9AC59B5A829ABC2A585A1
2,968,060 UART: [art] SIG.S = C0B28667E2A4DC9AC0C35D2944A169744997190271C20BC6094F9F272E055776113EF3107B43CC184F56638CA086CCFF
2,991,463 UART: Caliptra RT
2,991,809 UART: [state] CFI Enabled
3,098,650 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,745 UART: [rt]cmd =0x47544744, len=8
3,130,262 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,516 UART:
192,883 UART: Running Caliptra ROM ...
194,071 UART:
194,228 UART: [state] CFI Enabled
265,189 UART: [state] LifecycleState = Unprovisioned
267,097 UART: [state] DebugLocked = No
268,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,848 UART: [kat] SHA2-256
443,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,033 UART: [kat] ++
454,522 UART: [kat] sha1
464,680 UART: [kat] SHA2-256
467,397 UART: [kat] SHA2-384
474,595 UART: [kat] SHA2-512-ACC
476,954 UART: [kat] ECC-384
2,769,165 UART: [kat] HMAC-384Kdf
2,800,305 UART: [kat] LMS
3,990,646 UART: [kat] --
3,992,527 UART: [cold-reset] ++
3,994,028 UART: [fht] Storing FHT @ 0x50003400
4,004,791 UART: [idev] ++
4,005,353 UART: [idev] CDI.KEYID = 6
4,006,386 UART: [idev] SUBJECT.KEYID = 7
4,007,560 UART: [idev] UDS.KEYID = 0
4,008,594 ready_for_fw is high
4,008,799 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,152,252 UART: [idev] Erasing UDS.KEYID = 0
7,344,682 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,029 UART: [idev] --
7,370,698 UART: [ldev] ++
7,371,264 UART: [ldev] CDI.KEYID = 6
7,372,242 UART: [ldev] SUBJECT.KEYID = 5
7,373,449 UART: [ldev] AUTHORITY.KEYID = 7
7,374,673 UART: [ldev] FE.KEYID = 1
7,401,418 UART: [ldev] Erasing FE.KEYID = 1
10,735,898 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,859 UART: [ldev] --
13,095,777 UART: [fwproc] Waiting for Commands...
13,097,594 UART: [fwproc] Received command 0x46574c44
13,099,771 UART: [fwproc] Received Image of size 114036 bytes
17,150,865 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,318 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,614,950 >>> mbox cmd response: success
17,615,507 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,618,701 UART: [afmc] ++
17,619,282 UART: [afmc] CDI.KEYID = 6
17,620,247 UART: [afmc] SUBJECT.KEYID = 7
17,621,466 UART: [afmc] AUTHORITY.KEYID = 5
20,987,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,963 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,226 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,662 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,495 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,941 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,397 UART: [afmc] --
23,359,009 UART: [cold-reset] --
23,362,057 UART: [state] Locking Datavault
23,366,812 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,583 UART: [state] Locking ICCM
23,370,839 UART: [exit] Launching FMC @ 0x40000130
23,379,226 UART:
23,379,454 UART: Running Caliptra FMC ...
23,380,546 UART:
23,380,695 UART: [state] CFI Enabled
23,448,521 UART: [fht] FMC Alias Private Key: 7
25,786,076 UART: [art] Extend RT PCRs Done
25,787,299 UART: [art] Lock RT PCRs Done
25,788,782 UART: [art] Populate DV Done
25,794,129 UART: [fht] FMC Alias Private Key: 7
25,795,821 UART: [art] Derive CDI
25,796,629 UART: [art] Store in in slot 0x4
25,857,474 UART: [art] Derive Key Pair
25,858,465 UART: [art] Store priv key in slot 0x5
29,151,112 UART: [art] Derive Key Pair - Done
29,164,195 UART: [art] Signing Cert with AUTHO
29,165,500 UART: RITY.KEYID = 7
31,453,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,874 UART: [art] PUB.X = 09315B2F22BA1E965DE06AC405197FB3D7F1111D8AB0193ADA429837825A9CD4F05F6F2A309E484B223A5595BC19C20D
31,462,056 UART: [art] PUB.Y = 67AD4B59F6A506E1EC95992804EAB51F104FCA7A8D2A96C06438341506EF991192BA58A96B6ABB1E6C612457F1C0512E
31,469,317 UART: [art] SIG.R = 1685013E5F6CD48FDEE1EB0C6A3C17A727BD50D625004784AF4701DB124A3E005E9D1D5131E0225AA81E62E8758A568B
31,476,648 UART: [art] SIG.S = 97047AA5EDB9B628D89D23C8564503846B34E746E2EACDE0D3156EF9D473FB3534D354EA893FED5F81E8D8AE7300DB2C
32,782,329 UART: Caliptra RT
32,783,044 UART: [state] CFI Enabled
32,945,109 UART: [rt] RT listening for mailbox commands...
32,976,305 UART: [rt]cmd =0x54514754, len=24
32,978,894 >>> mbox cmd response data (8 bytes)
32,979,388 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,009,110 UART: [rt]cmd =0x54514754, len=24
33,011,657 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,785,856 ready_for_fw is high
3,786,469 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,856,408 >>> mbox cmd response: success
17,857,061 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,551,040 UART:
23,551,462 UART: Running Caliptra FMC ...
23,552,569 UART:
23,552,721 UART: [state] CFI Enabled
23,619,381 UART: [fht] FMC Alias Private Key: 7
25,957,403 UART: [art] Extend RT PCRs Done
25,958,630 UART: [art] Lock RT PCRs Done
25,960,076 UART: [art] Populate DV Done
25,965,604 UART: [fht] FMC Alias Private Key: 7
25,967,252 UART: [art] Derive CDI
25,967,983 UART: [art] Store in in slot 0x4
26,027,807 UART: [art] Derive Key Pair
26,028,849 UART: [art] Store priv key in slot 0x5
29,321,571 UART: [art] Derive Key Pair - Done
29,334,299 UART: [art] Signing Cert with AUTHO
29,335,625 UART: RITY.KEYID = 7
31,623,196 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,706 UART: [art] PUB.X = 5729AAC7A07BFB29D9627E40BC9803A8D4FE87C3A5A7DE46B247219A8C6CAA13324304C121D395809C447DCE119CAC83
31,631,941 UART: [art] PUB.Y = 87DC59235ADE8DCA73ECD4C4F05B763A2CB07C93E387C177FC849813B2DB889682FF068A11A46D018CAC56DC77B7F7B5
31,639,169 UART: [art] SIG.R = CEA9D07CF517598FBE44C8138C1F1D223AD82AC0A38EC3C5C689C9F639C1B2F33460B8EE6F1ED07FF2C7CD57DAFD595E
31,646,596 UART: [art] SIG.S = 129F242D78FCCAC32BC518FF36AF49FEFB0564043C3965A823FAF9C90B927DB01715535880DA599BD4362421176FC4FD
32,951,709 UART: Caliptra RT
32,952,428 UART: [state] CFI Enabled
33,112,267 UART: [rt] RT listening for mailbox commands...
33,143,468 UART: [rt]cmd =0x54514754, len=24
33,146,324 >>> mbox cmd response data (8 bytes)
33,146,855 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,176,464 UART: [rt]cmd =0x54514754, len=24
33,178,742 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,416 UART:
192,768 UART: Running Caliptra ROM ...
193,950 UART:
603,471 UART: [state] CFI Enabled
619,501 UART: [state] LifecycleState = Unprovisioned
621,383 UART: [state] DebugLocked = No
623,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,149 UART: [kat] SHA2-256
797,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,464 UART: [kat] ++
808,908 UART: [kat] sha1
820,843 UART: [kat] SHA2-256
823,562 UART: [kat] SHA2-384
828,847 UART: [kat] SHA2-512-ACC
831,213 UART: [kat] ECC-384
3,114,719 UART: [kat] HMAC-384Kdf
3,125,757 UART: [kat] LMS
4,315,837 UART: [kat] --
4,320,082 UART: [cold-reset] ++
4,322,264 UART: [fht] Storing FHT @ 0x50003400
4,333,172 UART: [idev] ++
4,333,739 UART: [idev] CDI.KEYID = 6
4,334,669 UART: [idev] SUBJECT.KEYID = 7
4,335,914 UART: [idev] UDS.KEYID = 0
4,336,893 ready_for_fw is high
4,337,087 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,305 UART: [idev] Erasing UDS.KEYID = 0
7,623,201 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,060 UART: [idev] --
7,649,264 UART: [ldev] ++
7,649,829 UART: [ldev] CDI.KEYID = 6
7,650,757 UART: [ldev] SUBJECT.KEYID = 5
7,651,965 UART: [ldev] AUTHORITY.KEYID = 7
7,653,247 UART: [ldev] FE.KEYID = 1
7,662,350 UART: [ldev] Erasing FE.KEYID = 1
10,953,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,412 UART: [ldev] --
13,315,993 UART: [fwproc] Waiting for Commands...
13,317,865 UART: [fwproc] Received command 0x46574c44
13,320,043 UART: [fwproc] Received Image of size 114036 bytes
17,374,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,553 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,447 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,838,527 >>> mbox cmd response: success
17,839,062 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,842,567 UART: [afmc] ++
17,843,152 UART: [afmc] CDI.KEYID = 6
17,844,035 UART: [afmc] SUBJECT.KEYID = 7
17,845,303 UART: [afmc] AUTHORITY.KEYID = 5
21,161,899 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,179 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,371 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,813 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,999 UART: [afmc] --
23,528,517 UART: [cold-reset] --
23,533,139 UART: [state] Locking Datavault
23,537,307 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,068 UART: [state] Locking ICCM
23,540,311 UART: [exit] Launching FMC @ 0x40000130
23,548,707 UART:
23,548,941 UART: Running Caliptra FMC ...
23,550,038 UART:
23,550,199 UART: [state] CFI Enabled
23,558,190 UART: [fht] FMC Alias Private Key: 7
25,888,634 UART: [art] Extend RT PCRs Done
25,889,855 UART: [art] Lock RT PCRs Done
25,891,686 UART: [art] Populate DV Done
25,896,822 UART: [fht] FMC Alias Private Key: 7
25,898,518 UART: [art] Derive CDI
25,899,327 UART: [art] Store in in slot 0x4
25,942,237 UART: [art] Derive Key Pair
25,943,267 UART: [art] Store priv key in slot 0x5
29,185,315 UART: [art] Derive Key Pair - Done
29,198,044 UART: [art] Signing Cert with AUTHO
29,199,390 UART: RITY.KEYID = 7
31,478,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,171 UART: [art] PUB.X = 4D783AFB8C23F0E5CF7A68F83F3DC7967092F57D3E8BA5E72C2283389EE60BE35B53E522ABE9AF815E162CDC4E484472
31,487,431 UART: [art] PUB.Y = BEA76EA926B0832414D3453809C77C35AAC8E1983E0CFFE1553ED20BD6AD07A304C81625C09C54DF5D0ADC786D0A2CB0
31,494,659 UART: [art] SIG.R = 0E33FD10E5159C594049B455A4D9A85D4F9A200DC6A83F80727F324339F95B2D9270A30C3A951BE556A9EA15F9FDB36F
31,501,998 UART: [art] SIG.S = 50814B73006E2D1FCA212CB8215428E3C792D36331CB7D86832FFEEB92AA70E115CBD99D0F3AE1EBB898CC01549F6E03
32,807,244 UART: Caliptra RT
32,807,954 UART: [state] CFI Enabled
32,925,190 UART: [rt] RT listening for mailbox commands...
32,956,225 UART: [rt]cmd =0x54514754, len=24
32,959,147 >>> mbox cmd response data (8 bytes)
32,959,777 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,989,708 UART: [rt]cmd =0x54514754, len=24
32,992,011 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,121,776 ready_for_fw is high
4,122,182 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,070,011 >>> mbox cmd response: success
18,070,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,708,864 UART:
23,709,230 UART: Running Caliptra FMC ...
23,710,353 UART:
23,710,509 UART: [state] CFI Enabled
23,718,999 UART: [fht] FMC Alias Private Key: 7
26,049,497 UART: [art] Extend RT PCRs Done
26,050,727 UART: [art] Lock RT PCRs Done
26,052,407 UART: [art] Populate DV Done
26,057,671 UART: [fht] FMC Alias Private Key: 7
26,059,374 UART: [art] Derive CDI
26,060,196 UART: [art] Store in in slot 0x4
26,102,679 UART: [art] Derive Key Pair
26,103,745 UART: [art] Store priv key in slot 0x5
29,346,117 UART: [art] Derive Key Pair - Done
29,358,793 UART: [art] Signing Cert with AUTHO
29,360,095 UART: RITY.KEYID = 7
31,639,628 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,139 UART: [art] PUB.X = 294DF14DA1B0C306F5537B21967B655E2C725FF7E3EC3ABAC1A6D49C9649C8F6E4B717741778BE6D9E70E800CC9F9946
31,648,348 UART: [art] PUB.Y = 56D2D10705629C5565460D4C619B3148FC9D511CD5EF9684DC6756ADC4E4ECD5A6F594429EEDA9041473DACB9D518603
31,655,594 UART: [art] SIG.R = 6238DE50211F0EDF71F3325D18B10A2049DF2FCACE98B0AEEF00A25EF56890C83B6DD4F1A1D2CFBD17EEDDC892CF84DE
31,663,007 UART: [art] SIG.S = 50E7FEAC2768C56FCEE8324124DF1626ABF221E055C47FB73701CE1F9CC9D754C06DE37E16F71CEA83F05BF24230DE8F
32,967,843 UART: Caliptra RT
32,968,556 UART: [state] CFI Enabled
33,085,619 UART: [rt] RT listening for mailbox commands...
33,116,820 UART: [rt]cmd =0x54514754, len=24
33,119,622 >>> mbox cmd response data (8 bytes)
33,120,034 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,149,949 UART: [rt]cmd =0x54514754, len=24
33,152,561 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,476 UART:
192,861 UART: Running Caliptra ROM ...
194,063 UART:
194,234 UART: [state] CFI Enabled
261,010 UART: [state] LifecycleState = Unprovisioned
262,869 UART: [state] DebugLocked = No
265,049 UART: [state] WD Timer not started. Device not locked for debugging
268,162 UART: [kat] SHA2-256
447,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,877 UART: [kat] ++
459,411 UART: [kat] sha1
469,510 UART: [kat] SHA2-256
472,586 UART: [kat] SHA2-384
478,795 UART: [kat] SHA2-512-ACC
481,738 UART: [kat] ECC-384
2,925,612 UART: [kat] HMAC-384Kdf
2,950,215 UART: [kat] LMS
3,479,664 UART: [kat] --
3,484,107 UART: [cold-reset] ++
3,486,117 UART: [fht] FHT @ 0x50003400
3,498,164 UART: [idev] ++
3,498,729 UART: [idev] CDI.KEYID = 6
3,499,711 UART: [idev] SUBJECT.KEYID = 7
3,500,886 UART: [idev] UDS.KEYID = 0
3,501,830 ready_for_fw is high
3,502,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,645,905 UART: [idev] Erasing UDS.KEYID = 0
6,004,473 UART: [idev] Sha1 KeyId Algorithm
6,027,992 UART: [idev] --
6,031,214 UART: [ldev] ++
6,031,798 UART: [ldev] CDI.KEYID = 6
6,032,712 UART: [ldev] SUBJECT.KEYID = 5
6,033,880 UART: [ldev] AUTHORITY.KEYID = 7
6,035,113 UART: [ldev] FE.KEYID = 1
6,079,366 UART: [ldev] Erasing FE.KEYID = 1
8,580,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,756 UART: [ldev] --
10,371,626 UART: [fwproc] Wait for Commands...
10,374,421 UART: [fwproc] Recv command 0x46574c44
10,376,513 UART: [fwproc] Recv'd Img size: 114360 bytes
13,777,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,845,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,914,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,232,620 >>> mbox cmd response: success
14,233,184 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,237,243 UART: [afmc] ++
14,237,837 UART: [afmc] CDI.KEYID = 6
14,238,721 UART: [afmc] SUBJECT.KEYID = 7
14,239,939 UART: [afmc] AUTHORITY.KEYID = 5
16,777,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,503,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,505,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,521,262 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,537,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,553,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,576,395 UART: [afmc] --
18,580,052 UART: [cold-reset] --
18,584,352 UART: [state] Locking Datavault
18,588,627 UART: [state] Locking PCR0, PCR1 and PCR31
18,590,265 UART: [state] Locking ICCM
18,592,769 UART: [exit] Launching FMC @ 0x40000130
18,601,215 UART:
18,601,456 UART: Running Caliptra FMC ...
18,602,567 UART:
18,602,726 UART: [state] CFI Enabled
18,661,927 UART: [fht] FMC Alias Private Key: 7
20,425,742 UART: [art] Extend RT PCRs Done
20,426,958 UART: [art] Lock RT PCRs Done
20,428,464 UART: [art] Populate DV Done
20,433,823 UART: [fht] FMC Alias Private Key: 7
20,435,254 UART: [art] Derive CDI
20,436,016 UART: [art] Store in in slot 0x4
20,494,277 UART: [art] Derive Key Pair
20,495,310 UART: [art] Store priv key in slot 0x5
22,958,349 UART: [art] Derive Key Pair - Done
22,971,499 UART: [art] Signing Cert with AUTHO
22,972,835 UART: RITY.KEYID = 7
24,683,332 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,835 UART: [art] PUB.X = 662D17A27A91D971E09F3D2C375919FB03D3DBB6F8EAAE152DBE5CCE1659969B57B93E2F98C6C15C1CE9D0D4A1120292
24,692,125 UART: [art] PUB.Y = 68DE7869AD867D5E6513963C2771CB5B00E0A2293F0BBC84B6FFA50660825536C4DB4F16238DA7BAE130AF5EA8903BEE
24,699,355 UART: [art] SIG.R = 23909D70A273F8F159218DFCDCE5550D6374561C85949C880E40D959B1BF600A686BFD8D4C5B10C8D2FDA2AA5C3B4E66
24,706,751 UART: [art] SIG.S = 52BFB3A340092CFB2D6FA30A8668D14E9E11E777673D1D138FB8ECDC5E009E605699B10AF6B97AFBA8AF505CB620753F
25,685,080 UART: Caliptra RT
25,685,779 UART: [state] CFI Enabled
25,850,788 UART: [rt] RT listening for mailbox commands...
25,881,980 UART: [rt]cmd =0x54514754, len=24
25,884,884 >>> mbox cmd response data (8 bytes)
25,885,320 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,915,310 UART: [rt]cmd =0x54514754, len=24
25,917,607 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,383 UART:
192,748 UART: Running Caliptra ROM ...
193,950 UART:
194,105 UART: [state] CFI Enabled
264,483 UART: [state] LifecycleState = Unprovisioned
266,930 UART: [state] DebugLocked = No
268,969 UART: [state] WD Timer not started. Device not locked for debugging
272,806 UART: [kat] SHA2-256
462,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,472 UART: [kat] ++
473,960 UART: [kat] sha1
486,750 UART: [kat] SHA2-256
489,763 UART: [kat] SHA2-384
495,188 UART: [kat] SHA2-512-ACC
497,773 UART: [kat] ECC-384
2,948,311 UART: [kat] HMAC-384Kdf
2,972,976 UART: [kat] LMS
3,504,734 UART: [kat] --
3,509,871 UART: [cold-reset] ++
3,512,514 UART: [fht] FHT @ 0x50003400
3,524,858 UART: [idev] ++
3,525,575 UART: [idev] CDI.KEYID = 6
3,526,608 UART: [idev] SUBJECT.KEYID = 7
3,527,716 UART: [idev] UDS.KEYID = 0
3,528,642 ready_for_fw is high
3,528,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,678 UART: [idev] Erasing UDS.KEYID = 0
6,031,328 UART: [idev] Sha1 KeyId Algorithm
6,052,567 UART: [idev] --
6,056,619 UART: [ldev] ++
6,057,304 UART: [ldev] CDI.KEYID = 6
6,058,189 UART: [ldev] SUBJECT.KEYID = 5
6,059,402 UART: [ldev] AUTHORITY.KEYID = 7
6,060,646 UART: [ldev] FE.KEYID = 1
6,099,834 UART: [ldev] Erasing FE.KEYID = 1
8,611,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,394 UART: [ldev] --
10,415,064 UART: [fwproc] Wait for Commands...
10,418,190 UART: [fwproc] Recv command 0x46574c44
10,420,444 UART: [fwproc] Recv'd Img size: 114360 bytes
13,870,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,028 >>> mbox cmd response: success
14,600,564 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,604,608 UART: [afmc] ++
14,605,363 UART: [afmc] CDI.KEYID = 6
14,606,554 UART: [afmc] SUBJECT.KEYID = 7
14,608,011 UART: [afmc] AUTHORITY.KEYID = 5
17,148,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,229 UART: [afmc] --
18,946,930 UART: [cold-reset] --
18,951,010 UART: [state] Locking Datavault
18,956,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,631 UART: [state] Locking ICCM
18,960,737 UART: [exit] Launching FMC @ 0x40000130
18,969,414 UART:
18,969,655 UART: Running Caliptra FMC ...
18,970,760 UART:
18,970,945 UART: [state] CFI Enabled
19,032,810 UART: [fht] FMC Alias Private Key: 7
20,796,739 UART: [art] Extend RT PCRs Done
20,797,970 UART: [art] Lock RT PCRs Done
20,799,767 UART: [art] Populate DV Done
20,805,391 UART: [fht] FMC Alias Private Key: 7
20,806,938 UART: [art] Derive CDI
20,807,759 UART: [art] Store in in slot 0x4
20,865,701 UART: [art] Derive Key Pair
20,866,737 UART: [art] Store priv key in slot 0x5
23,330,111 UART: [art] Derive Key Pair - Done
23,342,944 UART: [art] Signing Cert with AUTHO
23,344,249 UART: RITY.KEYID = 7
25,055,888 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,385 UART: [art] PUB.X = 9FD162BAE01CA40E9AAC8C61A66D9FADFC3980B1752E83535BE0B84311A234754CB3E939B17B5EDCC0B7D0A339B0106F
25,064,677 UART: [art] PUB.Y = 282E9E0B50930F49D5BE3106DCB13DCD5BC33380B52E59E5E2B2927BA7D38ABA489BF867800EB3205050EE463607E201
25,071,951 UART: [art] SIG.R = 1002E04A066D3FBEB07CD3C09708B37846F5B3A87CA67839752262BF5A267F4C349554E6866DCF6F14C4667920AB8E09
25,079,343 UART: [art] SIG.S = 5E8058517800567D03BC43759F41B9F57E24DA6A97219116BA9D14699C157D7001D1D25E2CB466380500332302905C31
26,058,163 UART: Caliptra RT
26,058,876 UART: [state] CFI Enabled
26,223,972 UART: [rt] RT listening for mailbox commands...
26,254,957 UART: [rt]cmd =0x54514754, len=24
26,257,385 >>> mbox cmd response data (8 bytes)
26,257,912 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,287,502 UART: [rt]cmd =0x54514754, len=24
26,289,944 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,437,986 ready_for_fw is high
3,438,389 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,735,135 >>> mbox cmd response: success
14,735,906 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,027,681 UART:
19,028,072 UART: Running Caliptra FMC ...
19,029,237 UART:
19,029,394 UART: [state] CFI Enabled
19,094,758 UART: [fht] FMC Alias Private Key: 7
20,858,926 UART: [art] Extend RT PCRs Done
20,860,137 UART: [art] Lock RT PCRs Done
20,861,862 UART: [art] Populate DV Done
20,867,428 UART: [fht] FMC Alias Private Key: 7
20,869,020 UART: [art] Derive CDI
20,869,849 UART: [art] Store in in slot 0x4
20,927,192 UART: [art] Derive Key Pair
20,928,187 UART: [art] Store priv key in slot 0x5
23,391,335 UART: [art] Derive Key Pair - Done
23,404,169 UART: [art] Signing Cert with AUTHO
23,405,473 UART: RITY.KEYID = 7
25,117,365 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,866 UART: [art] PUB.X = F7148CD3497253AAD68271E8E29CA9180298FF50FB3447A6ADAB7BB440C091FCC48D794399AF678E6C9482BF267CB1BB
25,126,103 UART: [art] PUB.Y = 07E550FE2232E91E487CD222F6B7E7757AF10C3450743F98E66632AA2DBA5E0B3EA243070C67DDCB194391B8AD1CCF44
25,133,401 UART: [art] SIG.R = 3B51167DCA42CB782DBC8B7A4F8646C12F4B811D30000AB1C92ABB246B0DB942B0F09DE75D4356A3750B4F2A77F7AC1A
25,140,782 UART: [art] SIG.S = 8CBB15885DCC2B58AABEB0D122E0A830A51CC444C3754CDBBB74ECDAECC7508EDD516DAD8B703E655DE79794D60EB64E
26,119,734 UART: Caliptra RT
26,120,446 UART: [state] CFI Enabled
26,285,814 UART: [rt] RT listening for mailbox commands...
26,317,059 UART: [rt]cmd =0x54514754, len=24
26,319,517 >>> mbox cmd response data (8 bytes)
26,320,025 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,349,978 UART: [rt]cmd =0x54514754, len=24
26,352,168 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,337 UART:
192,716 UART: Running Caliptra ROM ...
193,847 UART:
603,653 UART: [state] CFI Enabled
617,598 UART: [state] LifecycleState = Unprovisioned
619,969 UART: [state] DebugLocked = No
621,660 UART: [state] WD Timer not started. Device not locked for debugging
625,336 UART: [kat] SHA2-256
815,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,783 UART: [kat] ++
826,386 UART: [kat] sha1
837,619 UART: [kat] SHA2-256
840,619 UART: [kat] SHA2-384
845,964 UART: [kat] SHA2-512-ACC
848,551 UART: [kat] ECC-384
3,290,486 UART: [kat] HMAC-384Kdf
3,302,507 UART: [kat] LMS
3,834,297 UART: [kat] --
3,840,352 UART: [cold-reset] ++
3,842,490 UART: [fht] FHT @ 0x50003400
3,853,037 UART: [idev] ++
3,853,745 UART: [idev] CDI.KEYID = 6
3,854,794 UART: [idev] SUBJECT.KEYID = 7
3,855,894 UART: [idev] UDS.KEYID = 0
3,856,822 ready_for_fw is high
3,857,032 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,728 UART: [idev] Erasing UDS.KEYID = 0
6,333,292 UART: [idev] Sha1 KeyId Algorithm
6,355,276 UART: [idev] --
6,359,464 UART: [ldev] ++
6,360,165 UART: [ldev] CDI.KEYID = 6
6,361,052 UART: [ldev] SUBJECT.KEYID = 5
6,362,264 UART: [ldev] AUTHORITY.KEYID = 7
6,363,545 UART: [ldev] FE.KEYID = 1
6,374,906 UART: [ldev] Erasing FE.KEYID = 1
8,853,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,640 UART: [ldev] --
10,644,178 UART: [fwproc] Wait for Commands...
10,647,346 UART: [fwproc] Recv command 0x46574c44
10,649,596 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,843,301 >>> mbox cmd response: success
14,843,858 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,847,310 UART: [afmc] ++
14,848,001 UART: [afmc] CDI.KEYID = 6
14,849,249 UART: [afmc] SUBJECT.KEYID = 7
14,850,682 UART: [afmc] AUTHORITY.KEYID = 5
17,356,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,379 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,436 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,653 UART: [afmc] --
19,150,157 UART: [cold-reset] --
19,155,754 UART: [state] Locking Datavault
19,162,406 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,588 UART: [state] Locking ICCM
19,166,359 UART: [exit] Launching FMC @ 0x40000130
19,175,022 UART:
19,175,262 UART: Running Caliptra FMC ...
19,176,361 UART:
19,176,513 UART: [state] CFI Enabled
19,184,285 UART: [fht] FMC Alias Private Key: 7
20,941,480 UART: [art] Extend RT PCRs Done
20,942,699 UART: [art] Lock RT PCRs Done
20,944,179 UART: [art] Populate DV Done
20,949,961 UART: [fht] FMC Alias Private Key: 7
20,951,547 UART: [art] Derive CDI
20,952,290 UART: [art] Store in in slot 0x4
20,995,368 UART: [art] Derive Key Pair
20,996,407 UART: [art] Store priv key in slot 0x5
23,423,279 UART: [art] Derive Key Pair - Done
23,436,121 UART: [art] Signing Cert with AUTHO
23,437,424 UART: RITY.KEYID = 7
25,142,650 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,162 UART: [art] PUB.X = CF94653DF21E99CEE44BCE3D9747071905ADB1113C2BAA3F2B8DA60160F4D0C6C16E2035791079CE4A59B0DEEE7F6F05
25,151,418 UART: [art] PUB.Y = 01A3DABEA991CE4D085A9B258C72E47D8FF523E158E232660A489F3583E4E1E1071E9ADF487EEF6F32F3796111CA8E82
25,158,707 UART: [art] SIG.R = 25951C80F5AD067148271DBD0D3229E0D8ACD603C1866104EB5E7175D40EBF892B746F47D3CF8750FA94613E5D568F72
25,166,046 UART: [art] SIG.S = B7692CB08CD3C25C5A9C7F4596EF422D8004B75D8D0827CDC86D63C901FFE5FE79F87285541CA8C16CF55508518A3F05
26,144,680 UART: Caliptra RT
26,145,371 UART: [state] CFI Enabled
26,262,067 UART: [rt] RT listening for mailbox commands...
26,292,991 UART: [rt]cmd =0x54514754, len=24
26,295,841 >>> mbox cmd response data (8 bytes)
26,296,343 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,326,405 UART: [rt]cmd =0x54514754, len=24
26,328,539 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,761,726 ready_for_fw is high
3,762,157 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,558 >>> mbox cmd response: success
14,951,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,202,091 UART:
19,202,514 UART: Running Caliptra FMC ...
19,203,648 UART:
19,203,805 UART: [state] CFI Enabled
19,211,877 UART: [fht] FMC Alias Private Key: 7
20,968,231 UART: [art] Extend RT PCRs Done
20,969,445 UART: [art] Lock RT PCRs Done
20,971,390 UART: [art] Populate DV Done
20,977,045 UART: [fht] FMC Alias Private Key: 7
20,978,701 UART: [art] Derive CDI
20,979,441 UART: [art] Store in in slot 0x4
21,022,199 UART: [art] Derive Key Pair
21,023,199 UART: [art] Store priv key in slot 0x5
23,450,212 UART: [art] Derive Key Pair - Done
23,463,262 UART: [art] Signing Cert with AUTHO
23,464,566 UART: RITY.KEYID = 7
25,170,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,648 UART: [art] PUB.X = C961D3DFD8E238CB4C469F84722DC83CFECA79DA80DC996F36EF4767C6CD91DA7CDD5BE743A51CEBB477FAF00DFD16DD
25,178,994 UART: [art] PUB.Y = 6AD3065C9D1A7671258CB2C0D0C94CD54C8014DFBA13F195D6D47BD2CFB324AD85043BDA05AFF205346D1434B01B3480
25,186,287 UART: [art] SIG.R = 49F2C75715A41B3732B7BEDF0A8AE83B3FB8AA2BD56F056032687837A914427475D1F94DBB37F6831A67FC7076B01ED8
25,193,624 UART: [art] SIG.S = D3F1E6B408A10D291C46F35269E52FDDAF0097A72DF78AA0586CF25D0B30E11CE0E5BBA90A7F56EA865761AA4E4A1987
26,172,350 UART: Caliptra RT
26,173,061 UART: [state] CFI Enabled
26,289,967 UART: [rt] RT listening for mailbox commands...
26,321,177 UART: [rt]cmd =0x54514754, len=24
26,323,972 >>> mbox cmd response data (8 bytes)
26,324,470 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,354,171 UART: [rt]cmd =0x54514754, len=24
26,356,445 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
86,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,513 UART: [kat] SHA2-256
881,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,559 UART: [kat] ++
885,711 UART: [kat] sha1
889,951 UART: [kat] SHA2-256
891,889 UART: [kat] SHA2-384
894,664 UART: [kat] SHA2-512-ACC
896,565 UART: [kat] ECC-384
902,056 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,971 UART: [cold-reset] ++
1,476,479 UART: [fht] Storing FHT @ 0x50003400
1,479,386 UART: [idev] ++
1,479,554 UART: [idev] CDI.KEYID = 6
1,479,914 UART: [idev] SUBJECT.KEYID = 7
1,480,338 UART: [idev] UDS.KEYID = 0
1,480,683 ready_for_fw is high
1,480,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,152 UART: [idev] Erasing UDS.KEYID = 0
1,504,802 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,206 UART: [idev] --
1,514,261 UART: [ldev] ++
1,514,429 UART: [ldev] CDI.KEYID = 6
1,514,792 UART: [ldev] SUBJECT.KEYID = 5
1,515,218 UART: [ldev] AUTHORITY.KEYID = 7
1,515,681 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,546,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,210 UART: [ldev] --
1,585,655 UART: [fwproc] Waiting for Commands...
1,586,500 UART: [fwproc] Received command 0x46574c44
1,587,291 UART: [fwproc] Received Image of size 114360 bytes
2,886,000 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,606 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,461 >>> mbox cmd response: success
3,079,461 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,543 UART: [afmc] ++
3,080,711 UART: [afmc] CDI.KEYID = 6
3,081,073 UART: [afmc] SUBJECT.KEYID = 7
3,081,498 UART: [afmc] AUTHORITY.KEYID = 5
3,116,143 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,716 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,406 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,095 UART: [afmc] --
3,159,215 UART: [cold-reset] --
3,159,891 UART: [state] Locking Datavault
3,161,078 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,682 UART: [state] Locking ICCM
3,162,346 UART: [exit] Launching FMC @ 0x40000130
3,167,675 UART:
3,167,691 UART: Running Caliptra FMC ...
3,168,099 UART:
3,168,153 UART: [state] CFI Enabled
3,178,794 UART: [fht] FMC Alias Private Key: 7
3,286,673 UART: [art] Extend RT PCRs Done
3,287,101 UART: [art] Lock RT PCRs Done
3,288,603 UART: [art] Populate DV Done
3,296,786 UART: [fht] FMC Alias Private Key: 7
3,297,928 UART: [art] Derive CDI
3,298,208 UART: [art] Store in in slot 0x4
3,383,931 UART: [art] Derive Key Pair
3,384,291 UART: [art] Store priv key in slot 0x5
3,397,817 UART: [art] Derive Key Pair - Done
3,412,406 UART: [art] Signing Cert with AUTHO
3,412,886 UART: RITY.KEYID = 7
3,428,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,975 UART: [art] PUB.X = 47CD441A81E0B5C21D3F41F899AF85729506B85B4D8B75D36D51E38D3871B62630FE4D10203AA84E9CD39AD77836DB42
3,435,744 UART: [art] PUB.Y = 85A8F907E0BF602DA85E6D97ED7B3E5056651D24B9B983596C792A1B875CAF0C266B326A36168D44096F0E874DD03271
3,442,680 UART: [art] SIG.R = 6F98573EE6E7073D989E8998416B38E55104DD3E98FC74E24553FCB5D3618ED273E1C18C91281A4A7C53A7F0C50EA36D
3,449,443 UART: [art] SIG.S = 012FB5D7EDCDEEA4EFD4ED7795186CE360EECF902FBEA4CAB61249AF4E75F4A0090E651B9CE3643CE4BA1B0F6D9B8B0B
3,473,567 UART: Caliptra RT
3,473,821 UART: [state] CFI Enabled
3,582,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,515 UART: [rt]cmd =0x54514754, len=24
3,614,654 >>> mbox cmd response data (8 bytes)
3,614,655 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,124 UART: [rt]cmd =0x54514754, len=24
3,645,825 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,955 ready_for_fw is high
1,361,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,191 >>> mbox cmd response: success
2,925,191 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,986,441 UART:
2,986,457 UART: Running Caliptra FMC ...
2,986,865 UART:
2,986,919 UART: [state] CFI Enabled
2,997,562 UART: [fht] FMC Alias Private Key: 7
3,105,309 UART: [art] Extend RT PCRs Done
3,105,737 UART: [art] Lock RT PCRs Done
3,107,247 UART: [art] Populate DV Done
3,115,542 UART: [fht] FMC Alias Private Key: 7
3,116,534 UART: [art] Derive CDI
3,116,814 UART: [art] Store in in slot 0x4
3,202,521 UART: [art] Derive Key Pair
3,202,881 UART: [art] Store priv key in slot 0x5
3,215,803 UART: [art] Derive Key Pair - Done
3,230,276 UART: [art] Signing Cert with AUTHO
3,230,756 UART: RITY.KEYID = 7
3,246,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,807 UART: [art] PUB.X = 8E31AE2D8F6073BEAD63E4C4CF5A01867440CBA91C7028B0993BAE7B4ED944E9008E5CBB45A34AFD69EBE67B51E6787C
3,253,570 UART: [art] PUB.Y = 7879E9E7B838CF54390B48B503D0AB579A95A070753046F19E46EA98B1F46AE9BACEB7DA37D3177728EDBE7890B2B067
3,260,520 UART: [art] SIG.R = 2C3468F0806B105E91578A706E1791BED8B79B184FF72854342DF69DCBE95145C6BD51579699C27D9BD5FCB9D7321C4D
3,267,292 UART: [art] SIG.S = 4AA188FDA95F22832B6FE54A4B92433199ACE906F127688B839745EBB75A52C28367E7F1879B5FF65B7A2BF0CED28DBA
3,291,200 UART: Caliptra RT
3,291,454 UART: [state] CFI Enabled
3,399,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,566 UART: [rt]cmd =0x54514754, len=24
3,431,717 >>> mbox cmd response data (8 bytes)
3,431,718 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,213 UART: [rt]cmd =0x54514754, len=24
3,463,370 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,380 UART: [kat] SHA2-256
882,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,426 UART: [kat] ++
886,578 UART: [kat] sha1
890,664 UART: [kat] SHA2-256
892,602 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,476,604 UART: [cold-reset] ++
1,477,124 UART: [fht] Storing FHT @ 0x50003400
1,479,907 UART: [idev] ++
1,480,075 UART: [idev] CDI.KEYID = 6
1,480,435 UART: [idev] SUBJECT.KEYID = 7
1,480,859 UART: [idev] UDS.KEYID = 0
1,481,204 ready_for_fw is high
1,481,204 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,899 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,071 UART: [idev] --
1,515,110 UART: [ldev] ++
1,515,278 UART: [ldev] CDI.KEYID = 6
1,515,641 UART: [ldev] SUBJECT.KEYID = 5
1,516,067 UART: [ldev] AUTHORITY.KEYID = 7
1,516,530 UART: [ldev] FE.KEYID = 1
1,521,756 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,501 UART: [ldev] --
1,586,994 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 114360 bytes
2,887,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,793 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,145 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,950 >>> mbox cmd response: success
3,078,950 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,080,046 UART: [afmc] ++
3,080,214 UART: [afmc] CDI.KEYID = 6
3,080,576 UART: [afmc] SUBJECT.KEYID = 7
3,081,001 UART: [afmc] AUTHORITY.KEYID = 5
3,116,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,961 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,651 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,774 UART: [afmc] --
3,159,726 UART: [cold-reset] --
3,160,626 UART: [state] Locking Datavault
3,161,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,381 UART: [state] Locking ICCM
3,162,977 UART: [exit] Launching FMC @ 0x40000130
3,168,306 UART:
3,168,322 UART: Running Caliptra FMC ...
3,168,730 UART:
3,168,873 UART: [state] CFI Enabled
3,179,256 UART: [fht] FMC Alias Private Key: 7
3,287,613 UART: [art] Extend RT PCRs Done
3,288,041 UART: [art] Lock RT PCRs Done
3,289,595 UART: [art] Populate DV Done
3,297,980 UART: [fht] FMC Alias Private Key: 7
3,299,160 UART: [art] Derive CDI
3,299,440 UART: [art] Store in in slot 0x4
3,385,503 UART: [art] Derive Key Pair
3,385,863 UART: [art] Store priv key in slot 0x5
3,399,329 UART: [art] Derive Key Pair - Done
3,414,442 UART: [art] Signing Cert with AUTHO
3,414,922 UART: RITY.KEYID = 7
3,430,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,431,007 UART: [art] PUB.X = 2C8C6FB7FAE900ED7B9013DBCF76261AC14FC9E678706671D88A1AC1B5E2744B98E6D1A7D54C028FF0C98BC705EB124E
3,437,765 UART: [art] PUB.Y = 12E446E61B5C27AD85C503F6621678241605BE95CD97E2623922F43C10AD24F0EABFDBC33609F9AE60BB92816DF4C153
3,444,710 UART: [art] SIG.R = 1BB99565412F8A25D84BC6FDF54F3650DB951FCACA2C68E07C44F3DE899892E57B26A44C9B667CF0F8BE1FB2B53817B8
3,451,494 UART: [art] SIG.S = 3CD34F5F02488B261A248D9F125FAE215E14ED51D10D4E42AAE12BD0B95BE7C175DB95949C5AAF6D446345283208319F
3,475,070 UART: Caliptra RT
3,475,416 UART: [state] CFI Enabled
3,583,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,510 UART: [rt]cmd =0x54514754, len=24
3,615,667 >>> mbox cmd response data (8 bytes)
3,615,668 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,221 UART: [rt]cmd =0x54514754, len=24
3,647,004 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 ready_for_fw is high
1,362,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,622 >>> mbox cmd response: success
2,928,622 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,590 UART:
2,989,606 UART: Running Caliptra FMC ...
2,990,014 UART:
2,990,157 UART: [state] CFI Enabled
3,000,914 UART: [fht] FMC Alias Private Key: 7
3,108,739 UART: [art] Extend RT PCRs Done
3,109,167 UART: [art] Lock RT PCRs Done
3,110,623 UART: [art] Populate DV Done
3,118,706 UART: [fht] FMC Alias Private Key: 7
3,119,780 UART: [art] Derive CDI
3,120,060 UART: [art] Store in in slot 0x4
3,205,519 UART: [art] Derive Key Pair
3,205,879 UART: [art] Store priv key in slot 0x5
3,218,993 UART: [art] Derive Key Pair - Done
3,233,926 UART: [art] Signing Cert with AUTHO
3,234,406 UART: RITY.KEYID = 7
3,250,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,775 UART: [art] PUB.X = 643E71CA396EC8E2F0FAD997976CB3B6F04F2476BED1A2BBB25D0F2A919169A79532102E91663582841EE87EC51E883A
3,257,546 UART: [art] PUB.Y = 43904F9547DC55475AA8CC481DA9AF4E920CCDE50D8D5CA5AAF9422B496FA1B5737D5C07A6DDFB6EC80CAADB9E5BB1F4
3,264,512 UART: [art] SIG.R = EAB7824640368D89E42E680CF73D543005C19841422C386F7451D02E80C8D953C7DCD5C827E6A062AE6C32682E43E265
3,271,270 UART: [art] SIG.S = C2075DA856C866D957310B66104536F0CB45A213D61C8119D58E8C3633AF477EA0BC3F7B35C3A24C1B905CEE61B0E081
3,295,081 UART: Caliptra RT
3,295,427 UART: [state] CFI Enabled
3,403,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,499 UART: [rt]cmd =0x54514754, len=24
3,435,558 >>> mbox cmd response data (8 bytes)
3,435,559 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,874 UART: [rt]cmd =0x54514754, len=24
3,466,821 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,083 UART: [kat] SHA2-256
904,023 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,298 UART: [kat] HMAC-384Kdf
923,064 UART: [kat] LMS
1,171,392 UART: [kat] --
1,172,105 UART: [cold-reset] ++
1,172,435 UART: [fht] FHT @ 0x50003400
1,175,222 UART: [idev] ++
1,175,390 UART: [idev] CDI.KEYID = 6
1,175,750 UART: [idev] SUBJECT.KEYID = 7
1,176,174 UART: [idev] UDS.KEYID = 0
1,176,519 ready_for_fw is high
1,176,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,733 UART: [idev] Sha1 KeyId Algorithm
1,209,305 UART: [idev] --
1,210,473 UART: [ldev] ++
1,210,641 UART: [ldev] CDI.KEYID = 6
1,211,004 UART: [ldev] SUBJECT.KEYID = 5
1,211,430 UART: [ldev] AUTHORITY.KEYID = 7
1,211,893 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,634 UART: [fwproc] Wait for Commands...
1,283,374 UART: [fwproc] Recv command 0x46574c44
1,284,102 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,138 >>> mbox cmd response: success
2,776,138 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,392 UART: [afmc] ++
2,777,560 UART: [afmc] CDI.KEYID = 6
2,777,922 UART: [afmc] SUBJECT.KEYID = 7
2,778,347 UART: [afmc] AUTHORITY.KEYID = 5
2,813,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,833 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,267 UART: [afmc] --
2,857,239 UART: [cold-reset] --
2,858,127 UART: [state] Locking Datavault
2,859,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,782 UART: [state] Locking ICCM
2,860,432 UART: [exit] Launching FMC @ 0x40000130
2,865,761 UART:
2,865,777 UART: Running Caliptra FMC ...
2,866,185 UART:
2,866,239 UART: [state] CFI Enabled
2,877,018 UART: [fht] FMC Alias Private Key: 7
2,985,141 UART: [art] Extend RT PCRs Done
2,985,569 UART: [art] Lock RT PCRs Done
2,987,051 UART: [art] Populate DV Done
2,995,342 UART: [fht] FMC Alias Private Key: 7
2,996,358 UART: [art] Derive CDI
2,996,638 UART: [art] Store in in slot 0x4
3,082,359 UART: [art] Derive Key Pair
3,082,719 UART: [art] Store priv key in slot 0x5
3,095,987 UART: [art] Derive Key Pair - Done
3,110,694 UART: [art] Signing Cert with AUTHO
3,111,174 UART: RITY.KEYID = 7
3,126,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,053 UART: [art] PUB.X = C3ED65CC7063318E461F54D1E264D38C00A7C4137E812E3537096D2C71811E7BC39C45D6F6ACB11C8488343F76BB87E0
3,133,798 UART: [art] PUB.Y = B47E7D19803FE6FB96E2E5DCC5473C5EA78EA0B2D3CB369A8253FCF121F097E6928DB53BF1425879C38283E0E39E8C20
3,140,758 UART: [art] SIG.R = F26F2B427ACA2A69018CA5AA819696430B83B3AE6CFEBB2CC46A2C123CFFC91B34BE8E4B4B098B70FD7290B00E3831E7
3,147,534 UART: [art] SIG.S = 235CABAC5B1A33728F3690A392B282A8C16391001F1CE58DBE1267211EB9BCB6909D26F96ECE22FD08664754914D72EA
3,171,468 UART: Caliptra RT
3,171,722 UART: [state] CFI Enabled
3,278,510 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,803 UART: [rt]cmd =0x54514754, len=24
3,310,674 >>> mbox cmd response data (8 bytes)
3,310,675 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,308 UART: [rt]cmd =0x54514754, len=24
3,342,297 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,745 ready_for_fw is high
1,060,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,719 >>> mbox cmd response: success
2,625,719 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,669 UART:
2,687,685 UART: Running Caliptra FMC ...
2,688,093 UART:
2,688,147 UART: [state] CFI Enabled
2,698,676 UART: [fht] FMC Alias Private Key: 7
2,806,491 UART: [art] Extend RT PCRs Done
2,806,919 UART: [art] Lock RT PCRs Done
2,808,245 UART: [art] Populate DV Done
2,816,646 UART: [fht] FMC Alias Private Key: 7
2,817,774 UART: [art] Derive CDI
2,818,054 UART: [art] Store in in slot 0x4
2,904,055 UART: [art] Derive Key Pair
2,904,415 UART: [art] Store priv key in slot 0x5
2,917,335 UART: [art] Derive Key Pair - Done
2,931,932 UART: [art] Signing Cert with AUTHO
2,932,412 UART: RITY.KEYID = 7
2,947,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,157 UART: [art] PUB.X = 775AA15D0314B53E7AC4201459A729D3DFD41ED9217DC57C8073B11F68DA2BA4B983A2D1704065B2A98CCCFE1E67F0CF
2,954,936 UART: [art] PUB.Y = 91955F4B7466C1BD4287ED6BC0FE520C5DF104E4E083441F9074E5F1003D5FFB4B7368C9DAB422E6198C23BE09DF8D4A
2,961,865 UART: [art] SIG.R = 6C85B64B1465265D0452A8CA6E840C52DCC78B766F8789007FE54D23F9E32EEC08271B361061C889D5A1D52D2A80A6CD
2,968,606 UART: [art] SIG.S = FD5B006FE190B627F7CCB354E77D9FE084A7AD20A2369E894E8BD3DA3D05CDB2AD39AAB03A9160DF597D46D42D09911E
2,992,681 UART: Caliptra RT
2,992,935 UART: [state] CFI Enabled
3,100,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,098 UART: [rt]cmd =0x54514754, len=24
3,133,409 >>> mbox cmd response data (8 bytes)
3,133,410 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,839 UART: [rt]cmd =0x54514754, len=24
3,164,404 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Unprovisioned
86,454 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
893,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,090 UART: [kat] ++
898,242 UART: [kat] sha1
902,594 UART: [kat] SHA2-256
904,534 UART: [kat] SHA2-384
907,327 UART: [kat] SHA2-512-ACC
909,228 UART: [kat] ECC-384
919,095 UART: [kat] HMAC-384Kdf
923,545 UART: [kat] LMS
1,171,873 UART: [kat] --
1,172,928 UART: [cold-reset] ++
1,173,502 UART: [fht] FHT @ 0x50003400
1,176,257 UART: [idev] ++
1,176,425 UART: [idev] CDI.KEYID = 6
1,176,785 UART: [idev] SUBJECT.KEYID = 7
1,177,209 UART: [idev] UDS.KEYID = 0
1,177,554 ready_for_fw is high
1,177,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,419 UART: [idev] Erasing UDS.KEYID = 0
1,202,812 UART: [idev] Sha1 KeyId Algorithm
1,211,238 UART: [idev] --
1,212,114 UART: [ldev] ++
1,212,282 UART: [ldev] CDI.KEYID = 6
1,212,645 UART: [ldev] SUBJECT.KEYID = 5
1,213,071 UART: [ldev] AUTHORITY.KEYID = 7
1,213,534 UART: [ldev] FE.KEYID = 1
1,218,776 UART: [ldev] Erasing FE.KEYID = 1
1,245,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,054 UART: [ldev] --
1,285,505 UART: [fwproc] Wait for Commands...
1,286,159 UART: [fwproc] Recv command 0x46574c44
1,286,887 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,690 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,829 >>> mbox cmd response: success
2,775,829 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,863 UART: [afmc] ++
2,777,031 UART: [afmc] CDI.KEYID = 6
2,777,393 UART: [afmc] SUBJECT.KEYID = 7
2,777,818 UART: [afmc] AUTHORITY.KEYID = 5
2,813,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,460 UART: [afmc] --
2,856,444 UART: [cold-reset] --
2,857,420 UART: [state] Locking Datavault
2,858,525 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,129 UART: [state] Locking ICCM
2,859,679 UART: [exit] Launching FMC @ 0x40000130
2,865,008 UART:
2,865,024 UART: Running Caliptra FMC ...
2,865,432 UART:
2,865,575 UART: [state] CFI Enabled
2,876,278 UART: [fht] FMC Alias Private Key: 7
2,984,453 UART: [art] Extend RT PCRs Done
2,984,881 UART: [art] Lock RT PCRs Done
2,986,665 UART: [art] Populate DV Done
2,995,062 UART: [fht] FMC Alias Private Key: 7
2,996,084 UART: [art] Derive CDI
2,996,364 UART: [art] Store in in slot 0x4
3,081,939 UART: [art] Derive Key Pair
3,082,299 UART: [art] Store priv key in slot 0x5
3,095,133 UART: [art] Derive Key Pair - Done
3,109,803 UART: [art] Signing Cert with AUTHO
3,110,283 UART: RITY.KEYID = 7
3,125,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,000 UART: [art] PUB.X = ACD27B4C73DCE1FC82AFB8EE7187DD94828010FB6D22DC437637081DE9DAFEACC457D5805FDB42E780A256CCCFEB9935
3,132,791 UART: [art] PUB.Y = 7340788E4195A925206238F7B171CA2BD2F3E7CB74970D49DA3387C972469A697AF5C85BD1EAFE770A164FB51B712F25
3,139,735 UART: [art] SIG.R = 8C88814DAB7578FF12FB212B612D7FEC5D27E357E7F713B17442203415883EF7D893F52538E5629062621E0B5B27E62F
3,146,496 UART: [art] SIG.S = C6652E7201AC073A014A98654FC7BF8413DD1D5F76B494BF9B2C3C773AD1BF6B17369451AFF630AD9560D502E4F638CC
3,170,299 UART: Caliptra RT
3,170,645 UART: [state] CFI Enabled
3,277,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,169 UART: [rt]cmd =0x54514754, len=24
3,310,394 >>> mbox cmd response data (8 bytes)
3,310,395 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,812 UART: [rt]cmd =0x54514754, len=24
3,341,931 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,588 ready_for_fw is high
1,060,588 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,784 >>> mbox cmd response: success
2,626,784 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,450 UART:
2,688,466 UART: Running Caliptra FMC ...
2,688,874 UART:
2,689,017 UART: [state] CFI Enabled
2,699,688 UART: [fht] FMC Alias Private Key: 7
2,807,761 UART: [art] Extend RT PCRs Done
2,808,189 UART: [art] Lock RT PCRs Done
2,809,827 UART: [art] Populate DV Done
2,817,840 UART: [fht] FMC Alias Private Key: 7
2,818,842 UART: [art] Derive CDI
2,819,122 UART: [art] Store in in slot 0x4
2,904,821 UART: [art] Derive Key Pair
2,905,181 UART: [art] Store priv key in slot 0x5
2,918,559 UART: [art] Derive Key Pair - Done
2,933,074 UART: [art] Signing Cert with AUTHO
2,933,554 UART: RITY.KEYID = 7
2,949,062 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,827 UART: [art] PUB.X = BC1525276E2BE8D36915E58BBB7694D36EFA48062039EF903EBF71FBE8CFE7EFE78CE0311A4E79E82F7A19DA5DF61C53
2,956,612 UART: [art] PUB.Y = 2422B5C2F4D797EDBB6C958453D1669447FA54499658964CA574DBBD539F9C0F0CB0A5503F8585AB7370591BF7FEA758
2,963,558 UART: [art] SIG.R = 14B0A20448B0F75DBCC303B9F24BF06D063723E8C54735527F97F8BE091C5942402D6A047A733B0DE8B182A969A900D1
2,970,286 UART: [art] SIG.S = 5BB568E493FE3AE74FF77FAD98BD9A70443D379F34171AE2AAC368883A59CE423734943CD450C2A016CAD66F417551E2
2,994,627 UART: Caliptra RT
2,994,973 UART: [state] CFI Enabled
3,101,959 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,148 UART: [rt]cmd =0x54514754, len=24
3,134,469 >>> mbox cmd response data (8 bytes)
3,134,470 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,221 UART: [rt]cmd =0x54514754, len=24
3,165,886 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: [kat] ++
895,099 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,094 UART: [kat] LMS
1,168,406 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,661 UART: [fht] FHT @ 0x50003400
1,172,237 UART: [idev] ++
1,172,405 UART: [idev] CDI.KEYID = 6
1,172,766 UART: [idev] SUBJECT.KEYID = 7
1,173,191 UART: [idev] UDS.KEYID = 0
1,173,537 ready_for_fw is high
1,173,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,823 UART: [idev] Erasing UDS.KEYID = 0
1,197,553 UART: [idev] Sha1 KeyId Algorithm
1,206,495 UART: [idev] --
1,207,470 UART: [ldev] ++
1,207,638 UART: [ldev] CDI.KEYID = 6
1,208,002 UART: [ldev] SUBJECT.KEYID = 5
1,208,429 UART: [ldev] AUTHORITY.KEYID = 7
1,208,892 UART: [ldev] FE.KEYID = 1
1,214,494 UART: [ldev] Erasing FE.KEYID = 1
1,240,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,954 UART: [ldev] --
1,279,314 UART: [fwproc] Wait for Commands...
1,279,913 UART: [fwproc] Recv command 0x46574c44
1,280,646 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,642 >>> mbox cmd response: success
2,770,642 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,679 UART: [afmc] ++
2,771,847 UART: [afmc] CDI.KEYID = 6
2,772,210 UART: [afmc] SUBJECT.KEYID = 7
2,772,636 UART: [afmc] AUTHORITY.KEYID = 5
2,808,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,062 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,746 UART: [afmc] --
2,851,814 UART: [cold-reset] --
2,852,442 UART: [state] Locking Datavault
2,853,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,309 UART: [state] Locking ICCM
2,854,967 UART: [exit] Launching FMC @ 0x40000130
2,860,296 UART:
2,860,312 UART: Running Caliptra FMC ...
2,860,720 UART:
2,860,774 UART: [state] CFI Enabled
2,871,299 UART: [fht] FMC Alias Private Key: 7
2,979,370 UART: [art] Extend RT PCRs Done
2,979,798 UART: [art] Lock RT PCRs Done
2,981,338 UART: [art] Populate DV Done
2,989,717 UART: [fht] FMC Alias Private Key: 7
2,990,721 UART: [art] Derive CDI
2,991,001 UART: [art] Store in in slot 0x4
3,076,738 UART: [art] Derive Key Pair
3,077,098 UART: [art] Store priv key in slot 0x5
3,089,970 UART: [art] Derive Key Pair - Done
3,105,168 UART: [art] Signing Cert with AUTHO
3,105,648 UART: RITY.KEYID = 7
3,120,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,123 UART: [art] PUB.X = EBBDC076BF59F386499F59142A0AF3D775E25CAD0A2C4B6D30E0A9E0C7F6C6A851977DDFA9D12AFDB1E564E40F821A43
3,127,904 UART: [art] PUB.Y = 50FE42AE4C3C1B86EDB29C195ACA1E6F7D936C5CFA3EF1DEF41A5C6806DBCA16B40A427620D507E8A2627B22FD16D50E
3,134,864 UART: [art] SIG.R = 7F02CB5A1A645A14396D626C78D750E87D4838580BE07675D8C0D14B2946DC770BD65D53E2FCF3D68E386A0CB043E8FC
3,141,628 UART: [art] SIG.S = BBAF360D324AA8ACAFC49C1AD6859AF90830975FCA2D2A00C5404B66A24263DF7F34E2C77ED199AFBC7466B79E65C041
3,165,287 UART: Caliptra RT
3,165,541 UART: [state] CFI Enabled
3,273,769 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,286 UART: [rt]cmd =0x54514754, len=24
3,306,575 >>> mbox cmd response data (8 bytes)
3,306,576 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,957 UART: [rt]cmd =0x54514754, len=24
3,337,830 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,178 ready_for_fw is high
1,056,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,442 >>> mbox cmd response: success
2,623,442 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,322 UART:
2,685,338 UART: Running Caliptra FMC ...
2,685,746 UART:
2,685,800 UART: [state] CFI Enabled
2,696,385 UART: [fht] FMC Alias Private Key: 7
2,804,912 UART: [art] Extend RT PCRs Done
2,805,340 UART: [art] Lock RT PCRs Done
2,807,080 UART: [art] Populate DV Done
2,815,447 UART: [fht] FMC Alias Private Key: 7
2,816,491 UART: [art] Derive CDI
2,816,771 UART: [art] Store in in slot 0x4
2,902,612 UART: [art] Derive Key Pair
2,902,972 UART: [art] Store priv key in slot 0x5
2,916,366 UART: [art] Derive Key Pair - Done
2,931,099 UART: [art] Signing Cert with AUTHO
2,931,579 UART: RITY.KEYID = 7
2,946,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,034 UART: [art] PUB.X = 9CF98B9DED33AE504EF5C17150B6DDB1415536653AC72B3C5BF751C0891FCF801FFA9CF0648A2501FB66A23BD51DE76C
2,953,817 UART: [art] PUB.Y = 6BEA1571F1E709BE49F60520ACFAA58F447C4B30B7E11975EAD80A6FBFC36C19D97656A73BE7FA9F5A8DB703FC0BA10D
2,960,771 UART: [art] SIG.R = 67FFA8129B20AD00DB406E73237671EBA4CEC0B30AF9F9FA5A7D6A73468A3102C79BE50B2138751D18FBAA9125B9250E
2,967,517 UART: [art] SIG.S = B831D76C446942775DA5C5BAD065A014A6FEC7592A9A9DDBB852F4D6EE0FA55A6A638F932C643E841D3EDF15F3EC7807
2,991,264 UART: Caliptra RT
2,991,518 UART: [state] CFI Enabled
3,100,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,431 UART: [rt]cmd =0x54514754, len=24
3,132,698 >>> mbox cmd response data (8 bytes)
3,132,699 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,284 UART: [rt]cmd =0x54514754, len=24
3,164,059 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
905,031 UART: [kat] SHA2-512-ACC
906,932 UART: [kat] ECC-384
917,021 UART: [kat] HMAC-384Kdf
921,651 UART: [kat] LMS
1,169,963 UART: [kat] --
1,170,684 UART: [cold-reset] ++
1,171,162 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,016 UART: [idev] Erasing UDS.KEYID = 0
1,200,442 UART: [idev] Sha1 KeyId Algorithm
1,209,300 UART: [idev] --
1,210,265 UART: [ldev] ++
1,210,433 UART: [ldev] CDI.KEYID = 6
1,210,797 UART: [ldev] SUBJECT.KEYID = 5
1,211,224 UART: [ldev] AUTHORITY.KEYID = 7
1,211,687 UART: [ldev] FE.KEYID = 1
1,217,033 UART: [ldev] Erasing FE.KEYID = 1
1,243,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,683 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,767 >>> mbox cmd response: success
2,773,767 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,920 UART: [afmc] ++
2,775,088 UART: [afmc] CDI.KEYID = 6
2,775,451 UART: [afmc] SUBJECT.KEYID = 7
2,775,877 UART: [afmc] AUTHORITY.KEYID = 5
2,811,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,962 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,299 UART: [afmc] --
2,854,187 UART: [cold-reset] --
2,854,927 UART: [state] Locking Datavault
2,856,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,752 UART: [state] Locking ICCM
2,857,424 UART: [exit] Launching FMC @ 0x40000130
2,862,753 UART:
2,862,769 UART: Running Caliptra FMC ...
2,863,177 UART:
2,863,320 UART: [state] CFI Enabled
2,873,931 UART: [fht] FMC Alias Private Key: 7
2,982,568 UART: [art] Extend RT PCRs Done
2,982,996 UART: [art] Lock RT PCRs Done
2,984,394 UART: [art] Populate DV Done
2,992,587 UART: [fht] FMC Alias Private Key: 7
2,993,743 UART: [art] Derive CDI
2,994,023 UART: [art] Store in in slot 0x4
3,079,880 UART: [art] Derive Key Pair
3,080,240 UART: [art] Store priv key in slot 0x5
3,093,482 UART: [art] Derive Key Pair - Done
3,108,453 UART: [art] Signing Cert with AUTHO
3,108,933 UART: RITY.KEYID = 7
3,124,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,032 UART: [art] PUB.X = 86E3E1B776C564E2C565021AEEE1F2020D62BC658D8123788FF863965FC0C7E13E0557B13798E02A73F37861FF56BE4D
3,131,790 UART: [art] PUB.Y = 801DD8EC728752A7AC7DE810D3B57CAB72F2B9524D81C39DF2B7FF33F9F828736BD068E6E10320C763D1340D9B47D7EC
3,138,744 UART: [art] SIG.R = 38D552DAB2B751A48FA1668C6AC6BE8F569BEF2EB960DD140F5E4F8AD66A02AEF76D095F9A892F0C92A315CED86F007B
3,145,500 UART: [art] SIG.S = 6AFD77E329F6E395F2429887026C490A3B03B2644DD82983D142DD47CD4EF597CE73C05B5402164879FA56A39B46FD76
3,169,325 UART: Caliptra RT
3,169,671 UART: [state] CFI Enabled
3,278,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,550 UART: [rt]cmd =0x54514754, len=24
3,310,779 >>> mbox cmd response data (8 bytes)
3,310,780 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,321 UART: [rt]cmd =0x54514754, len=24
3,342,132 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,223 ready_for_fw is high
1,056,223 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,521 >>> mbox cmd response: success
2,622,521 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,267 UART:
2,684,283 UART: Running Caliptra FMC ...
2,684,691 UART:
2,684,834 UART: [state] CFI Enabled
2,695,021 UART: [fht] FMC Alias Private Key: 7
2,803,252 UART: [art] Extend RT PCRs Done
2,803,680 UART: [art] Lock RT PCRs Done
2,805,066 UART: [art] Populate DV Done
2,813,153 UART: [fht] FMC Alias Private Key: 7
2,814,227 UART: [art] Derive CDI
2,814,507 UART: [art] Store in in slot 0x4
2,900,266 UART: [art] Derive Key Pair
2,900,626 UART: [art] Store priv key in slot 0x5
2,913,578 UART: [art] Derive Key Pair - Done
2,928,328 UART: [art] Signing Cert with AUTHO
2,928,808 UART: RITY.KEYID = 7
2,943,842 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,607 UART: [art] PUB.X = 6AD34A268DA8C38BB2EAC21775E7AC6D5D3EE7AB8C85E8E24A7F4B51496DB2203BD318EFBD8554F78249D102BDA05608
2,951,387 UART: [art] PUB.Y = 2A33F5ACE4E2730EF88385130958140195746B1DF5B50D7779CD0158BA754D45F3FBD2AEDB113C527C0C35814F4BCA4A
2,958,325 UART: [art] SIG.R = 19820D2113EC05115512F4B84F2D501025CD111B416DCA2EB5BE793982D5372CACD3C1F2826051B442827555E4895CFC
2,965,085 UART: [art] SIG.S = 2AF9F68550B49681E13074C50E923CB16F60E1ABD66AA6843DE13023BDAE732A4C98F65C2942A3E45D41F80582575B2E
2,988,574 UART: Caliptra RT
2,988,920 UART: [state] CFI Enabled
3,098,180 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,477 UART: [rt]cmd =0x54514754, len=24
3,130,426 >>> mbox cmd response data (8 bytes)
3,130,427 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,002 UART: [rt]cmd =0x54514754, len=24
3,162,161 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,462 UART:
192,819 UART: Running Caliptra ROM ...
193,997 UART:
194,142 UART: [state] CFI Enabled
262,241 UART: [state] LifecycleState = Unprovisioned
264,230 UART: [state] DebugLocked = No
266,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,817 UART: [kat] SHA2-256
441,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,035 UART: [kat] ++
452,589 UART: [kat] sha1
463,038 UART: [kat] SHA2-256
465,752 UART: [kat] SHA2-384
473,048 UART: [kat] SHA2-512-ACC
475,456 UART: [kat] ECC-384
2,768,188 UART: [kat] HMAC-384Kdf
2,799,114 UART: [kat] LMS
3,989,385 UART: [kat] --
3,993,840 UART: [cold-reset] ++
3,995,727 UART: [fht] Storing FHT @ 0x50003400
4,007,775 UART: [idev] ++
4,008,338 UART: [idev] CDI.KEYID = 6
4,009,367 UART: [idev] SUBJECT.KEYID = 7
4,010,535 UART: [idev] UDS.KEYID = 0
4,011,507 ready_for_fw is high
4,011,693 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,107 UART: [idev] Erasing UDS.KEYID = 0
7,347,583 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,238 UART: [idev] --
7,371,458 UART: [ldev] ++
7,372,087 UART: [ldev] CDI.KEYID = 6
7,372,995 UART: [ldev] SUBJECT.KEYID = 5
7,374,200 UART: [ldev] AUTHORITY.KEYID = 7
7,375,478 UART: [ldev] FE.KEYID = 1
7,421,974 UART: [ldev] Erasing FE.KEYID = 1
10,754,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,925 UART: [ldev] --
13,117,283 UART: [fwproc] Waiting for Commands...
13,120,156 UART: [fwproc] Received command 0x46574c44
13,122,333 UART: [fwproc] Received Image of size 114036 bytes
17,168,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,695 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,963 >>> mbox cmd response: success
17,631,547 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,635,061 UART: [afmc] ++
17,635,644 UART: [afmc] CDI.KEYID = 6
17,636,666 UART: [afmc] SUBJECT.KEYID = 7
17,637,828 UART: [afmc] AUTHORITY.KEYID = 5
21,007,742 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,970 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,282 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,639 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,512 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,957 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,861 UART: [afmc] --
23,378,283 UART: [cold-reset] --
23,382,027 UART: [state] Locking Datavault
23,386,460 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,213 UART: [state] Locking ICCM
23,390,412 UART: [exit] Launching FMC @ 0x40000130
23,398,800 UART:
23,399,030 UART: Running Caliptra FMC ...
23,400,124 UART:
23,400,279 UART: [state] CFI Enabled
23,465,680 UART: [fht] FMC Alias Private Key: 7
25,803,686 UART: [art] Extend RT PCRs Done
25,804,903 UART: [art] Lock RT PCRs Done
25,806,496 UART: [art] Populate DV Done
25,812,006 UART: [fht] FMC Alias Private Key: 7
25,813,674 UART: [art] Derive CDI
25,814,490 UART: [art] Store in in slot 0x4
25,873,829 UART: [art] Derive Key Pair
25,874,869 UART: [art] Store priv key in slot 0x5
29,167,988 UART: [art] Derive Key Pair - Done
29,181,265 UART: [art] Signing Cert with AUTHO
29,182,565 UART: RITY.KEYID = 7
31,470,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,736 UART: [art] PUB.X = FCCE0326F694CABF3AE5FDDB736F333EB945CFD690AA9755DB6652BA6D511EA5C03D355ED81A59BEF4FD1C30CEEBF847
31,479,040 UART: [art] PUB.Y = 47F53A8131D8E0BC07756312462D8D03550AB2A63F96352B1C3FA4424C6EB4FB989B1E107F5F91A17C6AE7A303D96736
31,486,271 UART: [art] SIG.R = 7B2B01BB894A9C5D991CD0E7BCB09D5CB80B11C5DBBA4FA32CE73101044DE31274D8B05A115CD9954AD0F97F862B833A
31,493,647 UART: [art] SIG.S = 77A4CB7E6CDF3186C916AF225C527016B28D67EF0EAFE3FCCBACB0584EA6F3B6E10F1250D15BE84C88BDDDF8E6158A41
32,798,826 UART: Caliptra RT
32,799,533 UART: [state] CFI Enabled
32,960,149 UART: [rt] RT listening for mailbox commands...
32,991,345 UART: [rt]cmd =0x54514754, len=24
32,993,729 >>> mbox cmd response data (8 bytes)
32,994,244 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,023,964 UART: [rt]cmd =0x47544744, len=8
33,027,105 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,805,987 ready_for_fw is high
3,806,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,872,731 >>> mbox cmd response: success
17,873,603 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,568,473 UART:
23,568,859 UART: Running Caliptra FMC ...
23,569,982 UART:
23,570,153 UART: [state] CFI Enabled
23,636,656 UART: [fht] FMC Alias Private Key: 7
25,975,074 UART: [art] Extend RT PCRs Done
25,976,343 UART: [art] Lock RT PCRs Done
25,977,883 UART: [art] Populate DV Done
25,983,246 UART: [fht] FMC Alias Private Key: 7
25,984,786 UART: [art] Derive CDI
25,985,536 UART: [art] Store in in slot 0x4
26,045,581 UART: [art] Derive Key Pair
26,046,615 UART: [art] Store priv key in slot 0x5
29,339,487 UART: [art] Derive Key Pair - Done
29,352,857 UART: [art] Signing Cert with AUTHO
29,354,155 UART: RITY.KEYID = 7
31,642,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,880 UART: [art] PUB.X = E3659B5F96BD1ED602575E452218CA757E52BE6B491CC30A87004D90B403B6C51DCEDB0BF1411D388EF15DF5E8A8C22F
31,651,111 UART: [art] PUB.Y = AC6AB4ACB31DD56191EBB65495BD065464FAB2E682F3B77CA97CB6CE1CF95113D1C2F4C94931C2AF7C83D7EA62AAFF81
31,658,400 UART: [art] SIG.R = 1D4FCE2947B73BAE72EBCE0F66B27B6F7E6C5E5B7E3194158A6E72A841BE68D9DB7AED0DB9D0DAA1AC17C91E7DE48C95
31,665,824 UART: [art] SIG.S = D0DDD3725DF99699C1BE9841F85176C56C8D7A78274A2BDA0F5CA2DACCCA6DB28B557808981593E9384F77064FFE7A12
32,971,064 UART: Caliptra RT
32,971,770 UART: [state] CFI Enabled
33,131,256 UART: [rt] RT listening for mailbox commands...
33,162,554 UART: [rt]cmd =0x54514754, len=24
33,165,060 >>> mbox cmd response data (8 bytes)
33,165,542 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,195,218 UART: [rt]cmd =0x47544744, len=8
33,198,469 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,532 UART:
192,888 UART: Running Caliptra ROM ...
194,086 UART:
603,716 UART: [state] CFI Enabled
619,511 UART: [state] LifecycleState = Unprovisioned
621,454 UART: [state] DebugLocked = No
623,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,115 UART: [kat] SHA2-256
796,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,412 UART: [kat] ++
807,859 UART: [kat] sha1
818,942 UART: [kat] SHA2-256
821,587 UART: [kat] SHA2-384
828,281 UART: [kat] SHA2-512-ACC
830,657 UART: [kat] ECC-384
3,112,923 UART: [kat] HMAC-384Kdf
3,125,520 UART: [kat] LMS
4,315,629 UART: [kat] --
4,320,136 UART: [cold-reset] ++
4,321,640 UART: [fht] Storing FHT @ 0x50003400
4,334,180 UART: [idev] ++
4,334,753 UART: [idev] CDI.KEYID = 6
4,335,736 UART: [idev] SUBJECT.KEYID = 7
4,336,978 UART: [idev] UDS.KEYID = 0
4,338,056 ready_for_fw is high
4,338,303 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,545 UART: [idev] Erasing UDS.KEYID = 0
7,623,166 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,324 UART: [idev] --
7,648,259 UART: [ldev] ++
7,648,826 UART: [ldev] CDI.KEYID = 6
7,649,762 UART: [ldev] SUBJECT.KEYID = 5
7,651,019 UART: [ldev] AUTHORITY.KEYID = 7
7,652,176 UART: [ldev] FE.KEYID = 1
7,665,572 UART: [ldev] Erasing FE.KEYID = 1
10,957,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,366 UART: [ldev] --
13,318,492 UART: [fwproc] Waiting for Commands...
13,321,229 UART: [fwproc] Received command 0x46574c44
13,323,460 UART: [fwproc] Received Image of size 114036 bytes
17,381,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,838,470 >>> mbox cmd response: success
17,839,043 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,842,498 UART: [afmc] ++
17,843,138 UART: [afmc] CDI.KEYID = 6
17,844,021 UART: [afmc] SUBJECT.KEYID = 7
17,845,290 UART: [afmc] AUTHORITY.KEYID = 5
21,160,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,897 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,157 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,388 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,828 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,118 UART: [afmc] --
23,527,619 UART: [cold-reset] --
23,532,291 UART: [state] Locking Datavault
23,537,482 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,232 UART: [state] Locking ICCM
23,540,838 UART: [exit] Launching FMC @ 0x40000130
23,549,186 UART:
23,549,423 UART: Running Caliptra FMC ...
23,550,525 UART:
23,550,684 UART: [state] CFI Enabled
23,558,625 UART: [fht] FMC Alias Private Key: 7
25,890,320 UART: [art] Extend RT PCRs Done
25,891,539 UART: [art] Lock RT PCRs Done
25,893,172 UART: [art] Populate DV Done
25,898,548 UART: [fht] FMC Alias Private Key: 7
25,900,194 UART: [art] Derive CDI
25,901,007 UART: [art] Store in in slot 0x4
25,943,607 UART: [art] Derive Key Pair
25,944,649 UART: [art] Store priv key in slot 0x5
29,186,795 UART: [art] Derive Key Pair - Done
29,199,396 UART: [art] Signing Cert with AUTHO
29,200,726 UART: RITY.KEYID = 7
31,479,986 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,485 UART: [art] PUB.X = 1D10F7986493EE8F1912C13650BBAEB3C703A2F6938359B2286492823C635B687621FCB7EA102558C710B0EDAD60FCED
31,488,735 UART: [art] PUB.Y = 31E71BDF390CE9A945906F57F97AC1B7BFDFF279ADAAA81A792B1C7BAACAFDBDE212B5265A2ACD51004104EDBAD52DF2
31,496,020 UART: [art] SIG.R = 8926F6A85A6E068BB35747BE9B18A7467C3B121D3580B98C072ABB8D66C33A174607ABDC66D5D04B637857C15D1C0719
31,503,408 UART: [art] SIG.S = 8946311CFC9C3D97AF4D67F7758A510C2F0B5AE45B88FA2FE9458F08A41AD66C66C6CE251D1E851D967241A24561AA65
32,808,349 UART: Caliptra RT
32,809,065 UART: [state] CFI Enabled
32,928,038 UART: [rt] RT listening for mailbox commands...
32,959,091 UART: [rt]cmd =0x54514754, len=24
32,961,760 >>> mbox cmd response data (8 bytes)
32,962,312 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
32,992,147 UART: [rt]cmd =0x47544744, len=8
32,995,127 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,125,830 ready_for_fw is high
4,126,327 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,614 >>> mbox cmd response: success
18,078,284 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,722,995 UART:
23,723,365 UART: Running Caliptra FMC ...
23,724,496 UART:
23,724,656 UART: [state] CFI Enabled
23,732,494 UART: [fht] FMC Alias Private Key: 7
26,063,421 UART: [art] Extend RT PCRs Done
26,064,651 UART: [art] Lock RT PCRs Done
26,066,172 UART: [art] Populate DV Done
26,071,572 UART: [fht] FMC Alias Private Key: 7
26,073,136 UART: [art] Derive CDI
26,073,876 UART: [art] Store in in slot 0x4
26,116,958 UART: [art] Derive Key Pair
26,117,958 UART: [art] Store priv key in slot 0x5
29,360,002 UART: [art] Derive Key Pair - Done
29,373,061 UART: [art] Signing Cert with AUTHO
29,374,376 UART: RITY.KEYID = 7
31,653,849 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,351 UART: [art] PUB.X = FDF2D77B8E9570AFF9F9402C6B0D72C350056E159CE25A508546877EC5F08450698E6EA1975265C0AA19E2426EA716C8
31,662,586 UART: [art] PUB.Y = 76EB580DF6FF1B1BDB3B2BAAB5293087D193C6A2D20B6F55824772B8DD94912A540CC2CA3219AA365944B117E91323B2
31,669,820 UART: [art] SIG.R = E4495319B7A30DC4FAFBB3B9AD926330C12D36A0FA16E283A3923F58106A88E52B3D86B563B950DD6B8CC6F6D5E9B869
31,677,198 UART: [art] SIG.S = 29FA35CBFD2B09030F54E92BE130EB19FBBB2171575B101FE8ACD50378BC3CBC24B7CFD596003912270F026778A5A041
32,982,242 UART: Caliptra RT
32,982,956 UART: [state] CFI Enabled
33,101,589 UART: [rt] RT listening for mailbox commands...
33,132,832 UART: [rt]cmd =0x54514754, len=24
33,135,395 >>> mbox cmd response data (8 bytes)
33,135,821 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,165,587 UART: [rt]cmd =0x47544744, len=8
33,168,625 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,646 writing to cptra_bootfsm_go
192,749 UART:
193,104 UART: Running Caliptra ROM ...
194,289 UART:
194,442 UART: [state] CFI Enabled
261,904 UART: [state] LifecycleState = Unprovisioned
263,826 UART: [state] DebugLocked = No
265,364 UART: [state] WD Timer not started. Device not locked for debugging
268,905 UART: [kat] SHA2-256
448,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,559 UART: [kat] ++
460,092 UART: [kat] sha1
471,117 UART: [kat] SHA2-256
474,121 UART: [kat] SHA2-384
479,441 UART: [kat] SHA2-512-ACC
482,425 UART: [kat] ECC-384
2,939,205 UART: [kat] HMAC-384Kdf
2,962,491 UART: [kat] LMS
3,491,935 UART: [kat] --
3,495,073 UART: [cold-reset] ++
3,496,150 UART: [fht] FHT @ 0x50003400
3,507,757 UART: [idev] ++
3,508,312 UART: [idev] CDI.KEYID = 6
3,509,272 UART: [idev] SUBJECT.KEYID = 7
3,510,441 UART: [idev] UDS.KEYID = 0
3,511,400 ready_for_fw is high
3,511,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,655,451 UART: [idev] Erasing UDS.KEYID = 0
6,014,640 UART: [idev] Sha1 KeyId Algorithm
6,038,628 UART: [idev] --
6,042,141 UART: [ldev] ++
6,042,713 UART: [ldev] CDI.KEYID = 6
6,043,631 UART: [ldev] SUBJECT.KEYID = 5
6,044,790 UART: [ldev] AUTHORITY.KEYID = 7
6,046,080 UART: [ldev] FE.KEYID = 1
6,091,655 UART: [ldev] Erasing FE.KEYID = 1
8,592,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,308,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,324,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,339,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,355,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,376,000 UART: [ldev] --
10,381,441 UART: [fwproc] Wait for Commands...
10,383,587 UART: [fwproc] Recv command 0x46574c44
10,385,624 UART: [fwproc] Recv'd Img size: 114360 bytes
13,786,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,927,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,245,427 >>> mbox cmd response: success
14,245,985 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,249,494 UART: [afmc] ++
14,250,082 UART: [afmc] CDI.KEYID = 6
14,250,972 UART: [afmc] SUBJECT.KEYID = 7
14,252,186 UART: [afmc] AUTHORITY.KEYID = 5
16,778,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,501,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,503,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,519,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,535,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,551,225 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,574,710 UART: [afmc] --
18,577,936 UART: [cold-reset] --
18,583,362 UART: [state] Locking Datavault
18,587,257 UART: [state] Locking PCR0, PCR1 and PCR31
18,588,899 UART: [state] Locking ICCM
18,591,533 UART: [exit] Launching FMC @ 0x40000130
18,599,932 UART:
18,600,170 UART: Running Caliptra FMC ...
18,601,274 UART:
18,601,449 UART: [state] CFI Enabled
18,659,459 UART: [fht] FMC Alias Private Key: 7
20,423,236 UART: [art] Extend RT PCRs Done
20,424,458 UART: [art] Lock RT PCRs Done
20,426,049 UART: [art] Populate DV Done
20,431,408 UART: [fht] FMC Alias Private Key: 7
20,432,998 UART: [art] Derive CDI
20,433,815 UART: [art] Store in in slot 0x4
20,491,804 UART: [art] Derive Key Pair
20,492,845 UART: [art] Store priv key in slot 0x5
22,955,811 UART: [art] Derive Key Pair - Done
22,968,761 UART: [art] Signing Cert with AUTHO
22,970,088 UART: RITY.KEYID = 7
24,682,310 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,810 UART: [art] PUB.X = 797CABFA402B38D04761ADF22C119E9E48A2984950E4C35CDB332C01AC35DACD7F91B86F8F1AC2C2CBF2B8E7AAC9977C
24,691,103 UART: [art] PUB.Y = 7C98372B44CD1959C190D26A602C7D3B8D31064CC650E3A87FBA52CA281B7C719104D2107DD718778C0812AD20FBE060
24,698,383 UART: [art] SIG.R = 7FA6C246C08DFE91A0DE869F370647C58773E3B0C1FF54BEA8FC508F92837F7B0D935AC78CF270DD89C7ED596E7FB4A9
24,705,762 UART: [art] SIG.S = CFC9B6C10AC0680AD959E08A2079A2FD580B12A9D40D7357A689BFEE8ED555F8D715437691276EE6D4A7481B85779EA6
25,684,973 UART: Caliptra RT
25,685,670 UART: [state] CFI Enabled
25,850,143 UART: [rt] RT listening for mailbox commands...
25,881,475 UART: [rt]cmd =0x54514754, len=24
25,884,224 >>> mbox cmd response data (8 bytes)
25,884,751 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,914,746 UART: [rt]cmd =0x47544744, len=8
25,917,673 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,651 UART:
193,016 UART: Running Caliptra ROM ...
194,225 UART:
194,384 UART: [state] CFI Enabled
262,073 UART: [state] LifecycleState = Unprovisioned
264,411 UART: [state] DebugLocked = No
266,658 UART: [state] WD Timer not started. Device not locked for debugging
271,049 UART: [kat] SHA2-256
460,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,716 UART: [kat] ++
472,207 UART: [kat] sha1
483,181 UART: [kat] SHA2-256
486,243 UART: [kat] SHA2-384
491,532 UART: [kat] SHA2-512-ACC
494,070 UART: [kat] ECC-384
2,949,570 UART: [kat] HMAC-384Kdf
2,970,864 UART: [kat] LMS
3,502,615 UART: [kat] --
3,506,483 UART: [cold-reset] ++
3,508,352 UART: [fht] FHT @ 0x50003400
3,520,201 UART: [idev] ++
3,520,878 UART: [idev] CDI.KEYID = 6
3,521,868 UART: [idev] SUBJECT.KEYID = 7
3,523,047 UART: [idev] UDS.KEYID = 0
3,523,978 ready_for_fw is high
3,524,169 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,882 UART: [idev] Erasing UDS.KEYID = 0
6,025,310 UART: [idev] Sha1 KeyId Algorithm
6,048,096 UART: [idev] --
6,051,850 UART: [ldev] ++
6,052,539 UART: [ldev] CDI.KEYID = 6
6,053,454 UART: [ldev] SUBJECT.KEYID = 5
6,054,611 UART: [ldev] AUTHORITY.KEYID = 7
6,055,843 UART: [ldev] FE.KEYID = 1
6,099,603 UART: [ldev] Erasing FE.KEYID = 1
8,605,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,785 UART: [ldev] --
10,411,631 UART: [fwproc] Wait for Commands...
10,414,055 UART: [fwproc] Recv command 0x46574c44
10,416,372 UART: [fwproc] Recv'd Img size: 114360 bytes
13,860,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,603,243 >>> mbox cmd response: success
14,603,756 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,606,509 UART: [afmc] ++
14,607,210 UART: [afmc] CDI.KEYID = 6
14,608,314 UART: [afmc] SUBJECT.KEYID = 7
14,609,850 UART: [afmc] AUTHORITY.KEYID = 5
17,144,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,840 UART: [afmc] --
18,948,296 UART: [cold-reset] --
18,952,565 UART: [state] Locking Datavault
18,958,908 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,088 UART: [state] Locking ICCM
18,962,715 UART: [exit] Launching FMC @ 0x40000130
18,971,393 UART:
18,971,639 UART: Running Caliptra FMC ...
18,972,740 UART:
18,972,903 UART: [state] CFI Enabled
19,028,858 UART: [fht] FMC Alias Private Key: 7
20,793,430 UART: [art] Extend RT PCRs Done
20,794,651 UART: [art] Lock RT PCRs Done
20,796,437 UART: [art] Populate DV Done
20,801,942 UART: [fht] FMC Alias Private Key: 7
20,803,506 UART: [art] Derive CDI
20,804,327 UART: [art] Store in in slot 0x4
20,861,288 UART: [art] Derive Key Pair
20,862,309 UART: [art] Store priv key in slot 0x5
23,325,537 UART: [art] Derive Key Pair - Done
23,338,385 UART: [art] Signing Cert with AUTHO
23,339,698 UART: RITY.KEYID = 7
25,052,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,856 UART: [art] PUB.X = 7B34C1FBCEF3C0E03E7D822A6BC336335514A874BA599E10F8D206E3CB24FF76CA61E55D17EBCB48D9EBD145C3C9B78A
25,061,092 UART: [art] PUB.Y = A42F166CDEBA01F8D36ADB040692018FCBA9016ECFC760F73B5760D7A57C775DCC50CF4184CA2DA900AFA7CF894D8CE6
25,068,372 UART: [art] SIG.R = 16F2186AD518F289672FD400CF2148B6E7246899E75EA9056E93303607AD5DE1306DA8E408A82FAC1E221C92104452D6
25,075,762 UART: [art] SIG.S = 9C88B7642E0172A7E3869670A575DFBDB906A86085BB97EEF91E3508BD07AFA8431BA1D94310DBC67A33FD3491FB18BF
26,054,987 UART: Caliptra RT
26,055,707 UART: [state] CFI Enabled
26,220,005 UART: [rt] RT listening for mailbox commands...
26,251,240 UART: [rt]cmd =0x54514754, len=24
26,253,747 >>> mbox cmd response data (8 bytes)
26,254,312 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,284,124 UART: [rt]cmd =0x47544744, len=8
26,287,021 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,440,016 ready_for_fw is high
3,440,413 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,727,355 >>> mbox cmd response: success
14,727,943 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,004,593 UART:
19,004,978 UART: Running Caliptra FMC ...
19,006,095 UART:
19,006,256 UART: [state] CFI Enabled
19,074,027 UART: [fht] FMC Alias Private Key: 7
20,837,631 UART: [art] Extend RT PCRs Done
20,838,860 UART: [art] Lock RT PCRs Done
20,840,600 UART: [art] Populate DV Done
20,845,797 UART: [fht] FMC Alias Private Key: 7
20,847,307 UART: [art] Derive CDI
20,848,061 UART: [art] Store in in slot 0x4
20,906,342 UART: [art] Derive Key Pair
20,907,351 UART: [art] Store priv key in slot 0x5
23,370,477 UART: [art] Derive Key Pair - Done
23,383,471 UART: [art] Signing Cert with AUTHO
23,384,779 UART: RITY.KEYID = 7
25,096,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,836 UART: [art] PUB.X = 770D1DA5DA9E9EFBD0B34C2577A2A513F5FA9E300AB74A447AAB9CD42F2AB9FAB6657D14F92351CC170F9B7EEFA42025
25,105,137 UART: [art] PUB.Y = 6552E7B8666A68927BD2FBD576EF343216C18E6C317D8D2F2D97D08E721B602F9414642FD0BB122485957391463F6563
25,112,377 UART: [art] SIG.R = 954539A67748DD273C40325C50D50ACD0216A13833A0B4AAD879EB13AE825BC8DF0C5801F6551AC8CABAB07F75FE4CEF
25,119,768 UART: [art] SIG.S = 5F398AEB6357FD0272AA751B8B2B3D4A135E9176FE973AEDEDEA3CE77D66D3215C56D17310EACECBA8DF558607C4BE1C
26,099,285 UART: Caliptra RT
26,099,978 UART: [state] CFI Enabled
26,264,771 UART: [rt] RT listening for mailbox commands...
26,296,165 UART: [rt]cmd =0x54514754, len=24
26,298,789 >>> mbox cmd response data (8 bytes)
26,299,309 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,329,055 UART: [rt]cmd =0x47544744, len=8
26,332,051 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,276 UART:
192,661 UART: Running Caliptra ROM ...
193,778 UART:
603,285 UART: [state] CFI Enabled
620,232 UART: [state] LifecycleState = Unprovisioned
622,604 UART: [state] DebugLocked = No
625,347 UART: [state] WD Timer not started. Device not locked for debugging
629,167 UART: [kat] SHA2-256
819,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,827 UART: [kat] ++
830,358 UART: [kat] sha1
842,598 UART: [kat] SHA2-256
845,644 UART: [kat] SHA2-384
851,640 UART: [kat] SHA2-512-ACC
854,218 UART: [kat] ECC-384
3,295,422 UART: [kat] HMAC-384Kdf
3,309,024 UART: [kat] LMS
3,840,908 UART: [kat] --
3,845,615 UART: [cold-reset] ++
3,847,771 UART: [fht] FHT @ 0x50003400
3,859,029 UART: [idev] ++
3,859,734 UART: [idev] CDI.KEYID = 6
3,860,721 UART: [idev] SUBJECT.KEYID = 7
3,861,892 UART: [idev] UDS.KEYID = 0
3,862,816 ready_for_fw is high
3,863,039 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,765 UART: [idev] Erasing UDS.KEYID = 0
6,342,137 UART: [idev] Sha1 KeyId Algorithm
6,365,790 UART: [idev] --
6,370,185 UART: [ldev] ++
6,370,869 UART: [ldev] CDI.KEYID = 6
6,371,778 UART: [ldev] SUBJECT.KEYID = 5
6,372,989 UART: [ldev] AUTHORITY.KEYID = 7
6,374,163 UART: [ldev] FE.KEYID = 1
6,383,399 UART: [ldev] Erasing FE.KEYID = 1
8,867,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,588,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,603,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,619,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,634,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,655,270 UART: [ldev] --
10,661,177 UART: [fwproc] Wait for Commands...
10,662,839 UART: [fwproc] Recv command 0x46574c44
10,665,094 UART: [fwproc] Recv'd Img size: 114360 bytes
14,111,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,852,034 >>> mbox cmd response: success
14,852,560 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,856,603 UART: [afmc] ++
14,857,309 UART: [afmc] CDI.KEYID = 6
14,858,570 UART: [afmc] SUBJECT.KEYID = 7
14,860,000 UART: [afmc] AUTHORITY.KEYID = 5
17,364,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,088,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,090,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,106,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,121,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,136,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,160,108 UART: [afmc] --
19,164,464 UART: [cold-reset] --
19,168,579 UART: [state] Locking Datavault
19,174,317 UART: [state] Locking PCR0, PCR1 and PCR31
19,176,503 UART: [state] Locking ICCM
19,179,136 UART: [exit] Launching FMC @ 0x40000130
19,187,797 UART:
19,188,029 UART: Running Caliptra FMC ...
19,189,150 UART:
19,189,313 UART: [state] CFI Enabled
19,197,306 UART: [fht] FMC Alias Private Key: 7
20,954,825 UART: [art] Extend RT PCRs Done
20,956,052 UART: [art] Lock RT PCRs Done
20,957,462 UART: [art] Populate DV Done
20,962,920 UART: [fht] FMC Alias Private Key: 7
20,964,559 UART: [art] Derive CDI
20,965,371 UART: [art] Store in in slot 0x4
21,007,805 UART: [art] Derive Key Pair
21,008,841 UART: [art] Store priv key in slot 0x5
23,435,303 UART: [art] Derive Key Pair - Done
23,448,405 UART: [art] Signing Cert with AUTHO
23,449,696 UART: RITY.KEYID = 7
25,154,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,377 UART: [art] PUB.X = 5DD78E40B0D17B5CB1BD60CA531F7E22C674F532CCE8D0CFFA38363B1570AD5CD61FB7BB2BCAF6E29BA4EFE28D3A51EF
25,163,731 UART: [art] PUB.Y = 04FD6EFE9DF3526E9E2A5B85A45690D360A692776DECC8BD548EC4EA9816F50E4B5B52A650ED31A86ECEAFB1F9F7F13E
25,170,979 UART: [art] SIG.R = C8CB3DA00FA20D0A83DE4F47B26F99498710DFE753EE2A0D5F8912B0D7CEACF986BD7299F32EE1E0BCB631AB672C6ACC
25,178,380 UART: [art] SIG.S = 2C81830802C7C6ED88599DBB9243B6EB10F7BBE15CE7434EECFDB06C40E3679BFB8EB3D1C1DD23126C81D2869EF08312
26,157,781 UART: Caliptra RT
26,158,489 UART: [state] CFI Enabled
26,276,042 UART: [rt] RT listening for mailbox commands...
26,307,171 UART: [rt]cmd =0x54514754, len=24
26,309,627 >>> mbox cmd response data (8 bytes)
26,310,159 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,340,048 UART: [rt]cmd =0x47544744, len=8
26,342,871 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,620 writing to cptra_bootfsm_go
3,756,678 ready_for_fw is high
3,757,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,957,155 >>> mbox cmd response: success
14,958,045 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,213,611 UART:
19,214,005 UART: Running Caliptra FMC ...
19,215,116 UART:
19,215,268 UART: [state] CFI Enabled
19,223,174 UART: [fht] FMC Alias Private Key: 7
20,979,747 UART: [art] Extend RT PCRs Done
20,980,978 UART: [art] Lock RT PCRs Done
20,982,681 UART: [art] Populate DV Done
20,988,008 UART: [fht] FMC Alias Private Key: 7
20,989,522 UART: [art] Derive CDI
20,990,291 UART: [art] Store in in slot 0x4
21,032,626 UART: [art] Derive Key Pair
21,033,673 UART: [art] Store priv key in slot 0x5
23,459,969 UART: [art] Derive Key Pair - Done
23,472,809 UART: [art] Signing Cert with AUTHO
23,474,114 UART: RITY.KEYID = 7
25,179,689 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,196 UART: [art] PUB.X = FBF4DD84BB6B1F2DE4F54BCFCC0600C8782A68647B58A5D4B0B4DA1566580F47DD572094D1D2EF42B5F9E634CA687E7F
25,188,493 UART: [art] PUB.Y = C50A31A06E70377533C0C7CB0A06E5F05C058E7899B5637A506C7C2AC1F1CC9ED6F11F0A3E722C5CE8D9970659649782
25,195,718 UART: [art] SIG.R = 25BFF096E8C5BB95941A99A7B0DA67AF95EA4A5D5A2532ECDF14094915C8B93DB6F1FB965CC02C1C2E9AC708CE1F3BB3
25,203,121 UART: [art] SIG.S = 3E63308EBCBED6178399DBE2EE1C9FD836A014C2D9A6EDC24981A2D0AA39566E6AD102DFC448690367F3C9FFDDC8835C
26,181,617 UART: Caliptra RT
26,182,305 UART: [state] CFI Enabled
26,300,003 UART: [rt] RT listening for mailbox commands...
26,331,134 UART: [rt]cmd =0x54514754, len=24
26,333,610 >>> mbox cmd response data (8 bytes)
26,334,046 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,363,707 UART: [rt]cmd =0x47544744, len=8
26,366,691 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,325 UART: [kat] SHA2-256
892,263 UART: [kat] SHA2-384
894,928 UART: [kat] SHA2-512-ACC
896,829 UART: [kat] ECC-384
902,178 UART: [kat] HMAC-384Kdf
906,682 UART: [kat] LMS
1,474,878 UART: [kat] --
1,475,713 UART: [cold-reset] ++
1,476,043 UART: [fht] Storing FHT @ 0x50003400
1,478,848 UART: [idev] ++
1,479,016 UART: [idev] CDI.KEYID = 6
1,479,376 UART: [idev] SUBJECT.KEYID = 7
1,479,800 UART: [idev] UDS.KEYID = 0
1,480,145 ready_for_fw is high
1,480,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,434 UART: [idev] Erasing UDS.KEYID = 0
1,504,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,265 UART: [ldev] ++
1,514,433 UART: [ldev] CDI.KEYID = 6
1,514,796 UART: [ldev] SUBJECT.KEYID = 5
1,515,222 UART: [ldev] AUTHORITY.KEYID = 7
1,515,685 UART: [ldev] FE.KEYID = 1
1,520,815 UART: [ldev] Erasing FE.KEYID = 1
1,545,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,490 UART: [ldev] --
1,584,979 UART: [fwproc] Waiting for Commands...
1,585,748 UART: [fwproc] Received command 0x46574c44
1,586,539 UART: [fwproc] Received Image of size 114360 bytes
2,884,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,509 >>> mbox cmd response: success
3,076,509 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,557 UART: [afmc] ++
3,077,725 UART: [afmc] CDI.KEYID = 6
3,078,087 UART: [afmc] SUBJECT.KEYID = 7
3,078,512 UART: [afmc] AUTHORITY.KEYID = 5
3,113,843 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,648 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,338 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,375 UART: [afmc] --
3,157,445 UART: [cold-reset] --
3,158,289 UART: [state] Locking Datavault
3,159,530 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,134 UART: [state] Locking ICCM
3,160,642 UART: [exit] Launching FMC @ 0x40000130
3,165,971 UART:
3,165,987 UART: Running Caliptra FMC ...
3,166,395 UART:
3,166,449 UART: [state] CFI Enabled
3,177,090 UART: [fht] FMC Alias Private Key: 7
3,285,171 UART: [art] Extend RT PCRs Done
3,285,599 UART: [art] Lock RT PCRs Done
3,287,043 UART: [art] Populate DV Done
3,295,250 UART: [fht] FMC Alias Private Key: 7
3,296,270 UART: [art] Derive CDI
3,296,550 UART: [art] Store in in slot 0x4
3,381,743 UART: [art] Derive Key Pair
3,382,103 UART: [art] Store priv key in slot 0x5
3,395,595 UART: [art] Derive Key Pair - Done
3,410,682 UART: [art] Signing Cert with AUTHO
3,411,162 UART: RITY.KEYID = 7
3,426,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,005 UART: [art] PUB.X = 24F1B076C423338FF24BB849F8B529D40B3CBCCEB73730B2AF02088D4969B5E6A3EFD1D5D3D230AA27D80331C4D13F43
3,433,773 UART: [art] PUB.Y = E40BB279AC1C99F686F7AF261A03B7DB7D374E5A7E0DE827FA82D45C5316894352FD2D96D1A1E4146AB4FC6579975064
3,440,720 UART: [art] SIG.R = AE1BE08F2B16DDE251F6E8E248D53E46359B26972C417F3291CC1FAB59556AC46FD2F3CE8E99C605647EB12AC97D57C2
3,447,499 UART: [art] SIG.S = 9A5DB64DECF9F0AA45947954C8BADDE6F2A79096E3CCB35903380F8261832B59468C576B3082685D27022DCF8394F46E
3,471,283 UART: Caliptra RT
3,471,537 UART: [state] CFI Enabled
3,578,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,951 UART: [rt]cmd =0x54514754, len=24
3,611,198 >>> mbox cmd response data (8 bytes)
3,611,199 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,710 UART: [rt]cmd =0x47544744, len=8
3,643,096 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 ready_for_fw is high
1,362,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,009 >>> mbox cmd response: success
2,926,009 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,803 UART:
2,987,819 UART: Running Caliptra FMC ...
2,988,227 UART:
2,988,281 UART: [state] CFI Enabled
2,998,972 UART: [fht] FMC Alias Private Key: 7
3,106,919 UART: [art] Extend RT PCRs Done
3,107,347 UART: [art] Lock RT PCRs Done
3,108,879 UART: [art] Populate DV Done
3,117,060 UART: [fht] FMC Alias Private Key: 7
3,118,054 UART: [art] Derive CDI
3,118,334 UART: [art] Store in in slot 0x4
3,204,009 UART: [art] Derive Key Pair
3,204,369 UART: [art] Store priv key in slot 0x5
3,216,917 UART: [art] Derive Key Pair - Done
3,231,511 UART: [art] Signing Cert with AUTHO
3,231,991 UART: RITY.KEYID = 7
3,246,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,406 UART: [art] PUB.X = C58AA28CBD0B2270C9EC9A32078FCCF5A1F49881A28DA87294F734CDD33A5AFF0228DAF6BAB59910CFEF1F26AE8456BB
3,254,191 UART: [art] PUB.Y = A9996691AF1F062185F7F68AD75360F249D965AEB78C5E9BCDB50B8772543F3A739DBD853B593A06FA87D5C5EC100607
3,261,130 UART: [art] SIG.R = F9802B864044338644C70FD6BC8B06B41365F8238057ADB64DACE719CB558F245A5A60633F0E87FB2B660B7C9E877238
3,267,886 UART: [art] SIG.S = 49A1DCEE94C998FD1012C095A0E03514E0A8993D934F74CB2071BF157B1ADED9565A9F027D74C04E67102189D7429950
3,291,418 UART: Caliptra RT
3,291,672 UART: [state] CFI Enabled
3,399,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,169 UART: [rt]cmd =0x54514754, len=24
3,432,156 >>> mbox cmd response data (8 bytes)
3,432,157 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,388 UART: [rt]cmd =0x47544744, len=8
3,463,788 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,926 UART: [kat] SHA2-256
881,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,972 UART: [kat] ++
886,124 UART: [kat] sha1
890,336 UART: [kat] SHA2-256
892,274 UART: [kat] SHA2-384
895,169 UART: [kat] SHA2-512-ACC
897,070 UART: [kat] ECC-384
902,579 UART: [kat] HMAC-384Kdf
907,013 UART: [kat] LMS
1,475,209 UART: [kat] --
1,475,950 UART: [cold-reset] ++
1,476,424 UART: [fht] Storing FHT @ 0x50003400
1,479,075 UART: [idev] ++
1,479,243 UART: [idev] CDI.KEYID = 6
1,479,603 UART: [idev] SUBJECT.KEYID = 7
1,480,027 UART: [idev] UDS.KEYID = 0
1,480,372 ready_for_fw is high
1,480,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,159 UART: [idev] Erasing UDS.KEYID = 0
1,504,657 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,271 UART: [idev] --
1,514,238 UART: [ldev] ++
1,514,406 UART: [ldev] CDI.KEYID = 6
1,514,769 UART: [ldev] SUBJECT.KEYID = 5
1,515,195 UART: [ldev] AUTHORITY.KEYID = 7
1,515,658 UART: [ldev] FE.KEYID = 1
1,520,698 UART: [ldev] Erasing FE.KEYID = 1
1,545,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,879 UART: [ldev] --
1,585,180 UART: [fwproc] Waiting for Commands...
1,585,967 UART: [fwproc] Received command 0x46574c44
1,586,758 UART: [fwproc] Received Image of size 114360 bytes
2,883,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,763 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,075,984 >>> mbox cmd response: success
3,075,984 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,070 UART: [afmc] ++
3,077,238 UART: [afmc] CDI.KEYID = 6
3,077,600 UART: [afmc] SUBJECT.KEYID = 7
3,078,025 UART: [afmc] AUTHORITY.KEYID = 5
3,112,888 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,382 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,267 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,957 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,872 UART: [afmc] --
3,155,922 UART: [cold-reset] --
3,156,858 UART: [state] Locking Datavault
3,158,169 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,773 UART: [state] Locking ICCM
3,159,325 UART: [exit] Launching FMC @ 0x40000130
3,164,654 UART:
3,164,670 UART: Running Caliptra FMC ...
3,165,078 UART:
3,165,221 UART: [state] CFI Enabled
3,175,906 UART: [fht] FMC Alias Private Key: 7
3,284,659 UART: [art] Extend RT PCRs Done
3,285,087 UART: [art] Lock RT PCRs Done
3,286,863 UART: [art] Populate DV Done
3,294,928 UART: [fht] FMC Alias Private Key: 7
3,295,970 UART: [art] Derive CDI
3,296,250 UART: [art] Store in in slot 0x4
3,381,875 UART: [art] Derive Key Pair
3,382,235 UART: [art] Store priv key in slot 0x5
3,395,545 UART: [art] Derive Key Pair - Done
3,410,569 UART: [art] Signing Cert with AUTHO
3,411,049 UART: RITY.KEYID = 7
3,426,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,828 UART: [art] PUB.X = 50541879B05268916050A95AB91D6147059FDA38169859D59A35C34B7330DD0770F39829972AA0ACD1B6B970E245C942
3,433,578 UART: [art] PUB.Y = 23EF74ECD5AAB2FB7469C5DFE78901E49ACCC6B049BBD0F3454485CF607698DFF9121EDC68BBABAF804E2C7D7483EA07
3,440,546 UART: [art] SIG.R = 18D017B860C31D956F5E727860703A891B24D18E15D283796AACB4C8567157795FE1506C7A7C556E0A3C2EA8AB246A30
3,447,309 UART: [art] SIG.S = 65223DA2050005D93E89CDF847A1FC4969047B1AC103DD786350938AD010D66289ABFDFD99D058BCC80633E4D36EF127
3,470,551 UART: Caliptra RT
3,470,897 UART: [state] CFI Enabled
3,579,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,611 UART: [rt]cmd =0x54514754, len=24
3,611,782 >>> mbox cmd response data (8 bytes)
3,611,783 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,066 UART: [rt]cmd =0x47544744, len=8
3,643,254 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,944 ready_for_fw is high
1,361,944 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,652 >>> mbox cmd response: success
2,927,652 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,700 UART:
2,988,716 UART: Running Caliptra FMC ...
2,989,124 UART:
2,989,267 UART: [state] CFI Enabled
3,000,064 UART: [fht] FMC Alias Private Key: 7
3,108,321 UART: [art] Extend RT PCRs Done
3,108,749 UART: [art] Lock RT PCRs Done
3,110,491 UART: [art] Populate DV Done
3,118,794 UART: [fht] FMC Alias Private Key: 7
3,119,792 UART: [art] Derive CDI
3,120,072 UART: [art] Store in in slot 0x4
3,205,767 UART: [art] Derive Key Pair
3,206,127 UART: [art] Store priv key in slot 0x5
3,218,931 UART: [art] Derive Key Pair - Done
3,233,649 UART: [art] Signing Cert with AUTHO
3,234,129 UART: RITY.KEYID = 7
3,249,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,138 UART: [art] PUB.X = 5AE785971411DF8DEEB28AB5FF4FE42FADA1489FD1FF44F3059158F27E60AEA93F02421506367F7DEEAD17AA863C6D5E
3,256,917 UART: [art] PUB.Y = 94F396A73767F822DFAC792DD06D040FBE0341614D1814002B7117FFF9F0AC4EC4441136ECDF819CF6B7ABE1C683AF57
3,263,846 UART: [art] SIG.R = AFB4E6890BC4ADE7DEA0F79C985AB662EC8421A36B5E9E14B365BB8045F2BB6169B88796F4DC5CD31CD19560648945A5
3,270,625 UART: [art] SIG.S = D810CFE08525296E854137C63493FF0EB727E709AB385618210AF8795988D39FFFF22200ACDFB9F39AC07C8F0ED910D6
3,294,518 UART: Caliptra RT
3,294,864 UART: [state] CFI Enabled
3,403,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,066 UART: [rt]cmd =0x54514754, len=24
3,436,383 >>> mbox cmd response data (8 bytes)
3,436,384 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,629 UART: [rt]cmd =0x47544744, len=8
3,468,005 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Unprovisioned
85,329 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
892,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,095 UART: [kat] ++
897,247 UART: [kat] sha1
901,503 UART: [kat] SHA2-256
903,443 UART: [kat] SHA2-384
906,174 UART: [kat] SHA2-512-ACC
908,075 UART: [kat] ECC-384
917,500 UART: [kat] HMAC-384Kdf
922,184 UART: [kat] LMS
1,170,512 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,171,841 UART: [fht] FHT @ 0x50003400
1,174,414 UART: [idev] ++
1,174,582 UART: [idev] CDI.KEYID = 6
1,174,942 UART: [idev] SUBJECT.KEYID = 7
1,175,366 UART: [idev] UDS.KEYID = 0
1,175,711 ready_for_fw is high
1,175,711 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,456 UART: [idev] Erasing UDS.KEYID = 0
1,200,541 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,420 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,287 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,466 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,693 >>> mbox cmd response: success
2,773,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,783 UART: [afmc] ++
2,774,951 UART: [afmc] CDI.KEYID = 6
2,775,313 UART: [afmc] SUBJECT.KEYID = 7
2,775,738 UART: [afmc] AUTHORITY.KEYID = 5
2,811,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,610 UART: [afmc] --
2,854,604 UART: [cold-reset] --
2,855,306 UART: [state] Locking Datavault
2,856,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,817 UART: [state] Locking ICCM
2,857,273 UART: [exit] Launching FMC @ 0x40000130
2,862,602 UART:
2,862,618 UART: Running Caliptra FMC ...
2,863,026 UART:
2,863,080 UART: [state] CFI Enabled
2,873,577 UART: [fht] FMC Alias Private Key: 7
2,980,886 UART: [art] Extend RT PCRs Done
2,981,314 UART: [art] Lock RT PCRs Done
2,982,828 UART: [art] Populate DV Done
2,991,117 UART: [fht] FMC Alias Private Key: 7
2,992,205 UART: [art] Derive CDI
2,992,485 UART: [art] Store in in slot 0x4
3,078,292 UART: [art] Derive Key Pair
3,078,652 UART: [art] Store priv key in slot 0x5
3,092,152 UART: [art] Derive Key Pair - Done
3,107,101 UART: [art] Signing Cert with AUTHO
3,107,581 UART: RITY.KEYID = 7
3,122,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,464 UART: [art] PUB.X = 6A410CE58480A2B62E984A5A7B79888F32B7670C541A6B3709932AF01CEEF7F2258C8F0383477B0863F2B6A0B350078F
3,130,212 UART: [art] PUB.Y = 4D8FFE756A1D7A09B4F52EFB2C508C3E03CF817060B556E0E41E8EC8BD78885DCED8CD4DA1537FB744A1DAFDB4EE8D83
3,137,182 UART: [art] SIG.R = BF9E87FD607B3A1A8DF19819B345A899F9B707334948240E6A1A10B0D6E859D7D212568F39660E06EF7541BB587FE0DB
3,143,942 UART: [art] SIG.S = CAE2C2444EB9A229E90C3455A001A5659C1E7DBD52AF99C64EFE0675A530C3343EC42B81A8C14A07939FB06265DFA586
3,167,681 UART: Caliptra RT
3,167,935 UART: [state] CFI Enabled
3,276,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,539 UART: [rt]cmd =0x54514754, len=24
3,308,832 >>> mbox cmd response data (8 bytes)
3,308,833 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,096 UART: [rt]cmd =0x47544744, len=8
3,340,576 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,283 ready_for_fw is high
1,060,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,031 >>> mbox cmd response: success
2,626,031 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,841 UART:
2,687,857 UART: Running Caliptra FMC ...
2,688,265 UART:
2,688,319 UART: [state] CFI Enabled
2,698,392 UART: [fht] FMC Alias Private Key: 7
2,806,541 UART: [art] Extend RT PCRs Done
2,806,969 UART: [art] Lock RT PCRs Done
2,808,821 UART: [art] Populate DV Done
2,817,046 UART: [fht] FMC Alias Private Key: 7
2,818,206 UART: [art] Derive CDI
2,818,486 UART: [art] Store in in slot 0x4
2,904,093 UART: [art] Derive Key Pair
2,904,453 UART: [art] Store priv key in slot 0x5
2,917,385 UART: [art] Derive Key Pair - Done
2,932,305 UART: [art] Signing Cert with AUTHO
2,932,785 UART: RITY.KEYID = 7
2,947,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,428 UART: [art] PUB.X = 5A58948D2471723E3C8C04352A9B5318D1D5B32B37DFF082727FD8665B9FEC975AC55E415E10ED8B39D4D7601F9473A3
2,955,195 UART: [art] PUB.Y = 744B0CC8442831DCD7FAC54FE70451795707E93FFA75DEF1DDD40107D5F76570260D651572CA4AB59A877ACDDA379116
2,962,133 UART: [art] SIG.R = 6BA37CC1F28071A24FAF6F13E03E467824ADB108E494615CF8A369E8DB1A0C36058601DBA90E07A7BB1C26FC3FBB6DCB
2,968,903 UART: [art] SIG.S = 938CE7E517A144BF2B55341E0B5088715FDE6E9774B16727A03D11937E0CD4BF4AF71C2856889EDF4FF18E856356D1B7
2,992,740 UART: Caliptra RT
2,992,994 UART: [state] CFI Enabled
3,101,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,581 UART: [rt]cmd =0x54514754, len=24
3,133,890 >>> mbox cmd response data (8 bytes)
3,133,891 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,262 UART: [rt]cmd =0x47544744, len=8
3,165,482 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,947 UART: [kat] HMAC-384Kdf
923,623 UART: [kat] LMS
1,171,951 UART: [kat] --
1,172,652 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,697 UART: [idev] ++
1,175,865 UART: [idev] CDI.KEYID = 6
1,176,225 UART: [idev] SUBJECT.KEYID = 7
1,176,649 UART: [idev] UDS.KEYID = 0
1,176,994 ready_for_fw is high
1,176,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,499 UART: [idev] Erasing UDS.KEYID = 0
1,201,366 UART: [idev] Sha1 KeyId Algorithm
1,209,836 UART: [idev] --
1,210,968 UART: [ldev] ++
1,211,136 UART: [ldev] CDI.KEYID = 6
1,211,499 UART: [ldev] SUBJECT.KEYID = 5
1,211,925 UART: [ldev] AUTHORITY.KEYID = 7
1,212,388 UART: [ldev] FE.KEYID = 1
1,217,680 UART: [ldev] Erasing FE.KEYID = 1
1,244,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,663 UART: [fwproc] Wait for Commands...
1,284,245 UART: [fwproc] Recv command 0x46574c44
1,284,973 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,027 >>> mbox cmd response: success
2,776,027 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,777,171 UART: [afmc] ++
2,777,339 UART: [afmc] CDI.KEYID = 6
2,777,701 UART: [afmc] SUBJECT.KEYID = 7
2,778,126 UART: [afmc] AUTHORITY.KEYID = 5
2,813,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,688 UART: [afmc] --
2,856,654 UART: [cold-reset] --
2,857,632 UART: [state] Locking Datavault
2,858,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,501 UART: [state] Locking ICCM
2,860,145 UART: [exit] Launching FMC @ 0x40000130
2,865,474 UART:
2,865,490 UART: Running Caliptra FMC ...
2,865,898 UART:
2,866,041 UART: [state] CFI Enabled
2,876,542 UART: [fht] FMC Alias Private Key: 7
2,984,643 UART: [art] Extend RT PCRs Done
2,985,071 UART: [art] Lock RT PCRs Done
2,986,613 UART: [art] Populate DV Done
2,994,662 UART: [fht] FMC Alias Private Key: 7
2,995,784 UART: [art] Derive CDI
2,996,064 UART: [art] Store in in slot 0x4
3,081,491 UART: [art] Derive Key Pair
3,081,851 UART: [art] Store priv key in slot 0x5
3,095,343 UART: [art] Derive Key Pair - Done
3,110,092 UART: [art] Signing Cert with AUTHO
3,110,572 UART: RITY.KEYID = 7
3,125,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,761 UART: [art] PUB.X = 33214CD3588527029138872CBFDCB124B9BEA956CF37D9A14225825982307CDF21EFD28C6FF838746797AD7FA3A8F460
3,133,528 UART: [art] PUB.Y = 34C2F883664EE67D77210B3A24C8DDD8123916BC6D5A37E8AA9B34FAC8C0275AD919791F42BAB120356E18F6C23AC5E3
3,140,483 UART: [art] SIG.R = 00F324A4262FEE3AF7113C94ABA7BC54E22313B3B801653C27F145F040C8327103170E11BF65D3751814FDDECE5F520C
3,147,221 UART: [art] SIG.S = 948475CD6A0797EC76A17D290EF1191A7C5CE6AAD9244C2D4535BD755B19BC2145622CD3A942E9257417C71A1EEA2CE0
3,170,930 UART: Caliptra RT
3,171,276 UART: [state] CFI Enabled
3,280,561 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,818 UART: [rt]cmd =0x54514754, len=24
3,312,759 >>> mbox cmd response data (8 bytes)
3,312,760 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,073 UART: [rt]cmd =0x47544744, len=8
3,344,665 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,050 ready_for_fw is high
1,060,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,336 >>> mbox cmd response: success
2,627,336 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,650 UART:
2,689,666 UART: Running Caliptra FMC ...
2,690,074 UART:
2,690,217 UART: [state] CFI Enabled
2,700,524 UART: [fht] FMC Alias Private Key: 7
2,808,469 UART: [art] Extend RT PCRs Done
2,808,897 UART: [art] Lock RT PCRs Done
2,810,511 UART: [art] Populate DV Done
2,818,822 UART: [fht] FMC Alias Private Key: 7
2,819,934 UART: [art] Derive CDI
2,820,214 UART: [art] Store in in slot 0x4
2,905,949 UART: [art] Derive Key Pair
2,906,309 UART: [art] Store priv key in slot 0x5
2,919,775 UART: [art] Derive Key Pair - Done
2,934,507 UART: [art] Signing Cert with AUTHO
2,934,987 UART: RITY.KEYID = 7
2,950,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,950 UART: [art] PUB.X = C787E4946178A75082C2B250983CA7F4E59768C85C38CDDEF3F1CF73553142CC7FCE44E721780D51DAF27065C4E5AD98
2,957,721 UART: [art] PUB.Y = 00B23205382E7601FCCDC5521A2C7878BDC7251559227268F3E4966419045E1ECDE7136BF72EF2050BE343386276C706
2,964,621 UART: [art] SIG.R = 700886F3925A559CF438784E393835E5F3B530729886973F86E79FB060BBD3B807B3B4C16EA52E8F3053D943DF0FF969
2,971,376 UART: [art] SIG.S = 07212F794FC2B7E67017CBC650A83BA6E751E7C9DCFFA8BD8715E9825E9C14150B48755F203EA4E0A9A143F67A669BDD
2,994,741 UART: Caliptra RT
2,995,087 UART: [state] CFI Enabled
3,103,975 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,100 UART: [rt]cmd =0x54514754, len=24
3,136,007 >>> mbox cmd response data (8 bytes)
3,136,008 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,431 UART: [rt]cmd =0x47544744, len=8
3,167,967 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,151 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,174,145 ready_for_fw is high
1,174,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,208,920 UART: [ldev] ++
1,209,088 UART: [ldev] CDI.KEYID = 6
1,209,452 UART: [ldev] SUBJECT.KEYID = 5
1,209,879 UART: [ldev] AUTHORITY.KEYID = 7
1,210,342 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,582 UART: [fwproc] Wait for Commands...
1,281,277 UART: [fwproc] Recv command 0x46574c44
1,282,010 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,622 >>> mbox cmd response: success
2,772,622 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,793 UART: [afmc] ++
2,773,961 UART: [afmc] CDI.KEYID = 6
2,774,324 UART: [afmc] SUBJECT.KEYID = 7
2,774,750 UART: [afmc] AUTHORITY.KEYID = 5
2,810,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,182 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,716 UART: [afmc] --
2,853,792 UART: [cold-reset] --
2,854,564 UART: [state] Locking Datavault
2,855,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,305 UART: [state] Locking ICCM
2,856,889 UART: [exit] Launching FMC @ 0x40000130
2,862,218 UART:
2,862,234 UART: Running Caliptra FMC ...
2,862,642 UART:
2,862,696 UART: [state] CFI Enabled
2,872,873 UART: [fht] FMC Alias Private Key: 7
2,980,148 UART: [art] Extend RT PCRs Done
2,980,576 UART: [art] Lock RT PCRs Done
2,982,132 UART: [art] Populate DV Done
2,990,151 UART: [fht] FMC Alias Private Key: 7
2,991,091 UART: [art] Derive CDI
2,991,371 UART: [art] Store in in slot 0x4
3,077,156 UART: [art] Derive Key Pair
3,077,516 UART: [art] Store priv key in slot 0x5
3,090,684 UART: [art] Derive Key Pair - Done
3,105,664 UART: [art] Signing Cert with AUTHO
3,106,144 UART: RITY.KEYID = 7
3,120,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,667 UART: [art] PUB.X = F51C3A179EEF2AD87AFCAD60C038AF3C8D82BF37D8831C90C932CA0D0217D8960641D4254B31E02CB335C91A6C650D49
3,128,435 UART: [art] PUB.Y = D727EFD6A15894FF0841C693690086303719FC4ED4128F280C28EFC5B1968BD76DDDAA67E03739B2275608F393936BCA
3,135,354 UART: [art] SIG.R = DC807C27FE64A3B98386B4A5AC29B3FA8FBF4E7FA80C196FF1C5E7B8DA207C1BD5A2C4ECE7032BD14EE8D477F0CBE18A
3,142,148 UART: [art] SIG.S = 19B227F3C6FF173147FBF77753F8B03F2A48CE8DF47BE7CF2CCA99765D60CD358AE70E3F2E50149D10A9CFF03DF6D4C5
3,165,864 UART: Caliptra RT
3,166,118 UART: [state] CFI Enabled
3,273,578 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,705 UART: [rt]cmd =0x54514754, len=24
3,305,684 >>> mbox cmd response data (8 bytes)
3,305,685 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,790 UART: [rt]cmd =0x47544744, len=8
3,337,350 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,010 ready_for_fw is high
1,056,010 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,860 >>> mbox cmd response: success
2,621,860 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,678 UART:
2,682,694 UART: Running Caliptra FMC ...
2,683,102 UART:
2,683,156 UART: [state] CFI Enabled
2,693,365 UART: [fht] FMC Alias Private Key: 7
2,801,452 UART: [art] Extend RT PCRs Done
2,801,880 UART: [art] Lock RT PCRs Done
2,803,630 UART: [art] Populate DV Done
2,811,857 UART: [fht] FMC Alias Private Key: 7
2,812,891 UART: [art] Derive CDI
2,813,171 UART: [art] Store in in slot 0x4
2,898,480 UART: [art] Derive Key Pair
2,898,840 UART: [art] Store priv key in slot 0x5
2,911,600 UART: [art] Derive Key Pair - Done
2,926,356 UART: [art] Signing Cert with AUTHO
2,926,836 UART: RITY.KEYID = 7
2,942,482 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,247 UART: [art] PUB.X = 6D3780467D87BF0E511FD81643672CE2CDF1702B359C772BC4CE5C4CE7597A2369B0C2D5643B192CA01AF1CE7951D2D5
2,950,020 UART: [art] PUB.Y = E568E1A3B3CD2C5446F1C4F4D5841157690528FD03343E8058B0887734B549E2BF46D22D1125F7EABC94EB165BC33994
2,956,962 UART: [art] SIG.R = 27DB3BDC7D9B6BAD616C2F28ECBFDEDB9669BB0F4A2EF14BA0AEFEC4CA79936AAE3DDAC1586CE8BD721CBC97E10C47D7
2,963,768 UART: [art] SIG.S = 68EDE0031A0495914E8D52FD30702938152CEB1C9AC37F28AA96F4BADCABAEEBEFE9E0C01246B05983539D3430B8F125
2,987,333 UART: Caliptra RT
2,987,587 UART: [state] CFI Enabled
3,095,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,460 UART: [rt]cmd =0x54514754, len=24
3,127,559 >>> mbox cmd response data (8 bytes)
3,127,560 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,889 UART: [rt]cmd =0x47544744, len=8
3,159,675 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 ready_for_fw is high
1,174,686 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,797 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,709 >>> mbox cmd response: success
2,773,709 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,766 UART: [afmc] ++
2,774,934 UART: [afmc] CDI.KEYID = 6
2,775,297 UART: [afmc] SUBJECT.KEYID = 7
2,775,723 UART: [afmc] AUTHORITY.KEYID = 5
2,811,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,255 UART: [afmc] --
2,855,269 UART: [cold-reset] --
2,856,063 UART: [state] Locking Datavault
2,857,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,650 UART: [state] Locking ICCM
2,858,280 UART: [exit] Launching FMC @ 0x40000130
2,863,609 UART:
2,863,625 UART: Running Caliptra FMC ...
2,864,033 UART:
2,864,176 UART: [state] CFI Enabled
2,874,861 UART: [fht] FMC Alias Private Key: 7
2,983,170 UART: [art] Extend RT PCRs Done
2,983,598 UART: [art] Lock RT PCRs Done
2,984,986 UART: [art] Populate DV Done
2,992,987 UART: [fht] FMC Alias Private Key: 7
2,993,953 UART: [art] Derive CDI
2,994,233 UART: [art] Store in in slot 0x4
3,079,838 UART: [art] Derive Key Pair
3,080,198 UART: [art] Store priv key in slot 0x5
3,093,706 UART: [art] Derive Key Pair - Done
3,108,601 UART: [art] Signing Cert with AUTHO
3,109,081 UART: RITY.KEYID = 7
3,124,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,912 UART: [art] PUB.X = F072BB3EB440BA4F8C2B862B03D34AED89F11997AB87A6FA2D54E4839C1BD2DC82C2665DAC4252B837D1680C23B20A42
3,131,685 UART: [art] PUB.Y = 756CE7EEEEFD20233AFD9B8992BF88945BD7CDC1F448831A0742B520A3BCE8891A5CF75AA34C58B01C7464D4AA08D941
3,138,643 UART: [art] SIG.R = 9817849699E1F00AE35CAAB5A0A9FAC95D3F19DB259673AF2E931A6585434E3C0ED865059D94D69FFCFA1D1D52D8EB2D
3,145,418 UART: [art] SIG.S = 951EC73FED354151B73DF1F3DCF23658F903525403C64A4463E8E6061FD598DB83D7915B74650E1606FF7D2D5EE85569
3,169,416 UART: Caliptra RT
3,169,762 UART: [state] CFI Enabled
3,277,611 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,852 UART: [rt]cmd =0x54514754, len=24
3,310,215 >>> mbox cmd response data (8 bytes)
3,310,216 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,479 UART: [rt]cmd =0x47544744, len=8
3,342,075 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,053 ready_for_fw is high
1,057,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,061 >>> mbox cmd response: success
2,624,061 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,305 UART:
2,686,321 UART: Running Caliptra FMC ...
2,686,729 UART:
2,686,872 UART: [state] CFI Enabled
2,697,223 UART: [fht] FMC Alias Private Key: 7
2,805,204 UART: [art] Extend RT PCRs Done
2,805,632 UART: [art] Lock RT PCRs Done
2,807,164 UART: [art] Populate DV Done
2,815,463 UART: [fht] FMC Alias Private Key: 7
2,816,555 UART: [art] Derive CDI
2,816,835 UART: [art] Store in in slot 0x4
2,902,920 UART: [art] Derive Key Pair
2,903,280 UART: [art] Store priv key in slot 0x5
2,916,784 UART: [art] Derive Key Pair - Done
2,931,742 UART: [art] Signing Cert with AUTHO
2,932,222 UART: RITY.KEYID = 7
2,947,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,159 UART: [art] PUB.X = D7BEB8B2FE6DDC001B1F72A54DC475A1362941ED98B94A69FA6824DD003648F2BA5D5A0FBA5951D315A1995D5A350D03
2,954,888 UART: [art] PUB.Y = 2810D3BE3F19A90E05F38CC629F92110A54F4A0026DA94A5B0AF44C91384E640F9D52E2210FB8346AC35A77518C66393
2,961,808 UART: [art] SIG.R = B396F20C7CC787FE4782A518BDAED69BA69EAEB01A87A6AF07E128982680272B968B8188B0742C32541301D5702C7046
2,968,567 UART: [art] SIG.S = 061FB6192550A7FCA99E490E4EFE4DC0C19E8D6E61B53E1A4BE8AE105410F0A22B62E9FEF37634E1FE151DB362201363
2,992,200 UART: Caliptra RT
2,992,546 UART: [state] CFI Enabled
3,101,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,257 UART: [rt]cmd =0x54514754, len=24
3,133,596 >>> mbox cmd response data (8 bytes)
3,133,597 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,888 UART: [rt]cmd =0x47544744, len=8
3,165,424 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,427 UART:
192,815 UART: Running Caliptra ROM ...
193,966 UART:
194,111 UART: [state] CFI Enabled
262,754 UART: [state] LifecycleState = Unprovisioned
264,682 UART: [state] DebugLocked = No
267,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,367 UART: [kat] SHA2-256
441,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,587 UART: [kat] ++
452,102 UART: [kat] sha1
462,256 UART: [kat] SHA2-256
464,964 UART: [kat] SHA2-384
470,942 UART: [kat] SHA2-512-ACC
473,366 UART: [kat] ECC-384
2,768,717 UART: [kat] HMAC-384Kdf
2,799,495 UART: [kat] LMS
3,989,800 UART: [kat] --
3,993,808 UART: [cold-reset] ++
3,995,809 UART: [fht] Storing FHT @ 0x50003400
4,008,056 UART: [idev] ++
4,008,626 UART: [idev] CDI.KEYID = 6
4,009,654 UART: [idev] SUBJECT.KEYID = 7
4,010,825 UART: [idev] UDS.KEYID = 0
4,011,848 ready_for_fw is high
4,012,055 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,709 UART: [idev] Erasing UDS.KEYID = 0
7,348,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,102 UART: [idev] --
7,373,352 UART: [ldev] ++
7,373,910 UART: [ldev] CDI.KEYID = 6
7,374,840 UART: [ldev] SUBJECT.KEYID = 5
7,376,099 UART: [ldev] AUTHORITY.KEYID = 7
7,377,247 UART: [ldev] FE.KEYID = 1
7,422,488 UART: [ldev] Erasing FE.KEYID = 1
10,756,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,532 UART: [ldev] --
13,137,762 UART: [fwproc] Waiting for Commands...
13,139,966 UART: [fwproc] Received command 0x46574c44
13,142,139 UART: [fwproc] Received Image of size 114036 bytes
17,196,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,844 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,656,442 >>> mbox cmd response: success
17,656,974 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,660,799 UART: [afmc] ++
17,661,396 UART: [afmc] CDI.KEYID = 6
17,662,414 UART: [afmc] SUBJECT.KEYID = 7
17,663,568 UART: [afmc] AUTHORITY.KEYID = 5
21,027,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,177 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,583 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,449 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,883 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,116 UART: [afmc] --
23,399,037 UART: [cold-reset] --
23,403,921 UART: [state] Locking Datavault
23,408,838 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,584 UART: [state] Locking ICCM
23,412,781 UART: [exit] Launching FMC @ 0x40000130
23,421,175 UART:
23,421,426 UART: Running Caliptra FMC ...
23,422,521 UART:
23,422,670 UART: [state] CFI Enabled
23,489,582 UART: [fht] FMC Alias Private Key: 7
25,827,877 UART: [art] Extend RT PCRs Done
25,829,775 UART: [art] Lock RT PCRs Done
25,830,788 UART: [art] Populate DV Done
25,836,322 UART: [fht] FMC Alias Private Key: 7
25,837,856 UART: [art] Derive CDI
25,838,620 UART: [art] Store in in slot 0x4
25,898,538 UART: [art] Derive Key Pair
25,899,713 UART: [art] Store priv key in slot 0x5
29,192,928 UART: [art] Derive Key Pair - Done
29,205,915 UART: [art] Signing Cert with AUTHO
29,207,306 UART: RITY.KEYID = 7
31,498,890 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,074 UART: [art] PUB.X = A1C7DDCECB6636BB9423489EC0CD70427BA30872FBA77795C558A8D342B14D0ADA9D3E7B8BE700774AE49AF170F3E2BB
31,507,690 UART: [art] PUB.Y = 6561F49CE46B604B51B0C8054D60F19DA3DCEC76EAC1448D0E03C76C2FB1ADC872224997E2C2362483BCE12E4A9469F1
31,514,918 UART: [art] SIG.R = 9D89C8C2D881BC239C61679F3E663C6A87D1C07CC17E5A2E40F4E6B1A9D0595FDAF4E70BADD23137AD85A19D2E8E3B7B
31,522,299 UART: [art] SIG.S = 1E065350E17DBE0A42DD4B26F7130FC289F2228F5E5D63AF8BBE775082CACC4392F37D4798D43DDF09FABD161EE6B2CD
32,827,513 UART: Caliptra RT
32,828,693 UART: [state] CFI Enabled
32,997,897 UART: [rt] RT listening for mailbox commands...
33,029,202 UART: [rt]cmd =0x54514754, len=24
33,031,627 >>> mbox cmd response data (8 bytes)
33,032,734 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,063,013 UART: [rt]cmd =0x44504543, len=36
33,099,535 >>> mbox cmd response data (24 bytes)
33,100,238 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,129,750 UART: [rt]cmd =0x47544744, len=8
33,131,528 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,785,176 ready_for_fw is high
3,785,580 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,854,774 >>> mbox cmd response: success
17,855,396 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,542,763 UART:
23,543,161 UART: Running Caliptra FMC ...
23,544,265 UART:
23,544,410 UART: [state] CFI Enabled
23,615,881 UART: [fht] FMC Alias Private Key: 7
25,954,000 UART: [art] Extend RT PCRs Done
25,955,360 UART: [art] Lock RT PCRs Done
25,956,603 UART: [art] Populate DV Done
25,961,915 UART: [fht] FMC Alias Private Key: 7
25,963,395 UART: [art] Derive CDI
25,964,146 UART: [art] Store in in slot 0x4
26,024,385 UART: [art] Derive Key Pair
26,025,380 UART: [art] Store priv key in slot 0x5
29,318,595 UART: [art] Derive Key Pair - Done
29,331,748 UART: [art] Signing Cert with AUTHO
29,333,046 UART: RITY.KEYID = 7
31,620,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,100 UART: [art] PUB.X = C9B55370C21830B4E0136FE09082BDEB17C5C07CEADFB465F3C41F263E584833F0F1A91469C0AD9C5B604EEB1A36D57E
31,629,348 UART: [art] PUB.Y = D62543D90724DF04A9AFDD55587ED6533268397ABF8FF778F0DE3F0E2066F04C66D877F92A1C656A8EC06349522A41E7
31,636,605 UART: [art] SIG.R = DC29805570CE6C47EB9B0E781B909D4BBA52F012B909A5EDF57451FAAE54DD618C520CE9EF1A05A464E91CBB428F843C
31,643,947 UART: [art] SIG.S = D9B60BDECC1B1A87F08D9582EA23F0AD5C556512659BF7297898C1241C05633CACC3E69BB9151560B735B641D3B0D0D0
32,948,808 UART: Caliptra RT
32,949,507 UART: [state] CFI Enabled
33,111,701 UART: [rt] RT listening for mailbox commands...
33,142,907 UART: [rt]cmd =0x54514754, len=24
33,145,489 >>> mbox cmd response data (8 bytes)
33,146,454 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,176,429 UART: [rt]cmd =0x44504543, len=36
33,214,535 >>> mbox cmd response data (24 bytes)
33,215,168 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,244,902 UART: [rt]cmd =0x47544744, len=8
33,247,040 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,412 UART:
192,764 UART: Running Caliptra ROM ...
193,979 UART:
603,690 UART: [state] CFI Enabled
618,771 UART: [state] LifecycleState = Unprovisioned
620,709 UART: [state] DebugLocked = No
622,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,744 UART: [kat] SHA2-256
796,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,027 UART: [kat] ++
807,589 UART: [kat] sha1
819,599 UART: [kat] SHA2-256
822,255 UART: [kat] SHA2-384
828,172 UART: [kat] SHA2-512-ACC
830,541 UART: [kat] ECC-384
3,114,879 UART: [kat] HMAC-384Kdf
3,127,258 UART: [kat] LMS
4,317,307 UART: [kat] --
4,322,835 UART: [cold-reset] ++
4,325,272 UART: [fht] Storing FHT @ 0x50003400
4,336,609 UART: [idev] ++
4,337,251 UART: [idev] CDI.KEYID = 6
4,338,163 UART: [idev] SUBJECT.KEYID = 7
4,339,407 UART: [idev] UDS.KEYID = 0
4,340,441 ready_for_fw is high
4,340,642 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,843 UART: [idev] Erasing UDS.KEYID = 0
7,623,535 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,599 UART: [idev] --
7,650,285 UART: [ldev] ++
7,650,857 UART: [ldev] CDI.KEYID = 6
7,651,874 UART: [ldev] SUBJECT.KEYID = 5
7,653,033 UART: [ldev] AUTHORITY.KEYID = 7
7,654,319 UART: [ldev] FE.KEYID = 1
7,665,525 UART: [ldev] Erasing FE.KEYID = 1
10,952,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,568 UART: [ldev] --
13,313,970 UART: [fwproc] Waiting for Commands...
13,316,329 UART: [fwproc] Received command 0x46574c44
13,318,506 UART: [fwproc] Received Image of size 114036 bytes
17,370,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,036 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,834,767 >>> mbox cmd response: success
17,835,296 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,838,524 UART: [afmc] ++
17,839,126 UART: [afmc] CDI.KEYID = 6
17,840,006 UART: [afmc] SUBJECT.KEYID = 7
17,841,283 UART: [afmc] AUTHORITY.KEYID = 5
21,156,830 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,183 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,487 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,849 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,668 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,099 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,093 UART: [afmc] --
23,523,505 UART: [cold-reset] --
23,529,588 UART: [state] Locking Datavault
23,535,320 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,070 UART: [state] Locking ICCM
23,539,328 UART: [exit] Launching FMC @ 0x40000130
23,547,718 UART:
23,547,977 UART: Running Caliptra FMC ...
23,549,075 UART:
23,549,234 UART: [state] CFI Enabled
23,557,228 UART: [fht] FMC Alias Private Key: 7
25,887,773 UART: [art] Extend RT PCRs Done
25,888,995 UART: [art] Lock RT PCRs Done
25,890,402 UART: [art] Populate DV Done
25,895,712 UART: [fht] FMC Alias Private Key: 7
25,897,414 UART: [art] Derive CDI
25,898,234 UART: [art] Store in in slot 0x4
25,941,054 UART: [art] Derive Key Pair
25,942,090 UART: [art] Store priv key in slot 0x5
29,184,208 UART: [art] Derive Key Pair - Done
29,197,371 UART: [art] Signing Cert with AUTHO
29,198,701 UART: RITY.KEYID = 7
31,478,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,885 UART: [art] PUB.X = 35E8A4B26AF87467B2073DDB251023F10728F072CE2DD2B6BA4A7701E077D39C0FB8253758A57111EB340F5CB923BCBF
31,487,101 UART: [art] PUB.Y = A55B33F999F0946878EBDBF9F7552158B24BB81DEFBE9C4C7BA93A2555A9487F7D441157D47E77E98B4F4FAFA86EC540
31,494,359 UART: [art] SIG.R = 2B4BED739DB6E10D7D13ABDC8CA0E932C904727BD6856DDCC855A84D4EC4C495B2E35C2BB011336D3E5E2AA558EE6B60
31,501,746 UART: [art] SIG.S = 4E3669D19CB929DC687BCBCB090B1A6C39DC2626AB7CB712181DC183D321B19E1C884FD4BEA8594C777E748C90764837
32,807,024 UART: Caliptra RT
32,807,725 UART: [state] CFI Enabled
32,925,269 UART: [rt] RT listening for mailbox commands...
32,956,772 UART: [rt]cmd =0x54514754, len=24
32,959,114 >>> mbox cmd response data (8 bytes)
32,959,909 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
32,989,948 UART: [rt]cmd =0x44504543, len=36
33,028,080 >>> mbox cmd response data (24 bytes)
33,028,720 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,058,715 UART: [rt]cmd =0x47544744, len=8
33,060,609 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,127,118 ready_for_fw is high
4,127,531 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,073,056 >>> mbox cmd response: success
18,073,723 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,716,453 UART:
23,716,829 UART: Running Caliptra FMC ...
23,717,935 UART:
23,718,088 UART: [state] CFI Enabled
23,726,178 UART: [fht] FMC Alias Private Key: 7
26,056,918 UART: [art] Extend RT PCRs Done
26,058,150 UART: [art] Lock RT PCRs Done
26,060,079 UART: [art] Populate DV Done
26,065,670 UART: [fht] FMC Alias Private Key: 7
26,067,378 UART: [art] Derive CDI
26,068,137 UART: [art] Store in in slot 0x4
26,110,850 UART: [art] Derive Key Pair
26,111,851 UART: [art] Store priv key in slot 0x5
29,354,591 UART: [art] Derive Key Pair - Done
29,367,963 UART: [art] Signing Cert with AUTHO
29,369,267 UART: RITY.KEYID = 7
31,649,071 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,579 UART: [art] PUB.X = 0ADF1C49EF69B5A93163598D6F8E7F07223B25AC58F4A77E5A6B6D82076E62482DA92927A1C4F3D59C2FC61D52CA005E
31,657,792 UART: [art] PUB.Y = 39573202A798E5A74B50F2585235034FB46EF1518E52EB27BD7C411B466CE30F75B22039755FBAAA3A802822EF3A6A8A
31,665,056 UART: [art] SIG.R = 5CBB2F71929F5B021AB411CF77FE26CE9D2AB5823A978F42FDD38D2CE55C19E6ED710D1C0FB440D1D7211C9765506042
31,672,476 UART: [art] SIG.S = 8EB1ACD2EB1D09D7EFB2106D103A608F1BFA693B586977B5DEE8455BADF7BBE259AEE09E9D6C9DD1DAD5A9D47C382856
32,977,022 UART: Caliptra RT
32,977,725 UART: [state] CFI Enabled
33,094,810 UART: [rt] RT listening for mailbox commands...
33,125,744 UART: [rt]cmd =0x54514754, len=24
33,128,495 >>> mbox cmd response data (8 bytes)
33,129,346 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,159,427 UART: [rt]cmd =0x44504543, len=36
33,196,716 >>> mbox cmd response data (24 bytes)
33,197,401 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,227,342 UART: [rt]cmd =0x47544744, len=8
33,229,347 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,649 writing to cptra_bootfsm_go
192,805 UART:
193,163 UART: Running Caliptra ROM ...
194,352 UART:
194,507 UART: [state] CFI Enabled
266,545 UART: [state] LifecycleState = Unprovisioned
268,471 UART: [state] DebugLocked = No
270,720 UART: [state] WD Timer not started. Device not locked for debugging
274,969 UART: [kat] SHA2-256
454,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,658 UART: [kat] ++
466,188 UART: [kat] sha1
476,476 UART: [kat] SHA2-256
479,503 UART: [kat] SHA2-384
485,446 UART: [kat] SHA2-512-ACC
488,393 UART: [kat] ECC-384
2,949,047 UART: [kat] HMAC-384Kdf
2,972,007 UART: [kat] LMS
3,501,490 UART: [kat] --
3,507,440 UART: [cold-reset] ++
3,508,343 UART: [fht] FHT @ 0x50003400
3,519,757 UART: [idev] ++
3,520,325 UART: [idev] CDI.KEYID = 6
3,521,237 UART: [idev] SUBJECT.KEYID = 7
3,522,414 UART: [idev] UDS.KEYID = 0
3,523,463 ready_for_fw is high
3,523,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,464 UART: [idev] Erasing UDS.KEYID = 0
6,029,411 UART: [idev] Sha1 KeyId Algorithm
6,051,338 UART: [idev] --
6,054,006 UART: [ldev] ++
6,054,587 UART: [ldev] CDI.KEYID = 6
6,055,670 UART: [ldev] SUBJECT.KEYID = 5
6,056,781 UART: [ldev] AUTHORITY.KEYID = 7
6,057,961 UART: [ldev] FE.KEYID = 1
6,099,997 UART: [ldev] Erasing FE.KEYID = 1
8,605,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,743 UART: [ldev] --
10,415,171 UART: [fwproc] Wait for Commands...
10,417,696 UART: [fwproc] Recv command 0x46574c44
10,419,785 UART: [fwproc] Recv'd Img size: 114360 bytes
13,819,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,271,709 >>> mbox cmd response: success
14,272,255 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,276,787 UART: [afmc] ++
14,277,377 UART: [afmc] CDI.KEYID = 6
14,278,266 UART: [afmc] SUBJECT.KEYID = 7
14,279,481 UART: [afmc] AUTHORITY.KEYID = 5
16,805,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,434 UART: [afmc] --
18,608,998 UART: [cold-reset] --
18,613,371 UART: [state] Locking Datavault
18,619,807 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,504 UART: [state] Locking ICCM
18,623,844 UART: [exit] Launching FMC @ 0x40000130
18,632,220 UART:
18,632,498 UART: Running Caliptra FMC ...
18,633,616 UART:
18,633,784 UART: [state] CFI Enabled
18,688,770 UART: [fht] FMC Alias Private Key: 7
20,452,443 UART: [art] Extend RT PCRs Done
20,453,986 UART: [art] Lock RT PCRs Done
20,455,273 UART: [art] Populate DV Done
20,460,758 UART: [fht] FMC Alias Private Key: 7
20,462,400 UART: [art] Derive CDI
20,463,135 UART: [art] Store in in slot 0x4
20,521,673 UART: [art] Derive Key Pair
20,522,746 UART: [art] Store priv key in slot 0x5
22,985,656 UART: [art] Derive Key Pair - Done
22,998,609 UART: [art] Signing Cert with AUTHO
22,999,923 UART: RITY.KEYID = 7
24,711,025 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,537 UART: [art] PUB.X = 0D620C4EB5300B689595E2837BB285AAA80E85FF2C40BC5FF47C93DFA8D539CD84B2F0D56C7C4271BD9033FBFC6C3AA7
24,719,831 UART: [art] PUB.Y = 84CCD85273E0552B07E7A1630C0DA17487531A6A533F55BB79E952F5F75686D420DB56DD0CD8809EC3F838E4278B7561
24,727,109 UART: [art] SIG.R = 63C7EE86C0ED2FAC8AB08BFE295030B8F0896E73D7B0FA777E0F64EA573C4324BBC6CB78B667A6714EE2D3AB9E86B414
24,734,501 UART: [art] SIG.S = 5EC161CC7B64086EA2DC7539D7DE62F845C6447B71939D2115DB917D8130B8A11B02EF3BDA6AE604011D66040F651289
25,713,315 UART: Caliptra RT
25,714,037 UART: [state] CFI Enabled
25,880,061 UART: [rt] RT listening for mailbox commands...
25,911,188 UART: [rt]cmd =0x54514754, len=24
25,913,888 >>> mbox cmd response data (8 bytes)
25,915,100 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,945,213 UART: [rt]cmd =0x44504543, len=36
25,982,928 >>> mbox cmd response data (24 bytes)
25,983,539 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,013,496 UART: [rt]cmd =0x47544744, len=8
26,015,319 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,445 UART:
192,818 UART: Running Caliptra ROM ...
193,952 UART:
194,105 UART: [state] CFI Enabled
261,539 UART: [state] LifecycleState = Unprovisioned
264,067 UART: [state] DebugLocked = No
265,538 UART: [state] WD Timer not started. Device not locked for debugging
269,317 UART: [kat] SHA2-256
459,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,952 UART: [kat] ++
470,402 UART: [kat] sha1
481,557 UART: [kat] SHA2-256
484,581 UART: [kat] SHA2-384
491,140 UART: [kat] SHA2-512-ACC
493,724 UART: [kat] ECC-384
2,947,509 UART: [kat] HMAC-384Kdf
2,970,766 UART: [kat] LMS
3,502,599 UART: [kat] --
3,505,739 UART: [cold-reset] ++
3,507,887 UART: [fht] FHT @ 0x50003400
3,519,932 UART: [idev] ++
3,520,641 UART: [idev] CDI.KEYID = 6
3,521,522 UART: [idev] SUBJECT.KEYID = 7
3,522,782 UART: [idev] UDS.KEYID = 0
3,523,711 ready_for_fw is high
3,523,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,269 UART: [idev] Erasing UDS.KEYID = 0
6,028,077 UART: [idev] Sha1 KeyId Algorithm
6,050,695 UART: [idev] --
6,056,292 UART: [ldev] ++
6,056,982 UART: [ldev] CDI.KEYID = 6
6,057,905 UART: [ldev] SUBJECT.KEYID = 5
6,059,072 UART: [ldev] AUTHORITY.KEYID = 7
6,060,250 UART: [ldev] FE.KEYID = 1
6,100,497 UART: [ldev] Erasing FE.KEYID = 1
8,602,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,865 UART: [ldev] --
10,414,178 UART: [fwproc] Wait for Commands...
10,417,027 UART: [fwproc] Recv command 0x46574c44
10,419,337 UART: [fwproc] Recv'd Img size: 114360 bytes
13,864,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,593,830 >>> mbox cmd response: success
14,594,367 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,597,819 UART: [afmc] ++
14,598,520 UART: [afmc] CDI.KEYID = 6
14,599,708 UART: [afmc] SUBJECT.KEYID = 7
14,601,140 UART: [afmc] AUTHORITY.KEYID = 5
17,127,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,472 UART: [afmc] --
18,929,828 UART: [cold-reset] --
18,934,975 UART: [state] Locking Datavault
18,940,133 UART: [state] Locking PCR0, PCR1 and PCR31
18,942,276 UART: [state] Locking ICCM
18,944,476 UART: [exit] Launching FMC @ 0x40000130
18,953,152 UART:
18,953,385 UART: Running Caliptra FMC ...
18,954,485 UART:
18,954,648 UART: [state] CFI Enabled
19,010,903 UART: [fht] FMC Alias Private Key: 7
20,774,684 UART: [art] Extend RT PCRs Done
20,775,923 UART: [art] Lock RT PCRs Done
20,777,495 UART: [art] Populate DV Done
20,783,017 UART: [fht] FMC Alias Private Key: 7
20,784,512 UART: [art] Derive CDI
20,785,273 UART: [art] Store in in slot 0x4
20,843,684 UART: [art] Derive Key Pair
20,844,682 UART: [art] Store priv key in slot 0x5
23,307,171 UART: [art] Derive Key Pair - Done
23,319,903 UART: [art] Signing Cert with AUTHO
23,321,214 UART: RITY.KEYID = 7
25,033,327 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,838 UART: [art] PUB.X = 4B24AF1C68FA5B4E35F4EDCA09F046981EDC14D41D1D0A096282341FF0A6A4289BE399569ECAE01E93679D1762CCA860
25,042,139 UART: [art] PUB.Y = E959E02CDD5E9EC1EB8124BB5BBC56EE9FAF6AEAFE53CF5373B6FA5185B309B47B2429D75B045E523B1E8E150BFCA536
25,049,419 UART: [art] SIG.R = 98E817C52B180B7AB2DFDF2D8E8C25D9F7F88AAD8930F06C091DBD33A904E0E18C65A9207A7707130409C67E41867A13
25,056,801 UART: [art] SIG.S = D7E3DB767021894B7A51C242FB7F429396D6950B8736E4E6F67B060C1B4303DD8650023BB85AA993E0B4084DB5F1DCDD
26,035,302 UART: Caliptra RT
26,036,013 UART: [state] CFI Enabled
26,201,603 UART: [rt] RT listening for mailbox commands...
26,232,874 UART: [rt]cmd =0x54514754, len=24
26,235,442 >>> mbox cmd response data (8 bytes)
26,236,157 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,266,192 UART: [rt]cmd =0x44504543, len=36
26,303,257 >>> mbox cmd response data (24 bytes)
26,303,945 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,333,556 UART: [rt]cmd =0x47544744, len=8
26,335,442 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,438,211 ready_for_fw is high
3,438,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,713,434 >>> mbox cmd response: success
14,714,038 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,003,181 UART:
19,003,610 UART: Running Caliptra FMC ...
19,004,735 UART:
19,004,914 UART: [state] CFI Enabled
19,072,074 UART: [fht] FMC Alias Private Key: 7
20,836,189 UART: [art] Extend RT PCRs Done
20,837,418 UART: [art] Lock RT PCRs Done
20,839,261 UART: [art] Populate DV Done
20,844,781 UART: [fht] FMC Alias Private Key: 7
20,846,429 UART: [art] Derive CDI
20,847,246 UART: [art] Store in in slot 0x4
20,904,755 UART: [art] Derive Key Pair
20,905,791 UART: [art] Store priv key in slot 0x5
23,369,258 UART: [art] Derive Key Pair - Done
23,382,416 UART: [art] Signing Cert with AUTHO
23,383,720 UART: RITY.KEYID = 7
25,094,776 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,297 UART: [art] PUB.X = E7B2523A2ADF1AE95DE63137E6173693517D794FE655230365399578795A81B576C5F7AF9ADAE6CFF6EF3D14DD1258FD
25,103,567 UART: [art] PUB.Y = 27D21D2F6AD43554B7535AD3966984BBCCD7811A2ECDE6C01E0B19CD0764153726687F5221C5EF4ACD630E5BF24E7860
25,110,843 UART: [art] SIG.R = 71909E7075835FE8204F2965D5E122FDE992AD615ACC425A29735BD23B43FB8422DE93B183C7FE8E1514D376529B43BA
25,118,184 UART: [art] SIG.S = 1EDE6E400885CF5BF44578BE5B3B95F8CD2C204540B0F4CAB3F0701C2D8627EBB580AFB47EC49A7721F601CC964963C6
26,097,835 UART: Caliptra RT
26,098,545 UART: [state] CFI Enabled
26,262,826 UART: [rt] RT listening for mailbox commands...
26,294,137 UART: [rt]cmd =0x54514754, len=24
26,296,835 >>> mbox cmd response data (8 bytes)
26,297,842 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,327,772 UART: [rt]cmd =0x44504543, len=36
26,365,015 >>> mbox cmd response data (24 bytes)
26,365,688 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,395,417 UART: [rt]cmd =0x47544744, len=8
26,397,451 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,449 UART:
192,809 UART: Running Caliptra ROM ...
193,931 UART:
603,761 UART: [state] CFI Enabled
618,217 UART: [state] LifecycleState = Unprovisioned
620,618 UART: [state] DebugLocked = No
623,345 UART: [state] WD Timer not started. Device not locked for debugging
627,371 UART: [kat] SHA2-256
817,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,058 UART: [kat] ++
828,505 UART: [kat] sha1
838,737 UART: [kat] SHA2-256
841,744 UART: [kat] SHA2-384
848,626 UART: [kat] SHA2-512-ACC
851,175 UART: [kat] ECC-384
3,291,891 UART: [kat] HMAC-384Kdf
3,305,472 UART: [kat] LMS
3,837,324 UART: [kat] --
3,840,558 UART: [cold-reset] ++
3,842,132 UART: [fht] FHT @ 0x50003400
3,852,962 UART: [idev] ++
3,853,670 UART: [idev] CDI.KEYID = 6
3,854,549 UART: [idev] SUBJECT.KEYID = 7
3,855,791 UART: [idev] UDS.KEYID = 0
3,856,876 ready_for_fw is high
3,857,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,813 UART: [idev] Erasing UDS.KEYID = 0
6,335,519 UART: [idev] Sha1 KeyId Algorithm
6,357,940 UART: [idev] --
6,362,706 UART: [ldev] ++
6,363,388 UART: [ldev] CDI.KEYID = 6
6,364,269 UART: [ldev] SUBJECT.KEYID = 5
6,365,622 UART: [ldev] AUTHORITY.KEYID = 7
6,366,810 UART: [ldev] FE.KEYID = 1
6,377,298 UART: [ldev] Erasing FE.KEYID = 1
8,854,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,868 UART: [ldev] --
10,645,398 UART: [fwproc] Wait for Commands...
10,647,549 UART: [fwproc] Recv command 0x46574c44
10,649,801 UART: [fwproc] Recv'd Img size: 114360 bytes
14,099,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,840,712 >>> mbox cmd response: success
14,841,261 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,844,337 UART: [afmc] ++
14,845,031 UART: [afmc] CDI.KEYID = 6
14,846,254 UART: [afmc] SUBJECT.KEYID = 7
14,847,699 UART: [afmc] AUTHORITY.KEYID = 5
17,351,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,899 UART: [afmc] --
19,146,605 UART: [cold-reset] --
19,151,350 UART: [state] Locking Datavault
19,156,000 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,134 UART: [state] Locking ICCM
19,159,524 UART: [exit] Launching FMC @ 0x40000130
19,168,171 UART:
19,168,439 UART: Running Caliptra FMC ...
19,169,548 UART:
19,169,703 UART: [state] CFI Enabled
19,178,209 UART: [fht] FMC Alias Private Key: 7
20,935,206 UART: [art] Extend RT PCRs Done
20,936,422 UART: [art] Lock RT PCRs Done
20,938,178 UART: [art] Populate DV Done
20,943,694 UART: [fht] FMC Alias Private Key: 7
20,945,294 UART: [art] Derive CDI
20,946,106 UART: [art] Store in in slot 0x4
20,988,480 UART: [art] Derive Key Pair
20,989,497 UART: [art] Store priv key in slot 0x5
23,416,933 UART: [art] Derive Key Pair - Done
23,430,189 UART: [art] Signing Cert with AUTHO
23,431,482 UART: RITY.KEYID = 7
25,137,170 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,680 UART: [art] PUB.X = 2A8B6D7EE7F68D55FC9205A146E37CE919D8B1AF7D9D67707C9E0CB44CF4489F0F66C3C2A525F7FA11EA521D9A0D5862
25,145,931 UART: [art] PUB.Y = E99F76407BC4EB6AB0B70B490B1C6A320744154BD68E5A6772F04861ADD7E23F47D30E89CA60660F1E213CCC6904686B
25,153,220 UART: [art] SIG.R = C7F521472CFD22E1A1854A4B7433517C196AD1583EA683F1799481CE7AC2C96EDD423D6F43B2568AB6121CA5CE39C393
25,160,621 UART: [art] SIG.S = E067FA4D7ECAF915A6274AAB3353ECC4A9779F2A889E4B65B5F5215F565BCFEE05CDAC394330F1955D26F4B974515F9E
26,140,036 UART: Caliptra RT
26,140,725 UART: [state] CFI Enabled
26,258,003 UART: [rt] RT listening for mailbox commands...
26,289,061 UART: [rt]cmd =0x54514754, len=24
26,291,736 >>> mbox cmd response data (8 bytes)
26,292,426 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,322,369 UART: [rt]cmd =0x44504543, len=36
26,359,395 >>> mbox cmd response data (24 bytes)
26,360,034 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,389,936 UART: [rt]cmd =0x47544744, len=8
26,391,918 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,756,366 ready_for_fw is high
3,756,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,967,366 >>> mbox cmd response: success
14,967,959 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,216,076 UART:
19,216,472 UART: Running Caliptra FMC ...
19,217,657 UART:
19,217,825 UART: [state] CFI Enabled
19,225,544 UART: [fht] FMC Alias Private Key: 7
20,982,559 UART: [art] Extend RT PCRs Done
20,983,773 UART: [art] Lock RT PCRs Done
20,985,074 UART: [art] Populate DV Done
20,990,272 UART: [fht] FMC Alias Private Key: 7
20,991,984 UART: [art] Derive CDI
20,992,814 UART: [art] Store in in slot 0x4
21,035,524 UART: [art] Derive Key Pair
21,036,567 UART: [art] Store priv key in slot 0x5
23,463,148 UART: [art] Derive Key Pair - Done
23,476,252 UART: [art] Signing Cert with AUTHO
23,477,551 UART: RITY.KEYID = 7
25,182,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,224 UART: [art] PUB.X = C93B8D76477BAE3BF538D006FDF3799B03ACF04F0594E648C4B7A91C66C75BE7CF687FA155FD1E45AFE412ED77325776
25,191,469 UART: [art] PUB.Y = 1CD414B25693DE5BA87B123D84752B2C8AFAED234193ADB54DCA8891C459CBAC230C0DFBFECBF7B447AB3A5F1A2CA51F
25,198,768 UART: [art] SIG.R = 97353F6616526E9F626FE8704057CC01C4C23ACAA2FB61D5169BA232D820341786D3124288D7B3D28AE4DE3C85223101
25,206,164 UART: [art] SIG.S = 3974F898D26AA9442011855ACD7A20FE1E1D8825D964D4488A6E8A3C429A47819641A047D1E0D885A02B013BFFF1E049
26,185,265 UART: Caliptra RT
26,185,972 UART: [state] CFI Enabled
26,302,677 UART: [rt] RT listening for mailbox commands...
26,333,823 UART: [rt]cmd =0x54514754, len=24
26,336,513 >>> mbox cmd response data (8 bytes)
26,337,400 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,367,403 UART: [rt]cmd =0x44504543, len=36
26,405,311 >>> mbox cmd response data (24 bytes)
26,405,973 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,435,802 UART: [rt]cmd =0x47544744, len=8
26,437,902 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
902,990 UART: [kat] HMAC-384Kdf
907,716 UART: [kat] LMS
1,475,912 UART: [kat] --
1,476,961 UART: [cold-reset] ++
1,477,437 UART: [fht] Storing FHT @ 0x50003400
1,480,408 UART: [idev] ++
1,480,576 UART: [idev] CDI.KEYID = 6
1,480,936 UART: [idev] SUBJECT.KEYID = 7
1,481,360 UART: [idev] UDS.KEYID = 0
1,481,705 ready_for_fw is high
1,481,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,470 UART: [idev] Erasing UDS.KEYID = 0
1,506,014 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,782 UART: [idev] --
1,515,657 UART: [ldev] ++
1,515,825 UART: [ldev] CDI.KEYID = 6
1,516,188 UART: [ldev] SUBJECT.KEYID = 5
1,516,614 UART: [ldev] AUTHORITY.KEYID = 7
1,517,077 UART: [ldev] FE.KEYID = 1
1,522,029 UART: [ldev] Erasing FE.KEYID = 1
1,547,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,874 UART: [ldev] --
1,586,329 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 114360 bytes
2,886,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,549 >>> mbox cmd response: success
3,078,549 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,647 UART: [afmc] ++
3,079,815 UART: [afmc] CDI.KEYID = 6
3,080,177 UART: [afmc] SUBJECT.KEYID = 7
3,080,602 UART: [afmc] AUTHORITY.KEYID = 5
3,116,099 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,612 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,302 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,077 UART: [afmc] --
3,159,095 UART: [cold-reset] --
3,159,891 UART: [state] Locking Datavault
3,161,342 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,946 UART: [state] Locking ICCM
3,162,382 UART: [exit] Launching FMC @ 0x40000130
3,167,711 UART:
3,167,727 UART: Running Caliptra FMC ...
3,168,135 UART:
3,168,189 UART: [state] CFI Enabled
3,178,540 UART: [fht] FMC Alias Private Key: 7
3,286,709 UART: [art] Extend RT PCRs Done
3,287,137 UART: [art] Lock RT PCRs Done
3,288,747 UART: [art] Populate DV Done
3,296,980 UART: [fht] FMC Alias Private Key: 7
3,297,946 UART: [art] Derive CDI
3,298,226 UART: [art] Store in in slot 0x4
3,383,919 UART: [art] Derive Key Pair
3,384,279 UART: [art] Store priv key in slot 0x5
3,397,473 UART: [art] Derive Key Pair - Done
3,412,236 UART: [art] Signing Cert with AUTHO
3,412,716 UART: RITY.KEYID = 7
3,428,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,899 UART: [art] PUB.X = 931DF0844839D3CC7F5BF86B006FDBCB8F9A49D7E163081499BECBBB3AD74120698B95F5AEBDF334533EC9E670612CE6
3,435,658 UART: [art] PUB.Y = 827BFD7E707BC764E2E627CD21E6A376BB2D552C3B8166B3ED40605C4899C148763E5693A39BB04E6AF3BBE74D8204ED
3,442,613 UART: [art] SIG.R = DC5BA04AED59F683EB1A0941F461620AA7E53258DC1D61FA98F38910427FC5CE673F1566E8688A5F9511B31ED3FBECCF
3,449,391 UART: [art] SIG.S = 277F0A4B7B76BF2DD74719F26A10DB1C8ED3FEDED518ACF979C79C91FACBCFA0914570E6425588ED981EEE75B0C16042
3,473,527 UART: Caliptra RT
3,473,781 UART: [state] CFI Enabled
3,582,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,400 UART: [rt]cmd =0x54514754, len=24
3,614,557 >>> mbox cmd response data (8 bytes)
3,614,558 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,885 UART: [rt]cmd =0x44504543, len=36
3,681,862 >>> mbox cmd response data (24 bytes)
3,681,863 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,284 UART: [rt]cmd =0x47544744, len=8
3,712,941 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,261 ready_for_fw is high
1,362,261 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,669 >>> mbox cmd response: success
2,927,669 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,717 UART:
2,989,733 UART: Running Caliptra FMC ...
2,990,141 UART:
2,990,195 UART: [state] CFI Enabled
3,000,650 UART: [fht] FMC Alias Private Key: 7
3,108,367 UART: [art] Extend RT PCRs Done
3,108,795 UART: [art] Lock RT PCRs Done
3,110,449 UART: [art] Populate DV Done
3,118,886 UART: [fht] FMC Alias Private Key: 7
3,119,938 UART: [art] Derive CDI
3,120,218 UART: [art] Store in in slot 0x4
3,205,743 UART: [art] Derive Key Pair
3,206,103 UART: [art] Store priv key in slot 0x5
3,219,159 UART: [art] Derive Key Pair - Done
3,233,567 UART: [art] Signing Cert with AUTHO
3,234,047 UART: RITY.KEYID = 7
3,249,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,954 UART: [art] PUB.X = 947384886E65D6A8436C3CF21CDCBF792FB1559B0170B56CECC4FE131D74F2DB859D3671A78A1B8E0297E74BB96B6F4B
3,256,728 UART: [art] PUB.Y = EA6E280B3B0DD36C2E00779B5873716765A97EEA4D3C69A50801A59C05CC04AA6552CB81C417D951CC2227B67510111D
3,263,638 UART: [art] SIG.R = C9BEE166A31894D533C3988AC2E1D2EF4EBB854865C1F39805C350725C5B926E7B23086D2F1C8A43A541E3AEDC54D4FA
3,270,412 UART: [art] SIG.S = 8B48810FA6A99E72086DD8E7ADAF7E5F53FA5756B7E84313B56B43558F73DC0FFBEE64307306E925CA3A7FE546E44F79
3,293,309 UART: Caliptra RT
3,293,563 UART: [state] CFI Enabled
3,402,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,653 UART: [rt]cmd =0x54514754, len=24
3,434,648 >>> mbox cmd response data (8 bytes)
3,434,649 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,170 UART: [rt]cmd =0x44504543, len=36
3,501,865 >>> mbox cmd response data (24 bytes)
3,501,866 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,325 UART: [rt]cmd =0x47544744, len=8
3,532,840 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,942 UART: [kat] SHA2-256
881,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,988 UART: [kat] ++
886,140 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,771 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,420 UART: [cold-reset] ++
1,476,968 UART: [fht] Storing FHT @ 0x50003400
1,479,923 UART: [idev] ++
1,480,091 UART: [idev] CDI.KEYID = 6
1,480,451 UART: [idev] SUBJECT.KEYID = 7
1,480,875 UART: [idev] UDS.KEYID = 0
1,481,220 ready_for_fw is high
1,481,220 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,937 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,647 UART: [idev] --
1,514,862 UART: [ldev] ++
1,515,030 UART: [ldev] CDI.KEYID = 6
1,515,393 UART: [ldev] SUBJECT.KEYID = 5
1,515,819 UART: [ldev] AUTHORITY.KEYID = 7
1,516,282 UART: [ldev] FE.KEYID = 1
1,521,452 UART: [ldev] Erasing FE.KEYID = 1
1,547,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,959 UART: [ldev] --
1,586,358 UART: [fwproc] Waiting for Commands...
1,587,117 UART: [fwproc] Received command 0x46574c44
1,587,908 UART: [fwproc] Received Image of size 114360 bytes
2,886,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,412 >>> mbox cmd response: success
3,078,412 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,556 UART: [afmc] ++
3,079,724 UART: [afmc] CDI.KEYID = 6
3,080,086 UART: [afmc] SUBJECT.KEYID = 7
3,080,511 UART: [afmc] AUTHORITY.KEYID = 5
3,115,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,223 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,913 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,034 UART: [afmc] --
3,159,108 UART: [cold-reset] --
3,160,042 UART: [state] Locking Datavault
3,161,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,959 UART: [state] Locking ICCM
3,162,593 UART: [exit] Launching FMC @ 0x40000130
3,167,922 UART:
3,167,938 UART: Running Caliptra FMC ...
3,168,346 UART:
3,168,489 UART: [state] CFI Enabled
3,179,204 UART: [fht] FMC Alias Private Key: 7
3,287,535 UART: [art] Extend RT PCRs Done
3,287,963 UART: [art] Lock RT PCRs Done
3,289,571 UART: [art] Populate DV Done
3,297,850 UART: [fht] FMC Alias Private Key: 7
3,299,004 UART: [art] Derive CDI
3,299,284 UART: [art] Store in in slot 0x4
3,384,965 UART: [art] Derive Key Pair
3,385,325 UART: [art] Store priv key in slot 0x5
3,398,777 UART: [art] Derive Key Pair - Done
3,413,136 UART: [art] Signing Cert with AUTHO
3,413,616 UART: RITY.KEYID = 7
3,429,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,807 UART: [art] PUB.X = 48883DC6B43523BA11D346B38CB9D471CDA1E863E3BB1BB4F256C867BD8463E852CC76DA8EDC6B28E2249745FF04C7D2
3,436,586 UART: [art] PUB.Y = BA4204AB4E54C0AC42E4DDA0D9DE0781E87FB1F4E24CCAFCEB42DFBA6B1C2567ED419EB847242A315B8776630A1A1C0F
3,443,548 UART: [art] SIG.R = 8A393874B7894CEC2C211D6A3C0DF6832912CFADB499B6EFC2CE7CF4A85BFCA8C4840D919B1FAB2723B93DF89F31076C
3,450,327 UART: [art] SIG.S = 6B50B5E21A075A102B9CF02A59F372CF34503690C3B5351A6430D7C37C54FED3B330BB592FE0C91BF6E4F79BB1CD175F
3,473,849 UART: Caliptra RT
3,474,195 UART: [state] CFI Enabled
3,582,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,046 UART: [rt]cmd =0x54514754, len=24
3,615,131 >>> mbox cmd response data (8 bytes)
3,615,132 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,773 UART: [rt]cmd =0x44504543, len=36
3,682,128 >>> mbox cmd response data (24 bytes)
3,682,129 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,472 UART: [rt]cmd =0x47544744, len=8
3,712,979 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,212 ready_for_fw is high
1,363,212 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,340 >>> mbox cmd response: success
2,929,340 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,372 UART:
2,991,388 UART: Running Caliptra FMC ...
2,991,796 UART:
2,991,939 UART: [state] CFI Enabled
3,002,566 UART: [fht] FMC Alias Private Key: 7
3,110,671 UART: [art] Extend RT PCRs Done
3,111,099 UART: [art] Lock RT PCRs Done
3,112,623 UART: [art] Populate DV Done
3,120,900 UART: [fht] FMC Alias Private Key: 7
3,121,872 UART: [art] Derive CDI
3,122,152 UART: [art] Store in in slot 0x4
3,207,815 UART: [art] Derive Key Pair
3,208,175 UART: [art] Store priv key in slot 0x5
3,221,529 UART: [art] Derive Key Pair - Done
3,236,429 UART: [art] Signing Cert with AUTHO
3,236,909 UART: RITY.KEYID = 7
3,252,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,206 UART: [art] PUB.X = 4C123B1D1D7F2690400CC6920419BDA612DFC8C3ED6F70A6A238ED5E4889113636EBFFD2791563A14FD6550507E758AC
3,259,968 UART: [art] PUB.Y = BB94AF4469AE8D47F5F0DBBB9B38121140B8A8E8B7A1BDCBC4778B562E29ECE24BA6C4925FCA9A508E7FDC25378AAB5E
3,266,944 UART: [art] SIG.R = 17E972F34106F7CCD8B6D8778E9FA14C2633B40B8CF1BD76EE0560F065BED3D44AA8E4081E93DAC2F277143423A4BEE0
3,273,714 UART: [art] SIG.S = 3F6E7D7DE949A4BACB1DFB30E42381DFB28A1292AA6563F8E41DB1F004CFEF05EA64A54CD91124D64538594CB398D747
3,297,885 UART: Caliptra RT
3,298,231 UART: [state] CFI Enabled
3,406,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,609 UART: [rt]cmd =0x54514754, len=24
3,438,700 >>> mbox cmd response data (8 bytes)
3,438,701 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,356 UART: [rt]cmd =0x44504543, len=36
3,507,295 >>> mbox cmd response data (24 bytes)
3,507,296 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,953 UART: [rt]cmd =0x47544744, len=8
3,538,546 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
892,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,925 UART: [kat] ++
897,077 UART: [kat] sha1
901,369 UART: [kat] SHA2-256
903,309 UART: [kat] SHA2-384
906,038 UART: [kat] SHA2-512-ACC
907,939 UART: [kat] ECC-384
917,702 UART: [kat] HMAC-384Kdf
922,210 UART: [kat] LMS
1,170,538 UART: [kat] --
1,171,399 UART: [cold-reset] ++
1,171,791 UART: [fht] FHT @ 0x50003400
1,174,550 UART: [idev] ++
1,174,718 UART: [idev] CDI.KEYID = 6
1,175,078 UART: [idev] SUBJECT.KEYID = 7
1,175,502 UART: [idev] UDS.KEYID = 0
1,175,847 ready_for_fw is high
1,175,847 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,497 UART: [idev] Sha1 KeyId Algorithm
1,208,885 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,360 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,573 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,152 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,604 >>> mbox cmd response: success
2,774,604 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,628 UART: [afmc] ++
2,775,796 UART: [afmc] CDI.KEYID = 6
2,776,158 UART: [afmc] SUBJECT.KEYID = 7
2,776,583 UART: [afmc] AUTHORITY.KEYID = 5
2,812,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,076 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,795 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,463 UART: [afmc] --
2,855,479 UART: [cold-reset] --
2,856,421 UART: [state] Locking Datavault
2,857,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,848 UART: [state] Locking ICCM
2,858,522 UART: [exit] Launching FMC @ 0x40000130
2,863,851 UART:
2,863,867 UART: Running Caliptra FMC ...
2,864,275 UART:
2,864,329 UART: [state] CFI Enabled
2,874,746 UART: [fht] FMC Alias Private Key: 7
2,982,749 UART: [art] Extend RT PCRs Done
2,983,177 UART: [art] Lock RT PCRs Done
2,985,097 UART: [art] Populate DV Done
2,993,528 UART: [fht] FMC Alias Private Key: 7
2,994,700 UART: [art] Derive CDI
2,994,980 UART: [art] Store in in slot 0x4
3,080,607 UART: [art] Derive Key Pair
3,080,967 UART: [art] Store priv key in slot 0x5
3,093,745 UART: [art] Derive Key Pair - Done
3,108,185 UART: [art] Signing Cert with AUTHO
3,108,665 UART: RITY.KEYID = 7
3,123,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,440 UART: [art] PUB.X = 93C48CB4CD2E7927292CD647C996AD0946A0B6CDE136DC5B6529C0A8C2861134B40C7E85FAD939172A88122CCC768486
3,131,206 UART: [art] PUB.Y = 1176E6532EDA2D7FBE12CAD554E41D8DB5AA02242AA0DB557F6426604AD3FB0F4D3AB39BE6DEB19A47C15FC026D6D96B
3,138,172 UART: [art] SIG.R = E0D50F35510E884AC2CAB810E2FCCD09D4D5CDB9E8529AD8EA077B0C254FF90466425D27B1A6CD0F4AA5ED3B12BCE5B0
3,144,945 UART: [art] SIG.S = BE39F157295B654FA5E088A9E9BF308EEC7AF1236AEA8A69990067444451CF796D2A38352789A67294DC1500A6EF145C
3,168,756 UART: Caliptra RT
3,169,010 UART: [state] CFI Enabled
3,276,939 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,178 UART: [rt]cmd =0x54514754, len=24
3,309,265 >>> mbox cmd response data (8 bytes)
3,309,266 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,943 UART: [rt]cmd =0x44504543, len=36
3,376,512 >>> mbox cmd response data (24 bytes)
3,376,513 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,992 UART: [rt]cmd =0x47544744, len=8
3,407,417 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,403 ready_for_fw is high
1,059,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,319 >>> mbox cmd response: success
2,625,319 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,893 UART:
2,686,909 UART: Running Caliptra FMC ...
2,687,317 UART:
2,687,371 UART: [state] CFI Enabled
2,697,996 UART: [fht] FMC Alias Private Key: 7
2,806,229 UART: [art] Extend RT PCRs Done
2,806,657 UART: [art] Lock RT PCRs Done
2,808,483 UART: [art] Populate DV Done
2,816,564 UART: [fht] FMC Alias Private Key: 7
2,817,684 UART: [art] Derive CDI
2,817,964 UART: [art] Store in in slot 0x4
2,903,587 UART: [art] Derive Key Pair
2,903,947 UART: [art] Store priv key in slot 0x5
2,916,701 UART: [art] Derive Key Pair - Done
2,931,457 UART: [art] Signing Cert with AUTHO
2,931,937 UART: RITY.KEYID = 7
2,947,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,836 UART: [art] PUB.X = 07FA788279B6365022B6793E159E58C9DB1F44F87AE9E5D091A8A9E2D6EFBF6719E62E85DD377094D7471A29DD2A36FA
2,954,609 UART: [art] PUB.Y = 699A2FEB2F0161DBA73F1D80EE46D10439BB00DB4AC5D88D749EF15697786C97F1EA7EBFA0B720AE7835383F86C5D530
2,961,543 UART: [art] SIG.R = 508940A2A74EF53EEC1D1F867BFBAC7765406D25BF5C6128F35B32BDCFFC3A36363168C215224182EBAF2E993FB0FE6F
2,968,327 UART: [art] SIG.S = C3E2E12C636EE4AA8276BAC0FE47A461245184E2281BA4C0F26CD1A7CF303E24DD5234F9F0F900EEC871C438D03B31BF
2,992,184 UART: Caliptra RT
2,992,438 UART: [state] CFI Enabled
3,099,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,029 UART: [rt]cmd =0x54514754, len=24
3,132,072 >>> mbox cmd response data (8 bytes)
3,132,073 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,604 UART: [rt]cmd =0x44504543, len=36
3,198,935 >>> mbox cmd response data (24 bytes)
3,198,936 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,409 UART: [rt]cmd =0x47544744, len=8
3,229,886 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,911 UART: [kat] SHA2-512-ACC
908,812 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,383 UART: [kat] LMS
1,171,711 UART: [kat] --
1,172,474 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,437 UART: [idev] ++
1,175,605 UART: [idev] CDI.KEYID = 6
1,175,965 UART: [idev] SUBJECT.KEYID = 7
1,176,389 UART: [idev] UDS.KEYID = 0
1,176,734 ready_for_fw is high
1,176,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,471 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,864 UART: [ldev] ++
1,211,032 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,821 UART: [ldev] AUTHORITY.KEYID = 7
1,212,284 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,488 UART: [ldev] --
1,282,761 UART: [fwproc] Wait for Commands...
1,283,449 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,141 >>> mbox cmd response: success
2,775,141 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,776,325 UART: [afmc] ++
2,776,493 UART: [afmc] CDI.KEYID = 6
2,776,855 UART: [afmc] SUBJECT.KEYID = 7
2,777,280 UART: [afmc] AUTHORITY.KEYID = 5
2,813,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,540 UART: [afmc] --
2,856,642 UART: [cold-reset] --
2,857,562 UART: [state] Locking Datavault
2,858,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,501 UART: [state] Locking ICCM
2,860,131 UART: [exit] Launching FMC @ 0x40000130
2,865,460 UART:
2,865,476 UART: Running Caliptra FMC ...
2,865,884 UART:
2,866,027 UART: [state] CFI Enabled
2,876,750 UART: [fht] FMC Alias Private Key: 7
2,984,689 UART: [art] Extend RT PCRs Done
2,985,117 UART: [art] Lock RT PCRs Done
2,986,809 UART: [art] Populate DV Done
2,995,202 UART: [fht] FMC Alias Private Key: 7
2,996,284 UART: [art] Derive CDI
2,996,564 UART: [art] Store in in slot 0x4
3,082,237 UART: [art] Derive Key Pair
3,082,597 UART: [art] Store priv key in slot 0x5
3,096,067 UART: [art] Derive Key Pair - Done
3,110,690 UART: [art] Signing Cert with AUTHO
3,111,170 UART: RITY.KEYID = 7
3,126,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,105 UART: [art] PUB.X = 5A8DE8B8C7A4FCB8B94BD20AB672E8A9532856F7C15F661DEF1B07F408BC9983ED682CC4A5615C6CA3DAE95CFE82D79B
3,133,888 UART: [art] PUB.Y = 9156B8E41C2E742F37090919F2974D4019422A94C276ED7ADFD11DE8D246EB7ACEB247E08D88339CDCFA67009E5A9DA5
3,140,818 UART: [art] SIG.R = DF8E98AD0E4F8DA02C27A9B7F69D8DCD96BB3FBEB94D4D34FB73C5F385A5EE2A2360EF471F95E54F05C362B496260C11
3,147,599 UART: [art] SIG.S = 467D8A608BAB14FB5E8F424ED366355CCCE180BDF64432327BA065C62F8B67CD11E8A1E9937A51ED1B9D6D800FEB1B21
3,171,209 UART: Caliptra RT
3,171,555 UART: [state] CFI Enabled
3,279,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,988 UART: [rt]cmd =0x54514754, len=24
3,312,257 >>> mbox cmd response data (8 bytes)
3,312,258 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,887 UART: [rt]cmd =0x44504543, len=36
3,379,356 >>> mbox cmd response data (24 bytes)
3,379,357 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,872 UART: [rt]cmd =0x47544744, len=8
3,410,551 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,494 ready_for_fw is high
1,061,494 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,629,708 >>> mbox cmd response: success
2,629,708 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,692,498 UART:
2,692,514 UART: Running Caliptra FMC ...
2,692,922 UART:
2,693,065 UART: [state] CFI Enabled
2,703,684 UART: [fht] FMC Alias Private Key: 7
2,811,775 UART: [art] Extend RT PCRs Done
2,812,203 UART: [art] Lock RT PCRs Done
2,813,603 UART: [art] Populate DV Done
2,821,710 UART: [fht] FMC Alias Private Key: 7
2,822,676 UART: [art] Derive CDI
2,822,956 UART: [art] Store in in slot 0x4
2,908,585 UART: [art] Derive Key Pair
2,908,945 UART: [art] Store priv key in slot 0x5
2,922,525 UART: [art] Derive Key Pair - Done
2,937,421 UART: [art] Signing Cert with AUTHO
2,937,901 UART: RITY.KEYID = 7
2,953,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,088 UART: [art] PUB.X = 9B5F8D95E8A717937921072D3D775FB12FFA39D825C84277A408C29E1BC3E3978D7F95185EF71BD4F3DF062946F7A18C
2,960,851 UART: [art] PUB.Y = D2DFE26732454A0E84172A03E84F6DF58AB9B386916D48A665C926500A3CCE0DFCDEA37CB2B8D7777E249F3C00EC006D
2,967,757 UART: [art] SIG.R = B482443F69BAA8A1593C22F7E1364C25531DB44EE0362A7FD1DCCE72397EDFA8AA69BC124F12352199035F9A1A257934
2,974,528 UART: [art] SIG.S = D4C00BDFFEB9B1A8A0F549995D8598140E4F90A841E32FE8EAAD1D35DF7133DA9165FCE7218EF7DF452A06A5AC209944
2,998,342 UART: Caliptra RT
2,998,688 UART: [state] CFI Enabled
3,106,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,546 UART: [rt]cmd =0x54514754, len=24
3,138,579 >>> mbox cmd response data (8 bytes)
3,138,580 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,097 UART: [rt]cmd =0x44504543, len=36
3,204,974 >>> mbox cmd response data (24 bytes)
3,204,975 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,588 UART: [rt]cmd =0x47544744, len=8
3,236,089 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: [kat] ++
895,167 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,173,859 ready_for_fw is high
1,173,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,800 UART: [ldev] --
1,281,082 UART: [fwproc] Wait for Commands...
1,281,761 UART: [fwproc] Recv command 0x46574c44
1,282,494 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,842 >>> mbox cmd response: success
2,771,842 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,881 UART: [afmc] ++
2,773,049 UART: [afmc] CDI.KEYID = 6
2,773,412 UART: [afmc] SUBJECT.KEYID = 7
2,773,838 UART: [afmc] AUTHORITY.KEYID = 5
2,809,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,070 UART: [afmc] --
2,852,972 UART: [cold-reset] --
2,853,830 UART: [state] Locking Datavault
2,855,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,733 UART: [state] Locking ICCM
2,856,253 UART: [exit] Launching FMC @ 0x40000130
2,861,582 UART:
2,861,598 UART: Running Caliptra FMC ...
2,862,006 UART:
2,862,060 UART: [state] CFI Enabled
2,872,473 UART: [fht] FMC Alias Private Key: 7
2,980,120 UART: [art] Extend RT PCRs Done
2,980,548 UART: [art] Lock RT PCRs Done
2,981,798 UART: [art] Populate DV Done
2,990,025 UART: [fht] FMC Alias Private Key: 7
2,991,107 UART: [art] Derive CDI
2,991,387 UART: [art] Store in in slot 0x4
3,076,852 UART: [art] Derive Key Pair
3,077,212 UART: [art] Store priv key in slot 0x5
3,090,694 UART: [art] Derive Key Pair - Done
3,105,446 UART: [art] Signing Cert with AUTHO
3,105,926 UART: RITY.KEYID = 7
3,120,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,699 UART: [art] PUB.X = BE2EC615A9AADD28F18CE6DA6CCFF0679DF65C8A58C3EB615E88BB2FCD6041C18DFA1D463F9FFE9A4ED98A39D3AF473A
3,128,503 UART: [art] PUB.Y = A62F22E8DE70D945825AC48F2A3E086F8D4923EDD6288E5A49803DC228CBA7B979A9C68603CE49FB1108D906A6E35817
3,135,445 UART: [art] SIG.R = F0D697A47AEC6E1A25718A12D5281C275878F069244BCD8BC4AA179CF32C81F39A38E813E2B439041D6DC0D12CD15012
3,142,216 UART: [art] SIG.S = A13EDA5500392172C242EC42E0E23E2F08EE3F55C5D2C2FE97426A5F0A45A766F43FFA803EFF745F4DA43590D96D740A
3,165,728 UART: Caliptra RT
3,165,982 UART: [state] CFI Enabled
3,273,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,446 UART: [rt]cmd =0x54514754, len=24
3,305,325 >>> mbox cmd response data (8 bytes)
3,305,326 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,917 UART: [rt]cmd =0x44504543, len=36
3,372,616 >>> mbox cmd response data (24 bytes)
3,372,617 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,990 UART: [rt]cmd =0x47544744, len=8
3,403,743 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,102 ready_for_fw is high
1,056,102 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,950 >>> mbox cmd response: success
2,622,950 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,108 UART:
2,685,124 UART: Running Caliptra FMC ...
2,685,532 UART:
2,685,586 UART: [state] CFI Enabled
2,696,277 UART: [fht] FMC Alias Private Key: 7
2,804,438 UART: [art] Extend RT PCRs Done
2,804,866 UART: [art] Lock RT PCRs Done
2,806,210 UART: [art] Populate DV Done
2,814,451 UART: [fht] FMC Alias Private Key: 7
2,815,559 UART: [art] Derive CDI
2,815,839 UART: [art] Store in in slot 0x4
2,901,584 UART: [art] Derive Key Pair
2,901,944 UART: [art] Store priv key in slot 0x5
2,914,902 UART: [art] Derive Key Pair - Done
2,929,621 UART: [art] Signing Cert with AUTHO
2,930,101 UART: RITY.KEYID = 7
2,945,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,048 UART: [art] PUB.X = 99915E373785114E05AA0A5FA959D3F0062445CB229846BE76E397FEB58C82072E3F8B03D2583D2A1FD8B9A364340153
2,952,794 UART: [art] PUB.Y = 0CF4A7A1A77E6BD6304D05C720B40BC482AC705DC13DD553A9B2D3750DA7844049771ED9A98512A2C534D87216D15132
2,959,732 UART: [art] SIG.R = 7920E95634E50C71DC9C605B307615CA7F9C308A0331D0000CDDE76CA89B4E996CF439FBEE21B32F0410B253A6969125
2,966,468 UART: [art] SIG.S = 5E03ED5308933239781A6484B99082DC7BB553E191F171FECA49C16FBBEB68950D93DAAA620D36773FA78D7B8599A15F
2,990,683 UART: Caliptra RT
2,990,937 UART: [state] CFI Enabled
3,097,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,140 UART: [rt]cmd =0x54514754, len=24
3,130,005 >>> mbox cmd response data (8 bytes)
3,130,006 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,435 UART: [rt]cmd =0x44504543, len=36
3,197,410 >>> mbox cmd response data (24 bytes)
3,197,411 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,694 UART: [rt]cmd =0x47544744, len=8
3,228,235 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,201 UART: [kat] LMS
1,169,513 UART: [kat] --
1,170,578 UART: [cold-reset] ++
1,171,014 UART: [fht] FHT @ 0x50003400
1,173,556 UART: [idev] ++
1,173,724 UART: [idev] CDI.KEYID = 6
1,174,085 UART: [idev] SUBJECT.KEYID = 7
1,174,510 UART: [idev] UDS.KEYID = 0
1,174,856 ready_for_fw is high
1,174,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,494 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,438 UART: [fwproc] Recv command 0x46574c44
1,283,171 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,549 >>> mbox cmd response: success
2,771,549 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,802 UART: [afmc] ++
2,772,970 UART: [afmc] CDI.KEYID = 6
2,773,333 UART: [afmc] SUBJECT.KEYID = 7
2,773,759 UART: [afmc] AUTHORITY.KEYID = 5
2,808,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,779 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,498 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,349 UART: [afmc] --
2,852,317 UART: [cold-reset] --
2,852,927 UART: [state] Locking Datavault
2,853,984 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,588 UART: [state] Locking ICCM
2,855,234 UART: [exit] Launching FMC @ 0x40000130
2,860,563 UART:
2,860,579 UART: Running Caliptra FMC ...
2,860,987 UART:
2,861,130 UART: [state] CFI Enabled
2,871,907 UART: [fht] FMC Alias Private Key: 7
2,980,030 UART: [art] Extend RT PCRs Done
2,980,458 UART: [art] Lock RT PCRs Done
2,981,950 UART: [art] Populate DV Done
2,990,163 UART: [fht] FMC Alias Private Key: 7
2,991,281 UART: [art] Derive CDI
2,991,561 UART: [art] Store in in slot 0x4
3,077,100 UART: [art] Derive Key Pair
3,077,460 UART: [art] Store priv key in slot 0x5
3,090,578 UART: [art] Derive Key Pair - Done
3,105,752 UART: [art] Signing Cert with AUTHO
3,106,232 UART: RITY.KEYID = 7
3,121,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,307 UART: [art] PUB.X = 8C1E0CCFD104046A3E51586FE340DF12407309EDDC2AF077C613DD8FBB7F46DE3947E75F55DE76A42AF0D0BDAA6FFC70
3,129,087 UART: [art] PUB.Y = 647016BFF7CCDABF95AC7BE1C292B6F4BDECD143BF57A0330ECACCE7FBFB9FF6BABC24FC44D7670BC58479D12F8896AC
3,136,067 UART: [art] SIG.R = 1DA25C3570A192772C86C23C154F7DAEE009972E15497765B11E867E69B63D45EDB6E43D0D9E5713608611EB4719C13A
3,142,827 UART: [art] SIG.S = 89D921F2F0605117098E92DBEBAA9F4BFDBA84823FC83EDE4D5ACCD0EA6F6C4B689DEE8732DD57A7C152665E48F3315A
3,166,961 UART: Caliptra RT
3,167,307 UART: [state] CFI Enabled
3,275,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,846 UART: [rt]cmd =0x54514754, len=24
3,307,993 >>> mbox cmd response data (8 bytes)
3,307,994 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,681 UART: [rt]cmd =0x44504543, len=36
3,375,274 >>> mbox cmd response data (24 bytes)
3,375,275 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,540 UART: [rt]cmd =0x47544744, len=8
3,406,391 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,071 ready_for_fw is high
1,057,071 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,049 >>> mbox cmd response: success
2,623,049 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,877 UART:
2,684,893 UART: Running Caliptra FMC ...
2,685,301 UART:
2,685,444 UART: [state] CFI Enabled
2,696,237 UART: [fht] FMC Alias Private Key: 7
2,804,038 UART: [art] Extend RT PCRs Done
2,804,466 UART: [art] Lock RT PCRs Done
2,806,164 UART: [art] Populate DV Done
2,814,685 UART: [fht] FMC Alias Private Key: 7
2,815,861 UART: [art] Derive CDI
2,816,141 UART: [art] Store in in slot 0x4
2,901,804 UART: [art] Derive Key Pair
2,902,164 UART: [art] Store priv key in slot 0x5
2,915,786 UART: [art] Derive Key Pair - Done
2,930,741 UART: [art] Signing Cert with AUTHO
2,931,221 UART: RITY.KEYID = 7
2,946,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,572 UART: [art] PUB.X = 59B139023C76950C0A77FCB808FC9C828563D137A3BF4FA3621A3E8A5FAED6180C097C69FEAF262796148E41861EC722
2,954,326 UART: [art] PUB.Y = F93F64B2A0C9D5E3C2BE5554503C74B5AEC06E3D859E49D9F633C3DCA458E52F7ABD3E9AD5AC2032C633372217CFE108
2,961,287 UART: [art] SIG.R = 27D41C35DE291AD5FA8520E22C53F80D458E606AD7E6AE032BEF25C22D54EDFE619F210AE9DD70474C3E930891727C55
2,968,053 UART: [art] SIG.S = 7ED97D727113462594EEEC93EB48B5D554406DBBAFB415BF0FC96D210EC059D19F98867684FCDD58B382D05535A0E2A4
2,992,194 UART: Caliptra RT
2,992,540 UART: [state] CFI Enabled
3,100,798 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,189 UART: [rt]cmd =0x54514754, len=24
3,133,544 >>> mbox cmd response data (8 bytes)
3,133,545 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,014 UART: [rt]cmd =0x44504543, len=36
3,200,431 >>> mbox cmd response data (24 bytes)
3,200,432 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,875 UART: [rt]cmd =0x47544744, len=8
3,231,464 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,445 UART:
192,814 UART: Running Caliptra ROM ...
193,902 UART:
194,037 UART: [state] CFI Enabled
263,482 UART: [state] LifecycleState = Unprovisioned
265,455 UART: [state] DebugLocked = No
267,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,614 UART: [kat] SHA2-256
441,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,791 UART: [kat] ++
452,230 UART: [kat] sha1
463,502 UART: [kat] SHA2-256
466,155 UART: [kat] SHA2-384
471,715 UART: [kat] SHA2-512-ACC
474,147 UART: [kat] ECC-384
2,765,315 UART: [kat] HMAC-384Kdf
2,779,066 UART: [kat] LMS
3,969,406 UART: [kat] --
3,974,593 UART: [cold-reset] ++
3,975,593 UART: [fht] Storing FHT @ 0x50003400
3,987,305 UART: [idev] ++
3,987,863 UART: [idev] CDI.KEYID = 6
3,988,811 UART: [idev] SUBJECT.KEYID = 7
3,990,044 UART: [idev] UDS.KEYID = 0
3,991,028 ready_for_fw is high
3,991,223 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,690 UART: [idev] Erasing UDS.KEYID = 0
7,325,194 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,785 UART: [idev] --
7,351,634 UART: [ldev] ++
7,352,190 UART: [ldev] CDI.KEYID = 6
7,353,174 UART: [ldev] SUBJECT.KEYID = 5
7,354,395 UART: [ldev] AUTHORITY.KEYID = 7
7,355,675 UART: [ldev] FE.KEYID = 1
7,401,400 UART: [ldev] Erasing FE.KEYID = 1
10,734,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,066 UART: [ldev] --
13,095,473 UART: [fwproc] Waiting for Commands...
13,097,397 UART: [fwproc] Received command 0x46574c44
13,099,625 UART: [fwproc] Received Image of size 114036 bytes
17,146,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,223,935 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,609,737 >>> mbox cmd response: success
17,610,301 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,613,066 UART: [afmc] ++
17,613,549 UART: [afmc] CDI.KEYID = 6
17,614,630 UART: [afmc] SUBJECT.KEYID = 7
17,615,732 UART: [afmc] AUTHORITY.KEYID = 5
20,987,316 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,841 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,252 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,122 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,511 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,676 UART: [afmc] --
23,360,719 UART: [cold-reset] --
23,365,595 UART: [state] Locking Datavault
23,372,068 UART: [state] Locking PCR0, PCR1 and PCR31
23,373,755 UART: [state] Locking ICCM
23,375,788 UART: [exit] Launching FMC @ 0x40000130
23,384,177 UART:
23,384,409 UART: Running Caliptra FMC ...
23,385,502 UART:
23,385,653 UART: [state] CFI Enabled
23,449,384 UART: [fht] FMC Alias Private Key: 7
25,787,396 UART: [art] Extend RT PCRs Done
25,788,612 UART: [art] Lock RT PCRs Done
25,790,430 UART: [art] Populate DV Done
25,795,886 UART: [fht] FMC Alias Private Key: 7
25,797,422 UART: [art] Derive CDI
25,798,148 UART: [art] Store in in slot 0x4
25,857,620 UART: [art] Derive Key Pair
25,858,630 UART: [art] Store priv key in slot 0x5
29,151,182 UART: [art] Derive Key Pair - Done
29,164,112 UART: [art] Signing Cert with AUTHO
29,165,458 UART: RITY.KEYID = 7
31,453,496 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,996 UART: [art] PUB.X = E1759661D3A76150AB22B0F44091D780A85999F41E2FC03E9B5C0129E30827FB96853B47F0D2E5B8FB64ACB86F5B9C49
31,462,287 UART: [art] PUB.Y = 7EB4C75ADCEE3B10215B1F91E3D61960BC734B9D376FF161C34490C62698FE551403040DAE4CEB8714D30F31D863F66F
31,469,521 UART: [art] SIG.R = 0ED55F284F36F1039C03A3817A65733E162BEA30372DC317054D0E505DA3C2B1A64F525A6B72EFC098A26F6BBA1BB470
31,476,846 UART: [art] SIG.S = 8E3AE3CD26B9DB4CBC7A3B9AFA3F158EC8014CBACCF0E864DFF49E60BB888D19BC9DC5A64E27001C8B54D11F0194A98B
32,782,326 UART: Caliptra RT
32,783,040 UART: [state] CFI Enabled
32,942,527 UART: [rt] RT listening for mailbox commands...
32,973,888 UART: [rt]cmd =0x54514754, len=24
32,976,069 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,785,113 ready_for_fw is high
3,785,676 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,847,136 >>> mbox cmd response: success
17,847,820 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,543,886 UART:
23,544,258 UART: Running Caliptra FMC ...
23,545,384 UART:
23,545,530 UART: [state] CFI Enabled
23,597,178 UART: [fht] FMC Alias Private Key: 7
25,934,804 UART: [art] Extend RT PCRs Done
25,936,036 UART: [art] Lock RT PCRs Done
25,937,702 UART: [art] Populate DV Done
25,943,087 UART: [fht] FMC Alias Private Key: 7
25,944,682 UART: [art] Derive CDI
25,945,492 UART: [art] Store in in slot 0x4
26,005,845 UART: [art] Derive Key Pair
26,006,843 UART: [art] Store priv key in slot 0x5
29,300,260 UART: [art] Derive Key Pair - Done
29,313,525 UART: [art] Signing Cert with AUTHO
29,314,829 UART: RITY.KEYID = 7
31,601,945 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,451 UART: [art] PUB.X = 04B80B000FA8D5E5D553183E940697C2CD30B70B7C3248BCE725FADFD28899BE6C66840EFDDBE8490C4893A7AECDAB2F
31,610,692 UART: [art] PUB.Y = 921DFA79608F2EED9D9F6B01989CC2849432D934BB8315AAAC64FFA678BB87ADFF6710D994A7B7FF28EF554F6E19E482
31,617,999 UART: [art] SIG.R = F7C93411B1A95B26BA3DBDE82CD0669D90EEA518C86193AE78F8EB3AEEE3B17FFAD750BE21CFB8CAC981D666DAEB6CEC
31,625,445 UART: [art] SIG.S = 9E88639D10F0F6518D197070F638ED8727C85E21B0417CF0B2E4DB22A0CC8C8C567D89BB248B3C11F0B579C05D99BB4C
32,930,549 UART: Caliptra RT
32,931,261 UART: [state] CFI Enabled
33,095,216 UART: [rt] RT listening for mailbox commands...
33,126,199 UART: [rt]cmd =0x54514754, len=24
33,128,486 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,398 UART:
192,772 UART: Running Caliptra ROM ...
193,956 UART:
603,530 UART: [state] CFI Enabled
617,185 UART: [state] LifecycleState = Unprovisioned
619,123 UART: [state] DebugLocked = No
620,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,075 UART: [kat] SHA2-256
794,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,397 UART: [kat] ++
805,849 UART: [kat] sha1
817,026 UART: [kat] SHA2-256
819,755 UART: [kat] SHA2-384
824,535 UART: [kat] SHA2-512-ACC
826,899 UART: [kat] ECC-384
3,112,660 UART: [kat] HMAC-384Kdf
3,124,402 UART: [kat] LMS
4,314,045 UART: [kat] --
4,318,700 UART: [cold-reset] ++
4,320,638 UART: [fht] Storing FHT @ 0x50003400
4,331,009 UART: [idev] ++
4,331,618 UART: [idev] CDI.KEYID = 6
4,332,555 UART: [idev] SUBJECT.KEYID = 7
4,333,808 UART: [idev] UDS.KEYID = 0
4,334,892 ready_for_fw is high
4,335,122 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,259 UART: [idev] Erasing UDS.KEYID = 0
7,620,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,912 UART: [idev] --
7,648,651 UART: [ldev] ++
7,649,217 UART: [ldev] CDI.KEYID = 6
7,650,196 UART: [ldev] SUBJECT.KEYID = 5
7,651,404 UART: [ldev] AUTHORITY.KEYID = 7
7,652,629 UART: [ldev] FE.KEYID = 1
7,664,778 UART: [ldev] Erasing FE.KEYID = 1
10,952,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,788 UART: [ldev] --
13,316,154 UART: [fwproc] Waiting for Commands...
13,319,213 UART: [fwproc] Received command 0x46574c44
13,321,414 UART: [fwproc] Received Image of size 114036 bytes
17,375,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,338 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,839,798 >>> mbox cmd response: success
17,840,329 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,844,434 UART: [afmc] ++
17,845,047 UART: [afmc] CDI.KEYID = 6
17,845,934 UART: [afmc] SUBJECT.KEYID = 7
17,847,201 UART: [afmc] AUTHORITY.KEYID = 5
21,164,195 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,418 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,684 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,050 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,868 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,300 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,989 UART: [afmc] --
23,533,539 UART: [cold-reset] --
23,537,197 UART: [state] Locking Datavault
23,541,044 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,801 UART: [state] Locking ICCM
23,544,897 UART: [exit] Launching FMC @ 0x40000130
23,553,286 UART:
23,553,527 UART: Running Caliptra FMC ...
23,554,629 UART:
23,554,786 UART: [state] CFI Enabled
23,563,097 UART: [fht] FMC Alias Private Key: 7
25,894,622 UART: [art] Extend RT PCRs Done
25,895,844 UART: [art] Lock RT PCRs Done
25,897,661 UART: [art] Populate DV Done
25,902,906 UART: [fht] FMC Alias Private Key: 7
25,904,393 UART: [art] Derive CDI
25,905,146 UART: [art] Store in in slot 0x4
25,947,684 UART: [art] Derive Key Pair
25,948,726 UART: [art] Store priv key in slot 0x5
29,190,763 UART: [art] Derive Key Pair - Done
29,203,592 UART: [art] Signing Cert with AUTHO
29,205,083 UART: RITY.KEYID = 7
31,483,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,498 UART: [art] PUB.X = 01099377B9D10C5A77DCEBB148712CE027F16E48D5B0BC34B45589B5CE9BA762CF8DC3F66865BE949D9C10BFC90C9803
31,492,740 UART: [art] PUB.Y = 6832207F69FBE0A19DFC51C669C0E4CC38107C73AF48AE7A67D9D8A3940E04BE14E23DA34AFA7253F134F399AAD94C92
31,499,967 UART: [art] SIG.R = 95A0AD57828C378C8B93B8419483DBEC25035641DC7A4312110A7EF47E5A8FD2C61A1636A91E02CE0EECF03FE645E693
31,507,352 UART: [art] SIG.S = 4244B24A5341D18CC2D04B8C51814E88C0C62D36FEB3315D7A59E143A7E8227C6567A239A71FCA8A901A84A47FC30A47
32,812,512 UART: Caliptra RT
32,813,215 UART: [state] CFI Enabled
32,930,495 UART: [rt] RT listening for mailbox commands...
32,961,593 UART: [rt]cmd =0x54514754, len=24
32,964,108 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
4,124,615 ready_for_fw is high
4,125,204 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,066,917 >>> mbox cmd response: success
18,067,598 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,708,947 UART:
23,709,335 UART: Running Caliptra FMC ...
23,710,474 UART:
23,710,628 UART: [state] CFI Enabled
23,718,332 UART: [fht] FMC Alias Private Key: 7
26,049,332 UART: [art] Extend RT PCRs Done
26,050,557 UART: [art] Lock RT PCRs Done
26,051,997 UART: [art] Populate DV Done
26,057,314 UART: [fht] FMC Alias Private Key: 7
26,058,858 UART: [art] Derive CDI
26,059,598 UART: [art] Store in in slot 0x4
26,102,189 UART: [art] Derive Key Pair
26,103,187 UART: [art] Store priv key in slot 0x5
29,345,570 UART: [art] Derive Key Pair - Done
29,358,620 UART: [art] Signing Cert with AUTHO
29,359,920 UART: RITY.KEYID = 7
31,639,564 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,068 UART: [art] PUB.X = 1A9BBFB59D2F2ECC4CD32773786E377DA0AA82175B0FF7BD56FC384DE4A7A55732F46FC150C57AB5932B497D6DBB50F2
31,648,340 UART: [art] PUB.Y = BA239CC93546B223758DBCE8E3171A171F62A31B72D9F151AB49EA843C37C6CEF8009CD6B860BF87717F744017C6D8C8
31,655,587 UART: [art] SIG.R = 3118AA3ECDDD8B1618180D4260212556177C3DF6BC67D3F8285AC19A62B963F7470729BD0F7B48543F626C0A95E6FDD5
31,662,973 UART: [art] SIG.S = 0D38850F1553E04C2C31024E2BEBA13C31939A2010F805D3FFDAD8092FD660C7A4BEA935D15983EC92E35303BD1718DD
32,968,298 UART: Caliptra RT
32,969,019 UART: [state] CFI Enabled
33,086,909 UART: [rt] RT listening for mailbox commands...
33,118,168 UART: [rt]cmd =0x54514754, len=24
33,120,610 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,440 UART:
192,818 UART: Running Caliptra ROM ...
193,912 UART:
194,055 UART: [state] CFI Enabled
263,225 UART: [state] LifecycleState = Unprovisioned
265,180 UART: [state] DebugLocked = No
266,491 UART: [state] WD Timer not started. Device not locked for debugging
270,026 UART: [kat] SHA2-256
449,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,723 UART: [kat] ++
461,173 UART: [kat] sha1
471,760 UART: [kat] SHA2-256
474,773 UART: [kat] SHA2-384
480,832 UART: [kat] SHA2-512-ACC
483,836 UART: [kat] ECC-384
2,927,984 UART: [kat] HMAC-384Kdf
2,950,380 UART: [kat] LMS
3,479,820 UART: [kat] --
3,484,227 UART: [cold-reset] ++
3,485,044 UART: [fht] FHT @ 0x50003400
3,496,517 UART: [idev] ++
3,497,099 UART: [idev] CDI.KEYID = 6
3,497,987 UART: [idev] SUBJECT.KEYID = 7
3,499,237 UART: [idev] UDS.KEYID = 0
3,500,172 ready_for_fw is high
3,500,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,644,206 UART: [idev] Erasing UDS.KEYID = 0
6,005,458 UART: [idev] Sha1 KeyId Algorithm
6,028,858 UART: [idev] --
6,031,727 UART: [ldev] ++
6,032,304 UART: [ldev] CDI.KEYID = 6
6,033,223 UART: [ldev] SUBJECT.KEYID = 5
6,034,381 UART: [ldev] AUTHORITY.KEYID = 7
6,035,617 UART: [ldev] FE.KEYID = 1
6,078,450 UART: [ldev] Erasing FE.KEYID = 1
8,581,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,098 UART: [ldev] --
10,392,459 UART: [fwproc] Wait for Commands...
10,394,719 UART: [fwproc] Recv command 0x46574c44
10,396,818 UART: [fwproc] Recv'd Img size: 114360 bytes
13,805,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,263,920 >>> mbox cmd response: success
14,264,447 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,268,382 UART: [afmc] ++
14,268,979 UART: [afmc] CDI.KEYID = 6
14,269,868 UART: [afmc] SUBJECT.KEYID = 7
14,271,084 UART: [afmc] AUTHORITY.KEYID = 5
16,803,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,575 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,448 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,475 UART: [afmc] --
18,607,103 UART: [cold-reset] --
18,610,110 UART: [state] Locking Datavault
18,616,760 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,407 UART: [state] Locking ICCM
18,620,018 UART: [exit] Launching FMC @ 0x40000130
18,628,470 UART:
18,628,713 UART: Running Caliptra FMC ...
18,629,816 UART:
18,629,975 UART: [state] CFI Enabled
18,688,246 UART: [fht] FMC Alias Private Key: 7
20,452,269 UART: [art] Extend RT PCRs Done
20,453,491 UART: [art] Lock RT PCRs Done
20,454,901 UART: [art] Populate DV Done
20,460,313 UART: [fht] FMC Alias Private Key: 7
20,461,957 UART: [art] Derive CDI
20,462,775 UART: [art] Store in in slot 0x4
20,520,982 UART: [art] Derive Key Pair
20,522,014 UART: [art] Store priv key in slot 0x5
22,985,024 UART: [art] Derive Key Pair - Done
22,998,127 UART: [art] Signing Cert with AUTHO
22,999,432 UART: RITY.KEYID = 7
24,711,237 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,744 UART: [art] PUB.X = B057903AD1CE1F15F2E3E61881185E19887F1D1854FA9BF46BC25A4B693467F5B102541FC0E09FE4FB7462188FB0093C
24,719,982 UART: [art] PUB.Y = 946033954B15F72C8C6C3C5A68C78AB662FB7BCA880F38739D729F0E746D4B1F9A8713826906A362B9F54F58CED325AF
24,727,262 UART: [art] SIG.R = 32EB147F5259667F43927D6B352033CAB24A67BE1BDC62A4E494CF60A0AC24DC975B5B8BFA0C3EE84440FD2321247589
24,734,665 UART: [art] SIG.S = 7FD31FB76E915A882C8EDA04464F1B31DB78F07CC391AD3DFBB43F2D3641BC889BEFF96609739BED160D3E9FA163E440
25,713,087 UART: Caliptra RT
25,713,801 UART: [state] CFI Enabled
25,880,964 UART: [rt] RT listening for mailbox commands...
25,912,329 UART: [rt]cmd =0x54514754, len=24
25,914,893 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,446 writing to cptra_bootfsm_go
192,655 UART:
193,031 UART: Running Caliptra ROM ...
194,235 UART:
194,394 UART: [state] CFI Enabled
260,099 UART: [state] LifecycleState = Unprovisioned
262,520 UART: [state] DebugLocked = No
265,252 UART: [state] WD Timer not started. Device not locked for debugging
270,137 UART: [kat] SHA2-256
460,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,781 UART: [kat] ++
471,233 UART: [kat] sha1
482,601 UART: [kat] SHA2-256
485,625 UART: [kat] SHA2-384
491,829 UART: [kat] SHA2-512-ACC
494,417 UART: [kat] ECC-384
2,947,593 UART: [kat] HMAC-384Kdf
2,971,804 UART: [kat] LMS
3,503,553 UART: [kat] --
3,506,159 UART: [cold-reset] ++
3,507,385 UART: [fht] FHT @ 0x50003400
3,518,723 UART: [idev] ++
3,519,359 UART: [idev] CDI.KEYID = 6
3,520,393 UART: [idev] SUBJECT.KEYID = 7
3,521,573 UART: [idev] UDS.KEYID = 0
3,522,500 ready_for_fw is high
3,522,701 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,665 UART: [idev] Erasing UDS.KEYID = 0
6,030,321 UART: [idev] Sha1 KeyId Algorithm
6,052,175 UART: [idev] --
6,057,968 UART: [ldev] ++
6,058,691 UART: [ldev] CDI.KEYID = 6
6,059,613 UART: [ldev] SUBJECT.KEYID = 5
6,060,778 UART: [ldev] AUTHORITY.KEYID = 7
6,061,959 UART: [ldev] FE.KEYID = 1
6,100,048 UART: [ldev] Erasing FE.KEYID = 1
8,607,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,287 UART: [ldev] --
10,415,662 UART: [fwproc] Wait for Commands...
10,417,648 UART: [fwproc] Recv command 0x46574c44
10,419,957 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,601,073 >>> mbox cmd response: success
14,601,625 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,605,936 UART: [afmc] ++
14,606,635 UART: [afmc] CDI.KEYID = 6
14,607,876 UART: [afmc] SUBJECT.KEYID = 7
14,609,310 UART: [afmc] AUTHORITY.KEYID = 5
17,149,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,154 UART: [afmc] --
18,967,148 UART: [cold-reset] --
18,971,337 UART: [state] Locking Datavault
18,975,939 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,131 UART: [state] Locking ICCM
18,979,776 UART: [exit] Launching FMC @ 0x40000130
18,988,442 UART:
18,988,687 UART: Running Caliptra FMC ...
18,989,789 UART:
18,989,947 UART: [state] CFI Enabled
19,050,018 UART: [fht] FMC Alias Private Key: 7
20,814,882 UART: [art] Extend RT PCRs Done
20,816,112 UART: [art] Lock RT PCRs Done
20,817,606 UART: [art] Populate DV Done
20,823,239 UART: [fht] FMC Alias Private Key: 7
20,824,782 UART: [art] Derive CDI
20,825,519 UART: [art] Store in in slot 0x4
20,882,339 UART: [art] Derive Key Pair
20,883,382 UART: [art] Store priv key in slot 0x5
23,348,565 UART: [art] Derive Key Pair - Done
23,361,133 UART: [art] Signing Cert with AUTHO
23,362,440 UART: RITY.KEYID = 7
25,074,048 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,563 UART: [art] PUB.X = 0C43A0CC258CD8506BA3D7A27B0C6C379729EEF874551FC4BC87D60FB95987A8094949D3127BB595EBEF6C593A8D6C9E
25,082,859 UART: [art] PUB.Y = 22592A7DF991929293A573400FF7E8F0370183B0238717CE1A559D82C8F8C6CE4669B836661D7A103E4CC1384A91F647
25,090,091 UART: [art] SIG.R = AD579904C7D8C7D6089323D9CF810A7B66F934055EB6CAF550F28A2232E53A2074DB7E662FAE16F76C0641BC9A2FC534
25,097,518 UART: [art] SIG.S = D59CCFC6258466DFA17AF038C3DD422A59EA61420A362FDB71DC4755AB3C5C23640766F6A969F441DFE37AB8DC6442AA
26,077,033 UART: Caliptra RT
26,077,725 UART: [state] CFI Enabled
26,242,008 UART: [rt] RT listening for mailbox commands...
26,273,368 UART: [rt]cmd =0x54514754, len=24
26,275,878 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,437,132 ready_for_fw is high
3,437,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,723,252 >>> mbox cmd response: success
14,723,857 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,017,461 UART:
19,017,868 UART: Running Caliptra FMC ...
19,019,070 UART:
19,019,242 UART: [state] CFI Enabled
19,082,991 UART: [fht] FMC Alias Private Key: 7
20,846,992 UART: [art] Extend RT PCRs Done
20,848,219 UART: [art] Lock RT PCRs Done
20,849,981 UART: [art] Populate DV Done
20,855,390 UART: [fht] FMC Alias Private Key: 7
20,856,983 UART: [art] Derive CDI
20,857,720 UART: [art] Store in in slot 0x4
20,915,440 UART: [art] Derive Key Pair
20,916,481 UART: [art] Store priv key in slot 0x5
23,379,513 UART: [art] Derive Key Pair - Done
23,392,187 UART: [art] Signing Cert with AUTHO
23,393,501 UART: RITY.KEYID = 7
25,105,453 UART: [art] Erasing AUTHORITY.KEYID = 7
25,106,975 UART: [art] PUB.X = D964718E8DE350DEAAD0CEAD8E181CF05ADF7F86CF5D246F4381BBBB7142A438CAD65462A18B8B6AD1F72DB549522332
25,114,274 UART: [art] PUB.Y = 01E52AAD4AD1B62F8E09341990FCC968789829CBFA273FE21C848806C777BA58E0946021B411FF3A78E97252063B47AA
25,121,518 UART: [art] SIG.R = B63526245948CCF05DFB114FA2F505ED7D3F0C9478CCDBEB1198C921B21FEF9E5804622CD843AF600E471EA34216D01E
25,128,898 UART: [art] SIG.S = 739264144AC28902A94238712DE47DED4434C43A188E076D569F59D0B7786A731D349ACB85CEF7C3D3670FCCDF8776E5
26,107,616 UART: Caliptra RT
26,108,308 UART: [state] CFI Enabled
26,272,967 UART: [rt] RT listening for mailbox commands...
26,304,006 UART: [rt]cmd =0x54514754, len=24
26,306,259 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,786 writing to cptra_bootfsm_go
193,973 UART:
194,354 UART: Running Caliptra ROM ...
195,550 UART:
605,157 UART: [state] CFI Enabled
619,886 UART: [state] LifecycleState = Unprovisioned
622,253 UART: [state] DebugLocked = No
623,700 UART: [state] WD Timer not started. Device not locked for debugging
627,443 UART: [kat] SHA2-256
817,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,114 UART: [kat] ++
828,650 UART: [kat] sha1
840,234 UART: [kat] SHA2-256
843,245 UART: [kat] SHA2-384
848,666 UART: [kat] SHA2-512-ACC
851,321 UART: [kat] ECC-384
3,293,039 UART: [kat] HMAC-384Kdf
3,307,121 UART: [kat] LMS
3,838,968 UART: [kat] --
3,842,980 UART: [cold-reset] ++
3,844,375 UART: [fht] FHT @ 0x50003400
3,855,166 UART: [idev] ++
3,855,879 UART: [idev] CDI.KEYID = 6
3,856,785 UART: [idev] SUBJECT.KEYID = 7
3,858,030 UART: [idev] UDS.KEYID = 0
3,858,956 ready_for_fw is high
3,859,149 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,793 UART: [idev] Erasing UDS.KEYID = 0
6,335,859 UART: [idev] Sha1 KeyId Algorithm
6,358,938 UART: [idev] --
6,364,494 UART: [ldev] ++
6,365,226 UART: [ldev] CDI.KEYID = 6
6,366,143 UART: [ldev] SUBJECT.KEYID = 5
6,367,302 UART: [ldev] AUTHORITY.KEYID = 7
6,368,535 UART: [ldev] FE.KEYID = 1
6,379,914 UART: [ldev] Erasing FE.KEYID = 1
8,854,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,940 UART: [ldev] --
10,645,830 UART: [fwproc] Wait for Commands...
10,647,776 UART: [fwproc] Recv command 0x46574c44
10,650,040 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,031 >>> mbox cmd response: success
14,835,598 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,838,694 UART: [afmc] ++
14,839,393 UART: [afmc] CDI.KEYID = 6
14,840,626 UART: [afmc] SUBJECT.KEYID = 7
14,842,109 UART: [afmc] AUTHORITY.KEYID = 5
17,348,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,939 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,081 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,961 UART: [afmc] --
19,145,229 UART: [cold-reset] --
19,148,338 UART: [state] Locking Datavault
19,152,395 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,582 UART: [state] Locking ICCM
19,156,837 UART: [exit] Launching FMC @ 0x40000130
19,165,501 UART:
19,165,745 UART: Running Caliptra FMC ...
19,166,844 UART:
19,166,996 UART: [state] CFI Enabled
19,175,039 UART: [fht] FMC Alias Private Key: 7
20,931,661 UART: [art] Extend RT PCRs Done
20,932,882 UART: [art] Lock RT PCRs Done
20,934,632 UART: [art] Populate DV Done
20,940,200 UART: [fht] FMC Alias Private Key: 7
20,941,863 UART: [art] Derive CDI
20,942,676 UART: [art] Store in in slot 0x4
20,985,105 UART: [art] Derive Key Pair
20,986,142 UART: [art] Store priv key in slot 0x5
23,412,616 UART: [art] Derive Key Pair - Done
23,425,411 UART: [art] Signing Cert with AUTHO
23,426,725 UART: RITY.KEYID = 7
25,132,854 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,364 UART: [art] PUB.X = D8F114638FBACF0F0EA6DCB47230469451CC7AE51A963231C4F4C66983A6992B20E80AF777508BBF72BD61F9C298F9D5
25,141,617 UART: [art] PUB.Y = C409ACD764B3C6BE4D3F08C580E618DB3E11163D5126A6097BCEDDB26EE2F748DCCA5BE812B22004CC7705824C97F9C4
25,148,906 UART: [art] SIG.R = 1FF5C04CFA5424248B26445F11ED4385B5786C2E6A0ABE7B1C5D9C4B506E1E3F1ED4AF24B868A5E807A18E14695AC377
25,156,295 UART: [art] SIG.S = B46D9EF24EE1445A51E72899B9F98F40B6367B52A29710B1DA708C9CF4D1C641708CB118D7BAA12D6193D87E40C1C050
26,135,861 UART: Caliptra RT
26,136,554 UART: [state] CFI Enabled
26,253,841 UART: [rt] RT listening for mailbox commands...
26,285,029 UART: [rt]cmd =0x54514754, len=24
26,287,349 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,754,261 ready_for_fw is high
3,754,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,955,434 >>> mbox cmd response: success
14,956,147 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,214,228 UART:
19,214,622 UART: Running Caliptra FMC ...
19,215,815 UART:
19,215,977 UART: [state] CFI Enabled
19,223,892 UART: [fht] FMC Alias Private Key: 7
20,980,762 UART: [art] Extend RT PCRs Done
20,981,977 UART: [art] Lock RT PCRs Done
20,983,278 UART: [art] Populate DV Done
20,988,486 UART: [fht] FMC Alias Private Key: 7
20,990,179 UART: [art] Derive CDI
20,991,005 UART: [art] Store in in slot 0x4
21,033,927 UART: [art] Derive Key Pair
21,034,933 UART: [art] Store priv key in slot 0x5
23,461,578 UART: [art] Derive Key Pair - Done
23,474,772 UART: [art] Signing Cert with AUTHO
23,476,103 UART: RITY.KEYID = 7
25,181,527 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,033 UART: [art] PUB.X = 6C665FA2B9C07E4F3B1DB9DC7F8E93881AE88975EDFFAE79E45B395D433749E18BA2C50982430E864FCB569DC30B045F
25,190,343 UART: [art] PUB.Y = CB36E418BA9018F03456BF8C3551B28C3A095E7718B6EE1382D1E4AA7D663C34F08F163CC1FD63BCCE86C2D7241CB38F
25,197,585 UART: [art] SIG.R = 83C631A12A9292BC1DFAF627CDAB594DF59B1042048FBD40BE9B16018A9025E65EA2268D5963651BAEE38AC679D2C551
25,205,043 UART: [art] SIG.S = 83ED444C604E1C50B963FE03AD51A767577FAAF4611C0C60B0C6B19D6AE2C75083E2EFAABE86BAFA50AF3C85C9396D20
26,184,297 UART: Caliptra RT
26,184,984 UART: [state] CFI Enabled
26,303,152 UART: [rt] RT listening for mailbox commands...
26,334,391 UART: [rt]cmd =0x54514754, len=24
26,336,678 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,313 UART: [kat] SHA2-256
882,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,359 UART: [kat] ++
886,511 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
902,708 UART: [kat] HMAC-384Kdf
907,468 UART: [kat] LMS
1,475,664 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,809 UART: [fht] Storing FHT @ 0x50003400
1,479,628 UART: [idev] ++
1,479,796 UART: [idev] CDI.KEYID = 6
1,480,156 UART: [idev] SUBJECT.KEYID = 7
1,480,580 UART: [idev] UDS.KEYID = 0
1,480,925 ready_for_fw is high
1,480,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,260 UART: [idev] Erasing UDS.KEYID = 0
1,505,420 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,142 UART: [idev] --
1,515,147 UART: [ldev] ++
1,515,315 UART: [ldev] CDI.KEYID = 6
1,515,678 UART: [ldev] SUBJECT.KEYID = 5
1,516,104 UART: [ldev] AUTHORITY.KEYID = 7
1,516,567 UART: [ldev] FE.KEYID = 1
1,521,973 UART: [ldev] Erasing FE.KEYID = 1
1,547,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,334 UART: [ldev] --
1,586,677 UART: [fwproc] Waiting for Commands...
1,587,450 UART: [fwproc] Received command 0x46574c44
1,588,241 UART: [fwproc] Received Image of size 114360 bytes
2,884,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,843 >>> mbox cmd response: success
3,077,843 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,057 UART: [afmc] ++
3,079,225 UART: [afmc] CDI.KEYID = 6
3,079,587 UART: [afmc] SUBJECT.KEYID = 7
3,080,012 UART: [afmc] AUTHORITY.KEYID = 5
3,115,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,164 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,854 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,735 UART: [afmc] --
3,158,769 UART: [cold-reset] --
3,159,885 UART: [state] Locking Datavault
3,161,282 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,886 UART: [state] Locking ICCM
3,162,544 UART: [exit] Launching FMC @ 0x40000130
3,167,873 UART:
3,167,889 UART: Running Caliptra FMC ...
3,168,297 UART:
3,168,351 UART: [state] CFI Enabled
3,178,830 UART: [fht] FMC Alias Private Key: 7
3,287,333 UART: [art] Extend RT PCRs Done
3,287,761 UART: [art] Lock RT PCRs Done
3,289,009 UART: [art] Populate DV Done
3,296,938 UART: [fht] FMC Alias Private Key: 7
3,298,056 UART: [art] Derive CDI
3,298,336 UART: [art] Store in in slot 0x4
3,383,825 UART: [art] Derive Key Pair
3,384,185 UART: [art] Store priv key in slot 0x5
3,397,509 UART: [art] Derive Key Pair - Done
3,412,119 UART: [art] Signing Cert with AUTHO
3,412,599 UART: RITY.KEYID = 7
3,427,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,494 UART: [art] PUB.X = 60C55AF03AC8CBB190F217BF997B4F145354279135DB8439B8329552AA3095A3D0705C42A45CD34578D762DB4A623C64
3,435,260 UART: [art] PUB.Y = 3090BC1D363ADF1C5219E1B1001CC6B8C308D4BE2EB57AE9AD967C0BBAD72E9584473922A64BED09D8F47E76A3DDB8A5
3,442,197 UART: [art] SIG.R = 55880BDBEBEB8C7F1CBF9DEDA9CF64D03AA426F329090A326FA8D81A785EB03AB34FA179753BCD77BDD9F69594F17F05
3,448,977 UART: [art] SIG.S = D1733F09AE63E7840E1684F5CCBD4F0AD34FA91EDA05BE758B8A5569DAB6571F73470409148B03EAA462694003EB4C26
3,472,154 UART: Caliptra RT
3,472,408 UART: [state] CFI Enabled
3,581,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,511 UART: [rt]cmd =0x54514754, len=24
3,613,165 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,061 ready_for_fw is high
1,362,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,639 >>> mbox cmd response: success
2,928,639 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,990,055 UART:
2,990,071 UART: Running Caliptra FMC ...
2,990,479 UART:
2,990,533 UART: [state] CFI Enabled
3,001,042 UART: [fht] FMC Alias Private Key: 7
3,108,723 UART: [art] Extend RT PCRs Done
3,109,151 UART: [art] Lock RT PCRs Done
3,110,871 UART: [art] Populate DV Done
3,119,172 UART: [fht] FMC Alias Private Key: 7
3,120,294 UART: [art] Derive CDI
3,120,574 UART: [art] Store in in slot 0x4
3,206,235 UART: [art] Derive Key Pair
3,206,595 UART: [art] Store priv key in slot 0x5
3,219,589 UART: [art] Derive Key Pair - Done
3,234,385 UART: [art] Signing Cert with AUTHO
3,234,865 UART: RITY.KEYID = 7
3,249,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,270 UART: [art] PUB.X = E1BFFB1CE0EA7C027CEF7FC8605CB315FF6710D0A13AA3F78B20C39D23AEAED52176B0D18347298E64FAAEB735480927
3,257,052 UART: [art] PUB.Y = DC4DFC2D8FCA8322BE344575E4B14D428F5FC5BFBC9D0A45D30B3BEE5615BA2EA41B779AD5212203AA07FFAF3A9F6ECC
3,264,020 UART: [art] SIG.R = 8FC372A30D282246753D906E8FFAB73CDA01908B7C3D452FC5CC37972911CD7219CF4741CE13D4E87B4DC7AF44A12522
3,270,790 UART: [art] SIG.S = 1F8C4E0EEA7EA631D987D3D3737C832F72635AB41F1269D7CE049C1A4C9D97645D4151B658E9E12A9C70D1967FDC0BD5
3,294,316 UART: Caliptra RT
3,294,570 UART: [state] CFI Enabled
3,402,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,675 UART: [rt]cmd =0x54514754, len=24
3,434,547 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,982 UART: [kat] SHA2-256
892,920 UART: [kat] SHA2-384
895,699 UART: [kat] SHA2-512-ACC
897,600 UART: [kat] ECC-384
903,499 UART: [kat] HMAC-384Kdf
908,043 UART: [kat] LMS
1,476,239 UART: [kat] --
1,477,440 UART: [cold-reset] ++
1,477,972 UART: [fht] Storing FHT @ 0x50003400
1,480,827 UART: [idev] ++
1,480,995 UART: [idev] CDI.KEYID = 6
1,481,355 UART: [idev] SUBJECT.KEYID = 7
1,481,779 UART: [idev] UDS.KEYID = 0
1,482,124 ready_for_fw is high
1,482,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,747 UART: [idev] Erasing UDS.KEYID = 0
1,506,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,905 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,472 UART: [ldev] Erasing FE.KEYID = 1
1,547,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,213 UART: [ldev] --
1,586,586 UART: [fwproc] Waiting for Commands...
1,587,213 UART: [fwproc] Received command 0x46574c44
1,588,004 UART: [fwproc] Received Image of size 114360 bytes
2,885,103 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,467 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,819 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,712 >>> mbox cmd response: success
3,077,712 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,756 UART: [afmc] ++
3,078,924 UART: [afmc] CDI.KEYID = 6
3,079,286 UART: [afmc] SUBJECT.KEYID = 7
3,079,711 UART: [afmc] AUTHORITY.KEYID = 5
3,115,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,144 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,537 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,227 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,076 UART: [afmc] --
3,157,990 UART: [cold-reset] --
3,158,896 UART: [state] Locking Datavault
3,159,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,457 UART: [state] Locking ICCM
3,161,009 UART: [exit] Launching FMC @ 0x40000130
3,166,338 UART:
3,166,354 UART: Running Caliptra FMC ...
3,166,762 UART:
3,166,905 UART: [state] CFI Enabled
3,177,936 UART: [fht] FMC Alias Private Key: 7
3,286,037 UART: [art] Extend RT PCRs Done
3,286,465 UART: [art] Lock RT PCRs Done
3,288,241 UART: [art] Populate DV Done
3,296,368 UART: [fht] FMC Alias Private Key: 7
3,297,310 UART: [art] Derive CDI
3,297,590 UART: [art] Store in in slot 0x4
3,383,467 UART: [art] Derive Key Pair
3,383,827 UART: [art] Store priv key in slot 0x5
3,397,247 UART: [art] Derive Key Pair - Done
3,411,989 UART: [art] Signing Cert with AUTHO
3,412,469 UART: RITY.KEYID = 7
3,427,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,230 UART: [art] PUB.X = 47AA9438F4CB0370793E76C7C6A9316D03CF61E3E6DEA75D649CAEB7A54A98583AF40F8806D0A3C5ACD37F889E71F471
3,434,998 UART: [art] PUB.Y = 8E8D65E06CA41312960ECDF3A308D10E234FFA6863E48D07C52E637DB6BE9DBFF31B422DAC7AC5A3CB38134C5B92B73C
3,441,954 UART: [art] SIG.R = 145BE41EE3E887959186803F08036772BE0F9D975C1D995BC973420D2ED4A17C6438A9603E9E40F89733A6668DDF65AC
3,448,708 UART: [art] SIG.S = 5FC3D725623DBB1510942876C158A3F8EE8B5C7EB5CE7683A108BE3C67E1B47426D42A6BD97BA99EE12C4DA2F424B247
3,472,628 UART: Caliptra RT
3,472,974 UART: [state] CFI Enabled
3,581,151 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,302 UART: [rt]cmd =0x54514754, len=24
3,613,044 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,544 ready_for_fw is high
1,363,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,650 >>> mbox cmd response: success
2,929,650 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,991,590 UART:
2,991,606 UART: Running Caliptra FMC ...
2,992,014 UART:
2,992,157 UART: [state] CFI Enabled
3,002,758 UART: [fht] FMC Alias Private Key: 7
3,110,849 UART: [art] Extend RT PCRs Done
3,111,277 UART: [art] Lock RT PCRs Done
3,112,735 UART: [art] Populate DV Done
3,120,892 UART: [fht] FMC Alias Private Key: 7
3,122,020 UART: [art] Derive CDI
3,122,300 UART: [art] Store in in slot 0x4
3,208,163 UART: [art] Derive Key Pair
3,208,523 UART: [art] Store priv key in slot 0x5
3,222,279 UART: [art] Derive Key Pair - Done
3,237,203 UART: [art] Signing Cert with AUTHO
3,237,683 UART: RITY.KEYID = 7
3,252,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,678 UART: [art] PUB.X = 222990D5D90E3142BBC2CEE252465782250B2791F138CBAEA4BF7207AF77518CE4F5E01CE118955AA717D5EA57ED7597
3,260,443 UART: [art] PUB.Y = D8F8DA55CE818E0C04DBD5F235E1E160373D8384928B2BEE0F08742A74F347221E7E7A6C1D01C6BC1F0F548D9D7E55A1
3,267,385 UART: [art] SIG.R = 76C614ACD33BEAED36C8E4999009F4D5E2355CF80656493C60D81951F847E98EEFCD92BB50B8ABBD58E7148BA2702356
3,274,157 UART: [art] SIG.S = 6FDE92F3FF8E9C6FF31B599B533F71DFEB847F4441661A5438AD17995B8086CB7806D9BAD17CB7E887186A4E06229A9F
3,297,794 UART: Caliptra RT
3,298,140 UART: [state] CFI Enabled
3,406,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,982 UART: [rt]cmd =0x54514754, len=24
3,439,030 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,384 UART: [kat] SHA2-512-ACC
908,285 UART: [kat] ECC-384
917,832 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,645 UART: [cold-reset] ++
1,172,149 UART: [fht] FHT @ 0x50003400
1,174,834 UART: [idev] ++
1,175,002 UART: [idev] CDI.KEYID = 6
1,175,362 UART: [idev] SUBJECT.KEYID = 7
1,175,786 UART: [idev] UDS.KEYID = 0
1,176,131 ready_for_fw is high
1,176,131 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,473 UART: [idev] Sha1 KeyId Algorithm
1,208,769 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,152 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,760 UART: [fwproc] Wait for Commands...
1,282,346 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,100 >>> mbox cmd response: success
2,773,100 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,164 UART: [afmc] ++
2,774,332 UART: [afmc] CDI.KEYID = 6
2,774,694 UART: [afmc] SUBJECT.KEYID = 7
2,775,119 UART: [afmc] AUTHORITY.KEYID = 5
2,810,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,917 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,530 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,249 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,115 UART: [afmc] --
2,854,231 UART: [cold-reset] --
2,854,921 UART: [state] Locking Datavault
2,855,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,574 UART: [state] Locking ICCM
2,857,242 UART: [exit] Launching FMC @ 0x40000130
2,862,571 UART:
2,862,587 UART: Running Caliptra FMC ...
2,862,995 UART:
2,863,049 UART: [state] CFI Enabled
2,873,324 UART: [fht] FMC Alias Private Key: 7
2,981,737 UART: [art] Extend RT PCRs Done
2,982,165 UART: [art] Lock RT PCRs Done
2,983,775 UART: [art] Populate DV Done
2,992,034 UART: [fht] FMC Alias Private Key: 7
2,993,122 UART: [art] Derive CDI
2,993,402 UART: [art] Store in in slot 0x4
3,079,371 UART: [art] Derive Key Pair
3,079,731 UART: [art] Store priv key in slot 0x5
3,093,211 UART: [art] Derive Key Pair - Done
3,107,979 UART: [art] Signing Cert with AUTHO
3,108,459 UART: RITY.KEYID = 7
3,123,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,272 UART: [art] PUB.X = 43C3A0BBE500FF33B9B88EE4E56CE8C1BAA907E494DE9C82DFFB9DFE9DA4082A839CFE2DD27981AF18E78D6BD30CA123
3,131,039 UART: [art] PUB.Y = 744E2BB723C857103AD7A896FDB2A71C120433C958E2B5422769E96234B18D6279CE91101DC4BAECDEA45D131A83C63B
3,137,990 UART: [art] SIG.R = AF7E4DF0646380F29BB3500F4708DECD5FFDA55B2EFAC1EE7E4D9956D644F0973BFF2320A6DBEAFD7E5CE9B1B0F48963
3,144,780 UART: [art] SIG.S = C1BFB408C9C6E3C89B1F28B2249973460AD5CB48BDAE259D2A5DD7FFBC70323DE02D8FF77F567D72792ACE732744BF3D
3,168,611 UART: Caliptra RT
3,168,865 UART: [state] CFI Enabled
3,277,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,319 UART: [rt]cmd =0x54514754, len=24
3,310,331 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,565 ready_for_fw is high
1,060,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,223 >>> mbox cmd response: success
2,626,223 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,699 UART:
2,688,715 UART: Running Caliptra FMC ...
2,689,123 UART:
2,689,177 UART: [state] CFI Enabled
2,699,328 UART: [fht] FMC Alias Private Key: 7
2,806,645 UART: [art] Extend RT PCRs Done
2,807,073 UART: [art] Lock RT PCRs Done
2,808,559 UART: [art] Populate DV Done
2,816,796 UART: [fht] FMC Alias Private Key: 7
2,817,900 UART: [art] Derive CDI
2,818,180 UART: [art] Store in in slot 0x4
2,903,825 UART: [art] Derive Key Pair
2,904,185 UART: [art] Store priv key in slot 0x5
2,917,825 UART: [art] Derive Key Pair - Done
2,932,495 UART: [art] Signing Cert with AUTHO
2,932,975 UART: RITY.KEYID = 7
2,948,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,862 UART: [art] PUB.X = D46E61747B455CBC96DC5E7281A9086514EC26A415988AD1385A33FB32ED26E18F70FC1E55D6D81EC1395EF7B3DA0E51
2,955,634 UART: [art] PUB.Y = 2CD7DF84D193946E8CD41E489941DF3375C7BCF3512EF8109F59D5F3D1AF9ED3EB51C6BCE4EFCFFDEB3DA9AEEE8F667B
2,962,616 UART: [art] SIG.R = D48F84346BBEF8B444063CC68BE2F11A89A7B2A77FC029F05A0928AE329B8099F3B492270AF0FA9131788517D09B6F81
2,969,379 UART: [art] SIG.S = F7F8222733506ACDD1B6B4B469C30999B89E603DF3B47D6FFC2DE69956F245461F6B809FB567779E831328AD79BE2AA5
2,993,501 UART: Caliptra RT
2,993,755 UART: [state] CFI Enabled
3,102,214 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,297 UART: [rt]cmd =0x54514754, len=24
3,134,161 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,522 UART: [cold-reset] ++
1,172,900 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 ready_for_fw is high
1,176,864 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,649 UART: [idev] Erasing UDS.KEYID = 0
1,201,924 UART: [idev] Sha1 KeyId Algorithm
1,210,348 UART: [idev] --
1,211,538 UART: [ldev] ++
1,211,706 UART: [ldev] CDI.KEYID = 6
1,212,069 UART: [ldev] SUBJECT.KEYID = 5
1,212,495 UART: [ldev] AUTHORITY.KEYID = 7
1,212,958 UART: [ldev] FE.KEYID = 1
1,218,208 UART: [ldev] Erasing FE.KEYID = 1
1,244,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,740 UART: [ldev] --
1,284,095 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,777,301 >>> mbox cmd response: success
2,777,301 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,778,559 UART: [afmc] ++
2,778,727 UART: [afmc] CDI.KEYID = 6
2,779,089 UART: [afmc] SUBJECT.KEYID = 7
2,779,514 UART: [afmc] AUTHORITY.KEYID = 5
2,815,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,052 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,665 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,384 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,240 UART: [afmc] --
2,858,242 UART: [cold-reset] --
2,859,194 UART: [state] Locking Datavault
2,860,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,861 UART: [state] Locking ICCM
2,861,313 UART: [exit] Launching FMC @ 0x40000130
2,866,642 UART:
2,866,658 UART: Running Caliptra FMC ...
2,867,066 UART:
2,867,209 UART: [state] CFI Enabled
2,877,866 UART: [fht] FMC Alias Private Key: 7
2,985,555 UART: [art] Extend RT PCRs Done
2,985,983 UART: [art] Lock RT PCRs Done
2,987,467 UART: [art] Populate DV Done
2,995,800 UART: [fht] FMC Alias Private Key: 7
2,996,842 UART: [art] Derive CDI
2,997,122 UART: [art] Store in in slot 0x4
3,082,937 UART: [art] Derive Key Pair
3,083,297 UART: [art] Store priv key in slot 0x5
3,096,197 UART: [art] Derive Key Pair - Done
3,111,085 UART: [art] Signing Cert with AUTHO
3,111,565 UART: RITY.KEYID = 7
3,126,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,228 UART: [art] PUB.X = C6495426DC9B577BA2EF52A7A63C2E091AF34D85D34DDE37A3C6E1B8228B73A4220A37711AC5D1600CCECDCE608E1379
3,134,001 UART: [art] PUB.Y = 95640AB6E2705D8A8B8F3D3AE191DA19EE8A7757DB814B1D9E454606790DE1CAF387D36352ADAEEA4F27CEC1DC6B3CD0
3,140,962 UART: [art] SIG.R = CFA210B663D7EC8D8432D5AEAA85CF6CDD39EE501F78F4F13F50F951985B3F15A16782C4A51164472BD39D059B577363
3,147,735 UART: [art] SIG.S = A56F21F5A1D629EA38DC74E3EDD0C29FFBEFA7923DEF86A1296CA089013359E790E39038EC0DCC176BC6131C56857C5F
3,171,596 UART: Caliptra RT
3,171,942 UART: [state] CFI Enabled
3,278,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,196 UART: [rt]cmd =0x54514754, len=24
3,311,262 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 ready_for_fw is high
1,060,812 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,440 >>> mbox cmd response: success
2,626,440 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,689,740 UART:
2,689,756 UART: Running Caliptra FMC ...
2,690,164 UART:
2,690,307 UART: [state] CFI Enabled
2,700,854 UART: [fht] FMC Alias Private Key: 7
2,808,701 UART: [art] Extend RT PCRs Done
2,809,129 UART: [art] Lock RT PCRs Done
2,810,719 UART: [art] Populate DV Done
2,818,894 UART: [fht] FMC Alias Private Key: 7
2,819,902 UART: [art] Derive CDI
2,820,182 UART: [art] Store in in slot 0x4
2,906,081 UART: [art] Derive Key Pair
2,906,441 UART: [art] Store priv key in slot 0x5
2,919,879 UART: [art] Derive Key Pair - Done
2,934,839 UART: [art] Signing Cert with AUTHO
2,935,319 UART: RITY.KEYID = 7
2,950,381 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,146 UART: [art] PUB.X = 313EE8BAC376D3516C30D52322F0D356A97422AD744D42F8F5B03DDCDC62EF034580770FEA1C4123E5CAA6ECD5C9D68E
2,957,924 UART: [art] PUB.Y = B66935B1D5E159D75E59F6342C9052AB8F9C86AA04AEA9207CA4C11D675144829F0B668F7C6153393737B301D6FB213D
2,964,863 UART: [art] SIG.R = DC36F07191BA924F3C1D734CF9069C58F7FD0B35E6244DF2336DE43C2BFAF53D8260A107358378DBCAA5898AB5AD2420
2,971,634 UART: [art] SIG.S = 4A04E258F433D10F8F59AB22542156FDA15C609092D279FE14E3ED68AC2F36CE684BB23866FD9490C34B84335DD98DB8
2,995,351 UART: Caliptra RT
2,995,697 UART: [state] CFI Enabled
3,103,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,392 UART: [rt]cmd =0x54514754, len=24
3,135,076 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 ready_for_fw is high
1,174,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,439 UART: [idev] Erasing UDS.KEYID = 0
1,199,811 UART: [idev] Sha1 KeyId Algorithm
1,208,657 UART: [idev] --
1,209,638 UART: [ldev] ++
1,209,806 UART: [ldev] CDI.KEYID = 6
1,210,170 UART: [ldev] SUBJECT.KEYID = 5
1,210,597 UART: [ldev] AUTHORITY.KEYID = 7
1,211,060 UART: [ldev] FE.KEYID = 1
1,216,214 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,114 UART: [ldev] --
1,281,536 UART: [fwproc] Wait for Commands...
1,282,333 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,090 >>> mbox cmd response: success
2,772,090 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,173 UART: [afmc] ++
2,773,341 UART: [afmc] CDI.KEYID = 6
2,773,704 UART: [afmc] SUBJECT.KEYID = 7
2,774,130 UART: [afmc] AUTHORITY.KEYID = 5
2,809,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,120 UART: [afmc] --
2,853,070 UART: [cold-reset] --
2,853,870 UART: [state] Locking Datavault
2,854,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,467 UART: [state] Locking ICCM
2,855,973 UART: [exit] Launching FMC @ 0x40000130
2,861,302 UART:
2,861,318 UART: Running Caliptra FMC ...
2,861,726 UART:
2,861,780 UART: [state] CFI Enabled
2,872,453 UART: [fht] FMC Alias Private Key: 7
2,980,646 UART: [art] Extend RT PCRs Done
2,981,074 UART: [art] Lock RT PCRs Done
2,982,630 UART: [art] Populate DV Done
2,990,917 UART: [fht] FMC Alias Private Key: 7
2,991,921 UART: [art] Derive CDI
2,992,201 UART: [art] Store in in slot 0x4
3,077,774 UART: [art] Derive Key Pair
3,078,134 UART: [art] Store priv key in slot 0x5
3,091,448 UART: [art] Derive Key Pair - Done
3,106,258 UART: [art] Signing Cert with AUTHO
3,106,738 UART: RITY.KEYID = 7
3,121,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,747 UART: [art] PUB.X = D30E6A6641FAC16883D7ED0906A6F5B69B2D2E65149F314545420C27C2167111962365B51856D775735AF144EF5D3BA2
3,129,497 UART: [art] PUB.Y = 7FE378DE38DD958707C654F3AC9890485ADA209CB246A7071539105472E702157B74FE9E3FDE6FB7D99C44C9E7C65DE2
3,136,442 UART: [art] SIG.R = AACB44077E8463798A34BDFA99235BA9C100DEEE25A0AF360F349ADEDD874B44BBD192DCBC83E6EBB59F1CF658BAAF09
3,143,209 UART: [art] SIG.S = A7229B76DA5A872C1FBADE9282D548F6623310AF8861E7885040CB05D4C0A49CFC8BE96BF5EEA967D11697B4D80196FC
3,166,780 UART: Caliptra RT
3,167,034 UART: [state] CFI Enabled
3,273,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,630 UART: [rt]cmd =0x54514754, len=24
3,305,656 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 ready_for_fw is high
1,056,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,380 >>> mbox cmd response: success
2,622,380 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,710 UART:
2,684,726 UART: Running Caliptra FMC ...
2,685,134 UART:
2,685,188 UART: [state] CFI Enabled
2,696,163 UART: [fht] FMC Alias Private Key: 7
2,804,108 UART: [art] Extend RT PCRs Done
2,804,536 UART: [art] Lock RT PCRs Done
2,806,264 UART: [art] Populate DV Done
2,814,823 UART: [fht] FMC Alias Private Key: 7
2,815,761 UART: [art] Derive CDI
2,816,041 UART: [art] Store in in slot 0x4
2,902,038 UART: [art] Derive Key Pair
2,902,398 UART: [art] Store priv key in slot 0x5
2,915,702 UART: [art] Derive Key Pair - Done
2,930,609 UART: [art] Signing Cert with AUTHO
2,931,089 UART: RITY.KEYID = 7
2,946,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,928 UART: [art] PUB.X = E8A73FCDF8B809BFCFBB2B56B7BAE4910A59A8FAA25DDA346F15052D8AFA049A5E781F27D40B74ECC9DF29970EED3B24
2,953,708 UART: [art] PUB.Y = ABD5DFFA269A559FC6F7F6D9FCF352FAA1ECF0F880D67498A0B7C742B8E038C499BD8F4D5296C939C80003E75954F78E
2,960,649 UART: [art] SIG.R = A7359A7BD1F485C19071D41FD584B01CD97756D69FDEE02FE0CCE761726E4E90F255DF24DA58D1CFEC54040BB6508C60
2,967,425 UART: [art] SIG.S = EC075A42C598DB5C25F396C8EC5445EB7D6E6BD7639B5C1606D07AFF44BE86952FA05941A1C54EEBF17BAFBB02CB6717
2,991,227 UART: Caliptra RT
2,991,481 UART: [state] CFI Enabled
3,098,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,045 UART: [rt]cmd =0x54514754, len=24
3,130,827 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,174,200 ready_for_fw is high
1,174,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,630 UART: [idev] Erasing UDS.KEYID = 0
1,198,230 UART: [idev] Sha1 KeyId Algorithm
1,206,948 UART: [idev] --
1,208,133 UART: [ldev] ++
1,208,301 UART: [ldev] CDI.KEYID = 6
1,208,665 UART: [ldev] SUBJECT.KEYID = 5
1,209,092 UART: [ldev] AUTHORITY.KEYID = 7
1,209,555 UART: [ldev] FE.KEYID = 1
1,214,417 UART: [ldev] Erasing FE.KEYID = 1
1,240,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,001 UART: [ldev] --
1,280,365 UART: [fwproc] Wait for Commands...
1,281,118 UART: [fwproc] Recv command 0x46574c44
1,281,851 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,911 >>> mbox cmd response: success
2,770,911 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,934 UART: [afmc] ++
2,772,102 UART: [afmc] CDI.KEYID = 6
2,772,465 UART: [afmc] SUBJECT.KEYID = 7
2,772,891 UART: [afmc] AUTHORITY.KEYID = 5
2,808,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,369 UART: [afmc] --
2,852,501 UART: [cold-reset] --
2,853,345 UART: [state] Locking Datavault
2,854,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,210 UART: [state] Locking ICCM
2,855,736 UART: [exit] Launching FMC @ 0x40000130
2,861,065 UART:
2,861,081 UART: Running Caliptra FMC ...
2,861,489 UART:
2,861,632 UART: [state] CFI Enabled
2,872,263 UART: [fht] FMC Alias Private Key: 7
2,980,700 UART: [art] Extend RT PCRs Done
2,981,128 UART: [art] Lock RT PCRs Done
2,982,856 UART: [art] Populate DV Done
2,991,059 UART: [fht] FMC Alias Private Key: 7
2,992,093 UART: [art] Derive CDI
2,992,373 UART: [art] Store in in slot 0x4
3,078,232 UART: [art] Derive Key Pair
3,078,592 UART: [art] Store priv key in slot 0x5
3,092,382 UART: [art] Derive Key Pair - Done
3,107,312 UART: [art] Signing Cert with AUTHO
3,107,792 UART: RITY.KEYID = 7
3,122,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,489 UART: [art] PUB.X = F02CF6A6832C18DF54E37734DDCF31C96D90B47A53218DC1A8F0D76BF9CFAF62CA1DA12417AB242FA12DD679357C8536
3,130,273 UART: [art] PUB.Y = 1745DBC4679A89F75C5453DB9E0F5EF21D1B27991E3F9245B36DD22562F8B16130EAD68499A7DA01410EE60BB6B85E56
3,137,215 UART: [art] SIG.R = F570939CDE6C051A44AB8AF6DD844C4B51ACC0A785FF14A8C6A8314D57E6490A3A0D2844C0551FB358CAE495A0A3062A
3,143,985 UART: [art] SIG.S = F96E0CAA5425ED3CC5867B4FD246BBDC299BDA6A80444AD528F33E1E5B729DDF53FC0ACCD88F202AD44693D3D2CCE4EC
3,167,460 UART: Caliptra RT
3,167,806 UART: [state] CFI Enabled
3,276,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,180 UART: [rt]cmd =0x54514754, len=24
3,307,986 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,285 ready_for_fw is high
1,056,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,659 >>> mbox cmd response: success
2,621,659 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,889 UART:
2,683,905 UART: Running Caliptra FMC ...
2,684,313 UART:
2,684,456 UART: [state] CFI Enabled
2,695,255 UART: [fht] FMC Alias Private Key: 7
2,803,130 UART: [art] Extend RT PCRs Done
2,803,558 UART: [art] Lock RT PCRs Done
2,805,130 UART: [art] Populate DV Done
2,813,561 UART: [fht] FMC Alias Private Key: 7
2,814,571 UART: [art] Derive CDI
2,814,851 UART: [art] Store in in slot 0x4
2,900,668 UART: [art] Derive Key Pair
2,901,028 UART: [art] Store priv key in slot 0x5
2,914,848 UART: [art] Derive Key Pair - Done
2,929,558 UART: [art] Signing Cert with AUTHO
2,930,038 UART: RITY.KEYID = 7
2,945,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,047 UART: [art] PUB.X = 20E1F99EF837FF65ED3617F34682B340C777CFC89DE270CDC00097D869346F502E1A55F72D4B19929E691A25741DC904
2,952,790 UART: [art] PUB.Y = 578001D9042A7A97AB12F725D074B636C2C7499F6F2A3D0FFD51B7F01C2FEAD5E5946587D6B3E19714E81176C6875C0B
2,959,730 UART: [art] SIG.R = 4F7A6553142E409FCBFC36D52567499C599A84ACB3ED25E16481789801EBF60F2727EE321500841D1ECB6B5461A63AE6
2,966,472 UART: [art] SIG.S = DD82199D9CDF4F993C3E553AC9FB6D97B36EAF1095E70A8FB061E91DEE5EE0B43AD684DBB9ED96868034F1536609F7A1
2,990,235 UART: Caliptra RT
2,990,581 UART: [state] CFI Enabled
3,098,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,706 UART: [rt]cmd =0x54514754, len=24
3,130,716 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,591 UART:
192,973 UART: Running Caliptra ROM ...
194,101 UART:
194,240 UART: [state] CFI Enabled
264,588 UART: [state] LifecycleState = Unprovisioned
266,515 UART: [state] DebugLocked = No
267,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,887 UART: [kat] SHA2-256
442,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,149 UART: [kat] ++
453,593 UART: [kat] sha1
465,551 UART: [kat] SHA2-256
468,202 UART: [kat] SHA2-384
474,184 UART: [kat] SHA2-512-ACC
476,613 UART: [kat] ECC-384
2,767,733 UART: [kat] HMAC-384Kdf
2,800,359 UART: [kat] LMS
3,990,605 UART: [kat] --
3,995,539 UART: [cold-reset] ++
3,996,965 UART: [fht] Storing FHT @ 0x50003400
4,008,932 UART: [idev] ++
4,009,500 UART: [idev] CDI.KEYID = 6
4,010,451 UART: [idev] SUBJECT.KEYID = 7
4,011,690 UART: [idev] UDS.KEYID = 0
4,012,638 ready_for_fw is high
4,012,817 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,215 UART: [idev] Erasing UDS.KEYID = 0
7,346,883 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,837 UART: [idev] --
7,372,020 UART: [ldev] ++
7,372,585 UART: [ldev] CDI.KEYID = 6
7,373,593 UART: [ldev] SUBJECT.KEYID = 5
7,374,796 UART: [ldev] AUTHORITY.KEYID = 7
7,376,036 UART: [ldev] FE.KEYID = 1
7,422,471 UART: [ldev] Erasing FE.KEYID = 1
10,754,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,933 UART: [ldev] --
13,115,076 UART: [fwproc] Waiting for Commands...
13,118,031 UART: [fwproc] Received command 0x46574c44
13,120,207 UART: [fwproc] Received Image of size 114036 bytes
17,170,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,665 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,623,270 >>> mbox cmd response: success
17,623,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,627,082 UART: [afmc] ++
17,627,662 UART: [afmc] CDI.KEYID = 6
17,628,564 UART: [afmc] SUBJECT.KEYID = 7
17,629,830 UART: [afmc] AUTHORITY.KEYID = 5
20,987,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,375 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,628 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,037 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,882 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,338 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,904 UART: [afmc] --
23,359,029 UART: [cold-reset] --
23,364,614 UART: [state] Locking Datavault
23,370,236 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,979 UART: [state] Locking ICCM
23,373,396 UART: [exit] Launching FMC @ 0x40000130
23,381,797 UART:
23,382,025 UART: Running Caliptra FMC ...
23,383,046 UART:
23,383,186 UART: [state] CFI Enabled
23,447,294 UART: [fht] FMC Alias Private Key: 7
25,785,050 UART: [art] Extend RT PCRs Done
25,786,272 UART: [art] Lock RT PCRs Done
25,787,974 UART: [art] Populate DV Done
25,793,271 UART: [fht] FMC Alias Private Key: 7
25,794,896 UART: [art] Derive CDI
25,795,635 UART: [art] Store in in slot 0x4
25,855,668 UART: [art] Derive Key Pair
25,856,661 UART: [art] Store priv key in slot 0x5
29,149,659 UART: [art] Derive Key Pair - Done
29,163,144 UART: [art] Signing Cert with AUTHO
29,164,478 UART: RITY.KEYID = 7
31,451,837 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,344 UART: [art] PUB.X = 7837E8FCC2329A885B7A2AD3262150F0C8EE0FB8B1C26A89734DCE13185241D6F6A08CAB78610BE626581AEDB2EA58F1
31,460,575 UART: [art] PUB.Y = 9B9D5570FF36EC745ECB38AA0CC4D9310D7A1E780C541A0D557AE65443F8CFBE2D15F4B7663D0508F26FBA8ACD2F8AC6
31,467,851 UART: [art] SIG.R = CDF105933C8421803104BF36F90A1ACB8B2D883BA17F69E50EA320C2A566F8288893917BA2698357CC12AE59001B9983
31,475,207 UART: [art] SIG.S = CBE219ED32BAD28D31CE5EEAFFD15CAC9636D74F74ED534010E652B449C743CA54D43560A4C6C1B69160CC4DABCCA9BC
32,780,289 UART: Caliptra RT
32,780,999 UART: [state] CFI Enabled
32,941,371 UART: [rt] RT listening for mailbox commands...
32,973,049 UART: [rt]cmd =0x44504543, len=96
33,028,718 >>> mbox cmd response data (56 bytes)
33,030,180 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,060,210 UART: [rt]cmd =0x54514754, len=24
33,062,608 >>> mbox cmd response: failed
33,063,108 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,092,875 UART: [rt]cmd =0x54514754, len=24
33,095,338 >>> mbox cmd response data (8 bytes)
33,095,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,126,343 UART: [rt]cmd =0x44504543, len=96
33,178,583 >>> mbox cmd response data (56 bytes)
33,179,319 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,208,927 UART: [rt]cmd =0x47544744, len=8
33,212,175 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,806,548 ready_for_fw is high
3,806,971 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,874,897 >>> mbox cmd response: success
17,875,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,564,927 UART:
23,565,368 UART: Running Caliptra FMC ...
23,566,465 UART:
23,566,618 UART: [state] CFI Enabled
23,636,556 UART: [fht] FMC Alias Private Key: 7
25,974,179 UART: [art] Extend RT PCRs Done
25,975,445 UART: [art] Lock RT PCRs Done
25,977,214 UART: [art] Populate DV Done
25,982,787 UART: [fht] FMC Alias Private Key: 7
25,984,427 UART: [art] Derive CDI
25,985,160 UART: [art] Store in in slot 0x4
26,044,877 UART: [art] Derive Key Pair
26,045,914 UART: [art] Store priv key in slot 0x5
29,338,698 UART: [art] Derive Key Pair - Done
29,351,804 UART: [art] Signing Cert with AUTHO
29,353,103 UART: RITY.KEYID = 7
31,640,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,618 UART: [art] PUB.X = 2FC98944E1313CBCC47DFDB7D4FB6D0D7C80071BDB86371DEDDCAC2587C0EDB9BE1A7C3BE272DF4256928AE822D72511
31,648,916 UART: [art] PUB.Y = 330A381554E7DEF72B34FA1999E397ED5C0E950C4FAA5FF6552FC168CCC6995880D9B31BEA20A69C6CD74BA6409C4B08
31,656,191 UART: [art] SIG.R = B374A3BF20BCFBE79471001371275F1C854AAC8F4374491D841677C1CDA4754EDBEC68EF30AA420060B6932535D570F9
31,663,531 UART: [art] SIG.S = 6C233261313EE0C218841B5896C9A636867BF152FB4FEAAF70DF1E010198E4A7A60BB5C7E0989D4FCE19D32719C15673
32,969,391 UART: Caliptra RT
32,970,103 UART: [state] CFI Enabled
33,130,709 UART: [rt] RT listening for mailbox commands...
33,162,327 UART: [rt]cmd =0x44504543, len=96
33,219,151 >>> mbox cmd response data (56 bytes)
33,220,628 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,250,396 UART: [rt]cmd =0x54514754, len=24
33,252,709 >>> mbox cmd response: failed
33,253,203 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,282,993 UART: [rt]cmd =0x54514754, len=24
33,285,638 >>> mbox cmd response data (8 bytes)
33,286,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,316,628 UART: [rt]cmd =0x44504543, len=96
33,368,208 >>> mbox cmd response data (56 bytes)
33,368,917 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,398,679 UART: [rt]cmd =0x47544744, len=8
33,401,640 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,466 UART:
192,834 UART: Running Caliptra ROM ...
194,020 UART:
603,596 UART: [state] CFI Enabled
618,956 UART: [state] LifecycleState = Unprovisioned
620,894 UART: [state] DebugLocked = No
623,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,995 UART: [kat] SHA2-256
798,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,307 UART: [kat] ++
809,786 UART: [kat] sha1
821,013 UART: [kat] SHA2-256
823,748 UART: [kat] SHA2-384
829,736 UART: [kat] SHA2-512-ACC
832,245 UART: [kat] ECC-384
3,116,738 UART: [kat] HMAC-384Kdf
3,128,754 UART: [kat] LMS
4,318,814 UART: [kat] --
4,322,829 UART: [cold-reset] ++
4,324,545 UART: [fht] Storing FHT @ 0x50003400
4,335,593 UART: [idev] ++
4,336,152 UART: [idev] CDI.KEYID = 6
4,337,029 UART: [idev] SUBJECT.KEYID = 7
4,338,339 UART: [idev] UDS.KEYID = 0
4,339,297 ready_for_fw is high
4,339,498 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,707 UART: [idev] Erasing UDS.KEYID = 0
7,626,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,152 UART: [idev] --
7,652,670 UART: [ldev] ++
7,653,270 UART: [ldev] CDI.KEYID = 6
7,654,249 UART: [ldev] SUBJECT.KEYID = 5
7,655,409 UART: [ldev] AUTHORITY.KEYID = 7
7,656,702 UART: [ldev] FE.KEYID = 1
7,667,593 UART: [ldev] Erasing FE.KEYID = 1
10,955,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,948 UART: [ldev] --
13,316,395 UART: [fwproc] Waiting for Commands...
13,319,470 UART: [fwproc] Received command 0x46574c44
13,321,705 UART: [fwproc] Received Image of size 114036 bytes
17,376,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,837,365 >>> mbox cmd response: success
17,837,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,840,684 UART: [afmc] ++
17,841,268 UART: [afmc] CDI.KEYID = 6
17,842,234 UART: [afmc] SUBJECT.KEYID = 7
17,843,449 UART: [afmc] AUTHORITY.KEYID = 5
21,158,839 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,128 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,538 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,369 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,822 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,187 UART: [afmc] --
23,520,830 UART: [cold-reset] --
23,524,744 UART: [state] Locking Datavault
23,529,032 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,737 UART: [state] Locking ICCM
23,533,261 UART: [exit] Launching FMC @ 0x40000130
23,541,659 UART:
23,541,890 UART: Running Caliptra FMC ...
23,542,988 UART:
23,543,143 UART: [state] CFI Enabled
23,551,724 UART: [fht] FMC Alias Private Key: 7
25,883,174 UART: [art] Extend RT PCRs Done
25,884,399 UART: [art] Lock RT PCRs Done
25,885,997 UART: [art] Populate DV Done
25,891,566 UART: [fht] FMC Alias Private Key: 7
25,893,047 UART: [art] Derive CDI
25,893,780 UART: [art] Store in in slot 0x4
25,936,309 UART: [art] Derive Key Pair
25,937,309 UART: [art] Store priv key in slot 0x5
29,178,845 UART: [art] Derive Key Pair - Done
29,191,665 UART: [art] Signing Cert with AUTHO
29,192,973 UART: RITY.KEYID = 7
31,472,008 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,643 UART: [art] PUB.X = 668AC9B6DA33253685B64BC06DE997505885E507874E0374758DA62738296030400E66CFE43B857A8AA3EAF0A5B43048
31,480,728 UART: [art] PUB.Y = B510A4E4F97C0F62F4A6B24A5FFE1AE45A169D90B28B0C944AC93F1F03DFB68B6EA6BF896F1FD08685F098698C89E799
31,488,016 UART: [art] SIG.R = 388B2A8876FF0C7BA90248FC286A675F9FC36F50112C254856BDBB6800E172E82CA139C39A48174CD59CE9BDEA2C55CA
31,495,363 UART: [art] SIG.S = 373DB4CA00973ECD0FE53E34106B7C1F0591EFAA628A45A428ABB21D2CBE5D3B76E6BD0C881CC26302CCD421A032F41A
32,800,443 UART: Caliptra RT
32,801,151 UART: [state] CFI Enabled
32,918,969 UART: [rt] RT listening for mailbox commands...
32,950,600 UART: [rt]cmd =0x44504543, len=96
32,994,212 >>> mbox cmd response data (56 bytes)
32,995,626 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,025,544 UART: [rt]cmd =0x54514754, len=24
33,027,698 >>> mbox cmd response: failed
33,028,130 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,058,194 UART: [rt]cmd =0x54514754, len=24
33,060,735 >>> mbox cmd response data (8 bytes)
33,061,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,091,669 UART: [rt]cmd =0x44504543, len=96
33,135,870 >>> mbox cmd response data (56 bytes)
33,136,566 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,166,136 UART: [rt]cmd =0x47544744, len=8
33,169,321 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
4,131,050 ready_for_fw is high
4,131,431 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,087,548 >>> mbox cmd response: success
18,088,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,728,736 UART:
23,729,125 UART: Running Caliptra FMC ...
23,730,227 UART:
23,730,401 UART: [state] CFI Enabled
23,738,408 UART: [fht] FMC Alias Private Key: 7
26,068,929 UART: [art] Extend RT PCRs Done
26,070,156 UART: [art] Lock RT PCRs Done
26,071,650 UART: [art] Populate DV Done
26,077,179 UART: [fht] FMC Alias Private Key: 7
26,078,832 UART: [art] Derive CDI
26,079,572 UART: [art] Store in in slot 0x4
26,121,953 UART: [art] Derive Key Pair
26,122,956 UART: [art] Store priv key in slot 0x5
29,365,004 UART: [art] Derive Key Pair - Done
29,378,123 UART: [art] Signing Cert with AUTHO
29,379,425 UART: RITY.KEYID = 7
31,659,049 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,563 UART: [art] PUB.X = 29B42BC258294F38C839C4798EE719050B58D53BE952B96554D68E20612D5EE415BC5DF6064243804C9942F9F75E88F9
31,667,778 UART: [art] PUB.Y = 2DD42B0FA4F88DF11B4718E72193D4FD4B8309B04504B98A4E0370CE0987D1E28F0D3436562137657EE15ABDCA39A65D
31,675,041 UART: [art] SIG.R = 6C060E88B77E6F5189FC3715E717064BD79ECDC9648F231D3F7DB278EB3048D4862C8A376D89C5667B13080AD82E3E57
31,682,363 UART: [art] SIG.S = C3F1FA10876D4630FD8AE03D48B6CD692C17B9D0BFDEEAA048A2C327174BD48C57858CF84EE1D959D884E1FAEE8D47E4
32,987,358 UART: Caliptra RT
32,988,070 UART: [state] CFI Enabled
33,105,621 UART: [rt] RT listening for mailbox commands...
33,137,326 UART: [rt]cmd =0x44504543, len=96
33,181,734 >>> mbox cmd response data (56 bytes)
33,183,146 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,213,201 UART: [rt]cmd =0x54514754, len=24
33,215,485 >>> mbox cmd response: failed
33,215,915 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,245,710 UART: [rt]cmd =0x54514754, len=24
33,248,304 >>> mbox cmd response data (8 bytes)
33,248,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,279,423 UART: [rt]cmd =0x44504543, len=96
33,323,115 >>> mbox cmd response data (56 bytes)
33,323,833 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,353,680 UART: [rt]cmd =0x47544744, len=8
33,356,703 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,510 UART:
192,885 UART: Running Caliptra ROM ...
193,994 UART:
194,138 UART: [state] CFI Enabled
263,978 UART: [state] LifecycleState = Unprovisioned
265,921 UART: [state] DebugLocked = No
267,679 UART: [state] WD Timer not started. Device not locked for debugging
271,155 UART: [kat] SHA2-256
450,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,859 UART: [kat] ++
462,394 UART: [kat] sha1
473,417 UART: [kat] SHA2-256
476,432 UART: [kat] SHA2-384
481,500 UART: [kat] SHA2-512-ACC
484,511 UART: [kat] ECC-384
2,947,314 UART: [kat] HMAC-384Kdf
2,971,300 UART: [kat] LMS
3,500,708 UART: [kat] --
3,506,616 UART: [cold-reset] ++
3,508,265 UART: [fht] FHT @ 0x50003400
3,519,387 UART: [idev] ++
3,519,977 UART: [idev] CDI.KEYID = 6
3,520,905 UART: [idev] SUBJECT.KEYID = 7
3,522,083 UART: [idev] UDS.KEYID = 0
3,523,016 ready_for_fw is high
3,523,212 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,033 UART: [idev] Erasing UDS.KEYID = 0
6,026,886 UART: [idev] Sha1 KeyId Algorithm
6,049,414 UART: [idev] --
6,054,656 UART: [ldev] ++
6,055,232 UART: [ldev] CDI.KEYID = 6
6,056,145 UART: [ldev] SUBJECT.KEYID = 5
6,057,303 UART: [ldev] AUTHORITY.KEYID = 7
6,058,539 UART: [ldev] FE.KEYID = 1
6,100,897 UART: [ldev] Erasing FE.KEYID = 1
8,602,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,867 UART: [ldev] --
10,413,945 UART: [fwproc] Wait for Commands...
10,416,849 UART: [fwproc] Recv command 0x46574c44
10,418,942 UART: [fwproc] Recv'd Img size: 114360 bytes
13,825,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,545 >>> mbox cmd response: success
14,284,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,288,510 UART: [afmc] ++
14,289,096 UART: [afmc] CDI.KEYID = 6
14,289,989 UART: [afmc] SUBJECT.KEYID = 7
14,291,206 UART: [afmc] AUTHORITY.KEYID = 5
16,819,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,544,969 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,560,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,576,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,592,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,614,462 UART: [afmc] --
18,618,232 UART: [cold-reset] --
18,621,343 UART: [state] Locking Datavault
18,626,383 UART: [state] Locking PCR0, PCR1 and PCR31
18,628,088 UART: [state] Locking ICCM
18,630,405 UART: [exit] Launching FMC @ 0x40000130
18,638,814 UART:
18,639,058 UART: Running Caliptra FMC ...
18,640,166 UART:
18,640,326 UART: [state] CFI Enabled
18,701,934 UART: [fht] FMC Alias Private Key: 7
20,465,981 UART: [art] Extend RT PCRs Done
20,467,187 UART: [art] Lock RT PCRs Done
20,469,027 UART: [art] Populate DV Done
20,474,600 UART: [fht] FMC Alias Private Key: 7
20,476,245 UART: [art] Derive CDI
20,476,983 UART: [art] Store in in slot 0x4
20,534,539 UART: [art] Derive Key Pair
20,535,577 UART: [art] Store priv key in slot 0x5
22,998,537 UART: [art] Derive Key Pair - Done
23,011,765 UART: [art] Signing Cert with AUTHO
23,013,079 UART: RITY.KEYID = 7
24,724,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,777 UART: [art] PUB.X = 56E03237630305D8F6D5454F0B379622728E79918D0A2AC4248AA98961B1262C60512903FE35F22FF13C754B8AC119CD
24,733,019 UART: [art] PUB.Y = AD2779961585D9CCCDBF558E7795C2CDA1B21A641D4F684B9C29F56BA5F35C82CD35D641941744EFDF4CC49E71D13E3E
24,740,439 UART: [art] SIG.R = C197F68F25640B1B044553BFCBBED9EF06F05C9CFC7CBDAB8696298FB9A769CBA5EEBD387FD91458A9EFB80711FBD1F8
24,747,740 UART: [art] SIG.S = 5E81CCA211CF8CF14B5B21195CE22D1E12305720BC720D44CEB9708AE94A7E585D859423BCD97E5EEFC73B79724C7AEE
25,726,656 UART: Caliptra RT
25,727,371 UART: [state] CFI Enabled
25,891,866 UART: [rt] RT listening for mailbox commands...
25,923,504 UART: [rt]cmd =0x44504543, len=96
25,980,847 >>> mbox cmd response data (56 bytes)
25,982,194 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,012,179 UART: [rt]cmd =0x54514754, len=24
26,014,333 >>> mbox cmd response: failed
26,014,754 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,044,681 UART: [rt]cmd =0x54514754, len=24
26,047,360 >>> mbox cmd response data (8 bytes)
26,047,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,078,338 UART: [rt]cmd =0x44504543, len=96
26,129,823 >>> mbox cmd response data (56 bytes)
26,130,558 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,160,352 UART: [rt]cmd =0x47544744, len=8
26,163,612 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,454 UART:
192,839 UART: Running Caliptra ROM ...
194,040 UART:
194,204 UART: [state] CFI Enabled
267,254 UART: [state] LifecycleState = Unprovisioned
269,793 UART: [state] DebugLocked = No
272,393 UART: [state] WD Timer not started. Device not locked for debugging
276,367 UART: [kat] SHA2-256
466,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,049 UART: [kat] ++
477,591 UART: [kat] sha1
487,550 UART: [kat] SHA2-256
490,566 UART: [kat] SHA2-384
497,199 UART: [kat] SHA2-512-ACC
499,783 UART: [kat] ECC-384
2,950,121 UART: [kat] HMAC-384Kdf
2,973,776 UART: [kat] LMS
3,505,551 UART: [kat] --
3,508,431 UART: [cold-reset] ++
3,509,658 UART: [fht] FHT @ 0x50003400
3,522,130 UART: [idev] ++
3,522,767 UART: [idev] CDI.KEYID = 6
3,523,753 UART: [idev] SUBJECT.KEYID = 7
3,524,927 UART: [idev] UDS.KEYID = 0
3,525,853 ready_for_fw is high
3,526,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,979 UART: [idev] Erasing UDS.KEYID = 0
6,032,130 UART: [idev] Sha1 KeyId Algorithm
6,054,285 UART: [idev] --
6,060,450 UART: [ldev] ++
6,061,139 UART: [ldev] CDI.KEYID = 6
6,062,057 UART: [ldev] SUBJECT.KEYID = 5
6,063,242 UART: [ldev] AUTHORITY.KEYID = 7
6,064,425 UART: [ldev] FE.KEYID = 1
6,101,488 UART: [ldev] Erasing FE.KEYID = 1
8,608,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,477 UART: [ldev] --
10,414,258 UART: [fwproc] Wait for Commands...
10,415,810 UART: [fwproc] Recv command 0x46574c44
10,418,118 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,801 >>> mbox cmd response: success
14,601,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,604,703 UART: [afmc] ++
14,605,398 UART: [afmc] CDI.KEYID = 6
14,606,646 UART: [afmc] SUBJECT.KEYID = 7
14,608,092 UART: [afmc] AUTHORITY.KEYID = 5
17,154,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,402 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,394 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,961 UART: [afmc] --
18,973,090 UART: [cold-reset] --
18,978,305 UART: [state] Locking Datavault
18,983,292 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,427 UART: [state] Locking ICCM
18,987,204 UART: [exit] Launching FMC @ 0x40000130
18,995,865 UART:
18,996,113 UART: Running Caliptra FMC ...
18,997,140 UART:
18,997,286 UART: [state] CFI Enabled
19,053,684 UART: [fht] FMC Alias Private Key: 7
20,817,331 UART: [art] Extend RT PCRs Done
20,818,552 UART: [art] Lock RT PCRs Done
20,820,153 UART: [art] Populate DV Done
20,825,560 UART: [fht] FMC Alias Private Key: 7
20,827,211 UART: [art] Derive CDI
20,827,976 UART: [art] Store in in slot 0x4
20,885,752 UART: [art] Derive Key Pair
20,886,788 UART: [art] Store priv key in slot 0x5
23,349,757 UART: [art] Derive Key Pair - Done
23,362,814 UART: [art] Signing Cert with AUTHO
23,364,144 UART: RITY.KEYID = 7
25,075,397 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,913 UART: [art] PUB.X = B2436F478FC54A3408F86ADC65E4B84C46D8B97438FD1BE98E87B99104B0708B6F5A795C950FADDD85D7260CEB7611FB
25,084,162 UART: [art] PUB.Y = 554D10F058FCDBA7600EDE553D83DD68B15517C5DA2BE3AA26BE904EBF88491BE7E474CCF99BA30019E128CAB149B97F
25,091,444 UART: [art] SIG.R = 2ABD83B28ABFEDCCB574EC6C1121B7C092012B074310602E9F8A1849B7C534024F4D76DB5EF6952A289CC57247A63D37
25,098,827 UART: [art] SIG.S = 3BFEEB73C09F80DA4DF292E1DCD33A6609FAF8577E8D76F2D4BC6F79258E850F0BF66E973A9832376D4D2B2EA1D03306
26,077,699 UART: Caliptra RT
26,078,392 UART: [state] CFI Enabled
26,243,720 UART: [rt] RT listening for mailbox commands...
26,275,491 UART: [rt]cmd =0x44504543, len=96
26,330,878 >>> mbox cmd response data (56 bytes)
26,332,327 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,362,375 UART: [rt]cmd =0x54514754, len=24
26,364,555 >>> mbox cmd response: failed
26,365,074 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,394,981 UART: [rt]cmd =0x54514754, len=24
26,397,591 >>> mbox cmd response data (8 bytes)
26,398,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,428,791 UART: [rt]cmd =0x44504543, len=96
26,480,083 >>> mbox cmd response data (56 bytes)
26,480,794 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,510,573 UART: [rt]cmd =0x47544744, len=8
26,513,593 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,528 writing to cptra_bootfsm_go
3,435,976 ready_for_fw is high
3,436,508 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,727,114 >>> mbox cmd response: success
14,727,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,021,653 UART:
19,022,068 UART: Running Caliptra FMC ...
19,023,212 UART:
19,023,375 UART: [state] CFI Enabled
19,089,391 UART: [fht] FMC Alias Private Key: 7
20,853,081 UART: [art] Extend RT PCRs Done
20,854,308 UART: [art] Lock RT PCRs Done
20,855,988 UART: [art] Populate DV Done
20,861,508 UART: [fht] FMC Alias Private Key: 7
20,863,042 UART: [art] Derive CDI
20,863,818 UART: [art] Store in in slot 0x4
20,921,319 UART: [art] Derive Key Pair
20,922,321 UART: [art] Store priv key in slot 0x5
23,385,746 UART: [art] Derive Key Pair - Done
23,399,062 UART: [art] Signing Cert with AUTHO
23,400,375 UART: RITY.KEYID = 7
25,110,965 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,497 UART: [art] PUB.X = 81DBEE68E6D8548FE81B702F29A357D05AFF29456B7C17965AC8BC8BB88647F4D5970EE325B6B4991110319FD5587E15
25,119,745 UART: [art] PUB.Y = CF377390B9CC4B2D24ACBCE2DF112D1AA377A755109D64EEFA74679912430C5DAAA9978F5D2F6D3DA4D20FEFAFDAA4B3
25,126,984 UART: [art] SIG.R = FB2300401EF481E9EDA8218E0F4B844DA27BB9EA071183210351F98F45F7B595E9D3F98C7DA109CB99207B458B3F446D
25,134,367 UART: [art] SIG.S = 75C6A7F200A8B20DC4F9351AD8BC7C721CAE65371489781261EEF2C5178A9D72A8BC2F2B2A7D3A352BC99554DA50036C
26,113,274 UART: Caliptra RT
26,113,990 UART: [state] CFI Enabled
26,277,418 UART: [rt] RT listening for mailbox commands...
26,309,366 UART: [rt]cmd =0x44504543, len=96
26,366,362 >>> mbox cmd response data (56 bytes)
26,367,694 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,397,794 UART: [rt]cmd =0x54514754, len=24
26,400,302 >>> mbox cmd response: failed
26,400,784 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,430,843 UART: [rt]cmd =0x54514754, len=24
26,433,389 >>> mbox cmd response data (8 bytes)
26,433,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,464,370 UART: [rt]cmd =0x44504543, len=96
26,516,015 >>> mbox cmd response data (56 bytes)
26,516,712 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,546,498 UART: [rt]cmd =0x47544744, len=8
26,549,516 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,361 UART:
192,724 UART: Running Caliptra ROM ...
193,914 UART:
603,364 UART: [state] CFI Enabled
616,533 UART: [state] LifecycleState = Unprovisioned
618,895 UART: [state] DebugLocked = No
620,555 UART: [state] WD Timer not started. Device not locked for debugging
624,792 UART: [kat] SHA2-256
814,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,451 UART: [kat] ++
825,975 UART: [kat] sha1
837,341 UART: [kat] SHA2-256
840,356 UART: [kat] SHA2-384
845,644 UART: [kat] SHA2-512-ACC
848,225 UART: [kat] ECC-384
3,292,037 UART: [kat] HMAC-384Kdf
3,304,985 UART: [kat] LMS
3,836,822 UART: [kat] --
3,841,972 UART: [cold-reset] ++
3,844,276 UART: [fht] FHT @ 0x50003400
3,856,883 UART: [idev] ++
3,857,523 UART: [idev] CDI.KEYID = 6
3,858,476 UART: [idev] SUBJECT.KEYID = 7
3,859,715 UART: [idev] UDS.KEYID = 0
3,860,617 ready_for_fw is high
3,860,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,410 UART: [idev] Erasing UDS.KEYID = 0
6,334,964 UART: [idev] Sha1 KeyId Algorithm
6,357,790 UART: [idev] --
6,363,079 UART: [ldev] ++
6,363,755 UART: [ldev] CDI.KEYID = 6
6,364,695 UART: [ldev] SUBJECT.KEYID = 5
6,365,850 UART: [ldev] AUTHORITY.KEYID = 7
6,367,079 UART: [ldev] FE.KEYID = 1
6,377,483 UART: [ldev] Erasing FE.KEYID = 1
8,856,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,625 UART: [ldev] --
10,646,547 UART: [fwproc] Wait for Commands...
10,648,150 UART: [fwproc] Recv command 0x46574c44
10,650,463 UART: [fwproc] Recv'd Img size: 114360 bytes
14,094,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,836,753 >>> mbox cmd response: success
14,837,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,840,478 UART: [afmc] ++
14,841,170 UART: [afmc] CDI.KEYID = 6
14,842,423 UART: [afmc] SUBJECT.KEYID = 7
14,843,860 UART: [afmc] AUTHORITY.KEYID = 5
17,346,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,346 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,680 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,233 UART: [afmc] --
19,144,072 UART: [cold-reset] --
19,149,238 UART: [state] Locking Datavault
19,152,591 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,772 UART: [state] Locking ICCM
19,156,704 UART: [exit] Launching FMC @ 0x40000130
19,165,365 UART:
19,165,606 UART: Running Caliptra FMC ...
19,166,727 UART:
19,166,885 UART: [state] CFI Enabled
19,174,718 UART: [fht] FMC Alias Private Key: 7
20,931,784 UART: [art] Extend RT PCRs Done
20,933,003 UART: [art] Lock RT PCRs Done
20,934,306 UART: [art] Populate DV Done
20,939,659 UART: [fht] FMC Alias Private Key: 7
20,941,242 UART: [art] Derive CDI
20,942,053 UART: [art] Store in in slot 0x4
20,984,270 UART: [art] Derive Key Pair
20,985,306 UART: [art] Store priv key in slot 0x5
23,411,261 UART: [art] Derive Key Pair - Done
23,424,303 UART: [art] Signing Cert with AUTHO
23,425,604 UART: RITY.KEYID = 7
25,131,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,752 UART: [art] PUB.X = B1CE4D8235B894A93994C87FC08ECA19E5A994051EFB2072C02D5CFCE0AF64710840BEC86ACBA1F31BCE934A40BCC474
25,140,073 UART: [art] PUB.Y = 3B9ED49A58D633F98E0DA38CCBB4A55A1F4C40CFE5327103F2B9610EC51CAE2FBF0E32A782CF9DCEF9DAA73A9F38A00C
25,147,377 UART: [art] SIG.R = 3F463CD330E31AA30E755E640DF6D305DD9C25ED1E5F6109F369AEF7785CD5184EDB302D2FDBAF68F649B9F06DFC7BC5
25,154,823 UART: [art] SIG.S = 6D74E5ECB04566C09C8DA64D39BC8A81A723BE08904D516B3143F808D09DB304D902C079BCB0A5456A16C553D296B07B
26,134,541 UART: Caliptra RT
26,135,229 UART: [state] CFI Enabled
26,252,412 UART: [rt] RT listening for mailbox commands...
26,283,877 UART: [rt]cmd =0x44504543, len=96
26,328,307 >>> mbox cmd response data (56 bytes)
26,329,698 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,359,669 UART: [rt]cmd =0x54514754, len=24
26,362,184 >>> mbox cmd response: failed
26,362,615 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,392,537 UART: [rt]cmd =0x54514754, len=24
26,395,327 >>> mbox cmd response data (8 bytes)
26,395,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,426,295 UART: [rt]cmd =0x44504543, len=96
26,469,643 >>> mbox cmd response data (56 bytes)
26,470,382 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,500,045 UART: [rt]cmd =0x47544744, len=8
26,503,139 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,752,353 ready_for_fw is high
3,753,090 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,960,110 >>> mbox cmd response: success
14,960,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,209,963 UART:
19,210,374 UART: Running Caliptra FMC ...
19,211,513 UART:
19,211,672 UART: [state] CFI Enabled
19,219,303 UART: [fht] FMC Alias Private Key: 7
20,977,007 UART: [art] Extend RT PCRs Done
20,978,229 UART: [art] Lock RT PCRs Done
20,979,801 UART: [art] Populate DV Done
20,985,268 UART: [fht] FMC Alias Private Key: 7
20,986,871 UART: [art] Derive CDI
20,987,688 UART: [art] Store in in slot 0x4
21,030,610 UART: [art] Derive Key Pair
21,031,654 UART: [art] Store priv key in slot 0x5
23,458,507 UART: [art] Derive Key Pair - Done
23,471,719 UART: [art] Signing Cert with AUTHO
23,473,023 UART: RITY.KEYID = 7
25,178,435 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,957 UART: [art] PUB.X = 9C9CA26F3EED1E3CB8AFE9700E6C885C30C38D9990912B7B84B6ACAEAD0C5D1B28817A1A4AF0813A6AB9D9D82558A7A2
25,187,198 UART: [art] PUB.Y = 2CED15DDF9B24801EE78F553A0B12531D8CC86A7187EBB09B8BD262FE8FE2D1EF3C184B2DA3727A2B62C4B8FDDEBE958
25,194,495 UART: [art] SIG.R = 83E99F206D75945A441DEE3366FBD7ACBAC8947C45FA3B67C0E55CF07037E0DC3530A812C3CD70B7E9C23734ACC09A6E
25,201,949 UART: [art] SIG.S = FB499411B637985B15892DF04A3864AEEE93285D1F90B468AF1119A2CBC85F4FA672F8F1F9B5EA231E41909D71E00856
26,181,421 UART: Caliptra RT
26,182,137 UART: [state] CFI Enabled
26,299,814 UART: [rt] RT listening for mailbox commands...
26,331,445 UART: [rt]cmd =0x44504543, len=96
26,375,822 >>> mbox cmd response data (56 bytes)
26,377,172 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,407,519 UART: [rt]cmd =0x54514754, len=24
26,409,817 >>> mbox cmd response: failed
26,410,306 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,440,238 UART: [rt]cmd =0x54514754, len=24
26,442,754 >>> mbox cmd response data (8 bytes)
26,443,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,474,012 UART: [rt]cmd =0x44504543, len=96
26,517,800 >>> mbox cmd response data (56 bytes)
26,518,529 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,548,407 UART: [rt]cmd =0x47544744, len=8
26,551,445 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,146 UART: [kat] SHA2-512-ACC
897,047 UART: [kat] ECC-384
902,316 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,414 UART: [idev] ++
1,479,582 UART: [idev] CDI.KEYID = 6
1,479,942 UART: [idev] SUBJECT.KEYID = 7
1,480,366 UART: [idev] UDS.KEYID = 0
1,480,711 ready_for_fw is high
1,480,711 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,498 UART: [idev] --
1,514,379 UART: [ldev] ++
1,514,547 UART: [ldev] CDI.KEYID = 6
1,514,910 UART: [ldev] SUBJECT.KEYID = 5
1,515,336 UART: [ldev] AUTHORITY.KEYID = 7
1,515,799 UART: [ldev] FE.KEYID = 1
1,520,953 UART: [ldev] Erasing FE.KEYID = 1
1,546,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,200 UART: [ldev] --
1,586,633 UART: [fwproc] Waiting for Commands...
1,587,438 UART: [fwproc] Received command 0x46574c44
1,588,229 UART: [fwproc] Received Image of size 114360 bytes
2,887,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,123 >>> mbox cmd response: success
3,080,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,081,265 UART: [afmc] ++
3,081,433 UART: [afmc] CDI.KEYID = 6
3,081,795 UART: [afmc] SUBJECT.KEYID = 7
3,082,220 UART: [afmc] AUTHORITY.KEYID = 5
3,116,883 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,749 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,529 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,257 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,142 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,832 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,655 UART: [afmc] --
3,159,781 UART: [cold-reset] --
3,160,449 UART: [state] Locking Datavault
3,161,666 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,270 UART: [state] Locking ICCM
3,162,730 UART: [exit] Launching FMC @ 0x40000130
3,168,059 UART:
3,168,075 UART: Running Caliptra FMC ...
3,168,483 UART:
3,168,537 UART: [state] CFI Enabled
3,178,832 UART: [fht] FMC Alias Private Key: 7
3,286,743 UART: [art] Extend RT PCRs Done
3,287,171 UART: [art] Lock RT PCRs Done
3,288,443 UART: [art] Populate DV Done
3,296,876 UART: [fht] FMC Alias Private Key: 7
3,297,894 UART: [art] Derive CDI
3,298,174 UART: [art] Store in in slot 0x4
3,383,941 UART: [art] Derive Key Pair
3,384,301 UART: [art] Store priv key in slot 0x5
3,397,193 UART: [art] Derive Key Pair - Done
3,411,889 UART: [art] Signing Cert with AUTHO
3,412,369 UART: RITY.KEYID = 7
3,427,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,832 UART: [art] PUB.X = 01F669EBA322DA78BA4986F0D5FB8F7A171ECDFDEA10BF7F289D2B5014843806CABCB47DC6FC86B9E7E63A6B486268E7
3,434,616 UART: [art] PUB.Y = D4FCCB8ACDE8A270CAF76F9C1FE80DA713060BCEEDE3EB436424567DC7634BA02EC4520F8B140475F246AFC58E9A3A65
3,441,573 UART: [art] SIG.R = C5F1E8D101879249AC9FF0C0405EEE334E0B07A80DE82143A6DB65FA1064AD6392ADEF77C29D452FED4798C08E4F0045
3,448,319 UART: [art] SIG.S = BE9602CA1A04C3582187FA0B668BDB9586A8A9B838307A92B929456C42F56650C73F21FC13EAF1E3A7C3D581101C2923
3,472,147 UART: Caliptra RT
3,472,401 UART: [state] CFI Enabled
3,581,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,199 UART: [rt]cmd =0x44504543, len=96
3,656,931 >>> mbox cmd response data (56 bytes)
3,656,932 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,385 UART: [rt]cmd =0x54514754, len=24
3,688,011 >>> mbox cmd response: failed
3,688,011 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,717,555 UART: [rt]cmd =0x54514754, len=24
3,719,729 >>> mbox cmd response data (8 bytes)
3,719,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,789 UART: [rt]cmd =0x44504543, len=96
3,793,894 >>> mbox cmd response data (56 bytes)
3,793,895 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,308 UART: [rt]cmd =0x47544744, len=8
3,826,066 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,847 ready_for_fw is high
1,362,847 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,189 >>> mbox cmd response: success
2,927,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,988,759 UART:
2,988,775 UART: Running Caliptra FMC ...
2,989,183 UART:
2,989,237 UART: [state] CFI Enabled
2,999,994 UART: [fht] FMC Alias Private Key: 7
3,108,111 UART: [art] Extend RT PCRs Done
3,108,539 UART: [art] Lock RT PCRs Done
3,110,239 UART: [art] Populate DV Done
3,118,304 UART: [fht] FMC Alias Private Key: 7
3,119,302 UART: [art] Derive CDI
3,119,582 UART: [art] Store in in slot 0x4
3,205,291 UART: [art] Derive Key Pair
3,205,651 UART: [art] Store priv key in slot 0x5
3,218,589 UART: [art] Derive Key Pair - Done
3,233,694 UART: [art] Signing Cert with AUTHO
3,234,174 UART: RITY.KEYID = 7
3,249,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,023 UART: [art] PUB.X = 39DEFDEB33EF79BF1EC5108E798A1BE577654ED07EB98A366954AEA39770114D30F5F0244087EB2C9834B752E31AB6E6
3,256,801 UART: [art] PUB.Y = A92D5A5DF3A1308AC99CEF7C2CE572609241223A3EF104E04C5D502F7593635C8A855E099D9DF09F1D46B44F92DDA41F
3,263,753 UART: [art] SIG.R = 978DABB75293B7B5B586B19E871F46E83878CEB2C4FFF73D979EC474D03B303868BD82A3FF22FEC524F7125B55B0624D
3,270,531 UART: [art] SIG.S = 04568BF6971D4CC87C6742661E25163D0B541DEF7E79E25CA2228F9A3198132559D0D4908AD91115037887609175A546
3,294,253 UART: Caliptra RT
3,294,507 UART: [state] CFI Enabled
3,402,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,918 UART: [rt]cmd =0x44504543, len=96
3,477,370 >>> mbox cmd response data (56 bytes)
3,477,371 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,858 UART: [rt]cmd =0x54514754, len=24
3,508,822 >>> mbox cmd response: failed
3,508,822 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,442 UART: [rt]cmd =0x54514754, len=24
3,540,644 >>> mbox cmd response data (8 bytes)
3,540,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,470 UART: [rt]cmd =0x44504543, len=96
3,614,571 >>> mbox cmd response data (56 bytes)
3,614,572 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,821 UART: [rt]cmd =0x47544744, len=8
3,646,417 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,538 UART: [kat] SHA2-256
882,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,584 UART: [kat] ++
886,736 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,849 UART: [kat] SHA2-512-ACC
897,750 UART: [kat] ECC-384
903,295 UART: [kat] HMAC-384Kdf
907,959 UART: [kat] LMS
1,476,155 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,396 UART: [fht] Storing FHT @ 0x50003400
1,480,025 UART: [idev] ++
1,480,193 UART: [idev] CDI.KEYID = 6
1,480,553 UART: [idev] SUBJECT.KEYID = 7
1,480,977 UART: [idev] UDS.KEYID = 0
1,481,322 ready_for_fw is high
1,481,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,969 UART: [idev] Erasing UDS.KEYID = 0
1,506,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,745 UART: [idev] --
1,515,812 UART: [ldev] ++
1,515,980 UART: [ldev] CDI.KEYID = 6
1,516,343 UART: [ldev] SUBJECT.KEYID = 5
1,516,769 UART: [ldev] AUTHORITY.KEYID = 7
1,517,232 UART: [ldev] FE.KEYID = 1
1,522,306 UART: [ldev] Erasing FE.KEYID = 1
1,547,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,969 UART: [ldev] --
1,587,300 UART: [fwproc] Waiting for Commands...
1,588,047 UART: [fwproc] Received command 0x46574c44
1,588,838 UART: [fwproc] Received Image of size 114360 bytes
2,886,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,664 >>> mbox cmd response: success
3,078,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,752 UART: [afmc] ++
3,079,920 UART: [afmc] CDI.KEYID = 6
3,080,282 UART: [afmc] SUBJECT.KEYID = 7
3,080,707 UART: [afmc] AUTHORITY.KEYID = 5
3,115,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,319 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,009 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,960 UART: [afmc] --
3,159,064 UART: [cold-reset] --
3,159,934 UART: [state] Locking Datavault
3,160,745 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,349 UART: [state] Locking ICCM
3,162,019 UART: [exit] Launching FMC @ 0x40000130
3,167,348 UART:
3,167,364 UART: Running Caliptra FMC ...
3,167,772 UART:
3,167,915 UART: [state] CFI Enabled
3,178,696 UART: [fht] FMC Alias Private Key: 7
3,286,517 UART: [art] Extend RT PCRs Done
3,286,945 UART: [art] Lock RT PCRs Done
3,288,341 UART: [art] Populate DV Done
3,296,544 UART: [fht] FMC Alias Private Key: 7
3,297,638 UART: [art] Derive CDI
3,297,918 UART: [art] Store in in slot 0x4
3,383,639 UART: [art] Derive Key Pair
3,383,999 UART: [art] Store priv key in slot 0x5
3,396,797 UART: [art] Derive Key Pair - Done
3,411,311 UART: [art] Signing Cert with AUTHO
3,411,791 UART: RITY.KEYID = 7
3,426,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,430 UART: [art] PUB.X = 4EE1D245A621F849C729AD2DEA3C74A6CEB51E2AF53CD8B8768A29E8905B1853442E3899B67B601F4BDC7EFEC36A509D
3,434,214 UART: [art] PUB.Y = FD06287AD090E3149FFCFBFB9BE96623A856B181F9A85D5F62A1C179327878F5747A178A44D3D30A26E1C7860D646603
3,441,152 UART: [art] SIG.R = 37792938BECBBC72CDE8D1AD4B3BDAE5D31E9054837B73D1813CCA24BF60C3D68AF4B85D7FDB47DEE39A76C89E0D8A82
3,447,943 UART: [art] SIG.S = 8A4FB38372D67760839EEC28D836FB91D92B217CC56D742E125970497F676E08C06CCE573AAB0B8C35F03E12DA53083E
3,471,537 UART: Caliptra RT
3,471,883 UART: [state] CFI Enabled
3,580,807 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,402 UART: [rt]cmd =0x44504543, len=96
3,655,126 >>> mbox cmd response data (56 bytes)
3,655,127 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,710 UART: [rt]cmd =0x54514754, len=24
3,686,602 >>> mbox cmd response: failed
3,686,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,966 UART: [rt]cmd =0x54514754, len=24
3,718,086 >>> mbox cmd response data (8 bytes)
3,718,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,004 UART: [rt]cmd =0x44504543, len=96
3,792,245 >>> mbox cmd response data (56 bytes)
3,792,246 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,651 UART: [rt]cmd =0x47544744, len=8
3,824,469 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,290 ready_for_fw is high
1,362,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,394 >>> mbox cmd response: success
2,926,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,987,698 UART:
2,987,714 UART: Running Caliptra FMC ...
2,988,122 UART:
2,988,265 UART: [state] CFI Enabled
2,998,790 UART: [fht] FMC Alias Private Key: 7
3,107,015 UART: [art] Extend RT PCRs Done
3,107,443 UART: [art] Lock RT PCRs Done
3,108,969 UART: [art] Populate DV Done
3,117,562 UART: [fht] FMC Alias Private Key: 7
3,118,604 UART: [art] Derive CDI
3,118,884 UART: [art] Store in in slot 0x4
3,204,461 UART: [art] Derive Key Pair
3,204,821 UART: [art] Store priv key in slot 0x5
3,218,153 UART: [art] Derive Key Pair - Done
3,233,305 UART: [art] Signing Cert with AUTHO
3,233,785 UART: RITY.KEYID = 7
3,249,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,108 UART: [art] PUB.X = 95ABE7F4C5B534E417303A5C506380786EF4D7AE9E1E7B467371731D34C7B31B135B4BC951FD6C5B1D0A8D09AC47FCB7
3,256,882 UART: [art] PUB.Y = 3E0E5CA045A95D5AAAB8029B67D10A5A489DF8146ABB86B8F06C9826E3451FC4718C849BAB7F664B6103E176BB154FEF
3,263,832 UART: [art] SIG.R = FB139441030DAD5557A83E7FDFCCEE3156E3FF03176C9D8E6AB2BBCD92CA0A28BBD6ADA9BE348CC29438AC7366A1D2FE
3,270,618 UART: [art] SIG.S = 2DF715E6D0DDC90ADB65AE59E8C5365DEE97294B7272569ABFF20100E389D7E5E325125D7B87A95A8120BE3EC7CCEAE1
3,294,721 UART: Caliptra RT
3,295,067 UART: [state] CFI Enabled
3,403,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,496 UART: [rt]cmd =0x44504543, len=96
3,479,370 >>> mbox cmd response data (56 bytes)
3,479,371 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,954 UART: [rt]cmd =0x54514754, len=24
3,510,722 >>> mbox cmd response: failed
3,510,722 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,540,072 UART: [rt]cmd =0x54514754, len=24
3,542,220 >>> mbox cmd response data (8 bytes)
3,542,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,140 UART: [rt]cmd =0x44504543, len=96
3,615,889 >>> mbox cmd response data (56 bytes)
3,615,890 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,237 UART: [rt]cmd =0x47544744, len=8
3,647,525 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
893,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,583 UART: [kat] ++
897,735 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
917,674 UART: [kat] HMAC-384Kdf
922,252 UART: [kat] LMS
1,170,580 UART: [kat] --
1,171,445 UART: [cold-reset] ++
1,171,781 UART: [fht] FHT @ 0x50003400
1,174,482 UART: [idev] ++
1,174,650 UART: [idev] CDI.KEYID = 6
1,175,010 UART: [idev] SUBJECT.KEYID = 7
1,175,434 UART: [idev] UDS.KEYID = 0
1,175,779 ready_for_fw is high
1,175,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,057 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,286 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,281,986 UART: [fwproc] Wait for Commands...
1,282,648 UART: [fwproc] Recv command 0x46574c44
1,283,376 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,292 >>> mbox cmd response: success
2,773,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,480 UART: [afmc] ++
2,774,648 UART: [afmc] CDI.KEYID = 6
2,775,010 UART: [afmc] SUBJECT.KEYID = 7
2,775,435 UART: [afmc] AUTHORITY.KEYID = 5
2,810,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,765 UART: [afmc] --
2,853,777 UART: [cold-reset] --
2,854,675 UART: [state] Locking Datavault
2,855,952 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,556 UART: [state] Locking ICCM
2,857,204 UART: [exit] Launching FMC @ 0x40000130
2,862,533 UART:
2,862,549 UART: Running Caliptra FMC ...
2,862,957 UART:
2,863,011 UART: [state] CFI Enabled
2,873,384 UART: [fht] FMC Alias Private Key: 7
2,981,321 UART: [art] Extend RT PCRs Done
2,981,749 UART: [art] Lock RT PCRs Done
2,983,479 UART: [art] Populate DV Done
2,992,112 UART: [fht] FMC Alias Private Key: 7
2,993,140 UART: [art] Derive CDI
2,993,420 UART: [art] Store in in slot 0x4
3,078,773 UART: [art] Derive Key Pair
3,079,133 UART: [art] Store priv key in slot 0x5
3,092,255 UART: [art] Derive Key Pair - Done
3,106,677 UART: [art] Signing Cert with AUTHO
3,107,157 UART: RITY.KEYID = 7
3,122,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,132 UART: [art] PUB.X = 61C9410BD34780DB19205CE82790364487E076B9C9ED1CA3732E8E38BD1AA9ECB70F1AB2F37D2E0E532BFF2E00ABFC85
3,129,885 UART: [art] PUB.Y = 9BD33365757637FDFCFF1B51F39063E2E7AD85A35AAC49EDB82587A441FF6EBFD4434798AE8C012BBAFFC7C365CEAA36
3,136,854 UART: [art] SIG.R = 0982341542E6512740AEFC665B925829D59A8C344B2379E320026CD93156465BE6B6A278633223E5086EBAAE8EE58E36
3,143,605 UART: [art] SIG.S = AA2A0E5D61C30BBCD24F7C1F208CE2317814D42FA3E19D706EC908A61C755AC5A978D3CDE37DD5D93C66766548B954F2
3,167,545 UART: Caliptra RT
3,167,799 UART: [state] CFI Enabled
3,276,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,812 UART: [rt]cmd =0x44504543, len=96
3,351,552 >>> mbox cmd response data (56 bytes)
3,351,553 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,724 UART: [rt]cmd =0x54514754, len=24
3,382,652 >>> mbox cmd response: failed
3,382,652 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,974 UART: [rt]cmd =0x54514754, len=24
3,414,248 >>> mbox cmd response data (8 bytes)
3,414,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,198 UART: [rt]cmd =0x44504543, len=96
3,488,739 >>> mbox cmd response data (56 bytes)
3,488,740 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,999 UART: [rt]cmd =0x47544744, len=8
3,520,591 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 ready_for_fw is high
1,060,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,789 >>> mbox cmd response: success
2,625,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,687,473 UART:
2,687,489 UART: Running Caliptra FMC ...
2,687,897 UART:
2,687,951 UART: [state] CFI Enabled
2,698,410 UART: [fht] FMC Alias Private Key: 7
2,806,591 UART: [art] Extend RT PCRs Done
2,807,019 UART: [art] Lock RT PCRs Done
2,808,831 UART: [art] Populate DV Done
2,816,980 UART: [fht] FMC Alias Private Key: 7
2,817,996 UART: [art] Derive CDI
2,818,276 UART: [art] Store in in slot 0x4
2,903,629 UART: [art] Derive Key Pair
2,903,989 UART: [art] Store priv key in slot 0x5
2,916,763 UART: [art] Derive Key Pair - Done
2,931,382 UART: [art] Signing Cert with AUTHO
2,931,862 UART: RITY.KEYID = 7
2,947,208 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,973 UART: [art] PUB.X = 409528E7F511016C5058F8399BCA9EE3BFEF7ED75BFCEAD62D5DB2C77676E6FA74B0966DA42C965781C2CEFFC4C64DAA
2,954,762 UART: [art] PUB.Y = 41AF052D5C0446000A833D1B4FCF33F78EA434145FE691D33BE729191D3C96065056D1E540AA56B8D9490D08A823C530
2,961,668 UART: [art] SIG.R = 5A836D425221F0D3BBB9CC77147DF5CD3EE779FA52378FAB0F4697EBA0EC14D345BC8864AE9C4A0721BD5ED035B88491
2,968,446 UART: [art] SIG.S = A6BD1FEB7896CDF8A953506C0967A89ABA90EED5A2A5C415AD3F517C9B468534696E90D15E41ADE266B46C05FBB8451E
2,992,295 UART: Caliptra RT
2,992,549 UART: [state] CFI Enabled
3,100,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,958 UART: [rt]cmd =0x44504543, len=96
3,175,258 >>> mbox cmd response data (56 bytes)
3,175,259 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,686 UART: [rt]cmd =0x54514754, len=24
3,206,534 >>> mbox cmd response: failed
3,206,534 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,172 UART: [rt]cmd =0x54514754, len=24
3,238,160 >>> mbox cmd response data (8 bytes)
3,238,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,268,218 UART: [rt]cmd =0x44504543, len=96
3,312,791 >>> mbox cmd response data (56 bytes)
3,312,792 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,151 UART: [rt]cmd =0x47544744, len=8
3,344,343 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
894,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,146 UART: [kat] ++
898,298 UART: [kat] sha1
902,684 UART: [kat] SHA2-256
904,624 UART: [kat] SHA2-384
907,347 UART: [kat] SHA2-512-ACC
909,248 UART: [kat] ECC-384
919,221 UART: [kat] HMAC-384Kdf
923,845 UART: [kat] LMS
1,172,173 UART: [kat] --
1,173,176 UART: [cold-reset] ++
1,173,716 UART: [fht] FHT @ 0x50003400
1,176,243 UART: [idev] ++
1,176,411 UART: [idev] CDI.KEYID = 6
1,176,771 UART: [idev] SUBJECT.KEYID = 7
1,177,195 UART: [idev] UDS.KEYID = 0
1,177,540 ready_for_fw is high
1,177,540 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,155 UART: [idev] Erasing UDS.KEYID = 0
1,201,898 UART: [idev] Sha1 KeyId Algorithm
1,210,378 UART: [idev] --
1,211,656 UART: [ldev] ++
1,211,824 UART: [ldev] CDI.KEYID = 6
1,212,187 UART: [ldev] SUBJECT.KEYID = 5
1,212,613 UART: [ldev] AUTHORITY.KEYID = 7
1,213,076 UART: [ldev] FE.KEYID = 1
1,218,130 UART: [ldev] Erasing FE.KEYID = 1
1,244,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,574 UART: [ldev] --
1,284,027 UART: [fwproc] Wait for Commands...
1,284,693 UART: [fwproc] Recv command 0x46574c44
1,285,421 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,333 >>> mbox cmd response: success
2,775,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,776,389 UART: [afmc] ++
2,776,557 UART: [afmc] CDI.KEYID = 6
2,776,919 UART: [afmc] SUBJECT.KEYID = 7
2,777,344 UART: [afmc] AUTHORITY.KEYID = 5
2,812,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,896 UART: [afmc] --
2,855,988 UART: [cold-reset] --
2,856,956 UART: [state] Locking Datavault
2,857,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,573 UART: [state] Locking ICCM
2,859,029 UART: [exit] Launching FMC @ 0x40000130
2,864,358 UART:
2,864,374 UART: Running Caliptra FMC ...
2,864,782 UART:
2,864,925 UART: [state] CFI Enabled
2,875,706 UART: [fht] FMC Alias Private Key: 7
2,984,089 UART: [art] Extend RT PCRs Done
2,984,517 UART: [art] Lock RT PCRs Done
2,986,035 UART: [art] Populate DV Done
2,994,244 UART: [fht] FMC Alias Private Key: 7
2,995,414 UART: [art] Derive CDI
2,995,694 UART: [art] Store in in slot 0x4
3,081,377 UART: [art] Derive Key Pair
3,081,737 UART: [art] Store priv key in slot 0x5
3,094,845 UART: [art] Derive Key Pair - Done
3,109,784 UART: [art] Signing Cert with AUTHO
3,110,264 UART: RITY.KEYID = 7
3,125,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,305 UART: [art] PUB.X = FD275123E76C73060CC9206D18249D64228E9A70668C0000EB5128EC8D4F23E3B239B59AB4758A0A885F0BDEC4C2AF59
3,133,021 UART: [art] PUB.Y = 51031782EB1E3B2ECBE6F793E07D4524752C9924D1CF0FD8AA5B85F927B1AA99F751CEB2779E351F5317F41364B32A89
3,139,969 UART: [art] SIG.R = 7D84E3F445CE811743CCDDDCD8BE27E774E88F2936AF18BFBC8766615ADD3923B7FCE1CEBADF33371A1A1C6C09E5FBDE
3,146,764 UART: [art] SIG.S = CF736B2A9F8B10F7A7A524F969A5D20EDACC41A959B2DABD9297744958450437FB8C2CB87BDCC9FF1E38322A53D8F11E
3,169,927 UART: Caliptra RT
3,170,273 UART: [state] CFI Enabled
3,278,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,912 UART: [rt]cmd =0x44504543, len=96
3,353,442 >>> mbox cmd response data (56 bytes)
3,353,443 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,032 UART: [rt]cmd =0x54514754, len=24
3,385,036 >>> mbox cmd response: failed
3,385,036 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,542 UART: [rt]cmd =0x54514754, len=24
3,416,668 >>> mbox cmd response data (8 bytes)
3,416,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,490 UART: [rt]cmd =0x44504543, len=96
3,490,585 >>> mbox cmd response data (56 bytes)
3,490,586 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,891 UART: [rt]cmd =0x47544744, len=8
3,522,221 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,186 ready_for_fw is high
1,061,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,770 >>> mbox cmd response: success
2,627,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,690,026 UART:
2,690,042 UART: Running Caliptra FMC ...
2,690,450 UART:
2,690,593 UART: [state] CFI Enabled
2,701,572 UART: [fht] FMC Alias Private Key: 7
2,809,581 UART: [art] Extend RT PCRs Done
2,810,009 UART: [art] Lock RT PCRs Done
2,811,827 UART: [art] Populate DV Done
2,820,004 UART: [fht] FMC Alias Private Key: 7
2,821,152 UART: [art] Derive CDI
2,821,432 UART: [art] Store in in slot 0x4
2,907,017 UART: [art] Derive Key Pair
2,907,377 UART: [art] Store priv key in slot 0x5
2,920,477 UART: [art] Derive Key Pair - Done
2,935,290 UART: [art] Signing Cert with AUTHO
2,935,770 UART: RITY.KEYID = 7
2,951,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,999 UART: [art] PUB.X = BEED6B79894A60EE1F4FEA4A0E947743E5E2BAB16E95F7F06CCCA9620710A2381BFF5B074B72E30F904C0CE5B2A1BAD4
2,958,776 UART: [art] PUB.Y = 5CFE5D801D3888EBB8E78AFB3DA2A7761D54D3D6C12C2A42A00C18530F0C5E6D981943845841711CBD468337D5C9BF47
2,965,723 UART: [art] SIG.R = 7608A5086CAFA68C006BFFF39994EC732E21878319B25C027237265881A5278CA7A9F55ED1A3747BBCE9CD12D2353FF9
2,972,464 UART: [art] SIG.S = D6369B024A2129701CA9FB6E73A613DFD6F51B17DF7239E32E09CD988556FD16C376657CCB7B9BD4AF53298D277506C6
2,996,938 UART: Caliptra RT
2,997,284 UART: [state] CFI Enabled
3,105,458 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,139 UART: [rt]cmd =0x44504543, len=96
3,180,201 >>> mbox cmd response data (56 bytes)
3,180,202 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,209,805 UART: [rt]cmd =0x54514754, len=24
3,211,629 >>> mbox cmd response: failed
3,211,629 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,241,017 UART: [rt]cmd =0x54514754, len=24
3,242,891 >>> mbox cmd response data (8 bytes)
3,242,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,801 UART: [rt]cmd =0x44504543, len=96
3,316,864 >>> mbox cmd response data (56 bytes)
3,316,865 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,006 UART: [rt]cmd =0x47544744, len=8
3,348,582 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,412 UART: [kat] HMAC-384Kdf
919,998 UART: [kat] LMS
1,168,310 UART: [kat] --
1,169,323 UART: [cold-reset] ++
1,169,659 UART: [fht] FHT @ 0x50003400
1,172,297 UART: [idev] ++
1,172,465 UART: [idev] CDI.KEYID = 6
1,172,826 UART: [idev] SUBJECT.KEYID = 7
1,173,251 UART: [idev] UDS.KEYID = 0
1,173,597 ready_for_fw is high
1,173,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,197,869 UART: [idev] Sha1 KeyId Algorithm
1,206,837 UART: [idev] --
1,207,662 UART: [ldev] ++
1,207,830 UART: [ldev] CDI.KEYID = 6
1,208,194 UART: [ldev] SUBJECT.KEYID = 5
1,208,621 UART: [ldev] AUTHORITY.KEYID = 7
1,209,084 UART: [ldev] FE.KEYID = 1
1,214,308 UART: [ldev] Erasing FE.KEYID = 1
1,240,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,682 UART: [ldev] --
1,280,098 UART: [fwproc] Wait for Commands...
1,280,889 UART: [fwproc] Recv command 0x46574c44
1,281,622 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,130 >>> mbox cmd response: success
2,771,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,153 UART: [afmc] ++
2,772,321 UART: [afmc] CDI.KEYID = 6
2,772,684 UART: [afmc] SUBJECT.KEYID = 7
2,773,110 UART: [afmc] AUTHORITY.KEYID = 5
2,809,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,952 UART: [afmc] --
2,852,914 UART: [cold-reset] --
2,853,756 UART: [state] Locking Datavault
2,854,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,303 UART: [state] Locking ICCM
2,855,871 UART: [exit] Launching FMC @ 0x40000130
2,861,200 UART:
2,861,216 UART: Running Caliptra FMC ...
2,861,624 UART:
2,861,678 UART: [state] CFI Enabled
2,872,081 UART: [fht] FMC Alias Private Key: 7
2,980,192 UART: [art] Extend RT PCRs Done
2,980,620 UART: [art] Lock RT PCRs Done
2,982,340 UART: [art] Populate DV Done
2,990,719 UART: [fht] FMC Alias Private Key: 7
2,991,729 UART: [art] Derive CDI
2,992,009 UART: [art] Store in in slot 0x4
3,077,736 UART: [art] Derive Key Pair
3,078,096 UART: [art] Store priv key in slot 0x5
3,091,670 UART: [art] Derive Key Pair - Done
3,106,379 UART: [art] Signing Cert with AUTHO
3,106,859 UART: RITY.KEYID = 7
3,122,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,942 UART: [art] PUB.X = 51EB356E0DC0FD70E718194C59BE89E25F6BD7FF1543FE5072D450E6C35AE9E3B8C68712599C5FF01144AF2B344A100C
3,129,714 UART: [art] PUB.Y = 136DFD3640F20279FA464DC6597A9FC1FBD65C2D709C13D108E025BFEB1C6FD9F084A93F73D031ED94B3A01D3AA8C5AF
3,136,676 UART: [art] SIG.R = 08C7DACCE57E500FD09A6E6A1A4F5329EE4B4FBD323772A158CF3ECE4BCE5D1E28D9FD34C80E9C07EC66BF45DA8FCF0B
3,143,463 UART: [art] SIG.S = 282B414D9630E8615D9DBC36B9C28ECE4DA335A0940B28442A758FDD262EFABDB486C8C50D7CE0C41386238672A5AC0D
3,166,359 UART: Caliptra RT
3,166,613 UART: [state] CFI Enabled
3,273,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,384 UART: [rt]cmd =0x44504543, len=96
3,348,238 >>> mbox cmd response data (56 bytes)
3,348,239 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,858 UART: [rt]cmd =0x54514754, len=24
3,379,554 >>> mbox cmd response: failed
3,379,554 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,882 UART: [rt]cmd =0x54514754, len=24
3,410,904 >>> mbox cmd response data (8 bytes)
3,410,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,872 UART: [rt]cmd =0x44504543, len=96
3,485,145 >>> mbox cmd response data (56 bytes)
3,485,146 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,551 UART: [rt]cmd =0x47544744, len=8
3,517,271 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,314 ready_for_fw is high
1,056,314 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,522 >>> mbox cmd response: success
2,623,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,054 UART:
2,686,070 UART: Running Caliptra FMC ...
2,686,478 UART:
2,686,532 UART: [state] CFI Enabled
2,697,183 UART: [fht] FMC Alias Private Key: 7
2,804,820 UART: [art] Extend RT PCRs Done
2,805,248 UART: [art] Lock RT PCRs Done
2,806,502 UART: [art] Populate DV Done
2,814,899 UART: [fht] FMC Alias Private Key: 7
2,816,041 UART: [art] Derive CDI
2,816,321 UART: [art] Store in in slot 0x4
2,902,080 UART: [art] Derive Key Pair
2,902,440 UART: [art] Store priv key in slot 0x5
2,915,510 UART: [art] Derive Key Pair - Done
2,930,416 UART: [art] Signing Cert with AUTHO
2,930,896 UART: RITY.KEYID = 7
2,946,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,871 UART: [art] PUB.X = 3E768D45B85477B2A47775FDEA7FAECF6D6DA260ABE0F43B4A620EC015140B27DDBFCC10491ED2ECAE571FA71DD83681
2,953,657 UART: [art] PUB.Y = 996590BB0B294CA8359B7D8A2E1F1115782EEDAC8E21403E2D1DA86AEC2D13EEADB86DDA0296DB79BE008734F3F10EBE
2,960,596 UART: [art] SIG.R = 75D018DFAC316C50F4041BA09BDC9A8294AC24E90B0C86D73C02ADFE8BADDDF958E874B1CDFEA423A3430A25D09F721F
2,967,373 UART: [art] SIG.S = DCB41427FD60BDBDA05D74FE68C298D3C18059794506F8418FD13F184DCF8EC14C631DAFC9206D7EB9E76C6FF0667334
2,990,873 UART: Caliptra RT
2,991,127 UART: [state] CFI Enabled
3,097,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,374 UART: [rt]cmd =0x44504543, len=96
3,172,816 >>> mbox cmd response data (56 bytes)
3,172,817 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,202,180 UART: [rt]cmd =0x54514754, len=24
3,204,048 >>> mbox cmd response: failed
3,204,048 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,400 UART: [rt]cmd =0x54514754, len=24
3,235,692 >>> mbox cmd response data (8 bytes)
3,235,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,265,544 UART: [rt]cmd =0x44504543, len=96
3,309,781 >>> mbox cmd response data (56 bytes)
3,309,782 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,249 UART: [rt]cmd =0x47544744, len=8
3,341,769 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,854 UART: [cold-reset] ++
1,171,402 UART: [fht] FHT @ 0x50003400
1,173,972 UART: [idev] ++
1,174,140 UART: [idev] CDI.KEYID = 6
1,174,501 UART: [idev] SUBJECT.KEYID = 7
1,174,926 UART: [idev] UDS.KEYID = 0
1,175,272 ready_for_fw is high
1,175,272 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,708 UART: [idev] Sha1 KeyId Algorithm
1,209,362 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,685 UART: [ldev] --
1,283,049 UART: [fwproc] Wait for Commands...
1,283,840 UART: [fwproc] Recv command 0x46574c44
1,284,573 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,487 >>> mbox cmd response: success
2,773,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,550 UART: [afmc] ++
2,774,718 UART: [afmc] CDI.KEYID = 6
2,775,081 UART: [afmc] SUBJECT.KEYID = 7
2,775,507 UART: [afmc] AUTHORITY.KEYID = 5
2,811,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,765 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,213 UART: [afmc] --
2,854,127 UART: [cold-reset] --
2,854,709 UART: [state] Locking Datavault
2,855,646 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,250 UART: [state] Locking ICCM
2,856,838 UART: [exit] Launching FMC @ 0x40000130
2,862,167 UART:
2,862,183 UART: Running Caliptra FMC ...
2,862,591 UART:
2,862,734 UART: [state] CFI Enabled
2,873,019 UART: [fht] FMC Alias Private Key: 7
2,981,248 UART: [art] Extend RT PCRs Done
2,981,676 UART: [art] Lock RT PCRs Done
2,983,422 UART: [art] Populate DV Done
2,991,577 UART: [fht] FMC Alias Private Key: 7
2,992,713 UART: [art] Derive CDI
2,992,993 UART: [art] Store in in slot 0x4
3,078,206 UART: [art] Derive Key Pair
3,078,566 UART: [art] Store priv key in slot 0x5
3,092,450 UART: [art] Derive Key Pair - Done
3,107,095 UART: [art] Signing Cert with AUTHO
3,107,575 UART: RITY.KEYID = 7
3,123,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,862 UART: [art] PUB.X = 24715C477AE79D0A043BAA2754782A2AA4FDF62DA675641C1997C1DB89D7EB1CC28078A49622AE32DD7188735F511960
3,130,626 UART: [art] PUB.Y = 313A60805C57B4C17BD5CE9DD8FA2E97009A38FEFA9C9F67F299DEC44A232DCFD4C32689C1B5052409A5AFBF85DE0FFF
3,137,567 UART: [art] SIG.R = ADD02D602960EB0004ABC7DBB38740901B30A6B80A0122DC0F5A89AFE1BCFAF368C86D9A29A769237AE94F68174A7D5F
3,144,317 UART: [art] SIG.S = 00CC8E079C7467D68A184F26B5C902905727C11B9E75C80799744AB55153156B74444390AD87C4A8D319DE20362B2A23
3,168,409 UART: Caliptra RT
3,168,755 UART: [state] CFI Enabled
3,275,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,661 UART: [rt]cmd =0x44504543, len=96
3,351,475 >>> mbox cmd response data (56 bytes)
3,351,476 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,029 UART: [rt]cmd =0x54514754, len=24
3,382,747 >>> mbox cmd response: failed
3,382,747 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,329 UART: [rt]cmd =0x54514754, len=24
3,414,573 >>> mbox cmd response data (8 bytes)
3,414,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,629 UART: [rt]cmd =0x44504543, len=96
3,488,738 >>> mbox cmd response data (56 bytes)
3,488,739 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,184 UART: [rt]cmd =0x47544744, len=8
3,520,572 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,695 ready_for_fw is high
1,056,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,935 >>> mbox cmd response: success
2,622,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,573 UART:
2,685,589 UART: Running Caliptra FMC ...
2,685,997 UART:
2,686,140 UART: [state] CFI Enabled
2,696,675 UART: [fht] FMC Alias Private Key: 7
2,805,084 UART: [art] Extend RT PCRs Done
2,805,512 UART: [art] Lock RT PCRs Done
2,806,922 UART: [art] Populate DV Done
2,815,061 UART: [fht] FMC Alias Private Key: 7
2,816,159 UART: [art] Derive CDI
2,816,439 UART: [art] Store in in slot 0x4
2,902,018 UART: [art] Derive Key Pair
2,902,378 UART: [art] Store priv key in slot 0x5
2,915,836 UART: [art] Derive Key Pair - Done
2,930,765 UART: [art] Signing Cert with AUTHO
2,931,245 UART: RITY.KEYID = 7
2,946,813 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,578 UART: [art] PUB.X = 42AD74426AE909594D932D5CF1D54AFC7D258266C9E15625560D1567E9EABE2D2E9CE3B37A63476D2DC945AA0E729D45
2,954,345 UART: [art] PUB.Y = 3C01B85D87158DFF91C2D103348188171802BEF95DFA9D26C2FDEAEBB9025CF22F9082F1C43ADA8799DB958DCF3D0036
2,961,273 UART: [art] SIG.R = 0DF16EF4046324E36D6474E1AB7541B126B464AACF5EDC082899D16A1E8E0CCA2B8AB51DA0C33D2513E98D574A31A20C
2,968,040 UART: [art] SIG.S = 66343B2969F2DB945E360B6A15DBBDEBC0A9F3E040CB7DAC4218061262D9B5090D14D74349094E0CC309D0A06E16D51E
2,992,238 UART: Caliptra RT
2,992,584 UART: [state] CFI Enabled
3,100,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,355 UART: [rt]cmd =0x44504543, len=96
3,175,691 >>> mbox cmd response data (56 bytes)
3,175,692 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,205,167 UART: [rt]cmd =0x54514754, len=24
3,207,067 >>> mbox cmd response: failed
3,207,067 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,703 UART: [rt]cmd =0x54514754, len=24
3,239,067 >>> mbox cmd response data (8 bytes)
3,239,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,268,875 UART: [rt]cmd =0x44504543, len=96
3,312,360 >>> mbox cmd response data (56 bytes)
3,312,361 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,740 UART: [rt]cmd =0x47544744, len=8
3,344,326 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,286 UART:
192,660 UART: Running Caliptra ROM ...
193,744 UART:
193,880 UART: [state] CFI Enabled
266,974 UART: [state] LifecycleState = Unprovisioned
268,957 UART: [state] DebugLocked = No
270,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,190 UART: [kat] SHA2-256
445,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,433 UART: [kat] ++
456,880 UART: [kat] sha1
468,952 UART: [kat] SHA2-256
471,597 UART: [kat] SHA2-384
477,930 UART: [kat] SHA2-512-ACC
480,301 UART: [kat] ECC-384
2,768,889 UART: [kat] HMAC-384Kdf
2,800,731 UART: [kat] LMS
3,991,007 UART: [kat] --
3,994,701 UART: [cold-reset] ++
3,995,781 UART: [fht] Storing FHT @ 0x50003400
4,007,749 UART: [idev] ++
4,008,322 UART: [idev] CDI.KEYID = 6
4,009,356 UART: [idev] SUBJECT.KEYID = 7
4,010,530 UART: [idev] UDS.KEYID = 0
4,011,590 ready_for_fw is high
4,011,813 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,110,988 UART: [idev] Erasing UDS.KEYID = 0
7,346,907 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,020 UART: [idev] --
7,373,307 UART: [ldev] ++
7,373,869 UART: [ldev] CDI.KEYID = 6
7,374,838 UART: [ldev] SUBJECT.KEYID = 5
7,376,002 UART: [ldev] AUTHORITY.KEYID = 7
7,377,284 UART: [ldev] FE.KEYID = 1
7,421,525 UART: [ldev] Erasing FE.KEYID = 1
10,754,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,166 UART: [ldev] --
13,119,210 UART: [fwproc] Waiting for Commands...
13,121,673 UART: [fwproc] Received command 0x46574c44
13,123,844 UART: [fwproc] Received Image of size 78676 bytes
16,744,155 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,820,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,889,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,083,059 >>> mbox cmd response: success
17,083,599 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,087,856 UART: [afmc] ++
17,088,442 UART: [afmc] CDI.KEYID = 6
17,089,321 UART: [afmc] SUBJECT.KEYID = 7
17,090,586 UART: [afmc] AUTHORITY.KEYID = 5
20,450,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,752,109 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,754,364 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,768,804 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,783,582 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,798,024 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,819,632 UART: [afmc] --
22,824,078 UART: [cold-reset] --
22,828,803 UART: [state] Locking Datavault
22,835,444 UART: [state] Locking PCR0, PCR1 and PCR31
22,837,197 UART: [state] Locking ICCM
22,839,030 UART: [exit] Launching FMC @ 0x40000130
22,847,441 UART:
22,847,712 UART: Running Caliptra FMC ...
22,848,816 UART:
22,848,969 UART: [state] CFI Enabled
22,914,582 UART: [fht] FMC Alias Private Key: 7
25,252,915 UART: [art] Extend RT PCRs Done
25,254,135 UART: [art] Lock RT PCRs Done
25,255,780 UART: [art] Populate DV Done
25,261,072 UART: [fht] FMC Alias Private Key: 7
25,262,654 UART: [art] Derive CDI
25,263,459 UART: [art] Store in in slot 0x4
25,322,687 UART: [art] Derive Key Pair
25,323,715 UART: [art] Store priv key in slot 0x5
28,616,857 UART: [art] Derive Key Pair - Done
28,630,061 UART: [art] Signing Cert with AUTHO
28,631,382 UART: RITY.KEYID = 7
30,918,861 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,368 UART: [art] PUB.X = FD8909A4EC5E777399DD2095D851064A5E3B0B21863199863CB36E9DA7594CD0937320F024D619B900DEFF35DE3F8807
30,927,635 UART: [art] PUB.Y = 83A3F0F4E2504F00B147EC8A339B443EC95177738759916706F1000AD56D4BAB2171F15F79F1F54099A137AC43B0363D
30,934,821 UART: [art] SIG.R = 2D2128CC0F02E6700443BBC1E071755DE74DE614368DE900416C759239548A17994E775E613A380B05CB3468BB78B0BB
30,942,147 UART: [art] SIG.S = 1136422C5F088448E297A5E47F578C2449B6FD49057A094799D0BB6D5BB6BF6BF9004473DECB36E3E03AD37178CA7DEA
32,246,677 UART: mbox::rt_entry...
32,247,646 UART: ____ _ _ _ ____ _____
32,249,624 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,622 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,479 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,324 UART: |_|
32,258,195 UART:
32,372,370 UART: [rt] Runtime listening for mailbox commands...
32,374,377 >>> mbox cmd response data (0 bytes)
34,434,107 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,578,341 UART:
34,578,698 UART: Running Caliptra ROM ...
34,579,834 UART:
34,579,999 UART: [state] CFI Enabled
34,654,013 UART: [state] LifecycleState = Unprovisioned
34,656,004 UART: [state] DebugLocked = No
34,657,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,662,892 UART: [kat] SHA2-256
34,832,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,843,121 UART: [kat] ++
34,843,659 UART: [kat] sha1
34,854,440 UART: [kat] SHA2-256
34,857,138 UART: [kat] SHA2-384
34,861,659 UART: [kat] SHA2-512-ACC
34,863,998 UART: [kat] ECC-384
37,153,878 UART: [kat] HMAC-384Kdf
37,168,223 UART: [kat] LMS
38,358,540 UART: [kat] --
38,362,927 UART: [update-reset] ++
42,496,135 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,499,320 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,881,279 >>> mbox cmd response: success
42,885,751 UART: [update-reset] Copying MAN_2 To MAN_1
42,905,617 UART: [update-reset Success] --
42,911,213 UART: [state] Locking Datavault
42,915,489 UART: [state] Locking PCR0, PCR1 and PCR31
42,917,240 UART: [state] Locking ICCM
42,918,283 UART: [exit] Launching FMC @ 0x40000130
42,926,708 UART:
42,926,989 UART: Running Caliptra FMC ...
42,928,012 UART:
42,928,154 UART: [state] CFI Enabled
43,024,180 UART: [art] Extend RT PCRs Done
43,025,374 UART: [art] Lock RT PCRs Done
43,026,752 UART: [art] Populate DV Done
43,032,048 UART: [fht] FMC Alias Private Key: 7
43,033,580 UART: [art] Derive CDI
43,034,415 UART: [art] Store in in slot 0x4
43,093,107 UART: [art] Derive Key Pair
43,094,147 UART: [art] Store priv key in slot 0x5
46,387,098 UART: [art] Derive Key Pair - Done
46,400,212 UART: [art] Signing Cert with AUTHO
46,401,513 UART: RITY.KEYID = 7
48,688,632 UART: [art] Erasing AUTHORITY.KEYID = 7
48,690,142 UART: [art] PUB.X = AA49855AE6008B037DC107B52EDF11C54415362F692B5583EBFCA457621EF13FB5DD321F5F30089E827AAF4E7CFD5388
48,697,384 UART: [art] PUB.Y = A19272F3E8083F8F7C3E2049831E208B07A7084066E7AAF215EBC68E89F1269F7A3CEE97EEDA3CB0CE4CC40108EED852
48,704,635 UART: [art] SIG.R = 67EF10C3E9801079423869D8CF01D25F391F96A45D6140C1C270983399D8D58C4C96EEDA15738BDCD3162E507BE8045E
48,711,999 UART: [art] SIG.S = CA3C1CA8CC0A4202E3050006B8301385289514192E18F4EFDCA4231FD96EFE5AC5BDB608A823C7BF6C6ACA05B7C67D86
50,017,315 UART: Caliptra RT
50,018,018 UART: [state] CFI Enabled
50,348,637 UART: [rt] RT failed reset flow
50,349,850 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
3,786,742 ready_for_fw is high
3,787,286 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,154,959 >>> mbox cmd response: success
17,155,577 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,841,679 UART:
22,842,066 UART: Running Caliptra FMC ...
22,843,171 UART:
22,843,313 UART: [state] CFI Enabled
22,910,578 UART: [fht] FMC Alias Private Key: 7
25,248,675 UART: [art] Extend RT PCRs Done
25,249,906 UART: [art] Lock RT PCRs Done
25,251,354 UART: [art] Populate DV Done
25,256,935 UART: [fht] FMC Alias Private Key: 7
25,258,519 UART: [art] Derive CDI
25,259,253 UART: [art] Store in in slot 0x4
25,319,401 UART: [art] Derive Key Pair
25,320,441 UART: [art] Store priv key in slot 0x5
28,613,620 UART: [art] Derive Key Pair - Done
28,627,004 UART: [art] Signing Cert with AUTHO
28,628,309 UART: RITY.KEYID = 7
30,915,067 UART: [art] Erasing AUTHORITY.KEYID = 7
30,916,578 UART: [art] PUB.X = 06F34DFF5D8D7ADF26FFED6105ADD784D10D77F1B708C5BC176BF4F315CEA89601C6E7CAE7CE07F90E5F8F551DC4F0D6
30,923,820 UART: [art] PUB.Y = 8FB4D81251F290845411AC7DE373777A7FE9401E41475080CDFD1523271B0B1C49715F54DB8D5F490DDF60863D62578A
30,931,034 UART: [art] SIG.R = 2566BC3402B1F148BA9A80C649BE4AEE8562BAAED4CE9D7F0086D7B9D8FFDEA24AA9B1C3AAFDA4CD5A41E36FA78B5775
30,938,464 UART: [art] SIG.S = 2CA51FD96490AA10E14B2FD0E55A2EEA093C548D6C3EEBF4D1704F7D3B363E7D8E68BEF98E55AF913EA8309E5981ABFE
32,243,283 UART: mbox::rt_entry...
32,244,245 UART: ____ _ _ _ ____ _____
32,246,170 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,248,166 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,250,009 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,251,962 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,253,807 UART: |_|
32,254,620 UART:
32,368,490 UART: [rt] Runtime listening for mailbox commands...
32,370,506 >>> mbox cmd response data (0 bytes)
34,431,411 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,161,067 >>> mbox cmd response: success
43,194,447 UART:
43,194,763 UART: Running Caliptra FMC ...
43,195,882 UART:
43,196,047 UART: [state] CFI Enabled
43,293,770 UART: [art] Extend RT PCRs Done
43,294,962 UART: [art] Lock RT PCRs Done
43,296,363 UART: [art] Populate DV Done
43,301,817 UART: [fht] FMC Alias Private Key: 7
43,303,454 UART: [art] Derive CDI
43,304,280 UART: [art] Store in in slot 0x4
43,362,921 UART: [art] Derive Key Pair
43,363,953 UART: [art] Store priv key in slot 0x5
46,656,560 UART: [art] Derive Key Pair - Done
46,669,515 UART: [art] Signing Cert with AUTHO
46,670,817 UART: RITY.KEYID = 7
48,958,122 UART: [art] Erasing AUTHORITY.KEYID = 7
48,959,630 UART: [art] PUB.X = 6D47CD3B4BF0B4E8DAAE18CF58A51CFE32A4429B4F069B33333FF029B22CA0A2E6639829F06ACD7468742C0BC01C1810
48,966,904 UART: [art] PUB.Y = C297ED18CFA560C7F5267A14F5D0855F0BC2C397BBA973EAA71F927C1B8414429D2A911BB4EAD677A992AD276C0C2B98
48,974,151 UART: [art] SIG.R = 04858FA46166ABEF92CEE8FF8498C9CB6B5ACDE9F96B308939E35ECC1A190EF3A38E5869EB80E513CFFAE98CFE9195C7
48,981,558 UART: [art] SIG.S = 3B9F0AC03ADE5E5E959FB0B429E89AA862EDFDE50DCCB2BBAA8216C99A7BAF02F9456F35CC2440344D43E10936233150
50,287,014 UART: Caliptra RT
50,287,733 UART: [state] CFI Enabled
50,616,256 UART: [rt] RT failed reset flow
50,617,452 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,433 UART:
192,794 UART: Running Caliptra ROM ...
193,877 UART:
603,600 UART: [state] CFI Enabled
616,827 UART: [state] LifecycleState = Unprovisioned
618,768 UART: [state] DebugLocked = No
620,863 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,081 UART: [kat] SHA2-256
795,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,350 UART: [kat] ++
806,797 UART: [kat] sha1
818,378 UART: [kat] SHA2-256
821,207 UART: [kat] SHA2-384
826,892 UART: [kat] SHA2-512-ACC
829,268 UART: [kat] ECC-384
3,114,660 UART: [kat] HMAC-384Kdf
3,126,348 UART: [kat] LMS
4,316,476 UART: [kat] --
4,321,752 UART: [cold-reset] ++
4,324,330 UART: [fht] Storing FHT @ 0x50003400
4,336,372 UART: [idev] ++
4,336,941 UART: [idev] CDI.KEYID = 6
4,337,925 UART: [idev] SUBJECT.KEYID = 7
4,339,098 UART: [idev] UDS.KEYID = 0
4,340,159 ready_for_fw is high
4,340,384 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,439,867 UART: [idev] Erasing UDS.KEYID = 0
7,617,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,760 UART: [idev] --
7,643,091 UART: [ldev] ++
7,643,667 UART: [ldev] CDI.KEYID = 6
7,644,604 UART: [ldev] SUBJECT.KEYID = 5
7,645,808 UART: [ldev] AUTHORITY.KEYID = 7
7,647,086 UART: [ldev] FE.KEYID = 1
7,658,216 UART: [ldev] Erasing FE.KEYID = 1
10,947,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,725 UART: [ldev] --
13,306,948 UART: [fwproc] Waiting for Commands...
13,309,524 UART: [fwproc] Received command 0x46574c44
13,311,758 UART: [fwproc] Received Image of size 78676 bytes
16,928,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,007,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,076,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,269,754 >>> mbox cmd response: success
17,270,250 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,273,054 UART: [afmc] ++
17,273,637 UART: [afmc] CDI.KEYID = 6
17,274,620 UART: [afmc] SUBJECT.KEYID = 7
17,275,833 UART: [afmc] AUTHORITY.KEYID = 5
20,588,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,882,414 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,884,717 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,899,065 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,913,916 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,928,369 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,950,353 UART: [afmc] --
22,954,703 UART: [cold-reset] --
22,958,508 UART: [state] Locking Datavault
22,963,698 UART: [state] Locking PCR0, PCR1 and PCR31
22,965,394 UART: [state] Locking ICCM
22,968,133 UART: [exit] Launching FMC @ 0x40000130
22,976,537 UART:
22,976,770 UART: Running Caliptra FMC ...
22,977,890 UART:
22,978,044 UART: [state] CFI Enabled
22,986,262 UART: [fht] FMC Alias Private Key: 7
25,317,122 UART: [art] Extend RT PCRs Done
25,318,344 UART: [art] Lock RT PCRs Done
25,320,019 UART: [art] Populate DV Done
25,325,489 UART: [fht] FMC Alias Private Key: 7
25,327,022 UART: [art] Derive CDI
25,327,836 UART: [art] Store in in slot 0x4
25,370,273 UART: [art] Derive Key Pair
25,371,271 UART: [art] Store priv key in slot 0x5
28,613,806 UART: [art] Derive Key Pair - Done
28,626,708 UART: [art] Signing Cert with AUTHO
28,628,001 UART: RITY.KEYID = 7
30,907,714 UART: [art] Erasing AUTHORITY.KEYID = 7
30,909,224 UART: [art] PUB.X = 16306B18C66E713172D63BE260D70B61FE9C2151021C6FD75EBD4EFEA5FDE6BC093EAF4FDA7E09AC9E3AB53982BB6201
30,916,548 UART: [art] PUB.Y = CE0507C52A0612CAE4443DE03446FA64EBEE1B4CD05D6B53B867091AC3CEFF130A92492739AC3C5BE7EAC212AA57384D
30,923,774 UART: [art] SIG.R = 56AD6AB90506B8BF058FAFF144F21E0C7B3F3BF4712078A7D1EC6D9CC2068C4EE9404CF69A7C38A19B4B3B883B741DA1
30,931,158 UART: [art] SIG.S = 9A619F8F157E20E54C3C865BDAE25DFB916B0D701B27FBC5AE484D5AFBF6227A3C5C38AF91895B007FE328F10B235DAB
32,235,940 UART: mbox::rt_entry...
32,236,911 UART: ____ _ _ _ ____ _____
32,238,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,240,900 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,242,830 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,244,760 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,246,682 UART: |_|
32,247,486 UART:
32,360,529 UART: [rt] Runtime listening for mailbox commands...
32,362,541 >>> mbox cmd response data (0 bytes)
34,416,474 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,560,742 UART:
34,561,115 UART: Running Caliptra ROM ...
34,562,161 UART:
34,562,367 UART: [state] CFI Enabled
34,579,120 UART: [state] LifecycleState = Unprovisioned
34,581,017 UART: [state] DebugLocked = No
34,583,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,587,954 UART: [kat] SHA2-256
34,757,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,768,215 UART: [kat] ++
34,768,665 UART: [kat] sha1
34,779,176 UART: [kat] SHA2-256
34,781,832 UART: [kat] SHA2-384
34,788,096 UART: [kat] SHA2-512-ACC
34,790,458 UART: [kat] ECC-384
37,074,762 UART: [kat] HMAC-384Kdf
37,087,541 UART: [kat] LMS
38,277,616 UART: [kat] --
38,281,845 UART: [update-reset] ++
42,428,906 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,431,957 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,813,884 >>> mbox cmd response: success
42,818,486 UART: [update-reset] Copying MAN_2 To MAN_1
42,837,355 UART: [update-reset Success] --
42,841,552 UART: [state] Locking Datavault
42,845,676 UART: [state] Locking PCR0, PCR1 and PCR31
42,847,432 UART: [state] Locking ICCM
42,850,180 UART: [exit] Launching FMC @ 0x40000130
42,858,574 UART:
42,858,807 UART: Running Caliptra FMC ...
42,859,908 UART:
42,860,067 UART: [state] CFI Enabled
42,904,126 UART: [art] Extend RT PCRs Done
42,905,320 UART: [art] Lock RT PCRs Done
42,906,718 UART: [art] Populate DV Done
42,912,076 UART: [fht] FMC Alias Private Key: 7
42,913,835 UART: [art] Derive CDI
42,914,647 UART: [art] Store in in slot 0x4
42,957,180 UART: [art] Derive Key Pair
42,958,177 UART: [art] Store priv key in slot 0x5
46,199,696 UART: [art] Derive Key Pair - Done
46,212,430 UART: [art] Signing Cert with AUTHO
46,213,739 UART: RITY.KEYID = 7
48,492,920 UART: [art] Erasing AUTHORITY.KEYID = 7
48,494,432 UART: [art] PUB.X = EA498F40E0A083BD3DF0767B69F04A17D6E8E937F5ADE3207B33268EBE2F700C87ABB918E1109B352427CC85D6A44B89
48,501,788 UART: [art] PUB.Y = 2517D44CE5FD8CF47C2B7D32B90FA7AEAE7272A1508E98DD58C17C7BECBFA8D3FAEDAAB4202B793BEC9808FD2C7F8BB5
48,508,926 UART: [art] SIG.R = AC2DF0147BA6330EB827863530B5F3C4193374E5A90423D7914A020F2D4C2B000BD2A280CB25062A2C8C5835EBFE1707
48,516,333 UART: [art] SIG.S = 9B1DB4C55C8C9099A137FED173D0DD758CF3F3313B116F40FA2445FE0286C940EA97F4F090D0BC361944388E0C02F07E
49,821,517 UART: Caliptra RT
49,822,212 UART: [state] CFI Enabled
50,108,651 UART: [rt] RT failed reset flow
50,109,864 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,125,822 ready_for_fw is high
4,126,380 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,346,786 >>> mbox cmd response: success
17,347,577 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,984,523 UART:
22,984,926 UART: Running Caliptra FMC ...
22,986,040 UART:
22,986,194 UART: [state] CFI Enabled
22,994,304 UART: [fht] FMC Alias Private Key: 7
25,324,727 UART: [art] Extend RT PCRs Done
25,325,973 UART: [art] Lock RT PCRs Done
25,327,465 UART: [art] Populate DV Done
25,332,828 UART: [fht] FMC Alias Private Key: 7
25,334,362 UART: [art] Derive CDI
25,335,100 UART: [art] Store in in slot 0x4
25,377,744 UART: [art] Derive Key Pair
25,378,743 UART: [art] Store priv key in slot 0x5
28,620,692 UART: [art] Derive Key Pair - Done
28,633,691 UART: [art] Signing Cert with AUTHO
28,634,995 UART: RITY.KEYID = 7
30,914,428 UART: [art] Erasing AUTHORITY.KEYID = 7
30,915,935 UART: [art] PUB.X = 936C2726C0ED07E872A9EABC888DEC75394E73D2E451209FA0341A87DEFF9A4D9DDFAAA5DB599869A31E1FD8C30C6888
30,923,214 UART: [art] PUB.Y = 2999B34BD44B6F6C4ABC5B689D1D998DFDD712DA28A783D9ECED0D6CE9B14DA051854311E1DB5651A91FEBAED5466E98
30,930,481 UART: [art] SIG.R = E691C28D8451ED610CC7E668C620E64B610B6168E664ECE7C02AB26088CBB390AAD77B5DD61BB876EAC9495F30C80DF1
30,937,865 UART: [art] SIG.S = F30798C786542C690E8DA0368431B97C3DAC869A38753AEBB320B1095210C4E489873795A00148003FE08109F21DA14A
32,242,580 UART: mbox::rt_entry...
32,243,562 UART: ____ _ _ _ ____ _____
32,245,497 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,247,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,249,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,251,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,253,328 UART: |_|
32,254,134 UART:
32,366,904 UART: [rt] Runtime listening for mailbox commands...
32,368,909 >>> mbox cmd response data (0 bytes)
34,422,779 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,089,783 >>> mbox cmd response: success
43,124,233 UART:
43,124,552 UART: Running Caliptra FMC ...
43,125,669 UART:
43,125,839 UART: [state] CFI Enabled
43,169,928 UART: [art] Extend RT PCRs Done
43,171,122 UART: [art] Lock RT PCRs Done
43,172,417 UART: [art] Populate DV Done
43,178,098 UART: [fht] FMC Alias Private Key: 7
43,179,796 UART: [art] Derive CDI
43,180,605 UART: [art] Store in in slot 0x4
43,223,464 UART: [art] Derive Key Pair
43,224,463 UART: [art] Store priv key in slot 0x5
46,466,450 UART: [art] Derive Key Pair - Done
46,479,231 UART: [art] Signing Cert with AUTHO
46,480,528 UART: RITY.KEYID = 7
48,760,139 UART: [art] Erasing AUTHORITY.KEYID = 7
48,761,660 UART: [art] PUB.X = 56753789DA858C29FC225C856B7591CACBC6D6447FD86839DEC5C92936022EB1A9C183E4F0D001D1480AD9A997DD53ED
48,768,888 UART: [art] PUB.Y = B32227F8B51C7FCDEDCACFAC71D5752D46CAE4DEB42B349326FF574E323927111B831C3487546D056E294E652B2AD0D9
48,776,125 UART: [art] SIG.R = DDDF27690BF765D0DDE61003A110B0D2D5E2565FCB398ED84F75FDC33C8EA64AB26A41FA70E265DF48BBBB1E6A7C46B3
48,783,534 UART: [art] SIG.S = AA5F7FBC5CDC18E3A22939D77013964EB43854C99B1536568D3AD49B0EB7F6AD6780D8D80F4A3BCEC54116C737322C47
50,088,635 UART: Caliptra RT
50,089,342 UART: [state] CFI Enabled
50,378,378 UART: [rt] RT failed reset flow
50,379,569 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,346 writing to cptra_bootfsm_go
193,420 UART:
193,769 UART: Running Caliptra ROM ...
194,952 UART:
195,107 UART: [state] CFI Enabled
265,902 UART: [state] LifecycleState = Unprovisioned
267,817 UART: [state] DebugLocked = No
269,637 UART: [state] WD Timer not started. Device not locked for debugging
273,889 UART: [kat] SHA2-256
453,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,604 UART: [kat] ++
465,136 UART: [kat] sha1
476,586 UART: [kat] SHA2-256
479,595 UART: [kat] SHA2-384
485,968 UART: [kat] SHA2-512-ACC
488,886 UART: [kat] ECC-384
2,949,593 UART: [kat] HMAC-384Kdf
2,973,864 UART: [kat] LMS
3,503,331 UART: [kat] --
3,507,539 UART: [cold-reset] ++
3,509,043 UART: [fht] FHT @ 0x50003400
3,521,098 UART: [idev] ++
3,521,671 UART: [idev] CDI.KEYID = 6
3,522,740 UART: [idev] SUBJECT.KEYID = 7
3,523,873 UART: [idev] UDS.KEYID = 0
3,524,809 ready_for_fw is high
3,525,019 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,624,096 UART: [idev] Erasing UDS.KEYID = 0
6,029,312 UART: [idev] Sha1 KeyId Algorithm
6,051,684 UART: [idev] --
6,055,465 UART: [ldev] ++
6,056,062 UART: [ldev] CDI.KEYID = 6
6,056,980 UART: [ldev] SUBJECT.KEYID = 5
6,058,144 UART: [ldev] AUTHORITY.KEYID = 7
6,059,378 UART: [ldev] FE.KEYID = 1
6,101,545 UART: [ldev] Erasing FE.KEYID = 1
8,605,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,551 UART: [ldev] --
10,416,374 UART: [fwproc] Wait for Commands...
10,419,333 UART: [fwproc] Recv command 0x46574c44
10,421,424 UART: [fwproc] Recv'd Img size: 78632 bytes
13,384,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,452,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,521,473 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,714,600 >>> mbox cmd response: success
13,715,146 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,718,542 UART: [afmc] ++
13,719,126 UART: [afmc] CDI.KEYID = 6
13,720,034 UART: [afmc] SUBJECT.KEYID = 7
13,721,252 UART: [afmc] AUTHORITY.KEYID = 5
16,255,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,979,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,981,475 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,997,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,013,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,029,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,051,821 UART: [afmc] --
18,054,821 UART: [cold-reset] --
18,059,547 UART: [state] Locking Datavault
18,063,302 UART: [state] Locking PCR0, PCR1 and PCR31
18,064,959 UART: [state] Locking ICCM
18,067,544 UART: [exit] Launching FMC @ 0x40000130
18,075,999 UART:
18,076,239 UART: Running Caliptra FMC ...
18,077,346 UART:
18,077,524 UART: [state] CFI Enabled
18,138,339 UART: [fht] FMC Alias Private Key: 7
19,901,989 UART: [art] Extend RT PCRs Done
19,903,207 UART: [art] Lock RT PCRs Done
19,904,857 UART: [art] Populate DV Done
19,910,266 UART: [fht] FMC Alias Private Key: 7
19,911,860 UART: [art] Derive CDI
19,912,677 UART: [art] Store in in slot 0x4
19,970,757 UART: [art] Derive Key Pair
19,971,789 UART: [art] Store priv key in slot 0x5
22,435,235 UART: [art] Derive Key Pair - Done
22,448,291 UART: [art] Signing Cert with AUTHO
22,449,601 UART: RITY.KEYID = 7
24,161,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,162,924 UART: [art] PUB.X = CAFA566AA797E22D2270C6C8317007F6234FB5A301CF06E2F8A6C7721D6BE4EE91E697E7AAF6924D43D30EA76E721121
24,170,056 UART: [art] PUB.Y = B022FBADECD87B26F1BC17D3598228A1E39D95A202A88C3E3AC100B73936C25A9466571E8ADEC894F9581BC3579B38CF
24,177,279 UART: [art] SIG.R = 190E35E90EF4CB39C0F60A32A0EE52D8B0BF07A9AC336CEF9A1D8811DDA4043958C9939DD9D3D961092D6D9B855195D2
24,184,713 UART: [art] SIG.S = AEE2CF388A2DC83AA821820EC28F8FE87248CC956C84F480E2BD8A8A989E77E1BC97F823CF84D44B0086FB25D007311A
25,163,222 UART: mbox::rt_entry...
25,164,191 UART: ____ _ _ _ ____ _____
25,166,117 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,168,122 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,169,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,171,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,173,783 UART: |_|
25,174,611 UART:
25,287,608 UART: [rt] Runtime listening for mailbox commands...
25,289,614 >>> mbox cmd response data (0 bytes)
27,346,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,490,890 UART:
27,491,274 UART: Running Caliptra ROM ...
27,492,366 UART:
27,492,531 UART: [state] CFI Enabled
27,549,848 UART: [state] LifecycleState = Unprovisioned
27,551,732 UART: [state] DebugLocked = No
27,552,874 UART: [state] WD Timer not started. Device not locked for debugging
27,556,634 UART: [kat] SHA2-256
27,735,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,747,337 UART: [kat] ++
27,747,795 UART: [kat] sha1
27,759,974 UART: [kat] SHA2-256
27,763,003 UART: [kat] SHA2-384
27,770,222 UART: [kat] SHA2-512-ACC
27,773,174 UART: [kat] ECC-384
30,235,200 UART: [kat] HMAC-384Kdf
30,256,122 UART: [kat] LMS
30,785,572 UART: [kat] --
30,788,553 UART: [update-reset] ++
34,209,297 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,212,303 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
34,595,288 >>> mbox cmd response: success
34,599,853 UART: [update-reset] Copying MAN_2 To MAN_1
34,617,837 UART: [update-reset Success] --
34,619,878 UART: [state] Locking Datavault
34,623,113 UART: [state] Locking PCR0, PCR1 and PCR31
34,624,753 UART: [state] Locking ICCM
34,626,768 UART: [exit] Launching FMC @ 0x40000130
34,635,215 UART:
34,635,455 UART: Running Caliptra FMC ...
34,636,851 UART:
34,637,018 UART: [state] CFI Enabled
34,725,803 UART: [art] Extend RT PCRs Done
34,727,012 UART: [art] Lock RT PCRs Done
34,728,556 UART: [art] Populate DV Done
34,734,202 UART: [fht] FMC Alias Private Key: 7
34,735,858 UART: [art] Derive CDI
34,736,675 UART: [art] Store in in slot 0x4
34,794,577 UART: [art] Derive Key Pair
34,795,579 UART: [art] Store priv key in slot 0x5
37,258,250 UART: [art] Derive Key Pair - Done
37,271,092 UART: [art] Signing Cert with AUTHO
37,272,398 UART: RITY.KEYID = 7
38,983,788 UART: [art] Erasing AUTHORITY.KEYID = 7
38,985,285 UART: [art] PUB.X = 3E352364FE034E69CF83602BD5B598982C79DC281AAF67F1463C67FBD97037E99705B9B18C88E49D49A29EDB159DF0DA
38,992,565 UART: [art] PUB.Y = 5542C3D35D31C680E618B281D8A64E0F32C3230C14FF284C884F86743419BFB79245BA127244518ABB422FFC88E39DE4
38,999,825 UART: [art] SIG.R = 497ADAB5239F02A06FE6B5BBA4643E11FCCC4C7981FCFC5924BCB6AC1BF3F03AC11EB8DFBF58C5CEB27B8EA189A3A013
39,007,251 UART: [art] SIG.S = F51E73EF80744663B267270ECEBEA7A4C5666EF1257BCA469602A3E58A25C8757D6676D373A9E65FED3319F9353B35ED
39,986,115 UART: Caliptra RT
39,986,828 UART: [state] CFI Enabled
40,323,201 UART: [rt] RT failed reset flow
40,324,414 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,492 UART:
192,877 UART: Running Caliptra ROM ...
194,016 UART:
194,168 UART: [state] CFI Enabled
264,353 UART: [state] LifecycleState = Unprovisioned
266,759 UART: [state] DebugLocked = No
269,430 UART: [state] WD Timer not started. Device not locked for debugging
273,482 UART: [kat] SHA2-256
463,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,157 UART: [kat] ++
474,607 UART: [kat] sha1
484,623 UART: [kat] SHA2-256
487,633 UART: [kat] SHA2-384
493,989 UART: [kat] SHA2-512-ACC
496,573 UART: [kat] ECC-384
2,948,464 UART: [kat] HMAC-384Kdf
2,971,570 UART: [kat] LMS
3,503,366 UART: [kat] --
3,509,253 UART: [cold-reset] ++
3,511,253 UART: [fht] FHT @ 0x50003400
3,524,294 UART: [idev] ++
3,525,009 UART: [idev] CDI.KEYID = 6
3,525,935 UART: [idev] SUBJECT.KEYID = 7
3,527,110 UART: [idev] UDS.KEYID = 0
3,528,037 ready_for_fw is high
3,528,272 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,627,530 UART: [idev] Erasing UDS.KEYID = 0
6,048,248 UART: [idev] Sha1 KeyId Algorithm
6,069,761 UART: [idev] --
6,074,680 UART: [ldev] ++
6,075,398 UART: [ldev] CDI.KEYID = 6
6,076,288 UART: [ldev] SUBJECT.KEYID = 5
6,077,391 UART: [ldev] AUTHORITY.KEYID = 7
6,078,691 UART: [ldev] FE.KEYID = 1
6,120,427 UART: [ldev] Erasing FE.KEYID = 1
8,626,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,952 UART: [ldev] --
10,434,957 UART: [fwproc] Wait for Commands...
10,437,331 UART: [fwproc] Recv command 0x46574c44
10,439,585 UART: [fwproc] Recv'd Img size: 78632 bytes
13,454,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,531,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,647,701 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,976,659 >>> mbox cmd response: success
13,977,156 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,980,276 UART: [afmc] ++
13,981,028 UART: [afmc] CDI.KEYID = 6
13,982,219 UART: [afmc] SUBJECT.KEYID = 7
13,983,652 UART: [afmc] AUTHORITY.KEYID = 5
16,526,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,253,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,255,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,270,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,286,075 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,301,129 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,323,996 UART: [afmc] --
18,327,327 UART: [cold-reset] --
18,332,009 UART: [state] Locking Datavault
18,339,444 UART: [state] Locking PCR0, PCR1 and PCR31
18,341,622 UART: [state] Locking ICCM
18,344,220 UART: [exit] Launching FMC @ 0x40000130
18,352,896 UART:
18,353,133 UART: Running Caliptra FMC ...
18,354,158 UART:
18,354,306 UART: [state] CFI Enabled
18,409,853 UART: [fht] FMC Alias Private Key: 7
20,173,897 UART: [art] Extend RT PCRs Done
20,175,123 UART: [art] Lock RT PCRs Done
20,176,399 UART: [art] Populate DV Done
20,181,726 UART: [fht] FMC Alias Private Key: 7
20,183,248 UART: [art] Derive CDI
20,184,017 UART: [art] Store in in slot 0x4
20,242,872 UART: [art] Derive Key Pair
20,243,877 UART: [art] Store priv key in slot 0x5
22,706,879 UART: [art] Derive Key Pair - Done
22,719,600 UART: [art] Signing Cert with AUTHO
22,720,907 UART: RITY.KEYID = 7
24,432,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,465 UART: [art] PUB.X = E9E4A4362D68B551D700D33F3EE6F8466C4EA575F826F4F80152EAF5A55ADFD03A99A23F09E179690F5229FB47D8D58C
24,441,704 UART: [art] PUB.Y = A2A4AAD0F43B6365996225E624C25CBEBCD21DB335FDCA793447BD9E1FB0CB3F3F38708138DE593C97A6E416711FF1A1
24,448,979 UART: [art] SIG.R = 04823FA7F7C9007FB64BC6D5988B73E6206ADED6B0772D7CE38619508944989D8181B91C54AE4AD38C5D240C3A6E3B0E
24,456,315 UART: [art] SIG.S = F887CECDD0B56841FFEFBC83CDD0636D0A0A2E7BF692F5A00DA7C44F2C5B3FD836CBEE439CBDFCDC1222979A93FB66BD
25,435,092 UART: mbox::rt_entry...
25,436,064 UART: ____ _ _ _ ____ _____
25,437,999 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,440,027 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,441,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,443,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,445,687 UART: |_|
25,446,515 UART:
25,559,061 UART: [rt] Runtime listening for mailbox commands...
25,561,070 >>> mbox cmd response data (0 bytes)
27,617,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,761,749 UART:
27,762,136 UART: Running Caliptra ROM ...
27,763,248 UART:
27,763,412 UART: [state] CFI Enabled
27,823,012 UART: [state] LifecycleState = Unprovisioned
27,825,060 UART: [state] DebugLocked = No
27,826,507 UART: [state] WD Timer not started. Device not locked for debugging
27,831,625 UART: [kat] SHA2-256
28,021,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,032,259 UART: [kat] ++
28,032,807 UART: [kat] sha1
28,044,678 UART: [kat] SHA2-256
28,047,664 UART: [kat] SHA2-384
28,054,470 UART: [kat] SHA2-512-ACC
28,057,042 UART: [kat] ECC-384
30,508,068 UART: [kat] HMAC-384Kdf
30,531,167 UART: [kat] LMS
31,062,708 UART: [kat] --
31,067,797 UART: [update-reset] ++
34,531,579 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,535,615 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,143,377 >>> mbox cmd response: success
35,148,043 UART: [update-reset] Copying MAN_2 To MAN_1
35,182,030 UART: [update-reset Success] --
35,187,104 UART: [state] Locking Datavault
35,190,763 UART: [state] Locking PCR0, PCR1 and PCR31
35,192,978 UART: [state] Locking ICCM
35,194,329 UART: [exit] Launching FMC @ 0x40000130
35,203,019 UART:
35,203,259 UART: Running Caliptra FMC ...
35,204,471 UART:
35,204,626 UART: [state] CFI Enabled
35,300,349 UART: [art] Extend RT PCRs Done
35,301,554 UART: [art] Lock RT PCRs Done
35,303,023 UART: [art] Populate DV Done
35,308,384 UART: [fht] FMC Alias Private Key: 7
35,309,976 UART: [art] Derive CDI
35,310,791 UART: [art] Store in in slot 0x4
35,368,747 UART: [art] Derive Key Pair
35,369,754 UART: [art] Store priv key in slot 0x5
37,832,326 UART: [art] Derive Key Pair - Done
37,845,226 UART: [art] Signing Cert with AUTHO
37,846,533 UART: RITY.KEYID = 7
39,558,326 UART: [art] Erasing AUTHORITY.KEYID = 7
39,559,830 UART: [art] PUB.X = 88DE1BA09F5EE9950B708763892E0B688D6835D8BAE9AE246222ADA26DCE9B9958F0C0A530CF8C46A1593675C1B3B69C
39,567,126 UART: [art] PUB.Y = 384CBB65AE9374E81A63F054A456EBE5D49B732F5D51BAE19C4290E59DA8640A397E4BF9E764AA41C0EB39A9AF58CAB4
39,574,420 UART: [art] SIG.R = 257256663DCA314D7E0B1F9FF8430E65C539628241D4A3089C434F20D8D4847C15C61285C67D3E714BD57807DC3E3390
39,581,798 UART: [art] SIG.S = 31C62D9B63BAE5C28A3C41CE407AA2CBB4541ACCAAF5285788B4D7410F6B6FF33ADCC3C409B2EEB0D942C9C14E22BBF9
40,560,535 UART: Caliptra RT
40,561,238 UART: [state] CFI Enabled
40,899,095 UART: [rt] RT failed reset flow
40,900,298 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,417,930 ready_for_fw is high
3,418,576 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,948,026 >>> mbox cmd response: success
13,948,669 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,236,478 UART:
18,236,881 UART: Running Caliptra FMC ...
18,238,033 UART:
18,238,197 UART: [state] CFI Enabled
18,303,701 UART: [fht] FMC Alias Private Key: 7
20,067,307 UART: [art] Extend RT PCRs Done
20,068,534 UART: [art] Lock RT PCRs Done
20,070,318 UART: [art] Populate DV Done
20,075,568 UART: [fht] FMC Alias Private Key: 7
20,077,280 UART: [art] Derive CDI
20,078,103 UART: [art] Store in in slot 0x4
20,136,489 UART: [art] Derive Key Pair
20,137,536 UART: [art] Store priv key in slot 0x5
22,599,382 UART: [art] Derive Key Pair - Done
22,612,384 UART: [art] Signing Cert with AUTHO
22,613,695 UART: RITY.KEYID = 7
24,325,181 UART: [art] Erasing AUTHORITY.KEYID = 7
24,326,701 UART: [art] PUB.X = 29B4B85AA9C0655D58134A3A513F2F3D63C1625B2287D27007FC380804B1CFD8F76E7D34EDC9F9E8BECEE679C9C961E0
24,334,005 UART: [art] PUB.Y = 736C365EC004FCA602AC0D66975DA16CD7C8C61FCD7D77702F87B4E7A2060BD0A9651A1880DFB3F568CBE527C6D42AB7
24,341,229 UART: [art] SIG.R = 94454A6526F64D19EBCCF48A6668B577EE60DCBADE6B9320F8AFCFBB7C1B91035EDF787A6A993C27676049966C264E85
24,348,643 UART: [art] SIG.S = 28C3B73D38B1C13E4D71A4531215D3535AC500391727B70B1DF364DB0BEE5F3308B61DB7BC9AD106251C82AA998BA2FA
25,326,398 UART: mbox::rt_entry...
25,327,352 UART: ____ _ _ _ ____ _____
25,329,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,331,347 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,333,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,335,242 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,337,182 UART: |_|
25,338,174 UART:
25,451,262 UART: [rt] Runtime listening for mailbox commands...
25,453,263 >>> mbox cmd response data (0 bytes)
27,510,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,300,023 >>> mbox cmd response: success
35,334,227 UART:
35,334,550 UART: Running Caliptra FMC ...
35,335,667 UART:
35,335,840 UART: [state] CFI Enabled
35,423,329 UART: [art] Extend RT PCRs Done
35,424,527 UART: [art] Lock RT PCRs Done
35,425,717 UART: [art] Populate DV Done
35,431,186 UART: [fht] FMC Alias Private Key: 7
35,432,670 UART: [art] Derive CDI
35,433,455 UART: [art] Store in in slot 0x4
35,492,666 UART: [art] Derive Key Pair
35,493,715 UART: [art] Store priv key in slot 0x5
37,956,455 UART: [art] Derive Key Pair - Done
37,969,513 UART: [art] Signing Cert with AUTHO
37,970,819 UART: RITY.KEYID = 7
39,682,189 UART: [art] Erasing AUTHORITY.KEYID = 7
39,683,698 UART: [art] PUB.X = 4C4A9553F5E7752461B770A6AD832945FAC0743C0F8F21526F0D6084622352ECDB90B21651FF0A2028B4355BC98CECA4
39,690,931 UART: [art] PUB.Y = 5AF97A43356E0AE79DAFE14311CFCAA90F7DECCFC3170D9C6839DF3934BD7448773F39C65E1A2B5A449FC11A15A9338F
39,698,249 UART: [art] SIG.R = 4BDD78CE24FACB05A61E8B35932F4D8EC2BF0CFB7B6140475C8A0F2F35562D54C969D53A9F53110907366E30950AE21F
39,705,671 UART: [art] SIG.S = EF98342BFC5A9869AE679AFF93957666E4B39D1797E5F614405A81B7BB53E6F549A08269D61F4F97DE82DA1CD5220E82
40,684,455 UART: Caliptra RT
40,685,169 UART: [state] CFI Enabled
41,021,062 UART: [rt] RT failed reset flow
41,022,262 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,558 UART:
192,920 UART: Running Caliptra ROM ...
194,092 UART:
603,680 UART: [state] CFI Enabled
619,078 UART: [state] LifecycleState = Unprovisioned
621,458 UART: [state] DebugLocked = No
623,049 UART: [state] WD Timer not started. Device not locked for debugging
627,076 UART: [kat] SHA2-256
816,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,737 UART: [kat] ++
828,257 UART: [kat] sha1
840,761 UART: [kat] SHA2-256
843,834 UART: [kat] SHA2-384
850,458 UART: [kat] SHA2-512-ACC
853,038 UART: [kat] ECC-384
3,295,742 UART: [kat] HMAC-384Kdf
3,307,684 UART: [kat] LMS
3,839,484 UART: [kat] --
3,844,858 UART: [cold-reset] ++
3,846,797 UART: [fht] FHT @ 0x50003400
3,858,857 UART: [idev] ++
3,859,562 UART: [idev] CDI.KEYID = 6
3,860,512 UART: [idev] SUBJECT.KEYID = 7
3,861,680 UART: [idev] UDS.KEYID = 0
3,862,679 ready_for_fw is high
3,862,862 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,961,666 UART: [idev] Erasing UDS.KEYID = 0
6,341,364 UART: [idev] Sha1 KeyId Algorithm
6,363,476 UART: [idev] --
6,368,767 UART: [ldev] ++
6,369,454 UART: [ldev] CDI.KEYID = 6
6,370,370 UART: [ldev] SUBJECT.KEYID = 5
6,371,524 UART: [ldev] AUTHORITY.KEYID = 7
6,372,756 UART: [ldev] FE.KEYID = 1
6,381,724 UART: [ldev] Erasing FE.KEYID = 1
8,861,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,973 UART: [ldev] --
10,652,171 UART: [fwproc] Wait for Commands...
10,654,210 UART: [fwproc] Recv command 0x46574c44
10,656,463 UART: [fwproc] Recv'd Img size: 78632 bytes
13,665,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,740,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,856,627 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,184,332 >>> mbox cmd response: success
14,184,840 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
14,188,512 UART: [afmc] ++
14,189,206 UART: [afmc] CDI.KEYID = 6
14,190,450 UART: [afmc] SUBJECT.KEYID = 7
14,191,906 UART: [afmc] AUTHORITY.KEYID = 5
16,696,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,417,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,419,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,434,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,449,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,464,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,488,280 UART: [afmc] --
18,491,238 UART: [cold-reset] --
18,495,474 UART: [state] Locking Datavault
18,501,202 UART: [state] Locking PCR0, PCR1 and PCR31
18,503,382 UART: [state] Locking ICCM
18,504,701 UART: [exit] Launching FMC @ 0x40000130
18,513,410 UART:
18,513,641 UART: Running Caliptra FMC ...
18,514,659 UART:
18,514,824 UART: [state] CFI Enabled
18,523,035 UART: [fht] FMC Alias Private Key: 7
20,279,471 UART: [art] Extend RT PCRs Done
20,280,691 UART: [art] Lock RT PCRs Done
20,282,152 UART: [art] Populate DV Done
20,287,402 UART: [fht] FMC Alias Private Key: 7
20,289,047 UART: [art] Derive CDI
20,289,862 UART: [art] Store in in slot 0x4
20,332,072 UART: [art] Derive Key Pair
20,333,109 UART: [art] Store priv key in slot 0x5
22,759,948 UART: [art] Derive Key Pair - Done
22,772,784 UART: [art] Signing Cert with AUTHO
22,774,077 UART: RITY.KEYID = 7
24,479,839 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,343 UART: [art] PUB.X = 234030E4ADAD633CA395DAA19DA4F8AAB6CF6AFB0CF64D0880478F7D854C31A3FDDDE504F0945DDF7743E8B27C8153FA
24,488,647 UART: [art] PUB.Y = 1AF286D308764926A27859B83C08F4E92E7976D8077278F8F707AC61075E3330151F79115CD991CA435DA88EFE4AF833
24,495,839 UART: [art] SIG.R = 7E3FBF69B64AB9A16FC7C7D76B5E3A2E435458C03D6451D7B38A6976167B5E7543151722985FA4FB5367805E42149453
24,503,239 UART: [art] SIG.S = 62A9E0471E3E82B77247E5C21290068535CCC88A85971F1D792B37F89E75C5354EA5D8EAF77E07745D4DC1E1417E4DA0
25,481,890 UART: mbox::rt_entry...
25,482,866 UART: ____ _ _ _ ____ _____
25,484,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,486,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,488,742 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,490,671 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,492,597 UART: |_|
25,493,482 UART:
25,606,418 UART: [rt] Runtime listening for mailbox commands...
25,608,429 >>> mbox cmd response data (0 bytes)
27,663,217 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,807,899 UART:
27,808,277 UART: Running Caliptra ROM ...
27,809,328 UART:
27,809,537 UART: [state] CFI Enabled
27,825,432 UART: [state] LifecycleState = Unprovisioned
27,827,267 UART: [state] DebugLocked = No
27,828,613 UART: [state] WD Timer not started. Device not locked for debugging
27,833,752 UART: [kat] SHA2-256
28,023,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,034,397 UART: [kat] ++
28,034,913 UART: [kat] sha1
28,046,719 UART: [kat] SHA2-256
28,049,683 UART: [kat] SHA2-384
28,055,372 UART: [kat] SHA2-512-ACC
28,057,943 UART: [kat] ECC-384
30,498,822 UART: [kat] HMAC-384Kdf
30,511,709 UART: [kat] LMS
31,043,329 UART: [kat] --
31,048,021 UART: [update-reset] ++
34,517,059 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,519,787 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,127,512 >>> mbox cmd response: success
35,132,137 UART: [update-reset] Copying MAN_2 To MAN_1
35,167,071 UART: [update-reset Success] --
35,172,409 UART: [state] Locking Datavault
35,174,984 UART: [state] Locking PCR0, PCR1 and PCR31
35,177,179 UART: [state] Locking ICCM
35,179,811 UART: [exit] Launching FMC @ 0x40000130
35,188,476 UART:
35,188,709 UART: Running Caliptra FMC ...
35,189,937 UART:
35,190,099 UART: [state] CFI Enabled
35,233,193 UART: [art] Extend RT PCRs Done
35,234,358 UART: [art] Lock RT PCRs Done
35,235,803 UART: [art] Populate DV Done
35,241,425 UART: [fht] FMC Alias Private Key: 7
35,243,180 UART: [art] Derive CDI
35,243,990 UART: [art] Store in in slot 0x4
35,286,346 UART: [art] Derive Key Pair
35,287,395 UART: [art] Store priv key in slot 0x5
37,714,102 UART: [art] Derive Key Pair - Done
37,726,967 UART: [art] Signing Cert with AUTHO
37,728,277 UART: RITY.KEYID = 7
39,433,865 UART: [art] Erasing AUTHORITY.KEYID = 7
39,435,373 UART: [art] PUB.X = 09A284138D8C2F2B0FE9F7B91BF64CA3BC6A260CF599A750AF633DF74D04DE4DF9E118D8CEA1629EFF56D085EACCF29D
39,442,680 UART: [art] PUB.Y = BF22D58FC80F78A2E5855B1702C4F0F769E62711D9D1931EBF2E9B6C0740FC471D127F91D6EFBE77921C5EED28C00B53
39,449,969 UART: [art] SIG.R = 9F2586EACDE030CB62A4C0CEE47DA5E279A34186D46CFC722EF150F22CA948DFDC10B42191962267C5C59534D51EAA32
39,457,371 UART: [art] SIG.S = F9AFEFBCC6ADEB68E0BB29825E2C80542E371E4651D9E1C4AF589956ADFDE8A5648C1D8DA293A8D8A7D62CAED4D78BFD
40,436,728 UART: Caliptra RT
40,437,446 UART: [state] CFI Enabled
40,724,151 UART: [rt] RT failed reset flow
40,725,343 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,753,693 ready_for_fw is high
3,754,283 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,191,534 >>> mbox cmd response: success
14,192,115 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,448,397 UART:
18,448,788 UART: Running Caliptra FMC ...
18,449,903 UART:
18,450,058 UART: [state] CFI Enabled
18,457,911 UART: [fht] FMC Alias Private Key: 7
20,215,087 UART: [art] Extend RT PCRs Done
20,216,316 UART: [art] Lock RT PCRs Done
20,218,126 UART: [art] Populate DV Done
20,223,588 UART: [fht] FMC Alias Private Key: 7
20,225,235 UART: [art] Derive CDI
20,225,968 UART: [art] Store in in slot 0x4
20,268,619 UART: [art] Derive Key Pair
20,269,661 UART: [art] Store priv key in slot 0x5
22,696,901 UART: [art] Derive Key Pair - Done
22,710,222 UART: [art] Signing Cert with AUTHO
22,711,525 UART: RITY.KEYID = 7
24,417,173 UART: [art] Erasing AUTHORITY.KEYID = 7
24,418,678 UART: [art] PUB.X = 9112173191796589AA8964B053127A2B87E8D377E4F6B96B156DD39B500A6F2DDDC1AEA343F5682E509D077825308D09
24,425,929 UART: [art] PUB.Y = 708FEDCD2D689F8F1252828BB8728E0568505AE8EE0A72965E88141C775C83CF40819284C72AFCFA9079C632FCACD11C
24,433,211 UART: [art] SIG.R = EC52714969AAC49CB59861147FD38850FD413B11BD83C10ED16FE059A90C6008313FB2F1A5DF1E12AFD3D42001235EAA
24,440,599 UART: [art] SIG.S = 76FDE3F979C1A4E8FB2F637E206304C68F991DDC78699968CCDE8D1F58B52B3CC08C605830849C09302E06826C8ECD5A
25,419,089 UART: mbox::rt_entry...
25,420,052 UART: ____ _ _ _ ____ _____
25,421,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,423,986 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,425,842 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,427,793 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,429,673 UART: |_|
25,430,554 UART:
25,544,909 UART: [rt] Runtime listening for mailbox commands...
25,546,918 >>> mbox cmd response data (0 bytes)
27,602,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,327,132 >>> mbox cmd response: success
35,361,036 UART:
35,361,387 UART: Running Caliptra FMC ...
35,362,517 UART:
35,362,685 UART: [state] CFI Enabled
35,406,597 UART: [art] Extend RT PCRs Done
35,407,747 UART: [art] Lock RT PCRs Done
35,409,255 UART: [art] Populate DV Done
35,414,773 UART: [fht] FMC Alias Private Key: 7
35,416,489 UART: [art] Derive CDI
35,417,303 UART: [art] Store in in slot 0x4
35,460,498 UART: [art] Derive Key Pair
35,461,541 UART: [art] Store priv key in slot 0x5
37,888,695 UART: [art] Derive Key Pair - Done
37,901,589 UART: [art] Signing Cert with AUTHO
37,902,895 UART: RITY.KEYID = 7
39,608,581 UART: [art] Erasing AUTHORITY.KEYID = 7
39,610,087 UART: [art] PUB.X = A784095EF34BA822E5E1E8927E3DFA38F7B73ADC5BF8D90CF16AB8538CD957E269747004714CAF5600B3DC3C65E332E2
39,617,351 UART: [art] PUB.Y = 2AED04570E34D93E81E81DD9730701EC4FD62B1C4FE25792CA44E4B846A1B6728864F02C36AE7EC2968D67C86E7DBB18
39,624,591 UART: [art] SIG.R = 21EA4D5CB46A50862B9D72091407A8C971774D3A185BF7BD5DD360419F45B0CCADEA9C0A715848CB6F2CCFD84658743D
39,631,985 UART: [art] SIG.S = 177BF88C4127B2599D03BDBB4525732824824000F16115F57035F94EE7BCCB3201CBF42B22AE32BD32BA1DE61E4720B1
40,610,585 UART: Caliptra RT
40,611,305 UART: [state] CFI Enabled
40,896,504 UART: [rt] RT failed reset flow
40,897,697 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
890,967 UART: [kat] SHA2-256
892,905 UART: [kat] SHA2-384
895,674 UART: [kat] SHA2-512-ACC
897,575 UART: [kat] ECC-384
903,096 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,476,821 UART: [cold-reset] ++
1,477,351 UART: [fht] Storing FHT @ 0x50003400
1,480,182 UART: [idev] ++
1,480,350 UART: [idev] CDI.KEYID = 6
1,480,710 UART: [idev] SUBJECT.KEYID = 7
1,481,134 UART: [idev] UDS.KEYID = 0
1,481,479 ready_for_fw is high
1,481,479 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,489,060 UART: [idev] Erasing UDS.KEYID = 0
1,505,644 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,276 UART: [idev] --
1,515,313 UART: [ldev] ++
1,515,481 UART: [ldev] CDI.KEYID = 6
1,515,844 UART: [ldev] SUBJECT.KEYID = 5
1,516,270 UART: [ldev] AUTHORITY.KEYID = 7
1,516,733 UART: [ldev] FE.KEYID = 1
1,521,629 UART: [ldev] Erasing FE.KEYID = 1
1,546,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,724 UART: [ldev] --
1,586,181 UART: [fwproc] Waiting for Commands...
1,587,042 UART: [fwproc] Received command 0x46574c44
1,587,833 UART: [fwproc] Received Image of size 78632 bytes
2,476,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,284 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,615,025 >>> mbox cmd response: success
2,615,025 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,616,171 UART: [afmc] ++
2,616,339 UART: [afmc] CDI.KEYID = 6
2,616,701 UART: [afmc] SUBJECT.KEYID = 7
2,617,126 UART: [afmc] AUTHORITY.KEYID = 5
2,652,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,987 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,380 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,070 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,909 UART: [afmc] --
2,696,027 UART: [cold-reset] --
2,696,943 UART: [state] Locking Datavault
2,698,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,756 UART: [state] Locking ICCM
2,699,192 UART: [exit] Launching FMC @ 0x40000130
2,704,521 UART:
2,704,537 UART: Running Caliptra FMC ...
2,704,945 UART:
2,704,999 UART: [state] CFI Enabled
2,715,638 UART: [fht] FMC Alias Private Key: 7
2,824,029 UART: [art] Extend RT PCRs Done
2,824,457 UART: [art] Lock RT PCRs Done
2,825,961 UART: [art] Populate DV Done
2,834,022 UART: [fht] FMC Alias Private Key: 7
2,835,190 UART: [art] Derive CDI
2,835,470 UART: [art] Store in in slot 0x4
2,920,847 UART: [art] Derive Key Pair
2,921,207 UART: [art] Store priv key in slot 0x5
2,934,137 UART: [art] Derive Key Pair - Done
2,949,129 UART: [art] Signing Cert with AUTHO
2,949,609 UART: RITY.KEYID = 7
2,965,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,120 UART: [art] PUB.X = 6DEEF8D855EE9A1068D02AD55536C9E438B8BA1A134F75581D8663922081FADC2160CE11E27626AFEB0CEBC038EC76DA
2,972,901 UART: [art] PUB.Y = 76E82EBEFC7CC056B137EA19183493DF960CBBA14AE31B6817862E44DF29622F306BD1AE3D7FE33D5455205D4C8476BE
2,979,858 UART: [art] SIG.R = ADA505420A50A28B77EC6CA75132FF11B3F190F75F1763538925310B88624C75DBB5615A4503A84E138E2CF50F71E3F4
2,986,611 UART: [art] SIG.S = 224D79F4966352E2FA242082B56E229FF3801677A7AB02831AC948BA354F3970059969DBDDF1148033CE541CB871347C
3,010,398 UART: mbox::rt_entry...
3,010,770 UART: ____ _ _ _ ____ _____
3,011,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,354 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,122 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,890 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,658 UART: |_|
3,014,970 UART:
3,122,158 UART: [rt] Runtime listening for mailbox commands...
3,123,082 >>> mbox cmd response data (0 bytes)
3,123,083 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,123,197 UART:
3,123,213 UART: Running Caliptra ROM ...
3,123,621 UART:
3,123,675 UART: [state] CFI Enabled
3,125,743 UART: [state] LifecycleState = Unprovisioned
3,126,398 UART: [state] DebugLocked = No
3,126,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,128,587 UART: [kat] SHA2-256
3,922,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,926,633 UART: [kat] ++
3,926,785 UART: [kat] sha1
3,930,937 UART: [kat] SHA2-256
3,932,875 UART: [kat] SHA2-384
3,935,502 UART: [kat] SHA2-512-ACC
3,937,402 UART: [kat] ECC-384
3,943,071 UART: [kat] HMAC-384Kdf
3,947,631 UART: [kat] LMS
4,515,827 UART: [kat] --
4,516,782 UART: [update-reset] ++
5,851,877 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,145 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,003,063 >>> mbox cmd response: success
6,003,172 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,186 UART: [update-reset Success] --
6,012,221 UART: [state] Locking Datavault
6,013,151 UART: [state] Locking PCR0, PCR1 and PCR31
6,013,755 UART: [state] Locking ICCM
6,014,415 UART: [exit] Launching FMC @ 0x40000130
6,019,744 UART:
6,019,760 UART: Running Caliptra FMC ...
6,020,168 UART:
6,020,222 UART: [state] CFI Enabled
6,109,431 UART: [art] Extend RT PCRs Done
6,109,859 UART: [art] Lock RT PCRs Done
6,110,982 UART: [art] Populate DV Done
6,119,221 UART: [fht] FMC Alias Private Key: 7
6,120,209 UART: [art] Derive CDI
6,120,489 UART: [art] Store in in slot 0x4
6,206,474 UART: [art] Derive Key Pair
6,206,834 UART: [art] Store priv key in slot 0x5
6,220,144 UART: [art] Derive Key Pair - Done
6,234,751 UART: [art] Signing Cert with AUTHO
6,235,231 UART: RITY.KEYID = 7
6,250,575 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,340 UART: [art] PUB.X = 2FC4386C38F3FA9C5A20D2AA214CCA86B3F9E26D8F9B87FEBB17A09700EE3202A4BB880E9A06E8128933F2604BD16C83
6,258,091 UART: [art] PUB.Y = 7B5BDECFCC33F465F803A856F5CAF79FC754C07A85E459FD0075563D7555F14D71D48B4A67D340DE85BEE6D784EF871D
6,265,030 UART: [art] SIG.R = AC2A228C0C77CC5BF34889B65674413541A533C862433F0F893D35A571AF24BAA034BB065FCCF64827DCB41E519840E9
6,271,793 UART: [art] SIG.S = C4F6E61723D13AA3C950FD365EF42649B105C0325079A96F754989717115BA12B40FD7AFDEA513C2499CAC1E72E33AE8
6,295,218 UART: Caliptra RT
6,295,472 UART: [state] CFI Enabled
6,576,231 UART: [rt] RT failed reset flow
6,576,662 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,829 ready_for_fw is high
1,361,829 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,462,679 >>> mbox cmd response: success
2,462,679 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,523,625 UART:
2,523,641 UART: Running Caliptra FMC ...
2,524,049 UART:
2,524,103 UART: [state] CFI Enabled
2,534,640 UART: [fht] FMC Alias Private Key: 7
2,642,401 UART: [art] Extend RT PCRs Done
2,642,829 UART: [art] Lock RT PCRs Done
2,644,465 UART: [art] Populate DV Done
2,652,672 UART: [fht] FMC Alias Private Key: 7
2,653,700 UART: [art] Derive CDI
2,653,980 UART: [art] Store in in slot 0x4
2,739,285 UART: [art] Derive Key Pair
2,739,645 UART: [art] Store priv key in slot 0x5
2,753,035 UART: [art] Derive Key Pair - Done
2,767,697 UART: [art] Signing Cert with AUTHO
2,768,177 UART: RITY.KEYID = 7
2,782,905 UART: [art] Erasing AUTHORITY.KEYID = 7
2,783,670 UART: [art] PUB.X = B406C61EAC135A839B9F6207BDF536E98690A3D14D7AFCE1310F6C87D48C9470E7E6523E67D55337C8865597E9819A04
2,790,426 UART: [art] PUB.Y = 4D87130850421CD101AD4DC42555704F2EADDA447B4AA73C7C5F6739A01C8780B693431F8070C952562E8812F0B76034
2,797,362 UART: [art] SIG.R = B1C3ED440403CDD58EBF8DF6349323B528A146B983CEB422E8BAAB777791D9B83AD808A3E0A6C61B12A4B401B0E6A7E8
2,804,134 UART: [art] SIG.S = 61E8CBC064ADCE488BA7244F4A037ED4E56194C61C8DDB99D6660377444F72BF570E7C75CD6944961C7B14A2F505EA19
2,828,143 UART: mbox::rt_entry...
2,828,515 UART: ____ _ _ _ ____ _____
2,829,299 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,830,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,830,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,831,635 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,832,403 UART: |_|
2,832,715 UART:
2,940,501 UART: [rt] Runtime listening for mailbox commands...
2,941,425 >>> mbox cmd response data (0 bytes)
2,941,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,701,908 >>> mbox cmd response: success
5,715,499 UART:
5,715,515 UART: Running Caliptra FMC ...
5,715,923 UART:
5,715,977 UART: [state] CFI Enabled
5,805,318 UART: [art] Extend RT PCRs Done
5,805,746 UART: [art] Lock RT PCRs Done
5,807,385 UART: [art] Populate DV Done
5,815,710 UART: [fht] FMC Alias Private Key: 7
5,816,872 UART: [art] Derive CDI
5,817,152 UART: [art] Store in in slot 0x4
5,902,735 UART: [art] Derive Key Pair
5,903,095 UART: [art] Store priv key in slot 0x5
5,916,165 UART: [art] Derive Key Pair - Done
5,930,795 UART: [art] Signing Cert with AUTHO
5,931,275 UART: RITY.KEYID = 7
5,946,735 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,500 UART: [art] PUB.X = 55C84EF65330CB1C8D79BD1B25D62375A973C22671F9D6DC647400566B5F7F0768E96714EC8B3726E6B3A6376A2F9909
5,954,238 UART: [art] PUB.Y = 842BE22B86E07B5B231EAB32EA8C04B8F606F0E5195727F3EAB650E7BB1EB84AC47E29CB1A543034A9CB3D0AAA507F68
5,961,195 UART: [art] SIG.R = 998742F593039C9B7C326061AACDC3D69D5BA5EA17A8DCA08F6E6602A985EEF44D52910EE7B5863F58280BD4543594CB
5,967,959 UART: [art] SIG.S = B1D01FFD618A7450EDA1A4A0F32AB3EAEFA00887A73E4415D549976E75BE5D08FBDB83CEC98BCD6F6C6D01FD5E072EAC
5,992,520 UART: Caliptra RT
5,992,774 UART: [state] CFI Enabled
6,272,379 UART: [rt] RT failed reset flow
6,272,810 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,592 UART: [kat] SHA2-256
892,530 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
903,051 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,276 UART: [fht] Storing FHT @ 0x50003400
1,480,033 UART: [idev] ++
1,480,201 UART: [idev] CDI.KEYID = 6
1,480,561 UART: [idev] SUBJECT.KEYID = 7
1,480,985 UART: [idev] UDS.KEYID = 0
1,481,330 ready_for_fw is high
1,481,330 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,103 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,623 UART: [idev] --
1,514,686 UART: [ldev] ++
1,514,854 UART: [ldev] CDI.KEYID = 6
1,515,217 UART: [ldev] SUBJECT.KEYID = 5
1,515,643 UART: [ldev] AUTHORITY.KEYID = 7
1,516,106 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,547,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,107 UART: [ldev] --
1,586,598 UART: [fwproc] Waiting for Commands...
1,587,309 UART: [fwproc] Received command 0x46574c44
1,588,100 UART: [fwproc] Received Image of size 78632 bytes
2,477,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,987 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,615,696 >>> mbox cmd response: success
2,615,696 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,616,846 UART: [afmc] ++
2,617,014 UART: [afmc] CDI.KEYID = 6
2,617,376 UART: [afmc] SUBJECT.KEYID = 7
2,617,801 UART: [afmc] AUTHORITY.KEYID = 5
2,653,160 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,137 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,827 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,694 UART: [afmc] --
2,696,762 UART: [cold-reset] --
2,697,694 UART: [state] Locking Datavault
2,699,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,611 UART: [state] Locking ICCM
2,700,085 UART: [exit] Launching FMC @ 0x40000130
2,705,414 UART:
2,705,430 UART: Running Caliptra FMC ...
2,705,838 UART:
2,705,981 UART: [state] CFI Enabled
2,716,990 UART: [fht] FMC Alias Private Key: 7
2,825,067 UART: [art] Extend RT PCRs Done
2,825,495 UART: [art] Lock RT PCRs Done
2,827,221 UART: [art] Populate DV Done
2,835,374 UART: [fht] FMC Alias Private Key: 7
2,836,356 UART: [art] Derive CDI
2,836,636 UART: [art] Store in in slot 0x4
2,922,441 UART: [art] Derive Key Pair
2,922,801 UART: [art] Store priv key in slot 0x5
2,936,565 UART: [art] Derive Key Pair - Done
2,950,890 UART: [art] Signing Cert with AUTHO
2,951,370 UART: RITY.KEYID = 7
2,966,398 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,163 UART: [art] PUB.X = 10910C1FDE7CB51BE905741DBDC36CB23DFB7952310A102D51EDAA9C7773B70D6B98F19F2A965EEEA44229F0B481A9CF
2,973,937 UART: [art] PUB.Y = 2C0A43661B7116D835513199C11621690482319C1BEF0C0E66A8296C7E9A61AF0A0A940BE28B9F70F0477D1C0D596E00
2,980,835 UART: [art] SIG.R = 59A8C12ED526278BDAE2A6937213F565605EBEBF6E89C13419302DB389268D6DD79F2CADE2C480574B28C1384395ACD8
2,987,609 UART: [art] SIG.S = 57FE677600D42AF96ECB4FAEB2706C1695ADF8E11E3DD858479154EDFAECF3917FC8C8BD2E2DD6755AD1437793DEE490
3,011,210 UART: mbox::rt_entry...
3,011,582 UART: ____ _ _ _ ____ _____
3,012,366 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,166 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,013,934 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,702 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,470 UART: |_|
3,015,782 UART:
3,122,601 UART: [rt] Runtime listening for mailbox commands...
3,123,525 >>> mbox cmd response data (0 bytes)
3,123,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,123,640 UART:
3,123,656 UART: Running Caliptra ROM ...
3,124,064 UART:
3,124,205 UART: [state] CFI Enabled
3,126,807 UART: [state] LifecycleState = Unprovisioned
3,127,462 UART: [state] DebugLocked = No
3,128,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,825 UART: [kat] SHA2-256
3,923,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,871 UART: [kat] ++
3,928,023 UART: [kat] sha1
3,932,323 UART: [kat] SHA2-256
3,934,261 UART: [kat] SHA2-384
3,937,178 UART: [kat] SHA2-512-ACC
3,939,078 UART: [kat] ECC-384
3,944,211 UART: [kat] HMAC-384Kdf
3,948,791 UART: [kat] LMS
4,516,987 UART: [kat] --
4,517,646 UART: [update-reset] ++
5,851,945 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,853,117 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,003,035 >>> mbox cmd response: success
6,003,254 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,268 UART: [update-reset Success] --
6,011,989 UART: [state] Locking Datavault
6,012,855 UART: [state] Locking PCR0, PCR1 and PCR31
6,013,459 UART: [state] Locking ICCM
6,014,001 UART: [exit] Launching FMC @ 0x40000130
6,019,330 UART:
6,019,346 UART: Running Caliptra FMC ...
6,019,754 UART:
6,019,897 UART: [state] CFI Enabled
6,108,676 UART: [art] Extend RT PCRs Done
6,109,104 UART: [art] Lock RT PCRs Done
6,110,433 UART: [art] Populate DV Done
6,118,670 UART: [fht] FMC Alias Private Key: 7
6,119,708 UART: [art] Derive CDI
6,119,988 UART: [art] Store in in slot 0x4
6,205,641 UART: [art] Derive Key Pair
6,206,001 UART: [art] Store priv key in slot 0x5
6,219,847 UART: [art] Derive Key Pair - Done
6,234,833 UART: [art] Signing Cert with AUTHO
6,235,313 UART: RITY.KEYID = 7
6,250,173 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,938 UART: [art] PUB.X = 4A5EB4C4CA02775E97B168D67FEF4FBBDAB60D719B7D4FCDBDF99E7E64A082F737A67CCC66AF7C87981E2D5FF37D9B1E
6,257,730 UART: [art] PUB.Y = A0679BFA535A50D09173755E0391C164C28A6D9F806BAB64D90E13DD272F718EC998604013D4F53591DC5FCE557255B6
6,264,672 UART: [art] SIG.R = C8C8A0FD1F7AA36616B8E50ABE0FF83B33083A640790539964395FB573EF5AC0DC67446463951634D442FA9B2FF391BE
6,271,434 UART: [art] SIG.S = FE12D707BE580F096A7EE2DFFCB232E0B236EDA4033DE2CD646480825A05C1CFDBD5499ACD699B7FFADEA30F1B54767E
6,294,533 UART: Caliptra RT
6,294,879 UART: [state] CFI Enabled
6,577,084 UART: [rt] RT failed reset flow
6,577,515 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,956 ready_for_fw is high
1,362,956 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,465,438 >>> mbox cmd response: success
2,465,438 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,527,162 UART:
2,527,178 UART: Running Caliptra FMC ...
2,527,586 UART:
2,527,729 UART: [state] CFI Enabled
2,538,292 UART: [fht] FMC Alias Private Key: 7
2,646,673 UART: [art] Extend RT PCRs Done
2,647,101 UART: [art] Lock RT PCRs Done
2,648,535 UART: [art] Populate DV Done
2,656,572 UART: [fht] FMC Alias Private Key: 7
2,657,566 UART: [art] Derive CDI
2,657,846 UART: [art] Store in in slot 0x4
2,743,567 UART: [art] Derive Key Pair
2,743,927 UART: [art] Store priv key in slot 0x5
2,757,537 UART: [art] Derive Key Pair - Done
2,772,063 UART: [art] Signing Cert with AUTHO
2,772,543 UART: RITY.KEYID = 7
2,788,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,802 UART: [art] PUB.X = B73D36E9DD1DD07FDFDE4FB206F0BC95BFEEDABBF8526A3836D3B328279012A90AAA33353AD55E6ED97659D5B280D3E6
2,795,588 UART: [art] PUB.Y = 9BCBA529D2ADE40FF890327C3EFC27A46FEF8D60DABC1766BEF1E58E3EBD91B7754212F768763843B143EA7B806D0BFD
2,802,552 UART: [art] SIG.R = 11BB9A2AD0B6FF8C8BCD1FBF3EC6060F98B5DB6236C229F26BC2332781429CE028A2B90D46D7250A59EEC7DEBD6C9C44
2,809,330 UART: [art] SIG.S = B0842270CF75BB3B37D76BCF2E5FF9505B4BCE207C71D67C6FE2CED23E84A9203A88D38AE842EE3F0037048DD0FBA984
2,833,116 UART: mbox::rt_entry...
2,833,488 UART: ____ _ _ _ ____ _____
2,834,272 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,840 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,608 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,376 UART: |_|
2,837,688 UART:
2,943,876 UART: [rt] Runtime listening for mailbox commands...
2,944,800 >>> mbox cmd response data (0 bytes)
2,944,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,707,196 >>> mbox cmd response: success
5,720,565 UART:
5,720,581 UART: Running Caliptra FMC ...
5,720,989 UART:
5,721,132 UART: [state] CFI Enabled
5,810,483 UART: [art] Extend RT PCRs Done
5,810,911 UART: [art] Lock RT PCRs Done
5,812,500 UART: [art] Populate DV Done
5,820,727 UART: [fht] FMC Alias Private Key: 7
5,821,801 UART: [art] Derive CDI
5,822,081 UART: [art] Store in in slot 0x4
5,907,812 UART: [art] Derive Key Pair
5,908,172 UART: [art] Store priv key in slot 0x5
5,921,316 UART: [art] Derive Key Pair - Done
5,935,905 UART: [art] Signing Cert with AUTHO
5,936,385 UART: RITY.KEYID = 7
5,951,827 UART: [art] Erasing AUTHORITY.KEYID = 7
5,952,592 UART: [art] PUB.X = C7528A02319B9B9ADA83E672E710B213B6D55A7F598C29E9925D2AC3431150C3C2E0010A653089864963929E4601F9DC
5,959,342 UART: [art] PUB.Y = 9300C745230D912BE61B8D4A4F12733388D7C9F5580A213D6C4E63DAD00F6420AEA0263C5F9840094DA5AA847EB02523
5,966,256 UART: [art] SIG.R = 83AA9EEBFDC362DE7837736E188488FFAEE4C45FFC2C43E7DF386C55D0175426C973E3C5F804D90471A2DCDB0A2D2065
5,973,031 UART: [art] SIG.S = BA5610A573084E528CF1EB40242677593394192FE90B7E05D553DEB2DC4D1C69491F026E319FDD4E1B2642F2AB7A2C2A
5,997,022 UART: Caliptra RT
5,997,368 UART: [state] CFI Enabled
6,278,431 UART: [rt] RT failed reset flow
6,278,862 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,178 UART: [kat] SHA2-256
893,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,953 UART: [kat] ++
898,105 UART: [kat] sha1
902,305 UART: [kat] SHA2-256
904,245 UART: [kat] SHA2-384
907,006 UART: [kat] SHA2-512-ACC
908,907 UART: [kat] ECC-384
918,300 UART: [kat] HMAC-384Kdf
922,882 UART: [kat] LMS
1,171,210 UART: [kat] --
1,171,717 UART: [cold-reset] ++
1,172,059 UART: [fht] FHT @ 0x50003400
1,174,750 UART: [idev] ++
1,174,918 UART: [idev] CDI.KEYID = 6
1,175,278 UART: [idev] SUBJECT.KEYID = 7
1,175,702 UART: [idev] UDS.KEYID = 0
1,176,047 ready_for_fw is high
1,176,047 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,183,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,195 UART: [idev] --
1,210,275 UART: [ldev] ++
1,210,443 UART: [ldev] CDI.KEYID = 6
1,210,806 UART: [ldev] SUBJECT.KEYID = 5
1,211,232 UART: [ldev] AUTHORITY.KEYID = 7
1,211,695 UART: [ldev] FE.KEYID = 1
1,216,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,273 UART: [ldev] --
1,282,782 UART: [fwproc] Wait for Commands...
1,283,460 UART: [fwproc] Recv command 0x46574c44
1,284,188 UART: [fwproc] Recv'd Img size: 78632 bytes
2,173,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,833 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,312,066 >>> mbox cmd response: success
2,312,066 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,313,076 UART: [afmc] ++
2,313,244 UART: [afmc] CDI.KEYID = 6
2,313,606 UART: [afmc] SUBJECT.KEYID = 7
2,314,031 UART: [afmc] AUTHORITY.KEYID = 5
2,349,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,790 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,429 UART: [afmc] --
2,392,345 UART: [cold-reset] --
2,393,477 UART: [state] Locking Datavault
2,394,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,066 UART: [state] Locking ICCM
2,395,630 UART: [exit] Launching FMC @ 0x40000130
2,400,959 UART:
2,400,975 UART: Running Caliptra FMC ...
2,401,383 UART:
2,401,437 UART: [state] CFI Enabled
2,411,896 UART: [fht] FMC Alias Private Key: 7
2,520,137 UART: [art] Extend RT PCRs Done
2,520,565 UART: [art] Lock RT PCRs Done
2,522,145 UART: [art] Populate DV Done
2,530,610 UART: [fht] FMC Alias Private Key: 7
2,531,730 UART: [art] Derive CDI
2,532,010 UART: [art] Store in in slot 0x4
2,617,961 UART: [art] Derive Key Pair
2,618,321 UART: [art] Store priv key in slot 0x5
2,631,653 UART: [art] Derive Key Pair - Done
2,646,292 UART: [art] Signing Cert with AUTHO
2,646,772 UART: RITY.KEYID = 7
2,661,736 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,501 UART: [art] PUB.X = F5C964D7F2DB4A467BF173AFD6303D8ED923B00889B75C982D634A52DCBA20A15CFA908DEFE75572B152F6D7D7C42D6A
2,669,284 UART: [art] PUB.Y = 1B4C8DE3493836FC26B3F9F47798649DAA68388AA3A69FBB10FAE85F92B32F21FE2E77C53E1ED2903A9D874555762D30
2,676,240 UART: [art] SIG.R = 743D973B9E85F9166A6AF8BE5B60DA5310A124780A6947B9A950FC73FD53254524ACBB4B0DE09C5576810E92BE1F4E38
2,683,005 UART: [art] SIG.S = C15D8E58446CB85620A276B5CFF68BCB5A52A8C048251CF53831CCF63381EC2B4CD7669F29D85515CFF5AA4D133ACC6B
2,706,966 UART: mbox::rt_entry...
2,707,338 UART: ____ _ _ _ ____ _____
2,708,122 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,922 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,458 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,226 UART: |_|
2,711,538 UART:
2,817,840 UART: [rt] Runtime listening for mailbox commands...
2,818,764 >>> mbox cmd response data (0 bytes)
2,818,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,818,876 UART:
2,818,892 UART: Running Caliptra ROM ...
2,819,300 UART:
2,819,355 UART: [state] CFI Enabled
2,821,945 UART: [state] LifecycleState = Unprovisioned
2,822,600 UART: [state] DebugLocked = No
2,823,092 UART: [state] WD Timer not started. Device not locked for debugging
2,824,388 UART: [kat] SHA2-256
3,630,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,163 UART: [kat] ++
3,634,315 UART: [kat] sha1
3,638,353 UART: [kat] SHA2-256
3,640,293 UART: [kat] SHA2-384
3,642,894 UART: [kat] SHA2-512-ACC
3,644,794 UART: [kat] ECC-384
3,654,257 UART: [kat] HMAC-384Kdf
3,658,825 UART: [kat] LMS
3,907,153 UART: [kat] --
3,908,199 UART: [update-reset] ++
5,220,958 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,155 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,372,021 >>> mbox cmd response: success
5,372,200 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,214 UART: [update-reset Success] --
5,381,309 UART: [state] Locking Datavault
5,382,177 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,781 UART: [state] Locking ICCM
5,383,443 UART: [exit] Launching FMC @ 0x40000130
5,388,772 UART:
5,388,788 UART: Running Caliptra FMC ...
5,389,196 UART:
5,389,250 UART: [state] CFI Enabled
5,478,297 UART: [art] Extend RT PCRs Done
5,478,725 UART: [art] Lock RT PCRs Done
5,479,780 UART: [art] Populate DV Done
5,488,215 UART: [fht] FMC Alias Private Key: 7
5,489,273 UART: [art] Derive CDI
5,489,553 UART: [art] Store in in slot 0x4
5,575,290 UART: [art] Derive Key Pair
5,575,650 UART: [art] Store priv key in slot 0x5
5,588,812 UART: [art] Derive Key Pair - Done
5,603,622 UART: [art] Signing Cert with AUTHO
5,604,102 UART: RITY.KEYID = 7
5,619,308 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,073 UART: [art] PUB.X = 07EBA55497D4E21A15FE15CB0C67789C9CAB80B45FAD8BDB7D72CCD93610EC1CB18C06543046479E8B099565C3B608F4
5,626,838 UART: [art] PUB.Y = BEECD8BB5D826BCA0EDE279C6CD349EA7A743B9EBBFBEA6F02F5F4D2C681DC5B3C0E0C54DFFEF3843C6B0445429A9ED7
5,633,809 UART: [art] SIG.R = 5C4F5E4FA89397A7047C6F40267E440C1D732C8950C2AF57EC3BE77053C2BC1CBB89B4E7E55BB591AC19E25C6690E746
5,640,581 UART: [art] SIG.S = CBA2C9F62D3B6D08AE567313E053DDA42FC06A9BB78F074296A6A27F2BA58FF4D738AE802D94447EE8F89ECB0BCA7089
5,664,335 UART: Caliptra RT
5,664,589 UART: [state] CFI Enabled
5,945,623 UART: [rt] RT failed reset flow
5,946,054 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,485 ready_for_fw is high
1,060,485 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,162,469 >>> mbox cmd response: success
2,162,469 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,223,903 UART:
2,223,919 UART: Running Caliptra FMC ...
2,224,327 UART:
2,224,381 UART: [state] CFI Enabled
2,235,206 UART: [fht] FMC Alias Private Key: 7
2,343,717 UART: [art] Extend RT PCRs Done
2,344,145 UART: [art] Lock RT PCRs Done
2,345,511 UART: [art] Populate DV Done
2,353,620 UART: [fht] FMC Alias Private Key: 7
2,354,762 UART: [art] Derive CDI
2,355,042 UART: [art] Store in in slot 0x4
2,440,827 UART: [art] Derive Key Pair
2,441,187 UART: [art] Store priv key in slot 0x5
2,454,199 UART: [art] Derive Key Pair - Done
2,468,460 UART: [art] Signing Cert with AUTHO
2,468,940 UART: RITY.KEYID = 7
2,483,858 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,623 UART: [art] PUB.X = 8445EC478CE34ED1A2B60D8A9928035DF3A6943C8D0FE8C55A92C3F60AA2847C048D4482F99E09ACB220334923FA6517
2,491,377 UART: [art] PUB.Y = 2CBA32634A59AF756CDFEA5F2A9E47335CF0784E52ED52BD0D7D77511859315042FE66F52753838F56D96936E23780C3
2,498,322 UART: [art] SIG.R = 7AA6A31F44700A47684C7927C690A81AC7E4DBAB0DDEF1CF514829F206B3C180E0EC6CF08933ACF7D13F51EBE17F2C63
2,505,099 UART: [art] SIG.S = 10A4DB36F726E368214AA8588805B1EBDEFCBD0C77BB383C26B363255359D193E362B06A76306DD1684977CB0D7532B5
2,529,065 UART: mbox::rt_entry...
2,529,437 UART: ____ _ _ _ ____ _____
2,530,221 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,021 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,557 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,325 UART: |_|
2,533,637 UART:
2,640,645 UART: [rt] Runtime listening for mailbox commands...
2,641,569 >>> mbox cmd response data (0 bytes)
2,641,570 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,079,157 >>> mbox cmd response: success
5,092,595 UART:
5,092,611 UART: Running Caliptra FMC ...
5,093,019 UART:
5,093,073 UART: [state] CFI Enabled
5,182,014 UART: [art] Extend RT PCRs Done
5,182,442 UART: [art] Lock RT PCRs Done
5,183,829 UART: [art] Populate DV Done
5,191,890 UART: [fht] FMC Alias Private Key: 7
5,193,034 UART: [art] Derive CDI
5,193,314 UART: [art] Store in in slot 0x4
5,279,095 UART: [art] Derive Key Pair
5,279,455 UART: [art] Store priv key in slot 0x5
5,292,461 UART: [art] Derive Key Pair - Done
5,307,212 UART: [art] Signing Cert with AUTHO
5,307,692 UART: RITY.KEYID = 7
5,322,580 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,345 UART: [art] PUB.X = 4A586BD5B7640A5F6806AF7AD87CA5FE3612B12F0A0EC3CFF1A92EAA51F3CDE7FFE400B4FA7158B2BF52584C8A1B003D
5,330,083 UART: [art] PUB.Y = 7F50E821EA0925B2A71BDF49E84D7E94B474114640811DB7E689F5BB5E3EF272A93CD91BE622C55D31A533C50E16CA7B
5,337,035 UART: [art] SIG.R = BAF8F5950008488D075E8BE8E4B881F976DF4256E5934BC552BEE39ED4102BB95CAC9C22E7FB4724E09AF9A7A8B6F819
5,343,789 UART: [art] SIG.S = 8CDEBADDC72D9B0362E1D0E6AA7C63369B09803FFC2572B37F024D6621A94D2F1B026707F625739A3753622CDBE8AADB
5,366,965 UART: Caliptra RT
5,367,219 UART: [state] CFI Enabled
5,647,012 UART: [rt] RT failed reset flow
5,647,443 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,448 UART: [kat] SHA2-256
904,388 UART: [kat] SHA2-384
907,299 UART: [kat] SHA2-512-ACC
909,200 UART: [kat] ECC-384
918,739 UART: [kat] HMAC-384Kdf
923,331 UART: [kat] LMS
1,171,659 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,571 UART: [idev] ++
1,175,739 UART: [idev] CDI.KEYID = 6
1,176,099 UART: [idev] SUBJECT.KEYID = 7
1,176,523 UART: [idev] UDS.KEYID = 0
1,176,868 ready_for_fw is high
1,176,868 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,200,910 UART: [idev] Sha1 KeyId Algorithm
1,209,332 UART: [idev] --
1,210,308 UART: [ldev] ++
1,210,476 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,265 UART: [ldev] AUTHORITY.KEYID = 7
1,211,728 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,243,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,228 UART: [ldev] --
1,282,587 UART: [fwproc] Wait for Commands...
1,283,169 UART: [fwproc] Recv command 0x46574c44
1,283,897 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,596 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,839 >>> mbox cmd response: success
2,310,839 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,311,883 UART: [afmc] ++
2,312,051 UART: [afmc] CDI.KEYID = 6
2,312,413 UART: [afmc] SUBJECT.KEYID = 7
2,312,838 UART: [afmc] AUTHORITY.KEYID = 5
2,347,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,762 UART: [afmc] --
2,390,672 UART: [cold-reset] --
2,391,558 UART: [state] Locking Datavault
2,392,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,131 UART: [state] Locking ICCM
2,393,665 UART: [exit] Launching FMC @ 0x40000130
2,398,994 UART:
2,399,010 UART: Running Caliptra FMC ...
2,399,418 UART:
2,399,561 UART: [state] CFI Enabled
2,410,706 UART: [fht] FMC Alias Private Key: 7
2,518,657 UART: [art] Extend RT PCRs Done
2,519,085 UART: [art] Lock RT PCRs Done
2,520,711 UART: [art] Populate DV Done
2,528,936 UART: [fht] FMC Alias Private Key: 7
2,530,066 UART: [art] Derive CDI
2,530,346 UART: [art] Store in in slot 0x4
2,615,897 UART: [art] Derive Key Pair
2,616,257 UART: [art] Store priv key in slot 0x5
2,629,541 UART: [art] Derive Key Pair - Done
2,644,438 UART: [art] Signing Cert with AUTHO
2,644,918 UART: RITY.KEYID = 7
2,659,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,731 UART: [art] PUB.X = 93F591EBF6EA1F145063C1692951EFA692B3808D24C267C9D418BA4070EDA40037C4431B35B298C474FE0A681734938F
2,667,472 UART: [art] PUB.Y = 9A7074E57D060A664BE815D3F3C658C20B935C586DEDB1248EB00F045CD61D4C3BA9541541B829C470C79B9DC1B1010D
2,674,405 UART: [art] SIG.R = BAF2089BA630D95DA46AD46F029A02F704D8B64873C28D9E99D615A4F28D809CB80D97A10F1843D3FA2789BEA3ADA537
2,681,167 UART: [art] SIG.S = D8D2072432942DCECCAA79C1141F2FC88175B1CF4769DF6648E8DD37CC22D1B35F7A8F564A9CDA5FFFAD329D331772B9
2,705,059 UART: mbox::rt_entry...
2,705,431 UART: ____ _ _ _ ____ _____
2,706,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,015 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,319 UART: |_|
2,709,631 UART:
2,816,208 UART: [rt] Runtime listening for mailbox commands...
2,817,132 >>> mbox cmd response data (0 bytes)
2,817,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,817,244 UART:
2,817,260 UART: Running Caliptra ROM ...
2,817,668 UART:
2,817,810 UART: [state] CFI Enabled
2,820,562 UART: [state] LifecycleState = Unprovisioned
2,821,217 UART: [state] DebugLocked = No
2,821,921 UART: [state] WD Timer not started. Device not locked for debugging
2,823,151 UART: [kat] SHA2-256
3,628,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,632,926 UART: [kat] ++
3,633,078 UART: [kat] sha1
3,637,344 UART: [kat] SHA2-256
3,639,284 UART: [kat] SHA2-384
3,642,035 UART: [kat] SHA2-512-ACC
3,643,935 UART: [kat] ECC-384
3,653,612 UART: [kat] HMAC-384Kdf
3,658,062 UART: [kat] LMS
3,906,390 UART: [kat] --
3,907,442 UART: [update-reset] ++
5,220,209 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,221,408 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,371,274 >>> mbox cmd response: success
5,371,557 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,571 UART: [update-reset Success] --
5,380,718 UART: [state] Locking Datavault
5,381,454 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,058 UART: [state] Locking ICCM
5,382,524 UART: [exit] Launching FMC @ 0x40000130
5,387,853 UART:
5,387,869 UART: Running Caliptra FMC ...
5,388,277 UART:
5,388,420 UART: [state] CFI Enabled
5,477,631 UART: [art] Extend RT PCRs Done
5,478,059 UART: [art] Lock RT PCRs Done
5,479,326 UART: [art] Populate DV Done
5,487,617 UART: [fht] FMC Alias Private Key: 7
5,488,687 UART: [art] Derive CDI
5,488,967 UART: [art] Store in in slot 0x4
5,574,686 UART: [art] Derive Key Pair
5,575,046 UART: [art] Store priv key in slot 0x5
5,588,188 UART: [art] Derive Key Pair - Done
5,603,071 UART: [art] Signing Cert with AUTHO
5,603,551 UART: RITY.KEYID = 7
5,618,517 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,282 UART: [art] PUB.X = 0AAE3F8FB52199515DD03DBEC36BD35739188D42DC0E57D80EDB06B47E95C27E8838CEBB9BFDE278A2D051B1EF378C12
5,626,058 UART: [art] PUB.Y = CF709AE8A34018760585A8372F5DCBC6A8BA3D454FA3BB17E79C0ACDE38FA3C583ED92FB4FBDC9F0790BFA06C1CCF592
5,633,022 UART: [art] SIG.R = DAC70FC5515F393F8CE705CF7F4A13FC8024BCCFA09E19DA9FB81626520002E3EFC139D5C3B5D6BA8F1FCDEA1F0ECB2B
5,639,788 UART: [art] SIG.S = 209D5891A1E81734309DC41BB9ED87446AB34BD1247BC15C6F3C6ED8BFBDFC46BE3862D68984E0B8BD9B51BB047A6F6C
5,663,174 UART: Caliptra RT
5,663,520 UART: [state] CFI Enabled
5,942,442 UART: [rt] RT failed reset flow
5,942,873 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,636 >>> mbox cmd response: success
2,163,636 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,226,166 UART:
2,226,182 UART: Running Caliptra FMC ...
2,226,590 UART:
2,226,733 UART: [state] CFI Enabled
2,237,532 UART: [fht] FMC Alias Private Key: 7
2,345,977 UART: [art] Extend RT PCRs Done
2,346,405 UART: [art] Lock RT PCRs Done
2,347,729 UART: [art] Populate DV Done
2,356,040 UART: [fht] FMC Alias Private Key: 7
2,357,052 UART: [art] Derive CDI
2,357,332 UART: [art] Store in in slot 0x4
2,443,279 UART: [art] Derive Key Pair
2,443,639 UART: [art] Store priv key in slot 0x5
2,456,891 UART: [art] Derive Key Pair - Done
2,471,956 UART: [art] Signing Cert with AUTHO
2,472,436 UART: RITY.KEYID = 7
2,487,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,357 UART: [art] PUB.X = 4AB43E16E7571E7A57685DE7A3545410E84C55BD8C83B81E43EBE80174655F63AB1BF94C52DD1A64AF450374FBE7EA88
2,495,129 UART: [art] PUB.Y = 9C510667E53E7177A99E63799C0382F9A22E58D215DD641CE7EDF06F278CABFFD80CE8CD8D732FC307FE6AE8CC8ABCFD
2,502,089 UART: [art] SIG.R = CAEF856AFC3E18BCE8A38F88D4797A17C074A2E400042EE0BED42E8C58180E4E670BC6DCE37FB5BA05E2FA61C6396E2A
2,508,847 UART: [art] SIG.S = 943CEFB99E48CC0A8CA1826198E254DFED0F3897780F2159F296E64F40BB39C3394BB697B8C01D7E74FCA0C000421170
2,532,187 UART: mbox::rt_entry...
2,532,559 UART: ____ _ _ _ ____ _____
2,533,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,447 UART: |_|
2,536,759 UART:
2,643,186 UART: [rt] Runtime listening for mailbox commands...
2,644,110 >>> mbox cmd response data (0 bytes)
2,644,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,080,913 >>> mbox cmd response: success
5,093,971 UART:
5,093,987 UART: Running Caliptra FMC ...
5,094,395 UART:
5,094,538 UART: [state] CFI Enabled
5,183,157 UART: [art] Extend RT PCRs Done
5,183,585 UART: [art] Lock RT PCRs Done
5,184,834 UART: [art] Populate DV Done
5,193,293 UART: [fht] FMC Alias Private Key: 7
5,194,317 UART: [art] Derive CDI
5,194,597 UART: [art] Store in in slot 0x4
5,280,174 UART: [art] Derive Key Pair
5,280,534 UART: [art] Store priv key in slot 0x5
5,293,470 UART: [art] Derive Key Pair - Done
5,308,395 UART: [art] Signing Cert with AUTHO
5,308,875 UART: RITY.KEYID = 7
5,324,187 UART: [art] Erasing AUTHORITY.KEYID = 7
5,324,952 UART: [art] PUB.X = 98D6B48E672F9A07D98A9531E8FD69697B75AA09B05EAD6E05F72A1F115C6F83AACAA52C265AF256BC942BFA028F51DE
5,331,726 UART: [art] PUB.Y = 9BA9EDEA89AB165DF2F8ADA2A6C08D1E33D56B1950D29CAFC2A044DAB3436A7B9915D8DB17638DCC01D5041CCE74CD6E
5,338,696 UART: [art] SIG.R = DFB93DECAC14814D12CB2A2B918F18769BED5F63EF41844CE29B3C1E25D5C897AB05167C65045F74F9C63D0CCF5A653C
5,345,473 UART: [art] SIG.S = 451121E6213B9584FCAB8E5748BF0165D2B06758260F61E72037FE75232637842C934B80416DCAE2DFACA9062BB2995F
5,369,201 UART: Caliptra RT
5,369,547 UART: [state] CFI Enabled
5,645,059 UART: [rt] RT failed reset flow
5,645,490 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,586 UART: [state] LifecycleState = Unprovisioned
86,241 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
891,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,174,797 ready_for_fw is high
1,174,797 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,994 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,185 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,528 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,916 >>> mbox cmd response: success
2,310,916 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,312,067 UART: [afmc] ++
2,312,235 UART: [afmc] CDI.KEYID = 6
2,312,598 UART: [afmc] SUBJECT.KEYID = 7
2,313,024 UART: [afmc] AUTHORITY.KEYID = 5
2,348,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,448 UART: [afmc] --
2,391,422 UART: [cold-reset] --
2,392,346 UART: [state] Locking Datavault
2,393,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,381 UART: [state] Locking ICCM
2,394,855 UART: [exit] Launching FMC @ 0x40000130
2,400,184 UART:
2,400,200 UART: Running Caliptra FMC ...
2,400,608 UART:
2,400,662 UART: [state] CFI Enabled
2,411,449 UART: [fht] FMC Alias Private Key: 7
2,519,392 UART: [art] Extend RT PCRs Done
2,519,820 UART: [art] Lock RT PCRs Done
2,521,618 UART: [art] Populate DV Done
2,529,735 UART: [fht] FMC Alias Private Key: 7
2,530,869 UART: [art] Derive CDI
2,531,149 UART: [art] Store in in slot 0x4
2,616,688 UART: [art] Derive Key Pair
2,617,048 UART: [art] Store priv key in slot 0x5
2,629,928 UART: [art] Derive Key Pair - Done
2,644,831 UART: [art] Signing Cert with AUTHO
2,645,311 UART: RITY.KEYID = 7
2,660,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,390 UART: [art] PUB.X = 92F0750CB83948A0C6B312663F84D759541271C3CD56914E5EFFC13CB22738D05D444DAF80028F4ACA75EF01AC45E198
2,668,153 UART: [art] PUB.Y = 9FDE42503D045641EF5DE0728B35DA7E6B526055F28FFA6381B81EDC736440046F5A76DD1DFB744328901870B90CBF17
2,675,096 UART: [art] SIG.R = 9D2A7C26491F9A83E70F927C212B4FDD0FDCCE032E95CADAB1D6D2D4941B47112D390B933611DBC35A1F82ACAD2D4418
2,681,870 UART: [art] SIG.S = 215F65B4816C53967EEFCA56D37F8CB12E696CA53A2F99A5271A2D515ED4846DECF5B6651346BD0E7034EAF8C37545E9
2,705,384 UART: mbox::rt_entry...
2,705,756 UART: ____ _ _ _ ____ _____
2,706,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,108 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,876 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,644 UART: |_|
2,709,956 UART:
2,816,240 UART: [rt] Runtime listening for mailbox commands...
2,817,164 >>> mbox cmd response data (0 bytes)
2,817,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,817,276 UART:
2,817,292 UART: Running Caliptra ROM ...
2,817,700 UART:
2,817,755 UART: [state] CFI Enabled
2,820,409 UART: [state] LifecycleState = Unprovisioned
2,821,064 UART: [state] DebugLocked = No
2,821,576 UART: [state] WD Timer not started. Device not locked for debugging
2,822,930 UART: [kat] SHA2-256
3,626,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,609 UART: [kat] ++
3,630,761 UART: [kat] sha1
3,634,937 UART: [kat] SHA2-256
3,636,877 UART: [kat] SHA2-384
3,639,536 UART: [kat] SHA2-512-ACC
3,641,436 UART: [kat] ECC-384
3,651,115 UART: [kat] HMAC-384Kdf
3,655,577 UART: [kat] LMS
3,903,889 UART: [kat] --
3,904,745 UART: [update-reset] ++
5,215,787 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,216,794 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,366,660 >>> mbox cmd response: success
5,366,885 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,899 UART: [update-reset Success] --
5,375,644 UART: [state] Locking Datavault
5,376,526 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,130 UART: [state] Locking ICCM
5,377,556 UART: [exit] Launching FMC @ 0x40000130
5,382,885 UART:
5,382,901 UART: Running Caliptra FMC ...
5,383,309 UART:
5,383,363 UART: [state] CFI Enabled
5,471,752 UART: [art] Extend RT PCRs Done
5,472,180 UART: [art] Lock RT PCRs Done
5,473,549 UART: [art] Populate DV Done
5,481,898 UART: [fht] FMC Alias Private Key: 7
5,482,946 UART: [art] Derive CDI
5,483,226 UART: [art] Store in in slot 0x4
5,569,025 UART: [art] Derive Key Pair
5,569,385 UART: [art] Store priv key in slot 0x5
5,582,979 UART: [art] Derive Key Pair - Done
5,597,676 UART: [art] Signing Cert with AUTHO
5,598,156 UART: RITY.KEYID = 7
5,613,326 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,091 UART: [art] PUB.X = AB4E30C6A57EAEF3AA8ACE9A2A052623ABC7ECB3CA6B49BABB957A572255CC14F1F33E50E3C13CA8A921EB4209B03B31
5,620,881 UART: [art] PUB.Y = 991865200BA20D973A239C93CE6B329A38A23121A7536E9A3C3960B352CB9D9D7F8277B30D7BDEF4B7389722DF1ED846
5,627,822 UART: [art] SIG.R = F5E430EBC792438DFF4A27A19D3AD0A4BDD18A909CA83C9C8986525CCF41D88B7D86F21304AE1504C363BB873F321BAE
5,634,600 UART: [art] SIG.S = 155A82B885A3BD75B05730D263F7A8F1A01063D80EB6C309583908A377ADE62F74A2B08F105047C53BC729EBAA120615
5,658,207 UART: Caliptra RT
5,658,461 UART: [state] CFI Enabled
5,937,669 UART: [rt] RT failed reset flow
5,938,100 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,688 ready_for_fw is high
1,056,688 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,159,244 >>> mbox cmd response: success
2,159,244 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,220,934 UART:
2,220,950 UART: Running Caliptra FMC ...
2,221,358 UART:
2,221,412 UART: [state] CFI Enabled
2,232,215 UART: [fht] FMC Alias Private Key: 7
2,340,148 UART: [art] Extend RT PCRs Done
2,340,576 UART: [art] Lock RT PCRs Done
2,341,956 UART: [art] Populate DV Done
2,349,955 UART: [fht] FMC Alias Private Key: 7
2,350,981 UART: [art] Derive CDI
2,351,261 UART: [art] Store in in slot 0x4
2,436,978 UART: [art] Derive Key Pair
2,437,338 UART: [art] Store priv key in slot 0x5
2,450,710 UART: [art] Derive Key Pair - Done
2,465,773 UART: [art] Signing Cert with AUTHO
2,466,253 UART: RITY.KEYID = 7
2,481,733 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,498 UART: [art] PUB.X = 194E4830FED9F21AD50FE928A2AE72D80A27246E5A0AAB655F97B2F40600C112CE135C24F7B2C749704092BE2192C6A2
2,489,238 UART: [art] PUB.Y = 50E4FF776449EB0B34325D8EFA44298F3896A862DD4D0BD433358026C399530A20CC5F7FD442F2C1A6348C595D10B5FE
2,496,181 UART: [art] SIG.R = 82037F524E19D2513DA9897F184E896D780CA4914EB3A5A425242027139696AF98E2978979AE9B403B19BF35E3819B87
2,502,933 UART: [art] SIG.S = D80A66BDEB3C2E9C5F7F3C76C50483F9E8F1546118E1CA8B0ECCDA9AF2E3405EC28183EED53739CEE799514DDE1DB121
2,526,511 UART: mbox::rt_entry...
2,526,883 UART: ____ _ _ _ ____ _____
2,527,667 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,467 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,771 UART: |_|
2,531,083 UART:
2,638,136 UART: [rt] Runtime listening for mailbox commands...
2,639,060 >>> mbox cmd response data (0 bytes)
2,639,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,071,173 >>> mbox cmd response: success
5,084,355 UART:
5,084,371 UART: Running Caliptra FMC ...
5,084,779 UART:
5,084,833 UART: [state] CFI Enabled
5,174,170 UART: [art] Extend RT PCRs Done
5,174,598 UART: [art] Lock RT PCRs Done
5,175,715 UART: [art] Populate DV Done
5,183,732 UART: [fht] FMC Alias Private Key: 7
5,184,826 UART: [art] Derive CDI
5,185,106 UART: [art] Store in in slot 0x4
5,270,905 UART: [art] Derive Key Pair
5,271,265 UART: [art] Store priv key in slot 0x5
5,284,541 UART: [art] Derive Key Pair - Done
5,299,218 UART: [art] Signing Cert with AUTHO
5,299,698 UART: RITY.KEYID = 7
5,314,994 UART: [art] Erasing AUTHORITY.KEYID = 7
5,315,759 UART: [art] PUB.X = 3C8E5EF71395F8537095DF450A4C42A51FC5DA34C84434DC7CC934A2D6D118DF861E019D04DB870F0B731A93DC356B8F
5,322,522 UART: [art] PUB.Y = 7C31DC3DE3932032292187BBC97DE43C2377DC044F84119583EFF1F7AC6E03324F3725F8DFD884A5F473EC8A0714EBAE
5,329,471 UART: [art] SIG.R = 3FF12D063C360F83DF7290A31FB13C9B23AFCA1268E11B27F537531261A8231F3CBA93DBA8A0742C3A7E4DAE2BAC7918
5,336,247 UART: [art] SIG.S = 0E853022E00E54148F63AD81823651405DF6B7BC4D993BC63AD2628362B10D4114E25A8C6CC363BB900AF2E5FBCECEAD
5,359,906 UART: Caliptra RT
5,360,160 UART: [state] CFI Enabled
5,641,464 UART: [rt] RT failed reset flow
5,641,895 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,689 UART: [kat] LMS
1,169,001 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,174,406 ready_for_fw is high
1,174,406 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,200,104 UART: [idev] Sha1 KeyId Algorithm
1,208,988 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,669 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,893 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,809 UART: [fwproc] Wait for Commands...
1,283,524 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 78632 bytes
2,173,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,667 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,311,893 >>> mbox cmd response: success
2,311,893 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,313,080 UART: [afmc] ++
2,313,248 UART: [afmc] CDI.KEYID = 6
2,313,611 UART: [afmc] SUBJECT.KEYID = 7
2,314,037 UART: [afmc] AUTHORITY.KEYID = 5
2,349,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,767 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,379 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,847 UART: [afmc] --
2,392,799 UART: [cold-reset] --
2,393,637 UART: [state] Locking Datavault
2,395,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,606 UART: [state] Locking ICCM
2,396,268 UART: [exit] Launching FMC @ 0x40000130
2,401,597 UART:
2,401,613 UART: Running Caliptra FMC ...
2,402,021 UART:
2,402,164 UART: [state] CFI Enabled
2,413,171 UART: [fht] FMC Alias Private Key: 7
2,520,376 UART: [art] Extend RT PCRs Done
2,520,804 UART: [art] Lock RT PCRs Done
2,522,288 UART: [art] Populate DV Done
2,530,635 UART: [fht] FMC Alias Private Key: 7
2,531,589 UART: [art] Derive CDI
2,531,869 UART: [art] Store in in slot 0x4
2,617,588 UART: [art] Derive Key Pair
2,617,948 UART: [art] Store priv key in slot 0x5
2,630,906 UART: [art] Derive Key Pair - Done
2,645,567 UART: [art] Signing Cert with AUTHO
2,646,047 UART: RITY.KEYID = 7
2,660,605 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,370 UART: [art] PUB.X = 856D795876E8C167592DECAAB568A19F434A9102C2776F37C9D6654BEA15A8DE8300442565A2C45BC75E1F448C721EDE
2,668,117 UART: [art] PUB.Y = E88DCEC04593373EA209D0575037C12940334EF0629FBC0B682A879E79F8FE92CA50DCA150E98A661C09206D914780F2
2,675,056 UART: [art] SIG.R = A633A397693EA43DD188828FA5B157F9472CACA31A7DBF7F7D251B24F196E46157255AC513E5BAE2D86C47095F175BA9
2,681,829 UART: [art] SIG.S = A536D21310473AD42FFC29892D6D770FB3D96ED0990B26102B433334AAE41945C6B5D506CE1A4D3E8CD0F340165A5DBD
2,705,245 UART: mbox::rt_entry...
2,705,617 UART: ____ _ _ _ ____ _____
2,706,401 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,201 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,969 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,505 UART: |_|
2,709,817 UART:
2,817,462 UART: [rt] Runtime listening for mailbox commands...
2,818,386 >>> mbox cmd response data (0 bytes)
2,818,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,818,498 UART:
2,818,514 UART: Running Caliptra ROM ...
2,818,922 UART:
2,819,064 UART: [state] CFI Enabled
2,821,520 UART: [state] LifecycleState = Unprovisioned
2,822,175 UART: [state] DebugLocked = No
2,822,787 UART: [state] WD Timer not started. Device not locked for debugging
2,824,049 UART: [kat] SHA2-256
3,627,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,631,728 UART: [kat] ++
3,631,880 UART: [kat] sha1
3,636,138 UART: [kat] SHA2-256
3,638,078 UART: [kat] SHA2-384
3,640,973 UART: [kat] SHA2-512-ACC
3,642,873 UART: [kat] ECC-384
3,652,802 UART: [kat] HMAC-384Kdf
3,657,472 UART: [kat] LMS
3,905,784 UART: [kat] --
3,906,484 UART: [update-reset] ++
5,217,796 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,003 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,368,869 >>> mbox cmd response: success
5,369,098 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,112 UART: [update-reset Success] --
5,377,963 UART: [state] Locking Datavault
5,378,951 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,555 UART: [state] Locking ICCM
5,380,095 UART: [exit] Launching FMC @ 0x40000130
5,385,424 UART:
5,385,440 UART: Running Caliptra FMC ...
5,385,848 UART:
5,385,991 UART: [state] CFI Enabled
5,475,516 UART: [art] Extend RT PCRs Done
5,475,944 UART: [art] Lock RT PCRs Done
5,476,899 UART: [art] Populate DV Done
5,485,114 UART: [fht] FMC Alias Private Key: 7
5,486,190 UART: [art] Derive CDI
5,486,470 UART: [art] Store in in slot 0x4
5,572,383 UART: [art] Derive Key Pair
5,572,743 UART: [art] Store priv key in slot 0x5
5,586,217 UART: [art] Derive Key Pair - Done
5,601,024 UART: [art] Signing Cert with AUTHO
5,601,504 UART: RITY.KEYID = 7
5,616,328 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,093 UART: [art] PUB.X = BBE02ACC68C1F5DFA27383FFB13589C45A72B3EB15F73B02A25240D21454593346DC732B698607F8852F6BF78FBD840B
5,623,860 UART: [art] PUB.Y = 90EFCCBC38AE16A6D7EBE6FDA034F736F8421E497CEC75AB09A896E2D38B6B5F066684E2E2312D149C0D3E00C7C82DBC
5,630,799 UART: [art] SIG.R = 92A6F254D60AE0072FEE744D69FD84A0A601D1A3853A40C63917F8B3FC8B9EE471AD87C16E5ACE4866F76903A64B0D32
5,637,562 UART: [art] SIG.S = 79604955C3C206B2357F9584D50A3775C22D1EEE2219ADE475ED784CE9A08D0467EB353B8786ED7D7F7060FE185927F9
5,661,172 UART: Caliptra RT
5,661,518 UART: [state] CFI Enabled
5,943,652 UART: [rt] RT failed reset flow
5,944,083 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,481 ready_for_fw is high
1,056,481 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,160,799 >>> mbox cmd response: success
2,160,799 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,222,937 UART:
2,222,953 UART: Running Caliptra FMC ...
2,223,361 UART:
2,223,504 UART: [state] CFI Enabled
2,234,289 UART: [fht] FMC Alias Private Key: 7
2,342,088 UART: [art] Extend RT PCRs Done
2,342,516 UART: [art] Lock RT PCRs Done
2,343,808 UART: [art] Populate DV Done
2,352,055 UART: [fht] FMC Alias Private Key: 7
2,353,135 UART: [art] Derive CDI
2,353,415 UART: [art] Store in in slot 0x4
2,439,150 UART: [art] Derive Key Pair
2,439,510 UART: [art] Store priv key in slot 0x5
2,452,722 UART: [art] Derive Key Pair - Done
2,467,747 UART: [art] Signing Cert with AUTHO
2,468,227 UART: RITY.KEYID = 7
2,482,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,682 UART: [art] PUB.X = B932003108D50968A6D6F2E576EE433FC5F56F30BBF7D603792447B51E321F59D49302B55DCF3813F637533CB7EB386B
2,490,416 UART: [art] PUB.Y = ECC21A555168455FB4F785CAAEA5B35BD7E469770F60A80B1D5E3CB2CCF6131A6E831D52A2D68A811ACC67D5C958BC5C
2,497,378 UART: [art] SIG.R = 5842B274B3FE93073745254046E1C83CD3F1DE295DE89E494491462F2877A172F1EF6EBEF3813F7068D889C3695C73F5
2,504,139 UART: [art] SIG.S = FF7306663888F5E4472B79C12DC7D2F917235AEF84470F0A4FB471CDEF1C612D3BA4397584D36C2A41AC63BCEFDB2F94
2,528,205 UART: mbox::rt_entry...
2,528,577 UART: ____ _ _ _ ____ _____
2,529,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,929 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,465 UART: |_|
2,532,777 UART:
2,640,185 UART: [rt] Runtime listening for mailbox commands...
2,641,109 >>> mbox cmd response data (0 bytes)
2,641,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,073,565 >>> mbox cmd response: success
5,087,053 UART:
5,087,069 UART: Running Caliptra FMC ...
5,087,477 UART:
5,087,620 UART: [state] CFI Enabled
5,176,343 UART: [art] Extend RT PCRs Done
5,176,771 UART: [art] Lock RT PCRs Done
5,178,164 UART: [art] Populate DV Done
5,186,275 UART: [fht] FMC Alias Private Key: 7
5,187,327 UART: [art] Derive CDI
5,187,607 UART: [art] Store in in slot 0x4
5,273,910 UART: [art] Derive Key Pair
5,274,270 UART: [art] Store priv key in slot 0x5
5,287,436 UART: [art] Derive Key Pair - Done
5,302,099 UART: [art] Signing Cert with AUTHO
5,302,579 UART: RITY.KEYID = 7
5,318,387 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,152 UART: [art] PUB.X = 41AB058B6664A708A0D0C2DAA2B7C0BA578A74A168909D50789F0BE0C3C31004241C26F709ED185F82E5D704879FF17D
5,325,906 UART: [art] PUB.Y = CD5EB9F769A0E2254B1C5DF11EBC75662F1E68EFC1C3E9C57F65DB0D1CB1B544FCB1EE4F6C1338C45D6E1B437DF38692
5,332,875 UART: [art] SIG.R = 463A23C0E813E7D91DEDE599F8617A8033BB423264B8583AD452A1C5D0618AF8B0CE3068DBA66B6A868A0E1AE7D197FC
5,339,652 UART: [art] SIG.S = E138EFCCEC284C9BF0E8439863358251FBC2A5A2AFF3E53CB4BF1CDC63848C606D8D80A97355090CFE8616ADFB3C8375
5,363,455 UART: Caliptra RT
5,363,801 UART: [state] CFI Enabled
5,643,301 UART: [rt] RT failed reset flow
5,643,732 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,367 UART:
192,742 UART: Running Caliptra ROM ...
193,863 UART:
194,004 UART: [state] CFI Enabled
267,367 UART: [state] LifecycleState = Unprovisioned
269,298 UART: [state] DebugLocked = No
271,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,460 UART: [kat] SHA2-256
445,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,673 UART: [kat] ++
456,115 UART: [kat] sha1
466,055 UART: [kat] SHA2-256
468,710 UART: [kat] SHA2-384
474,124 UART: [kat] SHA2-512-ACC
476,484 UART: [kat] ECC-384
2,769,044 UART: [kat] HMAC-384Kdf
2,800,597 UART: [kat] LMS
3,990,952 UART: [kat] --
3,996,457 UART: [cold-reset] ++
3,997,955 UART: [fht] Storing FHT @ 0x50003400
4,010,635 UART: [idev] ++
4,011,221 UART: [idev] CDI.KEYID = 6
4,012,103 UART: [idev] SUBJECT.KEYID = 7
4,013,410 UART: [idev] UDS.KEYID = 0
4,014,369 ready_for_fw is high
4,014,554 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,113,626 UART: [idev] Erasing UDS.KEYID = 0
7,346,181 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,307 UART: [idev] --
7,372,241 UART: [ldev] ++
7,372,806 UART: [ldev] CDI.KEYID = 6
7,373,760 UART: [ldev] SUBJECT.KEYID = 5
7,375,016 UART: [ldev] AUTHORITY.KEYID = 7
7,376,239 UART: [ldev] FE.KEYID = 1
7,421,125 UART: [ldev] Erasing FE.KEYID = 1
10,754,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,055 UART: [ldev] --
13,115,104 UART: [fwproc] Waiting for Commands...
13,117,518 UART: [fwproc] Received command 0x46574c44
13,119,748 UART: [fwproc] Received Image of size 78676 bytes
16,743,349 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,818,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,887,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,080,203 >>> mbox cmd response: success
17,080,686 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,085,141 UART: [afmc] ++
17,085,714 UART: [afmc] CDI.KEYID = 6
17,086,651 UART: [afmc] SUBJECT.KEYID = 7
17,087,919 UART: [afmc] AUTHORITY.KEYID = 5
20,452,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,751,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,753,466 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,767,905 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,782,692 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,797,129 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,817,816 UART: [afmc] --
22,821,720 UART: [cold-reset] --
22,825,788 UART: [state] Locking Datavault
22,831,197 UART: [state] Locking PCR0, PCR1 and PCR31
22,832,888 UART: [state] Locking ICCM
22,834,649 UART: [exit] Launching FMC @ 0x40000130
22,843,009 UART:
22,843,284 UART: Running Caliptra FMC ...
22,844,387 UART:
22,844,538 UART: [state] CFI Enabled
22,913,027 UART: [fht] FMC Alias Private Key: 7
25,251,625 UART: [art] Extend RT PCRs Done
25,252,855 UART: [art] Lock RT PCRs Done
25,254,424 UART: [art] Populate DV Done
25,259,775 UART: [fht] FMC Alias Private Key: 7
25,261,357 UART: [art] Derive CDI
25,262,163 UART: [art] Store in in slot 0x4
25,322,311 UART: [art] Derive Key Pair
25,323,337 UART: [art] Store priv key in slot 0x5
28,616,353 UART: [art] Derive Key Pair - Done
28,629,352 UART: [art] Signing Cert with AUTHO
28,630,659 UART: RITY.KEYID = 7
30,917,789 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,294 UART: [art] PUB.X = E3B8E8C1802A86A540133BE7112F8D228CBEAF2B42594547A7424D1FEE387420C6C7D12CDA63FF0A0390487E7E4C8345
30,926,531 UART: [art] PUB.Y = 477EAB900D67078AA19804196F3FEFEFC7C04028AF7274DB2CC8F1BCD393A6E5F7610D9099E12F06B6AC0CA723264409
30,933,750 UART: [art] SIG.R = 7506F573ABBE322F55AE68158C9F71F94A309792900AEAF909D2CF3734FE83C1281CB5C65B1B242D06111215AE3AF9DE
30,941,149 UART: [art] SIG.S = 88813F94ECE7AA7C7B8BBBE309D59A4EA6D99CDD8E6BB76C344C955588CE54069F73E8CE956CE8AD9125936E1309F5DF
32,245,878 UART: mbox::rt_entry...
32,246,819 UART: ____ _ _ _ ____ _____
32,248,745 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,744 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,669 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,587 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,507 UART: |_|
32,257,305 UART:
32,370,230 UART: [rt] Runtime listening for mailbox commands...
32,372,395 >>> mbox cmd response data (0 bytes)
34,429,684 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,573,969 UART:
34,574,320 UART: Running Caliptra ROM ...
34,575,406 UART:
34,575,567 UART: [state] CFI Enabled
34,650,141 UART: [state] LifecycleState = Unprovisioned
34,652,071 UART: [state] DebugLocked = No
34,654,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,658,906 UART: [kat] SHA2-256
34,828,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,839,132 UART: [kat] ++
34,839,677 UART: [kat] sha1
34,850,731 UART: [kat] SHA2-256
34,853,419 UART: [kat] SHA2-384
34,859,183 UART: [kat] SHA2-512-ACC
34,861,555 UART: [kat] ECC-384
37,155,720 UART: [kat] HMAC-384Kdf
37,185,631 UART: [kat] LMS
38,375,963 UART: [kat] --
38,381,262 UART: [update-reset] ++
42,528,776 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,532,082 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,914,060 >>> mbox cmd response: success
42,919,205 UART: [update-reset] Copying MAN_2 To MAN_1
42,938,045 UART: [update-reset Success] --
42,942,245 UART: [state] Locking Datavault
42,945,548 UART: [state] Locking PCR0, PCR1 and PCR31
42,947,307 UART: [state] Locking ICCM
42,949,349 UART: [exit] Launching FMC @ 0x40000130
42,957,799 UART:
42,958,030 UART: Running Caliptra FMC ...
42,959,127 UART:
42,959,276 UART: [state] CFI Enabled
43,046,332 UART: [art] Extend RT PCRs Done
43,047,549 UART: [art] Lock RT PCRs Done
43,049,064 UART: [art] Populate DV Done
43,054,204 UART: [fht] FMC Alias Private Key: 7
43,055,950 UART: [art] Derive CDI
43,056,758 UART: [art] Store in in slot 0x4
43,115,320 UART: [art] Derive Key Pair
43,116,370 UART: [art] Store priv key in slot 0x5
46,409,167 UART: [art] Derive Key Pair - Done
46,422,109 UART: [art] Signing Cert with AUTHO
46,423,426 UART: RITY.KEYID = 7
48,711,739 UART: [art] Erasing AUTHORITY.KEYID = 7
48,713,263 UART: [art] PUB.X = 572B01A7491CF496DF2E35879DC9CE918627A33EA46E8EB87D82E7FD0D6402A761A15AB00FF0D996CB4C9F7935CA5F1A
48,720,513 UART: [art] PUB.Y = 0F614393B7C2C396823EFEBEEFF83B8BF1D1958C3F8E2F8E1031E90AC93E83F75001082D56D68438DD912CB5F57CF709
48,727,728 UART: [art] SIG.R = A2E5ED60B5C8A6D9EF4200B6164A3D8A51E9980E24BFADFEC947661AD0C792846F159BCFBF0E1D05FC4C944FCA40F0E8
48,735,162 UART: [art] SIG.S = 3A9B9F43965B675FF310313B771800A434E035CB960671286F87E19867EB7B401AEFAAE2BFC75399209BC504BA0A1B83
50,040,357 UART: Caliptra RT
50,041,073 UART: [state] CFI Enabled
50,370,205 UART: [rt] RT failed reset flow
50,371,401 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,784,728 ready_for_fw is high
3,785,156 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,157,534 >>> mbox cmd response: success
17,158,594 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,845,941 UART:
22,846,348 UART: Running Caliptra FMC ...
22,847,453 UART:
22,847,600 UART: [state] CFI Enabled
22,915,065 UART: [fht] FMC Alias Private Key: 7
25,252,822 UART: [art] Extend RT PCRs Done
25,254,039 UART: [art] Lock RT PCRs Done
25,255,798 UART: [art] Populate DV Done
25,261,115 UART: [fht] FMC Alias Private Key: 7
25,262,815 UART: [art] Derive CDI
25,263,632 UART: [art] Store in in slot 0x4
25,324,380 UART: [art] Derive Key Pair
25,325,409 UART: [art] Store priv key in slot 0x5
28,618,563 UART: [art] Derive Key Pair - Done
28,631,346 UART: [art] Signing Cert with AUTHO
28,632,639 UART: RITY.KEYID = 7
30,920,136 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,642 UART: [art] PUB.X = 3304A70D0D561158208F73839CAA0A08E45F2AAC4EF5793F0E76E142DFD255649B581D073465E968939D02A5E91D1306
30,928,882 UART: [art] PUB.Y = E5BA753FE4673A4EE4B1294BA1DC8CC21DABD1271B81A2E2BA246DCBB6706B70AF765D2892B9FE85D4C36C8D9A300E24
30,936,162 UART: [art] SIG.R = 5396ADEB59F779D9255862BB526530A020B47236AB6EFD483F9BF7BC6A6928FF98F42A84C7D6DE221E406C4FF8D8FCD2
30,943,536 UART: [art] SIG.S = 51556310738960DEA0B87D064364C43BE1D4FCC0409EB3464F3E4DFF76F1899FEA44CCC38DAE88B05B593CD78A9F3A4C
32,248,072 UART: mbox::rt_entry...
32,249,048 UART: ____ _ _ _ ____ _____
32,251,038 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,976 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,861 UART: |_|
32,259,741 UART:
32,373,161 UART: [rt] Runtime listening for mailbox commands...
32,375,328 >>> mbox cmd response data (0 bytes)
34,433,091 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,159,884 >>> mbox cmd response: success
43,195,698 UART:
43,196,017 UART: Running Caliptra FMC ...
43,197,051 UART:
43,197,207 UART: [state] CFI Enabled
43,304,372 UART: [art] Extend RT PCRs Done
43,305,568 UART: [art] Lock RT PCRs Done
43,307,291 UART: [art] Populate DV Done
43,312,909 UART: [fht] FMC Alias Private Key: 7
43,314,646 UART: [art] Derive CDI
43,315,470 UART: [art] Store in in slot 0x4
43,373,534 UART: [art] Derive Key Pair
43,374,530 UART: [art] Store priv key in slot 0x5
46,667,064 UART: [art] Derive Key Pair - Done
46,679,586 UART: [art] Signing Cert with AUTHO
46,680,925 UART: RITY.KEYID = 7
48,970,194 UART: [art] Erasing AUTHORITY.KEYID = 7
48,971,724 UART: [art] PUB.X = E4E2714032571B518D4CB917B9D5C6B7773AC59F2630398422BC66EA20BE2637E9D194DD8B0AAEBD7C3B3506B4C6AAF4
48,979,003 UART: [art] PUB.Y = 4EF791752DE7C1BFED6D01E61DC90F6F9351D5C881E1E42B124A3E2EA17BF841BECE2887195767F31DD02D1C6B79B7C9
48,986,178 UART: [art] SIG.R = 9CC664B24C77A2360FA632EB1145C0FFBD8D0EAD224EEEF75CBF42608B7EFEEBFCB6D6E150BF980DF48F65E697C9452C
48,993,811 UART: [art] SIG.S = 4F6CADF186854F7255C0BC7735A98C0F7CEF96C74AE340B9ECCEBE12302C2A0997485C0C8B1183C209FFB819C77BF477
50,299,164 UART: Caliptra RT
50,299,862 UART: [state] CFI Enabled
50,628,603 UART: [rt] RT failed reset flow
50,629,793 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,326 UART:
192,695 UART: Running Caliptra ROM ...
193,798 UART:
603,631 UART: [state] CFI Enabled
616,078 UART: [state] LifecycleState = Unprovisioned
617,958 UART: [state] DebugLocked = No
619,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,640 UART: [kat] SHA2-256
794,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,957 UART: [kat] ++
805,426 UART: [kat] sha1
817,080 UART: [kat] SHA2-256
819,780 UART: [kat] SHA2-384
825,103 UART: [kat] SHA2-512-ACC
827,412 UART: [kat] ECC-384
3,111,552 UART: [kat] HMAC-384Kdf
3,123,648 UART: [kat] LMS
4,313,781 UART: [kat] --
4,317,801 UART: [cold-reset] ++
4,320,368 UART: [fht] Storing FHT @ 0x50003400
4,331,844 UART: [idev] ++
4,332,400 UART: [idev] CDI.KEYID = 6
4,333,352 UART: [idev] SUBJECT.KEYID = 7
4,334,590 UART: [idev] UDS.KEYID = 0
4,335,545 ready_for_fw is high
4,335,747 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,434,757 UART: [idev] Erasing UDS.KEYID = 0
7,624,756 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,076 UART: [idev] --
7,651,181 UART: [ldev] ++
7,651,749 UART: [ldev] CDI.KEYID = 6
7,652,712 UART: [ldev] SUBJECT.KEYID = 5
7,653,923 UART: [ldev] AUTHORITY.KEYID = 7
7,655,200 UART: [ldev] FE.KEYID = 1
7,667,655 UART: [ldev] Erasing FE.KEYID = 1
10,954,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,354 UART: [ldev] --
13,312,874 UART: [fwproc] Waiting for Commands...
13,315,612 UART: [fwproc] Received command 0x46574c44
13,317,793 UART: [fwproc] Received Image of size 78676 bytes
16,931,192 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,010,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,079,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,271,735 >>> mbox cmd response: success
17,272,199 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,275,895 UART: [afmc] ++
17,276,535 UART: [afmc] CDI.KEYID = 6
17,277,420 UART: [afmc] SUBJECT.KEYID = 7
17,278,688 UART: [afmc] AUTHORITY.KEYID = 5
20,589,042 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,881,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,884,156 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,898,512 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,913,370 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,927,816 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,949,399 UART: [afmc] --
22,953,393 UART: [cold-reset] --
22,958,068 UART: [state] Locking Datavault
22,963,695 UART: [state] Locking PCR0, PCR1 and PCR31
22,965,447 UART: [state] Locking ICCM
22,967,054 UART: [exit] Launching FMC @ 0x40000130
22,975,447 UART:
22,975,679 UART: Running Caliptra FMC ...
22,976,775 UART:
22,976,933 UART: [state] CFI Enabled
22,984,983 UART: [fht] FMC Alias Private Key: 7
25,316,001 UART: [art] Extend RT PCRs Done
25,317,229 UART: [art] Lock RT PCRs Done
25,318,689 UART: [art] Populate DV Done
25,323,772 UART: [fht] FMC Alias Private Key: 7
25,325,307 UART: [art] Derive CDI
25,326,118 UART: [art] Store in in slot 0x4
25,368,835 UART: [art] Derive Key Pair
25,369,832 UART: [art] Store priv key in slot 0x5
28,611,744 UART: [art] Derive Key Pair - Done
28,624,525 UART: [art] Signing Cert with AUTHO
28,625,824 UART: RITY.KEYID = 7
30,905,383 UART: [art] Erasing AUTHORITY.KEYID = 7
30,906,889 UART: [art] PUB.X = A9E6B2170AA0E7BE1F1C4A1FA02535901B8ED56E47CA4750F07F777DA19784EEB106C77BFA15B1AB22FA9DF73282E2A2
30,914,135 UART: [art] PUB.Y = 41867C64821BE98F5AF72293CCCB20C22966D78EF8C08A078B919AD37965C6F2F72363490383A6095DE1FFD6342AC803
30,921,379 UART: [art] SIG.R = 1B19AE02087149321149018F4CD3BB90D4D378D5AAA9443614AC978CFF6D66333E749708BA39841377E80609F61A0A5E
30,928,714 UART: [art] SIG.S = 48035545698DCF7BBE42B5508D3D0CEE7D4FDD9792625F556C043FA3EA44783C293F5835EDF0F39ADBBFDAC7CC4FABE1
32,233,216 UART: mbox::rt_entry...
32,234,158 UART: ____ _ _ _ ____ _____
32,236,135 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,238,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,240,077 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,242,007 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,243,888 UART: |_|
32,244,693 UART:
32,357,628 UART: [rt] Runtime listening for mailbox commands...
32,359,800 >>> mbox cmd response data (0 bytes)
34,411,840 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,556,092 UART:
34,556,462 UART: Running Caliptra ROM ...
34,557,595 UART:
34,557,761 UART: [state] CFI Enabled
34,570,737 UART: [state] LifecycleState = Unprovisioned
34,572,660 UART: [state] DebugLocked = No
34,574,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,578,372 UART: [kat] SHA2-256
34,748,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,758,605 UART: [kat] ++
34,759,056 UART: [kat] sha1
34,769,994 UART: [kat] SHA2-256
34,772,740 UART: [kat] SHA2-384
34,777,857 UART: [kat] SHA2-512-ACC
34,780,202 UART: [kat] ECC-384
37,063,324 UART: [kat] HMAC-384Kdf
37,075,229 UART: [kat] LMS
38,265,283 UART: [kat] --
38,268,597 UART: [update-reset] ++
42,405,800 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,409,207 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,791,182 >>> mbox cmd response: success
42,795,773 UART: [update-reset] Copying MAN_2 To MAN_1
42,814,409 UART: [update-reset Success] --
42,819,070 UART: [state] Locking Datavault
42,821,451 UART: [state] Locking PCR0, PCR1 and PCR31
42,823,241 UART: [state] Locking ICCM
42,825,535 UART: [exit] Launching FMC @ 0x40000130
42,833,943 UART:
42,834,179 UART: Running Caliptra FMC ...
42,835,217 UART:
42,835,362 UART: [state] CFI Enabled
42,879,542 UART: [art] Extend RT PCRs Done
42,880,706 UART: [art] Lock RT PCRs Done
42,882,399 UART: [art] Populate DV Done
42,887,911 UART: [fht] FMC Alias Private Key: 7
42,889,610 UART: [art] Derive CDI
42,890,436 UART: [art] Store in in slot 0x4
42,933,211 UART: [art] Derive Key Pair
42,934,254 UART: [art] Store priv key in slot 0x5
46,176,413 UART: [art] Derive Key Pair - Done
46,189,685 UART: [art] Signing Cert with AUTHO
46,191,023 UART: RITY.KEYID = 7
48,470,372 UART: [art] Erasing AUTHORITY.KEYID = 7
48,471,888 UART: [art] PUB.X = 504A02A4F8E6C398A71F4A8B337EA8337117D6E15F45EC00647F87465AE874EFE87DF30B5C12639A7945C8D8595D06F6
48,479,120 UART: [art] PUB.Y = F27024C93D075237AEABFA69900A35F71D6098E77ED8D7C6E81C585979D8294567183846E0E8E443091E5A3504C7DDDE
48,486,329 UART: [art] SIG.R = 2752A2A64604E037BE6D480932CAF6F94F9107E71FE6E7B727E4335625FA6F2F605CAD06A8333AD838790D078948416A
48,493,733 UART: [art] SIG.S = F9B0A623B81AE1BDBD449977A6B268ABA51C6B02170BA92335FED75DDE505B0767E317827AD757C4F80F63D2AF7651D8
49,798,888 UART: Caliptra RT
49,799,627 UART: [state] CFI Enabled
50,083,339 UART: [rt] RT failed reset flow
50,084,535 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,128,115 ready_for_fw is high
4,128,536 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,351,556 >>> mbox cmd response: success
17,352,562 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,989,333 UART:
22,989,718 UART: Running Caliptra FMC ...
22,990,853 UART:
22,991,018 UART: [state] CFI Enabled
22,999,133 UART: [fht] FMC Alias Private Key: 7
25,330,329 UART: [art] Extend RT PCRs Done
25,331,560 UART: [art] Lock RT PCRs Done
25,333,428 UART: [art] Populate DV Done
25,338,868 UART: [fht] FMC Alias Private Key: 7
25,340,365 UART: [art] Derive CDI
25,341,133 UART: [art] Store in in slot 0x4
25,383,905 UART: [art] Derive Key Pair
25,384,944 UART: [art] Store priv key in slot 0x5
28,626,361 UART: [art] Derive Key Pair - Done
28,639,463 UART: [art] Signing Cert with AUTHO
28,640,772 UART: RITY.KEYID = 7
30,919,974 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,486 UART: [art] PUB.X = 5C883F074A14ECCF38D781EEAD930E2287142B827F389D3614838C5713EF8166AFFB436B698C514E0B5361D607171890
30,928,703 UART: [art] PUB.Y = 51EC4B350B2F6039B4DA6EB1A7FB1E1F41A49B9B277800D1B1019BA859B47B5392E7E9F4B0A0BB360ECBDC6E544B0496
30,935,958 UART: [art] SIG.R = E1CEF79D362B81A00CE5E9C8E149EA933361D2AE57DE8F01FE31C71D421D1640912D12C0176D89C892142656EBA0D955
30,943,321 UART: [art] SIG.S = 19026C34FC3CC84C66073A0DFA8961F06E9AAB72120D756B99F01C7046F31D1827C696EBCF8941F2608CC5EDCD2AAE91
32,248,385 UART: mbox::rt_entry...
32,249,333 UART: ____ _ _ _ ____ _____
32,251,436 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,661 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,558 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,257,519 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,259,377 UART: |_|
32,260,202 UART:
32,373,112 UART: [rt] Runtime listening for mailbox commands...
32,375,280 >>> mbox cmd response data (0 bytes)
34,429,367 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,090,912 >>> mbox cmd response: success
43,126,269 UART:
43,126,586 UART: Running Caliptra FMC ...
43,127,712 UART:
43,127,907 UART: [state] CFI Enabled
43,171,841 UART: [art] Extend RT PCRs Done
43,173,032 UART: [art] Lock RT PCRs Done
43,174,497 UART: [art] Populate DV Done
43,180,016 UART: [fht] FMC Alias Private Key: 7
43,181,546 UART: [art] Derive CDI
43,182,359 UART: [art] Store in in slot 0x4
43,224,477 UART: [art] Derive Key Pair
43,225,512 UART: [art] Store priv key in slot 0x5
46,467,996 UART: [art] Derive Key Pair - Done
46,480,951 UART: [art] Signing Cert with AUTHO
46,482,264 UART: RITY.KEYID = 7
48,762,048 UART: [art] Erasing AUTHORITY.KEYID = 7
48,763,556 UART: [art] PUB.X = 19B23AA5BC16C5D99D18428EEDEA1D05692E5431D1A90BD937E375410A02EA8225EF1CACFD6A0689DF0BF77217996DF6
48,770,818 UART: [art] PUB.Y = 442DEE2D3A588B20636AF795A6146A32A14C0B28585C6255E2CCC147C898300443C115EA1F7DEE8E4EE3E833EC6B74EA
48,778,074 UART: [art] SIG.R = BFF665E0D57A79D420636C33818BF011B0BC1A095C2C99FECAD2A846A795C7D877FAA2369FC8204B2F5B978C37B133C9
48,785,455 UART: [art] SIG.S = 20201819A58DFFA233590E9C3E6943B9523B890460FAEC10FD508575F1E6FC9ADB9C6C1C12FD5B6F6D6DC04BF63545C7
50,090,605 UART: Caliptra RT
50,091,322 UART: [state] CFI Enabled
50,377,001 UART: [rt] RT failed reset flow
50,378,201 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
192,686 UART:
193,042 UART: Running Caliptra ROM ...
194,223 UART:
194,379 UART: [state] CFI Enabled
267,156 UART: [state] LifecycleState = Unprovisioned
269,020 UART: [state] DebugLocked = No
271,137 UART: [state] WD Timer not started. Device not locked for debugging
274,402 UART: [kat] SHA2-256
453,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,089 UART: [kat] ++
465,537 UART: [kat] sha1
476,742 UART: [kat] SHA2-256
479,802 UART: [kat] SHA2-384
485,940 UART: [kat] SHA2-512-ACC
488,887 UART: [kat] ECC-384
2,949,512 UART: [kat] HMAC-384Kdf
2,973,162 UART: [kat] LMS
3,502,607 UART: [kat] --
3,509,587 UART: [cold-reset] ++
3,510,993 UART: [fht] FHT @ 0x50003400
3,521,133 UART: [idev] ++
3,521,702 UART: [idev] CDI.KEYID = 6
3,522,610 UART: [idev] SUBJECT.KEYID = 7
3,523,783 UART: [idev] UDS.KEYID = 0
3,524,708 ready_for_fw is high
3,524,897 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,623,906 UART: [idev] Erasing UDS.KEYID = 0
6,026,056 UART: [idev] Sha1 KeyId Algorithm
6,048,053 UART: [idev] --
6,052,054 UART: [ldev] ++
6,052,633 UART: [ldev] CDI.KEYID = 6
6,053,546 UART: [ldev] SUBJECT.KEYID = 5
6,054,708 UART: [ldev] AUTHORITY.KEYID = 7
6,055,999 UART: [ldev] FE.KEYID = 1
6,102,465 UART: [ldev] Erasing FE.KEYID = 1
8,606,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,185 UART: [ldev] --
10,412,936 UART: [fwproc] Wait for Commands...
10,415,894 UART: [fwproc] Recv command 0x46574c44
10,417,952 UART: [fwproc] Recv'd Img size: 78632 bytes
13,388,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,466,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,534,849 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,728,106 >>> mbox cmd response: success
13,728,588 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,732,613 UART: [afmc] ++
13,733,199 UART: [afmc] CDI.KEYID = 6
13,734,083 UART: [afmc] SUBJECT.KEYID = 7
13,735,242 UART: [afmc] AUTHORITY.KEYID = 5
16,275,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,996,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,998,660 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,014,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,030,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,046,299 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,068,505 UART: [afmc] --
18,071,950 UART: [cold-reset] --
18,075,685 UART: [state] Locking Datavault
18,080,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,082,174 UART: [state] Locking ICCM
18,084,602 UART: [exit] Launching FMC @ 0x40000130
18,093,006 UART:
18,093,250 UART: Running Caliptra FMC ...
18,094,358 UART:
18,094,526 UART: [state] CFI Enabled
18,157,742 UART: [fht] FMC Alias Private Key: 7
19,921,362 UART: [art] Extend RT PCRs Done
19,922,580 UART: [art] Lock RT PCRs Done
19,924,369 UART: [art] Populate DV Done
19,929,837 UART: [fht] FMC Alias Private Key: 7
19,931,437 UART: [art] Derive CDI
19,932,276 UART: [art] Store in in slot 0x4
19,990,262 UART: [art] Derive Key Pair
19,991,314 UART: [art] Store priv key in slot 0x5
22,454,907 UART: [art] Derive Key Pair - Done
22,468,005 UART: [art] Signing Cert with AUTHO
22,469,318 UART: RITY.KEYID = 7
24,180,504 UART: [art] Erasing AUTHORITY.KEYID = 7
24,182,011 UART: [art] PUB.X = 1C3D3DAE8CCEF82F1EAD41C1E061C4BF5D83952329F16E28A11AEFCA4A32B9A386863B08384D1993C9CF808E96E43143
24,189,307 UART: [art] PUB.Y = 5C9BBDFE6249C3F228D2623674F42A723A5BB9639F38BF31A0F83CF7D40E9885BEDE6597D23D1DFA81E988F9FC16A85F
24,196,559 UART: [art] SIG.R = 9A09379546B5F78D47954592E4F4B2C694516412FBF6032C2F2325FF4392323EECA8859B5B952E7294E424B6D63C5ED5
24,203,954 UART: [art] SIG.S = FA73C119C3F93C075FF11D69216BFCD7A5EB1F88F45EFB6563C0528C63D907D21EDD89CCED5A17FA8015FF147DC12AE3
25,182,816 UART: mbox::rt_entry...
25,183,774 UART: ____ _ _ _ ____ _____
25,185,762 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,187,767 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,189,697 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,192,206 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,194,162 UART: |_|
25,195,001 UART:
25,307,247 UART: [rt] Runtime listening for mailbox commands...
25,309,419 >>> mbox cmd response data (0 bytes)
27,363,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,508,151 UART:
27,508,536 UART: Running Caliptra ROM ...
27,509,671 UART:
27,509,846 UART: [state] CFI Enabled
27,573,831 UART: [state] LifecycleState = Unprovisioned
27,575,689 UART: [state] DebugLocked = No
27,577,105 UART: [state] WD Timer not started. Device not locked for debugging
27,580,801 UART: [kat] SHA2-256
27,759,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,771,524 UART: [kat] ++
27,772,074 UART: [kat] sha1
27,783,246 UART: [kat] SHA2-256
27,786,253 UART: [kat] SHA2-384
27,792,891 UART: [kat] SHA2-512-ACC
27,795,837 UART: [kat] ECC-384
30,256,849 UART: [kat] HMAC-384Kdf
30,279,249 UART: [kat] LMS
30,808,678 UART: [kat] --
30,813,586 UART: [update-reset] ++
34,238,719 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,242,998 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
34,625,983 >>> mbox cmd response: success
34,630,988 UART: [update-reset] Copying MAN_2 To MAN_1
34,648,703 UART: [update-reset Success] --
34,652,465 UART: [state] Locking Datavault
34,654,042 UART: [state] Locking PCR0, PCR1 and PCR31
34,655,695 UART: [state] Locking ICCM
34,657,687 UART: [exit] Launching FMC @ 0x40000130
34,666,141 UART:
34,666,382 UART: Running Caliptra FMC ...
34,667,803 UART:
34,667,968 UART: [state] CFI Enabled
34,769,401 UART: [art] Extend RT PCRs Done
34,770,602 UART: [art] Lock RT PCRs Done
34,772,066 UART: [art] Populate DV Done
34,777,477 UART: [fht] FMC Alias Private Key: 7
34,779,186 UART: [art] Derive CDI
34,780,001 UART: [art] Store in in slot 0x4
34,838,283 UART: [art] Derive Key Pair
34,839,331 UART: [art] Store priv key in slot 0x5
37,302,304 UART: [art] Derive Key Pair - Done
37,315,194 UART: [art] Signing Cert with AUTHO
37,316,508 UART: RITY.KEYID = 7
39,028,450 UART: [art] Erasing AUTHORITY.KEYID = 7
39,030,094 UART: [art] PUB.X = 36FA9E0CE9BE87A3950F77236D428E42D014C0C6DEBE04543F56E31028AAD45B66B7F526DC2D7BC3F929179911AAE713
39,037,232 UART: [art] PUB.Y = 748A41E4772C91A9C8D8BE021E21697658D770C43B5E73C8DEA47876854E0DE3C826E3E9D46CF00E5743041ABB6F32C7
39,044,439 UART: [art] SIG.R = ED46AE1DFC30C5A30FFE70B67ACEC40D3F8385E3C7A81612ABD036B43DDAA88A440859AF3AF7E30D8EE5DBA554C4C669
39,051,869 UART: [art] SIG.S = 1EA3EC83AD0526D67DEE82DD3C1D1E86730694DEF148F1FC55798A41DA0ECE81371DF606127A7B1CACEFA0A507A8DC78
40,030,593 UART: Caliptra RT
40,031,312 UART: [state] CFI Enabled
40,367,727 UART: [rt] RT failed reset flow
40,368,924 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,682 UART:
193,108 UART: Running Caliptra ROM ...
194,240 UART:
194,388 UART: [state] CFI Enabled
263,541 UART: [state] LifecycleState = Unprovisioned
265,901 UART: [state] DebugLocked = No
267,639 UART: [state] WD Timer not started. Device not locked for debugging
272,315 UART: [kat] SHA2-256
462,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,991 UART: [kat] ++
473,437 UART: [kat] sha1
485,514 UART: [kat] SHA2-256
488,520 UART: [kat] SHA2-384
494,527 UART: [kat] SHA2-512-ACC
497,112 UART: [kat] ECC-384
2,948,923 UART: [kat] HMAC-384Kdf
2,973,111 UART: [kat] LMS
3,504,883 UART: [kat] --
3,508,245 UART: [cold-reset] ++
3,509,676 UART: [fht] FHT @ 0x50003400
3,521,151 UART: [idev] ++
3,521,784 UART: [idev] CDI.KEYID = 6
3,522,734 UART: [idev] SUBJECT.KEYID = 7
3,523,979 UART: [idev] UDS.KEYID = 0
3,524,880 ready_for_fw is high
3,525,064 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,624,122 UART: [idev] Erasing UDS.KEYID = 0
6,030,008 UART: [idev] Sha1 KeyId Algorithm
6,053,682 UART: [idev] --
6,057,529 UART: [ldev] ++
6,058,280 UART: [ldev] CDI.KEYID = 6
6,059,165 UART: [ldev] SUBJECT.KEYID = 5
6,060,329 UART: [ldev] AUTHORITY.KEYID = 7
6,061,562 UART: [ldev] FE.KEYID = 1
6,101,081 UART: [ldev] Erasing FE.KEYID = 1
8,609,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,502 UART: [ldev] --
10,417,853 UART: [fwproc] Wait for Commands...
10,420,384 UART: [fwproc] Recv command 0x46574c44
10,422,640 UART: [fwproc] Recv'd Img size: 78632 bytes
13,433,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,510,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,626,535 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,953,935 >>> mbox cmd response: success
13,954,417 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,958,444 UART: [afmc] ++
13,959,140 UART: [afmc] CDI.KEYID = 6
13,960,302 UART: [afmc] SUBJECT.KEYID = 7
13,961,844 UART: [afmc] AUTHORITY.KEYID = 5
16,491,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,213,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,215,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,230,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,246,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,261,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,284,687 UART: [afmc] --
18,289,047 UART: [cold-reset] --
18,292,665 UART: [state] Locking Datavault
18,297,819 UART: [state] Locking PCR0, PCR1 and PCR31
18,300,021 UART: [state] Locking ICCM
18,301,967 UART: [exit] Launching FMC @ 0x40000130
18,310,598 UART:
18,310,833 UART: Running Caliptra FMC ...
18,311,862 UART:
18,312,007 UART: [state] CFI Enabled
18,373,767 UART: [fht] FMC Alias Private Key: 7
20,138,502 UART: [art] Extend RT PCRs Done
20,139,742 UART: [art] Lock RT PCRs Done
20,141,314 UART: [art] Populate DV Done
20,146,888 UART: [fht] FMC Alias Private Key: 7
20,148,535 UART: [art] Derive CDI
20,149,351 UART: [art] Store in in slot 0x4
20,206,373 UART: [art] Derive Key Pair
20,207,434 UART: [art] Store priv key in slot 0x5
22,670,248 UART: [art] Derive Key Pair - Done
22,683,182 UART: [art] Signing Cert with AUTHO
22,684,553 UART: RITY.KEYID = 7
24,396,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,397,541 UART: [art] PUB.X = EC4C55C8AD90281AB2575EB1F4C7CF7340503FE03F4997FC1707362B3D61BD8E62413CF1A8DA49E2BE4CFCAD68557297
24,404,836 UART: [art] PUB.Y = 46553ED262DBCCACD92816AADF90D156A82132EB93E4019B34E85AADAE9CC8D436C850607049FC3D07DE6E97D5E5A63F
24,412,109 UART: [art] SIG.R = 0D4993F608647D6984AA5785E5F3D148CE223DB0350F15265703F34377F184E22E050D3A362D7EC566E1F224C11AD4DB
24,419,500 UART: [art] SIG.S = 754B7DD9E845BAB1E48594D53402EB34806E35F38A1963BF652E9C1BCD2EA369CA5F37C1EE2E34EE8F248BA9FAFF3887
25,398,116 UART: mbox::rt_entry...
25,399,094 UART: ____ _ _ _ ____ _____
25,401,086 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,403,094 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,405,034 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,406,972 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,408,907 UART: |_|
25,409,736 UART:
25,522,491 UART: [rt] Runtime listening for mailbox commands...
25,524,663 >>> mbox cmd response data (0 bytes)
27,581,551 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,726,169 UART:
27,726,552 UART: Running Caliptra ROM ...
27,727,698 UART:
27,727,881 UART: [state] CFI Enabled
27,786,873 UART: [state] LifecycleState = Unprovisioned
27,789,059 UART: [state] DebugLocked = No
27,791,327 UART: [state] WD Timer not started. Device not locked for debugging
27,796,727 UART: [kat] SHA2-256
27,986,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,997,335 UART: [kat] ++
27,997,839 UART: [kat] sha1
28,008,997 UART: [kat] SHA2-256
28,011,981 UART: [kat] SHA2-384
28,018,416 UART: [kat] SHA2-512-ACC
28,020,999 UART: [kat] ECC-384
30,468,375 UART: [kat] HMAC-384Kdf
30,493,353 UART: [kat] LMS
31,024,960 UART: [kat] --
31,031,292 UART: [update-reset] ++
34,493,028 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,496,432 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,104,166 >>> mbox cmd response: success
35,108,819 UART: [update-reset] Copying MAN_2 To MAN_1
35,142,461 UART: [update-reset Success] --
35,147,093 UART: [state] Locking Datavault
35,149,826 UART: [state] Locking PCR0, PCR1 and PCR31
35,151,979 UART: [state] Locking ICCM
35,153,952 UART: [exit] Launching FMC @ 0x40000130
35,162,210 UART:
35,162,453 UART: Running Caliptra FMC ...
35,163,710 UART:
35,163,878 UART: [state] CFI Enabled
35,260,713 UART: [art] Extend RT PCRs Done
35,261,918 UART: [art] Lock RT PCRs Done
35,263,237 UART: [art] Populate DV Done
35,268,596 UART: [fht] FMC Alias Private Key: 7
35,270,293 UART: [art] Derive CDI
35,271,105 UART: [art] Store in in slot 0x4
35,329,477 UART: [art] Derive Key Pair
35,330,524 UART: [art] Store priv key in slot 0x5
37,793,675 UART: [art] Derive Key Pair - Done
37,806,295 UART: [art] Signing Cert with AUTHO
37,807,611 UART: RITY.KEYID = 7
39,519,209 UART: [art] Erasing AUTHORITY.KEYID = 7
39,520,722 UART: [art] PUB.X = 192BF83DE4748D34D45E3B7873D5C1FE6D7493D0C93847BEAC125C6559FCBBF693F5FF8759BD9D58797F7F8B0ECAC907
39,528,003 UART: [art] PUB.Y = 431F752F6F3A4031B18896931A24756F97AC59F2224066EE3605D253B22818F69C265B25662382D6E82435EAA2CBC045
39,535,220 UART: [art] SIG.R = 4E8F28630D2D9A9C1B7F27F6897DBB3EC8D4243167FD44289C3D66919CCF323D7156079F7C7A7E4F2D7928C3CC4CE072
39,542,634 UART: [art] SIG.S = A46FA2DAD3F4A82EC554AA1FE158FA9C6D317B41B24D1F14BEB8B6F2F4B67523AC2A1C2AB89D3EF3D7DB1C05F136DC90
40,521,400 UART: Caliptra RT
40,522,108 UART: [state] CFI Enabled
40,861,644 UART: [rt] RT failed reset flow
40,862,839 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,441,243 ready_for_fw is high
3,441,622 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,973,487 >>> mbox cmd response: success
13,974,038 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,258,543 UART:
18,258,920 UART: Running Caliptra FMC ...
18,260,062 UART:
18,260,241 UART: [state] CFI Enabled
18,327,773 UART: [fht] FMC Alias Private Key: 7
20,091,519 UART: [art] Extend RT PCRs Done
20,092,737 UART: [art] Lock RT PCRs Done
20,094,636 UART: [art] Populate DV Done
20,100,325 UART: [fht] FMC Alias Private Key: 7
20,101,931 UART: [art] Derive CDI
20,102,753 UART: [art] Store in in slot 0x4
20,160,100 UART: [art] Derive Key Pair
20,161,138 UART: [art] Store priv key in slot 0x5
22,624,197 UART: [art] Derive Key Pair - Done
22,636,982 UART: [art] Signing Cert with AUTHO
22,638,297 UART: RITY.KEYID = 7
24,349,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,351,476 UART: [art] PUB.X = 506AFB7264DDA8495210435B85C8A5122153D3B5A1E8B6C375A2EFB8360C8798025C0AB91F351BB9D91986FAA2D628C3
24,358,767 UART: [art] PUB.Y = AC2BFBB07DCAA104E8B8861E0BC89F700B526BD164A4911B5447109C6BF5B485BBE3ECB4A5CBF5603F8DF6191419A54E
24,366,070 UART: [art] SIG.R = 35C184D417FF544623815C4CE92DC666FD7B6F9625179BFF2EE16C38FB9875F947D22FC9A0E5BED8F18ABFDDBA1490A0
24,373,457 UART: [art] SIG.S = 704B0D4910F6FE3D2FDFDDF8C64675DF275DB9DDA39B0929454A54F77237159C3EEF2391858ADF218EE7AAB4ABAFD045
25,351,719 UART: mbox::rt_entry...
25,352,691 UART: ____ _ _ _ ____ _____
25,354,681 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,356,690 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,358,621 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,360,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,362,525 UART: |_|
25,363,333 UART:
25,476,789 UART: [rt] Runtime listening for mailbox commands...
25,478,958 >>> mbox cmd response data (0 bytes)
27,532,467 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,351,725 >>> mbox cmd response: success
35,387,387 UART:
35,387,718 UART: Running Caliptra FMC ...
35,388,842 UART:
35,389,009 UART: [state] CFI Enabled
35,492,658 UART: [art] Extend RT PCRs Done
35,493,848 UART: [art] Lock RT PCRs Done
35,495,168 UART: [art] Populate DV Done
35,500,471 UART: [fht] FMC Alias Private Key: 7
35,502,170 UART: [art] Derive CDI
35,502,905 UART: [art] Store in in slot 0x4
35,561,399 UART: [art] Derive Key Pair
35,562,411 UART: [art] Store priv key in slot 0x5
38,025,211 UART: [art] Derive Key Pair - Done
38,038,055 UART: [art] Signing Cert with AUTHO
38,039,391 UART: RITY.KEYID = 7
39,750,084 UART: [art] Erasing AUTHORITY.KEYID = 7
39,751,587 UART: [art] PUB.X = 210F34850F8934234845715E82C9C1535667EE2C0E0B8B6BCFEABE9E0BA9466CF4C6935AF42D24D0555E95FC712101C0
39,758,826 UART: [art] PUB.Y = 7B3ADF557D8F7498A5832F3685B426B62BEE74CDEA98BA0655779499F0B2B5549A83D6C41EBBCE26EE783B228C81BC87
39,766,138 UART: [art] SIG.R = CD06392B5E1F924EEE70F8BD472391E569B6E3A13F14EE7E788F0B2395B5598014574C1C698A5AF73874607EEA717F82
39,773,504 UART: [art] SIG.S = FE2E33BC79FB5842EA80E7BD0857955D5FBEB2D8AD8F0ABFB73278C0E99E9B4E4C2D58C7D2F621122739DBF20AD8B9B7
40,752,391 UART: Caliptra RT
40,753,089 UART: [state] CFI Enabled
41,088,190 UART: [rt] RT failed reset flow
41,089,407 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,500 UART:
192,868 UART: Running Caliptra ROM ...
193,964 UART:
603,519 UART: [state] CFI Enabled
618,597 UART: [state] LifecycleState = Unprovisioned
620,977 UART: [state] DebugLocked = No
623,424 UART: [state] WD Timer not started. Device not locked for debugging
628,873 UART: [kat] SHA2-256
818,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,603 UART: [kat] ++
830,094 UART: [kat] sha1
840,904 UART: [kat] SHA2-256
843,912 UART: [kat] SHA2-384
850,330 UART: [kat] SHA2-512-ACC
852,908 UART: [kat] ECC-384
3,296,038 UART: [kat] HMAC-384Kdf
3,308,668 UART: [kat] LMS
3,840,450 UART: [kat] --
3,844,518 UART: [cold-reset] ++
3,845,379 UART: [fht] FHT @ 0x50003400
3,857,143 UART: [idev] ++
3,857,815 UART: [idev] CDI.KEYID = 6
3,858,772 UART: [idev] SUBJECT.KEYID = 7
3,859,949 UART: [idev] UDS.KEYID = 0
3,860,876 ready_for_fw is high
3,861,079 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,959,989 UART: [idev] Erasing UDS.KEYID = 0
6,337,230 UART: [idev] Sha1 KeyId Algorithm
6,359,213 UART: [idev] --
6,364,819 UART: [ldev] ++
6,365,496 UART: [ldev] CDI.KEYID = 6
6,366,376 UART: [ldev] SUBJECT.KEYID = 5
6,367,580 UART: [ldev] AUTHORITY.KEYID = 7
6,368,811 UART: [ldev] FE.KEYID = 1
6,380,209 UART: [ldev] Erasing FE.KEYID = 1
8,854,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,619 UART: [ldev] --
10,644,986 UART: [fwproc] Wait for Commands...
10,648,177 UART: [fwproc] Recv command 0x46574c44
10,650,484 UART: [fwproc] Recv'd Img size: 78632 bytes
13,649,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,730,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,846,466 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,174,499 >>> mbox cmd response: success
14,174,975 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
14,177,754 UART: [afmc] ++
14,178,491 UART: [afmc] CDI.KEYID = 6
14,179,707 UART: [afmc] SUBJECT.KEYID = 7
14,181,150 UART: [afmc] AUTHORITY.KEYID = 5
16,683,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,404,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,406,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,421,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,436,565 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,451,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,475,185 UART: [afmc] --
18,478,457 UART: [cold-reset] --
18,482,802 UART: [state] Locking Datavault
18,489,667 UART: [state] Locking PCR0, PCR1 and PCR31
18,491,848 UART: [state] Locking ICCM
18,494,518 UART: [exit] Launching FMC @ 0x40000130
18,503,180 UART:
18,503,424 UART: Running Caliptra FMC ...
18,504,448 UART:
18,504,593 UART: [state] CFI Enabled
18,512,510 UART: [fht] FMC Alias Private Key: 7
20,269,318 UART: [art] Extend RT PCRs Done
20,270,539 UART: [art] Lock RT PCRs Done
20,272,239 UART: [art] Populate DV Done
20,277,914 UART: [fht] FMC Alias Private Key: 7
20,279,527 UART: [art] Derive CDI
20,280,265 UART: [art] Store in in slot 0x4
20,322,913 UART: [art] Derive Key Pair
20,323,905 UART: [art] Store priv key in slot 0x5
22,750,302 UART: [art] Derive Key Pair - Done
22,763,306 UART: [art] Signing Cert with AUTHO
22,764,613 UART: RITY.KEYID = 7
24,470,423 UART: [art] Erasing AUTHORITY.KEYID = 7
24,471,929 UART: [art] PUB.X = 6E2AD5D77CDA5819DF8640EA0C31234245C8E7DFD3AB9D47489FD659C6644E40FC0EE86326D4DA5B8F408F819F51546C
24,479,233 UART: [art] PUB.Y = ABDA0982FDC797FCB38F2A3F543E7D22948CB70A7B592A8E71415AEC6252EA02C666C22BC69D4DC79AD998DDCB9659B9
24,486,524 UART: [art] SIG.R = CFD202087D91225984083419547D02649A6CF6BE4188757F64ADB6A5C9A63962052965A2A0D64DBFDACD9063D3D3BADF
24,493,862 UART: [art] SIG.S = 82BA15D37F3DAD6F177B163F7071092DD8623B82AD1C5C5AE1110A7C1B8AA8277BCD8EDFE2B8D6A681C8F498909F358D
25,472,115 UART: mbox::rt_entry...
25,473,084 UART: ____ _ _ _ ____ _____
25,475,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,477,030 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,478,907 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,480,843 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,482,698 UART: |_|
25,483,579 UART:
25,596,334 UART: [rt] Runtime listening for mailbox commands...
25,598,496 >>> mbox cmd response data (0 bytes)
27,651,081 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,795,736 UART:
27,796,103 UART: Running Caliptra ROM ...
27,797,148 UART:
27,797,375 UART: [state] CFI Enabled
27,813,760 UART: [state] LifecycleState = Unprovisioned
27,815,610 UART: [state] DebugLocked = No
27,817,230 UART: [state] WD Timer not started. Device not locked for debugging
27,821,392 UART: [kat] SHA2-256
28,011,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,022,007 UART: [kat] ++
28,022,534 UART: [kat] sha1
28,033,909 UART: [kat] SHA2-256
28,036,879 UART: [kat] SHA2-384
28,042,015 UART: [kat] SHA2-512-ACC
28,044,598 UART: [kat] ECC-384
30,486,867 UART: [kat] HMAC-384Kdf
30,500,127 UART: [kat] LMS
31,031,702 UART: [kat] --
31,036,285 UART: [update-reset] ++
34,492,790 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,496,604 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,104,318 >>> mbox cmd response: success
35,108,834 UART: [update-reset] Copying MAN_2 To MAN_1
35,143,077 UART: [update-reset Success] --
35,148,338 UART: [state] Locking Datavault
35,152,800 UART: [state] Locking PCR0, PCR1 and PCR31
35,154,993 UART: [state] Locking ICCM
35,157,716 UART: [exit] Launching FMC @ 0x40000130
35,166,383 UART:
35,166,617 UART: Running Caliptra FMC ...
35,167,752 UART:
35,167,923 UART: [state] CFI Enabled
35,212,433 UART: [art] Extend RT PCRs Done
35,213,580 UART: [art] Lock RT PCRs Done
35,214,945 UART: [art] Populate DV Done
35,220,445 UART: [fht] FMC Alias Private Key: 7
35,222,205 UART: [art] Derive CDI
35,222,938 UART: [art] Store in in slot 0x4
35,265,634 UART: [art] Derive Key Pair
35,266,630 UART: [art] Store priv key in slot 0x5
37,693,545 UART: [art] Derive Key Pair - Done
37,706,398 UART: [art] Signing Cert with AUTHO
37,707,746 UART: RITY.KEYID = 7
39,413,879 UART: [art] Erasing AUTHORITY.KEYID = 7
39,415,362 UART: [art] PUB.X = E3705E8162B8E7755CEB7E3BF9E8F3762B6E2ADA321A9C367E9651F436A2DE44156D7831A745161D286A5F76C4BE6FEA
39,422,609 UART: [art] PUB.Y = 97B3B66E2A25E3AE9298AC7664B31F86CC6C0F3D33AA291EE12CC56A5065C0C45D6ABF5B16FE274847FD7EDE63D477F9
39,429,902 UART: [art] SIG.R = D3949A831F7C30E3810C95F36121F4AE26F4DEDC58944E9EBB03B5975003B64434D8F7377AA1D163F82F68BFB61D4497
39,437,316 UART: [art] SIG.S = E9CAF30BC24C70E7714E678F99FFA9F1C72EAE0B10F9ED6D0207589052AE1116BE41449C4C2208ADD40443BCFAE7449E
40,416,261 UART: Caliptra RT
40,416,979 UART: [state] CFI Enabled
40,706,486 UART: [rt] RT failed reset flow
40,707,678 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
3,750,891 ready_for_fw is high
3,751,312 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,176,335 >>> mbox cmd response: success
14,177,157 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,432,700 UART:
18,433,092 UART: Running Caliptra FMC ...
18,434,302 UART:
18,434,463 UART: [state] CFI Enabled
18,442,292 UART: [fht] FMC Alias Private Key: 7
20,198,633 UART: [art] Extend RT PCRs Done
20,199,851 UART: [art] Lock RT PCRs Done
20,201,366 UART: [art] Populate DV Done
20,206,776 UART: [fht] FMC Alias Private Key: 7
20,208,325 UART: [art] Derive CDI
20,209,086 UART: [art] Store in in slot 0x4
20,251,739 UART: [art] Derive Key Pair
20,252,779 UART: [art] Store priv key in slot 0x5
22,679,531 UART: [art] Derive Key Pair - Done
22,692,632 UART: [art] Signing Cert with AUTHO
22,693,926 UART: RITY.KEYID = 7
24,399,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,400,646 UART: [art] PUB.X = 79750972EC451341914B684939B29FD5229F9E9F78522FAAD41F230B604C9FF8372AF5CF805835E96ECCE4839B893B5E
24,407,947 UART: [art] PUB.Y = 0EA68E8EA895C0667C44450A49E4E885568FD64E7AA04B274693054FCA5C1780421C3B619DC1ADC815DF59F368D26570
24,415,156 UART: [art] SIG.R = FF5AB19421C673326A540BADC27BD8076D24B893CA51A69C628D1EA55B3D3E05060FD3F86F8B9F9CEB5040FA9D6104F9
24,422,610 UART: [art] SIG.S = F3A2D7382DCF4CA1000E2F3DBD01C6A6A42A182E283144AE4DF426B4BAB437068A3F483E19D9D1A874EAC8BA590CD0CC
25,400,854 UART: mbox::rt_entry...
25,401,810 UART: ____ _ _ _ ____ _____
25,403,737 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,405,741 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,407,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,409,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,411,555 UART: |_|
25,412,387 UART:
25,525,096 UART: [rt] Runtime listening for mailbox commands...
25,527,266 >>> mbox cmd response data (0 bytes)
27,579,822 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,313,658 >>> mbox cmd response: success
35,349,052 UART:
35,349,364 UART: Running Caliptra FMC ...
35,350,408 UART:
35,350,558 UART: [state] CFI Enabled
35,394,324 UART: [art] Extend RT PCRs Done
35,395,523 UART: [art] Lock RT PCRs Done
35,396,734 UART: [art] Populate DV Done
35,402,088 UART: [fht] FMC Alias Private Key: 7
35,403,567 UART: [art] Derive CDI
35,404,295 UART: [art] Store in in slot 0x4
35,447,041 UART: [art] Derive Key Pair
35,448,056 UART: [art] Store priv key in slot 0x5
37,875,246 UART: [art] Derive Key Pair - Done
37,888,194 UART: [art] Signing Cert with AUTHO
37,889,498 UART: RITY.KEYID = 7
39,594,635 UART: [art] Erasing AUTHORITY.KEYID = 7
39,596,118 UART: [art] PUB.X = DE50382C3134CCF78FC671727CE40C8CCCC053C9E2DE989036265926F8BAC5EE768E1D2FC68DD796C947CC02564868CA
39,603,423 UART: [art] PUB.Y = 85F0B07EBD47BEDA38AF79B21A017A0B08DAC4B0950FB9570C429A12DB6E079BA25D7C6A92D8E2DB272E1F2BDA63061A
39,610,807 UART: [art] SIG.R = C4B85AED4E7FE8ACE0657DCC508341ACE2CB1DCE9382A03F503660118ACD96882AA42B748F7CB5426E8CD6DE833EA155
39,618,166 UART: [art] SIG.S = 4D44C7C8E93714A41A8344768ACB6F8F0BB2DEDDEEF9C07B50D714BD954467A2BA02C7BAA868F5CE7DA64E984E5FD6A5
40,596,794 UART: Caliptra RT
40,597,503 UART: [state] CFI Enabled
40,880,535 UART: [rt] RT failed reset flow
40,881,734 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,415 UART: [kat] SHA2-256
882,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,461 UART: [kat] ++
886,613 UART: [kat] sha1
890,981 UART: [kat] SHA2-256
892,919 UART: [kat] SHA2-384
895,684 UART: [kat] SHA2-512-ACC
897,585 UART: [kat] ECC-384
903,074 UART: [kat] HMAC-384Kdf
907,576 UART: [kat] LMS
1,475,772 UART: [kat] --
1,476,721 UART: [cold-reset] ++
1,477,293 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 ready_for_fw is high
1,481,197 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,952 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,088 UART: [idev] --
1,515,097 UART: [ldev] ++
1,515,265 UART: [ldev] CDI.KEYID = 6
1,515,628 UART: [ldev] SUBJECT.KEYID = 5
1,516,054 UART: [ldev] AUTHORITY.KEYID = 7
1,516,517 UART: [ldev] FE.KEYID = 1
1,521,839 UART: [ldev] Erasing FE.KEYID = 1
1,547,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,222 UART: [ldev] --
1,586,639 UART: [fwproc] Waiting for Commands...
1,587,368 UART: [fwproc] Received command 0x46574c44
1,588,159 UART: [fwproc] Received Image of size 78632 bytes
2,476,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,826 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,615,617 >>> mbox cmd response: success
2,615,617 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,616,667 UART: [afmc] ++
2,616,835 UART: [afmc] CDI.KEYID = 6
2,617,197 UART: [afmc] SUBJECT.KEYID = 7
2,617,622 UART: [afmc] AUTHORITY.KEYID = 5
2,653,281 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,032 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,722 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,635 UART: [afmc] --
2,696,663 UART: [cold-reset] --
2,697,671 UART: [state] Locking Datavault
2,698,868 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,472 UART: [state] Locking ICCM
2,699,980 UART: [exit] Launching FMC @ 0x40000130
2,705,309 UART:
2,705,325 UART: Running Caliptra FMC ...
2,705,733 UART:
2,705,787 UART: [state] CFI Enabled
2,715,896 UART: [fht] FMC Alias Private Key: 7
2,823,713 UART: [art] Extend RT PCRs Done
2,824,141 UART: [art] Lock RT PCRs Done
2,825,719 UART: [art] Populate DV Done
2,834,134 UART: [fht] FMC Alias Private Key: 7
2,835,292 UART: [art] Derive CDI
2,835,572 UART: [art] Store in in slot 0x4
2,921,071 UART: [art] Derive Key Pair
2,921,431 UART: [art] Store priv key in slot 0x5
2,934,847 UART: [art] Derive Key Pair - Done
2,949,071 UART: [art] Signing Cert with AUTHO
2,949,551 UART: RITY.KEYID = 7
2,964,655 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,420 UART: [art] PUB.X = 8AC24F273693BB9BAA652EB30029956DF847C563CB526C58674B699B2C7DADF2F1DE622CFA81E1E09598333718CB579C
2,972,174 UART: [art] PUB.Y = EC73B2C651EEC6B8C82C275FB787732881D3E638F2902A3C76A014A68BF884BF31066F6CAFF3264C3DF53368983E5A85
2,979,125 UART: [art] SIG.R = 12644E3507B8C9CC9E6B30F83A589AED07AA3317500FEB300EAA6A225CD1932E5194E3C254A810E61194FD8454A11F7E
2,985,887 UART: [art] SIG.S = FC8EAA21A9D09ADBF1427E942AF151D780F13F5D91612B6578F971190FFAEB38F4D5AC984FDC70028D635E4C0F56F7B6
3,010,079 UART: mbox::rt_entry...
3,010,451 UART: ____ _ _ _ ____ _____
3,011,235 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,035 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,803 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,571 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,339 UART: |_|
3,014,651 UART:
3,120,349 UART: [rt] Runtime listening for mailbox commands...
3,121,490 >>> mbox cmd response data (0 bytes)
3,121,491 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,121,606 UART:
3,121,622 UART: Running Caliptra ROM ...
3,122,030 UART:
3,122,084 UART: [state] CFI Enabled
3,124,854 UART: [state] LifecycleState = Unprovisioned
3,125,509 UART: [state] DebugLocked = No
3,126,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,127,624 UART: [kat] SHA2-256
3,921,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,925,670 UART: [kat] ++
3,925,822 UART: [kat] sha1
3,930,044 UART: [kat] SHA2-256
3,931,982 UART: [kat] SHA2-384
3,934,735 UART: [kat] SHA2-512-ACC
3,936,635 UART: [kat] ECC-384
3,941,980 UART: [kat] HMAC-384Kdf
3,946,818 UART: [kat] LMS
4,515,014 UART: [kat] --
4,515,823 UART: [update-reset] ++
5,848,998 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,850,110 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,000,028 >>> mbox cmd response: success
6,000,269 UART: [update-reset] Copying MAN_2 To MAN_1
6,008,283 UART: [update-reset Success] --
6,009,238 UART: [state] Locking Datavault
6,009,968 UART: [state] Locking PCR0, PCR1 and PCR31
6,010,572 UART: [state] Locking ICCM
6,011,160 UART: [exit] Launching FMC @ 0x40000130
6,016,489 UART:
6,016,505 UART: Running Caliptra FMC ...
6,016,913 UART:
6,016,967 UART: [state] CFI Enabled
6,106,548 UART: [art] Extend RT PCRs Done
6,106,976 UART: [art] Lock RT PCRs Done
6,108,239 UART: [art] Populate DV Done
6,116,238 UART: [fht] FMC Alias Private Key: 7
6,117,420 UART: [art] Derive CDI
6,117,700 UART: [art] Store in in slot 0x4
6,203,655 UART: [art] Derive Key Pair
6,204,015 UART: [art] Store priv key in slot 0x5
6,216,777 UART: [art] Derive Key Pair - Done
6,231,346 UART: [art] Signing Cert with AUTHO
6,231,826 UART: RITY.KEYID = 7
6,247,080 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,845 UART: [art] PUB.X = 8DE9CDE0831EC11EFBEF0F3252138971D030320EB97685F80E75329ACC873495BC57A52F228EAFF4A347C0C5240F4353
6,254,607 UART: [art] PUB.Y = 9D3ACEAD545554C0547EFA3C93823DBA3F0CF547892BFD8E7DB8F21BEF7C8B38A523C7AA18DB704B5CD035D4884D54DE
6,261,576 UART: [art] SIG.R = 61F0E232043F80334A5643F05D643D0DC07AC75D4FF0BE25A47D77517D056592A50AC36FDA03DC5251A96B9C894DB397
6,268,333 UART: [art] SIG.S = 5EFD2FBE88E6FB27F8A344CD0EC3288C9E6C99FCB7E302EA26D57AFE749D6B19CFC39A32032BB5EC51E32B41D7C0F035
6,292,065 UART: Caliptra RT
6,292,319 UART: [state] CFI Enabled
6,576,694 UART: [rt] RT failed reset flow
6,577,125 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,625 ready_for_fw is high
1,362,625 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,465,077 >>> mbox cmd response: success
2,465,077 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,526,457 UART:
2,526,473 UART: Running Caliptra FMC ...
2,526,881 UART:
2,526,935 UART: [state] CFI Enabled
2,537,298 UART: [fht] FMC Alias Private Key: 7
2,645,171 UART: [art] Extend RT PCRs Done
2,645,599 UART: [art] Lock RT PCRs Done
2,646,977 UART: [art] Populate DV Done
2,655,406 UART: [fht] FMC Alias Private Key: 7
2,656,450 UART: [art] Derive CDI
2,656,730 UART: [art] Store in in slot 0x4
2,742,091 UART: [art] Derive Key Pair
2,742,451 UART: [art] Store priv key in slot 0x5
2,756,071 UART: [art] Derive Key Pair - Done
2,770,835 UART: [art] Signing Cert with AUTHO
2,771,315 UART: RITY.KEYID = 7
2,786,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,174 UART: [art] PUB.X = 262314BB2A0C86FE1AF62D726974A72E586C5B40C12B9FCCBF23F36351164D44DA495373275368372ADE79141FA136E2
2,793,939 UART: [art] PUB.Y = F4D5BB460FA641E93D2EE442A4704073C0E576ED445E5556128855A2EB7D3728D001685FFB2B4581FFC844981855DB6C
2,800,883 UART: [art] SIG.R = FED7EA74E4A5D0EFE9800BC179D9291F8CA20E9FA54B764E7E24FD53087FC1B55880A8909286E1FB06B2053305666C63
2,807,641 UART: [art] SIG.S = 9BDFFF16FCD8FAA4133556B3E89BC729735C1C895BB4930466C8A0D5F2883233630D602F33F17821A6C12AC9A2CB11AE
2,831,696 UART: mbox::rt_entry...
2,832,068 UART: ____ _ _ _ ____ _____
2,832,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,652 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,420 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,188 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,956 UART: |_|
2,836,268 UART:
2,943,353 UART: [rt] Runtime listening for mailbox commands...
2,944,494 >>> mbox cmd response data (0 bytes)
2,944,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,706,792 >>> mbox cmd response: success
5,719,957 UART:
5,719,973 UART: Running Caliptra FMC ...
5,720,381 UART:
5,720,435 UART: [state] CFI Enabled
5,809,376 UART: [art] Extend RT PCRs Done
5,809,804 UART: [art] Lock RT PCRs Done
5,811,057 UART: [art] Populate DV Done
5,819,236 UART: [fht] FMC Alias Private Key: 7
5,820,390 UART: [art] Derive CDI
5,820,670 UART: [art] Store in in slot 0x4
5,906,171 UART: [art] Derive Key Pair
5,906,531 UART: [art] Store priv key in slot 0x5
5,919,609 UART: [art] Derive Key Pair - Done
5,934,137 UART: [art] Signing Cert with AUTHO
5,934,617 UART: RITY.KEYID = 7
5,949,859 UART: [art] Erasing AUTHORITY.KEYID = 7
5,950,624 UART: [art] PUB.X = 31DCAF2CE77ED6DB955AAED413DE0058CE580421BA0C1CD6C9627B3678DB9518B9DD981477D4523265A7D277E8902177
5,957,372 UART: [art] PUB.Y = EB0D823CBB431723CDA6161B6BD0111E770AC8C8C1D96F471A6713B51938BEC33AEBC12C871B50B7E06BFE4B4CBD1E99
5,964,334 UART: [art] SIG.R = BD88AC32D9D89DAC34E55CAB14DE150F1DECDBC287A26970B925C98398938F4E2B6ECC21DF87EB9FE0970DEF6B958536
5,971,118 UART: [art] SIG.S = 28D08A69B0480B756CCB8AC6FB9F34475AF5FCEEFFE7FB9AC90B4FF6FB59CA1F3A839B50914344F32124DD0F0B5409C9
5,995,128 UART: Caliptra RT
5,995,382 UART: [state] CFI Enabled
6,278,106 UART: [rt] RT failed reset flow
6,278,537 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
894,909 UART: [kat] SHA2-512-ACC
896,810 UART: [kat] ECC-384
902,139 UART: [kat] HMAC-384Kdf
906,797 UART: [kat] LMS
1,474,993 UART: [kat] --
1,475,924 UART: [cold-reset] ++
1,476,466 UART: [fht] Storing FHT @ 0x50003400
1,479,475 UART: [idev] ++
1,479,643 UART: [idev] CDI.KEYID = 6
1,480,003 UART: [idev] SUBJECT.KEYID = 7
1,480,427 UART: [idev] UDS.KEYID = 0
1,480,772 ready_for_fw is high
1,480,772 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,091 UART: [idev] Erasing UDS.KEYID = 0
1,504,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,983 UART: [idev] --
1,513,810 UART: [ldev] ++
1,513,978 UART: [ldev] CDI.KEYID = 6
1,514,341 UART: [ldev] SUBJECT.KEYID = 5
1,514,767 UART: [ldev] AUTHORITY.KEYID = 7
1,515,230 UART: [ldev] FE.KEYID = 1
1,520,656 UART: [ldev] Erasing FE.KEYID = 1
1,545,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,495 UART: [ldev] --
1,584,812 UART: [fwproc] Waiting for Commands...
1,585,509 UART: [fwproc] Received command 0x46574c44
1,586,300 UART: [fwproc] Received Image of size 78632 bytes
2,474,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,613,892 >>> mbox cmd response: success
2,613,892 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,614,986 UART: [afmc] ++
2,615,154 UART: [afmc] CDI.KEYID = 6
2,615,516 UART: [afmc] SUBJECT.KEYID = 7
2,615,941 UART: [afmc] AUTHORITY.KEYID = 5
2,650,388 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,950 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,730 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,343 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,033 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,796 UART: [afmc] --
2,693,852 UART: [cold-reset] --
2,694,720 UART: [state] Locking Datavault
2,695,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,537 UART: [state] Locking ICCM
2,696,957 UART: [exit] Launching FMC @ 0x40000130
2,702,286 UART:
2,702,302 UART: Running Caliptra FMC ...
2,702,710 UART:
2,702,853 UART: [state] CFI Enabled
2,713,412 UART: [fht] FMC Alias Private Key: 7
2,820,969 UART: [art] Extend RT PCRs Done
2,821,397 UART: [art] Lock RT PCRs Done
2,822,859 UART: [art] Populate DV Done
2,831,164 UART: [fht] FMC Alias Private Key: 7
2,832,270 UART: [art] Derive CDI
2,832,550 UART: [art] Store in in slot 0x4
2,918,255 UART: [art] Derive Key Pair
2,918,615 UART: [art] Store priv key in slot 0x5
2,931,403 UART: [art] Derive Key Pair - Done
2,946,178 UART: [art] Signing Cert with AUTHO
2,946,658 UART: RITY.KEYID = 7
2,961,666 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,431 UART: [art] PUB.X = BEFA73472B22401A804994EFF78A05A75EF89F96683ACA14E85D06F069E78F740A1F7CE2D8E3238731B911D76B276DBF
2,969,198 UART: [art] PUB.Y = D094BF507F47658F2A382D57D8569C75E4B0CCCE93A723D247484EA952D28F1BB21A8722C5C59B17C99515405DC17C6B
2,976,150 UART: [art] SIG.R = 11A2804C2504FC70EC3DB4FD194F3E83FB398281BDB1C9C60EA862372111FCA3AFE77E7FAF2160B7F5E05467FDEAA44F
2,982,932 UART: [art] SIG.S = 07E6BE08FEAD938FE201C44DB0928593BD98E5A63A05E238F44DE827875F4E24212373FE1A709DFC25FFD7A9EED0024B
3,006,646 UART: mbox::rt_entry...
3,007,018 UART: ____ _ _ _ ____ _____
3,007,802 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,008,602 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,009,370 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,010,906 UART: |_|
3,011,218 UART:
3,118,391 UART: [rt] Runtime listening for mailbox commands...
3,119,532 >>> mbox cmd response data (0 bytes)
3,119,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,119,648 UART:
3,119,664 UART: Running Caliptra ROM ...
3,120,072 UART:
3,120,213 UART: [state] CFI Enabled
3,123,233 UART: [state] LifecycleState = Unprovisioned
3,123,888 UART: [state] DebugLocked = No
3,124,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,125,931 UART: [kat] SHA2-256
3,919,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,923,977 UART: [kat] ++
3,924,129 UART: [kat] sha1
3,928,375 UART: [kat] SHA2-256
3,930,313 UART: [kat] SHA2-384
3,933,048 UART: [kat] SHA2-512-ACC
3,934,948 UART: [kat] ECC-384
3,940,549 UART: [kat] HMAC-384Kdf
3,945,103 UART: [kat] LMS
4,513,299 UART: [kat] --
4,514,198 UART: [update-reset] ++
5,848,637 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,849,697 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
5,999,615 >>> mbox cmd response: success
5,999,920 UART: [update-reset] Copying MAN_2 To MAN_1
6,007,934 UART: [update-reset Success] --
6,008,747 UART: [state] Locking Datavault
6,009,603 UART: [state] Locking PCR0, PCR1 and PCR31
6,010,207 UART: [state] Locking ICCM
6,010,789 UART: [exit] Launching FMC @ 0x40000130
6,016,118 UART:
6,016,134 UART: Running Caliptra FMC ...
6,016,542 UART:
6,016,685 UART: [state] CFI Enabled
6,105,490 UART: [art] Extend RT PCRs Done
6,105,918 UART: [art] Lock RT PCRs Done
6,107,261 UART: [art] Populate DV Done
6,115,664 UART: [fht] FMC Alias Private Key: 7
6,116,844 UART: [art] Derive CDI
6,117,124 UART: [art] Store in in slot 0x4
6,202,739 UART: [art] Derive Key Pair
6,203,099 UART: [art] Store priv key in slot 0x5
6,216,629 UART: [art] Derive Key Pair - Done
6,231,221 UART: [art] Signing Cert with AUTHO
6,231,701 UART: RITY.KEYID = 7
6,247,541 UART: [art] Erasing AUTHORITY.KEYID = 7
6,248,306 UART: [art] PUB.X = 969B5AB52159212767518C4EB7ED1D9CC27179AB621E16422FBE177B3B47256A3E26CCC4587A9E92F7D0BFA64E52555C
6,255,080 UART: [art] PUB.Y = 6C9A33B438AF277B6B6C849A908920B624803AFB0C331038553F14BD58C0193E313132E33DF7130E2BA2EC9491F0B077
6,262,020 UART: [art] SIG.R = 63B7A2B527EF599F88896588F22B76C5E0187BCF3C20E97C8EF0F956993131870D4AD187D121FC0365E3ACBA2CC7F1BD
6,268,792 UART: [art] SIG.S = 5060DD5DF3344C02D90FC22C39C9E992ABC9FC6C4FF10CCC6E90B3CC17FA9C391C2B19E9ED9719463CDE5F3ED36560A7
6,292,230 UART: Caliptra RT
6,292,576 UART: [state] CFI Enabled
6,574,051 UART: [rt] RT failed reset flow
6,574,482 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,138 ready_for_fw is high
1,363,138 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,467,196 >>> mbox cmd response: success
2,467,196 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,528,380 UART:
2,528,396 UART: Running Caliptra FMC ...
2,528,804 UART:
2,528,947 UART: [state] CFI Enabled
2,539,540 UART: [fht] FMC Alias Private Key: 7
2,647,781 UART: [art] Extend RT PCRs Done
2,648,209 UART: [art] Lock RT PCRs Done
2,649,535 UART: [art] Populate DV Done
2,657,910 UART: [fht] FMC Alias Private Key: 7
2,658,988 UART: [art] Derive CDI
2,659,268 UART: [art] Store in in slot 0x4
2,745,057 UART: [art] Derive Key Pair
2,745,417 UART: [art] Store priv key in slot 0x5
2,758,645 UART: [art] Derive Key Pair - Done
2,773,220 UART: [art] Signing Cert with AUTHO
2,773,700 UART: RITY.KEYID = 7
2,788,530 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,295 UART: [art] PUB.X = F9F31DB9041E31245F675C59D59648CD731927040D4D37D540AAE6880C531679BAC34618ECC2D23A7A1B608107479873
2,796,042 UART: [art] PUB.Y = E2148ECA4494AD0F2BB36B74CAFC3CD389B09013453D392E99D4BA21793A37EDC26CCDFDB75F6E1EE8A4929807B3DC3D
2,803,006 UART: [art] SIG.R = FBB0CD2A047F8D0EA78BEDBCD838036B34FA9AD5206771F0080028FE0AC262D3B0EC3FBA084DC667E454E304FFC2C080
2,809,753 UART: [art] SIG.S = 5929EA732E534CE0FE640A9B5B5C0C7D71C5B5726F7F8AED9D5C9EDD4DCEC616357035DAE978B3807E3B862EB2607CF0
2,833,402 UART: mbox::rt_entry...
2,833,774 UART: ____ _ _ _ ____ _____
2,834,558 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,358 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,126 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,894 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,662 UART: |_|
2,837,974 UART:
2,945,138 UART: [rt] Runtime listening for mailbox commands...
2,946,279 >>> mbox cmd response data (0 bytes)
2,946,280 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,706,354 >>> mbox cmd response: success
5,719,643 UART:
5,719,659 UART: Running Caliptra FMC ...
5,720,067 UART:
5,720,210 UART: [state] CFI Enabled
5,809,123 UART: [art] Extend RT PCRs Done
5,809,551 UART: [art] Lock RT PCRs Done
5,811,100 UART: [art] Populate DV Done
5,819,443 UART: [fht] FMC Alias Private Key: 7
5,820,401 UART: [art] Derive CDI
5,820,681 UART: [art] Store in in slot 0x4
5,906,268 UART: [art] Derive Key Pair
5,906,628 UART: [art] Store priv key in slot 0x5
5,920,292 UART: [art] Derive Key Pair - Done
5,935,019 UART: [art] Signing Cert with AUTHO
5,935,499 UART: RITY.KEYID = 7
5,950,741 UART: [art] Erasing AUTHORITY.KEYID = 7
5,951,506 UART: [art] PUB.X = 9E1E79869AC419B9D360D11C5614CD185461EA91BDFC0BFA1F37A283FC0318E8936D3AEE961A595D95C41F050598D539
5,958,268 UART: [art] PUB.Y = B513AA8E71947B6D40A5689849AB5152D090223910DD14826978A5164239CFC55FA237A4498E38481144B559A8C59399
5,965,202 UART: [art] SIG.R = D3ECF6043D3A9E4B861876BC4F0A659D42BD747A35345F919B08887A30EEE02184CBBC37A6000FBF94DE7CA5158BF32E
5,971,950 UART: [art] SIG.S = 8B87F2C9A8584B8879D546A3B9F5EC3D64F3A8AA850DED08AE09C9BA52EE286FA7241E8A06946783D369DC45A6FB6BD3
5,996,511 UART: Caliptra RT
5,996,857 UART: [state] CFI Enabled
6,276,988 UART: [rt] RT failed reset flow
6,277,419 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
893,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,713 UART: [kat] ++
897,865 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,236 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,171,653 UART: [cold-reset] ++
1,172,047 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 ready_for_fw is high
1,176,103 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,059 UART: [idev] --
1,210,063 UART: [ldev] ++
1,210,231 UART: [ldev] CDI.KEYID = 6
1,210,594 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,403 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,282,948 UART: [fwproc] Recv command 0x46574c44
1,283,676 UART: [fwproc] Recv'd Img size: 78632 bytes
2,170,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,357 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,309,706 >>> mbox cmd response: success
2,309,706 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,310,736 UART: [afmc] ++
2,310,904 UART: [afmc] CDI.KEYID = 6
2,311,266 UART: [afmc] SUBJECT.KEYID = 7
2,311,691 UART: [afmc] AUTHORITY.KEYID = 5
2,347,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,615 UART: [afmc] --
2,390,679 UART: [cold-reset] --
2,391,523 UART: [state] Locking Datavault
2,392,800 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,404 UART: [state] Locking ICCM
2,393,924 UART: [exit] Launching FMC @ 0x40000130
2,399,253 UART:
2,399,269 UART: Running Caliptra FMC ...
2,399,677 UART:
2,399,731 UART: [state] CFI Enabled
2,410,344 UART: [fht] FMC Alias Private Key: 7
2,518,467 UART: [art] Extend RT PCRs Done
2,518,895 UART: [art] Lock RT PCRs Done
2,520,181 UART: [art] Populate DV Done
2,528,506 UART: [fht] FMC Alias Private Key: 7
2,529,438 UART: [art] Derive CDI
2,529,718 UART: [art] Store in in slot 0x4
2,615,213 UART: [art] Derive Key Pair
2,615,573 UART: [art] Store priv key in slot 0x5
2,628,563 UART: [art] Derive Key Pair - Done
2,643,331 UART: [art] Signing Cert with AUTHO
2,643,811 UART: RITY.KEYID = 7
2,659,157 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,922 UART: [art] PUB.X = E48D49C468D935D614006426F1485453793A83CF0FDFDC2F2DEE0CAE28E6D2EF8088B5588FFE262E64777B1802EFCCAA
2,666,673 UART: [art] PUB.Y = 4064D98AA954C783981720678F1F8A687B5069BF8354E794399252E702FD6C27A2C5408BE98F59B16CC3F6968E4829A2
2,673,610 UART: [art] SIG.R = 7B740355FB37A44FC6B16C492EB2A1CA82A88D365DCBFB9F468D2338119E1A99089B89BAFA168772ED9020AA38B1AD41
2,680,384 UART: [art] SIG.S = 74E82CD026782BD343B5BDA1EC20444C2CB1D766AD2E9E1AA0E0FC32C92815F8CE4B2FF71D05453341ED61669503584F
2,704,329 UART: mbox::rt_entry...
2,704,701 UART: ____ _ _ _ ____ _____
2,705,485 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,285 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,053 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,821 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,589 UART: |_|
2,708,901 UART:
2,813,801 UART: [rt] Runtime listening for mailbox commands...
2,814,942 >>> mbox cmd response data (0 bytes)
2,814,943 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,815,055 UART:
2,815,071 UART: Running Caliptra ROM ...
2,815,479 UART:
2,815,534 UART: [state] CFI Enabled
2,818,022 UART: [state] LifecycleState = Unprovisioned
2,818,677 UART: [state] DebugLocked = No
2,819,275 UART: [state] WD Timer not started. Device not locked for debugging
2,820,501 UART: [kat] SHA2-256
3,626,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,630,276 UART: [kat] ++
3,630,428 UART: [kat] sha1
3,634,502 UART: [kat] SHA2-256
3,636,442 UART: [kat] SHA2-384
3,639,081 UART: [kat] SHA2-512-ACC
3,640,981 UART: [kat] ECC-384
3,650,620 UART: [kat] HMAC-384Kdf
3,655,386 UART: [kat] LMS
3,903,714 UART: [kat] --
3,904,816 UART: [update-reset] ++
5,218,957 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,220,102 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,369,968 >>> mbox cmd response: success
5,370,165 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,179 UART: [update-reset Success] --
5,379,186 UART: [state] Locking Datavault
5,379,896 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,500 UART: [state] Locking ICCM
5,380,960 UART: [exit] Launching FMC @ 0x40000130
5,386,289 UART:
5,386,305 UART: Running Caliptra FMC ...
5,386,713 UART:
5,386,767 UART: [state] CFI Enabled
5,476,178 UART: [art] Extend RT PCRs Done
5,476,606 UART: [art] Lock RT PCRs Done
5,477,899 UART: [art] Populate DV Done
5,486,242 UART: [fht] FMC Alias Private Key: 7
5,487,210 UART: [art] Derive CDI
5,487,490 UART: [art] Store in in slot 0x4
5,572,983 UART: [art] Derive Key Pair
5,573,343 UART: [art] Store priv key in slot 0x5
5,586,917 UART: [art] Derive Key Pair - Done
5,602,137 UART: [art] Signing Cert with AUTHO
5,602,617 UART: RITY.KEYID = 7
5,618,099 UART: [art] Erasing AUTHORITY.KEYID = 7
5,618,864 UART: [art] PUB.X = D91EBE9F7640EB486DBC67A74B8D7BC2CE83074B7DB166304578A0E6D0903551E5D6A7E0D86C2EED0CE2DD1806CD16AB
5,625,643 UART: [art] PUB.Y = EE123C92148B43A5A5713BFD57063D6B9EA56618845F423A2F540568277BEE55B9CA774185685452D445EA168CBE8552
5,632,581 UART: [art] SIG.R = 65A86DEA71760AE9A9D97DDF6C5CB211772ED2A37D8EC1DD12AB19782AE4271AA71BB854D61D327EDC1BC58D4D119144
5,639,364 UART: [art] SIG.S = C3ACEE821B2BCD1483B7357E03ED8D58B95636A98D90FEC45801EFE92036F2879F56A92074DD3CEDA14DE8734A55B5F4
5,663,247 UART: Caliptra RT
5,663,501 UART: [state] CFI Enabled
5,942,747 UART: [rt] RT failed reset flow
5,943,178 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,169 ready_for_fw is high
1,060,169 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,162,991 >>> mbox cmd response: success
2,162,991 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,225,317 UART:
2,225,333 UART: Running Caliptra FMC ...
2,225,741 UART:
2,225,795 UART: [state] CFI Enabled
2,236,330 UART: [fht] FMC Alias Private Key: 7
2,344,573 UART: [art] Extend RT PCRs Done
2,345,001 UART: [art] Lock RT PCRs Done
2,346,621 UART: [art] Populate DV Done
2,354,910 UART: [fht] FMC Alias Private Key: 7
2,355,956 UART: [art] Derive CDI
2,356,236 UART: [art] Store in in slot 0x4
2,441,991 UART: [art] Derive Key Pair
2,442,351 UART: [art] Store priv key in slot 0x5
2,455,375 UART: [art] Derive Key Pair - Done
2,470,460 UART: [art] Signing Cert with AUTHO
2,470,940 UART: RITY.KEYID = 7
2,485,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,715 UART: [art] PUB.X = 4935A5EC51AC0BDA7C722E091E50D55C0331CB79B1C89032ED9EF31095F02788EBD44165CC6FEDAB504D6AFADBC710AF
2,493,496 UART: [art] PUB.Y = 2F89B34E333C8413314BC4FDF6E0815C888A09E9B30613965C70331CC4BB3D7BFDFC30612B33C5DA72B89B29A2FACF16
2,500,450 UART: [art] SIG.R = E8B6EC4E8F0D54607895D0AEF028623DDECF9262ABCA96DDBC22266F770772C18750CC1BD508CBF15F33422D1202F251
2,507,218 UART: [art] SIG.S = 3EA5F11BD99A76EECDA8BFE622B412B309D4F5F21699594ECCA8731C75286D224A967488FDCCFF91DD82615C6F05B9B5
2,530,187 UART: mbox::rt_entry...
2,530,559 UART: ____ _ _ _ ____ _____
2,531,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,447 UART: |_|
2,534,759 UART:
2,640,775 UART: [rt] Runtime listening for mailbox commands...
2,641,916 >>> mbox cmd response data (0 bytes)
2,641,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,078,374 >>> mbox cmd response: success
5,091,614 UART:
5,091,630 UART: Running Caliptra FMC ...
5,092,038 UART:
5,092,092 UART: [state] CFI Enabled
5,181,693 UART: [art] Extend RT PCRs Done
5,182,121 UART: [art] Lock RT PCRs Done
5,183,326 UART: [art] Populate DV Done
5,191,503 UART: [fht] FMC Alias Private Key: 7
5,192,643 UART: [art] Derive CDI
5,192,923 UART: [art] Store in in slot 0x4
5,278,712 UART: [art] Derive Key Pair
5,279,072 UART: [art] Store priv key in slot 0x5
5,292,180 UART: [art] Derive Key Pair - Done
5,306,893 UART: [art] Signing Cert with AUTHO
5,307,373 UART: RITY.KEYID = 7
5,322,259 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,024 UART: [art] PUB.X = 365CD28A669AC3A9930F922E6C22757E801D1448A1B54186E85D7FD3AD43EE50CF55528D55F7C2BEC76351C9F54130A2
5,329,793 UART: [art] PUB.Y = 4959E4FAF11B5472B7C5B21938767A4E77644E56CFB3088E5793A82324D7B1783FD04A8EB8492BE7C38728EE1710F806
5,336,733 UART: [art] SIG.R = 598DD6428AAD2270B24E22DD89A9AFAEF9A0AF39E13EC3F4474432FE0CFD3228A31D3B2DBD3541D2442F3AFCB565F97D
5,343,520 UART: [art] SIG.S = 237086F099F4D1C92FD3F08B869A89D39BF4CF249C7048960EEC460378F917000DA834D36023F8D6EFD2A3DB78C27C1B
5,366,642 UART: Caliptra RT
5,366,896 UART: [state] CFI Enabled
5,650,472 UART: [rt] RT failed reset flow
5,650,903 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,794 UART: [kat] SHA2-256
903,734 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,696 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 ready_for_fw is high
1,176,632 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,501 UART: [idev] Erasing UDS.KEYID = 0
1,201,190 UART: [idev] Sha1 KeyId Algorithm
1,209,506 UART: [idev] --
1,210,570 UART: [ldev] ++
1,210,738 UART: [ldev] CDI.KEYID = 6
1,211,101 UART: [ldev] SUBJECT.KEYID = 5
1,211,527 UART: [ldev] AUTHORITY.KEYID = 7
1,211,990 UART: [ldev] FE.KEYID = 1
1,217,208 UART: [ldev] Erasing FE.KEYID = 1
1,243,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,656 UART: [ldev] --
1,283,025 UART: [fwproc] Wait for Commands...
1,283,741 UART: [fwproc] Recv command 0x46574c44
1,284,469 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,152 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,513 >>> mbox cmd response: success
2,310,513 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,311,649 UART: [afmc] ++
2,311,817 UART: [afmc] CDI.KEYID = 6
2,312,179 UART: [afmc] SUBJECT.KEYID = 7
2,312,604 UART: [afmc] AUTHORITY.KEYID = 5
2,348,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,304 UART: [afmc] --
2,391,292 UART: [cold-reset] --
2,392,048 UART: [state] Locking Datavault
2,393,267 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,871 UART: [state] Locking ICCM
2,394,315 UART: [exit] Launching FMC @ 0x40000130
2,399,644 UART:
2,399,660 UART: Running Caliptra FMC ...
2,400,068 UART:
2,400,211 UART: [state] CFI Enabled
2,410,884 UART: [fht] FMC Alias Private Key: 7
2,518,291 UART: [art] Extend RT PCRs Done
2,518,719 UART: [art] Lock RT PCRs Done
2,520,589 UART: [art] Populate DV Done
2,528,658 UART: [fht] FMC Alias Private Key: 7
2,529,824 UART: [art] Derive CDI
2,530,104 UART: [art] Store in in slot 0x4
2,616,101 UART: [art] Derive Key Pair
2,616,461 UART: [art] Store priv key in slot 0x5
2,630,283 UART: [art] Derive Key Pair - Done
2,644,943 UART: [art] Signing Cert with AUTHO
2,645,423 UART: RITY.KEYID = 7
2,660,453 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,218 UART: [art] PUB.X = D1E2555D6E8B2610AD583DFDA51DE7D0CC47DA941D8FCF3BF47EB363E3E7B1569E98CCB2F8C9841ECF80B9771F336012
2,668,006 UART: [art] PUB.Y = 6840A479097FF0D22C6D880872F1878243DFF4FBA6979696DD2469E60630726108ADAAA8DE6F84A5850B6367D2B81F3B
2,674,939 UART: [art] SIG.R = 6AC7267304EFFE68D21D8DE8C5687B0329651138B604942B5EB1465C786EA0AAA826D28FD2846BD459D14E94AE484052
2,681,700 UART: [art] SIG.S = 992542C05C3BCD9B0ACCDD0766A5E5E50EFA458D8B94E0CA30D22B74D9AD83C3279413B39224AB4B0C4607A708B79EDF
2,705,537 UART: mbox::rt_entry...
2,705,909 UART: ____ _ _ _ ____ _____
2,706,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,493 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,261 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,029 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,797 UART: |_|
2,710,109 UART:
2,816,813 UART: [rt] Runtime listening for mailbox commands...
2,817,954 >>> mbox cmd response data (0 bytes)
2,817,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,818,067 UART:
2,818,083 UART: Running Caliptra ROM ...
2,818,491 UART:
2,818,633 UART: [state] CFI Enabled
2,821,535 UART: [state] LifecycleState = Unprovisioned
2,822,190 UART: [state] DebugLocked = No
2,822,718 UART: [state] WD Timer not started. Device not locked for debugging
2,823,858 UART: [kat] SHA2-256
3,629,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,633,633 UART: [kat] ++
3,633,785 UART: [kat] sha1
3,637,945 UART: [kat] SHA2-256
3,639,885 UART: [kat] SHA2-384
3,642,610 UART: [kat] SHA2-512-ACC
3,644,510 UART: [kat] ECC-384
3,654,345 UART: [kat] HMAC-384Kdf
3,658,865 UART: [kat] LMS
3,907,193 UART: [kat] --
3,907,897 UART: [update-reset] ++
5,221,230 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,222,265 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,372,131 >>> mbox cmd response: success
5,372,240 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,254 UART: [update-reset Success] --
5,380,945 UART: [state] Locking Datavault
5,381,785 UART: [state] Locking PCR0, PCR1 and PCR31
5,382,389 UART: [state] Locking ICCM
5,382,961 UART: [exit] Launching FMC @ 0x40000130
5,388,290 UART:
5,388,306 UART: Running Caliptra FMC ...
5,388,714 UART:
5,388,857 UART: [state] CFI Enabled
5,477,642 UART: [art] Extend RT PCRs Done
5,478,070 UART: [art] Lock RT PCRs Done
5,479,429 UART: [art] Populate DV Done
5,487,478 UART: [fht] FMC Alias Private Key: 7
5,488,436 UART: [art] Derive CDI
5,488,716 UART: [art] Store in in slot 0x4
5,574,393 UART: [art] Derive Key Pair
5,574,753 UART: [art] Store priv key in slot 0x5
5,588,303 UART: [art] Derive Key Pair - Done
5,603,218 UART: [art] Signing Cert with AUTHO
5,603,698 UART: RITY.KEYID = 7
5,618,972 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,737 UART: [art] PUB.X = 3B90C6FF84E012231B96072E4F3FBB97FCF75CBCD5CCBD35890BFF63FFD468BFB6D963E4E6CB40656510E9A242B08C12
5,626,519 UART: [art] PUB.Y = 74809B7CB203F0BE2FD76179D964EA293BF323E31791245F26299CE78BB306DA0A9771D3141EE62E2C193EA1F0F70331
5,633,457 UART: [art] SIG.R = 3796F403A358CD84CFC1B6DEB62C3C55CCFA5BFC3A82426A6720365AA13D2E3660BCE0DBD1737E7B594256D62790E9F2
5,640,236 UART: [art] SIG.S = 1A060C6F5C221E74804288F7667238AE007A16ABB60E08A35FAC1EDBBC099BBEB805CBCF848BC384482566FEADD0382F
5,664,171 UART: Caliptra RT
5,664,517 UART: [state] CFI Enabled
5,941,071 UART: [rt] RT failed reset flow
5,941,502 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,862 ready_for_fw is high
1,059,862 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,144 >>> mbox cmd response: success
2,163,144 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,225,474 UART:
2,225,490 UART: Running Caliptra FMC ...
2,225,898 UART:
2,226,041 UART: [state] CFI Enabled
2,236,514 UART: [fht] FMC Alias Private Key: 7
2,345,215 UART: [art] Extend RT PCRs Done
2,345,643 UART: [art] Lock RT PCRs Done
2,346,787 UART: [art] Populate DV Done
2,354,826 UART: [fht] FMC Alias Private Key: 7
2,355,812 UART: [art] Derive CDI
2,356,092 UART: [art] Store in in slot 0x4
2,441,981 UART: [art] Derive Key Pair
2,442,341 UART: [art] Store priv key in slot 0x5
2,455,461 UART: [art] Derive Key Pair - Done
2,470,398 UART: [art] Signing Cert with AUTHO
2,470,878 UART: RITY.KEYID = 7
2,486,334 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,099 UART: [art] PUB.X = 97B99F03D6E6DA2F9F37432EE26456B84BECFCB85F0143DB80D46A306F56B581DE73BE455FD60E3A5FD9789A678EA138
2,493,872 UART: [art] PUB.Y = F55EFA642C148408E80774A90B245D4A0B9F683BA9A01F6881F28395AE674954BBB41984BB2D3013EFE9CFD63B2164D5
2,500,814 UART: [art] SIG.R = 0E1CEDA004720C471A24FA7E859B416CF913068067EB6F57A4178504E8CB0084611D5166F0D3AFBFB53BA10EB5A21E59
2,507,550 UART: [art] SIG.S = 9A251CDDA1C226346C1ED8487F5A6C467AD4B73C3EFC74684CF184AE2E431DCE5C33ECBF78481F46D2119440A32BBFF7
2,531,495 UART: mbox::rt_entry...
2,531,867 UART: ____ _ _ _ ____ _____
2,532,651 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,451 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,219 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,987 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,755 UART: |_|
2,536,067 UART:
2,642,483 UART: [rt] Runtime listening for mailbox commands...
2,643,624 >>> mbox cmd response data (0 bytes)
2,643,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,081,856 >>> mbox cmd response: success
5,095,144 UART:
5,095,160 UART: Running Caliptra FMC ...
5,095,568 UART:
5,095,711 UART: [state] CFI Enabled
5,184,604 UART: [art] Extend RT PCRs Done
5,185,032 UART: [art] Lock RT PCRs Done
5,186,409 UART: [art] Populate DV Done
5,194,776 UART: [fht] FMC Alias Private Key: 7
5,195,822 UART: [art] Derive CDI
5,196,102 UART: [art] Store in in slot 0x4
5,281,615 UART: [art] Derive Key Pair
5,281,975 UART: [art] Store priv key in slot 0x5
5,295,355 UART: [art] Derive Key Pair - Done
5,310,474 UART: [art] Signing Cert with AUTHO
5,310,954 UART: RITY.KEYID = 7
5,326,212 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,977 UART: [art] PUB.X = 40D2FE25A3F30C84FA33960D222CA701EFC8E9E21B7C1758C8F287A507F2490DABD0001C494335C6BD0C761AAA46C0AA
5,333,719 UART: [art] PUB.Y = 50BCFA0C2463A29BB793FDB9029F798ABBFFB6EDCBFF479BED103EA7C9EEF06B2AEF39481886A97C078ACAB783386BEA
5,340,690 UART: [art] SIG.R = A3B5677428597C7B6A638B09FCB190EB5B049655ABE8880F936DB23015B64E3FE7A1FA35C91CC8ED8E71269824F676FA
5,347,457 UART: [art] SIG.S = 23E74B923DAD9C1C4F99966B81AED3DD9272DA8B404397BE4C197FB05D7349956662C6B39F86DE0214BD13D3DCFD2450
5,370,911 UART: Caliptra RT
5,371,257 UART: [state] CFI Enabled
5,652,603 UART: [rt] RT failed reset flow
5,653,034 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 ready_for_fw is high
1,174,515 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,439 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,208,005 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,242,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,526 UART: [ldev] --
1,281,916 UART: [fwproc] Wait for Commands...
1,282,589 UART: [fwproc] Recv command 0x46574c44
1,283,322 UART: [fwproc] Recv'd Img size: 78632 bytes
2,171,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,694 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,060 >>> mbox cmd response: success
2,310,060 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,311,289 UART: [afmc] ++
2,311,457 UART: [afmc] CDI.KEYID = 6
2,311,820 UART: [afmc] SUBJECT.KEYID = 7
2,312,246 UART: [afmc] AUTHORITY.KEYID = 5
2,347,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,172 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,891 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,614 UART: [afmc] --
2,390,582 UART: [cold-reset] --
2,391,596 UART: [state] Locking Datavault
2,392,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,331 UART: [state] Locking ICCM
2,393,895 UART: [exit] Launching FMC @ 0x40000130
2,399,224 UART:
2,399,240 UART: Running Caliptra FMC ...
2,399,648 UART:
2,399,702 UART: [state] CFI Enabled
2,410,245 UART: [fht] FMC Alias Private Key: 7
2,517,948 UART: [art] Extend RT PCRs Done
2,518,376 UART: [art] Lock RT PCRs Done
2,520,004 UART: [art] Populate DV Done
2,528,329 UART: [fht] FMC Alias Private Key: 7
2,529,337 UART: [art] Derive CDI
2,529,617 UART: [art] Store in in slot 0x4
2,614,984 UART: [art] Derive Key Pair
2,615,344 UART: [art] Store priv key in slot 0x5
2,628,960 UART: [art] Derive Key Pair - Done
2,643,758 UART: [art] Signing Cert with AUTHO
2,644,238 UART: RITY.KEYID = 7
2,659,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,001 UART: [art] PUB.X = 00A666CC93E2020F42074E978F3AC97B8B1F1CF478EA81194C0BD0045EA4CAD2865E26117E4A7CB75D56868EB7B46170
2,666,738 UART: [art] PUB.Y = E53E1D6E05A372622B35E2E9318363D7B9F3AED9A5FE27B458FCD7F1B05C6C09607D252F47DD25D74CF680B4653AD576
2,673,690 UART: [art] SIG.R = 0224A02079E33FF8118BF5BE7EECCFD6257143FDFCA9CBB75C8563F0F699D47A9659B8989106C0BD0867162D8471EC0C
2,680,456 UART: [art] SIG.S = D567426049578B3AA2B8BF35E746AF11589A81FCD53EE2C5A14EF57C920754269BBE19C7246CC708FA7BA4E3C29AFEF2
2,704,329 UART: mbox::rt_entry...
2,704,701 UART: ____ _ _ _ ____ _____
2,705,485 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,285 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,053 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,821 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,589 UART: |_|
2,708,901 UART:
2,815,033 UART: [rt] Runtime listening for mailbox commands...
2,816,174 >>> mbox cmd response data (0 bytes)
2,816,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,816,287 UART:
2,816,303 UART: Running Caliptra ROM ...
2,816,711 UART:
2,816,766 UART: [state] CFI Enabled
2,819,034 UART: [state] LifecycleState = Unprovisioned
2,819,689 UART: [state] DebugLocked = No
2,820,273 UART: [state] WD Timer not started. Device not locked for debugging
2,821,577 UART: [kat] SHA2-256
3,625,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,629,256 UART: [kat] ++
3,629,408 UART: [kat] sha1
3,633,620 UART: [kat] SHA2-256
3,635,560 UART: [kat] SHA2-384
3,638,347 UART: [kat] SHA2-512-ACC
3,640,247 UART: [kat] ECC-384
3,649,754 UART: [kat] HMAC-384Kdf
3,654,348 UART: [kat] LMS
3,902,660 UART: [kat] --
3,903,594 UART: [update-reset] ++
5,215,258 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,216,347 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,366,213 >>> mbox cmd response: success
5,366,406 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,420 UART: [update-reset Success] --
5,375,431 UART: [state] Locking Datavault
5,376,213 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,817 UART: [state] Locking ICCM
5,377,385 UART: [exit] Launching FMC @ 0x40000130
5,382,714 UART:
5,382,730 UART: Running Caliptra FMC ...
5,383,138 UART:
5,383,192 UART: [state] CFI Enabled
5,471,955 UART: [art] Extend RT PCRs Done
5,472,383 UART: [art] Lock RT PCRs Done
5,473,576 UART: [art] Populate DV Done
5,481,641 UART: [fht] FMC Alias Private Key: 7
5,482,777 UART: [art] Derive CDI
5,483,057 UART: [art] Store in in slot 0x4
5,569,012 UART: [art] Derive Key Pair
5,569,372 UART: [art] Store priv key in slot 0x5
5,582,402 UART: [art] Derive Key Pair - Done
5,597,495 UART: [art] Signing Cert with AUTHO
5,597,975 UART: RITY.KEYID = 7
5,612,987 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,752 UART: [art] PUB.X = 94A52EDB3DFFC2467A4E5D0EA02F026B6978DD1329A4F245E1B0B08CB5B925AC81E438C698CA07F9212B2523B1CBA6B1
5,620,527 UART: [art] PUB.Y = 7D125C2775FEE834614515D8CAE44D895137220E1F470DFF654B0C4F014F8F47AF5937262A018533FFD4336D97F2E9BF
5,627,462 UART: [art] SIG.R = 1CE886620D24AC333C723BB064ABFA73EE4B893EA9F9A4C2C8DF1208DC0BE66FD33A28A3699E5DE45E90D5093B32BFD3
5,634,238 UART: [art] SIG.S = A437D08D5F4321AE03BA6ACADC12846392EBE2EB3D834A30F83CAA3FB8FA4C1A66D867433A092FC8B3F7FF5E8736FC3E
5,658,107 UART: Caliptra RT
5,658,361 UART: [state] CFI Enabled
5,938,733 UART: [rt] RT failed reset flow
5,939,164 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,462 ready_for_fw is high
1,055,462 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,161,038 >>> mbox cmd response: success
2,161,038 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,236 UART:
2,223,252 UART: Running Caliptra FMC ...
2,223,660 UART:
2,223,714 UART: [state] CFI Enabled
2,234,517 UART: [fht] FMC Alias Private Key: 7
2,342,814 UART: [art] Extend RT PCRs Done
2,343,242 UART: [art] Lock RT PCRs Done
2,345,108 UART: [art] Populate DV Done
2,353,617 UART: [fht] FMC Alias Private Key: 7
2,354,587 UART: [art] Derive CDI
2,354,867 UART: [art] Store in in slot 0x4
2,440,452 UART: [art] Derive Key Pair
2,440,812 UART: [art] Store priv key in slot 0x5
2,454,604 UART: [art] Derive Key Pair - Done
2,469,472 UART: [art] Signing Cert with AUTHO
2,469,952 UART: RITY.KEYID = 7
2,485,244 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,009 UART: [art] PUB.X = F704A0F9044F48F8A00B895BBB67FD4233C39887CC196A90C5C96D7836CD92C29ED2A22A29EECD374D67D92922A61723
2,492,774 UART: [art] PUB.Y = 1B59B9D17D9D74A9279A4FAC68BAD891F5F2AF957146EFA26A5A6A51025520EC5093C5A756D7F606E52D8F535035034F
2,499,719 UART: [art] SIG.R = 426792DFA2B407402D1CB91FB7A933978D643CC16926CC69A132C2DEFA84FAFD2B6EF32E97F38ED711DBC8718C26A742
2,506,498 UART: [art] SIG.S = D540E83948503659B7EFA2383620B3EA145184141A7295BD6C9B55C294214B7C082110F0E85DEB5C43599BD2A1850512
2,530,579 UART: mbox::rt_entry...
2,530,951 UART: ____ _ _ _ ____ _____
2,531,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,535 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,303 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,071 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,839 UART: |_|
2,535,151 UART:
2,641,543 UART: [rt] Runtime listening for mailbox commands...
2,642,684 >>> mbox cmd response data (0 bytes)
2,642,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,075,167 >>> mbox cmd response: success
5,088,515 UART:
5,088,531 UART: Running Caliptra FMC ...
5,088,939 UART:
5,088,993 UART: [state] CFI Enabled
5,178,502 UART: [art] Extend RT PCRs Done
5,178,930 UART: [art] Lock RT PCRs Done
5,180,213 UART: [art] Populate DV Done
5,188,300 UART: [fht] FMC Alias Private Key: 7
5,189,318 UART: [art] Derive CDI
5,189,598 UART: [art] Store in in slot 0x4
5,275,249 UART: [art] Derive Key Pair
5,275,609 UART: [art] Store priv key in slot 0x5
5,288,183 UART: [art] Derive Key Pair - Done
5,302,849 UART: [art] Signing Cert with AUTHO
5,303,329 UART: RITY.KEYID = 7
5,318,737 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,502 UART: [art] PUB.X = ECCE400B352FEC291DB7F15382D59FFB8CD908527CC661F298C9303601804962914496E0B2172DA56A7E7F18BB7B3704
5,326,260 UART: [art] PUB.Y = 918CF45313B36126E0BF125F24F61C7730909C697CD8B513D54FCCD02CEB7AF2A5060FADEA0AC72C006CFE0D82910FD1
5,333,187 UART: [art] SIG.R = AC7469BC674A62DC717A8CC32FD6B593CB7727872D497A53E17CAD22970245B3A513078E95C9CA3C2D6A1D6792F1C811
5,339,955 UART: [art] SIG.S = 167AB21FA1B93A203434543080C65B41E2AB9C5419B6B0669D45D64623EDDF626793F9A84371550F86D62BDB1165379C
5,363,549 UART: Caliptra RT
5,363,803 UART: [state] CFI Enabled
5,645,767 UART: [rt] RT failed reset flow
5,646,198 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,169,730 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 ready_for_fw is high
1,174,156 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,764 UART: [idev] Sha1 KeyId Algorithm
1,208,568 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,711 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 78632 bytes
2,171,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,535 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,931 >>> mbox cmd response: success
2,310,931 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,312,054 UART: [afmc] ++
2,312,222 UART: [afmc] CDI.KEYID = 6
2,312,585 UART: [afmc] SUBJECT.KEYID = 7
2,313,011 UART: [afmc] AUTHORITY.KEYID = 5
2,348,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,625 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,237 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,956 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,757 UART: [afmc] --
2,391,857 UART: [cold-reset] --
2,392,737 UART: [state] Locking Datavault
2,393,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,468 UART: [state] Locking ICCM
2,395,112 UART: [exit] Launching FMC @ 0x40000130
2,400,441 UART:
2,400,457 UART: Running Caliptra FMC ...
2,400,865 UART:
2,401,008 UART: [state] CFI Enabled
2,411,887 UART: [fht] FMC Alias Private Key: 7
2,519,340 UART: [art] Extend RT PCRs Done
2,519,768 UART: [art] Lock RT PCRs Done
2,521,380 UART: [art] Populate DV Done
2,529,765 UART: [fht] FMC Alias Private Key: 7
2,530,887 UART: [art] Derive CDI
2,531,167 UART: [art] Store in in slot 0x4
2,616,966 UART: [art] Derive Key Pair
2,617,326 UART: [art] Store priv key in slot 0x5
2,630,208 UART: [art] Derive Key Pair - Done
2,644,739 UART: [art] Signing Cert with AUTHO
2,645,219 UART: RITY.KEYID = 7
2,660,187 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,952 UART: [art] PUB.X = EC7E3B60C353D818805B084E81FFB386C1B3E450AC7336448FEBA296C8B4150501AEE7BF3891D024A5C73D02BF2397F3
2,667,716 UART: [art] PUB.Y = A3FCA5545475127D8E4A982DDB4FC86206F32016ABC066BDB3C095128B8EA6DC8C9810462FDA87A4683DE98A4951A2D9
2,674,671 UART: [art] SIG.R = 71AE0FF839261047EFB8720523238A97B93C607A67734D20DA24522B36291ACCB19F3B7F4F9649B7F3E8424A38211CCF
2,681,433 UART: [art] SIG.S = 6E21588EA3FB55111128E452FEFA947B3E97960799B4C220484993E9D4E5BD4D34C6B0D0675D7A26D257A266D3AC0ABA
2,705,762 UART: mbox::rt_entry...
2,706,134 UART: ____ _ _ _ ____ _____
2,706,918 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,718 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,254 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,022 UART: |_|
2,710,334 UART:
2,816,442 UART: [rt] Runtime listening for mailbox commands...
2,817,583 >>> mbox cmd response data (0 bytes)
2,817,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,817,696 UART:
2,817,712 UART: Running Caliptra ROM ...
2,818,120 UART:
2,818,262 UART: [state] CFI Enabled
2,820,716 UART: [state] LifecycleState = Unprovisioned
2,821,371 UART: [state] DebugLocked = No
2,822,075 UART: [state] WD Timer not started. Device not locked for debugging
2,823,377 UART: [kat] SHA2-256
3,626,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,631,056 UART: [kat] ++
3,631,208 UART: [kat] sha1
3,635,630 UART: [kat] SHA2-256
3,637,570 UART: [kat] SHA2-384
3,640,275 UART: [kat] SHA2-512-ACC
3,642,175 UART: [kat] ECC-384
3,651,900 UART: [kat] HMAC-384Kdf
3,656,370 UART: [kat] LMS
3,904,682 UART: [kat] --
3,905,454 UART: [update-reset] ++
5,217,374 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,218,529 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,368,395 >>> mbox cmd response: success
5,368,632 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,646 UART: [update-reset Success] --
5,377,535 UART: [state] Locking Datavault
5,378,411 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,015 UART: [state] Locking ICCM
5,379,537 UART: [exit] Launching FMC @ 0x40000130
5,384,866 UART:
5,384,882 UART: Running Caliptra FMC ...
5,385,290 UART:
5,385,433 UART: [state] CFI Enabled
5,474,164 UART: [art] Extend RT PCRs Done
5,474,592 UART: [art] Lock RT PCRs Done
5,475,795 UART: [art] Populate DV Done
5,483,998 UART: [fht] FMC Alias Private Key: 7
5,485,162 UART: [art] Derive CDI
5,485,442 UART: [art] Store in in slot 0x4
5,571,037 UART: [art] Derive Key Pair
5,571,397 UART: [art] Store priv key in slot 0x5
5,585,051 UART: [art] Derive Key Pair - Done
5,599,815 UART: [art] Signing Cert with AUTHO
5,600,295 UART: RITY.KEYID = 7
5,615,435 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,200 UART: [art] PUB.X = FEE71BF0CA0C56C5B789F3B06C052273D5DD810839EBC090756FFF5EDD5578D23DC0E8189644710DC4579C1934C1ED5E
5,622,968 UART: [art] PUB.Y = 9CDF4A1806505CC5E1DE4491A3B34824B90AF4194D7A922C21B343499CDC29693ED69DEA5B288C00A6090D5DF59087B3
5,629,888 UART: [art] SIG.R = 89CBADCDC91BF57CD518893CBE4B79F918F3490C856E81D935758260E495CA9DE5C564D35F55E81906C0A509BAD09176
5,636,655 UART: [art] SIG.S = 1B7EFF0F439C4D793F1DD4EA641CE8152B6D92D78B9B8E2FFDF2C32C79A0FFAF631A89DB76C644F2B18216884B5C7551
5,659,995 UART: Caliptra RT
5,660,341 UART: [state] CFI Enabled
5,940,555 UART: [rt] RT failed reset flow
5,940,986 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,317 ready_for_fw is high
1,057,317 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,162,887 >>> mbox cmd response: success
2,162,887 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,224,289 UART:
2,224,305 UART: Running Caliptra FMC ...
2,224,713 UART:
2,224,856 UART: [state] CFI Enabled
2,235,623 UART: [fht] FMC Alias Private Key: 7
2,343,732 UART: [art] Extend RT PCRs Done
2,344,160 UART: [art] Lock RT PCRs Done
2,346,102 UART: [art] Populate DV Done
2,354,391 UART: [fht] FMC Alias Private Key: 7
2,355,421 UART: [art] Derive CDI
2,355,701 UART: [art] Store in in slot 0x4
2,441,120 UART: [art] Derive Key Pair
2,441,480 UART: [art] Store priv key in slot 0x5
2,454,634 UART: [art] Derive Key Pair - Done
2,469,204 UART: [art] Signing Cert with AUTHO
2,469,684 UART: RITY.KEYID = 7
2,484,444 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,209 UART: [art] PUB.X = 3B695020CCB1CBB8B43EBA2DA013C4EA9AE90598448E753F8A8FC80AF0D3313273AAF27A3BC71ED9DE5E8F958ACCC035
2,491,995 UART: [art] PUB.Y = 0E21A3EE4F5D3EFD5929993AEA846E70161F231029476F1E690BD8F1E21447C0E53FF932A3A5F1DE0C00AE77BDA29CAF
2,498,928 UART: [art] SIG.R = 88C40C32A843F437C8A705FC8ADC981E25C719ACD98736F5877E08752A37C72145186C12C8B92CAB2AAF666BD5FE1539
2,505,693 UART: [art] SIG.S = EB4701437176983EF1EF0D3955FE1F42B22E8BF067CCCDFDA2FCFA61DEFF16E499D4C0B97D072733626F6F2925EDEB94
2,529,639 UART: mbox::rt_entry...
2,530,011 UART: ____ _ _ _ ____ _____
2,530,795 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,595 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,363 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,899 UART: |_|
2,534,211 UART:
2,640,204 UART: [rt] Runtime listening for mailbox commands...
2,641,345 >>> mbox cmd response data (0 bytes)
2,641,346 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,074,314 >>> mbox cmd response: success
5,087,862 UART:
5,087,878 UART: Running Caliptra FMC ...
5,088,286 UART:
5,088,429 UART: [state] CFI Enabled
5,177,666 UART: [art] Extend RT PCRs Done
5,178,094 UART: [art] Lock RT PCRs Done
5,179,509 UART: [art] Populate DV Done
5,187,554 UART: [fht] FMC Alias Private Key: 7
5,188,506 UART: [art] Derive CDI
5,188,786 UART: [art] Store in in slot 0x4
5,274,391 UART: [art] Derive Key Pair
5,274,751 UART: [art] Store priv key in slot 0x5
5,287,875 UART: [art] Derive Key Pair - Done
5,302,712 UART: [art] Signing Cert with AUTHO
5,303,192 UART: RITY.KEYID = 7
5,318,102 UART: [art] Erasing AUTHORITY.KEYID = 7
5,318,867 UART: [art] PUB.X = 2D699406256B7D175C98AEEFDFF48A6F1F85CDBC84226187C6FD743F7A6A865DEF6457B7ED3FFC114C07982F0E0A2D9A
5,325,641 UART: [art] PUB.Y = 00A55D545700C12AF6003AE7FF87156BD99DB6C354CAF247682BC48043B10D25A54842D30E881DE4B7F75DBD6B3D2B1F
5,332,527 UART: [art] SIG.R = F429D559E4ACF690B9FAF6599FED4AE583B5A0968ED840D1CDFD34458A8C8FB4E0AC166D70D477DC13D0CF9060F97189
5,339,313 UART: [art] SIG.S = F7ADA2869D96CD1F9F84B0A3B8BEEA6E90356E89C2E8227D7DD668625F7E42C3BE96B2A2997D14205DDB7DF1EE79061E
5,363,149 UART: Caliptra RT
5,363,495 UART: [state] CFI Enabled
5,647,014 UART: [rt] RT failed reset flow
5,647,445 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
192,825 UART:
193,639 UART: Running Caliptra ROM ...
194,779 UART:
194,915 UART: [state] CFI Enabled
261,690 UART: [state] LifecycleState = Unprovisioned
263,764 UART: [state] DebugLocked = No
266,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,531 UART: [kat] SHA2-256
441,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,703 UART: [kat] ++
452,175 UART: [kat] sha1
463,252 UART: [kat] SHA2-256
465,975 UART: [kat] SHA2-384
471,116 UART: [kat] SHA2-512-ACC
473,478 UART: [kat] ECC-384
2,765,441 UART: [kat] HMAC-384Kdf
2,777,828 UART: [kat] LMS
3,968,133 UART: [kat] --
3,973,428 UART: [cold-reset] ++
3,975,358 UART: [fht] Storing FHT @ 0x50003400
3,987,467 UART: [idev] ++
3,988,044 UART: [idev] CDI.KEYID = 6
3,988,958 UART: [idev] SUBJECT.KEYID = 7
3,990,194 UART: [idev] UDS.KEYID = 0
3,991,321 ready_for_fw is high
3,991,562 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,090,817 UART: [idev] Erasing UDS.KEYID = 0
7,324,530 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,217 UART: [idev] --
7,350,941 UART: [ldev] ++
7,351,514 UART: [ldev] CDI.KEYID = 6
7,352,479 UART: [ldev] SUBJECT.KEYID = 5
7,353,682 UART: [ldev] AUTHORITY.KEYID = 7
7,354,965 UART: [ldev] FE.KEYID = 1
7,400,479 UART: [ldev] Erasing FE.KEYID = 1
10,734,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,382 UART: [ldev] --
13,095,318 UART: [fwproc] Waiting for Commands...
13,097,512 UART: [fwproc] Received command 0x46574c44
13,099,743 UART: [fwproc] Received Image of size 78676 bytes
16,732,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,808,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,877,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,070,872 >>> mbox cmd response: success
17,071,412 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,075,604 UART: [afmc] ++
17,076,192 UART: [afmc] CDI.KEYID = 6
17,077,078 UART: [afmc] SUBJECT.KEYID = 7
17,078,349 UART: [afmc] AUTHORITY.KEYID = 5
20,427,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,732,500 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,734,749 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,749,160 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,763,979 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,778,417 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,798,461 UART: [afmc] --
22,802,855 UART: [cold-reset] --
22,807,841 UART: [state] Locking Datavault
22,813,367 UART: [state] Locking PCR0, PCR1 and PCR31
22,815,101 UART: [state] Locking ICCM
22,816,770 UART: [exit] Launching FMC @ 0x40000130
22,825,164 UART:
22,825,393 UART: Running Caliptra FMC ...
22,826,414 UART:
22,826,554 UART: [state] CFI Enabled
22,890,455 UART: [fht] FMC Alias Private Key: 7
25,228,468 UART: [art] Extend RT PCRs Done
25,229,689 UART: [art] Lock RT PCRs Done
25,231,658 UART: [art] Populate DV Done
25,237,007 UART: [fht] FMC Alias Private Key: 7
25,238,551 UART: [art] Derive CDI
25,239,361 UART: [art] Store in in slot 0x4
25,299,348 UART: [art] Derive Key Pair
25,300,389 UART: [art] Store priv key in slot 0x5
28,592,741 UART: [art] Derive Key Pair - Done
28,605,562 UART: [art] Signing Cert with AUTHO
28,606,861 UART: RITY.KEYID = 7
30,894,247 UART: [art] Erasing AUTHORITY.KEYID = 7
30,895,750 UART: [art] PUB.X = D81BA1BEF5FC27A2836BB1AD26B618F1BA695BF530FECECA9CE4756300CC72F9258931CC90F17B50385A18BC099E90BA
30,902,991 UART: [art] PUB.Y = 7746F7E42770B5225C55235730CDBA9F15F1B539B10E179835FB06A0B877169A96E3B2326E3608C8F0FF4D414CB2C396
30,910,269 UART: [art] SIG.R = 357E8ADD4DD2A7F2B4BE9415195FA37E097D0FBA3221B9C5141B74059DB36130773FE98B71F2D43241BF1DBB9AA7BB02
30,917,665 UART: [art] SIG.S = 0CBA0F4F261C591900EFCBFECA2272FCA36B297DB9B65B9963AC43625DD838FF695335D737DB36DD30005E4E40C7239E
32,222,606 UART: mbox::rt_entry...
32,223,550 UART: ____ _ _ _ ____ _____
32,225,644 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,227,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,229,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,231,399 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,233,243 UART: |_|
32,234,113 UART:
32,347,854 UART: [rt] Runtime listening for mailbox commands...
32,353,703 >>> mbox cmd response data (3272 bytes)
32,369,485 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,402,861 >>> mbox cmd response data (0 bytes)
34,462,985 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,607,805 UART:
34,608,229 UART: Running Caliptra ROM ...
34,609,278 UART:
34,609,421 UART: [state] CFI Enabled
34,671,670 UART: [state] LifecycleState = Unprovisioned
34,673,615 UART: [state] DebugLocked = No
34,675,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,681,269 UART: [kat] SHA2-256
34,850,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,861,453 UART: [kat] ++
34,861,902 UART: [kat] sha1
34,873,967 UART: [kat] SHA2-256
34,876,675 UART: [kat] SHA2-384
34,882,599 UART: [kat] SHA2-512-ACC
34,884,994 UART: [kat] ECC-384
37,175,235 UART: [kat] HMAC-384Kdf
37,187,519 UART: [kat] LMS
38,377,861 UART: [kat] --
38,382,180 UART: [update-reset] ++
42,531,485 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,534,452 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,916,399 >>> mbox cmd response: success
42,921,025 UART: [update-reset] Copying MAN_2 To MAN_1
42,939,393 UART: [update-reset Success] --
42,944,414 UART: [state] Locking Datavault
42,947,615 UART: [state] Locking PCR0, PCR1 and PCR31
42,949,331 UART: [state] Locking ICCM
42,950,854 UART: [exit] Launching FMC @ 0x40000130
42,959,247 UART:
42,959,476 UART: Running Caliptra FMC ...
42,960,573 UART:
42,960,722 UART: [state] CFI Enabled
43,066,512 UART: [art] Extend RT PCRs Done
43,067,719 UART: [art] Lock RT PCRs Done
43,069,094 UART: [art] Populate DV Done
43,074,504 UART: [fht] FMC Alias Private Key: 7
43,076,038 UART: [art] Derive CDI
43,076,853 UART: [art] Store in in slot 0x4
43,135,867 UART: [art] Derive Key Pair
43,136,898 UART: [art] Store priv key in slot 0x5
46,429,560 UART: [art] Derive Key Pair - Done
46,442,732 UART: [art] Signing Cert with AUTHO
46,444,045 UART: RITY.KEYID = 7
48,730,896 UART: [art] Erasing AUTHORITY.KEYID = 7
48,732,404 UART: [art] PUB.X = 8F66F93101FBB6AE5A67648A81B1A2D0FFB9D596EB8D93F20D43DC4DAE7EE5F6D1AD8FFE18DA2FEA7EF4C1B903023597
48,739,686 UART: [art] PUB.Y = EC65099AB7CC6705D381F93FF7B921C0D2071A838B045B5D4E85A9F1632DD21407F57D609D75312A46FDE0FE96725F04
48,746,949 UART: [art] SIG.R = D758BC2AE1C354A8CD9D5797EE541752DF23D0766B61D2BCFFCFAABB3742DBF487A4B71DBD16E34B1218E9468D70DF63
48,754,325 UART: [art] SIG.S = ECF87E834AA5CAB5313DE7A4EE0FE53A94097446DF905B324D8BB8206FF80F0FBDBCD520118E4208EA65ACFB6BD73140
50,059,245 UART: Caliptra RT
50,059,967 UART: [state] CFI Enabled
53,659,221 UART: Disabled attest: DPE valid fail
53,660,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,661,802 UART: [rt] RT listening for mailbox commands...
53,692,813 UART: [rt]cmd =0x494e464f, len=4
53,696,847 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,807,432 ready_for_fw is high
3,807,804 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,178,128 >>> mbox cmd response: success
17,178,843 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,865,734 UART:
22,866,124 UART: Running Caliptra FMC ...
22,867,263 UART:
22,867,414 UART: [state] CFI Enabled
22,933,301 UART: [fht] FMC Alias Private Key: 7
25,272,065 UART: [art] Extend RT PCRs Done
25,273,287 UART: [art] Lock RT PCRs Done
25,275,064 UART: [art] Populate DV Done
25,280,316 UART: [fht] FMC Alias Private Key: 7
25,281,806 UART: [art] Derive CDI
25,282,561 UART: [art] Store in in slot 0x4
25,342,329 UART: [art] Derive Key Pair
25,343,369 UART: [art] Store priv key in slot 0x5
28,635,855 UART: [art] Derive Key Pair - Done
28,648,961 UART: [art] Signing Cert with AUTHO
28,650,253 UART: RITY.KEYID = 7
30,937,039 UART: [art] Erasing AUTHORITY.KEYID = 7
30,938,550 UART: [art] PUB.X = DC5EEB9B0EA1EA61704B8290CD6BF296F8738DC93700BA21B75BDE2BE98F9D6E40DFBCA4E9EC8A4D223E0C6F3A9402D5
30,945,872 UART: [art] PUB.Y = FA864EBE1F53B4EC866FD436599B7416C01DA3F38AAA7C861D4D9BE2F788FEAAD5119B5D8EC0FDA641C7F964CCFB1E0B
30,953,103 UART: [art] SIG.R = 0AD631E2307FDD57DEDEC6EBE6BB2DED34E961A41E5D7FAF8AD7A407BC4B19C2B21FF45B43FAF85646F4B7242EA621C0
30,960,538 UART: [art] SIG.S = 476F9D3771ADF12D40522F6E2758BC66799C9DB075835B70D149AE7067F050F7258CE85FACC709E42A0F2B9CC05D3A4C
32,265,395 UART: mbox::rt_entry...
32,266,360 UART: ____ _ _ _ ____ _____
32,268,282 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,270,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,272,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,274,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,276,085 UART: |_|
32,276,916 UART:
32,391,185 UART: [rt] Runtime listening for mailbox commands...
32,396,995 >>> mbox cmd response data (3272 bytes)
32,412,723 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,446,110 >>> mbox cmd response data (0 bytes)
34,505,209 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,221,034 >>> mbox cmd response: success
43,258,997 UART:
43,259,310 UART: Running Caliptra FMC ...
43,260,425 UART:
43,260,589 UART: [state] CFI Enabled
43,362,580 UART: [art] Extend RT PCRs Done
43,363,767 UART: [art] Lock RT PCRs Done
43,365,166 UART: [art] Populate DV Done
43,370,566 UART: [fht] FMC Alias Private Key: 7
43,372,092 UART: [art] Derive CDI
43,372,859 UART: [art] Store in in slot 0x4
43,431,981 UART: [art] Derive Key Pair
43,433,009 UART: [art] Store priv key in slot 0x5
46,725,653 UART: [art] Derive Key Pair - Done
46,738,438 UART: [art] Signing Cert with AUTHO
46,739,765 UART: RITY.KEYID = 7
49,027,536 UART: [art] Erasing AUTHORITY.KEYID = 7
49,029,049 UART: [art] PUB.X = E2155C2A954C97DEEAC5B13D443AB6FF53BB596D7CD1A2D7481B7A16D61BEA151AE79F0FBB240B69CC5AB56FE9BB9168
49,036,336 UART: [art] PUB.Y = 00B2CF8F596429886EFAE5CEBDB57D0975893CF6DF428189AB4260CFF6FE54FE983A8A34637890708CA9A9F0CFD9BC94
49,043,552 UART: [art] SIG.R = A1894E35E05D470F8B9FFD85D3935A35588559257AAD7DED9D6F9B563E3E19B7043A9F2F04BBB637FB30CE21084FF020
49,050,979 UART: [art] SIG.S = 1EEA8EF08A9350CA06C7EC4765A59B86D37FEA934A7A854FD0B0E277345C406D90C1CF1ECFD0DF334B3454F9AD955A03
50,356,671 UART: Caliptra RT
50,357,384 UART: [state] CFI Enabled
53,979,091 UART: Disabled attest: DPE valid fail
53,981,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,981,659 UART: [rt] RT listening for mailbox commands...
54,012,662 UART: [rt]cmd =0x494e464f, len=4
54,016,451 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,477 UART:
192,826 UART: Running Caliptra ROM ...
193,947 UART:
603,736 UART: [state] CFI Enabled
616,899 UART: [state] LifecycleState = Unprovisioned
618,838 UART: [state] DebugLocked = No
620,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,726 UART: [kat] SHA2-256
795,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,973 UART: [kat] ++
806,446 UART: [kat] sha1
818,311 UART: [kat] SHA2-256
821,029 UART: [kat] SHA2-384
827,588 UART: [kat] SHA2-512-ACC
829,962 UART: [kat] ECC-384
3,116,175 UART: [kat] HMAC-384Kdf
3,129,106 UART: [kat] LMS
4,319,162 UART: [kat] --
4,324,853 UART: [cold-reset] ++
4,327,364 UART: [fht] Storing FHT @ 0x50003400
4,338,769 UART: [idev] ++
4,339,401 UART: [idev] CDI.KEYID = 6
4,340,308 UART: [idev] SUBJECT.KEYID = 7
4,341,551 UART: [idev] UDS.KEYID = 0
4,342,591 ready_for_fw is high
4,342,796 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,441,798 UART: [idev] Erasing UDS.KEYID = 0
7,629,097 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,835 UART: [idev] --
7,655,546 UART: [ldev] ++
7,656,124 UART: [ldev] CDI.KEYID = 6
7,657,064 UART: [ldev] SUBJECT.KEYID = 5
7,658,279 UART: [ldev] AUTHORITY.KEYID = 7
7,659,560 UART: [ldev] FE.KEYID = 1
7,670,632 UART: [ldev] Erasing FE.KEYID = 1
10,958,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,578 UART: [ldev] --
13,318,919 UART: [fwproc] Waiting for Commands...
13,322,206 UART: [fwproc] Received command 0x46574c44
13,324,411 UART: [fwproc] Received Image of size 78676 bytes
16,934,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,008,266 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,077,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,270,568 >>> mbox cmd response: success
17,271,072 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,275,154 UART: [afmc] ++
17,275,737 UART: [afmc] CDI.KEYID = 6
17,276,723 UART: [afmc] SUBJECT.KEYID = 7
17,277,941 UART: [afmc] AUTHORITY.KEYID = 5
20,596,473 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,890,553 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,892,858 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,907,190 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,922,032 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,936,487 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,958,524 UART: [afmc] --
22,961,683 UART: [cold-reset] --
22,967,704 UART: [state] Locking Datavault
22,971,543 UART: [state] Locking PCR0, PCR1 and PCR31
22,973,248 UART: [state] Locking ICCM
22,974,429 UART: [exit] Launching FMC @ 0x40000130
22,982,830 UART:
22,983,066 UART: Running Caliptra FMC ...
22,984,187 UART:
22,984,349 UART: [state] CFI Enabled
22,992,235 UART: [fht] FMC Alias Private Key: 7
25,323,572 UART: [art] Extend RT PCRs Done
25,324,792 UART: [art] Lock RT PCRs Done
25,326,579 UART: [art] Populate DV Done
25,332,041 UART: [fht] FMC Alias Private Key: 7
25,333,576 UART: [art] Derive CDI
25,334,331 UART: [art] Store in in slot 0x4
25,377,138 UART: [art] Derive Key Pair
25,378,128 UART: [art] Store priv key in slot 0x5
28,620,850 UART: [art] Derive Key Pair - Done
28,633,725 UART: [art] Signing Cert with AUTHO
28,635,032 UART: RITY.KEYID = 7
30,914,657 UART: [art] Erasing AUTHORITY.KEYID = 7
30,916,172 UART: [art] PUB.X = 4C50A3603D3791604C3B9539DAC65BC7E094160F94C99854F50A22E724EE683A33B6EB0A77376D47400326601FDFB38B
30,923,450 UART: [art] PUB.Y = 1A2C1ADDB4DD9D2E7B6E7921FDB9041D0493E1C7AD17CAEFD4B65FE6F88A6ED539087CE5D9D05574AF6A759322C9EF08
30,930,653 UART: [art] SIG.R = BBE3A53AB250462CDF3B810637764D4BD5CE377C01E8D615D3888AEAE1335557979916E813EDCAEA0C73F78F5447B9B9
30,938,051 UART: [art] SIG.S = 014FD0FC03F811A950EBDAEB77FB8DCAD18E2B1D60BAE3AE583DEC08B24EDBB97B6AF1D7989FAE747EEA772299A5C2B3
32,242,689 UART: mbox::rt_entry...
32,243,649 UART: ____ _ _ _ ____ _____
32,245,630 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,247,637 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,249,566 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,251,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,253,424 UART: |_|
32,254,257 UART:
32,367,513 UART: [rt] Runtime listening for mailbox commands...
32,373,359 >>> mbox cmd response data (3272 bytes)
32,389,145 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,422,535 >>> mbox cmd response data (0 bytes)
34,482,280 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,626,510 UART:
34,626,873 UART: Running Caliptra ROM ...
34,627,998 UART:
34,628,166 UART: [state] CFI Enabled
34,640,273 UART: [state] LifecycleState = Unprovisioned
34,642,225 UART: [state] DebugLocked = No
34,644,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,648,821 UART: [kat] SHA2-256
34,818,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,829,090 UART: [kat] ++
34,829,597 UART: [kat] sha1
34,840,922 UART: [kat] SHA2-256
34,843,660 UART: [kat] SHA2-384
34,850,088 UART: [kat] SHA2-512-ACC
34,852,498 UART: [kat] ECC-384
37,135,332 UART: [kat] HMAC-384Kdf
37,147,341 UART: [kat] LMS
38,337,440 UART: [kat] --
38,342,102 UART: [update-reset] ++
42,480,472 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,484,142 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,866,134 >>> mbox cmd response: success
42,870,537 UART: [update-reset] Copying MAN_2 To MAN_1
42,889,716 UART: [update-reset Success] --
42,893,144 UART: [state] Locking Datavault
42,897,214 UART: [state] Locking PCR0, PCR1 and PCR31
42,898,999 UART: [state] Locking ICCM
42,901,181 UART: [exit] Launching FMC @ 0x40000130
42,909,573 UART:
42,909,803 UART: Running Caliptra FMC ...
42,910,825 UART:
42,910,973 UART: [state] CFI Enabled
42,954,593 UART: [art] Extend RT PCRs Done
42,955,782 UART: [art] Lock RT PCRs Done
42,957,587 UART: [art] Populate DV Done
42,962,986 UART: [fht] FMC Alias Private Key: 7
42,964,628 UART: [art] Derive CDI
42,965,441 UART: [art] Store in in slot 0x4
43,008,028 UART: [art] Derive Key Pair
43,009,087 UART: [art] Store priv key in slot 0x5
46,251,553 UART: [art] Derive Key Pair - Done
46,264,727 UART: [art] Signing Cert with AUTHO
46,266,026 UART: RITY.KEYID = 7
48,545,452 UART: [art] Erasing AUTHORITY.KEYID = 7
48,546,962 UART: [art] PUB.X = 39BD8910D4F4B578A8A05EF26492FB83124662C49326FD2F2666603FD3C17E4D2ECB6EB5553F1FB9284CB0D5FCAF3EDE
48,554,191 UART: [art] PUB.Y = 291051782EC7E450E1F51BA8AF4E10245B6835CBB7494B58A36CDCB69C13D36DE117E65A2C928744F7AD05639AC5817B
48,561,450 UART: [art] SIG.R = 58F8140DC1CF04BEF3C32A16FB983306ECB960D42D5C17249F3BEECA4916702C85225E55ACC29B46F1B76EB515E2967B
48,568,810 UART: [art] SIG.S = 0E93F088609BFD933807EE4AA172E226773D1A5B8A6919B7091D145EF28A687BB3EB68B42655DE90E642A35B162D60E3
49,873,932 UART: Caliptra RT
49,874,645 UART: [state] CFI Enabled
53,390,691 UART: Disabled attest: DPE valid fail
53,392,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,393,353 UART: [rt] RT listening for mailbox commands...
53,424,513 UART: [rt]cmd =0x494e464f, len=4
53,428,353 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,130,631 ready_for_fw is high
4,131,007 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,353,448 >>> mbox cmd response: success
17,354,126 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,996,744 UART:
22,997,129 UART: Running Caliptra FMC ...
22,998,227 UART:
22,998,402 UART: [state] CFI Enabled
23,006,298 UART: [fht] FMC Alias Private Key: 7
25,337,086 UART: [art] Extend RT PCRs Done
25,338,317 UART: [art] Lock RT PCRs Done
25,340,075 UART: [art] Populate DV Done
25,345,393 UART: [fht] FMC Alias Private Key: 7
25,347,095 UART: [art] Derive CDI
25,347,838 UART: [art] Store in in slot 0x4
25,390,111 UART: [art] Derive Key Pair
25,391,110 UART: [art] Store priv key in slot 0x5
28,633,099 UART: [art] Derive Key Pair - Done
28,646,312 UART: [art] Signing Cert with AUTHO
28,647,614 UART: RITY.KEYID = 7
30,927,298 UART: [art] Erasing AUTHORITY.KEYID = 7
30,928,800 UART: [art] PUB.X = 5309B7765DD96167BC57636C78A767AE9790AB627CEB851AAF40F8522EF4AFFDFE2C76E99B2CC630063042E52EB40D72
30,936,261 UART: [art] PUB.Y = B7EF1CF8A13068BDACC2ABE761572674C2A1F8C5643B434AC7D9EE0A23BA89495EC6B36423A8AFD96FAD48FD9970B543
30,943,326 UART: [art] SIG.R = 58C0BB5DB334B3DD1F4EAEEFF83D6312277E81AB49580172830E2DCA2784E9E23E2EA5D82CDD8808AA2BB943BA82657F
30,950,764 UART: [art] SIG.S = 79A614F9913ACBB7DB99DA412D9507CCF734594A2BFB9BA5B6B4494DEBA665811695D094A309F98B6DADFB14D05943E4
32,255,277 UART: mbox::rt_entry...
32,256,214 UART: ____ _ _ _ ____ _____
32,258,192 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,260,194 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,262,123 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,264,079 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,266,010 UART: |_|
32,266,819 UART:
32,380,302 UART: [rt] Runtime listening for mailbox commands...
32,386,111 >>> mbox cmd response data (3272 bytes)
32,401,884 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,435,264 >>> mbox cmd response data (0 bytes)
34,493,948 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,158,359 >>> mbox cmd response: success
43,191,932 UART:
43,192,272 UART: Running Caliptra FMC ...
43,193,396 UART:
43,193,560 UART: [state] CFI Enabled
43,237,522 UART: [art] Extend RT PCRs Done
43,238,665 UART: [art] Lock RT PCRs Done
43,240,333 UART: [art] Populate DV Done
43,246,060 UART: [fht] FMC Alias Private Key: 7
43,247,764 UART: [art] Derive CDI
43,248,579 UART: [art] Store in in slot 0x4
43,291,401 UART: [art] Derive Key Pair
43,292,445 UART: [art] Store priv key in slot 0x5
46,533,973 UART: [art] Derive Key Pair - Done
46,546,846 UART: [art] Signing Cert with AUTHO
46,548,176 UART: RITY.KEYID = 7
48,827,147 UART: [art] Erasing AUTHORITY.KEYID = 7
48,828,649 UART: [art] PUB.X = 45942104C206F2B927127F3B88A35C135C4B1772A44395EE22586978FC1E0BC2EF2CE03D93FAB62D8F378AE8409CC8B3
48,835,917 UART: [art] PUB.Y = 3330A55E7041B7EADDD88763840CBFA46C09854DEC08F3066679288808126995761F5D4B7FFC3A2832FA497351FCE3F3
48,843,111 UART: [art] SIG.R = 713816B505963FE3522871E47854CC2AD62FD8D9DE0C54E76F66B7E378298C38C14A3388FA18462305B772E87C91867E
48,850,480 UART: [art] SIG.S = 8388E312E32430D84D602621DF0CFDEF3F6A93709F32E04E304D992BEE169B49FF5E2BBB922F586349DB6648DC48D52B
50,156,091 UART: Caliptra RT
50,156,805 UART: [state] CFI Enabled
53,675,386 UART: Disabled attest: DPE valid fail
53,677,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,678,230 UART: [rt] RT listening for mailbox commands...
53,709,334 UART: [rt]cmd =0x494e464f, len=4
53,713,224 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
192,613 UART:
192,982 UART: Running Caliptra ROM ...
194,078 UART:
194,227 UART: [state] CFI Enabled
263,595 UART: [state] LifecycleState = Unprovisioned
265,541 UART: [state] DebugLocked = No
267,136 UART: [state] WD Timer not started. Device not locked for debugging
270,681 UART: [kat] SHA2-256
449,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,335 UART: [kat] ++
461,783 UART: [kat] sha1
473,239 UART: [kat] SHA2-256
476,248 UART: [kat] SHA2-384
483,375 UART: [kat] SHA2-512-ACC
486,322 UART: [kat] ECC-384
2,946,786 UART: [kat] HMAC-384Kdf
2,971,684 UART: [kat] LMS
3,501,132 UART: [kat] --
3,506,548 UART: [cold-reset] ++
3,507,488 UART: [fht] FHT @ 0x50003400
3,517,254 UART: [idev] ++
3,517,813 UART: [idev] CDI.KEYID = 6
3,518,768 UART: [idev] SUBJECT.KEYID = 7
3,519,939 UART: [idev] UDS.KEYID = 0
3,520,915 ready_for_fw is high
3,521,111 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,620,292 UART: [idev] Erasing UDS.KEYID = 0
6,026,952 UART: [idev] Sha1 KeyId Algorithm
6,049,104 UART: [idev] --
6,053,376 UART: [ldev] ++
6,053,951 UART: [ldev] CDI.KEYID = 6
6,054,869 UART: [ldev] SUBJECT.KEYID = 5
6,056,030 UART: [ldev] AUTHORITY.KEYID = 7
6,057,268 UART: [ldev] FE.KEYID = 1
6,100,169 UART: [ldev] Erasing FE.KEYID = 1
8,601,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,622 UART: [ldev] --
10,392,889 UART: [fwproc] Wait for Commands...
10,394,500 UART: [fwproc] Recv command 0x46574c44
10,396,608 UART: [fwproc] Recv'd Img size: 78632 bytes
13,362,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,436,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,505,443 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,698,589 >>> mbox cmd response: success
13,699,104 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,701,988 UART: [afmc] ++
13,702,572 UART: [afmc] CDI.KEYID = 6
13,703,486 UART: [afmc] SUBJECT.KEYID = 7
13,704,703 UART: [afmc] AUTHORITY.KEYID = 5
16,229,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,956,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,958,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,974,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,990,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,006,237 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,028,913 UART: [afmc] --
18,033,338 UART: [cold-reset] --
18,037,156 UART: [state] Locking Datavault
18,041,168 UART: [state] Locking PCR0, PCR1 and PCR31
18,042,869 UART: [state] Locking ICCM
18,045,350 UART: [exit] Launching FMC @ 0x40000130
18,053,747 UART:
18,053,989 UART: Running Caliptra FMC ...
18,055,094 UART:
18,055,257 UART: [state] CFI Enabled
18,114,727 UART: [fht] FMC Alias Private Key: 7
19,879,068 UART: [art] Extend RT PCRs Done
19,880,289 UART: [art] Lock RT PCRs Done
19,881,856 UART: [art] Populate DV Done
19,887,213 UART: [fht] FMC Alias Private Key: 7
19,888,808 UART: [art] Derive CDI
19,889,645 UART: [art] Store in in slot 0x4
19,947,533 UART: [art] Derive Key Pair
19,948,583 UART: [art] Store priv key in slot 0x5
22,411,626 UART: [art] Derive Key Pair - Done
22,424,466 UART: [art] Signing Cert with AUTHO
22,425,780 UART: RITY.KEYID = 7
24,137,996 UART: [art] Erasing AUTHORITY.KEYID = 7
24,139,505 UART: [art] PUB.X = B85399C002FE98736474AB6212547CFF0CBE27278D73687553EFDE35F0D8B599FC0E2525587DF42E204009AD9E5031A3
24,146,738 UART: [art] PUB.Y = 3150A4C2010CC732BE55BB6CD3237E72BBA530F54A71F3F1937A2F31C74688F1B5A4648D7F36951FC92FFF6CEE9D2223
24,154,015 UART: [art] SIG.R = 2A467014770B6A3A0C81B831DC1EA12919260EF4293DC6D6CDCD81E391AA450594299E65FEFCAB35A4A8ACE8B236A19B
24,161,404 UART: [art] SIG.S = 3B15A4FFAAE1D6175B3587D9CCFB3B7CC2CCD55D878D5E85D76D1ABC4E579E62E6E47CDE6695A3D18317A4591E2F30C9
25,140,219 UART: mbox::rt_entry...
25,141,175 UART: ____ _ _ _ ____ _____
25,143,170 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,145,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,147,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,149,064 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,151,003 UART: |_|
25,151,846 UART:
25,264,940 UART: [rt] Runtime listening for mailbox commands...
25,270,752 >>> mbox cmd response data (3272 bytes)
25,286,561 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,319,972 >>> mbox cmd response data (0 bytes)
27,379,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,523,781 UART:
27,524,169 UART: Running Caliptra ROM ...
27,525,324 UART:
27,525,495 UART: [state] CFI Enabled
27,592,336 UART: [state] LifecycleState = Unprovisioned
27,594,218 UART: [state] DebugLocked = No
27,596,808 UART: [state] WD Timer not started. Device not locked for debugging
27,600,513 UART: [kat] SHA2-256
27,779,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,791,217 UART: [kat] ++
27,791,757 UART: [kat] sha1
27,803,193 UART: [kat] SHA2-256
27,806,207 UART: [kat] SHA2-384
27,811,819 UART: [kat] SHA2-512-ACC
27,814,767 UART: [kat] ECC-384
30,278,227 UART: [kat] HMAC-384Kdf
30,299,154 UART: [kat] LMS
30,828,633 UART: [kat] --
30,833,081 UART: [update-reset] ++
34,261,782 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,265,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
34,648,359 >>> mbox cmd response: success
34,653,324 UART: [update-reset] Copying MAN_2 To MAN_1
34,671,691 UART: [update-reset Success] --
34,675,405 UART: [state] Locking Datavault
34,679,581 UART: [state] Locking PCR0, PCR1 and PCR31
34,681,226 UART: [state] Locking ICCM
34,682,893 UART: [exit] Launching FMC @ 0x40000130
34,691,290 UART:
34,691,527 UART: Running Caliptra FMC ...
34,692,967 UART:
34,693,138 UART: [state] CFI Enabled
34,791,099 UART: [art] Extend RT PCRs Done
34,792,293 UART: [art] Lock RT PCRs Done
34,793,803 UART: [art] Populate DV Done
34,799,480 UART: [fht] FMC Alias Private Key: 7
34,800,961 UART: [art] Derive CDI
34,801,722 UART: [art] Store in in slot 0x4
34,859,872 UART: [art] Derive Key Pair
34,860,939 UART: [art] Store priv key in slot 0x5
37,322,620 UART: [art] Derive Key Pair - Done
37,335,357 UART: [art] Signing Cert with AUTHO
37,336,662 UART: RITY.KEYID = 7
39,048,886 UART: [art] Erasing AUTHORITY.KEYID = 7
39,050,396 UART: [art] PUB.X = 6FA9B257CB28DFBF16B455CE80365FE750733146AA348E0426864C1884998062A6794AB5B8FD757F61ECC594D78EEEAD
39,057,703 UART: [art] PUB.Y = 651FF97BAC6694C90C8140AEB36F95BEF95AA9053F8EF3EEDA3D400D7DCDF830D3F2B4D6207F22758C3015B941B34289
39,064,951 UART: [art] SIG.R = A85CC977E95FC293CF35F528DE3A45B8E756E5C88B099739E5CEB0340D128B97927C197AF96A4620D5090AE11FB478B9
39,072,345 UART: [art] SIG.S = C7191617D3653AB7970542913B758BA213935CEF405C129541F6CD555C6FBAC7F2C0DE7941436EA7FC4EAC76F9EA32DD
40,051,808 UART: Caliptra RT
40,052,524 UART: [state] CFI Enabled
42,853,388 UART: Disabled attest: DPE valid fail
42,855,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,856,020 UART: [rt] RT listening for mailbox commands...
42,887,026 UART: [rt]cmd =0x494e464f, len=4
42,891,248 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,388 UART:
192,768 UART: Running Caliptra ROM ...
193,953 UART:
194,109 UART: [state] CFI Enabled
266,655 UART: [state] LifecycleState = Unprovisioned
269,066 UART: [state] DebugLocked = No
270,752 UART: [state] WD Timer not started. Device not locked for debugging
275,074 UART: [kat] SHA2-256
464,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,674 UART: [kat] ++
476,168 UART: [kat] sha1
487,042 UART: [kat] SHA2-256
490,121 UART: [kat] SHA2-384
495,628 UART: [kat] SHA2-512-ACC
498,214 UART: [kat] ECC-384
2,947,956 UART: [kat] HMAC-384Kdf
2,972,419 UART: [kat] LMS
3,504,152 UART: [kat] --
3,510,202 UART: [cold-reset] ++
3,511,421 UART: [fht] FHT @ 0x50003400
3,523,322 UART: [idev] ++
3,523,969 UART: [idev] CDI.KEYID = 6
3,524,955 UART: [idev] SUBJECT.KEYID = 7
3,526,134 UART: [idev] UDS.KEYID = 0
3,527,064 ready_for_fw is high
3,527,276 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,626,447 UART: [idev] Erasing UDS.KEYID = 0
6,033,099 UART: [idev] Sha1 KeyId Algorithm
6,056,814 UART: [idev] --
6,060,487 UART: [ldev] ++
6,061,172 UART: [ldev] CDI.KEYID = 6
6,062,142 UART: [ldev] SUBJECT.KEYID = 5
6,063,300 UART: [ldev] AUTHORITY.KEYID = 7
6,064,482 UART: [ldev] FE.KEYID = 1
6,104,630 UART: [ldev] Erasing FE.KEYID = 1
8,612,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,408 UART: [ldev] --
10,417,375 UART: [fwproc] Wait for Commands...
10,419,483 UART: [fwproc] Recv command 0x46574c44
10,421,799 UART: [fwproc] Recv'd Img size: 78632 bytes
13,441,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,516,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,632,262 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,960,839 >>> mbox cmd response: success
13,961,346 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,965,168 UART: [afmc] ++
13,965,865 UART: [afmc] CDI.KEYID = 6
13,967,023 UART: [afmc] SUBJECT.KEYID = 7
13,968,571 UART: [afmc] AUTHORITY.KEYID = 5
16,516,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,257,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,259,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,274,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,289,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,304,599 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,329,345 UART: [afmc] --
18,333,145 UART: [cold-reset] --
18,336,480 UART: [state] Locking Datavault
18,339,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,341,610 UART: [state] Locking ICCM
18,344,497 UART: [exit] Launching FMC @ 0x40000130
18,353,170 UART:
18,353,408 UART: Running Caliptra FMC ...
18,354,435 UART:
18,354,582 UART: [state] CFI Enabled
18,415,422 UART: [fht] FMC Alias Private Key: 7
20,179,927 UART: [art] Extend RT PCRs Done
20,181,145 UART: [art] Lock RT PCRs Done
20,182,687 UART: [art] Populate DV Done
20,187,849 UART: [fht] FMC Alias Private Key: 7
20,189,340 UART: [art] Derive CDI
20,190,078 UART: [art] Store in in slot 0x4
20,248,333 UART: [art] Derive Key Pair
20,249,375 UART: [art] Store priv key in slot 0x5
22,711,991 UART: [art] Derive Key Pair - Done
22,724,838 UART: [art] Signing Cert with AUTHO
22,726,143 UART: RITY.KEYID = 7
24,439,352 UART: [art] Erasing AUTHORITY.KEYID = 7
24,440,865 UART: [art] PUB.X = B1C26899A5074C3CDB55947B390E155298903AC4F447317B4D2F8D6F1A7263C40C3EAE5F55409C81BB300577F4A21E1A
24,448,111 UART: [art] PUB.Y = 4F3F16A2124652B1ECB77E56C13AAD65AD1FF8CA151C8FC873E0A08F5FD924BB4E6A2F37E036BEE8D589D9F1060F43AA
24,455,389 UART: [art] SIG.R = FE8C9994233A62DE8720CF0C51829E63DAA305035D3CE53610760AD62070CCDD9840B3DD77F139882DF57ACEE7665C9F
24,462,772 UART: [art] SIG.S = B4C5F3DEE967869E7BA59F8B81ED5EF0A81502A49A0547952ADB980AE032D648779B2C30E13C4F4538FB9C68F59DD8E3
25,440,624 UART: mbox::rt_entry...
25,441,594 UART: ____ _ _ _ ____ _____
25,443,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,445,607 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,447,546 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,449,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,451,634 UART: |_|
25,452,472 UART:
25,565,513 UART: [rt] Runtime listening for mailbox commands...
25,571,306 >>> mbox cmd response data (3272 bytes)
25,587,108 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,620,542 >>> mbox cmd response data (0 bytes)
27,679,225 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,824,449 UART:
27,824,846 UART: Running Caliptra ROM ...
27,825,987 UART:
27,826,160 UART: [state] CFI Enabled
27,892,091 UART: [state] LifecycleState = Unprovisioned
27,894,146 UART: [state] DebugLocked = No
27,896,672 UART: [state] WD Timer not started. Device not locked for debugging
27,901,785 UART: [kat] SHA2-256
28,091,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,102,411 UART: [kat] ++
28,102,875 UART: [kat] sha1
28,114,031 UART: [kat] SHA2-256
28,117,054 UART: [kat] SHA2-384
28,122,569 UART: [kat] SHA2-512-ACC
28,125,191 UART: [kat] ECC-384
30,576,118 UART: [kat] HMAC-384Kdf
30,600,025 UART: [kat] LMS
31,131,613 UART: [kat] --
31,135,887 UART: [update-reset] ++
34,591,492 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,594,487 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,202,187 >>> mbox cmd response: success
35,206,820 UART: [update-reset] Copying MAN_2 To MAN_1
35,240,275 UART: [update-reset Success] --
35,244,323 UART: [state] Locking Datavault
35,248,079 UART: [state] Locking PCR0, PCR1 and PCR31
35,250,244 UART: [state] Locking ICCM
35,252,026 UART: [exit] Launching FMC @ 0x40000130
35,260,679 UART:
35,260,919 UART: Running Caliptra FMC ...
35,262,093 UART:
35,262,264 UART: [state] CFI Enabled
35,368,580 UART: [art] Extend RT PCRs Done
35,369,774 UART: [art] Lock RT PCRs Done
35,371,288 UART: [art] Populate DV Done
35,376,646 UART: [fht] FMC Alias Private Key: 7
35,378,139 UART: [art] Derive CDI
35,378,904 UART: [art] Store in in slot 0x4
35,437,835 UART: [art] Derive Key Pair
35,438,845 UART: [art] Store priv key in slot 0x5
37,901,309 UART: [art] Derive Key Pair - Done
37,914,475 UART: [art] Signing Cert with AUTHO
37,915,786 UART: RITY.KEYID = 7
39,626,912 UART: [art] Erasing AUTHORITY.KEYID = 7
39,628,433 UART: [art] PUB.X = B968A34C103592D346BCBBA3D9C2FE66F13659EDB1746DF629A9967E353500BDE5ED70E6BCABCDC3C533B0D1CF21087E
39,635,702 UART: [art] PUB.Y = 5C27A80A672F28F0A5A409329979DD6DB6E8C8BFA9AF54364986680A3E2215C0B5A40FDDECFF574E34D33561E4AD0DE6
39,642,912 UART: [art] SIG.R = 02EBFFDE84000A1CB0591CF7A130DBC97A9FEB64CB66BB984DB2BCE2DA8ADCBA11631EA164CBAEF84AD26DE27CFE9E8D
39,650,360 UART: [art] SIG.S = 5A030E3B5F9495D4F32F8DD47DFFF4EA73FEE89377B8421FB7D47EAE2DAD160A6D3118E419AD2A8A28CFEB1FBB203242
40,629,543 UART: Caliptra RT
40,630,247 UART: [state] CFI Enabled
43,404,174 UART: Disabled attest: DPE valid fail
43,405,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,406,854 UART: [rt] RT listening for mailbox commands...
43,437,949 UART: [rt]cmd =0x494e464f, len=4
43,442,016 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,440,763 ready_for_fw is high
3,441,185 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,987,888 >>> mbox cmd response: success
13,988,590 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,281,646 UART:
18,282,048 UART: Running Caliptra FMC ...
18,283,261 UART:
18,283,425 UART: [state] CFI Enabled
18,349,062 UART: [fht] FMC Alias Private Key: 7
20,112,688 UART: [art] Extend RT PCRs Done
20,113,911 UART: [art] Lock RT PCRs Done
20,115,492 UART: [art] Populate DV Done
20,120,798 UART: [fht] FMC Alias Private Key: 7
20,122,359 UART: [art] Derive CDI
20,123,181 UART: [art] Store in in slot 0x4
20,181,558 UART: [art] Derive Key Pair
20,182,608 UART: [art] Store priv key in slot 0x5
22,645,507 UART: [art] Derive Key Pair - Done
22,658,668 UART: [art] Signing Cert with AUTHO
22,659,976 UART: RITY.KEYID = 7
24,371,652 UART: [art] Erasing AUTHORITY.KEYID = 7
24,373,139 UART: [art] PUB.X = F6423FFC0F59C8182C3E6C16F2C47085B61218E056127E6C4619EBE5FF6900D8FBCDDCF1D2216F8B5C94D6AACDE92F7C
24,380,374 UART: [art] PUB.Y = 3CA82E10D1CF3072C5FACDB5125BE5B052613CBF1E38C10567E011A45DC38B56A82152C3398DF29356EF463C05F665A0
24,387,661 UART: [art] SIG.R = 3DEE271FCC3742F69C73656085C0D99DAD2F3AFDCA6881E27CE879267A9DF315C7F58B77919A8425E07EAAD37C44D5A8
24,395,049 UART: [art] SIG.S = 2BED77C63470A8840A8CAF952A54E30F5DDD79099A4922DDF782632B0630071C4FFDBBDD3C199B36745005631A050870
25,373,371 UART: mbox::rt_entry...
25,374,348 UART: ____ _ _ _ ____ _____
25,376,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,378,332 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,380,281 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,382,242 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,384,178 UART: |_|
25,385,164 UART:
25,498,253 UART: [rt] Runtime listening for mailbox commands...
25,504,104 >>> mbox cmd response data (3272 bytes)
25,519,725 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,553,105 >>> mbox cmd response data (0 bytes)
27,612,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,408,256 >>> mbox cmd response: success
35,442,984 UART:
35,443,288 UART: Running Caliptra FMC ...
35,444,378 UART:
35,444,545 UART: [state] CFI Enabled
35,536,571 UART: [art] Extend RT PCRs Done
35,537,767 UART: [art] Lock RT PCRs Done
35,539,386 UART: [art] Populate DV Done
35,544,691 UART: [fht] FMC Alias Private Key: 7
35,546,397 UART: [art] Derive CDI
35,547,211 UART: [art] Store in in slot 0x4
35,606,035 UART: [art] Derive Key Pair
35,607,084 UART: [art] Store priv key in slot 0x5
38,070,031 UART: [art] Derive Key Pair - Done
38,082,717 UART: [art] Signing Cert with AUTHO
38,084,033 UART: RITY.KEYID = 7
39,795,706 UART: [art] Erasing AUTHORITY.KEYID = 7
39,797,212 UART: [art] PUB.X = F21DFFB628E4DBCB2BC17EE70273CFF6506EBBFC0B78ED77A88E1A9C972A11A2229B87A5BED9BE3AD3AC020A7B74462B
39,804,502 UART: [art] PUB.Y = BF3549F4160DED1BAA36919A42A7B8399B89C2CDAB4722A5EDD25C6ED0072878DEF1B4EF0475FA973139552A89DA5252
39,811,806 UART: [art] SIG.R = 8B2E276014F4CA03481A6E07655661DEA38B596ECAB542BF4EFA5EB00DB5A074C76581FA33F47AD3F0A4F26391380474
39,819,203 UART: [art] SIG.S = 06F597E1441FDE69C8AFB8C47B0C7D402B4E61A6C25A6F4386B053E8B1DCEF3A08E05104446ED8C7178222EE82AC409C
40,798,592 UART: Caliptra RT
40,799,284 UART: [state] CFI Enabled
43,573,974 UART: Disabled attest: DPE valid fail
43,575,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,576,576 UART: [rt] RT listening for mailbox commands...
43,607,571 UART: [rt]cmd =0x494e464f, len=4
43,611,575 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,440 UART:
192,795 UART: Running Caliptra ROM ...
193,994 UART:
603,464 UART: [state] CFI Enabled
618,002 UART: [state] LifecycleState = Unprovisioned
620,420 UART: [state] DebugLocked = No
622,086 UART: [state] WD Timer not started. Device not locked for debugging
627,548 UART: [kat] SHA2-256
817,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,192 UART: [kat] ++
828,730 UART: [kat] sha1
841,236 UART: [kat] SHA2-256
844,319 UART: [kat] SHA2-384
850,661 UART: [kat] SHA2-512-ACC
853,283 UART: [kat] ECC-384
3,293,674 UART: [kat] HMAC-384Kdf
3,306,406 UART: [kat] LMS
3,838,203 UART: [kat] --
3,844,000 UART: [cold-reset] ++
3,845,661 UART: [fht] FHT @ 0x50003400
3,857,562 UART: [idev] ++
3,858,197 UART: [idev] CDI.KEYID = 6
3,859,226 UART: [idev] SUBJECT.KEYID = 7
3,860,395 UART: [idev] UDS.KEYID = 0
3,861,325 ready_for_fw is high
3,861,519 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,960,378 UART: [idev] Erasing UDS.KEYID = 0
6,336,213 UART: [idev] Sha1 KeyId Algorithm
6,359,539 UART: [idev] --
6,363,850 UART: [ldev] ++
6,364,519 UART: [ldev] CDI.KEYID = 6
6,365,400 UART: [ldev] SUBJECT.KEYID = 5
6,366,605 UART: [ldev] AUTHORITY.KEYID = 7
6,367,831 UART: [ldev] FE.KEYID = 1
6,378,071 UART: [ldev] Erasing FE.KEYID = 1
8,857,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,461 UART: [ldev] --
10,648,774 UART: [fwproc] Wait for Commands...
10,651,906 UART: [fwproc] Recv command 0x46574c44
10,654,217 UART: [fwproc] Recv'd Img size: 78632 bytes
13,658,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,737,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,853,250 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,182,031 >>> mbox cmd response: success
14,182,490 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,185,744 UART: [afmc] ++
14,186,431 UART: [afmc] CDI.KEYID = 6
14,187,582 UART: [afmc] SUBJECT.KEYID = 7
14,189,111 UART: [afmc] AUTHORITY.KEYID = 5
16,688,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,411,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,413,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,428,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,443,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,458,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,482,496 UART: [afmc] --
18,486,423 UART: [cold-reset] --
18,489,635 UART: [state] Locking Datavault
18,495,692 UART: [state] Locking PCR0, PCR1 and PCR31
18,497,818 UART: [state] Locking ICCM
18,499,800 UART: [exit] Launching FMC @ 0x40000130
18,508,463 UART:
18,508,697 UART: Running Caliptra FMC ...
18,509,794 UART:
18,509,948 UART: [state] CFI Enabled
18,518,427 UART: [fht] FMC Alias Private Key: 7
20,275,313 UART: [art] Extend RT PCRs Done
20,276,536 UART: [art] Lock RT PCRs Done
20,277,944 UART: [art] Populate DV Done
20,283,576 UART: [fht] FMC Alias Private Key: 7
20,285,190 UART: [art] Derive CDI
20,286,005 UART: [art] Store in in slot 0x4
20,328,768 UART: [art] Derive Key Pair
20,329,808 UART: [art] Store priv key in slot 0x5
22,756,721 UART: [art] Derive Key Pair - Done
22,769,618 UART: [art] Signing Cert with AUTHO
22,770,915 UART: RITY.KEYID = 7
24,476,045 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,834 UART: [art] PUB.X = D278EB00A5D5BC82ECC0330371FC945E3CA61934BE2D932700A556FB09F93906129AE49431AEACAF566FBF3E62D0CB4B
24,484,770 UART: [art] PUB.Y = 1F315F55BE9A3D45C488A4156A22C78E63AD59C7D85CED33BCF6B0C8F739793CE2A66953BCF7CC112FF42831C479FA61
24,492,054 UART: [art] SIG.R = C57A3081958B868C840FFE70752DE9AFFAAE40074AF13D916617EB51EF0C6B6C45EB09B3DDFF907BED62ED1AC3C704DD
24,499,464 UART: [art] SIG.S = F0DBC3EA59AD30D94AC53ECFFE5D2BC7A293CB4EC308BC69401E8B2B5B074441A042F6425A8D0C9AD02F884B96BB4833
25,478,167 UART: mbox::rt_entry...
25,479,126 UART: ____ _ _ _ ____ _____
25,481,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,486,994 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,488,920 UART: |_|
25,489,725 UART:
25,604,108 UART: [rt] Runtime listening for mailbox commands...
25,609,909 >>> mbox cmd response data (3272 bytes)
25,625,874 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,659,294 >>> mbox cmd response data (0 bytes)
27,719,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,863,946 UART:
27,864,342 UART: Running Caliptra ROM ...
27,865,393 UART:
27,865,545 UART: [state] CFI Enabled
27,878,148 UART: [state] LifecycleState = Unprovisioned
27,880,042 UART: [state] DebugLocked = No
27,881,289 UART: [state] WD Timer not started. Device not locked for debugging
27,885,185 UART: [kat] SHA2-256
28,075,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,085,822 UART: [kat] ++
28,086,341 UART: [kat] sha1
28,096,905 UART: [kat] SHA2-256
28,099,926 UART: [kat] SHA2-384
28,104,830 UART: [kat] SHA2-512-ACC
28,107,404 UART: [kat] ECC-384
30,546,746 UART: [kat] HMAC-384Kdf
30,560,702 UART: [kat] LMS
31,092,329 UART: [kat] --
31,096,160 UART: [update-reset] ++
34,554,443 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,557,870 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,165,604 >>> mbox cmd response: success
35,170,323 UART: [update-reset] Copying MAN_2 To MAN_1
35,204,287 UART: [update-reset Success] --
35,209,236 UART: [state] Locking Datavault
35,212,448 UART: [state] Locking PCR0, PCR1 and PCR31
35,214,595 UART: [state] Locking ICCM
35,216,243 UART: [exit] Launching FMC @ 0x40000130
35,224,907 UART:
35,225,161 UART: Running Caliptra FMC ...
35,226,241 UART:
35,226,388 UART: [state] CFI Enabled
35,270,279 UART: [art] Extend RT PCRs Done
35,271,476 UART: [art] Lock RT PCRs Done
35,272,845 UART: [art] Populate DV Done
35,278,302 UART: [fht] FMC Alias Private Key: 7
35,279,951 UART: [art] Derive CDI
35,280,683 UART: [art] Store in in slot 0x4
35,323,218 UART: [art] Derive Key Pair
35,324,214 UART: [art] Store priv key in slot 0x5
37,751,241 UART: [art] Derive Key Pair - Done
37,764,505 UART: [art] Signing Cert with AUTHO
37,765,804 UART: RITY.KEYID = 7
39,470,764 UART: [art] Erasing AUTHORITY.KEYID = 7
39,472,283 UART: [art] PUB.X = D1FF45237E6F453A9F82E821CF7EDA03D6760A9433A6D9FE02DF68B01D24857762EBB46DC9B5B5829B68049C7EE11ED3
39,479,558 UART: [art] PUB.Y = E12D34B74EDA8C06C26D007EA145CB797C97926C752B18D20F1CB901EF006CD74F7899147C9349617F51853047017461
39,486,741 UART: [art] SIG.R = E26C371297B8AEF9B9DAA7E4ACD518247FA6AA511A1A7C163D236FCB35D49B95CF123B206BE4788B5D5F748378001D16
39,494,129 UART: [art] SIG.S = 6C6DD82DF352B94C62F4D34FDBA164ECEEE4D20C0FCD0344C851CF74708A16F0ED6B801272BAE2C9321759F87AC7D5D7
40,473,098 UART: Caliptra RT
40,473,817 UART: [state] CFI Enabled
43,177,764 UART: Disabled attest: DPE valid fail
43,179,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,180,280 UART: [rt] RT listening for mailbox commands...
43,211,387 UART: [rt]cmd =0x494e464f, len=4
43,215,440 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,748,551 ready_for_fw is high
3,748,943 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,181,345 >>> mbox cmd response: success
14,182,158 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,433,488 UART:
18,433,866 UART: Running Caliptra FMC ...
18,435,020 UART:
18,435,180 UART: [state] CFI Enabled
18,443,039 UART: [fht] FMC Alias Private Key: 7
20,200,387 UART: [art] Extend RT PCRs Done
20,201,614 UART: [art] Lock RT PCRs Done
20,203,565 UART: [art] Populate DV Done
20,209,241 UART: [fht] FMC Alias Private Key: 7
20,210,845 UART: [art] Derive CDI
20,211,661 UART: [art] Store in in slot 0x4
20,253,986 UART: [art] Derive Key Pair
20,254,977 UART: [art] Store priv key in slot 0x5
22,681,543 UART: [art] Derive Key Pair - Done
22,694,590 UART: [art] Signing Cert with AUTHO
22,695,931 UART: RITY.KEYID = 7
24,401,893 UART: [art] Erasing AUTHORITY.KEYID = 7
24,403,399 UART: [art] PUB.X = 17D02771D111C47667B621BA1C58A1FCE0A93767A5538E00F17DEA4151FB7CA57B63099F0343811FB1CD9316EA54A78B
24,410,696 UART: [art] PUB.Y = C70BCAD41B9245917D9F0E65A2C624E56215657469D4C6DF160FD19D253574EA8D06845379B9F9CCBC57A4192C16B852
24,417,920 UART: [art] SIG.R = 533EEDC29C003E09DC3D00742ED09143CEFC7C5A8625AE55D0B424FE6C4C63D119BEE45ED5286A2FB370914B65729E67
24,425,327 UART: [art] SIG.S = 505AE9501370128A67DF17DD771BF68866726B4E9241DB5D1DB85893F2765876E93237DE9C9065AD7110496DDA9005E1
25,403,927 UART: mbox::rt_entry...
25,405,030 UART: ____ _ _ _ ____ _____
25,406,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,408,968 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,410,897 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,412,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,414,787 UART: |_|
25,415,595 UART:
25,528,991 UART: [rt] Runtime listening for mailbox commands...
25,534,841 >>> mbox cmd response data (3272 bytes)
25,550,613 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,583,998 >>> mbox cmd response data (0 bytes)
27,642,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,380,141 >>> mbox cmd response: success
35,415,424 UART:
35,415,762 UART: Running Caliptra FMC ...
35,416,809 UART:
35,416,956 UART: [state] CFI Enabled
35,460,974 UART: [art] Extend RT PCRs Done
35,462,120 UART: [art] Lock RT PCRs Done
35,463,537 UART: [art] Populate DV Done
35,469,208 UART: [fht] FMC Alias Private Key: 7
35,470,741 UART: [art] Derive CDI
35,471,476 UART: [art] Store in in slot 0x4
35,514,020 UART: [art] Derive Key Pair
35,515,066 UART: [art] Store priv key in slot 0x5
37,941,250 UART: [art] Derive Key Pair - Done
37,954,123 UART: [art] Signing Cert with AUTHO
37,955,433 UART: RITY.KEYID = 7
39,660,899 UART: [art] Erasing AUTHORITY.KEYID = 7
39,662,412 UART: [art] PUB.X = EB4FA71CF2E4A062E49FB756004AB3A78A6967AED499BD14DE440BC78B68815CEF12FD47F83251298119C3D783ADEA6F
39,669,668 UART: [art] PUB.Y = 916F909F1556CE6EEC4F3CD3B4BBAB59C7537AA284D01BBBF56FE963DE201693E6569A7EA630385B8F5197660AC2C4BC
39,676,920 UART: [art] SIG.R = 983A4C49ACAF5EBF73C5ACB4FCDE1CB6D71B4B0BE2D830DE4417A3F1B15B06CB77DE7C3D52AEC5C167BF79442EF0BB23
39,684,366 UART: [art] SIG.S = BCD055D9B7C58ED4C4C697D33284B9FCF11CC0BC80E8BC120A774E1349CB40725471D5318303AE22008823D2BFADCE80
40,663,317 UART: Caliptra RT
40,664,019 UART: [state] CFI Enabled
43,367,156 UART: Disabled attest: DPE valid fail
43,368,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,369,899 UART: [rt] RT listening for mailbox commands...
43,400,907 UART: [rt]cmd =0x494e464f, len=4
43,404,863 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,657 UART: [kat] SHA2-256
881,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,703 UART: [kat] ++
885,855 UART: [kat] sha1
889,925 UART: [kat] SHA2-256
891,863 UART: [kat] SHA2-384
894,606 UART: [kat] SHA2-512-ACC
896,507 UART: [kat] ECC-384
901,878 UART: [kat] HMAC-384Kdf
906,576 UART: [kat] LMS
1,474,772 UART: [kat] --
1,475,549 UART: [cold-reset] ++
1,476,103 UART: [fht] Storing FHT @ 0x50003400
1,479,036 UART: [idev] ++
1,479,204 UART: [idev] CDI.KEYID = 6
1,479,564 UART: [idev] SUBJECT.KEYID = 7
1,479,988 UART: [idev] UDS.KEYID = 0
1,480,333 ready_for_fw is high
1,480,333 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,487,846 UART: [idev] Erasing UDS.KEYID = 0
1,504,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,126 UART: [idev] --
1,514,107 UART: [ldev] ++
1,514,275 UART: [ldev] CDI.KEYID = 6
1,514,638 UART: [ldev] SUBJECT.KEYID = 5
1,515,064 UART: [ldev] AUTHORITY.KEYID = 7
1,515,527 UART: [ldev] FE.KEYID = 1
1,520,829 UART: [ldev] Erasing FE.KEYID = 1
1,545,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,542 UART: [ldev] --
1,584,989 UART: [fwproc] Waiting for Commands...
1,585,780 UART: [fwproc] Received command 0x46574c44
1,586,571 UART: [fwproc] Received Image of size 78632 bytes
2,474,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,170 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,613,767 >>> mbox cmd response: success
2,613,767 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,614,827 UART: [afmc] ++
2,614,995 UART: [afmc] CDI.KEYID = 6
2,615,357 UART: [afmc] SUBJECT.KEYID = 7
2,615,782 UART: [afmc] AUTHORITY.KEYID = 5
2,650,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,052 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,742 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,797 UART: [afmc] --
2,693,877 UART: [cold-reset] --
2,694,849 UART: [state] Locking Datavault
2,696,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,926 UART: [state] Locking ICCM
2,697,454 UART: [exit] Launching FMC @ 0x40000130
2,702,783 UART:
2,702,799 UART: Running Caliptra FMC ...
2,703,207 UART:
2,703,261 UART: [state] CFI Enabled
2,713,968 UART: [fht] FMC Alias Private Key: 7
2,821,497 UART: [art] Extend RT PCRs Done
2,821,925 UART: [art] Lock RT PCRs Done
2,823,565 UART: [art] Populate DV Done
2,832,140 UART: [fht] FMC Alias Private Key: 7
2,833,148 UART: [art] Derive CDI
2,833,428 UART: [art] Store in in slot 0x4
2,918,855 UART: [art] Derive Key Pair
2,919,215 UART: [art] Store priv key in slot 0x5
2,932,397 UART: [art] Derive Key Pair - Done
2,947,042 UART: [art] Signing Cert with AUTHO
2,947,522 UART: RITY.KEYID = 7
2,962,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,603 UART: [art] PUB.X = 6D50B5870BD7AD213D59572AD75DF188766C60A02A85E9C83755C143F90B5C055288E3F89DE202C24724F5654837A51F
2,970,355 UART: [art] PUB.Y = A6852D1F18C6BB3D3835F7C3BBCCDE1DAD7F9E8655E47E24851C4A3D7D39DC4682DA5607BBA6231FC221626E434DF39C
2,977,318 UART: [art] SIG.R = 44B814BDF0E95A69F4899E13049E081283597920AE397BCBF23525A9547BA90EE1BCF87303338B7442955EE77977061D
2,984,065 UART: [art] SIG.S = E126ED62FCF3720B38F6BE82A623364B3C6935CF1C3D8A9DDBF5F1F1D37C4ED9191F1FE02F6619CEE62B8386BA085590
3,007,708 UART: mbox::rt_entry...
3,008,080 UART: ____ _ _ _ ____ _____
3,008,864 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,664 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,432 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,200 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,968 UART: |_|
3,012,280 UART:
3,119,700 UART: [rt] Runtime listening for mailbox commands...
3,124,658 >>> mbox cmd response data (3272 bytes)
3,124,659 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,744 >>> mbox cmd response data (0 bytes)
3,147,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,147,865 UART:
3,147,881 UART: Running Caliptra ROM ...
3,148,289 UART:
3,148,343 UART: [state] CFI Enabled
3,150,813 UART: [state] LifecycleState = Unprovisioned
3,151,468 UART: [state] DebugLocked = No
3,151,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,643 UART: [kat] SHA2-256
3,947,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,689 UART: [kat] ++
3,951,841 UART: [kat] sha1
3,956,303 UART: [kat] SHA2-256
3,958,241 UART: [kat] SHA2-384
3,961,036 UART: [kat] SHA2-512-ACC
3,962,936 UART: [kat] ECC-384
3,968,441 UART: [kat] HMAC-384Kdf
3,973,005 UART: [kat] LMS
4,541,201 UART: [kat] --
4,541,916 UART: [update-reset] ++
5,876,095 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,877,177 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,027,095 >>> mbox cmd response: success
6,027,302 UART: [update-reset] Copying MAN_2 To MAN_1
6,035,316 UART: [update-reset Success] --
6,036,227 UART: [state] Locking Datavault
6,037,105 UART: [state] Locking PCR0, PCR1 and PCR31
6,037,709 UART: [state] Locking ICCM
6,038,355 UART: [exit] Launching FMC @ 0x40000130
6,043,684 UART:
6,043,700 UART: Running Caliptra FMC ...
6,044,108 UART:
6,044,162 UART: [state] CFI Enabled
6,133,391 UART: [art] Extend RT PCRs Done
6,133,819 UART: [art] Lock RT PCRs Done
6,134,988 UART: [art] Populate DV Done
6,143,169 UART: [fht] FMC Alias Private Key: 7
6,144,295 UART: [art] Derive CDI
6,144,575 UART: [art] Store in in slot 0x4
6,230,498 UART: [art] Derive Key Pair
6,230,858 UART: [art] Store priv key in slot 0x5
6,243,648 UART: [art] Derive Key Pair - Done
6,258,131 UART: [art] Signing Cert with AUTHO
6,258,611 UART: RITY.KEYID = 7
6,273,811 UART: [art] Erasing AUTHORITY.KEYID = 7
6,274,576 UART: [art] PUB.X = 3D2A95B0853244309D04115B60CBD101A0DB2B46832A03AFF1D6A1293033642FB92B23073EE1039E27862AE6C408D240
6,281,322 UART: [art] PUB.Y = AE8163DB90D6CDB8074E257AC1DCAE099B851A0A558AE3162B40697C2C87A90B8F495E1A90B4D8F7A574E427565A9B1C
6,288,270 UART: [art] SIG.R = 95ABC1678A228181815147F35904129A77A4AAC5A26E12585A57126DDFEF2F95A2668E6D6044E4816A56135A1BADD6BC
6,295,037 UART: [art] SIG.S = D252D11EA005F6AA81DF6DA68BFB8AE398D69FA78B83E3FF549A517E655DDDAC26F613A8282338F74EC58A90F4BC4F2B
6,318,609 UART: Caliptra RT
6,318,863 UART: [state] CFI Enabled
6,597,075 UART: Disabled attest: DPE valid fail
6,597,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,599,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,629,124 UART: [rt]cmd =0x494e464f, len=4
6,632,536 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 ready_for_fw is high
1,362,647 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,465,991 >>> mbox cmd response: success
2,465,991 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,381 UART:
2,527,397 UART: Running Caliptra FMC ...
2,527,805 UART:
2,527,859 UART: [state] CFI Enabled
2,538,324 UART: [fht] FMC Alias Private Key: 7
2,646,719 UART: [art] Extend RT PCRs Done
2,647,147 UART: [art] Lock RT PCRs Done
2,648,721 UART: [art] Populate DV Done
2,656,842 UART: [fht] FMC Alias Private Key: 7
2,657,856 UART: [art] Derive CDI
2,658,136 UART: [art] Store in in slot 0x4
2,743,427 UART: [art] Derive Key Pair
2,743,787 UART: [art] Store priv key in slot 0x5
2,756,443 UART: [art] Derive Key Pair - Done
2,771,516 UART: [art] Signing Cert with AUTHO
2,771,996 UART: RITY.KEYID = 7
2,787,566 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,331 UART: [art] PUB.X = 44235EF10E81D696AFF96A1C50387C7628C75D595F1430999C2707DD5E03D6C07318D3D35471D640C449F134EAE5D11E
2,795,088 UART: [art] PUB.Y = F394DD1CBCA146C9AA90A16488B131DD87B640BED20D18FF5FCEC716898BDC9384F9CEBBFB8AD34F13F01F601AB5C83A
2,802,061 UART: [art] SIG.R = 5F791EAF1B85A8269DCE62B71B1FB626992AA91B3E2DBB715E2799D636D651F07D636FBF8E74BD5EE50130EF002C83F3
2,808,818 UART: [art] SIG.S = 5D1EA0C1A433B22482340AF3D6CF30600D3A901E620F1FEE2EE9AE2E83E8E7789CA4038DCED0004586AC80CC46164B4A
2,832,795 UART: mbox::rt_entry...
2,833,167 UART: ____ _ _ _ ____ _____
2,833,951 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,751 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,287 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,055 UART: |_|
2,837,367 UART:
2,943,926 UART: [rt] Runtime listening for mailbox commands...
2,948,884 >>> mbox cmd response data (3272 bytes)
2,948,885 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,970 >>> mbox cmd response data (0 bytes)
2,971,971 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,733,873 >>> mbox cmd response: success
5,747,432 UART:
5,747,448 UART: Running Caliptra FMC ...
5,747,856 UART:
5,747,910 UART: [state] CFI Enabled
5,837,543 UART: [art] Extend RT PCRs Done
5,837,971 UART: [art] Lock RT PCRs Done
5,839,262 UART: [art] Populate DV Done
5,847,595 UART: [fht] FMC Alias Private Key: 7
5,848,731 UART: [art] Derive CDI
5,849,011 UART: [art] Store in in slot 0x4
5,934,904 UART: [art] Derive Key Pair
5,935,264 UART: [art] Store priv key in slot 0x5
5,948,528 UART: [art] Derive Key Pair - Done
5,963,377 UART: [art] Signing Cert with AUTHO
5,963,857 UART: RITY.KEYID = 7
5,979,155 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,920 UART: [art] PUB.X = 7C863D548F69F832F14389F5BD7D91F30EB5821614EF93AC1DCF92CF2EFDC96B5478D4029532C773A074EFA4A19405AC
5,986,689 UART: [art] PUB.Y = 11524CD81E236E7412F07142CD198BA5AF4A33CD2D00548475182278D6DEDEAAAAD5745FB8A4C7D3FE4A244F3E83BEA5
5,993,631 UART: [art] SIG.R = 790F689A65D2D58DB392513C3E8F08BF73A413174916E5F27E938A731326D2E04C23B631D2D533E20B6BF6EF4C980C31
6,000,387 UART: [art] SIG.S = 0C6EBC7523E2C0BDDED17669D967DAF2ACEA319B5AFBB097D436F3F751D9D605AED4E4A8536B9488D63AE7B6BEDEB780
6,023,956 UART: Caliptra RT
6,024,210 UART: [state] CFI Enabled
6,310,642 UART: Disabled attest: DPE valid fail
6,311,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,312,426 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,485 UART: [rt]cmd =0x494e464f, len=4
6,345,801 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,724 UART: [kat] SHA2-256
892,662 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
903,255 UART: [kat] HMAC-384Kdf
908,031 UART: [kat] LMS
1,476,227 UART: [kat] --
1,477,156 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,185 UART: [idev] ++
1,480,353 UART: [idev] CDI.KEYID = 6
1,480,713 UART: [idev] SUBJECT.KEYID = 7
1,481,137 UART: [idev] UDS.KEYID = 0
1,481,482 ready_for_fw is high
1,481,482 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,751 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,632 UART: [ldev] ++
1,515,800 UART: [ldev] CDI.KEYID = 6
1,516,163 UART: [ldev] SUBJECT.KEYID = 5
1,516,589 UART: [ldev] AUTHORITY.KEYID = 7
1,517,052 UART: [ldev] FE.KEYID = 1
1,522,218 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,285 UART: [ldev] --
1,587,552 UART: [fwproc] Waiting for Commands...
1,588,185 UART: [fwproc] Received command 0x46574c44
1,588,976 UART: [fwproc] Received Image of size 78632 bytes
2,477,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,389 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,616,966 >>> mbox cmd response: success
2,616,966 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,064 UART: [afmc] ++
2,618,232 UART: [afmc] CDI.KEYID = 6
2,618,594 UART: [afmc] SUBJECT.KEYID = 7
2,619,019 UART: [afmc] AUTHORITY.KEYID = 5
2,653,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,218 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,998 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,726 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,611 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,301 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,152 UART: [afmc] --
2,697,230 UART: [cold-reset] --
2,698,150 UART: [state] Locking Datavault
2,699,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,757 UART: [state] Locking ICCM
2,700,185 UART: [exit] Launching FMC @ 0x40000130
2,705,514 UART:
2,705,530 UART: Running Caliptra FMC ...
2,705,938 UART:
2,706,081 UART: [state] CFI Enabled
2,716,628 UART: [fht] FMC Alias Private Key: 7
2,824,459 UART: [art] Extend RT PCRs Done
2,824,887 UART: [art] Lock RT PCRs Done
2,826,557 UART: [art] Populate DV Done
2,835,052 UART: [fht] FMC Alias Private Key: 7
2,836,038 UART: [art] Derive CDI
2,836,318 UART: [art] Store in in slot 0x4
2,922,209 UART: [art] Derive Key Pair
2,922,569 UART: [art] Store priv key in slot 0x5
2,936,347 UART: [art] Derive Key Pair - Done
2,951,082 UART: [art] Signing Cert with AUTHO
2,951,562 UART: RITY.KEYID = 7
2,966,730 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,495 UART: [art] PUB.X = 16931B8283F2F8426309E0AB9B4C5AA5F671C124DE069EA5660AA284D32D8B364B7BE958B52785A6ACC97D26BB826F08
2,974,257 UART: [art] PUB.Y = 08E8DDC0EEBD584A481899CA0E19911E21F93FED757EA0899D9DA09FC1BF73A52054CDC5C7DA165369086828F8B9170B
2,981,205 UART: [art] SIG.R = 23810DEB0A17DDBFFE7F4E4CED2ED0DF7CFD819650625FEBF32D39729C0B56B9BB126E5670B72386DDD91A3F04FB9608
2,987,980 UART: [art] SIG.S = FB7707A72F93FF372259A213BF4DD3BDBB44187FBC76833B2C4CED07142833E4130D10DDB058F71FC94349B62B889FE5
3,011,890 UART: mbox::rt_entry...
3,012,262 UART: ____ _ _ _ ____ _____
3,013,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,846 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,382 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,016,150 UART: |_|
3,016,462 UART:
3,122,772 UART: [rt] Runtime listening for mailbox commands...
3,127,730 >>> mbox cmd response data (3272 bytes)
3,127,731 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,150,816 >>> mbox cmd response data (0 bytes)
3,150,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,150,937 UART:
3,150,953 UART: Running Caliptra ROM ...
3,151,361 UART:
3,151,502 UART: [state] CFI Enabled
3,154,438 UART: [state] LifecycleState = Unprovisioned
3,155,093 UART: [state] DebugLocked = No
3,155,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,157,392 UART: [kat] SHA2-256
3,951,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,955,438 UART: [kat] ++
3,955,590 UART: [kat] sha1
3,959,808 UART: [kat] SHA2-256
3,961,746 UART: [kat] SHA2-384
3,964,411 UART: [kat] SHA2-512-ACC
3,966,311 UART: [kat] ECC-384
3,971,690 UART: [kat] HMAC-384Kdf
3,976,386 UART: [kat] LMS
4,544,582 UART: [kat] --
4,545,343 UART: [update-reset] ++
5,881,626 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,768 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,032,686 >>> mbox cmd response: success
6,032,915 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,929 UART: [update-reset Success] --
6,041,904 UART: [state] Locking Datavault
6,042,534 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,138 UART: [state] Locking ICCM
6,043,598 UART: [exit] Launching FMC @ 0x40000130
6,048,927 UART:
6,048,943 UART: Running Caliptra FMC ...
6,049,351 UART:
6,049,494 UART: [state] CFI Enabled
6,139,385 UART: [art] Extend RT PCRs Done
6,139,813 UART: [art] Lock RT PCRs Done
6,140,828 UART: [art] Populate DV Done
6,149,125 UART: [fht] FMC Alias Private Key: 7
6,150,173 UART: [art] Derive CDI
6,150,453 UART: [art] Store in in slot 0x4
6,236,110 UART: [art] Derive Key Pair
6,236,470 UART: [art] Store priv key in slot 0x5
6,249,700 UART: [art] Derive Key Pair - Done
6,264,773 UART: [art] Signing Cert with AUTHO
6,265,253 UART: RITY.KEYID = 7
6,280,157 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,922 UART: [art] PUB.X = A8383C6ADAC3E6FF4C407234828CF04438CD45DC091551E96CC0D87A4A6CF22B69A32A0B3F21A2668605DF3C9E43EF8D
6,287,695 UART: [art] PUB.Y = 78756E59072B8D9C95D1BAAC517F739E4E45B6E1BDB9928C206B4EDC8103115E73720F813E03BE8FD78EA06F2C69CC68
6,294,641 UART: [art] SIG.R = 317B7F758DC3CD1C5BF7BFA1F2BBD1BE8795BAE0B80AE0F369B7A229DF1518650BF6B20E799F8DE2705770FDF4220E06
6,301,414 UART: [art] SIG.S = F1A24A24FED045552F8482B8267933701B00B96CF4F81F38FAE1B0E23428BBA81D614F7B156AFD674F2B7D901DCA7917
6,325,185 UART: Caliptra RT
6,325,531 UART: [state] CFI Enabled
6,610,446 UART: Disabled attest: DPE valid fail
6,610,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,612,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,642,495 UART: [rt]cmd =0x494e464f, len=4
6,645,925 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,522 ready_for_fw is high
1,362,522 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,465,846 >>> mbox cmd response: success
2,465,846 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,322 UART:
2,527,338 UART: Running Caliptra FMC ...
2,527,746 UART:
2,527,889 UART: [state] CFI Enabled
2,538,668 UART: [fht] FMC Alias Private Key: 7
2,646,069 UART: [art] Extend RT PCRs Done
2,646,497 UART: [art] Lock RT PCRs Done
2,648,207 UART: [art] Populate DV Done
2,656,454 UART: [fht] FMC Alias Private Key: 7
2,657,458 UART: [art] Derive CDI
2,657,738 UART: [art] Store in in slot 0x4
2,743,477 UART: [art] Derive Key Pair
2,743,837 UART: [art] Store priv key in slot 0x5
2,757,303 UART: [art] Derive Key Pair - Done
2,772,350 UART: [art] Signing Cert with AUTHO
2,772,830 UART: RITY.KEYID = 7
2,788,164 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,929 UART: [art] PUB.X = D2912FE152D18540CA3456C4A506B9376BA6AE59F18552CB4D3D6FAB52FC19AAD948967E0CBDD02D17F9435FB208054C
2,795,697 UART: [art] PUB.Y = AFE0DFEBDE6A517F2FFF8C03486B9E461263E3CFED00D50A6FA2259DFF6A354925138BD68DAB4DA55A966D29C15C2882
2,802,639 UART: [art] SIG.R = 6EBD23A30070975854D8AE6399FA39CCB83887A75ACD2CD61FCA502C5C0E411419C297A8BD69B9F76A7BBAF606FFB676
2,809,395 UART: [art] SIG.S = 8C4BF4F9CBB524AFC967BBE72471AE21322F28F955DF1F2739CCEE94A16F91303883635BA0CA37A5869B78269671612B
2,833,098 UART: mbox::rt_entry...
2,833,470 UART: ____ _ _ _ ____ _____
2,834,254 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,054 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,822 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,590 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,358 UART: |_|
2,837,670 UART:
2,944,530 UART: [rt] Runtime listening for mailbox commands...
2,949,488 >>> mbox cmd response data (3272 bytes)
2,949,489 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,574 >>> mbox cmd response data (0 bytes)
2,972,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,733,102 >>> mbox cmd response: success
5,746,589 UART:
5,746,605 UART: Running Caliptra FMC ...
5,747,013 UART:
5,747,156 UART: [state] CFI Enabled
5,836,291 UART: [art] Extend RT PCRs Done
5,836,719 UART: [art] Lock RT PCRs Done
5,837,982 UART: [art] Populate DV Done
5,846,187 UART: [fht] FMC Alias Private Key: 7
5,847,133 UART: [art] Derive CDI
5,847,413 UART: [art] Store in in slot 0x4
5,932,682 UART: [art] Derive Key Pair
5,933,042 UART: [art] Store priv key in slot 0x5
5,946,356 UART: [art] Derive Key Pair - Done
5,961,090 UART: [art] Signing Cert with AUTHO
5,961,570 UART: RITY.KEYID = 7
5,976,608 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,373 UART: [art] PUB.X = B4D1792DA79AAA02A2F3F15A61A6CA988678B360AE1054349A6A310503FC6086299E21E378EE91FA6B4030AEE6B38130
5,984,136 UART: [art] PUB.Y = 8EB03BC4DCE1A4019A969EEF253ABA8039A3B93BC1C86BB45B0D452C4AE7243743CB0913AA8AF210C43546901910191D
5,991,085 UART: [art] SIG.R = 5112F8761635D759836FAFEBB9A0D41921F7DD4C71042FC3E8DF1963543F1ECFA8AD89F2D2F6861D2F8FB136398EDAC1
5,997,864 UART: [art] SIG.S = E1FC9EA5A821F09A2F3E366AD71389FD61D157329EEA7A7EF3D5F73F297933DB6DFC4485FF7C399DA903D38D976B6D2C
6,021,720 UART: Caliptra RT
6,022,066 UART: [state] CFI Enabled
6,303,659 UART: Disabled attest: DPE valid fail
6,304,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,305,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,335,704 UART: [rt]cmd =0x494e464f, len=4
6,339,040 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
893,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,557 UART: [kat] ++
897,709 UART: [kat] sha1
901,985 UART: [kat] SHA2-256
903,925 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,870 UART: [kat] LMS
1,171,198 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,425 UART: [fht] FHT @ 0x50003400
1,175,128 UART: [idev] ++
1,175,296 UART: [idev] CDI.KEYID = 6
1,175,656 UART: [idev] SUBJECT.KEYID = 7
1,176,080 UART: [idev] UDS.KEYID = 0
1,176,425 ready_for_fw is high
1,176,425 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,366 UART: [idev] Erasing UDS.KEYID = 0
1,201,141 UART: [idev] Sha1 KeyId Algorithm
1,209,605 UART: [idev] --
1,210,557 UART: [ldev] ++
1,210,725 UART: [ldev] CDI.KEYID = 6
1,211,088 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,019 UART: [ldev] Erasing FE.KEYID = 1
1,243,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,424 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,965 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,311,244 >>> mbox cmd response: success
2,311,244 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,392 UART: [afmc] ++
2,312,560 UART: [afmc] CDI.KEYID = 6
2,312,922 UART: [afmc] SUBJECT.KEYID = 7
2,313,347 UART: [afmc] AUTHORITY.KEYID = 5
2,348,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,873 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,703 UART: [afmc] --
2,391,671 UART: [cold-reset] --
2,392,485 UART: [state] Locking Datavault
2,393,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,298 UART: [state] Locking ICCM
2,394,782 UART: [exit] Launching FMC @ 0x40000130
2,400,111 UART:
2,400,127 UART: Running Caliptra FMC ...
2,400,535 UART:
2,400,589 UART: [state] CFI Enabled
2,411,088 UART: [fht] FMC Alias Private Key: 7
2,519,573 UART: [art] Extend RT PCRs Done
2,520,001 UART: [art] Lock RT PCRs Done
2,521,711 UART: [art] Populate DV Done
2,529,902 UART: [fht] FMC Alias Private Key: 7
2,530,894 UART: [art] Derive CDI
2,531,174 UART: [art] Store in in slot 0x4
2,616,575 UART: [art] Derive Key Pair
2,616,935 UART: [art] Store priv key in slot 0x5
2,629,729 UART: [art] Derive Key Pair - Done
2,644,889 UART: [art] Signing Cert with AUTHO
2,645,369 UART: RITY.KEYID = 7
2,660,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,534 UART: [art] PUB.X = C3D075F0CDCBE26B70314BCCA1D93E164215060752FB1660DEAB86BD0A69C76AC0132A5B3F89804C097B11DEC35B05E0
2,668,301 UART: [art] PUB.Y = 3F19EA0AA807CC6FF1759B2FC41BCAEFACB91A8AA926276B870A7D8DAB887652EC74178826F1BD83E0E1CDB334640ACC
2,675,261 UART: [art] SIG.R = 1F159465FCE070BA47A09D63F2CADFC35F789629142F632A94937FB7A10C3301A51334BAB206A91343F792EDE31C2129
2,682,022 UART: [art] SIG.S = 75C5377B2E98E0A59FC10ABD73A5470259F924EB3039C37280B24313FF15B92AB9E360A2D3A375CCE504409D37F5652E
2,705,490 UART: mbox::rt_entry...
2,705,862 UART: ____ _ _ _ ____ _____
2,706,646 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,446 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,214 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,982 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,750 UART: |_|
2,710,062 UART:
2,815,934 UART: [rt] Runtime listening for mailbox commands...
2,820,892 >>> mbox cmd response data (3272 bytes)
2,820,893 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,978 >>> mbox cmd response data (0 bytes)
2,843,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,844,096 UART:
2,844,112 UART: Running Caliptra ROM ...
2,844,520 UART:
2,844,575 UART: [state] CFI Enabled
2,847,471 UART: [state] LifecycleState = Unprovisioned
2,848,126 UART: [state] DebugLocked = No
2,848,726 UART: [state] WD Timer not started. Device not locked for debugging
2,850,074 UART: [kat] SHA2-256
3,655,724 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,659,849 UART: [kat] ++
3,660,001 UART: [kat] sha1
3,664,191 UART: [kat] SHA2-256
3,666,131 UART: [kat] SHA2-384
3,668,672 UART: [kat] SHA2-512-ACC
3,670,572 UART: [kat] ECC-384
3,679,713 UART: [kat] HMAC-384Kdf
3,684,307 UART: [kat] LMS
3,932,635 UART: [kat] --
3,933,757 UART: [update-reset] ++
5,245,710 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,689 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,396,555 >>> mbox cmd response: success
5,396,792 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,806 UART: [update-reset Success] --
5,405,771 UART: [state] Locking Datavault
5,406,445 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,049 UART: [state] Locking ICCM
5,407,495 UART: [exit] Launching FMC @ 0x40000130
5,412,824 UART:
5,412,840 UART: Running Caliptra FMC ...
5,413,248 UART:
5,413,302 UART: [state] CFI Enabled
5,502,581 UART: [art] Extend RT PCRs Done
5,503,009 UART: [art] Lock RT PCRs Done
5,504,420 UART: [art] Populate DV Done
5,512,691 UART: [fht] FMC Alias Private Key: 7
5,513,827 UART: [art] Derive CDI
5,514,107 UART: [art] Store in in slot 0x4
5,599,696 UART: [art] Derive Key Pair
5,600,056 UART: [art] Store priv key in slot 0x5
5,613,396 UART: [art] Derive Key Pair - Done
5,628,038 UART: [art] Signing Cert with AUTHO
5,628,518 UART: RITY.KEYID = 7
5,644,046 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,811 UART: [art] PUB.X = 5B2077B2AFA804C4E21EE7D9A1D8EBAA8C5761A917B3CE95F40B8AEBE4D1610F7E5DE11289C838FA0F8295C765A5BC77
5,651,587 UART: [art] PUB.Y = E8339D2535BEE7052ECEBC431610F567A0D60F9A4DD009889BB32565E6529EBA66CA547B47897D19D7550D00FB4EAE5E
5,658,511 UART: [art] SIG.R = 24FFAD7862CA13452F8D0422E85920AD3C5E325D8C3D89B27B54CCBFEFFAE21E052034F0F5BE03ED8056FA47C0C80612
5,665,283 UART: [art] SIG.S = 14D5DF6963E98A08B688D74367955E9440423C960787AC404166205ED623712305D89CCA74596A51D776C73F090AFEC4
5,688,843 UART: Caliptra RT
5,689,097 UART: [state] CFI Enabled
5,975,464 UART: Disabled attest: DPE valid fail
5,975,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,977,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,441 UART: [rt]cmd =0x494e464f, len=4
6,010,597 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,869 ready_for_fw is high
1,060,869 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,164,055 >>> mbox cmd response: success
2,164,055 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,853 UART:
2,225,869 UART: Running Caliptra FMC ...
2,226,277 UART:
2,226,331 UART: [state] CFI Enabled
2,236,540 UART: [fht] FMC Alias Private Key: 7
2,344,441 UART: [art] Extend RT PCRs Done
2,344,869 UART: [art] Lock RT PCRs Done
2,346,459 UART: [art] Populate DV Done
2,354,926 UART: [fht] FMC Alias Private Key: 7
2,356,080 UART: [art] Derive CDI
2,356,360 UART: [art] Store in in slot 0x4
2,441,761 UART: [art] Derive Key Pair
2,442,121 UART: [art] Store priv key in slot 0x5
2,455,315 UART: [art] Derive Key Pair - Done
2,469,862 UART: [art] Signing Cert with AUTHO
2,470,342 UART: RITY.KEYID = 7
2,485,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,511 UART: [art] PUB.X = 0F93080A5C6F9FCABE28F929B628CC28900A4735A972CF64D09E5981882F4890581FC7E792DAB4540C25DF96EFBA7461
2,493,270 UART: [art] PUB.Y = B8F498D5C43086E4B11A18C7E90E9B392AE29AE295C4B50A73E11CC552DE3C3399D5531710D53C819BEB3DD5D18B4B07
2,500,219 UART: [art] SIG.R = 117AD2E7150452BD489CC84F94B810136B37D499A162E43ED482FACBB9B0FEF914204E4D84842622C56C4E7A60A5ABE3
2,506,992 UART: [art] SIG.S = 31E84733D5BC639CBC9026B29BDBAD9BA6D089B83EC99F4D53024BD44F015170ADDC460CC427B2125AE81D7CC3A5D67E
2,531,240 UART: mbox::rt_entry...
2,531,612 UART: ____ _ _ _ ____ _____
2,532,396 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,196 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,964 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,732 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,500 UART: |_|
2,535,812 UART:
2,642,740 UART: [rt] Runtime listening for mailbox commands...
2,647,698 >>> mbox cmd response data (3272 bytes)
2,647,699 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,670,784 >>> mbox cmd response data (0 bytes)
2,670,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,107,068 >>> mbox cmd response: success
5,120,600 UART:
5,120,616 UART: Running Caliptra FMC ...
5,121,024 UART:
5,121,078 UART: [state] CFI Enabled
5,209,587 UART: [art] Extend RT PCRs Done
5,210,015 UART: [art] Lock RT PCRs Done
5,211,526 UART: [art] Populate DV Done
5,219,629 UART: [fht] FMC Alias Private Key: 7
5,220,795 UART: [art] Derive CDI
5,221,075 UART: [art] Store in in slot 0x4
5,306,680 UART: [art] Derive Key Pair
5,307,040 UART: [art] Store priv key in slot 0x5
5,319,658 UART: [art] Derive Key Pair - Done
5,334,500 UART: [art] Signing Cert with AUTHO
5,334,980 UART: RITY.KEYID = 7
5,350,038 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,803 UART: [art] PUB.X = 7006DF37BAB67265C592B6E6DF4BE9264E057E9A177BED40C7E5A61C03BCAEF9A11EEAEB53DE8CFEFA841FBBF5871A17
5,357,592 UART: [art] PUB.Y = 145F4441DC54FFE515CBAC8531339100F18078D72422E01DD7CCA2758DD72FF594EAB7AD1EF19C8257BB6E998F37D4F1
5,364,530 UART: [art] SIG.R = BCBED316C1E1807FB74269E3B1DC7B7C749CB5F1E8B40C142D11A64E60A8A605E4BD8CF685ED115D409AF46373CE238B
5,371,310 UART: [art] SIG.S = 6620C4CCC3E9D4A5351010D56957EF88B6BD8D65D8A09ED2982262E6213A51B00F6BB6730C36FB1F4B6FD8CFF2DFC40C
5,395,402 UART: Caliptra RT
5,395,656 UART: [state] CFI Enabled
5,683,251 UART: Disabled attest: DPE valid fail
5,683,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,685,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,715,402 UART: [rt]cmd =0x494e464f, len=4
5,718,592 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,333 UART: [kat] SHA2-512-ACC
909,234 UART: [kat] ECC-384
918,515 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,173,006 UART: [fht] FHT @ 0x50003400
1,175,643 UART: [idev] ++
1,175,811 UART: [idev] CDI.KEYID = 6
1,176,171 UART: [idev] SUBJECT.KEYID = 7
1,176,595 UART: [idev] UDS.KEYID = 0
1,176,940 ready_for_fw is high
1,176,940 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,521 UART: [idev] Erasing UDS.KEYID = 0
1,201,450 UART: [idev] Sha1 KeyId Algorithm
1,209,858 UART: [idev] --
1,211,022 UART: [ldev] ++
1,211,190 UART: [ldev] CDI.KEYID = 6
1,211,553 UART: [ldev] SUBJECT.KEYID = 5
1,211,979 UART: [ldev] AUTHORITY.KEYID = 7
1,212,442 UART: [ldev] FE.KEYID = 1
1,217,676 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,148 UART: [ldev] --
1,283,557 UART: [fwproc] Wait for Commands...
1,284,189 UART: [fwproc] Recv command 0x46574c44
1,284,917 UART: [fwproc] Recv'd Img size: 78632 bytes
2,174,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,134 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,312,319 >>> mbox cmd response: success
2,312,319 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,503 UART: [afmc] ++
2,313,671 UART: [afmc] CDI.KEYID = 6
2,314,033 UART: [afmc] SUBJECT.KEYID = 7
2,314,458 UART: [afmc] AUTHORITY.KEYID = 5
2,350,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,011 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,558 UART: [afmc] --
2,393,460 UART: [cold-reset] --
2,394,194 UART: [state] Locking Datavault
2,395,163 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,767 UART: [state] Locking ICCM
2,396,263 UART: [exit] Launching FMC @ 0x40000130
2,401,592 UART:
2,401,608 UART: Running Caliptra FMC ...
2,402,016 UART:
2,402,159 UART: [state] CFI Enabled
2,413,084 UART: [fht] FMC Alias Private Key: 7
2,521,077 UART: [art] Extend RT PCRs Done
2,521,505 UART: [art] Lock RT PCRs Done
2,523,057 UART: [art] Populate DV Done
2,531,538 UART: [fht] FMC Alias Private Key: 7
2,532,538 UART: [art] Derive CDI
2,532,818 UART: [art] Store in in slot 0x4
2,618,251 UART: [art] Derive Key Pair
2,618,611 UART: [art] Store priv key in slot 0x5
2,631,621 UART: [art] Derive Key Pair - Done
2,646,711 UART: [art] Signing Cert with AUTHO
2,647,191 UART: RITY.KEYID = 7
2,662,903 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,668 UART: [art] PUB.X = 4B8F17CC433090CC551FE5D597792CCB896868B71F9A25CCDDD40E11C91A55392D8575E80CDE7CFCBB35C4DFD98C428D
2,670,448 UART: [art] PUB.Y = 980876C158D635EF32EAE46F55382FCD93872971AC94F56E779E49DC11A9ED47BBB3BC049DFF824C1AB09450C0320183
2,677,393 UART: [art] SIG.R = 0BA9F015665929EDBE20B22A359648F5E79E2B6231E567E1DF8A3F6A6363BF94E811B27C8A81B1BD6600A427CC23FC74
2,684,144 UART: [art] SIG.S = 3FF3092F85DC97ABFA167923D685E5D6CC9D4B54CB959BB8CB6D3B6495A1EEA268027730133025B01263E77DD2DAFAF0
2,707,617 UART: mbox::rt_entry...
2,707,989 UART: ____ _ _ _ ____ _____
2,708,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,573 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,341 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,109 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,877 UART: |_|
2,712,189 UART:
2,819,159 UART: [rt] Runtime listening for mailbox commands...
2,824,117 >>> mbox cmd response data (3272 bytes)
2,824,118 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,203 >>> mbox cmd response data (0 bytes)
2,847,204 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,847,321 UART:
2,847,337 UART: Running Caliptra ROM ...
2,847,745 UART:
2,847,887 UART: [state] CFI Enabled
2,850,583 UART: [state] LifecycleState = Unprovisioned
2,851,238 UART: [state] DebugLocked = No
2,851,782 UART: [state] WD Timer not started. Device not locked for debugging
2,852,976 UART: [kat] SHA2-256
3,658,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,662,751 UART: [kat] ++
3,662,903 UART: [kat] sha1
3,667,255 UART: [kat] SHA2-256
3,669,195 UART: [kat] SHA2-384
3,671,908 UART: [kat] SHA2-512-ACC
3,673,808 UART: [kat] ECC-384
3,683,719 UART: [kat] HMAC-384Kdf
3,688,361 UART: [kat] LMS
3,936,689 UART: [kat] --
3,937,555 UART: [update-reset] ++
5,250,096 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,281 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,401,147 >>> mbox cmd response: success
5,401,424 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,438 UART: [update-reset Success] --
5,410,615 UART: [state] Locking Datavault
5,411,553 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,157 UART: [state] Locking ICCM
5,412,655 UART: [exit] Launching FMC @ 0x40000130
5,417,984 UART:
5,418,000 UART: Running Caliptra FMC ...
5,418,408 UART:
5,418,551 UART: [state] CFI Enabled
5,507,132 UART: [art] Extend RT PCRs Done
5,507,560 UART: [art] Lock RT PCRs Done
5,508,915 UART: [art] Populate DV Done
5,517,476 UART: [fht] FMC Alias Private Key: 7
5,518,542 UART: [art] Derive CDI
5,518,822 UART: [art] Store in in slot 0x4
5,604,421 UART: [art] Derive Key Pair
5,604,781 UART: [art] Store priv key in slot 0x5
5,618,437 UART: [art] Derive Key Pair - Done
5,633,076 UART: [art] Signing Cert with AUTHO
5,633,556 UART: RITY.KEYID = 7
5,649,066 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,831 UART: [art] PUB.X = F2642C5539DB5EC97E2CCFEBAC3307D5E673D04A6C172FEA7B93BB093F256153BA1F2DD75082D2207698EE6F2118298C
5,656,605 UART: [art] PUB.Y = B8F06459EA35407993EC72B10420B75EA043D7DE32CB34D4FE44086D4F603925B9E7ECA177B9461C346794C8C852B8A9
5,663,549 UART: [art] SIG.R = E373F016A43D90C151A09CB8B94526FB0C4FABBC5223E3A8C69B3D6C77351A14A618E0CAE48CEB29AA36D9C3BF7790BA
5,670,334 UART: [art] SIG.S = A805B887D1129946372CF75DDC5F944FD7F453444543020BBDD528BA0DE3A16D7E13714D8D543ED7CBB80FB550C95B57
5,694,140 UART: Caliptra RT
5,694,486 UART: [state] CFI Enabled
5,980,540 UART: Disabled attest: DPE valid fail
5,981,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,982,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,249 UART: [rt]cmd =0x494e464f, len=4
6,015,587 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,166,470 >>> mbox cmd response: success
2,166,470 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,784 UART:
2,228,800 UART: Running Caliptra FMC ...
2,229,208 UART:
2,229,351 UART: [state] CFI Enabled
2,239,882 UART: [fht] FMC Alias Private Key: 7
2,348,205 UART: [art] Extend RT PCRs Done
2,348,633 UART: [art] Lock RT PCRs Done
2,349,901 UART: [art] Populate DV Done
2,358,070 UART: [fht] FMC Alias Private Key: 7
2,359,038 UART: [art] Derive CDI
2,359,318 UART: [art] Store in in slot 0x4
2,444,933 UART: [art] Derive Key Pair
2,445,293 UART: [art] Store priv key in slot 0x5
2,458,547 UART: [art] Derive Key Pair - Done
2,473,370 UART: [art] Signing Cert with AUTHO
2,473,850 UART: RITY.KEYID = 7
2,489,368 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,133 UART: [art] PUB.X = 503AF8ECD30059DF7C3D4F9D57DBC1F57A8475D2F7F3476D77B839F212FEFE803EB7CB244AE0669894A81F8878C14ADF
2,496,895 UART: [art] PUB.Y = B37FE5017AB152C9983910C907307D45868C4EF84453F63702C9EFCE5787463858AF4BE003D31055071419BEBBEABFA0
2,503,830 UART: [art] SIG.R = 2A2B55FEAD26EDB95B5B4AF974845CF1F7344D48F292A59A8DD56846D91302EB155525D83B7674221171603975FF36C9
2,510,595 UART: [art] SIG.S = 0A876051BBF61CFF262F6AD427B8473ADA5D7FD239D3821513E91CE4A62F6AA4CD2CD423AD044FA2F56955D959F60FE6
2,534,293 UART: mbox::rt_entry...
2,534,665 UART: ____ _ _ _ ____ _____
2,535,449 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,249 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,017 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,553 UART: |_|
2,538,865 UART:
2,645,485 UART: [rt] Runtime listening for mailbox commands...
2,650,443 >>> mbox cmd response data (3272 bytes)
2,650,444 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,673,529 >>> mbox cmd response data (0 bytes)
2,673,530 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,111,882 >>> mbox cmd response: success
5,125,532 UART:
5,125,548 UART: Running Caliptra FMC ...
5,125,956 UART:
5,126,099 UART: [state] CFI Enabled
5,215,906 UART: [art] Extend RT PCRs Done
5,216,334 UART: [art] Lock RT PCRs Done
5,217,531 UART: [art] Populate DV Done
5,225,816 UART: [fht] FMC Alias Private Key: 7
5,226,782 UART: [art] Derive CDI
5,227,062 UART: [art] Store in in slot 0x4
5,313,403 UART: [art] Derive Key Pair
5,313,763 UART: [art] Store priv key in slot 0x5
5,326,573 UART: [art] Derive Key Pair - Done
5,341,290 UART: [art] Signing Cert with AUTHO
5,341,770 UART: RITY.KEYID = 7
5,357,050 UART: [art] Erasing AUTHORITY.KEYID = 7
5,357,815 UART: [art] PUB.X = 8F59AFC433C88CD4C38A3D04414AD893A61A9B6FD9C92AEB86FA489C171AD1D4DD67670515B3917258E22DCD80A65953
5,364,587 UART: [art] PUB.Y = D715B32B9A87F38F0D64055D851EAEF30FAB6327366D3D172255AD723A9B97FD852EC2322126D07AD12EE86A8CD6E29E
5,371,536 UART: [art] SIG.R = D2C62659E08A4C1E2F9C9868C800852513997EE221A2C6BBD57FE6D9F33A1ACFB9397C669588AF01D2FDB5CD9BC724B6
5,378,293 UART: [art] SIG.S = 433E2C324D7A29FE20A241B3636A60CFD6828B79413D42DEB48D4B6BC12FF1F500A27C84EA015DE76A257B5764004009
5,402,576 UART: Caliptra RT
5,402,922 UART: [state] CFI Enabled
5,685,113 UART: Disabled attest: DPE valid fail
5,685,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,687,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,716,988 UART: [rt]cmd =0x494e464f, len=4
5,720,414 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,174,579 ready_for_fw is high
1,174,579 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,201 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,600 UART: [ldev] Erasing FE.KEYID = 1
1,241,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,008 UART: [ldev] --
1,281,468 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 78632 bytes
2,171,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,064 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,254 >>> mbox cmd response: success
2,310,254 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,413 UART: [afmc] ++
2,311,581 UART: [afmc] CDI.KEYID = 6
2,311,944 UART: [afmc] SUBJECT.KEYID = 7
2,312,370 UART: [afmc] AUTHORITY.KEYID = 5
2,347,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,102 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,718 UART: [afmc] --
2,390,800 UART: [cold-reset] --
2,391,562 UART: [state] Locking Datavault
2,392,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,119 UART: [state] Locking ICCM
2,393,559 UART: [exit] Launching FMC @ 0x40000130
2,398,888 UART:
2,398,904 UART: Running Caliptra FMC ...
2,399,312 UART:
2,399,366 UART: [state] CFI Enabled
2,409,743 UART: [fht] FMC Alias Private Key: 7
2,517,820 UART: [art] Extend RT PCRs Done
2,518,248 UART: [art] Lock RT PCRs Done
2,519,814 UART: [art] Populate DV Done
2,528,003 UART: [fht] FMC Alias Private Key: 7
2,528,961 UART: [art] Derive CDI
2,529,241 UART: [art] Store in in slot 0x4
2,614,522 UART: [art] Derive Key Pair
2,614,882 UART: [art] Store priv key in slot 0x5
2,627,580 UART: [art] Derive Key Pair - Done
2,642,709 UART: [art] Signing Cert with AUTHO
2,643,189 UART: RITY.KEYID = 7
2,658,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,100 UART: [art] PUB.X = 0BC1B9C10563543EF808928AFE02BDB79964749A17195EF0145D7C7573B3893EBF5EFD318D286B66108CB8290A20FDD3
2,665,857 UART: [art] PUB.Y = 7962F176B354454C102FDEE91FBB2F685688DB4CDDAFB08F28D91D2C38D10141253A90AC875D7F0356119B6C56C592D3
2,672,805 UART: [art] SIG.R = 63F177CCDF6A8846982B2F7F2B93A8341F2B84538E16CB0E77318BB384C71C37A452A8535DC1160CE1C49BC002E27F06
2,679,565 UART: [art] SIG.S = 2CB69E9EE8BE9BC9FAF18AC02AE20B971C833EB58591EED504E26F8BAED6D4DE10E6161628AF99D9EDE56758520A2A61
2,703,305 UART: mbox::rt_entry...
2,703,677 UART: ____ _ _ _ ____ _____
2,704,461 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,029 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,797 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,565 UART: |_|
2,707,877 UART:
2,813,607 UART: [rt] Runtime listening for mailbox commands...
2,818,565 >>> mbox cmd response data (3272 bytes)
2,818,566 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,841,651 >>> mbox cmd response data (0 bytes)
2,841,652 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,841,769 UART:
2,841,785 UART: Running Caliptra ROM ...
2,842,193 UART:
2,842,248 UART: [state] CFI Enabled
2,844,574 UART: [state] LifecycleState = Unprovisioned
2,845,229 UART: [state] DebugLocked = No
2,845,955 UART: [state] WD Timer not started. Device not locked for debugging
2,847,117 UART: [kat] SHA2-256
3,650,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,796 UART: [kat] ++
3,654,948 UART: [kat] sha1
3,659,360 UART: [kat] SHA2-256
3,661,300 UART: [kat] SHA2-384
3,664,071 UART: [kat] SHA2-512-ACC
3,665,971 UART: [kat] ECC-384
3,675,260 UART: [kat] HMAC-384Kdf
3,679,978 UART: [kat] LMS
3,928,290 UART: [kat] --
3,929,060 UART: [update-reset] ++
5,240,198 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,241,385 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,391,251 >>> mbox cmd response: success
5,391,576 UART: [update-reset] Copying MAN_2 To MAN_1
5,399,590 UART: [update-reset Success] --
5,400,641 UART: [state] Locking Datavault
5,401,369 UART: [state] Locking PCR0, PCR1 and PCR31
5,401,973 UART: [state] Locking ICCM
5,402,605 UART: [exit] Launching FMC @ 0x40000130
5,407,934 UART:
5,407,950 UART: Running Caliptra FMC ...
5,408,358 UART:
5,408,412 UART: [state] CFI Enabled
5,497,873 UART: [art] Extend RT PCRs Done
5,498,301 UART: [art] Lock RT PCRs Done
5,499,502 UART: [art] Populate DV Done
5,507,725 UART: [fht] FMC Alias Private Key: 7
5,508,723 UART: [art] Derive CDI
5,509,003 UART: [art] Store in in slot 0x4
5,595,118 UART: [art] Derive Key Pair
5,595,478 UART: [art] Store priv key in slot 0x5
5,609,042 UART: [art] Derive Key Pair - Done
5,623,446 UART: [art] Signing Cert with AUTHO
5,623,926 UART: RITY.KEYID = 7
5,639,014 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,779 UART: [art] PUB.X = A4727CC098C2BB89C38F49729CB92815C92684652BEEBB51FA60539B27841B0F5D181D4D9B037BB9D13BD4761D4AEDEE
5,646,553 UART: [art] PUB.Y = 9A5E624EE255C92E867EE1C9EF4CC1339C3ECF289EF7E1AFEC840BAB0148EB542BCD70A62ABE61EDBF145A17C10488EF
5,653,520 UART: [art] SIG.R = A60352D9DC846227A5CA5BD3913A57EE9AA3588B6745975A1EDC79640183D6257958119A3A4AE3073576A276E914FCE8
5,660,277 UART: [art] SIG.S = D85B28AD22E5C38990165B947B1E521DBE1F96C24CB81BF45A0E5AB0868A20C69AAF174C5F431584E6232A99320277BA
5,683,632 UART: Caliptra RT
5,683,886 UART: [state] CFI Enabled
5,963,648 UART: Disabled attest: DPE valid fail
5,964,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,965,808 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,143 UART: [rt]cmd =0x494e464f, len=4
5,999,487 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,194 ready_for_fw is high
1,056,194 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,158,862 >>> mbox cmd response: success
2,158,862 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,221,402 UART:
2,221,418 UART: Running Caliptra FMC ...
2,221,826 UART:
2,221,880 UART: [state] CFI Enabled
2,232,615 UART: [fht] FMC Alias Private Key: 7
2,340,072 UART: [art] Extend RT PCRs Done
2,340,500 UART: [art] Lock RT PCRs Done
2,342,026 UART: [art] Populate DV Done
2,350,243 UART: [fht] FMC Alias Private Key: 7
2,351,273 UART: [art] Derive CDI
2,351,553 UART: [art] Store in in slot 0x4
2,437,294 UART: [art] Derive Key Pair
2,437,654 UART: [art] Store priv key in slot 0x5
2,450,186 UART: [art] Derive Key Pair - Done
2,464,957 UART: [art] Signing Cert with AUTHO
2,465,437 UART: RITY.KEYID = 7
2,480,385 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,150 UART: [art] PUB.X = 985C362941DDB4B4889CF039A3D53B47E86019D129ABFC90A49C03A985B7E3364E9ACBE55287D4868AD5070C02DD9178
2,487,910 UART: [art] PUB.Y = D882FBCED24ADE8B5EF7891EE1781798DF3CEC6B98BCCEB0B9A8D707D984CE247ACD03602548B3A769D52B19539D9BAB
2,494,876 UART: [art] SIG.R = 24C354F9AE87DC8A016557B9BD0DDD9DA0B563946C83A34B53EE16BB55C40FF403CAD774BB804E9426A13C40C544001E
2,501,622 UART: [art] SIG.S = E707E014F801116D5B96D717A1BC6E7ACC0A61DDDDD903B2F518710E76F52A6C603AEDB049510AC73BF90FA01800AE90
2,525,650 UART: mbox::rt_entry...
2,526,022 UART: ____ _ _ _ ____ _____
2,526,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,910 UART: |_|
2,530,222 UART:
2,637,022 UART: [rt] Runtime listening for mailbox commands...
2,641,980 >>> mbox cmd response data (3272 bytes)
2,641,981 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,066 >>> mbox cmd response data (0 bytes)
2,665,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,097,969 >>> mbox cmd response: success
5,111,149 UART:
5,111,165 UART: Running Caliptra FMC ...
5,111,573 UART:
5,111,627 UART: [state] CFI Enabled
5,201,048 UART: [art] Extend RT PCRs Done
5,201,476 UART: [art] Lock RT PCRs Done
5,202,423 UART: [art] Populate DV Done
5,210,604 UART: [fht] FMC Alias Private Key: 7
5,211,584 UART: [art] Derive CDI
5,211,864 UART: [art] Store in in slot 0x4
5,297,973 UART: [art] Derive Key Pair
5,298,333 UART: [art] Store priv key in slot 0x5
5,311,831 UART: [art] Derive Key Pair - Done
5,326,715 UART: [art] Signing Cert with AUTHO
5,327,195 UART: RITY.KEYID = 7
5,342,711 UART: [art] Erasing AUTHORITY.KEYID = 7
5,343,476 UART: [art] PUB.X = E15372956359871EA9E75DCF717A449E80F57673D45D5A9CE6BDF694A7727B19C4F04CE5268E144EC5E3F46CC644120C
5,350,245 UART: [art] PUB.Y = 79D87A8DC029311EA4AC482C9F14BC74B4069C8F8DC393D5FEA50969C1D5C1E321AC9E98198D378EE8E8B6668D6126DC
5,357,199 UART: [art] SIG.R = A4B5672868AA25277405C8E94A610CC4540E808746CF48C069E2AF53D9D3C33E19FCD3A1B5FE5849DD3D3C705358338C
5,363,962 UART: [art] SIG.S = 51DA441A6095A11A29ECF4CA6EF4BE57F58D194F371183E0AE1DD523A077FEEBF6F8CDC8A8D47006F916F0B2E0FAC62C
5,387,842 UART: Caliptra RT
5,388,096 UART: [state] CFI Enabled
5,671,823 UART: Disabled attest: DPE valid fail
5,672,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,673,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,703,546 UART: [rt]cmd =0x494e464f, len=4
5,706,968 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 ready_for_fw is high
1,173,976 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,198,972 UART: [idev] Sha1 KeyId Algorithm
1,207,926 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,681 UART: [ldev] --
1,280,101 UART: [fwproc] Wait for Commands...
1,280,798 UART: [fwproc] Recv command 0x46574c44
1,281,531 UART: [fwproc] Recv'd Img size: 78632 bytes
2,170,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,939 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,309,277 >>> mbox cmd response: success
2,309,277 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,310,542 UART: [afmc] ++
2,310,710 UART: [afmc] CDI.KEYID = 6
2,311,073 UART: [afmc] SUBJECT.KEYID = 7
2,311,499 UART: [afmc] AUTHORITY.KEYID = 5
2,346,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,303 UART: [afmc] --
2,390,273 UART: [cold-reset] --
2,391,099 UART: [state] Locking Datavault
2,392,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,828 UART: [state] Locking ICCM
2,393,344 UART: [exit] Launching FMC @ 0x40000130
2,398,673 UART:
2,398,689 UART: Running Caliptra FMC ...
2,399,097 UART:
2,399,240 UART: [state] CFI Enabled
2,409,565 UART: [fht] FMC Alias Private Key: 7
2,517,396 UART: [art] Extend RT PCRs Done
2,517,824 UART: [art] Lock RT PCRs Done
2,519,366 UART: [art] Populate DV Done
2,527,771 UART: [fht] FMC Alias Private Key: 7
2,528,909 UART: [art] Derive CDI
2,529,189 UART: [art] Store in in slot 0x4
2,615,164 UART: [art] Derive Key Pair
2,615,524 UART: [art] Store priv key in slot 0x5
2,628,944 UART: [art] Derive Key Pair - Done
2,643,695 UART: [art] Signing Cert with AUTHO
2,644,175 UART: RITY.KEYID = 7
2,659,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,256 UART: [art] PUB.X = FAF6E574D2AFC1EAA5AE70888030CAC9FC3DF808121A9E61C5E10C021FC7EE45015E7071187EBEBEABA90928E7283294
2,667,027 UART: [art] PUB.Y = 3AF34B6D5198D8144F93CD67D17EF8D8A4B7C97A5B1267763A70F3DC0AED74E27376BA471DF4BCF9279487D468F00112
2,673,977 UART: [art] SIG.R = 875DAE31935B451163F9B4D5BB301959BBCFE4FC4E01AFCBB23E795F1E93D63B9B72296D9C70CC7206040CB33637C8E9
2,680,745 UART: [art] SIG.S = C632770504BA5F45F06D7DEA390E87160A41E59FF12D0B39F26D080F46D785963CB68BFDFB087F9E8783A911E35456F8
2,704,148 UART: mbox::rt_entry...
2,704,520 UART: ____ _ _ _ ____ _____
2,705,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,104 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,872 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,640 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,408 UART: |_|
2,708,720 UART:
2,814,777 UART: [rt] Runtime listening for mailbox commands...
2,819,735 >>> mbox cmd response data (3272 bytes)
2,819,736 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,821 >>> mbox cmd response data (0 bytes)
2,842,822 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,842,939 UART:
2,842,955 UART: Running Caliptra ROM ...
2,843,363 UART:
2,843,505 UART: [state] CFI Enabled
2,846,627 UART: [state] LifecycleState = Unprovisioned
2,847,282 UART: [state] DebugLocked = No
2,847,816 UART: [state] WD Timer not started. Device not locked for debugging
2,849,154 UART: [kat] SHA2-256
3,652,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,833 UART: [kat] ++
3,656,985 UART: [kat] sha1
3,661,229 UART: [kat] SHA2-256
3,663,169 UART: [kat] SHA2-384
3,665,880 UART: [kat] SHA2-512-ACC
3,667,780 UART: [kat] ECC-384
3,677,495 UART: [kat] HMAC-384Kdf
3,682,239 UART: [kat] LMS
3,930,551 UART: [kat] --
3,931,403 UART: [update-reset] ++
5,243,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,062 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,393,928 >>> mbox cmd response: success
5,394,165 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,179 UART: [update-reset Success] --
5,403,206 UART: [state] Locking Datavault
5,403,992 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,596 UART: [state] Locking ICCM
5,405,146 UART: [exit] Launching FMC @ 0x40000130
5,410,475 UART:
5,410,491 UART: Running Caliptra FMC ...
5,410,899 UART:
5,411,042 UART: [state] CFI Enabled
5,500,075 UART: [art] Extend RT PCRs Done
5,500,503 UART: [art] Lock RT PCRs Done
5,501,982 UART: [art] Populate DV Done
5,510,111 UART: [fht] FMC Alias Private Key: 7
5,511,097 UART: [art] Derive CDI
5,511,377 UART: [art] Store in in slot 0x4
5,597,394 UART: [art] Derive Key Pair
5,597,754 UART: [art] Store priv key in slot 0x5
5,610,746 UART: [art] Derive Key Pair - Done
5,625,380 UART: [art] Signing Cert with AUTHO
5,625,860 UART: RITY.KEYID = 7
5,640,980 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,745 UART: [art] PUB.X = F6A1C25D6A95B1DBDC3FF3117182458C474F5651334FA7BBF2DABE9CBCFB2B77524D35098CABFFAF1AB5AC9137C6937A
5,648,536 UART: [art] PUB.Y = 9B1A8BFA24AF4C2BA00AC11C757371C6DAFF99C5099A18784534A7F98E45E7F7D83AACDF84CA64F58E8FFF16AD2E647A
5,655,502 UART: [art] SIG.R = 829ABCEFA79583E4B1A9EB34C3872E8D4CD0A2E1F9512869907603D758714AFB0687CDF81FE22926F57E266AC60E0B37
5,662,266 UART: [art] SIG.S = 8B20EA9511F8E70F5529EF13B4E57B060CA1AB314D67F5ABF943F8A5B990C2BD442FBE615981B3A0789CD2604160CB85
5,686,090 UART: Caliptra RT
5,686,436 UART: [state] CFI Enabled
5,973,564 UART: Disabled attest: DPE valid fail
5,974,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,975,478 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,579 UART: [rt]cmd =0x494e464f, len=4
6,008,989 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,829 ready_for_fw is high
1,056,829 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,160,239 >>> mbox cmd response: success
2,160,239 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,501 UART:
2,222,517 UART: Running Caliptra FMC ...
2,222,925 UART:
2,223,068 UART: [state] CFI Enabled
2,233,661 UART: [fht] FMC Alias Private Key: 7
2,341,942 UART: [art] Extend RT PCRs Done
2,342,370 UART: [art] Lock RT PCRs Done
2,343,744 UART: [art] Populate DV Done
2,352,147 UART: [fht] FMC Alias Private Key: 7
2,353,121 UART: [art] Derive CDI
2,353,401 UART: [art] Store in in slot 0x4
2,438,938 UART: [art] Derive Key Pair
2,439,298 UART: [art] Store priv key in slot 0x5
2,452,598 UART: [art] Derive Key Pair - Done
2,467,343 UART: [art] Signing Cert with AUTHO
2,467,823 UART: RITY.KEYID = 7
2,483,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,904 UART: [art] PUB.X = 2D85B51CE372F812A68A3885C005378D6F7226F95F5937EC703E4CD87214DDC621886D1EB2188A5BA4822F7936F4D060
2,490,667 UART: [art] PUB.Y = 237427CAF4203B51B8C55429DA27BF64A5D07BB53E0ED2C264B53B6764FC8E5BB7C9AECEA8150BAD46258E82FAF32204
2,497,622 UART: [art] SIG.R = E358A4C7BC69BB86F4F3A7B1D167AF435EE5573FF430477DF487D63E6F009561FF41E0C4336538C9A44E830828685635
2,504,365 UART: [art] SIG.S = AAA6F990AFCC5C87AB57A946019C1CE50EFE34080D4D3BA23DA221760DFFA64076AF3C1C85D50E7138771B5677411F6D
2,527,570 UART: mbox::rt_entry...
2,527,942 UART: ____ _ _ _ ____ _____
2,528,726 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,062 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,830 UART: |_|
2,532,142 UART:
2,638,809 UART: [rt] Runtime listening for mailbox commands...
2,643,767 >>> mbox cmd response data (3272 bytes)
2,643,768 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,666,853 >>> mbox cmd response data (0 bytes)
2,666,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,100,229 >>> mbox cmd response: success
5,113,575 UART:
5,113,591 UART: Running Caliptra FMC ...
5,113,999 UART:
5,114,142 UART: [state] CFI Enabled
5,202,907 UART: [art] Extend RT PCRs Done
5,203,335 UART: [art] Lock RT PCRs Done
5,204,532 UART: [art] Populate DV Done
5,212,927 UART: [fht] FMC Alias Private Key: 7
5,213,981 UART: [art] Derive CDI
5,214,261 UART: [art] Store in in slot 0x4
5,300,570 UART: [art] Derive Key Pair
5,300,930 UART: [art] Store priv key in slot 0x5
5,313,972 UART: [art] Derive Key Pair - Done
5,329,019 UART: [art] Signing Cert with AUTHO
5,329,499 UART: RITY.KEYID = 7
5,345,053 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,818 UART: [art] PUB.X = B3BBBF90F22EE1C257638BACCB5F3571C6939D7E12349E366D49575A03596604C21CC6A7C148204BD2F239AD24690257
5,352,579 UART: [art] PUB.Y = 387A6A13BFA47F915EAF8B44BCFE99102865491FC8205B41DB984F6F9C8A6D49AE0B20442A33DD6431969AEC50E9DDFE
5,359,540 UART: [art] SIG.R = 17AAF7C8C086265FB5F5EA3E911719430F3E24FAB773A6549759F39435DE79D005DE16F27933313F7D5A6BD82719F15B
5,366,304 UART: [art] SIG.S = A267CB303EA32D2B38633EC2F2C420BD3BCFBA55206A114141DF8F80B66C86B5A3139CACD14A8B2898CB7DFEF459E6ED
5,390,101 UART: Caliptra RT
5,390,447 UART: [state] CFI Enabled
5,673,384 UART: Disabled attest: DPE valid fail
5,673,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,675,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,705,423 UART: [rt]cmd =0x494e464f, len=4
5,708,973 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,293 UART:
192,656 UART: Running Caliptra ROM ...
193,853 UART:
194,006 UART: [state] CFI Enabled
263,790 UART: [state] LifecycleState = Unprovisioned
265,722 UART: [state] DebugLocked = No
267,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,715 UART: [kat] SHA2-256
442,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,856 UART: [kat] ++
453,374 UART: [kat] sha1
464,098 UART: [kat] SHA2-256
466,818 UART: [kat] SHA2-384
472,377 UART: [kat] SHA2-512-ACC
474,734 UART: [kat] ECC-384
2,767,895 UART: [kat] HMAC-384Kdf
2,779,923 UART: [kat] LMS
3,970,264 UART: [kat] --
3,974,211 UART: [cold-reset] ++
3,975,997 UART: [fht] Storing FHT @ 0x50003400
3,987,180 UART: [idev] ++
3,987,732 UART: [idev] CDI.KEYID = 6
3,988,674 UART: [idev] SUBJECT.KEYID = 7
3,989,931 UART: [idev] UDS.KEYID = 0
3,990,893 ready_for_fw is high
3,991,085 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,090,203 UART: [idev] Erasing UDS.KEYID = 0
7,327,673 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,935 UART: [idev] --
7,353,407 UART: [ldev] ++
7,354,026 UART: [ldev] CDI.KEYID = 6
7,354,957 UART: [ldev] SUBJECT.KEYID = 5
7,356,162 UART: [ldev] AUTHORITY.KEYID = 7
7,357,441 UART: [ldev] FE.KEYID = 1
7,403,281 UART: [ldev] Erasing FE.KEYID = 1
10,736,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,716 UART: [ldev] --
13,116,703 UART: [fwproc] Waiting for Commands...
13,119,001 UART: [fwproc] Received command 0x46574c44
13,121,179 UART: [fwproc] Received Image of size 78676 bytes
16,742,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,816,037 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,884,888 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,077,607 >>> mbox cmd response: success
17,078,127 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,082,460 UART: [afmc] ++
17,083,037 UART: [afmc] CDI.KEYID = 6
17,083,960 UART: [afmc] SUBJECT.KEYID = 7
17,085,177 UART: [afmc] AUTHORITY.KEYID = 5
20,451,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,755,776 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,770,189 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,785,012 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,453 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,821,944 UART: [afmc] --
22,825,366 UART: [cold-reset] --
22,829,066 UART: [state] Locking Datavault
22,834,636 UART: [state] Locking PCR0, PCR1 and PCR31
22,836,378 UART: [state] Locking ICCM
22,839,004 UART: [exit] Launching FMC @ 0x40000130
22,847,395 UART:
22,847,632 UART: Running Caliptra FMC ...
22,848,725 UART:
22,848,875 UART: [state] CFI Enabled
22,912,779 UART: [fht] FMC Alias Private Key: 7
25,250,776 UART: [art] Extend RT PCRs Done
25,252,016 UART: [art] Lock RT PCRs Done
25,253,370 UART: [art] Populate DV Done
25,258,776 UART: [fht] FMC Alias Private Key: 7
25,260,359 UART: [art] Derive CDI
25,261,166 UART: [art] Store in in slot 0x4
25,321,352 UART: [art] Derive Key Pair
25,322,385 UART: [art] Store priv key in slot 0x5
28,615,447 UART: [art] Derive Key Pair - Done
28,628,385 UART: [art] Signing Cert with AUTHO
28,629,677 UART: RITY.KEYID = 7
30,917,731 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,241 UART: [art] PUB.X = E38181D617407D39A10C20B1A96895672617C4155B1216DA8A2A8EA5ECC8E8B20198029FAEB64DD7990059B1965EC1EA
30,926,425 UART: [art] PUB.Y = B67048E22722ADB294CBA425210A9822B682C254AE26306175873E04DCBBA47A39C36333F78A4C00B90E690EA522AE3C
30,933,642 UART: [art] SIG.R = C060F018CE9AAA9516756A47ECC8FCB7AA946AA76E43ABE08CBADC0126041871F02E1BC63121D12E1AA45A6C785CB03B
30,941,083 UART: [art] SIG.S = 3EAFACA675F85A3DAB0582FC3163BDEA68F6E4A3B370BB8BD7887F3EC72089207602A8AE5DADBFDF93F8A4A0D8B31260
32,245,952 UART: mbox::rt_entry...
32,246,909 UART: ____ _ _ _ ____ _____
32,248,888 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,885 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,807 UART: |_|
32,257,687 UART:
32,370,819 UART: [rt] Runtime listening for mailbox commands...
32,376,637 >>> mbox cmd response data (3272 bytes)
32,392,409 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,425,830 >>> mbox cmd response data (0 bytes)
34,485,020 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,629,340 UART:
34,629,700 UART: Running Caliptra ROM ...
34,630,744 UART:
34,630,888 UART: [state] CFI Enabled
34,694,571 UART: [state] LifecycleState = Unprovisioned
34,696,501 UART: [state] DebugLocked = No
34,698,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,703,935 UART: [kat] SHA2-256
34,873,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,884,153 UART: [kat] ++
34,884,602 UART: [kat] sha1
34,895,026 UART: [kat] SHA2-256
34,897,717 UART: [kat] SHA2-384
34,903,810 UART: [kat] SHA2-512-ACC
34,906,181 UART: [kat] ECC-384
37,196,495 UART: [kat] HMAC-384Kdf
37,228,855 UART: [kat] LMS
38,419,167 UART: [kat] --
38,423,747 UART: [update-reset] ++
42,562,948 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,566,521 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,948,496 >>> mbox cmd response: success
42,953,106 UART: [update-reset] Copying MAN_2 To MAN_1
42,972,758 UART: [update-reset Success] --
42,976,688 UART: [state] Locking Datavault
42,980,320 UART: [state] Locking PCR0, PCR1 and PCR31
42,982,120 UART: [state] Locking ICCM
42,984,860 UART: [exit] Launching FMC @ 0x40000130
42,993,307 UART:
42,993,538 UART: Running Caliptra FMC ...
42,994,628 UART:
42,994,776 UART: [state] CFI Enabled
43,086,712 UART: [art] Extend RT PCRs Done
43,087,906 UART: [art] Lock RT PCRs Done
43,089,146 UART: [art] Populate DV Done
43,094,770 UART: [fht] FMC Alias Private Key: 7
43,096,304 UART: [art] Derive CDI
43,097,111 UART: [art] Store in in slot 0x4
43,156,323 UART: [art] Derive Key Pair
43,157,351 UART: [art] Store priv key in slot 0x5
46,450,316 UART: [art] Derive Key Pair - Done
46,463,369 UART: [art] Signing Cert with AUTHO
46,464,688 UART: RITY.KEYID = 7
48,751,957 UART: [art] Erasing AUTHORITY.KEYID = 7
48,753,469 UART: [art] PUB.X = A1EC711E40798303EA62346E3077E52AC3C93AD76CDDA5B9EC9CEE01BF3A433AE043B36D2C25AC1EE3C060956508CF87
48,760,747 UART: [art] PUB.Y = 2794DCB035F8494D01E6B431DD70BF9EC1E1905BE40FBAB1215CBB9D50570665938B1248F6F8BDCDB8B62232DDAB80E4
48,767,985 UART: [art] SIG.R = 5F45D864B391B1DD59A3077CF76CBD276938B03AAA4BD1D159D1CF44772A4AE4E5477C1ACC2DCB774FF88D00E2E9A686
48,775,385 UART: [art] SIG.S = EF5D0663282CA46557AD7D32FD3DD7E0D711D6614E3EBB27AAC717E8913C968C88EC1476289C4CDD9232D617C200166A
50,080,544 UART: Caliptra RT
50,081,258 UART: [state] CFI Enabled
53,468,875 UART: Disabled attest: DPE valid fail
53,470,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,471,573 UART: [rt] RT listening for mailbox commands...
53,502,678 UART: [rt]cmd =0x494e464f, len=4
53,506,670 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,783,183 ready_for_fw is high
3,783,597 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,135,401 >>> mbox cmd response: success
17,135,984 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,820,687 UART:
22,821,168 UART: Running Caliptra FMC ...
22,822,276 UART:
22,822,426 UART: [state] CFI Enabled
22,893,144 UART: [fht] FMC Alias Private Key: 7
25,230,624 UART: [art] Extend RT PCRs Done
25,231,844 UART: [art] Lock RT PCRs Done
25,233,604 UART: [art] Populate DV Done
25,239,014 UART: [fht] FMC Alias Private Key: 7
25,240,655 UART: [art] Derive CDI
25,241,383 UART: [art] Store in in slot 0x4
25,301,894 UART: [art] Derive Key Pair
25,302,930 UART: [art] Store priv key in slot 0x5
28,595,686 UART: [art] Derive Key Pair - Done
28,608,730 UART: [art] Signing Cert with AUTHO
28,610,033 UART: RITY.KEYID = 7
30,897,851 UART: [art] Erasing AUTHORITY.KEYID = 7
30,899,384 UART: [art] PUB.X = 4C56E8535D25BC9BC84B45978185ED9A74C82EFA3A02B6E1ED315052C909191286AEBAB2EFA767EF99E7FA042356EB87
30,906,625 UART: [art] PUB.Y = D36A2D680F3FCD2F5505A67B1CF844A3F2C236EC4A94C52773EE3D6404BEDEEBB6A79257120C077067B1940B958BD6E9
30,913,840 UART: [art] SIG.R = C30E043D925DFC322062BFB29811E2B786BC3554F90D4414C12441084FC4F8A956A848309DCEC956F9B0D45DB861B07E
30,921,207 UART: [art] SIG.S = 8E4BE438CCFB703633FE39B31A07A699ECAA9C29F68996833F816DFCEC1F5795DDE486915CD3349F5BAD6DBA7A1BE0B4
32,225,493 UART: mbox::rt_entry...
32,226,430 UART: ____ _ _ _ ____ _____
32,228,441 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,230,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,232,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,234,313 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,236,234 UART: |_|
32,237,032 UART:
32,350,212 UART: [rt] Runtime listening for mailbox commands...
32,356,049 >>> mbox cmd response data (3272 bytes)
32,371,855 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,405,258 >>> mbox cmd response data (0 bytes)
34,463,508 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,175,037 >>> mbox cmd response: success
43,208,501 UART:
43,208,848 UART: Running Caliptra FMC ...
43,209,965 UART:
43,210,128 UART: [state] CFI Enabled
43,299,744 UART: [art] Extend RT PCRs Done
43,300,926 UART: [art] Lock RT PCRs Done
43,302,177 UART: [art] Populate DV Done
43,307,694 UART: [fht] FMC Alias Private Key: 7
43,309,390 UART: [art] Derive CDI
43,310,199 UART: [art] Store in in slot 0x4
43,368,824 UART: [art] Derive Key Pair
43,369,853 UART: [art] Store priv key in slot 0x5
46,661,758 UART: [art] Derive Key Pair - Done
46,675,028 UART: [art] Signing Cert with AUTHO
46,676,326 UART: RITY.KEYID = 7
48,963,458 UART: [art] Erasing AUTHORITY.KEYID = 7
48,964,963 UART: [art] PUB.X = 220FD4C2A01C640C8D1BC8412797CE401DAA514E8028BF0A96B0F16D93B04601BC173A4F68100D5A7F6878E04CFC4A69
48,972,206 UART: [art] PUB.Y = 96483A9A11B2C73F0E80E4D3A2AC5CA4FD26EBEF7A6FD6FD13D2D3844DE3E5801B07F81F0452EBFC7ED4FAF5DF16979B
48,979,464 UART: [art] SIG.R = D597E05D48EA717AE9D244549C4A04D7A4466F36F9F885602FC5D3328BD3A8983A4640ADC837B78ECE96AB14C7614725
48,986,838 UART: [art] SIG.S = BED5100B6567AD2C3DA47B241FF6FBE847EC6D1798B7AC57C214446F0CE2AD70940B86C06CA1178D68A2FBA493B27582
50,291,877 UART: Caliptra RT
50,292,589 UART: [state] CFI Enabled
53,678,144 UART: Disabled attest: DPE valid fail
53,679,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,680,888 UART: [rt] RT listening for mailbox commands...
53,711,948 UART: [rt]cmd =0x494e464f, len=4
53,716,066 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,333 UART:
192,704 UART: Running Caliptra ROM ...
193,801 UART:
603,658 UART: [state] CFI Enabled
619,017 UART: [state] LifecycleState = Unprovisioned
620,965 UART: [state] DebugLocked = No
623,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,524 UART: [kat] SHA2-256
797,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,845 UART: [kat] ++
808,325 UART: [kat] sha1
818,915 UART: [kat] SHA2-256
821,639 UART: [kat] SHA2-384
826,839 UART: [kat] SHA2-512-ACC
829,214 UART: [kat] ECC-384
3,114,308 UART: [kat] HMAC-384Kdf
3,125,848 UART: [kat] LMS
4,316,011 UART: [kat] --
4,320,675 UART: [cold-reset] ++
4,322,181 UART: [fht] Storing FHT @ 0x50003400
4,334,680 UART: [idev] ++
4,335,292 UART: [idev] CDI.KEYID = 6
4,336,196 UART: [idev] SUBJECT.KEYID = 7
4,337,447 UART: [idev] UDS.KEYID = 0
4,338,404 ready_for_fw is high
4,338,601 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,437,461 UART: [idev] Erasing UDS.KEYID = 0
7,623,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,360 UART: [idev] --
7,648,536 UART: [ldev] ++
7,649,102 UART: [ldev] CDI.KEYID = 6
7,650,062 UART: [ldev] SUBJECT.KEYID = 5
7,651,276 UART: [ldev] AUTHORITY.KEYID = 7
7,652,564 UART: [ldev] FE.KEYID = 1
7,664,935 UART: [ldev] Erasing FE.KEYID = 1
10,950,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,196 UART: [ldev] --
13,313,136 UART: [fwproc] Waiting for Commands...
13,315,553 UART: [fwproc] Received command 0x46574c44
13,317,730 UART: [fwproc] Received Image of size 78676 bytes
16,940,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,022,506 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,091,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,285,203 >>> mbox cmd response: success
17,285,809 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,288,862 UART: [afmc] ++
17,289,455 UART: [afmc] CDI.KEYID = 6
17,290,366 UART: [afmc] SUBJECT.KEYID = 7
17,291,634 UART: [afmc] AUTHORITY.KEYID = 5
20,603,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,898,970 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,901,281 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,915,632 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,930,446 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,944,876 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,965,804 UART: [afmc] --
22,969,445 UART: [cold-reset] --
22,974,338 UART: [state] Locking Datavault
22,980,231 UART: [state] Locking PCR0, PCR1 and PCR31
22,981,925 UART: [state] Locking ICCM
22,984,210 UART: [exit] Launching FMC @ 0x40000130
22,992,597 UART:
22,992,839 UART: Running Caliptra FMC ...
22,993,941 UART:
22,994,098 UART: [state] CFI Enabled
23,002,197 UART: [fht] FMC Alias Private Key: 7
25,332,799 UART: [art] Extend RT PCRs Done
25,334,016 UART: [art] Lock RT PCRs Done
25,335,828 UART: [art] Populate DV Done
25,341,508 UART: [fht] FMC Alias Private Key: 7
25,343,159 UART: [art] Derive CDI
25,343,898 UART: [art] Store in in slot 0x4
25,386,603 UART: [art] Derive Key Pair
25,387,638 UART: [art] Store priv key in slot 0x5
28,629,425 UART: [art] Derive Key Pair - Done
28,642,529 UART: [art] Signing Cert with AUTHO
28,643,836 UART: RITY.KEYID = 7
30,923,139 UART: [art] Erasing AUTHORITY.KEYID = 7
30,924,645 UART: [art] PUB.X = 8B18870C9E7712B71656F197830178E693932BDC4C8DC3F11DEF25829CB140084695D88D3F73CDF897E51E22D56E48C4
30,931,836 UART: [art] PUB.Y = 12D11A084D3D2AD2A661AF3E6DD414F5EF73881FF53F02807E9DF95ABA3C7D897991E9AA000D22CBA79118E81CEED9A9
30,939,119 UART: [art] SIG.R = BF6FFE1395CFE38549E143565AACED752C498ADAEE703D1AC3B0B18A95C8D8E27646226CBA25ABE37456E44F810EC835
30,946,514 UART: [art] SIG.S = 9EA7E16112C69BEEB49831C69CE069A6BA2B31788C459E4C9C3227CEE6632B2D0305AD2223D91FF4115BB7B63FEA6FB9
32,251,232 UART: mbox::rt_entry...
32,252,193 UART: ____ _ _ _ ____ _____
32,254,118 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,256,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,257,979 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,259,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,261,754 UART: |_|
32,262,636 UART:
32,376,198 UART: [rt] Runtime listening for mailbox commands...
32,382,046 >>> mbox cmd response data (3272 bytes)
32,397,799 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,431,193 >>> mbox cmd response data (0 bytes)
34,490,451 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,634,623 UART:
34,635,002 UART: Running Caliptra ROM ...
34,636,058 UART:
34,636,268 UART: [state] CFI Enabled
34,650,123 UART: [state] LifecycleState = Unprovisioned
34,652,060 UART: [state] DebugLocked = No
34,654,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,659,346 UART: [kat] SHA2-256
34,829,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,839,523 UART: [kat] ++
34,840,034 UART: [kat] sha1
34,851,997 UART: [kat] SHA2-256
34,854,683 UART: [kat] SHA2-384
34,861,816 UART: [kat] SHA2-512-ACC
34,864,227 UART: [kat] ECC-384
37,148,578 UART: [kat] HMAC-384Kdf
37,160,060 UART: [kat] LMS
38,350,134 UART: [kat] --
38,354,581 UART: [update-reset] ++
42,491,500 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,495,608 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,877,608 >>> mbox cmd response: success
42,882,353 UART: [update-reset] Copying MAN_2 To MAN_1
42,900,534 UART: [update-reset Success] --
42,905,479 UART: [state] Locking Datavault
42,907,515 UART: [state] Locking PCR0, PCR1 and PCR31
42,909,291 UART: [state] Locking ICCM
42,911,877 UART: [exit] Launching FMC @ 0x40000130
42,920,272 UART:
42,920,505 UART: Running Caliptra FMC ...
42,921,603 UART:
42,921,761 UART: [state] CFI Enabled
42,966,027 UART: [art] Extend RT PCRs Done
42,967,221 UART: [art] Lock RT PCRs Done
42,968,678 UART: [art] Populate DV Done
42,974,087 UART: [fht] FMC Alias Private Key: 7
42,975,676 UART: [art] Derive CDI
42,976,491 UART: [art] Store in in slot 0x4
43,018,983 UART: [art] Derive Key Pair
43,019,978 UART: [art] Store priv key in slot 0x5
46,262,243 UART: [art] Derive Key Pair - Done
46,275,275 UART: [art] Signing Cert with AUTHO
46,276,588 UART: RITY.KEYID = 7
48,556,266 UART: [art] Erasing AUTHORITY.KEYID = 7
48,557,776 UART: [art] PUB.X = 0CB515C44FC5979DC60651A0D78A78A9369E648C76B2798B09303F67D5AD80F4B12E661B9796F7241F4082502E9D6FEF
48,564,992 UART: [art] PUB.Y = 9503771DD7E99525B93B164C631EFDCC1ED3889A553180015AAF6C2E2EB2D65CDCFCAF090847D6A03F44C3AD23BB9961
48,572,239 UART: [art] SIG.R = ADBD547026938924744B34426C0125CEE67117EC5C0944272332A498691DF09B2EFD706B7D1668F6D0C1B55C47497EE1
48,579,618 UART: [art] SIG.S = F29D474332297923EF7FD1EDDD7968B9D226AFD612E7910D30A46B734D4ADEF0D2996EBED3A7BB8207A7CF154A7A2929
49,885,407 UART: Caliptra RT
49,886,107 UART: [state] CFI Enabled
53,178,943 UART: Disabled attest: DPE valid fail
53,180,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,181,323 UART: [rt] RT listening for mailbox commands...
53,212,280 UART: [rt]cmd =0x494e464f, len=4
53,216,109 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,129,878 ready_for_fw is high
4,130,256 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,343,429 >>> mbox cmd response: success
17,343,975 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,983,930 UART:
22,984,311 UART: Running Caliptra FMC ...
22,985,448 UART:
22,985,602 UART: [state] CFI Enabled
22,993,663 UART: [fht] FMC Alias Private Key: 7
25,324,721 UART: [art] Extend RT PCRs Done
25,325,955 UART: [art] Lock RT PCRs Done
25,327,636 UART: [art] Populate DV Done
25,333,064 UART: [fht] FMC Alias Private Key: 7
25,334,723 UART: [art] Derive CDI
25,335,685 UART: [art] Store in in slot 0x4
25,378,099 UART: [art] Derive Key Pair
25,379,106 UART: [art] Store priv key in slot 0x5
28,621,301 UART: [art] Derive Key Pair - Done
28,634,042 UART: [art] Signing Cert with AUTHO
28,635,356 UART: RITY.KEYID = 7
30,914,932 UART: [art] Erasing AUTHORITY.KEYID = 7
30,916,442 UART: [art] PUB.X = 736A2EE61642805BFC4977EFD013A469A270D9B2A3C55A696615F3F7BC28D3485078099F53275EF2EA09E78C557BF50D
30,923,664 UART: [art] PUB.Y = BA8F6AC8544E551C5A0944503E1F65F53F5F53141369CCDBC9CB52584DB84CC415682D8488980F6BA2BABBE49A0A2CAC
30,930,924 UART: [art] SIG.R = 6E4B4B28ED377A4A41C45921E64C39F8CF007EB8DD0D99B3D3532BC31A094EE929E14AC629A1CFACCCF426FDDD11E6C1
30,938,333 UART: [art] SIG.S = 73A64F5D2044487239C21176D72FA6626424E1CED710ECEF342D1982A730B57AE246C452B95AF5DD31C99AEAA97F7DBE
32,244,047 UART: mbox::rt_entry...
32,245,009 UART: ____ _ _ _ ____ _____
32,246,998 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,248,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,250,930 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,252,889 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,254,858 UART: |_|
32,255,697 UART:
32,370,276 UART: [rt] Runtime listening for mailbox commands...
32,376,082 >>> mbox cmd response data (3272 bytes)
32,391,728 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,425,126 >>> mbox cmd response data (0 bytes)
34,482,826 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,137,688 >>> mbox cmd response: success
43,171,808 UART:
43,172,114 UART: Running Caliptra FMC ...
43,173,152 UART:
43,173,298 UART: [state] CFI Enabled
43,217,296 UART: [art] Extend RT PCRs Done
43,218,487 UART: [art] Lock RT PCRs Done
43,220,075 UART: [art] Populate DV Done
43,225,536 UART: [fht] FMC Alias Private Key: 7
43,227,072 UART: [art] Derive CDI
43,227,803 UART: [art] Store in in slot 0x4
43,269,970 UART: [art] Derive Key Pair
43,271,009 UART: [art] Store priv key in slot 0x5
46,513,180 UART: [art] Derive Key Pair - Done
46,526,264 UART: [art] Signing Cert with AUTHO
46,527,579 UART: RITY.KEYID = 7
48,807,387 UART: [art] Erasing AUTHORITY.KEYID = 7
48,808,897 UART: [art] PUB.X = 39A02F2136D079F6AA99DCBE5475ADE4847BCA71CC7593C4E6C965E5D42D64DB2839E4844AA27100D31B4B45E852B2E6
48,816,179 UART: [art] PUB.Y = FF2621E8D83E684AAEFF80E29566BAA1D9B5042D73C15E9656B3600E123F621B699E45F42BCB9E16695064A950AC5CD8
48,823,432 UART: [art] SIG.R = 5FB752001996EB4FA223E3E42F95854CEBF1F789D9FDD2B80DE853ACB9B9CDAFFC18D328DD8BA2F9FE300118A594804E
48,830,791 UART: [art] SIG.S = 469B7E9809F5C1D896EDD60245BA372FAB02BA215E2C2A3828294449C572FF4BAAE3E1889F652781D4C1B1781E54F695
50,136,286 UART: Caliptra RT
50,136,995 UART: [state] CFI Enabled
53,431,023 UART: Disabled attest: DPE valid fail
53,432,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,433,656 UART: [rt] RT listening for mailbox commands...
53,464,926 UART: [rt]cmd =0x494e464f, len=4
53,468,759 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,610 writing to cptra_bootfsm_go
192,780 UART:
193,136 UART: Running Caliptra ROM ...
194,319 UART:
194,472 UART: [state] CFI Enabled
263,504 UART: [state] LifecycleState = Unprovisioned
265,420 UART: [state] DebugLocked = No
268,157 UART: [state] WD Timer not started. Device not locked for debugging
272,770 UART: [kat] SHA2-256
451,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,432 UART: [kat] ++
463,972 UART: [kat] sha1
474,736 UART: [kat] SHA2-256
477,714 UART: [kat] SHA2-384
484,350 UART: [kat] SHA2-512-ACC
487,288 UART: [kat] ECC-384
2,947,928 UART: [kat] HMAC-384Kdf
2,970,997 UART: [kat] LMS
3,500,441 UART: [kat] --
3,504,746 UART: [cold-reset] ++
3,506,334 UART: [fht] FHT @ 0x50003400
3,518,048 UART: [idev] ++
3,518,667 UART: [idev] CDI.KEYID = 6
3,519,556 UART: [idev] SUBJECT.KEYID = 7
3,520,808 UART: [idev] UDS.KEYID = 0
3,521,746 ready_for_fw is high
3,521,938 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,620,948 UART: [idev] Erasing UDS.KEYID = 0
6,025,871 UART: [idev] Sha1 KeyId Algorithm
6,049,260 UART: [idev] --
6,052,718 UART: [ldev] ++
6,053,291 UART: [ldev] CDI.KEYID = 6
6,054,205 UART: [ldev] SUBJECT.KEYID = 5
6,055,422 UART: [ldev] AUTHORITY.KEYID = 7
6,056,658 UART: [ldev] FE.KEYID = 1
6,090,749 UART: [ldev] Erasing FE.KEYID = 1
8,593,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,906 UART: [ldev] --
10,404,261 UART: [fwproc] Wait for Commands...
10,406,306 UART: [fwproc] Recv command 0x46574c44
10,408,420 UART: [fwproc] Recv'd Img size: 78632 bytes
13,374,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,447,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,516,317 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,708,933 >>> mbox cmd response: success
13,709,408 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,713,969 UART: [afmc] ++
13,714,552 UART: [afmc] CDI.KEYID = 6
13,715,469 UART: [afmc] SUBJECT.KEYID = 7
13,716,633 UART: [afmc] AUTHORITY.KEYID = 5
16,244,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,967,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,969,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,985,211 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,001,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,017,082 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,040,085 UART: [afmc] --
18,044,123 UART: [cold-reset] --
18,048,645 UART: [state] Locking Datavault
18,053,298 UART: [state] Locking PCR0, PCR1 and PCR31
18,054,945 UART: [state] Locking ICCM
18,056,589 UART: [exit] Launching FMC @ 0x40000130
18,064,988 UART:
18,065,239 UART: Running Caliptra FMC ...
18,066,346 UART:
18,066,513 UART: [state] CFI Enabled
18,126,795 UART: [fht] FMC Alias Private Key: 7
19,890,438 UART: [art] Extend RT PCRs Done
19,891,647 UART: [art] Lock RT PCRs Done
19,893,644 UART: [art] Populate DV Done
19,898,999 UART: [fht] FMC Alias Private Key: 7
19,900,592 UART: [art] Derive CDI
19,901,426 UART: [art] Store in in slot 0x4
19,959,322 UART: [art] Derive Key Pair
19,960,359 UART: [art] Store priv key in slot 0x5
22,422,851 UART: [art] Derive Key Pair - Done
22,435,743 UART: [art] Signing Cert with AUTHO
22,437,054 UART: RITY.KEYID = 7
24,148,078 UART: [art] Erasing AUTHORITY.KEYID = 7
24,149,585 UART: [art] PUB.X = 39635BA81A46E023C0C3BE1F1A0A1A96666A60CA62E7108721CBC6A83303139965FA5A911DEDE6CD43EAD43AD0F4D242
24,156,847 UART: [art] PUB.Y = 6D0DB85D14210FA6535BDD013F0E3FA4D1A58E005519C772FE7D400A9E07B9DFB85C9A63F3B890CBB8998AE5B624B309
24,164,076 UART: [art] SIG.R = A92EDC375C4044F464146FFA1F310530F3ACCEE73EAB5D229ED9B6A9682F6CA2F1A548E97E67D8D2585905D34C9F5CDC
24,171,521 UART: [art] SIG.S = 27DD6A7911BF34CC15ECD6FB5C6D766B3530BC311801259436E0225B6717FA169DAAA4B3BE7652EC076C0333CF9BE42E
25,150,297 UART: mbox::rt_entry...
25,151,249 UART: ____ _ _ _ ____ _____
25,153,230 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,155,234 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,157,169 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,159,123 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,161,061 UART: |_|
25,161,957 UART:
25,275,377 UART: [rt] Runtime listening for mailbox commands...
25,281,179 >>> mbox cmd response data (3272 bytes)
25,296,846 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,330,282 >>> mbox cmd response data (0 bytes)
27,390,980 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,535,781 UART:
27,536,178 UART: Running Caliptra ROM ...
27,537,248 UART:
27,537,402 UART: [state] CFI Enabled
27,599,443 UART: [state] LifecycleState = Unprovisioned
27,601,324 UART: [state] DebugLocked = No
27,603,657 UART: [state] WD Timer not started. Device not locked for debugging
27,606,965 UART: [kat] SHA2-256
27,786,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,797,678 UART: [kat] ++
27,798,134 UART: [kat] sha1
27,808,639 UART: [kat] SHA2-256
27,811,648 UART: [kat] SHA2-384
27,816,993 UART: [kat] SHA2-512-ACC
27,819,942 UART: [kat] ECC-384
30,285,505 UART: [kat] HMAC-384Kdf
30,306,807 UART: [kat] LMS
30,836,225 UART: [kat] --
30,838,614 UART: [update-reset] ++
34,260,549 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,263,659 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
34,646,683 >>> mbox cmd response: success
34,651,161 UART: [update-reset] Copying MAN_2 To MAN_1
34,670,384 UART: [update-reset Success] --
34,675,113 UART: [state] Locking Datavault
34,679,354 UART: [state] Locking PCR0, PCR1 and PCR31
34,681,011 UART: [state] Locking ICCM
34,683,110 UART: [exit] Launching FMC @ 0x40000130
34,691,505 UART:
34,691,745 UART: Running Caliptra FMC ...
34,693,117 UART:
34,693,285 UART: [state] CFI Enabled
34,797,758 UART: [art] Extend RT PCRs Done
34,798,970 UART: [art] Lock RT PCRs Done
34,800,266 UART: [art] Populate DV Done
34,805,946 UART: [fht] FMC Alias Private Key: 7
34,807,537 UART: [art] Derive CDI
34,808,353 UART: [art] Store in in slot 0x4
34,867,176 UART: [art] Derive Key Pair
34,868,179 UART: [art] Store priv key in slot 0x5
37,331,261 UART: [art] Derive Key Pair - Done
37,344,427 UART: [art] Signing Cert with AUTHO
37,345,735 UART: RITY.KEYID = 7
39,056,392 UART: [art] Erasing AUTHORITY.KEYID = 7
39,057,903 UART: [art] PUB.X = 2D98053D20C7390866E2B340311E03C28361FE4F0BE00397F255F814F930212CE1A2057AEBD76817447DC61EFB089C37
39,065,144 UART: [art] PUB.Y = CB3C100D87723B7451FDB6AA53E4003AC2BE901DD754500FE4E055BD8E2E4A7E9EA37577FB99DEB04F020096806B0AB1
39,072,361 UART: [art] SIG.R = 762B313F6B4661D3153D19D8D35B4B97324D35CAB8AEF31BB880E99A56ECD6ABE73F09F94FBADEB587F0BC00366DB2E9
39,079,803 UART: [art] SIG.S = ABB95B09F9BC8B235CDC47A89A087067180E898521716F222C95B9E69170EFECDC82A172AE1503790D7EC92FC67987F2
40,058,569 UART: Caliptra RT
40,059,278 UART: [state] CFI Enabled
42,619,030 UART: Disabled attest: DPE valid fail
42,620,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,621,881 UART: [rt] RT listening for mailbox commands...
42,653,005 UART: [rt]cmd =0x494e464f, len=4
42,657,103 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,461 UART:
192,828 UART: Running Caliptra ROM ...
193,998 UART:
194,156 UART: [state] CFI Enabled
263,548 UART: [state] LifecycleState = Unprovisioned
265,966 UART: [state] DebugLocked = No
267,068 UART: [state] WD Timer not started. Device not locked for debugging
270,621 UART: [kat] SHA2-256
460,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,203 UART: [kat] ++
471,657 UART: [kat] sha1
482,670 UART: [kat] SHA2-256
485,680 UART: [kat] SHA2-384
491,742 UART: [kat] SHA2-512-ACC
494,332 UART: [kat] ECC-384
2,951,244 UART: [kat] HMAC-384Kdf
2,973,149 UART: [kat] LMS
3,504,934 UART: [kat] --
3,509,245 UART: [cold-reset] ++
3,510,197 UART: [fht] FHT @ 0x50003400
3,521,893 UART: [idev] ++
3,522,532 UART: [idev] CDI.KEYID = 6
3,523,562 UART: [idev] SUBJECT.KEYID = 7
3,524,739 UART: [idev] UDS.KEYID = 0
3,525,927 ready_for_fw is high
3,526,167 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,625,300 UART: [idev] Erasing UDS.KEYID = 0
6,030,674 UART: [idev] Sha1 KeyId Algorithm
6,053,688 UART: [idev] --
6,058,260 UART: [ldev] ++
6,059,004 UART: [ldev] CDI.KEYID = 6
6,059,895 UART: [ldev] SUBJECT.KEYID = 5
6,061,018 UART: [ldev] AUTHORITY.KEYID = 7
6,062,263 UART: [ldev] FE.KEYID = 1
6,101,110 UART: [ldev] Erasing FE.KEYID = 1
8,607,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,948 UART: [ldev] --
10,414,911 UART: [fwproc] Wait for Commands...
10,416,682 UART: [fwproc] Recv command 0x46574c44
10,418,990 UART: [fwproc] Recv'd Img size: 78632 bytes
13,423,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,506,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,622,200 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,951,096 >>> mbox cmd response: success
13,951,575 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,955,441 UART: [afmc] ++
13,956,132 UART: [afmc] CDI.KEYID = 6
13,957,323 UART: [afmc] SUBJECT.KEYID = 7
13,958,813 UART: [afmc] AUTHORITY.KEYID = 5
16,492,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,235,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,237,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,253,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,268,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,283,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,307,043 UART: [afmc] --
18,310,653 UART: [cold-reset] --
18,314,898 UART: [state] Locking Datavault
18,320,268 UART: [state] Locking PCR0, PCR1 and PCR31
18,322,464 UART: [state] Locking ICCM
18,324,614 UART: [exit] Launching FMC @ 0x40000130
18,333,287 UART:
18,333,524 UART: Running Caliptra FMC ...
18,334,626 UART:
18,334,790 UART: [state] CFI Enabled
18,395,560 UART: [fht] FMC Alias Private Key: 7
20,160,134 UART: [art] Extend RT PCRs Done
20,161,349 UART: [art] Lock RT PCRs Done
20,162,811 UART: [art] Populate DV Done
20,168,292 UART: [fht] FMC Alias Private Key: 7
20,169,888 UART: [art] Derive CDI
20,170,704 UART: [art] Store in in slot 0x4
20,228,744 UART: [art] Derive Key Pair
20,229,793 UART: [art] Store priv key in slot 0x5
22,693,216 UART: [art] Derive Key Pair - Done
22,705,731 UART: [art] Signing Cert with AUTHO
22,707,044 UART: RITY.KEYID = 7
24,418,756 UART: [art] Erasing AUTHORITY.KEYID = 7
24,420,264 UART: [art] PUB.X = ED4A671F8FC91C9D7FB2DA9E6B54603F3AE3255EF719014A4051FF07F80EDBC1AAB2B8EAD59E65F6C746B4A817890D01
24,427,556 UART: [art] PUB.Y = 82AAD1CB601447BA29DD786B2FE3688D638F41D2A43B49E28263D38583043C9FC035EE6DBC4E971E77434A2FBDF000E9
24,434,827 UART: [art] SIG.R = AB1491CBF2108014323224338E06B957DDDD69BB33991FEAEED822A287146DE5C226351C8C07A49DC194F06233E4CED4
24,442,215 UART: [art] SIG.S = A33EDB53C86181866C2531407572AB59ECA612F9C2E8AC8EBE3A288D421B15D4C7289511D05FE07350C4F721D60B582B
25,420,120 UART: mbox::rt_entry...
25,421,076 UART: ____ _ _ _ ____ _____
25,423,007 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,425,035 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,426,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,428,821 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,430,700 UART: |_|
25,431,528 UART:
25,545,464 UART: [rt] Runtime listening for mailbox commands...
25,551,261 >>> mbox cmd response data (3272 bytes)
25,567,182 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,600,588 >>> mbox cmd response data (0 bytes)
27,659,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,803,906 UART:
27,804,260 UART: Running Caliptra ROM ...
27,806,018 UART:
27,806,221 UART: [state] CFI Enabled
27,874,202 UART: [state] LifecycleState = Unprovisioned
27,876,290 UART: [state] DebugLocked = No
27,878,927 UART: [state] WD Timer not started. Device not locked for debugging
27,883,067 UART: [kat] SHA2-256
28,072,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,083,689 UART: [kat] ++
28,084,193 UART: [kat] sha1
28,096,059 UART: [kat] SHA2-256
28,099,089 UART: [kat] SHA2-384
28,105,193 UART: [kat] SHA2-512-ACC
28,107,816 UART: [kat] ECC-384
30,556,192 UART: [kat] HMAC-384Kdf
30,579,078 UART: [kat] LMS
31,110,617 UART: [kat] --
31,114,661 UART: [update-reset] ++
34,575,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,579,653 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,187,374 >>> mbox cmd response: success
35,191,989 UART: [update-reset] Copying MAN_2 To MAN_1
35,225,573 UART: [update-reset Success] --
35,230,530 UART: [state] Locking Datavault
35,233,150 UART: [state] Locking PCR0, PCR1 and PCR31
35,235,303 UART: [state] Locking ICCM
35,238,221 UART: [exit] Launching FMC @ 0x40000130
35,246,875 UART:
35,247,155 UART: Running Caliptra FMC ...
35,248,333 UART:
35,248,504 UART: [state] CFI Enabled
35,347,372 UART: [art] Extend RT PCRs Done
35,348,565 UART: [art] Lock RT PCRs Done
35,350,104 UART: [art] Populate DV Done
35,355,454 UART: [fht] FMC Alias Private Key: 7
35,357,094 UART: [art] Derive CDI
35,357,833 UART: [art] Store in in slot 0x4
35,416,534 UART: [art] Derive Key Pair
35,417,580 UART: [art] Store priv key in slot 0x5
37,880,992 UART: [art] Derive Key Pair - Done
37,893,990 UART: [art] Signing Cert with AUTHO
37,895,318 UART: RITY.KEYID = 7
39,606,803 UART: [art] Erasing AUTHORITY.KEYID = 7
39,608,327 UART: [art] PUB.X = 8954D93A0BE0E650E25D2498C6143DBA2AA001F3A79C88127992828C08034439683DC59D012D8E9A64EF752CB1B3A7FB
39,615,588 UART: [art] PUB.Y = 6D2BF015759A82E191340A35AE981E479A864E164EFD5AE3DCB939B5A78A2E8A2B3E04A78683525A771AF919EAF37DE6
39,622,825 UART: [art] SIG.R = 61DB1A8E621ED522122217FD1674D094A94AE8F2EE39B60DA3899EB37541B68882883D9C29CFEA2E00CD8922344AA28A
39,630,163 UART: [art] SIG.S = AFF52845513CF1AC70DBEEB6D426DCE22E3E6F08643855529D362DE3531D4F193ABF6D7FF3ACE082587F994F76B6B86F
40,608,921 UART: Caliptra RT
40,609,634 UART: [state] CFI Enabled
43,171,487 UART: Disabled attest: DPE valid fail
43,173,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,173,961 UART: [rt] RT listening for mailbox commands...
43,205,125 UART: [rt]cmd =0x494e464f, len=4
43,209,073 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
3,441,111 ready_for_fw is high
3,441,493 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,945,559 >>> mbox cmd response: success
13,946,103 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,237,489 UART:
18,237,880 UART: Running Caliptra FMC ...
18,238,972 UART:
18,239,122 UART: [state] CFI Enabled
18,304,822 UART: [fht] FMC Alias Private Key: 7
20,069,122 UART: [art] Extend RT PCRs Done
20,070,343 UART: [art] Lock RT PCRs Done
20,071,993 UART: [art] Populate DV Done
20,077,138 UART: [fht] FMC Alias Private Key: 7
20,078,680 UART: [art] Derive CDI
20,079,415 UART: [art] Store in in slot 0x4
20,137,527 UART: [art] Derive Key Pair
20,138,529 UART: [art] Store priv key in slot 0x5
22,601,619 UART: [art] Derive Key Pair - Done
22,614,615 UART: [art] Signing Cert with AUTHO
22,615,915 UART: RITY.KEYID = 7
24,326,867 UART: [art] Erasing AUTHORITY.KEYID = 7
24,328,375 UART: [art] PUB.X = F0753FBC88DF6252C729A440FDEF09947F5F1FD76BECB531AC8868C59E19EC487B6039C1D1604EB7B364083EE1D9B388
24,335,668 UART: [art] PUB.Y = 1876EF155D8354B117B05F68BA636C5CF04E39B5C410B7BED19F5BBBF27666D420C54889745C22CCFB93536351B535FF
24,342,896 UART: [art] SIG.R = 1491C08054DD3C54CA7854604B0C3365FCBB8D2A955FE6E48AC826D7C6A08461E5FBD44FABF17CDF01D67EA42C142875
24,350,336 UART: [art] SIG.S = CCC8F285203F18AEEBBAC8602C3429FB94740E2A9E445AB7BEEB49F6D416C432DC9C4E6FE3E74F91CD3C35FFB2F293F2
25,328,917 UART: mbox::rt_entry...
25,329,874 UART: ____ _ _ _ ____ _____
25,331,854 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,333,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,335,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,337,685 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,339,640 UART: |_|
25,340,449 UART:
25,454,651 UART: [rt] Runtime listening for mailbox commands...
25,460,448 >>> mbox cmd response data (3272 bytes)
25,476,041 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,509,448 >>> mbox cmd response data (0 bytes)
27,566,867 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,387,354 >>> mbox cmd response: success
35,422,626 UART:
35,422,938 UART: Running Caliptra FMC ...
35,424,060 UART:
35,424,240 UART: [state] CFI Enabled
35,511,713 UART: [art] Extend RT PCRs Done
35,512,918 UART: [art] Lock RT PCRs Done
35,514,378 UART: [art] Populate DV Done
35,519,735 UART: [fht] FMC Alias Private Key: 7
35,521,441 UART: [art] Derive CDI
35,522,265 UART: [art] Store in in slot 0x4
35,580,677 UART: [art] Derive Key Pair
35,581,679 UART: [art] Store priv key in slot 0x5
38,044,547 UART: [art] Derive Key Pair - Done
38,057,550 UART: [art] Signing Cert with AUTHO
38,058,865 UART: RITY.KEYID = 7
39,770,602 UART: [art] Erasing AUTHORITY.KEYID = 7
39,772,101 UART: [art] PUB.X = B0E60183531364AB09AA190E5378E301B9A3134B456A0BA0C5B26DF7E0BDCCE379435155F7F7120B2806EA7332DA501D
39,779,390 UART: [art] PUB.Y = 49C4BE6C241EBEE13FAEAF4734F58A3DB58C2FCC11CCE603B81346C24FEC24F2F256ECB09BB6CFBC216B2CB1B4846641
39,786,711 UART: [art] SIG.R = 984229B09505B5622F5BD953519649FDBEC18D23DDFAF8B1F642E2B388508B5138916C08DE12321668531BD79734A355
39,794,023 UART: [art] SIG.S = 181AAE81F8DEC6BD3277E2A27341A325A2B0B50D1E82ABF6581B7BA1FA5D8DA20FD9B34BA99B8369313B597D2F31866E
40,773,289 UART: Caliptra RT
40,773,997 UART: [state] CFI Enabled
43,335,307 UART: Disabled attest: DPE valid fail
43,337,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,337,879 UART: [rt] RT listening for mailbox commands...
43,368,998 UART: [rt]cmd =0x494e464f, len=4
43,372,933 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,565 UART:
192,937 UART: Running Caliptra ROM ...
194,113 UART:
603,706 UART: [state] CFI Enabled
616,599 UART: [state] LifecycleState = Unprovisioned
618,982 UART: [state] DebugLocked = No
621,574 UART: [state] WD Timer not started. Device not locked for debugging
626,863 UART: [kat] SHA2-256
816,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,535 UART: [kat] ++
828,135 UART: [kat] sha1
839,176 UART: [kat] SHA2-256
842,194 UART: [kat] SHA2-384
848,534 UART: [kat] SHA2-512-ACC
851,109 UART: [kat] ECC-384
3,293,640 UART: [kat] HMAC-384Kdf
3,306,722 UART: [kat] LMS
3,838,596 UART: [kat] --
3,843,892 UART: [cold-reset] ++
3,845,251 UART: [fht] FHT @ 0x50003400
3,856,720 UART: [idev] ++
3,857,453 UART: [idev] CDI.KEYID = 6
3,858,377 UART: [idev] SUBJECT.KEYID = 7
3,859,550 UART: [idev] UDS.KEYID = 0
3,860,475 ready_for_fw is high
3,860,672 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,959,541 UART: [idev] Erasing UDS.KEYID = 0
6,332,354 UART: [idev] Sha1 KeyId Algorithm
6,353,804 UART: [idev] --
6,359,577 UART: [ldev] ++
6,360,252 UART: [ldev] CDI.KEYID = 6
6,361,159 UART: [ldev] SUBJECT.KEYID = 5
6,362,313 UART: [ldev] AUTHORITY.KEYID = 7
6,363,538 UART: [ldev] FE.KEYID = 1
6,372,347 UART: [ldev] Erasing FE.KEYID = 1
8,850,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,869 UART: [ldev] --
10,643,711 UART: [fwproc] Wait for Commands...
10,645,586 UART: [fwproc] Recv command 0x46574c44
10,647,888 UART: [fwproc] Recv'd Img size: 78632 bytes
13,654,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,732,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,848,680 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,177,504 >>> mbox cmd response: success
14,177,983 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,182,268 UART: [afmc] ++
14,182,959 UART: [afmc] CDI.KEYID = 6
14,184,114 UART: [afmc] SUBJECT.KEYID = 7
14,185,646 UART: [afmc] AUTHORITY.KEYID = 5
16,692,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,412,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,414,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,430,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,445,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,460,176 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,482,715 UART: [afmc] --
18,486,751 UART: [cold-reset] --
18,490,667 UART: [state] Locking Datavault
18,493,977 UART: [state] Locking PCR0, PCR1 and PCR31
18,496,110 UART: [state] Locking ICCM
18,497,556 UART: [exit] Launching FMC @ 0x40000130
18,506,217 UART:
18,506,448 UART: Running Caliptra FMC ...
18,507,543 UART:
18,507,700 UART: [state] CFI Enabled
18,515,662 UART: [fht] FMC Alias Private Key: 7
20,272,267 UART: [art] Extend RT PCRs Done
20,273,484 UART: [art] Lock RT PCRs Done
20,275,268 UART: [art] Populate DV Done
20,280,678 UART: [fht] FMC Alias Private Key: 7
20,282,142 UART: [art] Derive CDI
20,282,884 UART: [art] Store in in slot 0x4
20,325,532 UART: [art] Derive Key Pair
20,326,573 UART: [art] Store priv key in slot 0x5
22,753,026 UART: [art] Derive Key Pair - Done
22,765,923 UART: [art] Signing Cert with AUTHO
22,767,221 UART: RITY.KEYID = 7
24,472,661 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,164 UART: [art] PUB.X = 73899143AEAE87B9FDD6E7DDBBD3A4BD0ACB59A75C4EE6780DB3D9250A4C5354B83DE595522576981E884380108926B2
24,481,415 UART: [art] PUB.Y = AD7BB7ED6E693A89CDF0C7215816A62CEA4901927E04C637EFFE45C2FC71D138EEBDB9E977AA5BA7B247CBCF8694446A
24,488,699 UART: [art] SIG.R = 7EB7B274E642AD509585F9C686C56F314087A6F0F20F9B6027ABB8C3272EEDA43F841D579A85F886C96C66D07F041287
24,496,104 UART: [art] SIG.S = 0132E4FA6B34CC131456E09A11D9C88188BAFC4552A735373D0CF28AD4871503B472188D3605B954BE0E2EC6E2B0DF20
25,473,952 UART: mbox::rt_entry...
25,474,916 UART: ____ _ _ _ ____ _____
25,476,845 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,478,848 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,480,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,482,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,484,632 UART: |_|
25,485,462 UART:
25,598,498 UART: [rt] Runtime listening for mailbox commands...
25,604,356 >>> mbox cmd response data (3272 bytes)
25,620,091 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,653,479 >>> mbox cmd response data (0 bytes)
27,712,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,857,815 UART:
27,858,183 UART: Running Caliptra ROM ...
27,859,230 UART:
27,859,440 UART: [state] CFI Enabled
27,872,811 UART: [state] LifecycleState = Unprovisioned
27,874,644 UART: [state] DebugLocked = No
27,875,995 UART: [state] WD Timer not started. Device not locked for debugging
27,880,759 UART: [kat] SHA2-256
28,070,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,081,351 UART: [kat] ++
28,081,870 UART: [kat] sha1
28,093,620 UART: [kat] SHA2-256
28,096,653 UART: [kat] SHA2-384
28,103,347 UART: [kat] SHA2-512-ACC
28,105,911 UART: [kat] ECC-384
30,548,470 UART: [kat] HMAC-384Kdf
30,561,301 UART: [kat] LMS
31,092,908 UART: [kat] --
31,096,898 UART: [update-reset] ++
34,556,598 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,560,192 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,167,965 >>> mbox cmd response: success
35,172,642 UART: [update-reset] Copying MAN_2 To MAN_1
35,207,255 UART: [update-reset Success] --
35,211,557 UART: [state] Locking Datavault
35,216,603 UART: [state] Locking PCR0, PCR1 and PCR31
35,218,741 UART: [state] Locking ICCM
35,220,082 UART: [exit] Launching FMC @ 0x40000130
35,228,698 UART:
35,228,940 UART: Running Caliptra FMC ...
35,230,112 UART:
35,230,276 UART: [state] CFI Enabled
35,274,380 UART: [art] Extend RT PCRs Done
35,275,573 UART: [art] Lock RT PCRs Done
35,277,245 UART: [art] Populate DV Done
35,282,811 UART: [fht] FMC Alias Private Key: 7
35,284,449 UART: [art] Derive CDI
35,285,258 UART: [art] Store in in slot 0x4
35,327,636 UART: [art] Derive Key Pair
35,328,634 UART: [art] Store priv key in slot 0x5
37,755,522 UART: [art] Derive Key Pair - Done
37,768,681 UART: [art] Signing Cert with AUTHO
37,769,987 UART: RITY.KEYID = 7
39,475,458 UART: [art] Erasing AUTHORITY.KEYID = 7
39,476,938 UART: [art] PUB.X = 833A9E1FA7D2C8824E1F8448B02435EE2CE92BCDF62EE9281AE4A64D95A3144A08D50A555E48DED72A1BE47701B0F3A2
39,484,242 UART: [art] PUB.Y = 35B14C6731791B37BBF5DDA5D90DD44241C36EF23EFDD353ACE63FCD3053901D1BB78AB9DC070AFDA6FC3F8D159F7481
39,491,527 UART: [art] SIG.R = 7550C5638BE0833E47C708AFB43D0CDFC56E92BAAF683B5DE1ECA04E8654076084F9002E33B56C0C5820CF19F7AEBB8D
39,498,918 UART: [art] SIG.S = 4779DAEBA6C5C074DFCAF684254867C90FD41937635761FCCCDD5DBEC9C4F850D59C88866CD59516340404138EA2190F
40,477,573 UART: Caliptra RT
40,478,280 UART: [state] CFI Enabled
42,956,521 UART: Disabled attest: DPE valid fail
42,958,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,959,266 UART: [rt] RT listening for mailbox commands...
42,990,376 UART: [rt]cmd =0x494e464f, len=4
42,994,432 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,748,398 ready_for_fw is high
3,748,836 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,177,337 >>> mbox cmd response: success
14,178,321 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,427,902 UART:
18,428,548 UART: Running Caliptra FMC ...
18,429,746 UART:
18,429,903 UART: [state] CFI Enabled
18,437,698 UART: [fht] FMC Alias Private Key: 7
20,194,185 UART: [art] Extend RT PCRs Done
20,195,413 UART: [art] Lock RT PCRs Done
20,197,119 UART: [art] Populate DV Done
20,202,591 UART: [fht] FMC Alias Private Key: 7
20,204,079 UART: [art] Derive CDI
20,204,837 UART: [art] Store in in slot 0x4
20,247,966 UART: [art] Derive Key Pair
20,248,959 UART: [art] Store priv key in slot 0x5
22,676,295 UART: [art] Derive Key Pair - Done
22,689,131 UART: [art] Signing Cert with AUTHO
22,690,431 UART: RITY.KEYID = 7
24,396,183 UART: [art] Erasing AUTHORITY.KEYID = 7
24,397,683 UART: [art] PUB.X = BA8AC390A18526335BED4A75D0F25E7ABFB0C92E33BDA6C6F457F403689956D6A1A131B79C7919488E548CF31F0897B6
24,404,926 UART: [art] PUB.Y = 655B6637377903BF41385BA166322C8DDBD80699216E5D4B213A38865700F31E3048063458556372CFAD023057423858
24,412,100 UART: [art] SIG.R = 2044A85FF9E860DEC415B30A7CEE687A955A9B07ABA35FE36D1E6D0413B7B46A0055DDBA50ECFB167602257CE1EFEB7D
24,419,549 UART: [art] SIG.S = 9FEEC0E31F3A93BC6F337D585745AE33D9E0D47DE0D6E8638AB646ADB19F0AB6040E65E055337D9B5F28AD28B3D39EE7
25,397,692 UART: mbox::rt_entry...
25,398,650 UART: ____ _ _ _ ____ _____
25,400,630 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,402,637 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,404,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,406,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,408,475 UART: |_|
25,409,364 UART:
25,523,156 UART: [rt] Runtime listening for mailbox commands...
25,529,003 >>> mbox cmd response data (3272 bytes)
25,545,040 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,578,451 >>> mbox cmd response data (0 bytes)
27,637,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,374,568 >>> mbox cmd response: success
35,407,753 UART:
35,408,096 UART: Running Caliptra FMC ...
35,409,147 UART:
35,409,319 UART: [state] CFI Enabled
35,453,785 UART: [art] Extend RT PCRs Done
35,454,935 UART: [art] Lock RT PCRs Done
35,456,408 UART: [art] Populate DV Done
35,461,697 UART: [fht] FMC Alias Private Key: 7
35,463,280 UART: [art] Derive CDI
35,464,023 UART: [art] Store in in slot 0x4
35,506,729 UART: [art] Derive Key Pair
35,507,722 UART: [art] Store priv key in slot 0x5
37,934,788 UART: [art] Derive Key Pair - Done
37,947,734 UART: [art] Signing Cert with AUTHO
37,949,070 UART: RITY.KEYID = 7
39,654,641 UART: [art] Erasing AUTHORITY.KEYID = 7
39,656,121 UART: [art] PUB.X = FDC8543412F89703FF39E0FD7F0C3A432D27EA7DB617D4CEECB06FC0C347D2760DF32B41EDC9B1A81BD65011287D6ED6
39,663,372 UART: [art] PUB.Y = 29528FEDA7F29573F63719AFB5E4537B0810949B2CC220202CF7C143250B5B6D55D467D70372488F21E7A52DE3A42C41
39,670,661 UART: [art] SIG.R = 2CC3415251CA743A4C3F6FC462F2FF8EF1908E81E73FB553013C84E4E8222FBD1E56C7F1E032127D06CF44CAEDB1C97C
39,678,080 UART: [art] SIG.S = 0B801400A3CBE941D9D4674FA68DB7E2CF9FD2809DD2FAD78E313964BD0C7FE572F8AD34BCD2B877E7C631BCB29DEFF1
40,656,845 UART: Caliptra RT
40,657,557 UART: [state] CFI Enabled
43,135,580 UART: Disabled attest: DPE valid fail
43,137,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,138,237 UART: [rt] RT listening for mailbox commands...
43,169,258 UART: [rt]cmd =0x494e464f, len=4
43,173,297 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
895,146 UART: [kat] SHA2-512-ACC
897,047 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,476,371 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,408 UART: [idev] ++
1,479,576 UART: [idev] CDI.KEYID = 6
1,479,936 UART: [idev] SUBJECT.KEYID = 7
1,480,360 UART: [idev] UDS.KEYID = 0
1,480,705 ready_for_fw is high
1,480,705 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,196 UART: [idev] Erasing UDS.KEYID = 0
1,504,430 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,916 UART: [idev] --
1,513,863 UART: [ldev] ++
1,514,031 UART: [ldev] CDI.KEYID = 6
1,514,394 UART: [ldev] SUBJECT.KEYID = 5
1,514,820 UART: [ldev] AUTHORITY.KEYID = 7
1,515,283 UART: [ldev] FE.KEYID = 1
1,520,385 UART: [ldev] Erasing FE.KEYID = 1
1,546,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,166 UART: [ldev] --
1,585,611 UART: [fwproc] Waiting for Commands...
1,586,418 UART: [fwproc] Received command 0x46574c44
1,587,209 UART: [fwproc] Received Image of size 78632 bytes
2,475,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,864 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,614,541 >>> mbox cmd response: success
2,614,541 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,615,751 UART: [afmc] ++
2,615,919 UART: [afmc] CDI.KEYID = 6
2,616,281 UART: [afmc] SUBJECT.KEYID = 7
2,616,706 UART: [afmc] AUTHORITY.KEYID = 5
2,651,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,687 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,080 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,770 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,655 UART: [afmc] --
2,694,685 UART: [cold-reset] --
2,695,507 UART: [state] Locking Datavault
2,696,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,410 UART: [state] Locking ICCM
2,697,884 UART: [exit] Launching FMC @ 0x40000130
2,703,213 UART:
2,703,229 UART: Running Caliptra FMC ...
2,703,637 UART:
2,703,691 UART: [state] CFI Enabled
2,714,686 UART: [fht] FMC Alias Private Key: 7
2,822,333 UART: [art] Extend RT PCRs Done
2,822,761 UART: [art] Lock RT PCRs Done
2,824,245 UART: [art] Populate DV Done
2,832,422 UART: [fht] FMC Alias Private Key: 7
2,833,474 UART: [art] Derive CDI
2,833,754 UART: [art] Store in in slot 0x4
2,919,185 UART: [art] Derive Key Pair
2,919,545 UART: [art] Store priv key in slot 0x5
2,932,543 UART: [art] Derive Key Pair - Done
2,947,279 UART: [art] Signing Cert with AUTHO
2,947,759 UART: RITY.KEYID = 7
2,962,435 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,200 UART: [art] PUB.X = 742FF2D0B660D0DE76504F1417391DBB4FCF3F83956A88AF9454D083E74DDCA19DD1CCDDB744E4C002B01539B4C502DB
2,969,978 UART: [art] PUB.Y = 5D61A67BB7C0EB131E7A2932D4BC5BBD3EB4C7832745FE392BDA7B0BED74A707299DD171644213A251D65B0187759F1D
2,976,927 UART: [art] SIG.R = 5ABBD53CA71F762B678E0274D37CE23A7649914739DF6D6A3F120371AD468EACD9A95064AE9515A9CA07FE983C43E85B
2,983,696 UART: [art] SIG.S = 5B9C2E5E54EAEBF2B299D88784E90EDE831EF8C9E95E26A85776EA9C5C32F846AD8A97E87D8258401D7DB5AEEE567211
3,007,454 UART: mbox::rt_entry...
3,007,826 UART: ____ _ _ _ ____ _____
3,008,610 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,410 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,178 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,946 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,714 UART: |_|
3,012,026 UART:
3,118,569 UART: [rt] Runtime listening for mailbox commands...
3,123,527 >>> mbox cmd response data (3272 bytes)
3,123,528 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,146,613 >>> mbox cmd response data (0 bytes)
3,146,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,146,734 UART:
3,146,750 UART: Running Caliptra ROM ...
3,147,158 UART:
3,147,212 UART: [state] CFI Enabled
3,149,898 UART: [state] LifecycleState = Unprovisioned
3,150,553 UART: [state] DebugLocked = No
3,151,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,152,768 UART: [kat] SHA2-256
3,946,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,950,814 UART: [kat] ++
3,950,966 UART: [kat] sha1
3,955,240 UART: [kat] SHA2-256
3,957,178 UART: [kat] SHA2-384
3,959,901 UART: [kat] SHA2-512-ACC
3,961,801 UART: [kat] ECC-384
3,967,338 UART: [kat] HMAC-384Kdf
3,971,862 UART: [kat] LMS
4,540,058 UART: [kat] --
4,541,049 UART: [update-reset] ++
5,876,354 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,877,622 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,027,540 >>> mbox cmd response: success
6,027,793 UART: [update-reset] Copying MAN_2 To MAN_1
6,035,807 UART: [update-reset Success] --
6,036,720 UART: [state] Locking Datavault
6,037,280 UART: [state] Locking PCR0, PCR1 and PCR31
6,037,884 UART: [state] Locking ICCM
6,038,536 UART: [exit] Launching FMC @ 0x40000130
6,043,865 UART:
6,043,881 UART: Running Caliptra FMC ...
6,044,289 UART:
6,044,343 UART: [state] CFI Enabled
6,133,120 UART: [art] Extend RT PCRs Done
6,133,548 UART: [art] Lock RT PCRs Done
6,134,819 UART: [art] Populate DV Done
6,142,808 UART: [fht] FMC Alias Private Key: 7
6,143,910 UART: [art] Derive CDI
6,144,190 UART: [art] Store in in slot 0x4
6,229,767 UART: [art] Derive Key Pair
6,230,127 UART: [art] Store priv key in slot 0x5
6,243,645 UART: [art] Derive Key Pair - Done
6,258,363 UART: [art] Signing Cert with AUTHO
6,258,843 UART: RITY.KEYID = 7
6,274,251 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,016 UART: [art] PUB.X = E3F16741D19182BA26FF039B3C2384EA0B9B9E245625C7693D619DE6A49DEE4914FCC12A5528C5772A96F2FBAB0EB7CE
6,281,789 UART: [art] PUB.Y = 285EA52473DE4724EF48041CB4F5F78315EFB4844A0A3C4E15FAEB33D673831197786A0BB7CC010737FB7179D36D63D9
6,288,726 UART: [art] SIG.R = 899F97193BBFB20B1922BEBCF690DCD7407946CF0DEAD07CFAA0743C1BF234EB08156E2CAF95EF239611A638A21D3000
6,295,479 UART: [art] SIG.S = F9BF681D5DB216F6954119E8C83C554525FCD7E7B766C2C2768DDB7FDA8DC227F36A180A89F9992B3095AF913CBA9740
6,318,731 UART: Caliptra RT
6,318,985 UART: [state] CFI Enabled
6,382,709 UART: Disabled attest: DPE valid fail
6,383,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,384,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,414,864 UART: [rt]cmd =0x494e464f, len=4
6,418,182 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 ready_for_fw is high
1,363,159 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,464,814 >>> mbox cmd response: success
2,464,814 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,524,926 UART:
2,524,942 UART: Running Caliptra FMC ...
2,525,350 UART:
2,525,404 UART: [state] CFI Enabled
2,535,937 UART: [fht] FMC Alias Private Key: 7
2,643,620 UART: [art] Extend RT PCRs Done
2,644,048 UART: [art] Lock RT PCRs Done
2,645,860 UART: [art] Populate DV Done
2,653,903 UART: [fht] FMC Alias Private Key: 7
2,654,967 UART: [art] Derive CDI
2,655,247 UART: [art] Store in in slot 0x4
2,740,864 UART: [art] Derive Key Pair
2,741,224 UART: [art] Store priv key in slot 0x5
2,754,778 UART: [art] Derive Key Pair - Done
2,769,461 UART: [art] Signing Cert with AUTHO
2,769,941 UART: RITY.KEYID = 7
2,785,441 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,206 UART: [art] PUB.X = 3CC5345973500182A9471478B89BE7F8EC88D63180F7B8A34EFD9D536A134AA11351154A0DFFE86CE7DADB7BF0CA00A9
2,792,958 UART: [art] PUB.Y = F33BC373C832EA971ECBDA02A1A30D2A59E3ED68C51432A6E8865D9D9CD64CF97B9E439878283FB9A6BF642C1F9C5111
2,799,914 UART: [art] SIG.R = 0C435AB0073FD8BB7FACA5BDD1D4B640C37322B2C3C9D3D1DE15F68A68CB9F40ACFE6A0F9ADC44CE3686993FFCE5E247
2,806,703 UART: [art] SIG.S = 7F775A5831BB845679F586CDDBAC159E2E9D02D4D0F1C1AA873AE328F3060DF58970C3488372F781ED59BA1479207253
2,830,505 UART: mbox::rt_entry...
2,830,877 UART: ____ _ _ _ ____ _____
2,831,661 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,832,461 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,229 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,997 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,765 UART: |_|
2,835,077 UART:
2,942,218 UART: [rt] Runtime listening for mailbox commands...
2,947,176 >>> mbox cmd response data (3272 bytes)
2,947,177 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,970,262 >>> mbox cmd response data (0 bytes)
2,970,263 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,732,413 >>> mbox cmd response: success
5,745,914 UART:
5,745,930 UART: Running Caliptra FMC ...
5,746,338 UART:
5,746,392 UART: [state] CFI Enabled
5,835,571 UART: [art] Extend RT PCRs Done
5,835,999 UART: [art] Lock RT PCRs Done
5,837,082 UART: [art] Populate DV Done
5,845,083 UART: [fht] FMC Alias Private Key: 7
5,846,089 UART: [art] Derive CDI
5,846,369 UART: [art] Store in in slot 0x4
5,931,752 UART: [art] Derive Key Pair
5,932,112 UART: [art] Store priv key in slot 0x5
5,945,502 UART: [art] Derive Key Pair - Done
5,960,527 UART: [art] Signing Cert with AUTHO
5,961,007 UART: RITY.KEYID = 7
5,976,571 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,336 UART: [art] PUB.X = 27BAF46A54D00D550E232854900AD5A32ABC52C9B1A2B65064E361195C0377D5D71C30DFCD5F16F1CA3A96CE4572B0AD
5,984,104 UART: [art] PUB.Y = 40D2187DBB7466FB8C84EE0F1FAF43ED5153CE323C9C1CB43719321FAC595D62BD1106AA2BD54EE79EE4DD38A7B65A72
5,991,066 UART: [art] SIG.R = 761061575B5C0B891C8C340A65A13BBA01D827D0B1A7355164A785D7E671AEC08A39D2131B4ABF328A6F403A496E9478
5,997,825 UART: [art] SIG.S = F59042485EEC5CBA9CFE64EE4E982236984F836C52B5D371E14E688DADCA7182BB5AA600D9E34C7CAA1070ADFEDF3CC8
6,021,456 UART: Caliptra RT
6,021,710 UART: [state] CFI Enabled
6,085,615 UART: Disabled attest: DPE valid fail
6,086,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,087,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,117,546 UART: [rt]cmd =0x494e464f, len=4
6,120,770 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,077 UART: [state] LifecycleState = Unprovisioned
86,732 UART: [state] DebugLocked = No
87,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,934 UART: [kat] SHA2-256
882,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,980 UART: [kat] ++
887,132 UART: [kat] sha1
891,176 UART: [kat] SHA2-256
893,114 UART: [kat] SHA2-384
895,993 UART: [kat] SHA2-512-ACC
897,894 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,477,066 UART: [cold-reset] ++
1,477,556 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 ready_for_fw is high
1,481,462 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,489,285 UART: [idev] Erasing UDS.KEYID = 0
1,506,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,793 UART: [idev] --
1,515,724 UART: [ldev] ++
1,515,892 UART: [ldev] CDI.KEYID = 6
1,516,255 UART: [ldev] SUBJECT.KEYID = 5
1,516,681 UART: [ldev] AUTHORITY.KEYID = 7
1,517,144 UART: [ldev] FE.KEYID = 1
1,522,700 UART: [ldev] Erasing FE.KEYID = 1
1,548,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,191 UART: [ldev] --
1,587,520 UART: [fwproc] Waiting for Commands...
1,588,371 UART: [fwproc] Received command 0x46574c44
1,589,162 UART: [fwproc] Received Image of size 78632 bytes
2,477,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,739 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,616,386 >>> mbox cmd response: success
2,616,386 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,636 UART: [afmc] ++
2,617,804 UART: [afmc] CDI.KEYID = 6
2,618,166 UART: [afmc] SUBJECT.KEYID = 7
2,618,591 UART: [afmc] AUTHORITY.KEYID = 5
2,654,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,935 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,625 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,422 UART: [afmc] --
2,697,366 UART: [cold-reset] --
2,698,214 UART: [state] Locking Datavault
2,699,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,041 UART: [state] Locking ICCM
2,700,657 UART: [exit] Launching FMC @ 0x40000130
2,705,986 UART:
2,706,002 UART: Running Caliptra FMC ...
2,706,410 UART:
2,706,553 UART: [state] CFI Enabled
2,717,036 UART: [fht] FMC Alias Private Key: 7
2,824,901 UART: [art] Extend RT PCRs Done
2,825,329 UART: [art] Lock RT PCRs Done
2,827,065 UART: [art] Populate DV Done
2,835,114 UART: [fht] FMC Alias Private Key: 7
2,836,132 UART: [art] Derive CDI
2,836,412 UART: [art] Store in in slot 0x4
2,922,107 UART: [art] Derive Key Pair
2,922,467 UART: [art] Store priv key in slot 0x5
2,935,435 UART: [art] Derive Key Pair - Done
2,950,113 UART: [art] Signing Cert with AUTHO
2,950,593 UART: RITY.KEYID = 7
2,965,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,352 UART: [art] PUB.X = 92BC5375811725618E99E524BE9F84D73708278AAE8D00DAAAAA8B68A8311F1DAAECACB1BB7DB3766B6C86D1F40FAA44
2,973,112 UART: [art] PUB.Y = 8A2A2E116608243C20E21BF2861D8404FDF3B4FFCBCCE52EC324297A8BA3F99CBF53EF6470C7751E8BA2350E05B9F538
2,980,062 UART: [art] SIG.R = FFBF3050D379C2FB619A95177E99B06928E8C5FCDF90A2C14B1D64AD440588B1AEF77DB3008203D92286EF6B1ACAB93A
2,986,818 UART: [art] SIG.S = 312219F0812D6EAA50CBE6B660B7629D9A0D1A9A9E2D6C209B5A73FE5F61C4FE8E94B375C06C38B4C56E95C94527DAF5
3,011,478 UART: mbox::rt_entry...
3,011,850 UART: ____ _ _ _ ____ _____
3,012,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,434 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,202 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,014,970 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,738 UART: |_|
3,016,050 UART:
3,124,122 UART: [rt] Runtime listening for mailbox commands...
3,129,080 >>> mbox cmd response data (3272 bytes)
3,129,081 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,152,166 >>> mbox cmd response data (0 bytes)
3,152,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,152,287 UART:
3,152,303 UART: Running Caliptra ROM ...
3,152,711 UART:
3,152,852 UART: [state] CFI Enabled
3,155,328 UART: [state] LifecycleState = Unprovisioned
3,155,983 UART: [state] DebugLocked = No
3,156,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,158,214 UART: [kat] SHA2-256
3,952,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,956,260 UART: [kat] ++
3,956,412 UART: [kat] sha1
3,960,794 UART: [kat] SHA2-256
3,962,732 UART: [kat] SHA2-384
3,965,585 UART: [kat] SHA2-512-ACC
3,967,485 UART: [kat] ECC-384
3,972,878 UART: [kat] HMAC-384Kdf
3,977,382 UART: [kat] LMS
4,545,578 UART: [kat] --
4,546,441 UART: [update-reset] ++
5,881,098 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,882,188 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,032,106 >>> mbox cmd response: success
6,032,419 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,433 UART: [update-reset Success] --
6,041,384 UART: [state] Locking Datavault
6,042,116 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,720 UART: [state] Locking ICCM
6,043,336 UART: [exit] Launching FMC @ 0x40000130
6,048,665 UART:
6,048,681 UART: Running Caliptra FMC ...
6,049,089 UART:
6,049,232 UART: [state] CFI Enabled
6,138,475 UART: [art] Extend RT PCRs Done
6,138,903 UART: [art] Lock RT PCRs Done
6,140,332 UART: [art] Populate DV Done
6,148,635 UART: [fht] FMC Alias Private Key: 7
6,149,797 UART: [art] Derive CDI
6,150,077 UART: [art] Store in in slot 0x4
6,235,812 UART: [art] Derive Key Pair
6,236,172 UART: [art] Store priv key in slot 0x5
6,249,424 UART: [art] Derive Key Pair - Done
6,264,346 UART: [art] Signing Cert with AUTHO
6,264,826 UART: RITY.KEYID = 7
6,279,928 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,693 UART: [art] PUB.X = BE40990CCC83163CF88491FB5C217140511807A6511C657E1DEDF3977A7BED5F16846BAC7DCCC11E699BB2E22E983B92
6,287,465 UART: [art] PUB.Y = 2CEC89CF979BD7C1686FFA8D0A7DBADF24F19D2C2E8FCA30DA1B4726275761F1EE5C8C16A243BF48A0D65A25BEB2D3C4
6,294,438 UART: [art] SIG.R = E7816D508D74A48B41D39A56B95885FC00DF6C773AFB96F153C8DAE78F22DCB4D5E75CAFEABDDED65BD6D4FB6CADAB03
6,301,215 UART: [art] SIG.S = B1CB7184AD347986590250E07E7BBB1BA21E2CC7F9240E179106249CE2BD28D2A2B1DECD87EB9D39187A8B06566F37E6
6,324,766 UART: Caliptra RT
6,325,112 UART: [state] CFI Enabled
6,389,302 UART: Disabled attest: DPE valid fail
6,389,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,391,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,421,375 UART: [rt]cmd =0x494e464f, len=4
6,424,597 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,466,228 >>> mbox cmd response: success
2,466,228 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,452 UART:
2,527,468 UART: Running Caliptra FMC ...
2,527,876 UART:
2,528,019 UART: [state] CFI Enabled
2,538,492 UART: [fht] FMC Alias Private Key: 7
2,646,703 UART: [art] Extend RT PCRs Done
2,647,131 UART: [art] Lock RT PCRs Done
2,648,543 UART: [art] Populate DV Done
2,656,956 UART: [fht] FMC Alias Private Key: 7
2,658,066 UART: [art] Derive CDI
2,658,346 UART: [art] Store in in slot 0x4
2,744,023 UART: [art] Derive Key Pair
2,744,383 UART: [art] Store priv key in slot 0x5
2,757,319 UART: [art] Derive Key Pair - Done
2,772,373 UART: [art] Signing Cert with AUTHO
2,772,853 UART: RITY.KEYID = 7
2,787,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,634 UART: [art] PUB.X = 78395E01717C176128361F07CC5500605BDDD7836940D5346CD3C1AADF8DDBD6C812D86D83A688A1B25D967F16D7DAB5
2,795,380 UART: [art] PUB.Y = 73D4AE0AB1076A3CCB6D7E0DF00E716C6CBB133FB789AFC6BE29B6198D017614FE4CF36C61844BA412B5E1E99CE7340F
2,802,330 UART: [art] SIG.R = FE04D599DD10EBCD7C30502D2D703A7C7E701B17C8E7DD1DE91476640014F4B75250EC588FF1C4C66DF4F01784E56243
2,809,081 UART: [art] SIG.S = 6F0AC9D135006854C5A8F356E3E5D9F868E2C5EE03B6293D03931AA791DE8BCCD7C20B79AB6AA4E46DE315D1F7E0699C
2,832,796 UART: mbox::rt_entry...
2,833,168 UART: ____ _ _ _ ____ _____
2,833,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,520 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,288 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,056 UART: |_|
2,837,368 UART:
2,944,702 UART: [rt] Runtime listening for mailbox commands...
2,949,660 >>> mbox cmd response data (3272 bytes)
2,949,661 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,746 >>> mbox cmd response data (0 bytes)
2,972,747 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,734,696 >>> mbox cmd response: success
5,748,259 UART:
5,748,275 UART: Running Caliptra FMC ...
5,748,683 UART:
5,748,826 UART: [state] CFI Enabled
5,837,809 UART: [art] Extend RT PCRs Done
5,838,237 UART: [art] Lock RT PCRs Done
5,839,478 UART: [art] Populate DV Done
5,847,599 UART: [fht] FMC Alias Private Key: 7
5,848,711 UART: [art] Derive CDI
5,848,991 UART: [art] Store in in slot 0x4
5,934,462 UART: [art] Derive Key Pair
5,934,822 UART: [art] Store priv key in slot 0x5
5,948,090 UART: [art] Derive Key Pair - Done
5,962,607 UART: [art] Signing Cert with AUTHO
5,963,087 UART: RITY.KEYID = 7
5,978,059 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,824 UART: [art] PUB.X = F110DFC3DB38085FFAC6136971B4E4BB32AB4B9BB34F2387D6FD68EE60969243C22097E6A3570ECCA8D3EBA6D1A80AD5
5,985,603 UART: [art] PUB.Y = 9300FF24D89B7DD32A6D7C5D7FD4E07CC6321B770B33357C6D45F154EC0D44BE4CBA519985BD64DE3285AC36F895DFA0
5,992,539 UART: [art] SIG.R = 1588815D78E144A650E0C7184BED879F8EE1E700022718EA18B0A543FBB75A38B7B6B40F2FF3A2662BDD9922F1738002
5,999,278 UART: [art] SIG.S = F6BB56E64D4C91831C9FC6419168E52BFCFE573D49EC2786F33B7DDE42FAFF037C531D0DD548DD3F126A9D36C81049D0
6,023,299 UART: Caliptra RT
6,023,645 UART: [state] CFI Enabled
6,087,654 UART: Disabled attest: DPE valid fail
6,088,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,089,420 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,119,537 UART: [rt]cmd =0x494e464f, len=4
6,123,005 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
893,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,599 UART: [kat] ++
897,751 UART: [kat] sha1
902,093 UART: [kat] SHA2-256
904,033 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,822 UART: [kat] HMAC-384Kdf
923,348 UART: [kat] LMS
1,171,676 UART: [kat] --
1,172,513 UART: [cold-reset] ++
1,172,979 UART: [fht] FHT @ 0x50003400
1,175,638 UART: [idev] ++
1,175,806 UART: [idev] CDI.KEYID = 6
1,176,166 UART: [idev] SUBJECT.KEYID = 7
1,176,590 UART: [idev] UDS.KEYID = 0
1,176,935 ready_for_fw is high
1,176,935 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,692 UART: [idev] Erasing UDS.KEYID = 0
1,201,405 UART: [idev] Sha1 KeyId Algorithm
1,209,743 UART: [idev] --
1,210,805 UART: [ldev] ++
1,210,973 UART: [ldev] CDI.KEYID = 6
1,211,336 UART: [ldev] SUBJECT.KEYID = 5
1,211,762 UART: [ldev] AUTHORITY.KEYID = 7
1,212,225 UART: [ldev] FE.KEYID = 1
1,217,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,810 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,346 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,187 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,396 >>> mbox cmd response: success
2,310,396 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,544 UART: [afmc] ++
2,311,712 UART: [afmc] CDI.KEYID = 6
2,312,074 UART: [afmc] SUBJECT.KEYID = 7
2,312,499 UART: [afmc] AUTHORITY.KEYID = 5
2,348,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,949 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,562 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,281 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,103 UART: [afmc] --
2,392,085 UART: [cold-reset] --
2,392,797 UART: [state] Locking Datavault
2,394,188 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,792 UART: [state] Locking ICCM
2,395,304 UART: [exit] Launching FMC @ 0x40000130
2,400,633 UART:
2,400,649 UART: Running Caliptra FMC ...
2,401,057 UART:
2,401,111 UART: [state] CFI Enabled
2,411,540 UART: [fht] FMC Alias Private Key: 7
2,519,067 UART: [art] Extend RT PCRs Done
2,519,495 UART: [art] Lock RT PCRs Done
2,520,961 UART: [art] Populate DV Done
2,529,212 UART: [fht] FMC Alias Private Key: 7
2,530,380 UART: [art] Derive CDI
2,530,660 UART: [art] Store in in slot 0x4
2,616,255 UART: [art] Derive Key Pair
2,616,615 UART: [art] Store priv key in slot 0x5
2,629,959 UART: [art] Derive Key Pair - Done
2,644,326 UART: [art] Signing Cert with AUTHO
2,644,806 UART: RITY.KEYID = 7
2,659,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,477 UART: [art] PUB.X = 19E87B0B06BC62FC11619F6C60DD40D41FEB741A7F2D951BBD2E8594D71FBFA66EB4C390DEB9A38E30F1F27290455688
2,667,253 UART: [art] PUB.Y = E0E6F2F9AD70252A3F996C178D70DBA6B1A60557C399484185AAA87D86208ADA4D087661190AB19E60313F116DE5B324
2,674,194 UART: [art] SIG.R = 6EE4BD46D3271B54B92817DC902290312C69E4DD539820852D47A8A7849BD022C3A22CCB4856D1C0F75600DBA5CC2FF1
2,680,946 UART: [art] SIG.S = F4C67770AC23441B403A767E255A48844BDB45B23DB41745629CE777A91630FBB2925F22340085A8BEE7B45ECDCE3B80
2,705,203 UART: mbox::rt_entry...
2,705,575 UART: ____ _ _ _ ____ _____
2,706,359 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,159 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,927 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,695 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,463 UART: |_|
2,709,775 UART:
2,817,109 UART: [rt] Runtime listening for mailbox commands...
2,822,067 >>> mbox cmd response data (3272 bytes)
2,822,068 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,153 >>> mbox cmd response data (0 bytes)
2,845,154 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,845,271 UART:
2,845,287 UART: Running Caliptra ROM ...
2,845,695 UART:
2,845,750 UART: [state] CFI Enabled
2,848,844 UART: [state] LifecycleState = Unprovisioned
2,849,499 UART: [state] DebugLocked = No
2,850,163 UART: [state] WD Timer not started. Device not locked for debugging
2,851,397 UART: [kat] SHA2-256
3,657,047 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,172 UART: [kat] ++
3,661,324 UART: [kat] sha1
3,665,616 UART: [kat] SHA2-256
3,667,556 UART: [kat] SHA2-384
3,670,279 UART: [kat] SHA2-512-ACC
3,672,179 UART: [kat] ECC-384
3,681,592 UART: [kat] HMAC-384Kdf
3,686,354 UART: [kat] LMS
3,934,682 UART: [kat] --
3,935,634 UART: [update-reset] ++
5,247,243 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,288 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,398,154 >>> mbox cmd response: success
5,398,373 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,387 UART: [update-reset Success] --
5,407,188 UART: [state] Locking Datavault
5,407,978 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,582 UART: [state] Locking ICCM
5,409,144 UART: [exit] Launching FMC @ 0x40000130
5,414,473 UART:
5,414,489 UART: Running Caliptra FMC ...
5,414,897 UART:
5,414,951 UART: [state] CFI Enabled
5,504,194 UART: [art] Extend RT PCRs Done
5,504,622 UART: [art] Lock RT PCRs Done
5,505,975 UART: [art] Populate DV Done
5,514,090 UART: [fht] FMC Alias Private Key: 7
5,515,078 UART: [art] Derive CDI
5,515,358 UART: [art] Store in in slot 0x4
5,601,245 UART: [art] Derive Key Pair
5,601,605 UART: [art] Store priv key in slot 0x5
5,613,995 UART: [art] Derive Key Pair - Done
5,628,781 UART: [art] Signing Cert with AUTHO
5,629,261 UART: RITY.KEYID = 7
5,643,995 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,760 UART: [art] PUB.X = D7586941D3C0509C8C8800B71427048DCB7B599E63CA9D1A30DAA5812A12B65966927DB3254ED72EBDBDD326DD669192
5,651,507 UART: [art] PUB.Y = 3954F65A535995916911A3F5DB30C2A00B5000EFE5A8A2A4C5226B6E913593E9A56E82CFCC0A9A82899AA3366BC6185D
5,658,431 UART: [art] SIG.R = 1FA402A9BC5873E9DB5B2801A12791877174A269CC1DC644761ECB013D4BCFC0F0511A08023232852E61AACF91D2693D
5,665,188 UART: [art] SIG.S = D0383CDA3024F33DBB4EDFE2DAB838BD56A53575835045871791D52191F09D237B9A9CEB475A41C069CE026ABED38900
5,688,754 UART: Caliptra RT
5,689,008 UART: [state] CFI Enabled
5,751,073 UART: Disabled attest: DPE valid fail
5,751,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,752,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,783,008 UART: [rt]cmd =0x494e464f, len=4
5,786,324 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 ready_for_fw is high
1,060,119 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,147 >>> mbox cmd response: success
2,163,147 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,925 UART:
2,224,941 UART: Running Caliptra FMC ...
2,225,349 UART:
2,225,403 UART: [state] CFI Enabled
2,235,764 UART: [fht] FMC Alias Private Key: 7
2,343,093 UART: [art] Extend RT PCRs Done
2,343,521 UART: [art] Lock RT PCRs Done
2,345,269 UART: [art] Populate DV Done
2,353,490 UART: [fht] FMC Alias Private Key: 7
2,354,666 UART: [art] Derive CDI
2,354,946 UART: [art] Store in in slot 0x4
2,440,309 UART: [art] Derive Key Pair
2,440,669 UART: [art] Store priv key in slot 0x5
2,453,997 UART: [art] Derive Key Pair - Done
2,468,952 UART: [art] Signing Cert with AUTHO
2,469,432 UART: RITY.KEYID = 7
2,484,280 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,045 UART: [art] PUB.X = AAA26AB684511A5AAFD20531822DF01F8532A843ACD7B1E6EDD08DB174A3D1015B1F1E231EA1EDD9A61BC3CB3055D9B5
2,491,829 UART: [art] PUB.Y = 36874C9EBE14758DDCF5E44D4A2C67677AC3E12882319B29B5DA88CFEE07181768E194FC68FC0ED74A24DC55BEE3FB83
2,498,787 UART: [art] SIG.R = AB84BC625444F50E1CB690B1AB0A5763223F919EEC344BAB4F3AD4648A4C2E7441132E8DB519855880D5851C0A6B4B21
2,505,552 UART: [art] SIG.S = 655EC62E6801D29A02412D1A185FF06766FFEE86F734F32F6C2AF7B91C27CDDE7E9AFD4ED7948C340FD9472546179C2B
2,528,506 UART: mbox::rt_entry...
2,528,878 UART: ____ _ _ _ ____ _____
2,529,662 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,462 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,230 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,998 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,766 UART: |_|
2,533,078 UART:
2,639,458 UART: [rt] Runtime listening for mailbox commands...
2,644,416 >>> mbox cmd response data (3272 bytes)
2,644,417 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,502 >>> mbox cmd response data (0 bytes)
2,667,503 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,104,386 >>> mbox cmd response: success
5,117,786 UART:
5,117,802 UART: Running Caliptra FMC ...
5,118,210 UART:
5,118,264 UART: [state] CFI Enabled
5,207,185 UART: [art] Extend RT PCRs Done
5,207,613 UART: [art] Lock RT PCRs Done
5,209,146 UART: [art] Populate DV Done
5,217,615 UART: [fht] FMC Alias Private Key: 7
5,218,781 UART: [art] Derive CDI
5,219,061 UART: [art] Store in in slot 0x4
5,304,452 UART: [art] Derive Key Pair
5,304,812 UART: [art] Store priv key in slot 0x5
5,317,392 UART: [art] Derive Key Pair - Done
5,332,146 UART: [art] Signing Cert with AUTHO
5,332,626 UART: RITY.KEYID = 7
5,347,820 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,585 UART: [art] PUB.X = F852B63E7B66F9203EBB7A70B68CAD221FED4B0C842947FDC5016031FED6A13409A1F85E0627A0C1077910DFBCCBF77C
5,355,354 UART: [art] PUB.Y = 16E86C99353A043AD39A25B2874313A46F2EC6BF34EDDE6C9C505F89DC9008BA1B1BFD9E0C76D32F37D903008324A1C7
5,362,278 UART: [art] SIG.R = 432EB570298A003FC09A566742DAB8F70D74D2322C616EFF0EACA426C6DB12F303AA6FDC7255FDBAB9080EE9E81C92F4
5,369,027 UART: [art] SIG.S = 322A74F5C722699D249CD14CA210F30E8E1A97DB5D7593FFF195C609818CCCD9717EBD1C9FAE7A529B97016FB38E0193
5,393,146 UART: Caliptra RT
5,393,400 UART: [state] CFI Enabled
5,456,661 UART: Disabled attest: DPE valid fail
5,457,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,458,481 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,488,654 UART: [rt]cmd =0x494e464f, len=4
5,491,974 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
893,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,468 UART: [kat] ++
897,620 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,651 UART: [kat] SHA2-512-ACC
908,552 UART: [kat] ECC-384
918,289 UART: [kat] HMAC-384Kdf
922,749 UART: [kat] LMS
1,171,077 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,320 UART: [fht] FHT @ 0x50003400
1,175,061 UART: [idev] ++
1,175,229 UART: [idev] CDI.KEYID = 6
1,175,589 UART: [idev] SUBJECT.KEYID = 7
1,176,013 UART: [idev] UDS.KEYID = 0
1,176,358 ready_for_fw is high
1,176,358 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,211 UART: [idev] Erasing UDS.KEYID = 0
1,201,272 UART: [idev] Sha1 KeyId Algorithm
1,209,894 UART: [idev] --
1,210,778 UART: [ldev] ++
1,210,946 UART: [ldev] CDI.KEYID = 6
1,211,309 UART: [ldev] SUBJECT.KEYID = 5
1,211,735 UART: [ldev] AUTHORITY.KEYID = 7
1,212,198 UART: [ldev] FE.KEYID = 1
1,217,556 UART: [ldev] Erasing FE.KEYID = 1
1,244,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,992 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,283,975 UART: [fwproc] Recv command 0x46574c44
1,284,703 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,554 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,913 >>> mbox cmd response: success
2,310,913 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,149 UART: [afmc] ++
2,312,317 UART: [afmc] CDI.KEYID = 6
2,312,679 UART: [afmc] SUBJECT.KEYID = 7
2,313,104 UART: [afmc] AUTHORITY.KEYID = 5
2,349,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,480 UART: [afmc] --
2,392,584 UART: [cold-reset] --
2,393,464 UART: [state] Locking Datavault
2,394,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,375 UART: [state] Locking ICCM
2,395,979 UART: [exit] Launching FMC @ 0x40000130
2,401,308 UART:
2,401,324 UART: Running Caliptra FMC ...
2,401,732 UART:
2,401,875 UART: [state] CFI Enabled
2,412,302 UART: [fht] FMC Alias Private Key: 7
2,519,665 UART: [art] Extend RT PCRs Done
2,520,093 UART: [art] Lock RT PCRs Done
2,521,613 UART: [art] Populate DV Done
2,529,784 UART: [fht] FMC Alias Private Key: 7
2,530,840 UART: [art] Derive CDI
2,531,120 UART: [art] Store in in slot 0x4
2,616,769 UART: [art] Derive Key Pair
2,617,129 UART: [art] Store priv key in slot 0x5
2,631,031 UART: [art] Derive Key Pair - Done
2,645,695 UART: [art] Signing Cert with AUTHO
2,646,175 UART: RITY.KEYID = 7
2,661,501 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,266 UART: [art] PUB.X = 63F5BFA1A511318AD3D856022C50ABBF404188284CEEF722B0E27115B876C832A282D5BBC57CE35DC375F6420A35D61B
2,669,036 UART: [art] PUB.Y = 89446F4130977AE577E25C7DE1DBCABE9616960E614CB5D088AF2E0D33761BDB5048266539D01739D044F6F07A366822
2,675,976 UART: [art] SIG.R = 9FA3EB331D4EFA756E3DF142FA3AE73A8415BD278432E9C970CA05E77CCAB3CE097F7AD42D042E1C86CC9BE8F402D0A2
2,682,756 UART: [art] SIG.S = E4BC0A08626E672AF8163590BB13E930F008B283DABF668198C732EFA6DB27176A339313116C49FEE84A18CDE34C41F1
2,706,602 UART: mbox::rt_entry...
2,706,974 UART: ____ _ _ _ ____ _____
2,707,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,558 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,862 UART: |_|
2,711,174 UART:
2,817,493 UART: [rt] Runtime listening for mailbox commands...
2,822,451 >>> mbox cmd response data (3272 bytes)
2,822,452 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,537 >>> mbox cmd response data (0 bytes)
2,845,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,845,655 UART:
2,845,671 UART: Running Caliptra ROM ...
2,846,079 UART:
2,846,221 UART: [state] CFI Enabled
2,849,023 UART: [state] LifecycleState = Unprovisioned
2,849,678 UART: [state] DebugLocked = No
2,850,192 UART: [state] WD Timer not started. Device not locked for debugging
2,851,368 UART: [kat] SHA2-256
3,657,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,143 UART: [kat] ++
3,661,295 UART: [kat] sha1
3,665,291 UART: [kat] SHA2-256
3,667,231 UART: [kat] SHA2-384
3,670,054 UART: [kat] SHA2-512-ACC
3,671,954 UART: [kat] ECC-384
3,681,629 UART: [kat] HMAC-384Kdf
3,686,305 UART: [kat] LMS
3,934,633 UART: [kat] --
3,935,641 UART: [update-reset] ++
5,247,638 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,743 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,398,609 >>> mbox cmd response: success
5,398,916 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,930 UART: [update-reset Success] --
5,407,993 UART: [state] Locking Datavault
5,408,615 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,219 UART: [state] Locking ICCM
5,409,705 UART: [exit] Launching FMC @ 0x40000130
5,415,034 UART:
5,415,050 UART: Running Caliptra FMC ...
5,415,458 UART:
5,415,601 UART: [state] CFI Enabled
5,504,772 UART: [art] Extend RT PCRs Done
5,505,200 UART: [art] Lock RT PCRs Done
5,506,445 UART: [art] Populate DV Done
5,514,830 UART: [fht] FMC Alias Private Key: 7
5,515,874 UART: [art] Derive CDI
5,516,154 UART: [art] Store in in slot 0x4
5,601,619 UART: [art] Derive Key Pair
5,601,979 UART: [art] Store priv key in slot 0x5
5,615,285 UART: [art] Derive Key Pair - Done
5,629,846 UART: [art] Signing Cert with AUTHO
5,630,326 UART: RITY.KEYID = 7
5,645,448 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,213 UART: [art] PUB.X = ADF43DC607EDDE69BBEED99053C0DD91C1A7BE294B885C43AB8F607AFF0106351430CB6C19AD2547B7649ECBB982616F
5,652,992 UART: [art] PUB.Y = 66C175ADB9A76C7517A55533774D3E9CBE9F5AACEB3ED387295E0419ABB4C6C47703B280A38C31F379ABB25049B76294
5,659,942 UART: [art] SIG.R = 69874E8B47DC8088AC6BF3C66AE480A5C14408DC0E76B94647167F1C9D5700069A930FC41079258B0A266E5785E2BAA7
5,666,673 UART: [art] SIG.S = 2C9FF0C65319C2590CE70E953FBDA8EA8078E888389A88E2FAE93A697D3E0C1E5717B16D72BF6C3288512FBD6E5DFEBE
5,690,987 UART: Caliptra RT
5,691,333 UART: [state] CFI Enabled
5,754,854 UART: Disabled attest: DPE valid fail
5,755,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,756,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,787,045 UART: [rt]cmd =0x494e464f, len=4
5,790,565 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,964 ready_for_fw is high
1,060,964 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,164,588 >>> mbox cmd response: success
2,164,588 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,227,144 UART:
2,227,160 UART: Running Caliptra FMC ...
2,227,568 UART:
2,227,711 UART: [state] CFI Enabled
2,238,760 UART: [fht] FMC Alias Private Key: 7
2,347,161 UART: [art] Extend RT PCRs Done
2,347,589 UART: [art] Lock RT PCRs Done
2,349,111 UART: [art] Populate DV Done
2,357,258 UART: [fht] FMC Alias Private Key: 7
2,358,318 UART: [art] Derive CDI
2,358,598 UART: [art] Store in in slot 0x4
2,444,647 UART: [art] Derive Key Pair
2,445,007 UART: [art] Store priv key in slot 0x5
2,458,391 UART: [art] Derive Key Pair - Done
2,473,040 UART: [art] Signing Cert with AUTHO
2,473,520 UART: RITY.KEYID = 7
2,488,580 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,345 UART: [art] PUB.X = BEF64B7D40910F36C55035F6BA119E2B533C1813D39A97A1F317B8F0FE713AA205E7A59DBED81E1C644699CD2B9AB20C
2,496,118 UART: [art] PUB.Y = 210A8CB10288A22168BBB7CFED50DB9D894006A92EB8A56C38DEC0E6F23AA927A89EFB8E4D722D7E10E9A218EDB8754D
2,503,077 UART: [art] SIG.R = 4ED0818BDC181B797033FF2F19271F8CD4776DD38467DB5E4C5100F3EA787BAB05D7D1C869A7AA8F4CC72B0B543E1B9F
2,509,833 UART: [art] SIG.S = 9C4B5A5A4A976F196946EAB50C647E6591009A0493146273B36F067872E9AD87E8145C12546F6DA3F746E4C5C612067B
2,533,480 UART: mbox::rt_entry...
2,533,852 UART: ____ _ _ _ ____ _____
2,534,636 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,436 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,204 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,972 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,740 UART: |_|
2,538,052 UART:
2,645,312 UART: [rt] Runtime listening for mailbox commands...
2,650,270 >>> mbox cmd response data (3272 bytes)
2,650,271 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,673,356 >>> mbox cmd response data (0 bytes)
2,673,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,110,943 >>> mbox cmd response: success
5,124,691 UART:
5,124,707 UART: Running Caliptra FMC ...
5,125,115 UART:
5,125,258 UART: [state] CFI Enabled
5,214,431 UART: [art] Extend RT PCRs Done
5,214,859 UART: [art] Lock RT PCRs Done
5,216,176 UART: [art] Populate DV Done
5,224,375 UART: [fht] FMC Alias Private Key: 7
5,225,375 UART: [art] Derive CDI
5,225,655 UART: [art] Store in in slot 0x4
5,311,324 UART: [art] Derive Key Pair
5,311,684 UART: [art] Store priv key in slot 0x5
5,325,054 UART: [art] Derive Key Pair - Done
5,339,857 UART: [art] Signing Cert with AUTHO
5,340,337 UART: RITY.KEYID = 7
5,355,673 UART: [art] Erasing AUTHORITY.KEYID = 7
5,356,438 UART: [art] PUB.X = BB19E0D371ABA32F57FEFAA39D23D5DFC804D07FCD85F4D6638E94C71A9FE86160528F6608E04480B8EB1DEA9A495F7A
5,363,220 UART: [art] PUB.Y = 159E8842DCE3AF584E8CA60BFA14048C82219E15709C5434A7671898B70FA836AE0F28501F034941BB58B6C25C360F0A
5,370,147 UART: [art] SIG.R = 8A4CAF5A7C3E4EEC2C83652C0F7183431829AC68F88527CA73D023CC1D3E532E245110D05251FA663D6C015EA70CFD76
5,376,914 UART: [art] SIG.S = 19F328FC24341562E105B4370C900933442BA78BC2C8E79FACA04FE80274F6DA5BE570921D664F66491F0A5CC21E4568
5,400,552 UART: Caliptra RT
5,400,898 UART: [state] CFI Enabled
5,463,945 UART: Disabled attest: DPE valid fail
5,464,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,465,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,496,184 UART: [rt]cmd =0x494e464f, len=4
5,499,578 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,775 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,174,629 ready_for_fw is high
1,174,629 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,267 UART: [idev] Sha1 KeyId Algorithm
1,208,097 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,326 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,353 UART: [fwproc] Recv command 0x46574c44
1,282,086 UART: [fwproc] Recv'd Img size: 78632 bytes
2,170,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,598 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,309,884 >>> mbox cmd response: success
2,309,884 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,061 UART: [afmc] ++
2,311,229 UART: [afmc] CDI.KEYID = 6
2,311,592 UART: [afmc] SUBJECT.KEYID = 7
2,312,018 UART: [afmc] AUTHORITY.KEYID = 5
2,347,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,992 UART: [afmc] --
2,391,062 UART: [cold-reset] --
2,391,858 UART: [state] Locking Datavault
2,392,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,563 UART: [state] Locking ICCM
2,394,077 UART: [exit] Launching FMC @ 0x40000130
2,399,406 UART:
2,399,422 UART: Running Caliptra FMC ...
2,399,830 UART:
2,399,884 UART: [state] CFI Enabled
2,410,401 UART: [fht] FMC Alias Private Key: 7
2,517,824 UART: [art] Extend RT PCRs Done
2,518,252 UART: [art] Lock RT PCRs Done
2,519,548 UART: [art] Populate DV Done
2,527,907 UART: [fht] FMC Alias Private Key: 7
2,529,015 UART: [art] Derive CDI
2,529,295 UART: [art] Store in in slot 0x4
2,615,060 UART: [art] Derive Key Pair
2,615,420 UART: [art] Store priv key in slot 0x5
2,628,676 UART: [art] Derive Key Pair - Done
2,643,703 UART: [art] Signing Cert with AUTHO
2,644,183 UART: RITY.KEYID = 7
2,658,853 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,618 UART: [art] PUB.X = 63947F197712EEA8796550A44093B75250D849C03D78D1FC9E211900880905B6DE60BE137CC8366ACB8F5CB549D35827
2,666,352 UART: [art] PUB.Y = 2C84470B86B8EFBDDE938032EB219FEF1202E746A4D60C837FE65B842CB88613EE1730300352A97ECD03749E54E208CE
2,673,288 UART: [art] SIG.R = 190279CCE5EA02E544A28FABD8EF52841AE59E16F353EEE415765DD3FDA3DFBDDD1F02F69B4FA75B745A88730BDA6CC4
2,680,070 UART: [art] SIG.S = A338F9DC84EB95086FB37731ED7B054AA7EA1B8E7BC4A5E4E3B3EE1C5711EB3765DD4856B71E0008AEE81758C045C14A
2,704,152 UART: mbox::rt_entry...
2,704,524 UART: ____ _ _ _ ____ _____
2,705,308 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,412 UART: |_|
2,708,724 UART:
2,814,832 UART: [rt] Runtime listening for mailbox commands...
2,819,790 >>> mbox cmd response data (3272 bytes)
2,819,791 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,876 >>> mbox cmd response data (0 bytes)
2,842,877 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,842,994 UART:
2,843,010 UART: Running Caliptra ROM ...
2,843,418 UART:
2,843,473 UART: [state] CFI Enabled
2,845,935 UART: [state] LifecycleState = Unprovisioned
2,846,590 UART: [state] DebugLocked = No
2,847,214 UART: [state] WD Timer not started. Device not locked for debugging
2,848,520 UART: [kat] SHA2-256
3,652,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,199 UART: [kat] ++
3,656,351 UART: [kat] sha1
3,660,609 UART: [kat] SHA2-256
3,662,549 UART: [kat] SHA2-384
3,665,354 UART: [kat] SHA2-512-ACC
3,667,254 UART: [kat] ECC-384
3,677,089 UART: [kat] HMAC-384Kdf
3,681,743 UART: [kat] LMS
3,930,055 UART: [kat] --
3,931,057 UART: [update-reset] ++
5,243,571 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,662 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,394,528 >>> mbox cmd response: success
5,394,789 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,803 UART: [update-reset Success] --
5,403,670 UART: [state] Locking Datavault
5,404,520 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,124 UART: [state] Locking ICCM
5,405,738 UART: [exit] Launching FMC @ 0x40000130
5,411,067 UART:
5,411,083 UART: Running Caliptra FMC ...
5,411,491 UART:
5,411,545 UART: [state] CFI Enabled
5,500,620 UART: [art] Extend RT PCRs Done
5,501,048 UART: [art] Lock RT PCRs Done
5,502,319 UART: [art] Populate DV Done
5,510,390 UART: [fht] FMC Alias Private Key: 7
5,511,474 UART: [art] Derive CDI
5,511,754 UART: [art] Store in in slot 0x4
5,597,463 UART: [art] Derive Key Pair
5,597,823 UART: [art] Store priv key in slot 0x5
5,610,871 UART: [art] Derive Key Pair - Done
5,625,670 UART: [art] Signing Cert with AUTHO
5,626,150 UART: RITY.KEYID = 7
5,641,074 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,839 UART: [art] PUB.X = 1575E285EBA6B3F85C0D5F17EE83DF0336E0BC87521339A07949EDA2D54D41B8E249FE6638E06725B0BF360C7637FBD9
5,648,606 UART: [art] PUB.Y = 50727963F1B8CC314750ED1887E93C1B262CFE7C6B172E5C41EF061D5F45052A06FA3AB191A7D797E08829995F5B5280
5,655,545 UART: [art] SIG.R = EFA6F67BA403EE60E9E0FABA8BB09B43E1267BF144DAD51F6720CA54451EC8DF0B0FA3462FD18F36994123F14D2E2114
5,662,322 UART: [art] SIG.S = D6684484CD08C77332E17CB6527688E53295F4F959201AB35B75BD1891064D6D997280DFD3CF232829656EFCDFF84EC0
5,686,467 UART: Caliptra RT
5,686,721 UART: [state] CFI Enabled
5,748,727 UART: Disabled attest: DPE valid fail
5,749,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,750,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,780,682 UART: [rt]cmd =0x494e464f, len=4
5,783,928 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,438 ready_for_fw is high
1,056,438 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,158,700 >>> mbox cmd response: success
2,158,700 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,219,986 UART:
2,220,002 UART: Running Caliptra FMC ...
2,220,410 UART:
2,220,464 UART: [state] CFI Enabled
2,230,723 UART: [fht] FMC Alias Private Key: 7
2,339,034 UART: [art] Extend RT PCRs Done
2,339,462 UART: [art] Lock RT PCRs Done
2,341,044 UART: [art] Populate DV Done
2,349,187 UART: [fht] FMC Alias Private Key: 7
2,350,117 UART: [art] Derive CDI
2,350,397 UART: [art] Store in in slot 0x4
2,435,710 UART: [art] Derive Key Pair
2,436,070 UART: [art] Store priv key in slot 0x5
2,449,384 UART: [art] Derive Key Pair - Done
2,464,392 UART: [art] Signing Cert with AUTHO
2,464,872 UART: RITY.KEYID = 7
2,480,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,831 UART: [art] PUB.X = 445CEF00F8436EAF22BEAF92C95DA2110475867030B0E5F8415E433A6AD67BC08BC73C56FF36702BD7D3C0ABC0F39010
2,487,586 UART: [art] PUB.Y = D3ABBDA768949071D2FB8189FB77DA23DA459E2F6EF6FE6EE91E66C31193DC0539C99765BE2BD0D38E063C003C294D44
2,494,520 UART: [art] SIG.R = 318CFB257F8E67AA990CF8232F285F914FD025694DA1959CF0D748F92198BBFC06EBE65657DCD5CCB8AD60963920903D
2,501,292 UART: [art] SIG.S = 325B34B63380580BB0BCD6797EA3F5EA8E229EF27BBB625F2DE26D4899E072B0B882B1D74CEB1E4423A6F1376ED1E2C4
2,525,146 UART: mbox::rt_entry...
2,525,518 UART: ____ _ _ _ ____ _____
2,526,302 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,102 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,870 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,638 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,406 UART: |_|
2,529,718 UART:
2,636,414 UART: [rt] Runtime listening for mailbox commands...
2,641,372 >>> mbox cmd response data (3272 bytes)
2,641,373 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,664,458 >>> mbox cmd response data (0 bytes)
2,664,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,095,465 >>> mbox cmd response: success
5,109,043 UART:
5,109,059 UART: Running Caliptra FMC ...
5,109,467 UART:
5,109,521 UART: [state] CFI Enabled
5,198,604 UART: [art] Extend RT PCRs Done
5,199,032 UART: [art] Lock RT PCRs Done
5,200,395 UART: [art] Populate DV Done
5,208,734 UART: [fht] FMC Alias Private Key: 7
5,209,870 UART: [art] Derive CDI
5,210,150 UART: [art] Store in in slot 0x4
5,296,075 UART: [art] Derive Key Pair
5,296,435 UART: [art] Store priv key in slot 0x5
5,309,739 UART: [art] Derive Key Pair - Done
5,324,531 UART: [art] Signing Cert with AUTHO
5,325,011 UART: RITY.KEYID = 7
5,339,867 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,632 UART: [art] PUB.X = 94DC815E6BBC67DBE972CD394451B0EA6451662DFD6D47EEF6E32034F4B9C9CB2185EB81C423971AB8CDD19BF5B370EA
5,347,420 UART: [art] PUB.Y = 7C0C0AF2324B6C1CB1685F2AA03AEECCADABA675001059E09A01AD042EE3A099248E09E6EC6042E07FC5A66B86112826
5,354,345 UART: [art] SIG.R = 0EB887BED1B65FD6F86F3842806562B9C9A6DE3DB75F7218B0C4512602B275224A133338464F12C166AB8663FFD4BEA1
5,361,111 UART: [art] SIG.S = FBEA85015567F09D62706588B848031D4CEDDA6E7DB1B904DCF24652EA892E67E7DB0BE73FC01433E30940699EEC7492
5,385,361 UART: Caliptra RT
5,385,615 UART: [state] CFI Enabled
5,449,156 UART: Disabled attest: DPE valid fail
5,449,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,451,242 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,481,257 UART: [rt]cmd =0x494e464f, len=4
5,484,671 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,058 UART: [idev] ++
1,173,226 UART: [idev] CDI.KEYID = 6
1,173,587 UART: [idev] SUBJECT.KEYID = 7
1,174,012 UART: [idev] UDS.KEYID = 0
1,174,358 ready_for_fw is high
1,174,358 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,704 UART: [idev] Sha1 KeyId Algorithm
1,208,420 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,185 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,867 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,477 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,711 >>> mbox cmd response: success
2,310,711 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,900 UART: [afmc] ++
2,312,068 UART: [afmc] CDI.KEYID = 6
2,312,431 UART: [afmc] SUBJECT.KEYID = 7
2,312,857 UART: [afmc] AUTHORITY.KEYID = 5
2,348,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,910 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,499 UART: [afmc] --
2,391,529 UART: [cold-reset] --
2,392,349 UART: [state] Locking Datavault
2,393,664 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,268 UART: [state] Locking ICCM
2,394,700 UART: [exit] Launching FMC @ 0x40000130
2,400,029 UART:
2,400,045 UART: Running Caliptra FMC ...
2,400,453 UART:
2,400,596 UART: [state] CFI Enabled
2,411,057 UART: [fht] FMC Alias Private Key: 7
2,519,418 UART: [art] Extend RT PCRs Done
2,519,846 UART: [art] Lock RT PCRs Done
2,521,582 UART: [art] Populate DV Done
2,529,537 UART: [fht] FMC Alias Private Key: 7
2,530,475 UART: [art] Derive CDI
2,530,755 UART: [art] Store in in slot 0x4
2,616,154 UART: [art] Derive Key Pair
2,616,514 UART: [art] Store priv key in slot 0x5
2,630,114 UART: [art] Derive Key Pair - Done
2,644,588 UART: [art] Signing Cert with AUTHO
2,645,068 UART: RITY.KEYID = 7
2,660,362 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,127 UART: [art] PUB.X = D7AE5D24EE727AD1A7908B10E11E14B5574634430DBAC91C4DF5EAC6E3DF661D118575D00B8FC8F0B36AAC73094D1062
2,667,900 UART: [art] PUB.Y = 002D19FCE34F0D33B255ED27A4AD1CA67A6571EB7B31240B9E6CE0B642AE67E8A02CE19D0888290E2DD61088D699176C
2,674,824 UART: [art] SIG.R = A5C4E6B837661BA0D41A209C0E15C06FEF83D1981F321ADD7BE996B9C91B74269B72DF28F9673CA48FBCAD2A4A930DBB
2,681,606 UART: [art] SIG.S = 306CB65329C3E999A0FD9B22C1A43B5B63314FCF66735546E42EB3FDD87205532978C6F658B154A8A6BD77BDFD412CB5
2,705,346 UART: mbox::rt_entry...
2,705,718 UART: ____ _ _ _ ____ _____
2,706,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,070 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,606 UART: |_|
2,709,918 UART:
2,816,506 UART: [rt] Runtime listening for mailbox commands...
2,821,464 >>> mbox cmd response data (3272 bytes)
2,821,465 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,550 >>> mbox cmd response data (0 bytes)
2,844,551 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,844,668 UART:
2,844,684 UART: Running Caliptra ROM ...
2,845,092 UART:
2,845,234 UART: [state] CFI Enabled
2,848,204 UART: [state] LifecycleState = Unprovisioned
2,848,859 UART: [state] DebugLocked = No
2,849,473 UART: [state] WD Timer not started. Device not locked for debugging
2,850,771 UART: [kat] SHA2-256
3,654,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,450 UART: [kat] ++
3,658,602 UART: [kat] sha1
3,662,930 UART: [kat] SHA2-256
3,664,870 UART: [kat] SHA2-384
3,667,691 UART: [kat] SHA2-512-ACC
3,669,591 UART: [kat] ECC-384
3,679,234 UART: [kat] HMAC-384Kdf
3,683,962 UART: [kat] LMS
3,932,274 UART: [kat] --
3,933,156 UART: [update-reset] ++
5,245,986 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,963 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,396,829 >>> mbox cmd response: success
5,397,034 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,048 UART: [update-reset Success] --
5,406,285 UART: [state] Locking Datavault
5,407,229 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,833 UART: [state] Locking ICCM
5,408,299 UART: [exit] Launching FMC @ 0x40000130
5,413,628 UART:
5,413,644 UART: Running Caliptra FMC ...
5,414,052 UART:
5,414,195 UART: [state] CFI Enabled
5,503,490 UART: [art] Extend RT PCRs Done
5,503,918 UART: [art] Lock RT PCRs Done
5,505,087 UART: [art] Populate DV Done
5,513,508 UART: [fht] FMC Alias Private Key: 7
5,514,638 UART: [art] Derive CDI
5,514,918 UART: [art] Store in in slot 0x4
5,600,729 UART: [art] Derive Key Pair
5,601,089 UART: [art] Store priv key in slot 0x5
5,614,107 UART: [art] Derive Key Pair - Done
5,628,643 UART: [art] Signing Cert with AUTHO
5,629,123 UART: RITY.KEYID = 7
5,644,161 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,926 UART: [art] PUB.X = A05E507A0EAB20CA223C0BB97184DC39E138AB936672EAFDA1176F6E83E740A218AA692E5A4CB10965A86CEA4C8E4776
5,651,699 UART: [art] PUB.Y = 226249E42C5606A5373F6B8EE2FF9C11E196BF606C53CC4D898AB0462E46D9EE4459CEC02C1B998CF7317835D56E4CFB
5,658,654 UART: [art] SIG.R = 903787E114F40066C6A1AC34408230FAFEC09541CE990453A8920425D6619CF707FADE033511DEFB76756DAF3C711E45
5,665,388 UART: [art] SIG.S = 9E66B0D0969797D0A7680E17C2ED04D090CBA48E2D12D40C3AA88D11ACAEABE09A5298BD9446FC8D1EB843FE8B5B1D6A
5,688,996 UART: Caliptra RT
5,689,342 UART: [state] CFI Enabled
5,752,426 UART: Disabled attest: DPE valid fail
5,752,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,754,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,784,791 UART: [rt]cmd =0x494e464f, len=4
5,788,119 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,189 ready_for_fw is high
1,056,189 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,160,397 >>> mbox cmd response: success
2,160,397 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,347 UART:
2,222,363 UART: Running Caliptra FMC ...
2,222,771 UART:
2,222,914 UART: [state] CFI Enabled
2,233,367 UART: [fht] FMC Alias Private Key: 7
2,342,022 UART: [art] Extend RT PCRs Done
2,342,450 UART: [art] Lock RT PCRs Done
2,344,066 UART: [art] Populate DV Done
2,352,271 UART: [fht] FMC Alias Private Key: 7
2,353,435 UART: [art] Derive CDI
2,353,715 UART: [art] Store in in slot 0x4
2,438,766 UART: [art] Derive Key Pair
2,439,126 UART: [art] Store priv key in slot 0x5
2,452,508 UART: [art] Derive Key Pair - Done
2,467,645 UART: [art] Signing Cert with AUTHO
2,468,125 UART: RITY.KEYID = 7
2,483,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,076 UART: [art] PUB.X = D34BC63B6A024419D47CA4ECEE07606AF3D3401CCAA1170C8C0CC14D707820EB231D81644F859821BEE099578014B685
2,490,836 UART: [art] PUB.Y = FBB1D6CABD0DADD06CC047B5797EF3A17DE349428321748A4F88151DF0E5B248B06C4AA49DAB0E1DBCF5A54D6EDF92E6
2,497,806 UART: [art] SIG.R = D6D17F4525EBB1E6D4583002217E5C9A45C0C945FAEE50B260FF06129B1E1047B3F4264302358739973C4A1C9C5EF033
2,504,565 UART: [art] SIG.S = 25A42E5F26FEBEA4884ECE9F4A5E7673BE3CF4E86718AF49FC7BD1D6783A22477BBF5874ACA97DC195BC32257AD09BFB
2,528,332 UART: mbox::rt_entry...
2,528,704 UART: ____ _ _ _ ____ _____
2,529,488 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,824 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,592 UART: |_|
2,532,904 UART:
2,639,252 UART: [rt] Runtime listening for mailbox commands...
2,644,210 >>> mbox cmd response data (3272 bytes)
2,644,211 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,296 >>> mbox cmd response data (0 bytes)
2,667,297 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,099,920 >>> mbox cmd response: success
5,113,386 UART:
5,113,402 UART: Running Caliptra FMC ...
5,113,810 UART:
5,113,953 UART: [state] CFI Enabled
5,203,326 UART: [art] Extend RT PCRs Done
5,203,754 UART: [art] Lock RT PCRs Done
5,205,009 UART: [art] Populate DV Done
5,213,148 UART: [fht] FMC Alias Private Key: 7
5,214,238 UART: [art] Derive CDI
5,214,518 UART: [art] Store in in slot 0x4
5,300,235 UART: [art] Derive Key Pair
5,300,595 UART: [art] Store priv key in slot 0x5
5,314,113 UART: [art] Derive Key Pair - Done
5,328,992 UART: [art] Signing Cert with AUTHO
5,329,472 UART: RITY.KEYID = 7
5,344,982 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,747 UART: [art] PUB.X = 89D463FB9DFD88112E2BB14B43DD99706CA0D2EBB41B63577EBBC53506A339CAC66CE681571F732697194EBC38A27B0A
5,352,521 UART: [art] PUB.Y = 65237B847574B7EB7636BCD08D31C35DAAEE34334FBEEBDC963A600102702A32D10D896CE6FE5697164EF756F035832C
5,359,466 UART: [art] SIG.R = 57CCF08793B8D85D3F47AED5FD3DC3232B2162B435C99B79101A4AA8AEC773A613C5E90139187FE5D3E7407D385F3B33
5,366,239 UART: [art] SIG.S = 88197DF8253F27F6372116585848385F924B7AA8747C15798A4439A3445DA872B054FFF698E0195B7E202B82D6BCB155
5,390,178 UART: Caliptra RT
5,390,524 UART: [state] CFI Enabled
5,453,581 UART: Disabled attest: DPE valid fail
5,454,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,455,603 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,485,732 UART: [rt]cmd =0x494e464f, len=4
5,489,166 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,477 UART:
192,832 UART: Running Caliptra ROM ...
194,025 UART:
194,180 UART: [state] CFI Enabled
267,798 UART: [state] LifecycleState = Unprovisioned
269,701 UART: [state] DebugLocked = No
272,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,932 UART: [kat] SHA2-256
447,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,096 UART: [kat] ++
458,696 UART: [kat] sha1
469,214 UART: [kat] SHA2-256
471,864 UART: [kat] SHA2-384
478,338 UART: [kat] SHA2-512-ACC
480,698 UART: [kat] ECC-384
2,767,796 UART: [kat] HMAC-384Kdf
2,800,080 UART: [kat] LMS
3,990,357 UART: [kat] --
3,996,190 UART: [cold-reset] ++
3,997,337 UART: [fht] Storing FHT @ 0x50003400
4,009,052 UART: [idev] ++
4,009,611 UART: [idev] CDI.KEYID = 6
4,010,569 UART: [idev] SUBJECT.KEYID = 7
4,011,805 UART: [idev] UDS.KEYID = 0
4,012,820 ready_for_fw is high
4,013,020 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,112,139 UART: [idev] Erasing UDS.KEYID = 0
7,346,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,381 UART: [idev] --
7,372,481 UART: [ldev] ++
7,373,048 UART: [ldev] CDI.KEYID = 6
7,374,061 UART: [ldev] SUBJECT.KEYID = 5
7,375,214 UART: [ldev] AUTHORITY.KEYID = 7
7,376,492 UART: [ldev] FE.KEYID = 1
7,422,408 UART: [ldev] Erasing FE.KEYID = 1
10,752,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,244 UART: [ldev] --
13,113,539 UART: [fwproc] Waiting for Commands...
13,115,957 UART: [fwproc] Received command 0x46574c44
13,118,134 UART: [fwproc] Received Image of size 78676 bytes
16,735,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,812,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,881,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,073,553 >>> mbox cmd response: success
17,074,042 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,077,521 UART: [afmc] ++
17,078,179 UART: [afmc] CDI.KEYID = 6
17,079,065 UART: [afmc] SUBJECT.KEYID = 7
17,080,281 UART: [afmc] AUTHORITY.KEYID = 5
20,456,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,756,129 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,770,493 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,785,366 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,767 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,821,110 UART: [afmc] --
22,824,111 UART: [cold-reset] --
22,829,853 UART: [state] Locking Datavault
22,835,307 UART: [state] Locking PCR0, PCR1 and PCR31
22,837,051 UART: [state] Locking ICCM
22,839,630 UART: [exit] Launching FMC @ 0x40000130
22,848,012 UART:
22,848,262 UART: Running Caliptra FMC ...
22,849,354 UART:
22,849,505 UART: [state] CFI Enabled
22,914,694 UART: [fht] FMC Alias Private Key: 7
25,252,438 UART: [art] Extend RT PCRs Done
25,253,817 UART: [art] Lock RT PCRs Done
25,255,083 UART: [art] Populate DV Done
25,260,232 UART: [fht] FMC Alias Private Key: 7
25,261,766 UART: [art] Derive CDI
25,262,492 UART: [art] Store in in slot 0x4
25,323,597 UART: [art] Derive Key Pair
25,324,589 UART: [art] Store priv key in slot 0x5
28,617,612 UART: [art] Derive Key Pair - Done
28,630,885 UART: [art] Signing Cert with AUTHO
28,632,185 UART: RITY.KEYID = 7
30,919,462 UART: [art] Erasing AUTHORITY.KEYID = 7
30,920,993 UART: [art] PUB.X = 40C03AFD24A9941BA51F5417198C319BE25DD4B7B181948073DE95A4FF4A64E7A47CABCC450EF11132F1F34064DA4641
30,928,231 UART: [art] PUB.Y = 46CE6D2553D6C9A984B43F2239AB593A2794B0B479591568A17376571D79344B86C3CCBFF45DD3C49C978B3AF18DBEC6
30,935,489 UART: [art] SIG.R = 14BB2B72E26D0A0FE1B1150C2CF65F3A4B310D3FF40CCF7A411C9D9CCCD4685CFB38E3E9C7B01860F6EF43891E028C50
30,942,889 UART: [art] SIG.S = D11C58AED057377A6D760A3174EFC00005281E7FBC1BADE73C94881B66E66094CC5A26BC00FBC73D857D632F73F40AED
32,247,403 UART: mbox::rt_entry...
32,248,372 UART: ____ _ _ _ ____ _____
32,250,354 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,185 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,103 UART: |_|
32,258,904 UART:
32,372,768 UART: [rt] Runtime listening for mailbox commands...
32,378,608 >>> mbox cmd response data (3272 bytes)
32,394,194 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,427,589 >>> mbox cmd response data (0 bytes)
34,490,909 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,635,253 UART:
34,635,637 UART: Running Caliptra ROM ...
34,636,681 UART:
34,636,825 UART: [state] CFI Enabled
34,695,559 UART: [state] LifecycleState = Unprovisioned
34,697,497 UART: [state] DebugLocked = No
34,699,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,704,930 UART: [kat] SHA2-256
34,874,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,885,130 UART: [kat] ++
34,885,634 UART: [kat] sha1
34,897,536 UART: [kat] SHA2-256
34,900,217 UART: [kat] SHA2-384
34,906,466 UART: [kat] SHA2-512-ACC
34,908,860 UART: [kat] ECC-384
37,199,009 UART: [kat] HMAC-384Kdf
37,231,393 UART: [kat] LMS
38,421,714 UART: [kat] --
38,426,696 UART: [update-reset] ++
42,565,538 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,569,904 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,951,866 >>> mbox cmd response: success
42,956,556 UART: [update-reset] Copying MAN_2 To MAN_1
42,975,789 UART: [update-reset Success] --
42,981,171 UART: [state] Locking Datavault
42,984,750 UART: [state] Locking PCR0, PCR1 and PCR31
42,986,502 UART: [state] Locking ICCM
42,988,949 UART: [exit] Launching FMC @ 0x40000130
42,997,393 UART:
42,997,627 UART: Running Caliptra FMC ...
42,998,643 UART:
42,998,782 UART: [state] CFI Enabled
43,089,211 UART: [art] Extend RT PCRs Done
43,090,398 UART: [art] Lock RT PCRs Done
43,091,553 UART: [art] Populate DV Done
43,096,996 UART: [fht] FMC Alias Private Key: 7
43,098,629 UART: [art] Derive CDI
43,099,468 UART: [art] Store in in slot 0x4
43,158,126 UART: [art] Derive Key Pair
43,159,122 UART: [art] Store priv key in slot 0x5
46,451,825 UART: [art] Derive Key Pair - Done
46,464,772 UART: [art] Signing Cert with AUTHO
46,466,115 UART: RITY.KEYID = 7
48,753,999 UART: [art] Erasing AUTHORITY.KEYID = 7
48,755,503 UART: [art] PUB.X = 6A86FD0AEBEE69FC54A75CEF639C8E51298FB9B0294463FDCC41E3BB40F834AADB185890E1AA0182653F1B849738450E
48,762,728 UART: [art] PUB.Y = EBD2106178E5036A48BC851F0EC957DCDF9AB69B407B100CFF1F964B4CEC09312B1568895171A72BF790A657B3B79866
48,769,997 UART: [art] SIG.R = FFEEF165F2FE3ABE889BDB85B091F91138B9E1B0AAEEA06CAD4B0677F42E043F25047ECEF8DF3C87656A35A0183F68A8
48,777,403 UART: [art] SIG.S = AD70E902B8C051575BA09D3345F9CCABD765D9960DD8475EE659594E92811F4BAD8D131275E7EA32EA9E2A28D95A1A6C
50,082,478 UART: Caliptra RT
50,083,179 UART: [state] CFI Enabled
53,768,930 UART: Disable attest DPE used context limit breach
53,770,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,772,144 UART: [rt] RT listening for mailbox commands...
53,803,152 UART: [rt]cmd =0x494e464f, len=4
53,807,092 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,803,598 ready_for_fw is high
3,804,208 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,157,452 >>> mbox cmd response: success
17,158,107 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,844,107 UART:
22,844,490 UART: Running Caliptra FMC ...
22,845,577 UART:
22,845,742 UART: [state] CFI Enabled
22,913,047 UART: [fht] FMC Alias Private Key: 7
25,251,017 UART: [art] Extend RT PCRs Done
25,252,388 UART: [art] Lock RT PCRs Done
25,253,729 UART: [art] Populate DV Done
25,259,201 UART: [fht] FMC Alias Private Key: 7
25,260,783 UART: [art] Derive CDI
25,261,510 UART: [art] Store in in slot 0x4
25,321,322 UART: [art] Derive Key Pair
25,322,315 UART: [art] Store priv key in slot 0x5
28,615,477 UART: [art] Derive Key Pair - Done
28,628,360 UART: [art] Signing Cert with AUTHO
28,629,657 UART: RITY.KEYID = 7
30,917,310 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,819 UART: [art] PUB.X = 5F3C455029832680B4736DE0297B091701C7284EDF5CBA6E71851E3DC287C07E575F840FEF6B9F298A65352CA37D9AF1
30,926,060 UART: [art] PUB.Y = C94F7B85B7BDC3056078D490169BA8C25D8F717EE2D1BBBFF5B1EB37BCA654155290464D9194BA8B3A8645618F7DAE87
30,933,342 UART: [art] SIG.R = 2278AE189AAC00BD7884EFA4F7D12390BC027F47D4B0313ED4D776C49FF873EE0E0C6AD33FCD871CE1ABCC0B1FF36A47
30,940,679 UART: [art] SIG.S = 26D58A547198C8A888CD2111251F01250D942A5E1250841DDF202E54A616741A9A1A86049D29BE8E2503BFE83505D0C7
32,245,170 UART: mbox::rt_entry...
32,246,131 UART: ____ _ _ _ ____ _____
32,248,229 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,232 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,153 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,103 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,026 UART: |_|
32,256,828 UART:
32,369,840 UART: [rt] Runtime listening for mailbox commands...
32,375,657 >>> mbox cmd response data (3272 bytes)
32,391,501 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,424,884 >>> mbox cmd response data (0 bytes)
34,484,097 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,191,582 >>> mbox cmd response: success
43,226,463 UART:
43,226,767 UART: Running Caliptra FMC ...
43,227,803 UART:
43,227,945 UART: [state] CFI Enabled
43,318,493 UART: [art] Extend RT PCRs Done
43,319,680 UART: [art] Lock RT PCRs Done
43,321,206 UART: [art] Populate DV Done
43,326,982 UART: [fht] FMC Alias Private Key: 7
43,328,510 UART: [art] Derive CDI
43,329,234 UART: [art] Store in in slot 0x4
43,387,838 UART: [art] Derive Key Pair
43,388,876 UART: [art] Store priv key in slot 0x5
46,681,670 UART: [art] Derive Key Pair - Done
46,694,931 UART: [art] Signing Cert with AUTHO
46,696,269 UART: RITY.KEYID = 7
48,983,699 UART: [art] Erasing AUTHORITY.KEYID = 7
48,985,212 UART: [art] PUB.X = B7A0A6CFEF3CC7691A04E0978E93FCCE4A9D384CCD433FB7B347BBD0582334ABA373E8C965678913BA40B61520A310A6
48,992,453 UART: [art] PUB.Y = 07D6D880CC50F8C34E546CF39C992DA0B245A896E1121641CF9BBCC460F24380FA3BACFE9D17970139D2A8C32A745DD1
48,999,712 UART: [art] SIG.R = A34C31EF5F52F79693AAD381AD71CBF8E82C42C1AE7019C83D5E17FCFB903B4D6AC4B6ED4B3324F73A0B18F4C6CC3BA3
49,007,086 UART: [art] SIG.S = E55DF66B93D95FF49E630001AA159AF3792FAA7F3C8A0CB0D2CE85BA24FF2D02831385713CF585E6FAA9E95E5F1DF4B2
50,312,721 UART: Caliptra RT
50,313,417 UART: [state] CFI Enabled
53,997,108 UART: Disable attest DPE used context limit breach
53,999,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,000,266 UART: [rt] RT listening for mailbox commands...
54,031,275 UART: [rt]cmd =0x494e464f, len=4
54,035,380 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,500 UART:
192,866 UART: Running Caliptra ROM ...
193,957 UART:
603,772 UART: [state] CFI Enabled
618,070 UART: [state] LifecycleState = Unprovisioned
619,941 UART: [state] DebugLocked = No
622,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,188 UART: [kat] SHA2-256
796,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,470 UART: [kat] ++
807,915 UART: [kat] sha1
820,275 UART: [kat] SHA2-256
822,948 UART: [kat] SHA2-384
828,623 UART: [kat] SHA2-512-ACC
831,006 UART: [kat] ECC-384
3,115,495 UART: [kat] HMAC-384Kdf
3,129,025 UART: [kat] LMS
4,319,170 UART: [kat] --
4,323,097 UART: [cold-reset] ++
4,325,037 UART: [fht] Storing FHT @ 0x50003400
4,337,012 UART: [idev] ++
4,337,659 UART: [idev] CDI.KEYID = 6
4,338,576 UART: [idev] SUBJECT.KEYID = 7
4,339,825 UART: [idev] UDS.KEYID = 0
4,340,911 ready_for_fw is high
4,341,150 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,440,331 UART: [idev] Erasing UDS.KEYID = 0
7,625,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,411 UART: [idev] --
7,650,672 UART: [ldev] ++
7,651,237 UART: [ldev] CDI.KEYID = 6
7,652,170 UART: [ldev] SUBJECT.KEYID = 5
7,653,452 UART: [ldev] AUTHORITY.KEYID = 7
7,654,601 UART: [ldev] FE.KEYID = 1
7,666,993 UART: [ldev] Erasing FE.KEYID = 1
10,958,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,267 UART: [ldev] --
13,318,478 UART: [fwproc] Waiting for Commands...
13,321,810 UART: [fwproc] Received command 0x46574c44
13,324,045 UART: [fwproc] Received Image of size 78676 bytes
16,943,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,024,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,092,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 53972
17,285,809 >>> mbox cmd response: success
17,286,316 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,289,320 UART: [afmc] ++
17,289,912 UART: [afmc] CDI.KEYID = 6
17,290,850 UART: [afmc] SUBJECT.KEYID = 7
17,292,122 UART: [afmc] AUTHORITY.KEYID = 5
20,606,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,901,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,903,398 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,917,762 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,932,594 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,947,038 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,967,953 UART: [afmc] --
22,971,434 UART: [cold-reset] --
22,975,507 UART: [state] Locking Datavault
22,981,560 UART: [state] Locking PCR0, PCR1 and PCR31
22,983,331 UART: [state] Locking ICCM
22,984,699 UART: [exit] Launching FMC @ 0x40000130
22,993,097 UART:
22,993,334 UART: Running Caliptra FMC ...
22,994,434 UART:
22,994,588 UART: [state] CFI Enabled
23,002,521 UART: [fht] FMC Alias Private Key: 7
25,333,617 UART: [art] Extend RT PCRs Done
25,334,837 UART: [art] Lock RT PCRs Done
25,336,300 UART: [art] Populate DV Done
25,341,818 UART: [fht] FMC Alias Private Key: 7
25,343,362 UART: [art] Derive CDI
25,344,177 UART: [art] Store in in slot 0x4
25,387,042 UART: [art] Derive Key Pair
25,388,086 UART: [art] Store priv key in slot 0x5
28,629,961 UART: [art] Derive Key Pair - Done
28,642,580 UART: [art] Signing Cert with AUTHO
28,643,901 UART: RITY.KEYID = 7
30,923,267 UART: [art] Erasing AUTHORITY.KEYID = 7
30,924,770 UART: [art] PUB.X = C3DF3657CF43617F76C8358940795A4909AD4E144AB7931B7FDDB063E40DD387F171CE48F6AA48B217DAE4539DCD0675
30,932,003 UART: [art] PUB.Y = C7E8D58D58589144A6BEF4B2A2D0BB84BC28BF115D73A5743C5E5BBE192E4A9597304AFAC8CA09A99600FE73326599F9
30,939,275 UART: [art] SIG.R = 16B8B21B20B8CE01004948B21F268F756F8813DEECEC4297274A05114B9EF4366AD79AF8D3B6E3C459785EA02DCB1831
30,946,656 UART: [art] SIG.S = 20AED0774C2801A7E0ECE1ED5745126A494FF6CD4E449C846F5D25B3B2C41371B31B0F45751C465428D7E702EADB6382
32,251,497 UART: mbox::rt_entry...
32,252,444 UART: ____ _ _ _ ____ _____
32,254,368 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,256,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,258,224 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,260,145 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,262,208 UART: |_|
32,263,112 UART:
32,377,043 UART: [rt] Runtime listening for mailbox commands...
32,382,894 >>> mbox cmd response data (3272 bytes)
32,398,497 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,431,897 >>> mbox cmd response data (0 bytes)
34,491,766 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,636,550 UART:
34,636,948 UART: Running Caliptra ROM ...
34,638,040 UART:
34,638,203 UART: [state] CFI Enabled
34,654,425 UART: [state] LifecycleState = Unprovisioned
34,656,380 UART: [state] DebugLocked = No
34,658,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,663,820 UART: [kat] SHA2-256
34,833,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,844,101 UART: [kat] ++
34,844,641 UART: [kat] sha1
34,855,101 UART: [kat] SHA2-256
34,857,787 UART: [kat] SHA2-384
34,864,690 UART: [kat] SHA2-512-ACC
34,867,098 UART: [kat] ECC-384
37,150,349 UART: [kat] HMAC-384Kdf
37,160,843 UART: [kat] LMS
38,350,913 UART: [kat] --
38,355,994 UART: [update-reset] ++
42,494,000 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,496,973 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
42,878,970 >>> mbox cmd response: success
42,883,696 UART: [update-reset] Copying MAN_2 To MAN_1
42,902,486 UART: [update-reset Success] --
42,905,160 UART: [state] Locking Datavault
42,907,990 UART: [state] Locking PCR0, PCR1 and PCR31
42,909,697 UART: [state] Locking ICCM
42,912,284 UART: [exit] Launching FMC @ 0x40000130
42,920,680 UART:
42,920,924 UART: Running Caliptra FMC ...
42,922,027 UART:
42,922,181 UART: [state] CFI Enabled
42,966,678 UART: [art] Extend RT PCRs Done
42,967,820 UART: [art] Lock RT PCRs Done
42,969,265 UART: [art] Populate DV Done
42,974,631 UART: [fht] FMC Alias Private Key: 7
42,976,170 UART: [art] Derive CDI
42,976,924 UART: [art] Store in in slot 0x4
43,019,453 UART: [art] Derive Key Pair
43,020,505 UART: [art] Store priv key in slot 0x5
46,262,226 UART: [art] Derive Key Pair - Done
46,275,172 UART: [art] Signing Cert with AUTHO
46,276,483 UART: RITY.KEYID = 7
48,556,229 UART: [art] Erasing AUTHORITY.KEYID = 7
48,557,743 UART: [art] PUB.X = 46AF8F825E93B325B6676C74070A6ADFE1DEF3873534521D806934C4C68AC3DB13E6E339FC99B753DDAAB862779E024B
48,564,974 UART: [art] PUB.Y = 7B835130254F1B2A2BCC44EC5F09B08551F87EC62E16918A28F4218CA85581A384A6FB937C1E25B3ACA807E77E810359
48,572,227 UART: [art] SIG.R = 5B7B04E233EF8DF6DBD9C44003A72149E77FC41A6D03866BD26716D3DC2D8C46E1E08F2A5CF5946E67A47D866F242C60
48,579,576 UART: [art] SIG.S = 788E5C386793F19B9FB2B05B87D18719527989569ED06C957169C8A6168FB0A6577EDD61070D4E2F2619B7BC98138987
49,884,700 UART: Caliptra RT
49,885,417 UART: [state] CFI Enabled
53,473,447 UART: Disable attest DPE used context limit breach
53,475,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,476,426 UART: [rt] RT listening for mailbox commands...
53,507,321 UART: [rt]cmd =0x494e464f, len=4
53,511,162 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,127,464 ready_for_fw is high
4,128,026 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
17,333,608 >>> mbox cmd response: success
17,334,189 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,967,384 UART:
22,967,770 UART: Running Caliptra FMC ...
22,968,910 UART:
22,969,067 UART: [state] CFI Enabled
22,976,748 UART: [fht] FMC Alias Private Key: 7
25,307,955 UART: [art] Extend RT PCRs Done
25,309,200 UART: [art] Lock RT PCRs Done
25,311,048 UART: [art] Populate DV Done
25,316,474 UART: [fht] FMC Alias Private Key: 7
25,317,962 UART: [art] Derive CDI
25,318,727 UART: [art] Store in in slot 0x4
25,361,163 UART: [art] Derive Key Pair
25,362,202 UART: [art] Store priv key in slot 0x5
28,604,067 UART: [art] Derive Key Pair - Done
28,616,856 UART: [art] Signing Cert with AUTHO
28,618,153 UART: RITY.KEYID = 7
30,897,895 UART: [art] Erasing AUTHORITY.KEYID = 7
30,899,400 UART: [art] PUB.X = 02655DD821DA647539D27E180271E6CB696E7807B56298908AE9300190B9B03E16376E62C1760F3E85DA35792CA3F005
30,906,618 UART: [art] PUB.Y = 3335F0C3E0C85E09D8C13FFFEBFAB0CED8A43DE5911F904E6FA6870A5E44F5F1ACF8B44FC08BF8456047143E8993C458
30,913,877 UART: [art] SIG.R = B1514410D5CBF28254E37EE18C560C59CABBE58963DEFD383A79205794A158A24CA4664E51CDA4A74FEF687C24E42323
30,921,235 UART: [art] SIG.S = DC28ADF5759A095C5C2EC5BE4D7C0C3BB2D6594E61751261E33F63051BB9DE3A4E16F471A522844921E1912C4E39E1E3
32,226,500 UART: mbox::rt_entry...
32,227,481 UART: ____ _ _ _ ____ _____
32,229,465 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,231,465 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,233,391 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,235,354 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,237,284 UART: |_|
32,238,096 UART:
32,351,913 UART: [rt] Runtime listening for mailbox commands...
32,357,704 >>> mbox cmd response data (3272 bytes)
32,373,522 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,406,920 >>> mbox cmd response data (0 bytes)
34,465,864 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
43,136,444 >>> mbox cmd response: success
43,171,966 UART:
43,172,276 UART: Running Caliptra FMC ...
43,173,316 UART:
43,173,465 UART: [state] CFI Enabled
43,217,411 UART: [art] Extend RT PCRs Done
43,218,622 UART: [art] Lock RT PCRs Done
43,219,895 UART: [art] Populate DV Done
43,225,263 UART: [fht] FMC Alias Private Key: 7
43,226,906 UART: [art] Derive CDI
43,227,649 UART: [art] Store in in slot 0x4
43,270,231 UART: [art] Derive Key Pair
43,271,271 UART: [art] Store priv key in slot 0x5
46,513,185 UART: [art] Derive Key Pair - Done
46,525,861 UART: [art] Signing Cert with AUTHO
46,527,164 UART: RITY.KEYID = 7
48,807,212 UART: [art] Erasing AUTHORITY.KEYID = 7
48,808,717 UART: [art] PUB.X = 69F1D69EF4A6A2B5847B7CDA21AF1893537415B969CD9507CF9DA41CF060F1B76017FA3081F2FC1DD81809D57DF2B3A2
48,815,984 UART: [art] PUB.Y = 2C7967545F5B89FE0CF502DC047F7F1B35ABFAB041A1837702E9CE00292895624C3DD779F62210E0480BF0A189708F96
48,823,225 UART: [art] SIG.R = A6C4E983FD8CF98CA6179E56EDAE54A545870E9AE5C618F680E82D9055F4291F4EA4733C192B5175AA8E53F5DAE1C149
48,830,585 UART: [art] SIG.S = D9BC39442660BB777F364BC40D3DC9EA525CF83293AEAD001DB6D3380A12E2C23E516CE3CC8D559F64E8A1E850C80CF1
50,135,401 UART: Caliptra RT
50,136,122 UART: [state] CFI Enabled
53,724,766 UART: Disable attest DPE used context limit breach
53,726,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,727,647 UART: [rt] RT listening for mailbox commands...
53,758,819 UART: [rt]cmd =0x494e464f, len=4
53,762,750 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
192,553 UART:
192,937 UART: Running Caliptra ROM ...
194,139 UART:
194,298 UART: [state] CFI Enabled
267,424 UART: [state] LifecycleState = Unprovisioned
269,333 UART: [state] DebugLocked = No
272,080 UART: [state] WD Timer not started. Device not locked for debugging
275,269 UART: [kat] SHA2-256
454,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,976 UART: [kat] ++
466,429 UART: [kat] sha1
477,582 UART: [kat] SHA2-256
480,604 UART: [kat] SHA2-384
485,539 UART: [kat] SHA2-512-ACC
488,537 UART: [kat] ECC-384
2,948,530 UART: [kat] HMAC-384Kdf
2,971,483 UART: [kat] LMS
3,500,957 UART: [kat] --
3,506,822 UART: [cold-reset] ++
3,508,332 UART: [fht] FHT @ 0x50003400
3,518,672 UART: [idev] ++
3,519,230 UART: [idev] CDI.KEYID = 6
3,520,112 UART: [idev] SUBJECT.KEYID = 7
3,521,355 UART: [idev] UDS.KEYID = 0
3,522,256 ready_for_fw is high
3,522,452 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,621,473 UART: [idev] Erasing UDS.KEYID = 0
6,024,606 UART: [idev] Sha1 KeyId Algorithm
6,047,347 UART: [idev] --
6,051,591 UART: [ldev] ++
6,052,172 UART: [ldev] CDI.KEYID = 6
6,053,058 UART: [ldev] SUBJECT.KEYID = 5
6,054,223 UART: [ldev] AUTHORITY.KEYID = 7
6,055,517 UART: [ldev] FE.KEYID = 1
6,098,991 UART: [ldev] Erasing FE.KEYID = 1
8,602,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,095 UART: [ldev] --
10,412,231 UART: [fwproc] Wait for Commands...
10,414,590 UART: [fwproc] Recv command 0x46574c44
10,416,682 UART: [fwproc] Recv'd Img size: 78632 bytes
13,386,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,460,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,529,720 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,722,221 >>> mbox cmd response: success
13,722,725 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,727,341 UART: [afmc] ++
13,727,963 UART: [afmc] CDI.KEYID = 6
13,728,855 UART: [afmc] SUBJECT.KEYID = 7
13,730,018 UART: [afmc] AUTHORITY.KEYID = 5
16,270,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,992,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,994,257 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,010,018 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,026,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,041,909 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,064,343 UART: [afmc] --
18,068,565 UART: [cold-reset] --
18,072,756 UART: [state] Locking Datavault
18,076,275 UART: [state] Locking PCR0, PCR1 and PCR31
18,077,984 UART: [state] Locking ICCM
18,080,356 UART: [exit] Launching FMC @ 0x40000130
18,088,807 UART:
18,089,046 UART: Running Caliptra FMC ...
18,090,153 UART:
18,090,320 UART: [state] CFI Enabled
18,152,005 UART: [fht] FMC Alias Private Key: 7
19,916,025 UART: [art] Extend RT PCRs Done
19,917,234 UART: [art] Lock RT PCRs Done
19,919,024 UART: [art] Populate DV Done
19,924,281 UART: [fht] FMC Alias Private Key: 7
19,925,987 UART: [art] Derive CDI
19,926,806 UART: [art] Store in in slot 0x4
19,984,209 UART: [art] Derive Key Pair
19,985,265 UART: [art] Store priv key in slot 0x5
22,448,257 UART: [art] Derive Key Pair - Done
22,461,254 UART: [art] Signing Cert with AUTHO
22,462,566 UART: RITY.KEYID = 7
24,173,768 UART: [art] Erasing AUTHORITY.KEYID = 7
24,175,273 UART: [art] PUB.X = 77B117C43A7CD64BA8079A43B1E6894285AC39F785B68EEE16679AE2BA38B40D51D5A4C29CD7186E6354DBDE8D27EF19
24,182,514 UART: [art] PUB.Y = 303E4E4D7A25B6336589B9E7394192BD607A55AB9598862F0BDD94BA9F7BB5339A6F13B8D726218680A43DDCA2B48325
24,189,788 UART: [art] SIG.R = C75BF7C98782B33CA72E372CFD2869887D9378500B6EBE9A1A8BC415DF2B08788B835404589A4526EA894F7517F3FAF7
24,197,115 UART: [art] SIG.S = 7EB23A2307DB26D07CEC9A016CF743388573D036E34C8914F2ABFA2F7CB8F336069A160862C5AFF8DF731876B0D60DB6
25,175,984 UART: mbox::rt_entry...
25,176,936 UART: ____ _ _ _ ____ _____
25,178,920 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,180,925 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,182,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,184,798 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,186,671 UART: |_|
25,187,469 UART:
25,299,884 UART: [rt] Runtime listening for mailbox commands...
25,305,729 >>> mbox cmd response data (3272 bytes)
25,321,584 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,355,222 >>> mbox cmd response data (0 bytes)
27,414,054 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,558,569 UART:
27,558,964 UART: Running Caliptra ROM ...
27,560,024 UART:
27,560,199 UART: [state] CFI Enabled
27,626,344 UART: [state] LifecycleState = Unprovisioned
27,628,230 UART: [state] DebugLocked = No
27,630,078 UART: [state] WD Timer not started. Device not locked for debugging
27,633,771 UART: [kat] SHA2-256
27,812,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,824,452 UART: [kat] ++
27,825,002 UART: [kat] sha1
27,836,769 UART: [kat] SHA2-256
27,839,787 UART: [kat] SHA2-384
27,846,256 UART: [kat] SHA2-512-ACC
27,849,195 UART: [kat] ECC-384
30,309,747 UART: [kat] HMAC-384Kdf
30,332,626 UART: [kat] LMS
30,862,081 UART: [kat] --
30,866,290 UART: [update-reset] ++
34,285,942 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,289,069 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
34,672,092 >>> mbox cmd response: success
34,676,631 UART: [update-reset] Copying MAN_2 To MAN_1
34,696,005 UART: [update-reset Success] --
34,701,545 UART: [state] Locking Datavault
34,704,590 UART: [state] Locking PCR0, PCR1 and PCR31
34,706,296 UART: [state] Locking ICCM
34,707,532 UART: [exit] Launching FMC @ 0x40000130
34,715,985 UART:
34,716,222 UART: Running Caliptra FMC ...
34,717,637 UART:
34,717,836 UART: [state] CFI Enabled
34,824,433 UART: [art] Extend RT PCRs Done
34,825,633 UART: [art] Lock RT PCRs Done
34,827,041 UART: [art] Populate DV Done
34,832,727 UART: [fht] FMC Alias Private Key: 7
34,834,220 UART: [art] Derive CDI
34,834,983 UART: [art] Store in in slot 0x4
34,894,270 UART: [art] Derive Key Pair
34,895,330 UART: [art] Store priv key in slot 0x5
37,357,978 UART: [art] Derive Key Pair - Done
37,370,940 UART: [art] Signing Cert with AUTHO
37,372,256 UART: RITY.KEYID = 7
39,083,377 UART: [art] Erasing AUTHORITY.KEYID = 7
39,084,883 UART: [art] PUB.X = B4F633ED3254830822EEFA0BFA3BB335C19CC0F3E86CE67F76813BC1463FED86C301A9201E8012EB1B799A2AA97A64D0
39,092,187 UART: [art] PUB.Y = FDB342BE8AE692B0D0BE5AA5435D027CC2FD3F12872946DAD2594870119AB0F74F13776FE7DD594F97EF003E4A814074
39,099,404 UART: [art] SIG.R = 4F9FE2711BAF9A1CE4A312F8DC0E9597F8C5B283392BCBD22DA161CCB63CAE54BB3F133E322115BAE902B7B76F4CD92B
39,106,849 UART: [art] SIG.S = 08795C1BF08E0D478FF8EE9E1B3AE15980786C9FBE4FE1E989565B925766342B7BD8653566B0D6BE9DF197E74E0E2D05
40,085,753 UART: Caliptra RT
40,086,460 UART: [state] CFI Enabled
42,946,776 UART: Disable attest DPE used context limit breach
42,948,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,949,809 UART: [rt] RT listening for mailbox commands...
42,980,815 UART: [rt]cmd =0x494e464f, len=4
42,984,661 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,588 UART:
192,944 UART: Running Caliptra ROM ...
194,120 UART:
194,279 UART: [state] CFI Enabled
263,445 UART: [state] LifecycleState = Unprovisioned
265,882 UART: [state] DebugLocked = No
267,427 UART: [state] WD Timer not started. Device not locked for debugging
272,117 UART: [kat] SHA2-256
462,006 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,767 UART: [kat] ++
473,432 UART: [kat] sha1
484,903 UART: [kat] SHA2-256
487,906 UART: [kat] SHA2-384
492,621 UART: [kat] SHA2-512-ACC
495,275 UART: [kat] ECC-384
2,949,081 UART: [kat] HMAC-384Kdf
2,971,054 UART: [kat] LMS
3,502,810 UART: [kat] --
3,506,884 UART: [cold-reset] ++
3,508,418 UART: [fht] FHT @ 0x50003400
3,519,862 UART: [idev] ++
3,520,587 UART: [idev] CDI.KEYID = 6
3,521,628 UART: [idev] SUBJECT.KEYID = 7
3,522,738 UART: [idev] UDS.KEYID = 0
3,523,817 ready_for_fw is high
3,524,019 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,623,040 UART: [idev] Erasing UDS.KEYID = 0
6,023,931 UART: [idev] Sha1 KeyId Algorithm
6,045,803 UART: [idev] --
6,050,174 UART: [ldev] ++
6,050,857 UART: [ldev] CDI.KEYID = 6
6,051,773 UART: [ldev] SUBJECT.KEYID = 5
6,052,934 UART: [ldev] AUTHORITY.KEYID = 7
6,054,170 UART: [ldev] FE.KEYID = 1
6,101,011 UART: [ldev] Erasing FE.KEYID = 1
8,606,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,759 UART: [ldev] --
10,415,188 UART: [fwproc] Wait for Commands...
10,417,722 UART: [fwproc] Recv command 0x46574c44
10,420,053 UART: [fwproc] Recv'd Img size: 78632 bytes
13,424,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,500,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,616,980 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,946,045 >>> mbox cmd response: success
13,946,551 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,950,476 UART: [afmc] ++
13,951,169 UART: [afmc] CDI.KEYID = 6
13,952,355 UART: [afmc] SUBJECT.KEYID = 7
13,953,846 UART: [afmc] AUTHORITY.KEYID = 5
16,491,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,215,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,217,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,232,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,247,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,262,707 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,287,488 UART: [afmc] --
18,290,219 UART: [cold-reset] --
18,293,219 UART: [state] Locking Datavault
18,300,473 UART: [state] Locking PCR0, PCR1 and PCR31
18,302,666 UART: [state] Locking ICCM
18,304,817 UART: [exit] Launching FMC @ 0x40000130
18,313,456 UART:
18,313,737 UART: Running Caliptra FMC ...
18,314,852 UART:
18,315,020 UART: [state] CFI Enabled
18,371,486 UART: [fht] FMC Alias Private Key: 7
20,135,812 UART: [art] Extend RT PCRs Done
20,137,018 UART: [art] Lock RT PCRs Done
20,138,700 UART: [art] Populate DV Done
20,144,218 UART: [fht] FMC Alias Private Key: 7
20,145,763 UART: [art] Derive CDI
20,146,600 UART: [art] Store in in slot 0x4
20,203,852 UART: [art] Derive Key Pair
20,204,888 UART: [art] Store priv key in slot 0x5
22,667,520 UART: [art] Derive Key Pair - Done
22,680,680 UART: [art] Signing Cert with AUTHO
22,681,986 UART: RITY.KEYID = 7
24,393,008 UART: [art] Erasing AUTHORITY.KEYID = 7
24,394,496 UART: [art] PUB.X = ABA397E6E2D229F8ED6557E1B6256E6FC21EE742F7EA0BA75849D9942C3B93124D5222ACAED7AF2D6BD5085D79B542BC
24,401,848 UART: [art] PUB.Y = A725411502304B59CD051DD21C5BD1AD92A5E484838310198AC1A6034386E2C37AFB088D4905554A75BCE1D6EBEFF64F
24,409,070 UART: [art] SIG.R = 495E2BC2B352169E8751F97E89C91E085D6378CFF80B8C3A0F03FFA94F28B98AC1917CF54225871A1671D76BDF4E4B05
24,416,456 UART: [art] SIG.S = 995EDD59645097D8B6DBD74E40B8980C52BF61E0AF0E03520AB9AFA348A39585DFE5C7DA717EBB38B4DFCF8996B1006C
25,395,067 UART: mbox::rt_entry...
25,396,039 UART: ____ _ _ _ ____ _____
25,398,028 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,400,038 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,401,976 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,403,929 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,405,782 UART: |_|
25,406,650 UART:
25,519,734 UART: [rt] Runtime listening for mailbox commands...
25,525,536 >>> mbox cmd response data (3272 bytes)
25,541,173 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,574,568 >>> mbox cmd response data (0 bytes)
27,634,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,779,125 UART:
27,779,504 UART: Running Caliptra ROM ...
27,780,672 UART:
27,780,845 UART: [state] CFI Enabled
27,844,660 UART: [state] LifecycleState = Unprovisioned
27,846,764 UART: [state] DebugLocked = No
27,848,911 UART: [state] WD Timer not started. Device not locked for debugging
27,853,534 UART: [kat] SHA2-256
28,043,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,054,174 UART: [kat] ++
28,054,722 UART: [kat] sha1
28,067,292 UART: [kat] SHA2-256
28,070,285 UART: [kat] SHA2-384
28,076,683 UART: [kat] SHA2-512-ACC
28,079,257 UART: [kat] ECC-384
30,531,645 UART: [kat] HMAC-384Kdf
30,553,751 UART: [kat] LMS
31,085,343 UART: [kat] --
31,088,615 UART: [update-reset] ++
34,550,448 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,553,988 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,161,718 >>> mbox cmd response: success
35,166,375 UART: [update-reset] Copying MAN_2 To MAN_1
35,200,908 UART: [update-reset Success] --
35,205,946 UART: [state] Locking Datavault
35,208,468 UART: [state] Locking PCR0, PCR1 and PCR31
35,210,627 UART: [state] Locking ICCM
35,213,060 UART: [exit] Launching FMC @ 0x40000130
35,221,746 UART:
35,221,984 UART: Running Caliptra FMC ...
35,223,185 UART:
35,223,352 UART: [state] CFI Enabled
35,320,810 UART: [art] Extend RT PCRs Done
35,322,004 UART: [art] Lock RT PCRs Done
35,323,308 UART: [art] Populate DV Done
35,328,721 UART: [fht] FMC Alias Private Key: 7
35,330,428 UART: [art] Derive CDI
35,331,248 UART: [art] Store in in slot 0x4
35,390,276 UART: [art] Derive Key Pair
35,391,323 UART: [art] Store priv key in slot 0x5
37,854,017 UART: [art] Derive Key Pair - Done
37,867,132 UART: [art] Signing Cert with AUTHO
37,868,511 UART: RITY.KEYID = 7
39,579,763 UART: [art] Erasing AUTHORITY.KEYID = 7
39,581,266 UART: [art] PUB.X = 60486D57F8DF559F0EABC1DA79E6E551CBA0746E4ACD9AF477F86BABE3411B7BA396108E99BEA21FFD392A3905CB1E39
39,588,724 UART: [art] PUB.Y = 2DE202C7B5481D258A2A7DC0C60E3177B662096E348F5AB1BF3841E2D3F40848BD0C5CA62E675509122818AD59AC37D1
39,595,829 UART: [art] SIG.R = 792108C09DE3EA1E84F6C010FEF6DC43B2E8376A353235D0672ED38AC2258B97C61B5BFDACCB4957AC9C1D307790B8D1
39,603,222 UART: [art] SIG.S = 0196A5FC2E52BED4B79021BB00E8B9F609A772164BBDEF12AE43809E6DE1BD80E27C48A37525F1D549449A0605794D6E
40,581,970 UART: Caliptra RT
40,582,675 UART: [state] CFI Enabled
43,441,681 UART: Disable attest DPE used context limit breach
43,443,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,444,546 UART: [rt] RT listening for mailbox commands...
43,475,655 UART: [rt]cmd =0x494e464f, len=4
43,479,432 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,436,296 ready_for_fw is high
3,436,872 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
13,965,891 >>> mbox cmd response: success
13,966,932 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,258,911 UART:
18,259,544 UART: Running Caliptra FMC ...
18,260,676 UART:
18,260,840 UART: [state] CFI Enabled
18,326,688 UART: [fht] FMC Alias Private Key: 7
20,089,996 UART: [art] Extend RT PCRs Done
20,091,226 UART: [art] Lock RT PCRs Done
20,093,027 UART: [art] Populate DV Done
20,098,720 UART: [fht] FMC Alias Private Key: 7
20,100,269 UART: [art] Derive CDI
20,101,087 UART: [art] Store in in slot 0x4
20,159,149 UART: [art] Derive Key Pair
20,160,151 UART: [art] Store priv key in slot 0x5
22,622,827 UART: [art] Derive Key Pair - Done
22,635,394 UART: [art] Signing Cert with AUTHO
22,636,701 UART: RITY.KEYID = 7
24,348,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,350,355 UART: [art] PUB.X = 03424234D67ADF7B15E5D2606D360A74C38F25B8A1D7C1A9EA2C6205CAA25822764493CC869DBB551329F4F5AAE7E2FE
24,357,654 UART: [art] PUB.Y = 4BD93675CE067D70F4BE25D1550221B663188749157956CA77879EDCD73AF656B7EE5E2E606E4966EF65E7512E6640E1
24,364,878 UART: [art] SIG.R = DC30621EA02091A40A5A71C046B8AE5973BB88630612C38D88F0C30208EC7465F709CD13108A0D449E62D084C20D3AF5
24,372,269 UART: [art] SIG.S = F6EB6195E11DC8314FA8521ECDC0678AC13B93308BCB5534670C0F516492FF1A73ED641569ADB83678A6C24A39EEDEB3
25,350,930 UART: mbox::rt_entry...
25,351,911 UART: ____ _ _ _ ____ _____
25,353,902 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,355,908 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,357,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,359,823 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,361,775 UART: |_|
25,362,763 UART:
25,475,323 UART: [rt] Runtime listening for mailbox commands...
25,481,120 >>> mbox cmd response data (3272 bytes)
25,497,060 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,530,498 >>> mbox cmd response data (0 bytes)
27,588,651 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,414,668 >>> mbox cmd response: success
35,448,849 UART:
35,449,209 UART: Running Caliptra FMC ...
35,450,261 UART:
35,450,415 UART: [state] CFI Enabled
35,541,159 UART: [art] Extend RT PCRs Done
35,542,352 UART: [art] Lock RT PCRs Done
35,544,154 UART: [art] Populate DV Done
35,549,668 UART: [fht] FMC Alias Private Key: 7
35,551,264 UART: [art] Derive CDI
35,552,001 UART: [art] Store in in slot 0x4
35,610,193 UART: [art] Derive Key Pair
35,611,253 UART: [art] Store priv key in slot 0x5
38,073,901 UART: [art] Derive Key Pair - Done
38,086,728 UART: [art] Signing Cert with AUTHO
38,088,070 UART: RITY.KEYID = 7
39,799,681 UART: [art] Erasing AUTHORITY.KEYID = 7
39,801,186 UART: [art] PUB.X = 2EB85090746D6AA3E3ED315BFCF988DDD4261CB3843EBE7DF8C5F560B86B92CFED462CCC5A0C6661784804659C170535
39,808,481 UART: [art] PUB.Y = 2D55161698B3B84BB2770DE6AB77840D4643DD315EE7111DD9973CAE507FD03A9DE6E2224AE16D60B007747A4DD4D3B1
39,815,708 UART: [art] SIG.R = A2AA4D98FAA6462FA0F6B14D4630C6AE352AEBAB5B536634792A264D93BD52BF09E24AC92CD08019C1D9F39D3A06A805
39,823,094 UART: [art] SIG.S = 9860F2E977CDAC29AC3A0A3C8E33502CAD369A9CF365E33EAD7C91CA8BA6614054FD157ECA24B16CB000209EA0D4C7A9
40,802,166 UART: Caliptra RT
40,802,861 UART: [state] CFI Enabled
43,661,582 UART: Disable attest DPE used context limit breach
43,663,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,664,470 UART: [rt] RT listening for mailbox commands...
43,695,594 UART: [rt]cmd =0x494e464f, len=4
43,699,529 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,463 UART:
192,828 UART: Running Caliptra ROM ...
194,004 UART:
603,815 UART: [state] CFI Enabled
616,846 UART: [state] LifecycleState = Unprovisioned
619,248 UART: [state] DebugLocked = No
622,011 UART: [state] WD Timer not started. Device not locked for debugging
625,915 UART: [kat] SHA2-256
815,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,608 UART: [kat] ++
827,127 UART: [kat] sha1
838,636 UART: [kat] SHA2-256
841,643 UART: [kat] SHA2-384
847,342 UART: [kat] SHA2-512-ACC
849,917 UART: [kat] ECC-384
3,293,316 UART: [kat] HMAC-384Kdf
3,305,836 UART: [kat] LMS
3,837,641 UART: [kat] --
3,842,707 UART: [cold-reset] ++
3,845,274 UART: [fht] FHT @ 0x50003400
3,857,739 UART: [idev] ++
3,858,454 UART: [idev] CDI.KEYID = 6
3,859,500 UART: [idev] SUBJECT.KEYID = 7
3,860,603 UART: [idev] UDS.KEYID = 0
3,861,532 ready_for_fw is high
3,861,728 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,960,507 UART: [idev] Erasing UDS.KEYID = 0
6,340,487 UART: [idev] Sha1 KeyId Algorithm
6,363,008 UART: [idev] --
6,368,303 UART: [ldev] ++
6,368,981 UART: [ldev] CDI.KEYID = 6
6,369,887 UART: [ldev] SUBJECT.KEYID = 5
6,371,096 UART: [ldev] AUTHORITY.KEYID = 7
6,372,271 UART: [ldev] FE.KEYID = 1
6,383,009 UART: [ldev] Erasing FE.KEYID = 1
8,856,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,831 UART: [ldev] --
10,647,613 UART: [fwproc] Wait for Commands...
10,650,189 UART: [fwproc] Recv command 0x46574c44
10,652,440 UART: [fwproc] Recv'd Img size: 78632 bytes
13,652,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,725,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,841,162 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
14,168,772 >>> mbox cmd response: success
14,169,231 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,172,048 UART: [afmc] ++
14,172,742 UART: [afmc] CDI.KEYID = 6
14,173,921 UART: [afmc] SUBJECT.KEYID = 7
14,175,402 UART: [afmc] AUTHORITY.KEYID = 5
16,675,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,396,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,398,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,413,852 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,428,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,443,983 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,467,223 UART: [afmc] --
18,470,667 UART: [cold-reset] --
18,474,798 UART: [state] Locking Datavault
18,478,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,480,993 UART: [state] Locking ICCM
18,483,135 UART: [exit] Launching FMC @ 0x40000130
18,491,799 UART:
18,492,031 UART: Running Caliptra FMC ...
18,493,130 UART:
18,493,286 UART: [state] CFI Enabled
18,501,492 UART: [fht] FMC Alias Private Key: 7
20,258,113 UART: [art] Extend RT PCRs Done
20,259,328 UART: [art] Lock RT PCRs Done
20,261,002 UART: [art] Populate DV Done
20,266,580 UART: [fht] FMC Alias Private Key: 7
20,268,064 UART: [art] Derive CDI
20,268,823 UART: [art] Store in in slot 0x4
20,311,688 UART: [art] Derive Key Pair
20,312,727 UART: [art] Store priv key in slot 0x5
22,739,418 UART: [art] Derive Key Pair - Done
22,752,577 UART: [art] Signing Cert with AUTHO
22,753,881 UART: RITY.KEYID = 7
24,459,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,272 UART: [art] PUB.X = FAFD0D61F102C9600FC5375753B14B1CC130FA65B1E6AF1607A69D2D40FA1517E98FCE8DD718C5CFE7D9F56453C3DE04
24,468,573 UART: [art] PUB.Y = 0537B6CC15A4C5890ED6396891592BBFA07E0C725765DB85C722995F79E299BE639F853F2382BC7F71654BECB076410B
24,475,808 UART: [art] SIG.R = C400ADEA84B06E997821E874D57D1E1E42C902221695942E9F82F72A7ABC5D4910BA67A5FAC3B188B5821AF0E1330545
24,483,198 UART: [art] SIG.S = 9C9908C80E720EBB5264A1F1318494B6D3AFC94F477AECD4523899AA232D66EBCD05E378D648BA9C82298E0960A72AE9
25,462,195 UART: mbox::rt_entry...
25,463,147 UART: ____ _ _ _ ____ _____
25,465,125 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,467,129 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,469,053 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,470,982 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,472,905 UART: |_|
25,473,883 UART:
25,586,873 UART: [rt] Runtime listening for mailbox commands...
25,592,717 >>> mbox cmd response data (3272 bytes)
25,608,491 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,641,896 >>> mbox cmd response data (0 bytes)
27,702,686 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
27,847,416 UART:
27,847,795 UART: Running Caliptra ROM ...
27,848,852 UART:
27,849,056 UART: [state] CFI Enabled
27,864,088 UART: [state] LifecycleState = Unprovisioned
27,865,921 UART: [state] DebugLocked = No
27,868,836 UART: [state] WD Timer not started. Device not locked for debugging
27,873,658 UART: [kat] SHA2-256
28,063,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,074,319 UART: [kat] ++
28,074,830 UART: [kat] sha1
28,085,067 UART: [kat] SHA2-256
28,088,091 UART: [kat] SHA2-384
28,093,075 UART: [kat] SHA2-512-ACC
28,095,649 UART: [kat] ECC-384
30,540,690 UART: [kat] HMAC-384Kdf
30,553,413 UART: [kat] LMS
31,085,052 UART: [kat] --
31,091,262 UART: [update-reset] ++
34,555,116 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,559,200 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
35,166,930 >>> mbox cmd response: success
35,171,578 UART: [update-reset] Copying MAN_2 To MAN_1
35,206,239 UART: [update-reset Success] --
35,211,650 UART: [state] Locking Datavault
35,214,022 UART: [state] Locking PCR0, PCR1 and PCR31
35,216,162 UART: [state] Locking ICCM
35,218,643 UART: [exit] Launching FMC @ 0x40000130
35,227,257 UART:
35,227,494 UART: Running Caliptra FMC ...
35,228,662 UART:
35,228,821 UART: [state] CFI Enabled
35,272,397 UART: [art] Extend RT PCRs Done
35,273,587 UART: [art] Lock RT PCRs Done
35,275,201 UART: [art] Populate DV Done
35,280,656 UART: [fht] FMC Alias Private Key: 7
35,282,347 UART: [art] Derive CDI
35,283,157 UART: [art] Store in in slot 0x4
35,325,699 UART: [art] Derive Key Pair
35,326,694 UART: [art] Store priv key in slot 0x5
37,753,077 UART: [art] Derive Key Pair - Done
37,765,726 UART: [art] Signing Cert with AUTHO
37,767,031 UART: RITY.KEYID = 7
39,472,717 UART: [art] Erasing AUTHORITY.KEYID = 7
39,474,223 UART: [art] PUB.X = 03FFB59A8DC5860E804E59CFCC5CE2446E597C2F712445A6F18CACAC96248EF5290A83DB62E4C86922541162894AFFF2
39,481,475 UART: [art] PUB.Y = 0E0C0ACF669D21B6FBC64A8E4F3A150802EA9E361938235E6500CD19D06659BC89EACA7FFA1D6BECBD3593F90C521243
39,488,705 UART: [art] SIG.R = BB3D71111BDF6C147EFA1C4345868D3393533ABE05B302966A64C9FA9DEB56FF8F08DAAE856CADA3F6FBD4A6DB8F1B16
39,496,190 UART: [art] SIG.S = 053DF7617F4A6913E3AF364839FC7BF516C21F2C2D9AE1A975E2BC08A24E4B848D5081BC1C9F84C98D3E45868E0323BC
40,475,080 UART: Caliptra RT
40,475,780 UART: [state] CFI Enabled
43,245,799 UART: Disable attest DPE used context limit breach
43,247,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,248,950 UART: [rt] RT listening for mailbox commands...
43,279,958 UART: [rt]cmd =0x494e464f, len=4
43,283,947 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,755,019 ready_for_fw is high
3,755,636 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
14,188,721 >>> mbox cmd response: success
14,189,322 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,444,836 UART:
18,445,224 UART: Running Caliptra FMC ...
18,446,352 UART:
18,446,509 UART: [state] CFI Enabled
18,454,189 UART: [fht] FMC Alias Private Key: 7
20,210,884 UART: [art] Extend RT PCRs Done
20,212,104 UART: [art] Lock RT PCRs Done
20,213,967 UART: [art] Populate DV Done
20,219,220 UART: [fht] FMC Alias Private Key: 7
20,220,809 UART: [art] Derive CDI
20,221,547 UART: [art] Store in in slot 0x4
20,264,201 UART: [art] Derive Key Pair
20,265,243 UART: [art] Store priv key in slot 0x5
22,691,960 UART: [art] Derive Key Pair - Done
22,705,014 UART: [art] Signing Cert with AUTHO
22,706,315 UART: RITY.KEYID = 7
24,411,935 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,439 UART: [art] PUB.X = 3ACA9BDF83243B80E9BCEA9DB24D47B90C0E987B4FF297E800987FFC403933089D6D61EA8DA5B5AC32845E06EC0D4468
24,420,728 UART: [art] PUB.Y = 6AB35D5CAC51BF61195F10235FF785D5CE06B483CE2B0E42FF9DF6B6A03EDDF70835C2F0AB7295E45411B96CDB1B2749
24,427,962 UART: [art] SIG.R = 79FBC4FD9FE85756D8772E947EC6781A666A77EB5E5D7561A8A9397D668C1BF6AA90051012E1C9AE7505D300AC12B209
24,435,344 UART: [art] SIG.S = 7636A8A9D7ECB323938475057D1F4467AEFF48F90E86D63D95862A99F0D03A362DD8C231A744A31BD09019F2586A5262
25,414,088 UART: mbox::rt_entry...
25,415,051 UART: ____ _ _ _ ____ _____
25,416,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,418,983 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,420,914 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,422,878 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,424,805 UART: |_|
25,425,638 UART:
25,539,400 UART: [rt] Runtime listening for mailbox commands...
25,545,202 >>> mbox cmd response data (3272 bytes)
25,560,995 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,594,387 >>> mbox cmd response data (0 bytes)
27,652,509 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
35,385,157 >>> mbox cmd response: success
35,417,083 UART:
35,417,414 UART: Running Caliptra FMC ...
35,418,456 UART:
35,418,602 UART: [state] CFI Enabled
35,462,933 UART: [art] Extend RT PCRs Done
35,464,130 UART: [art] Lock RT PCRs Done
35,465,585 UART: [art] Populate DV Done
35,470,949 UART: [fht] FMC Alias Private Key: 7
35,472,595 UART: [art] Derive CDI
35,473,328 UART: [art] Store in in slot 0x4
35,516,189 UART: [art] Derive Key Pair
35,517,184 UART: [art] Store priv key in slot 0x5
37,943,735 UART: [art] Derive Key Pair - Done
37,956,578 UART: [art] Signing Cert with AUTHO
37,957,890 UART: RITY.KEYID = 7
39,663,265 UART: [art] Erasing AUTHORITY.KEYID = 7
39,664,770 UART: [art] PUB.X = A464A0A7B453BC673F4BEE6602B82D270ECBBA22C3FE83990011E9481DBDA2AC46882DC27CE14B8527EC6CDEF3386B42
39,672,079 UART: [art] PUB.Y = A4F5D8BD521F03D648B595325139FBF730A85141A952F7B5E36DB91B9A7D939C6F288705A23DBA1B4F106F9ABE2A8EE6
39,679,327 UART: [art] SIG.R = DCACDE6168BE4D683BA438C5840986260AFD1E68C5640DF3A9492B2F78FA167C12A65C08A495A3B6530E64E3C41C2096
39,686,727 UART: [art] SIG.S = BCBA39B964EC94EC054043D549FEA9E3C599F8E202BA518B91A1558037124EEF4A919FF7E88494B64FE1343A2C9640DE
40,665,715 UART: Caliptra RT
40,666,425 UART: [state] CFI Enabled
43,435,939 UART: Disable attest DPE used context limit breach
43,438,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,439,071 UART: [rt] RT listening for mailbox commands...
43,470,247 UART: [rt]cmd =0x494e464f, len=4
43,474,291 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
85,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,449 UART: [kat] SHA2-256
881,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,495 UART: [kat] ++
885,647 UART: [kat] sha1
889,949 UART: [kat] SHA2-256
891,887 UART: [kat] SHA2-384
894,660 UART: [kat] SHA2-512-ACC
896,561 UART: [kat] ECC-384
902,098 UART: [kat] HMAC-384Kdf
906,656 UART: [kat] LMS
1,474,852 UART: [kat] --
1,475,757 UART: [cold-reset] ++
1,476,291 UART: [fht] Storing FHT @ 0x50003400
1,479,060 UART: [idev] ++
1,479,228 UART: [idev] CDI.KEYID = 6
1,479,588 UART: [idev] SUBJECT.KEYID = 7
1,480,012 UART: [idev] UDS.KEYID = 0
1,480,357 ready_for_fw is high
1,480,357 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,488,074 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,898 UART: [idev] --
1,514,929 UART: [ldev] ++
1,515,097 UART: [ldev] CDI.KEYID = 6
1,515,460 UART: [ldev] SUBJECT.KEYID = 5
1,515,886 UART: [ldev] AUTHORITY.KEYID = 7
1,516,349 UART: [ldev] FE.KEYID = 1
1,521,599 UART: [ldev] Erasing FE.KEYID = 1
1,546,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,586,159 UART: [fwproc] Waiting for Commands...
1,586,902 UART: [fwproc] Received command 0x46574c44
1,587,693 UART: [fwproc] Received Image of size 78632 bytes
2,476,560 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,576 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,615,341 >>> mbox cmd response: success
2,615,341 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,537 UART: [afmc] ++
2,616,705 UART: [afmc] CDI.KEYID = 6
2,617,067 UART: [afmc] SUBJECT.KEYID = 7
2,617,492 UART: [afmc] AUTHORITY.KEYID = 5
2,652,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,910 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,600 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,519 UART: [afmc] --
2,695,489 UART: [cold-reset] --
2,696,395 UART: [state] Locking Datavault
2,697,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,868 UART: [state] Locking ICCM
2,698,502 UART: [exit] Launching FMC @ 0x40000130
2,703,831 UART:
2,703,847 UART: Running Caliptra FMC ...
2,704,255 UART:
2,704,309 UART: [state] CFI Enabled
2,714,992 UART: [fht] FMC Alias Private Key: 7
2,822,507 UART: [art] Extend RT PCRs Done
2,822,935 UART: [art] Lock RT PCRs Done
2,824,231 UART: [art] Populate DV Done
2,832,512 UART: [fht] FMC Alias Private Key: 7
2,833,452 UART: [art] Derive CDI
2,833,732 UART: [art] Store in in slot 0x4
2,919,285 UART: [art] Derive Key Pair
2,919,645 UART: [art] Store priv key in slot 0x5
2,932,809 UART: [art] Derive Key Pair - Done
2,947,252 UART: [art] Signing Cert with AUTHO
2,947,732 UART: RITY.KEYID = 7
2,962,758 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,523 UART: [art] PUB.X = 93450CA5FF0CF6FB93C5EAE6F53113C9FAA072D232DAF4D511EF2956DAC494115EF8E6047100D679A8C99001D0D33685
2,970,267 UART: [art] PUB.Y = A1DC9E97E499ACF3A74DA0B3C1344BECFB95F2A7A897B2400666BF3609CFB3E08CA3C671CBA1A1DAC7D4593E14B1CACA
2,977,239 UART: [art] SIG.R = EF03EEACF14AD640252297AF43B2807AC302AEA36BAAD23248AA8E11100136395A1AE7134CB4E6E49E2EF0FDF23052B2
2,984,014 UART: [art] SIG.S = BB84AF204DCD869FC74C5184174E6AAFCF4FBEA1A09236C15D6C2B4823E373E6C13749DCFB4198BC587BCAC71A7DC183
3,008,219 UART: mbox::rt_entry...
3,008,591 UART: ____ _ _ _ ____ _____
3,009,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,943 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,479 UART: |_|
3,012,791 UART:
3,119,246 UART: [rt] Runtime listening for mailbox commands...
3,124,204 >>> mbox cmd response data (3272 bytes)
3,124,205 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,290 >>> mbox cmd response data (0 bytes)
3,147,291 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,147,411 UART:
3,147,427 UART: Running Caliptra ROM ...
3,147,835 UART:
3,147,889 UART: [state] CFI Enabled
3,150,451 UART: [state] LifecycleState = Unprovisioned
3,151,106 UART: [state] DebugLocked = No
3,151,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,357 UART: [kat] SHA2-256
3,947,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,403 UART: [kat] ++
3,951,555 UART: [kat] sha1
3,955,687 UART: [kat] SHA2-256
3,957,625 UART: [kat] SHA2-384
3,960,394 UART: [kat] SHA2-512-ACC
3,962,294 UART: [kat] ECC-384
3,968,019 UART: [kat] HMAC-384Kdf
3,972,639 UART: [kat] LMS
4,540,835 UART: [kat] --
4,541,612 UART: [update-reset] ++
5,876,439 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,877,675 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,027,593 >>> mbox cmd response: success
6,027,948 UART: [update-reset] Copying MAN_2 To MAN_1
6,035,962 UART: [update-reset Success] --
6,036,819 UART: [state] Locking Datavault
6,037,583 UART: [state] Locking PCR0, PCR1 and PCR31
6,038,187 UART: [state] Locking ICCM
6,038,743 UART: [exit] Launching FMC @ 0x40000130
6,044,072 UART:
6,044,088 UART: Running Caliptra FMC ...
6,044,496 UART:
6,044,550 UART: [state] CFI Enabled
6,133,865 UART: [art] Extend RT PCRs Done
6,134,293 UART: [art] Lock RT PCRs Done
6,135,540 UART: [art] Populate DV Done
6,143,961 UART: [fht] FMC Alias Private Key: 7
6,144,893 UART: [art] Derive CDI
6,145,173 UART: [art] Store in in slot 0x4
6,230,912 UART: [art] Derive Key Pair
6,231,272 UART: [art] Store priv key in slot 0x5
6,244,200 UART: [art] Derive Key Pair - Done
6,259,045 UART: [art] Signing Cert with AUTHO
6,259,525 UART: RITY.KEYID = 7
6,274,867 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,632 UART: [art] PUB.X = F1E1A9766D8C6144B787AE068A8A6AAC1CD20D6B19C142826DDD5E8FBDE601DC44504D680A8177363E57B574E7DBF30E
6,282,399 UART: [art] PUB.Y = AB0D10183758B9A6D857806BAE53BC7E2BB7C79EEB92E1000DDAEB28C57B0A9197BEDB7448DF12B9B727B5ED56927D7B
6,289,336 UART: [art] SIG.R = F660F4942598D81CC5EDD7A8826E1D25607046457E9567F8D8CA4837B1EC6B3CF84AEFEF9B660229B69CF20BBC56BB96
6,296,110 UART: [art] SIG.S = 5CD2A0561EB001D2756CF4C9F304B4F91A823A14DDAF0BF87F4260087B26E42302B5651C139C69B035722E3C814688E3
6,320,394 UART: Caliptra RT
6,320,648 UART: [state] CFI Enabled
6,611,639 UART: Disable attest DPE used context limit breach
6,612,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,613,580 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,643,719 UART: [rt]cmd =0x494e464f, len=4
6,647,053 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,567 ready_for_fw is high
1,362,567 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,466,037 >>> mbox cmd response: success
2,466,037 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,073 UART:
2,527,089 UART: Running Caliptra FMC ...
2,527,497 UART:
2,527,551 UART: [state] CFI Enabled
2,538,240 UART: [fht] FMC Alias Private Key: 7
2,645,835 UART: [art] Extend RT PCRs Done
2,646,263 UART: [art] Lock RT PCRs Done
2,647,999 UART: [art] Populate DV Done
2,656,052 UART: [fht] FMC Alias Private Key: 7
2,657,082 UART: [art] Derive CDI
2,657,362 UART: [art] Store in in slot 0x4
2,742,901 UART: [art] Derive Key Pair
2,743,261 UART: [art] Store priv key in slot 0x5
2,756,455 UART: [art] Derive Key Pair - Done
2,771,163 UART: [art] Signing Cert with AUTHO
2,771,643 UART: RITY.KEYID = 7
2,786,469 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,234 UART: [art] PUB.X = 2012954BC8C57C1905AC5DF3E24E8E1358D1D3E59F5880A3780173DF95972B9E78040EB8B3C5EAE3FDE009315A22B31F
2,793,993 UART: [art] PUB.Y = A2E2C58DCF03A65CEAA594C0E848E5B7E0423F3BB6C45F402CFB6891D13E5850FB728A3E24AE197F7EA4D5AD416EF299
2,800,958 UART: [art] SIG.R = A046B893B62D1F4BB80A4BF0F23ED610D5D1B296FFF649027C49802D0387B59A553C50ABDD9F14172C489031DBFD36CC
2,807,729 UART: [art] SIG.S = 211F18380AA11E4EE352C175E50F8CF180DE3C4D4EAFF6B6011F47D4B26D994ECE2C7724E80212BF985B64AA8B256CFC
2,831,654 UART: mbox::rt_entry...
2,832,026 UART: ____ _ _ _ ____ _____
2,832,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,914 UART: |_|
2,836,226 UART:
2,943,320 UART: [rt] Runtime listening for mailbox commands...
2,948,278 >>> mbox cmd response data (3272 bytes)
2,948,279 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,364 >>> mbox cmd response data (0 bytes)
2,971,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,733,313 >>> mbox cmd response: success
5,746,828 UART:
5,746,844 UART: Running Caliptra FMC ...
5,747,252 UART:
5,747,306 UART: [state] CFI Enabled
5,836,245 UART: [art] Extend RT PCRs Done
5,836,673 UART: [art] Lock RT PCRs Done
5,837,996 UART: [art] Populate DV Done
5,846,291 UART: [fht] FMC Alias Private Key: 7
5,847,267 UART: [art] Derive CDI
5,847,547 UART: [art] Store in in slot 0x4
5,933,248 UART: [art] Derive Key Pair
5,933,608 UART: [art] Store priv key in slot 0x5
5,946,824 UART: [art] Derive Key Pair - Done
5,961,659 UART: [art] Signing Cert with AUTHO
5,962,139 UART: RITY.KEYID = 7
5,977,617 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,382 UART: [art] PUB.X = CF40A3129E997E675B856F72F058688603A49B0B4DD79EFEAC1090FBDE11D64C2D3234F8ADB2B60A6B1A66EBBE7DB3C9
5,985,161 UART: [art] PUB.Y = 846A7718313A57C328898A27BE3716629642DC922D45200FA9F5597FCA591968CF32B695DF19B6FBBDD7DBCC6F0F8631
5,992,107 UART: [art] SIG.R = ECA28ED33ADA77F95C393D9FF54FC25D2615B92C4571907801C63A2A62D948422D1797DA1C9A13206EEDA43B1FDABA8B
5,998,888 UART: [art] SIG.S = 41256AAC68B5806B87A698BF8F1816F9B709E1CD17263DE1C317003375BC5493318D8C2C7ABCB587BC0CD5F7C7F4A373
6,022,481 UART: Caliptra RT
6,022,735 UART: [state] CFI Enabled
6,312,838 UART: Disable attest DPE used context limit breach
6,313,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,315,029 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,345,268 UART: [rt]cmd =0x494e464f, len=4
6,348,542 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,759 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,736 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 ready_for_fw is high
1,481,396 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,489,005 UART: [idev] Erasing UDS.KEYID = 0
1,505,473 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,394 UART: [ldev] ++
1,515,562 UART: [ldev] CDI.KEYID = 6
1,515,925 UART: [ldev] SUBJECT.KEYID = 5
1,516,351 UART: [ldev] AUTHORITY.KEYID = 7
1,516,814 UART: [ldev] FE.KEYID = 1
1,522,344 UART: [ldev] Erasing FE.KEYID = 1
1,548,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,343 UART: [ldev] --
1,587,684 UART: [fwproc] Waiting for Commands...
1,588,445 UART: [fwproc] Received command 0x46574c44
1,589,236 UART: [fwproc] Received Image of size 78632 bytes
2,477,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,505,235 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 53948
2,616,926 >>> mbox cmd response: success
2,616,926 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,618,146 UART: [afmc] ++
2,618,314 UART: [afmc] CDI.KEYID = 6
2,618,676 UART: [afmc] SUBJECT.KEYID = 7
2,619,101 UART: [afmc] AUTHORITY.KEYID = 5
2,654,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,671,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,677,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,683,225 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,915 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,696,796 UART: [afmc] --
2,697,682 UART: [cold-reset] --
2,698,470 UART: [state] Locking Datavault
2,699,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,700,511 UART: [state] Locking ICCM
2,701,117 UART: [exit] Launching FMC @ 0x40000130
2,706,446 UART:
2,706,462 UART: Running Caliptra FMC ...
2,706,870 UART:
2,707,013 UART: [state] CFI Enabled
2,717,520 UART: [fht] FMC Alias Private Key: 7
2,825,531 UART: [art] Extend RT PCRs Done
2,825,959 UART: [art] Lock RT PCRs Done
2,827,621 UART: [art] Populate DV Done
2,835,774 UART: [fht] FMC Alias Private Key: 7
2,836,904 UART: [art] Derive CDI
2,837,184 UART: [art] Store in in slot 0x4
2,922,499 UART: [art] Derive Key Pair
2,922,859 UART: [art] Store priv key in slot 0x5
2,936,467 UART: [art] Derive Key Pair - Done
2,951,044 UART: [art] Signing Cert with AUTHO
2,951,524 UART: RITY.KEYID = 7
2,966,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,601 UART: [art] PUB.X = 62E3D071A80CCA6D05025D1D8FC3770C66051AFBD113BA8EBDA5A4987505376F050D2BA02D19E7C1A7210AA046C71502
2,974,347 UART: [art] PUB.Y = 3027B1CC536279E4AA003096CA757E7BE79B090A0CEC016042D73794A5FE6D550A639A086831AB9BB322A4BF1C2C59F0
2,981,261 UART: [art] SIG.R = A64B1F2533FB78BCF94356702D0E56430F81091C8017982221E841D71E4BFD432A6BF739F40C172721F047E0245A4C2C
2,988,013 UART: [art] SIG.S = 43E293D3DFDBF76B674C41B21E91AF1C0F599EE5D3601781E458B9A3C815B6A54C6211E2515D68C13C3A37810CE693EF
3,011,726 UART: mbox::rt_entry...
3,012,098 UART: ____ _ _ _ ____ _____
3,012,882 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,013,682 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,014,450 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,015,218 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,015,986 UART: |_|
3,016,298 UART:
3,123,702 UART: [rt] Runtime listening for mailbox commands...
3,128,660 >>> mbox cmd response data (3272 bytes)
3,128,661 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,151,746 >>> mbox cmd response data (0 bytes)
3,151,747 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,151,867 UART:
3,151,883 UART: Running Caliptra ROM ...
3,152,291 UART:
3,152,432 UART: [state] CFI Enabled
3,155,114 UART: [state] LifecycleState = Unprovisioned
3,155,769 UART: [state] DebugLocked = No
3,156,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,157,998 UART: [kat] SHA2-256
3,951,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,956,044 UART: [kat] ++
3,956,196 UART: [kat] sha1
3,960,408 UART: [kat] SHA2-256
3,962,346 UART: [kat] SHA2-384
3,965,239 UART: [kat] SHA2-512-ACC
3,967,139 UART: [kat] ECC-384
3,972,916 UART: [kat] HMAC-384Kdf
3,977,418 UART: [kat] LMS
4,545,614 UART: [kat] --
4,546,431 UART: [update-reset] ++
5,880,600 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,881,794 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
6,031,712 >>> mbox cmd response: success
6,032,027 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,041 UART: [update-reset Success] --
6,040,706 UART: [state] Locking Datavault
6,041,472 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,076 UART: [state] Locking ICCM
6,042,618 UART: [exit] Launching FMC @ 0x40000130
6,047,947 UART:
6,047,963 UART: Running Caliptra FMC ...
6,048,371 UART:
6,048,514 UART: [state] CFI Enabled
6,137,647 UART: [art] Extend RT PCRs Done
6,138,075 UART: [art] Lock RT PCRs Done
6,139,204 UART: [art] Populate DV Done
6,147,591 UART: [fht] FMC Alias Private Key: 7
6,148,695 UART: [art] Derive CDI
6,148,975 UART: [art] Store in in slot 0x4
6,234,346 UART: [art] Derive Key Pair
6,234,706 UART: [art] Store priv key in slot 0x5
6,247,540 UART: [art] Derive Key Pair - Done
6,262,112 UART: [art] Signing Cert with AUTHO
6,262,592 UART: RITY.KEYID = 7
6,277,842 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,607 UART: [art] PUB.X = 5A6F959F3320CE1B1A1A075DB78EA15C09CCEB5E9490022265097C0CA948E201388959D54CA76A7ED7F88DBBC338DD49
6,285,367 UART: [art] PUB.Y = 979E8D188067D62CBF2A39D0600F75D9C588516CF87CB85D4DBA6C460BB816C5ECDB0A630E5305D55213D440A4A97AB1
6,292,310 UART: [art] SIG.R = A82A7217B9F3F50E1434649F8E9D29BDE7CC1B23F26CD3BF11EE4C9EADCB31B125C709B68DD239FE2919475E4896450E
6,299,083 UART: [art] SIG.S = F0E5E0CAA8CF24F717EB862408808496F87A133D4ABB736B23857308AA55B9EC49A7386CE332758B36B68EFEB40ECE59
6,322,465 UART: Caliptra RT
6,322,811 UART: [state] CFI Enabled
6,611,991 UART: Disable attest DPE used context limit breach
6,612,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,614,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,423 UART: [rt]cmd =0x494e464f, len=4
6,647,761 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,098 ready_for_fw is high
1,362,098 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,465,214 >>> mbox cmd response: success
2,465,214 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,440 UART:
2,527,456 UART: Running Caliptra FMC ...
2,527,864 UART:
2,528,007 UART: [state] CFI Enabled
2,538,440 UART: [fht] FMC Alias Private Key: 7
2,646,555 UART: [art] Extend RT PCRs Done
2,646,983 UART: [art] Lock RT PCRs Done
2,648,733 UART: [art] Populate DV Done
2,656,910 UART: [fht] FMC Alias Private Key: 7
2,658,080 UART: [art] Derive CDI
2,658,360 UART: [art] Store in in slot 0x4
2,744,327 UART: [art] Derive Key Pair
2,744,687 UART: [art] Store priv key in slot 0x5
2,758,337 UART: [art] Derive Key Pair - Done
2,772,935 UART: [art] Signing Cert with AUTHO
2,773,415 UART: RITY.KEYID = 7
2,788,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,114 UART: [art] PUB.X = 8A17848BE97370DEF59083F0226863F96D5F84D20D78C7850C3D14EFADF41D78A6DDAEFD11F6BB94CC69C1C0B181FA66
2,795,892 UART: [art] PUB.Y = FC52B153DB90D89E18B78E8588E9A340A0F414204BF28A45D96F9A0A3895311C2C55A79CAC8FF74B0E1FCA7891EAF0E7
2,802,848 UART: [art] SIG.R = 809B348D35440AEAFC03C108F852774362CC45346930981B4E2F123407065F236F6CBBB465A10F9C5B37AAB132BD3E45
2,809,598 UART: [art] SIG.S = 608F13DB24ED543691235067A461285D1CAE6BF34CA5A7D5CE4EC3BE1B60AFEF531A025FAFDB4343ABEE83CA9D8D77CB
2,833,556 UART: mbox::rt_entry...
2,833,928 UART: ____ _ _ _ ____ _____
2,834,712 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,512 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,280 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,048 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,816 UART: |_|
2,838,128 UART:
2,945,544 UART: [rt] Runtime listening for mailbox commands...
2,950,502 >>> mbox cmd response data (3272 bytes)
2,950,503 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,973,588 >>> mbox cmd response data (0 bytes)
2,973,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,734,662 >>> mbox cmd response: success
5,748,057 UART:
5,748,073 UART: Running Caliptra FMC ...
5,748,481 UART:
5,748,624 UART: [state] CFI Enabled
5,837,753 UART: [art] Extend RT PCRs Done
5,838,181 UART: [art] Lock RT PCRs Done
5,839,352 UART: [art] Populate DV Done
5,847,533 UART: [fht] FMC Alias Private Key: 7
5,848,479 UART: [art] Derive CDI
5,848,759 UART: [art] Store in in slot 0x4
5,934,416 UART: [art] Derive Key Pair
5,934,776 UART: [art] Store priv key in slot 0x5
5,948,086 UART: [art] Derive Key Pair - Done
5,962,707 UART: [art] Signing Cert with AUTHO
5,963,187 UART: RITY.KEYID = 7
5,978,587 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,352 UART: [art] PUB.X = E6BC9CAE96ACFC389A1F45F1963B6CE59D0C29B9581EFDE2D8827FB36F1C9E35661B7729FE5380E9AEE8CA61A1203569
5,986,135 UART: [art] PUB.Y = 840D0D8AE098AA42F6C096299F321ED0DF526F63A1596EFAFD59A3C23D4A09DA6AE3B0485027E1581B8149284F3A5C88
5,993,082 UART: [art] SIG.R = 5054F048CCB436734E2B853BFA64C7B65D8003021FC75A409C5829BDAE6A2BA7F1FAF8934BB38C2E277DB79755B16E49
5,999,854 UART: [art] SIG.S = 2E2129738E77E1720B039044862CC0239CD819237E7C8C11BC2F0851C1608F696DA053A79B5C0ED61B3DB647725AEC4B
6,024,059 UART: Caliptra RT
6,024,405 UART: [state] CFI Enabled
6,314,549 UART: Disable attest DPE used context limit breach
6,315,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,316,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,346,715 UART: [rt]cmd =0x494e464f, len=4
6,349,997 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,785 UART: [kat] SHA2-256
903,725 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,284 UART: [kat] HMAC-384Kdf
922,756 UART: [kat] LMS
1,171,084 UART: [kat] --
1,171,829 UART: [cold-reset] ++
1,172,213 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 ready_for_fw is high
1,176,173 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,201,013 UART: [idev] Sha1 KeyId Algorithm
1,209,599 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,108 UART: [ldev] SUBJECT.KEYID = 5
1,211,534 UART: [ldev] AUTHORITY.KEYID = 7
1,211,997 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,405 UART: [ldev] --
1,282,810 UART: [fwproc] Wait for Commands...
1,283,470 UART: [fwproc] Recv command 0x46574c44
1,284,198 UART: [fwproc] Recv'd Img size: 78632 bytes
2,173,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,685 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,311,826 >>> mbox cmd response: success
2,311,826 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,870 UART: [afmc] ++
2,313,038 UART: [afmc] CDI.KEYID = 6
2,313,400 UART: [afmc] SUBJECT.KEYID = 7
2,313,825 UART: [afmc] AUTHORITY.KEYID = 5
2,349,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,389 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,117 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,565 UART: [afmc] --
2,392,469 UART: [cold-reset] --
2,393,323 UART: [state] Locking Datavault
2,394,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,242 UART: [state] Locking ICCM
2,395,872 UART: [exit] Launching FMC @ 0x40000130
2,401,201 UART:
2,401,217 UART: Running Caliptra FMC ...
2,401,625 UART:
2,401,679 UART: [state] CFI Enabled
2,412,220 UART: [fht] FMC Alias Private Key: 7
2,520,105 UART: [art] Extend RT PCRs Done
2,520,533 UART: [art] Lock RT PCRs Done
2,521,843 UART: [art] Populate DV Done
2,530,236 UART: [fht] FMC Alias Private Key: 7
2,531,244 UART: [art] Derive CDI
2,531,524 UART: [art] Store in in slot 0x4
2,617,625 UART: [art] Derive Key Pair
2,617,985 UART: [art] Store priv key in slot 0x5
2,631,261 UART: [art] Derive Key Pair - Done
2,646,031 UART: [art] Signing Cert with AUTHO
2,646,511 UART: RITY.KEYID = 7
2,661,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,534 UART: [art] PUB.X = 8A532FE4CDB4B2C8390BCE446691209F67EEB6C55427CE37FEFBA22CDD3A0C3C1C0E2551C83244C92DE7CC872A7569AD
2,669,313 UART: [art] PUB.Y = 9F821B2D0FD9D02190F715BFDAA3708FCC992E3114A079D103F1B3C1102281285F1F278B606C897D354D36FCF76ADB3A
2,676,263 UART: [art] SIG.R = 88E6B2E3A05C69FC1320208D4337564E9E537BE6259E6FE5DF050B1D69AC821847BFC2BFB1632261A4B15612746BE70D
2,683,026 UART: [art] SIG.S = 1AD30F624AB2F8CF613BFCC8D6F4239D6D6B46D025C20ECA00BAEBB499D17DF04C603C463D930CF7614924E22C6AFE7D
2,707,138 UART: mbox::rt_entry...
2,707,510 UART: ____ _ _ _ ____ _____
2,708,294 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,094 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,862 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,630 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,398 UART: |_|
2,711,710 UART:
2,818,798 UART: [rt] Runtime listening for mailbox commands...
2,823,756 >>> mbox cmd response data (3272 bytes)
2,823,757 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,842 >>> mbox cmd response data (0 bytes)
2,846,843 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,846,960 UART:
2,846,976 UART: Running Caliptra ROM ...
2,847,384 UART:
2,847,439 UART: [state] CFI Enabled
2,850,173 UART: [state] LifecycleState = Unprovisioned
2,850,828 UART: [state] DebugLocked = No
2,851,546 UART: [state] WD Timer not started. Device not locked for debugging
2,852,674 UART: [kat] SHA2-256
3,658,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,662,449 UART: [kat] ++
3,662,601 UART: [kat] sha1
3,666,795 UART: [kat] SHA2-256
3,668,735 UART: [kat] SHA2-384
3,671,430 UART: [kat] SHA2-512-ACC
3,673,330 UART: [kat] ECC-384
3,682,925 UART: [kat] HMAC-384Kdf
3,687,435 UART: [kat] LMS
3,935,763 UART: [kat] --
3,936,913 UART: [update-reset] ++
5,249,352 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,250,459 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,400,325 >>> mbox cmd response: success
5,400,544 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,558 UART: [update-reset Success] --
5,409,655 UART: [state] Locking Datavault
5,410,407 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,011 UART: [state] Locking ICCM
5,411,617 UART: [exit] Launching FMC @ 0x40000130
5,416,946 UART:
5,416,962 UART: Running Caliptra FMC ...
5,417,370 UART:
5,417,424 UART: [state] CFI Enabled
5,505,867 UART: [art] Extend RT PCRs Done
5,506,295 UART: [art] Lock RT PCRs Done
5,507,860 UART: [art] Populate DV Done
5,516,173 UART: [fht] FMC Alias Private Key: 7
5,517,325 UART: [art] Derive CDI
5,517,605 UART: [art] Store in in slot 0x4
5,603,170 UART: [art] Derive Key Pair
5,603,530 UART: [art] Store priv key in slot 0x5
5,616,912 UART: [art] Derive Key Pair - Done
5,631,578 UART: [art] Signing Cert with AUTHO
5,632,058 UART: RITY.KEYID = 7
5,647,618 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,383 UART: [art] PUB.X = B30436015D3764E6CCB732C8E5251EF4C0886C38ACF7B5DD845410124470320576233B04798DD26B399F2CB237A51E57
5,655,133 UART: [art] PUB.Y = 99783B29144131E60935DF76588104691533166D3E7FC40C8CD27E6120EACF870384061DFB763F215B6F2466032A5CE9
5,662,053 UART: [art] SIG.R = 9800D72CDCAD2CFA358E8C46E016DA546E87929F4247CACB07FEF4972F9A0CE636D56077386B2426EF9D8CF8DDFCDBF9
5,668,815 UART: [art] SIG.S = C4CF158826F8E144F974D1E8C641F782466EE9168CAD3D39296B55B944E9BA2773A9C1CADB7CCD76207FB59C66E596C5
5,692,802 UART: Caliptra RT
5,693,056 UART: [state] CFI Enabled
5,985,352 UART: Disable attest DPE used context limit breach
5,986,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,987,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,730 UART: [rt]cmd =0x494e464f, len=4
6,021,032 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,455 ready_for_fw is high
1,060,455 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,163,583 >>> mbox cmd response: success
2,163,583 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,437 UART:
2,226,453 UART: Running Caliptra FMC ...
2,226,861 UART:
2,226,915 UART: [state] CFI Enabled
2,237,224 UART: [fht] FMC Alias Private Key: 7
2,345,887 UART: [art] Extend RT PCRs Done
2,346,315 UART: [art] Lock RT PCRs Done
2,348,045 UART: [art] Populate DV Done
2,356,292 UART: [fht] FMC Alias Private Key: 7
2,357,322 UART: [art] Derive CDI
2,357,602 UART: [art] Store in in slot 0x4
2,443,477 UART: [art] Derive Key Pair
2,443,837 UART: [art] Store priv key in slot 0x5
2,457,793 UART: [art] Derive Key Pair - Done
2,472,467 UART: [art] Signing Cert with AUTHO
2,472,947 UART: RITY.KEYID = 7
2,487,997 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,762 UART: [art] PUB.X = 99847766667D21AE12A0AF137AD20027DE47D11016E39491D1B4B892F7ED5EA1BCA79F390E68FC91E78FC74120B3731B
2,495,509 UART: [art] PUB.Y = 9CA00A6687B5FE7091B61F6032506556BCA80A1D958F47DAB21AACB0981D7502238D6D948ED4597A201B4109E5078A82
2,502,442 UART: [art] SIG.R = 1C4BFE6F00C9FF347768A4EA6B79C409A75F606EF6E9D138E3072BB2E8F38CA97B6668AAC5279E8449CC6BD0653EE68E
2,509,198 UART: [art] SIG.S = 720702F541742F790D77B1E32124D4243E99C5F5E7617EE09EC541D21091453C7F29FB5BE83D9EA4E4CBC0D7910910CE
2,532,589 UART: mbox::rt_entry...
2,532,961 UART: ____ _ _ _ ____ _____
2,533,745 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,313 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,081 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,849 UART: |_|
2,537,161 UART:
2,643,611 UART: [rt] Runtime listening for mailbox commands...
2,648,569 >>> mbox cmd response data (3272 bytes)
2,648,570 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,655 >>> mbox cmd response data (0 bytes)
2,671,656 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,109,313 >>> mbox cmd response: success
5,122,553 UART:
5,122,569 UART: Running Caliptra FMC ...
5,122,977 UART:
5,123,031 UART: [state] CFI Enabled
5,211,856 UART: [art] Extend RT PCRs Done
5,212,284 UART: [art] Lock RT PCRs Done
5,213,391 UART: [art] Populate DV Done
5,221,398 UART: [fht] FMC Alias Private Key: 7
5,222,328 UART: [art] Derive CDI
5,222,608 UART: [art] Store in in slot 0x4
5,308,367 UART: [art] Derive Key Pair
5,308,727 UART: [art] Store priv key in slot 0x5
5,322,639 UART: [art] Derive Key Pair - Done
5,337,297 UART: [art] Signing Cert with AUTHO
5,337,777 UART: RITY.KEYID = 7
5,352,411 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,176 UART: [art] PUB.X = CE7E627595CE60ACAD172D1F0145ADF78861C411269C7F713610C2809F9B88D7440C72FC98779D06A68E75FCAE46A2E5
5,359,941 UART: [art] PUB.Y = C3F4D6AB87979B769D01BC0DD6EEFB5FABC66F458913B1955500B96D5547D4C419EB432333799133C0EE5FE08B69762E
5,366,869 UART: [art] SIG.R = BFEFC8B11BC89D03C39EE1D211D1622AD53A2321F9EFCDD843EA8FA09651E3D8F34456FC17A946DB34E0B67E83A71DAB
5,373,658 UART: [art] SIG.S = E1A45D0B771B05FA8DE75F147D362D20C4A0F7B8622D657536E264E931A5A47175EB4241077858D45FC87FD489A66897
5,397,220 UART: Caliptra RT
5,397,474 UART: [state] CFI Enabled
5,691,460 UART: Disable attest DPE used context limit breach
5,692,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,693,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,920 UART: [rt]cmd =0x494e464f, len=4
5,727,220 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,805 UART: [state] LifecycleState = Unprovisioned
85,460 UART: [state] DebugLocked = No
86,122 UART: [state] WD Timer not started. Device not locked for debugging
87,363 UART: [kat] SHA2-256
893,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,138 UART: [kat] ++
897,290 UART: [kat] sha1
901,692 UART: [kat] SHA2-256
903,632 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,358 UART: [cold-reset] ++
1,172,878 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 ready_for_fw is high
1,176,792 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,184,365 UART: [idev] Erasing UDS.KEYID = 0
1,201,538 UART: [idev] Sha1 KeyId Algorithm
1,210,240 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,218,088 UART: [ldev] Erasing FE.KEYID = 1
1,244,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,880 UART: [ldev] --
1,284,185 UART: [fwproc] Wait for Commands...
1,284,811 UART: [fwproc] Recv command 0x46574c44
1,285,539 UART: [fwproc] Recv'd Img size: 78632 bytes
2,174,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,852 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,313,149 >>> mbox cmd response: success
2,313,149 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,349 UART: [afmc] ++
2,314,517 UART: [afmc] CDI.KEYID = 6
2,314,879 UART: [afmc] SUBJECT.KEYID = 7
2,315,304 UART: [afmc] AUTHORITY.KEYID = 5
2,350,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,643 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,362 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,240 UART: [afmc] --
2,394,234 UART: [cold-reset] --
2,395,094 UART: [state] Locking Datavault
2,396,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,159 UART: [state] Locking ICCM
2,397,675 UART: [exit] Launching FMC @ 0x40000130
2,403,004 UART:
2,403,020 UART: Running Caliptra FMC ...
2,403,428 UART:
2,403,571 UART: [state] CFI Enabled
2,414,264 UART: [fht] FMC Alias Private Key: 7
2,522,549 UART: [art] Extend RT PCRs Done
2,522,977 UART: [art] Lock RT PCRs Done
2,524,109 UART: [art] Populate DV Done
2,532,276 UART: [fht] FMC Alias Private Key: 7
2,533,412 UART: [art] Derive CDI
2,533,692 UART: [art] Store in in slot 0x4
2,619,595 UART: [art] Derive Key Pair
2,619,955 UART: [art] Store priv key in slot 0x5
2,633,509 UART: [art] Derive Key Pair - Done
2,648,384 UART: [art] Signing Cert with AUTHO
2,648,864 UART: RITY.KEYID = 7
2,664,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,937 UART: [art] PUB.X = 0998D35585F34445E6B13AB4E43EEB385E8371C3CDE2CA8F531539B5EAF20FB1AB5E81C69C34AFB2820966FFD02B18F2
2,671,710 UART: [art] PUB.Y = 5E4F6366D6F66FA836B52A88130D6FB1CC7D3EB9331B5BB8A8785EF593A898D3068E7E4A11B92BA6B82722147D4BD812
2,678,660 UART: [art] SIG.R = 86D84382A5C26FE063F16C69E74556A834797DE111A56EAE289B44AABC818B8789F9F34BE9EE198DEB49665F1B765E66
2,685,434 UART: [art] SIG.S = 14A946CC263B5B4E8818F0D18510064D8AE48964C7F91D77315D4102D1D5E685014EB8F176AF3095802D00D34D500574
2,709,227 UART: mbox::rt_entry...
2,709,599 UART: ____ _ _ _ ____ _____
2,710,383 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,711,183 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,951 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,719 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,487 UART: |_|
2,713,799 UART:
2,819,981 UART: [rt] Runtime listening for mailbox commands...
2,824,939 >>> mbox cmd response data (3272 bytes)
2,824,940 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,848,025 >>> mbox cmd response data (0 bytes)
2,848,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,848,143 UART:
2,848,159 UART: Running Caliptra ROM ...
2,848,567 UART:
2,848,709 UART: [state] CFI Enabled
2,851,783 UART: [state] LifecycleState = Unprovisioned
2,852,438 UART: [state] DebugLocked = No
2,853,094 UART: [state] WD Timer not started. Device not locked for debugging
2,854,232 UART: [kat] SHA2-256
3,659,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,664,007 UART: [kat] ++
3,664,159 UART: [kat] sha1
3,668,623 UART: [kat] SHA2-256
3,670,563 UART: [kat] SHA2-384
3,673,378 UART: [kat] SHA2-512-ACC
3,675,278 UART: [kat] ECC-384
3,685,273 UART: [kat] HMAC-384Kdf
3,690,039 UART: [kat] LMS
3,938,367 UART: [kat] --
3,939,077 UART: [update-reset] ++
5,250,356 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,251,557 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,401,423 >>> mbox cmd response: success
5,401,690 UART: [update-reset] Copying MAN_2 To MAN_1
5,409,704 UART: [update-reset Success] --
5,410,673 UART: [state] Locking Datavault
5,411,261 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,865 UART: [state] Locking ICCM
5,412,411 UART: [exit] Launching FMC @ 0x40000130
5,417,740 UART:
5,417,756 UART: Running Caliptra FMC ...
5,418,164 UART:
5,418,307 UART: [state] CFI Enabled
5,506,962 UART: [art] Extend RT PCRs Done
5,507,390 UART: [art] Lock RT PCRs Done
5,508,553 UART: [art] Populate DV Done
5,516,888 UART: [fht] FMC Alias Private Key: 7
5,517,962 UART: [art] Derive CDI
5,518,242 UART: [art] Store in in slot 0x4
5,603,967 UART: [art] Derive Key Pair
5,604,327 UART: [art] Store priv key in slot 0x5
5,617,781 UART: [art] Derive Key Pair - Done
5,632,427 UART: [art] Signing Cert with AUTHO
5,632,907 UART: RITY.KEYID = 7
5,648,137 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,902 UART: [art] PUB.X = C18EE922C4CD40AE157886B6AC626D8D9D2509AAB40AB7A07DB8C9FEC49210CE88956BA61F1BAB70CD4CA7A4EDA47829
5,655,688 UART: [art] PUB.Y = 89443385A775DCD247BDD146A0EBE760B2255B8B9AAC7004908E0BAEDBF2462ADCE8D8A5B33A0277FCAAD3BA5590EA97
5,662,649 UART: [art] SIG.R = 94AE4012D0519F0374F5CE2A60B9BDC4FA855595B2FBC3CFE12BB02710624CD2AE28CCF7812FFE9F69A855E3CEC15801
5,669,429 UART: [art] SIG.S = 64D25436A6DFDB4AC593EB8FA05AF249B30FCBC70B2336A6BB61A2DBCD297FA6FDEE27C24D77181D3D0CC1C43CEABA9C
5,693,799 UART: Caliptra RT
5,694,145 UART: [state] CFI Enabled
5,981,506 UART: Disable attest DPE used context limit breach
5,982,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,983,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,430 UART: [rt]cmd =0x494e464f, len=4
6,016,778 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,976 ready_for_fw is high
1,060,976 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,165,348 >>> mbox cmd response: success
2,165,348 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,722 UART:
2,226,738 UART: Running Caliptra FMC ...
2,227,146 UART:
2,227,289 UART: [state] CFI Enabled
2,238,222 UART: [fht] FMC Alias Private Key: 7
2,346,123 UART: [art] Extend RT PCRs Done
2,346,551 UART: [art] Lock RT PCRs Done
2,348,417 UART: [art] Populate DV Done
2,356,610 UART: [fht] FMC Alias Private Key: 7
2,357,636 UART: [art] Derive CDI
2,357,916 UART: [art] Store in in slot 0x4
2,443,441 UART: [art] Derive Key Pair
2,443,801 UART: [art] Store priv key in slot 0x5
2,456,951 UART: [art] Derive Key Pair - Done
2,471,533 UART: [art] Signing Cert with AUTHO
2,472,013 UART: RITY.KEYID = 7
2,487,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,084 UART: [art] PUB.X = ACC7D992676B41CD29DCAC31A34559649BD16928808423B12DDE89DC6DAC7641E219D77C94C190AB705B237E0A0B9895
2,494,852 UART: [art] PUB.Y = F63E7E39C26DFBB619FD991FBFF0CA408D0B8E92FC7665BEA1D1D783D5A6E20598C0197BD221F062DDA0687D79FA8541
2,501,812 UART: [art] SIG.R = 58BF75DBADC47BBDA60D37ABD52DBEE13CC1096BA5AAF943375E05DDBCC38603DF2EA985B1FD5AFD9313F3CA9794831C
2,508,600 UART: [art] SIG.S = C199ABA8C838DA420B374D0458E8B1B860DE053E5A91DAC461314D89BAB67EFA188EAA52773D2FC30907E5B9743BF762
2,532,420 UART: mbox::rt_entry...
2,532,792 UART: ____ _ _ _ ____ _____
2,533,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,376 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,144 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,912 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,680 UART: |_|
2,536,992 UART:
2,644,454 UART: [rt] Runtime listening for mailbox commands...
2,649,412 >>> mbox cmd response data (3272 bytes)
2,649,413 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,498 >>> mbox cmd response data (0 bytes)
2,672,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,109,341 >>> mbox cmd response: success
5,122,507 UART:
5,122,523 UART: Running Caliptra FMC ...
5,122,931 UART:
5,123,074 UART: [state] CFI Enabled
5,212,585 UART: [art] Extend RT PCRs Done
5,213,013 UART: [art] Lock RT PCRs Done
5,214,282 UART: [art] Populate DV Done
5,222,547 UART: [fht] FMC Alias Private Key: 7
5,223,655 UART: [art] Derive CDI
5,223,935 UART: [art] Store in in slot 0x4
5,309,978 UART: [art] Derive Key Pair
5,310,338 UART: [art] Store priv key in slot 0x5
5,323,926 UART: [art] Derive Key Pair - Done
5,338,606 UART: [art] Signing Cert with AUTHO
5,339,086 UART: RITY.KEYID = 7
5,354,430 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,195 UART: [art] PUB.X = EE40052E8DA1BAE249659D62D64352669CF7896D980D72A4F726DC828F3EB472B059B557D7FA30976E1728954BD90061
5,361,933 UART: [art] PUB.Y = F23D88981B8B62EF0680EFAF402AFD974116431E90A4D40D873ECF977C0DEB69A45C15A8AD5918A5B72A165527B156B0
5,368,880 UART: [art] SIG.R = 540C3DDEEDBF39570CD25F8D35AC91B97F779F41CDAA6926D9DDF98F6C2C1F94FADEE2B5718E8DF909F6860BFC14BCB0
5,375,666 UART: [art] SIG.S = B27A83C83B8E77C708D0BFDC529D38A5A8C478BBAE56A58469BE5329F0E5A37C8A8A824BE69D3C71D05A020C3209B4AB
5,399,367 UART: Caliptra RT
5,399,713 UART: [state] CFI Enabled
5,689,162 UART: Disable attest DPE used context limit breach
5,689,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,690,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,721,208 UART: [rt]cmd =0x494e464f, len=4
5,724,504 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,199,043 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,708 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,494 UART: [fwproc] Wait for Commands...
1,282,105 UART: [fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 78632 bytes
2,171,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,776 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,310,170 >>> mbox cmd response: success
2,310,170 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,413 UART: [afmc] ++
2,311,581 UART: [afmc] CDI.KEYID = 6
2,311,944 UART: [afmc] SUBJECT.KEYID = 7
2,312,370 UART: [afmc] AUTHORITY.KEYID = 5
2,348,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,102 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,468 UART: [afmc] --
2,391,442 UART: [cold-reset] --
2,392,312 UART: [state] Locking Datavault
2,393,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,195 UART: [state] Locking ICCM
2,394,771 UART: [exit] Launching FMC @ 0x40000130
2,400,100 UART:
2,400,116 UART: Running Caliptra FMC ...
2,400,524 UART:
2,400,578 UART: [state] CFI Enabled
2,410,785 UART: [fht] FMC Alias Private Key: 7
2,518,740 UART: [art] Extend RT PCRs Done
2,519,168 UART: [art] Lock RT PCRs Done
2,521,088 UART: [art] Populate DV Done
2,529,261 UART: [fht] FMC Alias Private Key: 7
2,530,285 UART: [art] Derive CDI
2,530,565 UART: [art] Store in in slot 0x4
2,616,364 UART: [art] Derive Key Pair
2,616,724 UART: [art] Store priv key in slot 0x5
2,629,860 UART: [art] Derive Key Pair - Done
2,644,670 UART: [art] Signing Cert with AUTHO
2,645,150 UART: RITY.KEYID = 7
2,660,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,979 UART: [art] PUB.X = A58D8F03FFDCBA09335505F324053F06994D2A59AD8BB36E38CA195C8EB94834B81E0717D63335D560E40A17DDF0AFA1
2,667,736 UART: [art] PUB.Y = 7D7F73E8240CC7C6C1904780739EE62EC1CE83260BE81FB1628975072249DBD6AF7DE40B567D140CE8B2E3D24FC5703F
2,674,677 UART: [art] SIG.R = 74FDCEC57DDC97F073CED1DDF7AD47C06D4234E0C373F6CD08D4C7D92571CB6924E8F714A3BD34595A0BB76CC5918201
2,681,454 UART: [art] SIG.S = 79D7B321BD07D6636BDFD444CA7456916A2A8EDC79826F43FCD37E7AE1F16A66CED1DD492797EEC923151ECD7047E602
2,705,513 UART: mbox::rt_entry...
2,705,885 UART: ____ _ _ _ ____ _____
2,706,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,237 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,773 UART: |_|
2,710,085 UART:
2,816,093 UART: [rt] Runtime listening for mailbox commands...
2,821,051 >>> mbox cmd response data (3272 bytes)
2,821,052 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,137 >>> mbox cmd response data (0 bytes)
2,844,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,844,255 UART:
2,844,271 UART: Running Caliptra ROM ...
2,844,679 UART:
2,844,734 UART: [state] CFI Enabled
2,847,450 UART: [state] LifecycleState = Unprovisioned
2,848,105 UART: [state] DebugLocked = No
2,848,589 UART: [state] WD Timer not started. Device not locked for debugging
2,849,839 UART: [kat] SHA2-256
3,653,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,518 UART: [kat] ++
3,657,670 UART: [kat] sha1
3,661,818 UART: [kat] SHA2-256
3,663,758 UART: [kat] SHA2-384
3,666,471 UART: [kat] SHA2-512-ACC
3,668,371 UART: [kat] ECC-384
3,677,880 UART: [kat] HMAC-384Kdf
3,682,414 UART: [kat] LMS
3,930,726 UART: [kat] --
3,931,476 UART: [update-reset] ++
5,243,352 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,477 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,394,343 >>> mbox cmd response: success
5,394,554 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,568 UART: [update-reset Success] --
5,403,343 UART: [state] Locking Datavault
5,404,379 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,983 UART: [state] Locking ICCM
5,405,541 UART: [exit] Launching FMC @ 0x40000130
5,410,870 UART:
5,410,886 UART: Running Caliptra FMC ...
5,411,294 UART:
5,411,348 UART: [state] CFI Enabled
5,500,395 UART: [art] Extend RT PCRs Done
5,500,823 UART: [art] Lock RT PCRs Done
5,502,154 UART: [art] Populate DV Done
5,510,519 UART: [fht] FMC Alias Private Key: 7
5,511,595 UART: [art] Derive CDI
5,511,875 UART: [art] Store in in slot 0x4
5,597,298 UART: [art] Derive Key Pair
5,597,658 UART: [art] Store priv key in slot 0x5
5,611,172 UART: [art] Derive Key Pair - Done
5,625,895 UART: [art] Signing Cert with AUTHO
5,626,375 UART: RITY.KEYID = 7
5,641,951 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,716 UART: [art] PUB.X = 2CDD0BB718C4E8C9AC0A51B100209B194E9961B717B12B3A2FAABC4F579D9382AA135408D5EE30BB20334F6A25F52B67
5,649,465 UART: [art] PUB.Y = 3BB716604A2322CEF5C6678C96956E7F727FA7D99043CC860160C951C97DE2118728E11ED25BF79BC08E25A8A6AF8C0D
5,656,413 UART: [art] SIG.R = 80A96AAB34055277BA204BE6A915C6DB550067B4213FC0044CAAEC8945CA13252DE99F50E0D5EDE9DAFC7C3B32366AFE
5,663,171 UART: [art] SIG.S = 4FA312B7E75F6735D0310874497488981ECB740C49C09562F65483FB6BA26113D22CF49F735C3CE64E723024C9DCF164
5,686,918 UART: Caliptra RT
5,687,172 UART: [state] CFI Enabled
5,975,345 UART: Disable attest DPE used context limit breach
5,976,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,977,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,521 UART: [rt]cmd =0x494e464f, len=4
6,010,775 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,964 ready_for_fw is high
1,054,964 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,158,034 >>> mbox cmd response: success
2,158,034 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,348 UART:
2,220,364 UART: Running Caliptra FMC ...
2,220,772 UART:
2,220,826 UART: [state] CFI Enabled
2,230,897 UART: [fht] FMC Alias Private Key: 7
2,339,250 UART: [art] Extend RT PCRs Done
2,339,678 UART: [art] Lock RT PCRs Done
2,341,452 UART: [art] Populate DV Done
2,349,435 UART: [fht] FMC Alias Private Key: 7
2,350,369 UART: [art] Derive CDI
2,350,649 UART: [art] Store in in slot 0x4
2,435,882 UART: [art] Derive Key Pair
2,436,242 UART: [art] Store priv key in slot 0x5
2,449,526 UART: [art] Derive Key Pair - Done
2,463,974 UART: [art] Signing Cert with AUTHO
2,464,454 UART: RITY.KEYID = 7
2,479,278 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,043 UART: [art] PUB.X = F896CF76AE62E24E287066D789C1C766192A7C0DEFDCE3E7FEA672E1E6466A229EE970562F25A83337FD8002336F5609
2,486,806 UART: [art] PUB.Y = F5DCAC851B085326C8A6F48612AC52CF49BE77B51A77C397FE3EF5663F0F478799D4C14B930277E58338CFC81C1AA988
2,493,753 UART: [art] SIG.R = D93723B82084B52645C64893075EDE702C4D6326B9536A512C7037AE0AB8E530CBCD34BB82FD2DCE49F9A4DB4A30A680
2,500,523 UART: [art] SIG.S = 97A1580F8902A32F178AC6372898F2DA20EECCBAE50F2EEFAA46605EEB641CFDD47DB6A618C5F7A1DB850E25869AADCE
2,524,448 UART: mbox::rt_entry...
2,524,820 UART: ____ _ _ _ ____ _____
2,525,604 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,404 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,172 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,940 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,708 UART: |_|
2,529,020 UART:
2,634,957 UART: [rt] Runtime listening for mailbox commands...
2,639,915 >>> mbox cmd response data (3272 bytes)
2,639,916 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,663,001 >>> mbox cmd response data (0 bytes)
2,663,002 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,095,236 >>> mbox cmd response: success
5,108,946 UART:
5,108,962 UART: Running Caliptra FMC ...
5,109,370 UART:
5,109,424 UART: [state] CFI Enabled
5,198,481 UART: [art] Extend RT PCRs Done
5,198,909 UART: [art] Lock RT PCRs Done
5,200,150 UART: [art] Populate DV Done
5,208,237 UART: [fht] FMC Alias Private Key: 7
5,209,263 UART: [art] Derive CDI
5,209,543 UART: [art] Store in in slot 0x4
5,295,034 UART: [art] Derive Key Pair
5,295,394 UART: [art] Store priv key in slot 0x5
5,308,734 UART: [art] Derive Key Pair - Done
5,323,453 UART: [art] Signing Cert with AUTHO
5,323,933 UART: RITY.KEYID = 7
5,339,421 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,186 UART: [art] PUB.X = 435AFD7C49AB2545E3DD8CCA2EA4E7085F61075B39FC3C8CDC5D94F1974834E9E54BE77BA10A23F299F01F7279465F32
5,346,957 UART: [art] PUB.Y = FF244A9BA5E2C5BDF6A9007023AFFC06E5C6477FE02E7D4E9BA7200D5AED9AB94D146CF3210030875CED7374C3A369A1
5,353,873 UART: [art] SIG.R = 214E125109AB487714DAFDFA7509AEA0B744B52E261964C75855F8A73850403173D7F8F50A2D7A35CC31905DF1A9043B
5,360,629 UART: [art] SIG.S = BE4C4CC6A042B6881855A464B44753800A9114D63E10AF12084B0B88A5FED01103BBA06E23EE05948AE30C5F708DFCD8
5,384,782 UART: Caliptra RT
5,385,036 UART: [state] CFI Enabled
5,680,321 UART: Disable attest DPE used context limit breach
5,681,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,682,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,712,253 UART: [rt]cmd =0x494e464f, len=4
5,715,779 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,666 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 ready_for_fw is high
1,174,746 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,688 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,792 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,819 UART: [fwproc] Recv'd Img size: 78632 bytes
2,172,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,831 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,311,163 >>> mbox cmd response: success
2,311,163 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,278 UART: [afmc] ++
2,312,446 UART: [afmc] CDI.KEYID = 6
2,312,809 UART: [afmc] SUBJECT.KEYID = 7
2,313,235 UART: [afmc] AUTHORITY.KEYID = 5
2,349,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,421 UART: [afmc] --
2,392,341 UART: [cold-reset] --
2,393,133 UART: [state] Locking Datavault
2,394,296 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,900 UART: [state] Locking ICCM
2,395,428 UART: [exit] Launching FMC @ 0x40000130
2,400,757 UART:
2,400,773 UART: Running Caliptra FMC ...
2,401,181 UART:
2,401,324 UART: [state] CFI Enabled
2,412,173 UART: [fht] FMC Alias Private Key: 7
2,520,134 UART: [art] Extend RT PCRs Done
2,520,562 UART: [art] Lock RT PCRs Done
2,521,998 UART: [art] Populate DV Done
2,530,123 UART: [fht] FMC Alias Private Key: 7
2,531,117 UART: [art] Derive CDI
2,531,397 UART: [art] Store in in slot 0x4
2,616,690 UART: [art] Derive Key Pair
2,617,050 UART: [art] Store priv key in slot 0x5
2,630,020 UART: [art] Derive Key Pair - Done
2,645,081 UART: [art] Signing Cert with AUTHO
2,645,561 UART: RITY.KEYID = 7
2,660,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,706 UART: [art] PUB.X = 86A85CAED0164F4E363C42A8169956D3CCA064610B4029C40A4BA5DEFDE74D059022170C8EE007F9C6B49B2114D44B7E
2,668,467 UART: [art] PUB.Y = 69FFC3E1F1CFAD9E30EB1CA7421F7DB7BCA9B840A316BC795781B2001EDE29D5C6C0427E27C860F68E035C8BE518AF25
2,675,410 UART: [art] SIG.R = 965579B9BE6DA1E281851700EA99771A4C6FAD231A36C32AEB447F10D404A4A234D1E7FB2AB4226A1F67888F6C0848B9
2,682,156 UART: [art] SIG.S = C38F66373EE70E2F68EE35544A9DC804491AB1747182AB59669C3C0B2B819AA7B18F8B4D519C256DBA164D63DAD8F287
2,705,548 UART: mbox::rt_entry...
2,705,920 UART: ____ _ _ _ ____ _____
2,706,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,504 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,272 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,040 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,808 UART: |_|
2,710,120 UART:
2,815,841 UART: [rt] Runtime listening for mailbox commands...
2,820,799 >>> mbox cmd response data (3272 bytes)
2,820,800 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,885 >>> mbox cmd response data (0 bytes)
2,843,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,844,003 UART:
2,844,019 UART: Running Caliptra ROM ...
2,844,427 UART:
2,844,569 UART: [state] CFI Enabled
2,847,315 UART: [state] LifecycleState = Unprovisioned
2,847,970 UART: [state] DebugLocked = No
2,848,684 UART: [state] WD Timer not started. Device not locked for debugging
2,850,032 UART: [kat] SHA2-256
3,653,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,711 UART: [kat] ++
3,657,863 UART: [kat] sha1
3,662,103 UART: [kat] SHA2-256
3,664,043 UART: [kat] SHA2-384
3,666,746 UART: [kat] SHA2-512-ACC
3,668,646 UART: [kat] ECC-384
3,677,933 UART: [kat] HMAC-384Kdf
3,682,419 UART: [kat] LMS
3,930,731 UART: [kat] --
3,931,643 UART: [update-reset] ++
5,243,435 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,482 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
5,394,348 >>> mbox cmd response: success
5,394,637 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,651 UART: [update-reset Success] --
5,403,642 UART: [state] Locking Datavault
5,404,362 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,966 UART: [state] Locking ICCM
5,405,432 UART: [exit] Launching FMC @ 0x40000130
5,410,761 UART:
5,410,777 UART: Running Caliptra FMC ...
5,411,185 UART:
5,411,328 UART: [state] CFI Enabled
5,500,411 UART: [art] Extend RT PCRs Done
5,500,839 UART: [art] Lock RT PCRs Done
5,502,194 UART: [art] Populate DV Done
5,510,379 UART: [fht] FMC Alias Private Key: 7
5,511,483 UART: [art] Derive CDI
5,511,763 UART: [art] Store in in slot 0x4
5,597,632 UART: [art] Derive Key Pair
5,597,992 UART: [art] Store priv key in slot 0x5
5,612,398 UART: [art] Derive Key Pair - Done
5,627,283 UART: [art] Signing Cert with AUTHO
5,627,763 UART: RITY.KEYID = 7
5,643,155 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,920 UART: [art] PUB.X = C11CC8A10B03E00BC1E91A0528FD077CE3891BD1F5470FB6799C83CD507F838653896038F556A6AF2F0BA3285E07DF5A
5,650,672 UART: [art] PUB.Y = 758AD57E6C9EF3175BD8B92014311CCDFCFDA29AB58FD1E1DFB59D2A9CEC4BA6FF0A24E7853E238E371356708A5C560A
5,657,636 UART: [art] SIG.R = BB175EEB14299D28EBC4AE9939FF8F7C37A8CB3940E1E0DCB40E7EF0C6448ED9245A2E9F23DE4EF7307ADAF887FAAAB3
5,664,431 UART: [art] SIG.S = C89DD829F36329A81CCC017E4AB51EC542FDA78C8ACACF50FC079C2C512BE9843DDD1E951A7D11C801FCE9E1B739D66F
5,688,217 UART: Caliptra RT
5,688,563 UART: [state] CFI Enabled
5,975,405 UART: Disable attest DPE used context limit breach
5,976,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,977,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,663 UART: [rt]cmd =0x494e464f, len=4
6,011,037 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,901 ready_for_fw is high
1,055,901 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
2,160,885 >>> mbox cmd response: success
2,160,885 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,193 UART:
2,223,209 UART: Running Caliptra FMC ...
2,223,617 UART:
2,223,760 UART: [state] CFI Enabled
2,234,787 UART: [fht] FMC Alias Private Key: 7
2,343,092 UART: [art] Extend RT PCRs Done
2,343,520 UART: [art] Lock RT PCRs Done
2,344,950 UART: [art] Populate DV Done
2,353,353 UART: [fht] FMC Alias Private Key: 7
2,354,311 UART: [art] Derive CDI
2,354,591 UART: [art] Store in in slot 0x4
2,440,454 UART: [art] Derive Key Pair
2,440,814 UART: [art] Store priv key in slot 0x5
2,453,908 UART: [art] Derive Key Pair - Done
2,468,355 UART: [art] Signing Cert with AUTHO
2,468,835 UART: RITY.KEYID = 7
2,483,533 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,298 UART: [art] PUB.X = 70C9D4FE258965544B77342DD1795A5079D8827370D84DF2D6BCA9D95FBB39A52A450BB87059148B01DBE7ACD2E72054
2,491,064 UART: [art] PUB.Y = 458A2CB42878DF6079FA8F45C5243ED2FDACFADB52B0B650BA1C7EDDA5551835B0CDDE330EE78C999930B14A38BB9CCD
2,498,035 UART: [art] SIG.R = 2FF6ECC1B78615C00A8B7C2C4B293E5380F03D5144858F211B3836B9D6EE4AF950BA58DC227B42775EB8F88A461C7518
2,504,806 UART: [art] SIG.S = C716BA2D31C10341BB7F144CE37C58A198121B0B38EB94A544C9495EEDBB50E6F1356731FD58705754A139D9AF2CEE21
2,528,799 UART: mbox::rt_entry...
2,529,171 UART: ____ _ _ _ ____ _____
2,529,955 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,755 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,291 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,059 UART: |_|
2,533,371 UART:
2,639,437 UART: [rt] Runtime listening for mailbox commands...
2,644,395 >>> mbox cmd response data (3272 bytes)
2,644,396 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,481 >>> mbox cmd response data (0 bytes)
2,667,482 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,099,703 >>> mbox cmd response: success
5,113,075 UART:
5,113,091 UART: Running Caliptra FMC ...
5,113,499 UART:
5,113,642 UART: [state] CFI Enabled
5,202,869 UART: [art] Extend RT PCRs Done
5,203,297 UART: [art] Lock RT PCRs Done
5,204,560 UART: [art] Populate DV Done
5,212,593 UART: [fht] FMC Alias Private Key: 7
5,213,669 UART: [art] Derive CDI
5,213,949 UART: [art] Store in in slot 0x4
5,299,598 UART: [art] Derive Key Pair
5,299,958 UART: [art] Store priv key in slot 0x5
5,313,306 UART: [art] Derive Key Pair - Done
5,328,081 UART: [art] Signing Cert with AUTHO
5,328,561 UART: RITY.KEYID = 7
5,343,977 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,742 UART: [art] PUB.X = 51F131D72E1902F0FEBC75EA2F42C5E5D02A8E77EC46574DDBC47EED00D3F97CD46940237B9F7AF87F58044B25FCFD42
5,351,500 UART: [art] PUB.Y = BDDE9930F5ED9F70936A6A8FD8583ACB4766ABDA145E09E5C8CC73E0EC29B66BA1181406AA1B94612898D01B160D29D6
5,358,453 UART: [art] SIG.R = 5A13E835016557AF06AABD1D13717777B0B363F874424724A01F286AA917B1B1760F8CEDE720FE9AB6A3BF73DC9C8979
5,365,218 UART: [art] SIG.S = 366FCB44F8A8DF4439DDFE76EEBE18D57ECBCCA301366B34E3FC82D528554C4EC81C07D82ED7AD9E31BA28533A053153
5,388,360 UART: Caliptra RT
5,388,706 UART: [state] CFI Enabled
5,678,995 UART: Disable attest DPE used context limit breach
5,679,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,680,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,711,007 UART: [rt]cmd =0x494e464f, len=4
5,714,467 >>> mbox cmd response data (264 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,425 UART:
192,800 UART: Running Caliptra ROM ...
193,982 UART:
194,131 UART: [state] CFI Enabled
263,914 UART: [state] LifecycleState = Unprovisioned
265,846 UART: [state] DebugLocked = No
267,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,761 UART: [kat] SHA2-256
442,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,909 UART: [kat] ++
453,421 UART: [kat] sha1
463,791 UART: [kat] SHA2-256
466,504 UART: [kat] SHA2-384
471,418 UART: [kat] SHA2-512-ACC
473,775 UART: [kat] ECC-384
2,768,139 UART: [kat] HMAC-384Kdf
2,780,876 UART: [kat] LMS
3,971,160 UART: [kat] --
3,976,095 UART: [cold-reset] ++
3,978,463 UART: [fht] Storing FHT @ 0x50003400
3,989,787 UART: [idev] ++
3,990,412 UART: [idev] CDI.KEYID = 6
3,991,314 UART: [idev] SUBJECT.KEYID = 7
3,992,550 UART: [idev] UDS.KEYID = 0
3,993,543 ready_for_fw is high
3,993,729 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,139 UART: [idev] Erasing UDS.KEYID = 0
7,329,265 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,639 UART: [idev] --
7,355,835 UART: [ldev] ++
7,356,394 UART: [ldev] CDI.KEYID = 6
7,357,355 UART: [ldev] SUBJECT.KEYID = 5
7,358,559 UART: [ldev] AUTHORITY.KEYID = 7
7,359,833 UART: [ldev] FE.KEYID = 1
7,403,752 UART: [ldev] Erasing FE.KEYID = 1
10,734,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,231 UART: [ldev] --
13,097,578 UART: [fwproc] Waiting for Commands...
13,099,454 UART: [fwproc] Received command 0x46574c44
13,101,632 UART: [fwproc] Received Image of size 114036 bytes
17,145,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,607,060 >>> mbox cmd response: success
17,612,033 UART: [afmc] ++
17,612,627 UART: [afmc] CDI.KEYID = 6
17,613,510 UART: [afmc] SUBJECT.KEYID = 7
17,614,775 UART: [afmc] AUTHORITY.KEYID = 5
20,988,101 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,477 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,739 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,129 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,957 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,404 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,677 UART: [afmc] --
23,359,648 UART: [cold-reset] --
23,362,369 UART: [state] Locking Datavault
23,367,393 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,084 UART: [state] Locking ICCM
23,371,441 UART: [exit] Launching FMC @ 0x40000130
23,379,830 UART:
23,380,063 UART: Running Caliptra FMC ...
23,381,159 UART:
23,381,308 UART: [state] CFI Enabled
23,447,676 UART: [fht] FMC Alias Private Key: 7
25,785,432 UART: [art] Extend RT PCRs Done
25,786,650 UART: [art] Lock RT PCRs Done
25,788,130 UART: [art] Populate DV Done
25,793,410 UART: [fht] FMC Alias Private Key: 7
25,794,951 UART: [art] Derive CDI
25,795,677 UART: [art] Store in in slot 0x4
25,856,542 UART: [art] Derive Key Pair
25,857,537 UART: [art] Store priv key in slot 0x5
29,150,698 UART: [art] Derive Key Pair - Done
29,163,697 UART: [art] Signing Cert with AUTHO
29,164,999 UART: RITY.KEYID = 7
31,453,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,578 UART: [art] PUB.X = C54E2AC2AD6B1C7BD063A7751C0D1D8B858763769E71948FF801FFF9F1427B8F723F20122CEF26C5BA3DDC7D153CD676
31,461,841 UART: [art] PUB.Y = 636B889569C94E656938FAB33EB0A3AE98881D5816D61943209AEA5F82079D77EA9E711EE76812716343CE777517CAF3
31,469,056 UART: [art] SIG.R = 44FCDC15F62A582ED24CAE5FE639F997209AA24A0D49CE1EC1EB01564E487A1FF1C89370599842A69CF255CCE800A43C
31,476,438 UART: [art] SIG.S = 9761899CE77F0D3A669ABF69FD6F333BEAFBE35EED72E9ED2AC354D47EE22A1C0BAD782BBC0659813ED87F02CCD3B993
32,781,393 UART: Caliptra RT
32,782,105 UART: [state] CFI Enabled
32,943,690 UART: [rt] RT listening for mailbox commands...
32,946,079 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,975,700 UART: [rt]cmd =0x50435252, len=8
32,977,616 >>> mbox cmd response data (8 bytes)
35,030,309 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,130,928 UART:
35,131,291 UART: Running Caliptra ROM ...
35,132,334 UART:
35,132,477 UART: [state] CFI Enabled
35,205,356 UART: [state] LifecycleState = Unprovisioned
35,207,297 UART: [state] DebugLocked = No
35,208,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,212,956 UART: [kat] SHA2-256
35,382,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,393,137 UART: [kat] ++
35,393,589 UART: [kat] sha1
35,403,704 UART: [kat] SHA2-256
35,406,387 UART: [kat] SHA2-384
35,413,502 UART: [kat] SHA2-512-ACC
35,415,849 UART: [kat] ECC-384
37,708,849 UART: [kat] HMAC-384Kdf
37,722,002 UART: [kat] LMS
38,912,348 UART: [kat] --
38,916,187 UART: [update-reset] ++
42,630,963 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,634,737 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,892,915 >>> mbox cmd response: success
42,893,288 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,894,383 UART: [update-reset] Copying MAN_2 To MAN_1
42,916,800 UART: [update-reset Success] --
42,920,962 UART: [state] Locking Datavault
42,924,441 UART: [state] Locking PCR0, PCR1 and PCR31
42,926,196 UART: [state] Locking ICCM
42,928,176 UART: [exit] Launching FMC @ 0x40000130
42,936,619 UART:
42,936,851 UART: Running Caliptra FMC ...
42,937,944 UART:
42,938,089 UART: [state] CFI Enabled
43,044,589 UART: [art] Extend RT PCRs Done
43,045,771 UART: [art] Lock RT PCRs Done
43,047,233 UART: [art] Populate DV Done
43,052,583 UART: [fht] FMC Alias Private Key: 7
43,054,267 UART: [art] Derive CDI
43,055,081 UART: [art] Store in in slot 0x4
43,113,961 UART: [art] Derive Key Pair
43,115,005 UART: [art] Store priv key in slot 0x5
46,407,915 UART: [art] Derive Key Pair - Done
46,421,231 UART: [art] Signing Cert with AUTHO
46,422,527 UART: RITY.KEYID = 7
48,710,229 UART: [art] Erasing AUTHORITY.KEYID = 7
48,711,754 UART: [art] PUB.X = E743B81A39872862BAD940B20DB407CAE57B8872C92A58E56A195381F1ACEDB96DCB3FD9F31A8AE40C66CD37603AF4E2
48,718,989 UART: [art] PUB.Y = 67CC4C59DFCE6E2195F3B9DC55CEF0EC4C949ECD120E6C4CED6666D532F2A639F0DC190791A6F9943754960EEC69A688
48,726,254 UART: [art] SIG.R = F6C1E7C5C7961BF94735BC4C6322AEB3FF540821EB48ABE219853BA0AB68286EF3954C8A4105EC41443AEB5148E0A6B7
48,733,637 UART: [art] SIG.S = 956DBF95EF4C9672A744BD60F1ACE05E043BFDA01B10F00A3EB0125A205B486EDCC00D1090663818C4A7B5A36DA33495
50,038,389 UART: mbox::rt_entry...
50,039,355 UART: ____ _ _ _ ____ _____
50,041,338 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,043,337 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,045,259 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,047,182 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,049,108 UART: |_|
50,049,931 UART:
50,333,024 UART: [rt] Runtime listening for mailbox commands...
50,335,026 >>> mbox cmd response data (128 bytes)
52,384,669 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,484,547 UART:
52,484,900 UART: Running Caliptra ROM ...
52,486,028 UART:
52,486,198 UART: [state] CFI Enabled
52,551,284 UART: [state] LifecycleState = Unprovisioned
52,553,210 UART: [state] DebugLocked = No
52,556,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,561,774 UART: [kat] SHA2-256
52,731,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,741,965 UART: [kat] ++
52,742,416 UART: [kat] sha1
52,753,457 UART: [kat] SHA2-256
52,756,127 UART: [kat] SHA2-384
52,760,614 UART: [kat] SHA2-512-ACC
52,762,961 UART: [kat] ECC-384
55,053,071 UART: [kat] HMAC-384Kdf
55,085,184 UART: [kat] LMS
56,275,571 UART: [kat] --
56,278,338 UART: [update-reset] ++
59,986,566 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,990,628 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
60,248,799 >>> mbox cmd response: success
60,249,167 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,249,505 UART: [update-reset] Copying MAN_2 To MAN_1
60,271,963 UART: [update-reset Success] --
60,276,285 UART: [state] Locking Datavault
60,279,106 UART: [state] Locking PCR0, PCR1 and PCR31
60,280,854 UART: [state] Locking ICCM
60,283,162 UART: [exit] Launching FMC @ 0x40000130
60,291,601 UART:
60,291,831 UART: Running Caliptra FMC ...
60,292,923 UART:
60,293,072 UART: [state] CFI Enabled
60,386,878 UART: [art] Extend RT PCRs Done
60,388,060 UART: [art] Lock RT PCRs Done
60,389,407 UART: [art] Populate DV Done
60,394,763 UART: [fht] FMC Alias Private Key: 7
60,396,506 UART: [art] Derive CDI
60,397,309 UART: [art] Store in in slot 0x4
60,456,094 UART: [art] Derive Key Pair
60,457,148 UART: [art] Store priv key in slot 0x5
63,750,134 UART: [art] Derive Key Pair - Done
63,763,355 UART: [art] Signing Cert with AUTHO
63,764,653 UART: RITY.KEYID = 7
66,051,275 UART: [art] Erasing AUTHORITY.KEYID = 7
66,052,780 UART: [art] PUB.X = F2210458233352CAEF1815F361C6795E45B170DF40B5CE3F58951349FBE205491FD19EFF1029A07B71628F3F9333B1D6
66,060,018 UART: [art] PUB.Y = 296BFE83943803B7620667B38E7A0AD88CFC159F739B74E9F15608BB2756201A5CA06A468303E8583099646939E2CBD4
66,067,241 UART: [art] SIG.R = 3BA7B52928033D9D4A1C99D495F33BE18B495B36762D9886D8CC849474ABEDBE1815F7CD0F2853CC843365E44F501F93
66,074,573 UART: [art] SIG.S = 843F2FBB89FE5A7C0D4BEA117AF81C2DE9D9A72953726EF0D12FB1D50F0EE0458FCC5CCCAD1CC5F3674E61767FB7533B
67,380,042 UART: mbox::rt_entry...
67,380,991 UART: ____ _ _ _ ____ _____
67,382,967 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,384,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,387,093 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,388,955 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,390,792 UART: |_|
67,391,636 UART:
67,672,933 UART: [rt] Runtime listening for mailbox commands...
67,674,958 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,805,062 ready_for_fw is high
3,805,475 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,893,293 >>> mbox cmd response: success
23,588,864 UART:
23,589,237 UART: Running Caliptra FMC ...
23,590,433 UART:
23,590,602 UART: [state] CFI Enabled
23,657,038 UART: [fht] FMC Alias Private Key: 7
25,995,848 UART: [art] Extend RT PCRs Done
25,997,064 UART: [art] Lock RT PCRs Done
25,998,876 UART: [art] Populate DV Done
26,004,130 UART: [fht] FMC Alias Private Key: 7
26,005,724 UART: [art] Derive CDI
26,006,543 UART: [art] Store in in slot 0x4
26,065,805 UART: [art] Derive Key Pair
26,066,837 UART: [art] Store priv key in slot 0x5
29,359,813 UART: [art] Derive Key Pair - Done
29,373,029 UART: [art] Signing Cert with AUTHO
29,374,339 UART: RITY.KEYID = 7
31,661,828 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,334 UART: [art] PUB.X = C0B4C01CC491824F91AFB24439D37451C85538487B0828FC7678F5416A6920402A120FBBEB3BC814B076402D53009B67
31,670,555 UART: [art] PUB.Y = F0EA95ED85090CFE5BAEECCA8E9C44A7CA01B5A2AFEA6DF670086F736E0ECF18DA963844D879D24220C202833E36FD54
31,677,810 UART: [art] SIG.R = 6CF5D78DB6F72DD0ACFCBC9CE045D6277EE02F6F48B6ABABC79F4062A1A3D42B7F967D1A0742542DFC34AD2CB9DC11BD
31,685,293 UART: [art] SIG.S = DA783C8D380D5C420EBCBB1F0D24B5EA17C5E88827652CF72DA29BA76505FBC3EBFD09BC43597903E9007DC2FC4777FF
32,990,357 UART: Caliptra RT
32,991,051 UART: [state] CFI Enabled
33,153,118 UART: [rt] RT listening for mailbox commands...
33,155,512 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,185,520 UART: [rt]cmd =0x50435252, len=8
33,187,490 >>> mbox cmd response data (8 bytes)
35,242,935 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,233,295 >>> mbox cmd response: success
43,233,752 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,271,038 UART:
43,271,331 UART: Running Caliptra FMC ...
43,272,441 UART:
43,272,592 UART: [state] CFI Enabled
43,373,318 UART: [art] Extend RT PCRs Done
43,374,522 UART: [art] Lock RT PCRs Done
43,375,819 UART: [art] Populate DV Done
43,381,556 UART: [fht] FMC Alias Private Key: 7
43,383,150 UART: [art] Derive CDI
43,383,960 UART: [art] Store in in slot 0x4
43,442,395 UART: [art] Derive Key Pair
43,443,430 UART: [art] Store priv key in slot 0x5
46,736,411 UART: [art] Derive Key Pair - Done
46,749,668 UART: [art] Signing Cert with AUTHO
46,750,996 UART: RITY.KEYID = 7
49,038,223 UART: [art] Erasing AUTHORITY.KEYID = 7
49,039,740 UART: [art] PUB.X = 5D673D56614B84FCA85040BB21C372D8DA08626B4142BDEE83DFC0D616B23FF1A4758A17BEB4548657D9F29ED558CEEF
49,046,985 UART: [art] PUB.Y = 21E3CADFFFE303E4A9744D47CBF132C6A2D83245EB27C6F390454EE2CA9AA993DD81961BD94E8236CDAC77F418C6A541
49,054,256 UART: [art] SIG.R = 57E99CCC477E85A71D9FACD5D07C1219EEC15CA8D35B00FE1E3886D48317D734E28148EA07A61714309203860D0587A7
49,061,643 UART: [art] SIG.S = E212DA89459A78DED8B2BFE03D950013C666A092BB7572D61EA774CCF3CE951489E5E8710E0401461059364CB38250DE
50,366,462 UART: mbox::rt_entry...
50,367,448 UART: ____ _ _ _ ____ _____
50,369,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,371,381 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,373,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,375,227 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,377,146 UART: |_|
50,377,945 UART:
50,666,438 UART: [rt] Runtime listening for mailbox commands...
50,668,644 >>> mbox cmd response data (128 bytes)
52,718,715 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
60,661,895 >>> mbox cmd response: success
60,662,405 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,696,161 UART:
60,696,477 UART: Running Caliptra FMC ...
60,697,508 UART:
60,697,648 UART: [state] CFI Enabled
60,801,990 UART: [art] Extend RT PCRs Done
60,803,176 UART: [art] Lock RT PCRs Done
60,804,651 UART: [art] Populate DV Done
60,810,161 UART: [fht] FMC Alias Private Key: 7
60,811,752 UART: [art] Derive CDI
60,812,562 UART: [art] Store in in slot 0x4
60,871,304 UART: [art] Derive Key Pair
60,872,340 UART: [art] Store priv key in slot 0x5
64,165,940 UART: [art] Derive Key Pair - Done
64,179,039 UART: [art] Signing Cert with AUTHO
64,180,339 UART: RITY.KEYID = 7
66,467,547 UART: [art] Erasing AUTHORITY.KEYID = 7
66,469,076 UART: [art] PUB.X = FE4E03B581BD625F842D98C6028E936E732E0ABB578CAD26C4E26B19BBA68BAD7B71F504B9A60D200A5FBFD331B64570
66,476,328 UART: [art] PUB.Y = 2F536CC7A11E03E1B8A6922790DFAA79EF249D34A4DE11BDD3911E891257873CF5EEEEF555A85E20FF63C38F7150D295
66,483,597 UART: [art] SIG.R = FA914FB7D2850A97CC223B0153628EFA25454902FAFD60F54F4EFA84CB1B5800BB08972AAC6E05F5C8701098B906ACBC
66,490,970 UART: [art] SIG.S = D1A0E49B54ACEAA5C90542F24ADC4645B26759B03CF4FACE8A98CAF3E5E538E20F51E4DC592EA3EC29580475D0DA65E9
67,795,631 UART: mbox::rt_entry...
67,796,585 UART: ____ _ _ _ ____ _____
67,798,508 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,800,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,802,358 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,804,275 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,806,121 UART: |_|
67,806,992 UART:
68,092,141 UART: [rt] Runtime listening for mailbox commands...
68,094,148 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,372 UART:
192,741 UART: Running Caliptra ROM ...
193,850 UART:
603,365 UART: [state] CFI Enabled
618,328 UART: [state] LifecycleState = Unprovisioned
620,225 UART: [state] DebugLocked = No
622,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,486 UART: [kat] SHA2-256
797,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,801 UART: [kat] ++
808,263 UART: [kat] sha1
819,274 UART: [kat] SHA2-256
822,001 UART: [kat] SHA2-384
827,145 UART: [kat] SHA2-512-ACC
829,511 UART: [kat] ECC-384
3,114,100 UART: [kat] HMAC-384Kdf
3,124,487 UART: [kat] LMS
4,314,574 UART: [kat] --
4,320,071 UART: [cold-reset] ++
4,322,648 UART: [fht] Storing FHT @ 0x50003400
4,334,477 UART: [idev] ++
4,335,037 UART: [idev] CDI.KEYID = 6
4,335,950 UART: [idev] SUBJECT.KEYID = 7
4,337,214 UART: [idev] UDS.KEYID = 0
4,338,255 ready_for_fw is high
4,338,453 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,664 UART: [idev] Erasing UDS.KEYID = 0
7,622,892 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,918 UART: [idev] --
7,649,282 UART: [ldev] ++
7,649,892 UART: [ldev] CDI.KEYID = 6
7,650,781 UART: [ldev] SUBJECT.KEYID = 5
7,651,934 UART: [ldev] AUTHORITY.KEYID = 7
7,653,275 UART: [ldev] FE.KEYID = 1
7,664,212 UART: [ldev] Erasing FE.KEYID = 1
10,950,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,313 UART: [ldev] --
13,310,276 UART: [fwproc] Waiting for Commands...
13,311,926 UART: [fwproc] Received command 0x46574c44
13,314,105 UART: [fwproc] Received Image of size 114036 bytes
17,369,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,927 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,829,187 >>> mbox cmd response: success
17,834,138 UART: [afmc] ++
17,834,737 UART: [afmc] CDI.KEYID = 6
17,835,644 UART: [afmc] SUBJECT.KEYID = 7
17,836,861 UART: [afmc] AUTHORITY.KEYID = 5
21,152,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,961 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,215 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,618 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,427 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,886 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,974 UART: [afmc] --
23,516,920 UART: [cold-reset] --
23,521,861 UART: [state] Locking Datavault
23,529,106 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,812 UART: [state] Locking ICCM
23,532,583 UART: [exit] Launching FMC @ 0x40000130
23,540,979 UART:
23,541,210 UART: Running Caliptra FMC ...
23,542,309 UART:
23,542,462 UART: [state] CFI Enabled
23,550,486 UART: [fht] FMC Alias Private Key: 7
25,881,536 UART: [art] Extend RT PCRs Done
25,882,750 UART: [art] Lock RT PCRs Done
25,884,229 UART: [art] Populate DV Done
25,889,703 UART: [fht] FMC Alias Private Key: 7
25,891,393 UART: [art] Derive CDI
25,892,213 UART: [art] Store in in slot 0x4
25,935,130 UART: [art] Derive Key Pair
25,936,121 UART: [art] Store priv key in slot 0x5
29,177,322 UART: [art] Derive Key Pair - Done
29,190,211 UART: [art] Signing Cert with AUTHO
29,191,521 UART: RITY.KEYID = 7
31,471,208 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,707 UART: [art] PUB.X = 76EC1CF3765DA85C69ECD15ADDAAAED8CA0F890B87EF334C2F3220462A58799DB51AF28BD49EC6E72FE2719DDE300632
31,479,969 UART: [art] PUB.Y = D95DB645C32C5159A9115D9F8D752507220F9B5C736FBEF967117C9A2BC182CA5A4955BBE2ECB775995AB2EF3B8F7433
31,487,207 UART: [art] SIG.R = 1507DA1D20035AAF2D261C8BA5BF05DDBCBE6B2ACEFF659A6DD3530CBC5C1937F85731E85346C6CDD326454B922F9602
31,494,660 UART: [art] SIG.S = 410C0E539456442487B86A5923A101094CAF61275462B9EC430487202C560CED4A4664FDF16C3A7F85D3438DD499AF00
32,799,670 UART: Caliptra RT
32,800,379 UART: [state] CFI Enabled
32,918,599 UART: [rt] RT listening for mailbox commands...
32,920,731 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,950,381 UART: [rt]cmd =0x50435252, len=8
32,952,335 >>> mbox cmd response data (8 bytes)
35,004,569 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,105,583 UART:
35,105,944 UART: Running Caliptra ROM ...
35,106,982 UART:
35,107,195 UART: [state] CFI Enabled
35,120,336 UART: [state] LifecycleState = Unprovisioned
35,122,272 UART: [state] DebugLocked = No
35,123,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,128,042 UART: [kat] SHA2-256
35,297,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,308,260 UART: [kat] ++
35,308,713 UART: [kat] sha1
35,319,705 UART: [kat] SHA2-256
35,322,406 UART: [kat] SHA2-384
35,328,175 UART: [kat] SHA2-512-ACC
35,330,568 UART: [kat] ECC-384
37,614,758 UART: [kat] HMAC-384Kdf
37,627,328 UART: [kat] LMS
38,817,395 UART: [kat] --
38,822,427 UART: [update-reset] ++
42,532,709 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,536,748 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,794,952 >>> mbox cmd response: success
42,795,335 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,796,019 UART: [update-reset] Copying MAN_2 To MAN_1
42,818,413 UART: [update-reset Success] --
42,820,920 UART: [state] Locking Datavault
42,824,985 UART: [state] Locking PCR0, PCR1 and PCR31
42,826,737 UART: [state] Locking ICCM
42,829,159 UART: [exit] Launching FMC @ 0x40000130
42,837,552 UART:
42,837,784 UART: Running Caliptra FMC ...
42,838,880 UART:
42,839,031 UART: [state] CFI Enabled
42,883,369 UART: [art] Extend RT PCRs Done
42,884,551 UART: [art] Lock RT PCRs Done
42,885,787 UART: [art] Populate DV Done
42,891,301 UART: [fht] FMC Alias Private Key: 7
42,892,873 UART: [art] Derive CDI
42,893,682 UART: [art] Store in in slot 0x4
42,936,154 UART: [art] Derive Key Pair
42,937,215 UART: [art] Store priv key in slot 0x5
46,179,469 UART: [art] Derive Key Pair - Done
46,192,618 UART: [art] Signing Cert with AUTHO
46,193,920 UART: RITY.KEYID = 7
48,473,145 UART: [art] Erasing AUTHORITY.KEYID = 7
48,474,656 UART: [art] PUB.X = 90FE738873B7AD2E0C48D484D46AEA43E853E5C58227F994B5B0F125D5766CA3290A712B6109082323A2DD26C4DCA173
48,481,894 UART: [art] PUB.Y = 1950B352B0DD2B0D504AA5A9A49CF3B7AE0BCD705623FF75357154594D48EB7FF739445C0AFE93E9A502E91FA4A319B6
48,489,115 UART: [art] SIG.R = E5C07468F17799ED0DE151E40842ACD30D9A5E1E37D98DFBDC029EA873E2ABE641582CB11D846ABA8CD2868A48E21600
48,496,505 UART: [art] SIG.S = F3D5F90734BE1F94679F5EA1CAF88494DA15CF8B8C21F21A83A4FD1502FAB0B832525417F8F948D1AB0E21E400F68CD5
49,801,429 UART: mbox::rt_entry...
49,802,390 UART: ____ _ _ _ ____ _____
49,804,374 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,806,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,808,298 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,810,424 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,812,382 UART: |_|
49,813,375 UART:
50,101,006 UART: [rt] Runtime listening for mailbox commands...
50,103,010 >>> mbox cmd response data (128 bytes)
52,151,973 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,251,913 UART:
52,252,281 UART: Running Caliptra ROM ...
52,253,512 UART:
52,253,681 UART: [state] CFI Enabled
52,267,114 UART: [state] LifecycleState = Unprovisioned
52,269,008 UART: [state] DebugLocked = No
52,271,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,276,879 UART: [kat] SHA2-256
52,446,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,457,132 UART: [kat] ++
52,457,645 UART: [kat] sha1
52,469,290 UART: [kat] SHA2-256
52,471,988 UART: [kat] SHA2-384
52,478,134 UART: [kat] SHA2-512-ACC
52,480,535 UART: [kat] ECC-384
54,764,027 UART: [kat] HMAC-384Kdf
54,775,243 UART: [kat] LMS
55,965,316 UART: [kat] --
55,971,472 UART: [update-reset] ++
59,680,396 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,683,748 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
59,941,969 >>> mbox cmd response: success
59,942,378 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
59,943,114 UART: [update-reset] Copying MAN_2 To MAN_1
59,965,494 UART: [update-reset Success] --
59,968,215 UART: [state] Locking Datavault
59,971,815 UART: [state] Locking PCR0, PCR1 and PCR31
59,973,579 UART: [state] Locking ICCM
59,975,970 UART: [exit] Launching FMC @ 0x40000130
59,984,362 UART:
59,984,593 UART: Running Caliptra FMC ...
59,985,695 UART:
59,985,846 UART: [state] CFI Enabled
60,030,288 UART: [art] Extend RT PCRs Done
60,031,433 UART: [art] Lock RT PCRs Done
60,032,768 UART: [art] Populate DV Done
60,038,223 UART: [fht] FMC Alias Private Key: 7
60,039,923 UART: [art] Derive CDI
60,040,740 UART: [art] Store in in slot 0x4
60,082,870 UART: [art] Derive Key Pair
60,083,917 UART: [art] Store priv key in slot 0x5
63,325,961 UART: [art] Derive Key Pair - Done
63,338,843 UART: [art] Signing Cert with AUTHO
63,340,176 UART: RITY.KEYID = 7
65,619,198 UART: [art] Erasing AUTHORITY.KEYID = 7
65,620,701 UART: [art] PUB.X = 2BFFB07B9E630FE2A76A20925BF3EAEC436D2B55A9EFB0073B90A75A2BFA91D82D4161B977F98E8E2910EDE41F5B3EFA
65,628,003 UART: [art] PUB.Y = 9587526A3FCC36D277BCE37407CF706C3FAB789E7EC9218E9BCAD7DEE0E59E2C371A139543E95A404E600D2BE062EA79
65,635,237 UART: [art] SIG.R = 175D7E78021D5EBF9CCFFC150BA039B21C7A53FCD094C6E8BE324E08D49A820D2B3B667E2483F277C3571D85FD83E966
65,642,619 UART: [art] SIG.S = 4C9B38BEC9BADF2A3DDDE8D696BC16B06B1815DCBA6F2EA8C099F9D84AA50BB25317C758EE20A897BB31EB2CC3FE3ABB
66,947,731 UART: mbox::rt_entry...
66,948,688 UART: ____ _ _ _ ____ _____
66,950,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,952,621 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,954,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,956,471 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,958,425 UART: |_|
66,959,264 UART:
67,244,721 UART: [rt] Runtime listening for mailbox commands...
67,246,740 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,147 writing to cptra_bootfsm_go
4,124,273 ready_for_fw is high
4,124,649 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,906 >>> mbox cmd response: success
23,712,821 UART:
23,713,217 UART: Running Caliptra FMC ...
23,714,325 UART:
23,714,474 UART: [state] CFI Enabled
23,722,377 UART: [fht] FMC Alias Private Key: 7
26,053,188 UART: [art] Extend RT PCRs Done
26,054,418 UART: [art] Lock RT PCRs Done
26,055,967 UART: [art] Populate DV Done
26,061,338 UART: [fht] FMC Alias Private Key: 7
26,062,833 UART: [art] Derive CDI
26,063,603 UART: [art] Store in in slot 0x4
26,106,005 UART: [art] Derive Key Pair
26,107,061 UART: [art] Store priv key in slot 0x5
29,349,473 UART: [art] Derive Key Pair - Done
29,362,142 UART: [art] Signing Cert with AUTHO
29,363,488 UART: RITY.KEYID = 7
31,642,829 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,334 UART: [art] PUB.X = 4FE2ECC26C3159871DB4889A611046D40C6198315794A65622B162911AAC4702A5E6F1435DAE287E9C85D51A4DC641C7
31,651,555 UART: [art] PUB.Y = FCCEE10403C819EF9D375E6752DE0758C08707A9B3073AFB49409BCF05FEC800F16857595221AD39D0864F1325441D68
31,658,802 UART: [art] SIG.R = FAC00184ABC77DF4CFB3F0984AF4180CA440ED03D799A02C75AB14D4B2D3FDB7AEE6CB54A01DD600F91B229D816739A8
31,666,166 UART: [art] SIG.S = BD32505A089488ECED1706B4CF9677FDD796CFC5AEA0D7F1645C4ED78B471BD797AC881E9FF41F483B8FEABB614982A8
32,971,490 UART: Caliptra RT
32,972,212 UART: [state] CFI Enabled
33,090,620 UART: [rt] RT listening for mailbox commands...
33,093,008 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,122,825 UART: [rt]cmd =0x50435252, len=8
33,125,154 >>> mbox cmd response data (8 bytes)
35,177,531 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,073,145 >>> mbox cmd response: success
43,073,608 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,109,063 UART:
43,109,357 UART: Running Caliptra FMC ...
43,110,385 UART:
43,110,530 UART: [state] CFI Enabled
43,155,153 UART: [art] Extend RT PCRs Done
43,156,346 UART: [art] Lock RT PCRs Done
43,158,014 UART: [art] Populate DV Done
43,163,543 UART: [fht] FMC Alias Private Key: 7
43,165,080 UART: [art] Derive CDI
43,165,814 UART: [art] Store in in slot 0x4
43,208,468 UART: [art] Derive Key Pair
43,209,511 UART: [art] Store priv key in slot 0x5
46,451,901 UART: [art] Derive Key Pair - Done
46,464,968 UART: [art] Signing Cert with AUTHO
46,466,279 UART: RITY.KEYID = 7
48,745,573 UART: [art] Erasing AUTHORITY.KEYID = 7
48,747,080 UART: [art] PUB.X = B00B3E5E948C5F1F115541F8B72FB510E92E1612013540829C613F35481217795CCECE93FD6F42F5E904B9AB32CB9E92
48,754,348 UART: [art] PUB.Y = 4D96D9C8AD1B7449B8C78F843A9C10FC350B84F30C15FA95272DD0EA843BDF2333DEE404546FC208485832EE99992739
48,761,551 UART: [art] SIG.R = B8743E0D9972BF23FBC3306DCB7ED649777F7C2F37E3CD39874C38599C2480EBE3D6DEE7DD0B6CF4F22E6A75AAF6B7C1
48,768,988 UART: [art] SIG.S = C8A3C6085907BA806E783576B4FCD6050D564A3715C596D8792B1DC6723B2EE397B8738FB4B9AE4E6547E31EECF18931
50,073,654 UART: mbox::rt_entry...
50,074,609 UART: ____ _ _ _ ____ _____
50,076,513 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,078,521 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,080,562 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,082,572 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,084,437 UART: |_|
50,085,332 UART:
50,368,116 UART: [rt] Runtime listening for mailbox commands...
50,370,202 >>> mbox cmd response data (128 bytes)
52,420,175 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
60,314,972 >>> mbox cmd response: success
60,315,484 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,350,942 UART:
60,351,267 UART: Running Caliptra FMC ...
60,352,391 UART:
60,352,556 UART: [state] CFI Enabled
60,396,794 UART: [art] Extend RT PCRs Done
60,397,933 UART: [art] Lock RT PCRs Done
60,399,544 UART: [art] Populate DV Done
60,405,211 UART: [fht] FMC Alias Private Key: 7
60,406,729 UART: [art] Derive CDI
60,407,498 UART: [art] Store in in slot 0x4
60,449,930 UART: [art] Derive Key Pair
60,450,926 UART: [art] Store priv key in slot 0x5
63,693,388 UART: [art] Derive Key Pair - Done
63,706,441 UART: [art] Signing Cert with AUTHO
63,707,752 UART: RITY.KEYID = 7
65,986,827 UART: [art] Erasing AUTHORITY.KEYID = 7
65,988,333 UART: [art] PUB.X = A84EFF51EFAFC0C55F733ACF5B2D7805C59326D2A2939727201F87E9E04ED86567E86FE2DE501F55DAAFC7807F3034E2
65,995,600 UART: [art] PUB.Y = 29352AF2944B082ED8280B7207C18F6D3D1CF74A78085074E0F0C167238AF4364BB32280E15412B82783192BA97ABF25
66,002,848 UART: [art] SIG.R = B08ADE6F0AC70743E03729DF41FA68D4F798F08A1C39878D3C74D0E50B77A072A3D8F2C6199D931D63E014A8D69A516B
66,010,176 UART: [art] SIG.S = FBCFDD48654F34C9146F0D5360449DD4A434F4A05A01C91FDC5624A7387EAC2235AE529250FCD8A865F7EBA3FD9581A8
67,315,019 UART: mbox::rt_entry...
67,315,976 UART: ____ _ _ _ ____ _____
67,317,873 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,319,878 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,321,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,323,709 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,325,586 UART: |_|
67,326,414 UART:
67,614,962 UART: [rt] Runtime listening for mailbox commands...
67,616,991 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
192,667 UART:
193,032 UART: Running Caliptra ROM ...
194,191 UART:
194,339 UART: [state] CFI Enabled
264,164 UART: [state] LifecycleState = Unprovisioned
266,009 UART: [state] DebugLocked = No
267,981 UART: [state] WD Timer not started. Device not locked for debugging
272,513 UART: [kat] SHA2-256
451,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,231 UART: [kat] ++
463,768 UART: [kat] sha1
475,079 UART: [kat] SHA2-256
478,083 UART: [kat] SHA2-384
484,151 UART: [kat] SHA2-512-ACC
487,086 UART: [kat] ECC-384
2,947,836 UART: [kat] HMAC-384Kdf
2,972,259 UART: [kat] LMS
3,501,711 UART: [kat] --
3,505,375 UART: [cold-reset] ++
3,506,670 UART: [fht] FHT @ 0x50003400
3,516,159 UART: [idev] ++
3,516,725 UART: [idev] CDI.KEYID = 6
3,517,636 UART: [idev] SUBJECT.KEYID = 7
3,518,881 UART: [idev] UDS.KEYID = 0
3,519,805 ready_for_fw is high
3,519,995 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,823 UART: [idev] Erasing UDS.KEYID = 0
6,029,769 UART: [idev] Sha1 KeyId Algorithm
6,052,614 UART: [idev] --
6,056,289 UART: [ldev] ++
6,056,867 UART: [ldev] CDI.KEYID = 6
6,057,783 UART: [ldev] SUBJECT.KEYID = 5
6,058,962 UART: [ldev] AUTHORITY.KEYID = 7
6,060,200 UART: [ldev] FE.KEYID = 1
6,099,691 UART: [ldev] Erasing FE.KEYID = 1
8,600,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,367 UART: [ldev] --
10,390,389 UART: [fwproc] Wait for Commands...
10,393,573 UART: [fwproc] Recv command 0x46574c44
10,395,668 UART: [fwproc] Recv'd Img size: 114360 bytes
13,805,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,265,385 >>> mbox cmd response: success
14,269,331 UART: [afmc] ++
14,269,934 UART: [afmc] CDI.KEYID = 6
14,270,864 UART: [afmc] SUBJECT.KEYID = 7
14,272,024 UART: [afmc] AUTHORITY.KEYID = 5
16,808,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,384 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,063 UART: [afmc] --
18,609,264 UART: [cold-reset] --
18,613,021 UART: [state] Locking Datavault
18,619,023 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,685 UART: [state] Locking ICCM
18,622,864 UART: [exit] Launching FMC @ 0x40000130
18,631,285 UART:
18,631,527 UART: Running Caliptra FMC ...
18,632,637 UART:
18,632,801 UART: [state] CFI Enabled
18,691,439 UART: [fht] FMC Alias Private Key: 7
20,455,643 UART: [art] Extend RT PCRs Done
20,456,868 UART: [art] Lock RT PCRs Done
20,458,545 UART: [art] Populate DV Done
20,463,900 UART: [fht] FMC Alias Private Key: 7
20,465,437 UART: [art] Derive CDI
20,466,199 UART: [art] Store in in slot 0x4
20,524,149 UART: [art] Derive Key Pair
20,525,197 UART: [art] Store priv key in slot 0x5
22,987,716 UART: [art] Derive Key Pair - Done
23,000,764 UART: [art] Signing Cert with AUTHO
23,002,071 UART: RITY.KEYID = 7
24,713,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,043 UART: [art] PUB.X = 8CA11786E46209D0762A88335E96EE7ACB6F45E93BD24E6E66B2D7B17FF1F99C14AC201DAC1799C566394F89EB4EF32C
24,722,321 UART: [art] PUB.Y = AD689AB2C23ED339FB2AFAF163BFAA2B0E0416E3D83051E37F104D1E23A9ED6CBBF3D3B583F5AB1624DAEF54107E6B01
24,729,608 UART: [art] SIG.R = 1046C4810879158E97DC999BB050D1D489A846F66FB3987EBD6CF1446C3A843BBB3179A4C8A2FFDF52D0DD6D813A97DA
24,736,993 UART: [art] SIG.S = DD41974FF79248B3838148D632B3F59BB565419F515FFEF1D71738A1F4E03FE94B8DE7E08C4D55AF0742BEE41E8C1722
25,716,618 UART: Caliptra RT
25,717,312 UART: [state] CFI Enabled
25,882,766 UART: [rt] RT listening for mailbox commands...
25,885,067 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,914,823 UART: [rt]cmd =0x50435252, len=8
25,917,063 >>> mbox cmd response data (8 bytes)
27,971,280 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,071,632 UART:
28,071,993 UART: Running Caliptra ROM ...
28,073,085 UART:
28,073,255 UART: [state] CFI Enabled
28,145,350 UART: [state] LifecycleState = Unprovisioned
28,147,262 UART: [state] DebugLocked = No
28,149,193 UART: [state] WD Timer not started. Device not locked for debugging
28,152,345 UART: [kat] SHA2-256
28,331,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,343,068 UART: [kat] ++
28,343,618 UART: [kat] sha1
28,355,812 UART: [kat] SHA2-256
28,358,839 UART: [kat] SHA2-384
28,364,938 UART: [kat] SHA2-512-ACC
28,367,879 UART: [kat] ECC-384
30,828,684 UART: [kat] HMAC-384Kdf
30,853,142 UART: [kat] LMS
31,382,612 UART: [kat] --
31,388,059 UART: [update-reset] ++
34,381,767 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,384,772 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
34,642,686 >>> mbox cmd response: success
34,643,058 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,643,343 UART: [update-reset] Copying MAN_2 To MAN_1
34,665,581 UART: [update-reset Success] --
34,670,502 UART: [state] Locking Datavault
34,674,035 UART: [state] Locking PCR0, PCR1 and PCR31
34,675,690 UART: [state] Locking ICCM
34,677,897 UART: [exit] Launching FMC @ 0x40000130
34,686,295 UART:
34,686,537 UART: Running Caliptra FMC ...
34,687,640 UART:
34,687,820 UART: [state] CFI Enabled
34,787,779 UART: [art] Extend RT PCRs Done
34,788,978 UART: [art] Lock RT PCRs Done
34,790,439 UART: [art] Populate DV Done
34,795,902 UART: [fht] FMC Alias Private Key: 7
34,797,601 UART: [art] Derive CDI
34,798,415 UART: [art] Store in in slot 0x4
34,857,213 UART: [art] Derive Key Pair
34,858,250 UART: [art] Store priv key in slot 0x5
37,321,012 UART: [art] Derive Key Pair - Done
37,334,005 UART: [art] Signing Cert with AUTHO
37,335,315 UART: RITY.KEYID = 7
39,046,125 UART: [art] Erasing AUTHORITY.KEYID = 7
39,047,641 UART: [art] PUB.X = 8347CCB2A99E473288EC49AFFE688CC81F9B2180FF13E8383371C5C1C76F71817E6797005DA762A44AB8A647C0A60BF3
39,054,857 UART: [art] PUB.Y = 87597EE444563B35F15DB004D764C9A7549CDFC7954686E78FCB374661DC80FE3DAA5C7F463CBA840893667F0E1CA804
39,062,090 UART: [art] SIG.R = 7580735EAD3FE711ECC35D99B8BA44F1E40F3E3DAA4724C6F4D9C3A9B7B164A98D5741F6D2A85E55BFCD3C2F04446BBE
39,069,563 UART: [art] SIG.S = 81D95387C551F7FB517B3235CF19FC5E397EBE9797EE3DE99C8971ECB4147ED1BA602F7B795405EF037A215210BD7E19
40,048,495 UART: mbox::rt_entry...
40,049,452 UART: ____ _ _ _ ____ _____
40,051,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,053,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,055,253 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,057,183 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,059,065 UART: |_|
40,059,959 UART:
40,345,702 UART: [rt] Runtime listening for mailbox commands...
40,347,705 >>> mbox cmd response data (128 bytes)
42,397,735 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,497,750 UART:
42,498,111 UART: Running Caliptra ROM ...
42,499,163 UART:
42,499,313 UART: [state] CFI Enabled
42,559,831 UART: [state] LifecycleState = Unprovisioned
42,561,731 UART: [state] DebugLocked = No
42,563,899 UART: [state] WD Timer not started. Device not locked for debugging
42,567,582 UART: [kat] SHA2-256
42,746,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,758,267 UART: [kat] ++
42,758,728 UART: [kat] sha1
42,769,341 UART: [kat] SHA2-256
42,772,354 UART: [kat] SHA2-384
42,778,670 UART: [kat] SHA2-512-ACC
42,781,570 UART: [kat] ECC-384
45,244,183 UART: [kat] HMAC-384Kdf
45,269,123 UART: [kat] LMS
45,798,589 UART: [kat] --
45,802,465 UART: [update-reset] ++
48,795,765 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,799,258 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,057,213 >>> mbox cmd response: success
49,057,619 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,057,904 UART: [update-reset] Copying MAN_2 To MAN_1
49,079,798 UART: [update-reset Success] --
49,083,665 UART: [state] Locking Datavault
49,086,870 UART: [state] Locking PCR0, PCR1 and PCR31
49,088,578 UART: [state] Locking ICCM
49,090,572 UART: [exit] Launching FMC @ 0x40000130
49,099,033 UART:
49,099,278 UART: Running Caliptra FMC ...
49,100,385 UART:
49,100,562 UART: [state] CFI Enabled
49,204,862 UART: [art] Extend RT PCRs Done
49,206,052 UART: [art] Lock RT PCRs Done
49,207,729 UART: [art] Populate DV Done
49,213,060 UART: [fht] FMC Alias Private Key: 7
49,214,610 UART: [art] Derive CDI
49,215,430 UART: [art] Store in in slot 0x4
49,273,634 UART: [art] Derive Key Pair
49,274,633 UART: [art] Store priv key in slot 0x5
51,738,055 UART: [art] Derive Key Pair - Done
51,750,848 UART: [art] Signing Cert with AUTHO
51,752,150 UART: RITY.KEYID = 7
53,463,361 UART: [art] Erasing AUTHORITY.KEYID = 7
53,464,862 UART: [art] PUB.X = C344FBF3FE2DEDB8991236825C4497C45F9DB225924BFA795F34B2D3ADEA98D2780C90D0F844A351FFD3F5A3017684A1
53,472,158 UART: [art] PUB.Y = 1D830A4A0D87C0ACA92D8B40E3B3FA0EF7710403E286AB70939E43E8FFE59D954455CE6BC44EF4236790025BFB9BB1FC
53,479,437 UART: [art] SIG.R = 7217791E09D6F9210E4257131D32CB5D7C7AD52FB9DA89D0AB2ACA239E48E6E36E300ABAEBC00866EAAEEB427AC6A028
53,486,893 UART: [art] SIG.S = 1A15A0BA35360B70AFF6E34C63C05F0AD7AF79C9E7A70D93583280839FA17D338BE2EB2AAF737F8429DE4CF98DA00E78
54,465,376 UART: mbox::rt_entry...
54,466,315 UART: ____ _ _ _ ____ _____
54,468,408 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,470,413 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,472,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,474,197 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,476,069 UART: |_|
54,476,956 UART:
54,761,749 UART: [rt] Runtime listening for mailbox commands...
54,763,764 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,577 UART:
192,944 UART: Running Caliptra ROM ...
194,167 UART:
194,332 UART: [state] CFI Enabled
264,096 UART: [state] LifecycleState = Unprovisioned
266,440 UART: [state] DebugLocked = No
269,047 UART: [state] WD Timer not started. Device not locked for debugging
273,657 UART: [kat] SHA2-256
463,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,342 UART: [kat] ++
474,828 UART: [kat] sha1
487,336 UART: [kat] SHA2-256
490,347 UART: [kat] SHA2-384
496,693 UART: [kat] SHA2-512-ACC
499,275 UART: [kat] ECC-384
2,949,186 UART: [kat] HMAC-384Kdf
2,972,714 UART: [kat] LMS
3,504,448 UART: [kat] --
3,508,815 UART: [cold-reset] ++
3,510,111 UART: [fht] FHT @ 0x50003400
3,522,013 UART: [idev] ++
3,522,724 UART: [idev] CDI.KEYID = 6
3,523,756 UART: [idev] SUBJECT.KEYID = 7
3,524,858 UART: [idev] UDS.KEYID = 0
3,525,784 ready_for_fw is high
3,525,971 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,790 UART: [idev] Erasing UDS.KEYID = 0
6,028,379 UART: [idev] Sha1 KeyId Algorithm
6,051,382 UART: [idev] --
6,055,677 UART: [ldev] ++
6,056,370 UART: [ldev] CDI.KEYID = 6
6,057,284 UART: [ldev] SUBJECT.KEYID = 5
6,058,448 UART: [ldev] AUTHORITY.KEYID = 7
6,059,685 UART: [ldev] FE.KEYID = 1
6,099,686 UART: [ldev] Erasing FE.KEYID = 1
8,605,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,161 UART: [ldev] --
10,414,829 UART: [fwproc] Wait for Commands...
10,417,200 UART: [fwproc] Recv command 0x46574c44
10,419,512 UART: [fwproc] Recv'd Img size: 114360 bytes
13,857,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,593,296 >>> mbox cmd response: success
14,597,513 UART: [afmc] ++
14,598,218 UART: [afmc] CDI.KEYID = 6
14,599,426 UART: [afmc] SUBJECT.KEYID = 7
14,600,867 UART: [afmc] AUTHORITY.KEYID = 5
17,129,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,233 UART: [afmc] --
18,945,672 UART: [cold-reset] --
18,949,918 UART: [state] Locking Datavault
18,956,469 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,615 UART: [state] Locking ICCM
18,960,172 UART: [exit] Launching FMC @ 0x40000130
18,968,854 UART:
18,969,097 UART: Running Caliptra FMC ...
18,970,222 UART:
18,970,386 UART: [state] CFI Enabled
19,029,611 UART: [fht] FMC Alias Private Key: 7
20,793,761 UART: [art] Extend RT PCRs Done
20,794,978 UART: [art] Lock RT PCRs Done
20,796,767 UART: [art] Populate DV Done
20,802,284 UART: [fht] FMC Alias Private Key: 7
20,803,768 UART: [art] Derive CDI
20,804,529 UART: [art] Store in in slot 0x4
20,862,318 UART: [art] Derive Key Pair
20,863,359 UART: [art] Store priv key in slot 0x5
23,326,211 UART: [art] Derive Key Pair - Done
23,339,246 UART: [art] Signing Cert with AUTHO
23,340,595 UART: RITY.KEYID = 7
25,052,152 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,651 UART: [art] PUB.X = C6AC589EDBE2E15BA2644426E2975C255365CB24020246E872C41F1CAEE628559E7E1A47F040FEC7D541A8D5B40630E8
25,060,952 UART: [art] PUB.Y = 12832025F2C5EC5FA7AE08CA74D8D66E0D5F7C155F8B9E6DDE63649FBF0F3097E5049265CE963775F7299E981D3CB058
25,068,223 UART: [art] SIG.R = A4153F4F8C278B6FA5B0FA43CB09420A25834EE1BF080DBB2D805C08179EFA96D13A1CA395B0F6DE0E92ACB5758D53D4
25,075,638 UART: [art] SIG.S = 88A5CBFEB517E20FB5CD9B74D7786DD88C485D7EB9D98E62D453C7F56B6C037A9BD100D322F34B3B4C8D282384E4F88D
26,053,744 UART: Caliptra RT
26,054,454 UART: [state] CFI Enabled
26,220,684 UART: [rt] RT listening for mailbox commands...
26,222,911 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,252,688 UART: [rt]cmd =0x50435252, len=8
26,254,449 >>> mbox cmd response data (8 bytes)
28,305,217 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,405,882 UART:
28,406,304 UART: Running Caliptra ROM ...
28,407,377 UART:
28,407,534 UART: [state] CFI Enabled
28,469,645 UART: [state] LifecycleState = Unprovisioned
28,471,748 UART: [state] DebugLocked = No
28,473,544 UART: [state] WD Timer not started. Device not locked for debugging
28,478,220 UART: [kat] SHA2-256
28,668,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,678,874 UART: [kat] ++
28,679,420 UART: [kat] sha1
28,691,962 UART: [kat] SHA2-256
28,694,963 UART: [kat] SHA2-384
28,700,098 UART: [kat] SHA2-512-ACC
28,702,682 UART: [kat] ECC-384
31,148,107 UART: [kat] HMAC-384Kdf
31,174,440 UART: [kat] LMS
31,705,990 UART: [kat] --
31,709,202 UART: [update-reset] ++
34,726,778 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,729,621 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,123,026 >>> mbox cmd response: success
35,123,456 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,123,739 UART: [update-reset] Copying MAN_2 To MAN_1
35,161,308 UART: [update-reset Success] --
35,167,487 UART: [state] Locking Datavault
35,171,618 UART: [state] Locking PCR0, PCR1 and PCR31
35,173,852 UART: [state] Locking ICCM
35,176,744 UART: [exit] Launching FMC @ 0x40000130
35,185,416 UART:
35,185,654 UART: Running Caliptra FMC ...
35,186,681 UART:
35,186,827 UART: [state] CFI Enabled
35,280,520 UART: [art] Extend RT PCRs Done
35,281,722 UART: [art] Lock RT PCRs Done
35,283,260 UART: [art] Populate DV Done
35,288,831 UART: [fht] FMC Alias Private Key: 7
35,290,419 UART: [art] Derive CDI
35,291,159 UART: [art] Store in in slot 0x4
35,349,038 UART: [art] Derive Key Pair
35,350,075 UART: [art] Store priv key in slot 0x5
37,813,040 UART: [art] Derive Key Pair - Done
37,825,983 UART: [art] Signing Cert with AUTHO
37,827,287 UART: RITY.KEYID = 7
39,538,501 UART: [art] Erasing AUTHORITY.KEYID = 7
39,540,003 UART: [art] PUB.X = 3E0EE82A2BD6B3873056E9A1CF4977769EB549F3900AE464770DFBA6CCB5436E4665E457A8C709EB5A3638A63B95218A
39,547,251 UART: [art] PUB.Y = 28EC3C10D8BFE69B2E34C239DB94B74D249EF9693EF2C0557DD3C07D12B0EDFF692010B136C56E9020EAEE90DBCDBA25
39,554,569 UART: [art] SIG.R = 0ABD9322D11C8CA11CEFC93E0B97D77950CD8D465980365AA1ED327A13C20D2EBDC48C68F1E15C8419400D23745FC8C3
39,561,948 UART: [art] SIG.S = 030A47915545D6DCFB4555DC9730F5ADD3CB48C4EFE2872DBC352F5F17DFDA0331D7F40ABB404E400FC167412DF64DAF
40,540,612 UART: mbox::rt_entry...
40,541,591 UART: ____ _ _ _ ____ _____
40,543,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,545,537 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,547,473 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,549,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,551,331 UART: |_|
40,552,163 UART:
40,838,055 UART: [rt] Runtime listening for mailbox commands...
40,840,062 >>> mbox cmd response data (128 bytes)
42,890,653 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,990,492 UART:
42,990,872 UART: Running Caliptra ROM ...
42,991,948 UART:
42,992,102 UART: [state] CFI Enabled
43,057,742 UART: [state] LifecycleState = Unprovisioned
43,059,794 UART: [state] DebugLocked = No
43,062,083 UART: [state] WD Timer not started. Device not locked for debugging
43,067,530 UART: [kat] SHA2-256
43,257,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,268,158 UART: [kat] ++
43,268,614 UART: [kat] sha1
43,279,826 UART: [kat] SHA2-256
43,282,793 UART: [kat] SHA2-384
43,288,353 UART: [kat] SHA2-512-ACC
43,290,977 UART: [kat] ECC-384
45,739,333 UART: [kat] HMAC-384Kdf
45,763,379 UART: [kat] LMS
46,294,947 UART: [kat] --
46,298,909 UART: [update-reset] ++
49,314,321 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,317,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,710,680 >>> mbox cmd response: success
49,711,094 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,711,386 UART: [update-reset] Copying MAN_2 To MAN_1
49,748,724 UART: [update-reset Success] --
49,753,171 UART: [state] Locking Datavault
49,755,793 UART: [state] Locking PCR0, PCR1 and PCR31
49,757,937 UART: [state] Locking ICCM
49,759,659 UART: [exit] Launching FMC @ 0x40000130
49,768,283 UART:
49,768,519 UART: Running Caliptra FMC ...
49,769,620 UART:
49,769,776 UART: [state] CFI Enabled
49,870,443 UART: [art] Extend RT PCRs Done
49,871,641 UART: [art] Lock RT PCRs Done
49,873,043 UART: [art] Populate DV Done
49,878,664 UART: [fht] FMC Alias Private Key: 7
49,880,195 UART: [art] Derive CDI
49,880,953 UART: [art] Store in in slot 0x4
49,939,896 UART: [art] Derive Key Pair
49,940,929 UART: [art] Store priv key in slot 0x5
52,404,147 UART: [art] Derive Key Pair - Done
52,416,993 UART: [art] Signing Cert with AUTHO
52,418,304 UART: RITY.KEYID = 7
54,129,969 UART: [art] Erasing AUTHORITY.KEYID = 7
54,131,618 UART: [art] PUB.X = B2CFEE4218191D293937C5ABC044F636F901054F329F827D1F9CDABE5E74CD9BB4ABCDD6B9475AB801FC07031C0A4974
54,138,777 UART: [art] PUB.Y = 9034F8682D69B2271C5CEA04B073D2D27FF574D5DE2C717838F5CDBA71B26FBE9AC85315F127CBE35F98DD01059597D3
54,145,995 UART: [art] SIG.R = A485DC78887F72484561B9EB5230D4C6784DB1CC07F9BAAFCCA43176AE438DF7597D13D926FD4073198B30683B9D0B68
54,153,378 UART: [art] SIG.S = E4BA59E5DA0E0EB3E50946C888A516FC0AD1BB3C7E47FFCA81039BF695F1075CBC6E8BCAA0B82BEADC8CB236590C88FB
55,131,622 UART: mbox::rt_entry...
55,132,609 UART: ____ _ _ _ ____ _____
55,134,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,136,607 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,138,538 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,140,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,142,395 UART: |_|
55,143,205 UART:
55,427,001 UART: [rt] Runtime listening for mailbox commands...
55,429,012 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,440,258 ready_for_fw is high
3,440,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,746,403 >>> mbox cmd response: success
19,030,229 UART:
19,030,652 UART: Running Caliptra FMC ...
19,031,822 UART:
19,031,991 UART: [state] CFI Enabled
19,098,332 UART: [fht] FMC Alias Private Key: 7
20,862,249 UART: [art] Extend RT PCRs Done
20,863,474 UART: [art] Lock RT PCRs Done
20,865,047 UART: [art] Populate DV Done
20,870,581 UART: [fht] FMC Alias Private Key: 7
20,872,126 UART: [art] Derive CDI
20,872,943 UART: [art] Store in in slot 0x4
20,930,537 UART: [art] Derive Key Pair
20,931,578 UART: [art] Store priv key in slot 0x5
23,394,818 UART: [art] Derive Key Pair - Done
23,407,922 UART: [art] Signing Cert with AUTHO
23,409,225 UART: RITY.KEYID = 7
25,120,164 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,673 UART: [art] PUB.X = CC13998DA88D717E30308A3B231F25B0DD33114A1A5B3BBE450033458AEE65BB551926F42959AF9F446FE0D51D271DAB
25,128,996 UART: [art] PUB.Y = C4C13676643BFC5184AFE4A913C57EF941EC8CC1778AD25679EDCDA78B533B0EB680BA240F8D8677EA85BB08BB1E7FB9
25,136,226 UART: [art] SIG.R = A1F5FC906C98255B2898DF1928A7A6A53EAF80ED7C25B46AAFFDC72E7B435AE904140982EB49A34B4A901A79D2EFF284
25,143,655 UART: [art] SIG.S = 20E2F480971735CB266A985114259F567BE34771FB59749BF48F9CA3734EA9ABF9DF2AD38F320A9ADF4742982D4B8C12
26,122,563 UART: Caliptra RT
26,123,253 UART: [state] CFI Enabled
26,287,120 UART: [rt] RT listening for mailbox commands...
26,289,501 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,319,224 UART: [rt]cmd =0x50435252, len=8
26,321,520 >>> mbox cmd response data (8 bytes)
28,374,020 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,390,865 >>> mbox cmd response: success
35,391,348 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,425,685 UART:
35,425,981 UART: Running Caliptra FMC ...
35,427,017 UART:
35,427,168 UART: [state] CFI Enabled
35,534,145 UART: [art] Extend RT PCRs Done
35,535,344 UART: [art] Lock RT PCRs Done
35,536,607 UART: [art] Populate DV Done
35,541,974 UART: [fht] FMC Alias Private Key: 7
35,543,677 UART: [art] Derive CDI
35,544,415 UART: [art] Store in in slot 0x4
35,603,430 UART: [art] Derive Key Pair
35,604,433 UART: [art] Store priv key in slot 0x5
38,068,051 UART: [art] Derive Key Pair - Done
38,080,844 UART: [art] Signing Cert with AUTHO
38,082,158 UART: RITY.KEYID = 7
39,793,417 UART: [art] Erasing AUTHORITY.KEYID = 7
39,794,940 UART: [art] PUB.X = CEFC9E83AC2B86662518AC601B1675B097C0B2BE71EF51847B7492E0DC09C9CA9CB9FAEAA307CB2EA952F5C79E15FAB1
39,802,238 UART: [art] PUB.Y = 4109C17790D3FEA3E4E8656B832F3754163C18B6B27D9D44F0820B6D124B8045775C43804807C48B221E1D355AE1315E
39,809,461 UART: [art] SIG.R = 65503C6F4906A886FE81F0CDAE5B7CFFEE2426FD849ACD40BC18F510E9337F9E59D915ABFBD3DBA07FA6F9B46C890408
39,816,852 UART: [art] SIG.S = 56FA319ACC9AC82259562863B7C2EC328421AAAC8B90D657D3ACF32041DF3627B39989818858D64D0E091D0D22EF4136
40,795,672 UART: mbox::rt_entry...
40,796,608 UART: ____ _ _ _ ____ _____
40,798,591 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,800,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,802,534 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,804,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,806,397 UART: |_|
40,807,205 UART:
41,094,173 UART: [rt] Runtime listening for mailbox commands...
41,096,225 >>> mbox cmd response data (128 bytes)
43,148,965 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
50,148,893 >>> mbox cmd response: success
50,149,398 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,184,098 UART:
50,184,432 UART: Running Caliptra FMC ...
50,185,557 UART:
50,185,722 UART: [state] CFI Enabled
50,276,363 UART: [art] Extend RT PCRs Done
50,277,547 UART: [art] Lock RT PCRs Done
50,278,679 UART: [art] Populate DV Done
50,284,037 UART: [fht] FMC Alias Private Key: 7
50,285,585 UART: [art] Derive CDI
50,286,404 UART: [art] Store in in slot 0x4
50,344,727 UART: [art] Derive Key Pair
50,345,784 UART: [art] Store priv key in slot 0x5
52,809,274 UART: [art] Derive Key Pair - Done
52,822,165 UART: [art] Signing Cert with AUTHO
52,823,470 UART: RITY.KEYID = 7
54,534,520 UART: [art] Erasing AUTHORITY.KEYID = 7
54,536,021 UART: [art] PUB.X = 29FC15A7D2D6AE4F763945314ED1A7BE4505AB0960FF154AEF89CBEE846987700CDEE7CAFB221C9FDFCA5980C44499D7
54,543,325 UART: [art] PUB.Y = 7BC86C89ECD5B22FFB4D27E4CC22D6B8CE08CEEF38C55CCC13B0DBF561CB1EA30D640BB02BFD63DA9CC8671611F27B26
54,550,603 UART: [art] SIG.R = 4E552DB72503B61F6D3640D607204E0EA6ED761AFC7B82E3AC3448B133CA3230AEB7A1A5ED3D9E6AE49FFAE8B7531CE1
54,557,985 UART: [art] SIG.S = 45618A6B043DBE23F4B0A825253B840D6F8766F474B4C1EC6F59DFC278E7CCCB51050D5DDEB3D5560B163AC019D8242D
55,535,943 UART: mbox::rt_entry...
55,536,892 UART: ____ _ _ _ ____ _____
55,538,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,540,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,542,813 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,544,743 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,546,672 UART: |_|
55,547,672 UART:
55,834,023 UART: [rt] Runtime listening for mailbox commands...
55,836,026 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,468 UART:
192,825 UART: Running Caliptra ROM ...
194,012 UART:
603,540 UART: [state] CFI Enabled
620,823 UART: [state] LifecycleState = Unprovisioned
623,197 UART: [state] DebugLocked = No
625,252 UART: [state] WD Timer not started. Device not locked for debugging
629,262 UART: [kat] SHA2-256
819,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,903 UART: [kat] ++
830,508 UART: [kat] sha1
841,816 UART: [kat] SHA2-256
844,895 UART: [kat] SHA2-384
849,397 UART: [kat] SHA2-512-ACC
851,972 UART: [kat] ECC-384
3,295,400 UART: [kat] HMAC-384Kdf
3,308,665 UART: [kat] LMS
3,840,484 UART: [kat] --
3,846,535 UART: [cold-reset] ++
3,848,320 UART: [fht] FHT @ 0x50003400
3,860,361 UART: [idev] ++
3,861,070 UART: [idev] CDI.KEYID = 6
3,861,954 UART: [idev] SUBJECT.KEYID = 7
3,863,196 UART: [idev] UDS.KEYID = 0
3,864,098 ready_for_fw is high
3,864,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,510 UART: [idev] Erasing UDS.KEYID = 0
6,345,049 UART: [idev] Sha1 KeyId Algorithm
6,368,332 UART: [idev] --
6,372,428 UART: [ldev] ++
6,373,107 UART: [ldev] CDI.KEYID = 6
6,373,987 UART: [ldev] SUBJECT.KEYID = 5
6,375,194 UART: [ldev] AUTHORITY.KEYID = 7
6,376,425 UART: [ldev] FE.KEYID = 1
6,387,803 UART: [ldev] Erasing FE.KEYID = 1
8,870,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,654,506 UART: [ldev] --
10,660,170 UART: [fwproc] Wait for Commands...
10,662,050 UART: [fwproc] Recv command 0x46574c44
10,664,358 UART: [fwproc] Recv'd Img size: 114360 bytes
14,117,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,198,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,314,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,856,687 >>> mbox cmd response: success
14,860,805 UART: [afmc] ++
14,861,515 UART: [afmc] CDI.KEYID = 6
14,862,748 UART: [afmc] SUBJECT.KEYID = 7
14,864,180 UART: [afmc] AUTHORITY.KEYID = 5
17,365,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,089,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,091,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,106,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,121,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,136,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,160,051 UART: [afmc] --
19,164,460 UART: [cold-reset] --
19,170,161 UART: [state] Locking Datavault
19,174,214 UART: [state] Locking PCR0, PCR1 and PCR31
19,176,395 UART: [state] Locking ICCM
19,178,483 UART: [exit] Launching FMC @ 0x40000130
19,187,154 UART:
19,187,437 UART: Running Caliptra FMC ...
19,188,548 UART:
19,188,701 UART: [state] CFI Enabled
19,196,475 UART: [fht] FMC Alias Private Key: 7
20,953,939 UART: [art] Extend RT PCRs Done
20,955,176 UART: [art] Lock RT PCRs Done
20,956,696 UART: [art] Populate DV Done
20,961,939 UART: [fht] FMC Alias Private Key: 7
20,963,655 UART: [art] Derive CDI
20,964,468 UART: [art] Store in in slot 0x4
21,007,111 UART: [art] Derive Key Pair
21,008,106 UART: [art] Store priv key in slot 0x5
23,434,729 UART: [art] Derive Key Pair - Done
23,447,728 UART: [art] Signing Cert with AUTHO
23,449,034 UART: RITY.KEYID = 7
25,154,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,142 UART: [art] PUB.X = 66121A1B422B94E58736688CC13897FE7B2871979E8BB5271AFECD2F05405C631C5F6E86059E3F25F056037FA7769922
25,163,408 UART: [art] PUB.Y = 0D489FBC2E2A050197C6CDBCB15E6350701901440EE236EA4C993361CF8AC6DB047A38898D96C302A69D7580A3B3EB52
25,170,642 UART: [art] SIG.R = 6B5F3EC2486651CFF924269181710C0FC9E1C3BFF7C3568B334E20A423B788401D3FAA1E3C7EE3C2F974C1FEDAE4B67F
25,178,030 UART: [art] SIG.S = 944CE23384834284E419994CA8FC62783352E046A00BD1F00C28CF96A7B90CD2C49EF214743EC312293408C885EFAB0E
26,156,566 UART: Caliptra RT
26,157,252 UART: [state] CFI Enabled
26,275,228 UART: [rt] RT listening for mailbox commands...
26,277,523 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,307,459 UART: [rt]cmd =0x50435252, len=8
26,309,355 >>> mbox cmd response data (8 bytes)
28,366,402 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,467,278 UART:
28,467,632 UART: Running Caliptra ROM ...
28,468,763 UART:
28,468,950 UART: [state] CFI Enabled
28,482,512 UART: [state] LifecycleState = Unprovisioned
28,484,402 UART: [state] DebugLocked = No
28,486,617 UART: [state] WD Timer not started. Device not locked for debugging
28,491,650 UART: [kat] SHA2-256
28,681,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,692,276 UART: [kat] ++
28,692,788 UART: [kat] sha1
28,704,803 UART: [kat] SHA2-256
28,707,793 UART: [kat] SHA2-384
28,714,707 UART: [kat] SHA2-512-ACC
28,717,328 UART: [kat] ECC-384
31,161,545 UART: [kat] HMAC-384Kdf
31,175,132 UART: [kat] LMS
31,706,757 UART: [kat] --
31,712,639 UART: [update-reset] ++
34,727,619 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,731,311 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,124,631 >>> mbox cmd response: success
35,125,038 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,125,338 UART: [update-reset] Copying MAN_2 To MAN_1
35,162,525 UART: [update-reset Success] --
35,167,370 UART: [state] Locking Datavault
35,170,520 UART: [state] Locking PCR0, PCR1 and PCR31
35,172,699 UART: [state] Locking ICCM
35,175,707 UART: [exit] Launching FMC @ 0x40000130
35,184,369 UART:
35,184,601 UART: Running Caliptra FMC ...
35,185,927 UART:
35,186,090 UART: [state] CFI Enabled
35,230,590 UART: [art] Extend RT PCRs Done
35,231,733 UART: [art] Lock RT PCRs Done
35,233,120 UART: [art] Populate DV Done
35,238,737 UART: [fht] FMC Alias Private Key: 7
35,240,317 UART: [art] Derive CDI
35,241,134 UART: [art] Store in in slot 0x4
35,284,163 UART: [art] Derive Key Pair
35,285,201 UART: [art] Store priv key in slot 0x5
37,711,827 UART: [art] Derive Key Pair - Done
37,725,263 UART: [art] Signing Cert with AUTHO
37,726,571 UART: RITY.KEYID = 7
39,431,881 UART: [art] Erasing AUTHORITY.KEYID = 7
39,433,383 UART: [art] PUB.X = 23F28C5DC0A2395E8ABA74CDEBCE7885C7CBAC9D1F6DD686AE9089CE8539F0B9555DCE22D8771086170DB3C2EDF6DCF8
39,440,629 UART: [art] PUB.Y = C64D2B1A5DD48E087BAC6679DF43EABBDCE9C45279C42C11D376DE9F771B8D349E057E887D744CA90F5FA8943E4F4324
39,447,924 UART: [art] SIG.R = 2F789E928AB7F2C2314FCE253BD6FC65DB418622C8872F513EAE556EDB3F38F59C174ADD455855835A0B40A07716B913
39,455,313 UART: [art] SIG.S = BBED08B05B0ACC011B5C9563509E1967AA6237A6DF63617C2104569F39627F8B8918B840A1209881DC16B145CBC81516
40,433,696 UART: mbox::rt_entry...
40,434,651 UART: ____ _ _ _ ____ _____
40,436,581 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,438,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,440,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,442,359 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,444,234 UART: |_|
40,445,113 UART:
40,731,293 UART: [rt] Runtime listening for mailbox commands...
40,733,299 >>> mbox cmd response data (128 bytes)
42,783,810 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,883,849 UART:
42,884,214 UART: Running Caliptra ROM ...
42,885,266 UART:
42,885,472 UART: [state] CFI Enabled
42,897,749 UART: [state] LifecycleState = Unprovisioned
42,899,576 UART: [state] DebugLocked = No
42,902,059 UART: [state] WD Timer not started. Device not locked for debugging
42,906,288 UART: [kat] SHA2-256
43,096,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,106,906 UART: [kat] ++
43,107,422 UART: [kat] sha1
43,119,766 UART: [kat] SHA2-256
43,122,732 UART: [kat] SHA2-384
43,128,987 UART: [kat] SHA2-512-ACC
43,131,600 UART: [kat] ECC-384
45,571,901 UART: [kat] HMAC-384Kdf
45,584,137 UART: [kat] LMS
46,115,760 UART: [kat] --
46,120,775 UART: [update-reset] ++
49,129,490 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,133,512 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,526,846 >>> mbox cmd response: success
49,527,212 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,527,498 UART: [update-reset] Copying MAN_2 To MAN_1
49,564,733 UART: [update-reset Success] --
49,570,377 UART: [state] Locking Datavault
49,573,247 UART: [state] Locking PCR0, PCR1 and PCR31
49,575,427 UART: [state] Locking ICCM
49,576,846 UART: [exit] Launching FMC @ 0x40000130
49,585,671 UART:
49,585,948 UART: Running Caliptra FMC ...
49,587,003 UART:
49,587,159 UART: [state] CFI Enabled
49,631,000 UART: [art] Extend RT PCRs Done
49,632,142 UART: [art] Lock RT PCRs Done
49,633,613 UART: [art] Populate DV Done
49,638,905 UART: [fht] FMC Alias Private Key: 7
49,640,656 UART: [art] Derive CDI
49,641,465 UART: [art] Store in in slot 0x4
49,684,112 UART: [art] Derive Key Pair
49,685,183 UART: [art] Store priv key in slot 0x5
52,112,500 UART: [art] Derive Key Pair - Done
52,125,278 UART: [art] Signing Cert with AUTHO
52,126,570 UART: RITY.KEYID = 7
53,832,352 UART: [art] Erasing AUTHORITY.KEYID = 7
53,833,852 UART: [art] PUB.X = BDE6EE8F62A0C4AB74B73E16335060617B99A6FB4D9A1011D47BBE3438D87360D60AFD1127A8912EEB5F6D5E3A75A6D2
53,841,106 UART: [art] PUB.Y = 35387658F3AF70A7242145CB8DEBE52EE17CD573B83E0F730820C45651344FD73BCEC9172D5E0819DCB6AAFA118F2948
53,848,392 UART: [art] SIG.R = 7FA0ED72F0AEA542ABF43B5C4A3DC3847E5628E06D05AC91FF377BF239ACA7F5DE1A037728839E1E7A92A188D894BFC9
53,855,794 UART: [art] SIG.S = 425DBDA13782FEBFFC58693AD9A0356FCCC48DF5D85739853408865FAB59FD26982BDF3068152EAAB2D267BE64B1217A
54,834,563 UART: mbox::rt_entry...
54,835,514 UART: ____ _ _ _ ____ _____
54,837,443 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,839,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,841,291 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,843,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,845,069 UART: |_|
54,845,949 UART:
55,127,398 UART: [rt] Runtime listening for mailbox commands...
55,129,404 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,753,993 ready_for_fw is high
3,754,360 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,959,283 >>> mbox cmd response: success
19,209,780 UART:
19,210,170 UART: Running Caliptra FMC ...
19,211,285 UART:
19,211,437 UART: [state] CFI Enabled
19,219,442 UART: [fht] FMC Alias Private Key: 7
20,975,911 UART: [art] Extend RT PCRs Done
20,977,134 UART: [art] Lock RT PCRs Done
20,978,841 UART: [art] Populate DV Done
20,984,265 UART: [fht] FMC Alias Private Key: 7
20,985,807 UART: [art] Derive CDI
20,986,619 UART: [art] Store in in slot 0x4
21,029,295 UART: [art] Derive Key Pair
21,030,347 UART: [art] Store priv key in slot 0x5
23,456,650 UART: [art] Derive Key Pair - Done
23,469,456 UART: [art] Signing Cert with AUTHO
23,470,751 UART: RITY.KEYID = 7
25,176,316 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,858 UART: [art] PUB.X = 8F5E378B563012456F3DD8B21C191177615489921C434CC9AE15F244D3A484B862F4F6724580CFDB82975CF043A6452B
25,185,068 UART: [art] PUB.Y = DBF0B848ECA99178BCBA8AA81AD57EA34C952FB507681B5384B5683F410594A03048D24186FC9560180FB210654DFFBF
25,192,324 UART: [art] SIG.R = 9E3E0F9EE4889B7D64CCB40823A5C19CF8E6C06C5E075653388CFEC13E41954651E043EE1595BDE636DA47ECF0CB1048
25,199,696 UART: [art] SIG.S = 7CDA7802964E5D99BE42318985E4FA94E8DAA9A256D05D8654D352755E313545514B1C8B96D080CC9E2340F8DBAB02B8
26,177,986 UART: Caliptra RT
26,178,680 UART: [state] CFI Enabled
26,295,253 UART: [rt] RT listening for mailbox commands...
26,297,590 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,327,414 UART: [rt]cmd =0x50435252, len=8
26,329,364 >>> mbox cmd response data (8 bytes)
28,380,431 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,301,166 >>> mbox cmd response: success
35,301,656 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,333,288 UART:
35,333,593 UART: Running Caliptra FMC ...
35,334,711 UART:
35,334,876 UART: [state] CFI Enabled
35,378,864 UART: [art] Extend RT PCRs Done
35,380,051 UART: [art] Lock RT PCRs Done
35,381,545 UART: [art] Populate DV Done
35,387,177 UART: [fht] FMC Alias Private Key: 7
35,388,724 UART: [art] Derive CDI
35,389,559 UART: [art] Store in in slot 0x4
35,432,348 UART: [art] Derive Key Pair
35,433,418 UART: [art] Store priv key in slot 0x5
37,859,966 UART: [art] Derive Key Pair - Done
37,872,958 UART: [art] Signing Cert with AUTHO
37,874,257 UART: RITY.KEYID = 7
39,580,470 UART: [art] Erasing AUTHORITY.KEYID = 7
39,581,953 UART: [art] PUB.X = 2C8364B7128523A8266E14FDF9C7D64CDBACD79A67FBBB79D86FE8927CE2DB18A7D20039B00E4D999F3B18D4E62B8F37
39,589,508 UART: [art] PUB.Y = 5310505F740E058AB24359ED23495A2025541B11A14DC394E7C42C29B503DE1474EF5B1FE4B3502282F902F98A1A6D7F
39,596,474 UART: [art] SIG.R = AE686FA0D3CB147255563D1E9A6F8CFEC56AAB1CC5D4E1B91FE84C6254FFEFB2D7158A74FC3912EE20E0F20A3A398E00
39,603,921 UART: [art] SIG.S = 5E74970B9D83DFF06C2A5A601ED391156B9A32D21713CCCB98C3D071FD5D7B7AA4B78E150BB90750EB4CE00DC4805FED
40,582,794 UART: mbox::rt_entry...
40,583,753 UART: ____ _ _ _ ____ _____
40,585,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,587,735 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,589,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,591,619 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,593,475 UART: |_|
40,594,273 UART:
40,884,816 UART: [rt] Runtime listening for mailbox commands...
40,886,853 >>> mbox cmd response data (128 bytes)
42,936,127 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
49,859,098 >>> mbox cmd response: success
49,859,646 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,892,943 UART:
49,893,229 UART: Running Caliptra FMC ...
49,894,346 UART:
49,894,502 UART: [state] CFI Enabled
49,938,341 UART: [art] Extend RT PCRs Done
49,939,536 UART: [art] Lock RT PCRs Done
49,941,044 UART: [art] Populate DV Done
49,946,512 UART: [fht] FMC Alias Private Key: 7
49,948,210 UART: [art] Derive CDI
49,949,020 UART: [art] Store in in slot 0x4
49,991,264 UART: [art] Derive Key Pair
49,992,323 UART: [art] Store priv key in slot 0x5
52,419,246 UART: [art] Derive Key Pair - Done
52,432,186 UART: [art] Signing Cert with AUTHO
52,433,489 UART: RITY.KEYID = 7
54,139,082 UART: [art] Erasing AUTHORITY.KEYID = 7
54,140,566 UART: [art] PUB.X = 1E741C262E13045245CE545DECCE83E8E388842D81726CE05130D3904739C40CAA22BB706B0E0FF863DF4402CBE80A99
54,147,856 UART: [art] PUB.Y = BBFF8CE467005632FB808C9DE078FCD128548FCEEBA1745AD5E6C20B98A62A320C8E8CBFC756DBD70E6719D39A558EBC
54,155,151 UART: [art] SIG.R = F4AAE45C59453BCD8828D652DD09DC060B07A177114C254A24B8A0F9AB78E4557551A8413D17DD06713DCFC480215346
54,162,503 UART: [art] SIG.S = 92F48F5BC9288CE12E5CAA32B14DF9D610DE601EDAA1C6B3709973BF971CBD7F4D6C729326D83954812745B2DDB19732
55,140,979 UART: mbox::rt_entry...
55,141,936 UART: ____ _ _ _ ____ _____
55,143,917 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,145,918 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,147,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,149,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,151,634 UART: |_|
55,152,431 UART:
55,438,126 UART: [rt] Runtime listening for mailbox commands...
55,440,138 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,331 UART: [kat] SHA2-256
882,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,377 UART: [kat] ++
886,529 UART: [kat] sha1
890,807 UART: [kat] SHA2-256
892,745 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
902,962 UART: [kat] HMAC-384Kdf
907,370 UART: [kat] LMS
1,475,566 UART: [kat] --
1,476,633 UART: [cold-reset] ++
1,477,089 UART: [fht] Storing FHT @ 0x50003400
1,480,080 UART: [idev] ++
1,480,248 UART: [idev] CDI.KEYID = 6
1,480,608 UART: [idev] SUBJECT.KEYID = 7
1,481,032 UART: [idev] UDS.KEYID = 0
1,481,377 ready_for_fw is high
1,481,377 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,270 UART: [idev] Erasing UDS.KEYID = 0
1,505,332 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,032 UART: [idev] --
1,514,981 UART: [ldev] ++
1,515,149 UART: [ldev] CDI.KEYID = 6
1,515,512 UART: [ldev] SUBJECT.KEYID = 5
1,515,938 UART: [ldev] AUTHORITY.KEYID = 7
1,516,401 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,384 UART: [ldev] --
1,585,797 UART: [fwproc] Waiting for Commands...
1,586,610 UART: [fwproc] Received command 0x46574c44
1,587,401 UART: [fwproc] Received Image of size 114360 bytes
2,885,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,560 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,897 >>> mbox cmd response: success
3,078,931 UART: [afmc] ++
3,079,099 UART: [afmc] CDI.KEYID = 6
3,079,461 UART: [afmc] SUBJECT.KEYID = 7
3,079,886 UART: [afmc] AUTHORITY.KEYID = 5
3,114,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,943 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,556 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,246 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,905 UART: [afmc] --
3,157,961 UART: [cold-reset] --
3,158,893 UART: [state] Locking Datavault
3,159,782 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,386 UART: [state] Locking ICCM
3,160,932 UART: [exit] Launching FMC @ 0x40000130
3,166,261 UART:
3,166,277 UART: Running Caliptra FMC ...
3,166,685 UART:
3,166,739 UART: [state] CFI Enabled
3,176,998 UART: [fht] FMC Alias Private Key: 7
3,284,495 UART: [art] Extend RT PCRs Done
3,284,923 UART: [art] Lock RT PCRs Done
3,286,613 UART: [art] Populate DV Done
3,294,648 UART: [fht] FMC Alias Private Key: 7
3,295,790 UART: [art] Derive CDI
3,296,070 UART: [art] Store in in slot 0x4
3,381,557 UART: [art] Derive Key Pair
3,381,917 UART: [art] Store priv key in slot 0x5
3,395,529 UART: [art] Derive Key Pair - Done
3,410,195 UART: [art] Signing Cert with AUTHO
3,410,675 UART: RITY.KEYID = 7
3,425,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,086 UART: [art] PUB.X = C632591F9DFBB93D139C09E9BCAC1A16A2D7A5BD14199CFAD579C1771A75788C03C8E552714C0781803996AED5CF41B9
3,432,855 UART: [art] PUB.Y = 4D5E9738B50E56304934E34E8EA7FB2F11CFFB3DB867EA1E850929E40A7532ADB5E3588AD68363127ED54D2E475ECBDB
3,439,808 UART: [art] SIG.R = F44F41653B1316FCD6E27BA95F438B7F6F85A0FB40D026E60B360B4C6A11191768B1BDB6DE37F082AFA4920CD67ACAA9
3,446,583 UART: [art] SIG.S = 5B96DBD51023269B169FF01F3DA06B2357212556E4A19167564BAFEE6665592FC76600720A283FF08A91FA2381A59C7D
3,469,953 UART: Caliptra RT
3,470,207 UART: [state] CFI Enabled
3,579,025 UART: [rt] RT listening for mailbox commands...
3,579,695 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,238 UART: [rt]cmd =0x50435252, len=8
3,610,732 >>> mbox cmd response data (8 bytes)
3,610,733 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,488 UART:
3,611,504 UART: Running Caliptra ROM ...
3,611,912 UART:
3,611,966 UART: [state] CFI Enabled
3,614,536 UART: [state] LifecycleState = Unprovisioned
3,615,191 UART: [state] DebugLocked = No
3,615,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,234 UART: [kat] SHA2-256
4,411,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,415,280 UART: [kat] ++
4,415,432 UART: [kat] sha1
4,419,870 UART: [kat] SHA2-256
4,421,808 UART: [kat] SHA2-384
4,424,633 UART: [kat] SHA2-512-ACC
4,426,533 UART: [kat] ECC-384
4,432,230 UART: [kat] HMAC-384Kdf
4,436,644 UART: [kat] LMS
5,004,840 UART: [kat] --
5,005,605 UART: [update-reset] ++
5,931,546 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,932,764 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,029,090 >>> mbox cmd response: success
6,029,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,029,349 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,363 UART: [update-reset Success] --
6,038,280 UART: [state] Locking Datavault
6,039,118 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,722 UART: [state] Locking ICCM
6,040,304 UART: [exit] Launching FMC @ 0x40000130
6,045,633 UART:
6,045,649 UART: Running Caliptra FMC ...
6,046,057 UART:
6,046,111 UART: [state] CFI Enabled
6,135,350 UART: [art] Extend RT PCRs Done
6,135,778 UART: [art] Lock RT PCRs Done
6,137,005 UART: [art] Populate DV Done
6,145,164 UART: [fht] FMC Alias Private Key: 7
6,146,200 UART: [art] Derive CDI
6,146,480 UART: [art] Store in in slot 0x4
6,232,053 UART: [art] Derive Key Pair
6,232,413 UART: [art] Store priv key in slot 0x5
6,245,575 UART: [art] Derive Key Pair - Done
6,260,397 UART: [art] Signing Cert with AUTHO
6,260,877 UART: RITY.KEYID = 7
6,276,119 UART: [art] Erasing AUTHORITY.KEYID = 7
6,276,884 UART: [art] PUB.X = B66B7C3CA055211EF8E64F7A8BD7EE91FAAD4051550FEC2D58C49EF71BAD98F86AF28B37B992AB052D173B7E69F6E036
6,283,666 UART: [art] PUB.Y = CF2A1DC6EB2EF0F535C04C25C2BD1D68BFBFC7355565B3812C24F07998E0851C6BC93E08C5DF93F106D14024D792FDD5
6,290,624 UART: [art] SIG.R = F10926A18D7A971F074EE29124988A507C10EC087B10E5D56C6829C0610706B5DEB0FD1FDAE83D47F7EF303DB82FEA04
6,297,384 UART: [art] SIG.S = 6F8FEA85CAB363E50323494A71BA21B8AEDFC928E9F89C4AB55101EE80AEE2FC6E7F1174ECF5705123657605019EDEC4
6,321,489 UART: mbox::rt_entry...
6,321,861 UART: ____ _ _ _ ____ _____
6,322,645 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,323,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,324,213 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,324,981 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,325,749 UART: |_|
6,326,061 UART:
6,607,785 UART: [rt] Runtime listening for mailbox commands...
6,608,813 >>> mbox cmd response data (128 bytes)
6,608,814 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
6,608,928 UART:
6,608,944 UART: Running Caliptra ROM ...
6,609,352 UART:
6,609,406 UART: [state] CFI Enabled
6,611,692 UART: [state] LifecycleState = Unprovisioned
6,612,347 UART: [state] DebugLocked = No
6,612,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,614,550 UART: [kat] SHA2-256
7,408,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,412,596 UART: [kat] ++
7,412,748 UART: [kat] sha1
7,417,014 UART: [kat] SHA2-256
7,418,952 UART: [kat] SHA2-384
7,421,955 UART: [kat] SHA2-512-ACC
7,423,855 UART: [kat] ECC-384
7,429,548 UART: [kat] HMAC-384Kdf
7,434,116 UART: [kat] LMS
8,002,312 UART: [kat] --
8,003,113 UART: [update-reset] ++
8,929,178 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,930,454 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
9,026,780 >>> mbox cmd response: success
9,026,780 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,026,961 UART: [update-reset] Copying MAN_2 To MAN_1
9,034,975 UART: [update-reset Success] --
9,036,062 UART: [state] Locking Datavault
9,036,860 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,464 UART: [state] Locking ICCM
9,038,138 UART: [exit] Launching FMC @ 0x40000130
9,043,467 UART:
9,043,483 UART: Running Caliptra FMC ...
9,043,891 UART:
9,043,945 UART: [state] CFI Enabled
9,132,816 UART: [art] Extend RT PCRs Done
9,133,244 UART: [art] Lock RT PCRs Done
9,134,223 UART: [art] Populate DV Done
9,142,608 UART: [fht] FMC Alias Private Key: 7
9,143,654 UART: [art] Derive CDI
9,143,934 UART: [art] Store in in slot 0x4
9,229,563 UART: [art] Derive Key Pair
9,229,923 UART: [art] Store priv key in slot 0x5
9,243,369 UART: [art] Derive Key Pair - Done
9,258,507 UART: [art] Signing Cert with AUTHO
9,258,987 UART: RITY.KEYID = 7
9,274,149 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,914 UART: [art] PUB.X = FBC897318491B5F5E4B926BAA708415EF5CD6BBD9ACD3F7276983692B61A99C000788484E5FC9927C031AFE91C20B95D
9,281,665 UART: [art] PUB.Y = CB06B917567EFCE91E5B6D6F7F41FEB6BC422D07A670F650ABEBD0DD125921B6F066AD6C847C7B202D3500B0AD318800
9,288,579 UART: [art] SIG.R = 573652A5B2C9C19925949DD58BF6D4FA97C7D6E646105F09B73C492F461D04E4E9134F2AD29C6C9E8547BEF9FB71E073
9,295,347 UART: [art] SIG.S = A7F1D0CE6B244087FF59718C62E50AE1508F215F304D4C6152E82273533BE6E075107231BB7FE0185E80AF62102C7A39
9,319,491 UART: mbox::rt_entry...
9,319,863 UART: ____ _ _ _ ____ _____
9,320,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,321,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,322,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,322,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,323,751 UART: |_|
9,324,063 UART:
9,605,913 UART: [rt] Runtime listening for mailbox commands...
9,606,941 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,777 ready_for_fw is high
1,362,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,493 >>> mbox cmd response: success
2,987,463 UART:
2,987,479 UART: Running Caliptra FMC ...
2,987,887 UART:
2,987,941 UART: [state] CFI Enabled
2,998,502 UART: [fht] FMC Alias Private Key: 7
3,106,277 UART: [art] Extend RT PCRs Done
3,106,705 UART: [art] Lock RT PCRs Done
3,108,399 UART: [art] Populate DV Done
3,116,884 UART: [fht] FMC Alias Private Key: 7
3,118,028 UART: [art] Derive CDI
3,118,308 UART: [art] Store in in slot 0x4
3,203,815 UART: [art] Derive Key Pair
3,204,175 UART: [art] Store priv key in slot 0x5
3,217,337 UART: [art] Derive Key Pair - Done
3,232,433 UART: [art] Signing Cert with AUTHO
3,232,913 UART: RITY.KEYID = 7
3,247,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,702 UART: [art] PUB.X = D4BFE746FE181EBAC8822B197AE413F421B2B67C7033A4F53CAC039E982ABA18AB34A38FB6C4320897A0A2339C18C4A0
3,255,478 UART: [art] PUB.Y = A0EA12A2ACAC312D8CEAFC88BE10B8F6E0235599FDF88F8B3DD38286E42AA7439C8972A5F09316FE1BF0B72783A282D9
3,262,444 UART: [art] SIG.R = 340C56E776E41CDD85C31E95EE08FB9D03C5CD9B3795EF0B93647ADABF3B7F98B9449BDA532852FB989828B765BC939D
3,269,214 UART: [art] SIG.S = 4E9FD2B6B3A47E21A604895B1CF800CC10D3ECAF34CC41E2100703E2E1EAEDB564530BCD17ABE4043D51887F24CEF4E6
3,293,108 UART: Caliptra RT
3,293,362 UART: [state] CFI Enabled
3,401,577 UART: [rt] RT listening for mailbox commands...
3,402,247 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,830 UART: [rt]cmd =0x50435252, len=8
3,433,372 >>> mbox cmd response data (8 bytes)
3,433,373 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,932 >>> mbox cmd response: success
5,732,932 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,746,067 UART:
5,746,083 UART: Running Caliptra FMC ...
5,746,491 UART:
5,746,545 UART: [state] CFI Enabled
5,835,298 UART: [art] Extend RT PCRs Done
5,835,726 UART: [art] Lock RT PCRs Done
5,837,001 UART: [art] Populate DV Done
5,845,348 UART: [fht] FMC Alias Private Key: 7
5,846,374 UART: [art] Derive CDI
5,846,654 UART: [art] Store in in slot 0x4
5,932,623 UART: [art] Derive Key Pair
5,932,983 UART: [art] Store priv key in slot 0x5
5,945,923 UART: [art] Derive Key Pair - Done
5,960,801 UART: [art] Signing Cert with AUTHO
5,961,281 UART: RITY.KEYID = 7
5,976,737 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,502 UART: [art] PUB.X = FA9EED9B78D67BFF2592EBA650244EB9E4109F6F800889C91A3C303E41A7A396C0E3FF24A2E75C5DAE94424C595BC1E2
5,984,283 UART: [art] PUB.Y = A14F35046FEC43450F2A03279E4B416A08DBE1AAC8B6ED4CE176CAD4A29AF7218A120BE8AACF09A7D35E9B824FEC3A11
5,991,237 UART: [art] SIG.R = 2A84A123364D6F111A5B6C0CCE345DEF0B4CCEF5A624A420B5ED41E0B22B27919FE812BAD6FCC87863551F367EE7BF7C
5,998,019 UART: [art] SIG.S = 92A1F2FAE5DAC7DCEEB0B50AF2C2143DF25CA00D1FA2A77E7D95F82BFF973A0AB38768348E7E135CC3A1A3BD798DCAC1
6,022,137 UART: mbox::rt_entry...
6,022,509 UART: ____ _ _ _ ____ _____
6,023,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,024,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,397 UART: |_|
6,026,709 UART:
6,307,711 UART: [rt] Runtime listening for mailbox commands...
6,308,739 >>> mbox cmd response data (128 bytes)
6,308,740 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,606,854 >>> mbox cmd response: success
8,606,854 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,619,857 UART:
8,619,873 UART: Running Caliptra FMC ...
8,620,281 UART:
8,620,335 UART: [state] CFI Enabled
8,709,596 UART: [art] Extend RT PCRs Done
8,710,024 UART: [art] Lock RT PCRs Done
8,711,089 UART: [art] Populate DV Done
8,719,408 UART: [fht] FMC Alias Private Key: 7
8,720,582 UART: [art] Derive CDI
8,720,862 UART: [art] Store in in slot 0x4
8,806,417 UART: [art] Derive Key Pair
8,806,777 UART: [art] Store priv key in slot 0x5
8,819,815 UART: [art] Derive Key Pair - Done
8,834,760 UART: [art] Signing Cert with AUTHO
8,835,240 UART: RITY.KEYID = 7
8,850,596 UART: [art] Erasing AUTHORITY.KEYID = 7
8,851,361 UART: [art] PUB.X = 69E929F29713ED038E776F72FBA393BFF0042734936343FA5A652FBC926CC55B58ED2941E6E175F484D845F5FCF61127
8,858,125 UART: [art] PUB.Y = BF7B2B969B5D63C2ADD0BA6C269D269A7A55CF5A76F900F1348BBE0850F9D1076CDB542200AA6BF11E1CEB4DCD33EA4A
8,865,049 UART: [art] SIG.R = 2C2EBC2DF297B3A76BE2B2C25FC1073D89418B8D280B867C4107EE7D5ADAF9A3520E0051AF5A1AE1674F686006679CE8
8,871,792 UART: [art] SIG.S = 5390F594525C02126E97FC6BB5E547AF75C99558DF7BC3CF77F4600DC3A8682DEB76570E303F54AB064726ECE65E5481
8,895,545 UART: mbox::rt_entry...
8,895,917 UART: ____ _ _ _ ____ _____
8,896,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,897,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,898,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,899,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,899,805 UART: |_|
8,900,117 UART:
9,183,572 UART: [rt] Runtime listening for mailbox commands...
9,184,600 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,442 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,779 UART: [idev] ++
1,479,947 UART: [idev] CDI.KEYID = 6
1,480,307 UART: [idev] SUBJECT.KEYID = 7
1,480,731 UART: [idev] UDS.KEYID = 0
1,481,076 ready_for_fw is high
1,481,076 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,455 UART: [idev] Erasing UDS.KEYID = 0
1,505,615 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,093 UART: [idev] --
1,514,910 UART: [ldev] ++
1,515,078 UART: [ldev] CDI.KEYID = 6
1,515,441 UART: [ldev] SUBJECT.KEYID = 5
1,515,867 UART: [ldev] AUTHORITY.KEYID = 7
1,516,330 UART: [ldev] FE.KEYID = 1
1,521,582 UART: [ldev] Erasing FE.KEYID = 1
1,546,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,405 UART: [ldev] --
1,585,872 UART: [fwproc] Waiting for Commands...
1,586,687 UART: [fwproc] Received command 0x46574c44
1,587,478 UART: [fwproc] Received Image of size 114360 bytes
2,884,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,435 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,694 >>> mbox cmd response: success
3,077,810 UART: [afmc] ++
3,077,978 UART: [afmc] CDI.KEYID = 6
3,078,340 UART: [afmc] SUBJECT.KEYID = 7
3,078,765 UART: [afmc] AUTHORITY.KEYID = 5
3,114,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,439 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,129 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,950 UART: [afmc] --
3,157,946 UART: [cold-reset] --
3,158,834 UART: [state] Locking Datavault
3,160,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,959 UART: [state] Locking ICCM
3,161,445 UART: [exit] Launching FMC @ 0x40000130
3,166,774 UART:
3,166,790 UART: Running Caliptra FMC ...
3,167,198 UART:
3,167,341 UART: [state] CFI Enabled
3,178,030 UART: [fht] FMC Alias Private Key: 7
3,286,377 UART: [art] Extend RT PCRs Done
3,286,805 UART: [art] Lock RT PCRs Done
3,288,025 UART: [art] Populate DV Done
3,296,100 UART: [fht] FMC Alias Private Key: 7
3,297,124 UART: [art] Derive CDI
3,297,404 UART: [art] Store in in slot 0x4
3,382,969 UART: [art] Derive Key Pair
3,383,329 UART: [art] Store priv key in slot 0x5
3,396,601 UART: [art] Derive Key Pair - Done
3,411,011 UART: [art] Signing Cert with AUTHO
3,411,491 UART: RITY.KEYID = 7
3,426,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,548 UART: [art] PUB.X = D75166A2E2B6E869D34EDFF267F812BEAE96B75786EF4F957EDA6F534A8ED1A649760532E436482CDAC4C6EE3E1C7186
3,434,327 UART: [art] PUB.Y = B54E68958E73E9CF31E71AE43F63E12A3484990F66AECE2E72C913AB618DD05A9FA6951BCFFA72A5911B2F47DE6C16DE
3,441,290 UART: [art] SIG.R = F728D0788961237588856FDBEB8248F3DCE2BDEF6A52D6B7D4D85072DED3B7CF9EAAFC39BC4C9BBE5485C2B8E1BBA55B
3,448,086 UART: [art] SIG.S = D7E10014289C993276B15C597F90C3FC6415E7C14A09E87804CAFF98D394D677B8755C22D52A38B7273598387F21484A
3,471,839 UART: Caliptra RT
3,472,185 UART: [state] CFI Enabled
3,580,862 UART: [rt] RT listening for mailbox commands...
3,581,532 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,257 UART: [rt]cmd =0x50435252, len=8
3,613,125 >>> mbox cmd response data (8 bytes)
3,613,126 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,911 UART:
3,613,927 UART: Running Caliptra ROM ...
3,614,335 UART:
3,614,476 UART: [state] CFI Enabled
3,617,056 UART: [state] LifecycleState = Unprovisioned
3,617,711 UART: [state] DebugLocked = No
3,618,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,620,036 UART: [kat] SHA2-256
4,413,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,082 UART: [kat] ++
4,418,234 UART: [kat] sha1
4,422,512 UART: [kat] SHA2-256
4,424,450 UART: [kat] SHA2-384
4,427,197 UART: [kat] SHA2-512-ACC
4,429,097 UART: [kat] ECC-384
4,434,754 UART: [kat] HMAC-384Kdf
4,439,542 UART: [kat] LMS
5,007,738 UART: [kat] --
5,008,459 UART: [update-reset] ++
5,934,220 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,935,382 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,031,708 >>> mbox cmd response: success
6,031,708 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,032,053 UART: [update-reset] Copying MAN_2 To MAN_1
6,040,067 UART: [update-reset Success] --
6,041,054 UART: [state] Locking Datavault
6,041,814 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,418 UART: [state] Locking ICCM
6,042,940 UART: [exit] Launching FMC @ 0x40000130
6,048,269 UART:
6,048,285 UART: Running Caliptra FMC ...
6,048,693 UART:
6,048,836 UART: [state] CFI Enabled
6,138,415 UART: [art] Extend RT PCRs Done
6,138,843 UART: [art] Lock RT PCRs Done
6,140,088 UART: [art] Populate DV Done
6,148,461 UART: [fht] FMC Alias Private Key: 7
6,149,639 UART: [art] Derive CDI
6,149,919 UART: [art] Store in in slot 0x4
6,235,716 UART: [art] Derive Key Pair
6,236,076 UART: [art] Store priv key in slot 0x5
6,249,036 UART: [art] Derive Key Pair - Done
6,263,824 UART: [art] Signing Cert with AUTHO
6,264,304 UART: RITY.KEYID = 7
6,280,072 UART: [art] Erasing AUTHORITY.KEYID = 7
6,280,837 UART: [art] PUB.X = BECBEC274CC954EC035992A4E7411B86F66730FA46711E8F678C8E941AF592DF7A1835F190B9BE2F9DA1AF4AD4CBF403
6,287,617 UART: [art] PUB.Y = A604225A5F2C043304BC6532DDEF50D24D66D8701D967527861F2534475466EA469F39C34339CF541CE516CEFA33B814
6,294,552 UART: [art] SIG.R = A4078C4A7B57D5AED6F400ED1EF2BBCE5970B9CFD93C404187AB5FEB197FB4E6B409D09B5FE3710BEEE9A09D3EC5ECCF
6,301,323 UART: [art] SIG.S = 7797E5AAD6268018390773B95E1A954AD320E2783BBB258D52C775F0646AE8E4561E04AE57170F6DDEBB22D2A5B9186E
6,325,019 UART: mbox::rt_entry...
6,325,391 UART: ____ _ _ _ ____ _____
6,326,175 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,326,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,327,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,328,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,329,279 UART: |_|
6,329,591 UART:
6,610,005 UART: [rt] Runtime listening for mailbox commands...
6,611,033 >>> mbox cmd response data (128 bytes)
6,611,034 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
6,611,148 UART:
6,611,164 UART: Running Caliptra ROM ...
6,611,572 UART:
6,611,713 UART: [state] CFI Enabled
6,614,391 UART: [state] LifecycleState = Unprovisioned
6,615,046 UART: [state] DebugLocked = No
6,615,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,617,113 UART: [kat] SHA2-256
7,411,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,415,159 UART: [kat] ++
7,415,311 UART: [kat] sha1
7,419,493 UART: [kat] SHA2-256
7,421,431 UART: [kat] SHA2-384
7,424,054 UART: [kat] SHA2-512-ACC
7,425,954 UART: [kat] ECC-384
7,431,451 UART: [kat] HMAC-384Kdf
7,435,887 UART: [kat] LMS
8,004,083 UART: [kat] --
8,004,826 UART: [update-reset] ++
8,929,859 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,930,961 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
9,027,287 >>> mbox cmd response: success
9,027,287 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,027,536 UART: [update-reset] Copying MAN_2 To MAN_1
9,035,550 UART: [update-reset Success] --
9,036,411 UART: [state] Locking Datavault
9,037,355 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,959 UART: [state] Locking ICCM
9,038,479 UART: [exit] Launching FMC @ 0x40000130
9,043,808 UART:
9,043,824 UART: Running Caliptra FMC ...
9,044,232 UART:
9,044,375 UART: [state] CFI Enabled
9,133,418 UART: [art] Extend RT PCRs Done
9,133,846 UART: [art] Lock RT PCRs Done
9,135,115 UART: [art] Populate DV Done
9,143,666 UART: [fht] FMC Alias Private Key: 7
9,144,806 UART: [art] Derive CDI
9,145,086 UART: [art] Store in in slot 0x4
9,230,909 UART: [art] Derive Key Pair
9,231,269 UART: [art] Store priv key in slot 0x5
9,243,755 UART: [art] Derive Key Pair - Done
9,258,792 UART: [art] Signing Cert with AUTHO
9,259,272 UART: RITY.KEYID = 7
9,274,246 UART: [art] Erasing AUTHORITY.KEYID = 7
9,275,011 UART: [art] PUB.X = C1DE91061EF021D52A4E766C37E050B81B6F3140CF5E61F0BE3D1382B2076404DCD25B253768131E0B3CC42E31DB049C
9,281,770 UART: [art] PUB.Y = 5F6A265B54732E6C11C672215E5EB2AF8B32F7C408BE36731E99A4BB0E0B290CE6CFFA7AA2B4C0A576B4504B7ACE2F47
9,288,724 UART: [art] SIG.R = 600BE504A9714DD45F97048D5628008183BC565F7080B333BB769EBB74554947EF0B6EA207340676E18D8D1B826DF63A
9,295,448 UART: [art] SIG.S = 8CB69A3112B3F2AF43CE7FCD53A70F0983CFB1417C6E74C78E3166CEC2791F8FB3E5118AF7DCF0E55228BC336481ABD9
9,318,803 UART: mbox::rt_entry...
9,319,175 UART: ____ _ _ _ ____ _____
9,319,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,320,759 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,321,527 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,322,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,323,063 UART: |_|
9,323,375 UART:
9,606,487 UART: [rt] Runtime listening for mailbox commands...
9,607,515 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,214 ready_for_fw is high
1,362,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,434 >>> mbox cmd response: success
2,987,446 UART:
2,987,462 UART: Running Caliptra FMC ...
2,987,870 UART:
2,988,013 UART: [state] CFI Enabled
2,998,588 UART: [fht] FMC Alias Private Key: 7
3,106,581 UART: [art] Extend RT PCRs Done
3,107,009 UART: [art] Lock RT PCRs Done
3,108,687 UART: [art] Populate DV Done
3,116,990 UART: [fht] FMC Alias Private Key: 7
3,118,096 UART: [art] Derive CDI
3,118,376 UART: [art] Store in in slot 0x4
3,203,673 UART: [art] Derive Key Pair
3,204,033 UART: [art] Store priv key in slot 0x5
3,217,031 UART: [art] Derive Key Pair - Done
3,231,688 UART: [art] Signing Cert with AUTHO
3,232,168 UART: RITY.KEYID = 7
3,247,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,795 UART: [art] PUB.X = 4EC7A0D0CE7AE666B3675F8964EB19927D0CC159CD13ACA67792D252404C29BAE320BE25DE38845EC1BB061ABE17045F
3,254,568 UART: [art] PUB.Y = DE45AF550DE4B18B5E3F9CA80437B20685A2717DB05EF97411F0AAF5D5049C3D5F25C3F921288926E8D009BC0150C9E7
3,261,506 UART: [art] SIG.R = FDFD1BC97F77371DE5322E629F882959D686C4F2E1C96D6CEDF0958C7584A3A06EAC3D2DD431FEE50CC3332CD59C3CEF
3,268,293 UART: [art] SIG.S = B9D3FA24DBAAE5D23DC359457EC1218AEBD3FB76E94E9E95652FB186162183DA9A9280AF9AB2EC158C9B0B887D24DB22
3,292,393 UART: Caliptra RT
3,292,739 UART: [state] CFI Enabled
3,401,898 UART: [rt] RT listening for mailbox commands...
3,402,568 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,279 UART: [rt]cmd =0x50435252, len=8
3,433,981 >>> mbox cmd response data (8 bytes)
3,433,982 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,733,544 >>> mbox cmd response: success
5,733,544 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,746,841 UART:
5,746,857 UART: Running Caliptra FMC ...
5,747,265 UART:
5,747,408 UART: [state] CFI Enabled
5,836,073 UART: [art] Extend RT PCRs Done
5,836,501 UART: [art] Lock RT PCRs Done
5,837,738 UART: [art] Populate DV Done
5,846,095 UART: [fht] FMC Alias Private Key: 7
5,847,119 UART: [art] Derive CDI
5,847,399 UART: [art] Store in in slot 0x4
5,933,184 UART: [art] Derive Key Pair
5,933,544 UART: [art] Store priv key in slot 0x5
5,947,516 UART: [art] Derive Key Pair - Done
5,962,455 UART: [art] Signing Cert with AUTHO
5,962,935 UART: RITY.KEYID = 7
5,978,097 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,862 UART: [art] PUB.X = F04B15D683AB066F597B0C546E8C477FE85A9977208D7B80491083D52A44FFF9E9EC1042EAE3AC7EDD3285F5CDCBD342
5,985,638 UART: [art] PUB.Y = 818838B342C6291655EF1F7C24F9A94BE131E4313833764A065D4A3BEDA9D5BCD645FEFF2E699117EFC00466B57A53E7
5,992,586 UART: [art] SIG.R = 8EFF3E518DABC03B3A040D71D2F8027AD82DAB899C4DD9E4C43C59418E0DB2FDDD083CF344B534206A389F6AE0B12C70
5,999,359 UART: [art] SIG.S = DDB29717563706B81635FFE033AFF31AF731A3D7505305DAC561A737D840DF63442EE2422F350EB393BEB019F98E3E06
6,022,654 UART: mbox::rt_entry...
6,023,026 UART: ____ _ _ _ ____ _____
6,023,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,024,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,025,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,026,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,914 UART: |_|
6,027,226 UART:
6,308,313 UART: [rt] Runtime listening for mailbox commands...
6,309,341 >>> mbox cmd response data (128 bytes)
6,309,342 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,608,627 >>> mbox cmd response: success
8,608,627 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,621,938 UART:
8,621,954 UART: Running Caliptra FMC ...
8,622,362 UART:
8,622,505 UART: [state] CFI Enabled
8,711,974 UART: [art] Extend RT PCRs Done
8,712,402 UART: [art] Lock RT PCRs Done
8,713,611 UART: [art] Populate DV Done
8,721,844 UART: [fht] FMC Alias Private Key: 7
8,722,772 UART: [art] Derive CDI
8,723,052 UART: [art] Store in in slot 0x4
8,808,879 UART: [art] Derive Key Pair
8,809,239 UART: [art] Store priv key in slot 0x5
8,822,751 UART: [art] Derive Key Pair - Done
8,837,580 UART: [art] Signing Cert with AUTHO
8,838,060 UART: RITY.KEYID = 7
8,853,212 UART: [art] Erasing AUTHORITY.KEYID = 7
8,853,977 UART: [art] PUB.X = C81B2A643E9836EE1453F6B5529668AEACF123021733EE863D3F9FE6F177687D3F4DFB00CEEB7167DE66988EBA1983CE
8,860,732 UART: [art] PUB.Y = D189E13323980F8810E1E4CB1C8852F9A07715E90A4B527913E6CB49C6E6E1C8DBD4093D03C612B7E5D15E87BAF809D0
8,867,671 UART: [art] SIG.R = FC2F3CE7A796E77AC99E1645D0FB259FA1E178EA1F50692FAE214D31F8AD76CA0BEDAC5603951D3BC24B44697DAD554A
8,874,455 UART: [art] SIG.S = 7B6A26992B312B2B1BD6A3BF83680388A26A7CCAC4DA453C789072135FC206004537A5B1F5F946F456760ACBB55A3FBD
8,897,871 UART: mbox::rt_entry...
8,898,243 UART: ____ _ _ _ ____ _____
8,899,027 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,899,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,900,595 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,901,363 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,902,131 UART: |_|
8,902,443 UART:
9,186,643 UART: [rt] Runtime listening for mailbox commands...
9,187,671 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
893,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,481 UART: [kat] ++
897,633 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,538 UART: [kat] HMAC-384Kdf
923,074 UART: [kat] LMS
1,171,402 UART: [kat] --
1,172,219 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,370 UART: [idev] ++
1,175,538 UART: [idev] CDI.KEYID = 6
1,175,898 UART: [idev] SUBJECT.KEYID = 7
1,176,322 UART: [idev] UDS.KEYID = 0
1,176,667 ready_for_fw is high
1,176,667 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,210 UART: [idev] Erasing UDS.KEYID = 0
1,200,679 UART: [idev] Sha1 KeyId Algorithm
1,209,069 UART: [idev] --
1,210,039 UART: [ldev] ++
1,210,207 UART: [ldev] CDI.KEYID = 6
1,210,570 UART: [ldev] SUBJECT.KEYID = 5
1,210,996 UART: [ldev] AUTHORITY.KEYID = 7
1,211,459 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,928 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,032 >>> mbox cmd response: success
2,775,148 UART: [afmc] ++
2,775,316 UART: [afmc] CDI.KEYID = 6
2,775,678 UART: [afmc] SUBJECT.KEYID = 7
2,776,103 UART: [afmc] AUTHORITY.KEYID = 5
2,811,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,343 UART: [afmc] --
2,855,389 UART: [cold-reset] --
2,856,379 UART: [state] Locking Datavault
2,857,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,310 UART: [state] Locking ICCM
2,858,926 UART: [exit] Launching FMC @ 0x40000130
2,864,255 UART:
2,864,271 UART: Running Caliptra FMC ...
2,864,679 UART:
2,864,733 UART: [state] CFI Enabled
2,875,054 UART: [fht] FMC Alias Private Key: 7
2,983,255 UART: [art] Extend RT PCRs Done
2,983,683 UART: [art] Lock RT PCRs Done
2,985,313 UART: [art] Populate DV Done
2,993,548 UART: [fht] FMC Alias Private Key: 7
2,994,706 UART: [art] Derive CDI
2,994,986 UART: [art] Store in in slot 0x4
3,080,577 UART: [art] Derive Key Pair
3,080,937 UART: [art] Store priv key in slot 0x5
3,093,701 UART: [art] Derive Key Pair - Done
3,108,414 UART: [art] Signing Cert with AUTHO
3,108,894 UART: RITY.KEYID = 7
3,124,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,789 UART: [art] PUB.X = 59E9FB996687CC0009BCECE624D595DE9EA2887584A7A98B21A6FDD3CFED0962E09489E2124D55A3DC0DBB146FBE793C
3,131,544 UART: [art] PUB.Y = E9E7C1367A765F739611AE29F1B8AC3A958BC6283363F8D6CA276D7C66EF9D8F8EAB7E5B78DFEBE297F9E7422B855137
3,138,506 UART: [art] SIG.R = 87145AB3AB8966F5FF2AF3B32C19196114A1756DC5BBD9851A35D676B17E7C809D8795EA71E30F07A36A1D43240657DC
3,145,269 UART: [art] SIG.S = FBF071FAECAC388EA39715043F5785AAE3D28FBF611DAA513B87BE4DCE37B2915F377B1B73258EAD7EDF565891ED1E9C
3,169,153 UART: Caliptra RT
3,169,407 UART: [state] CFI Enabled
3,276,968 UART: [rt] RT listening for mailbox commands...
3,277,638 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,409 UART: [rt]cmd =0x50435252, len=8
3,308,901 >>> mbox cmd response data (8 bytes)
3,308,902 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,874 UART:
3,309,890 UART: Running Caliptra ROM ...
3,310,298 UART:
3,310,353 UART: [state] CFI Enabled
3,313,049 UART: [state] LifecycleState = Unprovisioned
3,313,704 UART: [state] DebugLocked = No
3,314,198 UART: [state] WD Timer not started. Device not locked for debugging
3,315,536 UART: [kat] SHA2-256
4,121,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,311 UART: [kat] ++
4,125,463 UART: [kat] sha1
4,129,637 UART: [kat] SHA2-256
4,131,577 UART: [kat] SHA2-384
4,134,284 UART: [kat] SHA2-512-ACC
4,136,184 UART: [kat] ECC-384
4,145,931 UART: [kat] HMAC-384Kdf
4,150,543 UART: [kat] LMS
4,398,871 UART: [kat] --
4,399,729 UART: [update-reset] ++
5,302,684 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,715 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,989 >>> mbox cmd response: success
5,399,989 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,400,236 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,250 UART: [update-reset Success] --
5,409,063 UART: [state] Locking Datavault
5,409,929 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,533 UART: [state] Locking ICCM
5,411,073 UART: [exit] Launching FMC @ 0x40000130
5,416,402 UART:
5,416,418 UART: Running Caliptra FMC ...
5,416,826 UART:
5,416,880 UART: [state] CFI Enabled
5,506,057 UART: [art] Extend RT PCRs Done
5,506,485 UART: [art] Lock RT PCRs Done
5,507,748 UART: [art] Populate DV Done
5,515,743 UART: [fht] FMC Alias Private Key: 7
5,516,877 UART: [art] Derive CDI
5,517,157 UART: [art] Store in in slot 0x4
5,603,058 UART: [art] Derive Key Pair
5,603,418 UART: [art] Store priv key in slot 0x5
5,617,114 UART: [art] Derive Key Pair - Done
5,632,117 UART: [art] Signing Cert with AUTHO
5,632,597 UART: RITY.KEYID = 7
5,647,761 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,526 UART: [art] PUB.X = A0736EC0EF9EE7431989376EE6D3434C2B5ED844973A635A653E3F10C7EE82DB5666B963770D36347BCEF080B3EAC621
5,655,297 UART: [art] PUB.Y = 2563A4B0800289424BD1AE225B910616D2AEFE4882D3C3414E2B0B3759D937C99CC8A415E115D28CA3AF4A164861DA18
5,662,238 UART: [art] SIG.R = D07EE95AAC9AD4517A601F813BD703C73CAEB36C0CD54C087DBFF1613C357F04AFC57931D3D197328A1F440E94D0E351
5,669,005 UART: [art] SIG.S = 10412A7A6403B4E65CBEC5FD752F50BFDD69048CD2E80245129CA8A0D08FE0C8FB7CF4BD4FBD14CFEF45CF07BD6D5949
5,693,080 UART: mbox::rt_entry...
5,693,452 UART: ____ _ _ _ ____ _____
5,694,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,036 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,804 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,572 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,340 UART: |_|
5,697,652 UART:
5,979,876 UART: [rt] Runtime listening for mailbox commands...
5,980,904 >>> mbox cmd response data (128 bytes)
5,980,905 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,981,016 UART:
5,981,032 UART: Running Caliptra ROM ...
5,981,440 UART:
5,981,495 UART: [state] CFI Enabled
5,983,669 UART: [state] LifecycleState = Unprovisioned
5,984,324 UART: [state] DebugLocked = No
5,984,922 UART: [state] WD Timer not started. Device not locked for debugging
5,986,256 UART: [kat] SHA2-256
6,791,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,796,031 UART: [kat] ++
6,796,183 UART: [kat] sha1
6,800,551 UART: [kat] SHA2-256
6,802,491 UART: [kat] SHA2-384
6,805,406 UART: [kat] SHA2-512-ACC
6,807,306 UART: [kat] ECC-384
6,817,105 UART: [kat] HMAC-384Kdf
6,821,755 UART: [kat] LMS
7,070,083 UART: [kat] --
7,071,079 UART: [update-reset] ++
7,974,734 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,975,733 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,072,007 >>> mbox cmd response: success
8,072,007 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,072,220 UART: [update-reset] Copying MAN_2 To MAN_1
8,080,234 UART: [update-reset Success] --
8,081,363 UART: [state] Locking Datavault
8,082,185 UART: [state] Locking PCR0, PCR1 and PCR31
8,082,789 UART: [state] Locking ICCM
8,083,335 UART: [exit] Launching FMC @ 0x40000130
8,088,664 UART:
8,088,680 UART: Running Caliptra FMC ...
8,089,088 UART:
8,089,142 UART: [state] CFI Enabled
8,177,983 UART: [art] Extend RT PCRs Done
8,178,411 UART: [art] Lock RT PCRs Done
8,179,378 UART: [art] Populate DV Done
8,187,995 UART: [fht] FMC Alias Private Key: 7
8,188,929 UART: [art] Derive CDI
8,189,209 UART: [art] Store in in slot 0x4
8,274,784 UART: [art] Derive Key Pair
8,275,144 UART: [art] Store priv key in slot 0x5
8,288,532 UART: [art] Derive Key Pair - Done
8,303,214 UART: [art] Signing Cert with AUTHO
8,303,694 UART: RITY.KEYID = 7
8,318,864 UART: [art] Erasing AUTHORITY.KEYID = 7
8,319,629 UART: [art] PUB.X = EE7565BB01077B060F93BE43E3D5109A586A67C1890987B691E60907AAC5C89FE2672BCF1C6D33D885BC90E7B9C5F7AE
8,326,386 UART: [art] PUB.Y = 3B96CD71E6488FF066F2C4AF5CB92FED70D4C04037E4C0DB484691892B563B2787DF27F838E05F54E0337FCF95FDDB11
8,333,346 UART: [art] SIG.R = E7651EF0BE74EA3B5055B7CDB85E2206DF0A1AB41640D09DE9C8BD5C2D37F9A141113C95B528E3A4C6F41A45D71F1177
8,340,122 UART: [art] SIG.S = 19E8F58A4E063FEE54DA763B8DA81D054437C99603713B83B5005E6E0893F0826733CBEE7BD5DF934A7F394B23C4A54F
8,364,137 UART: mbox::rt_entry...
8,364,509 UART: ____ _ _ _ ____ _____
8,365,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,366,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,366,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,367,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,368,397 UART: |_|
8,368,709 UART:
8,651,621 UART: [rt] Runtime listening for mailbox commands...
8,652,649 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,795 ready_for_fw is high
1,059,795 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,509 >>> mbox cmd response: success
2,690,043 UART:
2,690,059 UART: Running Caliptra FMC ...
2,690,467 UART:
2,690,521 UART: [state] CFI Enabled
2,700,552 UART: [fht] FMC Alias Private Key: 7
2,808,479 UART: [art] Extend RT PCRs Done
2,808,907 UART: [art] Lock RT PCRs Done
2,810,129 UART: [art] Populate DV Done
2,818,294 UART: [fht] FMC Alias Private Key: 7
2,819,236 UART: [art] Derive CDI
2,819,516 UART: [art] Store in in slot 0x4
2,905,103 UART: [art] Derive Key Pair
2,905,463 UART: [art] Store priv key in slot 0x5
2,918,269 UART: [art] Derive Key Pair - Done
2,932,790 UART: [art] Signing Cert with AUTHO
2,933,270 UART: RITY.KEYID = 7
2,948,382 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,147 UART: [art] PUB.X = 69DFA21C573F065685AEF10BD480BBEA34846D14BABDA6A16526FE096D446BED1BC626DCE04CB5C8F58638E0F090015F
2,955,921 UART: [art] PUB.Y = 084BAB69C824B29307661DA849EA8F0C26EC81AB93522F1DEAD5AFD6EF9522819582862646A2F4F435C0A306CD81039E
2,962,860 UART: [art] SIG.R = E8E0FCDDB86E1CA9B4366F4697DCCDE11EF0196261BE2546DC1D766BA9941CE0C4410CD0E679A8C628C72F27E8BE0F27
2,969,642 UART: [art] SIG.S = AA81654A9CED43DCE33827AD12E6E2808D3BDB37D4C59751942D3861CC8E5BE261DB3747E57AFEC8097167320CF4DD9F
2,993,217 UART: Caliptra RT
2,993,471 UART: [state] CFI Enabled
3,101,270 UART: [rt] RT listening for mailbox commands...
3,101,940 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,575 UART: [rt]cmd =0x50435252, len=8
3,133,095 >>> mbox cmd response data (8 bytes)
3,133,096 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,107,864 >>> mbox cmd response: success
5,107,864 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,121,072 UART:
5,121,088 UART: Running Caliptra FMC ...
5,121,496 UART:
5,121,550 UART: [state] CFI Enabled
5,210,739 UART: [art] Extend RT PCRs Done
5,211,167 UART: [art] Lock RT PCRs Done
5,212,558 UART: [art] Populate DV Done
5,220,561 UART: [fht] FMC Alias Private Key: 7
5,221,637 UART: [art] Derive CDI
5,221,917 UART: [art] Store in in slot 0x4
5,307,798 UART: [art] Derive Key Pair
5,308,158 UART: [art] Store priv key in slot 0x5
5,321,066 UART: [art] Derive Key Pair - Done
5,335,936 UART: [art] Signing Cert with AUTHO
5,336,416 UART: RITY.KEYID = 7
5,351,622 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,387 UART: [art] PUB.X = 6FDB4BCBE888C4C60FC65175E73E9B4DA7FD3686C3B1D02D8197363DC495047072AB181B0F3AC9CAC76B4EC73B14DEB0
5,359,166 UART: [art] PUB.Y = 3378ED7EDC15202017C6AAC496B72CAE8ED38F38F9E2DE47A356A289C46B3F6167FB49396BB011039301104B31CDECE3
5,366,118 UART: [art] SIG.R = F8384FD83FA6F2724672F58F83869AD666BCF9110E0ABA066E7F3F96DB2F2479815F27E8088DCA12457E3EF29CFCD82F
5,372,886 UART: [art] SIG.S = 90E2F2D07E86379EE2A4F5AF2567232408C3058844802F13D223FF46BD4497FE15D1D942E8A584D7692468B291FB810F
5,396,354 UART: mbox::rt_entry...
5,396,726 UART: ____ _ _ _ ____ _____
5,397,510 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,398,310 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,399,078 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,399,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,400,614 UART: |_|
5,400,926 UART:
5,683,481 UART: [rt] Runtime listening for mailbox commands...
5,684,509 >>> mbox cmd response data (128 bytes)
5,684,510 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,658,353 >>> mbox cmd response: success
7,658,353 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,671,615 UART:
7,671,631 UART: Running Caliptra FMC ...
7,672,039 UART:
7,672,093 UART: [state] CFI Enabled
7,760,812 UART: [art] Extend RT PCRs Done
7,761,240 UART: [art] Lock RT PCRs Done
7,762,307 UART: [art] Populate DV Done
7,770,320 UART: [fht] FMC Alias Private Key: 7
7,771,356 UART: [art] Derive CDI
7,771,636 UART: [art] Store in in slot 0x4
7,857,303 UART: [art] Derive Key Pair
7,857,663 UART: [art] Store priv key in slot 0x5
7,870,865 UART: [art] Derive Key Pair - Done
7,885,665 UART: [art] Signing Cert with AUTHO
7,886,145 UART: RITY.KEYID = 7
7,901,159 UART: [art] Erasing AUTHORITY.KEYID = 7
7,901,924 UART: [art] PUB.X = B0784D1E27C8C7F71F8B45F23AB7FB6F1CFF0D8BE6B7B80F55CE2D117E9B93963D433294ECEF7E7EBEA6A4DA960F6A68
7,908,709 UART: [art] PUB.Y = 5EEDAE5B7B1C623CE08A0B1CABA677B3F6AEBA1AE79BA80A1FAEB2655124DA18338D8154058E29D0956536BD82B02BD8
7,915,670 UART: [art] SIG.R = 229FF6D951085B5F2C9770F0F44A40748506123AEAE9D6CB08A99FDC69EAB868F9D6048A157644D88C7091754563EF95
7,922,426 UART: [art] SIG.S = 99995DAF198DC26B57C501543BE5DAA519E0B4760BAC1B3D3099BAD99DFAD0F8E6854AB28A487110527641426B13FF27
7,946,207 UART: mbox::rt_entry...
7,946,579 UART: ____ _ _ _ ____ _____
7,947,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,948,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,948,931 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,949,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,950,467 UART: |_|
7,950,779 UART:
8,230,205 UART: [rt] Runtime listening for mailbox commands...
8,231,233 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,172,078 UART: [cold-reset] ++
1,172,604 UART: [fht] FHT @ 0x50003400
1,175,113 UART: [idev] ++
1,175,281 UART: [idev] CDI.KEYID = 6
1,175,641 UART: [idev] SUBJECT.KEYID = 7
1,176,065 UART: [idev] UDS.KEYID = 0
1,176,410 ready_for_fw is high
1,176,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,906 UART: [idev] Sha1 KeyId Algorithm
1,209,378 UART: [idev] --
1,210,396 UART: [ldev] ++
1,210,564 UART: [ldev] CDI.KEYID = 6
1,210,927 UART: [ldev] SUBJECT.KEYID = 5
1,211,353 UART: [ldev] AUTHORITY.KEYID = 7
1,211,816 UART: [ldev] FE.KEYID = 1
1,216,978 UART: [ldev] Erasing FE.KEYID = 1
1,243,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,170 UART: [ldev] --
1,282,453 UART: [fwproc] Wait for Commands...
1,283,079 UART: [fwproc] Recv command 0x46574c44
1,283,807 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,671 >>> mbox cmd response: success
2,774,681 UART: [afmc] ++
2,774,849 UART: [afmc] CDI.KEYID = 6
2,775,211 UART: [afmc] SUBJECT.KEYID = 7
2,775,636 UART: [afmc] AUTHORITY.KEYID = 5
2,811,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,660 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,930 UART: [afmc] --
2,855,010 UART: [cold-reset] --
2,855,920 UART: [state] Locking Datavault
2,857,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,977 UART: [state] Locking ICCM
2,858,641 UART: [exit] Launching FMC @ 0x40000130
2,863,970 UART:
2,863,986 UART: Running Caliptra FMC ...
2,864,394 UART:
2,864,537 UART: [state] CFI Enabled
2,875,198 UART: [fht] FMC Alias Private Key: 7
2,983,665 UART: [art] Extend RT PCRs Done
2,984,093 UART: [art] Lock RT PCRs Done
2,985,331 UART: [art] Populate DV Done
2,993,470 UART: [fht] FMC Alias Private Key: 7
2,994,556 UART: [art] Derive CDI
2,994,836 UART: [art] Store in in slot 0x4
3,080,439 UART: [art] Derive Key Pair
3,080,799 UART: [art] Store priv key in slot 0x5
3,094,169 UART: [art] Derive Key Pair - Done
3,108,691 UART: [art] Signing Cert with AUTHO
3,109,171 UART: RITY.KEYID = 7
3,124,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,942 UART: [art] PUB.X = 195932A2E2B78BC586B39060DC88498A947882B7DB3D4479977385C43AE10B642B7B8EB19E2C28A943564943DA5430AE
3,131,703 UART: [art] PUB.Y = 563605BE7902EF5C2D1B67A670379F693F7A9E4C5FE4985ED189203C0EC870B6CFE83E4A9B4A406B11078DCD2B7DBDCD
3,138,655 UART: [art] SIG.R = A0B97AFF09B5136829DBF5AB334B93345DF0DEADB49D402354C30B68B77DC53DB8C157445C9A65AF60779A386E814C8E
3,145,429 UART: [art] SIG.S = 97E0FC56073928A3084BF24049D63DEF4982439957A233D99C951EFFF7656CB3811443B4E6E679B4030CCEF4BEBB10DF
3,169,034 UART: Caliptra RT
3,169,380 UART: [state] CFI Enabled
3,276,721 UART: [rt] RT listening for mailbox commands...
3,277,391 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,652 UART: [rt]cmd =0x50435252, len=8
3,308,220 >>> mbox cmd response data (8 bytes)
3,308,221 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,929 UART:
3,308,945 UART: Running Caliptra ROM ...
3,309,353 UART:
3,309,495 UART: [state] CFI Enabled
3,312,273 UART: [state] LifecycleState = Unprovisioned
3,312,928 UART: [state] DebugLocked = No
3,313,464 UART: [state] WD Timer not started. Device not locked for debugging
3,314,654 UART: [kat] SHA2-256
4,120,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,429 UART: [kat] ++
4,124,581 UART: [kat] sha1
4,128,905 UART: [kat] SHA2-256
4,130,845 UART: [kat] SHA2-384
4,133,520 UART: [kat] SHA2-512-ACC
4,135,420 UART: [kat] ECC-384
4,145,119 UART: [kat] HMAC-384Kdf
4,149,825 UART: [kat] LMS
4,398,153 UART: [kat] --
4,398,901 UART: [update-reset] ++
5,302,654 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,729 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,400,003 >>> mbox cmd response: success
5,400,003 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,400,120 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,134 UART: [update-reset Success] --
5,409,027 UART: [state] Locking Datavault
5,409,929 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,533 UART: [state] Locking ICCM
5,411,191 UART: [exit] Launching FMC @ 0x40000130
5,416,520 UART:
5,416,536 UART: Running Caliptra FMC ...
5,416,944 UART:
5,417,087 UART: [state] CFI Enabled
5,506,952 UART: [art] Extend RT PCRs Done
5,507,380 UART: [art] Lock RT PCRs Done
5,508,555 UART: [art] Populate DV Done
5,516,778 UART: [fht] FMC Alias Private Key: 7
5,517,902 UART: [art] Derive CDI
5,518,182 UART: [art] Store in in slot 0x4
5,604,085 UART: [art] Derive Key Pair
5,604,445 UART: [art] Store priv key in slot 0x5
5,618,171 UART: [art] Derive Key Pair - Done
5,633,260 UART: [art] Signing Cert with AUTHO
5,633,740 UART: RITY.KEYID = 7
5,648,706 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,471 UART: [art] PUB.X = 8DBDBFBEC4D1968B1056105D2797F5681EB394199BFAD4FE9613BFFBE5E4CAD9268B81D9D6FAADA3FE8357A6936CAEBB
5,656,269 UART: [art] PUB.Y = CDA93E3878F8EC8194FBA73566ECA46454C6FCEDB55E07576EF91D62E0E4CE0209F2F38134F41AAE57206A7B6D80A5F7
5,663,224 UART: [art] SIG.R = 77ECF99CE09CF7A96D9B9825478E514A0C60FC636168E9BB8B4B65611EEA4DB09E726A97E059686552A5E26153907132
5,669,989 UART: [art] SIG.S = 435CD7601DB89E59307B9315F320EBBB60947367245D0414B0366D26D7BD927DF0BAC3C0C32BE1DD76EC8F429E0745C1
5,693,734 UART: mbox::rt_entry...
5,694,106 UART: ____ _ _ _ ____ _____
5,694,890 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,690 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,696,458 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,697,226 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,994 UART: |_|
5,698,306 UART:
5,973,626 UART: [rt] Runtime listening for mailbox commands...
5,974,654 >>> mbox cmd response data (128 bytes)
5,974,655 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,974,766 UART:
5,974,782 UART: Running Caliptra ROM ...
5,975,190 UART:
5,975,332 UART: [state] CFI Enabled
5,978,030 UART: [state] LifecycleState = Unprovisioned
5,978,685 UART: [state] DebugLocked = No
5,979,403 UART: [state] WD Timer not started. Device not locked for debugging
5,980,721 UART: [kat] SHA2-256
6,786,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,790,496 UART: [kat] ++
6,790,648 UART: [kat] sha1
6,795,092 UART: [kat] SHA2-256
6,797,032 UART: [kat] SHA2-384
6,799,725 UART: [kat] SHA2-512-ACC
6,801,625 UART: [kat] ECC-384
6,811,198 UART: [kat] HMAC-384Kdf
6,815,790 UART: [kat] LMS
7,064,118 UART: [kat] --
7,065,034 UART: [update-reset] ++
7,967,463 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,968,520 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,064,794 >>> mbox cmd response: success
8,064,794 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,065,081 UART: [update-reset] Copying MAN_2 To MAN_1
8,073,095 UART: [update-reset Success] --
8,073,978 UART: [state] Locking Datavault
8,074,846 UART: [state] Locking PCR0, PCR1 and PCR31
8,075,450 UART: [state] Locking ICCM
8,076,110 UART: [exit] Launching FMC @ 0x40000130
8,081,439 UART:
8,081,455 UART: Running Caliptra FMC ...
8,081,863 UART:
8,082,006 UART: [state] CFI Enabled
8,170,911 UART: [art] Extend RT PCRs Done
8,171,339 UART: [art] Lock RT PCRs Done
8,172,390 UART: [art] Populate DV Done
8,180,665 UART: [fht] FMC Alias Private Key: 7
8,181,677 UART: [art] Derive CDI
8,181,957 UART: [art] Store in in slot 0x4
8,267,184 UART: [art] Derive Key Pair
8,267,544 UART: [art] Store priv key in slot 0x5
8,281,286 UART: [art] Derive Key Pair - Done
8,296,281 UART: [art] Signing Cert with AUTHO
8,296,761 UART: RITY.KEYID = 7
8,312,101 UART: [art] Erasing AUTHORITY.KEYID = 7
8,312,866 UART: [art] PUB.X = E121B12C251DD113D7F27F3CFF8ECF85DE7D209547CDAFE0092EF2161CC4342FC57BDA8C21719F4FAAA8CA8D257F301C
8,319,655 UART: [art] PUB.Y = 7D8643936A334B74BDBF600560A1F513629B2881630124CB64C60654DBA257F4014CA896D2A7B8AED6F3A80777D56ABA
8,326,590 UART: [art] SIG.R = 5ACFB3CCB8836E48D6AB74D0AF2EAAAA6F824241B3739468BECAC59AF134BD040B168DA74F13D2787FF0D3FFF03D2DC3
8,333,380 UART: [art] SIG.S = 884B3DBDECC3AE28E5442E776E88752ED4E760B6EE9A04464C13F08B5683C4A522CFFC86E0205F49BAC919CA7836C1EB
8,357,664 UART: mbox::rt_entry...
8,358,036 UART: ____ _ _ _ ____ _____
8,358,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,359,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,360,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,361,156 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,361,924 UART: |_|
8,362,236 UART:
8,643,712 UART: [rt] Runtime listening for mailbox commands...
8,644,740 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,566 ready_for_fw is high
1,060,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,396 >>> mbox cmd response: success
2,689,958 UART:
2,689,974 UART: Running Caliptra FMC ...
2,690,382 UART:
2,690,525 UART: [state] CFI Enabled
2,701,308 UART: [fht] FMC Alias Private Key: 7
2,808,779 UART: [art] Extend RT PCRs Done
2,809,207 UART: [art] Lock RT PCRs Done
2,810,865 UART: [art] Populate DV Done
2,819,268 UART: [fht] FMC Alias Private Key: 7
2,820,260 UART: [art] Derive CDI
2,820,540 UART: [art] Store in in slot 0x4
2,905,827 UART: [art] Derive Key Pair
2,906,187 UART: [art] Store priv key in slot 0x5
2,919,867 UART: [art] Derive Key Pair - Done
2,934,665 UART: [art] Signing Cert with AUTHO
2,935,145 UART: RITY.KEYID = 7
2,950,221 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,986 UART: [art] PUB.X = 03C7368A9F31C95EF12E3AEBB82A8D531B6E9C546E0B48B670C60C8D45EF9CEE0A2FF049DFFE1E35C7E96F8FF4BB8B35
2,957,768 UART: [art] PUB.Y = 929FF8735F98603668A4BAC20F844A312B9BB4B15CF0B4015860EB649CE2F61C9A29960FD7209835377462CCE3359884
2,964,703 UART: [art] SIG.R = E89955723344F263A5DA3B0B1146B79772D4587FD0C44F4713D43D91962D70A325BF1CB548077FAB6EFFD72F91D7CF2A
2,971,471 UART: [art] SIG.S = 9DD8A320804DADC7D5C27ED759E1FB41F405F79584FE29D144A71F7CB63C298392E1A97E642B90A0CAF22F6A60CE7D03
2,994,386 UART: Caliptra RT
2,994,732 UART: [state] CFI Enabled
3,102,871 UART: [rt] RT listening for mailbox commands...
3,103,541 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,132 UART: [rt]cmd =0x50435252, len=8
3,134,524 >>> mbox cmd response data (8 bytes)
3,134,525 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,984 >>> mbox cmd response: success
5,109,984 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,123,354 UART:
5,123,370 UART: Running Caliptra FMC ...
5,123,778 UART:
5,123,921 UART: [state] CFI Enabled
5,213,018 UART: [art] Extend RT PCRs Done
5,213,446 UART: [art] Lock RT PCRs Done
5,214,655 UART: [art] Populate DV Done
5,223,042 UART: [fht] FMC Alias Private Key: 7
5,223,974 UART: [art] Derive CDI
5,224,254 UART: [art] Store in in slot 0x4
5,309,923 UART: [art] Derive Key Pair
5,310,283 UART: [art] Store priv key in slot 0x5
5,323,679 UART: [art] Derive Key Pair - Done
5,338,287 UART: [art] Signing Cert with AUTHO
5,338,767 UART: RITY.KEYID = 7
5,354,039 UART: [art] Erasing AUTHORITY.KEYID = 7
5,354,804 UART: [art] PUB.X = 42B9817D1CBEB5CEF83D1F7D1805B7AEDD6F234685D16049F9389B03E561E2DAD86C631031C5A7C5819BBB624365D728
5,361,574 UART: [art] PUB.Y = 5E713B492791CA31200FCE58E368BCD16E5C6BEEC52CAB642192E3D433EF2E8FF21C20E0FA1F7505607F170873EB4D8E
5,368,527 UART: [art] SIG.R = 5DEBCB2749A3F344FAC4630F16BC916011AA5FFACF6481A7C0D5758954C3DACECB4A895AF328A6CDAEE386AAFF494BCC
5,375,324 UART: [art] SIG.S = 07E6CFED23A3D7FBDE32F27062E6B5D4DC8D3BC6AB7E14DDA692480F498AA1F1DF394696AD57C56892FAF26C02335BA8
5,399,130 UART: mbox::rt_entry...
5,399,502 UART: ____ _ _ _ ____ _____
5,400,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,401,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,401,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,403,390 UART: |_|
5,403,702 UART:
5,682,226 UART: [rt] Runtime listening for mailbox commands...
5,683,254 >>> mbox cmd response data (128 bytes)
5,683,255 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,658,701 >>> mbox cmd response: success
7,658,701 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,672,181 UART:
7,672,197 UART: Running Caliptra FMC ...
7,672,605 UART:
7,672,748 UART: [state] CFI Enabled
7,762,277 UART: [art] Extend RT PCRs Done
7,762,705 UART: [art] Lock RT PCRs Done
7,763,946 UART: [art] Populate DV Done
7,772,309 UART: [fht] FMC Alias Private Key: 7
7,773,259 UART: [art] Derive CDI
7,773,539 UART: [art] Store in in slot 0x4
7,859,354 UART: [art] Derive Key Pair
7,859,714 UART: [art] Store priv key in slot 0x5
7,873,400 UART: [art] Derive Key Pair - Done
7,888,624 UART: [art] Signing Cert with AUTHO
7,889,104 UART: RITY.KEYID = 7
7,904,496 UART: [art] Erasing AUTHORITY.KEYID = 7
7,905,261 UART: [art] PUB.X = 8DBCCFB8C7D9D7B4D4CA1B2EE8A32DBA441F4C11022910CA2249752274EBCF1EAC56561422997196008AC264ED4F1767
7,912,016 UART: [art] PUB.Y = 0AEBA6A5DF5C74AD212FD848A1B6A478F239E8B726E88278EC8537FA7904370E61A44D0CFF512124F62E9FD9073E531E
7,918,959 UART: [art] SIG.R = 1C5B8386340BB1D4A10543D0A80E02E210D475BE031953054449510BA16FEF479940C62B1C1E55BBAA2A3F2403BD7FE3
7,925,707 UART: [art] SIG.S = EA41BA6DE772037975AD1CE322F6FF5C5127A921825F00FD2C5C23EB956D100F1FBC63AAB22DD6F536314DB72EEA524C
7,948,806 UART: mbox::rt_entry...
7,949,178 UART: ____ _ _ _ ____ _____
7,949,962 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,950,762 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,951,530 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,952,298 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,953,066 UART: |_|
7,953,378 UART:
8,233,916 UART: [rt] Runtime listening for mailbox commands...
8,234,944 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
891,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,174,415 ready_for_fw is high
1,174,415 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,175 UART: [idev] Sha1 KeyId Algorithm
1,208,091 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,612 UART: [ldev] --
1,280,990 UART: [fwproc] Wait for Commands...
1,281,623 UART: [fwproc] Recv command 0x46574c44
1,282,356 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,184 >>> mbox cmd response: success
2,773,245 UART: [afmc] ++
2,773,413 UART: [afmc] CDI.KEYID = 6
2,773,776 UART: [afmc] SUBJECT.KEYID = 7
2,774,202 UART: [afmc] AUTHORITY.KEYID = 5
2,809,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,575 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,948 UART: [afmc] --
2,852,904 UART: [cold-reset] --
2,853,828 UART: [state] Locking Datavault
2,854,869 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,473 UART: [state] Locking ICCM
2,855,967 UART: [exit] Launching FMC @ 0x40000130
2,861,296 UART:
2,861,312 UART: Running Caliptra FMC ...
2,861,720 UART:
2,861,774 UART: [state] CFI Enabled
2,872,263 UART: [fht] FMC Alias Private Key: 7
2,980,272 UART: [art] Extend RT PCRs Done
2,980,700 UART: [art] Lock RT PCRs Done
2,982,538 UART: [art] Populate DV Done
2,990,889 UART: [fht] FMC Alias Private Key: 7
2,991,843 UART: [art] Derive CDI
2,992,123 UART: [art] Store in in slot 0x4
3,077,718 UART: [art] Derive Key Pair
3,078,078 UART: [art] Store priv key in slot 0x5
3,091,074 UART: [art] Derive Key Pair - Done
3,106,037 UART: [art] Signing Cert with AUTHO
3,106,517 UART: RITY.KEYID = 7
3,121,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,602 UART: [art] PUB.X = F15B6048A93AE299DC54F90E61AED0C0E111FAB47BDD4827C6EE3CAE53B69A7BB557EE990CCED2CC8885EFEA8BCF5AB8
3,129,398 UART: [art] PUB.Y = B1AF9019888A68EF188E9DB5C1C36ADA39242953EBC1842E50E1FB48C57B677590174F4568FCCC6BB40F590DCD16DA0D
3,136,351 UART: [art] SIG.R = 81C69E99A58AA1646A4F0AB73FF016DB9B97172A6F4E0CC3D9861E36B18E129774A5DFED45DBBB9AAD39575DA8F64E55
3,143,131 UART: [art] SIG.S = 0BB2F1CDAF55E709561A611406FDC167C8A4D67B2D7544C1255031764375C1297C42FB072DF36717ED8764EFE951739B
3,166,924 UART: Caliptra RT
3,167,178 UART: [state] CFI Enabled
3,274,970 UART: [rt] RT listening for mailbox commands...
3,275,640 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,197 UART: [rt]cmd =0x50435252, len=8
3,306,639 >>> mbox cmd response data (8 bytes)
3,306,640 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,262 UART:
3,307,278 UART: Running Caliptra ROM ...
3,307,686 UART:
3,307,741 UART: [state] CFI Enabled
3,310,403 UART: [state] LifecycleState = Unprovisioned
3,311,058 UART: [state] DebugLocked = No
3,311,672 UART: [state] WD Timer not started. Device not locked for debugging
3,312,950 UART: [kat] SHA2-256
4,116,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,629 UART: [kat] ++
4,120,781 UART: [kat] sha1
4,124,813 UART: [kat] SHA2-256
4,126,753 UART: [kat] SHA2-384
4,129,272 UART: [kat] SHA2-512-ACC
4,131,172 UART: [kat] ECC-384
4,140,683 UART: [kat] HMAC-384Kdf
4,145,145 UART: [kat] LMS
4,393,457 UART: [kat] --
4,394,417 UART: [update-reset] ++
5,299,111 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,300,090 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,396,364 >>> mbox cmd response: success
5,396,364 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,396,599 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,613 UART: [update-reset Success] --
5,405,614 UART: [state] Locking Datavault
5,406,244 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,848 UART: [state] Locking ICCM
5,407,286 UART: [exit] Launching FMC @ 0x40000130
5,412,615 UART:
5,412,631 UART: Running Caliptra FMC ...
5,413,039 UART:
5,413,093 UART: [state] CFI Enabled
5,502,272 UART: [art] Extend RT PCRs Done
5,502,700 UART: [art] Lock RT PCRs Done
5,503,645 UART: [art] Populate DV Done
5,512,064 UART: [fht] FMC Alias Private Key: 7
5,513,184 UART: [art] Derive CDI
5,513,464 UART: [art] Store in in slot 0x4
5,599,077 UART: [art] Derive Key Pair
5,599,437 UART: [art] Store priv key in slot 0x5
5,613,035 UART: [art] Derive Key Pair - Done
5,628,065 UART: [art] Signing Cert with AUTHO
5,628,545 UART: RITY.KEYID = 7
5,643,681 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,446 UART: [art] PUB.X = A1A2F4101461FB1154BFCA011377F16B25AF59610839EBEC0A623A072051F3B4CBCACA7DB4F6A57C2CE78EF4D182FFD7
5,651,222 UART: [art] PUB.Y = B932F399B911A56DDEB669E6FE4FF81E653D5C65CB667BABDF4017AC9D3E24374878B1F33B8B54D24246C8D81C8804D8
5,658,179 UART: [art] SIG.R = 51AC440E207DA3516590D668984C6087A689096E2826EB7B41C92E43C138FDB20D8FE6CB7A3301546BB8BD147E154050
5,664,933 UART: [art] SIG.S = F3021B72F55DDFBC5DC1D727E13E29B8FA203DDAAB05FB58168A005ACBE28F6A1606840C24F35D44D0463B95B0D302FD
5,688,485 UART: mbox::rt_entry...
5,688,857 UART: ____ _ _ _ ____ _____
5,689,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,690,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,691,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,691,977 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,692,745 UART: |_|
5,693,057 UART:
5,972,211 UART: [rt] Runtime listening for mailbox commands...
5,973,239 >>> mbox cmd response data (128 bytes)
5,973,240 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,973,351 UART:
5,973,367 UART: Running Caliptra ROM ...
5,973,775 UART:
5,973,830 UART: [state] CFI Enabled
5,976,106 UART: [state] LifecycleState = Unprovisioned
5,976,761 UART: [state] DebugLocked = No
5,977,393 UART: [state] WD Timer not started. Device not locked for debugging
5,978,569 UART: [kat] SHA2-256
6,782,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,786,248 UART: [kat] ++
6,786,400 UART: [kat] sha1
6,790,698 UART: [kat] SHA2-256
6,792,638 UART: [kat] SHA2-384
6,795,253 UART: [kat] SHA2-512-ACC
6,797,153 UART: [kat] ECC-384
6,806,730 UART: [kat] HMAC-384Kdf
6,811,284 UART: [kat] LMS
7,059,596 UART: [kat] --
7,060,372 UART: [update-reset] ++
7,963,547 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,964,524 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,060,798 >>> mbox cmd response: success
8,060,798 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,060,909 UART: [update-reset] Copying MAN_2 To MAN_1
8,068,923 UART: [update-reset Success] --
8,070,006 UART: [state] Locking Datavault
8,070,724 UART: [state] Locking PCR0, PCR1 and PCR31
8,071,328 UART: [state] Locking ICCM
8,071,988 UART: [exit] Launching FMC @ 0x40000130
8,077,317 UART:
8,077,333 UART: Running Caliptra FMC ...
8,077,741 UART:
8,077,795 UART: [state] CFI Enabled
8,166,580 UART: [art] Extend RT PCRs Done
8,167,008 UART: [art] Lock RT PCRs Done
8,168,479 UART: [art] Populate DV Done
8,176,826 UART: [fht] FMC Alias Private Key: 7
8,177,800 UART: [art] Derive CDI
8,178,080 UART: [art] Store in in slot 0x4
8,263,839 UART: [art] Derive Key Pair
8,264,199 UART: [art] Store priv key in slot 0x5
8,277,077 UART: [art] Derive Key Pair - Done
8,291,854 UART: [art] Signing Cert with AUTHO
8,292,334 UART: RITY.KEYID = 7
8,307,790 UART: [art] Erasing AUTHORITY.KEYID = 7
8,308,555 UART: [art] PUB.X = 8BA947327CB83B69FD9277183E3EED8BDD02254C63022E825DD8D8F86B503C94E977A39CEF40BCDEC0340D1E33CD381E
8,315,328 UART: [art] PUB.Y = 4CCFC9B20AAD6D7E457E82280EDC05D03D7688B7B6055E52DA3BAB079AE58608E4E68FC3B1ABC5822A002539ED31CC46
8,322,254 UART: [art] SIG.R = EEBC320F7EFF2FA0870A5FEC9E33A53CEA546CFF5177DCB45FE9D7DE2006A297870D6F07AF5921360CEB0F3DF8D570C8
8,329,027 UART: [art] SIG.S = 9793CC47987D6481FA1DA0AA7AA9B8ABF70379133A86C78F852C76B6BEBC0239086F54B95B9A5912225FCE041BE41D1F
8,352,348 UART: mbox::rt_entry...
8,352,720 UART: ____ _ _ _ ____ _____
8,353,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,354,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,355,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,355,840 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,356,608 UART: |_|
8,356,920 UART:
8,633,683 UART: [rt] Runtime listening for mailbox commands...
8,634,711 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,244 ready_for_fw is high
1,056,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,366 >>> mbox cmd response: success
2,683,434 UART:
2,683,450 UART: Running Caliptra FMC ...
2,683,858 UART:
2,683,912 UART: [state] CFI Enabled
2,694,553 UART: [fht] FMC Alias Private Key: 7
2,802,850 UART: [art] Extend RT PCRs Done
2,803,278 UART: [art] Lock RT PCRs Done
2,804,900 UART: [art] Populate DV Done
2,813,327 UART: [fht] FMC Alias Private Key: 7
2,814,275 UART: [art] Derive CDI
2,814,555 UART: [art] Store in in slot 0x4
2,900,316 UART: [art] Derive Key Pair
2,900,676 UART: [art] Store priv key in slot 0x5
2,914,224 UART: [art] Derive Key Pair - Done
2,928,758 UART: [art] Signing Cert with AUTHO
2,929,238 UART: RITY.KEYID = 7
2,944,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,947 UART: [art] PUB.X = 39FD023F91AA0F831AD877C62CB53AA0085CB54989F7AD93644AA3998B01D95AE63BA99076A5E13029E994EB78AB620A
2,951,708 UART: [art] PUB.Y = 2CA4551628910F53D5F20DB0223CD0A841CEC71F14578E4A572AE7EB086280361837B230288725C9D957FC64D939F191
2,958,641 UART: [art] SIG.R = E2AC186974EAF3C9BD138FA34F0A05596DFFA5C17F2732215F5C5499D550484E3AAB1CE0F007D3BAE11D0C63DBFB3832
2,965,415 UART: [art] SIG.S = DD076BBECE1BA2B6F2293235EE4C5CA544AED7CF10960FF14812E0FF22531479B6EF07A8F3C96499C584559B5BA5E5BE
2,989,169 UART: Caliptra RT
2,989,423 UART: [state] CFI Enabled
3,096,716 UART: [rt] RT listening for mailbox commands...
3,097,386 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,011 UART: [rt]cmd =0x50435252, len=8
3,128,555 >>> mbox cmd response data (8 bytes)
3,128,556 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,098,841 >>> mbox cmd response: success
5,098,841 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,112,183 UART:
5,112,199 UART: Running Caliptra FMC ...
5,112,607 UART:
5,112,661 UART: [state] CFI Enabled
5,201,754 UART: [art] Extend RT PCRs Done
5,202,182 UART: [art] Lock RT PCRs Done
5,203,587 UART: [art] Populate DV Done
5,211,822 UART: [fht] FMC Alias Private Key: 7
5,212,988 UART: [art] Derive CDI
5,213,268 UART: [art] Store in in slot 0x4
5,298,871 UART: [art] Derive Key Pair
5,299,231 UART: [art] Store priv key in slot 0x5
5,312,793 UART: [art] Derive Key Pair - Done
5,327,469 UART: [art] Signing Cert with AUTHO
5,327,949 UART: RITY.KEYID = 7
5,343,553 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,318 UART: [art] PUB.X = E57D7E300CE3A53EBF19313797DFCFCFAD6A8780095B91A2C9D2DE6D203EDF95CF7AB20D89B40242E227080DC69F5F2B
5,351,088 UART: [art] PUB.Y = 71732786F1D0BB842C471812EEAED42AAE7FE4BF46B4C246C3C2791AB4EB479590814818A3B99DEA46D147C7208F3858
5,358,042 UART: [art] SIG.R = 6DAAC70D38B4E67C4C0691C295065DBC60F5106911A88DEA4AB01CA5CB6677189EDF04CDC73D9B27427836DBA89DB4F9
5,364,814 UART: [art] SIG.S = B65DC1850F2F66CB6645FAAA37DE427BBE8A291F66B666ADB3E5613318C42EAB0E3949D42833117E76B0802397236452
5,388,859 UART: mbox::rt_entry...
5,389,231 UART: ____ _ _ _ ____ _____
5,390,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,390,815 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,391,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,392,351 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,393,119 UART: |_|
5,393,431 UART:
5,673,787 UART: [rt] Runtime listening for mailbox commands...
5,674,815 >>> mbox cmd response data (128 bytes)
5,674,816 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,646,108 >>> mbox cmd response: success
7,646,108 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,659,424 UART:
7,659,440 UART: Running Caliptra FMC ...
7,659,848 UART:
7,659,902 UART: [state] CFI Enabled
7,748,823 UART: [art] Extend RT PCRs Done
7,749,251 UART: [art] Lock RT PCRs Done
7,750,462 UART: [art] Populate DV Done
7,758,703 UART: [fht] FMC Alias Private Key: 7
7,759,785 UART: [art] Derive CDI
7,760,065 UART: [art] Store in in slot 0x4
7,845,458 UART: [art] Derive Key Pair
7,845,818 UART: [art] Store priv key in slot 0x5
7,858,868 UART: [art] Derive Key Pair - Done
7,873,361 UART: [art] Signing Cert with AUTHO
7,873,841 UART: RITY.KEYID = 7
7,889,417 UART: [art] Erasing AUTHORITY.KEYID = 7
7,890,182 UART: [art] PUB.X = 8FEAFD48B19B9DA6CA7366929592ED63912171D9A7EC09C93B510A8F554757273C826A4BB8967DCD197C30630C3356E8
7,896,943 UART: [art] PUB.Y = 84B895574644EDB3B0A4CEDC7C5AA64C66D3686E65C9FC891AA31A982DFE9A44E0E5848A2302FF399F3DE67F4703BD2E
7,903,901 UART: [art] SIG.R = 7EFE0696670C208B3772A581A3C8E04C862BD3FAC84D791995085304F0C6B2016F58A0AA30B972AB2D098435C6F98088
7,910,649 UART: [art] SIG.S = C6544C72609C3F205790D10C4A6A187D0E796117ECE33D22BD848D23E19B0ECF1C60CFDA676E01DFC739AA7944069DF4
7,934,435 UART: mbox::rt_entry...
7,934,807 UART: ____ _ _ _ ____ _____
7,935,591 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,936,391 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,937,159 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,937,927 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,938,695 UART: |_|
7,939,007 UART:
8,218,315 UART: [rt] Runtime listening for mailbox commands...
8,219,343 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,470 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,174,976 ready_for_fw is high
1,174,976 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,626 UART: [idev] Erasing UDS.KEYID = 0
1,200,574 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,519 UART: [fwproc] Wait for Commands...
1,283,308 UART: [fwproc] Recv command 0x46574c44
1,284,041 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,799 >>> mbox cmd response: success
2,775,916 UART: [afmc] ++
2,776,084 UART: [afmc] CDI.KEYID = 6
2,776,447 UART: [afmc] SUBJECT.KEYID = 7
2,776,873 UART: [afmc] AUTHORITY.KEYID = 5
2,812,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,216 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,659 UART: [afmc] --
2,855,653 UART: [cold-reset] --
2,856,317 UART: [state] Locking Datavault
2,857,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,868 UART: [state] Locking ICCM
2,858,288 UART: [exit] Launching FMC @ 0x40000130
2,863,617 UART:
2,863,633 UART: Running Caliptra FMC ...
2,864,041 UART:
2,864,184 UART: [state] CFI Enabled
2,875,115 UART: [fht] FMC Alias Private Key: 7
2,982,702 UART: [art] Extend RT PCRs Done
2,983,130 UART: [art] Lock RT PCRs Done
2,984,254 UART: [art] Populate DV Done
2,992,483 UART: [fht] FMC Alias Private Key: 7
2,993,515 UART: [art] Derive CDI
2,993,795 UART: [art] Store in in slot 0x4
3,080,218 UART: [art] Derive Key Pair
3,080,578 UART: [art] Store priv key in slot 0x5
3,093,824 UART: [art] Derive Key Pair - Done
3,108,789 UART: [art] Signing Cert with AUTHO
3,109,269 UART: RITY.KEYID = 7
3,124,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,242 UART: [art] PUB.X = 1F10C586B38224BE265933D56BE09996F338F55880582E0A6F4C0C197D359BC3CEA84BC722EFC14966DB78CA0312397A
3,132,003 UART: [art] PUB.Y = 2952AB23CD4382E93FF04B940D1694E12D330D6CAFD3FA9AC2426BA82728C6360D8B33BF7C6A589EE131CB13DDE1E88E
3,138,958 UART: [art] SIG.R = FFB04B1BA7289EA9AA4C473530D5B6B52FB146A3F5E69F1A1D9DB33AF5C50A23E4947B9342A8A280B74A1A7A99FE4F4E
3,145,743 UART: [art] SIG.S = 68AD990F3BBF50D83E0635BBB93539F43AF200FA305FCCCFE482963B1785CAD52721164ABA6A1405002F8BEC758279FE
3,169,935 UART: Caliptra RT
3,170,281 UART: [state] CFI Enabled
3,278,559 UART: [rt] RT listening for mailbox commands...
3,279,229 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,078 UART: [rt]cmd =0x50435252, len=8
3,310,462 >>> mbox cmd response data (8 bytes)
3,310,463 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,211 UART:
3,311,227 UART: Running Caliptra ROM ...
3,311,635 UART:
3,311,777 UART: [state] CFI Enabled
3,314,701 UART: [state] LifecycleState = Unprovisioned
3,315,356 UART: [state] DebugLocked = No
3,315,944 UART: [state] WD Timer not started. Device not locked for debugging
3,317,070 UART: [kat] SHA2-256
4,120,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,749 UART: [kat] ++
4,124,901 UART: [kat] sha1
4,129,291 UART: [kat] SHA2-256
4,131,231 UART: [kat] SHA2-384
4,134,108 UART: [kat] SHA2-512-ACC
4,136,008 UART: [kat] ECC-384
4,145,791 UART: [kat] HMAC-384Kdf
4,150,205 UART: [kat] LMS
4,398,517 UART: [kat] --
4,399,019 UART: [update-reset] ++
5,302,621 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,594 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,868 >>> mbox cmd response: success
5,399,868 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,400,211 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,225 UART: [update-reset Success] --
5,409,026 UART: [state] Locking Datavault
5,409,848 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,452 UART: [state] Locking ICCM
5,410,988 UART: [exit] Launching FMC @ 0x40000130
5,416,317 UART:
5,416,333 UART: Running Caliptra FMC ...
5,416,741 UART:
5,416,884 UART: [state] CFI Enabled
5,506,721 UART: [art] Extend RT PCRs Done
5,507,149 UART: [art] Lock RT PCRs Done
5,508,414 UART: [art] Populate DV Done
5,516,845 UART: [fht] FMC Alias Private Key: 7
5,517,927 UART: [art] Derive CDI
5,518,207 UART: [art] Store in in slot 0x4
5,603,932 UART: [art] Derive Key Pair
5,604,292 UART: [art] Store priv key in slot 0x5
5,617,460 UART: [art] Derive Key Pair - Done
5,632,056 UART: [art] Signing Cert with AUTHO
5,632,536 UART: RITY.KEYID = 7
5,647,926 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,691 UART: [art] PUB.X = 4AC6B506DB414F6CBA4D1B1BF05BD19C6703C0CF72609FBE0C9D6728006B6FBD895526BA9D949255BB354570BEFED3F0
5,655,446 UART: [art] PUB.Y = 1529A2A6AC4D410ABBAEA24865A2275F856755D6AFA7F135BBD738242D90F90F56DA07DC87A9A6938D7F8C1384C768E5
5,662,395 UART: [art] SIG.R = 4491EBA65406340F0FB361A08FBB2ABC0FA191030C7A83A5D5E7CF28DB28953C975B6C0CD346F6E35FB40238F2713568
5,669,147 UART: [art] SIG.S = 41ECC136C9916EA340CA79B7FF33F63F80A5126C22FD856C7A2B2D2A11BF42C8130B43AA59401CA47B2BB1876A7A046A
5,692,886 UART: mbox::rt_entry...
5,693,258 UART: ____ _ _ _ ____ _____
5,694,042 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,694,842 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,610 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,378 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,146 UART: |_|
5,697,458 UART:
5,975,428 UART: [rt] Runtime listening for mailbox commands...
5,976,456 >>> mbox cmd response data (128 bytes)
5,976,457 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,976,568 UART:
5,976,584 UART: Running Caliptra ROM ...
5,976,992 UART:
5,977,134 UART: [state] CFI Enabled
5,980,216 UART: [state] LifecycleState = Unprovisioned
5,980,871 UART: [state] DebugLocked = No
5,981,423 UART: [state] WD Timer not started. Device not locked for debugging
5,982,619 UART: [kat] SHA2-256
6,786,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,790,298 UART: [kat] ++
6,790,450 UART: [kat] sha1
6,794,608 UART: [kat] SHA2-256
6,796,548 UART: [kat] SHA2-384
6,799,217 UART: [kat] SHA2-512-ACC
6,801,117 UART: [kat] ECC-384
6,810,948 UART: [kat] HMAC-384Kdf
6,815,584 UART: [kat] LMS
7,063,896 UART: [kat] --
7,064,678 UART: [update-reset] ++
7,968,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,970,017 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,066,291 >>> mbox cmd response: success
8,066,291 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,066,438 UART: [update-reset] Copying MAN_2 To MAN_1
8,074,452 UART: [update-reset Success] --
8,075,393 UART: [state] Locking Datavault
8,075,979 UART: [state] Locking PCR0, PCR1 and PCR31
8,076,583 UART: [state] Locking ICCM
8,077,159 UART: [exit] Launching FMC @ 0x40000130
8,082,488 UART:
8,082,504 UART: Running Caliptra FMC ...
8,082,912 UART:
8,083,055 UART: [state] CFI Enabled
8,172,056 UART: [art] Extend RT PCRs Done
8,172,484 UART: [art] Lock RT PCRs Done
8,173,903 UART: [art] Populate DV Done
8,182,008 UART: [fht] FMC Alias Private Key: 7
8,183,028 UART: [art] Derive CDI
8,183,308 UART: [art] Store in in slot 0x4
8,269,353 UART: [art] Derive Key Pair
8,269,713 UART: [art] Store priv key in slot 0x5
8,283,343 UART: [art] Derive Key Pair - Done
8,297,854 UART: [art] Signing Cert with AUTHO
8,298,334 UART: RITY.KEYID = 7
8,313,284 UART: [art] Erasing AUTHORITY.KEYID = 7
8,314,049 UART: [art] PUB.X = 9BE0750FA3EEF7120C67A3502906403E791E87C7363093F75E3C6AD22DE98726BD6AF784547577B5D591CCC580A1CB87
8,320,810 UART: [art] PUB.Y = C40AAF3542CAE4AD8520B60A5178E190990978F038271F1D582D878AC3102BA9C605379F6BFBD0DB22BC14B335C5B517
8,327,752 UART: [art] SIG.R = 3F4EF8CBE49305A1B686E2C51A27358A73DA2485815300F80FD4D408D86CF2CA110FFDCE93F0E92D02B27A39FAB5E5E8
8,334,499 UART: [art] SIG.S = 6EC8A667C641A1571909544CECA22FC4E5D1A0C4E1E9940B9C774720541A90559577824D9F42590351EDAB121E001F0A
8,358,184 UART: mbox::rt_entry...
8,358,556 UART: ____ _ _ _ ____ _____
8,359,340 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,360,140 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,360,908 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,361,676 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,362,444 UART: |_|
8,362,756 UART:
8,640,658 UART: [rt] Runtime listening for mailbox commands...
8,641,686 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,303 ready_for_fw is high
1,056,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,273 >>> mbox cmd response: success
2,686,069 UART:
2,686,085 UART: Running Caliptra FMC ...
2,686,493 UART:
2,686,636 UART: [state] CFI Enabled
2,697,215 UART: [fht] FMC Alias Private Key: 7
2,804,796 UART: [art] Extend RT PCRs Done
2,805,224 UART: [art] Lock RT PCRs Done
2,806,728 UART: [art] Populate DV Done
2,815,055 UART: [fht] FMC Alias Private Key: 7
2,816,115 UART: [art] Derive CDI
2,816,395 UART: [art] Store in in slot 0x4
2,902,362 UART: [art] Derive Key Pair
2,902,722 UART: [art] Store priv key in slot 0x5
2,916,358 UART: [art] Derive Key Pair - Done
2,930,926 UART: [art] Signing Cert with AUTHO
2,931,406 UART: RITY.KEYID = 7
2,946,484 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,249 UART: [art] PUB.X = B255289ECD4CF6CFA9D042CAB49FD75DD151157B95C60C65DDAC0BAB1CC3777889E4268A152F4806F7F5F123882D3E41
2,954,022 UART: [art] PUB.Y = 07B9E0512BC1742463C82E4E0DBD80E25D182648D5AB140DD1FA434FA01605EC68F04D3180564ECCAFC097586A98D5F0
2,960,966 UART: [art] SIG.R = 8B49C92A68849501A797E9D56775F5DB02C656D1C56FDCC77D7B2F3DF73EA92B01191B2C9E794FD5CEEB99C6A5BF9B63
2,967,741 UART: [art] SIG.S = A2DA190F119078792DEC0EF5B367944707D6830113A1E2C9516EC0D28E45F9B4E7E2478D04AE21BDDB6F48C6079F278B
2,991,288 UART: Caliptra RT
2,991,634 UART: [state] CFI Enabled
3,099,145 UART: [rt] RT listening for mailbox commands...
3,099,815 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,240 UART: [rt]cmd =0x50435252, len=8
3,130,754 >>> mbox cmd response data (8 bytes)
3,130,755 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,101,339 >>> mbox cmd response: success
5,101,339 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,114,955 UART:
5,114,971 UART: Running Caliptra FMC ...
5,115,379 UART:
5,115,522 UART: [state] CFI Enabled
5,204,721 UART: [art] Extend RT PCRs Done
5,205,149 UART: [art] Lock RT PCRs Done
5,206,396 UART: [art] Populate DV Done
5,214,469 UART: [fht] FMC Alias Private Key: 7
5,215,633 UART: [art] Derive CDI
5,215,913 UART: [art] Store in in slot 0x4
5,301,866 UART: [art] Derive Key Pair
5,302,226 UART: [art] Store priv key in slot 0x5
5,315,312 UART: [art] Derive Key Pair - Done
5,330,083 UART: [art] Signing Cert with AUTHO
5,330,563 UART: RITY.KEYID = 7
5,345,777 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,542 UART: [art] PUB.X = F159AA70C451547EBA4B9B21CCD31112DBBAF548CD05BC71ED07C8EB60B4CF06B951D11C2A09C05680761D06968E8CB7
5,353,311 UART: [art] PUB.Y = 68EDD2667A77D00FCE1AD9B35B5F5B651888EDB98A36356F03784E6E63B60351945F9F31F88D744697C2BABBECEAB0A7
5,360,264 UART: [art] SIG.R = 448299AD960DA4D0E464A1B7A75B8E93E75BA1B191E784E14B73148F907DDE9733489120CC1156627361D412D27818E4
5,367,023 UART: [art] SIG.S = 5EC0D01FEA0CC778891FBBFFCCC37E15B308D345DE7D8021A7CC77C72A051925D3224B84BFF066F5C6BE793DA8C9E5BA
5,390,637 UART: mbox::rt_entry...
5,391,009 UART: ____ _ _ _ ____ _____
5,391,793 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,593 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,394,129 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,897 UART: |_|
5,395,209 UART:
5,676,287 UART: [rt] Runtime listening for mailbox commands...
5,677,315 >>> mbox cmd response data (128 bytes)
5,677,316 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,646,931 >>> mbox cmd response: success
7,646,931 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,660,253 UART:
7,660,269 UART: Running Caliptra FMC ...
7,660,677 UART:
7,660,820 UART: [state] CFI Enabled
7,749,633 UART: [art] Extend RT PCRs Done
7,750,061 UART: [art] Lock RT PCRs Done
7,751,518 UART: [art] Populate DV Done
7,759,739 UART: [fht] FMC Alias Private Key: 7
7,760,697 UART: [art] Derive CDI
7,760,977 UART: [art] Store in in slot 0x4
7,846,496 UART: [art] Derive Key Pair
7,846,856 UART: [art] Store priv key in slot 0x5
7,860,028 UART: [art] Derive Key Pair - Done
7,874,881 UART: [art] Signing Cert with AUTHO
7,875,361 UART: RITY.KEYID = 7
7,890,683 UART: [art] Erasing AUTHORITY.KEYID = 7
7,891,448 UART: [art] PUB.X = EE81956D75734C5B877A20C207E4F59026C3561CA037F363FAA592D6698D17CABE36B01413600EF96728065C307354C2
7,898,201 UART: [art] PUB.Y = 27642F60F0026F8415F110E6D43DCE1276AB82EE592265AB18FDCDD55E09F0F088F53ED6BAE52610AB0A60B45063C503
7,905,145 UART: [art] SIG.R = 4EC9C777BF78CDCE694D2BD1391A60327A5CCF0C7B36745F81B5C1562B30008BBFD944AC3088B0967FE66DAB5FC5CE97
7,911,906 UART: [art] SIG.S = 168F1E9948D2E7FB52E662DAA26AC027358885F3B4E666686F8F6D223CAA96B1F1DC96BA2B9B0ED743C9C40D1701FE7C
7,935,458 UART: mbox::rt_entry...
7,935,830 UART: ____ _ _ _ ____ _____
7,936,614 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,937,414 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,938,182 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,938,950 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,939,718 UART: |_|
7,940,030 UART:
8,221,008 UART: [rt] Runtime listening for mailbox commands...
8,222,036 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,573 UART:
192,937 UART: Running Caliptra ROM ...
194,025 UART:
194,162 UART: [state] CFI Enabled
261,147 UART: [state] LifecycleState = Unprovisioned
263,048 UART: [state] DebugLocked = No
264,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,339 UART: [kat] SHA2-256
439,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,565 UART: [kat] ++
450,039 UART: [kat] sha1
460,309 UART: [kat] SHA2-256
462,948 UART: [kat] SHA2-384
468,109 UART: [kat] SHA2-512-ACC
470,543 UART: [kat] ECC-384
2,765,090 UART: [kat] HMAC-384Kdf
2,777,653 UART: [kat] LMS
3,967,951 UART: [kat] --
3,970,948 UART: [cold-reset] ++
3,972,376 UART: [fht] Storing FHT @ 0x50003400
3,985,281 UART: [idev] ++
3,985,958 UART: [idev] CDI.KEYID = 6
3,986,865 UART: [idev] SUBJECT.KEYID = 7
3,988,105 UART: [idev] UDS.KEYID = 0
3,989,083 ready_for_fw is high
3,989,266 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,132,517 UART: [idev] Erasing UDS.KEYID = 0
7,327,201 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,010 UART: [idev] --
7,353,976 UART: [ldev] ++
7,354,555 UART: [ldev] CDI.KEYID = 6
7,355,511 UART: [ldev] SUBJECT.KEYID = 5
7,356,719 UART: [ldev] AUTHORITY.KEYID = 7
7,357,893 UART: [ldev] FE.KEYID = 1
7,402,389 UART: [ldev] Erasing FE.KEYID = 1
10,733,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,633 UART: [ldev] --
13,094,830 UART: [fwproc] Waiting for Commands...
13,097,476 UART: [fwproc] Received command 0x46574c44
13,099,670 UART: [fwproc] Received Image of size 114036 bytes
17,152,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,611,100 >>> mbox cmd response: success
17,614,882 UART: [afmc] ++
17,615,479 UART: [afmc] CDI.KEYID = 6
17,616,383 UART: [afmc] SUBJECT.KEYID = 7
17,617,652 UART: [afmc] AUTHORITY.KEYID = 5
20,988,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,990 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,253 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,654 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,529 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,925 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,780 UART: [afmc] --
23,357,316 UART: [cold-reset] --
23,362,525 UART: [state] Locking Datavault
23,368,111 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,866 UART: [state] Locking ICCM
23,371,412 UART: [exit] Launching FMC @ 0x40000130
23,379,803 UART:
23,380,038 UART: Running Caliptra FMC ...
23,381,136 UART:
23,381,290 UART: [state] CFI Enabled
23,448,491 UART: [fht] FMC Alias Private Key: 7
25,786,258 UART: [art] Extend RT PCRs Done
25,787,480 UART: [art] Lock RT PCRs Done
25,788,939 UART: [art] Populate DV Done
25,794,559 UART: [fht] FMC Alias Private Key: 7
25,796,096 UART: [art] Derive CDI
25,796,906 UART: [art] Store in in slot 0x4
25,857,353 UART: [art] Derive Key Pair
25,858,393 UART: [art] Store priv key in slot 0x5
29,151,449 UART: [art] Derive Key Pair - Done
29,164,327 UART: [art] Signing Cert with AUTHO
29,165,621 UART: RITY.KEYID = 7
31,453,327 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,835 UART: [art] PUB.X = 2C08E482C7F37E08296AB6A69A35BFACFAEC88B869C98F20E9E765C06A908B6140AE5803EA98F3492D7E48741C97E753
31,462,050 UART: [art] PUB.Y = A89B78DD4736E397AFB628005962EEFA44FAFCCE3FC909D6C40005DCE25CA3FB465B8CCF43DD6B45360BEB35D91D762D
31,469,343 UART: [art] SIG.R = FDB8D64A351DAEF490F254C2B46BB756019478AAFB63B7E250471FF7902CA210288150E1EF2D6DE277C295C32A7793C2
31,476,706 UART: [art] SIG.S = E941001F758C2B5004F6731429F1D31C258104AD9AFFB9BB104A7671344AB6C37F07452D9BB1026D69C282DA9C2134AC
32,781,772 UART: Caliptra RT
32,782,511 UART: [state] CFI Enabled
32,943,582 UART: [rt] RT listening for mailbox commands...
34,999,102 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,100,061 UART:
35,100,472 UART: Running Caliptra ROM ...
35,101,529 UART:
35,101,674 UART: [state] CFI Enabled
35,165,525 UART: [state] LifecycleState = Unprovisioned
35,167,464 UART: [state] DebugLocked = No
35,169,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,174,366 UART: [kat] SHA2-256
35,344,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,354,545 UART: [kat] ++
35,354,995 UART: [kat] sha1
35,365,440 UART: [kat] SHA2-256
35,368,119 UART: [kat] SHA2-384
35,373,612 UART: [kat] SHA2-512-ACC
35,376,007 UART: [kat] ECC-384
37,668,200 UART: [kat] HMAC-384Kdf
37,699,962 UART: [kat] LMS
38,890,290 UART: [kat] --
38,895,544 UART: [update-reset] ++
42,602,785 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,606,562 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,864,763 >>> mbox cmd response: success
42,865,196 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,866,739 UART: [update-reset] Copying MAN_2 To MAN_1
42,889,169 UART: [update-reset Success] --
42,894,753 UART: [state] Locking Datavault
42,897,457 UART: [state] Locking PCR0, PCR1 and PCR31
42,899,205 UART: [state] Locking ICCM
42,901,624 UART: [exit] Launching FMC @ 0x40000130
42,910,013 UART:
42,910,245 UART: Running Caliptra FMC ...
42,911,336 UART:
42,911,506 UART: [state] CFI Enabled
43,004,166 UART: [art] Extend RT PCRs Done
43,005,346 UART: [art] Lock RT PCRs Done
43,006,744 UART: [art] Populate DV Done
43,012,470 UART: [fht] FMC Alias Private Key: 7
43,014,118 UART: [art] Derive CDI
43,014,910 UART: [art] Store in in slot 0x4
43,072,911 UART: [art] Derive Key Pair
43,073,918 UART: [art] Store priv key in slot 0x5
46,366,833 UART: [art] Derive Key Pair - Done
46,379,528 UART: [art] Signing Cert with AUTHO
46,380,877 UART: RITY.KEYID = 7
48,669,987 UART: [art] Erasing AUTHORITY.KEYID = 7
48,671,501 UART: [art] PUB.X = 5E9682BA326E68513BF585578927CD93C6BA75754270FBC5B85EC3BCC69C83606DE2A9D344D2914293D9A6145843ABF5
48,678,742 UART: [art] PUB.Y = 52636855D53ACE21324A3B0B4C4CE49462C5467FA6C8DD6CEF267E223BDA998DB1A63E6FEFF6D78CB8C2FC73B8689748
48,686,015 UART: [art] SIG.R = A953117CE01D35988463256D1D33D0BDA2CC41CF6D9475F8946B0E28F5A2EAE3EBE22939D0EEEAEC371DF4D15576B9DA
48,693,425 UART: [art] SIG.S = 331466EFA1E7C1A46EE0E265B2AC8DFF3058903310A2541FEAD9DC9D5561FE6BDEE90154EA8DFA976F726D270FE961BD
49,997,753 UART: mbox::rt_entry...
49,998,706 UART: ____ _ _ _ ____ _____
50,000,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,002,688 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,004,615 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,006,539 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,008,463 UART: |_|
50,009,299 UART:
50,295,412 UART: [rt] Runtime listening for mailbox commands...
50,297,545 >>> mbox cmd response data (48 bytes)
50,298,131 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,298,596 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,805,753 ready_for_fw is high
3,806,125 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,882,812 >>> mbox cmd response: success
23,573,893 UART:
23,574,298 UART: Running Caliptra FMC ...
23,575,480 UART:
23,575,638 UART: [state] CFI Enabled
23,638,494 UART: [fht] FMC Alias Private Key: 7
25,975,845 UART: [art] Extend RT PCRs Done
25,977,073 UART: [art] Lock RT PCRs Done
25,978,860 UART: [art] Populate DV Done
25,984,329 UART: [fht] FMC Alias Private Key: 7
25,985,917 UART: [art] Derive CDI
25,986,727 UART: [art] Store in in slot 0x4
26,046,544 UART: [art] Derive Key Pair
26,047,594 UART: [art] Store priv key in slot 0x5
29,340,619 UART: [art] Derive Key Pair - Done
29,353,723 UART: [art] Signing Cert with AUTHO
29,355,024 UART: RITY.KEYID = 7
31,641,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,399 UART: [art] PUB.X = 052BA92A2A2690600404202CA39D6554CD1A41CBCFA0024CEAC1CAA354D339955A3D6A21B5F204FC43F31F87A7D51309
31,650,667 UART: [art] PUB.Y = 6576501CD24195994F8A557065FC0EF7E7755CFD983BAB4BF248812673E77A94B8A04FE29415AFCA98DDAAFE84BC2C3F
31,657,911 UART: [art] SIG.R = 16FD8A561CCD3AC3CF70191228C0A246A552F7FA93C5294A1B7E6CAF776D0D0DC50DCB9F61C0A32BA2E7598275EAEF35
31,665,276 UART: [art] SIG.S = 6CC564F0B1F615173B7430F99D651485788428104AD7CC9E967294089D93C0B0D398CCF96E6203CE3704506E8BBB829D
32,970,282 UART: Caliptra RT
32,970,997 UART: [state] CFI Enabled
33,132,233 UART: [rt] RT listening for mailbox commands...
35,192,698 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,144,584 >>> mbox cmd response: success
43,145,105 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,179,390 UART:
43,179,699 UART: Running Caliptra FMC ...
43,180,816 UART:
43,180,971 UART: [state] CFI Enabled
43,276,885 UART: [art] Extend RT PCRs Done
43,278,067 UART: [art] Lock RT PCRs Done
43,279,412 UART: [art] Populate DV Done
43,284,725 UART: [fht] FMC Alias Private Key: 7
43,286,314 UART: [art] Derive CDI
43,287,123 UART: [art] Store in in slot 0x4
43,346,078 UART: [art] Derive Key Pair
43,347,116 UART: [art] Store priv key in slot 0x5
46,639,566 UART: [art] Derive Key Pair - Done
46,652,509 UART: [art] Signing Cert with AUTHO
46,653,803 UART: RITY.KEYID = 7
48,941,028 UART: [art] Erasing AUTHORITY.KEYID = 7
48,942,547 UART: [art] PUB.X = F5CE06560A25BDDB04C9D664037279C5761CB224381D266278061CA3F5C810B149C09FF95355B515A5826D413434C4FF
48,949,779 UART: [art] PUB.Y = AA1B64D7322C280A685DD14971EA28828464D3153E3FBF18C7DCB2696F574F1AE5DED9B0030AB5306EDDB61A2B6D7A38
48,957,049 UART: [art] SIG.R = A2DA92D0D75F6A0F8F762BA3A320A2EDD36246BC22557AA8D12A6F8CA75345DE0E57550DDBCCCBA44BF99AD6DD81A1A8
48,964,432 UART: [art] SIG.S = 572AA4BE51BB04B9F7613591AF1CF87E0FF95EF7AEA3F1D109231D67FD91E306934F8818F577991E9065B54897E4F83B
50,269,454 UART: mbox::rt_entry...
50,270,405 UART: ____ _ _ _ ____ _____
50,272,377 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,274,574 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,276,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,278,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,280,359 UART: |_|
50,281,339 UART:
50,565,816 UART: [rt] Runtime listening for mailbox commands...
50,567,958 >>> mbox cmd response data (48 bytes)
50,568,524 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,568,955 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,357 UART:
192,713 UART: Running Caliptra ROM ...
193,807 UART:
603,708 UART: [state] CFI Enabled
617,784 UART: [state] LifecycleState = Unprovisioned
619,744 UART: [state] DebugLocked = No
622,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,043 UART: [kat] SHA2-256
796,783 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,370 UART: [kat] ++
808,016 UART: [kat] sha1
818,356 UART: [kat] SHA2-256
821,128 UART: [kat] SHA2-384
826,914 UART: [kat] SHA2-512-ACC
829,279 UART: [kat] ECC-384
3,113,716 UART: [kat] HMAC-384Kdf
3,125,803 UART: [kat] LMS
4,315,923 UART: [kat] --
4,320,650 UART: [cold-reset] ++
4,321,522 UART: [fht] Storing FHT @ 0x50003400
4,332,073 UART: [idev] ++
4,332,726 UART: [idev] CDI.KEYID = 6
4,333,635 UART: [idev] SUBJECT.KEYID = 7
4,334,878 UART: [idev] UDS.KEYID = 0
4,335,856 ready_for_fw is high
4,336,051 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,291 UART: [idev] Erasing UDS.KEYID = 0
7,622,349 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,931 UART: [idev] --
7,649,135 UART: [ldev] ++
7,649,703 UART: [ldev] CDI.KEYID = 6
7,650,716 UART: [ldev] SUBJECT.KEYID = 5
7,651,865 UART: [ldev] AUTHORITY.KEYID = 7
7,653,144 UART: [ldev] FE.KEYID = 1
7,663,415 UART: [ldev] Erasing FE.KEYID = 1
10,948,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,295 UART: [ldev] --
13,307,161 UART: [fwproc] Waiting for Commands...
13,309,846 UART: [fwproc] Received command 0x46574c44
13,312,023 UART: [fwproc] Received Image of size 114036 bytes
17,362,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,822,609 >>> mbox cmd response: success
17,827,622 UART: [afmc] ++
17,828,227 UART: [afmc] CDI.KEYID = 6
17,829,137 UART: [afmc] SUBJECT.KEYID = 7
17,830,411 UART: [afmc] AUTHORITY.KEYID = 5
21,145,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,857 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,287 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,108 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,529 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,795 UART: [afmc] --
23,515,308 UART: [cold-reset] --
23,520,142 UART: [state] Locking Datavault
23,526,896 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,643 UART: [state] Locking ICCM
23,530,444 UART: [exit] Launching FMC @ 0x40000130
23,538,845 UART:
23,539,113 UART: Running Caliptra FMC ...
23,540,142 UART:
23,540,287 UART: [state] CFI Enabled
23,548,412 UART: [fht] FMC Alias Private Key: 7
25,879,399 UART: [art] Extend RT PCRs Done
25,880,622 UART: [art] Lock RT PCRs Done
25,882,256 UART: [art] Populate DV Done
25,887,558 UART: [fht] FMC Alias Private Key: 7
25,889,147 UART: [art] Derive CDI
25,889,960 UART: [art] Store in in slot 0x4
25,932,993 UART: [art] Derive Key Pair
25,933,990 UART: [art] Store priv key in slot 0x5
29,175,563 UART: [art] Derive Key Pair - Done
29,188,620 UART: [art] Signing Cert with AUTHO
29,189,927 UART: RITY.KEYID = 7
31,469,343 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,854 UART: [art] PUB.X = B63125371867CEC328DB9D1EA521C044146208A1536E16EED4CDBC8266F82F6C7AA9F1CF985317A1A115BF618CA1DB8E
31,478,110 UART: [art] PUB.Y = 6FAD4C4C79CF3EEFF95B46D82DBE2642D99F3138BE3B967F0671CEA2E1B2CA8A8CF4819EA064448724718CCD1069B802
31,485,343 UART: [art] SIG.R = DF6E416A1BEC1CF38EA210203B829067AC55643E6C6F144BCF8D675387B16FEA2BDDC44AB27E8E96434BBBD8F5460EC9
31,492,741 UART: [art] SIG.S = D64839A3A3E690F28C4FFDC4C650C1384B41077FEA2B9739A07CAC0CDB4697E90AF8BE7C86F6C6EF6D0BCE9D24E12AE7
32,797,930 UART: Caliptra RT
32,798,640 UART: [state] CFI Enabled
32,916,045 UART: [rt] RT listening for mailbox commands...
34,968,881 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,069,780 UART:
35,070,139 UART: Running Caliptra ROM ...
35,071,187 UART:
35,071,403 UART: [state] CFI Enabled
35,082,658 UART: [state] LifecycleState = Unprovisioned
35,084,543 UART: [state] DebugLocked = No
35,086,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,091,283 UART: [kat] SHA2-256
35,261,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,271,544 UART: [kat] ++
35,272,034 UART: [kat] sha1
35,283,370 UART: [kat] SHA2-256
35,286,079 UART: [kat] SHA2-384
35,291,257 UART: [kat] SHA2-512-ACC
35,293,655 UART: [kat] ECC-384
37,579,185 UART: [kat] HMAC-384Kdf
37,591,678 UART: [kat] LMS
38,781,745 UART: [kat] --
38,785,198 UART: [update-reset] ++
42,505,589 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,508,990 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,767,214 >>> mbox cmd response: success
42,767,578 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,768,890 UART: [update-reset] Copying MAN_2 To MAN_1
42,791,292 UART: [update-reset Success] --
42,796,551 UART: [state] Locking Datavault
42,799,962 UART: [state] Locking PCR0, PCR1 and PCR31
42,801,718 UART: [state] Locking ICCM
42,803,539 UART: [exit] Launching FMC @ 0x40000130
42,811,940 UART:
42,812,177 UART: Running Caliptra FMC ...
42,813,278 UART:
42,813,434 UART: [state] CFI Enabled
42,856,700 UART: [art] Extend RT PCRs Done
42,857,889 UART: [art] Lock RT PCRs Done
42,859,504 UART: [art] Populate DV Done
42,865,183 UART: [fht] FMC Alias Private Key: 7
42,866,876 UART: [art] Derive CDI
42,867,687 UART: [art] Store in in slot 0x4
42,910,440 UART: [art] Derive Key Pair
42,911,502 UART: [art] Store priv key in slot 0x5
46,153,628 UART: [art] Derive Key Pair - Done
46,166,679 UART: [art] Signing Cert with AUTHO
46,167,984 UART: RITY.KEYID = 7
48,447,450 UART: [art] Erasing AUTHORITY.KEYID = 7
48,448,961 UART: [art] PUB.X = C1E5B233BF297B2E610D62ABA1315E4E4E70ABF77D2868799E756085D598DB6DCCB80B57FC11DFC8214F045E9E92699C
48,456,200 UART: [art] PUB.Y = 8B023B4C6AC2932FBA2AC85354944814A415EBB0360A90B73F498990A01D4C21C7CD4D1798D69301D7F94EAF445A4A67
48,463,427 UART: [art] SIG.R = 53CE0DA81068E06779B5E0CFFD57C5FC538EC1DE9F9BB782F6FDC789CADDF1D02BBC4494A41ABE0E50C17AEFF987F0C6
48,470,828 UART: [art] SIG.S = 455A190EA245A58B49B35689B30109A361F5A2B2CEF4EA9BFF08C26CD58B7839EE71B1D48EAC1894A0A3A1FAC17FD686
49,775,411 UART: mbox::rt_entry...
49,776,371 UART: ____ _ _ _ ____ _____
49,778,453 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,780,478 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,782,415 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,784,344 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,786,269 UART: |_|
49,787,123 UART:
50,072,486 UART: [rt] Runtime listening for mailbox commands...
50,074,553 >>> mbox cmd response data (48 bytes)
50,075,129 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,075,561 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,126,780 ready_for_fw is high
4,127,165 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,068,369 >>> mbox cmd response: success
23,711,594 UART:
23,711,997 UART: Running Caliptra FMC ...
23,713,107 UART:
23,713,268 UART: [state] CFI Enabled
23,721,053 UART: [fht] FMC Alias Private Key: 7
26,051,944 UART: [art] Extend RT PCRs Done
26,053,169 UART: [art] Lock RT PCRs Done
26,054,938 UART: [art] Populate DV Done
26,060,206 UART: [fht] FMC Alias Private Key: 7
26,061,882 UART: [art] Derive CDI
26,062,706 UART: [art] Store in in slot 0x4
26,104,992 UART: [art] Derive Key Pair
26,106,039 UART: [art] Store priv key in slot 0x5
29,348,000 UART: [art] Derive Key Pair - Done
29,360,980 UART: [art] Signing Cert with AUTHO
29,362,318 UART: RITY.KEYID = 7
31,641,704 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,208 UART: [art] PUB.X = 6D49261AE945B68564564DB946B26DEDD5B22EDC21C879A039864F0A218A9A574F3AD89CD819DB3184577D6506075A34
31,650,427 UART: [art] PUB.Y = 296C4CFA043689D20FD284E143BEE87FAAF8AAD7CC560B510EDB83418BCF8D1455CEAF58D39C2A21EBF3BDCBCC0A6895
31,657,679 UART: [art] SIG.R = 53669072B26FFE3E3C0E6D393B4F6D94E58AD1E82D83AAE21C2918368218A64290AEB455A21B3015B4C31DAB1116DC17
31,665,099 UART: [art] SIG.S = 9B3917DA01426E2BF76338DA982846E356D5D30E4B94DFEC19E3DC8CBF12BBE35CB76540F3271F9700315038004154C5
32,970,198 UART: Caliptra RT
32,970,903 UART: [state] CFI Enabled
33,088,354 UART: [rt] RT listening for mailbox commands...
35,138,499 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,024,311 >>> mbox cmd response: success
43,024,822 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,058,182 UART:
43,058,510 UART: Running Caliptra FMC ...
43,059,549 UART:
43,059,698 UART: [state] CFI Enabled
43,104,111 UART: [art] Extend RT PCRs Done
43,105,258 UART: [art] Lock RT PCRs Done
43,106,782 UART: [art] Populate DV Done
43,112,227 UART: [fht] FMC Alias Private Key: 7
43,113,770 UART: [art] Derive CDI
43,114,503 UART: [art] Store in in slot 0x4
43,157,067 UART: [art] Derive Key Pair
43,158,093 UART: [art] Store priv key in slot 0x5
46,400,269 UART: [art] Derive Key Pair - Done
46,412,891 UART: [art] Signing Cert with AUTHO
46,414,200 UART: RITY.KEYID = 7
48,693,523 UART: [art] Erasing AUTHORITY.KEYID = 7
48,695,032 UART: [art] PUB.X = F22AAD0E545EF1B6403093D480CBA9AD46DEC29E185CAF72C0966F5031F54F6A0F0AE43E3E01942CE403C8D7578ACEA9
48,702,314 UART: [art] PUB.Y = 8E571BADC6E95B7B0BD9A889826D8E160B80B4BA10449038F2207BCCBA99B9947E92F852A288CF5F5CB8A8A8225989FA
48,709,566 UART: [art] SIG.R = FF34F093FEF0BB0E6312A33E6C0C62496FEF161BC785DAD396446DA2EFCB7DC2AD38C31688332AE9B3C2D86975EDD819
48,716,975 UART: [art] SIG.S = A3E719DAFD6517FC6A076E6B3A594898EE4BFE85A8EB563852CE775BD20B36663A9E033357DE17A6A946CF78D3F38E4D
50,021,464 UART: mbox::rt_entry...
50,022,429 UART: ____ _ _ _ ____ _____
50,024,368 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,026,377 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,028,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,030,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,032,066 UART: |_|
50,032,901 UART:
50,321,622 UART: [rt] Runtime listening for mailbox commands...
50,323,745 >>> mbox cmd response data (48 bytes)
50,324,304 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,324,729 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
192,861 UART:
193,226 UART: Running Caliptra ROM ...
194,347 UART:
194,495 UART: [state] CFI Enabled
263,986 UART: [state] LifecycleState = Unprovisioned
265,850 UART: [state] DebugLocked = No
267,235 UART: [state] WD Timer not started. Device not locked for debugging
270,969 UART: [kat] SHA2-256
449,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,202 UART: [kat] ++
461,654 UART: [kat] sha1
472,524 UART: [kat] SHA2-256
475,537 UART: [kat] SHA2-384
481,322 UART: [kat] SHA2-512-ACC
484,269 UART: [kat] ECC-384
2,925,362 UART: [kat] HMAC-384Kdf
2,951,959 UART: [kat] LMS
3,481,403 UART: [kat] --
3,486,111 UART: [cold-reset] ++
3,487,330 UART: [fht] FHT @ 0x50003400
3,499,522 UART: [idev] ++
3,500,092 UART: [idev] CDI.KEYID = 6
3,501,015 UART: [idev] SUBJECT.KEYID = 7
3,502,190 UART: [idev] UDS.KEYID = 0
3,503,112 ready_for_fw is high
3,503,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,647,268 UART: [idev] Erasing UDS.KEYID = 0
6,009,148 UART: [idev] Sha1 KeyId Algorithm
6,032,134 UART: [idev] --
6,036,100 UART: [ldev] ++
6,036,681 UART: [ldev] CDI.KEYID = 6
6,037,596 UART: [ldev] SUBJECT.KEYID = 5
6,038,810 UART: [ldev] AUTHORITY.KEYID = 7
6,040,046 UART: [ldev] FE.KEYID = 1
6,079,101 UART: [ldev] Erasing FE.KEYID = 1
8,584,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,578 UART: [ldev] --
10,391,917 UART: [fwproc] Wait for Commands...
10,394,717 UART: [fwproc] Recv command 0x46574c44
10,396,807 UART: [fwproc] Recv'd Img size: 114360 bytes
13,794,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,262,942 >>> mbox cmd response: success
14,267,678 UART: [afmc] ++
14,268,283 UART: [afmc] CDI.KEYID = 6
14,269,197 UART: [afmc] SUBJECT.KEYID = 7
14,270,524 UART: [afmc] AUTHORITY.KEYID = 5
16,805,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,638 UART: [afmc] --
18,605,137 UART: [cold-reset] --
18,607,434 UART: [state] Locking Datavault
18,613,706 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,349 UART: [state] Locking ICCM
18,616,772 UART: [exit] Launching FMC @ 0x40000130
18,625,224 UART:
18,625,465 UART: Running Caliptra FMC ...
18,626,493 UART:
18,626,640 UART: [state] CFI Enabled
18,687,655 UART: [fht] FMC Alias Private Key: 7
20,451,239 UART: [art] Extend RT PCRs Done
20,452,465 UART: [art] Lock RT PCRs Done
20,454,042 UART: [art] Populate DV Done
20,459,243 UART: [fht] FMC Alias Private Key: 7
20,460,904 UART: [art] Derive CDI
20,461,726 UART: [art] Store in in slot 0x4
20,520,018 UART: [art] Derive Key Pair
20,521,065 UART: [art] Store priv key in slot 0x5
22,984,146 UART: [art] Derive Key Pair - Done
22,997,244 UART: [art] Signing Cert with AUTHO
22,998,573 UART: RITY.KEYID = 7
24,709,531 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,031 UART: [art] PUB.X = 5DE0955E67BC00A55AE34BF3C256FD097D016F3529C216D3F8715795E6488FE3CD40E785CBFE6476B8568C6B1DE549AA
24,718,260 UART: [art] PUB.Y = 400F4AA8578B59D8A796A812E76558B29E7B4A9754AADC5FB0A3514122A3DD41EDCE25885432137976C64AC25DA223BC
24,725,582 UART: [art] SIG.R = 8CF3C85FD3FA17757964440FDB5380912D86CAAE9AB2A48CAAD6BBD21C8F6E92A58B268854DFD52800F7FF24172DF8BB
24,732,947 UART: [art] SIG.S = A8C8ACA21BAC3182DDAE3A078B18A88D1AE0E6D519E785E96E20730F950E801FA5C8279EEAED0143B29FF74FAEFA1CC4
25,712,434 UART: Caliptra RT
25,713,146 UART: [state] CFI Enabled
25,877,500 UART: [rt] RT listening for mailbox commands...
27,929,725 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,030,253 UART:
28,031,524 UART: Running Caliptra ROM ...
28,032,591 UART:
28,032,757 UART: [state] CFI Enabled
28,096,738 UART: [state] LifecycleState = Unprovisioned
28,098,642 UART: [state] DebugLocked = No
28,101,296 UART: [state] WD Timer not started. Device not locked for debugging
28,104,778 UART: [kat] SHA2-256
28,283,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,295,496 UART: [kat] ++
28,295,956 UART: [kat] sha1
28,307,382 UART: [kat] SHA2-256
28,310,412 UART: [kat] SHA2-384
28,316,355 UART: [kat] SHA2-512-ACC
28,319,298 UART: [kat] ECC-384
30,782,071 UART: [kat] HMAC-384Kdf
30,805,534 UART: [kat] LMS
31,335,002 UART: [kat] --
31,339,372 UART: [update-reset] ++
34,335,715 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,339,045 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
34,597,007 >>> mbox cmd response: success
34,597,383 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,598,633 UART: [update-reset] Copying MAN_2 To MAN_1
34,620,968 UART: [update-reset Success] --
34,625,575 UART: [state] Locking Datavault
34,628,283 UART: [state] Locking PCR0, PCR1 and PCR31
34,629,927 UART: [state] Locking ICCM
34,631,100 UART: [exit] Launching FMC @ 0x40000130
34,639,495 UART:
34,639,736 UART: Running Caliptra FMC ...
34,640,760 UART:
34,640,908 UART: [state] CFI Enabled
34,741,262 UART: [art] Extend RT PCRs Done
34,742,447 UART: [art] Lock RT PCRs Done
34,743,820 UART: [art] Populate DV Done
34,749,070 UART: [fht] FMC Alias Private Key: 7
34,750,583 UART: [art] Derive CDI
34,751,338 UART: [art] Store in in slot 0x4
34,810,527 UART: [art] Derive Key Pair
34,811,535 UART: [art] Store priv key in slot 0x5
37,274,524 UART: [art] Derive Key Pair - Done
37,287,607 UART: [art] Signing Cert with AUTHO
37,288,918 UART: RITY.KEYID = 7
38,999,727 UART: [art] Erasing AUTHORITY.KEYID = 7
39,001,230 UART: [art] PUB.X = 30101333CBF1B96F7FEAD7F7A6C50579A0E2C8FBAEA14C14140C708F8981ACE54582853770CBC1C391A2636B68A03542
39,008,533 UART: [art] PUB.Y = A15F1105CC140A4BADD58C3768C367DC85A799FC7B8E3E7086DDF55AFD6EA383D6ECA902F0EDE46B26D3AE66345EB2D8
39,015,817 UART: [art] SIG.R = 984D57DAD9821B41DF906A4790DB8050B54B283D0B914CF772B2DF15A03AAA70003361085B1200C7AE02E43CDD9045E7
39,023,147 UART: [art] SIG.S = 77B48CEFF200292433248A6BA748F662FC08830D38DA4CD2BA315E7ECBF25B9A5F8A5A9FF5724516C27F347AAF200E62
40,001,949 UART: mbox::rt_entry...
40,002,918 UART: ____ _ _ _ ____ _____
40,004,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,006,871 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,008,733 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,010,662 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,012,709 UART: |_|
40,013,524 UART:
40,295,660 UART: [rt] Runtime listening for mailbox commands...
40,297,776 >>> mbox cmd response data (48 bytes)
40,298,352 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,298,793 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,666 UART:
193,030 UART: Running Caliptra ROM ...
194,183 UART:
194,332 UART: [state] CFI Enabled
263,120 UART: [state] LifecycleState = Unprovisioned
265,584 UART: [state] DebugLocked = No
268,034 UART: [state] WD Timer not started. Device not locked for debugging
272,194 UART: [kat] SHA2-256
462,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,843 UART: [kat] ++
473,502 UART: [kat] sha1
483,418 UART: [kat] SHA2-256
486,388 UART: [kat] SHA2-384
492,550 UART: [kat] SHA2-512-ACC
495,143 UART: [kat] ECC-384
2,946,230 UART: [kat] HMAC-384Kdf
2,969,772 UART: [kat] LMS
3,501,496 UART: [kat] --
3,505,841 UART: [cold-reset] ++
3,507,129 UART: [fht] FHT @ 0x50003400
3,518,889 UART: [idev] ++
3,519,515 UART: [idev] CDI.KEYID = 6
3,520,401 UART: [idev] SUBJECT.KEYID = 7
3,521,525 UART: [idev] UDS.KEYID = 0
3,522,487 ready_for_fw is high
3,522,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,447 UART: [idev] Erasing UDS.KEYID = 0
6,026,193 UART: [idev] Sha1 KeyId Algorithm
6,050,176 UART: [idev] --
6,054,515 UART: [ldev] ++
6,055,250 UART: [ldev] CDI.KEYID = 6
6,056,137 UART: [ldev] SUBJECT.KEYID = 5
6,057,301 UART: [ldev] AUTHORITY.KEYID = 7
6,058,547 UART: [ldev] FE.KEYID = 1
6,099,126 UART: [ldev] Erasing FE.KEYID = 1
8,602,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,078 UART: [ldev] --
10,411,200 UART: [fwproc] Wait for Commands...
10,414,260 UART: [fwproc] Recv command 0x46574c44
10,416,513 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,605,257 >>> mbox cmd response: success
14,609,422 UART: [afmc] ++
14,610,132 UART: [afmc] CDI.KEYID = 6
14,611,376 UART: [afmc] SUBJECT.KEYID = 7
14,612,820 UART: [afmc] AUTHORITY.KEYID = 5
17,151,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,297 UART: [afmc] --
18,967,069 UART: [cold-reset] --
18,971,267 UART: [state] Locking Datavault
18,976,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,075 UART: [state] Locking ICCM
18,981,452 UART: [exit] Launching FMC @ 0x40000130
18,990,127 UART:
18,990,371 UART: Running Caliptra FMC ...
18,991,473 UART:
18,991,629 UART: [state] CFI Enabled
19,051,284 UART: [fht] FMC Alias Private Key: 7
20,814,751 UART: [art] Extend RT PCRs Done
20,815,968 UART: [art] Lock RT PCRs Done
20,817,507 UART: [art] Populate DV Done
20,822,749 UART: [fht] FMC Alias Private Key: 7
20,824,336 UART: [art] Derive CDI
20,825,070 UART: [art] Store in in slot 0x4
20,884,695 UART: [art] Derive Key Pair
20,885,730 UART: [art] Store priv key in slot 0x5
23,348,729 UART: [art] Derive Key Pair - Done
23,361,291 UART: [art] Signing Cert with AUTHO
23,362,623 UART: RITY.KEYID = 7
25,075,416 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,929 UART: [art] PUB.X = AAD4E882B83155B84EA560E35B0A8F03ABFA54A0DC32E53A053C7BCAA8EFE994AB10107D6CD38BD7767A357F4F8E00D4
25,084,210 UART: [art] PUB.Y = 55421D94070E397BC02910FA2F3C1E87A94AC2C9402AF9B00251BCF49F2F7A48FBD19CEBBEC8148F13CF2879421C523D
25,091,483 UART: [art] SIG.R = 3D95340414469A885166C77DA178F8D805A27D38F5D85DE9356257D065954FD733F06590560789141C75D4BCE5B71883
25,098,807 UART: [art] SIG.S = 7BA9FA45AC7ECB79B491BA962613717DF1444004DC95E329CC3B384CF3B1823887873A18ACBDB54B078ECBA394BF257C
26,077,494 UART: Caliptra RT
26,078,191 UART: [state] CFI Enabled
26,243,626 UART: [rt] RT listening for mailbox commands...
28,296,123 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,396,506 UART:
28,396,861 UART: Running Caliptra ROM ...
28,397,912 UART:
28,398,063 UART: [state] CFI Enabled
28,470,112 UART: [state] LifecycleState = Unprovisioned
28,472,186 UART: [state] DebugLocked = No
28,473,863 UART: [state] WD Timer not started. Device not locked for debugging
28,479,131 UART: [kat] SHA2-256
28,668,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,679,116 UART: [kat] ++
28,679,660 UART: [kat] sha1
28,691,148 UART: [kat] SHA2-256
28,694,161 UART: [kat] SHA2-384
28,701,065 UART: [kat] SHA2-512-ACC
28,703,637 UART: [kat] ECC-384
31,148,382 UART: [kat] HMAC-384Kdf
31,174,406 UART: [kat] LMS
31,705,978 UART: [kat] --
31,708,235 UART: [update-reset] ++
34,731,054 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,733,999 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,127,360 >>> mbox cmd response: success
35,127,771 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,129,033 UART: [update-reset] Copying MAN_2 To MAN_1
35,166,589 UART: [update-reset Success] --
35,168,618 UART: [state] Locking Datavault
35,172,688 UART: [state] Locking PCR0, PCR1 and PCR31
35,174,826 UART: [state] Locking ICCM
35,177,895 UART: [exit] Launching FMC @ 0x40000130
35,186,566 UART:
35,186,799 UART: Running Caliptra FMC ...
35,187,900 UART:
35,188,080 UART: [state] CFI Enabled
35,281,436 UART: [art] Extend RT PCRs Done
35,282,634 UART: [art] Lock RT PCRs Done
35,283,986 UART: [art] Populate DV Done
35,289,505 UART: [fht] FMC Alias Private Key: 7
35,291,146 UART: [art] Derive CDI
35,291,962 UART: [art] Store in in slot 0x4
35,350,649 UART: [art] Derive Key Pair
35,351,650 UART: [art] Store priv key in slot 0x5
37,814,421 UART: [art] Derive Key Pair - Done
37,827,405 UART: [art] Signing Cert with AUTHO
37,828,712 UART: RITY.KEYID = 7
39,540,175 UART: [art] Erasing AUTHORITY.KEYID = 7
39,541,675 UART: [art] PUB.X = DF91138C36E7B1EE8B31740503CCB2914E161AE73A91AEFDC5CC7B730473BD2D6F33298F25BC72A0C435B56CD45358F9
39,548,970 UART: [art] PUB.Y = 7CD45D1CFE20F719AE7C921227FFCBDB6E87061F86F784CBD048D20E77EEEB79A7574ECA78B2396EF8E92E73E171DC45
39,556,243 UART: [art] SIG.R = BB275BC62B27A2144F84F6855D5E258B2728C45A4B0F3E1C9CC2F691EFD29745C21F0C3A4CEF12E58509C974E9EFE8DC
39,563,653 UART: [art] SIG.S = 321A133A08D2F8C670B553213CF4759E8DF3F76B17658DDDB036483650105F32E7129FCB8484D39355F52B2C91124DD5
40,542,029 UART: mbox::rt_entry...
40,543,004 UART: ____ _ _ _ ____ _____
40,545,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,547,014 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,548,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,550,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,552,806 UART: |_|
40,553,795 UART:
40,836,585 UART: [rt] Runtime listening for mailbox commands...
40,838,699 >>> mbox cmd response data (48 bytes)
40,839,278 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,839,756 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,438,879 ready_for_fw is high
3,439,280 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,712,828 >>> mbox cmd response: success
19,007,168 UART:
19,007,572 UART: Running Caliptra FMC ...
19,008,692 UART:
19,008,875 UART: [state] CFI Enabled
19,071,534 UART: [fht] FMC Alias Private Key: 7
20,834,723 UART: [art] Extend RT PCRs Done
20,835,951 UART: [art] Lock RT PCRs Done
20,837,385 UART: [art] Populate DV Done
20,842,895 UART: [fht] FMC Alias Private Key: 7
20,844,500 UART: [art] Derive CDI
20,845,239 UART: [art] Store in in slot 0x4
20,904,325 UART: [art] Derive Key Pair
20,905,328 UART: [art] Store priv key in slot 0x5
23,368,214 UART: [art] Derive Key Pair - Done
23,381,045 UART: [art] Signing Cert with AUTHO
23,382,357 UART: RITY.KEYID = 7
25,093,315 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,834 UART: [art] PUB.X = 3FF5E7C59BDAF9EE162F636AB054AE1665EF2D00EB8C58B3B9D1C3ED62305497D073D0133C14E94B04753F6131300059
25,102,005 UART: [art] PUB.Y = 8249C972DCFFBE00863C30D77CC57CA13B31DD2A07B37D93C8BF89146A953BE5518913B36E01DBCDE2E3DB52DFAC45FB
25,109,309 UART: [art] SIG.R = 22E30B7EC03B171C726BF58E56DE2D7F13804B3C78DAC62977B556BD53363EF8DF85A9677A21F0BB443A25C3B217E188
25,116,723 UART: [art] SIG.S = B8CD9952B3496F0FE4D0FBBBC782787AFF0F81419450BCACEDA25A5DF49B77743C6E1EFE8F8058176C55223B39E3442B
26,095,477 UART: Caliptra RT
26,096,173 UART: [state] CFI Enabled
26,262,466 UART: [rt] RT listening for mailbox commands...
28,314,153 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,326,735 >>> mbox cmd response: success
35,327,270 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,361,644 UART:
35,361,948 UART: Running Caliptra FMC ...
35,362,983 UART:
35,363,130 UART: [state] CFI Enabled
35,465,788 UART: [art] Extend RT PCRs Done
35,466,986 UART: [art] Lock RT PCRs Done
35,468,582 UART: [art] Populate DV Done
35,473,937 UART: [fht] FMC Alias Private Key: 7
35,475,654 UART: [art] Derive CDI
35,476,397 UART: [art] Store in in slot 0x4
35,535,313 UART: [art] Derive Key Pair
35,536,351 UART: [art] Store priv key in slot 0x5
37,998,467 UART: [art] Derive Key Pair - Done
38,011,302 UART: [art] Signing Cert with AUTHO
38,012,618 UART: RITY.KEYID = 7
39,724,079 UART: [art] Erasing AUTHORITY.KEYID = 7
39,725,587 UART: [art] PUB.X = E8B8DDE6DA99E718F56EB197AD0A42508418EC233A50315D17250D083569F9B4663899983E350581C615C7772F45F2DC
39,732,835 UART: [art] PUB.Y = 51C526685D0F1924B2BAB5FD079FE03EFD73D20DE7B7270168EA30EDDEA2447779C799CA7B67EC1AEE06694BCEE492FB
39,740,114 UART: [art] SIG.R = FB4BED23E1131B4812E9AEA4B3723844EBD3306E1823DF0BB341545558BA323E86E60C37D2B860327485E5DCF78FE003
39,747,493 UART: [art] SIG.S = 6F5D6CCD8932413FCC24F75C38A0FB6F859C8879AF99DF04F725B5E223A41F2E9229FE0EC200E6BBDA77655A5F98373C
40,725,866 UART: mbox::rt_entry...
40,726,822 UART: ____ _ _ _ ____ _____
40,728,809 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,730,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,732,751 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,734,684 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,736,615 UART: |_|
40,737,422 UART:
41,021,385 UART: [rt] Runtime listening for mailbox commands...
41,023,535 >>> mbox cmd response data (48 bytes)
41,024,100 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,024,726 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,552 UART:
192,903 UART: Running Caliptra ROM ...
193,990 UART:
603,635 UART: [state] CFI Enabled
617,157 UART: [state] LifecycleState = Unprovisioned
619,522 UART: [state] DebugLocked = No
621,342 UART: [state] WD Timer not started. Device not locked for debugging
625,154 UART: [kat] SHA2-256
815,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,763 UART: [kat] ++
826,301 UART: [kat] sha1
837,669 UART: [kat] SHA2-256
840,678 UART: [kat] SHA2-384
846,098 UART: [kat] SHA2-512-ACC
848,680 UART: [kat] ECC-384
3,290,958 UART: [kat] HMAC-384Kdf
3,304,830 UART: [kat] LMS
3,836,665 UART: [kat] --
3,841,400 UART: [cold-reset] ++
3,843,906 UART: [fht] FHT @ 0x50003400
3,855,092 UART: [idev] ++
3,855,807 UART: [idev] CDI.KEYID = 6
3,856,719 UART: [idev] SUBJECT.KEYID = 7
3,857,964 UART: [idev] UDS.KEYID = 0
3,858,894 ready_for_fw is high
3,859,096 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,997 UART: [idev] Erasing UDS.KEYID = 0
6,340,892 UART: [idev] Sha1 KeyId Algorithm
6,362,873 UART: [idev] --
6,368,315 UART: [ldev] ++
6,369,004 UART: [ldev] CDI.KEYID = 6
6,369,922 UART: [ldev] SUBJECT.KEYID = 5
6,371,081 UART: [ldev] AUTHORITY.KEYID = 7
6,372,314 UART: [ldev] FE.KEYID = 1
6,383,772 UART: [ldev] Erasing FE.KEYID = 1
8,859,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,170 UART: [ldev] --
10,649,010 UART: [fwproc] Wait for Commands...
10,651,828 UART: [fwproc] Recv command 0x46574c44
10,654,139 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,831,303 >>> mbox cmd response: success
14,836,210 UART: [afmc] ++
14,836,909 UART: [afmc] CDI.KEYID = 6
14,838,139 UART: [afmc] SUBJECT.KEYID = 7
14,839,578 UART: [afmc] AUTHORITY.KEYID = 5
17,343,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,706 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,751 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,448 UART: [afmc] --
19,137,578 UART: [cold-reset] --
19,140,526 UART: [state] Locking Datavault
19,145,334 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,515 UART: [state] Locking ICCM
19,149,880 UART: [exit] Launching FMC @ 0x40000130
19,158,543 UART:
19,158,776 UART: Running Caliptra FMC ...
19,159,873 UART:
19,160,031 UART: [state] CFI Enabled
19,168,185 UART: [fht] FMC Alias Private Key: 7
20,925,448 UART: [art] Extend RT PCRs Done
20,926,671 UART: [art] Lock RT PCRs Done
20,928,382 UART: [art] Populate DV Done
20,934,010 UART: [fht] FMC Alias Private Key: 7
20,935,708 UART: [art] Derive CDI
20,936,463 UART: [art] Store in in slot 0x4
20,979,119 UART: [art] Derive Key Pair
20,980,154 UART: [art] Store priv key in slot 0x5
23,406,890 UART: [art] Derive Key Pair - Done
23,419,942 UART: [art] Signing Cert with AUTHO
23,421,249 UART: RITY.KEYID = 7
25,126,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,103 UART: [art] PUB.X = B0D49FDF3FC409CF8AF10B8828067CAE43E23E5229406FB92AA5C88B0F2CE4E4483172E981DAC9951164078F84B53D81
25,135,350 UART: [art] PUB.Y = EFB1D2A5693BBD1D2CC1DF39F63CB1A5325AAE16CA8AEDB71D8C4D5E084DB3C0B0FAFB4FD0D3C70E0A301B4589ABDFFA
25,142,689 UART: [art] SIG.R = F383F2DDE44441F0AC83133490A59F5A2734554D621EEE7828952F39B775855C19AFFA68BF9C44B9A752295C7E7A9029
25,150,080 UART: [art] SIG.S = 2BF0BA537E5CF4D0E766D816DE02600836087BED47CB98A57A8EAB32580D5BEE734742B79D66694C1AB27AE8FC6CE3FC
26,129,342 UART: Caliptra RT
26,130,031 UART: [state] CFI Enabled
26,247,595 UART: [rt] RT listening for mailbox commands...
28,298,629 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,400,046 UART:
28,400,415 UART: Running Caliptra ROM ...
28,401,464 UART:
28,401,669 UART: [state] CFI Enabled
28,418,588 UART: [state] LifecycleState = Unprovisioned
28,420,424 UART: [state] DebugLocked = No
28,422,211 UART: [state] WD Timer not started. Device not locked for debugging
28,427,560 UART: [kat] SHA2-256
28,617,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,628,226 UART: [kat] ++
28,628,742 UART: [kat] sha1
28,640,815 UART: [kat] SHA2-256
28,643,828 UART: [kat] SHA2-384
28,650,319 UART: [kat] SHA2-512-ACC
28,652,882 UART: [kat] ECC-384
31,097,697 UART: [kat] HMAC-384Kdf
31,110,948 UART: [kat] LMS
31,642,581 UART: [kat] --
31,649,481 UART: [update-reset] ++
34,679,955 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,683,161 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,076,490 >>> mbox cmd response: success
35,076,871 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,077,159 UART: [update-reset] Copying MAN_2 To MAN_1
35,114,460 UART: [update-reset Success] --
35,117,590 UART: [state] Locking Datavault
35,122,150 UART: [state] Locking PCR0, PCR1 and PCR31
35,124,281 UART: [state] Locking ICCM
35,125,756 UART: [exit] Launching FMC @ 0x40000130
35,134,378 UART:
35,134,610 UART: Running Caliptra FMC ...
35,135,632 UART:
35,135,777 UART: [state] CFI Enabled
35,180,489 UART: [art] Extend RT PCRs Done
35,181,634 UART: [art] Lock RT PCRs Done
35,183,294 UART: [art] Populate DV Done
35,188,708 UART: [fht] FMC Alias Private Key: 7
35,190,286 UART: [art] Derive CDI
35,191,105 UART: [art] Store in in slot 0x4
35,233,750 UART: [art] Derive Key Pair
35,234,746 UART: [art] Store priv key in slot 0x5
37,661,811 UART: [art] Derive Key Pair - Done
37,674,990 UART: [art] Signing Cert with AUTHO
37,676,327 UART: RITY.KEYID = 7
39,381,520 UART: [art] Erasing AUTHORITY.KEYID = 7
39,383,046 UART: [art] PUB.X = A65C1F32068F45009CFBAB4758C03B8DED642E448D60539EE509F94BD298458383B5173BF973901DE15DE1A18D378B9C
39,390,255 UART: [art] PUB.Y = 5662B9BDCE992572A83FC52BDCB32BBE7BB9CBF02B9723970A0BB6923B97E843140E74546D67C468593FA86CF7679AB1
39,397,556 UART: [art] SIG.R = AF55A1C76FC3B24315EA8D5FE85F2229D38B866102EFBADD0A14E70A7A0CED2B4DC7A77A522702FE1B911B0C507F7675
39,404,953 UART: [art] SIG.S = D11EBA8F7B1DB8C94B628C1C9FFF16E39FA23DD88ED90486B713FD5600F704CE3EF965DB398B19F5D2D66A4AE6A97B21
40,383,530 UART: mbox::rt_entry...
40,384,478 UART: ____ _ _ _ ____ _____
40,386,646 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,388,662 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,390,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,392,528 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,394,378 UART: |_|
40,395,177 UART:
40,681,711 UART: [rt] Runtime listening for mailbox commands...
40,683,823 >>> mbox cmd response data (48 bytes)
40,684,378 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,684,844 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,753,149 ready_for_fw is high
3,753,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,947,271 >>> mbox cmd response: success
19,209,717 UART:
19,210,118 UART: Running Caliptra FMC ...
19,211,218 UART:
19,211,370 UART: [state] CFI Enabled
19,219,317 UART: [fht] FMC Alias Private Key: 7
20,976,393 UART: [art] Extend RT PCRs Done
20,977,603 UART: [art] Lock RT PCRs Done
20,979,203 UART: [art] Populate DV Done
20,984,659 UART: [fht] FMC Alias Private Key: 7
20,986,249 UART: [art] Derive CDI
20,987,062 UART: [art] Store in in slot 0x4
21,029,625 UART: [art] Derive Key Pair
21,030,630 UART: [art] Store priv key in slot 0x5
23,457,169 UART: [art] Derive Key Pair - Done
23,470,276 UART: [art] Signing Cert with AUTHO
23,471,582 UART: RITY.KEYID = 7
25,176,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,327 UART: [art] PUB.X = CFA8A10E405508D4DB360C99E823E9B5F8C4B24F79365017768015EA4F03DFCA2B95F5BAD13440E0D09929DB129C2517
25,185,536 UART: [art] PUB.Y = E2B08A3BDF118AD24503B964E79C3AF52B19D0416AB21E93F31E2FAB12C15FC3EFB1D782F7EEFD5C367EC55582152E5C
25,192,867 UART: [art] SIG.R = 2A04A9F189FD8D823C73F317A50662E6FE3A43C26B03316572BC0212A572607E90433B57C8B394E492D3D175ED0D7EB2
25,200,209 UART: [art] SIG.S = C8EF51166EB065125D0112C269A1B8848B0D46F7ADE981F62D5D02FFFB381DC04C6E764E75319BDAA1804051CC4A2E44
26,179,117 UART: Caliptra RT
26,179,828 UART: [state] CFI Enabled
26,296,946 UART: [rt] RT listening for mailbox commands...
28,347,331 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,259,327 >>> mbox cmd response: success
35,259,826 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,294,538 UART:
35,294,871 UART: Running Caliptra FMC ...
35,295,994 UART:
35,296,153 UART: [state] CFI Enabled
35,340,057 UART: [art] Extend RT PCRs Done
35,341,206 UART: [art] Lock RT PCRs Done
35,342,545 UART: [art] Populate DV Done
35,347,928 UART: [fht] FMC Alias Private Key: 7
35,349,571 UART: [art] Derive CDI
35,350,381 UART: [art] Store in in slot 0x4
35,393,146 UART: [art] Derive Key Pair
35,394,183 UART: [art] Store priv key in slot 0x5
37,821,284 UART: [art] Derive Key Pair - Done
37,834,164 UART: [art] Signing Cert with AUTHO
37,835,471 UART: RITY.KEYID = 7
39,540,902 UART: [art] Erasing AUTHORITY.KEYID = 7
39,542,386 UART: [art] PUB.X = B57EF622EEB81294EFA0875D25C6AB20589E3D6744BF86E851EFA66EE8DC645F6E0DA94195DEC14DA55070C9FAB35AAF
39,549,674 UART: [art] PUB.Y = F1FAC78176FCD11B2A58BB4DC9F5141084780995488C74AD15646812A23F7E57F85AB83F5D542EE0227E3C2545856E90
39,556,955 UART: [art] SIG.R = 3BA38E4F1BA37A00BBCFA1B93C38343C07EB4D0F4FC57A780E802F0E4CBC0F33B3E5864D69C4303CE1677ECB787D2673
39,564,334 UART: [art] SIG.S = CC79688468B1FFA0E4C2597B6EF215F980AC3310C974DEE88F19BBACFC6E82A5FE74525F21519F8A767782E00D6AC92D
40,542,685 UART: mbox::rt_entry...
40,543,652 UART: ____ _ _ _ ____ _____
40,545,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,547,637 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,549,560 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,551,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,553,413 UART: |_|
40,554,217 UART:
40,839,823 UART: [rt] Runtime listening for mailbox commands...
40,841,914 >>> mbox cmd response data (48 bytes)
40,842,485 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,842,914 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,997 UART: [kat] SHA2-256
881,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,043 UART: [kat] ++
886,195 UART: [kat] sha1
890,445 UART: [kat] SHA2-256
892,383 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,462 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,475,869 UART: [cold-reset] ++
1,476,209 UART: [fht] Storing FHT @ 0x50003400
1,478,944 UART: [idev] ++
1,479,112 UART: [idev] CDI.KEYID = 6
1,479,472 UART: [idev] SUBJECT.KEYID = 7
1,479,896 UART: [idev] UDS.KEYID = 0
1,480,241 ready_for_fw is high
1,480,241 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,022 UART: [idev] Erasing UDS.KEYID = 0
1,505,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,843 UART: [ldev] ++
1,515,011 UART: [ldev] CDI.KEYID = 6
1,515,374 UART: [ldev] SUBJECT.KEYID = 5
1,515,800 UART: [ldev] AUTHORITY.KEYID = 7
1,516,263 UART: [ldev] FE.KEYID = 1
1,521,505 UART: [ldev] Erasing FE.KEYID = 1
1,547,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,274 UART: [ldev] --
1,586,723 UART: [fwproc] Waiting for Commands...
1,587,404 UART: [fwproc] Received command 0x46574c44
1,588,195 UART: [fwproc] Received Image of size 114360 bytes
2,886,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,678 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,973 >>> mbox cmd response: success
3,080,077 UART: [afmc] ++
3,080,245 UART: [afmc] CDI.KEYID = 6
3,080,607 UART: [afmc] SUBJECT.KEYID = 7
3,081,032 UART: [afmc] AUTHORITY.KEYID = 5
3,116,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,552 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,242 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,149 UART: [afmc] --
3,160,123 UART: [cold-reset] --
3,160,927 UART: [state] Locking Datavault
3,162,020 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,624 UART: [state] Locking ICCM
3,163,220 UART: [exit] Launching FMC @ 0x40000130
3,168,549 UART:
3,168,565 UART: Running Caliptra FMC ...
3,168,973 UART:
3,169,027 UART: [state] CFI Enabled
3,179,440 UART: [fht] FMC Alias Private Key: 7
3,287,005 UART: [art] Extend RT PCRs Done
3,287,433 UART: [art] Lock RT PCRs Done
3,289,225 UART: [art] Populate DV Done
3,297,518 UART: [fht] FMC Alias Private Key: 7
3,298,668 UART: [art] Derive CDI
3,298,948 UART: [art] Store in in slot 0x4
3,384,423 UART: [art] Derive Key Pair
3,384,783 UART: [art] Store priv key in slot 0x5
3,398,397 UART: [art] Derive Key Pair - Done
3,413,013 UART: [art] Signing Cert with AUTHO
3,413,493 UART: RITY.KEYID = 7
3,428,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,364 UART: [art] PUB.X = B4195E32219F60B3C3D10D9F2EF2371F8BD5735BF0A8A2A97EAE19D6CB622C5B59E28804B61CC127CE3DCB4517A48D89
3,436,140 UART: [art] PUB.Y = 3AA17FD9CC760006AB08AA68021B20BB94B186F832D385C1A71094F31C5D29D86F79AD5D5139CA121E72D349209E58C7
3,443,061 UART: [art] SIG.R = CC7417C1A63FC2C001F15048014D467D87631BA420492C0FDAB9E9D60CE18AB8B5D84A7F4E94A7B06AD25A7FC6E5E551
3,449,831 UART: [art] SIG.S = 34326DE81CF2F30A141A98851A9E7F00DCDFD91E7A36B5812A52C3B3DA0B63519269CFCB328730E0722F32669A67B717
3,473,956 UART: Caliptra RT
3,474,210 UART: [state] CFI Enabled
3,581,912 UART: [rt] RT listening for mailbox commands...
3,582,582 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,777 UART:
3,583,793 UART: Running Caliptra ROM ...
3,584,201 UART:
3,584,255 UART: [state] CFI Enabled
3,586,451 UART: [state] LifecycleState = Unprovisioned
3,587,106 UART: [state] DebugLocked = No
3,587,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,119 UART: [kat] SHA2-256
4,383,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,165 UART: [kat] ++
4,387,317 UART: [kat] sha1
4,391,515 UART: [kat] SHA2-256
4,393,453 UART: [kat] SHA2-384
4,396,336 UART: [kat] SHA2-512-ACC
4,398,236 UART: [kat] ECC-384
4,403,939 UART: [kat] HMAC-384Kdf
4,408,637 UART: [kat] LMS
4,976,833 UART: [kat] --
4,977,668 UART: [update-reset] ++
5,903,527 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,904,567 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,000,893 >>> mbox cmd response: success
6,000,893 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,001,006 UART: [update-reset] Copying MAN_2 To MAN_1
6,009,020 UART: [update-reset Success] --
6,010,189 UART: [state] Locking Datavault
6,011,011 UART: [state] Locking PCR0, PCR1 and PCR31
6,011,615 UART: [state] Locking ICCM
6,012,173 UART: [exit] Launching FMC @ 0x40000130
6,017,502 UART:
6,017,518 UART: Running Caliptra FMC ...
6,017,926 UART:
6,017,980 UART: [state] CFI Enabled
6,106,737 UART: [art] Extend RT PCRs Done
6,107,165 UART: [art] Lock RT PCRs Done
6,108,524 UART: [art] Populate DV Done
6,116,751 UART: [fht] FMC Alias Private Key: 7
6,117,785 UART: [art] Derive CDI
6,118,065 UART: [art] Store in in slot 0x4
6,203,764 UART: [art] Derive Key Pair
6,204,124 UART: [art] Store priv key in slot 0x5
6,217,168 UART: [art] Derive Key Pair - Done
6,231,873 UART: [art] Signing Cert with AUTHO
6,232,353 UART: RITY.KEYID = 7
6,247,567 UART: [art] Erasing AUTHORITY.KEYID = 7
6,248,332 UART: [art] PUB.X = C51B4F675C0F688CA83F2266D94C6441CFDA57BCA17F78F79C514C3FBCFEF2E3189AD458E80A79EA70FD8E7962E34FC8
6,255,114 UART: [art] PUB.Y = 659485D022C5EF46A0A10C078444E3CC740CF23BECF16F7580C8FE5E3E360CE5001133F101774E3D7F55BECF021EE095
6,262,030 UART: [art] SIG.R = 88992EFC49DC2FEAA1FD5D42DBBAB187DD6BA18424626B636BD4EC2810B3BE6254398FC564E84B54C85035A80B7BC4F3
6,268,813 UART: [art] SIG.S = 3D85EB487F7F3F3DB3E2FCA0F474977C5247C6D82A8D77C051991EC48691838CCE66ED13303FB6F9A8BB4E84460B4E4E
6,292,891 UART: mbox::rt_entry...
6,293,263 UART: ____ _ _ _ ____ _____
6,294,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,294,847 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,295,615 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,296,383 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,297,151 UART: |_|
6,297,463 UART:
6,575,089 UART: [rt] Runtime listening for mailbox commands...
6,576,260 >>> mbox cmd response data (48 bytes)
6,576,261 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,576,369 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,273 ready_for_fw is high
1,362,273 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,281 >>> mbox cmd response: success
2,989,237 UART:
2,989,253 UART: Running Caliptra FMC ...
2,989,661 UART:
2,989,715 UART: [state] CFI Enabled
3,000,394 UART: [fht] FMC Alias Private Key: 7
3,108,601 UART: [art] Extend RT PCRs Done
3,109,029 UART: [art] Lock RT PCRs Done
3,110,835 UART: [art] Populate DV Done
3,118,992 UART: [fht] FMC Alias Private Key: 7
3,120,000 UART: [art] Derive CDI
3,120,280 UART: [art] Store in in slot 0x4
3,205,969 UART: [art] Derive Key Pair
3,206,329 UART: [art] Store priv key in slot 0x5
3,219,337 UART: [art] Derive Key Pair - Done
3,234,337 UART: [art] Signing Cert with AUTHO
3,234,817 UART: RITY.KEYID = 7
3,249,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,758 UART: [art] PUB.X = 0748AFEAA67355A1019285ED48BE3CE8426AA7496B9077F2F3F9085AB06BAAAB0CA4D01F9E94246EC5DD541DECCE92A3
3,257,534 UART: [art] PUB.Y = 7D6E2E53377A504CE081C029C382BF35DDEF82297B4049FBADF41C0B41310E9796ECA183136D62B9601D5FD08FB30607
3,264,476 UART: [art] SIG.R = 2EBE82A7D4746C5B5D2BF69480786AB38CCE066E269AF1D0A1A9A0B2AED086C54C7015B23AC120CAECE150DB826A446C
3,271,261 UART: [art] SIG.S = BE1D7FDF3A0D877E726F4F179A8CB2C34E6F2041EAB932759C1245A29DF86FEDFD78CDEED308F4E94A618573D19725C8
3,294,866 UART: Caliptra RT
3,295,120 UART: [state] CFI Enabled
3,403,356 UART: [rt] RT listening for mailbox commands...
3,404,026 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,703,207 >>> mbox cmd response: success
5,703,207 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,716,642 UART:
5,716,658 UART: Running Caliptra FMC ...
5,717,066 UART:
5,717,120 UART: [state] CFI Enabled
5,806,133 UART: [art] Extend RT PCRs Done
5,806,561 UART: [art] Lock RT PCRs Done
5,807,830 UART: [art] Populate DV Done
5,815,959 UART: [fht] FMC Alias Private Key: 7
5,816,965 UART: [art] Derive CDI
5,817,245 UART: [art] Store in in slot 0x4
5,903,120 UART: [art] Derive Key Pair
5,903,480 UART: [art] Store priv key in slot 0x5
5,916,452 UART: [art] Derive Key Pair - Done
5,931,034 UART: [art] Signing Cert with AUTHO
5,931,514 UART: RITY.KEYID = 7
5,946,754 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,519 UART: [art] PUB.X = FFFFF73F371690DB9C64E174FCB1B282B1914F139579CFD185C62869752F22E1890C1A90764AA0453E4506B974B5F794
5,954,281 UART: [art] PUB.Y = 6E4030E5728CC2560C92BB352DF7DD93F74DFAAE43E3CEFACF01D52EB26802E4C2A0C7C2B84C7E94ACC8838CE4739CB9
5,961,244 UART: [art] SIG.R = 6F221AEFAC99862AC35B69AE01092F597E5DA0425DD9BE91E03CC7D6692E72D4BD8C55173AF5B472F5A84AB73A039EA7
5,968,019 UART: [art] SIG.S = 06C485FB898D84D1513135791E9A9BFADBADB036400A331C437174A0A07AC115490902B73EA0CB27F92EAEA2F3540111
5,992,003 UART: mbox::rt_entry...
5,992,375 UART: ____ _ _ _ ____ _____
5,993,159 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,993,959 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,994,727 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,995,495 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,996,263 UART: |_|
5,996,575 UART:
6,276,182 UART: [rt] Runtime listening for mailbox commands...
6,277,353 >>> mbox cmd response data (48 bytes)
6,277,354 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,277,462 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,633 UART: [kat] LMS
1,475,829 UART: [kat] --
1,476,890 UART: [cold-reset] ++
1,477,306 UART: [fht] Storing FHT @ 0x50003400
1,480,111 UART: [idev] ++
1,480,279 UART: [idev] CDI.KEYID = 6
1,480,639 UART: [idev] SUBJECT.KEYID = 7
1,481,063 UART: [idev] UDS.KEYID = 0
1,481,408 ready_for_fw is high
1,481,408 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,175 UART: [idev] Erasing UDS.KEYID = 0
1,506,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,899 UART: [idev] --
1,515,952 UART: [ldev] ++
1,516,120 UART: [ldev] CDI.KEYID = 6
1,516,483 UART: [ldev] SUBJECT.KEYID = 5
1,516,909 UART: [ldev] AUTHORITY.KEYID = 7
1,517,372 UART: [ldev] FE.KEYID = 1
1,522,466 UART: [ldev] Erasing FE.KEYID = 1
1,548,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,217 UART: [ldev] --
1,587,586 UART: [fwproc] Waiting for Commands...
1,588,279 UART: [fwproc] Received command 0x46574c44
1,589,070 UART: [fwproc] Received Image of size 114360 bytes
2,886,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,905 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,046 >>> mbox cmd response: success
3,080,166 UART: [afmc] ++
3,080,334 UART: [afmc] CDI.KEYID = 6
3,080,696 UART: [afmc] SUBJECT.KEYID = 7
3,081,121 UART: [afmc] AUTHORITY.KEYID = 5
3,116,460 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,764 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,157 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,847 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,680 UART: [afmc] --
3,159,692 UART: [cold-reset] --
3,160,480 UART: [state] Locking Datavault
3,161,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,361 UART: [state] Locking ICCM
3,162,849 UART: [exit] Launching FMC @ 0x40000130
3,168,178 UART:
3,168,194 UART: Running Caliptra FMC ...
3,168,602 UART:
3,168,745 UART: [state] CFI Enabled
3,179,506 UART: [fht] FMC Alias Private Key: 7
3,287,651 UART: [art] Extend RT PCRs Done
3,288,079 UART: [art] Lock RT PCRs Done
3,289,727 UART: [art] Populate DV Done
3,298,080 UART: [fht] FMC Alias Private Key: 7
3,299,134 UART: [art] Derive CDI
3,299,414 UART: [art] Store in in slot 0x4
3,385,185 UART: [art] Derive Key Pair
3,385,545 UART: [art] Store priv key in slot 0x5
3,398,943 UART: [art] Derive Key Pair - Done
3,413,712 UART: [art] Signing Cert with AUTHO
3,414,192 UART: RITY.KEYID = 7
3,429,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,939 UART: [art] PUB.X = 18FE8691317CD689A8AA3CC3FC8B75B5C14B4E5893CF03493A485023AB6623F2E7BABFECE7FB06C4109FF3C3CB096CF4
3,436,718 UART: [art] PUB.Y = 48544322C4990233B8BA9AD7970393EAFC08ACF28F34E7F3F5585554E23EA8F69C1A690F06DB477A605613BD20168C41
3,443,651 UART: [art] SIG.R = 72E263DB2201EBF24E04AF404B4CCCFE9E9363F1DBC85DA183117D62A2B5349C35B43545CA51D988BB71714822B03823
3,450,419 UART: [art] SIG.S = 7C1B80C32E4C1C400CEFE276AD067F826539866D5181973902BC075ED7C51C96167E78EB059352EB191BD03C0BA4318D
3,474,168 UART: Caliptra RT
3,474,514 UART: [state] CFI Enabled
3,583,269 UART: [rt] RT listening for mailbox commands...
3,583,939 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,084 UART:
3,585,100 UART: Running Caliptra ROM ...
3,585,508 UART:
3,585,649 UART: [state] CFI Enabled
3,588,545 UART: [state] LifecycleState = Unprovisioned
3,589,200 UART: [state] DebugLocked = No
3,589,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,433 UART: [kat] SHA2-256
4,385,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,479 UART: [kat] ++
4,389,631 UART: [kat] sha1
4,393,873 UART: [kat] SHA2-256
4,395,811 UART: [kat] SHA2-384
4,398,534 UART: [kat] SHA2-512-ACC
4,400,434 UART: [kat] ECC-384
4,406,253 UART: [kat] HMAC-384Kdf
4,410,741 UART: [kat] LMS
4,978,937 UART: [kat] --
4,979,902 UART: [update-reset] ++
5,905,217 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,906,477 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,002,803 >>> mbox cmd response: success
6,002,803 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,003,052 UART: [update-reset] Copying MAN_2 To MAN_1
6,011,066 UART: [update-reset Success] --
6,012,287 UART: [state] Locking Datavault
6,013,189 UART: [state] Locking PCR0, PCR1 and PCR31
6,013,793 UART: [state] Locking ICCM
6,014,385 UART: [exit] Launching FMC @ 0x40000130
6,019,714 UART:
6,019,730 UART: Running Caliptra FMC ...
6,020,138 UART:
6,020,281 UART: [state] CFI Enabled
6,109,004 UART: [art] Extend RT PCRs Done
6,109,432 UART: [art] Lock RT PCRs Done
6,110,511 UART: [art] Populate DV Done
6,118,966 UART: [fht] FMC Alias Private Key: 7
6,119,894 UART: [art] Derive CDI
6,120,174 UART: [art] Store in in slot 0x4
6,205,909 UART: [art] Derive Key Pair
6,206,269 UART: [art] Store priv key in slot 0x5
6,219,383 UART: [art] Derive Key Pair - Done
6,234,011 UART: [art] Signing Cert with AUTHO
6,234,491 UART: RITY.KEYID = 7
6,249,843 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,608 UART: [art] PUB.X = B24EC4B9304537C05259E7646779EB09A051EB8714655C0E17B8D331606C67E516E60AFF379486E7A162352FDB5DE30C
6,257,362 UART: [art] PUB.Y = 60F37EE35A0E2770161157346DCA8D0A379CFF579889AAAEBF64F88E28751E3376E2B5DC24E9631801FA3E409888EFE5
6,264,307 UART: [art] SIG.R = 999E82A17436CFC0AA34E1C606C7B3B1FD03CFD66BFD1A28483991E9F91099107EE9A6233E9713C451DEA75EF60D03AC
6,271,075 UART: [art] SIG.S = 2E063194E9F0987BBB4086C192715A903995DEF9560CD82AE4CA0AE70D1C160FBDB3FC44C7268E55FC0DE55586E1596C
6,295,162 UART: mbox::rt_entry...
6,295,534 UART: ____ _ _ _ ____ _____
6,296,318 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,297,118 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,297,886 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,298,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,299,422 UART: |_|
6,299,734 UART:
6,582,070 UART: [rt] Runtime listening for mailbox commands...
6,583,241 >>> mbox cmd response data (48 bytes)
6,583,242 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,583,350 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,792 ready_for_fw is high
1,362,792 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,200 >>> mbox cmd response: success
2,990,554 UART:
2,990,570 UART: Running Caliptra FMC ...
2,990,978 UART:
2,991,121 UART: [state] CFI Enabled
3,001,422 UART: [fht] FMC Alias Private Key: 7
3,110,361 UART: [art] Extend RT PCRs Done
3,110,789 UART: [art] Lock RT PCRs Done
3,112,501 UART: [art] Populate DV Done
3,120,772 UART: [fht] FMC Alias Private Key: 7
3,121,954 UART: [art] Derive CDI
3,122,234 UART: [art] Store in in slot 0x4
3,207,927 UART: [art] Derive Key Pair
3,208,287 UART: [art] Store priv key in slot 0x5
3,222,157 UART: [art] Derive Key Pair - Done
3,236,798 UART: [art] Signing Cert with AUTHO
3,237,278 UART: RITY.KEYID = 7
3,252,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,209 UART: [art] PUB.X = A8B92392D8D33B70E9CA91ED35647CDC3DB44CD879F564CD5EAF4A152D7D26464AE6F709EA59006965B5DA71A6944D36
3,259,964 UART: [art] PUB.Y = 3772B5ECB9FE5F1042419AA4698ED8AA4556B496492424860B61A89707DC79082537F4A0C5639202CB222A1C0D62DAC0
3,266,895 UART: [art] SIG.R = 512FF42DF822F2FDD17C581580720F5CEF7922ACE52086ED73428522F880CB2EA568A2DF8BD452A545A9B8529EDC70D6
3,273,670 UART: [art] SIG.S = FF955073CE1D93222D8EC618CC12000B3E359D262602D7301B5A5C74DA269D9236A7A6FF197B81ABC524714571E718F6
3,296,705 UART: Caliptra RT
3,297,051 UART: [state] CFI Enabled
3,405,677 UART: [rt] RT listening for mailbox commands...
3,406,347 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,708,041 >>> mbox cmd response: success
5,708,041 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,721,332 UART:
5,721,348 UART: Running Caliptra FMC ...
5,721,756 UART:
5,721,899 UART: [state] CFI Enabled
5,810,984 UART: [art] Extend RT PCRs Done
5,811,412 UART: [art] Lock RT PCRs Done
5,812,619 UART: [art] Populate DV Done
5,820,904 UART: [fht] FMC Alias Private Key: 7
5,821,978 UART: [art] Derive CDI
5,822,258 UART: [art] Store in in slot 0x4
5,907,887 UART: [art] Derive Key Pair
5,908,247 UART: [art] Store priv key in slot 0x5
5,922,135 UART: [art] Derive Key Pair - Done
5,936,837 UART: [art] Signing Cert with AUTHO
5,937,317 UART: RITY.KEYID = 7
5,952,695 UART: [art] Erasing AUTHORITY.KEYID = 7
5,953,460 UART: [art] PUB.X = C03ACB1BCC251525B82EB95AAA06A27B13C83D6EB1A2F2016671F011D88511514B8F3EF353E0AAC026ED43BBDD974970
5,960,236 UART: [art] PUB.Y = 4EAD7AF957EE819B875017632675FEFCBAA1749F5D184723B88311DC4B3860DAE6BD44C59EC156F211EEE4FB6ECF3C35
5,967,202 UART: [art] SIG.R = 8C487230180B5B77A0D26B47D74C0CA3D7F6C25BD513937D0E65A287BBB1A9D90C62F48A737940B58BD70C0A191C7892
5,973,956 UART: [art] SIG.S = C1DAAE313EBFB268833A0C9A77A9A19FA132C07C490266E7E33C7FDAEB9B037C7B329A73F239F95683F5718A131E4911
5,997,580 UART: mbox::rt_entry...
5,997,952 UART: ____ _ _ _ ____ _____
5,998,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,999,536 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,000,304 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,001,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,001,840 UART: |_|
6,002,152 UART:
6,280,753 UART: [rt] Runtime listening for mailbox commands...
6,281,924 >>> mbox cmd response data (48 bytes)
6,281,925 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,282,033 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
893,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,743 UART: [kat] ++
897,895 UART: [kat] sha1
902,233 UART: [kat] SHA2-256
904,173 UART: [kat] SHA2-384
907,088 UART: [kat] SHA2-512-ACC
908,989 UART: [kat] ECC-384
919,090 UART: [kat] HMAC-384Kdf
923,640 UART: [kat] LMS
1,171,968 UART: [kat] --
1,172,789 UART: [cold-reset] ++
1,173,275 UART: [fht] FHT @ 0x50003400
1,175,956 UART: [idev] ++
1,176,124 UART: [idev] CDI.KEYID = 6
1,176,484 UART: [idev] SUBJECT.KEYID = 7
1,176,908 UART: [idev] UDS.KEYID = 0
1,177,253 ready_for_fw is high
1,177,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,880 UART: [idev] Erasing UDS.KEYID = 0
1,202,209 UART: [idev] Sha1 KeyId Algorithm
1,210,769 UART: [idev] --
1,211,895 UART: [ldev] ++
1,212,063 UART: [ldev] CDI.KEYID = 6
1,212,426 UART: [ldev] SUBJECT.KEYID = 5
1,212,852 UART: [ldev] AUTHORITY.KEYID = 7
1,213,315 UART: [ldev] FE.KEYID = 1
1,218,649 UART: [ldev] Erasing FE.KEYID = 1
1,245,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,069 UART: [ldev] --
1,284,442 UART: [fwproc] Wait for Commands...
1,285,240 UART: [fwproc] Recv command 0x46574c44
1,285,968 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,606 >>> mbox cmd response: success
2,777,720 UART: [afmc] ++
2,777,888 UART: [afmc] CDI.KEYID = 6
2,778,250 UART: [afmc] SUBJECT.KEYID = 7
2,778,675 UART: [afmc] AUTHORITY.KEYID = 5
2,814,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,495 UART: [afmc] --
2,857,595 UART: [cold-reset] --
2,858,519 UART: [state] Locking Datavault
2,859,666 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,270 UART: [state] Locking ICCM
2,860,718 UART: [exit] Launching FMC @ 0x40000130
2,866,047 UART:
2,866,063 UART: Running Caliptra FMC ...
2,866,471 UART:
2,866,525 UART: [state] CFI Enabled
2,876,652 UART: [fht] FMC Alias Private Key: 7
2,985,189 UART: [art] Extend RT PCRs Done
2,985,617 UART: [art] Lock RT PCRs Done
2,987,025 UART: [art] Populate DV Done
2,995,422 UART: [fht] FMC Alias Private Key: 7
2,996,484 UART: [art] Derive CDI
2,996,764 UART: [art] Store in in slot 0x4
3,082,805 UART: [art] Derive Key Pair
3,083,165 UART: [art] Store priv key in slot 0x5
3,096,449 UART: [art] Derive Key Pair - Done
3,111,128 UART: [art] Signing Cert with AUTHO
3,111,608 UART: RITY.KEYID = 7
3,127,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,797 UART: [art] PUB.X = F1291182671331D425F669C8E04999258BF91835E850E3806CD8DBB028E0FB69F698BF9DA62D4F462AD1568169C9B619
3,134,561 UART: [art] PUB.Y = 513B4C4E7B7360F1EB38D73E8061117DB12248968886C87DA6FD10BB0FB8F9ADB2A3B6992DF0B944B2DFA4F765A485EB
3,141,520 UART: [art] SIG.R = 539F9B4293A9C175BDFEEBDB2512AD2A432C090DA067C2258283A2E70A0A10D4C6B55F0347207DC0DE6F8F8E73180285
3,148,278 UART: [art] SIG.S = 8A9741337A61F8962CFE6BE22CE3BB5708A7781D1680584028BE7B9321AC8DC6D163C9F04E421A19B4CD105DBF241A66
3,172,082 UART: Caliptra RT
3,172,336 UART: [state] CFI Enabled
3,280,666 UART: [rt] RT listening for mailbox commands...
3,281,336 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,430 UART:
3,282,446 UART: Running Caliptra ROM ...
3,282,854 UART:
3,282,909 UART: [state] CFI Enabled
3,285,803 UART: [state] LifecycleState = Unprovisioned
3,286,458 UART: [state] DebugLocked = No
3,286,976 UART: [state] WD Timer not started. Device not locked for debugging
3,288,202 UART: [kat] SHA2-256
4,093,852 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,097,977 UART: [kat] ++
4,098,129 UART: [kat] sha1
4,102,201 UART: [kat] SHA2-256
4,104,141 UART: [kat] SHA2-384
4,106,820 UART: [kat] SHA2-512-ACC
4,108,720 UART: [kat] ECC-384
4,118,231 UART: [kat] HMAC-384Kdf
4,122,801 UART: [kat] LMS
4,371,129 UART: [kat] --
4,371,849 UART: [update-reset] ++
5,275,508 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,537 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,372,811 >>> mbox cmd response: success
5,372,811 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,372,940 UART: [update-reset] Copying MAN_2 To MAN_1
5,380,954 UART: [update-reset Success] --
5,381,963 UART: [state] Locking Datavault
5,382,763 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,367 UART: [state] Locking ICCM
5,383,921 UART: [exit] Launching FMC @ 0x40000130
5,389,250 UART:
5,389,266 UART: Running Caliptra FMC ...
5,389,674 UART:
5,389,728 UART: [state] CFI Enabled
5,478,713 UART: [art] Extend RT PCRs Done
5,479,141 UART: [art] Lock RT PCRs Done
5,480,438 UART: [art] Populate DV Done
5,488,717 UART: [fht] FMC Alias Private Key: 7
5,489,817 UART: [art] Derive CDI
5,490,097 UART: [art] Store in in slot 0x4
5,575,794 UART: [art] Derive Key Pair
5,576,154 UART: [art] Store priv key in slot 0x5
5,589,418 UART: [art] Derive Key Pair - Done
5,603,965 UART: [art] Signing Cert with AUTHO
5,604,445 UART: RITY.KEYID = 7
5,620,229 UART: [art] Erasing AUTHORITY.KEYID = 7
5,620,994 UART: [art] PUB.X = 6C5A90AFA3F360BEDDDE41C834F2BB13054DB2A4E2C2CEAE0D52DD73B19189AC359485301CBD2208E2E4ADB4A17796C6
5,627,775 UART: [art] PUB.Y = 2D5FBC3114B3EBD44545F71922558A0407D6E7DF2EC5C0BCB3B825BFA18260579A3214F8C65381AADE6AD506E8F5CE78
5,634,728 UART: [art] SIG.R = E1DD63E772394FBAD3B925E8E7B3E2F0BFDE83908B1513A5DACF55D6F430251E69A1BB45FF5FB7CAAE06C41DB93F9F24
5,641,519 UART: [art] SIG.S = D01BCA089B5F83D061B7D97C51574A2E5C3EF44643652D9D2D38A00E679461BE559A3B2BDBF9838736F41431DE699892
5,665,666 UART: mbox::rt_entry...
5,666,038 UART: ____ _ _ _ ____ _____
5,666,822 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,667,622 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,668,390 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,669,158 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,669,926 UART: |_|
5,670,238 UART:
5,957,299 UART: [rt] Runtime listening for mailbox commands...
5,958,470 >>> mbox cmd response data (48 bytes)
5,958,471 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,958,579 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,023 ready_for_fw is high
1,061,023 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,313 >>> mbox cmd response: success
2,689,363 UART:
2,689,379 UART: Running Caliptra FMC ...
2,689,787 UART:
2,689,841 UART: [state] CFI Enabled
2,700,544 UART: [fht] FMC Alias Private Key: 7
2,808,319 UART: [art] Extend RT PCRs Done
2,808,747 UART: [art] Lock RT PCRs Done
2,810,325 UART: [art] Populate DV Done
2,818,606 UART: [fht] FMC Alias Private Key: 7
2,819,544 UART: [art] Derive CDI
2,819,824 UART: [art] Store in in slot 0x4
2,905,341 UART: [art] Derive Key Pair
2,905,701 UART: [art] Store priv key in slot 0x5
2,918,717 UART: [art] Derive Key Pair - Done
2,933,326 UART: [art] Signing Cert with AUTHO
2,933,806 UART: RITY.KEYID = 7
2,949,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,969 UART: [art] PUB.X = E659CF42BD513F6DE4A2D4D79E67F2A697F5492A12EDC51E32B0D29327B4E1CA0E9C6A7999C2909492F97FE0486FF8E1
2,956,746 UART: [art] PUB.Y = 5883FE90D14C1E9787D79BE18D1B5DAA15668B45223E603B4B1D05FB2E67A99D770AE966852333B4E51DD82254F2F2EC
2,963,694 UART: [art] SIG.R = D026B7CF27481CFCAB7DFB2E66BE8DFC253532E45866AAAC4C3386DEE7F67326CCFB009F49E62213E3FA1A65A71A4859
2,970,460 UART: [art] SIG.S = 1748C3033FDA9454D7020CD9B8C824D783B3C303E4215BCEDE833440211EAC065CC283343D90BE79E7CD1979A2733F6A
2,994,196 UART: Caliptra RT
2,994,450 UART: [state] CFI Enabled
3,101,370 UART: [rt] RT listening for mailbox commands...
3,102,040 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,076,586 >>> mbox cmd response: success
5,076,586 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,982 UART:
5,089,998 UART: Running Caliptra FMC ...
5,090,406 UART:
5,090,460 UART: [state] CFI Enabled
5,179,651 UART: [art] Extend RT PCRs Done
5,180,079 UART: [art] Lock RT PCRs Done
5,181,264 UART: [art] Populate DV Done
5,189,245 UART: [fht] FMC Alias Private Key: 7
5,190,425 UART: [art] Derive CDI
5,190,705 UART: [art] Store in in slot 0x4
5,276,286 UART: [art] Derive Key Pair
5,276,646 UART: [art] Store priv key in slot 0x5
5,289,158 UART: [art] Derive Key Pair - Done
5,303,525 UART: [art] Signing Cert with AUTHO
5,304,005 UART: RITY.KEYID = 7
5,319,063 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,828 UART: [art] PUB.X = 85CF91F4822B27E6D361E788345E0846C121F48571C32985BF20A22BF0FC15756E7AEC88A60EA9E0266E13187649A32C
5,326,588 UART: [art] PUB.Y = 4E42D6F24AC6599B988AB2FF0CAB28D32001C74B05A8C435313A09857188DFD0E62673D6940EBD40183CF1561F118CE7
5,333,525 UART: [art] SIG.R = 95173D93120AE186F586383E855542EC610105A94C3992B8C66ADB9F570C9EC5F269561E18067674C35C004862C49B83
5,340,244 UART: [art] SIG.S = 2475CB166211213425827116C9A820DE3A8F81396394465C15ACC2E5373C5E0B9CC4296B9889092FA1C6B3889E0F5AD3
5,364,424 UART: mbox::rt_entry...
5,364,796 UART: ____ _ _ _ ____ _____
5,365,580 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,366,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,367,148 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,367,916 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,368,684 UART: |_|
5,368,996 UART:
5,646,834 UART: [rt] Runtime listening for mailbox commands...
5,648,005 >>> mbox cmd response data (48 bytes)
5,648,006 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,648,114 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,414 UART: [kat] SHA2-256
904,354 UART: [kat] SHA2-384
907,149 UART: [kat] SHA2-512-ACC
909,050 UART: [kat] ECC-384
918,787 UART: [kat] HMAC-384Kdf
923,379 UART: [kat] LMS
1,171,707 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,798 UART: [fht] FHT @ 0x50003400
1,175,545 UART: [idev] ++
1,175,713 UART: [idev] CDI.KEYID = 6
1,176,073 UART: [idev] SUBJECT.KEYID = 7
1,176,497 UART: [idev] UDS.KEYID = 0
1,176,842 ready_for_fw is high
1,176,842 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,203 UART: [idev] Erasing UDS.KEYID = 0
1,202,122 UART: [idev] Sha1 KeyId Algorithm
1,210,724 UART: [idev] --
1,211,738 UART: [ldev] ++
1,211,906 UART: [ldev] CDI.KEYID = 6
1,212,269 UART: [ldev] SUBJECT.KEYID = 5
1,212,695 UART: [ldev] AUTHORITY.KEYID = 7
1,213,158 UART: [ldev] FE.KEYID = 1
1,217,956 UART: [ldev] Erasing FE.KEYID = 1
1,244,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,676 UART: [ldev] --
1,284,003 UART: [fwproc] Wait for Commands...
1,284,635 UART: [fwproc] Recv command 0x46574c44
1,285,363 UART: [fwproc] Recv'd Img size: 114360 bytes
2,585,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,777,759 >>> mbox cmd response: success
2,778,905 UART: [afmc] ++
2,779,073 UART: [afmc] CDI.KEYID = 6
2,779,435 UART: [afmc] SUBJECT.KEYID = 7
2,779,860 UART: [afmc] AUTHORITY.KEYID = 5
2,816,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,678 UART: [afmc] --
2,859,604 UART: [cold-reset] --
2,860,478 UART: [state] Locking Datavault
2,861,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,165 UART: [state] Locking ICCM
2,862,739 UART: [exit] Launching FMC @ 0x40000130
2,868,068 UART:
2,868,084 UART: Running Caliptra FMC ...
2,868,492 UART:
2,868,635 UART: [state] CFI Enabled
2,879,456 UART: [fht] FMC Alias Private Key: 7
2,987,751 UART: [art] Extend RT PCRs Done
2,988,179 UART: [art] Lock RT PCRs Done
2,989,581 UART: [art] Populate DV Done
2,997,638 UART: [fht] FMC Alias Private Key: 7
2,998,662 UART: [art] Derive CDI
2,998,942 UART: [art] Store in in slot 0x4
3,084,603 UART: [art] Derive Key Pair
3,084,963 UART: [art] Store priv key in slot 0x5
3,098,619 UART: [art] Derive Key Pair - Done
3,113,363 UART: [art] Signing Cert with AUTHO
3,113,843 UART: RITY.KEYID = 7
3,129,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,908 UART: [art] PUB.X = 41169E9E7807C611CFDD848BE7D84DA19BA1842525B667421B3EA60D3A3DE1B13DB8E0608954846A6DD91083133539CE
3,136,672 UART: [art] PUB.Y = 92B7A741A43F1CCA7F11CD1F8861B285F453382977FD39D585E455578B6FE66DBEDF7CF70F48ABFCC655A6DF46AFA532
3,143,635 UART: [art] SIG.R = 1EAAE096B96B5C5FB29F0CAC423D7DB66C11C2021EB5A50F597C419F5257F3503F8DB1C8396D730A3D6BF574ADDB5BF0
3,150,411 UART: [art] SIG.S = 90DFC9501388AD2E078B6B2B5931F395AEBA42058E7BB372A8E809BC2E879CE6D76420A73583AE6760F4E23B1CF8DC8E
3,174,077 UART: Caliptra RT
3,174,423 UART: [state] CFI Enabled
3,282,811 UART: [rt] RT listening for mailbox commands...
3,283,481 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,284,285 UART:
3,284,301 UART: Running Caliptra ROM ...
3,284,709 UART:
3,284,851 UART: [state] CFI Enabled
3,287,859 UART: [state] LifecycleState = Unprovisioned
3,288,514 UART: [state] DebugLocked = No
3,289,038 UART: [state] WD Timer not started. Device not locked for debugging
3,290,270 UART: [kat] SHA2-256
4,095,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,100,045 UART: [kat] ++
4,100,197 UART: [kat] sha1
4,104,279 UART: [kat] SHA2-256
4,106,219 UART: [kat] SHA2-384
4,108,958 UART: [kat] SHA2-512-ACC
4,110,858 UART: [kat] ECC-384
4,120,671 UART: [kat] HMAC-384Kdf
4,125,345 UART: [kat] LMS
4,373,673 UART: [kat] --
4,374,423 UART: [update-reset] ++
5,277,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,233 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,374,507 >>> mbox cmd response: success
5,374,507 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,374,776 UART: [update-reset] Copying MAN_2 To MAN_1
5,382,790 UART: [update-reset Success] --
5,383,817 UART: [state] Locking Datavault
5,384,631 UART: [state] Locking PCR0, PCR1 and PCR31
5,385,235 UART: [state] Locking ICCM
5,385,877 UART: [exit] Launching FMC @ 0x40000130
5,391,206 UART:
5,391,222 UART: Running Caliptra FMC ...
5,391,630 UART:
5,391,773 UART: [state] CFI Enabled
5,481,110 UART: [art] Extend RT PCRs Done
5,481,538 UART: [art] Lock RT PCRs Done
5,483,017 UART: [art] Populate DV Done
5,491,304 UART: [fht] FMC Alias Private Key: 7
5,492,316 UART: [art] Derive CDI
5,492,596 UART: [art] Store in in slot 0x4
5,578,399 UART: [art] Derive Key Pair
5,578,759 UART: [art] Store priv key in slot 0x5
5,592,629 UART: [art] Derive Key Pair - Done
5,607,788 UART: [art] Signing Cert with AUTHO
5,608,268 UART: RITY.KEYID = 7
5,623,504 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,269 UART: [art] PUB.X = 0579FFA77C4D47CD3EEDF919D1273634C1466C28E32D2C0D74EF4924DB498A5C0B9B0057A9C22B472E9B8A61EA065CA9
5,631,015 UART: [art] PUB.Y = 87A78CAD59C72CCE0BB8F8884AB09C3FFE081A8C735D911CA1C13D64279D5B217EDB3A9EFC6388F5E81CA264F3D2541B
5,637,977 UART: [art] SIG.R = CBC34CCB3114CF0EC6EF7BBA6FCC60FDCC4C9B5149ADDBB69B338146241B989E209FA77FA7DE7B24899F7C15137BC1D4
5,644,770 UART: [art] SIG.S = E8ADF33BB25281FF989C60D43DE3EC5D0A1839387589E1C958BB0E02656FFBC89CABCE0C5D029517324F268B3816F012
5,668,786 UART: mbox::rt_entry...
5,669,158 UART: ____ _ _ _ ____ _____
5,669,942 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,670,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,671,510 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,672,278 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,673,046 UART: |_|
5,673,358 UART:
5,956,729 UART: [rt] Runtime listening for mailbox commands...
5,957,900 >>> mbox cmd response data (48 bytes)
5,957,901 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,958,009 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,152 ready_for_fw is high
1,061,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,540 >>> mbox cmd response: success
2,689,734 UART:
2,689,750 UART: Running Caliptra FMC ...
2,690,158 UART:
2,690,301 UART: [state] CFI Enabled
2,700,864 UART: [fht] FMC Alias Private Key: 7
2,808,763 UART: [art] Extend RT PCRs Done
2,809,191 UART: [art] Lock RT PCRs Done
2,810,611 UART: [art] Populate DV Done
2,818,644 UART: [fht] FMC Alias Private Key: 7
2,819,668 UART: [art] Derive CDI
2,819,948 UART: [art] Store in in slot 0x4
2,905,733 UART: [art] Derive Key Pair
2,906,093 UART: [art] Store priv key in slot 0x5
2,918,993 UART: [art] Derive Key Pair - Done
2,934,084 UART: [art] Signing Cert with AUTHO
2,934,564 UART: RITY.KEYID = 7
2,949,748 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,513 UART: [art] PUB.X = F23C33783BB059C648973AE5F5EFA4FCD0AD879E44A9DE3A76BDAC89EA47243A20B5649925A1C72F0AA89A626D3FE810
2,957,294 UART: [art] PUB.Y = E137C5C098F3B7565E9AD5A52624C9FCF4E7279F8CC2F0F291B54651533B71D6E720697F13A49F25DDC6363C4F4294A1
2,964,246 UART: [art] SIG.R = F893570F0192CE39591997D180A4FA571036087FA0F77F964E3D77101F9F0EF5DEB1617C70AD6E8812CCACFB9B48AAE5
2,971,012 UART: [art] SIG.S = 3670DE847B71848962B34CE673CACBB9139645182D1AAFAA1AB9B805C8992D832473FBBD67AD1BD63D77D32C879D77BA
2,995,026 UART: Caliptra RT
2,995,372 UART: [state] CFI Enabled
3,102,548 UART: [rt] RT listening for mailbox commands...
3,103,218 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,078,375 >>> mbox cmd response: success
5,078,375 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,091,851 UART:
5,091,867 UART: Running Caliptra FMC ...
5,092,275 UART:
5,092,418 UART: [state] CFI Enabled
5,181,397 UART: [art] Extend RT PCRs Done
5,181,825 UART: [art] Lock RT PCRs Done
5,182,954 UART: [art] Populate DV Done
5,191,105 UART: [fht] FMC Alias Private Key: 7
5,192,041 UART: [art] Derive CDI
5,192,321 UART: [art] Store in in slot 0x4
5,278,100 UART: [art] Derive Key Pair
5,278,460 UART: [art] Store priv key in slot 0x5
5,291,344 UART: [art] Derive Key Pair - Done
5,306,454 UART: [art] Signing Cert with AUTHO
5,306,934 UART: RITY.KEYID = 7
5,321,390 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,155 UART: [art] PUB.X = 2B49ACCBA402393409AC80958B47B0142618B2FAFA3644B54A0E562A4E0F86BE4F94D622B7852D732BB92EE26EBD536E
5,328,921 UART: [art] PUB.Y = D30DC1C6A98080DCBA104C64A9FF66083BF27F87E179892AF5907E49A5E196099FED32848F8449C0E6BE03980C85A264
5,335,858 UART: [art] SIG.R = 69FDD5D416920FEDA83E9EEA9B23A7F1CCC648AD97C1834AEA8303BDE13FE59522F646765C3532456CA73DCFCE599461
5,342,636 UART: [art] SIG.S = 93189C614742CD4751AC6854955E4A9F2EF039D6CACAB883AE1A205017D5B6F20109D94CD6FB61E0702A93C0C8E6EE01
5,365,958 UART: mbox::rt_entry...
5,366,330 UART: ____ _ _ _ ____ _____
5,367,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,367,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,368,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,369,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,370,218 UART: |_|
5,370,530 UART:
5,651,776 UART: [rt] Runtime listening for mailbox commands...
5,652,947 >>> mbox cmd response data (48 bytes)
5,652,948 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,653,056 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,174,539 ready_for_fw is high
1,174,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,242,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,700 UART: [ldev] --
1,281,142 UART: [fwproc] Wait for Commands...
1,281,883 UART: [fwproc] Recv command 0x46574c44
1,282,616 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,022 >>> mbox cmd response: success
2,773,285 UART: [afmc] ++
2,773,453 UART: [afmc] CDI.KEYID = 6
2,773,816 UART: [afmc] SUBJECT.KEYID = 7
2,774,242 UART: [afmc] AUTHORITY.KEYID = 5
2,809,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,130 UART: [afmc] --
2,853,056 UART: [cold-reset] --
2,853,888 UART: [state] Locking Datavault
2,855,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,969 UART: [state] Locking ICCM
2,856,477 UART: [exit] Launching FMC @ 0x40000130
2,861,806 UART:
2,861,822 UART: Running Caliptra FMC ...
2,862,230 UART:
2,862,284 UART: [state] CFI Enabled
2,872,957 UART: [fht] FMC Alias Private Key: 7
2,980,396 UART: [art] Extend RT PCRs Done
2,980,824 UART: [art] Lock RT PCRs Done
2,982,372 UART: [art] Populate DV Done
2,990,533 UART: [fht] FMC Alias Private Key: 7
2,991,613 UART: [art] Derive CDI
2,991,893 UART: [art] Store in in slot 0x4
3,077,546 UART: [art] Derive Key Pair
3,077,906 UART: [art] Store priv key in slot 0x5
3,090,964 UART: [art] Derive Key Pair - Done
3,105,815 UART: [art] Signing Cert with AUTHO
3,106,295 UART: RITY.KEYID = 7
3,120,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,628 UART: [art] PUB.X = 77D3EF960B2FD0039C2ECEB80C1BD7EE35F742CD0EA04E02EDBBD41552E5ECB15D21B0A9AA1DF0F1E196BCA3C22D8AFA
3,128,417 UART: [art] PUB.Y = EFD3FA889FBB4F929D58B230F0A8B08BEEE222920DE0057DE7E60EC70FAC7B6B8EDCE631148A87C115612E2E42766265
3,135,369 UART: [art] SIG.R = AF7F72CC0768E60881AA595340D8B5BBB7E196A62CE000965DDF64895F83EC5DF15E95F704A37116E1EED9201CACCEB2
3,142,122 UART: [art] SIG.S = 1A30F6106BB030B7BF1BEEBE67F501178012B36EB9FF5793FA454CA6040092D64D54786FF6E27566128A5B35F800ECE6
3,166,251 UART: Caliptra RT
3,166,505 UART: [state] CFI Enabled
3,273,523 UART: [rt] RT listening for mailbox commands...
3,274,193 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,131 UART:
3,275,147 UART: Running Caliptra ROM ...
3,275,555 UART:
3,275,610 UART: [state] CFI Enabled
3,278,324 UART: [state] LifecycleState = Unprovisioned
3,278,979 UART: [state] DebugLocked = No
3,279,649 UART: [state] WD Timer not started. Device not locked for debugging
3,280,813 UART: [kat] SHA2-256
4,084,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,492 UART: [kat] ++
4,088,644 UART: [kat] sha1
4,093,000 UART: [kat] SHA2-256
4,094,940 UART: [kat] SHA2-384
4,097,785 UART: [kat] SHA2-512-ACC
4,099,685 UART: [kat] ECC-384
4,109,572 UART: [kat] HMAC-384Kdf
4,114,184 UART: [kat] LMS
4,362,496 UART: [kat] --
4,363,250 UART: [update-reset] ++
5,267,762 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,268,909 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,365,183 >>> mbox cmd response: success
5,365,183 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,365,434 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,448 UART: [update-reset Success] --
5,374,323 UART: [state] Locking Datavault
5,375,141 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,745 UART: [state] Locking ICCM
5,376,383 UART: [exit] Launching FMC @ 0x40000130
5,381,712 UART:
5,381,728 UART: Running Caliptra FMC ...
5,382,136 UART:
5,382,190 UART: [state] CFI Enabled
5,470,945 UART: [art] Extend RT PCRs Done
5,471,373 UART: [art] Lock RT PCRs Done
5,472,652 UART: [art] Populate DV Done
5,481,079 UART: [fht] FMC Alias Private Key: 7
5,482,085 UART: [art] Derive CDI
5,482,365 UART: [art] Store in in slot 0x4
5,568,186 UART: [art] Derive Key Pair
5,568,546 UART: [art] Store priv key in slot 0x5
5,581,892 UART: [art] Derive Key Pair - Done
5,596,542 UART: [art] Signing Cert with AUTHO
5,597,022 UART: RITY.KEYID = 7
5,612,500 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,265 UART: [art] PUB.X = 1F0CEA4797300AA0DD4C2AAD313C89965EC72DA78F2543D48E9DB9589246EDFAF19CA918BFCF3EF12B02B3BB1C022242
5,620,041 UART: [art] PUB.Y = 86117472A39991DB5F172DDD6DB60113475E1F948363EEA7959B7D2586D87F5A8B9F8F1A9CCF5EE77D70573E8292CDA6
5,626,992 UART: [art] SIG.R = CD2B151B02B450ACAC9A0F08459B5B2688939CEDF0F5918C5A0BD1E461A49069EEA008AB04C87C2D38A0431F8B46A99B
5,633,756 UART: [art] SIG.S = 76F1AFA7BA17F0A232B7C6D79F8EE6328585807398D2C164B3AAA3BC952B72A146086AEE2B1FFB82915D5D7BC7653666
5,657,164 UART: mbox::rt_entry...
5,657,536 UART: ____ _ _ _ ____ _____
5,658,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,659,120 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,659,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,660,656 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,661,424 UART: |_|
5,661,736 UART:
5,942,036 UART: [rt] Runtime listening for mailbox commands...
5,943,207 >>> mbox cmd response data (48 bytes)
5,943,208 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,943,316 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,260 ready_for_fw is high
1,056,260 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,354 >>> mbox cmd response: success
2,683,694 UART:
2,683,710 UART: Running Caliptra FMC ...
2,684,118 UART:
2,684,172 UART: [state] CFI Enabled
2,694,695 UART: [fht] FMC Alias Private Key: 7
2,802,634 UART: [art] Extend RT PCRs Done
2,803,062 UART: [art] Lock RT PCRs Done
2,804,822 UART: [art] Populate DV Done
2,812,939 UART: [fht] FMC Alias Private Key: 7
2,814,095 UART: [art] Derive CDI
2,814,375 UART: [art] Store in in slot 0x4
2,899,734 UART: [art] Derive Key Pair
2,900,094 UART: [art] Store priv key in slot 0x5
2,913,538 UART: [art] Derive Key Pair - Done
2,928,191 UART: [art] Signing Cert with AUTHO
2,928,671 UART: RITY.KEYID = 7
2,944,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,898 UART: [art] PUB.X = FF71B02EE458953F760C846C0A366EE388CEA59F1E60D5EE938D250883C5C8830D7210E9B136A34936F0B2BCFA26B6C5
2,951,662 UART: [art] PUB.Y = CBD6FBC5AC977572C8C6AC7616D9549BB10EEA601EAE1585EC69F629BCE2F013F0EEB589E4BC8AE5EC5A222BA59731B8
2,958,633 UART: [art] SIG.R = F5033EEB57B1841AC733BBCBF2F4F45C2844AECC2E9BA38689C113CF28582BE3897504B00FC2D1FD4CA6F74B74E5DAFC
2,965,416 UART: [art] SIG.S = E123C3BC35261A132B26A8D79D89F5D8860FBEF5FBE4CFAFD02A8A9506BEFBDBBA2E18B0C61B0C8E8CB6B6F5C91F590E
2,989,261 UART: Caliptra RT
2,989,515 UART: [state] CFI Enabled
3,095,850 UART: [rt] RT listening for mailbox commands...
3,096,520 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,066,793 >>> mbox cmd response: success
5,066,793 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,080,063 UART:
5,080,079 UART: Running Caliptra FMC ...
5,080,487 UART:
5,080,541 UART: [state] CFI Enabled
5,169,678 UART: [art] Extend RT PCRs Done
5,170,106 UART: [art] Lock RT PCRs Done
5,171,339 UART: [art] Populate DV Done
5,179,604 UART: [fht] FMC Alias Private Key: 7
5,180,700 UART: [art] Derive CDI
5,180,980 UART: [art] Store in in slot 0x4
5,266,577 UART: [art] Derive Key Pair
5,266,937 UART: [art] Store priv key in slot 0x5
5,280,407 UART: [art] Derive Key Pair - Done
5,294,829 UART: [art] Signing Cert with AUTHO
5,295,309 UART: RITY.KEYID = 7
5,310,851 UART: [art] Erasing AUTHORITY.KEYID = 7
5,311,616 UART: [art] PUB.X = AE2764FFFF98238D05374B2422E91D2DD2A49F60717A69EB67AD56A824DEB2A4F7722C0E2051B1322347353CD356D54D
5,318,382 UART: [art] PUB.Y = 6D8531E96296DA8E6C2FE66848FBFB63D3BFDF05955838A126FBFD358013597BF3BCF5A3F2130C55E6224BAB1FF5A925
5,325,338 UART: [art] SIG.R = C0649FE80B12357318F30B716C3ADACC577E683042C739F900A3771F12A3347D634B133AF4A64565B8C87001C39E3361
5,332,069 UART: [art] SIG.S = 57AD3F749EC2C3ABB0AF45AEE1A4997B79CB5EC6969B699A5CA72239490161E2703FD37100706B090E5FADBE3B225074
5,355,767 UART: mbox::rt_entry...
5,356,139 UART: ____ _ _ _ ____ _____
5,356,923 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,357,723 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,358,491 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,359,259 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,360,027 UART: |_|
5,360,339 UART:
5,644,869 UART: [rt] Runtime listening for mailbox commands...
5,646,040 >>> mbox cmd response data (48 bytes)
5,646,041 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,646,149 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,832 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 ready_for_fw is high
1,174,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,630 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,242,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,745 >>> mbox cmd response: success
2,774,860 UART: [afmc] ++
2,775,028 UART: [afmc] CDI.KEYID = 6
2,775,391 UART: [afmc] SUBJECT.KEYID = 7
2,775,817 UART: [afmc] AUTHORITY.KEYID = 5
2,810,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,373 UART: [afmc] --
2,854,431 UART: [cold-reset] --
2,855,305 UART: [state] Locking Datavault
2,856,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,108 UART: [state] Locking ICCM
2,857,726 UART: [exit] Launching FMC @ 0x40000130
2,863,055 UART:
2,863,071 UART: Running Caliptra FMC ...
2,863,479 UART:
2,863,622 UART: [state] CFI Enabled
2,873,965 UART: [fht] FMC Alias Private Key: 7
2,982,102 UART: [art] Extend RT PCRs Done
2,982,530 UART: [art] Lock RT PCRs Done
2,983,954 UART: [art] Populate DV Done
2,992,015 UART: [fht] FMC Alias Private Key: 7
2,993,179 UART: [art] Derive CDI
2,993,459 UART: [art] Store in in slot 0x4
3,079,256 UART: [art] Derive Key Pair
3,079,616 UART: [art] Store priv key in slot 0x5
3,092,588 UART: [art] Derive Key Pair - Done
3,107,434 UART: [art] Signing Cert with AUTHO
3,107,914 UART: RITY.KEYID = 7
3,122,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,695 UART: [art] PUB.X = 6C259A5CE085D1BDCAEF9BEF81597AB70FA19DAE127DFB743C8C244E9AA29F0E20BE9E83080B60E885389B64DCC75670
3,130,471 UART: [art] PUB.Y = 2DC80DE3547E065EB4E038FB1AA29FC6549B0BF4C6D36697909C2A94E953D39882FA90C4C605D637E5C1782C29516B08
3,137,408 UART: [art] SIG.R = FC1C388D6909F542F2AB524D247B2249068CE60A2900827DA02CF445F3F81799B392E285633F0CA91F84780159DE2A9D
3,144,137 UART: [art] SIG.S = D0784198326BFC7BCD6529C9164AE2E3F3210783D6404A7D558FFE039DC0A4B3E52EDFC2D97FFCE19FEF52BE521518A2
3,168,222 UART: Caliptra RT
3,168,568 UART: [state] CFI Enabled
3,274,947 UART: [rt] RT listening for mailbox commands...
3,275,617 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,531 UART:
3,276,547 UART: Running Caliptra ROM ...
3,276,955 UART:
3,277,097 UART: [state] CFI Enabled
3,280,053 UART: [state] LifecycleState = Unprovisioned
3,280,708 UART: [state] DebugLocked = No
3,281,312 UART: [state] WD Timer not started. Device not locked for debugging
3,282,610 UART: [kat] SHA2-256
4,086,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,289 UART: [kat] ++
4,090,441 UART: [kat] sha1
4,094,551 UART: [kat] SHA2-256
4,096,491 UART: [kat] SHA2-384
4,099,254 UART: [kat] SHA2-512-ACC
4,101,154 UART: [kat] ECC-384
4,111,159 UART: [kat] HMAC-384Kdf
4,115,851 UART: [kat] LMS
4,364,163 UART: [kat] --
4,365,077 UART: [update-reset] ++
5,267,809 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,268,932 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,365,206 >>> mbox cmd response: success
5,365,206 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,365,431 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,445 UART: [update-reset Success] --
5,374,314 UART: [state] Locking Datavault
5,375,034 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,638 UART: [state] Locking ICCM
5,376,112 UART: [exit] Launching FMC @ 0x40000130
5,381,441 UART:
5,381,457 UART: Running Caliptra FMC ...
5,381,865 UART:
5,382,008 UART: [state] CFI Enabled
5,470,847 UART: [art] Extend RT PCRs Done
5,471,275 UART: [art] Lock RT PCRs Done
5,472,374 UART: [art] Populate DV Done
5,480,747 UART: [fht] FMC Alias Private Key: 7
5,481,771 UART: [art] Derive CDI
5,482,051 UART: [art] Store in in slot 0x4
5,567,566 UART: [art] Derive Key Pair
5,567,926 UART: [art] Store priv key in slot 0x5
5,581,308 UART: [art] Derive Key Pair - Done
5,596,045 UART: [art] Signing Cert with AUTHO
5,596,525 UART: RITY.KEYID = 7
5,611,883 UART: [art] Erasing AUTHORITY.KEYID = 7
5,612,648 UART: [art] PUB.X = 00E765D41102E2EE348D90B90E66D0F2B558B099BDF6D99746D97E82AB723B1FB21ADF46097ECB69464BD8CF3BF83A84
5,619,397 UART: [art] PUB.Y = AF8C949FED7D0BE3CE2ACB92C9C7DE90AE9B74FB4891802AAF88F54510B590BADF8EDCFC074849FA8D4D20C2F7803963
5,626,365 UART: [art] SIG.R = 2D1846089808ABF714D913EB06EAA4404CD0D0ABDFECF45DC1A47F9B11F22176F4DBBDA46C23E1B9CE436F396759EF74
5,633,144 UART: [art] SIG.S = F399E39766A2395857850075A7C995EBAB536F82A3D08881CCD2B7A29D0DBA3C2A2D144CE8504A66075A21B50651473B
5,656,938 UART: mbox::rt_entry...
5,657,310 UART: ____ _ _ _ ____ _____
5,658,094 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,658,894 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,659,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,660,430 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,661,198 UART: |_|
5,661,510 UART:
5,942,958 UART: [rt] Runtime listening for mailbox commands...
5,944,129 >>> mbox cmd response data (48 bytes)
5,944,130 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,944,238 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,761 ready_for_fw is high
1,056,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,005 >>> mbox cmd response: success
2,685,453 UART:
2,685,469 UART: Running Caliptra FMC ...
2,685,877 UART:
2,686,020 UART: [state] CFI Enabled
2,697,013 UART: [fht] FMC Alias Private Key: 7
2,805,322 UART: [art] Extend RT PCRs Done
2,805,750 UART: [art] Lock RT PCRs Done
2,806,940 UART: [art] Populate DV Done
2,815,117 UART: [fht] FMC Alias Private Key: 7
2,816,297 UART: [art] Derive CDI
2,816,577 UART: [art] Store in in slot 0x4
2,902,014 UART: [art] Derive Key Pair
2,902,374 UART: [art] Store priv key in slot 0x5
2,915,718 UART: [art] Derive Key Pair - Done
2,930,462 UART: [art] Signing Cert with AUTHO
2,930,942 UART: RITY.KEYID = 7
2,946,314 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,079 UART: [art] PUB.X = 1DB0DE230F35432942BDB7610694D9368A52771E4F9AAFFD27F1C0525C919CFDA6BD731975BF9362231F06E6BC7BD90A
2,953,845 UART: [art] PUB.Y = CFC5451BFB78936E08C7EA5E87C215B806063EAEF77D76BAFC1B950C4122A60C5214A2ED2EA642E0B9897218E30C3DB9
2,960,789 UART: [art] SIG.R = 473D4D4AC72F7B8245C6F21CB4D5F9235A35D242BA6C70171E1B8CBCF9F1305591A02EE8EDB500CD4A03F06ABA26265A
2,967,548 UART: [art] SIG.S = 0060DB9E0D3554D82ECDE5A9FEB7FF846F82700C2110D5DD7C121297A8774D51E217B2BDC2C64DD08E9EA00EE804E1C2
2,991,917 UART: Caliptra RT
2,992,263 UART: [state] CFI Enabled
3,100,130 UART: [rt] RT listening for mailbox commands...
3,100,800 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,072,472 >>> mbox cmd response: success
5,072,472 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,086,096 UART:
5,086,112 UART: Running Caliptra FMC ...
5,086,520 UART:
5,086,663 UART: [state] CFI Enabled
5,176,298 UART: [art] Extend RT PCRs Done
5,176,726 UART: [art] Lock RT PCRs Done
5,178,031 UART: [art] Populate DV Done
5,186,448 UART: [fht] FMC Alias Private Key: 7
5,187,568 UART: [art] Derive CDI
5,187,848 UART: [art] Store in in slot 0x4
5,273,391 UART: [art] Derive Key Pair
5,273,751 UART: [art] Store priv key in slot 0x5
5,287,121 UART: [art] Derive Key Pair - Done
5,301,475 UART: [art] Signing Cert with AUTHO
5,301,955 UART: RITY.KEYID = 7
5,317,131 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,896 UART: [art] PUB.X = 815D1666B44E819B96B6C48816AE9DEEAA9DCD6BC8047086EE89F1C4A56F8C949375501D2CFBD45014E6EE835B92CCFD
5,324,677 UART: [art] PUB.Y = B7AADEE6B3DA2D0B914FAC1A6F33E5F6CCC7C9AC7DC397C8B8C2616AE19ADC864446DC8ADAB70935D072F63941FEEDA9
5,331,653 UART: [art] SIG.R = DDAE8024DA9E8A067DC99C5790344D65F758D4E921DDCB5C30B9A64F6332D0D1A9E94B991D931AAE34762931B0B6A51C
5,338,430 UART: [art] SIG.S = 11C8E19EDDB0AD451B2382B960F506749AA2F8CC0356C9FA39079A592B5B79D9C69E2A813145607FC26981946317BF63
5,361,688 UART: mbox::rt_entry...
5,362,060 UART: ____ _ _ _ ____ _____
5,362,844 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,363,644 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,364,412 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,365,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,365,948 UART: |_|
5,366,260 UART:
5,648,030 UART: [rt] Runtime listening for mailbox commands...
5,649,201 >>> mbox cmd response data (48 bytes)
5,649,202 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,649,310 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,504 UART:
192,877 UART: Running Caliptra ROM ...
193,998 UART:
194,140 UART: [state] CFI Enabled
263,849 UART: [state] LifecycleState = Unprovisioned
266,006 UART: [state] DebugLocked = No
267,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,122 UART: [kat] SHA2-256
442,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,306 UART: [kat] ++
453,753 UART: [kat] sha1
464,193 UART: [kat] SHA2-256
466,837 UART: [kat] SHA2-384
473,882 UART: [kat] SHA2-512-ACC
476,237 UART: [kat] ECC-384
2,767,998 UART: [kat] HMAC-384Kdf
2,799,803 UART: [kat] LMS
3,990,053 UART: [kat] --
3,994,939 UART: [cold-reset] ++
3,996,582 UART: [fht] Storing FHT @ 0x50003400
4,007,417 UART: [idev] ++
4,007,980 UART: [idev] CDI.KEYID = 6
4,009,041 UART: [idev] SUBJECT.KEYID = 7
4,010,149 UART: [idev] UDS.KEYID = 0
4,011,232 ready_for_fw is high
4,011,471 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,993 UART: [idev] Erasing UDS.KEYID = 0
7,345,756 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,627 UART: [idev] --
7,372,272 UART: [ldev] ++
7,372,837 UART: [ldev] CDI.KEYID = 6
7,373,790 UART: [ldev] SUBJECT.KEYID = 5
7,374,994 UART: [ldev] AUTHORITY.KEYID = 7
7,376,268 UART: [ldev] FE.KEYID = 1
7,421,754 UART: [ldev] Erasing FE.KEYID = 1
10,752,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,598 UART: [ldev] --
13,113,503 UART: [fwproc] Waiting for Commands...
13,115,164 UART: [fwproc] Received command 0x46574c44
13,117,392 UART: [fwproc] Received Image of size 114036 bytes
17,170,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,661 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,626,868 >>> mbox cmd response: success
17,631,281 UART: [afmc] ++
17,631,874 UART: [afmc] CDI.KEYID = 6
17,632,778 UART: [afmc] SUBJECT.KEYID = 7
17,634,044 UART: [afmc] AUTHORITY.KEYID = 5
21,004,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,422 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,848 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,683 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,139 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,755 UART: [afmc] --
23,378,281 UART: [cold-reset] --
23,383,913 UART: [state] Locking Datavault
23,388,441 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,207 UART: [state] Locking ICCM
23,392,382 UART: [exit] Launching FMC @ 0x40000130
23,400,776 UART:
23,401,007 UART: Running Caliptra FMC ...
23,402,104 UART:
23,402,258 UART: [state] CFI Enabled
23,466,889 UART: [fht] FMC Alias Private Key: 7
25,804,739 UART: [art] Extend RT PCRs Done
25,805,958 UART: [art] Lock RT PCRs Done
25,807,872 UART: [art] Populate DV Done
25,813,168 UART: [fht] FMC Alias Private Key: 7
25,814,879 UART: [art] Derive CDI
25,815,690 UART: [art] Store in in slot 0x4
25,875,868 UART: [art] Derive Key Pair
25,876,909 UART: [art] Store priv key in slot 0x5
29,169,890 UART: [art] Derive Key Pair - Done
29,182,985 UART: [art] Signing Cert with AUTHO
29,184,284 UART: RITY.KEYID = 7
31,472,086 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,578 UART: [art] PUB.X = 0CAABB9C0B80D24302B432D399B5C9CA89EFA90FCB9D2EA469AE3047BB46151B73D8284F74498F44F5FC51D1C41898AA
31,480,889 UART: [art] PUB.Y = 4E897BB74B1642C7B426C634A03605F23A00663CCA5100259AC2545E004DB9266464F9D60FDB5991CAD08625959ABDA0
31,488,043 UART: [art] SIG.R = 3CF7E70D738CFC7952C67133DCD79E2156AD1FDB8678A1D98E9CD7E429975339905BA13763FA0D4AECB7437DA6D36080
31,495,458 UART: [art] SIG.S = D3CDBD51C77013D2F37C0D9608B232EA15265319E24007CD1535C7A6E7D2173F4771A26678E06EE60EA48D24A4241362
32,800,422 UART: Caliptra RT
32,801,123 UART: [state] CFI Enabled
32,963,050 UART: [rt] RT listening for mailbox commands...
32,965,368 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,995,386 UART: [rt]cmd =0x54514754, len=24
32,998,121 >>> mbox cmd response data (8 bytes)
35,053,809 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,154,657 UART:
35,155,027 UART: Running Caliptra ROM ...
35,156,159 UART:
35,156,319 UART: [state] CFI Enabled
35,225,656 UART: [state] LifecycleState = Unprovisioned
35,227,606 UART: [state] DebugLocked = No
35,230,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,234,757 UART: [kat] SHA2-256
35,404,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,414,957 UART: [kat] ++
35,415,409 UART: [kat] sha1
35,426,558 UART: [kat] SHA2-256
35,429,254 UART: [kat] SHA2-384
35,435,342 UART: [kat] SHA2-512-ACC
35,437,737 UART: [kat] ECC-384
37,729,353 UART: [kat] HMAC-384Kdf
37,760,800 UART: [kat] LMS
38,951,132 UART: [kat] --
38,955,358 UART: [update-reset] ++
42,669,176 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,673,590 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,931,817 >>> mbox cmd response: success
42,932,180 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,932,616 UART: [update-reset] Copying MAN_2 To MAN_1
42,955,059 UART: [update-reset Success] --
42,960,546 UART: [state] Locking Datavault
42,963,733 UART: [state] Locking PCR0, PCR1 and PCR31
42,965,423 UART: [state] Locking ICCM
42,967,374 UART: [exit] Launching FMC @ 0x40000130
42,975,810 UART:
42,976,036 UART: Running Caliptra FMC ...
42,977,130 UART:
42,977,282 UART: [state] CFI Enabled
43,081,882 UART: [art] Extend RT PCRs Done
43,083,066 UART: [art] Lock RT PCRs Done
43,084,490 UART: [art] Populate DV Done
43,089,781 UART: [fht] FMC Alias Private Key: 7
43,091,353 UART: [art] Derive CDI
43,092,161 UART: [art] Store in in slot 0x4
43,150,627 UART: [art] Derive Key Pair
43,151,658 UART: [art] Store priv key in slot 0x5
46,444,035 UART: [art] Derive Key Pair - Done
46,456,864 UART: [art] Signing Cert with AUTHO
46,458,158 UART: RITY.KEYID = 7
48,746,674 UART: [art] Erasing AUTHORITY.KEYID = 7
48,748,178 UART: [art] PUB.X = 95E35C1F8C0B5A040BF76973B248903F2872DE6B5516CD623C13F7DD0FED7C58C95984AA2E826E624BF1A2EF543268D4
48,755,416 UART: [art] PUB.Y = 2F745075B48BAEF150D365243D8F85001B9CCFF8FD46E933D7B170C9B7D187CAA3C60ED3A4C2B75DB02D4D141F86FD38
48,762,693 UART: [art] SIG.R = 991BE7BF344530A11B1114C6F1E375C0343BCB4D05640B7DACE262D7A34F1E5EAAE9F2B38459C0F51155ADC17BC1173B
48,770,122 UART: [art] SIG.S = 039FE3234AF86CBA0DE96FA873ADBB7525CF0AF02C03407D433C5B9D1E6A32F78F18586514A5C5C60DC64F119AFD276F
50,075,126 UART: mbox::rt_entry...
50,076,093 UART: ____ _ _ _ ____ _____
50,078,190 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,080,195 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,082,119 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,084,042 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,085,969 UART: |_|
50,086,951 UART:
50,369,252 UART: [rt] Runtime listening for mailbox commands...
50,371,309 >>> mbox cmd response data (120 bytes)
52,420,892 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,520,905 UART:
52,521,257 UART: Running Caliptra ROM ...
52,522,297 UART:
52,522,443 UART: [state] CFI Enabled
52,588,402 UART: [state] LifecycleState = Unprovisioned
52,590,341 UART: [state] DebugLocked = No
52,593,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,597,573 UART: [kat] SHA2-256
52,767,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,777,819 UART: [kat] ++
52,778,267 UART: [kat] sha1
52,788,332 UART: [kat] SHA2-256
52,791,019 UART: [kat] SHA2-384
52,796,189 UART: [kat] SHA2-512-ACC
52,798,583 UART: [kat] ECC-384
55,091,843 UART: [kat] HMAC-384Kdf
55,123,593 UART: [kat] LMS
56,313,899 UART: [kat] --
56,318,015 UART: [update-reset] ++
60,021,629 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,025,014 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
60,283,193 >>> mbox cmd response: success
60,283,559 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,283,895 UART: [update-reset] Copying MAN_2 To MAN_1
60,306,332 UART: [update-reset Success] --
60,312,363 UART: [state] Locking Datavault
60,314,265 UART: [state] Locking PCR0, PCR1 and PCR31
60,316,015 UART: [state] Locking ICCM
60,317,349 UART: [exit] Launching FMC @ 0x40000130
60,325,795 UART:
60,326,023 UART: Running Caliptra FMC ...
60,327,117 UART:
60,327,267 UART: [state] CFI Enabled
60,425,269 UART: [art] Extend RT PCRs Done
60,426,482 UART: [art] Lock RT PCRs Done
60,427,774 UART: [art] Populate DV Done
60,433,120 UART: [fht] FMC Alias Private Key: 7
60,434,808 UART: [art] Derive CDI
60,435,615 UART: [art] Store in in slot 0x4
60,494,136 UART: [art] Derive Key Pair
60,495,127 UART: [art] Store priv key in slot 0x5
63,787,090 UART: [art] Derive Key Pair - Done
63,800,460 UART: [art] Signing Cert with AUTHO
63,801,762 UART: RITY.KEYID = 7
66,088,162 UART: [art] Erasing AUTHORITY.KEYID = 7
66,089,669 UART: [art] PUB.X = 72B436EFDF29270E23E943FF2B18BA1345CB82F26A0C65FB8E24142962488308452D0AC073C406AB2A5C13A301569471
66,096,913 UART: [art] PUB.Y = 0F32925465CEDA6BA52F64C8C7B775F313C257A904CC6E96415EDF03320FCA2CA913D57A56ABA6370EACB5D0BC6864CC
66,104,189 UART: [art] SIG.R = 78CEDF5A717D4F44DBCDA986711BBA48B44797671CCE5CA0793051FEF9C039E0CB33D92B3E6337F52B558DCA1CA8B252
66,111,604 UART: [art] SIG.S = 55975126F0ACCEDEC961A394E4187CFC6747E2C8BE38AA8F8757A295110078F741711B7CD5CFE1C471999E2666EE743A
67,416,729 UART: mbox::rt_entry...
67,417,688 UART: ____ _ _ _ ____ _____
67,419,670 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,421,668 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,423,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,425,520 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,427,368 UART: |_|
67,428,183 UART:
67,714,702 UART: [rt] Runtime listening for mailbox commands...
67,716,767 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,782,641 ready_for_fw is high
3,783,176 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,860,879 >>> mbox cmd response: success
23,546,081 UART:
23,546,472 UART: Running Caliptra FMC ...
23,547,809 UART:
23,547,972 UART: [state] CFI Enabled
23,597,813 UART: [fht] FMC Alias Private Key: 7
25,935,715 UART: [art] Extend RT PCRs Done
25,936,945 UART: [art] Lock RT PCRs Done
25,938,599 UART: [art] Populate DV Done
25,944,011 UART: [fht] FMC Alias Private Key: 7
25,945,714 UART: [art] Derive CDI
25,946,446 UART: [art] Store in in slot 0x4
26,006,078 UART: [art] Derive Key Pair
26,007,128 UART: [art] Store priv key in slot 0x5
29,299,761 UART: [art] Derive Key Pair - Done
29,312,557 UART: [art] Signing Cert with AUTHO
29,313,856 UART: RITY.KEYID = 7
31,600,396 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,901 UART: [art] PUB.X = 5E5FAB16BAE672ECCA505D7A196C1D742A599396BDD0AF3863BCE25D312C9587486214ABF554E99C692C5369B9DC44F9
31,609,148 UART: [art] PUB.Y = 578D1D497145EE01BF6D2F0E105F3C9694978A41613072B1DD6E07AF3BD178C2D46DD354314AC97508AEA9945CFCD395
31,616,404 UART: [art] SIG.R = F266B4675776004E4C4F734D37E139A14C4F567E51630949C006299D7FE03B9DF3E088F54CD499C2158D3C6AD5D8433A
31,623,780 UART: [art] SIG.S = DD4DBA635F8CDCD54E699A62B7C923229E8A4110FC3A9C8F4F048FF4F1D9691665661BDB0E8AD1905AF330CA89DB58CD
32,928,680 UART: Caliptra RT
32,929,398 UART: [state] CFI Enabled
33,089,700 UART: [rt] RT listening for mailbox commands...
33,092,052 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,121,940 UART: [rt]cmd =0x54514754, len=24
33,124,739 >>> mbox cmd response data (8 bytes)
35,178,377 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,140,004 >>> mbox cmd response: success
43,140,469 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,173,765 UART:
43,174,093 UART: Running Caliptra FMC ...
43,175,133 UART:
43,175,275 UART: [state] CFI Enabled
43,276,978 UART: [art] Extend RT PCRs Done
43,278,164 UART: [art] Lock RT PCRs Done
43,279,421 UART: [art] Populate DV Done
43,284,784 UART: [fht] FMC Alias Private Key: 7
43,286,320 UART: [art] Derive CDI
43,287,049 UART: [art] Store in in slot 0x4
43,346,174 UART: [art] Derive Key Pair
43,347,211 UART: [art] Store priv key in slot 0x5
46,640,194 UART: [art] Derive Key Pair - Done
46,652,926 UART: [art] Signing Cert with AUTHO
46,654,228 UART: RITY.KEYID = 7
48,942,342 UART: [art] Erasing AUTHORITY.KEYID = 7
48,943,847 UART: [art] PUB.X = 67B91F4EB8304368362BCA554997FD7BFE4272C022BC115ED170E822EEEDAEE8DA6C91F78E3FED94FDF70EB2EB66D830
48,951,085 UART: [art] PUB.Y = 1B23BD604631A4FFAB0A006DD393DCA488E48D8A1B91B595A6903418962570E5C231AE6EFC9C1FC033B96441619B50D5
48,958,352 UART: [art] SIG.R = 1B2A0A32DF83F7BDA029C90BD0C32945AFAA083CE9493B657BAB822C3433DF6081A4E0A78678EB66471B3508BBC96EE1
48,965,733 UART: [art] SIG.S = 4224F267BB45F5B5761C454D9C71E6447C7126CA1C46F454E1A9D697B74444AE0738355D0F8B9DE4F021576AD28927E3
50,270,649 UART: mbox::rt_entry...
50,271,618 UART: ____ _ _ _ ____ _____
50,273,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,275,553 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,277,475 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,279,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,281,286 UART: |_|
50,282,088 UART:
50,568,390 UART: [rt] Runtime listening for mailbox commands...
50,570,458 >>> mbox cmd response data (120 bytes)
52,620,876 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
60,559,760 >>> mbox cmd response: success
60,560,229 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,593,679 UART:
60,593,955 UART: Running Caliptra FMC ...
60,594,979 UART:
60,595,121 UART: [state] CFI Enabled
60,683,497 UART: [art] Extend RT PCRs Done
60,684,688 UART: [art] Lock RT PCRs Done
60,685,969 UART: [art] Populate DV Done
60,691,563 UART: [fht] FMC Alias Private Key: 7
60,693,260 UART: [art] Derive CDI
60,694,201 UART: [art] Store in in slot 0x4
60,752,140 UART: [art] Derive Key Pair
60,753,140 UART: [art] Store priv key in slot 0x5
64,037,925 UART: [art] Derive Key Pair - Done
64,050,989 UART: [art] Signing Cert with AUTHO
64,052,305 UART: RITY.KEYID = 7
66,339,806 UART: [art] Erasing AUTHORITY.KEYID = 7
66,341,321 UART: [art] PUB.X = D16C4B457BE9689B21D78BE45EEA6FB129197E4C0060E43A4A7A5E217AB277B53AB44C23FF6418A61E759DCA42C1220C
66,348,558 UART: [art] PUB.Y = 73579623171689FBDA79D1B9E525E260F62D612618C494EE10CDB1AF6734E7FBE4FE4499781C8285E74D32B2F3989BF4
66,355,777 UART: [art] SIG.R = AA17D8475CB45EC98A352D5775AD9896B9782D84EAAF767B990E89867CBA4C9EEC966915E612B09AB18C70025B0E5511
66,363,153 UART: [art] SIG.S = E3CD9F72FFAD2B672DC3ED0D504334685D06C51DE5E2A1814850B70827EFFBCABDB7DD3A9D2DD4CA9B5260F870961F51
67,667,837 UART: mbox::rt_entry...
67,668,794 UART: ____ _ _ _ ____ _____
67,670,777 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,672,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,674,716 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,676,635 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,678,557 UART: |_|
67,679,362 UART:
67,960,355 UART: [rt] Runtime listening for mailbox commands...
67,962,439 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,386 UART:
192,752 UART: Running Caliptra ROM ...
193,878 UART:
603,510 UART: [state] CFI Enabled
618,022 UART: [state] LifecycleState = Unprovisioned
619,903 UART: [state] DebugLocked = No
621,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,231 UART: [kat] SHA2-256
795,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,511 UART: [kat] ++
806,991 UART: [kat] sha1
818,580 UART: [kat] SHA2-256
821,234 UART: [kat] SHA2-384
828,146 UART: [kat] SHA2-512-ACC
830,511 UART: [kat] ECC-384
3,114,055 UART: [kat] HMAC-384Kdf
3,125,436 UART: [kat] LMS
4,315,489 UART: [kat] --
4,320,902 UART: [cold-reset] ++
4,323,327 UART: [fht] Storing FHT @ 0x50003400
4,335,454 UART: [idev] ++
4,336,018 UART: [idev] CDI.KEYID = 6
4,337,054 UART: [idev] SUBJECT.KEYID = 7
4,338,226 UART: [idev] UDS.KEYID = 0
4,339,222 ready_for_fw is high
4,339,424 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,624 UART: [idev] Erasing UDS.KEYID = 0
7,625,511 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,534 UART: [idev] --
7,651,133 UART: [ldev] ++
7,651,706 UART: [ldev] CDI.KEYID = 6
7,652,671 UART: [ldev] SUBJECT.KEYID = 5
7,653,882 UART: [ldev] AUTHORITY.KEYID = 7
7,655,169 UART: [ldev] FE.KEYID = 1
7,664,947 UART: [ldev] Erasing FE.KEYID = 1
10,954,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,227 UART: [ldev] --
13,314,781 UART: [fwproc] Waiting for Commands...
13,317,786 UART: [fwproc] Received command 0x46574c44
13,320,170 UART: [fwproc] Received Image of size 114036 bytes
17,372,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,054 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,835,626 >>> mbox cmd response: success
17,840,693 UART: [afmc] ++
17,841,295 UART: [afmc] CDI.KEYID = 6
17,842,263 UART: [afmc] SUBJECT.KEYID = 7
17,843,483 UART: [afmc] AUTHORITY.KEYID = 5
21,159,613 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,459,252 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,651 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,471 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,912 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,105 UART: [afmc] --
23,529,719 UART: [cold-reset] --
23,533,953 UART: [state] Locking Datavault
23,538,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,930 UART: [state] Locking ICCM
23,542,237 UART: [exit] Launching FMC @ 0x40000130
23,550,635 UART:
23,550,869 UART: Running Caliptra FMC ...
23,551,968 UART:
23,552,130 UART: [state] CFI Enabled
23,560,238 UART: [fht] FMC Alias Private Key: 7
25,891,116 UART: [art] Extend RT PCRs Done
25,892,336 UART: [art] Lock RT PCRs Done
25,894,199 UART: [art] Populate DV Done
25,899,735 UART: [fht] FMC Alias Private Key: 7
25,901,222 UART: [art] Derive CDI
25,901,982 UART: [art] Store in in slot 0x4
25,944,845 UART: [art] Derive Key Pair
25,945,840 UART: [art] Store priv key in slot 0x5
29,187,688 UART: [art] Derive Key Pair - Done
29,200,727 UART: [art] Signing Cert with AUTHO
29,202,027 UART: RITY.KEYID = 7
31,480,651 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,151 UART: [art] PUB.X = 6F25BF061D8AAB874AA2B72DCCB92D7068F265C1FF7D9088D825CB631426D7B5C421A13A1050F3AD87DA4057F4B1DB1F
31,489,409 UART: [art] PUB.Y = 248EB799BEA6F08DEA37B5FD39EDB8367B7986BF4E77DD653E2002530D048070B8DB1394C60EB4684C7DE32120DD6578
31,496,701 UART: [art] SIG.R = E3C1A6D9D6BB48B6F93423FB8C9153E627590B9EA61F48B6A91B0A2D980BE8130E04469E7EAE5D5258DEF8B790908E3B
31,504,054 UART: [art] SIG.S = 7D5DF89E3F71A8C5339D676F7BB0A1E7DC3778A599624EAE9D2323A87DDBD73566931115DA3DB1E92F14CB78C3ADEA9C
32,808,948 UART: Caliptra RT
32,809,660 UART: [state] CFI Enabled
32,926,957 UART: [rt] RT listening for mailbox commands...
32,929,345 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,959,424 UART: [rt]cmd =0x54514754, len=24
32,962,179 >>> mbox cmd response data (8 bytes)
35,012,669 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
35,113,515 UART:
35,113,877 UART: Running Caliptra ROM ...
35,114,926 UART:
35,115,196 UART: [state] CFI Enabled
35,131,313 UART: [state] LifecycleState = Unprovisioned
35,133,262 UART: [state] DebugLocked = No
35,135,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,140,967 UART: [kat] SHA2-256
35,310,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,321,194 UART: [kat] ++
35,321,700 UART: [kat] sha1
35,334,099 UART: [kat] SHA2-256
35,336,793 UART: [kat] SHA2-384
35,342,728 UART: [kat] SHA2-512-ACC
35,345,084 UART: [kat] ECC-384
37,631,617 UART: [kat] HMAC-384Kdf
37,644,543 UART: [kat] LMS
38,834,612 UART: [kat] --
38,837,650 UART: [update-reset] ++
42,557,620 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,560,525 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
42,818,676 >>> mbox cmd response: success
42,819,036 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,819,760 UART: [update-reset] Copying MAN_2 To MAN_1
42,842,167 UART: [update-reset Success] --
42,847,082 UART: [state] Locking Datavault
42,849,431 UART: [state] Locking PCR0, PCR1 and PCR31
42,851,130 UART: [state] Locking ICCM
42,852,306 UART: [exit] Launching FMC @ 0x40000130
42,860,762 UART:
42,860,997 UART: Running Caliptra FMC ...
42,862,092 UART:
42,862,257 UART: [state] CFI Enabled
42,907,027 UART: [art] Extend RT PCRs Done
42,908,166 UART: [art] Lock RT PCRs Done
42,909,929 UART: [art] Populate DV Done
42,915,333 UART: [fht] FMC Alias Private Key: 7
42,916,851 UART: [art] Derive CDI
42,917,612 UART: [art] Store in in slot 0x4
42,960,424 UART: [art] Derive Key Pair
42,961,475 UART: [art] Store priv key in slot 0x5
46,203,694 UART: [art] Derive Key Pair - Done
46,216,691 UART: [art] Signing Cert with AUTHO
46,217,993 UART: RITY.KEYID = 7
48,497,201 UART: [art] Erasing AUTHORITY.KEYID = 7
48,498,704 UART: [art] PUB.X = C956A4C169235B4A68744FEA207601B08DA7A232DF689A98632488B3D8BE6227947A34074C31ED4BE272DC14986192DE
48,505,879 UART: [art] PUB.Y = 52204E18F1F3D58BC7102D7BCFFEDAD27AF00C225FCDE510F9D25CFE1427D4A903B5329CE84A8E2D1F87371E4C7CA5C6
48,513,184 UART: [art] SIG.R = 07744254B41F7271DFC48BB51E97FA4A889289CA1A7E96FFCEB37642AE2DF122B95DB98C2DAC96B252B2C36851F8D766
48,520,785 UART: [art] SIG.S = 0DE6E28337EEC3E04E2CB2D502E086CE4B2C26AF94C476A090B1602688353B68B6C57CA56FC76EBC72BD010735F310DA
49,824,877 UART: mbox::rt_entry...
49,825,833 UART: ____ _ _ _ ____ _____
49,827,759 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,829,762 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,831,615 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,833,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,835,441 UART: |_|
49,836,288 UART:
50,123,655 UART: [rt] Runtime listening for mailbox commands...
50,125,713 >>> mbox cmd response data (120 bytes)
52,171,736 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
52,271,733 UART:
52,272,107 UART: Running Caliptra ROM ...
52,273,154 UART:
52,273,360 UART: [state] CFI Enabled
52,285,061 UART: [state] LifecycleState = Unprovisioned
52,287,003 UART: [state] DebugLocked = No
52,289,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,293,755 UART: [kat] SHA2-256
52,463,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,474,021 UART: [kat] ++
52,474,471 UART: [kat] sha1
52,486,650 UART: [kat] SHA2-256
52,489,341 UART: [kat] SHA2-384
52,496,513 UART: [kat] SHA2-512-ACC
52,498,921 UART: [kat] ECC-384
54,782,359 UART: [kat] HMAC-384Kdf
54,794,279 UART: [kat] LMS
55,984,322 UART: [kat] --
55,987,992 UART: [update-reset] ++
59,694,939 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,698,884 UART: [update-reset] Loading Runtime at address 0x40005000 len 53972
59,957,091 >>> mbox cmd response: success
59,957,475 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
59,958,306 UART: [update-reset] Copying MAN_2 To MAN_1
59,980,687 UART: [update-reset Success] --
59,985,367 UART: [state] Locking Datavault
59,987,275 UART: [state] Locking PCR0, PCR1 and PCR31
59,989,034 UART: [state] Locking ICCM
59,990,759 UART: [exit] Launching FMC @ 0x40000130
59,999,212 UART:
59,999,446 UART: Running Caliptra FMC ...
60,000,547 UART:
60,000,720 UART: [state] CFI Enabled
60,044,681 UART: [art] Extend RT PCRs Done
60,045,866 UART: [art] Lock RT PCRs Done
60,047,431 UART: [art] Populate DV Done
60,052,894 UART: [fht] FMC Alias Private Key: 7
60,054,538 UART: [art] Derive CDI
60,055,356 UART: [art] Store in in slot 0x4
60,098,001 UART: [art] Derive Key Pair
60,099,025 UART: [art] Store priv key in slot 0x5
63,340,805 UART: [art] Derive Key Pair - Done
63,353,870 UART: [art] Signing Cert with AUTHO
63,355,168 UART: RITY.KEYID = 7
65,634,799 UART: [art] Erasing AUTHORITY.KEYID = 7
65,636,308 UART: [art] PUB.X = 1B2651F162B0964F80A604D10978B5305A78C954DA70B281752D5CDCEEAF65680E28B063C473A1BCBBEEF56AA0542A3B
65,643,566 UART: [art] PUB.Y = E4468E4CEB134644F4A4F33B7C2C0371ABF2F0F18D0CC2AED68A2365BB2525AF608014201EDA5E3AE15034934866623D
65,650,793 UART: [art] SIG.R = 3195EBB9983A0C594CE5F66AB170BC91B1D70BAC3A11EB667A25C6EA9BA98192EB466CFA2906E6D967E8DA63FAB58EB2
65,658,188 UART: [art] SIG.S = DDADA95DAF83102AD898164D59B8A93F7F819FC12719DB4071775140B125F0DBF3FC3094CDF1F451A21E95A1EDE788F6
66,962,838 UART: mbox::rt_entry...
66,963,778 UART: ____ _ _ _ ____ _____
66,965,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,967,704 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,969,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,971,561 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,973,484 UART: |_|
66,974,337 UART:
67,261,413 UART: [rt] Runtime listening for mailbox commands...
67,263,500 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,120,266 ready_for_fw is high
4,120,903 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,052,934 >>> mbox cmd response: success
23,698,021 UART:
23,698,420 UART: Running Caliptra FMC ...
23,699,537 UART:
23,699,688 UART: [state] CFI Enabled
23,707,648 UART: [fht] FMC Alias Private Key: 7
26,037,357 UART: [art] Extend RT PCRs Done
26,038,581 UART: [art] Lock RT PCRs Done
26,040,398 UART: [art] Populate DV Done
26,045,718 UART: [fht] FMC Alias Private Key: 7
26,047,262 UART: [art] Derive CDI
26,047,998 UART: [art] Store in in slot 0x4
26,090,752 UART: [art] Derive Key Pair
26,091,753 UART: [art] Store priv key in slot 0x5
29,333,711 UART: [art] Derive Key Pair - Done
29,346,725 UART: [art] Signing Cert with AUTHO
29,348,039 UART: RITY.KEYID = 7
31,627,280 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,785 UART: [art] PUB.X = 92030EE236FB21B64C6FF28F2F3EFE9FE986EA3CF3AE36E2DE8F684BE47CEC38D4711B9461ECCCCBFC934AD2C4E2E098
31,636,066 UART: [art] PUB.Y = F335AAF60A243BF686A954AAB018FAF2E8A4F63F84CCBDEFFE02796DE7E2A1D7084ADFD3E55410E5C11676E6D29BA835
31,643,326 UART: [art] SIG.R = 983C0B07757BBA7499671B721B47DB9622D67F19B5E26C8E84B9DDD1B57D8BDCC544BF2E5AF65ABE842481FBADEE3BE4
31,650,694 UART: [art] SIG.S = 683C8F276D71B2D8101D0FE36C00FEC977A564E018E3052617608964BD7D1348C312EBC860395315159F417EC421C953
32,956,405 UART: Caliptra RT
32,957,124 UART: [state] CFI Enabled
33,074,965 UART: [rt] RT listening for mailbox commands...
33,077,358 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,107,160 UART: [rt]cmd =0x54514754, len=24
33,109,818 >>> mbox cmd response data (8 bytes)
35,158,999 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
43,045,586 >>> mbox cmd response: success
43,046,099 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,079,094 UART:
43,079,414 UART: Running Caliptra FMC ...
43,080,481 UART:
43,080,658 UART: [state] CFI Enabled
43,124,697 UART: [art] Extend RT PCRs Done
43,125,844 UART: [art] Lock RT PCRs Done
43,127,434 UART: [art] Populate DV Done
43,133,117 UART: [fht] FMC Alias Private Key: 7
43,134,759 UART: [art] Derive CDI
43,135,701 UART: [art] Store in in slot 0x4
43,178,097 UART: [art] Derive Key Pair
43,179,099 UART: [art] Store priv key in slot 0x5
46,421,056 UART: [art] Derive Key Pair - Done
46,433,730 UART: [art] Signing Cert with AUTHO
46,435,033 UART: RITY.KEYID = 7
48,714,241 UART: [art] Erasing AUTHORITY.KEYID = 7
48,715,742 UART: [art] PUB.X = E5D5C3CB3C6DFD35E587E4FCF269BB5DD12B7E293AE642A452D988B6A11EEB99A9F80562C90F2871A40744F47C0D4B9B
48,723,014 UART: [art] PUB.Y = 902ED8733A14B0BF1E69F787971835EED1144E602931B50EDC601D36D4E6133DDF0B317A337D6B5A208E3BB2A94220E4
48,730,219 UART: [art] SIG.R = 3F098EBC745FF06C82F958C12E5DB8E0F6CEFDFCAE8C18B2368E6C7700CC148AF68E4BAEA5FB52D99468405CA836057F
48,737,723 UART: [art] SIG.S = 2E9040FBF677EC682A6A35D832D93D449BE32C3ADA397F5D897F18539A1EEE5E771A92DF48C3A807B46FA99FFBF25AF5
50,042,524 UART: mbox::rt_entry...
50,043,477 UART: ____ _ _ _ ____ _____
50,045,465 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,047,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,049,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,051,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,053,248 UART: |_|
50,054,058 UART:
50,339,717 UART: [rt] Runtime listening for mailbox commands...
50,341,803 >>> mbox cmd response data (120 bytes)
52,387,589 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
60,275,680 >>> mbox cmd response: success
60,276,148 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,312,528 UART:
60,312,817 UART: Running Caliptra FMC ...
60,313,849 UART:
60,313,998 UART: [state] CFI Enabled
60,357,984 UART: [art] Extend RT PCRs Done
60,359,172 UART: [art] Lock RT PCRs Done
60,360,657 UART: [art] Populate DV Done
60,366,168 UART: [fht] FMC Alias Private Key: 7
60,367,763 UART: [art] Derive CDI
60,368,500 UART: [art] Store in in slot 0x4
60,410,712 UART: [art] Derive Key Pair
60,411,708 UART: [art] Store priv key in slot 0x5
63,654,276 UART: [art] Derive Key Pair - Done
63,667,052 UART: [art] Signing Cert with AUTHO
63,668,377 UART: RITY.KEYID = 7
65,947,943 UART: [art] Erasing AUTHORITY.KEYID = 7
65,949,458 UART: [art] PUB.X = 1A6B7979F21CE1B63CB1E08524791416C959B7ACE57CC7743D3D643843320F3725A5272F6787A039EB87E94C7719FE97
65,956,670 UART: [art] PUB.Y = 5BD2C9C88CDA27FD70CFCACD95341091E2A562A8C4AF691AF62812DFFC156A3C5EF7ED8BBDE41D5DE84A46E51D93F8A6
65,963,936 UART: [art] SIG.R = E9EAA1CB5CC1CF3DD238AA8B257FF7A97D1703FD108390CBE4132557E8B83607F1FA6F42BF2558761BB46D5871E85A47
65,971,381 UART: [art] SIG.S = 71709984FB2B924F1370C95F6A2FE2B0C78C761F4F4813A5A0F961BEBA7D23BE64E9ECC81621BB9624894AB566B4350C
67,276,612 UART: mbox::rt_entry...
67,277,570 UART: ____ _ _ _ ____ _____
67,279,501 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,281,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,283,370 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,285,302 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,287,190 UART: |_|
67,288,073 UART:
67,571,544 UART: [rt] Runtime listening for mailbox commands...
67,573,675 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,477 UART:
192,842 UART: Running Caliptra ROM ...
193,933 UART:
194,076 UART: [state] CFI Enabled
265,153 UART: [state] LifecycleState = Unprovisioned
267,066 UART: [state] DebugLocked = No
268,665 UART: [state] WD Timer not started. Device not locked for debugging
272,621 UART: [kat] SHA2-256
451,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,314 UART: [kat] ++
463,762 UART: [kat] sha1
474,984 UART: [kat] SHA2-256
477,990 UART: [kat] SHA2-384
484,199 UART: [kat] SHA2-512-ACC
487,138 UART: [kat] ECC-384
2,948,868 UART: [kat] HMAC-384Kdf
2,972,262 UART: [kat] LMS
3,501,780 UART: [kat] --
3,505,775 UART: [cold-reset] ++
3,508,066 UART: [fht] FHT @ 0x50003400
3,519,762 UART: [idev] ++
3,520,340 UART: [idev] CDI.KEYID = 6
3,521,249 UART: [idev] SUBJECT.KEYID = 7
3,522,494 UART: [idev] UDS.KEYID = 0
3,523,419 ready_for_fw is high
3,523,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,442 UART: [idev] Erasing UDS.KEYID = 0
6,026,526 UART: [idev] Sha1 KeyId Algorithm
6,048,773 UART: [idev] --
6,052,422 UART: [ldev] ++
6,053,008 UART: [ldev] CDI.KEYID = 6
6,053,920 UART: [ldev] SUBJECT.KEYID = 5
6,055,086 UART: [ldev] AUTHORITY.KEYID = 7
6,056,381 UART: [ldev] FE.KEYID = 1
6,099,897 UART: [ldev] Erasing FE.KEYID = 1
8,603,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,808 UART: [ldev] --
10,412,941 UART: [fwproc] Wait for Commands...
10,415,304 UART: [fwproc] Recv command 0x46574c44
10,417,402 UART: [fwproc] Recv'd Img size: 114360 bytes
13,830,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,291,766 >>> mbox cmd response: success
14,295,772 UART: [afmc] ++
14,296,373 UART: [afmc] CDI.KEYID = 6
14,297,281 UART: [afmc] SUBJECT.KEYID = 7
14,298,441 UART: [afmc] AUTHORITY.KEYID = 5
16,828,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,671 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,690 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,527 UART: [afmc] --
18,624,479 UART: [cold-reset] --
18,627,963 UART: [state] Locking Datavault
18,633,049 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,699 UART: [state] Locking ICCM
18,637,353 UART: [exit] Launching FMC @ 0x40000130
18,645,815 UART:
18,646,052 UART: Running Caliptra FMC ...
18,647,158 UART:
18,647,320 UART: [state] CFI Enabled
18,710,504 UART: [fht] FMC Alias Private Key: 7
20,474,690 UART: [art] Extend RT PCRs Done
20,475,911 UART: [art] Lock RT PCRs Done
20,477,526 UART: [art] Populate DV Done
20,483,099 UART: [fht] FMC Alias Private Key: 7
20,484,751 UART: [art] Derive CDI
20,485,569 UART: [art] Store in in slot 0x4
20,543,264 UART: [art] Derive Key Pair
20,544,304 UART: [art] Store priv key in slot 0x5
23,007,043 UART: [art] Derive Key Pair - Done
23,020,267 UART: [art] Signing Cert with AUTHO
23,021,601 UART: RITY.KEYID = 7
24,733,361 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,868 UART: [art] PUB.X = EAB2ADF66DEACD92C16DF25FCDA9B2B0D85CD3D9420586155165AAA4AA842648EC6D6E8206F5C27A2B53A2EB9C355BCA
24,742,202 UART: [art] PUB.Y = 9FD5E30DD9A0F7BBF859A0825090C450C248029F1710612142D35B2F1AC501A9E63A94BA2BC2C630B98510BADB15C769
24,749,464 UART: [art] SIG.R = B340862F919C84A1FB3F0E7875506CC943E7DBDDEAA970F814EA166FBC51FF41D82E2E3EC39AC07E13D337E36631BACD
24,756,885 UART: [art] SIG.S = 4F685A5CA7CEBC948656055E67FD531109A9F30CACE31153139F4E1FF4287D97E1BB0B7B70BCA7D515E0E79D4C379FD2
25,735,758 UART: Caliptra RT
25,736,468 UART: [state] CFI Enabled
25,901,441 UART: [rt] RT listening for mailbox commands...
25,903,761 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,933,841 UART: [rt]cmd =0x54514754, len=24
25,936,390 >>> mbox cmd response data (8 bytes)
27,986,041 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,086,597 UART:
28,086,986 UART: Running Caliptra ROM ...
28,088,066 UART:
28,088,231 UART: [state] CFI Enabled
28,144,746 UART: [state] LifecycleState = Unprovisioned
28,146,635 UART: [state] DebugLocked = No
28,148,622 UART: [state] WD Timer not started. Device not locked for debugging
28,151,558 UART: [kat] SHA2-256
28,330,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,342,226 UART: [kat] ++
28,342,771 UART: [kat] sha1
28,353,608 UART: [kat] SHA2-256
28,356,638 UART: [kat] SHA2-384
28,363,419 UART: [kat] SHA2-512-ACC
28,366,317 UART: [kat] ECC-384
30,828,175 UART: [kat] HMAC-384Kdf
30,851,647 UART: [kat] LMS
31,381,081 UART: [kat] --
31,385,773 UART: [update-reset] ++
34,380,270 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,383,051 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
34,640,799 >>> mbox cmd response: success
34,641,279 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,641,864 UART: [update-reset] Copying MAN_2 To MAN_1
34,664,202 UART: [update-reset Success] --
34,669,464 UART: [state] Locking Datavault
34,673,147 UART: [state] Locking PCR0, PCR1 and PCR31
34,674,791 UART: [state] Locking ICCM
34,676,388 UART: [exit] Launching FMC @ 0x40000130
34,684,771 UART:
34,685,022 UART: Running Caliptra FMC ...
34,686,071 UART:
34,686,219 UART: [state] CFI Enabled
34,791,744 UART: [art] Extend RT PCRs Done
34,792,923 UART: [art] Lock RT PCRs Done
34,794,130 UART: [art] Populate DV Done
34,799,973 UART: [fht] FMC Alias Private Key: 7
34,801,561 UART: [art] Derive CDI
34,802,299 UART: [art] Store in in slot 0x4
34,860,804 UART: [art] Derive Key Pair
34,861,854 UART: [art] Store priv key in slot 0x5
37,325,241 UART: [art] Derive Key Pair - Done
37,338,191 UART: [art] Signing Cert with AUTHO
37,339,496 UART: RITY.KEYID = 7
39,050,648 UART: [art] Erasing AUTHORITY.KEYID = 7
39,052,166 UART: [art] PUB.X = 4E60FAC6CFAA140DBB7410606DE937A2D9B3AD00608C97C4A32BD35615B7EED2F17DB2B605E256093A41F9EE2EB453E3
39,059,410 UART: [art] PUB.Y = 69DF650E1F57AB969A2FD1D16109CCF6FDED9C33D93CFC655AFBF12CB7B416FA6E857E77CECDD9EF1507D988F62DD488
39,066,712 UART: [art] SIG.R = 055D94F159CE89C188543F071FFC3C5E96B8A8B6ED1827CF4133BC426FDC0589A8430EE1EFDD3CBB1150AC66CD6FDE54
39,074,099 UART: [art] SIG.S = 6F24EBEF96C3524561F90BB7E620B28D5D99DEBCA2E8B466F7F64B180644584EF22C0BBA339E0CDD163B561AEF1DDC4A
40,052,478 UART: mbox::rt_entry...
40,053,454 UART: ____ _ _ _ ____ _____
40,055,399 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,057,409 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,059,266 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,061,194 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,063,124 UART: |_|
40,063,935 UART:
40,350,827 UART: [rt] Runtime listening for mailbox commands...
40,352,943 >>> mbox cmd response data (120 bytes)
42,400,170 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,500,007 UART:
42,500,376 UART: Running Caliptra ROM ...
42,501,510 UART:
42,501,678 UART: [state] CFI Enabled
42,566,124 UART: [state] LifecycleState = Unprovisioned
42,568,005 UART: [state] DebugLocked = No
42,570,752 UART: [state] WD Timer not started. Device not locked for debugging
42,574,229 UART: [kat] SHA2-256
42,753,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,764,944 UART: [kat] ++
42,765,494 UART: [kat] sha1
42,775,586 UART: [kat] SHA2-256
42,778,593 UART: [kat] SHA2-384
42,784,637 UART: [kat] SHA2-512-ACC
42,787,579 UART: [kat] ECC-384
45,249,966 UART: [kat] HMAC-384Kdf
45,272,571 UART: [kat] LMS
45,802,016 UART: [kat] --
45,808,003 UART: [update-reset] ++
48,798,162 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,802,369 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,060,337 >>> mbox cmd response: success
49,060,719 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,061,874 UART: [update-reset] Copying MAN_2 To MAN_1
49,084,164 UART: [update-reset Success] --
49,089,502 UART: [state] Locking Datavault
49,092,350 UART: [state] Locking PCR0, PCR1 and PCR31
49,094,060 UART: [state] Locking ICCM
49,095,031 UART: [exit] Launching FMC @ 0x40000130
49,103,494 UART:
49,103,731 UART: Running Caliptra FMC ...
49,104,854 UART:
49,105,018 UART: [state] CFI Enabled
49,209,117 UART: [art] Extend RT PCRs Done
49,210,300 UART: [art] Lock RT PCRs Done
49,211,597 UART: [art] Populate DV Done
49,217,017 UART: [fht] FMC Alias Private Key: 7
49,218,724 UART: [art] Derive CDI
49,219,542 UART: [art] Store in in slot 0x4
49,278,193 UART: [art] Derive Key Pair
49,279,232 UART: [art] Store priv key in slot 0x5
51,742,464 UART: [art] Derive Key Pair - Done
51,755,566 UART: [art] Signing Cert with AUTHO
51,756,867 UART: RITY.KEYID = 7
53,467,854 UART: [art] Erasing AUTHORITY.KEYID = 7
53,469,366 UART: [art] PUB.X = 7330FEAAFFFEA86AD991456C80E9C9C1F37C58452B4CE0B84ECBD1ACF897B98E26C4D2F40BAF2F07523D8BBC11F85E8A
53,476,789 UART: [art] PUB.Y = 68FCF4AA6D1CF15E9DAF5C2ACDDE913021167A531F869AC3A793563029B7BE531781369BFCB4F9EEB8F31A0B9F3C3862
53,483,932 UART: [art] SIG.R = FF135F845164BF14229F9761C3A5F66758E595193A0BDD6747044A5BCD0F078F1E358CB131E80C07A2D5A72E51BF645C
53,491,317 UART: [art] SIG.S = 23FCD353FCB4CD044A30E2D295A3C403B3C312FA63A5485E750DB75E7B21C9619DEB841B657FC98F820892782A270BCD
54,469,808 UART: mbox::rt_entry...
54,470,752 UART: ____ _ _ _ ____ _____
54,472,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,474,685 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,476,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,478,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,480,497 UART: |_|
54,481,328 UART:
54,766,234 UART: [rt] Runtime listening for mailbox commands...
54,768,319 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,644 UART:
193,002 UART: Running Caliptra ROM ...
194,191 UART:
194,346 UART: [state] CFI Enabled
263,278 UART: [state] LifecycleState = Unprovisioned
265,704 UART: [state] DebugLocked = No
267,525 UART: [state] WD Timer not started. Device not locked for debugging
271,991 UART: [kat] SHA2-256
461,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,666 UART: [kat] ++
473,148 UART: [kat] sha1
484,446 UART: [kat] SHA2-256
487,456 UART: [kat] SHA2-384
493,945 UART: [kat] SHA2-512-ACC
496,542 UART: [kat] ECC-384
2,945,907 UART: [kat] HMAC-384Kdf
2,970,006 UART: [kat] LMS
3,501,765 UART: [kat] --
3,506,898 UART: [cold-reset] ++
3,509,113 UART: [fht] FHT @ 0x50003400
3,520,229 UART: [idev] ++
3,520,934 UART: [idev] CDI.KEYID = 6
3,521,886 UART: [idev] SUBJECT.KEYID = 7
3,523,057 UART: [idev] UDS.KEYID = 0
3,523,959 ready_for_fw is high
3,524,144 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,945 UART: [idev] Erasing UDS.KEYID = 0
6,026,019 UART: [idev] Sha1 KeyId Algorithm
6,048,180 UART: [idev] --
6,052,774 UART: [ldev] ++
6,053,479 UART: [ldev] CDI.KEYID = 6
6,054,397 UART: [ldev] SUBJECT.KEYID = 5
6,055,559 UART: [ldev] AUTHORITY.KEYID = 7
6,056,793 UART: [ldev] FE.KEYID = 1
6,097,748 UART: [ldev] Erasing FE.KEYID = 1
8,600,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,545 UART: [ldev] --
10,411,785 UART: [fwproc] Wait for Commands...
10,413,773 UART: [fwproc] Recv command 0x46574c44
10,416,082 UART: [fwproc] Recv'd Img size: 114360 bytes
13,861,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,600,555 >>> mbox cmd response: success
14,604,820 UART: [afmc] ++
14,605,539 UART: [afmc] CDI.KEYID = 6
14,606,792 UART: [afmc] SUBJECT.KEYID = 7
14,608,247 UART: [afmc] AUTHORITY.KEYID = 5
17,142,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,177 UART: [afmc] --
18,944,387 UART: [cold-reset] --
18,948,643 UART: [state] Locking Datavault
18,955,425 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,593 UART: [state] Locking ICCM
18,960,613 UART: [exit] Launching FMC @ 0x40000130
18,969,247 UART:
18,969,483 UART: Running Caliptra FMC ...
18,970,586 UART:
18,970,752 UART: [state] CFI Enabled
19,026,843 UART: [fht] FMC Alias Private Key: 7
20,791,170 UART: [art] Extend RT PCRs Done
20,792,393 UART: [art] Lock RT PCRs Done
20,794,157 UART: [art] Populate DV Done
20,799,731 UART: [fht] FMC Alias Private Key: 7
20,801,217 UART: [art] Derive CDI
20,801,955 UART: [art] Store in in slot 0x4
20,860,610 UART: [art] Derive Key Pair
20,861,814 UART: [art] Store priv key in slot 0x5
23,324,879 UART: [art] Derive Key Pair - Done
23,337,945 UART: [art] Signing Cert with AUTHO
23,339,253 UART: RITY.KEYID = 7
25,050,732 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,244 UART: [art] PUB.X = A140D9FED890B25EC9C490F777F78B6DC3643B55F13F2844EE743618684ACA5B06E9C1F656DFB11FA57E6C0D06169020
25,059,481 UART: [art] PUB.Y = 1932555421F94904F552CD6A3C92C33E1E6BFA3B11D3B4A19CFBD76B2E01AA3F1B7CD56062C5EC23D922CE6C7A6E5BA7
25,066,757 UART: [art] SIG.R = D82A45606B53A1B1FF0ECB5DCF0AB0ACF3C135381904582CAAA360BCA52C5DD298409F565C88ECDA9CC8147814746BBF
25,074,192 UART: [art] SIG.S = A9A5A6B156260CAF7E24A61D38E3C7629624EAD811F7786D4A217D8FEE231555448DAAD34110504C73644A1FFD848448
26,052,827 UART: Caliptra RT
26,053,526 UART: [state] CFI Enabled
26,219,033 UART: [rt] RT listening for mailbox commands...
26,221,584 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,251,839 UART: [rt]cmd =0x54514754, len=24
26,254,441 >>> mbox cmd response data (8 bytes)
28,307,116 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,408,124 UART:
28,408,482 UART: Running Caliptra ROM ...
28,409,530 UART:
28,409,690 UART: [state] CFI Enabled
28,484,979 UART: [state] LifecycleState = Unprovisioned
28,487,031 UART: [state] DebugLocked = No
28,488,861 UART: [state] WD Timer not started. Device not locked for debugging
28,492,783 UART: [kat] SHA2-256
28,682,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,693,420 UART: [kat] ++
28,693,877 UART: [kat] sha1
28,705,944 UART: [kat] SHA2-256
28,708,979 UART: [kat] SHA2-384
28,715,683 UART: [kat] SHA2-512-ACC
28,718,277 UART: [kat] ECC-384
31,166,637 UART: [kat] HMAC-384Kdf
31,191,851 UART: [kat] LMS
31,723,427 UART: [kat] --
31,726,335 UART: [update-reset] ++
34,755,108 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,759,188 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,152,542 >>> mbox cmd response: success
35,152,945 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,153,457 UART: [update-reset] Copying MAN_2 To MAN_1
35,191,035 UART: [update-reset Success] --
35,194,537 UART: [state] Locking Datavault
35,196,520 UART: [state] Locking PCR0, PCR1 and PCR31
35,198,666 UART: [state] Locking ICCM
35,201,389 UART: [exit] Launching FMC @ 0x40000130
35,210,058 UART:
35,210,315 UART: Running Caliptra FMC ...
35,211,344 UART:
35,211,491 UART: [state] CFI Enabled
35,299,755 UART: [art] Extend RT PCRs Done
35,300,937 UART: [art] Lock RT PCRs Done
35,302,311 UART: [art] Populate DV Done
35,307,825 UART: [fht] FMC Alias Private Key: 7
35,309,525 UART: [art] Derive CDI
35,310,342 UART: [art] Store in in slot 0x4
35,368,705 UART: [art] Derive Key Pair
35,369,747 UART: [art] Store priv key in slot 0x5
37,832,567 UART: [art] Derive Key Pair - Done
37,845,459 UART: [art] Signing Cert with AUTHO
37,846,766 UART: RITY.KEYID = 7
39,564,477 UART: [art] Erasing AUTHORITY.KEYID = 7
39,565,991 UART: [art] PUB.X = E1B41F7BE74CB10FDDAF4325CB8AE12CC2BA7AC3FD024CB52035729B24A881FAF2A2A243E2C681ED22FCBB14D5925939
39,573,307 UART: [art] PUB.Y = AE17E68C5066AF1EDF1094936D3158501A46C0989936F58657161665919D75C84C2D84290D84F2193699BC71FAAB0A6F
39,580,488 UART: [art] SIG.R = 50857057AEE1BFF03A1A738B6142DC0FB91372F87D5EAF10A35452868303244EFCD9C5666D0FA403216EE24E895A1819
39,587,913 UART: [art] SIG.S = 22806C71F55EC5A5DF18A3CAEF9BA3F5C62DA9B2C4FFA4828FD2CB1498C91EA604795F0566F74020225556DEA8AFB0B0
40,566,799 UART: mbox::rt_entry...
40,567,756 UART: ____ _ _ _ ____ _____
40,569,737 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,571,740 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,573,672 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,575,602 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,577,529 UART: |_|
40,578,333 UART:
40,867,046 UART: [rt] Runtime listening for mailbox commands...
40,869,110 >>> mbox cmd response data (120 bytes)
42,916,736 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
43,016,544 UART:
43,016,914 UART: Running Caliptra ROM ...
43,018,046 UART:
43,018,222 UART: [state] CFI Enabled
43,082,570 UART: [state] LifecycleState = Unprovisioned
43,084,679 UART: [state] DebugLocked = No
43,086,018 UART: [state] WD Timer not started. Device not locked for debugging
43,090,867 UART: [kat] SHA2-256
43,280,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,291,485 UART: [kat] ++
43,291,983 UART: [kat] sha1
43,304,812 UART: [kat] SHA2-256
43,307,779 UART: [kat] SHA2-384
43,313,237 UART: [kat] SHA2-512-ACC
43,315,824 UART: [kat] ECC-384
45,766,246 UART: [kat] HMAC-384Kdf
45,790,469 UART: [kat] LMS
46,322,058 UART: [kat] --
46,326,055 UART: [update-reset] ++
49,342,300 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,346,274 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,739,628 >>> mbox cmd response: success
49,740,027 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,740,322 UART: [update-reset] Copying MAN_2 To MAN_1
49,777,593 UART: [update-reset Success] --
49,782,592 UART: [state] Locking Datavault
49,785,206 UART: [state] Locking PCR0, PCR1 and PCR31
49,787,404 UART: [state] Locking ICCM
49,790,313 UART: [exit] Launching FMC @ 0x40000130
49,798,932 UART:
49,799,185 UART: Running Caliptra FMC ...
49,800,289 UART:
49,800,452 UART: [state] CFI Enabled
49,897,080 UART: [art] Extend RT PCRs Done
49,898,266 UART: [art] Lock RT PCRs Done
49,899,617 UART: [art] Populate DV Done
49,905,128 UART: [fht] FMC Alias Private Key: 7
49,906,812 UART: [art] Derive CDI
49,907,634 UART: [art] Store in in slot 0x4
49,966,059 UART: [art] Derive Key Pair
49,967,063 UART: [art] Store priv key in slot 0x5
52,430,128 UART: [art] Derive Key Pair - Done
52,442,914 UART: [art] Signing Cert with AUTHO
52,444,216 UART: RITY.KEYID = 7
54,155,436 UART: [art] Erasing AUTHORITY.KEYID = 7
54,156,943 UART: [art] PUB.X = 4F91070A58754E9635B56FC93F55E969CEFAC04ADA90F4C53A1B7000C644EB1980C539E40D0875602EC19AF18F41C5DF
54,164,206 UART: [art] PUB.Y = EC1B0E39FAE8939B8F7DCF4D6509BB19470A786A8BBA59C98829D55F7FD1471A82B2E39114F835A4A45C53D58EAF15D8
54,171,488 UART: [art] SIG.R = 4EDF0CFA58F9250C57E461CAC8D5E3413E94C948314E90B135C70BF17485B4F1E080EC9F04FC0F103830D0BC6C8F8156
54,178,869 UART: [art] SIG.S = D813D7E8EF3501E3F296285F6677343681EC70822536604C2CCC9FBDA06E9B6B0EAB96B56900104AB5873E6CD207EFCF
55,156,790 UART: mbox::rt_entry...
55,157,744 UART: ____ _ _ _ ____ _____
55,159,670 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,161,672 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,163,529 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,165,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,167,493 UART: |_|
55,168,302 UART:
55,453,671 UART: [rt] Runtime listening for mailbox commands...
55,455,740 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
3,439,891 ready_for_fw is high
3,440,354 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,717,995 >>> mbox cmd response: success
19,002,734 UART:
19,003,127 UART: Running Caliptra FMC ...
19,004,338 UART:
19,004,514 UART: [state] CFI Enabled
19,070,572 UART: [fht] FMC Alias Private Key: 7
20,835,313 UART: [art] Extend RT PCRs Done
20,836,538 UART: [art] Lock RT PCRs Done
20,838,380 UART: [art] Populate DV Done
20,843,649 UART: [fht] FMC Alias Private Key: 7
20,845,201 UART: [art] Derive CDI
20,845,939 UART: [art] Store in in slot 0x4
20,904,168 UART: [art] Derive Key Pair
20,905,213 UART: [art] Store priv key in slot 0x5
23,367,945 UART: [art] Derive Key Pair - Done
23,380,731 UART: [art] Signing Cert with AUTHO
23,382,038 UART: RITY.KEYID = 7
25,093,673 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,172 UART: [art] PUB.X = 9198B8E6DD83B115DD11F9E5E4EA5D62ECB08CA70AE340B0AC4FF9E5BB82D51368586194C1D51B8141623C5F5B343EC3
25,102,440 UART: [art] PUB.Y = 332C2583F89835487C4223253DE5592499A131B932FC6F614A72D33EBC292DD415D096EDEFA5781F6B0A49549A9B69E7
25,109,715 UART: [art] SIG.R = FFAC486D7AB02BDCD7DEBA3AC9E0E4A661C825C7ACCBB5129FDA0CCB6ADC1110CF879A41B233F37E5E4B782E487338EB
25,117,303 UART: [art] SIG.S = 74159D01C093FCCAA710DA57F87096AF8BE00C9F1A498263950261DF740F8048A9C7F2FC94DD0BCFAD7F2388E129DD78
26,095,758 UART: Caliptra RT
26,096,468 UART: [state] CFI Enabled
26,260,788 UART: [rt] RT listening for mailbox commands...
26,263,159 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,293,460 UART: [rt]cmd =0x54514754, len=24
26,295,952 >>> mbox cmd response data (8 bytes)
28,346,153 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,341,809 >>> mbox cmd response: success
35,342,434 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,375,844 UART:
35,376,173 UART: Running Caliptra FMC ...
35,377,212 UART:
35,377,362 UART: [state] CFI Enabled
35,466,436 UART: [art] Extend RT PCRs Done
35,467,623 UART: [art] Lock RT PCRs Done
35,469,140 UART: [art] Populate DV Done
35,474,623 UART: [fht] FMC Alias Private Key: 7
35,476,068 UART: [art] Derive CDI
35,476,811 UART: [art] Store in in slot 0x4
35,535,236 UART: [art] Derive Key Pair
35,536,283 UART: [art] Store priv key in slot 0x5
37,998,949 UART: [art] Derive Key Pair - Done
38,011,899 UART: [art] Signing Cert with AUTHO
38,013,214 UART: RITY.KEYID = 7
39,724,834 UART: [art] Erasing AUTHORITY.KEYID = 7
39,726,331 UART: [art] PUB.X = A41C1206FFC25D77375C56FAD4493BE343DFAE8ADEDDFB63D4D701375DD4FA39788E31AF13599776ACE701DEF770D931
39,733,572 UART: [art] PUB.Y = 8892ECFA615DFFC2996AD4AA3D8362625FA3BEB5C0206AE7D3A0E1E7B4127C90A95AD9380F1479D3FEC1A4302215CAFA
39,740,899 UART: [art] SIG.R = 795525343944F0351E05C33C9541E9EA5A6EFE391E4087EA557D4407304E402773570FA6B924880ACF66B1C91D8D2974
39,748,228 UART: [art] SIG.S = AA6CE3100F7AAD7CD54B1962F4EE45478F04F5D9E2879E9C7442417B8240E7C6BE350166409A791A5AF4326514698883
40,726,709 UART: mbox::rt_entry...
40,727,679 UART: ____ _ _ _ ____ _____
40,729,684 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,731,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,733,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,735,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,737,503 UART: |_|
40,738,342 UART:
41,021,200 UART: [rt] Runtime listening for mailbox commands...
41,023,302 >>> mbox cmd response data (120 bytes)
43,071,567 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
50,061,656 >>> mbox cmd response: success
50,062,174 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,097,283 UART:
50,097,631 UART: Running Caliptra FMC ...
50,098,672 UART:
50,098,823 UART: [state] CFI Enabled
50,206,244 UART: [art] Extend RT PCRs Done
50,207,427 UART: [art] Lock RT PCRs Done
50,208,981 UART: [art] Populate DV Done
50,214,340 UART: [fht] FMC Alias Private Key: 7
50,215,932 UART: [art] Derive CDI
50,216,671 UART: [art] Store in in slot 0x4
50,275,262 UART: [art] Derive Key Pair
50,276,305 UART: [art] Store priv key in slot 0x5
52,739,273 UART: [art] Derive Key Pair - Done
52,752,331 UART: [art] Signing Cert with AUTHO
52,753,635 UART: RITY.KEYID = 7
54,465,222 UART: [art] Erasing AUTHORITY.KEYID = 7
54,466,704 UART: [art] PUB.X = 85BF9F5789BEF9FD286951BDDFC76F5E8A8986E90486D0D7E089DE31DCCE5573425FACA222BBF9BDD354E0BF4E67D980
54,474,016 UART: [art] PUB.Y = 783E02F9FFF207337C075D1CB628DDFB71E81B9D3157578533E2500FCEE742CE78F8AF4C59C6DC599A7C6554C0D72ACF
54,481,269 UART: [art] SIG.R = F4BCA99643D34A8523EA687D37C3B85BF915C0A15AA7CB08594440F44E86A7432CB4B833D80598B21155FB455E142CCE
54,488,663 UART: [art] SIG.S = 555CCD6372D30DB65E9136932105A1002C7574127362FB535D99D643841D90FE4A4AFE2480CF892F0CD06C7C9B2CE3F5
55,467,234 UART: mbox::rt_entry...
55,468,203 UART: ____ _ _ _ ____ _____
55,470,139 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,472,146 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,474,082 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,476,017 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,477,951 UART: |_|
55,478,944 UART:
55,764,988 UART: [rt] Runtime listening for mailbox commands...
55,767,106 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,380 UART:
192,756 UART: Running Caliptra ROM ...
193,945 UART:
603,606 UART: [state] CFI Enabled
616,795 UART: [state] LifecycleState = Unprovisioned
619,162 UART: [state] DebugLocked = No
621,329 UART: [state] WD Timer not started. Device not locked for debugging
625,729 UART: [kat] SHA2-256
815,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,392 UART: [kat] ++
827,015 UART: [kat] sha1
838,039 UART: [kat] SHA2-256
841,059 UART: [kat] SHA2-384
846,486 UART: [kat] SHA2-512-ACC
849,065 UART: [kat] ECC-384
3,291,818 UART: [kat] HMAC-384Kdf
3,304,912 UART: [kat] LMS
3,836,733 UART: [kat] --
3,842,010 UART: [cold-reset] ++
3,843,023 UART: [fht] FHT @ 0x50003400
3,853,931 UART: [idev] ++
3,854,642 UART: [idev] CDI.KEYID = 6
3,855,566 UART: [idev] SUBJECT.KEYID = 7
3,856,735 UART: [idev] UDS.KEYID = 0
3,857,661 ready_for_fw is high
3,857,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,624 UART: [idev] Erasing UDS.KEYID = 0
6,334,984 UART: [idev] Sha1 KeyId Algorithm
6,356,543 UART: [idev] --
6,360,508 UART: [ldev] ++
6,361,193 UART: [ldev] CDI.KEYID = 6
6,362,103 UART: [ldev] SUBJECT.KEYID = 5
6,363,260 UART: [ldev] AUTHORITY.KEYID = 7
6,364,487 UART: [ldev] FE.KEYID = 1
6,374,385 UART: [ldev] Erasing FE.KEYID = 1
8,850,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,807 UART: [ldev] --
10,641,796 UART: [fwproc] Wait for Commands...
10,643,797 UART: [fwproc] Recv command 0x46574c44
10,646,105 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,912 >>> mbox cmd response: success
14,840,787 UART: [afmc] ++
14,841,514 UART: [afmc] CDI.KEYID = 6
14,842,699 UART: [afmc] SUBJECT.KEYID = 7
14,844,178 UART: [afmc] AUTHORITY.KEYID = 5
17,349,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,065 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,621 UART: [afmc] --
19,147,208 UART: [cold-reset] --
19,151,779 UART: [state] Locking Datavault
19,158,210 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,392 UART: [state] Locking ICCM
19,163,289 UART: [exit] Launching FMC @ 0x40000130
19,171,950 UART:
19,172,181 UART: Running Caliptra FMC ...
19,173,280 UART:
19,173,434 UART: [state] CFI Enabled
19,181,530 UART: [fht] FMC Alias Private Key: 7
20,938,474 UART: [art] Extend RT PCRs Done
20,939,703 UART: [art] Lock RT PCRs Done
20,941,437 UART: [art] Populate DV Done
20,947,062 UART: [fht] FMC Alias Private Key: 7
20,948,714 UART: [art] Derive CDI
20,949,544 UART: [art] Store in in slot 0x4
20,992,472 UART: [art] Derive Key Pair
20,993,512 UART: [art] Store priv key in slot 0x5
23,420,405 UART: [art] Derive Key Pair - Done
23,433,510 UART: [art] Signing Cert with AUTHO
23,434,809 UART: RITY.KEYID = 7
25,140,357 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,872 UART: [art] PUB.X = D31700113495AE421AACA7E308BB81848808DB647286D728D0BEF7F642E3944AEBBE4DF41C11EA3044926F9283F9BE22
25,149,122 UART: [art] PUB.Y = 1D34C094DCC5656AF7537AC8F2BCA9988A95BD93AC1B67BBADE999F19E7A6F09E970B5EA2B0E6B97DD954502D7226E42
25,156,413 UART: [art] SIG.R = 85DEC778FE377BCF5F6C4BA9B39ECD7CDE96A01B2732FB00AB7A12152BE429AF4793EB6D97CB270B0D611232A054FF65
25,163,814 UART: [art] SIG.S = FB9836D29ACDBAB6DB3A37D2685147CC5421C1E11B1DF11AD7DFD2C921BB255A2B8FF855025CBC51A5F2F51C6F9CA944
26,142,772 UART: Caliptra RT
26,143,482 UART: [state] CFI Enabled
26,260,132 UART: [rt] RT listening for mailbox commands...
26,262,426 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,292,452 UART: [rt]cmd =0x54514754, len=24
26,295,178 >>> mbox cmd response data (8 bytes)
28,348,443 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
28,448,711 UART:
28,449,069 UART: Running Caliptra ROM ...
28,450,201 UART:
28,450,368 UART: [state] CFI Enabled
28,461,066 UART: [state] LifecycleState = Unprovisioned
28,462,954 UART: [state] DebugLocked = No
28,464,706 UART: [state] WD Timer not started. Device not locked for debugging
28,468,499 UART: [kat] SHA2-256
28,658,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,669,093 UART: [kat] ++
28,669,628 UART: [kat] sha1
28,680,676 UART: [kat] SHA2-256
28,683,686 UART: [kat] SHA2-384
28,688,374 UART: [kat] SHA2-512-ACC
28,690,987 UART: [kat] ECC-384
31,134,288 UART: [kat] HMAC-384Kdf
31,147,440 UART: [kat] LMS
31,679,072 UART: [kat] --
31,684,029 UART: [update-reset] ++
34,704,823 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,707,821 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
35,101,152 >>> mbox cmd response: success
35,101,529 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,101,817 UART: [update-reset] Copying MAN_2 To MAN_1
35,139,105 UART: [update-reset Success] --
35,143,804 UART: [state] Locking Datavault
35,147,730 UART: [state] Locking PCR0, PCR1 and PCR31
35,149,862 UART: [state] Locking ICCM
35,152,277 UART: [exit] Launching FMC @ 0x40000130
35,160,943 UART:
35,161,173 UART: Running Caliptra FMC ...
35,162,276 UART:
35,162,432 UART: [state] CFI Enabled
35,206,330 UART: [art] Extend RT PCRs Done
35,207,467 UART: [art] Lock RT PCRs Done
35,209,017 UART: [art] Populate DV Done
35,214,365 UART: [fht] FMC Alias Private Key: 7
35,215,948 UART: [art] Derive CDI
35,216,758 UART: [art] Store in in slot 0x4
35,259,192 UART: [art] Derive Key Pair
35,260,230 UART: [art] Store priv key in slot 0x5
37,686,768 UART: [art] Derive Key Pair - Done
37,699,577 UART: [art] Signing Cert with AUTHO
37,701,075 UART: RITY.KEYID = 7
39,406,048 UART: [art] Erasing AUTHORITY.KEYID = 7
39,407,556 UART: [art] PUB.X = 41D4561A78E336C9A78F6E7451838264DCD9F77401838FB9F76866AF75EE4821F004753D08D1B2C06BAB056384B0FD47
39,414,810 UART: [art] PUB.Y = 83135E7272F0A0FB19C4A0E6B49E62E91B89807C6C5E27A4861A9F75B885DA199EEBE157EF1214EFD733EA19C56C2ED1
39,422,102 UART: [art] SIG.R = 7EEA4EA0E96AADBA7C038C7AD82FCFE31571A656C1235F930818D8C4A87BFBD0098C396C98D8E98E18195D2934CC393B
39,429,489 UART: [art] SIG.S = F63AC0A027B052729FCE8F248DBF84D4A9706036928262F36CD4B8A85859A9F641FABA5429F3FB6316479691EDE235D6
40,407,708 UART: mbox::rt_entry...
40,408,678 UART: ____ _ _ _ ____ _____
40,410,606 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,412,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,414,533 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,416,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,418,377 UART: |_|
40,419,357 UART:
40,701,267 UART: [rt] Runtime listening for mailbox commands...
40,703,349 >>> mbox cmd response data (120 bytes)
42,752,289 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
42,852,105 UART:
42,852,460 UART: Running Caliptra ROM ...
42,853,504 UART:
42,853,707 UART: [state] CFI Enabled
42,869,598 UART: [state] LifecycleState = Unprovisioned
42,871,428 UART: [state] DebugLocked = No
42,872,833 UART: [state] WD Timer not started. Device not locked for debugging
42,876,887 UART: [kat] SHA2-256
43,066,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,077,532 UART: [kat] ++
43,078,067 UART: [kat] sha1
43,090,847 UART: [kat] SHA2-256
43,093,873 UART: [kat] SHA2-384
43,098,674 UART: [kat] SHA2-512-ACC
43,101,235 UART: [kat] ECC-384
45,544,844 UART: [kat] HMAC-384Kdf
45,557,882 UART: [kat] LMS
46,089,484 UART: [kat] --
46,093,308 UART: [update-reset] ++
49,119,468 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,122,787 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
49,516,175 >>> mbox cmd response: success
49,516,546 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,517,481 UART: [update-reset] Copying MAN_2 To MAN_1
49,555,047 UART: [update-reset Success] --
49,558,887 UART: [state] Locking Datavault
49,561,785 UART: [state] Locking PCR0, PCR1 and PCR31
49,563,968 UART: [state] Locking ICCM
49,566,416 UART: [exit] Launching FMC @ 0x40000130
49,575,074 UART:
49,575,307 UART: Running Caliptra FMC ...
49,576,340 UART:
49,576,483 UART: [state] CFI Enabled
49,620,611 UART: [art] Extend RT PCRs Done
49,621,794 UART: [art] Lock RT PCRs Done
49,623,381 UART: [art] Populate DV Done
49,628,781 UART: [fht] FMC Alias Private Key: 7
49,630,314 UART: [art] Derive CDI
49,631,130 UART: [art] Store in in slot 0x4
49,673,771 UART: [art] Derive Key Pair
49,674,763 UART: [art] Store priv key in slot 0x5
52,101,470 UART: [art] Derive Key Pair - Done
52,114,329 UART: [art] Signing Cert with AUTHO
52,115,687 UART: RITY.KEYID = 7
53,820,940 UART: [art] Erasing AUTHORITY.KEYID = 7
53,822,446 UART: [art] PUB.X = B42C772CF813E926ED8E17C03CBFAC6E5C57AE30F292717BCB953FC2EC4F8AB54971F58337B0892F5411EC367B06697F
53,829,696 UART: [art] PUB.Y = BFDC47DB30FFE5E07ACAA3CC9C51E8AF8201E5F156F639588CD61B0FDF0C1C95543F9778AE555AD2119C319B225DC206
53,836,980 UART: [art] SIG.R = A041C017A99EE142C6FE4E9C3C200006073AEB1C761D580E8655F1994D4D77365F3FECA94C5FF1C7A7B61E56E974033C
53,844,370 UART: [art] SIG.S = 3627C282FD2E7B458FBBAFCEA6669480702CB13742E9749DBCB03C9803BF50117FB687423FBE704BEEB2CA2DCDF010B5
54,823,240 UART: mbox::rt_entry...
54,824,204 UART: ____ _ _ _ ____ _____
54,826,190 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,828,191 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,830,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,831,965 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,833,892 UART: |_|
54,834,699 UART:
55,116,936 UART: [rt] Runtime listening for mailbox commands...
55,119,020 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,749,246 ready_for_fw is high
3,749,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,943,551 >>> mbox cmd response: success
19,192,695 UART:
19,193,085 UART: Running Caliptra FMC ...
19,194,282 UART:
19,194,450 UART: [state] CFI Enabled
19,202,286 UART: [fht] FMC Alias Private Key: 7
20,958,500 UART: [art] Extend RT PCRs Done
20,959,729 UART: [art] Lock RT PCRs Done
20,961,246 UART: [art] Populate DV Done
20,966,926 UART: [fht] FMC Alias Private Key: 7
20,968,474 UART: [art] Derive CDI
20,969,289 UART: [art] Store in in slot 0x4
21,012,367 UART: [art] Derive Key Pair
21,013,370 UART: [art] Store priv key in slot 0x5
23,440,471 UART: [art] Derive Key Pair - Done
23,453,521 UART: [art] Signing Cert with AUTHO
23,454,820 UART: RITY.KEYID = 7
25,160,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,970 UART: [art] PUB.X = 6D01EAAEE805CDEDDE2EA5330676A86A6C44D464C2B99E70E1C52E217B93DEEF37B23D13F28FC876AE671C652D18BEFF
25,169,231 UART: [art] PUB.Y = 917BF84737318BA3F074625B121C7B5ED2D3B987F17848E763C346AFBC257B130A42267F92DDE2D9514CA360028FFCC2
25,176,545 UART: [art] SIG.R = A8A91768702998E2AE00EF28F6C625BC4C3CC94E82C954416BF0BCE494463E600A27C581269F00BA34A8E809AF03DF66
25,183,901 UART: [art] SIG.S = FAE3054856750B02681A59973D9742D46F0827960220481ED7BCE987F22FA3CCD82D6F89D1360A3209BD5DA52BB3B593
26,162,867 UART: Caliptra RT
26,163,572 UART: [state] CFI Enabled
26,280,742 UART: [rt] RT listening for mailbox commands...
26,283,109 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,313,147 UART: [rt]cmd =0x54514754, len=24
26,315,890 >>> mbox cmd response data (8 bytes)
28,365,324 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
35,281,395 >>> mbox cmd response: success
35,281,918 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,315,485 UART:
35,315,782 UART: Running Caliptra FMC ...
35,316,816 UART:
35,316,962 UART: [state] CFI Enabled
35,361,265 UART: [art] Extend RT PCRs Done
35,362,449 UART: [art] Lock RT PCRs Done
35,364,075 UART: [art] Populate DV Done
35,369,551 UART: [fht] FMC Alias Private Key: 7
35,371,300 UART: [art] Derive CDI
35,372,034 UART: [art] Store in in slot 0x4
35,414,634 UART: [art] Derive Key Pair
35,415,632 UART: [art] Store priv key in slot 0x5
37,842,306 UART: [art] Derive Key Pair - Done
37,855,686 UART: [art] Signing Cert with AUTHO
37,857,014 UART: RITY.KEYID = 7
39,562,031 UART: [art] Erasing AUTHORITY.KEYID = 7
39,563,534 UART: [art] PUB.X = 5EC63639E12BC534C3A0206327F8F3B635141B737B9A18B50A39C71389C45B92B4924F034AC3ACE98F120D3F688E77C8
39,570,834 UART: [art] PUB.Y = EE875474EF011752A255865AE45DFA50EEF04E07789E1CC8468631966A9CC41C55431617E12907C1099E8FE7E4B4531B
39,578,057 UART: [art] SIG.R = F7F6307698EA065B7F29E295BDFA9450D9CED6327AA2EF3D01AE8813EAEBA21D20BC96230AE507FE62F775E85748F519
39,585,432 UART: [art] SIG.S = 39BA706B7FC22CDE62E7A2C302C0328821CE3D68505BA56FEAE33A002E0221BADFFB5544FA2308E1F51AE6FA06DDDBA8
40,564,023 UART: mbox::rt_entry...
40,564,989 UART: ____ _ _ _ ____ _____
40,566,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,568,981 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,570,908 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,572,842 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,574,772 UART: |_|
40,575,582 UART:
40,859,197 UART: [rt] Runtime listening for mailbox commands...
40,861,337 >>> mbox cmd response data (120 bytes)
42,907,821 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
49,822,014 >>> mbox cmd response: success
49,822,570 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,859,336 UART:
49,859,665 UART: Running Caliptra FMC ...
49,860,700 UART:
49,860,848 UART: [state] CFI Enabled
49,905,151 UART: [art] Extend RT PCRs Done
49,906,296 UART: [art] Lock RT PCRs Done
49,907,880 UART: [art] Populate DV Done
49,913,403 UART: [fht] FMC Alias Private Key: 7
49,914,924 UART: [art] Derive CDI
49,915,713 UART: [art] Store in in slot 0x4
49,958,307 UART: [art] Derive Key Pair
49,959,309 UART: [art] Store priv key in slot 0x5
52,386,199 UART: [art] Derive Key Pair - Done
52,399,190 UART: [art] Signing Cert with AUTHO
52,400,522 UART: RITY.KEYID = 7
54,105,738 UART: [art] Erasing AUTHORITY.KEYID = 7
54,107,237 UART: [art] PUB.X = B24EDC4AC0C2A2EA83C5AD774E4A7B4FEEDFB3D9BE1C72E4539174136A9C584FB85CF1376C7E98BF4CC63F99E20AFCD8
54,114,532 UART: [art] PUB.Y = 395FB4B3ED1E89D796A48E6F44A15E48766D6F3B64F28CF31412F9E9BE22C8991A51E5C5F659E385560A8FA9AC3FAD07
54,121,818 UART: [art] SIG.R = 25F884D4BE06082C914D4249656844930E56A8DF4520B8D7791454F03C4AA6970DF0AD720705132527FA4C88F2D3DF51
54,129,200 UART: [art] SIG.S = A56CE196EF01950C50DAB11E34C942035B3BC1D5C1446A71948ACCD33A807FD7369A8825C635C1A0D2339B5929146359
55,107,531 UART: mbox::rt_entry...
55,108,496 UART: ____ _ _ _ ____ _____
55,110,479 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,112,685 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,114,623 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,116,572 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,118,500 UART: |_|
55,119,306 UART:
55,406,697 UART: [rt] Runtime listening for mailbox commands...
55,408,763 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,059 UART: [kat] SHA2-256
891,997 UART: [kat] SHA2-384
894,698 UART: [kat] SHA2-512-ACC
896,599 UART: [kat] ECC-384
902,128 UART: [kat] HMAC-384Kdf
906,820 UART: [kat] LMS
1,475,016 UART: [kat] --
1,476,021 UART: [cold-reset] ++
1,476,459 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 ready_for_fw is high
1,480,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,280 UART: [idev] Erasing UDS.KEYID = 0
1,504,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,225 UART: [ldev] ++
1,514,393 UART: [ldev] CDI.KEYID = 6
1,514,756 UART: [ldev] SUBJECT.KEYID = 5
1,515,182 UART: [ldev] AUTHORITY.KEYID = 7
1,515,645 UART: [ldev] FE.KEYID = 1
1,520,983 UART: [ldev] Erasing FE.KEYID = 1
1,546,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,801 UART: [fwproc] Waiting for Commands...
1,586,548 UART: [fwproc] Received command 0x46574c44
1,587,339 UART: [fwproc] Received Image of size 114360 bytes
2,884,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,208 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,493 >>> mbox cmd response: success
3,077,745 UART: [afmc] ++
3,077,913 UART: [afmc] CDI.KEYID = 6
3,078,275 UART: [afmc] SUBJECT.KEYID = 7
3,078,700 UART: [afmc] AUTHORITY.KEYID = 5
3,113,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,638 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,328 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,275 UART: [afmc] --
3,156,357 UART: [cold-reset] --
3,157,403 UART: [state] Locking Datavault
3,158,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,260 UART: [state] Locking ICCM
3,159,698 UART: [exit] Launching FMC @ 0x40000130
3,165,027 UART:
3,165,043 UART: Running Caliptra FMC ...
3,165,451 UART:
3,165,505 UART: [state] CFI Enabled
3,175,942 UART: [fht] FMC Alias Private Key: 7
3,284,037 UART: [art] Extend RT PCRs Done
3,284,465 UART: [art] Lock RT PCRs Done
3,286,525 UART: [art] Populate DV Done
3,294,848 UART: [fht] FMC Alias Private Key: 7
3,296,014 UART: [art] Derive CDI
3,296,294 UART: [art] Store in in slot 0x4
3,381,965 UART: [art] Derive Key Pair
3,382,325 UART: [art] Store priv key in slot 0x5
3,395,635 UART: [art] Derive Key Pair - Done
3,410,324 UART: [art] Signing Cert with AUTHO
3,410,804 UART: RITY.KEYID = 7
3,426,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,873 UART: [art] PUB.X = 470A175B6400E7EFAD4EB7FC4F5791FF2EBF21F6826074D5B1AF66AF0134DF8CEF681EAB77BD05338C1A83331DBD06A7
3,433,627 UART: [art] PUB.Y = 2DB1C936C61F52EE0E8B00511862C3B5211572FB8522FF4FE4C8DB713C18F8EA06B57705ECA475360981614EC1E63B5F
3,440,547 UART: [art] SIG.R = 4CA935CC04CAA08E503A99AE8972A2B833A63EA8C7F8E43A958B50B017B883AAEEC553BC4082FA3DA542A37185AD1520
3,447,326 UART: [art] SIG.S = B21D4AF7E8505963212B4B6917BEB24439CC7C88DDF19A7F3FA6F4891EBA9F964D825738CD4CF46FFF6ACB095351148E
3,470,794 UART: Caliptra RT
3,471,048 UART: [state] CFI Enabled
3,579,774 UART: [rt] RT listening for mailbox commands...
3,580,444 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,061 UART: [rt]cmd =0x54514754, len=24
3,612,246 >>> mbox cmd response data (8 bytes)
3,612,247 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,096 UART:
3,613,112 UART: Running Caliptra ROM ...
3,613,520 UART:
3,613,574 UART: [state] CFI Enabled
3,615,598 UART: [state] LifecycleState = Unprovisioned
3,616,253 UART: [state] DebugLocked = No
3,616,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,520 UART: [kat] SHA2-256
4,412,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,566 UART: [kat] ++
4,416,718 UART: [kat] sha1
4,420,912 UART: [kat] SHA2-256
4,422,850 UART: [kat] SHA2-384
4,425,425 UART: [kat] SHA2-512-ACC
4,427,325 UART: [kat] ECC-384
4,432,928 UART: [kat] HMAC-384Kdf
4,437,488 UART: [kat] LMS
5,005,684 UART: [kat] --
5,006,547 UART: [update-reset] ++
5,932,966 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,934,224 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,030,550 >>> mbox cmd response: success
6,030,550 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,030,737 UART: [update-reset] Copying MAN_2 To MAN_1
6,038,751 UART: [update-reset Success] --
6,039,788 UART: [state] Locking Datavault
6,040,662 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,266 UART: [state] Locking ICCM
6,041,812 UART: [exit] Launching FMC @ 0x40000130
6,047,141 UART:
6,047,157 UART: Running Caliptra FMC ...
6,047,565 UART:
6,047,619 UART: [state] CFI Enabled
6,136,468 UART: [art] Extend RT PCRs Done
6,136,896 UART: [art] Lock RT PCRs Done
6,138,407 UART: [art] Populate DV Done
6,146,674 UART: [fht] FMC Alias Private Key: 7
6,147,824 UART: [art] Derive CDI
6,148,104 UART: [art] Store in in slot 0x4
6,234,005 UART: [art] Derive Key Pair
6,234,365 UART: [art] Store priv key in slot 0x5
6,247,735 UART: [art] Derive Key Pair - Done
6,262,375 UART: [art] Signing Cert with AUTHO
6,262,855 UART: RITY.KEYID = 7
6,277,919 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,684 UART: [art] PUB.X = B7E362DFBA3B1FD0AC5A128E96D9784423BAB0A8B0167AD06D4A0FBB0718863DCF3F8B456FA00E355EB89E7A43348B2C
6,285,463 UART: [art] PUB.Y = B993B8E7479A3BFE1E4369F74AE26ACA4F3B73189939F47B529C7301F717D6BE05B7BAA2F4396F163BE165A13F4C73D9
6,292,415 UART: [art] SIG.R = 09E50E7304959ADDB51BE452E0160AC6EDEF08BCD25EC03519EEEE3A2E52401245E516D250D7FADAF6323B329F1A1CC3
6,299,186 UART: [art] SIG.S = 03318761CE43ECDB8D88D3736ED42D2D83309BAAFC71E65AB6BBCB0241F43700BE5011186CE75D626E9127AE881820E2
6,322,565 UART: mbox::rt_entry...
6,322,937 UART: ____ _ _ _ ____ _____
6,323,721 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,324,521 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,325,289 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,326,057 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,326,825 UART: |_|
6,327,137 UART:
6,606,902 UART: [rt] Runtime listening for mailbox commands...
6,608,120 >>> mbox cmd response data (120 bytes)
6,608,121 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
6,608,235 UART:
6,608,251 UART: Running Caliptra ROM ...
6,608,659 UART:
6,608,713 UART: [state] CFI Enabled
6,611,331 UART: [state] LifecycleState = Unprovisioned
6,611,986 UART: [state] DebugLocked = No
6,612,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,614,371 UART: [kat] SHA2-256
7,408,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,412,417 UART: [kat] ++
7,412,569 UART: [kat] sha1
7,416,793 UART: [kat] SHA2-256
7,418,731 UART: [kat] SHA2-384
7,421,498 UART: [kat] SHA2-512-ACC
7,423,398 UART: [kat] ECC-384
7,428,887 UART: [kat] HMAC-384Kdf
7,433,511 UART: [kat] LMS
8,001,707 UART: [kat] --
8,002,578 UART: [update-reset] ++
8,928,801 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,930,069 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
9,026,395 >>> mbox cmd response: success
9,026,395 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,026,516 UART: [update-reset] Copying MAN_2 To MAN_1
9,034,530 UART: [update-reset Success] --
9,035,461 UART: [state] Locking Datavault
9,036,243 UART: [state] Locking PCR0, PCR1 and PCR31
9,036,847 UART: [state] Locking ICCM
9,037,469 UART: [exit] Launching FMC @ 0x40000130
9,042,798 UART:
9,042,814 UART: Running Caliptra FMC ...
9,043,222 UART:
9,043,276 UART: [state] CFI Enabled
9,132,173 UART: [art] Extend RT PCRs Done
9,132,601 UART: [art] Lock RT PCRs Done
9,133,686 UART: [art] Populate DV Done
9,142,061 UART: [fht] FMC Alias Private Key: 7
9,143,049 UART: [art] Derive CDI
9,143,329 UART: [art] Store in in slot 0x4
9,228,956 UART: [art] Derive Key Pair
9,229,316 UART: [art] Store priv key in slot 0x5
9,242,860 UART: [art] Derive Key Pair - Done
9,257,924 UART: [art] Signing Cert with AUTHO
9,258,404 UART: RITY.KEYID = 7
9,273,550 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,315 UART: [art] PUB.X = BD361A35BA2C438AFAFCF56D7030F6650CF0CEA5C12E519C604293EEDEEE915078366DC008EEBD7DACDC26F7019D805A
9,281,098 UART: [art] PUB.Y = 7A5E46DFE903EA47DCB039FFC3A2B0A152099885C26C4B9191B3BA15CD20629D43FD4C31B60F6A5C6B64012C74EED28F
9,288,050 UART: [art] SIG.R = A856058371E4DA8A427E5F583AA6D8468316586B840E13F68961D820A37D9AA8D6F3061356623B0B8E6DAEAEB5708E26
9,294,806 UART: [art] SIG.S = 120D21A971ADE514EC1A7AD3108452EBD61BC7D13ACC8A382F9CBA716ACFAEAAB7515076EB204383D14D865514C25758
9,318,600 UART: mbox::rt_entry...
9,318,972 UART: ____ _ _ _ ____ _____
9,319,756 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,320,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,321,324 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,322,092 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,322,860 UART: |_|
9,323,172 UART:
9,601,954 UART: [rt] Runtime listening for mailbox commands...
9,603,172 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,077 ready_for_fw is high
1,363,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,211 >>> mbox cmd response: success
2,989,135 UART:
2,989,151 UART: Running Caliptra FMC ...
2,989,559 UART:
2,989,613 UART: [state] CFI Enabled
3,000,080 UART: [fht] FMC Alias Private Key: 7
3,107,819 UART: [art] Extend RT PCRs Done
3,108,247 UART: [art] Lock RT PCRs Done
3,109,977 UART: [art] Populate DV Done
3,118,208 UART: [fht] FMC Alias Private Key: 7
3,119,384 UART: [art] Derive CDI
3,119,664 UART: [art] Store in in slot 0x4
3,205,647 UART: [art] Derive Key Pair
3,206,007 UART: [art] Store priv key in slot 0x5
3,219,557 UART: [art] Derive Key Pair - Done
3,234,298 UART: [art] Signing Cert with AUTHO
3,234,778 UART: RITY.KEYID = 7
3,249,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,667 UART: [art] PUB.X = C7322AB383F2383666033ACB71DE66FFF795C720F2CFF79C7491926DA8720740FB4C9E1E3B251BBDF7BDB73DCDCE9916
3,257,445 UART: [art] PUB.Y = 63387658C107E591D399CA7D64A40705DC70A963E7B4E0DCC44AA55C2E5CAF77B959BE5E69D183BED6C864FBDCD7EBE3
3,264,404 UART: [art] SIG.R = 864638F9DFD39B1E8C2FB51BA1D425291F7E4160ABE51EC161F52026D7F45D6CF51E2F78EBE0B1E1EA8F5F541C58A1C1
3,271,190 UART: [art] SIG.S = DBB98A9E3BCC1C682AC24A3A17A8F2141CF27D93B29251C8467F9AC5AD82589A1A5C835A8C46E10BA552DC8D5D43FE21
3,294,612 UART: Caliptra RT
3,294,866 UART: [state] CFI Enabled
3,401,985 UART: [rt] RT listening for mailbox commands...
3,402,655 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,220 UART: [rt]cmd =0x54514754, len=24
3,434,137 >>> mbox cmd response data (8 bytes)
3,434,138 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,549 >>> mbox cmd response: success
5,732,549 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,745,686 UART:
5,745,702 UART: Running Caliptra FMC ...
5,746,110 UART:
5,746,164 UART: [state] CFI Enabled
5,835,219 UART: [art] Extend RT PCRs Done
5,835,647 UART: [art] Lock RT PCRs Done
5,836,938 UART: [art] Populate DV Done
5,845,469 UART: [fht] FMC Alias Private Key: 7
5,846,567 UART: [art] Derive CDI
5,846,847 UART: [art] Store in in slot 0x4
5,932,216 UART: [art] Derive Key Pair
5,932,576 UART: [art] Store priv key in slot 0x5
5,945,876 UART: [art] Derive Key Pair - Done
5,960,733 UART: [art] Signing Cert with AUTHO
5,961,213 UART: RITY.KEYID = 7
5,976,095 UART: [art] Erasing AUTHORITY.KEYID = 7
5,976,860 UART: [art] PUB.X = 7A0F3C3B3C7305387EB3D7D5A2B5DAF524CAD5F4D886FD201032CE2E17AABD23565942318EC54FC9D160068EEDC71AAF
5,983,639 UART: [art] PUB.Y = DE524AE63986372AD2F9E268113E11C98401376A061E01F2F586618BB6EC6F432A481147F73F26093B8E04BD2B410D9C
5,990,567 UART: [art] SIG.R = FFDBDCFB5E58DE4780C367BCB50AF0C50D42C9D1FF8F5681041EA151E28C8D44E42A62720E4A3E8B393AD3B8B6F6E55E
5,997,347 UART: [art] SIG.S = 87BDCA4C739ED114A0A74633E85CA447975A3F17B0A8CAD48F0437B2F2C18568EA11D810463A26E3C08881A3DF82A27A
6,020,873 UART: mbox::rt_entry...
6,021,245 UART: ____ _ _ _ ____ _____
6,022,029 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,022,829 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,023,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,024,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,025,133 UART: |_|
6,025,445 UART:
6,304,162 UART: [rt] Runtime listening for mailbox commands...
6,305,380 >>> mbox cmd response data (120 bytes)
6,305,381 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,604,351 >>> mbox cmd response: success
8,604,351 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,617,444 UART:
8,617,460 UART: Running Caliptra FMC ...
8,617,868 UART:
8,617,922 UART: [state] CFI Enabled
8,706,661 UART: [art] Extend RT PCRs Done
8,707,089 UART: [art] Lock RT PCRs Done
8,708,376 UART: [art] Populate DV Done
8,716,579 UART: [fht] FMC Alias Private Key: 7
8,717,601 UART: [art] Derive CDI
8,717,881 UART: [art] Store in in slot 0x4
8,803,490 UART: [art] Derive Key Pair
8,803,850 UART: [art] Store priv key in slot 0x5
8,816,910 UART: [art] Derive Key Pair - Done
8,831,617 UART: [art] Signing Cert with AUTHO
8,832,097 UART: RITY.KEYID = 7
8,847,777 UART: [art] Erasing AUTHORITY.KEYID = 7
8,848,542 UART: [art] PUB.X = 2474FE0A41F1F09EAB422E9B06BDFC58330AD0CACE674F7277375506CF5A32D6A3827FB5C63541038B0A21EEB20C89E9
8,855,301 UART: [art] PUB.Y = 8E0D9FCC241D1EDC230D9A04E08654D147EADB0494CC091763B7BAC05822CF0D96A6DAF2BAC56AC785ADD7C8CCE1337A
8,862,257 UART: [art] SIG.R = 4AE8FDD9BA6A6F2BE0471911EA0AE5C6945231F0B63827EE0AA8BCD20E719E00C22174D455D411D15CD70AB7BB792739
8,869,005 UART: [art] SIG.S = 0A88B25E4154D825F15828551D1CADFB926158CAB3DB8E14E08F8E2FD3F1A79265589135C5C95FED4413EC914B224E8C
8,893,173 UART: mbox::rt_entry...
8,893,545 UART: ____ _ _ _ ____ _____
8,894,329 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,895,129 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,895,897 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,896,665 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,897,433 UART: |_|
8,897,745 UART:
9,178,086 UART: [rt] Runtime listening for mailbox commands...
9,179,304 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,481 UART: [kat] SHA2-512-ACC
897,382 UART: [kat] ECC-384
903,237 UART: [kat] HMAC-384Kdf
907,873 UART: [kat] LMS
1,476,069 UART: [kat] --
1,477,132 UART: [cold-reset] ++
1,477,602 UART: [fht] Storing FHT @ 0x50003400
1,480,265 UART: [idev] ++
1,480,433 UART: [idev] CDI.KEYID = 6
1,480,793 UART: [idev] SUBJECT.KEYID = 7
1,481,217 UART: [idev] UDS.KEYID = 0
1,481,562 ready_for_fw is high
1,481,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,965 UART: [idev] Erasing UDS.KEYID = 0
1,505,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,381 UART: [idev] --
1,515,542 UART: [ldev] ++
1,515,710 UART: [ldev] CDI.KEYID = 6
1,516,073 UART: [ldev] SUBJECT.KEYID = 5
1,516,499 UART: [ldev] AUTHORITY.KEYID = 7
1,516,962 UART: [ldev] FE.KEYID = 1
1,522,180 UART: [ldev] Erasing FE.KEYID = 1
1,547,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,141 UART: [ldev] --
1,587,476 UART: [fwproc] Waiting for Commands...
1,588,207 UART: [fwproc] Received command 0x46574c44
1,588,998 UART: [fwproc] Received Image of size 114360 bytes
2,887,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,963 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,334 >>> mbox cmd response: success
3,081,390 UART: [afmc] ++
3,081,558 UART: [afmc] CDI.KEYID = 6
3,081,920 UART: [afmc] SUBJECT.KEYID = 7
3,082,345 UART: [afmc] AUTHORITY.KEYID = 5
3,117,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,575 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,265 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,072 UART: [afmc] --
3,161,160 UART: [cold-reset] --
3,161,878 UART: [state] Locking Datavault
3,163,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,807 UART: [state] Locking ICCM
3,164,401 UART: [exit] Launching FMC @ 0x40000130
3,169,730 UART:
3,169,746 UART: Running Caliptra FMC ...
3,170,154 UART:
3,170,297 UART: [state] CFI Enabled
3,180,556 UART: [fht] FMC Alias Private Key: 7
3,288,861 UART: [art] Extend RT PCRs Done
3,289,289 UART: [art] Lock RT PCRs Done
3,290,469 UART: [art] Populate DV Done
3,298,612 UART: [fht] FMC Alias Private Key: 7
3,299,582 UART: [art] Derive CDI
3,299,862 UART: [art] Store in in slot 0x4
3,385,649 UART: [art] Derive Key Pair
3,386,009 UART: [art] Store priv key in slot 0x5
3,399,705 UART: [art] Derive Key Pair - Done
3,414,110 UART: [art] Signing Cert with AUTHO
3,414,590 UART: RITY.KEYID = 7
3,429,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,529 UART: [art] PUB.X = 83DA6B760A4E64EA8B9A99DBF4AD924D6028AAA22B0A0566228C2A9F9421BFDBF5E8625B12E0E073F27BD51607B19265
3,437,297 UART: [art] PUB.Y = BEF93016AB8DD3C36AAE353245335C1E7BACDEC51D8B164F01D005884A8A6AB2A5FD85B885FB54D20F109677A2CA28CE
3,444,256 UART: [art] SIG.R = 78D6F381CE2205604232ED926404283A8D958C5D3C06528DC539C198B5EEB147864428DAAF653D645030B85E85274A05
3,451,004 UART: [art] SIG.S = C1B25855E00BAED35AC0201019C4A43051484C766C5686177ADC786C4A2E63C5C7B10737A37BD86FC144D5418D2173B6
3,475,097 UART: Caliptra RT
3,475,443 UART: [state] CFI Enabled
3,583,019 UART: [rt] RT listening for mailbox commands...
3,583,689 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,422 UART: [rt]cmd =0x54514754, len=24
3,615,367 >>> mbox cmd response data (8 bytes)
3,615,368 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,069 UART:
3,616,085 UART: Running Caliptra ROM ...
3,616,493 UART:
3,616,634 UART: [state] CFI Enabled
3,619,140 UART: [state] LifecycleState = Unprovisioned
3,619,795 UART: [state] DebugLocked = No
3,620,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,621,910 UART: [kat] SHA2-256
4,415,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,419,956 UART: [kat] ++
4,420,108 UART: [kat] sha1
4,424,510 UART: [kat] SHA2-256
4,426,448 UART: [kat] SHA2-384
4,429,229 UART: [kat] SHA2-512-ACC
4,431,129 UART: [kat] ECC-384
4,436,816 UART: [kat] HMAC-384Kdf
4,441,366 UART: [kat] LMS
5,009,562 UART: [kat] --
5,010,605 UART: [update-reset] ++
5,935,476 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,936,670 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
6,032,996 >>> mbox cmd response: success
6,032,996 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,033,103 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,117 UART: [update-reset Success] --
6,042,060 UART: [state] Locking Datavault
6,042,920 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,524 UART: [state] Locking ICCM
6,044,056 UART: [exit] Launching FMC @ 0x40000130
6,049,385 UART:
6,049,401 UART: Running Caliptra FMC ...
6,049,809 UART:
6,049,952 UART: [state] CFI Enabled
6,139,161 UART: [art] Extend RT PCRs Done
6,139,589 UART: [art] Lock RT PCRs Done
6,140,718 UART: [art] Populate DV Done
6,149,065 UART: [fht] FMC Alias Private Key: 7
6,150,125 UART: [art] Derive CDI
6,150,405 UART: [art] Store in in slot 0x4
6,236,434 UART: [art] Derive Key Pair
6,236,794 UART: [art] Store priv key in slot 0x5
6,249,790 UART: [art] Derive Key Pair - Done
6,264,899 UART: [art] Signing Cert with AUTHO
6,265,379 UART: RITY.KEYID = 7
6,280,667 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,432 UART: [art] PUB.X = 0E1959608B6A7496933B5361110F781FBA679A796957510CD43E5231EDC6EF933BEC4A6B4FED1CD5BAFC65333452126B
6,288,195 UART: [art] PUB.Y = 92DF5EAEC8D61C78CF3F5D4E7F05ADF0C90BD1EE8A9CC37F3F40F3567AF037B63F2FE6C950225E312BCD5249E04D8126
6,295,159 UART: [art] SIG.R = A2E14EC749E41A24437940B244B3BB07669973DFE90D1BA8397E4DA3EF890E19612E837D87508DD2E0B10FE73B140E1E
6,301,918 UART: [art] SIG.S = 9283EE1BE67013CF82DE22941BF6F3191994D9AA64BCECDBDD1A1D78BC3F9311872392580A8733A15967BA28302A57C9
6,325,022 UART: mbox::rt_entry...
6,325,394 UART: ____ _ _ _ ____ _____
6,326,178 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,326,978 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,327,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,328,514 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,329,282 UART: |_|
6,329,594 UART:
6,609,475 UART: [rt] Runtime listening for mailbox commands...
6,610,693 >>> mbox cmd response data (120 bytes)
6,610,694 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
6,610,808 UART:
6,610,824 UART: Running Caliptra ROM ...
6,611,232 UART:
6,611,373 UART: [state] CFI Enabled
6,613,879 UART: [state] LifecycleState = Unprovisioned
6,614,534 UART: [state] DebugLocked = No
6,615,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,616,635 UART: [kat] SHA2-256
7,410,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,414,681 UART: [kat] ++
7,414,833 UART: [kat] sha1
7,418,981 UART: [kat] SHA2-256
7,420,919 UART: [kat] SHA2-384
7,423,838 UART: [kat] SHA2-512-ACC
7,425,738 UART: [kat] ECC-384
7,431,301 UART: [kat] HMAC-384Kdf
7,435,995 UART: [kat] LMS
8,004,191 UART: [kat] --
8,005,088 UART: [update-reset] ++
8,930,323 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,931,435 UART: [update-reset] Loading Runtime at address 0x40005000 len 53948
9,027,761 >>> mbox cmd response: success
9,027,761 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,028,060 UART: [update-reset] Copying MAN_2 To MAN_1
9,036,074 UART: [update-reset Success] --
9,037,091 UART: [state] Locking Datavault
9,037,799 UART: [state] Locking PCR0, PCR1 and PCR31
9,038,403 UART: [state] Locking ICCM
9,038,909 UART: [exit] Launching FMC @ 0x40000130
9,044,238 UART:
9,044,254 UART: Running Caliptra FMC ...
9,044,662 UART:
9,044,805 UART: [state] CFI Enabled
9,133,984 UART: [art] Extend RT PCRs Done
9,134,412 UART: [art] Lock RT PCRs Done
9,135,515 UART: [art] Populate DV Done
9,143,894 UART: [fht] FMC Alias Private Key: 7
9,144,900 UART: [art] Derive CDI
9,145,180 UART: [art] Store in in slot 0x4
9,231,045 UART: [art] Derive Key Pair
9,231,405 UART: [art] Store priv key in slot 0x5
9,245,105 UART: [art] Derive Key Pair - Done
9,259,963 UART: [art] Signing Cert with AUTHO
9,260,443 UART: RITY.KEYID = 7
9,275,819 UART: [art] Erasing AUTHORITY.KEYID = 7
9,276,584 UART: [art] PUB.X = C9E7CE25B1DD46BCB0C8DE339197BB050B2D5D958D38A218634479D3E8457B8DE0922F56D7DA9FCA03A94F61CE572126
9,283,355 UART: [art] PUB.Y = 31CFCB932606153AFDE5262F99CA31EEA9CE4F69D6C3067432AA1AFC7644FE952939ACDF535FBDF68732B5747E9AC3C8
9,290,315 UART: [art] SIG.R = 28EAAD5123198E8E614895B6E13A5C86C2174501D16085195050670A122D553A058699BC89BDBCBA92A7D4425D08B351
9,297,065 UART: [art] SIG.S = 01DFED7AE3B5C4EDCB593E159917CBF23571BBAEB2BDA71CEC886B605002D01ECC2EE170D0D3444FC4BE370826A38080
9,319,557 UART: mbox::rt_entry...
9,319,929 UART: ____ _ _ _ ____ _____
9,320,713 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,321,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,322,281 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,323,049 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,323,817 UART: |_|
9,324,129 UART:
9,608,528 UART: [rt] Runtime listening for mailbox commands...
9,609,746 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,024 ready_for_fw is high
1,362,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,604 >>> mbox cmd response: success
2,991,400 UART:
2,991,416 UART: Running Caliptra FMC ...
2,991,824 UART:
2,991,967 UART: [state] CFI Enabled
3,002,484 UART: [fht] FMC Alias Private Key: 7
3,110,161 UART: [art] Extend RT PCRs Done
3,110,589 UART: [art] Lock RT PCRs Done
3,112,331 UART: [art] Populate DV Done
3,120,678 UART: [fht] FMC Alias Private Key: 7
3,121,722 UART: [art] Derive CDI
3,122,002 UART: [art] Store in in slot 0x4
3,207,043 UART: [art] Derive Key Pair
3,207,403 UART: [art] Store priv key in slot 0x5
3,220,631 UART: [art] Derive Key Pair - Done
3,235,247 UART: [art] Signing Cert with AUTHO
3,235,727 UART: RITY.KEYID = 7
3,251,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,774 UART: [art] PUB.X = 1DA12FCC2C0AB3A56E0B01E44623938B98C97A56575B0DD6DA5A080F78EE06C681B87C85510F869EF609EB02B35EBAA4
3,258,526 UART: [art] PUB.Y = 0404018C4508A0FF087D19195FDE7B52BFBB8948AC1E93FA97537894F60428813A88ED33FCC99456A891AA1BDC48493D
3,265,460 UART: [art] SIG.R = 3AE645FB95285FD8155D52F6428F12E8508A2B98EAABCF9E616858A4D1872912E990E5771F8C18EB7716DDA458D3BCB2
3,272,236 UART: [art] SIG.S = DF79ACD82F72936F1B44552C80B5774F0FA3EE527CB305630B0A8874071E8090EFA32C6E8F3E5225A911802631BD4D51
3,295,722 UART: Caliptra RT
3,296,068 UART: [state] CFI Enabled
3,404,542 UART: [rt] RT listening for mailbox commands...
3,405,212 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,975 UART: [rt]cmd =0x54514754, len=24
3,437,206 >>> mbox cmd response data (8 bytes)
3,437,207 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,736,575 >>> mbox cmd response: success
5,736,575 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,749,668 UART:
5,749,684 UART: Running Caliptra FMC ...
5,750,092 UART:
5,750,235 UART: [state] CFI Enabled
5,839,216 UART: [art] Extend RT PCRs Done
5,839,644 UART: [art] Lock RT PCRs Done
5,840,701 UART: [art] Populate DV Done
5,848,830 UART: [fht] FMC Alias Private Key: 7
5,849,850 UART: [art] Derive CDI
5,850,130 UART: [art] Store in in slot 0x4
5,936,245 UART: [art] Derive Key Pair
5,936,605 UART: [art] Store priv key in slot 0x5
5,949,725 UART: [art] Derive Key Pair - Done
5,964,129 UART: [art] Signing Cert with AUTHO
5,964,609 UART: RITY.KEYID = 7
5,979,873 UART: [art] Erasing AUTHORITY.KEYID = 7
5,980,638 UART: [art] PUB.X = D1B52F3D090BF92816C129A13ECB83038DBBCBD748498AB0C53D7995E82C7ED649F772EF5AB2F02D2849766550912495
5,987,401 UART: [art] PUB.Y = 7EB2C44072042107A62E1323AB2E3D734CB1A720709635C9675418A609D3224A1E283357D026176BF55F997E9E0A25F1
5,994,327 UART: [art] SIG.R = AE7176A780C689DB891502BE5312E154351EEA65F16882DDB119096993FC08C4F894911772749FD8C4307F052B664FA9
6,001,077 UART: [art] SIG.S = 67F4C7276F031A070DAA50B84074B4B504CCEE4942A4055217C579E8E12A44DB0FFD1109634DA65D4D86194A5D2B4F82
6,024,869 UART: mbox::rt_entry...
6,025,241 UART: ____ _ _ _ ____ _____
6,026,025 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,026,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,027,593 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,028,361 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,029,129 UART: |_|
6,029,441 UART:
6,309,831 UART: [rt] Runtime listening for mailbox commands...
6,311,049 >>> mbox cmd response data (120 bytes)
6,311,050 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
8,610,945 >>> mbox cmd response: success
8,610,945 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,624,452 UART:
8,624,468 UART: Running Caliptra FMC ...
8,624,876 UART:
8,625,019 UART: [state] CFI Enabled
8,713,748 UART: [art] Extend RT PCRs Done
8,714,176 UART: [art] Lock RT PCRs Done
8,715,397 UART: [art] Populate DV Done
8,723,322 UART: [fht] FMC Alias Private Key: 7
8,724,300 UART: [art] Derive CDI
8,724,580 UART: [art] Store in in slot 0x4
8,810,153 UART: [art] Derive Key Pair
8,810,513 UART: [art] Store priv key in slot 0x5
8,824,213 UART: [art] Derive Key Pair - Done
8,838,935 UART: [art] Signing Cert with AUTHO
8,839,415 UART: RITY.KEYID = 7
8,855,147 UART: [art] Erasing AUTHORITY.KEYID = 7
8,855,912 UART: [art] PUB.X = 4C6B60D598EF011737EAB7076AF195ACD1D06F652B28BC831145FEDC1A51B39AFD07F6267F6DE39E5A451170A5E1E4B9
8,862,685 UART: [art] PUB.Y = C1311202B22E33B5A00B34181888FF40EDD4850A98B97BF829B0196FD746A2F738A2ACF70A20CA146020D5E7F9A42F0E
8,869,624 UART: [art] SIG.R = BA5ACC35F462C60BF867122A02ABC60E96104FB37CA04D409B2251B8EC2A55D6B0E0E9BB93C5442DCE5EF4F3AC3E3D9B
8,876,407 UART: [art] SIG.S = 27F484E0CEB63D3CB9A04C1F984EA67B6EBFD446CF844B2C4C3F0F43E219D516A0BBDC9858CF10C7C25AD14A91BBCCD8
8,900,561 UART: mbox::rt_entry...
8,900,933 UART: ____ _ _ _ ____ _____
8,901,717 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,902,517 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,903,285 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,904,053 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,904,821 UART: |_|
8,905,133 UART:
9,188,343 UART: [rt] Runtime listening for mailbox commands...
9,189,561 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,871 UART: [state] WD Timer not started. Device not locked for debugging
88,220 UART: [kat] SHA2-256
893,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,995 UART: [kat] ++
898,147 UART: [kat] sha1
902,433 UART: [kat] SHA2-256
904,373 UART: [kat] SHA2-384
907,224 UART: [kat] SHA2-512-ACC
909,125 UART: [kat] ECC-384
918,272 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,621 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,204 UART: [idev] Erasing UDS.KEYID = 0
1,200,841 UART: [idev] Sha1 KeyId Algorithm
1,209,289 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,656 UART: [ldev] SUBJECT.KEYID = 5
1,211,082 UART: [ldev] AUTHORITY.KEYID = 7
1,211,545 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,282,070 UART: [fwproc] Recv command 0x46574c44
1,282,798 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,862 >>> mbox cmd response: success
2,773,000 UART: [afmc] ++
2,773,168 UART: [afmc] CDI.KEYID = 6
2,773,530 UART: [afmc] SUBJECT.KEYID = 7
2,773,955 UART: [afmc] AUTHORITY.KEYID = 5
2,809,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,846 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,461 UART: [afmc] --
2,853,475 UART: [cold-reset] --
2,854,455 UART: [state] Locking Datavault
2,855,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,336 UART: [state] Locking ICCM
2,856,772 UART: [exit] Launching FMC @ 0x40000130
2,862,101 UART:
2,862,117 UART: Running Caliptra FMC ...
2,862,525 UART:
2,862,579 UART: [state] CFI Enabled
2,873,096 UART: [fht] FMC Alias Private Key: 7
2,980,979 UART: [art] Extend RT PCRs Done
2,981,407 UART: [art] Lock RT PCRs Done
2,982,611 UART: [art] Populate DV Done
2,990,984 UART: [fht] FMC Alias Private Key: 7
2,992,044 UART: [art] Derive CDI
2,992,324 UART: [art] Store in in slot 0x4
3,078,437 UART: [art] Derive Key Pair
3,078,797 UART: [art] Store priv key in slot 0x5
3,092,377 UART: [art] Derive Key Pair - Done
3,107,169 UART: [art] Signing Cert with AUTHO
3,107,649 UART: RITY.KEYID = 7
3,122,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,494 UART: [art] PUB.X = E11E7080CCD0CB3DC7E18CE665404E63012D86BA1495C9EFE2B487037F682D9F53406F7576CA14DE0468CCE3554F2994
3,130,259 UART: [art] PUB.Y = 9F0B05A51860D43F9D6DBFC322712F0970475D78D31C09C7F65D26D2397EF379BBFEF71DA646C79D5D0A409FEF024318
3,137,197 UART: [art] SIG.R = 3157C81136AECE93862E394C8CA3127B93D12932883C995063774D9B82A1B050334079F1F2391B32F223A60F07826FE2
3,143,947 UART: [art] SIG.S = 553D95FCCD4A28F1C401869A51DB4A240A426FE89A6F3593E2412566B84338A6CD2B1E2EA97BB3538D720B69EA134AE5
3,167,499 UART: Caliptra RT
3,167,753 UART: [state] CFI Enabled
3,275,825 UART: [rt] RT listening for mailbox commands...
3,276,495 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,068 UART: [rt]cmd =0x54514754, len=24
3,308,027 >>> mbox cmd response data (8 bytes)
3,308,028 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,844 UART:
3,308,860 UART: Running Caliptra ROM ...
3,309,268 UART:
3,309,323 UART: [state] CFI Enabled
3,311,931 UART: [state] LifecycleState = Unprovisioned
3,312,586 UART: [state] DebugLocked = No
3,313,142 UART: [state] WD Timer not started. Device not locked for debugging
3,314,472 UART: [kat] SHA2-256
4,120,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,247 UART: [kat] ++
4,124,399 UART: [kat] sha1
4,128,453 UART: [kat] SHA2-256
4,130,393 UART: [kat] SHA2-384
4,133,078 UART: [kat] SHA2-512-ACC
4,134,978 UART: [kat] ECC-384
4,144,971 UART: [kat] HMAC-384Kdf
4,149,489 UART: [kat] LMS
4,397,817 UART: [kat] --
4,398,985 UART: [update-reset] ++
5,302,056 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,169 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,443 >>> mbox cmd response: success
5,399,443 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,399,762 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,776 UART: [update-reset Success] --
5,408,889 UART: [state] Locking Datavault
5,409,819 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,423 UART: [state] Locking ICCM
5,410,915 UART: [exit] Launching FMC @ 0x40000130
5,416,244 UART:
5,416,260 UART: Running Caliptra FMC ...
5,416,668 UART:
5,416,722 UART: [state] CFI Enabled
5,505,903 UART: [art] Extend RT PCRs Done
5,506,331 UART: [art] Lock RT PCRs Done
5,507,664 UART: [art] Populate DV Done
5,516,153 UART: [fht] FMC Alias Private Key: 7
5,517,121 UART: [art] Derive CDI
5,517,401 UART: [art] Store in in slot 0x4
5,602,720 UART: [art] Derive Key Pair
5,603,080 UART: [art] Store priv key in slot 0x5
5,616,596 UART: [art] Derive Key Pair - Done
5,631,266 UART: [art] Signing Cert with AUTHO
5,631,746 UART: RITY.KEYID = 7
5,647,374 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,139 UART: [art] PUB.X = 5ABA26CE5DC09B40F4F0D0445609805F7BC24E5776405C3D9EF5A7617FB224767939867867B4D6DB4F7FC165DEA2054C
5,654,907 UART: [art] PUB.Y = C40B114FEEA2E14A7DA948FE77C36C705635D0CF97D366F29C9C472867AC0A2A26967994EF54C63B2021B7BC8C387FF3
5,661,859 UART: [art] SIG.R = 67A6176480DA856F8D009743B76327FDB473966419517A7F5FCFDC21C68D135DEC87E04802FA2561CFDDF8DF351A35BF
5,668,610 UART: [art] SIG.S = DC4A4F7FFE970F70BBFB6EBA3AFB2A91ED0D33B730844FEC8D1FE6485CB6AF18AAFB361D6B075058F699C6174DAB4D02
5,691,987 UART: mbox::rt_entry...
5,692,359 UART: ____ _ _ _ ____ _____
5,693,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,943 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,711 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,479 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,696,247 UART: |_|
5,696,559 UART:
5,976,209 UART: [rt] Runtime listening for mailbox commands...
5,977,427 >>> mbox cmd response data (120 bytes)
5,977,428 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,977,539 UART:
5,977,555 UART: Running Caliptra ROM ...
5,977,963 UART:
5,978,018 UART: [state] CFI Enabled
5,980,598 UART: [state] LifecycleState = Unprovisioned
5,981,253 UART: [state] DebugLocked = No
5,981,863 UART: [state] WD Timer not started. Device not locked for debugging
5,983,187 UART: [kat] SHA2-256
6,788,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,792,962 UART: [kat] ++
6,793,114 UART: [kat] sha1
6,797,404 UART: [kat] SHA2-256
6,799,344 UART: [kat] SHA2-384
6,802,033 UART: [kat] SHA2-512-ACC
6,803,933 UART: [kat] ECC-384
6,813,744 UART: [kat] HMAC-384Kdf
6,818,438 UART: [kat] LMS
7,066,766 UART: [kat] --
7,067,524 UART: [update-reset] ++
7,971,403 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,972,420 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,068,694 >>> mbox cmd response: success
8,068,694 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,068,863 UART: [update-reset] Copying MAN_2 To MAN_1
8,076,877 UART: [update-reset Success] --
8,078,008 UART: [state] Locking Datavault
8,078,758 UART: [state] Locking PCR0, PCR1 and PCR31
8,079,362 UART: [state] Locking ICCM
8,079,936 UART: [exit] Launching FMC @ 0x40000130
8,085,265 UART:
8,085,281 UART: Running Caliptra FMC ...
8,085,689 UART:
8,085,743 UART: [state] CFI Enabled
8,174,856 UART: [art] Extend RT PCRs Done
8,175,284 UART: [art] Lock RT PCRs Done
8,176,697 UART: [art] Populate DV Done
8,184,716 UART: [fht] FMC Alias Private Key: 7
8,185,686 UART: [art] Derive CDI
8,185,966 UART: [art] Store in in slot 0x4
8,271,673 UART: [art] Derive Key Pair
8,272,033 UART: [art] Store priv key in slot 0x5
8,285,273 UART: [art] Derive Key Pair - Done
8,299,654 UART: [art] Signing Cert with AUTHO
8,300,134 UART: RITY.KEYID = 7
8,314,982 UART: [art] Erasing AUTHORITY.KEYID = 7
8,315,747 UART: [art] PUB.X = 03AF4E8F12B5691153C03A28E5C71E7990B6369069AB857811BE340140AD8B654B2DC710B4C747D8727EA078044E7B9C
8,322,504 UART: [art] PUB.Y = 3CC5ABEF613C30564EA2ED844525E02578EE88DAD550CDF80FECEF7D001F6004AD7D51117764A82B4F4F527F2457DDA1
8,329,440 UART: [art] SIG.R = 4F0F476200B3347CEBCC4C0BD98EF06CBFF41A8AB222ED0DED6D36A2258737F32591461BFAB5F5608D094F7993D5CE39
8,336,190 UART: [art] SIG.S = C21900A8D2D3267BF206A5CE84DF30027C94DDEF5F29D447D7285F0A2FEB25F7030B1E5B31906415B8B079ABE60FE1A1
8,360,491 UART: mbox::rt_entry...
8,360,863 UART: ____ _ _ _ ____ _____
8,361,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,363,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,363,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,751 UART: |_|
8,365,063 UART:
8,645,501 UART: [rt] Runtime listening for mailbox commands...
8,646,719 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 ready_for_fw is high
1,060,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,939 >>> mbox cmd response: success
2,687,989 UART:
2,688,005 UART: Running Caliptra FMC ...
2,688,413 UART:
2,688,467 UART: [state] CFI Enabled
2,698,702 UART: [fht] FMC Alias Private Key: 7
2,806,477 UART: [art] Extend RT PCRs Done
2,806,905 UART: [art] Lock RT PCRs Done
2,808,413 UART: [art] Populate DV Done
2,816,792 UART: [fht] FMC Alias Private Key: 7
2,817,794 UART: [art] Derive CDI
2,818,074 UART: [art] Store in in slot 0x4
2,903,127 UART: [art] Derive Key Pair
2,903,487 UART: [art] Store priv key in slot 0x5
2,916,311 UART: [art] Derive Key Pair - Done
2,931,177 UART: [art] Signing Cert with AUTHO
2,931,657 UART: RITY.KEYID = 7
2,946,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,748 UART: [art] PUB.X = F6903BD2AA9C53438E5E6F5AC53025051F923462067618A9A98D381C2F60317BB3ADBDF34715741C799344B862DE4079
2,954,506 UART: [art] PUB.Y = C232325EB78EE42D59B0663E8DAF32B6B821EF316167D7E2BECC0D35D882FF37ED1F50D55B433064A557FE5D796EFFF8
2,961,467 UART: [art] SIG.R = 112992D31DD2DCB0D869B4C863A99EA64734661CF8DE97BB35A259F09CAEBF9D9D1D17D648EBAA2E531A192AAD60FD45
2,968,255 UART: [art] SIG.S = 4136C0BB03B2DEC43D79FED2C03D4FE2F78E8C36B4A841B118304870F18747F1B16F27650E76E202344F3DAABE5B6B1B
2,992,577 UART: Caliptra RT
2,992,831 UART: [state] CFI Enabled
3,100,505 UART: [rt] RT listening for mailbox commands...
3,101,175 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,834 UART: [rt]cmd =0x54514754, len=24
3,132,877 >>> mbox cmd response data (8 bytes)
3,132,878 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,108,646 >>> mbox cmd response: success
5,108,646 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,121,638 UART:
5,121,654 UART: Running Caliptra FMC ...
5,122,062 UART:
5,122,116 UART: [state] CFI Enabled
5,210,783 UART: [art] Extend RT PCRs Done
5,211,211 UART: [art] Lock RT PCRs Done
5,212,584 UART: [art] Populate DV Done
5,220,733 UART: [fht] FMC Alias Private Key: 7
5,221,909 UART: [art] Derive CDI
5,222,189 UART: [art] Store in in slot 0x4
5,307,870 UART: [art] Derive Key Pair
5,308,230 UART: [art] Store priv key in slot 0x5
5,321,752 UART: [art] Derive Key Pair - Done
5,336,946 UART: [art] Signing Cert with AUTHO
5,337,426 UART: RITY.KEYID = 7
5,352,488 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,253 UART: [art] PUB.X = 4251CCBDAA57A29FC54D99B21CEFA0CFEC970982A3C526E085AB0A6F154051407E48575E8FDAED5DFA67C0881226C2E3
5,360,033 UART: [art] PUB.Y = DA5DEBD582C3921263B423EB6720F62209F268CAB06F1B5E6FBC48CC57A0430D8622641323912479DC46AAC81D29AF60
5,366,981 UART: [art] SIG.R = 672BD7FC9B645C9850F2634CDE57E417CD88B70E3409DD6057A21BC3B80401E1375DCEDDB28EFE5E2988EBA522C4FC5C
5,373,755 UART: [art] SIG.S = 9DA37E40DB4A67FB451D3F000959B88D50630D94E411665F83DEC7CEEF8D532D38A3D923198937D4959FC0BF47D0FB4C
5,397,390 UART: mbox::rt_entry...
5,397,762 UART: ____ _ _ _ ____ _____
5,398,546 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,399,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,400,882 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,401,650 UART: |_|
5,401,962 UART:
5,686,224 UART: [rt] Runtime listening for mailbox commands...
5,687,442 >>> mbox cmd response data (120 bytes)
5,687,443 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,662,980 >>> mbox cmd response: success
7,662,980 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,676,594 UART:
7,676,610 UART: Running Caliptra FMC ...
7,677,018 UART:
7,677,072 UART: [state] CFI Enabled
7,765,903 UART: [art] Extend RT PCRs Done
7,766,331 UART: [art] Lock RT PCRs Done
7,767,520 UART: [art] Populate DV Done
7,775,727 UART: [fht] FMC Alias Private Key: 7
7,776,837 UART: [art] Derive CDI
7,777,117 UART: [art] Store in in slot 0x4
7,862,824 UART: [art] Derive Key Pair
7,863,184 UART: [art] Store priv key in slot 0x5
7,876,238 UART: [art] Derive Key Pair - Done
7,891,322 UART: [art] Signing Cert with AUTHO
7,891,802 UART: RITY.KEYID = 7
7,907,024 UART: [art] Erasing AUTHORITY.KEYID = 7
7,907,789 UART: [art] PUB.X = 4E65550A68E396B1F1FED4CD1415227C84B32074C804D3A94527555256E97F67ABCB329AF223F55C6692026739E5D82B
7,914,544 UART: [art] PUB.Y = 842B76ADCF792ACD0A5CA95E96594CB8C2359F2EAB1DD355A96F8C51DC976E15A47C003E99CC37464690EDEA97A83D10
7,921,483 UART: [art] SIG.R = 0E970EBC122C25313581991026C48C44567BADC572BCA9DD5EBEB41AE4FE26914C4D87239A8F419FC00D874ED2C232DD
7,928,254 UART: [art] SIG.S = B292735D9FA09813E7808F3688B158EBC6AEBF8D526B891243E192FD06E9B7FB710696CFB5A894C4F95331984D4EF67C
7,952,343 UART: mbox::rt_entry...
7,952,715 UART: ____ _ _ _ ____ _____
7,953,499 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,954,299 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,955,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,955,835 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,956,603 UART: |_|
7,956,915 UART:
8,237,879 UART: [rt] Runtime listening for mailbox commands...
8,239,097 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
893,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,094 UART: [kat] ++
898,246 UART: [kat] sha1
902,532 UART: [kat] SHA2-256
904,472 UART: [kat] SHA2-384
907,337 UART: [kat] SHA2-512-ACC
909,238 UART: [kat] ECC-384
918,933 UART: [kat] HMAC-384Kdf
923,681 UART: [kat] LMS
1,172,009 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,173,112 UART: [fht] FHT @ 0x50003400
1,175,709 UART: [idev] ++
1,175,877 UART: [idev] CDI.KEYID = 6
1,176,237 UART: [idev] SUBJECT.KEYID = 7
1,176,661 UART: [idev] UDS.KEYID = 0
1,177,006 ready_for_fw is high
1,177,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,665 UART: [idev] Erasing UDS.KEYID = 0
1,201,816 UART: [idev] Sha1 KeyId Algorithm
1,210,044 UART: [idev] --
1,211,080 UART: [ldev] ++
1,211,248 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,037 UART: [ldev] AUTHORITY.KEYID = 7
1,212,500 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,243,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,268 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,103 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,307 >>> mbox cmd response: success
2,774,375 UART: [afmc] ++
2,774,543 UART: [afmc] CDI.KEYID = 6
2,774,905 UART: [afmc] SUBJECT.KEYID = 7
2,775,330 UART: [afmc] AUTHORITY.KEYID = 5
2,811,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,790 UART: [afmc] --
2,854,768 UART: [cold-reset] --
2,855,514 UART: [state] Locking Datavault
2,856,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,167 UART: [state] Locking ICCM
2,857,685 UART: [exit] Launching FMC @ 0x40000130
2,863,014 UART:
2,863,030 UART: Running Caliptra FMC ...
2,863,438 UART:
2,863,581 UART: [state] CFI Enabled
2,874,200 UART: [fht] FMC Alias Private Key: 7
2,981,725 UART: [art] Extend RT PCRs Done
2,982,153 UART: [art] Lock RT PCRs Done
2,983,613 UART: [art] Populate DV Done
2,991,626 UART: [fht] FMC Alias Private Key: 7
2,992,724 UART: [art] Derive CDI
2,993,004 UART: [art] Store in in slot 0x4
3,078,597 UART: [art] Derive Key Pair
3,078,957 UART: [art] Store priv key in slot 0x5
3,092,329 UART: [art] Derive Key Pair - Done
3,107,042 UART: [art] Signing Cert with AUTHO
3,107,522 UART: RITY.KEYID = 7
3,122,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,613 UART: [art] PUB.X = FCA54DD6B7CF236F1E43DEBB50A89776376206293026213DD977F5DA104D051F378264D9D6BD1C1C72263858584A23A2
3,130,375 UART: [art] PUB.Y = EBC75BFE9FE1A37F9CD65D928432F1184EDCB36BBDB6701EE160DCA9A8D487952D19C45C1E29684BED678E1241D033B3
3,137,341 UART: [art] SIG.R = 834B793DC64F79DD0BA30FC856855000FA72C89E0A6D4F3027B5C883EF3030BEDA046607E272889640CADA6DE8C0C6C1
3,144,082 UART: [art] SIG.S = 1B8F9CD2E5E40152164601BED2E8F0E00FEA81B394A65602444BDC7A7FDCA435F35C00A05E5EA6553FB52B3FD8CDE545
3,167,573 UART: Caliptra RT
3,167,919 UART: [state] CFI Enabled
3,276,215 UART: [rt] RT listening for mailbox commands...
3,276,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,342 UART: [rt]cmd =0x54514754, len=24
3,308,515 >>> mbox cmd response data (8 bytes)
3,308,516 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,148 UART:
3,309,164 UART: Running Caliptra ROM ...
3,309,572 UART:
3,309,714 UART: [state] CFI Enabled
3,312,598 UART: [state] LifecycleState = Unprovisioned
3,313,253 UART: [state] DebugLocked = No
3,313,941 UART: [state] WD Timer not started. Device not locked for debugging
3,315,273 UART: [kat] SHA2-256
4,120,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,048 UART: [kat] ++
4,125,200 UART: [kat] sha1
4,129,218 UART: [kat] SHA2-256
4,131,158 UART: [kat] SHA2-384
4,133,989 UART: [kat] SHA2-512-ACC
4,135,889 UART: [kat] ECC-384
4,146,000 UART: [kat] HMAC-384Kdf
4,150,468 UART: [kat] LMS
4,398,796 UART: [kat] --
4,399,450 UART: [update-reset] ++
5,301,695 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,840 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,114 >>> mbox cmd response: success
5,399,114 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,399,463 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,477 UART: [update-reset Success] --
5,408,262 UART: [state] Locking Datavault
5,409,038 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,642 UART: [state] Locking ICCM
5,410,154 UART: [exit] Launching FMC @ 0x40000130
5,415,483 UART:
5,415,499 UART: Running Caliptra FMC ...
5,415,907 UART:
5,416,050 UART: [state] CFI Enabled
5,505,185 UART: [art] Extend RT PCRs Done
5,505,613 UART: [art] Lock RT PCRs Done
5,506,786 UART: [art] Populate DV Done
5,514,757 UART: [fht] FMC Alias Private Key: 7
5,515,809 UART: [art] Derive CDI
5,516,089 UART: [art] Store in in slot 0x4
5,601,718 UART: [art] Derive Key Pair
5,602,078 UART: [art] Store priv key in slot 0x5
5,615,586 UART: [art] Derive Key Pair - Done
5,630,502 UART: [art] Signing Cert with AUTHO
5,630,982 UART: RITY.KEYID = 7
5,646,102 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,867 UART: [art] PUB.X = 53A9BAC380F6B2C75A3CC73A0F931273733CA11A56C2529320E3E0C7ACFD9623E93C6F3B2606C22217554B0309285FF1
5,653,625 UART: [art] PUB.Y = F791CD0ECA88E5D615FA041209B25E365B3D6D5E5B9066D223C6286AF320BD52DE4203BC7CB9595A4FF7A213341D5361
5,660,569 UART: [art] SIG.R = 81DE7774E80D9104EF8BA8EE2029366DC9AF86CE4865F8AFA63A54B42D96C6F0229F3DEB52A4327BF197D1C63B7AEEF7
5,667,349 UART: [art] SIG.S = 7B71E5D664A6C2788D697D8F98CB9D15112837D328C25AD6046ADC0E8F75E0FE31EA9F84DBFE35D0BBE89D73BA4BE4DE
5,690,854 UART: mbox::rt_entry...
5,691,226 UART: ____ _ _ _ ____ _____
5,692,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,578 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,346 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,114 UART: |_|
5,695,426 UART:
5,975,702 UART: [rt] Runtime listening for mailbox commands...
5,976,920 >>> mbox cmd response data (120 bytes)
5,976,921 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,977,032 UART:
5,977,048 UART: Running Caliptra ROM ...
5,977,456 UART:
5,977,598 UART: [state] CFI Enabled
5,980,766 UART: [state] LifecycleState = Unprovisioned
5,981,421 UART: [state] DebugLocked = No
5,981,949 UART: [state] WD Timer not started. Device not locked for debugging
5,983,123 UART: [kat] SHA2-256
6,788,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,792,898 UART: [kat] ++
6,793,050 UART: [kat] sha1
6,797,470 UART: [kat] SHA2-256
6,799,410 UART: [kat] SHA2-384
6,802,305 UART: [kat] SHA2-512-ACC
6,804,205 UART: [kat] ECC-384
6,813,856 UART: [kat] HMAC-384Kdf
6,818,596 UART: [kat] LMS
7,066,924 UART: [kat] --
7,067,800 UART: [update-reset] ++
7,971,895 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,973,046 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,069,320 >>> mbox cmd response: success
8,069,320 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,069,647 UART: [update-reset] Copying MAN_2 To MAN_1
8,077,661 UART: [update-reset Success] --
8,078,512 UART: [state] Locking Datavault
8,079,358 UART: [state] Locking PCR0, PCR1 and PCR31
8,079,962 UART: [state] Locking ICCM
8,080,490 UART: [exit] Launching FMC @ 0x40000130
8,085,819 UART:
8,085,835 UART: Running Caliptra FMC ...
8,086,243 UART:
8,086,386 UART: [state] CFI Enabled
8,175,449 UART: [art] Extend RT PCRs Done
8,175,877 UART: [art] Lock RT PCRs Done
8,177,140 UART: [art] Populate DV Done
8,185,377 UART: [fht] FMC Alias Private Key: 7
8,186,321 UART: [art] Derive CDI
8,186,601 UART: [art] Store in in slot 0x4
8,272,258 UART: [art] Derive Key Pair
8,272,618 UART: [art] Store priv key in slot 0x5
8,286,636 UART: [art] Derive Key Pair - Done
8,301,983 UART: [art] Signing Cert with AUTHO
8,302,463 UART: RITY.KEYID = 7
8,317,827 UART: [art] Erasing AUTHORITY.KEYID = 7
8,318,592 UART: [art] PUB.X = 728E8D0089E80AE086A6BA300AA0A57E2A6B906BD51C622AB2D0097EB510768BB847262D05A8BFC0BA8F1593B1703767
8,325,332 UART: [art] PUB.Y = 4762015266672C0213D14DE56EA33244190FC151F444EB6B6812953C3C6E6DE1C6A0167B04187C26AA4999F15A60CA18
8,332,262 UART: [art] SIG.R = 92E56BC3981791C96CE5F52D52C447277064CDFE43CFB8BB8C160DB81C62CFA3C730EEBFF94FDA3F4DE707BC6D85D046
8,339,046 UART: [art] SIG.S = 09FFD72161ECFF7B9D95622B14C4AE7ED764957CB260DC3153C2B5F29F373434F923BC273C3243EA1B5BD094804C5201
8,363,011 UART: mbox::rt_entry...
8,363,383 UART: ____ _ _ _ ____ _____
8,364,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,364,967 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,365,735 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,366,503 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,367,271 UART: |_|
8,367,583 UART:
8,646,983 UART: [rt] Runtime listening for mailbox commands...
8,648,201 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,130 ready_for_fw is high
1,061,130 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,724 >>> mbox cmd response: success
2,690,420 UART:
2,690,436 UART: Running Caliptra FMC ...
2,690,844 UART:
2,690,987 UART: [state] CFI Enabled
2,701,414 UART: [fht] FMC Alias Private Key: 7
2,809,845 UART: [art] Extend RT PCRs Done
2,810,273 UART: [art] Lock RT PCRs Done
2,811,763 UART: [art] Populate DV Done
2,819,930 UART: [fht] FMC Alias Private Key: 7
2,821,068 UART: [art] Derive CDI
2,821,348 UART: [art] Store in in slot 0x4
2,907,613 UART: [art] Derive Key Pair
2,907,973 UART: [art] Store priv key in slot 0x5
2,921,431 UART: [art] Derive Key Pair - Done
2,936,587 UART: [art] Signing Cert with AUTHO
2,937,067 UART: RITY.KEYID = 7
2,952,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,102 UART: [art] PUB.X = 9D31A87CDA80DDDEFF5C22C661419916E5047A8EE1AF0698B20B742FAA067644C552E7857EEA995B716AF9489C41F7B5
2,959,868 UART: [art] PUB.Y = F30B6277F77819300C505271D4CB09666599F2B8E744E9BD64450D533A8740AA724D0C763CB43EF52690866BF4B6E3B5
2,966,797 UART: [art] SIG.R = 02CF9E0E639686EBE0E9E56DBF2BC716A43C5877383CEFD64A309C8E0AC0DBA39CA479ED9AA6B7E69A571D4AF15E2628
2,973,578 UART: [art] SIG.S = EA106F34561477DB8FA3F9710CC00993B79CEFFD70B5D8CBEAC8E1D312C2BAAF54A851176EB234A7D90075CC0A5B7E88
2,997,448 UART: Caliptra RT
2,997,794 UART: [state] CFI Enabled
3,105,866 UART: [rt] RT listening for mailbox commands...
3,106,536 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,137 UART: [rt]cmd =0x54514754, len=24
3,138,144 >>> mbox cmd response data (8 bytes)
3,138,145 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,114,298 >>> mbox cmd response: success
5,114,298 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,127,262 UART:
5,127,278 UART: Running Caliptra FMC ...
5,127,686 UART:
5,127,829 UART: [state] CFI Enabled
5,217,506 UART: [art] Extend RT PCRs Done
5,217,934 UART: [art] Lock RT PCRs Done
5,219,419 UART: [art] Populate DV Done
5,227,680 UART: [fht] FMC Alias Private Key: 7
5,228,722 UART: [art] Derive CDI
5,229,002 UART: [art] Store in in slot 0x4
5,314,675 UART: [art] Derive Key Pair
5,315,035 UART: [art] Store priv key in slot 0x5
5,328,679 UART: [art] Derive Key Pair - Done
5,343,519 UART: [art] Signing Cert with AUTHO
5,343,999 UART: RITY.KEYID = 7
5,359,023 UART: [art] Erasing AUTHORITY.KEYID = 7
5,359,788 UART: [art] PUB.X = 293F3F76F12693926E95C8B2A6827460907815D87040E9105C4FF64E00821ACDDEA76BA3A3553E9F134E6D956EFE3CE3
5,366,536 UART: [art] PUB.Y = 80BD6246C4EF73813768ACE82DEDFE1451EA7D8EC802ED4660B214961CEFAEA68F99E4F6600BDAA964940C1BDD8D3634
5,373,493 UART: [art] SIG.R = 2E1C920A8EBF9FC45172794BC4E5D3C55780589C8C2BD182ED1EC2AC1F8C166828076D6A7BD8E4906A05EB0955AE08D6
5,380,258 UART: [art] SIG.S = D1D019A459C83A3907A2E694B024D8CBDEA6C8C82BD34BBE8319B2903C2327DFC42BB1FE6343A13EED4989BCBDCBF77F
5,404,100 UART: mbox::rt_entry...
5,404,472 UART: ____ _ _ _ ____ _____
5,405,256 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,406,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,406,824 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,407,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,408,360 UART: |_|
5,408,672 UART:
5,690,054 UART: [rt] Runtime listening for mailbox commands...
5,691,272 >>> mbox cmd response data (120 bytes)
5,691,273 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,664,943 >>> mbox cmd response: success
7,664,943 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,678,511 UART:
7,678,527 UART: Running Caliptra FMC ...
7,678,935 UART:
7,679,078 UART: [state] CFI Enabled
7,768,169 UART: [art] Extend RT PCRs Done
7,768,597 UART: [art] Lock RT PCRs Done
7,769,904 UART: [art] Populate DV Done
7,778,319 UART: [fht] FMC Alias Private Key: 7
7,779,381 UART: [art] Derive CDI
7,779,661 UART: [art] Store in in slot 0x4
7,865,256 UART: [art] Derive Key Pair
7,865,616 UART: [art] Store priv key in slot 0x5
7,878,500 UART: [art] Derive Key Pair - Done
7,892,857 UART: [art] Signing Cert with AUTHO
7,893,337 UART: RITY.KEYID = 7
7,908,715 UART: [art] Erasing AUTHORITY.KEYID = 7
7,909,480 UART: [art] PUB.X = 64376D2B8AEB9D3A133695F03DD60CB98738FDB9429D3C5F538CC79C4B29A68429649FA0372E4AC6EC36C1A1AEDEDBA7
7,916,263 UART: [art] PUB.Y = 3755F003EC5229C4086536B9BEE375D9E509918E4105B025F6915C847A25BE4DDE96FD9B2FD2B38C36408C2DAEE611BC
7,923,207 UART: [art] SIG.R = FE66FDA85A197491219F7624DC68E683B7ECFC04C6C1207A602CF1B1563C4FBC9EDDC264AA83F59FD066E027D3E8B97B
7,929,990 UART: [art] SIG.S = 71510A56247011CE715066B847C799871287AE9377B4E5A30706C3E251445B77BCDEE3F6A91531D3C646500567A28991
7,954,139 UART: mbox::rt_entry...
7,954,511 UART: ____ _ _ _ ____ _____
7,955,295 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,956,095 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,956,863 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,957,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,958,399 UART: |_|
7,958,711 UART:
8,237,279 UART: [rt] Runtime listening for mailbox commands...
8,238,497 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
916,872 UART: [kat] HMAC-384Kdf
921,372 UART: [kat] LMS
1,169,684 UART: [kat] --
1,170,693 UART: [cold-reset] ++
1,171,151 UART: [fht] FHT @ 0x50003400
1,173,755 UART: [idev] ++
1,173,923 UART: [idev] CDI.KEYID = 6
1,174,284 UART: [idev] SUBJECT.KEYID = 7
1,174,709 UART: [idev] UDS.KEYID = 0
1,175,055 ready_for_fw is high
1,175,055 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,515 UART: [idev] Erasing UDS.KEYID = 0
1,199,921 UART: [idev] Sha1 KeyId Algorithm
1,208,933 UART: [idev] --
1,209,848 UART: [ldev] ++
1,210,016 UART: [ldev] CDI.KEYID = 6
1,210,380 UART: [ldev] SUBJECT.KEYID = 5
1,210,807 UART: [ldev] AUTHORITY.KEYID = 7
1,211,270 UART: [ldev] FE.KEYID = 1
1,216,476 UART: [ldev] Erasing FE.KEYID = 1
1,242,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,250 UART: [ldev] --
1,282,768 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,526 >>> mbox cmd response: success
2,774,763 UART: [afmc] ++
2,774,931 UART: [afmc] CDI.KEYID = 6
2,775,294 UART: [afmc] SUBJECT.KEYID = 7
2,775,720 UART: [afmc] AUTHORITY.KEYID = 5
2,811,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,800 UART: [afmc] --
2,854,880 UART: [cold-reset] --
2,855,728 UART: [state] Locking Datavault
2,856,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,355 UART: [state] Locking ICCM
2,857,869 UART: [exit] Launching FMC @ 0x40000130
2,863,198 UART:
2,863,214 UART: Running Caliptra FMC ...
2,863,622 UART:
2,863,676 UART: [state] CFI Enabled
2,874,335 UART: [fht] FMC Alias Private Key: 7
2,982,798 UART: [art] Extend RT PCRs Done
2,983,226 UART: [art] Lock RT PCRs Done
2,984,848 UART: [art] Populate DV Done
2,993,019 UART: [fht] FMC Alias Private Key: 7
2,993,963 UART: [art] Derive CDI
2,994,243 UART: [art] Store in in slot 0x4
3,079,940 UART: [art] Derive Key Pair
3,080,300 UART: [art] Store priv key in slot 0x5
3,093,370 UART: [art] Derive Key Pair - Done
3,108,234 UART: [art] Signing Cert with AUTHO
3,108,714 UART: RITY.KEYID = 7
3,124,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,873 UART: [art] PUB.X = F56521CB4E4C9ACECFECEBFF930F06984366450999369FA363D191BC16D5DF3D01628FFF0916AF90E926BFF6A205BFD4
3,131,641 UART: [art] PUB.Y = 2218FFB53AE0BB5365E0C24D679BB539743479F4C7E9A980C7196F5F249D6293297BDB1D174949321F6206389A167D07
3,138,577 UART: [art] SIG.R = 4C391E859F9439DFA12869827A2D9749B038798C16849EA03DA22CFFA2D8F878B79C6F64F99FC9583D193F6432BF6F3F
3,145,349 UART: [art] SIG.S = 1135F7963D1462378AF502EB8A5FAE8A23FE9FF101C945B7E637D2AC8EBCD717A2446E4B0B93E0B8077889A3A12C3E0B
3,169,377 UART: Caliptra RT
3,169,631 UART: [state] CFI Enabled
3,278,239 UART: [rt] RT listening for mailbox commands...
3,278,909 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,574 UART: [rt]cmd =0x54514754, len=24
3,310,569 >>> mbox cmd response data (8 bytes)
3,310,570 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,310 UART:
3,311,326 UART: Running Caliptra ROM ...
3,311,734 UART:
3,311,789 UART: [state] CFI Enabled
3,314,357 UART: [state] LifecycleState = Unprovisioned
3,315,012 UART: [state] DebugLocked = No
3,315,700 UART: [state] WD Timer not started. Device not locked for debugging
3,316,828 UART: [kat] SHA2-256
4,120,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,124,507 UART: [kat] ++
4,124,659 UART: [kat] sha1
4,128,827 UART: [kat] SHA2-256
4,130,767 UART: [kat] SHA2-384
4,133,622 UART: [kat] SHA2-512-ACC
4,135,522 UART: [kat] ECC-384
4,145,187 UART: [kat] HMAC-384Kdf
4,149,787 UART: [kat] LMS
4,398,099 UART: [kat] --
4,398,883 UART: [update-reset] ++
5,301,937 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,998 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,272 >>> mbox cmd response: success
5,399,272 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,399,451 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,465 UART: [update-reset Success] --
5,408,658 UART: [state] Locking Datavault
5,409,584 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,188 UART: [state] Locking ICCM
5,410,816 UART: [exit] Launching FMC @ 0x40000130
5,416,145 UART:
5,416,161 UART: Running Caliptra FMC ...
5,416,569 UART:
5,416,623 UART: [state] CFI Enabled
5,505,626 UART: [art] Extend RT PCRs Done
5,506,054 UART: [art] Lock RT PCRs Done
5,507,509 UART: [art] Populate DV Done
5,515,828 UART: [fht] FMC Alias Private Key: 7
5,516,998 UART: [art] Derive CDI
5,517,278 UART: [art] Store in in slot 0x4
5,602,805 UART: [art] Derive Key Pair
5,603,165 UART: [art] Store priv key in slot 0x5
5,616,429 UART: [art] Derive Key Pair - Done
5,631,076 UART: [art] Signing Cert with AUTHO
5,631,556 UART: RITY.KEYID = 7
5,646,164 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,929 UART: [art] PUB.X = 3E49904B1A745DAE2E876A2B424CBA8A0B0315B8C4CF3647209D884FB86F44545EFECB1C5631B520F9C8F126B1A34FBF
5,653,705 UART: [art] PUB.Y = 9E3F5F3CD3BDD9C94034EE2AA0CB00D98AE573994CB216AA3BF439765D1570E072632F59FBF495934808762DDCA92F12
5,660,638 UART: [art] SIG.R = ACF437224A2C22706C8ABA4FE4153223D596A30A753D17F0B088F0056D06DF45BBEFD87FB2489F57473D132E35796751
5,667,399 UART: [art] SIG.S = 140D8AD59AFC992E6F96DBCDB3ABD6C34C74B0E348011031019FE6F9C04C57965DABE3A0C98B5F38082021EF70047095
5,691,243 UART: mbox::rt_entry...
5,691,615 UART: ____ _ _ _ ____ _____
5,692,399 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,199 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,967 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,735 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,503 UART: |_|
5,695,815 UART:
5,978,815 UART: [rt] Runtime listening for mailbox commands...
5,980,033 >>> mbox cmd response data (120 bytes)
5,980,034 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,980,145 UART:
5,980,161 UART: Running Caliptra ROM ...
5,980,569 UART:
5,980,624 UART: [state] CFI Enabled
5,983,192 UART: [state] LifecycleState = Unprovisioned
5,983,847 UART: [state] DebugLocked = No
5,984,359 UART: [state] WD Timer not started. Device not locked for debugging
5,985,465 UART: [kat] SHA2-256
6,789,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,793,144 UART: [kat] ++
6,793,296 UART: [kat] sha1
6,797,554 UART: [kat] SHA2-256
6,799,494 UART: [kat] SHA2-384
6,802,261 UART: [kat] SHA2-512-ACC
6,804,161 UART: [kat] ECC-384
6,813,704 UART: [kat] HMAC-384Kdf
6,818,358 UART: [kat] LMS
7,066,670 UART: [kat] --
7,067,678 UART: [update-reset] ++
7,970,006 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,971,081 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,067,355 >>> mbox cmd response: success
8,067,355 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,067,578 UART: [update-reset] Copying MAN_2 To MAN_1
8,075,592 UART: [update-reset Success] --
8,076,497 UART: [state] Locking Datavault
8,077,345 UART: [state] Locking PCR0, PCR1 and PCR31
8,077,949 UART: [state] Locking ICCM
8,078,377 UART: [exit] Launching FMC @ 0x40000130
8,083,706 UART:
8,083,722 UART: Running Caliptra FMC ...
8,084,130 UART:
8,084,184 UART: [state] CFI Enabled
8,172,867 UART: [art] Extend RT PCRs Done
8,173,295 UART: [art] Lock RT PCRs Done
8,174,516 UART: [art] Populate DV Done
8,182,557 UART: [fht] FMC Alias Private Key: 7
8,183,519 UART: [art] Derive CDI
8,183,799 UART: [art] Store in in slot 0x4
8,269,498 UART: [art] Derive Key Pair
8,269,858 UART: [art] Store priv key in slot 0x5
8,282,928 UART: [art] Derive Key Pair - Done
8,297,663 UART: [art] Signing Cert with AUTHO
8,298,143 UART: RITY.KEYID = 7
8,313,087 UART: [art] Erasing AUTHORITY.KEYID = 7
8,313,852 UART: [art] PUB.X = 662C030264E2793B276FE25F046409BC4A14210A9BA844EC824AB7B3AC6ED0667DD15CEB1C2811247B60EB26124BF078
8,320,609 UART: [art] PUB.Y = 49CFDCCDCD34C722B8F5EF1239C045C31A8D5A99E14BE58AF5186173B134723C1C255289D203FECAFB9B1E5AFC14B468
8,327,572 UART: [art] SIG.R = 2CBDF37B5FDEC019280791D5503A71EA6E195A99BC6D72EFC627AF43B7CF1439B2830CC404583A6F020757ED95F3A635
8,334,335 UART: [art] SIG.S = 7A2A51A1D913CBA72D0D5443824592789258595D46D52B66FA5B87D907F01E4BE6D5EAF79EE5E6D983B5610A54B1BF29
8,357,641 UART: mbox::rt_entry...
8,358,013 UART: ____ _ _ _ ____ _____
8,358,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,359,597 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,360,365 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,361,133 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,361,901 UART: |_|
8,362,213 UART:
8,642,231 UART: [rt] Runtime listening for mailbox commands...
8,643,449 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,240 ready_for_fw is high
1,056,240 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,680 >>> mbox cmd response: success
2,685,232 UART:
2,685,248 UART: Running Caliptra FMC ...
2,685,656 UART:
2,685,710 UART: [state] CFI Enabled
2,696,375 UART: [fht] FMC Alias Private Key: 7
2,804,642 UART: [art] Extend RT PCRs Done
2,805,070 UART: [art] Lock RT PCRs Done
2,806,596 UART: [art] Populate DV Done
2,814,761 UART: [fht] FMC Alias Private Key: 7
2,815,799 UART: [art] Derive CDI
2,816,079 UART: [art] Store in in slot 0x4
2,901,926 UART: [art] Derive Key Pair
2,902,286 UART: [art] Store priv key in slot 0x5
2,915,846 UART: [art] Derive Key Pair - Done
2,930,361 UART: [art] Signing Cert with AUTHO
2,930,841 UART: RITY.KEYID = 7
2,946,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,814 UART: [art] PUB.X = 9DA2FEA8391F53AED6D543A7CDEA3DC9C61AF6A4779EAD8396AA690A5E667C14B062C2E45422EB7F3C20B1B46DB98751
2,953,599 UART: [art] PUB.Y = A1E691D25B9F6DF67D2E3FB9620D104EE505E81C431C75CB93DA3749E72919E3A8718B9D575A3926FBF241E78319B040
2,960,545 UART: [art] SIG.R = 882CEB4DEEB5EA94C29266A117FCD788D8780FE0008CE079E97740B3293C6BA0DE956E44E8508429063C19BEEDF754EE
2,967,297 UART: [art] SIG.S = 9FA69B9B73633E1FFAC66E8BFC7E8DF073211377F648A1FCDD89884C27B5A79CAC4507BB52673CF25AAD6056F1C13B5E
2,991,403 UART: Caliptra RT
2,991,657 UART: [state] CFI Enabled
3,099,438 UART: [rt] RT listening for mailbox commands...
3,100,108 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,627 UART: [rt]cmd =0x54514754, len=24
3,131,700 >>> mbox cmd response data (8 bytes)
3,131,701 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,101,680 >>> mbox cmd response: success
5,101,680 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,114,964 UART:
5,114,980 UART: Running Caliptra FMC ...
5,115,388 UART:
5,115,442 UART: [state] CFI Enabled
5,204,629 UART: [art] Extend RT PCRs Done
5,205,057 UART: [art] Lock RT PCRs Done
5,206,204 UART: [art] Populate DV Done
5,214,571 UART: [fht] FMC Alias Private Key: 7
5,215,499 UART: [art] Derive CDI
5,215,779 UART: [art] Store in in slot 0x4
5,301,246 UART: [art] Derive Key Pair
5,301,606 UART: [art] Store priv key in slot 0x5
5,314,982 UART: [art] Derive Key Pair - Done
5,329,554 UART: [art] Signing Cert with AUTHO
5,330,034 UART: RITY.KEYID = 7
5,345,062 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,827 UART: [art] PUB.X = 3491B998626B37DB5D6BA60B6348E5B0F60C0EA21800D085C39B521464009065D8F0A8D2705849ED47B925F051DAA73D
5,352,540 UART: [art] PUB.Y = F107BDAB79D7568E1620D06EF83582C5330A3D92B5F0F82054882EA0272FEC0DCA9CACA5DA7BE5C410160B2E65C2F8D4
5,359,492 UART: [art] SIG.R = DEF1AB10D282AB6FEDDEA0DED3DAC0E3C9B57BA9020EA234EB1C8D2CA59A71EACD993D9DAE777B26B07EE3DDF7E32FE8
5,366,298 UART: [art] SIG.S = D7EF1387E74FA5285EDCF6D9374A6F382A831116DA244E9DB57D468CADF4BD3AF30545AB37CECEE21F1819367BE2DB35
5,390,250 UART: mbox::rt_entry...
5,390,622 UART: ____ _ _ _ ____ _____
5,391,406 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,206 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,392,974 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,393,742 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,510 UART: |_|
5,394,822 UART:
5,676,761 UART: [rt] Runtime listening for mailbox commands...
5,677,979 >>> mbox cmd response data (120 bytes)
5,677,980 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,648,576 >>> mbox cmd response: success
7,648,576 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,661,952 UART:
7,661,968 UART: Running Caliptra FMC ...
7,662,376 UART:
7,662,430 UART: [state] CFI Enabled
7,751,335 UART: [art] Extend RT PCRs Done
7,751,763 UART: [art] Lock RT PCRs Done
7,753,040 UART: [art] Populate DV Done
7,761,309 UART: [fht] FMC Alias Private Key: 7
7,762,441 UART: [art] Derive CDI
7,762,721 UART: [art] Store in in slot 0x4
7,848,928 UART: [art] Derive Key Pair
7,849,288 UART: [art] Store priv key in slot 0x5
7,862,706 UART: [art] Derive Key Pair - Done
7,877,293 UART: [art] Signing Cert with AUTHO
7,877,773 UART: RITY.KEYID = 7
7,893,005 UART: [art] Erasing AUTHORITY.KEYID = 7
7,893,770 UART: [art] PUB.X = 4C9629E2B9C9595F8ED471691D78D231463343D1832DED104EDB0D6A6B5674280E411958DE9C7EB158C55867DDE845F9
7,900,532 UART: [art] PUB.Y = 8A6F3B8C2237B3117A1723BC5EC72E4114366A75284C9A1B4DC6954FC30599932E82864D7D7DEC88BE78CB4608FB4D30
7,907,478 UART: [art] SIG.R = DA155536A83FFC339D384AAD6B2B6FA93E3F3620EBC43CC9A244E5410418351F390FDFAC2FA39C8E633234BCB3413174
7,914,252 UART: [art] SIG.S = 4ADFA454267A1C6FB7C32302FEE4B768D03715978079A93E96DEEFD543BAA601B4C8EACBA00E9F4712CACA7D58AD03CD
7,937,957 UART: mbox::rt_entry...
7,938,329 UART: ____ _ _ _ ____ _____
7,939,113 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,939,913 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,940,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,941,449 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,942,217 UART: |_|
7,942,529 UART:
8,225,475 UART: [rt] Runtime listening for mailbox commands...
8,226,693 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Unprovisioned
86,592 UART: [state] DebugLocked = No
87,300 UART: [state] WD Timer not started. Device not locked for debugging
88,503 UART: [kat] SHA2-256
892,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,182 UART: [kat] ++
896,334 UART: [kat] sha1
900,676 UART: [kat] SHA2-256
902,616 UART: [kat] SHA2-384
905,193 UART: [kat] SHA2-512-ACC
907,094 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,495 UART: [kat] LMS
1,169,807 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,150 UART: [fht] FHT @ 0x50003400
1,173,892 UART: [idev] ++
1,174,060 UART: [idev] CDI.KEYID = 6
1,174,421 UART: [idev] SUBJECT.KEYID = 7
1,174,846 UART: [idev] UDS.KEYID = 0
1,175,192 ready_for_fw is high
1,175,192 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,238 UART: [idev] Erasing UDS.KEYID = 0
1,200,846 UART: [idev] Sha1 KeyId Algorithm
1,209,600 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,233 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,415 UART: [ldev] Erasing FE.KEYID = 1
1,243,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,981 UART: [ldev] --
1,282,457 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,863 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,743 >>> mbox cmd response: success
2,774,894 UART: [afmc] ++
2,775,062 UART: [afmc] CDI.KEYID = 6
2,775,425 UART: [afmc] SUBJECT.KEYID = 7
2,775,851 UART: [afmc] AUTHORITY.KEYID = 5
2,811,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,615 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,334 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,203 UART: [afmc] --
2,855,279 UART: [cold-reset] --
2,856,251 UART: [state] Locking Datavault
2,857,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,982 UART: [state] Locking ICCM
2,858,580 UART: [exit] Launching FMC @ 0x40000130
2,863,909 UART:
2,863,925 UART: Running Caliptra FMC ...
2,864,333 UART:
2,864,476 UART: [state] CFI Enabled
2,875,007 UART: [fht] FMC Alias Private Key: 7
2,983,230 UART: [art] Extend RT PCRs Done
2,983,658 UART: [art] Lock RT PCRs Done
2,985,168 UART: [art] Populate DV Done
2,993,591 UART: [fht] FMC Alias Private Key: 7
2,994,615 UART: [art] Derive CDI
2,994,895 UART: [art] Store in in slot 0x4
3,080,650 UART: [art] Derive Key Pair
3,081,010 UART: [art] Store priv key in slot 0x5
3,094,428 UART: [art] Derive Key Pair - Done
3,109,149 UART: [art] Signing Cert with AUTHO
3,109,629 UART: RITY.KEYID = 7
3,125,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,014 UART: [art] PUB.X = 238953181D589CAD6BDC529B08D571A640D719770A7A07EE51E501494376DF74F1E14F7DC3925657ECD47A62E092BEA8
3,132,772 UART: [art] PUB.Y = E8A09B304A3D8F4A8835909218C953836CDAC285BDA5342904E5F485EFCFAF695C3C3F1C31D7794A58EBB15656C7F0C4
3,139,727 UART: [art] SIG.R = B91AF1967084D504EE2987A6A65C595781A50F0906F0F166D7F81366DAFC632168A60F20E0E191F57F17E99FA45BA933
3,146,480 UART: [art] SIG.S = CB6A96E2BEE16C30BD619D981A180AA561B16B73A17C955C8604FF33FD3080512D81AFB8381AF46CC8824935A7FC26EE
3,170,755 UART: Caliptra RT
3,171,101 UART: [state] CFI Enabled
3,278,538 UART: [rt] RT listening for mailbox commands...
3,279,208 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,865 UART: [rt]cmd =0x54514754, len=24
3,311,130 >>> mbox cmd response data (8 bytes)
3,311,131 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,069 UART:
3,312,085 UART: Running Caliptra ROM ...
3,312,493 UART:
3,312,635 UART: [state] CFI Enabled
3,315,337 UART: [state] LifecycleState = Unprovisioned
3,315,992 UART: [state] DebugLocked = No
3,316,534 UART: [state] WD Timer not started. Device not locked for debugging
3,317,772 UART: [kat] SHA2-256
4,121,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,125,451 UART: [kat] ++
4,125,603 UART: [kat] sha1
4,130,009 UART: [kat] SHA2-256
4,131,949 UART: [kat] SHA2-384
4,134,560 UART: [kat] SHA2-512-ACC
4,136,460 UART: [kat] ECC-384
4,145,847 UART: [kat] HMAC-384Kdf
4,150,575 UART: [kat] LMS
4,398,887 UART: [kat] --
4,399,879 UART: [update-reset] ++
5,302,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,544 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
5,399,818 >>> mbox cmd response: success
5,399,818 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,400,113 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,127 UART: [update-reset Success] --
5,409,170 UART: [state] Locking Datavault
5,409,930 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,534 UART: [state] Locking ICCM
5,410,998 UART: [exit] Launching FMC @ 0x40000130
5,416,327 UART:
5,416,343 UART: Running Caliptra FMC ...
5,416,751 UART:
5,416,894 UART: [state] CFI Enabled
5,506,271 UART: [art] Extend RT PCRs Done
5,506,699 UART: [art] Lock RT PCRs Done
5,508,076 UART: [art] Populate DV Done
5,516,493 UART: [fht] FMC Alias Private Key: 7
5,517,581 UART: [art] Derive CDI
5,517,861 UART: [art] Store in in slot 0x4
5,603,336 UART: [art] Derive Key Pair
5,603,696 UART: [art] Store priv key in slot 0x5
5,617,530 UART: [art] Derive Key Pair - Done
5,632,276 UART: [art] Signing Cert with AUTHO
5,632,756 UART: RITY.KEYID = 7
5,648,150 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,915 UART: [art] PUB.X = D2C177779E89B3AB05BDAB7105E26E1108A9B4576474DC6DCBA089DA986E65113ECAEA8F4B762F192EA2B3991329397E
5,655,684 UART: [art] PUB.Y = 6F7C4EC913627846CE8B8EF822173E831409924C2CFB9CF91E3A6F95328682F5FA906AAD23A255957FBD3E19A5FB8159
5,662,635 UART: [art] SIG.R = DB4C2C1EE88C4045592986EA1C46DEC8C4BADCA91DBC6259F318EB229E2672C0CB5B406D53FE45623D2A8220F1E76960
5,669,417 UART: [art] SIG.S = 3B8672EDB882D766A55D8723EEEB8FC96ECB92C9CFC1177A004DFB23247DE954167CF025F9E6643D8826973C83A59DE7
5,693,188 UART: mbox::rt_entry...
5,693,560 UART: ____ _ _ _ ____ _____
5,694,344 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,144 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,912 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,680 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,448 UART: |_|
5,697,760 UART:
5,978,342 UART: [rt] Runtime listening for mailbox commands...
5,979,560 >>> mbox cmd response data (120 bytes)
5,979,561 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
5,979,672 UART:
5,979,688 UART: Running Caliptra ROM ...
5,980,096 UART:
5,980,238 UART: [state] CFI Enabled
5,982,664 UART: [state] LifecycleState = Unprovisioned
5,983,319 UART: [state] DebugLocked = No
5,983,841 UART: [state] WD Timer not started. Device not locked for debugging
5,985,099 UART: [kat] SHA2-256
6,788,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,792,778 UART: [kat] ++
6,792,930 UART: [kat] sha1
6,797,268 UART: [kat] SHA2-256
6,799,208 UART: [kat] SHA2-384
6,801,895 UART: [kat] SHA2-512-ACC
6,803,795 UART: [kat] ECC-384
6,813,598 UART: [kat] HMAC-384Kdf
6,818,026 UART: [kat] LMS
7,066,338 UART: [kat] --
7,067,214 UART: [update-reset] ++
7,969,532 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,970,571 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53948
8,066,845 >>> mbox cmd response: success
8,066,845 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,066,986 UART: [update-reset] Copying MAN_2 To MAN_1
8,075,000 UART: [update-reset Success] --
8,076,225 UART: [state] Locking Datavault
8,077,009 UART: [state] Locking PCR0, PCR1 and PCR31
8,077,613 UART: [state] Locking ICCM
8,078,249 UART: [exit] Launching FMC @ 0x40000130
8,083,578 UART:
8,083,594 UART: Running Caliptra FMC ...
8,084,002 UART:
8,084,145 UART: [state] CFI Enabled
8,173,674 UART: [art] Extend RT PCRs Done
8,174,102 UART: [art] Lock RT PCRs Done
8,175,475 UART: [art] Populate DV Done
8,183,554 UART: [fht] FMC Alias Private Key: 7
8,184,700 UART: [art] Derive CDI
8,184,980 UART: [art] Store in in slot 0x4
8,270,685 UART: [art] Derive Key Pair
8,271,045 UART: [art] Store priv key in slot 0x5
8,283,891 UART: [art] Derive Key Pair - Done
8,298,787 UART: [art] Signing Cert with AUTHO
8,299,267 UART: RITY.KEYID = 7
8,314,751 UART: [art] Erasing AUTHORITY.KEYID = 7
8,315,516 UART: [art] PUB.X = 2AA11C08E9862E8F5152E113B3940C5303617FBF9E59CFEC3DE9F8116AA207CC847DAE67EA8D811E957DD4EBD1F61E22
8,322,288 UART: [art] PUB.Y = AEF54DB853CA32C0C33D685AFE2756388CE1F9B9937AEEB49CC853680497A03266FDFA4A01867481DBFE895AB6188E24
8,329,242 UART: [art] SIG.R = 537F79F0CEC8B96E03533A5995DAE565123817A2C4FB2EC2103846B04A53F2AE6598E86A61060445EB5E6FCF0DA5D8D6
8,336,006 UART: [art] SIG.S = 95C13208827A315300536D078D3D52AEEBB0C3C69C1A2024E236BF7E5769E30DFA717E1A1066062E8508DD30142C11D9
8,359,796 UART: mbox::rt_entry...
8,360,168 UART: ____ _ _ _ ____ _____
8,360,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,361,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,362,520 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,363,288 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,056 UART: |_|
8,364,368 UART:
8,644,334 UART: [rt] Runtime listening for mailbox commands...
8,645,552 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,893 ready_for_fw is high
1,056,893 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,357 >>> mbox cmd response: success
2,685,451 UART:
2,685,467 UART: Running Caliptra FMC ...
2,685,875 UART:
2,686,018 UART: [state] CFI Enabled
2,696,931 UART: [fht] FMC Alias Private Key: 7
2,805,222 UART: [art] Extend RT PCRs Done
2,805,650 UART: [art] Lock RT PCRs Done
2,806,998 UART: [art] Populate DV Done
2,815,081 UART: [fht] FMC Alias Private Key: 7
2,816,137 UART: [art] Derive CDI
2,816,417 UART: [art] Store in in slot 0x4
2,902,130 UART: [art] Derive Key Pair
2,902,490 UART: [art] Store priv key in slot 0x5
2,915,944 UART: [art] Derive Key Pair - Done
2,930,886 UART: [art] Signing Cert with AUTHO
2,931,366 UART: RITY.KEYID = 7
2,946,936 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,701 UART: [art] PUB.X = A28EDFAA0BA646CB09B1D42E8371CA2C67B25F62E7274484513B8F42D5D306F2F865AD0BDB30BE6141427BF8467AD1E8
2,954,471 UART: [art] PUB.Y = 53071DC5C2C52BEE3E126858DBA6135B027150CF3D65BA0EBCB792ED282F8E542801871820FFEFDC59518F9134F582C5
2,961,415 UART: [art] SIG.R = EB8D7B15E13E536F74133DF14A02F568C5FB7204A6351B2F21D032B4DB27D3ED08B19B1BFE1ED8A3F81A2C7D8C94D00B
2,968,189 UART: [art] SIG.S = F77890E122B63A8580864C0C88984F46FF043D14FB353AAC69BBA9E7144B98CE4597712114A45B9E1786959ED9444EA6
2,991,720 UART: Caliptra RT
2,992,066 UART: [state] CFI Enabled
3,099,627 UART: [rt] RT listening for mailbox commands...
3,100,297 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,930 UART: [rt]cmd =0x54514754, len=24
3,132,091 >>> mbox cmd response data (8 bytes)
3,132,092 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,776 >>> mbox cmd response: success
5,102,776 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,116,612 UART:
5,116,628 UART: Running Caliptra FMC ...
5,117,036 UART:
5,117,179 UART: [state] CFI Enabled
5,206,614 UART: [art] Extend RT PCRs Done
5,207,042 UART: [art] Lock RT PCRs Done
5,208,051 UART: [art] Populate DV Done
5,216,450 UART: [fht] FMC Alias Private Key: 7
5,217,550 UART: [art] Derive CDI
5,217,830 UART: [art] Store in in slot 0x4
5,303,201 UART: [art] Derive Key Pair
5,303,561 UART: [art] Store priv key in slot 0x5
5,316,627 UART: [art] Derive Key Pair - Done
5,331,465 UART: [art] Signing Cert with AUTHO
5,331,945 UART: RITY.KEYID = 7
5,347,283 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,048 UART: [art] PUB.X = D46E0D9D5E66D3BDBBADC72E0E6E39309F4C7A66EF863EEF4BFDA5E58E94878848F07994784B0EC8052D1C2806785C6F
5,354,817 UART: [art] PUB.Y = FEADA12B5E0E99CD10DB0E7CBEA5C47B6F59946DAF0A36E5477C4B5108DADB16922629FD4F074CBBDE115219EDA8DBC0
5,361,780 UART: [art] SIG.R = 3E4C53CD3A3BA42A93128BBE8E6068544978AFE1645BFD947F925FD795B80F46484E551165C47FE18EC9F0CBD2B25E3D
5,368,557 UART: [art] SIG.S = 8ADEA9E72D05249302A90BDB184AF1BFA484D41F080B13AB7D745F9B3F6568108081A9EDF553CE58477BCEAF52AAE39B
5,391,871 UART: mbox::rt_entry...
5,392,243 UART: ____ _ _ _ ____ _____
5,393,027 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,393,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,394,595 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,395,363 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,396,131 UART: |_|
5,396,443 UART:
5,677,091 UART: [rt] Runtime listening for mailbox commands...
5,678,309 >>> mbox cmd response data (120 bytes)
5,678,310 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
7,648,641 >>> mbox cmd response: success
7,648,641 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,662,093 UART:
7,662,109 UART: Running Caliptra FMC ...
7,662,517 UART:
7,662,660 UART: [state] CFI Enabled
7,751,215 UART: [art] Extend RT PCRs Done
7,751,643 UART: [art] Lock RT PCRs Done
7,753,152 UART: [art] Populate DV Done
7,761,355 UART: [fht] FMC Alias Private Key: 7
7,762,497 UART: [art] Derive CDI
7,762,777 UART: [art] Store in in slot 0x4
7,849,038 UART: [art] Derive Key Pair
7,849,398 UART: [art] Store priv key in slot 0x5
7,862,824 UART: [art] Derive Key Pair - Done
7,877,836 UART: [art] Signing Cert with AUTHO
7,878,316 UART: RITY.KEYID = 7
7,893,586 UART: [art] Erasing AUTHORITY.KEYID = 7
7,894,351 UART: [art] PUB.X = FCC9ADE4FFE64D5874F9A6C2C30DB8B843FBCB08A5947E122B6E1365183F46B855CC653B90A822183B9FB3FD9AEBB5D3
7,901,135 UART: [art] PUB.Y = 8188F858A840481FB45C800133CF1E90AF8BC02342197EE9F7E4E9EA5C45A9F6D60BE4F2D8B5E1ADD500CB1C4DEA64D9
7,908,073 UART: [art] SIG.R = 44A04AD3EDE54B30F18DDDED1F864BFDC7C74E15886F4B03DEFC6DE7CD1C2C5B7B584A962B127C39905BBE74DD7B46A7
7,914,866 UART: [art] SIG.S = A995144B93E6AB05993F6BB50FA3226C57546B172E07035EC0709D8C675CE4725284A141E11B786A976D2BB996A37254
7,938,879 UART: mbox::rt_entry...
7,939,251 UART: ____ _ _ _ ____ _____
7,940,035 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,940,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,941,603 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,942,371 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,943,139 UART: |_|
7,943,451 UART:
8,222,877 UART: [rt] Runtime listening for mailbox commands...
8,224,095 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
191,816 UART:
192,178 UART: Running Caliptra ROM ...
193,344 UART:
193,491 UART: [state] CFI Enabled
264,424 UART: [state] LifecycleState = Production
266,677 UART: [state] DebugLocked = Yes
268,038 UART: [state] Starting the WD Timer 40000000 cycles
273,059 UART: [kat] SHA2-256
455,002 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,492 UART: [kat] ++
467,013 UART: [kat] sha1
476,704 UART: [kat] SHA2-256
479,705 UART: [kat] SHA2-384
485,756 UART: [kat] SHA2-512-ACC
488,360 UART: [kat] ECC-384
3,775,647 UART: [kat] HMAC-384Kdf
3,803,215 UART: [kat] LMS
4,876,403 UART: [kat] --
4,880,217 UART: [cold-reset] ++
4,881,298 UART: [fht] FHT @ 0x50003400
4,892,554 UART: [idev] ++
4,893,261 UART: [idev] CDI.KEYID = 6
4,894,429 UART: [idev] SUBJECT.KEYID = 7
4,895,602 UART: [idev] UDS.KEYID = 0
4,896,520 ready_for_fw is high
4,896,731 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,995,899 UART: [idev] Erasing UDS.KEYID = 0
8,244,688 UART: [idev] Sha1 KeyId Algorithm
8,265,562 UART: [idev] --
8,270,142 UART: [ldev] ++
8,270,710 UART: [ldev] CDI.KEYID = 6
8,271,960 UART: [ldev] SUBJECT.KEYID = 5
8,273,064 UART: [ldev] AUTHORITY.KEYID = 7
8,274,334 UART: [ldev] FE.KEYID = 1
8,318,935 UART: [ldev] Erasing FE.KEYID = 1
11,655,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,067 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,983,353 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,999,383 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,015,495 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,035,662 UART: [ldev] --
14,040,539 UART: [fwproc] Wait for Commands...
14,042,679 UART: [fwproc] Recv command 0x46574c44
14,044,979 UART: [fwproc] Recv'd Img size: 78676 bytes
17,710,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,784,141 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,852,893 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,045,994 >>> mbox cmd response: success
18,050,321 UART: [afmc] ++
18,050,931 UART: [afmc] CDI.KEYID = 6
18,052,264 UART: [afmc] SUBJECT.KEYID = 7
18,053,384 UART: [afmc] AUTHORITY.KEYID = 5
21,417,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,733,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,735,585 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,751,599 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,767,700 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,783,734 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,806,421 UART: [afmc] --
23,810,037 UART: [cold-reset] --
23,813,474 UART: [state] Locking Datavault
23,818,594 UART: [state] Locking PCR0, PCR1 and PCR31
23,820,238 UART: [state] Locking ICCM
23,822,385 UART: [exit] Launching FMC @ 0x40000130
23,831,097 UART:
23,831,340 UART: Running Caliptra FMC ...
23,832,383 UART:
23,832,523 UART: [state] CFI Enabled
23,893,901 UART: [fht] FMC Alias Private Key: 7
26,232,218 UART: [art] Extend RT PCRs Done
26,233,442 UART: [art] Lock RT PCRs Done
26,234,973 UART: [art] Populate DV Done
26,240,328 UART: [fht] FMC Alias Private Key: 7
26,241,860 UART: [art] Derive CDI
26,242,613 UART: [art] Store in in slot 0x4
26,301,921 UART: [art] Derive Key Pair
26,302,960 UART: [art] Store priv key in slot 0x5
29,595,659 UART: [art] Derive Key Pair - Done
29,608,928 UART: [art] Signing Cert with AUTHO
29,610,244 UART: RITY.KEYID = 7
31,897,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,899,384 UART: [art] PUB.X = 534FEFA226068C94754222CABC8B36D1DCAA3F145A9D5BB5F9C4946E7A849A1B637137B415D0DFCEA103B889CEC24364
31,906,636 UART: [art] PUB.Y = 4261C6089282549FD2E4E7F789B344B096C731595E20246B178B1EA17BB0D199805E68C08A2CD09AD80A1AEF4C4196DC
31,913,869 UART: [art] SIG.R = 927DDBC001D2A4A27E3470AE5A3201ADEA4BBF464695478ABCA31115E9070A7134A6D43F32659EE4CE3006846293A596
31,921,260 UART: [art] SIG.S = 15E7478AEBBEDF3AB11ECFD092B5F5115FC83CE069A8DB42F7962EC32F98B682374F74B53163D5137C3A55FACBA3DE4B
33,226,602 UART: mbox::rt_entry...
33,227,554 UART: ____ _ _ _ ____ _____
33,229,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,231,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,233,315 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,235,226 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,237,070 UART: |_|
33,237,945 UART:
33,351,013 UART: [rt] Runtime listening for mailbox commands...
33,353,021 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
999 UART:
1,151 UART: Running Caliptra ROM ...
2,191 UART:
2,336 UART: [state] CFI Enabled
56,303 UART: [state] LifecycleState = Production
58,116 UART: [state] DebugLocked = Yes
59,716 UART: [state] Starting the WD Timer 40000000 cycles
64,387 UART: [kat] SHA2-256
246,351 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
257,895 UART: [kat] ++
258,392 UART: [kat] sha1
269,211 UART: [kat] SHA2-256
272,212 UART: [kat] SHA2-384
277,477 UART: [kat] SHA2-512-ACC
280,078 UART: [kat] ECC-384
3,568,736 UART: [kat] HMAC-384Kdf
3,598,126 UART: [kat] LMS
4,671,288 UART: [kat] --
4,675,298 UART: [warm-reset] ++
4,677,934 UART: [warm-reset] --
4,683,361 UART: [state] Locking Datavault
4,686,499 UART: [state] Locking PCR0, PCR1 and PCR31
4,688,625 UART: [state] Locking ICCM
4,690,012 UART: [exit] Launching FMC @ 0x40000130
4,698,685 UART:
4,698,960 UART: Running Caliptra FMC ...
4,700,067 UART:
4,700,220 UART: [state] CFI Enabled
4,763,183 UART: [aliasrt :skip pcr extension
4,764,431 UART: [art] Extend RT PCRs Done
4,765,562 UART: [art] Lock RT PCRs Done
4,766,642 UART: [art] Populate DV Done
4,772,374 UART: [fht] FMC Alias Private Key: 7
4,774,065 UART: [art] Derive CDI
4,774,876 UART: [art] Store in in slot 0x4
4,831,423 UART: [art] Derive Key Pair
4,832,472 UART: [art] Store priv key in slot 0x5
8,125,442 UART: [art] Derive Key Pair - Done
8,138,322 UART: [art] Signing Cert with AUTHO
8,139,653 UART: RITY.KEYID = 7
10,427,219 UART: [art] Erasing AUTHORITY.KEYID = 7
10,428,727 UART: [art] PUB.X = 534FEFA226068C94754222CABC8B36D1DCAA3F145A9D5BB5F9C4946E7A849A1B637137B415D0DFCEA103B889CEC24364
10,435,981 UART: [art] PUB.Y = 4261C6089282549FD2E4E7F789B344B096C731595E20246B178B1EA17BB0D199805E68C08A2CD09AD80A1AEF4C4196DC
10,443,218 UART: [art] SIG.R = 927DDBC001D2A4A27E3470AE5A3201ADEA4BBF464695478ABCA31115E9070A7134A6D43F32659EE4CE3006846293A596
10,450,563 UART: [art] SIG.S = 15E7478AEBBEDF3AB11ECFD092B5F5115FC83CE069A8DB42F7962EC32F98B682374F74B53163D5137C3A55FACBA3DE4B
11,755,242 UART: mbox::rt_entry...
11,756,208 UART: ____ _ _ _ ____ _____
11,758,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,760,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,762,004 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,763,924 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,765,767 UART: |_|
11,766,580 UART:
12,049,387 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
191,970 UART:
192,349 UART: Running Caliptra ROM ...
193,424 UART:
193,561 UART: [state] CFI Enabled
265,585 UART: [state] LifecycleState = Production
267,810 UART: [state] DebugLocked = Yes
269,306 UART: [state] Starting the WD Timer 40000000 cycles
274,046 UART: [kat] SHA2-256
456,005 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,505 UART: [kat] ++
468,020 UART: [kat] sha1
478,017 UART: [kat] SHA2-256
481,026 UART: [kat] SHA2-384
486,423 UART: [kat] SHA2-512-ACC
489,044 UART: [kat] ECC-384
3,765,541 UART: [kat] HMAC-384Kdf
3,794,905 UART: [kat] LMS
4,868,058 UART: [kat] --
4,874,252 UART: [cold-reset] ++
4,875,891 UART: [fht] FHT @ 0x50003400
4,886,597 UART: [idev] ++
4,887,399 UART: [idev] CDI.KEYID = 6
4,888,435 UART: [idev] SUBJECT.KEYID = 7
4,889,680 UART: [idev] UDS.KEYID = 0
4,890,569 ready_for_fw is high
4,890,773 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,989,940 UART: [idev] Erasing UDS.KEYID = 0
8,234,553 UART: [idev] Sha1 KeyId Algorithm
8,255,132 UART: [idev] --
8,258,131 UART: [ldev] ++
8,258,700 UART: [ldev] CDI.KEYID = 6
8,259,869 UART: [ldev] SUBJECT.KEYID = 5
8,261,027 UART: [ldev] AUTHORITY.KEYID = 7
8,262,176 UART: [ldev] FE.KEYID = 1
8,309,347 UART: [ldev] Erasing FE.KEYID = 1
11,643,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,954,523 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,970,842 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,986,816 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,002,931 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,023,640 UART: [ldev] --
14,029,131 UART: [fwproc] Wait for Commands...
14,032,257 UART: [fwproc] Recv command 0x46574c44
14,034,559 UART: [fwproc] Recv'd Img size: 78676 bytes
17,695,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,769,843 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,838,536 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,032,032 >>> mbox cmd response: success
18,036,266 UART: [afmc] ++
18,036,892 UART: [afmc] CDI.KEYID = 6
18,038,082 UART: [afmc] SUBJECT.KEYID = 7
18,039,184 UART: [afmc] AUTHORITY.KEYID = 5
21,405,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,700,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,703,128 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,719,133 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,735,226 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,751,260 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,774,685 UART: [afmc] --
23,778,798 UART: [cold-reset] --
23,782,498 UART: [state] Locking Datavault
23,787,369 UART: [state] Locking PCR0, PCR1 and PCR31
23,789,008 UART: [state] Locking ICCM
23,790,365 UART: [exit] Launching FMC @ 0x40000130
23,799,024 UART:
23,799,250 UART: Running Caliptra FMC ...
23,800,341 UART:
23,800,489 UART: [state] CFI Enabled
23,862,940 UART: [fht] FMC Alias Private Key: 7
26,201,333 UART: [art] Extend RT PCRs Done
26,202,573 UART: [art] Lock RT PCRs Done
26,204,084 UART: [art] Populate DV Done
26,209,918 UART: [fht] FMC Alias Private Key: 7
26,211,667 UART: [art] Derive CDI
26,212,473 UART: [art] Store in in slot 0x4
26,272,012 UART: [art] Derive Key Pair
26,273,082 UART: [art] Store priv key in slot 0x5
29,565,643 UART: [art] Derive Key Pair - Done
29,578,741 UART: [art] Signing Cert with AUTHO
29,580,057 UART: RITY.KEYID = 7
31,867,820 UART: [art] Erasing AUTHORITY.KEYID = 7
31,869,326 UART: [art] PUB.X = 09014B971D7225BA7FEB14C3774661BD87B77FCFA602919E836F11471BE6187BD6AD86576B9E6A12524549407644F65B
31,876,526 UART: [art] PUB.Y = 46F56D73E38EAC9AE2D83AE014A1A4629160AB13669EB2CF523FF5EA81A44A75B305627A8CBD1675536AB5E147E14CC9
31,883,809 UART: [art] SIG.R = DAFF0F275610A00934BBDBAA48D6C57B25F2003515E90E38DA8E3E6637DE8221E587785713B55CFA8C24E95CAB2C2D8C
31,891,135 UART: [art] SIG.S = 8280C7B3B2B15FFA1A01C1FA31CB79BBA69ECF8FA494F63EB61A22A554F0D39973D54BA907CA906DE3A700EC781BDD6F
33,195,881 UART: mbox::rt_entry...
33,196,841 UART: ____ _ _ _ ____ _____
33,198,764 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,200,761 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,202,607 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,204,522 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,207,108 UART: |_|
33,207,925 UART:
33,320,025 UART: [rt] Runtime listening for mailbox commands...
33,322,037 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
993 UART:
1,133 UART: Running Caliptra ROM ...
2,237 UART:
2,381 UART: [state] CFI Enabled
59,761 UART: [state] LifecycleState = Production
61,519 UART: [state] DebugLocked = Yes
63,550 UART: [state] Starting the WD Timer 40000000 cycles
69,776 UART: [kat] SHA2-256
251,759 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
263,271 UART: [kat] ++
263,766 UART: [kat] sha1
275,122 UART: [kat] SHA2-256
278,121 UART: [kat] SHA2-384
283,603 UART: [kat] SHA2-512-ACC
286,192 UART: [kat] ECC-384
3,570,642 UART: [kat] HMAC-384Kdf
3,598,206 UART: [kat] LMS
4,671,357 UART: [kat] --
4,675,144 UART: [warm-reset] ++
4,680,310 UART: [warm-reset] --
4,685,785 UART: [state] Locking Datavault
4,689,013 UART: [state] Locking PCR0, PCR1 and PCR31
4,691,201 UART: [state] Locking ICCM
4,692,783 UART: [exit] Launching FMC @ 0x40000130
4,701,391 UART:
4,701,626 UART: Running Caliptra FMC ...
4,702,649 UART:
4,702,790 UART: [state] CFI Enabled
4,763,964 UART: [aliasrt :skip pcr extension
4,765,254 UART: [art] Extend RT PCRs Done
4,766,312 UART: [art] Lock RT PCRs Done
4,767,881 UART: [art] Populate DV Done
4,773,394 UART: [fht] FMC Alias Private Key: 7
4,775,085 UART: [art] Derive CDI
4,775,894 UART: [art] Store in in slot 0x4
4,832,758 UART: [art] Derive Key Pair
4,833,772 UART: [art] Store priv key in slot 0x5
8,126,716 UART: [art] Derive Key Pair - Done
8,139,497 UART: [art] Signing Cert with AUTHO
8,140,809 UART: RITY.KEYID = 7
10,428,477 UART: [art] Erasing AUTHORITY.KEYID = 7
10,429,979 UART: [art] PUB.X = 09014B971D7225BA7FEB14C3774661BD87B77FCFA602919E836F11471BE6187BD6AD86576B9E6A12524549407644F65B
10,437,185 UART: [art] PUB.Y = 46F56D73E38EAC9AE2D83AE014A1A4629160AB13669EB2CF523FF5EA81A44A75B305627A8CBD1675536AB5E147E14CC9
10,444,461 UART: [art] SIG.R = DAFF0F275610A00934BBDBAA48D6C57B25F2003515E90E38DA8E3E6637DE8221E587785713B55CFA8C24E95CAB2C2D8C
10,451,812 UART: [art] SIG.S = 8280C7B3B2B15FFA1A01C1FA31CB79BBA69ECF8FA494F63EB61A22A554F0D39973D54BA907CA906DE3A700EC781BDD6F
11,756,628 UART: mbox::rt_entry...
11,757,589 UART: ____ _ _ _ ____ _____
11,759,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,761,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,763,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,765,379 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,767,302 UART: |_|
11,768,103 UART:
12,052,766 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
191,773 UART:
192,155 UART: Running Caliptra ROM ...
193,314 UART:
602,895 UART: [state] CFI Enabled
612,737 UART: [state] LifecycleState = Production
614,880 UART: [state] DebugLocked = Yes
616,874 UART: [state] Starting the WD Timer 40000000 cycles
621,630 UART: [kat] SHA2-256
803,635 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
815,171 UART: [kat] ++
815,688 UART: [kat] sha1
825,950 UART: [kat] SHA2-256
828,955 UART: [kat] SHA2-384
834,510 UART: [kat] SHA2-512-ACC
837,159 UART: [kat] ECC-384
4,096,333 UART: [kat] HMAC-384Kdf
4,106,724 UART: [kat] LMS
5,179,907 UART: [kat] --
5,184,805 UART: [cold-reset] ++
5,187,233 UART: [fht] FHT @ 0x50003400
5,198,777 UART: [idev] ++
5,199,417 UART: [idev] CDI.KEYID = 6
5,200,660 UART: [idev] SUBJECT.KEYID = 7
5,202,113 UART: [idev] UDS.KEYID = 0
5,203,371 ready_for_fw is high
5,203,596 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
5,302,536 UART: [idev] Erasing UDS.KEYID = 0
8,486,312 UART: [idev] Sha1 KeyId Algorithm
8,508,983 UART: [idev] --
8,511,794 UART: [ldev] ++
8,512,363 UART: [ldev] CDI.KEYID = 6
8,513,594 UART: [ldev] SUBJECT.KEYID = 5
8,514,745 UART: [ldev] AUTHORITY.KEYID = 7
8,515,986 UART: [ldev] FE.KEYID = 1
8,527,455 UART: [ldev] Erasing FE.KEYID = 1
11,816,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,544 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,128,820 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,144,849 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,160,960 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,181,942 UART: [ldev] --
14,186,712 UART: [fwproc] Wait for Commands...
14,188,644 UART: [fwproc] Recv command 0x46574c44
14,190,946 UART: [fwproc] Recv'd Img size: 78676 bytes
17,855,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,929,447 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,998,183 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,191,513 >>> mbox cmd response: success
18,195,416 UART: [afmc] ++
18,196,046 UART: [afmc] CDI.KEYID = 6
18,197,110 UART: [afmc] SUBJECT.KEYID = 7
18,198,320 UART: [afmc] AUTHORITY.KEYID = 5
21,520,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,816,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,818,589 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,834,594 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,850,739 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,866,770 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,888,912 UART: [afmc] --
23,891,766 UART: [cold-reset] --
23,896,820 UART: [state] Locking Datavault
23,902,999 UART: [state] Locking PCR0, PCR1 and PCR31
23,904,643 UART: [state] Locking ICCM
23,907,114 UART: [exit] Launching FMC @ 0x40000130
23,915,781 UART:
23,916,034 UART: Running Caliptra FMC ...
23,917,139 UART:
23,917,294 UART: [state] CFI Enabled
23,924,960 UART: [fht] FMC Alias Private Key: 7
26,255,674 UART: [art] Extend RT PCRs Done
26,256,900 UART: [art] Lock RT PCRs Done
26,258,762 UART: [art] Populate DV Done
26,264,390 UART: [fht] FMC Alias Private Key: 7
26,265,923 UART: [art] Derive CDI
26,266,656 UART: [art] Store in in slot 0x4
26,309,843 UART: [art] Derive Key Pair
26,310,878 UART: [art] Store priv key in slot 0x5
29,552,644 UART: [art] Derive Key Pair - Done
29,565,693 UART: [art] Signing Cert with AUTHO
29,567,182 UART: RITY.KEYID = 7
31,846,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,847,904 UART: [art] PUB.X = 303858470EE7866472CC207E1B535B2F41ABD0183A71CDD46202DDF957F8FEA0863AD09F583F1EB0CED2062D49E664B7
31,855,146 UART: [art] PUB.Y = E99ED297D204D310DCA0E582B80DABF8B0DE4E62049BF0A8C98A52B7876D7203D7C386F7CE9151671B07E92185EE25A8
31,862,385 UART: [art] SIG.R = 2C21D177241FE22DC25F9661877F050146CB898C78427142C0BF82A32920853DD21B8D0093B8DCBA7595A52655C5BB08
31,869,732 UART: [art] SIG.S = 2455414B8D7EEE3733579B88A8A6B968BFED9158F60042BEB0120345A49D40CC2F637C1C82411426D3CB512EBA489BCC
33,174,412 UART: mbox::rt_entry...
33,175,379 UART: ____ _ _ _ ____ _____
33,177,303 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,179,310 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,181,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,183,169 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,185,094 UART: |_|
33,186,084 UART:
33,298,954 UART: [rt] Runtime listening for mailbox commands...
33,300,969 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
995 UART:
1,197 UART: Running Caliptra ROM ...
2,303 UART:
7,227,910 UART: [state] CFI Enabled
7,242,539 UART: [state] LifecycleState = Production
7,244,275 UART: [state] DebugLocked = Yes
7,246,962 UART: [state] Starting the WD Timer 40000000 cycles
7,251,527 UART: [kat] SHA2-256
7,433,550 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,445,052 UART: [kat] ++
7,445,570 UART: [kat] sha1
7,455,971 UART: [kat] SHA2-256
7,458,991 UART: [kat] SHA2-384
7,464,218 UART: [kat] SHA2-512-ACC
7,466,829 UART: [kat] ECC-384
10,723,923 UART: [kat] HMAC-384Kdf
10,735,173 UART: [kat] LMS
11,808,354 UART: [kat] --
11,814,206 UART: [warm-reset] ++
11,820,184 UART: [warm-reset] --
11,824,378 UART: [state] Locking Datavault
11,828,056 UART: [state] Locking PCR0, PCR1 and PCR31
11,830,243 UART: [state] Locking ICCM
11,832,258 UART: [exit] Launching FMC @ 0x40000130
11,840,918 UART:
11,841,155 UART: Running Caliptra FMC ...
11,842,178 UART:
11,842,323 UART: [state] CFI Enabled
11,844,534 UART: [aliasrt :skip pcr extension
11,845,775 UART: [art] Extend RT PCRs Done
11,846,831 UART: [art] Lock RT PCRs Done
11,848,050 UART: [art] Populate DV Done
11,853,781 UART: [fht] FMC Alias Private Key: 7
11,855,271 UART: [art] Derive CDI
11,856,002 UART: [art] Store in in slot 0x4
11,898,681 UART: [art] Derive Key Pair
11,899,754 UART: [art] Store priv key in slot 0x5
15,142,039 UART: [art] Derive Key Pair - Done
15,155,249 UART: [art] Signing Cert with AUTHO
15,156,592 UART: RITY.KEYID = 7
17,436,119 UART: [art] Erasing AUTHORITY.KEYID = 7
17,437,628 UART: [art] PUB.X = 303858470EE7866472CC207E1B535B2F41ABD0183A71CDD46202DDF957F8FEA0863AD09F583F1EB0CED2062D49E664B7
17,444,885 UART: [art] PUB.Y = E99ED297D204D310DCA0E582B80DABF8B0DE4E62049BF0A8C98A52B7876D7203D7C386F7CE9151671B07E92185EE25A8
17,452,124 UART: [art] SIG.R = 2C21D177241FE22DC25F9661877F050146CB898C78427142C0BF82A32920853DD21B8D0093B8DCBA7595A52655C5BB08
17,459,463 UART: [art] SIG.S = 2455414B8D7EEE3733579B88A8A6B968BFED9158F60042BEB0120345A49D40CC2F637C1C82411426D3CB512EBA489BCC
18,764,470 UART: mbox::rt_entry...
18,765,427 UART: ____ _ _ _ ____ _____
18,767,405 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,769,410 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,771,354 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,773,281 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,775,204 UART: |_|
18,776,033 UART:
19,057,060 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
191,895 UART:
192,274 UART: Running Caliptra ROM ...
193,387 UART:
603,180 UART: [state] CFI Enabled
613,360 UART: [state] LifecycleState = Production
615,557 UART: [state] DebugLocked = Yes
617,551 UART: [state] Starting the WD Timer 40000000 cycles
622,446 UART: [kat] SHA2-256
804,488 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,003 UART: [kat] ++
816,457 UART: [kat] sha1
825,879 UART: [kat] SHA2-256
828,971 UART: [kat] SHA2-384
834,041 UART: [kat] SHA2-512-ACC
836,707 UART: [kat] ECC-384
4,090,758 UART: [kat] HMAC-384Kdf
4,102,816 UART: [kat] LMS
5,175,964 UART: [kat] --
5,178,985 UART: [cold-reset] ++
5,180,134 UART: [fht] FHT @ 0x50003400
5,191,474 UART: [idev] ++
5,192,181 UART: [idev] CDI.KEYID = 6
5,193,428 UART: [idev] SUBJECT.KEYID = 7
5,194,815 UART: [idev] UDS.KEYID = 0
5,196,098 ready_for_fw is high
5,196,324 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
5,295,298 UART: [idev] Erasing UDS.KEYID = 0
8,489,505 UART: [idev] Sha1 KeyId Algorithm
8,512,641 UART: [idev] --
8,517,067 UART: [ldev] ++
8,517,687 UART: [ldev] CDI.KEYID = 6
8,518,883 UART: [ldev] SUBJECT.KEYID = 5
8,519,987 UART: [ldev] AUTHORITY.KEYID = 7
8,521,220 UART: [ldev] FE.KEYID = 1
8,532,921 UART: [ldev] Erasing FE.KEYID = 1
11,830,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,008 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,138,326 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,154,351 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,170,465 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,191,522 UART: [ldev] --
14,195,976 UART: [fwproc] Wait for Commands...
14,198,052 UART: [fwproc] Recv command 0x46574c44
14,200,374 UART: [fwproc] Recv'd Img size: 78676 bytes
17,867,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,940,763 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,009,503 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,202,261 >>> mbox cmd response: success
18,206,969 UART: [afmc] ++
18,207,592 UART: [afmc] CDI.KEYID = 6
18,208,726 UART: [afmc] SUBJECT.KEYID = 7
18,209,883 UART: [afmc] AUTHORITY.KEYID = 5
21,532,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,826,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,829,025 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,844,974 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,861,138 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,877,224 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,900,944 UART: [afmc] --
23,904,474 UART: [cold-reset] --
23,908,823 UART: [state] Locking Datavault
23,914,735 UART: [state] Locking PCR0, PCR1 and PCR31
23,916,434 UART: [state] Locking ICCM
23,917,988 UART: [exit] Launching FMC @ 0x40000130
23,926,664 UART:
23,926,896 UART: Running Caliptra FMC ...
23,927,994 UART:
23,928,148 UART: [state] CFI Enabled
23,936,303 UART: [fht] FMC Alias Private Key: 7
26,266,708 UART: [art] Extend RT PCRs Done
26,267,930 UART: [art] Lock RT PCRs Done
26,269,820 UART: [art] Populate DV Done
26,275,092 UART: [fht] FMC Alias Private Key: 7
26,276,669 UART: [art] Derive CDI
26,277,489 UART: [art] Store in in slot 0x4
26,320,258 UART: [art] Derive Key Pair
26,321,257 UART: [art] Store priv key in slot 0x5
29,563,537 UART: [art] Derive Key Pair - Done
29,576,584 UART: [art] Signing Cert with AUTHO
29,577,889 UART: RITY.KEYID = 7
31,856,976 UART: [art] Erasing AUTHORITY.KEYID = 7
31,858,481 UART: [art] PUB.X = 2826886EB21D831ACE3C2C091CFC19EE94C0887190BFA8ECCE7E43C79BAD4624CE86975220F649431856258A987DD044
31,865,732 UART: [art] PUB.Y = 043F68616098C0F385AF441EFDCCD7216F83460CCA6423C77CE44293F74924107328850641201EFCB005083185FBD535
31,872,922 UART: [art] SIG.R = 284369182D375AE6E708EAEB28368BDE6F0ECB562A6671185AAB75F38BE7FD4B6E0918DE36F69EAF56E8D19D508F919B
31,880,414 UART: [art] SIG.S = 1EBB5ADA157129FA337EB4AEE2B5AAD260BD116BF1201BA97226108E27E09F2D333C776FE493F1366509349F8C937004
33,185,284 UART: mbox::rt_entry...
33,186,234 UART: ____ _ _ _ ____ _____
33,188,159 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,190,184 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,192,048 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,193,980 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,195,864 UART: |_|
33,196,747 UART:
33,309,495 UART: [rt] Runtime listening for mailbox commands...
33,311,499 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
1,003 UART:
1,165 UART: Running Caliptra ROM ...
2,178 UART:
7,224,876 UART: [state] CFI Enabled
7,238,804 UART: [state] LifecycleState = Production
7,240,557 UART: [state] DebugLocked = Yes
7,242,953 UART: [state] Starting the WD Timer 40000000 cycles
7,247,857 UART: [kat] SHA2-256
7,429,870 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,441,370 UART: [kat] ++
7,441,964 UART: [kat] sha1
7,452,432 UART: [kat] SHA2-256
7,455,487 UART: [kat] SHA2-384
7,461,799 UART: [kat] SHA2-512-ACC
7,464,427 UART: [kat] ECC-384
10,715,581 UART: [kat] HMAC-384Kdf
10,728,127 UART: [kat] LMS
11,801,274 UART: [kat] --
11,805,504 UART: [warm-reset] ++
11,810,142 UART: [warm-reset] --
11,813,843 UART: [state] Locking Datavault
11,819,090 UART: [state] Locking PCR0, PCR1 and PCR31
11,821,245 UART: [state] Locking ICCM
11,823,343 UART: [exit] Launching FMC @ 0x40000130
11,832,037 UART:
11,832,270 UART: Running Caliptra FMC ...
11,833,371 UART:
11,833,526 UART: [state] CFI Enabled
11,835,472 UART: [aliasrt :skip pcr extension
11,836,712 UART: [art] Extend RT PCRs Done
11,837,844 UART: [art] Lock RT PCRs Done
11,839,019 UART: [art] Populate DV Done
11,844,644 UART: [fht] FMC Alias Private Key: 7
11,846,326 UART: [art] Derive CDI
11,847,143 UART: [art] Store in in slot 0x4
11,889,787 UART: [art] Derive Key Pair
11,890,803 UART: [art] Store priv key in slot 0x5
15,133,428 UART: [art] Derive Key Pair - Done
15,146,477 UART: [art] Signing Cert with AUTHO
15,147,779 UART: RITY.KEYID = 7
17,427,153 UART: [art] Erasing AUTHORITY.KEYID = 7
17,428,659 UART: [art] PUB.X = 2826886EB21D831ACE3C2C091CFC19EE94C0887190BFA8ECCE7E43C79BAD4624CE86975220F649431856258A987DD044
17,435,916 UART: [art] PUB.Y = 043F68616098C0F385AF441EFDCCD7216F83460CCA6423C77CE44293F74924107328850641201EFCB005083185FBD535
17,443,311 UART: [art] SIG.R = 284369182D375AE6E708EAEB28368BDE6F0ECB562A6671185AAB75F38BE7FD4B6E0918DE36F69EAF56E8D19D508F919B
17,450,508 UART: [art] SIG.S = 1EBB5ADA157129FA337EB4AEE2B5AAD260BD116BF1201BA97226108E27E09F2D333C776FE493F1366509349F8C937004
18,755,356 UART: mbox::rt_entry...
18,756,291 UART: ____ _ _ _ ____ _____
18,758,266 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,760,267 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,762,199 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,764,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,766,060 UART: |_|
18,766,906 UART:
19,049,847 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
191,968 UART:
192,331 UART: Running Caliptra ROM ...
193,520 UART:
193,680 UART: [state] CFI Enabled
262,667 UART: [state] LifecycleState = Production
264,402 UART: [state] DebugLocked = Yes
266,190 UART: [state] Starting the WD Timer 40000000 cycles
270,660 UART: [kat] SHA2-256
449,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,381 UART: [kat] ++
461,833 UART: [kat] sha1
473,326 UART: [kat] SHA2-256
476,374 UART: [kat] SHA2-384
481,807 UART: [kat] SHA2-512-ACC
484,746 UART: [kat] ECC-384
2,948,857 UART: [kat] HMAC-384Kdf
2,971,897 UART: [kat] LMS
3,501,326 UART: [kat] --
3,504,499 UART: [cold-reset] ++
3,505,475 UART: [fht] FHT @ 0x50003400
3,515,964 UART: [idev] ++
3,516,532 UART: [idev] CDI.KEYID = 6
3,517,569 UART: [idev] SUBJECT.KEYID = 7
3,518,671 UART: [idev] UDS.KEYID = 0
3,519,613 ready_for_fw is high
3,519,818 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,618,903 UART: [idev] Erasing UDS.KEYID = 0
6,027,224 UART: [idev] Sha1 KeyId Algorithm
6,049,808 UART: [idev] --
6,053,376 UART: [ldev] ++
6,053,954 UART: [ldev] CDI.KEYID = 6
6,054,842 UART: [ldev] SUBJECT.KEYID = 5
6,056,052 UART: [ldev] AUTHORITY.KEYID = 7
6,057,290 UART: [ldev] FE.KEYID = 1
6,100,588 UART: [ldev] Erasing FE.KEYID = 1
8,600,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,112 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,152 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,973 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,929 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,406,463 UART: [ldev] --
10,411,841 UART: [fwproc] Wait for Commands...
10,413,775 UART: [fwproc] Recv command 0x46574c44
10,415,867 UART: [fwproc] Recv'd Img size: 78632 bytes
13,420,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,564,806 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,757,082 >>> mbox cmd response: success
13,761,876 UART: [afmc] ++
13,762,501 UART: [afmc] CDI.KEYID = 6
13,763,439 UART: [afmc] SUBJECT.KEYID = 7
13,764,607 UART: [afmc] AUTHORITY.KEYID = 5
16,289,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,015,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,016,990 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,032,972 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,048,840 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,064,795 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,088,226 UART: [afmc] --
18,091,480 UART: [cold-reset] --
18,095,129 UART: [state] Locking Datavault
18,100,379 UART: [state] Locking PCR0, PCR1 and PCR31
18,102,031 UART: [state] Locking ICCM
18,103,645 UART: [exit] Launching FMC @ 0x40000130
18,112,100 UART:
18,112,335 UART: Running Caliptra FMC ...
18,113,457 UART:
18,113,614 UART: [state] CFI Enabled
18,174,416 UART: [fht] FMC Alias Private Key: 7
19,938,271 UART: [art] Extend RT PCRs Done
19,939,495 UART: [art] Lock RT PCRs Done
19,941,412 UART: [art] Populate DV Done
19,946,717 UART: [fht] FMC Alias Private Key: 7
19,948,261 UART: [art] Derive CDI
19,949,021 UART: [art] Store in in slot 0x4
20,007,035 UART: [art] Derive Key Pair
20,008,077 UART: [art] Store priv key in slot 0x5
22,470,995 UART: [art] Derive Key Pair - Done
22,483,826 UART: [art] Signing Cert with AUTHO
22,485,132 UART: RITY.KEYID = 7
24,196,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,197,765 UART: [art] PUB.X = 075C5BB46D60113E8476C1D30DA1031431EB3001166C633A5229F18CEB9B24B6E9E569E035888CB583E801C11B3C456B
24,205,027 UART: [art] PUB.Y = 0B25367D4E5F679260E0E0EC48326CABDCE4801409BBB22D424CBBEA036DBC19087C96D5D1D0585216721A8717C29E66
24,212,237 UART: [art] SIG.R = 83170C38F0D5D9DF5AFEDA5F122B05448B4E7999CA38DFB85F3A478AEBB0ECCEF3CE44C3A4A7EF72AE9E98D4CBBFB203
24,219,655 UART: [art] SIG.S = A55334A13821DAA7DAF049DFE7DA2C16455BC64335909B00DD301207273427506CC5C56A62D6012535E1E2CD002916CE
25,197,470 UART: mbox::rt_entry...
25,198,440 UART: ____ _ _ _ ____ _____
25,200,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,202,384 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,204,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,206,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,208,022 UART: |_|
25,208,908 UART:
25,322,416 UART: [rt] Runtime listening for mailbox commands...
25,324,434 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
1,001 UART:
1,166 UART: Running Caliptra ROM ...
2,196 UART:
2,343 UART: [state] CFI Enabled
63,977 UART: [state] LifecycleState = Production
65,742 UART: [state] DebugLocked = Yes
67,921 UART: [state] Starting the WD Timer 40000000 cycles
72,322 UART: [kat] SHA2-256
251,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,067 UART: [kat] ++
263,520 UART: [kat] sha1
274,550 UART: [kat] SHA2-256
277,551 UART: [kat] SHA2-384
283,255 UART: [kat] SHA2-512-ACC
286,246 UART: [kat] ECC-384
2,747,197 UART: [kat] HMAC-384Kdf
2,771,198 UART: [kat] LMS
3,300,678 UART: [kat] --
3,307,441 UART: [warm-reset] ++
3,312,243 UART: [warm-reset] --
3,315,131 UART: [state] Locking Datavault
3,317,140 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,844 UART: [state] Locking ICCM
3,321,136 UART: [exit] Launching FMC @ 0x40000130
3,329,582 UART:
3,329,819 UART: Running Caliptra FMC ...
3,330,925 UART:
3,331,086 UART: [state] CFI Enabled
3,380,804 UART: [aliasrt :skip pcr extension
3,382,091 UART: [art] Extend RT PCRs Done
3,383,161 UART: [art] Lock RT PCRs Done
3,384,659 UART: [art] Populate DV Done
3,390,178 UART: [fht] FMC Alias Private Key: 7
3,391,726 UART: [art] Derive CDI
3,392,510 UART: [art] Store in in slot 0x4
3,449,317 UART: [art] Derive Key Pair
3,450,341 UART: [art] Store priv key in slot 0x5
5,913,462 UART: [art] Derive Key Pair - Done
5,926,465 UART: [art] Signing Cert with AUTHO
5,927,783 UART: RITY.KEYID = 7
7,639,268 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,786 UART: [art] PUB.X = 075C5BB46D60113E8476C1D30DA1031431EB3001166C633A5229F18CEB9B24B6E9E569E035888CB583E801C11B3C456B
7,648,019 UART: [art] PUB.Y = 0B25367D4E5F679260E0E0EC48326CABDCE4801409BBB22D424CBBEA036DBC19087C96D5D1D0585216721A8717C29E66
7,655,293 UART: [art] SIG.R = 83170C38F0D5D9DF5AFEDA5F122B05448B4E7999CA38DFB85F3A478AEBB0ECCEF3CE44C3A4A7EF72AE9E98D4CBBFB203
7,662,714 UART: [art] SIG.S = A55334A13821DAA7DAF049DFE7DA2C16455BC64335909B00DD301207273427506CC5C56A62D6012535E1E2CD002916CE
8,640,596 UART: mbox::rt_entry...
8,641,561 UART: ____ _ _ _ ____ _____
8,643,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,512 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,447 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,396 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,333 UART: |_|
8,652,170 UART:
8,944,731 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
191,943 UART:
192,308 UART: Running Caliptra ROM ...
193,434 UART:
193,585 UART: [state] CFI Enabled
262,603 UART: [state] LifecycleState = Production
264,402 UART: [state] DebugLocked = Yes
265,693 UART: [state] Starting the WD Timer 40000000 cycles
270,799 UART: [kat] SHA2-256
449,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,514 UART: [kat] ++
462,069 UART: [kat] sha1
472,991 UART: [kat] SHA2-256
476,006 UART: [kat] SHA2-384
483,708 UART: [kat] SHA2-512-ACC
486,717 UART: [kat] ECC-384
2,950,940 UART: [kat] HMAC-384Kdf
2,972,094 UART: [kat] LMS
3,501,614 UART: [kat] --
3,506,059 UART: [cold-reset] ++
3,507,070 UART: [fht] FHT @ 0x50003400
3,517,759 UART: [idev] ++
3,518,322 UART: [idev] CDI.KEYID = 6
3,519,275 UART: [idev] SUBJECT.KEYID = 7
3,520,446 UART: [idev] UDS.KEYID = 0
3,521,446 ready_for_fw is high
3,521,670 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,620,768 UART: [idev] Erasing UDS.KEYID = 0
6,027,643 UART: [idev] Sha1 KeyId Algorithm
6,050,569 UART: [idev] --
6,054,384 UART: [ldev] ++
6,054,962 UART: [ldev] CDI.KEYID = 6
6,055,878 UART: [ldev] SUBJECT.KEYID = 5
6,057,098 UART: [ldev] AUTHORITY.KEYID = 7
6,058,338 UART: [ldev] FE.KEYID = 1
6,101,070 UART: [ldev] Erasing FE.KEYID = 1
8,606,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,494 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,203 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,155 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,412,149 UART: [ldev] --
10,417,213 UART: [fwproc] Wait for Commands...
10,419,310 UART: [fwproc] Recv command 0x46574c44
10,421,405 UART: [fwproc] Recv'd Img size: 78632 bytes
13,432,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,505,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,573,986 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,767,215 >>> mbox cmd response: success
13,772,330 UART: [afmc] ++
13,772,951 UART: [afmc] CDI.KEYID = 6
13,773,840 UART: [afmc] SUBJECT.KEYID = 7
13,774,939 UART: [afmc] AUTHORITY.KEYID = 5
16,317,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,043,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,045,425 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,061,405 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,077,276 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,093,008 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,116,125 UART: [afmc] --
18,119,323 UART: [cold-reset] --
18,122,414 UART: [state] Locking Datavault
18,126,807 UART: [state] Locking PCR0, PCR1 and PCR31
18,128,511 UART: [state] Locking ICCM
18,130,040 UART: [exit] Launching FMC @ 0x40000130
18,138,450 UART:
18,138,687 UART: Running Caliptra FMC ...
18,139,716 UART:
18,139,864 UART: [state] CFI Enabled
18,201,412 UART: [fht] FMC Alias Private Key: 7
19,965,227 UART: [art] Extend RT PCRs Done
19,966,447 UART: [art] Lock RT PCRs Done
19,968,206 UART: [art] Populate DV Done
19,973,560 UART: [fht] FMC Alias Private Key: 7
19,975,118 UART: [art] Derive CDI
19,975,851 UART: [art] Store in in slot 0x4
20,034,183 UART: [art] Derive Key Pair
20,035,188 UART: [art] Store priv key in slot 0x5
22,498,494 UART: [art] Derive Key Pair - Done
22,511,705 UART: [art] Signing Cert with AUTHO
22,513,003 UART: RITY.KEYID = 7
24,224,349 UART: [art] Erasing AUTHORITY.KEYID = 7
24,225,853 UART: [art] PUB.X = BF053AC905850CE5B13EC4DA70F7A4032F5E95B7914E7AE2EA9D0984311FF7931802BB415CF6FD04FF7DA74258C7BD45
24,233,146 UART: [art] PUB.Y = 68A65CC593B29CD5FDC5B6475B93ABA937E326BDFEF8265367D095058F87AAC5D76AAF80D95E3127057BEF6AB9B24027
24,240,420 UART: [art] SIG.R = 160FD8677C2E9AF4615517167F0AE4AF8BC3858DB4357EA199AC53DBDA85116D5A93FFFF74B66F3EBA63A786197DE5E2
24,247,857 UART: [art] SIG.S = 61EABB1250E349C0B816B66C31C1C233D998387C9DE379F00273B4973C8EE4343F7FBF28ABCA165E627DED9D5DF6099A
25,226,046 UART: mbox::rt_entry...
25,227,000 UART: ____ _ _ _ ____ _____
25,228,934 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,230,943 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,232,895 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,234,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,236,759 UART: |_|
25,237,591 UART:
25,350,397 UART: [rt] Runtime listening for mailbox commands...
25,352,430 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
992 UART:
1,145 UART: Running Caliptra ROM ...
2,262 UART:
2,420 UART: [state] CFI Enabled
68,336 UART: [state] LifecycleState = Production
70,099 UART: [state] DebugLocked = Yes
72,872 UART: [state] Starting the WD Timer 40000000 cycles
78,313 UART: [kat] SHA2-256
257,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
269,050 UART: [kat] ++
269,589 UART: [kat] sha1
279,499 UART: [kat] SHA2-256
282,553 UART: [kat] SHA2-384
287,505 UART: [kat] SHA2-512-ACC
290,427 UART: [kat] ECC-384
2,749,063 UART: [kat] HMAC-384Kdf
2,771,811 UART: [kat] LMS
3,301,288 UART: [kat] --
3,305,654 UART: [warm-reset] ++
3,310,183 UART: [warm-reset] --
3,314,645 UART: [state] Locking Datavault
3,318,111 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,759 UART: [state] Locking ICCM
3,322,373 UART: [exit] Launching FMC @ 0x40000130
3,330,765 UART:
3,331,062 UART: Running Caliptra FMC ...
3,332,096 UART:
3,332,246 UART: [state] CFI Enabled
3,382,127 UART: [aliasrt :skip pcr extension
3,383,380 UART: [art] Extend RT PCRs Done
3,384,441 UART: [art] Lock RT PCRs Done
3,385,559 UART: [art] Populate DV Done
3,391,020 UART: [fht] FMC Alias Private Key: 7
3,392,620 UART: [art] Derive CDI
3,393,358 UART: [art] Store in in slot 0x4
3,450,611 UART: [art] Derive Key Pair
3,451,657 UART: [art] Store priv key in slot 0x5
5,914,464 UART: [art] Derive Key Pair - Done
5,927,262 UART: [art] Signing Cert with AUTHO
5,928,577 UART: RITY.KEYID = 7
7,640,736 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,280 UART: [art] PUB.X = BF053AC905850CE5B13EC4DA70F7A4032F5E95B7914E7AE2EA9D0984311FF7931802BB415CF6FD04FF7DA74258C7BD45
7,649,561 UART: [art] PUB.Y = 68A65CC593B29CD5FDC5B6475B93ABA937E326BDFEF8265367D095058F87AAC5D76AAF80D95E3127057BEF6AB9B24027
7,656,799 UART: [art] SIG.R = 160FD8677C2E9AF4615517167F0AE4AF8BC3858DB4357EA199AC53DBDA85116D5A93FFFF74B66F3EBA63A786197DE5E2
7,664,190 UART: [art] SIG.S = 61EABB1250E349C0B816B66C31C1C233D998387C9DE379F00273B4973C8EE4343F7FBF28ABCA165E627DED9D5DF6099A
8,642,508 UART: mbox::rt_entry...
8,643,471 UART: ____ _ _ _ ____ _____
8,645,408 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,649,356 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,651,289 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,653,223 UART: |_|
8,654,060 UART:
8,940,211 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,038 UART:
192,420 UART: Running Caliptra ROM ...
193,613 UART:
193,770 UART: [state] CFI Enabled
266,723 UART: [state] LifecycleState = Production
268,536 UART: [state] DebugLocked = Yes
271,111 UART: [state] Starting the WD Timer 40000000 cycles
276,084 UART: [kat] SHA2-256
455,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,810 UART: [kat] ++
467,610 UART: [kat] sha1
477,855 UART: [kat] SHA2-256
480,874 UART: [kat] SHA2-384
488,001 UART: [kat] SHA2-512-ACC
490,959 UART: [kat] ECC-384
2,948,667 UART: [kat] HMAC-384Kdf
2,972,566 UART: [kat] LMS
3,502,020 UART: [kat] --
3,505,314 UART: [cold-reset] ++
3,507,627 UART: [fht] FHT @ 0x50003400
3,519,289 UART: [idev] ++
3,519,868 UART: [idev] CDI.KEYID = 6
3,520,799 UART: [idev] SUBJECT.KEYID = 7
3,521,980 UART: [idev] UDS.KEYID = 0
3,523,059 ready_for_fw is high
3,523,263 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,622,286 UART: [idev] Erasing UDS.KEYID = 0
6,025,237 UART: [idev] Sha1 KeyId Algorithm
6,047,688 UART: [idev] --
6,051,852 UART: [ldev] ++
6,052,428 UART: [ldev] CDI.KEYID = 6
6,053,349 UART: [ldev] SUBJECT.KEYID = 5
6,054,565 UART: [ldev] AUTHORITY.KEYID = 7
6,055,804 UART: [ldev] FE.KEYID = 1
6,101,785 UART: [ldev] Erasing FE.KEYID = 1
8,604,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,342 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,329 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,148 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,143 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,924 UART: [ldev] --
10,413,116 UART: [fwproc] Wait for Commands...
10,415,212 UART: [fwproc] Recv command 0x46574c44
10,417,323 UART: [fwproc] Recv'd Img size: 78632 bytes
13,413,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,479,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,548,156 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,741,566 >>> mbox cmd response: success
13,745,866 UART: [afmc] ++
13,746,481 UART: [afmc] CDI.KEYID = 6
13,747,604 UART: [afmc] SUBJECT.KEYID = 7
13,748,663 UART: [afmc] AUTHORITY.KEYID = 5
16,274,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,998,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,999,991 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,015,964 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,031,827 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,047,574 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,069,634 UART: [afmc] --
18,074,277 UART: [cold-reset] --
18,078,108 UART: [state] Locking Datavault
18,082,878 UART: [state] Locking PCR0, PCR1 and PCR31
18,084,533 UART: [state] Locking ICCM
18,086,529 UART: [exit] Launching FMC @ 0x40000130
18,094,929 UART:
18,095,167 UART: Running Caliptra FMC ...
18,096,221 UART:
18,096,378 UART: [state] CFI Enabled
18,156,433 UART: [fht] FMC Alias Private Key: 7
19,920,238 UART: [art] Extend RT PCRs Done
19,921,462 UART: [art] Lock RT PCRs Done
19,923,086 UART: [art] Populate DV Done
19,928,553 UART: [fht] FMC Alias Private Key: 7
19,930,101 UART: [art] Derive CDI
19,930,923 UART: [art] Store in in slot 0x4
19,988,755 UART: [art] Derive Key Pair
19,989,798 UART: [art] Store priv key in slot 0x5
22,453,039 UART: [art] Derive Key Pair - Done
22,466,253 UART: [art] Signing Cert with AUTHO
22,467,748 UART: RITY.KEYID = 7
24,178,560 UART: [art] Erasing AUTHORITY.KEYID = 7
24,180,070 UART: [art] PUB.X = 868414E8735C56D1C13CD50D2ABC321B0EE7BACB9E323C0029A78BDE4577129BBF0435B2C27C1485EC7DCB8BA3209043
24,187,308 UART: [art] PUB.Y = 053D634699D2F915C86336A25A0BB902776851B26EFCAB336ACA664B266D006C536325B43D15E45E604C7890AF49DF0D
24,194,523 UART: [art] SIG.R = 178A03F042C39AD4BBB7C5ACB19243ECB203E1EAB131437B0838151BFE405A4657B9B8CE1D3872F6A536D5858FFCEFD4
24,201,939 UART: [art] SIG.S = BECF93816C79585A48A9CC0468E3F7DDC1A8416D96AE714DA0D1A3DDAF51072CC69211367208D1A1D1E0FF2F2C9A7221
25,180,488 UART: mbox::rt_entry...
25,181,450 UART: ____ _ _ _ ____ _____
25,183,434 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,185,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,187,517 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,189,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,191,427 UART: |_|
25,192,264 UART:
25,306,258 UART: [rt] Runtime listening for mailbox commands...
25,308,270 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
995 UART:
1,241 UART: Running Caliptra ROM ...
2,258 UART:
2,401 UART: [state] CFI Enabled
63,517 UART: [state] LifecycleState = Production
65,278 UART: [state] DebugLocked = Yes
67,426 UART: [state] Starting the WD Timer 40000000 cycles
72,048 UART: [kat] SHA2-256
251,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,760 UART: [kat] ++
263,210 UART: [kat] sha1
274,050 UART: [kat] SHA2-256
277,116 UART: [kat] SHA2-384
283,197 UART: [kat] SHA2-512-ACC
286,177 UART: [kat] ECC-384
2,748,052 UART: [kat] HMAC-384Kdf
2,769,947 UART: [kat] LMS
3,299,462 UART: [kat] --
3,302,859 UART: [warm-reset] ++
3,309,173 UART: [warm-reset] --
3,312,773 UART: [state] Locking Datavault
3,315,321 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,967 UART: [state] Locking ICCM
3,319,444 UART: [exit] Launching FMC @ 0x40000130
3,327,885 UART:
3,328,139 UART: Running Caliptra FMC ...
3,329,246 UART:
3,329,428 UART: [state] CFI Enabled
3,378,723 UART: [aliasrt :skip pcr extension
3,379,980 UART: [art] Extend RT PCRs Done
3,381,122 UART: [art] Lock RT PCRs Done
3,382,191 UART: [art] Populate DV Done
3,387,657 UART: [fht] FMC Alias Private Key: 7
3,389,419 UART: [art] Derive CDI
3,390,234 UART: [art] Store in in slot 0x4
3,447,092 UART: [art] Derive Key Pair
3,448,147 UART: [art] Store priv key in slot 0x5
5,910,883 UART: [art] Derive Key Pair - Done
5,923,673 UART: [art] Signing Cert with AUTHO
5,924,983 UART: RITY.KEYID = 7
7,636,797 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,313 UART: [art] PUB.X = 868414E8735C56D1C13CD50D2ABC321B0EE7BACB9E323C0029A78BDE4577129BBF0435B2C27C1485EC7DCB8BA3209043
7,645,598 UART: [art] PUB.Y = 053D634699D2F915C86336A25A0BB902776851B26EFCAB336ACA664B266D006C536325B43D15E45E604C7890AF49DF0D
7,652,797 UART: [art] SIG.R = 178A03F042C39AD4BBB7C5ACB19243ECB203E1EAB131437B0838151BFE405A4657B9B8CE1D3872F6A536D5858FFCEFD4
7,660,225 UART: [art] SIG.S = BECF93816C79585A48A9CC0468E3F7DDC1A8416D96AE714DA0D1A3DDAF51072CC69211367208D1A1D1E0FF2F2C9A7221
8,638,364 UART: mbox::rt_entry...
8,639,333 UART: ____ _ _ _ ____ _____
8,641,325 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,238 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,097 UART: |_|
8,649,982 UART:
8,934,329 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
191,798 UART:
192,165 UART: Running Caliptra ROM ...
193,289 UART:
603,020 UART: [state] CFI Enabled
615,211 UART: [state] LifecycleState = Production
616,974 UART: [state] DebugLocked = Yes
618,596 UART: [state] Starting the WD Timer 40000000 cycles
624,046 UART: [kat] SHA2-256
803,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,719 UART: [kat] ++
815,350 UART: [kat] sha1
826,470 UART: [kat] SHA2-256
829,492 UART: [kat] SHA2-384
836,477 UART: [kat] SHA2-512-ACC
839,414 UART: [kat] ECC-384
3,283,277 UART: [kat] HMAC-384Kdf
3,296,886 UART: [kat] LMS
3,826,382 UART: [kat] --
3,831,681 UART: [cold-reset] ++
3,833,402 UART: [fht] FHT @ 0x50003400
3,843,811 UART: [idev] ++
3,844,380 UART: [idev] CDI.KEYID = 6
3,845,287 UART: [idev] SUBJECT.KEYID = 7
3,846,530 UART: [idev] UDS.KEYID = 0
3,847,462 ready_for_fw is high
3,847,696 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,946,722 UART: [idev] Erasing UDS.KEYID = 0
6,318,669 UART: [idev] Sha1 KeyId Algorithm
6,341,460 UART: [idev] --
6,345,331 UART: [ldev] ++
6,345,912 UART: [ldev] CDI.KEYID = 6
6,346,827 UART: [ldev] SUBJECT.KEYID = 5
6,348,039 UART: [ldev] AUTHORITY.KEYID = 7
6,349,266 UART: [ldev] FE.KEYID = 1
6,359,422 UART: [ldev] Erasing FE.KEYID = 1
8,832,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,286 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,567,262 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,583,147 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,599,053 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,620,685 UART: [ldev] --
10,625,111 UART: [fwproc] Wait for Commands...
10,628,180 UART: [fwproc] Recv command 0x46574c44
10,630,270 UART: [fwproc] Recv'd Img size: 78632 bytes
13,626,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,702,457 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,771,262 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,963,576 >>> mbox cmd response: success
13,967,612 UART: [afmc] ++
13,968,222 UART: [afmc] CDI.KEYID = 6
13,969,129 UART: [afmc] SUBJECT.KEYID = 7
13,970,340 UART: [afmc] AUTHORITY.KEYID = 5
16,467,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,187,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,189,816 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,205,805 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,221,678 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,237,407 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,259,988 UART: [afmc] --
18,263,497 UART: [cold-reset] --
18,267,848 UART: [state] Locking Datavault
18,274,224 UART: [state] Locking PCR0, PCR1 and PCR31
18,275,922 UART: [state] Locking ICCM
18,277,474 UART: [exit] Launching FMC @ 0x40000130
18,285,920 UART:
18,286,148 UART: Running Caliptra FMC ...
18,287,246 UART:
18,287,403 UART: [state] CFI Enabled
18,295,822 UART: [fht] FMC Alias Private Key: 7
20,053,066 UART: [art] Extend RT PCRs Done
20,054,293 UART: [art] Lock RT PCRs Done
20,056,024 UART: [art] Populate DV Done
20,061,444 UART: [fht] FMC Alias Private Key: 7
20,062,946 UART: [art] Derive CDI
20,063,696 UART: [art] Store in in slot 0x4
20,106,692 UART: [art] Derive Key Pair
20,107,846 UART: [art] Store priv key in slot 0x5
22,534,695 UART: [art] Derive Key Pair - Done
22,547,913 UART: [art] Signing Cert with AUTHO
22,549,218 UART: RITY.KEYID = 7
24,254,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,256,494 UART: [art] PUB.X = 75D421A76604F744820E7AAC6AA7F79E6FA9CC50552FA40859CD3A9BB251049B4604956EE05719956844EE3C4AC72D25
24,263,641 UART: [art] PUB.Y = 18FD634C6633DF89823B0C16CF3A0ACE0C67E594E7AFFEEC1BD2383A78BE3922CB07866D08765A9715C64A9487178471
24,270,881 UART: [art] SIG.R = 925C7364D2D2D3726B1F1D9B31B3D2ECAD7E82C1F13B43075E031CF62E138735A4E8787D582912A0EF9A0D83589ACB37
24,278,279 UART: [art] SIG.S = 305B893CDE6F73C865D8EDC6DEE26D2C981F365FA546C13870FCE8E600061ACCDFA0DF1C6B0798114DE5E81697033F5D
25,256,487 UART: mbox::rt_entry...
25,257,437 UART: ____ _ _ _ ____ _____
25,259,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,261,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,263,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,265,298 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,267,152 UART: |_|
25,267,948 UART:
25,381,411 UART: [rt] Runtime listening for mailbox commands...
25,383,449 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
1,008 UART:
1,176 UART: Running Caliptra ROM ...
2,403 UART:
15,152,722 UART: [state] CFI Enabled
15,165,254 UART: [state] LifecycleState = Production
15,167,001 UART: [state] DebugLocked = Yes
15,169,532 UART: [state] Starting the WD Timer 40000000 cycles
15,173,655 UART: [kat] SHA2-256
15,352,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,364,376 UART: [kat] ++
15,364,832 UART: [kat] sha1
15,375,713 UART: [kat] SHA2-256
15,378,732 UART: [kat] SHA2-384
15,384,981 UART: [kat] SHA2-512-ACC
15,387,917 UART: [kat] ECC-384
17,832,298 UART: [kat] HMAC-384Kdf
17,844,905 UART: [kat] LMS
18,374,444 UART: [kat] --
18,378,805 UART: [warm-reset] ++
18,384,072 UART: [warm-reset] --
18,387,178 UART: [state] Locking Datavault
18,389,892 UART: [state] Locking PCR0, PCR1 and PCR31
18,391,674 UART: [state] Locking ICCM
18,393,559 UART: [exit] Launching FMC @ 0x40000130
18,401,961 UART:
18,402,219 UART: Running Caliptra FMC ...
18,403,318 UART:
18,403,469 UART: [state] CFI Enabled
18,405,301 UART: [aliasrt :skip pcr extension
18,406,545 UART: [art] Extend RT PCRs Done
18,407,676 UART: [art] Lock RT PCRs Done
18,408,904 UART: [art] Populate DV Done
18,414,412 UART: [fht] FMC Alias Private Key: 7
18,416,049 UART: [art] Derive CDI
18,416,860 UART: [art] Store in in slot 0x4
18,459,803 UART: [art] Derive Key Pair
18,460,816 UART: [art] Store priv key in slot 0x5
20,887,364 UART: [art] Derive Key Pair - Done
20,900,358 UART: [art] Signing Cert with AUTHO
20,901,657 UART: RITY.KEYID = 7
22,607,075 UART: [art] Erasing AUTHORITY.KEYID = 7
22,608,592 UART: [art] PUB.X = 75D421A76604F744820E7AAC6AA7F79E6FA9CC50552FA40859CD3A9BB251049B4604956EE05719956844EE3C4AC72D25
22,615,836 UART: [art] PUB.Y = 18FD634C6633DF89823B0C16CF3A0ACE0C67E594E7AFFEEC1BD2383A78BE3922CB07866D08765A9715C64A9487178471
22,623,075 UART: [art] SIG.R = 925C7364D2D2D3726B1F1D9B31B3D2ECAD7E82C1F13B43075E031CF62E138735A4E8787D582912A0EF9A0D83589ACB37
22,630,474 UART: [art] SIG.S = 305B893CDE6F73C865D8EDC6DEE26D2C981F365FA546C13870FCE8E600061ACCDFA0DF1C6B0798114DE5E81697033F5D
23,608,695 UART: mbox::rt_entry...
23,609,657 UART: ____ _ _ _ ____ _____
23,611,768 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,613,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,615,621 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,617,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,619,391 UART: |_|
23,620,270 UART:
23,900,278 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
191,815 UART:
192,183 UART: Running Caliptra ROM ...
193,300 UART:
602,882 UART: [state] CFI Enabled
616,540 UART: [state] LifecycleState = Production
618,227 UART: [state] DebugLocked = Yes
619,786 UART: [state] Starting the WD Timer 40000000 cycles
624,445 UART: [kat] SHA2-256
803,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,173 UART: [kat] ++
815,705 UART: [kat] sha1
827,908 UART: [kat] SHA2-256
830,955 UART: [kat] SHA2-384
836,595 UART: [kat] SHA2-512-ACC
839,538 UART: [kat] ECC-384
3,282,448 UART: [kat] HMAC-384Kdf
3,294,197 UART: [kat] LMS
3,823,716 UART: [kat] --
3,828,655 UART: [cold-reset] ++
3,830,728 UART: [fht] FHT @ 0x50003400
3,841,919 UART: [idev] ++
3,842,480 UART: [idev] CDI.KEYID = 6
3,843,360 UART: [idev] SUBJECT.KEYID = 7
3,844,602 UART: [idev] UDS.KEYID = 0
3,845,524 ready_for_fw is high
3,845,713 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,944,535 UART: [idev] Erasing UDS.KEYID = 0
6,318,250 UART: [idev] Sha1 KeyId Algorithm
6,341,286 UART: [idev] --
6,344,851 UART: [ldev] ++
6,345,413 UART: [ldev] CDI.KEYID = 6
6,346,516 UART: [ldev] SUBJECT.KEYID = 5
6,347,632 UART: [ldev] AUTHORITY.KEYID = 7
6,348,811 UART: [ldev] FE.KEYID = 1
6,360,158 UART: [ldev] Erasing FE.KEYID = 1
8,834,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,503 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,495 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,584,309 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,298 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,792 UART: [ldev] --
10,624,422 UART: [fwproc] Wait for Commands...
10,627,436 UART: [fwproc] Recv command 0x46574c44
10,629,532 UART: [fwproc] Recv'd Img size: 78632 bytes
13,627,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,698,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,767,460 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,960,374 >>> mbox cmd response: success
13,965,442 UART: [afmc] ++
13,966,065 UART: [afmc] CDI.KEYID = 6
13,966,982 UART: [afmc] SUBJECT.KEYID = 7
13,968,142 UART: [afmc] AUTHORITY.KEYID = 5
16,467,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,190,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,192,120 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,208,102 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,223,971 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,239,660 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,262,377 UART: [afmc] --
18,266,606 UART: [cold-reset] --
18,271,314 UART: [state] Locking Datavault
18,277,319 UART: [state] Locking PCR0, PCR1 and PCR31
18,279,013 UART: [state] Locking ICCM
18,281,159 UART: [exit] Launching FMC @ 0x40000130
18,289,562 UART:
18,289,795 UART: Running Caliptra FMC ...
18,290,840 UART:
18,290,995 UART: [state] CFI Enabled
18,299,146 UART: [fht] FMC Alias Private Key: 7
20,055,983 UART: [art] Extend RT PCRs Done
20,057,193 UART: [art] Lock RT PCRs Done
20,059,136 UART: [art] Populate DV Done
20,064,658 UART: [fht] FMC Alias Private Key: 7
20,066,221 UART: [art] Derive CDI
20,066,979 UART: [art] Store in in slot 0x4
20,109,620 UART: [art] Derive Key Pair
20,110,684 UART: [art] Store priv key in slot 0x5
22,537,190 UART: [art] Derive Key Pair - Done
22,550,292 UART: [art] Signing Cert with AUTHO
22,551,598 UART: RITY.KEYID = 7
24,256,967 UART: [art] Erasing AUTHORITY.KEYID = 7
24,258,475 UART: [art] PUB.X = 35E3053FF8D4D3E7507CE52EDBDDA1AB6E276CFABB80FBC5106F258EBEC2B830879C246D961BEA6FCF6208B42CFC02DD
24,265,760 UART: [art] PUB.Y = 4C16FF68667FED9318B87A10B6B508AF0E051ABF247156C45B62EC4CDB4BCF40FA8A11670000B26D871590E377AD7736
24,273,032 UART: [art] SIG.R = 9B9C3CD8E20C6785734159D83C4565D5A4774BE1E240F988E478493163DF176F2D30F413328338038BEA21252322330D
24,280,377 UART: [art] SIG.S = 013E1A09A18C71D05B9979562E0A67985B0441AF9F137245D0AB07F5633F3E57395AD27D028627CDEEC35C072F14CD37
25,258,859 UART: mbox::rt_entry...
25,259,807 UART: ____ _ _ _ ____ _____
25,261,733 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,263,753 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,265,686 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,267,614 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,269,546 UART: |_|
25,270,353 UART:
25,383,745 UART: [rt] Runtime listening for mailbox commands...
25,385,762 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
988 UART:
1,141 UART: Running Caliptra ROM ...
2,256 UART:
15,142,096 UART: [state] CFI Enabled
15,157,373 UART: [state] LifecycleState = Production
15,159,129 UART: [state] DebugLocked = Yes
15,160,658 UART: [state] Starting the WD Timer 40000000 cycles
15,165,443 UART: [kat] SHA2-256
15,344,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,356,141 UART: [kat] ++
15,356,682 UART: [kat] sha1
15,367,904 UART: [kat] SHA2-256
15,370,957 UART: [kat] SHA2-384
15,378,020 UART: [kat] SHA2-512-ACC
15,380,969 UART: [kat] ECC-384
17,822,685 UART: [kat] HMAC-384Kdf
17,835,508 UART: [kat] LMS
18,365,085 UART: [kat] --
18,369,936 UART: [warm-reset] ++
18,376,459 UART: [warm-reset] --
18,379,891 UART: [state] Locking Datavault
18,383,300 UART: [state] Locking PCR0, PCR1 and PCR31
18,384,942 UART: [state] Locking ICCM
18,386,549 UART: [exit] Launching FMC @ 0x40000130
18,394,961 UART:
18,395,200 UART: Running Caliptra FMC ...
18,396,297 UART:
18,396,452 UART: [state] CFI Enabled
18,398,553 UART: [aliasrt :skip pcr extension
18,399,934 UART: [art] Extend RT PCRs Done
18,401,101 UART: [art] Lock RT PCRs Done
18,402,168 UART: [art] Populate DV Done
18,407,462 UART: [fht] FMC Alias Private Key: 7
18,409,207 UART: [art] Derive CDI
18,410,015 UART: [art] Store in in slot 0x4
18,452,436 UART: [art] Derive Key Pair
18,453,446 UART: [art] Store priv key in slot 0x5
20,880,178 UART: [art] Derive Key Pair - Done
20,892,786 UART: [art] Signing Cert with AUTHO
20,894,091 UART: RITY.KEYID = 7
22,599,874 UART: [art] Erasing AUTHORITY.KEYID = 7
22,601,392 UART: [art] PUB.X = 35E3053FF8D4D3E7507CE52EDBDDA1AB6E276CFABB80FBC5106F258EBEC2B830879C246D961BEA6FCF6208B42CFC02DD
22,608,671 UART: [art] PUB.Y = 4C16FF68667FED9318B87A10B6B508AF0E051ABF247156C45B62EC4CDB4BCF40FA8A11670000B26D871590E377AD7736
22,615,935 UART: [art] SIG.R = 9B9C3CD8E20C6785734159D83C4565D5A4774BE1E240F988E478493163DF176F2D30F413328338038BEA21252322330D
22,623,244 UART: [art] SIG.S = 013E1A09A18C71D05B9979562E0A67985B0441AF9F137245D0AB07F5633F3E57395AD27D028627CDEEC35C072F14CD37
23,601,240 UART: mbox::rt_entry...
23,602,202 UART: ____ _ _ _ ____ _____
23,604,183 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,606,185 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,608,038 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,609,964 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,611,814 UART: |_|
23,612,698 UART:
23,898,870 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Production
85,785 UART: [state] DebugLocked = Yes
86,465 UART: [state] Starting the WD Timer 40000000 cycles
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
921,078 UART: [kat] LMS
1,169,390 UART: [kat] --
1,170,133 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,174,582 ready_for_fw is high
1,174,582 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,231 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,242,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,673 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,367 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,237 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,943 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,021 UART: [ldev] --
1,281,291 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 78632 bytes
2,195,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,754 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,009 >>> mbox cmd response: success
2,335,237 UART: [afmc] ++
2,335,405 UART: [afmc] CDI.KEYID = 6
2,335,768 UART: [afmc] SUBJECT.KEYID = 7
2,336,194 UART: [afmc] AUTHORITY.KEYID = 5
2,371,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,658 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,377 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,270 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,977 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,696 UART: [afmc] --
2,414,647 UART: [cold-reset] --
2,415,291 UART: [state] Locking Datavault
2,416,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,008 UART: [state] Locking ICCM
2,417,656 UART: [exit] Launching FMC @ 0x40000130
2,422,985 UART:
2,423,001 UART: Running Caliptra FMC ...
2,423,409 UART:
2,423,463 UART: [state] CFI Enabled
2,433,438 UART: [fht] FMC Alias Private Key: 7
2,541,447 UART: [art] Extend RT PCRs Done
2,541,875 UART: [art] Lock RT PCRs Done
2,543,459 UART: [art] Populate DV Done
2,551,647 UART: [fht] FMC Alias Private Key: 7
2,552,679 UART: [art] Derive CDI
2,552,959 UART: [art] Store in in slot 0x4
2,638,756 UART: [art] Derive Key Pair
2,639,116 UART: [art] Store priv key in slot 0x5
2,652,156 UART: [art] Derive Key Pair - Done
2,667,117 UART: [art] Signing Cert with AUTHO
2,667,597 UART: RITY.KEYID = 7
2,682,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,458 UART: [art] PUB.X = B8A47E8D4017A572180383881991473354763BE31F1710BB8FE49F4808F83E3A64F72FD48E07EA4AA17CB7E3942A52B6
2,690,215 UART: [art] PUB.Y = 37B1D2C0C9AB84C24AA64DC9C6825A2582DB35FF6AEF6D3AADFABC58210BEFD5CB3EF3725622E5CF19EF545BE54A8076
2,697,188 UART: [art] SIG.R = D9A5361A2F58B00047DE36230CA358E965F690BE35C8058C17F701AAD667D9D6F4042ED0A2EB14FEC98C66F442A8C19B
2,703,932 UART: [art] SIG.S = 3076204F2E77E49ECE036F41C5445B90EE54FD2E3CF217E7D659FCB896F66F23A6B8F8CBC0C9380CA3441E1857CD6A6D
2,727,749 UART: mbox::rt_entry...
2,728,121 UART: ____ _ _ _ ____ _____
2,728,905 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,473 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,241 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,009 UART: |_|
2,732,321 UART:
2,838,637 UART: [rt] Runtime listening for mailbox commands...
2,839,399 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,839,492 UART:
2,839,508 UART: Running Caliptra ROM ...
2,839,916 UART:
2,839,971 UART: [state] CFI Enabled
2,842,748 UART: [state] LifecycleState = Production
2,843,356 UART: [state] DebugLocked = Yes
2,843,884 UART: [state] Starting the WD Timer 40000000 cycles
2,845,497 UART: [kat] SHA2-256
3,649,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,176 UART: [kat] ++
3,653,328 UART: [kat] sha1
3,657,658 UART: [kat] SHA2-256
3,659,598 UART: [kat] SHA2-384
3,662,429 UART: [kat] SHA2-512-ACC
3,664,330 UART: [kat] ECC-384
3,673,893 UART: [kat] HMAC-384Kdf
3,678,603 UART: [kat] LMS
3,926,915 UART: [kat] --
3,927,839 UART: [warm-reset] ++
3,928,700 UART: [warm-reset] --
3,929,511 UART: [state] Locking Datavault
3,930,341 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,945 UART: [state] Locking ICCM
3,931,603 UART: [exit] Launching FMC @ 0x40000130
3,936,932 UART:
3,936,948 UART: Running Caliptra FMC ...
3,937,356 UART:
3,937,410 UART: [state] CFI Enabled
3,938,743 UART: [aliasrt :skip pcr extension
3,939,216 UART: [art] Extend RT PCRs Done
3,939,644 UART: [art] Lock RT PCRs Done
3,940,903 UART: [art] Populate DV Done
3,949,141 UART: [fht] FMC Alias Private Key: 7
3,950,129 UART: [art] Derive CDI
3,950,409 UART: [art] Store in in slot 0x4
4,035,674 UART: [art] Derive Key Pair
4,036,034 UART: [art] Store priv key in slot 0x5
4,049,606 UART: [art] Derive Key Pair - Done
4,063,999 UART: [art] Signing Cert with AUTHO
4,064,479 UART: RITY.KEYID = 7
4,079,539 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,304 UART: [art] PUB.X = B8A47E8D4017A572180383881991473354763BE31F1710BB8FE49F4808F83E3A64F72FD48E07EA4AA17CB7E3942A52B6
4,087,061 UART: [art] PUB.Y = 37B1D2C0C9AB84C24AA64DC9C6825A2582DB35FF6AEF6D3AADFABC58210BEFD5CB3EF3725622E5CF19EF545BE54A8076
4,094,034 UART: [art] SIG.R = D9A5361A2F58B00047DE36230CA358E965F690BE35C8058C17F701AAD667D9D6F4042ED0A2EB14FEC98C66F442A8C19B
4,100,778 UART: [art] SIG.S = 3076204F2E77E49ECE036F41C5445B90EE54FD2E3CF217E7D659FCB896F66F23A6B8F8CBC0C9380CA3441E1857CD6A6D
4,124,475 UART: mbox::rt_entry...
4,124,847 UART: ____ _ _ _ ____ _____
4,125,631 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,431 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,199 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,127,967 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,735 UART: |_|
4,129,047 UART:
4,412,447 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Production
85,681 UART: [state] DebugLocked = Yes
86,259 UART: [state] Starting the WD Timer 40000000 cycles
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,242,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,687 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,381 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,251 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,957 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,993 UART: [ldev] --
1,282,341 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 78632 bytes
2,195,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,136 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,399 >>> mbox cmd response: success
2,335,549 UART: [afmc] ++
2,335,717 UART: [afmc] CDI.KEYID = 6
2,336,080 UART: [afmc] SUBJECT.KEYID = 7
2,336,506 UART: [afmc] AUTHORITY.KEYID = 5
2,372,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,396 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,115 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,008 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,715 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,374 UART: [afmc] --
2,415,345 UART: [cold-reset] --
2,416,159 UART: [state] Locking Datavault
2,417,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,664 UART: [state] Locking ICCM
2,418,176 UART: [exit] Launching FMC @ 0x40000130
2,423,505 UART:
2,423,521 UART: Running Caliptra FMC ...
2,423,929 UART:
2,423,983 UART: [state] CFI Enabled
2,434,238 UART: [fht] FMC Alias Private Key: 7
2,541,587 UART: [art] Extend RT PCRs Done
2,542,015 UART: [art] Lock RT PCRs Done
2,543,643 UART: [art] Populate DV Done
2,551,815 UART: [fht] FMC Alias Private Key: 7
2,552,831 UART: [art] Derive CDI
2,553,111 UART: [art] Store in in slot 0x4
2,638,498 UART: [art] Derive Key Pair
2,638,858 UART: [art] Store priv key in slot 0x5
2,652,200 UART: [art] Derive Key Pair - Done
2,666,823 UART: [art] Signing Cert with AUTHO
2,667,303 UART: RITY.KEYID = 7
2,682,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,580 UART: [art] PUB.X = 21A4AF767C92D2A8A01763D7CF6478C373ABD7EBCE0C2FDD1FAF9DDD5BA35A9F2B5F2978EF3767DF1B514335F2541568
2,690,365 UART: [art] PUB.Y = AD766369FEF7BD2849BAF23F2760FCDE9D0C705C4DE2DB2A9285CC1F10EE5CB30385B1EC50E4A861CFF7D33030CFAB60
2,697,333 UART: [art] SIG.R = C2F37C63B472CB970681569659F710AA21CC60B876FBE83CDB1E6E91236CF811F262801779BA198127A0B68458B979D7
2,704,096 UART: [art] SIG.S = F45C49E43D2E1415DA4E002761E780DCBD207B0495A1758B40C9A6D3D8394E2A50B779F5398A9D13C145E10226F2F820
2,727,671 UART: mbox::rt_entry...
2,728,043 UART: ____ _ _ _ ____ _____
2,728,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,931 UART: |_|
2,732,243 UART:
2,838,509 UART: [rt] Runtime listening for mailbox commands...
2,839,271 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,839,364 UART:
2,839,380 UART: Running Caliptra ROM ...
2,839,788 UART:
2,839,843 UART: [state] CFI Enabled
2,842,760 UART: [state] LifecycleState = Production
2,843,368 UART: [state] DebugLocked = Yes
2,844,106 UART: [state] Starting the WD Timer 40000000 cycles
2,845,811 UART: [kat] SHA2-256
3,649,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,490 UART: [kat] ++
3,653,642 UART: [kat] sha1
3,657,828 UART: [kat] SHA2-256
3,659,768 UART: [kat] SHA2-384
3,662,531 UART: [kat] SHA2-512-ACC
3,664,432 UART: [kat] ECC-384
3,674,085 UART: [kat] HMAC-384Kdf
3,678,665 UART: [kat] LMS
3,926,977 UART: [kat] --
3,927,989 UART: [warm-reset] ++
3,929,078 UART: [warm-reset] --
3,929,901 UART: [state] Locking Datavault
3,930,611 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,215 UART: [state] Locking ICCM
3,931,753 UART: [exit] Launching FMC @ 0x40000130
3,937,082 UART:
3,937,098 UART: Running Caliptra FMC ...
3,937,506 UART:
3,937,560 UART: [state] CFI Enabled
3,938,639 UART: [aliasrt :skip pcr extension
3,939,112 UART: [art] Extend RT PCRs Done
3,939,540 UART: [art] Lock RT PCRs Done
3,940,945 UART: [art] Populate DV Done
3,949,039 UART: [fht] FMC Alias Private Key: 7
3,950,069 UART: [art] Derive CDI
3,950,349 UART: [art] Store in in slot 0x4
4,036,406 UART: [art] Derive Key Pair
4,036,766 UART: [art] Store priv key in slot 0x5
4,050,914 UART: [art] Derive Key Pair - Done
4,065,565 UART: [art] Signing Cert with AUTHO
4,066,045 UART: RITY.KEYID = 7
4,081,511 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,276 UART: [art] PUB.X = 21A4AF767C92D2A8A01763D7CF6478C373ABD7EBCE0C2FDD1FAF9DDD5BA35A9F2B5F2978EF3767DF1B514335F2541568
4,089,061 UART: [art] PUB.Y = AD766369FEF7BD2849BAF23F2760FCDE9D0C705C4DE2DB2A9285CC1F10EE5CB30385B1EC50E4A861CFF7D33030CFAB60
4,096,029 UART: [art] SIG.R = C2F37C63B472CB970681569659F710AA21CC60B876FBE83CDB1E6E91236CF811F262801779BA198127A0B68458B979D7
4,102,792 UART: [art] SIG.S = F45C49E43D2E1415DA4E002761E780DCBD207B0495A1758B40C9A6D3D8394E2A50B779F5398A9D13C145E10226F2F820
4,126,389 UART: mbox::rt_entry...
4,126,761 UART: ____ _ _ _ ____ _____
4,127,545 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,113 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,881 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,649 UART: |_|
4,130,961 UART:
4,413,841 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Production
86,044 UART: [state] DebugLocked = Yes
86,614 UART: [state] Starting the WD Timer 40000000 cycles
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,940 UART: [kat] ++
896,092 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
920,903 UART: [kat] LMS
1,169,215 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 ready_for_fw is high
1,174,757 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,685 UART: [idev] Sha1 KeyId Algorithm
1,208,616 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,168 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,862 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,732 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,438 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,398 UART: [ldev] --
1,282,898 UART: [fwproc] Wait for Commands...
1,283,599 UART: [fwproc] Recv command 0x46574c44
1,284,332 UART: [fwproc] Recv'd Img size: 78632 bytes
2,197,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,721 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,336,110 >>> mbox cmd response: success
2,337,290 UART: [afmc] ++
2,337,458 UART: [afmc] CDI.KEYID = 6
2,337,821 UART: [afmc] SUBJECT.KEYID = 7
2,338,247 UART: [afmc] AUTHORITY.KEYID = 5
2,374,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,651 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,370 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,263 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,970 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,967 UART: [afmc] --
2,417,934 UART: [cold-reset] --
2,418,918 UART: [state] Locking Datavault
2,420,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,717 UART: [state] Locking ICCM
2,421,377 UART: [exit] Launching FMC @ 0x40000130
2,426,706 UART:
2,426,722 UART: Running Caliptra FMC ...
2,427,130 UART:
2,427,273 UART: [state] CFI Enabled
2,437,646 UART: [fht] FMC Alias Private Key: 7
2,545,701 UART: [art] Extend RT PCRs Done
2,546,129 UART: [art] Lock RT PCRs Done
2,547,593 UART: [art] Populate DV Done
2,555,595 UART: [fht] FMC Alias Private Key: 7
2,556,561 UART: [art] Derive CDI
2,556,841 UART: [art] Store in in slot 0x4
2,642,082 UART: [art] Derive Key Pair
2,642,442 UART: [art] Store priv key in slot 0x5
2,655,296 UART: [art] Derive Key Pair - Done
2,670,176 UART: [art] Signing Cert with AUTHO
2,670,656 UART: RITY.KEYID = 7
2,685,694 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,459 UART: [art] PUB.X = 354128F3C49916E5DB6FC132BE4249AE0A48FB2E43D925047A5405BCE68DD8E21BEFC49F3A8529641471B4B097338EE5
2,693,224 UART: [art] PUB.Y = C8BF1E2C0BB76577A7FA1326CC05A9DE452BF1874C631B7CE5B7A81DC65D2F7EEDECFB45447CEC2CDAEF4FB5CB1318C4
2,700,200 UART: [art] SIG.R = 72C739DABF3A55FAB8813C00F017D6DF6458F47A1C5ED35D86FDC045CE942CDFF2C7080241AF849BCDF092D5455436E3
2,706,956 UART: [art] SIG.S = 2B3771CE01D21FB63A3BF3F5A40CB4B1B0B5B0BB8346D2229F74F9330B467C7D3F8A6A7CD83CC0EA1471638C94592574
2,730,428 UART: mbox::rt_entry...
2,730,800 UART: ____ _ _ _ ____ _____
2,731,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,384 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,152 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,920 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,688 UART: |_|
2,735,000 UART:
2,841,691 UART: [rt] Runtime listening for mailbox commands...
2,842,453 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,842,546 UART:
2,842,562 UART: Running Caliptra ROM ...
2,842,970 UART:
2,843,112 UART: [state] CFI Enabled
2,845,665 UART: [state] LifecycleState = Production
2,846,273 UART: [state] DebugLocked = Yes
2,846,891 UART: [state] Starting the WD Timer 40000000 cycles
2,848,432 UART: [kat] SHA2-256
3,651,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,111 UART: [kat] ++
3,656,263 UART: [kat] sha1
3,660,497 UART: [kat] SHA2-256
3,662,437 UART: [kat] SHA2-384
3,665,400 UART: [kat] SHA2-512-ACC
3,667,301 UART: [kat] ECC-384
3,677,132 UART: [kat] HMAC-384Kdf
3,681,848 UART: [kat] LMS
3,930,160 UART: [kat] --
3,931,034 UART: [warm-reset] ++
3,931,775 UART: [warm-reset] --
3,932,490 UART: [state] Locking Datavault
3,933,384 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,988 UART: [state] Locking ICCM
3,934,650 UART: [exit] Launching FMC @ 0x40000130
3,939,979 UART:
3,939,995 UART: Running Caliptra FMC ...
3,940,403 UART:
3,940,546 UART: [state] CFI Enabled
3,941,847 UART: [aliasrt :skip pcr extension
3,942,320 UART: [art] Extend RT PCRs Done
3,942,748 UART: [art] Lock RT PCRs Done
3,944,181 UART: [art] Populate DV Done
3,952,495 UART: [fht] FMC Alias Private Key: 7
3,953,557 UART: [art] Derive CDI
3,953,837 UART: [art] Store in in slot 0x4
4,039,584 UART: [art] Derive Key Pair
4,039,944 UART: [art] Store priv key in slot 0x5
4,053,228 UART: [art] Derive Key Pair - Done
4,068,192 UART: [art] Signing Cert with AUTHO
4,068,672 UART: RITY.KEYID = 7
4,083,888 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,653 UART: [art] PUB.X = 354128F3C49916E5DB6FC132BE4249AE0A48FB2E43D925047A5405BCE68DD8E21BEFC49F3A8529641471B4B097338EE5
4,091,418 UART: [art] PUB.Y = C8BF1E2C0BB76577A7FA1326CC05A9DE452BF1874C631B7CE5B7A81DC65D2F7EEDECFB45447CEC2CDAEF4FB5CB1318C4
4,098,394 UART: [art] SIG.R = 72C739DABF3A55FAB8813C00F017D6DF6458F47A1C5ED35D86FDC045CE942CDFF2C7080241AF849BCDF092D5455436E3
4,105,150 UART: [art] SIG.S = 2B3771CE01D21FB63A3BF3F5A40CB4B1B0B5B0BB8346D2229F74F9330B467C7D3F8A6A7CD83CC0EA1471638C94592574
4,129,042 UART: mbox::rt_entry...
4,129,414 UART: ____ _ _ _ ____ _____
4,130,198 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,998 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,766 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,534 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,302 UART: |_|
4,133,614 UART:
4,415,623 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Production
85,992 UART: [state] DebugLocked = Yes
86,568 UART: [state] Starting the WD Timer 40000000 cycles
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,933 UART: [kat] SHA2-512-ACC
906,834 UART: [kat] ECC-384
916,603 UART: [kat] HMAC-384Kdf
921,179 UART: [kat] LMS
1,169,491 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 ready_for_fw is high
1,174,449 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,857 UART: [idev] Sha1 KeyId Algorithm
1,208,750 UART: [idev] --
1,209,851 UART: [ldev] ++
1,210,019 UART: [ldev] CDI.KEYID = 6
1,210,383 UART: [ldev] SUBJECT.KEYID = 5
1,210,810 UART: [ldev] AUTHORITY.KEYID = 7
1,211,273 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,010 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,880 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,586 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,550 UART: [ldev] --
1,281,928 UART: [fwproc] Wait for Commands...
1,282,613 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,404 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,713 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,336,056 >>> mbox cmd response: success
2,337,204 UART: [afmc] ++
2,337,372 UART: [afmc] CDI.KEYID = 6
2,337,735 UART: [afmc] SUBJECT.KEYID = 7
2,338,161 UART: [afmc] AUTHORITY.KEYID = 5
2,374,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,827 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,546 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,439 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,146 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,951 UART: [afmc] --
2,417,982 UART: [cold-reset] --
2,418,852 UART: [state] Locking Datavault
2,419,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,543 UART: [state] Locking ICCM
2,421,083 UART: [exit] Launching FMC @ 0x40000130
2,426,412 UART:
2,426,428 UART: Running Caliptra FMC ...
2,426,836 UART:
2,426,979 UART: [state] CFI Enabled
2,437,550 UART: [fht] FMC Alias Private Key: 7
2,545,753 UART: [art] Extend RT PCRs Done
2,546,181 UART: [art] Lock RT PCRs Done
2,547,811 UART: [art] Populate DV Done
2,556,233 UART: [fht] FMC Alias Private Key: 7
2,557,401 UART: [art] Derive CDI
2,557,681 UART: [art] Store in in slot 0x4
2,643,344 UART: [art] Derive Key Pair
2,643,704 UART: [art] Store priv key in slot 0x5
2,657,200 UART: [art] Derive Key Pair - Done
2,671,601 UART: [art] Signing Cert with AUTHO
2,672,081 UART: RITY.KEYID = 7
2,687,811 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,576 UART: [art] PUB.X = EB2A7CFBB28D219E524ED968632CC976C80076BA3C425D0017DA9FDCF540A6160914807FF020E9DD8124AC67BC78A9D9
2,695,309 UART: [art] PUB.Y = ED6CA5A423868BDA6BFB4386998689EECCF155D623C0D8285D0D7988E12233AA76FABC929C135AECDFB1CD81E9A440B7
2,702,274 UART: [art] SIG.R = D857DF265E176E6A3F53CA448E85A23C0EFADA5166A5015AAB07E2AC191AEFC05D3888CC12B1F09CF0D3A1D11A9B3F59
2,709,055 UART: [art] SIG.S = 7A457D321C79D584280EA9477D588D29E984167DD27ED33114FC74BA92C9497AE3F71401F8D2EC30F53C1EED043D2F2B
2,732,135 UART: mbox::rt_entry...
2,732,507 UART: ____ _ _ _ ____ _____
2,733,291 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,091 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,859 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,627 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,395 UART: |_|
2,736,707 UART:
2,843,003 UART: [rt] Runtime listening for mailbox commands...
2,843,765 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,843,858 UART:
2,843,874 UART: Running Caliptra ROM ...
2,844,282 UART:
2,844,424 UART: [state] CFI Enabled
2,846,937 UART: [state] LifecycleState = Production
2,847,545 UART: [state] DebugLocked = Yes
2,848,305 UART: [state] Starting the WD Timer 40000000 cycles
2,849,822 UART: [kat] SHA2-256
3,653,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,501 UART: [kat] ++
3,657,653 UART: [kat] sha1
3,661,975 UART: [kat] SHA2-256
3,663,915 UART: [kat] SHA2-384
3,666,696 UART: [kat] SHA2-512-ACC
3,668,597 UART: [kat] ECC-384
3,678,790 UART: [kat] HMAC-384Kdf
3,683,228 UART: [kat] LMS
3,931,540 UART: [kat] --
3,932,402 UART: [warm-reset] ++
3,933,179 UART: [warm-reset] --
3,934,044 UART: [state] Locking Datavault
3,935,002 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,606 UART: [state] Locking ICCM
3,936,200 UART: [exit] Launching FMC @ 0x40000130
3,941,529 UART:
3,941,545 UART: Running Caliptra FMC ...
3,941,953 UART:
3,942,096 UART: [state] CFI Enabled
3,943,609 UART: [aliasrt :skip pcr extension
3,944,082 UART: [art] Extend RT PCRs Done
3,944,510 UART: [art] Lock RT PCRs Done
3,945,521 UART: [art] Populate DV Done
3,953,603 UART: [fht] FMC Alias Private Key: 7
3,954,727 UART: [art] Derive CDI
3,955,007 UART: [art] Store in in slot 0x4
4,040,572 UART: [art] Derive Key Pair
4,040,932 UART: [art] Store priv key in slot 0x5
4,054,294 UART: [art] Derive Key Pair - Done
4,069,025 UART: [art] Signing Cert with AUTHO
4,069,505 UART: RITY.KEYID = 7
4,084,601 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,366 UART: [art] PUB.X = EB2A7CFBB28D219E524ED968632CC976C80076BA3C425D0017DA9FDCF540A6160914807FF020E9DD8124AC67BC78A9D9
4,092,099 UART: [art] PUB.Y = ED6CA5A423868BDA6BFB4386998689EECCF155D623C0D8285D0D7988E12233AA76FABC929C135AECDFB1CD81E9A440B7
4,099,064 UART: [art] SIG.R = D857DF265E176E6A3F53CA448E85A23C0EFADA5166A5015AAB07E2AC191AEFC05D3888CC12B1F09CF0D3A1D11A9B3F59
4,105,845 UART: [art] SIG.S = 7A457D321C79D584280EA9477D588D29E984167DD27ED33114FC74BA92C9497AE3F71401F8D2EC30F53C1EED043D2F2B
4,129,375 UART: mbox::rt_entry...
4,129,747 UART: ____ _ _ _ ____ _____
4,130,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,635 UART: |_|
4,133,947 UART:
4,417,813 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,705 UART: [state] LifecycleState = Production
85,313 UART: [state] DebugLocked = Yes
85,883 UART: [state] Starting the WD Timer 40000000 cycles
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,345 UART: [kat] SHA2-256
901,285 UART: [kat] SHA2-384
903,928 UART: [kat] SHA2-512-ACC
905,829 UART: [kat] ECC-384
915,180 UART: [kat] HMAC-384Kdf
919,892 UART: [kat] LMS
1,168,204 UART: [kat] --
1,169,097 UART: [cold-reset] ++
1,169,676 UART: [fht] FHT @ 0x50003400
1,172,426 UART: [idev] ++
1,172,594 UART: [idev] CDI.KEYID = 6
1,172,955 UART: [idev] SUBJECT.KEYID = 7
1,173,380 UART: [idev] UDS.KEYID = 0
1,173,726 ready_for_fw is high
1,173,726 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,180,989 UART: [idev] Erasing UDS.KEYID = 0
1,197,592 UART: [idev] Sha1 KeyId Algorithm
1,206,537 UART: [idev] --
1,207,630 UART: [ldev] ++
1,207,798 UART: [ldev] CDI.KEYID = 6
1,208,162 UART: [ldev] SUBJECT.KEYID = 5
1,208,589 UART: [ldev] AUTHORITY.KEYID = 7
1,209,052 UART: [ldev] FE.KEYID = 1
1,214,010 UART: [ldev] Erasing FE.KEYID = 1
1,241,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,047 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,917 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,623 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,885 UART: [ldev] --
1,280,389 UART: [fwproc] Wait for Commands...
1,281,082 UART: [fwproc] Recv command 0x46574c44
1,281,815 UART: [fwproc] Recv'd Img size: 78632 bytes
2,194,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,650 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,332,813 >>> mbox cmd response: success
2,333,879 UART: [afmc] ++
2,334,047 UART: [afmc] CDI.KEYID = 6
2,334,410 UART: [afmc] SUBJECT.KEYID = 7
2,334,836 UART: [afmc] AUTHORITY.KEYID = 5
2,370,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,896 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,615 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,508 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,215 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,256 UART: [afmc] --
2,414,375 UART: [cold-reset] --
2,415,151 UART: [state] Locking Datavault
2,416,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,940 UART: [state] Locking ICCM
2,417,362 UART: [exit] Launching FMC @ 0x40000130
2,422,691 UART:
2,422,707 UART: Running Caliptra FMC ...
2,423,115 UART:
2,423,169 UART: [state] CFI Enabled
2,433,542 UART: [fht] FMC Alias Private Key: 7
2,541,349 UART: [art] Extend RT PCRs Done
2,541,777 UART: [art] Lock RT PCRs Done
2,543,179 UART: [art] Populate DV Done
2,551,417 UART: [fht] FMC Alias Private Key: 7
2,552,407 UART: [art] Derive CDI
2,552,687 UART: [art] Store in in slot 0x4
2,638,228 UART: [art] Derive Key Pair
2,638,588 UART: [art] Store priv key in slot 0x5
2,651,424 UART: [art] Derive Key Pair - Done
2,665,853 UART: [art] Signing Cert with AUTHO
2,666,333 UART: RITY.KEYID = 7
2,681,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,002 UART: [art] PUB.X = 185D13475711853C60057A73FD17E8423A23D67D5B06D1EBEF6A66DF331CC10AC48B4B298D9B03797CF9233CEF5D6DFF
2,688,768 UART: [art] PUB.Y = 824DD4261A9B20143BB1498496C20A94B706F06B29DB7B4BD08691D138FC32C46D01061B73EAE75831A30E3414146D84
2,695,697 UART: [art] SIG.R = C7E2627240923ED5585EE18BD964F113D95756EC4A0EA5ABBDB457C6C8F994E60787D48A2901B45054CDC716F9EB93BF
2,702,466 UART: [art] SIG.S = D99C574C224BD15BD7C04ED6FF51FD687ED5AE909027F975CEC4B67730CF7E252858AA5633D3D187F5343DB87216B0C9
2,726,279 UART: mbox::rt_entry...
2,726,651 UART: ____ _ _ _ ____ _____
2,727,435 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,728,235 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,003 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,730,539 UART: |_|
2,730,851 UART:
2,837,553 UART: [rt] Runtime listening for mailbox commands...
2,838,315 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,838,408 UART:
2,838,424 UART: Running Caliptra ROM ...
2,838,832 UART:
2,838,887 UART: [state] CFI Enabled
2,841,266 UART: [state] LifecycleState = Production
2,841,874 UART: [state] DebugLocked = Yes
2,842,526 UART: [state] Starting the WD Timer 40000000 cycles
2,844,211 UART: [kat] SHA2-256
3,647,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,651,890 UART: [kat] ++
3,652,042 UART: [kat] sha1
3,656,412 UART: [kat] SHA2-256
3,658,352 UART: [kat] SHA2-384
3,661,217 UART: [kat] SHA2-512-ACC
3,663,118 UART: [kat] ECC-384
3,672,951 UART: [kat] HMAC-384Kdf
3,677,357 UART: [kat] LMS
3,925,669 UART: [kat] --
3,926,127 UART: [warm-reset] ++
3,926,944 UART: [warm-reset] --
3,927,769 UART: [state] Locking Datavault
3,928,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,009 UART: [state] Locking ICCM
3,929,563 UART: [exit] Launching FMC @ 0x40000130
3,934,892 UART:
3,934,908 UART: Running Caliptra FMC ...
3,935,316 UART:
3,935,370 UART: [state] CFI Enabled
3,936,569 UART: [aliasrt :skip pcr extension
3,937,042 UART: [art] Extend RT PCRs Done
3,937,470 UART: [art] Lock RT PCRs Done
3,938,757 UART: [art] Populate DV Done
3,947,055 UART: [fht] FMC Alias Private Key: 7
3,948,041 UART: [art] Derive CDI
3,948,321 UART: [art] Store in in slot 0x4
4,034,060 UART: [art] Derive Key Pair
4,034,420 UART: [art] Store priv key in slot 0x5
4,047,754 UART: [art] Derive Key Pair - Done
4,062,179 UART: [art] Signing Cert with AUTHO
4,062,659 UART: RITY.KEYID = 7
4,077,615 UART: [art] Erasing AUTHORITY.KEYID = 7
4,078,380 UART: [art] PUB.X = 185D13475711853C60057A73FD17E8423A23D67D5B06D1EBEF6A66DF331CC10AC48B4B298D9B03797CF9233CEF5D6DFF
4,085,146 UART: [art] PUB.Y = 824DD4261A9B20143BB1498496C20A94B706F06B29DB7B4BD08691D138FC32C46D01061B73EAE75831A30E3414146D84
4,092,075 UART: [art] SIG.R = C7E2627240923ED5585EE18BD964F113D95756EC4A0EA5ABBDB457C6C8F994E60787D48A2901B45054CDC716F9EB93BF
4,098,844 UART: [art] SIG.S = D99C574C224BD15BD7C04ED6FF51FD687ED5AE909027F975CEC4B67730CF7E252858AA5633D3D187F5343DB87216B0C9
4,121,983 UART: mbox::rt_entry...
4,122,355 UART: ____ _ _ _ ____ _____
4,123,139 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,123,939 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,124,707 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,125,475 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,126,243 UART: |_|
4,126,555 UART:
4,405,241 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Production
85,637 UART: [state] DebugLocked = Yes
86,189 UART: [state] Starting the WD Timer 40000000 cycles
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,132 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,174,130 ready_for_fw is high
1,174,130 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,420 UART: [idev] Sha1 KeyId Algorithm
1,207,337 UART: [idev] --
1,208,214 UART: [ldev] ++
1,208,382 UART: [ldev] CDI.KEYID = 6
1,208,746 UART: [ldev] SUBJECT.KEYID = 5
1,209,173 UART: [ldev] AUTHORITY.KEYID = 7
1,209,636 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,979 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,673 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,543 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,249 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,413 UART: [ldev] --
1,280,771 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,056 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,297 >>> mbox cmd response: success
2,335,539 UART: [afmc] ++
2,335,707 UART: [afmc] CDI.KEYID = 6
2,336,070 UART: [afmc] SUBJECT.KEYID = 7
2,336,496 UART: [afmc] AUTHORITY.KEYID = 5
2,371,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,950 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,669 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,562 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,269 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,276 UART: [afmc] --
2,415,157 UART: [cold-reset] --
2,416,119 UART: [state] Locking Datavault
2,417,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,804 UART: [state] Locking ICCM
2,418,448 UART: [exit] Launching FMC @ 0x40000130
2,423,777 UART:
2,423,793 UART: Running Caliptra FMC ...
2,424,201 UART:
2,424,255 UART: [state] CFI Enabled
2,434,444 UART: [fht] FMC Alias Private Key: 7
2,542,421 UART: [art] Extend RT PCRs Done
2,542,849 UART: [art] Lock RT PCRs Done
2,544,451 UART: [art] Populate DV Done
2,552,599 UART: [fht] FMC Alias Private Key: 7
2,553,745 UART: [art] Derive CDI
2,554,025 UART: [art] Store in in slot 0x4
2,639,774 UART: [art] Derive Key Pair
2,640,134 UART: [art] Store priv key in slot 0x5
2,653,512 UART: [art] Derive Key Pair - Done
2,668,599 UART: [art] Signing Cert with AUTHO
2,669,079 UART: RITY.KEYID = 7
2,684,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,336 UART: [art] PUB.X = 63858F62534D6E5326A02144AB1D65A83702C14D3B5C030F1A0F8C84834AD8FD004BAE4FCAB6B8845800A2D0103AAF25
2,692,054 UART: [art] PUB.Y = 66C32E238EF862AA0FA00F9986BEF2729F16344F19D2648200AE70D59F22597FADB76E2B4533CC65A1F7E32AE1ADA38F
2,698,986 UART: [art] SIG.R = C7E2DFB0678B69CB3A75E739B3D379481CDAD3E6DE74733835E23ECC1CB1E44E430CDC7E82CE100C21734B2A41BFF107
2,705,763 UART: [art] SIG.S = 4D1D62DBECCD4E60DB9431CB6394ED760EADCD2C2FCAE77C41E6EFFF313429C79A975D0E837B295EF5C65E14BC014132
2,728,883 UART: mbox::rt_entry...
2,729,255 UART: ____ _ _ _ ____ _____
2,730,039 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,839 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,607 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,375 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,143 UART: |_|
2,733,455 UART:
2,839,149 UART: [rt] Runtime listening for mailbox commands...
2,839,911 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,840,004 UART:
2,840,020 UART: Running Caliptra ROM ...
2,840,428 UART:
2,840,483 UART: [state] CFI Enabled
2,843,056 UART: [state] LifecycleState = Production
2,843,664 UART: [state] DebugLocked = Yes
2,844,410 UART: [state] Starting the WD Timer 40000000 cycles
2,845,959 UART: [kat] SHA2-256
3,649,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,638 UART: [kat] ++
3,653,790 UART: [kat] sha1
3,657,914 UART: [kat] SHA2-256
3,659,854 UART: [kat] SHA2-384
3,662,499 UART: [kat] SHA2-512-ACC
3,664,400 UART: [kat] ECC-384
3,673,649 UART: [kat] HMAC-384Kdf
3,678,125 UART: [kat] LMS
3,926,437 UART: [kat] --
3,927,251 UART: [warm-reset] ++
3,928,250 UART: [warm-reset] --
3,929,023 UART: [state] Locking Datavault
3,929,575 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,179 UART: [state] Locking ICCM
3,930,775 UART: [exit] Launching FMC @ 0x40000130
3,936,104 UART:
3,936,120 UART: Running Caliptra FMC ...
3,936,528 UART:
3,936,582 UART: [state] CFI Enabled
3,937,793 UART: [aliasrt :skip pcr extension
3,938,266 UART: [art] Extend RT PCRs Done
3,938,694 UART: [art] Lock RT PCRs Done
3,940,025 UART: [art] Populate DV Done
3,948,107 UART: [fht] FMC Alias Private Key: 7
3,949,129 UART: [art] Derive CDI
3,949,409 UART: [art] Store in in slot 0x4
4,034,832 UART: [art] Derive Key Pair
4,035,192 UART: [art] Store priv key in slot 0x5
4,048,140 UART: [art] Derive Key Pair - Done
4,063,243 UART: [art] Signing Cert with AUTHO
4,063,723 UART: RITY.KEYID = 7
4,078,991 UART: [art] Erasing AUTHORITY.KEYID = 7
4,079,756 UART: [art] PUB.X = 63858F62534D6E5326A02144AB1D65A83702C14D3B5C030F1A0F8C84834AD8FD004BAE4FCAB6B8845800A2D0103AAF25
4,086,474 UART: [art] PUB.Y = 66C32E238EF862AA0FA00F9986BEF2729F16344F19D2648200AE70D59F22597FADB76E2B4533CC65A1F7E32AE1ADA38F
4,093,406 UART: [art] SIG.R = C7E2DFB0678B69CB3A75E739B3D379481CDAD3E6DE74733835E23ECC1CB1E44E430CDC7E82CE100C21734B2A41BFF107
4,100,183 UART: [art] SIG.S = 4D1D62DBECCD4E60DB9431CB6394ED760EADCD2C2FCAE77C41E6EFFF313429C79A975D0E837B295EF5C65E14BC014132
4,123,101 UART: mbox::rt_entry...
4,123,473 UART: ____ _ _ _ ____ _____
4,124,257 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,057 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,125,825 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,593 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,361 UART: |_|
4,127,673 UART:
4,407,951 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Production
85,662 UART: [state] DebugLocked = Yes
86,352 UART: [state] Starting the WD Timer 40000000 cycles
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
916,053 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,174,287 ready_for_fw is high
1,174,287 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,199,085 UART: [idev] Sha1 KeyId Algorithm
1,207,962 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,789 UART: [ldev] Erasing FE.KEYID = 1
1,241,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,230 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,924 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,794 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,500 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,678 UART: [ldev] --
1,281,028 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 78632 bytes
2,197,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,253 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,335,638 >>> mbox cmd response: success
2,336,756 UART: [afmc] ++
2,336,924 UART: [afmc] CDI.KEYID = 6
2,337,287 UART: [afmc] SUBJECT.KEYID = 7
2,337,713 UART: [afmc] AUTHORITY.KEYID = 5
2,373,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,385 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,104 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,997 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,704 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,595 UART: [afmc] --
2,416,640 UART: [cold-reset] --
2,417,374 UART: [state] Locking Datavault
2,418,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,059 UART: [state] Locking ICCM
2,419,607 UART: [exit] Launching FMC @ 0x40000130
2,424,936 UART:
2,424,952 UART: Running Caliptra FMC ...
2,425,360 UART:
2,425,503 UART: [state] CFI Enabled
2,436,592 UART: [fht] FMC Alias Private Key: 7
2,544,747 UART: [art] Extend RT PCRs Done
2,545,175 UART: [art] Lock RT PCRs Done
2,546,689 UART: [art] Populate DV Done
2,554,979 UART: [fht] FMC Alias Private Key: 7
2,556,065 UART: [art] Derive CDI
2,556,345 UART: [art] Store in in slot 0x4
2,642,388 UART: [art] Derive Key Pair
2,642,748 UART: [art] Store priv key in slot 0x5
2,655,710 UART: [art] Derive Key Pair - Done
2,670,336 UART: [art] Signing Cert with AUTHO
2,670,816 UART: RITY.KEYID = 7
2,685,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,731 UART: [art] PUB.X = 4A7AA42DE1CA3057F762F7E45857B92E2A6D9E1BF6C25E0674439590CCD91E359DF5190A895982C74C06DAEC62DD2040
2,693,498 UART: [art] PUB.Y = F0C70F10CD2587C635A5A089A51BAF0B20E5D60A16A7F7E152CF18053166C42A48EE1FBD5B4902444E90D4300B51FC85
2,700,436 UART: [art] SIG.R = C9C5C60C36691C2F3DD91532A8E57A488EDAE4513B650F5FCA86D3042A74A4112942A3163183FA487E361BA73555BF6C
2,707,199 UART: [art] SIG.S = 03FAAEF2726E45F6581BA0E69F2F31D473974AFCFE42E878DB9E0F3F6F8D98C176338278FB2AE6E3A486152ED529021B
2,731,109 UART: mbox::rt_entry...
2,731,481 UART: ____ _ _ _ ____ _____
2,732,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,065 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,369 UART: |_|
2,735,681 UART:
2,842,205 UART: [rt] Runtime listening for mailbox commands...
2,842,967 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,843,060 UART:
2,843,076 UART: Running Caliptra ROM ...
2,843,484 UART:
2,843,626 UART: [state] CFI Enabled
2,846,153 UART: [state] LifecycleState = Production
2,846,761 UART: [state] DebugLocked = Yes
2,847,289 UART: [state] Starting the WD Timer 40000000 cycles
2,848,942 UART: [kat] SHA2-256
3,652,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,621 UART: [kat] ++
3,656,773 UART: [kat] sha1
3,660,853 UART: [kat] SHA2-256
3,662,793 UART: [kat] SHA2-384
3,665,560 UART: [kat] SHA2-512-ACC
3,667,461 UART: [kat] ECC-384
3,676,918 UART: [kat] HMAC-384Kdf
3,681,610 UART: [kat] LMS
3,929,922 UART: [kat] --
3,931,008 UART: [warm-reset] ++
3,932,039 UART: [warm-reset] --
3,932,700 UART: [state] Locking Datavault
3,933,566 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,170 UART: [state] Locking ICCM
3,934,728 UART: [exit] Launching FMC @ 0x40000130
3,940,057 UART:
3,940,073 UART: Running Caliptra FMC ...
3,940,481 UART:
3,940,624 UART: [state] CFI Enabled
3,941,941 UART: [aliasrt :skip pcr extension
3,942,414 UART: [art] Extend RT PCRs Done
3,942,842 UART: [art] Lock RT PCRs Done
3,943,977 UART: [art] Populate DV Done
3,952,401 UART: [fht] FMC Alias Private Key: 7
3,953,563 UART: [art] Derive CDI
3,953,843 UART: [art] Store in in slot 0x4
4,039,392 UART: [art] Derive Key Pair
4,039,752 UART: [art] Store priv key in slot 0x5
4,052,664 UART: [art] Derive Key Pair - Done
4,067,592 UART: [art] Signing Cert with AUTHO
4,068,072 UART: RITY.KEYID = 7
4,083,486 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,251 UART: [art] PUB.X = 4A7AA42DE1CA3057F762F7E45857B92E2A6D9E1BF6C25E0674439590CCD91E359DF5190A895982C74C06DAEC62DD2040
4,091,018 UART: [art] PUB.Y = F0C70F10CD2587C635A5A089A51BAF0B20E5D60A16A7F7E152CF18053166C42A48EE1FBD5B4902444E90D4300B51FC85
4,097,956 UART: [art] SIG.R = C9C5C60C36691C2F3DD91532A8E57A488EDAE4513B650F5FCA86D3042A74A4112942A3163183FA487E361BA73555BF6C
4,104,719 UART: [art] SIG.S = 03FAAEF2726E45F6581BA0E69F2F31D473974AFCFE42E878DB9E0F3F6F8D98C176338278FB2AE6E3A486152ED529021B
4,128,523 UART: mbox::rt_entry...
4,128,895 UART: ____ _ _ _ ____ _____
4,129,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,479 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,247 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,015 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,783 UART: |_|
4,133,095 UART:
4,417,939 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,574 UART: [state] LifecycleState = Production
85,182 UART: [state] DebugLocked = Yes
85,804 UART: [state] Starting the WD Timer 40000000 cycles
87,503 UART: [kat] SHA2-256
891,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,467 UART: [kat] LMS
1,169,779 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,174,927 ready_for_fw is high
1,174,927 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,250 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,944 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,814 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,520 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,612 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,735 UART: [fwproc] Recv command 0x46574c44
1,283,468 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,857 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,335,026 >>> mbox cmd response: success
2,336,128 UART: [afmc] ++
2,336,296 UART: [afmc] CDI.KEYID = 6
2,336,659 UART: [afmc] SUBJECT.KEYID = 7
2,337,085 UART: [afmc] AUTHORITY.KEYID = 5
2,372,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,861 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,580 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,473 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,180 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,993 UART: [afmc] --
2,416,114 UART: [cold-reset] --
2,417,044 UART: [state] Locking Datavault
2,418,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,989 UART: [state] Locking ICCM
2,419,539 UART: [exit] Launching FMC @ 0x40000130
2,424,868 UART:
2,424,884 UART: Running Caliptra FMC ...
2,425,292 UART:
2,425,435 UART: [state] CFI Enabled
2,435,964 UART: [fht] FMC Alias Private Key: 7
2,544,271 UART: [art] Extend RT PCRs Done
2,544,699 UART: [art] Lock RT PCRs Done
2,546,413 UART: [art] Populate DV Done
2,554,415 UART: [fht] FMC Alias Private Key: 7
2,555,595 UART: [art] Derive CDI
2,555,875 UART: [art] Store in in slot 0x4
2,641,784 UART: [art] Derive Key Pair
2,642,144 UART: [art] Store priv key in slot 0x5
2,655,650 UART: [art] Derive Key Pair - Done
2,670,701 UART: [art] Signing Cert with AUTHO
2,671,181 UART: RITY.KEYID = 7
2,686,317 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,082 UART: [art] PUB.X = EB200586C123CE7095112665376BF2A7E685AA2CCE1C08B9A60E0A002EC5697F82D979C734F1B6BC12646CF25EDC3839
2,693,822 UART: [art] PUB.Y = 445AB1CEA1181A597817449BE3630EC3A29DD6288BB986FDAD2764855134BC34EE0812495367A018599ED7AA1189BE57
2,700,764 UART: [art] SIG.R = 3B0C738A1A1B2E59DA7DE578A4D701EAB815DB85078797EC97C2672EE025DEAC05B43D43BFFB3442DCA020C08CB023E0
2,707,538 UART: [art] SIG.S = 815692FF4326473104FA205121EACB6E2EFD448228FA4466DD348EA2E1AB9422DBA16B1CBF5B59C4E7CF9D1D93C6330B
2,731,317 UART: mbox::rt_entry...
2,731,689 UART: ____ _ _ _ ____ _____
2,732,473 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,273 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,041 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,809 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,577 UART: |_|
2,735,889 UART:
2,841,705 UART: [rt] Runtime listening for mailbox commands...
2,842,467 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,842,560 UART:
2,842,576 UART: Running Caliptra ROM ...
2,842,984 UART:
2,843,126 UART: [state] CFI Enabled
2,846,091 UART: [state] LifecycleState = Production
2,846,699 UART: [state] DebugLocked = Yes
2,847,233 UART: [state] Starting the WD Timer 40000000 cycles
2,848,870 UART: [kat] SHA2-256
3,652,420 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,549 UART: [kat] ++
3,656,701 UART: [kat] sha1
3,660,853 UART: [kat] SHA2-256
3,662,793 UART: [kat] SHA2-384
3,665,444 UART: [kat] SHA2-512-ACC
3,667,345 UART: [kat] ECC-384
3,677,014 UART: [kat] HMAC-384Kdf
3,681,650 UART: [kat] LMS
3,929,962 UART: [kat] --
3,930,782 UART: [warm-reset] ++
3,931,639 UART: [warm-reset] --
3,932,242 UART: [state] Locking Datavault
3,933,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,712 UART: [state] Locking ICCM
3,934,218 UART: [exit] Launching FMC @ 0x40000130
3,939,547 UART:
3,939,563 UART: Running Caliptra FMC ...
3,939,971 UART:
3,940,114 UART: [state] CFI Enabled
3,941,409 UART: [aliasrt :skip pcr extension
3,941,882 UART: [art] Extend RT PCRs Done
3,942,310 UART: [art] Lock RT PCRs Done
3,943,677 UART: [art] Populate DV Done
3,951,757 UART: [fht] FMC Alias Private Key: 7
3,952,919 UART: [art] Derive CDI
3,953,199 UART: [art] Store in in slot 0x4
4,038,626 UART: [art] Derive Key Pair
4,038,986 UART: [art] Store priv key in slot 0x5
4,051,880 UART: [art] Derive Key Pair - Done
4,066,667 UART: [art] Signing Cert with AUTHO
4,067,147 UART: RITY.KEYID = 7
4,082,441 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,206 UART: [art] PUB.X = EB200586C123CE7095112665376BF2A7E685AA2CCE1C08B9A60E0A002EC5697F82D979C734F1B6BC12646CF25EDC3839
4,089,946 UART: [art] PUB.Y = 445AB1CEA1181A597817449BE3630EC3A29DD6288BB986FDAD2764855134BC34EE0812495367A018599ED7AA1189BE57
4,096,888 UART: [art] SIG.R = 3B0C738A1A1B2E59DA7DE578A4D701EAB815DB85078797EC97C2672EE025DEAC05B43D43BFFB3442DCA020C08CB023E0
4,103,662 UART: [art] SIG.S = 815692FF4326473104FA205121EACB6E2EFD448228FA4466DD348EA2E1AB9422DBA16B1CBF5B59C4E7CF9D1D93C6330B
4,127,303 UART: mbox::rt_entry...
4,127,675 UART: ____ _ _ _ ____ _____
4,128,459 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,259 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,027 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,795 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,563 UART: |_|
4,131,875 UART:
4,410,231 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,765 UART: [state] LifecycleState = Production
85,373 UART: [state] DebugLocked = Yes
86,003 UART: [state] Starting the WD Timer 40000000 cycles
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,626 UART: [kat] HMAC-384Kdf
920,236 UART: [kat] LMS
1,168,548 UART: [kat] --
1,169,045 UART: [cold-reset] ++
1,169,396 UART: [fht] FHT @ 0x50003400
1,172,030 UART: [idev] ++
1,172,198 UART: [idev] CDI.KEYID = 6
1,172,559 UART: [idev] SUBJECT.KEYID = 7
1,172,984 UART: [idev] UDS.KEYID = 0
1,173,330 ready_for_fw is high
1,173,330 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,180,859 UART: [idev] Erasing UDS.KEYID = 0
1,197,678 UART: [idev] Sha1 KeyId Algorithm
1,206,423 UART: [idev] --
1,207,596 UART: [ldev] ++
1,207,764 UART: [ldev] CDI.KEYID = 6
1,208,128 UART: [ldev] SUBJECT.KEYID = 5
1,208,555 UART: [ldev] AUTHORITY.KEYID = 7
1,209,018 UART: [ldev] FE.KEYID = 1
1,214,084 UART: [ldev] Erasing FE.KEYID = 1
1,239,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,981 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,258,675 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,264,545 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,270,251 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,277,295 UART: [ldev] --
1,278,607 UART: [fwproc] Wait for Commands...
1,279,244 UART: [fwproc] Recv command 0x46574c44
1,279,977 UART: [fwproc] Recv'd Img size: 78632 bytes
2,193,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,902 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,332,063 >>> mbox cmd response: success
2,333,159 UART: [afmc] ++
2,333,327 UART: [afmc] CDI.KEYID = 6
2,333,690 UART: [afmc] SUBJECT.KEYID = 7
2,334,116 UART: [afmc] AUTHORITY.KEYID = 5
2,369,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,385,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,442 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,161 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,054 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,403,761 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,411,686 UART: [afmc] --
2,412,605 UART: [cold-reset] --
2,413,481 UART: [state] Locking Datavault
2,414,412 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,016 UART: [state] Locking ICCM
2,415,644 UART: [exit] Launching FMC @ 0x40000130
2,420,973 UART:
2,420,989 UART: Running Caliptra FMC ...
2,421,397 UART:
2,421,451 UART: [state] CFI Enabled
2,431,620 UART: [fht] FMC Alias Private Key: 7
2,539,869 UART: [art] Extend RT PCRs Done
2,540,297 UART: [art] Lock RT PCRs Done
2,541,795 UART: [art] Populate DV Done
2,550,183 UART: [fht] FMC Alias Private Key: 7
2,551,141 UART: [art] Derive CDI
2,551,421 UART: [art] Store in in slot 0x4
2,636,926 UART: [art] Derive Key Pair
2,637,286 UART: [art] Store priv key in slot 0x5
2,650,838 UART: [art] Derive Key Pair - Done
2,665,438 UART: [art] Signing Cert with AUTHO
2,665,918 UART: RITY.KEYID = 7
2,680,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,477 UART: [art] PUB.X = 09C1DBBC99C168E6D3F7BC748E1AC7EF213471621B46DEBF90D072F36AB508329E9F01A136085EE86F4B03E5F9F0E66B
2,688,244 UART: [art] PUB.Y = 0A96542A70DB83C647386B468EA0836AF7D696F7FAE7F33C3CEA773BAAD6797CA2F12CC783222106E8B1109A9FED0BB3
2,695,197 UART: [art] SIG.R = 8A9F604D48EABC50A4D1542F5C23D5F842B768EBB08799601461F43952CD628B40F15419BC2F7411AFF247B6D8109F32
2,701,967 UART: [art] SIG.S = 080BEC8159DD13AC68CDC3B0A2926A96AA149B26E76D413A21AA255728517D366FE869DB6880761E01287F8AACE332A5
2,725,519 UART: mbox::rt_entry...
2,725,891 UART: ____ _ _ _ ____ _____
2,726,675 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,728,243 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,011 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,729,779 UART: |_|
2,730,091 UART:
2,836,431 UART: [rt] Runtime listening for mailbox commands...
2,837,193 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,837,286 UART:
2,837,302 UART: Running Caliptra ROM ...
2,837,710 UART:
2,837,765 UART: [state] CFI Enabled
2,840,516 UART: [state] LifecycleState = Production
2,841,124 UART: [state] DebugLocked = Yes
2,841,686 UART: [state] Starting the WD Timer 40000000 cycles
2,843,385 UART: [kat] SHA2-256
3,646,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,651,064 UART: [kat] ++
3,651,216 UART: [kat] sha1
3,655,458 UART: [kat] SHA2-256
3,657,398 UART: [kat] SHA2-384
3,659,951 UART: [kat] SHA2-512-ACC
3,661,852 UART: [kat] ECC-384
3,671,681 UART: [kat] HMAC-384Kdf
3,676,371 UART: [kat] LMS
3,924,683 UART: [kat] --
3,925,257 UART: [warm-reset] ++
3,926,222 UART: [warm-reset] --
3,927,145 UART: [state] Locking Datavault
3,928,093 UART: [state] Locking PCR0, PCR1 and PCR31
3,928,697 UART: [state] Locking ICCM
3,929,205 UART: [exit] Launching FMC @ 0x40000130
3,934,534 UART:
3,934,550 UART: Running Caliptra FMC ...
3,934,958 UART:
3,935,012 UART: [state] CFI Enabled
3,936,377 UART: [aliasrt :skip pcr extension
3,936,850 UART: [art] Extend RT PCRs Done
3,937,278 UART: [art] Lock RT PCRs Done
3,938,451 UART: [art] Populate DV Done
3,946,613 UART: [fht] FMC Alias Private Key: 7
3,947,731 UART: [art] Derive CDI
3,948,011 UART: [art] Store in in slot 0x4
4,033,430 UART: [art] Derive Key Pair
4,033,790 UART: [art] Store priv key in slot 0x5
4,046,894 UART: [art] Derive Key Pair - Done
4,061,526 UART: [art] Signing Cert with AUTHO
4,062,006 UART: RITY.KEYID = 7
4,077,142 UART: [art] Erasing AUTHORITY.KEYID = 7
4,077,907 UART: [art] PUB.X = 09C1DBBC99C168E6D3F7BC748E1AC7EF213471621B46DEBF90D072F36AB508329E9F01A136085EE86F4B03E5F9F0E66B
4,084,674 UART: [art] PUB.Y = 0A96542A70DB83C647386B468EA0836AF7D696F7FAE7F33C3CEA773BAAD6797CA2F12CC783222106E8B1109A9FED0BB3
4,091,627 UART: [art] SIG.R = 8A9F604D48EABC50A4D1542F5C23D5F842B768EBB08799601461F43952CD628B40F15419BC2F7411AFF247B6D8109F32
4,098,397 UART: [art] SIG.S = 080BEC8159DD13AC68CDC3B0A2926A96AA149B26E76D413A21AA255728517D366FE869DB6880761E01287F8AACE332A5
4,122,211 UART: mbox::rt_entry...
4,122,583 UART: ____ _ _ _ ____ _____
4,123,367 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,124,167 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,124,935 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,125,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,126,471 UART: |_|
4,126,783 UART:
4,407,851 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Production
85,527 UART: [state] DebugLocked = Yes
86,177 UART: [state] Starting the WD Timer 40000000 cycles
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,641 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,934 UART: [idev] ++
1,173,102 UART: [idev] CDI.KEYID = 6
1,173,463 UART: [idev] SUBJECT.KEYID = 7
1,173,888 UART: [idev] UDS.KEYID = 0
1,174,234 ready_for_fw is high
1,174,234 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,199,022 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,318 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,925 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,795 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,501 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,473 UART: [ldev] --
1,280,905 UART: [fwproc] Wait for Commands...
1,281,726 UART: [fwproc] Recv command 0x46574c44
1,282,459 UART: [fwproc] Recv'd Img size: 78632 bytes
2,195,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,446 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,647 >>> mbox cmd response: success
2,335,877 UART: [afmc] ++
2,336,045 UART: [afmc] CDI.KEYID = 6
2,336,408 UART: [afmc] SUBJECT.KEYID = 7
2,336,834 UART: [afmc] AUTHORITY.KEYID = 5
2,372,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,640 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,359 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,252 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,959 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,704 UART: [afmc] --
2,415,735 UART: [cold-reset] --
2,416,493 UART: [state] Locking Datavault
2,417,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,478 UART: [state] Locking ICCM
2,419,070 UART: [exit] Launching FMC @ 0x40000130
2,424,399 UART:
2,424,415 UART: Running Caliptra FMC ...
2,424,823 UART:
2,424,877 UART: [state] CFI Enabled
2,435,510 UART: [fht] FMC Alias Private Key: 7
2,543,207 UART: [art] Extend RT PCRs Done
2,543,635 UART: [art] Lock RT PCRs Done
2,545,447 UART: [art] Populate DV Done
2,553,877 UART: [fht] FMC Alias Private Key: 7
2,554,857 UART: [art] Derive CDI
2,555,137 UART: [art] Store in in slot 0x4
2,641,062 UART: [art] Derive Key Pair
2,641,422 UART: [art] Store priv key in slot 0x5
2,654,942 UART: [art] Derive Key Pair - Done
2,669,648 UART: [art] Signing Cert with AUTHO
2,670,128 UART: RITY.KEYID = 7
2,685,566 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,331 UART: [art] PUB.X = B6FC6B7C498EDB2636E3385CF27ABE76F746B76D2EF8AE77D25A128B43F2ED53A9E93D6E5BA880693CF51E11DD188669
2,693,115 UART: [art] PUB.Y = 6FD953B74946D2EF6B6899D0B6A8C43A0DD815ACE896BFD85967E78BFD576F4E211E945CEBD0FA38D773215D93125EC0
2,700,074 UART: [art] SIG.R = B610AAEE7E407AD45E6F6076B8722C23632B3AB9390D011B24642AA5E76DD18DFAE88DBB6D834A308974448813DD715C
2,706,844 UART: [art] SIG.S = 9D24CD50F4877C66AB399E76F83935521EBF4C285CFEBDE93A2D6294F74423E7CBA73246FE0C5301CFBB6CDBA3C2F69A
2,730,343 UART: mbox::rt_entry...
2,730,715 UART: ____ _ _ _ ____ _____
2,731,499 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,299 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,835 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,603 UART: |_|
2,734,915 UART:
2,841,673 UART: [rt] Runtime listening for mailbox commands...
2,842,435 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,842,528 UART:
2,842,544 UART: Running Caliptra ROM ...
2,842,952 UART:
2,843,007 UART: [state] CFI Enabled
2,845,570 UART: [state] LifecycleState = Production
2,846,178 UART: [state] DebugLocked = Yes
2,846,812 UART: [state] Starting the WD Timer 40000000 cycles
2,848,319 UART: [kat] SHA2-256
3,651,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,998 UART: [kat] ++
3,656,150 UART: [kat] sha1
3,660,610 UART: [kat] SHA2-256
3,662,550 UART: [kat] SHA2-384
3,665,293 UART: [kat] SHA2-512-ACC
3,667,194 UART: [kat] ECC-384
3,677,079 UART: [kat] HMAC-384Kdf
3,681,841 UART: [kat] LMS
3,930,153 UART: [kat] --
3,930,773 UART: [warm-reset] ++
3,931,620 UART: [warm-reset] --
3,932,485 UART: [state] Locking Datavault
3,933,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,887 UART: [state] Locking ICCM
3,934,465 UART: [exit] Launching FMC @ 0x40000130
3,939,794 UART:
3,939,810 UART: Running Caliptra FMC ...
3,940,218 UART:
3,940,272 UART: [state] CFI Enabled
3,941,343 UART: [aliasrt :skip pcr extension
3,941,816 UART: [art] Extend RT PCRs Done
3,942,244 UART: [art] Lock RT PCRs Done
3,943,455 UART: [art] Populate DV Done
3,951,579 UART: [fht] FMC Alias Private Key: 7
3,952,657 UART: [art] Derive CDI
3,952,937 UART: [art] Store in in slot 0x4
4,038,268 UART: [art] Derive Key Pair
4,038,628 UART: [art] Store priv key in slot 0x5
4,052,152 UART: [art] Derive Key Pair - Done
4,066,664 UART: [art] Signing Cert with AUTHO
4,067,144 UART: RITY.KEYID = 7
4,082,368 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,133 UART: [art] PUB.X = B6FC6B7C498EDB2636E3385CF27ABE76F746B76D2EF8AE77D25A128B43F2ED53A9E93D6E5BA880693CF51E11DD188669
4,089,917 UART: [art] PUB.Y = 6FD953B74946D2EF6B6899D0B6A8C43A0DD815ACE896BFD85967E78BFD576F4E211E945CEBD0FA38D773215D93125EC0
4,096,876 UART: [art] SIG.R = B610AAEE7E407AD45E6F6076B8722C23632B3AB9390D011B24642AA5E76DD18DFAE88DBB6D834A308974448813DD715C
4,103,646 UART: [art] SIG.S = 9D24CD50F4877C66AB399E76F83935521EBF4C285CFEBDE93A2D6294F74423E7CBA73246FE0C5301CFBB6CDBA3C2F69A
4,127,571 UART: mbox::rt_entry...
4,127,943 UART: ____ _ _ _ ____ _____
4,128,727 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,527 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,295 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,063 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,831 UART: |_|
4,132,143 UART:
4,411,255 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Production
85,968 UART: [state] DebugLocked = Yes
86,548 UART: [state] Starting the WD Timer 40000000 cycles
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,174,671 ready_for_fw is high
1,174,671 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,435 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,019 UART: [ldev] SUBJECT.KEYID = 5
1,211,446 UART: [ldev] AUTHORITY.KEYID = 7
1,211,909 UART: [ldev] FE.KEYID = 1
1,217,381 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,286 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,980 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,850 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,556 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,620 UART: [ldev] --
1,283,088 UART: [fwproc] Wait for Commands...
1,283,757 UART: [fwproc] Recv command 0x46574c44
1,284,490 UART: [fwproc] Recv'd Img size: 78632 bytes
2,198,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,849 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,337,222 >>> mbox cmd response: success
2,338,360 UART: [afmc] ++
2,338,528 UART: [afmc] CDI.KEYID = 6
2,338,891 UART: [afmc] SUBJECT.KEYID = 7
2,339,317 UART: [afmc] AUTHORITY.KEYID = 5
2,374,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,651 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,370 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,263 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,970 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,623 UART: [afmc] --
2,417,678 UART: [cold-reset] --
2,418,682 UART: [state] Locking Datavault
2,419,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,163 UART: [state] Locking ICCM
2,420,601 UART: [exit] Launching FMC @ 0x40000130
2,425,930 UART:
2,425,946 UART: Running Caliptra FMC ...
2,426,354 UART:
2,426,497 UART: [state] CFI Enabled
2,437,222 UART: [fht] FMC Alias Private Key: 7
2,545,091 UART: [art] Extend RT PCRs Done
2,545,519 UART: [art] Lock RT PCRs Done
2,546,791 UART: [art] Populate DV Done
2,555,023 UART: [fht] FMC Alias Private Key: 7
2,556,023 UART: [art] Derive CDI
2,556,303 UART: [art] Store in in slot 0x4
2,642,028 UART: [art] Derive Key Pair
2,642,388 UART: [art] Store priv key in slot 0x5
2,656,814 UART: [art] Derive Key Pair - Done
2,671,762 UART: [art] Signing Cert with AUTHO
2,672,242 UART: RITY.KEYID = 7
2,687,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,093 UART: [art] PUB.X = A81D0758AE4760CDAEA6496D7B725356FF0FACCD5DF7CFA5D0D8E2B3A3A15D4E6F59F3D5243DC38C6BA55CF96D7EBA5D
2,694,887 UART: [art] PUB.Y = A315724AFD471A5474B04840BC8968931000DCA167C2F66611CD7788F4414DD611E3556ED43A18278378D4E6DB210575
2,701,802 UART: [art] SIG.R = CC0313DBAA7B00F4264B18E27339206973A67B6BE4E33A6312521CBD169313C61B36E41478F572C0C53C84476A6F3B4D
2,708,545 UART: [art] SIG.S = 65424F71C439998D1CC1B1CE71FC3FE2324BD7C5587723A67A40551E4A77FD257E4E4D9A01695EB242999CF26966524B
2,732,595 UART: mbox::rt_entry...
2,732,967 UART: ____ _ _ _ ____ _____
2,733,751 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,551 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,319 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,087 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,855 UART: |_|
2,737,167 UART:
2,844,105 UART: [rt] Runtime listening for mailbox commands...
2,844,867 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,844,960 UART:
2,844,976 UART: Running Caliptra ROM ...
2,845,384 UART:
2,845,526 UART: [state] CFI Enabled
2,847,873 UART: [state] LifecycleState = Production
2,848,481 UART: [state] DebugLocked = Yes
2,849,211 UART: [state] Starting the WD Timer 40000000 cycles
2,850,834 UART: [kat] SHA2-256
3,654,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,513 UART: [kat] ++
3,658,665 UART: [kat] sha1
3,662,805 UART: [kat] SHA2-256
3,664,745 UART: [kat] SHA2-384
3,667,562 UART: [kat] SHA2-512-ACC
3,669,463 UART: [kat] ECC-384
3,678,896 UART: [kat] HMAC-384Kdf
3,683,450 UART: [kat] LMS
3,931,762 UART: [kat] --
3,932,744 UART: [warm-reset] ++
3,933,733 UART: [warm-reset] --
3,934,438 UART: [state] Locking Datavault
3,935,292 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,896 UART: [state] Locking ICCM
3,936,472 UART: [exit] Launching FMC @ 0x40000130
3,941,801 UART:
3,941,817 UART: Running Caliptra FMC ...
3,942,225 UART:
3,942,368 UART: [state] CFI Enabled
3,943,617 UART: [aliasrt :skip pcr extension
3,944,090 UART: [art] Extend RT PCRs Done
3,944,518 UART: [art] Lock RT PCRs Done
3,945,953 UART: [art] Populate DV Done
3,954,105 UART: [fht] FMC Alias Private Key: 7
3,955,131 UART: [art] Derive CDI
3,955,411 UART: [art] Store in in slot 0x4
4,040,972 UART: [art] Derive Key Pair
4,041,332 UART: [art] Store priv key in slot 0x5
4,055,302 UART: [art] Derive Key Pair - Done
4,070,416 UART: [art] Signing Cert with AUTHO
4,070,896 UART: RITY.KEYID = 7
4,086,166 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,931 UART: [art] PUB.X = A81D0758AE4760CDAEA6496D7B725356FF0FACCD5DF7CFA5D0D8E2B3A3A15D4E6F59F3D5243DC38C6BA55CF96D7EBA5D
4,093,725 UART: [art] PUB.Y = A315724AFD471A5474B04840BC8968931000DCA167C2F66611CD7788F4414DD611E3556ED43A18278378D4E6DB210575
4,100,640 UART: [art] SIG.R = CC0313DBAA7B00F4264B18E27339206973A67B6BE4E33A6312521CBD169313C61B36E41478F572C0C53C84476A6F3B4D
4,107,383 UART: [art] SIG.S = 65424F71C439998D1CC1B1CE71FC3FE2324BD7C5587723A67A40551E4A77FD257E4E4D9A01695EB242999CF26966524B
4,131,045 UART: mbox::rt_entry...
4,131,417 UART: ____ _ _ _ ____ _____
4,132,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,133,001 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,769 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,305 UART: |_|
4,135,617 UART:
4,416,445 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Production
86,046 UART: [state] DebugLocked = Yes
86,570 UART: [state] Starting the WD Timer 40000000 cycles
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,141 UART: [kat] LMS
1,169,453 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,174,723 ready_for_fw is high
1,174,723 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,503 UART: [idev] Sha1 KeyId Algorithm
1,208,304 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,216,139 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,656 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,526 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,232 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,520 UART: [ldev] --
1,282,024 UART: [fwproc] Wait for Commands...
1,282,605 UART: [fwproc] Recv command 0x46574c44
1,283,338 UART: [fwproc] Recv'd Img size: 78632 bytes
2,197,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,095 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,335,262 >>> mbox cmd response: success
2,336,434 UART: [afmc] ++
2,336,602 UART: [afmc] CDI.KEYID = 6
2,336,965 UART: [afmc] SUBJECT.KEYID = 7
2,337,391 UART: [afmc] AUTHORITY.KEYID = 5
2,373,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,413 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,132 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,025 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,732 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,417 UART: [afmc] --
2,416,298 UART: [cold-reset] --
2,417,212 UART: [state] Locking Datavault
2,418,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,027 UART: [state] Locking ICCM
2,419,641 UART: [exit] Launching FMC @ 0x40000130
2,424,970 UART:
2,424,986 UART: Running Caliptra FMC ...
2,425,394 UART:
2,425,537 UART: [state] CFI Enabled
2,436,038 UART: [fht] FMC Alias Private Key: 7
2,543,489 UART: [art] Extend RT PCRs Done
2,543,917 UART: [art] Lock RT PCRs Done
2,545,599 UART: [art] Populate DV Done
2,553,689 UART: [fht] FMC Alias Private Key: 7
2,554,737 UART: [art] Derive CDI
2,555,017 UART: [art] Store in in slot 0x4
2,641,132 UART: [art] Derive Key Pair
2,641,492 UART: [art] Store priv key in slot 0x5
2,654,662 UART: [art] Derive Key Pair - Done
2,669,399 UART: [art] Signing Cert with AUTHO
2,669,879 UART: RITY.KEYID = 7
2,685,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,930 UART: [art] PUB.X = 7E2EE3B285B9EBC8732AB9E9E14CD035DF3AF2439A7B7C7AD564263CC9A08828435D4978E9A885898E10EE810881390F
2,692,698 UART: [art] PUB.Y = EC175A49F62F13796E692E5B573AB353716E834A301A7BB2F299938B86109A7FE021C286CFA69F4CA5083D39D6A9DA00
2,699,625 UART: [art] SIG.R = 0FF8636E8390D3C9A6D511ED4B417FC696061587A32549D36A9FDFE124B3EF27278850E9C094F95E11D17E335718EF01
2,706,384 UART: [art] SIG.S = C996DC4DC7403974E5576241C4AE404A5DA158C1F05B4D4433F985753C8B540F0FF06BA47B7823F3D71203E75F2CA53A
2,730,214 UART: mbox::rt_entry...
2,730,586 UART: ____ _ _ _ ____ _____
2,731,370 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,938 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,474 UART: |_|
2,734,786 UART:
2,841,474 UART: [rt] Runtime listening for mailbox commands...
2,842,236 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
Initializing fuses
2,842,329 UART:
2,842,345 UART: Running Caliptra ROM ...
2,842,753 UART:
2,842,895 UART: [state] CFI Enabled
2,845,712 UART: [state] LifecycleState = Production
2,846,320 UART: [state] DebugLocked = Yes
2,847,040 UART: [state] Starting the WD Timer 40000000 cycles
2,848,503 UART: [kat] SHA2-256
3,652,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,182 UART: [kat] ++
3,656,334 UART: [kat] sha1
3,660,558 UART: [kat] SHA2-256
3,662,498 UART: [kat] SHA2-384
3,665,195 UART: [kat] SHA2-512-ACC
3,667,096 UART: [kat] ECC-384
3,677,347 UART: [kat] HMAC-384Kdf
3,681,985 UART: [kat] LMS
3,930,297 UART: [kat] --
3,931,179 UART: [warm-reset] ++
3,932,194 UART: [warm-reset] --
3,933,153 UART: [state] Locking Datavault
3,933,765 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,369 UART: [state] Locking ICCM
3,934,969 UART: [exit] Launching FMC @ 0x40000130
3,940,298 UART:
3,940,314 UART: Running Caliptra FMC ...
3,940,722 UART:
3,940,865 UART: [state] CFI Enabled
3,942,210 UART: [aliasrt :skip pcr extension
3,942,683 UART: [art] Extend RT PCRs Done
3,943,111 UART: [art] Lock RT PCRs Done
3,944,376 UART: [art] Populate DV Done
3,952,786 UART: [fht] FMC Alias Private Key: 7
3,953,830 UART: [art] Derive CDI
3,954,110 UART: [art] Store in in slot 0x4
4,039,663 UART: [art] Derive Key Pair
4,040,023 UART: [art] Store priv key in slot 0x5
4,053,067 UART: [art] Derive Key Pair - Done
4,067,608 UART: [art] Signing Cert with AUTHO
4,068,088 UART: RITY.KEYID = 7
4,083,450 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,215 UART: [art] PUB.X = 7E2EE3B285B9EBC8732AB9E9E14CD035DF3AF2439A7B7C7AD564263CC9A08828435D4978E9A885898E10EE810881390F
4,090,983 UART: [art] PUB.Y = EC175A49F62F13796E692E5B573AB353716E834A301A7BB2F299938B86109A7FE021C286CFA69F4CA5083D39D6A9DA00
4,097,910 UART: [art] SIG.R = 0FF8636E8390D3C9A6D511ED4B417FC696061587A32549D36A9FDFE124B3EF27278850E9C094F95E11D17E335718EF01
4,104,669 UART: [art] SIG.S = C996DC4DC7403974E5576241C4AE404A5DA158C1F05B4D4433F985753C8B540F0FF06BA47B7823F3D71203E75F2CA53A
4,128,625 UART: mbox::rt_entry...
4,128,997 UART: ____ _ _ _ ____ _____
4,129,781 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,581 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,349 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,117 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,885 UART: |_|
4,133,197 UART:
4,417,311 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
191,980 UART:
192,342 UART: Running Caliptra ROM ...
193,530 UART:
193,701 UART: [state] CFI Enabled
265,580 UART: [state] LifecycleState = Production
267,841 UART: [state] DebugLocked = Yes
269,043 UART: [state] Starting the WD Timer 40000000 cycles
274,419 UART: [kat] SHA2-256
456,343 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,902 UART: [kat] ++
468,538 UART: [kat] sha1
480,564 UART: [kat] SHA2-256
483,579 UART: [kat] SHA2-384
488,505 UART: [kat] SHA2-512-ACC
491,149 UART: [kat] ECC-384
3,773,914 UART: [kat] HMAC-384Kdf
3,800,929 UART: [kat] LMS
4,874,072 UART: [kat] --
4,880,146 UART: [cold-reset] ++
4,882,589 UART: [fht] FHT @ 0x50003400
4,894,628 UART: [idev] ++
4,895,301 UART: [idev] CDI.KEYID = 6
4,896,428 UART: [idev] SUBJECT.KEYID = 7
4,897,607 UART: [idev] UDS.KEYID = 0
4,898,570 ready_for_fw is high
4,898,760 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,042,781 UART: [idev] Erasing UDS.KEYID = 0
8,243,194 UART: [idev] Sha1 KeyId Algorithm
8,263,968 UART: [idev] --
8,268,506 UART: [ldev] ++
8,269,071 UART: [ldev] CDI.KEYID = 6
8,270,303 UART: [ldev] SUBJECT.KEYID = 5
8,271,455 UART: [ldev] AUTHORITY.KEYID = 7
8,272,624 UART: [ldev] FE.KEYID = 1
8,316,004 UART: [ldev] Erasing FE.KEYID = 1
11,651,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,802 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,978,118 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,994,113 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,010,218 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,030,993 UART: [ldev] --
14,036,415 UART: [fwproc] Wait for Commands...
14,038,664 UART: [fwproc] Recv command 0x46574c44
14,040,977 UART: [fwproc] Recv'd Img size: 114036 bytes
18,148,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,223,126 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,291,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,607,830 >>> mbox cmd response: success
18,611,808 UART: [afmc] ++
18,612,424 UART: [afmc] CDI.KEYID = 6
18,613,610 UART: [afmc] SUBJECT.KEYID = 7
18,614,729 UART: [afmc] AUTHORITY.KEYID = 5
21,966,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,266,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,269,054 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,285,009 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,301,172 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,317,242 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,340,530 UART: [afmc] --
24,343,631 UART: [cold-reset] --
24,345,815 UART: [state] Locking Datavault
24,351,920 UART: [state] Locking PCR0, PCR1 and PCR31
24,353,555 UART: [state] Locking ICCM
24,354,833 UART: [exit] Launching FMC @ 0x40000130
24,363,548 UART:
24,363,785 UART: Running Caliptra FMC ...
24,364,875 UART:
24,365,046 UART: [state] CFI Enabled
24,427,416 UART: [fht] FMC Alias Private Key: 7
26,765,246 UART: [art] Extend RT PCRs Done
26,766,465 UART: [art] Lock RT PCRs Done
26,768,162 UART: [art] Populate DV Done
26,773,667 UART: [fht] FMC Alias Private Key: 7
26,775,249 UART: [art] Derive CDI
26,776,056 UART: [art] Store in in slot 0x4
26,836,286 UART: [art] Derive Key Pair
26,837,321 UART: [art] Store priv key in slot 0x5
30,130,702 UART: [art] Derive Key Pair - Done
30,143,750 UART: [art] Signing Cert with AUTHO
30,145,050 UART: RITY.KEYID = 7
32,431,837 UART: [art] Erasing AUTHORITY.KEYID = 7
32,433,340 UART: [art] PUB.X = 3A2359C5A42E472185369546AD88BBE0A4D4AE2C6C7A0C4B7B80D5CFA3AFD62C60FD23A433C0AB363BE7FAEA7BD6326F
32,440,638 UART: [art] PUB.Y = 9DE31C1699CF2B4268C755736EAA489E757246B174F2E3027B9AA6493F8F21DE3DC5A23E507ADFA9E4DAF03F8913D616
32,447,892 UART: [art] SIG.R = AD6E9154BA085F5758944EB517E5F98D051C3719387BEC063D651DDAB5D32A2CE59E9DDE685B401239B9A419F97318F5
32,455,294 UART: [art] SIG.S = 92AC10C661A5740CDF24E0F73497EDA930729BC489C7F882C09462BC5A60B872D3F9E2B24508EF280CDE81B67703A11B
33,760,115 UART: Caliptra RT
33,760,824 UART: [state] CFI Enabled
33,923,327 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,056 UART:
1,221 UART: Running Caliptra ROM ...
2,256 UART:
2,393 UART: [state] CFI Enabled
62,827 UART: [state] LifecycleState = Production
64,591 UART: [state] DebugLocked = Yes
65,866 UART: [state] Starting the WD Timer 40000000 cycles
70,169 UART: [kat] SHA2-256
252,131 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
263,642 UART: [kat] ++
264,178 UART: [kat] sha1
275,044 UART: [kat] SHA2-256
278,089 UART: [kat] SHA2-384
284,003 UART: [kat] SHA2-512-ACC
286,615 UART: [kat] ECC-384
3,577,087 UART: [kat] HMAC-384Kdf
3,601,907 UART: [kat] LMS
4,675,110 UART: [kat] --
4,679,463 UART: [warm-reset] ++
4,684,875 UART: [warm-reset] --
4,688,543 UART: [state] Locking Datavault
4,692,282 UART: [state] Locking PCR0, PCR1 and PCR31
4,694,485 UART: [state] Locking ICCM
4,696,959 UART: [exit] Launching FMC @ 0x40000130
4,705,600 UART:
4,705,864 UART: Running Caliptra FMC ...
4,706,985 UART:
4,707,141 UART: [state] CFI Enabled
4,767,479 UART: [aliasrt :skip pcr extension
4,768,729 UART: [art] Extend RT PCRs Done
4,769,862 UART: [art] Lock RT PCRs Done
4,771,014 UART: [art] Populate DV Done
4,776,576 UART: [fht] FMC Alias Private Key: 7
4,778,259 UART: [art] Derive CDI
4,779,070 UART: [art] Store in in slot 0x4
4,836,393 UART: [art] Derive Key Pair
4,837,458 UART: [art] Store priv key in slot 0x5
8,130,638 UART: [art] Derive Key Pair - Done
8,143,941 UART: [art] Signing Cert with AUTHO
8,145,274 UART: RITY.KEYID = 7
10,431,854 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,359 UART: [art] PUB.X = 3A2359C5A42E472185369546AD88BBE0A4D4AE2C6C7A0C4B7B80D5CFA3AFD62C60FD23A433C0AB363BE7FAEA7BD6326F
10,440,643 UART: [art] PUB.Y = 9DE31C1699CF2B4268C755736EAA489E757246B174F2E3027B9AA6493F8F21DE3DC5A23E507ADFA9E4DAF03F8913D616
10,447,865 UART: [art] SIG.R = AD6E9154BA085F5758944EB517E5F98D051C3719387BEC063D651DDAB5D32A2CE59E9DDE685B401239B9A419F97318F5
10,455,214 UART: [art] SIG.S = 92AC10C661A5740CDF24E0F73497EDA930729BC489C7F882C09462BC5A60B872D3F9E2B24508EF280CDE81B67703A11B
11,760,723 UART: Caliptra RT
11,761,430 UART: [state] CFI Enabled
12,089,258 UART: [rt] RT listening for mailbox commands...
15,382,784 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
192,052 UART:
192,423 UART: Running Caliptra ROM ...
193,600 UART:
193,751 UART: [state] CFI Enabled
263,190 UART: [state] LifecycleState = Production
265,424 UART: [state] DebugLocked = Yes
268,274 UART: [state] Starting the WD Timer 40000000 cycles
273,216 UART: [kat] SHA2-256
455,180 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,665 UART: [kat] ++
467,286 UART: [kat] sha1
477,191 UART: [kat] SHA2-256
480,205 UART: [kat] SHA2-384
485,477 UART: [kat] SHA2-512-ACC
488,119 UART: [kat] ECC-384
3,778,644 UART: [kat] HMAC-384Kdf
3,803,177 UART: [kat] LMS
4,876,310 UART: [kat] --
4,881,791 UART: [cold-reset] ++
4,884,436 UART: [fht] FHT @ 0x50003400
4,894,907 UART: [idev] ++
4,895,603 UART: [idev] CDI.KEYID = 6
4,896,767 UART: [idev] SUBJECT.KEYID = 7
4,897,931 UART: [idev] UDS.KEYID = 0
4,898,888 ready_for_fw is high
4,899,077 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,043,012 UART: [idev] Erasing UDS.KEYID = 0
8,247,318 UART: [idev] Sha1 KeyId Algorithm
8,270,059 UART: [idev] --
8,275,678 UART: [ldev] ++
8,276,240 UART: [ldev] CDI.KEYID = 6
8,277,432 UART: [ldev] SUBJECT.KEYID = 5
8,278,555 UART: [ldev] AUTHORITY.KEYID = 7
8,279,826 UART: [ldev] FE.KEYID = 1
8,322,703 UART: [ldev] Erasing FE.KEYID = 1
11,658,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,545 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,984,820 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,000,845 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,016,962 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,037,519 UART: [ldev] --
14,042,717 UART: [fwproc] Wait for Commands...
14,044,444 UART: [fwproc] Recv command 0x46574c44
14,046,748 UART: [fwproc] Recv'd Img size: 114036 bytes
18,156,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,225,140 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,293,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,611,314 >>> mbox cmd response: success
18,616,093 UART: [afmc] ++
18,616,727 UART: [afmc] CDI.KEYID = 6
18,617,870 UART: [afmc] SUBJECT.KEYID = 7
18,619,025 UART: [afmc] AUTHORITY.KEYID = 5
21,995,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,314,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,316,489 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,332,497 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,348,599 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,364,635 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,387,164 UART: [afmc] --
24,390,435 UART: [cold-reset] --
24,394,622 UART: [state] Locking Datavault
24,400,559 UART: [state] Locking PCR0, PCR1 and PCR31
24,402,250 UART: [state] Locking ICCM
24,404,556 UART: [exit] Launching FMC @ 0x40000130
24,413,256 UART:
24,413,496 UART: Running Caliptra FMC ...
24,414,536 UART:
24,414,681 UART: [state] CFI Enabled
24,473,671 UART: [fht] FMC Alias Private Key: 7
26,811,429 UART: [art] Extend RT PCRs Done
26,812,648 UART: [art] Lock RT PCRs Done
26,813,844 UART: [art] Populate DV Done
26,819,441 UART: [fht] FMC Alias Private Key: 7
26,821,136 UART: [art] Derive CDI
26,821,968 UART: [art] Store in in slot 0x4
26,884,041 UART: [art] Derive Key Pair
26,885,083 UART: [art] Store priv key in slot 0x5
30,177,480 UART: [art] Derive Key Pair - Done
30,190,536 UART: [art] Signing Cert with AUTHO
30,191,836 UART: RITY.KEYID = 7
32,481,508 UART: [art] Erasing AUTHORITY.KEYID = 7
32,483,583 UART: [art] PUB.X = 1C75C64323FB57D339DA54B5E0E849858FCA6DA2CD2B251DC2833ABF44BB05DD0446D33B8BE9933B884747A5E0A26952
32,490,319 UART: [art] PUB.Y = 7BFA7981AA58F194AB76EAA19FAD1427272E575C5B3C54453A26215F7D6C38721C6315E03BF8A4E47474D70FFFBAEBB6
32,497,562 UART: [art] SIG.R = 47CC6A6D264EDC92D51C253E514ADB2C98B7468B9F4633EA0E915AE6FE13C2F4F6DF27D8198574B3C0882487252D7D92
32,504,968 UART: [art] SIG.S = AFD445791FE5C4F0C7D0E265101386C03889411BDEC6A13AC78E3E0683BCCD1DBC21AB60D936E2459E4227BF49DB7E2B
33,810,221 UART: Caliptra RT
33,811,546 UART: [state] CFI Enabled
33,976,594 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,084 UART:
1,306 UART: Running Caliptra ROM ...
2,323 UART:
2,459 UART: [state] CFI Enabled
65,124 UART: [state] LifecycleState = Production
67,103 UART: [state] DebugLocked = Yes
69,305 UART: [state] Starting the WD Timer 40000000 cycles
74,522 UART: [kat] SHA2-256
256,500 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
267,975 UART: [kat] ++
268,527 UART: [kat] sha1
278,969 UART: [kat] SHA2-256
281,951 UART: [kat] SHA2-384
287,442 UART: [kat] SHA2-512-ACC
290,054 UART: [kat] ECC-384
3,581,436 UART: [kat] HMAC-384Kdf
3,608,490 UART: [kat] LMS
4,681,653 UART: [kat] --
4,687,446 UART: [warm-reset] ++
4,690,055 UART: [warm-reset] --
4,693,659 UART: [state] Locking Datavault
4,696,967 UART: [state] Locking PCR0, PCR1 and PCR31
4,699,087 UART: [state] Locking ICCM
4,701,923 UART: [exit] Launching FMC @ 0x40000130
4,710,560 UART:
4,710,797 UART: Running Caliptra FMC ...
4,711,896 UART:
4,712,053 UART: [state] CFI Enabled
4,773,203 UART: [aliasrt :skip pcr extension
4,774,495 UART: [art] Extend RT PCRs Done
4,775,639 UART: [art] Lock RT PCRs Done
4,776,772 UART: [art] Populate DV Done
4,782,479 UART: [fht] FMC Alias Private Key: 7
4,783,958 UART: [art] Derive CDI
4,784,728 UART: [art] Store in in slot 0x4
4,842,120 UART: [art] Derive Key Pair
4,843,156 UART: [art] Store priv key in slot 0x5
8,136,052 UART: [art] Derive Key Pair - Done
8,149,126 UART: [art] Signing Cert with AUTHO
8,150,431 UART: RITY.KEYID = 7
10,436,670 UART: [art] Erasing AUTHORITY.KEYID = 7
10,438,225 UART: [art] PUB.X = 1C75C64323FB57D339DA54B5E0E849858FCA6DA2CD2B251DC2833ABF44BB05DD0446D33B8BE9933B884747A5E0A26952
10,445,435 UART: [art] PUB.Y = 7BFA7981AA58F194AB76EAA19FAD1427272E575C5B3C54453A26215F7D6C38721C6315E03BF8A4E47474D70FFFBAEBB6
10,452,655 UART: [art] SIG.R = 47CC6A6D264EDC92D51C253E514ADB2C98B7468B9F4633EA0E915AE6FE13C2F4F6DF27D8198574B3C0882487252D7D92
10,460,090 UART: [art] SIG.S = AFD445791FE5C4F0C7D0E265101386C03889411BDEC6A13AC78E3E0683BCCD1DBC21AB60D936E2459E4227BF49DB7E2B
11,765,170 UART: Caliptra RT
11,765,883 UART: [state] CFI Enabled
12,094,704 UART: [rt] RT listening for mailbox commands...
15,386,703 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
191,852 UART:
192,218 UART: Running Caliptra ROM ...
193,400 UART:
603,035 UART: [state] CFI Enabled
617,409 UART: [state] LifecycleState = Production
619,603 UART: [state] DebugLocked = Yes
621,387 UART: [state] Starting the WD Timer 40000000 cycles
626,372 UART: [kat] SHA2-256
808,326 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,872 UART: [kat] ++
820,390 UART: [kat] sha1
830,647 UART: [kat] SHA2-256
833,654 UART: [kat] SHA2-384
840,069 UART: [kat] SHA2-512-ACC
842,652 UART: [kat] ECC-384
4,096,977 UART: [kat] HMAC-384Kdf
4,108,379 UART: [kat] LMS
5,181,579 UART: [kat] --
5,184,416 UART: [cold-reset] ++
5,186,879 UART: [fht] FHT @ 0x50003400
5,198,217 UART: [idev] ++
5,198,858 UART: [idev] CDI.KEYID = 6
5,200,108 UART: [idev] SUBJECT.KEYID = 7
5,201,569 UART: [idev] UDS.KEYID = 0
5,202,760 ready_for_fw is high
5,202,958 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,346,151 UART: [idev] Erasing UDS.KEYID = 0
8,492,260 UART: [idev] Sha1 KeyId Algorithm
8,515,175 UART: [idev] --
8,520,082 UART: [ldev] ++
8,520,650 UART: [ldev] CDI.KEYID = 6
8,521,881 UART: [ldev] SUBJECT.KEYID = 5
8,523,058 UART: [ldev] AUTHORITY.KEYID = 7
8,524,237 UART: [ldev] FE.KEYID = 1
8,533,855 UART: [ldev] Erasing FE.KEYID = 1
11,828,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,706 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,136,016 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,152,019 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,168,120 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,187,378 UART: [ldev] --
14,191,346 UART: [fwproc] Wait for Commands...
14,194,461 UART: [fwproc] Recv command 0x46574c44
14,196,763 UART: [fwproc] Recv'd Img size: 114036 bytes
18,304,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,379,903 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,448,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,764,990 >>> mbox cmd response: success
18,769,043 UART: [afmc] ++
18,769,654 UART: [afmc] CDI.KEYID = 6
18,770,790 UART: [afmc] SUBJECT.KEYID = 7
18,771,947 UART: [afmc] AUTHORITY.KEYID = 5
22,091,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,384,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,387,119 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,403,070 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,419,228 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,435,272 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,457,845 UART: [afmc] --
24,462,276 UART: [cold-reset] --
24,467,708 UART: [state] Locking Datavault
24,475,797 UART: [state] Locking PCR0, PCR1 and PCR31
24,477,499 UART: [state] Locking ICCM
24,479,418 UART: [exit] Launching FMC @ 0x40000130
24,488,096 UART:
24,488,333 UART: Running Caliptra FMC ...
24,489,367 UART:
24,489,514 UART: [state] CFI Enabled
24,497,508 UART: [fht] FMC Alias Private Key: 7
26,827,433 UART: [art] Extend RT PCRs Done
26,828,649 UART: [art] Lock RT PCRs Done
26,830,244 UART: [art] Populate DV Done
26,835,436 UART: [fht] FMC Alias Private Key: 7
26,837,019 UART: [art] Derive CDI
26,837,835 UART: [art] Store in in slot 0x4
26,880,704 UART: [art] Derive Key Pair
26,881,739 UART: [art] Store priv key in slot 0x5
30,123,470 UART: [art] Derive Key Pair - Done
30,136,694 UART: [art] Signing Cert with AUTHO
30,138,001 UART: RITY.KEYID = 7
32,417,094 UART: [art] Erasing AUTHORITY.KEYID = 7
32,418,602 UART: [art] PUB.X = E4B9532E30F76475B070C78C6DA55C8843A6A0EFEA18654DD9D02BB492E725533BE1E23F5460D96ACA37579FE2D552AC
32,425,850 UART: [art] PUB.Y = 85DF6F4EA6718BC16DBD19CBE8B0637EA06F51090E813382A4C6A265371DE8A88A818BE17BD4DD3E51CC3EFD1901FFE4
32,433,083 UART: [art] SIG.R = 2A96C9F6808C5C2C4A74ABEE4BD8F09BFDCDE1702A983451274433CA2096D2646F226DEE10CD1091E24F16C3824B9FC4
32,440,487 UART: [art] SIG.S = 90810AF9D3ADB5F84D258DE7149666C540C04F32B0E037CE4EE9C0EE206544288201FEF1AA80E65CF4B5967B61F96583
33,746,077 UART: Caliptra RT
33,746,767 UART: [state] CFI Enabled
33,863,478 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,050 UART:
1,312 UART: Running Caliptra ROM ...
2,420 UART:
6,660,892 UART: [state] CFI Enabled
6,670,046 UART: [state] LifecycleState = Production
6,671,796 UART: [state] DebugLocked = Yes
6,673,369 UART: [state] Starting the WD Timer 40000000 cycles
6,678,715 UART: [kat] SHA2-256
6,860,669 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,872,215 UART: [kat] ++
6,872,825 UART: [kat] sha1
6,882,346 UART: [kat] SHA2-256
6,885,405 UART: [kat] SHA2-384
6,889,896 UART: [kat] SHA2-512-ACC
6,892,515 UART: [kat] ECC-384
10,146,127 UART: [kat] HMAC-384Kdf
10,157,785 UART: [kat] LMS
11,230,929 UART: [kat] --
11,237,581 UART: [warm-reset] ++
11,240,705 UART: [warm-reset] --
11,243,692 UART: [state] Locking Datavault
11,246,928 UART: [state] Locking PCR0, PCR1 and PCR31
11,249,108 UART: [state] Locking ICCM
11,251,605 UART: [exit] Launching FMC @ 0x40000130
11,260,239 UART:
11,260,474 UART: Running Caliptra FMC ...
11,261,577 UART:
11,261,731 UART: [state] CFI Enabled
11,263,732 UART: [aliasrt :skip pcr extension
11,264,975 UART: [art] Extend RT PCRs Done
11,266,152 UART: [art] Lock RT PCRs Done
11,267,248 UART: [art] Populate DV Done
11,272,745 UART: [fht] FMC Alias Private Key: 7
11,274,497 UART: [art] Derive CDI
11,275,310 UART: [art] Store in in slot 0x4
11,317,527 UART: [art] Derive Key Pair
11,318,531 UART: [art] Store priv key in slot 0x5
14,560,438 UART: [art] Derive Key Pair - Done
14,573,862 UART: [art] Signing Cert with AUTHO
14,575,187 UART: RITY.KEYID = 7
16,854,430 UART: [art] Erasing AUTHORITY.KEYID = 7
16,855,947 UART: [art] PUB.X = E4B9532E30F76475B070C78C6DA55C8843A6A0EFEA18654DD9D02BB492E725533BE1E23F5460D96ACA37579FE2D552AC
16,863,204 UART: [art] PUB.Y = 85DF6F4EA6718BC16DBD19CBE8B0637EA06F51090E813382A4C6A265371DE8A88A818BE17BD4DD3E51CC3EFD1901FFE4
16,870,449 UART: [art] SIG.R = 2A96C9F6808C5C2C4A74ABEE4BD8F09BFDCDE1702A983451274433CA2096D2646F226DEE10CD1091E24F16C3824B9FC4
16,877,830 UART: [art] SIG.S = 90810AF9D3ADB5F84D258DE7149666C540C04F32B0E037CE4EE9C0EE206544288201FEF1AA80E65CF4B5967B61F96583
18,182,944 UART: Caliptra RT
18,183,634 UART: [state] CFI Enabled
18,470,930 UART: [rt] RT listening for mailbox commands...
21,713,886 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
192,173 UART:
192,538 UART: Running Caliptra ROM ...
193,720 UART:
603,320 UART: [state] CFI Enabled
619,180 UART: [state] LifecycleState = Production
621,383 UART: [state] DebugLocked = Yes
624,284 UART: [state] Starting the WD Timer 40000000 cycles
630,152 UART: [kat] SHA2-256
812,140 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,624 UART: [kat] ++
824,144 UART: [kat] sha1
835,326 UART: [kat] SHA2-256
838,335 UART: [kat] SHA2-384
842,974 UART: [kat] SHA2-512-ACC
845,565 UART: [kat] ECC-384
4,099,470 UART: [kat] HMAC-384Kdf
4,112,927 UART: [kat] LMS
5,186,088 UART: [kat] --
5,191,909 UART: [cold-reset] ++
5,194,091 UART: [fht] FHT @ 0x50003400
5,206,220 UART: [idev] ++
5,206,933 UART: [idev] CDI.KEYID = 6
5,208,033 UART: [idev] SUBJECT.KEYID = 7
5,209,566 UART: [idev] UDS.KEYID = 0
5,210,846 ready_for_fw is high
5,211,042 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
5,354,244 UART: [idev] Erasing UDS.KEYID = 0
8,494,998 UART: [idev] Sha1 KeyId Algorithm
8,515,823 UART: [idev] --
8,519,338 UART: [ldev] ++
8,519,915 UART: [ldev] CDI.KEYID = 6
8,521,145 UART: [ldev] SUBJECT.KEYID = 5
8,522,303 UART: [ldev] AUTHORITY.KEYID = 7
8,523,530 UART: [ldev] FE.KEYID = 1
8,533,369 UART: [ldev] Erasing FE.KEYID = 1
11,822,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,261 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,134,574 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,150,584 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,166,715 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,188,044 UART: [ldev] --
14,193,202 UART: [fwproc] Wait for Commands...
14,195,237 UART: [fwproc] Recv command 0x46574c44
14,197,490 UART: [fwproc] Recv'd Img size: 114036 bytes
18,305,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,380,848 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,449,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
18,766,823 >>> mbox cmd response: success
18,771,551 UART: [afmc] ++
18,772,184 UART: [afmc] CDI.KEYID = 6
18,773,380 UART: [afmc] SUBJECT.KEYID = 7
18,774,484 UART: [afmc] AUTHORITY.KEYID = 5
22,093,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,384,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,387,230 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,403,234 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,419,348 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,435,392 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,459,200 UART: [afmc] --
24,463,370 UART: [cold-reset] --
24,467,669 UART: [state] Locking Datavault
24,471,881 UART: [state] Locking PCR0, PCR1 and PCR31
24,473,536 UART: [state] Locking ICCM
24,475,745 UART: [exit] Launching FMC @ 0x40000130
24,484,421 UART:
24,484,654 UART: Running Caliptra FMC ...
24,485,756 UART:
24,485,921 UART: [state] CFI Enabled
24,493,697 UART: [fht] FMC Alias Private Key: 7
26,824,148 UART: [art] Extend RT PCRs Done
26,825,371 UART: [art] Lock RT PCRs Done
26,827,157 UART: [art] Populate DV Done
26,832,641 UART: [fht] FMC Alias Private Key: 7
26,834,400 UART: [art] Derive CDI
26,835,213 UART: [art] Store in in slot 0x4
26,878,250 UART: [art] Derive Key Pair
26,879,285 UART: [art] Store priv key in slot 0x5
30,121,340 UART: [art] Derive Key Pair - Done
30,134,452 UART: [art] Signing Cert with AUTHO
30,135,753 UART: RITY.KEYID = 7
32,415,066 UART: [art] Erasing AUTHORITY.KEYID = 7
32,416,577 UART: [art] PUB.X = E73E206088EA1194FA1E2FDE410EE49BF3EBE841A450BD4FE5AD50BBF645FEDE4FDA1D00BB672D32BA9E9566D003E721
32,423,841 UART: [art] PUB.Y = 242560C6142602D4BA86ADE956514FE5E6CD2524F8BA4BDF007B65CBD2F2A626DDB0C7A08C84159B558E880CE9C1DF87
32,431,086 UART: [art] SIG.R = 22A6FDF32170FEB3CED53FCD8AC3692B175899F0069AB365AEFDC27AFF5BBDB2676C7B9683B62D703DB09740B11BF1A0
32,438,488 UART: [art] SIG.S = A525CA329C8C0118936E6D445692CA564AE0461DD293014C7EC76404D1383B4AED80F7B3274A931BE88D5C5BF8F06C75
33,743,509 UART: Caliptra RT
33,744,212 UART: [state] CFI Enabled
33,861,939 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,063 UART:
1,327 UART: Running Caliptra ROM ...
2,434 UART:
6,676,664 UART: [state] CFI Enabled
6,691,869 UART: [state] LifecycleState = Production
6,693,638 UART: [state] DebugLocked = Yes
6,695,132 UART: [state] Starting the WD Timer 40000000 cycles
6,700,420 UART: [kat] SHA2-256
6,882,405 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,893,937 UART: [kat] ++
6,894,507 UART: [kat] sha1
6,906,054 UART: [kat] SHA2-256
6,909,125 UART: [kat] SHA2-384
6,916,659 UART: [kat] SHA2-512-ACC
6,919,298 UART: [kat] ECC-384
10,174,769 UART: [kat] HMAC-384Kdf
10,187,950 UART: [kat] LMS
11,261,097 UART: [kat] --
11,267,264 UART: [warm-reset] ++
11,272,892 UART: [warm-reset] --
11,277,283 UART: [state] Locking Datavault
11,282,176 UART: [state] Locking PCR0, PCR1 and PCR31
11,284,301 UART: [state] Locking ICCM
11,286,854 UART: [exit] Launching FMC @ 0x40000130
11,295,498 UART:
11,295,734 UART: Running Caliptra FMC ...
11,296,836 UART:
11,296,998 UART: [state] CFI Enabled
11,298,924 UART: [aliasrt :skip pcr extension
11,300,163 UART: [art] Extend RT PCRs Done
11,301,297 UART: [art] Lock RT PCRs Done
11,302,669 UART: [art] Populate DV Done
11,308,241 UART: [fht] FMC Alias Private Key: 7
11,309,847 UART: [art] Derive CDI
11,310,657 UART: [art] Store in in slot 0x4
11,353,404 UART: [art] Derive Key Pair
11,354,445 UART: [art] Store priv key in slot 0x5
14,597,304 UART: [art] Derive Key Pair - Done
14,610,542 UART: [art] Signing Cert with AUTHO
14,611,884 UART: RITY.KEYID = 7
16,891,677 UART: [art] Erasing AUTHORITY.KEYID = 7
16,893,186 UART: [art] PUB.X = E73E206088EA1194FA1E2FDE410EE49BF3EBE841A450BD4FE5AD50BBF645FEDE4FDA1D00BB672D32BA9E9566D003E721
16,900,466 UART: [art] PUB.Y = 242560C6142602D4BA86ADE956514FE5E6CD2524F8BA4BDF007B65CBD2F2A626DDB0C7A08C84159B558E880CE9C1DF87
16,907,688 UART: [art] SIG.R = 22A6FDF32170FEB3CED53FCD8AC3692B175899F0069AB365AEFDC27AFF5BBDB2676C7B9683B62D703DB09740B11BF1A0
16,915,132 UART: [art] SIG.S = A525CA329C8C0118936E6D445692CA564AE0461DD293014C7EC76404D1383B4AED80F7B3274A931BE88D5C5BF8F06C75
18,219,929 UART: Caliptra RT
18,220,640 UART: [state] CFI Enabled
18,507,427 UART: [rt] RT listening for mailbox commands...
21,751,279 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,610 writing to cptra_bootfsm_go
192,230 UART:
192,601 UART: Running Caliptra ROM ...
193,783 UART:
193,938 UART: [state] CFI Enabled
262,284 UART: [state] LifecycleState = Production
264,040 UART: [state] DebugLocked = Yes
266,812 UART: [state] Starting the WD Timer 40000000 cycles
272,495 UART: [kat] SHA2-256
451,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,204 UART: [kat] ++
463,749 UART: [kat] sha1
474,799 UART: [kat] SHA2-256
477,806 UART: [kat] SHA2-384
483,016 UART: [kat] SHA2-512-ACC
485,963 UART: [kat] ECC-384
2,949,805 UART: [kat] HMAC-384Kdf
2,971,634 UART: [kat] LMS
3,501,064 UART: [kat] --
3,504,775 UART: [cold-reset] ++
3,507,058 UART: [fht] FHT @ 0x50003400
3,517,543 UART: [idev] ++
3,518,105 UART: [idev] CDI.KEYID = 6
3,518,984 UART: [idev] SUBJECT.KEYID = 7
3,520,228 UART: [idev] UDS.KEYID = 0
3,521,133 ready_for_fw is high
3,521,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,175 UART: [idev] Erasing UDS.KEYID = 0
6,026,758 UART: [idev] Sha1 KeyId Algorithm
6,049,802 UART: [idev] --
6,053,614 UART: [ldev] ++
6,054,196 UART: [ldev] CDI.KEYID = 6
6,055,083 UART: [ldev] SUBJECT.KEYID = 5
6,056,299 UART: [ldev] AUTHORITY.KEYID = 7
6,057,456 UART: [ldev] FE.KEYID = 1
6,101,342 UART: [ldev] Erasing FE.KEYID = 1
8,605,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,579 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,524 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,395 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,331 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,182 UART: [ldev] --
10,412,121 UART: [fwproc] Wait for Commands...
10,414,825 UART: [fwproc] Recv command 0x46574c44
10,416,918 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,998,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,316,484 >>> mbox cmd response: success
14,321,250 UART: [afmc] ++
14,321,865 UART: [afmc] CDI.KEYID = 6
14,322,788 UART: [afmc] SUBJECT.KEYID = 7
14,323,828 UART: [afmc] AUTHORITY.KEYID = 5
16,847,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,222 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,591,377 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,607,084 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,622,844 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,645,307 UART: [afmc] --
18,649,115 UART: [cold-reset] --
18,652,163 UART: [state] Locking Datavault
18,656,330 UART: [state] Locking PCR0, PCR1 and PCR31
18,657,976 UART: [state] Locking ICCM
18,659,747 UART: [exit] Launching FMC @ 0x40000130
18,668,192 UART:
18,668,435 UART: Running Caliptra FMC ...
18,669,537 UART:
18,669,696 UART: [state] CFI Enabled
18,732,332 UART: [fht] FMC Alias Private Key: 7
20,495,940 UART: [art] Extend RT PCRs Done
20,497,156 UART: [art] Lock RT PCRs Done
20,498,833 UART: [art] Populate DV Done
20,504,243 UART: [fht] FMC Alias Private Key: 7
20,505,785 UART: [art] Derive CDI
20,506,621 UART: [art] Store in in slot 0x4
20,565,282 UART: [art] Derive Key Pair
20,566,320 UART: [art] Store priv key in slot 0x5
23,028,662 UART: [art] Derive Key Pair - Done
23,041,930 UART: [art] Signing Cert with AUTHO
23,043,240 UART: RITY.KEYID = 7
24,755,035 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,541 UART: [art] PUB.X = F34AFFF53470F8AD1F597C7A8A576C422ACBB304984498B59B8EBE7ACA527554092875D18020B8F5D626818BF446B6B3
24,763,810 UART: [art] PUB.Y = AB72B42ABE4E5D7001F1565920CF9A6831CAB0559349625F36F0C865693C7D97C00EEF34993180F303678237734DF691
24,771,019 UART: [art] SIG.R = 808D6B44BFF517D3233ABEA86D0CD3315C42159EDBA5930D28428D1CDC86A85684A6D42B5E562F12786B263EDF173196
24,778,437 UART: [art] SIG.S = 1A0D47CDDCE6FA8B368179B7F7CE787F47E5FDBB49E9A81966A44DAE19C439F0248148653C18767A25549D9E34FD41F7
25,757,714 UART: Caliptra RT
25,758,429 UART: [state] CFI Enabled
25,924,263 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,045 UART:
1,337 UART: Running Caliptra ROM ...
2,365 UART:
2,514 UART: [state] CFI Enabled
66,905 UART: [state] LifecycleState = Production
68,669 UART: [state] DebugLocked = Yes
71,538 UART: [state] Starting the WD Timer 40000000 cycles
75,850 UART: [kat] SHA2-256
255,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,505 UART: [kat] ++
266,953 UART: [kat] sha1
276,887 UART: [kat] SHA2-256
279,928 UART: [kat] SHA2-384
286,284 UART: [kat] SHA2-512-ACC
289,261 UART: [kat] ECC-384
2,746,899 UART: [kat] HMAC-384Kdf
2,771,613 UART: [kat] LMS
3,301,085 UART: [kat] --
3,306,645 UART: [warm-reset] ++
3,311,870 UART: [warm-reset] --
3,314,752 UART: [state] Locking Datavault
3,316,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,661 UART: [state] Locking ICCM
3,320,652 UART: [exit] Launching FMC @ 0x40000130
3,329,070 UART:
3,329,324 UART: Running Caliptra FMC ...
3,330,427 UART:
3,330,586 UART: [state] CFI Enabled
3,380,891 UART: [aliasrt :skip pcr extension
3,382,149 UART: [art] Extend RT PCRs Done
3,383,210 UART: [art] Lock RT PCRs Done
3,384,348 UART: [art] Populate DV Done
3,389,616 UART: [fht] FMC Alias Private Key: 7
3,391,190 UART: [art] Derive CDI
3,391,931 UART: [art] Store in in slot 0x4
3,449,890 UART: [art] Derive Key Pair
3,450,890 UART: [art] Store priv key in slot 0x5
5,913,662 UART: [art] Derive Key Pair - Done
5,926,667 UART: [art] Signing Cert with AUTHO
5,927,974 UART: RITY.KEYID = 7
7,639,749 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,244 UART: [art] PUB.X = F34AFFF53470F8AD1F597C7A8A576C422ACBB304984498B59B8EBE7ACA527554092875D18020B8F5D626818BF446B6B3
7,648,545 UART: [art] PUB.Y = AB72B42ABE4E5D7001F1565920CF9A6831CAB0559349625F36F0C865693C7D97C00EEF34993180F303678237734DF691
7,655,794 UART: [art] SIG.R = 808D6B44BFF517D3233ABEA86D0CD3315C42159EDBA5930D28428D1CDC86A85684A6D42B5E562F12786B263EDF173196
7,663,147 UART: [art] SIG.S = 1A0D47CDDCE6FA8B368179B7F7CE787F47E5FDBB49E9A81966A44DAE19C439F0248148653C18767A25549D9E34FD41F7
8,642,197 UART: Caliptra RT
8,642,913 UART: [state] CFI Enabled
8,978,314 UART: [rt] RT listening for mailbox commands...
11,438,444 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
192,095 UART:
192,461 UART: Running Caliptra ROM ...
193,557 UART:
193,699 UART: [state] CFI Enabled
263,657 UART: [state] LifecycleState = Production
265,461 UART: [state] DebugLocked = Yes
267,442 UART: [state] Starting the WD Timer 40000000 cycles
272,111 UART: [kat] SHA2-256
451,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,808 UART: [kat] ++
463,265 UART: [kat] sha1
473,661 UART: [kat] SHA2-256
476,673 UART: [kat] SHA2-384
483,234 UART: [kat] SHA2-512-ACC
486,201 UART: [kat] ECC-384
2,945,399 UART: [kat] HMAC-384Kdf
2,971,249 UART: [kat] LMS
3,500,674 UART: [kat] --
3,505,624 UART: [cold-reset] ++
3,507,349 UART: [fht] FHT @ 0x50003400
3,517,329 UART: [idev] ++
3,517,896 UART: [idev] CDI.KEYID = 6
3,518,895 UART: [idev] SUBJECT.KEYID = 7
3,520,071 UART: [idev] UDS.KEYID = 0
3,521,003 ready_for_fw is high
3,521,226 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,115 UART: [idev] Erasing UDS.KEYID = 0
6,028,168 UART: [idev] Sha1 KeyId Algorithm
6,050,907 UART: [idev] --
6,055,287 UART: [ldev] ++
6,055,886 UART: [ldev] CDI.KEYID = 6
6,057,021 UART: [ldev] SUBJECT.KEYID = 5
6,058,148 UART: [ldev] AUTHORITY.KEYID = 7
6,059,332 UART: [ldev] FE.KEYID = 1
6,099,905 UART: [ldev] Erasing FE.KEYID = 1
8,603,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,001 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,039 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,863 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,826 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,424 UART: [ldev] --
10,411,555 UART: [fwproc] Wait for Commands...
10,414,567 UART: [fwproc] Recv command 0x46574c44
10,416,604 UART: [fwproc] Recv'd Img size: 114360 bytes
13,857,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,995,323 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,313,508 >>> mbox cmd response: success
14,317,816 UART: [afmc] ++
14,318,433 UART: [afmc] CDI.KEYID = 6
14,319,322 UART: [afmc] SUBJECT.KEYID = 7
14,320,425 UART: [afmc] AUTHORITY.KEYID = 5
16,847,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,242 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,590,227 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,606,088 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,621,877 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,643,409 UART: [afmc] --
18,646,348 UART: [cold-reset] --
18,649,564 UART: [state] Locking Datavault
18,653,298 UART: [state] Locking PCR0, PCR1 and PCR31
18,655,015 UART: [state] Locking ICCM
18,656,033 UART: [exit] Launching FMC @ 0x40000130
18,664,436 UART:
18,664,681 UART: Running Caliptra FMC ...
18,665,784 UART:
18,665,942 UART: [state] CFI Enabled
18,730,891 UART: [fht] FMC Alias Private Key: 7
20,494,268 UART: [art] Extend RT PCRs Done
20,495,488 UART: [art] Lock RT PCRs Done
20,497,353 UART: [art] Populate DV Done
20,502,976 UART: [fht] FMC Alias Private Key: 7
20,504,678 UART: [art] Derive CDI
20,505,490 UART: [art] Store in in slot 0x4
20,563,127 UART: [art] Derive Key Pair
20,564,163 UART: [art] Store priv key in slot 0x5
23,027,215 UART: [art] Derive Key Pair - Done
23,040,075 UART: [art] Signing Cert with AUTHO
23,041,385 UART: RITY.KEYID = 7
24,754,145 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,648 UART: [art] PUB.X = A473D971F5863DFD370164079FC4AC075741C3360D7A8001C75C30E17CFFAAE55AC72FAC36F5AFF82DF9E9777B8E3606
24,762,933 UART: [art] PUB.Y = EA9CA4CAAA7B7E0DDDED9A63B2E49478D4D91001A4B3B2BFCD3D47615F8BF636E3DDAFFB6298891DF1A1994030148E20
24,770,213 UART: [art] SIG.R = 702A24AA93997BE9D91BAD28397D11D73FDFB0AFD4B56C3E8A99463DDBE99171AEAA8607398E6CA6122F76B2A8A90A60
24,777,623 UART: [art] SIG.S = 5CB7E203C26E045D298AA9F102A893BBA4278B55467DC648663F5479B317501791F327599D84E7409F554A5B71736716
25,756,608 UART: Caliptra RT
25,757,310 UART: [state] CFI Enabled
25,922,228 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,029 UART:
1,288 UART: Running Caliptra ROM ...
2,394 UART:
2,552 UART: [state] CFI Enabled
63,687 UART: [state] LifecycleState = Production
65,461 UART: [state] DebugLocked = Yes
68,335 UART: [state] Starting the WD Timer 40000000 cycles
73,804 UART: [kat] SHA2-256
252,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,534 UART: [kat] ++
265,065 UART: [kat] sha1
276,024 UART: [kat] SHA2-256
279,068 UART: [kat] SHA2-384
285,280 UART: [kat] SHA2-512-ACC
288,174 UART: [kat] ECC-384
2,749,857 UART: [kat] HMAC-384Kdf
2,773,222 UART: [kat] LMS
3,302,703 UART: [kat] --
3,306,601 UART: [warm-reset] ++
3,312,080 UART: [warm-reset] --
3,314,964 UART: [state] Locking Datavault
3,318,652 UART: [state] Locking PCR0, PCR1 and PCR31
3,320,268 UART: [state] Locking ICCM
3,322,188 UART: [exit] Launching FMC @ 0x40000130
3,330,607 UART:
3,330,855 UART: Running Caliptra FMC ...
3,331,960 UART:
3,332,122 UART: [state] CFI Enabled
3,382,569 UART: [aliasrt :skip pcr extension
3,383,838 UART: [art] Extend RT PCRs Done
3,384,988 UART: [art] Lock RT PCRs Done
3,386,057 UART: [art] Populate DV Done
3,391,701 UART: [fht] FMC Alias Private Key: 7
3,393,167 UART: [art] Derive CDI
3,393,932 UART: [art] Store in in slot 0x4
3,451,028 UART: [art] Derive Key Pair
3,452,074 UART: [art] Store priv key in slot 0x5
5,914,547 UART: [art] Derive Key Pair - Done
5,927,905 UART: [art] Signing Cert with AUTHO
5,929,210 UART: RITY.KEYID = 7
7,640,630 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,140 UART: [art] PUB.X = A473D971F5863DFD370164079FC4AC075741C3360D7A8001C75C30E17CFFAAE55AC72FAC36F5AFF82DF9E9777B8E3606
7,649,448 UART: [art] PUB.Y = EA9CA4CAAA7B7E0DDDED9A63B2E49478D4D91001A4B3B2BFCD3D47615F8BF636E3DDAFFB6298891DF1A1994030148E20
7,656,674 UART: [art] SIG.R = 702A24AA93997BE9D91BAD28397D11D73FDFB0AFD4B56C3E8A99463DDBE99171AEAA8607398E6CA6122F76B2A8A90A60
7,664,075 UART: [art] SIG.S = 5CB7E203C26E045D298AA9F102A893BBA4278B55467DC648663F5479B317501791F327599D84E7409F554A5B71736716
8,642,874 UART: Caliptra RT
8,643,596 UART: [state] CFI Enabled
8,980,760 UART: [rt] RT listening for mailbox commands...
11,439,214 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
191,923 UART:
192,292 UART: Running Caliptra ROM ...
193,386 UART:
193,532 UART: [state] CFI Enabled
261,520 UART: [state] LifecycleState = Production
263,260 UART: [state] DebugLocked = Yes
264,905 UART: [state] Starting the WD Timer 40000000 cycles
269,009 UART: [kat] SHA2-256
448,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,720 UART: [kat] ++
460,259 UART: [kat] sha1
470,318 UART: [kat] SHA2-256
473,325 UART: [kat] SHA2-384
479,529 UART: [kat] SHA2-512-ACC
482,473 UART: [kat] ECC-384
2,926,851 UART: [kat] HMAC-384Kdf
2,949,588 UART: [kat] LMS
3,479,076 UART: [kat] --
3,485,061 UART: [cold-reset] ++
3,487,423 UART: [fht] FHT @ 0x50003400
3,499,577 UART: [idev] ++
3,500,192 UART: [idev] CDI.KEYID = 6
3,501,112 UART: [idev] SUBJECT.KEYID = 7
3,502,291 UART: [idev] UDS.KEYID = 0
3,503,234 ready_for_fw is high
3,503,416 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,647,093 UART: [idev] Erasing UDS.KEYID = 0
6,004,891 UART: [idev] Sha1 KeyId Algorithm
6,028,387 UART: [idev] --
6,031,520 UART: [ldev] ++
6,032,095 UART: [ldev] CDI.KEYID = 6
6,033,008 UART: [ldev] SUBJECT.KEYID = 5
6,034,313 UART: [ldev] AUTHORITY.KEYID = 7
6,035,447 UART: [ldev] FE.KEYID = 1
6,079,031 UART: [ldev] Erasing FE.KEYID = 1
8,582,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,261 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,336,300 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,352,111 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,368,059 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,388,944 UART: [ldev] --
10,393,788 UART: [fwproc] Wait for Commands...
10,396,587 UART: [fwproc] Recv command 0x46574c44
10,398,678 UART: [fwproc] Recv'd Img size: 114360 bytes
13,829,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,295,490 >>> mbox cmd response: success
14,299,645 UART: [afmc] ++
14,300,265 UART: [afmc] CDI.KEYID = 6
14,301,342 UART: [afmc] SUBJECT.KEYID = 7
14,302,451 UART: [afmc] AUTHORITY.KEYID = 5
16,828,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,186 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,571,177 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,587,004 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,602,762 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,626,124 UART: [afmc] --
18,630,423 UART: [cold-reset] --
18,632,888 UART: [state] Locking Datavault
18,638,298 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,997 UART: [state] Locking ICCM
18,642,201 UART: [exit] Launching FMC @ 0x40000130
18,650,649 UART:
18,650,881 UART: Running Caliptra FMC ...
18,651,982 UART:
18,652,140 UART: [state] CFI Enabled
18,710,947 UART: [fht] FMC Alias Private Key: 7
20,474,107 UART: [art] Extend RT PCRs Done
20,475,330 UART: [art] Lock RT PCRs Done
20,476,897 UART: [art] Populate DV Done
20,482,038 UART: [fht] FMC Alias Private Key: 7
20,483,577 UART: [art] Derive CDI
20,484,336 UART: [art] Store in in slot 0x4
20,542,991 UART: [art] Derive Key Pair
20,544,024 UART: [art] Store priv key in slot 0x5
23,007,063 UART: [art] Derive Key Pair - Done
23,020,180 UART: [art] Signing Cert with AUTHO
23,021,516 UART: RITY.KEYID = 7
24,732,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,972 UART: [art] PUB.X = ABB85BA1DF15079B0F00F248BFB6FD8110A6365191DD72705241F570EE58D09547D1027FDAB0F68332F9A26BB01B2EB9
24,741,197 UART: [art] PUB.Y = 4CC5574ECAEDDC80E795CE51F32F5271A2C9CFF2EDA93618DB278C42CE4BD2CADD4608CB274BD6C9A2B864AB971BBA6E
24,748,519 UART: [art] SIG.R = CE9CE929D950A8502770904D12C810D851FD78C27F6101EE8B31AFDC4C29DA422A56C2FE212825A56182874EFBE58DD1
24,755,958 UART: [art] SIG.S = FFF2819EF7072452884B42AB82182C305EC13EFBC392C0328DE7D6B11E300094825AC0C0BEBB15A08D046A6077B4C62F
25,734,825 UART: Caliptra RT
25,735,524 UART: [state] CFI Enabled
25,900,348 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,026 UART:
1,194 UART: Running Caliptra ROM ...
2,306 UART:
2,461 UART: [state] CFI Enabled
66,052 UART: [state] LifecycleState = Production
67,963 UART: [state] DebugLocked = Yes
69,105 UART: [state] Starting the WD Timer 40000000 cycles
74,285 UART: [kat] SHA2-256
253,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,976 UART: [kat] ++
265,420 UART: [kat] sha1
277,392 UART: [kat] SHA2-256
280,435 UART: [kat] SHA2-384
287,003 UART: [kat] SHA2-512-ACC
289,902 UART: [kat] ECC-384
2,748,267 UART: [kat] HMAC-384Kdf
2,771,542 UART: [kat] LMS
3,301,047 UART: [kat] --
3,305,093 UART: [warm-reset] ++
3,310,502 UART: [warm-reset] --
3,312,596 UART: [state] Locking Datavault
3,314,822 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,503 UART: [state] Locking ICCM
3,318,854 UART: [exit] Launching FMC @ 0x40000130
3,327,269 UART:
3,327,507 UART: Running Caliptra FMC ...
3,328,610 UART:
3,328,789 UART: [state] CFI Enabled
3,380,355 UART: [aliasrt :skip pcr extension
3,381,650 UART: [art] Extend RT PCRs Done
3,382,799 UART: [art] Lock RT PCRs Done
3,383,942 UART: [art] Populate DV Done
3,389,660 UART: [fht] FMC Alias Private Key: 7
3,391,340 UART: [art] Derive CDI
3,392,155 UART: [art] Store in in slot 0x4
3,449,117 UART: [art] Derive Key Pair
3,450,156 UART: [art] Store priv key in slot 0x5
5,913,817 UART: [art] Derive Key Pair - Done
5,926,738 UART: [art] Signing Cert with AUTHO
5,928,042 UART: RITY.KEYID = 7
7,639,416 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,925 UART: [art] PUB.X = ABB85BA1DF15079B0F00F248BFB6FD8110A6365191DD72705241F570EE58D09547D1027FDAB0F68332F9A26BB01B2EB9
7,648,213 UART: [art] PUB.Y = 4CC5574ECAEDDC80E795CE51F32F5271A2C9CFF2EDA93618DB278C42CE4BD2CADD4608CB274BD6C9A2B864AB971BBA6E
7,655,476 UART: [art] SIG.R = CE9CE929D950A8502770904D12C810D851FD78C27F6101EE8B31AFDC4C29DA422A56C2FE212825A56182874EFBE58DD1
7,662,863 UART: [art] SIG.S = FFF2819EF7072452884B42AB82182C305EC13EFBC392C0328DE7D6B11E300094825AC0C0BEBB15A08D046A6077B4C62F
8,641,873 UART: Caliptra RT
8,642,585 UART: [state] CFI Enabled
8,976,066 UART: [rt] RT listening for mailbox commands...
11,439,983 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
191,796 UART:
192,142 UART: Running Caliptra ROM ...
193,278 UART:
603,022 UART: [state] CFI Enabled
617,391 UART: [state] LifecycleState = Production
619,108 UART: [state] DebugLocked = Yes
620,377 UART: [state] Starting the WD Timer 40000000 cycles
624,544 UART: [kat] SHA2-256
803,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,224 UART: [kat] ++
815,671 UART: [kat] sha1
825,779 UART: [kat] SHA2-256
828,790 UART: [kat] SHA2-384
835,003 UART: [kat] SHA2-512-ACC
837,944 UART: [kat] ECC-384
3,280,034 UART: [kat] HMAC-384Kdf
3,292,485 UART: [kat] LMS
3,822,011 UART: [kat] --
3,826,389 UART: [cold-reset] ++
3,828,822 UART: [fht] FHT @ 0x50003400
3,839,255 UART: [idev] ++
3,839,879 UART: [idev] CDI.KEYID = 6
3,840,800 UART: [idev] SUBJECT.KEYID = 7
3,841,911 UART: [idev] UDS.KEYID = 0
3,842,963 ready_for_fw is high
3,843,190 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,986,731 UART: [idev] Erasing UDS.KEYID = 0
6,314,949 UART: [idev] Sha1 KeyId Algorithm
6,337,802 UART: [idev] --
6,340,613 UART: [ldev] ++
6,341,184 UART: [ldev] CDI.KEYID = 6
6,342,092 UART: [ldev] SUBJECT.KEYID = 5
6,343,306 UART: [ldev] AUTHORITY.KEYID = 7
6,344,537 UART: [ldev] FE.KEYID = 1
6,357,398 UART: [ldev] Erasing FE.KEYID = 1
8,826,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,559,713 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,575,533 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,591,473 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,610,351 UART: [ldev] --
10,615,504 UART: [fwproc] Wait for Commands...
10,618,514 UART: [fwproc] Recv command 0x46574c44
10,620,606 UART: [fwproc] Recv'd Img size: 114360 bytes
14,053,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,132,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,201,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,519,892 >>> mbox cmd response: success
14,524,208 UART: [afmc] ++
14,524,826 UART: [afmc] CDI.KEYID = 6
14,525,737 UART: [afmc] SUBJECT.KEYID = 7
14,526,897 UART: [afmc] AUTHORITY.KEYID = 5
17,027,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,746,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,748,674 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,764,681 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,780,501 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,796,248 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,818,832 UART: [afmc] --
18,822,512 UART: [cold-reset] --
18,828,266 UART: [state] Locking Datavault
18,831,833 UART: [state] Locking PCR0, PCR1 and PCR31
18,833,524 UART: [state] Locking ICCM
18,835,642 UART: [exit] Launching FMC @ 0x40000130
18,844,081 UART:
18,844,325 UART: Running Caliptra FMC ...
18,845,347 UART:
18,845,493 UART: [state] CFI Enabled
18,853,481 UART: [fht] FMC Alias Private Key: 7
20,610,279 UART: [art] Extend RT PCRs Done
20,611,500 UART: [art] Lock RT PCRs Done
20,613,043 UART: [art] Populate DV Done
20,618,567 UART: [fht] FMC Alias Private Key: 7
20,620,046 UART: [art] Derive CDI
20,620,809 UART: [art] Store in in slot 0x4
20,663,554 UART: [art] Derive Key Pair
20,664,589 UART: [art] Store priv key in slot 0x5
23,091,353 UART: [art] Derive Key Pair - Done
23,104,237 UART: [art] Signing Cert with AUTHO
23,105,541 UART: RITY.KEYID = 7
24,811,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,812,590 UART: [art] PUB.X = 3595F2D12F8135741C42A3BF7C0DA3B6B1518C55F5D39E752A74733DC5536C76205C7802CB59F9CA4B7E27FBE87649B6
24,819,836 UART: [art] PUB.Y = 09CD8DBCEA759B544C6B275E1C5B1FCDAD71AF6BCFDE19D774D3081EC7D0F68912851DB5B472038DD214CE5368DB0617
24,827,118 UART: [art] SIG.R = 03BFA44CE1205517C8E13E7661834D7F8F345E7CDBA7DF1A43CA61CCFA380B46C04542636DC6C92CF144615025175D2A
24,834,500 UART: [art] SIG.S = ACD815EC311D3C7913C42FAFF69B5F50A3E8CE4FB9136D6E0A602908B927C3A3843DF5AA567197873AA0400B538E390E
25,813,356 UART: Caliptra RT
25,814,061 UART: [state] CFI Enabled
25,931,091 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,042 UART:
1,198 UART: Running Caliptra ROM ...
2,240 UART:
14,593,701 UART: [state] CFI Enabled
14,605,092 UART: [state] LifecycleState = Production
14,606,835 UART: [state] DebugLocked = Yes
14,608,844 UART: [state] Starting the WD Timer 40000000 cycles
14,613,009 UART: [kat] SHA2-256
14,792,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,803,712 UART: [kat] ++
14,804,164 UART: [kat] sha1
14,815,189 UART: [kat] SHA2-256
14,818,175 UART: [kat] SHA2-384
14,823,958 UART: [kat] SHA2-512-ACC
14,826,932 UART: [kat] ECC-384
17,269,614 UART: [kat] HMAC-384Kdf
17,282,504 UART: [kat] LMS
17,812,046 UART: [kat] --
17,817,461 UART: [warm-reset] ++
17,823,455 UART: [warm-reset] --
17,827,302 UART: [state] Locking Datavault
17,829,890 UART: [state] Locking PCR0, PCR1 and PCR31
17,831,575 UART: [state] Locking ICCM
17,833,056 UART: [exit] Launching FMC @ 0x40000130
17,841,541 UART:
17,841,775 UART: Running Caliptra FMC ...
17,842,872 UART:
17,843,024 UART: [state] CFI Enabled
17,844,968 UART: [aliasrt :skip pcr extension
17,846,221 UART: [art] Extend RT PCRs Done
17,847,357 UART: [art] Lock RT PCRs Done
17,848,563 UART: [art] Populate DV Done
17,854,271 UART: [fht] FMC Alias Private Key: 7
17,855,729 UART: [art] Derive CDI
17,856,487 UART: [art] Store in in slot 0x4
17,898,981 UART: [art] Derive Key Pair
17,899,978 UART: [art] Store priv key in slot 0x5
20,326,807 UART: [art] Derive Key Pair - Done
20,339,658 UART: [art] Signing Cert with AUTHO
20,340,963 UART: RITY.KEYID = 7
22,046,343 UART: [art] Erasing AUTHORITY.KEYID = 7
22,047,855 UART: [art] PUB.X = 3595F2D12F8135741C42A3BF7C0DA3B6B1518C55F5D39E752A74733DC5536C76205C7802CB59F9CA4B7E27FBE87649B6
22,055,081 UART: [art] PUB.Y = 09CD8DBCEA759B544C6B275E1C5B1FCDAD71AF6BCFDE19D774D3081EC7D0F68912851DB5B472038DD214CE5368DB0617
22,062,395 UART: [art] SIG.R = 03BFA44CE1205517C8E13E7661834D7F8F345E7CDBA7DF1A43CA61CCFA380B46C04542636DC6C92CF144615025175D2A
22,069,778 UART: [art] SIG.S = ACD815EC311D3C7913C42FAFF69B5F50A3E8CE4FB9136D6E0A602908B927C3A3843DF5AA567197873AA0400B538E390E
23,048,349 UART: Caliptra RT
23,049,043 UART: [state] CFI Enabled
23,338,009 UART: [rt] RT listening for mailbox commands...
25,765,402 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
191,692 UART:
192,066 UART: Running Caliptra ROM ...
193,371 UART:
603,000 UART: [state] CFI Enabled
615,308 UART: [state] LifecycleState = Production
617,069 UART: [state] DebugLocked = Yes
619,564 UART: [state] Starting the WD Timer 40000000 cycles
624,864 UART: [kat] SHA2-256
804,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,552 UART: [kat] ++
816,082 UART: [kat] sha1
827,556 UART: [kat] SHA2-256
830,575 UART: [kat] SHA2-384
837,625 UART: [kat] SHA2-512-ACC
840,558 UART: [kat] ECC-384
3,279,910 UART: [kat] HMAC-384Kdf
3,293,350 UART: [kat] LMS
3,822,841 UART: [kat] --
3,828,621 UART: [cold-reset] ++
3,830,863 UART: [fht] FHT @ 0x50003400
3,841,554 UART: [idev] ++
3,842,116 UART: [idev] CDI.KEYID = 6
3,843,023 UART: [idev] SUBJECT.KEYID = 7
3,844,271 UART: [idev] UDS.KEYID = 0
3,845,191 ready_for_fw is high
3,845,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,989,010 UART: [idev] Erasing UDS.KEYID = 0
6,318,435 UART: [idev] Sha1 KeyId Algorithm
6,342,634 UART: [idev] --
6,348,164 UART: [ldev] ++
6,348,740 UART: [ldev] CDI.KEYID = 6
6,349,650 UART: [ldev] SUBJECT.KEYID = 5
6,350,861 UART: [ldev] AUTHORITY.KEYID = 7
6,352,091 UART: [ldev] FE.KEYID = 1
6,362,844 UART: [ldev] Erasing FE.KEYID = 1
8,835,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,977 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,955 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,785 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,751 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,621,346 UART: [ldev] --
10,625,433 UART: [fwproc] Wait for Commands...
10,627,852 UART: [fwproc] Recv command 0x46574c44
10,629,886 UART: [fwproc] Recv'd Img size: 114360 bytes
14,064,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,137,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,206,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,524,273 >>> mbox cmd response: success
14,528,101 UART: [afmc] ++
14,528,709 UART: [afmc] CDI.KEYID = 6
14,529,599 UART: [afmc] SUBJECT.KEYID = 7
14,530,715 UART: [afmc] AUTHORITY.KEYID = 5
17,027,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,756 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,763,748 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,779,595 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,795,283 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,817,502 UART: [afmc] --
18,820,625 UART: [cold-reset] --
18,824,230 UART: [state] Locking Datavault
18,828,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,830,623 UART: [state] Locking ICCM
18,831,933 UART: [exit] Launching FMC @ 0x40000130
18,840,378 UART:
18,840,608 UART: Running Caliptra FMC ...
18,841,631 UART:
18,841,794 UART: [state] CFI Enabled
18,850,110 UART: [fht] FMC Alias Private Key: 7
20,606,599 UART: [art] Extend RT PCRs Done
20,607,820 UART: [art] Lock RT PCRs Done
20,609,844 UART: [art] Populate DV Done
20,615,521 UART: [fht] FMC Alias Private Key: 7
20,617,111 UART: [art] Derive CDI
20,617,923 UART: [art] Store in in slot 0x4
20,660,988 UART: [art] Derive Key Pair
20,662,013 UART: [art] Store priv key in slot 0x5
23,088,871 UART: [art] Derive Key Pair - Done
23,102,027 UART: [art] Signing Cert with AUTHO
23,103,330 UART: RITY.KEYID = 7
24,808,610 UART: [art] Erasing AUTHORITY.KEYID = 7
24,810,115 UART: [art] PUB.X = 8D7E75D4989F69C38A86758ED4BB52146A0B9DB803B17F8D71EC409FB5FA3FFCD1A13EC6F16AAAEAABA939F90E0EFD0B
24,817,454 UART: [art] PUB.Y = ECD0AA757BC6868236700836DD6AA01D4C8E92647CF6E3A1EEEF7B312A209BE34F2E52DCD0F83E9657EF64E2E6D70687
24,824,679 UART: [art] SIG.R = 006A721E1E9584DABDEA47C425BD57C54908DD384464E6EF2CB6C7D1B1493701F1EB8E638A846DBC19A8825FE2054A21
24,832,041 UART: [art] SIG.S = FC49F802F40C26DB50A25EA2DD6CDCD1E3DA98E14B6306BF03DB0C3B8CB57083393953D4CA14E6567F0FE64BE1ECACB5
25,810,930 UART: Caliptra RT
25,811,632 UART: [state] CFI Enabled
25,927,766 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,041 UART:
1,209 UART: Running Caliptra ROM ...
2,250 UART:
14,608,926 UART: [state] CFI Enabled
14,619,685 UART: [state] LifecycleState = Production
14,621,437 UART: [state] DebugLocked = Yes
14,623,087 UART: [state] Starting the WD Timer 40000000 cycles
14,628,264 UART: [kat] SHA2-256
14,807,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,818,964 UART: [kat] ++
14,819,438 UART: [kat] sha1
14,831,401 UART: [kat] SHA2-256
14,834,450 UART: [kat] SHA2-384
14,840,669 UART: [kat] SHA2-512-ACC
14,843,570 UART: [kat] ECC-384
17,285,305 UART: [kat] HMAC-384Kdf
17,297,408 UART: [kat] LMS
17,826,916 UART: [kat] --
17,832,757 UART: [warm-reset] ++
17,836,357 UART: [warm-reset] --
17,841,961 UART: [state] Locking Datavault
17,843,823 UART: [state] Locking PCR0, PCR1 and PCR31
17,845,698 UART: [state] Locking ICCM
17,846,728 UART: [exit] Launching FMC @ 0x40000130
17,855,151 UART:
17,855,383 UART: Running Caliptra FMC ...
17,856,433 UART:
17,856,578 UART: [state] CFI Enabled
17,858,796 UART: [aliasrt :skip pcr extension
17,860,038 UART: [art] Extend RT PCRs Done
17,861,097 UART: [art] Lock RT PCRs Done
17,862,251 UART: [art] Populate DV Done
17,867,752 UART: [fht] FMC Alias Private Key: 7
17,869,363 UART: [art] Derive CDI
17,870,097 UART: [art] Store in in slot 0x4
17,912,742 UART: [art] Derive Key Pair
17,913,743 UART: [art] Store priv key in slot 0x5
20,340,504 UART: [art] Derive Key Pair - Done
20,353,498 UART: [art] Signing Cert with AUTHO
20,354,793 UART: RITY.KEYID = 7
22,060,244 UART: [art] Erasing AUTHORITY.KEYID = 7
22,061,750 UART: [art] PUB.X = 8D7E75D4989F69C38A86758ED4BB52146A0B9DB803B17F8D71EC409FB5FA3FFCD1A13EC6F16AAAEAABA939F90E0EFD0B
22,069,002 UART: [art] PUB.Y = ECD0AA757BC6868236700836DD6AA01D4C8E92647CF6E3A1EEEF7B312A209BE34F2E52DCD0F83E9657EF64E2E6D70687
22,076,328 UART: [art] SIG.R = 006A721E1E9584DABDEA47C425BD57C54908DD384464E6EF2CB6C7D1B1493701F1EB8E638A846DBC19A8825FE2054A21
22,083,639 UART: [art] SIG.S = FC49F802F40C26DB50A25EA2DD6CDCD1E3DA98E14B6306BF03DB0C3B8CB57083393953D4CA14E6567F0FE64BE1ECACB5
23,062,371 UART: Caliptra RT
23,063,070 UART: [state] CFI Enabled
23,349,158 UART: [rt] RT listening for mailbox commands...
25,778,525 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Production
85,737 UART: [state] DebugLocked = Yes
86,265 UART: [state] Starting the WD Timer 40000000 cycles
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,521 UART: [cold-reset] ++
1,170,098 UART: [fht] FHT @ 0x50003400
1,172,590 UART: [idev] ++
1,172,758 UART: [idev] CDI.KEYID = 6
1,173,119 UART: [idev] SUBJECT.KEYID = 7
1,173,544 UART: [idev] UDS.KEYID = 0
1,173,890 ready_for_fw is high
1,173,890 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,541 UART: [idev] Erasing UDS.KEYID = 0
1,198,002 UART: [idev] Sha1 KeyId Algorithm
1,206,899 UART: [idev] --
1,208,044 UART: [ldev] ++
1,208,212 UART: [ldev] CDI.KEYID = 6
1,208,576 UART: [ldev] SUBJECT.KEYID = 5
1,209,003 UART: [ldev] AUTHORITY.KEYID = 7
1,209,466 UART: [ldev] FE.KEYID = 1
1,214,434 UART: [ldev] Erasing FE.KEYID = 1
1,240,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,397 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,091 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,961 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,667 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,843 UART: [ldev] --
1,280,145 UART: [fwproc] Wait for Commands...
1,280,758 UART: [fwproc] Recv command 0x46574c44
1,281,491 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,795,205 >>> mbox cmd response: success
2,796,363 UART: [afmc] ++
2,796,531 UART: [afmc] CDI.KEYID = 6
2,796,894 UART: [afmc] SUBJECT.KEYID = 7
2,797,320 UART: [afmc] AUTHORITY.KEYID = 5
2,832,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,460 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,179 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,072 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,779 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,736 UART: [afmc] --
2,875,689 UART: [cold-reset] --
2,876,779 UART: [state] Locking Datavault
2,878,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,616 UART: [state] Locking ICCM
2,879,268 UART: [exit] Launching FMC @ 0x40000130
2,884,597 UART:
2,884,613 UART: Running Caliptra FMC ...
2,885,021 UART:
2,885,075 UART: [state] CFI Enabled
2,895,712 UART: [fht] FMC Alias Private Key: 7
3,004,093 UART: [art] Extend RT PCRs Done
3,004,521 UART: [art] Lock RT PCRs Done
3,006,373 UART: [art] Populate DV Done
3,014,669 UART: [fht] FMC Alias Private Key: 7
3,015,667 UART: [art] Derive CDI
3,015,947 UART: [art] Store in in slot 0x4
3,101,734 UART: [art] Derive Key Pair
3,102,094 UART: [art] Store priv key in slot 0x5
3,115,460 UART: [art] Derive Key Pair - Done
3,130,106 UART: [art] Signing Cert with AUTHO
3,130,586 UART: RITY.KEYID = 7
3,145,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,323 UART: [art] PUB.X = A03BE97572B71D1C50A1F887DF59E4C84871EAD38C3EE74E8A4C0FD81D07C96C857F42E60CCCDBE1C9B981B0CFADD63F
3,153,108 UART: [art] PUB.Y = 021866BC4D2C586814CA7E62AC440F6D4D2E43954AA9B4EEC57CCE75B8E8511D1A6739122683BB294EFD35198E730717
3,160,051 UART: [art] SIG.R = 9E20CA0D244CE6C3A7988C65946176E834118253B13D32A34E83257164C9478F1A9BC18FC3698DB2C76BFBF9C5F9E7DB
3,166,822 UART: [art] SIG.S = F3BDC10BF3D799A2F1434B8BD67D769923F5B69E13F6C958E5290916F8AA04994107761D5D2D623A8E06519F6C05DC8F
3,190,473 UART: Caliptra RT
3,190,727 UART: [state] CFI Enabled
3,297,861 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,617 UART:
3,298,633 UART: Running Caliptra ROM ...
3,299,041 UART:
3,299,096 UART: [state] CFI Enabled
3,301,473 UART: [state] LifecycleState = Production
3,302,081 UART: [state] DebugLocked = Yes
3,302,811 UART: [state] Starting the WD Timer 40000000 cycles
3,304,520 UART: [kat] SHA2-256
4,108,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,199 UART: [kat] ++
4,112,351 UART: [kat] sha1
4,116,579 UART: [kat] SHA2-256
4,118,519 UART: [kat] SHA2-384
4,121,390 UART: [kat] SHA2-512-ACC
4,123,291 UART: [kat] ECC-384
4,132,578 UART: [kat] HMAC-384Kdf
4,137,248 UART: [kat] LMS
4,385,560 UART: [kat] --
4,386,256 UART: [warm-reset] ++
4,387,183 UART: [warm-reset] --
4,388,052 UART: [state] Locking Datavault
4,388,802 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,406 UART: [state] Locking ICCM
4,390,024 UART: [exit] Launching FMC @ 0x40000130
4,395,353 UART:
4,395,369 UART: Running Caliptra FMC ...
4,395,777 UART:
4,395,831 UART: [state] CFI Enabled
4,396,910 UART: [aliasrt :skip pcr extension
4,397,383 UART: [art] Extend RT PCRs Done
4,397,811 UART: [art] Lock RT PCRs Done
4,399,148 UART: [art] Populate DV Done
4,407,330 UART: [fht] FMC Alias Private Key: 7
4,408,438 UART: [art] Derive CDI
4,408,718 UART: [art] Store in in slot 0x4
4,494,431 UART: [art] Derive Key Pair
4,494,791 UART: [art] Store priv key in slot 0x5
4,508,189 UART: [art] Derive Key Pair - Done
4,523,101 UART: [art] Signing Cert with AUTHO
4,523,581 UART: RITY.KEYID = 7
4,538,315 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,080 UART: [art] PUB.X = A03BE97572B71D1C50A1F887DF59E4C84871EAD38C3EE74E8A4C0FD81D07C96C857F42E60CCCDBE1C9B981B0CFADD63F
4,545,865 UART: [art] PUB.Y = 021866BC4D2C586814CA7E62AC440F6D4D2E43954AA9B4EEC57CCE75B8E8511D1A6739122683BB294EFD35198E730717
4,552,808 UART: [art] SIG.R = 9E20CA0D244CE6C3A7988C65946176E834118253B13D32A34E83257164C9478F1A9BC18FC3698DB2C76BFBF9C5F9E7DB
4,559,579 UART: [art] SIG.S = F3BDC10BF3D799A2F1434B8BD67D769923F5B69E13F6C958E5290916F8AA04994107761D5D2D623A8E06519F6C05DC8F
4,583,532 UART: Caliptra RT
4,583,786 UART: [state] CFI Enabled
4,869,313 UART: [rt] RT listening for mailbox commands...
4,883,470 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Production
86,011 UART: [state] DebugLocked = Yes
86,739 UART: [state] Starting the WD Timer 40000000 cycles
88,422 UART: [kat] SHA2-256
891,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,101 UART: [kat] ++
896,253 UART: [kat] sha1
900,405 UART: [kat] SHA2-256
902,345 UART: [kat] SHA2-384
905,174 UART: [kat] SHA2-512-ACC
907,075 UART: [kat] ECC-384
916,998 UART: [kat] HMAC-384Kdf
921,486 UART: [kat] LMS
1,169,798 UART: [kat] --
1,170,903 UART: [cold-reset] ++
1,171,250 UART: [fht] FHT @ 0x50003400
1,174,050 UART: [idev] ++
1,174,218 UART: [idev] CDI.KEYID = 6
1,174,579 UART: [idev] SUBJECT.KEYID = 7
1,175,004 UART: [idev] UDS.KEYID = 0
1,175,350 ready_for_fw is high
1,175,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,079 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,628 UART: [ldev] ++
1,209,796 UART: [ldev] CDI.KEYID = 6
1,210,160 UART: [ldev] SUBJECT.KEYID = 5
1,210,587 UART: [ldev] AUTHORITY.KEYID = 7
1,211,050 UART: [ldev] FE.KEYID = 1
1,216,044 UART: [ldev] Erasing FE.KEYID = 1
1,242,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,053 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,747 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,617 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,323 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,503 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x46574c44
1,283,425 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,797,585 >>> mbox cmd response: success
2,798,835 UART: [afmc] ++
2,799,003 UART: [afmc] CDI.KEYID = 6
2,799,366 UART: [afmc] SUBJECT.KEYID = 7
2,799,792 UART: [afmc] AUTHORITY.KEYID = 5
2,835,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,402 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,121 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,014 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,721 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,672 UART: [afmc] --
2,878,649 UART: [cold-reset] --
2,879,357 UART: [state] Locking Datavault
2,880,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,168 UART: [state] Locking ICCM
2,881,834 UART: [exit] Launching FMC @ 0x40000130
2,887,163 UART:
2,887,179 UART: Running Caliptra FMC ...
2,887,587 UART:
2,887,641 UART: [state] CFI Enabled
2,898,086 UART: [fht] FMC Alias Private Key: 7
3,005,695 UART: [art] Extend RT PCRs Done
3,006,123 UART: [art] Lock RT PCRs Done
3,007,725 UART: [art] Populate DV Done
3,016,035 UART: [fht] FMC Alias Private Key: 7
3,017,007 UART: [art] Derive CDI
3,017,287 UART: [art] Store in in slot 0x4
3,102,942 UART: [art] Derive Key Pair
3,103,302 UART: [art] Store priv key in slot 0x5
3,116,070 UART: [art] Derive Key Pair - Done
3,131,012 UART: [art] Signing Cert with AUTHO
3,131,492 UART: RITY.KEYID = 7
3,147,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,831 UART: [art] PUB.X = 219F5E9918C1E193C5AD996B76BD1CE2C26ED7B7BE57CA0D0D2B046C0E8128459E434496E3682B6C77F354B8516A02B1
3,154,590 UART: [art] PUB.Y = B542C9D98695F0CBCAE25827DF394B1AACFF2707B549BD09313F1FDB81065E6D4F838072C66B1CD477934570192EF05A
3,161,537 UART: [art] SIG.R = E9D9290B26DCB375AAEC429450501EF67297D32271F9A812F8EA090FFF66250272DFCC30BEC59FB1FEF74200E3051112
3,168,276 UART: [art] SIG.S = 449233C41AEE2BB262DAC9735418C75D21BEDCD2F6FE1BB998C3E23C5CE80E49769A45EC893C4F7246892EE68C89613B
3,192,438 UART: Caliptra RT
3,192,692 UART: [state] CFI Enabled
3,301,174 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,930 UART:
3,301,946 UART: Running Caliptra ROM ...
3,302,354 UART:
3,302,409 UART: [state] CFI Enabled
3,304,524 UART: [state] LifecycleState = Production
3,305,132 UART: [state] DebugLocked = Yes
3,305,642 UART: [state] Starting the WD Timer 40000000 cycles
3,307,257 UART: [kat] SHA2-256
4,110,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,936 UART: [kat] ++
4,115,088 UART: [kat] sha1
4,119,568 UART: [kat] SHA2-256
4,121,508 UART: [kat] SHA2-384
4,124,281 UART: [kat] SHA2-512-ACC
4,126,182 UART: [kat] ECC-384
4,135,561 UART: [kat] HMAC-384Kdf
4,139,957 UART: [kat] LMS
4,388,269 UART: [kat] --
4,389,235 UART: [warm-reset] ++
4,390,080 UART: [warm-reset] --
4,390,913 UART: [state] Locking Datavault
4,391,677 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,281 UART: [state] Locking ICCM
4,392,755 UART: [exit] Launching FMC @ 0x40000130
4,398,084 UART:
4,398,100 UART: Running Caliptra FMC ...
4,398,508 UART:
4,398,562 UART: [state] CFI Enabled
4,399,955 UART: [aliasrt :skip pcr extension
4,400,428 UART: [art] Extend RT PCRs Done
4,400,856 UART: [art] Lock RT PCRs Done
4,402,101 UART: [art] Populate DV Done
4,410,519 UART: [fht] FMC Alias Private Key: 7
4,411,601 UART: [art] Derive CDI
4,411,881 UART: [art] Store in in slot 0x4
4,497,792 UART: [art] Derive Key Pair
4,498,152 UART: [art] Store priv key in slot 0x5
4,511,142 UART: [art] Derive Key Pair - Done
4,525,782 UART: [art] Signing Cert with AUTHO
4,526,262 UART: RITY.KEYID = 7
4,541,278 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,043 UART: [art] PUB.X = 219F5E9918C1E193C5AD996B76BD1CE2C26ED7B7BE57CA0D0D2B046C0E8128459E434496E3682B6C77F354B8516A02B1
4,548,802 UART: [art] PUB.Y = B542C9D98695F0CBCAE25827DF394B1AACFF2707B549BD09313F1FDB81065E6D4F838072C66B1CD477934570192EF05A
4,555,749 UART: [art] SIG.R = E9D9290B26DCB375AAEC429450501EF67297D32271F9A812F8EA090FFF66250272DFCC30BEC59FB1FEF74200E3051112
4,562,488 UART: [art] SIG.S = 449233C41AEE2BB262DAC9735418C75D21BEDCD2F6FE1BB998C3E23C5CE80E49769A45EC893C4F7246892EE68C89613B
4,586,468 UART: Caliptra RT
4,586,722 UART: [state] CFI Enabled
4,866,133 UART: [rt] RT listening for mailbox commands...
4,880,318 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Production
86,274 UART: [state] DebugLocked = Yes
86,816 UART: [state] Starting the WD Timer 40000000 cycles
88,467 UART: [kat] SHA2-256
892,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,146 UART: [kat] ++
896,298 UART: [kat] sha1
900,712 UART: [kat] SHA2-256
902,652 UART: [kat] SHA2-384
905,453 UART: [kat] SHA2-512-ACC
907,354 UART: [kat] ECC-384
917,377 UART: [kat] HMAC-384Kdf
921,973 UART: [kat] LMS
1,170,285 UART: [kat] --
1,171,380 UART: [cold-reset] ++
1,171,763 UART: [fht] FHT @ 0x50003400
1,174,511 UART: [idev] ++
1,174,679 UART: [idev] CDI.KEYID = 6
1,175,040 UART: [idev] SUBJECT.KEYID = 7
1,175,465 UART: [idev] UDS.KEYID = 0
1,175,811 ready_for_fw is high
1,175,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,839 UART: [idev] Sha1 KeyId Algorithm
1,209,656 UART: [idev] --
1,210,749 UART: [ldev] ++
1,210,917 UART: [ldev] CDI.KEYID = 6
1,211,281 UART: [ldev] SUBJECT.KEYID = 5
1,211,708 UART: [ldev] AUTHORITY.KEYID = 7
1,212,171 UART: [ldev] FE.KEYID = 1
1,217,439 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,664 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,534 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,240 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,334 UART: [ldev] --
1,282,718 UART: [fwproc] Wait for Commands...
1,283,457 UART: [fwproc] Recv command 0x46574c44
1,284,190 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,799,862 >>> mbox cmd response: success
2,800,926 UART: [afmc] ++
2,801,094 UART: [afmc] CDI.KEYID = 6
2,801,457 UART: [afmc] SUBJECT.KEYID = 7
2,801,883 UART: [afmc] AUTHORITY.KEYID = 5
2,837,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,283 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,002 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,895 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,602 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,461 UART: [afmc] --
2,881,438 UART: [cold-reset] --
2,882,284 UART: [state] Locking Datavault
2,883,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,031 UART: [state] Locking ICCM
2,884,547 UART: [exit] Launching FMC @ 0x40000130
2,889,876 UART:
2,889,892 UART: Running Caliptra FMC ...
2,890,300 UART:
2,890,443 UART: [state] CFI Enabled
2,900,874 UART: [fht] FMC Alias Private Key: 7
3,008,713 UART: [art] Extend RT PCRs Done
3,009,141 UART: [art] Lock RT PCRs Done
3,010,705 UART: [art] Populate DV Done
3,018,757 UART: [fht] FMC Alias Private Key: 7
3,019,723 UART: [art] Derive CDI
3,020,003 UART: [art] Store in in slot 0x4
3,105,454 UART: [art] Derive Key Pair
3,105,814 UART: [art] Store priv key in slot 0x5
3,119,666 UART: [art] Derive Key Pair - Done
3,134,334 UART: [art] Signing Cert with AUTHO
3,134,814 UART: RITY.KEYID = 7
3,149,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,581 UART: [art] PUB.X = 0EEEC2961B77AD99E2D7A75A58A8198F1E1B16C04425DC026BEDC4AA121DDC7D243C113E3681D2017AE49361F480C400
3,157,328 UART: [art] PUB.Y = F8F455668680B86CDF5B44BCAAE32A6BAB65E23738AE5338F41762B7000CF4E2FFCBB5FB53C351C09DA8A108F39E715F
3,164,266 UART: [art] SIG.R = 838F9B5185F967EC5CD86D4C1F428EC9E63A5634BC058675B9CB6CF954D0F3CFFA39E68E9A52BD08FA273A6982D05484
3,171,040 UART: [art] SIG.S = ED5D192CD9BF2C80AEB3AB2C89EDEEEA8533A7D36C6B0453850112AA617ED918216147BC1AC5895F4DE5BCF4C4AC5135
3,194,717 UART: Caliptra RT
3,195,063 UART: [state] CFI Enabled
3,303,557 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,313 UART:
3,304,329 UART: Running Caliptra ROM ...
3,304,737 UART:
3,304,879 UART: [state] CFI Enabled
3,307,262 UART: [state] LifecycleState = Production
3,307,870 UART: [state] DebugLocked = Yes
3,308,484 UART: [state] Starting the WD Timer 40000000 cycles
3,310,135 UART: [kat] SHA2-256
4,113,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,814 UART: [kat] ++
4,117,966 UART: [kat] sha1
4,122,062 UART: [kat] SHA2-256
4,124,002 UART: [kat] SHA2-384
4,126,611 UART: [kat] SHA2-512-ACC
4,128,512 UART: [kat] ECC-384
4,137,931 UART: [kat] HMAC-384Kdf
4,142,341 UART: [kat] LMS
4,390,653 UART: [kat] --
4,391,581 UART: [warm-reset] ++
4,392,810 UART: [warm-reset] --
4,393,629 UART: [state] Locking Datavault
4,394,265 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,869 UART: [state] Locking ICCM
4,395,531 UART: [exit] Launching FMC @ 0x40000130
4,400,860 UART:
4,400,876 UART: Running Caliptra FMC ...
4,401,284 UART:
4,401,427 UART: [state] CFI Enabled
4,402,676 UART: [aliasrt :skip pcr extension
4,403,149 UART: [art] Extend RT PCRs Done
4,403,577 UART: [art] Lock RT PCRs Done
4,405,022 UART: [art] Populate DV Done
4,413,526 UART: [fht] FMC Alias Private Key: 7
4,414,518 UART: [art] Derive CDI
4,414,798 UART: [art] Store in in slot 0x4
4,500,325 UART: [art] Derive Key Pair
4,500,685 UART: [art] Store priv key in slot 0x5
4,514,015 UART: [art] Derive Key Pair - Done
4,528,535 UART: [art] Signing Cert with AUTHO
4,529,015 UART: RITY.KEYID = 7
4,544,359 UART: [art] Erasing AUTHORITY.KEYID = 7
4,545,124 UART: [art] PUB.X = 0EEEC2961B77AD99E2D7A75A58A8198F1E1B16C04425DC026BEDC4AA121DDC7D243C113E3681D2017AE49361F480C400
4,551,871 UART: [art] PUB.Y = F8F455668680B86CDF5B44BCAAE32A6BAB65E23738AE5338F41762B7000CF4E2FFCBB5FB53C351C09DA8A108F39E715F
4,558,809 UART: [art] SIG.R = 838F9B5185F967EC5CD86D4C1F428EC9E63A5634BC058675B9CB6CF954D0F3CFFA39E68E9A52BD08FA273A6982D05484
4,565,583 UART: [art] SIG.S = ED5D192CD9BF2C80AEB3AB2C89EDEEEA8533A7D36C6B0453850112AA617ED918216147BC1AC5895F4DE5BCF4C4AC5135
4,589,376 UART: Caliptra RT
4,589,722 UART: [state] CFI Enabled
4,866,281 UART: [rt] RT listening for mailbox commands...
4,880,382 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Production
86,120 UART: [state] DebugLocked = Yes
86,788 UART: [state] Starting the WD Timer 40000000 cycles
88,409 UART: [kat] SHA2-256
891,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,088 UART: [kat] ++
896,240 UART: [kat] sha1
900,548 UART: [kat] SHA2-256
902,488 UART: [kat] SHA2-384
905,437 UART: [kat] SHA2-512-ACC
907,338 UART: [kat] ECC-384
917,001 UART: [kat] HMAC-384Kdf
921,601 UART: [kat] LMS
1,169,913 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,157 UART: [fht] FHT @ 0x50003400
1,173,599 UART: [idev] ++
1,173,767 UART: [idev] CDI.KEYID = 6
1,174,128 UART: [idev] SUBJECT.KEYID = 7
1,174,553 UART: [idev] UDS.KEYID = 0
1,174,899 ready_for_fw is high
1,174,899 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,811 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,222 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,092 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,798 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,828 UART: [ldev] --
1,282,200 UART: [fwproc] Wait for Commands...
1,282,943 UART: [fwproc] Recv command 0x46574c44
1,283,676 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,070 >>> mbox cmd response: success
2,799,156 UART: [afmc] ++
2,799,324 UART: [afmc] CDI.KEYID = 6
2,799,687 UART: [afmc] SUBJECT.KEYID = 7
2,800,113 UART: [afmc] AUTHORITY.KEYID = 5
2,835,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,387 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,106 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,999 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,706 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,647 UART: [afmc] --
2,879,734 UART: [cold-reset] --
2,880,690 UART: [state] Locking Datavault
2,881,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,503 UART: [state] Locking ICCM
2,882,925 UART: [exit] Launching FMC @ 0x40000130
2,888,254 UART:
2,888,270 UART: Running Caliptra FMC ...
2,888,678 UART:
2,888,821 UART: [state] CFI Enabled
2,898,958 UART: [fht] FMC Alias Private Key: 7
3,007,105 UART: [art] Extend RT PCRs Done
3,007,533 UART: [art] Lock RT PCRs Done
3,009,167 UART: [art] Populate DV Done
3,017,333 UART: [fht] FMC Alias Private Key: 7
3,018,361 UART: [art] Derive CDI
3,018,641 UART: [art] Store in in slot 0x4
3,104,268 UART: [art] Derive Key Pair
3,104,628 UART: [art] Store priv key in slot 0x5
3,118,360 UART: [art] Derive Key Pair - Done
3,133,318 UART: [art] Signing Cert with AUTHO
3,133,798 UART: RITY.KEYID = 7
3,149,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,085 UART: [art] PUB.X = F6D0892477111B5CCC4472D0D03A269AD36017C9DBB4D204B0B3CEE3EB5B0D9C4E33EA3186CEEDA4491CF767B6727399
3,156,861 UART: [art] PUB.Y = F79BC24287DB549EC93AD3E12EA52D88B0FCE2D94FD07AF5E761EEA6EE6E01FACA366CAFDC52B6D8CEBFCA45E6B04CC1
3,163,846 UART: [art] SIG.R = 41E44687ABD6021C66C1B4E64A6613B2A32711C5BBDE34AC725D01A30D9AF8D2043789D44B6D7521653E395E13C15183
3,170,602 UART: [art] SIG.S = C41097A86AA43979C483D130F2B8FCFD506FF1758230FC81D0D2B45980C081CC4A273C7E1FBB7A5A008015320A0E2B68
3,194,833 UART: Caliptra RT
3,195,179 UART: [state] CFI Enabled
3,302,383 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,139 UART:
3,303,155 UART: Running Caliptra ROM ...
3,303,563 UART:
3,303,705 UART: [state] CFI Enabled
3,306,496 UART: [state] LifecycleState = Production
3,307,104 UART: [state] DebugLocked = Yes
3,307,630 UART: [state] Starting the WD Timer 40000000 cycles
3,309,255 UART: [kat] SHA2-256
4,112,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,934 UART: [kat] ++
4,117,086 UART: [kat] sha1
4,121,392 UART: [kat] SHA2-256
4,123,332 UART: [kat] SHA2-384
4,126,081 UART: [kat] SHA2-512-ACC
4,127,982 UART: [kat] ECC-384
4,138,003 UART: [kat] HMAC-384Kdf
4,142,647 UART: [kat] LMS
4,390,959 UART: [kat] --
4,391,741 UART: [warm-reset] ++
4,392,816 UART: [warm-reset] --
4,393,407 UART: [state] Locking Datavault
4,394,203 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,807 UART: [state] Locking ICCM
4,395,285 UART: [exit] Launching FMC @ 0x40000130
4,400,614 UART:
4,400,630 UART: Running Caliptra FMC ...
4,401,038 UART:
4,401,181 UART: [state] CFI Enabled
4,402,412 UART: [aliasrt :skip pcr extension
4,402,885 UART: [art] Extend RT PCRs Done
4,403,313 UART: [art] Lock RT PCRs Done
4,404,720 UART: [art] Populate DV Done
4,412,834 UART: [fht] FMC Alias Private Key: 7
4,413,804 UART: [art] Derive CDI
4,414,084 UART: [art] Store in in slot 0x4
4,499,871 UART: [art] Derive Key Pair
4,500,231 UART: [art] Store priv key in slot 0x5
4,513,185 UART: [art] Derive Key Pair - Done
4,527,829 UART: [art] Signing Cert with AUTHO
4,528,309 UART: RITY.KEYID = 7
4,543,447 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,212 UART: [art] PUB.X = F6D0892477111B5CCC4472D0D03A269AD36017C9DBB4D204B0B3CEE3EB5B0D9C4E33EA3186CEEDA4491CF767B6727399
4,550,988 UART: [art] PUB.Y = F79BC24287DB549EC93AD3E12EA52D88B0FCE2D94FD07AF5E761EEA6EE6E01FACA366CAFDC52B6D8CEBFCA45E6B04CC1
4,557,973 UART: [art] SIG.R = 41E44687ABD6021C66C1B4E64A6613B2A32711C5BBDE34AC725D01A30D9AF8D2043789D44B6D7521653E395E13C15183
4,564,729 UART: [art] SIG.S = C41097A86AA43979C483D130F2B8FCFD506FF1758230FC81D0D2B45980C081CC4A273C7E1FBB7A5A008015320A0E2B68
4,588,294 UART: Caliptra RT
4,588,640 UART: [state] CFI Enabled
4,871,723 UART: [rt] RT listening for mailbox commands...
4,886,086 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,785 UART: [state] LifecycleState = Production
85,393 UART: [state] DebugLocked = Yes
86,073 UART: [state] Starting the WD Timer 40000000 cycles
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,174,484 ready_for_fw is high
1,174,484 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,170 UART: [idev] Sha1 KeyId Algorithm
1,207,103 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,214,760 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,567 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,261 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,131 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,837 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,897 UART: [ldev] --
1,280,295 UART: [fwproc] Wait for Commands...
1,281,060 UART: [fwproc] Recv command 0x46574c44
1,281,793 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,796,817 >>> mbox cmd response: success
2,797,903 UART: [afmc] ++
2,798,071 UART: [afmc] CDI.KEYID = 6
2,798,434 UART: [afmc] SUBJECT.KEYID = 7
2,798,860 UART: [afmc] AUTHORITY.KEYID = 5
2,834,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,794 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,513 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,406 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,113 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,880 UART: [afmc] --
2,877,863 UART: [cold-reset] --
2,878,713 UART: [state] Locking Datavault
2,879,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,564 UART: [state] Locking ICCM
2,881,018 UART: [exit] Launching FMC @ 0x40000130
2,886,347 UART:
2,886,363 UART: Running Caliptra FMC ...
2,886,771 UART:
2,886,825 UART: [state] CFI Enabled
2,897,090 UART: [fht] FMC Alias Private Key: 7
3,004,895 UART: [art] Extend RT PCRs Done
3,005,323 UART: [art] Lock RT PCRs Done
3,006,947 UART: [art] Populate DV Done
3,014,899 UART: [fht] FMC Alias Private Key: 7
3,016,031 UART: [art] Derive CDI
3,016,311 UART: [art] Store in in slot 0x4
3,102,104 UART: [art] Derive Key Pair
3,102,464 UART: [art] Store priv key in slot 0x5
3,115,728 UART: [art] Derive Key Pair - Done
3,130,250 UART: [art] Signing Cert with AUTHO
3,130,730 UART: RITY.KEYID = 7
3,146,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,871 UART: [art] PUB.X = 070A958E34292035EB022C8B35BA7E2E7ADB2BEC132E03CBEDACC1B128CD19EFE3FF77040CACB91C2A59CD55929BC2F6
3,153,647 UART: [art] PUB.Y = A0CBDB9F92D2C48CF4883AC111895F24614C2FFBDC2FEC40D39AE9CA458E8761BEF2883EF394E1BC3CB8B1746ABE2178
3,160,619 UART: [art] SIG.R = 0B1B8A8A8AE81E524CF1BA08A310EAC8F67575FC931BA13B646731440EA72F62AD00BB07FE0740F9979849066F314E57
3,167,353 UART: [art] SIG.S = 9A43D54B0AA5629E6716FC6CBACC46B6E1BAE36C5420AA22B2565492A4BF3EEEB54B2ECC93959395151259A7B1E923E1
3,191,173 UART: Caliptra RT
3,191,427 UART: [state] CFI Enabled
3,300,515 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,271 UART:
3,301,287 UART: Running Caliptra ROM ...
3,301,695 UART:
3,301,750 UART: [state] CFI Enabled
3,304,533 UART: [state] LifecycleState = Production
3,305,141 UART: [state] DebugLocked = Yes
3,305,785 UART: [state] Starting the WD Timer 40000000 cycles
3,307,372 UART: [kat] SHA2-256
4,110,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,051 UART: [kat] ++
4,115,203 UART: [kat] sha1
4,119,521 UART: [kat] SHA2-256
4,121,461 UART: [kat] SHA2-384
4,124,306 UART: [kat] SHA2-512-ACC
4,126,207 UART: [kat] ECC-384
4,136,100 UART: [kat] HMAC-384Kdf
4,140,710 UART: [kat] LMS
4,389,022 UART: [kat] --
4,389,750 UART: [warm-reset] ++
4,390,501 UART: [warm-reset] --
4,391,378 UART: [state] Locking Datavault
4,392,212 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,816 UART: [state] Locking ICCM
4,393,400 UART: [exit] Launching FMC @ 0x40000130
4,398,729 UART:
4,398,745 UART: Running Caliptra FMC ...
4,399,153 UART:
4,399,207 UART: [state] CFI Enabled
4,400,348 UART: [aliasrt :skip pcr extension
4,400,821 UART: [art] Extend RT PCRs Done
4,401,249 UART: [art] Lock RT PCRs Done
4,402,692 UART: [art] Populate DV Done
4,410,992 UART: [fht] FMC Alias Private Key: 7
4,412,004 UART: [art] Derive CDI
4,412,284 UART: [art] Store in in slot 0x4
4,498,065 UART: [art] Derive Key Pair
4,498,425 UART: [art] Store priv key in slot 0x5
4,510,729 UART: [art] Derive Key Pair - Done
4,525,295 UART: [art] Signing Cert with AUTHO
4,525,775 UART: RITY.KEYID = 7
4,541,311 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,076 UART: [art] PUB.X = 070A958E34292035EB022C8B35BA7E2E7ADB2BEC132E03CBEDACC1B128CD19EFE3FF77040CACB91C2A59CD55929BC2F6
4,548,852 UART: [art] PUB.Y = A0CBDB9F92D2C48CF4883AC111895F24614C2FFBDC2FEC40D39AE9CA458E8761BEF2883EF394E1BC3CB8B1746ABE2178
4,555,824 UART: [art] SIG.R = 0B1B8A8A8AE81E524CF1BA08A310EAC8F67575FC931BA13B646731440EA72F62AD00BB07FE0740F9979849066F314E57
4,562,558 UART: [art] SIG.S = 9A43D54B0AA5629E6716FC6CBACC46B6E1BAE36C5420AA22B2565492A4BF3EEEB54B2ECC93959395151259A7B1E923E1
4,586,698 UART: Caliptra RT
4,586,952 UART: [state] CFI Enabled
4,866,429 UART: [rt] RT listening for mailbox commands...
4,880,088 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Production
85,581 UART: [state] DebugLocked = Yes
86,089 UART: [state] Starting the WD Timer 40000000 cycles
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,395 UART: [cold-reset] ++
1,169,896 UART: [fht] FHT @ 0x50003400
1,172,530 UART: [idev] ++
1,172,698 UART: [idev] CDI.KEYID = 6
1,173,059 UART: [idev] SUBJECT.KEYID = 7
1,173,484 UART: [idev] UDS.KEYID = 0
1,173,830 ready_for_fw is high
1,173,830 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,639 UART: [idev] Erasing UDS.KEYID = 0
1,198,894 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,597 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,467 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,173 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,261 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,476 UART: [fwproc] Recv command 0x46574c44
1,282,209 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,795,349 >>> mbox cmd response: success
2,796,379 UART: [afmc] ++
2,796,547 UART: [afmc] CDI.KEYID = 6
2,796,910 UART: [afmc] SUBJECT.KEYID = 7
2,797,336 UART: [afmc] AUTHORITY.KEYID = 5
2,832,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,212 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,931 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,824 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,531 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,282 UART: [afmc] --
2,876,283 UART: [cold-reset] --
2,877,049 UART: [state] Locking Datavault
2,878,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,604 UART: [state] Locking ICCM
2,879,140 UART: [exit] Launching FMC @ 0x40000130
2,884,469 UART:
2,884,485 UART: Running Caliptra FMC ...
2,884,893 UART:
2,884,947 UART: [state] CFI Enabled
2,895,204 UART: [fht] FMC Alias Private Key: 7
3,002,627 UART: [art] Extend RT PCRs Done
3,003,055 UART: [art] Lock RT PCRs Done
3,004,911 UART: [art] Populate DV Done
3,013,293 UART: [fht] FMC Alias Private Key: 7
3,014,271 UART: [art] Derive CDI
3,014,551 UART: [art] Store in in slot 0x4
3,099,802 UART: [art] Derive Key Pair
3,100,162 UART: [art] Store priv key in slot 0x5
3,112,780 UART: [art] Derive Key Pair - Done
3,127,883 UART: [art] Signing Cert with AUTHO
3,128,363 UART: RITY.KEYID = 7
3,143,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,144,258 UART: [art] PUB.X = AEB7D310B1338BC26FC43475D298441DFEE9A240BE6AEDF3C8B77F1F80622F5086844953D3FD244D8151C9690684469D
3,151,027 UART: [art] PUB.Y = 745EE73B7CCC3048E9A4CBA9E76DE4C18BB517346722AAB1D5546F781754060C030081D225184E6ED2E884A32A3B9D43
3,157,948 UART: [art] SIG.R = 0866D1F09E42F424D6F1391DE78CE7FC765EAC9BDAE21C4D476375211FF20EE66807936DE597015514AD92F73E62D7FF
3,164,712 UART: [art] SIG.S = 4FBFD18EA804D861812E31EA008225F43CF4D5606774ADF524FF5E94C6A93120E587F05A6DBFF1EFEBD4518416328A13
3,188,666 UART: Caliptra RT
3,188,920 UART: [state] CFI Enabled
3,296,215 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,971 UART:
3,296,987 UART: Running Caliptra ROM ...
3,297,395 UART:
3,297,450 UART: [state] CFI Enabled
3,300,065 UART: [state] LifecycleState = Production
3,300,673 UART: [state] DebugLocked = Yes
3,301,291 UART: [state] Starting the WD Timer 40000000 cycles
3,302,788 UART: [kat] SHA2-256
4,106,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,467 UART: [kat] ++
4,110,619 UART: [kat] sha1
4,114,659 UART: [kat] SHA2-256
4,116,599 UART: [kat] SHA2-384
4,119,310 UART: [kat] SHA2-512-ACC
4,121,211 UART: [kat] ECC-384
4,130,840 UART: [kat] HMAC-384Kdf
4,135,464 UART: [kat] LMS
4,383,776 UART: [kat] --
4,384,662 UART: [warm-reset] ++
4,385,607 UART: [warm-reset] --
4,386,612 UART: [state] Locking Datavault
4,387,354 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,958 UART: [state] Locking ICCM
4,388,580 UART: [exit] Launching FMC @ 0x40000130
4,393,909 UART:
4,393,925 UART: Running Caliptra FMC ...
4,394,333 UART:
4,394,387 UART: [state] CFI Enabled
4,395,482 UART: [aliasrt :skip pcr extension
4,395,955 UART: [art] Extend RT PCRs Done
4,396,383 UART: [art] Lock RT PCRs Done
4,397,606 UART: [art] Populate DV Done
4,405,744 UART: [fht] FMC Alias Private Key: 7
4,406,724 UART: [art] Derive CDI
4,407,004 UART: [art] Store in in slot 0x4
4,492,663 UART: [art] Derive Key Pair
4,493,023 UART: [art] Store priv key in slot 0x5
4,506,999 UART: [art] Derive Key Pair - Done
4,521,762 UART: [art] Signing Cert with AUTHO
4,522,242 UART: RITY.KEYID = 7
4,536,908 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,673 UART: [art] PUB.X = AEB7D310B1338BC26FC43475D298441DFEE9A240BE6AEDF3C8B77F1F80622F5086844953D3FD244D8151C9690684469D
4,544,442 UART: [art] PUB.Y = 745EE73B7CCC3048E9A4CBA9E76DE4C18BB517346722AAB1D5546F781754060C030081D225184E6ED2E884A32A3B9D43
4,551,363 UART: [art] SIG.R = 0866D1F09E42F424D6F1391DE78CE7FC765EAC9BDAE21C4D476375211FF20EE66807936DE597015514AD92F73E62D7FF
4,558,127 UART: [art] SIG.S = 4FBFD18EA804D861812E31EA008225F43CF4D5606774ADF524FF5E94C6A93120E587F05A6DBFF1EFEBD4518416328A13
4,582,183 UART: Caliptra RT
4,582,437 UART: [state] CFI Enabled
4,863,119 UART: [rt] RT listening for mailbox commands...
4,876,358 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,030 UART: [state] DebugLocked = Yes
86,670 UART: [state] Starting the WD Timer 40000000 cycles
88,349 UART: [kat] SHA2-256
891,899 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,028 UART: [kat] ++
896,180 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,699 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,626 UART: [cold-reset] ++
1,171,085 UART: [fht] FHT @ 0x50003400
1,173,615 UART: [idev] ++
1,173,783 UART: [idev] CDI.KEYID = 6
1,174,144 UART: [idev] SUBJECT.KEYID = 7
1,174,569 UART: [idev] UDS.KEYID = 0
1,174,915 ready_for_fw is high
1,174,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,225 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,371 UART: [ldev] ++
1,210,539 UART: [ldev] CDI.KEYID = 6
1,210,903 UART: [ldev] SUBJECT.KEYID = 5
1,211,330 UART: [ldev] AUTHORITY.KEYID = 7
1,211,793 UART: [ldev] FE.KEYID = 1
1,217,219 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,470 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,164 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,034 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,740 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,740 UART: [ldev] --
1,283,162 UART: [fwproc] Wait for Commands...
1,283,959 UART: [fwproc] Recv command 0x46574c44
1,284,692 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,696 >>> mbox cmd response: success
2,799,814 UART: [afmc] ++
2,799,982 UART: [afmc] CDI.KEYID = 6
2,800,345 UART: [afmc] SUBJECT.KEYID = 7
2,800,771 UART: [afmc] AUTHORITY.KEYID = 5
2,835,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,193 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,912 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,805 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,512 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,333 UART: [afmc] --
2,879,406 UART: [cold-reset] --
2,880,282 UART: [state] Locking Datavault
2,881,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,009 UART: [state] Locking ICCM
2,882,671 UART: [exit] Launching FMC @ 0x40000130
2,888,000 UART:
2,888,016 UART: Running Caliptra FMC ...
2,888,424 UART:
2,888,567 UART: [state] CFI Enabled
2,899,206 UART: [fht] FMC Alias Private Key: 7
3,006,733 UART: [art] Extend RT PCRs Done
3,007,161 UART: [art] Lock RT PCRs Done
3,008,543 UART: [art] Populate DV Done
3,016,631 UART: [fht] FMC Alias Private Key: 7
3,017,569 UART: [art] Derive CDI
3,017,849 UART: [art] Store in in slot 0x4
3,103,388 UART: [art] Derive Key Pair
3,103,748 UART: [art] Store priv key in slot 0x5
3,117,660 UART: [art] Derive Key Pair - Done
3,132,228 UART: [art] Signing Cert with AUTHO
3,132,708 UART: RITY.KEYID = 7
3,147,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,679 UART: [art] PUB.X = 43360B6729F6613CD9514E98F116CFECE1256228FE0565502F0DFCA63341A0C2EB66D25D6A47DCEDF9ACDB862A9BEF97
3,155,454 UART: [art] PUB.Y = 5D92D9BA7C57EB5395FBD3B66CE3670872D6646A2E1657381059F3557A02169830A8E5E74BA771FFB76CC1BF42E3CD8F
3,162,404 UART: [art] SIG.R = 4C5894EE1580447AF11D14C96F88FB0A7BA93AEB2C486D34BCBEE3BA7B245E808F5893DCF0028F5060F3C7F491D3C32C
3,169,182 UART: [art] SIG.S = 27F871D2A5ACA06A117EA42A3E748ED26449B3E7D75E825660EB49DDFFFDA398C59DAB759C4822983E7B4D4C9AD0F3D3
3,192,489 UART: Caliptra RT
3,192,835 UART: [state] CFI Enabled
3,299,566 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,322 UART:
3,300,338 UART: Running Caliptra ROM ...
3,300,746 UART:
3,300,888 UART: [state] CFI Enabled
3,303,661 UART: [state] LifecycleState = Production
3,304,269 UART: [state] DebugLocked = Yes
3,304,829 UART: [state] Starting the WD Timer 40000000 cycles
3,306,392 UART: [kat] SHA2-256
4,109,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,071 UART: [kat] ++
4,114,223 UART: [kat] sha1
4,118,541 UART: [kat] SHA2-256
4,120,481 UART: [kat] SHA2-384
4,123,268 UART: [kat] SHA2-512-ACC
4,125,169 UART: [kat] ECC-384
4,134,944 UART: [kat] HMAC-384Kdf
4,139,564 UART: [kat] LMS
4,387,876 UART: [kat] --
4,388,802 UART: [warm-reset] ++
4,389,771 UART: [warm-reset] --
4,390,696 UART: [state] Locking Datavault
4,391,372 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,976 UART: [state] Locking ICCM
4,392,410 UART: [exit] Launching FMC @ 0x40000130
4,397,739 UART:
4,397,755 UART: Running Caliptra FMC ...
4,398,163 UART:
4,398,306 UART: [state] CFI Enabled
4,399,819 UART: [aliasrt :skip pcr extension
4,400,292 UART: [art] Extend RT PCRs Done
4,400,720 UART: [art] Lock RT PCRs Done
4,401,921 UART: [art] Populate DV Done
4,410,123 UART: [fht] FMC Alias Private Key: 7
4,411,271 UART: [art] Derive CDI
4,411,551 UART: [art] Store in in slot 0x4
4,497,134 UART: [art] Derive Key Pair
4,497,494 UART: [art] Store priv key in slot 0x5
4,511,182 UART: [art] Derive Key Pair - Done
4,526,038 UART: [art] Signing Cert with AUTHO
4,526,518 UART: RITY.KEYID = 7
4,541,770 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,535 UART: [art] PUB.X = 43360B6729F6613CD9514E98F116CFECE1256228FE0565502F0DFCA63341A0C2EB66D25D6A47DCEDF9ACDB862A9BEF97
4,549,310 UART: [art] PUB.Y = 5D92D9BA7C57EB5395FBD3B66CE3670872D6646A2E1657381059F3557A02169830A8E5E74BA771FFB76CC1BF42E3CD8F
4,556,260 UART: [art] SIG.R = 4C5894EE1580447AF11D14C96F88FB0A7BA93AEB2C486D34BCBEE3BA7B245E808F5893DCF0028F5060F3C7F491D3C32C
4,563,038 UART: [art] SIG.S = 27F871D2A5ACA06A117EA42A3E748ED26449B3E7D75E825660EB49DDFFFDA398C59DAB759C4822983E7B4D4C9AD0F3D3
4,587,215 UART: Caliptra RT
4,587,561 UART: [state] CFI Enabled
4,871,933 UART: [rt] RT listening for mailbox commands...
4,886,316 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Production
86,310 UART: [state] DebugLocked = Yes
87,064 UART: [state] Starting the WD Timer 40000000 cycles
88,535 UART: [kat] SHA2-256
892,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,214 UART: [kat] ++
896,366 UART: [kat] sha1
900,662 UART: [kat] SHA2-256
902,602 UART: [kat] SHA2-384
905,347 UART: [kat] SHA2-512-ACC
907,248 UART: [kat] ECC-384
916,901 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,862 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,174,017 UART: [idev] ++
1,174,185 UART: [idev] CDI.KEYID = 6
1,174,546 UART: [idev] SUBJECT.KEYID = 7
1,174,971 UART: [idev] UDS.KEYID = 0
1,175,317 ready_for_fw is high
1,175,317 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,112 UART: [idev] Erasing UDS.KEYID = 0
1,200,185 UART: [idev] Sha1 KeyId Algorithm
1,208,986 UART: [idev] --
1,209,987 UART: [ldev] ++
1,210,155 UART: [ldev] CDI.KEYID = 6
1,210,519 UART: [ldev] SUBJECT.KEYID = 5
1,210,946 UART: [ldev] AUTHORITY.KEYID = 7
1,211,409 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,106 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,976 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,682 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,792 UART: [ldev] --
1,282,078 UART: [fwproc] Wait for Commands...
1,282,685 UART: [fwproc] Recv command 0x46574c44
1,283,418 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,984 >>> mbox cmd response: success
2,800,126 UART: [afmc] ++
2,800,294 UART: [afmc] CDI.KEYID = 6
2,800,657 UART: [afmc] SUBJECT.KEYID = 7
2,801,083 UART: [afmc] AUTHORITY.KEYID = 5
2,837,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,854,759 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,860,478 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,866,371 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,078 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,879,767 UART: [afmc] --
2,880,674 UART: [cold-reset] --
2,881,556 UART: [state] Locking Datavault
2,882,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,883,389 UART: [state] Locking ICCM
2,883,837 UART: [exit] Launching FMC @ 0x40000130
2,889,166 UART:
2,889,182 UART: Running Caliptra FMC ...
2,889,590 UART:
2,889,733 UART: [state] CFI Enabled
2,900,222 UART: [fht] FMC Alias Private Key: 7
3,008,159 UART: [art] Extend RT PCRs Done
3,008,587 UART: [art] Lock RT PCRs Done
3,010,135 UART: [art] Populate DV Done
3,018,215 UART: [fht] FMC Alias Private Key: 7
3,019,309 UART: [art] Derive CDI
3,019,589 UART: [art] Store in in slot 0x4
3,105,964 UART: [art] Derive Key Pair
3,106,324 UART: [art] Store priv key in slot 0x5
3,119,646 UART: [art] Derive Key Pair - Done
3,134,322 UART: [art] Signing Cert with AUTHO
3,134,802 UART: RITY.KEYID = 7
3,150,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,150,907 UART: [art] PUB.X = 0AE8FCB2EA47A420C29F1F3CFFE0BEDA3E0ADCF1990DA734FF5FB130BF0F549DC52B83334BBEC5A9B7920D95578274EA
3,157,690 UART: [art] PUB.Y = 48B2E642FCD350A65E666160066C43D14A2B533DF849D2115B8E190318401CC03BA6DF833ECFB3363309E9263EDA97B2
3,164,631 UART: [art] SIG.R = 6A15A716423C88B0D6055A536B6ACF0344F373424E9B46418350CE5759191424095B5E5743E8256C9683CFA6676E72FC
3,171,380 UART: [art] SIG.S = 28276EB247F2284CEE003651B81C1F887EA6088AA3B269605117186F2F9AA2C53960ED0A0AA0DDF76006115CC85ABD30
3,194,785 UART: Caliptra RT
3,195,131 UART: [state] CFI Enabled
3,302,926 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,303,682 UART:
3,303,698 UART: Running Caliptra ROM ...
3,304,106 UART:
3,304,248 UART: [state] CFI Enabled
3,306,889 UART: [state] LifecycleState = Production
3,307,497 UART: [state] DebugLocked = Yes
3,308,087 UART: [state] Starting the WD Timer 40000000 cycles
3,309,604 UART: [kat] SHA2-256
4,113,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,283 UART: [kat] ++
4,117,435 UART: [kat] sha1
4,121,607 UART: [kat] SHA2-256
4,123,547 UART: [kat] SHA2-384
4,126,154 UART: [kat] SHA2-512-ACC
4,128,055 UART: [kat] ECC-384
4,137,840 UART: [kat] HMAC-384Kdf
4,142,480 UART: [kat] LMS
4,390,792 UART: [kat] --
4,391,860 UART: [warm-reset] ++
4,392,843 UART: [warm-reset] --
4,393,622 UART: [state] Locking Datavault
4,394,404 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,008 UART: [state] Locking ICCM
4,395,516 UART: [exit] Launching FMC @ 0x40000130
4,400,845 UART:
4,400,861 UART: Running Caliptra FMC ...
4,401,269 UART:
4,401,412 UART: [state] CFI Enabled
4,402,795 UART: [aliasrt :skip pcr extension
4,403,268 UART: [art] Extend RT PCRs Done
4,403,696 UART: [art] Lock RT PCRs Done
4,404,955 UART: [art] Populate DV Done
4,413,317 UART: [fht] FMC Alias Private Key: 7
4,414,305 UART: [art] Derive CDI
4,414,585 UART: [art] Store in in slot 0x4
4,500,170 UART: [art] Derive Key Pair
4,500,530 UART: [art] Store priv key in slot 0x5
4,513,516 UART: [art] Derive Key Pair - Done
4,528,516 UART: [art] Signing Cert with AUTHO
4,528,996 UART: RITY.KEYID = 7
4,544,172 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,937 UART: [art] PUB.X = 0AE8FCB2EA47A420C29F1F3CFFE0BEDA3E0ADCF1990DA734FF5FB130BF0F549DC52B83334BBEC5A9B7920D95578274EA
4,551,720 UART: [art] PUB.Y = 48B2E642FCD350A65E666160066C43D14A2B533DF849D2115B8E190318401CC03BA6DF833ECFB3363309E9263EDA97B2
4,558,661 UART: [art] SIG.R = 6A15A716423C88B0D6055A536B6ACF0344F373424E9B46418350CE5759191424095B5E5743E8256C9683CFA6676E72FC
4,565,410 UART: [art] SIG.S = 28276EB247F2284CEE003651B81C1F887EA6088AA3B269605117186F2F9AA2C53960ED0A0AA0DDF76006115CC85ABD30
4,588,887 UART: Caliptra RT
4,589,233 UART: [state] CFI Enabled
4,870,823 UART: [rt] RT listening for mailbox commands...
4,884,916 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Production
85,779 UART: [state] DebugLocked = Yes
86,521 UART: [state] Starting the WD Timer 40000000 cycles
88,178 UART: [kat] SHA2-256
891,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,857 UART: [kat] ++
896,009 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,914 UART: [kat] LMS
1,169,226 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,174,702 ready_for_fw is high
1,174,702 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,208,031 UART: [idev] --
1,209,024 UART: [ldev] ++
1,209,192 UART: [ldev] CDI.KEYID = 6
1,209,556 UART: [ldev] SUBJECT.KEYID = 5
1,209,983 UART: [ldev] AUTHORITY.KEYID = 7
1,210,446 UART: [ldev] FE.KEYID = 1
1,215,464 UART: [ldev] Erasing FE.KEYID = 1
1,241,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,987 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,681 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,551 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,257 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,215 UART: [ldev] --
1,280,707 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,797,263 >>> mbox cmd response: success
2,798,511 UART: [afmc] ++
2,798,679 UART: [afmc] CDI.KEYID = 6
2,799,042 UART: [afmc] SUBJECT.KEYID = 7
2,799,468 UART: [afmc] AUTHORITY.KEYID = 5
2,834,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,116 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,835 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,728 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,435 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,186 UART: [afmc] --
2,878,213 UART: [cold-reset] --
2,878,905 UART: [state] Locking Datavault
2,880,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,726 UART: [state] Locking ICCM
2,881,300 UART: [exit] Launching FMC @ 0x40000130
2,886,629 UART:
2,886,645 UART: Running Caliptra FMC ...
2,887,053 UART:
2,887,107 UART: [state] CFI Enabled
2,897,964 UART: [fht] FMC Alias Private Key: 7
3,006,047 UART: [art] Extend RT PCRs Done
3,006,475 UART: [art] Lock RT PCRs Done
3,008,105 UART: [art] Populate DV Done
3,016,521 UART: [fht] FMC Alias Private Key: 7
3,017,699 UART: [art] Derive CDI
3,017,979 UART: [art] Store in in slot 0x4
3,103,484 UART: [art] Derive Key Pair
3,103,844 UART: [art] Store priv key in slot 0x5
3,117,432 UART: [art] Derive Key Pair - Done
3,132,188 UART: [art] Signing Cert with AUTHO
3,132,668 UART: RITY.KEYID = 7
3,148,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,019 UART: [art] PUB.X = A588361ECD6AF34F605F90331919DC9545C3CF573E143E895B5EED0C9D07413B52273889816B958E6CC80CAE77DD7B86
3,155,782 UART: [art] PUB.Y = 30C0A8052149A0953BB4894890627960DB79715C3E77DE32469B35D3C11A109E9522D3BBF0B0F1B99AD79C326CBC9667
3,162,725 UART: [art] SIG.R = 77BB7FAF895CB2FE6B6EDFE53E2B633C806AA15C9D0FF2805B5CC8D713C576CF8AE421D6F65E3724DC12C3CA56BE7379
3,169,514 UART: [art] SIG.S = 3AA95A92D8FC1E728C9E1D8D1C1C13D918AA6FA1084F161864E2AE59469AD8E91CD75E6A078DA2BF816C6A5ADFEF0E34
3,193,200 UART: Caliptra RT
3,193,454 UART: [state] CFI Enabled
3,300,769 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,525 UART:
3,301,541 UART: Running Caliptra ROM ...
3,301,949 UART:
3,302,004 UART: [state] CFI Enabled
3,304,591 UART: [state] LifecycleState = Production
3,305,199 UART: [state] DebugLocked = Yes
3,305,815 UART: [state] Starting the WD Timer 40000000 cycles
3,307,436 UART: [kat] SHA2-256
4,110,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,115 UART: [kat] ++
4,115,267 UART: [kat] sha1
4,119,651 UART: [kat] SHA2-256
4,121,591 UART: [kat] SHA2-384
4,124,304 UART: [kat] SHA2-512-ACC
4,126,205 UART: [kat] ECC-384
4,135,842 UART: [kat] HMAC-384Kdf
4,140,576 UART: [kat] LMS
4,388,888 UART: [kat] --
4,389,756 UART: [warm-reset] ++
4,390,759 UART: [warm-reset] --
4,391,764 UART: [state] Locking Datavault
4,392,610 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,214 UART: [state] Locking ICCM
4,393,654 UART: [exit] Launching FMC @ 0x40000130
4,398,983 UART:
4,398,999 UART: Running Caliptra FMC ...
4,399,407 UART:
4,399,461 UART: [state] CFI Enabled
4,400,620 UART: [aliasrt :skip pcr extension
4,401,093 UART: [art] Extend RT PCRs Done
4,401,521 UART: [art] Lock RT PCRs Done
4,402,846 UART: [art] Populate DV Done
4,411,016 UART: [fht] FMC Alias Private Key: 7
4,412,050 UART: [art] Derive CDI
4,412,330 UART: [art] Store in in slot 0x4
4,497,677 UART: [art] Derive Key Pair
4,498,037 UART: [art] Store priv key in slot 0x5
4,511,185 UART: [art] Derive Key Pair - Done
4,525,957 UART: [art] Signing Cert with AUTHO
4,526,437 UART: RITY.KEYID = 7
4,541,771 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,536 UART: [art] PUB.X = A588361ECD6AF34F605F90331919DC9545C3CF573E143E895B5EED0C9D07413B52273889816B958E6CC80CAE77DD7B86
4,549,299 UART: [art] PUB.Y = 30C0A8052149A0953BB4894890627960DB79715C3E77DE32469B35D3C11A109E9522D3BBF0B0F1B99AD79C326CBC9667
4,556,242 UART: [art] SIG.R = 77BB7FAF895CB2FE6B6EDFE53E2B633C806AA15C9D0FF2805B5CC8D713C576CF8AE421D6F65E3724DC12C3CA56BE7379
4,563,031 UART: [art] SIG.S = 3AA95A92D8FC1E728C9E1D8D1C1C13D918AA6FA1084F161864E2AE59469AD8E91CD75E6A078DA2BF816C6A5ADFEF0E34
4,587,079 UART: Caliptra RT
4,587,333 UART: [state] CFI Enabled
4,869,773 UART: [rt] RT listening for mailbox commands...
4,883,504 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Production
85,831 UART: [state] DebugLocked = Yes
86,477 UART: [state] Starting the WD Timer 40000000 cycles
88,094 UART: [kat] SHA2-256
891,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,773 UART: [kat] ++
895,925 UART: [kat] sha1
900,241 UART: [kat] SHA2-256
902,181 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,764 UART: [kat] HMAC-384Kdf
921,484 UART: [kat] LMS
1,169,796 UART: [kat] --
1,170,779 UART: [cold-reset] ++
1,171,276 UART: [fht] FHT @ 0x50003400
1,173,970 UART: [idev] ++
1,174,138 UART: [idev] CDI.KEYID = 6
1,174,499 UART: [idev] SUBJECT.KEYID = 7
1,174,924 UART: [idev] UDS.KEYID = 0
1,175,270 ready_for_fw is high
1,175,270 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,035 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,663 UART: [idev] --
1,209,762 UART: [ldev] ++
1,209,930 UART: [ldev] CDI.KEYID = 6
1,210,294 UART: [ldev] SUBJECT.KEYID = 5
1,210,721 UART: [ldev] AUTHORITY.KEYID = 7
1,211,184 UART: [ldev] FE.KEYID = 1
1,216,346 UART: [ldev] Erasing FE.KEYID = 1
1,242,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,339 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,033 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,903 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,609 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,669 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,690 UART: [fwproc] Recv command 0x46574c44
1,283,423 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,797,445 >>> mbox cmd response: success
2,798,709 UART: [afmc] ++
2,798,877 UART: [afmc] CDI.KEYID = 6
2,799,240 UART: [afmc] SUBJECT.KEYID = 7
2,799,666 UART: [afmc] AUTHORITY.KEYID = 5
2,835,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,630 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,349 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,242 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,949 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,986 UART: [afmc] --
2,879,061 UART: [cold-reset] --
2,879,935 UART: [state] Locking Datavault
2,880,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,560 UART: [state] Locking ICCM
2,881,988 UART: [exit] Launching FMC @ 0x40000130
2,887,317 UART:
2,887,333 UART: Running Caliptra FMC ...
2,887,741 UART:
2,887,795 UART: [state] CFI Enabled
2,898,024 UART: [fht] FMC Alias Private Key: 7
3,006,173 UART: [art] Extend RT PCRs Done
3,006,601 UART: [art] Lock RT PCRs Done
3,007,967 UART: [art] Populate DV Done
3,016,299 UART: [fht] FMC Alias Private Key: 7
3,017,419 UART: [art] Derive CDI
3,017,699 UART: [art] Store in in slot 0x4
3,102,748 UART: [art] Derive Key Pair
3,103,108 UART: [art] Store priv key in slot 0x5
3,116,898 UART: [art] Derive Key Pair - Done
3,131,373 UART: [art] Signing Cert with AUTHO
3,131,853 UART: RITY.KEYID = 7
3,146,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,680 UART: [art] PUB.X = F05976DAB0579CC2F2846353D7E4752AD3FE5DB377260B87813AF93856A4350EA6D7843C35F6B0ED67C09F4A76FD87C1
3,154,448 UART: [art] PUB.Y = 750F6ECCFE6B596E378CF0BE40234F14D4C04037A90469EABEC52FBA4818B7C8758917B90D7D380E01D47663677D5AFA
3,161,391 UART: [art] SIG.R = 48814B0810D716E59D86C1BABDB1DD583DACC1B6A9FC07F9C9F4BE241D597356AF82F3526D70B538A30137F656E76DBB
3,168,164 UART: [art] SIG.S = E6E50D572541F0C9E3E396E0C6FE817FEC303E518D83857774F8D4A8529C36442EAE240456D374C73A424E7D88F6D277
3,192,037 UART: Caliptra RT
3,192,291 UART: [state] CFI Enabled
3,300,479 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,235 UART:
3,301,251 UART: Running Caliptra ROM ...
3,301,659 UART:
3,301,714 UART: [state] CFI Enabled
3,303,945 UART: [state] LifecycleState = Production
3,304,553 UART: [state] DebugLocked = Yes
3,305,087 UART: [state] Starting the WD Timer 40000000 cycles
3,306,578 UART: [kat] SHA2-256
4,110,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,257 UART: [kat] ++
4,114,409 UART: [kat] sha1
4,118,619 UART: [kat] SHA2-256
4,120,559 UART: [kat] SHA2-384
4,123,206 UART: [kat] SHA2-512-ACC
4,125,107 UART: [kat] ECC-384
4,134,772 UART: [kat] HMAC-384Kdf
4,139,254 UART: [kat] LMS
4,387,566 UART: [kat] --
4,388,692 UART: [warm-reset] ++
4,389,565 UART: [warm-reset] --
4,390,460 UART: [state] Locking Datavault
4,391,116 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,720 UART: [state] Locking ICCM
4,392,264 UART: [exit] Launching FMC @ 0x40000130
4,397,593 UART:
4,397,609 UART: Running Caliptra FMC ...
4,398,017 UART:
4,398,071 UART: [state] CFI Enabled
4,399,232 UART: [aliasrt :skip pcr extension
4,399,705 UART: [art] Extend RT PCRs Done
4,400,133 UART: [art] Lock RT PCRs Done
4,401,574 UART: [art] Populate DV Done
4,409,514 UART: [fht] FMC Alias Private Key: 7
4,410,486 UART: [art] Derive CDI
4,410,766 UART: [art] Store in in slot 0x4
4,496,655 UART: [art] Derive Key Pair
4,497,015 UART: [art] Store priv key in slot 0x5
4,510,329 UART: [art] Derive Key Pair - Done
4,525,166 UART: [art] Signing Cert with AUTHO
4,525,646 UART: RITY.KEYID = 7
4,541,126 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,891 UART: [art] PUB.X = F05976DAB0579CC2F2846353D7E4752AD3FE5DB377260B87813AF93856A4350EA6D7843C35F6B0ED67C09F4A76FD87C1
4,548,659 UART: [art] PUB.Y = 750F6ECCFE6B596E378CF0BE40234F14D4C04037A90469EABEC52FBA4818B7C8758917B90D7D380E01D47663677D5AFA
4,555,602 UART: [art] SIG.R = 48814B0810D716E59D86C1BABDB1DD583DACC1B6A9FC07F9C9F4BE241D597356AF82F3526D70B538A30137F656E76DBB
4,562,375 UART: [art] SIG.S = E6E50D572541F0C9E3E396E0C6FE817FEC303E518D83857774F8D4A8529C36442EAE240456D374C73A424E7D88F6D277
4,585,818 UART: Caliptra RT
4,586,072 UART: [state] CFI Enabled
4,861,769 UART: [rt] RT listening for mailbox commands...
4,876,252 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Production
86,094 UART: [state] DebugLocked = Yes
86,632 UART: [state] Starting the WD Timer 40000000 cycles
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,530 UART: [kat] SHA2-256
902,470 UART: [kat] SHA2-384
905,169 UART: [kat] SHA2-512-ACC
907,070 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,551 UART: [kat] LMS
1,169,863 UART: [kat] --
1,170,842 UART: [cold-reset] ++
1,171,261 UART: [fht] FHT @ 0x50003400
1,173,937 UART: [idev] ++
1,174,105 UART: [idev] CDI.KEYID = 6
1,174,466 UART: [idev] SUBJECT.KEYID = 7
1,174,891 UART: [idev] UDS.KEYID = 0
1,175,237 ready_for_fw is high
1,175,237 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,250 UART: [idev] Erasing UDS.KEYID = 0
1,200,411 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,905 UART: [ldev] SUBJECT.KEYID = 5
1,211,332 UART: [ldev] AUTHORITY.KEYID = 7
1,211,795 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,284 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,978 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,848 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,554 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,642 UART: [ldev] --
1,283,094 UART: [fwproc] Wait for Commands...
1,283,893 UART: [fwproc] Recv command 0x46574c44
1,284,626 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,636 >>> mbox cmd response: success
2,799,748 UART: [afmc] ++
2,799,916 UART: [afmc] CDI.KEYID = 6
2,800,279 UART: [afmc] SUBJECT.KEYID = 7
2,800,705 UART: [afmc] AUTHORITY.KEYID = 5
2,836,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,397 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,116 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,009 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,716 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,631 UART: [afmc] --
2,879,642 UART: [cold-reset] --
2,880,600 UART: [state] Locking Datavault
2,881,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,467 UART: [state] Locking ICCM
2,883,139 UART: [exit] Launching FMC @ 0x40000130
2,888,468 UART:
2,888,484 UART: Running Caliptra FMC ...
2,888,892 UART:
2,889,035 UART: [state] CFI Enabled
2,899,282 UART: [fht] FMC Alias Private Key: 7
3,006,139 UART: [art] Extend RT PCRs Done
3,006,567 UART: [art] Lock RT PCRs Done
3,007,813 UART: [art] Populate DV Done
3,016,201 UART: [fht] FMC Alias Private Key: 7
3,017,283 UART: [art] Derive CDI
3,017,563 UART: [art] Store in in slot 0x4
3,103,468 UART: [art] Derive Key Pair
3,103,828 UART: [art] Store priv key in slot 0x5
3,116,798 UART: [art] Derive Key Pair - Done
3,131,603 UART: [art] Signing Cert with AUTHO
3,132,083 UART: RITY.KEYID = 7
3,147,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,128 UART: [art] PUB.X = 5ED4A047989EAF29F3997A96EC82D7A1F217CAB2C09B1FB7005F4E4DA52B390884C51E70167F4A3373E7640E737B9CE7
3,154,876 UART: [art] PUB.Y = F5CB655084C9BA47F0DEC1874EE55DC7D4CE946C74E95DC562FC5029370AC12A5F631D02051E9D1C0D61B817E0326243
3,161,820 UART: [art] SIG.R = BAEA734E37F109D904736EFF52B5D0CDDD3A6C07667B86F9FE9DFA15FC53CBC1E26E90CEFF31FF4F38C0954C49363D03
3,168,600 UART: [art] SIG.S = 0B7EFB6A36A447C9B580FF2FB31F871DB33E23BE0C986991900834A2141765F432368E95C2E785F926BB3CF5F0ABD93D
3,191,748 UART: Caliptra RT
3,192,094 UART: [state] CFI Enabled
3,298,870 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,626 UART:
3,299,642 UART: Running Caliptra ROM ...
3,300,050 UART:
3,300,192 UART: [state] CFI Enabled
3,303,303 UART: [state] LifecycleState = Production
3,303,911 UART: [state] DebugLocked = Yes
3,304,501 UART: [state] Starting the WD Timer 40000000 cycles
3,305,998 UART: [kat] SHA2-256
4,109,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,677 UART: [kat] ++
4,113,829 UART: [kat] sha1
4,118,275 UART: [kat] SHA2-256
4,120,215 UART: [kat] SHA2-384
4,122,762 UART: [kat] SHA2-512-ACC
4,124,663 UART: [kat] ECC-384
4,134,494 UART: [kat] HMAC-384Kdf
4,139,008 UART: [kat] LMS
4,387,320 UART: [kat] --
4,388,044 UART: [warm-reset] ++
4,389,035 UART: [warm-reset] --
4,389,978 UART: [state] Locking Datavault
4,390,846 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,450 UART: [state] Locking ICCM
4,391,968 UART: [exit] Launching FMC @ 0x40000130
4,397,297 UART:
4,397,313 UART: Running Caliptra FMC ...
4,397,721 UART:
4,397,864 UART: [state] CFI Enabled
4,399,177 UART: [aliasrt :skip pcr extension
4,399,650 UART: [art] Extend RT PCRs Done
4,400,078 UART: [art] Lock RT PCRs Done
4,401,443 UART: [art] Populate DV Done
4,409,675 UART: [fht] FMC Alias Private Key: 7
4,410,653 UART: [art] Derive CDI
4,410,933 UART: [art] Store in in slot 0x4
4,496,508 UART: [art] Derive Key Pair
4,496,868 UART: [art] Store priv key in slot 0x5
4,510,054 UART: [art] Derive Key Pair - Done
4,524,497 UART: [art] Signing Cert with AUTHO
4,524,977 UART: RITY.KEYID = 7
4,539,581 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,346 UART: [art] PUB.X = 5ED4A047989EAF29F3997A96EC82D7A1F217CAB2C09B1FB7005F4E4DA52B390884C51E70167F4A3373E7640E737B9CE7
4,547,094 UART: [art] PUB.Y = F5CB655084C9BA47F0DEC1874EE55DC7D4CE946C74E95DC562FC5029370AC12A5F631D02051E9D1C0D61B817E0326243
4,554,038 UART: [art] SIG.R = BAEA734E37F109D904736EFF52B5D0CDDD3A6C07667B86F9FE9DFA15FC53CBC1E26E90CEFF31FF4F38C0954C49363D03
4,560,818 UART: [art] SIG.S = 0B7EFB6A36A447C9B580FF2FB31F871DB33E23BE0C986991900834A2141765F432368E95C2E785F926BB3CF5F0ABD93D
4,585,138 UART: Caliptra RT
4,585,484 UART: [state] CFI Enabled
4,863,589 UART: [rt] RT listening for mailbox commands...
4,877,348 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Production
85,740 UART: [state] DebugLocked = Yes
86,352 UART: [state] Starting the WD Timer 40000000 cycles
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,267 UART: [idev] ++
1,173,435 UART: [idev] CDI.KEYID = 6
1,173,796 UART: [idev] SUBJECT.KEYID = 7
1,174,221 UART: [idev] UDS.KEYID = 0
1,174,567 ready_for_fw is high
1,174,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,200,177 UART: [idev] Sha1 KeyId Algorithm
1,208,968 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,401 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,876 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,570 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,440 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,146 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,240 UART: [ldev] --
1,282,672 UART: [fwproc] Wait for Commands...
1,283,271 UART: [fwproc] Recv command 0x46574c44
1,284,004 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,116 >>> mbox cmd response: success
2,799,160 UART: [afmc] ++
2,799,328 UART: [afmc] CDI.KEYID = 6
2,799,691 UART: [afmc] SUBJECT.KEYID = 7
2,800,117 UART: [afmc] AUTHORITY.KEYID = 5
2,836,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,903 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,622 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,515 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,222 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,835 UART: [afmc] --
2,878,826 UART: [cold-reset] --
2,879,490 UART: [state] Locking Datavault
2,880,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,311 UART: [state] Locking ICCM
2,881,877 UART: [exit] Launching FMC @ 0x40000130
2,887,206 UART:
2,887,222 UART: Running Caliptra FMC ...
2,887,630 UART:
2,887,773 UART: [state] CFI Enabled
2,898,428 UART: [fht] FMC Alias Private Key: 7
3,006,493 UART: [art] Extend RT PCRs Done
3,006,921 UART: [art] Lock RT PCRs Done
3,008,745 UART: [art] Populate DV Done
3,017,011 UART: [fht] FMC Alias Private Key: 7
3,017,965 UART: [art] Derive CDI
3,018,245 UART: [art] Store in in slot 0x4
3,104,034 UART: [art] Derive Key Pair
3,104,394 UART: [art] Store priv key in slot 0x5
3,118,162 UART: [art] Derive Key Pair - Done
3,132,576 UART: [art] Signing Cert with AUTHO
3,133,056 UART: RITY.KEYID = 7
3,148,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,257 UART: [art] PUB.X = DE070D71A1EEFD0EBF679A0D5C27B774F101AF0F1E328273B185E23CB29E1A715C45A5871A437877A81A110AA43AD7AC
3,156,018 UART: [art] PUB.Y = 5778A2D6A959E5D78ACE671688392E798B8BE53754DCADAF71D7721231AF3B0BD43BA623F62C0D6CF032C57661EBDA8E
3,162,974 UART: [art] SIG.R = 3654F57A34AED2E4446BF3F321418A3597F5B56F44DFEEFED3D409CE6B04C7D9B8E0C8101B944641350EBF85DFE02C2F
3,169,749 UART: [art] SIG.S = 46A467D4B030B5C199743D45A9C7F2C75759EC44E6E7D600180E537E558A48F342B3029DF045B6A5C3D934B68B3F6521
3,193,468 UART: Caliptra RT
3,193,814 UART: [state] CFI Enabled
3,301,207 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,963 UART:
3,301,979 UART: Running Caliptra ROM ...
3,302,387 UART:
3,302,529 UART: [state] CFI Enabled
3,305,438 UART: [state] LifecycleState = Production
3,306,046 UART: [state] DebugLocked = Yes
3,306,796 UART: [state] Starting the WD Timer 40000000 cycles
3,308,509 UART: [kat] SHA2-256
4,112,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,188 UART: [kat] ++
4,116,340 UART: [kat] sha1
4,120,580 UART: [kat] SHA2-256
4,122,520 UART: [kat] SHA2-384
4,125,521 UART: [kat] SHA2-512-ACC
4,127,422 UART: [kat] ECC-384
4,137,155 UART: [kat] HMAC-384Kdf
4,141,789 UART: [kat] LMS
4,390,101 UART: [kat] --
4,391,037 UART: [warm-reset] ++
4,391,786 UART: [warm-reset] --
4,392,531 UART: [state] Locking Datavault
4,393,317 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,921 UART: [state] Locking ICCM
4,394,387 UART: [exit] Launching FMC @ 0x40000130
4,399,716 UART:
4,399,732 UART: Running Caliptra FMC ...
4,400,140 UART:
4,400,283 UART: [state] CFI Enabled
4,401,514 UART: [aliasrt :skip pcr extension
4,401,987 UART: [art] Extend RT PCRs Done
4,402,415 UART: [art] Lock RT PCRs Done
4,403,650 UART: [art] Populate DV Done
4,411,878 UART: [fht] FMC Alias Private Key: 7
4,413,046 UART: [art] Derive CDI
4,413,326 UART: [art] Store in in slot 0x4
4,498,871 UART: [art] Derive Key Pair
4,499,231 UART: [art] Store priv key in slot 0x5
4,512,891 UART: [art] Derive Key Pair - Done
4,527,367 UART: [art] Signing Cert with AUTHO
4,527,847 UART: RITY.KEYID = 7
4,542,989 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,754 UART: [art] PUB.X = DE070D71A1EEFD0EBF679A0D5C27B774F101AF0F1E328273B185E23CB29E1A715C45A5871A437877A81A110AA43AD7AC
4,550,515 UART: [art] PUB.Y = 5778A2D6A959E5D78ACE671688392E798B8BE53754DCADAF71D7721231AF3B0BD43BA623F62C0D6CF032C57661EBDA8E
4,557,471 UART: [art] SIG.R = 3654F57A34AED2E4446BF3F321418A3597F5B56F44DFEEFED3D409CE6B04C7D9B8E0C8101B944641350EBF85DFE02C2F
4,564,246 UART: [art] SIG.S = 46A467D4B030B5C199743D45A9C7F2C75759EC44E6E7D600180E537E558A48F342B3029DF045B6A5C3D934B68B3F6521
4,587,923 UART: Caliptra RT
4,588,269 UART: [state] CFI Enabled
4,869,837 UART: [rt] RT listening for mailbox commands...
4,883,898 UART: Disabled attest - cmd busy + warm rst
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
191,897 UART:
192,267 UART: Running Caliptra ROM ...
193,596 UART:
193,746 UART: [state] CFI Enabled
262,193 UART: [state] LifecycleState = Production
264,370 UART: [state] DebugLocked = Yes
265,913 UART: [state] Starting the WD Timer 40000000 cycles
271,050 UART: [kat] SHA2-256
453,004 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,550 UART: [kat] ++
465,060 UART: [kat] sha1
476,531 UART: [kat] SHA2-256
479,599 UART: [kat] SHA2-384
485,652 UART: [kat] SHA2-512-ACC
488,236 UART: [kat] ECC-384
3,776,384 UART: [kat] HMAC-384Kdf
3,804,607 UART: [kat] LMS
4,877,775 UART: [kat] --
4,881,738 UART: [cold-reset] ++
4,884,386 UART: [fht] FHT @ 0x50003400
4,896,491 UART: [idev] ++
4,897,129 UART: [idev] CDI.KEYID = 6
4,898,367 UART: [idev] SUBJECT.KEYID = 7
4,899,463 UART: [idev] UDS.KEYID = 0
4,900,506 ready_for_fw is high
4,900,720 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
5,000,135 UART: [idev] Erasing UDS.KEYID = 0
8,249,655 UART: [idev] Sha1 KeyId Algorithm
8,270,517 UART: [idev] --
8,275,472 UART: [ldev] ++
8,276,074 UART: [ldev] CDI.KEYID = 6
8,277,263 UART: [ldev] SUBJECT.KEYID = 5
8,278,362 UART: [ldev] AUTHORITY.KEYID = 7
8,279,583 UART: [ldev] FE.KEYID = 1
8,320,886 UART: [ldev] Erasing FE.KEYID = 1
11,655,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,676 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,984,982 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,001,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,017,155 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,037,282 UART: [ldev] --
14,041,288 UART: [fwproc] Wait for Commands...
14,042,951 UART: [fwproc] Recv command 0x46574c44
14,045,252 UART: [fwproc] Recv'd Img size: 78676 bytes
17,710,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,788,035 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,856,756 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,049,841 >>> mbox cmd response: success
18,053,291 UART: [afmc] ++
18,053,903 UART: [afmc] CDI.KEYID = 6
18,055,114 UART: [afmc] SUBJECT.KEYID = 7
18,056,219 UART: [afmc] AUTHORITY.KEYID = 5
21,415,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,715,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,717,479 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,733,483 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,749,580 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,765,627 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,788,467 UART: [afmc] --
23,791,353 UART: [cold-reset] --
23,795,872 UART: [state] Locking Datavault
23,802,453 UART: [state] Locking PCR0, PCR1 and PCR31
23,804,151 UART: [state] Locking ICCM
23,806,900 UART: [exit] Launching FMC @ 0x40000130
23,815,567 UART:
23,815,797 UART: Running Caliptra FMC ...
23,816,909 UART:
23,817,065 UART: [state] CFI Enabled
23,875,965 UART: [fht] FMC Alias Private Key: 7
26,214,073 UART: [art] Extend RT PCRs Done
26,215,298 UART: [art] Lock RT PCRs Done
26,217,583 UART: [art] Populate DV Done
26,223,099 UART: [fht] FMC Alias Private Key: 7
26,224,682 UART: [art] Derive CDI
26,225,490 UART: [art] Store in in slot 0x4
26,284,965 UART: [art] Derive Key Pair
26,286,005 UART: [art] Store priv key in slot 0x5
29,577,511 UART: [art] Derive Key Pair - Done
29,590,338 UART: [art] Signing Cert with AUTHO
29,591,639 UART: RITY.KEYID = 7
31,880,127 UART: [art] Erasing AUTHORITY.KEYID = 7
31,881,632 UART: [art] PUB.X = B063C9987AE53B51904322BCC1F49EC5BE467AF5917091D9F410A88344E6DFEF354350F1727200B1475646A397A461CD
31,888,900 UART: [art] PUB.Y = E5154DBA267C414AF03F27FE351FB0D6E22820BA57778A25BDFCFD3A7F98576FD748B2B280EF43487DFD8E08D8BB0623
31,896,141 UART: [art] SIG.R = 85652E984AF1302EADCC07695D70E2EA58370CDCD41F84657FCD25555445C7360EE5496149C477CF8AF6A0AF6C78BF69
31,903,574 UART: [art] SIG.S = 9A43DF1F576E1BF9EB4EAA500BB5EE25C1E77D90071706870162496D54A2B159E07991243CF40B9AAC0C92BC6362F902
33,208,125 UART: mbox::rt_entry...
33,209,078 UART: ____ _ _ _ ____ _____
33,211,054 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,213,055 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,214,981 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,216,903 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,218,821 UART: |_|
33,219,621 UART:
33,333,457 UART: [rt] Runtime listening for mailbox commands...
33,335,474 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,336,190 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,003 UART:
1,278 UART: Running Caliptra ROM ...
2,326 UART:
2,466 UART: [state] CFI Enabled
80,803 UART: [state] LifecycleState = Production
82,565 UART: [state] DebugLocked = Yes
84,647 UART: [state] Starting the WD Timer 40000000 cycles
89,279 UART: [kat] SHA2-256
271,249 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
282,737 UART: [kat] ++
283,235 UART: [kat] sha1
292,703 UART: [kat] SHA2-256
295,759 UART: [kat] SHA2-384
301,011 UART: [kat] SHA2-512-ACC
303,642 UART: [kat] ECC-384
3,592,886 UART: [kat] HMAC-384Kdf
3,618,623 UART: [kat] LMS
4,691,755 UART: [kat] --
4,695,929 UART: [warm-reset] ++
4,699,396 UART: [warm-reset] --
4,705,059 UART: [state] Locking Datavault
4,708,641 UART: [state] Locking PCR0, PCR1 and PCR31
4,710,798 UART: [state] Locking ICCM
4,713,227 UART: [exit] Launching FMC @ 0x40000130
4,721,858 UART:
4,722,091 UART: Running Caliptra FMC ...
4,723,115 UART:
4,723,255 UART: [state] CFI Enabled
4,782,925 UART: [aliasrt :skip pcr extension
4,784,243 UART: [art] Extend RT PCRs Done
4,785,308 UART: [art] Lock RT PCRs Done
4,786,371 UART: [art] Populate DV Done
4,791,752 UART: [fht] FMC Alias Private Key: 7
4,793,415 UART: [art] Derive CDI
4,794,148 UART: [art] Store in in slot 0x4
4,851,422 UART: [art] Derive Key Pair
4,852,434 UART: [art] Store priv key in slot 0x5
8,145,779 UART: [art] Derive Key Pair - Done
8,158,735 UART: [art] Signing Cert with AUTHO
8,160,038 UART: RITY.KEYID = 7
10,446,760 UART: [art] Erasing AUTHORITY.KEYID = 7
10,448,280 UART: [art] PUB.X = B063C9987AE53B51904322BCC1F49EC5BE467AF5917091D9F410A88344E6DFEF354350F1727200B1475646A397A461CD
10,455,517 UART: [art] PUB.Y = E5154DBA267C414AF03F27FE351FB0D6E22820BA57778A25BDFCFD3A7F98576FD748B2B280EF43487DFD8E08D8BB0623
10,462,805 UART: [art] SIG.R = 85652E984AF1302EADCC07695D70E2EA58370CDCD41F84657FCD25555445C7360EE5496149C477CF8AF6A0AF6C78BF69
10,470,188 UART: [art] SIG.S = 9A43DF1F576E1BF9EB4EAA500BB5EE25C1E77D90071706870162496D54A2B159E07991243CF40B9AAC0C92BC6362F902
11,774,923 UART: mbox::rt_entry...
11,775,885 UART: ____ _ _ _ ____ _____
11,777,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,779,809 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,781,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,783,681 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,785,603 UART: |_|
11,786,405 UART:
15,356,115 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
15,360,536 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
191,930 UART:
192,296 UART: Running Caliptra ROM ...
193,374 UART:
193,508 UART: [state] CFI Enabled
264,573 UART: [state] LifecycleState = Production
266,786 UART: [state] DebugLocked = Yes
269,616 UART: [state] Starting the WD Timer 40000000 cycles
274,127 UART: [kat] SHA2-256
456,100 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,655 UART: [kat] ++
468,102 UART: [kat] sha1
479,360 UART: [kat] SHA2-256
482,372 UART: [kat] SHA2-384
488,073 UART: [kat] SHA2-512-ACC
490,723 UART: [kat] ECC-384
3,776,101 UART: [kat] HMAC-384Kdf
3,801,452 UART: [kat] LMS
4,874,634 UART: [kat] --
4,881,207 UART: [cold-reset] ++
4,882,214 UART: [fht] FHT @ 0x50003400
4,892,831 UART: [idev] ++
4,893,529 UART: [idev] CDI.KEYID = 6
4,894,768 UART: [idev] SUBJECT.KEYID = 7
4,895,862 UART: [idev] UDS.KEYID = 0
4,896,781 ready_for_fw is high
4,896,993 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
4,996,207 UART: [idev] Erasing UDS.KEYID = 0
8,243,013 UART: [idev] Sha1 KeyId Algorithm
8,264,082 UART: [idev] --
8,267,915 UART: [ldev] ++
8,268,483 UART: [ldev] CDI.KEYID = 6
8,269,717 UART: [ldev] SUBJECT.KEYID = 5
8,270,874 UART: [ldev] AUTHORITY.KEYID = 7
8,272,057 UART: [ldev] FE.KEYID = 1
8,317,816 UART: [ldev] Erasing FE.KEYID = 1
11,648,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,197 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,980,522 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,996,494 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,012,623 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,033,772 UART: [ldev] --
14,038,401 UART: [fwproc] Wait for Commands...
14,039,909 UART: [fwproc] Recv command 0x46574c44
14,041,892 UART: [fwproc] Recv'd Img size: 78676 bytes
17,710,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,782,243 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,850,997 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,044,032 >>> mbox cmd response: success
18,048,447 UART: [afmc] ++
18,049,056 UART: [afmc] CDI.KEYID = 6
18,050,242 UART: [afmc] SUBJECT.KEYID = 7
18,051,395 UART: [afmc] AUTHORITY.KEYID = 5
21,413,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,713,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,715,456 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,731,490 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,747,552 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,763,662 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,785,534 UART: [afmc] --
23,789,699 UART: [cold-reset] --
23,793,073 UART: [state] Locking Datavault
23,799,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,801,022 UART: [state] Locking ICCM
23,802,211 UART: [exit] Launching FMC @ 0x40000130
23,810,873 UART:
23,811,101 UART: Running Caliptra FMC ...
23,812,192 UART:
23,812,346 UART: [state] CFI Enabled
23,871,664 UART: [fht] FMC Alias Private Key: 7
26,210,287 UART: [art] Extend RT PCRs Done
26,211,506 UART: [art] Lock RT PCRs Done
26,212,964 UART: [art] Populate DV Done
26,218,584 UART: [fht] FMC Alias Private Key: 7
26,220,133 UART: [art] Derive CDI
26,220,944 UART: [art] Store in in slot 0x4
26,280,681 UART: [art] Derive Key Pair
26,281,724 UART: [art] Store priv key in slot 0x5
29,574,690 UART: [art] Derive Key Pair - Done
29,587,739 UART: [art] Signing Cert with AUTHO
29,589,044 UART: RITY.KEYID = 7
31,876,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,878,300 UART: [art] PUB.X = 1C7ABB0C173D5496F89296D6BA76A6A395CA75C88429B79AD1E5017E6BC7FDE04AF35EB2845DFA2D12DBD1B61A1634FB
31,885,584 UART: [art] PUB.Y = 26609C8BC5C4E6242E9BD2EA814F0ED434B3DABA5FF390BD22A81B128D674770563113424C3650F6BEC5B9E084A0E17A
31,892,833 UART: [art] SIG.R = DE3D52AF540AB8CECC8A59848DF2308DE63369AD609A81B0FD7AFF6009EA881B5506D61CB28911E714880398D41BDE14
31,900,221 UART: [art] SIG.S = B6B5A55BBDB7369FCA764369700128C5210056133C411F73E5A92CE6870F7F4E9495CF7B3896B18B0BB106587E90F95C
33,204,821 UART: mbox::rt_entry...
33,205,785 UART: ____ _ _ _ ____ _____
33,207,777 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,209,779 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,211,723 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,213,656 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,215,503 UART: |_|
33,216,374 UART:
33,329,733 UART: [rt] Runtime listening for mailbox commands...
33,331,752 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,332,473 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,005 UART:
1,260 UART: Running Caliptra ROM ...
2,359 UART:
2,503 UART: [state] CFI Enabled
56,988 UART: [state] LifecycleState = Production
58,702 UART: [state] DebugLocked = Yes
60,268 UART: [state] Starting the WD Timer 40000000 cycles
66,035 UART: [kat] SHA2-256
248,039 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
259,523 UART: [kat] ++
260,108 UART: [kat] sha1
270,017 UART: [kat] SHA2-256
273,019 UART: [kat] SHA2-384
279,215 UART: [kat] SHA2-512-ACC
281,879 UART: [kat] ECC-384
3,571,087 UART: [kat] HMAC-384Kdf
3,597,316 UART: [kat] LMS
4,670,468 UART: [kat] --
4,674,594 UART: [warm-reset] ++
4,679,069 UART: [warm-reset] --
4,682,668 UART: [state] Locking Datavault
4,686,732 UART: [state] Locking PCR0, PCR1 and PCR31
4,688,873 UART: [state] Locking ICCM
4,690,787 UART: [exit] Launching FMC @ 0x40000130
4,699,422 UART:
4,699,663 UART: Running Caliptra FMC ...
4,700,760 UART:
4,700,911 UART: [state] CFI Enabled
4,762,245 UART: [aliasrt :skip pcr extension
4,763,530 UART: [art] Extend RT PCRs Done
4,764,588 UART: [art] Lock RT PCRs Done
4,765,975 UART: [art] Populate DV Done
4,771,430 UART: [fht] FMC Alias Private Key: 7
4,773,013 UART: [art] Derive CDI
4,773,824 UART: [art] Store in in slot 0x4
4,830,711 UART: [art] Derive Key Pair
4,831,756 UART: [art] Store priv key in slot 0x5
8,124,362 UART: [art] Derive Key Pair - Done
8,137,576 UART: [art] Signing Cert with AUTHO
8,138,879 UART: RITY.KEYID = 7
10,426,813 UART: [art] Erasing AUTHORITY.KEYID = 7
10,428,321 UART: [art] PUB.X = 1C7ABB0C173D5496F89296D6BA76A6A395CA75C88429B79AD1E5017E6BC7FDE04AF35EB2845DFA2D12DBD1B61A1634FB
10,435,547 UART: [art] PUB.Y = 26609C8BC5C4E6242E9BD2EA814F0ED434B3DABA5FF390BD22A81B128D674770563113424C3650F6BEC5B9E084A0E17A
10,442,842 UART: [art] SIG.R = DE3D52AF540AB8CECC8A59848DF2308DE63369AD609A81B0FD7AFF6009EA881B5506D61CB28911E714880398D41BDE14
10,450,200 UART: [art] SIG.S = B6B5A55BBDB7369FCA764369700128C5210056133C411F73E5A92CE6870F7F4E9495CF7B3896B18B0BB106587E90F95C
11,754,549 UART: mbox::rt_entry...
11,755,491 UART: ____ _ _ _ ____ _____
11,757,409 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,759,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,761,251 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,763,171 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,765,019 UART: |_|
11,765,837 UART:
15,334,063 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
15,338,493 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
191,770 UART:
192,128 UART: Running Caliptra ROM ...
193,298 UART:
602,795 UART: [state] CFI Enabled
619,882 UART: [state] LifecycleState = Production
622,074 UART: [state] DebugLocked = Yes
623,561 UART: [state] Starting the WD Timer 40000000 cycles
628,656 UART: [kat] SHA2-256
810,718 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,191 UART: [kat] ++
822,711 UART: [kat] sha1
833,324 UART: [kat] SHA2-256
836,328 UART: [kat] SHA2-384
842,105 UART: [kat] SHA2-512-ACC
844,768 UART: [kat] ECC-384
4,101,399 UART: [kat] HMAC-384Kdf
4,113,062 UART: [kat] LMS
5,186,243 UART: [kat] --
5,189,411 UART: [cold-reset] ++
5,191,342 UART: [fht] FHT @ 0x50003400
5,202,375 UART: [idev] ++
5,203,088 UART: [idev] CDI.KEYID = 6
5,204,266 UART: [idev] SUBJECT.KEYID = 7
5,205,720 UART: [idev] UDS.KEYID = 0
5,206,983 ready_for_fw is high
5,207,213 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
5,306,144 UART: [idev] Erasing UDS.KEYID = 0
8,496,662 UART: [idev] Sha1 KeyId Algorithm
8,518,788 UART: [idev] --
8,523,103 UART: [ldev] ++
8,523,672 UART: [ldev] CDI.KEYID = 6
8,524,905 UART: [ldev] SUBJECT.KEYID = 5
8,526,083 UART: [ldev] AUTHORITY.KEYID = 7
8,527,322 UART: [ldev] FE.KEYID = 1
8,538,401 UART: [ldev] Erasing FE.KEYID = 1
11,829,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,376 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,137,687 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,153,738 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,169,819 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,189,027 UART: [ldev] --
14,194,455 UART: [fwproc] Wait for Commands...
14,196,758 UART: [fwproc] Recv command 0x46574c44
14,199,107 UART: [fwproc] Recv'd Img size: 78676 bytes
17,867,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,935,053 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,003,782 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,197,078 >>> mbox cmd response: success
18,200,968 UART: [afmc] ++
18,201,586 UART: [afmc] CDI.KEYID = 6
18,202,721 UART: [afmc] SUBJECT.KEYID = 7
18,203,876 UART: [afmc] AUTHORITY.KEYID = 5
21,519,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,814,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,817,027 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,833,204 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,849,159 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,865,207 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,887,667 UART: [afmc] --
23,890,908 UART: [cold-reset] --
23,895,523 UART: [state] Locking Datavault
23,900,716 UART: [state] Locking PCR0, PCR1 and PCR31
23,902,355 UART: [state] Locking ICCM
23,904,443 UART: [exit] Launching FMC @ 0x40000130
23,913,140 UART:
23,913,430 UART: Running Caliptra FMC ...
23,914,544 UART:
23,914,708 UART: [state] CFI Enabled
23,922,492 UART: [fht] FMC Alias Private Key: 7
26,253,396 UART: [art] Extend RT PCRs Done
26,254,611 UART: [art] Lock RT PCRs Done
26,256,478 UART: [art] Populate DV Done
26,261,998 UART: [fht] FMC Alias Private Key: 7
26,263,490 UART: [art] Derive CDI
26,264,250 UART: [art] Store in in slot 0x4
26,306,953 UART: [art] Derive Key Pair
26,307,953 UART: [art] Store priv key in slot 0x5
29,550,503 UART: [art] Derive Key Pair - Done
29,563,437 UART: [art] Signing Cert with AUTHO
29,564,731 UART: RITY.KEYID = 7
31,844,120 UART: [art] Erasing AUTHORITY.KEYID = 7
31,845,632 UART: [art] PUB.X = E3412638F7AA34DC06907420869E5D64FF346D2C715E97CE5010F641167A0BF9EA797E78932BF2C82D74E3BCE7C67E5F
31,852,886 UART: [art] PUB.Y = 46645E8FBBFA37EC77B8DC06B769EA520560FDC7FD61384AE4C4874B66710B1354BBC793EC3CFE996EB9677C6A7722E5
31,860,124 UART: [art] SIG.R = EA7061F3025CA075F63BA419B926AB338376A82A4F9CD153A95C2F04E808D036EBD78A4A09D0506FEEE784D8BD18970C
31,867,466 UART: [art] SIG.S = 6089583D46E66F2FAE5DB4397D7A64A8B8CDFCAC787CFDED1C76053006891C46A5956AE31A207868A0C907FBE5A5D989
33,172,542 UART: mbox::rt_entry...
33,173,508 UART: ____ _ _ _ ____ _____
33,175,495 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,177,502 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,179,437 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,181,364 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,183,295 UART: |_|
33,184,126 UART:
33,297,165 UART: [rt] Runtime listening for mailbox commands...
33,299,193 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,299,924 >>> mbox cmd response data (0 bytes)
Initializing fuses
988 UART:
1,233 UART: Running Caliptra ROM ...
2,339 UART:
7,225,283 UART: [state] CFI Enabled
7,240,833 UART: [state] LifecycleState = Production
7,242,587 UART: [state] DebugLocked = Yes
7,244,817 UART: [state] Starting the WD Timer 40000000 cycles
7,250,799 UART: [kat] SHA2-256
7,432,765 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,444,320 UART: [kat] ++
7,444,917 UART: [kat] sha1
7,455,482 UART: [kat] SHA2-256
7,458,500 UART: [kat] SHA2-384
7,464,649 UART: [kat] SHA2-512-ACC
7,467,267 UART: [kat] ECC-384
10,722,480 UART: [kat] HMAC-384Kdf
10,734,321 UART: [kat] LMS
11,807,455 UART: [kat] --
11,810,550 UART: [warm-reset] ++
11,813,774 UART: [warm-reset] --
11,816,103 UART: [state] Locking Datavault
11,819,196 UART: [state] Locking PCR0, PCR1 and PCR31
11,821,380 UART: [state] Locking ICCM
11,824,332 UART: [exit] Launching FMC @ 0x40000130
11,832,996 UART:
11,833,239 UART: Running Caliptra FMC ...
11,834,338 UART:
11,834,497 UART: [state] CFI Enabled
11,836,385 UART: [aliasrt :skip pcr extension
11,837,626 UART: [art] Extend RT PCRs Done
11,838,759 UART: [art] Lock RT PCRs Done
11,839,839 UART: [art] Populate DV Done
11,845,349 UART: [fht] FMC Alias Private Key: 7
11,846,991 UART: [art] Derive CDI
11,847,797 UART: [art] Store in in slot 0x4
11,890,797 UART: [art] Derive Key Pair
11,891,809 UART: [art] Store priv key in slot 0x5
15,133,474 UART: [art] Derive Key Pair - Done
15,146,846 UART: [art] Signing Cert with AUTHO
15,148,151 UART: RITY.KEYID = 7
17,427,873 UART: [art] Erasing AUTHORITY.KEYID = 7
17,429,389 UART: [art] PUB.X = E3412638F7AA34DC06907420869E5D64FF346D2C715E97CE5010F641167A0BF9EA797E78932BF2C82D74E3BCE7C67E5F
17,436,618 UART: [art] PUB.Y = 46645E8FBBFA37EC77B8DC06B769EA520560FDC7FD61384AE4C4874B66710B1354BBC793EC3CFE996EB9677C6A7722E5
17,443,880 UART: [art] SIG.R = EA7061F3025CA075F63BA419B926AB338376A82A4F9CD153A95C2F04E808D036EBD78A4A09D0506FEEE784D8BD18970C
17,451,242 UART: [art] SIG.S = 6089583D46E66F2FAE5DB4397D7A64A8B8CDFCAC787CFDED1C76053006891C46A5956AE31A207868A0C907FBE5A5D989
18,756,086 UART: mbox::rt_entry...
18,757,060 UART: ____ _ _ _ ____ _____
18,759,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,761,017 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,762,874 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,764,799 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,766,673 UART: |_|
18,767,558 UART:
22,293,208 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
22,297,637 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
191,863 UART:
192,222 UART: Running Caliptra ROM ...
193,321 UART:
602,853 UART: [state] CFI Enabled
614,696 UART: [state] LifecycleState = Production
616,921 UART: [state] DebugLocked = Yes
619,686 UART: [state] Starting the WD Timer 40000000 cycles
624,660 UART: [kat] SHA2-256
806,603 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,154 UART: [kat] ++
818,671 UART: [kat] sha1
829,925 UART: [kat] SHA2-256
832,937 UART: [kat] SHA2-384
839,851 UART: [kat] SHA2-512-ACC
842,450 UART: [kat] ECC-384
4,098,744 UART: [kat] HMAC-384Kdf
4,110,773 UART: [kat] LMS
5,183,911 UART: [kat] --
5,188,510 UART: [cold-reset] ++
5,189,662 UART: [fht] FHT @ 0x50003400
5,201,627 UART: [idev] ++
5,202,333 UART: [idev] CDI.KEYID = 6
5,203,579 UART: [idev] SUBJECT.KEYID = 7
5,204,971 UART: [idev] UDS.KEYID = 0
5,206,161 ready_for_fw is high
5,206,344 <<< Executing mbox cmd 0x46574c44 (78676 bytes) from SoC
5,305,220 UART: [idev] Erasing UDS.KEYID = 0
8,495,907 UART: [idev] Sha1 KeyId Algorithm
8,517,870 UART: [idev] --
8,522,619 UART: [ldev] ++
8,523,206 UART: [ldev] CDI.KEYID = 6
8,524,444 UART: [ldev] SUBJECT.KEYID = 5
8,525,554 UART: [ldev] AUTHORITY.KEYID = 7
8,526,708 UART: [ldev] FE.KEYID = 1
8,538,142 UART: [ldev] Erasing FE.KEYID = 1
11,825,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,404 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,135,732 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,151,762 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,167,819 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,187,457 UART: [ldev] --
14,192,390 UART: [fwproc] Wait for Commands...
14,194,431 UART: [fwproc] Recv command 0x46574c44
14,196,682 UART: [fwproc] Recv'd Img size: 78676 bytes
17,856,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,929,244 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,998,008 UART: [fwproc] Load Runtime at address 0x40005000 len 53972
18,191,206 >>> mbox cmd response: success
18,195,771 UART: [afmc] ++
18,196,393 UART: [afmc] CDI.KEYID = 6
18,197,586 UART: [afmc] SUBJECT.KEYID = 7
18,198,689 UART: [afmc] AUTHORITY.KEYID = 5
21,514,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,811,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,813,370 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,829,369 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,845,466 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,861,503 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,884,833 UART: [afmc] --
23,889,156 UART: [cold-reset] --
23,894,481 UART: [state] Locking Datavault
23,900,445 UART: [state] Locking PCR0, PCR1 and PCR31
23,902,110 UART: [state] Locking ICCM
23,904,911 UART: [exit] Launching FMC @ 0x40000130
23,913,585 UART:
23,913,827 UART: Running Caliptra FMC ...
23,914,926 UART:
23,915,081 UART: [state] CFI Enabled
23,923,185 UART: [fht] FMC Alias Private Key: 7
26,254,056 UART: [art] Extend RT PCRs Done
26,255,330 UART: [art] Lock RT PCRs Done
26,257,095 UART: [art] Populate DV Done
26,262,386 UART: [fht] FMC Alias Private Key: 7
26,263,892 UART: [art] Derive CDI
26,264,632 UART: [art] Store in in slot 0x4
26,307,310 UART: [art] Derive Key Pair
26,308,390 UART: [art] Store priv key in slot 0x5
29,550,651 UART: [art] Derive Key Pair - Done
29,563,523 UART: [art] Signing Cert with AUTHO
29,564,828 UART: RITY.KEYID = 7
31,844,160 UART: [art] Erasing AUTHORITY.KEYID = 7
31,845,662 UART: [art] PUB.X = 86A028E9BDEFBE0C45B8CF72815D39C74B4CB6FAE536B3836BD69A632EC67A771CAEE35B1AD2791263A0E41F8912181F
31,852,910 UART: [art] PUB.Y = 188C10AA029D9A752DFC2935E15962E6D2D956082D2976CB59017239FB58CAF8A613C9148A258788CF0F811CC72AB54D
31,860,149 UART: [art] SIG.R = A116BF8DC23D69467EAF9CAB4A86129114C40BCFB83DA3D095A81925AAB608057F8CAE4E229A3E3A73ABDB64BA0051F1
31,867,551 UART: [art] SIG.S = 7FFC224F0B1189C0ED2822BCD6C5583371B7DE01D31A49300E893ADA4EF2E89678658D05898F1B81D50B542684DEA486
33,172,533 UART: mbox::rt_entry...
33,173,496 UART: ____ _ _ _ ____ _____
33,175,434 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,177,438 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,179,292 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,181,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,183,112 UART: |_|
33,183,940 UART:
33,296,900 UART: [rt] Runtime listening for mailbox commands...
33,298,934 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,299,657 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,006 UART:
1,270 UART: Running Caliptra ROM ...
2,323 UART:
7,226,102 UART: [state] CFI Enabled
7,241,153 UART: [state] LifecycleState = Production
7,242,960 UART: [state] DebugLocked = Yes
7,245,608 UART: [state] Starting the WD Timer 40000000 cycles
7,250,197 UART: [kat] SHA2-256
7,432,188 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,443,709 UART: [kat] ++
7,444,222 UART: [kat] sha1
7,455,276 UART: [kat] SHA2-256
7,458,300 UART: [kat] SHA2-384
7,464,954 UART: [kat] SHA2-512-ACC
7,467,583 UART: [kat] ECC-384
10,721,473 UART: [kat] HMAC-384Kdf
10,733,374 UART: [kat] LMS
11,806,520 UART: [kat] --
11,810,596 UART: [warm-reset] ++
11,815,564 UART: [warm-reset] --
11,820,036 UART: [state] Locking Datavault
11,823,571 UART: [state] Locking PCR0, PCR1 and PCR31
11,825,715 UART: [state] Locking ICCM
11,827,596 UART: [exit] Launching FMC @ 0x40000130
11,836,279 UART:
11,836,515 UART: Running Caliptra FMC ...
11,837,621 UART:
11,837,776 UART: [state] CFI Enabled
11,839,882 UART: [aliasrt :skip pcr extension
11,841,141 UART: [art] Extend RT PCRs Done
11,842,279 UART: [art] Lock RT PCRs Done
11,843,614 UART: [art] Populate DV Done
11,849,290 UART: [fht] FMC Alias Private Key: 7
11,850,772 UART: [art] Derive CDI
11,851,536 UART: [art] Store in in slot 0x4
11,894,042 UART: [art] Derive Key Pair
11,895,098 UART: [art] Store priv key in slot 0x5
15,137,231 UART: [art] Derive Key Pair - Done
15,150,332 UART: [art] Signing Cert with AUTHO
15,151,665 UART: RITY.KEYID = 7
17,431,252 UART: [art] Erasing AUTHORITY.KEYID = 7
17,432,757 UART: [art] PUB.X = 86A028E9BDEFBE0C45B8CF72815D39C74B4CB6FAE536B3836BD69A632EC67A771CAEE35B1AD2791263A0E41F8912181F
17,440,026 UART: [art] PUB.Y = 188C10AA029D9A752DFC2935E15962E6D2D956082D2976CB59017239FB58CAF8A613C9148A258788CF0F811CC72AB54D
17,447,280 UART: [art] SIG.R = A116BF8DC23D69467EAF9CAB4A86129114C40BCFB83DA3D095A81925AAB608057F8CAE4E229A3E3A73ABDB64BA0051F1
17,454,648 UART: [art] SIG.S = 7FFC224F0B1189C0ED2822BCD6C5583371B7DE01D31A49300E893ADA4EF2E89678658D05898F1B81D50B542684DEA486
18,759,450 UART: mbox::rt_entry...
18,760,411 UART: ____ _ _ _ ____ _____
18,762,316 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,764,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,766,199 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,768,130 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,770,007 UART: |_|
18,770,841 UART:
22,295,171 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
22,299,594 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
191,949 UART:
192,320 UART: Running Caliptra ROM ...
193,410 UART:
193,552 UART: [state] CFI Enabled
263,759 UART: [state] LifecycleState = Production
265,508 UART: [state] DebugLocked = Yes
267,345 UART: [state] Starting the WD Timer 40000000 cycles
272,519 UART: [kat] SHA2-256
451,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,247 UART: [kat] ++
463,716 UART: [kat] sha1
475,966 UART: [kat] SHA2-256
478,980 UART: [kat] SHA2-384
485,112 UART: [kat] SHA2-512-ACC
488,051 UART: [kat] ECC-384
2,948,142 UART: [kat] HMAC-384Kdf
2,972,166 UART: [kat] LMS
3,501,651 UART: [kat] --
3,507,629 UART: [cold-reset] ++
3,509,129 UART: [fht] FHT @ 0x50003400
3,520,173 UART: [idev] ++
3,520,745 UART: [idev] CDI.KEYID = 6
3,521,779 UART: [idev] SUBJECT.KEYID = 7
3,522,884 UART: [idev] UDS.KEYID = 0
3,523,809 ready_for_fw is high
3,523,994 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,623,020 UART: [idev] Erasing UDS.KEYID = 0
6,030,597 UART: [idev] Sha1 KeyId Algorithm
6,054,127 UART: [idev] --
6,057,862 UART: [ldev] ++
6,058,442 UART: [ldev] CDI.KEYID = 6
6,059,356 UART: [ldev] SUBJECT.KEYID = 5
6,060,517 UART: [ldev] AUTHORITY.KEYID = 7
6,061,752 UART: [ldev] FE.KEYID = 1
6,102,069 UART: [ldev] Erasing FE.KEYID = 1
8,604,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,033 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,014 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,883 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,783 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,005 UART: [ldev] --
10,416,051 UART: [fwproc] Wait for Commands...
10,418,328 UART: [fwproc] Recv command 0x46574c44
10,420,367 UART: [fwproc] Recv'd Img size: 78632 bytes
13,421,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,498,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,567,074 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,760,755 >>> mbox cmd response: success
13,765,319 UART: [afmc] ++
13,765,931 UART: [afmc] CDI.KEYID = 6
13,766,848 UART: [afmc] SUBJECT.KEYID = 7
13,768,008 UART: [afmc] AUTHORITY.KEYID = 5
16,294,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,017,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,019,322 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,035,331 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,051,149 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,066,843 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,090,063 UART: [afmc] --
18,093,277 UART: [cold-reset] --
18,096,928 UART: [state] Locking Datavault
18,101,582 UART: [state] Locking PCR0, PCR1 and PCR31
18,103,229 UART: [state] Locking ICCM
18,105,377 UART: [exit] Launching FMC @ 0x40000130
18,113,777 UART:
18,114,059 UART: Running Caliptra FMC ...
18,115,174 UART:
18,115,338 UART: [state] CFI Enabled
18,176,564 UART: [fht] FMC Alias Private Key: 7
19,940,268 UART: [art] Extend RT PCRs Done
19,941,483 UART: [art] Lock RT PCRs Done
19,942,863 UART: [art] Populate DV Done
19,948,382 UART: [fht] FMC Alias Private Key: 7
19,950,016 UART: [art] Derive CDI
19,950,814 UART: [art] Store in in slot 0x4
20,009,176 UART: [art] Derive Key Pair
20,010,191 UART: [art] Store priv key in slot 0x5
22,473,107 UART: [art] Derive Key Pair - Done
22,485,881 UART: [art] Signing Cert with AUTHO
22,487,180 UART: RITY.KEYID = 7
24,199,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,200,590 UART: [art] PUB.X = 5C63B059D6D8861160F597DD4424CE930593E0624F69879E04F6425409F1CF43991D971C6E0CFD7B9DE2E14DFF78D7C1
24,207,801 UART: [art] PUB.Y = D469EA1609A2710FAFB98DE9495E4117B4AB6F4EEA169925B46BCF22BAEDDB29543AD5934F6CD6C54A5FE56D2B097C1F
24,215,118 UART: [art] SIG.R = 532F3595D1639060548CEFA46553036FAEA1576F13AA445AF074179DA4E50604340B5074F25331FA0DA908CA4C0B8C45
24,222,483 UART: [art] SIG.S = 9C8D58494C2F2D48EB5EB88AEE3B80AAF2925F883811C9E9F0DD3583945F0C563FBD5659B50587C8D92636B7E190D257
25,201,005 UART: mbox::rt_entry...
25,201,978 UART: ____ _ _ _ ____ _____
25,203,961 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,205,967 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,207,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,209,842 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,211,775 UART: |_|
25,212,588 UART:
25,324,755 UART: [rt] Runtime listening for mailbox commands...
25,326,769 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,327,536 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,005 UART:
1,272 UART: Running Caliptra ROM ...
2,380 UART:
2,535 UART: [state] CFI Enabled
62,005 UART: [state] LifecycleState = Production
63,608 UART: [state] DebugLocked = Yes
65,403 UART: [state] Starting the WD Timer 40000000 cycles
70,244 UART: [kat] SHA2-256
249,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
260,989 UART: [kat] ++
261,526 UART: [kat] sha1
272,089 UART: [kat] SHA2-256
275,098 UART: [kat] SHA2-384
280,590 UART: [kat] SHA2-512-ACC
283,576 UART: [kat] ECC-384
2,747,196 UART: [kat] HMAC-384Kdf
2,771,516 UART: [kat] LMS
3,301,018 UART: [kat] --
3,304,912 UART: [warm-reset] ++
3,308,260 UART: [warm-reset] --
3,312,018 UART: [state] Locking Datavault
3,316,516 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,164 UART: [state] Locking ICCM
3,319,338 UART: [exit] Launching FMC @ 0x40000130
3,327,741 UART:
3,327,996 UART: Running Caliptra FMC ...
3,329,099 UART:
3,329,263 UART: [state] CFI Enabled
3,380,825 UART: [aliasrt :skip pcr extension
3,382,136 UART: [art] Extend RT PCRs Done
3,383,289 UART: [art] Lock RT PCRs Done
3,384,468 UART: [art] Populate DV Done
3,389,870 UART: [fht] FMC Alias Private Key: 7
3,391,459 UART: [art] Derive CDI
3,392,272 UART: [art] Store in in slot 0x4
3,449,420 UART: [art] Derive Key Pair
3,450,476 UART: [art] Store priv key in slot 0x5
5,913,236 UART: [art] Derive Key Pair - Done
5,926,077 UART: [art] Signing Cert with AUTHO
5,927,381 UART: RITY.KEYID = 7
7,639,071 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,583 UART: [art] PUB.X = 5C63B059D6D8861160F597DD4424CE930593E0624F69879E04F6425409F1CF43991D971C6E0CFD7B9DE2E14DFF78D7C1
7,647,807 UART: [art] PUB.Y = D469EA1609A2710FAFB98DE9495E4117B4AB6F4EEA169925B46BCF22BAEDDB29543AD5934F6CD6C54A5FE56D2B097C1F
7,655,127 UART: [art] SIG.R = 532F3595D1639060548CEFA46553036FAEA1576F13AA445AF074179DA4E50604340B5074F25331FA0DA908CA4C0B8C45
7,662,512 UART: [art] SIG.S = 9C8D58494C2F2D48EB5EB88AEE3B80AAF2925F883811C9E9F0DD3583945F0C563FBD5659B50587C8D92636B7E190D257
8,641,274 UART: mbox::rt_entry...
8,642,235 UART: ____ _ _ _ ____ _____
8,644,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,646,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,028 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,958 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,813 UART: |_|
8,652,616 UART:
11,395,705 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,400,131 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,026 UART:
192,405 UART: Running Caliptra ROM ...
193,593 UART:
193,750 UART: [state] CFI Enabled
264,477 UART: [state] LifecycleState = Production
266,215 UART: [state] DebugLocked = Yes
268,431 UART: [state] Starting the WD Timer 40000000 cycles
272,673 UART: [kat] SHA2-256
451,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,410 UART: [kat] ++
463,944 UART: [kat] sha1
474,519 UART: [kat] SHA2-256
477,541 UART: [kat] SHA2-384
484,604 UART: [kat] SHA2-512-ACC
487,611 UART: [kat] ECC-384
2,948,957 UART: [kat] HMAC-384Kdf
2,972,800 UART: [kat] LMS
3,502,328 UART: [kat] --
3,505,262 UART: [cold-reset] ++
3,507,689 UART: [fht] FHT @ 0x50003400
3,519,668 UART: [idev] ++
3,520,234 UART: [idev] CDI.KEYID = 6
3,521,121 UART: [idev] SUBJECT.KEYID = 7
3,522,368 UART: [idev] UDS.KEYID = 0
3,523,268 ready_for_fw is high
3,523,488 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,622,593 UART: [idev] Erasing UDS.KEYID = 0
6,030,729 UART: [idev] Sha1 KeyId Algorithm
6,052,888 UART: [idev] --
6,056,699 UART: [ldev] ++
6,057,281 UART: [ldev] CDI.KEYID = 6
6,058,167 UART: [ldev] SUBJECT.KEYID = 5
6,059,381 UART: [ldev] AUTHORITY.KEYID = 7
6,060,622 UART: [ldev] FE.KEYID = 1
6,101,415 UART: [ldev] Erasing FE.KEYID = 1
8,606,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,180 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,156 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,005 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,938 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,226 UART: [ldev] --
10,415,255 UART: [fwproc] Wait for Commands...
10,417,189 UART: [fwproc] Recv command 0x46574c44
10,419,249 UART: [fwproc] Recv'd Img size: 78632 bytes
13,422,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,565,640 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,758,734 >>> mbox cmd response: success
13,762,887 UART: [afmc] ++
13,763,497 UART: [afmc] CDI.KEYID = 6
13,764,383 UART: [afmc] SUBJECT.KEYID = 7
13,765,487 UART: [afmc] AUTHORITY.KEYID = 5
16,294,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,021,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,023,493 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,039,474 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,055,326 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,071,094 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,093,280 UART: [afmc] --
18,097,904 UART: [cold-reset] --
18,102,639 UART: [state] Locking Datavault
18,107,998 UART: [state] Locking PCR0, PCR1 and PCR31
18,109,644 UART: [state] Locking ICCM
18,111,472 UART: [exit] Launching FMC @ 0x40000130
18,119,872 UART:
18,120,107 UART: Running Caliptra FMC ...
18,121,210 UART:
18,121,371 UART: [state] CFI Enabled
18,179,299 UART: [fht] FMC Alias Private Key: 7
19,943,350 UART: [art] Extend RT PCRs Done
19,944,571 UART: [art] Lock RT PCRs Done
19,946,144 UART: [art] Populate DV Done
19,951,936 UART: [fht] FMC Alias Private Key: 7
19,953,535 UART: [art] Derive CDI
19,954,353 UART: [art] Store in in slot 0x4
20,011,892 UART: [art] Derive Key Pair
20,012,955 UART: [art] Store priv key in slot 0x5
22,476,180 UART: [art] Derive Key Pair - Done
22,488,858 UART: [art] Signing Cert with AUTHO
22,490,166 UART: RITY.KEYID = 7
24,201,729 UART: [art] Erasing AUTHORITY.KEYID = 7
24,203,232 UART: [art] PUB.X = 065E2E6F5B05759837B54F9F47E2F26172A05217699C0C36FD7B394136732FFF2BFD07EBEC14F2720C327490E3AD6123
24,210,660 UART: [art] PUB.Y = 4EFD1D2C65B4FBAE87105F373DCDA22ED295415F6B1B2D8D0478D9CD17D423CE623290A9FF1D1E4D4C6148A7C01DFA41
24,217,781 UART: [art] SIG.R = B51247144F23048B5D6045EAE1E5090EA60828BAE0C4EF897E1C1AC99E6CD30A494FDD4909F4CC1382148228C3609333
24,225,107 UART: [art] SIG.S = 45E1C938F7D59ED13AABAF353377AC5AD33CED7734196325E8D9D5A6BD821FFBF3D116BF11D437F4029B398C7269F087
25,204,291 UART: mbox::rt_entry...
25,205,256 UART: ____ _ _ _ ____ _____
25,207,245 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,209,249 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,211,184 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,213,113 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,214,988 UART: |_|
25,215,787 UART:
25,327,890 UART: [rt] Runtime listening for mailbox commands...
25,329,897 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,330,852 >>> mbox cmd response data (0 bytes)
Initializing fuses
980 UART:
1,132 UART: Running Caliptra ROM ...
2,146 UART:
2,288 UART: [state] CFI Enabled
60,738 UART: [state] LifecycleState = Production
62,478 UART: [state] DebugLocked = Yes
64,438 UART: [state] Starting the WD Timer 40000000 cycles
69,929 UART: [kat] SHA2-256
249,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
260,642 UART: [kat] ++
261,190 UART: [kat] sha1
271,483 UART: [kat] SHA2-256
274,536 UART: [kat] SHA2-384
280,346 UART: [kat] SHA2-512-ACC
283,332 UART: [kat] ECC-384
2,746,907 UART: [kat] HMAC-384Kdf
2,768,364 UART: [kat] LMS
3,297,876 UART: [kat] --
3,302,078 UART: [warm-reset] ++
3,307,413 UART: [warm-reset] --
3,310,790 UART: [state] Locking Datavault
3,313,826 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,534 UART: [state] Locking ICCM
3,317,309 UART: [exit] Launching FMC @ 0x40000130
3,325,708 UART:
3,325,955 UART: Running Caliptra FMC ...
3,327,080 UART:
3,327,248 UART: [state] CFI Enabled
3,377,462 UART: [aliasrt :skip pcr extension
3,378,749 UART: [art] Extend RT PCRs Done
3,379,902 UART: [art] Lock RT PCRs Done
3,381,194 UART: [art] Populate DV Done
3,386,551 UART: [fht] FMC Alias Private Key: 7
3,388,147 UART: [art] Derive CDI
3,388,970 UART: [art] Store in in slot 0x4
3,446,088 UART: [art] Derive Key Pair
3,447,137 UART: [art] Store priv key in slot 0x5
5,908,951 UART: [art] Derive Key Pair - Done
5,922,017 UART: [art] Signing Cert with AUTHO
5,923,364 UART: RITY.KEYID = 7
7,634,564 UART: [art] Erasing AUTHORITY.KEYID = 7
7,636,062 UART: [art] PUB.X = 065E2E6F5B05759837B54F9F47E2F26172A05217699C0C36FD7B394136732FFF2BFD07EBEC14F2720C327490E3AD6123
7,643,354 UART: [art] PUB.Y = 4EFD1D2C65B4FBAE87105F373DCDA22ED295415F6B1B2D8D0478D9CD17D423CE623290A9FF1D1E4D4C6148A7C01DFA41
7,650,623 UART: [art] SIG.R = B51247144F23048B5D6045EAE1E5090EA60828BAE0C4EF897E1C1AC99E6CD30A494FDD4909F4CC1382148228C3609333
7,657,990 UART: [art] SIG.S = 45E1C938F7D59ED13AABAF353377AC5AD33CED7734196325E8D9D5A6BD821FFBF3D116BF11D437F4029B398C7269F087
8,636,055 UART: mbox::rt_entry...
8,637,035 UART: ____ _ _ _ ____ _____
8,639,140 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,641,196 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,643,136 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,645,069 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,647,006 UART: |_|
8,647,846 UART:
11,391,123 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,395,551 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,091 UART:
192,473 UART: Running Caliptra ROM ...
193,677 UART:
193,833 UART: [state] CFI Enabled
260,282 UART: [state] LifecycleState = Production
262,033 UART: [state] DebugLocked = Yes
263,331 UART: [state] Starting the WD Timer 40000000 cycles
269,074 UART: [kat] SHA2-256
448,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,782 UART: [kat] ++
460,314 UART: [kat] sha1
471,531 UART: [kat] SHA2-256
474,514 UART: [kat] SHA2-384
481,082 UART: [kat] SHA2-512-ACC
484,025 UART: [kat] ECC-384
2,947,908 UART: [kat] HMAC-384Kdf
2,963,706 UART: [kat] LMS
3,493,218 UART: [kat] --
3,498,229 UART: [cold-reset] ++
3,499,661 UART: [fht] FHT @ 0x50003400
3,510,941 UART: [idev] ++
3,511,552 UART: [idev] CDI.KEYID = 6
3,512,486 UART: [idev] SUBJECT.KEYID = 7
3,513,595 UART: [idev] UDS.KEYID = 0
3,514,642 ready_for_fw is high
3,514,842 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,613,860 UART: [idev] Erasing UDS.KEYID = 0
6,018,663 UART: [idev] Sha1 KeyId Algorithm
6,040,149 UART: [idev] --
6,043,452 UART: [ldev] ++
6,044,027 UART: [ldev] CDI.KEYID = 6
6,044,941 UART: [ldev] SUBJECT.KEYID = 5
6,046,106 UART: [ldev] AUTHORITY.KEYID = 7
6,047,399 UART: [ldev] FE.KEYID = 1
6,091,081 UART: [ldev] Erasing FE.KEYID = 1
8,598,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,033 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,348,015 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,363,882 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,379,837 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,400,969 UART: [ldev] --
10,406,402 UART: [fwproc] Wait for Commands...
10,409,145 UART: [fwproc] Recv command 0x46574c44
10,411,246 UART: [fwproc] Recv'd Img size: 78632 bytes
13,402,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,474,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,543,751 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,736,187 >>> mbox cmd response: success
13,740,798 UART: [afmc] ++
13,741,410 UART: [afmc] CDI.KEYID = 6
13,742,346 UART: [afmc] SUBJECT.KEYID = 7
13,743,510 UART: [afmc] AUTHORITY.KEYID = 5
16,269,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,992,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,994,527 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,010,561 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,026,372 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,042,114 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,064,610 UART: [afmc] --
18,068,309 UART: [cold-reset] --
18,072,702 UART: [state] Locking Datavault
18,077,365 UART: [state] Locking PCR0, PCR1 and PCR31
18,079,074 UART: [state] Locking ICCM
18,080,138 UART: [exit] Launching FMC @ 0x40000130
18,088,593 UART:
18,088,839 UART: Running Caliptra FMC ...
18,089,886 UART:
18,090,037 UART: [state] CFI Enabled
18,150,200 UART: [fht] FMC Alias Private Key: 7
19,913,955 UART: [art] Extend RT PCRs Done
19,915,171 UART: [art] Lock RT PCRs Done
19,916,821 UART: [art] Populate DV Done
19,922,503 UART: [fht] FMC Alias Private Key: 7
19,924,098 UART: [art] Derive CDI
19,924,836 UART: [art] Store in in slot 0x4
19,983,554 UART: [art] Derive Key Pair
19,984,554 UART: [art] Store priv key in slot 0x5
22,447,898 UART: [art] Derive Key Pair - Done
22,460,576 UART: [art] Signing Cert with AUTHO
22,461,881 UART: RITY.KEYID = 7
24,173,295 UART: [art] Erasing AUTHORITY.KEYID = 7
24,174,805 UART: [art] PUB.X = 2E2BDDF484227B344636E517D62E8450D6DD3517A72D58A08A85613205BC04A6A4317CFD9702546FB23E211FDE8B9D52
24,182,043 UART: [art] PUB.Y = E443042788B6B1CA74664C9E285BF07328372373BA6B6068021899F68511E7891A4E2A58C335007F48E7CF926321404D
24,189,260 UART: [art] SIG.R = F8817CAD5213ABFCA7731898C323CAC07F48401554417E87B46788C2866A001A68FF02F960CA3530C1A1B64C6F61377F
24,196,628 UART: [art] SIG.S = FDD0F543E389846A86B1E6B30513CD61893BD12A27601452D3A622C8D5A0B7473D83D80FA76AA88909774070821DC9D4
25,174,931 UART: mbox::rt_entry...
25,175,885 UART: ____ _ _ _ ____ _____
25,177,812 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,179,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,181,676 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,183,602 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,185,480 UART: |_|
25,186,308 UART:
25,300,185 UART: [rt] Runtime listening for mailbox commands...
25,302,219 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,302,992 >>> mbox cmd response data (0 bytes)
Initializing fuses
973 UART:
1,246 UART: Running Caliptra ROM ...
2,274 UART:
2,417 UART: [state] CFI Enabled
61,765 UART: [state] LifecycleState = Production
63,532 UART: [state] DebugLocked = Yes
66,163 UART: [state] Starting the WD Timer 40000000 cycles
71,371 UART: [kat] SHA2-256
250,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,080 UART: [kat] ++
262,532 UART: [kat] sha1
274,483 UART: [kat] SHA2-256
277,546 UART: [kat] SHA2-384
283,145 UART: [kat] SHA2-512-ACC
286,077 UART: [kat] ECC-384
2,747,526 UART: [kat] HMAC-384Kdf
2,769,851 UART: [kat] LMS
3,299,359 UART: [kat] --
3,303,675 UART: [warm-reset] ++
3,306,630 UART: [warm-reset] --
3,309,795 UART: [state] Locking Datavault
3,313,485 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,137 UART: [state] Locking ICCM
3,316,318 UART: [exit] Launching FMC @ 0x40000130
3,324,773 UART:
3,325,059 UART: Running Caliptra FMC ...
3,326,091 UART:
3,326,247 UART: [state] CFI Enabled
3,378,806 UART: [aliasrt :skip pcr extension
3,380,064 UART: [art] Extend RT PCRs Done
3,381,206 UART: [art] Lock RT PCRs Done
3,382,275 UART: [art] Populate DV Done
3,387,522 UART: [fht] FMC Alias Private Key: 7
3,389,133 UART: [art] Derive CDI
3,389,949 UART: [art] Store in in slot 0x4
3,447,791 UART: [art] Derive Key Pair
3,448,848 UART: [art] Store priv key in slot 0x5
5,911,395 UART: [art] Derive Key Pair - Done
5,924,386 UART: [art] Signing Cert with AUTHO
5,925,689 UART: RITY.KEYID = 7
7,637,172 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,686 UART: [art] PUB.X = 2E2BDDF484227B344636E517D62E8450D6DD3517A72D58A08A85613205BC04A6A4317CFD9702546FB23E211FDE8B9D52
7,645,942 UART: [art] PUB.Y = E443042788B6B1CA74664C9E285BF07328372373BA6B6068021899F68511E7891A4E2A58C335007F48E7CF926321404D
7,653,112 UART: [art] SIG.R = F8817CAD5213ABFCA7731898C323CAC07F48401554417E87B46788C2866A001A68FF02F960CA3530C1A1B64C6F61377F
7,660,483 UART: [art] SIG.S = FDD0F543E389846A86B1E6B30513CD61893BD12A27601452D3A622C8D5A0B7473D83D80FA76AA88909774070821DC9D4
8,639,273 UART: mbox::rt_entry...
8,640,241 UART: ____ _ _ _ ____ _____
8,642,174 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,184 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,646,063 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,877 UART: |_|
8,650,705 UART:
11,391,897 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
11,396,337 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
191,903 UART:
192,274 UART: Running Caliptra ROM ...
193,446 UART:
602,902 UART: [state] CFI Enabled
617,765 UART: [state] LifecycleState = Production
619,445 UART: [state] DebugLocked = Yes
622,233 UART: [state] Starting the WD Timer 40000000 cycles
626,275 UART: [kat] SHA2-256
805,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,028 UART: [kat] ++
817,568 UART: [kat] sha1
828,479 UART: [kat] SHA2-256
831,553 UART: [kat] SHA2-384
838,464 UART: [kat] SHA2-512-ACC
841,406 UART: [kat] ECC-384
3,281,567 UART: [kat] HMAC-384Kdf
3,293,672 UART: [kat] LMS
3,823,158 UART: [kat] --
3,827,246 UART: [cold-reset] ++
3,828,114 UART: [fht] FHT @ 0x50003400
3,839,306 UART: [idev] ++
3,839,877 UART: [idev] CDI.KEYID = 6
3,840,812 UART: [idev] SUBJECT.KEYID = 7
3,841,993 UART: [idev] UDS.KEYID = 0
3,842,918 ready_for_fw is high
3,843,106 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,941,944 UART: [idev] Erasing UDS.KEYID = 0
6,317,230 UART: [idev] Sha1 KeyId Algorithm
6,339,800 UART: [idev] --
6,343,039 UART: [ldev] ++
6,343,611 UART: [ldev] CDI.KEYID = 6
6,344,520 UART: [ldev] SUBJECT.KEYID = 5
6,345,678 UART: [ldev] AUTHORITY.KEYID = 7
6,346,962 UART: [ldev] FE.KEYID = 1
6,357,013 UART: [ldev] Erasing FE.KEYID = 1
8,835,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,268 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,571,269 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,587,118 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,603,074 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,623,219 UART: [ldev] --
10,628,700 UART: [fwproc] Wait for Commands...
10,631,285 UART: [fwproc] Recv command 0x46574c44
10,633,326 UART: [fwproc] Recv'd Img size: 78632 bytes
13,624,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,701,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,770,710 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,963,204 >>> mbox cmd response: success
13,967,394 UART: [afmc] ++
13,968,007 UART: [afmc] CDI.KEYID = 6
13,968,926 UART: [afmc] SUBJECT.KEYID = 7
13,970,081 UART: [afmc] AUTHORITY.KEYID = 5
16,469,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,192,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,194,085 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,210,121 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,225,910 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,241,626 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,263,227 UART: [afmc] --
18,267,512 UART: [cold-reset] --
18,270,887 UART: [state] Locking Datavault
18,276,292 UART: [state] Locking PCR0, PCR1 and PCR31
18,277,933 UART: [state] Locking ICCM
18,280,080 UART: [exit] Launching FMC @ 0x40000130
18,288,486 UART:
18,288,765 UART: Running Caliptra FMC ...
18,289,881 UART:
18,290,047 UART: [state] CFI Enabled
18,298,203 UART: [fht] FMC Alias Private Key: 7
20,054,898 UART: [art] Extend RT PCRs Done
20,056,154 UART: [art] Lock RT PCRs Done
20,057,784 UART: [art] Populate DV Done
20,063,330 UART: [fht] FMC Alias Private Key: 7
20,064,952 UART: [art] Derive CDI
20,065,729 UART: [art] Store in in slot 0x4
20,108,287 UART: [art] Derive Key Pair
20,109,360 UART: [art] Store priv key in slot 0x5
22,536,666 UART: [art] Derive Key Pair - Done
22,549,934 UART: [art] Signing Cert with AUTHO
22,551,236 UART: RITY.KEYID = 7
24,256,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,258,061 UART: [art] PUB.X = 92046141C124B2EB18F9A4E494F9E83B383A1F826E7DB6F46570FB8A646C4FB064A9F8AED651DE95D591E93C2C3D236F
24,265,363 UART: [art] PUB.Y = 9A1A4BC130144C0314AD6C19693CA6665C711E139CB64C6E22811E249C799F1D612CF55A61C6E30193BEE4A59E809B36
24,272,649 UART: [art] SIG.R = 50911B0C766CF3D67FF0EF73B1720CD4DA2027EA5B3D6BB4F3258884C44C494EE9A5FE228FFEC5AC7868E6BF32C2C8E4
24,280,047 UART: [art] SIG.S = B4992BB397C1F10264926FC95D766D4090A98EB620951C70A21D870634536BBDDB37E923EE6C79F00EBCE7CB852A51BB
25,258,347 UART: mbox::rt_entry...
25,259,332 UART: ____ _ _ _ ____ _____
25,261,322 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,263,324 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,265,254 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,267,182 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,269,109 UART: |_|
25,269,954 UART:
25,384,111 UART: [rt] Runtime listening for mailbox commands...
25,386,130 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,386,917 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,005 UART:
1,264 UART: Running Caliptra ROM ...
2,370 UART:
15,143,547 UART: [state] CFI Enabled
15,154,520 UART: [state] LifecycleState = Production
15,156,227 UART: [state] DebugLocked = Yes
15,158,055 UART: [state] Starting the WD Timer 40000000 cycles
15,163,214 UART: [kat] SHA2-256
15,342,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,353,926 UART: [kat] ++
15,354,380 UART: [kat] sha1
15,366,234 UART: [kat] SHA2-256
15,369,238 UART: [kat] SHA2-384
15,375,167 UART: [kat] SHA2-512-ACC
15,378,142 UART: [kat] ECC-384
17,817,478 UART: [kat] HMAC-384Kdf
17,829,436 UART: [kat] LMS
18,359,000 UART: [kat] --
18,363,386 UART: [warm-reset] ++
18,369,312 UART: [warm-reset] --
18,373,119 UART: [state] Locking Datavault
18,376,386 UART: [state] Locking PCR0, PCR1 and PCR31
18,378,033 UART: [state] Locking ICCM
18,379,537 UART: [exit] Launching FMC @ 0x40000130
18,387,928 UART:
18,388,161 UART: Running Caliptra FMC ...
18,389,256 UART:
18,389,411 UART: [state] CFI Enabled
18,391,355 UART: [aliasrt :skip pcr extension
18,392,597 UART: [art] Extend RT PCRs Done
18,393,730 UART: [art] Lock RT PCRs Done
18,395,282 UART: [art] Populate DV Done
18,400,475 UART: [fht] FMC Alias Private Key: 7
18,402,063 UART: [art] Derive CDI
18,402,877 UART: [art] Store in in slot 0x4
18,445,131 UART: [art] Derive Key Pair
18,446,180 UART: [art] Store priv key in slot 0x5
20,873,077 UART: [art] Derive Key Pair - Done
20,885,966 UART: [art] Signing Cert with AUTHO
20,887,264 UART: RITY.KEYID = 7
22,592,392 UART: [art] Erasing AUTHORITY.KEYID = 7
22,593,902 UART: [art] PUB.X = 92046141C124B2EB18F9A4E494F9E83B383A1F826E7DB6F46570FB8A646C4FB064A9F8AED651DE95D591E93C2C3D236F
22,601,148 UART: [art] PUB.Y = 9A1A4BC130144C0314AD6C19693CA6665C711E139CB64C6E22811E249C799F1D612CF55A61C6E30193BEE4A59E809B36
22,608,381 UART: [art] SIG.R = 50911B0C766CF3D67FF0EF73B1720CD4DA2027EA5B3D6BB4F3258884C44C494EE9A5FE228FFEC5AC7868E6BF32C2C8E4
22,615,831 UART: [art] SIG.S = B4992BB397C1F10264926FC95D766D4090A98EB620951C70A21D870634536BBDDB37E923EE6C79F00EBCE7CB852A51BB
23,595,058 UART: mbox::rt_entry...
23,596,004 UART: ____ _ _ _ ____ _____
23,597,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,599,931 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,601,785 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,603,708 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,605,581 UART: |_|
23,606,407 UART:
26,322,098 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,326,527 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
191,926 UART:
192,385 UART: Running Caliptra ROM ...
193,486 UART:
603,097 UART: [state] CFI Enabled
616,366 UART: [state] LifecycleState = Production
618,102 UART: [state] DebugLocked = Yes
620,739 UART: [state] Starting the WD Timer 40000000 cycles
625,490 UART: [kat] SHA2-256
804,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,216 UART: [kat] ++
816,686 UART: [kat] sha1
827,451 UART: [kat] SHA2-256
830,465 UART: [kat] SHA2-384
837,023 UART: [kat] SHA2-512-ACC
840,031 UART: [kat] ECC-384
3,283,719 UART: [kat] HMAC-384Kdf
3,296,890 UART: [kat] LMS
3,826,425 UART: [kat] --
3,830,415 UART: [cold-reset] ++
3,831,348 UART: [fht] FHT @ 0x50003400
3,842,528 UART: [idev] ++
3,843,091 UART: [idev] CDI.KEYID = 6
3,843,975 UART: [idev] SUBJECT.KEYID = 7
3,845,218 UART: [idev] UDS.KEYID = 0
3,846,121 ready_for_fw is high
3,846,337 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
3,945,242 UART: [idev] Erasing UDS.KEYID = 0
6,319,856 UART: [idev] Sha1 KeyId Algorithm
6,342,531 UART: [idev] --
6,345,494 UART: [ldev] ++
6,346,060 UART: [ldev] CDI.KEYID = 6
6,346,941 UART: [ldev] SUBJECT.KEYID = 5
6,348,202 UART: [ldev] AUTHORITY.KEYID = 7
6,349,431 UART: [ldev] FE.KEYID = 1
6,359,288 UART: [ldev] Erasing FE.KEYID = 1
8,830,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,154 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,141 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,008 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,597,909 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,633 UART: [ldev] --
10,622,685 UART: [fwproc] Wait for Commands...
10,625,656 UART: [fwproc] Recv command 0x46574c44
10,627,692 UART: [fwproc] Recv'd Img size: 78632 bytes
13,629,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,705,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,774,038 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
13,966,472 >>> mbox cmd response: success
13,970,554 UART: [afmc] ++
13,971,187 UART: [afmc] CDI.KEYID = 6
13,972,101 UART: [afmc] SUBJECT.KEYID = 7
13,973,258 UART: [afmc] AUTHORITY.KEYID = 5
16,471,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,193,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,195,040 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,211,004 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,226,874 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,242,561 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,265,397 UART: [afmc] --
18,268,805 UART: [cold-reset] --
18,273,480 UART: [state] Locking Datavault
18,278,882 UART: [state] Locking PCR0, PCR1 and PCR31
18,280,578 UART: [state] Locking ICCM
18,281,750 UART: [exit] Launching FMC @ 0x40000130
18,290,203 UART:
18,290,478 UART: Running Caliptra FMC ...
18,291,582 UART:
18,291,749 UART: [state] CFI Enabled
18,299,575 UART: [fht] FMC Alias Private Key: 7
20,056,822 UART: [art] Extend RT PCRs Done
20,058,160 UART: [art] Lock RT PCRs Done
20,059,362 UART: [art] Populate DV Done
20,064,983 UART: [fht] FMC Alias Private Key: 7
20,066,453 UART: [art] Derive CDI
20,067,260 UART: [art] Store in in slot 0x4
20,109,842 UART: [art] Derive Key Pair
20,110,838 UART: [art] Store priv key in slot 0x5
22,537,573 UART: [art] Derive Key Pair - Done
22,550,569 UART: [art] Signing Cert with AUTHO
22,551,876 UART: RITY.KEYID = 7
24,257,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,258,939 UART: [art] PUB.X = 361CE03EBBF50CD5799D8B7D6F420268610E0F58B09B5343D0C2AE66BB16BC58FA1FED8D7991206975575CD1C468318E
24,266,206 UART: [art] PUB.Y = 6A2029A638A0A1335507C4CE04474DCB19825E3626E63ECACFA68A9BC348B986ED754F6C0550249AFB006697BC80D6BB
24,273,456 UART: [art] SIG.R = 769EB898FB653145CAEBF89E85933E077472D32AB11365069638C7A1585E5932BD3F9CB1DFB6701DB2D7054CF28CB784
24,280,879 UART: [art] SIG.S = 74DDA5D6B506AC8C18C65FF3399C4FFD68CD1D8C34EFDF0EA12994795A7FC6CF0ED495A3103018F7E0458A90AF41CCFC
25,259,049 UART: mbox::rt_entry...
25,260,002 UART: ____ _ _ _ ____ _____
25,262,102 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,264,101 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,265,953 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,267,891 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,269,768 UART: |_|
25,270,649 UART:
25,384,099 UART: [rt] Runtime listening for mailbox commands...
25,386,107 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,386,881 >>> mbox cmd response data (0 bytes)
Initializing fuses
996 UART:
1,245 UART: Running Caliptra ROM ...
2,294 UART:
15,139,900 UART: [state] CFI Enabled
15,155,356 UART: [state] LifecycleState = Production
15,157,140 UART: [state] DebugLocked = Yes
15,159,381 UART: [state] Starting the WD Timer 40000000 cycles
15,164,602 UART: [kat] SHA2-256
15,343,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,355,298 UART: [kat] ++
15,355,841 UART: [kat] sha1
15,366,300 UART: [kat] SHA2-256
15,369,315 UART: [kat] SHA2-384
15,375,402 UART: [kat] SHA2-512-ACC
15,378,343 UART: [kat] ECC-384
17,820,235 UART: [kat] HMAC-384Kdf
17,833,748 UART: [kat] LMS
18,363,252 UART: [kat] --
18,368,695 UART: [warm-reset] ++
18,373,800 UART: [warm-reset] --
18,377,875 UART: [state] Locking Datavault
18,380,959 UART: [state] Locking PCR0, PCR1 and PCR31
18,382,603 UART: [state] Locking ICCM
18,385,158 UART: [exit] Launching FMC @ 0x40000130
18,393,604 UART:
18,393,853 UART: Running Caliptra FMC ...
18,394,952 UART:
18,395,110 UART: [state] CFI Enabled
18,396,943 UART: [aliasrt :skip pcr extension
18,398,183 UART: [art] Extend RT PCRs Done
18,399,313 UART: [art] Lock RT PCRs Done
18,400,536 UART: [art] Populate DV Done
18,406,046 UART: [fht] FMC Alias Private Key: 7
18,407,699 UART: [art] Derive CDI
18,408,511 UART: [art] Store in in slot 0x4
18,451,239 UART: [art] Derive Key Pair
18,452,288 UART: [art] Store priv key in slot 0x5
20,878,826 UART: [art] Derive Key Pair - Done
20,891,767 UART: [art] Signing Cert with AUTHO
20,893,059 UART: RITY.KEYID = 7
22,598,461 UART: [art] Erasing AUTHORITY.KEYID = 7
22,599,985 UART: [art] PUB.X = 361CE03EBBF50CD5799D8B7D6F420268610E0F58B09B5343D0C2AE66BB16BC58FA1FED8D7991206975575CD1C468318E
22,607,261 UART: [art] PUB.Y = 6A2029A638A0A1335507C4CE04474DCB19825E3626E63ECACFA68A9BC348B986ED754F6C0550249AFB006697BC80D6BB
22,614,519 UART: [art] SIG.R = 769EB898FB653145CAEBF89E85933E077472D32AB11365069638C7A1585E5932BD3F9CB1DFB6701DB2D7054CF28CB784
22,621,893 UART: [art] SIG.S = 74DDA5D6B506AC8C18C65FF3399C4FFD68CD1D8C34EFDF0EA12994795A7FC6CF0ED495A3103018F7E0458A90AF41CCFC
23,600,206 UART: mbox::rt_entry...
23,601,170 UART: ____ _ _ _ ____ _____
23,603,273 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,605,287 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,607,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,609,141 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,611,065 UART: |_|
23,611,898 UART:
26,320,476 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
26,324,896 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Production
86,003 UART: [state] DebugLocked = Yes
86,671 UART: [state] Starting the WD Timer 40000000 cycles
88,378 UART: [kat] SHA2-256
891,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,057 UART: [kat] ++
896,209 UART: [kat] sha1
900,399 UART: [kat] SHA2-256
902,339 UART: [kat] SHA2-384
905,066 UART: [kat] SHA2-512-ACC
906,967 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,170,197 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 ready_for_fw is high
1,174,450 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,818 UART: [ldev] ++
1,208,986 UART: [ldev] CDI.KEYID = 6
1,209,350 UART: [ldev] SUBJECT.KEYID = 5
1,209,777 UART: [ldev] AUTHORITY.KEYID = 7
1,210,240 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,995 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,689 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,559 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,265 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,451 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,720 UART: [fwproc] Recv command 0x46574c44
1,282,453 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,432 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,793 >>> mbox cmd response: success
2,335,819 UART: [afmc] ++
2,335,987 UART: [afmc] CDI.KEYID = 6
2,336,350 UART: [afmc] SUBJECT.KEYID = 7
2,336,776 UART: [afmc] AUTHORITY.KEYID = 5
2,372,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,494 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,213 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,106 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,813 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,598 UART: [afmc] --
2,415,509 UART: [cold-reset] --
2,416,395 UART: [state] Locking Datavault
2,417,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,014 UART: [state] Locking ICCM
2,418,632 UART: [exit] Launching FMC @ 0x40000130
2,423,961 UART:
2,423,977 UART: Running Caliptra FMC ...
2,424,385 UART:
2,424,439 UART: [state] CFI Enabled
2,435,104 UART: [fht] FMC Alias Private Key: 7
2,542,445 UART: [art] Extend RT PCRs Done
2,542,873 UART: [art] Lock RT PCRs Done
2,544,411 UART: [art] Populate DV Done
2,552,647 UART: [fht] FMC Alias Private Key: 7
2,553,665 UART: [art] Derive CDI
2,553,945 UART: [art] Store in in slot 0x4
2,639,596 UART: [art] Derive Key Pair
2,639,956 UART: [art] Store priv key in slot 0x5
2,653,360 UART: [art] Derive Key Pair - Done
2,668,054 UART: [art] Signing Cert with AUTHO
2,668,534 UART: RITY.KEYID = 7
2,683,634 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,399 UART: [art] PUB.X = 35340054429E1CAB7B6C7D24C0ECE4F433E2EDB3C5DBB5C7DF347BBFDEFAFD2E60B644ED6355C99891BC8BC1E16505F2
2,691,168 UART: [art] PUB.Y = 61BB77FF0A09DC7278147FE8F89416D12C97DBFD5B82AD646C5DDBC9F88633DB79791AB32014279017C8DDC9691A770A
2,698,117 UART: [art] SIG.R = 099F24AB693F0FF227D24B8E34C132789A6175E6F83C23C829FECF18F193AD79FF719B0CA74F742E934D72C29AF116E8
2,704,884 UART: [art] SIG.S = 118930C47EF447A57C1317120C38E50C4098BF1B88C780FFC282CEDA38E54A4F47E609A9F79B039715FC1A3E656957F6
2,728,579 UART: mbox::rt_entry...
2,728,951 UART: ____ _ _ _ ____ _____
2,729,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,535 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,303 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,071 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,839 UART: |_|
2,733,151 UART:
2,839,456 UART: [rt] Runtime listening for mailbox commands...
2,840,218 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,428 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,522 UART:
2,840,538 UART: Running Caliptra ROM ...
2,840,946 UART:
2,841,001 UART: [state] CFI Enabled
2,843,886 UART: [state] LifecycleState = Production
2,844,494 UART: [state] DebugLocked = Yes
2,845,062 UART: [state] Starting the WD Timer 40000000 cycles
2,846,741 UART: [kat] SHA2-256
3,650,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,420 UART: [kat] ++
3,654,572 UART: [kat] sha1
3,658,716 UART: [kat] SHA2-256
3,660,656 UART: [kat] SHA2-384
3,663,287 UART: [kat] SHA2-512-ACC
3,665,188 UART: [kat] ECC-384
3,675,209 UART: [kat] HMAC-384Kdf
3,679,595 UART: [kat] LMS
3,927,907 UART: [kat] --
3,928,697 UART: [warm-reset] ++
3,929,572 UART: [warm-reset] --
3,930,375 UART: [state] Locking Datavault
3,931,205 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,809 UART: [state] Locking ICCM
3,932,273 UART: [exit] Launching FMC @ 0x40000130
3,937,602 UART:
3,937,618 UART: Running Caliptra FMC ...
3,938,026 UART:
3,938,080 UART: [state] CFI Enabled
3,939,275 UART: [aliasrt :skip pcr extension
3,939,748 UART: [art] Extend RT PCRs Done
3,940,176 UART: [art] Lock RT PCRs Done
3,941,341 UART: [art] Populate DV Done
3,949,375 UART: [fht] FMC Alias Private Key: 7
3,950,427 UART: [art] Derive CDI
3,950,707 UART: [art] Store in in slot 0x4
4,036,410 UART: [art] Derive Key Pair
4,036,770 UART: [art] Store priv key in slot 0x5
4,050,260 UART: [art] Derive Key Pair - Done
4,065,030 UART: [art] Signing Cert with AUTHO
4,065,510 UART: RITY.KEYID = 7
4,080,468 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,233 UART: [art] PUB.X = 35340054429E1CAB7B6C7D24C0ECE4F433E2EDB3C5DBB5C7DF347BBFDEFAFD2E60B644ED6355C99891BC8BC1E16505F2
4,088,002 UART: [art] PUB.Y = 61BB77FF0A09DC7278147FE8F89416D12C97DBFD5B82AD646C5DDBC9F88633DB79791AB32014279017C8DDC9691A770A
4,094,951 UART: [art] SIG.R = 099F24AB693F0FF227D24B8E34C132789A6175E6F83C23C829FECF18F193AD79FF719B0CA74F742E934D72C29AF116E8
4,101,718 UART: [art] SIG.S = 118930C47EF447A57C1317120C38E50C4098BF1B88C780FFC282CEDA38E54A4F47E609A9F79B039715FC1A3E656957F6
4,125,593 UART: mbox::rt_entry...
4,125,965 UART: ____ _ _ _ ____ _____
4,126,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,549 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,085 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,853 UART: |_|
4,130,165 UART:
4,420,489 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,422,715 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Production
86,039 UART: [state] DebugLocked = Yes
86,771 UART: [state] Starting the WD Timer 40000000 cycles
88,386 UART: [kat] SHA2-256
891,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,065 UART: [kat] ++
896,217 UART: [kat] sha1
900,485 UART: [kat] SHA2-256
902,425 UART: [kat] SHA2-384
905,146 UART: [kat] SHA2-512-ACC
907,047 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,517 UART: [cold-reset] ++
1,171,006 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,175,058 ready_for_fw is high
1,175,058 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,223 UART: [idev] --
1,209,252 UART: [ldev] ++
1,209,420 UART: [ldev] CDI.KEYID = 6
1,209,784 UART: [ldev] SUBJECT.KEYID = 5
1,210,211 UART: [ldev] AUTHORITY.KEYID = 7
1,210,674 UART: [ldev] FE.KEYID = 1
1,216,188 UART: [ldev] Erasing FE.KEYID = 1
1,242,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,791 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,485 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,355 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,061 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,167 UART: [ldev] --
1,281,573 UART: [fwproc] Wait for Commands...
1,282,334 UART: [fwproc] Recv command 0x46574c44
1,283,067 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,438 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,671 >>> mbox cmd response: success
2,335,763 UART: [afmc] ++
2,335,931 UART: [afmc] CDI.KEYID = 6
2,336,294 UART: [afmc] SUBJECT.KEYID = 7
2,336,720 UART: [afmc] AUTHORITY.KEYID = 5
2,371,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,830 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,549 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,442 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,149 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,954 UART: [afmc] --
2,414,897 UART: [cold-reset] --
2,415,895 UART: [state] Locking Datavault
2,417,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,880 UART: [state] Locking ICCM
2,418,452 UART: [exit] Launching FMC @ 0x40000130
2,423,781 UART:
2,423,797 UART: Running Caliptra FMC ...
2,424,205 UART:
2,424,259 UART: [state] CFI Enabled
2,435,152 UART: [fht] FMC Alias Private Key: 7
2,542,931 UART: [art] Extend RT PCRs Done
2,543,359 UART: [art] Lock RT PCRs Done
2,544,899 UART: [art] Populate DV Done
2,553,303 UART: [fht] FMC Alias Private Key: 7
2,554,321 UART: [art] Derive CDI
2,554,601 UART: [art] Store in in slot 0x4
2,640,450 UART: [art] Derive Key Pair
2,640,810 UART: [art] Store priv key in slot 0x5
2,654,156 UART: [art] Derive Key Pair - Done
2,668,691 UART: [art] Signing Cert with AUTHO
2,669,171 UART: RITY.KEYID = 7
2,684,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,322 UART: [art] PUB.X = 32189B762E1886F63621019E67498D6F4E01A42274A30E7BC4C92F159AB63D7CC26BD98B270BA1F6681ECE51CA1717D3
2,692,080 UART: [art] PUB.Y = BA0B949E8BCB7F70457EBDD2C47C512DDFE14B429B4CD846615A5C1455438F9250CE4ACCA6B0A084D3B7C1075DB74055
2,699,038 UART: [art] SIG.R = 9C688466FD1B53A7E932A96BCBABC1B7B810EDF2B9B0EF46325A37C50F05E6128E120232AEB8B56E49ED0057D2AAEE1F
2,705,795 UART: [art] SIG.S = CE057DF6867E6C810647AA61B375C942F5FD7F43E737F3D9782A2EC62136F07475E2388400D5E1B9F30B196BDB1564E3
2,729,385 UART: mbox::rt_entry...
2,729,757 UART: ____ _ _ _ ____ _____
2,730,541 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,645 UART: |_|
2,733,957 UART:
2,840,895 UART: [rt] Runtime listening for mailbox commands...
2,841,657 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,867 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,961 UART:
2,841,977 UART: Running Caliptra ROM ...
2,842,385 UART:
2,842,440 UART: [state] CFI Enabled
2,845,421 UART: [state] LifecycleState = Production
2,846,029 UART: [state] DebugLocked = Yes
2,846,751 UART: [state] Starting the WD Timer 40000000 cycles
2,848,350 UART: [kat] SHA2-256
3,651,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,029 UART: [kat] ++
3,656,181 UART: [kat] sha1
3,660,435 UART: [kat] SHA2-256
3,662,375 UART: [kat] SHA2-384
3,665,118 UART: [kat] SHA2-512-ACC
3,667,019 UART: [kat] ECC-384
3,676,894 UART: [kat] HMAC-384Kdf
3,681,514 UART: [kat] LMS
3,929,826 UART: [kat] --
3,930,526 UART: [warm-reset] ++
3,931,591 UART: [warm-reset] --
3,932,710 UART: [state] Locking Datavault
3,933,454 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,058 UART: [state] Locking ICCM
3,934,694 UART: [exit] Launching FMC @ 0x40000130
3,940,023 UART:
3,940,039 UART: Running Caliptra FMC ...
3,940,447 UART:
3,940,501 UART: [state] CFI Enabled
3,941,960 UART: [aliasrt :skip pcr extension
3,942,433 UART: [art] Extend RT PCRs Done
3,942,861 UART: [art] Lock RT PCRs Done
3,944,054 UART: [art] Populate DV Done
3,952,336 UART: [fht] FMC Alias Private Key: 7
3,953,294 UART: [art] Derive CDI
3,953,574 UART: [art] Store in in slot 0x4
4,039,045 UART: [art] Derive Key Pair
4,039,405 UART: [art] Store priv key in slot 0x5
4,052,355 UART: [art] Derive Key Pair - Done
4,067,040 UART: [art] Signing Cert with AUTHO
4,067,520 UART: RITY.KEYID = 7
4,082,718 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,483 UART: [art] PUB.X = 32189B762E1886F63621019E67498D6F4E01A42274A30E7BC4C92F159AB63D7CC26BD98B270BA1F6681ECE51CA1717D3
4,090,241 UART: [art] PUB.Y = BA0B949E8BCB7F70457EBDD2C47C512DDFE14B429B4CD846615A5C1455438F9250CE4ACCA6B0A084D3B7C1075DB74055
4,097,199 UART: [art] SIG.R = 9C688466FD1B53A7E932A96BCBABC1B7B810EDF2B9B0EF46325A37C50F05E6128E120232AEB8B56E49ED0057D2AAEE1F
4,103,956 UART: [art] SIG.S = CE057DF6867E6C810647AA61B375C942F5FD7F43E737F3D9782A2EC62136F07475E2388400D5E1B9F30B196BDB1564E3
4,127,516 UART: mbox::rt_entry...
4,127,888 UART: ____ _ _ _ ____ _____
4,128,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,776 UART: |_|
4,132,088 UART:
4,425,449 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,427,585 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Production
85,462 UART: [state] DebugLocked = Yes
85,986 UART: [state] Starting the WD Timer 40000000 cycles
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 ready_for_fw is high
1,174,335 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,873 UART: [ldev] ++
1,209,041 UART: [ldev] CDI.KEYID = 6
1,209,405 UART: [ldev] SUBJECT.KEYID = 5
1,209,832 UART: [ldev] AUTHORITY.KEYID = 7
1,210,295 UART: [ldev] FE.KEYID = 1
1,215,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,760 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,454 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,324 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,030 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,036 UART: [ldev] --
1,281,478 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 78632 bytes
2,195,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,484 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,793 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,000 >>> mbox cmd response: success
2,335,186 UART: [afmc] ++
2,335,354 UART: [afmc] CDI.KEYID = 6
2,335,717 UART: [afmc] SUBJECT.KEYID = 7
2,336,143 UART: [afmc] AUTHORITY.KEYID = 5
2,371,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,745 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,464 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,357 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,064 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,951 UART: [afmc] --
2,414,914 UART: [cold-reset] --
2,415,718 UART: [state] Locking Datavault
2,416,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,545 UART: [state] Locking ICCM
2,418,153 UART: [exit] Launching FMC @ 0x40000130
2,423,482 UART:
2,423,498 UART: Running Caliptra FMC ...
2,423,906 UART:
2,424,049 UART: [state] CFI Enabled
2,434,544 UART: [fht] FMC Alias Private Key: 7
2,542,611 UART: [art] Extend RT PCRs Done
2,543,039 UART: [art] Lock RT PCRs Done
2,544,617 UART: [art] Populate DV Done
2,552,981 UART: [fht] FMC Alias Private Key: 7
2,553,943 UART: [art] Derive CDI
2,554,223 UART: [art] Store in in slot 0x4
2,639,988 UART: [art] Derive Key Pair
2,640,348 UART: [art] Store priv key in slot 0x5
2,653,366 UART: [art] Derive Key Pair - Done
2,667,993 UART: [art] Signing Cert with AUTHO
2,668,473 UART: RITY.KEYID = 7
2,683,835 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,600 UART: [art] PUB.X = B5182F54E2A191F5BB92747D1E15BB28CD671A97784B6144B94F1A7F59ACDFADF23BD57F68B14132E5FC388D1CFDF39F
2,691,386 UART: [art] PUB.Y = 9EE2A403D7A897EF664980C3E4B3E58D22E2F03323605C16D1BF3D81F35CF238DB6C1745659E511E1E42A9E168C849F8
2,698,335 UART: [art] SIG.R = CE4131F084A2CF798947CFE16DA70BF466D4E4046572FA86505B413B29DA70C899B9829829B5E48C11544EF1A6CB3098
2,705,099 UART: [art] SIG.S = B451F5373383D7A717A0EDC0D4BF1347E86A9DFE1F101A9DEFA03EB6941D3543F297F9A248D41C921087A72D839E5663
2,728,958 UART: mbox::rt_entry...
2,729,330 UART: ____ _ _ _ ____ _____
2,730,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,218 UART: |_|
2,733,530 UART:
2,840,858 UART: [rt] Runtime listening for mailbox commands...
2,841,620 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,830 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,924 UART:
2,841,940 UART: Running Caliptra ROM ...
2,842,348 UART:
2,842,490 UART: [state] CFI Enabled
2,845,509 UART: [state] LifecycleState = Production
2,846,117 UART: [state] DebugLocked = Yes
2,846,833 UART: [state] Starting the WD Timer 40000000 cycles
2,848,304 UART: [kat] SHA2-256
3,651,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,983 UART: [kat] ++
3,656,135 UART: [kat] sha1
3,660,391 UART: [kat] SHA2-256
3,662,331 UART: [kat] SHA2-384
3,665,294 UART: [kat] SHA2-512-ACC
3,667,195 UART: [kat] ECC-384
3,677,446 UART: [kat] HMAC-384Kdf
3,682,072 UART: [kat] LMS
3,930,384 UART: [kat] --
3,931,222 UART: [warm-reset] ++
3,932,275 UART: [warm-reset] --
3,933,024 UART: [state] Locking Datavault
3,933,764 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,368 UART: [state] Locking ICCM
3,934,852 UART: [exit] Launching FMC @ 0x40000130
3,940,181 UART:
3,940,197 UART: Running Caliptra FMC ...
3,940,605 UART:
3,940,748 UART: [state] CFI Enabled
3,942,049 UART: [aliasrt :skip pcr extension
3,942,522 UART: [art] Extend RT PCRs Done
3,942,950 UART: [art] Lock RT PCRs Done
3,944,093 UART: [art] Populate DV Done
3,952,389 UART: [fht] FMC Alias Private Key: 7
3,953,565 UART: [art] Derive CDI
3,953,845 UART: [art] Store in in slot 0x4
4,039,776 UART: [art] Derive Key Pair
4,040,136 UART: [art] Store priv key in slot 0x5
4,053,230 UART: [art] Derive Key Pair - Done
4,067,767 UART: [art] Signing Cert with AUTHO
4,068,247 UART: RITY.KEYID = 7
4,083,285 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,050 UART: [art] PUB.X = B5182F54E2A191F5BB92747D1E15BB28CD671A97784B6144B94F1A7F59ACDFADF23BD57F68B14132E5FC388D1CFDF39F
4,090,836 UART: [art] PUB.Y = 9EE2A403D7A897EF664980C3E4B3E58D22E2F03323605C16D1BF3D81F35CF238DB6C1745659E511E1E42A9E168C849F8
4,097,785 UART: [art] SIG.R = CE4131F084A2CF798947CFE16DA70BF466D4E4046572FA86505B413B29DA70C899B9829829B5E48C11544EF1A6CB3098
4,104,549 UART: [art] SIG.S = B451F5373383D7A717A0EDC0D4BF1347E86A9DFE1F101A9DEFA03EB6941D3543F297F9A248D41C921087A72D839E5663
4,128,222 UART: mbox::rt_entry...
4,128,594 UART: ____ _ _ _ ____ _____
4,129,378 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,946 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,714 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,482 UART: |_|
4,132,794 UART:
4,424,389 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,426,615 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Production
86,050 UART: [state] DebugLocked = Yes
86,748 UART: [state] Starting the WD Timer 40000000 cycles
88,441 UART: [kat] SHA2-256
891,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,120 UART: [kat] ++
896,272 UART: [kat] sha1
900,590 UART: [kat] SHA2-256
902,530 UART: [kat] SHA2-384
905,187 UART: [kat] SHA2-512-ACC
907,088 UART: [kat] ECC-384
916,965 UART: [kat] HMAC-384Kdf
921,653 UART: [kat] LMS
1,169,965 UART: [kat] --
1,170,908 UART: [cold-reset] ++
1,171,453 UART: [fht] FHT @ 0x50003400
1,174,249 UART: [idev] ++
1,174,417 UART: [idev] CDI.KEYID = 6
1,174,778 UART: [idev] SUBJECT.KEYID = 7
1,175,203 UART: [idev] UDS.KEYID = 0
1,175,549 ready_for_fw is high
1,175,549 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,183,440 UART: [idev] Erasing UDS.KEYID = 0
1,201,227 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,093 UART: [ldev] ++
1,211,261 UART: [ldev] CDI.KEYID = 6
1,211,625 UART: [ldev] SUBJECT.KEYID = 5
1,212,052 UART: [ldev] AUTHORITY.KEYID = 7
1,212,515 UART: [ldev] FE.KEYID = 1
1,217,755 UART: [ldev] Erasing FE.KEYID = 1
1,244,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,558 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,252 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,122 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,828 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,928 UART: [ldev] --
1,283,434 UART: [fwproc] Wait for Commands...
1,284,071 UART: [fwproc] Recv command 0x46574c44
1,284,804 UART: [fwproc] Recv'd Img size: 78632 bytes
2,197,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,571 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,336,938 >>> mbox cmd response: success
2,338,118 UART: [afmc] ++
2,338,286 UART: [afmc] CDI.KEYID = 6
2,338,649 UART: [afmc] SUBJECT.KEYID = 7
2,339,075 UART: [afmc] AUTHORITY.KEYID = 5
2,374,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,019 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,738 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,631 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,338 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,319 UART: [afmc] --
2,418,264 UART: [cold-reset] --
2,419,034 UART: [state] Locking Datavault
2,420,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,813 UART: [state] Locking ICCM
2,421,471 UART: [exit] Launching FMC @ 0x40000130
2,426,800 UART:
2,426,816 UART: Running Caliptra FMC ...
2,427,224 UART:
2,427,367 UART: [state] CFI Enabled
2,438,156 UART: [fht] FMC Alias Private Key: 7
2,545,537 UART: [art] Extend RT PCRs Done
2,545,965 UART: [art] Lock RT PCRs Done
2,547,641 UART: [art] Populate DV Done
2,555,883 UART: [fht] FMC Alias Private Key: 7
2,556,999 UART: [art] Derive CDI
2,557,279 UART: [art] Store in in slot 0x4
2,642,868 UART: [art] Derive Key Pair
2,643,228 UART: [art] Store priv key in slot 0x5
2,656,938 UART: [art] Derive Key Pair - Done
2,672,011 UART: [art] Signing Cert with AUTHO
2,672,491 UART: RITY.KEYID = 7
2,687,825 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,590 UART: [art] PUB.X = C2B49798E963F8C5AF6DCD12629A1775A11459EB4886DCC6260F5D53E7443E6A13E85D0015DC282DDDD4D6BACEF12E34
2,695,347 UART: [art] PUB.Y = 8934B42CF93156A2ED014E164A58CD67667BF2D28EBD2415E5F2DCB49B27858E21FB641D50C76A60C850727B5008F422
2,702,291 UART: [art] SIG.R = CDFC5BA16829EB81E989C20DB0C8FD9BF3F83847999B93AF8880407BD4303D5B01CB926699786D48D7671DC142FDE548
2,709,061 UART: [art] SIG.S = 8C417FEE310A8C6966382766935BA5FF839D98C802E39E9AE8275D41A7628B13A0203B327B7E7E6FC2B1D9999E1D4F4C
2,733,290 UART: mbox::rt_entry...
2,733,662 UART: ____ _ _ _ ____ _____
2,734,446 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,735,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,736,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,550 UART: |_|
2,737,862 UART:
2,843,960 UART: [rt] Runtime listening for mailbox commands...
2,844,722 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,932 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,845,026 UART:
2,845,042 UART: Running Caliptra ROM ...
2,845,450 UART:
2,845,592 UART: [state] CFI Enabled
2,848,421 UART: [state] LifecycleState = Production
2,849,029 UART: [state] DebugLocked = Yes
2,849,711 UART: [state] Starting the WD Timer 40000000 cycles
2,851,268 UART: [kat] SHA2-256
3,654,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,947 UART: [kat] ++
3,659,099 UART: [kat] sha1
3,663,409 UART: [kat] SHA2-256
3,665,349 UART: [kat] SHA2-384
3,667,972 UART: [kat] SHA2-512-ACC
3,669,873 UART: [kat] ECC-384
3,679,632 UART: [kat] HMAC-384Kdf
3,684,140 UART: [kat] LMS
3,932,452 UART: [kat] --
3,933,114 UART: [warm-reset] ++
3,934,309 UART: [warm-reset] --
3,935,062 UART: [state] Locking Datavault
3,935,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,516 UART: [state] Locking ICCM
3,936,948 UART: [exit] Launching FMC @ 0x40000130
3,942,277 UART:
3,942,293 UART: Running Caliptra FMC ...
3,942,701 UART:
3,942,844 UART: [state] CFI Enabled
3,943,991 UART: [aliasrt :skip pcr extension
3,944,464 UART: [art] Extend RT PCRs Done
3,944,892 UART: [art] Lock RT PCRs Done
3,946,191 UART: [art] Populate DV Done
3,954,485 UART: [fht] FMC Alias Private Key: 7
3,955,645 UART: [art] Derive CDI
3,955,925 UART: [art] Store in in slot 0x4
4,041,494 UART: [art] Derive Key Pair
4,041,854 UART: [art] Store priv key in slot 0x5
4,054,882 UART: [art] Derive Key Pair - Done
4,069,507 UART: [art] Signing Cert with AUTHO
4,069,987 UART: RITY.KEYID = 7
4,085,689 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,454 UART: [art] PUB.X = C2B49798E963F8C5AF6DCD12629A1775A11459EB4886DCC6260F5D53E7443E6A13E85D0015DC282DDDD4D6BACEF12E34
4,093,211 UART: [art] PUB.Y = 8934B42CF93156A2ED014E164A58CD67667BF2D28EBD2415E5F2DCB49B27858E21FB641D50C76A60C850727B5008F422
4,100,155 UART: [art] SIG.R = CDFC5BA16829EB81E989C20DB0C8FD9BF3F83847999B93AF8880407BD4303D5B01CB926699786D48D7671DC142FDE548
4,106,925 UART: [art] SIG.S = 8C417FEE310A8C6966382766935BA5FF839D98C802E39E9AE8275D41A7628B13A0203B327B7E7E6FC2B1D9999E1D4F4C
4,130,852 UART: mbox::rt_entry...
4,131,224 UART: ____ _ _ _ ____ _____
4,132,008 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,808 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,576 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,344 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,135,112 UART: |_|
4,135,424 UART:
4,429,135 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,431,369 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Production
85,785 UART: [state] DebugLocked = Yes
86,489 UART: [state] Starting the WD Timer 40000000 cycles
88,148 UART: [kat] SHA2-256
891,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,827 UART: [kat] ++
895,979 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,174,344 ready_for_fw is high
1,174,344 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,654 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,480 UART: [ldev] ++
1,209,648 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,439 UART: [ldev] AUTHORITY.KEYID = 7
1,210,902 UART: [ldev] FE.KEYID = 1
1,216,120 UART: [ldev] Erasing FE.KEYID = 1
1,242,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,781 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,651 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,357 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,385 UART: [ldev] --
1,281,725 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,257 UART: [fwproc] Recv'd Img size: 78632 bytes
2,197,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,703 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,336,046 >>> mbox cmd response: success
2,337,166 UART: [afmc] ++
2,337,334 UART: [afmc] CDI.KEYID = 6
2,337,697 UART: [afmc] SUBJECT.KEYID = 7
2,338,123 UART: [afmc] AUTHORITY.KEYID = 5
2,373,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,275 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,994 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,887 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,594 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,293 UART: [afmc] --
2,416,238 UART: [cold-reset] --
2,417,144 UART: [state] Locking Datavault
2,418,093 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,697 UART: [state] Locking ICCM
2,419,277 UART: [exit] Launching FMC @ 0x40000130
2,424,606 UART:
2,424,622 UART: Running Caliptra FMC ...
2,425,030 UART:
2,425,084 UART: [state] CFI Enabled
2,435,799 UART: [fht] FMC Alias Private Key: 7
2,543,156 UART: [art] Extend RT PCRs Done
2,543,584 UART: [art] Lock RT PCRs Done
2,545,104 UART: [art] Populate DV Done
2,553,650 UART: [fht] FMC Alias Private Key: 7
2,554,732 UART: [art] Derive CDI
2,555,012 UART: [art] Store in in slot 0x4
2,640,475 UART: [art] Derive Key Pair
2,640,835 UART: [art] Store priv key in slot 0x5
2,654,115 UART: [art] Derive Key Pair - Done
2,669,106 UART: [art] Signing Cert with AUTHO
2,669,586 UART: RITY.KEYID = 7
2,684,264 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,029 UART: [art] PUB.X = 46F205C50838CC66593302EFEAD3A0E28483374CAC62C0A62C1EAB645280C153D89D1A5B091FC493A06B499609BD454A
2,691,786 UART: [art] PUB.Y = 38C3A5B5DD33F31142E50A275062F11D44F1FE4164CF4AB3C8CDCD22AD23DB3B3B691E6C420DEB1A38360A715EF2996A
2,698,741 UART: [art] SIG.R = 3BB6AF2380CCF0A13BE5C2C52E56D85B24EEAAF43653E576B08BAFD1BDBAC9EAAE0F40441C46A8C5525E7CC3F4540455
2,705,529 UART: [art] SIG.S = 4CD97CE314E65069198049B0BCDE01D675B97064EF2F3E416A4B26BBF6C3955C2DA9679BD2F13C9E539C2350A3ED4BAD
2,729,177 UART: mbox::rt_entry...
2,729,549 UART: ____ _ _ _ ____ _____
2,730,333 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,133 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,901 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,437 UART: |_|
2,733,749 UART:
2,840,670 UART: [rt] Runtime listening for mailbox commands...
2,841,432 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,642 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,736 UART:
2,841,752 UART: Running Caliptra ROM ...
2,842,160 UART:
2,842,215 UART: [state] CFI Enabled
2,844,752 UART: [state] LifecycleState = Production
2,845,360 UART: [state] DebugLocked = Yes
2,846,034 UART: [state] Starting the WD Timer 40000000 cycles
2,847,579 UART: [kat] SHA2-256
3,651,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,258 UART: [kat] ++
3,655,410 UART: [kat] sha1
3,659,652 UART: [kat] SHA2-256
3,661,592 UART: [kat] SHA2-384
3,664,431 UART: [kat] SHA2-512-ACC
3,666,332 UART: [kat] ECC-384
3,675,985 UART: [kat] HMAC-384Kdf
3,680,513 UART: [kat] LMS
3,928,825 UART: [kat] --
3,929,619 UART: [warm-reset] ++
3,930,400 UART: [warm-reset] --
3,931,399 UART: [state] Locking Datavault
3,932,207 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,811 UART: [state] Locking ICCM
3,933,387 UART: [exit] Launching FMC @ 0x40000130
3,938,716 UART:
3,938,732 UART: Running Caliptra FMC ...
3,939,140 UART:
3,939,194 UART: [state] CFI Enabled
3,940,509 UART: [aliasrt :skip pcr extension
3,940,982 UART: [art] Extend RT PCRs Done
3,941,410 UART: [art] Lock RT PCRs Done
3,942,421 UART: [art] Populate DV Done
3,950,447 UART: [fht] FMC Alias Private Key: 7
3,951,605 UART: [art] Derive CDI
3,951,885 UART: [art] Store in in slot 0x4
4,037,606 UART: [art] Derive Key Pair
4,037,966 UART: [art] Store priv key in slot 0x5
4,051,462 UART: [art] Derive Key Pair - Done
4,066,169 UART: [art] Signing Cert with AUTHO
4,066,649 UART: RITY.KEYID = 7
4,082,229 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,994 UART: [art] PUB.X = 46F205C50838CC66593302EFEAD3A0E28483374CAC62C0A62C1EAB645280C153D89D1A5B091FC493A06B499609BD454A
4,089,751 UART: [art] PUB.Y = 38C3A5B5DD33F31142E50A275062F11D44F1FE4164CF4AB3C8CDCD22AD23DB3B3B691E6C420DEB1A38360A715EF2996A
4,096,706 UART: [art] SIG.R = 3BB6AF2380CCF0A13BE5C2C52E56D85B24EEAAF43653E576B08BAFD1BDBAC9EAAE0F40441C46A8C5525E7CC3F4540455
4,103,494 UART: [art] SIG.S = 4CD97CE314E65069198049B0BCDE01D675B97064EF2F3E416A4B26BBF6C3955C2DA9679BD2F13C9E539C2350A3ED4BAD
4,127,610 UART: mbox::rt_entry...
4,127,982 UART: ____ _ _ _ ____ _____
4,128,766 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,566 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,334 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,102 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,870 UART: |_|
4,132,182 UART:
4,426,236 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,428,280 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Production
85,691 UART: [state] DebugLocked = Yes
86,213 UART: [state] Starting the WD Timer 40000000 cycles
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,754 UART: [kat] SHA2-512-ACC
906,655 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,289 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,174,732 ready_for_fw is high
1,174,732 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,735 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,891 UART: [idev] --
1,209,912 UART: [ldev] ++
1,210,080 UART: [ldev] CDI.KEYID = 6
1,210,444 UART: [ldev] SUBJECT.KEYID = 5
1,210,871 UART: [ldev] AUTHORITY.KEYID = 7
1,211,334 UART: [ldev] FE.KEYID = 1
1,216,306 UART: [ldev] Erasing FE.KEYID = 1
1,242,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,201 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,071 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,777 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,995 UART: [ldev] --
1,282,491 UART: [fwproc] Wait for Commands...
1,283,240 UART: [fwproc] Recv command 0x46574c44
1,283,973 UART: [fwproc] Recv'd Img size: 78632 bytes
2,197,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,946 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,337,285 >>> mbox cmd response: success
2,338,445 UART: [afmc] ++
2,338,613 UART: [afmc] CDI.KEYID = 6
2,338,976 UART: [afmc] SUBJECT.KEYID = 7
2,339,402 UART: [afmc] AUTHORITY.KEYID = 5
2,375,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,391,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,392,270 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,989 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,882 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,409,589 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,417,228 UART: [afmc] --
2,418,237 UART: [cold-reset] --
2,419,033 UART: [state] Locking Datavault
2,420,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,420,842 UART: [state] Locking ICCM
2,421,516 UART: [exit] Launching FMC @ 0x40000130
2,426,845 UART:
2,426,861 UART: Running Caliptra FMC ...
2,427,269 UART:
2,427,323 UART: [state] CFI Enabled
2,437,942 UART: [fht] FMC Alias Private Key: 7
2,546,153 UART: [art] Extend RT PCRs Done
2,546,581 UART: [art] Lock RT PCRs Done
2,548,525 UART: [art] Populate DV Done
2,556,535 UART: [fht] FMC Alias Private Key: 7
2,557,543 UART: [art] Derive CDI
2,557,823 UART: [art] Store in in slot 0x4
2,643,192 UART: [art] Derive Key Pair
2,643,552 UART: [art] Store priv key in slot 0x5
2,656,798 UART: [art] Derive Key Pair - Done
2,671,411 UART: [art] Signing Cert with AUTHO
2,671,891 UART: RITY.KEYID = 7
2,687,563 UART: [art] Erasing AUTHORITY.KEYID = 7
2,688,328 UART: [art] PUB.X = F3B20DE9861957E252E998F979C3AA63ECF8226830A8A976B20757596CC10B09D963E75A10AEBF6D28EA2ECDBB82FA99
2,695,096 UART: [art] PUB.Y = 43A898A026CB29EE8530C532569546C62B94577666E11689350B5074D84AB0E281E6EEE7404200E2BC455BC72ECE83C2
2,702,015 UART: [art] SIG.R = 2C882C3FAAB6791EE5C20B52B10FD409252647085B99524C15A276C21606F0515CC49E0BC07B70ACCC80A8C421531539
2,708,765 UART: [art] SIG.S = EB3BDE5EDDF686C4C8FD5EA62FFDB9362818AE820CBECC34E5FA697564F500B7214BB5AD3238230D59D946F59A916AA1
2,732,854 UART: mbox::rt_entry...
2,733,226 UART: ____ _ _ _ ____ _____
2,734,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,578 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,736,346 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,737,114 UART: |_|
2,737,426 UART:
2,843,886 UART: [rt] Runtime listening for mailbox commands...
2,844,648 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,858 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,952 UART:
2,844,968 UART: Running Caliptra ROM ...
2,845,376 UART:
2,845,431 UART: [state] CFI Enabled
2,848,052 UART: [state] LifecycleState = Production
2,848,660 UART: [state] DebugLocked = Yes
2,849,304 UART: [state] Starting the WD Timer 40000000 cycles
2,850,919 UART: [kat] SHA2-256
3,654,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,598 UART: [kat] ++
3,658,750 UART: [kat] sha1
3,662,896 UART: [kat] SHA2-256
3,664,836 UART: [kat] SHA2-384
3,667,585 UART: [kat] SHA2-512-ACC
3,669,486 UART: [kat] ECC-384
3,678,963 UART: [kat] HMAC-384Kdf
3,683,565 UART: [kat] LMS
3,931,877 UART: [kat] --
3,932,741 UART: [warm-reset] ++
3,933,588 UART: [warm-reset] --
3,934,429 UART: [state] Locking Datavault
3,935,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,707 UART: [state] Locking ICCM
3,936,363 UART: [exit] Launching FMC @ 0x40000130
3,941,692 UART:
3,941,708 UART: Running Caliptra FMC ...
3,942,116 UART:
3,942,170 UART: [state] CFI Enabled
3,943,331 UART: [aliasrt :skip pcr extension
3,943,804 UART: [art] Extend RT PCRs Done
3,944,232 UART: [art] Lock RT PCRs Done
3,945,503 UART: [art] Populate DV Done
3,953,855 UART: [fht] FMC Alias Private Key: 7
3,954,885 UART: [art] Derive CDI
3,955,165 UART: [art] Store in in slot 0x4
4,040,962 UART: [art] Derive Key Pair
4,041,322 UART: [art] Store priv key in slot 0x5
4,054,514 UART: [art] Derive Key Pair - Done
4,069,085 UART: [art] Signing Cert with AUTHO
4,069,565 UART: RITY.KEYID = 7
4,085,063 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,828 UART: [art] PUB.X = F3B20DE9861957E252E998F979C3AA63ECF8226830A8A976B20757596CC10B09D963E75A10AEBF6D28EA2ECDBB82FA99
4,092,596 UART: [art] PUB.Y = 43A898A026CB29EE8530C532569546C62B94577666E11689350B5074D84AB0E281E6EEE7404200E2BC455BC72ECE83C2
4,099,515 UART: [art] SIG.R = 2C882C3FAAB6791EE5C20B52B10FD409252647085B99524C15A276C21606F0515CC49E0BC07B70ACCC80A8C421531539
4,106,265 UART: [art] SIG.S = EB3BDE5EDDF686C4C8FD5EA62FFDB9362818AE820CBECC34E5FA697564F500B7214BB5AD3238230D59D946F59A916AA1
4,130,064 UART: mbox::rt_entry...
4,130,436 UART: ____ _ _ _ ____ _____
4,131,220 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,020 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,788 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,556 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,324 UART: |_|
4,134,636 UART:
4,425,647 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,427,733 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Production
85,932 UART: [state] DebugLocked = Yes
86,508 UART: [state] Starting the WD Timer 40000000 cycles
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
920,803 UART: [kat] LMS
1,169,115 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,174,295 ready_for_fw is high
1,174,295 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,002 UART: [idev] --
1,208,899 UART: [ldev] ++
1,209,067 UART: [ldev] CDI.KEYID = 6
1,209,431 UART: [ldev] SUBJECT.KEYID = 5
1,209,858 UART: [ldev] AUTHORITY.KEYID = 7
1,210,321 UART: [ldev] FE.KEYID = 1
1,215,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,680 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,550 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,256 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,258 UART: [ldev] --
1,281,716 UART: [fwproc] Wait for Commands...
1,282,425 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,699 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,335,860 >>> mbox cmd response: success
2,336,976 UART: [afmc] ++
2,337,144 UART: [afmc] CDI.KEYID = 6
2,337,507 UART: [afmc] SUBJECT.KEYID = 7
2,337,933 UART: [afmc] AUTHORITY.KEYID = 5
2,373,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,857 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,576 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,469 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,176 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,127 UART: [afmc] --
2,417,182 UART: [cold-reset] --
2,418,216 UART: [state] Locking Datavault
2,419,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,869 UART: [state] Locking ICCM
2,420,417 UART: [exit] Launching FMC @ 0x40000130
2,425,746 UART:
2,425,762 UART: Running Caliptra FMC ...
2,426,170 UART:
2,426,313 UART: [state] CFI Enabled
2,436,808 UART: [fht] FMC Alias Private Key: 7
2,544,703 UART: [art] Extend RT PCRs Done
2,545,131 UART: [art] Lock RT PCRs Done
2,546,705 UART: [art] Populate DV Done
2,554,933 UART: [fht] FMC Alias Private Key: 7
2,555,879 UART: [art] Derive CDI
2,556,159 UART: [art] Store in in slot 0x4
2,641,546 UART: [art] Derive Key Pair
2,641,906 UART: [art] Store priv key in slot 0x5
2,655,038 UART: [art] Derive Key Pair - Done
2,670,000 UART: [art] Signing Cert with AUTHO
2,670,480 UART: RITY.KEYID = 7
2,685,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,579 UART: [art] PUB.X = FC6394ED3E76D1B2B96117E9A3556A44C64634F4A3A0856532130D58C7F3FAAC55BA16DA94FF20A2B087909D61D796E0
2,693,350 UART: [art] PUB.Y = 2D47F87EE918E7BC3926F36A849E0B4D84383092CADAAB140948099F419333822106F66658503E6CCB1BBD6F2749B6BA
2,700,288 UART: [art] SIG.R = 1FD6E8A5D6EAB3D89E0DEFB1A7283E774E54761C94C941B0DA1ACFA8CEDA9C4F16D81272E97481663C89A69699D7FBBC
2,707,075 UART: [art] SIG.S = C46B78E88CDE637A9553BF4A4CA998C60060ACDB92BA60948C85DACD2B30F1CBC1EFC916D7ABA490A8AC6A0E696791EA
2,731,355 UART: mbox::rt_entry...
2,731,727 UART: ____ _ _ _ ____ _____
2,732,511 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,079 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,847 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,615 UART: |_|
2,735,927 UART:
2,842,381 UART: [rt] Runtime listening for mailbox commands...
2,843,143 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,353 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,447 UART:
2,843,463 UART: Running Caliptra ROM ...
2,843,871 UART:
2,844,013 UART: [state] CFI Enabled
2,846,614 UART: [state] LifecycleState = Production
2,847,222 UART: [state] DebugLocked = Yes
2,847,762 UART: [state] Starting the WD Timer 40000000 cycles
2,849,299 UART: [kat] SHA2-256
3,652,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,978 UART: [kat] ++
3,657,130 UART: [kat] sha1
3,661,452 UART: [kat] SHA2-256
3,663,392 UART: [kat] SHA2-384
3,666,199 UART: [kat] SHA2-512-ACC
3,668,100 UART: [kat] ECC-384
3,677,823 UART: [kat] HMAC-384Kdf
3,682,645 UART: [kat] LMS
3,930,957 UART: [kat] --
3,931,691 UART: [warm-reset] ++
3,932,318 UART: [warm-reset] --
3,933,295 UART: [state] Locking Datavault
3,933,957 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,561 UART: [state] Locking ICCM
3,935,137 UART: [exit] Launching FMC @ 0x40000130
3,940,466 UART:
3,940,482 UART: Running Caliptra FMC ...
3,940,890 UART:
3,941,033 UART: [state] CFI Enabled
3,942,438 UART: [aliasrt :skip pcr extension
3,942,911 UART: [art] Extend RT PCRs Done
3,943,339 UART: [art] Lock RT PCRs Done
3,944,862 UART: [art] Populate DV Done
3,953,124 UART: [fht] FMC Alias Private Key: 7
3,954,176 UART: [art] Derive CDI
3,954,456 UART: [art] Store in in slot 0x4
4,040,225 UART: [art] Derive Key Pair
4,040,585 UART: [art] Store priv key in slot 0x5
4,053,649 UART: [art] Derive Key Pair - Done
4,068,377 UART: [art] Signing Cert with AUTHO
4,068,857 UART: RITY.KEYID = 7
4,084,167 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,932 UART: [art] PUB.X = FC6394ED3E76D1B2B96117E9A3556A44C64634F4A3A0856532130D58C7F3FAAC55BA16DA94FF20A2B087909D61D796E0
4,091,703 UART: [art] PUB.Y = 2D47F87EE918E7BC3926F36A849E0B4D84383092CADAAB140948099F419333822106F66658503E6CCB1BBD6F2749B6BA
4,098,641 UART: [art] SIG.R = 1FD6E8A5D6EAB3D89E0DEFB1A7283E774E54761C94C941B0DA1ACFA8CEDA9C4F16D81272E97481663C89A69699D7FBBC
4,105,428 UART: [art] SIG.S = C46B78E88CDE637A9553BF4A4CA998C60060ACDB92BA60948C85DACD2B30F1CBC1EFC916D7ABA490A8AC6A0E696791EA
4,129,002 UART: mbox::rt_entry...
4,129,374 UART: ____ _ _ _ ____ _____
4,130,158 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,958 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,726 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,494 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,262 UART: |_|
4,133,574 UART:
4,428,923 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,431,175 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Production
85,994 UART: [state] DebugLocked = Yes
86,548 UART: [state] Starting the WD Timer 40000000 cycles
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,441 UART: [kat] LMS
1,169,753 UART: [kat] --
1,170,770 UART: [cold-reset] ++
1,171,297 UART: [fht] FHT @ 0x50003400
1,173,967 UART: [idev] ++
1,174,135 UART: [idev] CDI.KEYID = 6
1,174,496 UART: [idev] SUBJECT.KEYID = 7
1,174,921 UART: [idev] UDS.KEYID = 0
1,175,267 ready_for_fw is high
1,175,267 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,183,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,907 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,209,777 UART: [ldev] ++
1,209,945 UART: [ldev] CDI.KEYID = 6
1,210,309 UART: [ldev] SUBJECT.KEYID = 5
1,210,736 UART: [ldev] AUTHORITY.KEYID = 7
1,211,199 UART: [ldev] FE.KEYID = 1
1,216,457 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,966 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,660 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,530 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,236 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,306 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,027 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,335,208 >>> mbox cmd response: success
2,336,460 UART: [afmc] ++
2,336,628 UART: [afmc] CDI.KEYID = 6
2,336,991 UART: [afmc] SUBJECT.KEYID = 7
2,337,417 UART: [afmc] AUTHORITY.KEYID = 5
2,372,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,981 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,700 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,593 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,300 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,135 UART: [afmc] --
2,416,110 UART: [cold-reset] --
2,416,882 UART: [state] Locking Datavault
2,417,933 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,537 UART: [state] Locking ICCM
2,419,157 UART: [exit] Launching FMC @ 0x40000130
2,424,486 UART:
2,424,502 UART: Running Caliptra FMC ...
2,424,910 UART:
2,425,053 UART: [state] CFI Enabled
2,435,594 UART: [fht] FMC Alias Private Key: 7
2,543,039 UART: [art] Extend RT PCRs Done
2,543,467 UART: [art] Lock RT PCRs Done
2,544,995 UART: [art] Populate DV Done
2,553,335 UART: [fht] FMC Alias Private Key: 7
2,554,427 UART: [art] Derive CDI
2,554,707 UART: [art] Store in in slot 0x4
2,640,308 UART: [art] Derive Key Pair
2,640,668 UART: [art] Store priv key in slot 0x5
2,654,522 UART: [art] Derive Key Pair - Done
2,669,157 UART: [art] Signing Cert with AUTHO
2,669,637 UART: RITY.KEYID = 7
2,685,045 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,810 UART: [art] PUB.X = D7BBB5BFB737D724D048A055E1D40C7C6245C51459104260F385A761725882FED3F35925AC64565B5F6C850968A03242
2,692,566 UART: [art] PUB.Y = CD23A3EF0A11AF7E1198831E442A164E76F42A400B4533024A7630FA44A642F9A7C44F0978F8DC1EED02DEA1C1D3318E
2,699,509 UART: [art] SIG.R = 2AD9B1DB79DA2ADB4D6BBD95972B54970C45421079532006A376818ABFE9228C76110F95A9A7C823C1919EB7F4811AEA
2,706,274 UART: [art] SIG.S = 40C6A7F2123F45C83F34F285F42823495C30DF0800F882DF1160DD385CEE5B1D6766E15CD72BD98CCF0A2394C7326A1D
2,729,403 UART: mbox::rt_entry...
2,729,775 UART: ____ _ _ _ ____ _____
2,730,559 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,359 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,127 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,895 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,663 UART: |_|
2,733,975 UART:
2,839,558 UART: [rt] Runtime listening for mailbox commands...
2,840,320 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,530 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,624 UART:
2,840,640 UART: Running Caliptra ROM ...
2,841,048 UART:
2,841,190 UART: [state] CFI Enabled
2,844,437 UART: [state] LifecycleState = Production
2,845,045 UART: [state] DebugLocked = Yes
2,845,705 UART: [state] Starting the WD Timer 40000000 cycles
2,847,240 UART: [kat] SHA2-256
3,650,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,919 UART: [kat] ++
3,655,071 UART: [kat] sha1
3,659,493 UART: [kat] SHA2-256
3,661,433 UART: [kat] SHA2-384
3,664,138 UART: [kat] SHA2-512-ACC
3,666,039 UART: [kat] ECC-384
3,675,860 UART: [kat] HMAC-384Kdf
3,680,316 UART: [kat] LMS
3,928,628 UART: [kat] --
3,929,190 UART: [warm-reset] ++
3,930,101 UART: [warm-reset] --
3,931,132 UART: [state] Locking Datavault
3,931,732 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,336 UART: [state] Locking ICCM
3,932,986 UART: [exit] Launching FMC @ 0x40000130
3,938,315 UART:
3,938,331 UART: Running Caliptra FMC ...
3,938,739 UART:
3,938,882 UART: [state] CFI Enabled
3,940,413 UART: [aliasrt :skip pcr extension
3,940,886 UART: [art] Extend RT PCRs Done
3,941,314 UART: [art] Lock RT PCRs Done
3,942,463 UART: [art] Populate DV Done
3,950,853 UART: [fht] FMC Alias Private Key: 7
3,951,803 UART: [art] Derive CDI
3,952,083 UART: [art] Store in in slot 0x4
4,038,184 UART: [art] Derive Key Pair
4,038,544 UART: [art] Store priv key in slot 0x5
4,051,404 UART: [art] Derive Key Pair - Done
4,066,491 UART: [art] Signing Cert with AUTHO
4,066,971 UART: RITY.KEYID = 7
4,082,049 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,814 UART: [art] PUB.X = D7BBB5BFB737D724D048A055E1D40C7C6245C51459104260F385A761725882FED3F35925AC64565B5F6C850968A03242
4,089,570 UART: [art] PUB.Y = CD23A3EF0A11AF7E1198831E442A164E76F42A400B4533024A7630FA44A642F9A7C44F0978F8DC1EED02DEA1C1D3318E
4,096,513 UART: [art] SIG.R = 2AD9B1DB79DA2ADB4D6BBD95972B54970C45421079532006A376818ABFE9228C76110F95A9A7C823C1919EB7F4811AEA
4,103,278 UART: [art] SIG.S = 40C6A7F2123F45C83F34F285F42823495C30DF0800F882DF1160DD385CEE5B1D6766E15CD72BD98CCF0A2394C7326A1D
4,127,251 UART: mbox::rt_entry...
4,127,623 UART: ____ _ _ _ ____ _____
4,128,407 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,975 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,743 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,511 UART: |_|
4,131,823 UART:
4,427,597 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,429,773 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,797 UART: [state] LifecycleState = Production
85,405 UART: [state] DebugLocked = Yes
86,115 UART: [state] Starting the WD Timer 40000000 cycles
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 ready_for_fw is high
1,174,072 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,128 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,188 UART: [ldev] ++
1,208,356 UART: [ldev] CDI.KEYID = 6
1,208,720 UART: [ldev] SUBJECT.KEYID = 5
1,209,147 UART: [ldev] AUTHORITY.KEYID = 7
1,209,610 UART: [ldev] FE.KEYID = 1
1,214,804 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,887 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,757 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,463 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,607 UART: [ldev] --
1,281,091 UART: [fwproc] Wait for Commands...
1,281,792 UART: [fwproc] Recv command 0x46574c44
1,282,525 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,518 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,335,729 >>> mbox cmd response: success
2,336,861 UART: [afmc] ++
2,337,029 UART: [afmc] CDI.KEYID = 6
2,337,392 UART: [afmc] SUBJECT.KEYID = 7
2,337,818 UART: [afmc] AUTHORITY.KEYID = 5
2,373,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,746 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,465 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,358 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,065 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,784 UART: [afmc] --
2,416,745 UART: [cold-reset] --
2,417,465 UART: [state] Locking Datavault
2,418,522 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,126 UART: [state] Locking ICCM
2,419,718 UART: [exit] Launching FMC @ 0x40000130
2,425,047 UART:
2,425,063 UART: Running Caliptra FMC ...
2,425,471 UART:
2,425,525 UART: [state] CFI Enabled
2,436,128 UART: [fht] FMC Alias Private Key: 7
2,543,987 UART: [art] Extend RT PCRs Done
2,544,415 UART: [art] Lock RT PCRs Done
2,546,007 UART: [art] Populate DV Done
2,554,345 UART: [fht] FMC Alias Private Key: 7
2,555,273 UART: [art] Derive CDI
2,555,553 UART: [art] Store in in slot 0x4
2,640,942 UART: [art] Derive Key Pair
2,641,302 UART: [art] Store priv key in slot 0x5
2,654,330 UART: [art] Derive Key Pair - Done
2,669,078 UART: [art] Signing Cert with AUTHO
2,669,558 UART: RITY.KEYID = 7
2,685,100 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,865 UART: [art] PUB.X = 8BC1C96DBC50E92BFE5EAAB4241C815BBFB1446140EEED3E533B4A5211DBF618422EB45E8C84FAE0B27DC13645A5BACD
2,692,661 UART: [art] PUB.Y = 51474101B083485950C5CCFDF60A3F138363BC9E285D14E232E9A6ABC87409DA6082CA47D5C0DBBE099D76ADFD794AE6
2,699,609 UART: [art] SIG.R = 8121F9B035BC175F238CB109F5779A987DB9AEE46EF2D4C9A0261FB135708A2CC57717BB3495DE20547499C076F6B868
2,706,376 UART: [art] SIG.S = 035BB3FEE36F2B253EA824D50C1AB70D95DA2A2EBFC8B6EA5E75E926C90EA1F204BF856543B75A6058B34FC78C4822CC
2,729,958 UART: mbox::rt_entry...
2,730,330 UART: ____ _ _ _ ____ _____
2,731,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,218 UART: |_|
2,734,530 UART:
2,841,248 UART: [rt] Runtime listening for mailbox commands...
2,842,010 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,220 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,314 UART:
2,842,330 UART: Running Caliptra ROM ...
2,842,738 UART:
2,842,793 UART: [state] CFI Enabled
2,845,080 UART: [state] LifecycleState = Production
2,845,688 UART: [state] DebugLocked = Yes
2,846,202 UART: [state] Starting the WD Timer 40000000 cycles
2,847,721 UART: [kat] SHA2-256
3,651,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,400 UART: [kat] ++
3,655,552 UART: [kat] sha1
3,659,802 UART: [kat] SHA2-256
3,661,742 UART: [kat] SHA2-384
3,664,349 UART: [kat] SHA2-512-ACC
3,666,250 UART: [kat] ECC-384
3,676,123 UART: [kat] HMAC-384Kdf
3,680,683 UART: [kat] LMS
3,928,995 UART: [kat] --
3,929,933 UART: [warm-reset] ++
3,930,558 UART: [warm-reset] --
3,931,377 UART: [state] Locking Datavault
3,932,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,847 UART: [state] Locking ICCM
3,933,511 UART: [exit] Launching FMC @ 0x40000130
3,938,840 UART:
3,938,856 UART: Running Caliptra FMC ...
3,939,264 UART:
3,939,318 UART: [state] CFI Enabled
3,940,457 UART: [aliasrt :skip pcr extension
3,940,930 UART: [art] Extend RT PCRs Done
3,941,358 UART: [art] Lock RT PCRs Done
3,942,721 UART: [art] Populate DV Done
3,950,881 UART: [fht] FMC Alias Private Key: 7
3,952,017 UART: [art] Derive CDI
3,952,297 UART: [art] Store in in slot 0x4
4,037,622 UART: [art] Derive Key Pair
4,037,982 UART: [art] Store priv key in slot 0x5
4,051,368 UART: [art] Derive Key Pair - Done
4,065,968 UART: [art] Signing Cert with AUTHO
4,066,448 UART: RITY.KEYID = 7
4,081,380 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,145 UART: [art] PUB.X = 8BC1C96DBC50E92BFE5EAAB4241C815BBFB1446140EEED3E533B4A5211DBF618422EB45E8C84FAE0B27DC13645A5BACD
4,088,941 UART: [art] PUB.Y = 51474101B083485950C5CCFDF60A3F138363BC9E285D14E232E9A6ABC87409DA6082CA47D5C0DBBE099D76ADFD794AE6
4,095,889 UART: [art] SIG.R = 8121F9B035BC175F238CB109F5779A987DB9AEE46EF2D4C9A0261FB135708A2CC57717BB3495DE20547499C076F6B868
4,102,656 UART: [art] SIG.S = 035BB3FEE36F2B253EA824D50C1AB70D95DA2A2EBFC8B6EA5E75E926C90EA1F204BF856543B75A6058B34FC78C4822CC
4,126,174 UART: mbox::rt_entry...
4,126,546 UART: ____ _ _ _ ____ _____
4,127,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,898 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,666 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,434 UART: |_|
4,130,746 UART:
4,425,789 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,427,939 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Production
85,979 UART: [state] DebugLocked = Yes
86,589 UART: [state] Starting the WD Timer 40000000 cycles
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
900,221 UART: [kat] SHA2-256
902,161 UART: [kat] SHA2-384
905,018 UART: [kat] SHA2-512-ACC
906,919 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,080 UART: [kat] LMS
1,169,392 UART: [kat] --
1,170,539 UART: [cold-reset] ++
1,170,956 UART: [fht] FHT @ 0x50003400
1,173,664 UART: [idev] ++
1,173,832 UART: [idev] CDI.KEYID = 6
1,174,193 UART: [idev] SUBJECT.KEYID = 7
1,174,618 UART: [idev] UDS.KEYID = 0
1,174,964 ready_for_fw is high
1,174,964 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,587 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,150 UART: [ldev] ++
1,209,318 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,109 UART: [ldev] AUTHORITY.KEYID = 7
1,210,572 UART: [ldev] FE.KEYID = 1
1,215,692 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,921 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,791 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,497 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,591 UART: [ldev] --
1,281,075 UART: [fwproc] Wait for Commands...
1,281,898 UART: [fwproc] Recv command 0x46574c44
1,282,631 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,352 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,681 >>> mbox cmd response: success
2,335,791 UART: [afmc] ++
2,335,959 UART: [afmc] CDI.KEYID = 6
2,336,322 UART: [afmc] SUBJECT.KEYID = 7
2,336,748 UART: [afmc] AUTHORITY.KEYID = 5
2,371,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,824 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,543 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,436 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,143 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,112 UART: [afmc] --
2,415,061 UART: [cold-reset] --
2,415,951 UART: [state] Locking Datavault
2,417,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,814 UART: [state] Locking ICCM
2,418,250 UART: [exit] Launching FMC @ 0x40000130
2,423,579 UART:
2,423,595 UART: Running Caliptra FMC ...
2,424,003 UART:
2,424,057 UART: [state] CFI Enabled
2,434,628 UART: [fht] FMC Alias Private Key: 7
2,542,457 UART: [art] Extend RT PCRs Done
2,542,885 UART: [art] Lock RT PCRs Done
2,544,535 UART: [art] Populate DV Done
2,552,867 UART: [fht] FMC Alias Private Key: 7
2,554,023 UART: [art] Derive CDI
2,554,303 UART: [art] Store in in slot 0x4
2,640,232 UART: [art] Derive Key Pair
2,640,592 UART: [art] Store priv key in slot 0x5
2,653,410 UART: [art] Derive Key Pair - Done
2,667,896 UART: [art] Signing Cert with AUTHO
2,668,376 UART: RITY.KEYID = 7
2,683,092 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,857 UART: [art] PUB.X = D4F19EBED4849721683C5BC9CB2E85B08C01E52D4DDD0EAD5446A3891532B16BCE151C03C9933B3DAF9C9467354CD116
2,690,628 UART: [art] PUB.Y = F562370ABC2637DCA2D07A5312A41A0B786AD1D71FB399BA02D718C3E84FC7EFE96FD1FCC354FC508075267F44F1842B
2,697,581 UART: [art] SIG.R = 051EFDD86CA42D3A58D3AE17091E28453ADA1C8CC1ECF7D4A91AE99B843385C86D5CA8C87BB1510DD8625CEDE815D6D0
2,704,362 UART: [art] SIG.S = 063001DCE228D45670F3EDEEAA11B1772FEA97E211E1FA0C5C9F4C0AC3E27516DE2620796C02BD31A2BE5190B24F0484
2,728,013 UART: mbox::rt_entry...
2,728,385 UART: ____ _ _ _ ____ _____
2,729,169 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,969 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,737 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,505 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,273 UART: |_|
2,732,585 UART:
2,839,848 UART: [rt] Runtime listening for mailbox commands...
2,840,610 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,820 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,914 UART:
2,840,930 UART: Running Caliptra ROM ...
2,841,338 UART:
2,841,393 UART: [state] CFI Enabled
2,843,974 UART: [state] LifecycleState = Production
2,844,582 UART: [state] DebugLocked = Yes
2,845,276 UART: [state] Starting the WD Timer 40000000 cycles
2,846,973 UART: [kat] SHA2-256
3,650,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,652 UART: [kat] ++
3,654,804 UART: [kat] sha1
3,659,046 UART: [kat] SHA2-256
3,660,986 UART: [kat] SHA2-384
3,663,729 UART: [kat] SHA2-512-ACC
3,665,630 UART: [kat] ECC-384
3,675,179 UART: [kat] HMAC-384Kdf
3,679,595 UART: [kat] LMS
3,927,907 UART: [kat] --
3,928,609 UART: [warm-reset] ++
3,929,460 UART: [warm-reset] --
3,930,221 UART: [state] Locking Datavault
3,930,963 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,567 UART: [state] Locking ICCM
3,932,199 UART: [exit] Launching FMC @ 0x40000130
3,937,528 UART:
3,937,544 UART: Running Caliptra FMC ...
3,937,952 UART:
3,938,006 UART: [state] CFI Enabled
3,939,293 UART: [aliasrt :skip pcr extension
3,939,766 UART: [art] Extend RT PCRs Done
3,940,194 UART: [art] Lock RT PCRs Done
3,941,517 UART: [art] Populate DV Done
3,949,911 UART: [fht] FMC Alias Private Key: 7
3,950,997 UART: [art] Derive CDI
3,951,277 UART: [art] Store in in slot 0x4
4,036,518 UART: [art] Derive Key Pair
4,036,878 UART: [art] Store priv key in slot 0x5
4,049,988 UART: [art] Derive Key Pair - Done
4,064,808 UART: [art] Signing Cert with AUTHO
4,065,288 UART: RITY.KEYID = 7
4,080,212 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,977 UART: [art] PUB.X = D4F19EBED4849721683C5BC9CB2E85B08C01E52D4DDD0EAD5446A3891532B16BCE151C03C9933B3DAF9C9467354CD116
4,087,748 UART: [art] PUB.Y = F562370ABC2637DCA2D07A5312A41A0B786AD1D71FB399BA02D718C3E84FC7EFE96FD1FCC354FC508075267F44F1842B
4,094,701 UART: [art] SIG.R = 051EFDD86CA42D3A58D3AE17091E28453ADA1C8CC1ECF7D4A91AE99B843385C86D5CA8C87BB1510DD8625CEDE815D6D0
4,101,482 UART: [art] SIG.S = 063001DCE228D45670F3EDEEAA11B1772FEA97E211E1FA0C5C9F4C0AC3E27516DE2620796C02BD31A2BE5190B24F0484
4,125,001 UART: mbox::rt_entry...
4,125,373 UART: ____ _ _ _ ____ _____
4,126,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,261 UART: |_|
4,129,573 UART:
4,421,139 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,423,289 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Production
85,540 UART: [state] DebugLocked = Yes
86,110 UART: [state] Starting the WD Timer 40000000 cycles
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,737 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 ready_for_fw is high
1,174,785 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,617 UART: [idev] Sha1 KeyId Algorithm
1,208,540 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,213 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,730 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,424 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,294 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,000 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,036 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,271 UART: [fwproc] Recv command 0x46574c44
1,283,004 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,201 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,334,544 >>> mbox cmd response: success
2,335,802 UART: [afmc] ++
2,335,970 UART: [afmc] CDI.KEYID = 6
2,336,333 UART: [afmc] SUBJECT.KEYID = 7
2,336,759 UART: [afmc] AUTHORITY.KEYID = 5
2,372,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,353 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,072 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,965 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,672 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,451 UART: [afmc] --
2,415,352 UART: [cold-reset] --
2,415,972 UART: [state] Locking Datavault
2,417,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,761 UART: [state] Locking ICCM
2,418,379 UART: [exit] Launching FMC @ 0x40000130
2,423,708 UART:
2,423,724 UART: Running Caliptra FMC ...
2,424,132 UART:
2,424,275 UART: [state] CFI Enabled
2,435,016 UART: [fht] FMC Alias Private Key: 7
2,542,901 UART: [art] Extend RT PCRs Done
2,543,329 UART: [art] Lock RT PCRs Done
2,544,999 UART: [art] Populate DV Done
2,553,289 UART: [fht] FMC Alias Private Key: 7
2,554,447 UART: [art] Derive CDI
2,554,727 UART: [art] Store in in slot 0x4
2,640,456 UART: [art] Derive Key Pair
2,640,816 UART: [art] Store priv key in slot 0x5
2,654,248 UART: [art] Derive Key Pair - Done
2,669,000 UART: [art] Signing Cert with AUTHO
2,669,480 UART: RITY.KEYID = 7
2,684,956 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,721 UART: [art] PUB.X = B394000C0C6254F7AEDD60F435DB1209EADC38A19E61F2327B0FC57390C8AAB1068E8B8ED465A01A86B9E9031D8D8B7E
2,692,463 UART: [art] PUB.Y = 3418A8BDF323671F525B06DC306FB460D4BF8A228CF1FFE5F7BC0019623823CB96AB92842019548839EADA1BFEA11CDF
2,699,400 UART: [art] SIG.R = 3F5F1068AB31B8C5E91AEDA0FD17C2DB50DBD66DFA113BB89452D23C42C24209996A2149D1B1E3D2662C7C2BCEF3E58A
2,706,185 UART: [art] SIG.S = A3C2F1F7F43BD611F35D0475D1B5E4CBC81B9DF438A384473B7921E7BF925AF194E04AF2C65F5514F5A129C289FCE652
2,729,953 UART: mbox::rt_entry...
2,730,325 UART: ____ _ _ _ ____ _____
2,731,109 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,677 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,445 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,213 UART: |_|
2,734,525 UART:
2,841,323 UART: [rt] Runtime listening for mailbox commands...
2,842,085 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,295 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,389 UART:
2,842,405 UART: Running Caliptra ROM ...
2,842,813 UART:
2,842,955 UART: [state] CFI Enabled
2,845,450 UART: [state] LifecycleState = Production
2,846,058 UART: [state] DebugLocked = Yes
2,846,702 UART: [state] Starting the WD Timer 40000000 cycles
2,848,191 UART: [kat] SHA2-256
3,651,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,870 UART: [kat] ++
3,656,022 UART: [kat] sha1
3,660,292 UART: [kat] SHA2-256
3,662,232 UART: [kat] SHA2-384
3,665,005 UART: [kat] SHA2-512-ACC
3,666,906 UART: [kat] ECC-384
3,676,917 UART: [kat] HMAC-384Kdf
3,681,447 UART: [kat] LMS
3,929,759 UART: [kat] --
3,930,575 UART: [warm-reset] ++
3,931,538 UART: [warm-reset] --
3,932,439 UART: [state] Locking Datavault
3,933,333 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,937 UART: [state] Locking ICCM
3,934,409 UART: [exit] Launching FMC @ 0x40000130
3,939,738 UART:
3,939,754 UART: Running Caliptra FMC ...
3,940,162 UART:
3,940,305 UART: [state] CFI Enabled
3,941,616 UART: [aliasrt :skip pcr extension
3,942,089 UART: [art] Extend RT PCRs Done
3,942,517 UART: [art] Lock RT PCRs Done
3,943,768 UART: [art] Populate DV Done
3,952,170 UART: [fht] FMC Alias Private Key: 7
3,953,174 UART: [art] Derive CDI
3,953,454 UART: [art] Store in in slot 0x4
4,039,055 UART: [art] Derive Key Pair
4,039,415 UART: [art] Store priv key in slot 0x5
4,052,885 UART: [art] Derive Key Pair - Done
4,067,405 UART: [art] Signing Cert with AUTHO
4,067,885 UART: RITY.KEYID = 7
4,083,153 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,918 UART: [art] PUB.X = B394000C0C6254F7AEDD60F435DB1209EADC38A19E61F2327B0FC57390C8AAB1068E8B8ED465A01A86B9E9031D8D8B7E
4,090,660 UART: [art] PUB.Y = 3418A8BDF323671F525B06DC306FB460D4BF8A228CF1FFE5F7BC0019623823CB96AB92842019548839EADA1BFEA11CDF
4,097,597 UART: [art] SIG.R = 3F5F1068AB31B8C5E91AEDA0FD17C2DB50DBD66DFA113BB89452D23C42C24209996A2149D1B1E3D2662C7C2BCEF3E58A
4,104,382 UART: [art] SIG.S = A3C2F1F7F43BD611F35D0475D1B5E4CBC81B9DF438A384473B7921E7BF925AF194E04AF2C65F5514F5A129C289FCE652
4,128,200 UART: mbox::rt_entry...
4,128,572 UART: ____ _ _ _ ____ _____
4,129,356 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,156 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,924 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,692 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,460 UART: |_|
4,132,772 UART:
4,428,657 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,430,791 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,846 UART: [state] LifecycleState = Production
86,454 UART: [state] DebugLocked = Yes
87,148 UART: [state] Starting the WD Timer 40000000 cycles
88,671 UART: [kat] SHA2-256
892,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,350 UART: [kat] ++
896,502 UART: [kat] sha1
900,786 UART: [kat] SHA2-256
902,726 UART: [kat] SHA2-384
905,347 UART: [kat] SHA2-512-ACC
907,248 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,683 UART: [kat] LMS
1,169,995 UART: [kat] --
1,171,194 UART: [cold-reset] ++
1,171,649 UART: [fht] FHT @ 0x50003400
1,174,253 UART: [idev] ++
1,174,421 UART: [idev] CDI.KEYID = 6
1,174,782 UART: [idev] SUBJECT.KEYID = 7
1,175,207 UART: [idev] UDS.KEYID = 0
1,175,553 ready_for_fw is high
1,175,553 <<< Executing mbox cmd 0x46574c44 (78632 bytes) from SoC
1,183,254 UART: [idev] Erasing UDS.KEYID = 0
1,200,579 UART: [idev] Sha1 KeyId Algorithm
1,209,472 UART: [idev] --
1,210,483 UART: [ldev] ++
1,210,651 UART: [ldev] CDI.KEYID = 6
1,211,015 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,414 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,284 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,990 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,182 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,125 UART: [fwproc] Recv command 0x46574c44
1,283,858 UART: [fwproc] Recv'd Img size: 78632 bytes
2,196,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,115 UART: [fwproc] Load Runtime at address 0x40005000 len 53948
2,336,322 >>> mbox cmd response: success
2,337,472 UART: [afmc] ++
2,337,640 UART: [afmc] CDI.KEYID = 6
2,338,003 UART: [afmc] SUBJECT.KEYID = 7
2,338,429 UART: [afmc] AUTHORITY.KEYID = 5
2,374,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,457 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,397,176 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,403,069 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,776 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,601 UART: [afmc] --
2,417,502 UART: [cold-reset] --
2,418,444 UART: [state] Locking Datavault
2,419,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,881 UART: [state] Locking ICCM
2,420,303 UART: [exit] Launching FMC @ 0x40000130
2,425,632 UART:
2,425,648 UART: Running Caliptra FMC ...
2,426,056 UART:
2,426,199 UART: [state] CFI Enabled
2,436,848 UART: [fht] FMC Alias Private Key: 7
2,544,665 UART: [art] Extend RT PCRs Done
2,545,093 UART: [art] Lock RT PCRs Done
2,546,629 UART: [art] Populate DV Done
2,554,933 UART: [fht] FMC Alias Private Key: 7
2,556,021 UART: [art] Derive CDI
2,556,301 UART: [art] Store in in slot 0x4
2,642,076 UART: [art] Derive Key Pair
2,642,436 UART: [art] Store priv key in slot 0x5
2,656,082 UART: [art] Derive Key Pair - Done
2,671,143 UART: [art] Signing Cert with AUTHO
2,671,623 UART: RITY.KEYID = 7
2,686,865 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,630 UART: [art] PUB.X = E9BEFBFD1D519CDDFDDE407DE58D007C94C81E8A747D41435D961AAF0804BED291305DBE165FF108CA8543F9CC84471D
2,694,389 UART: [art] PUB.Y = B6E380CA921BCB1B7CB47671CFAD3CB9A1F18C0A5E85AC3F8985A910AE4E315A43BF2B382E37A8919111B64342BCAE5D
2,701,354 UART: [art] SIG.R = 4D8908691C38DC967089878419C66C66ABBCFB74B4380BD621314145003C246AD5608A33BC62DA93392D06DCAEA4AEEC
2,708,097 UART: [art] SIG.S = 66FAE2D7C2F3871E1855E7DE7EC4F3993CB32228A2568182054AF13D3E63777292DC40D7839914BA71390A41CC494BE8
2,731,378 UART: mbox::rt_entry...
2,731,750 UART: ____ _ _ _ ____ _____
2,732,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,638 UART: |_|
2,735,950 UART:
2,842,817 UART: [rt] Runtime listening for mailbox commands...
2,843,579 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,789 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,883 UART:
2,843,899 UART: Running Caliptra ROM ...
2,844,307 UART:
2,844,449 UART: [state] CFI Enabled
2,847,464 UART: [state] LifecycleState = Production
2,848,072 UART: [state] DebugLocked = Yes
2,848,616 UART: [state] Starting the WD Timer 40000000 cycles
2,850,299 UART: [kat] SHA2-256
3,653,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,978 UART: [kat] ++
3,658,130 UART: [kat] sha1
3,662,324 UART: [kat] SHA2-256
3,664,264 UART: [kat] SHA2-384
3,667,067 UART: [kat] SHA2-512-ACC
3,668,968 UART: [kat] ECC-384
3,678,643 UART: [kat] HMAC-384Kdf
3,683,279 UART: [kat] LMS
3,931,591 UART: [kat] --
3,932,375 UART: [warm-reset] ++
3,933,058 UART: [warm-reset] --
3,933,967 UART: [state] Locking Datavault
3,934,933 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,537 UART: [state] Locking ICCM
3,935,963 UART: [exit] Launching FMC @ 0x40000130
3,941,292 UART:
3,941,308 UART: Running Caliptra FMC ...
3,941,716 UART:
3,941,859 UART: [state] CFI Enabled
3,943,060 UART: [aliasrt :skip pcr extension
3,943,533 UART: [art] Extend RT PCRs Done
3,943,961 UART: [art] Lock RT PCRs Done
3,945,260 UART: [art] Populate DV Done
3,953,600 UART: [fht] FMC Alias Private Key: 7
3,954,744 UART: [art] Derive CDI
3,955,024 UART: [art] Store in in slot 0x4
4,040,569 UART: [art] Derive Key Pair
4,040,929 UART: [art] Store priv key in slot 0x5
4,054,273 UART: [art] Derive Key Pair - Done
4,069,240 UART: [art] Signing Cert with AUTHO
4,069,720 UART: RITY.KEYID = 7
4,084,742 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,507 UART: [art] PUB.X = E9BEFBFD1D519CDDFDDE407DE58D007C94C81E8A747D41435D961AAF0804BED291305DBE165FF108CA8543F9CC84471D
4,092,266 UART: [art] PUB.Y = B6E380CA921BCB1B7CB47671CFAD3CB9A1F18C0A5E85AC3F8985A910AE4E315A43BF2B382E37A8919111B64342BCAE5D
4,099,231 UART: [art] SIG.R = 4D8908691C38DC967089878419C66C66ABBCFB74B4380BD621314145003C246AD5608A33BC62DA93392D06DCAEA4AEEC
4,105,974 UART: [art] SIG.S = 66FAE2D7C2F3871E1855E7DE7EC4F3993CB32228A2568182054AF13D3E63777292DC40D7839914BA71390A41CC494BE8
4,128,529 UART: mbox::rt_entry...
4,128,901 UART: ____ _ _ _ ____ _____
4,129,685 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,485 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,253 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,021 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,789 UART: |_|
4,133,101 UART:
4,423,975 UART: Disabled attestation due to latest TCI of the node containing the runtime journey PCR not matching the runtime PCR
4,426,065 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 139 filtered out; finished in 1.50s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
192,917 UART:
193,279 UART: Running Caliptra ROM ...
194,532 UART:
194,683 UART: [state] CFI Enabled
266,004 UART: [state] LifecycleState = Unprovisioned
268,381 UART: [state] DebugLocked = No
270,772 UART: [state] WD Timer not started. Device not locked for debugging
276,156 UART: [fake-rom-cold-reset] ++
279,206 ready_for_fw is high
279,468 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
404,300 UART: [fht] FHT @ 0x50003400
405,398 UART: [fwproc] Wait for Commands...
406,684 UART: [fwproc] Recv command 0x46574c44
408,118 UART: [fwproc] Recv'd Img size: 99312 bytes
1,674,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,746,738 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,776,794 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
2,362,780 >>> mbox cmd response: success
2,368,799 UART: [fake-rom-cold-reset] --
2,373,149 UART: [state] Locking Datavault
2,376,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,378,799 UART: [state] Locking ICCM
2,381,686 UART: [exit] Launching FMC @ 0x40000130
2,390,515 UART:
2,390,767 UART: Running Caliptra FMC ...
2,391,791 UART:
2,391,936 UART: [state] CFI Enabled
2,451,597 UART: Caliptra RT
2,452,233 UART: [state] CFI Enabled
2,621,537 UART: [rt] RT listening for mailbox commands...
2,623,742 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,653,513 UART: [rt]cmd =0x4c444556, len=4
2,664,540 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,067,046 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,096,879 UART: [rt]cmd =0x43455246, len=4
3,109,691 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,900 writing to cptra_bootfsm_go
192,965 UART:
193,355 UART: Running Caliptra ROM ...
194,462 UART:
194,605 UART: [state] CFI Enabled
266,576 UART: [state] LifecycleState = Unprovisioned
268,980 UART: [state] DebugLocked = No
271,446 UART: [state] WD Timer not started. Device not locked for debugging
276,982 UART: [fake-rom-cold-reset] ++
280,014 ready_for_fw is high
280,200 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
405,039 UART: [fht] FHT @ 0x50003400
406,146 UART: [fwproc] Wait for Commands...
407,352 UART: [fwproc] Recv command 0x46574c44
408,791 UART: [fwproc] Recv'd Img size: 99312 bytes
1,689,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,770,956 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,801,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
2,387,055 >>> mbox cmd response: success
2,393,154 UART: [fake-rom-cold-reset] --
2,395,232 UART: [state] Locking Datavault
2,402,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,404,608 UART: [state] Locking ICCM
2,407,138 UART: [exit] Launching FMC @ 0x40000130
2,415,931 UART:
2,416,167 UART: Running Caliptra FMC ...
2,417,192 UART:
2,417,337 UART: [state] CFI Enabled
2,473,327 UART: Caliptra RT
2,474,006 UART: [state] CFI Enabled
2,643,801 UART: [rt] RT listening for mailbox commands...
2,645,979 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,675,746 UART: [rt]cmd =0x4c444556, len=4
2,686,833 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,089,861 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,119,810 UART: [rt]cmd =0x43455246, len=4
3,132,526 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,417 UART:
192,893 UART: Running Caliptra ROM ...
194,032 UART:
603,933 UART: [state] CFI Enabled
616,058 UART: [state] LifecycleState = Unprovisioned
618,438 UART: [state] DebugLocked = No
621,459 UART: [state] WD Timer not started. Device not locked for debugging
626,081 UART: [fake-rom-cold-reset] ++
629,109 ready_for_fw is high
629,387 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
754,271 UART: [fht] FHT @ 0x50003400
755,386 UART: [fwproc] Wait for Commands...
756,678 UART: [fwproc] Recv command 0x46574c44
758,122 UART: [fwproc] Recv'd Img size: 99312 bytes
2,026,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,100,811 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,130,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
2,716,887 >>> mbox cmd response: success
2,722,894 UART: [fake-rom-cold-reset] --
2,726,823 UART: [state] Locking Datavault
2,732,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,734,525 UART: [state] Locking ICCM
2,736,315 UART: [exit] Launching FMC @ 0x40000130
2,745,108 UART:
2,745,347 UART: Running Caliptra FMC ...
2,746,449 UART:
2,746,606 UART: [state] CFI Enabled
2,750,357 UART: Caliptra RT
2,751,046 UART: [state] CFI Enabled
2,860,803 UART: [rt] RT listening for mailbox commands...
2,862,993 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,892,822 UART: [rt]cmd =0x4c444556, len=4
2,903,932 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,308,389 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,338,163 UART: [rt]cmd =0x43455246, len=4
3,350,820 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,360 UART:
192,740 UART: Running Caliptra ROM ...
193,852 UART:
604,033 UART: [state] CFI Enabled
615,820 UART: [state] LifecycleState = Unprovisioned
618,179 UART: [state] DebugLocked = No
620,122 UART: [state] WD Timer not started. Device not locked for debugging
625,367 UART: [fake-rom-cold-reset] ++
628,464 ready_for_fw is high
628,642 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
753,456 UART: [fht] FHT @ 0x50003400
754,553 UART: [fwproc] Wait for Commands...
755,751 UART: [fwproc] Recv command 0x46574c44
757,182 UART: [fwproc] Recv'd Img size: 99312 bytes
2,027,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,106,252 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,136,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89332
2,721,199 >>> mbox cmd response: success
2,727,249 UART: [fake-rom-cold-reset] --
2,730,565 UART: [state] Locking Datavault
2,736,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,738,864 UART: [state] Locking ICCM
2,741,903 UART: [exit] Launching FMC @ 0x40000130
2,750,710 UART:
2,750,959 UART: Running Caliptra FMC ...
2,752,062 UART:
2,752,243 UART: [state] CFI Enabled
2,756,032 UART: Caliptra RT
2,756,722 UART: [state] CFI Enabled
2,866,943 UART: [rt] RT listening for mailbox commands...
2,869,114 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,899,043 UART: [rt]cmd =0x4c444556, len=4
2,910,270 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,313,834 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,343,536 UART: [rt]cmd =0x43455246, len=4
3,356,277 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
192,836 UART:
193,194 UART: Running Caliptra ROM ...
194,389 UART:
194,541 UART: [state] CFI Enabled
269,872 UART: [state] LifecycleState = Unprovisioned
271,884 UART: [state] DebugLocked = No
273,588 UART: [state] WD Timer not started. Device not locked for debugging
278,064 UART: [fake-rom-cold-reset] ++
280,465 ready_for_fw is high
280,725 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
405,824 UART: [fht] FHT @ 0x50003400
406,910 UART: [fwproc] Wait for Commands...
408,114 UART: [fwproc] Recv command 0x46574c44
409,520 UART: [fwproc] Recv'd Img size: 99660 bytes
1,714,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,786,106 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,803,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,120,497 >>> mbox cmd response: success
2,126,302 UART: [fake-rom-cold-reset] --
2,128,625 UART: [state] Locking Datavault
2,134,363 UART: [state] Locking PCR0, PCR1 and PCR31
2,135,957 UART: [state] Locking ICCM
2,137,537 UART: [exit] Launching FMC @ 0x40000130
2,145,785 UART:
2,146,023 UART: Running Caliptra FMC ...
2,147,128 UART:
2,147,286 UART: [state] CFI Enabled
2,198,524 UART: Caliptra RT
2,199,201 UART: [state] CFI Enabled
2,368,425 UART: [rt] RT listening for mailbox commands...
2,370,589 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,400,521 UART: [rt]cmd =0x4c444556, len=4
2,411,608 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,815,439 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,845,194 UART: [rt]cmd =0x43455246, len=4
2,857,803 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,690 writing to cptra_bootfsm_go
192,740 UART:
193,108 UART: Running Caliptra ROM ...
194,205 UART:
194,344 UART: [state] CFI Enabled
266,680 UART: [state] LifecycleState = Unprovisioned
268,439 UART: [state] DebugLocked = No
269,832 UART: [state] WD Timer not started. Device not locked for debugging
275,027 UART: [fake-rom-cold-reset] ++
277,353 ready_for_fw is high
277,611 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
402,710 UART: [fht] FHT @ 0x50003400
403,800 UART: [fwproc] Wait for Commands...
405,084 UART: [fwproc] Recv command 0x46574c44
406,496 UART: [fwproc] Recv'd Img size: 99660 bytes
1,704,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,776,697 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,793,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,111,529 >>> mbox cmd response: success
2,117,343 UART: [fake-rom-cold-reset] --
2,120,585 UART: [state] Locking Datavault
2,124,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,125,982 UART: [state] Locking ICCM
2,127,464 UART: [exit] Launching FMC @ 0x40000130
2,135,726 UART:
2,135,966 UART: Running Caliptra FMC ...
2,137,033 UART:
2,137,186 UART: [state] CFI Enabled
2,196,084 UART: Caliptra RT
2,196,771 UART: [state] CFI Enabled
2,365,638 UART: [rt] RT listening for mailbox commands...
2,367,814 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,397,748 UART: [rt]cmd =0x4c444556, len=4
2,408,826 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,812,466 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,842,233 UART: [rt]cmd =0x43455246, len=4
2,854,900 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,060 writing to cptra_bootfsm_go
194,107 UART:
194,480 UART: Running Caliptra ROM ...
195,580 UART:
195,717 UART: [state] CFI Enabled
265,274 UART: [state] LifecycleState = Unprovisioned
267,020 UART: [state] DebugLocked = No
269,394 UART: [state] WD Timer not started. Device not locked for debugging
274,007 UART: [fake-rom-cold-reset] ++
276,328 ready_for_fw is high
276,508 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
401,947 UART: [fht] FHT @ 0x50003400
403,073 UART: [fwproc] Wait for Commands...
404,286 UART: [fwproc] Recv command 0x46574c44
405,693 UART: [fwproc] Recv'd Img size: 99660 bytes
1,704,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,775,509 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,792,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,109,915 >>> mbox cmd response: success
2,115,739 UART: [fake-rom-cold-reset] --
2,118,924 UART: [state] Locking Datavault
2,124,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,125,834 UART: [state] Locking ICCM
2,127,020 UART: [exit] Launching FMC @ 0x40000130
2,135,313 UART:
2,135,548 UART: Running Caliptra FMC ...
2,136,648 UART:
2,136,805 UART: [state] CFI Enabled
2,195,929 UART: Caliptra RT
2,196,635 UART: [state] CFI Enabled
2,365,199 UART: [rt] RT listening for mailbox commands...
2,367,374 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,397,025 UART: [rt]cmd =0x4c444556, len=4
2,408,293 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,812,103 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,841,771 UART: [rt]cmd =0x43455246, len=4
2,854,493 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,250 writing to cptra_bootfsm_go
193,477 UART:
193,849 UART: Running Caliptra ROM ...
194,975 UART:
604,738 UART: [state] CFI Enabled
621,827 UART: [state] LifecycleState = Unprovisioned
623,548 UART: [state] DebugLocked = No
626,136 UART: [state] WD Timer not started. Device not locked for debugging
631,174 UART: [fake-rom-cold-reset] ++
633,488 ready_for_fw is high
633,763 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
758,992 UART: [fht] FHT @ 0x50003400
760,089 UART: [fwproc] Wait for Commands...
761,385 UART: [fwproc] Recv command 0x46574c44
762,798 UART: [fwproc] Recv'd Img size: 99660 bytes
2,063,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,140,127 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,157,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,475,731 >>> mbox cmd response: success
2,481,583 UART: [fake-rom-cold-reset] --
2,485,204 UART: [state] Locking Datavault
2,491,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,493,014 UART: [state] Locking ICCM
2,495,255 UART: [exit] Launching FMC @ 0x40000130
2,503,543 UART:
2,503,788 UART: Running Caliptra FMC ...
2,504,831 UART:
2,504,981 UART: [state] CFI Enabled
2,508,823 UART: Caliptra RT
2,509,511 UART: [state] CFI Enabled
2,619,169 UART: [rt] RT listening for mailbox commands...
2,621,318 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,651,090 UART: [rt]cmd =0x4c444556, len=4
2,662,216 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,064,864 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,094,460 UART: [rt]cmd =0x43455246, len=4
3,107,298 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,403 writing to cptra_bootfsm_go
193,655 UART:
194,020 UART: Running Caliptra ROM ...
195,219 UART:
604,583 UART: [state] CFI Enabled
616,794 UART: [state] LifecycleState = Unprovisioned
618,508 UART: [state] DebugLocked = No
619,892 UART: [state] WD Timer not started. Device not locked for debugging
624,933 UART: [fake-rom-cold-reset] ++
627,245 ready_for_fw is high
627,451 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
752,676 UART: [fht] FHT @ 0x50003400
753,789 UART: [fwproc] Wait for Commands...
754,997 UART: [fwproc] Recv command 0x46574c44
756,406 UART: [fwproc] Recv'd Img size: 99660 bytes
2,062,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,138,614 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,155,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,472,526 >>> mbox cmd response: success
2,478,354 UART: [fake-rom-cold-reset] --
2,483,131 UART: [state] Locking Datavault
2,487,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,488,583 UART: [state] Locking ICCM
2,490,655 UART: [exit] Launching FMC @ 0x40000130
2,498,883 UART:
2,499,114 UART: Running Caliptra FMC ...
2,500,139 UART:
2,500,290 UART: [state] CFI Enabled
2,504,146 UART: Caliptra RT
2,504,834 UART: [state] CFI Enabled
2,614,671 UART: [rt] RT listening for mailbox commands...
2,616,906 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,646,928 UART: [rt]cmd =0x4c444556, len=4
2,658,209 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,061,687 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,091,257 UART: [rt]cmd =0x43455246, len=4
3,104,034 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [fake-rom-cold-reset] ++
88,708 ready_for_fw is high
88,708 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
88,900 UART: [fht] FHT @ 0x50003400
92,131 UART: [fwproc] Wait for Commands...
92,872 UART: [fwproc] Recv command 0x46574c44
93,600 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,280 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,316 >>> mbox cmd response: success
1,388,474 UART: [fake-rom-cold-reset] --
1,389,372 UART: [state] Locking Datavault
1,390,449 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,053 UART: [state] Locking ICCM
1,391,555 UART: [exit] Launching FMC @ 0x40000130
1,396,877 UART:
1,396,893 UART: Running Caliptra FMC ...
1,397,301 UART:
1,397,355 UART: [state] CFI Enabled
1,400,166 UART: Caliptra RT
1,400,420 UART: [state] CFI Enabled
1,501,306 UART: [rt] RT listening for mailbox commands...
1,501,976 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,529 UART: [rt]cmd =0x4c444556, len=4
1,541,836 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,837 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,040 UART: [rt]cmd =0x43455246, len=4
1,582,997 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,098 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [fake-rom-cold-reset] ++
88,456 ready_for_fw is high
88,456 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
88,610 UART: [fht] FHT @ 0x50003400
91,929 UART: [fwproc] Wait for Commands...
92,722 UART: [fwproc] Recv command 0x46574c44
93,450 UART: [fwproc] Recv'd Img size: 99660 bytes
1,218,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,245,258 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,252,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,388,270 >>> mbox cmd response: success
1,389,428 UART: [fake-rom-cold-reset] --
1,390,124 UART: [state] Locking Datavault
1,391,173 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,777 UART: [state] Locking ICCM
1,392,339 UART: [exit] Launching FMC @ 0x40000130
1,397,661 UART:
1,397,677 UART: Running Caliptra FMC ...
1,398,085 UART:
1,398,139 UART: [state] CFI Enabled
1,400,930 UART: Caliptra RT
1,401,184 UART: [state] CFI Enabled
1,501,210 UART: [rt] RT listening for mailbox commands...
1,501,880 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,579 UART: [rt]cmd =0x4c444556, len=4
1,541,960 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,961 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,342 UART: [rt]cmd =0x43455246, len=4
1,583,369 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [fake-rom-cold-reset] ++
88,837 ready_for_fw is high
88,837 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,147 UART: [fht] FHT @ 0x50003400
92,494 UART: [fwproc] Wait for Commands...
93,271 UART: [fwproc] Recv command 0x46574c44
93,999 UART: [fwproc] Recv'd Img size: 99660 bytes
1,216,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,767 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,386,763 >>> mbox cmd response: success
1,387,921 UART: [fake-rom-cold-reset] --
1,388,777 UART: [state] Locking Datavault
1,389,894 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,498 UART: [state] Locking ICCM
1,390,918 UART: [exit] Launching FMC @ 0x40000130
1,396,240 UART:
1,396,256 UART: Running Caliptra FMC ...
1,396,664 UART:
1,396,805 UART: [state] CFI Enabled
1,399,663 UART: Caliptra RT
1,400,009 UART: [state] CFI Enabled
1,501,319 UART: [rt] RT listening for mailbox commands...
1,501,989 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,308 UART: [rt]cmd =0x4c444556, len=4
1,541,721 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,722 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,097 UART: [rt]cmd =0x43455246, len=4
1,583,262 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,111 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [fake-rom-cold-reset] ++
89,281 ready_for_fw is high
89,281 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,373 UART: [fht] FHT @ 0x50003400
92,656 UART: [fwproc] Wait for Commands...
93,307 UART: [fwproc] Recv command 0x46574c44
94,035 UART: [fwproc] Recv'd Img size: 99660 bytes
1,218,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,711 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,793 >>> mbox cmd response: success
1,388,951 UART: [fake-rom-cold-reset] --
1,389,727 UART: [state] Locking Datavault
1,390,846 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,450 UART: [state] Locking ICCM
1,392,078 UART: [exit] Launching FMC @ 0x40000130
1,397,400 UART:
1,397,416 UART: Running Caliptra FMC ...
1,397,824 UART:
1,397,965 UART: [state] CFI Enabled
1,400,803 UART: Caliptra RT
1,401,149 UART: [state] CFI Enabled
1,500,313 UART: [rt] RT listening for mailbox commands...
1,500,983 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,422 UART: [rt]cmd =0x4c444556, len=4
1,540,827 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,828 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,099 UART: [rt]cmd =0x43455246, len=4
1,582,216 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [fake-rom-cold-reset] ++
88,592 ready_for_fw is high
88,592 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
88,666 UART: [fht] FHT @ 0x50003400
92,087 UART: [fwproc] Wait for Commands...
92,810 UART: [fwproc] Recv command 0x46574c44
93,538 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,906 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,038 >>> mbox cmd response: success
1,388,196 UART: [fake-rom-cold-reset] --
1,389,108 UART: [state] Locking Datavault
1,390,341 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,945 UART: [state] Locking ICCM
1,391,521 UART: [exit] Launching FMC @ 0x40000130
1,396,843 UART:
1,396,859 UART: Running Caliptra FMC ...
1,397,267 UART:
1,397,321 UART: [state] CFI Enabled
1,399,936 UART: Caliptra RT
1,400,190 UART: [state] CFI Enabled
1,499,840 UART: [rt] RT listening for mailbox commands...
1,500,510 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,679 UART: [rt]cmd =0x4c444556, len=4
1,540,158 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,159 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,400 UART: [rt]cmd =0x43455246, len=4
1,581,639 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,348 UART: [fake-rom-cold-reset] ++
89,276 ready_for_fw is high
89,276 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,564 UART: [fht] FHT @ 0x50003400
92,983 UART: [fwproc] Wait for Commands...
93,606 UART: [fwproc] Recv command 0x46574c44
94,334 UART: [fwproc] Recv'd Img size: 99660 bytes
1,218,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,032 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,240 >>> mbox cmd response: success
1,388,398 UART: [fake-rom-cold-reset] --
1,389,170 UART: [state] Locking Datavault
1,390,085 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,689 UART: [state] Locking ICCM
1,391,297 UART: [exit] Launching FMC @ 0x40000130
1,396,619 UART:
1,396,635 UART: Running Caliptra FMC ...
1,397,043 UART:
1,397,097 UART: [state] CFI Enabled
1,399,672 UART: Caliptra RT
1,399,926 UART: [state] CFI Enabled
1,499,870 UART: [rt] RT listening for mailbox commands...
1,500,540 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,199 UART: [rt]cmd =0x4c444556, len=4
1,540,424 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,425 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,768 UART: [rt]cmd =0x43455246, len=4
1,581,861 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [fake-rom-cold-reset] ++
89,227 ready_for_fw is high
89,227 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,381 UART: [fht] FHT @ 0x50003400
92,768 UART: [fwproc] Wait for Commands...
93,417 UART: [fwproc] Recv command 0x46574c44
94,145 UART: [fwproc] Recv'd Img size: 99660 bytes
1,218,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,419 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,539 >>> mbox cmd response: success
1,388,697 UART: [fake-rom-cold-reset] --
1,389,595 UART: [state] Locking Datavault
1,390,900 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,504 UART: [state] Locking ICCM
1,392,112 UART: [exit] Launching FMC @ 0x40000130
1,397,434 UART:
1,397,450 UART: Running Caliptra FMC ...
1,397,858 UART:
1,397,999 UART: [state] CFI Enabled
1,400,973 UART: Caliptra RT
1,401,319 UART: [state] CFI Enabled
1,501,473 UART: [rt] RT listening for mailbox commands...
1,502,143 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,664 UART: [rt]cmd =0x4c444556, len=4
1,542,133 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,134 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,633 UART: [rt]cmd =0x43455246, len=4
1,583,870 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [fake-rom-cold-reset] ++
88,503 ready_for_fw is high
88,503 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
88,575 UART: [fht] FHT @ 0x50003400
91,854 UART: [fwproc] Wait for Commands...
92,679 UART: [fwproc] Recv command 0x46574c44
93,407 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,203 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,386,229 >>> mbox cmd response: success
1,387,387 UART: [fake-rom-cold-reset] --
1,388,315 UART: [state] Locking Datavault
1,389,360 UART: [state] Locking PCR0, PCR1 and PCR31
1,389,964 UART: [state] Locking ICCM
1,390,476 UART: [exit] Launching FMC @ 0x40000130
1,395,798 UART:
1,395,814 UART: Running Caliptra FMC ...
1,396,222 UART:
1,396,363 UART: [state] CFI Enabled
1,399,019 UART: Caliptra RT
1,399,365 UART: [state] CFI Enabled
1,500,041 UART: [rt] RT listening for mailbox commands...
1,500,711 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,250 UART: [rt]cmd =0x4c444556, len=4
1,540,781 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,782 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,147 UART: [rt]cmd =0x43455246, len=4
1,582,332 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [fake-rom-cold-reset] ++
88,876 ready_for_fw is high
88,876 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,060 UART: [fht] FHT @ 0x50003400
92,389 UART: [fwproc] Wait for Commands...
93,030 UART: [fwproc] Recv command 0x46574c44
93,758 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,746 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,386,722 >>> mbox cmd response: success
1,387,880 UART: [fake-rom-cold-reset] --
1,388,698 UART: [state] Locking Datavault
1,389,939 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,543 UART: [state] Locking ICCM
1,391,143 UART: [exit] Launching FMC @ 0x40000130
1,396,465 UART:
1,396,481 UART: Running Caliptra FMC ...
1,396,889 UART:
1,396,943 UART: [state] CFI Enabled
1,399,660 UART: Caliptra RT
1,399,914 UART: [state] CFI Enabled
1,499,576 UART: [rt] RT listening for mailbox commands...
1,500,246 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,973 UART: [rt]cmd =0x4c444556, len=4
1,540,448 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,449 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,806 UART: [rt]cmd =0x43455246, len=4
1,581,885 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [fake-rom-cold-reset] ++
88,782 ready_for_fw is high
88,782 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
88,942 UART: [fht] FHT @ 0x50003400
92,189 UART: [fwproc] Wait for Commands...
92,798 UART: [fwproc] Recv command 0x46574c44
93,526 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,826 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,012 >>> mbox cmd response: success
1,388,170 UART: [fake-rom-cold-reset] --
1,389,188 UART: [state] Locking Datavault
1,390,109 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,713 UART: [state] Locking ICCM
1,391,363 UART: [exit] Launching FMC @ 0x40000130
1,396,685 UART:
1,396,701 UART: Running Caliptra FMC ...
1,397,109 UART:
1,397,163 UART: [state] CFI Enabled
1,399,858 UART: Caliptra RT
1,400,112 UART: [state] CFI Enabled
1,499,692 UART: [rt] RT listening for mailbox commands...
1,500,362 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,011 UART: [rt]cmd =0x4c444556, len=4
1,540,556 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,557 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,922 UART: [rt]cmd =0x43455246, len=4
1,581,795 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [fake-rom-cold-reset] ++
88,715 ready_for_fw is high
88,715 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,019 UART: [fht] FHT @ 0x50003400
92,384 UART: [fwproc] Wait for Commands...
93,231 UART: [fwproc] Recv command 0x46574c44
93,959 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,193 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,241 >>> mbox cmd response: success
1,388,399 UART: [fake-rom-cold-reset] --
1,389,165 UART: [state] Locking Datavault
1,390,324 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,928 UART: [state] Locking ICCM
1,391,422 UART: [exit] Launching FMC @ 0x40000130
1,396,744 UART:
1,396,760 UART: Running Caliptra FMC ...
1,397,168 UART:
1,397,309 UART: [state] CFI Enabled
1,400,135 UART: Caliptra RT
1,400,481 UART: [state] CFI Enabled
1,500,829 UART: [rt] RT listening for mailbox commands...
1,501,499 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,066 UART: [rt]cmd =0x4c444556, len=4
1,541,643 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,644 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,023 UART: [rt]cmd =0x43455246, len=4
1,583,066 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cca7c2346d60dcc6accb3252b44e3a1d2f0cada41a0a93706201b2fc70280e45b08965d74cc775585205834985df910c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [fake-rom-cold-reset] ++
88,945 ready_for_fw is high
88,945 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
89,103 UART: [fht] FHT @ 0x50003400
92,522 UART: [fwproc] Wait for Commands...
93,131 UART: [fwproc] Recv command 0x46574c44
93,859 UART: [fwproc] Recv'd Img size: 99660 bytes
1,217,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,445 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
1,387,549 >>> mbox cmd response: success
1,388,707 UART: [fake-rom-cold-reset] --
1,389,545 UART: [state] Locking Datavault
1,390,662 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,266 UART: [state] Locking ICCM
1,391,858 UART: [exit] Launching FMC @ 0x40000130
1,397,180 UART:
1,397,196 UART: Running Caliptra FMC ...
1,397,604 UART:
1,397,745 UART: [state] CFI Enabled
1,400,613 UART: Caliptra RT
1,400,959 UART: [state] CFI Enabled
1,501,553 UART: [rt] RT listening for mailbox commands...
1,502,223 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,628 UART: [rt]cmd =0x4c444556, len=4
1,542,181 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,182 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,389 UART: [rt]cmd =0x43455246, len=4
1,583,500 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,425 UART:
192,796 UART: Running Caliptra ROM ...
193,950 UART:
194,091 UART: [state] CFI Enabled
261,513 UART: [state] LifecycleState = Production
263,319 UART: [state] DebugLocked = No
265,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,009 UART: [kat] SHA2-256
439,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,190 UART: [kat] ++
450,787 UART: [kat] sha1
461,093 UART: [kat] SHA2-256
463,819 UART: [kat] SHA2-384
470,802 UART: [kat] SHA2-512-ACC
473,183 UART: [kat] ECC-384
2,767,670 UART: [kat] HMAC-384Kdf
2,799,743 UART: [kat] LMS
3,990,077 UART: [kat] --
3,996,584 UART: [cold-reset] ++
3,997,529 UART: [fht] Storing FHT @ 0x50003400
4,010,142 UART: [idev] ++
4,010,915 UART: [idev] CDI.KEYID = 6
4,011,839 UART: [idev] SUBJECT.KEYID = 7
4,012,950 UART: [idev] UDS.KEYID = 0
4,014,028 ready_for_fw is high
4,014,246 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,817 UART: [idev] Erasing UDS.KEYID = 0
7,341,718 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,775 UART: [idev] --
7,370,541 UART: [ldev] ++
7,371,162 UART: [ldev] CDI.KEYID = 6
7,372,046 UART: [ldev] SUBJECT.KEYID = 5
7,373,147 UART: [ldev] AUTHORITY.KEYID = 7
7,374,484 UART: [ldev] FE.KEYID = 1
7,422,151 UART: [ldev] Erasing FE.KEYID = 1
10,758,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,725 UART: [ldev] --
13,134,411 UART: [fwproc] Waiting for Commands...
13,136,923 UART: [fwproc] Received command 0x46574c44
13,139,114 UART: [fwproc] Received Image of size 114036 bytes
22,205,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,286,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,355,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,671,981 >>> mbox cmd response: success
22,676,188 UART: [afmc] ++
22,676,825 UART: [afmc] CDI.KEYID = 6
22,677,738 UART: [afmc] SUBJECT.KEYID = 7
22,678,929 UART: [afmc] AUTHORITY.KEYID = 5
26,033,458 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,333,611 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,335,901 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,350,485 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,365,260 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,379,686 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,401,818 UART: [afmc] --
28,405,561 UART: [cold-reset] --
28,409,463 UART: [state] Locking Datavault
28,414,333 UART: [state] Locking PCR0, PCR1 and PCR31
28,416,105 UART: [state] Locking ICCM
28,417,765 UART: [exit] Launching FMC @ 0x40000130
28,426,161 UART:
28,426,410 UART: Running Caliptra FMC ...
28,427,551 UART:
28,427,706 UART: [state] CFI Enabled
28,492,435 UART: [fht] FMC Alias Private Key: 7
30,830,848 UART: [art] Extend RT PCRs Done
30,832,109 UART: [art] Lock RT PCRs Done
30,833,851 UART: [art] Populate DV Done
30,839,539 UART: [fht] FMC Alias Private Key: 7
30,841,193 UART: [art] Derive CDI
30,841,964 UART: [art] Store in in slot 0x4
30,901,254 UART: [art] Derive Key Pair
30,902,338 UART: [art] Store priv key in slot 0x5
34,194,866 UART: [art] Derive Key Pair - Done
34,207,752 UART: [art] Signing Cert with AUTHO
34,209,102 UART: RITY.KEYID = 7
36,497,747 UART: [art] Erasing AUTHORITY.KEYID = 7
36,499,301 UART: [art] PUB.X = 809A33BFCB6CB28C78E19E8972B28EAD3D9F7E86E6590C229433BD95D8B2C2F84BD3FD1052C3C539AC2B8AA2B8DC2461
36,506,502 UART: [art] PUB.Y = 6668615D870EFC327D47130A97A5190C4DA48314F053DB0EC9FFFA470E47B085591B0FF90ED4BABC860B3F812100DEC9
36,513,774 UART: [art] SIG.R = D1EF67ADFA79978E314EE57A407E6978D59DF3C692B5BB60C45B135EADDA19559DEDCF266F7CAD1BD83CC7C849DF1E2D
36,521,199 UART: [art] SIG.S = 9BB0DA32BB07AF9525A618A6ECA920E0D254F418C5E6FEA39797E36EE52A0B4904E7DDF2479424CD714DC30AEDC87E3E
37,826,689 UART: Caliptra RT
37,827,432 UART: [state] CFI Enabled
37,987,904 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
3,783,004 ready_for_fw is high
3,783,554 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,796,531 >>> mbox cmd response: success
27,493,019 UART:
27,493,418 UART: Running Caliptra FMC ...
27,494,625 UART:
27,494,788 UART: [state] CFI Enabled
27,563,691 UART: [fht] FMC Alias Private Key: 7
29,901,641 UART: [art] Extend RT PCRs Done
29,902,899 UART: [art] Lock RT PCRs Done
29,904,381 UART: [art] Populate DV Done
29,909,815 UART: [fht] FMC Alias Private Key: 7
29,911,323 UART: [art] Derive CDI
29,912,090 UART: [art] Store in in slot 0x4
29,972,833 UART: [art] Derive Key Pair
29,973,922 UART: [art] Store priv key in slot 0x5
33,266,055 UART: [art] Derive Key Pair - Done
33,279,015 UART: [art] Signing Cert with AUTHO
33,280,389 UART: RITY.KEYID = 7
35,568,678 UART: [art] Erasing AUTHORITY.KEYID = 7
35,570,234 UART: [art] PUB.X = B351B594BE29D212417A730F2A236B6DC59CD2E4A56372F7158E915BB74C9F8779564314C52776A24B1CE281469D27E2
35,577,437 UART: [art] PUB.Y = ACFAE0EEBC212BA5498439FDC50A045C1D692E1B4868555C7AEC0F724AD9F4DEA7366015D47E377F6C7AE58BEAA1676E
35,584,687 UART: [art] SIG.R = 39C640ED845690C88ED5EE0DEDD2721D901D539615F15BB4F34BBC9D8D54D183A1C4484919709C1B24213EE674625E61
35,592,114 UART: [art] SIG.S = 8E85262442E193B1D027DE2777029EA3C9E3F490C895808C924373DFDEEBAC033D3EEEB2E4C8E37FBB54C1FF4A1D9C04
36,896,781 UART: Caliptra RT
36,897,499 UART: [state] CFI Enabled
37,057,509 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,478 UART:
192,846 UART: Running Caliptra ROM ...
194,318 UART:
603,642 UART: [state] CFI Enabled
617,505 UART: [state] LifecycleState = Production
619,265 UART: [state] DebugLocked = No
621,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,926 UART: [kat] SHA2-256
795,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,284 UART: [kat] ++
806,813 UART: [kat] sha1
817,494 UART: [kat] SHA2-256
820,224 UART: [kat] SHA2-384
825,429 UART: [kat] SHA2-512-ACC
827,792 UART: [kat] ECC-384
3,111,732 UART: [kat] HMAC-384Kdf
3,123,890 UART: [kat] LMS
4,314,041 UART: [kat] --
4,317,620 UART: [cold-reset] ++
4,320,057 UART: [fht] Storing FHT @ 0x50003400
4,332,316 UART: [idev] ++
4,332,885 UART: [idev] CDI.KEYID = 6
4,333,798 UART: [idev] SUBJECT.KEYID = 7
4,335,042 UART: [idev] UDS.KEYID = 0
4,336,100 ready_for_fw is high
4,336,328 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,614 UART: [idev] Erasing UDS.KEYID = 0
7,619,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,691 UART: [idev] --
7,644,017 UART: [ldev] ++
7,644,651 UART: [ldev] CDI.KEYID = 6
7,645,561 UART: [ldev] SUBJECT.KEYID = 5
7,646,767 UART: [ldev] AUTHORITY.KEYID = 7
7,648,046 UART: [ldev] FE.KEYID = 1
7,661,445 UART: [ldev] Erasing FE.KEYID = 1
10,945,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,329 UART: [ldev] --
13,306,937 UART: [fwproc] Waiting for Commands...
13,309,942 UART: [fwproc] Received command 0x46574c44
13,312,137 UART: [fwproc] Received Image of size 114036 bytes
22,212,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,290,717 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,359,627 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,677,193 >>> mbox cmd response: success
22,682,283 UART: [afmc] ++
22,682,887 UART: [afmc] CDI.KEYID = 6
22,683,789 UART: [afmc] SUBJECT.KEYID = 7
22,685,106 UART: [afmc] AUTHORITY.KEYID = 5
25,998,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,292,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,294,853 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,309,486 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,324,226 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,338,644 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,358,746 UART: [afmc] --
28,362,906 UART: [cold-reset] --
28,368,048 UART: [state] Locking Datavault
28,372,928 UART: [state] Locking PCR0, PCR1 and PCR31
28,374,667 UART: [state] Locking ICCM
28,376,669 UART: [exit] Launching FMC @ 0x40000130
28,385,036 UART:
28,385,282 UART: Running Caliptra FMC ...
28,386,344 UART:
28,386,488 UART: [state] CFI Enabled
28,394,459 UART: [fht] FMC Alias Private Key: 7
30,725,252 UART: [art] Extend RT PCRs Done
30,726,521 UART: [art] Lock RT PCRs Done
30,727,695 UART: [art] Populate DV Done
30,732,928 UART: [fht] FMC Alias Private Key: 7
30,734,482 UART: [art] Derive CDI
30,735,247 UART: [art] Store in in slot 0x4
30,777,741 UART: [art] Derive Key Pair
30,778,815 UART: [art] Store priv key in slot 0x5
34,020,892 UART: [art] Derive Key Pair - Done
34,033,645 UART: [art] Signing Cert with AUTHO
34,035,184 UART: RITY.KEYID = 7
36,314,070 UART: [art] Erasing AUTHORITY.KEYID = 7
36,315,628 UART: [art] PUB.X = 36F8D26DFCC984B642BBC220767DFC8AD27FC7DB6A7B5D0D536D3E5AA8A952D909F891C531140BDA63DE8243AFE04B08
36,322,827 UART: [art] PUB.Y = 0D470CD71A816C51AF987D78F5D8A2BE6010BD32BA435AED6D7671B9F67C3DA77A6E68FFEFC95B9769467A06FA678CC1
36,330,096 UART: [art] SIG.R = D23A8281EB6A1A7943FBC7A808BBBADF7D59EE2FE7F0339D94348E11056E4FEAFD029FA145E712A2615555009F24AD1A
36,337,536 UART: [art] SIG.S = 47F1BE19E20D1F5A48ED5B9D4CC089C8E29F98E53757BA9E9C57AE3C031D463C8F2AA3234ABAA051972FEB55DAC655BE
37,642,778 UART: Caliptra RT
37,643,513 UART: [state] CFI Enabled
37,760,779 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.94s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
4,125,620 ready_for_fw is high
4,126,174 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,433,457 >>> mbox cmd response: success
28,074,454 UART:
28,074,839 UART: Running Caliptra FMC ...
28,075,955 UART:
28,076,112 UART: [state] CFI Enabled
28,083,811 UART: [fht] FMC Alias Private Key: 7
30,414,533 UART: [art] Extend RT PCRs Done
30,415,796 UART: [art] Lock RT PCRs Done
30,417,450 UART: [art] Populate DV Done
30,422,874 UART: [fht] FMC Alias Private Key: 7
30,424,432 UART: [art] Derive CDI
30,425,196 UART: [art] Store in in slot 0x4
30,468,053 UART: [art] Derive Key Pair
30,469,155 UART: [art] Store priv key in slot 0x5
33,711,559 UART: [art] Derive Key Pair - Done
33,724,569 UART: [art] Signing Cert with AUTHO
33,725,916 UART: RITY.KEYID = 7
36,005,323 UART: [art] Erasing AUTHORITY.KEYID = 7
36,006,883 UART: [art] PUB.X = 8E767634444679A005C555D3F12D1B3E8E14AD161BBD5F231389225CF3F8E17F8B95F2217B43E4C1748BFCE33283A505
36,014,088 UART: [art] PUB.Y = 7F53380C520D32306A396F96E97EFC63C27285DB645027415714640695E4C6AA500F2FD7F107285E73AC6C9F1B4D5DAC
36,021,287 UART: [art] SIG.R = E1FE8CD91175644AAE0C8C35E554E518B7009C432D9C26EDCBE0198DC22334D9D875A6A85B455C5D288E081473BD76BA
36,028,714 UART: [art] SIG.S = 2A61408DB5ED8734358E22F644480EF3777D2B96AB6CADAA208739FC047D9B47F15DDC87EDCE661913F6E88D881F930A
37,333,898 UART: Caliptra RT
37,334,807 UART: [state] CFI Enabled
37,451,430 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,401 UART:
192,764 UART: Running Caliptra ROM ...
193,939 UART:
194,095 UART: [state] CFI Enabled
263,467 UART: [state] LifecycleState = Production
265,222 UART: [state] DebugLocked = No
266,686 UART: [state] WD Timer not started. Device not locked for debugging
270,146 UART: [kat] SHA2-256
449,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,823 UART: [kat] ++
461,269 UART: [kat] sha1
471,711 UART: [kat] SHA2-256
474,791 UART: [kat] SHA2-384
479,441 UART: [kat] SHA2-512-ACC
482,446 UART: [kat] ECC-384
2,927,348 UART: [kat] HMAC-384Kdf
2,950,170 UART: [kat] LMS
3,479,663 UART: [kat] --
3,481,740 UART: [cold-reset] ++
3,483,100 UART: [fht] FHT @ 0x50003400
3,494,570 UART: [idev] ++
3,495,141 UART: [idev] CDI.KEYID = 6
3,496,059 UART: [idev] SUBJECT.KEYID = 7
3,497,236 UART: [idev] UDS.KEYID = 0
3,498,158 ready_for_fw is high
3,498,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,642,200 UART: [idev] Erasing UDS.KEYID = 0
6,007,557 UART: [idev] Sha1 KeyId Algorithm
6,030,314 UART: [idev] --
6,035,353 UART: [ldev] ++
6,035,926 UART: [ldev] CDI.KEYID = 6
6,037,014 UART: [ldev] SUBJECT.KEYID = 5
6,038,077 UART: [ldev] AUTHORITY.KEYID = 7
6,039,267 UART: [ldev] FE.KEYID = 1
6,078,616 UART: [ldev] Erasing FE.KEYID = 1
8,580,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,140 UART: [ldev] --
10,391,212 UART: [fwproc] Wait for Commands...
10,393,839 UART: [fwproc] Recv command 0x46574c44
10,395,928 UART: [fwproc] Recv'd Img size: 114360 bytes
15,008,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,087,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,156,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,474,500 >>> mbox cmd response: success
15,478,871 UART: [afmc] ++
15,479,506 UART: [afmc] CDI.KEYID = 6
15,480,422 UART: [afmc] SUBJECT.KEYID = 7
15,481,518 UART: [afmc] AUTHORITY.KEYID = 5
18,016,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,741,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,743,207 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,759,265 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,775,300 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,791,172 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,813,450 UART: [afmc] --
19,816,683 UART: [cold-reset] --
19,819,889 UART: [state] Locking Datavault
19,825,694 UART: [state] Locking PCR0, PCR1 and PCR31
19,827,378 UART: [state] Locking ICCM
19,828,387 UART: [exit] Launching FMC @ 0x40000130
19,836,843 UART:
19,837,091 UART: Running Caliptra FMC ...
19,838,238 UART:
19,838,397 UART: [state] CFI Enabled
19,900,595 UART: [fht] FMC Alias Private Key: 7
21,665,729 UART: [art] Extend RT PCRs Done
21,667,003 UART: [art] Lock RT PCRs Done
21,668,430 UART: [art] Populate DV Done
21,674,080 UART: [fht] FMC Alias Private Key: 7
21,675,634 UART: [art] Derive CDI
21,676,403 UART: [art] Store in in slot 0x4
21,733,088 UART: [art] Derive Key Pair
21,734,170 UART: [art] Store priv key in slot 0x5
24,197,224 UART: [art] Derive Key Pair - Done
24,209,970 UART: [art] Signing Cert with AUTHO
24,211,313 UART: RITY.KEYID = 7
25,922,921 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,481 UART: [art] PUB.X = 2135878BE881E195A6317E93789FF4C3B088A566B9F1AA1925DF317AEAC661C350868A8D43D20999616AF53ED3EA7138
25,931,684 UART: [art] PUB.Y = 60C9F5922BC2DC04D8ACE1F96D73669EC1CE15F431FB1E123451E2AA58AEA8DF0B48F812B725E0A3C2A4224FECB4E712
25,938,966 UART: [art] SIG.R = 592D652ABC961F7C3EE03E3622070741CF9BCF10F1D400A0169C946CBEC9009A56576B4C7B6C88EA64D8E636B56AAA9D
25,946,316 UART: [art] SIG.S = 49500A88B8629CED2BB582CC3B87087E292B5DD5D1329CCB206E79E8FF76CD2B650AE9E0F9FB526DBF9A3BCA7F15D0B8
26,924,804 UART: Caliptra RT
26,925,520 UART: [state] CFI Enabled
27,091,007 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,541 UART:
192,902 UART: Running Caliptra ROM ...
194,115 UART:
194,271 UART: [state] CFI Enabled
268,264 UART: [state] LifecycleState = Production
270,487 UART: [state] DebugLocked = No
271,877 UART: [state] WD Timer not started. Device not locked for debugging
276,117 UART: [kat] SHA2-256
465,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,784 UART: [kat] ++
477,260 UART: [kat] sha1
488,414 UART: [kat] SHA2-256
491,426 UART: [kat] SHA2-384
498,119 UART: [kat] SHA2-512-ACC
500,694 UART: [kat] ECC-384
2,945,528 UART: [kat] HMAC-384Kdf
2,971,270 UART: [kat] LMS
3,503,073 UART: [kat] --
3,507,962 UART: [cold-reset] ++
3,510,534 UART: [fht] FHT @ 0x50003400
3,522,807 UART: [idev] ++
3,523,486 UART: [idev] CDI.KEYID = 6
3,524,466 UART: [idev] SUBJECT.KEYID = 7
3,525,639 UART: [idev] UDS.KEYID = 0
3,526,563 ready_for_fw is high
3,526,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,447 UART: [idev] Erasing UDS.KEYID = 0
6,027,960 UART: [idev] Sha1 KeyId Algorithm
6,049,070 UART: [idev] --
6,053,662 UART: [ldev] ++
6,054,341 UART: [ldev] CDI.KEYID = 6
6,055,257 UART: [ldev] SUBJECT.KEYID = 5
6,056,334 UART: [ldev] AUTHORITY.KEYID = 7
6,057,666 UART: [ldev] FE.KEYID = 1
6,102,444 UART: [ldev] Erasing FE.KEYID = 1
8,608,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,351 UART: [ldev] --
10,415,136 UART: [fwproc] Wait for Commands...
10,417,873 UART: [fwproc] Recv command 0x46574c44
10,420,122 UART: [fwproc] Recv'd Img size: 114360 bytes
15,074,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,159,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,275,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,818,177 >>> mbox cmd response: success
15,822,917 UART: [afmc] ++
15,823,574 UART: [afmc] CDI.KEYID = 6
15,824,804 UART: [afmc] SUBJECT.KEYID = 7
15,826,332 UART: [afmc] AUTHORITY.KEYID = 5
18,370,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,112,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,114,939 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,130,152 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,145,349 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,160,334 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,183,665 UART: [afmc] --
20,186,521 UART: [cold-reset] --
20,191,124 UART: [state] Locking Datavault
20,196,247 UART: [state] Locking PCR0, PCR1 and PCR31
20,198,452 UART: [state] Locking ICCM
20,199,945 UART: [exit] Launching FMC @ 0x40000130
20,208,638 UART:
20,208,884 UART: Running Caliptra FMC ...
20,210,047 UART:
20,210,209 UART: [state] CFI Enabled
20,269,313 UART: [fht] FMC Alias Private Key: 7
22,033,085 UART: [art] Extend RT PCRs Done
22,034,352 UART: [art] Lock RT PCRs Done
22,035,839 UART: [art] Populate DV Done
22,041,373 UART: [fht] FMC Alias Private Key: 7
22,043,040 UART: [art] Derive CDI
22,043,822 UART: [art] Store in in slot 0x4
22,102,295 UART: [art] Derive Key Pair
22,103,387 UART: [art] Store priv key in slot 0x5
24,565,769 UART: [art] Derive Key Pair - Done
24,579,133 UART: [art] Signing Cert with AUTHO
24,580,481 UART: RITY.KEYID = 7
26,291,841 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,394 UART: [art] PUB.X = EB8BEAF0F85ADD2F691A415920E20238D98FEF89070548D939E5AB957B00A7535319E2148ECC0B573B96FE32C36D083A
26,300,623 UART: [art] PUB.Y = 0980171D3B377104499888320A80D6DC72A5A02AEA5931FCFF8D37D380E95F78C467337CD0281D5CC0C4939B4472AFF5
26,307,843 UART: [art] SIG.R = C12203006B289947B5121DF3A16E937F1F54CD8C49E242DD67126C32DEFAA257C4A9C1036B6D04CD512A40EA4CD51683
26,315,264 UART: [art] SIG.S = 53D9B859D71E0EF15DD3515730B6BF8D8C2677D7FCE25A2365B40B1E48300D8D5B72437B551C904875F8C962B3A10F1D
27,293,928 UART: Caliptra RT
27,294,646 UART: [state] CFI Enabled
27,461,184 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,438,765 ready_for_fw is high
3,439,370 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,901,595 >>> mbox cmd response: success
20,177,128 UART:
20,177,544 UART: Running Caliptra FMC ...
20,178,662 UART:
20,178,812 UART: [state] CFI Enabled
20,246,229 UART: [fht] FMC Alias Private Key: 7
22,010,125 UART: [art] Extend RT PCRs Done
22,011,394 UART: [art] Lock RT PCRs Done
22,013,158 UART: [art] Populate DV Done
22,018,484 UART: [fht] FMC Alias Private Key: 7
22,020,095 UART: [art] Derive CDI
22,020,875 UART: [art] Store in in slot 0x4
22,078,769 UART: [art] Derive Key Pair
22,079,857 UART: [art] Store priv key in slot 0x5
24,542,483 UART: [art] Derive Key Pair - Done
24,555,553 UART: [art] Signing Cert with AUTHO
24,556,900 UART: RITY.KEYID = 7
26,268,311 UART: [art] Erasing AUTHORITY.KEYID = 7
26,269,870 UART: [art] PUB.X = 3B44BB4439EE1B08444CB15701453DA945ADA44F19E917B2F0AF50D61428DEF24FAA6912E4F8D184799E4A6F504DB777
26,277,075 UART: [art] PUB.Y = B993E2244D3314FF71DE2ECAAB4F633FED1A45F84FBF7C76F7ACC6A7E285838446A984D9DEA24C67B074BF7FA38FFA74
26,284,379 UART: [art] SIG.R = 0A78ABED1A774223BD62915289BB0C5B9F6CA9E051FB5EF4F2CC2653568B186DB5921768EC0DFC14047F710B11AA31A0
26,291,793 UART: [art] SIG.S = C5E6DA6A04069FEB15874C1E7A3837FEB4148EA14596834DA6502BF4A1A68D77910CF43520733F7EC53174456338BD68
27,270,910 UART: Caliptra RT
27,271,660 UART: [state] CFI Enabled
27,436,993 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
192,758 UART:
193,133 UART: Running Caliptra ROM ...
194,308 UART:
603,802 UART: [state] CFI Enabled
618,261 UART: [state] LifecycleState = Production
620,456 UART: [state] DebugLocked = No
621,840 UART: [state] WD Timer not started. Device not locked for debugging
626,237 UART: [kat] SHA2-256
816,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,952 UART: [kat] ++
827,396 UART: [kat] sha1
838,332 UART: [kat] SHA2-256
841,328 UART: [kat] SHA2-384
846,528 UART: [kat] SHA2-512-ACC
849,111 UART: [kat] ECC-384
3,293,594 UART: [kat] HMAC-384Kdf
3,307,271 UART: [kat] LMS
3,839,067 UART: [kat] --
3,845,066 UART: [cold-reset] ++
3,846,793 UART: [fht] FHT @ 0x50003400
3,858,141 UART: [idev] ++
3,858,774 UART: [idev] CDI.KEYID = 6
3,859,804 UART: [idev] SUBJECT.KEYID = 7
3,860,978 UART: [idev] UDS.KEYID = 0
3,861,899 ready_for_fw is high
3,862,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,215 UART: [idev] Erasing UDS.KEYID = 0
6,340,325 UART: [idev] Sha1 KeyId Algorithm
6,363,780 UART: [idev] --
6,368,530 UART: [ldev] ++
6,369,203 UART: [ldev] CDI.KEYID = 6
6,370,086 UART: [ldev] SUBJECT.KEYID = 5
6,371,296 UART: [ldev] AUTHORITY.KEYID = 7
6,372,523 UART: [ldev] FE.KEYID = 1
6,383,380 UART: [ldev] Erasing FE.KEYID = 1
8,859,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,170 UART: [ldev] --
10,649,545 UART: [fwproc] Wait for Commands...
10,651,697 UART: [fwproc] Recv command 0x46574c44
10,654,000 UART: [fwproc] Recv'd Img size: 114360 bytes
15,310,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,391,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,507,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,050,977 >>> mbox cmd response: success
16,054,385 UART: [afmc] ++
16,055,202 UART: [afmc] CDI.KEYID = 6
16,056,308 UART: [afmc] SUBJECT.KEYID = 7
16,057,779 UART: [afmc] AUTHORITY.KEYID = 5
18,558,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,280,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,282,152 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,297,393 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,312,563 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,327,537 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,351,174 UART: [afmc] --
20,355,520 UART: [cold-reset] --
20,360,286 UART: [state] Locking Datavault
20,367,386 UART: [state] Locking PCR0, PCR1 and PCR31
20,369,575 UART: [state] Locking ICCM
20,372,574 UART: [exit] Launching FMC @ 0x40000130
20,381,262 UART:
20,381,508 UART: Running Caliptra FMC ...
20,382,810 UART:
20,382,977 UART: [state] CFI Enabled
20,390,708 UART: [fht] FMC Alias Private Key: 7
22,147,862 UART: [art] Extend RT PCRs Done
22,149,132 UART: [art] Lock RT PCRs Done
22,151,018 UART: [art] Populate DV Done
22,156,608 UART: [fht] FMC Alias Private Key: 7
22,158,264 UART: [art] Derive CDI
22,159,045 UART: [art] Store in in slot 0x4
22,201,468 UART: [art] Derive Key Pair
22,202,505 UART: [art] Store priv key in slot 0x5
24,629,425 UART: [art] Derive Key Pair - Done
24,642,272 UART: [art] Signing Cert with AUTHO
24,643,611 UART: RITY.KEYID = 7
26,348,786 UART: [art] Erasing AUTHORITY.KEYID = 7
26,350,349 UART: [art] PUB.X = 171ADC876B085483272F66EF540C5CC6977B8809843A0218E931D052A7293E2DFEB2B2DCD7C19251DA88619BD02B4BBA
26,357,559 UART: [art] PUB.Y = 54DE46C380F00D9C589ED10A50DDE8C6E2380440CDBE539C545D587B2CBE2F25295D14B53ACF66F93B9C9866D9D4FEFC
26,364,852 UART: [art] SIG.R = 727A7188940851A1750FD06390317D28DAA314DCCE490ACEED870AFB50C9B42D93B02813A120C8B01BB958628BDB4C43
26,372,236 UART: [art] SIG.S = 386B0B6E67FC0191867A6BB34F67B749A04D2B80205DEB0AFA52989700B858AC6F0AD004271D20CD2F48005A96F3DA00
27,350,989 UART: Caliptra RT
27,351,724 UART: [state] CFI Enabled
27,469,224 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
3,753,644 ready_for_fw is high
3,754,100 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,085,088 >>> mbox cmd response: success
20,332,104 UART:
20,332,511 UART: Running Caliptra FMC ...
20,333,632 UART:
20,333,792 UART: [state] CFI Enabled
20,341,819 UART: [fht] FMC Alias Private Key: 7
22,098,680 UART: [art] Extend RT PCRs Done
22,099,958 UART: [art] Lock RT PCRs Done
22,101,603 UART: [art] Populate DV Done
22,106,774 UART: [fht] FMC Alias Private Key: 7
22,108,282 UART: [art] Derive CDI
22,109,089 UART: [art] Store in in slot 0x4
22,151,696 UART: [art] Derive Key Pair
22,152,784 UART: [art] Store priv key in slot 0x5
24,580,406 UART: [art] Derive Key Pair - Done
24,593,116 UART: [art] Signing Cert with AUTHO
24,594,471 UART: RITY.KEYID = 7
26,299,833 UART: [art] Erasing AUTHORITY.KEYID = 7
26,301,395 UART: [art] PUB.X = C4433D1EBE7F7421853F59EE7895768034FE05521F935A27FA75266950E16A340A029B35D428CDBD168632B2F4B1EB55
26,308,601 UART: [art] PUB.Y = 386B867BD7ECE3282C998B1040C33A0B164F13CC78A4E87D659958A88AD9334C6C4B997B1A5EE6C3F0418ECFB4FAE652
26,315,888 UART: [art] SIG.R = 3CB41B02F64B5A83D76380D192F4A01AE244C90A7985DA9FE611304FBE7BD47CAE93E13EB6F7DAFB6BF6CB1E2A6A05B0
26,323,349 UART: [art] SIG.S = 428A1D9FC4138A07907A327380DD986C77C1C0A0C51D69C142D56CEEE641F9A7C77D376F193D1B0A6BA975BDCC8275BC
27,301,833 UART: Caliptra RT
27,302,566 UART: [state] CFI Enabled
27,420,705 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,907 writing to cptra_bootfsm_go
194,372 UART:
195,548 UART: Running Caliptra ROM ...
196,757 UART:
196,901 UART: [state] CFI Enabled
269,254 UART: [state] LifecycleState = Unprovisioned
271,371 UART: [state] DebugLocked = Yes
273,559 UART: [state] Starting the Watchdog Timer 40000000 cycles
278,576 UART: [kat] SHA2-256
448,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,839 UART: [kat] ++
459,405 UART: [kat] sha1
470,254 UART: [kat] SHA2-256
472,932 UART: [kat] SHA2-384
479,286 UART: [kat] SHA2-512-ACC
481,621 UART: [kat] ECC-384
2,775,762 UART: [kat] HMAC-384Kdf
2,789,824 UART: [kat] LMS
3,980,110 UART: [kat] --
3,984,555 UART: [cold-reset] ++
3,986,487 UART: [fht] Storing FHT @ 0x50003400
3,997,428 UART: [idev] ++
3,997,995 UART: [idev] CDI.KEYID = 6
3,998,955 UART: [idev] SUBJECT.KEYID = 7
4,000,177 UART: [idev] UDS.KEYID = 0
4,024,703 UART: [idev] Erasing UDS.KEYID = 0
7,336,635 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,203 UART: [idev] CSR upload requested
7,362,393 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,668,886 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,683,459 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,698,217 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,713,153 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,735,448 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,941 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,014 UART:
193,232 UART: Running Caliptra ROM ...
194,426 UART:
603,008 UART: [state] CFI Enabled
618,303 UART: [state] LifecycleState = Unprovisioned
620,293 UART: [state] DebugLocked = Yes
621,679 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,145 UART: [kat] SHA2-256
795,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,498 UART: [kat] ++
807,027 UART: [kat] sha1
817,708 UART: [kat] SHA2-256
820,446 UART: [kat] SHA2-384
824,805 UART: [kat] SHA2-512-ACC
827,136 UART: [kat] ECC-384
3,108,606 UART: [kat] HMAC-384Kdf
3,120,360 UART: [kat] LMS
4,310,472 UART: [kat] --
4,316,473 UART: [cold-reset] ++
4,317,749 UART: [fht] Storing FHT @ 0x50003400
4,329,560 UART: [idev] ++
4,330,125 UART: [idev] CDI.KEYID = 6
4,331,063 UART: [idev] SUBJECT.KEYID = 7
4,332,331 UART: [idev] UDS.KEYID = 0
4,349,249 UART: [idev] Erasing UDS.KEYID = 0
7,621,310 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,049 UART: [idev] CSR upload requested
7,648,222 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,939,068 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,953,583 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,968,344 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,982,658 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,005,643 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,562 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,812 writing to cptra_bootfsm_go
192,455 UART:
193,430 UART: Running Caliptra ROM ...
194,639 UART:
194,845 UART: [state] CFI Enabled
264,980 UART: [state] LifecycleState = Unprovisioned
267,264 UART: [state] DebugLocked = Yes
269,117 UART: [state] Starting the WD Timer 40000000 cycles
274,102 UART: [kat] SHA2-256
453,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,796 UART: [kat] ++
465,338 UART: [kat] sha1
475,657 UART: [kat] SHA2-256
478,717 UART: [kat] SHA2-384
485,089 UART: [kat] SHA2-512-ACC
488,040 UART: [kat] ECC-384
2,950,112 UART: [kat] HMAC-384Kdf
2,971,563 UART: [kat] LMS
3,501,017 UART: [kat] --
3,504,557 UART: [cold-reset] ++
3,506,679 UART: [fht] FHT @ 0x50003400
3,518,313 UART: [idev] ++
3,518,917 UART: [idev] CDI.KEYID = 6
3,519,833 UART: [idev] SUBJECT.KEYID = 7
3,520,994 UART: [idev] UDS.KEYID = 0
3,544,478 UART: [idev] Erasing UDS.KEYID = 0
6,022,468 UART: [idev] Sha1 KeyId Algorithm
6,043,654 UART: [idev] CSR upload begun
6,048,315 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,782,029 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,798,121 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,814,022 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,830,042 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,853,863 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
192,629 UART:
193,741 UART: Running Caliptra ROM ...
194,946 UART:
195,089 UART: [state] CFI Enabled
262,351 UART: [state] LifecycleState = Unprovisioned
265,090 UART: [state] DebugLocked = Yes
267,143 UART: [state] Starting the WD Timer 40000000 cycles
271,587 UART: [kat] SHA2-256
461,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,267 UART: [kat] ++
472,881 UART: [kat] sha1
485,967 UART: [kat] SHA2-256
488,997 UART: [kat] SHA2-384
493,734 UART: [kat] SHA2-512-ACC
496,353 UART: [kat] ECC-384
2,950,105 UART: [kat] HMAC-384Kdf
2,974,559 UART: [kat] LMS
3,506,308 UART: [kat] --
3,511,575 UART: [cold-reset] ++
3,512,874 UART: [fht] FHT @ 0x50003400
3,523,579 UART: [idev] ++
3,524,318 UART: [idev] CDI.KEYID = 6
3,525,206 UART: [idev] SUBJECT.KEYID = 7
3,526,418 UART: [idev] UDS.KEYID = 0
3,545,663 UART: [idev] Erasing UDS.KEYID = 0
6,030,478 UART: [idev] Sha1 KeyId Algorithm
6,052,151 UART: [idev] CSR upload begun
6,057,194 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,784,763 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,800,006 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,815,055 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,830,063 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,855,206 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,986 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,378 writing to cptra_bootfsm_go
193,023 UART:
194,098 UART: Running Caliptra ROM ...
195,363 UART:
604,254 UART: [state] CFI Enabled
618,313 UART: [state] LifecycleState = Unprovisioned
620,692 UART: [state] DebugLocked = Yes
622,914 UART: [state] Starting the WD Timer 40000000 cycles
628,436 UART: [kat] SHA2-256
818,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,148 UART: [kat] ++
829,680 UART: [kat] sha1
841,772 UART: [kat] SHA2-256
844,797 UART: [kat] SHA2-384
851,745 UART: [kat] SHA2-512-ACC
854,301 UART: [kat] ECC-384
3,295,628 UART: [kat] HMAC-384Kdf
3,308,775 UART: [kat] LMS
3,840,601 UART: [kat] --
3,844,941 UART: [cold-reset] ++
3,847,354 UART: [fht] FHT @ 0x50003400
3,858,434 UART: [idev] ++
3,859,103 UART: [idev] CDI.KEYID = 6
3,860,036 UART: [idev] SUBJECT.KEYID = 7
3,861,247 UART: [idev] UDS.KEYID = 0
3,876,169 UART: [idev] Erasing UDS.KEYID = 0
6,336,000 UART: [idev] Sha1 KeyId Algorithm
6,358,480 UART: [idev] CSR upload begun
6,363,522 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,080,830 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,096,037 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,111,152 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,126,082 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,151,222 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,140 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = Yes
86,405 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,194 UART: [kat] SHA2-512-ACC
897,095 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,475,919 UART: [cold-reset] ++
1,476,256 UART: [fht] Storing FHT @ 0x50003400
1,479,191 UART: [idev] ++
1,479,359 UART: [idev] CDI.KEYID = 6
1,479,719 UART: [idev] SUBJECT.KEYID = 7
1,480,143 UART: [idev] UDS.KEYID = 0
1,488,026 UART: [idev] Erasing UDS.KEYID = 0
1,504,657 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,241 UART: [idev] CSR upload requested
1,515,087 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,666 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,378 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,280 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,542,984 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,519 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = Yes
86,412 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,524 UART: [kat] SHA2-256
892,462 UART: [kat] SHA2-384
895,167 UART: [kat] SHA2-512-ACC
897,068 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,712 UART: [cold-reset] ++
1,477,117 UART: [fht] Storing FHT @ 0x50003400
1,479,820 UART: [idev] ++
1,479,988 UART: [idev] CDI.KEYID = 6
1,480,348 UART: [idev] SUBJECT.KEYID = 7
1,480,772 UART: [idev] UDS.KEYID = 0
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,844 UART: [idev] CSR upload requested
1,515,690 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,567 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,279 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,181 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,885 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,420 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = Yes
86,661 UART: [state] Starting the WD Timer 40000000 cycles
88,276 UART: [kat] SHA2-256
893,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,051 UART: [kat] ++
898,203 UART: [kat] sha1
902,507 UART: [kat] SHA2-256
904,447 UART: [kat] SHA2-384
907,296 UART: [kat] SHA2-512-ACC
909,197 UART: [kat] ECC-384
918,860 UART: [kat] HMAC-384Kdf
923,646 UART: [kat] LMS
1,171,974 UART: [kat] --
1,172,501 UART: [cold-reset] ++
1,172,852 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,560 UART: [idev] Sha1 KeyId Algorithm
1,209,801 UART: [idev] CSR upload begun
1,211,582 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,150 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,862 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,764 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,468 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,003 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = Yes
86,764 UART: [state] Starting the WD Timer 40000000 cycles
88,469 UART: [kat] SHA2-256
894,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,244 UART: [kat] ++
898,396 UART: [kat] sha1
902,508 UART: [kat] SHA2-256
904,448 UART: [kat] SHA2-384
907,433 UART: [kat] SHA2-512-ACC
909,334 UART: [kat] ECC-384
919,175 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,173,128 UART: [cold-reset] ++
1,173,537 UART: [fht] FHT @ 0x50003400
1,176,100 UART: [idev] ++
1,176,268 UART: [idev] CDI.KEYID = 6
1,176,628 UART: [idev] SUBJECT.KEYID = 7
1,177,052 UART: [idev] UDS.KEYID = 0
1,184,861 UART: [idev] Erasing UDS.KEYID = 0
1,202,061 UART: [idev] Sha1 KeyId Algorithm
1,210,448 UART: [idev] CSR upload begun
1,212,229 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,223,221 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,933 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,835 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,240,539 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,249,074 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,687 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = Yes
86,031 UART: [state] Starting the WD Timer 40000000 cycles
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
903,988 UART: [kat] SHA2-512-ACC
905,889 UART: [kat] ECC-384
915,654 UART: [kat] HMAC-384Kdf
920,274 UART: [kat] LMS
1,168,586 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,169,808 UART: [fht] FHT @ 0x50003400
1,172,372 UART: [idev] ++
1,172,540 UART: [idev] CDI.KEYID = 6
1,172,901 UART: [idev] SUBJECT.KEYID = 7
1,173,326 UART: [idev] UDS.KEYID = 0
1,181,145 UART: [idev] Erasing UDS.KEYID = 0
1,198,054 UART: [idev] Sha1 KeyId Algorithm
1,206,515 UART: [idev] CSR upload begun
1,208,294 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,863 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,224,576 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,230,481 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,236,186 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,244,730 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = Yes
86,282 UART: [state] Starting the WD Timer 40000000 cycles
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,823 UART: [idev] Sha1 KeyId Algorithm
1,208,086 UART: [idev] CSR upload begun
1,209,865 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,796 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,226,509 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,232,414 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,238,119 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,663 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
Truncated 5078 bytes from beginning
50AD760F1F2C5EA2DB4E77A07322D4DD35BA6A5D1DBD2AF8
36,342,633 UART: [art] SIG.S = 26836F8EE4B79C7A84513001D9AB7F45D918DB53D4CB836B17280909E2B234E5BA1ADB570DA38226CA825F0CB52B4019
37,647,571 UART: Caliptra RT
37,648,298 UART: [state] CFI Enabled
37,809,327 UART: [rt] RT listening for mailbox commands...
37,963,625 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,407,537 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,842,752 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [ee, e3, 5b, 03, 0a, 5a, c8, 26, ae, 29, 93, 2c, 96, 6d, 08, 28, 14, 07, 57, 50, c7, 0d, 32, 94, 7f, 82, f1, d1, 94, db, 07, 10, 3d, 73, 6d, 8d, 95, df, 87, f0, 32, 9e, ac, 31, b1, 3f, 96, 82]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:7a:eb:78:ea:25:81:14:d8:30:39:31:97:85:bb:a8:ca:4b:bd:ac
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=867AEB78EA258114D83039319785BBA8CA4BBDACFFCBEB9CA1CF30A33BBA200E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:57:8e:33:7d:51:23:13:b8:f2:2c:a8:f3:8b:53:
a6:f0:3f:f8:15:01:fd:63:29:29:ee:98:7c:94:b5:
ef:64:e4:cf:96:d4:9c:99:8e:39:da:7c:a5:69:97:
6c:97:47:17:94:58:9b:b0:a1:49:4c:75:ba:64:05:
6c:ee:ba:08:33:d0:4b:d3:0e:a5:23:0c:50:5a:f1:
fc:62:78:11:9a:35:de:c0:b3:c1:2b:c4:b7:51:7c:
ab:08:96:7e:47:1f:0f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.[..&.Z
,.).(.m.PW...2..........ms=....1..2..?...RT_INFO
X509v3 Subject Key Identifier:
86:7A:EB:78:EA:25:81:14:D8:30:39:31:97:85:BB:A8:CA:4B:BD:AC
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:64:b8:43:fc:69:2c:6d:9f:2d:fa:a6:7a:c4:65:
71:54:ff:b1:c8:4c:06:0f:f7:15:50:ad:76:0f:1f:2c:5e:a2:
db:4e:77:a0:73:22:d4:dd:35:ba:6a:5d:1d:bd:2a:f8:02:30:
26:83:6f:8e:e4:b7:9c:7a:84:51:30:01:d9:ab:7f:45:d9:18:
db:53:d4:cb:83:6b:17:28:09:09:e2:b2:34:e5:ba:1a:db:57:
0d:a3:82:26:ca:82:5f:0c:b5:2b:40:19
41,299,373 <<< Executing mbox cmd 0x46574c44 (111808 bytes) from SoC
41,441,783 UART:
41,442,161 UART: Running Caliptra ROM ...
41,443,210 UART:
41,443,364 UART: [state] CFI Enabled
41,503,072 UART: [state] LifecycleState = Production
41,504,933 UART: [state] DebugLocked = Yes
41,507,246 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,513,432 UART: [kat] SHA2-256
41,683,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,693,618 UART: [kat] ++
41,694,069 UART: [kat] sha1
41,704,955 UART: [kat] SHA2-256
41,707,692 UART: [kat] SHA2-384
41,713,574 UART: [kat] SHA2-512-ACC
41,715,960 UART: [kat] ECC-384
44,004,938 UART: [kat] HMAC-384Kdf
44,017,742 UART: [kat] LMS
45,208,067 UART: [kat] --
45,213,102 UART: [update-reset] ++
54,339,874 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,343,880 UART: [update-reset] Loading Runtime at address 0x40005000 len 87104
54,718,010 >>> mbox cmd response: success
54,719,075 UART: [update-reset] Copying MAN_2 To MAN_1
54,741,539 UART: [update-reset Success] --
54,745,183 UART: [state] Locking Datavault
54,748,218 UART: [state] Locking PCR0, PCR1 and PCR31
54,750,021 UART: [state] Locking ICCM
54,752,697 UART: [exit] Launching FMC @ 0x40000130
54,761,156 UART:
54,761,406 UART: Running Caliptra FMC ...
54,762,507 UART:
54,762,663 UART: [state] CFI Enabled
54,866,735 UART: [art] Extend RT PCRs Done
54,867,914 UART: [art] Lock RT PCRs Done
54,869,364 UART: [art] Populate DV Done
54,875,149 UART: [fht] FMC Alias Private Key: 7
54,876,844 UART: [art] Derive CDI
54,877,672 UART: [art] Store in in slot 0x4
54,936,147 UART: [art] Derive Key Pair
54,937,184 UART: [art] Store priv key in slot 0x5
58,229,927 UART: [art] Derive Key Pair - Done
58,242,727 UART: [art] Signing Cert with AUTHO
58,244,041 UART: RITY.KEYID = 7
60,531,941 UART: [art] Erasing AUTHORITY.KEYID = 7
60,533,446 UART: [art] PUB.X = 19BE93FACDF28C5A9E122158B7EC3DD076F1E55E26841955E2C36A531A3219C433AA368C4D1382FC22FC54D7F1DC1BD5
60,540,691 UART: [art] PUB.Y = 505D846BC10EE66049ACA96AFD2FDC32829E469BB15FA9A278987B6074E8D55AEFDAA44F1AC290257FB1369A25BC4D4E
60,547,982 UART: [art] SIG.R = EC52BF1C7459B43230E42A8CCF716F3FA7DDED3F62FBB47F0059151001FBE34E5AD8A1ABEC2C2745851950D51EFE04E6
60,555,377 UART: [art] SIG.S = 69E26A824AEAB0A7BAE63BC07D061AC515BA9D727A3CDD8A3D6A9E0308B42BC7EEFEEBCF1C9A5A14AE619C9AA025FD55
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:4d:84:3b:7a:9c:90:cb:e2:b2:54:48:9e:74:b0:0f:a5:8e:2f:23
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=254D843B7A9C90CBE2B254489E74B00FA58E2F239AAF2132CECD035FAEFE097E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:19:be:93:fa:cd:f2:8c:5a:9e:12:21:58:b7:ec:
3d:d0:76:f1:e5:5e:26:84:19:55:e2:c3:6a:53:1a:
32:19:c4:33:aa:36:8c:4d:13:82:fc:22:fc:54:d7:
f1:dc:1b:d5:50:5d:84:6b:c1:0e:e6:60:49:ac:a9:
6a:fd:2f:dc:32:82:9e:46:9b:b1:5f:a9:a2:78:98:
7b:60:74:e8:d5:5a:ef:da:a4:4f:1a:c2:90:25:7f:
b1:36:9a:25:bc:4d:4e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.b.,}H...-..a"...s....g....e.@..."..l...TY..V.[t..RT_INFO
X509v3 Subject Key Identifier:
25:4D:84:3B:7A:9C:90:CB:E2:B2:54:48:9E:74:B0:0F:A5:8E:2F:23
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ec:52:bf:1c:74:59:b4:32:30:e4:2a:8c:cf:
71:6f:3f:a7:dd:ed:3f:62:fb:b4:7f:00:59:15:10:01:fb:e3:
4e:5a:d8:a1:ab:ec:2c:27:45:85:19:50:d5:1e:fe:04:e6:02:
30:69:e2:6a:82:4a:ea:b0:a7:ba:e6:3b:c0:7d:06:1a:c5:15:
ba:9d:72:7a:3c:dd:8a:3d:6a:9e:03:08:b4:2b:c7:ee:fe:eb:
cf:1c:9a:5a:14:ae:61:9c:9a:a0:25:fd:55
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.24s
Truncated 558 bytes from beginning
7 ready_for_fw is high
3,785,534 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,805,967 >>> mbox cmd response: success
27,509,222 UART:
27,509,654 UART: Running Caliptra FMC ...
27,510,780 UART:
27,510,929 UART: [state] CFI Enabled
27,578,672 UART: [fht] FMC Alias Private Key: 7
29,916,557 UART: [art] Extend RT PCRs Done
29,917,787 UART: [art] Lock RT PCRs Done
29,919,262 UART: [art] Populate DV Done
29,924,681 UART: [fht] FMC Alias Private Key: 7
29,926,272 UART: [art] Derive CDI
29,927,081 UART: [art] Store in in slot 0x4
29,987,730 UART: [art] Derive Key Pair
29,988,772 UART: [art] Store priv key in slot 0x5
33,281,286 UART: [art] Derive Key Pair - Done
33,294,571 UART: [art] Signing Cert with AUTHO
33,295,872 UART: RITY.KEYID = 7
35,576,189 UART: [art] Erasing AUTHORITY.KEYID = 7
35,577,714 UART: [art] PUB.X = C2C47C052224D851028BD51704DA4E1DFF61A4A1E235B8E066B7D16000F4056A75C12B3C5F2E14EC053AB48BD764855E
35,584,918 UART: [art] PUB.Y = D3886A1446839F9AAA4EC8514E2907DDAF14F9A6A74FEC7A0E700CF268A930C46A2F13FBB11D77936B535FBDE04B349A
35,592,184 UART: [art] SIG.R = 08CBD29C8D6BBF5FCD5F283150329BA1F9B5D567B4709BD8CFAE63019E101889EDE3280A3AAC2F7217E500D222616787
35,599,577 UART: [art] SIG.S = 7D21207947EC66159526112573B01E41E40CBE1B8769E7D7C0A29B717DF2041418DD75D4F17A1EE537AC059206EB443E
36,905,095 UART: Caliptra RT
36,905,816 UART: [state] CFI Enabled
37,065,841 UART: [rt] RT listening for mailbox commands...
37,096,865 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,541,405 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
37,974,885 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [ee, e3, 5b, 03, 0a, 5a, c8, 26, ae, 29, 93, 2c, 96, 6d, 08, 28, 14, 07, 57, 50, c7, 0d, 32, 94, 7f, 82, f1, d1, 94, db, 07, 10, 3d, 73, 6d, 8d, 95, df, 87, f0, 32, 9e, ac, 31, b1, 3f, 96, 82]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3e:29:20:0e:3b:6f:cf:f8:6c:16:6e:37:19:08:26:6e:77:43:d5:45
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BA29200E3B6FCFF86C166E371908266E7743D5453907539751C5C829904B241F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c2:c4:7c:05:22:24:d8:51:02:8b:d5:17:04:da:
4e:1d:ff:61:a4:a1:e2:35:b8:e0:66:b7:d1:60:00:
f4:05:6a:75:c1:2b:3c:5f:2e:14:ec:05:3a:b4:8b:
d7:64:85:5e:d3:88:6a:14:46:83:9f:9a:aa:4e:c8:
51:4e:29:07:dd:af:14:f9:a6:a7:4f:ec:7a:0e:70:
0c:f2:68:a9:30:c4:6a:2f:13:fb:b1:1d:77:93:6b:
53:5f:bd:e0:4b:34:9a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.[..&.Z
,.).(.m.PW...2..........ms=....1..2..?...RT_INFO
X509v3 Subject Key Identifier:
BA:29:20:0E:3B:6F:CF:F8:6C:16:6E:37:19:08:26:6E:77:43:D5:45
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:08:cb:d2:9c:8d:6b:bf:5f:cd:5f:28:31:50:32:
9b:a1:f9:b5:d5:67:b4:70:9b:d8:cf:ae:63:01:9e:10:18:89:
ed:e3:28:0a:3a:ac:2f:72:17:e5:00:d2:22:61:67:87:02:30:
7d:21:20:79:47:ec:66:15:95:26:11:25:73:b0:1e:41:e4:0c:
be:1b:87:69:e7:d7:c0:a2:9b:71:7d:f2:04:14:18:dd:75:d4:
f1:7a:1e:e5:37:ac:05:92:06:eb:44:3e
40,435,893 <<< Executing mbox cmd 0x46574c44 (111808 bytes) from SoC
53,691,771 >>> mbox cmd response: success
53,724,392 UART:
53,724,759 UART: Running Caliptra FMC ...
53,725,907 UART:
53,726,061 UART: [state] CFI Enabled
53,822,495 UART: [art] Extend RT PCRs Done
53,823,689 UART: [art] Lock RT PCRs Done
53,825,173 UART: [art] Populate DV Done
53,830,579 UART: [fht] FMC Alias Private Key: 7
53,832,275 UART: [art] Derive CDI
53,833,008 UART: [art] Store in in slot 0x4
53,891,698 UART: [art] Derive Key Pair
53,892,737 UART: [art] Store priv key in slot 0x5
57,185,733 UART: [art] Derive Key Pair - Done
57,198,792 UART: [art] Signing Cert with AUTHO
57,200,113 UART: RITY.KEYID = 7
59,488,652 UART: [art] Erasing AUTHORITY.KEYID = 7
59,490,162 UART: [art] PUB.X = 5BEA4DDD60D4E6F8953727A46743D9856ABDF4FEB4BB661B13ED78404BA7F4E43F4A58E4768E2EB3EDE38D67AA05F3D7
59,497,414 UART: [art] PUB.Y = E9110F6BBBAB64C408C682579D42D41FC2732161720FA3F61DEF4CDA13DB36A11B76F76786D853EBD2136834C17F2E55
59,504,644 UART: [art] SIG.R = 5848DD53B6A5FC6620913A1CCED1B0C11176ABAC5D43DFD615A8CB4BD0D41F84713E8D59C15F3671626C4D99C7598672
59,512,048 UART: [art] SIG.S = A628B80720A18C8962F5BC2757149D896A47AF5BAD033AEB5FA4FC3FA246397E044CF0071E28D793EC40A50AA9EA4A59
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:2c:36:f6:07:76:40:01:d6:c7:15:be:44:75:dc:42:2c:60:15:c2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CE2C36F607764001D6C715BE4475DC422C6015C20C0DEBF972155A81363981D0
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5b:ea:4d:dd:60:d4:e6:f8:95:37:27:a4:67:43:
d9:85:6a:bd:f4:fe:b4:bb:66:1b:13:ed:78:40:4b:
a7:f4:e4:3f:4a:58:e4:76:8e:2e:b3:ed:e3:8d:67:
aa:05:f3:d7:e9:11:0f:6b:bb:ab:64:c4:08:c6:82:
57:9d:42:d4:1f:c2:73:21:61:72:0f:a3:f6:1d:ef:
4c:da:13:db:36:a1:1b:76:f7:67:86:d8:53:eb:d2:
13:68:34:c1:7f:2e:55
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.b.,}H...-..a"...s....g....e.@..."..l...TY..V.[t..RT_INFO
X509v3 Subject Key Identifier:
CE:2C:36:F6:07:76:40:01:D6:C7:15:BE:44:75:DC:42:2C:60:15:C2
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:58:48:dd:53:b6:a5:fc:66:20:91:3a:1c:ce:d1:
b0:c1:11:76:ab:ac:5d:43:df:d6:15:a8:cb:4b:d0:d4:1f:84:
71:3e:8d:59:c1:5f:36:71:62:6c:4d:99:c7:59:86:72:02:31:
00:a6:28:b8:07:20:a1:8c:89:62:f5:bc:27:57:14:9d:89:6a:
47:af:5b:ad:03:3a:eb:5f:a4:fc:3f:a2:46:39:7e:04:4c:f0:
07:1e:28:d7:93:ec:40:a5:0a:a9:ea:4a:59
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.19s
Truncated 5081 bytes from beginning
7FCB1E3B977F17D8AED13178BE62ABCD5A187205B05D7
36,352,390 UART: [art] SIG.S = 32264178A0FF6467F06E820B1A49E5254E9837B139C7304F2BD0D0EFFA43E653ADBD34DA1891892244E77B14DEAF3B7A
37,658,302 UART: Caliptra RT
37,659,034 UART: [state] CFI Enabled
37,776,807 UART: [rt] RT listening for mailbox commands...
37,928,467 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,373,723 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,808,729 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [ee, e3, 5b, 03, 0a, 5a, c8, 26, ae, 29, 93, 2c, 96, 6d, 08, 28, 14, 07, 57, 50, c7, 0d, 32, 94, 7f, 82, f1, d1, 94, db, 07, 10, 3d, 73, 6d, 8d, 95, df, 87, f0, 32, 9e, ac, 31, b1, 3f, 96, 82]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
66:dc:9c:1d:80:dd:a1:7a:0a:57:ec:2b:62:48:e8:0a:81:83:d0:2e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E2DC9C1D80DDA17A0A57EC2B6248E80A8183D02E0AC4398EBCD35F9B8DBDB23B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:16:7d:c4:63:4c:e9:0e:9a:f5:d8:55:5a:e0:00:
70:2e:48:25:f4:c3:f8:b3:bf:42:b2:60:44:9b:d0:
5c:99:65:62:d2:36:fe:fb:d0:ff:7c:df:b9:73:cf:
37:d3:6c:51:d1:72:e1:ae:cc:f3:d1:57:a9:b6:bb:
11:92:5a:55:0a:91:fa:d9:0f:b2:77:d0:50:c7:c4:
ad:d8:9a:89:60:dc:2c:5d:fb:c9:53:7f:58:6d:d1:
64:b1:76:b7:65:33:be
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.[..&.Z
,.).(.m.PW...2..........ms=....1..2..?...RT_INFO
X509v3 Subject Key Identifier:
E2:DC:9C:1D:80:DD:A1:7A:0A:57:EC:2B:62:48:E8:0A:81:83:D0:2E
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:68:91:b0:cd:fe:cb:c0:32:ab:01:2d:05:12:ee:
6a:44:68:db:8c:de:c7:ca:a8:18:f4:37:fc:b1:e3:b9:77:f1:
7d:8a:ed:13:17:8b:e6:2a:bc:d5:a1:87:20:5b:05:d7:02:30:
32:26:41:78:a0:ff:64:67:f0:6e:82:0b:1a:49:e5:25:4e:98:
37:b1:39:c7:30:4f:2b:d0:d0:ef:fa:43:e6:53:ad:bd:34:da:
18:91:89:22:44:e7:7b:14:de:af:3b:7a
41,271,739 <<< Executing mbox cmd 0x46574c44 (111808 bytes) from SoC
41,414,130 UART:
41,414,483 UART: Running Caliptra ROM ...
41,415,565 UART:
41,415,777 UART: [state] CFI Enabled
41,434,293 UART: [state] LifecycleState = Production
41,436,128 UART: [state] DebugLocked = Yes
41,437,818 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,443,201 UART: [kat] SHA2-256
41,612,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,623,489 UART: [kat] ++
41,623,973 UART: [kat] sha1
41,634,532 UART: [kat] SHA2-256
41,637,233 UART: [kat] SHA2-384
41,642,298 UART: [kat] SHA2-512-ACC
41,644,698 UART: [kat] ECC-384
43,930,767 UART: [kat] HMAC-384Kdf
43,942,728 UART: [kat] LMS
45,132,846 UART: [kat] --
45,136,440 UART: [update-reset] ++
54,181,381 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,184,533 UART: [update-reset] Loading Runtime at address 0x40005000 len 87104
54,558,701 >>> mbox cmd response: success
54,560,006 UART: [update-reset] Copying MAN_2 To MAN_1
54,582,409 UART: [update-reset Success] --
54,587,186 UART: [state] Locking Datavault
54,590,654 UART: [state] Locking PCR0, PCR1 and PCR31
54,592,407 UART: [state] Locking ICCM
54,595,096 UART: [exit] Launching FMC @ 0x40000130
54,603,551 UART:
54,603,782 UART: Running Caliptra FMC ...
54,604,879 UART:
54,605,037 UART: [state] CFI Enabled
54,649,001 UART: [art] Extend RT PCRs Done
54,650,185 UART: [art] Lock RT PCRs Done
54,651,582 UART: [art] Populate DV Done
54,656,879 UART: [fht] FMC Alias Private Key: 7
54,658,429 UART: [art] Derive CDI
54,659,242 UART: [art] Store in in slot 0x4
54,702,425 UART: [art] Derive Key Pair
54,703,422 UART: [art] Store priv key in slot 0x5
57,945,258 UART: [art] Derive Key Pair - Done
57,958,380 UART: [art] Signing Cert with AUTHO
57,959,682 UART: RITY.KEYID = 7
60,238,593 UART: [art] Erasing AUTHORITY.KEYID = 7
60,240,095 UART: [art] PUB.X = 5305137713E667A087B1E9F5E3F1A260360FD7A8C6CDF4B4AFE21972D883E010BB86728E2B4D4E2D31173A46C4499E7B
60,247,362 UART: [art] PUB.Y = 384A7D096B642C788FCADEDE2C66F2C733380D0F6974EB88AE94419A86808F59B2B33658950B384DC56F52CB62CF0D95
60,254,606 UART: [art] SIG.R = A8BA443B62B1314C7CE56330255D61CE556366B28259CA4119AC62E4BA9FB9950E364ABBFD80C5312A8C22AF77385B2C
60,261,942 UART: [art] SIG.S = CDCD49E5666D771EF1B1FDE74326D29A54211A4ECB01F0F163AE41BB2FC7AF4C3AE6988EEE40AE63D6AD0A7ED52F958B
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:97:23:c7:37:e9:28:07:50:4c:60:0e:fc:5f:00:21:c6:a4:28:94
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9D9723C737E92807504C600EFC5F0021C6A42894D83F034BD92E2A6295B9D0E1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:53:05:13:77:13:e6:67:a0:87:b1:e9:f5:e3:f1:
a2:60:36:0f:d7:a8:c6:cd:f4:b4:af:e2:19:72:d8:
83:e0:10:bb:86:72:8e:2b:4d:4e:2d:31:17:3a:46:
c4:49:9e:7b:38:4a:7d:09:6b:64:2c:78:8f:ca:de:
de:2c:66:f2:c7:33:38:0d:0f:69:74:eb:88:ae:94:
41:9a:86:80:8f:59:b2:b3:36:58:95:0b:38:4d:c5:
6f:52:cb:62:cf:0d:95
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.b.,}H...-..a"...s....g....e.@..."..l...TY..V.[t..RT_INFO
X509v3 Subject Key Identifier:
9D:97:23:C7:37:E9:28:07:50:4C:60:0E:FC:5F:00:21:C6:A4:28:94
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a8:ba:44:3b:62:b1:31:4c:7c:e5:63:30:25:
5d:61:ce:55:63:66:b2:82:59:ca:41:19:ac:62:e4:ba:9f:b9:
95:0e:36:4a:bb:fd:80:c5:31:2a:8c:22:af:77:38:5b:2c:02:
31:00:cd:cd:49:e5:66:6d:77:1e:f1:b1:fd:e7:43:26:d2:9a:
54:21:1a:4e:cb:01:f0:f1:63:ae:41:bb:2f:c7:af:4c:3a:e6:
98:8e:ee:40:ae:63:d6:ad:0a:7e:d5:2f:95:8b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.23s
Truncated 567 bytes from beginning
or_fw is high
4,125,220 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,286,968 >>> mbox cmd response: success
27,926,454 UART:
27,926,884 UART: Running Caliptra FMC ...
27,928,015 UART:
27,928,186 UART: [state] CFI Enabled
27,936,358 UART: [fht] FMC Alias Private Key: 7
30,267,116 UART: [art] Extend RT PCRs Done
30,268,347 UART: [art] Lock RT PCRs Done
30,270,093 UART: [art] Populate DV Done
30,275,522 UART: [fht] FMC Alias Private Key: 7
30,277,220 UART: [art] Derive CDI
30,277,954 UART: [art] Store in in slot 0x4
30,320,603 UART: [art] Derive Key Pair
30,321,644 UART: [art] Store priv key in slot 0x5
33,563,205 UART: [art] Derive Key Pair - Done
33,576,324 UART: [art] Signing Cert with AUTHO
33,577,653 UART: RITY.KEYID = 7
35,857,283 UART: [art] Erasing AUTHORITY.KEYID = 7
35,858,791 UART: [art] PUB.X = 35E5C7F59329F269B4FF8E54BC7C7A544C5118AAD2D9C39C4FDEE66BFCEE6B12BFCBDD3EC35E2B5C81628DFF155C8DB1
35,866,045 UART: [art] PUB.Y = 2E3F8327E3B4F5388BC5F01AF763710BF0568870295F295FD84415CBE07008BB66C02E892861C06F4841E24650E3C680
35,873,259 UART: [art] SIG.R = 8A00113C88AFEDDBEF7D8004AFD6124E977F9AF0F7B2D63389190334F03FD53E7E09F1D5941E7918F3F1454E635BA966
35,880,656 UART: [art] SIG.S = E56BE2C982C838BFC1A56BFE89C6A17F8E0D5570FD934FA0CAAFE4993C0B5BA078CFEBCC9CD6F76FF9DD53EBD445A9FC
37,186,119 UART: Caliptra RT
37,186,835 UART: [state] CFI Enabled
37,304,550 UART: [rt] RT listening for mailbox commands...
37,335,430 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,781,348 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,216,123 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [ee, e3, 5b, 03, 0a, 5a, c8, 26, ae, 29, 93, 2c, 96, 6d, 08, 28, 14, 07, 57, 50, c7, 0d, 32, 94, 7f, 82, f1, d1, 94, db, 07, 10, 3d, 73, 6d, 8d, 95, df, 87, f0, 32, 9e, ac, 31, b1, 3f, 96, 82]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:99:cd:1e:8c:af:8c:a6:85:93:0d:df:f5:3f:56:7e:5e:7a:bf:0e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6F99CD1E8CAF8CA685930DDFF53F567E5E7ABF0E68F48CE44DB52E4E88307AFB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:35:e5:c7:f5:93:29:f2:69:b4:ff:8e:54:bc:7c:
7a:54:4c:51:18:aa:d2:d9:c3:9c:4f:de:e6:6b:fc:
ee:6b:12:bf:cb:dd:3e:c3:5e:2b:5c:81:62:8d:ff:
15:5c:8d:b1:2e:3f:83:27:e3:b4:f5:38:8b:c5:f0:
1a:f7:63:71:0b:f0:56:88:70:29:5f:29:5f:d8:44:
15:cb:e0:70:08:bb:66:c0:2e:89:28:61:c0:6f:48:
41:e2:46:50:e3:c6:80
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.[..&.Z
,.).(.m.PW...2..........ms=....1..2..?...RT_INFO
X509v3 Subject Key Identifier:
6F:99:CD:1E:8C:AF:8C:A6:85:93:0D:DF:F5:3F:56:7E:5E:7A:BF:0E
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:8a:00:11:3c:88:af:ed:db:ef:7d:80:04:af:
d6:12:4e:97:7f:9a:f0:f7:b2:d6:33:89:19:03:34:f0:3f:d5:
3e:7e:09:f1:d5:94:1e:79:18:f3:f1:45:4e:63:5b:a9:66:02:
31:00:e5:6b:e2:c9:82:c8:38:bf:c1:a5:6b:fe:89:c6:a1:7f:
8e:0d:55:70:fd:93:4f:a0:ca:af:e4:99:3c:0b:5b:a0:78:cf:
eb:cc:9c:d6:f7:6f:f9:dd:53:eb:d4:45:a9:fc
40,684,687 <<< Executing mbox cmd 0x46574c44 (111808 bytes) from SoC
53,641,692 >>> mbox cmd response: success
53,677,193 UART:
53,677,540 UART: Running Caliptra FMC ...
53,678,750 UART:
53,678,923 UART: [state] CFI Enabled
53,722,673 UART: [art] Extend RT PCRs Done
53,723,840 UART: [art] Lock RT PCRs Done
53,725,485 UART: [art] Populate DV Done
53,730,884 UART: [fht] FMC Alias Private Key: 7
53,732,529 UART: [art] Derive CDI
53,733,342 UART: [art] Store in in slot 0x4
53,776,003 UART: [art] Derive Key Pair
53,777,054 UART: [art] Store priv key in slot 0x5
57,018,557 UART: [art] Derive Key Pair - Done
57,031,454 UART: [art] Signing Cert with AUTHO
57,032,798 UART: RITY.KEYID = 7
59,312,184 UART: [art] Erasing AUTHORITY.KEYID = 7
59,313,699 UART: [art] PUB.X = A724E68F47D8B46A5541398AA0CD3B60DCAC4531982D48FCBFCCB0FD9D9947DFF8FB8459690DF479ED470BDA29F43C9A
59,321,014 UART: [art] PUB.Y = 6E1BAC3FDC79DEE124AE85453F75DAEF7F62D664653D6F26B436DBC35C65DEBF9AA3C4C54C8E13DA7B0EECA210A37DF1
59,328,257 UART: [art] SIG.R = DB7E3F53E144397EA687874F2EE5D203A236005E56EAE8C029185BEE20880B043F0546F2033CB011C6C4A16AFE95E8FE
59,335,613 UART: [art] SIG.S = 94E72178DB134E44151BBAC962DCC20475008A267D3FE3A33600FF66543F7BE57998C82D2568BAB54B74E989CD0CE1BD
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:02:7a:e5:3f:2a:4a:7e:94:bf:a5:b0:53:c9:72:a2:10:9a:f9:10
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EC027AE53F2A4A7E94BFA5B053C972A2109AF9104AC696079E095B716363A488
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a7:24:e6:8f:47:d8:b4:6a:55:41:39:8a:a0:cd:
3b:60:dc:ac:45:31:98:2d:48:fc:bf:cc:b0:fd:9d:
99:47:df:f8:fb:84:59:69:0d:f4:79:ed:47:0b:da:
29:f4:3c:9a:6e:1b:ac:3f:dc:79:de:e1:24:ae:85:
45:3f:75:da:ef:7f:62:d6:64:65:3d:6f:26:b4:36:
db:c3:5c:65:de:bf:9a:a3:c4:c5:4c:8e:13:da:7b:
0e:ec:a2:10:a3:7d:f1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.b.,}H...-..a"...s....g....e.@..."..l...TY..V.[t..RT_INFO
X509v3 Subject Key Identifier:
EC:02:7A:E5:3F:2A:4A:7E:94:BF:A5:B0:53:C9:72:A2:10:9A:F9:10
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:db:7e:3f:53:e1:44:39:7e:a6:87:87:4f:2e:
e5:d2:03:a2:36:00:5e:56:ea:e8:c0:29:18:5b:ee:20:88:0b:
04:3f:05:46:f2:03:3c:b0:11:c6:c4:a1:6a:fe:95:e8:fe:02:
31:00:94:e7:21:78:db:13:4e:44:15:1b:ba:c9:62:dc:c2:04:
75:00:8a:26:7d:3f:e3:a3:36:00:ff:66:54:3f:7b:e5:79:98:
c8:2d:25:68:ba:b5:4b:74:e9:89:cd:0c:e1:bd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.18s
Truncated 4978 bytes from beginning
B71678AB9B42D03E2EE873CAA8B5BA7156472B01C2163D236A1160EDE1EF06AE9007CD8593B89D135D2E36C9D9B7
25,973,756 UART: [art] SIG.S = 97669AC7527764729B4C5FBA6B9B7D80AEE966502E552563784177BB097AA72B0923307416E267A61FC0F61C655731A1
26,952,843 UART: Caliptra RT
26,953,580 UART: [state] CFI Enabled
27,117,022 UART: [rt] RT listening for mailbox commands...
27,272,306 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,717,656 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,153,594 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:58:f8:ab:d7:7f:84:65:59:54:4a:4a:fe:6a:e5:eb:76:b4:b1:d2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C958F8ABD77F846559544A4AFE6AE5EB76B4B1D2995F16BC969C5E2D14D6B705
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8d:b9:55:19:19:36:3b:6c:19:a7:b9:62:a3:c7:
30:80:cc:f2:83:38:ee:3c:6d:b4:0d:1b:69:92:d4:
e8:34:cd:0d:b4:97:60:d4:a6:f8:a6:e2:1c:bc:78:
aa:c2:9d:92:31:aa:96:2a:dc:c1:cb:9c:6e:ae:70:
da:a6:c3:7d:1a:89:4f:9c:ec:f8:68:fe:23:99:75:
82:98:41:a6:2d:a4:9b:80:51:14:f6:05:16:7a:11:
8a:52:a5:03:f0:c4:aa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
C9:58:F8:AB:D7:7F:84:65:59:54:4A:4A:FE:6A:E5:EB:76:B4:B1:D2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e4:1f:b7:16:78:ab:9b:42:d0:3e:2e:e8:73:
ca:a8:b5:ba:71:56:47:2b:01:c2:16:3d:23:6a:11:60:ed:e1:
ef:06:ae:90:07:cd:85:93:b8:9d:13:5d:2e:36:c9:d9:b7:02:
31:00:97:66:9a:c7:52:77:64:72:9b:4c:5f:ba:6b:9b:7d:80:
ae:e9:66:50:2e:55:25:63:78:41:77:bb:09:7a:a7:2b:09:23:
30:74:16:e2:67:a6:1f:c0:f6:1c:65:57:31:a1
30,611,736 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
30,753,993 UART:
30,754,393 UART: Running Caliptra ROM ...
30,755,528 UART:
30,755,689 UART: [state] CFI Enabled
30,811,563 UART: [state] LifecycleState = Production
30,813,347 UART: [state] DebugLocked = Yes
30,816,179 UART: [state] Starting the WD Timer 40000000 cycles
30,821,500 UART: [kat] SHA2-256
31,000,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,012,236 UART: [kat] ++
31,012,832 UART: [kat] sha1
31,023,834 UART: [kat] SHA2-256
31,026,848 UART: [kat] SHA2-384
31,033,206 UART: [kat] SHA2-512-ACC
31,036,154 UART: [kat] ECC-384
33,494,029 UART: [kat] HMAC-384Kdf
33,517,338 UART: [kat] LMS
34,046,833 UART: [kat] --
34,052,010 UART: [update-reset] ++
38,666,188 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,669,454 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
39,044,659 >>> mbox cmd response: success
39,045,590 UART: [update-reset] Copying MAN_2 To MAN_1
39,067,949 UART: [update-reset Success] --
39,073,053 UART: [state] Locking Datavault
39,076,201 UART: [state] Locking PCR0, PCR1 and PCR31
39,077,851 UART: [state] Locking ICCM
39,080,056 UART: [exit] Launching FMC @ 0x40000130
39,088,510 UART:
39,088,754 UART: Running Caliptra FMC ...
39,089,859 UART:
39,090,025 UART: [state] CFI Enabled
39,182,635 UART: [art] Extend RT PCRs Done
39,183,842 UART: [art] Lock RT PCRs Done
39,184,977 UART: [art] Populate DV Done
39,190,438 UART: [fht] FMC Alias Private Key: 7
39,191,926 UART: [art] Derive CDI
39,192,687 UART: [art] Store in in slot 0x4
39,252,178 UART: [art] Derive Key Pair
39,253,214 UART: [art] Store priv key in slot 0x5
41,716,091 UART: [art] Derive Key Pair - Done
41,728,624 UART: [art] Signing Cert with AUTHO
41,729,933 UART: RITY.KEYID = 7
43,441,867 UART: [art] Erasing AUTHORITY.KEYID = 7
43,443,354 UART: [art] PUB.X = E44B2B819F857C28C07DE101EA4B49668F95EE309530C604FBC04A1340386C121F0E36B38B01049D83B97149B9318786
43,450,597 UART: [art] PUB.Y = C31353799D8F59A9269ED66E9F7E7E30F0F6F2DC238EACCB94A112DA75C0A68FDF6CDE066B84B6FEE0115A3439B721D0
43,457,878 UART: [art] SIG.R = 20E1CA4F7556E2C6228028E9B5319CBDACEC372D429B28D9F0EC38EEF9B270C523D4D5786433881A5FE069E31EEEE87E
43,465,268 UART: [art] SIG.S = 4F0B68FAB0701CD2D9FA744A0DE35690A5AB934B5D80E68E82205948D01149FDF9AF3C0191384330DE2486106D4B28DE
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:dc:1e:77:69:08:0a:68:2f:11:54:b0:c6:1f:7a:99:ca:df:bd:0f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6BDC1E7769080A682F1154B0C61F7A99CADFBD0FA7B8135D1842D0638EF1A512
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e4:4b:2b:81:9f:85:7c:28:c0:7d:e1:01:ea:4b:
49:66:8f:95:ee:30:95:30:c6:04:fb:c0:4a:13:40:
38:6c:12:1f:0e:36:b3:8b:01:04:9d:83:b9:71:49:
b9:31:87:86:c3:13:53:79:9d:8f:59:a9:26:9e:d6:
6e:9f:7e:7e:30:f0:f6:f2:dc:23:8e:ac:cb:94:a1:
12:da:75:c0:a6:8f:df:6c:de:06:6b:84:b6:fe:e0:
11:5a:34:39:b7:21:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
6B:DC:1E:77:69:08:0A:68:2F:11:54:B0:C6:1F:7A:99:CA:DF:BD:0F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:20:e1:ca:4f:75:56:e2:c6:22:80:28:e9:b5:31:
9c:bd:ac:ec:37:2d:42:9b:28:d9:f0:ec:38:ee:f9:b2:70:c5:
23:d4:d5:78:64:33:88:1a:5f:e0:69:e3:1e:ee:e8:7e:02:30:
4f:0b:68:fa:b0:70:1c:d2:d9:fa:74:4a:0d:e3:56:90:a5:ab:
93:4b:5d:80:e6:8e:82:20:59:48:d0:11:49:fd:f9:af:3c:01:
91:38:43:30:de:24:86:10:6d:4b:28:de
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.38s
Truncated 4978 bytes from beginning
CE46FC2AD46702813F655DB50C3E384D00B4C0820E6864595972E8318C88AC3CEEEEB367FDE4D2145882660DCAF4
26,294,820 UART: [art] SIG.S = ABCEBB75ADB2D08DEBDF176B61160E79363518E39CEDB0C4F381A8A17EC565C4AAAB287DD754940D7B070C2D6017DC8C
27,273,881 UART: Caliptra RT
27,274,609 UART: [state] CFI Enabled
27,440,672 UART: [rt] RT listening for mailbox commands...
27,592,415 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,037,693 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,472,882 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:d5:64:96:8e:2e:0a:04:b0:44:83:4c:17:06:c1:cd:88:76:ee:2e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6FD564968E2E0A04B044834C1706C1CD8876EE2E1A27B623F0EA26086C3DA64B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:60:4a:e3:c0:c4:52:51:4e:75:c9:e7:cc:88:
14:dc:29:98:b8:4c:99:7c:72:c6:23:46:44:f9:35:
46:38:a4:e6:da:74:79:8c:6b:b5:58:79:65:ce:32:
cd:7f:8a:a1:a8:fc:99:f0:19:cc:c9:31:36:e4:cd:
62:f2:f2:72:d0:ea:1c:5f:e9:dd:ec:e7:3d:93:0a:
46:62:c0:45:7b:5d:10:c6:17:23:b0:66:e7:7d:4a:
d1:fc:14:e7:50:e8:50
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
6F:D5:64:96:8E:2E:0A:04:B0:44:83:4C:17:06:C1:CD:88:76:EE:2E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:18:b1:ce:46:fc:2a:d4:67:02:81:3f:65:5d:b5:
0c:3e:38:4d:00:b4:c0:82:0e:68:64:59:59:72:e8:31:8c:88:
ac:3c:ee:ee:b3:67:fd:e4:d2:14:58:82:66:0d:ca:f4:02:31:
00:ab:ce:bb:75:ad:b2:d0:8d:eb:df:17:6b:61:16:0e:79:36:
35:18:e3:9c:ed:b0:c4:f3:81:a8:a1:7e:c5:65:c4:aa:ab:28:
7d:d7:54:94:0d:7b:07:0c:2d:60:17:dc:8c
30,934,490 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
31,077,195 UART:
31,077,577 UART: Running Caliptra ROM ...
31,078,717 UART:
31,078,882 UART: [state] CFI Enabled
31,154,487 UART: [state] LifecycleState = Production
31,156,414 UART: [state] DebugLocked = Yes
31,158,324 UART: [state] Starting the WD Timer 40000000 cycles
31,164,102 UART: [kat] SHA2-256
31,353,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,364,731 UART: [kat] ++
31,365,274 UART: [kat] sha1
31,376,704 UART: [kat] SHA2-256
31,379,681 UART: [kat] SHA2-384
31,384,604 UART: [kat] SHA2-512-ACC
31,387,162 UART: [kat] ECC-384
33,839,246 UART: [kat] HMAC-384Kdf
33,862,238 UART: [kat] LMS
34,393,828 UART: [kat] --
34,398,145 UART: [update-reset] ++
39,027,964 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,032,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
39,626,346 >>> mbox cmd response: success
39,626,850 UART: [update-reset] Copying MAN_2 To MAN_1
39,664,163 UART: [update-reset Success] --
39,670,501 UART: [state] Locking Datavault
39,673,431 UART: [state] Locking PCR0, PCR1 and PCR31
39,675,627 UART: [state] Locking ICCM
39,677,837 UART: [exit] Launching FMC @ 0x40000130
39,686,520 UART:
39,686,752 UART: Running Caliptra FMC ...
39,687,853 UART:
39,688,016 UART: [state] CFI Enabled
39,780,771 UART: [art] Extend RT PCRs Done
39,781,959 UART: [art] Lock RT PCRs Done
39,783,462 UART: [art] Populate DV Done
39,788,883 UART: [fht] FMC Alias Private Key: 7
39,790,386 UART: [art] Derive CDI
39,791,121 UART: [art] Store in in slot 0x4
39,849,481 UART: [art] Derive Key Pair
39,850,482 UART: [art] Store priv key in slot 0x5
42,313,402 UART: [art] Derive Key Pair - Done
42,326,410 UART: [art] Signing Cert with AUTHO
42,327,722 UART: RITY.KEYID = 7
44,039,043 UART: [art] Erasing AUTHORITY.KEYID = 7
44,040,560 UART: [art] PUB.X = 2EAB8A3B68DF6193DEFED714B155FA64B4C5FEE0DBD941974C5E883696956397056B8983BE3900D9E8236C188453E62E
44,047,756 UART: [art] PUB.Y = 0B217F6C797B46D4ECE36333E7ABD87D2BACF7E556B2014188A25B489107F5A433795CC1C2B997D8E6E48F9622041FF8
44,055,043 UART: [art] SIG.R = 4274AFD959566CC20D91BC51A07E85BD776558AE64F91555E603829D2790F10A5AC981315A4CA3DC50EFFDE21006DC7A
44,062,387 UART: [art] SIG.S = 8FE8BB36D56BA7289F47131669923B25912AB36447963042449A745A92989159C932C7CA317EE237EBF2E76EDFA2CE10
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:c5:8b:66:57:8d:30:bd:4f:38:82:8b:d8:bf:0f:1a:89:35:90:14
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4DC58B66578D30BD4F38828BD8BF0F1A89359014A3A6781876683D42E5A78008
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:ab:8a:3b:68:df:61:93:de:fe:d7:14:b1:55:
fa:64:b4:c5:fe:e0:db:d9:41:97:4c:5e:88:36:96:
95:63:97:05:6b:89:83:be:39:00:d9:e8:23:6c:18:
84:53:e6:2e:0b:21:7f:6c:79:7b:46:d4:ec:e3:63:
33:e7:ab:d8:7d:2b:ac:f7:e5:56:b2:01:41:88:a2:
5b:48:91:07:f5:a4:33:79:5c:c1:c2:b9:97:d8:e6:
e4:8f:96:22:04:1f:f8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
4D:C5:8B:66:57:8D:30:BD:4F:38:82:8B:D8:BF:0F:1A:89:35:90:14
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:42:74:af:d9:59:56:6c:c2:0d:91:bc:51:a0:7e:
85:bd:77:65:58:ae:64:f9:15:55:e6:03:82:9d:27:90:f1:0a:
5a:c9:81:31:5a:4c:a3:dc:50:ef:fd:e2:10:06:dc:7a:02:31:
00:8f:e8:bb:36:d5:6b:a7:28:9f:47:13:16:69:92:3b:25:91:
2a:b3:64:47:96:30:42:44:9a:74:5a:92:98:91:59:c9:32:c7:
ca:31:7e:e2:37:eb:f2:e7:6e:df:a2:ce:10
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 531 bytes from beginning
cptra_bootfsm_go
3,442,115 ready_for_fw is high
3,442,762 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,918,552 >>> mbox cmd response: success
20,203,995 UART:
20,204,397 UART: Running Caliptra FMC ...
20,205,546 UART:
20,205,702 UART: [state] CFI Enabled
20,271,040 UART: [fht] FMC Alias Private Key: 7
22,034,790 UART: [art] Extend RT PCRs Done
22,036,024 UART: [art] Lock RT PCRs Done
22,037,914 UART: [art] Populate DV Done
22,043,481 UART: [fht] FMC Alias Private Key: 7
22,045,127 UART: [art] Derive CDI
22,045,944 UART: [art] Store in in slot 0x4
22,103,362 UART: [art] Derive Key Pair
22,104,375 UART: [art] Store priv key in slot 0x5
24,567,267 UART: [art] Derive Key Pair - Done
24,580,925 UART: [art] Signing Cert with AUTHO
24,582,233 UART: RITY.KEYID = 7
26,292,572 UART: [art] Erasing AUTHORITY.KEYID = 7
26,294,067 UART: [art] PUB.X = 9608DDF0BE532BCE27453F9090191A441B3F86CCBA9002E2693774DF2195F8D849DF5E0A1D51EC947CA109D3F34DCC91
26,301,319 UART: [art] PUB.Y = 17D301952DE521B9BAB76D72AF4DC23303231FD85F68A7C182CBBF90C8D2EAE280016C5FF1C9237F3D9E3B213C73A04F
26,308,601 UART: [art] SIG.R = 8C66640047ADFF1058EC87637925DB630B676A6A7063EE3E53C393EEAB5591513B3167BCC6B56DD8C833C76F9D4489E7
26,316,015 UART: [art] SIG.S = 59D7592F79472B2AE0A6FCFCEC7A282465AD6B7E93CAC1E8F2A2669D7564EC711E6A5127E82D1ED187AAAC67256CE3A0
27,294,856 UART: Caliptra RT
27,295,590 UART: [state] CFI Enabled
27,460,949 UART: [rt] RT listening for mailbox commands...
27,491,895 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,936,939 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,372,725 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3c:b4:05:75:d5:9a:84:f3:49:e9:03:a9:ec:df:a7:cf:3f:5e:fa:db
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B8B40575D59A84F349E903A9ECDFA7CF3F5EFADB481BC103160C4C0A3462F18A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:96:08:dd:f0:be:53:2b:ce:27:45:3f:90:90:19:
1a:44:1b:3f:86:cc:ba:90:02:e2:69:37:74:df:21:
95:f8:d8:49:df:5e:0a:1d:51:ec:94:7c:a1:09:d3:
f3:4d:cc:91:17:d3:01:95:2d:e5:21:b9:ba:b7:6d:
72:af:4d:c2:33:03:23:1f:d8:5f:68:a7:c1:82:cb:
bf:90:c8:d2:ea:e2:80:01:6c:5f:f1:c9:23:7f:3d:
9e:3b:21:3c:73:a0:4f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
B8:B4:05:75:D5:9A:84:F3:49:E9:03:A9:EC:DF:A7:CF:3F:5E:FA:DB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8c:66:64:00:47:ad:ff:10:58:ec:87:63:79:
25:db:63:0b:67:6a:6a:70:63:ee:3e:53:c3:93:ee:ab:55:91:
51:3b:31:67:bc:c6:b5:6d:d8:c8:33:c7:6f:9d:44:89:e7:02:
30:59:d7:59:2f:79:47:2b:2a:e0:a6:fc:fc:ec:7a:28:24:65:
ad:6b:7e:93:ca:c1:e8:f2:a2:66:9d:75:64:ec:71:1e:6a:51:
27:e8:2d:1e:d1:87:aa:ac:67:25:6c:e3:a0
30,832,142 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
39,759,705 >>> mbox cmd response: success
39,791,744 UART:
39,792,067 UART: Running Caliptra FMC ...
39,793,285 UART:
39,793,450 UART: [state] CFI Enabled
39,887,674 UART: [art] Extend RT PCRs Done
39,888,882 UART: [art] Lock RT PCRs Done
39,890,196 UART: [art] Populate DV Done
39,895,604 UART: [fht] FMC Alias Private Key: 7
39,897,245 UART: [art] Derive CDI
39,898,058 UART: [art] Store in in slot 0x4
39,956,956 UART: [art] Derive Key Pair
39,957,947 UART: [art] Store priv key in slot 0x5
42,421,367 UART: [art] Derive Key Pair - Done
42,434,529 UART: [art] Signing Cert with AUTHO
42,435,836 UART: RITY.KEYID = 7
44,146,462 UART: [art] Erasing AUTHORITY.KEYID = 7
44,147,969 UART: [art] PUB.X = A2BCAB45B5E50DA2A0054169EAA5FFE1EF2CB085E243B2418DD743F99624D42FA2DEF3163309B38E0E13B0469FAE893C
44,155,274 UART: [art] PUB.Y = A43D982EB38D5072CD1C93AEB5727134D45637A3288C31CC4D1D902828430270316D6DEB987EFF02DAD867526D063D4D
44,162,513 UART: [art] SIG.R = A341B82CA96266AE01D80D9CCCA9229273FD00ACEF18B09300F7616C25A73C86B1F7F84D11C63BF7227C2B03ECF2E8A2
44,169,847 UART: [art] SIG.S = A4269C46283832D90E147A5A6E990E9A698A6E9DA12A61A3586F00785010017B2898CBA5E80B99A9813EFF1BF97C9DF2
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
66:1b:3c:8e:7a:68:47:38:cb:87:49:cc:a3:1e:1e:ec:ba:6a:2b:3c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E61B3C8E7A684738CB8749CCA31E1EECBA6A2B3C42C779CF82365FA886585CE2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a2:bc:ab:45:b5:e5:0d:a2:a0:05:41:69:ea:a5:
ff:e1:ef:2c:b0:85:e2:43:b2:41:8d:d7:43:f9:96:
24:d4:2f:a2:de:f3:16:33:09:b3:8e:0e:13:b0:46:
9f:ae:89:3c:a4:3d:98:2e:b3:8d:50:72:cd:1c:93:
ae:b5:72:71:34:d4:56:37:a3:28:8c:31:cc:4d:1d:
90:28:28:43:02:70:31:6d:6d:eb:98:7e:ff:02:da:
d8:67:52:6d:06:3d:4d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
E6:1B:3C:8E:7A:68:47:38:CB:87:49:CC:A3:1E:1E:EC:BA:6A:2B:3C
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a3:41:b8:2c:a9:62:66:ae:01:d8:0d:9c:cc:
a9:22:92:73:fd:00:ac:ef:18:b0:93:00:f7:61:6c:25:a7:3c:
86:b1:f7:f8:4d:11:c6:3b:f7:22:7c:2b:03:ec:f2:e8:a2:02:
31:00:a4:26:9c:46:28:38:32:d9:0e:14:7a:5a:6e:99:0e:9a:
69:8a:6e:9d:a1:2a:61:a3:58:6f:00:78:50:10:01:7b:28:98:
cb:a5:e8:0b:99:a9:81:3e:ff:1b:f9:7c:9d:f2
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.41s
Truncated 4978 bytes from beginning
A55CC6EE48DE3F458403EAA81B5F8D73BFBF43447E75EFB37607C1FA4126ED15F82EAF2D5B18FD678BA52C56D922
26,338,745 UART: [art] SIG.S = EB4D064312F91CDEB510ACE88B502F9327BAC6388F81EDF77A674EF43609D51995B6727CBA730E9E487F9A2F79687992
27,317,723 UART: Caliptra RT
27,318,438 UART: [state] CFI Enabled
27,435,186 UART: [rt] RT listening for mailbox commands...
27,587,292 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,032,048 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,466,188 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:b5:0d:f9:a0:87:f7:24:67:3d:ae:0c:b9:84:c4:26:0f:de:c6:73
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9BB50DF9A087F724673DAE0CB984C4260FDEC673E87FC85BEC10493FF631ABEF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:78:a2:9c:8e:c7:4a:f5:1c:c9:00:98:d4:72:66:
07:aa:ce:b2:89:11:1b:75:73:9d:fd:b9:7f:2c:fe:
4a:5e:32:f7:99:8b:66:bc:f8:2d:00:70:00:d1:f8:
2f:12:28:71:6a:a6:fb:1e:b1:56:a9:35:eb:6a:0e:
e3:6f:3b:55:6e:ec:3a:bb:5f:08:cc:cc:7e:cc:44:
46:9d:fe:30:b4:72:1a:b9:ff:41:a1:9c:85:b3:27:
aa:09:75:cb:24:55:ad
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
9B:B5:0D:F9:A0:87:F7:24:67:3D:AE:0C:B9:84:C4:26:0F:DE:C6:73
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e4:58:a5:5c:c6:ee:48:de:3f:45:84:03:ea:
a8:1b:5f:8d:73:bf:bf:43:44:7e:75:ef:b3:76:07:c1:fa:41:
26:ed:15:f8:2e:af:2d:5b:18:fd:67:8b:a5:2c:56:d9:22:02:
31:00:eb:4d:06:43:12:f9:1c:de:b5:10:ac:e8:8b:50:2f:93:
27:ba:c6:38:8f:81:ed:f7:7a:67:4e:f4:36:09:d5:19:95:b6:
72:7c:ba:73:0e:9e:48:7f:9a:2f:79:68:79:92
30,923,800 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
31,066,267 UART:
31,066,647 UART: Running Caliptra ROM ...
31,067,711 UART:
31,067,920 UART: [state] CFI Enabled
31,079,989 UART: [state] LifecycleState = Production
31,081,726 UART: [state] DebugLocked = Yes
31,084,198 UART: [state] Starting the WD Timer 40000000 cycles
31,090,027 UART: [kat] SHA2-256
31,279,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,290,852 UART: [kat] ++
31,291,309 UART: [kat] sha1
31,302,248 UART: [kat] SHA2-256
31,305,266 UART: [kat] SHA2-384
31,311,682 UART: [kat] SHA2-512-ACC
31,314,254 UART: [kat] ECC-384
33,757,372 UART: [kat] HMAC-384Kdf
33,769,333 UART: [kat] LMS
34,300,910 UART: [kat] --
34,303,831 UART: [update-reset] ++
38,962,889 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,966,833 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
39,561,172 >>> mbox cmd response: success
39,562,612 UART: [update-reset] Copying MAN_2 To MAN_1
39,600,222 UART: [update-reset Success] --
39,604,232 UART: [state] Locking Datavault
39,607,979 UART: [state] Locking PCR0, PCR1 and PCR31
39,610,164 UART: [state] Locking ICCM
39,612,153 UART: [exit] Launching FMC @ 0x40000130
39,620,774 UART:
39,621,007 UART: Running Caliptra FMC ...
39,622,110 UART:
39,622,270 UART: [state] CFI Enabled
39,666,502 UART: [art] Extend RT PCRs Done
39,667,689 UART: [art] Lock RT PCRs Done
39,668,758 UART: [art] Populate DV Done
39,674,111 UART: [fht] FMC Alias Private Key: 7
39,675,643 UART: [art] Derive CDI
39,676,454 UART: [art] Store in in slot 0x4
39,718,934 UART: [art] Derive Key Pair
39,719,948 UART: [art] Store priv key in slot 0x5
42,146,573 UART: [art] Derive Key Pair - Done
42,159,771 UART: [art] Signing Cert with AUTHO
42,161,082 UART: RITY.KEYID = 7
43,866,788 UART: [art] Erasing AUTHORITY.KEYID = 7
43,868,301 UART: [art] PUB.X = E82394649CA758D7B18EBCB8D86A67DE3048710512449809B817D66A3464BAB9032DE9C062EFF84A94ECFC1662863969
43,875,572 UART: [art] PUB.Y = F735FE27D077FBB795CD3C2AC02DB1790DA7367FA2A730EB92264DDCA70EE93FF1A44F4E1D7A4E5FC0E31CB9C20F5AEB
43,882,805 UART: [art] SIG.R = 094AF8EC3CB1DE675E4ADDAFC72246EF965A10B8CCB0DE9506B1CD37180BBECE7CFBC82AE573F83A945AF8891B07B8D3
43,890,246 UART: [art] SIG.S = 6F8E58EDE365C318533F8B9C8901380F55EAACA2B3BD28A3F94F88072153300BCD80A50CD4A89A66BDCA4D4B494D4836
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:17:b4:d6:1e:cf:3a:33:a0:4b:a4:c0:e3:da:92:52:12:4a:7f:e7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6817B4D61ECF3A33A04BA4C0E3DA9252124A7FE72759D7111FFE2AF36F87935A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e8:23:94:64:9c:a7:58:d7:b1:8e:bc:b8:d8:6a:
67:de:30:48:71:05:12:44:98:09:b8:17:d6:6a:34:
64:ba:b9:03:2d:e9:c0:62:ef:f8:4a:94:ec:fc:16:
62:86:39:69:f7:35:fe:27:d0:77:fb:b7:95:cd:3c:
2a:c0:2d:b1:79:0d:a7:36:7f:a2:a7:30:eb:92:26:
4d:dc:a7:0e:e9:3f:f1:a4:4f:4e:1d:7a:4e:5f:c0:
e3:1c:b9:c2:0f:5a:eb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
68:17:B4:D6:1E:CF:3A:33:A0:4B:A4:C0:E3:DA:92:52:12:4A:7F:E7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:09:4a:f8:ec:3c:b1:de:67:5e:4a:dd:af:c7:22:
46:ef:96:5a:10:b8:cc:b0:de:95:06:b1:cd:37:18:0b:be:ce:
7c:fb:c8:2a:e5:73:f8:3a:94:5a:f8:89:1b:07:b8:d3:02:30:
6f:8e:58:ed:e3:65:c3:18:53:3f:8b:9c:89:01:38:0f:55:ea:
ac:a2:b3:bd:28:a3:f9:4f:88:07:21:53:30:0b:cd:80:a5:0c:
d4:a8:9a:66:bd:ca:4d:4b:49:4d:48:36
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.39s
Truncated 525 bytes from beginning
ng to cptra_bootfsm_go
3,757,836 ready_for_fw is high
3,758,266 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,106,596 >>> mbox cmd response: success
20,361,770 UART:
20,362,160 UART: Running Caliptra FMC ...
20,363,373 UART:
20,363,542 UART: [state] CFI Enabled
20,371,594 UART: [fht] FMC Alias Private Key: 7
22,128,484 UART: [art] Extend RT PCRs Done
22,129,704 UART: [art] Lock RT PCRs Done
22,131,273 UART: [art] Populate DV Done
22,136,460 UART: [fht] FMC Alias Private Key: 7
22,138,160 UART: [art] Derive CDI
22,138,889 UART: [art] Store in in slot 0x4
22,181,481 UART: [art] Derive Key Pair
22,182,475 UART: [art] Store priv key in slot 0x5
24,609,143 UART: [art] Derive Key Pair - Done
24,621,872 UART: [art] Signing Cert with AUTHO
24,623,192 UART: RITY.KEYID = 7
26,328,723 UART: [art] Erasing AUTHORITY.KEYID = 7
26,330,242 UART: [art] PUB.X = 210A794E3484F57BE7EC845738252EE99D42799F374B4161C6CBD641AA1BCD2EB797CAFC156F50914AAB11070BEE297A
26,337,480 UART: [art] PUB.Y = 23EB6DA565206D9BB29B895DAACCAA76EFA91F1659696980DE0B8470C532DF75F32D533F0E5B24D00E1C233EF6620707
26,344,794 UART: [art] SIG.R = 2F3333B5BD0FF10C2FE0FAD9B2A3E788F14038B1F8146C79C5314C6F9C689AAD9F0DD7F074034687F9A3C18F27C01741
26,352,179 UART: [art] SIG.S = 56A8AC982084143FF8263FE073C62F44965F38D51002F67BFFDD7A07AFE6ECAD65C4411092B6A7A6F51BFD4BA1C34CB5
27,330,820 UART: Caliptra RT
27,331,516 UART: [state] CFI Enabled
27,449,427 UART: [rt] RT listening for mailbox commands...
27,480,437 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,925,177 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,360,055 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
64:3e:42:e9:ee:c7:c0:8c:49:26:c2:c7:a5:bf:60:fc:13:0b:ed:9c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E43E42E9EEC7C08C4926C2C7A5BF60FC130BED9C526CB5EB0A0018AC684464D8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:21:0a:79:4e:34:84:f5:7b:e7:ec:84:57:38:25:
2e:e9:9d:42:79:9f:37:4b:41:61:c6:cb:d6:41:aa:
1b:cd:2e:b7:97:ca:fc:15:6f:50:91:4a:ab:11:07:
0b:ee:29:7a:23:eb:6d:a5:65:20:6d:9b:b2:9b:89:
5d:aa:cc:aa:76:ef:a9:1f:16:59:69:69:80:de:0b:
84:70:c5:32:df:75:f3:2d:53:3f:0e:5b:24:d0:0e:
1c:23:3e:f6:62:07:07
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
E4:3E:42:E9:EE:C7:C0:8C:49:26:C2:C7:A5:BF:60:FC:13:0B:ED:9C
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:2f:33:33:b5:bd:0f:f1:0c:2f:e0:fa:d9:b2:a3:
e7:88:f1:40:38:b1:f8:14:6c:79:c5:31:4c:6f:9c:68:9a:ad:
9f:0d:d7:f0:74:03:46:87:f9:a3:c1:8f:27:c0:17:41:02:30:
56:a8:ac:98:20:84:14:3f:f8:26:3f:e0:73:c6:2f:44:96:5f:
38:d5:10:02:f6:7b:ff:dd:7a:07:af:e6:ec:ad:65:c4:41:10:
92:b6:a7:a6:f5:1b:fd:4b:a1:c3:4c:b5
30,819,166 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
39,635,451 >>> mbox cmd response: success
39,670,621 UART:
39,670,981 UART: Running Caliptra FMC ...
39,672,192 UART:
39,672,361 UART: [state] CFI Enabled
39,716,216 UART: [art] Extend RT PCRs Done
39,717,385 UART: [art] Lock RT PCRs Done
39,719,160 UART: [art] Populate DV Done
39,724,730 UART: [fht] FMC Alias Private Key: 7
39,726,434 UART: [art] Derive CDI
39,727,167 UART: [art] Store in in slot 0x4
39,769,813 UART: [art] Derive Key Pair
39,770,823 UART: [art] Store priv key in slot 0x5
42,197,521 UART: [art] Derive Key Pair - Done
42,210,462 UART: [art] Signing Cert with AUTHO
42,211,804 UART: RITY.KEYID = 7
43,917,894 UART: [art] Erasing AUTHORITY.KEYID = 7
43,919,395 UART: [art] PUB.X = 1691E23F95F13353C40A8776AEC1AA63E5F84A3F8C32E2709BF3CB3897F0C4CDD852A2772F18114AD335695BB2ACFCBC
43,926,635 UART: [art] PUB.Y = C0A2FBB5B6C1A302DEC14B741782D5FEAEB15A629C92EF5B9A40A4F15A74F33ED3FC15021511695D60D5360ABF205F7C
43,933,969 UART: [art] SIG.R = A42D69669D5D7B2A23C8960ABC596951A882BFEE365904B3A0DBEAF416C820FF8466BF2AFCFC9E7334C19FE70803D9FE
43,941,357 UART: [art] SIG.S = 67DFC16649821DD2715197F8E618537B80B0D3813B2139A6C9E7D723F96ED0381F8853FEE09EF32305F92B5964360BE9
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:69:5a:c7:3a:b1:a3:fb:62:c9:7f:49:b8:a9:e4:ae:21:a4:15:2c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B1695AC73AB1A3FB62C97F49B8A9E4AE21A4152CC7C58291FFAB00891ED3CEBB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:16:91:e2:3f:95:f1:33:53:c4:0a:87:76:ae:c1:
aa:63:e5:f8:4a:3f:8c:32:e2:70:9b:f3:cb:38:97:
f0:c4:cd:d8:52:a2:77:2f:18:11:4a:d3:35:69:5b:
b2:ac:fc:bc:c0:a2:fb:b5:b6:c1:a3:02:de:c1:4b:
74:17:82:d5:fe:ae:b1:5a:62:9c:92:ef:5b:9a:40:
a4:f1:5a:74:f3:3e:d3:fc:15:02:15:11:69:5d:60:
d5:36:0a:bf:20:5f:7c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
B1:69:5A:C7:3A:B1:A3:FB:62:C9:7F:49:B8:A9:E4:AE:21:A4:15:2C
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a4:2d:69:66:9d:5d:7b:2a:23:c8:96:0a:bc:
59:69:51:a8:82:bf:ee:36:59:04:b3:a0:db:ea:f4:16:c8:20:
ff:84:66:bf:2a:fc:fc:9e:73:34:c1:9f:e7:08:03:d9:fe:02:
30:67:df:c1:66:49:82:1d:d2:71:51:97:f8:e6:18:53:7b:80:
b0:d3:81:3b:21:39:a6:c9:e7:d7:23:f9:6e:d0:38:1f:88:53:
fe:e0:9e:f3:23:05:f9:2b:59:64:36:0b:e9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 5405 bytes from beginning
444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,063,352 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,105,029 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:14:26:d9:d5:c1:81:ee:53:9f:45:f1:eb:3f:7e:c9:df:ad:8c:1f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7C1426D9D5C181EE539F45F1EB3F7EC9DFAD8C1F78CA2EC08047F6E28D8A399B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dd:cc:dc:70:73:d8:aa:97:53:94:96:5e:ff:93:
81:ff:3c:37:62:a8:47:e8:2d:33:22:78:da:50:28:
4f:fa:8b:9a:be:21:e7:2b:02:6e:1c:d5:5b:73:63:
46:ef:af:40:71:be:ad:28:d6:2f:27:55:5c:72:8e:
9b:a5:ed:ed:66:85:4e:83:43:0a:10:49:07:da:cf:
14:bc:4b:ba:80:da:85:b4:7f:9d:d8:26:34:ae:31:
c6:fa:43:d3:ed:fb:89
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
7C:14:26:D9:D5:C1:81:EE:53:9F:45:F1:EB:3F:7E:C9:DF:AD:8C:1F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:1f:fa:33:69:3f:93:98:74:e2:eb:33:95:8d:96:
a9:5d:39:b9:b0:39:e4:65:ff:01:ee:63:7e:d3:9e:e3:84:a1:
5e:c3:1a:a2:14:c3:6c:a7:a5:b4:6c:b2:6b:1a:81:7f:02:30:
2b:7a:49:d0:0c:b3:f5:50:4c:23:a5:d6:03:11:c3:ed:86:20:
28:04:9b:1f:ea:f7:f1:f1:68:2e:af:66:bc:c9:ba:54:e0:17:
a8:eb:59:6a:09:10:ec:1e:e0:d6:d9:80
6,115,873 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,116,789 UART:
6,116,805 UART: Running Caliptra ROM ...
6,117,213 UART:
6,117,267 UART: [state] CFI Enabled
6,119,966 UART: [state] LifecycleState = Production
6,120,574 UART: [state] DebugLocked = Yes
6,121,324 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,122,979 UART: [kat] SHA2-256
6,916,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,921,025 UART: [kat] ++
6,921,177 UART: [kat] sha1
6,925,495 UART: [kat] SHA2-256
6,927,433 UART: [kat] SHA2-384
6,930,152 UART: [kat] SHA2-512-ACC
6,932,052 UART: [kat] ECC-384
6,937,693 UART: [kat] HMAC-384Kdf
6,942,175 UART: [kat] LMS
7,510,371 UART: [kat] --
7,511,398 UART: [update-reset] ++
11,081,393 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,082,435 UART: [update-reset] Loading Runtime at address 0x40005000 len 87448
11,229,011 >>> mbox cmd response: success
11,229,339 UART: [update-reset] Copying MAN_2 To MAN_1
11,237,351 UART: [update-reset Success] --
11,238,314 UART: [state] Locking Datavault
11,239,118 UART: [state] Locking PCR0, PCR1 and PCR31
11,239,722 UART: [state] Locking ICCM
11,240,362 UART: [exit] Launching FMC @ 0x40000130
11,245,691 UART:
11,245,707 UART: Running Caliptra FMC ...
11,246,115 UART:
11,246,169 UART: [state] CFI Enabled
11,334,602 UART: [art] Extend RT PCRs Done
11,335,030 UART: [art] Lock RT PCRs Done
11,336,403 UART: [art] Populate DV Done
11,344,729 UART: [fht] FMC Alias Private Key: 7
11,345,709 UART: [art] Derive CDI
11,345,989 UART: [art] Store in in slot 0x4
11,431,244 UART: [art] Derive Key Pair
11,431,604 UART: [art] Store priv key in slot 0x5
11,445,092 UART: [art] Derive Key Pair - Done
11,459,690 UART: [art] Signing Cert with AUTHO
11,460,170 UART: RITY.KEYID = 7
11,475,642 UART: [art] Erasing AUTHORITY.KEYID = 7
11,476,407 UART: [art] PUB.X = C6E2E17CB065DAFA6882A3F3F9814D19DC3C39A28CE868B20B7D2B71E6398661A9FAAD7A820D3F1263553D78418A94B8
11,483,179 UART: [art] PUB.Y = BED9F77083EFB6F4E0FAEC8DD30369F9F4B066A69BA587EFC77CDC173E125C8712C2B02F3A91258766813FE5F7B3C0A4
11,490,142 UART: [art] SIG.R = E3B12AEAC6490AA75DF33150C9330D9183CA92A8F0DEAA8D968485B0AAA7E5B6B6B99C1B6840E15E00A2658A7681D036
11,496,894 UART: [art] SIG.S = 855C50DE6DDE5437B1ED477B721EEC7BBD0A470D00EE8AFAC47B48837158C5C66276496148BE336DEF4243E3D8D6D8CB
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:84:87:5b:1c:c4:b0:5b:1f:8a:a9:a1:c3:d7:51:da:97:b6:5b:34
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D584875B1CC4B05B1F8AA9A1C3D751DA97B65B34A80213F3DB8068C99F0AB7AE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c6:e2:e1:7c:b0:65:da:fa:68:82:a3:f3:f9:81:
4d:19:dc:3c:39:a2:8c:e8:68:b2:0b:7d:2b:71:e6:
39:86:61:a9:fa:ad:7a:82:0d:3f:12:63:55:3d:78:
41:8a:94:b8:be:d9:f7:70:83:ef:b6:f4:e0:fa:ec:
8d:d3:03:69:f9:f4:b0:66:a6:9b:a5:87:ef:c7:7c:
dc:17:3e:12:5c:87:12:c2:b0:2f:3a:91:25:87:66:
81:3f:e5:f7:b3:c0:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
D5:84:87:5B:1C:C4:B0:5B:1F:8A:A9:A1:C3:D7:51:DA:97:B6:5B:34
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e3:b1:2a:ea:c6:49:0a:a7:5d:f3:31:50:c9:
33:0d:91:83:ca:92:a8:f0:de:aa:8d:96:84:85:b0:aa:a7:e5:
b6:b6:b9:9c:1b:68:40:e1:5e:00:a2:65:8a:76:81:d0:36:02:
31:00:85:5c:50:de:6d:de:54:37:b1:ed:47:7b:72:1e:ec:7b:
bd:0a:47:0d:00:ee:8a:fa:c4:7b:48:83:71:58:c5:c6:62:76:
49:61:48:be:33:6d:ef:42:43:e3:d8:d6:d8:cb
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.88s
Truncated 882 bytes from beginning
5,371,980 UART: [art] Populate DV Done
5,380,162 UART: [fht] FMC Alias Private Key: 7
5,381,270 UART: [art] Derive CDI
5,381,550 UART: [art] Store in in slot 0x4
5,467,413 UART: [art] Derive Key Pair
5,467,773 UART: [art] Store priv key in slot 0x5
5,480,695 UART: [art] Derive Key Pair - Done
5,495,550 UART: [art] Signing Cert with AUTHO
5,496,030 UART: RITY.KEYID = 7
5,511,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,512,187 UART: [art] PUB.X = B30FDB8B16F7F05371FE0E54819BF402104BF24AC3D322699CF55C586DFA2F678DEAA75D4254425256B6057B78AC0695
5,518,946 UART: [art] PUB.Y = DA03F747A81DEB58347A92DB79A48F4842BF8F66D2B2B3419953A40A9BF6123FA014763A2BE16FF0DEC004D79F6B0902
5,525,889 UART: [art] SIG.R = 6154CF61D26ED4E80CE674DCD7A970CCAC72DF3A88AD4127A4AF2501FE4F3894C3C03CACF924F43F50DA27ADD24AB20A
5,532,674 UART: [art] SIG.S = CD933630B10425711E8899DF9304DF58CDBF519A8362F6443B2ECE3E2F2BF241D0453CA2DC41DCDB90ACFE85D4E79900
5,556,895 UART: Caliptra RT
5,557,149 UART: [state] CFI Enabled
5,665,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,695,625 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,735,642 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,777,347 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:ee:c9:09:02:be:1b:b2:51:a9:6e:5b:b8:db:da:49:58:8c:ef:f5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=05EEC90902BE1BB251A96E5BB8DBDA49588CEFF599149CD811C921DECEA951EE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b3:0f:db:8b:16:f7:f0:53:71:fe:0e:54:81:9b:
f4:02:10:4b:f2:4a:c3:d3:22:69:9c:f5:5c:58:6d:
fa:2f:67:8d:ea:a7:5d:42:54:42:52:56:b6:05:7b:
78:ac:06:95:da:03:f7:47:a8:1d:eb:58:34:7a:92:
db:79:a4:8f:48:42:bf:8f:66:d2:b2:b3:41:99:53:
a4:0a:9b:f6:12:3f:a0:14:76:3a:2b:e1:6f:f0:de:
c0:04:d7:9f:6b:09:02
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
05:EE:C9:09:02:BE:1B:B2:51:A9:6E:5B:B8:DB:DA:49:58:8C:EF:F5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:61:54:cf:61:d2:6e:d4:e8:0c:e6:74:dc:d7:a9:
70:cc:ac:72:df:3a:88:ad:41:27:a4:af:25:01:fe:4f:38:94:
c3:c0:3c:ac:f9:24:f4:3f:50:da:27:ad:d2:4a:b2:0a:02:31:
00:cd:93:36:30:b1:04:25:71:1e:88:99:df:93:04:df:58:cd:
bf:51:9a:83:62:f6:44:3b:2e:ce:3e:2f:2b:f2:41:d0:45:3c:
a2:dc:41:dc:db:90:ac:fe:85:d4:e7:99:00
5,788,253 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,820,242 >>> mbox cmd response: success
10,833,496 UART:
10,833,512 UART: Running Caliptra FMC ...
10,833,920 UART:
10,833,974 UART: [state] CFI Enabled
10,922,965 UART: [art] Extend RT PCRs Done
10,923,393 UART: [art] Lock RT PCRs Done
10,924,564 UART: [art] Populate DV Done
10,932,628 UART: [fht] FMC Alias Private Key: 7
10,933,752 UART: [art] Derive CDI
10,934,032 UART: [art] Store in in slot 0x4
11,020,067 UART: [art] Derive Key Pair
11,020,427 UART: [art] Store priv key in slot 0x5
11,033,621 UART: [art] Derive Key Pair - Done
11,048,327 UART: [art] Signing Cert with AUTHO
11,048,807 UART: RITY.KEYID = 7
11,064,125 UART: [art] Erasing AUTHORITY.KEYID = 7
11,064,890 UART: [art] PUB.X = 7C9278ED2FD0F64F06436F32D1902B4BDDAB2F8D336CA4C46046CA02FE78EB7AA4E32B86468DEF5063ABA28E7379D74F
11,071,670 UART: [art] PUB.Y = 4BAA4E8DBCE788D46B1D3D67BAE3C91CD74DF2915DB8BA3EEB26BD8FB0677B4976124E8915146DDDAB1A25CE685F6615
11,078,642 UART: [art] SIG.R = 74499BA98FB3A9765CFED6337DE616A59EE890801C781ED182D44D0525B0D20DA9F01987968FFD33C1C15EB3C24E8910
11,085,410 UART: [art] SIG.S = 797673B1F89DF5F731FD115B51DE97C63FD6666BEE8441B3DA1720AFB20016C818E870A58E91ED34D57B0213852FD040
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:79:9e:5a:a5:35:75:27:55:ce:4f:c0:78:c8:09:c4:4a:b5:69:bb
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=10799E5AA535752755CE4FC078C809C44AB569BBB8CF9D4C0C5A5C825CBB8CF2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7c:92:78:ed:2f:d0:f6:4f:06:43:6f:32:d1:90:
2b:4b:dd:ab:2f:8d:33:6c:a4:c4:60:46:ca:02:fe:
78:eb:7a:a4:e3:2b:86:46:8d:ef:50:63:ab:a2:8e:
73:79:d7:4f:4b:aa:4e:8d:bc:e7:88:d4:6b:1d:3d:
67:ba:e3:c9:1c:d7:4d:f2:91:5d:b8:ba:3e:eb:26:
bd:8f:b0:67:7b:49:76:12:4e:89:15:14:6d:dd:ab:
1a:25:ce:68:5f:66:15
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
10:79:9E:5A:A5:35:75:27:55:CE:4F:C0:78:C8:09:C4:4A:B5:69:BB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:74:49:9b:a9:8f:b3:a9:76:5c:fe:d6:33:7d:e6:
16:a5:9e:e8:90:80:1c:78:1e:d1:82:d4:4d:05:25:b0:d2:0d:
a9:f0:19:87:96:8f:fd:33:c1:c1:5e:b3:c2:4e:89:10:02:30:
79:76:73:b1:f8:9d:f5:f7:31:fd:11:5b:51:de:97:c6:3f:d6:
66:6b:ee:84:41:b3:da:17:20:af:b2:00:16:c8:18:e8:70:a5:
8e:91:ed:34:d5:7b:02:13:85:2f:d0:40
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.20s
Truncated 5405 bytes from beginning
444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,986,531 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,027,984 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:0e:f5:09:df:c0:d1:39:6f:58:f5:c4:a0:40:ff:d8:7f:b5:d9:f0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=530EF509DFC0D1396F58F5C4A040FFD87FB5D9F0119C51A604D1A3F2553852E8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4e:d4:3f:dd:90:ce:91:1b:20:5f:5b:a7:75:fc:
dd:b4:48:3f:14:a7:ce:b5:aa:ae:ad:fd:46:0c:6c:
9a:91:4d:71:43:1e:67:f1:33:13:c6:53:40:4f:dc:
77:ab:a4:2d:ac:3d:80:0b:ba:d7:00:d3:e5:86:56:
01:7b:dd:47:ce:e0:48:68:7e:ca:be:d9:d2:14:67:
3a:f2:f8:4b:15:f1:f1:d7:29:f0:87:13:11:c2:72:
dc:ca:31:b9:de:70:a2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
53:0E:F5:09:DF:C0:D1:39:6F:58:F5:C4:A0:40:FF:D8:7F:B5:D9:F0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b5:87:91:7b:02:4c:1e:d5:66:9a:5c:a8:31:
31:12:74:82:f8:14:08:c7:96:4b:e4:de:06:e8:fc:82:af:29:
1c:c7:d4:fe:d0:1e:4a:d2:c6:55:1c:da:4f:4a:0d:57:16:02:
30:5c:0f:60:29:63:d0:0a:8a:76:be:de:cc:41:a7:b4:d7:d2:
31:71:d9:8c:db:0a:4d:7b:1f:2b:34:85:a3:d4:87:e3:e5:c3:
3d:5f:e2:9c:f9:03:2e:22:78:05:57:d4:03
6,038,886 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,039,766 UART:
6,039,782 UART: Running Caliptra ROM ...
6,040,190 UART:
6,040,331 UART: [state] CFI Enabled
6,043,602 UART: [state] LifecycleState = Production
6,044,210 UART: [state] DebugLocked = Yes
6,044,972 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,046,681 UART: [kat] SHA2-256
6,840,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,844,727 UART: [kat] ++
6,844,879 UART: [kat] sha1
6,849,333 UART: [kat] SHA2-256
6,851,271 UART: [kat] SHA2-384
6,853,952 UART: [kat] SHA2-512-ACC
6,855,852 UART: [kat] ECC-384
6,861,825 UART: [kat] HMAC-384Kdf
6,866,497 UART: [kat] LMS
7,434,693 UART: [kat] --
7,435,420 UART: [update-reset] ++
11,044,044 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,045,198 UART: [update-reset] Loading Runtime at address 0x40005000 len 87448
11,191,774 >>> mbox cmd response: success
11,191,890 UART: [update-reset] Copying MAN_2 To MAN_1
11,199,902 UART: [update-reset Success] --
11,200,851 UART: [state] Locking Datavault
11,201,515 UART: [state] Locking PCR0, PCR1 and PCR31
11,202,119 UART: [state] Locking ICCM
11,202,653 UART: [exit] Launching FMC @ 0x40000130
11,207,982 UART:
11,207,998 UART: Running Caliptra FMC ...
11,208,406 UART:
11,208,549 UART: [state] CFI Enabled
11,297,956 UART: [art] Extend RT PCRs Done
11,298,384 UART: [art] Lock RT PCRs Done
11,299,737 UART: [art] Populate DV Done
11,307,847 UART: [fht] FMC Alias Private Key: 7
11,308,985 UART: [art] Derive CDI
11,309,265 UART: [art] Store in in slot 0x4
11,394,884 UART: [art] Derive Key Pair
11,395,244 UART: [art] Store priv key in slot 0x5
11,408,154 UART: [art] Derive Key Pair - Done
11,422,638 UART: [art] Signing Cert with AUTHO
11,423,118 UART: RITY.KEYID = 7
11,438,468 UART: [art] Erasing AUTHORITY.KEYID = 7
11,439,233 UART: [art] PUB.X = 366175299DA845607DDF59C924549CC302860CAF4C009204A096B1F76813FD8BA3917F6B14DABABB1DA82413BBFBE9B1
11,445,980 UART: [art] PUB.Y = 7B13B2F94DF81592BDB377BDE518525C13BDD918F9BF1E3672AF59B6FD4CE623D354701FE0232EB57335BDCCAC582F0B
11,452,943 UART: [art] SIG.R = 36D3A0B180DC38EAF40FC7A5778C8CA3C428FDCF7EE10605F558E09468F31DFE78168B1E8DE5FC4987B9EA774FE1CCE2
11,459,724 UART: [art] SIG.S = 990B734EDF93FAFA49A552A14DC0039C65CE1450FF1F40A2A0600A2115A088B2617D9E1A9A03B289E59DBA07E8614C0B
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
65:74:af:fb:78:fa:df:f3:6d:c7:17:a6:30:e0:b2:d6:77:c0:f0:13
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E574AFFB78FADFF36DC717A630E0B2D677C0F01373A9566EB342EBC2A9BD496B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:36:61:75:29:9d:a8:45:60:7d:df:59:c9:24:54:
9c:c3:02:86:0c:af:4c:00:92:04:a0:96:b1:f7:68:
13:fd:8b:a3:91:7f:6b:14:da:ba:bb:1d:a8:24:13:
bb:fb:e9:b1:7b:13:b2:f9:4d:f8:15:92:bd:b3:77:
bd:e5:18:52:5c:13:bd:d9:18:f9:bf:1e:36:72:af:
59:b6:fd:4c:e6:23:d3:54:70:1f:e0:23:2e:b5:73:
35:bd:cc:ac:58:2f:0b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
E5:74:AF:FB:78:FA:DF:F3:6D:C7:17:A6:30:E0:B2:D6:77:C0:F0:13
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:36:d3:a0:b1:80:dc:38:ea:f4:0f:c7:a5:77:8c:
8c:a3:c4:28:fd:cf:7e:e1:06:05:f5:58:e0:94:68:f3:1d:fe:
78:16:8b:1e:8d:e5:fc:49:87:b9:ea:77:4f:e1:cc:e2:02:31:
00:99:0b:73:4e:df:93:fa:fa:49:a5:52:a1:4d:c0:03:9c:65:
ce:14:50:ff:1f:40:a2:a0:60:0a:21:15:a0:88:b2:61:7d:9e:
1a:9a:03:b2:89:e5:9d:ba:07:e8:61:4c:0b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.72s
Truncated 882 bytes from beginning
5,373,466 UART: [art] Populate DV Done
5,381,778 UART: [fht] FMC Alias Private Key: 7
5,382,872 UART: [art] Derive CDI
5,383,152 UART: [art] Store in in slot 0x4
5,468,745 UART: [art] Derive Key Pair
5,469,105 UART: [art] Store priv key in slot 0x5
5,482,637 UART: [art] Derive Key Pair - Done
5,497,490 UART: [art] Signing Cert with AUTHO
5,497,970 UART: RITY.KEYID = 7
5,513,290 UART: [art] Erasing AUTHORITY.KEYID = 7
5,514,055 UART: [art] PUB.X = 9BFF675307DCD7889620950F853E4B5A07D0748A6F79250B96829E4373D75C523F8C65FC0FB30B7DB0640926EF5F2C24
5,520,802 UART: [art] PUB.Y = 67C1DD7AB3BC9F6DADA04F281D1CBEC8351BCFB767A41F53CA7CF73E61B84B357E223A6CF7F719A2AEEC11CE3E103325
5,527,778 UART: [art] SIG.R = E4015C44C3F711DD2A7EB4A72E3203FEF93C05F684B4EF107CB6C95A02B959623C58911EF76D680EC62F461146D94246
5,534,535 UART: [art] SIG.S = 768C001B67B4B7C4B17FD088B8976AFDC85BDA8963FCF91C95231ABA1EE4CCF145EAB53C3ACD8666A37D12906C6D957E
5,558,722 UART: Caliptra RT
5,559,068 UART: [state] CFI Enabled
5,667,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,697,996 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,737,749 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,779,314 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:9c:28:30:6a:2d:2d:49:52:40:f0:42:f6:3b:58:28:16:63:27:4f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C79C28306A2D2D495240F042F63B58281663274F9125C0883C13C6BE72BFCDD5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9b:ff:67:53:07:dc:d7:88:96:20:95:0f:85:3e:
4b:5a:07:d0:74:8a:6f:79:25:0b:96:82:9e:43:73:
d7:5c:52:3f:8c:65:fc:0f:b3:0b:7d:b0:64:09:26:
ef:5f:2c:24:67:c1:dd:7a:b3:bc:9f:6d:ad:a0:4f:
28:1d:1c:be:c8:35:1b:cf:b7:67:a4:1f:53:ca:7c:
f7:3e:61:b8:4b:35:7e:22:3a:6c:f7:f7:19:a2:ae:
ec:11:ce:3e:10:33:25
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
C7:9C:28:30:6A:2D:2D:49:52:40:F0:42:F6:3B:58:28:16:63:27:4F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e4:01:5c:44:c3:f7:11:dd:2a:7e:b4:a7:2e:
32:03:fe:f9:3c:05:f6:84:b4:ef:10:7c:b6:c9:5a:02:b9:59:
62:3c:58:91:1e:f7:6d:68:0e:c6:2f:46:11:46:d9:42:46:02:
30:76:8c:00:1b:67:b4:b7:c4:b1:7f:d0:88:b8:97:6a:fd:c8:
5b:da:89:63:fc:f9:1c:95:23:1a:ba:1e:e4:cc:f1:45:ea:b5:
3c:3a:cd:86:66:a3:7d:12:90:6c:6d:95:7e
5,790,038 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,823,902 >>> mbox cmd response: success
10,837,502 UART:
10,837,518 UART: Running Caliptra FMC ...
10,837,926 UART:
10,838,069 UART: [state] CFI Enabled
10,927,404 UART: [art] Extend RT PCRs Done
10,927,832 UART: [art] Lock RT PCRs Done
10,929,129 UART: [art] Populate DV Done
10,937,591 UART: [fht] FMC Alias Private Key: 7
10,938,763 UART: [art] Derive CDI
10,939,043 UART: [art] Store in in slot 0x4
11,024,742 UART: [art] Derive Key Pair
11,025,102 UART: [art] Store priv key in slot 0x5
11,038,692 UART: [art] Derive Key Pair - Done
11,053,750 UART: [art] Signing Cert with AUTHO
11,054,230 UART: RITY.KEYID = 7
11,069,370 UART: [art] Erasing AUTHORITY.KEYID = 7
11,070,135 UART: [art] PUB.X = 2F7E08CFA333003D7C36BC69BBA0B594CAA245804987289E99060D4DCA72A90AD0D03FC5B917ED93055CC6BE145B1001
11,076,873 UART: [art] PUB.Y = 1BB677521330101F153FB729BD3835BD00959C7A53527EE4F5AF9EBBC89726ED8B0739C4E991C61BEEE0616D11219914
11,083,798 UART: [art] SIG.R = 59A21BD29B331F0F90C07335884F162876B145522563F0DC7FCA17E85A2F36482FB610335215BE0D44AE9E6DDAA44450
11,090,560 UART: [art] SIG.S = 02791AB7DB91C51D849649318F577BEDC61C4C82DF879FAAAD38BF31E830EDEFD132A835CDD6AD51E6E77BD0A415C46D
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:a2:b8:49:16:fe:a8:7f:e6:6f:c9:80:c8:27:3f:a8:0a:de:d9:46
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=53A2B84916FEA87FE66FC980C8273FA80ADED9463D254295787EAC92F4934C63
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2f:7e:08:cf:a3:33:00:3d:7c:36:bc:69:bb:a0:
b5:94:ca:a2:45:80:49:87:28:9e:99:06:0d:4d:ca:
72:a9:0a:d0:d0:3f:c5:b9:17:ed:93:05:5c:c6:be:
14:5b:10:01:1b:b6:77:52:13:30:10:1f:15:3f:b7:
29:bd:38:35:bd:00:95:9c:7a:53:52:7e:e4:f5:af:
9e:bb:c8:97:26:ed:8b:07:39:c4:e9:91:c6:1b:ee:
e0:61:6d:11:21:99:14
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
53:A2:B8:49:16:FE:A8:7F:E6:6F:C9:80:C8:27:3F:A8:0A:DE:D9:46
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:59:a2:1b:d2:9b:33:1f:0f:90:c0:73:35:88:4f:
16:28:76:b1:45:52:25:63:f0:dc:7f:ca:17:e8:5a:2f:36:48:
2f:b6:10:33:52:15:be:0d:44:ae:9e:6d:da:a4:44:50:02:30:
02:79:1a:b7:db:91:c5:1d:84:96:49:31:8f:57:7b:ed:c6:1c:
4c:82:df:87:9f:aa:ad:38:bf:31:e8:30:ed:ef:d1:32:a8:35:
cd:d6:ad:51:e6:e7:7b:d0:a4:15:c4:6d
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.82s
Truncated 5299 bytes from beginning
, next_pc=40005400
3,881,418 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,275 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,718 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:eb:da:55:b4:8f:e9:da:8a:c3:b3:59:e6:ce:4e:96:30:72:96:4e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BBEBDA55B48FE9DA8AC3B359E6CE4E963072964E269689A6F15868E5D8864892
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:61:93:e4:e9:30:4f:ad:bc:cb:cc:3e:f9:10:51:
7d:18:57:48:84:bf:e1:64:84:24:a4:f7:c4:f9:ff:
a4:23:e5:fe:3c:a4:5d:b8:18:53:11:89:fc:a6:84:
41:34:18:76:de:ea:85:7d:6e:6d:b4:39:db:33:f4:
72:be:d3:8d:23:99:ce:ec:bd:23:86:73:74:50:37:
14:8d:43:5b:e0:24:9b:95:e3:fb:37:20:a4:ba:3b:
fc:4a:74:d9:1d:83:8e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
BB:EB:DA:55:B4:8F:E9:DA:8A:C3:B3:59:E6:CE:4E:96:30:72:96:4E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:c6:c2:0f:ab:ba:cc:44:3b:6d:5e:d7:60:8e:
b0:d1:66:3d:17:74:82:92:1c:23:81:cc:be:65:b5:f4:c7:a5:
04:86:b5:a9:11:31:ad:77:b5:8d:32:ba:a6:43:0a:f7:e4:02:
31:00:ec:70:5d:a5:51:d1:20:b7:4e:db:03:b2:09:ae:59:25:
b7:2c:f0:5f:87:ef:68:00:cf:48:5b:d4:c6:26:86:96:e6:32:
cd:cd:a9:d0:ef:6b:b7:cb:dd:48:3d:62:01:fa
3,973,549 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,292 UART:
3,974,308 UART: Running Caliptra ROM ...
3,974,716 UART:
3,974,771 UART: [state] CFI Enabled
3,977,630 UART: [state] LifecycleState = Production
3,978,238 UART: [state] DebugLocked = Yes
3,978,812 UART: [state] Starting the WD Timer 40000000 cycles
3,980,490 UART: [kat] SHA2-256
4,786,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,790,265 UART: [kat] ++
4,790,417 UART: [kat] sha1
4,794,487 UART: [kat] SHA2-256
4,796,427 UART: [kat] SHA2-384
4,799,118 UART: [kat] SHA2-512-ACC
4,801,018 UART: [kat] ECC-384
4,810,209 UART: [kat] HMAC-384Kdf
4,814,871 UART: [kat] LMS
5,063,199 UART: [kat] --
5,063,997 UART: [update-reset] ++
6,917,932 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,918,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
7,065,449 >>> mbox cmd response: success
7,065,783 UART: [update-reset] Copying MAN_2 To MAN_1
7,073,795 UART: [update-reset Success] --
7,074,818 UART: [state] Locking Datavault
7,075,738 UART: [state] Locking PCR0, PCR1 and PCR31
7,076,342 UART: [state] Locking ICCM
7,076,916 UART: [exit] Launching FMC @ 0x40000130
7,082,245 UART:
7,082,261 UART: Running Caliptra FMC ...
7,082,669 UART:
7,082,723 UART: [state] CFI Enabled
7,172,152 UART: [art] Extend RT PCRs Done
7,172,580 UART: [art] Lock RT PCRs Done
7,173,937 UART: [art] Populate DV Done
7,182,069 UART: [fht] FMC Alias Private Key: 7
7,183,227 UART: [art] Derive CDI
7,183,507 UART: [art] Store in in slot 0x4
7,269,066 UART: [art] Derive Key Pair
7,269,426 UART: [art] Store priv key in slot 0x5
7,282,458 UART: [art] Derive Key Pair - Done
7,297,317 UART: [art] Signing Cert with AUTHO
7,297,797 UART: RITY.KEYID = 7
7,312,471 UART: [art] Erasing AUTHORITY.KEYID = 7
7,313,236 UART: [art] PUB.X = 7E101B163B11CA4628C37A0A8E43D3404E19A33DACBFED3FA4656218775E54035F4C5F7A9CB7DB63055EBADA841289BF
7,320,009 UART: [art] PUB.Y = 9494CE6FCF372319A6F286655CEB0068BA0C53A0CDFB9F12346A8E30A6884E35069B2A32229AB60B99D2C42A34BEC23A
7,326,936 UART: [art] SIG.R = 34498FD06660A0206F8E8E0F411D35543F746A9843BCF94CD2A026CA0AAC0549AF535E7061009A2D859E0A3E227C9792
7,333,670 UART: [art] SIG.S = 7A5597390FE6B2028EC397901B8FAB8E8C3C42D9F060745A1E5346B66BDEAC49902D8A0FA727D421F60450D6D670520A
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:d7:1a:a0:2f:78:58:6c:33:25:94:70:17:ba:a3:17:ed:fa:cb:6b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4DD71AA02F78586C3325947017BAA317EDFACB6B8816BEDFC5557FF103199E3D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7e:10:1b:16:3b:11:ca:46:28:c3:7a:0a:8e:43:
d3:40:4e:19:a3:3d:ac:bf:ed:3f:a4:65:62:18:77:
5e:54:03:5f:4c:5f:7a:9c:b7:db:63:05:5e:ba:da:
84:12:89:bf:94:94:ce:6f:cf:37:23:19:a6:f2:86:
65:5c:eb:00:68:ba:0c:53:a0:cd:fb:9f:12:34:6a:
8e:30:a6:88:4e:35:06:9b:2a:32:22:9a:b6:0b:99:
d2:c4:2a:34:be:c2:3a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
4D:D7:1A:A0:2F:78:58:6C:33:25:94:70:17:BA:A3:17:ED:FA:CB:6B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:34:49:8f:d0:66:60:a0:20:6f:8e:8e:0f:41:1d:
35:54:3f:74:6a:98:43:bc:f9:4c:d2:a0:26:ca:0a:ac:05:49:
af:53:5e:70:61:00:9a:2d:85:9e:0a:3e:22:7c:97:92:02:30:
7a:55:97:39:0f:e6:b2:02:8e:c3:97:90:1b:8f:ab:8e:8c:3c:
42:d9:f0:60:74:5a:1e:53:46:b6:6b:de:ac:49:90:2d:8a:0f:
a7:27:d4:21:f6:04:50:d6:d6:70:52:0a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 852 bytes from beginning
UART: [art] Lock RT PCRs Done
3,380,358 UART: [art] Populate DV Done
3,388,688 UART: [fht] FMC Alias Private Key: 7
3,389,642 UART: [art] Derive CDI
3,389,922 UART: [art] Store in in slot 0x4
3,475,973 UART: [art] Derive Key Pair
3,476,333 UART: [art] Store priv key in slot 0x5
3,489,363 UART: [art] Derive Key Pair - Done
3,503,856 UART: [art] Signing Cert with AUTHO
3,504,336 UART: RITY.KEYID = 7
3,519,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,520,199 UART: [art] PUB.X = 5DE50C79B140E7F1961CEE935B8F1E7623103213BAAF18DAC228F00F7E4D914DF29599A456BCF961F4A5821F4611C2C6
3,526,969 UART: [art] PUB.Y = 1AA4FE385D33EA5C3EA6ADDF253824040F262ED8F1F0098D4DBE332B8DB9D10AC073ED86E7CFF1C1C03FF8FE2B9B14E9
3,533,933 UART: [art] SIG.R = 86C0E2A632E25D9043123A13E2D50E30C282D29BA4A335DF62D24F6E924D3A7C797289DCC5D442C6081C9ECECE34D19F
3,540,705 UART: [art] SIG.S = 683CCCAA017F6749E0FC848081B669477707934AC37C43C1A2F9819DB7C9EFF7C4C62C73CEBA69408BCA16C13D5569DC
3,565,188 UART: Caliptra RT
3,565,442 UART: [state] CFI Enabled
3,673,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,808 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,743,753 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,204 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
07:08:6c:31:06:35:e0:30:ed:80:3a:7f:70:7f:d7:76:8a:ce:a5:6a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=87086C310635E030ED803A7F707FD7768ACEA56A85B1B5FD1192458BFBE393AB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5d:e5:0c:79:b1:40:e7:f1:96:1c:ee:93:5b:8f:
1e:76:23:10:32:13:ba:af:18:da:c2:28:f0:0f:7e:
4d:91:4d:f2:95:99:a4:56:bc:f9:61:f4:a5:82:1f:
46:11:c2:c6:1a:a4:fe:38:5d:33:ea:5c:3e:a6:ad:
df:25:38:24:04:0f:26:2e:d8:f1:f0:09:8d:4d:be:
33:2b:8d:b9:d1:0a:c0:73:ed:86:e7:cf:f1:c1:c0:
3f:f8:fe:2b:9b:14:e9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
87:08:6C:31:06:35:E0:30:ED:80:3A:7F:70:7F:D7:76:8A:CE:A5:6A
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:86:c0:e2:a6:32:e2:5d:90:43:12:3a:13:e2:
d5:0e:30:c2:82:d2:9b:a4:a3:35:df:62:d2:4f:6e:92:4d:3a:
7c:79:72:89:dc:c5:d4:42:c6:08:1c:9e:ce:ce:34:d1:9f:02:
30:68:3c:cc:aa:01:7f:67:49:e0:fc:84:80:81:b6:69:47:77:
07:93:4a:c3:7c:43:c1:a2:f9:81:9d:b7:c9:ef:f7:c4:c6:2c:
73:ce:ba:69:40:8b:ca:16:c1:3d:55:69:dc
3,796,160 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,778,431 >>> mbox cmd response: success
6,792,232 UART:
6,792,248 UART: Running Caliptra FMC ...
6,792,656 UART:
6,792,710 UART: [state] CFI Enabled
6,881,703 UART: [art] Extend RT PCRs Done
6,882,131 UART: [art] Lock RT PCRs Done
6,883,150 UART: [art] Populate DV Done
6,891,510 UART: [fht] FMC Alias Private Key: 7
6,892,686 UART: [art] Derive CDI
6,892,966 UART: [art] Store in in slot 0x4
6,978,585 UART: [art] Derive Key Pair
6,978,945 UART: [art] Store priv key in slot 0x5
6,992,073 UART: [art] Derive Key Pair - Done
7,006,905 UART: [art] Signing Cert with AUTHO
7,007,385 UART: RITY.KEYID = 7
7,022,821 UART: [art] Erasing AUTHORITY.KEYID = 7
7,023,586 UART: [art] PUB.X = 1EAC852309AC32DC9BAA50FAD8C13E3B1B3A1F06111610E72EA1A162D9014399415C567BA2A1AECE1BF8014DB49A8F7F
7,030,360 UART: [art] PUB.Y = 0718C8472FB1796AC0503EA516C2EB8AC09F39A8ACD08618DDA518041CFAB1B8BFC2342B3BD19AB0E952D725B539E2E4
7,037,318 UART: [art] SIG.R = E847A52BC6F41905C43157B4E274ED3E4BBF6376857CF14418960736B332A7C5BF6981734BCAC676A79838B0523E6F20
7,044,078 UART: [art] SIG.S = DD9E3F95660D72C48387F1358D9186C7C3ED67BE78ED34877D200F202F5DC4AB8EC2EC24F4A193A04B9086F2680A11EE
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
64:cc:b4:f0:2f:a0:33:cd:f4:0d:5f:2e:92:86:52:2b:c4:74:3a:eb
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=60CCB4F02FA033CDF40D5F2E9286522BC4743AEB0A0689BB548D8ED3FAD37FD3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1e:ac:85:23:09:ac:32:dc:9b:aa:50:fa:d8:c1:
3e:3b:1b:3a:1f:06:11:16:10:e7:2e:a1:a1:62:d9:
01:43:99:41:5c:56:7b:a2:a1:ae:ce:1b:f8:01:4d:
b4:9a:8f:7f:07:18:c8:47:2f:b1:79:6a:c0:50:3e:
a5:16:c2:eb:8a:c0:9f:39:a8:ac:d0:86:18:dd:a5:
18:04:1c:fa:b1:b8:bf:c2:34:2b:3b:d1:9a:b0:e9:
52:d7:25:b5:39:e2:e4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
60:CC:B4:F0:2F:A0:33:CD:F4:0D:5F:2E:92:86:52:2B:C4:74:3A:EB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e8:47:a5:2b:c6:f4:19:05:c4:31:57:b4:e2:
74:ed:3e:4b:bf:63:76:85:7c:f1:44:18:96:07:36:b3:32:a7:
c5:bf:69:81:73:4b:ca:c6:76:a7:98:38:b0:52:3e:6f:20:02:
31:00:dd:9e:3f:95:66:0d:72:c4:83:87:f1:35:8d:91:86:c7:
c3:ed:67:be:78:ed:34:87:7d:20:0f:20:2f:5d:c4:ab:8e:c2:
ec:24:f4:a1:93:a0:4b:90:86:f2:68:0a:11:ee
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.09s
Truncated 5296 bytes from beginning
l=0, next_pc=40005400
3,880,813 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,520 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,419 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:15:68:df:de:10:22:55:fe:1b:c0:ea:83:48:12:de:0b:04:72:08
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D91568DFDE102255FE1BC0EA834812DE0B047208953CFE5E40350270928451CD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:df:88:90:9d:c7:94:1d:44:19:fd:ca:84:f8:38:
a4:2e:d9:ae:08:fc:94:99:45:be:3d:cd:09:9c:d3:
87:37:c7:55:b4:d3:fd:8f:0e:fc:e5:0a:e1:7a:ac:
2c:56:47:12:81:96:5f:d8:8e:23:ab:ae:6b:84:b1:
79:d8:b8:75:9a:c4:e6:5a:a1:0b:31:f5:45:c5:a5:
7e:bf:dd:23:90:9e:89:74:fd:ee:4d:1a:f1:2e:0d:
cc:2b:36:2f:68:4f:af
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
D9:15:68:DF:DE:10:22:55:FE:1B:C0:EA:83:48:12:DE:0B:04:72:08
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:5a:59:37:99:6d:aa:cb:40:0a:7a:64:a7:10:52:
21:ae:9d:4f:37:2c:e8:7c:e6:0b:71:f0:6d:ec:8d:fc:d8:31:
58:3f:83:9c:4e:74:9a:33:a2:e8:3d:89:f2:21:55:02:02:30:
59:4d:2f:3d:9e:a9:89:8c:40:d2:1c:57:96:a4:f5:5b:ea:92:
d3:0c:9f:a1:8d:a5:c2:25:5f:fc:72:c9:97:64:fc:a0:48:33:
44:20:fb:1b:e6:cb:29:be:80:ae:7e:e7
3,973,177 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,730 UART:
3,973,746 UART: Running Caliptra ROM ...
3,974,154 UART:
3,974,296 UART: [state] CFI Enabled
3,976,913 UART: [state] LifecycleState = Production
3,977,521 UART: [state] DebugLocked = Yes
3,978,197 UART: [state] Starting the WD Timer 40000000 cycles
3,979,855 UART: [kat] SHA2-256
4,785,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,789,630 UART: [kat] ++
4,789,782 UART: [kat] sha1
4,794,080 UART: [kat] SHA2-256
4,796,020 UART: [kat] SHA2-384
4,798,787 UART: [kat] SHA2-512-ACC
4,800,687 UART: [kat] ECC-384
4,810,476 UART: [kat] HMAC-384Kdf
4,814,980 UART: [kat] LMS
5,063,308 UART: [kat] --
5,064,286 UART: [update-reset] ++
6,931,632 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,932,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
7,079,317 >>> mbox cmd response: success
7,079,597 UART: [update-reset] Copying MAN_2 To MAN_1
7,087,609 UART: [update-reset Success] --
7,088,524 UART: [state] Locking Datavault
7,089,328 UART: [state] Locking PCR0, PCR1 and PCR31
7,089,932 UART: [state] Locking ICCM
7,090,600 UART: [exit] Launching FMC @ 0x40000130
7,095,929 UART:
7,095,945 UART: Running Caliptra FMC ...
7,096,353 UART:
7,096,496 UART: [state] CFI Enabled
7,185,545 UART: [art] Extend RT PCRs Done
7,185,973 UART: [art] Lock RT PCRs Done
7,187,660 UART: [art] Populate DV Done
7,195,656 UART: [fht] FMC Alias Private Key: 7
7,196,788 UART: [art] Derive CDI
7,197,068 UART: [art] Store in in slot 0x4
7,282,821 UART: [art] Derive Key Pair
7,283,181 UART: [art] Store priv key in slot 0x5
7,296,129 UART: [art] Derive Key Pair - Done
7,310,782 UART: [art] Signing Cert with AUTHO
7,311,262 UART: RITY.KEYID = 7
7,326,350 UART: [art] Erasing AUTHORITY.KEYID = 7
7,327,115 UART: [art] PUB.X = 37538CB20BBFD76C9893879CE301ACBFF6F10A1C0B2B542FFC9EE8B358CA087D31392B91B2C256F420EBED6084F39FB2
7,333,886 UART: [art] PUB.Y = 24823531BF6C4A85792827BCE0E3A6AC56F6CED80A40CA563E8BE3E042747F5822B91A53266710A1D4ED51CB7370650D
7,340,832 UART: [art] SIG.R = 8D86660B6CF9DE218973FAA8880640857790D82FAB3421C20623792FB71B3A089DD4814CCF512CDB53794520169370B9
7,347,582 UART: [art] SIG.S = 10C3320378CA9155833FE4A09775A8900AABAE45F846310FA7959A15B6EF6B5D3ACE1E7E4FDC2D05ADE1E41F9DC40E02
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:fe:0c:b2:a5:cc:3e:fd:97:21:18:a1:06:7f:cf:b0:ff:a7:a2:ec
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=14FE0CB2A5CC3EFD972118A1067FCFB0FFA7A2ECAE088328387E6EEAF4CC763F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:37:53:8c:b2:0b:bf:d7:6c:98:93:87:9c:e3:01:
ac:bf:f6:f1:0a:1c:0b:2b:54:2f:fc:9e:e8:b3:58:
ca:08:7d:31:39:2b:91:b2:c2:56:f4:20:eb:ed:60:
84:f3:9f:b2:24:82:35:31:bf:6c:4a:85:79:28:27:
bc:e0:e3:a6:ac:56:f6:ce:d8:0a:40:ca:56:3e:8b:
e3:e0:42:74:7f:58:22:b9:1a:53:26:67:10:a1:d4:
ed:51:cb:73:70:65:0d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
14:FE:0C:B2:A5:CC:3E:FD:97:21:18:A1:06:7F:CF:B0:FF:A7:A2:EC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8d:86:66:0b:6c:f9:de:21:89:73:fa:a8:88:
06:40:85:77:90:d8:2f:ab:34:21:c2:06:23:79:2f:b7:1b:3a:
08:9d:d4:81:4c:cf:51:2c:db:53:79:45:20:16:93:70:b9:02:
30:10:c3:32:03:78:ca:91:55:83:3f:e4:a0:97:75:a8:90:0a:
ab:ae:45:f8:46:31:0f:a7:95:9a:15:b6:ef:6b:5d:3a:ce:1e:
7e:4f:dc:2d:05:ad:e1:e4:1f:9d:c4:0e:02
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
Truncated 849 bytes from beginning
487 UART: [art] Lock RT PCRs Done
3,381,789 UART: [art] Populate DV Done
3,390,229 UART: [fht] FMC Alias Private Key: 7
3,391,289 UART: [art] Derive CDI
3,391,569 UART: [art] Store in in slot 0x4
3,477,028 UART: [art] Derive Key Pair
3,477,388 UART: [art] Store priv key in slot 0x5
3,490,526 UART: [art] Derive Key Pair - Done
3,505,309 UART: [art] Signing Cert with AUTHO
3,505,789 UART: RITY.KEYID = 7
3,521,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,521,828 UART: [art] PUB.X = 05ABF77AB7FE741F835241FD40E3D6B8730568EA04E0CC8F50175E75EA25180E5C2B661FFCBC4D19694DA258C7592999
3,528,592 UART: [art] PUB.Y = 1A71D99049703EFA9DE5F52BD560E0797E447B28C0DBDAAE68C332199C292A4BAE11A574765AB1F68E1F434480FFA5C4
3,535,552 UART: [art] SIG.R = 467859F5995AE760D76703217E675E839708A3014B348271BDBFB576869EEFA82C499F3D16E2F0432AC80BBA1F529350
3,542,304 UART: [art] SIG.S = 0542F1DC8872C12A18E9CB3E1E97E0B48691698679F477DD8DE795A2D79B8EAE1C202643050C9BB0C0223FE5E14669E4
3,565,278 UART: Caliptra RT
3,565,624 UART: [state] CFI Enabled
3,672,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,573 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,368 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,775 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:c9:70:6d:23:a4:e3:9c:d1:72:27:6d:01:71:33:0e:39:20:b5:05
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F5C9706D23A4E39CD172276D0171330E3920B5050072D7102B643E4C3E6A22F9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:05:ab:f7:7a:b7:fe:74:1f:83:52:41:fd:40:e3:
d6:b8:73:05:68:ea:04:e0:cc:8f:50:17:5e:75:ea:
25:18:0e:5c:2b:66:1f:fc:bc:4d:19:69:4d:a2:58:
c7:59:29:99:1a:71:d9:90:49:70:3e:fa:9d:e5:f5:
2b:d5:60:e0:79:7e:44:7b:28:c0:db:da:ae:68:c3:
32:19:9c:29:2a:4b:ae:11:a5:74:76:5a:b1:f6:8e:
1f:43:44:80:ff:a5:c4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
F5:C9:70:6D:23:A4:E3:9C:D1:72:27:6D:01:71:33:0E:39:20:B5:05
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:46:78:59:f5:99:5a:e7:60:d7:67:03:21:7e:67:
5e:83:97:08:a3:01:4b:34:82:71:bd:bf:b5:76:86:9e:ef:a8:
2c:49:9f:3d:16:e2:f0:43:2a:c8:0b:ba:1f:52:93:50:02:30:
05:42:f1:dc:88:72:c1:2a:18:e9:cb:3e:1e:97:e0:b4:86:91:
69:86:79:f4:77:dd:8d:e7:95:a2:d7:9b:8e:ae:1c:20:26:43:
05:0c:9b:b0:c0:22:3f:e5:e1:46:69:e4
3,794,623 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,766,465 >>> mbox cmd response: success
6,779,806 UART:
6,779,822 UART: Running Caliptra FMC ...
6,780,230 UART:
6,780,373 UART: [state] CFI Enabled
6,869,628 UART: [art] Extend RT PCRs Done
6,870,056 UART: [art] Lock RT PCRs Done
6,871,223 UART: [art] Populate DV Done
6,879,451 UART: [fht] FMC Alias Private Key: 7
6,880,471 UART: [art] Derive CDI
6,880,751 UART: [art] Store in in slot 0x4
6,966,440 UART: [art] Derive Key Pair
6,966,800 UART: [art] Store priv key in slot 0x5
6,979,912 UART: [art] Derive Key Pair - Done
6,994,716 UART: [art] Signing Cert with AUTHO
6,995,196 UART: RITY.KEYID = 7
7,010,114 UART: [art] Erasing AUTHORITY.KEYID = 7
7,010,879 UART: [art] PUB.X = 5B75A0F35E36889107529D63CCE9654EAD7B94756B03A77260C34B8EC2D736EB4FF851A8C5FA8205AE15D7C85B05E7ED
7,017,645 UART: [art] PUB.Y = 51FBA72C010742BC15647FD50C28F58593B94FB26B8B41A64BA24C48618B6281D2B0E8926EE7F31D5F92D421C501F6BB
7,024,587 UART: [art] SIG.R = AEC22C9683AD264E48E3C1521D9D432F82310B930920F5B3709A049118EB873D8F6F96F4C775CE89EE9CC55FAC2E9E43
7,031,354 UART: [art] SIG.S = D5BD9E41A1AA2986C0EFC03DB02CF642A40639EA597D796387B465CFCEBA0BE1D871F4EE5589BA0189705AE564AF690A
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
54:70:8c:65:33:79:75:dc:77:df:10:4b:2a:94:2d:7e:d5:a9:6f:92
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=50708C65337975DC77DF104B2A942D7ED5A96F9206A3DF243144A6589A54744D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5b:75:a0:f3:5e:36:88:91:07:52:9d:63:cc:e9:
65:4e:ad:7b:94:75:6b:03:a7:72:60:c3:4b:8e:c2:
d7:36:eb:4f:f8:51:a8:c5:fa:82:05:ae:15:d7:c8:
5b:05:e7:ed:51:fb:a7:2c:01:07:42:bc:15:64:7f:
d5:0c:28:f5:85:93:b9:4f:b2:6b:8b:41:a6:4b:a2:
4c:48:61:8b:62:81:d2:b0:e8:92:6e:e7:f3:1d:5f:
92:d4:21:c5:01:f6:bb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
50:70:8C:65:33:79:75:DC:77:DF:10:4B:2A:94:2D:7E:D5:A9:6F:92
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ae:c2:2c:96:83:ad:26:4e:48:e3:c1:52:1d:
9d:43:2f:82:31:0b:93:09:20:f5:b3:70:9a:04:91:18:eb:87:
3d:8f:6f:96:f4:c7:75:ce:89:ee:9c:c5:5f:ac:2e:9e:43:02:
31:00:d5:bd:9e:41:a1:aa:29:86:c0:ef:c0:3d:b0:2c:f6:42:
a4:06:39:ea:59:7d:79:63:87:b4:65:cf:ce:ba:0b:e1:d8:71:
f4:ee:55:89:ba:01:89:70:5a:e5:64:af:69:0a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.16s
Truncated 5299 bytes from beginning
, next_pc=40005400
3,873,497 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,286 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,743 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
24:6c:97:d4:4a:de:a9:0d:e3:6c:3f:f8:54:77:78:a0:24:f8:f4:e3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=206C97D44ADEA90DE36C3FF8547778A024F8F4E3E7232B174D3C9CAE15853FC3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c9:9c:08:b9:14:47:88:04:60:e4:9c:e3:7d:5a:
37:8b:f6:84:62:dc:d5:fa:47:8f:52:66:a3:8f:e2:
be:71:fa:50:7e:74:75:ca:a1:ad:43:37:c3:c4:ee:
2a:a1:b7:44:52:41:b5:1b:1f:6b:36:ec:bb:03:a7:
aa:30:51:81:fb:17:fb:eb:a3:5e:13:2f:c8:62:89:
38:ed:03:5d:94:ca:d9:4d:35:9d:03:fe:4a:ec:a1:
7b:5b:94:ee:7f:f1:be
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
20:6C:97:D4:4A:DE:A9:0D:E3:6C:3F:F8:54:77:78:A0:24:F8:F4:E3
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:92:97:7e:2f:43:0f:50:2a:e7:36:27:00:78:
67:0b:8f:dc:ac:f4:d1:f6:58:06:25:5f:ca:07:3a:ac:0e:53:
56:99:55:2f:5e:9b:de:31:85:4b:f8:8f:bd:8f:cd:85:34:02:
30:38:2b:b0:41:4a:ef:d3:54:6c:8b:7f:b5:62:83:a0:f4:cf:
b6:31:fc:64:c8:06:ad:30:8c:73:7f:6b:08:5d:0c:5f:a7:0d:
6f:8c:6c:a3:37:6a:e9:4d:ee:e3:f4:2a:d6
3,965,553 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,354 UART:
3,966,370 UART: Running Caliptra ROM ...
3,966,778 UART:
3,966,833 UART: [state] CFI Enabled
3,969,682 UART: [state] LifecycleState = Production
3,970,290 UART: [state] DebugLocked = Yes
3,970,960 UART: [state] Starting the WD Timer 40000000 cycles
3,972,610 UART: [kat] SHA2-256
4,776,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,780,289 UART: [kat] ++
4,780,441 UART: [kat] sha1
4,784,883 UART: [kat] SHA2-256
4,786,823 UART: [kat] SHA2-384
4,789,364 UART: [kat] SHA2-512-ACC
4,791,264 UART: [kat] ECC-384
4,800,967 UART: [kat] HMAC-384Kdf
4,805,485 UART: [kat] LMS
5,053,797 UART: [kat] --
5,054,741 UART: [update-reset] ++
6,915,216 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,916,379 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
7,062,903 >>> mbox cmd response: success
7,063,011 UART: [update-reset] Copying MAN_2 To MAN_1
7,071,023 UART: [update-reset Success] --
7,071,766 UART: [state] Locking Datavault
7,072,330 UART: [state] Locking PCR0, PCR1 and PCR31
7,072,934 UART: [state] Locking ICCM
7,073,486 UART: [exit] Launching FMC @ 0x40000130
7,078,815 UART:
7,078,831 UART: Running Caliptra FMC ...
7,079,239 UART:
7,079,293 UART: [state] CFI Enabled
7,168,950 UART: [art] Extend RT PCRs Done
7,169,378 UART: [art] Lock RT PCRs Done
7,170,887 UART: [art] Populate DV Done
7,179,217 UART: [fht] FMC Alias Private Key: 7
7,180,375 UART: [art] Derive CDI
7,180,655 UART: [art] Store in in slot 0x4
7,266,402 UART: [art] Derive Key Pair
7,266,762 UART: [art] Store priv key in slot 0x5
7,280,112 UART: [art] Derive Key Pair - Done
7,294,928 UART: [art] Signing Cert with AUTHO
7,295,408 UART: RITY.KEYID = 7
7,310,670 UART: [art] Erasing AUTHORITY.KEYID = 7
7,311,435 UART: [art] PUB.X = C0EEB6C8AF9FFDE4FC06AA2AFBB1F5870E4CC62807DC76A1DFA88AAE5419E73B83A6E0951E06D538941FB781815AF45E
7,318,217 UART: [art] PUB.Y = 91BA3D11235632F2633E9EDFEE53C93E2F580C3F946401D68EE63C86AE66D61D3C7A8769209004D1EC76A68A95F298EB
7,325,162 UART: [art] SIG.R = 4BC0744C3ACF804690797DC526943DB574697AEA786F89D677D8EB95663DD3B48E6ABA0524FF853D6153223AD72E7642
7,331,929 UART: [art] SIG.S = C8D0265284DF39DCE903353B28F5AF16B2FB69B9826CB6DAEB63FF898325F024616DE6A6D4D3236D575862671430EEB8
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:4f:8b:dd:80:72:f4:be:47:7a:dd:75:3c:dd:8b:ab:b7:4c:8b:a9
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1D4F8BDD8072F4BE477ADD753CDD8BABB74C8BA93CB4B81BB49CEB13F5A12A55
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c0:ee:b6:c8:af:9f:fd:e4:fc:06:aa:2a:fb:b1:
f5:87:0e:4c:c6:28:07:dc:76:a1:df:a8:8a:ae:54:
19:e7:3b:83:a6:e0:95:1e:06:d5:38:94:1f:b7:81:
81:5a:f4:5e:91:ba:3d:11:23:56:32:f2:63:3e:9e:
df:ee:53:c9:3e:2f:58:0c:3f:94:64:01:d6:8e:e6:
3c:86:ae:66:d6:1d:3c:7a:87:69:20:90:04:d1:ec:
76:a6:8a:95:f2:98:eb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
1D:4F:8B:DD:80:72:F4:BE:47:7A:DD:75:3C:DD:8B:AB:B7:4C:8B:A9
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:4b:c0:74:4c:3a:cf:80:46:90:79:7d:c5:26:94:
3d:b5:74:69:7a:ea:78:6f:89:d6:77:d8:eb:95:66:3d:d3:b4:
8e:6a:ba:05:24:ff:85:3d:61:53:22:3a:d7:2e:76:42:02:31:
00:c8:d0:26:52:84:df:39:dc:e9:03:35:3b:28:f5:af:16:b2:
fb:69:b9:82:6c:b6:da:eb:63:ff:89:83:25:f0:24:61:6d:e6:
a6:d4:d3:23:6d:57:58:62:67:14:30:ee:b8
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.21s
Truncated 849 bytes from beginning
472 UART: [art] Lock RT PCRs Done
3,372,162 UART: [art] Populate DV Done
3,380,442 UART: [fht] FMC Alias Private Key: 7
3,381,406 UART: [art] Derive CDI
3,381,686 UART: [art] Store in in slot 0x4
3,467,497 UART: [art] Derive Key Pair
3,467,857 UART: [art] Store priv key in slot 0x5
3,481,459 UART: [art] Derive Key Pair - Done
3,496,455 UART: [art] Signing Cert with AUTHO
3,496,935 UART: RITY.KEYID = 7
3,512,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,512,942 UART: [art] PUB.X = 91ADC86CC31C44A3ECCB4AD9B34522F051A420E2DA88242F31FA6CA92BB0157045F3CFFCC166D9DEDC6FBE39FF901654
3,519,734 UART: [art] PUB.Y = A7BCCFFE5AE3FD396FAD4BCC3378E31482A4FF84A4724227825E4507C8BAA27D25B5434FF9446E96757F5ABEA5FC9EF9
3,526,701 UART: [art] SIG.R = 0AA9D0F1CAAE21E9A86BA1163B6F844AD8B8D9AC76E1A4BBB66CC628AB92AC8B00908FAA66188C21362A1282BDDBC4F0
3,533,470 UART: [art] SIG.S = E8BC7892444699DFCEE31692D9140C80466F91EE81089CFCAFE9297FF201014F7B9392BCBFAF4E05A7BA8C01A20B6D43
3,557,462 UART: Caliptra RT
3,557,716 UART: [state] CFI Enabled
3,665,834 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,928 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,835 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,200 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:89:18:b0:02:75:b3:6f:15:9a:5b:af:9f:ad:13:a8:3f:3c:d0:80
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AC8918B00275B36F159A5BAF9FAD13A83F3CD080FF1594204C5A74BA3B8BEE00
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ad:c8:6c:c3:1c:44:a3:ec:cb:4a:d9:b3:45:
22:f0:51:a4:20:e2:da:88:24:2f:31:fa:6c:a9:2b:
b0:15:70:45:f3:cf:fc:c1:66:d9:de:dc:6f:be:39:
ff:90:16:54:a7:bc:cf:fe:5a:e3:fd:39:6f:ad:4b:
cc:33:78:e3:14:82:a4:ff:84:a4:72:42:27:82:5e:
45:07:c8:ba:a2:7d:25:b5:43:4f:f9:44:6e:96:75:
7f:5a:be:a5:fc:9e:f9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
AC:89:18:B0:02:75:B3:6F:15:9A:5B:AF:9F:AD:13:A8:3F:3C:D0:80
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0a:a9:d0:f1:ca:ae:21:e9:a8:6b:a1:16:3b:6f:
84:4a:d8:b8:d9:ac:76:e1:a4:bb:b6:6c:c6:28:ab:92:ac:8b:
00:90:8f:aa:66:18:8c:21:36:2a:12:82:bd:db:c4:f0:02:31:
00:e8:bc:78:92:44:46:99:df:ce:e3:16:92:d9:14:0c:80:46:
6f:91:ee:81:08:9c:fc:af:e9:29:7f:f2:01:01:4f:7b:93:92:
bc:bf:af:4e:05:a7:ba:8c:01:a2:0b:6d:43
3,788,230 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,762,079 >>> mbox cmd response: success
6,775,700 UART:
6,775,716 UART: Running Caliptra FMC ...
6,776,124 UART:
6,776,178 UART: [state] CFI Enabled
6,865,439 UART: [art] Extend RT PCRs Done
6,865,867 UART: [art] Lock RT PCRs Done
6,866,954 UART: [art] Populate DV Done
6,875,056 UART: [fht] FMC Alias Private Key: 7
6,875,994 UART: [art] Derive CDI
6,876,274 UART: [art] Store in in slot 0x4
6,962,203 UART: [art] Derive Key Pair
6,962,563 UART: [art] Store priv key in slot 0x5
6,975,703 UART: [art] Derive Key Pair - Done
6,990,656 UART: [art] Signing Cert with AUTHO
6,991,136 UART: RITY.KEYID = 7
7,006,234 UART: [art] Erasing AUTHORITY.KEYID = 7
7,006,999 UART: [art] PUB.X = 6255E2C9C52085CC347A0089C84AEBA09905243281C0BF9A0586EA5D4C21A3067FF975347F7DF3DA228D8B0A96C2CBAA
7,013,743 UART: [art] PUB.Y = 5755F27075ABC442EBE52BD869A64441AA66100AC981FA549A75C8D80631CCB72CEB253E4B24F5D7E3CB09B27FAA1CC1
7,020,698 UART: [art] SIG.R = DBA4F42FCE12225096ACD6B27092F25F1A1609F6B875BB68E01A30F4BB5574F718A4AC275C6FB58EA5D18A598D8F27DC
7,027,479 UART: [art] SIG.S = 72AB346CEEBB1C6E33AC077A3365B21370EC1D6AA0334B821376BDECEDB98A95B04B49D313E8414424CF30B2CE7B9346
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3e:56:46:74:3a:91:1f:6b:20:58:09:56:53:0a:8f:7b:af:dc:a9:cc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3E5646743A911F6B20580956530A8F7BAFDCA9CCB3EF9A8093BC71781317276A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:62:55:e2:c9:c5:20:85:cc:34:7a:00:89:c8:4a:
eb:a0:99:05:24:32:81:c0:bf:9a:05:86:ea:5d:4c:
21:a3:06:7f:f9:75:34:7f:7d:f3:da:22:8d:8b:0a:
96:c2:cb:aa:57:55:f2:70:75:ab:c4:42:eb:e5:2b:
d8:69:a6:44:41:aa:66:10:0a:c9:81:fa:54:9a:75:
c8:d8:06:31:cc:b7:2c:eb:25:3e:4b:24:f5:d7:e3:
cb:09:b2:7f:aa:1c:c1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
3E:56:46:74:3A:91:1F:6B:20:58:09:56:53:0A:8F:7B:AF:DC:A9:CC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:db:a4:f4:2f:ce:12:22:50:96:ac:d6:b2:70:
92:f2:5f:1a:16:09:f6:b8:75:bb:68:e0:1a:30:f4:bb:55:74:
f7:18:a4:ac:27:5c:6f:b5:8e:a5:d1:8a:59:8d:8f:27:dc:02:
30:72:ab:34:6c:ee:bb:1c:6e:33:ac:07:7a:33:65:b2:13:70:
ec:1d:6a:a0:33:4b:82:13:76:bd:ec:ed:b9:8a:95:b0:4b:49:
d3:13:e8:41:44:24:cf:30:b2:ce:7b:93:46
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 5302 bytes from beginning
ext_pc=40005400
3,878,262 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,167 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,392 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:57:93:6c:f7:ca:35:ee:d2:b6:08:22:ea:86:93:9b:af:0d:3a:0d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9F57936CF7CA35EED2B60822EA86939BAF0D3A0D630205427A12632F0B899259
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0d:fc:29:1f:96:db:44:73:a4:3b:98:62:1b:fc:
db:f8:87:83:1a:88:90:03:f8:bf:0b:35:86:db:2d:
c9:cf:6f:40:36:2e:2f:a0:b4:2e:98:11:47:06:de:
34:64:f1:ba:05:cb:74:9b:c4:a3:ac:9c:d2:11:3a:
7d:8a:32:8c:c2:ad:88:ca:5a:a6:b3:ab:75:38:ed:
da:5d:14:7f:57:c0:d8:98:b1:2d:98:e7:a0:87:a6:
bd:db:fb:5b:53:bc:26
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
9F:57:93:6C:F7:CA:35:EE:D2:B6:08:22:EA:86:93:9B:AF:0D:3A:0D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:8a:18:14:fd:d9:f9:7f:5c:5b:37:e5:36:35:
0a:eb:47:7c:fd:75:0c:99:35:e3:9b:9a:90:8d:d1:d2:43:bf:
8b:f2:36:f1:48:36:ef:7c:d7:5f:6a:18:01:60:96:68:06:02:
31:00:f3:cb:08:bc:75:57:9f:e2:a9:a8:0a:1a:8c:79:03:dc:
0f:6d:d1:e3:a5:39:13:06:b7:c5:ef:35:21:f9:c5:e4:67:60:
92:05:76:f4:9e:02:85:be:0d:1c:45:6b:bc:68
3,970,225 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,062 UART:
3,971,078 UART: Running Caliptra ROM ...
3,971,486 UART:
3,971,628 UART: [state] CFI Enabled
3,974,487 UART: [state] LifecycleState = Production
3,975,095 UART: [state] DebugLocked = Yes
3,975,717 UART: [state] Starting the WD Timer 40000000 cycles
3,977,223 UART: [kat] SHA2-256
4,780,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,784,902 UART: [kat] ++
4,785,054 UART: [kat] sha1
4,789,298 UART: [kat] SHA2-256
4,791,238 UART: [kat] SHA2-384
4,794,103 UART: [kat] SHA2-512-ACC
4,796,003 UART: [kat] ECC-384
4,805,598 UART: [kat] HMAC-384Kdf
4,810,012 UART: [kat] LMS
5,058,324 UART: [kat] --
5,059,090 UART: [update-reset] ++
6,905,313 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,906,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87448
7,052,802 >>> mbox cmd response: success
7,052,946 UART: [update-reset] Copying MAN_2 To MAN_1
7,060,958 UART: [update-reset Success] --
7,061,917 UART: [state] Locking Datavault
7,062,913 UART: [state] Locking PCR0, PCR1 and PCR31
7,063,517 UART: [state] Locking ICCM
7,064,003 UART: [exit] Launching FMC @ 0x40000130
7,069,332 UART:
7,069,348 UART: Running Caliptra FMC ...
7,069,756 UART:
7,069,899 UART: [state] CFI Enabled
7,158,664 UART: [art] Extend RT PCRs Done
7,159,092 UART: [art] Lock RT PCRs Done
7,160,105 UART: [art] Populate DV Done
7,168,395 UART: [fht] FMC Alias Private Key: 7
7,169,435 UART: [art] Derive CDI
7,169,715 UART: [art] Store in in slot 0x4
7,255,654 UART: [art] Derive Key Pair
7,256,014 UART: [art] Store priv key in slot 0x5
7,268,942 UART: [art] Derive Key Pair - Done
7,283,114 UART: [art] Signing Cert with AUTHO
7,283,594 UART: RITY.KEYID = 7
7,299,120 UART: [art] Erasing AUTHORITY.KEYID = 7
7,299,885 UART: [art] PUB.X = 5D8E31637CA32CA67A01F89C86B3EE6EB072860B71328CDC3ACEE4C8646AB0110FD719C9A267C1E4516AA63B37189881
7,306,652 UART: [art] PUB.Y = C2F8DA57B16FE2E32061AF6EAF5F9E5125305C89F1E052A34BA19A777C00560FBBCAAF58BDF458B5CEE7792226ED7E13
7,313,595 UART: [art] SIG.R = CB144053D70A9F5F5F3DCCAF091F96A7B48BB7FF19107779CDDE853097489B6A5D4666F336F3B4B2D27170B910B361AB
7,320,367 UART: [art] SIG.S = 1D670E0C3D7546863C935A882CA8E3C44E77C450FA902438BE8A983421B909AF10FDAB33D8C80895AE5C05130C35DF88
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:59:3a:a7:b9:95:9d:30:97:31:1e:9a:9d:e3:7a:df:d3:bf:32:4b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6F593AA7B9959D3097311E9A9DE37ADFD3BF324B62A9BDF54B2A6E02EEA6BD79
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5d:8e:31:63:7c:a3:2c:a6:7a:01:f8:9c:86:b3:
ee:6e:b0:72:86:0b:71:32:8c:dc:3a:ce:e4:c8:64:
6a:b0:11:0f:d7:19:c9:a2:67:c1:e4:51:6a:a6:3b:
37:18:98:81:c2:f8:da:57:b1:6f:e2:e3:20:61:af:
6e:af:5f:9e:51:25:30:5c:89:f1:e0:52:a3:4b:a1:
9a:77:7c:00:56:0f:bb:ca:af:58:bd:f4:58:b5:ce:
e7:79:22:26:ed:7e:13
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
6F:59:3A:A7:B9:95:9D:30:97:31:1E:9A:9D:E3:7A:DF:D3:BF:32:4B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:cb:14:40:53:d7:0a:9f:5f:5f:3d:cc:af:09:
1f:96:a7:b4:8b:b7:ff:19:10:77:79:cd:de:85:30:97:48:9b:
6a:5d:46:66:f3:36:f3:b4:b2:d2:71:70:b9:10:b3:61:ab:02:
30:1d:67:0e:0c:3d:75:46:86:3c:93:5a:88:2c:a8:e3:c4:4e:
77:c4:50:fa:90:24:38:be:8a:98:34:21:b9:09:af:10:fd:ab:
33:d8:c8:08:95:ae:5c:05:13:0c:35:df:88
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.22s
Truncated 852 bytes from beginning
UART: [art] Lock RT PCRs Done
3,374,656 UART: [art] Populate DV Done
3,382,880 UART: [fht] FMC Alias Private Key: 7
3,383,906 UART: [art] Derive CDI
3,384,186 UART: [art] Store in in slot 0x4
3,470,143 UART: [art] Derive Key Pair
3,470,503 UART: [art] Store priv key in slot 0x5
3,484,173 UART: [art] Derive Key Pair - Done
3,499,050 UART: [art] Signing Cert with AUTHO
3,499,530 UART: RITY.KEYID = 7
3,514,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,515,523 UART: [art] PUB.X = EC8B520AE959B543556D28DE73311C005B12B8A7F0A4C7DD0B9F7DB0D2CF7D5A2C65B65EA5B05ABC572ED5A77ADA059E
3,522,284 UART: [art] PUB.Y = CAC615BAD8B43F6E1E7256F43CA8EBB63AE6BB3A5EB2E501E943C94CD356AD918318716549FEB26BD6513AD61F743200
3,529,223 UART: [art] SIG.R = 87B33CA79C9F9D2172696BD5E50C6E9FBEEA14F92ED7ADA969BD403AC60D71B15249F9D68DE85F93FD58EE78ACB3C204
3,536,004 UART: [art] SIG.S = EFE1ACA9F938C5FE6FA8E72F8AAEAFAA2889431C4DFBE8C13060ED36FFCC0747D7B9DDC6A58412495F861E98C126001B
3,560,384 UART: Caliptra RT
3,560,730 UART: [state] CFI Enabled
3,668,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,068 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,891 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,350 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [d4, 8f, 83, b6, 29, 37, 8d, 32, ac, 25, 47, b3, 17, 99, 79, 4e, 35, 3e, 14, 60, ae, 77, 30, 48, f9, 02, 72, 3a, b9, 5e, ff, fb, 14, 2c, c7, e5, 1c, 7f, 45, 80, a7, ec, 89, f2, 2e, a5, 31, c1]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:d5:36:c9:da:bd:80:25:cc:82:9a:f9:1a:a1:f3:59:2a:bf:da:c7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8BD536C9DABD8025CC829AF91AA1F3592ABFDAC7114C45990614383AFAF37EC3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ec:8b:52:0a:e9:59:b5:43:55:6d:28:de:73:31:
1c:00:5b:12:b8:a7:f0:a4:c7:dd:0b:9f:7d:b0:d2:
cf:7d:5a:2c:65:b6:5e:a5:b0:5a:bc:57:2e:d5:a7:
7a:da:05:9e:ca:c6:15:ba:d8:b4:3f:6e:1e:72:56:
f4:3c:a8:eb:b6:3a:e6:bb:3a:5e:b2:e5:01:e9:43:
c9:4c:d3:56:ad:91:83:18:71:65:49:fe:b2:6b:d6:
51:3a:d6:1f:74:32:00
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0....2.7).G%.Ny..`.>5H0w.:r....^...,..E.......1....RT_INFO
X509v3 Subject Key Identifier:
8B:D5:36:C9:DA:BD:80:25:CC:82:9A:F9:1A:A1:F3:59:2A:BF:DA:C7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:87:b3:3c:a7:9c:9f:9d:21:72:69:6b:d5:e5:
0c:6e:9f:be:ea:14:f9:2e:d7:ad:a9:69:bd:40:3a:c6:0d:71:
b1:52:49:f9:d6:8d:e8:5f:93:fd:58:ee:78:ac:b3:c2:04:02:
31:00:ef:e1:ac:a9:f9:38:c5:fe:6f:a8:e7:2f:8a:ae:af:aa:
28:89:43:1c:4d:fb:e8:c1:30:60:ed:36:ff:cc:07:47:d7:b9:
dd:c6:a5:84:12:49:5f:86:1e:98:c1:26:00:1b
3,791,077 <<< Executing mbox cmd 0x46574c44 (112132 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,766,137 >>> mbox cmd response: success
6,779,144 UART:
6,779,160 UART: Running Caliptra FMC ...
6,779,568 UART:
6,779,711 UART: [state] CFI Enabled
6,867,868 UART: [art] Extend RT PCRs Done
6,868,296 UART: [art] Lock RT PCRs Done
6,869,561 UART: [art] Populate DV Done
6,877,631 UART: [fht] FMC Alias Private Key: 7
6,878,665 UART: [art] Derive CDI
6,878,945 UART: [art] Store in in slot 0x4
6,964,998 UART: [art] Derive Key Pair
6,965,358 UART: [art] Store priv key in slot 0x5
6,978,680 UART: [art] Derive Key Pair - Done
6,993,795 UART: [art] Signing Cert with AUTHO
6,994,275 UART: RITY.KEYID = 7
7,009,693 UART: [art] Erasing AUTHORITY.KEYID = 7
7,010,458 UART: [art] PUB.X = C15EFEBC11100035A430998F43A4D378A0D575B832F66567329CCC45E8CFEEE3B1DDD4AE12095E72CDD539A5F484B033
7,017,213 UART: [art] PUB.Y = 8FC4E54C6D4BFDDFB615AED849FEE4DE76203AB54D98398A1A57BC6307948B928AC2AAA6A9573574C6F7C9E48D532DA3
7,024,178 UART: [art] SIG.R = 3D61FCACC0FB2DA13DEDB0E537A84FDE0F31C24A0FBBDC5DEC8C8386AA14FC890A0406F8297C7C3077FD6FB3BB7630F8
7,030,963 UART: [art] SIG.S = FA2835B3B277E5C81C9C4EEFFF711F11AE12EE81E6FB751F5F7061A6EEE42EA695E1D60D83F9AEB185BBBCC568DD9113
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
27:51:c4:9e:ec:a5:b6:b0:5c:56:95:b2:3f:31:52:0f:6d:bd:0e:dc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A751C49EECA5B6B05C5695B23F31520F6DBD0EDCE57E5273710E0983B705669C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c1:5e:fe:bc:11:10:00:35:a4:30:99:8f:43:a4:
d3:78:a0:d5:75:b8:32:f6:65:67:32:9c:cc:45:e8:
cf:ee:e3:b1:dd:d4:ae:12:09:5e:72:cd:d5:39:a5:
f4:84:b0:33:8f:c4:e5:4c:6d:4b:fd:df:b6:15:ae:
d8:49:fe:e4:de:76:20:3a:b5:4d:98:39:8a:1a:57:
bc:63:07:94:8b:92:8a:c2:aa:a6:a9:57:35:74:c6:
f7:c9:e4:8d:53:2d:a3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.`...I7.a..~l.v..P...F..].....3...L.".N..B`gw.....RT_INFO
X509v3 Subject Key Identifier:
A7:51:C4:9E:EC:A5:B6:B0:5C:56:95:B2:3F:31:52:0F:6D:BD:0E:DC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:3d:61:fc:ac:c0:fb:2d:a1:3d:ed:b0:e5:37:a8:
4f:de:0f:31:c2:4a:0f:bb:dc:5d:ec:8c:83:86:aa:14:fc:89:
0a:04:06:f8:29:7c:7c:30:77:fd:6f:b3:bb:76:30:f8:02:31:
00:fa:28:35:b3:b2:77:e5:c8:1c:9c:4e:ef:ff:71:1f:11:ae:
12:ee:81:e6:fb:75:1f:5f:70:61:a6:ee:e4:2e:a6:95:e1:d6:
0d:83:f9:ae:b1:85:bb:bc:c5:68:dd:91:13
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,621 UART:
192,976 UART: Running Caliptra ROM ...
194,141 UART:
194,290 UART: [state] CFI Enabled
262,670 UART: [state] LifecycleState = Unprovisioned
264,595 UART: [state] DebugLocked = No
266,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,416 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
418,883 UART: [kat] SHA2-256
440,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,470 UART: [kat] ++
452,020 UART: [kat] sha1
462,074 UART: [kat] SHA2-256
464,763 UART: [kat] SHA2-384
469,881 UART: [kat] SHA2-512-ACC
472,219 UART: [kat] ECC-384
2,767,454 UART: [kat] HMAC-384Kdf
2,800,505 UART: [kat] LMS
3,990,836 UART: [kat] --
3,994,008 UART: [cold-reset] ++
3,995,998 UART: [fht] Storing FHT @ 0x50003400
4,006,561 UART: [idev] ++
4,007,149 UART: [idev] CDI.KEYID = 6
4,008,216 UART: [idev] SUBJECT.KEYID = 7
4,009,346 UART: [idev] UDS.KEYID = 0
4,035,995 UART: [idev] Erasing UDS.KEYID = 0
7,345,037 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,315 UART: [idev] --
7,372,584 UART: [ldev] ++
7,373,208 UART: [ldev] CDI.KEYID = 6
7,374,180 UART: [ldev] SUBJECT.KEYID = 5
7,375,281 UART: [ldev] AUTHORITY.KEYID = 7
7,376,618 UART: [ldev] FE.KEYID = 1
7,424,217 UART: [ldev] Erasing FE.KEYID = 1
10,754,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,659 UART: [ldev] --
13,116,635 UART: [fwproc] Waiting for Commands...
13,119,919 UART: [fwproc] Received command 0x46574c44
13,122,162 UART: [fwproc] Received Image of size 114036 bytes
17,168,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,380 >>> mbox cmd response: success
17,635,191 UART: [afmc] ++
17,635,778 UART: [afmc] CDI.KEYID = 6
17,636,693 UART: [afmc] SUBJECT.KEYID = 7
17,637,912 UART: [afmc] AUTHORITY.KEYID = 5
21,007,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,045 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,313 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,741 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,586 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,013 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,380,843 UART: [afmc] --
23,384,708 UART: [cold-reset] --
23,387,612 UART: [state] Locking Datavault
23,391,403 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,098 UART: [state] Locking ICCM
23,395,116 UART: [exit] Launching FMC @ 0x40000130
23,403,511 UART:
23,403,744 UART: Running Caliptra FMC ...
23,404,778 UART:
23,404,922 UART: [state] CFI Enabled
23,469,452 UART: [fht] FMC Alias Private Key: 7
25,807,599 UART: [art] Extend RT PCRs Done
25,808,816 UART: [art] Lock RT PCRs Done
25,810,407 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
191,601 UART:
191,964 UART: Running Caliptra ROM ...
193,049 UART:
193,191 UART: [state] CFI Enabled
261,126 UART: [state] LifecycleState = Unprovisioned
263,093 UART: [state] DebugLocked = Yes
264,873 UART: [state] Starting the Watchdog Timer 25540304 cycles
270,183 UART: [kat] SHA2-256
439,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,431 UART: [kat] ++
451,003 UART: [kat] sha1
461,032 UART: [kat] SHA2-256
463,681 UART: [kat] SHA2-384
468,815 UART: [kat] SHA2-512-ACC
471,178 UART: [kat] ECC-384
2,765,937 UART: [kat] HMAC-384Kdf
2,797,144 UART: [kat] LMS
3,987,411 UART: [kat] --
3,990,647 UART: [cold-reset] ++
3,992,575 UART: [fht] Storing FHT @ 0x50003400
4,003,197 UART: [idev] ++
4,003,761 UART: [idev] CDI.KEYID = 6
4,004,826 UART: [idev] SUBJECT.KEYID = 7
4,005,887 UART: [idev] UDS.KEYID = 0
4,006,893 ready_for_fw is high
4,007,093 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,150,562 UART: [idev] Erasing UDS.KEYID = 0
7,341,337 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,660 UART: [idev] --
7,368,919 UART: [ldev] ++
7,369,540 UART: [ldev] CDI.KEYID = 6
7,370,500 UART: [ldev] SUBJECT.KEYID = 5
7,371,706 UART: [ldev] AUTHORITY.KEYID = 7
7,372,933 UART: [ldev] FE.KEYID = 1
7,420,312 UART: [ldev] Erasing FE.KEYID = 1
10,750,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,117 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,059,608 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,074,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,088,647 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,108,208 UART: [ldev] --
13,112,177 UART: [fwproc] Waiting for Commands...
13,115,516 UART: [fwproc] Received command 0x46574c44
13,117,697 UART: [fwproc] Received Image of size 114036 bytes
17,164,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,841 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,625,960 >>> mbox cmd response: success
17,630,734 UART: [afmc] ++
17,631,380 UART: [afmc] CDI.KEYID = 6
17,632,300 UART: [afmc] SUBJECT.KEYID = 7
17,633,517 UART: [afmc] AUTHORITY.KEYID = 5
21,003,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,290 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,324,844 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,339,591 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,353,881 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,376,798 UART: [afmc] --
23,380,660 UART: [cold-reset] --
23,383,547 UART: [state] Locking Datavault
23,387,384 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,086 UART: [state] Locking ICCM
23,391,077 UART: [exit] Launching FMC @ 0x40000130
23,399,480 UART:
23,399,757 UART: Running Caliptra FMC ...
23,400,864 UART:
23,401,023 UART: [state] CFI Enabled
23,466,250 UART: [fht] FMC Alias Private Key: 7
25,804,421 UART: [art] Extend RT PCRs Done
25,805,652 UART: [art] Lock RT PCRs Done
25,807,217 UART: [art] Populate DV Done
25,809,296 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029A0error_internal_intr_r=00000040
25,812,834 UART: WDT Expired
25,813,386 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
270,199 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,862,157 >>> mbox cmd response: success
23,564,198 UART:
23,564,606 UART: Running Caliptra FMC ...
23,565,750 UART:
23,565,911 UART: [state] CFI Enabled
23,633,779 UART: [fht] FMC Alias Private Key: 7
25,971,868 UART: [art] Extend RT PCRs Done
25,973,096 UART: [art] Lock RT PCRs Done
25,974,736 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,782,585 ready_for_fw is high
3,783,047 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,849,706 >>> mbox cmd response: success
23,551,730 UART:
23,552,134 UART: Running Caliptra FMC ...
23,553,268 UART:
23,553,447 UART: [state] CFI Enabled
23,620,733 UART: [fht] FMC Alias Private Key: 7
25,958,767 UART: [art] Extend RT PCRs Done
25,960,038 UART: [art] Lock RT PCRs Done
25,961,646 UART: [art] Populate DV Done
25,967,021 UART: [fht] FMC Alias Private Key: 7
25,968,606 UART: [art] Derive CDI
25,969,343 UART: [art] Store in in slot 0x4
25,973,810 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400040CCerror_internal_intr_r=00000040
25,977,332 UART: WDT Expired
25,977,886 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,356 UART:
192,749 UART: Running Caliptra ROM ...
193,846 UART:
603,754 UART: [state] CFI Enabled
621,120 UART: [state] LifecycleState = Unprovisioned
623,023 UART: [state] DebugLocked = No
625,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
635,129 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
778,571 UART: [kat] SHA2-256
800,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,207 UART: [kat] ++
811,687 UART: [kat] sha1
822,347 UART: [kat] SHA2-256
825,077 UART: [kat] SHA2-384
830,623 UART: [kat] SHA2-512-ACC
833,008 UART: [kat] ECC-384
3,118,353 UART: [kat] HMAC-384Kdf
3,130,381 UART: [kat] LMS
4,320,488 UART: [kat] --
4,324,531 UART: [cold-reset] ++
4,326,134 UART: [fht] Storing FHT @ 0x50003400
4,336,963 UART: [idev] ++
4,337,577 UART: [idev] CDI.KEYID = 6
4,338,583 UART: [idev] SUBJECT.KEYID = 7
4,339,735 UART: [idev] UDS.KEYID = 0
4,355,498 UART: [idev] Erasing UDS.KEYID = 0
7,628,435 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,270 UART: [idev] --
7,654,464 UART: [ldev] ++
7,655,041 UART: [ldev] CDI.KEYID = 6
7,656,172 UART: [ldev] SUBJECT.KEYID = 5
7,657,276 UART: [ldev] AUTHORITY.KEYID = 7
7,658,507 UART: [ldev] FE.KEYID = 1
7,670,335 UART: [ldev] Erasing FE.KEYID = 1
10,956,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,472 UART: [ldev] --
13,317,060 UART: [fwproc] Waiting for Commands...
13,319,075 UART: [fwproc] Received command 0x46574c44
13,321,279 UART: [fwproc] Received Image of size 114036 bytes
17,363,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,823,589 >>> mbox cmd response: success
17,828,419 UART: [afmc] ++
17,829,004 UART: [afmc] CDI.KEYID = 6
17,829,953 UART: [afmc] SUBJECT.KEYID = 7
17,831,224 UART: [afmc] AUTHORITY.KEYID = 5
21,148,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,312 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,687 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,523 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,997 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,889 UART: [afmc] --
23,514,267 UART: [cold-reset] --
23,518,827 UART: [state] Locking Datavault
23,524,079 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,828 UART: [state] Locking ICCM
23,528,139 UART: [exit] Launching FMC @ 0x40000130
23,536,530 UART:
23,536,761 UART: Running Caliptra FMC ...
23,537,855 UART:
23,538,010 UART: [state] CFI Enabled
23,546,273 UART: [fht] FMC Alias Private Key: 7
25,877,105 UART: [art] Extend RT PCRs Done
25,878,335 UART: [art] Lock RT PCRs Done
25,879,905 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
191,874 UART:
192,234 UART: Running Caliptra ROM ...
193,314 UART:
603,036 UART: [state] CFI Enabled
620,392 UART: [state] LifecycleState = Unprovisioned
622,327 UART: [state] DebugLocked = Yes
625,317 UART: [state] Starting the Watchdog Timer 25250095 cycles
630,620 UART: [kat] SHA2-256
800,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,960 UART: [kat] ++
811,535 UART: [kat] sha1
822,151 UART: [kat] SHA2-256
824,841 UART: [kat] SHA2-384
830,405 UART: [kat] SHA2-512-ACC
832,779 UART: [kat] ECC-384
3,118,119 UART: [kat] HMAC-384Kdf
3,130,201 UART: [kat] LMS
4,320,328 UART: [kat] --
4,324,278 UART: [cold-reset] ++
4,325,859 UART: [fht] Storing FHT @ 0x50003400
4,336,762 UART: [idev] ++
4,337,320 UART: [idev] CDI.KEYID = 6
4,338,287 UART: [idev] SUBJECT.KEYID = 7
4,339,534 UART: [idev] UDS.KEYID = 0
4,340,694 ready_for_fw is high
4,340,896 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,749 UART: [idev] Erasing UDS.KEYID = 0
7,628,254 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,114 UART: [idev] --
7,654,264 UART: [ldev] ++
7,654,884 UART: [ldev] CDI.KEYID = 6
7,655,819 UART: [ldev] SUBJECT.KEYID = 5
7,657,025 UART: [ldev] AUTHORITY.KEYID = 7
7,658,314 UART: [ldev] FE.KEYID = 1
7,670,172 UART: [ldev] Erasing FE.KEYID = 1
10,956,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,134 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,678 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,328 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,707 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,036 UART: [ldev] --
13,316,203 UART: [fwproc] Waiting for Commands...
13,318,621 UART: [fwproc] Received command 0x46574c44
13,320,857 UART: [fwproc] Received Image of size 114036 bytes
17,362,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,406 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,306 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,823,186 >>> mbox cmd response: success
17,828,065 UART: [afmc] ++
17,828,663 UART: [afmc] CDI.KEYID = 6
17,829,547 UART: [afmc] SUBJECT.KEYID = 7
17,830,810 UART: [afmc] AUTHORITY.KEYID = 5
21,148,141 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,776 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,053 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,459,637 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,474,402 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,488,753 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,510,703 UART: [afmc] --
23,514,082 UART: [cold-reset] --
23,518,646 UART: [state] Locking Datavault
23,523,898 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,650 UART: [state] Locking ICCM
23,527,958 UART: [exit] Launching FMC @ 0x40000130
23,536,348 UART:
23,536,581 UART: Running Caliptra FMC ...
23,537,679 UART:
23,537,833 UART: [state] CFI Enabled
23,546,102 UART: [fht] FMC Alias Private Key: 7
25,876,977 UART: [art] Extend RT PCRs Done
25,878,217 UART: [art] Lock RT PCRs Done
25,879,517 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400016ECerror_internal_intr_r=00000040
25,883,003 UART: WDT Expired
25,883,560 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
625,968 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,061,042 >>> mbox cmd response: success
23,706,200 UART:
23,706,607 UART: Running Caliptra FMC ...
23,707,721 UART:
23,707,871 UART: [state] CFI Enabled
23,715,923 UART: [fht] FMC Alias Private Key: 7
26,046,730 UART: [art] Extend RT PCRs Done
26,047,954 UART: [art] Lock RT PCRs Done
26,049,506 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,301 writing to cptra_bootfsm_go
4,132,686 ready_for_fw is high
4,133,085 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,062,339 >>> mbox cmd response: success
23,707,499 UART:
23,707,883 UART: Running Caliptra FMC ...
23,709,033 UART:
23,709,192 UART: [state] CFI Enabled
23,717,279 UART: [fht] FMC Alias Private Key: 7
26,048,071 UART: [art] Extend RT PCRs Done
26,049,309 UART: [art] Lock RT PCRs Done
26,050,950 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E0error_internal_intr_r=00000040
26,054,539 UART: WDT Expired
26,055,099 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,515 UART:
192,884 UART: Running Caliptra ROM ...
193,970 UART:
194,111 UART: [state] CFI Enabled
264,085 UART: [state] LifecycleState = Unprovisioned
265,976 UART: [state] DebugLocked = No
267,598 UART: [state] WD Timer not started. Device not locked for debugging
275,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
419,340 UART: [kat] SHA2-256
450,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,065 UART: [kat] ++
462,517 UART: [kat] sha1
472,761 UART: [kat] SHA2-256
475,766 UART: [kat] SHA2-384
481,201 UART: [kat] SHA2-512-ACC
484,136 UART: [kat] ECC-384
2,949,219 UART: [kat] HMAC-384Kdf
2,972,308 UART: [kat] LMS
3,501,780 UART: [kat] --
3,505,993 UART: [cold-reset] ++
3,507,872 UART: [fht] FHT @ 0x50003400
3,519,497 UART: [idev] ++
3,520,056 UART: [idev] CDI.KEYID = 6
3,521,070 UART: [idev] SUBJECT.KEYID = 7
3,522,177 UART: [idev] UDS.KEYID = 0
3,544,045 UART: [idev] Erasing UDS.KEYID = 0
6,025,971 UART: [idev] Sha1 KeyId Algorithm
6,048,067 UART: [idev] --
6,053,275 UART: [ldev] ++
6,053,852 UART: [ldev] CDI.KEYID = 6
6,054,761 UART: [ldev] SUBJECT.KEYID = 5
6,055,924 UART: [ldev] AUTHORITY.KEYID = 7
6,057,213 UART: [ldev] FE.KEYID = 1
6,100,811 UART: [ldev] Erasing FE.KEYID = 1
8,600,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,690 UART: [ldev] --
10,393,031 UART: [fwproc] Wait for Commands...
10,395,291 UART: [fwproc] Recv command 0x46574c44
10,397,387 UART: [fwproc] Recv'd Img size: 114360 bytes
13,793,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,253,355 >>> mbox cmd response: success
14,257,795 UART: [afmc] ++
14,258,385 UART: [afmc] CDI.KEYID = 6
14,259,296 UART: [afmc] SUBJECT.KEYID = 7
14,260,510 UART: [afmc] AUTHORITY.KEYID = 5
16,786,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,507,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,523,678 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,539,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,555,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,577,775 UART: [afmc] --
18,582,009 UART: [cold-reset] --
18,586,326 UART: [state] Locking Datavault
18,591,694 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,347 UART: [state] Locking ICCM
18,594,361 UART: [exit] Launching FMC @ 0x40000130
18,602,758 UART:
18,602,998 UART: Running Caliptra FMC ...
18,604,096 UART:
18,604,259 UART: [state] CFI Enabled
18,665,282 UART: [fht] FMC Alias Private Key: 7
20,428,832 UART: [art] Extend RT PCRs Done
20,430,057 UART: [art] Lock RT PCRs Done
20,431,900 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
191,643 UART:
192,000 UART: Running Caliptra ROM ...
193,203 UART:
193,356 UART: [state] CFI Enabled
261,195 UART: [state] LifecycleState = Unprovisioned
263,115 UART: [state] DebugLocked = Yes
264,828 UART: [state] Starting the WD Timer 20161670 cycles
269,770 UART: [kat] SHA2-256
448,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,470 UART: [kat] ++
460,959 UART: [kat] sha1
471,138 UART: [kat] SHA2-256
474,201 UART: [kat] SHA2-384
479,566 UART: [kat] SHA2-512-ACC
482,497 UART: [kat] ECC-384
2,945,785 UART: [kat] HMAC-384Kdf
2,968,347 UART: [kat] LMS
3,497,822 UART: [kat] --
3,502,062 UART: [cold-reset] ++
3,503,927 UART: [fht] FHT @ 0x50003400
3,515,565 UART: [idev] ++
3,516,174 UART: [idev] CDI.KEYID = 6
3,517,099 UART: [idev] SUBJECT.KEYID = 7
3,518,276 UART: [idev] UDS.KEYID = 0
3,519,197 ready_for_fw is high
3,519,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,082 UART: [idev] Erasing UDS.KEYID = 0
6,022,645 UART: [idev] Sha1 KeyId Algorithm
6,044,759 UART: [idev] --
6,050,000 UART: [ldev] ++
6,050,575 UART: [ldev] CDI.KEYID = 6
6,051,489 UART: [ldev] SUBJECT.KEYID = 5
6,052,648 UART: [ldev] AUTHORITY.KEYID = 7
6,053,877 UART: [ldev] FE.KEYID = 1
6,097,152 UART: [ldev] Erasing FE.KEYID = 1
8,597,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,774 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,332,784 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,348,597 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,364,523 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,384,806 UART: [ldev] --
10,389,091 UART: [fwproc] Wait for Commands...
10,391,401 UART: [fwproc] Recv command 0x46574c44
10,393,503 UART: [fwproc] Recv'd Img size: 114360 bytes
13,789,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,931,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,249,442 >>> mbox cmd response: success
14,253,896 UART: [afmc] ++
14,254,494 UART: [afmc] CDI.KEYID = 6
14,255,421 UART: [afmc] SUBJECT.KEYID = 7
14,256,584 UART: [afmc] AUTHORITY.KEYID = 5
16,785,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,505,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,507,399 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,523,600 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,539,456 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,555,245 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,577,479 UART: [afmc] --
18,581,764 UART: [cold-reset] --
18,586,108 UART: [state] Locking Datavault
18,591,456 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,096 UART: [state] Locking ICCM
18,594,110 UART: [exit] Launching FMC @ 0x40000130
18,602,558 UART:
18,602,788 UART: Running Caliptra FMC ...
18,603,906 UART:
18,604,066 UART: [state] CFI Enabled
18,665,911 UART: [fht] FMC Alias Private Key: 7
20,429,495 UART: [art] Extend RT PCRsFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
20,433,826 UART: WDT Expired
20,434,395 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,643 UART:
192,995 UART: Running Caliptra ROM ...
194,163 UART:
194,323 UART: [state] CFI Enabled
261,727 UART: [state] LifecycleState = Unprovisioned
264,105 UART: [state] DebugLocked = No
265,761 UART: [state] WD Timer not started. Device not locked for debugging
274,588 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
418,458 UART: [kat] SHA2-256
460,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,028 UART: [kat] ++
471,481 UART: [kat] sha1
482,106 UART: [kat] SHA2-256
485,117 UART: [kat] SHA2-384
490,346 UART: [kat] SHA2-512-ACC
492,960 UART: [kat] ECC-384
2,946,447 UART: [kat] HMAC-384Kdf
2,969,768 UART: [kat] LMS
3,501,533 UART: [kat] --
3,505,855 UART: [cold-reset] ++
3,507,754 UART: [fht] FHT @ 0x50003400
3,519,919 UART: [idev] ++
3,520,642 UART: [idev] CDI.KEYID = 6
3,521,527 UART: [idev] SUBJECT.KEYID = 7
3,522,743 UART: [idev] UDS.KEYID = 0
3,541,828 UART: [idev] Erasing UDS.KEYID = 0
6,025,965 UART: [idev] Sha1 KeyId Algorithm
6,047,524 UART: [idev] --
6,053,622 UART: [ldev] ++
6,054,302 UART: [ldev] CDI.KEYID = 6
6,055,269 UART: [ldev] SUBJECT.KEYID = 5
6,056,426 UART: [ldev] AUTHORITY.KEYID = 7
6,057,656 UART: [ldev] FE.KEYID = 1
6,098,930 UART: [ldev] Erasing FE.KEYID = 1
8,602,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,560 UART: [ldev] --
10,413,673 UART: [fwproc] Wait for Commands...
10,415,995 UART: [fwproc] Recv command 0x46574c44
10,418,258 UART: [fwproc] Recv'd Img size: 114360 bytes
13,858,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,595,389 >>> mbox cmd response: success
14,599,616 UART: [afmc] ++
14,600,312 UART: [afmc] CDI.KEYID = 6
14,601,419 UART: [afmc] SUBJECT.KEYID = 7
14,602,961 UART: [afmc] AUTHORITY.KEYID = 5
17,130,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,864 UART: [afmc] --
18,944,889 UART: [cold-reset] --
18,949,453 UART: [state] Locking Datavault
18,955,147 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,381 UART: [state] Locking ICCM
18,958,577 UART: [exit] Launching FMC @ 0x40000130
18,966,919 UART:
18,967,150 UART: Running Caliptra FMC ...
18,968,248 UART:
18,968,400 UART: [state] CFI Enabled
19,029,947 UART: [fht] FMC Alias Private Key: 7
20,793,541 UART: [art] Extend RT PCRs Done
20,794,744 UART: [art] Lock RT PCRs Done
20,796,777 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
191,549 UART:
191,940 UART: Running Caliptra ROM ...
193,269 UART:
193,424 UART: [state] CFI Enabled
260,830 UART: [state] LifecycleState = Unprovisioned
263,250 UART: [state] DebugLocked = Yes
265,021 UART: [state] Starting the WD Timer 20527575 cycles
270,391 UART: [kat] SHA2-256
460,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,999 UART: [kat] ++
471,649 UART: [kat] sha1
482,101 UART: [kat] SHA2-256
485,176 UART: [kat] SHA2-384
490,380 UART: [kat] SHA2-512-ACC
492,960 UART: [kat] ECC-384
2,945,736 UART: [kat] HMAC-384Kdf
2,970,124 UART: [kat] LMS
3,501,891 UART: [kat] --
3,506,247 UART: [cold-reset] ++
3,508,104 UART: [fht] FHT @ 0x50003400
3,520,287 UART: [idev] ++
3,520,997 UART: [idev] CDI.KEYID = 6
3,521,878 UART: [idev] SUBJECT.KEYID = 7
3,523,118 UART: [idev] UDS.KEYID = 0
3,524,017 ready_for_fw is high
3,524,213 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,055 UART: [idev] Erasing UDS.KEYID = 0
6,027,211 UART: [idev] Sha1 KeyId Algorithm
6,048,804 UART: [idev] --
6,055,094 UART: [ldev] ++
6,055,783 UART: [ldev] CDI.KEYID = 6
6,056,698 UART: [ldev] SUBJECT.KEYID = 5
6,057,857 UART: [ldev] AUTHORITY.KEYID = 7
6,059,104 UART: [ldev] FE.KEYID = 1
6,100,373 UART: [ldev] Erasing FE.KEYID = 1
8,603,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,886 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,127 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,196 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,149 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,138 UART: [ldev] --
10,414,289 UART: [fwproc] Wait for Commands...
10,416,547 UART: [fwproc] Recv command 0x46574c44
10,418,477 UART: [fwproc] Recv'd Img size: 114360 bytes
13,859,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,595,653 >>> mbox cmd response: success
14,599,831 UART: [afmc] ++
14,600,608 UART: [afmc] CDI.KEYID = 6
14,601,796 UART: [afmc] SUBJECT.KEYID = 7
14,603,233 UART: [afmc] AUTHORITY.KEYID = 5
17,134,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,681 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,891,799 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,906,908 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,921,887 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,945,098 UART: [afmc] --
18,949,099 UART: [cold-reset] --
18,953,498 UART: [state] Locking Datavault
18,959,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,368 UART: [state] Locking ICCM
18,962,630 UART: [exit] Launching FMC @ 0x40000130
18,970,965 UART:
18,971,224 UART: Running Caliptra FMC ...
18,972,248 UART:
18,972,391 UART: [state] CFI Enabled
19,033,236 UART: [fht] FMC Alias Private Key: 7
20,796,812 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,800,376 UART: WDT Expired
20,800,944 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,480 writing to cptra_bootfsm_go
268,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,685,260 >>> mbox cmd response: success
18,979,910 UART:
18,980,334 UART: Running Caliptra FMC ...
18,981,471 UART:
18,981,632 UART: [state] CFI Enabled
19,050,281 UART: [fht] FMC Alias Private Key: 7
20,813,842 UART: [art] Extend RT PCRs Done
20,815,066 UART: [art] Lock RT PCRs Done
20,816,940 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,436,169 ready_for_fw is high
3,436,572 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,725,461 >>> mbox cmd response: success
19,019,886 UART:
19,020,292 UART: Running Caliptra FMC ...
19,021,434 UART:
19,021,595 UART: [state] CFI Enabled
19,089,757 UART: [fht] FMC Alias Private Key: 7
20,816,567 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400040BEerror_internal_intr_r=00000040
20,820,185 UART: WDT Expired
20,820,752 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,560 writing to cptra_bootfsm_go
192,828 UART:
193,191 UART: Running Caliptra ROM ...
194,351 UART:
604,099 UART: [state] CFI Enabled
621,066 UART: [state] LifecycleState = Unprovisioned
623,474 UART: [state] DebugLocked = No
626,256 UART: [state] WD Timer not started. Device not locked for debugging
635,234 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
779,065 UART: [kat] SHA2-256
820,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,658 UART: [kat] ++
832,159 UART: [kat] sha1
843,300 UART: [kat] SHA2-256
846,304 UART: [kat] SHA2-384
852,004 UART: [kat] SHA2-512-ACC
854,615 UART: [kat] ECC-384
3,297,394 UART: [kat] HMAC-384Kdf
3,310,606 UART: [kat] LMS
3,842,429 UART: [kat] --
3,846,578 UART: [cold-reset] ++
3,848,097 UART: [fht] FHT @ 0x50003400
3,860,915 UART: [idev] ++
3,861,596 UART: [idev] CDI.KEYID = 6
3,862,564 UART: [idev] SUBJECT.KEYID = 7
3,863,779 UART: [idev] UDS.KEYID = 0
3,878,240 UART: [idev] Erasing UDS.KEYID = 0
6,341,208 UART: [idev] Sha1 KeyId Algorithm
6,364,015 UART: [idev] --
6,369,310 UART: [ldev] ++
6,370,043 UART: [ldev] CDI.KEYID = 6
6,370,956 UART: [ldev] SUBJECT.KEYID = 5
6,372,115 UART: [ldev] AUTHORITY.KEYID = 7
6,373,341 UART: [ldev] FE.KEYID = 1
6,384,305 UART: [ldev] Erasing FE.KEYID = 1
8,859,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,277 UART: [ldev] --
10,651,249 UART: [fwproc] Wait for Commands...
10,652,810 UART: [fwproc] Recv command 0x46574c44
10,655,065 UART: [fwproc] Recv'd Img size: 114360 bytes
14,091,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,828,636 >>> mbox cmd response: success
14,831,883 UART: [afmc] ++
14,832,579 UART: [afmc] CDI.KEYID = 6
14,833,687 UART: [afmc] SUBJECT.KEYID = 7
14,835,228 UART: [afmc] AUTHORITY.KEYID = 5
17,342,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,727 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,734 UART: [afmc] --
19,138,420 UART: [cold-reset] --
19,143,909 UART: [state] Locking Datavault
19,150,622 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,808 UART: [state] Locking ICCM
19,154,468 UART: [exit] Launching FMC @ 0x40000130
19,163,132 UART:
19,163,372 UART: Running Caliptra FMC ...
19,164,476 UART:
19,164,629 UART: [state] CFI Enabled
19,172,676 UART: [fht] FMC Alias Private Key: 7
20,929,038 UART: [art] Extend RT PCRs Done
20,930,268 UART: [art] Lock RT PCRs Done
20,931,865 UART: [art] Populate DV Done
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,008 UART:
192,389 UART: Running Caliptra ROM ...
193,569 UART:
603,279 UART: [state] CFI Enabled
620,263 UART: [state] LifecycleState = Unprovisioned
622,648 UART: [state] DebugLocked = Yes
625,567 UART: [state] Starting the WD Timer 20302003 cycles
630,941 UART: [kat] SHA2-256
820,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,664 UART: [kat] ++
832,307 UART: [kat] sha1
843,328 UART: [kat] SHA2-256
846,334 UART: [kat] SHA2-384
852,035 UART: [kat] SHA2-512-ACC
854,643 UART: [kat] ECC-384
3,297,419 UART: [kat] HMAC-384Kdf
3,310,655 UART: [kat] LMS
3,842,447 UART: [kat] --
3,846,610 UART: [cold-reset] ++
3,848,117 UART: [fht] FHT @ 0x50003400
3,860,933 UART: [idev] ++
3,861,640 UART: [idev] CDI.KEYID = 6
3,862,669 UART: [idev] SUBJECT.KEYID = 7
3,863,774 UART: [idev] UDS.KEYID = 0
3,864,697 ready_for_fw is high
3,864,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,707 UART: [idev] Erasing UDS.KEYID = 0
6,341,206 UART: [idev] Sha1 KeyId Algorithm
6,364,062 UART: [idev] --
6,369,520 UART: [ldev] ++
6,370,195 UART: [ldev] CDI.KEYID = 6
6,371,073 UART: [ldev] SUBJECT.KEYID = 5
6,372,284 UART: [ldev] AUTHORITY.KEYID = 7
6,373,736 UART: [ldev] FE.KEYID = 1
6,384,506 UART: [ldev] Erasing FE.KEYID = 1
8,860,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,422 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,601 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,656 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,690 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,363 UART: [ldev] --
10,651,328 UART: [fwproc] Wait for Commands...
10,652,888 UART: [fwproc] Recv command 0x46574c44
10,654,817 UART: [fwproc] Recv'd Img size: 114360 bytes
14,091,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,828,382 >>> mbox cmd response: success
14,831,644 UART: [afmc] ++
14,832,384 UART: [afmc] CDI.KEYID = 6
14,833,569 UART: [afmc] SUBJECT.KEYID = 7
14,835,000 UART: [afmc] AUTHORITY.KEYID = 5
17,342,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,196 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
19,081,285 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
19,096,405 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
19,111,371 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
19,135,388 UART: [afmc] --
19,138,050 UART: [cold-reset] --
19,143,318 UART: [state] Locking Datavault
19,150,075 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,266 UART: [state] Locking ICCM
19,153,928 UART: [exit] Launching FMC @ 0x40000130
19,162,589 UART:
19,162,841 UART: Running Caliptra FMC ...
19,163,945 UART:
19,164,097 UART: [state] CFI Enabled
19,172,148 UART: [fht] FMC Alias Private Key: 7
20,928,491 UART: [art] Extend RT PCRs Done
20,929,713 UART: [art] Lock RT PCRs Done
20,931,363 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EAerror_internal_intr_r=00000040
20,935,407 UART: WDT Expired
20,935,972 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,596 writing to cptra_bootfsm_go
626,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,949,034 >>> mbox cmd response: success
19,206,190 UART:
19,206,643 UART: Running Caliptra FMC ...
19,207,746 UART:
19,207,896 UART: [state] CFI Enabled
19,215,841 UART: [fht] FMC Alias Private Key: 7
20,972,143 UART: [art] Extend RT PCRs Done
20,973,375 UART: [art] Lock RT PCRs Done
20,974,967 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,761,325 ready_for_fw is high
3,761,725 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,949,111 >>> mbox cmd response: success
19,206,371 UART:
19,206,772 UART: Running Caliptra FMC ...
19,207,879 UART:
19,208,030 UART: [state] CFI Enabled
19,215,975 UART: [fht] FMC Alias Private Key: 7
20,972,324 UART: [art] Extend RT PCRs Done
20,973,553 UART: [art] Lock RT PCRs Done
20,975,097 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,978,667 UART: WDT Expired
20,979,224 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114360 bytes
2,883,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,996 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,287 >>> mbox cmd response: success
3,077,507 UART: [afmc] ++
3,077,675 UART: [afmc] CDI.KEYID = 6
3,078,037 UART: [afmc] SUBJECT.KEYID = 7
3,078,462 UART: [afmc] AUTHORITY.KEYID = 5
3,112,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,419 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,812 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,502 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,589 UART: [afmc] --
3,156,597 UART: [cold-reset] --
3,157,291 UART: [state] Locking Datavault
3,158,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,848 UART: [state] Locking ICCM
3,159,404 UART: [exit] Launching FMC @ 0x40000130
3,164,733 UART:
3,164,749 UART: Running Caliptra FMC ...
3,165,157 UART:
3,165,211 UART: [state] CFI Enabled
3,175,576 UART: [fht] FMC Alias Private Key: 7
3,283,501 UART: [art] Extend RT PCRs Done
3,283,929 UART: [art] Lock RT PCRs Done
3,285,417 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3197920 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114360 bytes
2,883,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,956 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,246 >>> mbox cmd response: success
3,077,463 UART: [afmc] ++
3,077,631 UART: [afmc] CDI.KEYID = 6
3,077,993 UART: [afmc] SUBJECT.KEYID = 7
3,078,418 UART: [afmc] AUTHORITY.KEYID = 5
3,112,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,371 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,151 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,135,862 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,141,762 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,491 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,565 UART: [afmc] --
3,156,572 UART: [cold-reset] --
3,157,266 UART: [state] Locking Datavault
3,158,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,823 UART: [state] Locking ICCM
3,159,379 UART: [exit] Launching FMC @ 0x40000130
3,164,708 UART:
3,164,724 UART: Running Caliptra FMC ...
3,165,132 UART:
3,165,186 UART: [state] CFI Enabled
3,175,552 UART: [fht] FMC Alias Private Key: 7
3,283,487 UART: [art] Extend RT PCRs Done
3,283,915 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,285,403 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,287,737 UART: WDT Expired
3,287,946 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,923 >>> mbox cmd response: success
2,987,011 UART:
2,987,027 UART: Running Caliptra FMC ...
2,987,435 UART:
2,987,489 UART: [state] CFI Enabled
2,997,854 UART: [fht] FMC Alias Private Key: 7
3,105,779 UART: [art] Extend RT PCRs Done
3,106,207 UART: [art] Lock RT PCRs Done
3,107,695 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,170 >>> mbox cmd response: success
2,987,247 UART:
2,987,263 UART: Running Caliptra FMC ...
2,987,671 UART:
2,987,725 UART: [state] CFI Enabled
2,998,091 UART: [fht] FMC Alias Private Key: 7
3,106,026 UART: [art] Extend RT PCRs Done
3,106,454 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,107,942 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
3,110,259 UART: WDT Expired
3,110,468 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114360 bytes
2,885,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,061 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,446 >>> mbox cmd response: success
3,078,678 UART: [afmc] ++
3,078,846 UART: [afmc] CDI.KEYID = 6
3,079,208 UART: [afmc] SUBJECT.KEYID = 7
3,079,633 UART: [afmc] AUTHORITY.KEYID = 5
3,115,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,935 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,625 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,582 UART: [afmc] --
3,158,522 UART: [cold-reset] --
3,159,458 UART: [state] Locking Datavault
3,160,615 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,219 UART: [state] Locking ICCM
3,161,825 UART: [exit] Launching FMC @ 0x40000130
3,167,154 UART:
3,167,170 UART: Running Caliptra FMC ...
3,167,578 UART:
3,167,721 UART: [state] CFI Enabled
3,178,348 UART: [fht] FMC Alias Private Key: 7
3,286,097 UART: [art] Extend RT PCRs Done
3,286,525 UART: [art] Lock RT PCRs Done
3,287,827 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3199341 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114360 bytes
2,885,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,021 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,373 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,405 >>> mbox cmd response: success
3,078,634 UART: [afmc] ++
3,078,802 UART: [afmc] CDI.KEYID = 6
3,079,164 UART: [afmc] SUBJECT.KEYID = 7
3,079,589 UART: [afmc] AUTHORITY.KEYID = 5
3,115,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,274 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,985 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,885 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,614 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,558 UART: [afmc] --
3,158,497 UART: [cold-reset] --
3,159,433 UART: [state] Locking Datavault
3,160,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,194 UART: [state] Locking ICCM
3,161,800 UART: [exit] Launching FMC @ 0x40000130
3,167,129 UART:
3,167,145 UART: Running Caliptra FMC ...
3,167,553 UART:
3,167,696 UART: [state] CFI Enabled
3,178,324 UART: [fht] FMC Alias Private Key: 7
3,286,083 UART: [art] Extend RT PCRs Done
3,286,511 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,287,813 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,290,137 UART: WDT Expired
3,290,346 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,082 >>> mbox cmd response: success
2,989,432 UART:
2,989,448 UART: Running Caliptra FMC ...
2,989,856 UART:
2,989,999 UART: [state] CFI Enabled
3,000,626 UART: [fht] FMC Alias Private Key: 7
3,108,375 UART: [art] Extend RT PCRs Done
3,108,803 UART: [art] Lock RT PCRs Done
3,110,105 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,329 >>> mbox cmd response: success
2,989,668 UART:
2,989,684 UART: Running Caliptra FMC ...
2,990,092 UART:
2,990,235 UART: [state] CFI Enabled
3,000,863 UART: [fht] FMC Alias Private Key: 7
3,108,622 UART: [art] Extend RT PCRs Done
3,109,050 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,110,352 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,112,661 UART: WDT Expired
3,112,870 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,516 >>> mbox cmd response: success
2,773,672 UART: [afmc] ++
2,773,840 UART: [afmc] CDI.KEYID = 6
2,774,202 UART: [afmc] SUBJECT.KEYID = 7
2,774,627 UART: [afmc] AUTHORITY.KEYID = 5
2,809,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,887 UART: [afmc] --
2,852,959 UART: [cold-reset] --
2,853,879 UART: [state] Locking Datavault
2,855,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,674 UART: [state] Locking ICCM
2,856,094 UART: [exit] Launching FMC @ 0x40000130
2,861,423 UART:
2,861,439 UART: Running Caliptra FMC ...
2,861,847 UART:
2,861,901 UART: [state] CFI Enabled
2,872,486 UART: [fht] FMC Alias Private Key: 7
2,979,827 UART: [art] Extend RT PCRs Done
2,980,255 UART: [art] Lock RT PCRs Done
2,981,987 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2894859 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,747 >>> mbox cmd response: success
2,773,900 UART: [afmc] ++
2,774,068 UART: [afmc] CDI.KEYID = 6
2,774,430 UART: [afmc] SUBJECT.KEYID = 7
2,774,855 UART: [afmc] AUTHORITY.KEYID = 5
2,810,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,029 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,740 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,640 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,337 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,072 UART: [afmc] --
2,853,143 UART: [cold-reset] --
2,854,063 UART: [state] Locking Datavault
2,855,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,858 UART: [state] Locking ICCM
2,856,278 UART: [exit] Launching FMC @ 0x40000130
2,861,607 UART:
2,861,623 UART: Running Caliptra FMC ...
2,862,031 UART:
2,862,085 UART: [state] CFI Enabled
2,872,671 UART: [fht] FMC Alias Private Key: 7
2,980,022 UART: [art] Extend RT PCRs Done
2,980,450 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,982,182 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,984,576 UART: WDT Expired
2,984,785 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,497 >>> mbox cmd response: success
2,686,067 UART:
2,686,083 UART: Running Caliptra FMC ...
2,686,491 UART:
2,686,545 UART: [state] CFI Enabled
2,697,130 UART: [fht] FMC Alias Private Key: 7
2,804,471 UART: [art] Extend RT PCRs Done
2,804,899 UART: [art] Lock RT PCRs Done
2,806,631 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,744 >>> mbox cmd response: success
2,686,303 UART:
2,686,319 UART: Running Caliptra FMC ...
2,686,727 UART:
2,686,781 UART: [state] CFI Enabled
2,697,367 UART: [fht] FMC Alias Private Key: 7
2,804,718 UART: [art] Extend RT PCRs Done
2,805,146 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,806,878 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,809,196 UART: WDT Expired
2,809,405 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,897 >>> mbox cmd response: success
2,774,913 UART: [afmc] ++
2,775,081 UART: [afmc] CDI.KEYID = 6
2,775,443 UART: [afmc] SUBJECT.KEYID = 7
2,775,868 UART: [afmc] AUTHORITY.KEYID = 5
2,811,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,839 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,424 UART: [afmc] --
2,855,302 UART: [cold-reset] --
2,856,346 UART: [state] Locking Datavault
2,857,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,293 UART: [state] Locking ICCM
2,858,767 UART: [exit] Launching FMC @ 0x40000130
2,864,096 UART:
2,864,112 UART: Running Caliptra FMC ...
2,864,520 UART:
2,864,663 UART: [state] CFI Enabled
2,875,592 UART: [fht] FMC Alias Private Key: 7
2,984,301 UART: [art] Extend RT PCRs Done
2,984,729 UART: [art] Lock RT PCRs Done
2,986,337 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2898220 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,128 >>> mbox cmd response: success
2,775,141 UART: [afmc] ++
2,775,309 UART: [afmc] CDI.KEYID = 6
2,775,671 UART: [afmc] SUBJECT.KEYID = 7
2,776,096 UART: [afmc] AUTHORITY.KEYID = 5
2,812,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,450 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,835,161 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,841,061 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,758 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,609 UART: [afmc] --
2,855,486 UART: [cold-reset] --
2,856,530 UART: [state] Locking Datavault
2,857,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,477 UART: [state] Locking ICCM
2,858,951 UART: [exit] Launching FMC @ 0x40000130
2,864,280 UART:
2,864,296 UART: Running Caliptra FMC ...
2,864,704 UART:
2,864,847 UART: [state] CFI Enabled
2,875,777 UART: [fht] FMC Alias Private Key: 7
2,984,496 UART: [art] Extend RT PCRs Done
2,984,924 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,986,532 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,988,920 UART: WDT Expired
2,989,129 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,878 >>> mbox cmd response: success
2,688,740 UART:
2,688,756 UART: Running Caliptra FMC ...
2,689,164 UART:
2,689,307 UART: [state] CFI Enabled
2,700,236 UART: [fht] FMC Alias Private Key: 7
2,808,945 UART: [art] Extend RT PCRs Done
2,809,373 UART: [art] Lock RT PCRs Done
2,810,981 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,132 >>> mbox cmd response: success
2,688,983 UART:
2,688,999 UART: Running Caliptra FMC ...
2,689,407 UART:
2,689,550 UART: [state] CFI Enabled
2,700,480 UART: [fht] FMC Alias Private Key: 7
2,809,199 UART: [art] Extend RT PCRs Done
2,809,627 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,811,235 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
2,813,536 UART: WDT Expired
2,813,745 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,616 >>> mbox cmd response: success
2,771,779 UART: [afmc] ++
2,771,947 UART: [afmc] CDI.KEYID = 6
2,772,310 UART: [afmc] SUBJECT.KEYID = 7
2,772,736 UART: [afmc] AUTHORITY.KEYID = 5
2,808,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,024 UART: [afmc] --
2,851,096 UART: [cold-reset] --
2,852,016 UART: [state] Locking Datavault
2,853,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,811 UART: [state] Locking ICCM
2,854,231 UART: [exit] Launching FMC @ 0x40000130
2,859,560 UART:
2,859,576 UART: Running Caliptra FMC ...
2,859,984 UART:
2,860,038 UART: [state] CFI Enabled
2,870,623 UART: [fht] FMC Alias Private Key: 7
2,977,964 UART: [art] Extend RT PCRs Done
2,978,392 UART: [art] Lock RT PCRs Done
2,980,124 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2893026 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,847 >>> mbox cmd response: success
2,772,007 UART: [afmc] ++
2,772,175 UART: [afmc] CDI.KEYID = 6
2,772,538 UART: [afmc] SUBJECT.KEYID = 7
2,772,964 UART: [afmc] AUTHORITY.KEYID = 5
2,808,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,162 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,874 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,772 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,469 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,209 UART: [afmc] --
2,851,280 UART: [cold-reset] --
2,852,200 UART: [state] Locking Datavault
2,853,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,995 UART: [state] Locking ICCM
2,854,415 UART: [exit] Launching FMC @ 0x40000130
2,859,744 UART:
2,859,760 UART: Running Caliptra FMC ...
2,860,168 UART:
2,860,222 UART: [state] CFI Enabled
2,870,808 UART: [fht] FMC Alias Private Key: 7
2,978,159 UART: [art] Extend RT PCRs Done
2,978,587 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,980,319 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,982,713 UART: WDT Expired
2,982,922 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,482 >>> mbox cmd response: success
2,682,082 UART:
2,682,098 UART: Running Caliptra FMC ...
2,682,506 UART:
2,682,560 UART: [state] CFI Enabled
2,693,145 UART: [fht] FMC Alias Private Key: 7
2,800,486 UART: [art] Extend RT PCRs Done
2,800,914 UART: [art] Lock RT PCRs Done
2,802,646 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,729 >>> mbox cmd response: success
2,682,318 UART:
2,682,334 UART: Running Caliptra FMC ...
2,682,742 UART:
2,682,796 UART: [state] CFI Enabled
2,693,382 UART: [fht] FMC Alias Private Key: 7
2,800,733 UART: [art] Extend RT PCRs Done
2,801,161 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,802,893 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,805,211 UART: WDT Expired
2,805,420 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,997 >>> mbox cmd response: success
2,773,020 UART: [afmc] ++
2,773,188 UART: [afmc] CDI.KEYID = 6
2,773,551 UART: [afmc] SUBJECT.KEYID = 7
2,773,977 UART: [afmc] AUTHORITY.KEYID = 5
2,810,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,561 UART: [afmc] --
2,853,439 UART: [cold-reset] --
2,854,483 UART: [state] Locking Datavault
2,855,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,430 UART: [state] Locking ICCM
2,856,904 UART: [exit] Launching FMC @ 0x40000130
2,862,233 UART:
2,862,249 UART: Running Caliptra FMC ...
2,862,657 UART:
2,862,800 UART: [state] CFI Enabled
2,873,729 UART: [fht] FMC Alias Private Key: 7
2,982,438 UART: [art] Extend RT PCRs Done
2,982,866 UART: [art] Lock RT PCRs Done
2,984,474 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2896387 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,228 >>> mbox cmd response: success
2,773,248 UART: [afmc] ++
2,773,416 UART: [afmc] CDI.KEYID = 6
2,773,779 UART: [afmc] SUBJECT.KEYID = 7
2,774,205 UART: [afmc] AUTHORITY.KEYID = 5
2,810,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,583 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,295 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,193 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,890 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,746 UART: [afmc] --
2,853,623 UART: [cold-reset] --
2,854,667 UART: [state] Locking Datavault
2,856,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,614 UART: [state] Locking ICCM
2,857,088 UART: [exit] Launching FMC @ 0x40000130
2,862,417 UART:
2,862,433 UART: Running Caliptra FMC ...
2,862,841 UART:
2,862,984 UART: [state] CFI Enabled
2,873,914 UART: [fht] FMC Alias Private Key: 7
2,982,633 UART: [art] Extend RT PCRs Done
2,983,061 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,984,669 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,987,057 UART: WDT Expired
2,987,266 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,863 >>> mbox cmd response: success
2,684,755 UART:
2,684,771 UART: Running Caliptra FMC ...
2,685,179 UART:
2,685,322 UART: [state] CFI Enabled
2,696,251 UART: [fht] FMC Alias Private Key: 7
2,804,960 UART: [art] Extend RT PCRs Done
2,805,388 UART: [art] Lock RT PCRs Done
2,806,996 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,110 >>> mbox cmd response: success
2,684,991 UART:
2,685,007 UART: Running Caliptra FMC ...
2,685,415 UART:
2,685,558 UART: [state] CFI Enabled
2,696,488 UART: [fht] FMC Alias Private Key: 7
2,805,207 UART: [art] Extend RT PCRs Done
2,805,635 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,807,243 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,809,551 UART: WDT Expired
2,809,760 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.92s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114360 bytes
2,883,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,996 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,287 >>> mbox cmd response: success
3,077,507 UART: [afmc] ++
3,077,675 UART: [afmc] CDI.KEYID = 6
3,078,037 UART: [afmc] SUBJECT.KEYID = 7
3,078,462 UART: [afmc] AUTHORITY.KEYID = 5
3,112,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,419 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,812 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,502 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,589 UART: [afmc] --
3,156,597 UART: [cold-reset] --
3,157,291 UART: [state] Locking Datavault
3,158,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,848 UART: [state] Locking ICCM
3,159,404 UART: [exit] Launching FMC @ 0x40000130
3,164,733 UART:
3,164,749 UART: Running Caliptra FMC ...
3,165,157 UART:
3,165,211 UART: [state] CFI Enabled
3,175,576 UART: [fht] FMC Alias Private Key: 7
3,283,501 UART: [art] Extend RT PCRs Done
3,283,929 UART: [art] Lock RT PCRs Done
3,285,417 UART: [art] Populate DV Done
3,293,636 UART: [fht] FMC Alias Private Key: 7
3,294,660 UART: [art] Derive CDI
3,294,940 UART: [art] Store in in slot 0x4
3,380,129 UART: [art] Derive Key Pair
3,380,489 UART: [art] Store priv key in slot 0x5
3,393,593 UART: [art] Derive Key Pair - Done
3,408,175 UART: [art] Signing Cert with AUTHO
3,408,655 UART: RITY.KEYID = 7
3,424,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,826 UART: [art] PUB.X = 745B2A005B5FD8E1A43A753E8883602BF7EF499AA2EFC71026782E28C96C31983309746535D41A8FB383A3B055597046
3,431,563 UART: [art] PUB.Y = AEDFE6BE8A98878D7A1ED2FB86EA52297ED2870790338CA25ED034A542C43D18C16CC8F39ED314D30CDCCF17E234E7B0
3,438,525 UART: [art] SIG.R = C6E077CC68662EA06F2AEA8DD33E42347522463ECF5FDBE8E684FBD8F9B61EEF9766C96499D8B9748418BEB1A2CB0C57
3,445,308 UART: [art] SIG.S = D3911164BE2114E01D4F3347E5A2278F6C71EB9566A56AF64AD048F090559A7EAAB83CB2286352EE9557C2FC6A4C54DC
3,469,635 UART: Caliptra RT
3,469,889 UART: [state] CFI Enabled
3,577,688 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3485499 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114360 bytes
2,883,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,956 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,308 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,246 >>> mbox cmd response: success
3,077,463 UART: [afmc] ++
3,077,631 UART: [afmc] CDI.KEYID = 6
3,077,993 UART: [afmc] SUBJECT.KEYID = 7
3,078,418 UART: [afmc] AUTHORITY.KEYID = 5
3,112,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,371 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,151 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,135,862 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,141,762 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,491 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,565 UART: [afmc] --
3,156,572 UART: [cold-reset] --
3,157,266 UART: [state] Locking Datavault
3,158,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,823 UART: [state] Locking ICCM
3,159,379 UART: [exit] Launching FMC @ 0x40000130
3,164,708 UART:
3,164,724 UART: Running Caliptra FMC ...
3,165,132 UART:
3,165,186 UART: [state] CFI Enabled
3,175,552 UART: [fht] FMC Alias Private Key: 7
3,283,487 UART: [art] Extend RT PCRs Done
3,283,915 UART: [art] Lock RT PCRs Done
3,285,403 UART: [art] Populate DV Done
3,293,622 UART: [fht] FMC Alias Private Key: 7
3,294,646 UART: [art] Derive CDI
3,294,926 UART: [art] Store in in slot 0x4
3,380,113 UART: [art] Derive Key Pair
3,380,473 UART: [art] Store priv key in slot 0x5
3,393,577 UART: [art] Derive Key Pair - Done
3,408,161 UART: [art] Signing Cert with AUTHO
3,408,641 UART: RITY.KEYID = 7
3,424,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,812 UART: [art] PUB.X = F744A9D41FB3FA02FEEA8EB2DC155838F66C14E048DFFDD0956F6D20ED24264B79B489240A30EA951663A8C723A101DF
3,431,585 UART: [art] PUB.Y = 6DBEFAA1D9B11EF5F5248565A524E276A9F21C329A588F7D4C137C35FFDD70F5311F7E8E1D47C0021B4227C080486D2E
3,438,540 UART: [art] SIG.R = 7CEC6C1E0715CF027210642C4D9EEF680F4378A2D7BC7192C2E480E3E193DA553BFB62E1E35CD528D9774EBEF1469149
3,445,309 UART: [art] SIG.S = 6CC638C44116B27D6C382F05DCFF47E16DE3C05B5323AE0A624D4BB222B1212BB403C13F8E3AC99F53C7AFB26A88F337
3,469,631 UART: Caliptra RT
3,469,885 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,573,219 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D92 ra=0x4000703E error_internal_intr_r=00000040
3,575,716 UART: [rt] WDT Expired
3,576,003 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,923 >>> mbox cmd response: success
2,987,011 UART:
2,987,027 UART: Running Caliptra FMC ...
2,987,435 UART:
2,987,489 UART: [state] CFI Enabled
2,997,854 UART: [fht] FMC Alias Private Key: 7
3,105,779 UART: [art] Extend RT PCRs Done
3,106,207 UART: [art] Lock RT PCRs Done
3,107,695 UART: [art] Populate DV Done
3,115,914 UART: [fht] FMC Alias Private Key: 7
3,116,938 UART: [art] Derive CDI
3,117,218 UART: [art] Store in in slot 0x4
3,202,407 UART: [art] Derive Key Pair
3,202,767 UART: [art] Store priv key in slot 0x5
3,215,871 UART: [art] Derive Key Pair - Done
3,230,455 UART: [art] Signing Cert with AUTHO
3,230,935 UART: RITY.KEYID = 7
3,246,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,106 UART: [art] PUB.X = D84253A15FB6F7A1C9D4FCA16E50796F20263760C77934A1DB6AC3037430E7C055C9C3BC5DFFA0690229BC34A1671EBB
3,253,878 UART: [art] PUB.Y = ACFF9FAAA956A3F9CD8B76007FD6469CFC78A513F9DB8EEDBB2AB4FAF6EDE0022157454523DB26BCAAB415984ECCF0EF
3,260,837 UART: [art] SIG.R = 1F879DBD151603318188EF9E3AEEFA0EC31C9AB8DAF6451F27F9AB68122F62F9DC2607A0A8199FB14FCD28542318682E
3,267,608 UART: [art] SIG.S = 0279111D6BD9ED7FAF9698AD8029ACA2D7A646E43DBD90FB692C74A160A326E77479CE64BC686F65D0623B8641E9EE77
3,291,934 UART: Caliptra RT
3,292,188 UART: [state] CFI Enabled
3,400,021 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,170 >>> mbox cmd response: success
2,987,247 UART:
2,987,263 UART: Running Caliptra FMC ...
2,987,671 UART:
2,987,725 UART: [state] CFI Enabled
2,998,091 UART: [fht] FMC Alias Private Key: 7
3,106,026 UART: [art] Extend RT PCRs Done
3,106,454 UART: [art] Lock RT PCRs Done
3,107,942 UART: [art] Populate DV Done
3,116,161 UART: [fht] FMC Alias Private Key: 7
3,117,185 UART: [art] Derive CDI
3,117,465 UART: [art] Store in in slot 0x4
3,202,652 UART: [art] Derive Key Pair
3,203,012 UART: [art] Store priv key in slot 0x5
3,216,116 UART: [art] Derive Key Pair - Done
3,230,701 UART: [art] Signing Cert with AUTHO
3,231,181 UART: RITY.KEYID = 7
3,246,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,352 UART: [art] PUB.X = 60579B17E12A6D2D711A4E70A7412A9061CBA9749280CA13026F7D967896457F459CE35F4A8637E4ACEC82038985099B
3,254,105 UART: [art] PUB.Y = 48A2C016E9BDC2E608050F5DB6EE4CD11C8067236BC043670646F1ED12325207774FB0C7878A56C85BA4975B3158D420
3,261,036 UART: [art] SIG.R = 65E4995EB488FBD6F7BE26382C10D165C4955C25E702879BC692E2227BBB90DAE4C46D13161DFD090EDA38B55EECD204
3,267,804 UART: [art] SIG.S = A62A37320A170B665875D637D5FAD95E4AB83172115F21464D4A47D339C5BF7F60092597CFB7AF609C249F4FDBF19D6E
3,292,118 UART: Caliptra RT
3,292,372 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,395,798 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D92 ra=0x4000703E error_internal_intr_r=00000040
3,398,295 UART: [rt] WDT Expired
3,398,582 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114360 bytes
2,885,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,061 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,446 >>> mbox cmd response: success
3,078,678 UART: [afmc] ++
3,078,846 UART: [afmc] CDI.KEYID = 6
3,079,208 UART: [afmc] SUBJECT.KEYID = 7
3,079,633 UART: [afmc] AUTHORITY.KEYID = 5
3,115,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,542 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,935 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,625 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,582 UART: [afmc] --
3,158,522 UART: [cold-reset] --
3,159,458 UART: [state] Locking Datavault
3,160,615 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,219 UART: [state] Locking ICCM
3,161,825 UART: [exit] Launching FMC @ 0x40000130
3,167,154 UART:
3,167,170 UART: Running Caliptra FMC ...
3,167,578 UART:
3,167,721 UART: [state] CFI Enabled
3,178,348 UART: [fht] FMC Alias Private Key: 7
3,286,097 UART: [art] Extend RT PCRs Done
3,286,525 UART: [art] Lock RT PCRs Done
3,287,827 UART: [art] Populate DV Done
3,296,066 UART: [fht] FMC Alias Private Key: 7
3,297,080 UART: [art] Derive CDI
3,297,360 UART: [art] Store in in slot 0x4
3,383,125 UART: [art] Derive Key Pair
3,383,485 UART: [art] Store priv key in slot 0x5
3,396,703 UART: [art] Derive Key Pair - Done
3,411,502 UART: [art] Signing Cert with AUTHO
3,411,982 UART: RITY.KEYID = 7
3,427,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,137 UART: [art] PUB.X = 08DBA59E7D0D32094CDCD05DDD24D2AE18294DD2C19D19C48D4CB40D36BC862AE4E1119C3F3DF09DC93F03972059B65F
3,434,908 UART: [art] PUB.Y = 585396EC94FEA6C74916E47E29C1704FE13951E2CF496EDCD9858022F8CA6862918F096E8405C9F6E1510982F822B2BB
3,441,847 UART: [art] SIG.R = 245758A06040970602341A5743A7D423B0800FA0E9D6FCE6446C99672DE39B7E9447904F59B054AD33F1BC731199EB51
3,448,598 UART: [art] SIG.S = 18D148638603EEE1F1CD779C4B033A0162A329A747D66313EBDCAAE1EEA3D45D25C320DA31304DBCB0920F949A0598A7
3,472,218 UART: Caliptra RT
3,472,564 UART: [state] CFI Enabled
3,581,249 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3488071 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114360 bytes
2,885,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,021 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,373 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,405 >>> mbox cmd response: success
3,078,634 UART: [afmc] ++
3,078,802 UART: [afmc] CDI.KEYID = 6
3,079,164 UART: [afmc] SUBJECT.KEYID = 7
3,079,589 UART: [afmc] AUTHORITY.KEYID = 5
3,115,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,274 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,137,985 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,143,885 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,149,614 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,157,558 UART: [afmc] --
3,158,497 UART: [cold-reset] --
3,159,433 UART: [state] Locking Datavault
3,160,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,194 UART: [state] Locking ICCM
3,161,800 UART: [exit] Launching FMC @ 0x40000130
3,167,129 UART:
3,167,145 UART: Running Caliptra FMC ...
3,167,553 UART:
3,167,696 UART: [state] CFI Enabled
3,178,324 UART: [fht] FMC Alias Private Key: 7
3,286,083 UART: [art] Extend RT PCRs Done
3,286,511 UART: [art] Lock RT PCRs Done
3,287,813 UART: [art] Populate DV Done
3,296,052 UART: [fht] FMC Alias Private Key: 7
3,297,066 UART: [art] Derive CDI
3,297,346 UART: [art] Store in in slot 0x4
3,383,109 UART: [art] Derive Key Pair
3,383,469 UART: [art] Store priv key in slot 0x5
3,396,687 UART: [art] Derive Key Pair - Done
3,411,480 UART: [art] Signing Cert with AUTHO
3,411,960 UART: RITY.KEYID = 7
3,427,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,115 UART: [art] PUB.X = 5145E2329FD4DB51E5E7351724AC6C96377A11D19D4CB444CF902497948E8BA6A245D73CED51CC67BA8B34E3BD8C41CB
3,434,895 UART: [art] PUB.Y = 0B892074123EDAE035F610965BB366556E65BC5681FC4B5457D840F401C9963E2F57392B1E70BF45B59CD54240AB876E
3,441,835 UART: [art] SIG.R = 43F24765372AC261C7EDCC839B6EDD70871F52EBAAE0239F4220514CF37EEC0061DE43A7003F8C993116EC384E99A204
3,448,562 UART: [art] SIG.S = F50DF42EE07F7F284ED4EF13A595EC01465CAF5526554322F4CAD6AB516F3BB2F02C46AAA70280F83AF3014766A8E32A
3,472,187 UART: Caliptra RT
3,472,533 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,576,772 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D90 ra=0x4000703E error_internal_intr_r=00000040
3,579,269 UART: [rt] WDT Expired
3,579,556 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,082 >>> mbox cmd response: success
2,989,432 UART:
2,989,448 UART: Running Caliptra FMC ...
2,989,856 UART:
2,989,999 UART: [state] CFI Enabled
3,000,626 UART: [fht] FMC Alias Private Key: 7
3,108,375 UART: [art] Extend RT PCRs Done
3,108,803 UART: [art] Lock RT PCRs Done
3,110,105 UART: [art] Populate DV Done
3,118,344 UART: [fht] FMC Alias Private Key: 7
3,119,358 UART: [art] Derive CDI
3,119,638 UART: [art] Store in in slot 0x4
3,205,403 UART: [art] Derive Key Pair
3,205,763 UART: [art] Store priv key in slot 0x5
3,218,981 UART: [art] Derive Key Pair - Done
3,233,776 UART: [art] Signing Cert with AUTHO
3,234,256 UART: RITY.KEYID = 7
3,249,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,411 UART: [art] PUB.X = F3C6DCA2654D406890BF7F754BDC102EE24E4CD6FEF2A5E52CD063BE2D2A8606FD1DD188735D382070E7FCCB055E8E45
3,257,193 UART: [art] PUB.Y = 569C1D3CB7E61F6666AA07E186780A17C2860A1C5193C8DC267FFFD5579FA24C4014FF2A8FB5DC9CDC2898018B754954
3,264,137 UART: [art] SIG.R = EF0A131AC02649968A26EEBD644B4C1CC6C96FFC0871AF313D7D1E19C6A32503405FA915D896AF0649881D9FA9CE6828
3,270,903 UART: [art] SIG.S = A1654C6B2E5F9D321BD7CDFF2852E3A78B0C0F210548A1C5B93D1AC0EA8AE9225F0CD521B9B6C38212EA7995A1FEBCEB
3,294,540 UART: Caliptra RT
3,294,886 UART: [state] CFI Enabled
3,403,537 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,329 >>> mbox cmd response: success
2,989,668 UART:
2,989,684 UART: Running Caliptra FMC ...
2,990,092 UART:
2,990,235 UART: [state] CFI Enabled
3,000,863 UART: [fht] FMC Alias Private Key: 7
3,108,622 UART: [art] Extend RT PCRs Done
3,109,050 UART: [art] Lock RT PCRs Done
3,110,352 UART: [art] Populate DV Done
3,118,591 UART: [fht] FMC Alias Private Key: 7
3,119,605 UART: [art] Derive CDI
3,119,885 UART: [art] Store in in slot 0x4
3,205,648 UART: [art] Derive Key Pair
3,206,008 UART: [art] Store priv key in slot 0x5
3,219,226 UART: [art] Derive Key Pair - Done
3,234,025 UART: [art] Signing Cert with AUTHO
3,234,505 UART: RITY.KEYID = 7
3,249,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,660 UART: [art] PUB.X = 82C0B0A7BF2554B785CA347979E79511CB4EEB1805BC47ABE325EBE7700D50842EF85125D330581D485AB67742CAA072
3,257,426 UART: [art] PUB.Y = A1BCE6B3B9225D10A6CEDB568161CAF6E436449AF1C0859181B91ED99875FE054C1C2EAEE384629C0B267995F2C74D49
3,264,378 UART: [art] SIG.R = 6D7F6CCE801199B6DEA88749FC3CB0FBF8CE3320CBB5BEB8228DA7B9CDDFB3D133D8A6B43B0BDBB66F56BDD7E181561E
3,271,177 UART: [art] SIG.S = B9411064EB29C6A2F48C9D102878542E13C8816E1B90F05E7054B5BE10A8057C1DB577680E2D5FF2F304BF702CC2D847
3,294,793 UART: Caliptra RT
3,295,139 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,399,306 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D8A ra=0x4000703E error_internal_intr_r=00000040
3,401,805 UART: [rt] WDT Expired
3,402,092 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,516 >>> mbox cmd response: success
2,773,672 UART: [afmc] ++
2,773,840 UART: [afmc] CDI.KEYID = 6
2,774,202 UART: [afmc] SUBJECT.KEYID = 7
2,774,627 UART: [afmc] AUTHORITY.KEYID = 5
2,809,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,887 UART: [afmc] --
2,852,959 UART: [cold-reset] --
2,853,879 UART: [state] Locking Datavault
2,855,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,674 UART: [state] Locking ICCM
2,856,094 UART: [exit] Launching FMC @ 0x40000130
2,861,423 UART:
2,861,439 UART: Running Caliptra FMC ...
2,861,847 UART:
2,861,901 UART: [state] CFI Enabled
2,872,486 UART: [fht] FMC Alias Private Key: 7
2,979,827 UART: [art] Extend RT PCRs Done
2,980,255 UART: [art] Lock RT PCRs Done
2,981,987 UART: [art] Populate DV Done
2,990,266 UART: [fht] FMC Alias Private Key: 7
2,991,258 UART: [art] Derive CDI
2,991,538 UART: [art] Store in in slot 0x4
3,076,609 UART: [art] Derive Key Pair
3,076,969 UART: [art] Store priv key in slot 0x5
3,090,595 UART: [art] Derive Key Pair - Done
3,105,587 UART: [art] Signing Cert with AUTHO
3,106,067 UART: RITY.KEYID = 7
3,121,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,020 UART: [art] PUB.X = 29717F148620129D2C2573D42FA36EC516C1050947A73F51B2997B8ED7C551DEDD50A4AC2FAD2E09886C79285220A708
3,128,774 UART: [art] PUB.Y = 89326229852C4C587B4230D2E3C462A503ED954F2596D81E307EE93F9579E182A5D9BAC31D94C08B56373F4746FA623D
3,135,715 UART: [art] SIG.R = 2AA30779FC297495209A1442FFCE4FFADC91DA726AB246AF7A7AEF9C7725B4831BA2A58982815BECD6DAA40CFF48A398
3,142,497 UART: [art] SIG.S = 00BF8660A082AB9CAEB241E12C354DD21EFE32425C7F2E0683E2085C17638B91D1A1F8B2B663714933A40536F8650C09
3,166,029 UART: Caliptra RT
3,166,283 UART: [state] CFI Enabled
3,274,060 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3182240 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,747 >>> mbox cmd response: success
2,773,900 UART: [afmc] ++
2,774,068 UART: [afmc] CDI.KEYID = 6
2,774,430 UART: [afmc] SUBJECT.KEYID = 7
2,774,855 UART: [afmc] AUTHORITY.KEYID = 5
2,810,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,029 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,832,740 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,838,640 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,337 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,072 UART: [afmc] --
2,853,143 UART: [cold-reset] --
2,854,063 UART: [state] Locking Datavault
2,855,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,858 UART: [state] Locking ICCM
2,856,278 UART: [exit] Launching FMC @ 0x40000130
2,861,607 UART:
2,861,623 UART: Running Caliptra FMC ...
2,862,031 UART:
2,862,085 UART: [state] CFI Enabled
2,872,671 UART: [fht] FMC Alias Private Key: 7
2,980,022 UART: [art] Extend RT PCRs Done
2,980,450 UART: [art] Lock RT PCRs Done
2,982,182 UART: [art] Populate DV Done
2,990,461 UART: [fht] FMC Alias Private Key: 7
2,991,453 UART: [art] Derive CDI
2,991,733 UART: [art] Store in in slot 0x4
3,076,802 UART: [art] Derive Key Pair
3,077,162 UART: [art] Store priv key in slot 0x5
3,090,788 UART: [art] Derive Key Pair - Done
3,105,772 UART: [art] Signing Cert with AUTHO
3,106,252 UART: RITY.KEYID = 7
3,121,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,205 UART: [art] PUB.X = C63E520F899E097BB7D5D38D1D8F94EC734F75AC439427B21E26ABE2ADBCDBC89D32A3D49279FE43CF5EA9D0672F59CD
3,128,989 UART: [art] PUB.Y = 76305ED370AF73F4C755B1F8257646809ECF773465AD8665E037DB3FC2C57A303953942F9587ECB99F3BF772FC1BB064
3,135,939 UART: [art] SIG.R = 7D8C85A516770734725EA845B1E5985FCBE57F7DE738D395FC137CF127EB61836F8E53AF88348D0D014BDEEC02CC23A2
3,142,705 UART: [art] SIG.S = 70511C85FDF06FAD3A17AB2BBD83C4744D9B13AFAC258ED54A3479F9D7DA88A54A930A7456DD24AC684FC131758B9B4C
3,166,287 UART: Caliptra RT
3,166,541 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,269,862 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D8A ra=0x4000703E error_internal_intr_r=00000040
3,272,361 UART: [rt] WDT Expired
3,272,648 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,497 >>> mbox cmd response: success
2,686,067 UART:
2,686,083 UART: Running Caliptra FMC ...
2,686,491 UART:
2,686,545 UART: [state] CFI Enabled
2,697,130 UART: [fht] FMC Alias Private Key: 7
2,804,471 UART: [art] Extend RT PCRs Done
2,804,899 UART: [art] Lock RT PCRs Done
2,806,631 UART: [art] Populate DV Done
2,814,910 UART: [fht] FMC Alias Private Key: 7
2,815,902 UART: [art] Derive CDI
2,816,182 UART: [art] Store in in slot 0x4
2,901,253 UART: [art] Derive Key Pair
2,901,613 UART: [art] Store priv key in slot 0x5
2,915,239 UART: [art] Derive Key Pair - Done
2,930,225 UART: [art] Signing Cert with AUTHO
2,930,705 UART: RITY.KEYID = 7
2,945,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,658 UART: [art] PUB.X = 5C0CCD3657FB8AEBF8A2C809971129D96109251B9333BD2D68C809FD1E99FD1DF86FEB41CD2980719004E871466D920B
2,953,414 UART: [art] PUB.Y = DF5146BD11E4272E0229CE8F728551F9BF4D8A2C0B0508170B5928DB39B9699080C051E3CC1A24D756066AB165D39EA9
2,960,346 UART: [art] SIG.R = C9D320C88A4677D5AFAC40E47F9862CD18378470561CA946C584E185F9510CB3C2E94457104D133187B24B0E1ED95EDE
2,967,110 UART: [art] SIG.S = 12C41117A27248F3E362D97DF05227D9741BA672D9F380C91CA7B71DCB15246203095B16D894450A0F63B08899DB3D99
2,990,661 UART: Caliptra RT
2,990,915 UART: [state] CFI Enabled
3,098,633 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,744 >>> mbox cmd response: success
2,686,303 UART:
2,686,319 UART: Running Caliptra FMC ...
2,686,727 UART:
2,686,781 UART: [state] CFI Enabled
2,697,367 UART: [fht] FMC Alias Private Key: 7
2,804,718 UART: [art] Extend RT PCRs Done
2,805,146 UART: [art] Lock RT PCRs Done
2,806,878 UART: [art] Populate DV Done
2,815,157 UART: [fht] FMC Alias Private Key: 7
2,816,149 UART: [art] Derive CDI
2,816,429 UART: [art] Store in in slot 0x4
2,901,498 UART: [art] Derive Key Pair
2,901,858 UART: [art] Store priv key in slot 0x5
2,915,484 UART: [art] Derive Key Pair - Done
2,930,475 UART: [art] Signing Cert with AUTHO
2,930,955 UART: RITY.KEYID = 7
2,946,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,908 UART: [art] PUB.X = 396DF41B0BC3F3B8EB004D4986C4CBB00E41A80282C71818DB9B99662FA4FBA4FF47C9709544771CE716C9632A2F8753
2,953,651 UART: [art] PUB.Y = 718CFFBC49B98BB8510B95429B49F457DE04087E6848E50F53629A4B87605BBA45F80E62D1DB96C5EFD5A780C7072747
2,960,585 UART: [art] SIG.R = E19E094A664C28D5BE9A86FB17AC9B41377C27A2AD443A7B58F348DB19664B77FC082D446844062E44B7D843304ABD66
2,967,348 UART: [art] SIG.S = D35DF6E0DE3081CC74B6B9513CE5C14A168402FEF801EF0411B5DC4B88022FFE0BE43CACF5F8C928B1D7B37A0188A008
2,990,912 UART: Caliptra RT
2,991,166 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,094,409 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D8A ra=0x4000703E error_internal_intr_r=00000040
3,096,908 UART: [rt] WDT Expired
3,097,195 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,897 >>> mbox cmd response: success
2,774,913 UART: [afmc] ++
2,775,081 UART: [afmc] CDI.KEYID = 6
2,775,443 UART: [afmc] SUBJECT.KEYID = 7
2,775,868 UART: [afmc] AUTHORITY.KEYID = 5
2,811,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,839 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,424 UART: [afmc] --
2,855,302 UART: [cold-reset] --
2,856,346 UART: [state] Locking Datavault
2,857,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,293 UART: [state] Locking ICCM
2,858,767 UART: [exit] Launching FMC @ 0x40000130
2,864,096 UART:
2,864,112 UART: Running Caliptra FMC ...
2,864,520 UART:
2,864,663 UART: [state] CFI Enabled
2,875,592 UART: [fht] FMC Alias Private Key: 7
2,984,301 UART: [art] Extend RT PCRs Done
2,984,729 UART: [art] Lock RT PCRs Done
2,986,337 UART: [art] Populate DV Done
2,994,412 UART: [fht] FMC Alias Private Key: 7
2,995,352 UART: [art] Derive CDI
2,995,632 UART: [art] Store in in slot 0x4
3,081,213 UART: [art] Derive Key Pair
3,081,573 UART: [art] Store priv key in slot 0x5
3,094,879 UART: [art] Derive Key Pair - Done
3,109,745 UART: [art] Signing Cert with AUTHO
3,110,225 UART: RITY.KEYID = 7
3,125,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,192 UART: [art] PUB.X = 09D34B8B764BB0A1A2C092AAEB1065547B10A6BA6192BBDE0091070959D2615C97B0E66465D7A59DD3603BFE9B25EEBC
3,132,941 UART: [art] PUB.Y = 1F43582CF958E92A478BF0F8D0F25EFC27751AFB346968CF25C1917F53D8F586AEFA54C5DA83519D17D08589BD17F760
3,139,897 UART: [art] SIG.R = 9692A48F70E017CCA2992789E96FD0EC50DA7EDD669310608618676CEA23F57938B8C1B517F7B5E1C06DD6A79D8C7E5C
3,146,673 UART: [art] SIG.S = C99CF614B66D6D41DF62E81793A357699160575F603E4AF3C0936D1172BDED20D3D10CFD3B17E7DB3B1358AED29E4DD0
3,170,979 UART: Caliptra RT
3,171,325 UART: [state] CFI Enabled
3,279,248 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3186439 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,128 >>> mbox cmd response: success
2,775,141 UART: [afmc] ++
2,775,309 UART: [afmc] CDI.KEYID = 6
2,775,671 UART: [afmc] SUBJECT.KEYID = 7
2,776,096 UART: [afmc] AUTHORITY.KEYID = 5
2,812,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,450 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,835,161 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,841,061 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,846,758 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,854,609 UART: [afmc] --
2,855,486 UART: [cold-reset] --
2,856,530 UART: [state] Locking Datavault
2,857,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,477 UART: [state] Locking ICCM
2,858,951 UART: [exit] Launching FMC @ 0x40000130
2,864,280 UART:
2,864,296 UART: Running Caliptra FMC ...
2,864,704 UART:
2,864,847 UART: [state] CFI Enabled
2,875,777 UART: [fht] FMC Alias Private Key: 7
2,984,496 UART: [art] Extend RT PCRs Done
2,984,924 UART: [art] Lock RT PCRs Done
2,986,532 UART: [art] Populate DV Done
2,994,607 UART: [fht] FMC Alias Private Key: 7
2,995,547 UART: [art] Derive CDI
2,995,827 UART: [art] Store in in slot 0x4
3,081,406 UART: [art] Derive Key Pair
3,081,766 UART: [art] Store priv key in slot 0x5
3,095,072 UART: [art] Derive Key Pair - Done
3,109,937 UART: [art] Signing Cert with AUTHO
3,110,417 UART: RITY.KEYID = 7
3,125,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,384 UART: [art] PUB.X = AF23F40E514CFAEFA984C9D76204A6BD5AF98840DAA7855B45E7F29A79ED07143512AB7FB6A00B0C9B05FD6B797D9EBE
3,133,156 UART: [art] PUB.Y = 7F3E2CB1F8C0D7ED401E5A1BE3DC0BD1FE41EB5CDE71F8F9F8337F9D25315553A69E092DD665DA80F5B9E4423016E5CF
3,140,120 UART: [art] SIG.R = 25A8000C19991A99EE8D4492CEF26C021AE629A987668A978CE4FF777546E99FFDEDB1A33BD5D2365F63CA65DF752B9D
3,146,872 UART: [art] SIG.S = AB1F5447908F76F21942B4B5BF22D6D01469CFB51E1E0C7C2481743B91B94AB532A760700F48D290471FF3869A09BC18
3,171,158 UART: Caliptra RT
3,171,504 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,275,042 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D92 ra=0x4000703E error_internal_intr_r=00000040
3,277,539 UART: [rt] WDT Expired
3,277,826 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,878 >>> mbox cmd response: success
2,688,740 UART:
2,688,756 UART: Running Caliptra FMC ...
2,689,164 UART:
2,689,307 UART: [state] CFI Enabled
2,700,236 UART: [fht] FMC Alias Private Key: 7
2,808,945 UART: [art] Extend RT PCRs Done
2,809,373 UART: [art] Lock RT PCRs Done
2,810,981 UART: [art] Populate DV Done
2,819,056 UART: [fht] FMC Alias Private Key: 7
2,819,996 UART: [art] Derive CDI
2,820,276 UART: [art] Store in in slot 0x4
2,905,857 UART: [art] Derive Key Pair
2,906,217 UART: [art] Store priv key in slot 0x5
2,919,523 UART: [art] Derive Key Pair - Done
2,934,389 UART: [art] Signing Cert with AUTHO
2,934,869 UART: RITY.KEYID = 7
2,950,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,836 UART: [art] PUB.X = CD7CE23E7007F08A068DB5754352DA095B0BA83E589AD5F32906AA838A3916A56BC6E05CD489E1B0C197225B6CE71AEE
2,957,601 UART: [art] PUB.Y = 9F84AA86091F55ADBBEBA5A97EA7A57448C2098B1E3803447EE6977BAA009BFA4739C5AD002DD6105C5D3BD6E5BA8529
2,964,512 UART: [art] SIG.R = 4ACDAC3962DD78FE2A78C81C39318258EBBE01D289412C299E59F3E1507B0CC3525A9798C71E27F47A25644F04815A38
2,971,273 UART: [art] SIG.S = BBEEFCD71F56F23B4CB5D8B8379FBE0970F7C36008F2F74F7D3A2AB9EE3A471CF192B3367317F1BCA41D7693F2320376
2,995,577 UART: Caliptra RT
2,995,923 UART: [state] CFI Enabled
3,103,897 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,125 >>> mbox cmd response: success
2,688,976 UART:
2,688,992 UART: Running Caliptra FMC ...
2,689,400 UART:
2,689,543 UART: [state] CFI Enabled
2,700,473 UART: [fht] FMC Alias Private Key: 7
2,809,192 UART: [art] Extend RT PCRs Done
2,809,620 UART: [art] Lock RT PCRs Done
2,811,228 UART: [art] Populate DV Done
2,819,303 UART: [fht] FMC Alias Private Key: 7
2,820,243 UART: [art] Derive CDI
2,820,523 UART: [art] Store in in slot 0x4
2,906,102 UART: [art] Derive Key Pair
2,906,462 UART: [art] Store priv key in slot 0x5
2,919,768 UART: [art] Derive Key Pair - Done
2,934,634 UART: [art] Signing Cert with AUTHO
2,935,114 UART: RITY.KEYID = 7
2,950,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,081 UART: [art] PUB.X = 929C3ADC32A854BCF1C1DD96F87662CB4174EA10630C75635130F7BFDA7D9F48722D3751253D84C2C3734DDCE58CDB56
2,957,856 UART: [art] PUB.Y = 6D6FC8C3FD0D98AAAF5B21D5734F48A7701704023EB40273F7C01B5B2F4D45F0160664EB33DB204F33843CE4858E8659
2,964,793 UART: [art] SIG.R = D39B999175E0D12EB5B43D58C88B9CFB794B0A0F4926D4633B9C2CA46C438ABBF9C54D7454337FB1E7A5D8D03DBB0810
2,971,566 UART: [art] SIG.S = 163A4152B9DA0B2A233EBB748C84A9B3B51970FFF069562E560007C9B4FCCE6212760B5CB66F447549A940A10ADC16F6
2,995,833 UART: Caliptra RT
2,996,179 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,099,665 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D88 ra=0x4000703E error_internal_intr_r=00000040
3,102,162 UART: [rt] WDT Expired
3,102,449 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,616 >>> mbox cmd response: success
2,771,779 UART: [afmc] ++
2,771,947 UART: [afmc] CDI.KEYID = 6
2,772,310 UART: [afmc] SUBJECT.KEYID = 7
2,772,736 UART: [afmc] AUTHORITY.KEYID = 5
2,808,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,024 UART: [afmc] --
2,851,096 UART: [cold-reset] --
2,852,016 UART: [state] Locking Datavault
2,853,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,811 UART: [state] Locking ICCM
2,854,231 UART: [exit] Launching FMC @ 0x40000130
2,859,560 UART:
2,859,576 UART: Running Caliptra FMC ...
2,859,984 UART:
2,860,038 UART: [state] CFI Enabled
2,870,623 UART: [fht] FMC Alias Private Key: 7
2,977,964 UART: [art] Extend RT PCRs Done
2,978,392 UART: [art] Lock RT PCRs Done
2,980,124 UART: [art] Populate DV Done
2,988,403 UART: [fht] FMC Alias Private Key: 7
2,989,395 UART: [art] Derive CDI
2,989,675 UART: [art] Store in in slot 0x4
3,074,746 UART: [art] Derive Key Pair
3,075,106 UART: [art] Store priv key in slot 0x5
3,088,732 UART: [art] Derive Key Pair - Done
3,103,721 UART: [art] Signing Cert with AUTHO
3,104,201 UART: RITY.KEYID = 7
3,119,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,154 UART: [art] PUB.X = 031C71CAF14D764A5088BC148C0BE10FFC12387DE4151D34262AEFF80060E243E9888A6CE2AA53D154BE36D1080C71F1
3,126,893 UART: [art] PUB.Y = D5E04B8E7577F4A843F25B3172A585EA27F3C81D83B14F057B3B4BB7443064B32182E557BE1674A289687B222EC94B32
3,133,836 UART: [art] SIG.R = 619E07EB7AA754A9630E7E7F8D082645DA6010FB695B4FFE991D88BBEEFDD2FEF5629BD5A81C2028CE81E3344D87E8DA
3,140,615 UART: [art] SIG.S = F85923947891C180999583FCBFABC9455C02B8B1630D74357796266F4D9E357FC824E125863DA5738C6558138B82C289
3,164,166 UART: Caliptra RT
3,164,420 UART: [state] CFI Enabled
3,272,206 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3180416 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,847 >>> mbox cmd response: success
2,772,007 UART: [afmc] ++
2,772,175 UART: [afmc] CDI.KEYID = 6
2,772,538 UART: [afmc] SUBJECT.KEYID = 7
2,772,964 UART: [afmc] AUTHORITY.KEYID = 5
2,808,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,162 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,874 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,772 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,469 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,209 UART: [afmc] --
2,851,280 UART: [cold-reset] --
2,852,200 UART: [state] Locking Datavault
2,853,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,995 UART: [state] Locking ICCM
2,854,415 UART: [exit] Launching FMC @ 0x40000130
2,859,744 UART:
2,859,760 UART: Running Caliptra FMC ...
2,860,168 UART:
2,860,222 UART: [state] CFI Enabled
2,870,808 UART: [fht] FMC Alias Private Key: 7
2,978,159 UART: [art] Extend RT PCRs Done
2,978,587 UART: [art] Lock RT PCRs Done
2,980,319 UART: [art] Populate DV Done
2,988,598 UART: [fht] FMC Alias Private Key: 7
2,989,590 UART: [art] Derive CDI
2,989,870 UART: [art] Store in in slot 0x4
3,074,939 UART: [art] Derive Key Pair
3,075,299 UART: [art] Store priv key in slot 0x5
3,088,925 UART: [art] Derive Key Pair - Done
3,103,910 UART: [art] Signing Cert with AUTHO
3,104,390 UART: RITY.KEYID = 7
3,119,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,343 UART: [art] PUB.X = ED26E1F9572557F5077B9407DE451742EE72475BA97231FA71272B0FCD9189749683520EAB53F63F1379CF34AD153902
3,127,090 UART: [art] PUB.Y = 90E96D0754F2AEB93EE5DB518291E4AF02D81C71519B945C7B0CC3F7204AA8F9C70E395385AA4CF3FB1D9C46B525FBDD
3,134,044 UART: [art] SIG.R = CA97A6286BAE084FFC2048641420177B038A7368DD64B4AEBD7813301501506761D8C47F92C7D5AF460518093D86652C
3,140,791 UART: [art] SIG.S = 55C7DCAA4E63A0E11781840BF7DC6036652594873B2DBCF4FF3C39B3D1B70CA5BC6A1FD95BB96879B24D22D283C4B7BA
3,164,370 UART: Caliptra RT
3,164,624 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,268,008 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D92 ra=0x4000703E error_internal_intr_r=00000040
3,270,505 UART: [rt] WDT Expired
3,270,792 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,482 >>> mbox cmd response: success
2,682,082 UART:
2,682,098 UART: Running Caliptra FMC ...
2,682,506 UART:
2,682,560 UART: [state] CFI Enabled
2,693,145 UART: [fht] FMC Alias Private Key: 7
2,800,486 UART: [art] Extend RT PCRs Done
2,800,914 UART: [art] Lock RT PCRs Done
2,802,646 UART: [art] Populate DV Done
2,810,925 UART: [fht] FMC Alias Private Key: 7
2,811,917 UART: [art] Derive CDI
2,812,197 UART: [art] Store in in slot 0x4
2,897,268 UART: [art] Derive Key Pair
2,897,628 UART: [art] Store priv key in slot 0x5
2,911,254 UART: [art] Derive Key Pair - Done
2,926,239 UART: [art] Signing Cert with AUTHO
2,926,719 UART: RITY.KEYID = 7
2,941,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,672 UART: [art] PUB.X = B6A31229DD01005511203341DCF8122B5832F7A798E6860A6DD42AB63DA1F2CBD8F42905E8670BD8BA3F922A23A50BA3
2,949,409 UART: [art] PUB.Y = 39C45668E39F057A59C1AD6746F14FD25924584B91C11DA223D4D0259A945D0E2B5FA1730688306B4DF38F8FCEF18657
2,956,348 UART: [art] SIG.R = CCB2DD35E8285926A474C96D4C37A6CECC3F969673E064B3A0208C7497F5FA81C2530CF6ACF9DE8A3269EABCE58491EE
2,963,131 UART: [art] SIG.S = B41359E4B0832B377B0D78299F13459F6C35CD6A805DF12ACA24FBADA5B002BCF9DE2FFE276ED96FBDA9664E6E48052F
2,986,711 UART: Caliptra RT
2,986,965 UART: [state] CFI Enabled
3,094,700 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,729 >>> mbox cmd response: success
2,682,318 UART:
2,682,334 UART: Running Caliptra FMC ...
2,682,742 UART:
2,682,796 UART: [state] CFI Enabled
2,693,382 UART: [fht] FMC Alias Private Key: 7
2,800,733 UART: [art] Extend RT PCRs Done
2,801,161 UART: [art] Lock RT PCRs Done
2,802,893 UART: [art] Populate DV Done
2,811,172 UART: [fht] FMC Alias Private Key: 7
2,812,164 UART: [art] Derive CDI
2,812,444 UART: [art] Store in in slot 0x4
2,897,513 UART: [art] Derive Key Pair
2,897,873 UART: [art] Store priv key in slot 0x5
2,911,499 UART: [art] Derive Key Pair - Done
2,926,484 UART: [art] Signing Cert with AUTHO
2,926,964 UART: RITY.KEYID = 7
2,942,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,917 UART: [art] PUB.X = A7E7EF2344FDB8FEB57128E55864D4A5273C32A2218418E92DBD2D8450B21EF898AC0FD20263E1F298F7E2BB217E3F0B
2,949,688 UART: [art] PUB.Y = 4AF154F13977DC71410B71B65A302CE269938083365553FE56D65FDBD239E55175A4125CD27B5C0CECF0B8B48EF0EDE2
2,956,638 UART: [art] SIG.R = FD5CA2C62065EE9378AD29D4B58C62F3318F4199E9D6396BB91505FA7F9961B4CB401AD0C2D9B70415655801156074DC
2,963,399 UART: [art] SIG.S = D5F25B27C9E451706B5E1503DDDB967A1F908954E322115C262C1F209F713947E451B7DD594CB502549A8CC9E2167841
2,986,956 UART: Caliptra RT
2,987,210 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,090,476 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D92 ra=0x4000703E error_internal_intr_r=00000040
3,092,973 UART: [rt] WDT Expired
3,093,260 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,997 >>> mbox cmd response: success
2,773,020 UART: [afmc] ++
2,773,188 UART: [afmc] CDI.KEYID = 6
2,773,551 UART: [afmc] SUBJECT.KEYID = 7
2,773,977 UART: [afmc] AUTHORITY.KEYID = 5
2,810,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,561 UART: [afmc] --
2,853,439 UART: [cold-reset] --
2,854,483 UART: [state] Locking Datavault
2,855,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,430 UART: [state] Locking ICCM
2,856,904 UART: [exit] Launching FMC @ 0x40000130
2,862,233 UART:
2,862,249 UART: Running Caliptra FMC ...
2,862,657 UART:
2,862,800 UART: [state] CFI Enabled
2,873,729 UART: [fht] FMC Alias Private Key: 7
2,982,438 UART: [art] Extend RT PCRs Done
2,982,866 UART: [art] Lock RT PCRs Done
2,984,474 UART: [art] Populate DV Done
2,992,549 UART: [fht] FMC Alias Private Key: 7
2,993,489 UART: [art] Derive CDI
2,993,769 UART: [art] Store in in slot 0x4
3,079,350 UART: [art] Derive Key Pair
3,079,710 UART: [art] Store priv key in slot 0x5
3,093,016 UART: [art] Derive Key Pair - Done
3,107,883 UART: [art] Signing Cert with AUTHO
3,108,363 UART: RITY.KEYID = 7
3,123,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,330 UART: [art] PUB.X = 6DA5977C296B17D9731C019F8342699EB46E19BED85740C96837C3FA4462CF58E9398F994455F2E03BD304E2C9AB89E2
3,131,092 UART: [art] PUB.Y = EC3663705982B4C8E91209174759DB7908F379CA810185AF2E1559576F2FC4C032164BFBB35CE6064545EA7E757417A7
3,138,022 UART: [art] SIG.R = 85CCC8FDAC31E77AC7EDBF56658E13EFD2CC787DF18081C717107E662CBF4655BA15EB2BEAA2315AF30823DA2ACD51F4
3,144,813 UART: [art] SIG.S = 537DF97AA55D46571F1A814446906118C16B310908DC384098C5BFF4DE9360E4150C3BD89C710F67B8370184BDCC998F
3,169,093 UART: Caliptra RT
3,169,439 UART: [state] CFI Enabled
3,277,345 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3184566 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,228 >>> mbox cmd response: success
2,773,248 UART: [afmc] ++
2,773,416 UART: [afmc] CDI.KEYID = 6
2,773,779 UART: [afmc] SUBJECT.KEYID = 7
2,774,205 UART: [afmc] AUTHORITY.KEYID = 5
2,810,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,583 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,295 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,193 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,890 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,746 UART: [afmc] --
2,853,623 UART: [cold-reset] --
2,854,667 UART: [state] Locking Datavault
2,856,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,614 UART: [state] Locking ICCM
2,857,088 UART: [exit] Launching FMC @ 0x40000130
2,862,417 UART:
2,862,433 UART: Running Caliptra FMC ...
2,862,841 UART:
2,862,984 UART: [state] CFI Enabled
2,873,914 UART: [fht] FMC Alias Private Key: 7
2,982,633 UART: [art] Extend RT PCRs Done
2,983,061 UART: [art] Lock RT PCRs Done
2,984,669 UART: [art] Populate DV Done
2,992,744 UART: [fht] FMC Alias Private Key: 7
2,993,684 UART: [art] Derive CDI
2,993,964 UART: [art] Store in in slot 0x4
3,079,543 UART: [art] Derive Key Pair
3,079,903 UART: [art] Store priv key in slot 0x5
3,093,209 UART: [art] Derive Key Pair - Done
3,108,085 UART: [art] Signing Cert with AUTHO
3,108,565 UART: RITY.KEYID = 7
3,123,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,532 UART: [art] PUB.X = 27DEAB9E925E494B884BA577315962331EDD31BD0CB7A0A94E6EE16E4D693479C032ADB25A217C2B85E6B8020B78FE18
3,131,301 UART: [art] PUB.Y = 1EF0C35B75EC47EFF00127683773B3BD74BB84E9767DA6DE873C8782FB6045C65B19E05E8EBFC7E3DE0A96951B63C54C
3,138,257 UART: [art] SIG.R = 84D33CDF11CD413A95A989651647C2025A956410F6B195904F0BF49821800E34F78CA1D4E783203229DD8D9F2857B6B3
3,145,010 UART: [art] SIG.S = 9892C0600DA0ADCBE87864CE64AC4B8AA657F9BC0910B66190C8B97AF27CD9924047F656562F99C679C01FE7ECF0FD0D
3,169,310 UART: Caliptra RT
3,169,656 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,273,139 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D88 ra=0x4000703E error_internal_intr_r=00000040
3,275,636 UART: [rt] WDT Expired
3,275,923 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,870 >>> mbox cmd response: success
2,684,762 UART:
2,684,778 UART: Running Caliptra FMC ...
2,685,186 UART:
2,685,329 UART: [state] CFI Enabled
2,696,258 UART: [fht] FMC Alias Private Key: 7
2,804,967 UART: [art] Extend RT PCRs Done
2,805,395 UART: [art] Lock RT PCRs Done
2,807,003 UART: [art] Populate DV Done
2,815,078 UART: [fht] FMC Alias Private Key: 7
2,816,018 UART: [art] Derive CDI
2,816,298 UART: [art] Store in in slot 0x4
2,901,879 UART: [art] Derive Key Pair
2,902,239 UART: [art] Store priv key in slot 0x5
2,915,545 UART: [art] Derive Key Pair - Done
2,930,416 UART: [art] Signing Cert with AUTHO
2,930,896 UART: RITY.KEYID = 7
2,946,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,863 UART: [art] PUB.X = 8781C2E3038B5721C07BA3267F6014A313C32C54419B464DDC03BA2758911DF5423D85A6496DB244BA0A033E38000F8D
2,953,590 UART: [art] PUB.Y = 2C8B6D8057ABABCA4FEF70BD28E201385D1AE48F8977F10FD1D434EF3F757FA3C75FCF92EA2CB58C06EAC612933424F8
2,960,551 UART: [art] SIG.R = 9C1E7117A8318613967DE83FA64AA5701F067987B8FAB19A03BB0E75FBFEDAFCB89120C347AE0589D389B283651C0D65
2,967,312 UART: [art] SIG.S = 0503DE7178EE1870EA5ABBDF75771AF7337C2460E479C2A10C58FBFAA8B1123B7E4EAB13F1D95E86129689CBE7EB21D0
2,991,616 UART: Caliptra RT
2,991,962 UART: [state] CFI Enabled
3,099,868 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,110 >>> mbox cmd response: success
2,684,991 UART:
2,685,007 UART: Running Caliptra FMC ...
2,685,415 UART:
2,685,558 UART: [state] CFI Enabled
2,696,488 UART: [fht] FMC Alias Private Key: 7
2,805,207 UART: [art] Extend RT PCRs Done
2,805,635 UART: [art] Lock RT PCRs Done
2,807,243 UART: [art] Populate DV Done
2,815,318 UART: [fht] FMC Alias Private Key: 7
2,816,258 UART: [art] Derive CDI
2,816,538 UART: [art] Store in in slot 0x4
2,902,117 UART: [art] Derive Key Pair
2,902,477 UART: [art] Store priv key in slot 0x5
2,915,783 UART: [art] Derive Key Pair - Done
2,930,644 UART: [art] Signing Cert with AUTHO
2,931,124 UART: RITY.KEYID = 7
2,946,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,091 UART: [art] PUB.X = 7FCB0F7CC9EEB5A5119113B6DB22935C3D7E758AEA269E54E0537609F4652E2B39568E4650924D98BAE8D821FCA75676
2,953,859 UART: [art] PUB.Y = F82354FC5A1C839660C9CC2FD7F35E52057BA58EDE78F74CD01DFDEE39430329C7EAD5ED9DA42F44E8CE2A41D2EAA431
2,960,825 UART: [art] SIG.R = 27A476C3A9435E0330362AE899E8830DC65A6E94F1A4CD06D6100914A33A922CC4FDCAFE733A3AB1A0F0B409C3F90916
2,967,583 UART: [art] SIG.S = 17D7E157468650525ED3FD92FC4B93239AA46DE40006D660C688AD3BFEB0462651440ECA67B6F782C9F526C885056B8A
2,991,849 UART: Caliptra RT
2,992,195 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,095,636 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D88 ra=0x4000703E error_internal_intr_r=00000040
3,098,133 UART: [rt] WDT Expired
3,098,420 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,646 UART: [kat] SHA2-512-ACC
906,547 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,172,775 UART: [idev] ++
1,172,943 UART: [idev] CDI.KEYID = 6
1,173,304 UART: [idev] SUBJECT.KEYID = 7
1,173,729 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,544 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,173,038 UART: [idev] ++
1,173,206 UART: [idev] CDI.KEYID = 6
1,173,567 UART: [idev] SUBJECT.KEYID = 7
1,173,992 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,986 UART: [kat] HMAC-384Kdf
920,544 UART: [kat] LMS
1,168,856 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
891,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,068 UART: [kat] ++
896,220 UART: [kat] sha1
900,602 UART: [kat] SHA2-256
902,542 UART: [kat] SHA2-384
905,445 UART: [kat] SHA2-512-ACC
907,346 UART: [kat] ECC-384
917,273 UART: [kat] HMAC-384Kdf
921,843 UART: [kat] LMS
1,170,155 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,368 UART: [fht] FHT @ 0x50003400
1,173,988 UART: [idev] ++
1,174,156 UART: [idev] CDI.KEYID = 6
1,174,517 UART: [idev] SUBJECT.KEYID = 7
1,174,942 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,717 UART: [idev] ++
1,172,885 UART: [idev] CDI.KEYID = 6
1,173,246 UART: [idev] SUBJECT.KEYID = 7
1,173,671 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,664 UART: [idev] ++
1,173,832 UART: [idev] CDI.KEYID = 6
1,174,193 UART: [idev] SUBJECT.KEYID = 7
1,174,618 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
191,886 UART:
192,262 UART: Running Caliptra ROM ...
193,456 UART:
193,628 UART: [state] CFI Enabled
262,447 UART: [state] LifecycleState = Production
264,310 UART: [state] DebugLocked = Yes
265,734 UART: [state] Starting the Watchdog Timer 40000000 cycles
270,768 UART: [kat] SHA2-256
440,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,013 UART: [kat] ++
451,540 UART: [kat] sha1
462,482 UART: [kat] SHA2-256
465,219 UART: [kat] SHA2-384
470,427 UART: [kat] SHA2-512-ACC
472,787 UART: [kat] ECC-384
2,769,227 UART: [kat] HMAC-384Kdf
2,800,475 UART: [kat] LMS
3,990,739 UART: [kat] --
3,995,026 UART: [cold-reset] ++
3,996,908 UART: [fht] Storing FHT @ 0x50003400
4,008,953 UART: [idev] ++
4,009,596 UART: [idev] CDI.KEYID = 6
4,010,478 UART: [idev] SUBJECT.KEYID = 7
4,011,720 UART: [idev] UDS.KEYID = 0
4,012,688 ready_for_fw is high
4,012,888 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,442 UART: [idev] Erasing UDS.KEYID = 0
7,346,572 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,230 UART: [idev] --
7,372,769 UART: [ldev] ++
7,373,335 UART: [ldev] CDI.KEYID = 6
7,374,307 UART: [ldev] SUBJECT.KEYID = 5
7,375,520 UART: [ldev] AUTHORITY.KEYID = 7
7,376,750 UART: [ldev] FE.KEYID = 1
7,423,212 UART: [ldev] Erasing FE.KEYID = 1
10,755,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,991 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,064,004 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,078,157 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,092,735 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,110,464 UART: [ldev] --
13,115,826 UART: [fwproc] Waiting for Commands...
13,118,196 UART: [fwproc] Received command 0x46574c44
13,120,427 UART: [fwproc] Received Image of size 114036 bytes
17,209,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,351,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,668,547 >>> mbox cmd response: success
17,672,980 UART: [afmc] ++
17,673,626 UART: [afmc] CDI.KEYID = 6
17,674,513 UART: [afmc] SUBJECT.KEYID = 7
17,675,750 UART: [afmc] AUTHORITY.KEYID = 5
21,038,543 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,335,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,338,221 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,352,864 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,367,601 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,381,898 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,402,424 UART: [afmc] --
23,405,856 UART: [cold-reset] --
23,411,185 UART: [state] Locking Datavault
23,416,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,417,967 UART: [state] Locking ICCM
23,419,156 UART: [exit] Launching FMC @ 0x40000130
23,427,556 UART:
23,427,794 UART: Running Caliptra FMC ...
23,428,894 UART:
23,429,093 UART: [state] CFI Enabled
23,498,172 UART: [fht] FMC Alias Private Key: 7
25,836,350 UART: [art] Extend RT PCRs Done
25,838,139 UART: [art] Lock RT PCRs Done
25,839,274 UART: [art] Populate DV Done
25,844,872 UART: [fht] FMC Alias Private Key: 7
25,846,575 UART: [art] Derive CDI
25,847,393 UART: [art] Store in in slot 0x4
25,902,584 UART: [art] Derive Key Pair
25,903,675 UART: [art] Store priv key in slot 0x5
29,196,516 UART: [art] Derive Key Pair - Done
29,209,694 UART: [art] Signing Cert with AUTHO
29,210,996 UART: RITY.KEYID = 7
31,499,329 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,287 UART: [art] PUB.X = 0316EB1EA9B978CBC86DF837A1535C0B7F2D760430A620DB13F91792A993AB43158F42B29B1514199A9495584B99A8A1
31,508,073 UART: [art] PUB.Y = 39EE49E212668C3FEC69F2143ED9AED9AB841182444A662898ABCB6CBD2FC57A6B575C1C14C5413D5A8A50381222091C
31,515,341 UART: [art] SIG.R = 193696868FD5BB55E3250D19BB2E4D948CC96E74A24B145A257A81EA015AFD9864A48199D705B601F9304FFA08B7323D
31,522,695 UART: [art] SIG.S = 3DA670C4D291EC6C495CAEFA5C6934195869DC4232E9400EB89BF97A790048F7BFE3F1C61DA6015FBF28348D9355B7A6
32,827,771 UART: Caliptra RT
32,828,882 UART: [state] CFI Enabled
32,992,438 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,032 UART:
1,216 UART: Running Caliptra ROM ...
2,234 UART:
2,376 UART: [state] CFI Enabled
64,932 UART: [state] LifecycleState = Production
66,837 UART: [state] DebugLocked = Yes
68,395 UART: [state] Starting the Watchdog Timer 40000000 cycles
72,808 UART: [kat] SHA2-256
242,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
253,018 UART: [kat] ++
253,563 UART: [kat] sha1
264,450 UART: [kat] SHA2-256
267,149 UART: [kat] SHA2-384
271,902 UART: [kat] SHA2-512-ACC
274,236 UART: [kat] ECC-384
2,567,656 UART: [kat] HMAC-384Kdf
2,582,420 UART: [kat] LMS
3,772,876 UART: [kat] --
3,775,690 UART: [warm-reset] ++
3,781,005 UART: [warm-reset] --
3,784,785 UART: [state] Locking Datavault
3,788,146 UART: [state] Locking PCR0, PCR1 and PCR31
3,790,028 UART: [state] Locking ICCM
3,792,553 UART: [exit] Launching FMC @ 0x40000130
3,800,948 UART:
3,801,184 UART: Running Caliptra FMC ...
3,802,305 UART:
3,802,466 UART: [state] CFI Enabled
3,855,238 UART: [aliasrt :skip pcr extension
3,856,612 UART: [art] Extend RT PCRs Done
3,857,684 UART: [art] Lock RT PCRs Done
3,858,744 UART: [art] Populate DV Done
3,863,884 UART: [fht] FMC Alias Private Key: 7
3,865,524 UART: [art] Derive CDI
3,866,338 UART: [art] Store in in slot 0x4
3,923,917 UART: [art] Derive Key Pair
3,924,919 UART: [art] Store priv key in slot 0x5
7,218,438 UART: [art] Derive Key Pair - Done
7,231,644 UART: [art] Signing Cert with AUTHO
7,232,989 UART: RITY.KEYID = 7
9,532,855 UART: [art] Erasing AUTHORITY.KEYID = 7
9,534,813 UART: [art] PUB.X = 0316EB1EA9B978CBC86DF837A1535C0B7F2D760430A620DB13F91792A993AB43158F42B29B1514199A9495584B99A8A1
9,541,653 UART: [art] PUB.Y = 39EE49E212668C3FEC69F2143ED9AED9AB841182444A662898ABCB6CBD2FC57A6B575C1C14C5413D5A8A50381222091C
9,548,848 UART: [art] SIG.R = 193696868FD5BB55E3250D19BB2E4D948CC96E74A24B145A257A81EA015AFD9864A48199D705B601F9304FFA08B7323D
9,556,200 UART: [art] SIG.S = 3DA670C4D291EC6C495CAEFA5C6934195869DC4232E9400EB89BF97A790048F7BFE3F1C61DA6015FBF28348D9355B7A6
10,860,778 UART: Caliptra RT
10,861,888 UART: [state] CFI Enabled
11,195,001 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,787,318 ready_for_fw is high
3,787,719 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,880,985 >>> mbox cmd response: success
23,571,073 UART:
23,571,469 UART: Running Caliptra FMC ...
23,572,584 UART:
23,572,758 UART: [state] CFI Enabled
23,639,701 UART: [fht] FMC Alias Private Key: 7
25,977,916 UART: [art] Extend RT PCRs Done
25,979,147 UART: [art] Lock RT PCRs Done
25,980,692 UART: [art] Populate DV Done
25,986,048 UART: [fht] FMC Alias Private Key: 7
25,987,759 UART: [art] Derive CDI
25,988,577 UART: [art] Store in in slot 0x4
26,048,697 UART: [art] Derive Key Pair
26,049,697 UART: [art] Store priv key in slot 0x5
29,342,357 UART: [art] Derive Key Pair - Done
29,355,359 UART: [art] Signing Cert with AUTHO
29,356,656 UART: RITY.KEYID = 7
31,644,601 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,112 UART: [art] PUB.X = 306EE4D546D335A0FF265C201A81C9B5DCF389C4ABFA3E5487C5E201539DBE83214469EA7C56A4183B7DBDC26DFF7A91
31,653,367 UART: [art] PUB.Y = A943284CCEFAB4BCCB93D5F7D63C96373BD3F4C393783B96C0DBF1A4AED8F0AB5F0D097E9793D9A8D27E949C4098C64A
31,660,662 UART: [art] SIG.R = A473F95404D569BAF73F1A0960E1AE936AA4FB14885EF8827BAAE9F88CFA3646D0005C79A83D629908286A12FE5EE142
31,668,025 UART: [art] SIG.S = 21F0DD6AB0511D062B1EF75C78F6FAF0D8289EC0701CB5459CFFD03C02911EC8FD97AF8DFA15ECD33A8B4B8E84F031C0
32,973,351 UART: Caliptra RT
32,974,067 UART: [state] CFI Enabled
33,137,244 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,608,036 UART:
3,608,369 UART: Running Caliptra FMC ...
3,609,413 UART:
3,609,564 UART: [state] CFI Enabled
3,657,123 UART: [aliasrt :skip pcr extension
3,658,421 UART: [art] Extend RT PCRs Done
3,659,488 UART: [art] Lock RT PCRs Done
3,660,691 UART: [art] Populate DV Done
3,665,887 UART: [fht] FMC Alias Private Key: 7
3,667,481 UART: [art] Derive CDI
3,668,237 UART: [art] Store in in slot 0x4
3,725,665 UART: [art] Derive Key Pair
3,726,708 UART: [art] Store priv key in slot 0x5
7,019,709 UART: [art] Derive Key Pair - Done
7,032,492 UART: [art] Signing Cert with AUTHO
7,033,793 UART: RITY.KEYID = 7
9,321,809 UART: [art] Erasing AUTHORITY.KEYID = 7
9,323,313 UART: [art] PUB.X = 306EE4D546D335A0FF265C201A81C9B5DCF389C4ABFA3E5487C5E201539DBE83214469EA7C56A4183B7DBDC26DFF7A91
9,330,622 UART: [art] PUB.Y = A943284CCEFAB4BCCB93D5F7D63C96373BD3F4C393783B96C0DBF1A4AED8F0AB5F0D097E9793D9A8D27E949C4098C64A
9,337,858 UART: [art] SIG.R = A473F95404D569BAF73F1A0960E1AE936AA4FB14885EF8827BAAE9F88CFA3646D0005C79A83D629908286A12FE5EE142
9,345,196 UART: [art] SIG.S = 21F0DD6AB0511D062B1EF75C78F6FAF0D8289EC0701CB5459CFFD03C02911EC8FD97AF8DFA15ECD33A8B4B8E84F031C0
10,649,956 UART: Caliptra RT
10,650,665 UART: [state] CFI Enabled
10,985,031 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
191,859 UART:
192,227 UART: Running Caliptra ROM ...
193,350 UART:
603,096 UART: [state] CFI Enabled
617,424 UART: [state] LifecycleState = Production
619,288 UART: [state] DebugLocked = Yes
621,728 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,531 UART: [kat] SHA2-256
797,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,882 UART: [kat] ++
808,437 UART: [kat] sha1
819,245 UART: [kat] SHA2-256
821,965 UART: [kat] SHA2-384
828,873 UART: [kat] SHA2-512-ACC
831,239 UART: [kat] ECC-384
3,114,390 UART: [kat] HMAC-384Kdf
3,125,650 UART: [kat] LMS
4,315,813 UART: [kat] --
4,321,034 UART: [cold-reset] ++
4,323,123 UART: [fht] Storing FHT @ 0x50003400
4,336,450 UART: [idev] ++
4,337,014 UART: [idev] CDI.KEYID = 6
4,337,947 UART: [idev] SUBJECT.KEYID = 7
4,339,193 UART: [idev] UDS.KEYID = 0
4,340,240 ready_for_fw is high
4,340,453 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,767 UART: [idev] Erasing UDS.KEYID = 0
7,627,406 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,217 UART: [idev] --
7,654,206 UART: [ldev] ++
7,654,842 UART: [ldev] CDI.KEYID = 6
7,655,751 UART: [ldev] SUBJECT.KEYID = 5
7,656,969 UART: [ldev] AUTHORITY.KEYID = 7
7,658,253 UART: [ldev] FE.KEYID = 1
7,669,789 UART: [ldev] Erasing FE.KEYID = 1
10,957,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,982 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,264,504 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,279,152 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,293,525 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,312,125 UART: [ldev] --
13,316,787 UART: [fwproc] Waiting for Commands...
13,319,849 UART: [fwproc] Received command 0x46574c44
13,322,026 UART: [fwproc] Received Image of size 114036 bytes
17,406,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,483,577 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,552,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,869,423 >>> mbox cmd response: success
17,874,334 UART: [afmc] ++
17,874,924 UART: [afmc] CDI.KEYID = 6
17,875,805 UART: [afmc] SUBJECT.KEYID = 7
17,877,064 UART: [afmc] AUTHORITY.KEYID = 5
21,191,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,486,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,488,630 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,503,320 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,518,003 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,532,407 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,553,568 UART: [afmc] --
23,557,108 UART: [cold-reset] --
23,559,829 UART: [state] Locking Datavault
23,566,105 UART: [state] Locking PCR0, PCR1 and PCR31
23,567,842 UART: [state] Locking ICCM
23,569,483 UART: [exit] Launching FMC @ 0x40000130
23,577,883 UART:
23,578,113 UART: Running Caliptra FMC ...
23,579,211 UART:
23,579,365 UART: [state] CFI Enabled
23,587,738 UART: [fht] FMC Alias Private Key: 7
25,918,825 UART: [art] Extend RT PCRs Done
25,920,064 UART: [art] Lock RT PCRs Done
25,921,530 UART: [art] Populate DV Done
25,926,832 UART: [fht] FMC Alias Private Key: 7
25,928,312 UART: [art] Derive CDI
25,929,070 UART: [art] Store in in slot 0x4
25,971,615 UART: [art] Derive Key Pair
25,972,645 UART: [art] Store priv key in slot 0x5
29,214,644 UART: [art] Derive Key Pair - Done
29,227,478 UART: [art] Signing Cert with AUTHO
29,228,783 UART: RITY.KEYID = 7
31,508,412 UART: [art] Erasing AUTHORITY.KEYID = 7
31,509,914 UART: [art] PUB.X = 8BF9A8A8AD5C480A47D93298C23E83E2A5262101CE9020E2EDD092CBCCA24B0150B8A96075037315C1F4457ACF123EC3
31,517,152 UART: [art] PUB.Y = 71101770E8062CB16AF803198AC8100BC8F79CE347F9140496A1B836BFC1D6299D4AF3B4F4023611AD1E37E2ECF0044B
31,524,433 UART: [art] SIG.R = 7722F56CAD546EE45B15E33E6382ADA80803971BD3758143B4C7A79747DA089DDBF22EC554FC712277D2BF9B38BAC94F
31,531,821 UART: [art] SIG.S = A413C7D8F043C9EE7D57592D4296A58BB7610DECD0FE65B6E528F8B9EDCD7AAA5B506601D1C3D36FD1424BDAC51E75EB
32,836,557 UART: Caliptra RT
32,837,285 UART: [state] CFI Enabled
32,955,014 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,002 UART:
1,209 UART: Running Caliptra ROM ...
2,320 UART:
7,573,751 UART: [state] CFI Enabled
7,589,533 UART: [state] LifecycleState = Production
7,591,337 UART: [state] DebugLocked = Yes
7,593,732 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,599,867 UART: [kat] SHA2-256
7,769,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,780,131 UART: [kat] ++
7,780,725 UART: [kat] sha1
7,792,860 UART: [kat] SHA2-256
7,795,551 UART: [kat] SHA2-384
7,802,253 UART: [kat] SHA2-512-ACC
7,804,659 UART: [kat] ECC-384
10,091,140 UART: [kat] HMAC-384Kdf
10,103,583 UART: [kat] LMS
11,293,699 UART: [kat] --
11,296,762 UART: [warm-reset] ++
11,301,067 UART: [warm-reset] --
11,304,168 UART: [state] Locking Datavault
11,308,389 UART: [state] Locking PCR0, PCR1 and PCR31
11,310,139 UART: [state] Locking ICCM
11,312,124 UART: [exit] Launching FMC @ 0x40000130
11,320,525 UART:
11,320,758 UART: Running Caliptra FMC ...
11,321,855 UART:
11,322,004 UART: [state] CFI Enabled
11,323,950 UART: [aliasrt :skip pcr extension
11,325,211 UART: [art] Extend RT PCRs Done
11,326,347 UART: [art] Lock RT PCRs Done
11,327,408 UART: [art] Populate DV Done
11,332,973 UART: [fht] FMC Alias Private Key: 7
11,334,443 UART: [art] Derive CDI
11,335,207 UART: [art] Store in in slot 0x4
11,377,800 UART: [art] Derive Key Pair
11,378,797 UART: [art] Store priv key in slot 0x5
14,620,237 UART: [art] Derive Key Pair - Done
14,633,510 UART: [art] Signing Cert with AUTHO
14,634,812 UART: RITY.KEYID = 7
16,914,136 UART: [art] Erasing AUTHORITY.KEYID = 7
16,915,645 UART: [art] PUB.X = 8BF9A8A8AD5C480A47D93298C23E83E2A5262101CE9020E2EDD092CBCCA24B0150B8A96075037315C1F4457ACF123EC3
16,922,881 UART: [art] PUB.Y = 71101770E8062CB16AF803198AC8100BC8F79CE347F9140496A1B836BFC1D6299D4AF3B4F4023611AD1E37E2ECF0044B
16,930,090 UART: [art] SIG.R = 7722F56CAD546EE45B15E33E6382ADA80803971BD3758143B4C7A79747DA089DDBF22EC554FC712277D2BF9B38BAC94F
16,937,499 UART: [art] SIG.S = A413C7D8F043C9EE7D57592D4296A58BB7610DECD0FE65B6E528F8B9EDCD7AAA5B506601D1C3D36FD1424BDAC51E75EB
18,242,786 UART: Caliptra RT
18,243,472 UART: [state] CFI Enabled
18,529,536 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,126,856 ready_for_fw is high
4,127,265 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,106,553 >>> mbox cmd response: success
23,737,676 UART:
23,738,064 UART: Running Caliptra FMC ...
23,739,212 UART:
23,739,368 UART: [state] CFI Enabled
23,747,350 UART: [fht] FMC Alias Private Key: 7
26,078,197 UART: [art] Extend RT PCRs Done
26,079,425 UART: [art] Lock RT PCRs Done
26,081,542 UART: [art] Populate DV Done
26,087,179 UART: [fht] FMC Alias Private Key: 7
26,088,933 UART: [art] Derive CDI
26,089,750 UART: [art] Store in in slot 0x4
26,132,319 UART: [art] Derive Key Pair
26,133,315 UART: [art] Store priv key in slot 0x5
29,375,498 UART: [art] Derive Key Pair - Done
29,388,568 UART: [art] Signing Cert with AUTHO
29,389,872 UART: RITY.KEYID = 7
31,669,944 UART: [art] Erasing AUTHORITY.KEYID = 7
31,671,455 UART: [art] PUB.X = 66C08C85A85107CCE55F694BC7B1FAF3085007684E4A539BA1A835442012BAC5622E2A21E531A14B59CEBDDF2DF9013C
31,678,658 UART: [art] PUB.Y = E384266C0B542FD61F3B7A5C0FACDAEF7EDC02403A29C345BE8C95A59A72EC8B3A25840C9101EEA461D7D1F7D1971ADB
31,685,957 UART: [art] SIG.R = EBB1371773DD54D5340143845DA28F77FF3F27572E94BDC9B55EA9A8ECABE2504A548C559D46C6C5D70D79015C3917AE
31,693,310 UART: [art] SIG.S = CC4D7080111E0F7BEB952D23D4B98E0A69749399C626ABEA79D677B2FDEC4EC4D697FA3B3E5C6E19B49DDDB852C71D4C
32,998,530 UART: Caliptra RT
32,999,231 UART: [state] CFI Enabled
33,116,631 UART: [rt] RT listening for mailbox commands...
Initializing fuses
10,946,154 UART:
10,946,511 UART: Running Caliptra FMC ...
10,947,553 UART:
10,947,707 UART: [state] CFI Enabled
10,949,374 UART: [aliasrt :skip pcr extension
10,950,828 UART: [art] Extend RT PCRs Done
10,951,902 UART: [art] Lock RT PCRs Done
10,953,051 UART: [art] Populate DV Done
10,958,627 UART: [fht] FMC Alias Private Key: 7
10,960,381 UART: [art] Derive CDI
10,961,115 UART: [art] Store in in slot 0x4
11,003,704 UART: [art] Derive Key Pair
11,004,701 UART: [art] Store priv key in slot 0x5
14,246,942 UART: [art] Derive Key Pair - Done
14,259,949 UART: [art] Signing Cert with AUTHO
14,261,253 UART: RITY.KEYID = 7
16,540,730 UART: [art] Erasing AUTHORITY.KEYID = 7
16,542,236 UART: [art] PUB.X = 66C08C85A85107CCE55F694BC7B1FAF3085007684E4A539BA1A835442012BAC5622E2A21E531A14B59CEBDDF2DF9013C
16,549,498 UART: [art] PUB.Y = E384266C0B542FD61F3B7A5C0FACDAEF7EDC02403A29C345BE8C95A59A72EC8B3A25840C9101EEA461D7D1F7D1971ADB
16,556,776 UART: [art] SIG.R = EBB1371773DD54D5340143845DA28F77FF3F27572E94BDC9B55EA9A8ECABE2504A548C559D46C6C5D70D79015C3917AE
16,564,152 UART: [art] SIG.S = CC4D7080111E0F7BEB952D23D4B98E0A69749399C626ABEA79D677B2FDEC4EC4D697FA3B3E5C6E19B49DDDB852C71D4C
17,869,019 UART: Caliptra RT
17,869,734 UART: [state] CFI Enabled
18,159,081 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
191,978 UART:
192,340 UART: Running Caliptra ROM ...
193,521 UART:
193,669 UART: [state] CFI Enabled
264,494 UART: [state] LifecycleState = Production
266,224 UART: [state] DebugLocked = Yes
268,358 UART: [state] Starting the WD Timer 40000000 cycles
272,375 UART: [kat] SHA2-256
451,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,128 UART: [kat] ++
463,666 UART: [kat] sha1
474,353 UART: [kat] SHA2-256
477,361 UART: [kat] SHA2-384
484,489 UART: [kat] SHA2-512-ACC
487,439 UART: [kat] ECC-384
2,947,639 UART: [kat] HMAC-384Kdf
2,971,793 UART: [kat] LMS
3,501,280 UART: [kat] --
3,506,566 UART: [cold-reset] ++
3,508,706 UART: [fht] FHT @ 0x50003400
3,519,464 UART: [idev] ++
3,520,031 UART: [idev] CDI.KEYID = 6
3,520,919 UART: [idev] SUBJECT.KEYID = 7
3,522,157 UART: [idev] UDS.KEYID = 0
3,523,132 ready_for_fw is high
3,523,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,314 UART: [idev] Erasing UDS.KEYID = 0
6,027,182 UART: [idev] Sha1 KeyId Algorithm
6,049,912 UART: [idev] --
6,054,015 UART: [ldev] ++
6,054,607 UART: [ldev] CDI.KEYID = 6
6,055,489 UART: [ldev] SUBJECT.KEYID = 5
6,056,702 UART: [ldev] AUTHORITY.KEYID = 7
6,057,933 UART: [ldev] FE.KEYID = 1
6,099,604 UART: [ldev] Erasing FE.KEYID = 1
8,602,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,044 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,040 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,913 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,885 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,696 UART: [ldev] --
10,413,633 UART: [fwproc] Wait for Commands...
10,415,291 UART: [fwproc] Recv command 0x46574c44
10,417,381 UART: [fwproc] Recv'd Img size: 114360 bytes
13,852,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,993,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,310,745 >>> mbox cmd response: success
14,315,266 UART: [afmc] ++
14,315,847 UART: [afmc] CDI.KEYID = 6
14,316,730 UART: [afmc] SUBJECT.KEYID = 7
14,317,942 UART: [afmc] AUTHORITY.KEYID = 5
16,847,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,825 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,589,813 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,605,679 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,621,418 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,643,713 UART: [afmc] --
18,647,936 UART: [cold-reset] --
18,652,551 UART: [state] Locking Datavault
18,657,633 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,293 UART: [state] Locking ICCM
18,661,573 UART: [exit] Launching FMC @ 0x40000130
18,670,021 UART:
18,670,255 UART: Running Caliptra FMC ...
18,671,351 UART:
18,671,504 UART: [state] CFI Enabled
18,732,195 UART: [fht] FMC Alias Private Key: 7
20,496,443 UART: [art] Extend RT PCRs Done
20,497,662 UART: [art] Lock RT PCRs Done
20,499,358 UART: [art] Populate DV Done
20,504,815 UART: [fht] FMC Alias Private Key: 7
20,506,463 UART: [art] Derive CDI
20,507,276 UART: [art] Store in in slot 0x4
20,565,771 UART: [art] Derive Key Pair
20,566,799 UART: [art] Store priv key in slot 0x5
23,030,072 UART: [art] Derive Key Pair - Done
23,043,155 UART: [art] Signing Cert with AUTHO
23,044,466 UART: RITY.KEYID = 7
24,755,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,857 UART: [art] PUB.X = F75E76A167221AE31EA0CBC6A8B4DEBF134E015284EEE66E9F7A7720B23C4CD265CFCA709CE3C7C482AD8CE8605E03C9
24,764,164 UART: [art] PUB.Y = 8E2BDAD5526730D638D3CE3DACCC21285A5C4B7D941DBE0EBC7B0054657A74141370907DD414BDF8C951A33BD774CCF0
24,771,393 UART: [art] SIG.R = 3186D099CEEB4D5F5B0DCCFC8DCBF65CF0662F4410406C2BF721D840645EE57905288AB997BD1951FD21F25AA4082FE1
24,778,814 UART: [art] SIG.S = 3B857CA6D620DF884EF92F7034895326480610684E38FE87F5BEAF99565D0250AFB0EC391F52ABD252E64D7D0548F672
25,758,181 UART: Caliptra RT
25,758,895 UART: [state] CFI Enabled
25,924,377 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,041 UART:
1,301 UART: Running Caliptra ROM ...
2,405 UART:
2,564 UART: [state] CFI Enabled
67,697 UART: [state] LifecycleState = Production
69,422 UART: [state] DebugLocked = Yes
71,273 UART: [state] Starting the WD Timer 40000000 cycles
76,428 UART: [kat] SHA2-256
255,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
267,165 UART: [kat] ++
267,688 UART: [kat] sha1
278,568 UART: [kat] SHA2-256
281,619 UART: [kat] SHA2-384
286,943 UART: [kat] SHA2-512-ACC
289,932 UART: [kat] ECC-384
2,748,095 UART: [kat] HMAC-384Kdf
2,771,451 UART: [kat] LMS
3,300,964 UART: [kat] --
3,307,332 UART: [warm-reset] ++
3,310,835 UART: [warm-reset] --
3,314,160 UART: [state] Locking Datavault
3,316,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,536 UART: [state] Locking ICCM
3,319,881 UART: [exit] Launching FMC @ 0x40000130
3,328,277 UART:
3,328,521 UART: Running Caliptra FMC ...
3,329,624 UART:
3,329,779 UART: [state] CFI Enabled
3,380,899 UART: [aliasrt :skip pcr extension
3,382,197 UART: [art] Extend RT PCRs Done
3,383,346 UART: [art] Lock RT PCRs Done
3,384,682 UART: [art] Populate DV Done
3,389,978 UART: [fht] FMC Alias Private Key: 7
3,391,520 UART: [art] Derive CDI
3,392,331 UART: [art] Store in in slot 0x4
3,449,314 UART: [art] Derive Key Pair
3,450,356 UART: [art] Store priv key in slot 0x5
5,913,718 UART: [art] Derive Key Pair - Done
5,926,666 UART: [art] Signing Cert with AUTHO
5,927,982 UART: RITY.KEYID = 7
7,639,989 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,485 UART: [art] PUB.X = F75E76A167221AE31EA0CBC6A8B4DEBF134E015284EEE66E9F7A7720B23C4CD265CFCA709CE3C7C482AD8CE8605E03C9
7,648,778 UART: [art] PUB.Y = 8E2BDAD5526730D638D3CE3DACCC21285A5C4B7D941DBE0EBC7B0054657A74141370907DD414BDF8C951A33BD774CCF0
7,656,050 UART: [art] SIG.R = 3186D099CEEB4D5F5B0DCCFC8DCBF65CF0662F4410406C2BF721D840645EE57905288AB997BD1951FD21F25AA4082FE1
7,663,402 UART: [art] SIG.S = 3B857CA6D620DF884EF92F7034895326480610684E38FE87F5BEAF99565D0250AFB0EC391F52ABD252E64D7D0548F672
8,642,573 UART: Caliptra RT
8,643,282 UART: [state] CFI Enabled
8,978,778 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
191,931 UART:
192,303 UART: Running Caliptra ROM ...
193,445 UART:
193,588 UART: [state] CFI Enabled
266,613 UART: [state] LifecycleState = Production
268,856 UART: [state] DebugLocked = Yes
271,278 UART: [state] Starting the WD Timer 40000000 cycles
276,226 UART: [kat] SHA2-256
466,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,835 UART: [kat] ++
477,425 UART: [kat] sha1
487,699 UART: [kat] SHA2-256
490,761 UART: [kat] SHA2-384
496,900 UART: [kat] SHA2-512-ACC
499,487 UART: [kat] ECC-384
2,949,605 UART: [kat] HMAC-384Kdf
2,971,939 UART: [kat] LMS
3,503,731 UART: [kat] --
3,507,369 UART: [cold-reset] ++
3,509,366 UART: [fht] FHT @ 0x50003400
3,520,269 UART: [idev] ++
3,520,983 UART: [idev] CDI.KEYID = 6
3,521,965 UART: [idev] SUBJECT.KEYID = 7
3,523,138 UART: [idev] UDS.KEYID = 0
3,524,057 ready_for_fw is high
3,524,254 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,116 UART: [idev] Erasing UDS.KEYID = 0
6,029,237 UART: [idev] Sha1 KeyId Algorithm
6,052,684 UART: [idev] --
6,057,596 UART: [ldev] ++
6,058,274 UART: [ldev] CDI.KEYID = 6
6,059,232 UART: [ldev] SUBJECT.KEYID = 5
6,060,386 UART: [ldev] AUTHORITY.KEYID = 7
6,061,617 UART: [ldev] FE.KEYID = 1
6,102,791 UART: [ldev] Erasing FE.KEYID = 1
8,610,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,498 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,360,694 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,753 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,762 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,301 UART: [ldev] --
10,415,545 UART: [fwproc] Wait for Commands...
10,417,857 UART: [fwproc] Recv command 0x46574c44
10,419,859 UART: [fwproc] Recv'd Img size: 114360 bytes
13,899,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,981,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,097,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,640,523 >>> mbox cmd response: success
14,643,790 UART: [afmc] ++
14,644,488 UART: [afmc] CDI.KEYID = 6
14,645,726 UART: [afmc] SUBJECT.KEYID = 7
14,647,157 UART: [afmc] AUTHORITY.KEYID = 5
17,177,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,921,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,923,036 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,938,269 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,953,489 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,968,507 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,992,431 UART: [afmc] --
18,996,466 UART: [cold-reset] --
18,999,960 UART: [state] Locking Datavault
19,005,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,007,626 UART: [state] Locking ICCM
19,010,268 UART: [exit] Launching FMC @ 0x40000130
19,018,944 UART:
19,019,188 UART: Running Caliptra FMC ...
19,020,289 UART:
19,020,450 UART: [state] CFI Enabled
19,076,766 UART: [fht] FMC Alias Private Key: 7
20,841,243 UART: [art] Extend RT PCRs Done
20,842,453 UART: [art] Lock RT PCRs Done
20,844,265 UART: [art] Populate DV Done
20,849,566 UART: [fht] FMC Alias Private Key: 7
20,851,044 UART: [art] Derive CDI
20,851,783 UART: [art] Store in in slot 0x4
20,910,162 UART: [art] Derive Key Pair
20,911,224 UART: [art] Store priv key in slot 0x5
23,374,265 UART: [art] Derive Key Pair - Done
23,387,541 UART: [art] Signing Cert with AUTHO
23,388,847 UART: RITY.KEYID = 7
25,100,328 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,831 UART: [art] PUB.X = 6ECACC2263A605DCD3209A3BE54D02A8EBC0CC55A1B94C621D7F965A25686FFA7F69CFF14617034AE126CBF5C4AEE30B
25,109,133 UART: [art] PUB.Y = A7F952271C7B07FBF4628233D464B4052FC0727CA2348CF8C247B3F85834D974DE305BB036C1FB4DD349F4A17C66D069
25,116,417 UART: [art] SIG.R = 02A95767EF41529977674E57BB648CF27A6984A5646B118E30B93582000EE7C9B7F2DB734CA4C833E2FC6FDEC4A7F34B
25,123,756 UART: [art] SIG.S = DD2269534B3C4C1D6893BD0E404EC0C41648526C7041F2FAE4E714FE25290A7EFDB8DBA56A7EB4ED8842046F084FB256
26,102,943 UART: Caliptra RT
26,103,626 UART: [state] CFI Enabled
26,268,354 UART: [rt] RT listening for mailbox commands...
Initializing fuses
983 UART:
1,127 UART: Running Caliptra ROM ...
2,189 UART:
2,332 UART: [state] CFI Enabled
65,193 UART: [state] LifecycleState = Production
67,118 UART: [state] DebugLocked = Yes
69,802 UART: [state] Starting the WD Timer 40000000 cycles
74,262 UART: [kat] SHA2-256
264,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,888 UART: [kat] ++
275,388 UART: [kat] sha1
288,475 UART: [kat] SHA2-256
291,478 UART: [kat] SHA2-384
298,106 UART: [kat] SHA2-512-ACC
300,709 UART: [kat] ECC-384
2,750,469 UART: [kat] HMAC-384Kdf
2,772,787 UART: [kat] LMS
3,304,344 UART: [kat] --
3,309,558 UART: [warm-reset] ++
3,314,198 UART: [warm-reset] --
3,319,739 UART: [state] Locking Datavault
3,322,886 UART: [state] Locking PCR0, PCR1 and PCR31
3,324,585 UART: [state] Locking ICCM
3,326,574 UART: [exit] Launching FMC @ 0x40000130
3,335,250 UART:
3,335,485 UART: Running Caliptra FMC ...
3,336,586 UART:
3,336,741 UART: [state] CFI Enabled
3,381,809 UART: [aliasrt :skip pcr extension
3,383,108 UART: [art] Extend RT PCRs Done
3,384,261 UART: [art] Lock RT PCRs Done
3,385,328 UART: [art] Populate DV Done
3,391,005 UART: [fht] FMC Alias Private Key: 7
3,392,597 UART: [art] Derive CDI
3,393,427 UART: [art] Store in in slot 0x4
3,450,681 UART: [art] Derive Key Pair
3,451,726 UART: [art] Store priv key in slot 0x5
5,914,652 UART: [art] Derive Key Pair - Done
5,927,811 UART: [art] Signing Cert with AUTHO
5,929,111 UART: RITY.KEYID = 7
7,640,211 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,740 UART: [art] PUB.X = 6ECACC2263A605DCD3209A3BE54D02A8EBC0CC55A1B94C621D7F965A25686FFA7F69CFF14617034AE126CBF5C4AEE30B
7,649,014 UART: [art] PUB.Y = A7F952271C7B07FBF4628233D464B4052FC0727CA2348CF8C247B3F85834D974DE305BB036C1FB4DD349F4A17C66D069
7,656,254 UART: [art] SIG.R = 02A95767EF41529977674E57BB648CF27A6984A5646B118E30B93582000EE7C9B7F2DB734CA4C833E2FC6FDEC4A7F34B
7,663,634 UART: [art] SIG.S = DD2269534B3C4C1D6893BD0E404EC0C41648526C7041F2FAE4E714FE25290A7EFDB8DBA56A7EB4ED8842046F084FB256
8,642,811 UART: Caliptra RT
8,643,512 UART: [state] CFI Enabled
8,981,125 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,440,871 ready_for_fw is high
3,441,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,776,148 >>> mbox cmd response: success
19,069,135 UART:
19,069,557 UART: Running Caliptra FMC ...
19,070,674 UART:
19,070,825 UART: [state] CFI Enabled
19,137,983 UART: [fht] FMC Alias Private Key: 7
20,901,394 UART: [art] Extend RT PCRs Done
20,902,617 UART: [art] Lock RT PCRs Done
20,904,626 UART: [art] Populate DV Done
20,910,204 UART: [fht] FMC Alias Private Key: 7
20,911,803 UART: [art] Derive CDI
20,912,619 UART: [art] Store in in slot 0x4
20,970,501 UART: [art] Derive Key Pair
20,971,541 UART: [art] Store priv key in slot 0x5
23,434,269 UART: [art] Derive Key Pair - Done
23,447,330 UART: [art] Signing Cert with AUTHO
23,448,634 UART: RITY.KEYID = 7
25,160,423 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,933 UART: [art] PUB.X = C6E4CDC723B82FF650ADEEDCC830D17EE0967BF2759DE22FE9A35291E1B7289514F68879F24948AFBBE1524DECA34D7D
25,169,212 UART: [art] PUB.Y = DD623AF77B11F9ED842CA3781B33F4F2ED6041A00F63007FDE8C01ECC82C1652380ECBD8AC182BA04AEE525E0F61B514
25,176,459 UART: [art] SIG.R = 619D4B32B74DA29FE266CABAAC3498C87FA07BC99DE9802796833D459C5890161B484EEE6003F82794C63E095A76E9C6
25,183,865 UART: [art] SIG.S = D8F7F2F4F3FE405A50FB638B65ACF0BC252FCA6B0FCF39D9C1727F5E8225B6EE981824ECA11118F387CE0A9452110F33
26,163,710 UART: Caliptra RT
26,164,422 UART: [state] CFI Enabled
26,328,893 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,246,322 UART:
3,246,661 UART: Running Caliptra FMC ...
3,247,748 UART:
3,247,904 UART: [state] CFI Enabled
3,297,366 UART: [aliasrt :skip pcr extension
3,298,624 UART: [art] Extend RT PCRs Done
3,299,771 UART: [art] Lock RT PCRs Done
3,300,969 UART: [art] Populate DV Done
3,306,701 UART: [fht] FMC Alias Private Key: 7
3,308,185 UART: [art] Derive CDI
3,308,951 UART: [art] Store in in slot 0x4
3,366,066 UART: [art] Derive Key Pair
3,367,114 UART: [art] Store priv key in slot 0x5
5,829,470 UART: [art] Derive Key Pair - Done
5,842,487 UART: [art] Signing Cert with AUTHO
5,843,798 UART: RITY.KEYID = 7
7,555,346 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,864 UART: [art] PUB.X = C6E4CDC723B82FF650ADEEDCC830D17EE0967BF2759DE22FE9A35291E1B7289514F68879F24948AFBBE1524DECA34D7D
7,564,133 UART: [art] PUB.Y = DD623AF77B11F9ED842CA3781B33F4F2ED6041A00F63007FDE8C01ECC82C1652380ECBD8AC182BA04AEE525E0F61B514
7,571,378 UART: [art] SIG.R = 619D4B32B74DA29FE266CABAAC3498C87FA07BC99DE9802796833D459C5890161B484EEE6003F82794C63E095A76E9C6
7,578,778 UART: [art] SIG.S = D8F7F2F4F3FE405A50FB638B65ACF0BC252FCA6B0FCF39D9C1727F5E8225B6EE981824ECA11118F387CE0A9452110F33
8,557,571 UART: Caliptra RT
8,558,293 UART: [state] CFI Enabled
8,895,811 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
192,267 UART:
192,631 UART: Running Caliptra ROM ...
193,817 UART:
603,533 UART: [state] CFI Enabled
619,501 UART: [state] LifecycleState = Production
621,727 UART: [state] DebugLocked = Yes
623,868 UART: [state] Starting the WD Timer 40000000 cycles
628,975 UART: [kat] SHA2-256
818,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,700 UART: [kat] ++
830,303 UART: [kat] sha1
841,768 UART: [kat] SHA2-256
844,852 UART: [kat] SHA2-384
850,198 UART: [kat] SHA2-512-ACC
852,769 UART: [kat] ECC-384
3,296,336 UART: [kat] HMAC-384Kdf
3,309,433 UART: [kat] LMS
3,841,286 UART: [kat] --
3,845,844 UART: [cold-reset] ++
3,847,696 UART: [fht] FHT @ 0x50003400
3,859,734 UART: [idev] ++
3,860,440 UART: [idev] CDI.KEYID = 6
3,861,466 UART: [idev] SUBJECT.KEYID = 7
3,862,584 UART: [idev] UDS.KEYID = 0
3,863,508 ready_for_fw is high
3,863,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,328 UART: [idev] Erasing UDS.KEYID = 0
6,338,584 UART: [idev] Sha1 KeyId Algorithm
6,360,636 UART: [idev] --
6,366,625 UART: [ldev] ++
6,367,298 UART: [ldev] CDI.KEYID = 6
6,368,229 UART: [ldev] SUBJECT.KEYID = 5
6,369,435 UART: [ldev] AUTHORITY.KEYID = 7
6,370,607 UART: [ldev] FE.KEYID = 1
6,382,556 UART: [ldev] Erasing FE.KEYID = 1
8,853,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,017 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,585,202 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,600,262 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,615,307 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,636,466 UART: [ldev] --
10,642,486 UART: [fwproc] Wait for Commands...
10,643,929 UART: [fwproc] Recv command 0x46574c44
10,646,234 UART: [fwproc] Recv'd Img size: 114360 bytes
14,132,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,215,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,331,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,873,505 >>> mbox cmd response: success
14,877,200 UART: [afmc] ++
14,877,906 UART: [afmc] CDI.KEYID = 6
14,879,090 UART: [afmc] SUBJECT.KEYID = 7
14,880,577 UART: [afmc] AUTHORITY.KEYID = 5
17,387,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,111,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,113,020 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
19,128,232 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
19,143,458 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
19,158,399 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
19,183,119 UART: [afmc] --
19,186,523 UART: [cold-reset] --
19,192,119 UART: [state] Locking Datavault
19,198,338 UART: [state] Locking PCR0, PCR1 and PCR31
19,200,524 UART: [state] Locking ICCM
19,203,375 UART: [exit] Launching FMC @ 0x40000130
19,212,049 UART:
19,212,288 UART: Running Caliptra FMC ...
19,213,390 UART:
19,213,546 UART: [state] CFI Enabled
19,221,592 UART: [fht] FMC Alias Private Key: 7
20,978,680 UART: [art] Extend RT PCRs Done
20,979,883 UART: [art] Lock RT PCRs Done
20,982,008 UART: [art] Populate DV Done
20,987,263 UART: [fht] FMC Alias Private Key: 7
20,988,909 UART: [art] Derive CDI
20,989,644 UART: [art] Store in in slot 0x4
21,032,185 UART: [art] Derive Key Pair
21,033,223 UART: [art] Store priv key in slot 0x5
23,459,642 UART: [art] Derive Key Pair - Done
23,472,648 UART: [art] Signing Cert with AUTHO
23,473,944 UART: RITY.KEYID = 7
25,179,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,984 UART: [art] PUB.X = 878B5EF18161ACC213B40301B449EC139C8585D8862B8DDD209EE71163774491EDE54B01B0C2AE963DAF0B1C3B0EFB3C
25,188,228 UART: [art] PUB.Y = C586C03793DEE4E7DF958644C346265ACCD52EA80E44359427A3DC977969BFFEA233B3E7FCCEF1CF49E37CB923B35B74
25,195,516 UART: [art] SIG.R = 82E09BB96307111C0042AB02135D4850DA41BBBBB2E2243B8890788B7F777D71CE3E08658D40E001342B3B3770982DBB
25,202,861 UART: [art] SIG.S = 3B5E6B227914760F5059D9EC9085FA674235AE6787A876BF57937074D676D01BE6F3F55A3FF6577CD130F59E08ECC201
26,181,820 UART: Caliptra RT
26,182,524 UART: [state] CFI Enabled
26,299,178 UART: [rt] RT listening for mailbox commands...
Initializing fuses
989 UART:
1,135 UART: Running Caliptra ROM ...
2,150 UART:
14,230,113 UART: [state] CFI Enabled
14,245,818 UART: [state] LifecycleState = Production
14,247,599 UART: [state] DebugLocked = Yes
14,249,837 UART: [state] Starting the WD Timer 40000000 cycles
14,254,841 UART: [kat] SHA2-256
14,444,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,455,604 UART: [kat] ++
14,456,196 UART: [kat] sha1
14,466,925 UART: [kat] SHA2-256
14,469,939 UART: [kat] SHA2-384
14,476,141 UART: [kat] SHA2-512-ACC
14,478,708 UART: [kat] ECC-384
16,922,930 UART: [kat] HMAC-384Kdf
16,936,042 UART: [kat] LMS
17,467,651 UART: [kat] --
17,472,069 UART: [warm-reset] ++
17,477,886 UART: [warm-reset] --
17,482,177 UART: [state] Locking Datavault
17,486,461 UART: [state] Locking PCR0, PCR1 and PCR31
17,488,158 UART: [state] Locking ICCM
17,489,878 UART: [exit] Launching FMC @ 0x40000130
17,498,546 UART:
17,498,777 UART: Running Caliptra FMC ...
17,499,877 UART:
17,500,034 UART: [state] CFI Enabled
17,501,873 UART: [aliasrt :skip pcr extension
17,503,119 UART: [art] Extend RT PCRs Done
17,504,271 UART: [art] Lock RT PCRs Done
17,505,333 UART: [art] Populate DV Done
17,510,574 UART: [fht] FMC Alias Private Key: 7
17,512,107 UART: [art] Derive CDI
17,513,118 UART: [art] Store in in slot 0x4
17,555,725 UART: [art] Derive Key Pair
17,556,724 UART: [art] Store priv key in slot 0x5
19,983,506 UART: [art] Derive Key Pair - Done
19,996,595 UART: [art] Signing Cert with AUTHO
19,997,923 UART: RITY.KEYID = 7
21,703,558 UART: [art] Erasing AUTHORITY.KEYID = 7
21,705,045 UART: [art] PUB.X = 878B5EF18161ACC213B40301B449EC139C8585D8862B8DDD209EE71163774491EDE54B01B0C2AE963DAF0B1C3B0EFB3C
21,712,295 UART: [art] PUB.Y = C586C03793DEE4E7DF958644C346265ACCD52EA80E44359427A3DC977969BFFEA233B3E7FCCEF1CF49E37CB923B35B74
21,719,598 UART: [art] SIG.R = 82E09BB96307111C0042AB02135D4850DA41BBBBB2E2243B8890788B7F777D71CE3E08658D40E001342B3B3770982DBB
21,726,943 UART: [art] SIG.S = 3B5E6B227914760F5059D9EC9085FA674235AE6787A876BF57937074D676D01BE6F3F55A3FF6577CD130F59E08ECC201
22,706,081 UART: Caliptra RT
22,706,817 UART: [state] CFI Enabled
22,997,394 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,634 writing to cptra_bootfsm_go
3,758,253 ready_for_fw is high
3,758,872 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,001,118 >>> mbox cmd response: success
19,257,407 UART:
19,257,824 UART: Running Caliptra FMC ...
19,258,947 UART:
19,259,130 UART: [state] CFI Enabled
19,267,055 UART: [fht] FMC Alias Private Key: 7
21,024,288 UART: [art] Extend RT PCRs Done
21,025,527 UART: [art] Lock RT PCRs Done
21,026,899 UART: [art] Populate DV Done
21,032,218 UART: [fht] FMC Alias Private Key: 7
21,033,763 UART: [art] Derive CDI
21,034,581 UART: [art] Store in in slot 0x4
21,077,408 UART: [art] Derive Key Pair
21,078,449 UART: [art] Store priv key in slot 0x5
23,504,742 UART: [art] Derive Key Pair - Done
23,517,576 UART: [art] Signing Cert with AUTHO
23,518,889 UART: RITY.KEYID = 7
25,224,369 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,881 UART: [art] PUB.X = 38B1010035AC93A59678BA1FD0D1904615C75E59E51551F298B0E319FA895E330C2F855AD871D44F4B05C65D7B5C86C2
25,233,164 UART: [art] PUB.Y = 973158E87EB01B3840B3900865DADC55A051C832655056DEEB9623AE2D4F0711D673F7F214494F88069DB41C71A8D367
25,240,388 UART: [art] SIG.R = 2011779DBD01D396345AB4557AD83FFBD9EF5B47E84795F1F92CD32324039DCFA7DD1099A9401E7EAD4B729839DB7835
25,247,736 UART: [art] SIG.S = 629F94C5BECB3363E913A7D24A079A4292ADD26C960F83BF48A98677617C9B482FA03891D1C9BF4569503D5F388C156F
26,226,648 UART: Caliptra RT
26,227,340 UART: [state] CFI Enabled
26,345,377 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,349,857 UART:
17,350,228 UART: Running Caliptra FMC ...
17,351,275 UART:
17,351,426 UART: [state] CFI Enabled
17,353,188 UART: [aliasrt :skip pcr extension
17,354,445 UART: [art] Extend RT PCRs Done
17,355,504 UART: [art] Lock RT PCRs Done
17,356,941 UART: [art] Populate DV Done
17,362,251 UART: [fht] FMC Alias Private Key: 7
17,363,786 UART: [art] Derive CDI
17,364,754 UART: [art] Store in in slot 0x4
17,406,728 UART: [art] Derive Key Pair
17,407,737 UART: [art] Store priv key in slot 0x5
19,833,958 UART: [art] Derive Key Pair - Done
19,846,517 UART: [art] Signing Cert with AUTHO
19,847,857 UART: RITY.KEYID = 7
21,553,111 UART: [art] Erasing AUTHORITY.KEYID = 7
21,554,617 UART: [art] PUB.X = 38B1010035AC93A59678BA1FD0D1904615C75E59E51551F298B0E319FA895E330C2F855AD871D44F4B05C65D7B5C86C2
21,561,870 UART: [art] PUB.Y = 973158E87EB01B3840B3900865DADC55A051C832655056DEEB9623AE2D4F0711D673F7F214494F88069DB41C71A8D367
21,569,104 UART: [art] SIG.R = 2011779DBD01D396345AB4557AD83FFBD9EF5B47E84795F1F92CD32324039DCFA7DD1099A9401E7EAD4B729839DB7835
21,576,498 UART: [art] SIG.S = 629F94C5BECB3363E913A7D24A079A4292ADD26C960F83BF48A98677617C9B482FA03891D1C9BF4569503D5F388C156F
22,555,428 UART: Caliptra RT
22,556,129 UART: [state] CFI Enabled
22,844,514 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Production
85,895 UART: [state] DebugLocked = Yes
86,637 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,303 UART: [kat] SHA2-256
882,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,349 UART: [kat] ++
886,501 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,356 UART: [kat] LMS
1,475,552 UART: [kat] --
1,476,481 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,691 UART: [idev] ++
1,479,859 UART: [idev] CDI.KEYID = 6
1,480,219 UART: [idev] SUBJECT.KEYID = 7
1,480,643 UART: [idev] UDS.KEYID = 0
1,480,988 ready_for_fw is high
1,480,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,516 UART: [idev] Erasing UDS.KEYID = 0
1,505,061 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,680 UART: [idev] --
1,514,577 UART: [ldev] ++
1,514,745 UART: [ldev] CDI.KEYID = 6
1,515,108 UART: [ldev] SUBJECT.KEYID = 5
1,515,534 UART: [ldev] AUTHORITY.KEYID = 7
1,515,997 UART: [ldev] FE.KEYID = 1
1,521,063 UART: [ldev] Erasing FE.KEYID = 1
1,545,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,607 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,301 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,173 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,879 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,945 UART: [ldev] --
1,585,360 UART: [fwproc] Waiting for Commands...
1,586,181 UART: [fwproc] Received command 0x46574c44
1,586,972 UART: [fwproc] Received Image of size 114360 bytes
2,910,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,142 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,966,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,102,492 >>> mbox cmd response: success
3,103,635 UART: [afmc] ++
3,103,803 UART: [afmc] CDI.KEYID = 6
3,104,165 UART: [afmc] SUBJECT.KEYID = 7
3,104,590 UART: [afmc] AUTHORITY.KEYID = 5
3,139,645 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,155,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,156,541 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,162,259 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,168,154 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,173,865 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,181,723 UART: [afmc] --
3,182,614 UART: [cold-reset] --
3,183,432 UART: [state] Locking Datavault
3,184,383 UART: [state] Locking PCR0, PCR1 and PCR31
3,184,987 UART: [state] Locking ICCM
3,185,511 UART: [exit] Launching FMC @ 0x40000130
3,190,840 UART:
3,190,856 UART: Running Caliptra FMC ...
3,191,264 UART:
3,191,318 UART: [state] CFI Enabled
3,201,941 UART: [fht] FMC Alias Private Key: 7
3,309,760 UART: [art] Extend RT PCRs Done
3,310,188 UART: [art] Lock RT PCRs Done
3,311,808 UART: [art] Populate DV Done
3,320,200 UART: [fht] FMC Alias Private Key: 7
3,321,236 UART: [art] Derive CDI
3,321,516 UART: [art] Store in in slot 0x4
3,407,501 UART: [art] Derive Key Pair
3,407,861 UART: [art] Store priv key in slot 0x5
3,420,847 UART: [art] Derive Key Pair - Done
3,435,561 UART: [art] Signing Cert with AUTHO
3,436,041 UART: RITY.KEYID = 7
3,451,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,451,822 UART: [art] PUB.X = 115FF71AB9F0267F04480204ED27AEF5338942AD3511A91CE014E8373B5089D3413104D4FEC6386EB93F23C1029C0D59
3,458,570 UART: [art] PUB.Y = 9A005F53B3093EFCDACBCCD2570A9D80127EF87AF3EC5B064CF8565D4577289D77DB6818A38BF22D9B64D948B9DC31B5
3,465,503 UART: [art] SIG.R = F5E7B23BB0211BAB9656814FFF487949D318E3963AE585336B14D23EF50D39C03C6F16D68C746BAD891BF0EF9DDD5076
3,472,278 UART: [art] SIG.S = D4FF1AFBC59B920FBA796D5B0EE88C421A5AE95910D6116B75B1BBCDCE201791DEBF16F09DD3527F3FB869CBD19C397B
3,495,693 UART: Caliptra RT
3,495,947 UART: [state] CFI Enabled
3,603,490 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,604,249 UART:
3,604,265 UART: Running Caliptra ROM ...
3,604,673 UART:
3,604,727 UART: [state] CFI Enabled
3,607,564 UART: [state] LifecycleState = Production
3,608,172 UART: [state] DebugLocked = Yes
3,608,872 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,610,648 UART: [kat] SHA2-256
4,404,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,408,694 UART: [kat] ++
4,408,846 UART: [kat] sha1
4,413,166 UART: [kat] SHA2-256
4,415,104 UART: [kat] SHA2-384
4,417,835 UART: [kat] SHA2-512-ACC
4,419,736 UART: [kat] ECC-384
4,425,237 UART: [kat] HMAC-384Kdf
4,429,855 UART: [kat] LMS
4,998,051 UART: [kat] --
4,998,823 UART: [warm-reset] ++
4,999,636 UART: [warm-reset] --
5,000,363 UART: [state] Locking Datavault
5,001,061 UART: [state] Locking PCR0, PCR1 and PCR31
5,001,665 UART: [state] Locking ICCM
5,002,321 UART: [exit] Launching FMC @ 0x40000130
5,007,650 UART:
5,007,666 UART: Running Caliptra FMC ...
5,008,074 UART:
5,008,128 UART: [state] CFI Enabled
5,009,257 UART: [aliasrt :skip pcr extension
5,009,730 UART: [art] Extend RT PCRs Done
5,010,158 UART: [art] Lock RT PCRs Done
5,011,489 UART: [art] Populate DV Done
5,019,705 UART: [fht] FMC Alias Private Key: 7
5,020,801 UART: [art] Derive CDI
5,021,081 UART: [art] Store in in slot 0x4
5,106,728 UART: [art] Derive Key Pair
5,107,088 UART: [art] Store priv key in slot 0x5
5,120,504 UART: [art] Derive Key Pair - Done
5,135,336 UART: [art] Signing Cert with AUTHO
5,135,816 UART: RITY.KEYID = 7
5,151,352 UART: [art] Erasing AUTHORITY.KEYID = 7
5,152,117 UART: [art] PUB.X = 115FF71AB9F0267F04480204ED27AEF5338942AD3511A91CE014E8373B5089D3413104D4FEC6386EB93F23C1029C0D59
5,158,865 UART: [art] PUB.Y = 9A005F53B3093EFCDACBCCD2570A9D80127EF87AF3EC5B064CF8565D4577289D77DB6818A38BF22D9B64D948B9DC31B5
5,165,798 UART: [art] SIG.R = F5E7B23BB0211BAB9656814FFF487949D318E3963AE585336B14D23EF50D39C03C6F16D68C746BAD891BF0EF9DDD5076
5,172,573 UART: [art] SIG.S = D4FF1AFBC59B920FBA796D5B0EE88C421A5AE95910D6116B75B1BBCDCE201791DEBF16F09DD3527F3FB869CBD19C397B
5,195,972 UART: Caliptra RT
5,196,226 UART: [state] CFI Enabled
5,479,654 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,318 ready_for_fw is high
1,363,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,955,036 >>> mbox cmd response: success
3,015,901 UART:
3,015,917 UART: Running Caliptra FMC ...
3,016,325 UART:
3,016,379 UART: [state] CFI Enabled
3,026,690 UART: [fht] FMC Alias Private Key: 7
3,134,275 UART: [art] Extend RT PCRs Done
3,134,703 UART: [art] Lock RT PCRs Done
3,136,531 UART: [art] Populate DV Done
3,144,513 UART: [fht] FMC Alias Private Key: 7
3,145,609 UART: [art] Derive CDI
3,145,889 UART: [art] Store in in slot 0x4
3,231,368 UART: [art] Derive Key Pair
3,231,728 UART: [art] Store priv key in slot 0x5
3,244,800 UART: [art] Derive Key Pair - Done
3,259,336 UART: [art] Signing Cert with AUTHO
3,259,816 UART: RITY.KEYID = 7
3,275,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,275,833 UART: [art] PUB.X = 41598E80F048B7D96D2AB65D05CC97CFFF8A7986DE94BE485E831428DD57A2BDF6BFD9C16859412762D203A459E24CD6
3,282,605 UART: [art] PUB.Y = 758BECD125F4D64CDFFCADDDEA57EB25D366E413A4D82A425621A0B14FD07F0690BB0CE56E61F670A8472256C0AFE734
3,289,567 UART: [art] SIG.R = 37867E268C05E503633E70D8C200903E3E6B9944983C7718218A1E479C6074AFDF4E1031D44D855641F7FB71B5D61DB7
3,296,301 UART: [art] SIG.S = 709B5E5039B38D5689DFDAAB22167D99576914AB427C2A59BA0E7562F1D9498B6EAE792BA919E912403963DA2C6D5247
3,319,321 UART: Caliptra RT
3,319,575 UART: [state] CFI Enabled
3,428,000 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,713,334 UART:
4,713,350 UART: Running Caliptra FMC ...
4,713,758 UART:
4,713,812 UART: [state] CFI Enabled
4,714,975 UART: [aliasrt :skip pcr extension
4,715,448 UART: [art] Extend RT PCRs Done
4,715,876 UART: [art] Lock RT PCRs Done
4,717,349 UART: [art] Populate DV Done
4,725,633 UART: [fht] FMC Alias Private Key: 7
4,726,757 UART: [art] Derive CDI
4,727,037 UART: [art] Store in in slot 0x4
4,812,760 UART: [art] Derive Key Pair
4,813,120 UART: [art] Store priv key in slot 0x5
4,826,058 UART: [art] Derive Key Pair - Done
4,840,916 UART: [art] Signing Cert with AUTHO
4,841,396 UART: RITY.KEYID = 7
4,856,778 UART: [art] Erasing AUTHORITY.KEYID = 7
4,857,543 UART: [art] PUB.X = 41598E80F048B7D96D2AB65D05CC97CFFF8A7986DE94BE485E831428DD57A2BDF6BFD9C16859412762D203A459E24CD6
4,864,315 UART: [art] PUB.Y = 758BECD125F4D64CDFFCADDDEA57EB25D366E413A4D82A425621A0B14FD07F0690BB0CE56E61F670A8472256C0AFE734
4,871,277 UART: [art] SIG.R = 37867E268C05E503633E70D8C200903E3E6B9944983C7718218A1E479C6074AFDF4E1031D44D855641F7FB71B5D61DB7
4,878,011 UART: [art] SIG.S = 709B5E5039B38D5689DFDAAB22167D99576914AB427C2A59BA0E7562F1D9498B6EAE792BA919E912403963DA2C6D5247
4,901,391 UART: Caliptra RT
4,901,645 UART: [state] CFI Enabled
5,187,315 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Production
85,970 UART: [state] DebugLocked = Yes
86,606 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,188 UART: [kat] SHA2-256
882,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,234 UART: [kat] ++
886,386 UART: [kat] sha1
890,636 UART: [kat] SHA2-256
892,574 UART: [kat] SHA2-384
895,449 UART: [kat] SHA2-512-ACC
897,350 UART: [kat] ECC-384
903,003 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,201 UART: [fht] Storing FHT @ 0x50003400
1,479,814 UART: [idev] ++
1,479,982 UART: [idev] CDI.KEYID = 6
1,480,342 UART: [idev] SUBJECT.KEYID = 7
1,480,766 UART: [idev] UDS.KEYID = 0
1,481,111 ready_for_fw is high
1,481,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,431 UART: [idev] Erasing UDS.KEYID = 0
1,505,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,985 UART: [idev] --
1,515,054 UART: [ldev] ++
1,515,222 UART: [ldev] CDI.KEYID = 6
1,515,585 UART: [ldev] SUBJECT.KEYID = 5
1,516,011 UART: [ldev] AUTHORITY.KEYID = 7
1,516,474 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,547,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,356 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,050 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,922 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,628 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,904 UART: [ldev] --
1,587,375 UART: [fwproc] Waiting for Commands...
1,588,244 UART: [fwproc] Received command 0x46574c44
1,589,035 UART: [fwproc] Received Image of size 114360 bytes
2,912,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,969,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,105,035 >>> mbox cmd response: success
3,106,262 UART: [afmc] ++
3,106,430 UART: [afmc] CDI.KEYID = 6
3,106,792 UART: [afmc] SUBJECT.KEYID = 7
3,107,217 UART: [afmc] AUTHORITY.KEYID = 5
3,142,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,158,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,159,526 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,165,244 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,171,139 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,176,850 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,184,848 UART: [afmc] --
3,185,867 UART: [cold-reset] --
3,186,819 UART: [state] Locking Datavault
3,187,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,188,478 UART: [state] Locking ICCM
3,188,940 UART: [exit] Launching FMC @ 0x40000130
3,194,269 UART:
3,194,285 UART: Running Caliptra FMC ...
3,194,693 UART:
3,194,836 UART: [state] CFI Enabled
3,205,407 UART: [fht] FMC Alias Private Key: 7
3,313,352 UART: [art] Extend RT PCRs Done
3,313,780 UART: [art] Lock RT PCRs Done
3,315,024 UART: [art] Populate DV Done
3,323,168 UART: [fht] FMC Alias Private Key: 7
3,324,144 UART: [art] Derive CDI
3,324,424 UART: [art] Store in in slot 0x4
3,410,265 UART: [art] Derive Key Pair
3,410,625 UART: [art] Store priv key in slot 0x5
3,423,897 UART: [art] Derive Key Pair - Done
3,438,581 UART: [art] Signing Cert with AUTHO
3,439,061 UART: RITY.KEYID = 7
3,454,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,454,942 UART: [art] PUB.X = E2D1897D2595A25C3644BCDDB8355DD89BF213C5AF615E023F1778B136AEF74323B6A2BB8FCB80E1A9D3D67FD4ED2510
3,461,723 UART: [art] PUB.Y = 1FB912046790FCBE116AAFF3786769C3CA4F6B72EB2DDFA88851E9F441767C742D569A8C8F0374C735D05A53C1D05257
3,468,671 UART: [art] SIG.R = 2F284CCC035F04A6295C1F0C4E3CE9D79A07CD5EA0C016CB4B41397BC300E7087B36C6A3F28A7F59314B5CC562FF29A7
3,475,416 UART: [art] SIG.S = 9E96D0CE8E6C2C314C6EE35F65144C3DB2939B9C046BDEDF3ED72E55A56D6BB4D496EA187F2C9D9889F66F2D329CEBED
3,499,062 UART: Caliptra RT
3,499,408 UART: [state] CFI Enabled
3,608,038 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,608,797 UART:
3,608,813 UART: Running Caliptra ROM ...
3,609,221 UART:
3,609,362 UART: [state] CFI Enabled
3,612,099 UART: [state] LifecycleState = Production
3,612,707 UART: [state] DebugLocked = Yes
3,613,323 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,615,083 UART: [kat] SHA2-256
4,409,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,413,129 UART: [kat] ++
4,413,281 UART: [kat] sha1
4,417,431 UART: [kat] SHA2-256
4,419,369 UART: [kat] SHA2-384
4,422,200 UART: [kat] SHA2-512-ACC
4,424,101 UART: [kat] ECC-384
4,429,994 UART: [kat] HMAC-384Kdf
4,434,558 UART: [kat] LMS
5,002,754 UART: [kat] --
5,003,760 UART: [warm-reset] ++
5,004,689 UART: [warm-reset] --
5,005,696 UART: [state] Locking Datavault
5,006,468 UART: [state] Locking PCR0, PCR1 and PCR31
5,007,072 UART: [state] Locking ICCM
5,007,644 UART: [exit] Launching FMC @ 0x40000130
5,012,973 UART:
5,012,989 UART: Running Caliptra FMC ...
5,013,397 UART:
5,013,540 UART: [state] CFI Enabled
5,014,765 UART: [aliasrt :skip pcr extension
5,015,238 UART: [art] Extend RT PCRs Done
5,015,666 UART: [art] Lock RT PCRs Done
5,016,943 UART: [art] Populate DV Done
5,025,247 UART: [fht] FMC Alias Private Key: 7
5,026,255 UART: [art] Derive CDI
5,026,535 UART: [art] Store in in slot 0x4
5,112,244 UART: [art] Derive Key Pair
5,112,604 UART: [art] Store priv key in slot 0x5
5,125,658 UART: [art] Derive Key Pair - Done
5,140,290 UART: [art] Signing Cert with AUTHO
5,140,770 UART: RITY.KEYID = 7
5,155,494 UART: [art] Erasing AUTHORITY.KEYID = 7
5,156,259 UART: [art] PUB.X = E2D1897D2595A25C3644BCDDB8355DD89BF213C5AF615E023F1778B136AEF74323B6A2BB8FCB80E1A9D3D67FD4ED2510
5,163,040 UART: [art] PUB.Y = 1FB912046790FCBE116AAFF3786769C3CA4F6B72EB2DDFA88851E9F441767C742D569A8C8F0374C735D05A53C1D05257
5,169,988 UART: [art] SIG.R = 2F284CCC035F04A6295C1F0C4E3CE9D79A07CD5EA0C016CB4B41397BC300E7087B36C6A3F28A7F59314B5CC562FF29A7
5,176,733 UART: [art] SIG.S = 9E96D0CE8E6C2C314C6EE35F65144C3DB2939B9C046BDEDF3ED72E55A56D6BB4D496EA187F2C9D9889F66F2D329CEBED
5,200,905 UART: Caliptra RT
5,201,251 UART: [state] CFI Enabled
5,483,922 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,319 ready_for_fw is high
1,363,319 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,954,807 >>> mbox cmd response: success
3,016,746 UART:
3,016,762 UART: Running Caliptra FMC ...
3,017,170 UART:
3,017,313 UART: [state] CFI Enabled
3,027,946 UART: [fht] FMC Alias Private Key: 7
3,136,157 UART: [art] Extend RT PCRs Done
3,136,585 UART: [art] Lock RT PCRs Done
3,138,217 UART: [art] Populate DV Done
3,146,489 UART: [fht] FMC Alias Private Key: 7
3,147,643 UART: [art] Derive CDI
3,147,923 UART: [art] Store in in slot 0x4
3,233,312 UART: [art] Derive Key Pair
3,233,672 UART: [art] Store priv key in slot 0x5
3,247,088 UART: [art] Derive Key Pair - Done
3,261,797 UART: [art] Signing Cert with AUTHO
3,262,277 UART: RITY.KEYID = 7
3,277,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,382 UART: [art] PUB.X = 0A774B602303827E3CAC1CDAE10B9D6AFCFE9066D18BA57E71914A4020AC3AD855937F34A56F67AF3A70716ADD87DABC
3,285,159 UART: [art] PUB.Y = 8A497EA7FC1FE239D8796E64917EAC75B0332E0C43BDE3DB57FFB31CEC99895AFE6EB75620787E378BC08FE6705C8714
3,292,118 UART: [art] SIG.R = 333B5A4E91E4020FB2D9D65FE8611504DC8F55175F9CC9DF547EC3F1901A319B2B7471DC6CA9A0C74C46E0C548F20A89
3,298,884 UART: [art] SIG.S = 86B55B9022D22D43717452001DCD19C0713F8842B60A26F6FECD11CB254CCE353CFDD4573BF0F61230D3A182ABBA6D40
3,322,356 UART: Caliptra RT
3,322,702 UART: [state] CFI Enabled
3,430,778 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,715,741 UART:
4,715,757 UART: Running Caliptra FMC ...
4,716,165 UART:
4,716,308 UART: [state] CFI Enabled
4,717,679 UART: [aliasrt :skip pcr extension
4,718,152 UART: [art] Extend RT PCRs Done
4,718,580 UART: [art] Lock RT PCRs Done
4,719,631 UART: [art] Populate DV Done
4,727,973 UART: [fht] FMC Alias Private Key: 7
4,729,059 UART: [art] Derive CDI
4,729,339 UART: [art] Store in in slot 0x4
4,815,284 UART: [art] Derive Key Pair
4,815,644 UART: [art] Store priv key in slot 0x5
4,829,614 UART: [art] Derive Key Pair - Done
4,844,627 UART: [art] Signing Cert with AUTHO
4,845,107 UART: RITY.KEYID = 7
4,860,037 UART: [art] Erasing AUTHORITY.KEYID = 7
4,860,802 UART: [art] PUB.X = 0A774B602303827E3CAC1CDAE10B9D6AFCFE9066D18BA57E71914A4020AC3AD855937F34A56F67AF3A70716ADD87DABC
4,867,579 UART: [art] PUB.Y = 8A497EA7FC1FE239D8796E64917EAC75B0332E0C43BDE3DB57FFB31CEC99895AFE6EB75620787E378BC08FE6705C8714
4,874,538 UART: [art] SIG.R = 333B5A4E91E4020FB2D9D65FE8611504DC8F55175F9CC9DF547EC3F1901A319B2B7471DC6CA9A0C74C46E0C548F20A89
4,881,304 UART: [art] SIG.S = 86B55B9022D22D43717452001DCD19C0713F8842B60A26F6FECD11CB254CCE353CFDD4573BF0F61230D3A182ABBA6D40
4,905,088 UART: Caliptra RT
4,905,434 UART: [state] CFI Enabled
5,182,359 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Production
85,813 UART: [state] DebugLocked = Yes
86,417 UART: [state] Starting the WD Timer 40000000 cycles
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
902,145 UART: [kat] SHA2-256
904,085 UART: [kat] SHA2-384
906,908 UART: [kat] SHA2-512-ACC
908,809 UART: [kat] ECC-384
919,074 UART: [kat] HMAC-384Kdf
923,494 UART: [kat] LMS
1,171,822 UART: [kat] --
1,172,543 UART: [cold-reset] ++
1,173,022 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 ready_for_fw is high
1,176,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,668 UART: [idev] Erasing UDS.KEYID = 0
1,201,828 UART: [idev] Sha1 KeyId Algorithm
1,210,233 UART: [idev] --
1,211,187 UART: [ldev] ++
1,211,355 UART: [ldev] CDI.KEYID = 6
1,211,718 UART: [ldev] SUBJECT.KEYID = 5
1,212,144 UART: [ldev] AUTHORITY.KEYID = 7
1,212,607 UART: [ldev] FE.KEYID = 1
1,217,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,825 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,519 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,391 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,097 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,298 UART: [ldev] --
1,282,783 UART: [fwproc] Wait for Commands...
1,283,531 UART: [fwproc] Recv command 0x46574c44
1,284,259 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,799,829 >>> mbox cmd response: success
2,801,012 UART: [afmc] ++
2,801,180 UART: [afmc] CDI.KEYID = 6
2,801,542 UART: [afmc] SUBJECT.KEYID = 7
2,801,967 UART: [afmc] AUTHORITY.KEYID = 5
2,836,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,853,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,857 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,575 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,865,470 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,871,177 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,929 UART: [afmc] --
2,879,980 UART: [cold-reset] --
2,880,946 UART: [state] Locking Datavault
2,882,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,882,865 UART: [state] Locking ICCM
2,883,301 UART: [exit] Launching FMC @ 0x40000130
2,888,630 UART:
2,888,646 UART: Running Caliptra FMC ...
2,889,054 UART:
2,889,108 UART: [state] CFI Enabled
2,899,349 UART: [fht] FMC Alias Private Key: 7
3,007,258 UART: [art] Extend RT PCRs Done
3,007,686 UART: [art] Lock RT PCRs Done
3,009,232 UART: [art] Populate DV Done
3,017,210 UART: [fht] FMC Alias Private Key: 7
3,018,306 UART: [art] Derive CDI
3,018,586 UART: [art] Store in in slot 0x4
3,104,183 UART: [art] Derive Key Pair
3,104,543 UART: [art] Store priv key in slot 0x5
3,117,741 UART: [art] Derive Key Pair - Done
3,132,333 UART: [art] Signing Cert with AUTHO
3,132,813 UART: RITY.KEYID = 7
3,147,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,528 UART: [art] PUB.X = 8D68649450AADBBD9A1CB9C99D5D75B36C07671A4004D85A0EA331FF60C4C37A54CD646688316D13B32430E19A0BD2DE
3,155,294 UART: [art] PUB.Y = 038DED8ADE94FEBC3CC7688CC7DD54286635B74DD30A77F3B7AE5AE0DEB9541F9A6DAF16694A401278F97E4C69DCC694
3,162,258 UART: [art] SIG.R = 20EDCE256167505AC75003E13002F5530633A9B446346C0842A3DB89786DFC26C9E23C6245647F3B64374F1B0459CDAC
3,169,007 UART: [art] SIG.S = 584A3422D65FAE404ECF7464F9209CD56F6D080B1F34EEF5D00E302F8F62B3480AC9CF0AB0C6495132FF2B35CE3871F6
3,192,317 UART: Caliptra RT
3,192,571 UART: [state] CFI Enabled
3,299,350 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,106 UART:
3,300,122 UART: Running Caliptra ROM ...
3,300,530 UART:
3,300,585 UART: [state] CFI Enabled
3,303,088 UART: [state] LifecycleState = Production
3,303,696 UART: [state] DebugLocked = Yes
3,304,262 UART: [state] Starting the WD Timer 40000000 cycles
3,305,907 UART: [kat] SHA2-256
4,111,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,115,682 UART: [kat] ++
4,115,834 UART: [kat] sha1
4,119,958 UART: [kat] SHA2-256
4,121,898 UART: [kat] SHA2-384
4,124,607 UART: [kat] SHA2-512-ACC
4,126,508 UART: [kat] ECC-384
4,136,231 UART: [kat] HMAC-384Kdf
4,140,813 UART: [kat] LMS
4,389,141 UART: [kat] --
4,390,031 UART: [warm-reset] ++
4,391,094 UART: [warm-reset] --
4,392,221 UART: [state] Locking Datavault
4,393,101 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,705 UART: [state] Locking ICCM
4,394,209 UART: [exit] Launching FMC @ 0x40000130
4,399,538 UART:
4,399,554 UART: Running Caliptra FMC ...
4,399,962 UART:
4,400,016 UART: [state] CFI Enabled
4,401,345 UART: [aliasrt :skip pcr extension
4,401,818 UART: [art] Extend RT PCRs Done
4,402,246 UART: [art] Lock RT PCRs Done
4,403,673 UART: [art] Populate DV Done
4,411,859 UART: [fht] FMC Alias Private Key: 7
4,412,881 UART: [art] Derive CDI
4,413,161 UART: [art] Store in in slot 0x4
4,498,838 UART: [art] Derive Key Pair
4,499,198 UART: [art] Store priv key in slot 0x5
4,512,424 UART: [art] Derive Key Pair - Done
4,527,134 UART: [art] Signing Cert with AUTHO
4,527,614 UART: RITY.KEYID = 7
4,543,206 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,971 UART: [art] PUB.X = 8D68649450AADBBD9A1CB9C99D5D75B36C07671A4004D85A0EA331FF60C4C37A54CD646688316D13B32430E19A0BD2DE
4,550,737 UART: [art] PUB.Y = 038DED8ADE94FEBC3CC7688CC7DD54286635B74DD30A77F3B7AE5AE0DEB9541F9A6DAF16694A401278F97E4C69DCC694
4,557,701 UART: [art] SIG.R = 20EDCE256167505AC75003E13002F5530633A9B446346C0842A3DB89786DFC26C9E23C6245647F3B64374F1B0459CDAC
4,564,450 UART: [art] SIG.S = 584A3422D65FAE404ECF7464F9209CD56F6D080B1F34EEF5D00E302F8F62B3480AC9CF0AB0C6495132FF2B35CE3871F6
4,588,284 UART: Caliptra RT
4,588,538 UART: [state] CFI Enabled
4,870,818 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,998 ready_for_fw is high
1,060,998 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,652,978 >>> mbox cmd response: success
2,715,105 UART:
2,715,121 UART: Running Caliptra FMC ...
2,715,529 UART:
2,715,583 UART: [state] CFI Enabled
2,726,056 UART: [fht] FMC Alias Private Key: 7
2,834,083 UART: [art] Extend RT PCRs Done
2,834,511 UART: [art] Lock RT PCRs Done
2,835,699 UART: [art] Populate DV Done
2,843,755 UART: [fht] FMC Alias Private Key: 7
2,844,797 UART: [art] Derive CDI
2,845,077 UART: [art] Store in in slot 0x4
2,930,708 UART: [art] Derive Key Pair
2,931,068 UART: [art] Store priv key in slot 0x5
2,944,154 UART: [art] Derive Key Pair - Done
2,958,846 UART: [art] Signing Cert with AUTHO
2,959,326 UART: RITY.KEYID = 7
2,974,552 UART: [art] Erasing AUTHORITY.KEYID = 7
2,975,317 UART: [art] PUB.X = 949F3731275D8DA58379561554B0309C98077D7F1DC3B9AE0F74A7FA2EC24D6D69797043427321598482E3B233517B15
2,982,067 UART: [art] PUB.Y = 8697505794FB037A520E287ADF9A9A6434E64C28B57659C97C3A8670DA0AFB1772665DF8739816401FEA9CD52DD73DE0
2,989,008 UART: [art] SIG.R = 9E7F1DEB37503E647875C9A475CC183C32E1CA712F8B8756F01E9A15F39B890AFFFBB3B8179E82AA8621702B3EBC513E
2,995,785 UART: [art] SIG.S = 6351BC9B629308D2C7EEDC6CDA61BBD5C0C268EE36C40A8C6A4E355CF803056CC4F9817D702074F3F06D851C48422239
3,019,640 UART: Caliptra RT
3,019,894 UART: [state] CFI Enabled
3,127,176 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,109,642 UART:
4,109,658 UART: Running Caliptra FMC ...
4,110,066 UART:
4,110,120 UART: [state] CFI Enabled
4,111,195 UART: [aliasrt :skip pcr extension
4,111,668 UART: [art] Extend RT PCRs Done
4,112,096 UART: [art] Lock RT PCRs Done
4,113,543 UART: [art] Populate DV Done
4,121,819 UART: [fht] FMC Alias Private Key: 7
4,122,867 UART: [art] Derive CDI
4,123,147 UART: [art] Store in in slot 0x4
4,209,018 UART: [art] Derive Key Pair
4,209,378 UART: [art] Store priv key in slot 0x5
4,222,336 UART: [art] Derive Key Pair - Done
4,237,072 UART: [art] Signing Cert with AUTHO
4,237,552 UART: RITY.KEYID = 7
4,253,056 UART: [art] Erasing AUTHORITY.KEYID = 7
4,253,821 UART: [art] PUB.X = 949F3731275D8DA58379561554B0309C98077D7F1DC3B9AE0F74A7FA2EC24D6D69797043427321598482E3B233517B15
4,260,571 UART: [art] PUB.Y = 8697505794FB037A520E287ADF9A9A6434E64C28B57659C97C3A8670DA0AFB1772665DF8739816401FEA9CD52DD73DE0
4,267,512 UART: [art] SIG.R = 9E7F1DEB37503E647875C9A475CC183C32E1CA712F8B8756F01E9A15F39B890AFFFBB3B8179E82AA8621702B3EBC513E
4,274,289 UART: [art] SIG.S = 6351BC9B629308D2C7EEDC6CDA61BBD5C0C268EE36C40A8C6A4E355CF803056CC4F9817D702074F3F06D851C48422239
4,297,380 UART: Caliptra RT
4,297,634 UART: [state] CFI Enabled
4,577,007 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Production
86,034 UART: [state] DebugLocked = Yes
86,610 UART: [state] Starting the WD Timer 40000000 cycles
88,325 UART: [kat] SHA2-256
893,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,100 UART: [kat] ++
898,252 UART: [kat] sha1
902,546 UART: [kat] SHA2-256
904,486 UART: [kat] SHA2-384
907,225 UART: [kat] SHA2-512-ACC
909,126 UART: [kat] ECC-384
918,769 UART: [kat] HMAC-384Kdf
923,589 UART: [kat] LMS
1,171,917 UART: [kat] --
1,172,960 UART: [cold-reset] ++
1,173,419 UART: [fht] FHT @ 0x50003400
1,176,200 UART: [idev] ++
1,176,368 UART: [idev] CDI.KEYID = 6
1,176,728 UART: [idev] SUBJECT.KEYID = 7
1,177,152 UART: [idev] UDS.KEYID = 0
1,177,497 ready_for_fw is high
1,177,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,035 UART: [idev] Erasing UDS.KEYID = 0
1,202,133 UART: [idev] Sha1 KeyId Algorithm
1,210,760 UART: [idev] --
1,211,886 UART: [ldev] ++
1,212,054 UART: [ldev] CDI.KEYID = 6
1,212,417 UART: [ldev] SUBJECT.KEYID = 5
1,212,843 UART: [ldev] AUTHORITY.KEYID = 7
1,213,306 UART: [ldev] FE.KEYID = 1
1,218,492 UART: [ldev] Erasing FE.KEYID = 1
1,245,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,080 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,774 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,646 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,352 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,395 UART: [ldev] --
1,284,790 UART: [fwproc] Wait for Commands...
1,285,376 UART: [fwproc] Recv command 0x46574c44
1,286,104 UART: [fwproc] Recv'd Img size: 114360 bytes
2,608,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,801,142 >>> mbox cmd response: success
2,802,249 UART: [afmc] ++
2,802,417 UART: [afmc] CDI.KEYID = 6
2,802,779 UART: [afmc] SUBJECT.KEYID = 7
2,803,204 UART: [afmc] AUTHORITY.KEYID = 5
2,839,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,856,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,856,750 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,862,468 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,868,363 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,874,070 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,881,960 UART: [afmc] --
2,882,935 UART: [cold-reset] --
2,883,735 UART: [state] Locking Datavault
2,884,770 UART: [state] Locking PCR0, PCR1 and PCR31
2,885,374 UART: [state] Locking ICCM
2,885,898 UART: [exit] Launching FMC @ 0x40000130
2,891,227 UART:
2,891,243 UART: Running Caliptra FMC ...
2,891,651 UART:
2,891,794 UART: [state] CFI Enabled
2,902,493 UART: [fht] FMC Alias Private Key: 7
3,009,946 UART: [art] Extend RT PCRs Done
3,010,374 UART: [art] Lock RT PCRs Done
3,012,242 UART: [art] Populate DV Done
3,020,428 UART: [fht] FMC Alias Private Key: 7
3,021,358 UART: [art] Derive CDI
3,021,638 UART: [art] Store in in slot 0x4
3,107,211 UART: [art] Derive Key Pair
3,107,571 UART: [art] Store priv key in slot 0x5
3,120,625 UART: [art] Derive Key Pair - Done
3,135,367 UART: [art] Signing Cert with AUTHO
3,135,847 UART: RITY.KEYID = 7
3,151,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,152,142 UART: [art] PUB.X = 5084FA93BD9EA973E3C9F52B7DA575D8F6811EB6946D975BCA7C1A9DDD30672B78F2451BD5E946D5208C24C4752FC126
3,158,920 UART: [art] PUB.Y = 83C3528ACD75E3610420A57152AD636A390A88994C9D255641BC169160662DBFCDE4117A2C806785438C7C808C43F1C1
3,165,856 UART: [art] SIG.R = A1F7F548D71AC5EFD1CF167F307977BDE3460D1DC113D0BF9C21B073C30B473132BDEAA57A002362C510A1E929141401
3,172,601 UART: [art] SIG.S = E836DE35BE1F5D35763CA74AA1C654D44CA33927FC7FB003C5DEE3133573796E2C5236139B181D8491BE69739A649515
3,196,089 UART: Caliptra RT
3,196,435 UART: [state] CFI Enabled
3,304,839 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,305,595 UART:
3,305,611 UART: Running Caliptra ROM ...
3,306,019 UART:
3,306,161 UART: [state] CFI Enabled
3,309,114 UART: [state] LifecycleState = Production
3,309,722 UART: [state] DebugLocked = Yes
3,310,440 UART: [state] Starting the WD Timer 40000000 cycles
3,312,019 UART: [kat] SHA2-256
4,117,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,121,794 UART: [kat] ++
4,121,946 UART: [kat] sha1
4,126,308 UART: [kat] SHA2-256
4,128,248 UART: [kat] SHA2-384
4,131,169 UART: [kat] SHA2-512-ACC
4,133,070 UART: [kat] ECC-384
4,142,745 UART: [kat] HMAC-384Kdf
4,147,147 UART: [kat] LMS
4,395,475 UART: [kat] --
4,396,351 UART: [warm-reset] ++
4,397,302 UART: [warm-reset] --
4,398,005 UART: [state] Locking Datavault
4,398,705 UART: [state] Locking PCR0, PCR1 and PCR31
4,399,309 UART: [state] Locking ICCM
4,399,879 UART: [exit] Launching FMC @ 0x40000130
4,405,208 UART:
4,405,224 UART: Running Caliptra FMC ...
4,405,632 UART:
4,405,775 UART: [state] CFI Enabled
4,407,234 UART: [aliasrt :skip pcr extension
4,407,707 UART: [art] Extend RT PCRs Done
4,408,135 UART: [art] Lock RT PCRs Done
4,409,276 UART: [art] Populate DV Done
4,417,490 UART: [fht] FMC Alias Private Key: 7
4,418,488 UART: [art] Derive CDI
4,418,768 UART: [art] Store in in slot 0x4
4,504,817 UART: [art] Derive Key Pair
4,505,177 UART: [art] Store priv key in slot 0x5
4,518,621 UART: [art] Derive Key Pair - Done
4,533,593 UART: [art] Signing Cert with AUTHO
4,534,073 UART: RITY.KEYID = 7
4,549,333 UART: [art] Erasing AUTHORITY.KEYID = 7
4,550,098 UART: [art] PUB.X = 5084FA93BD9EA973E3C9F52B7DA575D8F6811EB6946D975BCA7C1A9DDD30672B78F2451BD5E946D5208C24C4752FC126
4,556,876 UART: [art] PUB.Y = 83C3528ACD75E3610420A57152AD636A390A88994C9D255641BC169160662DBFCDE4117A2C806785438C7C808C43F1C1
4,563,812 UART: [art] SIG.R = A1F7F548D71AC5EFD1CF167F307977BDE3460D1DC113D0BF9C21B073C30B473132BDEAA57A002362C510A1E929141401
4,570,557 UART: [art] SIG.S = E836DE35BE1F5D35763CA74AA1C654D44CA33927FC7FB003C5DEE3133573796E2C5236139B181D8491BE69739A649515
4,594,863 UART: Caliptra RT
4,595,209 UART: [state] CFI Enabled
4,880,324 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,005 ready_for_fw is high
1,061,005 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,652,549 >>> mbox cmd response: success
2,715,508 UART:
2,715,524 UART: Running Caliptra FMC ...
2,715,932 UART:
2,716,075 UART: [state] CFI Enabled
2,726,350 UART: [fht] FMC Alias Private Key: 7
2,834,217 UART: [art] Extend RT PCRs Done
2,834,645 UART: [art] Lock RT PCRs Done
2,836,211 UART: [art] Populate DV Done
2,844,483 UART: [fht] FMC Alias Private Key: 7
2,845,573 UART: [art] Derive CDI
2,845,853 UART: [art] Store in in slot 0x4
2,931,452 UART: [art] Derive Key Pair
2,931,812 UART: [art] Store priv key in slot 0x5
2,945,222 UART: [art] Derive Key Pair - Done
2,959,824 UART: [art] Signing Cert with AUTHO
2,960,304 UART: RITY.KEYID = 7
2,975,478 UART: [art] Erasing AUTHORITY.KEYID = 7
2,976,243 UART: [art] PUB.X = D58BE9D92A1BF2EED77BD4489BFE31354657B33D7D10C47BAEBA8398E0CD1116777A826FA364454482FC84EC42860B98
2,983,018 UART: [art] PUB.Y = EB4D4014C00CEC14B3F4844A6ADBEFB000820E12A87F1C54D4A8262B5D947AD011588EDEEE312D6176EA1BE5EE495E61
2,989,956 UART: [art] SIG.R = F1235817CED0821FECE0F807F3917BE816F5E5CC23B840DF79F387C0DE81EBE80C9A518CE9F53675351B493CA9B219DD
2,996,732 UART: [art] SIG.S = BA5DF95ADA60A82572E091420C48CF41B6A1DC7AC2AFCE8287AFB7F82D1DDD7CF0D04F4FD274F1BC06D40198D5D09D79
3,020,528 UART: Caliptra RT
3,020,874 UART: [state] CFI Enabled
3,127,988 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,112,615 UART:
4,112,631 UART: Running Caliptra FMC ...
4,113,039 UART:
4,113,182 UART: [state] CFI Enabled
4,114,631 UART: [aliasrt :skip pcr extension
4,115,104 UART: [art] Extend RT PCRs Done
4,115,532 UART: [art] Lock RT PCRs Done
4,116,915 UART: [art] Populate DV Done
4,125,313 UART: [fht] FMC Alias Private Key: 7
4,126,317 UART: [art] Derive CDI
4,126,597 UART: [art] Store in in slot 0x4
4,212,082 UART: [art] Derive Key Pair
4,212,442 UART: [art] Store priv key in slot 0x5
4,225,738 UART: [art] Derive Key Pair - Done
4,240,568 UART: [art] Signing Cert with AUTHO
4,241,048 UART: RITY.KEYID = 7
4,256,370 UART: [art] Erasing AUTHORITY.KEYID = 7
4,257,135 UART: [art] PUB.X = D58BE9D92A1BF2EED77BD4489BFE31354657B33D7D10C47BAEBA8398E0CD1116777A826FA364454482FC84EC42860B98
4,263,910 UART: [art] PUB.Y = EB4D4014C00CEC14B3F4844A6ADBEFB000820E12A87F1C54D4A8262B5D947AD011588EDEEE312D6176EA1BE5EE495E61
4,270,848 UART: [art] SIG.R = F1235817CED0821FECE0F807F3917BE816F5E5CC23B840DF79F387C0DE81EBE80C9A518CE9F53675351B493CA9B219DD
4,277,624 UART: [art] SIG.S = BA5DF95ADA60A82572E091420C48CF41B6A1DC7AC2AFCE8287AFB7F82D1DDD7CF0D04F4FD274F1BC06D40198D5D09D79
4,301,404 UART: Caliptra RT
4,301,750 UART: [state] CFI Enabled
4,580,171 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Production
85,673 UART: [state] DebugLocked = Yes
86,367 UART: [state] Starting the WD Timer 40000000 cycles
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,017 UART: [kat] SHA2-256
901,957 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,170,119 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,897 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,591 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,461 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,167 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,333 UART: [ldev] --
1,280,627 UART: [fwproc] Wait for Commands...
1,281,410 UART: [fwproc] Recv command 0x46574c44
1,282,143 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,796,785 >>> mbox cmd response: success
2,797,841 UART: [afmc] ++
2,798,009 UART: [afmc] CDI.KEYID = 6
2,798,372 UART: [afmc] SUBJECT.KEYID = 7
2,798,798 UART: [afmc] AUTHORITY.KEYID = 5
2,834,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,714 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,433 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,326 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,033 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,962 UART: [afmc] --
2,878,015 UART: [cold-reset] --
2,878,987 UART: [state] Locking Datavault
2,880,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,728 UART: [state] Locking ICCM
2,881,212 UART: [exit] Launching FMC @ 0x40000130
2,886,541 UART:
2,886,557 UART: Running Caliptra FMC ...
2,886,965 UART:
2,887,019 UART: [state] CFI Enabled
2,897,182 UART: [fht] FMC Alias Private Key: 7
3,004,531 UART: [art] Extend RT PCRs Done
3,004,959 UART: [art] Lock RT PCRs Done
3,006,643 UART: [art] Populate DV Done
3,014,971 UART: [fht] FMC Alias Private Key: 7
3,015,925 UART: [art] Derive CDI
3,016,205 UART: [art] Store in in slot 0x4
3,102,116 UART: [art] Derive Key Pair
3,102,476 UART: [art] Store priv key in slot 0x5
3,114,958 UART: [art] Derive Key Pair - Done
3,129,555 UART: [art] Signing Cert with AUTHO
3,130,035 UART: RITY.KEYID = 7
3,145,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,918 UART: [art] PUB.X = E4BC0C10102798B3099408EE4CD9E49B0B223485786BD06495C271D089B6A522CD115BF03555F6795943631DBB4BC254
3,152,670 UART: [art] PUB.Y = F68A68BBAC248519EDC8C53F15AB10141A238CF348659C8220463BE69E072DDF119C11E006082B64102DDBED044365E5
3,159,610 UART: [art] SIG.R = 41746D2B3B68E3593E94251210867C8757E3D229A2C8317D49A281D3334EEA67A5F518093B3EAC8431F1BDFE91EFC196
3,166,375 UART: [art] SIG.S = 22B8023C9E2253D27718F498BCDF59A99C72E187BB234B1E9ECF99622DC982929717CF2BF28A5CDD0A3FAA1F70C13162
3,190,534 UART: Caliptra RT
3,190,788 UART: [state] CFI Enabled
3,297,577 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,333 UART:
3,298,349 UART: Running Caliptra ROM ...
3,298,757 UART:
3,298,812 UART: [state] CFI Enabled
3,301,575 UART: [state] LifecycleState = Production
3,302,183 UART: [state] DebugLocked = Yes
3,302,713 UART: [state] Starting the WD Timer 40000000 cycles
3,304,216 UART: [kat] SHA2-256
4,107,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,895 UART: [kat] ++
4,112,047 UART: [kat] sha1
4,116,353 UART: [kat] SHA2-256
4,118,293 UART: [kat] SHA2-384
4,121,218 UART: [kat] SHA2-512-ACC
4,123,119 UART: [kat] ECC-384
4,132,530 UART: [kat] HMAC-384Kdf
4,137,298 UART: [kat] LMS
4,385,610 UART: [kat] --
4,386,620 UART: [warm-reset] ++
4,387,477 UART: [warm-reset] --
4,388,382 UART: [state] Locking Datavault
4,389,014 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,618 UART: [state] Locking ICCM
4,390,062 UART: [exit] Launching FMC @ 0x40000130
4,395,391 UART:
4,395,407 UART: Running Caliptra FMC ...
4,395,815 UART:
4,395,869 UART: [state] CFI Enabled
4,397,170 UART: [aliasrt :skip pcr extension
4,397,643 UART: [art] Extend RT PCRs Done
4,398,071 UART: [art] Lock RT PCRs Done
4,399,622 UART: [art] Populate DV Done
4,407,804 UART: [fht] FMC Alias Private Key: 7
4,408,796 UART: [art] Derive CDI
4,409,076 UART: [art] Store in in slot 0x4
4,494,707 UART: [art] Derive Key Pair
4,495,067 UART: [art] Store priv key in slot 0x5
4,507,601 UART: [art] Derive Key Pair - Done
4,522,550 UART: [art] Signing Cert with AUTHO
4,523,030 UART: RITY.KEYID = 7
4,538,092 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,857 UART: [art] PUB.X = E4BC0C10102798B3099408EE4CD9E49B0B223485786BD06495C271D089B6A522CD115BF03555F6795943631DBB4BC254
4,545,609 UART: [art] PUB.Y = F68A68BBAC248519EDC8C53F15AB10141A238CF348659C8220463BE69E072DDF119C11E006082B64102DDBED044365E5
4,552,549 UART: [art] SIG.R = 41746D2B3B68E3593E94251210867C8757E3D229A2C8317D49A281D3334EEA67A5F518093B3EAC8431F1BDFE91EFC196
4,559,314 UART: [art] SIG.S = 22B8023C9E2253D27718F498BCDF59A99C72E187BB234B1E9ECF99622DC982929717CF2BF28A5CDD0A3FAA1F70C13162
4,583,669 UART: Caliptra RT
4,583,923 UART: [state] CFI Enabled
4,863,833 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,155 ready_for_fw is high
1,056,155 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,793 >>> mbox cmd response: success
2,711,116 UART:
2,711,132 UART: Running Caliptra FMC ...
2,711,540 UART:
2,711,594 UART: [state] CFI Enabled
2,721,989 UART: [fht] FMC Alias Private Key: 7
2,830,056 UART: [art] Extend RT PCRs Done
2,830,484 UART: [art] Lock RT PCRs Done
2,831,856 UART: [art] Populate DV Done
2,839,898 UART: [fht] FMC Alias Private Key: 7
2,840,826 UART: [art] Derive CDI
2,841,106 UART: [art] Store in in slot 0x4
2,926,685 UART: [art] Derive Key Pair
2,927,045 UART: [art] Store priv key in slot 0x5
2,941,027 UART: [art] Derive Key Pair - Done
2,955,792 UART: [art] Signing Cert with AUTHO
2,956,272 UART: RITY.KEYID = 7
2,971,530 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,295 UART: [art] PUB.X = 6D746DC9BF34A1BDC4AA2AD9E842D6141D24BBAAF44BE76C8A9C5923DCD18410FC0F57DD957F075C2525E1A558C9D05A
2,979,079 UART: [art] PUB.Y = 431117B02765F8BCB0527DBAA2140165891B7164BD24C6D152BD545F59A0553EBF29CAF1606BC18DAAE69AF8B0D07080
2,986,032 UART: [art] SIG.R = B5D4A5CFDE5656E8AD2E3C882BDA6507D0EEB77D1BF1DD0F5DB0A4256E4AE01DAAA4AFF8FAD9803FDD8FC2B0DF624C1B
2,992,836 UART: [art] SIG.S = 1EC90207D44EF0C1399D2307068FF78BB254DF84232EFC12A5052422FDA9E72D3530C75893D9BA0A264C649A0534EB0E
3,016,657 UART: Caliptra RT
3,016,911 UART: [state] CFI Enabled
3,124,917 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,104,843 UART:
4,104,859 UART: Running Caliptra FMC ...
4,105,267 UART:
4,105,321 UART: [state] CFI Enabled
4,106,578 UART: [aliasrt :skip pcr extension
4,107,051 UART: [art] Extend RT PCRs Done
4,107,479 UART: [art] Lock RT PCRs Done
4,108,874 UART: [art] Populate DV Done
4,116,960 UART: [fht] FMC Alias Private Key: 7
4,118,032 UART: [art] Derive CDI
4,118,312 UART: [art] Store in in slot 0x4
4,204,005 UART: [art] Derive Key Pair
4,204,365 UART: [art] Store priv key in slot 0x5
4,217,441 UART: [art] Derive Key Pair - Done
4,231,820 UART: [art] Signing Cert with AUTHO
4,232,300 UART: RITY.KEYID = 7
4,247,462 UART: [art] Erasing AUTHORITY.KEYID = 7
4,248,227 UART: [art] PUB.X = 6D746DC9BF34A1BDC4AA2AD9E842D6141D24BBAAF44BE76C8A9C5923DCD18410FC0F57DD957F075C2525E1A558C9D05A
4,255,011 UART: [art] PUB.Y = 431117B02765F8BCB0527DBAA2140165891B7164BD24C6D152BD545F59A0553EBF29CAF1606BC18DAAE69AF8B0D07080
4,261,964 UART: [art] SIG.R = B5D4A5CFDE5656E8AD2E3C882BDA6507D0EEB77D1BF1DD0F5DB0A4256E4AE01DAAA4AFF8FAD9803FDD8FC2B0DF624C1B
4,268,768 UART: [art] SIG.S = 1EC90207D44EF0C1399D2307068FF78BB254DF84232EFC12A5052422FDA9E72D3530C75893D9BA0A264C649A0534EB0E
4,292,431 UART: Caliptra RT
4,292,685 UART: [state] CFI Enabled
4,577,862 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Production
86,234 UART: [state] DebugLocked = Yes
86,874 UART: [state] Starting the WD Timer 40000000 cycles
88,467 UART: [kat] SHA2-256
892,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,146 UART: [kat] ++
896,298 UART: [kat] sha1
900,504 UART: [kat] SHA2-256
902,444 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,170,550 UART: [cold-reset] ++
1,171,039 UART: [fht] FHT @ 0x50003400
1,173,663 UART: [idev] ++
1,173,831 UART: [idev] CDI.KEYID = 6
1,174,192 UART: [idev] SUBJECT.KEYID = 7
1,174,617 UART: [idev] UDS.KEYID = 0
1,174,963 ready_for_fw is high
1,174,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,758 UART: [idev] Erasing UDS.KEYID = 0
1,200,053 UART: [idev] Sha1 KeyId Algorithm
1,208,936 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,142 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,836 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,706 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,412 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,442 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,635 UART: [fwproc] Recv command 0x46574c44
1,284,368 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,798,834 >>> mbox cmd response: success
2,800,036 UART: [afmc] ++
2,800,204 UART: [afmc] CDI.KEYID = 6
2,800,567 UART: [afmc] SUBJECT.KEYID = 7
2,800,993 UART: [afmc] AUTHORITY.KEYID = 5
2,836,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,323 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,859,042 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,935 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,642 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,309 UART: [afmc] --
2,879,210 UART: [cold-reset] --
2,880,160 UART: [state] Locking Datavault
2,881,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,909 UART: [state] Locking ICCM
2,882,401 UART: [exit] Launching FMC @ 0x40000130
2,887,730 UART:
2,887,746 UART: Running Caliptra FMC ...
2,888,154 UART:
2,888,297 UART: [state] CFI Enabled
2,898,708 UART: [fht] FMC Alias Private Key: 7
3,006,725 UART: [art] Extend RT PCRs Done
3,007,153 UART: [art] Lock RT PCRs Done
3,008,817 UART: [art] Populate DV Done
3,016,895 UART: [fht] FMC Alias Private Key: 7
3,017,993 UART: [art] Derive CDI
3,018,273 UART: [art] Store in in slot 0x4
3,103,942 UART: [art] Derive Key Pair
3,104,302 UART: [art] Store priv key in slot 0x5
3,117,610 UART: [art] Derive Key Pair - Done
3,132,275 UART: [art] Signing Cert with AUTHO
3,132,755 UART: RITY.KEYID = 7
3,147,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,674 UART: [art] PUB.X = 7E171600E3105DF69A67B67A18C22788FB308D89E85F7295CE74A2A7160CE64F28C3F4D7B9C1CA1299DA19A87F947221
3,155,419 UART: [art] PUB.Y = EF01A14CB25F5835D37F2607A4A9838BD990D1C85C078E7DCC0F0E9B155FFFE262605A867CEB68715D24A4336596CF58
3,162,360 UART: [art] SIG.R = B8B3BD9D06185F764572F14F766E1169D827EF3DAC3094759F9B00C3BC853207A3C5F956FA3754E773168D17843D24F1
3,169,098 UART: [art] SIG.S = FA7974714B6BF1FD86BFDF5C44592D9DF86F0A95F19B624F88091BD6EE6B2000FDDA7C435800C4885DA9670DA10D75F6
3,192,959 UART: Caliptra RT
3,193,305 UART: [state] CFI Enabled
3,302,079 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,835 UART:
3,302,851 UART: Running Caliptra ROM ...
3,303,259 UART:
3,303,401 UART: [state] CFI Enabled
3,306,612 UART: [state] LifecycleState = Production
3,307,220 UART: [state] DebugLocked = Yes
3,307,846 UART: [state] Starting the WD Timer 40000000 cycles
3,309,481 UART: [kat] SHA2-256
4,113,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,160 UART: [kat] ++
4,117,312 UART: [kat] sha1
4,121,462 UART: [kat] SHA2-256
4,123,402 UART: [kat] SHA2-384
4,126,197 UART: [kat] SHA2-512-ACC
4,128,098 UART: [kat] ECC-384
4,137,661 UART: [kat] HMAC-384Kdf
4,142,205 UART: [kat] LMS
4,390,517 UART: [kat] --
4,391,399 UART: [warm-reset] ++
4,392,380 UART: [warm-reset] --
4,393,173 UART: [state] Locking Datavault
4,394,041 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,645 UART: [state] Locking ICCM
4,395,165 UART: [exit] Launching FMC @ 0x40000130
4,400,494 UART:
4,400,510 UART: Running Caliptra FMC ...
4,400,918 UART:
4,401,061 UART: [state] CFI Enabled
4,402,460 UART: [aliasrt :skip pcr extension
4,402,933 UART: [art] Extend RT PCRs Done
4,403,361 UART: [art] Lock RT PCRs Done
4,404,732 UART: [art] Populate DV Done
4,412,928 UART: [fht] FMC Alias Private Key: 7
4,414,078 UART: [art] Derive CDI
4,414,358 UART: [art] Store in in slot 0x4
4,500,031 UART: [art] Derive Key Pair
4,500,391 UART: [art] Store priv key in slot 0x5
4,513,911 UART: [art] Derive Key Pair - Done
4,528,380 UART: [art] Signing Cert with AUTHO
4,528,860 UART: RITY.KEYID = 7
4,543,862 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,627 UART: [art] PUB.X = 7E171600E3105DF69A67B67A18C22788FB308D89E85F7295CE74A2A7160CE64F28C3F4D7B9C1CA1299DA19A87F947221
4,551,372 UART: [art] PUB.Y = EF01A14CB25F5835D37F2607A4A9838BD990D1C85C078E7DCC0F0E9B155FFFE262605A867CEB68715D24A4336596CF58
4,558,313 UART: [art] SIG.R = B8B3BD9D06185F764572F14F766E1169D827EF3DAC3094759F9B00C3BC853207A3C5F956FA3754E773168D17843D24F1
4,565,051 UART: [art] SIG.S = FA7974714B6BF1FD86BFDF5C44592D9DF86F0A95F19B624F88091BD6EE6B2000FDDA7C435800C4885DA9670DA10D75F6
4,588,878 UART: Caliptra RT
4,589,224 UART: [state] CFI Enabled
4,869,605 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,606 ready_for_fw is high
1,056,606 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,649,274 >>> mbox cmd response: success
2,711,237 UART:
2,711,253 UART: Running Caliptra FMC ...
2,711,661 UART:
2,711,804 UART: [state] CFI Enabled
2,722,411 UART: [fht] FMC Alias Private Key: 7
2,830,468 UART: [art] Extend RT PCRs Done
2,830,896 UART: [art] Lock RT PCRs Done
2,832,564 UART: [art] Populate DV Done
2,840,824 UART: [fht] FMC Alias Private Key: 7
2,841,884 UART: [art] Derive CDI
2,842,164 UART: [art] Store in in slot 0x4
2,928,095 UART: [art] Derive Key Pair
2,928,455 UART: [art] Store priv key in slot 0x5
2,941,223 UART: [art] Derive Key Pair - Done
2,955,908 UART: [art] Signing Cert with AUTHO
2,956,388 UART: RITY.KEYID = 7
2,971,484 UART: [art] Erasing AUTHORITY.KEYID = 7
2,972,249 UART: [art] PUB.X = A30CAEED1E8A8A88AC5B4761A5C1A91DB858E22C1BCF306907D4F3A2331FE54285A19AA5FFFB37CD51B5F4BE3514B945
2,979,033 UART: [art] PUB.Y = 9854DDD736FE2A8F2B57A49C7CA176ED7BC12A1723B6C75F52A9595D5CAE53DC1EFA2758D96E510230BF1427CC5CDBD8
2,985,998 UART: [art] SIG.R = 6EF36B9DE6C675094DB9DF1A652B6C3B4BD92DFD5B1D4E658F2F4EB281851072C01DE089F0721306CF59532D7483B29F
2,992,770 UART: [art] SIG.S = 95CA28295B75D64A8DB30D9107F8ADAE8E529333198F4135055C61EA4DFBBF11C43685ACB49E2DA69FCBCD35E7CCC3A9
3,016,740 UART: Caliptra RT
3,017,086 UART: [state] CFI Enabled
3,123,974 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,103,103 UART:
4,103,119 UART: Running Caliptra FMC ...
4,103,527 UART:
4,103,670 UART: [state] CFI Enabled
4,105,197 UART: [aliasrt :skip pcr extension
4,105,670 UART: [art] Extend RT PCRs Done
4,106,098 UART: [art] Lock RT PCRs Done
4,107,257 UART: [art] Populate DV Done
4,115,403 UART: [fht] FMC Alias Private Key: 7
4,116,359 UART: [art] Derive CDI
4,116,639 UART: [art] Store in in slot 0x4
4,202,202 UART: [art] Derive Key Pair
4,202,562 UART: [art] Store priv key in slot 0x5
4,216,034 UART: [art] Derive Key Pair - Done
4,230,447 UART: [art] Signing Cert with AUTHO
4,230,927 UART: RITY.KEYID = 7
4,246,165 UART: [art] Erasing AUTHORITY.KEYID = 7
4,246,930 UART: [art] PUB.X = A30CAEED1E8A8A88AC5B4761A5C1A91DB858E22C1BCF306907D4F3A2331FE54285A19AA5FFFB37CD51B5F4BE3514B945
4,253,714 UART: [art] PUB.Y = 9854DDD736FE2A8F2B57A49C7CA176ED7BC12A1723B6C75F52A9595D5CAE53DC1EFA2758D96E510230BF1427CC5CDBD8
4,260,679 UART: [art] SIG.R = 6EF36B9DE6C675094DB9DF1A652B6C3B4BD92DFD5B1D4E658F2F4EB281851072C01DE089F0721306CF59532D7483B29F
4,267,451 UART: [art] SIG.S = 95CA28295B75D64A8DB30D9107F8ADAE8E529333198F4135055C61EA4DFBBF11C43685ACB49E2DA69FCBCD35E7CCC3A9
4,291,013 UART: Caliptra RT
4,291,359 UART: [state] CFI Enabled
4,572,440 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
191,878 UART:
192,262 UART: Running Caliptra ROM ...
193,401 UART:
193,548 UART: [state] CFI Enabled
263,129 UART: [state] LifecycleState = Production
264,945 UART: [state] DebugLocked = Yes
267,161 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,265 UART: [kat] SHA2-256
442,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,463 UART: [kat] ++
454,025 UART: [kat] sha1
465,103 UART: [kat] SHA2-256
467,831 UART: [kat] SHA2-384
472,801 UART: [kat] SHA2-512-ACC
475,155 UART: [kat] ECC-384
2,766,951 UART: [kat] HMAC-384Kdf
2,781,656 UART: [kat] LMS
3,971,963 UART: [kat] --
3,975,746 UART: [cold-reset] ++
3,978,379 UART: [fht] Storing FHT @ 0x50003400
3,989,546 UART: [idev] ++
3,990,119 UART: [idev] CDI.KEYID = 6
3,991,094 UART: [idev] SUBJECT.KEYID = 7
3,992,305 UART: [idev] UDS.KEYID = 0
Initializing fuses
881 UART: [idev] Erasing UDS.KEYID = 0
2,247 UART:
2,421 UART: Running Caliptra ROM ...
3,521 UART:
3,675 UART: [state] CFI Enabled
72,243 UART: [state] LifecycleState = Production
74,072 UART: [state] DebugLocked = Yes
77,006 UART: [state] Starting the Watchdog Timer 40000000 cycles
81,686 UART: [kat] SHA2-256
251,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
261,909 UART: [kat] ++
262,496 UART: [kat] sha1
274,023 UART: [kat] SHA2-256
276,709 UART: [kat] SHA2-384
282,204 UART: [kat] SHA2-512-ACC
284,608 UART: [kat] ECC-384
2,575,280 UART: [kat] HMAC-384Kdf
2,607,779 UART: [kat] LMS
3,798,100 UART: [kat] --
3,803,660 UART: [warm-reset] ++
3,804,539 UART: [warm-reset] Previous Cold-Reset was not successful.
3,808,251 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
191,813 UART:
192,173 UART: Running Caliptra ROM ...
193,251 UART:
603,132 UART: [state] CFI Enabled
617,476 UART: [state] LifecycleState = Production
619,285 UART: [state] DebugLocked = Yes
621,849 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,835 UART: [kat] SHA2-256
797,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,149 UART: [kat] ++
808,701 UART: [kat] sha1
818,737 UART: [kat] SHA2-256
821,473 UART: [kat] SHA2-384
826,338 UART: [kat] SHA2-512-ACC
828,694 UART: [kat] ECC-384
3,113,014 UART: [kat] HMAC-384Kdf
3,125,134 UART: [kat] LMS
4,315,261 UART: [kat] --
4,319,800 UART: [cold-reset] ++
4,321,003 UART: [fht] Storing FHT @ 0x50003400
4,332,948 UART: [idev] ++
4,333,573 UART: [idev] CDI.KEYID = 6
4,334,463 UART: [idev] SUBJECT.KEYID = 7
4,335,672 UART: [idev] UDS.KEYID = 0
Initializing fuses
881 UART: [idev] Erasing UDS.KEYID = 0
2,159 UART:
2,321 UART: Running Caliptra ROM ...
3,426 UART:
15,990,401 UART: [state] CFI Enabled
16,003,038 UART: [state] LifecycleState = Production
16,004,808 UART: [state] DebugLocked = Yes
16,007,091 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,012,166 UART: [kat] SHA2-256
16,181,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,192,425 UART: [kat] ++
16,192,979 UART: [kat] sha1
16,203,601 UART: [kat] SHA2-256
16,206,351 UART: [kat] SHA2-384
16,211,578 UART: [kat] SHA2-512-ACC
16,213,977 UART: [kat] ECC-384
18,498,531 UART: [kat] HMAC-384Kdf
18,510,815 UART: [kat] LMS
19,700,969 UART: [kat] --
19,704,107 UART: [warm-reset] ++
19,704,952 UART: [warm-reset] Previous Cold-Reset was not successful.
19,708,538 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
191,872 UART:
192,246 UART: Running Caliptra ROM ...
193,391 UART:
193,534 UART: [state] CFI Enabled
265,035 UART: [state] LifecycleState = Production
266,788 UART: [state] DebugLocked = Yes
268,138 UART: [state] Starting the WD Timer 40000000 cycles
273,394 UART: [kat] SHA2-256
452,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,095 UART: [kat] ++
464,620 UART: [kat] sha1
475,502 UART: [kat] SHA2-256
478,526 UART: [kat] SHA2-384
485,275 UART: [kat] SHA2-512-ACC
488,244 UART: [kat] ECC-384
2,948,343 UART: [kat] HMAC-384Kdf
2,971,857 UART: [kat] LMS
3,501,337 UART: [kat] --
3,506,028 UART: [cold-reset] ++
3,508,206 UART: [fht] FHT @ 0x50003400
3,519,337 UART: [idev] ++
3,519,897 UART: [idev] CDI.KEYID = 6
3,520,772 UART: [idev] SUBJECT.KEYID = 7
3,522,023 UART: [idev] UDS.KEYID = 0
Initializing fuses
870 UART: [idev] Erasing UDS.KEYID = 0
2,084 UART:
2,304 UART: Running Caliptra ROM ...
3,422 UART:
3,575 UART: [state] CFI Enabled
73,340 UART: [state] LifecycleState = Production
75,105 UART: [state] DebugLocked = Yes
77,793 UART: [state] Starting the WD Timer 40000000 cycles
82,049 UART: [kat] SHA2-256
261,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
272,808 UART: [kat] ++
273,277 UART: [kat] sha1
283,721 UART: [kat] SHA2-256
286,780 UART: [kat] SHA2-384
292,484 UART: [kat] SHA2-512-ACC
295,419 UART: [kat] ECC-384
2,756,235 UART: [kat] HMAC-384Kdf
2,779,707 UART: [kat] LMS
3,309,179 UART: [kat] --
3,315,071 UART: [warm-reset] ++
3,315,964 UART: [warm-reset] Prev Cold-Reset failed
3,319,471 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
192,063 UART:
192,429 UART: Running Caliptra ROM ...
193,601 UART:
193,751 UART: [state] CFI Enabled
261,686 UART: [state] LifecycleState = Production
263,913 UART: [state] DebugLocked = Yes
265,623 UART: [state] Starting the WD Timer 40000000 cycles
271,756 UART: [kat] SHA2-256
461,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,407 UART: [kat] ++
472,995 UART: [kat] sha1
484,851 UART: [kat] SHA2-256
487,881 UART: [kat] SHA2-384
493,423 UART: [kat] SHA2-512-ACC
495,988 UART: [kat] ECC-384
2,946,734 UART: [kat] HMAC-384Kdf
2,970,566 UART: [kat] LMS
3,502,342 UART: [kat] --
3,506,191 UART: [cold-reset] ++
3,508,117 UART: [fht] FHT @ 0x50003400
3,519,288 UART: [idev] ++
3,519,964 UART: [idev] CDI.KEYID = 6
3,520,972 UART: [idev] SUBJECT.KEYID = 7
3,522,125 UART: [idev] UDS.KEYID = 0
Initializing fuses
894 UART: [idev] Erasing UDS.KEYID = 0
2,186 UART:
2,431 UART: Running Caliptra ROM ...
3,561 UART:
3,713 UART: [state] CFI Enabled
68,966 UART: [state] LifecycleState = Production
70,852 UART: [state] DebugLocked = Yes
73,179 UART: [state] Starting the WD Timer 40000000 cycles
78,887 UART: [kat] SHA2-256
268,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
279,512 UART: [kat] ++
280,044 UART: [kat] sha1
291,577 UART: [kat] SHA2-256
294,582 UART: [kat] SHA2-384
299,423 UART: [kat] SHA2-512-ACC
301,980 UART: [kat] ECC-384
2,752,161 UART: [kat] HMAC-384Kdf
2,775,585 UART: [kat] LMS
3,307,115 UART: [kat] --
3,311,112 UART: [warm-reset] ++
3,311,968 UART: [warm-reset] Prev Cold-Reset failed
3,314,341 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,608 writing to cptra_bootfsm_go
192,209 UART:
192,593 UART: Running Caliptra ROM ...
193,769 UART:
603,453 UART: [state] CFI Enabled
617,292 UART: [state] LifecycleState = Production
619,500 UART: [state] DebugLocked = Yes
621,465 UART: [state] Starting the WD Timer 40000000 cycles
626,835 UART: [kat] SHA2-256
816,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,512 UART: [kat] ++
828,013 UART: [kat] sha1
839,056 UART: [kat] SHA2-256
842,093 UART: [kat] SHA2-384
847,675 UART: [kat] SHA2-512-ACC
850,288 UART: [kat] ECC-384
3,292,593 UART: [kat] HMAC-384Kdf
3,304,101 UART: [kat] LMS
3,835,915 UART: [kat] --
3,839,158 UART: [cold-reset] ++
3,840,411 UART: [fht] FHT @ 0x50003400
3,852,100 UART: [idev] ++
3,852,823 UART: [idev] CDI.KEYID = 6
3,853,779 UART: [idev] SUBJECT.KEYID = 7
3,854,986 UART: [idev] UDS.KEYID = 0
Initializing fuses
865 UART: [idev] Erasing UDS.KEYID = 0
2,144 UART:
2,355 UART: Running Caliptra ROM ...
3,462 UART:
16,463,712 UART: [state] CFI Enabled
16,479,249 UART: [state] LifecycleState = Production
16,481,015 UART: [state] DebugLocked = Yes
16,483,222 UART: [state] Starting the WD Timer 40000000 cycles
16,488,061 UART: [kat] SHA2-256
16,677,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,688,810 UART: [kat] ++
16,689,354 UART: [kat] sha1
16,700,465 UART: [kat] SHA2-256
16,703,470 UART: [kat] SHA2-384
16,709,686 UART: [kat] SHA2-512-ACC
16,712,249 UART: [kat] ECC-384
19,153,614 UART: [kat] HMAC-384Kdf
19,165,565 UART: [kat] LMS
19,697,164 UART: [kat] --
19,700,789 UART: [warm-reset] ++
19,701,638 UART: [warm-reset] Prev Cold-Reset failed
19,704,974 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Production
86,237 UART: [state] DebugLocked = Yes
86,891 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,691 UART: [kat] SHA2-256
882,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,737 UART: [kat] ++
886,889 UART: [kat] sha1
891,091 UART: [kat] SHA2-256
893,029 UART: [kat] SHA2-384
895,870 UART: [kat] SHA2-512-ACC
897,771 UART: [kat] ECC-384
903,406 UART: [kat] HMAC-384Kdf
907,850 UART: [kat] LMS
1,476,046 UART: [kat] --
1,477,041 UART: [cold-reset] ++
1,477,548 UART: [fht] Storing FHT @ 0x50003400
1,480,239 UART: [idev] ++
1,480,407 UART: [idev] CDI.KEYID = 6
1,480,767 UART: [idev] SUBJECT.KEYID = 7
1,481,191 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,632 UART:
1,481,648 UART: Running Caliptra ROM ...
1,482,056 UART:
1,482,110 UART: [state] CFI Enabled
1,485,325 UART: [state] LifecycleState = Production
1,485,933 UART: [state] DebugLocked = Yes
1,486,647 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,488,329 UART: [kat] SHA2-256
2,282,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,286,375 UART: [kat] ++
2,286,527 UART: [kat] sha1
2,290,833 UART: [kat] SHA2-256
2,292,771 UART: [kat] SHA2-384
2,295,522 UART: [kat] SHA2-512-ACC
2,297,423 UART: [kat] ECC-384
2,302,990 UART: [kat] HMAC-384Kdf
2,307,582 UART: [kat] LMS
2,875,778 UART: [kat] --
2,876,576 UART: [warm-reset] ++
2,876,847 UART: [warm-reset] Previous Cold-Reset was not successful.
2,878,062 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,672 UART: [state] LifecycleState = Production
86,280 UART: [state] DebugLocked = Yes
86,940 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,726 UART: [kat] SHA2-256
882,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,772 UART: [kat] ++
886,924 UART: [kat] sha1
891,274 UART: [kat] SHA2-256
893,212 UART: [kat] SHA2-384
895,927 UART: [kat] SHA2-512-ACC
897,828 UART: [kat] ECC-384
903,537 UART: [kat] HMAC-384Kdf
908,011 UART: [kat] LMS
1,476,207 UART: [kat] --
1,477,100 UART: [cold-reset] ++
1,477,481 UART: [fht] Storing FHT @ 0x50003400
1,480,152 UART: [idev] ++
1,480,320 UART: [idev] CDI.KEYID = 6
1,480,680 UART: [idev] SUBJECT.KEYID = 7
1,481,104 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,545 UART:
1,481,561 UART: Running Caliptra ROM ...
1,481,969 UART:
1,482,110 UART: [state] CFI Enabled
1,484,619 UART: [state] LifecycleState = Production
1,485,227 UART: [state] DebugLocked = Yes
1,485,807 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,609 UART: [kat] SHA2-256
2,281,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,655 UART: [kat] ++
2,285,807 UART: [kat] sha1
2,290,145 UART: [kat] SHA2-256
2,292,083 UART: [kat] SHA2-384
2,294,852 UART: [kat] SHA2-512-ACC
2,296,753 UART: [kat] ECC-384
2,302,762 UART: [kat] HMAC-384Kdf
2,307,424 UART: [kat] LMS
2,875,620 UART: [kat] --
2,876,574 UART: [warm-reset] ++
2,876,845 UART: [warm-reset] Previous Cold-Reset was not successful.
2,878,118 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Production
86,079 UART: [state] DebugLocked = Yes
86,709 UART: [state] Starting the WD Timer 40000000 cycles
88,326 UART: [kat] SHA2-256
893,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,101 UART: [kat] ++
898,253 UART: [kat] sha1
902,457 UART: [kat] SHA2-256
904,397 UART: [kat] SHA2-384
907,142 UART: [kat] SHA2-512-ACC
909,043 UART: [kat] ECC-384
918,472 UART: [kat] HMAC-384Kdf
923,036 UART: [kat] LMS
1,171,364 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,814 UART: [fht] FHT @ 0x50003400
1,175,461 UART: [idev] ++
1,175,629 UART: [idev] CDI.KEYID = 6
1,175,989 UART: [idev] SUBJECT.KEYID = 7
1,176,413 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,851 UART:
1,176,867 UART: Running Caliptra ROM ...
1,177,275 UART:
1,177,330 UART: [state] CFI Enabled
1,180,131 UART: [state] LifecycleState = Production
1,180,739 UART: [state] DebugLocked = Yes
1,181,251 UART: [state] Starting the WD Timer 40000000 cycles
1,182,860 UART: [kat] SHA2-256
1,988,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,992,635 UART: [kat] ++
1,992,787 UART: [kat] sha1
1,997,035 UART: [kat] SHA2-256
1,998,975 UART: [kat] SHA2-384
2,001,612 UART: [kat] SHA2-512-ACC
2,003,513 UART: [kat] ECC-384
2,013,214 UART: [kat] HMAC-384Kdf
2,017,914 UART: [kat] LMS
2,266,242 UART: [kat] --
2,267,092 UART: [warm-reset] ++
2,267,363 UART: [warm-reset] Prev Cold-Reset failed
2,268,276 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Production
85,378 UART: [state] DebugLocked = Yes
86,092 UART: [state] Starting the WD Timer 40000000 cycles
87,649 UART: [kat] SHA2-256
893,299 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,424 UART: [kat] ++
897,576 UART: [kat] sha1
901,714 UART: [kat] SHA2-256
903,654 UART: [kat] SHA2-384
906,303 UART: [kat] SHA2-512-ACC
908,204 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,733 UART: [kat] LMS
1,171,061 UART: [kat] --
1,172,178 UART: [cold-reset] ++
1,172,675 UART: [fht] FHT @ 0x50003400
1,175,314 UART: [idev] ++
1,175,482 UART: [idev] CDI.KEYID = 6
1,175,842 UART: [idev] SUBJECT.KEYID = 7
1,176,266 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,704 UART:
1,176,720 UART: Running Caliptra ROM ...
1,177,128 UART:
1,177,270 UART: [state] CFI Enabled
1,179,907 UART: [state] LifecycleState = Production
1,180,515 UART: [state] DebugLocked = Yes
1,181,195 UART: [state] Starting the WD Timer 40000000 cycles
1,182,682 UART: [kat] SHA2-256
1,988,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,992,457 UART: [kat] ++
1,992,609 UART: [kat] sha1
1,996,745 UART: [kat] SHA2-256
1,998,685 UART: [kat] SHA2-384
2,001,356 UART: [kat] SHA2-512-ACC
2,003,257 UART: [kat] ECC-384
2,013,478 UART: [kat] HMAC-384Kdf
2,018,068 UART: [kat] LMS
2,266,396 UART: [kat] --
2,267,358 UART: [warm-reset] ++
2,267,629 UART: [warm-reset] Prev Cold-Reset failed
2,268,784 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Production
85,579 UART: [state] DebugLocked = Yes
86,161 UART: [state] Starting the WD Timer 40000000 cycles
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,495 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,069 UART:
1,175,085 UART: Running Caliptra ROM ...
1,175,493 UART:
1,175,548 UART: [state] CFI Enabled
1,177,907 UART: [state] LifecycleState = Production
1,178,515 UART: [state] DebugLocked = Yes
1,179,151 UART: [state] Starting the WD Timer 40000000 cycles
1,180,684 UART: [kat] SHA2-256
1,984,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,363 UART: [kat] ++
1,988,515 UART: [kat] sha1
1,992,849 UART: [kat] SHA2-256
1,994,789 UART: [kat] SHA2-384
1,997,638 UART: [kat] SHA2-512-ACC
1,999,539 UART: [kat] ECC-384
2,008,756 UART: [kat] HMAC-384Kdf
2,013,504 UART: [kat] LMS
2,261,816 UART: [kat] --
2,262,618 UART: [warm-reset] ++
2,262,886 UART: [warm-reset] Prev Cold-Reset failed
2,263,793 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Production
86,116 UART: [state] DebugLocked = Yes
86,634 UART: [state] Starting the WD Timer 40000000 cycles
88,343 UART: [kat] SHA2-256
891,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,022 UART: [kat] ++
896,174 UART: [kat] sha1
900,630 UART: [kat] SHA2-256
902,570 UART: [kat] SHA2-384
905,271 UART: [kat] SHA2-512-ACC
907,172 UART: [kat] ECC-384
917,057 UART: [kat] HMAC-384Kdf
921,561 UART: [kat] LMS
1,169,873 UART: [kat] --
1,170,840 UART: [cold-reset] ++
1,171,211 UART: [fht] FHT @ 0x50003400
1,173,797 UART: [idev] ++
1,173,965 UART: [idev] CDI.KEYID = 6
1,174,326 UART: [idev] SUBJECT.KEYID = 7
1,174,751 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,190 UART:
1,175,206 UART: Running Caliptra ROM ...
1,175,614 UART:
1,175,756 UART: [state] CFI Enabled
1,178,345 UART: [state] LifecycleState = Production
1,178,953 UART: [state] DebugLocked = Yes
1,179,545 UART: [state] Starting the WD Timer 40000000 cycles
1,181,072 UART: [kat] SHA2-256
1,984,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,751 UART: [kat] ++
1,988,903 UART: [kat] sha1
1,993,075 UART: [kat] SHA2-256
1,995,015 UART: [kat] SHA2-384
1,997,554 UART: [kat] SHA2-512-ACC
1,999,455 UART: [kat] ECC-384
2,008,968 UART: [kat] HMAC-384Kdf
2,013,372 UART: [kat] LMS
2,261,684 UART: [kat] --
2,262,762 UART: [warm-reset] ++
2,263,030 UART: [warm-reset] Prev Cold-Reset failed
2,263,853 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,034 UART:
192,458 UART: Running Caliptra ROM ...
193,559 UART:
193,702 UART: [state] CFI Enabled
266,225 UART: [state] LifecycleState = Unprovisioned
268,171 UART: [state] DebugLocked = No
270,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,899 UART: [kat] SHA2-256
445,603 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,100 UART: [kat] ++
456,574 UART: [kat] sha1
468,751 UART: [kat] SHA2-256
471,441 UART: [kat] SHA2-384
476,611 UART: [kat] SHA2-512-ACC
479,008 UART: [kat] ECC-384
2,767,507 UART: [kat] HMAC-384Kdf
2,779,094 UART: [kat] LMS
3,969,418 UART: [kat] --
3,974,668 UART: [cold-reset] ++
3,977,088 UART: [fht] Storing FHT @ 0x50003400
3,988,092 UART: [idev] ++
3,988,715 UART: [idev] CDI.KEYID = 6
3,989,643 UART: [idev] SUBJECT.KEYID = 7
3,990,859 UART: [idev] UDS.KEYID = 0
6,570,923 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,715,084 UART: [idev] Erasing UDS.KEYID = 0
7,326,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,557 UART: [idev] --
7,353,959 UART: [ldev] ++
7,354,534 UART: [ldev] CDI.KEYID = 6
7,355,502 UART: [ldev] SUBJECT.KEYID = 5
7,356,723 UART: [ldev] AUTHORITY.KEYID = 7
7,357,958 UART: [ldev] FE.KEYID = 1
7,403,992 UART: [ldev] Erasing FE.KEYID = 1
10,736,554 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,412 UART: [ldev] --
13,101,571 UART: [fwproc] Waiting for Commands...
13,104,860 UART: [fwproc] Received command 0x46574c44
13,107,055 UART: [fwproc] Received Image of size 114036 bytes
17,156,375 UART: ROM Fatal Error: 0x000B0016
17,159,787 >>> mbox cmd response: failed
17,160,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,160,563 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
6,379,032 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,167,217 >>> mbox cmd response: failed
17,168,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,168,355 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,557 UART:
192,921 UART: Running Caliptra ROM ...
194,076 UART:
603,635 UART: [state] CFI Enabled
616,590 UART: [state] LifecycleState = Unprovisioned
618,496 UART: [state] DebugLocked = No
620,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,533 UART: [kat] SHA2-256
795,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,813 UART: [kat] ++
806,292 UART: [kat] sha1
817,242 UART: [kat] SHA2-256
819,944 UART: [kat] SHA2-384
826,353 UART: [kat] SHA2-512-ACC
828,693 UART: [kat] ECC-384
3,113,606 UART: [kat] HMAC-384Kdf
3,125,472 UART: [kat] LMS
4,315,573 UART: [kat] --
4,320,815 UART: [cold-reset] ++
4,322,529 UART: [fht] Storing FHT @ 0x50003400
4,334,281 UART: [idev] ++
4,334,854 UART: [idev] CDI.KEYID = 6
4,335,792 UART: [idev] SUBJECT.KEYID = 7
4,337,059 UART: [idev] UDS.KEYID = 0
6,914,241 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
7,058,309 UART: [idev] Erasing UDS.KEYID = 0
7,625,356 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,935 UART: [idev] --
7,651,524 UART: [ldev] ++
7,652,097 UART: [ldev] CDI.KEYID = 6
7,653,147 UART: [ldev] SUBJECT.KEYID = 5
7,654,256 UART: [ldev] AUTHORITY.KEYID = 7
7,655,541 UART: [ldev] FE.KEYID = 1
7,667,170 UART: [ldev] Erasing FE.KEYID = 1
10,953,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,813 UART: [ldev] --
13,310,679 UART: [fwproc] Waiting for Commands...
13,313,908 UART: [fwproc] Received command 0x46574c44
13,316,097 UART: [fwproc] Received Image of size 114036 bytes
17,371,432 UART: ROM Fatal Error: 0x000B0016
17,374,843 >>> mbox cmd response: failed
17,375,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,375,635 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
6,704,386 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,328,528 >>> mbox cmd response: failed
17,329,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,329,545 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,446 UART:
192,819 UART: Running Caliptra ROM ...
194,014 UART:
194,193 UART: [state] CFI Enabled
264,202 UART: [state] LifecycleState = Unprovisioned
266,086 UART: [state] DebugLocked = No
268,550 UART: [state] WD Timer not started. Device not locked for debugging
271,495 UART: [kat] SHA2-256
450,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,184 UART: [kat] ++
462,715 UART: [kat] sha1
474,300 UART: [kat] SHA2-256
477,482 UART: [kat] SHA2-384
484,091 UART: [kat] SHA2-512-ACC
487,041 UART: [kat] ECC-384
2,946,886 UART: [kat] HMAC-384Kdf
2,972,846 UART: [kat] LMS
3,502,284 UART: [kat] --
3,507,916 UART: [cold-reset] ++
3,510,248 UART: [fht] FHT @ 0x50003400
3,521,494 UART: [idev] ++
3,522,102 UART: [idev] CDI.KEYID = 6
3,522,992 UART: [idev] SUBJECT.KEYID = 7
3,524,210 UART: [idev] UDS.KEYID = 0
6,065,823 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,210,586 UART: [idev] Erasing UDS.KEYID = 0
6,212,031 UART: [idev] Sha1 KeyId Algorithm
6,213,191 UART: [idev] --
6,213,676 UART: [ldev] ++
6,214,155 UART: [ldev] CDI.KEYID = 6
6,215,124 UART: [ldev] SUBJECT.KEYID = 5
6,216,146 UART: [ldev] AUTHORITY.KEYID = 7
6,217,238 UART: [ldev] FE.KEYID = 1
6,218,073 UART: [ldev] Erasing FE.KEYID = 1
8,609,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,436 UART: [ldev] --
10,407,857 UART: [fwproc] Wait for Commands...
10,410,927 UART: [fwproc] Recv command 0x46574c44
10,412,971 UART: [fwproc] Recv'd Img size: 114360 bytes
13,812,016 UART: ROM Fatal Error: 0x000B0016
13,815,149 >>> mbox cmd response: failed
13,815,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,815,917 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,217 UART:
192,584 UART: Running Caliptra ROM ...
193,739 UART:
193,912 UART: [state] CFI Enabled
262,177 UART: [state] LifecycleState = Unprovisioned
264,575 UART: [state] DebugLocked = No
267,361 UART: [state] WD Timer not started. Device not locked for debugging
271,237 UART: [kat] SHA2-256
461,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,900 UART: [kat] ++
472,381 UART: [kat] sha1
483,692 UART: [kat] SHA2-256
486,755 UART: [kat] SHA2-384
492,691 UART: [kat] SHA2-512-ACC
495,307 UART: [kat] ECC-384
2,949,202 UART: [kat] HMAC-384Kdf
2,970,402 UART: [kat] LMS
3,502,187 UART: [kat] --
3,505,947 UART: [cold-reset] ++
3,507,394 UART: [fht] FHT @ 0x50003400
3,518,878 UART: [idev] ++
3,519,552 UART: [idev] CDI.KEYID = 6
3,520,513 UART: [idev] SUBJECT.KEYID = 7
3,521,727 UART: [idev] UDS.KEYID = 0
6,099,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,243,753 UART: [idev] Erasing UDS.KEYID = 0
6,245,224 UART: [idev] Sha1 KeyId Algorithm
6,246,466 UART: [idev] --
6,246,957 UART: [ldev] ++
6,247,438 UART: [ldev] CDI.KEYID = 6
6,248,353 UART: [ldev] SUBJECT.KEYID = 5
6,249,484 UART: [ldev] AUTHORITY.KEYID = 7
6,250,672 UART: [ldev] FE.KEYID = 1
6,251,543 UART: [ldev] Erasing FE.KEYID = 1
8,607,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,737 UART: [ldev] --
10,413,496 UART: [fwproc] Wait for Commands...
10,415,863 UART: [fwproc] Recv command 0x46574c44
10,418,122 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,190 UART: ROM Fatal Error: 0x000B0016
13,865,818 >>> mbox cmd response: failed
13,866,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,866,566 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
6,016,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,295,520 >>> mbox cmd response: failed
14,296,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,296,527 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,278 UART:
192,651 UART: Running Caliptra ROM ...
193,812 UART:
603,560 UART: [state] CFI Enabled
615,920 UART: [state] LifecycleState = Unprovisioned
618,267 UART: [state] DebugLocked = No
621,207 UART: [state] WD Timer not started. Device not locked for debugging
625,764 UART: [kat] SHA2-256
815,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,433 UART: [kat] ++
826,967 UART: [kat] sha1
838,606 UART: [kat] SHA2-256
841,630 UART: [kat] SHA2-384
848,163 UART: [kat] SHA2-512-ACC
850,771 UART: [kat] ECC-384
3,291,375 UART: [kat] HMAC-384Kdf
3,304,689 UART: [kat] LMS
3,836,524 UART: [kat] --
3,841,751 UART: [cold-reset] ++
3,843,248 UART: [fht] FHT @ 0x50003400
3,854,455 UART: [idev] ++
3,855,184 UART: [idev] CDI.KEYID = 6
3,856,067 UART: [idev] SUBJECT.KEYID = 7
3,857,331 UART: [idev] UDS.KEYID = 0
6,448,596 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,593,171 UART: [idev] Erasing UDS.KEYID = 0
6,594,619 UART: [idev] Sha1 KeyId Algorithm
6,595,863 UART: [idev] --
6,596,355 UART: [ldev] ++
6,596,841 UART: [ldev] CDI.KEYID = 6
6,597,800 UART: [ldev] SUBJECT.KEYID = 5
6,598,909 UART: [ldev] AUTHORITY.KEYID = 7
6,600,378 UART: [ldev] FE.KEYID = 1
6,601,270 UART: [ldev] Erasing FE.KEYID = 1
8,859,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,202 UART: [ldev] --
10,651,008 UART: [fwproc] Wait for Commands...
10,654,027 UART: [fwproc] Recv command 0x46574c44
10,656,291 UART: [fwproc] Recv'd Img size: 114360 bytes
14,103,290 UART: ROM Fatal Error: 0x000B0016
14,106,985 >>> mbox cmd response: failed
14,107,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,107,642 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
6,335,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,497,568 >>> mbox cmd response: failed
14,498,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,756 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,315 UART: [kat] SHA2-256
892,253 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,772 UART: [kat] HMAC-384Kdf
907,490 UART: [kat] LMS
1,475,686 UART: [kat] --
1,476,829 UART: [cold-reset] ++
1,477,295 UART: [fht] Storing FHT @ 0x50003400
1,479,936 UART: [idev] ++
1,480,104 UART: [idev] CDI.KEYID = 6
1,480,464 UART: [idev] SUBJECT.KEYID = 7
1,480,888 UART: [idev] UDS.KEYID = 0
1,481,233 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,896 UART: [idev] Erasing UDS.KEYID = 0
1,505,280 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,858 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,546,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,420 UART: [ldev] --
1,585,811 UART: [fwproc] Waiting for Commands...
1,586,492 UART: [fwproc] Received command 0x46574c44
1,587,283 UART: [fwproc] Received Image of size 114360 bytes
2,883,766 UART: ROM Fatal Error: 0x000B0016
2,884,923 >>> mbox cmd response: failed
2,884,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,929 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,995 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,737,246 >>> mbox cmd response: failed
2,737,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,252 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,299 UART: [state] LifecycleState = Unprovisioned
84,954 UART: [state] DebugLocked = No
85,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,162 UART: [kat] SHA2-256
881,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,208 UART: [kat] ++
885,360 UART: [kat] sha1
889,518 UART: [kat] SHA2-256
891,456 UART: [kat] SHA2-384
894,369 UART: [kat] SHA2-512-ACC
896,270 UART: [kat] ECC-384
902,161 UART: [kat] HMAC-384Kdf
906,861 UART: [kat] LMS
1,475,057 UART: [kat] --
1,475,806 UART: [cold-reset] ++
1,476,330 UART: [fht] Storing FHT @ 0x50003400
1,479,129 UART: [idev] ++
1,479,297 UART: [idev] CDI.KEYID = 6
1,479,657 UART: [idev] SUBJECT.KEYID = 7
1,480,081 UART: [idev] UDS.KEYID = 0
1,480,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,943 UART: [idev] Erasing UDS.KEYID = 0
1,504,659 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,301 UART: [idev] --
1,514,448 UART: [ldev] ++
1,514,616 UART: [ldev] CDI.KEYID = 6
1,514,979 UART: [ldev] SUBJECT.KEYID = 5
1,515,405 UART: [ldev] AUTHORITY.KEYID = 7
1,515,868 UART: [ldev] FE.KEYID = 1
1,521,254 UART: [ldev] Erasing FE.KEYID = 1
1,546,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,885 UART: [ldev] --
1,585,316 UART: [fwproc] Waiting for Commands...
1,586,155 UART: [fwproc] Received command 0x46574c44
1,586,946 UART: [fwproc] Received Image of size 114360 bytes
2,883,279 UART: ROM Fatal Error: 0x000B0016
2,884,436 >>> mbox cmd response: failed
2,884,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,442 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,844 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,653 >>> mbox cmd response: failed
2,738,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,659 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,227 UART: [cold-reset] ++
1,172,793 UART: [fht] FHT @ 0x50003400
1,175,390 UART: [idev] ++
1,175,558 UART: [idev] CDI.KEYID = 6
1,175,918 UART: [idev] SUBJECT.KEYID = 7
1,176,342 UART: [idev] UDS.KEYID = 0
1,176,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,334 UART: [idev] Erasing UDS.KEYID = 0
1,201,121 UART: [idev] Sha1 KeyId Algorithm
1,209,515 UART: [idev] --
1,210,673 UART: [ldev] ++
1,210,841 UART: [ldev] CDI.KEYID = 6
1,211,204 UART: [ldev] SUBJECT.KEYID = 5
1,211,630 UART: [ldev] AUTHORITY.KEYID = 7
1,212,093 UART: [ldev] FE.KEYID = 1
1,217,323 UART: [ldev] Erasing FE.KEYID = 1
1,243,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,658 UART: [fwproc] Wait for Commands...
1,283,368 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,125 UART: ROM Fatal Error: 0x000B0016
2,581,282 >>> mbox cmd response: failed
2,581,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,288 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,436,035 >>> mbox cmd response: failed
2,436,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,041 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
893,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,450 UART: [kat] ++
897,602 UART: [kat] sha1
901,796 UART: [kat] SHA2-256
903,736 UART: [kat] SHA2-384
906,279 UART: [kat] SHA2-512-ACC
908,180 UART: [kat] ECC-384
918,055 UART: [kat] HMAC-384Kdf
922,653 UART: [kat] LMS
1,170,981 UART: [kat] --
1,171,872 UART: [cold-reset] ++
1,172,354 UART: [fht] FHT @ 0x50003400
1,175,237 UART: [idev] ++
1,175,405 UART: [idev] CDI.KEYID = 6
1,175,765 UART: [idev] SUBJECT.KEYID = 7
1,176,189 UART: [idev] UDS.KEYID = 0
1,176,534 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,787 UART: [idev] Erasing UDS.KEYID = 0
1,200,626 UART: [idev] Sha1 KeyId Algorithm
1,209,016 UART: [idev] --
1,210,062 UART: [ldev] ++
1,210,230 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,019 UART: [ldev] AUTHORITY.KEYID = 7
1,211,482 UART: [ldev] FE.KEYID = 1
1,216,708 UART: [ldev] Erasing FE.KEYID = 1
1,243,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,148 UART: [ldev] --
1,282,513 UART: [fwproc] Wait for Commands...
1,283,175 UART: [fwproc] Recv command 0x46574c44
1,283,903 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,884 UART: ROM Fatal Error: 0x000B0016
2,582,041 >>> mbox cmd response: failed
2,582,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,047 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,436,534 >>> mbox cmd response: failed
2,436,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,540 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,977 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,174,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,317 UART: [idev] --
1,208,336 UART: [ldev] ++
1,208,504 UART: [ldev] CDI.KEYID = 6
1,208,868 UART: [ldev] SUBJECT.KEYID = 5
1,209,295 UART: [ldev] AUTHORITY.KEYID = 7
1,209,758 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,496 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,529 UART: ROM Fatal Error: 0x000B0016
2,578,686 >>> mbox cmd response: failed
2,578,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,692 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,498 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,430,677 >>> mbox cmd response: failed
2,430,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,683 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,960 UART: [kat] ++
896,112 UART: [kat] sha1
900,428 UART: [kat] SHA2-256
902,368 UART: [kat] SHA2-384
905,159 UART: [kat] SHA2-512-ACC
907,060 UART: [kat] ECC-384
917,061 UART: [kat] HMAC-384Kdf
921,723 UART: [kat] LMS
1,170,035 UART: [kat] --
1,170,822 UART: [cold-reset] ++
1,171,374 UART: [fht] FHT @ 0x50003400
1,173,844 UART: [idev] ++
1,174,012 UART: [idev] CDI.KEYID = 6
1,174,373 UART: [idev] SUBJECT.KEYID = 7
1,174,798 UART: [idev] UDS.KEYID = 0
1,175,144 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,122 UART: [idev] Erasing UDS.KEYID = 0
1,200,244 UART: [idev] Sha1 KeyId Algorithm
1,209,120 UART: [idev] --
1,210,359 UART: [ldev] ++
1,210,527 UART: [ldev] CDI.KEYID = 6
1,210,891 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,217,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,359 UART: [ldev] --
1,282,811 UART: [fwproc] Wait for Commands...
1,283,406 UART: [fwproc] Recv command 0x46574c44
1,284,139 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,956 UART: ROM Fatal Error: 0x000B0016
2,582,113 >>> mbox cmd response: failed
2,582,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,119 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,478 >>> mbox cmd response: failed
2,433,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,484 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,091 UART:
192,468 UART: Running Caliptra ROM ...
193,613 UART:
193,762 UART: [state] CFI Enabled
262,766 UART: [state] LifecycleState = Production
264,567 UART: [state] DebugLocked = No
267,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,910 UART: [kat] SHA2-256
441,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,173 UART: [kat] ++
452,708 UART: [kat] sha1
464,726 UART: [kat] SHA2-256
467,411 UART: [kat] SHA2-384
473,441 UART: [kat] SHA2-512-ACC
475,778 UART: [kat] ECC-384
2,768,530 UART: [kat] HMAC-384Kdf
2,789,872 UART: [kat] LMS
3,980,157 UART: [kat] --
3,985,007 UART: [cold-reset] ++
3,986,311 UART: [fht] Storing FHT @ 0x50003400
3,999,099 UART: [idev] ++
3,999,665 UART: [idev] CDI.KEYID = 6
4,000,639 UART: [idev] SUBJECT.KEYID = 7
4,001,858 UART: [idev] UDS.KEYID = 0
4,005,025 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,148,715 UART: [idev] Erasing UDS.KEYID = 0
7,338,872 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,575 UART: [idev] --
7,363,927 UART: [ldev] ++
7,364,500 UART: [ldev] CDI.KEYID = 6
7,365,518 UART: [ldev] SUBJECT.KEYID = 5
7,366,684 UART: [ldev] AUTHORITY.KEYID = 7
7,367,916 UART: [ldev] FE.KEYID = 1
7,416,321 UART: [ldev] Erasing FE.KEYID = 1
10,751,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,899 UART: [ldev] --
13,133,225 UART: [fwproc] Waiting for Commands...
13,135,757 UART: [fwproc] Received command 0x46574c44
13,137,950 UART: [fwproc] Received Image of size 114036 bytes
13,236,588 UART: ROM Fatal Error: 0x000B0007
13,240,113 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,797,909 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,937,170 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,568 UART:
192,936 UART: Running Caliptra ROM ...
194,020 UART:
603,663 UART: [state] CFI Enabled
618,728 UART: [state] LifecycleState = Production
620,567 UART: [state] DebugLocked = No
621,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,045 UART: [kat] SHA2-256
796,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,343 UART: [kat] ++
807,931 UART: [kat] sha1
820,075 UART: [kat] SHA2-256
822,760 UART: [kat] SHA2-384
828,895 UART: [kat] SHA2-512-ACC
831,290 UART: [kat] ECC-384
3,115,486 UART: [kat] HMAC-384Kdf
3,126,691 UART: [kat] LMS
4,316,756 UART: [kat] --
4,320,482 UART: [cold-reset] ++
4,322,196 UART: [fht] Storing FHT @ 0x50003400
4,334,383 UART: [idev] ++
4,334,954 UART: [idev] CDI.KEYID = 6
4,335,895 UART: [idev] SUBJECT.KEYID = 7
4,337,163 UART: [idev] UDS.KEYID = 0
4,340,166 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,616 UART: [idev] Erasing UDS.KEYID = 0
7,623,087 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,390 UART: [idev] --
7,647,844 UART: [ldev] ++
7,648,428 UART: [ldev] CDI.KEYID = 6
7,649,372 UART: [ldev] SUBJECT.KEYID = 5
7,650,586 UART: [ldev] AUTHORITY.KEYID = 7
7,651,827 UART: [ldev] FE.KEYID = 1
7,663,150 UART: [ldev] Erasing FE.KEYID = 1
10,950,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,757 UART: [ldev] --
13,311,553 UART: [fwproc] Waiting for Commands...
13,314,507 UART: [fwproc] Received command 0x46574c44
13,316,716 UART: [fwproc] Received Image of size 114036 bytes
13,413,688 UART: ROM Fatal Error: 0x000B0007
13,417,215 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,127,900 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,167,882 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,108 UART:
192,491 UART: Running Caliptra ROM ...
193,657 UART:
193,816 UART: [state] CFI Enabled
266,297 UART: [state] LifecycleState = Production
268,071 UART: [state] DebugLocked = No
269,406 UART: [state] WD Timer not started. Device not locked for debugging
273,989 UART: [kat] SHA2-256
453,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,664 UART: [kat] ++
465,208 UART: [kat] sha1
477,174 UART: [kat] SHA2-256
480,185 UART: [kat] SHA2-384
487,082 UART: [kat] SHA2-512-ACC
490,020 UART: [kat] ECC-384
2,951,616 UART: [kat] HMAC-384Kdf
2,973,863 UART: [kat] LMS
3,503,296 UART: [kat] --
3,507,174 UART: [cold-reset] ++
3,508,134 UART: [fht] FHT @ 0x50003400
3,519,858 UART: [idev] ++
3,520,420 UART: [idev] CDI.KEYID = 6
3,521,385 UART: [idev] SUBJECT.KEYID = 7
3,522,542 UART: [idev] UDS.KEYID = 0
3,525,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,365 UART: [idev] Erasing UDS.KEYID = 0
6,027,887 UART: [idev] Sha1 KeyId Algorithm
6,051,499 UART: [idev] --
6,056,125 UART: [ldev] ++
6,056,706 UART: [ldev] CDI.KEYID = 6
6,057,618 UART: [ldev] SUBJECT.KEYID = 5
6,058,699 UART: [ldev] AUTHORITY.KEYID = 7
6,060,043 UART: [ldev] FE.KEYID = 1
6,105,233 UART: [ldev] Erasing FE.KEYID = 1
8,605,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,022 UART: [ldev] --
10,418,964 UART: [fwproc] Wait for Commands...
10,420,465 UART: [fwproc] Recv command 0x46574c44
10,422,562 UART: [fwproc] Recv'd Img size: 114360 bytes
10,522,539 UART: ROM Fatal Error: 0x000B0007
10,525,629 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,184 UART:
192,547 UART: Running Caliptra ROM ...
193,743 UART:
193,896 UART: [state] CFI Enabled
262,145 UART: [state] LifecycleState = Production
264,345 UART: [state] DebugLocked = No
267,082 UART: [state] WD Timer not started. Device not locked for debugging
272,119 UART: [kat] SHA2-256
462,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,789 UART: [kat] ++
473,265 UART: [kat] sha1
484,738 UART: [kat] SHA2-256
487,798 UART: [kat] SHA2-384
494,810 UART: [kat] SHA2-512-ACC
497,424 UART: [kat] ECC-384
2,948,581 UART: [kat] HMAC-384Kdf
2,972,269 UART: [kat] LMS
3,504,046 UART: [kat] --
3,509,466 UART: [cold-reset] ++
3,511,140 UART: [fht] FHT @ 0x50003400
3,523,148 UART: [idev] ++
3,523,823 UART: [idev] CDI.KEYID = 6
3,524,807 UART: [idev] SUBJECT.KEYID = 7
3,526,023 UART: [idev] UDS.KEYID = 0
3,528,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,690 UART: [idev] Erasing UDS.KEYID = 0
6,028,947 UART: [idev] Sha1 KeyId Algorithm
6,050,512 UART: [idev] --
6,056,325 UART: [ldev] ++
6,057,015 UART: [ldev] CDI.KEYID = 6
6,057,905 UART: [ldev] SUBJECT.KEYID = 5
6,059,124 UART: [ldev] AUTHORITY.KEYID = 7
6,060,261 UART: [ldev] FE.KEYID = 1
6,100,728 UART: [ldev] Erasing FE.KEYID = 1
8,607,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,105 UART: [ldev] --
10,416,667 UART: [fwproc] Wait for Commands...
10,419,519 UART: [fwproc] Recv command 0x46574c44
10,421,779 UART: [fwproc] Recv'd Img size: 114360 bytes
10,551,963 UART: ROM Fatal Error: 0x000B0007
10,555,596 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,440,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,357,167 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,486 UART:
192,850 UART: Running Caliptra ROM ...
194,044 UART:
603,675 UART: [state] CFI Enabled
616,757 UART: [state] LifecycleState = Production
619,011 UART: [state] DebugLocked = No
621,794 UART: [state] WD Timer not started. Device not locked for debugging
626,707 UART: [kat] SHA2-256
816,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,346 UART: [kat] ++
827,868 UART: [kat] sha1
839,021 UART: [kat] SHA2-256
842,044 UART: [kat] SHA2-384
848,027 UART: [kat] SHA2-512-ACC
850,640 UART: [kat] ECC-384
3,289,704 UART: [kat] HMAC-384Kdf
3,301,829 UART: [kat] LMS
3,833,665 UART: [kat] --
3,838,216 UART: [cold-reset] ++
3,840,851 UART: [fht] FHT @ 0x50003400
3,852,645 UART: [idev] ++
3,853,362 UART: [idev] CDI.KEYID = 6
3,854,251 UART: [idev] SUBJECT.KEYID = 7
3,855,464 UART: [idev] UDS.KEYID = 0
3,858,174 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,852 UART: [idev] Erasing UDS.KEYID = 0
6,330,110 UART: [idev] Sha1 KeyId Algorithm
6,352,928 UART: [idev] --
6,357,679 UART: [ldev] ++
6,358,361 UART: [ldev] CDI.KEYID = 6
6,359,274 UART: [ldev] SUBJECT.KEYID = 5
6,360,429 UART: [ldev] AUTHORITY.KEYID = 7
6,361,662 UART: [ldev] FE.KEYID = 1
6,373,331 UART: [ldev] Erasing FE.KEYID = 1
8,851,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,265 UART: [ldev] --
10,642,174 UART: [fwproc] Wait for Commands...
10,643,729 UART: [fwproc] Recv command 0x46574c44
10,646,057 UART: [fwproc] Recv'd Img size: 114360 bytes
10,777,577 UART: ROM Fatal Error: 0x000B0007
10,781,259 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,760,890 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,584,625 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,630 UART: [state] LifecycleState = Production
85,237 UART: [state] DebugLocked = No
85,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,563 UART: [kat] SHA2-256
881,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,609 UART: [kat] ++
885,761 UART: [kat] sha1
890,015 UART: [kat] SHA2-256
891,953 UART: [kat] SHA2-384
894,798 UART: [kat] SHA2-512-ACC
896,699 UART: [kat] ECC-384
902,458 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,325 UART: [cold-reset] ++
1,476,881 UART: [fht] Storing FHT @ 0x50003400
1,479,712 UART: [idev] ++
1,479,880 UART: [idev] CDI.KEYID = 6
1,480,240 UART: [idev] SUBJECT.KEYID = 7
1,480,664 UART: [idev] UDS.KEYID = 0
1,481,009 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,138 UART: [idev] --
1,515,163 UART: [ldev] ++
1,515,331 UART: [ldev] CDI.KEYID = 6
1,515,694 UART: [ldev] SUBJECT.KEYID = 5
1,516,120 UART: [ldev] AUTHORITY.KEYID = 7
1,516,583 UART: [ldev] FE.KEYID = 1
1,521,871 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,196 UART: [ldev] --
1,586,523 UART: [fwproc] Waiting for Commands...
1,587,350 UART: [fwproc] Received command 0x46574c44
1,588,141 UART: [fwproc] Received Image of size 114360 bytes
1,637,456 UART: ROM Fatal Error: 0x000B0007
1,638,613 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,030 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Production
86,320 UART: [state] DebugLocked = No
86,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,063 UART: [kat] HMAC-384Kdf
907,663 UART: [kat] LMS
1,475,859 UART: [kat] --
1,476,936 UART: [cold-reset] ++
1,477,368 UART: [fht] Storing FHT @ 0x50003400
1,480,175 UART: [idev] ++
1,480,343 UART: [idev] CDI.KEYID = 6
1,480,703 UART: [idev] SUBJECT.KEYID = 7
1,481,127 UART: [idev] UDS.KEYID = 0
1,481,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,361 UART: [idev] Erasing UDS.KEYID = 0
1,505,947 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,731 UART: [idev] --
1,515,638 UART: [ldev] ++
1,515,806 UART: [ldev] CDI.KEYID = 6
1,516,169 UART: [ldev] SUBJECT.KEYID = 5
1,516,595 UART: [ldev] AUTHORITY.KEYID = 7
1,517,058 UART: [ldev] FE.KEYID = 1
1,522,240 UART: [ldev] Erasing FE.KEYID = 1
1,548,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,181 UART: [ldev] --
1,587,638 UART: [fwproc] Waiting for Commands...
1,588,397 UART: [fwproc] Received command 0x46574c44
1,589,188 UART: [fwproc] Received Image of size 114360 bytes
1,638,393 UART: ROM Fatal Error: 0x000B0007
1,639,550 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,490,393 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Production
85,361 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
893,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,213 UART: [kat] ++
897,365 UART: [kat] sha1
901,461 UART: [kat] SHA2-256
903,401 UART: [kat] SHA2-384
906,238 UART: [kat] SHA2-512-ACC
908,139 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,841 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,688 UART: [idev] ++
1,174,856 UART: [idev] CDI.KEYID = 6
1,175,216 UART: [idev] SUBJECT.KEYID = 7
1,175,640 UART: [idev] UDS.KEYID = 0
1,175,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,538 UART: [idev] Erasing UDS.KEYID = 0
1,200,395 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,358 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,282,952 UART: [fwproc] Recv command 0x46574c44
1,283,680 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,715 UART: ROM Fatal Error: 0x000B0007
1,333,872 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,375 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,435 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Production
85,754 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,443 UART: [kat] SHA2-256
893,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,218 UART: [kat] ++
897,370 UART: [kat] sha1
901,636 UART: [kat] SHA2-256
903,576 UART: [kat] SHA2-384
906,239 UART: [kat] SHA2-512-ACC
908,140 UART: [kat] ECC-384
917,891 UART: [kat] HMAC-384Kdf
922,693 UART: [kat] LMS
1,171,021 UART: [kat] --
1,171,884 UART: [cold-reset] ++
1,172,224 UART: [fht] FHT @ 0x50003400
1,175,117 UART: [idev] ++
1,175,285 UART: [idev] CDI.KEYID = 6
1,175,645 UART: [idev] SUBJECT.KEYID = 7
1,176,069 UART: [idev] UDS.KEYID = 0
1,176,414 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,823 UART: [idev] Erasing UDS.KEYID = 0
1,200,926 UART: [idev] Sha1 KeyId Algorithm
1,209,332 UART: [idev] --
1,210,380 UART: [ldev] ++
1,210,548 UART: [ldev] CDI.KEYID = 6
1,210,911 UART: [ldev] SUBJECT.KEYID = 5
1,211,337 UART: [ldev] AUTHORITY.KEYID = 7
1,211,800 UART: [ldev] FE.KEYID = 1
1,217,036 UART: [ldev] Erasing FE.KEYID = 1
1,243,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,404 UART: [ldev] --
1,282,875 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 114360 bytes
1,333,562 UART: ROM Fatal Error: 0x000B0007
1,334,719 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,190,228 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Production
85,525 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,039 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,280,930 UART: [fwproc] Wait for Commands...
1,281,545 UART: [fwproc] Recv command 0x46574c44
1,282,278 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,011 UART: ROM Fatal Error: 0x000B0007
1,332,168 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,881 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Production
86,080 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,174,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,199,748 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,223 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,423 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,953 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,816 UART: ROM Fatal Error: 0x000B0007
1,333,973 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,532 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,269 UART:
192,614 UART: Running Caliptra ROM ...
193,794 UART:
193,948 UART: [state] CFI Enabled
266,223 UART: [state] LifecycleState = Production
268,074 UART: [state] DebugLocked = No
270,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,990 UART: [kat] SHA2-256
444,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,194 UART: [kat] ++
455,683 UART: [kat] sha1
466,725 UART: [kat] SHA2-256
469,416 UART: [kat] SHA2-384
476,259 UART: [kat] SHA2-512-ACC
478,596 UART: [kat] ECC-384
2,766,132 UART: [kat] HMAC-384Kdf
2,778,064 UART: [kat] LMS
3,968,349 UART: [kat] --
3,973,420 UART: [cold-reset] ++
3,974,465 UART: [fht] Storing FHT @ 0x50003400
3,986,444 UART: [idev] ++
3,987,015 UART: [idev] CDI.KEYID = 6
3,987,985 UART: [idev] SUBJECT.KEYID = 7
3,989,206 UART: [idev] UDS.KEYID = 0
3,992,012 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,047 UART: [idev] Erasing UDS.KEYID = 0
7,324,476 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,890 UART: [idev] --
7,350,384 UART: [ldev] ++
7,350,960 UART: [ldev] CDI.KEYID = 6
7,351,937 UART: [ldev] SUBJECT.KEYID = 5
7,353,098 UART: [ldev] AUTHORITY.KEYID = 7
7,354,403 UART: [ldev] FE.KEYID = 1
7,400,250 UART: [ldev] Erasing FE.KEYID = 1
10,736,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,191 UART: [ldev] --
13,114,878 UART: [fwproc] Waiting for Commands...
13,117,251 UART: [fwproc] Received command 0x46574c44
13,119,440 UART: [fwproc] Received Image of size 114036 bytes
13,216,941 UART: ROM Fatal Error: 0x000B0007
13,220,457 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,788,074 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,964,480 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,586 UART:
192,960 UART: Running Caliptra ROM ...
194,078 UART:
603,927 UART: [state] CFI Enabled
617,793 UART: [state] LifecycleState = Production
619,574 UART: [state] DebugLocked = No
622,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,686 UART: [kat] SHA2-256
797,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,937 UART: [kat] ++
808,529 UART: [kat] sha1
820,169 UART: [kat] SHA2-256
822,898 UART: [kat] SHA2-384
828,706 UART: [kat] SHA2-512-ACC
831,050 UART: [kat] ECC-384
3,115,559 UART: [kat] HMAC-384Kdf
3,127,478 UART: [kat] LMS
4,317,618 UART: [kat] --
4,322,808 UART: [cold-reset] ++
4,324,092 UART: [fht] Storing FHT @ 0x50003400
4,334,677 UART: [idev] ++
4,335,250 UART: [idev] CDI.KEYID = 6
4,336,193 UART: [idev] SUBJECT.KEYID = 7
4,337,487 UART: [idev] UDS.KEYID = 0
4,340,457 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,330 UART: [idev] Erasing UDS.KEYID = 0
7,625,541 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,707 UART: [idev] --
7,649,603 UART: [ldev] ++
7,650,239 UART: [ldev] CDI.KEYID = 6
7,651,122 UART: [ldev] SUBJECT.KEYID = 5
7,652,342 UART: [ldev] AUTHORITY.KEYID = 7
7,653,631 UART: [ldev] FE.KEYID = 1
7,664,309 UART: [ldev] Erasing FE.KEYID = 1
10,951,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,216 UART: [ldev] --
13,309,193 UART: [fwproc] Waiting for Commands...
13,311,632 UART: [fwproc] Received command 0x46574c44
13,313,866 UART: [fwproc] Received Image of size 114036 bytes
13,412,886 UART: ROM Fatal Error: 0x000B0007
13,416,401 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,521 writing to cptra_bootfsm_go
4,128,543 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,166,753 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,426 UART:
192,809 UART: Running Caliptra ROM ...
193,929 UART:
194,074 UART: [state] CFI Enabled
263,967 UART: [state] LifecycleState = Production
265,687 UART: [state] DebugLocked = No
267,710 UART: [state] WD Timer not started. Device not locked for debugging
272,192 UART: [kat] SHA2-256
451,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,851 UART: [kat] ++
463,402 UART: [kat] sha1
474,830 UART: [kat] SHA2-256
477,831 UART: [kat] SHA2-384
484,184 UART: [kat] SHA2-512-ACC
487,166 UART: [kat] ECC-384
2,950,064 UART: [kat] HMAC-384Kdf
2,974,945 UART: [kat] LMS
3,504,402 UART: [kat] --
3,508,505 UART: [cold-reset] ++
3,510,061 UART: [fht] FHT @ 0x50003400
3,521,052 UART: [idev] ++
3,521,620 UART: [idev] CDI.KEYID = 6
3,522,527 UART: [idev] SUBJECT.KEYID = 7
3,523,741 UART: [idev] UDS.KEYID = 0
3,526,516 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,579 UART: [idev] Erasing UDS.KEYID = 0
6,030,795 UART: [idev] Sha1 KeyId Algorithm
6,053,055 UART: [idev] --
6,058,035 UART: [ldev] ++
6,058,607 UART: [ldev] CDI.KEYID = 6
6,059,500 UART: [ldev] SUBJECT.KEYID = 5
6,060,666 UART: [ldev] AUTHORITY.KEYID = 7
6,061,961 UART: [ldev] FE.KEYID = 1
6,103,854 UART: [ldev] Erasing FE.KEYID = 1
8,610,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,746 UART: [ldev] --
10,417,468 UART: [fwproc] Wait for Commands...
10,419,893 UART: [fwproc] Recv command 0x46574c44
10,422,013 UART: [fwproc] Recv'd Img size: 114360 bytes
10,522,010 UART: ROM Fatal Error: 0x000B0007
10,525,102 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,149 UART:
192,520 UART: Running Caliptra ROM ...
193,706 UART:
193,860 UART: [state] CFI Enabled
264,652 UART: [state] LifecycleState = Production
266,841 UART: [state] DebugLocked = No
269,574 UART: [state] WD Timer not started. Device not locked for debugging
273,356 UART: [kat] SHA2-256
463,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,821 UART: [kat] ++
474,356 UART: [kat] sha1
485,733 UART: [kat] SHA2-256
488,748 UART: [kat] SHA2-384
495,056 UART: [kat] SHA2-512-ACC
497,654 UART: [kat] ECC-384
2,950,204 UART: [kat] HMAC-384Kdf
2,972,070 UART: [kat] LMS
3,503,859 UART: [kat] --
3,509,505 UART: [cold-reset] ++
3,510,900 UART: [fht] FHT @ 0x50003400
3,523,944 UART: [idev] ++
3,524,625 UART: [idev] CDI.KEYID = 6
3,525,567 UART: [idev] SUBJECT.KEYID = 7
3,526,834 UART: [idev] UDS.KEYID = 0
3,529,781 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,673,896 UART: [idev] Erasing UDS.KEYID = 0
6,033,049 UART: [idev] Sha1 KeyId Algorithm
6,056,887 UART: [idev] --
6,061,973 UART: [ldev] ++
6,062,668 UART: [ldev] CDI.KEYID = 6
6,063,584 UART: [ldev] SUBJECT.KEYID = 5
6,064,822 UART: [ldev] AUTHORITY.KEYID = 7
6,066,004 UART: [ldev] FE.KEYID = 1
6,099,300 UART: [ldev] Erasing FE.KEYID = 1
8,605,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,665 UART: [ldev] --
10,411,769 UART: [fwproc] Wait for Commands...
10,414,798 UART: [fwproc] Recv command 0x46574c44
10,417,100 UART: [fwproc] Recv'd Img size: 114360 bytes
10,550,651 UART: ROM Fatal Error: 0x000B0007
10,554,291 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,440,252 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,379,031 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,512 UART:
192,862 UART: Running Caliptra ROM ...
194,062 UART:
603,920 UART: [state] CFI Enabled
617,392 UART: [state] LifecycleState = Production
619,607 UART: [state] DebugLocked = No
621,838 UART: [state] WD Timer not started. Device not locked for debugging
626,846 UART: [kat] SHA2-256
816,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,502 UART: [kat] ++
828,008 UART: [kat] sha1
840,240 UART: [kat] SHA2-256
843,256 UART: [kat] SHA2-384
848,911 UART: [kat] SHA2-512-ACC
851,518 UART: [kat] ECC-384
3,294,292 UART: [kat] HMAC-384Kdf
3,307,094 UART: [kat] LMS
3,838,935 UART: [kat] --
3,844,984 UART: [cold-reset] ++
3,847,134 UART: [fht] FHT @ 0x50003400
3,858,923 UART: [idev] ++
3,859,601 UART: [idev] CDI.KEYID = 6
3,860,556 UART: [idev] SUBJECT.KEYID = 7
3,861,716 UART: [idev] UDS.KEYID = 0
3,864,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,219 UART: [idev] Erasing UDS.KEYID = 0
6,341,794 UART: [idev] Sha1 KeyId Algorithm
6,364,271 UART: [idev] --
6,368,917 UART: [ldev] ++
6,369,597 UART: [ldev] CDI.KEYID = 6
6,370,615 UART: [ldev] SUBJECT.KEYID = 5
6,371,721 UART: [ldev] AUTHORITY.KEYID = 7
6,372,950 UART: [ldev] FE.KEYID = 1
6,384,512 UART: [ldev] Erasing FE.KEYID = 1
8,866,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,077 UART: [ldev] --
10,653,707 UART: [fwproc] Wait for Commands...
10,656,895 UART: [fwproc] Recv command 0x46574c44
10,659,208 UART: [fwproc] Recv'd Img size: 114360 bytes
10,790,872 UART: ROM Fatal Error: 0x000B0007
10,794,507 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,755,340 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,580,263 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,682 UART: [state] LifecycleState = Production
85,289 UART: [state] DebugLocked = No
85,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,539 UART: [kat] SHA2-256
881,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,585 UART: [kat] ++
885,737 UART: [kat] sha1
889,949 UART: [kat] SHA2-256
891,887 UART: [kat] SHA2-384
894,608 UART: [kat] SHA2-512-ACC
896,509 UART: [kat] ECC-384
902,126 UART: [kat] HMAC-384Kdf
906,568 UART: [kat] LMS
1,474,764 UART: [kat] --
1,475,615 UART: [cold-reset] ++
1,476,057 UART: [fht] Storing FHT @ 0x50003400
1,478,996 UART: [idev] ++
1,479,164 UART: [idev] CDI.KEYID = 6
1,479,524 UART: [idev] SUBJECT.KEYID = 7
1,479,948 UART: [idev] UDS.KEYID = 0
1,480,293 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,126 UART: [idev] Erasing UDS.KEYID = 0
1,504,906 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,519 UART: [ldev] ++
1,514,687 UART: [ldev] CDI.KEYID = 6
1,515,050 UART: [ldev] SUBJECT.KEYID = 5
1,515,476 UART: [ldev] AUTHORITY.KEYID = 7
1,515,939 UART: [ldev] FE.KEYID = 1
1,521,189 UART: [ldev] Erasing FE.KEYID = 1
1,546,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,516 UART: [ldev] --
1,585,921 UART: [fwproc] Waiting for Commands...
1,586,552 UART: [fwproc] Received command 0x46574c44
1,587,343 UART: [fwproc] Received Image of size 114360 bytes
1,636,806 UART: ROM Fatal Error: 0x000B0007
1,637,963 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,490,444 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Production
86,428 UART: [state] DebugLocked = No
87,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,718 UART: [kat] SHA2-256
882,649 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,764 UART: [kat] ++
886,916 UART: [kat] sha1
891,362 UART: [kat] SHA2-256
893,300 UART: [kat] SHA2-384
896,053 UART: [kat] SHA2-512-ACC
897,954 UART: [kat] ECC-384
903,285 UART: [kat] HMAC-384Kdf
907,911 UART: [kat] LMS
1,476,107 UART: [kat] --
1,476,982 UART: [cold-reset] ++
1,477,324 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,165 UART: [idev] Erasing UDS.KEYID = 0
1,506,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,091 UART: [idev] --
1,516,328 UART: [ldev] ++
1,516,496 UART: [ldev] CDI.KEYID = 6
1,516,859 UART: [ldev] SUBJECT.KEYID = 5
1,517,285 UART: [ldev] AUTHORITY.KEYID = 7
1,517,748 UART: [ldev] FE.KEYID = 1
1,523,274 UART: [ldev] Erasing FE.KEYID = 1
1,549,127 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,137 UART: [ldev] --
1,588,564 UART: [fwproc] Waiting for Commands...
1,589,211 UART: [fwproc] Received command 0x46574c44
1,590,002 UART: [fwproc] Received Image of size 114360 bytes
1,638,999 UART: ROM Fatal Error: 0x000B0007
1,640,156 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,492,097 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Production
85,983 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
893,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,801 UART: [kat] ++
897,953 UART: [kat] sha1
902,247 UART: [kat] SHA2-256
904,187 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,566 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,217 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,316 UART: [idev] ++
1,175,484 UART: [idev] CDI.KEYID = 6
1,175,844 UART: [idev] SUBJECT.KEYID = 7
1,176,268 UART: [idev] UDS.KEYID = 0
1,176,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,201,375 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,905 UART: [ldev] ++
1,211,073 UART: [ldev] CDI.KEYID = 6
1,211,436 UART: [ldev] SUBJECT.KEYID = 5
1,211,862 UART: [ldev] AUTHORITY.KEYID = 7
1,212,325 UART: [ldev] FE.KEYID = 1
1,217,575 UART: [ldev] Erasing FE.KEYID = 1
1,244,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,127 UART: [ldev] --
1,283,480 UART: [fwproc] Wait for Commands...
1,284,238 UART: [fwproc] Recv command 0x46574c44
1,284,966 UART: [fwproc] Recv'd Img size: 114360 bytes
1,334,383 UART: ROM Fatal Error: 0x000B0007
1,335,540 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,657 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Production
86,046 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,455 UART: [kat] SHA2-512-ACC
908,356 UART: [kat] ECC-384
917,785 UART: [kat] HMAC-384Kdf
922,401 UART: [kat] LMS
1,170,729 UART: [kat] --
1,171,552 UART: [cold-reset] ++
1,172,088 UART: [fht] FHT @ 0x50003400
1,174,627 UART: [idev] ++
1,174,795 UART: [idev] CDI.KEYID = 6
1,175,155 UART: [idev] SUBJECT.KEYID = 7
1,175,579 UART: [idev] UDS.KEYID = 0
1,175,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,599 UART: [idev] Erasing UDS.KEYID = 0
1,200,520 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,209,936 UART: [ldev] ++
1,210,104 UART: [ldev] CDI.KEYID = 6
1,210,467 UART: [ldev] SUBJECT.KEYID = 5
1,210,893 UART: [ldev] AUTHORITY.KEYID = 7
1,211,356 UART: [ldev] FE.KEYID = 1
1,216,788 UART: [ldev] Erasing FE.KEYID = 1
1,243,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,178 UART: [ldev] --
1,282,509 UART: [fwproc] Wait for Commands...
1,283,225 UART: [fwproc] Recv command 0x46574c44
1,283,953 UART: [fwproc] Recv'd Img size: 114360 bytes
1,333,106 UART: ROM Fatal Error: 0x000B0007
1,334,263 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,354 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,191,308 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Production
86,013 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,943 UART: [idev] --
1,208,978 UART: [ldev] ++
1,209,146 UART: [ldev] CDI.KEYID = 6
1,209,510 UART: [ldev] SUBJECT.KEYID = 5
1,209,937 UART: [ldev] AUTHORITY.KEYID = 7
1,210,400 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,241,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,722 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,729 UART: [fwproc] Recv command 0x46574c44
1,282,462 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,083 UART: ROM Fatal Error: 0x000B0007
1,332,240 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,842 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,789 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Production
85,804 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,174,416 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,628 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,204 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,611 UART: [ldev] Erasing FE.KEYID = 1
1,242,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,608 UART: ROM Fatal Error: 0x000B0007
1,333,765 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,913 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,098 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,134 UART:
192,501 UART: Running Caliptra ROM ...
193,602 UART:
193,749 UART: [state] CFI Enabled
263,885 UART: [state] LifecycleState = Production
265,699 UART: [state] DebugLocked = No
268,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,801 UART: [kat] SHA2-256
443,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,050 UART: [kat] ++
454,607 UART: [kat] sha1
466,304 UART: [kat] SHA2-256
468,993 UART: [kat] SHA2-384
475,293 UART: [kat] SHA2-512-ACC
477,687 UART: [kat] ECC-384
2,767,144 UART: [kat] HMAC-384Kdf
2,780,198 UART: [kat] LMS
3,970,501 UART: [kat] --
3,974,393 UART: [cold-reset] ++
3,975,948 UART: [fht] Storing FHT @ 0x50003400
3,987,648 UART: [idev] ++
3,988,219 UART: [idev] CDI.KEYID = 6
3,989,156 UART: [idev] SUBJECT.KEYID = 7
3,990,366 UART: [idev] UDS.KEYID = 0
3,993,073 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,129 UART: [idev] Erasing UDS.KEYID = 0
7,326,785 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,606 UART: [idev] --
7,352,336 UART: [ldev] ++
7,352,912 UART: [ldev] CDI.KEYID = 6
7,353,935 UART: [ldev] SUBJECT.KEYID = 5
7,355,100 UART: [ldev] AUTHORITY.KEYID = 7
7,356,395 UART: [ldev] FE.KEYID = 1
7,402,004 UART: [ldev] Erasing FE.KEYID = 1
10,733,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,414 UART: [ldev] --
13,094,883 UART: [fwproc] Waiting for Commands...
13,096,608 UART: [fwproc] Received command 0x46574c44
13,098,820 UART: [fwproc] Received Image of size 114036 bytes
13,192,445 UART: ROM Fatal Error: 0x000B0005
13,195,964 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,786,672 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,913,257 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,524 UART:
192,895 UART: Running Caliptra ROM ...
193,995 UART:
603,619 UART: [state] CFI Enabled
622,511 UART: [state] LifecycleState = Production
624,327 UART: [state] DebugLocked = No
626,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,567 UART: [kat] SHA2-256
801,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,833 UART: [kat] ++
812,286 UART: [kat] sha1
822,354 UART: [kat] SHA2-256
825,062 UART: [kat] SHA2-384
830,725 UART: [kat] SHA2-512-ACC
833,067 UART: [kat] ECC-384
3,117,654 UART: [kat] HMAC-384Kdf
3,128,375 UART: [kat] LMS
4,318,435 UART: [kat] --
4,321,749 UART: [cold-reset] ++
4,322,669 UART: [fht] Storing FHT @ 0x50003400
4,334,160 UART: [idev] ++
4,334,725 UART: [idev] CDI.KEYID = 6
4,335,691 UART: [idev] SUBJECT.KEYID = 7
4,336,961 UART: [idev] UDS.KEYID = 0
4,339,702 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,624 UART: [idev] Erasing UDS.KEYID = 0
7,622,494 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,651 UART: [idev] --
7,648,730 UART: [ldev] ++
7,649,321 UART: [ldev] CDI.KEYID = 6
7,650,214 UART: [ldev] SUBJECT.KEYID = 5
7,651,437 UART: [ldev] AUTHORITY.KEYID = 7
7,652,786 UART: [ldev] FE.KEYID = 1
7,663,661 UART: [ldev] Erasing FE.KEYID = 1
10,947,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,432 UART: [ldev] --
13,305,780 UART: [fwproc] Waiting for Commands...
13,308,364 UART: [fwproc] Received command 0x46574c44
13,310,550 UART: [fwproc] Received Image of size 114036 bytes
13,399,088 UART: ROM Fatal Error: 0x000B0005
13,402,574 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,128,929 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,150,742 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,252 UART:
192,627 UART: Running Caliptra ROM ...
193,754 UART:
193,897 UART: [state] CFI Enabled
266,672 UART: [state] LifecycleState = Production
268,439 UART: [state] DebugLocked = No
270,039 UART: [state] WD Timer not started. Device not locked for debugging
273,909 UART: [kat] SHA2-256
453,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,638 UART: [kat] ++
465,184 UART: [kat] sha1
476,400 UART: [kat] SHA2-256
479,425 UART: [kat] SHA2-384
485,945 UART: [kat] SHA2-512-ACC
488,891 UART: [kat] ECC-384
2,947,647 UART: [kat] HMAC-384Kdf
2,970,790 UART: [kat] LMS
3,500,218 UART: [kat] --
3,502,983 UART: [cold-reset] ++
3,504,918 UART: [fht] FHT @ 0x50003400
3,516,767 UART: [idev] ++
3,517,337 UART: [idev] CDI.KEYID = 6
3,518,304 UART: [idev] SUBJECT.KEYID = 7
3,519,463 UART: [idev] UDS.KEYID = 0
3,522,172 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,212 UART: [idev] Erasing UDS.KEYID = 0
6,024,833 UART: [idev] Sha1 KeyId Algorithm
6,048,993 UART: [idev] --
6,053,505 UART: [ldev] ++
6,054,083 UART: [ldev] CDI.KEYID = 6
6,055,003 UART: [ldev] SUBJECT.KEYID = 5
6,056,169 UART: [ldev] AUTHORITY.KEYID = 7
6,057,401 UART: [ldev] FE.KEYID = 1
6,099,330 UART: [ldev] Erasing FE.KEYID = 1
8,603,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,526 UART: [ldev] --
10,412,298 UART: [fwproc] Wait for Commands...
10,414,698 UART: [fwproc] Recv command 0x46574c44
10,416,758 UART: [fwproc] Recv'd Img size: 114360 bytes
10,503,277 UART: ROM Fatal Error: 0x000B0005
10,506,409 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,272 UART:
192,629 UART: Running Caliptra ROM ...
193,824 UART:
193,977 UART: [state] CFI Enabled
266,245 UART: [state] LifecycleState = Production
268,499 UART: [state] DebugLocked = No
271,345 UART: [state] WD Timer not started. Device not locked for debugging
275,196 UART: [kat] SHA2-256
465,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,828 UART: [kat] ++
476,284 UART: [kat] sha1
486,245 UART: [kat] SHA2-256
489,260 UART: [kat] SHA2-384
496,108 UART: [kat] SHA2-512-ACC
498,716 UART: [kat] ECC-384
2,947,607 UART: [kat] HMAC-384Kdf
2,972,362 UART: [kat] LMS
3,504,157 UART: [kat] --
3,507,498 UART: [cold-reset] ++
3,509,931 UART: [fht] FHT @ 0x50003400
3,520,904 UART: [idev] ++
3,521,613 UART: [idev] CDI.KEYID = 6
3,522,540 UART: [idev] SUBJECT.KEYID = 7
3,523,777 UART: [idev] UDS.KEYID = 0
3,526,806 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,748 UART: [idev] Erasing UDS.KEYID = 0
6,027,770 UART: [idev] Sha1 KeyId Algorithm
6,049,395 UART: [idev] --
6,054,419 UART: [ldev] ++
6,055,102 UART: [ldev] CDI.KEYID = 6
6,056,022 UART: [ldev] SUBJECT.KEYID = 5
6,057,185 UART: [ldev] AUTHORITY.KEYID = 7
6,058,417 UART: [ldev] FE.KEYID = 1
6,089,599 UART: [ldev] Erasing FE.KEYID = 1
8,596,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,799 UART: [ldev] --
10,402,442 UART: [fwproc] Wait for Commands...
10,403,955 UART: [fwproc] Recv command 0x46574c44
10,406,282 UART: [fwproc] Recv'd Img size: 114360 bytes
10,528,993 UART: ROM Fatal Error: 0x000B0005
10,532,669 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,421,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,310,046 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,477 UART:
192,824 UART: Running Caliptra ROM ...
194,022 UART:
603,611 UART: [state] CFI Enabled
619,494 UART: [state] LifecycleState = Production
621,752 UART: [state] DebugLocked = No
624,433 UART: [state] WD Timer not started. Device not locked for debugging
628,185 UART: [kat] SHA2-256
817,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,642 UART: [kat] ++
829,231 UART: [kat] sha1
840,009 UART: [kat] SHA2-256
843,019 UART: [kat] SHA2-384
849,217 UART: [kat] SHA2-512-ACC
851,855 UART: [kat] ECC-384
3,294,686 UART: [kat] HMAC-384Kdf
3,308,236 UART: [kat] LMS
3,840,086 UART: [kat] --
3,847,024 UART: [cold-reset] ++
3,849,017 UART: [fht] FHT @ 0x50003400
3,861,511 UART: [idev] ++
3,862,248 UART: [idev] CDI.KEYID = 6
3,863,150 UART: [idev] SUBJECT.KEYID = 7
3,864,321 UART: [idev] UDS.KEYID = 0
3,867,234 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,011,527 UART: [idev] Erasing UDS.KEYID = 0
6,342,783 UART: [idev] Sha1 KeyId Algorithm
6,365,321 UART: [idev] --
6,371,150 UART: [ldev] ++
6,371,832 UART: [ldev] CDI.KEYID = 6
6,372,763 UART: [ldev] SUBJECT.KEYID = 5
6,373,926 UART: [ldev] AUTHORITY.KEYID = 7
6,375,156 UART: [ldev] FE.KEYID = 1
6,386,401 UART: [ldev] Erasing FE.KEYID = 1
8,863,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,201 UART: [ldev] --
10,656,847 UART: [fwproc] Wait for Commands...
10,659,917 UART: [fwproc] Recv command 0x46574c44
10,662,178 UART: [fwproc] Recv'd Img size: 114360 bytes
10,786,146 UART: ROM Fatal Error: 0x000B0005
10,789,781 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,806 writing to cptra_bootfsm_go
3,756,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,578,960 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Production
85,687 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,496 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,476,215 UART: [cold-reset] ++
1,476,785 UART: [fht] Storing FHT @ 0x50003400
1,479,350 UART: [idev] ++
1,479,518 UART: [idev] CDI.KEYID = 6
1,479,878 UART: [idev] SUBJECT.KEYID = 7
1,480,302 UART: [idev] UDS.KEYID = 0
1,480,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,478 UART: [idev] Erasing UDS.KEYID = 0
1,505,274 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,858 UART: [idev] --
1,514,907 UART: [ldev] ++
1,515,075 UART: [ldev] CDI.KEYID = 6
1,515,438 UART: [ldev] SUBJECT.KEYID = 5
1,515,864 UART: [ldev] AUTHORITY.KEYID = 7
1,516,327 UART: [ldev] FE.KEYID = 1
1,521,227 UART: [ldev] Erasing FE.KEYID = 1
1,546,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,966 UART: [ldev] --
1,586,349 UART: [fwproc] Waiting for Commands...
1,587,116 UART: [fwproc] Received command 0x46574c44
1,587,907 UART: [fwproc] Received Image of size 114360 bytes
1,632,934 UART: ROM Fatal Error: 0x000B0005
1,634,091 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,485,946 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Production
85,812 UART: [state] DebugLocked = No
86,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,924 UART: [kat] SHA2-256
881,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,970 UART: [kat] ++
886,122 UART: [kat] sha1
890,226 UART: [kat] SHA2-256
892,164 UART: [kat] SHA2-384
894,823 UART: [kat] SHA2-512-ACC
896,724 UART: [kat] ECC-384
902,397 UART: [kat] HMAC-384Kdf
906,937 UART: [kat] LMS
1,475,133 UART: [kat] --
1,475,994 UART: [cold-reset] ++
1,476,356 UART: [fht] Storing FHT @ 0x50003400
1,479,155 UART: [idev] ++
1,479,323 UART: [idev] CDI.KEYID = 6
1,479,683 UART: [idev] SUBJECT.KEYID = 7
1,480,107 UART: [idev] UDS.KEYID = 0
1,480,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,085 UART: [idev] Erasing UDS.KEYID = 0
1,505,047 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,593 UART: [idev] --
1,514,732 UART: [ldev] ++
1,514,900 UART: [ldev] CDI.KEYID = 6
1,515,263 UART: [ldev] SUBJECT.KEYID = 5
1,515,689 UART: [ldev] AUTHORITY.KEYID = 7
1,516,152 UART: [ldev] FE.KEYID = 1
1,521,244 UART: [ldev] Erasing FE.KEYID = 1
1,546,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,057 UART: [ldev] --
1,586,318 UART: [fwproc] Waiting for Commands...
1,587,075 UART: [fwproc] Received command 0x46574c44
1,587,866 UART: [fwproc] Received Image of size 114360 bytes
1,632,913 UART: ROM Fatal Error: 0x000B0005
1,634,070 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,486,345 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Production
85,443 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
892,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,067 UART: [kat] ++
897,219 UART: [kat] sha1
901,295 UART: [kat] SHA2-256
903,235 UART: [kat] SHA2-384
906,068 UART: [kat] SHA2-512-ACC
907,969 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,368 UART: [kat] LMS
1,170,696 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,600 UART: [idev] ++
1,174,768 UART: [idev] CDI.KEYID = 6
1,175,128 UART: [idev] SUBJECT.KEYID = 7
1,175,552 UART: [idev] UDS.KEYID = 0
1,175,897 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,989 UART: [idev] Sha1 KeyId Algorithm
1,209,319 UART: [idev] --
1,210,265 UART: [ldev] ++
1,210,433 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,243,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,211 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,142 UART: [fwproc] Recv command 0x46574c44
1,283,870 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,153 UART: ROM Fatal Error: 0x000B0005
1,330,310 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,249 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,429 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Production
86,156 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,504 UART: [fht] FHT @ 0x50003400
1,175,139 UART: [idev] ++
1,175,307 UART: [idev] CDI.KEYID = 6
1,175,667 UART: [idev] SUBJECT.KEYID = 7
1,176,091 UART: [idev] UDS.KEYID = 0
1,176,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,201 UART: [idev] Erasing UDS.KEYID = 0
1,201,424 UART: [idev] Sha1 KeyId Algorithm
1,209,854 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,816 UART: [ldev] Erasing FE.KEYID = 1
1,244,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,540 UART: [ldev] --
1,283,943 UART: [fwproc] Wait for Commands...
1,284,533 UART: [fwproc] Recv command 0x46574c44
1,285,261 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,874 UART: ROM Fatal Error: 0x000B0005
1,331,031 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,678 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Production
85,615 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
903,984 UART: [kat] SHA2-512-ACC
905,885 UART: [kat] ECC-384
915,446 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,317 UART: [cold-reset] ++
1,169,743 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,173,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,133 UART: [idev] Erasing UDS.KEYID = 0
1,198,045 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,208,204 UART: [ldev] ++
1,208,372 UART: [ldev] CDI.KEYID = 6
1,208,736 UART: [ldev] SUBJECT.KEYID = 5
1,209,163 UART: [ldev] AUTHORITY.KEYID = 7
1,209,626 UART: [ldev] FE.KEYID = 1
1,214,770 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,748 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,125 UART: ROM Fatal Error: 0x000B0005
1,328,282 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,726 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,657 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Production
85,884 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,174,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,517 UART: [ldev] Erasing FE.KEYID = 1
1,241,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,563 UART: [ldev] --
1,280,887 UART: [fwproc] Wait for Commands...
1,281,650 UART: [fwproc] Recv command 0x46574c44
1,282,383 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,054 UART: ROM Fatal Error: 0x000B0005
1,328,211 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,536 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,070 UART:
192,468 UART: Running Caliptra ROM ...
193,608 UART:
193,754 UART: [state] CFI Enabled
266,556 UART: [state] LifecycleState = Production
268,374 UART: [state] DebugLocked = No
270,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,225 UART: [kat] SHA2-256
444,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,411 UART: [kat] ++
455,942 UART: [kat] sha1
465,739 UART: [kat] SHA2-256
468,429 UART: [kat] SHA2-384
474,727 UART: [kat] SHA2-512-ACC
477,120 UART: [kat] ECC-384
2,769,701 UART: [kat] HMAC-384Kdf
2,801,555 UART: [kat] LMS
3,991,874 UART: [kat] --
3,996,637 UART: [cold-reset] ++
3,999,275 UART: [fht] Storing FHT @ 0x50003400
4,011,036 UART: [idev] ++
4,011,608 UART: [idev] CDI.KEYID = 6
4,012,545 UART: [idev] SUBJECT.KEYID = 7
4,013,814 UART: [idev] UDS.KEYID = 0
4,016,774 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,160,273 UART: [idev] Erasing UDS.KEYID = 0
7,345,697 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,648 UART: [idev] --
7,371,033 UART: [ldev] ++
7,371,605 UART: [ldev] CDI.KEYID = 6
7,372,543 UART: [ldev] SUBJECT.KEYID = 5
7,373,813 UART: [ldev] AUTHORITY.KEYID = 7
7,375,102 UART: [ldev] FE.KEYID = 1
7,423,501 UART: [ldev] Erasing FE.KEYID = 1
10,758,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,912 UART: [ldev] --
13,138,216 UART: [fwproc] Waiting for Commands...
13,140,930 UART: [fwproc] Received command 0x46574c44
13,143,120 UART: [fwproc] Received Image of size 114036 bytes
13,233,066 UART: ROM Fatal Error: 0x000B0005
13,236,582 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,786,991 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,930,104 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,586 UART:
192,945 UART: Running Caliptra ROM ...
194,136 UART:
603,775 UART: [state] CFI Enabled
619,315 UART: [state] LifecycleState = Production
621,147 UART: [state] DebugLocked = No
623,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,128 UART: [kat] SHA2-256
798,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,401 UART: [kat] ++
809,884 UART: [kat] sha1
819,954 UART: [kat] SHA2-256
822,647 UART: [kat] SHA2-384
828,142 UART: [kat] SHA2-512-ACC
830,539 UART: [kat] ECC-384
3,115,177 UART: [kat] HMAC-384Kdf
3,127,036 UART: [kat] LMS
4,317,143 UART: [kat] --
4,322,049 UART: [cold-reset] ++
4,323,787 UART: [fht] Storing FHT @ 0x50003400
4,334,945 UART: [idev] ++
4,335,512 UART: [idev] CDI.KEYID = 6
4,336,531 UART: [idev] SUBJECT.KEYID = 7
4,337,686 UART: [idev] UDS.KEYID = 0
4,340,430 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,859 UART: [idev] Erasing UDS.KEYID = 0
7,624,522 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,001 UART: [idev] --
7,649,821 UART: [ldev] ++
7,650,390 UART: [ldev] CDI.KEYID = 6
7,651,330 UART: [ldev] SUBJECT.KEYID = 5
7,652,544 UART: [ldev] AUTHORITY.KEYID = 7
7,653,832 UART: [ldev] FE.KEYID = 1
7,664,265 UART: [ldev] Erasing FE.KEYID = 1
10,950,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,349 UART: [ldev] --
13,312,825 UART: [fwproc] Waiting for Commands...
13,315,300 UART: [fwproc] Received command 0x46574c44
13,317,487 UART: [fwproc] Received Image of size 114036 bytes
13,410,241 UART: ROM Fatal Error: 0x000B0005
13,413,768 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,129,049 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,152,155 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,096 UART:
192,464 UART: Running Caliptra ROM ...
193,638 UART:
193,817 UART: [state] CFI Enabled
260,846 UART: [state] LifecycleState = Production
262,595 UART: [state] DebugLocked = No
264,136 UART: [state] WD Timer not started. Device not locked for debugging
267,038 UART: [kat] SHA2-256
446,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,736 UART: [kat] ++
458,219 UART: [kat] sha1
468,664 UART: [kat] SHA2-256
471,726 UART: [kat] SHA2-384
478,081 UART: [kat] SHA2-512-ACC
481,016 UART: [kat] ECC-384
2,926,477 UART: [kat] HMAC-384Kdf
2,950,165 UART: [kat] LMS
3,479,633 UART: [kat] --
3,484,816 UART: [cold-reset] ++
3,487,201 UART: [fht] FHT @ 0x50003400
3,497,807 UART: [idev] ++
3,498,370 UART: [idev] CDI.KEYID = 6
3,499,330 UART: [idev] SUBJECT.KEYID = 7
3,500,544 UART: [idev] UDS.KEYID = 0
3,503,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,647,239 UART: [idev] Erasing UDS.KEYID = 0
6,002,575 UART: [idev] Sha1 KeyId Algorithm
6,024,756 UART: [idev] --
6,028,404 UART: [ldev] ++
6,028,982 UART: [ldev] CDI.KEYID = 6
6,029,902 UART: [ldev] SUBJECT.KEYID = 5
6,031,122 UART: [ldev] AUTHORITY.KEYID = 7
6,032,356 UART: [ldev] FE.KEYID = 1
6,079,243 UART: [ldev] Erasing FE.KEYID = 1
8,582,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,961 UART: [ldev] --
10,388,815 UART: [fwproc] Wait for Commands...
10,391,298 UART: [fwproc] Recv command 0x46574c44
10,393,348 UART: [fwproc] Recv'd Img size: 114360 bytes
10,483,453 UART: ROM Fatal Error: 0x000B0005
10,486,539 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,162 UART:
192,520 UART: Running Caliptra ROM ...
193,733 UART:
193,900 UART: [state] CFI Enabled
267,117 UART: [state] LifecycleState = Production
269,319 UART: [state] DebugLocked = No
271,021 UART: [state] WD Timer not started. Device not locked for debugging
275,396 UART: [kat] SHA2-256
465,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,083 UART: [kat] ++
476,931 UART: [kat] sha1
487,986 UART: [kat] SHA2-256
491,010 UART: [kat] SHA2-384
496,843 UART: [kat] SHA2-512-ACC
499,461 UART: [kat] ECC-384
2,959,871 UART: [kat] HMAC-384Kdf
2,983,530 UART: [kat] LMS
3,515,304 UART: [kat] --
3,518,955 UART: [cold-reset] ++
3,521,409 UART: [fht] FHT @ 0x50003400
3,533,052 UART: [idev] ++
3,533,745 UART: [idev] CDI.KEYID = 6
3,534,817 UART: [idev] SUBJECT.KEYID = 7
3,535,924 UART: [idev] UDS.KEYID = 0
3,538,838 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,682,908 UART: [idev] Erasing UDS.KEYID = 0
6,042,841 UART: [idev] Sha1 KeyId Algorithm
6,064,293 UART: [idev] --
6,069,269 UART: [ldev] ++
6,069,955 UART: [ldev] CDI.KEYID = 6
6,070,868 UART: [ldev] SUBJECT.KEYID = 5
6,072,027 UART: [ldev] AUTHORITY.KEYID = 7
6,073,261 UART: [ldev] FE.KEYID = 1
6,112,862 UART: [ldev] Erasing FE.KEYID = 1
8,620,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,382,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,628 UART: [ldev] --
10,423,949 UART: [fwproc] Wait for Commands...
10,425,670 UART: [fwproc] Recv command 0x46574c44
10,427,982 UART: [fwproc] Recv'd Img size: 114360 bytes
10,550,907 UART: ROM Fatal Error: 0x000B0005
10,554,587 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,439,202 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,346,233 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,355 UART:
192,724 UART: Running Caliptra ROM ...
193,914 UART:
603,538 UART: [state] CFI Enabled
618,274 UART: [state] LifecycleState = Production
620,482 UART: [state] DebugLocked = No
621,754 UART: [state] WD Timer not started. Device not locked for debugging
626,539 UART: [kat] SHA2-256
816,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,224 UART: [kat] ++
827,758 UART: [kat] sha1
838,225 UART: [kat] SHA2-256
841,230 UART: [kat] SHA2-384
847,908 UART: [kat] SHA2-512-ACC
850,524 UART: [kat] ECC-384
3,292,324 UART: [kat] HMAC-384Kdf
3,304,186 UART: [kat] LMS
3,835,976 UART: [kat] --
3,841,914 UART: [cold-reset] ++
3,842,822 UART: [fht] FHT @ 0x50003400
3,854,617 UART: [idev] ++
3,855,290 UART: [idev] CDI.KEYID = 6
3,856,305 UART: [idev] SUBJECT.KEYID = 7
3,857,463 UART: [idev] UDS.KEYID = 0
3,860,213 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,043 UART: [idev] Erasing UDS.KEYID = 0
6,336,882 UART: [idev] Sha1 KeyId Algorithm
6,358,958 UART: [idev] --
6,363,173 UART: [ldev] ++
6,363,857 UART: [ldev] CDI.KEYID = 6
6,364,742 UART: [ldev] SUBJECT.KEYID = 5
6,365,952 UART: [ldev] AUTHORITY.KEYID = 7
6,367,185 UART: [ldev] FE.KEYID = 1
6,376,560 UART: [ldev] Erasing FE.KEYID = 1
8,855,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,578 UART: [ldev] --
10,646,755 UART: [fwproc] Wait for Commands...
10,649,776 UART: [fwproc] Recv command 0x46574c44
10,652,035 UART: [fwproc] Recv'd Img size: 114360 bytes
10,773,579 UART: ROM Fatal Error: 0x000B0005
10,777,265 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,758,254 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,574,493 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Production
86,173 UART: [state] DebugLocked = No
86,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,669 UART: [kat] SHA2-256
892,607 UART: [kat] SHA2-384
895,488 UART: [kat] SHA2-512-ACC
897,389 UART: [kat] ECC-384
903,146 UART: [kat] HMAC-384Kdf
907,754 UART: [kat] LMS
1,475,950 UART: [kat] --
1,476,823 UART: [cold-reset] ++
1,477,253 UART: [fht] Storing FHT @ 0x50003400
1,479,918 UART: [idev] ++
1,480,086 UART: [idev] CDI.KEYID = 6
1,480,446 UART: [idev] SUBJECT.KEYID = 7
1,480,870 UART: [idev] UDS.KEYID = 0
1,481,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,814 UART: [idev] Erasing UDS.KEYID = 0
1,505,366 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,946 UART: [idev] --
1,515,025 UART: [ldev] ++
1,515,193 UART: [ldev] CDI.KEYID = 6
1,515,556 UART: [ldev] SUBJECT.KEYID = 5
1,515,982 UART: [ldev] AUTHORITY.KEYID = 7
1,516,445 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,546,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,362 UART: [ldev] --
1,585,849 UART: [fwproc] Waiting for Commands...
1,586,540 UART: [fwproc] Received command 0x46574c44
1,587,331 UART: [fwproc] Received Image of size 114360 bytes
1,632,092 UART: ROM Fatal Error: 0x000B0005
1,633,249 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,485,736 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Production
86,150 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,664 UART: [kat] SHA2-256
892,602 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,948 UART: [cold-reset] ++
1,477,450 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,277 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,105 UART: [idev] --
1,516,296 UART: [ldev] ++
1,516,464 UART: [ldev] CDI.KEYID = 6
1,516,827 UART: [ldev] SUBJECT.KEYID = 5
1,517,253 UART: [ldev] AUTHORITY.KEYID = 7
1,517,716 UART: [ldev] FE.KEYID = 1
1,523,354 UART: [ldev] Erasing FE.KEYID = 1
1,548,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,449 UART: [ldev] --
1,587,896 UART: [fwproc] Waiting for Commands...
1,588,657 UART: [fwproc] Received command 0x46574c44
1,589,448 UART: [fwproc] Received Image of size 114360 bytes
1,634,607 UART: ROM Fatal Error: 0x000B0005
1,635,764 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,485,657 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Production
85,689 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,416 UART: [kat] SHA2-512-ACC
908,317 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,171,783 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,756 UART: [idev] ++
1,174,924 UART: [idev] CDI.KEYID = 6
1,175,284 UART: [idev] SUBJECT.KEYID = 7
1,175,708 UART: [idev] UDS.KEYID = 0
1,176,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,184 UART: [idev] Erasing UDS.KEYID = 0
1,200,229 UART: [idev] Sha1 KeyId Algorithm
1,208,641 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,274 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,702 UART: [fwproc] Wait for Commands...
1,282,514 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,941 UART: ROM Fatal Error: 0x000B0005
1,330,098 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,971 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,339 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Production
85,730 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
893,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,206 UART: [kat] ++
897,358 UART: [kat] sha1
901,524 UART: [kat] SHA2-256
903,464 UART: [kat] SHA2-384
906,309 UART: [kat] SHA2-512-ACC
908,210 UART: [kat] ECC-384
917,725 UART: [kat] HMAC-384Kdf
922,147 UART: [kat] LMS
1,170,475 UART: [kat] --
1,171,244 UART: [cold-reset] ++
1,171,814 UART: [fht] FHT @ 0x50003400
1,174,319 UART: [idev] ++
1,174,487 UART: [idev] CDI.KEYID = 6
1,174,847 UART: [idev] SUBJECT.KEYID = 7
1,175,271 UART: [idev] UDS.KEYID = 0
1,175,616 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,475 UART: [idev] Erasing UDS.KEYID = 0
1,200,468 UART: [idev] Sha1 KeyId Algorithm
1,208,940 UART: [idev] --
1,209,820 UART: [ldev] ++
1,209,988 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,777 UART: [ldev] AUTHORITY.KEYID = 7
1,211,240 UART: [ldev] FE.KEYID = 1
1,216,726 UART: [ldev] Erasing FE.KEYID = 1
1,243,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,278 UART: [ldev] --
1,282,779 UART: [fwproc] Wait for Commands...
1,283,441 UART: [fwproc] Recv command 0x46574c44
1,284,169 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,414 UART: ROM Fatal Error: 0x000B0005
1,330,571 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,754 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Production
85,653 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,518 UART: [kat] HMAC-384Kdf
920,034 UART: [kat] LMS
1,168,346 UART: [kat] --
1,169,407 UART: [cold-reset] ++
1,169,899 UART: [fht] FHT @ 0x50003400
1,172,365 UART: [idev] ++
1,172,533 UART: [idev] CDI.KEYID = 6
1,172,894 UART: [idev] SUBJECT.KEYID = 7
1,173,319 UART: [idev] UDS.KEYID = 0
1,173,665 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,123 UART: [idev] Erasing UDS.KEYID = 0
1,197,897 UART: [idev] Sha1 KeyId Algorithm
1,206,717 UART: [idev] --
1,207,868 UART: [ldev] ++
1,208,036 UART: [ldev] CDI.KEYID = 6
1,208,400 UART: [ldev] SUBJECT.KEYID = 5
1,208,827 UART: [ldev] AUTHORITY.KEYID = 7
1,209,290 UART: [ldev] FE.KEYID = 1
1,214,586 UART: [ldev] Erasing FE.KEYID = 1
1,240,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,672 UART: [ldev] --
1,280,176 UART: [fwproc] Wait for Commands...
1,280,761 UART: [fwproc] Recv command 0x46574c44
1,281,494 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,715 UART: ROM Fatal Error: 0x000B0005
1,326,872 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,768 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,781 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Production
86,298 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,010 UART: [kat] ++
896,162 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
915,769 UART: [kat] HMAC-384Kdf
920,349 UART: [kat] LMS
1,168,661 UART: [kat] --
1,169,772 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,174,208 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,209,033 UART: [ldev] ++
1,209,201 UART: [ldev] CDI.KEYID = 6
1,209,565 UART: [ldev] SUBJECT.KEYID = 5
1,209,992 UART: [ldev] AUTHORITY.KEYID = 7
1,210,455 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,761 UART: [ldev] --
1,281,199 UART: [fwproc] Wait for Commands...
1,281,978 UART: [fwproc] Recv command 0x46574c44
1,282,711 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,172 UART: ROM Fatal Error: 0x000B0005
1,328,329 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,724 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,973 UART:
192,340 UART: Running Caliptra ROM ...
193,827 UART:
194,006 UART: [state] CFI Enabled
265,080 UART: [state] LifecycleState = Production
266,901 UART: [state] DebugLocked = No
269,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,940 UART: [kat] SHA2-256
443,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,140 UART: [kat] ++
454,643 UART: [kat] sha1
465,249 UART: [kat] SHA2-256
467,928 UART: [kat] SHA2-384
474,118 UART: [kat] SHA2-512-ACC
476,457 UART: [kat] ECC-384
2,768,374 UART: [kat] HMAC-384Kdf
2,779,752 UART: [kat] LMS
3,970,056 UART: [kat] --
3,975,888 UART: [cold-reset] ++
3,977,606 UART: [fht] Storing FHT @ 0x50003400
3,988,604 UART: [idev] ++
3,989,167 UART: [idev] CDI.KEYID = 6
3,990,105 UART: [idev] SUBJECT.KEYID = 7
3,991,370 UART: [idev] UDS.KEYID = 0
3,997,258 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,140,965 UART: [idev] Erasing UDS.KEYID = 0
7,328,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,019 UART: [idev] --
7,354,860 UART: [ldev] ++
7,355,437 UART: [ldev] CDI.KEYID = 6
7,356,479 UART: [ldev] SUBJECT.KEYID = 5
7,357,594 UART: [ldev] AUTHORITY.KEYID = 7
7,358,831 UART: [ldev] FE.KEYID = 1
7,404,282 UART: [ldev] Erasing FE.KEYID = 1
10,734,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,596 UART: [ldev] --
13,099,879 UART: [fwproc] Waiting for Commands...
13,103,172 UART: [fwproc] Received command 0x46574c44
13,105,356 UART: [fwproc] Received Image of size 114036 bytes
13,168,768 UART: ROM Fatal Error: 0x000B0003
13,172,287 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,813,101 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,942,291 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,620 UART:
192,982 UART: Running Caliptra ROM ...
194,167 UART:
603,883 UART: [state] CFI Enabled
619,013 UART: [state] LifecycleState = Production
620,839 UART: [state] DebugLocked = No
623,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,525 UART: [kat] SHA2-256
797,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,820 UART: [kat] ++
808,299 UART: [kat] sha1
818,854 UART: [kat] SHA2-256
821,538 UART: [kat] SHA2-384
827,028 UART: [kat] SHA2-512-ACC
829,424 UART: [kat] ECC-384
3,113,751 UART: [kat] HMAC-384Kdf
3,125,285 UART: [kat] LMS
4,315,432 UART: [kat] --
4,319,909 UART: [cold-reset] ++
4,321,464 UART: [fht] Storing FHT @ 0x50003400
4,332,083 UART: [idev] ++
4,332,648 UART: [idev] CDI.KEYID = 6
4,333,611 UART: [idev] SUBJECT.KEYID = 7
4,334,824 UART: [idev] UDS.KEYID = 0
4,340,547 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,425 UART: [idev] Erasing UDS.KEYID = 0
7,622,313 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,817 UART: [idev] --
7,647,489 UART: [ldev] ++
7,648,069 UART: [ldev] CDI.KEYID = 6
7,649,058 UART: [ldev] SUBJECT.KEYID = 5
7,650,281 UART: [ldev] AUTHORITY.KEYID = 7
7,651,515 UART: [ldev] FE.KEYID = 1
7,664,104 UART: [ldev] Erasing FE.KEYID = 1
10,950,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,766 UART: [ldev] --
13,312,024 UART: [fwproc] Waiting for Commands...
13,315,047 UART: [fwproc] Received command 0x46574c44
13,317,238 UART: [fwproc] Received Image of size 114036 bytes
13,379,289 UART: ROM Fatal Error: 0x000B0003
13,382,808 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
4,131,567 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,121,274 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,136 UART:
192,527 UART: Running Caliptra ROM ...
193,609 UART:
193,749 UART: [state] CFI Enabled
268,474 UART: [state] LifecycleState = Production
270,118 UART: [state] DebugLocked = No
272,046 UART: [state] WD Timer not started. Device not locked for debugging
275,716 UART: [kat] SHA2-256
454,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,392 UART: [kat] ++
466,921 UART: [kat] sha1
477,586 UART: [kat] SHA2-256
480,592 UART: [kat] SHA2-384
487,053 UART: [kat] SHA2-512-ACC
489,988 UART: [kat] ECC-384
2,949,028 UART: [kat] HMAC-384Kdf
2,972,936 UART: [kat] LMS
3,502,347 UART: [kat] --
3,506,732 UART: [cold-reset] ++
3,508,712 UART: [fht] FHT @ 0x50003400
3,520,768 UART: [idev] ++
3,521,329 UART: [idev] CDI.KEYID = 6
3,522,213 UART: [idev] SUBJECT.KEYID = 7
3,523,431 UART: [idev] UDS.KEYID = 0
3,526,446 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,962 UART: [idev] Erasing UDS.KEYID = 0
6,028,775 UART: [idev] Sha1 KeyId Algorithm
6,052,491 UART: [idev] --
6,056,651 UART: [ldev] ++
6,057,225 UART: [ldev] CDI.KEYID = 6
6,058,113 UART: [ldev] SUBJECT.KEYID = 5
6,059,274 UART: [ldev] AUTHORITY.KEYID = 7
6,060,486 UART: [ldev] FE.KEYID = 1
6,103,744 UART: [ldev] Erasing FE.KEYID = 1
8,606,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,801 UART: [ldev] --
10,415,669 UART: [fwproc] Wait for Commands...
10,418,147 UART: [fwproc] Recv command 0x46574c44
10,420,244 UART: [fwproc] Recv'd Img size: 114360 bytes
10,484,770 UART: ROM Fatal Error: 0x000B0003
10,487,870 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,195 UART:
192,567 UART: Running Caliptra ROM ...
193,755 UART:
193,912 UART: [state] CFI Enabled
260,316 UART: [state] LifecycleState = Production
262,546 UART: [state] DebugLocked = No
264,740 UART: [state] WD Timer not started. Device not locked for debugging
268,537 UART: [kat] SHA2-256
458,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,953 UART: [kat] ++
469,426 UART: [kat] sha1
482,304 UART: [kat] SHA2-256
485,321 UART: [kat] SHA2-384
490,600 UART: [kat] SHA2-512-ACC
493,177 UART: [kat] ECC-384
2,946,737 UART: [kat] HMAC-384Kdf
2,970,482 UART: [kat] LMS
3,502,275 UART: [kat] --
3,507,260 UART: [cold-reset] ++
3,509,629 UART: [fht] FHT @ 0x50003400
3,521,419 UART: [idev] ++
3,522,104 UART: [idev] CDI.KEYID = 6
3,523,038 UART: [idev] SUBJECT.KEYID = 7
3,524,253 UART: [idev] UDS.KEYID = 0
3,529,543 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,673,626 UART: [idev] Erasing UDS.KEYID = 0
6,030,232 UART: [idev] Sha1 KeyId Algorithm
6,052,990 UART: [idev] --
6,057,760 UART: [ldev] ++
6,058,505 UART: [ldev] CDI.KEYID = 6
6,059,396 UART: [ldev] SUBJECT.KEYID = 5
6,060,560 UART: [ldev] AUTHORITY.KEYID = 7
6,061,748 UART: [ldev] FE.KEYID = 1
6,099,193 UART: [ldev] Erasing FE.KEYID = 1
8,606,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,899 UART: [ldev] --
10,413,031 UART: [fwproc] Wait for Commands...
10,415,561 UART: [fwproc] Recv command 0x46574c44
10,417,876 UART: [fwproc] Recv'd Img size: 114360 bytes
10,509,952 UART: ROM Fatal Error: 0x000B0003
10,513,635 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,444,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,306,010 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,483 UART:
192,841 UART: Running Caliptra ROM ...
194,015 UART:
603,833 UART: [state] CFI Enabled
619,445 UART: [state] LifecycleState = Production
621,666 UART: [state] DebugLocked = No
623,752 UART: [state] WD Timer not started. Device not locked for debugging
629,261 UART: [kat] SHA2-256
819,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,924 UART: [kat] ++
830,425 UART: [kat] sha1
841,895 UART: [kat] SHA2-256
844,897 UART: [kat] SHA2-384
849,207 UART: [kat] SHA2-512-ACC
851,798 UART: [kat] ECC-384
3,294,044 UART: [kat] HMAC-384Kdf
3,307,460 UART: [kat] LMS
3,839,309 UART: [kat] --
3,844,079 UART: [cold-reset] ++
3,845,975 UART: [fht] FHT @ 0x50003400
3,856,304 UART: [idev] ++
3,856,978 UART: [idev] CDI.KEYID = 6
3,857,991 UART: [idev] SUBJECT.KEYID = 7
3,859,150 UART: [idev] UDS.KEYID = 0
3,864,571 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,425 UART: [idev] Erasing UDS.KEYID = 0
6,337,261 UART: [idev] Sha1 KeyId Algorithm
6,358,925 UART: [idev] --
6,364,048 UART: [ldev] ++
6,364,739 UART: [ldev] CDI.KEYID = 6
6,365,655 UART: [ldev] SUBJECT.KEYID = 5
6,366,866 UART: [ldev] AUTHORITY.KEYID = 7
6,368,040 UART: [ldev] FE.KEYID = 1
6,378,144 UART: [ldev] Erasing FE.KEYID = 1
8,857,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,878 UART: [ldev] --
10,651,738 UART: [fwproc] Wait for Commands...
10,653,889 UART: [fwproc] Recv command 0x46574c44
10,656,141 UART: [fwproc] Recv'd Img size: 114360 bytes
10,745,559 UART: ROM Fatal Error: 0x000B0003
10,749,239 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,759,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,521,488 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Production
85,419 UART: [state] DebugLocked = No
86,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,729 UART: [kat] SHA2-256
881,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,775 UART: [kat] ++
885,927 UART: [kat] sha1
890,293 UART: [kat] SHA2-256
892,231 UART: [kat] SHA2-384
895,016 UART: [kat] SHA2-512-ACC
896,917 UART: [kat] ECC-384
902,848 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,473 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,214 UART: [idev] Erasing UDS.KEYID = 0
1,504,732 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,164 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,520,971 UART: [ldev] Erasing FE.KEYID = 1
1,546,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,138 UART: [ldev] --
1,585,569 UART: [fwproc] Waiting for Commands...
1,586,388 UART: [fwproc] Received command 0x46574c44
1,587,179 UART: [fwproc] Received Image of size 114360 bytes
1,607,155 UART: ROM Fatal Error: 0x000B0003
1,608,312 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,461,947 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Production
86,194 UART: [state] DebugLocked = No
86,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
891,030 UART: [kat] SHA2-256
892,968 UART: [kat] SHA2-384
895,615 UART: [kat] SHA2-512-ACC
897,516 UART: [kat] ECC-384
903,237 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,476,714 UART: [cold-reset] ++
1,477,136 UART: [fht] Storing FHT @ 0x50003400
1,479,923 UART: [idev] ++
1,480,091 UART: [idev] CDI.KEYID = 6
1,480,451 UART: [idev] SUBJECT.KEYID = 7
1,480,875 UART: [idev] UDS.KEYID = 0
1,481,220 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,913 UART: [idev] Erasing UDS.KEYID = 0
1,506,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,737 UART: [idev] --
1,515,744 UART: [ldev] ++
1,515,912 UART: [ldev] CDI.KEYID = 6
1,516,275 UART: [ldev] SUBJECT.KEYID = 5
1,516,701 UART: [ldev] AUTHORITY.KEYID = 7
1,517,164 UART: [ldev] FE.KEYID = 1
1,522,636 UART: [ldev] Erasing FE.KEYID = 1
1,548,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,029 UART: [ldev] --
1,587,300 UART: [fwproc] Waiting for Commands...
1,588,015 UART: [fwproc] Received command 0x46574c44
1,588,806 UART: [fwproc] Received Image of size 114360 bytes
1,609,294 UART: ROM Fatal Error: 0x000B0003
1,610,451 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,462,934 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Production
85,511 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,453 UART: [kat] SHA2-256
903,393 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,920 UART: [kat] HMAC-384Kdf
922,488 UART: [kat] LMS
1,170,816 UART: [kat] --
1,171,621 UART: [cold-reset] ++
1,172,159 UART: [fht] FHT @ 0x50003400
1,174,824 UART: [idev] ++
1,174,992 UART: [idev] CDI.KEYID = 6
1,175,352 UART: [idev] SUBJECT.KEYID = 7
1,175,776 UART: [idev] UDS.KEYID = 0
1,176,121 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,764 UART: [idev] Erasing UDS.KEYID = 0
1,200,751 UART: [idev] Sha1 KeyId Algorithm
1,209,255 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,243,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,586 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,008 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,350 UART: ROM Fatal Error: 0x000B0003
1,305,507 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,691 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,764 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Production
86,284 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,455 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,412 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,655 UART: [idev] ++
1,175,823 UART: [idev] CDI.KEYID = 6
1,176,183 UART: [idev] SUBJECT.KEYID = 7
1,176,607 UART: [idev] UDS.KEYID = 0
1,176,952 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,885 UART: [idev] Erasing UDS.KEYID = 0
1,201,790 UART: [idev] Sha1 KeyId Algorithm
1,210,238 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,174 UART: [ldev] Erasing FE.KEYID = 1
1,244,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,540 UART: [ldev] --
1,283,973 UART: [fwproc] Wait for Commands...
1,284,711 UART: [fwproc] Recv command 0x46574c44
1,285,439 UART: [fwproc] Recv'd Img size: 114360 bytes
1,305,689 UART: ROM Fatal Error: 0x000B0003
1,306,846 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,715 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Production
85,647 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,733 UART: [fht] FHT @ 0x50003400
1,172,547 UART: [idev] ++
1,172,715 UART: [idev] CDI.KEYID = 6
1,173,076 UART: [idev] SUBJECT.KEYID = 7
1,173,501 UART: [idev] UDS.KEYID = 0
1,173,847 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,992 UART: [ldev] --
1,281,384 UART: [fwproc] Wait for Commands...
1,282,005 UART: [fwproc] Recv command 0x46574c44
1,282,738 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,961 UART: ROM Fatal Error: 0x000B0003
1,304,118 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,012 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,241 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Production
85,740 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,480 UART: [idev] ++
1,173,648 UART: [idev] CDI.KEYID = 6
1,174,009 UART: [idev] SUBJECT.KEYID = 7
1,174,434 UART: [idev] UDS.KEYID = 0
1,174,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,208,552 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,207 UART: [ldev] --
1,282,591 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,991 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,032 UART: ROM Fatal Error: 0x000B0003
1,305,189 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,157,408 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,233 UART:
192,594 UART: Running Caliptra ROM ...
193,778 UART:
193,934 UART: [state] CFI Enabled
263,822 UART: [state] LifecycleState = Production
265,631 UART: [state] DebugLocked = No
268,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,421 UART: [kat] SHA2-256
443,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,619 UART: [kat] ++
454,102 UART: [kat] sha1
466,120 UART: [kat] SHA2-256
468,817 UART: [kat] SHA2-384
473,659 UART: [kat] SHA2-512-ACC
475,994 UART: [kat] ECC-384
2,768,710 UART: [kat] HMAC-384Kdf
2,802,264 UART: [kat] LMS
3,992,557 UART: [kat] --
3,996,774 UART: [cold-reset] ++
3,999,358 UART: [fht] Storing FHT @ 0x50003400
4,011,599 UART: [idev] ++
4,012,164 UART: [idev] CDI.KEYID = 6
4,013,138 UART: [idev] SUBJECT.KEYID = 7
4,014,375 UART: [idev] UDS.KEYID = 0
4,017,103 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,160,737 UART: [idev] Erasing UDS.KEYID = 0
7,351,375 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,308 UART: [idev] --
7,377,522 UART: [ldev] ++
7,378,142 UART: [ldev] CDI.KEYID = 6
7,379,051 UART: [ldev] SUBJECT.KEYID = 5
7,380,263 UART: [ldev] AUTHORITY.KEYID = 7
7,381,553 UART: [ldev] FE.KEYID = 1
7,426,234 UART: [ldev] Erasing FE.KEYID = 1
10,755,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,247 UART: [ldev] --
13,121,194 UART: [fwproc] Waiting for Commands...
13,123,081 UART: [fwproc] Received command 0x46574c44
13,125,268 UART: [fwproc] Received Image of size 114036 bytes
13,213,729 UART: ROM Fatal Error: 0x000B0005
13,217,244 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,810,578 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,958,918 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,456 UART:
192,822 UART: Running Caliptra ROM ...
193,960 UART:
603,707 UART: [state] CFI Enabled
618,221 UART: [state] LifecycleState = Production
620,049 UART: [state] DebugLocked = No
622,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,736 UART: [kat] SHA2-256
796,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,024 UART: [kat] ++
807,476 UART: [kat] sha1
819,057 UART: [kat] SHA2-256
821,794 UART: [kat] SHA2-384
828,472 UART: [kat] SHA2-512-ACC
830,858 UART: [kat] ECC-384
3,113,828 UART: [kat] HMAC-384Kdf
3,126,110 UART: [kat] LMS
4,316,199 UART: [kat] --
4,319,829 UART: [cold-reset] ++
4,321,278 UART: [fht] Storing FHT @ 0x50003400
4,332,900 UART: [idev] ++
4,333,524 UART: [idev] CDI.KEYID = 6
4,334,434 UART: [idev] SUBJECT.KEYID = 7
4,335,702 UART: [idev] UDS.KEYID = 0
4,338,785 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,264 UART: [idev] Erasing UDS.KEYID = 0
7,619,263 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,854 UART: [idev] --
7,644,774 UART: [ldev] ++
7,645,355 UART: [ldev] CDI.KEYID = 6
7,646,375 UART: [ldev] SUBJECT.KEYID = 5
7,647,535 UART: [ldev] AUTHORITY.KEYID = 7
7,648,818 UART: [ldev] FE.KEYID = 1
7,659,091 UART: [ldev] Erasing FE.KEYID = 1
10,948,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,311 UART: [ldev] --
13,307,841 UART: [fwproc] Waiting for Commands...
13,310,911 UART: [fwproc] Received command 0x46574c44
13,313,147 UART: [fwproc] Received Image of size 114036 bytes
13,404,803 UART: ROM Fatal Error: 0x000B0005
13,408,326 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,133,934 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,152,695 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,186 UART:
192,537 UART: Running Caliptra ROM ...
193,658 UART:
193,798 UART: [state] CFI Enabled
266,861 UART: [state] LifecycleState = Production
268,649 UART: [state] DebugLocked = No
270,601 UART: [state] WD Timer not started. Device not locked for debugging
273,939 UART: [kat] SHA2-256
453,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,633 UART: [kat] ++
465,124 UART: [kat] sha1
476,884 UART: [kat] SHA2-256
479,900 UART: [kat] SHA2-384
487,123 UART: [kat] SHA2-512-ACC
490,054 UART: [kat] ECC-384
2,949,560 UART: [kat] HMAC-384Kdf
2,970,194 UART: [kat] LMS
3,499,671 UART: [kat] --
3,505,492 UART: [cold-reset] ++
3,507,234 UART: [fht] FHT @ 0x50003400
3,518,117 UART: [idev] ++
3,518,685 UART: [idev] CDI.KEYID = 6
3,519,648 UART: [idev] SUBJECT.KEYID = 7
3,520,806 UART: [idev] UDS.KEYID = 0
3,523,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,771 UART: [idev] Erasing UDS.KEYID = 0
6,028,471 UART: [idev] Sha1 KeyId Algorithm
6,051,669 UART: [idev] --
6,054,648 UART: [ldev] ++
6,055,226 UART: [ldev] CDI.KEYID = 6
6,056,141 UART: [ldev] SUBJECT.KEYID = 5
6,057,305 UART: [ldev] AUTHORITY.KEYID = 7
6,058,536 UART: [ldev] FE.KEYID = 1
6,100,739 UART: [ldev] Erasing FE.KEYID = 1
8,604,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,081 UART: [ldev] --
10,412,062 UART: [fwproc] Wait for Commands...
10,413,998 UART: [fwproc] Recv command 0x46574c44
10,416,040 UART: [fwproc] Recv'd Img size: 114360 bytes
10,502,746 UART: ROM Fatal Error: 0x000B0005
10,505,845 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,228 UART:
192,611 UART: Running Caliptra ROM ...
193,782 UART:
193,935 UART: [state] CFI Enabled
263,393 UART: [state] LifecycleState = Production
265,641 UART: [state] DebugLocked = No
267,667 UART: [state] WD Timer not started. Device not locked for debugging
271,711 UART: [kat] SHA2-256
461,596 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,377 UART: [kat] ++
472,824 UART: [kat] sha1
483,325 UART: [kat] SHA2-256
486,327 UART: [kat] SHA2-384
492,184 UART: [kat] SHA2-512-ACC
494,759 UART: [kat] ECC-384
2,947,011 UART: [kat] HMAC-384Kdf
2,972,667 UART: [kat] LMS
3,504,449 UART: [kat] --
3,509,431 UART: [cold-reset] ++
3,512,073 UART: [fht] FHT @ 0x50003400
3,522,474 UART: [idev] ++
3,523,148 UART: [idev] CDI.KEYID = 6
3,524,119 UART: [idev] SUBJECT.KEYID = 7
3,525,429 UART: [idev] UDS.KEYID = 0
3,528,327 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,673,786 UART: [idev] Erasing UDS.KEYID = 0
6,034,090 UART: [idev] Sha1 KeyId Algorithm
6,057,825 UART: [idev] --
6,062,372 UART: [ldev] ++
6,063,060 UART: [ldev] CDI.KEYID = 6
6,063,948 UART: [ldev] SUBJECT.KEYID = 5
6,065,033 UART: [ldev] AUTHORITY.KEYID = 7
6,066,327 UART: [ldev] FE.KEYID = 1
6,099,995 UART: [ldev] Erasing FE.KEYID = 1
8,608,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,195 UART: [ldev] --
10,417,218 UART: [fwproc] Wait for Commands...
10,420,031 UART: [fwproc] Recv command 0x46574c44
10,422,351 UART: [fwproc] Recv'd Img size: 114360 bytes
10,544,467 UART: ROM Fatal Error: 0x000B0005
10,548,142 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,440,619 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,346,268 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,458 UART:
192,824 UART: Running Caliptra ROM ...
193,915 UART:
603,462 UART: [state] CFI Enabled
616,001 UART: [state] LifecycleState = Production
618,208 UART: [state] DebugLocked = No
619,557 UART: [state] WD Timer not started. Device not locked for debugging
624,013 UART: [kat] SHA2-256
813,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,648 UART: [kat] ++
825,151 UART: [kat] sha1
836,730 UART: [kat] SHA2-256
839,741 UART: [kat] SHA2-384
845,715 UART: [kat] SHA2-512-ACC
848,318 UART: [kat] ECC-384
3,289,637 UART: [kat] HMAC-384Kdf
3,303,590 UART: [kat] LMS
3,835,416 UART: [kat] --
3,839,084 UART: [cold-reset] ++
3,841,360 UART: [fht] FHT @ 0x50003400
3,851,684 UART: [idev] ++
3,852,399 UART: [idev] CDI.KEYID = 6
3,853,344 UART: [idev] SUBJECT.KEYID = 7
3,854,556 UART: [idev] UDS.KEYID = 0
3,857,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,841 UART: [idev] Erasing UDS.KEYID = 0
6,332,460 UART: [idev] Sha1 KeyId Algorithm
6,354,183 UART: [idev] --
6,358,071 UART: [ldev] ++
6,358,756 UART: [ldev] CDI.KEYID = 6
6,359,669 UART: [ldev] SUBJECT.KEYID = 5
6,360,830 UART: [ldev] AUTHORITY.KEYID = 7
6,362,064 UART: [ldev] FE.KEYID = 1
6,373,466 UART: [ldev] Erasing FE.KEYID = 1
8,858,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,698 UART: [ldev] --
10,648,566 UART: [fwproc] Wait for Commands...
10,651,199 UART: [fwproc] Recv command 0x46574c44
10,653,475 UART: [fwproc] Recv'd Img size: 114360 bytes
10,774,557 UART: ROM Fatal Error: 0x000B0005
10,778,243 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,759,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,564,738 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Production
86,091 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,295 UART: [kat] SHA2-256
882,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,341 UART: [kat] ++
886,493 UART: [kat] sha1
890,853 UART: [kat] SHA2-256
892,791 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,410 UART: [kat] LMS
1,475,606 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,877 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,532 UART: [idev] Erasing UDS.KEYID = 0
1,504,536 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,076 UART: [idev] --
1,514,051 UART: [ldev] ++
1,514,219 UART: [ldev] CDI.KEYID = 6
1,514,582 UART: [ldev] SUBJECT.KEYID = 5
1,515,008 UART: [ldev] AUTHORITY.KEYID = 7
1,515,471 UART: [ldev] FE.KEYID = 1
1,520,571 UART: [ldev] Erasing FE.KEYID = 1
1,545,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,538 UART: [ldev] --
1,585,023 UART: [fwproc] Waiting for Commands...
1,585,802 UART: [fwproc] Received command 0x46574c44
1,586,593 UART: [fwproc] Received Image of size 114360 bytes
1,631,924 UART: ROM Fatal Error: 0x000B0005
1,633,081 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,485,298 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Production
86,106 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,158 UART: [kat] SHA2-256
882,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,204 UART: [kat] ++
886,356 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,299 UART: [kat] SHA2-512-ACC
897,200 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,290 UART: [cold-reset] ++
1,476,756 UART: [fht] Storing FHT @ 0x50003400
1,479,527 UART: [idev] ++
1,479,695 UART: [idev] CDI.KEYID = 6
1,480,055 UART: [idev] SUBJECT.KEYID = 7
1,480,479 UART: [idev] UDS.KEYID = 0
1,480,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,175 UART: [idev] Erasing UDS.KEYID = 0
1,504,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,665 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,210 UART: [ldev] Erasing FE.KEYID = 1
1,546,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,561 UART: [ldev] --
1,586,050 UART: [fwproc] Waiting for Commands...
1,586,917 UART: [fwproc] Received command 0x46574c44
1,587,708 UART: [fwproc] Received Image of size 114360 bytes
1,632,843 UART: ROM Fatal Error: 0x000B0005
1,634,000 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,156 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,484,773 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Production
85,495 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
917,844 UART: [kat] HMAC-384Kdf
922,236 UART: [kat] LMS
1,170,564 UART: [kat] --
1,171,495 UART: [cold-reset] ++
1,171,841 UART: [fht] FHT @ 0x50003400
1,174,480 UART: [idev] ++
1,174,648 UART: [idev] CDI.KEYID = 6
1,175,008 UART: [idev] SUBJECT.KEYID = 7
1,175,432 UART: [idev] UDS.KEYID = 0
1,175,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,919 UART: [idev] Sha1 KeyId Algorithm
1,208,495 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,060 UART: [ldev] SUBJECT.KEYID = 5
1,210,486 UART: [ldev] AUTHORITY.KEYID = 7
1,210,949 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,697 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,546 UART: [fwproc] Recv command 0x46574c44
1,282,274 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,493 UART: ROM Fatal Error: 0x000B0005
1,327,650 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,709 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Production
86,164 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,881 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,548 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,651 UART: [idev] ++
1,175,819 UART: [idev] CDI.KEYID = 6
1,176,179 UART: [idev] SUBJECT.KEYID = 7
1,176,603 UART: [idev] UDS.KEYID = 0
1,176,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,053 UART: [idev] Erasing UDS.KEYID = 0
1,202,214 UART: [idev] Sha1 KeyId Algorithm
1,210,618 UART: [idev] --
1,211,746 UART: [ldev] ++
1,211,914 UART: [ldev] CDI.KEYID = 6
1,212,277 UART: [ldev] SUBJECT.KEYID = 5
1,212,703 UART: [ldev] AUTHORITY.KEYID = 7
1,213,166 UART: [ldev] FE.KEYID = 1
1,218,304 UART: [ldev] Erasing FE.KEYID = 1
1,244,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,620 UART: [ldev] --
1,283,913 UART: [fwproc] Wait for Commands...
1,284,573 UART: [fwproc] Recv command 0x46574c44
1,285,301 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,670 UART: ROM Fatal Error: 0x000B0005
1,331,827 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,660 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,734 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Production
85,529 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: [kat] ++
895,185 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
903,890 UART: [kat] SHA2-512-ACC
905,791 UART: [kat] ECC-384
915,508 UART: [kat] HMAC-384Kdf
920,164 UART: [kat] LMS
1,168,476 UART: [kat] --
1,169,363 UART: [cold-reset] ++
1,169,705 UART: [fht] FHT @ 0x50003400
1,172,389 UART: [idev] ++
1,172,557 UART: [idev] CDI.KEYID = 6
1,172,918 UART: [idev] SUBJECT.KEYID = 7
1,173,343 UART: [idev] UDS.KEYID = 0
1,173,689 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,182 UART: [ldev] ++
1,208,350 UART: [ldev] CDI.KEYID = 6
1,208,714 UART: [ldev] SUBJECT.KEYID = 5
1,209,141 UART: [ldev] AUTHORITY.KEYID = 7
1,209,604 UART: [ldev] FE.KEYID = 1
1,214,916 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,460 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0x46574c44
1,281,968 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,245 UART: ROM Fatal Error: 0x000B0005
1,327,402 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,646 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,725 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Production
85,836 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,173,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,198,658 UART: [idev] Sha1 KeyId Algorithm
1,207,526 UART: [idev] --
1,208,505 UART: [ldev] ++
1,208,673 UART: [ldev] CDI.KEYID = 6
1,209,037 UART: [ldev] SUBJECT.KEYID = 5
1,209,464 UART: [ldev] AUTHORITY.KEYID = 7
1,209,927 UART: [ldev] FE.KEYID = 1
1,215,077 UART: [ldev] Erasing FE.KEYID = 1
1,241,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,005 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,094 UART: [fwproc] Recv command 0x46574c44
1,281,827 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,862 UART: ROM Fatal Error: 0x000B0005
1,327,019 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,057 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,640 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
4,878,011 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,628,579 >>> mbox cmd response: failed
16,629,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,629,532 >>> mbox cmd response: failed
16,629,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,630,087 >>> mbox cmd response: failed
Initializing fuses
2,055,562 writing to cptra_bootfsm_go
6,914,747 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,464,924 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
4,880,909 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,650,595 >>> mbox cmd response: failed
16,651,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,651,704 >>> mbox cmd response: failed
16,651,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,652,259 >>> mbox cmd response: failed
Initializing fuses
2,055,460 writing to cptra_bootfsm_go
6,915,055 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,496,989 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,071 writing to cptra_bootfsm_go
5,186,131 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,812,796 >>> mbox cmd response: failed
16,813,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,814,010 >>> mbox cmd response: failed
16,814,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,814,572 >>> mbox cmd response: failed
Initializing fuses
2,063,243 writing to cptra_bootfsm_go
8,233,042 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,677,857 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
5,191,321 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,805,913 >>> mbox cmd response: failed
16,806,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,807,030 >>> mbox cmd response: failed
16,807,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,807,603 >>> mbox cmd response: failed
Initializing fuses
2,064,530 writing to cptra_bootfsm_go
8,241,079 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,683,756 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,443,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,424,914 >>> mbox cmd response: failed
12,425,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,425,876 >>> mbox cmd response: failed
12,426,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,426,457 >>> mbox cmd response: failed
Initializing fuses
2,054,336 writing to cptra_bootfsm_go
5,492,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,336,644 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,474,755 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,456,564 >>> mbox cmd response: failed
12,457,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,601 >>> mbox cmd response: failed
12,457,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,174 >>> mbox cmd response: failed
Initializing fuses
2,057,660 writing to cptra_bootfsm_go
5,507,220 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,385,649 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,465,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,410,284 >>> mbox cmd response: failed
12,411,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,411,413 >>> mbox cmd response: failed
12,411,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,411,982 >>> mbox cmd response: failed
Initializing fuses
2,056,475 writing to cptra_bootfsm_go
5,527,446 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,325,518 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,781,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,633,347 >>> mbox cmd response: failed
12,634,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,634,543 >>> mbox cmd response: failed
12,634,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,635,106 >>> mbox cmd response: failed
Initializing fuses
2,055,449 writing to cptra_bootfsm_go
11,013,172 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,708,388 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,779,621 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,623,680 >>> mbox cmd response: failed
12,624,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,624,588 >>> mbox cmd response: failed
12,624,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,625,143 >>> mbox cmd response: failed
Initializing fuses
2,062,891 writing to cptra_bootfsm_go
11,031,295 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,755,977 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,207,692 >>> mbox cmd response: failed
1,207,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,698 >>> mbox cmd response: failed
1,207,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,841 UART: [kat] SHA2-256
881,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,887 UART: [kat] ++
886,039 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,750 UART: [kat] SHA2-512-ACC
896,651 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
907,022 UART: [kat] LMS
1,475,218 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,733 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,436 UART: [idev] Erasing UDS.KEYID = 0
1,505,094 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,662 UART: [idev] --
1,514,659 UART: [ldev] ++
1,514,827 UART: [ldev] CDI.KEYID = 6
1,515,190 UART: [ldev] SUBJECT.KEYID = 5
1,515,616 UART: [ldev] AUTHORITY.KEYID = 7
1,516,079 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,120 UART: [ldev] --
1,586,539 UART: [fwproc] Waiting for Commands...
1,587,390 UART: [fwproc] Received command 0x46574c44
1,588,181 UART: [fwproc] Received Image of size 114360 bytes
2,886,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,148 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,385 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,206,714 >>> mbox cmd response: failed
1,206,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,720 >>> mbox cmd response: failed
1,206,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,434 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,208,771 >>> mbox cmd response: failed
1,208,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,777 >>> mbox cmd response: failed
1,208,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,031 UART: [kat] HMAC-384Kdf
907,639 UART: [kat] LMS
1,475,835 UART: [kat] --
1,476,392 UART: [cold-reset] ++
1,476,724 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,401 UART: [idev] Erasing UDS.KEYID = 0
1,504,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,513 UART: [idev] --
1,514,496 UART: [ldev] ++
1,514,664 UART: [ldev] CDI.KEYID = 6
1,515,027 UART: [ldev] SUBJECT.KEYID = 5
1,515,453 UART: [ldev] AUTHORITY.KEYID = 7
1,515,916 UART: [ldev] FE.KEYID = 1
1,521,442 UART: [ldev] Erasing FE.KEYID = 1
1,546,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,679 UART: [ldev] --
1,586,176 UART: [fwproc] Waiting for Commands...
1,586,841 UART: [fwproc] Received command 0x46574c44
1,587,632 UART: [fwproc] Received Image of size 114360 bytes
2,885,646 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,545 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,208,351 >>> mbox cmd response: failed
1,208,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,357 >>> mbox cmd response: failed
1,208,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,883 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,205,632 >>> mbox cmd response: failed
1,205,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,638 >>> mbox cmd response: failed
1,205,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,971 UART: [kat] SHA2-256
903,911 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
922,972 UART: [kat] LMS
1,171,300 UART: [kat] --
1,172,073 UART: [cold-reset] ++
1,172,551 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,542 UART: [idev] Erasing UDS.KEYID = 0
1,201,341 UART: [idev] Sha1 KeyId Algorithm
1,209,883 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,304 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,421 UART: [ldev] Erasing FE.KEYID = 1
1,243,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,807 UART: [ldev] --
1,283,244 UART: [fwproc] Wait for Commands...
1,283,964 UART: [fwproc] Recv command 0x46574c44
1,284,692 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,447 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,549 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,208,338 >>> mbox cmd response: failed
1,208,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,344 >>> mbox cmd response: failed
1,208,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,350 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,864 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,209,627 >>> mbox cmd response: failed
1,209,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,633 >>> mbox cmd response: failed
1,209,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
893,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,782 UART: [kat] ++
897,934 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
906,871 UART: [kat] SHA2-512-ACC
908,772 UART: [kat] ECC-384
918,371 UART: [kat] HMAC-384Kdf
922,921 UART: [kat] LMS
1,171,249 UART: [kat] --
1,171,944 UART: [cold-reset] ++
1,172,336 UART: [fht] FHT @ 0x50003400
1,175,039 UART: [idev] ++
1,175,207 UART: [idev] CDI.KEYID = 6
1,175,567 UART: [idev] SUBJECT.KEYID = 7
1,175,991 UART: [idev] UDS.KEYID = 0
1,176,336 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,005 UART: [idev] Erasing UDS.KEYID = 0
1,201,352 UART: [idev] Sha1 KeyId Algorithm
1,209,766 UART: [idev] --
1,210,808 UART: [ldev] ++
1,210,976 UART: [ldev] CDI.KEYID = 6
1,211,339 UART: [ldev] SUBJECT.KEYID = 5
1,211,765 UART: [ldev] AUTHORITY.KEYID = 7
1,212,228 UART: [ldev] FE.KEYID = 1
1,217,544 UART: [ldev] Erasing FE.KEYID = 1
1,243,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,318 UART: [ldev] --
1,282,629 UART: [fwproc] Wait for Commands...
1,283,283 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,454 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,208,983 >>> mbox cmd response: failed
1,208,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,989 >>> mbox cmd response: failed
1,208,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,197 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,641 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,206,842 >>> mbox cmd response: failed
1,206,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,848 >>> mbox cmd response: failed
1,206,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,450 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,237 UART: [idev] ++
1,173,405 UART: [idev] CDI.KEYID = 6
1,173,766 UART: [idev] SUBJECT.KEYID = 7
1,174,191 UART: [idev] UDS.KEYID = 0
1,174,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,301 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,029 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,906 UART: [ldev] Erasing FE.KEYID = 1
1,242,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,036 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,231 UART: [fwproc] Recv command 0x46574c44
1,283,964 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,433 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,206,534 >>> mbox cmd response: failed
1,206,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,540 >>> mbox cmd response: failed
1,206,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,841 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,206,431 >>> mbox cmd response: failed
1,206,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,437 >>> mbox cmd response: failed
1,206,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,574 UART: [cold-reset] ++
1,170,990 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,174,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,822 UART: [idev] Erasing UDS.KEYID = 0
1,200,292 UART: [idev] Sha1 KeyId Algorithm
1,209,222 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,097 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,214 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,207,445 >>> mbox cmd response: failed
1,207,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,451 >>> mbox cmd response: failed
1,207,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,920 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,184 UART:
192,573 UART: Running Caliptra ROM ...
193,676 UART:
193,826 UART: [state] CFI Enabled
265,448 UART: [state] LifecycleState = Unprovisioned
267,525 UART: [state] DebugLocked = No
269,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,462 UART: [kat] SHA2-256
445,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,719 UART: [kat] ++
456,216 UART: [kat] sha1
468,446 UART: [kat] SHA2-256
471,182 UART: [kat] SHA2-384
477,104 UART: [kat] SHA2-512-ACC
479,441 UART: [kat] ECC-384
2,769,534 UART: [kat] HMAC-384Kdf
2,801,373 UART: [kat] LMS
3,991,692 UART: [kat] --
3,996,771 UART: [cold-reset] ++
3,998,056 UART: [fht] Storing FHT @ 0x50003400
4,009,654 UART: [idev] ++
4,010,226 UART: [idev] CDI.KEYID = 6
4,011,166 UART: [idev] SUBJECT.KEYID = 7
4,012,440 UART: [idev] UDS.KEYID = 0
4,015,199 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,880 UART: [idev] Erasing UDS.KEYID = 0
7,345,889 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,194 UART: [idev] --
7,372,906 UART: [ldev] ++
7,373,486 UART: [ldev] CDI.KEYID = 6
7,374,472 UART: [ldev] SUBJECT.KEYID = 5
7,375,688 UART: [ldev] AUTHORITY.KEYID = 7
7,376,929 UART: [ldev] FE.KEYID = 1
7,422,008 UART: [ldev] Erasing FE.KEYID = 1
10,755,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,525 UART: [ldev] --
13,117,496 UART: [fwproc] Waiting for Commands...
13,119,346 UART: [fwproc] Received command 0x46574c44
13,121,537 UART: [fwproc] Received Image of size 114036 bytes
16,065,163 UART: ROM Fatal Error: 0x000B0014
16,068,610 >>> mbox cmd response: failed
16,068,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,069,300 >>> mbox cmd response: failed
16,069,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,069,871 >>> mbox cmd response: failed
Initializing fuses
2,053,350 writing to cptra_bootfsm_go
2,242,613 UART:
2,242,967 UART: Running Caliptra ROM ...
2,244,015 UART:
2,244,192 UART: [state] CFI Enabled
2,303,524 UART: [state] LifecycleState = Unprovisioned
2,305,466 UART: [state] DebugLocked = No
2,306,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,174 UART: [kat] SHA2-256
2,480,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,390 UART: [kat] ++
2,491,937 UART: [kat] sha1
2,503,482 UART: [kat] SHA2-256
2,506,179 UART: [kat] SHA2-384
2,511,555 UART: [kat] SHA2-512-ACC
2,513,916 UART: [kat] ECC-384
4,808,703 UART: [kat] HMAC-384Kdf
4,840,881 UART: [kat] LMS
6,031,190 UART: [kat] --
6,034,750 UART: [cold-reset] ++
6,036,181 UART: [fht] Storing FHT @ 0x50003400
6,047,034 UART: [idev] ++
6,047,611 UART: [idev] CDI.KEYID = 6
6,048,632 UART: [idev] SUBJECT.KEYID = 7
6,049,793 UART: [idev] UDS.KEYID = 0
6,052,486 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,196,051 UART: [idev] Erasing UDS.KEYID = 0
9,386,402 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,890 UART: [idev] --
9,412,359 UART: [ldev] ++
9,412,941 UART: [ldev] CDI.KEYID = 6
9,413,858 UART: [ldev] SUBJECT.KEYID = 5
9,415,124 UART: [ldev] AUTHORITY.KEYID = 7
9,416,366 UART: [ldev] FE.KEYID = 1
9,462,719 UART: [ldev] Erasing FE.KEYID = 1
12,797,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,123,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,138,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,172,341 UART: [ldev] --
15,176,273 UART: [fwproc] Waiting for Commands...
15,178,918 UART: [fwproc] Received command 0x46574c44
15,181,106 UART: [fwproc] Received Image of size 114036 bytes
19,237,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,315,743 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,384,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,701,949 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,806,624 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,849,074 >>> mbox cmd response: failed
15,849,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,998 >>> mbox cmd response: failed
15,850,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,850,553 >>> mbox cmd response: failed
Initializing fuses
2,061,265 writing to cptra_bootfsm_go
5,852,991 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,935,957 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,640 UART:
192,986 UART: Running Caliptra ROM ...
194,171 UART:
603,909 UART: [state] CFI Enabled
619,918 UART: [state] LifecycleState = Unprovisioned
621,880 UART: [state] DebugLocked = No
624,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,471 UART: [kat] SHA2-256
800,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,766 UART: [kat] ++
811,298 UART: [kat] sha1
821,534 UART: [kat] SHA2-256
824,207 UART: [kat] SHA2-384
830,558 UART: [kat] SHA2-512-ACC
832,911 UART: [kat] ECC-384
3,117,400 UART: [kat] HMAC-384Kdf
3,130,774 UART: [kat] LMS
4,320,928 UART: [kat] --
4,324,935 UART: [cold-reset] ++
4,325,849 UART: [fht] Storing FHT @ 0x50003400
4,338,065 UART: [idev] ++
4,338,685 UART: [idev] CDI.KEYID = 6
4,339,576 UART: [idev] SUBJECT.KEYID = 7
4,340,843 UART: [idev] UDS.KEYID = 0
4,343,976 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,487,438 UART: [idev] Erasing UDS.KEYID = 0
7,624,009 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,423 UART: [idev] --
7,650,255 UART: [ldev] ++
7,650,820 UART: [ldev] CDI.KEYID = 6
7,651,810 UART: [ldev] SUBJECT.KEYID = 5
7,653,043 UART: [ldev] AUTHORITY.KEYID = 7
7,654,226 UART: [ldev] FE.KEYID = 1
7,664,318 UART: [ldev] Erasing FE.KEYID = 1
10,955,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,463 UART: [ldev] --
13,318,678 UART: [fwproc] Waiting for Commands...
13,321,043 UART: [fwproc] Received command 0x46574c44
13,323,242 UART: [fwproc] Received Image of size 114036 bytes
16,267,320 UART: ROM Fatal Error: 0x000B0014
16,270,720 >>> mbox cmd response: failed
16,271,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,271,507 >>> mbox cmd response: failed
16,271,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,272,076 >>> mbox cmd response: failed
Initializing fuses
2,051,618 writing to cptra_bootfsm_go
2,240,911 UART:
2,241,260 UART: Running Caliptra ROM ...
2,242,398 UART:
4,196,308 UART: [state] CFI Enabled
4,208,885 UART: [state] LifecycleState = Unprovisioned
4,210,855 UART: [state] DebugLocked = No
4,212,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,217,362 UART: [kat] SHA2-256
4,387,126 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,397,654 UART: [kat] ++
4,398,196 UART: [kat] sha1
4,408,928 UART: [kat] SHA2-256
4,411,615 UART: [kat] SHA2-384
4,416,851 UART: [kat] SHA2-512-ACC
4,419,203 UART: [kat] ECC-384
6,702,387 UART: [kat] HMAC-384Kdf
6,713,425 UART: [kat] LMS
7,903,531 UART: [kat] --
7,909,915 UART: [cold-reset] ++
7,911,962 UART: [fht] Storing FHT @ 0x50003400
7,923,668 UART: [idev] ++
7,924,234 UART: [idev] CDI.KEYID = 6
7,925,204 UART: [idev] SUBJECT.KEYID = 7
7,926,419 UART: [idev] UDS.KEYID = 0
7,929,089 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,072,434 UART: [idev] Erasing UDS.KEYID = 0
11,208,879 UART: [idev] Using Sha1 for KeyId Algorithm
11,229,278 UART: [idev] --
11,234,801 UART: [ldev] ++
11,235,433 UART: [ldev] CDI.KEYID = 6
11,236,338 UART: [ldev] SUBJECT.KEYID = 5
11,237,586 UART: [ldev] AUTHORITY.KEYID = 7
11,238,824 UART: [ldev] FE.KEYID = 1
11,251,361 UART: [ldev] Erasing FE.KEYID = 1
14,543,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,837,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,852,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,867,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,881,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,902,076 UART: [ldev] --
16,906,556 UART: [fwproc] Waiting for Commands...
16,908,919 UART: [fwproc] Received command 0x46574c44
16,911,121 UART: [fwproc] Received Image of size 114036 bytes
20,962,284 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,037,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,106,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,424,077 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
4,124,741 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,027,679 >>> mbox cmd response: failed
16,028,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,658 >>> mbox cmd response: failed
16,028,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,223 >>> mbox cmd response: failed
Initializing fuses
2,048,581 writing to cptra_bootfsm_go
7,973,993 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,916,793 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,228 UART:
192,590 UART: Running Caliptra ROM ...
193,681 UART:
193,820 UART: [state] CFI Enabled
265,595 UART: [state] LifecycleState = Unprovisioned
267,480 UART: [state] DebugLocked = No
269,751 UART: [state] WD Timer not started. Device not locked for debugging
272,648 UART: [kat] SHA2-256
451,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,372 UART: [kat] ++
463,827 UART: [kat] sha1
475,172 UART: [kat] SHA2-256
478,184 UART: [kat] SHA2-384
484,875 UART: [kat] SHA2-512-ACC
487,810 UART: [kat] ECC-384
2,949,489 UART: [kat] HMAC-384Kdf
2,972,633 UART: [kat] LMS
3,502,043 UART: [kat] --
3,506,362 UART: [cold-reset] ++
3,509,045 UART: [fht] FHT @ 0x50003400
3,521,035 UART: [idev] ++
3,521,620 UART: [idev] CDI.KEYID = 6
3,522,527 UART: [idev] SUBJECT.KEYID = 7
3,523,740 UART: [idev] UDS.KEYID = 0
3,526,574 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,611 UART: [idev] Erasing UDS.KEYID = 0
6,027,400 UART: [idev] Sha1 KeyId Algorithm
6,050,091 UART: [idev] --
6,053,761 UART: [ldev] ++
6,054,340 UART: [ldev] CDI.KEYID = 6
6,055,233 UART: [ldev] SUBJECT.KEYID = 5
6,056,449 UART: [ldev] AUTHORITY.KEYID = 7
6,057,684 UART: [ldev] FE.KEYID = 1
6,100,135 UART: [ldev] Erasing FE.KEYID = 1
8,602,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,229 UART: [ldev] --
10,415,762 UART: [fwproc] Wait for Commands...
10,417,505 UART: [fwproc] Recv command 0x46574c44
10,419,602 UART: [fwproc] Recv'd Img size: 114360 bytes
12,701,508 UART: ROM Fatal Error: 0x000B0014
12,704,625 >>> mbox cmd response: failed
12,704,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,284 >>> mbox cmd response: failed
12,705,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,877 >>> mbox cmd response: failed
Initializing fuses
2,059,662 writing to cptra_bootfsm_go
2,248,985 UART:
2,249,334 UART: Running Caliptra ROM ...
2,250,411 UART:
2,250,588 UART: [state] CFI Enabled
2,320,821 UART: [state] LifecycleState = Unprovisioned
2,322,660 UART: [state] DebugLocked = No
2,325,327 UART: [state] WD Timer not started. Device not locked for debugging
2,328,328 UART: [kat] SHA2-256
2,507,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,984 UART: [kat] ++
2,519,535 UART: [kat] sha1
2,530,650 UART: [kat] SHA2-256
2,533,661 UART: [kat] SHA2-384
2,539,702 UART: [kat] SHA2-512-ACC
2,542,646 UART: [kat] ECC-384
5,005,103 UART: [kat] HMAC-384Kdf
5,027,323 UART: [kat] LMS
5,556,766 UART: [kat] --
5,561,574 UART: [cold-reset] ++
5,563,526 UART: [fht] FHT @ 0x50003400
5,573,749 UART: [idev] ++
5,574,320 UART: [idev] CDI.KEYID = 6
5,575,228 UART: [idev] SUBJECT.KEYID = 7
5,576,386 UART: [idev] UDS.KEYID = 0
5,579,009 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,722,969 UART: [idev] Erasing UDS.KEYID = 0
8,082,639 UART: [idev] Sha1 KeyId Algorithm
8,105,916 UART: [idev] --
8,108,731 UART: [ldev] ++
8,109,302 UART: [ldev] CDI.KEYID = 6
8,110,210 UART: [ldev] SUBJECT.KEYID = 5
8,111,371 UART: [ldev] AUTHORITY.KEYID = 7
8,112,600 UART: [ldev] FE.KEYID = 1
8,156,736 UART: [ldev] Erasing FE.KEYID = 1
10,660,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,432 UART: [ldev] --
12,469,500 UART: [fwproc] Wait for Commands...
12,470,945 UART: [fwproc] Recv command 0x46574c44
12,473,041 UART: [fwproc] Recv'd Img size: 114360 bytes
15,877,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,953,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,022,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,340,909 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,039 UART:
192,406 UART: Running Caliptra ROM ...
193,509 UART:
193,655 UART: [state] CFI Enabled
263,029 UART: [state] LifecycleState = Unprovisioned
265,388 UART: [state] DebugLocked = No
268,199 UART: [state] WD Timer not started. Device not locked for debugging
272,406 UART: [kat] SHA2-256
462,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,071 UART: [kat] ++
473,527 UART: [kat] sha1
484,515 UART: [kat] SHA2-256
487,581 UART: [kat] SHA2-384
494,430 UART: [kat] SHA2-512-ACC
497,051 UART: [kat] ECC-384
2,950,915 UART: [kat] HMAC-384Kdf
2,972,335 UART: [kat] LMS
3,504,113 UART: [kat] --
3,508,586 UART: [cold-reset] ++
3,509,609 UART: [fht] FHT @ 0x50003400
3,522,212 UART: [idev] ++
3,522,890 UART: [idev] CDI.KEYID = 6
3,523,853 UART: [idev] SUBJECT.KEYID = 7
3,525,067 UART: [idev] UDS.KEYID = 0
3,527,740 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,237 UART: [idev] Erasing UDS.KEYID = 0
6,031,881 UART: [idev] Sha1 KeyId Algorithm
6,053,291 UART: [idev] --
6,059,216 UART: [ldev] ++
6,059,913 UART: [ldev] CDI.KEYID = 6
6,060,830 UART: [ldev] SUBJECT.KEYID = 5
6,062,061 UART: [ldev] AUTHORITY.KEYID = 7
6,063,190 UART: [ldev] FE.KEYID = 1
6,107,104 UART: [ldev] Erasing FE.KEYID = 1
8,614,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,357 UART: [ldev] --
10,419,648 UART: [fwproc] Wait for Commands...
10,421,479 UART: [fwproc] Recv command 0x46574c44
10,423,737 UART: [fwproc] Recv'd Img size: 114360 bytes
12,750,040 UART: ROM Fatal Error: 0x000B0014
12,753,713 >>> mbox cmd response: failed
12,754,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,754,413 >>> mbox cmd response: failed
12,754,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,754,967 >>> mbox cmd response: failed
Initializing fuses
2,051,857 writing to cptra_bootfsm_go
2,241,118 UART:
2,241,472 UART: Running Caliptra ROM ...
2,242,539 UART:
2,242,690 UART: [state] CFI Enabled
2,297,918 UART: [state] LifecycleState = Unprovisioned
2,300,297 UART: [state] DebugLocked = No
2,302,935 UART: [state] WD Timer not started. Device not locked for debugging
2,307,506 UART: [kat] SHA2-256
2,497,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,508,100 UART: [kat] ++
2,508,591 UART: [kat] sha1
2,519,699 UART: [kat] SHA2-256
2,522,729 UART: [kat] SHA2-384
2,528,236 UART: [kat] SHA2-512-ACC
2,530,809 UART: [kat] ECC-384
4,982,772 UART: [kat] HMAC-384Kdf
5,006,830 UART: [kat] LMS
5,538,593 UART: [kat] --
5,543,767 UART: [cold-reset] ++
5,545,985 UART: [fht] FHT @ 0x50003400
5,556,594 UART: [idev] ++
5,557,270 UART: [idev] CDI.KEYID = 6
5,558,207 UART: [idev] SUBJECT.KEYID = 7
5,559,416 UART: [idev] UDS.KEYID = 0
5,562,321 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,706,305 UART: [idev] Erasing UDS.KEYID = 0
8,083,607 UART: [idev] Sha1 KeyId Algorithm
8,105,448 UART: [idev] --
8,109,957 UART: [ldev] ++
8,110,647 UART: [ldev] CDI.KEYID = 6
8,111,530 UART: [ldev] SUBJECT.KEYID = 5
8,112,744 UART: [ldev] AUTHORITY.KEYID = 7
8,113,978 UART: [ldev] FE.KEYID = 1
8,156,351 UART: [ldev] Erasing FE.KEYID = 1
10,663,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,532 UART: [ldev] --
12,460,740 UART: [fwproc] Wait for Commands...
12,463,054 UART: [fwproc] Recv command 0x46574c44
12,465,327 UART: [fwproc] Recv'd Img size: 114360 bytes
15,919,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,118,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,660,886 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,439,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,647,182 >>> mbox cmd response: failed
12,647,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,122 >>> mbox cmd response: failed
12,648,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,684 >>> mbox cmd response: failed
Initializing fuses
2,049,619 writing to cptra_bootfsm_go
5,472,236 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,764,905 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,550 UART:
192,924 UART: Running Caliptra ROM ...
194,114 UART:
603,898 UART: [state] CFI Enabled
618,312 UART: [state] LifecycleState = Unprovisioned
620,677 UART: [state] DebugLocked = No
622,762 UART: [state] WD Timer not started. Device not locked for debugging
627,418 UART: [kat] SHA2-256
817,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,070 UART: [kat] ++
828,579 UART: [kat] sha1
840,481 UART: [kat] SHA2-256
843,487 UART: [kat] SHA2-384
849,196 UART: [kat] SHA2-512-ACC
851,804 UART: [kat] ECC-384
3,293,949 UART: [kat] HMAC-384Kdf
3,307,173 UART: [kat] LMS
3,838,996 UART: [kat] --
3,843,958 UART: [cold-reset] ++
3,846,318 UART: [fht] FHT @ 0x50003400
3,856,755 UART: [idev] ++
3,857,430 UART: [idev] CDI.KEYID = 6
3,858,444 UART: [idev] SUBJECT.KEYID = 7
3,859,612 UART: [idev] UDS.KEYID = 0
3,862,339 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,174 UART: [idev] Erasing UDS.KEYID = 0
6,341,873 UART: [idev] Sha1 KeyId Algorithm
6,364,790 UART: [idev] --
6,369,166 UART: [ldev] ++
6,369,905 UART: [ldev] CDI.KEYID = 6
6,370,820 UART: [ldev] SUBJECT.KEYID = 5
6,371,983 UART: [ldev] AUTHORITY.KEYID = 7
6,373,236 UART: [ldev] FE.KEYID = 1
6,383,257 UART: [ldev] Erasing FE.KEYID = 1
8,865,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,554 UART: [ldev] --
10,657,628 UART: [fwproc] Wait for Commands...
10,660,756 UART: [fwproc] Recv command 0x46574c44
10,663,068 UART: [fwproc] Recv'd Img size: 114360 bytes
12,988,632 UART: ROM Fatal Error: 0x000B0014
12,992,290 >>> mbox cmd response: failed
12,992,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,993,025 >>> mbox cmd response: failed
12,993,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,993,552 >>> mbox cmd response: failed
Initializing fuses
2,054,744 writing to cptra_bootfsm_go
2,244,046 UART:
2,244,403 UART: Running Caliptra ROM ...
2,245,487 UART:
7,476,019 UART: [state] CFI Enabled
7,489,437 UART: [state] LifecycleState = Unprovisioned
7,491,776 UART: [state] DebugLocked = No
7,494,695 UART: [state] WD Timer not started. Device not locked for debugging
7,500,058 UART: [kat] SHA2-256
7,689,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,700,736 UART: [kat] ++
7,701,214 UART: [kat] sha1
7,713,026 UART: [kat] SHA2-256
7,716,087 UART: [kat] SHA2-384
7,722,735 UART: [kat] SHA2-512-ACC
7,725,303 UART: [kat] ECC-384
10,166,488 UART: [kat] HMAC-384Kdf
10,178,772 UART: [kat] LMS
10,710,575 UART: [kat] --
10,715,105 UART: [cold-reset] ++
10,717,572 UART: [fht] FHT @ 0x50003400
10,727,896 UART: [idev] ++
10,728,577 UART: [idev] CDI.KEYID = 6
10,729,542 UART: [idev] SUBJECT.KEYID = 7
10,730,752 UART: [idev] UDS.KEYID = 0
10,733,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,877,420 UART: [idev] Erasing UDS.KEYID = 0
13,207,257 UART: [idev] Sha1 KeyId Algorithm
13,228,450 UART: [idev] --
13,234,416 UART: [ldev] ++
13,235,100 UART: [ldev] CDI.KEYID = 6
13,236,018 UART: [ldev] SUBJECT.KEYID = 5
13,237,177 UART: [ldev] AUTHORITY.KEYID = 7
13,238,408 UART: [ldev] FE.KEYID = 1
13,250,618 UART: [ldev] Erasing FE.KEYID = 1
15,729,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,451,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,466,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,481,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,497,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,518,937 UART: [ldev] --
17,523,717 UART: [fwproc] Wait for Commands...
17,526,352 UART: [fwproc] Recv command 0x46574c44
17,528,631 UART: [fwproc] Recv'd Img size: 114360 bytes
20,974,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,050,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,166,359 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,709,344 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,755,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,873,734 >>> mbox cmd response: failed
12,874,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,874,681 >>> mbox cmd response: failed
12,874,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,875,235 >>> mbox cmd response: failed
Initializing fuses
2,048,679 writing to cptra_bootfsm_go
10,748,606 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,949,629 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,967 UART: [fht] Storing FHT @ 0x50003400
1,479,844 UART: [idev] ++
1,480,012 UART: [idev] CDI.KEYID = 6
1,480,372 UART: [idev] SUBJECT.KEYID = 7
1,480,796 UART: [idev] UDS.KEYID = 0
1,481,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,946 UART: [idev] Erasing UDS.KEYID = 0
1,505,868 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,524 UART: [idev] --
1,515,809 UART: [ldev] ++
1,515,977 UART: [ldev] CDI.KEYID = 6
1,516,340 UART: [ldev] SUBJECT.KEYID = 5
1,516,766 UART: [ldev] AUTHORITY.KEYID = 7
1,517,229 UART: [ldev] FE.KEYID = 1
1,522,337 UART: [ldev] Erasing FE.KEYID = 1
1,548,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,114 UART: [ldev] --
1,587,495 UART: [fwproc] Waiting for Commands...
1,588,236 UART: [fwproc] Received command 0x46574c44
1,589,027 UART: [fwproc] Received Image of size 114360 bytes
1,855,409 UART: ROM Fatal Error: 0x000B0014
1,856,566 >>> mbox cmd response: failed
1,856,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,572 >>> mbox cmd response: failed
1,856,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,360 UART: [kat] SHA2-512-ACC
897,261 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,771 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,142 UART: [idev] Erasing UDS.KEYID = 0
1,504,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,112 UART: [idev] --
1,514,119 UART: [ldev] ++
1,514,287 UART: [ldev] CDI.KEYID = 6
1,514,650 UART: [ldev] SUBJECT.KEYID = 5
1,515,076 UART: [ldev] AUTHORITY.KEYID = 7
1,515,539 UART: [ldev] FE.KEYID = 1
1,520,907 UART: [ldev] Erasing FE.KEYID = 1
1,546,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,490 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,818 UART: [fwproc] Received command 0x46574c44
1,587,609 UART: [fwproc] Received Image of size 114360 bytes
2,884,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,658 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,706,753 >>> mbox cmd response: failed
1,706,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,759 >>> mbox cmd response: failed
1,706,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,024 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,664 UART: [kat] SHA2-256
892,602 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,599 UART: [kat] LMS
1,475,795 UART: [kat] --
1,476,854 UART: [cold-reset] ++
1,477,360 UART: [fht] Storing FHT @ 0x50003400
1,480,209 UART: [idev] ++
1,480,377 UART: [idev] CDI.KEYID = 6
1,480,737 UART: [idev] SUBJECT.KEYID = 7
1,481,161 UART: [idev] UDS.KEYID = 0
1,481,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,175 UART: [idev] Erasing UDS.KEYID = 0
1,505,753 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,387 UART: [idev] --
1,515,476 UART: [ldev] ++
1,515,644 UART: [ldev] CDI.KEYID = 6
1,516,007 UART: [ldev] SUBJECT.KEYID = 5
1,516,433 UART: [ldev] AUTHORITY.KEYID = 7
1,516,896 UART: [ldev] FE.KEYID = 1
1,522,612 UART: [ldev] Erasing FE.KEYID = 1
1,548,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,613 UART: [ldev] --
1,588,114 UART: [fwproc] Waiting for Commands...
1,588,763 UART: [fwproc] Received command 0x46574c44
1,589,554 UART: [fwproc] Received Image of size 114360 bytes
1,854,967 UART: ROM Fatal Error: 0x000B0014
1,856,124 >>> mbox cmd response: failed
1,856,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,130 >>> mbox cmd response: failed
1,856,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,623 UART: [kat] SHA2-512-ACC
897,524 UART: [kat] ECC-384
903,431 UART: [kat] HMAC-384Kdf
908,223 UART: [kat] LMS
1,476,419 UART: [kat] --
1,477,238 UART: [cold-reset] ++
1,477,788 UART: [fht] Storing FHT @ 0x50003400
1,480,449 UART: [idev] ++
1,480,617 UART: [idev] CDI.KEYID = 6
1,480,977 UART: [idev] SUBJECT.KEYID = 7
1,481,401 UART: [idev] UDS.KEYID = 0
1,481,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,767 UART: [idev] Erasing UDS.KEYID = 0
1,506,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,499 UART: [idev] --
1,516,698 UART: [ldev] ++
1,516,866 UART: [ldev] CDI.KEYID = 6
1,517,229 UART: [ldev] SUBJECT.KEYID = 5
1,517,655 UART: [ldev] AUTHORITY.KEYID = 7
1,518,118 UART: [ldev] FE.KEYID = 1
1,523,652 UART: [ldev] Erasing FE.KEYID = 1
1,549,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,037 UART: [ldev] --
1,588,498 UART: [fwproc] Waiting for Commands...
1,589,179 UART: [fwproc] Received command 0x46574c44
1,589,970 UART: [fwproc] Received Image of size 114360 bytes
2,887,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,001 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,708,084 >>> mbox cmd response: failed
1,708,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,090 >>> mbox cmd response: failed
1,708,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,877 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,738 UART: [state] LifecycleState = Unprovisioned
85,393 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
892,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,117 UART: [kat] ++
897,269 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
917,512 UART: [kat] HMAC-384Kdf
922,200 UART: [kat] LMS
1,170,528 UART: [kat] --
1,171,179 UART: [cold-reset] ++
1,171,649 UART: [fht] FHT @ 0x50003400
1,174,402 UART: [idev] ++
1,174,570 UART: [idev] CDI.KEYID = 6
1,174,930 UART: [idev] SUBJECT.KEYID = 7
1,175,354 UART: [idev] UDS.KEYID = 0
1,175,699 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,482 UART: [idev] Erasing UDS.KEYID = 0
1,200,213 UART: [idev] Sha1 KeyId Algorithm
1,208,715 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,294 UART: [ldev] SUBJECT.KEYID = 5
1,210,720 UART: [ldev] AUTHORITY.KEYID = 7
1,211,183 UART: [ldev] FE.KEYID = 1
1,216,245 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,818 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,138 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,996 UART: ROM Fatal Error: 0x000B0014
1,550,153 >>> mbox cmd response: failed
1,550,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,159 >>> mbox cmd response: failed
1,550,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,589 UART: [kat] SHA2-256
903,529 UART: [kat] SHA2-384
906,200 UART: [kat] SHA2-512-ACC
908,101 UART: [kat] ECC-384
917,634 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,483 UART: [cold-reset] ++
1,171,863 UART: [fht] FHT @ 0x50003400
1,174,468 UART: [idev] ++
1,174,636 UART: [idev] CDI.KEYID = 6
1,174,996 UART: [idev] SUBJECT.KEYID = 7
1,175,420 UART: [idev] UDS.KEYID = 0
1,175,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,446 UART: [idev] Erasing UDS.KEYID = 0
1,200,561 UART: [idev] Sha1 KeyId Algorithm
1,209,009 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,554 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,746 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x46574c44
1,284,122 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,841 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,397 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,405,744 >>> mbox cmd response: failed
1,405,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,750 >>> mbox cmd response: failed
1,405,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,524 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
893,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,624 UART: [kat] ++
897,776 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,851 UART: [kat] SHA2-512-ACC
908,752 UART: [kat] ECC-384
918,227 UART: [kat] HMAC-384Kdf
922,649 UART: [kat] LMS
1,170,977 UART: [kat] --
1,172,024 UART: [cold-reset] ++
1,172,602 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,696 UART: [idev] Sha1 KeyId Algorithm
1,210,164 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,217,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,082 UART: [ldev] --
1,283,411 UART: [fwproc] Wait for Commands...
1,284,021 UART: [fwproc] Recv command 0x46574c44
1,284,749 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,810 UART: ROM Fatal Error: 0x000B0014
1,551,967 >>> mbox cmd response: failed
1,551,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,973 >>> mbox cmd response: failed
1,551,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
893,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,652 UART: [kat] ++
897,804 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,915 UART: [kat] HMAC-384Kdf
923,655 UART: [kat] LMS
1,171,983 UART: [kat] --
1,172,602 UART: [cold-reset] ++
1,173,040 UART: [fht] FHT @ 0x50003400
1,175,755 UART: [idev] ++
1,175,923 UART: [idev] CDI.KEYID = 6
1,176,283 UART: [idev] SUBJECT.KEYID = 7
1,176,707 UART: [idev] UDS.KEYID = 0
1,177,052 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,961 UART: [idev] Erasing UDS.KEYID = 0
1,202,014 UART: [idev] Sha1 KeyId Algorithm
1,210,440 UART: [idev] --
1,211,654 UART: [ldev] ++
1,211,822 UART: [ldev] CDI.KEYID = 6
1,212,185 UART: [ldev] SUBJECT.KEYID = 5
1,212,611 UART: [ldev] AUTHORITY.KEYID = 7
1,213,074 UART: [ldev] FE.KEYID = 1
1,218,246 UART: [ldev] Erasing FE.KEYID = 1
1,244,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,464 UART: [ldev] --
1,283,877 UART: [fwproc] Wait for Commands...
1,284,523 UART: [fwproc] Recv command 0x46574c44
1,285,251 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,200 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,407,103 >>> mbox cmd response: failed
1,407,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,109 >>> mbox cmd response: failed
1,407,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,681 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
891,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,209,054 UART: [ldev] ++
1,209,222 UART: [ldev] CDI.KEYID = 6
1,209,586 UART: [ldev] SUBJECT.KEYID = 5
1,210,013 UART: [ldev] AUTHORITY.KEYID = 7
1,210,476 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,643 UART: ROM Fatal Error: 0x000B0014
1,548,800 >>> mbox cmd response: failed
1,548,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,806 >>> mbox cmd response: failed
1,548,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
904,198 UART: [kat] SHA2-512-ACC
906,099 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
920,236 UART: [kat] LMS
1,168,548 UART: [kat] --
1,169,591 UART: [cold-reset] ++
1,169,991 UART: [fht] FHT @ 0x50003400
1,172,623 UART: [idev] ++
1,172,791 UART: [idev] CDI.KEYID = 6
1,173,152 UART: [idev] SUBJECT.KEYID = 7
1,173,577 UART: [idev] UDS.KEYID = 0
1,173,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,831 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,836 UART: [ldev] --
1,280,206 UART: [fwproc] Wait for Commands...
1,280,973 UART: [fwproc] Recv command 0x46574c44
1,281,706 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,871 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,003 >>> mbox cmd response: failed
1,401,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,009 >>> mbox cmd response: failed
1,401,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,035 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,258 UART: [kat] SHA2-256
902,198 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,685 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,416 UART: [cold-reset] ++
1,170,930 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,174,788 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,668 UART: [idev] Erasing UDS.KEYID = 0
1,199,874 UART: [idev] Sha1 KeyId Algorithm
1,208,916 UART: [idev] --
1,210,129 UART: [ldev] ++
1,210,297 UART: [ldev] CDI.KEYID = 6
1,210,661 UART: [ldev] SUBJECT.KEYID = 5
1,211,088 UART: [ldev] AUTHORITY.KEYID = 7
1,211,551 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,243,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,535 UART: [ldev] --
1,282,891 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,249 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,612 UART: ROM Fatal Error: 0x000B0014
1,550,769 >>> mbox cmd response: failed
1,550,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,775 >>> mbox cmd response: failed
1,550,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,615 UART: [kat] HMAC-384Kdf
921,459 UART: [kat] LMS
1,169,771 UART: [kat] --
1,170,822 UART: [cold-reset] ++
1,171,158 UART: [fht] FHT @ 0x50003400
1,173,748 UART: [idev] ++
1,173,916 UART: [idev] CDI.KEYID = 6
1,174,277 UART: [idev] SUBJECT.KEYID = 7
1,174,702 UART: [idev] UDS.KEYID = 0
1,175,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,306 UART: [idev] Erasing UDS.KEYID = 0
1,200,074 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,427 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,355 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,380 UART: [fwproc] Recv command 0x46574c44
1,284,113 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,744 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,580 >>> mbox cmd response: failed
1,403,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,586 >>> mbox cmd response: failed
1,403,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,264 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
192,102 UART:
192,466 UART: Running Caliptra ROM ...
193,666 UART:
193,818 UART: [state] CFI Enabled
260,500 UART: [state] LifecycleState = Unprovisioned
262,416 UART: [state] DebugLocked = No
264,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,458 UART: [kat] SHA2-256
439,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,695 UART: [kat] ++
450,143 UART: [kat] sha1
460,591 UART: [kat] SHA2-256
463,274 UART: [kat] SHA2-384
469,193 UART: [kat] SHA2-512-ACC
471,539 UART: [kat] ECC-384
2,768,206 UART: [kat] HMAC-384Kdf
2,798,419 UART: [kat] LMS
3,988,729 UART: [kat] --
3,991,182 UART: [cold-reset] ++
3,992,535 UART: [fht] Storing FHT @ 0x50003400
4,003,539 UART: [idev] ++
4,004,169 UART: [idev] CDI.KEYID = 6
4,005,095 UART: [idev] SUBJECT.KEYID = 7
4,006,316 UART: [idev] UDS.KEYID = 0
4,008,946 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,152,656 UART: [idev] Erasing UDS.KEYID = 0
7,344,280 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,642 UART: [idev] --
7,367,822 UART: [ldev] ++
7,368,452 UART: [ldev] CDI.KEYID = 6
7,369,370 UART: [ldev] SUBJECT.KEYID = 5
7,370,589 UART: [ldev] AUTHORITY.KEYID = 7
7,371,874 UART: [ldev] FE.KEYID = 1
7,399,525 UART: [ldev] Erasing FE.KEYID = 1
10,732,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,406 UART: [ldev] --
13,109,593 UART: [fwproc] Waiting for Commands...
13,111,550 UART: [fwproc] Received command 0x46574c44
13,113,743 UART: [fwproc] Received Image of size 114036 bytes
16,055,515 UART: ROM Fatal Error: 0x000B0023
16,058,975 >>> mbox cmd response: failed
16,059,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,059,739 >>> mbox cmd response: failed
16,060,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,060,313 >>> mbox cmd response: failed
Initializing fuses
2,061,939 writing to cptra_bootfsm_go
2,251,216 UART:
2,251,555 UART: Running Caliptra ROM ...
2,252,604 UART:
2,252,760 UART: [state] CFI Enabled
2,309,748 UART: [state] LifecycleState = Unprovisioned
2,311,691 UART: [state] DebugLocked = No
2,314,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,749 UART: [kat] SHA2-256
2,489,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,950 UART: [kat] ++
2,500,500 UART: [kat] sha1
2,509,937 UART: [kat] SHA2-256
2,512,634 UART: [kat] SHA2-384
2,519,108 UART: [kat] SHA2-512-ACC
2,521,460 UART: [kat] ECC-384
4,814,626 UART: [kat] HMAC-384Kdf
4,844,520 UART: [kat] LMS
6,034,850 UART: [kat] --
6,041,040 UART: [cold-reset] ++
6,042,116 UART: [fht] Storing FHT @ 0x50003400
6,054,337 UART: [idev] ++
6,054,957 UART: [idev] CDI.KEYID = 6
6,055,852 UART: [idev] SUBJECT.KEYID = 7
6,057,069 UART: [idev] UDS.KEYID = 0
6,059,324 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,202,734 UART: [idev] Erasing UDS.KEYID = 0
9,390,155 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,985 UART: [idev] --
9,416,743 UART: [ldev] ++
9,417,322 UART: [ldev] CDI.KEYID = 6
9,418,301 UART: [ldev] SUBJECT.KEYID = 5
9,419,512 UART: [ldev] AUTHORITY.KEYID = 7
9,420,754 UART: [ldev] FE.KEYID = 1
9,466,246 UART: [ldev] Erasing FE.KEYID = 1
12,794,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,133,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,702 UART: [ldev] --
15,157,648 UART: [fwproc] Waiting for Commands...
15,159,800 UART: [fwproc] Received command 0x46574c44
15,161,990 UART: [fwproc] Received Image of size 114036 bytes
19,210,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,289,693 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,676,214 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,806,029 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,825,605 >>> mbox cmd response: failed
15,826,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,624 >>> mbox cmd response: failed
15,826,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,141 >>> mbox cmd response: failed
Initializing fuses
2,064,169 writing to cptra_bootfsm_go
5,836,359 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,907,449 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,519 UART:
192,869 UART: Running Caliptra ROM ...
194,052 UART:
603,873 UART: [state] CFI Enabled
615,604 UART: [state] LifecycleState = Unprovisioned
617,508 UART: [state] DebugLocked = No
619,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,462 UART: [kat] SHA2-256
795,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,792 UART: [kat] ++
806,241 UART: [kat] sha1
816,541 UART: [kat] SHA2-256
819,279 UART: [kat] SHA2-384
824,509 UART: [kat] SHA2-512-ACC
826,848 UART: [kat] ECC-384
3,111,406 UART: [kat] HMAC-384Kdf
3,123,100 UART: [kat] LMS
4,313,209 UART: [kat] --
4,317,978 UART: [cold-reset] ++
4,319,107 UART: [fht] Storing FHT @ 0x50003400
4,331,581 UART: [idev] ++
4,332,148 UART: [idev] CDI.KEYID = 6
4,333,028 UART: [idev] SUBJECT.KEYID = 7
4,334,298 UART: [idev] UDS.KEYID = 0
4,336,804 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,224 UART: [idev] Erasing UDS.KEYID = 0
7,622,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,173 UART: [idev] --
7,648,355 UART: [ldev] ++
7,648,920 UART: [ldev] CDI.KEYID = 6
7,649,857 UART: [ldev] SUBJECT.KEYID = 5
7,651,124 UART: [ldev] AUTHORITY.KEYID = 7
7,652,277 UART: [ldev] FE.KEYID = 1
7,665,439 UART: [ldev] Erasing FE.KEYID = 1
10,956,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,677 UART: [ldev] --
13,318,567 UART: [fwproc] Waiting for Commands...
13,321,372 UART: [fwproc] Received command 0x46574c44
13,323,557 UART: [fwproc] Received Image of size 114036 bytes
16,269,319 UART: ROM Fatal Error: 0x000B0023
16,272,719 >>> mbox cmd response: failed
16,273,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,273,470 >>> mbox cmd response: failed
16,273,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,274,043 >>> mbox cmd response: failed
Initializing fuses
2,056,155 writing to cptra_bootfsm_go
2,245,493 UART:
2,245,848 UART: Running Caliptra ROM ...
2,246,904 UART:
4,178,247 UART: [state] CFI Enabled
4,194,440 UART: [state] LifecycleState = Unprovisioned
4,196,387 UART: [state] DebugLocked = No
4,199,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,204,928 UART: [kat] SHA2-256
4,374,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,241 UART: [kat] ++
4,385,797 UART: [kat] sha1
4,397,936 UART: [kat] SHA2-256
4,400,628 UART: [kat] SHA2-384
4,407,156 UART: [kat] SHA2-512-ACC
4,409,515 UART: [kat] ECC-384
6,691,938 UART: [kat] HMAC-384Kdf
6,702,884 UART: [kat] LMS
7,893,025 UART: [kat] --
7,896,600 UART: [cold-reset] ++
7,898,803 UART: [fht] Storing FHT @ 0x50003400
7,909,420 UART: [idev] ++
7,909,992 UART: [idev] CDI.KEYID = 6
7,910,930 UART: [idev] SUBJECT.KEYID = 7
7,912,201 UART: [idev] UDS.KEYID = 0
7,914,443 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,057,770 UART: [idev] Erasing UDS.KEYID = 0
11,199,803 UART: [idev] Using Sha1 for KeyId Algorithm
11,222,523 UART: [idev] --
11,226,764 UART: [ldev] ++
11,227,341 UART: [ldev] CDI.KEYID = 6
11,228,309 UART: [ldev] SUBJECT.KEYID = 5
11,229,529 UART: [ldev] AUTHORITY.KEYID = 7
11,230,775 UART: [ldev] FE.KEYID = 1
11,240,988 UART: [ldev] Erasing FE.KEYID = 1
14,526,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,819,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,833,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,848,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,863,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,881,267 UART: [ldev] --
16,886,101 UART: [fwproc] Waiting for Commands...
16,888,038 UART: [fwproc] Received command 0x46574c44
16,890,230 UART: [fwproc] Received Image of size 114036 bytes
20,939,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,019,286 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,088,161 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,405,889 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,125,951 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,042,727 >>> mbox cmd response: failed
16,043,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,043,605 >>> mbox cmd response: failed
16,043,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,044,180 >>> mbox cmd response: failed
Initializing fuses
2,055,841 writing to cptra_bootfsm_go
7,950,438 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,868,182 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,692 writing to cptra_bootfsm_go
192,808 UART:
193,172 UART: Running Caliptra ROM ...
194,375 UART:
194,534 UART: [state] CFI Enabled
266,428 UART: [state] LifecycleState = Unprovisioned
268,336 UART: [state] DebugLocked = No
270,689 UART: [state] WD Timer not started. Device not locked for debugging
273,712 UART: [kat] SHA2-256
452,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,405 UART: [kat] ++
464,978 UART: [kat] sha1
476,408 UART: [kat] SHA2-256
479,413 UART: [kat] SHA2-384
485,573 UART: [kat] SHA2-512-ACC
488,535 UART: [kat] ECC-384
2,948,858 UART: [kat] HMAC-384Kdf
2,971,203 UART: [kat] LMS
3,500,647 UART: [kat] --
3,506,929 UART: [cold-reset] ++
3,509,299 UART: [fht] FHT @ 0x50003400
3,520,715 UART: [idev] ++
3,521,329 UART: [idev] CDI.KEYID = 6
3,522,251 UART: [idev] SUBJECT.KEYID = 7
3,523,417 UART: [idev] UDS.KEYID = 0
3,526,334 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,710 UART: [idev] Erasing UDS.KEYID = 0
6,027,681 UART: [idev] Sha1 KeyId Algorithm
6,051,742 UART: [idev] --
6,056,173 UART: [ldev] ++
6,056,747 UART: [ldev] CDI.KEYID = 6
6,057,638 UART: [ldev] SUBJECT.KEYID = 5
6,058,853 UART: [ldev] AUTHORITY.KEYID = 7
6,060,091 UART: [ldev] FE.KEYID = 1
6,098,431 UART: [ldev] Erasing FE.KEYID = 1
8,603,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,071 UART: [ldev] --
10,409,267 UART: [fwproc] Wait for Commands...
10,410,982 UART: [fwproc] Recv command 0x46574c44
10,413,077 UART: [fwproc] Recv'd Img size: 114360 bytes
12,704,342 UART: ROM Fatal Error: 0x000B0023
12,707,472 >>> mbox cmd response: failed
12,707,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,120 >>> mbox cmd response: failed
12,708,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,917 >>> mbox cmd response: failed
Initializing fuses
2,054,457 writing to cptra_bootfsm_go
2,243,761 UART:
2,244,105 UART: Running Caliptra ROM ...
2,245,239 UART:
2,245,407 UART: [state] CFI Enabled
2,314,177 UART: [state] LifecycleState = Unprovisioned
2,316,010 UART: [state] DebugLocked = No
2,317,196 UART: [state] WD Timer not started. Device not locked for debugging
2,320,897 UART: [kat] SHA2-256
2,499,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,573 UART: [kat] ++
2,512,120 UART: [kat] sha1
2,522,146 UART: [kat] SHA2-256
2,525,169 UART: [kat] SHA2-384
2,532,561 UART: [kat] SHA2-512-ACC
2,535,504 UART: [kat] ECC-384
4,996,480 UART: [kat] HMAC-384Kdf
5,019,290 UART: [kat] LMS
5,548,733 UART: [kat] --
5,553,558 UART: [cold-reset] ++
5,554,522 UART: [fht] FHT @ 0x50003400
5,566,341 UART: [idev] ++
5,566,909 UART: [idev] CDI.KEYID = 6
5,567,790 UART: [idev] SUBJECT.KEYID = 7
5,569,006 UART: [idev] UDS.KEYID = 0
5,571,197 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,715,215 UART: [idev] Erasing UDS.KEYID = 0
8,073,141 UART: [idev] Sha1 KeyId Algorithm
8,096,409 UART: [idev] --
8,100,819 UART: [ldev] ++
8,101,400 UART: [ldev] CDI.KEYID = 6
8,102,326 UART: [ldev] SUBJECT.KEYID = 5
8,103,456 UART: [ldev] AUTHORITY.KEYID = 7
8,104,749 UART: [ldev] FE.KEYID = 1
8,149,349 UART: [ldev] Erasing FE.KEYID = 1
10,652,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,604 UART: [ldev] --
12,462,390 UART: [fwproc] Wait for Commands...
12,464,706 UART: [fwproc] Recv command 0x46574c44
12,466,749 UART: [fwproc] Recv'd Img size: 114360 bytes
15,870,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,329,308 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,029 UART:
192,398 UART: Running Caliptra ROM ...
193,608 UART:
193,786 UART: [state] CFI Enabled
265,399 UART: [state] LifecycleState = Unprovisioned
267,770 UART: [state] DebugLocked = No
269,858 UART: [state] WD Timer not started. Device not locked for debugging
274,605 UART: [kat] SHA2-256
464,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,205 UART: [kat] ++
475,793 UART: [kat] sha1
486,626 UART: [kat] SHA2-256
489,630 UART: [kat] SHA2-384
495,239 UART: [kat] SHA2-512-ACC
497,790 UART: [kat] ECC-384
2,946,607 UART: [kat] HMAC-384Kdf
2,972,733 UART: [kat] LMS
3,504,529 UART: [kat] --
3,510,085 UART: [cold-reset] ++
3,511,070 UART: [fht] FHT @ 0x50003400
3,522,979 UART: [idev] ++
3,523,657 UART: [idev] CDI.KEYID = 6
3,524,628 UART: [idev] SUBJECT.KEYID = 7
3,525,841 UART: [idev] UDS.KEYID = 0
3,528,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,779 UART: [idev] Erasing UDS.KEYID = 0
6,029,445 UART: [idev] Sha1 KeyId Algorithm
6,051,719 UART: [idev] --
6,057,987 UART: [ldev] ++
6,058,677 UART: [ldev] CDI.KEYID = 6
6,059,587 UART: [ldev] SUBJECT.KEYID = 5
6,060,801 UART: [ldev] AUTHORITY.KEYID = 7
6,061,977 UART: [ldev] FE.KEYID = 1
6,101,583 UART: [ldev] Erasing FE.KEYID = 1
8,604,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,639 UART: [ldev] --
10,413,744 UART: [fwproc] Wait for Commands...
10,415,724 UART: [fwproc] Recv command 0x46574c44
10,417,993 UART: [fwproc] Recv'd Img size: 114360 bytes
12,734,418 UART: ROM Fatal Error: 0x000B0023
12,738,094 >>> mbox cmd response: failed
12,738,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,860 >>> mbox cmd response: failed
12,739,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,405 >>> mbox cmd response: failed
Initializing fuses
2,061,155 writing to cptra_bootfsm_go
2,250,418 UART:
2,250,764 UART: Running Caliptra ROM ...
2,251,807 UART:
2,251,958 UART: [state] CFI Enabled
2,321,275 UART: [state] LifecycleState = Unprovisioned
2,323,653 UART: [state] DebugLocked = No
2,326,475 UART: [state] WD Timer not started. Device not locked for debugging
2,331,862 UART: [kat] SHA2-256
2,521,756 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,502 UART: [kat] ++
2,533,048 UART: [kat] sha1
2,544,490 UART: [kat] SHA2-256
2,547,527 UART: [kat] SHA2-384
2,553,142 UART: [kat] SHA2-512-ACC
2,555,719 UART: [kat] ECC-384
5,005,674 UART: [kat] HMAC-384Kdf
5,031,250 UART: [kat] LMS
5,563,022 UART: [kat] --
5,569,663 UART: [cold-reset] ++
5,571,275 UART: [fht] FHT @ 0x50003400
5,583,336 UART: [idev] ++
5,584,074 UART: [idev] CDI.KEYID = 6
5,584,996 UART: [idev] SUBJECT.KEYID = 7
5,586,211 UART: [idev] UDS.KEYID = 0
5,588,486 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,732,543 UART: [idev] Erasing UDS.KEYID = 0
8,106,470 UART: [idev] Sha1 KeyId Algorithm
8,129,504 UART: [idev] --
8,135,713 UART: [ldev] ++
8,136,395 UART: [ldev] CDI.KEYID = 6
8,137,382 UART: [ldev] SUBJECT.KEYID = 5
8,138,551 UART: [ldev] AUTHORITY.KEYID = 7
8,139,726 UART: [ldev] FE.KEYID = 1
8,181,097 UART: [ldev] Erasing FE.KEYID = 1
10,690,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,424,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,439,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,455,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,470,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,491,924 UART: [ldev] --
12,497,792 UART: [fwproc] Wait for Commands...
12,499,347 UART: [fwproc] Recv command 0x46574c44
12,501,668 UART: [fwproc] Recv'd Img size: 114360 bytes
15,947,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,028,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,144,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,687,880 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,441,332 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,647,510 >>> mbox cmd response: failed
12,648,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,407 >>> mbox cmd response: failed
12,648,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,649,018 >>> mbox cmd response: failed
Initializing fuses
2,056,174 writing to cptra_bootfsm_go
5,489,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,784,213 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,459 UART:
192,832 UART: Running Caliptra ROM ...
194,039 UART:
603,477 UART: [state] CFI Enabled
617,724 UART: [state] LifecycleState = Unprovisioned
620,103 UART: [state] DebugLocked = No
621,749 UART: [state] WD Timer not started. Device not locked for debugging
626,983 UART: [kat] SHA2-256
816,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,661 UART: [kat] ++
828,335 UART: [kat] sha1
839,813 UART: [kat] SHA2-256
842,846 UART: [kat] SHA2-384
849,157 UART: [kat] SHA2-512-ACC
851,714 UART: [kat] ECC-384
3,294,194 UART: [kat] HMAC-384Kdf
3,308,034 UART: [kat] LMS
3,839,907 UART: [kat] --
3,844,560 UART: [cold-reset] ++
3,845,796 UART: [fht] FHT @ 0x50003400
3,857,051 UART: [idev] ++
3,857,730 UART: [idev] CDI.KEYID = 6
3,858,694 UART: [idev] SUBJECT.KEYID = 7
3,859,904 UART: [idev] UDS.KEYID = 0
3,862,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,378 UART: [idev] Erasing UDS.KEYID = 0
6,338,086 UART: [idev] Sha1 KeyId Algorithm
6,361,592 UART: [idev] --
6,366,442 UART: [ldev] ++
6,367,131 UART: [ldev] CDI.KEYID = 6
6,368,041 UART: [ldev] SUBJECT.KEYID = 5
6,369,206 UART: [ldev] AUTHORITY.KEYID = 7
6,370,443 UART: [ldev] FE.KEYID = 1
6,381,888 UART: [ldev] Erasing FE.KEYID = 1
8,859,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,598 UART: [ldev] --
10,648,783 UART: [fwproc] Wait for Commands...
10,650,987 UART: [fwproc] Recv command 0x46574c44
10,653,247 UART: [fwproc] Recv'd Img size: 114360 bytes
12,976,853 UART: ROM Fatal Error: 0x000B0023
12,980,524 >>> mbox cmd response: failed
12,980,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,269 >>> mbox cmd response: failed
12,981,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,824 >>> mbox cmd response: failed
Initializing fuses
2,061,316 writing to cptra_bootfsm_go
2,250,648 UART:
2,250,989 UART: Running Caliptra ROM ...
2,252,133 UART:
7,472,159 UART: [state] CFI Enabled
7,484,416 UART: [state] LifecycleState = Unprovisioned
7,486,756 UART: [state] DebugLocked = No
7,489,459 UART: [state] WD Timer not started. Device not locked for debugging
7,493,555 UART: [kat] SHA2-256
7,683,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,694,200 UART: [kat] ++
7,694,754 UART: [kat] sha1
7,707,266 UART: [kat] SHA2-256
7,710,299 UART: [kat] SHA2-384
7,717,103 UART: [kat] SHA2-512-ACC
7,719,672 UART: [kat] ECC-384
10,160,713 UART: [kat] HMAC-384Kdf
10,173,296 UART: [kat] LMS
10,705,093 UART: [kat] --
10,710,062 UART: [cold-reset] ++
10,711,777 UART: [fht] FHT @ 0x50003400
10,724,700 UART: [idev] ++
10,725,382 UART: [idev] CDI.KEYID = 6
10,726,458 UART: [idev] SUBJECT.KEYID = 7
10,727,591 UART: [idev] UDS.KEYID = 0
10,729,877 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,873,439 UART: [idev] Erasing UDS.KEYID = 0
13,204,592 UART: [idev] Sha1 KeyId Algorithm
13,226,145 UART: [idev] --
13,230,796 UART: [ldev] ++
13,231,537 UART: [ldev] CDI.KEYID = 6
13,232,456 UART: [ldev] SUBJECT.KEYID = 5
13,233,610 UART: [ldev] AUTHORITY.KEYID = 7
13,234,843 UART: [ldev] FE.KEYID = 1
13,245,708 UART: [ldev] Erasing FE.KEYID = 1
15,723,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,443,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,459,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,474,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,489,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,509,320 UART: [ldev] --
17,514,426 UART: [fwproc] Wait for Commands...
17,516,476 UART: [fwproc] Recv command 0x46574c44
17,518,737 UART: [fwproc] Recv'd Img size: 114360 bytes
20,967,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,040,313 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,156,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,698,468 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,760,578 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,870,100 >>> mbox cmd response: failed
12,870,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,870,998 >>> mbox cmd response: failed
12,871,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,871,617 >>> mbox cmd response: failed
Initializing fuses
2,055,542 writing to cptra_bootfsm_go
10,749,570 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,945,508 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,166 UART: [kat] SHA2-512-ACC
897,067 UART: [kat] ECC-384
902,834 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,853 UART: [cold-reset] ++
1,477,243 UART: [fht] Storing FHT @ 0x50003400
1,480,134 UART: [idev] ++
1,480,302 UART: [idev] CDI.KEYID = 6
1,480,662 UART: [idev] SUBJECT.KEYID = 7
1,481,086 UART: [idev] UDS.KEYID = 0
1,481,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,796 UART: [idev] Erasing UDS.KEYID = 0
1,505,192 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,748 UART: [idev] --
1,514,751 UART: [ldev] ++
1,514,919 UART: [ldev] CDI.KEYID = 6
1,515,282 UART: [ldev] SUBJECT.KEYID = 5
1,515,708 UART: [ldev] AUTHORITY.KEYID = 7
1,516,171 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,652 UART: [ldev] --
1,586,073 UART: [fwproc] Waiting for Commands...
1,586,876 UART: [fwproc] Received command 0x46574c44
1,587,667 UART: [fwproc] Received Image of size 114360 bytes
1,854,246 UART: ROM Fatal Error: 0x000B0023
1,855,403 >>> mbox cmd response: failed
1,855,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,409 >>> mbox cmd response: failed
1,855,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
86,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,647 UART: [kat] SHA2-256
881,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,693 UART: [kat] ++
885,845 UART: [kat] sha1
890,131 UART: [kat] SHA2-256
892,069 UART: [kat] SHA2-384
894,964 UART: [kat] SHA2-512-ACC
896,865 UART: [kat] ECC-384
902,530 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,335 UART: [cold-reset] ++
1,476,691 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,386 UART: [idev] Erasing UDS.KEYID = 0
1,504,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,372 UART: [idev] --
1,514,413 UART: [ldev] ++
1,514,581 UART: [ldev] CDI.KEYID = 6
1,514,944 UART: [ldev] SUBJECT.KEYID = 5
1,515,370 UART: [ldev] AUTHORITY.KEYID = 7
1,515,833 UART: [ldev] FE.KEYID = 1
1,521,171 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,786 UART: [ldev] --
1,585,261 UART: [fwproc] Waiting for Commands...
1,585,992 UART: [fwproc] Received command 0x46574c44
1,586,783 UART: [fwproc] Received Image of size 114360 bytes
2,883,529 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,075,384 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,708,266 >>> mbox cmd response: failed
1,708,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,272 >>> mbox cmd response: failed
1,708,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,185 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,188 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,868 UART: [kat] SHA2-256
881,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,914 UART: [kat] ++
886,066 UART: [kat] sha1
890,494 UART: [kat] SHA2-256
892,432 UART: [kat] SHA2-384
895,257 UART: [kat] SHA2-512-ACC
897,158 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,491 UART: [kat] LMS
1,475,687 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,008 UART: [fht] Storing FHT @ 0x50003400
1,479,771 UART: [idev] ++
1,479,939 UART: [idev] CDI.KEYID = 6
1,480,299 UART: [idev] SUBJECT.KEYID = 7
1,480,723 UART: [idev] UDS.KEYID = 0
1,481,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,899 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,485 UART: [idev] --
1,515,458 UART: [ldev] ++
1,515,626 UART: [ldev] CDI.KEYID = 6
1,515,989 UART: [ldev] SUBJECT.KEYID = 5
1,516,415 UART: [ldev] AUTHORITY.KEYID = 7
1,516,878 UART: [ldev] FE.KEYID = 1
1,521,980 UART: [ldev] Erasing FE.KEYID = 1
1,547,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,367 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,467 UART: [fwproc] Received command 0x46574c44
1,588,258 UART: [fwproc] Received Image of size 114360 bytes
1,854,885 UART: ROM Fatal Error: 0x000B0023
1,856,042 >>> mbox cmd response: failed
1,856,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,048 >>> mbox cmd response: failed
1,856,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,603 UART: [kat] SHA2-512-ACC
897,504 UART: [kat] ECC-384
903,091 UART: [kat] HMAC-384Kdf
907,627 UART: [kat] LMS
1,475,823 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,117 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,313 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,521,908 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,259 UART: [ldev] --
1,586,724 UART: [fwproc] Waiting for Commands...
1,587,545 UART: [fwproc] Received command 0x46574c44
1,588,336 UART: [fwproc] Received Image of size 114360 bytes
2,885,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,692 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,708,257 >>> mbox cmd response: failed
1,708,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,263 >>> mbox cmd response: failed
1,708,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,675 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,549 UART: [fht] FHT @ 0x50003400
1,175,436 UART: [idev] ++
1,175,604 UART: [idev] CDI.KEYID = 6
1,175,964 UART: [idev] SUBJECT.KEYID = 7
1,176,388 UART: [idev] UDS.KEYID = 0
1,176,733 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,696 UART: [idev] Erasing UDS.KEYID = 0
1,201,755 UART: [idev] Sha1 KeyId Algorithm
1,210,069 UART: [idev] --
1,210,939 UART: [ldev] ++
1,211,107 UART: [ldev] CDI.KEYID = 6
1,211,470 UART: [ldev] SUBJECT.KEYID = 5
1,211,896 UART: [ldev] AUTHORITY.KEYID = 7
1,212,359 UART: [ldev] FE.KEYID = 1
1,217,923 UART: [ldev] Erasing FE.KEYID = 1
1,244,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,109 UART: [ldev] --
1,283,442 UART: [fwproc] Wait for Commands...
1,284,032 UART: [fwproc] Recv command 0x46574c44
1,284,760 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,669 UART: ROM Fatal Error: 0x000B0023
1,551,826 >>> mbox cmd response: failed
1,551,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,832 >>> mbox cmd response: failed
1,551,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
893,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,619 UART: [kat] ++
897,771 UART: [kat] sha1
902,097 UART: [kat] SHA2-256
904,037 UART: [kat] SHA2-384
906,802 UART: [kat] SHA2-512-ACC
908,703 UART: [kat] ECC-384
918,528 UART: [kat] HMAC-384Kdf
923,084 UART: [kat] LMS
1,171,412 UART: [kat] --
1,172,293 UART: [cold-reset] ++
1,172,715 UART: [fht] FHT @ 0x50003400
1,175,396 UART: [idev] ++
1,175,564 UART: [idev] CDI.KEYID = 6
1,175,924 UART: [idev] SUBJECT.KEYID = 7
1,176,348 UART: [idev] UDS.KEYID = 0
1,176,693 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,136 UART: [idev] Erasing UDS.KEYID = 0
1,200,641 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,049 UART: [ldev] ++
1,210,217 UART: [ldev] CDI.KEYID = 6
1,210,580 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,937 UART: [ldev] --
1,282,222 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,189 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,405,191 >>> mbox cmd response: failed
1,405,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,197 >>> mbox cmd response: failed
1,405,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,788 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
893,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,954 UART: [kat] ++
898,106 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
906,921 UART: [kat] SHA2-512-ACC
908,822 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,654 UART: [fht] FHT @ 0x50003400
1,175,313 UART: [idev] ++
1,175,481 UART: [idev] CDI.KEYID = 6
1,175,841 UART: [idev] SUBJECT.KEYID = 7
1,176,265 UART: [idev] UDS.KEYID = 0
1,176,610 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,285 UART: [idev] Erasing UDS.KEYID = 0
1,201,354 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,210,788 UART: [ldev] ++
1,210,956 UART: [ldev] CDI.KEYID = 6
1,211,319 UART: [ldev] SUBJECT.KEYID = 5
1,211,745 UART: [ldev] AUTHORITY.KEYID = 7
1,212,208 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,243,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,706 UART: [ldev] --
1,283,165 UART: [fwproc] Wait for Commands...
1,283,739 UART: [fwproc] Recv command 0x46574c44
1,284,467 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,886 UART: ROM Fatal Error: 0x000B0023
1,552,043 >>> mbox cmd response: failed
1,552,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,049 >>> mbox cmd response: failed
1,552,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
893,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,598 UART: [kat] ++
897,750 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,821 UART: [kat] SHA2-512-ACC
908,722 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
923,345 UART: [kat] LMS
1,171,673 UART: [kat] --
1,172,530 UART: [cold-reset] ++
1,172,988 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,452 UART: [idev] Sha1 KeyId Algorithm
1,209,762 UART: [idev] --
1,210,842 UART: [ldev] ++
1,211,010 UART: [ldev] CDI.KEYID = 6
1,211,373 UART: [ldev] SUBJECT.KEYID = 5
1,211,799 UART: [ldev] AUTHORITY.KEYID = 7
1,212,262 UART: [ldev] FE.KEYID = 1
1,217,406 UART: [ldev] Erasing FE.KEYID = 1
1,243,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,754 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,405,858 >>> mbox cmd response: failed
1,405,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,864 >>> mbox cmd response: failed
1,405,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,561 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,170,113 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,174,641 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,208,045 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,215,510 UART: [ldev] Erasing FE.KEYID = 1
1,241,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,562 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,597 UART: [fwproc] Recv command 0x46574c44
1,282,330 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,236 UART: ROM Fatal Error: 0x000B0023
1,549,393 >>> mbox cmd response: failed
1,549,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,399 >>> mbox cmd response: failed
1,549,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
85,869 UART: [state] WD Timer not started. Device not locked for debugging
87,210 UART: [kat] SHA2-256
890,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,889 UART: [kat] ++
895,041 UART: [kat] sha1
899,393 UART: [kat] SHA2-256
901,333 UART: [kat] SHA2-384
904,032 UART: [kat] SHA2-512-ACC
905,933 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,174,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,388 UART: [ldev] --
1,280,726 UART: [fwproc] Wait for Commands...
1,281,497 UART: [fwproc] Recv command 0x46574c44
1,282,230 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,535 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,984 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,522 >>> mbox cmd response: failed
1,402,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,528 >>> mbox cmd response: failed
1,402,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,582 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,151 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
891,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,944 UART: [kat] ++
896,096 UART: [kat] sha1
900,362 UART: [kat] SHA2-256
902,302 UART: [kat] SHA2-384
904,915 UART: [kat] SHA2-512-ACC
906,816 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,365 UART: [kat] LMS
1,169,677 UART: [kat] --
1,170,832 UART: [cold-reset] ++
1,171,256 UART: [fht] FHT @ 0x50003400
1,174,006 UART: [idev] ++
1,174,174 UART: [idev] CDI.KEYID = 6
1,174,535 UART: [idev] SUBJECT.KEYID = 7
1,174,960 UART: [idev] UDS.KEYID = 0
1,175,306 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,050 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,389 UART: [ldev] --
1,282,899 UART: [fwproc] Wait for Commands...
1,283,672 UART: [fwproc] Recv command 0x46574c44
1,284,405 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,863 UART: ROM Fatal Error: 0x000B0023
1,552,020 >>> mbox cmd response: failed
1,552,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,026 >>> mbox cmd response: failed
1,552,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,170,200 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,378 UART: [idev] ++
1,173,546 UART: [idev] CDI.KEYID = 6
1,173,907 UART: [idev] SUBJECT.KEYID = 7
1,174,332 UART: [idev] UDS.KEYID = 0
1,174,678 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,858 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,651 UART: [ldev] ++
1,209,819 UART: [ldev] CDI.KEYID = 6
1,210,183 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,415 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,606 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,200 >>> mbox cmd response: failed
1,402,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,206 >>> mbox cmd response: failed
1,402,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,276 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,140 UART:
192,489 UART: Running Caliptra ROM ...
193,674 UART:
193,835 UART: [state] CFI Enabled
265,438 UART: [state] LifecycleState = Unprovisioned
267,405 UART: [state] DebugLocked = No
270,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,935 UART: [kat] SHA2-256
444,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,150 UART: [kat] ++
455,737 UART: [kat] sha1
465,003 UART: [kat] SHA2-256
467,694 UART: [kat] SHA2-384
475,017 UART: [kat] SHA2-512-ACC
477,357 UART: [kat] ECC-384
2,767,205 UART: [kat] HMAC-384Kdf
2,799,454 UART: [kat] LMS
3,989,776 UART: [kat] --
3,994,587 UART: [cold-reset] ++
3,996,198 UART: [fht] Storing FHT @ 0x50003400
4,008,978 UART: [idev] ++
4,009,558 UART: [idev] CDI.KEYID = 6
4,010,495 UART: [idev] SUBJECT.KEYID = 7
4,011,721 UART: [idev] UDS.KEYID = 0
4,014,417 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,625 UART: [idev] Erasing UDS.KEYID = 0
7,347,407 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,133 UART: [idev] --
7,373,398 UART: [ldev] ++
7,373,973 UART: [ldev] CDI.KEYID = 6
7,374,994 UART: [ldev] SUBJECT.KEYID = 5
7,376,153 UART: [ldev] AUTHORITY.KEYID = 7
7,377,653 UART: [ldev] FE.KEYID = 1
7,423,853 UART: [ldev] Erasing FE.KEYID = 1
10,758,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,480 UART: [ldev] --
13,138,157 UART: [fwproc] Waiting for Commands...
13,140,132 UART: [fwproc] Received command 0x46574c44
13,142,326 UART: [fwproc] Received Image of size 114036 bytes
16,089,522 UART: ROM Fatal Error: 0x000B0024
16,092,918 >>> mbox cmd response: failed
16,093,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,093,676 >>> mbox cmd response: failed
16,093,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,094,244 >>> mbox cmd response: failed
Initializing fuses
2,061,787 writing to cptra_bootfsm_go
2,251,077 UART:
2,251,459 UART: Running Caliptra ROM ...
2,252,600 UART:
2,252,766 UART: [state] CFI Enabled
2,324,190 UART: [state] LifecycleState = Unprovisioned
2,326,137 UART: [state] DebugLocked = No
2,327,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,333,406 UART: [kat] SHA2-256
2,503,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,513,660 UART: [kat] ++
2,514,127 UART: [kat] sha1
2,525,063 UART: [kat] SHA2-256
2,527,762 UART: [kat] SHA2-384
2,534,018 UART: [kat] SHA2-512-ACC
2,536,428 UART: [kat] ECC-384
4,828,996 UART: [kat] HMAC-384Kdf
4,860,401 UART: [kat] LMS
6,050,718 UART: [kat] --
6,056,228 UART: [cold-reset] ++
6,057,079 UART: [fht] Storing FHT @ 0x50003400
6,067,487 UART: [idev] ++
6,068,056 UART: [idev] CDI.KEYID = 6
6,069,027 UART: [idev] SUBJECT.KEYID = 7
6,070,247 UART: [idev] UDS.KEYID = 0
6,072,497 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,215,992 UART: [idev] Erasing UDS.KEYID = 0
9,407,694 UART: [idev] Using Sha1 for KeyId Algorithm
9,430,916 UART: [idev] --
9,434,372 UART: [ldev] ++
9,434,943 UART: [ldev] CDI.KEYID = 6
9,435,884 UART: [ldev] SUBJECT.KEYID = 5
9,437,145 UART: [ldev] AUTHORITY.KEYID = 7
9,438,433 UART: [ldev] FE.KEYID = 1
9,483,437 UART: [ldev] Erasing FE.KEYID = 1
12,817,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,130,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,144,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,159,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,174,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,193,447 UART: [ldev] --
15,197,676 UART: [fwproc] Waiting for Commands...
15,201,069 UART: [fwproc] Received command 0x46574c44
15,203,244 UART: [fwproc] Received Image of size 114036 bytes
19,252,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,336,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,404,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,721,388 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,805,092 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,844,629 >>> mbox cmd response: failed
15,845,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,488 >>> mbox cmd response: failed
15,845,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,060 >>> mbox cmd response: failed
Initializing fuses
2,055,017 writing to cptra_bootfsm_go
5,857,153 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,911,147 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,537 UART:
192,885 UART: Running Caliptra ROM ...
194,069 UART:
603,853 UART: [state] CFI Enabled
617,781 UART: [state] LifecycleState = Unprovisioned
619,729 UART: [state] DebugLocked = No
621,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,171 UART: [kat] SHA2-256
795,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,455 UART: [kat] ++
806,903 UART: [kat] sha1
818,810 UART: [kat] SHA2-256
821,495 UART: [kat] SHA2-384
827,853 UART: [kat] SHA2-512-ACC
830,249 UART: [kat] ECC-384
3,112,990 UART: [kat] HMAC-384Kdf
3,124,461 UART: [kat] LMS
4,314,592 UART: [kat] --
4,318,875 UART: [cold-reset] ++
4,321,444 UART: [fht] Storing FHT @ 0x50003400
4,332,724 UART: [idev] ++
4,333,311 UART: [idev] CDI.KEYID = 6
4,334,198 UART: [idev] SUBJECT.KEYID = 7
4,335,469 UART: [idev] UDS.KEYID = 0
4,337,927 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,267 UART: [idev] Erasing UDS.KEYID = 0
7,621,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,812 UART: [idev] --
7,645,649 UART: [ldev] ++
7,646,218 UART: [ldev] CDI.KEYID = 6
7,647,238 UART: [ldev] SUBJECT.KEYID = 5
7,648,399 UART: [ldev] AUTHORITY.KEYID = 7
7,649,630 UART: [ldev] FE.KEYID = 1
7,660,172 UART: [ldev] Erasing FE.KEYID = 1
10,946,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,653 UART: [ldev] --
13,306,788 UART: [fwproc] Waiting for Commands...
13,309,699 UART: [fwproc] Received command 0x46574c44
13,311,888 UART: [fwproc] Received Image of size 114036 bytes
16,254,124 UART: ROM Fatal Error: 0x000B0024
16,257,572 >>> mbox cmd response: failed
16,257,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,258,304 >>> mbox cmd response: failed
16,258,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,258,862 >>> mbox cmd response: failed
Initializing fuses
2,056,080 writing to cptra_bootfsm_go
2,245,417 UART:
2,245,794 UART: Running Caliptra ROM ...
2,246,891 UART:
4,198,710 UART: [state] CFI Enabled
4,215,693 UART: [state] LifecycleState = Unprovisioned
4,217,604 UART: [state] DebugLocked = No
4,219,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,224,048 UART: [kat] SHA2-256
4,393,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,404,351 UART: [kat] ++
4,404,813 UART: [kat] sha1
4,415,489 UART: [kat] SHA2-256
4,418,187 UART: [kat] SHA2-384
4,424,018 UART: [kat] SHA2-512-ACC
4,426,374 UART: [kat] ECC-384
6,711,665 UART: [kat] HMAC-384Kdf
6,723,645 UART: [kat] LMS
7,913,777 UART: [kat] --
7,918,501 UART: [cold-reset] ++
7,920,499 UART: [fht] Storing FHT @ 0x50003400
7,931,768 UART: [idev] ++
7,932,388 UART: [idev] CDI.KEYID = 6
7,933,300 UART: [idev] SUBJECT.KEYID = 7
7,934,569 UART: [idev] UDS.KEYID = 0
7,936,744 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,080,058 UART: [idev] Erasing UDS.KEYID = 0
11,217,997 UART: [idev] Using Sha1 for KeyId Algorithm
11,239,322 UART: [idev] --
11,244,341 UART: [ldev] ++
11,244,907 UART: [ldev] CDI.KEYID = 6
11,245,849 UART: [ldev] SUBJECT.KEYID = 5
11,247,101 UART: [ldev] AUTHORITY.KEYID = 7
11,248,278 UART: [ldev] FE.KEYID = 1
11,259,990 UART: [ldev] Erasing FE.KEYID = 1
14,547,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,839,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,853,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,868,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,882,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,901,781 UART: [ldev] --
16,906,069 UART: [fwproc] Waiting for Commands...
16,908,388 UART: [fwproc] Received command 0x46574c44
16,910,572 UART: [fwproc] Received Image of size 114036 bytes
20,952,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,027,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,096,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,413,723 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,128,219 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,042,634 >>> mbox cmd response: failed
16,043,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,043,532 >>> mbox cmd response: failed
16,043,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,044,117 >>> mbox cmd response: failed
Initializing fuses
2,063,046 writing to cptra_bootfsm_go
7,956,893 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,914,124 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,135 UART:
192,501 UART: Running Caliptra ROM ...
193,601 UART:
193,762 UART: [state] CFI Enabled
260,370 UART: [state] LifecycleState = Unprovisioned
262,220 UART: [state] DebugLocked = No
263,512 UART: [state] WD Timer not started. Device not locked for debugging
266,529 UART: [kat] SHA2-256
445,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,205 UART: [kat] ++
457,652 UART: [kat] sha1
467,554 UART: [kat] SHA2-256
470,612 UART: [kat] SHA2-384
475,881 UART: [kat] SHA2-512-ACC
478,975 UART: [kat] ECC-384
2,926,128 UART: [kat] HMAC-384Kdf
2,948,244 UART: [kat] LMS
3,477,684 UART: [kat] --
3,481,663 UART: [cold-reset] ++
3,482,871 UART: [fht] FHT @ 0x50003400
3,494,695 UART: [idev] ++
3,495,254 UART: [idev] CDI.KEYID = 6
3,496,191 UART: [idev] SUBJECT.KEYID = 7
3,497,407 UART: [idev] UDS.KEYID = 0
3,500,054 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,644,214 UART: [idev] Erasing UDS.KEYID = 0
5,996,608 UART: [idev] Sha1 KeyId Algorithm
6,019,773 UART: [idev] --
6,022,142 UART: [ldev] ++
6,022,734 UART: [ldev] CDI.KEYID = 6
6,023,624 UART: [ldev] SUBJECT.KEYID = 5
6,024,810 UART: [ldev] AUTHORITY.KEYID = 7
6,026,039 UART: [ldev] FE.KEYID = 1
6,070,897 UART: [ldev] Erasing FE.KEYID = 1
8,574,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,389 UART: [ldev] --
10,384,516 UART: [fwproc] Wait for Commands...
10,386,774 UART: [fwproc] Recv command 0x46574c44
10,388,868 UART: [fwproc] Recv'd Img size: 114360 bytes
12,687,439 UART: ROM Fatal Error: 0x000B0024
12,690,562 >>> mbox cmd response: failed
12,690,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,308 >>> mbox cmd response: failed
12,691,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,692,099 >>> mbox cmd response: failed
Initializing fuses
2,061,737 writing to cptra_bootfsm_go
2,251,064 UART:
2,251,408 UART: Running Caliptra ROM ...
2,252,542 UART:
2,252,708 UART: [state] CFI Enabled
2,326,554 UART: [state] LifecycleState = Unprovisioned
2,328,432 UART: [state] DebugLocked = No
2,330,630 UART: [state] WD Timer not started. Device not locked for debugging
2,334,270 UART: [kat] SHA2-256
2,513,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,524,960 UART: [kat] ++
2,525,500 UART: [kat] sha1
2,536,830 UART: [kat] SHA2-256
2,539,839 UART: [kat] SHA2-384
2,546,522 UART: [kat] SHA2-512-ACC
2,549,432 UART: [kat] ECC-384
5,012,142 UART: [kat] HMAC-384Kdf
5,034,906 UART: [kat] LMS
5,564,350 UART: [kat] --
5,567,489 UART: [cold-reset] ++
5,569,318 UART: [fht] FHT @ 0x50003400
5,580,945 UART: [idev] ++
5,581,505 UART: [idev] CDI.KEYID = 6
5,582,416 UART: [idev] SUBJECT.KEYID = 7
5,583,631 UART: [idev] UDS.KEYID = 0
5,585,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,729,899 UART: [idev] Erasing UDS.KEYID = 0
8,089,052 UART: [idev] Sha1 KeyId Algorithm
8,111,798 UART: [idev] --
8,115,829 UART: [ldev] ++
8,116,407 UART: [ldev] CDI.KEYID = 6
8,117,339 UART: [ldev] SUBJECT.KEYID = 5
8,118,421 UART: [ldev] AUTHORITY.KEYID = 7
8,119,761 UART: [ldev] FE.KEYID = 1
8,164,574 UART: [ldev] Erasing FE.KEYID = 1
10,668,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,422,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,437,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,453,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,473,936 UART: [ldev] --
12,478,335 UART: [fwproc] Wait for Commands...
12,480,158 UART: [fwproc] Recv command 0x46574c44
12,482,249 UART: [fwproc] Recv'd Img size: 114360 bytes
15,892,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,962,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,030,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,348,546 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,125 UART:
192,486 UART: Running Caliptra ROM ...
193,682 UART:
193,835 UART: [state] CFI Enabled
260,888 UART: [state] LifecycleState = Unprovisioned
263,310 UART: [state] DebugLocked = No
265,774 UART: [state] WD Timer not started. Device not locked for debugging
270,959 UART: [kat] SHA2-256
460,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,617 UART: [kat] ++
472,107 UART: [kat] sha1
484,121 UART: [kat] SHA2-256
487,114 UART: [kat] SHA2-384
492,671 UART: [kat] SHA2-512-ACC
495,233 UART: [kat] ECC-384
2,945,746 UART: [kat] HMAC-384Kdf
2,969,483 UART: [kat] LMS
3,501,263 UART: [kat] --
3,504,820 UART: [cold-reset] ++
3,505,829 UART: [fht] FHT @ 0x50003400
3,516,482 UART: [idev] ++
3,517,152 UART: [idev] CDI.KEYID = 6
3,518,130 UART: [idev] SUBJECT.KEYID = 7
3,519,286 UART: [idev] UDS.KEYID = 0
3,522,197 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,809 UART: [idev] Erasing UDS.KEYID = 0
6,029,781 UART: [idev] Sha1 KeyId Algorithm
6,052,810 UART: [idev] --
6,057,383 UART: [ldev] ++
6,058,077 UART: [ldev] CDI.KEYID = 6
6,058,972 UART: [ldev] SUBJECT.KEYID = 5
6,060,188 UART: [ldev] AUTHORITY.KEYID = 7
6,061,433 UART: [ldev] FE.KEYID = 1
6,100,627 UART: [ldev] Erasing FE.KEYID = 1
8,605,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,445 UART: [ldev] --
10,415,564 UART: [fwproc] Wait for Commands...
10,418,146 UART: [fwproc] Recv command 0x46574c44
10,420,459 UART: [fwproc] Recv'd Img size: 114360 bytes
12,742,257 UART: ROM Fatal Error: 0x000B0024
12,745,910 >>> mbox cmd response: failed
12,746,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,661 >>> mbox cmd response: failed
12,746,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,223 >>> mbox cmd response: failed
Initializing fuses
2,064,178 writing to cptra_bootfsm_go
2,253,475 UART:
2,253,826 UART: Running Caliptra ROM ...
2,254,967 UART:
2,255,154 UART: [state] CFI Enabled
2,321,936 UART: [state] LifecycleState = Unprovisioned
2,324,309 UART: [state] DebugLocked = No
2,325,698 UART: [state] WD Timer not started. Device not locked for debugging
2,330,967 UART: [kat] SHA2-256
2,520,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,650 UART: [kat] ++
2,532,193 UART: [kat] sha1
2,544,382 UART: [kat] SHA2-256
2,547,407 UART: [kat] SHA2-384
2,552,370 UART: [kat] SHA2-512-ACC
2,554,942 UART: [kat] ECC-384
5,005,872 UART: [kat] HMAC-384Kdf
5,028,472 UART: [kat] LMS
5,560,200 UART: [kat] --
5,563,667 UART: [cold-reset] ++
5,566,270 UART: [fht] FHT @ 0x50003400
5,577,686 UART: [idev] ++
5,578,365 UART: [idev] CDI.KEYID = 6
5,579,342 UART: [idev] SUBJECT.KEYID = 7
5,580,557 UART: [idev] UDS.KEYID = 0
5,582,748 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,726,793 UART: [idev] Erasing UDS.KEYID = 0
8,087,301 UART: [idev] Sha1 KeyId Algorithm
8,108,463 UART: [idev] --
8,113,580 UART: [ldev] ++
8,114,272 UART: [ldev] CDI.KEYID = 6
8,115,184 UART: [ldev] SUBJECT.KEYID = 5
8,116,399 UART: [ldev] AUTHORITY.KEYID = 7
8,117,576 UART: [ldev] FE.KEYID = 1
8,157,393 UART: [ldev] Erasing FE.KEYID = 1
10,661,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,186 UART: [ldev] --
12,471,453 UART: [fwproc] Wait for Commands...
12,473,168 UART: [fwproc] Recv command 0x46574c44
12,475,426 UART: [fwproc] Recv'd Img size: 114360 bytes
15,919,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,117,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,659,753 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,418,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,626,191 >>> mbox cmd response: failed
12,626,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,627,064 >>> mbox cmd response: failed
12,627,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,627,685 >>> mbox cmd response: failed
Initializing fuses
2,055,512 writing to cptra_bootfsm_go
5,484,870 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,788,106 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,451 UART:
192,825 UART: Running Caliptra ROM ...
194,026 UART:
603,774 UART: [state] CFI Enabled
620,556 UART: [state] LifecycleState = Unprovisioned
622,928 UART: [state] DebugLocked = No
625,301 UART: [state] WD Timer not started. Device not locked for debugging
629,444 UART: [kat] SHA2-256
819,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,162 UART: [kat] ++
830,696 UART: [kat] sha1
843,466 UART: [kat] SHA2-256
846,529 UART: [kat] SHA2-384
852,999 UART: [kat] SHA2-512-ACC
855,556 UART: [kat] ECC-384
3,297,626 UART: [kat] HMAC-384Kdf
3,310,309 UART: [kat] LMS
3,842,110 UART: [kat] --
3,846,726 UART: [cold-reset] ++
3,849,008 UART: [fht] FHT @ 0x50003400
3,859,670 UART: [idev] ++
3,860,387 UART: [idev] CDI.KEYID = 6
3,861,305 UART: [idev] SUBJECT.KEYID = 7
3,862,470 UART: [idev] UDS.KEYID = 0
3,865,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,854 UART: [idev] Erasing UDS.KEYID = 0
6,341,661 UART: [idev] Sha1 KeyId Algorithm
6,364,467 UART: [idev] --
6,368,896 UART: [ldev] ++
6,369,629 UART: [ldev] CDI.KEYID = 6
6,370,696 UART: [ldev] SUBJECT.KEYID = 5
6,371,800 UART: [ldev] AUTHORITY.KEYID = 7
6,372,976 UART: [ldev] FE.KEYID = 1
6,384,690 UART: [ldev] Erasing FE.KEYID = 1
8,861,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,738 UART: [ldev] --
10,649,545 UART: [fwproc] Wait for Commands...
10,651,586 UART: [fwproc] Recv command 0x46574c44
10,653,896 UART: [fwproc] Recv'd Img size: 114360 bytes
12,975,191 UART: ROM Fatal Error: 0x000B0024
12,978,852 >>> mbox cmd response: failed
12,979,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,979,625 >>> mbox cmd response: failed
12,979,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,980,134 >>> mbox cmd response: failed
Initializing fuses
2,056,297 writing to cptra_bootfsm_go
2,245,627 UART:
2,245,973 UART: Running Caliptra ROM ...
2,247,114 UART:
7,477,699 UART: [state] CFI Enabled
7,491,466 UART: [state] LifecycleState = Unprovisioned
7,493,819 UART: [state] DebugLocked = No
7,496,234 UART: [state] WD Timer not started. Device not locked for debugging
7,499,986 UART: [kat] SHA2-256
7,689,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,700,594 UART: [kat] ++
7,701,195 UART: [kat] sha1
7,712,956 UART: [kat] SHA2-256
7,715,977 UART: [kat] SHA2-384
7,721,909 UART: [kat] SHA2-512-ACC
7,724,494 UART: [kat] ECC-384
10,164,231 UART: [kat] HMAC-384Kdf
10,177,013 UART: [kat] LMS
10,708,851 UART: [kat] --
10,714,417 UART: [cold-reset] ++
10,716,673 UART: [fht] FHT @ 0x50003400
10,727,741 UART: [idev] ++
10,728,491 UART: [idev] CDI.KEYID = 6
10,729,408 UART: [idev] SUBJECT.KEYID = 7
10,730,621 UART: [idev] UDS.KEYID = 0
10,733,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,877,222 UART: [idev] Erasing UDS.KEYID = 0
13,210,768 UART: [idev] Sha1 KeyId Algorithm
13,232,545 UART: [idev] --
13,237,461 UART: [ldev] ++
13,238,140 UART: [ldev] CDI.KEYID = 6
13,239,068 UART: [ldev] SUBJECT.KEYID = 5
13,240,232 UART: [ldev] AUTHORITY.KEYID = 7
13,241,469 UART: [ldev] FE.KEYID = 1
13,254,844 UART: [ldev] Erasing FE.KEYID = 1
15,737,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,456,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,471,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,486,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,502,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,524,034 UART: [ldev] --
17,528,828 UART: [fwproc] Wait for Commands...
17,531,954 UART: [fwproc] Recv command 0x46574c44
17,534,264 UART: [fwproc] Recv'd Img size: 114360 bytes
20,973,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,050,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,166,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,709,253 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,753,059 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,852,704 >>> mbox cmd response: failed
12,853,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,853,611 >>> mbox cmd response: failed
12,853,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,854,174 >>> mbox cmd response: failed
Initializing fuses
2,054,356 writing to cptra_bootfsm_go
10,763,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,964,837 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
907,210 UART: [kat] LMS
1,475,406 UART: [kat] --
1,476,363 UART: [cold-reset] ++
1,476,823 UART: [fht] Storing FHT @ 0x50003400
1,479,598 UART: [idev] ++
1,479,766 UART: [idev] CDI.KEYID = 6
1,480,126 UART: [idev] SUBJECT.KEYID = 7
1,480,550 UART: [idev] UDS.KEYID = 0
1,480,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,798 UART: [idev] Erasing UDS.KEYID = 0
1,504,848 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,298 UART: [idev] --
1,514,509 UART: [ldev] ++
1,514,677 UART: [ldev] CDI.KEYID = 6
1,515,040 UART: [ldev] SUBJECT.KEYID = 5
1,515,466 UART: [ldev] AUTHORITY.KEYID = 7
1,515,929 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,718 UART: [ldev] --
1,586,215 UART: [fwproc] Waiting for Commands...
1,586,864 UART: [fwproc] Received command 0x46574c44
1,587,655 UART: [fwproc] Received Image of size 114360 bytes
1,853,771 UART: ROM Fatal Error: 0x000B0024
1,854,928 >>> mbox cmd response: failed
1,854,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,934 >>> mbox cmd response: failed
1,854,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,348 UART: [kat] LMS
1,475,544 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,524 UART: [idev] ++
1,479,692 UART: [idev] CDI.KEYID = 6
1,480,052 UART: [idev] SUBJECT.KEYID = 7
1,480,476 UART: [idev] UDS.KEYID = 0
1,480,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,510 UART: [idev] Erasing UDS.KEYID = 0
1,505,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,700 UART: [idev] --
1,514,921 UART: [ldev] ++
1,515,089 UART: [ldev] CDI.KEYID = 6
1,515,452 UART: [ldev] SUBJECT.KEYID = 5
1,515,878 UART: [ldev] AUTHORITY.KEYID = 7
1,516,341 UART: [ldev] FE.KEYID = 1
1,521,459 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,128 UART: [ldev] --
1,585,433 UART: [fwproc] Waiting for Commands...
1,586,288 UART: [fwproc] Received command 0x46574c44
1,587,079 UART: [fwproc] Received Image of size 114360 bytes
2,884,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,201 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,075,424 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,767 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,707,797 >>> mbox cmd response: failed
1,707,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,803 >>> mbox cmd response: failed
1,707,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,282 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,110 UART: [kat] SHA2-256
882,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,156 UART: [kat] ++
886,308 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,193 UART: [kat] SHA2-512-ACC
897,094 UART: [kat] ECC-384
902,805 UART: [kat] HMAC-384Kdf
907,331 UART: [kat] LMS
1,475,527 UART: [kat] --
1,476,328 UART: [cold-reset] ++
1,476,696 UART: [fht] Storing FHT @ 0x50003400
1,479,553 UART: [idev] ++
1,479,721 UART: [idev] CDI.KEYID = 6
1,480,081 UART: [idev] SUBJECT.KEYID = 7
1,480,505 UART: [idev] UDS.KEYID = 0
1,480,850 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,483 UART: [idev] Erasing UDS.KEYID = 0
1,504,491 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,027 UART: [idev] --
1,513,904 UART: [ldev] ++
1,514,072 UART: [ldev] CDI.KEYID = 6
1,514,435 UART: [ldev] SUBJECT.KEYID = 5
1,514,861 UART: [ldev] AUTHORITY.KEYID = 7
1,515,324 UART: [ldev] FE.KEYID = 1
1,520,572 UART: [ldev] Erasing FE.KEYID = 1
1,545,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,307 UART: [ldev] --
1,584,574 UART: [fwproc] Waiting for Commands...
1,585,411 UART: [fwproc] Received command 0x46574c44
1,586,202 UART: [fwproc] Received Image of size 114360 bytes
1,853,114 UART: ROM Fatal Error: 0x000B0024
1,854,271 >>> mbox cmd response: failed
1,854,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,277 >>> mbox cmd response: failed
1,854,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,476 UART: [kat] SHA2-256
882,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,522 UART: [kat] ++
886,674 UART: [kat] sha1
891,058 UART: [kat] SHA2-256
892,996 UART: [kat] SHA2-384
895,739 UART: [kat] SHA2-512-ACC
897,640 UART: [kat] ECC-384
902,985 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,690 UART: [cold-reset] ++
1,477,026 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,781 UART: [idev] Erasing UDS.KEYID = 0
1,505,751 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,243 UART: [idev] --
1,515,256 UART: [ldev] ++
1,515,424 UART: [ldev] CDI.KEYID = 6
1,515,787 UART: [ldev] SUBJECT.KEYID = 5
1,516,213 UART: [ldev] AUTHORITY.KEYID = 7
1,516,676 UART: [ldev] FE.KEYID = 1
1,521,982 UART: [ldev] Erasing FE.KEYID = 1
1,547,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,987 UART: [ldev] --
1,587,312 UART: [fwproc] Waiting for Commands...
1,588,105 UART: [fwproc] Received command 0x46574c44
1,588,896 UART: [fwproc] Received Image of size 114360 bytes
2,886,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,274 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,609 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,706,650 >>> mbox cmd response: failed
1,706,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,656 >>> mbox cmd response: failed
1,706,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,021 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
893,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,331 UART: [kat] ++
897,483 UART: [kat] sha1
901,799 UART: [kat] SHA2-256
903,739 UART: [kat] SHA2-384
906,396 UART: [kat] SHA2-512-ACC
908,297 UART: [kat] ECC-384
918,400 UART: [kat] HMAC-384Kdf
923,006 UART: [kat] LMS
1,171,334 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,529 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,374 UART: [idev] Erasing UDS.KEYID = 0
1,200,967 UART: [idev] Sha1 KeyId Algorithm
1,209,601 UART: [idev] --
1,210,553 UART: [ldev] ++
1,210,721 UART: [ldev] CDI.KEYID = 6
1,211,084 UART: [ldev] SUBJECT.KEYID = 5
1,211,510 UART: [ldev] AUTHORITY.KEYID = 7
1,211,973 UART: [ldev] FE.KEYID = 1
1,217,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,704 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x46574c44
1,284,190 UART: [fwproc] Recv'd Img size: 114360 bytes
1,551,144 UART: ROM Fatal Error: 0x000B0024
1,552,301 >>> mbox cmd response: failed
1,552,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,307 >>> mbox cmd response: failed
1,552,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
893,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,779 UART: [kat] ++
897,931 UART: [kat] sha1
902,101 UART: [kat] SHA2-256
904,041 UART: [kat] SHA2-384
906,830 UART: [kat] SHA2-512-ACC
908,731 UART: [kat] ECC-384
918,906 UART: [kat] HMAC-384Kdf
923,446 UART: [kat] LMS
1,171,774 UART: [kat] --
1,172,589 UART: [cold-reset] ++
1,173,071 UART: [fht] FHT @ 0x50003400
1,175,738 UART: [idev] ++
1,175,906 UART: [idev] CDI.KEYID = 6
1,176,266 UART: [idev] SUBJECT.KEYID = 7
1,176,690 UART: [idev] UDS.KEYID = 0
1,177,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,392 UART: [idev] Erasing UDS.KEYID = 0
1,202,567 UART: [idev] Sha1 KeyId Algorithm
1,210,961 UART: [idev] --
1,212,119 UART: [ldev] ++
1,212,287 UART: [ldev] CDI.KEYID = 6
1,212,650 UART: [ldev] SUBJECT.KEYID = 5
1,213,076 UART: [ldev] AUTHORITY.KEYID = 7
1,213,539 UART: [ldev] FE.KEYID = 1
1,218,463 UART: [ldev] Erasing FE.KEYID = 1
1,244,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,269 UART: [ldev] --
1,283,734 UART: [fwproc] Wait for Commands...
1,284,528 UART: [fwproc] Recv command 0x46574c44
1,285,256 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,253 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,405,902 >>> mbox cmd response: failed
1,405,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,908 >>> mbox cmd response: failed
1,405,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,807 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,954 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
907,115 UART: [kat] SHA2-512-ACC
909,016 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,511 UART: [kat] LMS
1,171,839 UART: [kat] --
1,172,586 UART: [cold-reset] ++
1,173,092 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,727 UART: [idev] Erasing UDS.KEYID = 0
1,201,888 UART: [idev] Sha1 KeyId Algorithm
1,210,192 UART: [idev] --
1,211,276 UART: [ldev] ++
1,211,444 UART: [ldev] CDI.KEYID = 6
1,211,807 UART: [ldev] SUBJECT.KEYID = 5
1,212,233 UART: [ldev] AUTHORITY.KEYID = 7
1,212,696 UART: [ldev] FE.KEYID = 1
1,218,368 UART: [ldev] Erasing FE.KEYID = 1
1,244,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,476 UART: [ldev] --
1,283,883 UART: [fwproc] Wait for Commands...
1,284,697 UART: [fwproc] Recv command 0x46574c44
1,285,425 UART: [fwproc] Recv'd Img size: 114360 bytes
1,551,389 UART: ROM Fatal Error: 0x000B0024
1,552,546 >>> mbox cmd response: failed
1,552,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,552 >>> mbox cmd response: failed
1,552,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
893,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,380 UART: [kat] ++
897,532 UART: [kat] sha1
901,766 UART: [kat] SHA2-256
903,706 UART: [kat] SHA2-384
906,467 UART: [kat] SHA2-512-ACC
908,368 UART: [kat] ECC-384
918,423 UART: [kat] HMAC-384Kdf
922,917 UART: [kat] LMS
1,171,245 UART: [kat] --
1,172,274 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,475 UART: [idev] ++
1,175,643 UART: [idev] CDI.KEYID = 6
1,176,003 UART: [idev] SUBJECT.KEYID = 7
1,176,427 UART: [idev] UDS.KEYID = 0
1,176,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,209,932 UART: [idev] --
1,210,874 UART: [ldev] ++
1,211,042 UART: [ldev] CDI.KEYID = 6
1,211,405 UART: [ldev] SUBJECT.KEYID = 5
1,211,831 UART: [ldev] AUTHORITY.KEYID = 7
1,212,294 UART: [ldev] FE.KEYID = 1
1,217,696 UART: [ldev] Erasing FE.KEYID = 1
1,243,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,800 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,803 UART: [fwproc] Recv command 0x46574c44
1,284,531 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,748 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,406,759 >>> mbox cmd response: failed
1,406,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,765 >>> mbox cmd response: failed
1,406,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,033 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,144 UART: [kat] SHA2-512-ACC
906,045 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,451 UART: [idev] ++
1,173,619 UART: [idev] CDI.KEYID = 6
1,173,980 UART: [idev] SUBJECT.KEYID = 7
1,174,405 UART: [idev] UDS.KEYID = 0
1,174,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,417 UART: [idev] Erasing UDS.KEYID = 0
1,199,739 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,503 UART: [ldev] AUTHORITY.KEYID = 7
1,210,966 UART: [ldev] FE.KEYID = 1
1,216,302 UART: [ldev] Erasing FE.KEYID = 1
1,242,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,730 UART: [ldev] --
1,282,050 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,981 UART: ROM Fatal Error: 0x000B0024
1,551,138 >>> mbox cmd response: failed
1,551,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,144 >>> mbox cmd response: failed
1,551,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,170,235 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,174,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,335 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,235 UART: [idev] --
1,209,258 UART: [ldev] ++
1,209,426 UART: [ldev] CDI.KEYID = 6
1,209,790 UART: [ldev] SUBJECT.KEYID = 5
1,210,217 UART: [ldev] AUTHORITY.KEYID = 7
1,210,680 UART: [ldev] FE.KEYID = 1
1,215,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,440 UART: [ldev] --
1,280,880 UART: [fwproc] Wait for Commands...
1,281,573 UART: [fwproc] Recv command 0x46574c44
1,282,306 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,131 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,381 >>> mbox cmd response: failed
1,402,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,387 >>> mbox cmd response: failed
1,402,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,768 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,643 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,368 UART: [kat] SHA2-256
902,308 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,943 UART: [kat] HMAC-384Kdf
921,673 UART: [kat] LMS
1,169,985 UART: [kat] --
1,170,704 UART: [cold-reset] ++
1,171,050 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,174,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,936 UART: [idev] --
1,210,151 UART: [ldev] ++
1,210,319 UART: [ldev] CDI.KEYID = 6
1,210,683 UART: [ldev] SUBJECT.KEYID = 5
1,211,110 UART: [ldev] AUTHORITY.KEYID = 7
1,211,573 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,181 UART: [ldev] --
1,282,567 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,071 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,488 UART: ROM Fatal Error: 0x000B0024
1,551,645 >>> mbox cmd response: failed
1,551,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,651 >>> mbox cmd response: failed
1,551,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,134 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,208,078 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,315 UART: [ldev] --
1,281,735 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,936 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,822 >>> mbox cmd response: failed
1,401,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,828 >>> mbox cmd response: failed
1,401,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,692 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,061 UART:
192,569 UART: Running Caliptra ROM ...
193,679 UART:
193,819 UART: [state] CFI Enabled
260,353 UART: [state] LifecycleState = Unprovisioned
262,273 UART: [state] DebugLocked = No
263,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,065 UART: [kat] SHA2-256
438,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,263 UART: [kat] ++
449,725 UART: [kat] sha1
461,520 UART: [kat] SHA2-256
464,207 UART: [kat] SHA2-384
469,378 UART: [kat] SHA2-512-ACC
471,773 UART: [kat] ECC-384
2,766,841 UART: [kat] HMAC-384Kdf
2,799,200 UART: [kat] LMS
3,989,495 UART: [kat] --
3,993,943 UART: [cold-reset] ++
3,995,015 UART: [fht] Storing FHT @ 0x50003400
4,006,937 UART: [idev] ++
4,007,510 UART: [idev] CDI.KEYID = 6
4,009,283 UART: [idev] SUBJECT.KEYID = 7
4,010,412 UART: [idev] UDS.KEYID = 0
4,012,981 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,551 UART: [idev] Erasing UDS.KEYID = 0
7,347,330 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,130 UART: [idev] --
7,373,991 UART: [ldev] ++
7,374,567 UART: [ldev] CDI.KEYID = 6
7,375,511 UART: [ldev] SUBJECT.KEYID = 5
7,376,725 UART: [ldev] AUTHORITY.KEYID = 7
7,378,020 UART: [ldev] FE.KEYID = 1
7,422,841 UART: [ldev] Erasing FE.KEYID = 1
10,755,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,475 UART: [ldev] --
13,115,614 UART: [fwproc] Waiting for Commands...
13,118,798 UART: [fwproc] Received command 0x46574c44
13,121,061 UART: [fwproc] Received Image of size 114036 bytes
16,062,174 UART: ROM Fatal Error: 0x000B0021
16,065,580 >>> mbox cmd response: failed
16,065,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,066,224 >>> mbox cmd response: failed
16,066,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,066,831 >>> mbox cmd response: failed
Initializing fuses
2,058,162 writing to cptra_bootfsm_go
2,247,472 UART:
2,247,811 UART: Running Caliptra ROM ...
2,248,951 UART:
2,249,114 UART: [state] CFI Enabled
2,306,868 UART: [state] LifecycleState = Unprovisioned
2,308,882 UART: [state] DebugLocked = No
2,310,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,459 UART: [kat] SHA2-256
2,485,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,660 UART: [kat] ++
2,496,150 UART: [kat] sha1
2,508,498 UART: [kat] SHA2-256
2,511,177 UART: [kat] SHA2-384
2,517,659 UART: [kat] SHA2-512-ACC
2,520,074 UART: [kat] ECC-384
4,807,124 UART: [kat] HMAC-384Kdf
4,818,972 UART: [kat] LMS
6,009,244 UART: [kat] --
6,012,070 UART: [cold-reset] ++
6,013,688 UART: [fht] Storing FHT @ 0x50003400
6,026,146 UART: [idev] ++
6,026,772 UART: [idev] CDI.KEYID = 6
6,027,697 UART: [idev] SUBJECT.KEYID = 7
6,028,804 UART: [idev] UDS.KEYID = 0
6,031,304 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,174,683 UART: [idev] Erasing UDS.KEYID = 0
9,366,053 UART: [idev] Using Sha1 for KeyId Algorithm
9,388,783 UART: [idev] --
9,392,969 UART: [ldev] ++
9,393,556 UART: [ldev] CDI.KEYID = 6
9,394,524 UART: [ldev] SUBJECT.KEYID = 5
9,395,733 UART: [ldev] AUTHORITY.KEYID = 7
9,396,972 UART: [ldev] FE.KEYID = 1
9,443,053 UART: [ldev] Erasing FE.KEYID = 1
12,781,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,088,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,103,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,118,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,132,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,151,670 UART: [ldev] --
15,157,168 UART: [fwproc] Waiting for Commands...
15,160,133 UART: [fwproc] Received command 0x46574c44
15,162,326 UART: [fwproc] Received Image of size 114036 bytes
19,214,870 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,291,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,360,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,677,821 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,809,527 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,855,183 >>> mbox cmd response: failed
15,856,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,856,476 >>> mbox cmd response: failed
15,856,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,857,045 >>> mbox cmd response: failed
Initializing fuses
2,062,078 writing to cptra_bootfsm_go
5,853,083 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,922,895 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,733 writing to cptra_bootfsm_go
193,043 UART:
193,438 UART: Running Caliptra ROM ...
194,587 UART:
604,427 UART: [state] CFI Enabled
618,405 UART: [state] LifecycleState = Unprovisioned
620,286 UART: [state] DebugLocked = No
621,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,381 UART: [kat] SHA2-256
796,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,666 UART: [kat] ++
807,197 UART: [kat] sha1
819,041 UART: [kat] SHA2-256
821,736 UART: [kat] SHA2-384
826,633 UART: [kat] SHA2-512-ACC
829,025 UART: [kat] ECC-384
3,111,884 UART: [kat] HMAC-384Kdf
3,124,118 UART: [kat] LMS
4,314,270 UART: [kat] --
4,320,884 UART: [cold-reset] ++
4,322,606 UART: [fht] Storing FHT @ 0x50003400
4,333,115 UART: [idev] ++
4,333,738 UART: [idev] CDI.KEYID = 6
4,334,666 UART: [idev] SUBJECT.KEYID = 7
4,335,886 UART: [idev] UDS.KEYID = 0
4,338,425 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,868 UART: [idev] Erasing UDS.KEYID = 0
7,623,444 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,772 UART: [idev] --
7,647,716 UART: [ldev] ++
7,648,298 UART: [ldev] CDI.KEYID = 6
7,649,263 UART: [ldev] SUBJECT.KEYID = 5
7,650,481 UART: [ldev] AUTHORITY.KEYID = 7
7,651,718 UART: [ldev] FE.KEYID = 1
7,661,015 UART: [ldev] Erasing FE.KEYID = 1
10,952,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,199 UART: [ldev] --
13,315,391 UART: [fwproc] Waiting for Commands...
13,317,869 UART: [fwproc] Received command 0x46574c44
13,320,106 UART: [fwproc] Received Image of size 114036 bytes
16,258,486 UART: ROM Fatal Error: 0x000B0021
16,261,942 >>> mbox cmd response: failed
16,262,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,262,598 >>> mbox cmd response: failed
16,262,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,263,408 >>> mbox cmd response: failed
Initializing fuses
2,058,248 writing to cptra_bootfsm_go
2,247,553 UART:
2,247,924 UART: Running Caliptra ROM ...
2,248,975 UART:
4,198,679 UART: [state] CFI Enabled
4,212,346 UART: [state] LifecycleState = Unprovisioned
4,214,315 UART: [state] DebugLocked = No
4,216,296 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,221,421 UART: [kat] SHA2-256
4,391,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,401,708 UART: [kat] ++
4,402,254 UART: [kat] sha1
4,412,017 UART: [kat] SHA2-256
4,414,772 UART: [kat] SHA2-384
4,420,205 UART: [kat] SHA2-512-ACC
4,422,570 UART: [kat] ECC-384
6,706,384 UART: [kat] HMAC-384Kdf
6,718,670 UART: [kat] LMS
7,908,826 UART: [kat] --
7,914,693 UART: [cold-reset] ++
7,916,793 UART: [fht] Storing FHT @ 0x50003400
7,928,658 UART: [idev] ++
7,929,279 UART: [idev] CDI.KEYID = 6
7,930,193 UART: [idev] SUBJECT.KEYID = 7
7,931,470 UART: [idev] UDS.KEYID = 0
7,933,752 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,077,094 UART: [idev] Erasing UDS.KEYID = 0
11,220,562 UART: [idev] Using Sha1 for KeyId Algorithm
11,241,612 UART: [idev] --
11,245,274 UART: [ldev] ++
11,245,848 UART: [ldev] CDI.KEYID = 6
11,246,812 UART: [ldev] SUBJECT.KEYID = 5
11,248,061 UART: [ldev] AUTHORITY.KEYID = 7
11,249,309 UART: [ldev] FE.KEYID = 1
11,259,169 UART: [ldev] Erasing FE.KEYID = 1
14,549,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,842,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,857,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,872,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,886,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,904,896 UART: [ldev] --
16,908,770 UART: [fwproc] Waiting for Commands...
16,910,773 UART: [fwproc] Received command 0x46574c44
16,913,021 UART: [fwproc] Received Image of size 114036 bytes
20,961,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,039,699 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,108,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,426,283 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,124,692 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,051,004 >>> mbox cmd response: failed
16,051,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,051,911 >>> mbox cmd response: failed
16,052,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,475 >>> mbox cmd response: failed
Initializing fuses
2,062,543 writing to cptra_bootfsm_go
7,949,404 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,882,837 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,126 UART:
192,520 UART: Running Caliptra ROM ...
193,686 UART:
193,833 UART: [state] CFI Enabled
263,188 UART: [state] LifecycleState = Unprovisioned
265,107 UART: [state] DebugLocked = No
267,466 UART: [state] WD Timer not started. Device not locked for debugging
270,912 UART: [kat] SHA2-256
449,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,589 UART: [kat] ++
462,042 UART: [kat] sha1
473,786 UART: [kat] SHA2-256
476,791 UART: [kat] SHA2-384
481,415 UART: [kat] SHA2-512-ACC
484,417 UART: [kat] ECC-384
2,948,305 UART: [kat] HMAC-384Kdf
2,972,043 UART: [kat] LMS
3,501,465 UART: [kat] --
3,504,581 UART: [cold-reset] ++
3,506,845 UART: [fht] FHT @ 0x50003400
3,518,526 UART: [idev] ++
3,519,092 UART: [idev] CDI.KEYID = 6
3,520,071 UART: [idev] SUBJECT.KEYID = 7
3,521,232 UART: [idev] UDS.KEYID = 0
3,524,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,311 UART: [idev] Erasing UDS.KEYID = 0
6,027,059 UART: [idev] Sha1 KeyId Algorithm
6,049,646 UART: [idev] --
6,053,748 UART: [ldev] ++
6,054,322 UART: [ldev] CDI.KEYID = 6
6,055,253 UART: [ldev] SUBJECT.KEYID = 5
6,056,423 UART: [ldev] AUTHORITY.KEYID = 7
6,057,604 UART: [ldev] FE.KEYID = 1
6,100,985 UART: [ldev] Erasing FE.KEYID = 1
8,604,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,759 UART: [ldev] --
10,414,000 UART: [fwproc] Wait for Commands...
10,416,159 UART: [fwproc] Recv command 0x46574c44
10,418,255 UART: [fwproc] Recv'd Img size: 114360 bytes
12,705,784 UART: ROM Fatal Error: 0x000B0021
12,708,917 >>> mbox cmd response: failed
12,709,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,694 >>> mbox cmd response: failed
12,709,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,710,259 >>> mbox cmd response: failed
Initializing fuses
2,054,993 writing to cptra_bootfsm_go
2,244,301 UART:
2,244,661 UART: Running Caliptra ROM ...
2,245,793 UART:
2,245,963 UART: [state] CFI Enabled
2,316,508 UART: [state] LifecycleState = Unprovisioned
2,318,421 UART: [state] DebugLocked = No
2,319,763 UART: [state] WD Timer not started. Device not locked for debugging
2,322,967 UART: [kat] SHA2-256
2,502,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,721 UART: [kat] ++
2,514,273 UART: [kat] sha1
2,525,976 UART: [kat] SHA2-256
2,529,045 UART: [kat] SHA2-384
2,535,365 UART: [kat] SHA2-512-ACC
2,538,312 UART: [kat] ECC-384
5,000,339 UART: [kat] HMAC-384Kdf
5,025,278 UART: [kat] LMS
5,554,733 UART: [kat] --
5,560,245 UART: [cold-reset] ++
5,562,771 UART: [fht] FHT @ 0x50003400
5,574,935 UART: [idev] ++
5,575,508 UART: [idev] CDI.KEYID = 6
5,576,420 UART: [idev] SUBJECT.KEYID = 7
5,577,638 UART: [idev] UDS.KEYID = 0
5,579,833 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,723,773 UART: [idev] Erasing UDS.KEYID = 0
8,078,252 UART: [idev] Sha1 KeyId Algorithm
8,100,294 UART: [idev] --
8,105,635 UART: [ldev] ++
8,106,204 UART: [ldev] CDI.KEYID = 6
8,107,114 UART: [ldev] SUBJECT.KEYID = 5
8,108,332 UART: [ldev] AUTHORITY.KEYID = 7
8,109,571 UART: [ldev] FE.KEYID = 1
8,152,671 UART: [ldev] Erasing FE.KEYID = 1
10,653,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,633 UART: [ldev] --
12,470,140 UART: [fwproc] Wait for Commands...
12,472,365 UART: [fwproc] Recv command 0x46574c44
12,474,466 UART: [fwproc] Recv'd Img size: 114360 bytes
15,877,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,946,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,015,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,334,028 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,192 UART:
192,545 UART: Running Caliptra ROM ...
193,691 UART:
193,836 UART: [state] CFI Enabled
266,756 UART: [state] LifecycleState = Unprovisioned
269,122 UART: [state] DebugLocked = No
271,750 UART: [state] WD Timer not started. Device not locked for debugging
276,992 UART: [kat] SHA2-256
466,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,632 UART: [kat] ++
478,083 UART: [kat] sha1
490,481 UART: [kat] SHA2-256
493,489 UART: [kat] SHA2-384
499,969 UART: [kat] SHA2-512-ACC
502,535 UART: [kat] ECC-384
2,945,228 UART: [kat] HMAC-384Kdf
2,970,477 UART: [kat] LMS
3,502,247 UART: [kat] --
3,508,458 UART: [cold-reset] ++
3,511,037 UART: [fht] FHT @ 0x50003400
3,522,506 UART: [idev] ++
3,523,245 UART: [idev] CDI.KEYID = 6
3,524,145 UART: [idev] SUBJECT.KEYID = 7
3,525,358 UART: [idev] UDS.KEYID = 0
3,527,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,992 UART: [idev] Erasing UDS.KEYID = 0
6,028,162 UART: [idev] Sha1 KeyId Algorithm
6,049,205 UART: [idev] --
6,054,464 UART: [ldev] ++
6,055,231 UART: [ldev] CDI.KEYID = 6
6,056,133 UART: [ldev] SUBJECT.KEYID = 5
6,057,191 UART: [ldev] AUTHORITY.KEYID = 7
6,058,495 UART: [ldev] FE.KEYID = 1
6,099,091 UART: [ldev] Erasing FE.KEYID = 1
8,605,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,119 UART: [ldev] --
10,410,198 UART: [fwproc] Wait for Commands...
10,412,348 UART: [fwproc] Recv command 0x46574c44
10,414,666 UART: [fwproc] Recv'd Img size: 114360 bytes
12,742,385 UART: ROM Fatal Error: 0x000B0021
12,746,046 >>> mbox cmd response: failed
12,746,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,817 >>> mbox cmd response: failed
12,747,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,374 >>> mbox cmd response: failed
Initializing fuses
2,056,321 writing to cptra_bootfsm_go
2,245,614 UART:
2,245,963 UART: Running Caliptra ROM ...
2,247,007 UART:
2,247,165 UART: [state] CFI Enabled
2,320,752 UART: [state] LifecycleState = Unprovisioned
2,323,130 UART: [state] DebugLocked = No
2,324,978 UART: [state] WD Timer not started. Device not locked for debugging
2,329,713 UART: [kat] SHA2-256
2,519,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,362 UART: [kat] ++
2,530,822 UART: [kat] sha1
2,543,062 UART: [kat] SHA2-256
2,546,098 UART: [kat] SHA2-384
2,551,773 UART: [kat] SHA2-512-ACC
2,554,347 UART: [kat] ECC-384
5,003,323 UART: [kat] HMAC-384Kdf
5,025,122 UART: [kat] LMS
5,556,900 UART: [kat] --
5,561,284 UART: [cold-reset] ++
5,562,891 UART: [fht] FHT @ 0x50003400
5,572,793 UART: [idev] ++
5,573,467 UART: [idev] CDI.KEYID = 6
5,574,406 UART: [idev] SUBJECT.KEYID = 7
5,575,628 UART: [idev] UDS.KEYID = 0
5,577,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,721,938 UART: [idev] Erasing UDS.KEYID = 0
8,080,338 UART: [idev] Sha1 KeyId Algorithm
8,103,214 UART: [idev] --
8,108,600 UART: [ldev] ++
8,109,292 UART: [ldev] CDI.KEYID = 6
8,110,209 UART: [ldev] SUBJECT.KEYID = 5
8,111,368 UART: [ldev] AUTHORITY.KEYID = 7
8,112,601 UART: [ldev] FE.KEYID = 1
8,144,803 UART: [ldev] Erasing FE.KEYID = 1
10,648,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,928 UART: [ldev] --
12,457,512 UART: [fwproc] Wait for Commands...
12,459,289 UART: [fwproc] Recv command 0x46574c44
12,461,604 UART: [fwproc] Recv'd Img size: 114360 bytes
15,909,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,642,033 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,421,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,614,481 >>> mbox cmd response: failed
12,615,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,615,364 >>> mbox cmd response: failed
12,615,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,615,923 >>> mbox cmd response: failed
Initializing fuses
2,061,962 writing to cptra_bootfsm_go
5,493,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,819,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,127 writing to cptra_bootfsm_go
193,436 UART:
193,803 UART: Running Caliptra ROM ...
195,004 UART:
604,753 UART: [state] CFI Enabled
618,941 UART: [state] LifecycleState = Unprovisioned
621,317 UART: [state] DebugLocked = No
623,800 UART: [state] WD Timer not started. Device not locked for debugging
629,185 UART: [kat] SHA2-256
819,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,805 UART: [kat] ++
830,444 UART: [kat] sha1
842,300 UART: [kat] SHA2-256
845,354 UART: [kat] SHA2-384
851,649 UART: [kat] SHA2-512-ACC
854,209 UART: [kat] ECC-384
3,296,393 UART: [kat] HMAC-384Kdf
3,309,696 UART: [kat] LMS
3,841,542 UART: [kat] --
3,844,202 UART: [cold-reset] ++
3,846,189 UART: [fht] FHT @ 0x50003400
3,856,844 UART: [idev] ++
3,857,518 UART: [idev] CDI.KEYID = 6
3,858,456 UART: [idev] SUBJECT.KEYID = 7
3,859,667 UART: [idev] UDS.KEYID = 0
3,862,877 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,741 UART: [idev] Erasing UDS.KEYID = 0
6,336,029 UART: [idev] Sha1 KeyId Algorithm
6,358,409 UART: [idev] --
6,363,424 UART: [ldev] ++
6,364,106 UART: [ldev] CDI.KEYID = 6
6,364,996 UART: [ldev] SUBJECT.KEYID = 5
6,366,215 UART: [ldev] AUTHORITY.KEYID = 7
6,367,412 UART: [ldev] FE.KEYID = 1
6,378,250 UART: [ldev] Erasing FE.KEYID = 1
8,855,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,577 UART: [ldev] --
10,645,163 UART: [fwproc] Wait for Commands...
10,647,517 UART: [fwproc] Recv command 0x46574c44
10,649,788 UART: [fwproc] Recv'd Img size: 114360 bytes
12,969,782 UART: ROM Fatal Error: 0x000B0021
12,973,442 >>> mbox cmd response: failed
12,973,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,974,118 >>> mbox cmd response: failed
12,974,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,974,927 >>> mbox cmd response: failed
Initializing fuses
2,054,331 writing to cptra_bootfsm_go
2,243,640 UART:
2,243,987 UART: Running Caliptra ROM ...
2,245,128 UART:
7,478,311 UART: [state] CFI Enabled
7,491,219 UART: [state] LifecycleState = Unprovisioned
7,493,618 UART: [state] DebugLocked = No
7,495,760 UART: [state] WD Timer not started. Device not locked for debugging
7,499,728 UART: [kat] SHA2-256
7,689,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,700,404 UART: [kat] ++
7,701,008 UART: [kat] sha1
7,713,766 UART: [kat] SHA2-256
7,716,795 UART: [kat] SHA2-384
7,722,303 UART: [kat] SHA2-512-ACC
7,724,869 UART: [kat] ECC-384
10,167,130 UART: [kat] HMAC-384Kdf
10,179,221 UART: [kat] LMS
10,711,041 UART: [kat] --
10,714,891 UART: [cold-reset] ++
10,717,257 UART: [fht] FHT @ 0x50003400
10,727,257 UART: [idev] ++
10,727,987 UART: [idev] CDI.KEYID = 6
10,728,898 UART: [idev] SUBJECT.KEYID = 7
10,730,112 UART: [idev] UDS.KEYID = 0
10,732,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,876,224 UART: [idev] Erasing UDS.KEYID = 0
13,207,307 UART: [idev] Sha1 KeyId Algorithm
13,229,477 UART: [idev] --
13,234,283 UART: [ldev] ++
13,234,958 UART: [ldev] CDI.KEYID = 6
13,235,922 UART: [ldev] SUBJECT.KEYID = 5
13,237,085 UART: [ldev] AUTHORITY.KEYID = 7
13,238,314 UART: [ldev] FE.KEYID = 1
13,249,654 UART: [ldev] Erasing FE.KEYID = 1
15,729,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,449,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,464,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,479,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,494,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,515,440 UART: [ldev] --
17,520,067 UART: [fwproc] Wait for Commands...
17,521,734 UART: [fwproc] Recv command 0x46574c44
17,523,989 UART: [fwproc] Recv'd Img size: 114360 bytes
20,973,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,052,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,168,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,711,439 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,755,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,866,525 >>> mbox cmd response: failed
12,867,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,867,458 >>> mbox cmd response: failed
12,867,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,868,021 >>> mbox cmd response: failed
Initializing fuses
2,054,992 writing to cptra_bootfsm_go
10,751,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,942,353 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,395 UART: [cold-reset] ++
1,476,777 UART: [fht] Storing FHT @ 0x50003400
1,479,502 UART: [idev] ++
1,479,670 UART: [idev] CDI.KEYID = 6
1,480,030 UART: [idev] SUBJECT.KEYID = 7
1,480,454 UART: [idev] UDS.KEYID = 0
1,480,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,598 UART: [idev] Erasing UDS.KEYID = 0
1,505,002 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,726 UART: [idev] --
1,514,927 UART: [ldev] ++
1,515,095 UART: [ldev] CDI.KEYID = 6
1,515,458 UART: [ldev] SUBJECT.KEYID = 5
1,515,884 UART: [ldev] AUTHORITY.KEYID = 7
1,516,347 UART: [ldev] FE.KEYID = 1
1,521,527 UART: [ldev] Erasing FE.KEYID = 1
1,547,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,724 UART: [ldev] --
1,586,183 UART: [fwproc] Waiting for Commands...
1,587,030 UART: [fwproc] Received command 0x46574c44
1,587,821 UART: [fwproc] Received Image of size 114360 bytes
1,854,423 UART: ROM Fatal Error: 0x000B0021
1,855,580 >>> mbox cmd response: failed
1,855,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,586 >>> mbox cmd response: failed
1,855,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,429 UART: [kat] SHA2-256
882,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,475 UART: [kat] ++
886,627 UART: [kat] sha1
890,911 UART: [kat] SHA2-256
892,849 UART: [kat] SHA2-384
895,620 UART: [kat] SHA2-512-ACC
897,521 UART: [kat] ECC-384
903,158 UART: [kat] HMAC-384Kdf
907,748 UART: [kat] LMS
1,475,944 UART: [kat] --
1,476,775 UART: [cold-reset] ++
1,477,305 UART: [fht] Storing FHT @ 0x50003400
1,480,082 UART: [idev] ++
1,480,250 UART: [idev] CDI.KEYID = 6
1,480,610 UART: [idev] SUBJECT.KEYID = 7
1,481,034 UART: [idev] UDS.KEYID = 0
1,481,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,058 UART: [idev] Erasing UDS.KEYID = 0
1,505,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,564 UART: [idev] --
1,515,735 UART: [ldev] ++
1,515,903 UART: [ldev] CDI.KEYID = 6
1,516,266 UART: [ldev] SUBJECT.KEYID = 5
1,516,692 UART: [ldev] AUTHORITY.KEYID = 7
1,517,155 UART: [ldev] FE.KEYID = 1
1,522,427 UART: [ldev] Erasing FE.KEYID = 1
1,547,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,236 UART: [ldev] --
1,586,613 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 114360 bytes
2,886,517 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,462 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,153 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,707,537 >>> mbox cmd response: failed
1,707,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,543 >>> mbox cmd response: failed
1,707,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,698 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,574 UART: [kat] SHA2-256
892,512 UART: [kat] SHA2-384
895,151 UART: [kat] SHA2-512-ACC
897,052 UART: [kat] ECC-384
902,643 UART: [kat] HMAC-384Kdf
907,291 UART: [kat] LMS
1,475,487 UART: [kat] --
1,476,530 UART: [cold-reset] ++
1,476,956 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,155 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,625 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,344 UART: [ldev] Erasing FE.KEYID = 1
1,546,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,509 UART: [ldev] --
1,585,930 UART: [fwproc] Waiting for Commands...
1,586,691 UART: [fwproc] Received command 0x46574c44
1,587,482 UART: [fwproc] Received Image of size 114360 bytes
1,853,918 UART: ROM Fatal Error: 0x000B0021
1,855,075 >>> mbox cmd response: failed
1,855,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,081 >>> mbox cmd response: failed
1,855,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,193 UART: [kat] SHA2-512-ACC
897,094 UART: [kat] ECC-384
903,155 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,477,126 UART: [cold-reset] ++
1,477,698 UART: [fht] Storing FHT @ 0x50003400
1,480,267 UART: [idev] ++
1,480,435 UART: [idev] CDI.KEYID = 6
1,480,795 UART: [idev] SUBJECT.KEYID = 7
1,481,219 UART: [idev] UDS.KEYID = 0
1,481,564 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,233 UART: [idev] Erasing UDS.KEYID = 0
1,505,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,522,018 UART: [ldev] Erasing FE.KEYID = 1
1,547,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,613 UART: [ldev] --
1,586,914 UART: [fwproc] Waiting for Commands...
1,587,623 UART: [fwproc] Received command 0x46574c44
1,588,414 UART: [fwproc] Received Image of size 114360 bytes
2,886,348 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,440 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,653 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,760 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,709,028 >>> mbox cmd response: failed
1,709,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,034 >>> mbox cmd response: failed
1,709,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,563 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
892,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,087 UART: [kat] ++
897,239 UART: [kat] sha1
901,461 UART: [kat] SHA2-256
903,401 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,171,879 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,174,760 UART: [idev] ++
1,174,928 UART: [idev] CDI.KEYID = 6
1,175,288 UART: [idev] SUBJECT.KEYID = 7
1,175,712 UART: [idev] UDS.KEYID = 0
1,176,057 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,486 UART: [idev] Erasing UDS.KEYID = 0
1,200,839 UART: [idev] Sha1 KeyId Algorithm
1,209,501 UART: [idev] --
1,210,407 UART: [ldev] ++
1,210,575 UART: [ldev] CDI.KEYID = 6
1,210,938 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,670 UART: ROM Fatal Error: 0x000B0021
1,551,827 >>> mbox cmd response: failed
1,551,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,833 >>> mbox cmd response: failed
1,551,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,536 UART: [kat] HMAC-384Kdf
921,996 UART: [kat] LMS
1,170,324 UART: [kat] --
1,170,993 UART: [cold-reset] ++
1,171,383 UART: [fht] FHT @ 0x50003400
1,173,958 UART: [idev] ++
1,174,126 UART: [idev] CDI.KEYID = 6
1,174,486 UART: [idev] SUBJECT.KEYID = 7
1,174,910 UART: [idev] UDS.KEYID = 0
1,175,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,894 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,571 UART: [ldev] ++
1,208,739 UART: [ldev] CDI.KEYID = 6
1,209,102 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,055 UART: [ldev] Erasing FE.KEYID = 1
1,241,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,329 UART: [ldev] --
1,280,728 UART: [fwproc] Wait for Commands...
1,281,472 UART: [fwproc] Recv command 0x46574c44
1,282,200 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,649 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,404,022 >>> mbox cmd response: failed
1,404,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,028 >>> mbox cmd response: failed
1,404,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,882 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
902,018 UART: [kat] SHA2-256
903,958 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,481 UART: [kat] HMAC-384Kdf
923,077 UART: [kat] LMS
1,171,405 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,433 UART: [idev] ++
1,175,601 UART: [idev] CDI.KEYID = 6
1,175,961 UART: [idev] SUBJECT.KEYID = 7
1,176,385 UART: [idev] UDS.KEYID = 0
1,176,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,483 UART: [idev] Erasing UDS.KEYID = 0
1,201,974 UART: [idev] Sha1 KeyId Algorithm
1,210,480 UART: [idev] --
1,211,442 UART: [ldev] ++
1,211,610 UART: [ldev] CDI.KEYID = 6
1,211,973 UART: [ldev] SUBJECT.KEYID = 5
1,212,399 UART: [ldev] AUTHORITY.KEYID = 7
1,212,862 UART: [ldev] FE.KEYID = 1
1,217,990 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,034 UART: [ldev] --
1,283,381 UART: [fwproc] Wait for Commands...
1,284,021 UART: [fwproc] Recv command 0x46574c44
1,284,749 UART: [fwproc] Recv'd Img size: 114360 bytes
1,551,441 UART: ROM Fatal Error: 0x000B0021
1,552,598 >>> mbox cmd response: failed
1,552,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,604 >>> mbox cmd response: failed
1,552,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
893,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,882 UART: [kat] ++
898,034 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
907,045 UART: [kat] SHA2-512-ACC
908,946 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,799 UART: [kat] LMS
1,171,127 UART: [kat] --
1,171,988 UART: [cold-reset] ++
1,172,326 UART: [fht] FHT @ 0x50003400
1,174,823 UART: [idev] ++
1,174,991 UART: [idev] CDI.KEYID = 6
1,175,351 UART: [idev] SUBJECT.KEYID = 7
1,175,775 UART: [idev] UDS.KEYID = 0
1,176,120 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,555 UART: [idev] Erasing UDS.KEYID = 0
1,200,424 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,926 UART: [ldev] ++
1,210,094 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,883 UART: [ldev] AUTHORITY.KEYID = 7
1,211,346 UART: [ldev] FE.KEYID = 1
1,216,646 UART: [ldev] Erasing FE.KEYID = 1
1,242,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,452 UART: [ldev] --
1,281,741 UART: [fwproc] Wait for Commands...
1,282,445 UART: [fwproc] Recv command 0x46574c44
1,283,173 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,668 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,405,515 >>> mbox cmd response: failed
1,405,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,521 >>> mbox cmd response: failed
1,405,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,083 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,173,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,133 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,240,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,560 UART: [ldev] --
1,280,046 UART: [fwproc] Wait for Commands...
1,280,723 UART: [fwproc] Recv command 0x46574c44
1,281,456 UART: [fwproc] Recv'd Img size: 114360 bytes
1,547,103 UART: ROM Fatal Error: 0x000B0021
1,548,260 >>> mbox cmd response: failed
1,548,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,266 >>> mbox cmd response: failed
1,548,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,165 UART: [state] DebugLocked = No
86,779 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,930 UART: [kat] LMS
1,169,242 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,443 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,174,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,141 UART: [idev] Erasing UDS.KEYID = 0
1,198,743 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,280 UART: [ldev] Erasing FE.KEYID = 1
1,241,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,816 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,523 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,274 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,402,521 >>> mbox cmd response: failed
1,402,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,527 >>> mbox cmd response: failed
1,402,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,335 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,794 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,174,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,115 UART: [fwproc] Wait for Commands...
1,281,724 UART: [fwproc] Recv command 0x46574c44
1,282,457 UART: [fwproc] Recv'd Img size: 114360 bytes
1,548,414 UART: ROM Fatal Error: 0x000B0021
1,549,571 >>> mbox cmd response: failed
1,549,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,577 >>> mbox cmd response: failed
1,549,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,174,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,241,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,683 UART: [ldev] --
1,281,197 UART: [fwproc] Wait for Commands...
1,281,842 UART: [fwproc] Recv command 0x46574c44
1,282,575 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,166 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,997 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,401,994 >>> mbox cmd response: failed
1,401,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,000 >>> mbox cmd response: failed
1,402,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,966 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,201 UART:
192,567 UART: Running Caliptra ROM ...
193,768 UART:
193,943 UART: [state] CFI Enabled
260,943 UART: [state] LifecycleState = Unprovisioned
262,943 UART: [state] DebugLocked = No
265,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,706 UART: [kat] SHA2-256
439,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,912 UART: [kat] ++
450,400 UART: [kat] sha1
462,740 UART: [kat] SHA2-256
465,414 UART: [kat] SHA2-384
469,890 UART: [kat] SHA2-512-ACC
472,233 UART: [kat] ECC-384
2,766,028 UART: [kat] HMAC-384Kdf
2,796,734 UART: [kat] LMS
3,987,060 UART: [kat] --
3,991,448 UART: [cold-reset] ++
3,993,241 UART: [fht] Storing FHT @ 0x50003400
4,004,996 UART: [idev] ++
4,005,579 UART: [idev] CDI.KEYID = 6
4,006,552 UART: [idev] SUBJECT.KEYID = 7
4,007,773 UART: [idev] UDS.KEYID = 0
4,010,264 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,153,897 UART: [idev] Erasing UDS.KEYID = 0
7,343,900 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,878 UART: [idev] --
7,369,662 UART: [ldev] ++
7,370,240 UART: [ldev] CDI.KEYID = 6
7,371,209 UART: [ldev] SUBJECT.KEYID = 5
7,372,428 UART: [ldev] AUTHORITY.KEYID = 7
7,373,670 UART: [ldev] FE.KEYID = 1
7,419,001 UART: [ldev] Erasing FE.KEYID = 1
10,750,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,103 UART: [ldev] --
13,133,231 UART: [fwproc] Waiting for Commands...
13,135,653 UART: [fwproc] Received command 0x46574c44
13,137,837 UART: [fwproc] Received Image of size 114036 bytes
16,081,739 UART: ROM Fatal Error: 0x000B0022
16,085,137 >>> mbox cmd response: failed
16,085,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,085,887 >>> mbox cmd response: failed
16,086,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,086,459 >>> mbox cmd response: failed
Initializing fuses
2,066,100 writing to cptra_bootfsm_go
2,255,431 UART:
2,255,783 UART: Running Caliptra ROM ...
2,256,832 UART:
2,256,988 UART: [state] CFI Enabled
2,325,295 UART: [state] LifecycleState = Unprovisioned
2,327,238 UART: [state] DebugLocked = No
2,330,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,335,616 UART: [kat] SHA2-256
2,505,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,515,790 UART: [kat] ++
2,516,337 UART: [kat] sha1
2,528,479 UART: [kat] SHA2-256
2,531,168 UART: [kat] SHA2-384
2,536,196 UART: [kat] SHA2-512-ACC
2,538,572 UART: [kat] ECC-384
4,830,218 UART: [kat] HMAC-384Kdf
4,861,029 UART: [kat] LMS
6,051,313 UART: [kat] --
6,054,248 UART: [cold-reset] ++
6,056,189 UART: [fht] Storing FHT @ 0x50003400
6,066,059 UART: [idev] ++
6,066,631 UART: [idev] CDI.KEYID = 6
6,067,654 UART: [idev] SUBJECT.KEYID = 7
6,068,822 UART: [idev] UDS.KEYID = 0
6,071,130 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,214,655 UART: [idev] Erasing UDS.KEYID = 0
9,410,565 UART: [idev] Using Sha1 for KeyId Algorithm
9,432,395 UART: [idev] --
9,436,337 UART: [ldev] ++
9,436,912 UART: [ldev] CDI.KEYID = 6
9,437,954 UART: [ldev] SUBJECT.KEYID = 5
9,439,164 UART: [ldev] AUTHORITY.KEYID = 7
9,440,351 UART: [ldev] FE.KEYID = 1
9,484,808 UART: [ldev] Erasing FE.KEYID = 1
12,818,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,132,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,147,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,162,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,176,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,195,827 UART: [ldev] --
15,200,183 UART: [fwproc] Waiting for Commands...
15,202,937 UART: [fwproc] Received command 0x46574c44
15,205,182 UART: [fwproc] Received Image of size 114036 bytes
19,260,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,332,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,401,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,718,489 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,782,893 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,825,643 >>> mbox cmd response: failed
15,826,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,577 >>> mbox cmd response: failed
15,826,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,144 >>> mbox cmd response: failed
Initializing fuses
2,062,649 writing to cptra_bootfsm_go
5,852,625 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,919,958 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,619 UART:
192,973 UART: Running Caliptra ROM ...
194,163 UART:
603,907 UART: [state] CFI Enabled
616,348 UART: [state] LifecycleState = Unprovisioned
618,319 UART: [state] DebugLocked = No
620,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,299 UART: [kat] SHA2-256
795,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,633 UART: [kat] ++
806,076 UART: [kat] sha1
818,091 UART: [kat] SHA2-256
820,780 UART: [kat] SHA2-384
826,920 UART: [kat] SHA2-512-ACC
829,280 UART: [kat] ECC-384
3,115,399 UART: [kat] HMAC-384Kdf
3,126,601 UART: [kat] LMS
4,316,677 UART: [kat] --
4,320,299 UART: [cold-reset] ++
4,321,745 UART: [fht] Storing FHT @ 0x50003400
4,332,905 UART: [idev] ++
4,333,528 UART: [idev] CDI.KEYID = 6
4,334,439 UART: [idev] SUBJECT.KEYID = 7
4,335,706 UART: [idev] UDS.KEYID = 0
4,338,160 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,548 UART: [idev] Erasing UDS.KEYID = 0
7,622,391 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,694 UART: [idev] --
7,648,851 UART: [ldev] ++
7,649,461 UART: [ldev] CDI.KEYID = 6
7,650,379 UART: [ldev] SUBJECT.KEYID = 5
7,651,600 UART: [ldev] AUTHORITY.KEYID = 7
7,652,898 UART: [ldev] FE.KEYID = 1
7,663,414 UART: [ldev] Erasing FE.KEYID = 1
10,954,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,083 UART: [ldev] --
13,313,513 UART: [fwproc] Waiting for Commands...
13,316,429 UART: [fwproc] Received command 0x46574c44
13,318,620 UART: [fwproc] Received Image of size 114036 bytes
16,261,591 UART: ROM Fatal Error: 0x000B0022
16,265,001 >>> mbox cmd response: failed
16,265,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,265,826 >>> mbox cmd response: failed
16,266,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,266,396 >>> mbox cmd response: failed
Initializing fuses
2,056,272 writing to cptra_bootfsm_go
2,245,607 UART:
2,245,967 UART: Running Caliptra ROM ...
2,247,054 UART:
4,175,218 UART: [state] CFI Enabled
4,186,441 UART: [state] LifecycleState = Unprovisioned
4,188,387 UART: [state] DebugLocked = No
4,189,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,195,399 UART: [kat] SHA2-256
4,365,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,375,678 UART: [kat] ++
4,376,141 UART: [kat] sha1
4,387,949 UART: [kat] SHA2-256
4,390,651 UART: [kat] SHA2-384
4,396,858 UART: [kat] SHA2-512-ACC
4,399,211 UART: [kat] ECC-384
6,682,136 UART: [kat] HMAC-384Kdf
6,694,577 UART: [kat] LMS
7,884,699 UART: [kat] --
7,889,901 UART: [cold-reset] ++
7,890,933 UART: [fht] Storing FHT @ 0x50003400
7,901,720 UART: [idev] ++
7,902,288 UART: [idev] CDI.KEYID = 6
7,903,255 UART: [idev] SUBJECT.KEYID = 7
7,904,472 UART: [idev] UDS.KEYID = 0
7,906,987 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,050,349 UART: [idev] Erasing UDS.KEYID = 0
11,187,789 UART: [idev] Using Sha1 for KeyId Algorithm
11,209,764 UART: [idev] --
11,212,512 UART: [ldev] ++
11,213,079 UART: [ldev] CDI.KEYID = 6
11,214,026 UART: [ldev] SUBJECT.KEYID = 5
11,215,239 UART: [ldev] AUTHORITY.KEYID = 7
11,216,534 UART: [ldev] FE.KEYID = 1
11,229,486 UART: [ldev] Erasing FE.KEYID = 1
14,513,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,806,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,820,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,835,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,850,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,869,814 UART: [ldev] --
16,874,223 UART: [fwproc] Waiting for Commands...
16,877,422 UART: [fwproc] Received command 0x46574c44
16,879,612 UART: [fwproc] Received Image of size 114036 bytes
20,928,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,010,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,079,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,395,938 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,125,644 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,057,230 >>> mbox cmd response: failed
16,057,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,058,196 >>> mbox cmd response: failed
16,058,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,058,774 >>> mbox cmd response: failed
Initializing fuses
2,063,124 writing to cptra_bootfsm_go
7,938,879 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,885,470 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,116 UART:
192,515 UART: Running Caliptra ROM ...
193,640 UART:
193,781 UART: [state] CFI Enabled
263,741 UART: [state] LifecycleState = Unprovisioned
265,661 UART: [state] DebugLocked = No
267,151 UART: [state] WD Timer not started. Device not locked for debugging
270,226 UART: [kat] SHA2-256
449,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,961 UART: [kat] ++
461,496 UART: [kat] sha1
471,679 UART: [kat] SHA2-256
474,746 UART: [kat] SHA2-384
481,963 UART: [kat] SHA2-512-ACC
484,948 UART: [kat] ECC-384
2,946,355 UART: [kat] HMAC-384Kdf
2,968,168 UART: [kat] LMS
3,497,627 UART: [kat] --
3,502,709 UART: [cold-reset] ++
3,505,292 UART: [fht] FHT @ 0x50003400
3,515,962 UART: [idev] ++
3,516,534 UART: [idev] CDI.KEYID = 6
3,517,416 UART: [idev] SUBJECT.KEYID = 7
3,518,633 UART: [idev] UDS.KEYID = 0
3,521,342 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,380 UART: [idev] Erasing UDS.KEYID = 0
6,022,922 UART: [idev] Sha1 KeyId Algorithm
6,046,490 UART: [idev] --
6,051,149 UART: [ldev] ++
6,051,726 UART: [ldev] CDI.KEYID = 6
6,052,642 UART: [ldev] SUBJECT.KEYID = 5
6,053,807 UART: [ldev] AUTHORITY.KEYID = 7
6,055,044 UART: [ldev] FE.KEYID = 1
6,098,653 UART: [ldev] Erasing FE.KEYID = 1
8,601,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,212 UART: [ldev] --
10,413,183 UART: [fwproc] Wait for Commands...
10,416,033 UART: [fwproc] Recv command 0x46574c44
10,418,333 UART: [fwproc] Recv'd Img size: 114360 bytes
12,709,421 UART: ROM Fatal Error: 0x000B0022
12,712,527 >>> mbox cmd response: failed
12,712,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,218 >>> mbox cmd response: failed
12,713,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,772 >>> mbox cmd response: failed
Initializing fuses
2,053,844 writing to cptra_bootfsm_go
2,243,154 UART:
2,243,504 UART: Running Caliptra ROM ...
2,244,596 UART:
2,244,756 UART: [state] CFI Enabled
2,306,114 UART: [state] LifecycleState = Unprovisioned
2,307,992 UART: [state] DebugLocked = No
2,310,790 UART: [state] WD Timer not started. Device not locked for debugging
2,314,429 UART: [kat] SHA2-256
2,493,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,505,075 UART: [kat] ++
2,505,635 UART: [kat] sha1
2,516,153 UART: [kat] SHA2-256
2,519,172 UART: [kat] SHA2-384
2,525,012 UART: [kat] SHA2-512-ACC
2,527,963 UART: [kat] ECC-384
4,994,794 UART: [kat] HMAC-384Kdf
5,017,287 UART: [kat] LMS
5,546,725 UART: [kat] --
5,549,745 UART: [cold-reset] ++
5,550,978 UART: [fht] FHT @ 0x50003400
5,562,769 UART: [idev] ++
5,563,342 UART: [idev] CDI.KEYID = 6
5,564,255 UART: [idev] SUBJECT.KEYID = 7
5,565,471 UART: [idev] UDS.KEYID = 0
5,567,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,835 UART: [idev] Erasing UDS.KEYID = 0
8,074,061 UART: [idev] Sha1 KeyId Algorithm
8,096,761 UART: [idev] --
8,100,762 UART: [ldev] ++
8,101,339 UART: [ldev] CDI.KEYID = 6
8,102,225 UART: [ldev] SUBJECT.KEYID = 5
8,103,463 UART: [ldev] AUTHORITY.KEYID = 7
8,104,965 UART: [ldev] FE.KEYID = 1
8,146,520 UART: [ldev] Erasing FE.KEYID = 1
10,650,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,555 UART: [ldev] --
12,460,014 UART: [fwproc] Wait for Commands...
12,461,742 UART: [fwproc] Recv command 0x46574c44
12,463,838 UART: [fwproc] Recv'd Img size: 114360 bytes
15,872,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,947,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,016,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,334,421 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,125 UART:
192,492 UART: Running Caliptra ROM ...
193,680 UART:
193,835 UART: [state] CFI Enabled
264,725 UART: [state] LifecycleState = Unprovisioned
267,144 UART: [state] DebugLocked = No
269,008 UART: [state] WD Timer not started. Device not locked for debugging
273,498 UART: [kat] SHA2-256
463,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,134 UART: [kat] ++
474,620 UART: [kat] sha1
485,768 UART: [kat] SHA2-256
488,785 UART: [kat] SHA2-384
494,927 UART: [kat] SHA2-512-ACC
497,540 UART: [kat] ECC-384
2,949,202 UART: [kat] HMAC-384Kdf
2,972,049 UART: [kat] LMS
3,503,804 UART: [kat] --
3,508,625 UART: [cold-reset] ++
3,509,640 UART: [fht] FHT @ 0x50003400
3,521,287 UART: [idev] ++
3,521,962 UART: [idev] CDI.KEYID = 6
3,522,933 UART: [idev] SUBJECT.KEYID = 7
3,524,145 UART: [idev] UDS.KEYID = 0
3,527,109 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,191 UART: [idev] Erasing UDS.KEYID = 0
6,030,337 UART: [idev] Sha1 KeyId Algorithm
6,052,920 UART: [idev] --
6,059,374 UART: [ldev] ++
6,060,061 UART: [ldev] CDI.KEYID = 6
6,060,975 UART: [ldev] SUBJECT.KEYID = 5
6,062,134 UART: [ldev] AUTHORITY.KEYID = 7
6,063,367 UART: [ldev] FE.KEYID = 1
6,100,805 UART: [ldev] Erasing FE.KEYID = 1
8,607,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,874 UART: [ldev] --
10,415,169 UART: [fwproc] Wait for Commands...
10,416,833 UART: [fwproc] Recv command 0x46574c44
10,419,092 UART: [fwproc] Recv'd Img size: 114360 bytes
12,747,253 UART: ROM Fatal Error: 0x000B0022
12,750,871 >>> mbox cmd response: failed
12,751,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,751,633 >>> mbox cmd response: failed
12,751,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,752,197 >>> mbox cmd response: failed
Initializing fuses
2,063,277 writing to cptra_bootfsm_go
2,252,582 UART:
2,252,933 UART: Running Caliptra ROM ...
2,254,071 UART:
2,254,403 UART: [state] CFI Enabled
2,315,540 UART: [state] LifecycleState = Unprovisioned
2,317,889 UART: [state] DebugLocked = No
2,320,251 UART: [state] WD Timer not started. Device not locked for debugging
2,325,635 UART: [kat] SHA2-256
2,515,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,321 UART: [kat] ++
2,526,804 UART: [kat] sha1
2,539,370 UART: [kat] SHA2-256
2,542,401 UART: [kat] SHA2-384
2,547,529 UART: [kat] SHA2-512-ACC
2,550,154 UART: [kat] ECC-384
5,002,389 UART: [kat] HMAC-384Kdf
5,023,538 UART: [kat] LMS
5,555,329 UART: [kat] --
5,558,365 UART: [cold-reset] ++
5,560,031 UART: [fht] FHT @ 0x50003400
5,571,934 UART: [idev] ++
5,572,612 UART: [idev] CDI.KEYID = 6
5,573,575 UART: [idev] SUBJECT.KEYID = 7
5,574,789 UART: [idev] UDS.KEYID = 0
5,576,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,720,886 UART: [idev] Erasing UDS.KEYID = 0
8,079,550 UART: [idev] Sha1 KeyId Algorithm
8,101,135 UART: [idev] --
8,105,767 UART: [ldev] ++
8,106,459 UART: [ldev] CDI.KEYID = 6
8,107,366 UART: [ldev] SUBJECT.KEYID = 5
8,108,545 UART: [ldev] AUTHORITY.KEYID = 7
8,109,726 UART: [ldev] FE.KEYID = 1
8,151,537 UART: [ldev] Erasing FE.KEYID = 1
10,661,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,935 UART: [ldev] --
12,465,063 UART: [fwproc] Wait for Commands...
12,468,247 UART: [fwproc] Recv command 0x46574c44
12,470,558 UART: [fwproc] Recv'd Img size: 114360 bytes
15,913,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,998,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,114,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,658,099 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,439,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,662,332 >>> mbox cmd response: failed
12,662,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,208 >>> mbox cmd response: failed
12,663,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,769 >>> mbox cmd response: failed
Initializing fuses
2,055,069 writing to cptra_bootfsm_go
5,486,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,773,448 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,429 UART:
192,791 UART: Running Caliptra ROM ...
193,934 UART:
603,599 UART: [state] CFI Enabled
618,345 UART: [state] LifecycleState = Unprovisioned
620,734 UART: [state] DebugLocked = No
623,568 UART: [state] WD Timer not started. Device not locked for debugging
627,539 UART: [kat] SHA2-256
817,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,210 UART: [kat] ++
828,799 UART: [kat] sha1
840,547 UART: [kat] SHA2-256
843,550 UART: [kat] SHA2-384
850,550 UART: [kat] SHA2-512-ACC
853,111 UART: [kat] ECC-384
3,296,458 UART: [kat] HMAC-384Kdf
3,308,007 UART: [kat] LMS
3,839,844 UART: [kat] --
3,842,604 UART: [cold-reset] ++
3,843,995 UART: [fht] FHT @ 0x50003400
3,854,868 UART: [idev] ++
3,855,553 UART: [idev] CDI.KEYID = 6
3,856,494 UART: [idev] SUBJECT.KEYID = 7
3,857,732 UART: [idev] UDS.KEYID = 0
3,860,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,633 UART: [idev] Erasing UDS.KEYID = 0
6,336,161 UART: [idev] Sha1 KeyId Algorithm
6,359,503 UART: [idev] --
6,364,525 UART: [ldev] ++
6,365,213 UART: [ldev] CDI.KEYID = 6
6,366,150 UART: [ldev] SUBJECT.KEYID = 5
6,367,313 UART: [ldev] AUTHORITY.KEYID = 7
6,368,550 UART: [ldev] FE.KEYID = 1
6,379,223 UART: [ldev] Erasing FE.KEYID = 1
8,856,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,045 UART: [ldev] --
10,647,482 UART: [fwproc] Wait for Commands...
10,649,846 UART: [fwproc] Recv command 0x46574c44
10,652,103 UART: [fwproc] Recv'd Img size: 114360 bytes
12,975,224 UART: ROM Fatal Error: 0x000B0022
12,978,887 >>> mbox cmd response: failed
12,979,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,979,543 >>> mbox cmd response: failed
12,979,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,980,103 >>> mbox cmd response: failed
Initializing fuses
2,055,428 writing to cptra_bootfsm_go
2,244,735 UART:
2,245,086 UART: Running Caliptra ROM ...
2,246,250 UART:
7,466,750 UART: [state] CFI Enabled
7,476,721 UART: [state] LifecycleState = Unprovisioned
7,479,079 UART: [state] DebugLocked = No
7,481,362 UART: [state] WD Timer not started. Device not locked for debugging
7,485,641 UART: [kat] SHA2-256
7,675,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,686,287 UART: [kat] ++
7,686,800 UART: [kat] sha1
7,698,017 UART: [kat] SHA2-256
7,701,039 UART: [kat] SHA2-384
7,706,219 UART: [kat] SHA2-512-ACC
7,708,838 UART: [kat] ECC-384
10,151,165 UART: [kat] HMAC-384Kdf
10,164,149 UART: [kat] LMS
10,695,977 UART: [kat] --
10,700,174 UART: [cold-reset] ++
10,701,518 UART: [fht] FHT @ 0x50003400
10,712,176 UART: [idev] ++
10,712,862 UART: [idev] CDI.KEYID = 6
10,713,874 UART: [idev] SUBJECT.KEYID = 7
10,715,030 UART: [idev] UDS.KEYID = 0
10,717,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,861,059 UART: [idev] Erasing UDS.KEYID = 0
13,192,953 UART: [idev] Sha1 KeyId Algorithm
13,214,674 UART: [idev] --
13,219,423 UART: [ldev] ++
13,220,098 UART: [ldev] CDI.KEYID = 6
13,220,981 UART: [ldev] SUBJECT.KEYID = 5
13,222,141 UART: [ldev] AUTHORITY.KEYID = 7
13,223,430 UART: [ldev] FE.KEYID = 1
13,233,617 UART: [ldev] Erasing FE.KEYID = 1
15,709,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,430,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,445,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,460,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,475,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,496,843 UART: [ldev] --
17,501,687 UART: [fwproc] Wait for Commands...
17,504,443 UART: [fwproc] Recv command 0x46574c44
17,506,760 UART: [fwproc] Recv'd Img size: 114360 bytes
20,957,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,035,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,151,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,694,734 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,756,945 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,865,384 >>> mbox cmd response: failed
12,865,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,866,247 >>> mbox cmd response: failed
12,866,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,866,884 >>> mbox cmd response: failed
Initializing fuses
2,054,645 writing to cptra_bootfsm_go
10,747,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,946,745 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,883 UART: [kat] SHA2-256
892,821 UART: [kat] SHA2-384
895,560 UART: [kat] SHA2-512-ACC
897,461 UART: [kat] ECC-384
902,972 UART: [kat] HMAC-384Kdf
907,436 UART: [kat] LMS
1,475,632 UART: [kat] --
1,476,389 UART: [cold-reset] ++
1,476,969 UART: [fht] Storing FHT @ 0x50003400
1,479,660 UART: [idev] ++
1,479,828 UART: [idev] CDI.KEYID = 6
1,480,188 UART: [idev] SUBJECT.KEYID = 7
1,480,612 UART: [idev] UDS.KEYID = 0
1,480,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,966 UART: [idev] Erasing UDS.KEYID = 0
1,504,882 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,624 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,347 UART: [ldev] Erasing FE.KEYID = 1
1,546,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,496 UART: [ldev] --
1,585,939 UART: [fwproc] Waiting for Commands...
1,586,664 UART: [fwproc] Received command 0x46574c44
1,587,455 UART: [fwproc] Received Image of size 114360 bytes
1,852,067 UART: ROM Fatal Error: 0x000B0022
1,853,224 >>> mbox cmd response: failed
1,853,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,853,230 >>> mbox cmd response: failed
1,853,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,853,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,420 UART: [kat] SHA2-512-ACC
897,321 UART: [kat] ECC-384
902,732 UART: [kat] HMAC-384Kdf
907,264 UART: [kat] LMS
1,475,460 UART: [kat] --
1,476,231 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,384 UART: [idev] ++
1,479,552 UART: [idev] CDI.KEYID = 6
1,479,912 UART: [idev] SUBJECT.KEYID = 7
1,480,336 UART: [idev] UDS.KEYID = 0
1,480,681 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,505,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,814 UART: [idev] --
1,514,991 UART: [ldev] ++
1,515,159 UART: [ldev] CDI.KEYID = 6
1,515,522 UART: [ldev] SUBJECT.KEYID = 5
1,515,948 UART: [ldev] AUTHORITY.KEYID = 7
1,516,411 UART: [ldev] FE.KEYID = 1
1,521,699 UART: [ldev] Erasing FE.KEYID = 1
1,547,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,436 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,506 UART: [fwproc] Received command 0x46574c44
1,588,297 UART: [fwproc] Received Image of size 114360 bytes
2,886,259 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,436 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,707,975 >>> mbox cmd response: failed
1,707,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,981 >>> mbox cmd response: failed
1,707,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,564 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,391 UART: [kat] SHA2-512-ACC
897,292 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,476,934 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,725 UART: [idev] Erasing UDS.KEYID = 0
1,505,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] --
1,515,270 UART: [ldev] ++
1,515,438 UART: [ldev] CDI.KEYID = 6
1,515,801 UART: [ldev] SUBJECT.KEYID = 5
1,516,227 UART: [ldev] AUTHORITY.KEYID = 7
1,516,690 UART: [ldev] FE.KEYID = 1
1,522,110 UART: [ldev] Erasing FE.KEYID = 1
1,548,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,101 UART: [ldev] --
1,587,438 UART: [fwproc] Waiting for Commands...
1,588,229 UART: [fwproc] Received command 0x46574c44
1,589,020 UART: [fwproc] Received Image of size 114360 bytes
1,855,266 UART: ROM Fatal Error: 0x000B0022
1,856,423 >>> mbox cmd response: failed
1,856,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,429 >>> mbox cmd response: failed
1,856,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,002 UART: [kat] SHA2-256
881,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,048 UART: [kat] ++
886,200 UART: [kat] sha1
890,512 UART: [kat] SHA2-256
892,450 UART: [kat] SHA2-384
894,999 UART: [kat] SHA2-512-ACC
896,900 UART: [kat] ECC-384
902,391 UART: [kat] HMAC-384Kdf
907,017 UART: [kat] LMS
1,475,213 UART: [kat] --
1,476,152 UART: [cold-reset] ++
1,476,552 UART: [fht] Storing FHT @ 0x50003400
1,479,365 UART: [idev] ++
1,479,533 UART: [idev] CDI.KEYID = 6
1,479,893 UART: [idev] SUBJECT.KEYID = 7
1,480,317 UART: [idev] UDS.KEYID = 0
1,480,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,339 UART: [idev] Erasing UDS.KEYID = 0
1,504,805 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,395 UART: [idev] --
1,514,550 UART: [ldev] ++
1,514,718 UART: [ldev] CDI.KEYID = 6
1,515,081 UART: [ldev] SUBJECT.KEYID = 5
1,515,507 UART: [ldev] AUTHORITY.KEYID = 7
1,515,970 UART: [ldev] FE.KEYID = 1
1,521,304 UART: [ldev] Erasing FE.KEYID = 1
1,546,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,589 UART: [ldev] --
1,586,016 UART: [fwproc] Waiting for Commands...
1,586,795 UART: [fwproc] Received command 0x46574c44
1,587,586 UART: [fwproc] Received Image of size 114360 bytes
2,884,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,566 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,749 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,750 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,706,398 >>> mbox cmd response: failed
1,706,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,404 >>> mbox cmd response: failed
1,706,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,174 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,041 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
893,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,567 UART: [kat] ++
897,719 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
917,782 UART: [kat] HMAC-384Kdf
922,454 UART: [kat] LMS
1,170,782 UART: [kat] --
1,171,557 UART: [cold-reset] ++
1,172,107 UART: [fht] FHT @ 0x50003400
1,174,768 UART: [idev] ++
1,174,936 UART: [idev] CDI.KEYID = 6
1,175,296 UART: [idev] SUBJECT.KEYID = 7
1,175,720 UART: [idev] UDS.KEYID = 0
1,176,065 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,332 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,209,079 UART: [idev] --
1,210,279 UART: [ldev] ++
1,210,447 UART: [ldev] CDI.KEYID = 6
1,210,810 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,288 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,026 UART: ROM Fatal Error: 0x000B0022
1,551,183 >>> mbox cmd response: failed
1,551,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,189 >>> mbox cmd response: failed
1,551,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,372 UART: [kat] SHA2-512-ACC
908,273 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,432 UART: [kat] LMS
1,170,760 UART: [kat] --
1,171,873 UART: [cold-reset] ++
1,172,443 UART: [fht] FHT @ 0x50003400
1,175,154 UART: [idev] ++
1,175,322 UART: [idev] CDI.KEYID = 6
1,175,682 UART: [idev] SUBJECT.KEYID = 7
1,176,106 UART: [idev] UDS.KEYID = 0
1,176,451 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,849 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,553 UART: [ldev] ++
1,210,721 UART: [ldev] CDI.KEYID = 6
1,211,084 UART: [ldev] SUBJECT.KEYID = 5
1,211,510 UART: [ldev] AUTHORITY.KEYID = 7
1,211,973 UART: [ldev] FE.KEYID = 1
1,217,191 UART: [ldev] Erasing FE.KEYID = 1
1,243,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,135 UART: [ldev] --
1,282,612 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,863 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,406,472 >>> mbox cmd response: failed
1,406,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,478 >>> mbox cmd response: failed
1,406,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,376 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
893,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,020 UART: [kat] ++
898,172 UART: [kat] sha1
902,438 UART: [kat] SHA2-256
904,378 UART: [kat] SHA2-384
907,197 UART: [kat] SHA2-512-ACC
909,098 UART: [kat] ECC-384
918,925 UART: [kat] HMAC-384Kdf
923,529 UART: [kat] LMS
1,171,857 UART: [kat] --
1,172,658 UART: [cold-reset] ++
1,173,180 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,201,818 UART: [idev] Sha1 KeyId Algorithm
1,210,382 UART: [idev] --
1,211,542 UART: [ldev] ++
1,211,710 UART: [ldev] CDI.KEYID = 6
1,212,073 UART: [ldev] SUBJECT.KEYID = 5
1,212,499 UART: [ldev] AUTHORITY.KEYID = 7
1,212,962 UART: [ldev] FE.KEYID = 1
1,218,400 UART: [ldev] Erasing FE.KEYID = 1
1,245,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,102 UART: [ldev] --
1,284,505 UART: [fwproc] Wait for Commands...
1,285,123 UART: [fwproc] Recv command 0x46574c44
1,285,851 UART: [fwproc] Recv'd Img size: 114360 bytes
1,551,993 UART: ROM Fatal Error: 0x000B0022
1,553,150 >>> mbox cmd response: failed
1,553,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,156 >>> mbox cmd response: failed
1,553,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,529 UART: [kat] SHA2-256
893,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,304 UART: [kat] ++
897,456 UART: [kat] sha1
901,670 UART: [kat] SHA2-256
903,610 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
918,101 UART: [kat] HMAC-384Kdf
922,775 UART: [kat] LMS
1,171,103 UART: [kat] --
1,172,190 UART: [cold-reset] ++
1,172,602 UART: [fht] FHT @ 0x50003400
1,175,281 UART: [idev] ++
1,175,449 UART: [idev] CDI.KEYID = 6
1,175,809 UART: [idev] SUBJECT.KEYID = 7
1,176,233 UART: [idev] UDS.KEYID = 0
1,176,578 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,535 UART: [idev] Erasing UDS.KEYID = 0
1,201,030 UART: [idev] Sha1 KeyId Algorithm
1,209,404 UART: [idev] --
1,210,290 UART: [ldev] ++
1,210,458 UART: [ldev] CDI.KEYID = 6
1,210,821 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,162 UART: [ldev] Erasing FE.KEYID = 1
1,243,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,838 UART: [ldev] --
1,283,269 UART: [fwproc] Wait for Commands...
1,283,913 UART: [fwproc] Recv command 0x46574c44
1,284,641 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,012 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,108 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,407,439 >>> mbox cmd response: failed
1,407,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,445 >>> mbox cmd response: failed
1,407,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,629,225 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,174,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,357 UART: [idev] Erasing UDS.KEYID = 0
1,199,819 UART: [idev] Sha1 KeyId Algorithm
1,208,861 UART: [idev] --
1,210,096 UART: [ldev] ++
1,210,264 UART: [ldev] CDI.KEYID = 6
1,210,628 UART: [ldev] SUBJECT.KEYID = 5
1,211,055 UART: [ldev] AUTHORITY.KEYID = 7
1,211,518 UART: [ldev] FE.KEYID = 1
1,216,622 UART: [ldev] Erasing FE.KEYID = 1
1,242,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,634 UART: [ldev] --
1,281,960 UART: [fwproc] Wait for Commands...
1,282,557 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114360 bytes
1,550,183 UART: ROM Fatal Error: 0x000B0022
1,551,340 >>> mbox cmd response: failed
1,551,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,346 >>> mbox cmd response: failed
1,551,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,640 UART: [state] LifecycleState = Unprovisioned
85,295 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,961 UART: [kat] ++
895,113 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
904,144 UART: [kat] SHA2-512-ACC
906,045 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,172 UART: [kat] LMS
1,168,484 UART: [kat] --
1,169,265 UART: [cold-reset] ++
1,169,707 UART: [fht] FHT @ 0x50003400
1,172,283 UART: [idev] ++
1,172,451 UART: [idev] CDI.KEYID = 6
1,172,812 UART: [idev] SUBJECT.KEYID = 7
1,173,237 UART: [idev] UDS.KEYID = 0
1,173,583 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,198,365 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,214,918 UART: [ldev] Erasing FE.KEYID = 1
1,240,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,262 UART: [ldev] --
1,279,724 UART: [fwproc] Wait for Commands...
1,280,297 UART: [fwproc] Recv command 0x46574c44
1,281,030 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,067 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,400,829 >>> mbox cmd response: failed
1,400,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,835 >>> mbox cmd response: failed
1,400,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,715 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,199,782 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,243,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,282,037 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,377 UART: [fwproc] Recv'd Img size: 114360 bytes
1,549,970 UART: ROM Fatal Error: 0x000B0022
1,551,127 >>> mbox cmd response: failed
1,551,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,133 >>> mbox cmd response: failed
1,551,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,811 UART: [kat] HMAC-384Kdf
921,529 UART: [kat] LMS
1,169,841 UART: [kat] --
1,170,704 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,215,875 UART: [ldev] Erasing FE.KEYID = 1
1,242,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,776 UART: [fwproc] Recv command 0x46574c44
1,283,509 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,090 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,403,908 >>> mbox cmd response: failed
1,403,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,914 >>> mbox cmd response: failed
1,403,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,926 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,067 UART:
192,437 UART: Running Caliptra ROM ...
193,535 UART:
193,682 UART: [state] CFI Enabled
262,029 UART: [state] LifecycleState = Unprovisioned
264,313 UART: [state] DebugLocked = No
266,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,962 UART: [kat] SHA2-256
440,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,188 UART: [kat] ++
451,636 UART: [kat] sha1
461,165 UART: [kat] SHA2-256
463,855 UART: [kat] SHA2-384
468,159 UART: [kat] SHA2-512-ACC
470,517 UART: [kat] ECC-384
2,765,890 UART: [kat] HMAC-384Kdf
2,798,606 UART: [kat] LMS
3,988,900 UART: [kat] --
3,993,534 UART: [cold-reset] ++
3,994,933 UART: [fht] Storing FHT @ 0x50003400
4,005,550 UART: [idev] ++
4,006,119 UART: [idev] CDI.KEYID = 6
4,007,100 UART: [idev] SUBJECT.KEYID = 7
4,008,322 UART: [idev] UDS.KEYID = 0
4,010,893 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,974 UART: [idev] Erasing UDS.KEYID = 0
7,346,131 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,049 UART: [idev] --
7,371,156 UART: [ldev] ++
7,371,786 UART: [ldev] CDI.KEYID = 6
7,372,690 UART: [ldev] SUBJECT.KEYID = 5
7,373,914 UART: [ldev] AUTHORITY.KEYID = 7
7,375,209 UART: [ldev] FE.KEYID = 1
7,420,742 UART: [ldev] Erasing FE.KEYID = 1
10,755,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,522 UART: [ldev] --
13,132,601 UART: [fwproc] Waiting for Commands...
13,135,026 UART: [fwproc] Received command 0x46574c44
13,137,215 UART: [fwproc] Received Image of size 114036 bytes
15,846,789 UART: ROM Fatal Error: 0x000B003E
15,850,236 >>> mbox cmd response: failed
15,850,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,851,012 >>> mbox cmd response: failed
15,851,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,851,578 >>> mbox cmd response: failed
Initializing fuses
2,055,755 writing to cptra_bootfsm_go
2,245,052 UART:
2,245,400 UART: Running Caliptra ROM ...
2,246,540 UART:
2,246,709 UART: [state] CFI Enabled
2,309,992 UART: [state] LifecycleState = Unprovisioned
2,311,933 UART: [state] DebugLocked = No
2,314,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,615 UART: [kat] SHA2-256
2,488,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,807 UART: [kat] ++
2,499,357 UART: [kat] sha1
2,511,386 UART: [kat] SHA2-256
2,514,086 UART: [kat] SHA2-384
2,519,000 UART: [kat] SHA2-512-ACC
2,521,412 UART: [kat] ECC-384
4,809,854 UART: [kat] HMAC-384Kdf
4,822,982 UART: [kat] LMS
6,013,276 UART: [kat] --
6,018,466 UART: [cold-reset] ++
6,019,811 UART: [fht] Storing FHT @ 0x50003400
6,031,038 UART: [idev] ++
6,031,608 UART: [idev] CDI.KEYID = 6
6,032,546 UART: [idev] SUBJECT.KEYID = 7
6,033,817 UART: [idev] UDS.KEYID = 0
6,036,081 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,179,655 UART: [idev] Erasing UDS.KEYID = 0
9,370,083 UART: [idev] Using Sha1 for KeyId Algorithm
9,391,826 UART: [idev] --
9,395,291 UART: [ldev] ++
9,395,859 UART: [ldev] CDI.KEYID = 6
9,396,827 UART: [ldev] SUBJECT.KEYID = 5
9,398,079 UART: [ldev] AUTHORITY.KEYID = 7
9,399,319 UART: [ldev] FE.KEYID = 1
9,446,423 UART: [ldev] Erasing FE.KEYID = 1
12,776,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,442 UART: [ldev] --
15,159,226 UART: [fwproc] Waiting for Commands...
15,160,859 UART: [fwproc] Received command 0x46574c44
15,163,056 UART: [fwproc] Received Image of size 114036 bytes
19,211,349 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,288,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,357,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,673,893 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,808,302 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,588,115 >>> mbox cmd response: failed
15,588,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,589,016 >>> mbox cmd response: failed
15,589,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,589,668 >>> mbox cmd response: failed
Initializing fuses
2,055,874 writing to cptra_bootfsm_go
5,858,993 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,951,103 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,365 UART:
192,737 UART: Running Caliptra ROM ...
193,840 UART:
603,669 UART: [state] CFI Enabled
616,619 UART: [state] LifecycleState = Unprovisioned
618,511 UART: [state] DebugLocked = No
620,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,689 UART: [kat] SHA2-256
794,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,962 UART: [kat] ++
805,467 UART: [kat] sha1
816,724 UART: [kat] SHA2-256
819,410 UART: [kat] SHA2-384
825,069 UART: [kat] SHA2-512-ACC
827,415 UART: [kat] ECC-384
3,110,442 UART: [kat] HMAC-384Kdf
3,122,540 UART: [kat] LMS
4,312,679 UART: [kat] --
4,317,237 UART: [cold-reset] ++
4,319,660 UART: [fht] Storing FHT @ 0x50003400
4,331,584 UART: [idev] ++
4,332,217 UART: [idev] CDI.KEYID = 6
4,333,138 UART: [idev] SUBJECT.KEYID = 7
4,334,354 UART: [idev] UDS.KEYID = 0
4,336,994 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,439 UART: [idev] Erasing UDS.KEYID = 0
7,624,185 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,996 UART: [idev] --
7,650,536 UART: [ldev] ++
7,651,108 UART: [ldev] CDI.KEYID = 6
7,652,126 UART: [ldev] SUBJECT.KEYID = 5
7,653,286 UART: [ldev] AUTHORITY.KEYID = 7
7,654,516 UART: [ldev] FE.KEYID = 1
7,666,135 UART: [ldev] Erasing FE.KEYID = 1
10,951,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,648 UART: [ldev] --
13,310,788 UART: [fwproc] Waiting for Commands...
13,313,163 UART: [fwproc] Received command 0x46574c44
13,315,348 UART: [fwproc] Received Image of size 114036 bytes
16,019,474 UART: ROM Fatal Error: 0x000B003E
16,022,936 >>> mbox cmd response: failed
16,023,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,688 >>> mbox cmd response: failed
16,023,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,243 >>> mbox cmd response: failed
Initializing fuses
2,055,104 writing to cptra_bootfsm_go
2,244,427 UART:
2,244,806 UART: Running Caliptra ROM ...
2,245,855 UART:
4,430,704 UART: [state] CFI Enabled
4,445,178 UART: [state] LifecycleState = Unprovisioned
4,447,089 UART: [state] DebugLocked = No
4,449,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,453,819 UART: [kat] SHA2-256
4,623,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,634,148 UART: [kat] ++
4,634,609 UART: [kat] sha1
4,645,495 UART: [kat] SHA2-256
4,648,194 UART: [kat] SHA2-384
4,654,189 UART: [kat] SHA2-512-ACC
4,656,591 UART: [kat] ECC-384
6,943,313 UART: [kat] HMAC-384Kdf
6,955,249 UART: [kat] LMS
8,145,374 UART: [kat] --
8,148,563 UART: [cold-reset] ++
8,149,960 UART: [fht] Storing FHT @ 0x50003400
8,162,313 UART: [idev] ++
8,162,877 UART: [idev] CDI.KEYID = 6
8,163,759 UART: [idev] SUBJECT.KEYID = 7
8,165,025 UART: [idev] UDS.KEYID = 0
8,167,406 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,310,743 UART: [idev] Erasing UDS.KEYID = 0
11,458,039 UART: [idev] Using Sha1 for KeyId Algorithm
11,480,605 UART: [idev] --
11,484,387 UART: [ldev] ++
11,484,958 UART: [ldev] CDI.KEYID = 6
11,485,892 UART: [ldev] SUBJECT.KEYID = 5
11,487,138 UART: [ldev] AUTHORITY.KEYID = 7
11,488,451 UART: [ldev] FE.KEYID = 1
11,500,214 UART: [ldev] Erasing FE.KEYID = 1
14,787,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,081,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,095,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,110,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,125,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,142,952 UART: [ldev] --
17,147,038 UART: [fwproc] Waiting for Commands...
17,149,135 UART: [fwproc] Received command 0x46574c44
17,151,319 UART: [fwproc] Received Image of size 114036 bytes
21,202,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,282,744 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,351,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,668,107 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,130,626 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,766,733 >>> mbox cmd response: failed
15,767,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,885 >>> mbox cmd response: failed
15,768,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,445 >>> mbox cmd response: failed
Initializing fuses
2,056,767 writing to cptra_bootfsm_go
8,217,631 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,169,555 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,433 UART:
192,946 UART: Running Caliptra ROM ...
194,126 UART:
194,272 UART: [state] CFI Enabled
261,576 UART: [state] LifecycleState = Unprovisioned
263,500 UART: [state] DebugLocked = No
266,028 UART: [state] WD Timer not started. Device not locked for debugging
269,818 UART: [kat] SHA2-256
448,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,531 UART: [kat] ++
461,071 UART: [kat] sha1
472,284 UART: [kat] SHA2-256
475,295 UART: [kat] SHA2-384
482,458 UART: [kat] SHA2-512-ACC
485,442 UART: [kat] ECC-384
2,945,491 UART: [kat] HMAC-384Kdf
2,971,886 UART: [kat] LMS
3,501,306 UART: [kat] --
3,504,703 UART: [cold-reset] ++
3,506,476 UART: [fht] FHT @ 0x50003400
3,517,940 UART: [idev] ++
3,518,506 UART: [idev] CDI.KEYID = 6
3,519,411 UART: [idev] SUBJECT.KEYID = 7
3,520,625 UART: [idev] UDS.KEYID = 0
3,523,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,622 UART: [idev] Erasing UDS.KEYID = 0
6,025,103 UART: [idev] Sha1 KeyId Algorithm
6,048,123 UART: [idev] --
6,052,231 UART: [ldev] ++
6,052,802 UART: [ldev] CDI.KEYID = 6
6,053,718 UART: [ldev] SUBJECT.KEYID = 5
6,054,879 UART: [ldev] AUTHORITY.KEYID = 7
6,056,114 UART: [ldev] FE.KEYID = 1
6,099,433 UART: [ldev] Erasing FE.KEYID = 1
8,605,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,060 UART: [ldev] --
10,410,776 UART: [fwproc] Wait for Commands...
10,412,607 UART: [fwproc] Recv command 0x46574c44
10,414,702 UART: [fwproc] Recv'd Img size: 114360 bytes
12,457,429 UART: ROM Fatal Error: 0x000B003E
12,460,543 >>> mbox cmd response: failed
12,460,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,284 >>> mbox cmd response: failed
12,461,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,839 >>> mbox cmd response: failed
Initializing fuses
2,053,434 writing to cptra_bootfsm_go
2,242,719 UART:
2,243,058 UART: Running Caliptra ROM ...
2,244,191 UART:
2,244,391 UART: [state] CFI Enabled
2,306,012 UART: [state] LifecycleState = Unprovisioned
2,307,868 UART: [state] DebugLocked = No
2,309,104 UART: [state] WD Timer not started. Device not locked for debugging
2,313,173 UART: [kat] SHA2-256
2,492,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,909 UART: [kat] ++
2,504,449 UART: [kat] sha1
2,515,665 UART: [kat] SHA2-256
2,518,670 UART: [kat] SHA2-384
2,524,315 UART: [kat] SHA2-512-ACC
2,527,265 UART: [kat] ECC-384
4,989,909 UART: [kat] HMAC-384Kdf
5,014,074 UART: [kat] LMS
5,543,502 UART: [kat] --
5,547,276 UART: [cold-reset] ++
5,549,387 UART: [fht] FHT @ 0x50003400
5,560,198 UART: [idev] ++
5,560,809 UART: [idev] CDI.KEYID = 6
5,561,696 UART: [idev] SUBJECT.KEYID = 7
5,562,912 UART: [idev] UDS.KEYID = 0
5,565,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,067 UART: [idev] Erasing UDS.KEYID = 0
8,068,093 UART: [idev] Sha1 KeyId Algorithm
8,091,712 UART: [idev] --
8,095,604 UART: [ldev] ++
8,096,181 UART: [ldev] CDI.KEYID = 6
8,097,098 UART: [ldev] SUBJECT.KEYID = 5
8,098,271 UART: [ldev] AUTHORITY.KEYID = 7
8,099,506 UART: [ldev] FE.KEYID = 1
8,143,430 UART: [ldev] Erasing FE.KEYID = 1
10,646,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,467 UART: [ldev] --
12,456,977 UART: [fwproc] Wait for Commands...
12,459,353 UART: [fwproc] Recv command 0x46574c44
12,461,450 UART: [fwproc] Recv'd Img size: 114360 bytes
15,862,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,323,929 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,189 UART:
192,540 UART: Running Caliptra ROM ...
193,634 UART:
193,774 UART: [state] CFI Enabled
261,202 UART: [state] LifecycleState = Unprovisioned
263,591 UART: [state] DebugLocked = No
266,127 UART: [state] WD Timer not started. Device not locked for debugging
271,116 UART: [kat] SHA2-256
460,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,781 UART: [kat] ++
472,233 UART: [kat] sha1
485,220 UART: [kat] SHA2-256
488,236 UART: [kat] SHA2-384
493,891 UART: [kat] SHA2-512-ACC
496,503 UART: [kat] ECC-384
2,945,899 UART: [kat] HMAC-384Kdf
2,970,773 UART: [kat] LMS
3,502,549 UART: [kat] --
3,506,010 UART: [cold-reset] ++
3,507,138 UART: [fht] FHT @ 0x50003400
3,519,956 UART: [idev] ++
3,520,658 UART: [idev] CDI.KEYID = 6
3,521,679 UART: [idev] SUBJECT.KEYID = 7
3,522,837 UART: [idev] UDS.KEYID = 0
3,525,428 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,412 UART: [idev] Erasing UDS.KEYID = 0
6,026,351 UART: [idev] Sha1 KeyId Algorithm
6,049,019 UART: [idev] --
6,052,863 UART: [ldev] ++
6,053,552 UART: [ldev] CDI.KEYID = 6
6,054,638 UART: [ldev] SUBJECT.KEYID = 5
6,055,697 UART: [ldev] AUTHORITY.KEYID = 7
6,056,874 UART: [ldev] FE.KEYID = 1
6,100,625 UART: [ldev] Erasing FE.KEYID = 1
8,607,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,784 UART: [ldev] --
10,415,908 UART: [fwproc] Wait for Commands...
10,417,955 UART: [fwproc] Recv command 0x46574c44
10,420,269 UART: [fwproc] Recv'd Img size: 114360 bytes
12,501,735 UART: ROM Fatal Error: 0x000B003E
12,505,398 >>> mbox cmd response: failed
12,505,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,054 >>> mbox cmd response: failed
12,506,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,812 >>> mbox cmd response: failed
Initializing fuses
2,055,134 writing to cptra_bootfsm_go
2,244,473 UART:
2,244,818 UART: Running Caliptra ROM ...
2,245,952 UART:
2,246,127 UART: [state] CFI Enabled
2,305,392 UART: [state] LifecycleState = Unprovisioned
2,307,722 UART: [state] DebugLocked = No
2,309,434 UART: [state] WD Timer not started. Device not locked for debugging
2,313,413 UART: [kat] SHA2-256
2,503,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,514,042 UART: [kat] ++
2,514,506 UART: [kat] sha1
2,526,801 UART: [kat] SHA2-256
2,529,778 UART: [kat] SHA2-384
2,534,648 UART: [kat] SHA2-512-ACC
2,537,217 UART: [kat] ECC-384
4,988,688 UART: [kat] HMAC-384Kdf
5,012,821 UART: [kat] LMS
5,544,556 UART: [kat] --
5,548,548 UART: [cold-reset] ++
5,550,370 UART: [fht] FHT @ 0x50003400
5,562,538 UART: [idev] ++
5,563,214 UART: [idev] CDI.KEYID = 6
5,564,183 UART: [idev] SUBJECT.KEYID = 7
5,565,395 UART: [idev] UDS.KEYID = 0
5,567,710 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,627 UART: [idev] Erasing UDS.KEYID = 0
8,071,362 UART: [idev] Sha1 KeyId Algorithm
8,092,713 UART: [idev] --
8,098,433 UART: [ldev] ++
8,099,130 UART: [ldev] CDI.KEYID = 6
8,100,022 UART: [ldev] SUBJECT.KEYID = 5
8,101,238 UART: [ldev] AUTHORITY.KEYID = 7
8,102,488 UART: [ldev] FE.KEYID = 1
8,141,437 UART: [ldev] Erasing FE.KEYID = 1
10,650,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,843 UART: [ldev] --
12,456,972 UART: [fwproc] Wait for Commands...
12,458,420 UART: [fwproc] Recv command 0x46574c44
12,460,677 UART: [fwproc] Recv'd Img size: 114360 bytes
15,914,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,106,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,648,739 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,438,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,295,679 >>> mbox cmd response: failed
12,296,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,706 >>> mbox cmd response: failed
12,296,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,262 >>> mbox cmd response: failed
Initializing fuses
2,055,672 writing to cptra_bootfsm_go
5,493,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,797,742 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,575 UART:
192,942 UART: Running Caliptra ROM ...
194,053 UART:
603,839 UART: [state] CFI Enabled
616,469 UART: [state] LifecycleState = Unprovisioned
618,888 UART: [state] DebugLocked = No
620,458 UART: [state] WD Timer not started. Device not locked for debugging
624,610 UART: [kat] SHA2-256
814,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,290 UART: [kat] ++
825,791 UART: [kat] sha1
837,642 UART: [kat] SHA2-256
840,656 UART: [kat] SHA2-384
846,527 UART: [kat] SHA2-512-ACC
849,138 UART: [kat] ECC-384
3,291,951 UART: [kat] HMAC-384Kdf
3,304,953 UART: [kat] LMS
3,836,787 UART: [kat] --
3,840,565 UART: [cold-reset] ++
3,843,203 UART: [fht] FHT @ 0x50003400
3,854,886 UART: [idev] ++
3,855,582 UART: [idev] CDI.KEYID = 6
3,856,467 UART: [idev] SUBJECT.KEYID = 7
3,857,734 UART: [idev] UDS.KEYID = 0
3,860,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,702 UART: [idev] Erasing UDS.KEYID = 0
6,333,109 UART: [idev] Sha1 KeyId Algorithm
6,356,404 UART: [idev] --
6,362,508 UART: [ldev] ++
6,363,188 UART: [ldev] CDI.KEYID = 6
6,364,155 UART: [ldev] SUBJECT.KEYID = 5
6,365,256 UART: [ldev] AUTHORITY.KEYID = 7
6,366,541 UART: [ldev] FE.KEYID = 1
6,379,724 UART: [ldev] Erasing FE.KEYID = 1
8,853,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,842 UART: [ldev] --
10,642,217 UART: [fwproc] Wait for Commands...
10,644,259 UART: [fwproc] Recv command 0x46574c44
10,646,519 UART: [fwproc] Recv'd Img size: 114360 bytes
12,731,326 UART: ROM Fatal Error: 0x000B003E
12,734,985 >>> mbox cmd response: failed
12,735,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,719 >>> mbox cmd response: failed
12,735,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,277 >>> mbox cmd response: failed
Initializing fuses
2,060,071 writing to cptra_bootfsm_go
2,249,442 UART:
2,249,777 UART: Running Caliptra ROM ...
2,250,826 UART:
7,710,818 UART: [state] CFI Enabled
7,726,712 UART: [state] LifecycleState = Unprovisioned
7,729,095 UART: [state] DebugLocked = No
7,731,324 UART: [state] WD Timer not started. Device not locked for debugging
7,736,370 UART: [kat] SHA2-256
7,926,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,937,028 UART: [kat] ++
7,937,551 UART: [kat] sha1
7,950,329 UART: [kat] SHA2-256
7,953,351 UART: [kat] SHA2-384
7,959,134 UART: [kat] SHA2-512-ACC
7,961,741 UART: [kat] ECC-384
10,401,882 UART: [kat] HMAC-384Kdf
10,415,963 UART: [kat] LMS
10,947,799 UART: [kat] --
10,952,713 UART: [cold-reset] ++
10,954,320 UART: [fht] FHT @ 0x50003400
10,966,320 UART: [idev] ++
10,966,996 UART: [idev] CDI.KEYID = 6
10,968,008 UART: [idev] SUBJECT.KEYID = 7
10,969,170 UART: [idev] UDS.KEYID = 0
10,971,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,115,260 UART: [idev] Erasing UDS.KEYID = 0
13,441,670 UART: [idev] Sha1 KeyId Algorithm
13,464,683 UART: [idev] --
13,469,489 UART: [ldev] ++
13,470,165 UART: [ldev] CDI.KEYID = 6
13,471,044 UART: [ldev] SUBJECT.KEYID = 5
13,472,251 UART: [ldev] AUTHORITY.KEYID = 7
13,473,503 UART: [ldev] FE.KEYID = 1
13,484,349 UART: [ldev] Erasing FE.KEYID = 1
15,962,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,681,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,696,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,711,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,726,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,747,623 UART: [ldev] --
17,753,649 UART: [fwproc] Wait for Commands...
17,755,538 UART: [fwproc] Recv command 0x46574c44
17,757,796 UART: [fwproc] Recv'd Img size: 114360 bytes
21,203,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,282,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,398,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,941,844 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,606 writing to cptra_bootfsm_go
3,760,249 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,520,048 >>> mbox cmd response: failed
12,520,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,943 >>> mbox cmd response: failed
12,521,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,497 >>> mbox cmd response: failed
Initializing fuses
2,060,420 writing to cptra_bootfsm_go
11,097,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,300,101 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,389 UART: [kat] SHA2-256
892,327 UART: [kat] SHA2-384
895,076 UART: [kat] SHA2-512-ACC
896,977 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,475,995 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,490 UART: [idev] ++
1,479,658 UART: [idev] CDI.KEYID = 6
1,480,018 UART: [idev] SUBJECT.KEYID = 7
1,480,442 UART: [idev] UDS.KEYID = 0
1,480,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,564 UART: [idev] --
1,514,571 UART: [ldev] ++
1,514,739 UART: [ldev] CDI.KEYID = 6
1,515,102 UART: [ldev] SUBJECT.KEYID = 5
1,515,528 UART: [ldev] AUTHORITY.KEYID = 7
1,515,991 UART: [ldev] FE.KEYID = 1
1,520,997 UART: [ldev] Erasing FE.KEYID = 1
1,546,564 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,626 UART: [ldev] --
1,586,025 UART: [fwproc] Waiting for Commands...
1,586,826 UART: [fwproc] Received command 0x46574c44
1,587,617 UART: [fwproc] Received Image of size 114360 bytes
1,634,805 UART: ROM Fatal Error: 0x000B003E
1,635,964 >>> mbox cmd response: failed
1,635,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,970 >>> mbox cmd response: failed
1,635,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,138 UART: [kat] SHA2-512-ACC
897,039 UART: [kat] ECC-384
902,924 UART: [kat] HMAC-384Kdf
907,464 UART: [kat] LMS
1,475,660 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,993 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,505,054 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,746 UART: [idev] --
1,514,807 UART: [ldev] ++
1,514,975 UART: [ldev] CDI.KEYID = 6
1,515,338 UART: [ldev] SUBJECT.KEYID = 5
1,515,764 UART: [ldev] AUTHORITY.KEYID = 7
1,516,227 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,684 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,806 UART: [fwproc] Received command 0x46574c44
1,587,597 UART: [fwproc] Received Image of size 114360 bytes
2,884,441 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,438 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,095 >>> mbox cmd response: failed
1,487,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,101 >>> mbox cmd response: failed
1,487,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,964 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
891,074 UART: [kat] SHA2-256
893,012 UART: [kat] SHA2-384
895,811 UART: [kat] SHA2-512-ACC
897,712 UART: [kat] ECC-384
903,443 UART: [kat] HMAC-384Kdf
908,077 UART: [kat] LMS
1,476,273 UART: [kat] --
1,477,176 UART: [cold-reset] ++
1,477,604 UART: [fht] Storing FHT @ 0x50003400
1,480,261 UART: [idev] ++
1,480,429 UART: [idev] CDI.KEYID = 6
1,480,789 UART: [idev] SUBJECT.KEYID = 7
1,481,213 UART: [idev] UDS.KEYID = 0
1,481,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,273 UART: [idev] Erasing UDS.KEYID = 0
1,505,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,397 UART: [idev] --
1,515,420 UART: [ldev] ++
1,515,588 UART: [ldev] CDI.KEYID = 6
1,515,951 UART: [ldev] SUBJECT.KEYID = 5
1,516,377 UART: [ldev] AUTHORITY.KEYID = 7
1,516,840 UART: [ldev] FE.KEYID = 1
1,522,090 UART: [ldev] Erasing FE.KEYID = 1
1,547,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,423 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,537 UART: [fwproc] Received command 0x46574c44
1,588,328 UART: [fwproc] Received Image of size 114360 bytes
1,636,412 UART: ROM Fatal Error: 0x000B003E
1,637,571 >>> mbox cmd response: failed
1,637,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,577 >>> mbox cmd response: failed
1,637,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,635 UART: [kat] LMS
1,475,831 UART: [kat] --
1,476,724 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,480,147 UART: [idev] ++
1,480,315 UART: [idev] CDI.KEYID = 6
1,480,675 UART: [idev] SUBJECT.KEYID = 7
1,481,099 UART: [idev] UDS.KEYID = 0
1,481,444 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,739 UART: [idev] Erasing UDS.KEYID = 0
1,505,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,851 UART: [idev] --
1,514,812 UART: [ldev] ++
1,514,980 UART: [ldev] CDI.KEYID = 6
1,515,343 UART: [ldev] SUBJECT.KEYID = 5
1,515,769 UART: [ldev] AUTHORITY.KEYID = 7
1,516,232 UART: [ldev] FE.KEYID = 1
1,521,642 UART: [ldev] Erasing FE.KEYID = 1
1,547,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,813 UART: [ldev] --
1,586,210 UART: [fwproc] Waiting for Commands...
1,587,043 UART: [fwproc] Received command 0x46574c44
1,587,834 UART: [fwproc] Received Image of size 114360 bytes
2,884,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,685 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,234 >>> mbox cmd response: failed
1,487,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,240 >>> mbox cmd response: failed
1,487,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,671 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
906,814 UART: [kat] SHA2-512-ACC
908,715 UART: [kat] ECC-384
918,644 UART: [kat] HMAC-384Kdf
923,254 UART: [kat] LMS
1,171,582 UART: [kat] --
1,172,373 UART: [cold-reset] ++
1,172,829 UART: [fht] FHT @ 0x50003400
1,175,466 UART: [idev] ++
1,175,634 UART: [idev] CDI.KEYID = 6
1,175,994 UART: [idev] SUBJECT.KEYID = 7
1,176,418 UART: [idev] UDS.KEYID = 0
1,176,763 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,875 UART: [idev] Sha1 KeyId Algorithm
1,209,267 UART: [idev] --
1,210,329 UART: [ldev] ++
1,210,497 UART: [ldev] CDI.KEYID = 6
1,210,860 UART: [ldev] SUBJECT.KEYID = 5
1,211,286 UART: [ldev] AUTHORITY.KEYID = 7
1,211,749 UART: [ldev] FE.KEYID = 1
1,216,843 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,890 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,212 UART: ROM Fatal Error: 0x000B003E
1,332,371 >>> mbox cmd response: failed
1,332,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,377 >>> mbox cmd response: failed
1,332,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,272 UART: [kat] HMAC-384Kdf
922,864 UART: [kat] LMS
1,171,192 UART: [kat] --
1,172,091 UART: [cold-reset] ++
1,172,485 UART: [fht] FHT @ 0x50003400
1,175,024 UART: [idev] ++
1,175,192 UART: [idev] CDI.KEYID = 6
1,175,552 UART: [idev] SUBJECT.KEYID = 7
1,175,976 UART: [idev] UDS.KEYID = 0
1,176,321 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,482 UART: [idev] Erasing UDS.KEYID = 0
1,201,167 UART: [idev] Sha1 KeyId Algorithm
1,209,635 UART: [idev] --
1,210,829 UART: [ldev] ++
1,210,997 UART: [ldev] CDI.KEYID = 6
1,211,360 UART: [ldev] SUBJECT.KEYID = 5
1,211,786 UART: [ldev] AUTHORITY.KEYID = 7
1,212,249 UART: [ldev] FE.KEYID = 1
1,217,407 UART: [ldev] Erasing FE.KEYID = 1
1,243,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,743 UART: [ldev] --
1,283,176 UART: [fwproc] Wait for Commands...
1,283,764 UART: [fwproc] Recv command 0x46574c44
1,284,492 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,415 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,586 >>> mbox cmd response: failed
1,185,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,592 >>> mbox cmd response: failed
1,185,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,596 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
893,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,786 UART: [kat] ++
897,938 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,057 UART: [kat] LMS
1,171,385 UART: [kat] --
1,172,324 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,209 UART: [idev] ++
1,175,377 UART: [idev] CDI.KEYID = 6
1,175,737 UART: [idev] SUBJECT.KEYID = 7
1,176,161 UART: [idev] UDS.KEYID = 0
1,176,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,376 UART: [idev] --
1,211,480 UART: [ldev] ++
1,211,648 UART: [ldev] CDI.KEYID = 6
1,212,011 UART: [ldev] SUBJECT.KEYID = 5
1,212,437 UART: [ldev] AUTHORITY.KEYID = 7
1,212,900 UART: [ldev] FE.KEYID = 1
1,218,358 UART: [ldev] Erasing FE.KEYID = 1
1,244,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,382 UART: [ldev] --
1,284,775 UART: [fwproc] Wait for Commands...
1,285,527 UART: [fwproc] Recv command 0x46574c44
1,286,255 UART: [fwproc] Recv'd Img size: 114360 bytes
1,334,213 UART: ROM Fatal Error: 0x000B003E
1,335,372 >>> mbox cmd response: failed
1,335,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,378 >>> mbox cmd response: failed
1,335,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
893,289 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,414 UART: [kat] ++
897,566 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,457 UART: [kat] SHA2-512-ACC
908,358 UART: [kat] ECC-384
918,193 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,171,796 UART: [cold-reset] ++
1,172,190 UART: [fht] FHT @ 0x50003400
1,174,741 UART: [idev] ++
1,174,909 UART: [idev] CDI.KEYID = 6
1,175,269 UART: [idev] SUBJECT.KEYID = 7
1,175,693 UART: [idev] UDS.KEYID = 0
1,176,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,809 UART: [idev] Erasing UDS.KEYID = 0
1,201,298 UART: [idev] Sha1 KeyId Algorithm
1,209,710 UART: [idev] --
1,210,628 UART: [ldev] ++
1,210,796 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,585 UART: [ldev] AUTHORITY.KEYID = 7
1,212,048 UART: [ldev] FE.KEYID = 1
1,217,416 UART: [ldev] Erasing FE.KEYID = 1
1,242,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,462 UART: [ldev] --
1,281,769 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,071 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,944 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,990 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,019 >>> mbox cmd response: failed
1,188,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,025 >>> mbox cmd response: failed
1,188,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,084 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,991 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,665 UART: [fht] FHT @ 0x50003400
1,173,301 UART: [idev] ++
1,173,469 UART: [idev] CDI.KEYID = 6
1,173,830 UART: [idev] SUBJECT.KEYID = 7
1,174,255 UART: [idev] UDS.KEYID = 0
1,174,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,931 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,209,190 UART: [ldev] ++
1,209,358 UART: [ldev] CDI.KEYID = 6
1,209,722 UART: [ldev] SUBJECT.KEYID = 5
1,210,149 UART: [ldev] AUTHORITY.KEYID = 7
1,210,612 UART: [ldev] FE.KEYID = 1
1,215,578 UART: [ldev] Erasing FE.KEYID = 1
1,242,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,492 UART: [ldev] --
1,281,924 UART: [fwproc] Wait for Commands...
1,282,749 UART: [fwproc] Recv command 0x46574c44
1,283,482 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,823 UART: ROM Fatal Error: 0x000B003E
1,331,982 >>> mbox cmd response: failed
1,331,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,988 >>> mbox cmd response: failed
1,331,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,755 UART: [idev] ++
1,172,923 UART: [idev] CDI.KEYID = 6
1,173,284 UART: [idev] SUBJECT.KEYID = 7
1,173,709 UART: [idev] UDS.KEYID = 0
1,174,055 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,749 UART: [idev] --
1,208,688 UART: [ldev] ++
1,208,856 UART: [ldev] CDI.KEYID = 6
1,209,220 UART: [ldev] SUBJECT.KEYID = 5
1,209,647 UART: [ldev] AUTHORITY.KEYID = 7
1,210,110 UART: [ldev] FE.KEYID = 1
1,215,306 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,218 UART: [fwproc] Wait for Commands...
1,281,941 UART: [fwproc] Recv command 0x46574c44
1,282,674 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,251 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,383 >>> mbox cmd response: failed
1,182,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,389 >>> mbox cmd response: failed
1,182,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,927 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,000 UART: [idev] ++
1,173,168 UART: [idev] CDI.KEYID = 6
1,173,529 UART: [idev] SUBJECT.KEYID = 7
1,173,954 UART: [idev] UDS.KEYID = 0
1,174,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,703 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,820 UART: ROM Fatal Error: 0x000B003E
1,332,979 >>> mbox cmd response: failed
1,332,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,985 >>> mbox cmd response: failed
1,332,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
905,109 UART: [kat] SHA2-512-ACC
907,010 UART: [kat] ECC-384
916,975 UART: [kat] HMAC-384Kdf
921,625 UART: [kat] LMS
1,169,937 UART: [kat] --
1,170,984 UART: [cold-reset] ++
1,171,350 UART: [fht] FHT @ 0x50003400
1,173,942 UART: [idev] ++
1,174,110 UART: [idev] CDI.KEYID = 6
1,174,471 UART: [idev] SUBJECT.KEYID = 7
1,174,896 UART: [idev] UDS.KEYID = 0
1,175,242 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,940 UART: [idev] Erasing UDS.KEYID = 0
1,200,016 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,189 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,975 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,550 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,628 >>> mbox cmd response: failed
1,184,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,634 >>> mbox cmd response: failed
1,184,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,059 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,231 UART:
192,600 UART: Running Caliptra ROM ...
193,790 UART:
193,939 UART: [state] CFI Enabled
262,606 UART: [state] LifecycleState = Unprovisioned
264,582 UART: [state] DebugLocked = No
266,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,696 UART: [kat] SHA2-256
440,414 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,903 UART: [kat] ++
451,366 UART: [kat] sha1
462,158 UART: [kat] SHA2-256
464,845 UART: [kat] SHA2-384
471,312 UART: [kat] SHA2-512-ACC
473,713 UART: [kat] ECC-384
2,764,508 UART: [kat] HMAC-384Kdf
2,777,841 UART: [kat] LMS
3,968,158 UART: [kat] --
3,972,836 UART: [cold-reset] ++
3,973,968 UART: [fht] Storing FHT @ 0x50003400
3,984,916 UART: [idev] ++
3,985,490 UART: [idev] CDI.KEYID = 6
3,986,414 UART: [idev] SUBJECT.KEYID = 7
3,987,637 UART: [idev] UDS.KEYID = 0
3,990,268 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,134,002 UART: [idev] Erasing UDS.KEYID = 0
7,324,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,960 UART: [idev] --
7,349,474 UART: [ldev] ++
7,350,045 UART: [ldev] CDI.KEYID = 6
7,350,992 UART: [ldev] SUBJECT.KEYID = 5
7,352,204 UART: [ldev] AUTHORITY.KEYID = 7
7,353,537 UART: [ldev] FE.KEYID = 1
7,400,410 UART: [ldev] Erasing FE.KEYID = 1
10,734,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,215 UART: [ldev] --
13,116,229 UART: [fwproc] Waiting for Commands...
13,118,910 UART: [fwproc] Received command 0x46574c44
13,121,127 UART: [fwproc] Received Image of size 114036 bytes
15,821,792 UART: ROM Fatal Error: 0x000B0018
15,825,293 >>> mbox cmd response: failed
15,825,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,015 >>> mbox cmd response: failed
15,826,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,580 >>> mbox cmd response: failed
Initializing fuses
2,060,857 writing to cptra_bootfsm_go
2,250,162 UART:
2,250,521 UART: Running Caliptra ROM ...
2,251,607 UART:
2,251,766 UART: [state] CFI Enabled
2,310,692 UART: [state] LifecycleState = Unprovisioned
2,312,611 UART: [state] DebugLocked = No
2,314,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,147 UART: [kat] SHA2-256
2,489,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,343 UART: [kat] ++
2,500,832 UART: [kat] sha1
2,512,755 UART: [kat] SHA2-256
2,515,453 UART: [kat] SHA2-384
2,520,631 UART: [kat] SHA2-512-ACC
2,522,986 UART: [kat] ECC-384
4,813,651 UART: [kat] HMAC-384Kdf
4,826,089 UART: [kat] LMS
6,016,384 UART: [kat] --
6,021,196 UART: [cold-reset] ++
6,022,381 UART: [fht] Storing FHT @ 0x50003400
6,032,791 UART: [idev] ++
6,033,379 UART: [idev] CDI.KEYID = 6
6,034,267 UART: [idev] SUBJECT.KEYID = 7
6,035,538 UART: [idev] UDS.KEYID = 0
6,037,810 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,181,324 UART: [idev] Erasing UDS.KEYID = 0
9,371,858 UART: [idev] Using Sha1 for KeyId Algorithm
9,394,066 UART: [idev] --
9,398,552 UART: [ldev] ++
9,399,128 UART: [ldev] CDI.KEYID = 6
9,400,069 UART: [ldev] SUBJECT.KEYID = 5
9,401,333 UART: [ldev] AUTHORITY.KEYID = 7
9,402,491 UART: [ldev] FE.KEYID = 1
9,449,393 UART: [ldev] Erasing FE.KEYID = 1
12,778,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,074,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,088,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,103,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,118,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,137,645 UART: [ldev] --
15,142,009 UART: [fwproc] Waiting for Commands...
15,144,279 UART: [fwproc] Received command 0x46574c44
15,146,469 UART: [fwproc] Received Image of size 114036 bytes
19,195,659 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,276,113 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,345,034 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,662,507 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,806,382 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,547,746 >>> mbox cmd response: failed
15,548,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,548,548 >>> mbox cmd response: failed
15,548,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,109 >>> mbox cmd response: failed
Initializing fuses
2,056,001 writing to cptra_bootfsm_go
5,837,625 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,935,621 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,507 UART:
192,877 UART: Running Caliptra ROM ...
194,014 UART:
603,549 UART: [state] CFI Enabled
616,771 UART: [state] LifecycleState = Unprovisioned
618,651 UART: [state] DebugLocked = No
619,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,404 UART: [kat] SHA2-256
795,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,680 UART: [kat] ++
806,231 UART: [kat] sha1
818,087 UART: [kat] SHA2-256
820,769 UART: [kat] SHA2-384
826,586 UART: [kat] SHA2-512-ACC
828,952 UART: [kat] ECC-384
3,113,884 UART: [kat] HMAC-384Kdf
3,126,062 UART: [kat] LMS
4,316,177 UART: [kat] --
4,321,906 UART: [cold-reset] ++
4,324,323 UART: [fht] Storing FHT @ 0x50003400
4,335,806 UART: [idev] ++
4,336,377 UART: [idev] CDI.KEYID = 6
4,337,394 UART: [idev] SUBJECT.KEYID = 7
4,338,558 UART: [idev] UDS.KEYID = 0
4,341,129 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,551 UART: [idev] Erasing UDS.KEYID = 0
7,626,261 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,840 UART: [idev] --
7,651,306 UART: [ldev] ++
7,651,876 UART: [ldev] CDI.KEYID = 6
7,652,815 UART: [ldev] SUBJECT.KEYID = 5
7,654,032 UART: [ldev] AUTHORITY.KEYID = 7
7,655,270 UART: [ldev] FE.KEYID = 1
7,666,411 UART: [ldev] Erasing FE.KEYID = 1
10,953,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,789 UART: [ldev] --
13,314,738 UART: [fwproc] Waiting for Commands...
13,317,930 UART: [fwproc] Received command 0x46574c44
13,320,144 UART: [fwproc] Received Image of size 114036 bytes
16,023,418 UART: ROM Fatal Error: 0x000B0018
16,026,980 >>> mbox cmd response: failed
16,027,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,762 >>> mbox cmd response: failed
16,028,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,339 >>> mbox cmd response: failed
Initializing fuses
2,057,007 writing to cptra_bootfsm_go
2,246,369 UART:
2,246,722 UART: Running Caliptra ROM ...
2,247,866 UART:
4,428,469 UART: [state] CFI Enabled
4,442,139 UART: [state] LifecycleState = Unprovisioned
4,444,073 UART: [state] DebugLocked = No
4,445,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,450,277 UART: [kat] SHA2-256
4,620,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,586 UART: [kat] ++
4,631,042 UART: [kat] sha1
4,642,527 UART: [kat] SHA2-256
4,645,211 UART: [kat] SHA2-384
4,650,456 UART: [kat] SHA2-512-ACC
4,652,808 UART: [kat] ECC-384
6,935,650 UART: [kat] HMAC-384Kdf
6,946,272 UART: [kat] LMS
8,136,357 UART: [kat] --
8,140,749 UART: [cold-reset] ++
8,143,075 UART: [fht] Storing FHT @ 0x50003400
8,153,212 UART: [idev] ++
8,153,796 UART: [idev] CDI.KEYID = 6
8,154,707 UART: [idev] SUBJECT.KEYID = 7
8,155,981 UART: [idev] UDS.KEYID = 0
8,158,398 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,301,583 UART: [idev] Erasing UDS.KEYID = 0
11,440,241 UART: [idev] Using Sha1 for KeyId Algorithm
11,460,598 UART: [idev] --
11,463,623 UART: [ldev] ++
11,464,245 UART: [ldev] CDI.KEYID = 6
11,465,211 UART: [ldev] SUBJECT.KEYID = 5
11,466,412 UART: [ldev] AUTHORITY.KEYID = 7
11,467,655 UART: [ldev] FE.KEYID = 1
11,478,679 UART: [ldev] Erasing FE.KEYID = 1
14,764,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,054,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,069,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,084,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,098,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,118,104 UART: [ldev] --
17,122,334 UART: [fwproc] Waiting for Commands...
17,125,196 UART: [fwproc] Received command 0x46574c44
17,127,386 UART: [fwproc] Received Image of size 114036 bytes
21,182,983 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,261,116 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,330,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,646,473 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,125,924 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,754,775 >>> mbox cmd response: failed
15,755,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,755,832 >>> mbox cmd response: failed
15,756,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,756,349 >>> mbox cmd response: failed
Initializing fuses
2,055,694 writing to cptra_bootfsm_go
8,237,532 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,153,931 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,259 UART:
192,613 UART: Running Caliptra ROM ...
193,750 UART:
193,896 UART: [state] CFI Enabled
262,423 UART: [state] LifecycleState = Unprovisioned
264,311 UART: [state] DebugLocked = No
266,125 UART: [state] WD Timer not started. Device not locked for debugging
269,414 UART: [kat] SHA2-256
448,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,081 UART: [kat] ++
460,620 UART: [kat] sha1
473,017 UART: [kat] SHA2-256
476,027 UART: [kat] SHA2-384
482,926 UART: [kat] SHA2-512-ACC
485,859 UART: [kat] ECC-384
2,946,491 UART: [kat] HMAC-384Kdf
2,969,909 UART: [kat] LMS
3,499,397 UART: [kat] --
3,503,072 UART: [cold-reset] ++
3,504,141 UART: [fht] FHT @ 0x50003400
3,514,228 UART: [idev] ++
3,514,825 UART: [idev] CDI.KEYID = 6
3,515,709 UART: [idev] SUBJECT.KEYID = 7
3,516,930 UART: [idev] UDS.KEYID = 0
3,519,667 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,717 UART: [idev] Erasing UDS.KEYID = 0
6,022,479 UART: [idev] Sha1 KeyId Algorithm
6,045,619 UART: [idev] --
6,048,998 UART: [ldev] ++
6,049,576 UART: [ldev] CDI.KEYID = 6
6,050,489 UART: [ldev] SUBJECT.KEYID = 5
6,051,708 UART: [ldev] AUTHORITY.KEYID = 7
6,052,941 UART: [ldev] FE.KEYID = 1
6,098,530 UART: [ldev] Erasing FE.KEYID = 1
8,602,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,019 UART: [ldev] --
10,415,234 UART: [fwproc] Wait for Commands...
10,418,423 UART: [fwproc] Recv command 0x46574c44
10,420,520 UART: [fwproc] Recv'd Img size: 114360 bytes
12,470,799 UART: ROM Fatal Error: 0x000B0018
12,473,922 >>> mbox cmd response: failed
12,474,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,474,682 >>> mbox cmd response: failed
12,474,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,475,335 >>> mbox cmd response: failed
Initializing fuses
2,053,192 writing to cptra_bootfsm_go
2,242,596 UART:
2,242,943 UART: Running Caliptra ROM ...
2,244,079 UART:
2,244,249 UART: [state] CFI Enabled
2,315,995 UART: [state] LifecycleState = Unprovisioned
2,317,872 UART: [state] DebugLocked = No
2,320,774 UART: [state] WD Timer not started. Device not locked for debugging
2,325,126 UART: [kat] SHA2-256
2,504,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,821 UART: [kat] ++
2,516,277 UART: [kat] sha1
2,527,750 UART: [kat] SHA2-256
2,530,798 UART: [kat] SHA2-384
2,537,665 UART: [kat] SHA2-512-ACC
2,540,665 UART: [kat] ECC-384
4,998,772 UART: [kat] HMAC-384Kdf
5,023,124 UART: [kat] LMS
5,552,557 UART: [kat] --
5,556,601 UART: [cold-reset] ++
5,558,427 UART: [fht] FHT @ 0x50003400
5,568,914 UART: [idev] ++
5,569,519 UART: [idev] CDI.KEYID = 6
5,570,410 UART: [idev] SUBJECT.KEYID = 7
5,571,516 UART: [idev] UDS.KEYID = 0
5,573,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,717,580 UART: [idev] Erasing UDS.KEYID = 0
8,079,942 UART: [idev] Sha1 KeyId Algorithm
8,103,075 UART: [idev] --
8,107,991 UART: [ldev] ++
8,108,564 UART: [ldev] CDI.KEYID = 6
8,109,477 UART: [ldev] SUBJECT.KEYID = 5
8,110,694 UART: [ldev] AUTHORITY.KEYID = 7
8,111,944 UART: [ldev] FE.KEYID = 1
8,151,696 UART: [ldev] Erasing FE.KEYID = 1
10,653,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,951 UART: [ldev] --
12,464,175 UART: [fwproc] Wait for Commands...
12,466,597 UART: [fwproc] Recv command 0x46574c44
12,468,690 UART: [fwproc] Recv'd Img size: 114360 bytes
15,868,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,936,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,323,274 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,131 UART:
192,487 UART: Running Caliptra ROM ...
193,625 UART:
193,771 UART: [state] CFI Enabled
262,998 UART: [state] LifecycleState = Unprovisioned
265,414 UART: [state] DebugLocked = No
267,558 UART: [state] WD Timer not started. Device not locked for debugging
271,990 UART: [kat] SHA2-256
461,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,628 UART: [kat] ++
473,102 UART: [kat] sha1
485,985 UART: [kat] SHA2-256
489,008 UART: [kat] SHA2-384
495,549 UART: [kat] SHA2-512-ACC
498,097 UART: [kat] ECC-384
2,946,027 UART: [kat] HMAC-384Kdf
2,971,161 UART: [kat] LMS
3,502,898 UART: [kat] --
3,508,470 UART: [cold-reset] ++
3,509,866 UART: [fht] FHT @ 0x50003400
3,522,052 UART: [idev] ++
3,522,738 UART: [idev] CDI.KEYID = 6
3,523,707 UART: [idev] SUBJECT.KEYID = 7
3,524,922 UART: [idev] UDS.KEYID = 0
3,527,656 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,078 UART: [idev] Erasing UDS.KEYID = 0
6,031,099 UART: [idev] Sha1 KeyId Algorithm
6,053,808 UART: [idev] --
6,060,020 UART: [ldev] ++
6,060,707 UART: [ldev] CDI.KEYID = 6
6,061,596 UART: [ldev] SUBJECT.KEYID = 5
6,062,811 UART: [ldev] AUTHORITY.KEYID = 7
6,064,050 UART: [ldev] FE.KEYID = 1
6,099,632 UART: [ldev] Erasing FE.KEYID = 1
8,606,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,169 UART: [ldev] --
10,410,979 UART: [fwproc] Wait for Commands...
10,413,512 UART: [fwproc] Recv command 0x46574c44
10,415,819 UART: [fwproc] Recv'd Img size: 114360 bytes
12,496,919 UART: ROM Fatal Error: 0x000B0018
12,500,586 >>> mbox cmd response: failed
12,501,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,340 >>> mbox cmd response: failed
12,501,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,892 >>> mbox cmd response: failed
Initializing fuses
2,058,843 writing to cptra_bootfsm_go
2,248,141 UART:
2,248,480 UART: Running Caliptra ROM ...
2,249,616 UART:
2,249,787 UART: [state] CFI Enabled
2,307,868 UART: [state] LifecycleState = Unprovisioned
2,310,202 UART: [state] DebugLocked = No
2,312,039 UART: [state] WD Timer not started. Device not locked for debugging
2,315,953 UART: [kat] SHA2-256
2,505,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,611 UART: [kat] ++
2,517,069 UART: [kat] sha1
2,529,961 UART: [kat] SHA2-256
2,532,980 UART: [kat] SHA2-384
2,537,891 UART: [kat] SHA2-512-ACC
2,540,524 UART: [kat] ECC-384
4,990,464 UART: [kat] HMAC-384Kdf
5,016,094 UART: [kat] LMS
5,547,839 UART: [kat] --
5,553,932 UART: [cold-reset] ++
5,555,812 UART: [fht] FHT @ 0x50003400
5,568,581 UART: [idev] ++
5,569,254 UART: [idev] CDI.KEYID = 6
5,570,222 UART: [idev] SUBJECT.KEYID = 7
5,571,438 UART: [idev] UDS.KEYID = 0
5,573,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,718,068 UART: [idev] Erasing UDS.KEYID = 0
8,073,831 UART: [idev] Sha1 KeyId Algorithm
8,096,312 UART: [idev] --
8,100,096 UART: [ldev] ++
8,100,777 UART: [ldev] CDI.KEYID = 6
8,101,686 UART: [ldev] SUBJECT.KEYID = 5
8,102,920 UART: [ldev] AUTHORITY.KEYID = 7
8,104,104 UART: [ldev] FE.KEYID = 1
8,146,132 UART: [ldev] Erasing FE.KEYID = 1
10,649,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,417 UART: [ldev] --
12,457,058 UART: [fwproc] Wait for Commands...
12,459,486 UART: [fwproc] Recv command 0x46574c44
12,461,804 UART: [fwproc] Recv'd Img size: 114360 bytes
15,910,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,645,744 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,443,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,302,336 >>> mbox cmd response: failed
12,302,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,245 >>> mbox cmd response: failed
12,303,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,806 >>> mbox cmd response: failed
Initializing fuses
2,055,527 writing to cptra_bootfsm_go
5,491,840 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,777,704 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,495 UART:
192,884 UART: Running Caliptra ROM ...
194,030 UART:
603,727 UART: [state] CFI Enabled
618,184 UART: [state] LifecycleState = Unprovisioned
620,562 UART: [state] DebugLocked = No
622,673 UART: [state] WD Timer not started. Device not locked for debugging
626,439 UART: [kat] SHA2-256
816,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,917 UART: [kat] ++
827,418 UART: [kat] sha1
839,665 UART: [kat] SHA2-256
842,712 UART: [kat] SHA2-384
848,534 UART: [kat] SHA2-512-ACC
851,151 UART: [kat] ECC-384
3,294,390 UART: [kat] HMAC-384Kdf
3,308,511 UART: [kat] LMS
3,840,334 UART: [kat] --
3,843,204 UART: [cold-reset] ++
3,844,383 UART: [fht] FHT @ 0x50003400
3,854,879 UART: [idev] ++
3,855,558 UART: [idev] CDI.KEYID = 6
3,856,577 UART: [idev] SUBJECT.KEYID = 7
3,857,741 UART: [idev] UDS.KEYID = 0
3,860,388 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,211 UART: [idev] Erasing UDS.KEYID = 0
6,335,160 UART: [idev] Sha1 KeyId Algorithm
6,357,857 UART: [idev] --
6,362,429 UART: [ldev] ++
6,363,119 UART: [ldev] CDI.KEYID = 6
6,364,033 UART: [ldev] SUBJECT.KEYID = 5
6,365,200 UART: [ldev] AUTHORITY.KEYID = 7
6,366,436 UART: [ldev] FE.KEYID = 1
6,377,970 UART: [ldev] Erasing FE.KEYID = 1
8,855,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,082 UART: [ldev] --
10,649,247 UART: [fwproc] Wait for Commands...
10,651,671 UART: [fwproc] Recv command 0x46574c44
10,653,980 UART: [fwproc] Recv'd Img size: 114360 bytes
12,740,342 UART: ROM Fatal Error: 0x000B0018
12,744,014 >>> mbox cmd response: failed
12,744,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,773 >>> mbox cmd response: failed
12,745,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,284 >>> mbox cmd response: failed
Initializing fuses
2,057,574 writing to cptra_bootfsm_go
2,246,883 UART:
2,247,224 UART: Running Caliptra ROM ...
2,248,363 UART:
7,702,455 UART: [state] CFI Enabled
7,714,111 UART: [state] LifecycleState = Unprovisioned
7,716,520 UART: [state] DebugLocked = No
7,718,286 UART: [state] WD Timer not started. Device not locked for debugging
7,723,381 UART: [kat] SHA2-256
7,913,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,924,044 UART: [kat] ++
7,924,605 UART: [kat] sha1
7,934,310 UART: [kat] SHA2-256
7,937,334 UART: [kat] SHA2-384
7,943,875 UART: [kat] SHA2-512-ACC
7,946,452 UART: [kat] ECC-384
10,388,105 UART: [kat] HMAC-384Kdf
10,401,305 UART: [kat] LMS
10,933,144 UART: [kat] --
10,936,383 UART: [cold-reset] ++
10,938,963 UART: [fht] FHT @ 0x50003400
10,949,669 UART: [idev] ++
10,950,342 UART: [idev] CDI.KEYID = 6
10,951,281 UART: [idev] SUBJECT.KEYID = 7
10,952,492 UART: [idev] UDS.KEYID = 0
10,954,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,098,670 UART: [idev] Erasing UDS.KEYID = 0
13,425,521 UART: [idev] Sha1 KeyId Algorithm
13,448,584 UART: [idev] --
13,452,784 UART: [ldev] ++
13,453,471 UART: [ldev] CDI.KEYID = 6
13,454,386 UART: [ldev] SUBJECT.KEYID = 5
13,455,596 UART: [ldev] AUTHORITY.KEYID = 7
13,456,769 UART: [ldev] FE.KEYID = 1
13,468,278 UART: [ldev] Erasing FE.KEYID = 1
15,949,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,666,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,682,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,697,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,712,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,732,342 UART: [ldev] --
17,737,065 UART: [fwproc] Wait for Commands...
17,740,148 UART: [fwproc] Recv command 0x46574c44
17,742,406 UART: [fwproc] Recv'd Img size: 114360 bytes
21,188,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,261,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,377,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,920,264 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,758,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,528,740 >>> mbox cmd response: failed
12,529,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,764 >>> mbox cmd response: failed
12,530,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,358 >>> mbox cmd response: failed
Initializing fuses
2,059,529 writing to cptra_bootfsm_go
11,093,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,294,468 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,246 UART: [kat] LMS
1,475,442 UART: [kat] --
1,476,131 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,334 UART: [idev] ++
1,479,502 UART: [idev] CDI.KEYID = 6
1,479,862 UART: [idev] SUBJECT.KEYID = 7
1,480,286 UART: [idev] UDS.KEYID = 0
1,480,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,504,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,494 UART: [idev] --
1,514,711 UART: [ldev] ++
1,514,879 UART: [ldev] CDI.KEYID = 6
1,515,242 UART: [ldev] SUBJECT.KEYID = 5
1,515,668 UART: [ldev] AUTHORITY.KEYID = 7
1,516,131 UART: [ldev] FE.KEYID = 1
1,521,347 UART: [ldev] Erasing FE.KEYID = 1
1,545,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,696 UART: [ldev] --
1,585,071 UART: [fwproc] Waiting for Commands...
1,585,760 UART: [fwproc] Received command 0x46574c44
1,586,551 UART: [fwproc] Received Image of size 114360 bytes
1,633,720 UART: ROM Fatal Error: 0x000B0018
1,634,877 >>> mbox cmd response: failed
1,634,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,883 >>> mbox cmd response: failed
1,634,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
894,908 UART: [kat] SHA2-512-ACC
896,809 UART: [kat] ECC-384
902,272 UART: [kat] HMAC-384Kdf
906,964 UART: [kat] LMS
1,475,160 UART: [kat] --
1,476,127 UART: [cold-reset] ++
1,476,613 UART: [fht] Storing FHT @ 0x50003400
1,479,562 UART: [idev] ++
1,479,730 UART: [idev] CDI.KEYID = 6
1,480,090 UART: [idev] SUBJECT.KEYID = 7
1,480,514 UART: [idev] UDS.KEYID = 0
1,480,859 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,234 UART: [idev] Erasing UDS.KEYID = 0
1,504,784 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,400 UART: [idev] --
1,514,327 UART: [ldev] ++
1,514,495 UART: [ldev] CDI.KEYID = 6
1,514,858 UART: [ldev] SUBJECT.KEYID = 5
1,515,284 UART: [ldev] AUTHORITY.KEYID = 7
1,515,747 UART: [ldev] FE.KEYID = 1
1,521,149 UART: [ldev] Erasing FE.KEYID = 1
1,546,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 114360 bytes
2,884,417 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,424 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,265 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,750 >>> mbox cmd response: failed
1,488,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,756 >>> mbox cmd response: failed
1,488,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,880 UART: [kat] SHA2-256
892,818 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,557 UART: [kat] LMS
1,475,753 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,480,115 UART: [idev] ++
1,480,283 UART: [idev] CDI.KEYID = 6
1,480,643 UART: [idev] SUBJECT.KEYID = 7
1,481,067 UART: [idev] UDS.KEYID = 0
1,481,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,921 UART: [idev] Erasing UDS.KEYID = 0
1,505,329 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,901 UART: [idev] --
1,514,898 UART: [ldev] ++
1,515,066 UART: [ldev] CDI.KEYID = 6
1,515,429 UART: [ldev] SUBJECT.KEYID = 5
1,515,855 UART: [ldev] AUTHORITY.KEYID = 7
1,516,318 UART: [ldev] FE.KEYID = 1
1,521,860 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,473 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,723 UART: [fwproc] Received command 0x46574c44
1,588,514 UART: [fwproc] Received Image of size 114360 bytes
1,637,225 UART: ROM Fatal Error: 0x000B0018
1,638,382 >>> mbox cmd response: failed
1,638,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,388 >>> mbox cmd response: failed
1,638,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,788 UART: [kat] SHA2-256
882,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,834 UART: [kat] ++
886,986 UART: [kat] sha1
891,106 UART: [kat] SHA2-256
893,044 UART: [kat] SHA2-384
895,699 UART: [kat] SHA2-512-ACC
897,600 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,228 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,337 UART: [idev] ++
1,479,505 UART: [idev] CDI.KEYID = 6
1,479,865 UART: [idev] SUBJECT.KEYID = 7
1,480,289 UART: [idev] UDS.KEYID = 0
1,480,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,621 UART: [idev] Erasing UDS.KEYID = 0
1,505,335 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,927 UART: [idev] --
1,514,912 UART: [ldev] ++
1,515,080 UART: [ldev] CDI.KEYID = 6
1,515,443 UART: [ldev] SUBJECT.KEYID = 5
1,515,869 UART: [ldev] AUTHORITY.KEYID = 7
1,516,332 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,546,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,587 UART: [ldev] --
1,585,990 UART: [fwproc] Waiting for Commands...
1,586,813 UART: [fwproc] Received command 0x46574c44
1,587,604 UART: [fwproc] Received Image of size 114360 bytes
2,885,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,504 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,693 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,994 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,915 >>> mbox cmd response: failed
1,487,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,921 >>> mbox cmd response: failed
1,487,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,430 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,537 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
893,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,237 UART: [kat] ++
897,389 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,266 UART: [kat] SHA2-512-ACC
908,167 UART: [kat] ECC-384
917,738 UART: [kat] HMAC-384Kdf
922,502 UART: [kat] LMS
1,170,830 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,219 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,574 UART: [idev] Erasing UDS.KEYID = 0
1,201,009 UART: [idev] Sha1 KeyId Algorithm
1,209,507 UART: [idev] --
1,210,543 UART: [ldev] ++
1,210,711 UART: [ldev] CDI.KEYID = 6
1,211,074 UART: [ldev] SUBJECT.KEYID = 5
1,211,500 UART: [ldev] AUTHORITY.KEYID = 7
1,211,963 UART: [ldev] FE.KEYID = 1
1,217,257 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,323 UART: [ldev] --
1,282,694 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,101 UART: ROM Fatal Error: 0x000B0018
1,333,258 >>> mbox cmd response: failed
1,333,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,264 >>> mbox cmd response: failed
1,333,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,825 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,145 UART: [kat] SHA2-256
904,085 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,334 UART: [kat] HMAC-384Kdf
922,882 UART: [kat] LMS
1,171,210 UART: [kat] --
1,172,261 UART: [cold-reset] ++
1,172,837 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,546 UART: [idev] Erasing UDS.KEYID = 0
1,201,641 UART: [idev] Sha1 KeyId Algorithm
1,210,141 UART: [idev] --
1,211,269 UART: [ldev] ++
1,211,437 UART: [ldev] CDI.KEYID = 6
1,211,800 UART: [ldev] SUBJECT.KEYID = 5
1,212,226 UART: [ldev] AUTHORITY.KEYID = 7
1,212,689 UART: [ldev] FE.KEYID = 1
1,217,883 UART: [ldev] Erasing FE.KEYID = 1
1,244,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,931 UART: [ldev] --
1,284,414 UART: [fwproc] Wait for Commands...
1,285,080 UART: [fwproc] Recv command 0x46574c44
1,285,808 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,279 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,187,463 >>> mbox cmd response: failed
1,187,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,469 >>> mbox cmd response: failed
1,187,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,490 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
893,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,448 UART: [kat] ++
897,600 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,393 UART: [kat] SHA2-512-ACC
908,294 UART: [kat] ECC-384
917,909 UART: [kat] HMAC-384Kdf
922,387 UART: [kat] LMS
1,170,715 UART: [kat] --
1,171,462 UART: [cold-reset] ++
1,171,858 UART: [fht] FHT @ 0x50003400
1,174,561 UART: [idev] ++
1,174,729 UART: [idev] CDI.KEYID = 6
1,175,089 UART: [idev] SUBJECT.KEYID = 7
1,175,513 UART: [idev] UDS.KEYID = 0
1,175,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,359 UART: [idev] Erasing UDS.KEYID = 0
1,200,514 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,210,080 UART: [ldev] ++
1,210,248 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,037 UART: [ldev] AUTHORITY.KEYID = 7
1,211,500 UART: [ldev] FE.KEYID = 1
1,216,440 UART: [ldev] Erasing FE.KEYID = 1
1,243,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,846 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,897 UART: [fwproc] Recv command 0x46574c44
1,283,625 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,084 UART: ROM Fatal Error: 0x000B0018
1,332,241 >>> mbox cmd response: failed
1,332,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,247 >>> mbox cmd response: failed
1,332,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,100 UART: [kat] SHA2-256
904,040 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,255 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,282 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,519 UART: [idev] Erasing UDS.KEYID = 0
1,201,152 UART: [idev] Sha1 KeyId Algorithm
1,209,720 UART: [idev] --
1,210,542 UART: [ldev] ++
1,210,710 UART: [ldev] CDI.KEYID = 6
1,211,073 UART: [ldev] SUBJECT.KEYID = 5
1,211,499 UART: [ldev] AUTHORITY.KEYID = 7
1,211,962 UART: [ldev] FE.KEYID = 1
1,217,000 UART: [ldev] Erasing FE.KEYID = 1
1,242,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,692 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,248 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,500 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,186,612 >>> mbox cmd response: failed
1,186,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,618 >>> mbox cmd response: failed
1,186,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,527 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,565 UART: [idev] ++
1,172,733 UART: [idev] CDI.KEYID = 6
1,173,094 UART: [idev] SUBJECT.KEYID = 7
1,173,519 UART: [idev] UDS.KEYID = 0
1,173,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,208,011 UART: [idev] --
1,209,042 UART: [ldev] ++
1,209,210 UART: [ldev] CDI.KEYID = 6
1,209,574 UART: [ldev] SUBJECT.KEYID = 5
1,210,001 UART: [ldev] AUTHORITY.KEYID = 7
1,210,464 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,674 UART: [ldev] --
1,280,984 UART: [fwproc] Wait for Commands...
1,281,565 UART: [fwproc] Recv command 0x46574c44
1,282,298 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,260 UART: ROM Fatal Error: 0x000B0018
1,330,417 >>> mbox cmd response: failed
1,330,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,423 >>> mbox cmd response: failed
1,330,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,173,041 UART: [idev] ++
1,173,209 UART: [idev] CDI.KEYID = 6
1,173,570 UART: [idev] SUBJECT.KEYID = 7
1,173,995 UART: [idev] UDS.KEYID = 0
1,174,341 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,967 UART: [idev] Sha1 KeyId Algorithm
1,208,067 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,241,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,780 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,578 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,735 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,862 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,844 >>> mbox cmd response: failed
1,183,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,850 >>> mbox cmd response: failed
1,183,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,135 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,427 UART: [fwproc] Wait for Commands...
1,283,144 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,127 UART: ROM Fatal Error: 0x000B0018
1,332,284 >>> mbox cmd response: failed
1,332,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,290 >>> mbox cmd response: failed
1,332,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,868 UART: [idev] Erasing UDS.KEYID = 0
1,198,778 UART: [idev] Sha1 KeyId Algorithm
1,207,642 UART: [idev] --
1,208,721 UART: [ldev] ++
1,208,889 UART: [ldev] CDI.KEYID = 6
1,209,253 UART: [ldev] SUBJECT.KEYID = 5
1,209,680 UART: [ldev] AUTHORITY.KEYID = 7
1,210,143 UART: [ldev] FE.KEYID = 1
1,215,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,797 UART: [ldev] --
1,281,245 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,130 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,463 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,647 >>> mbox cmd response: failed
1,182,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,653 >>> mbox cmd response: failed
1,182,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,289 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,174 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,166 UART:
192,526 UART: Running Caliptra ROM ...
193,655 UART:
193,803 UART: [state] CFI Enabled
264,722 UART: [state] LifecycleState = Unprovisioned
266,665 UART: [state] DebugLocked = No
268,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,481 UART: [kat] SHA2-256
443,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,722 UART: [kat] ++
454,165 UART: [kat] sha1
464,070 UART: [kat] SHA2-256
466,767 UART: [kat] SHA2-384
472,040 UART: [kat] SHA2-512-ACC
474,390 UART: [kat] ECC-384
2,767,364 UART: [kat] HMAC-384Kdf
2,799,593 UART: [kat] LMS
3,989,876 UART: [kat] --
3,994,530 UART: [cold-reset] ++
3,996,361 UART: [fht] Storing FHT @ 0x50003400
4,008,818 UART: [idev] ++
4,009,417 UART: [idev] CDI.KEYID = 6
4,010,306 UART: [idev] SUBJECT.KEYID = 7
4,011,587 UART: [idev] UDS.KEYID = 0
4,014,189 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,348 UART: [idev] Erasing UDS.KEYID = 0
7,344,492 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,581 UART: [idev] --
7,371,015 UART: [ldev] ++
7,371,647 UART: [ldev] CDI.KEYID = 6
7,372,534 UART: [ldev] SUBJECT.KEYID = 5
7,373,805 UART: [ldev] AUTHORITY.KEYID = 7
7,375,040 UART: [ldev] FE.KEYID = 1
7,421,959 UART: [ldev] Erasing FE.KEYID = 1
10,759,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,786 UART: [ldev] --
13,139,404 UART: [fwproc] Waiting for Commands...
13,141,558 UART: [fwproc] Received command 0x46574c44
13,143,743 UART: [fwproc] Received Image of size 114036 bytes
15,851,475 UART: ROM Fatal Error: 0x000B0034
15,854,983 >>> mbox cmd response: failed
15,855,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,855,727 >>> mbox cmd response: failed
15,855,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,856,293 >>> mbox cmd response: failed
Initializing fuses
2,061,571 writing to cptra_bootfsm_go
2,250,977 UART:
2,251,319 UART: Running Caliptra ROM ...
2,252,455 UART:
2,252,628 UART: [state] CFI Enabled
2,324,690 UART: [state] LifecycleState = Unprovisioned
2,326,628 UART: [state] DebugLocked = No
2,327,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,721 UART: [kat] SHA2-256
2,502,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,905 UART: [kat] ++
2,513,372 UART: [kat] sha1
2,525,340 UART: [kat] SHA2-256
2,528,031 UART: [kat] SHA2-384
2,532,450 UART: [kat] SHA2-512-ACC
2,534,805 UART: [kat] ECC-384
4,827,116 UART: [kat] HMAC-384Kdf
4,839,961 UART: [kat] LMS
6,030,293 UART: [kat] --
6,036,466 UART: [cold-reset] ++
6,038,944 UART: [fht] Storing FHT @ 0x50003400
6,050,602 UART: [idev] ++
6,051,172 UART: [idev] CDI.KEYID = 6
6,052,147 UART: [idev] SUBJECT.KEYID = 7
6,053,364 UART: [idev] UDS.KEYID = 0
6,055,716 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,199,255 UART: [idev] Erasing UDS.KEYID = 0
9,386,032 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,740 UART: [idev] --
9,411,732 UART: [ldev] ++
9,412,299 UART: [ldev] CDI.KEYID = 6
9,413,237 UART: [ldev] SUBJECT.KEYID = 5
9,414,487 UART: [ldev] AUTHORITY.KEYID = 7
9,415,747 UART: [ldev] FE.KEYID = 1
9,462,686 UART: [ldev] Erasing FE.KEYID = 1
12,798,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,496 UART: [ldev] --
15,160,449 UART: [fwproc] Waiting for Commands...
15,163,692 UART: [fwproc] Received command 0x46574c44
15,165,884 UART: [fwproc] Received Image of size 114036 bytes
19,222,142 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,296,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,365,687 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,682,901 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,788,989 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,548,591 >>> mbox cmd response: failed
15,549,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,554 >>> mbox cmd response: failed
15,549,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,550,118 >>> mbox cmd response: failed
Initializing fuses
2,063,152 writing to cptra_bootfsm_go
5,849,977 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,913,943 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,515 UART:
192,861 UART: Running Caliptra ROM ...
194,029 UART:
603,845 UART: [state] CFI Enabled
619,014 UART: [state] LifecycleState = Unprovisioned
620,974 UART: [state] DebugLocked = No
623,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,722 UART: [kat] SHA2-256
797,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,037 UART: [kat] ++
808,575 UART: [kat] sha1
819,136 UART: [kat] SHA2-256
821,870 UART: [kat] SHA2-384
826,663 UART: [kat] SHA2-512-ACC
829,004 UART: [kat] ECC-384
3,113,149 UART: [kat] HMAC-384Kdf
3,125,010 UART: [kat] LMS
4,315,116 UART: [kat] --
4,322,443 UART: [cold-reset] ++
4,323,731 UART: [fht] Storing FHT @ 0x50003400
4,335,384 UART: [idev] ++
4,335,970 UART: [idev] CDI.KEYID = 6
4,336,989 UART: [idev] SUBJECT.KEYID = 7
4,338,149 UART: [idev] UDS.KEYID = 0
4,340,814 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,279 UART: [idev] Erasing UDS.KEYID = 0
7,626,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,424 UART: [idev] --
7,651,534 UART: [ldev] ++
7,652,109 UART: [ldev] CDI.KEYID = 6
7,653,129 UART: [ldev] SUBJECT.KEYID = 5
7,654,235 UART: [ldev] AUTHORITY.KEYID = 7
7,655,521 UART: [ldev] FE.KEYID = 1
7,667,585 UART: [ldev] Erasing FE.KEYID = 1
10,955,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,926 UART: [ldev] --
13,317,031 UART: [fwproc] Waiting for Commands...
13,319,893 UART: [fwproc] Received command 0x46574c44
13,322,087 UART: [fwproc] Received Image of size 114036 bytes
16,022,377 UART: ROM Fatal Error: 0x000B0034
16,025,883 >>> mbox cmd response: failed
16,026,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,622 >>> mbox cmd response: failed
16,026,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,185 >>> mbox cmd response: failed
Initializing fuses
2,061,423 writing to cptra_bootfsm_go
2,250,750 UART:
2,251,108 UART: Running Caliptra ROM ...
2,252,248 UART:
4,423,527 UART: [state] CFI Enabled
4,439,846 UART: [state] LifecycleState = Unprovisioned
4,441,775 UART: [state] DebugLocked = No
4,443,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,378 UART: [kat] SHA2-256
4,619,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,629,639 UART: [kat] ++
4,630,186 UART: [kat] sha1
4,642,702 UART: [kat] SHA2-256
4,645,403 UART: [kat] SHA2-384
4,650,582 UART: [kat] SHA2-512-ACC
4,652,931 UART: [kat] ECC-384
6,936,784 UART: [kat] HMAC-384Kdf
6,948,819 UART: [kat] LMS
8,138,938 UART: [kat] --
8,144,453 UART: [cold-reset] ++
8,146,118 UART: [fht] Storing FHT @ 0x50003400
8,158,412 UART: [idev] ++
8,158,984 UART: [idev] CDI.KEYID = 6
8,160,004 UART: [idev] SUBJECT.KEYID = 7
8,161,166 UART: [idev] UDS.KEYID = 0
8,163,344 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,306,660 UART: [idev] Erasing UDS.KEYID = 0
11,447,032 UART: [idev] Using Sha1 for KeyId Algorithm
11,469,924 UART: [idev] --
11,474,294 UART: [ldev] ++
11,474,860 UART: [ldev] CDI.KEYID = 6
11,475,876 UART: [ldev] SUBJECT.KEYID = 5
11,477,059 UART: [ldev] AUTHORITY.KEYID = 7
11,478,315 UART: [ldev] FE.KEYID = 1
11,488,601 UART: [ldev] Erasing FE.KEYID = 1
14,776,848 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,098,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,132,490 UART: [ldev] --
17,137,763 UART: [fwproc] Waiting for Commands...
17,140,671 UART: [fwproc] Received command 0x46574c44
17,142,857 UART: [fwproc] Received Image of size 114036 bytes
21,192,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,265,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,334,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,651,405 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,125,973 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,759,227 >>> mbox cmd response: failed
15,759,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,116 >>> mbox cmd response: failed
15,760,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,686 >>> mbox cmd response: failed
Initializing fuses
2,058,296 writing to cptra_bootfsm_go
8,234,340 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,169,474 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,110 UART:
192,483 UART: Running Caliptra ROM ...
193,679 UART:
193,832 UART: [state] CFI Enabled
264,368 UART: [state] LifecycleState = Unprovisioned
266,235 UART: [state] DebugLocked = No
268,219 UART: [state] WD Timer not started. Device not locked for debugging
272,700 UART: [kat] SHA2-256
451,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,391 UART: [kat] ++
463,926 UART: [kat] sha1
474,002 UART: [kat] SHA2-256
477,064 UART: [kat] SHA2-384
482,071 UART: [kat] SHA2-512-ACC
485,056 UART: [kat] ECC-384
2,945,903 UART: [kat] HMAC-384Kdf
2,971,591 UART: [kat] LMS
3,501,034 UART: [kat] --
3,505,041 UART: [cold-reset] ++
3,506,341 UART: [fht] FHT @ 0x50003400
3,516,351 UART: [idev] ++
3,516,918 UART: [idev] CDI.KEYID = 6
3,517,827 UART: [idev] SUBJECT.KEYID = 7
3,518,990 UART: [idev] UDS.KEYID = 0
3,521,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,843 UART: [idev] Erasing UDS.KEYID = 0
6,019,761 UART: [idev] Sha1 KeyId Algorithm
6,042,093 UART: [idev] --
6,047,396 UART: [ldev] ++
6,048,179 UART: [ldev] CDI.KEYID = 6
6,049,103 UART: [ldev] SUBJECT.KEYID = 5
6,050,235 UART: [ldev] AUTHORITY.KEYID = 7
6,051,417 UART: [ldev] FE.KEYID = 1
6,092,047 UART: [ldev] Erasing FE.KEYID = 1
8,594,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,667 UART: [ldev] --
10,401,016 UART: [fwproc] Wait for Commands...
10,403,983 UART: [fwproc] Recv command 0x46574c44
10,406,086 UART: [fwproc] Recv'd Img size: 114360 bytes
12,456,931 UART: ROM Fatal Error: 0x000B0034
12,460,062 >>> mbox cmd response: failed
12,460,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,723 >>> mbox cmd response: failed
12,461,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,316 >>> mbox cmd response: failed
Initializing fuses
2,052,766 writing to cptra_bootfsm_go
2,242,031 UART:
2,242,383 UART: Running Caliptra ROM ...
2,243,518 UART:
2,243,680 UART: [state] CFI Enabled
2,301,968 UART: [state] LifecycleState = Unprovisioned
2,303,815 UART: [state] DebugLocked = No
2,305,197 UART: [state] WD Timer not started. Device not locked for debugging
2,308,119 UART: [kat] SHA2-256
2,487,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,814 UART: [kat] ++
2,499,378 UART: [kat] sha1
2,509,737 UART: [kat] SHA2-256
2,512,751 UART: [kat] SHA2-384
2,518,732 UART: [kat] SHA2-512-ACC
2,521,678 UART: [kat] ECC-384
4,985,133 UART: [kat] HMAC-384Kdf
5,006,920 UART: [kat] LMS
5,536,336 UART: [kat] --
5,541,140 UART: [cold-reset] ++
5,543,285 UART: [fht] FHT @ 0x50003400
5,554,745 UART: [idev] ++
5,555,318 UART: [idev] CDI.KEYID = 6
5,556,229 UART: [idev] SUBJECT.KEYID = 7
5,557,445 UART: [idev] UDS.KEYID = 0
5,559,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,703,576 UART: [idev] Erasing UDS.KEYID = 0
8,062,521 UART: [idev] Sha1 KeyId Algorithm
8,086,223 UART: [idev] --
8,090,814 UART: [ldev] ++
8,091,404 UART: [ldev] CDI.KEYID = 6
8,092,319 UART: [ldev] SUBJECT.KEYID = 5
8,093,483 UART: [ldev] AUTHORITY.KEYID = 7
8,094,717 UART: [ldev] FE.KEYID = 1
8,134,747 UART: [ldev] Erasing FE.KEYID = 1
10,637,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,525 UART: [ldev] --
12,449,257 UART: [fwproc] Wait for Commands...
12,451,952 UART: [fwproc] Recv command 0x46574c44
12,454,012 UART: [fwproc] Recv'd Img size: 114360 bytes
15,852,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,927,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,995,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,314,378 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,100 UART:
192,480 UART: Running Caliptra ROM ...
193,587 UART:
193,730 UART: [state] CFI Enabled
261,765 UART: [state] LifecycleState = Unprovisioned
264,179 UART: [state] DebugLocked = No
266,123 UART: [state] WD Timer not started. Device not locked for debugging
270,832 UART: [kat] SHA2-256
460,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,462 UART: [kat] ++
471,911 UART: [kat] sha1
483,871 UART: [kat] SHA2-256
486,883 UART: [kat] SHA2-384
492,971 UART: [kat] SHA2-512-ACC
495,585 UART: [kat] ECC-384
2,947,509 UART: [kat] HMAC-384Kdf
2,971,088 UART: [kat] LMS
3,502,854 UART: [kat] --
3,508,207 UART: [cold-reset] ++
3,510,310 UART: [fht] FHT @ 0x50003400
3,520,869 UART: [idev] ++
3,521,544 UART: [idev] CDI.KEYID = 6
3,522,510 UART: [idev] SUBJECT.KEYID = 7
3,523,719 UART: [idev] UDS.KEYID = 0
3,526,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,763 UART: [idev] Erasing UDS.KEYID = 0
6,027,652 UART: [idev] Sha1 KeyId Algorithm
6,050,153 UART: [idev] --
6,055,372 UART: [ldev] ++
6,056,122 UART: [ldev] CDI.KEYID = 6
6,057,012 UART: [ldev] SUBJECT.KEYID = 5
6,058,174 UART: [ldev] AUTHORITY.KEYID = 7
6,059,409 UART: [ldev] FE.KEYID = 1
6,099,030 UART: [ldev] Erasing FE.KEYID = 1
8,602,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,602 UART: [ldev] --
10,411,838 UART: [fwproc] Wait for Commands...
10,414,642 UART: [fwproc] Recv command 0x46574c44
10,416,902 UART: [fwproc] Recv'd Img size: 114360 bytes
12,499,087 UART: ROM Fatal Error: 0x000B0034
12,502,760 >>> mbox cmd response: failed
12,503,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,515 >>> mbox cmd response: failed
12,503,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,076 >>> mbox cmd response: failed
Initializing fuses
2,057,631 writing to cptra_bootfsm_go
2,246,956 UART:
2,247,303 UART: Running Caliptra ROM ...
2,248,439 UART:
2,248,624 UART: [state] CFI Enabled
2,306,108 UART: [state] LifecycleState = Unprovisioned
2,308,487 UART: [state] DebugLocked = No
2,310,637 UART: [state] WD Timer not started. Device not locked for debugging
2,315,378 UART: [kat] SHA2-256
2,505,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,033 UART: [kat] ++
2,516,497 UART: [kat] sha1
2,528,628 UART: [kat] SHA2-256
2,531,651 UART: [kat] SHA2-384
2,538,617 UART: [kat] SHA2-512-ACC
2,541,197 UART: [kat] ECC-384
4,990,385 UART: [kat] HMAC-384Kdf
5,014,498 UART: [kat] LMS
5,546,222 UART: [kat] --
5,553,560 UART: [cold-reset] ++
5,554,980 UART: [fht] FHT @ 0x50003400
5,567,428 UART: [idev] ++
5,568,103 UART: [idev] CDI.KEYID = 6
5,569,070 UART: [idev] SUBJECT.KEYID = 7
5,570,290 UART: [idev] UDS.KEYID = 0
5,572,639 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,716,576 UART: [idev] Erasing UDS.KEYID = 0
8,071,760 UART: [idev] Sha1 KeyId Algorithm
8,095,491 UART: [idev] --
8,100,111 UART: [ldev] ++
8,100,801 UART: [ldev] CDI.KEYID = 6
8,101,868 UART: [ldev] SUBJECT.KEYID = 5
8,102,979 UART: [ldev] AUTHORITY.KEYID = 7
8,104,158 UART: [ldev] FE.KEYID = 1
8,144,458 UART: [ldev] Erasing FE.KEYID = 1
10,651,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,399 UART: [ldev] --
12,458,513 UART: [fwproc] Wait for Commands...
12,461,258 UART: [fwproc] Recv command 0x46574c44
12,463,527 UART: [fwproc] Recv'd Img size: 114360 bytes
15,912,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,991,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,107,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,650,198 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,442,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,303,195 >>> mbox cmd response: failed
12,303,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,121 >>> mbox cmd response: failed
12,304,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,696 >>> mbox cmd response: failed
Initializing fuses
2,061,395 writing to cptra_bootfsm_go
5,488,156 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,768,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,475 UART:
192,834 UART: Running Caliptra ROM ...
193,932 UART:
603,508 UART: [state] CFI Enabled
616,030 UART: [state] LifecycleState = Unprovisioned
618,400 UART: [state] DebugLocked = No
620,233 UART: [state] WD Timer not started. Device not locked for debugging
624,981 UART: [kat] SHA2-256
814,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,671 UART: [kat] ++
826,257 UART: [kat] sha1
838,330 UART: [kat] SHA2-256
841,342 UART: [kat] SHA2-384
848,397 UART: [kat] SHA2-512-ACC
851,007 UART: [kat] ECC-384
3,292,040 UART: [kat] HMAC-384Kdf
3,305,035 UART: [kat] LMS
3,836,862 UART: [kat] --
3,842,377 UART: [cold-reset] ++
3,843,652 UART: [fht] FHT @ 0x50003400
3,855,123 UART: [idev] ++
3,855,808 UART: [idev] CDI.KEYID = 6
3,856,830 UART: [idev] SUBJECT.KEYID = 7
3,857,930 UART: [idev] UDS.KEYID = 0
3,860,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,494 UART: [idev] Erasing UDS.KEYID = 0
6,337,561 UART: [idev] Sha1 KeyId Algorithm
6,359,811 UART: [idev] --
6,364,366 UART: [ldev] ++
6,365,108 UART: [ldev] CDI.KEYID = 6
6,366,023 UART: [ldev] SUBJECT.KEYID = 5
6,367,150 UART: [ldev] AUTHORITY.KEYID = 7
6,368,382 UART: [ldev] FE.KEYID = 1
6,378,442 UART: [ldev] Erasing FE.KEYID = 1
8,858,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,575 UART: [ldev] --
10,653,545 UART: [fwproc] Wait for Commands...
10,655,697 UART: [fwproc] Recv command 0x46574c44
10,657,954 UART: [fwproc] Recv'd Img size: 114360 bytes
12,743,990 UART: ROM Fatal Error: 0x000B0034
12,747,652 >>> mbox cmd response: failed
12,747,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,277 >>> mbox cmd response: failed
12,748,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,803 >>> mbox cmd response: failed
Initializing fuses
2,054,497 writing to cptra_bootfsm_go
2,243,790 UART:
2,244,140 UART: Running Caliptra ROM ...
2,245,285 UART:
7,705,536 UART: [state] CFI Enabled
7,719,045 UART: [state] LifecycleState = Unprovisioned
7,721,453 UART: [state] DebugLocked = No
7,724,141 UART: [state] WD Timer not started. Device not locked for debugging
7,727,871 UART: [kat] SHA2-256
7,917,724 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,928,554 UART: [kat] ++
7,929,060 UART: [kat] sha1
7,940,169 UART: [kat] SHA2-256
7,943,194 UART: [kat] SHA2-384
7,949,351 UART: [kat] SHA2-512-ACC
7,951,913 UART: [kat] ECC-384
10,393,286 UART: [kat] HMAC-384Kdf
10,406,047 UART: [kat] LMS
10,937,875 UART: [kat] --
10,943,163 UART: [cold-reset] ++
10,945,203 UART: [fht] FHT @ 0x50003400
10,956,043 UART: [idev] ++
10,956,753 UART: [idev] CDI.KEYID = 6
10,957,670 UART: [idev] SUBJECT.KEYID = 7
10,958,884 UART: [idev] UDS.KEYID = 0
10,961,505 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,105,082 UART: [idev] Erasing UDS.KEYID = 0
13,437,950 UART: [idev] Sha1 KeyId Algorithm
13,460,054 UART: [idev] --
13,465,726 UART: [ldev] ++
13,466,404 UART: [ldev] CDI.KEYID = 6
13,467,283 UART: [ldev] SUBJECT.KEYID = 5
13,468,436 UART: [ldev] AUTHORITY.KEYID = 7
13,469,722 UART: [ldev] FE.KEYID = 1
13,480,609 UART: [ldev] Erasing FE.KEYID = 1
15,954,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,674,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,689,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,704,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,719,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,740,296 UART: [ldev] --
17,745,779 UART: [fwproc] Wait for Commands...
17,747,713 UART: [fwproc] Recv command 0x46574c44
17,750,039 UART: [fwproc] Recv'd Img size: 114360 bytes
21,198,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,274,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,391,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,932,952 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,759,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,524,797 >>> mbox cmd response: failed
12,525,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,701 >>> mbox cmd response: failed
12,525,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,263 >>> mbox cmd response: failed
Initializing fuses
2,054,787 writing to cptra_bootfsm_go
11,084,867 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,287,169 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,743 UART: [kat] SHA2-256
881,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,789 UART: [kat] ++
885,941 UART: [kat] sha1
890,063 UART: [kat] SHA2-256
892,001 UART: [kat] SHA2-384
894,712 UART: [kat] SHA2-512-ACC
896,613 UART: [kat] ECC-384
902,368 UART: [kat] HMAC-384Kdf
906,834 UART: [kat] LMS
1,475,030 UART: [kat] --
1,475,959 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,280 UART: [idev] Erasing UDS.KEYID = 0
1,505,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,768 UART: [idev] --
1,514,825 UART: [ldev] ++
1,514,993 UART: [ldev] CDI.KEYID = 6
1,515,356 UART: [ldev] SUBJECT.KEYID = 5
1,515,782 UART: [ldev] AUTHORITY.KEYID = 7
1,516,245 UART: [ldev] FE.KEYID = 1
1,521,553 UART: [ldev] Erasing FE.KEYID = 1
1,545,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,822 UART: [ldev] --
1,585,185 UART: [fwproc] Waiting for Commands...
1,585,922 UART: [fwproc] Received command 0x46574c44
1,586,713 UART: [fwproc] Received Image of size 114360 bytes
1,633,816 UART: ROM Fatal Error: 0x000B0034
1,634,973 >>> mbox cmd response: failed
1,634,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,979 >>> mbox cmd response: failed
1,634,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,252 UART: [kat] SHA2-512-ACC
897,153 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,639 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,504,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,058 UART: [idev] --
1,513,985 UART: [ldev] ++
1,514,153 UART: [ldev] CDI.KEYID = 6
1,514,516 UART: [ldev] SUBJECT.KEYID = 5
1,514,942 UART: [ldev] AUTHORITY.KEYID = 7
1,515,405 UART: [ldev] FE.KEYID = 1
1,520,365 UART: [ldev] Erasing FE.KEYID = 1
1,545,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,762 UART: [ldev] --
1,585,197 UART: [fwproc] Waiting for Commands...
1,585,826 UART: [fwproc] Received command 0x46574c44
1,586,617 UART: [fwproc] Received Image of size 114360 bytes
2,884,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,964 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,300 >>> mbox cmd response: failed
1,489,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,306 >>> mbox cmd response: failed
1,489,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,536 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,475 UART: [kat] SHA2-512-ACC
897,376 UART: [kat] ECC-384
902,959 UART: [kat] HMAC-384Kdf
907,727 UART: [kat] LMS
1,475,923 UART: [kat] --
1,476,990 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,799 UART: [idev] Erasing UDS.KEYID = 0
1,505,445 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] --
1,515,126 UART: [ldev] ++
1,515,294 UART: [ldev] CDI.KEYID = 6
1,515,657 UART: [ldev] SUBJECT.KEYID = 5
1,516,083 UART: [ldev] AUTHORITY.KEYID = 7
1,516,546 UART: [ldev] FE.KEYID = 1
1,521,954 UART: [ldev] Erasing FE.KEYID = 1
1,547,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,697 UART: [ldev] --
1,587,004 UART: [fwproc] Waiting for Commands...
1,587,731 UART: [fwproc] Received command 0x46574c44
1,588,522 UART: [fwproc] Received Image of size 114360 bytes
1,635,693 UART: ROM Fatal Error: 0x000B0034
1,636,850 >>> mbox cmd response: failed
1,636,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,856 >>> mbox cmd response: failed
1,636,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,604 UART: [kat] SHA2-256
892,542 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,735 UART: [kat] LMS
1,475,931 UART: [kat] --
1,476,548 UART: [cold-reset] ++
1,477,112 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,783 UART: [idev] Erasing UDS.KEYID = 0
1,505,817 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,397 UART: [idev] --
1,515,422 UART: [ldev] ++
1,515,590 UART: [ldev] CDI.KEYID = 6
1,515,953 UART: [ldev] SUBJECT.KEYID = 5
1,516,379 UART: [ldev] AUTHORITY.KEYID = 7
1,516,842 UART: [ldev] FE.KEYID = 1
1,522,142 UART: [ldev] Erasing FE.KEYID = 1
1,547,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,329 UART: [ldev] --
1,586,612 UART: [fwproc] Waiting for Commands...
1,587,277 UART: [fwproc] Received command 0x46574c44
1,588,068 UART: [fwproc] Received Image of size 114360 bytes
2,885,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,040 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,392 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,317 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,528 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,995 >>> mbox cmd response: failed
1,488,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,001 >>> mbox cmd response: failed
1,489,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,698 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,643 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,368 UART: [kat] SHA2-512-ACC
908,269 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,777 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,174,906 UART: [idev] ++
1,175,074 UART: [idev] CDI.KEYID = 6
1,175,434 UART: [idev] SUBJECT.KEYID = 7
1,175,858 UART: [idev] UDS.KEYID = 0
1,176,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,926 UART: [idev] Erasing UDS.KEYID = 0
1,201,301 UART: [idev] Sha1 KeyId Algorithm
1,209,811 UART: [idev] --
1,210,733 UART: [ldev] ++
1,210,901 UART: [ldev] CDI.KEYID = 6
1,211,264 UART: [ldev] SUBJECT.KEYID = 5
1,211,690 UART: [ldev] AUTHORITY.KEYID = 7
1,212,153 UART: [ldev] FE.KEYID = 1
1,217,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,581 UART: [ldev] --
1,283,096 UART: [fwproc] Wait for Commands...
1,283,868 UART: [fwproc] Recv command 0x46574c44
1,284,596 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,747 UART: ROM Fatal Error: 0x000B0034
1,332,904 >>> mbox cmd response: failed
1,332,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,910 >>> mbox cmd response: failed
1,332,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
85,955 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
892,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,945 UART: [kat] ++
897,097 UART: [kat] sha1
901,379 UART: [kat] SHA2-256
903,319 UART: [kat] SHA2-384
906,002 UART: [kat] SHA2-512-ACC
907,903 UART: [kat] ECC-384
917,128 UART: [kat] HMAC-384Kdf
921,806 UART: [kat] LMS
1,170,134 UART: [kat] --
1,171,331 UART: [cold-reset] ++
1,171,673 UART: [fht] FHT @ 0x50003400
1,174,474 UART: [idev] ++
1,174,642 UART: [idev] CDI.KEYID = 6
1,175,002 UART: [idev] SUBJECT.KEYID = 7
1,175,426 UART: [idev] UDS.KEYID = 0
1,175,771 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,813 UART: [idev] Sha1 KeyId Algorithm
1,209,207 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,688 UART: [ldev] SUBJECT.KEYID = 5
1,211,114 UART: [ldev] AUTHORITY.KEYID = 7
1,211,577 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,241,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,560 UART: [fwproc] Recv command 0x46574c44
1,283,288 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,641 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,187,461 >>> mbox cmd response: failed
1,187,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,467 >>> mbox cmd response: failed
1,187,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,236 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,507 UART: [kat] SHA2-512-ACC
908,408 UART: [kat] ECC-384
917,955 UART: [kat] HMAC-384Kdf
922,473 UART: [kat] LMS
1,170,801 UART: [kat] --
1,171,754 UART: [cold-reset] ++
1,172,334 UART: [fht] FHT @ 0x50003400
1,174,993 UART: [idev] ++
1,175,161 UART: [idev] CDI.KEYID = 6
1,175,521 UART: [idev] SUBJECT.KEYID = 7
1,175,945 UART: [idev] UDS.KEYID = 0
1,176,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,200,642 UART: [idev] Sha1 KeyId Algorithm
1,209,250 UART: [idev] --
1,210,150 UART: [ldev] ++
1,210,318 UART: [ldev] CDI.KEYID = 6
1,210,681 UART: [ldev] SUBJECT.KEYID = 5
1,211,107 UART: [ldev] AUTHORITY.KEYID = 7
1,211,570 UART: [ldev] FE.KEYID = 1
1,216,974 UART: [ldev] Erasing FE.KEYID = 1
1,244,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,312 UART: [ldev] --
1,283,783 UART: [fwproc] Wait for Commands...
1,284,543 UART: [fwproc] Recv command 0x46574c44
1,285,271 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,292 UART: ROM Fatal Error: 0x000B0034
1,333,449 >>> mbox cmd response: failed
1,333,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,455 >>> mbox cmd response: failed
1,333,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
893,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,436 UART: [kat] ++
897,588 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,733 UART: [kat] SHA2-512-ACC
908,634 UART: [kat] ECC-384
918,051 UART: [kat] HMAC-384Kdf
922,499 UART: [kat] LMS
1,170,827 UART: [kat] --
1,171,644 UART: [cold-reset] ++
1,172,120 UART: [fht] FHT @ 0x50003400
1,174,705 UART: [idev] ++
1,174,873 UART: [idev] CDI.KEYID = 6
1,175,233 UART: [idev] SUBJECT.KEYID = 7
1,175,657 UART: [idev] UDS.KEYID = 0
1,176,002 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,393 UART: [idev] Erasing UDS.KEYID = 0
1,200,972 UART: [idev] Sha1 KeyId Algorithm
1,209,272 UART: [idev] --
1,210,268 UART: [ldev] ++
1,210,436 UART: [ldev] CDI.KEYID = 6
1,210,799 UART: [ldev] SUBJECT.KEYID = 5
1,211,225 UART: [ldev] AUTHORITY.KEYID = 7
1,211,688 UART: [ldev] FE.KEYID = 1
1,216,864 UART: [ldev] Erasing FE.KEYID = 1
1,243,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,768 UART: [ldev] --
1,283,029 UART: [fwproc] Wait for Commands...
1,283,685 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,674 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,250 >>> mbox cmd response: failed
1,188,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,256 >>> mbox cmd response: failed
1,188,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,574 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,441 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,074 UART: [kat] SHA2-256
890,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,753 UART: [kat] ++
894,905 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
903,894 UART: [kat] SHA2-512-ACC
905,795 UART: [kat] ECC-384
915,150 UART: [kat] HMAC-384Kdf
919,550 UART: [kat] LMS
1,167,862 UART: [kat] --
1,168,595 UART: [cold-reset] ++
1,168,925 UART: [fht] FHT @ 0x50003400
1,171,505 UART: [idev] ++
1,171,673 UART: [idev] CDI.KEYID = 6
1,172,034 UART: [idev] SUBJECT.KEYID = 7
1,172,459 UART: [idev] UDS.KEYID = 0
1,172,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,333 UART: [idev] Erasing UDS.KEYID = 0
1,197,485 UART: [idev] Sha1 KeyId Algorithm
1,206,309 UART: [idev] --
1,207,212 UART: [ldev] ++
1,207,380 UART: [ldev] CDI.KEYID = 6
1,207,744 UART: [ldev] SUBJECT.KEYID = 5
1,208,171 UART: [ldev] AUTHORITY.KEYID = 7
1,208,634 UART: [ldev] FE.KEYID = 1
1,213,598 UART: [ldev] Erasing FE.KEYID = 1
1,239,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,148 UART: [ldev] --
1,278,426 UART: [fwproc] Wait for Commands...
1,279,089 UART: [fwproc] Recv command 0x46574c44
1,279,822 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,890 UART: ROM Fatal Error: 0x000B0034
1,328,047 >>> mbox cmd response: failed
1,328,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,053 >>> mbox cmd response: failed
1,328,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,638 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,327 UART: [cold-reset] ++
1,169,733 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,523 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,240,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,584 UART: [ldev] --
1,279,912 UART: [fwproc] Wait for Commands...
1,280,535 UART: [fwproc] Recv command 0x46574c44
1,281,268 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,817 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,848 >>> mbox cmd response: failed
1,181,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,854 >>> mbox cmd response: failed
1,181,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,637 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,341 UART: [kat] SHA2-256
890,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,374 UART: [kat] SHA2-256
901,314 UART: [kat] SHA2-384
903,935 UART: [kat] SHA2-512-ACC
905,836 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,345 UART: [kat] LMS
1,168,657 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,498 UART: [idev] ++
1,172,666 UART: [idev] CDI.KEYID = 6
1,173,027 UART: [idev] SUBJECT.KEYID = 7
1,173,452 UART: [idev] UDS.KEYID = 0
1,173,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,839 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,011 UART: ROM Fatal Error: 0x000B0034
1,332,168 >>> mbox cmd response: failed
1,332,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,174 >>> mbox cmd response: failed
1,332,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,479 UART: [kat] SHA2-512-ACC
906,380 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,220 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,702 UART: [idev] Erasing UDS.KEYID = 0
1,198,770 UART: [idev] Sha1 KeyId Algorithm
1,207,630 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,667 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,714 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,945 >>> mbox cmd response: failed
1,183,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,951 >>> mbox cmd response: failed
1,183,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,810 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,076 UART:
192,436 UART: Running Caliptra ROM ...
193,540 UART:
193,684 UART: [state] CFI Enabled
260,340 UART: [state] LifecycleState = Unprovisioned
262,313 UART: [state] DebugLocked = No
264,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,689 UART: [kat] SHA2-256
439,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,895 UART: [kat] ++
450,341 UART: [kat] sha1
461,290 UART: [kat] SHA2-256
463,982 UART: [kat] SHA2-384
470,624 UART: [kat] SHA2-512-ACC
473,023 UART: [kat] ECC-384
2,764,572 UART: [kat] HMAC-384Kdf
2,796,790 UART: [kat] LMS
3,987,090 UART: [kat] --
3,990,782 UART: [cold-reset] ++
3,992,723 UART: [fht] Storing FHT @ 0x50003400
4,003,129 UART: [idev] ++
4,003,748 UART: [idev] CDI.KEYID = 6
4,004,643 UART: [idev] SUBJECT.KEYID = 7
4,005,927 UART: [idev] UDS.KEYID = 0
4,008,476 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,152,123 UART: [idev] Erasing UDS.KEYID = 0
7,342,561 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,266 UART: [idev] --
7,367,837 UART: [ldev] ++
7,368,426 UART: [ldev] CDI.KEYID = 6
7,369,587 UART: [ldev] SUBJECT.KEYID = 5
7,370,751 UART: [ldev] AUTHORITY.KEYID = 7
7,371,974 UART: [ldev] FE.KEYID = 1
7,419,978 UART: [ldev] Erasing FE.KEYID = 1
10,754,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,171 UART: [ldev] --
13,135,141 UART: [fwproc] Waiting for Commands...
13,138,311 UART: [fwproc] Received command 0x46574c44
13,140,517 UART: [fwproc] Received Image of size 114036 bytes
15,840,826 UART: ROM Fatal Error: 0x000B0017
15,844,331 >>> mbox cmd response: failed
15,844,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,056 >>> mbox cmd response: failed
15,845,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,647 >>> mbox cmd response: failed
Initializing fuses
2,068,756 writing to cptra_bootfsm_go
2,258,039 UART:
2,258,405 UART: Running Caliptra ROM ...
2,259,460 UART:
2,259,618 UART: [state] CFI Enabled
2,332,664 UART: [state] LifecycleState = Unprovisioned
2,334,606 UART: [state] DebugLocked = No
2,336,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,341,072 UART: [kat] SHA2-256
2,510,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,521,332 UART: [kat] ++
2,521,902 UART: [kat] sha1
2,531,935 UART: [kat] SHA2-256
2,534,647 UART: [kat] SHA2-384
2,541,527 UART: [kat] SHA2-512-ACC
2,543,893 UART: [kat] ECC-384
4,835,925 UART: [kat] HMAC-384Kdf
4,847,507 UART: [kat] LMS
6,037,820 UART: [kat] --
6,040,532 UART: [cold-reset] ++
6,041,504 UART: [fht] Storing FHT @ 0x50003400
6,052,967 UART: [idev] ++
6,053,579 UART: [idev] CDI.KEYID = 6
6,054,506 UART: [idev] SUBJECT.KEYID = 7
6,055,726 UART: [idev] UDS.KEYID = 0
6,057,973 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,201,366 UART: [idev] Erasing UDS.KEYID = 0
9,390,738 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,238 UART: [idev] --
9,417,027 UART: [ldev] ++
9,417,612 UART: [ldev] CDI.KEYID = 6
9,418,553 UART: [ldev] SUBJECT.KEYID = 5
9,419,819 UART: [ldev] AUTHORITY.KEYID = 7
9,420,976 UART: [ldev] FE.KEYID = 1
9,468,052 UART: [ldev] Erasing FE.KEYID = 1
12,798,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,267 UART: [ldev] --
15,159,481 UART: [fwproc] Waiting for Commands...
15,162,718 UART: [fwproc] Received command 0x46574c44
15,164,933 UART: [fwproc] Received Image of size 114036 bytes
19,213,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,286,806 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,355,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,672,829 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,786,265 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,548,669 >>> mbox cmd response: failed
15,549,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,538 >>> mbox cmd response: failed
15,549,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,550,100 >>> mbox cmd response: failed
Initializing fuses
2,063,051 writing to cptra_bootfsm_go
5,855,098 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,939,302 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,153 writing to cptra_bootfsm_go
193,285 UART:
193,639 UART: Running Caliptra ROM ...
194,848 UART:
604,466 UART: [state] CFI Enabled
619,904 UART: [state] LifecycleState = Unprovisioned
621,831 UART: [state] DebugLocked = No
623,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,325 UART: [kat] SHA2-256
798,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,637 UART: [kat] ++
809,082 UART: [kat] sha1
819,586 UART: [kat] SHA2-256
822,327 UART: [kat] SHA2-384
827,819 UART: [kat] SHA2-512-ACC
830,156 UART: [kat] ECC-384
3,113,402 UART: [kat] HMAC-384Kdf
3,125,509 UART: [kat] LMS
4,315,603 UART: [kat] --
4,320,571 UART: [cold-reset] ++
4,323,040 UART: [fht] Storing FHT @ 0x50003400
4,334,651 UART: [idev] ++
4,335,282 UART: [idev] CDI.KEYID = 6
4,336,189 UART: [idev] SUBJECT.KEYID = 7
4,337,463 UART: [idev] UDS.KEYID = 0
4,340,071 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,493 UART: [idev] Erasing UDS.KEYID = 0
7,622,515 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,753 UART: [idev] --
7,648,093 UART: [ldev] ++
7,648,671 UART: [ldev] CDI.KEYID = 6
7,649,635 UART: [ldev] SUBJECT.KEYID = 5
7,650,853 UART: [ldev] AUTHORITY.KEYID = 7
7,652,143 UART: [ldev] FE.KEYID = 1
7,663,493 UART: [ldev] Erasing FE.KEYID = 1
10,951,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,841 UART: [ldev] --
13,311,458 UART: [fwproc] Waiting for Commands...
13,314,800 UART: [fwproc] Received command 0x46574c44
13,316,987 UART: [fwproc] Received Image of size 114036 bytes
16,022,840 UART: ROM Fatal Error: 0x000B0017
16,026,346 >>> mbox cmd response: failed
16,026,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,098 >>> mbox cmd response: failed
16,027,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,667 >>> mbox cmd response: failed
Initializing fuses
2,055,787 writing to cptra_bootfsm_go
2,245,111 UART:
2,245,479 UART: Running Caliptra ROM ...
2,246,527 UART:
4,424,077 UART: [state] CFI Enabled
4,437,596 UART: [state] LifecycleState = Unprovisioned
4,439,567 UART: [state] DebugLocked = No
4,441,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,445,696 UART: [kat] SHA2-256
4,615,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,626,020 UART: [kat] ++
4,626,567 UART: [kat] sha1
4,637,304 UART: [kat] SHA2-256
4,640,001 UART: [kat] SHA2-384
4,646,372 UART: [kat] SHA2-512-ACC
4,648,699 UART: [kat] ECC-384
6,934,351 UART: [kat] HMAC-384Kdf
6,946,584 UART: [kat] LMS
8,136,665 UART: [kat] --
8,140,664 UART: [cold-reset] ++
8,142,814 UART: [fht] Storing FHT @ 0x50003400
8,154,836 UART: [idev] ++
8,155,454 UART: [idev] CDI.KEYID = 6
8,156,366 UART: [idev] SUBJECT.KEYID = 7
8,157,636 UART: [idev] UDS.KEYID = 0
8,160,064 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,303,434 UART: [idev] Erasing UDS.KEYID = 0
11,446,094 UART: [idev] Using Sha1 for KeyId Algorithm
11,469,100 UART: [idev] --
11,473,526 UART: [ldev] ++
11,474,095 UART: [ldev] CDI.KEYID = 6
11,475,078 UART: [ldev] SUBJECT.KEYID = 5
11,476,299 UART: [ldev] AUTHORITY.KEYID = 7
11,477,540 UART: [ldev] FE.KEYID = 1
11,489,271 UART: [ldev] Erasing FE.KEYID = 1
14,780,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,075,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,089,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,104,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,119,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,139,059 UART: [ldev] --
17,144,656 UART: [fwproc] Waiting for Commands...
17,147,625 UART: [fwproc] Received command 0x46574c44
17,149,813 UART: [fwproc] Received Image of size 114036 bytes
21,208,546 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,280,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,349,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,666,182 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,133,582 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,761,363 >>> mbox cmd response: failed
15,761,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,263 >>> mbox cmd response: failed
15,762,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,829 >>> mbox cmd response: failed
Initializing fuses
2,061,235 writing to cptra_bootfsm_go
8,232,589 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,174,689 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,231 UART:
192,588 UART: Running Caliptra ROM ...
193,807 UART:
193,963 UART: [state] CFI Enabled
259,326 UART: [state] LifecycleState = Unprovisioned
261,236 UART: [state] DebugLocked = No
264,134 UART: [state] WD Timer not started. Device not locked for debugging
268,234 UART: [kat] SHA2-256
447,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,897 UART: [kat] ++
459,435 UART: [kat] sha1
471,616 UART: [kat] SHA2-256
474,665 UART: [kat] SHA2-384
481,642 UART: [kat] SHA2-512-ACC
484,590 UART: [kat] ECC-384
2,945,875 UART: [kat] HMAC-384Kdf
2,967,082 UART: [kat] LMS
3,496,542 UART: [kat] --
3,501,751 UART: [cold-reset] ++
3,503,353 UART: [fht] FHT @ 0x50003400
3,514,942 UART: [idev] ++
3,515,508 UART: [idev] CDI.KEYID = 6
3,516,420 UART: [idev] SUBJECT.KEYID = 7
3,517,635 UART: [idev] UDS.KEYID = 0
3,520,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,716 UART: [idev] Erasing UDS.KEYID = 0
6,021,649 UART: [idev] Sha1 KeyId Algorithm
6,045,908 UART: [idev] --
6,048,717 UART: [ldev] ++
6,049,311 UART: [ldev] CDI.KEYID = 6
6,050,227 UART: [ldev] SUBJECT.KEYID = 5
6,051,392 UART: [ldev] AUTHORITY.KEYID = 7
6,052,628 UART: [ldev] FE.KEYID = 1
6,096,123 UART: [ldev] Erasing FE.KEYID = 1
8,600,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,496 UART: [ldev] --
10,409,390 UART: [fwproc] Wait for Commands...
10,412,513 UART: [fwproc] Recv command 0x46574c44
10,414,609 UART: [fwproc] Recv'd Img size: 114360 bytes
12,468,809 UART: ROM Fatal Error: 0x000B0017
12,471,927 >>> mbox cmd response: failed
12,472,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,686 >>> mbox cmd response: failed
12,472,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,473,249 >>> mbox cmd response: failed
Initializing fuses
2,052,602 writing to cptra_bootfsm_go
2,241,926 UART:
2,242,267 UART: Running Caliptra ROM ...
2,243,406 UART:
2,243,581 UART: [state] CFI Enabled
2,311,103 UART: [state] LifecycleState = Unprovisioned
2,312,981 UART: [state] DebugLocked = No
2,315,297 UART: [state] WD Timer not started. Device not locked for debugging
2,319,854 UART: [kat] SHA2-256
2,499,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,563 UART: [kat] ++
2,511,113 UART: [kat] sha1
2,522,495 UART: [kat] SHA2-256
2,525,518 UART: [kat] SHA2-384
2,531,772 UART: [kat] SHA2-512-ACC
2,534,714 UART: [kat] ECC-384
4,993,304 UART: [kat] HMAC-384Kdf
5,018,181 UART: [kat] LMS
5,547,607 UART: [kat] --
5,550,741 UART: [cold-reset] ++
5,552,891 UART: [fht] FHT @ 0x50003400
5,564,251 UART: [idev] ++
5,564,821 UART: [idev] CDI.KEYID = 6
5,565,842 UART: [idev] SUBJECT.KEYID = 7
5,566,947 UART: [idev] UDS.KEYID = 0
5,569,179 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,713,536 UART: [idev] Erasing UDS.KEYID = 0
8,072,261 UART: [idev] Sha1 KeyId Algorithm
8,096,304 UART: [idev] --
8,100,304 UART: [ldev] ++
8,100,881 UART: [ldev] CDI.KEYID = 6
8,101,794 UART: [ldev] SUBJECT.KEYID = 5
8,102,955 UART: [ldev] AUTHORITY.KEYID = 7
8,104,247 UART: [ldev] FE.KEYID = 1
8,147,577 UART: [ldev] Erasing FE.KEYID = 1
10,652,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,202 UART: [ldev] --
12,461,003 UART: [fwproc] Wait for Commands...
12,464,142 UART: [fwproc] Recv command 0x46574c44
12,466,207 UART: [fwproc] Recv'd Img size: 114360 bytes
15,868,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,329,789 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,138 UART:
192,497 UART: Running Caliptra ROM ...
193,697 UART:
193,849 UART: [state] CFI Enabled
263,611 UART: [state] LifecycleState = Unprovisioned
266,006 UART: [state] DebugLocked = No
268,315 UART: [state] WD Timer not started. Device not locked for debugging
273,069 UART: [kat] SHA2-256
462,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,742 UART: [kat] ++
474,189 UART: [kat] sha1
486,040 UART: [kat] SHA2-256
489,056 UART: [kat] SHA2-384
495,902 UART: [kat] SHA2-512-ACC
498,501 UART: [kat] ECC-384
2,947,039 UART: [kat] HMAC-384Kdf
2,970,623 UART: [kat] LMS
3,502,432 UART: [kat] --
3,506,867 UART: [cold-reset] ++
3,508,589 UART: [fht] FHT @ 0x50003400
3,518,871 UART: [idev] ++
3,519,549 UART: [idev] CDI.KEYID = 6
3,520,531 UART: [idev] SUBJECT.KEYID = 7
3,521,632 UART: [idev] UDS.KEYID = 0
3,524,279 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,307 UART: [idev] Erasing UDS.KEYID = 0
6,032,879 UART: [idev] Sha1 KeyId Algorithm
6,054,938 UART: [idev] --
6,059,589 UART: [ldev] ++
6,060,268 UART: [ldev] CDI.KEYID = 6
6,061,149 UART: [ldev] SUBJECT.KEYID = 5
6,062,384 UART: [ldev] AUTHORITY.KEYID = 7
6,063,623 UART: [ldev] FE.KEYID = 1
6,099,137 UART: [ldev] Erasing FE.KEYID = 1
8,607,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,417 UART: [ldev] --
10,411,473 UART: [fwproc] Wait for Commands...
10,414,163 UART: [fwproc] Recv command 0x46574c44
10,416,462 UART: [fwproc] Recv'd Img size: 114360 bytes
12,495,198 UART: ROM Fatal Error: 0x000B0017
12,498,842 >>> mbox cmd response: failed
12,499,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,499,497 >>> mbox cmd response: failed
12,499,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,076 >>> mbox cmd response: failed
Initializing fuses
2,061,536 writing to cptra_bootfsm_go
2,250,835 UART:
2,251,178 UART: Running Caliptra ROM ...
2,252,223 UART:
2,252,376 UART: [state] CFI Enabled
2,313,527 UART: [state] LifecycleState = Unprovisioned
2,315,896 UART: [state] DebugLocked = No
2,318,828 UART: [state] WD Timer not started. Device not locked for debugging
2,323,241 UART: [kat] SHA2-256
2,513,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,855 UART: [kat] ++
2,524,332 UART: [kat] sha1
2,535,811 UART: [kat] SHA2-256
2,538,832 UART: [kat] SHA2-384
2,545,254 UART: [kat] SHA2-512-ACC
2,547,827 UART: [kat] ECC-384
4,995,751 UART: [kat] HMAC-384Kdf
5,018,769 UART: [kat] LMS
5,550,565 UART: [kat] --
5,554,124 UART: [cold-reset] ++
5,555,840 UART: [fht] FHT @ 0x50003400
5,567,471 UART: [idev] ++
5,568,150 UART: [idev] CDI.KEYID = 6
5,569,087 UART: [idev] SUBJECT.KEYID = 7
5,570,304 UART: [idev] UDS.KEYID = 0
5,572,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,716,528 UART: [idev] Erasing UDS.KEYID = 0
8,074,816 UART: [idev] Sha1 KeyId Algorithm
8,097,648 UART: [idev] --
8,102,295 UART: [ldev] ++
8,102,979 UART: [ldev] CDI.KEYID = 6
8,103,918 UART: [ldev] SUBJECT.KEYID = 5
8,105,075 UART: [ldev] AUTHORITY.KEYID = 7
8,106,315 UART: [ldev] FE.KEYID = 1
8,147,070 UART: [ldev] Erasing FE.KEYID = 1
10,654,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,758 UART: [ldev] --
12,461,612 UART: [fwproc] Wait for Commands...
12,464,799 UART: [fwproc] Recv command 0x46574c44
12,467,133 UART: [fwproc] Recv'd Img size: 114360 bytes
15,909,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,642,505 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,442,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,305,058 >>> mbox cmd response: failed
12,305,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,933 >>> mbox cmd response: failed
12,306,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,306,516 >>> mbox cmd response: failed
Initializing fuses
2,055,067 writing to cptra_bootfsm_go
5,489,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,791,581 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,295 writing to cptra_bootfsm_go
193,575 UART:
193,925 UART: Running Caliptra ROM ...
195,041 UART:
604,589 UART: [state] CFI Enabled
617,319 UART: [state] LifecycleState = Unprovisioned
619,693 UART: [state] DebugLocked = No
621,447 UART: [state] WD Timer not started. Device not locked for debugging
625,165 UART: [kat] SHA2-256
814,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,662 UART: [kat] ++
826,174 UART: [kat] sha1
835,970 UART: [kat] SHA2-256
838,983 UART: [kat] SHA2-384
844,116 UART: [kat] SHA2-512-ACC
846,723 UART: [kat] ECC-384
3,290,610 UART: [kat] HMAC-384Kdf
3,304,461 UART: [kat] LMS
3,836,277 UART: [kat] --
3,841,663 UART: [cold-reset] ++
3,843,516 UART: [fht] FHT @ 0x50003400
3,854,719 UART: [idev] ++
3,855,404 UART: [idev] CDI.KEYID = 6
3,856,316 UART: [idev] SUBJECT.KEYID = 7
3,857,531 UART: [idev] UDS.KEYID = 0
3,860,221 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,057 UART: [idev] Erasing UDS.KEYID = 0
6,338,988 UART: [idev] Sha1 KeyId Algorithm
6,361,261 UART: [idev] --
6,365,522 UART: [ldev] ++
6,366,229 UART: [ldev] CDI.KEYID = 6
6,367,142 UART: [ldev] SUBJECT.KEYID = 5
6,368,303 UART: [ldev] AUTHORITY.KEYID = 7
6,369,533 UART: [ldev] FE.KEYID = 1
6,381,259 UART: [ldev] Erasing FE.KEYID = 1
8,858,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,724 UART: [ldev] --
10,650,925 UART: [fwproc] Wait for Commands...
10,653,894 UART: [fwproc] Recv command 0x46574c44
10,656,205 UART: [fwproc] Recv'd Img size: 114360 bytes
12,743,649 UART: ROM Fatal Error: 0x000B0017
12,747,313 >>> mbox cmd response: failed
12,747,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,082 >>> mbox cmd response: failed
12,748,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,645 >>> mbox cmd response: failed
Initializing fuses
2,061,882 writing to cptra_bootfsm_go
2,251,201 UART:
2,251,545 UART: Running Caliptra ROM ...
2,252,679 UART:
7,701,585 UART: [state] CFI Enabled
7,717,129 UART: [state] LifecycleState = Unprovisioned
7,719,484 UART: [state] DebugLocked = No
7,722,166 UART: [state] WD Timer not started. Device not locked for debugging
7,727,481 UART: [kat] SHA2-256
7,917,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,928,120 UART: [kat] ++
7,928,668 UART: [kat] sha1
7,940,263 UART: [kat] SHA2-256
7,943,240 UART: [kat] SHA2-384
7,948,528 UART: [kat] SHA2-512-ACC
7,951,095 UART: [kat] ECC-384
10,393,415 UART: [kat] HMAC-384Kdf
10,405,265 UART: [kat] LMS
10,937,095 UART: [kat] --
10,942,282 UART: [cold-reset] ++
10,944,657 UART: [fht] FHT @ 0x50003400
10,957,631 UART: [idev] ++
10,958,305 UART: [idev] CDI.KEYID = 6
10,959,323 UART: [idev] SUBJECT.KEYID = 7
10,960,488 UART: [idev] UDS.KEYID = 0
10,962,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,106,531 UART: [idev] Erasing UDS.KEYID = 0
13,440,926 UART: [idev] Sha1 KeyId Algorithm
13,463,293 UART: [idev] --
13,467,067 UART: [ldev] ++
13,467,751 UART: [ldev] CDI.KEYID = 6
13,468,661 UART: [ldev] SUBJECT.KEYID = 5
13,469,875 UART: [ldev] AUTHORITY.KEYID = 7
13,471,050 UART: [ldev] FE.KEYID = 1
13,481,752 UART: [ldev] Erasing FE.KEYID = 1
15,958,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,677,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,692,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,708,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,723,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,744,160 UART: [ldev] --
17,749,401 UART: [fwproc] Wait for Commands...
17,751,935 UART: [fwproc] Recv command 0x46574c44
17,754,192 UART: [fwproc] Recv'd Img size: 114360 bytes
21,200,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,278,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,394,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,936,759 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,749,388 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,509,498 >>> mbox cmd response: failed
12,510,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,374 >>> mbox cmd response: failed
12,510,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,996 >>> mbox cmd response: failed
Initializing fuses
2,060,390 writing to cptra_bootfsm_go
11,107,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,305,017 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
86,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,675 UART: [kat] SHA2-256
881,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,721 UART: [kat] ++
885,873 UART: [kat] sha1
889,995 UART: [kat] SHA2-256
891,933 UART: [kat] SHA2-384
894,756 UART: [kat] SHA2-512-ACC
896,657 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,724 UART: [kat] LMS
1,474,920 UART: [kat] --
1,475,695 UART: [cold-reset] ++
1,476,197 UART: [fht] Storing FHT @ 0x50003400
1,479,162 UART: [idev] ++
1,479,330 UART: [idev] CDI.KEYID = 6
1,479,690 UART: [idev] SUBJECT.KEYID = 7
1,480,114 UART: [idev] UDS.KEYID = 0
1,480,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,106 UART: [idev] Erasing UDS.KEYID = 0
1,504,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,602 UART: [idev] --
1,513,779 UART: [ldev] ++
1,513,947 UART: [ldev] CDI.KEYID = 6
1,514,310 UART: [ldev] SUBJECT.KEYID = 5
1,514,736 UART: [ldev] AUTHORITY.KEYID = 7
1,515,199 UART: [ldev] FE.KEYID = 1
1,520,505 UART: [ldev] Erasing FE.KEYID = 1
1,546,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,992 UART: [ldev] --
1,585,499 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 114360 bytes
1,634,436 UART: ROM Fatal Error: 0x000B0017
1,635,593 >>> mbox cmd response: failed
1,635,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,599 >>> mbox cmd response: failed
1,635,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
894,980 UART: [kat] SHA2-512-ACC
896,881 UART: [kat] ECC-384
902,124 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,475,527 UART: [cold-reset] ++
1,475,877 UART: [fht] Storing FHT @ 0x50003400
1,478,652 UART: [idev] ++
1,478,820 UART: [idev] CDI.KEYID = 6
1,479,180 UART: [idev] SUBJECT.KEYID = 7
1,479,604 UART: [idev] UDS.KEYID = 0
1,479,949 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,576 UART: [idev] Erasing UDS.KEYID = 0
1,504,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,894 UART: [idev] --
1,514,067 UART: [ldev] ++
1,514,235 UART: [ldev] CDI.KEYID = 6
1,514,598 UART: [ldev] SUBJECT.KEYID = 5
1,515,024 UART: [ldev] AUTHORITY.KEYID = 7
1,515,487 UART: [ldev] FE.KEYID = 1
1,520,407 UART: [ldev] Erasing FE.KEYID = 1
1,545,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,536 UART: [ldev] --
1,584,943 UART: [fwproc] Waiting for Commands...
1,585,748 UART: [fwproc] Received command 0x46574c44
1,586,539 UART: [fwproc] Received Image of size 114360 bytes
2,883,911 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,378 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,576 >>> mbox cmd response: failed
1,489,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,582 >>> mbox cmd response: failed
1,489,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,277 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,672 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,907 UART: [kat] HMAC-384Kdf
907,523 UART: [kat] LMS
1,475,719 UART: [kat] --
1,476,672 UART: [cold-reset] ++
1,477,058 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,505,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,417 UART: [idev] --
1,515,460 UART: [ldev] ++
1,515,628 UART: [ldev] CDI.KEYID = 6
1,515,991 UART: [ldev] SUBJECT.KEYID = 5
1,516,417 UART: [ldev] AUTHORITY.KEYID = 7
1,516,880 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,311 UART: [ldev] --
1,586,710 UART: [fwproc] Waiting for Commands...
1,587,483 UART: [fwproc] Received command 0x46574c44
1,588,274 UART: [fwproc] Received Image of size 114360 bytes
1,634,585 UART: ROM Fatal Error: 0x000B0017
1,635,742 >>> mbox cmd response: failed
1,635,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,748 >>> mbox cmd response: failed
1,635,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,715 UART: [kat] LMS
1,475,911 UART: [kat] --
1,476,798 UART: [cold-reset] ++
1,477,142 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,053 UART: [idev] Erasing UDS.KEYID = 0
1,505,851 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,503 UART: [idev] --
1,515,388 UART: [ldev] ++
1,515,556 UART: [ldev] CDI.KEYID = 6
1,515,919 UART: [ldev] SUBJECT.KEYID = 5
1,516,345 UART: [ldev] AUTHORITY.KEYID = 7
1,516,808 UART: [ldev] FE.KEYID = 1
1,521,890 UART: [ldev] Erasing FE.KEYID = 1
1,547,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,957 UART: [ldev] --
1,587,402 UART: [fwproc] Waiting for Commands...
1,588,059 UART: [fwproc] Received command 0x46574c44
1,588,850 UART: [fwproc] Received Image of size 114360 bytes
2,886,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,563 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,490,191 >>> mbox cmd response: failed
1,490,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,197 >>> mbox cmd response: failed
1,490,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,407 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,022 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,499 UART: [fht] FHT @ 0x50003400
1,175,304 UART: [idev] ++
1,175,472 UART: [idev] CDI.KEYID = 6
1,175,832 UART: [idev] SUBJECT.KEYID = 7
1,176,256 UART: [idev] UDS.KEYID = 0
1,176,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,174 UART: [idev] Erasing UDS.KEYID = 0
1,201,799 UART: [idev] Sha1 KeyId Algorithm
1,210,241 UART: [idev] --
1,211,443 UART: [ldev] ++
1,211,611 UART: [ldev] CDI.KEYID = 6
1,211,974 UART: [ldev] SUBJECT.KEYID = 5
1,212,400 UART: [ldev] AUTHORITY.KEYID = 7
1,212,863 UART: [ldev] FE.KEYID = 1
1,217,889 UART: [ldev] Erasing FE.KEYID = 1
1,243,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,564 UART: [fwproc] Wait for Commands...
1,283,228 UART: [fwproc] Recv command 0x46574c44
1,283,956 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,693 UART: ROM Fatal Error: 0x000B0017
1,332,850 >>> mbox cmd response: failed
1,332,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,856 >>> mbox cmd response: failed
1,332,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,636 UART: [state] LifecycleState = Unprovisioned
86,291 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
893,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,843 UART: [kat] ++
897,995 UART: [kat] sha1
902,213 UART: [kat] SHA2-256
904,153 UART: [kat] SHA2-384
906,824 UART: [kat] SHA2-512-ACC
908,725 UART: [kat] ECC-384
918,284 UART: [kat] HMAC-384Kdf
922,812 UART: [kat] LMS
1,171,140 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,175,064 UART: [idev] ++
1,175,232 UART: [idev] CDI.KEYID = 6
1,175,592 UART: [idev] SUBJECT.KEYID = 7
1,176,016 UART: [idev] UDS.KEYID = 0
1,176,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,088 UART: [idev] Erasing UDS.KEYID = 0
1,201,471 UART: [idev] Sha1 KeyId Algorithm
1,210,093 UART: [idev] --
1,211,103 UART: [ldev] ++
1,211,271 UART: [ldev] CDI.KEYID = 6
1,211,634 UART: [ldev] SUBJECT.KEYID = 5
1,212,060 UART: [ldev] AUTHORITY.KEYID = 7
1,212,523 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,587 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,468 UART: [fwproc] Recv command 0x46574c44
1,284,196 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,239 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,189,205 >>> mbox cmd response: failed
1,189,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,211 >>> mbox cmd response: failed
1,189,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,652 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,338 UART: [kat] SHA2-256
904,278 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
922,997 UART: [kat] LMS
1,171,325 UART: [kat] --
1,172,396 UART: [cold-reset] ++
1,172,842 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,273 UART: [idev] Erasing UDS.KEYID = 0
1,201,066 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,834 UART: [ldev] ++
1,211,002 UART: [ldev] CDI.KEYID = 6
1,211,365 UART: [ldev] SUBJECT.KEYID = 5
1,211,791 UART: [ldev] AUTHORITY.KEYID = 7
1,212,254 UART: [ldev] FE.KEYID = 1
1,217,486 UART: [ldev] Erasing FE.KEYID = 1
1,243,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,968 UART: [ldev] --
1,283,479 UART: [fwproc] Wait for Commands...
1,284,155 UART: [fwproc] Recv command 0x46574c44
1,284,883 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,788 UART: ROM Fatal Error: 0x000B0017
1,332,945 >>> mbox cmd response: failed
1,332,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,951 >>> mbox cmd response: failed
1,332,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,334 UART: [kat] SHA2-256
904,274 UART: [kat] SHA2-384
907,141 UART: [kat] SHA2-512-ACC
909,042 UART: [kat] ECC-384
918,791 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,696 UART: [cold-reset] ++
1,173,248 UART: [fht] FHT @ 0x50003400
1,175,891 UART: [idev] ++
1,176,059 UART: [idev] CDI.KEYID = 6
1,176,419 UART: [idev] SUBJECT.KEYID = 7
1,176,843 UART: [idev] UDS.KEYID = 0
1,177,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,986 UART: [idev] Sha1 KeyId Algorithm
1,210,574 UART: [idev] --
1,211,434 UART: [ldev] ++
1,211,602 UART: [ldev] CDI.KEYID = 6
1,211,965 UART: [ldev] SUBJECT.KEYID = 5
1,212,391 UART: [ldev] AUTHORITY.KEYID = 7
1,212,854 UART: [ldev] FE.KEYID = 1
1,218,104 UART: [ldev] Erasing FE.KEYID = 1
1,244,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,982 UART: [ldev] --
1,284,261 UART: [fwproc] Wait for Commands...
1,284,837 UART: [fwproc] Recv command 0x46574c44
1,285,565 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,512 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,186,896 >>> mbox cmd response: failed
1,186,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,902 >>> mbox cmd response: failed
1,186,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,968 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,095 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,174,339 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,581 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,574 UART: [ldev] ++
1,209,742 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,533 UART: [ldev] AUTHORITY.KEYID = 7
1,210,996 UART: [ldev] FE.KEYID = 1
1,216,042 UART: [ldev] Erasing FE.KEYID = 1
1,242,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,164 UART: ROM Fatal Error: 0x000B0017
1,331,321 >>> mbox cmd response: failed
1,331,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,327 >>> mbox cmd response: failed
1,331,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,849 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,174,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,399 UART: [idev] --
1,209,396 UART: [ldev] ++
1,209,564 UART: [ldev] CDI.KEYID = 6
1,209,928 UART: [ldev] SUBJECT.KEYID = 5
1,210,355 UART: [ldev] AUTHORITY.KEYID = 7
1,210,818 UART: [ldev] FE.KEYID = 1
1,216,024 UART: [ldev] Erasing FE.KEYID = 1
1,242,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,722 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,769 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,165 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,278 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,344 >>> mbox cmd response: failed
1,184,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,350 >>> mbox cmd response: failed
1,184,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,283 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,333 UART: [kat] LMS
1,169,645 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,656 UART: [idev] ++
1,173,824 UART: [idev] CDI.KEYID = 6
1,174,185 UART: [idev] SUBJECT.KEYID = 7
1,174,610 UART: [idev] UDS.KEYID = 0
1,174,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,972 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,847 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,395 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,569 UART: ROM Fatal Error: 0x000B0017
1,331,726 >>> mbox cmd response: failed
1,331,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,732 >>> mbox cmd response: failed
1,331,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
905,101 UART: [kat] SHA2-512-ACC
907,002 UART: [kat] ECC-384
916,949 UART: [kat] HMAC-384Kdf
921,767 UART: [kat] LMS
1,170,079 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,128 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,310 UART: [fwproc] Recv command 0x46574c44
1,283,043 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,984 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,415 >>> mbox cmd response: failed
1,182,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,421 >>> mbox cmd response: failed
1,182,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,068 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,189 UART:
192,555 UART: Running Caliptra ROM ...
193,753 UART:
193,906 UART: [state] CFI Enabled
263,950 UART: [state] LifecycleState = Unprovisioned
265,911 UART: [state] DebugLocked = No
268,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,939 UART: [kat] SHA2-256
442,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,135 UART: [kat] ++
453,584 UART: [kat] sha1
465,922 UART: [kat] SHA2-256
468,606 UART: [kat] SHA2-384
475,285 UART: [kat] SHA2-512-ACC
477,630 UART: [kat] ECC-384
2,766,312 UART: [kat] HMAC-384Kdf
2,778,453 UART: [kat] LMS
3,968,761 UART: [kat] --
3,973,140 UART: [cold-reset] ++
3,975,024 UART: [fht] Storing FHT @ 0x50003400
3,985,760 UART: [idev] ++
3,986,331 UART: [idev] CDI.KEYID = 6
3,987,303 UART: [idev] SUBJECT.KEYID = 7
3,988,518 UART: [idev] UDS.KEYID = 0
3,991,040 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,124 UART: [idev] Erasing UDS.KEYID = 0
7,326,045 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,478 UART: [idev] --
7,351,308 UART: [ldev] ++
7,351,880 UART: [ldev] CDI.KEYID = 6
7,352,848 UART: [ldev] SUBJECT.KEYID = 5
7,354,064 UART: [ldev] AUTHORITY.KEYID = 7
7,355,302 UART: [ldev] FE.KEYID = 1
7,401,958 UART: [ldev] Erasing FE.KEYID = 1
10,736,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,387 UART: [ldev] --
13,116,509 UART: [fwproc] Waiting for Commands...
13,118,718 UART: [fwproc] Received command 0x46574c44
13,120,917 UART: [fwproc] Received Image of size 114036 bytes
15,824,470 UART: ROM Fatal Error: 0x000B003B
15,827,917 >>> mbox cmd response: failed
15,828,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,562 >>> mbox cmd response: failed
15,828,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,829,248 >>> mbox cmd response: failed
Initializing fuses
2,062,940 writing to cptra_bootfsm_go
2,252,256 UART:
2,252,614 UART: Running Caliptra ROM ...
2,253,756 UART:
2,253,950 UART: [state] CFI Enabled
2,323,548 UART: [state] LifecycleState = Unprovisioned
2,325,487 UART: [state] DebugLocked = No
2,327,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,581 UART: [kat] SHA2-256
2,501,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,035 UART: [kat] ++
2,512,529 UART: [kat] sha1
2,523,150 UART: [kat] SHA2-256
2,525,801 UART: [kat] SHA2-384
2,532,066 UART: [kat] SHA2-512-ACC
2,534,430 UART: [kat] ECC-384
4,826,657 UART: [kat] HMAC-384Kdf
4,838,342 UART: [kat] LMS
6,028,646 UART: [kat] --
6,033,187 UART: [cold-reset] ++
6,035,720 UART: [fht] Storing FHT @ 0x50003400
6,047,288 UART: [idev] ++
6,047,858 UART: [idev] CDI.KEYID = 6
6,048,881 UART: [idev] SUBJECT.KEYID = 7
6,050,048 UART: [idev] UDS.KEYID = 0
6,052,391 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,195,911 UART: [idev] Erasing UDS.KEYID = 0
9,390,164 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,225 UART: [idev] --
9,415,798 UART: [ldev] ++
9,416,371 UART: [ldev] CDI.KEYID = 6
9,417,343 UART: [ldev] SUBJECT.KEYID = 5
9,418,607 UART: [ldev] AUTHORITY.KEYID = 7
9,419,849 UART: [ldev] FE.KEYID = 1
9,466,335 UART: [ldev] Erasing FE.KEYID = 1
12,798,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,329 UART: [ldev] --
15,159,878 UART: [fwproc] Waiting for Commands...
15,162,263 UART: [fwproc] Received command 0x46574c44
15,164,450 UART: [fwproc] Received Image of size 114036 bytes
19,216,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,294,920 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,363,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,681,213 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,807,346 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,542,590 >>> mbox cmd response: failed
15,543,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,543,501 >>> mbox cmd response: failed
15,543,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,544,068 >>> mbox cmd response: failed
Initializing fuses
2,069,150 writing to cptra_bootfsm_go
5,858,366 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,931,013 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,675 writing to cptra_bootfsm_go
193,932 UART:
194,288 UART: Running Caliptra ROM ...
195,382 UART:
605,217 UART: [state] CFI Enabled
619,897 UART: [state] LifecycleState = Unprovisioned
621,836 UART: [state] DebugLocked = No
623,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,147 UART: [kat] SHA2-256
798,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,401 UART: [kat] ++
809,997 UART: [kat] sha1
821,854 UART: [kat] SHA2-256
824,594 UART: [kat] SHA2-384
831,217 UART: [kat] SHA2-512-ACC
833,565 UART: [kat] ECC-384
3,116,274 UART: [kat] HMAC-384Kdf
3,127,806 UART: [kat] LMS
4,317,914 UART: [kat] --
4,321,165 UART: [cold-reset] ++
4,323,669 UART: [fht] Storing FHT @ 0x50003400
4,335,051 UART: [idev] ++
4,335,632 UART: [idev] CDI.KEYID = 6
4,336,650 UART: [idev] SUBJECT.KEYID = 7
4,337,809 UART: [idev] UDS.KEYID = 0
4,340,374 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,787 UART: [idev] Erasing UDS.KEYID = 0
7,621,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,605 UART: [idev] --
7,648,516 UART: [ldev] ++
7,649,085 UART: [ldev] CDI.KEYID = 6
7,650,026 UART: [ldev] SUBJECT.KEYID = 5
7,651,297 UART: [ldev] AUTHORITY.KEYID = 7
7,652,446 UART: [ldev] FE.KEYID = 1
7,664,218 UART: [ldev] Erasing FE.KEYID = 1
10,952,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,506 UART: [ldev] --
13,309,605 UART: [fwproc] Waiting for Commands...
13,311,868 UART: [fwproc] Received command 0x46574c44
13,314,054 UART: [fwproc] Received Image of size 114036 bytes
16,018,935 UART: ROM Fatal Error: 0x000B003B
16,022,408 >>> mbox cmd response: failed
16,022,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,072 >>> mbox cmd response: failed
16,023,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,758 >>> mbox cmd response: failed
Initializing fuses
2,055,011 writing to cptra_bootfsm_go
2,244,367 UART:
2,244,713 UART: Running Caliptra ROM ...
2,245,847 UART:
4,435,470 UART: [state] CFI Enabled
4,451,151 UART: [state] LifecycleState = Unprovisioned
4,453,113 UART: [state] DebugLocked = No
4,454,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,459,927 UART: [kat] SHA2-256
4,629,664 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,640,238 UART: [kat] ++
4,640,777 UART: [kat] sha1
4,650,696 UART: [kat] SHA2-256
4,653,364 UART: [kat] SHA2-384
4,659,627 UART: [kat] SHA2-512-ACC
4,661,978 UART: [kat] ECC-384
6,947,272 UART: [kat] HMAC-384Kdf
6,959,606 UART: [kat] LMS
8,149,691 UART: [kat] --
8,153,596 UART: [cold-reset] ++
8,155,103 UART: [fht] Storing FHT @ 0x50003400
8,167,073 UART: [idev] ++
8,167,640 UART: [idev] CDI.KEYID = 6
8,168,573 UART: [idev] SUBJECT.KEYID = 7
8,169,841 UART: [idev] UDS.KEYID = 0
8,172,129 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,315,483 UART: [idev] Erasing UDS.KEYID = 0
11,452,336 UART: [idev] Using Sha1 for KeyId Algorithm
11,473,934 UART: [idev] --
11,478,328 UART: [ldev] ++
11,478,901 UART: [ldev] CDI.KEYID = 6
11,479,922 UART: [ldev] SUBJECT.KEYID = 5
11,481,111 UART: [ldev] AUTHORITY.KEYID = 7
11,482,349 UART: [ldev] FE.KEYID = 1
11,491,428 UART: [ldev] Erasing FE.KEYID = 1
14,777,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,070,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,085,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,099,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,114,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,132,922 UART: [ldev] --
17,137,482 UART: [fwproc] Waiting for Commands...
17,140,713 UART: [fwproc] Received command 0x46574c44
17,142,897 UART: [fwproc] Received Image of size 114036 bytes
21,198,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,276,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,345,608 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,663,451 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
4,127,285 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,764,459 >>> mbox cmd response: failed
15,765,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,898 >>> mbox cmd response: failed
15,766,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,766,417 >>> mbox cmd response: failed
Initializing fuses
2,068,625 writing to cptra_bootfsm_go
8,233,972 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,166,920 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,284 UART:
192,639 UART: Running Caliptra ROM ...
193,857 UART:
194,008 UART: [state] CFI Enabled
262,771 UART: [state] LifecycleState = Unprovisioned
264,682 UART: [state] DebugLocked = No
265,954 UART: [state] WD Timer not started. Device not locked for debugging
269,989 UART: [kat] SHA2-256
449,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,676 UART: [kat] ++
461,130 UART: [kat] sha1
472,699 UART: [kat] SHA2-256
475,767 UART: [kat] SHA2-384
481,484 UART: [kat] SHA2-512-ACC
484,415 UART: [kat] ECC-384
2,946,202 UART: [kat] HMAC-384Kdf
2,970,175 UART: [kat] LMS
3,499,588 UART: [kat] --
3,504,113 UART: [cold-reset] ++
3,505,430 UART: [fht] FHT @ 0x50003400
3,515,341 UART: [idev] ++
3,515,914 UART: [idev] CDI.KEYID = 6
3,516,797 UART: [idev] SUBJECT.KEYID = 7
3,518,010 UART: [idev] UDS.KEYID = 0
3,520,766 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,794 UART: [idev] Erasing UDS.KEYID = 0
6,026,262 UART: [idev] Sha1 KeyId Algorithm
6,049,610 UART: [idev] --
6,053,829 UART: [ldev] ++
6,054,403 UART: [ldev] CDI.KEYID = 6
6,055,315 UART: [ldev] SUBJECT.KEYID = 5
6,056,532 UART: [ldev] AUTHORITY.KEYID = 7
6,057,785 UART: [ldev] FE.KEYID = 1
6,099,008 UART: [ldev] Erasing FE.KEYID = 1
8,601,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,354 UART: [ldev] --
10,411,860 UART: [fwproc] Wait for Commands...
10,414,441 UART: [fwproc] Recv command 0x46574c44
10,416,535 UART: [fwproc] Recv'd Img size: 114360 bytes
12,472,262 UART: ROM Fatal Error: 0x000B003B
12,475,373 >>> mbox cmd response: failed
12,475,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,476,026 >>> mbox cmd response: failed
12,476,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,476,719 >>> mbox cmd response: failed
Initializing fuses
2,053,835 writing to cptra_bootfsm_go
2,243,160 UART:
2,243,498 UART: Running Caliptra ROM ...
2,244,632 UART:
2,244,818 UART: [state] CFI Enabled
2,311,603 UART: [state] LifecycleState = Unprovisioned
2,313,479 UART: [state] DebugLocked = No
2,315,035 UART: [state] WD Timer not started. Device not locked for debugging
2,318,566 UART: [kat] SHA2-256
2,497,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,247 UART: [kat] ++
2,509,791 UART: [kat] sha1
2,520,871 UART: [kat] SHA2-256
2,523,893 UART: [kat] SHA2-384
2,529,836 UART: [kat] SHA2-512-ACC
2,532,785 UART: [kat] ECC-384
4,996,988 UART: [kat] HMAC-384Kdf
5,019,166 UART: [kat] LMS
5,548,622 UART: [kat] --
5,554,450 UART: [cold-reset] ++
5,555,301 UART: [fht] FHT @ 0x50003400
5,566,228 UART: [idev] ++
5,566,801 UART: [idev] CDI.KEYID = 6
5,567,785 UART: [idev] SUBJECT.KEYID = 7
5,568,861 UART: [idev] UDS.KEYID = 0
5,571,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,715,122 UART: [idev] Erasing UDS.KEYID = 0
8,076,751 UART: [idev] Sha1 KeyId Algorithm
8,099,148 UART: [idev] --
8,103,740 UART: [ldev] ++
8,104,315 UART: [ldev] CDI.KEYID = 6
8,105,233 UART: [ldev] SUBJECT.KEYID = 5
8,106,396 UART: [ldev] AUTHORITY.KEYID = 7
8,107,630 UART: [ldev] FE.KEYID = 1
8,149,183 UART: [ldev] Erasing FE.KEYID = 1
10,651,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,390 UART: [ldev] --
12,461,327 UART: [fwproc] Wait for Commands...
12,462,881 UART: [fwproc] Recv command 0x46574c44
12,464,981 UART: [fwproc] Recv'd Img size: 114360 bytes
15,869,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,947,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,015,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,333,629 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,292 UART:
192,652 UART: Running Caliptra ROM ...
193,760 UART:
193,901 UART: [state] CFI Enabled
262,527 UART: [state] LifecycleState = Unprovisioned
264,886 UART: [state] DebugLocked = No
267,853 UART: [state] WD Timer not started. Device not locked for debugging
272,143 UART: [kat] SHA2-256
462,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,770 UART: [kat] ++
473,219 UART: [kat] sha1
485,584 UART: [kat] SHA2-256
488,599 UART: [kat] SHA2-384
495,551 UART: [kat] SHA2-512-ACC
498,112 UART: [kat] ECC-384
2,945,509 UART: [kat] HMAC-384Kdf
2,969,174 UART: [kat] LMS
3,500,950 UART: [kat] --
3,503,711 UART: [cold-reset] ++
3,506,191 UART: [fht] FHT @ 0x50003400
3,518,363 UART: [idev] ++
3,519,102 UART: [idev] CDI.KEYID = 6
3,520,015 UART: [idev] SUBJECT.KEYID = 7
3,521,257 UART: [idev] UDS.KEYID = 0
3,524,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,239 UART: [idev] Erasing UDS.KEYID = 0
6,024,595 UART: [idev] Sha1 KeyId Algorithm
6,047,462 UART: [idev] --
6,051,389 UART: [ldev] ++
6,052,081 UART: [ldev] CDI.KEYID = 6
6,052,998 UART: [ldev] SUBJECT.KEYID = 5
6,054,163 UART: [ldev] AUTHORITY.KEYID = 7
6,055,350 UART: [ldev] FE.KEYID = 1
6,098,187 UART: [ldev] Erasing FE.KEYID = 1
8,601,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,594 UART: [ldev] --
10,409,753 UART: [fwproc] Wait for Commands...
10,411,525 UART: [fwproc] Recv command 0x46574c44
10,413,836 UART: [fwproc] Recv'd Img size: 114360 bytes
12,489,623 UART: ROM Fatal Error: 0x000B003B
12,493,246 >>> mbox cmd response: failed
12,493,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,900 >>> mbox cmd response: failed
12,494,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,494,580 >>> mbox cmd response: failed
Initializing fuses
2,060,320 writing to cptra_bootfsm_go
2,249,621 UART:
2,249,964 UART: Running Caliptra ROM ...
2,251,119 UART:
2,251,283 UART: [state] CFI Enabled
2,311,252 UART: [state] LifecycleState = Unprovisioned
2,313,607 UART: [state] DebugLocked = No
2,316,453 UART: [state] WD Timer not started. Device not locked for debugging
2,320,164 UART: [kat] SHA2-256
2,509,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,520,605 UART: [kat] ++
2,521,059 UART: [kat] sha1
2,532,980 UART: [kat] SHA2-256
2,535,997 UART: [kat] SHA2-384
2,542,481 UART: [kat] SHA2-512-ACC
2,545,052 UART: [kat] ECC-384
4,997,895 UART: [kat] HMAC-384Kdf
5,019,474 UART: [kat] LMS
5,551,197 UART: [kat] --
5,555,826 UART: [cold-reset] ++
5,556,694 UART: [fht] FHT @ 0x50003400
5,567,385 UART: [idev] ++
5,568,059 UART: [idev] CDI.KEYID = 6
5,569,026 UART: [idev] SUBJECT.KEYID = 7
5,570,243 UART: [idev] UDS.KEYID = 0
5,572,360 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,716,294 UART: [idev] Erasing UDS.KEYID = 0
8,074,926 UART: [idev] Sha1 KeyId Algorithm
8,097,993 UART: [idev] --
8,102,993 UART: [ldev] ++
8,103,739 UART: [ldev] CDI.KEYID = 6
8,104,652 UART: [ldev] SUBJECT.KEYID = 5
8,105,811 UART: [ldev] AUTHORITY.KEYID = 7
8,106,984 UART: [ldev] FE.KEYID = 1
8,147,928 UART: [ldev] Erasing FE.KEYID = 1
10,652,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,417,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,297 UART: [ldev] --
12,443,943 UART: [fwproc] Wait for Commands...
12,446,417 UART: [fwproc] Recv command 0x46574c44
12,448,733 UART: [fwproc] Recv'd Img size: 114360 bytes
15,895,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,971,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,087,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,631,141 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,442,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,296,803 >>> mbox cmd response: failed
12,297,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,722 >>> mbox cmd response: failed
12,297,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,282 >>> mbox cmd response: failed
Initializing fuses
2,063,623 writing to cptra_bootfsm_go
5,487,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,794,832 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,448 UART:
192,815 UART: Running Caliptra ROM ...
194,015 UART:
603,529 UART: [state] CFI Enabled
616,794 UART: [state] LifecycleState = Unprovisioned
619,161 UART: [state] DebugLocked = No
621,967 UART: [state] WD Timer not started. Device not locked for debugging
626,699 UART: [kat] SHA2-256
816,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,346 UART: [kat] ++
827,852 UART: [kat] sha1
839,052 UART: [kat] SHA2-256
842,049 UART: [kat] SHA2-384
847,387 UART: [kat] SHA2-512-ACC
849,943 UART: [kat] ECC-384
3,291,095 UART: [kat] HMAC-384Kdf
3,302,950 UART: [kat] LMS
3,834,775 UART: [kat] --
3,839,658 UART: [cold-reset] ++
3,841,431 UART: [fht] FHT @ 0x50003400
3,852,518 UART: [idev] ++
3,853,190 UART: [idev] CDI.KEYID = 6
3,854,159 UART: [idev] SUBJECT.KEYID = 7
3,855,369 UART: [idev] UDS.KEYID = 0
3,858,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,874 UART: [idev] Erasing UDS.KEYID = 0
6,331,625 UART: [idev] Sha1 KeyId Algorithm
6,353,500 UART: [idev] --
6,356,659 UART: [ldev] ++
6,357,343 UART: [ldev] CDI.KEYID = 6
6,358,226 UART: [ldev] SUBJECT.KEYID = 5
6,359,439 UART: [ldev] AUTHORITY.KEYID = 7
6,360,614 UART: [ldev] FE.KEYID = 1
6,373,399 UART: [ldev] Erasing FE.KEYID = 1
8,850,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,225 UART: [ldev] --
10,643,570 UART: [fwproc] Wait for Commands...
10,646,494 UART: [fwproc] Recv command 0x46574c44
10,648,751 UART: [fwproc] Recv'd Img size: 114360 bytes
12,736,133 UART: ROM Fatal Error: 0x000B003B
12,739,801 >>> mbox cmd response: failed
12,740,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,526 >>> mbox cmd response: failed
12,740,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,083 >>> mbox cmd response: failed
Initializing fuses
2,056,241 writing to cptra_bootfsm_go
2,245,569 UART:
2,245,916 UART: Running Caliptra ROM ...
2,247,054 UART:
7,699,667 UART: [state] CFI Enabled
7,713,517 UART: [state] LifecycleState = Unprovisioned
7,715,918 UART: [state] DebugLocked = No
7,718,735 UART: [state] WD Timer not started. Device not locked for debugging
7,723,995 UART: [kat] SHA2-256
7,913,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,924,700 UART: [kat] ++
7,925,218 UART: [kat] sha1
7,936,912 UART: [kat] SHA2-256
7,939,916 UART: [kat] SHA2-384
7,946,996 UART: [kat] SHA2-512-ACC
7,949,616 UART: [kat] ECC-384
10,389,224 UART: [kat] HMAC-384Kdf
10,402,640 UART: [kat] LMS
10,934,509 UART: [kat] --
10,940,229 UART: [cold-reset] ++
10,941,831 UART: [fht] FHT @ 0x50003400
10,952,127 UART: [idev] ++
10,952,802 UART: [idev] CDI.KEYID = 6
10,953,771 UART: [idev] SUBJECT.KEYID = 7
10,954,992 UART: [idev] UDS.KEYID = 0
10,957,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,101,061 UART: [idev] Erasing UDS.KEYID = 0
13,430,707 UART: [idev] Sha1 KeyId Algorithm
13,454,032 UART: [idev] --
13,458,831 UART: [ldev] ++
13,459,520 UART: [ldev] CDI.KEYID = 6
13,460,428 UART: [ldev] SUBJECT.KEYID = 5
13,461,586 UART: [ldev] AUTHORITY.KEYID = 7
13,462,816 UART: [ldev] FE.KEYID = 1
13,475,139 UART: [ldev] Erasing FE.KEYID = 1
15,958,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,681,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,696,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,711,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,726,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,748,422 UART: [ldev] --
17,754,330 UART: [fwproc] Wait for Commands...
17,755,939 UART: [fwproc] Recv command 0x46574c44
17,758,253 UART: [fwproc] Recv'd Img size: 114360 bytes
21,198,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,272,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,388,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,931,931 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,754,998 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,530,084 >>> mbox cmd response: failed
12,530,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,996 >>> mbox cmd response: failed
12,531,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,531,607 >>> mbox cmd response: failed
Initializing fuses
2,055,721 writing to cptra_bootfsm_go
11,086,222 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,274,666 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,629 UART: [kat] SHA2-256
881,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,675 UART: [kat] ++
885,827 UART: [kat] sha1
890,099 UART: [kat] SHA2-256
892,037 UART: [kat] SHA2-384
894,732 UART: [kat] SHA2-512-ACC
896,633 UART: [kat] ECC-384
902,036 UART: [kat] HMAC-384Kdf
906,688 UART: [kat] LMS
1,474,884 UART: [kat] --
1,475,489 UART: [cold-reset] ++
1,475,825 UART: [fht] Storing FHT @ 0x50003400
1,478,592 UART: [idev] ++
1,478,760 UART: [idev] CDI.KEYID = 6
1,479,120 UART: [idev] SUBJECT.KEYID = 7
1,479,544 UART: [idev] UDS.KEYID = 0
1,479,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,404 UART: [idev] Erasing UDS.KEYID = 0
1,504,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,596 UART: [idev] --
1,513,533 UART: [ldev] ++
1,513,701 UART: [ldev] CDI.KEYID = 6
1,514,064 UART: [ldev] SUBJECT.KEYID = 5
1,514,490 UART: [ldev] AUTHORITY.KEYID = 7
1,514,953 UART: [ldev] FE.KEYID = 1
1,520,041 UART: [ldev] Erasing FE.KEYID = 1
1,545,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,530 UART: [ldev] --
1,584,987 UART: [fwproc] Waiting for Commands...
1,585,652 UART: [fwproc] Received command 0x46574c44
1,586,443 UART: [fwproc] Received Image of size 114360 bytes
1,634,342 UART: ROM Fatal Error: 0x000B003B
1,635,501 >>> mbox cmd response: failed
1,635,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,507 >>> mbox cmd response: failed
1,635,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,959 UART: [kat] SHA2-256
881,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,005 UART: [kat] ++
886,157 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
894,898 UART: [kat] SHA2-512-ACC
896,799 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,476,063 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,492 UART: [idev] ++
1,479,660 UART: [idev] CDI.KEYID = 6
1,480,020 UART: [idev] SUBJECT.KEYID = 7
1,480,444 UART: [idev] UDS.KEYID = 0
1,480,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,850 UART: [idev] --
1,514,883 UART: [ldev] ++
1,515,051 UART: [ldev] CDI.KEYID = 6
1,515,414 UART: [ldev] SUBJECT.KEYID = 5
1,515,840 UART: [ldev] AUTHORITY.KEYID = 7
1,516,303 UART: [ldev] FE.KEYID = 1
1,521,405 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,700 UART: [ldev] --
1,585,983 UART: [fwproc] Waiting for Commands...
1,586,704 UART: [fwproc] Received command 0x46574c44
1,587,495 UART: [fwproc] Received Image of size 114360 bytes
2,886,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,983 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,335 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,286 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,386 >>> mbox cmd response: failed
1,488,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,392 >>> mbox cmd response: failed
1,488,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,505 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,912 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,343 UART: [kat] SHA2-512-ACC
897,244 UART: [kat] ECC-384
902,689 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,298 UART: [cold-reset] ++
1,476,734 UART: [fht] Storing FHT @ 0x50003400
1,479,607 UART: [idev] ++
1,479,775 UART: [idev] CDI.KEYID = 6
1,480,135 UART: [idev] SUBJECT.KEYID = 7
1,480,559 UART: [idev] UDS.KEYID = 0
1,480,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,473 UART: [idev] Erasing UDS.KEYID = 0
1,504,879 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,529 UART: [idev] --
1,514,650 UART: [ldev] ++
1,514,818 UART: [ldev] CDI.KEYID = 6
1,515,181 UART: [ldev] SUBJECT.KEYID = 5
1,515,607 UART: [ldev] AUTHORITY.KEYID = 7
1,516,070 UART: [ldev] FE.KEYID = 1
1,521,496 UART: [ldev] Erasing FE.KEYID = 1
1,547,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,307 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,461 UART: [fwproc] Received command 0x46574c44
1,588,252 UART: [fwproc] Received Image of size 114360 bytes
1,635,487 UART: ROM Fatal Error: 0x000B003B
1,636,646 >>> mbox cmd response: failed
1,636,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,652 >>> mbox cmd response: failed
1,636,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,228 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,894 UART: [kat] SHA2-256
881,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,940 UART: [kat] ++
886,092 UART: [kat] sha1
890,106 UART: [kat] SHA2-256
892,044 UART: [kat] SHA2-384
894,665 UART: [kat] SHA2-512-ACC
896,566 UART: [kat] ECC-384
902,361 UART: [kat] HMAC-384Kdf
906,843 UART: [kat] LMS
1,475,039 UART: [kat] --
1,475,790 UART: [cold-reset] ++
1,476,224 UART: [fht] Storing FHT @ 0x50003400
1,479,257 UART: [idev] ++
1,479,425 UART: [idev] CDI.KEYID = 6
1,479,785 UART: [idev] SUBJECT.KEYID = 7
1,480,209 UART: [idev] UDS.KEYID = 0
1,480,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,063 UART: [idev] Erasing UDS.KEYID = 0
1,504,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,541 UART: [idev] --
1,514,442 UART: [ldev] ++
1,514,610 UART: [ldev] CDI.KEYID = 6
1,514,973 UART: [ldev] SUBJECT.KEYID = 5
1,515,399 UART: [ldev] AUTHORITY.KEYID = 7
1,515,862 UART: [ldev] FE.KEYID = 1
1,521,042 UART: [ldev] Erasing FE.KEYID = 1
1,546,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,001 UART: [ldev] --
1,585,388 UART: [fwproc] Waiting for Commands...
1,586,143 UART: [fwproc] Received command 0x46574c44
1,586,934 UART: [fwproc] Received Image of size 114360 bytes
2,886,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,670 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,865 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,454 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,490,165 >>> mbox cmd response: failed
1,490,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,171 >>> mbox cmd response: failed
1,490,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,926 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,773 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
892,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,077 UART: [kat] ++
897,229 UART: [kat] sha1
901,419 UART: [kat] SHA2-256
903,359 UART: [kat] SHA2-384
905,978 UART: [kat] SHA2-512-ACC
907,879 UART: [kat] ECC-384
917,750 UART: [kat] HMAC-384Kdf
922,290 UART: [kat] LMS
1,170,618 UART: [kat] --
1,171,541 UART: [cold-reset] ++
1,171,979 UART: [fht] FHT @ 0x50003400
1,174,520 UART: [idev] ++
1,174,688 UART: [idev] CDI.KEYID = 6
1,175,048 UART: [idev] SUBJECT.KEYID = 7
1,175,472 UART: [idev] UDS.KEYID = 0
1,175,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,391 UART: [idev] Sha1 KeyId Algorithm
1,208,839 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,512 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,037 UART: [ldev] --
1,282,414 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,860 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,463 UART: ROM Fatal Error: 0x000B003B
1,332,622 >>> mbox cmd response: failed
1,332,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,628 >>> mbox cmd response: failed
1,332,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,037 UART: [kat] SHA2-256
903,977 UART: [kat] SHA2-384
906,540 UART: [kat] SHA2-512-ACC
908,441 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,172,083 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,208,893 UART: [idev] --
1,209,935 UART: [ldev] ++
1,210,103 UART: [ldev] CDI.KEYID = 6
1,210,466 UART: [ldev] SUBJECT.KEYID = 5
1,210,892 UART: [ldev] AUTHORITY.KEYID = 7
1,211,355 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,226 UART: [fwproc] Wait for Commands...
1,282,798 UART: [fwproc] Recv command 0x46574c44
1,283,526 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,833 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,245 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,861 >>> mbox cmd response: failed
1,185,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,867 >>> mbox cmd response: failed
1,185,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,712 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
894,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,162 UART: [kat] ++
898,314 UART: [kat] sha1
902,594 UART: [kat] SHA2-256
904,534 UART: [kat] SHA2-384
907,073 UART: [kat] SHA2-512-ACC
908,974 UART: [kat] ECC-384
918,665 UART: [kat] HMAC-384Kdf
923,435 UART: [kat] LMS
1,171,763 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,685 UART: [idev] ++
1,175,853 UART: [idev] CDI.KEYID = 6
1,176,213 UART: [idev] SUBJECT.KEYID = 7
1,176,637 UART: [idev] UDS.KEYID = 0
1,176,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,811 UART: [idev] Erasing UDS.KEYID = 0
1,202,152 UART: [idev] Sha1 KeyId Algorithm
1,210,762 UART: [idev] --
1,211,644 UART: [ldev] ++
1,211,812 UART: [ldev] CDI.KEYID = 6
1,212,175 UART: [ldev] SUBJECT.KEYID = 5
1,212,601 UART: [ldev] AUTHORITY.KEYID = 7
1,213,064 UART: [ldev] FE.KEYID = 1
1,218,114 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,380 UART: [ldev] --
1,283,731 UART: [fwproc] Wait for Commands...
1,284,323 UART: [fwproc] Recv command 0x46574c44
1,285,051 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,136 UART: ROM Fatal Error: 0x000B003B
1,333,295 >>> mbox cmd response: failed
1,333,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,301 >>> mbox cmd response: failed
1,333,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
906,957 UART: [kat] SHA2-512-ACC
908,858 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,744 UART: [cold-reset] ++
1,173,098 UART: [fht] FHT @ 0x50003400
1,175,835 UART: [idev] ++
1,176,003 UART: [idev] CDI.KEYID = 6
1,176,363 UART: [idev] SUBJECT.KEYID = 7
1,176,787 UART: [idev] UDS.KEYID = 0
1,177,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,909 UART: [idev] Erasing UDS.KEYID = 0
1,202,094 UART: [idev] Sha1 KeyId Algorithm
1,210,588 UART: [idev] --
1,211,606 UART: [ldev] ++
1,211,774 UART: [ldev] CDI.KEYID = 6
1,212,137 UART: [ldev] SUBJECT.KEYID = 5
1,212,563 UART: [ldev] AUTHORITY.KEYID = 7
1,213,026 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,470 UART: [ldev] --
1,283,951 UART: [fwproc] Wait for Commands...
1,284,639 UART: [fwproc] Recv command 0x46574c44
1,285,367 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,104 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,189,582 >>> mbox cmd response: failed
1,189,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,588 >>> mbox cmd response: failed
1,189,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,667 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Unprovisioned
86,245 UART: [state] DebugLocked = No
86,911 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,472 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,615 UART: [idev] ++
1,173,783 UART: [idev] CDI.KEYID = 6
1,174,144 UART: [idev] SUBJECT.KEYID = 7
1,174,569 UART: [idev] UDS.KEYID = 0
1,174,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,477 UART: [idev] Erasing UDS.KEYID = 0
1,199,665 UART: [idev] Sha1 KeyId Algorithm
1,208,551 UART: [idev] --
1,209,420 UART: [ldev] ++
1,209,588 UART: [ldev] CDI.KEYID = 6
1,209,952 UART: [ldev] SUBJECT.KEYID = 5
1,210,379 UART: [ldev] AUTHORITY.KEYID = 7
1,210,842 UART: [ldev] FE.KEYID = 1
1,216,178 UART: [ldev] Erasing FE.KEYID = 1
1,242,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,708 UART: [ldev] --
1,282,216 UART: [fwproc] Wait for Commands...
1,282,879 UART: [fwproc] Recv command 0x46574c44
1,283,612 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,686 UART: ROM Fatal Error: 0x000B003B
1,330,845 >>> mbox cmd response: failed
1,330,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,851 >>> mbox cmd response: failed
1,330,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
891,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,517 UART: [fwproc] Recv command 0x46574c44
1,282,250 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,137 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,012 >>> mbox cmd response: failed
1,184,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,018 >>> mbox cmd response: failed
1,184,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,267 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,169,986 UART: [cold-reset] ++
1,170,550 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,174,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,003 UART: ROM Fatal Error: 0x000B003B
1,332,162 >>> mbox cmd response: failed
1,332,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,168 >>> mbox cmd response: failed
1,332,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,462 UART: [idev] ++
1,173,630 UART: [idev] CDI.KEYID = 6
1,173,991 UART: [idev] SUBJECT.KEYID = 7
1,174,416 UART: [idev] UDS.KEYID = 0
1,174,762 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,519 UART: [ldev] ++
1,209,687 UART: [ldev] CDI.KEYID = 6
1,210,051 UART: [ldev] SUBJECT.KEYID = 5
1,210,478 UART: [ldev] AUTHORITY.KEYID = 7
1,210,941 UART: [ldev] FE.KEYID = 1
1,216,359 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,265 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,687 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,604 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,059 >>> mbox cmd response: failed
1,185,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,065 >>> mbox cmd response: failed
1,185,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,227 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,972 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,208 UART:
192,584 UART: Running Caliptra ROM ...
193,707 UART:
193,852 UART: [state] CFI Enabled
264,781 UART: [state] LifecycleState = Manufacturing
266,755 UART: [state] DebugLocked = No
268,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,980 UART: [kat] SHA2-256
442,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,174 UART: [kat] ++
453,645 UART: [kat] sha1
465,119 UART: [kat] SHA2-256
467,808 UART: [kat] SHA2-384
473,298 UART: [kat] SHA2-512-ACC
475,695 UART: [kat] ECC-384
2,766,534 UART: [kat] HMAC-384Kdf
2,800,218 UART: [kat] LMS
3,990,491 UART: [kat] --
3,994,975 UART: [cold-reset] ++
3,996,417 UART: [fht] Storing FHT @ 0x50003400
4,008,276 UART: [idev] ++
4,008,888 UART: [idev] CDI.KEYID = 6
4,009,812 UART: [idev] SUBJECT.KEYID = 7
4,011,057 UART: [idev] UDS.KEYID = 0
4,013,846 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,319 UART: [idev] Erasing UDS.KEYID = 0
7,343,477 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,261 UART: [idev] --
7,369,372 UART: [ldev] ++
7,369,948 UART: [ldev] CDI.KEYID = 6
7,370,916 UART: [ldev] SUBJECT.KEYID = 5
7,372,133 UART: [ldev] AUTHORITY.KEYID = 7
7,373,368 UART: [ldev] FE.KEYID = 1
7,401,628 UART: [ldev] Erasing FE.KEYID = 1
10,734,352 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,775 UART: [ldev] --
13,094,093 UART: [fwproc] Waiting for Commands...
13,095,767 UART: [fwproc] Received command 0x46574c44
13,097,957 UART: [fwproc] Received Image of size 114036 bytes
16,072,144 UART: ROM Fatal Error: 0x000B0025
16,075,543 >>> mbox cmd response: failed
16,075,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,076,206 >>> mbox cmd response: failed
16,076,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,076,767 >>> mbox cmd response: failed
Initializing fuses
2,049,070 writing to cptra_bootfsm_go
2,238,363 UART:
2,238,743 UART: Running Caliptra ROM ...
2,239,790 UART:
2,239,947 UART: [state] CFI Enabled
2,315,315 UART: [state] LifecycleState = Manufacturing
2,317,245 UART: [state] DebugLocked = No
2,319,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,883 UART: [kat] SHA2-256
2,493,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,077 UART: [kat] ++
2,504,537 UART: [kat] sha1
2,514,561 UART: [kat] SHA2-256
2,517,258 UART: [kat] SHA2-384
2,523,572 UART: [kat] SHA2-512-ACC
2,525,931 UART: [kat] ECC-384
4,819,128 UART: [kat] HMAC-384Kdf
4,851,653 UART: [kat] LMS
6,041,928 UART: [kat] --
6,047,081 UART: [cold-reset] ++
6,048,806 UART: [fht] Storing FHT @ 0x50003400
6,059,217 UART: [idev] ++
6,059,837 UART: [idev] CDI.KEYID = 6
6,060,718 UART: [idev] SUBJECT.KEYID = 7
6,061,983 UART: [idev] UDS.KEYID = 0
6,064,580 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,208,151 UART: [idev] Erasing UDS.KEYID = 0
9,397,545 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,599 UART: [idev] --
9,423,510 UART: [ldev] ++
9,424,079 UART: [ldev] CDI.KEYID = 6
9,425,019 UART: [ldev] SUBJECT.KEYID = 5
9,426,304 UART: [ldev] AUTHORITY.KEYID = 7
9,427,407 UART: [ldev] FE.KEYID = 1
9,471,544 UART: [ldev] Erasing FE.KEYID = 1
12,803,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,163 UART: [ldev] --
15,162,883 UART: [fwproc] Waiting for Commands...
15,166,007 UART: [fwproc] Received command 0x46574c44
15,168,195 UART: [fwproc] Received Image of size 114036 bytes
19,257,021 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,332,687 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,401,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,718,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
3,802,303 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,863,526 >>> mbox cmd response: failed
15,864,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,865,206 >>> mbox cmd response: failed
15,865,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,865,776 >>> mbox cmd response: failed
Initializing fuses
2,055,682 writing to cptra_bootfsm_go
5,826,298 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,928,749 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,536 UART:
192,903 UART: Running Caliptra ROM ...
194,089 UART:
603,854 UART: [state] CFI Enabled
616,849 UART: [state] LifecycleState = Manufacturing
618,782 UART: [state] DebugLocked = No
620,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,979 UART: [kat] SHA2-256
794,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,233 UART: [kat] ++
805,754 UART: [kat] sha1
817,710 UART: [kat] SHA2-256
820,405 UART: [kat] SHA2-384
827,028 UART: [kat] SHA2-512-ACC
829,370 UART: [kat] ECC-384
3,114,156 UART: [kat] HMAC-384Kdf
3,125,646 UART: [kat] LMS
4,315,788 UART: [kat] --
4,319,407 UART: [cold-reset] ++
4,321,177 UART: [fht] Storing FHT @ 0x50003400
4,332,663 UART: [idev] ++
4,333,225 UART: [idev] CDI.KEYID = 6
4,334,203 UART: [idev] SUBJECT.KEYID = 7
4,335,420 UART: [idev] UDS.KEYID = 0
4,338,410 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,860 UART: [idev] Erasing UDS.KEYID = 0
7,621,849 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,690 UART: [idev] --
7,648,092 UART: [ldev] ++
7,648,673 UART: [ldev] CDI.KEYID = 6
7,649,692 UART: [ldev] SUBJECT.KEYID = 5
7,650,853 UART: [ldev] AUTHORITY.KEYID = 7
7,652,105 UART: [ldev] FE.KEYID = 1
7,664,163 UART: [ldev] Erasing FE.KEYID = 1
10,951,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,978 UART: [ldev] --
13,310,836 UART: [fwproc] Waiting for Commands...
13,314,075 UART: [fwproc] Received command 0x46574c44
13,316,266 UART: [fwproc] Received Image of size 114036 bytes
16,291,762 UART: ROM Fatal Error: 0x000B0025
16,295,213 >>> mbox cmd response: failed
16,295,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,295,965 >>> mbox cmd response: failed
16,296,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,296,543 >>> mbox cmd response: failed
Initializing fuses
2,047,809 writing to cptra_bootfsm_go
2,237,149 UART:
2,237,491 UART: Running Caliptra ROM ...
2,238,637 UART:
4,175,347 UART: [state] CFI Enabled
4,187,819 UART: [state] LifecycleState = Manufacturing
4,189,734 UART: [state] DebugLocked = No
4,191,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,197,598 UART: [kat] SHA2-256
4,367,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,377,853 UART: [kat] ++
4,378,365 UART: [kat] sha1
4,389,476 UART: [kat] SHA2-256
4,392,224 UART: [kat] SHA2-384
4,398,376 UART: [kat] SHA2-512-ACC
4,400,733 UART: [kat] ECC-384
6,685,667 UART: [kat] HMAC-384Kdf
6,698,440 UART: [kat] LMS
7,888,547 UART: [kat] --
7,894,120 UART: [cold-reset] ++
7,895,676 UART: [fht] Storing FHT @ 0x50003400
7,908,137 UART: [idev] ++
7,908,701 UART: [idev] CDI.KEYID = 6
7,909,730 UART: [idev] SUBJECT.KEYID = 7
7,910,897 UART: [idev] UDS.KEYID = 0
7,913,636 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,056,990 UART: [idev] Erasing UDS.KEYID = 0
11,200,602 UART: [idev] Using Sha1 for KeyId Algorithm
11,223,063 UART: [idev] --
11,227,850 UART: [ldev] ++
11,228,425 UART: [ldev] CDI.KEYID = 6
11,229,392 UART: [ldev] SUBJECT.KEYID = 5
11,230,597 UART: [ldev] AUTHORITY.KEYID = 7
11,231,838 UART: [ldev] FE.KEYID = 1
11,245,188 UART: [ldev] Erasing FE.KEYID = 1
14,530,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,824,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,839,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,854,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,868,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,887,525 UART: [ldev] --
16,893,102 UART: [fwproc] Waiting for Commands...
16,896,406 UART: [fwproc] Received command 0x46574c44
16,898,622 UART: [fwproc] Received Image of size 114036 bytes
20,983,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,058,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,127,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,443,741 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,126,134 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,076,899 >>> mbox cmd response: failed
16,077,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,077,838 >>> mbox cmd response: failed
16,078,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,078,427 >>> mbox cmd response: failed
Initializing fuses
2,045,128 writing to cptra_bootfsm_go
7,921,864 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,910,038 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,016 writing to cptra_bootfsm_go
193,132 UART:
193,493 UART: Running Caliptra ROM ...
194,679 UART:
194,830 UART: [state] CFI Enabled
260,720 UART: [state] LifecycleState = Manufacturing
262,599 UART: [state] DebugLocked = No
263,827 UART: [state] WD Timer not started. Device not locked for debugging
267,331 UART: [kat] SHA2-256
446,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,046 UART: [kat] ++
458,585 UART: [kat] sha1
470,013 UART: [kat] SHA2-256
473,071 UART: [kat] SHA2-384
477,748 UART: [kat] SHA2-512-ACC
480,689 UART: [kat] ECC-384
2,926,512 UART: [kat] HMAC-384Kdf
2,949,607 UART: [kat] LMS
3,479,019 UART: [kat] --
3,482,749 UART: [cold-reset] ++
3,483,657 UART: [fht] FHT @ 0x50003400
3,494,423 UART: [idev] ++
3,494,986 UART: [idev] CDI.KEYID = 6
3,496,001 UART: [idev] SUBJECT.KEYID = 7
3,497,108 UART: [idev] UDS.KEYID = 0
3,499,899 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,644,130 UART: [idev] Erasing UDS.KEYID = 0
6,004,818 UART: [idev] Sha1 KeyId Algorithm
6,027,474 UART: [idev] --
6,031,964 UART: [ldev] ++
6,032,543 UART: [ldev] CDI.KEYID = 6
6,033,430 UART: [ldev] SUBJECT.KEYID = 5
6,034,591 UART: [ldev] AUTHORITY.KEYID = 7
6,035,809 UART: [ldev] FE.KEYID = 1
6,078,295 UART: [ldev] Erasing FE.KEYID = 1
8,581,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,830 UART: [ldev] --
10,390,759 UART: [fwproc] Wait for Commands...
10,392,853 UART: [fwproc] Recv command 0x46574c44
10,394,947 UART: [fwproc] Recv'd Img size: 114360 bytes
12,720,099 UART: ROM Fatal Error: 0x000B0025
12,723,208 >>> mbox cmd response: failed
12,723,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,723,977 >>> mbox cmd response: failed
12,724,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,724,552 >>> mbox cmd response: failed
Initializing fuses
2,053,041 writing to cptra_bootfsm_go
2,242,377 UART:
2,242,723 UART: Running Caliptra ROM ...
2,243,792 UART:
2,243,943 UART: [state] CFI Enabled
2,301,282 UART: [state] LifecycleState = Manufacturing
2,303,131 UART: [state] DebugLocked = No
2,304,868 UART: [state] WD Timer not started. Device not locked for debugging
2,308,070 UART: [kat] SHA2-256
2,487,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,776 UART: [kat] ++
2,499,234 UART: [kat] sha1
2,511,089 UART: [kat] SHA2-256
2,514,111 UART: [kat] SHA2-384
2,521,506 UART: [kat] SHA2-512-ACC
2,524,460 UART: [kat] ECC-384
4,983,538 UART: [kat] HMAC-384Kdf
5,008,626 UART: [kat] LMS
5,538,051 UART: [kat] --
5,541,268 UART: [cold-reset] ++
5,543,092 UART: [fht] FHT @ 0x50003400
5,553,699 UART: [idev] ++
5,554,261 UART: [idev] CDI.KEYID = 6
5,555,172 UART: [idev] SUBJECT.KEYID = 7
5,556,384 UART: [idev] UDS.KEYID = 0
5,558,902 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,703,307 UART: [idev] Erasing UDS.KEYID = 0
8,065,059 UART: [idev] Sha1 KeyId Algorithm
8,088,934 UART: [idev] --
8,093,128 UART: [ldev] ++
8,093,711 UART: [ldev] CDI.KEYID = 6
8,094,630 UART: [ldev] SUBJECT.KEYID = 5
8,095,795 UART: [ldev] AUTHORITY.KEYID = 7
8,097,034 UART: [ldev] FE.KEYID = 1
8,136,957 UART: [ldev] Erasing FE.KEYID = 1
10,639,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,405,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,847 UART: [ldev] --
12,429,247 UART: [fwproc] Wait for Commands...
12,431,993 UART: [fwproc] Recv command 0x46574c44
12,434,093 UART: [fwproc] Recv'd Img size: 114360 bytes
15,869,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,938,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,007,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,325,633 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,923 writing to cptra_bootfsm_go
193,103 UART:
193,450 UART: Running Caliptra ROM ...
194,544 UART:
194,685 UART: [state] CFI Enabled
263,866 UART: [state] LifecycleState = Manufacturing
266,277 UART: [state] DebugLocked = No
267,793 UART: [state] WD Timer not started. Device not locked for debugging
273,025 UART: [kat] SHA2-256
462,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,700 UART: [kat] ++
474,148 UART: [kat] sha1
486,378 UART: [kat] SHA2-256
489,378 UART: [kat] SHA2-384
495,692 UART: [kat] SHA2-512-ACC
498,308 UART: [kat] ECC-384
2,947,900 UART: [kat] HMAC-384Kdf
2,969,200 UART: [kat] LMS
3,500,968 UART: [kat] --
3,506,165 UART: [cold-reset] ++
3,508,051 UART: [fht] FHT @ 0x50003400
3,520,622 UART: [idev] ++
3,521,311 UART: [idev] CDI.KEYID = 6
3,522,429 UART: [idev] SUBJECT.KEYID = 7
3,523,548 UART: [idev] UDS.KEYID = 0
3,526,193 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,075 UART: [idev] Erasing UDS.KEYID = 0
6,025,156 UART: [idev] Sha1 KeyId Algorithm
6,047,963 UART: [idev] --
6,052,991 UART: [ldev] ++
6,053,678 UART: [ldev] CDI.KEYID = 6
6,054,592 UART: [ldev] SUBJECT.KEYID = 5
6,055,806 UART: [ldev] AUTHORITY.KEYID = 7
6,056,988 UART: [ldev] FE.KEYID = 1
6,098,541 UART: [ldev] Erasing FE.KEYID = 1
8,603,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,719 UART: [ldev] --
10,409,979 UART: [fwproc] Wait for Commands...
10,411,868 UART: [fwproc] Recv command 0x46574c44
10,414,134 UART: [fwproc] Recv'd Img size: 114360 bytes
12,773,265 UART: ROM Fatal Error: 0x000B0025
12,776,919 >>> mbox cmd response: failed
12,777,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,777,670 >>> mbox cmd response: failed
12,777,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,778,226 >>> mbox cmd response: failed
Initializing fuses
2,052,666 writing to cptra_bootfsm_go
2,241,951 UART:
2,242,303 UART: Running Caliptra ROM ...
2,243,352 UART:
2,243,503 UART: [state] CFI Enabled
2,309,257 UART: [state] LifecycleState = Manufacturing
2,311,641 UART: [state] DebugLocked = No
2,313,921 UART: [state] WD Timer not started. Device not locked for debugging
2,318,391 UART: [kat] SHA2-256
2,508,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,052 UART: [kat] ++
2,519,510 UART: [kat] sha1
2,531,483 UART: [kat] SHA2-256
2,534,457 UART: [kat] SHA2-384
2,538,883 UART: [kat] SHA2-512-ACC
2,541,477 UART: [kat] ECC-384
4,991,361 UART: [kat] HMAC-384Kdf
5,018,710 UART: [kat] LMS
5,550,472 UART: [kat] --
5,554,604 UART: [cold-reset] ++
5,556,869 UART: [fht] FHT @ 0x50003400
5,568,986 UART: [idev] ++
5,569,727 UART: [idev] CDI.KEYID = 6
5,570,641 UART: [idev] SUBJECT.KEYID = 7
5,571,858 UART: [idev] UDS.KEYID = 0
5,574,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,718,430 UART: [idev] Erasing UDS.KEYID = 0
8,095,833 UART: [idev] Sha1 KeyId Algorithm
8,119,298 UART: [idev] --
8,125,320 UART: [ldev] ++
8,126,020 UART: [ldev] CDI.KEYID = 6
8,126,953 UART: [ldev] SUBJECT.KEYID = 5
8,128,119 UART: [ldev] AUTHORITY.KEYID = 7
8,129,295 UART: [ldev] FE.KEYID = 1
8,167,704 UART: [ldev] Erasing FE.KEYID = 1
10,673,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,411,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,427,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,442,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,457,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,478,147 UART: [ldev] --
12,483,304 UART: [fwproc] Wait for Commands...
12,486,373 UART: [fwproc] Recv command 0x46574c44
12,488,639 UART: [fwproc] Recv'd Img size: 114360 bytes
15,967,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,044,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,160,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,701,927 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,420,012 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,681,461 >>> mbox cmd response: failed
12,682,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,592 >>> mbox cmd response: failed
12,682,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,150 >>> mbox cmd response: failed
Initializing fuses
2,053,001 writing to cptra_bootfsm_go
5,477,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,810,185 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,489 UART:
192,848 UART: Running Caliptra ROM ...
194,065 UART:
603,669 UART: [state] CFI Enabled
615,391 UART: [state] LifecycleState = Manufacturing
617,421 UART: [state] DebugLocked = No
619,399 UART: [state] WD Timer not started. Device not locked for debugging
624,777 UART: [kat] SHA2-256
814,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,451 UART: [kat] ++
826,034 UART: [kat] sha1
837,787 UART: [kat] SHA2-256
840,794 UART: [kat] SHA2-384
846,174 UART: [kat] SHA2-512-ACC
848,781 UART: [kat] ECC-384
3,292,687 UART: [kat] HMAC-384Kdf
3,304,985 UART: [kat] LMS
3,836,840 UART: [kat] --
3,840,318 UART: [cold-reset] ++
3,841,963 UART: [fht] FHT @ 0x50003400
3,854,028 UART: [idev] ++
3,854,716 UART: [idev] CDI.KEYID = 6
3,855,684 UART: [idev] SUBJECT.KEYID = 7
3,856,901 UART: [idev] UDS.KEYID = 0
3,859,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,350 UART: [idev] Erasing UDS.KEYID = 0
6,332,050 UART: [idev] Sha1 KeyId Algorithm
6,355,717 UART: [idev] --
6,360,413 UART: [ldev] ++
6,361,094 UART: [ldev] CDI.KEYID = 6
6,362,019 UART: [ldev] SUBJECT.KEYID = 5
6,363,119 UART: [ldev] AUTHORITY.KEYID = 7
6,364,322 UART: [ldev] FE.KEYID = 1
6,375,580 UART: [ldev] Erasing FE.KEYID = 1
8,855,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,527 UART: [ldev] --
10,646,117 UART: [fwproc] Wait for Commands...
10,648,057 UART: [fwproc] Recv command 0x46574c44
10,650,323 UART: [fwproc] Recv'd Img size: 114360 bytes
13,007,123 UART: ROM Fatal Error: 0x000B0025
13,010,749 >>> mbox cmd response: failed
13,011,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,011,555 >>> mbox cmd response: failed
13,011,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,012,114 >>> mbox cmd response: failed
Initializing fuses
2,049,127 writing to cptra_bootfsm_go
2,238,451 UART:
2,238,792 UART: Running Caliptra ROM ...
2,239,877 UART:
7,447,722 UART: [state] CFI Enabled
7,464,257 UART: [state] LifecycleState = Manufacturing
7,466,610 UART: [state] DebugLocked = No
7,467,837 UART: [state] WD Timer not started. Device not locked for debugging
7,472,387 UART: [kat] SHA2-256
7,662,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,673,079 UART: [kat] ++
7,673,627 UART: [kat] sha1
7,685,116 UART: [kat] SHA2-256
7,688,101 UART: [kat] SHA2-384
7,694,131 UART: [kat] SHA2-512-ACC
7,696,707 UART: [kat] ECC-384
10,141,208 UART: [kat] HMAC-384Kdf
10,154,462 UART: [kat] LMS
10,686,284 UART: [kat] --
10,690,485 UART: [cold-reset] ++
10,692,197 UART: [fht] FHT @ 0x50003400
10,704,896 UART: [idev] ++
10,705,631 UART: [idev] CDI.KEYID = 6
10,706,541 UART: [idev] SUBJECT.KEYID = 7
10,707,751 UART: [idev] UDS.KEYID = 0
10,710,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,854,600 UART: [idev] Erasing UDS.KEYID = 0
13,179,077 UART: [idev] Sha1 KeyId Algorithm
13,201,775 UART: [idev] --
13,206,059 UART: [ldev] ++
13,206,740 UART: [ldev] CDI.KEYID = 6
13,207,816 UART: [ldev] SUBJECT.KEYID = 5
13,208,939 UART: [ldev] AUTHORITY.KEYID = 7
13,210,125 UART: [ldev] FE.KEYID = 1
13,220,285 UART: [ldev] Erasing FE.KEYID = 1
15,701,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,419,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,435,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,450,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,465,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,487,087 UART: [ldev] --
17,493,324 UART: [fwproc] Wait for Commands...
17,496,075 UART: [fwproc] Recv command 0x46574c44
17,498,337 UART: [fwproc] Recv'd Img size: 114360 bytes
20,971,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,050,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,167,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,710,080 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,757,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,912,339 >>> mbox cmd response: failed
12,912,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,232 >>> mbox cmd response: failed
12,913,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,799 >>> mbox cmd response: failed
Initializing fuses
2,052,208 writing to cptra_bootfsm_go
10,705,294 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,949,787 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Manufacturing
85,659 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,082 UART: [kat] SHA2-512-ACC
896,983 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,137 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,504 UART: [idev] ++
1,479,672 UART: [idev] CDI.KEYID = 6
1,480,032 UART: [idev] SUBJECT.KEYID = 7
1,480,456 UART: [idev] UDS.KEYID = 0
1,480,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,720 UART: [idev] Erasing UDS.KEYID = 0
1,505,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,552 UART: [idev] --
1,515,541 UART: [ldev] ++
1,515,709 UART: [ldev] CDI.KEYID = 6
1,516,072 UART: [ldev] SUBJECT.KEYID = 5
1,516,498 UART: [ldev] AUTHORITY.KEYID = 7
1,516,961 UART: [ldev] FE.KEYID = 1
1,522,215 UART: [ldev] Erasing FE.KEYID = 1
1,547,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,552 UART: [ldev] --
1,586,863 UART: [fwproc] Waiting for Commands...
1,587,526 UART: [fwproc] Received command 0x46574c44
1,588,317 UART: [fwproc] Received Image of size 114360 bytes
1,879,342 UART: ROM Fatal Error: 0x000B0025
1,880,499 >>> mbox cmd response: failed
1,880,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,505 >>> mbox cmd response: failed
1,880,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,571 UART: [kat] SHA2-256
881,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,617 UART: [kat] ++
885,769 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
894,930 UART: [kat] SHA2-512-ACC
896,831 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,147 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,636 UART: [idev] Erasing UDS.KEYID = 0
1,505,274 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,514,841 UART: [ldev] ++
1,515,009 UART: [ldev] CDI.KEYID = 6
1,515,372 UART: [ldev] SUBJECT.KEYID = 5
1,515,798 UART: [ldev] AUTHORITY.KEYID = 7
1,516,261 UART: [ldev] FE.KEYID = 1
1,521,471 UART: [ldev] Erasing FE.KEYID = 1
1,546,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,246 UART: [ldev] --
1,585,619 UART: [fwproc] Waiting for Commands...
1,586,436 UART: [fwproc] Received command 0x46574c44
1,587,227 UART: [fwproc] Received Image of size 114360 bytes
2,884,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,758 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,731,080 >>> mbox cmd response: failed
1,731,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,086 >>> mbox cmd response: failed
1,731,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,763 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,444 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Manufacturing
86,254 UART: [state] DebugLocked = No
86,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,976 UART: [kat] SHA2-256
892,914 UART: [kat] SHA2-384
895,519 UART: [kat] SHA2-512-ACC
897,420 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,714 UART: [cold-reset] ++
1,477,156 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,795 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,441 UART: [idev] --
1,515,610 UART: [ldev] ++
1,515,778 UART: [ldev] CDI.KEYID = 6
1,516,141 UART: [ldev] SUBJECT.KEYID = 5
1,516,567 UART: [ldev] AUTHORITY.KEYID = 7
1,517,030 UART: [ldev] FE.KEYID = 1
1,522,406 UART: [ldev] Erasing FE.KEYID = 1
1,547,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,285 UART: [ldev] --
1,586,546 UART: [fwproc] Waiting for Commands...
1,587,221 UART: [fwproc] Received command 0x46574c44
1,588,012 UART: [fwproc] Received Image of size 114360 bytes
1,880,793 UART: ROM Fatal Error: 0x000B0025
1,881,950 >>> mbox cmd response: failed
1,881,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,956 >>> mbox cmd response: failed
1,881,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,366 UART: [kat] SHA2-256
882,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,412 UART: [kat] ++
886,564 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,183 UART: [kat] SHA2-512-ACC
897,084 UART: [kat] ECC-384
902,941 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,875 UART: [idev] Erasing UDS.KEYID = 0
1,505,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,171 UART: [idev] --
1,515,204 UART: [ldev] ++
1,515,372 UART: [ldev] CDI.KEYID = 6
1,515,735 UART: [ldev] SUBJECT.KEYID = 5
1,516,161 UART: [ldev] AUTHORITY.KEYID = 7
1,516,624 UART: [ldev] FE.KEYID = 1
1,521,484 UART: [ldev] Erasing FE.KEYID = 1
1,546,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,453 UART: [ldev] --
1,586,810 UART: [fwproc] Waiting for Commands...
1,587,639 UART: [fwproc] Received command 0x46574c44
1,588,430 UART: [fwproc] Received Image of size 114360 bytes
2,884,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,264 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,616 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,407 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,252 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,733,767 >>> mbox cmd response: failed
1,733,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,773 >>> mbox cmd response: failed
1,733,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,140 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,317 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Manufacturing
85,989 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,584 UART: [kat] SHA2-512-ACC
908,485 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,186 UART: [kat] LMS
1,170,514 UART: [kat] --
1,171,207 UART: [cold-reset] ++
1,171,721 UART: [fht] FHT @ 0x50003400
1,174,362 UART: [idev] ++
1,174,530 UART: [idev] CDI.KEYID = 6
1,174,890 UART: [idev] SUBJECT.KEYID = 7
1,175,314 UART: [idev] UDS.KEYID = 0
1,175,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,071 UART: [idev] Sha1 KeyId Algorithm
1,208,691 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,084 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,163 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,042 UART: [fwproc] Recv command 0x46574c44
1,282,770 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,589 UART: ROM Fatal Error: 0x000B0025
1,575,746 >>> mbox cmd response: failed
1,575,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,752 >>> mbox cmd response: failed
1,575,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,506 UART: [kat] SHA2-512-ACC
908,407 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
923,050 UART: [kat] LMS
1,171,378 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,175,102 UART: [idev] ++
1,175,270 UART: [idev] CDI.KEYID = 6
1,175,630 UART: [idev] SUBJECT.KEYID = 7
1,176,054 UART: [idev] UDS.KEYID = 0
1,176,399 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,197 UART: [idev] --
1,210,245 UART: [ldev] ++
1,210,413 UART: [ldev] CDI.KEYID = 6
1,210,776 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,180 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,943 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,430,495 >>> mbox cmd response: failed
1,430,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,501 >>> mbox cmd response: failed
1,430,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,592 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Manufacturing
86,134 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
901,938 UART: [kat] SHA2-256
903,878 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,821 UART: [kat] HMAC-384Kdf
923,385 UART: [kat] LMS
1,171,713 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,173,008 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,003 UART: [idev] Erasing UDS.KEYID = 0
1,202,132 UART: [idev] Sha1 KeyId Algorithm
1,210,538 UART: [idev] --
1,211,750 UART: [ldev] ++
1,211,918 UART: [ldev] CDI.KEYID = 6
1,212,281 UART: [ldev] SUBJECT.KEYID = 5
1,212,707 UART: [ldev] AUTHORITY.KEYID = 7
1,213,170 UART: [ldev] FE.KEYID = 1
1,218,588 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,134 UART: [ldev] --
1,284,425 UART: [fwproc] Wait for Commands...
1,285,247 UART: [fwproc] Recv command 0x46574c44
1,285,975 UART: [fwproc] Recv'd Img size: 114360 bytes
1,577,668 UART: ROM Fatal Error: 0x000B0025
1,578,825 >>> mbox cmd response: failed
1,578,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,831 >>> mbox cmd response: failed
1,578,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
907,007 UART: [kat] SHA2-512-ACC
908,908 UART: [kat] ECC-384
918,741 UART: [kat] HMAC-384Kdf
923,199 UART: [kat] LMS
1,171,527 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,883 UART: [idev] Erasing UDS.KEYID = 0
1,201,288 UART: [idev] Sha1 KeyId Algorithm
1,209,678 UART: [idev] --
1,210,770 UART: [ldev] ++
1,210,938 UART: [ldev] CDI.KEYID = 6
1,211,301 UART: [ldev] SUBJECT.KEYID = 5
1,211,727 UART: [ldev] AUTHORITY.KEYID = 7
1,212,190 UART: [ldev] FE.KEYID = 1
1,217,236 UART: [ldev] Erasing FE.KEYID = 1
1,243,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,974 UART: [ldev] --
1,282,253 UART: [fwproc] Wait for Commands...
1,282,927 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,978 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,448 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,431,816 >>> mbox cmd response: failed
1,431,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,822 >>> mbox cmd response: failed
1,431,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,306 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,639 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Manufacturing
85,929 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,416 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,305 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,575 UART: [idev] ++
1,173,743 UART: [idev] CDI.KEYID = 6
1,174,104 UART: [idev] SUBJECT.KEYID = 7
1,174,529 UART: [idev] UDS.KEYID = 0
1,174,875 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,663 UART: [idev] Erasing UDS.KEYID = 0
1,199,769 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,680 UART: [ldev] ++
1,209,848 UART: [ldev] CDI.KEYID = 6
1,210,212 UART: [ldev] SUBJECT.KEYID = 5
1,210,639 UART: [ldev] AUTHORITY.KEYID = 7
1,211,102 UART: [ldev] FE.KEYID = 1
1,216,238 UART: [ldev] Erasing FE.KEYID = 1
1,242,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,722 UART: [ldev] --
1,282,084 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 114360 bytes
1,575,059 UART: ROM Fatal Error: 0x000B0025
1,576,216 >>> mbox cmd response: failed
1,576,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,222 >>> mbox cmd response: failed
1,576,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,229 UART: [kat] SHA2-256
901,169 UART: [kat] SHA2-384
903,944 UART: [kat] SHA2-512-ACC
905,845 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,173,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,253 UART: [idev] Sha1 KeyId Algorithm
1,207,013 UART: [idev] --
1,208,040 UART: [ldev] ++
1,208,208 UART: [ldev] CDI.KEYID = 6
1,208,572 UART: [ldev] SUBJECT.KEYID = 5
1,208,999 UART: [ldev] AUTHORITY.KEYID = 7
1,209,462 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,240,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,644 UART: [ldev] --
1,279,980 UART: [fwproc] Wait for Commands...
1,280,589 UART: [fwproc] Recv command 0x46574c44
1,281,322 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,795 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,416 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,319 >>> mbox cmd response: failed
1,427,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,325 >>> mbox cmd response: failed
1,427,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,976 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,669 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Manufacturing
85,998 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,429 UART: [kat] LMS
1,169,741 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,174,896 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,450 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,087 UART: [ldev] SUBJECT.KEYID = 5
1,210,514 UART: [ldev] AUTHORITY.KEYID = 7
1,210,977 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,119 UART: [fwproc] Wait for Commands...
1,282,874 UART: [fwproc] Recv command 0x46574c44
1,283,607 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,370 UART: ROM Fatal Error: 0x000B0025
1,575,527 >>> mbox cmd response: failed
1,575,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,533 >>> mbox cmd response: failed
1,575,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,826 UART: [fht] FHT @ 0x50003400
1,173,530 UART: [idev] ++
1,173,698 UART: [idev] CDI.KEYID = 6
1,174,059 UART: [idev] SUBJECT.KEYID = 7
1,174,484 UART: [idev] UDS.KEYID = 0
1,174,830 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,230 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,837 UART: [ldev] SUBJECT.KEYID = 5
1,211,264 UART: [ldev] AUTHORITY.KEYID = 7
1,211,727 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,947 UART: [fwproc] Wait for Commands...
1,283,606 UART: [fwproc] Recv command 0x46574c44
1,284,339 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,204 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,428,460 >>> mbox cmd response: failed
1,428,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,466 >>> mbox cmd response: failed
1,428,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
192,196 UART:
192,565 UART: Running Caliptra ROM ...
193,677 UART:
193,823 UART: [state] CFI Enabled
262,788 UART: [state] LifecycleState = Manufacturing
264,713 UART: [state] DebugLocked = No
266,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,311 UART: [kat] SHA2-256
441,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,477 UART: [kat] ++
453,092 UART: [kat] sha1
463,442 UART: [kat] SHA2-256
466,118 UART: [kat] SHA2-384
471,713 UART: [kat] SHA2-512-ACC
474,104 UART: [kat] ECC-384
2,765,963 UART: [kat] HMAC-384Kdf
2,788,254 UART: [kat] LMS
3,978,537 UART: [kat] --
3,983,183 UART: [cold-reset] ++
3,985,385 UART: [fht] Storing FHT @ 0x50003400
3,998,646 UART: [idev] ++
3,999,222 UART: [idev] CDI.KEYID = 6
4,000,133 UART: [idev] SUBJECT.KEYID = 7
4,001,410 UART: [idev] UDS.KEYID = 0
4,004,263 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,148,360 UART: [idev] Erasing UDS.KEYID = 0
7,335,035 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,693 UART: [idev] --
7,362,259 UART: [ldev] ++
7,362,825 UART: [ldev] CDI.KEYID = 6
7,363,793 UART: [ldev] SUBJECT.KEYID = 5
7,365,010 UART: [ldev] AUTHORITY.KEYID = 7
7,366,305 UART: [ldev] FE.KEYID = 1
7,410,710 UART: [ldev] Erasing FE.KEYID = 1
10,741,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,063,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,097,177 UART: [ldev] --
13,101,253 UART: [fwproc] Waiting for Commands...
13,103,471 UART: [fwproc] Received command 0x46574c44
13,105,679 UART: [fwproc] Received Image of size 114036 bytes
16,083,758 UART: ROM Fatal Error: 0x000B0027
16,087,166 >>> mbox cmd response: failed
16,087,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,087,927 >>> mbox cmd response: failed
16,088,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,492 >>> mbox cmd response: failed
Initializing fuses
2,057,942 writing to cptra_bootfsm_go
2,247,253 UART:
2,247,597 UART: Running Caliptra ROM ...
2,248,692 UART:
2,248,850 UART: [state] CFI Enabled
2,313,747 UART: [state] LifecycleState = Manufacturing
2,315,688 UART: [state] DebugLocked = No
2,316,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,038 UART: [kat] SHA2-256
2,491,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,218 UART: [kat] ++
2,502,723 UART: [kat] sha1
2,512,859 UART: [kat] SHA2-256
2,515,566 UART: [kat] SHA2-384
2,520,101 UART: [kat] SHA2-512-ACC
2,522,465 UART: [kat] ECC-384
4,818,308 UART: [kat] HMAC-384Kdf
4,852,247 UART: [kat] LMS
6,042,548 UART: [kat] --
6,045,779 UART: [cold-reset] ++
6,047,066 UART: [fht] Storing FHT @ 0x50003400
6,059,166 UART: [idev] ++
6,059,737 UART: [idev] CDI.KEYID = 6
6,060,705 UART: [idev] SUBJECT.KEYID = 7
6,061,924 UART: [idev] UDS.KEYID = 0
6,064,714 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,208,285 UART: [idev] Erasing UDS.KEYID = 0
9,399,397 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,258 UART: [idev] --
9,425,140 UART: [ldev] ++
9,425,711 UART: [ldev] CDI.KEYID = 6
9,426,673 UART: [ldev] SUBJECT.KEYID = 5
9,427,932 UART: [ldev] AUTHORITY.KEYID = 7
9,429,172 UART: [ldev] FE.KEYID = 1
9,475,047 UART: [ldev] Erasing FE.KEYID = 1
12,808,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,100,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,144,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,840 UART: [ldev] --
15,167,974 UART: [fwproc] Waiting for Commands...
15,170,561 UART: [fwproc] Received command 0x46574c44
15,172,813 UART: [fwproc] Received Image of size 114036 bytes
19,254,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,333,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,402,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,719,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,807,436 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,886,611 >>> mbox cmd response: failed
15,887,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,887,495 >>> mbox cmd response: failed
15,887,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,888,079 >>> mbox cmd response: failed
Initializing fuses
2,050,595 writing to cptra_bootfsm_go
5,826,998 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,944,249 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,621 UART:
192,976 UART: Running Caliptra ROM ...
194,059 UART:
603,754 UART: [state] CFI Enabled
616,841 UART: [state] LifecycleState = Manufacturing
619,066 UART: [state] DebugLocked = No
620,436 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,176 UART: [kat] SHA2-256
794,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,444 UART: [kat] ++
805,929 UART: [kat] sha1
817,243 UART: [kat] SHA2-256
819,981 UART: [kat] SHA2-384
825,523 UART: [kat] SHA2-512-ACC
827,918 UART: [kat] ECC-384
3,113,463 UART: [kat] HMAC-384Kdf
3,125,320 UART: [kat] LMS
4,315,412 UART: [kat] --
4,318,672 UART: [cold-reset] ++
4,320,937 UART: [fht] Storing FHT @ 0x50003400
4,333,127 UART: [idev] ++
4,333,690 UART: [idev] CDI.KEYID = 6
4,334,626 UART: [idev] SUBJECT.KEYID = 7
4,335,894 UART: [idev] UDS.KEYID = 0
4,338,589 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,007 UART: [idev] Erasing UDS.KEYID = 0
7,622,055 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,377 UART: [idev] --
7,647,910 UART: [ldev] ++
7,648,489 UART: [ldev] CDI.KEYID = 6
7,649,456 UART: [ldev] SUBJECT.KEYID = 5
7,650,688 UART: [ldev] AUTHORITY.KEYID = 7
7,651,924 UART: [ldev] FE.KEYID = 1
7,662,554 UART: [ldev] Erasing FE.KEYID = 1
10,947,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,385 UART: [ldev] --
13,306,951 UART: [fwproc] Waiting for Commands...
13,308,673 UART: [fwproc] Received command 0x46574c44
13,310,921 UART: [fwproc] Received Image of size 114036 bytes
16,294,400 UART: ROM Fatal Error: 0x000B0027
16,297,800 >>> mbox cmd response: failed
16,298,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,298,584 >>> mbox cmd response: failed
16,299,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,299,405 >>> mbox cmd response: failed
Initializing fuses
2,048,437 writing to cptra_bootfsm_go
2,237,727 UART:
2,238,074 UART: Running Caliptra ROM ...
2,239,319 UART:
4,169,228 UART: [state] CFI Enabled
4,182,128 UART: [state] LifecycleState = Manufacturing
4,184,100 UART: [state] DebugLocked = No
4,185,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,189,425 UART: [kat] SHA2-256
4,359,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,369,668 UART: [kat] ++
4,370,128 UART: [kat] sha1
4,381,233 UART: [kat] SHA2-256
4,383,984 UART: [kat] SHA2-384
4,390,083 UART: [kat] SHA2-512-ACC
4,392,435 UART: [kat] ECC-384
6,675,769 UART: [kat] HMAC-384Kdf
6,686,654 UART: [kat] LMS
7,876,809 UART: [kat] --
7,881,831 UART: [cold-reset] ++
7,883,653 UART: [fht] Storing FHT @ 0x50003400
7,895,243 UART: [idev] ++
7,895,817 UART: [idev] CDI.KEYID = 6
7,896,756 UART: [idev] SUBJECT.KEYID = 7
7,898,024 UART: [idev] UDS.KEYID = 0
7,900,647 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,044,412 UART: [idev] Erasing UDS.KEYID = 0
11,182,322 UART: [idev] Using Sha1 for KeyId Algorithm
11,203,753 UART: [idev] --
11,208,103 UART: [ldev] ++
11,208,738 UART: [ldev] CDI.KEYID = 6
11,209,621 UART: [ldev] SUBJECT.KEYID = 5
11,210,877 UART: [ldev] AUTHORITY.KEYID = 7
11,212,114 UART: [ldev] FE.KEYID = 1
11,221,765 UART: [ldev] Erasing FE.KEYID = 1
14,510,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,801,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,816,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,831,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,845,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,865,298 UART: [ldev] --
16,870,778 UART: [fwproc] Waiting for Commands...
16,873,011 UART: [fwproc] Received command 0x46574c44
16,875,209 UART: [fwproc] Received Image of size 114036 bytes
20,958,331 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,034,115 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,103,017 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,420,532 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,129,895 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,078,943 >>> mbox cmd response: failed
16,079,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,079,864 >>> mbox cmd response: failed
16,080,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,080,382 >>> mbox cmd response: failed
Initializing fuses
2,045,378 writing to cptra_bootfsm_go
7,914,221 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,902,455 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,518 UART:
193,166 UART: Running Caliptra ROM ...
194,371 UART:
194,531 UART: [state] CFI Enabled
265,044 UART: [state] LifecycleState = Manufacturing
266,881 UART: [state] DebugLocked = No
268,957 UART: [state] WD Timer not started. Device not locked for debugging
272,985 UART: [kat] SHA2-256
451,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,487 UART: [kat] ++
464,026 UART: [kat] sha1
475,073 UART: [kat] SHA2-256
478,090 UART: [kat] SHA2-384
483,097 UART: [kat] SHA2-512-ACC
486,031 UART: [kat] ECC-384
2,946,441 UART: [kat] HMAC-384Kdf
2,970,418 UART: [kat] LMS
3,499,879 UART: [kat] --
3,504,699 UART: [cold-reset] ++
3,505,709 UART: [fht] FHT @ 0x50003400
3,517,738 UART: [idev] ++
3,518,312 UART: [idev] CDI.KEYID = 6
3,519,194 UART: [idev] SUBJECT.KEYID = 7
3,520,403 UART: [idev] UDS.KEYID = 0
3,523,470 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,516 UART: [idev] Erasing UDS.KEYID = 0
6,025,277 UART: [idev] Sha1 KeyId Algorithm
6,048,667 UART: [idev] --
6,053,609 UART: [ldev] ++
6,054,198 UART: [ldev] CDI.KEYID = 6
6,055,119 UART: [ldev] SUBJECT.KEYID = 5
6,056,302 UART: [ldev] AUTHORITY.KEYID = 7
6,057,483 UART: [ldev] FE.KEYID = 1
6,099,239 UART: [ldev] Erasing FE.KEYID = 1
8,601,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,341 UART: [ldev] --
10,393,252 UART: [fwproc] Wait for Commands...
10,395,083 UART: [fwproc] Recv command 0x46574c44
10,397,131 UART: [fwproc] Recv'd Img size: 114360 bytes
12,716,463 UART: ROM Fatal Error: 0x000B0027
12,719,572 >>> mbox cmd response: failed
12,719,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,720,315 >>> mbox cmd response: failed
12,720,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,720,898 >>> mbox cmd response: failed
Initializing fuses
2,048,018 writing to cptra_bootfsm_go
2,237,312 UART:
2,237,666 UART: Running Caliptra ROM ...
2,238,711 UART:
2,238,860 UART: [state] CFI Enabled
2,304,514 UART: [state] LifecycleState = Manufacturing
2,306,396 UART: [state] DebugLocked = No
2,308,514 UART: [state] WD Timer not started. Device not locked for debugging
2,311,661 UART: [kat] SHA2-256
2,490,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,396 UART: [kat] ++
2,502,860 UART: [kat] sha1
2,515,576 UART: [kat] SHA2-256
2,518,582 UART: [kat] SHA2-384
2,524,796 UART: [kat] SHA2-512-ACC
2,527,798 UART: [kat] ECC-384
4,991,762 UART: [kat] HMAC-384Kdf
5,012,812 UART: [kat] LMS
5,542,266 UART: [kat] --
5,548,758 UART: [cold-reset] ++
5,549,610 UART: [fht] FHT @ 0x50003400
5,560,803 UART: [idev] ++
5,561,412 UART: [idev] CDI.KEYID = 6
5,562,333 UART: [idev] SUBJECT.KEYID = 7
5,563,494 UART: [idev] UDS.KEYID = 0
5,566,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,960 UART: [idev] Erasing UDS.KEYID = 0
8,067,780 UART: [idev] Sha1 KeyId Algorithm
8,091,164 UART: [idev] --
8,094,884 UART: [ldev] ++
8,095,464 UART: [ldev] CDI.KEYID = 6
8,096,352 UART: [ldev] SUBJECT.KEYID = 5
8,097,515 UART: [ldev] AUTHORITY.KEYID = 7
8,098,806 UART: [ldev] FE.KEYID = 1
8,141,753 UART: [ldev] Erasing FE.KEYID = 1
10,644,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,363,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,379,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,395,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,411,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,430,257 UART: [ldev] --
12,435,528 UART: [fwproc] Wait for Commands...
12,437,309 UART: [fwproc] Recv command 0x46574c44
12,439,420 UART: [fwproc] Recv'd Img size: 114360 bytes
15,867,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,939,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,007,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,325,161 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,078 UART:
192,452 UART: Running Caliptra ROM ...
193,647 UART:
193,828 UART: [state] CFI Enabled
264,260 UART: [state] LifecycleState = Manufacturing
266,378 UART: [state] DebugLocked = No
267,922 UART: [state] WD Timer not started. Device not locked for debugging
272,361 UART: [kat] SHA2-256
462,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,030 UART: [kat] ++
473,485 UART: [kat] sha1
483,611 UART: [kat] SHA2-256
486,626 UART: [kat] SHA2-384
492,607 UART: [kat] SHA2-512-ACC
495,165 UART: [kat] ECC-384
2,948,783 UART: [kat] HMAC-384Kdf
2,972,618 UART: [kat] LMS
3,504,356 UART: [kat] --
3,508,465 UART: [cold-reset] ++
3,509,610 UART: [fht] FHT @ 0x50003400
3,521,296 UART: [idev] ++
3,521,980 UART: [idev] CDI.KEYID = 6
3,522,954 UART: [idev] SUBJECT.KEYID = 7
3,524,113 UART: [idev] UDS.KEYID = 0
3,526,766 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,830 UART: [idev] Erasing UDS.KEYID = 0
6,029,354 UART: [idev] Sha1 KeyId Algorithm
6,052,077 UART: [idev] --
6,057,539 UART: [ldev] ++
6,058,221 UART: [ldev] CDI.KEYID = 6
6,059,114 UART: [ldev] SUBJECT.KEYID = 5
6,060,332 UART: [ldev] AUTHORITY.KEYID = 7
6,061,509 UART: [ldev] FE.KEYID = 1
6,102,007 UART: [ldev] Erasing FE.KEYID = 1
8,609,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,422 UART: [ldev] --
10,418,846 UART: [fwproc] Wait for Commands...
10,420,402 UART: [fwproc] Recv command 0x46574c44
10,422,717 UART: [fwproc] Recv'd Img size: 114360 bytes
12,786,782 UART: ROM Fatal Error: 0x000B0027
12,790,445 >>> mbox cmd response: failed
12,790,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,791,151 >>> mbox cmd response: failed
12,791,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,791,708 >>> mbox cmd response: failed
Initializing fuses
2,055,546 writing to cptra_bootfsm_go
2,244,870 UART:
2,245,236 UART: Running Caliptra ROM ...
2,246,373 UART:
2,246,538 UART: [state] CFI Enabled
2,306,196 UART: [state] LifecycleState = Manufacturing
2,308,574 UART: [state] DebugLocked = No
2,310,448 UART: [state] WD Timer not started. Device not locked for debugging
2,315,835 UART: [kat] SHA2-256
2,505,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,502 UART: [kat] ++
2,517,056 UART: [kat] sha1
2,528,438 UART: [kat] SHA2-256
2,531,458 UART: [kat] SHA2-384
2,536,554 UART: [kat] SHA2-512-ACC
2,539,139 UART: [kat] ECC-384
4,985,659 UART: [kat] HMAC-384Kdf
5,011,265 UART: [kat] LMS
5,543,012 UART: [kat] --
5,547,925 UART: [cold-reset] ++
5,549,853 UART: [fht] FHT @ 0x50003400
5,561,968 UART: [idev] ++
5,562,690 UART: [idev] CDI.KEYID = 6
5,563,580 UART: [idev] SUBJECT.KEYID = 7
5,564,796 UART: [idev] UDS.KEYID = 0
5,567,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,202 UART: [idev] Erasing UDS.KEYID = 0
8,069,041 UART: [idev] Sha1 KeyId Algorithm
8,090,929 UART: [idev] --
8,095,410 UART: [ldev] ++
8,096,116 UART: [ldev] CDI.KEYID = 6
8,097,001 UART: [ldev] SUBJECT.KEYID = 5
8,098,169 UART: [ldev] AUTHORITY.KEYID = 7
8,099,409 UART: [ldev] FE.KEYID = 1
8,140,772 UART: [ldev] Erasing FE.KEYID = 1
10,649,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,097 UART: [ldev] --
12,454,345 UART: [fwproc] Wait for Commands...
12,456,884 UART: [fwproc] Recv command 0x46574c44
12,459,149 UART: [fwproc] Recv'd Img size: 114360 bytes
15,935,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,010,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,126,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,669,199 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,441,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,699,258 >>> mbox cmd response: failed
12,699,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,700,333 >>> mbox cmd response: failed
12,700,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,700,943 >>> mbox cmd response: failed
Initializing fuses
2,044,820 writing to cptra_bootfsm_go
5,459,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,795,122 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,336 UART:
192,720 UART: Running Caliptra ROM ...
193,819 UART:
603,676 UART: [state] CFI Enabled
618,851 UART: [state] LifecycleState = Manufacturing
621,218 UART: [state] DebugLocked = No
623,269 UART: [state] WD Timer not started. Device not locked for debugging
628,093 UART: [kat] SHA2-256
817,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,763 UART: [kat] ++
829,356 UART: [kat] sha1
841,590 UART: [kat] SHA2-256
844,655 UART: [kat] SHA2-384
850,523 UART: [kat] SHA2-512-ACC
853,071 UART: [kat] ECC-384
3,296,024 UART: [kat] HMAC-384Kdf
3,309,113 UART: [kat] LMS
3,840,968 UART: [kat] --
3,844,637 UART: [cold-reset] ++
3,846,784 UART: [fht] FHT @ 0x50003400
3,858,193 UART: [idev] ++
3,858,878 UART: [idev] CDI.KEYID = 6
3,859,844 UART: [idev] SUBJECT.KEYID = 7
3,861,004 UART: [idev] UDS.KEYID = 0
3,863,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,546 UART: [idev] Erasing UDS.KEYID = 0
6,340,011 UART: [idev] Sha1 KeyId Algorithm
6,362,871 UART: [idev] --
6,367,550 UART: [ldev] ++
6,368,240 UART: [ldev] CDI.KEYID = 6
6,369,303 UART: [ldev] SUBJECT.KEYID = 5
6,370,409 UART: [ldev] AUTHORITY.KEYID = 7
6,371,583 UART: [ldev] FE.KEYID = 1
6,383,654 UART: [ldev] Erasing FE.KEYID = 1
8,866,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,718 UART: [ldev] --
10,657,583 UART: [fwproc] Wait for Commands...
10,660,435 UART: [fwproc] Recv command 0x46574c44
10,662,742 UART: [fwproc] Recv'd Img size: 114360 bytes
13,013,303 UART: ROM Fatal Error: 0x000B0027
13,016,920 >>> mbox cmd response: failed
13,017,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,017,680 >>> mbox cmd response: failed
13,017,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,018,192 >>> mbox cmd response: failed
Initializing fuses
2,051,674 writing to cptra_bootfsm_go
2,241,004 UART:
2,241,375 UART: Running Caliptra ROM ...
2,242,526 UART:
7,437,545 UART: [state] CFI Enabled
7,449,809 UART: [state] LifecycleState = Manufacturing
7,452,163 UART: [state] DebugLocked = No
7,454,712 UART: [state] WD Timer not started. Device not locked for debugging
7,459,264 UART: [kat] SHA2-256
7,649,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,659,951 UART: [kat] ++
7,660,456 UART: [kat] sha1
7,671,527 UART: [kat] SHA2-256
7,674,518 UART: [kat] SHA2-384
7,679,443 UART: [kat] SHA2-512-ACC
7,682,073 UART: [kat] ECC-384
10,125,240 UART: [kat] HMAC-384Kdf
10,139,734 UART: [kat] LMS
10,671,589 UART: [kat] --
10,675,648 UART: [cold-reset] ++
10,677,366 UART: [fht] FHT @ 0x50003400
10,688,282 UART: [idev] ++
10,688,999 UART: [idev] CDI.KEYID = 6
10,689,883 UART: [idev] SUBJECT.KEYID = 7
10,691,095 UART: [idev] UDS.KEYID = 0
10,694,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,837,612 UART: [idev] Erasing UDS.KEYID = 0
13,168,791 UART: [idev] Sha1 KeyId Algorithm
13,191,186 UART: [idev] --
13,196,797 UART: [ldev] ++
13,197,481 UART: [ldev] CDI.KEYID = 6
13,198,398 UART: [ldev] SUBJECT.KEYID = 5
13,199,557 UART: [ldev] AUTHORITY.KEYID = 7
13,200,794 UART: [ldev] FE.KEYID = 1
13,212,681 UART: [ldev] Erasing FE.KEYID = 1
15,689,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,409,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,424,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,439,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,454,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,476,536 UART: [ldev] --
17,481,372 UART: [fwproc] Wait for Commands...
17,483,468 UART: [fwproc] Recv command 0x46574c44
17,485,823 UART: [fwproc] Recv'd Img size: 114360 bytes
20,971,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,049,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,165,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,708,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,759,367 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,924,016 >>> mbox cmd response: failed
12,924,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,924,919 >>> mbox cmd response: failed
12,925,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,925,481 >>> mbox cmd response: failed
Initializing fuses
2,047,116 writing to cptra_bootfsm_go
10,696,880 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,942,297 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Manufacturing
85,819 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,176 UART: [kat] HMAC-384Kdf
906,752 UART: [kat] LMS
1,474,948 UART: [kat] --
1,475,933 UART: [cold-reset] ++
1,476,347 UART: [fht] Storing FHT @ 0x50003400
1,479,214 UART: [idev] ++
1,479,382 UART: [idev] CDI.KEYID = 6
1,479,742 UART: [idev] SUBJECT.KEYID = 7
1,480,166 UART: [idev] UDS.KEYID = 0
1,480,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,326 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,580 UART: [idev] --
1,514,519 UART: [ldev] ++
1,514,687 UART: [ldev] CDI.KEYID = 6
1,515,050 UART: [ldev] SUBJECT.KEYID = 5
1,515,476 UART: [ldev] AUTHORITY.KEYID = 7
1,515,939 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,546,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,502 UART: [ldev] --
1,586,007 UART: [fwproc] Waiting for Commands...
1,586,732 UART: [fwproc] Received command 0x46574c44
1,587,523 UART: [fwproc] Received Image of size 114360 bytes
1,879,482 UART: ROM Fatal Error: 0x000B0027
1,880,639 >>> mbox cmd response: failed
1,880,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,645 >>> mbox cmd response: failed
1,880,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
85,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,529 UART: [kat] SHA2-256
881,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,575 UART: [kat] ++
885,727 UART: [kat] sha1
889,927 UART: [kat] SHA2-256
891,865 UART: [kat] SHA2-384
894,610 UART: [kat] SHA2-512-ACC
896,511 UART: [kat] ECC-384
901,900 UART: [kat] HMAC-384Kdf
906,580 UART: [kat] LMS
1,474,776 UART: [kat] --
1,475,575 UART: [cold-reset] ++
1,475,921 UART: [fht] Storing FHT @ 0x50003400
1,478,620 UART: [idev] ++
1,478,788 UART: [idev] CDI.KEYID = 6
1,479,148 UART: [idev] SUBJECT.KEYID = 7
1,479,572 UART: [idev] UDS.KEYID = 0
1,479,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,150 UART: [idev] Erasing UDS.KEYID = 0
1,503,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,766 UART: [idev] --
1,513,923 UART: [ldev] ++
1,514,091 UART: [ldev] CDI.KEYID = 6
1,514,454 UART: [ldev] SUBJECT.KEYID = 5
1,514,880 UART: [ldev] AUTHORITY.KEYID = 7
1,515,343 UART: [ldev] FE.KEYID = 1
1,520,601 UART: [ldev] Erasing FE.KEYID = 1
1,546,306 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,614 UART: [ldev] --
1,586,003 UART: [fwproc] Waiting for Commands...
1,586,800 UART: [fwproc] Received command 0x46574c44
1,587,591 UART: [fwproc] Received Image of size 114360 bytes
2,884,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,006 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,733,030 >>> mbox cmd response: failed
1,733,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,036 >>> mbox cmd response: failed
1,733,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,068 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Manufacturing
85,820 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,006 UART: [kat] SHA2-256
881,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,052 UART: [kat] ++
886,204 UART: [kat] sha1
890,342 UART: [kat] SHA2-256
892,280 UART: [kat] SHA2-384
894,801 UART: [kat] SHA2-512-ACC
896,702 UART: [kat] ECC-384
902,507 UART: [kat] HMAC-384Kdf
907,119 UART: [kat] LMS
1,475,315 UART: [kat] --
1,476,006 UART: [cold-reset] ++
1,476,510 UART: [fht] Storing FHT @ 0x50003400
1,479,237 UART: [idev] ++
1,479,405 UART: [idev] CDI.KEYID = 6
1,479,765 UART: [idev] SUBJECT.KEYID = 7
1,480,189 UART: [idev] UDS.KEYID = 0
1,480,534 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,501 UART: [idev] Erasing UDS.KEYID = 0
1,505,529 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,089 UART: [idev] --
1,515,080 UART: [ldev] ++
1,515,248 UART: [ldev] CDI.KEYID = 6
1,515,611 UART: [ldev] SUBJECT.KEYID = 5
1,516,037 UART: [ldev] AUTHORITY.KEYID = 7
1,516,500 UART: [ldev] FE.KEYID = 1
1,522,034 UART: [ldev] Erasing FE.KEYID = 1
1,547,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,913 UART: [ldev] --
1,586,312 UART: [fwproc] Waiting for Commands...
1,587,123 UART: [fwproc] Received command 0x46574c44
1,587,914 UART: [fwproc] Received Image of size 114360 bytes
1,879,889 UART: ROM Fatal Error: 0x000B0027
1,881,046 >>> mbox cmd response: failed
1,881,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,052 >>> mbox cmd response: failed
1,881,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,892 UART: [kat] SHA2-256
881,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,938 UART: [kat] ++
886,090 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,327 UART: [kat] SHA2-512-ACC
897,228 UART: [kat] ECC-384
902,817 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,477,018 UART: [fht] Storing FHT @ 0x50003400
1,479,801 UART: [idev] ++
1,479,969 UART: [idev] CDI.KEYID = 6
1,480,329 UART: [idev] SUBJECT.KEYID = 7
1,480,753 UART: [idev] UDS.KEYID = 0
1,481,098 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,767 UART: [idev] Erasing UDS.KEYID = 0
1,505,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,515,178 UART: [ldev] ++
1,515,346 UART: [ldev] CDI.KEYID = 6
1,515,709 UART: [ldev] SUBJECT.KEYID = 5
1,516,135 UART: [ldev] AUTHORITY.KEYID = 7
1,516,598 UART: [ldev] FE.KEYID = 1
1,521,834 UART: [ldev] Erasing FE.KEYID = 1
1,547,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,135 UART: [ldev] --
1,587,634 UART: [fwproc] Waiting for Commands...
1,588,471 UART: [fwproc] Received command 0x46574c44
1,589,262 UART: [fwproc] Received Image of size 114360 bytes
2,885,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,692 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,043 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,324 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,734,151 >>> mbox cmd response: failed
1,734,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,157 >>> mbox cmd response: failed
1,734,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,734,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,101 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Manufacturing
85,995 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
893,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,793 UART: [kat] ++
897,945 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,171,901 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,750 UART: [idev] Erasing UDS.KEYID = 0
1,201,123 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,595 UART: [ldev] ++
1,210,763 UART: [ldev] CDI.KEYID = 6
1,211,126 UART: [ldev] SUBJECT.KEYID = 5
1,211,552 UART: [ldev] AUTHORITY.KEYID = 7
1,212,015 UART: [ldev] FE.KEYID = 1
1,217,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,486 UART: [fwproc] Wait for Commands...
1,283,194 UART: [fwproc] Recv command 0x46574c44
1,283,922 UART: [fwproc] Recv'd Img size: 114360 bytes
1,575,093 UART: ROM Fatal Error: 0x000B0027
1,576,250 >>> mbox cmd response: failed
1,576,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,256 >>> mbox cmd response: failed
1,576,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
893,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,797 UART: [kat] ++
897,949 UART: [kat] sha1
902,091 UART: [kat] SHA2-256
904,031 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,006 UART: [kat] HMAC-384Kdf
922,478 UART: [kat] LMS
1,170,806 UART: [kat] --
1,171,635 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,174,816 UART: [idev] ++
1,174,984 UART: [idev] CDI.KEYID = 6
1,175,344 UART: [idev] SUBJECT.KEYID = 7
1,175,768 UART: [idev] UDS.KEYID = 0
1,176,113 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,850 UART: [idev] Erasing UDS.KEYID = 0
1,200,461 UART: [idev] Sha1 KeyId Algorithm
1,208,853 UART: [idev] --
1,210,099 UART: [ldev] ++
1,210,267 UART: [ldev] CDI.KEYID = 6
1,210,630 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,845 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,206 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,219 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,433,795 >>> mbox cmd response: failed
1,433,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,433,801 >>> mbox cmd response: failed
1,433,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,433,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,595 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,004 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Manufacturing
86,280 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
907,173 UART: [kat] SHA2-512-ACC
909,074 UART: [kat] ECC-384
919,063 UART: [kat] HMAC-384Kdf
923,581 UART: [kat] LMS
1,171,909 UART: [kat] --
1,172,794 UART: [cold-reset] ++
1,173,164 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,885 UART: [idev] Erasing UDS.KEYID = 0
1,202,026 UART: [idev] Sha1 KeyId Algorithm
1,210,588 UART: [idev] --
1,211,794 UART: [ldev] ++
1,211,962 UART: [ldev] CDI.KEYID = 6
1,212,325 UART: [ldev] SUBJECT.KEYID = 5
1,212,751 UART: [ldev] AUTHORITY.KEYID = 7
1,213,214 UART: [ldev] FE.KEYID = 1
1,218,320 UART: [ldev] Erasing FE.KEYID = 1
1,245,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,064 UART: [ldev] --
1,284,565 UART: [fwproc] Wait for Commands...
1,285,225 UART: [fwproc] Recv command 0x46574c44
1,285,953 UART: [fwproc] Recv'd Img size: 114360 bytes
1,578,676 UART: ROM Fatal Error: 0x000B0027
1,579,833 >>> mbox cmd response: failed
1,579,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,579,839 >>> mbox cmd response: failed
1,579,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,579,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,663 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,172,560 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,713 UART: [idev] ++
1,175,881 UART: [idev] CDI.KEYID = 6
1,176,241 UART: [idev] SUBJECT.KEYID = 7
1,176,665 UART: [idev] UDS.KEYID = 0
1,177,010 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,651 UART: [idev] Erasing UDS.KEYID = 0
1,201,960 UART: [idev] Sha1 KeyId Algorithm
1,210,440 UART: [idev] --
1,211,492 UART: [ldev] ++
1,211,660 UART: [ldev] CDI.KEYID = 6
1,212,023 UART: [ldev] SUBJECT.KEYID = 5
1,212,449 UART: [ldev] AUTHORITY.KEYID = 7
1,212,912 UART: [ldev] FE.KEYID = 1
1,218,124 UART: [ldev] Erasing FE.KEYID = 1
1,245,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,156 UART: [ldev] --
1,284,459 UART: [fwproc] Wait for Commands...
1,285,151 UART: [fwproc] Recv command 0x46574c44
1,285,879 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,110 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,432,654 >>> mbox cmd response: failed
1,432,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,660 >>> mbox cmd response: failed
1,432,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,456 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,981 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,392 UART: [state] LifecycleState = Manufacturing
85,047 UART: [state] DebugLocked = No
85,619 UART: [state] WD Timer not started. Device not locked for debugging
86,874 UART: [kat] SHA2-256
890,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,553 UART: [kat] ++
894,705 UART: [kat] sha1
898,999 UART: [kat] SHA2-256
900,939 UART: [kat] SHA2-384
903,784 UART: [kat] SHA2-512-ACC
905,685 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
920,102 UART: [kat] LMS
1,168,414 UART: [kat] --
1,169,003 UART: [cold-reset] ++
1,169,493 UART: [fht] FHT @ 0x50003400
1,172,161 UART: [idev] ++
1,172,329 UART: [idev] CDI.KEYID = 6
1,172,690 UART: [idev] SUBJECT.KEYID = 7
1,173,115 UART: [idev] UDS.KEYID = 0
1,173,461 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,191 UART: [idev] Erasing UDS.KEYID = 0
1,197,695 UART: [idev] Sha1 KeyId Algorithm
1,206,457 UART: [idev] --
1,207,496 UART: [ldev] ++
1,207,664 UART: [ldev] CDI.KEYID = 6
1,208,028 UART: [ldev] SUBJECT.KEYID = 5
1,208,455 UART: [ldev] AUTHORITY.KEYID = 7
1,208,918 UART: [ldev] FE.KEYID = 1
1,214,090 UART: [ldev] Erasing FE.KEYID = 1
1,240,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,198 UART: [ldev] --
1,279,702 UART: [fwproc] Wait for Commands...
1,280,347 UART: [fwproc] Recv command 0x46574c44
1,281,080 UART: [fwproc] Recv'd Img size: 114360 bytes
1,572,191 UART: ROM Fatal Error: 0x000B0027
1,573,348 >>> mbox cmd response: failed
1,573,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,354 >>> mbox cmd response: failed
1,573,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,355 UART: [idev] ++
1,173,523 UART: [idev] CDI.KEYID = 6
1,173,884 UART: [idev] SUBJECT.KEYID = 7
1,174,309 UART: [idev] UDS.KEYID = 0
1,174,655 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,827 UART: [idev] Erasing UDS.KEYID = 0
1,200,173 UART: [idev] Sha1 KeyId Algorithm
1,209,155 UART: [idev] --
1,210,002 UART: [ldev] ++
1,210,170 UART: [ldev] CDI.KEYID = 6
1,210,534 UART: [ldev] SUBJECT.KEYID = 5
1,210,961 UART: [ldev] AUTHORITY.KEYID = 7
1,211,424 UART: [ldev] FE.KEYID = 1
1,216,580 UART: [ldev] Erasing FE.KEYID = 1
1,242,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,840 UART: [ldev] --
1,282,198 UART: [fwproc] Wait for Commands...
1,283,021 UART: [fwproc] Recv command 0x46574c44
1,283,754 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,129 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,400 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,341 >>> mbox cmd response: failed
1,426,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,347 >>> mbox cmd response: failed
1,426,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,457 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Manufacturing
86,420 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
891,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,024 UART: [kat] ++
896,176 UART: [kat] sha1
900,618 UART: [kat] SHA2-256
902,558 UART: [kat] SHA2-384
905,361 UART: [kat] SHA2-512-ACC
907,262 UART: [kat] ECC-384
917,149 UART: [kat] HMAC-384Kdf
921,731 UART: [kat] LMS
1,170,043 UART: [kat] --
1,170,984 UART: [cold-reset] ++
1,171,542 UART: [fht] FHT @ 0x50003400
1,174,112 UART: [idev] ++
1,174,280 UART: [idev] CDI.KEYID = 6
1,174,641 UART: [idev] SUBJECT.KEYID = 7
1,175,066 UART: [idev] UDS.KEYID = 0
1,175,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,862 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,457 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,839 UART: [fwproc] Wait for Commands...
1,282,516 UART: [fwproc] Recv command 0x46574c44
1,283,249 UART: [fwproc] Recv'd Img size: 114360 bytes
1,574,944 UART: ROM Fatal Error: 0x000B0027
1,576,101 >>> mbox cmd response: failed
1,576,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,107 >>> mbox cmd response: failed
1,576,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,222 UART: [fht] FHT @ 0x50003400
1,172,630 UART: [idev] ++
1,172,798 UART: [idev] CDI.KEYID = 6
1,173,159 UART: [idev] SUBJECT.KEYID = 7
1,173,584 UART: [idev] UDS.KEYID = 0
1,173,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,468 UART: [idev] Erasing UDS.KEYID = 0
1,198,940 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,697 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46574c44
1,283,145 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,430 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,099 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,428,314 >>> mbox cmd response: failed
1,428,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,320 >>> mbox cmd response: failed
1,428,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,776 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,111 UART:
192,487 UART: Running Caliptra ROM ...
193,582 UART:
193,744 UART: [state] CFI Enabled
266,152 UART: [state] LifecycleState = Unprovisioned
268,066 UART: [state] DebugLocked = No
270,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,927 UART: [kat] SHA2-256
444,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,107 UART: [kat] ++
455,693 UART: [kat] sha1
467,224 UART: [kat] SHA2-256
469,955 UART: [kat] SHA2-384
475,283 UART: [kat] SHA2-512-ACC
477,674 UART: [kat] ECC-384
2,767,243 UART: [kat] HMAC-384Kdf
2,799,794 UART: [kat] LMS
3,990,148 UART: [kat] --
3,994,195 UART: [cold-reset] ++
3,995,932 UART: [fht] Storing FHT @ 0x50003400
4,008,767 UART: [idev] ++
4,009,338 UART: [idev] CDI.KEYID = 6
4,010,279 UART: [idev] SUBJECT.KEYID = 7
4,011,547 UART: [idev] UDS.KEYID = 0
4,014,037 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,098 UART: [idev] Erasing UDS.KEYID = 0
7,347,383 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,274 UART: [idev] --
7,372,430 UART: [ldev] ++
7,373,007 UART: [ldev] CDI.KEYID = 6
7,373,979 UART: [ldev] SUBJECT.KEYID = 5
7,375,191 UART: [ldev] AUTHORITY.KEYID = 7
7,376,478 UART: [ldev] FE.KEYID = 1
7,421,860 UART: [ldev] Erasing FE.KEYID = 1
10,748,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,658 UART: [ldev] --
13,111,598 UART: [fwproc] Waiting for Commands...
13,114,502 UART: [fwproc] Received command 0x46574c44
13,116,686 UART: [fwproc] Received Image of size 114036 bytes
15,821,538 UART: ROM Fatal Error: 0x000B002F
15,824,992 >>> mbox cmd response: failed
15,825,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,825,647 >>> mbox cmd response: failed
15,825,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,205 >>> mbox cmd response: failed
Initializing fuses
2,055,408 writing to cptra_bootfsm_go
2,244,712 UART:
2,245,065 UART: Running Caliptra ROM ...
2,246,206 UART:
2,246,372 UART: [state] CFI Enabled
2,301,919 UART: [state] LifecycleState = Unprovisioned
2,303,856 UART: [state] DebugLocked = No
2,305,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,310,149 UART: [kat] SHA2-256
2,479,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,490,323 UART: [kat] ++
2,490,825 UART: [kat] sha1
2,501,825 UART: [kat] SHA2-256
2,504,516 UART: [kat] SHA2-384
2,508,881 UART: [kat] SHA2-512-ACC
2,511,199 UART: [kat] ECC-384
4,803,741 UART: [kat] HMAC-384Kdf
4,816,834 UART: [kat] LMS
6,007,154 UART: [kat] --
6,010,372 UART: [cold-reset] ++
6,011,879 UART: [fht] Storing FHT @ 0x50003400
6,022,768 UART: [idev] ++
6,023,333 UART: [idev] CDI.KEYID = 6
6,024,246 UART: [idev] SUBJECT.KEYID = 7
6,025,518 UART: [idev] UDS.KEYID = 0
6,027,856 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,171,429 UART: [idev] Erasing UDS.KEYID = 0
9,362,736 UART: [idev] Using Sha1 for KeyId Algorithm
9,385,043 UART: [idev] --
9,389,798 UART: [ldev] ++
9,390,371 UART: [ldev] CDI.KEYID = 6
9,391,356 UART: [ldev] SUBJECT.KEYID = 5
9,392,567 UART: [ldev] AUTHORITY.KEYID = 7
9,393,807 UART: [ldev] FE.KEYID = 1
9,439,195 UART: [ldev] Erasing FE.KEYID = 1
12,771,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,099,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,114,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,146,677 UART: [ldev] --
15,151,079 UART: [fwproc] Waiting for Commands...
15,153,987 UART: [fwproc] Received command 0x46574c44
15,156,174 UART: [fwproc] Received Image of size 114036 bytes
19,210,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,288,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,357,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,674,800 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,804,391 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,543,212 >>> mbox cmd response: failed
15,543,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,544,145 >>> mbox cmd response: failed
15,544,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,544,703 >>> mbox cmd response: failed
Initializing fuses
2,056,009 writing to cptra_bootfsm_go
5,838,391 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,927,369 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
192,609 UART:
192,973 UART: Running Caliptra ROM ...
194,084 UART:
603,898 UART: [state] CFI Enabled
617,662 UART: [state] LifecycleState = Unprovisioned
619,599 UART: [state] DebugLocked = No
622,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,170 UART: [kat] SHA2-256
797,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,460 UART: [kat] ++
808,903 UART: [kat] sha1
818,594 UART: [kat] SHA2-256
821,353 UART: [kat] SHA2-384
826,412 UART: [kat] SHA2-512-ACC
828,747 UART: [kat] ECC-384
3,114,672 UART: [kat] HMAC-384Kdf
3,127,537 UART: [kat] LMS
4,317,643 UART: [kat] --
4,323,889 UART: [cold-reset] ++
4,324,919 UART: [fht] Storing FHT @ 0x50003400
4,335,221 UART: [idev] ++
4,335,790 UART: [idev] CDI.KEYID = 6
4,336,758 UART: [idev] SUBJECT.KEYID = 7
4,337,978 UART: [idev] UDS.KEYID = 0
4,340,649 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,191 UART: [idev] Erasing UDS.KEYID = 0
7,618,356 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,985 UART: [idev] --
7,644,225 UART: [ldev] ++
7,644,828 UART: [ldev] CDI.KEYID = 6
7,645,742 UART: [ldev] SUBJECT.KEYID = 5
7,646,962 UART: [ldev] AUTHORITY.KEYID = 7
7,648,252 UART: [ldev] FE.KEYID = 1
7,659,761 UART: [ldev] Erasing FE.KEYID = 1
10,944,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,196 UART: [ldev] --
13,304,972 UART: [fwproc] Waiting for Commands...
13,307,122 UART: [fwproc] Received command 0x46574c44
13,309,310 UART: [fwproc] Received Image of size 114036 bytes
16,013,869 UART: ROM Fatal Error: 0x000B002F
16,017,340 >>> mbox cmd response: failed
16,017,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,018,103 >>> mbox cmd response: failed
16,018,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,018,676 >>> mbox cmd response: failed
Initializing fuses
2,055,290 writing to cptra_bootfsm_go
2,244,603 UART:
2,244,953 UART: Running Caliptra ROM ...
2,246,102 UART:
4,452,410 UART: [state] CFI Enabled
4,463,052 UART: [state] LifecycleState = Unprovisioned
4,465,017 UART: [state] DebugLocked = No
4,468,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,473,485 UART: [kat] SHA2-256
4,643,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,653,750 UART: [kat] ++
4,654,214 UART: [kat] sha1
4,665,805 UART: [kat] SHA2-256
4,668,546 UART: [kat] SHA2-384
4,674,924 UART: [kat] SHA2-512-ACC
4,677,275 UART: [kat] ECC-384
6,960,455 UART: [kat] HMAC-384Kdf
6,972,571 UART: [kat] LMS
8,162,726 UART: [kat] --
8,167,668 UART: [cold-reset] ++
8,168,963 UART: [fht] Storing FHT @ 0x50003400
8,179,912 UART: [idev] ++
8,180,481 UART: [idev] CDI.KEYID = 6
8,181,502 UART: [idev] SUBJECT.KEYID = 7
8,182,686 UART: [idev] UDS.KEYID = 0
8,185,169 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,328,352 UART: [idev] Erasing UDS.KEYID = 0
11,473,340 UART: [idev] Using Sha1 for KeyId Algorithm
11,495,255 UART: [idev] --
11,498,869 UART: [ldev] ++
11,499,442 UART: [ldev] CDI.KEYID = 6
11,500,457 UART: [ldev] SUBJECT.KEYID = 5
11,501,661 UART: [ldev] AUTHORITY.KEYID = 7
11,502,894 UART: [ldev] FE.KEYID = 1
11,513,492 UART: [ldev] Erasing FE.KEYID = 1
14,801,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,091,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,106,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,120,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,135,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,155,829 UART: [ldev] --
17,159,863 UART: [fwproc] Waiting for Commands...
17,162,938 UART: [fwproc] Received command 0x46574c44
17,165,124 UART: [fwproc] Received Image of size 114036 bytes
21,218,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,294,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,363,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,681,305 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,123,362 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,763,160 >>> mbox cmd response: failed
15,763,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,081 >>> mbox cmd response: failed
15,764,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,649 >>> mbox cmd response: failed
Initializing fuses
2,058,131 writing to cptra_bootfsm_go
8,233,235 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,173,009 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,334 UART:
192,719 UART: Running Caliptra ROM ...
193,868 UART:
194,019 UART: [state] CFI Enabled
264,468 UART: [state] LifecycleState = Unprovisioned
266,345 UART: [state] DebugLocked = No
268,021 UART: [state] WD Timer not started. Device not locked for debugging
272,178 UART: [kat] SHA2-256
451,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,859 UART: [kat] ++
463,309 UART: [kat] sha1
472,993 UART: [kat] SHA2-256
476,002 UART: [kat] SHA2-384
482,313 UART: [kat] SHA2-512-ACC
485,255 UART: [kat] ECC-384
2,948,189 UART: [kat] HMAC-384Kdf
2,971,008 UART: [kat] LMS
3,500,467 UART: [kat] --
3,504,629 UART: [cold-reset] ++
3,506,509 UART: [fht] FHT @ 0x50003400
3,517,654 UART: [idev] ++
3,518,222 UART: [idev] CDI.KEYID = 6
3,519,167 UART: [idev] SUBJECT.KEYID = 7
3,520,332 UART: [idev] UDS.KEYID = 0
3,523,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,068 UART: [idev] Erasing UDS.KEYID = 0
6,025,766 UART: [idev] Sha1 KeyId Algorithm
6,047,661 UART: [idev] --
6,051,448 UART: [ldev] ++
6,052,026 UART: [ldev] CDI.KEYID = 6
6,052,945 UART: [ldev] SUBJECT.KEYID = 5
6,054,111 UART: [ldev] AUTHORITY.KEYID = 7
6,055,392 UART: [ldev] FE.KEYID = 1
6,101,094 UART: [ldev] Erasing FE.KEYID = 1
8,604,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,051 UART: [ldev] --
10,415,323 UART: [fwproc] Wait for Commands...
10,417,040 UART: [fwproc] Recv command 0x46574c44
10,419,138 UART: [fwproc] Recv'd Img size: 114360 bytes
12,468,350 UART: ROM Fatal Error: 0x000B002F
12,471,427 >>> mbox cmd response: failed
12,471,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,187 >>> mbox cmd response: failed
12,472,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,794 >>> mbox cmd response: failed
Initializing fuses
2,052,838 writing to cptra_bootfsm_go
2,242,168 UART:
2,242,532 UART: Running Caliptra ROM ...
2,243,613 UART:
2,243,777 UART: [state] CFI Enabled
2,316,879 UART: [state] LifecycleState = Unprovisioned
2,318,764 UART: [state] DebugLocked = No
2,320,850 UART: [state] WD Timer not started. Device not locked for debugging
2,324,326 UART: [kat] SHA2-256
2,503,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,024 UART: [kat] ++
2,515,574 UART: [kat] sha1
2,525,767 UART: [kat] SHA2-256
2,528,788 UART: [kat] SHA2-384
2,534,130 UART: [kat] SHA2-512-ACC
2,537,131 UART: [kat] ECC-384
5,001,546 UART: [kat] HMAC-384Kdf
5,023,781 UART: [kat] LMS
5,553,283 UART: [kat] --
5,557,497 UART: [cold-reset] ++
5,559,430 UART: [fht] FHT @ 0x50003400
5,570,787 UART: [idev] ++
5,571,352 UART: [idev] CDI.KEYID = 6
5,572,264 UART: [idev] SUBJECT.KEYID = 7
5,573,482 UART: [idev] UDS.KEYID = 0
5,575,636 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,719,561 UART: [idev] Erasing UDS.KEYID = 0
8,082,232 UART: [idev] Sha1 KeyId Algorithm
8,105,039 UART: [idev] --
8,108,121 UART: [ldev] ++
8,108,697 UART: [ldev] CDI.KEYID = 6
8,109,608 UART: [ldev] SUBJECT.KEYID = 5
8,110,769 UART: [ldev] AUTHORITY.KEYID = 7
8,112,002 UART: [ldev] FE.KEYID = 1
8,153,570 UART: [ldev] Erasing FE.KEYID = 1
10,657,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,824 UART: [ldev] --
12,467,984 UART: [fwproc] Wait for Commands...
12,469,851 UART: [fwproc] Recv command 0x46574c44
12,471,955 UART: [fwproc] Recv'd Img size: 114360 bytes
15,879,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,956,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,025,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,342,766 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,085 UART:
192,479 UART: Running Caliptra ROM ...
193,695 UART:
193,850 UART: [state] CFI Enabled
265,010 UART: [state] LifecycleState = Unprovisioned
267,430 UART: [state] DebugLocked = No
269,952 UART: [state] WD Timer not started. Device not locked for debugging
275,319 UART: [kat] SHA2-256
465,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,931 UART: [kat] ++
476,410 UART: [kat] sha1
487,612 UART: [kat] SHA2-256
490,665 UART: [kat] SHA2-384
496,165 UART: [kat] SHA2-512-ACC
498,779 UART: [kat] ECC-384
2,944,485 UART: [kat] HMAC-384Kdf
2,971,900 UART: [kat] LMS
3,503,701 UART: [kat] --
3,507,877 UART: [cold-reset] ++
3,509,868 UART: [fht] FHT @ 0x50003400
3,521,935 UART: [idev] ++
3,522,673 UART: [idev] CDI.KEYID = 6
3,523,558 UART: [idev] SUBJECT.KEYID = 7
3,525,148 UART: [idev] UDS.KEYID = 0
3,528,094 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,997 UART: [idev] Erasing UDS.KEYID = 0
6,028,146 UART: [idev] Sha1 KeyId Algorithm
6,051,067 UART: [idev] --
6,055,337 UART: [ldev] ++
6,056,023 UART: [ldev] CDI.KEYID = 6
6,056,948 UART: [ldev] SUBJECT.KEYID = 5
6,058,110 UART: [ldev] AUTHORITY.KEYID = 7
6,059,298 UART: [ldev] FE.KEYID = 1
6,100,981 UART: [ldev] Erasing FE.KEYID = 1
8,605,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,048 UART: [ldev] --
10,414,951 UART: [fwproc] Wait for Commands...
10,417,274 UART: [fwproc] Recv command 0x46574c44
10,419,595 UART: [fwproc] Recv'd Img size: 114360 bytes
12,500,331 UART: ROM Fatal Error: 0x000B002F
12,503,949 >>> mbox cmd response: failed
12,504,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,604 >>> mbox cmd response: failed
12,504,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,208 >>> mbox cmd response: failed
Initializing fuses
2,055,295 writing to cptra_bootfsm_go
2,244,665 UART:
2,245,138 UART: Running Caliptra ROM ...
2,246,188 UART:
2,246,348 UART: [state] CFI Enabled
2,307,684 UART: [state] LifecycleState = Unprovisioned
2,310,065 UART: [state] DebugLocked = No
2,312,110 UART: [state] WD Timer not started. Device not locked for debugging
2,317,385 UART: [kat] SHA2-256
2,507,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,065 UART: [kat] ++
2,518,523 UART: [kat] sha1
2,529,845 UART: [kat] SHA2-256
2,532,835 UART: [kat] SHA2-384
2,539,786 UART: [kat] SHA2-512-ACC
2,542,395 UART: [kat] ECC-384
4,992,132 UART: [kat] HMAC-384Kdf
5,013,755 UART: [kat] LMS
5,545,505 UART: [kat] --
5,548,927 UART: [cold-reset] ++
5,551,253 UART: [fht] FHT @ 0x50003400
5,563,640 UART: [idev] ++
5,564,319 UART: [idev] CDI.KEYID = 6
5,565,339 UART: [idev] SUBJECT.KEYID = 7
5,566,441 UART: [idev] UDS.KEYID = 0
5,568,674 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,712,638 UART: [idev] Erasing UDS.KEYID = 0
8,071,991 UART: [idev] Sha1 KeyId Algorithm
8,095,449 UART: [idev] --
8,100,122 UART: [ldev] ++
8,100,812 UART: [ldev] CDI.KEYID = 6
8,101,721 UART: [ldev] SUBJECT.KEYID = 5
8,102,881 UART: [ldev] AUTHORITY.KEYID = 7
8,104,116 UART: [ldev] FE.KEYID = 1
8,142,692 UART: [ldev] Erasing FE.KEYID = 1
10,649,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,624 UART: [ldev] --
12,445,462 UART: [fwproc] Wait for Commands...
12,447,358 UART: [fwproc] Recv command 0x46574c44
12,449,645 UART: [fwproc] Recv'd Img size: 114360 bytes
15,890,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,969,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,085,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,628,180 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,442,633 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,298,787 >>> mbox cmd response: failed
12,299,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,754 >>> mbox cmd response: failed
12,300,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,300,326 >>> mbox cmd response: failed
Initializing fuses
2,056,256 writing to cptra_bootfsm_go
5,493,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,794,255 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,171 UART:
192,524 UART: Running Caliptra ROM ...
193,628 UART:
603,212 UART: [state] CFI Enabled
616,326 UART: [state] LifecycleState = Unprovisioned
618,749 UART: [state] DebugLocked = No
621,609 UART: [state] WD Timer not started. Device not locked for debugging
626,615 UART: [kat] SHA2-256
816,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,273 UART: [kat] ++
827,778 UART: [kat] sha1
838,872 UART: [kat] SHA2-256
841,876 UART: [kat] SHA2-384
847,204 UART: [kat] SHA2-512-ACC
849,830 UART: [kat] ECC-384
3,292,476 UART: [kat] HMAC-384Kdf
3,306,432 UART: [kat] LMS
3,838,242 UART: [kat] --
3,843,550 UART: [cold-reset] ++
3,844,506 UART: [fht] FHT @ 0x50003400
3,855,787 UART: [idev] ++
3,856,456 UART: [idev] CDI.KEYID = 6
3,857,392 UART: [idev] SUBJECT.KEYID = 7
3,858,600 UART: [idev] UDS.KEYID = 0
3,861,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,004 UART: [idev] Erasing UDS.KEYID = 0
6,335,063 UART: [idev] Sha1 KeyId Algorithm
6,356,351 UART: [idev] --
6,361,476 UART: [ldev] ++
6,362,152 UART: [ldev] CDI.KEYID = 6
6,363,050 UART: [ldev] SUBJECT.KEYID = 5
6,364,164 UART: [ldev] AUTHORITY.KEYID = 7
6,365,371 UART: [ldev] FE.KEYID = 1
6,377,118 UART: [ldev] Erasing FE.KEYID = 1
8,855,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,101 UART: [ldev] --
10,646,330 UART: [fwproc] Wait for Commands...
10,648,583 UART: [fwproc] Recv command 0x46574c44
10,650,841 UART: [fwproc] Recv'd Img size: 114360 bytes
12,737,600 UART: ROM Fatal Error: 0x000B002F
12,741,257 >>> mbox cmd response: failed
12,741,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,011 >>> mbox cmd response: failed
12,742,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,618 >>> mbox cmd response: failed
Initializing fuses
2,062,403 writing to cptra_bootfsm_go
2,251,733 UART:
2,252,081 UART: Running Caliptra ROM ...
2,253,227 UART:
7,729,857 UART: [state] CFI Enabled
7,744,870 UART: [state] LifecycleState = Unprovisioned
7,747,260 UART: [state] DebugLocked = No
7,748,548 UART: [state] WD Timer not started. Device not locked for debugging
7,752,571 UART: [kat] SHA2-256
7,942,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,953,271 UART: [kat] ++
7,953,791 UART: [kat] sha1
7,964,838 UART: [kat] SHA2-256
7,967,861 UART: [kat] SHA2-384
7,973,149 UART: [kat] SHA2-512-ACC
7,975,694 UART: [kat] ECC-384
10,418,979 UART: [kat] HMAC-384Kdf
10,432,393 UART: [kat] LMS
10,964,237 UART: [kat] --
10,968,941 UART: [cold-reset] ++
10,970,713 UART: [fht] FHT @ 0x50003400
10,983,577 UART: [idev] ++
10,984,309 UART: [idev] CDI.KEYID = 6
10,985,324 UART: [idev] SUBJECT.KEYID = 7
10,986,425 UART: [idev] UDS.KEYID = 0
10,988,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,132,359 UART: [idev] Erasing UDS.KEYID = 0
13,460,586 UART: [idev] Sha1 KeyId Algorithm
13,482,845 UART: [idev] --
13,488,345 UART: [ldev] ++
13,489,018 UART: [ldev] CDI.KEYID = 6
13,490,085 UART: [ldev] SUBJECT.KEYID = 5
13,491,189 UART: [ldev] AUTHORITY.KEYID = 7
13,492,571 UART: [ldev] FE.KEYID = 1
13,503,177 UART: [ldev] Erasing FE.KEYID = 1
15,980,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,716,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,731,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,746,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,767,282 UART: [ldev] --
17,771,951 UART: [fwproc] Wait for Commands...
17,774,292 UART: [fwproc] Recv command 0x46574c44
17,776,608 UART: [fwproc] Recv'd Img size: 114360 bytes
21,222,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,297,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,413,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,956,577 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
3,752,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,511,310 >>> mbox cmd response: failed
12,511,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,512,245 >>> mbox cmd response: failed
12,512,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,512,808 >>> mbox cmd response: failed
Initializing fuses
2,054,880 writing to cptra_bootfsm_go
11,113,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,310,692 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,179 UART: [kat] SHA2-256
882,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,225 UART: [kat] ++
886,377 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
902,452 UART: [kat] HMAC-384Kdf
906,960 UART: [kat] LMS
1,475,156 UART: [kat] --
1,475,907 UART: [cold-reset] ++
1,476,457 UART: [fht] Storing FHT @ 0x50003400
1,479,178 UART: [idev] ++
1,479,346 UART: [idev] CDI.KEYID = 6
1,479,706 UART: [idev] SUBJECT.KEYID = 7
1,480,130 UART: [idev] UDS.KEYID = 0
1,480,475 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,510 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,986 UART: [idev] --
1,513,991 UART: [ldev] ++
1,514,159 UART: [ldev] CDI.KEYID = 6
1,514,522 UART: [ldev] SUBJECT.KEYID = 5
1,514,948 UART: [ldev] AUTHORITY.KEYID = 7
1,515,411 UART: [ldev] FE.KEYID = 1
1,520,485 UART: [ldev] Erasing FE.KEYID = 1
1,545,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,248 UART: [ldev] --
1,585,683 UART: [fwproc] Waiting for Commands...
1,586,528 UART: [fwproc] Received command 0x46574c44
1,587,319 UART: [fwproc] Received Image of size 114360 bytes
1,634,687 UART: ROM Fatal Error: 0x000B002F
1,635,846 >>> mbox cmd response: failed
1,635,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,852 >>> mbox cmd response: failed
1,635,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,195 UART: [kat] SHA2-256
892,133 UART: [kat] SHA2-384
895,044 UART: [kat] SHA2-512-ACC
896,945 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,043 UART: [cold-reset] ++
1,476,499 UART: [fht] Storing FHT @ 0x50003400
1,479,378 UART: [idev] ++
1,479,546 UART: [idev] CDI.KEYID = 6
1,479,906 UART: [idev] SUBJECT.KEYID = 7
1,480,330 UART: [idev] UDS.KEYID = 0
1,480,675 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,504,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,930 UART: [idev] --
1,513,853 UART: [ldev] ++
1,514,021 UART: [ldev] CDI.KEYID = 6
1,514,384 UART: [ldev] SUBJECT.KEYID = 5
1,514,810 UART: [ldev] AUTHORITY.KEYID = 7
1,515,273 UART: [ldev] FE.KEYID = 1
1,520,631 UART: [ldev] Erasing FE.KEYID = 1
1,545,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,212 UART: [ldev] --
1,584,627 UART: [fwproc] Waiting for Commands...
1,585,292 UART: [fwproc] Received command 0x46574c44
1,586,083 UART: [fwproc] Received Image of size 114360 bytes
2,883,965 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,075,868 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,609 >>> mbox cmd response: failed
1,489,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,615 >>> mbox cmd response: failed
1,489,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,621 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,407 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,720 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
903,255 UART: [kat] HMAC-384Kdf
907,931 UART: [kat] LMS
1,476,127 UART: [kat] --
1,476,968 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,157 UART: [idev] ++
1,480,325 UART: [idev] CDI.KEYID = 6
1,480,685 UART: [idev] SUBJECT.KEYID = 7
1,481,109 UART: [idev] UDS.KEYID = 0
1,481,454 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,506,007 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,507 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,486 UART: [ldev] Erasing FE.KEYID = 1
1,547,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,615 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 114360 bytes
1,635,702 UART: ROM Fatal Error: 0x000B002F
1,636,861 >>> mbox cmd response: failed
1,636,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,867 >>> mbox cmd response: failed
1,636,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,893 UART: [state] LifecycleState = Unprovisioned
85,548 UART: [state] DebugLocked = No
86,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,920 UART: [kat] SHA2-256
881,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,966 UART: [kat] ++
886,118 UART: [kat] sha1
890,234 UART: [kat] SHA2-256
892,172 UART: [kat] SHA2-384
894,849 UART: [kat] SHA2-512-ACC
896,750 UART: [kat] ECC-384
902,141 UART: [kat] HMAC-384Kdf
906,727 UART: [kat] LMS
1,474,923 UART: [kat] --
1,475,562 UART: [cold-reset] ++
1,476,022 UART: [fht] Storing FHT @ 0x50003400
1,478,781 UART: [idev] ++
1,478,949 UART: [idev] CDI.KEYID = 6
1,479,309 UART: [idev] SUBJECT.KEYID = 7
1,479,733 UART: [idev] UDS.KEYID = 0
1,480,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,731 UART: [idev] Erasing UDS.KEYID = 0
1,504,075 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,617 UART: [idev] --
1,513,756 UART: [ldev] ++
1,513,924 UART: [ldev] CDI.KEYID = 6
1,514,287 UART: [ldev] SUBJECT.KEYID = 5
1,514,713 UART: [ldev] AUTHORITY.KEYID = 7
1,515,176 UART: [ldev] FE.KEYID = 1
1,520,070 UART: [ldev] Erasing FE.KEYID = 1
1,545,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,675 UART: [ldev] --
1,584,994 UART: [fwproc] Waiting for Commands...
1,585,615 UART: [fwproc] Received command 0x46574c44
1,586,406 UART: [fwproc] Received Image of size 114360 bytes
2,884,006 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,332 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,653 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,466 >>> mbox cmd response: failed
1,488,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,472 >>> mbox cmd response: failed
1,488,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,534 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,043 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
893,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,225 UART: [kat] ++
897,377 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
917,992 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,227 UART: [fht] FHT @ 0x50003400
1,174,842 UART: [idev] ++
1,175,010 UART: [idev] CDI.KEYID = 6
1,175,370 UART: [idev] SUBJECT.KEYID = 7
1,175,794 UART: [idev] UDS.KEYID = 0
1,176,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,201,015 UART: [idev] Sha1 KeyId Algorithm
1,209,541 UART: [idev] --
1,210,633 UART: [ldev] ++
1,210,801 UART: [ldev] CDI.KEYID = 6
1,211,164 UART: [ldev] SUBJECT.KEYID = 5
1,211,590 UART: [ldev] AUTHORITY.KEYID = 7
1,212,053 UART: [ldev] FE.KEYID = 1
1,217,495 UART: [ldev] Erasing FE.KEYID = 1
1,243,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,845 UART: [ldev] --
1,283,214 UART: [fwproc] Wait for Commands...
1,283,926 UART: [fwproc] Recv command 0x46574c44
1,284,654 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,588 UART: ROM Fatal Error: 0x000B002F
1,333,747 >>> mbox cmd response: failed
1,333,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,753 >>> mbox cmd response: failed
1,333,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,014 UART: [kat] SHA2-256
893,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,789 UART: [kat] ++
897,941 UART: [kat] sha1
902,279 UART: [kat] SHA2-256
904,219 UART: [kat] SHA2-384
907,072 UART: [kat] SHA2-512-ACC
908,973 UART: [kat] ECC-384
918,612 UART: [kat] HMAC-384Kdf
923,158 UART: [kat] LMS
1,171,486 UART: [kat] --
1,172,433 UART: [cold-reset] ++
1,172,857 UART: [fht] FHT @ 0x50003400
1,175,406 UART: [idev] ++
1,175,574 UART: [idev] CDI.KEYID = 6
1,175,934 UART: [idev] SUBJECT.KEYID = 7
1,176,358 UART: [idev] UDS.KEYID = 0
1,176,703 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,358 UART: [idev] Erasing UDS.KEYID = 0
1,201,337 UART: [idev] Sha1 KeyId Algorithm
1,209,847 UART: [idev] --
1,210,909 UART: [ldev] ++
1,211,077 UART: [ldev] CDI.KEYID = 6
1,211,440 UART: [ldev] SUBJECT.KEYID = 5
1,211,866 UART: [ldev] AUTHORITY.KEYID = 7
1,212,329 UART: [ldev] FE.KEYID = 1
1,217,501 UART: [ldev] Erasing FE.KEYID = 1
1,244,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,851 UART: [ldev] --
1,283,274 UART: [fwproc] Wait for Commands...
1,284,060 UART: [fwproc] Recv command 0x46574c44
1,284,788 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,069 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,186,840 >>> mbox cmd response: failed
1,186,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,846 >>> mbox cmd response: failed
1,186,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,370 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,630 UART: [kat] SHA2-256
904,570 UART: [kat] SHA2-384
907,263 UART: [kat] SHA2-512-ACC
909,164 UART: [kat] ECC-384
919,041 UART: [kat] HMAC-384Kdf
923,807 UART: [kat] LMS
1,172,135 UART: [kat] --
1,172,954 UART: [cold-reset] ++
1,173,324 UART: [fht] FHT @ 0x50003400
1,176,105 UART: [idev] ++
1,176,273 UART: [idev] CDI.KEYID = 6
1,176,633 UART: [idev] SUBJECT.KEYID = 7
1,177,057 UART: [idev] UDS.KEYID = 0
1,177,402 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,053 UART: [idev] Erasing UDS.KEYID = 0
1,201,816 UART: [idev] Sha1 KeyId Algorithm
1,210,488 UART: [idev] --
1,211,496 UART: [ldev] ++
1,211,664 UART: [ldev] CDI.KEYID = 6
1,212,027 UART: [ldev] SUBJECT.KEYID = 5
1,212,453 UART: [ldev] AUTHORITY.KEYID = 7
1,212,916 UART: [ldev] FE.KEYID = 1
1,218,158 UART: [ldev] Erasing FE.KEYID = 1
1,244,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,816 UART: [ldev] --
1,284,229 UART: [fwproc] Wait for Commands...
1,284,855 UART: [fwproc] Recv command 0x46574c44
1,285,583 UART: [fwproc] Recv'd Img size: 114360 bytes
1,333,499 UART: ROM Fatal Error: 0x000B002F
1,334,658 >>> mbox cmd response: failed
1,334,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,664 >>> mbox cmd response: failed
1,334,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,479 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,172,104 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,339 UART: [idev] ++
1,175,507 UART: [idev] CDI.KEYID = 6
1,175,867 UART: [idev] SUBJECT.KEYID = 7
1,176,291 UART: [idev] UDS.KEYID = 0
1,176,636 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,855 UART: [idev] Erasing UDS.KEYID = 0
1,200,744 UART: [idev] Sha1 KeyId Algorithm
1,209,278 UART: [idev] --
1,210,346 UART: [ldev] ++
1,210,514 UART: [ldev] CDI.KEYID = 6
1,210,877 UART: [ldev] SUBJECT.KEYID = 5
1,211,303 UART: [ldev] AUTHORITY.KEYID = 7
1,211,766 UART: [ldev] FE.KEYID = 1
1,217,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,782 UART: [ldev] --
1,283,269 UART: [fwproc] Wait for Commands...
1,283,999 UART: [fwproc] Recv command 0x46574c44
1,284,727 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,578 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,218 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,186,857 >>> mbox cmd response: failed
1,186,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,863 >>> mbox cmd response: failed
1,186,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,470 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,307 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,672 UART: [kat] HMAC-384Kdf
921,122 UART: [kat] LMS
1,169,434 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,595 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,145 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,208,044 UART: [ldev] ++
1,208,212 UART: [ldev] CDI.KEYID = 6
1,208,576 UART: [ldev] SUBJECT.KEYID = 5
1,209,003 UART: [ldev] AUTHORITY.KEYID = 7
1,209,466 UART: [ldev] FE.KEYID = 1
1,214,664 UART: [ldev] Erasing FE.KEYID = 1
1,240,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,148 UART: [ldev] --
1,279,574 UART: [fwproc] Wait for Commands...
1,280,239 UART: [fwproc] Recv command 0x46574c44
1,280,972 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,923 UART: ROM Fatal Error: 0x000B002F
1,329,082 >>> mbox cmd response: failed
1,329,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,088 >>> mbox cmd response: failed
1,329,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,777 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,173,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,347 UART: [idev] Erasing UDS.KEYID = 0
1,198,069 UART: [idev] Sha1 KeyId Algorithm
1,206,749 UART: [idev] --
1,207,940 UART: [ldev] ++
1,208,108 UART: [ldev] CDI.KEYID = 6
1,208,472 UART: [ldev] SUBJECT.KEYID = 5
1,208,899 UART: [ldev] AUTHORITY.KEYID = 7
1,209,362 UART: [ldev] FE.KEYID = 1
1,214,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,406 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,323 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,097 >>> mbox cmd response: failed
1,183,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,103 >>> mbox cmd response: failed
1,183,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,515 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,382 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,546 UART: [idev] ++
1,172,714 UART: [idev] CDI.KEYID = 6
1,173,075 UART: [idev] SUBJECT.KEYID = 7
1,173,500 UART: [idev] UDS.KEYID = 0
1,173,846 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,146 UART: [idev] Erasing UDS.KEYID = 0
1,198,626 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,657 UART: [ldev] ++
1,208,825 UART: [ldev] CDI.KEYID = 6
1,209,189 UART: [ldev] SUBJECT.KEYID = 5
1,209,616 UART: [ldev] AUTHORITY.KEYID = 7
1,210,079 UART: [ldev] FE.KEYID = 1
1,215,087 UART: [ldev] Erasing FE.KEYID = 1
1,241,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,605 UART: [ldev] --
1,281,077 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x46574c44
1,282,605 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,716 UART: ROM Fatal Error: 0x000B002F
1,331,875 >>> mbox cmd response: failed
1,331,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,881 >>> mbox cmd response: failed
1,331,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,813 UART: [state] LifecycleState = Unprovisioned
85,468 UART: [state] DebugLocked = No
85,984 UART: [state] WD Timer not started. Device not locked for debugging
87,195 UART: [kat] SHA2-256
890,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,874 UART: [kat] ++
895,026 UART: [kat] sha1
899,194 UART: [kat] SHA2-256
901,134 UART: [kat] SHA2-384
903,827 UART: [kat] SHA2-512-ACC
905,728 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,029 UART: [kat] LMS
1,168,341 UART: [kat] --
1,168,894 UART: [cold-reset] ++
1,169,298 UART: [fht] FHT @ 0x50003400
1,171,982 UART: [idev] ++
1,172,150 UART: [idev] CDI.KEYID = 6
1,172,511 UART: [idev] SUBJECT.KEYID = 7
1,172,936 UART: [idev] UDS.KEYID = 0
1,173,282 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,744 UART: [idev] Erasing UDS.KEYID = 0
1,197,764 UART: [idev] Sha1 KeyId Algorithm
1,206,468 UART: [idev] --
1,207,643 UART: [ldev] ++
1,207,811 UART: [ldev] CDI.KEYID = 6
1,208,175 UART: [ldev] SUBJECT.KEYID = 5
1,208,602 UART: [ldev] AUTHORITY.KEYID = 7
1,209,065 UART: [ldev] FE.KEYID = 1
1,214,237 UART: [ldev] Erasing FE.KEYID = 1
1,239,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,847 UART: [ldev] --
1,279,295 UART: [fwproc] Wait for Commands...
1,279,948 UART: [fwproc] Recv command 0x46574c44
1,280,681 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,394 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,407 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,194 >>> mbox cmd response: failed
1,183,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,200 >>> mbox cmd response: failed
1,183,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,229 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,984 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,022 UART:
192,432 UART: Running Caliptra ROM ...
193,614 UART:
193,774 UART: [state] CFI Enabled
266,804 UART: [state] LifecycleState = Unprovisioned
268,721 UART: [state] DebugLocked = No
271,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,992 UART: [kat] SHA2-256
446,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,195 UART: [kat] ++
457,785 UART: [kat] sha1
469,593 UART: [kat] SHA2-256
472,280 UART: [kat] SHA2-384
476,800 UART: [kat] SHA2-512-ACC
479,192 UART: [kat] ECC-384
2,767,313 UART: [kat] HMAC-384Kdf
2,799,266 UART: [kat] LMS
3,989,591 UART: [kat] --
3,993,658 UART: [cold-reset] ++
3,995,757 UART: [fht] Storing FHT @ 0x50003400
4,007,515 UART: [idev] ++
4,008,096 UART: [idev] CDI.KEYID = 6
4,009,072 UART: [idev] SUBJECT.KEYID = 7
4,010,294 UART: [idev] UDS.KEYID = 0
4,013,064 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,706 UART: [idev] Erasing UDS.KEYID = 0
7,345,473 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,046 UART: [idev] --
7,372,154 UART: [ldev] ++
7,372,729 UART: [ldev] CDI.KEYID = 6
7,373,748 UART: [ldev] SUBJECT.KEYID = 5
7,374,910 UART: [ldev] AUTHORITY.KEYID = 7
7,376,144 UART: [ldev] FE.KEYID = 1
7,419,443 UART: [ldev] Erasing FE.KEYID = 1
10,752,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,817 UART: [ldev] --
13,114,177 UART: [fwproc] Waiting for Commands...
13,117,091 UART: [fwproc] Received command 0x46574c44
13,119,280 UART: [fwproc] Received Image of size 114036 bytes
13,178,309 UART: ROM Fatal Error: 0x000B0001
13,181,834 >>> mbox cmd response: failed
13,182,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,182,564 >>> mbox cmd response: failed
13,182,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,183,127 >>> mbox cmd response: failed
Initializing fuses
2,051,492 writing to cptra_bootfsm_go
2,240,790 UART:
2,241,133 UART: Running Caliptra ROM ...
2,242,273 UART:
2,242,446 UART: [state] CFI Enabled
2,303,129 UART: [state] LifecycleState = Unprovisioned
2,305,080 UART: [state] DebugLocked = No
2,307,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,502 UART: [kat] SHA2-256
2,483,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,732 UART: [kat] ++
2,494,279 UART: [kat] sha1
2,504,875 UART: [kat] SHA2-256
2,507,586 UART: [kat] SHA2-384
2,512,930 UART: [kat] SHA2-512-ACC
2,515,282 UART: [kat] ECC-384
4,803,068 UART: [kat] HMAC-384Kdf
4,814,568 UART: [kat] LMS
6,004,843 UART: [kat] --
6,010,214 UART: [cold-reset] ++
6,012,376 UART: [fht] Storing FHT @ 0x50003400
6,024,890 UART: [idev] ++
6,025,461 UART: [idev] CDI.KEYID = 6
6,026,397 UART: [idev] SUBJECT.KEYID = 7
6,027,669 UART: [idev] UDS.KEYID = 0
6,030,261 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,173,772 UART: [idev] Erasing UDS.KEYID = 0
9,360,152 UART: [idev] Using Sha1 for KeyId Algorithm
9,381,499 UART: [idev] --
9,385,394 UART: [ldev] ++
9,385,971 UART: [ldev] CDI.KEYID = 6
9,386,880 UART: [ldev] SUBJECT.KEYID = 5
9,388,142 UART: [ldev] AUTHORITY.KEYID = 7
9,389,385 UART: [ldev] FE.KEYID = 1
9,436,610 UART: [ldev] Erasing FE.KEYID = 1
12,768,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,062,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,076,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,091,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,106,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,125,668 UART: [ldev] --
15,130,231 UART: [fwproc] Waiting for Commands...
15,132,880 UART: [fwproc] Received command 0x46574c44
15,135,071 UART: [fwproc] Received Image of size 114036 bytes
19,189,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,263,395 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,332,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,649,776 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,785,611 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,915,537 >>> mbox cmd response: failed
12,916,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,399 >>> mbox cmd response: failed
12,916,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,000 >>> mbox cmd response: failed
Initializing fuses
2,046,926 writing to cptra_bootfsm_go
5,819,946 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,872,558 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,647 UART:
193,005 UART: Running Caliptra ROM ...
194,195 UART:
603,789 UART: [state] CFI Enabled
617,526 UART: [state] LifecycleState = Unprovisioned
619,463 UART: [state] DebugLocked = No
621,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,557 UART: [kat] SHA2-256
795,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,876 UART: [kat] ++
806,323 UART: [kat] sha1
817,633 UART: [kat] SHA2-256
820,376 UART: [kat] SHA2-384
826,567 UART: [kat] SHA2-512-ACC
828,979 UART: [kat] ECC-384
3,110,891 UART: [kat] HMAC-384Kdf
3,122,919 UART: [kat] LMS
4,313,060 UART: [kat] --
4,315,550 UART: [cold-reset] ++
4,317,887 UART: [fht] Storing FHT @ 0x50003400
4,330,196 UART: [idev] ++
4,330,821 UART: [idev] CDI.KEYID = 6
4,331,740 UART: [idev] SUBJECT.KEYID = 7
4,333,011 UART: [idev] UDS.KEYID = 0
4,336,019 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,465 UART: [idev] Erasing UDS.KEYID = 0
7,618,784 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,835 UART: [idev] --
7,644,161 UART: [ldev] ++
7,644,729 UART: [ldev] CDI.KEYID = 6
7,645,692 UART: [ldev] SUBJECT.KEYID = 5
7,646,909 UART: [ldev] AUTHORITY.KEYID = 7
7,648,199 UART: [ldev] FE.KEYID = 1
7,659,308 UART: [ldev] Erasing FE.KEYID = 1
10,952,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,940 UART: [ldev] --
13,312,479 UART: [fwproc] Waiting for Commands...
13,314,855 UART: [fwproc] Received command 0x46574c44
13,317,046 UART: [fwproc] Received Image of size 114036 bytes
13,374,993 UART: ROM Fatal Error: 0x000B0001
13,378,465 >>> mbox cmd response: failed
13,378,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,224 >>> mbox cmd response: failed
13,379,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,788 >>> mbox cmd response: failed
Initializing fuses
2,055,373 writing to cptra_bootfsm_go
2,245,052 UART:
2,245,419 UART: Running Caliptra ROM ...
2,246,561 UART:
7,093,307 UART: [state] CFI Enabled
7,108,425 UART: [state] LifecycleState = Unprovisioned
7,110,376 UART: [state] DebugLocked = No
7,112,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,118,198 UART: [kat] SHA2-256
7,287,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,298,498 UART: [kat] ++
7,298,995 UART: [kat] sha1
7,309,398 UART: [kat] SHA2-256
7,312,100 UART: [kat] SHA2-384
7,318,146 UART: [kat] SHA2-512-ACC
7,320,500 UART: [kat] ECC-384
9,604,137 UART: [kat] HMAC-384Kdf
9,614,930 UART: [kat] LMS
10,805,018 UART: [kat] --
10,808,119 UART: [cold-reset] ++
10,810,177 UART: [fht] Storing FHT @ 0x50003400
10,821,392 UART: [idev] ++
10,821,963 UART: [idev] CDI.KEYID = 6
10,822,869 UART: [idev] SUBJECT.KEYID = 7
10,824,145 UART: [idev] UDS.KEYID = 0
10,826,918 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,970,276 UART: [idev] Erasing UDS.KEYID = 0
14,115,401 UART: [idev] Using Sha1 for KeyId Algorithm
14,137,542 UART: [idev] --
14,141,088 UART: [ldev] ++
14,141,677 UART: [ldev] CDI.KEYID = 6
14,142,639 UART: [ldev] SUBJECT.KEYID = 5
14,143,896 UART: [ldev] AUTHORITY.KEYID = 7
14,145,143 UART: [ldev] FE.KEYID = 1
14,156,826 UART: [ldev] Erasing FE.KEYID = 1
17,445,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,741,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,756,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,771,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,785,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,803,413 UART: [ldev] --
19,808,208 UART: [fwproc] Waiting for Commands...
19,811,498 UART: [fwproc] Received command 0x46574c44
19,813,696 UART: [fwproc] Received Image of size 114036 bytes
23,870,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,947,693 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,016,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,334,403 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,131,504 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,114,950 >>> mbox cmd response: failed
13,115,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,115,832 >>> mbox cmd response: failed
13,116,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,116,401 >>> mbox cmd response: failed
Initializing fuses
2,051,188 writing to cptra_bootfsm_go
10,870,348 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,807,270 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,679 UART:
193,031 UART: Running Caliptra ROM ...
194,219 UART:
194,367 UART: [state] CFI Enabled
264,143 UART: [state] LifecycleState = Unprovisioned
266,015 UART: [state] DebugLocked = No
267,295 UART: [state] WD Timer not started. Device not locked for debugging
271,174 UART: [kat] SHA2-256
450,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,917 UART: [kat] ++
462,369 UART: [kat] sha1
474,435 UART: [kat] SHA2-256
477,448 UART: [kat] SHA2-384
483,264 UART: [kat] SHA2-512-ACC
486,192 UART: [kat] ECC-384
2,947,810 UART: [kat] HMAC-384Kdf
2,969,375 UART: [kat] LMS
3,498,805 UART: [kat] --
3,501,566 UART: [cold-reset] ++
3,504,046 UART: [fht] FHT @ 0x50003400
3,515,673 UART: [idev] ++
3,516,245 UART: [idev] CDI.KEYID = 6
3,517,160 UART: [idev] SUBJECT.KEYID = 7
3,518,319 UART: [idev] UDS.KEYID = 0
3,521,281 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,362 UART: [idev] Erasing UDS.KEYID = 0
6,024,285 UART: [idev] Sha1 KeyId Algorithm
6,046,711 UART: [idev] --
6,050,603 UART: [ldev] ++
6,051,388 UART: [ldev] CDI.KEYID = 6
6,052,384 UART: [ldev] SUBJECT.KEYID = 5
6,053,445 UART: [ldev] AUTHORITY.KEYID = 7
6,054,622 UART: [ldev] FE.KEYID = 1
6,098,433 UART: [ldev] Erasing FE.KEYID = 1
8,604,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,424 UART: [ldev] --
10,411,363 UART: [fwproc] Wait for Commands...
10,414,017 UART: [fwproc] Recv command 0x46574c44
10,416,118 UART: [fwproc] Recv'd Img size: 114360 bytes
10,470,857 UART: ROM Fatal Error: 0x000B0001
10,473,955 >>> mbox cmd response: failed
10,474,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,691 >>> mbox cmd response: failed
10,474,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,475,250 >>> mbox cmd response: failed
Initializing fuses
2,048,659 writing to cptra_bootfsm_go
2,237,960 UART:
2,238,311 UART: Running Caliptra ROM ...
2,239,460 UART:
2,239,661 UART: [state] CFI Enabled
2,310,196 UART: [state] LifecycleState = Unprovisioned
2,312,058 UART: [state] DebugLocked = No
2,313,726 UART: [state] WD Timer not started. Device not locked for debugging
2,317,422 UART: [kat] SHA2-256
2,496,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,145 UART: [kat] ++
2,508,691 UART: [kat] sha1
2,519,427 UART: [kat] SHA2-256
2,522,444 UART: [kat] SHA2-384
2,528,858 UART: [kat] SHA2-512-ACC
2,531,807 UART: [kat] ECC-384
4,991,928 UART: [kat] HMAC-384Kdf
5,014,700 UART: [kat] LMS
5,544,131 UART: [kat] --
5,548,013 UART: [cold-reset] ++
5,549,911 UART: [fht] FHT @ 0x50003400
5,559,656 UART: [idev] ++
5,560,231 UART: [idev] CDI.KEYID = 6
5,561,143 UART: [idev] SUBJECT.KEYID = 7
5,562,357 UART: [idev] UDS.KEYID = 0
5,564,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,708,903 UART: [idev] Erasing UDS.KEYID = 0
8,070,409 UART: [idev] Sha1 KeyId Algorithm
8,092,356 UART: [idev] --
8,095,816 UART: [ldev] ++
8,096,388 UART: [ldev] CDI.KEYID = 6
8,097,296 UART: [ldev] SUBJECT.KEYID = 5
8,098,477 UART: [ldev] AUTHORITY.KEYID = 7
8,099,714 UART: [ldev] FE.KEYID = 1
8,143,623 UART: [ldev] Erasing FE.KEYID = 1
10,648,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,234 UART: [ldev] --
12,456,556 UART: [fwproc] Wait for Commands...
12,459,177 UART: [fwproc] Recv command 0x46574c44
12,461,283 UART: [fwproc] Recv'd Img size: 114360 bytes
15,866,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,009,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,327,646 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,128 UART:
192,475 UART: Running Caliptra ROM ...
193,595 UART:
193,740 UART: [state] CFI Enabled
260,723 UART: [state] LifecycleState = Unprovisioned
263,084 UART: [state] DebugLocked = No
264,532 UART: [state] WD Timer not started. Device not locked for debugging
269,838 UART: [kat] SHA2-256
459,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,497 UART: [kat] ++
470,974 UART: [kat] sha1
483,041 UART: [kat] SHA2-256
486,061 UART: [kat] SHA2-384
493,345 UART: [kat] SHA2-512-ACC
495,913 UART: [kat] ECC-384
2,946,555 UART: [kat] HMAC-384Kdf
2,970,628 UART: [kat] LMS
3,502,403 UART: [kat] --
3,507,274 UART: [cold-reset] ++
3,509,589 UART: [fht] FHT @ 0x50003400
3,522,405 UART: [idev] ++
3,523,083 UART: [idev] CDI.KEYID = 6
3,524,104 UART: [idev] SUBJECT.KEYID = 7
3,525,288 UART: [idev] UDS.KEYID = 0
3,528,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,141 UART: [idev] Erasing UDS.KEYID = 0
6,028,473 UART: [idev] Sha1 KeyId Algorithm
6,051,169 UART: [idev] --
6,056,441 UART: [ldev] ++
6,057,135 UART: [ldev] CDI.KEYID = 6
6,058,023 UART: [ldev] SUBJECT.KEYID = 5
6,059,240 UART: [ldev] AUTHORITY.KEYID = 7
6,060,422 UART: [ldev] FE.KEYID = 1
6,101,399 UART: [ldev] Erasing FE.KEYID = 1
8,608,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,704 UART: [ldev] --
10,411,375 UART: [fwproc] Wait for Commands...
10,414,340 UART: [fwproc] Recv command 0x46574c44
10,416,604 UART: [fwproc] Recv'd Img size: 114360 bytes
10,507,237 UART: ROM Fatal Error: 0x000B0001
10,510,929 >>> mbox cmd response: failed
10,511,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,511,617 >>> mbox cmd response: failed
10,511,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,512,173 >>> mbox cmd response: failed
Initializing fuses
2,053,549 writing to cptra_bootfsm_go
2,242,847 UART:
2,243,210 UART: Running Caliptra ROM ...
2,244,258 UART:
2,244,412 UART: [state] CFI Enabled
2,313,461 UART: [state] LifecycleState = Unprovisioned
2,315,894 UART: [state] DebugLocked = No
2,317,799 UART: [state] WD Timer not started. Device not locked for debugging
2,322,643 UART: [kat] SHA2-256
2,512,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,290 UART: [kat] ++
2,523,758 UART: [kat] sha1
2,536,215 UART: [kat] SHA2-256
2,539,242 UART: [kat] SHA2-384
2,545,774 UART: [kat] SHA2-512-ACC
2,548,352 UART: [kat] ECC-384
5,000,297 UART: [kat] HMAC-384Kdf
5,023,740 UART: [kat] LMS
5,555,490 UART: [kat] --
5,560,464 UART: [cold-reset] ++
5,561,916 UART: [fht] FHT @ 0x50003400
5,572,254 UART: [idev] ++
5,572,929 UART: [idev] CDI.KEYID = 6
5,573,896 UART: [idev] SUBJECT.KEYID = 7
5,575,055 UART: [idev] UDS.KEYID = 0
5,577,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,721,746 UART: [idev] Erasing UDS.KEYID = 0
8,078,366 UART: [idev] Sha1 KeyId Algorithm
8,100,197 UART: [idev] --
8,105,791 UART: [ldev] ++
8,106,536 UART: [ldev] CDI.KEYID = 6
8,107,448 UART: [ldev] SUBJECT.KEYID = 5
8,108,611 UART: [ldev] AUTHORITY.KEYID = 7
8,109,842 UART: [ldev] FE.KEYID = 1
8,150,376 UART: [ldev] Erasing FE.KEYID = 1
10,653,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,528 UART: [ldev] --
12,465,195 UART: [fwproc] Wait for Commands...
12,468,371 UART: [fwproc] Recv command 0x46574c44
12,470,633 UART: [fwproc] Recv'd Img size: 114360 bytes
15,914,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,995,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,653,043 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,443,906 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,282,669 >>> mbox cmd response: failed
10,283,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,283,581 >>> mbox cmd response: failed
10,283,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,284,156 >>> mbox cmd response: failed
Initializing fuses
2,046,317 writing to cptra_bootfsm_go
5,467,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,763,764 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,506 UART:
192,877 UART: Running Caliptra ROM ...
194,061 UART:
603,516 UART: [state] CFI Enabled
616,750 UART: [state] LifecycleState = Unprovisioned
618,785 UART: [state] DebugLocked = No
621,648 UART: [state] WD Timer not started. Device not locked for debugging
625,724 UART: [kat] SHA2-256
815,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,373 UART: [kat] ++
826,879 UART: [kat] sha1
838,889 UART: [kat] SHA2-256
841,904 UART: [kat] SHA2-384
847,290 UART: [kat] SHA2-512-ACC
849,897 UART: [kat] ECC-384
3,291,537 UART: [kat] HMAC-384Kdf
3,303,891 UART: [kat] LMS
3,835,683 UART: [kat] --
3,838,180 UART: [cold-reset] ++
3,840,279 UART: [fht] FHT @ 0x50003400
3,851,039 UART: [idev] ++
3,851,725 UART: [idev] CDI.KEYID = 6
3,852,740 UART: [idev] SUBJECT.KEYID = 7
3,853,841 UART: [idev] UDS.KEYID = 0
3,856,415 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,204 UART: [idev] Erasing UDS.KEYID = 0
6,333,817 UART: [idev] Sha1 KeyId Algorithm
6,356,608 UART: [idev] --
6,361,684 UART: [ldev] ++
6,362,366 UART: [ldev] CDI.KEYID = 6
6,363,281 UART: [ldev] SUBJECT.KEYID = 5
6,364,438 UART: [ldev] AUTHORITY.KEYID = 7
6,365,687 UART: [ldev] FE.KEYID = 1
6,379,355 UART: [ldev] Erasing FE.KEYID = 1
8,857,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,108 UART: [ldev] --
10,649,243 UART: [fwproc] Wait for Commands...
10,651,884 UART: [fwproc] Recv command 0x46574c44
10,654,138 UART: [fwproc] Recv'd Img size: 114360 bytes
10,739,075 UART: ROM Fatal Error: 0x000B0001
10,742,751 >>> mbox cmd response: failed
10,743,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,743,467 >>> mbox cmd response: failed
10,743,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,040 >>> mbox cmd response: failed
Initializing fuses
2,050,883 writing to cptra_bootfsm_go
2,240,184 UART:
2,240,627 UART: Running Caliptra ROM ...
2,241,681 UART:
9,703,569 UART: [state] CFI Enabled
9,717,383 UART: [state] LifecycleState = Unprovisioned
9,719,764 UART: [state] DebugLocked = No
9,722,644 UART: [state] WD Timer not started. Device not locked for debugging
9,727,091 UART: [kat] SHA2-256
9,916,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,927,774 UART: [kat] ++
9,928,305 UART: [kat] sha1
9,939,085 UART: [kat] SHA2-256
9,942,102 UART: [kat] SHA2-384
9,948,416 UART: [kat] SHA2-512-ACC
9,950,986 UART: [kat] ECC-384
12,393,135 UART: [kat] HMAC-384Kdf
12,405,684 UART: [kat] LMS
12,937,531 UART: [kat] --
12,942,382 UART: [cold-reset] ++
12,944,959 UART: [fht] FHT @ 0x50003400
12,956,216 UART: [idev] ++
12,956,888 UART: [idev] CDI.KEYID = 6
12,957,851 UART: [idev] SUBJECT.KEYID = 7
12,959,054 UART: [idev] UDS.KEYID = 0
12,961,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,105,476 UART: [idev] Erasing UDS.KEYID = 0
15,436,405 UART: [idev] Sha1 KeyId Algorithm
15,458,824 UART: [idev] --
15,462,215 UART: [ldev] ++
15,462,898 UART: [ldev] CDI.KEYID = 6
15,463,857 UART: [ldev] SUBJECT.KEYID = 5
15,465,014 UART: [ldev] AUTHORITY.KEYID = 7
15,466,248 UART: [ldev] FE.KEYID = 1
15,477,649 UART: [ldev] Erasing FE.KEYID = 1
17,953,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,670,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,685,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,700,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,715,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,735,711 UART: [ldev] --
19,740,349 UART: [fwproc] Wait for Commands...
19,743,163 UART: [fwproc] Recv command 0x46574c44
19,745,445 UART: [fwproc] Recv'd Img size: 114360 bytes
23,192,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,269,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,385,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,927,336 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,758,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,524,879 >>> mbox cmd response: failed
10,525,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,783 >>> mbox cmd response: failed
10,526,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,526,346 >>> mbox cmd response: failed
Initializing fuses
2,055,597 writing to cptra_bootfsm_go
13,099,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,284,345 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,179 UART: [kat] SHA2-256
882,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,225 UART: [kat] ++
886,377 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,654 UART: [kat] HMAC-384Kdf
907,258 UART: [kat] LMS
1,475,454 UART: [kat] --
1,476,543 UART: [cold-reset] ++
1,476,953 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,770 UART: [idev] Erasing UDS.KEYID = 0
1,505,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,132 UART: [idev] --
1,515,181 UART: [ldev] ++
1,515,349 UART: [ldev] CDI.KEYID = 6
1,515,712 UART: [ldev] SUBJECT.KEYID = 5
1,516,138 UART: [ldev] AUTHORITY.KEYID = 7
1,516,601 UART: [ldev] FE.KEYID = 1
1,521,569 UART: [ldev] Erasing FE.KEYID = 1
1,547,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,452 UART: [ldev] --
1,586,871 UART: [fwproc] Waiting for Commands...
1,587,612 UART: [fwproc] Received command 0x46574c44
1,588,403 UART: [fwproc] Received Image of size 114360 bytes
1,607,599 UART: ROM Fatal Error: 0x000B0001
1,608,756 >>> mbox cmd response: failed
1,608,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,762 >>> mbox cmd response: failed
1,608,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,447 UART: [kat] SHA2-256
882,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,493 UART: [kat] ++
886,645 UART: [kat] sha1
890,735 UART: [kat] SHA2-256
892,673 UART: [kat] SHA2-384
895,460 UART: [kat] SHA2-512-ACC
897,361 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,304 UART: [kat] LMS
1,475,500 UART: [kat] --
1,476,323 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,652 UART: [idev] ++
1,479,820 UART: [idev] CDI.KEYID = 6
1,480,180 UART: [idev] SUBJECT.KEYID = 7
1,480,604 UART: [idev] UDS.KEYID = 0
1,480,949 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,504,936 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,364 UART: [idev] --
1,514,633 UART: [ldev] ++
1,514,801 UART: [ldev] CDI.KEYID = 6
1,515,164 UART: [ldev] SUBJECT.KEYID = 5
1,515,590 UART: [ldev] AUTHORITY.KEYID = 7
1,516,053 UART: [ldev] FE.KEYID = 1
1,521,127 UART: [ldev] Erasing FE.KEYID = 1
1,546,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,582 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,820 UART: [fwproc] Received command 0x46574c44
1,587,611 UART: [fwproc] Received Image of size 114360 bytes
2,885,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,496 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,273 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,460,741 >>> mbox cmd response: failed
1,460,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,747 >>> mbox cmd response: failed
1,460,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,861 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,546 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,679 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,141 UART: [idev] Erasing UDS.KEYID = 0
1,505,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,893 UART: [idev] --
1,514,712 UART: [ldev] ++
1,514,880 UART: [ldev] CDI.KEYID = 6
1,515,243 UART: [ldev] SUBJECT.KEYID = 5
1,515,669 UART: [ldev] AUTHORITY.KEYID = 7
1,516,132 UART: [ldev] FE.KEYID = 1
1,521,404 UART: [ldev] Erasing FE.KEYID = 1
1,546,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,095 UART: [ldev] --
1,585,474 UART: [fwproc] Waiting for Commands...
1,586,161 UART: [fwproc] Received command 0x46574c44
1,586,952 UART: [fwproc] Received Image of size 114360 bytes
1,606,304 UART: ROM Fatal Error: 0x000B0001
1,607,461 >>> mbox cmd response: failed
1,607,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,467 >>> mbox cmd response: failed
1,607,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,840 UART: [kat] SHA2-256
882,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,886 UART: [kat] ++
887,038 UART: [kat] sha1
891,348 UART: [kat] SHA2-256
893,286 UART: [kat] SHA2-384
896,081 UART: [kat] SHA2-512-ACC
897,982 UART: [kat] ECC-384
903,555 UART: [kat] HMAC-384Kdf
908,095 UART: [kat] LMS
1,476,291 UART: [kat] --
1,477,182 UART: [cold-reset] ++
1,477,592 UART: [fht] Storing FHT @ 0x50003400
1,480,485 UART: [idev] ++
1,480,653 UART: [idev] CDI.KEYID = 6
1,481,013 UART: [idev] SUBJECT.KEYID = 7
1,481,437 UART: [idev] UDS.KEYID = 0
1,481,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,293 UART: [idev] Erasing UDS.KEYID = 0
1,506,025 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,781 UART: [idev] --
1,515,842 UART: [ldev] ++
1,516,010 UART: [ldev] CDI.KEYID = 6
1,516,373 UART: [ldev] SUBJECT.KEYID = 5
1,516,799 UART: [ldev] AUTHORITY.KEYID = 7
1,517,262 UART: [ldev] FE.KEYID = 1
1,522,074 UART: [ldev] Erasing FE.KEYID = 1
1,547,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,539 UART: [ldev] --
1,586,980 UART: [fwproc] Waiting for Commands...
1,587,739 UART: [fwproc] Received command 0x46574c44
1,588,530 UART: [fwproc] Received Image of size 114360 bytes
2,885,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,161 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,461,140 >>> mbox cmd response: failed
1,461,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,146 >>> mbox cmd response: failed
1,461,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,821 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
893,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,931 UART: [kat] ++
898,083 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
922,886 UART: [kat] LMS
1,171,214 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,581 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,617 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,622 UART: [ldev] SUBJECT.KEYID = 5
1,211,048 UART: [ldev] AUTHORITY.KEYID = 7
1,211,511 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,409 UART: [ldev] --
1,282,882 UART: [fwproc] Wait for Commands...
1,283,540 UART: [fwproc] Recv command 0x46574c44
1,284,268 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,672 UART: ROM Fatal Error: 0x000B0001
1,304,829 >>> mbox cmd response: failed
1,304,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,835 >>> mbox cmd response: failed
1,304,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,602 UART: [state] LifecycleState = Unprovisioned
85,257 UART: [state] DebugLocked = No
85,787 UART: [state] WD Timer not started. Device not locked for debugging
87,094 UART: [kat] SHA2-256
892,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,869 UART: [kat] ++
897,021 UART: [kat] sha1
901,317 UART: [kat] SHA2-256
903,257 UART: [kat] SHA2-384
905,998 UART: [kat] SHA2-512-ACC
907,899 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,252 UART: [kat] LMS
1,170,580 UART: [kat] --
1,171,655 UART: [cold-reset] ++
1,172,075 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,912 UART: [idev] Erasing UDS.KEYID = 0
1,200,163 UART: [idev] Sha1 KeyId Algorithm
1,208,657 UART: [idev] --
1,209,851 UART: [ldev] ++
1,210,019 UART: [ldev] CDI.KEYID = 6
1,210,382 UART: [ldev] SUBJECT.KEYID = 5
1,210,808 UART: [ldev] AUTHORITY.KEYID = 7
1,211,271 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,706 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,203 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,888 >>> mbox cmd response: failed
1,159,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,894 >>> mbox cmd response: failed
1,159,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,539 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,416 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,430 UART: [kat] SHA2-256
904,370 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,300 UART: [cold-reset] ++
1,172,826 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,703 UART: [idev] Erasing UDS.KEYID = 0
1,201,388 UART: [idev] Sha1 KeyId Algorithm
1,209,978 UART: [idev] --
1,211,214 UART: [ldev] ++
1,211,382 UART: [ldev] CDI.KEYID = 6
1,211,745 UART: [ldev] SUBJECT.KEYID = 5
1,212,171 UART: [ldev] AUTHORITY.KEYID = 7
1,212,634 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,086 UART: [ldev] --
1,284,591 UART: [fwproc] Wait for Commands...
1,285,291 UART: [fwproc] Recv command 0x46574c44
1,286,019 UART: [fwproc] Recv'd Img size: 114360 bytes
1,305,159 UART: ROM Fatal Error: 0x000B0001
1,306,316 >>> mbox cmd response: failed
1,306,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,322 >>> mbox cmd response: failed
1,306,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
893,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,788 UART: [kat] ++
897,940 UART: [kat] sha1
902,160 UART: [kat] SHA2-256
904,100 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,549 UART: [kat] LMS
1,171,877 UART: [kat] --
1,172,892 UART: [cold-reset] ++
1,173,422 UART: [fht] FHT @ 0x50003400
1,176,089 UART: [idev] ++
1,176,257 UART: [idev] CDI.KEYID = 6
1,176,617 UART: [idev] SUBJECT.KEYID = 7
1,177,041 UART: [idev] UDS.KEYID = 0
1,177,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,051 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,830 UART: [idev] --
1,210,804 UART: [ldev] ++
1,210,972 UART: [ldev] CDI.KEYID = 6
1,211,335 UART: [ldev] SUBJECT.KEYID = 5
1,211,761 UART: [ldev] AUTHORITY.KEYID = 7
1,212,224 UART: [ldev] FE.KEYID = 1
1,217,552 UART: [ldev] Erasing FE.KEYID = 1
1,244,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,428 UART: [ldev] --
1,283,711 UART: [fwproc] Wait for Commands...
1,284,475 UART: [fwproc] Recv command 0x46574c44
1,285,203 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,928 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,696 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,479 >>> mbox cmd response: failed
1,160,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,485 >>> mbox cmd response: failed
1,160,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,595 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,160 UART: [kat] SHA2-512-ACC
906,061 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,174,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,143 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,660 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,834 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,233 UART: ROM Fatal Error: 0x000B0001
1,303,390 >>> mbox cmd response: failed
1,303,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,396 >>> mbox cmd response: failed
1,303,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,291 UART: [kat] SHA2-256
901,231 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
915,476 UART: [kat] HMAC-384Kdf
919,998 UART: [kat] LMS
1,168,310 UART: [kat] --
1,168,997 UART: [cold-reset] ++
1,169,547 UART: [fht] FHT @ 0x50003400
1,172,243 UART: [idev] ++
1,172,411 UART: [idev] CDI.KEYID = 6
1,172,772 UART: [idev] SUBJECT.KEYID = 7
1,173,197 UART: [idev] UDS.KEYID = 0
1,173,543 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,077 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,190 UART: [ldev] ++
1,208,358 UART: [ldev] CDI.KEYID = 6
1,208,722 UART: [ldev] SUBJECT.KEYID = 5
1,209,149 UART: [ldev] AUTHORITY.KEYID = 7
1,209,612 UART: [ldev] FE.KEYID = 1
1,214,766 UART: [ldev] Erasing FE.KEYID = 1
1,241,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,768 UART: [ldev] --
1,280,158 UART: [fwproc] Wait for Commands...
1,280,963 UART: [fwproc] Recv command 0x46574c44
1,281,696 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,255 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,980 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,221 >>> mbox cmd response: failed
1,154,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,227 >>> mbox cmd response: failed
1,154,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,316 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,261 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,324 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,212 UART: [idev] Sha1 KeyId Algorithm
1,209,156 UART: [idev] --
1,210,409 UART: [ldev] ++
1,210,577 UART: [ldev] CDI.KEYID = 6
1,210,941 UART: [ldev] SUBJECT.KEYID = 5
1,211,368 UART: [ldev] AUTHORITY.KEYID = 7
1,211,831 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,791 UART: [ldev] --
1,283,189 UART: [fwproc] Wait for Commands...
1,283,980 UART: [fwproc] Recv command 0x46574c44
1,284,713 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,926 UART: ROM Fatal Error: 0x000B0001
1,305,083 >>> mbox cmd response: failed
1,305,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,089 >>> mbox cmd response: failed
1,305,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,174,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,931 UART: [ldev] --
1,282,215 UART: [fwproc] Wait for Commands...
1,282,866 UART: [fwproc] Recv command 0x46574c44
1,283,599 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,010 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,783 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,156,262 >>> mbox cmd response: failed
1,156,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,268 >>> mbox cmd response: failed
1,156,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,042 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,205 UART:
192,585 UART: Running Caliptra ROM ...
193,777 UART:
193,931 UART: [state] CFI Enabled
263,940 UART: [state] LifecycleState = Unprovisioned
265,907 UART: [state] DebugLocked = No
267,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,681 UART: [kat] SHA2-256
441,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,900 UART: [kat] ++
452,392 UART: [kat] sha1
463,313 UART: [kat] SHA2-256
465,988 UART: [kat] SHA2-384
473,107 UART: [kat] SHA2-512-ACC
475,459 UART: [kat] ECC-384
2,767,576 UART: [kat] HMAC-384Kdf
2,796,448 UART: [kat] LMS
3,986,724 UART: [kat] --
3,992,257 UART: [cold-reset] ++
3,993,489 UART: [fht] Storing FHT @ 0x50003400
4,003,516 UART: [idev] ++
4,004,085 UART: [idev] CDI.KEYID = 6
4,005,027 UART: [idev] SUBJECT.KEYID = 7
4,006,301 UART: [idev] UDS.KEYID = 0
4,009,016 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,152,660 UART: [idev] Erasing UDS.KEYID = 0
7,343,545 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,145 UART: [idev] --
7,369,255 UART: [ldev] ++
7,369,883 UART: [ldev] CDI.KEYID = 6
7,370,795 UART: [ldev] SUBJECT.KEYID = 5
7,372,011 UART: [ldev] AUTHORITY.KEYID = 7
7,373,311 UART: [ldev] FE.KEYID = 1
7,418,562 UART: [ldev] Erasing FE.KEYID = 1
10,749,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,363 UART: [ldev] --
13,110,777 UART: [fwproc] Waiting for Commands...
13,112,389 UART: [fwproc] Received command 0x46574c44
13,114,578 UART: [fwproc] Received Image of size 114036 bytes
13,170,192 UART: ROM Fatal Error: 0x000B0002
13,173,726 >>> mbox cmd response: failed
13,174,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,174,652 >>> mbox cmd response: failed
13,174,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,175,207 >>> mbox cmd response: failed
Initializing fuses
2,049,365 writing to cptra_bootfsm_go
2,238,645 UART:
2,238,993 UART: Running Caliptra ROM ...
2,240,244 UART:
2,240,408 UART: [state] CFI Enabled
2,315,496 UART: [state] LifecycleState = Unprovisioned
2,317,392 UART: [state] DebugLocked = No
2,318,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,856 UART: [kat] SHA2-256
2,493,535 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,062 UART: [kat] ++
2,504,525 UART: [kat] sha1
2,515,756 UART: [kat] SHA2-256
2,518,447 UART: [kat] SHA2-384
2,523,787 UART: [kat] SHA2-512-ACC
2,526,145 UART: [kat] ECC-384
4,818,586 UART: [kat] HMAC-384Kdf
4,848,654 UART: [kat] LMS
6,038,980 UART: [kat] --
6,042,818 UART: [cold-reset] ++
6,044,374 UART: [fht] Storing FHT @ 0x50003400
6,055,652 UART: [idev] ++
6,056,222 UART: [idev] CDI.KEYID = 6
6,057,241 UART: [idev] SUBJECT.KEYID = 7
6,058,406 UART: [idev] UDS.KEYID = 0
6,060,967 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,204,542 UART: [idev] Erasing UDS.KEYID = 0
9,394,947 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,655 UART: [idev] --
9,418,631 UART: [ldev] ++
9,419,203 UART: [ldev] CDI.KEYID = 6
9,420,141 UART: [ldev] SUBJECT.KEYID = 5
9,421,397 UART: [ldev] AUTHORITY.KEYID = 7
9,422,637 UART: [ldev] FE.KEYID = 1
9,470,636 UART: [ldev] Erasing FE.KEYID = 1
12,804,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,031 UART: [ldev] --
15,188,863 UART: [fwproc] Waiting for Commands...
15,191,884 UART: [fwproc] Received command 0x46574c44
15,194,073 UART: [fwproc] Received Image of size 114036 bytes
19,244,800 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,316,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,385,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,702,507 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,806,081 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,918,126 >>> mbox cmd response: failed
12,918,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,043 >>> mbox cmd response: failed
12,919,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,612 >>> mbox cmd response: failed
Initializing fuses
2,047,013 writing to cptra_bootfsm_go
5,842,500 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,932,253 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,514 UART:
192,883 UART: Running Caliptra ROM ...
194,072 UART:
603,684 UART: [state] CFI Enabled
619,213 UART: [state] LifecycleState = Unprovisioned
621,088 UART: [state] DebugLocked = No
623,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,157 UART: [kat] SHA2-256
796,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,474 UART: [kat] ++
807,921 UART: [kat] sha1
818,431 UART: [kat] SHA2-256
821,107 UART: [kat] SHA2-384
826,875 UART: [kat] SHA2-512-ACC
829,213 UART: [kat] ECC-384
3,111,585 UART: [kat] HMAC-384Kdf
3,123,679 UART: [kat] LMS
4,313,794 UART: [kat] --
4,318,727 UART: [cold-reset] ++
4,320,447 UART: [fht] Storing FHT @ 0x50003400
4,331,928 UART: [idev] ++
4,332,582 UART: [idev] CDI.KEYID = 6
4,333,500 UART: [idev] SUBJECT.KEYID = 7
4,334,724 UART: [idev] UDS.KEYID = 0
4,337,419 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,921 UART: [idev] Erasing UDS.KEYID = 0
7,623,034 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,758 UART: [idev] --
7,648,396 UART: [ldev] ++
7,648,961 UART: [ldev] CDI.KEYID = 6
7,649,901 UART: [ldev] SUBJECT.KEYID = 5
7,651,090 UART: [ldev] AUTHORITY.KEYID = 7
7,652,455 UART: [ldev] FE.KEYID = 1
7,663,234 UART: [ldev] Erasing FE.KEYID = 1
10,953,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,319 UART: [ldev] --
13,313,373 UART: [fwproc] Waiting for Commands...
13,316,122 UART: [fwproc] Received command 0x46574c44
13,318,302 UART: [fwproc] Received Image of size 114036 bytes
13,375,645 UART: ROM Fatal Error: 0x000B0002
13,379,104 >>> mbox cmd response: failed
13,379,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,742 >>> mbox cmd response: failed
13,380,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,331 >>> mbox cmd response: failed
Initializing fuses
2,050,096 writing to cptra_bootfsm_go
2,239,402 UART:
2,239,748 UART: Running Caliptra ROM ...
2,240,794 UART:
7,088,594 UART: [state] CFI Enabled
7,103,536 UART: [state] LifecycleState = Unprovisioned
7,105,462 UART: [state] DebugLocked = No
7,106,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,111,866 UART: [kat] SHA2-256
7,281,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,292,171 UART: [kat] ++
7,292,688 UART: [kat] sha1
7,303,577 UART: [kat] SHA2-256
7,306,281 UART: [kat] SHA2-384
7,311,893 UART: [kat] SHA2-512-ACC
7,314,310 UART: [kat] ECC-384
9,600,093 UART: [kat] HMAC-384Kdf
9,611,726 UART: [kat] LMS
10,801,854 UART: [kat] --
10,805,306 UART: [cold-reset] ++
10,807,615 UART: [fht] Storing FHT @ 0x50003400
10,818,507 UART: [idev] ++
10,819,079 UART: [idev] CDI.KEYID = 6
10,820,019 UART: [idev] SUBJECT.KEYID = 7
10,821,288 UART: [idev] UDS.KEYID = 0
10,824,009 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,967,378 UART: [idev] Erasing UDS.KEYID = 0
14,109,390 UART: [idev] Using Sha1 for KeyId Algorithm
14,131,258 UART: [idev] --
14,135,358 UART: [ldev] ++
14,135,928 UART: [ldev] CDI.KEYID = 6
14,136,864 UART: [ldev] SUBJECT.KEYID = 5
14,138,117 UART: [ldev] AUTHORITY.KEYID = 7
14,139,269 UART: [ldev] FE.KEYID = 1
14,151,514 UART: [ldev] Erasing FE.KEYID = 1
17,439,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,733,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,748,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,763,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,777,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,796,322 UART: [ldev] --
19,801,857 UART: [fwproc] Waiting for Commands...
19,803,687 UART: [fwproc] Received command 0x46574c44
19,805,896 UART: [fwproc] Received Image of size 114036 bytes
23,853,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,932,175 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,001,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,318,850 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,129,235 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,119,851 >>> mbox cmd response: failed
13,120,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,993 >>> mbox cmd response: failed
13,121,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,121,563 >>> mbox cmd response: failed
Initializing fuses
2,047,526 writing to cptra_bootfsm_go
10,874,445 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,804,031 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,172 UART:
192,565 UART: Running Caliptra ROM ...
193,659 UART:
193,802 UART: [state] CFI Enabled
256,541 UART: [state] LifecycleState = Unprovisioned
258,425 UART: [state] DebugLocked = No
260,027 UART: [state] WD Timer not started. Device not locked for debugging
263,640 UART: [kat] SHA2-256
442,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,375 UART: [kat] ++
454,913 UART: [kat] sha1
466,011 UART: [kat] SHA2-256
469,043 UART: [kat] SHA2-384
473,997 UART: [kat] SHA2-512-ACC
476,986 UART: [kat] ECC-384
2,925,938 UART: [kat] HMAC-384Kdf
2,947,514 UART: [kat] LMS
3,476,931 UART: [kat] --
3,482,877 UART: [cold-reset] ++
3,484,444 UART: [fht] FHT @ 0x50003400
3,494,613 UART: [idev] ++
3,495,177 UART: [idev] CDI.KEYID = 6
3,496,142 UART: [idev] SUBJECT.KEYID = 7
3,497,297 UART: [idev] UDS.KEYID = 0
3,500,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,644,391 UART: [idev] Erasing UDS.KEYID = 0
6,004,347 UART: [idev] Sha1 KeyId Algorithm
6,027,327 UART: [idev] --
6,030,568 UART: [ldev] ++
6,031,271 UART: [ldev] CDI.KEYID = 6
6,032,165 UART: [ldev] SUBJECT.KEYID = 5
6,033,190 UART: [ldev] AUTHORITY.KEYID = 7
6,034,535 UART: [ldev] FE.KEYID = 1
6,076,783 UART: [ldev] Erasing FE.KEYID = 1
8,582,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,501 UART: [ldev] --
10,390,371 UART: [fwproc] Wait for Commands...
10,392,577 UART: [fwproc] Recv command 0x46574c44
10,394,618 UART: [fwproc] Recv'd Img size: 114360 bytes
10,451,530 UART: ROM Fatal Error: 0x000B0002
10,454,604 >>> mbox cmd response: failed
10,455,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,455,362 >>> mbox cmd response: failed
10,455,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,455,920 >>> mbox cmd response: failed
Initializing fuses
2,057,564 writing to cptra_bootfsm_go
2,246,854 UART:
2,247,203 UART: Running Caliptra ROM ...
2,248,333 UART:
2,248,506 UART: [state] CFI Enabled
2,309,457 UART: [state] LifecycleState = Unprovisioned
2,311,335 UART: [state] DebugLocked = No
2,312,586 UART: [state] WD Timer not started. Device not locked for debugging
2,316,224 UART: [kat] SHA2-256
2,495,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,902 UART: [kat] ++
2,507,451 UART: [kat] sha1
2,517,318 UART: [kat] SHA2-256
2,520,332 UART: [kat] SHA2-384
2,526,870 UART: [kat] SHA2-512-ACC
2,529,823 UART: [kat] ECC-384
4,992,516 UART: [kat] HMAC-384Kdf
5,014,819 UART: [kat] LMS
5,544,296 UART: [kat] --
5,548,449 UART: [cold-reset] ++
5,549,954 UART: [fht] FHT @ 0x50003400
5,562,172 UART: [idev] ++
5,562,777 UART: [idev] CDI.KEYID = 6
5,563,717 UART: [idev] SUBJECT.KEYID = 7
5,564,883 UART: [idev] UDS.KEYID = 0
5,567,373 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,181 UART: [idev] Erasing UDS.KEYID = 0
8,069,386 UART: [idev] Sha1 KeyId Algorithm
8,091,644 UART: [idev] --
8,095,539 UART: [ldev] ++
8,096,112 UART: [ldev] CDI.KEYID = 6
8,097,025 UART: [ldev] SUBJECT.KEYID = 5
8,098,191 UART: [ldev] AUTHORITY.KEYID = 7
8,099,421 UART: [ldev] FE.KEYID = 1
8,143,502 UART: [ldev] Erasing FE.KEYID = 1
10,642,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,361,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,377,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,393,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,409,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,430,314 UART: [ldev] --
12,434,442 UART: [fwproc] Wait for Commands...
12,437,476 UART: [fwproc] Recv command 0x46574c44
12,439,592 UART: [fwproc] Recv'd Img size: 114360 bytes
15,836,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,906,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,975,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,292,324 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,218 UART:
192,573 UART: Running Caliptra ROM ...
193,770 UART:
193,921 UART: [state] CFI Enabled
261,725 UART: [state] LifecycleState = Unprovisioned
264,165 UART: [state] DebugLocked = No
266,745 UART: [state] WD Timer not started. Device not locked for debugging
270,744 UART: [kat] SHA2-256
460,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,429 UART: [kat] ++
471,885 UART: [kat] sha1
483,411 UART: [kat] SHA2-256
486,443 UART: [kat] SHA2-384
491,667 UART: [kat] SHA2-512-ACC
494,222 UART: [kat] ECC-384
2,948,551 UART: [kat] HMAC-384Kdf
2,971,059 UART: [kat] LMS
3,502,831 UART: [kat] --
3,507,053 UART: [cold-reset] ++
3,509,312 UART: [fht] FHT @ 0x50003400
3,520,063 UART: [idev] ++
3,520,753 UART: [idev] CDI.KEYID = 6
3,521,728 UART: [idev] SUBJECT.KEYID = 7
3,522,944 UART: [idev] UDS.KEYID = 0
3,525,744 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,850 UART: [idev] Erasing UDS.KEYID = 0
6,026,646 UART: [idev] Sha1 KeyId Algorithm
6,048,426 UART: [idev] --
6,052,231 UART: [ldev] ++
6,052,917 UART: [ldev] CDI.KEYID = 6
6,053,809 UART: [ldev] SUBJECT.KEYID = 5
6,054,975 UART: [ldev] AUTHORITY.KEYID = 7
6,056,214 UART: [ldev] FE.KEYID = 1
6,098,441 UART: [ldev] Erasing FE.KEYID = 1
8,601,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,227 UART: [ldev] --
10,412,783 UART: [fwproc] Wait for Commands...
10,414,776 UART: [fwproc] Recv command 0x46574c44
10,417,042 UART: [fwproc] Recv'd Img size: 114360 bytes
10,504,087 UART: ROM Fatal Error: 0x000B0002
10,507,754 >>> mbox cmd response: failed
10,508,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,508,506 >>> mbox cmd response: failed
10,508,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,509,066 >>> mbox cmd response: failed
Initializing fuses
2,063,443 writing to cptra_bootfsm_go
2,252,715 UART:
2,253,084 UART: Running Caliptra ROM ...
2,254,138 UART:
2,254,290 UART: [state] CFI Enabled
2,319,944 UART: [state] LifecycleState = Unprovisioned
2,322,331 UART: [state] DebugLocked = No
2,324,389 UART: [state] WD Timer not started. Device not locked for debugging
2,328,217 UART: [kat] SHA2-256
2,518,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,879 UART: [kat] ++
2,529,371 UART: [kat] sha1
2,541,829 UART: [kat] SHA2-256
2,544,857 UART: [kat] SHA2-384
2,551,663 UART: [kat] SHA2-512-ACC
2,554,235 UART: [kat] ECC-384
5,001,528 UART: [kat] HMAC-384Kdf
5,027,815 UART: [kat] LMS
5,559,600 UART: [kat] --
5,564,538 UART: [cold-reset] ++
5,566,043 UART: [fht] FHT @ 0x50003400
5,577,412 UART: [idev] ++
5,578,099 UART: [idev] CDI.KEYID = 6
5,579,090 UART: [idev] SUBJECT.KEYID = 7
5,580,259 UART: [idev] UDS.KEYID = 0
5,583,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,726,965 UART: [idev] Erasing UDS.KEYID = 0
8,083,717 UART: [idev] Sha1 KeyId Algorithm
8,106,628 UART: [idev] --
8,110,624 UART: [ldev] ++
8,111,303 UART: [ldev] CDI.KEYID = 6
8,112,240 UART: [ldev] SUBJECT.KEYID = 5
8,113,400 UART: [ldev] AUTHORITY.KEYID = 7
8,114,633 UART: [ldev] FE.KEYID = 1
8,155,448 UART: [ldev] Erasing FE.KEYID = 1
10,661,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,762 UART: [ldev] --
12,469,137 UART: [fwproc] Wait for Commands...
12,471,290 UART: [fwproc] Recv command 0x46574c44
12,473,607 UART: [fwproc] Recv'd Img size: 114360 bytes
15,926,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,006,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,122,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,664,263 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,891 writing to cptra_bootfsm_go
3,443,596 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,323,026 >>> mbox cmd response: failed
10,323,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,323,913 >>> mbox cmd response: failed
10,324,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,538 >>> mbox cmd response: failed
Initializing fuses
2,051,951 writing to cptra_bootfsm_go
5,489,421 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,779,922 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,486 UART:
192,848 UART: Running Caliptra ROM ...
193,956 UART:
603,681 UART: [state] CFI Enabled
615,646 UART: [state] LifecycleState = Unprovisioned
618,024 UART: [state] DebugLocked = No
620,436 UART: [state] WD Timer not started. Device not locked for debugging
625,666 UART: [kat] SHA2-256
815,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,348 UART: [kat] ++
826,938 UART: [kat] sha1
838,632 UART: [kat] SHA2-256
841,634 UART: [kat] SHA2-384
848,209 UART: [kat] SHA2-512-ACC
850,765 UART: [kat] ECC-384
3,292,640 UART: [kat] HMAC-384Kdf
3,305,957 UART: [kat] LMS
3,837,751 UART: [kat] --
3,842,770 UART: [cold-reset] ++
3,844,968 UART: [fht] FHT @ 0x50003400
3,856,648 UART: [idev] ++
3,857,325 UART: [idev] CDI.KEYID = 6
3,858,341 UART: [idev] SUBJECT.KEYID = 7
3,859,498 UART: [idev] UDS.KEYID = 0
3,862,131 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,963 UART: [idev] Erasing UDS.KEYID = 0
6,335,709 UART: [idev] Sha1 KeyId Algorithm
6,356,887 UART: [idev] --
6,362,178 UART: [ldev] ++
6,362,860 UART: [ldev] CDI.KEYID = 6
6,363,774 UART: [ldev] SUBJECT.KEYID = 5
6,364,935 UART: [ldev] AUTHORITY.KEYID = 7
6,366,165 UART: [ldev] FE.KEYID = 1
6,378,288 UART: [ldev] Erasing FE.KEYID = 1
8,856,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,645 UART: [ldev] --
10,647,946 UART: [fwproc] Wait for Commands...
10,650,100 UART: [fwproc] Recv command 0x46574c44
10,652,362 UART: [fwproc] Recv'd Img size: 114360 bytes
10,737,294 UART: ROM Fatal Error: 0x000B0002
10,740,970 >>> mbox cmd response: failed
10,741,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,741,682 >>> mbox cmd response: failed
10,741,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,742,245 >>> mbox cmd response: failed
Initializing fuses
2,050,632 writing to cptra_bootfsm_go
2,240,036 UART:
2,240,401 UART: Running Caliptra ROM ...
2,241,548 UART:
9,714,288 UART: [state] CFI Enabled
9,727,063 UART: [state] LifecycleState = Unprovisioned
9,729,452 UART: [state] DebugLocked = No
9,731,444 UART: [state] WD Timer not started. Device not locked for debugging
9,736,766 UART: [kat] SHA2-256
9,926,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,937,430 UART: [kat] ++
9,938,032 UART: [kat] sha1
9,949,763 UART: [kat] SHA2-256
9,952,780 UART: [kat] SHA2-384
9,957,692 UART: [kat] SHA2-512-ACC
9,960,324 UART: [kat] ECC-384
12,401,170 UART: [kat] HMAC-384Kdf
12,414,001 UART: [kat] LMS
12,945,847 UART: [kat] --
12,949,102 UART: [cold-reset] ++
12,950,825 UART: [fht] FHT @ 0x50003400
12,962,340 UART: [idev] ++
12,963,128 UART: [idev] CDI.KEYID = 6
12,964,022 UART: [idev] SUBJECT.KEYID = 7
12,965,242 UART: [idev] UDS.KEYID = 0
12,967,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,111,715 UART: [idev] Erasing UDS.KEYID = 0
15,444,492 UART: [idev] Sha1 KeyId Algorithm
15,465,690 UART: [idev] --
15,471,415 UART: [ldev] ++
15,472,097 UART: [ldev] CDI.KEYID = 6
15,473,011 UART: [ldev] SUBJECT.KEYID = 5
15,474,174 UART: [ldev] AUTHORITY.KEYID = 7
15,475,400 UART: [ldev] FE.KEYID = 1
15,486,814 UART: [ldev] Erasing FE.KEYID = 1
17,970,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,691,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,706,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,721,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,737,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,757,189 UART: [ldev] --
19,763,370 UART: [fwproc] Wait for Commands...
19,764,819 UART: [fwproc] Recv command 0x46574c44
19,766,702 UART: [fwproc] Recv'd Img size: 114360 bytes
23,217,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,298,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,414,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,957,843 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,755,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,515,315 >>> mbox cmd response: failed
10,515,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,516,292 >>> mbox cmd response: failed
10,516,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,516,854 >>> mbox cmd response: failed
Initializing fuses
2,046,890 writing to cptra_bootfsm_go
13,109,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,294,327 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,698 UART: [state] LifecycleState = Unprovisioned
86,353 UART: [state] DebugLocked = No
86,887 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,537 UART: [kat] SHA2-256
882,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,583 UART: [kat] ++
886,735 UART: [kat] sha1
890,823 UART: [kat] SHA2-256
892,761 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,408 UART: [kat] LMS
1,475,604 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,477,111 UART: [fht] Storing FHT @ 0x50003400
1,479,980 UART: [idev] ++
1,480,148 UART: [idev] CDI.KEYID = 6
1,480,508 UART: [idev] SUBJECT.KEYID = 7
1,480,932 UART: [idev] UDS.KEYID = 0
1,481,277 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,846 UART: [idev] Erasing UDS.KEYID = 0
1,505,858 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,412 UART: [idev] --
1,515,271 UART: [ldev] ++
1,515,439 UART: [ldev] CDI.KEYID = 6
1,515,802 UART: [ldev] SUBJECT.KEYID = 5
1,516,228 UART: [ldev] AUTHORITY.KEYID = 7
1,516,691 UART: [ldev] FE.KEYID = 1
1,521,597 UART: [ldev] Erasing FE.KEYID = 1
1,547,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,180 UART: [ldev] --
1,586,689 UART: [fwproc] Waiting for Commands...
1,587,316 UART: [fwproc] Received command 0x46574c44
1,588,107 UART: [fwproc] Received Image of size 114360 bytes
1,607,206 UART: ROM Fatal Error: 0x000B0002
1,608,363 >>> mbox cmd response: failed
1,608,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,369 >>> mbox cmd response: failed
1,608,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,398 UART: [kat] SHA2-512-ACC
897,299 UART: [kat] ECC-384
902,908 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,567 UART: [cold-reset] ++
1,477,009 UART: [fht] Storing FHT @ 0x50003400
1,479,906 UART: [idev] ++
1,480,074 UART: [idev] CDI.KEYID = 6
1,480,434 UART: [idev] SUBJECT.KEYID = 7
1,480,858 UART: [idev] UDS.KEYID = 0
1,481,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,642 UART: [idev] Erasing UDS.KEYID = 0
1,505,398 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,092 UART: [idev] --
1,515,183 UART: [ldev] ++
1,515,351 UART: [ldev] CDI.KEYID = 6
1,515,714 UART: [ldev] SUBJECT.KEYID = 5
1,516,140 UART: [ldev] AUTHORITY.KEYID = 7
1,516,603 UART: [ldev] FE.KEYID = 1
1,521,975 UART: [ldev] Erasing FE.KEYID = 1
1,547,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,842 UART: [ldev] --
1,586,213 UART: [fwproc] Waiting for Commands...
1,586,840 UART: [fwproc] Received command 0x46574c44
1,587,631 UART: [fwproc] Received Image of size 114360 bytes
2,885,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,986 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,459,566 >>> mbox cmd response: failed
1,459,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,572 >>> mbox cmd response: failed
1,459,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,176 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,475 UART: [kat] SHA2-512-ACC
897,376 UART: [kat] ECC-384
903,201 UART: [kat] HMAC-384Kdf
907,865 UART: [kat] LMS
1,476,061 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,536 UART: [fht] Storing FHT @ 0x50003400
1,480,329 UART: [idev] ++
1,480,497 UART: [idev] CDI.KEYID = 6
1,480,857 UART: [idev] SUBJECT.KEYID = 7
1,481,281 UART: [idev] UDS.KEYID = 0
1,481,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,207 UART: [idev] Erasing UDS.KEYID = 0
1,505,809 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,398 UART: [ldev] ++
1,515,566 UART: [ldev] CDI.KEYID = 6
1,515,929 UART: [ldev] SUBJECT.KEYID = 5
1,516,355 UART: [ldev] AUTHORITY.KEYID = 7
1,516,818 UART: [ldev] FE.KEYID = 1
1,522,176 UART: [ldev] Erasing FE.KEYID = 1
1,547,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,763 UART: [ldev] --
1,587,056 UART: [fwproc] Waiting for Commands...
1,587,805 UART: [fwproc] Received command 0x46574c44
1,588,596 UART: [fwproc] Received Image of size 114360 bytes
1,607,743 UART: ROM Fatal Error: 0x000B0002
1,608,900 >>> mbox cmd response: failed
1,608,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,906 >>> mbox cmd response: failed
1,608,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,732 UART: [kat] SHA2-256
882,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,778 UART: [kat] ++
886,930 UART: [kat] sha1
891,250 UART: [kat] SHA2-256
893,188 UART: [kat] SHA2-384
895,939 UART: [kat] SHA2-512-ACC
897,840 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
908,111 UART: [kat] LMS
1,476,307 UART: [kat] --
1,477,276 UART: [cold-reset] ++
1,477,616 UART: [fht] Storing FHT @ 0x50003400
1,480,545 UART: [idev] ++
1,480,713 UART: [idev] CDI.KEYID = 6
1,481,073 UART: [idev] SUBJECT.KEYID = 7
1,481,497 UART: [idev] UDS.KEYID = 0
1,481,842 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,505,365 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,987 UART: [idev] --
1,515,070 UART: [ldev] ++
1,515,238 UART: [ldev] CDI.KEYID = 6
1,515,601 UART: [ldev] SUBJECT.KEYID = 5
1,516,027 UART: [ldev] AUTHORITY.KEYID = 7
1,516,490 UART: [ldev] FE.KEYID = 1
1,522,010 UART: [ldev] Erasing FE.KEYID = 1
1,547,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,831 UART: [ldev] --
1,587,110 UART: [fwproc] Waiting for Commands...
1,587,881 UART: [fwproc] Received command 0x46574c44
1,588,672 UART: [fwproc] Received Image of size 114360 bytes
2,885,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,838 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,047 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,459,675 >>> mbox cmd response: failed
1,459,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,681 >>> mbox cmd response: failed
1,459,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,510 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,391 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,078 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,171,891 UART: [cold-reset] ++
1,172,415 UART: [fht] FHT @ 0x50003400
1,175,100 UART: [idev] ++
1,175,268 UART: [idev] CDI.KEYID = 6
1,175,628 UART: [idev] SUBJECT.KEYID = 7
1,176,052 UART: [idev] UDS.KEYID = 0
1,176,397 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,200,571 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,402 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,335 UART: [ldev] Erasing FE.KEYID = 1
1,242,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,037 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,459 UART: ROM Fatal Error: 0x000B0002
1,303,616 >>> mbox cmd response: failed
1,303,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,622 >>> mbox cmd response: failed
1,303,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,147 UART: [kat] SHA2-256
904,087 UART: [kat] SHA2-384
906,834 UART: [kat] SHA2-512-ACC
908,735 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
923,134 UART: [kat] LMS
1,171,462 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,825 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,662 UART: [idev] Erasing UDS.KEYID = 0
1,201,665 UART: [idev] Sha1 KeyId Algorithm
1,210,209 UART: [idev] --
1,211,439 UART: [ldev] ++
1,211,607 UART: [ldev] CDI.KEYID = 6
1,211,970 UART: [ldev] SUBJECT.KEYID = 5
1,212,396 UART: [ldev] AUTHORITY.KEYID = 7
1,212,859 UART: [ldev] FE.KEYID = 1
1,217,979 UART: [ldev] Erasing FE.KEYID = 1
1,244,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,911 UART: [ldev] --
1,283,292 UART: [fwproc] Wait for Commands...
1,283,980 UART: [fwproc] Recv command 0x46574c44
1,284,708 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,283 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,375 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,158,663 >>> mbox cmd response: failed
1,158,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,669 >>> mbox cmd response: failed
1,158,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,675 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,930 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,144 UART: [kat] SHA2-256
904,084 UART: [kat] SHA2-384
906,967 UART: [kat] SHA2-512-ACC
908,868 UART: [kat] ECC-384
918,843 UART: [kat] HMAC-384Kdf
923,403 UART: [kat] LMS
1,171,731 UART: [kat] --
1,172,882 UART: [cold-reset] ++
1,173,320 UART: [fht] FHT @ 0x50003400
1,175,917 UART: [idev] ++
1,176,085 UART: [idev] CDI.KEYID = 6
1,176,445 UART: [idev] SUBJECT.KEYID = 7
1,176,869 UART: [idev] UDS.KEYID = 0
1,177,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,823 UART: [idev] Erasing UDS.KEYID = 0
1,202,306 UART: [idev] Sha1 KeyId Algorithm
1,210,752 UART: [idev] --
1,211,628 UART: [ldev] ++
1,211,796 UART: [ldev] CDI.KEYID = 6
1,212,159 UART: [ldev] SUBJECT.KEYID = 5
1,212,585 UART: [ldev] AUTHORITY.KEYID = 7
1,213,048 UART: [ldev] FE.KEYID = 1
1,218,400 UART: [ldev] Erasing FE.KEYID = 1
1,244,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,768 UART: [ldev] --
1,284,117 UART: [fwproc] Wait for Commands...
1,284,859 UART: [fwproc] Recv command 0x46574c44
1,285,587 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,652 UART: ROM Fatal Error: 0x000B0002
1,305,809 >>> mbox cmd response: failed
1,305,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,815 >>> mbox cmd response: failed
1,305,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,839 UART: [state] LifecycleState = Unprovisioned
86,494 UART: [state] DebugLocked = No
87,116 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,172,078 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,287 UART: [idev] ++
1,175,455 UART: [idev] CDI.KEYID = 6
1,175,815 UART: [idev] SUBJECT.KEYID = 7
1,176,239 UART: [idev] UDS.KEYID = 0
1,176,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,671 UART: [idev] Erasing UDS.KEYID = 0
1,200,886 UART: [idev] Sha1 KeyId Algorithm
1,209,320 UART: [idev] --
1,210,240 UART: [ldev] ++
1,210,408 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,197 UART: [ldev] AUTHORITY.KEYID = 7
1,211,660 UART: [ldev] FE.KEYID = 1
1,216,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,600 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,733 UART: [fwproc] Recv command 0x46574c44
1,283,461 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,434 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,636 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,516 >>> mbox cmd response: failed
1,159,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,522 >>> mbox cmd response: failed
1,159,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,759 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,860 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,415 UART: [cold-reset] ++
1,169,933 UART: [fht] FHT @ 0x50003400
1,172,759 UART: [idev] ++
1,172,927 UART: [idev] CDI.KEYID = 6
1,173,288 UART: [idev] SUBJECT.KEYID = 7
1,173,713 UART: [idev] UDS.KEYID = 0
1,174,059 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,253 UART: [idev] Sha1 KeyId Algorithm
1,206,929 UART: [idev] --
1,207,834 UART: [ldev] ++
1,208,002 UART: [ldev] CDI.KEYID = 6
1,208,366 UART: [ldev] SUBJECT.KEYID = 5
1,208,793 UART: [ldev] AUTHORITY.KEYID = 7
1,209,256 UART: [ldev] FE.KEYID = 1
1,214,560 UART: [ldev] Erasing FE.KEYID = 1
1,240,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,414 UART: [ldev] --
1,279,786 UART: [fwproc] Wait for Commands...
1,280,437 UART: [fwproc] Recv command 0x46574c44
1,281,170 UART: [fwproc] Recv'd Img size: 114360 bytes
1,300,278 UART: ROM Fatal Error: 0x000B0002
1,301,435 >>> mbox cmd response: failed
1,301,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,301,441 >>> mbox cmd response: failed
1,301,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,301,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,116 UART: [kat] LMS
1,168,428 UART: [kat] --
1,169,243 UART: [cold-reset] ++
1,169,807 UART: [fht] FHT @ 0x50003400
1,172,505 UART: [idev] ++
1,172,673 UART: [idev] CDI.KEYID = 6
1,173,034 UART: [idev] SUBJECT.KEYID = 7
1,173,459 UART: [idev] UDS.KEYID = 0
1,173,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,197 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,207,151 UART: [idev] --
1,208,304 UART: [ldev] ++
1,208,472 UART: [ldev] CDI.KEYID = 6
1,208,836 UART: [ldev] SUBJECT.KEYID = 5
1,209,263 UART: [ldev] AUTHORITY.KEYID = 7
1,209,726 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,798 UART: [ldev] --
1,281,112 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,355 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,345 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,118 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,020 >>> mbox cmd response: failed
1,154,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,026 >>> mbox cmd response: failed
1,154,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,337 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,197 UART: [kat] LMS
1,169,509 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,174,912 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,664 UART: [idev] Sha1 KeyId Algorithm
1,209,436 UART: [idev] --
1,210,327 UART: [ldev] ++
1,210,495 UART: [ldev] CDI.KEYID = 6
1,210,859 UART: [ldev] SUBJECT.KEYID = 5
1,211,286 UART: [ldev] AUTHORITY.KEYID = 7
1,211,749 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,427 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,901 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,689 UART: ROM Fatal Error: 0x000B0002
1,303,846 >>> mbox cmd response: failed
1,303,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,852 >>> mbox cmd response: failed
1,303,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,174,480 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,282,097 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,451 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,540 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,815 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,155,299 >>> mbox cmd response: failed
1,155,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,305 >>> mbox cmd response: failed
1,155,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,590 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,018 UART:
192,388 UART: Running Caliptra ROM ...
193,512 UART:
193,660 UART: [state] CFI Enabled
264,300 UART: [state] LifecycleState = Unprovisioned
266,273 UART: [state] DebugLocked = No
268,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,638 UART: [kat] SHA2-256
444,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,857 UART: [kat] ++
455,307 UART: [kat] sha1
467,104 UART: [kat] SHA2-256
469,782 UART: [kat] SHA2-384
476,296 UART: [kat] SHA2-512-ACC
478,642 UART: [kat] ECC-384
2,768,449 UART: [kat] HMAC-384Kdf
2,792,709 UART: [kat] LMS
3,983,002 UART: [kat] --
3,987,339 UART: [cold-reset] ++
3,988,256 UART: [fht] Storing FHT @ 0x50003400
3,999,168 UART: [idev] ++
3,999,745 UART: [idev] CDI.KEYID = 6
4,000,763 UART: [idev] SUBJECT.KEYID = 7
4,001,935 UART: [idev] UDS.KEYID = 0
4,004,978 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,148,666 UART: [idev] Erasing UDS.KEYID = 0
7,340,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,740 UART: [idev] --
7,366,958 UART: [ldev] ++
7,367,527 UART: [ldev] CDI.KEYID = 6
7,368,473 UART: [ldev] SUBJECT.KEYID = 5
7,369,692 UART: [ldev] AUTHORITY.KEYID = 7
7,370,984 UART: [ldev] FE.KEYID = 1
7,416,513 UART: [ldev] Erasing FE.KEYID = 1
10,748,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,300 UART: [ldev] --
13,130,891 UART: [fwproc] Waiting for Commands...
13,132,938 UART: [fwproc] Received command 0x46574c44
13,135,127 UART: [fwproc] Received Image of size 114036 bytes
14,533,797 UART: ROM Fatal Error: 0x000B0019
14,537,267 >>> mbox cmd response: failed
14,537,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,538,007 >>> mbox cmd response: failed
14,538,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,538,574 >>> mbox cmd response: failed
Initializing fuses
2,055,433 writing to cptra_bootfsm_go
2,244,739 UART:
2,245,103 UART: Running Caliptra ROM ...
2,246,243 UART:
2,246,409 UART: [state] CFI Enabled
2,314,107 UART: [state] LifecycleState = Unprovisioned
2,316,103 UART: [state] DebugLocked = No
2,317,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,103 UART: [kat] SHA2-256
2,491,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,310 UART: [kat] ++
2,502,768 UART: [kat] sha1
2,514,523 UART: [kat] SHA2-256
2,517,223 UART: [kat] SHA2-384
2,523,703 UART: [kat] SHA2-512-ACC
2,526,076 UART: [kat] ECC-384
4,816,004 UART: [kat] HMAC-384Kdf
4,847,296 UART: [kat] LMS
6,037,623 UART: [kat] --
6,042,334 UART: [cold-reset] ++
6,043,786 UART: [fht] Storing FHT @ 0x50003400
6,055,546 UART: [idev] ++
6,056,125 UART: [idev] CDI.KEYID = 6
6,057,110 UART: [idev] SUBJECT.KEYID = 7
6,058,330 UART: [idev] UDS.KEYID = 0
6,061,047 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,205,004 UART: [idev] Erasing UDS.KEYID = 0
9,393,747 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,731 UART: [idev] --
9,420,221 UART: [ldev] ++
9,420,890 UART: [ldev] CDI.KEYID = 6
9,421,827 UART: [ldev] SUBJECT.KEYID = 5
9,423,037 UART: [ldev] AUTHORITY.KEYID = 7
9,424,281 UART: [ldev] FE.KEYID = 1
9,470,427 UART: [ldev] Erasing FE.KEYID = 1
12,803,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,110,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,125,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,154,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,829 UART: [ldev] --
15,178,835 UART: [fwproc] Waiting for Commands...
15,181,298 UART: [fwproc] Received command 0x46574c44
15,183,501 UART: [fwproc] Received Image of size 114036 bytes
19,238,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,316,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,385,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,702,755 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,786,261 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,238,169 >>> mbox cmd response: failed
14,238,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,239,084 >>> mbox cmd response: failed
14,239,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,239,648 >>> mbox cmd response: failed
Initializing fuses
2,050,268 writing to cptra_bootfsm_go
5,842,280 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,930,141 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,629 UART:
192,988 UART: Running Caliptra ROM ...
194,125 UART:
603,659 UART: [state] CFI Enabled
616,380 UART: [state] LifecycleState = Unprovisioned
618,354 UART: [state] DebugLocked = No
620,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,162 UART: [kat] SHA2-256
794,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,447 UART: [kat] ++
806,036 UART: [kat] sha1
815,811 UART: [kat] SHA2-256
818,503 UART: [kat] SHA2-384
825,133 UART: [kat] SHA2-512-ACC
827,525 UART: [kat] ECC-384
3,111,652 UART: [kat] HMAC-384Kdf
3,124,098 UART: [kat] LMS
4,314,227 UART: [kat] --
4,319,595 UART: [cold-reset] ++
4,322,020 UART: [fht] Storing FHT @ 0x50003400
4,333,131 UART: [idev] ++
4,333,755 UART: [idev] CDI.KEYID = 6
4,334,667 UART: [idev] SUBJECT.KEYID = 7
4,335,885 UART: [idev] UDS.KEYID = 0
4,338,712 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,129 UART: [idev] Erasing UDS.KEYID = 0
7,623,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,532 UART: [idev] --
7,649,393 UART: [ldev] ++
7,650,001 UART: [ldev] CDI.KEYID = 6
7,650,921 UART: [ldev] SUBJECT.KEYID = 5
7,652,141 UART: [ldev] AUTHORITY.KEYID = 7
7,653,373 UART: [ldev] FE.KEYID = 1
7,663,318 UART: [ldev] Erasing FE.KEYID = 1
10,952,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,479 UART: [ldev] --
13,314,586 UART: [fwproc] Waiting for Commands...
13,317,982 UART: [fwproc] Received command 0x46574c44
13,320,166 UART: [fwproc] Received Image of size 114036 bytes
14,718,711 UART: ROM Fatal Error: 0x000B0019
14,722,212 >>> mbox cmd response: failed
14,722,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,722,951 >>> mbox cmd response: failed
14,723,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,723,514 >>> mbox cmd response: failed
Initializing fuses
2,060,490 writing to cptra_bootfsm_go
2,249,805 UART:
2,250,150 UART: Running Caliptra ROM ...
2,251,283 UART:
5,741,425 UART: [state] CFI Enabled
5,759,156 UART: [state] LifecycleState = Unprovisioned
5,761,094 UART: [state] DebugLocked = No
5,763,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,768,801 UART: [kat] SHA2-256
5,938,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,949,089 UART: [kat] ++
5,949,637 UART: [kat] sha1
5,960,808 UART: [kat] SHA2-256
5,963,546 UART: [kat] SHA2-384
5,969,193 UART: [kat] SHA2-512-ACC
5,971,561 UART: [kat] ECC-384
8,256,761 UART: [kat] HMAC-384Kdf
8,269,586 UART: [kat] LMS
9,459,702 UART: [kat] --
9,464,959 UART: [cold-reset] ++
9,466,188 UART: [fht] Storing FHT @ 0x50003400
9,477,883 UART: [idev] ++
9,478,467 UART: [idev] CDI.KEYID = 6
9,479,488 UART: [idev] SUBJECT.KEYID = 7
9,480,646 UART: [idev] UDS.KEYID = 0
9,483,649 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
9,626,910 UART: [idev] Erasing UDS.KEYID = 0
12,766,768 UART: [idev] Using Sha1 for KeyId Algorithm
12,789,399 UART: [idev] --
12,793,404 UART: [ldev] ++
12,794,028 UART: [ldev] CDI.KEYID = 6
12,794,948 UART: [ldev] SUBJECT.KEYID = 5
12,796,268 UART: [ldev] AUTHORITY.KEYID = 7
12,797,446 UART: [ldev] FE.KEYID = 1
12,810,035 UART: [ldev] Erasing FE.KEYID = 1
16,100,660 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,395,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,409,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,424,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,439,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,457,434 UART: [ldev] --
18,462,925 UART: [fwproc] Waiting for Commands...
18,465,890 UART: [fwproc] Received command 0x46574c44
18,468,080 UART: [fwproc] Received Image of size 114036 bytes
22,525,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,604,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,673,512 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,990,802 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,129,785 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,453,589 >>> mbox cmd response: failed
14,454,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,454,553 >>> mbox cmd response: failed
14,454,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,455,117 >>> mbox cmd response: failed
Initializing fuses
2,055,510 writing to cptra_bootfsm_go
9,541,248 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,489,965 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,374 UART:
192,727 UART: Running Caliptra ROM ...
193,903 UART:
194,055 UART: [state] CFI Enabled
265,131 UART: [state] LifecycleState = Unprovisioned
267,023 UART: [state] DebugLocked = No
268,870 UART: [state] WD Timer not started. Device not locked for debugging
272,585 UART: [kat] SHA2-256
451,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,295 UART: [kat] ++
463,838 UART: [kat] sha1
473,484 UART: [kat] SHA2-256
476,549 UART: [kat] SHA2-384
481,876 UART: [kat] SHA2-512-ACC
484,808 UART: [kat] ECC-384
2,948,168 UART: [kat] HMAC-384Kdf
2,971,204 UART: [kat] LMS
3,500,634 UART: [kat] --
3,505,540 UART: [cold-reset] ++
3,506,388 UART: [fht] FHT @ 0x50003400
3,516,988 UART: [idev] ++
3,517,560 UART: [idev] CDI.KEYID = 6
3,518,599 UART: [idev] SUBJECT.KEYID = 7
3,519,703 UART: [idev] UDS.KEYID = 0
3,522,457 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,503 UART: [idev] Erasing UDS.KEYID = 0
6,025,011 UART: [idev] Sha1 KeyId Algorithm
6,047,941 UART: [idev] --
6,052,973 UART: [ldev] ++
6,053,560 UART: [ldev] CDI.KEYID = 6
6,054,482 UART: [ldev] SUBJECT.KEYID = 5
6,055,650 UART: [ldev] AUTHORITY.KEYID = 7
6,056,883 UART: [ldev] FE.KEYID = 1
6,100,060 UART: [ldev] Erasing FE.KEYID = 1
8,603,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,134 UART: [ldev] --
10,414,429 UART: [fwproc] Wait for Commands...
10,416,478 UART: [fwproc] Recv command 0x46574c44
10,418,575 UART: [fwproc] Recv'd Img size: 114360 bytes
11,491,467 UART: ROM Fatal Error: 0x000B0019
11,494,585 >>> mbox cmd response: failed
11,495,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,495,396 >>> mbox cmd response: failed
11,495,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,496,080 >>> mbox cmd response: failed
Initializing fuses
2,057,686 writing to cptra_bootfsm_go
2,247,044 UART:
2,247,401 UART: Running Caliptra ROM ...
2,248,450 UART:
2,248,614 UART: [state] CFI Enabled
2,313,620 UART: [state] LifecycleState = Unprovisioned
2,315,462 UART: [state] DebugLocked = No
2,316,713 UART: [state] WD Timer not started. Device not locked for debugging
2,321,207 UART: [kat] SHA2-256
2,500,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,909 UART: [kat] ++
2,512,369 UART: [kat] sha1
2,524,388 UART: [kat] SHA2-256
2,527,416 UART: [kat] SHA2-384
2,533,784 UART: [kat] SHA2-512-ACC
2,536,726 UART: [kat] ECC-384
5,000,382 UART: [kat] HMAC-384Kdf
5,023,122 UART: [kat] LMS
5,552,616 UART: [kat] --
5,555,803 UART: [cold-reset] ++
5,558,002 UART: [fht] FHT @ 0x50003400
5,568,931 UART: [idev] ++
5,569,501 UART: [idev] CDI.KEYID = 6
5,570,382 UART: [idev] SUBJECT.KEYID = 7
5,571,543 UART: [idev] UDS.KEYID = 0
5,574,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,718,155 UART: [idev] Erasing UDS.KEYID = 0
8,078,963 UART: [idev] Sha1 KeyId Algorithm
8,102,315 UART: [idev] --
8,106,826 UART: [ldev] ++
8,107,402 UART: [ldev] CDI.KEYID = 6
8,108,309 UART: [ldev] SUBJECT.KEYID = 5
8,109,468 UART: [ldev] AUTHORITY.KEYID = 7
8,110,769 UART: [ldev] FE.KEYID = 1
8,150,750 UART: [ldev] Erasing FE.KEYID = 1
10,653,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,339 UART: [ldev] --
12,442,630 UART: [fwproc] Wait for Commands...
12,445,430 UART: [fwproc] Recv command 0x46574c44
12,447,528 UART: [fwproc] Recv'd Img size: 114360 bytes
15,849,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,920,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,989,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,306,567 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,173 UART:
192,536 UART: Running Caliptra ROM ...
193,733 UART:
193,884 UART: [state] CFI Enabled
260,842 UART: [state] LifecycleState = Unprovisioned
263,242 UART: [state] DebugLocked = No
265,273 UART: [state] WD Timer not started. Device not locked for debugging
270,287 UART: [kat] SHA2-256
460,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,924 UART: [kat] ++
471,415 UART: [kat] sha1
483,129 UART: [kat] SHA2-256
486,138 UART: [kat] SHA2-384
491,525 UART: [kat] SHA2-512-ACC
494,138 UART: [kat] ECC-384
2,958,883 UART: [kat] HMAC-384Kdf
2,983,047 UART: [kat] LMS
3,514,821 UART: [kat] --
3,520,081 UART: [cold-reset] ++
3,521,103 UART: [fht] FHT @ 0x50003400
3,532,786 UART: [idev] ++
3,533,527 UART: [idev] CDI.KEYID = 6
3,534,439 UART: [idev] SUBJECT.KEYID = 7
3,535,658 UART: [idev] UDS.KEYID = 0
3,538,691 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,682,778 UART: [idev] Erasing UDS.KEYID = 0
6,039,199 UART: [idev] Sha1 KeyId Algorithm
6,061,277 UART: [idev] --
6,066,117 UART: [ldev] ++
6,066,816 UART: [ldev] CDI.KEYID = 6
6,067,733 UART: [ldev] SUBJECT.KEYID = 5
6,068,899 UART: [ldev] AUTHORITY.KEYID = 7
6,070,137 UART: [ldev] FE.KEYID = 1
6,113,353 UART: [ldev] Erasing FE.KEYID = 1
8,617,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,412 UART: [ldev] --
10,427,356 UART: [fwproc] Wait for Commands...
10,429,082 UART: [fwproc] Recv command 0x46574c44
10,431,399 UART: [fwproc] Recv'd Img size: 114360 bytes
11,536,518 UART: ROM Fatal Error: 0x000B0019
11,540,170 >>> mbox cmd response: failed
11,540,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,540,950 >>> mbox cmd response: failed
11,541,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,541,516 >>> mbox cmd response: failed
Initializing fuses
2,053,363 writing to cptra_bootfsm_go
2,242,667 UART:
2,243,034 UART: Running Caliptra ROM ...
2,244,175 UART:
2,244,337 UART: [state] CFI Enabled
2,304,091 UART: [state] LifecycleState = Unprovisioned
2,306,489 UART: [state] DebugLocked = No
2,308,322 UART: [state] WD Timer not started. Device not locked for debugging
2,313,324 UART: [kat] SHA2-256
2,503,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,513,936 UART: [kat] ++
2,514,676 UART: [kat] sha1
2,525,851 UART: [kat] SHA2-256
2,528,869 UART: [kat] SHA2-384
2,536,319 UART: [kat] SHA2-512-ACC
2,538,896 UART: [kat] ECC-384
4,985,878 UART: [kat] HMAC-384Kdf
5,010,552 UART: [kat] LMS
5,542,332 UART: [kat] --
5,547,937 UART: [cold-reset] ++
5,549,387 UART: [fht] FHT @ 0x50003400
5,561,763 UART: [idev] ++
5,562,504 UART: [idev] CDI.KEYID = 6
5,563,425 UART: [idev] SUBJECT.KEYID = 7
5,564,587 UART: [idev] UDS.KEYID = 0
5,567,534 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,376 UART: [idev] Erasing UDS.KEYID = 0
8,105,548 UART: [idev] Sha1 KeyId Algorithm
8,127,487 UART: [idev] --
8,131,131 UART: [ldev] ++
8,131,819 UART: [ldev] CDI.KEYID = 6
8,132,708 UART: [ldev] SUBJECT.KEYID = 5
8,133,813 UART: [ldev] AUTHORITY.KEYID = 7
8,135,104 UART: [ldev] FE.KEYID = 1
8,173,373 UART: [ldev] Erasing FE.KEYID = 1
10,679,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,416,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,431,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,446,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,462,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,483,509 UART: [ldev] --
12,488,235 UART: [fwproc] Wait for Commands...
12,489,791 UART: [fwproc] Recv command 0x46574c44
12,492,106 UART: [fwproc] Recv'd Img size: 114360 bytes
15,945,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,029,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,145,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,689,027 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,097 writing to cptra_bootfsm_go
3,440,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,302,875 >>> mbox cmd response: failed
11,303,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,303,780 >>> mbox cmd response: failed
11,304,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,304,351 >>> mbox cmd response: failed
Initializing fuses
2,054,076 writing to cptra_bootfsm_go
5,470,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,764,152 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,481 UART:
192,835 UART: Running Caliptra ROM ...
194,036 UART:
603,699 UART: [state] CFI Enabled
616,866 UART: [state] LifecycleState = Unprovisioned
619,267 UART: [state] DebugLocked = No
621,943 UART: [state] WD Timer not started. Device not locked for debugging
626,460 UART: [kat] SHA2-256
816,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,148 UART: [kat] ++
827,704 UART: [kat] sha1
839,504 UART: [kat] SHA2-256
842,564 UART: [kat] SHA2-384
848,541 UART: [kat] SHA2-512-ACC
851,131 UART: [kat] ECC-384
3,291,542 UART: [kat] HMAC-384Kdf
3,304,091 UART: [kat] LMS
3,835,924 UART: [kat] --
3,840,393 UART: [cold-reset] ++
3,842,155 UART: [fht] FHT @ 0x50003400
3,852,696 UART: [idev] ++
3,853,371 UART: [idev] CDI.KEYID = 6
3,854,309 UART: [idev] SUBJECT.KEYID = 7
3,855,520 UART: [idev] UDS.KEYID = 0
3,858,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,963 UART: [idev] Erasing UDS.KEYID = 0
6,331,033 UART: [idev] Sha1 KeyId Algorithm
6,353,783 UART: [idev] --
6,357,836 UART: [ldev] ++
6,358,569 UART: [ldev] CDI.KEYID = 6
6,359,449 UART: [ldev] SUBJECT.KEYID = 5
6,360,664 UART: [ldev] AUTHORITY.KEYID = 7
6,361,841 UART: [ldev] FE.KEYID = 1
6,374,846 UART: [ldev] Erasing FE.KEYID = 1
8,854,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,358 UART: [ldev] --
10,647,712 UART: [fwproc] Wait for Commands...
10,649,541 UART: [fwproc] Recv command 0x46574c44
10,651,874 UART: [fwproc] Recv'd Img size: 114360 bytes
11,751,007 UART: ROM Fatal Error: 0x000B0019
11,754,669 >>> mbox cmd response: failed
11,755,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,755,355 >>> mbox cmd response: failed
11,755,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,755,915 >>> mbox cmd response: failed
Initializing fuses
2,051,256 writing to cptra_bootfsm_go
2,240,639 UART:
2,240,988 UART: Running Caliptra ROM ...
2,242,127 UART:
8,698,247 UART: [state] CFI Enabled
8,709,964 UART: [state] LifecycleState = Unprovisioned
8,712,317 UART: [state] DebugLocked = No
8,714,844 UART: [state] WD Timer not started. Device not locked for debugging
8,719,344 UART: [kat] SHA2-256
8,909,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,920,024 UART: [kat] ++
8,920,627 UART: [kat] sha1
8,932,448 UART: [kat] SHA2-256
8,935,477 UART: [kat] SHA2-384
8,941,236 UART: [kat] SHA2-512-ACC
8,943,815 UART: [kat] ECC-384
11,385,656 UART: [kat] HMAC-384Kdf
11,398,486 UART: [kat] LMS
11,930,303 UART: [kat] --
11,934,798 UART: [cold-reset] ++
11,936,788 UART: [fht] FHT @ 0x50003400
11,948,383 UART: [idev] ++
11,949,062 UART: [idev] CDI.KEYID = 6
11,950,079 UART: [idev] SUBJECT.KEYID = 7
11,951,240 UART: [idev] UDS.KEYID = 0
11,954,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,098,071 UART: [idev] Erasing UDS.KEYID = 0
14,430,309 UART: [idev] Sha1 KeyId Algorithm
14,453,541 UART: [idev] --
14,457,371 UART: [ldev] ++
14,458,056 UART: [ldev] CDI.KEYID = 6
14,458,965 UART: [ldev] SUBJECT.KEYID = 5
14,460,177 UART: [ldev] AUTHORITY.KEYID = 7
14,461,406 UART: [ldev] FE.KEYID = 1
14,471,608 UART: [ldev] Erasing FE.KEYID = 1
16,945,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,662,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,677,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,693,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,708,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,729,052 UART: [ldev] --
18,734,968 UART: [fwproc] Wait for Commands...
18,736,685 UART: [fwproc] Recv command 0x46574c44
18,738,998 UART: [fwproc] Recv'd Img size: 114360 bytes
22,188,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,265,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,382,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
22,924,327 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,755,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,544,274 >>> mbox cmd response: failed
11,544,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,545,194 >>> mbox cmd response: failed
11,545,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,545,749 >>> mbox cmd response: failed
Initializing fuses
2,050,499 writing to cptra_bootfsm_go
12,067,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,268,632 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,106 UART: [kat] SHA2-512-ACC
897,007 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,392 UART: [kat] LMS
1,475,588 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,446 UART: [idev] ++
1,479,614 UART: [idev] CDI.KEYID = 6
1,479,974 UART: [idev] SUBJECT.KEYID = 7
1,480,398 UART: [idev] UDS.KEYID = 0
1,480,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,310 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,344 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,520,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,080 UART: [ldev] --
1,585,493 UART: [fwproc] Waiting for Commands...
1,586,152 UART: [fwproc] Received command 0x46574c44
1,586,943 UART: [fwproc] Received Image of size 114360 bytes
1,626,138 UART: ROM Fatal Error: 0x000B0019
1,627,295 >>> mbox cmd response: failed
1,627,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,301 >>> mbox cmd response: failed
1,627,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,672 UART: [state] LifecycleState = Unprovisioned
86,327 UART: [state] DebugLocked = No
86,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,499 UART: [kat] SHA2-256
882,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,545 UART: [kat] ++
886,697 UART: [kat] sha1
890,915 UART: [kat] SHA2-256
892,853 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,260 UART: [idev] ++
1,479,428 UART: [idev] CDI.KEYID = 6
1,479,788 UART: [idev] SUBJECT.KEYID = 7
1,480,212 UART: [idev] UDS.KEYID = 0
1,480,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,404 UART: [idev] Erasing UDS.KEYID = 0
1,504,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,886 UART: [idev] --
1,513,757 UART: [ldev] ++
1,513,925 UART: [ldev] CDI.KEYID = 6
1,514,288 UART: [ldev] SUBJECT.KEYID = 5
1,514,714 UART: [ldev] AUTHORITY.KEYID = 7
1,515,177 UART: [ldev] FE.KEYID = 1
1,520,645 UART: [ldev] Erasing FE.KEYID = 1
1,545,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,618 UART: [ldev] --
1,585,063 UART: [fwproc] Waiting for Commands...
1,585,754 UART: [fwproc] Received command 0x46574c44
1,586,545 UART: [fwproc] Received Image of size 114360 bytes
2,884,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,633 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,874 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,039 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,478,220 >>> mbox cmd response: failed
1,478,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,226 >>> mbox cmd response: failed
1,478,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,335 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,664 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
902,897 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,862 UART: [cold-reset] ++
1,477,318 UART: [fht] Storing FHT @ 0x50003400
1,480,055 UART: [idev] ++
1,480,223 UART: [idev] CDI.KEYID = 6
1,480,583 UART: [idev] SUBJECT.KEYID = 7
1,481,007 UART: [idev] UDS.KEYID = 0
1,481,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,251 UART: [idev] Erasing UDS.KEYID = 0
1,505,769 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,469 UART: [idev] --
1,515,496 UART: [ldev] ++
1,515,664 UART: [ldev] CDI.KEYID = 6
1,516,027 UART: [ldev] SUBJECT.KEYID = 5
1,516,453 UART: [ldev] AUTHORITY.KEYID = 7
1,516,916 UART: [ldev] FE.KEYID = 1
1,522,228 UART: [ldev] Erasing FE.KEYID = 1
1,547,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,625 UART: [ldev] --
1,586,958 UART: [fwproc] Waiting for Commands...
1,587,675 UART: [fwproc] Received command 0x46574c44
1,588,466 UART: [fwproc] Received Image of size 114360 bytes
1,627,893 UART: ROM Fatal Error: 0x000B0019
1,629,050 >>> mbox cmd response: failed
1,629,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,056 >>> mbox cmd response: failed
1,629,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,285 UART: [kat] SHA2-512-ACC
897,186 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,553 UART: [kat] LMS
1,475,749 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,721 UART: [idev] ++
1,479,889 UART: [idev] CDI.KEYID = 6
1,480,249 UART: [idev] SUBJECT.KEYID = 7
1,480,673 UART: [idev] UDS.KEYID = 0
1,481,018 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,901 UART: [idev] Erasing UDS.KEYID = 0
1,505,531 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,392 UART: [ldev] ++
1,515,560 UART: [ldev] CDI.KEYID = 6
1,515,923 UART: [ldev] SUBJECT.KEYID = 5
1,516,349 UART: [ldev] AUTHORITY.KEYID = 7
1,516,812 UART: [ldev] FE.KEYID = 1
1,522,340 UART: [ldev] Erasing FE.KEYID = 1
1,547,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,915 UART: [ldev] --
1,586,412 UART: [fwproc] Waiting for Commands...
1,587,233 UART: [fwproc] Received command 0x46574c44
1,588,024 UART: [fwproc] Received Image of size 114360 bytes
2,885,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,406 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,758 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,621 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,624 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,482,667 >>> mbox cmd response: failed
1,482,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,673 >>> mbox cmd response: failed
1,482,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,923 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,543 UART: [kat] SHA2-256
903,483 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,626 UART: [kat] LMS
1,170,954 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,175,004 UART: [idev] ++
1,175,172 UART: [idev] CDI.KEYID = 6
1,175,532 UART: [idev] SUBJECT.KEYID = 7
1,175,956 UART: [idev] UDS.KEYID = 0
1,176,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,976 UART: [idev] Erasing UDS.KEYID = 0
1,201,221 UART: [idev] Sha1 KeyId Algorithm
1,209,801 UART: [idev] --
1,210,833 UART: [ldev] ++
1,211,001 UART: [ldev] CDI.KEYID = 6
1,211,364 UART: [ldev] SUBJECT.KEYID = 5
1,211,790 UART: [ldev] AUTHORITY.KEYID = 7
1,212,253 UART: [ldev] FE.KEYID = 1
1,217,533 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,157 UART: [ldev] --
1,283,564 UART: [fwproc] Wait for Commands...
1,284,352 UART: [fwproc] Recv command 0x46574c44
1,285,080 UART: [fwproc] Recv'd Img size: 114360 bytes
1,324,255 UART: ROM Fatal Error: 0x000B0019
1,325,412 >>> mbox cmd response: failed
1,325,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,418 >>> mbox cmd response: failed
1,325,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
902,259 UART: [kat] SHA2-256
904,199 UART: [kat] SHA2-384
906,992 UART: [kat] SHA2-512-ACC
908,893 UART: [kat] ECC-384
918,848 UART: [kat] HMAC-384Kdf
923,308 UART: [kat] LMS
1,171,636 UART: [kat] --
1,172,309 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,266 UART: [idev] ++
1,175,434 UART: [idev] CDI.KEYID = 6
1,175,794 UART: [idev] SUBJECT.KEYID = 7
1,176,218 UART: [idev] UDS.KEYID = 0
1,176,563 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,282 UART: [idev] Erasing UDS.KEYID = 0
1,201,291 UART: [idev] Sha1 KeyId Algorithm
1,209,789 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,232 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,537 UART: [ldev] --
1,282,922 UART: [fwproc] Wait for Commands...
1,283,526 UART: [fwproc] Recv command 0x46574c44
1,284,254 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,321 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,085 >>> mbox cmd response: failed
1,179,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,091 >>> mbox cmd response: failed
1,179,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,324 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,157 UART: [kat] HMAC-384Kdf
922,911 UART: [kat] LMS
1,171,239 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,300 UART: [fht] FHT @ 0x50003400
1,174,809 UART: [idev] ++
1,174,977 UART: [idev] CDI.KEYID = 6
1,175,337 UART: [idev] SUBJECT.KEYID = 7
1,175,761 UART: [idev] UDS.KEYID = 0
1,176,106 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,727 UART: [idev] Erasing UDS.KEYID = 0
1,200,792 UART: [idev] Sha1 KeyId Algorithm
1,209,356 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,217,332 UART: [ldev] Erasing FE.KEYID = 1
1,243,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,420 UART: [ldev] --
1,282,743 UART: [fwproc] Wait for Commands...
1,283,393 UART: [fwproc] Recv command 0x46574c44
1,284,121 UART: [fwproc] Recv'd Img size: 114360 bytes
1,323,168 UART: ROM Fatal Error: 0x000B0019
1,324,325 >>> mbox cmd response: failed
1,324,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,331 >>> mbox cmd response: failed
1,324,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,442 UART: [kat] SHA2-256
904,382 UART: [kat] SHA2-384
907,273 UART: [kat] SHA2-512-ACC
909,174 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,395 UART: [kat] LMS
1,171,723 UART: [kat] --
1,172,710 UART: [cold-reset] ++
1,173,044 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,591 UART: [idev] Erasing UDS.KEYID = 0
1,201,716 UART: [idev] Sha1 KeyId Algorithm
1,210,180 UART: [idev] --
1,211,130 UART: [ldev] ++
1,211,298 UART: [ldev] CDI.KEYID = 6
1,211,661 UART: [ldev] SUBJECT.KEYID = 5
1,212,087 UART: [ldev] AUTHORITY.KEYID = 7
1,212,550 UART: [ldev] FE.KEYID = 1
1,217,648 UART: [ldev] Erasing FE.KEYID = 1
1,243,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,674 UART: [ldev] --
1,283,031 UART: [fwproc] Wait for Commands...
1,283,661 UART: [fwproc] Recv command 0x46574c44
1,284,389 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,442 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,574 >>> mbox cmd response: failed
1,178,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,580 >>> mbox cmd response: failed
1,178,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,329 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,346 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,335 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,174,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,556 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,687 UART: [fwproc] Recv command 0x46574c44
1,282,420 UART: [fwproc] Recv'd Img size: 114360 bytes
1,321,990 UART: ROM Fatal Error: 0x000B0019
1,323,147 >>> mbox cmd response: failed
1,323,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,153 >>> mbox cmd response: failed
1,323,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,174,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,198,951 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,080 UART: [ldev] ++
1,209,248 UART: [ldev] CDI.KEYID = 6
1,209,612 UART: [ldev] SUBJECT.KEYID = 5
1,210,039 UART: [ldev] AUTHORITY.KEYID = 7
1,210,502 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,248 UART: [ldev] --
1,281,588 UART: [fwproc] Wait for Commands...
1,282,231 UART: [fwproc] Recv command 0x46574c44
1,282,964 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,305 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,175,502 >>> mbox cmd response: failed
1,175,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,508 >>> mbox cmd response: failed
1,175,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,203 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,162 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,158 UART: [idev] ++
1,173,326 UART: [idev] CDI.KEYID = 6
1,173,687 UART: [idev] SUBJECT.KEYID = 7
1,174,112 UART: [idev] UDS.KEYID = 0
1,174,458 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,112 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,215,989 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,461 UART: [ldev] --
1,280,775 UART: [fwproc] Wait for Commands...
1,281,388 UART: [fwproc] Recv command 0x46574c44
1,282,121 UART: [fwproc] Recv'd Img size: 114360 bytes
1,321,957 UART: ROM Fatal Error: 0x000B0019
1,323,114 >>> mbox cmd response: failed
1,323,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,120 >>> mbox cmd response: failed
1,323,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
915,801 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,452 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,640 UART: [idev] Erasing UDS.KEYID = 0
1,198,520 UART: [idev] Sha1 KeyId Algorithm
1,207,434 UART: [idev] --
1,208,565 UART: [ldev] ++
1,208,733 UART: [ldev] CDI.KEYID = 6
1,209,097 UART: [ldev] SUBJECT.KEYID = 5
1,209,524 UART: [ldev] AUTHORITY.KEYID = 7
1,209,987 UART: [ldev] FE.KEYID = 1
1,215,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,125 UART: [ldev] --
1,281,541 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,056 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,127 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,176,221 >>> mbox cmd response: failed
1,176,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,227 >>> mbox cmd response: failed
1,176,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,904 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,069 UART:
192,447 UART: Running Caliptra ROM ...
193,534 UART:
193,696 UART: [state] CFI Enabled
263,878 UART: [state] LifecycleState = Unprovisioned
265,847 UART: [state] DebugLocked = No
267,092 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,970 UART: [kat] SHA2-256
441,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,199 UART: [kat] ++
452,681 UART: [kat] sha1
465,183 UART: [kat] SHA2-256
467,867 UART: [kat] SHA2-384
473,411 UART: [kat] SHA2-512-ACC
475,751 UART: [kat] ECC-384
2,765,679 UART: [kat] HMAC-384Kdf
2,778,842 UART: [kat] LMS
3,969,174 UART: [kat] --
3,973,632 UART: [cold-reset] ++
3,975,053 UART: [fht] Storing FHT @ 0x50003400
3,986,491 UART: [idev] ++
3,987,055 UART: [idev] CDI.KEYID = 6
3,987,943 UART: [idev] SUBJECT.KEYID = 7
3,989,213 UART: [idev] UDS.KEYID = 0
3,992,211 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,279 UART: [idev] Erasing UDS.KEYID = 0
7,325,989 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,949 UART: [idev] --
7,353,377 UART: [ldev] ++
7,354,002 UART: [ldev] CDI.KEYID = 6
7,354,892 UART: [ldev] SUBJECT.KEYID = 5
7,356,162 UART: [ldev] AUTHORITY.KEYID = 7
7,357,392 UART: [ldev] FE.KEYID = 1
7,401,915 UART: [ldev] Erasing FE.KEYID = 1
10,733,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,198 UART: [ldev] --
13,093,088 UART: [fwproc] Waiting for Commands...
13,094,984 UART: [fwproc] Received command 0x46574c44
13,097,172 UART: [fwproc] Received Image of size 114036 bytes
15,787,577 UART: ROM Fatal Error: 0x000B000F
15,791,023 >>> mbox cmd response: failed
15,791,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,791,777 >>> mbox cmd response: failed
15,792,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,792,339 >>> mbox cmd response: failed
Initializing fuses
2,056,785 writing to cptra_bootfsm_go
2,246,072 UART:
2,246,426 UART: Running Caliptra ROM ...
2,247,570 UART:
2,247,739 UART: [state] CFI Enabled
2,308,137 UART: [state] LifecycleState = Unprovisioned
2,310,072 UART: [state] DebugLocked = No
2,312,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,993 UART: [kat] SHA2-256
2,487,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,236 UART: [kat] ++
2,498,780 UART: [kat] sha1
2,509,566 UART: [kat] SHA2-256
2,512,303 UART: [kat] SHA2-384
2,519,168 UART: [kat] SHA2-512-ACC
2,521,522 UART: [kat] ECC-384
4,810,171 UART: [kat] HMAC-384Kdf
4,841,243 UART: [kat] LMS
6,031,536 UART: [kat] --
6,035,345 UART: [cold-reset] ++
6,037,178 UART: [fht] Storing FHT @ 0x50003400
6,049,475 UART: [idev] ++
6,050,046 UART: [idev] CDI.KEYID = 6
6,051,015 UART: [idev] SUBJECT.KEYID = 7
6,052,235 UART: [idev] UDS.KEYID = 0
6,055,018 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,198,449 UART: [idev] Erasing UDS.KEYID = 0
9,386,774 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,158 UART: [idev] --
9,413,486 UART: [ldev] ++
9,414,124 UART: [ldev] CDI.KEYID = 6
9,415,046 UART: [ldev] SUBJECT.KEYID = 5
9,416,317 UART: [ldev] AUTHORITY.KEYID = 7
9,417,500 UART: [ldev] FE.KEYID = 1
9,464,293 UART: [ldev] Erasing FE.KEYID = 1
12,795,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,468 UART: [ldev] --
15,163,953 UART: [fwproc] Waiting for Commands...
15,165,886 UART: [fwproc] Received command 0x46574c44
15,168,074 UART: [fwproc] Received Image of size 114036 bytes
19,225,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,299,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,368,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,686,539 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,785,268 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,520,048 >>> mbox cmd response: failed
15,520,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,521,079 >>> mbox cmd response: failed
15,521,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,521,643 >>> mbox cmd response: failed
Initializing fuses
2,053,697 writing to cptra_bootfsm_go
5,851,695 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,916,660 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,493 UART:
192,841 UART: Running Caliptra ROM ...
194,028 UART:
603,751 UART: [state] CFI Enabled
618,581 UART: [state] LifecycleState = Unprovisioned
620,463 UART: [state] DebugLocked = No
623,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,944 UART: [kat] SHA2-256
798,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,805 UART: [kat] ++
809,287 UART: [kat] sha1
820,656 UART: [kat] SHA2-256
823,348 UART: [kat] SHA2-384
829,330 UART: [kat] SHA2-512-ACC
831,724 UART: [kat] ECC-384
3,113,935 UART: [kat] HMAC-384Kdf
3,125,148 UART: [kat] LMS
4,315,249 UART: [kat] --
4,320,805 UART: [cold-reset] ++
4,321,819 UART: [fht] Storing FHT @ 0x50003400
4,333,246 UART: [idev] ++
4,333,808 UART: [idev] CDI.KEYID = 6
4,334,822 UART: [idev] SUBJECT.KEYID = 7
4,335,980 UART: [idev] UDS.KEYID = 0
4,339,003 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,453 UART: [idev] Erasing UDS.KEYID = 0
7,625,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,366 UART: [idev] --
7,651,638 UART: [ldev] ++
7,652,218 UART: [ldev] CDI.KEYID = 6
7,653,196 UART: [ldev] SUBJECT.KEYID = 5
7,654,432 UART: [ldev] AUTHORITY.KEYID = 7
7,655,668 UART: [ldev] FE.KEYID = 1
7,666,210 UART: [ldev] Erasing FE.KEYID = 1
10,954,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,487 UART: [ldev] --
13,312,396 UART: [fwproc] Waiting for Commands...
13,314,550 UART: [fwproc] Received command 0x46574c44
13,316,737 UART: [fwproc] Received Image of size 114036 bytes
16,009,459 UART: ROM Fatal Error: 0x000B000F
16,012,926 >>> mbox cmd response: failed
16,013,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,013,708 >>> mbox cmd response: failed
16,013,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,014,300 >>> mbox cmd response: failed
Initializing fuses
2,052,952 writing to cptra_bootfsm_go
2,242,275 UART:
2,242,631 UART: Running Caliptra ROM ...
2,243,771 UART:
4,441,854 UART: [state] CFI Enabled
4,456,648 UART: [state] LifecycleState = Unprovisioned
4,458,591 UART: [state] DebugLocked = No
4,461,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,466,094 UART: [kat] SHA2-256
4,635,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,646,392 UART: [kat] ++
4,646,936 UART: [kat] sha1
4,658,645 UART: [kat] SHA2-256
4,661,350 UART: [kat] SHA2-384
4,667,290 UART: [kat] SHA2-512-ACC
4,669,644 UART: [kat] ECC-384
6,955,227 UART: [kat] HMAC-384Kdf
6,966,856 UART: [kat] LMS
8,157,022 UART: [kat] --
8,161,892 UART: [cold-reset] ++
8,164,535 UART: [fht] Storing FHT @ 0x50003400
8,176,237 UART: [idev] ++
8,176,800 UART: [idev] CDI.KEYID = 6
8,177,767 UART: [idev] SUBJECT.KEYID = 7
8,178,981 UART: [idev] UDS.KEYID = 0
8,181,776 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,325,159 UART: [idev] Erasing UDS.KEYID = 0
11,466,359 UART: [idev] Using Sha1 for KeyId Algorithm
11,487,850 UART: [idev] --
11,491,788 UART: [ldev] ++
11,492,353 UART: [ldev] CDI.KEYID = 6
11,493,367 UART: [ldev] SUBJECT.KEYID = 5
11,494,675 UART: [ldev] AUTHORITY.KEYID = 7
11,495,806 UART: [ldev] FE.KEYID = 1
11,506,801 UART: [ldev] Erasing FE.KEYID = 1
14,797,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,092,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,106,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,121,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,136,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,155,716 UART: [ldev] --
17,161,244 UART: [fwproc] Waiting for Commands...
17,164,235 UART: [fwproc] Received command 0x46574c44
17,166,477 UART: [fwproc] Received Image of size 114036 bytes
21,215,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,291,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,360,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,676,975 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,132,592 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,759,470 >>> mbox cmd response: failed
15,760,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,397 >>> mbox cmd response: failed
15,760,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,761,024 >>> mbox cmd response: failed
Initializing fuses
2,048,693 writing to cptra_bootfsm_go
8,234,463 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,176,915 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,167 UART:
192,562 UART: Running Caliptra ROM ...
193,753 UART:
193,905 UART: [state] CFI Enabled
263,246 UART: [state] LifecycleState = Unprovisioned
265,118 UART: [state] DebugLocked = No
267,907 UART: [state] WD Timer not started. Device not locked for debugging
271,240 UART: [kat] SHA2-256
450,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,907 UART: [kat] ++
462,443 UART: [kat] sha1
473,218 UART: [kat] SHA2-256
476,220 UART: [kat] SHA2-384
482,251 UART: [kat] SHA2-512-ACC
485,192 UART: [kat] ECC-384
2,949,336 UART: [kat] HMAC-384Kdf
2,971,948 UART: [kat] LMS
3,501,402 UART: [kat] --
3,507,248 UART: [cold-reset] ++
3,509,729 UART: [fht] FHT @ 0x50003400
3,520,714 UART: [idev] ++
3,521,279 UART: [idev] CDI.KEYID = 6
3,522,189 UART: [idev] SUBJECT.KEYID = 7
3,523,404 UART: [idev] UDS.KEYID = 0
3,526,117 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,150 UART: [idev] Erasing UDS.KEYID = 0
6,026,970 UART: [idev] Sha1 KeyId Algorithm
6,049,927 UART: [idev] --
6,053,203 UART: [ldev] ++
6,053,786 UART: [ldev] CDI.KEYID = 6
6,054,675 UART: [ldev] SUBJECT.KEYID = 5
6,055,781 UART: [ldev] AUTHORITY.KEYID = 7
6,057,073 UART: [ldev] FE.KEYID = 1
6,100,124 UART: [ldev] Erasing FE.KEYID = 1
8,602,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,965 UART: [ldev] --
10,411,013 UART: [fwproc] Wait for Commands...
10,412,681 UART: [fwproc] Recv command 0x46574c44
10,414,731 UART: [fwproc] Recv'd Img size: 114360 bytes
12,455,915 UART: ROM Fatal Error: 0x000B000F
12,459,038 >>> mbox cmd response: failed
12,459,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,690 >>> mbox cmd response: failed
12,459,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,286 >>> mbox cmd response: failed
Initializing fuses
2,059,557 writing to cptra_bootfsm_go
2,248,894 UART:
2,249,248 UART: Running Caliptra ROM ...
2,250,382 UART:
2,250,552 UART: [state] CFI Enabled
2,310,361 UART: [state] LifecycleState = Unprovisioned
2,312,245 UART: [state] DebugLocked = No
2,314,019 UART: [state] WD Timer not started. Device not locked for debugging
2,318,258 UART: [kat] SHA2-256
2,497,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,937 UART: [kat] ++
2,509,484 UART: [kat] sha1
2,521,105 UART: [kat] SHA2-256
2,524,182 UART: [kat] SHA2-384
2,529,736 UART: [kat] SHA2-512-ACC
2,532,678 UART: [kat] ECC-384
4,992,438 UART: [kat] HMAC-384Kdf
5,014,779 UART: [kat] LMS
5,544,201 UART: [kat] --
5,549,581 UART: [cold-reset] ++
5,551,141 UART: [fht] FHT @ 0x50003400
5,561,803 UART: [idev] ++
5,562,366 UART: [idev] CDI.KEYID = 6
5,563,381 UART: [idev] SUBJECT.KEYID = 7
5,564,483 UART: [idev] UDS.KEYID = 0
5,567,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,020 UART: [idev] Erasing UDS.KEYID = 0
8,072,200 UART: [idev] Sha1 KeyId Algorithm
8,095,610 UART: [idev] --
8,099,397 UART: [ldev] ++
8,099,972 UART: [ldev] CDI.KEYID = 6
8,100,887 UART: [ldev] SUBJECT.KEYID = 5
8,102,046 UART: [ldev] AUTHORITY.KEYID = 7
8,103,339 UART: [ldev] FE.KEYID = 1
8,141,967 UART: [ldev] Erasing FE.KEYID = 1
10,644,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,363,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,379,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,395,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,411,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,431,189 UART: [ldev] --
12,436,405 UART: [fwproc] Wait for Commands...
12,439,421 UART: [fwproc] Recv command 0x46574c44
12,441,461 UART: [fwproc] Recv'd Img size: 114360 bytes
15,843,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,917,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,986,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,304,742 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,281 UART:
192,657 UART: Running Caliptra ROM ...
193,755 UART:
193,897 UART: [state] CFI Enabled
263,006 UART: [state] LifecycleState = Unprovisioned
265,430 UART: [state] DebugLocked = No
267,968 UART: [state] WD Timer not started. Device not locked for debugging
273,091 UART: [kat] SHA2-256
462,963 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,700 UART: [kat] ++
474,146 UART: [kat] sha1
485,621 UART: [kat] SHA2-256
488,629 UART: [kat] SHA2-384
495,472 UART: [kat] SHA2-512-ACC
498,034 UART: [kat] ECC-384
2,944,129 UART: [kat] HMAC-384Kdf
2,969,006 UART: [kat] LMS
3,500,767 UART: [kat] --
3,504,931 UART: [cold-reset] ++
3,506,760 UART: [fht] FHT @ 0x50003400
3,517,740 UART: [idev] ++
3,518,422 UART: [idev] CDI.KEYID = 6
3,519,438 UART: [idev] SUBJECT.KEYID = 7
3,520,540 UART: [idev] UDS.KEYID = 0
3,523,153 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,207 UART: [idev] Erasing UDS.KEYID = 0
6,024,671 UART: [idev] Sha1 KeyId Algorithm
6,046,122 UART: [idev] --
6,049,228 UART: [ldev] ++
6,049,924 UART: [ldev] CDI.KEYID = 6
6,050,841 UART: [ldev] SUBJECT.KEYID = 5
6,052,062 UART: [ldev] AUTHORITY.KEYID = 7
6,053,243 UART: [ldev] FE.KEYID = 1
6,097,813 UART: [ldev] Erasing FE.KEYID = 1
8,603,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,774 UART: [ldev] --
10,403,885 UART: [fwproc] Wait for Commands...
10,405,409 UART: [fwproc] Recv command 0x46574c44
10,407,723 UART: [fwproc] Recv'd Img size: 114360 bytes
12,477,983 UART: ROM Fatal Error: 0x000B000F
12,481,648 >>> mbox cmd response: failed
12,482,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,482,411 >>> mbox cmd response: failed
12,482,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,482,968 >>> mbox cmd response: failed
Initializing fuses
2,052,938 writing to cptra_bootfsm_go
2,242,259 UART:
2,242,609 UART: Running Caliptra ROM ...
2,243,656 UART:
2,243,829 UART: [state] CFI Enabled
2,315,796 UART: [state] LifecycleState = Unprovisioned
2,318,180 UART: [state] DebugLocked = No
2,319,597 UART: [state] WD Timer not started. Device not locked for debugging
2,324,923 UART: [kat] SHA2-256
2,514,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,583 UART: [kat] ++
2,526,041 UART: [kat] sha1
2,537,529 UART: [kat] SHA2-256
2,540,543 UART: [kat] SHA2-384
2,546,538 UART: [kat] SHA2-512-ACC
2,549,121 UART: [kat] ECC-384
5,001,047 UART: [kat] HMAC-384Kdf
5,024,472 UART: [kat] LMS
5,556,238 UART: [kat] --
5,559,864 UART: [cold-reset] ++
5,561,201 UART: [fht] FHT @ 0x50003400
5,573,496 UART: [idev] ++
5,574,189 UART: [idev] CDI.KEYID = 6
5,575,101 UART: [idev] SUBJECT.KEYID = 7
5,576,319 UART: [idev] UDS.KEYID = 0
5,579,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,723,140 UART: [idev] Erasing UDS.KEYID = 0
8,095,060 UART: [idev] Sha1 KeyId Algorithm
8,117,441 UART: [idev] --
8,122,845 UART: [ldev] ++
8,123,548 UART: [ldev] CDI.KEYID = 6
8,124,462 UART: [ldev] SUBJECT.KEYID = 5
8,125,624 UART: [ldev] AUTHORITY.KEYID = 7
8,126,862 UART: [ldev] FE.KEYID = 1
8,166,888 UART: [ldev] Erasing FE.KEYID = 1
10,678,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,408,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,424,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,439,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,454,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,476,957 UART: [ldev] --
12,481,681 UART: [fwproc] Wait for Commands...
12,483,560 UART: [fwproc] Recv command 0x46574c44
12,485,877 UART: [fwproc] Recv'd Img size: 114360 bytes
15,936,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,011,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,127,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,670,593 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,442,621 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,286,911 >>> mbox cmd response: failed
12,287,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,288,019 >>> mbox cmd response: failed
12,288,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,288,589 >>> mbox cmd response: failed
Initializing fuses
2,051,077 writing to cptra_bootfsm_go
5,468,809 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,768,562 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
192,832 UART:
193,662 UART: Running Caliptra ROM ...
194,811 UART:
604,124 UART: [state] CFI Enabled
616,684 UART: [state] LifecycleState = Unprovisioned
618,767 UART: [state] DebugLocked = No
620,721 UART: [state] WD Timer not started. Device not locked for debugging
624,680 UART: [kat] SHA2-256
814,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,345 UART: [kat] ++
825,873 UART: [kat] sha1
836,714 UART: [kat] SHA2-256
839,738 UART: [kat] SHA2-384
845,454 UART: [kat] SHA2-512-ACC
848,007 UART: [kat] ECC-384
3,287,918 UART: [kat] HMAC-384Kdf
3,301,467 UART: [kat] LMS
3,833,273 UART: [kat] --
3,839,486 UART: [cold-reset] ++
3,840,504 UART: [fht] FHT @ 0x50003400
3,851,786 UART: [idev] ++
3,852,515 UART: [idev] CDI.KEYID = 6
3,853,404 UART: [idev] SUBJECT.KEYID = 7
3,854,670 UART: [idev] UDS.KEYID = 0
3,857,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,428 UART: [idev] Erasing UDS.KEYID = 0
6,326,670 UART: [idev] Sha1 KeyId Algorithm
6,349,270 UART: [idev] --
6,352,998 UART: [ldev] ++
6,353,679 UART: [ldev] CDI.KEYID = 6
6,354,588 UART: [ldev] SUBJECT.KEYID = 5
6,355,748 UART: [ldev] AUTHORITY.KEYID = 7
6,356,978 UART: [ldev] FE.KEYID = 1
6,368,489 UART: [ldev] Erasing FE.KEYID = 1
8,847,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,725 UART: [ldev] --
10,638,095 UART: [fwproc] Wait for Commands...
10,641,061 UART: [fwproc] Recv command 0x46574c44
10,643,321 UART: [fwproc] Recv'd Img size: 114360 bytes
12,714,974 UART: ROM Fatal Error: 0x000B000F
12,718,629 >>> mbox cmd response: failed
12,719,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,387 >>> mbox cmd response: failed
12,719,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,948 >>> mbox cmd response: failed
Initializing fuses
2,057,776 writing to cptra_bootfsm_go
2,247,098 UART:
2,247,457 UART: Running Caliptra ROM ...
2,248,551 UART:
7,737,849 UART: [state] CFI Enabled
7,750,977 UART: [state] LifecycleState = Unprovisioned
7,753,404 UART: [state] DebugLocked = No
7,756,197 UART: [state] WD Timer not started. Device not locked for debugging
7,761,448 UART: [kat] SHA2-256
7,951,312 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,962,087 UART: [kat] ++
7,962,612 UART: [kat] sha1
7,973,174 UART: [kat] SHA2-256
7,976,181 UART: [kat] SHA2-384
7,980,771 UART: [kat] SHA2-512-ACC
7,983,338 UART: [kat] ECC-384
10,423,331 UART: [kat] HMAC-384Kdf
10,435,940 UART: [kat] LMS
10,967,747 UART: [kat] --
10,971,427 UART: [cold-reset] ++
10,974,062 UART: [fht] FHT @ 0x50003400
10,984,556 UART: [idev] ++
10,985,248 UART: [idev] CDI.KEYID = 6
10,986,184 UART: [idev] SUBJECT.KEYID = 7
10,987,392 UART: [idev] UDS.KEYID = 0
10,990,144 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,133,906 UART: [idev] Erasing UDS.KEYID = 0
13,468,649 UART: [idev] Sha1 KeyId Algorithm
13,491,872 UART: [idev] --
13,495,462 UART: [ldev] ++
13,496,209 UART: [ldev] CDI.KEYID = 6
13,497,117 UART: [ldev] SUBJECT.KEYID = 5
13,498,277 UART: [ldev] AUTHORITY.KEYID = 7
13,499,503 UART: [ldev] FE.KEYID = 1
13,510,261 UART: [ldev] Erasing FE.KEYID = 1
15,990,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,709,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,724,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,740,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,755,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,775,227 UART: [ldev] --
17,780,760 UART: [fwproc] Wait for Commands...
17,783,503 UART: [fwproc] Recv command 0x46574c44
17,785,763 UART: [fwproc] Recv'd Img size: 114360 bytes
21,224,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,300,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,416,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,959,270 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
3,759,231 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,512,554 >>> mbox cmd response: failed
12,513,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,478 >>> mbox cmd response: failed
12,513,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,031 >>> mbox cmd response: failed
Initializing fuses
2,055,701 writing to cptra_bootfsm_go
11,101,245 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,291,509 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,249 UART: [state] DebugLocked = No
86,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,523 UART: [kat] SHA2-256
882,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,569 UART: [kat] ++
886,721 UART: [kat] sha1
891,135 UART: [kat] SHA2-256
893,073 UART: [kat] SHA2-384
895,620 UART: [kat] SHA2-512-ACC
897,521 UART: [kat] ECC-384
903,058 UART: [kat] HMAC-384Kdf
907,496 UART: [kat] LMS
1,475,692 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,879 UART: [fht] Storing FHT @ 0x50003400
1,479,864 UART: [idev] ++
1,480,032 UART: [idev] CDI.KEYID = 6
1,480,392 UART: [idev] SUBJECT.KEYID = 7
1,480,816 UART: [idev] UDS.KEYID = 0
1,481,161 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,505,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,782 UART: [idev] --
1,514,735 UART: [ldev] ++
1,514,903 UART: [ldev] CDI.KEYID = 6
1,515,266 UART: [ldev] SUBJECT.KEYID = 5
1,515,692 UART: [ldev] AUTHORITY.KEYID = 7
1,516,155 UART: [ldev] FE.KEYID = 1
1,521,405 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,272 UART: [ldev] --
1,585,591 UART: [fwproc] Waiting for Commands...
1,586,344 UART: [fwproc] Received command 0x46574c44
1,587,135 UART: [fwproc] Received Image of size 114360 bytes
1,628,463 UART: ROM Fatal Error: 0x000B000F
1,629,622 >>> mbox cmd response: failed
1,629,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,628 >>> mbox cmd response: failed
1,629,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,741 UART: [kat] SHA2-256
881,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,787 UART: [kat] ++
885,939 UART: [kat] sha1
890,105 UART: [kat] SHA2-256
892,043 UART: [kat] SHA2-384
894,750 UART: [kat] SHA2-512-ACC
896,651 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,848 UART: [kat] LMS
1,475,044 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,291 UART: [fht] Storing FHT @ 0x50003400
1,479,020 UART: [idev] ++
1,479,188 UART: [idev] CDI.KEYID = 6
1,479,548 UART: [idev] SUBJECT.KEYID = 7
1,479,972 UART: [idev] UDS.KEYID = 0
1,480,317 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,320 UART: [idev] Erasing UDS.KEYID = 0
1,504,830 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,568 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,021 UART: [ldev] Erasing FE.KEYID = 1
1,546,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,374 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,628 UART: [fwproc] Received command 0x46574c44
1,587,419 UART: [fwproc] Received Image of size 114360 bytes
2,885,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,648 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,739 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,484,047 >>> mbox cmd response: failed
1,484,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,053 >>> mbox cmd response: failed
1,484,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,690 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,204 UART: [kat] SHA2-256
882,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,250 UART: [kat] ++
886,402 UART: [kat] sha1
890,568 UART: [kat] SHA2-256
892,506 UART: [kat] SHA2-384
895,105 UART: [kat] SHA2-512-ACC
897,006 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,192 UART: [cold-reset] ++
1,476,714 UART: [fht] Storing FHT @ 0x50003400
1,479,389 UART: [idev] ++
1,479,557 UART: [idev] CDI.KEYID = 6
1,479,917 UART: [idev] SUBJECT.KEYID = 7
1,480,341 UART: [idev] UDS.KEYID = 0
1,480,686 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,483 UART: [idev] --
1,514,368 UART: [ldev] ++
1,514,536 UART: [ldev] CDI.KEYID = 6
1,514,899 UART: [ldev] SUBJECT.KEYID = 5
1,515,325 UART: [ldev] AUTHORITY.KEYID = 7
1,515,788 UART: [ldev] FE.KEYID = 1
1,521,236 UART: [ldev] Erasing FE.KEYID = 1
1,546,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,711 UART: [ldev] --
1,586,168 UART: [fwproc] Waiting for Commands...
1,587,017 UART: [fwproc] Received command 0x46574c44
1,587,808 UART: [fwproc] Received Image of size 114360 bytes
1,630,062 UART: ROM Fatal Error: 0x000B000F
1,631,221 >>> mbox cmd response: failed
1,631,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,227 >>> mbox cmd response: failed
1,631,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,430 UART: [kat] SHA2-256
882,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,476 UART: [kat] ++
886,628 UART: [kat] sha1
891,044 UART: [kat] SHA2-256
892,982 UART: [kat] SHA2-384
895,643 UART: [kat] SHA2-512-ACC
897,544 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,709 UART: [kat] LMS
1,475,905 UART: [kat] --
1,476,814 UART: [cold-reset] ++
1,477,364 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,227 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,825 UART: [idev] --
1,514,848 UART: [ldev] ++
1,515,016 UART: [ldev] CDI.KEYID = 6
1,515,379 UART: [ldev] SUBJECT.KEYID = 5
1,515,805 UART: [ldev] AUTHORITY.KEYID = 7
1,516,268 UART: [ldev] FE.KEYID = 1
1,521,284 UART: [ldev] Erasing FE.KEYID = 1
1,546,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,057 UART: [ldev] --
1,586,496 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 114360 bytes
2,885,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,301 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,482,006 >>> mbox cmd response: failed
1,482,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,012 >>> mbox cmd response: failed
1,482,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,559 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,855 UART: [kat] SHA2-256
903,795 UART: [kat] SHA2-384
906,732 UART: [kat] SHA2-512-ACC
908,633 UART: [kat] ECC-384
918,398 UART: [kat] HMAC-384Kdf
923,040 UART: [kat] LMS
1,171,368 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,383 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,040 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,757 UART: [idev] --
1,210,751 UART: [ldev] ++
1,210,919 UART: [ldev] CDI.KEYID = 6
1,211,282 UART: [ldev] SUBJECT.KEYID = 5
1,211,708 UART: [ldev] AUTHORITY.KEYID = 7
1,212,171 UART: [ldev] FE.KEYID = 1
1,217,419 UART: [ldev] Erasing FE.KEYID = 1
1,243,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,200 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,690 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,032 UART: ROM Fatal Error: 0x000B000F
1,327,191 >>> mbox cmd response: failed
1,327,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,197 >>> mbox cmd response: failed
1,327,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
917,596 UART: [kat] HMAC-384Kdf
922,008 UART: [kat] LMS
1,170,336 UART: [kat] --
1,171,335 UART: [cold-reset] ++
1,171,695 UART: [fht] FHT @ 0x50003400
1,174,506 UART: [idev] ++
1,174,674 UART: [idev] CDI.KEYID = 6
1,175,034 UART: [idev] SUBJECT.KEYID = 7
1,175,458 UART: [idev] UDS.KEYID = 0
1,175,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,756 UART: [idev] Erasing UDS.KEYID = 0
1,200,583 UART: [idev] Sha1 KeyId Algorithm
1,209,015 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,858 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,585 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,119 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,340 >>> mbox cmd response: failed
1,181,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,346 >>> mbox cmd response: failed
1,181,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,082 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
893,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,860 UART: [kat] ++
898,012 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
907,105 UART: [kat] SHA2-512-ACC
909,006 UART: [kat] ECC-384
918,707 UART: [kat] HMAC-384Kdf
923,441 UART: [kat] LMS
1,171,769 UART: [kat] --
1,172,728 UART: [cold-reset] ++
1,173,120 UART: [fht] FHT @ 0x50003400
1,175,969 UART: [idev] ++
1,176,137 UART: [idev] CDI.KEYID = 6
1,176,497 UART: [idev] SUBJECT.KEYID = 7
1,176,921 UART: [idev] UDS.KEYID = 0
1,177,266 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,843 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,362 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,217,970 UART: [ldev] Erasing FE.KEYID = 1
1,244,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,234 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,151 UART: [fwproc] Recv command 0x46574c44
1,284,879 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,609 UART: ROM Fatal Error: 0x000B000F
1,327,768 >>> mbox cmd response: failed
1,327,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,774 >>> mbox cmd response: failed
1,327,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,363 UART: [kat] HMAC-384Kdf
923,057 UART: [kat] LMS
1,171,385 UART: [kat] --
1,172,530 UART: [cold-reset] ++
1,173,086 UART: [fht] FHT @ 0x50003400
1,175,751 UART: [idev] ++
1,175,919 UART: [idev] CDI.KEYID = 6
1,176,279 UART: [idev] SUBJECT.KEYID = 7
1,176,703 UART: [idev] UDS.KEYID = 0
1,177,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,375 UART: [idev] Erasing UDS.KEYID = 0
1,201,194 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,392 UART: [ldev] ++
1,210,560 UART: [ldev] CDI.KEYID = 6
1,210,923 UART: [ldev] SUBJECT.KEYID = 5
1,211,349 UART: [ldev] AUTHORITY.KEYID = 7
1,211,812 UART: [ldev] FE.KEYID = 1
1,217,178 UART: [ldev] Erasing FE.KEYID = 1
1,243,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,058 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,284,051 UART: [fwproc] Recv command 0x46574c44
1,284,779 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,140 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,635 >>> mbox cmd response: failed
1,181,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,641 >>> mbox cmd response: failed
1,181,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,629 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
891,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,851 UART: [kat] ++
896,003 UART: [kat] sha1
900,251 UART: [kat] SHA2-256
902,191 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,173,047 UART: [idev] ++
1,173,215 UART: [idev] CDI.KEYID = 6
1,173,576 UART: [idev] SUBJECT.KEYID = 7
1,174,001 UART: [idev] UDS.KEYID = 0
1,174,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,859 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,723 UART: [fwproc] Recv command 0x46574c44
1,282,456 UART: [fwproc] Recv'd Img size: 114360 bytes
1,323,676 UART: ROM Fatal Error: 0x000B000F
1,324,835 >>> mbox cmd response: failed
1,324,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,841 >>> mbox cmd response: failed
1,324,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,601 UART: [idev] Erasing UDS.KEYID = 0
1,199,653 UART: [idev] Sha1 KeyId Algorithm
1,208,603 UART: [idev] --
1,209,526 UART: [ldev] ++
1,209,694 UART: [ldev] CDI.KEYID = 6
1,210,058 UART: [ldev] SUBJECT.KEYID = 5
1,210,485 UART: [ldev] AUTHORITY.KEYID = 7
1,210,948 UART: [ldev] FE.KEYID = 1
1,215,842 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,090 UART: [ldev] --
1,281,516 UART: [fwproc] Wait for Commands...
1,282,251 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,749 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,174,378 >>> mbox cmd response: failed
1,174,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,384 >>> mbox cmd response: failed
1,174,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,885 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,186 UART: [kat] SHA2-256
902,126 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,370 UART: [fht] FHT @ 0x50003400
1,172,862 UART: [idev] ++
1,173,030 UART: [idev] CDI.KEYID = 6
1,173,391 UART: [idev] SUBJECT.KEYID = 7
1,173,816 UART: [idev] UDS.KEYID = 0
1,174,162 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,215,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,124 UART: [fwproc] Recv command 0x46574c44
1,282,857 UART: [fwproc] Recv'd Img size: 114360 bytes
1,324,557 UART: ROM Fatal Error: 0x000B000F
1,325,716 >>> mbox cmd response: failed
1,325,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,722 >>> mbox cmd response: failed
1,325,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,379 UART: [kat] SHA2-512-ACC
906,280 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,982 UART: [idev] Sha1 KeyId Algorithm
1,208,720 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,242,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,303 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,674 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,177,811 >>> mbox cmd response: failed
1,177,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,817 >>> mbox cmd response: failed
1,177,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,720 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,129 UART:
192,509 UART: Running Caliptra ROM ...
193,628 UART:
193,774 UART: [state] CFI Enabled
264,403 UART: [state] LifecycleState = Unprovisioned
266,365 UART: [state] DebugLocked = No
269,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,519 UART: [kat] SHA2-256
444,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,730 UART: [kat] ++
455,201 UART: [kat] sha1
467,163 UART: [kat] SHA2-256
469,902 UART: [kat] SHA2-384
476,819 UART: [kat] SHA2-512-ACC
479,159 UART: [kat] ECC-384
2,766,721 UART: [kat] HMAC-384Kdf
2,798,770 UART: [kat] LMS
3,989,084 UART: [kat] --
3,994,404 UART: [cold-reset] ++
3,996,993 UART: [fht] Storing FHT @ 0x50003400
4,008,643 UART: [idev] ++
4,009,253 UART: [idev] CDI.KEYID = 6
4,010,186 UART: [idev] SUBJECT.KEYID = 7
4,011,407 UART: [idev] UDS.KEYID = 0
4,014,460 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,994 UART: [idev] Erasing UDS.KEYID = 0
7,345,185 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,194 UART: [idev] --
7,370,618 UART: [ldev] ++
7,371,253 UART: [ldev] CDI.KEYID = 6
7,372,172 UART: [ldev] SUBJECT.KEYID = 5
7,373,337 UART: [ldev] AUTHORITY.KEYID = 7
7,374,627 UART: [ldev] FE.KEYID = 1
7,420,277 UART: [ldev] Erasing FE.KEYID = 1
10,755,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,390 UART: [ldev] --
13,134,884 UART: [fwproc] Waiting for Commands...
13,137,373 UART: [fwproc] Received command 0x46574c44
13,139,565 UART: [fwproc] Received Image of size 114036 bytes
14,537,236 UART: ROM Fatal Error: 0x000B001A
14,540,669 >>> mbox cmd response: failed
14,541,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,541,449 >>> mbox cmd response: failed
14,541,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,542,015 >>> mbox cmd response: failed
Initializing fuses
2,050,729 writing to cptra_bootfsm_go
2,239,979 UART:
2,240,338 UART: Running Caliptra ROM ...
2,241,415 UART:
2,241,571 UART: [state] CFI Enabled
2,315,629 UART: [state] LifecycleState = Unprovisioned
2,317,568 UART: [state] DebugLocked = No
2,320,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,140 UART: [kat] SHA2-256
2,494,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,370 UART: [kat] ++
2,505,858 UART: [kat] sha1
2,517,323 UART: [kat] SHA2-256
2,519,976 UART: [kat] SHA2-384
2,526,079 UART: [kat] SHA2-512-ACC
2,528,491 UART: [kat] ECC-384
4,817,792 UART: [kat] HMAC-384Kdf
4,850,277 UART: [kat] LMS
6,040,599 UART: [kat] --
6,045,036 UART: [cold-reset] ++
6,046,868 UART: [fht] Storing FHT @ 0x50003400
6,059,759 UART: [idev] ++
6,060,327 UART: [idev] CDI.KEYID = 6
6,061,292 UART: [idev] SUBJECT.KEYID = 7
6,062,670 UART: [idev] UDS.KEYID = 0
6,065,198 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,208,696 UART: [idev] Erasing UDS.KEYID = 0
9,397,661 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,094 UART: [idev] --
9,424,008 UART: [ldev] ++
9,424,587 UART: [ldev] CDI.KEYID = 6
9,425,604 UART: [ldev] SUBJECT.KEYID = 5
9,426,845 UART: [ldev] AUTHORITY.KEYID = 7
9,428,031 UART: [ldev] FE.KEYID = 1
9,474,181 UART: [ldev] Erasing FE.KEYID = 1
12,807,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,121,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,135,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,150,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,880 UART: [ldev] --
15,188,404 UART: [fwproc] Waiting for Commands...
15,190,138 UART: [fwproc] Received command 0x46574c44
15,192,325 UART: [fwproc] Received Image of size 114036 bytes
19,243,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,319,635 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,388,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,704,786 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,784,323 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,248,621 >>> mbox cmd response: failed
14,249,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,249,573 >>> mbox cmd response: failed
14,249,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,250,140 >>> mbox cmd response: failed
Initializing fuses
2,050,516 writing to cptra_bootfsm_go
5,843,319 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,902,541 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,544 UART:
192,942 UART: Running Caliptra ROM ...
194,087 UART:
603,636 UART: [state] CFI Enabled
616,317 UART: [state] LifecycleState = Unprovisioned
618,265 UART: [state] DebugLocked = No
620,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,006 UART: [kat] SHA2-256
794,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,298 UART: [kat] ++
805,885 UART: [kat] sha1
816,772 UART: [kat] SHA2-256
819,508 UART: [kat] SHA2-384
825,700 UART: [kat] SHA2-512-ACC
828,096 UART: [kat] ECC-384
3,112,899 UART: [kat] HMAC-384Kdf
3,125,677 UART: [kat] LMS
4,315,773 UART: [kat] --
4,320,876 UART: [cold-reset] ++
4,322,707 UART: [fht] Storing FHT @ 0x50003400
4,333,517 UART: [idev] ++
4,334,085 UART: [idev] CDI.KEYID = 6
4,335,108 UART: [idev] SUBJECT.KEYID = 7
4,336,270 UART: [idev] UDS.KEYID = 0
4,339,124 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,869 UART: [idev] Erasing UDS.KEYID = 0
7,621,127 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,316 UART: [idev] --
7,646,755 UART: [ldev] ++
7,647,334 UART: [ldev] CDI.KEYID = 6
7,648,356 UART: [ldev] SUBJECT.KEYID = 5
7,649,518 UART: [ldev] AUTHORITY.KEYID = 7
7,650,750 UART: [ldev] FE.KEYID = 1
7,663,448 UART: [ldev] Erasing FE.KEYID = 1
10,954,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,579 UART: [ldev] --
13,314,721 UART: [fwproc] Waiting for Commands...
13,316,603 UART: [fwproc] Received command 0x46574c44
13,318,799 UART: [fwproc] Received Image of size 114036 bytes
14,724,677 UART: ROM Fatal Error: 0x000B001A
14,728,127 >>> mbox cmd response: failed
14,728,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,728,823 >>> mbox cmd response: failed
14,729,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,729,504 >>> mbox cmd response: failed
Initializing fuses
2,053,648 writing to cptra_bootfsm_go
2,242,932 UART:
2,243,290 UART: Running Caliptra ROM ...
2,244,336 UART:
5,744,622 UART: [state] CFI Enabled
5,760,226 UART: [state] LifecycleState = Unprovisioned
5,762,149 UART: [state] DebugLocked = No
5,763,813 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,768,121 UART: [kat] SHA2-256
5,937,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,948,399 UART: [kat] ++
5,948,862 UART: [kat] sha1
5,960,130 UART: [kat] SHA2-256
5,962,831 UART: [kat] SHA2-384
5,967,795 UART: [kat] SHA2-512-ACC
5,970,163 UART: [kat] ECC-384
8,251,567 UART: [kat] HMAC-384Kdf
8,264,943 UART: [kat] LMS
9,455,059 UART: [kat] --
9,458,461 UART: [cold-reset] ++
9,459,855 UART: [fht] Storing FHT @ 0x50003400
9,470,968 UART: [idev] ++
9,471,575 UART: [idev] CDI.KEYID = 6
9,472,494 UART: [idev] SUBJECT.KEYID = 7
9,473,716 UART: [idev] UDS.KEYID = 0
9,476,687 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
9,619,895 UART: [idev] Erasing UDS.KEYID = 0
12,767,021 UART: [idev] Using Sha1 for KeyId Algorithm
12,788,511 UART: [idev] --
12,792,561 UART: [ldev] ++
12,793,133 UART: [ldev] CDI.KEYID = 6
12,794,115 UART: [ldev] SUBJECT.KEYID = 5
12,795,328 UART: [ldev] AUTHORITY.KEYID = 7
12,796,569 UART: [ldev] FE.KEYID = 1
12,807,864 UART: [ldev] Erasing FE.KEYID = 1
16,093,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,384,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,399,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,413,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,428,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,447,236 UART: [ldev] --
18,452,724 UART: [fwproc] Waiting for Commands...
18,455,481 UART: [fwproc] Received command 0x46574c44
18,457,674 UART: [fwproc] Received Image of size 114036 bytes
22,503,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,579,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,648,616 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,965,386 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,132,633 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,460,277 >>> mbox cmd response: failed
14,460,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,461,129 >>> mbox cmd response: failed
14,461,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,461,693 >>> mbox cmd response: failed
Initializing fuses
2,049,145 writing to cptra_bootfsm_go
9,536,310 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,480,476 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,335 UART:
192,702 UART: Running Caliptra ROM ...
193,886 UART:
194,037 UART: [state] CFI Enabled
263,700 UART: [state] LifecycleState = Unprovisioned
265,582 UART: [state] DebugLocked = No
267,182 UART: [state] WD Timer not started. Device not locked for debugging
270,812 UART: [kat] SHA2-256
449,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,471 UART: [kat] ++
461,925 UART: [kat] sha1
472,964 UART: [kat] SHA2-256
476,029 UART: [kat] SHA2-384
481,630 UART: [kat] SHA2-512-ACC
484,559 UART: [kat] ECC-384
2,947,332 UART: [kat] HMAC-384Kdf
2,970,148 UART: [kat] LMS
3,499,565 UART: [kat] --
3,503,790 UART: [cold-reset] ++
3,505,304 UART: [fht] FHT @ 0x50003400
3,516,010 UART: [idev] ++
3,516,574 UART: [idev] CDI.KEYID = 6
3,517,587 UART: [idev] SUBJECT.KEYID = 7
3,518,710 UART: [idev] UDS.KEYID = 0
3,521,704 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,794 UART: [idev] Erasing UDS.KEYID = 0
6,026,333 UART: [idev] Sha1 KeyId Algorithm
6,048,685 UART: [idev] --
6,052,937 UART: [ldev] ++
6,053,521 UART: [ldev] CDI.KEYID = 6
6,054,416 UART: [ldev] SUBJECT.KEYID = 5
6,055,631 UART: [ldev] AUTHORITY.KEYID = 7
6,056,868 UART: [ldev] FE.KEYID = 1
6,097,842 UART: [ldev] Erasing FE.KEYID = 1
8,599,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,911 UART: [ldev] --
10,410,365 UART: [fwproc] Wait for Commands...
10,412,352 UART: [fwproc] Recv command 0x46574c44
10,414,448 UART: [fwproc] Recv'd Img size: 114360 bytes
11,487,925 UART: ROM Fatal Error: 0x000B001A
11,491,045 >>> mbox cmd response: failed
11,491,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,491,710 >>> mbox cmd response: failed
11,491,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,492,304 >>> mbox cmd response: failed
Initializing fuses
2,053,724 writing to cptra_bootfsm_go
2,243,012 UART:
2,243,390 UART: Running Caliptra ROM ...
2,244,535 UART:
2,244,700 UART: [state] CFI Enabled
2,315,574 UART: [state] LifecycleState = Unprovisioned
2,317,450 UART: [state] DebugLocked = No
2,319,813 UART: [state] WD Timer not started. Device not locked for debugging
2,323,777 UART: [kat] SHA2-256
2,502,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,515 UART: [kat] ++
2,515,059 UART: [kat] sha1
2,526,121 UART: [kat] SHA2-256
2,529,134 UART: [kat] SHA2-384
2,535,331 UART: [kat] SHA2-512-ACC
2,538,274 UART: [kat] ECC-384
5,000,613 UART: [kat] HMAC-384Kdf
5,023,222 UART: [kat] LMS
5,552,654 UART: [kat] --
5,556,873 UART: [cold-reset] ++
5,558,862 UART: [fht] FHT @ 0x50003400
5,570,336 UART: [idev] ++
5,570,903 UART: [idev] CDI.KEYID = 6
5,571,816 UART: [idev] SUBJECT.KEYID = 7
5,573,035 UART: [idev] UDS.KEYID = 0
5,575,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,719,604 UART: [idev] Erasing UDS.KEYID = 0
8,075,317 UART: [idev] Sha1 KeyId Algorithm
8,098,117 UART: [idev] --
8,101,628 UART: [ldev] ++
8,102,201 UART: [ldev] CDI.KEYID = 6
8,103,090 UART: [ldev] SUBJECT.KEYID = 5
8,104,168 UART: [ldev] AUTHORITY.KEYID = 7
8,105,501 UART: [ldev] FE.KEYID = 1
8,153,414 UART: [ldev] Erasing FE.KEYID = 1
10,656,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,678 UART: [ldev] --
12,465,438 UART: [fwproc] Wait for Commands...
12,467,574 UART: [fwproc] Recv command 0x46574c44
12,469,676 UART: [fwproc] Recv'd Img size: 114360 bytes
15,861,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,934,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,003,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,322,137 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,226 UART:
192,577 UART: Running Caliptra ROM ...
193,768 UART:
193,916 UART: [state] CFI Enabled
262,824 UART: [state] LifecycleState = Unprovisioned
265,236 UART: [state] DebugLocked = No
267,270 UART: [state] WD Timer not started. Device not locked for debugging
272,661 UART: [kat] SHA2-256
462,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,264 UART: [kat] ++
473,756 UART: [kat] sha1
484,209 UART: [kat] SHA2-256
487,230 UART: [kat] SHA2-384
492,722 UART: [kat] SHA2-512-ACC
495,287 UART: [kat] ECC-384
2,960,274 UART: [kat] HMAC-384Kdf
2,981,413 UART: [kat] LMS
3,513,153 UART: [kat] --
3,518,725 UART: [cold-reset] ++
3,520,937 UART: [fht] FHT @ 0x50003400
3,532,404 UART: [idev] ++
3,533,089 UART: [idev] CDI.KEYID = 6
3,534,006 UART: [idev] SUBJECT.KEYID = 7
3,535,227 UART: [idev] UDS.KEYID = 0
3,537,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,681,994 UART: [idev] Erasing UDS.KEYID = 0
6,039,653 UART: [idev] Sha1 KeyId Algorithm
6,060,872 UART: [idev] --
6,064,815 UART: [ldev] ++
6,065,544 UART: [ldev] CDI.KEYID = 6
6,066,467 UART: [ldev] SUBJECT.KEYID = 5
6,067,633 UART: [ldev] AUTHORITY.KEYID = 7
6,068,815 UART: [ldev] FE.KEYID = 1
6,110,311 UART: [ldev] Erasing FE.KEYID = 1
8,619,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,382,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,152 UART: [ldev] --
10,424,303 UART: [fwproc] Wait for Commands...
10,426,465 UART: [fwproc] Recv command 0x46574c44
10,428,729 UART: [fwproc] Recv'd Img size: 114360 bytes
11,530,757 UART: ROM Fatal Error: 0x000B001A
11,534,418 >>> mbox cmd response: failed
11,534,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,535,187 >>> mbox cmd response: failed
11,535,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,535,739 >>> mbox cmd response: failed
Initializing fuses
2,052,098 writing to cptra_bootfsm_go
2,241,396 UART:
2,241,740 UART: Running Caliptra ROM ...
2,242,805 UART:
2,242,958 UART: [state] CFI Enabled
2,303,199 UART: [state] LifecycleState = Unprovisioned
2,305,584 UART: [state] DebugLocked = No
2,306,925 UART: [state] WD Timer not started. Device not locked for debugging
2,311,286 UART: [kat] SHA2-256
2,501,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,511,914 UART: [kat] ++
2,512,574 UART: [kat] sha1
2,523,458 UART: [kat] SHA2-256
2,526,483 UART: [kat] SHA2-384
2,532,327 UART: [kat] SHA2-512-ACC
2,534,936 UART: [kat] ECC-384
4,988,226 UART: [kat] HMAC-384Kdf
5,012,013 UART: [kat] LMS
5,543,803 UART: [kat] --
5,548,461 UART: [cold-reset] ++
5,549,639 UART: [fht] FHT @ 0x50003400
5,562,269 UART: [idev] ++
5,562,948 UART: [idev] CDI.KEYID = 6
5,563,887 UART: [idev] SUBJECT.KEYID = 7
5,565,104 UART: [idev] UDS.KEYID = 0
5,567,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,714 UART: [idev] Erasing UDS.KEYID = 0
8,068,010 UART: [idev] Sha1 KeyId Algorithm
8,090,547 UART: [idev] --
8,095,633 UART: [ldev] ++
8,096,324 UART: [ldev] CDI.KEYID = 6
8,097,210 UART: [ldev] SUBJECT.KEYID = 5
8,098,428 UART: [ldev] AUTHORITY.KEYID = 7
8,099,667 UART: [ldev] FE.KEYID = 1
8,140,286 UART: [ldev] Erasing FE.KEYID = 1
10,645,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,215 UART: [ldev] --
12,451,243 UART: [fwproc] Wait for Commands...
12,453,195 UART: [fwproc] Recv command 0x46574c44
12,455,474 UART: [fwproc] Recv'd Img size: 114360 bytes
15,906,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,101,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,644,515 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,442,997 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,343,817 >>> mbox cmd response: failed
11,344,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,344,779 >>> mbox cmd response: failed
11,345,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,345,349 >>> mbox cmd response: failed
Initializing fuses
2,050,282 writing to cptra_bootfsm_go
5,470,759 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,761,254 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,547 UART:
192,896 UART: Running Caliptra ROM ...
193,997 UART:
603,727 UART: [state] CFI Enabled
621,977 UART: [state] LifecycleState = Unprovisioned
624,106 UART: [state] DebugLocked = No
625,439 UART: [state] WD Timer not started. Device not locked for debugging
629,534 UART: [kat] SHA2-256
819,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,153 UART: [kat] ++
830,689 UART: [kat] sha1
841,190 UART: [kat] SHA2-256
844,215 UART: [kat] SHA2-384
850,605 UART: [kat] SHA2-512-ACC
853,189 UART: [kat] ECC-384
3,293,636 UART: [kat] HMAC-384Kdf
3,307,889 UART: [kat] LMS
3,839,725 UART: [kat] --
3,843,986 UART: [cold-reset] ++
3,846,396 UART: [fht] FHT @ 0x50003400
3,856,896 UART: [idev] ++
3,857,570 UART: [idev] CDI.KEYID = 6
3,858,514 UART: [idev] SUBJECT.KEYID = 7
3,859,780 UART: [idev] UDS.KEYID = 0
3,862,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,879 UART: [idev] Erasing UDS.KEYID = 0
6,340,161 UART: [idev] Sha1 KeyId Algorithm
6,361,822 UART: [idev] --
6,367,944 UART: [ldev] ++
6,368,670 UART: [ldev] CDI.KEYID = 6
6,369,590 UART: [ldev] SUBJECT.KEYID = 5
6,370,699 UART: [ldev] AUTHORITY.KEYID = 7
6,371,937 UART: [ldev] FE.KEYID = 1
6,383,447 UART: [ldev] Erasing FE.KEYID = 1
8,857,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,119 UART: [ldev] --
10,645,784 UART: [fwproc] Wait for Commands...
10,647,608 UART: [fwproc] Recv command 0x46574c44
10,649,920 UART: [fwproc] Recv'd Img size: 114360 bytes
11,754,432 UART: ROM Fatal Error: 0x000B001A
11,758,054 >>> mbox cmd response: failed
11,758,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,758,722 >>> mbox cmd response: failed
11,759,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,759,326 >>> mbox cmd response: failed
Initializing fuses
2,057,757 writing to cptra_bootfsm_go
2,247,050 UART:
2,247,388 UART: Running Caliptra ROM ...
2,248,531 UART:
8,695,693 UART: [state] CFI Enabled
8,709,037 UART: [state] LifecycleState = Unprovisioned
8,711,061 UART: [state] DebugLocked = No
8,713,393 UART: [state] WD Timer not started. Device not locked for debugging
8,718,166 UART: [kat] SHA2-256
8,908,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,918,792 UART: [kat] ++
8,919,331 UART: [kat] sha1
8,930,416 UART: [kat] SHA2-256
8,933,431 UART: [kat] SHA2-384
8,938,130 UART: [kat] SHA2-512-ACC
8,940,695 UART: [kat] ECC-384
11,383,545 UART: [kat] HMAC-384Kdf
11,397,129 UART: [kat] LMS
11,928,959 UART: [kat] --
11,933,503 UART: [cold-reset] ++
11,935,326 UART: [fht] FHT @ 0x50003400
11,946,576 UART: [idev] ++
11,947,250 UART: [idev] CDI.KEYID = 6
11,948,230 UART: [idev] SUBJECT.KEYID = 7
11,949,393 UART: [idev] UDS.KEYID = 0
11,952,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,096,027 UART: [idev] Erasing UDS.KEYID = 0
14,427,168 UART: [idev] Sha1 KeyId Algorithm
14,449,739 UART: [idev] --
14,453,700 UART: [ldev] ++
14,454,281 UART: [ldev] CDI.KEYID = 6
14,455,348 UART: [ldev] SUBJECT.KEYID = 5
14,456,456 UART: [ldev] AUTHORITY.KEYID = 7
14,457,630 UART: [ldev] FE.KEYID = 1
14,470,006 UART: [ldev] Erasing FE.KEYID = 1
16,945,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,660,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,676,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,691,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,706,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,727,060 UART: [ldev] --
18,731,736 UART: [fwproc] Wait for Commands...
18,734,100 UART: [fwproc] Recv command 0x46574c44
18,736,416 UART: [fwproc] Recv'd Img size: 114360 bytes
22,186,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,264,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,380,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
22,924,060 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,759,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,534,779 >>> mbox cmd response: failed
11,535,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,535,723 >>> mbox cmd response: failed
11,535,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,536,280 >>> mbox cmd response: failed
Initializing fuses
2,054,917 writing to cptra_bootfsm_go
12,083,008 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,279,442 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,346 UART: [kat] LMS
1,475,542 UART: [kat] --
1,476,525 UART: [cold-reset] ++
1,476,987 UART: [fht] Storing FHT @ 0x50003400
1,479,802 UART: [idev] ++
1,479,970 UART: [idev] CDI.KEYID = 6
1,480,330 UART: [idev] SUBJECT.KEYID = 7
1,480,754 UART: [idev] UDS.KEYID = 0
1,481,099 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,822 UART: [idev] Erasing UDS.KEYID = 0
1,505,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,298 UART: [idev] --
1,515,345 UART: [ldev] ++
1,515,513 UART: [ldev] CDI.KEYID = 6
1,515,876 UART: [ldev] SUBJECT.KEYID = 5
1,516,302 UART: [ldev] AUTHORITY.KEYID = 7
1,516,765 UART: [ldev] FE.KEYID = 1
1,522,175 UART: [ldev] Erasing FE.KEYID = 1
1,547,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,296 UART: [ldev] --
1,586,735 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 114360 bytes
1,627,335 UART: ROM Fatal Error: 0x000B001A
1,628,494 >>> mbox cmd response: failed
1,628,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,500 >>> mbox cmd response: failed
1,628,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
902,774 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,477,065 UART: [fht] Storing FHT @ 0x50003400
1,479,824 UART: [idev] ++
1,479,992 UART: [idev] CDI.KEYID = 6
1,480,352 UART: [idev] SUBJECT.KEYID = 7
1,480,776 UART: [idev] UDS.KEYID = 0
1,481,121 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,630 UART: [idev] Erasing UDS.KEYID = 0
1,505,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,270 UART: [idev] --
1,515,333 UART: [ldev] ++
1,515,501 UART: [ldev] CDI.KEYID = 6
1,515,864 UART: [ldev] SUBJECT.KEYID = 5
1,516,290 UART: [ldev] AUTHORITY.KEYID = 7
1,516,753 UART: [ldev] FE.KEYID = 1
1,522,255 UART: [ldev] Erasing FE.KEYID = 1
1,547,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,538 UART: [ldev] --
1,586,915 UART: [fwproc] Waiting for Commands...
1,587,774 UART: [fwproc] Received command 0x46574c44
1,588,565 UART: [fwproc] Received Image of size 114360 bytes
2,886,149 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,959 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,318 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,033 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,477,771 >>> mbox cmd response: failed
1,477,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,777 >>> mbox cmd response: failed
1,477,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,775 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,382 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,399 UART: [kat] SHA2-512-ACC
897,300 UART: [kat] ECC-384
903,155 UART: [kat] HMAC-384Kdf
907,843 UART: [kat] LMS
1,476,039 UART: [kat] --
1,477,186 UART: [cold-reset] ++
1,477,622 UART: [fht] Storing FHT @ 0x50003400
1,480,461 UART: [idev] ++
1,480,629 UART: [idev] CDI.KEYID = 6
1,480,989 UART: [idev] SUBJECT.KEYID = 7
1,481,413 UART: [idev] UDS.KEYID = 0
1,481,758 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,523 UART: [idev] Erasing UDS.KEYID = 0
1,506,525 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,279 UART: [idev] --
1,516,272 UART: [ldev] ++
1,516,440 UART: [ldev] CDI.KEYID = 6
1,516,803 UART: [ldev] SUBJECT.KEYID = 5
1,517,229 UART: [ldev] AUTHORITY.KEYID = 7
1,517,692 UART: [ldev] FE.KEYID = 1
1,523,304 UART: [ldev] Erasing FE.KEYID = 1
1,549,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,141 UART: [ldev] --
1,588,526 UART: [fwproc] Waiting for Commands...
1,589,275 UART: [fwproc] Received command 0x46574c44
1,590,066 UART: [fwproc] Received Image of size 114360 bytes
1,629,870 UART: ROM Fatal Error: 0x000B001A
1,631,029 >>> mbox cmd response: failed
1,631,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,035 >>> mbox cmd response: failed
1,631,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,626 UART: [kat] SHA2-256
882,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,672 UART: [kat] ++
886,824 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
903,185 UART: [kat] HMAC-384Kdf
907,629 UART: [kat] LMS
1,475,825 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,039 UART: [idev] --
1,514,872 UART: [ldev] ++
1,515,040 UART: [ldev] CDI.KEYID = 6
1,515,403 UART: [ldev] SUBJECT.KEYID = 5
1,515,829 UART: [ldev] AUTHORITY.KEYID = 7
1,516,292 UART: [ldev] FE.KEYID = 1
1,521,636 UART: [ldev] Erasing FE.KEYID = 1
1,546,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,743 UART: [ldev] --
1,586,014 UART: [fwproc] Waiting for Commands...
1,586,631 UART: [fwproc] Received command 0x46574c44
1,587,422 UART: [fwproc] Received Image of size 114360 bytes
2,885,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,334 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,613 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,512 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,480,618 >>> mbox cmd response: failed
1,480,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,624 >>> mbox cmd response: failed
1,480,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,976 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,273 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,199 UART: [kat] SHA2-256
904,139 UART: [kat] SHA2-384
906,864 UART: [kat] SHA2-512-ACC
908,765 UART: [kat] ECC-384
918,386 UART: [kat] HMAC-384Kdf
922,826 UART: [kat] LMS
1,171,154 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,415 UART: [fht] FHT @ 0x50003400
1,174,952 UART: [idev] ++
1,175,120 UART: [idev] CDI.KEYID = 6
1,175,480 UART: [idev] SUBJECT.KEYID = 7
1,175,904 UART: [idev] UDS.KEYID = 0
1,176,249 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,037 UART: [idev] Sha1 KeyId Algorithm
1,209,575 UART: [idev] --
1,210,673 UART: [ldev] ++
1,210,841 UART: [ldev] CDI.KEYID = 6
1,211,204 UART: [ldev] SUBJECT.KEYID = 5
1,211,630 UART: [ldev] AUTHORITY.KEYID = 7
1,212,093 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,213 UART: [ldev] --
1,282,702 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,118 UART: [fwproc] Recv'd Img size: 114360 bytes
1,323,048 UART: ROM Fatal Error: 0x000B001A
1,324,207 >>> mbox cmd response: failed
1,324,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,213 >>> mbox cmd response: failed
1,324,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
918,432 UART: [kat] HMAC-384Kdf
923,090 UART: [kat] LMS
1,171,418 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,647 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,201,455 UART: [idev] Sha1 KeyId Algorithm
1,209,787 UART: [idev] --
1,210,859 UART: [ldev] ++
1,211,027 UART: [ldev] CDI.KEYID = 6
1,211,390 UART: [ldev] SUBJECT.KEYID = 5
1,211,816 UART: [ldev] AUTHORITY.KEYID = 7
1,212,279 UART: [ldev] FE.KEYID = 1
1,217,607 UART: [ldev] Erasing FE.KEYID = 1
1,243,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,823 UART: [ldev] --
1,283,306 UART: [fwproc] Wait for Commands...
1,284,100 UART: [fwproc] Recv command 0x46574c44
1,284,828 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,877 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,807 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,124 >>> mbox cmd response: failed
1,180,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,130 >>> mbox cmd response: failed
1,180,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,299 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
893,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,486 UART: [kat] ++
897,638 UART: [kat] sha1
901,770 UART: [kat] SHA2-256
903,710 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,209 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,172,090 UART: [cold-reset] ++
1,172,494 UART: [fht] FHT @ 0x50003400
1,175,045 UART: [idev] ++
1,175,213 UART: [idev] CDI.KEYID = 6
1,175,573 UART: [idev] SUBJECT.KEYID = 7
1,175,997 UART: [idev] UDS.KEYID = 0
1,176,342 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,398 UART: [idev] Sha1 KeyId Algorithm
1,210,004 UART: [idev] --
1,210,896 UART: [ldev] ++
1,211,064 UART: [ldev] CDI.KEYID = 6
1,211,427 UART: [ldev] SUBJECT.KEYID = 5
1,211,853 UART: [ldev] AUTHORITY.KEYID = 7
1,212,316 UART: [ldev] FE.KEYID = 1
1,217,602 UART: [ldev] Erasing FE.KEYID = 1
1,244,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,225 UART: [fwproc] Wait for Commands...
1,283,805 UART: [fwproc] Recv command 0x46574c44
1,284,533 UART: [fwproc] Recv'd Img size: 114360 bytes
1,323,479 UART: ROM Fatal Error: 0x000B001A
1,324,638 >>> mbox cmd response: failed
1,324,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,644 >>> mbox cmd response: failed
1,324,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
893,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,500 UART: [kat] ++
897,652 UART: [kat] sha1
901,780 UART: [kat] SHA2-256
903,720 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,427 UART: [idev] ++
1,175,595 UART: [idev] CDI.KEYID = 6
1,175,955 UART: [idev] SUBJECT.KEYID = 7
1,176,379 UART: [idev] UDS.KEYID = 0
1,176,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,451 UART: [idev] Erasing UDS.KEYID = 0
1,201,420 UART: [idev] Sha1 KeyId Algorithm
1,209,988 UART: [idev] --
1,210,956 UART: [ldev] ++
1,211,124 UART: [ldev] CDI.KEYID = 6
1,211,487 UART: [ldev] SUBJECT.KEYID = 5
1,211,913 UART: [ldev] AUTHORITY.KEYID = 7
1,212,376 UART: [ldev] FE.KEYID = 1
1,217,466 UART: [ldev] Erasing FE.KEYID = 1
1,243,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,992 UART: [ldev] --
1,283,435 UART: [fwproc] Wait for Commands...
1,284,209 UART: [fwproc] Recv command 0x46574c44
1,284,937 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,574 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,377 >>> mbox cmd response: failed
1,179,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,383 >>> mbox cmd response: failed
1,179,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,255 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,519 UART: [idev] ++
1,173,687 UART: [idev] CDI.KEYID = 6
1,174,048 UART: [idev] SUBJECT.KEYID = 7
1,174,473 UART: [idev] UDS.KEYID = 0
1,174,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,586 UART: [ldev] ++
1,208,754 UART: [ldev] CDI.KEYID = 6
1,209,118 UART: [ldev] SUBJECT.KEYID = 5
1,209,545 UART: [ldev] AUTHORITY.KEYID = 7
1,210,008 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,020 UART: [ldev] --
1,281,418 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114360 bytes
1,322,189 UART: ROM Fatal Error: 0x000B001A
1,323,348 >>> mbox cmd response: failed
1,323,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,354 >>> mbox cmd response: failed
1,323,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,174,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,651 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,879 UART: [idev] --
1,209,020 UART: [ldev] ++
1,209,188 UART: [ldev] CDI.KEYID = 6
1,209,552 UART: [ldev] SUBJECT.KEYID = 5
1,209,979 UART: [ldev] AUTHORITY.KEYID = 7
1,210,442 UART: [ldev] FE.KEYID = 1
1,215,578 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,988 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,281,151 UART: [fwproc] Recv command 0x46574c44
1,281,884 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,341 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,118 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,176,015 >>> mbox cmd response: failed
1,176,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,021 >>> mbox cmd response: failed
1,176,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,906 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,061 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,442 UART: [kat] SHA2-256
902,382 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,174,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,485 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x46574c44
1,283,367 UART: [fwproc] Recv'd Img size: 114360 bytes
1,323,012 UART: ROM Fatal Error: 0x000B001A
1,324,171 >>> mbox cmd response: failed
1,324,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,177 >>> mbox cmd response: failed
1,324,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
1,174,826 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,753 UART: [ldev] ++
1,208,921 UART: [ldev] CDI.KEYID = 6
1,209,285 UART: [ldev] SUBJECT.KEYID = 5
1,209,712 UART: [ldev] AUTHORITY.KEYID = 7
1,210,175 UART: [ldev] FE.KEYID = 1
1,215,433 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,341 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,883 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,744 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,177,554 >>> mbox cmd response: failed
1,177,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,560 >>> mbox cmd response: failed
1,177,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,998 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
4,877,877 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,292,021 >>> mbox cmd response: failed
15,292,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,293,132 >>> mbox cmd response: failed
15,293,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,293,791 >>> mbox cmd response: failed
Initializing fuses
2,062,678 writing to cptra_bootfsm_go
6,925,112 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,472,090 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
4,877,398 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,363,283 >>> mbox cmd response: failed
15,363,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,364,336 >>> mbox cmd response: failed
15,364,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,364,895 >>> mbox cmd response: failed
Initializing fuses
2,059,600 writing to cptra_bootfsm_go
6,915,924 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,488,823 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
5,186,546 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,508,341 >>> mbox cmd response: failed
15,508,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,509,318 >>> mbox cmd response: failed
15,509,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,509,888 >>> mbox cmd response: failed
Initializing fuses
2,063,251 writing to cptra_bootfsm_go
9,548,972 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,979,325 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
5,187,717 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,505,484 >>> mbox cmd response: failed
15,506,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,506,691 >>> mbox cmd response: failed
15,506,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,507,255 >>> mbox cmd response: failed
Initializing fuses
2,057,186 writing to cptra_bootfsm_go
9,544,009 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,985,588 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,462,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,419,669 >>> mbox cmd response: failed
11,420,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,420,579 >>> mbox cmd response: failed
11,420,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,421,146 >>> mbox cmd response: failed
Initializing fuses
2,052,804 writing to cptra_bootfsm_go
5,500,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,369,083 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,467,324 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,471,421 >>> mbox cmd response: failed
11,471,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,472,338 >>> mbox cmd response: failed
11,472,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,472,903 >>> mbox cmd response: failed
Initializing fuses
2,062,261 writing to cptra_bootfsm_go
5,506,010 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,333,465 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,469,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,421,043 >>> mbox cmd response: failed
11,421,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,421,984 >>> mbox cmd response: failed
11,422,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,422,570 >>> mbox cmd response: failed
Initializing fuses
2,062,356 writing to cptra_bootfsm_go
5,519,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,319,971 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,783,189 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,659,868 >>> mbox cmd response: failed
11,660,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,660,842 >>> mbox cmd response: failed
11,661,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,661,400 >>> mbox cmd response: failed
Initializing fuses
2,056,974 writing to cptra_bootfsm_go
11,979,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,689,255 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,776,205 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,655,601 >>> mbox cmd response: failed
11,656,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,656,741 >>> mbox cmd response: failed
11,657,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,657,309 >>> mbox cmd response: failed
Initializing fuses
2,060,620 writing to cptra_bootfsm_go
11,988,289 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,710,513 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,198,861 >>> mbox cmd response: failed
1,198,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,867 >>> mbox cmd response: failed
1,198,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,371 UART: [kat] SHA2-256
882,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,417 UART: [kat] ++
886,569 UART: [kat] sha1
890,953 UART: [kat] SHA2-256
892,891 UART: [kat] SHA2-384
895,574 UART: [kat] SHA2-512-ACC
897,475 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,961 UART: [fht] Storing FHT @ 0x50003400
1,479,782 UART: [idev] ++
1,479,950 UART: [idev] CDI.KEYID = 6
1,480,310 UART: [idev] SUBJECT.KEYID = 7
1,480,734 UART: [idev] UDS.KEYID = 0
1,481,079 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,505,196 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,986 UART: [idev] --
1,515,201 UART: [ldev] ++
1,515,369 UART: [ldev] CDI.KEYID = 6
1,515,732 UART: [ldev] SUBJECT.KEYID = 5
1,516,158 UART: [ldev] AUTHORITY.KEYID = 7
1,516,621 UART: [ldev] FE.KEYID = 1
1,522,079 UART: [ldev] Erasing FE.KEYID = 1
1,547,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,728 UART: [ldev] --
1,587,145 UART: [fwproc] Waiting for Commands...
1,587,974 UART: [fwproc] Received command 0x46574c44
1,588,765 UART: [fwproc] Received Image of size 114360 bytes
2,886,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,015 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,250 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,198,435 >>> mbox cmd response: failed
1,198,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,441 >>> mbox cmd response: failed
1,198,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,116 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,844 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,560 >>> mbox cmd response: failed
1,197,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,566 >>> mbox cmd response: failed
1,197,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,570 UART: [kat] SHA2-256
882,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,616 UART: [kat] ++
886,768 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,347 UART: [kat] SHA2-512-ACC
897,248 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,499 UART: [kat] LMS
1,475,695 UART: [kat] --
1,476,592 UART: [cold-reset] ++
1,477,006 UART: [fht] Storing FHT @ 0x50003400
1,479,845 UART: [idev] ++
1,480,013 UART: [idev] CDI.KEYID = 6
1,480,373 UART: [idev] SUBJECT.KEYID = 7
1,480,797 UART: [idev] UDS.KEYID = 0
1,481,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,053 UART: [idev] Erasing UDS.KEYID = 0
1,506,421 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,031 UART: [idev] --
1,516,088 UART: [ldev] ++
1,516,256 UART: [ldev] CDI.KEYID = 6
1,516,619 UART: [ldev] SUBJECT.KEYID = 5
1,517,045 UART: [ldev] AUTHORITY.KEYID = 7
1,517,508 UART: [ldev] FE.KEYID = 1
1,522,532 UART: [ldev] Erasing FE.KEYID = 1
1,547,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,159 UART: [ldev] --
1,587,450 UART: [fwproc] Waiting for Commands...
1,588,133 UART: [fwproc] Received command 0x46574c44
1,588,924 UART: [fwproc] Received Image of size 114360 bytes
2,886,328 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,859 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,228 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,201,674 >>> mbox cmd response: failed
1,201,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,680 >>> mbox cmd response: failed
1,201,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,950 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,515 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,909 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,857 >>> mbox cmd response: failed
1,197,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,863 >>> mbox cmd response: failed
1,197,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,006 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,461 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,348 UART: [idev] Erasing UDS.KEYID = 0
1,201,381 UART: [idev] Sha1 KeyId Algorithm
1,209,877 UART: [idev] --
1,210,785 UART: [ldev] ++
1,210,953 UART: [ldev] CDI.KEYID = 6
1,211,316 UART: [ldev] SUBJECT.KEYID = 5
1,211,742 UART: [ldev] AUTHORITY.KEYID = 7
1,212,205 UART: [ldev] FE.KEYID = 1
1,217,399 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,806 UART: [fwproc] Wait for Commands...
1,283,610 UART: [fwproc] Recv command 0x46574c44
1,284,338 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,168 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,119 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,198,811 >>> mbox cmd response: failed
1,198,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,817 >>> mbox cmd response: failed
1,198,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,504 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,200,692 >>> mbox cmd response: failed
1,200,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,698 >>> mbox cmd response: failed
1,200,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,118 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
894,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,144 UART: [kat] ++
898,296 UART: [kat] sha1
902,630 UART: [kat] SHA2-256
904,570 UART: [kat] SHA2-384
907,373 UART: [kat] SHA2-512-ACC
909,274 UART: [kat] ECC-384
918,847 UART: [kat] HMAC-384Kdf
923,375 UART: [kat] LMS
1,171,703 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,621 UART: [idev] ++
1,175,789 UART: [idev] CDI.KEYID = 6
1,176,149 UART: [idev] SUBJECT.KEYID = 7
1,176,573 UART: [idev] UDS.KEYID = 0
1,176,918 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,385 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,209,980 UART: [idev] --
1,211,096 UART: [ldev] ++
1,211,264 UART: [ldev] CDI.KEYID = 6
1,211,627 UART: [ldev] SUBJECT.KEYID = 5
1,212,053 UART: [ldev] AUTHORITY.KEYID = 7
1,212,516 UART: [ldev] FE.KEYID = 1
1,217,696 UART: [ldev] Erasing FE.KEYID = 1
1,243,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,210 UART: [ldev] --
1,282,605 UART: [fwproc] Wait for Commands...
1,283,285 UART: [fwproc] Recv command 0x46574c44
1,284,013 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,484 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,452 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,688 >>> mbox cmd response: failed
1,199,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,694 >>> mbox cmd response: failed
1,199,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,437 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,177 >>> mbox cmd response: failed
1,199,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,183 >>> mbox cmd response: failed
1,199,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,157 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,629 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,194 UART: [ldev] Erasing FE.KEYID = 1
1,241,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,648 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,135 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,751 >>> mbox cmd response: failed
1,197,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,757 >>> mbox cmd response: failed
1,197,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,677 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,798 >>> mbox cmd response: failed
1,199,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,804 >>> mbox cmd response: failed
1,199,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Unprovisioned
85,604 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
904,049 UART: [kat] SHA2-512-ACC
905,950 UART: [kat] ECC-384
915,483 UART: [kat] HMAC-384Kdf
920,161 UART: [kat] LMS
1,168,473 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,676 UART: [fht] FHT @ 0x50003400
1,172,396 UART: [idev] ++
1,172,564 UART: [idev] CDI.KEYID = 6
1,172,925 UART: [idev] SUBJECT.KEYID = 7
1,173,350 UART: [idev] UDS.KEYID = 0
1,173,696 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,092 UART: [idev] Erasing UDS.KEYID = 0
1,198,730 UART: [idev] Sha1 KeyId Algorithm
1,207,774 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,890 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,664 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,198,786 >>> mbox cmd response: failed
1,198,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,792 >>> mbox cmd response: failed
1,198,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,356 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,219 UART:
192,578 UART: Running Caliptra ROM ...
193,751 UART:
193,905 UART: [state] CFI Enabled
265,313 UART: [state] LifecycleState = Unprovisioned
267,242 UART: [state] DebugLocked = No
269,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,306 UART: [kat] SHA2-256
444,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,503 UART: [kat] ++
455,093 UART: [kat] sha1
466,153 UART: [kat] SHA2-256
468,764 UART: [kat] SHA2-384
475,557 UART: [kat] SHA2-512-ACC
477,956 UART: [kat] ECC-384
2,765,669 UART: [kat] HMAC-384Kdf
2,778,227 UART: [kat] LMS
3,968,496 UART: [kat] --
3,975,062 UART: [cold-reset] ++
3,977,388 UART: [fht] Storing FHT @ 0x50003400
3,988,571 UART: [idev] ++
3,989,181 UART: [idev] CDI.KEYID = 6
3,990,103 UART: [idev] SUBJECT.KEYID = 7
3,991,378 UART: [idev] UDS.KEYID = 0
3,994,167 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,137,633 UART: [idev] Erasing UDS.KEYID = 0
7,326,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,454 UART: [idev] --
7,350,128 UART: [ldev] ++
7,350,709 UART: [ldev] CDI.KEYID = 6
7,351,674 UART: [ldev] SUBJECT.KEYID = 5
7,352,888 UART: [ldev] AUTHORITY.KEYID = 7
7,354,126 UART: [ldev] FE.KEYID = 1
7,380,928 UART: [ldev] Erasing FE.KEYID = 1
10,716,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,804 UART: [ldev] --
13,097,152 UART: [fwproc] Waiting for Commands...
13,099,530 UART: [fwproc] Received command 0x46574c44
13,101,720 UART: [fwproc] Received Image of size 114036 bytes
20,620,221 UART: ROM Fatal Error: 0x000B0038
20,623,662 >>> mbox cmd response: failed
20,624,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,624,421 >>> mbox cmd response: failed
20,624,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,624,979 >>> mbox cmd response: failed
Initializing fuses
2,050,349 writing to cptra_bootfsm_go
2,239,644 UART:
2,239,996 UART: Running Caliptra ROM ...
2,241,229 UART:
2,241,398 UART: [state] CFI Enabled
2,316,889 UART: [state] LifecycleState = Unprovisioned
2,318,844 UART: [state] DebugLocked = No
2,320,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,011 UART: [kat] SHA2-256
2,494,741 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,222 UART: [kat] ++
2,505,677 UART: [kat] sha1
2,517,485 UART: [kat] SHA2-256
2,520,183 UART: [kat] SHA2-384
2,525,851 UART: [kat] SHA2-512-ACC
2,528,224 UART: [kat] ECC-384
4,817,844 UART: [kat] HMAC-384Kdf
4,851,701 UART: [kat] LMS
6,042,006 UART: [kat] --
6,046,985 UART: [cold-reset] ++
6,047,956 UART: [fht] Storing FHT @ 0x50003400
6,059,121 UART: [idev] ++
6,059,693 UART: [idev] CDI.KEYID = 6
6,060,606 UART: [idev] SUBJECT.KEYID = 7
6,061,886 UART: [idev] UDS.KEYID = 0
6,064,479 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,208,422 UART: [idev] Erasing UDS.KEYID = 0
9,400,176 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,800 UART: [idev] --
9,424,146 UART: [ldev] ++
9,424,718 UART: [ldev] CDI.KEYID = 6
9,425,704 UART: [ldev] SUBJECT.KEYID = 5
9,426,929 UART: [ldev] AUTHORITY.KEYID = 7
9,428,173 UART: [ldev] FE.KEYID = 1
9,472,424 UART: [ldev] Erasing FE.KEYID = 1
12,805,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,606 UART: [ldev] --
15,185,692 UART: [fwproc] Waiting for Commands...
15,188,333 UART: [fwproc] Received command 0x46574c44
15,190,519 UART: [fwproc] Received Image of size 114036 bytes
19,244,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,323,543 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,392,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,708,608 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,809,616 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,407,526 >>> mbox cmd response: failed
19,408,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,408,444 >>> mbox cmd response: failed
19,408,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,408,958 >>> mbox cmd response: failed
Initializing fuses
2,050,568 writing to cptra_bootfsm_go
5,855,438 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,899,700 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,090 writing to cptra_bootfsm_go
193,295 UART:
193,647 UART: Running Caliptra ROM ...
194,752 UART:
604,441 UART: [state] CFI Enabled
617,978 UART: [state] LifecycleState = Unprovisioned
619,911 UART: [state] DebugLocked = No
622,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,313 UART: [kat] SHA2-256
797,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,605 UART: [kat] ++
808,109 UART: [kat] sha1
818,718 UART: [kat] SHA2-256
821,408 UART: [kat] SHA2-384
827,710 UART: [kat] SHA2-512-ACC
830,053 UART: [kat] ECC-384
3,112,808 UART: [kat] HMAC-384Kdf
3,125,472 UART: [kat] LMS
4,315,573 UART: [kat] --
4,320,130 UART: [cold-reset] ++
4,322,338 UART: [fht] Storing FHT @ 0x50003400
4,335,388 UART: [idev] ++
4,335,967 UART: [idev] CDI.KEYID = 6
4,336,902 UART: [idev] SUBJECT.KEYID = 7
4,338,113 UART: [idev] UDS.KEYID = 0
4,340,725 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,166 UART: [idev] Erasing UDS.KEYID = 0
7,626,838 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,016 UART: [idev] --
7,652,773 UART: [ldev] ++
7,653,344 UART: [ldev] CDI.KEYID = 6
7,654,286 UART: [ldev] SUBJECT.KEYID = 5
7,655,499 UART: [ldev] AUTHORITY.KEYID = 7
7,656,791 UART: [ldev] FE.KEYID = 1
7,668,225 UART: [ldev] Erasing FE.KEYID = 1
10,953,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,544 UART: [ldev] --
13,316,465 UART: [fwproc] Waiting for Commands...
13,318,466 UART: [fwproc] Received command 0x46574c44
13,320,708 UART: [fwproc] Received Image of size 114036 bytes
20,993,811 UART: ROM Fatal Error: 0x000B0038
20,997,236 >>> mbox cmd response: failed
20,997,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,998,008 >>> mbox cmd response: failed
20,998,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,998,578 >>> mbox cmd response: failed
Initializing fuses
2,048,054 writing to cptra_bootfsm_go
2,237,310 UART:
2,237,653 UART: Running Caliptra ROM ...
2,238,700 UART:
2,648,357 UART: [state] CFI Enabled
2,663,823 UART: [state] LifecycleState = Unprovisioned
2,665,731 UART: [state] DebugLocked = No
2,667,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,672,966 UART: [kat] SHA2-256
2,842,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,853,220 UART: [kat] ++
2,853,724 UART: [kat] sha1
2,864,669 UART: [kat] SHA2-256
2,867,369 UART: [kat] SHA2-384
2,873,252 UART: [kat] SHA2-512-ACC
2,875,619 UART: [kat] ECC-384
5,158,440 UART: [kat] HMAC-384Kdf
5,170,226 UART: [kat] LMS
6,360,321 UART: [kat] --
6,364,924 UART: [cold-reset] ++
6,366,566 UART: [fht] Storing FHT @ 0x50003400
6,378,718 UART: [idev] ++
6,379,287 UART: [idev] CDI.KEYID = 6
6,380,257 UART: [idev] SUBJECT.KEYID = 7
6,381,475 UART: [idev] UDS.KEYID = 0
6,384,031 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,528,056 UART: [idev] Erasing UDS.KEYID = 0
9,668,464 UART: [idev] Using Sha1 for KeyId Algorithm
9,690,433 UART: [idev] --
9,694,591 UART: [ldev] ++
9,695,163 UART: [ldev] CDI.KEYID = 6
9,696,153 UART: [ldev] SUBJECT.KEYID = 5
9,697,344 UART: [ldev] AUTHORITY.KEYID = 7
9,698,586 UART: [ldev] FE.KEYID = 1
9,710,732 UART: [ldev] Erasing FE.KEYID = 1
13,004,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,299,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,314,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,328,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,343,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,363,266 UART: [ldev] --
15,368,638 UART: [fwproc] Waiting for Commands...
15,370,901 UART: [fwproc] Received command 0x46574c44
15,373,089 UART: [fwproc] Received Image of size 114036 bytes
19,432,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,504,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,573,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,889,513 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,126,456 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,070,170 >>> mbox cmd response: failed
20,070,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,071,329 >>> mbox cmd response: failed
20,071,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,071,965 >>> mbox cmd response: failed
Initializing fuses
2,055,144 writing to cptra_bootfsm_go
6,186,244 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,128,216 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,153 UART:
192,529 UART: Running Caliptra ROM ...
193,624 UART:
193,767 UART: [state] CFI Enabled
267,172 UART: [state] LifecycleState = Unprovisioned
269,090 UART: [state] DebugLocked = No
271,561 UART: [state] WD Timer not started. Device not locked for debugging
274,525 UART: [kat] SHA2-256
453,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,234 UART: [kat] ++
465,685 UART: [kat] sha1
475,260 UART: [kat] SHA2-256
478,324 UART: [kat] SHA2-384
483,491 UART: [kat] SHA2-512-ACC
486,421 UART: [kat] ECC-384
2,950,616 UART: [kat] HMAC-384Kdf
2,973,665 UART: [kat] LMS
3,503,098 UART: [kat] --
3,507,316 UART: [cold-reset] ++
3,508,494 UART: [fht] FHT @ 0x50003400
3,518,504 UART: [idev] ++
3,519,080 UART: [idev] CDI.KEYID = 6
3,519,988 UART: [idev] SUBJECT.KEYID = 7
3,521,209 UART: [idev] UDS.KEYID = 0
3,524,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,144 UART: [idev] Erasing UDS.KEYID = 0
6,030,846 UART: [idev] Sha1 KeyId Algorithm
6,054,634 UART: [idev] --
6,057,663 UART: [ldev] ++
6,058,237 UART: [ldev] CDI.KEYID = 6
6,059,147 UART: [ldev] SUBJECT.KEYID = 5
6,060,360 UART: [ldev] AUTHORITY.KEYID = 7
6,061,593 UART: [ldev] FE.KEYID = 1
6,102,835 UART: [ldev] Erasing FE.KEYID = 1
8,606,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,811 UART: [ldev] --
10,411,931 UART: [fwproc] Wait for Commands...
10,414,266 UART: [fwproc] Recv command 0x46574c44
10,416,367 UART: [fwproc] Recv'd Img size: 114360 bytes
13,594,751 UART: ROM Fatal Error: 0x000B0038
13,597,875 >>> mbox cmd response: failed
13,598,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,598,640 >>> mbox cmd response: failed
13,598,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,599,206 >>> mbox cmd response: failed
Initializing fuses
2,049,002 writing to cptra_bootfsm_go
2,238,343 UART:
2,238,701 UART: Running Caliptra ROM ...
2,239,839 UART:
2,240,011 UART: [state] CFI Enabled
2,299,229 UART: [state] LifecycleState = Unprovisioned
2,301,103 UART: [state] DebugLocked = No
2,303,569 UART: [state] WD Timer not started. Device not locked for debugging
2,306,878 UART: [kat] SHA2-256
2,486,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,497,600 UART: [kat] ++
2,498,148 UART: [kat] sha1
2,509,581 UART: [kat] SHA2-256
2,512,590 UART: [kat] SHA2-384
2,517,275 UART: [kat] SHA2-512-ACC
2,520,229 UART: [kat] ECC-384
4,965,547 UART: [kat] HMAC-384Kdf
4,985,409 UART: [kat] LMS
5,514,845 UART: [kat] --
5,517,829 UART: [cold-reset] ++
5,519,005 UART: [fht] FHT @ 0x50003400
5,529,395 UART: [idev] ++
5,529,996 UART: [idev] CDI.KEYID = 6
5,530,918 UART: [idev] SUBJECT.KEYID = 7
5,532,083 UART: [idev] UDS.KEYID = 0
5,534,585 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,678,396 UART: [idev] Erasing UDS.KEYID = 0
8,038,587 UART: [idev] Sha1 KeyId Algorithm
8,062,896 UART: [idev] --
8,066,678 UART: [ldev] ++
8,067,251 UART: [ldev] CDI.KEYID = 6
8,068,133 UART: [ldev] SUBJECT.KEYID = 5
8,069,353 UART: [ldev] AUTHORITY.KEYID = 7
8,070,607 UART: [ldev] FE.KEYID = 1
8,114,859 UART: [ldev] Erasing FE.KEYID = 1
10,618,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,403,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,108 UART: [ldev] --
12,429,224 UART: [fwproc] Wait for Commands...
12,431,753 UART: [fwproc] Recv command 0x46574c44
12,433,853 UART: [fwproc] Recv'd Img size: 114360 bytes
15,839,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,910,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,979,285 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,297,466 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,173 UART:
192,533 UART: Running Caliptra ROM ...
193,733 UART:
193,888 UART: [state] CFI Enabled
266,718 UART: [state] LifecycleState = Unprovisioned
269,138 UART: [state] DebugLocked = No
271,007 UART: [state] WD Timer not started. Device not locked for debugging
275,361 UART: [kat] SHA2-256
465,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,008 UART: [kat] ++
476,564 UART: [kat] sha1
487,345 UART: [kat] SHA2-256
490,356 UART: [kat] SHA2-384
497,309 UART: [kat] SHA2-512-ACC
499,877 UART: [kat] ECC-384
2,949,411 UART: [kat] HMAC-384Kdf
2,972,220 UART: [kat] LMS
3,503,998 UART: [kat] --
3,507,621 UART: [cold-reset] ++
3,510,140 UART: [fht] FHT @ 0x50003400
3,521,157 UART: [idev] ++
3,521,841 UART: [idev] CDI.KEYID = 6
3,522,814 UART: [idev] SUBJECT.KEYID = 7
3,524,052 UART: [idev] UDS.KEYID = 0
3,527,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,087 UART: [idev] Erasing UDS.KEYID = 0
6,031,312 UART: [idev] Sha1 KeyId Algorithm
6,054,715 UART: [idev] --
6,060,072 UART: [ldev] ++
6,060,766 UART: [ldev] CDI.KEYID = 6
6,061,680 UART: [ldev] SUBJECT.KEYID = 5
6,062,842 UART: [ldev] AUTHORITY.KEYID = 7
6,064,076 UART: [ldev] FE.KEYID = 1
6,101,686 UART: [ldev] Erasing FE.KEYID = 1
8,607,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,582 UART: [ldev] --
10,417,555 UART: [fwproc] Wait for Commands...
10,420,625 UART: [fwproc] Recv command 0x46574c44
10,422,895 UART: [fwproc] Recv'd Img size: 114360 bytes
13,668,795 UART: ROM Fatal Error: 0x000B0038
13,672,230 >>> mbox cmd response: failed
13,672,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,673,079 >>> mbox cmd response: failed
13,673,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,673,648 >>> mbox cmd response: failed
Initializing fuses
2,049,249 writing to cptra_bootfsm_go
2,238,567 UART:
2,238,943 UART: Running Caliptra ROM ...
2,240,080 UART:
2,240,249 UART: [state] CFI Enabled
2,313,661 UART: [state] LifecycleState = Unprovisioned
2,316,036 UART: [state] DebugLocked = No
2,318,787 UART: [state] WD Timer not started. Device not locked for debugging
2,323,470 UART: [kat] SHA2-256
2,513,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,159 UART: [kat] ++
2,524,700 UART: [kat] sha1
2,535,871 UART: [kat] SHA2-256
2,538,895 UART: [kat] SHA2-384
2,544,888 UART: [kat] SHA2-512-ACC
2,547,461 UART: [kat] ECC-384
5,000,252 UART: [kat] HMAC-384Kdf
5,023,080 UART: [kat] LMS
5,554,847 UART: [kat] --
5,559,569 UART: [cold-reset] ++
5,562,158 UART: [fht] FHT @ 0x50003400
5,574,114 UART: [idev] ++
5,574,789 UART: [idev] CDI.KEYID = 6
5,575,802 UART: [idev] SUBJECT.KEYID = 7
5,576,909 UART: [idev] UDS.KEYID = 0
5,579,295 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,723,254 UART: [idev] Erasing UDS.KEYID = 0
8,082,826 UART: [idev] Sha1 KeyId Algorithm
8,105,663 UART: [idev] --
8,110,523 UART: [ldev] ++
8,111,209 UART: [ldev] CDI.KEYID = 6
8,112,120 UART: [ldev] SUBJECT.KEYID = 5
8,113,279 UART: [ldev] AUTHORITY.KEYID = 7
8,114,510 UART: [ldev] FE.KEYID = 1
8,151,586 UART: [ldev] Erasing FE.KEYID = 1
10,662,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,688 UART: [ldev] --
12,467,359 UART: [fwproc] Wait for Commands...
12,470,051 UART: [fwproc] Recv command 0x46574c44
12,472,364 UART: [fwproc] Recv'd Img size: 114360 bytes
15,916,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,107,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,649,010 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,437,999 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,378,599 >>> mbox cmd response: failed
13,379,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,505 >>> mbox cmd response: failed
13,379,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,065 >>> mbox cmd response: failed
Initializing fuses
2,045,317 writing to cptra_bootfsm_go
5,483,428 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,785,777 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,413 UART:
192,792 UART: Running Caliptra ROM ...
193,980 UART:
603,667 UART: [state] CFI Enabled
620,256 UART: [state] LifecycleState = Unprovisioned
622,668 UART: [state] DebugLocked = No
623,837 UART: [state] WD Timer not started. Device not locked for debugging
628,839 UART: [kat] SHA2-256
818,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,523 UART: [kat] ++
830,111 UART: [kat] sha1
841,969 UART: [kat] SHA2-256
844,976 UART: [kat] SHA2-384
851,318 UART: [kat] SHA2-512-ACC
853,907 UART: [kat] ECC-384
3,297,240 UART: [kat] HMAC-384Kdf
3,310,069 UART: [kat] LMS
3,841,890 UART: [kat] --
3,847,098 UART: [cold-reset] ++
3,848,556 UART: [fht] FHT @ 0x50003400
3,860,787 UART: [idev] ++
3,861,456 UART: [idev] CDI.KEYID = 6
3,862,395 UART: [idev] SUBJECT.KEYID = 7
3,863,660 UART: [idev] UDS.KEYID = 0
3,866,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,010,464 UART: [idev] Erasing UDS.KEYID = 0
6,348,812 UART: [idev] Sha1 KeyId Algorithm
6,370,133 UART: [idev] --
6,376,106 UART: [ldev] ++
6,376,794 UART: [ldev] CDI.KEYID = 6
6,377,678 UART: [ldev] SUBJECT.KEYID = 5
6,378,894 UART: [ldev] AUTHORITY.KEYID = 7
6,380,129 UART: [ldev] FE.KEYID = 1
6,389,742 UART: [ldev] Erasing FE.KEYID = 1
8,867,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,951 UART: [ldev] --
10,659,482 UART: [fwproc] Wait for Commands...
10,661,860 UART: [fwproc] Recv command 0x46574c44
10,664,179 UART: [fwproc] Recv'd Img size: 114360 bytes
13,914,130 UART: ROM Fatal Error: 0x000B0038
13,917,584 >>> mbox cmd response: failed
13,918,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,918,379 >>> mbox cmd response: failed
13,918,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,918,939 >>> mbox cmd response: failed
Initializing fuses
2,052,551 writing to cptra_bootfsm_go
2,241,811 UART:
2,242,156 UART: Running Caliptra ROM ...
2,243,210 UART:
6,553,586 UART: [state] CFI Enabled
6,567,203 UART: [state] LifecycleState = Unprovisioned
6,569,549 UART: [state] DebugLocked = No
6,572,476 UART: [state] WD Timer not started. Device not locked for debugging
6,576,652 UART: [kat] SHA2-256
6,766,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,777,322 UART: [kat] ++
6,777,836 UART: [kat] sha1
6,790,956 UART: [kat] SHA2-256
6,793,980 UART: [kat] SHA2-384
6,800,292 UART: [kat] SHA2-512-ACC
6,802,859 UART: [kat] ECC-384
9,245,747 UART: [kat] HMAC-384Kdf
9,260,585 UART: [kat] LMS
9,792,401 UART: [kat] --
9,797,088 UART: [cold-reset] ++
9,799,616 UART: [fht] FHT @ 0x50003400
9,810,662 UART: [idev] ++
9,811,387 UART: [idev] CDI.KEYID = 6
9,812,313 UART: [idev] SUBJECT.KEYID = 7
9,813,534 UART: [idev] UDS.KEYID = 0
9,816,302 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,959,919 UART: [idev] Erasing UDS.KEYID = 0
12,294,862 UART: [idev] Sha1 KeyId Algorithm
12,317,246 UART: [idev] --
12,322,581 UART: [ldev] ++
12,323,269 UART: [ldev] CDI.KEYID = 6
12,324,338 UART: [ldev] SUBJECT.KEYID = 5
12,325,440 UART: [ldev] AUTHORITY.KEYID = 7
12,326,619 UART: [ldev] FE.KEYID = 1
12,339,053 UART: [ldev] Erasing FE.KEYID = 1
14,816,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,536,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,551,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,566,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,581,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,601,957 UART: [ldev] --
16,607,443 UART: [fwproc] Wait for Commands...
16,609,371 UART: [fwproc] Recv command 0x46574c44
16,611,693 UART: [fwproc] Recv'd Img size: 114360 bytes
20,052,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,125,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,241,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,783,805 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,761,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,633,671 >>> mbox cmd response: failed
13,634,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,634,575 >>> mbox cmd response: failed
13,634,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,635,143 >>> mbox cmd response: failed
Initializing fuses
2,045,063 writing to cptra_bootfsm_go
9,989,998 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,188,824 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,633 UART: [kat] SHA2-256
892,571 UART: [kat] SHA2-384
895,446 UART: [kat] SHA2-512-ACC
897,347 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,482 UART: [kat] LMS
1,475,678 UART: [kat] --
1,476,461 UART: [cold-reset] ++
1,476,853 UART: [fht] Storing FHT @ 0x50003400
1,479,618 UART: [idev] ++
1,479,786 UART: [idev] CDI.KEYID = 6
1,480,146 UART: [idev] SUBJECT.KEYID = 7
1,480,570 UART: [idev] UDS.KEYID = 0
1,480,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,262 UART: [idev] Erasing UDS.KEYID = 0
1,504,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,912 UART: [idev] --
1,513,913 UART: [ldev] ++
1,514,081 UART: [ldev] CDI.KEYID = 6
1,514,444 UART: [ldev] SUBJECT.KEYID = 5
1,514,870 UART: [ldev] AUTHORITY.KEYID = 7
1,515,333 UART: [ldev] FE.KEYID = 1
1,520,757 UART: [ldev] Erasing FE.KEYID = 1
1,545,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,936 UART: [ldev] --
1,585,363 UART: [fwproc] Waiting for Commands...
1,585,992 UART: [fwproc] Received command 0x46574c44
1,586,783 UART: [fwproc] Received Image of size 114360 bytes
3,977,665 UART: ROM Fatal Error: 0x000B0038
3,978,822 >>> mbox cmd response: failed
3,978,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,978,828 >>> mbox cmd response: failed
3,978,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,978,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,311 UART: [kat] SHA2-256
882,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,357 UART: [kat] ++
886,509 UART: [kat] sha1
890,739 UART: [kat] SHA2-256
892,677 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
902,544 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,007 UART: [cold-reset] ++
1,476,375 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,344 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,896 UART: [idev] --
1,513,807 UART: [ldev] ++
1,513,975 UART: [ldev] CDI.KEYID = 6
1,514,338 UART: [ldev] SUBJECT.KEYID = 5
1,514,764 UART: [ldev] AUTHORITY.KEYID = 7
1,515,227 UART: [ldev] FE.KEYID = 1
1,520,041 UART: [ldev] Erasing FE.KEYID = 1
1,545,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,950 UART: [ldev] --
1,584,349 UART: [fwproc] Waiting for Commands...
1,584,980 UART: [fwproc] Received command 0x46574c44
1,585,771 UART: [fwproc] Received Image of size 114360 bytes
2,882,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,927 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,075,110 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,953 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,754,533 >>> mbox cmd response: failed
3,754,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,754,539 >>> mbox cmd response: failed
3,754,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,754,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,220 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
890,926 UART: [kat] SHA2-256
892,864 UART: [kat] SHA2-384
895,603 UART: [kat] SHA2-512-ACC
897,504 UART: [kat] ECC-384
903,253 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,786 UART: [cold-reset] ++
1,477,270 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,743 UART: [idev] Erasing UDS.KEYID = 0
1,505,215 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,861 UART: [idev] --
1,514,754 UART: [ldev] ++
1,514,922 UART: [ldev] CDI.KEYID = 6
1,515,285 UART: [ldev] SUBJECT.KEYID = 5
1,515,711 UART: [ldev] AUTHORITY.KEYID = 7
1,516,174 UART: [ldev] FE.KEYID = 1
1,521,268 UART: [ldev] Erasing FE.KEYID = 1
1,546,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,403 UART: [ldev] --
1,585,792 UART: [fwproc] Waiting for Commands...
1,586,561 UART: [fwproc] Received command 0x46574c44
1,587,352 UART: [fwproc] Received Image of size 114360 bytes
3,864,461 UART: ROM Fatal Error: 0x000B0038
3,865,618 >>> mbox cmd response: failed
3,865,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,624 >>> mbox cmd response: failed
3,865,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,582 UART: [kat] SHA2-256
882,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,628 UART: [kat] ++
886,780 UART: [kat] sha1
891,028 UART: [kat] SHA2-256
892,966 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,227 UART: [kat] HMAC-384Kdf
907,833 UART: [kat] LMS
1,476,029 UART: [kat] --
1,476,890 UART: [cold-reset] ++
1,477,430 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,419 UART: [idev] Erasing UDS.KEYID = 0
1,506,189 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,869 UART: [idev] --
1,515,712 UART: [ldev] ++
1,515,880 UART: [ldev] CDI.KEYID = 6
1,516,243 UART: [ldev] SUBJECT.KEYID = 5
1,516,669 UART: [ldev] AUTHORITY.KEYID = 7
1,517,132 UART: [ldev] FE.KEYID = 1
1,522,206 UART: [ldev] Erasing FE.KEYID = 1
1,547,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,627 UART: [ldev] --
1,586,894 UART: [fwproc] Waiting for Commands...
1,587,725 UART: [fwproc] Received command 0x46574c44
1,588,516 UART: [fwproc] Received Image of size 114360 bytes
2,886,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,523 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,642,461 >>> mbox cmd response: failed
3,642,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,642,467 >>> mbox cmd response: failed
3,642,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,642,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,921 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,906 UART: [kat] LMS
1,171,234 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,316 UART: [idev] ++
1,175,484 UART: [idev] CDI.KEYID = 6
1,175,844 UART: [idev] SUBJECT.KEYID = 7
1,176,268 UART: [idev] UDS.KEYID = 0
1,176,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,201,471 UART: [idev] Sha1 KeyId Algorithm
1,209,759 UART: [idev] --
1,210,875 UART: [ldev] ++
1,211,043 UART: [ldev] CDI.KEYID = 6
1,211,406 UART: [ldev] SUBJECT.KEYID = 5
1,211,832 UART: [ldev] AUTHORITY.KEYID = 7
1,212,295 UART: [ldev] FE.KEYID = 1
1,217,349 UART: [ldev] Erasing FE.KEYID = 1
1,243,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,283,068 UART: [fwproc] Wait for Commands...
1,283,676 UART: [fwproc] Recv command 0x46574c44
1,284,404 UART: [fwproc] Recv'd Img size: 114360 bytes
1,863,083 UART: ROM Fatal Error: 0x000B0038
1,864,240 >>> mbox cmd response: failed
1,864,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,864,246 >>> mbox cmd response: failed
1,864,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,864,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
893,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,763 UART: [kat] ++
897,915 UART: [kat] sha1
902,283 UART: [kat] SHA2-256
904,223 UART: [kat] SHA2-384
906,922 UART: [kat] SHA2-512-ACC
908,823 UART: [kat] ECC-384
918,416 UART: [kat] HMAC-384Kdf
923,088 UART: [kat] LMS
1,171,416 UART: [kat] --
1,172,423 UART: [cold-reset] ++
1,172,759 UART: [fht] FHT @ 0x50003400
1,175,572 UART: [idev] ++
1,175,740 UART: [idev] CDI.KEYID = 6
1,176,100 UART: [idev] SUBJECT.KEYID = 7
1,176,524 UART: [idev] UDS.KEYID = 0
1,176,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,326 UART: [idev] Erasing UDS.KEYID = 0
1,201,435 UART: [idev] Sha1 KeyId Algorithm
1,209,883 UART: [idev] --
1,211,049 UART: [ldev] ++
1,211,217 UART: [ldev] CDI.KEYID = 6
1,211,580 UART: [ldev] SUBJECT.KEYID = 5
1,212,006 UART: [ldev] AUTHORITY.KEYID = 7
1,212,469 UART: [ldev] FE.KEYID = 1
1,217,739 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,495 UART: [ldev] --
1,282,796 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,248 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,847 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,731,154 >>> mbox cmd response: failed
1,731,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,160 >>> mbox cmd response: failed
1,731,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,888 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,990 UART: [kat] SHA2-256
903,930 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
922,985 UART: [kat] LMS
1,171,313 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,844 UART: [fht] FHT @ 0x50003400
1,175,467 UART: [idev] ++
1,175,635 UART: [idev] CDI.KEYID = 6
1,175,995 UART: [idev] SUBJECT.KEYID = 7
1,176,419 UART: [idev] UDS.KEYID = 0
1,176,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,585 UART: [idev] Erasing UDS.KEYID = 0
1,201,682 UART: [idev] Sha1 KeyId Algorithm
1,210,214 UART: [idev] --
1,211,154 UART: [ldev] ++
1,211,322 UART: [ldev] CDI.KEYID = 6
1,211,685 UART: [ldev] SUBJECT.KEYID = 5
1,212,111 UART: [ldev] AUTHORITY.KEYID = 7
1,212,574 UART: [ldev] FE.KEYID = 1
1,217,962 UART: [ldev] Erasing FE.KEYID = 1
1,244,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,584 UART: [ldev] --
1,285,011 UART: [fwproc] Wait for Commands...
1,285,671 UART: [fwproc] Recv command 0x46574c44
1,286,399 UART: [fwproc] Recv'd Img size: 114360 bytes
1,877,043 UART: ROM Fatal Error: 0x000B0038
1,878,200 >>> mbox cmd response: failed
1,878,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,878,206 >>> mbox cmd response: failed
1,878,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,878,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,500 UART: [cold-reset] ++
1,172,908 UART: [fht] FHT @ 0x50003400
1,175,467 UART: [idev] ++
1,175,635 UART: [idev] CDI.KEYID = 6
1,175,995 UART: [idev] SUBJECT.KEYID = 7
1,176,419 UART: [idev] UDS.KEYID = 0
1,176,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,379 UART: [idev] Erasing UDS.KEYID = 0
1,201,328 UART: [idev] Sha1 KeyId Algorithm
1,209,778 UART: [idev] --
1,210,718 UART: [ldev] ++
1,210,886 UART: [ldev] CDI.KEYID = 6
1,211,249 UART: [ldev] SUBJECT.KEYID = 5
1,211,675 UART: [ldev] AUTHORITY.KEYID = 7
1,212,138 UART: [ldev] FE.KEYID = 1
1,217,658 UART: [ldev] Erasing FE.KEYID = 1
1,244,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,048 UART: [ldev] --
1,283,397 UART: [fwproc] Wait for Commands...
1,284,105 UART: [fwproc] Recv command 0x46574c44
1,284,833 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,262 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,000 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,726,313 >>> mbox cmd response: failed
1,726,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,319 >>> mbox cmd response: failed
1,726,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,882 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,857 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,174,159 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,679 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,604 UART: [ldev] ++
1,209,772 UART: [ldev] CDI.KEYID = 6
1,210,136 UART: [ldev] SUBJECT.KEYID = 5
1,210,563 UART: [ldev] AUTHORITY.KEYID = 7
1,211,026 UART: [ldev] FE.KEYID = 1
1,216,130 UART: [ldev] Erasing FE.KEYID = 1
1,242,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,418 UART: [fwproc] Wait for Commands...
1,282,241 UART: [fwproc] Recv command 0x46574c44
1,282,974 UART: [fwproc] Recv'd Img size: 114360 bytes
1,868,682 UART: ROM Fatal Error: 0x000B0038
1,869,839 >>> mbox cmd response: failed
1,869,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,845 >>> mbox cmd response: failed
1,869,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,471 UART: [kat] SHA2-256
901,411 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,518 UART: [kat] HMAC-384Kdf
920,024 UART: [kat] LMS
1,168,336 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,841 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,173,855 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,198,185 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,018 UART: [ldev] ++
1,208,186 UART: [ldev] CDI.KEYID = 6
1,208,550 UART: [ldev] SUBJECT.KEYID = 5
1,208,977 UART: [ldev] AUTHORITY.KEYID = 7
1,209,440 UART: [ldev] FE.KEYID = 1
1,214,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,298 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,409 UART: [fwproc] Recv command 0x46574c44
1,282,142 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,843 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,264 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,721,214 >>> mbox cmd response: failed
1,721,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,220 >>> mbox cmd response: failed
1,721,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,859 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
915,825 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,642 UART: [idev] --
1,208,841 UART: [ldev] ++
1,209,009 UART: [ldev] CDI.KEYID = 6
1,209,373 UART: [ldev] SUBJECT.KEYID = 5
1,209,800 UART: [ldev] AUTHORITY.KEYID = 7
1,210,263 UART: [ldev] FE.KEYID = 1
1,215,697 UART: [ldev] Erasing FE.KEYID = 1
1,241,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,071 UART: [fwproc] Wait for Commands...
1,281,812 UART: [fwproc] Recv command 0x46574c44
1,282,545 UART: [fwproc] Recv'd Img size: 114360 bytes
1,866,464 UART: ROM Fatal Error: 0x000B0038
1,867,621 >>> mbox cmd response: failed
1,867,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,627 >>> mbox cmd response: failed
1,867,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,385 UART: [kat] SHA2-256
891,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,064 UART: [kat] ++
896,216 UART: [kat] sha1
900,614 UART: [kat] SHA2-256
902,554 UART: [kat] SHA2-384
905,381 UART: [kat] SHA2-512-ACC
907,282 UART: [kat] ECC-384
917,259 UART: [kat] HMAC-384Kdf
921,899 UART: [kat] LMS
1,170,211 UART: [kat] --
1,171,136 UART: [cold-reset] ++
1,171,570 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,913 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,175,684 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,694 UART: [idev] Erasing UDS.KEYID = 0
1,200,442 UART: [idev] Sha1 KeyId Algorithm
1,209,318 UART: [idev] --
1,210,347 UART: [ldev] ++
1,210,515 UART: [ldev] CDI.KEYID = 6
1,210,879 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,216,927 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,013 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,252 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,727,081 >>> mbox cmd response: failed
1,727,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,727,087 >>> mbox cmd response: failed
1,727,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,727,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,696 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
4,879,789 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,664,193 >>> mbox cmd response: failed
18,664,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,665,226 >>> mbox cmd response: failed
18,665,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,665,795 >>> mbox cmd response: failed
Initializing fuses
2,051,236 writing to cptra_bootfsm_go
6,924,550 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,483,133 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
4,882,843 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,744,239 >>> mbox cmd response: failed
18,744,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,745,236 >>> mbox cmd response: failed
18,745,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,745,800 >>> mbox cmd response: failed
Initializing fuses
2,050,947 writing to cptra_bootfsm_go
6,916,246 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,476,238 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
5,184,583 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,052,002 >>> mbox cmd response: failed
19,052,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,053,061 >>> mbox cmd response: failed
19,053,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,053,631 >>> mbox cmd response: failed
Initializing fuses
2,053,521 writing to cptra_bootfsm_go
7,234,434 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,672,861 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
5,190,501 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,974,198 >>> mbox cmd response: failed
18,974,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,975,215 >>> mbox cmd response: failed
18,975,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,975,776 >>> mbox cmd response: failed
Initializing fuses
2,050,002 writing to cptra_bootfsm_go
7,226,818 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,657,583 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,485,079 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,980,355 >>> mbox cmd response: failed
12,980,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,246 >>> mbox cmd response: failed
12,981,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,822 >>> mbox cmd response: failed
Initializing fuses
2,047,164 writing to cptra_bootfsm_go
5,505,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,319,591 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,484,150 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,956,237 >>> mbox cmd response: failed
12,956,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,190 >>> mbox cmd response: failed
12,957,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,814 >>> mbox cmd response: failed
Initializing fuses
2,055,966 writing to cptra_bootfsm_go
5,518,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,324,730 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,463,027 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,955,913 >>> mbox cmd response: failed
12,956,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,020 >>> mbox cmd response: failed
12,957,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,594 >>> mbox cmd response: failed
Initializing fuses
2,056,619 writing to cptra_bootfsm_go
5,522,839 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,346,288 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,786,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,141,454 >>> mbox cmd response: failed
13,142,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,142,628 >>> mbox cmd response: failed
13,142,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,143,185 >>> mbox cmd response: failed
Initializing fuses
2,055,850 writing to cptra_bootfsm_go
10,496,532 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,223,922 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,790,532 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,182,357 >>> mbox cmd response: failed
13,182,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,183,277 >>> mbox cmd response: failed
13,183,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,183,829 >>> mbox cmd response: failed
Initializing fuses
2,054,568 writing to cptra_bootfsm_go
10,467,262 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,190,895 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,471,323 >>> mbox cmd response: failed
1,471,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,329 >>> mbox cmd response: failed
1,471,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,289 UART: [kat] SHA2-256
882,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,335 UART: [kat] ++
886,487 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,953 UART: [fht] Storing FHT @ 0x50003400
1,479,576 UART: [idev] ++
1,479,744 UART: [idev] CDI.KEYID = 6
1,480,104 UART: [idev] SUBJECT.KEYID = 7
1,480,528 UART: [idev] UDS.KEYID = 0
1,480,873 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,754 UART: [idev] Erasing UDS.KEYID = 0
1,505,442 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,052 UART: [idev] --
1,515,101 UART: [ldev] ++
1,515,269 UART: [ldev] CDI.KEYID = 6
1,515,632 UART: [ldev] SUBJECT.KEYID = 5
1,516,058 UART: [ldev] AUTHORITY.KEYID = 7
1,516,521 UART: [ldev] FE.KEYID = 1
1,521,599 UART: [ldev] Erasing FE.KEYID = 1
1,546,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,840 UART: [ldev] --
1,586,207 UART: [fwproc] Waiting for Commands...
1,586,914 UART: [fwproc] Received command 0x46574c44
1,587,705 UART: [fwproc] Received Image of size 114360 bytes
2,885,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,323 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,468 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,861 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,467,498 >>> mbox cmd response: failed
1,467,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,504 >>> mbox cmd response: failed
1,467,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,490 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,032 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,476,618 >>> mbox cmd response: failed
1,476,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,624 >>> mbox cmd response: failed
1,476,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,602 UART: [kat] SHA2-256
882,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,648 UART: [kat] ++
886,800 UART: [kat] sha1
891,146 UART: [kat] SHA2-256
893,084 UART: [kat] SHA2-384
895,841 UART: [kat] SHA2-512-ACC
897,742 UART: [kat] ECC-384
903,387 UART: [kat] HMAC-384Kdf
908,167 UART: [kat] LMS
1,476,363 UART: [kat] --
1,477,432 UART: [cold-reset] ++
1,477,860 UART: [fht] Storing FHT @ 0x50003400
1,480,673 UART: [idev] ++
1,480,841 UART: [idev] CDI.KEYID = 6
1,481,201 UART: [idev] SUBJECT.KEYID = 7
1,481,625 UART: [idev] UDS.KEYID = 0
1,481,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,721 UART: [idev] Erasing UDS.KEYID = 0
1,506,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,757 UART: [idev] --
1,515,802 UART: [ldev] ++
1,515,970 UART: [ldev] CDI.KEYID = 6
1,516,333 UART: [ldev] SUBJECT.KEYID = 5
1,516,759 UART: [ldev] AUTHORITY.KEYID = 7
1,517,222 UART: [ldev] FE.KEYID = 1
1,522,304 UART: [ldev] Erasing FE.KEYID = 1
1,547,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,586,982 UART: [fwproc] Waiting for Commands...
1,587,737 UART: [fwproc] Received command 0x46574c44
1,588,528 UART: [fwproc] Received Image of size 114360 bytes
2,885,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,628 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,857 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,704 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,474,957 >>> mbox cmd response: failed
1,474,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,963 >>> mbox cmd response: failed
1,474,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,624 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,093 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,476,973 >>> mbox cmd response: failed
1,476,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,979 >>> mbox cmd response: failed
1,476,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
893,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,567 UART: [kat] ++
897,719 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,632 UART: [kat] SHA2-512-ACC
908,533 UART: [kat] ECC-384
918,706 UART: [kat] HMAC-384Kdf
923,234 UART: [kat] LMS
1,171,562 UART: [kat] --
1,172,507 UART: [cold-reset] ++
1,173,051 UART: [fht] FHT @ 0x50003400
1,175,600 UART: [idev] ++
1,175,768 UART: [idev] CDI.KEYID = 6
1,176,128 UART: [idev] SUBJECT.KEYID = 7
1,176,552 UART: [idev] UDS.KEYID = 0
1,176,897 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,326 UART: [idev] Erasing UDS.KEYID = 0
1,200,961 UART: [idev] Sha1 KeyId Algorithm
1,209,501 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,932 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,217,103 UART: [ldev] Erasing FE.KEYID = 1
1,243,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,047 UART: [ldev] --
1,283,394 UART: [fwproc] Wait for Commands...
1,284,194 UART: [fwproc] Recv command 0x46574c44
1,284,922 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,381 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,476,651 >>> mbox cmd response: failed
1,476,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,657 >>> mbox cmd response: failed
1,476,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,433 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,408 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,473,257 >>> mbox cmd response: failed
1,473,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,263 >>> mbox cmd response: failed
1,473,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,331 UART: [kat] LMS
1,171,659 UART: [kat] --
1,172,436 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,685 UART: [idev] ++
1,175,853 UART: [idev] CDI.KEYID = 6
1,176,213 UART: [idev] SUBJECT.KEYID = 7
1,176,637 UART: [idev] UDS.KEYID = 0
1,176,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,667 UART: [idev] Erasing UDS.KEYID = 0
1,201,702 UART: [idev] Sha1 KeyId Algorithm
1,210,114 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,217,994 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,642 UART: [ldev] --
1,283,021 UART: [fwproc] Wait for Commands...
1,283,661 UART: [fwproc] Recv command 0x46574c44
1,284,389 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,886 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,178 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,464,277 >>> mbox cmd response: failed
1,464,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,283 >>> mbox cmd response: failed
1,464,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,777 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,467,147 >>> mbox cmd response: failed
1,467,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,153 >>> mbox cmd response: failed
1,467,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,931 UART: [idev] ++
1,173,099 UART: [idev] CDI.KEYID = 6
1,173,460 UART: [idev] SUBJECT.KEYID = 7
1,173,885 UART: [idev] UDS.KEYID = 0
1,174,231 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,520 UART: [fwproc] Wait for Commands...
1,281,317 UART: [fwproc] Recv command 0x46574c44
1,282,050 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,559 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,439 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,470,649 >>> mbox cmd response: failed
1,470,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,655 >>> mbox cmd response: failed
1,470,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,661 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,210 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,487 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,748 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,466,174 >>> mbox cmd response: failed
1,466,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,180 >>> mbox cmd response: failed
1,466,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,817 UART: [state] LifecycleState = Unprovisioned
85,472 UART: [state] DebugLocked = No
86,018 UART: [state] WD Timer not started. Device not locked for debugging
87,325 UART: [kat] SHA2-256
890,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,004 UART: [kat] ++
895,156 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,049 UART: [kat] SHA2-512-ACC
905,950 UART: [kat] ECC-384
915,335 UART: [kat] HMAC-384Kdf
919,933 UART: [kat] LMS
1,168,245 UART: [kat] --
1,168,960 UART: [cold-reset] ++
1,169,456 UART: [fht] FHT @ 0x50003400
1,171,976 UART: [idev] ++
1,172,144 UART: [idev] CDI.KEYID = 6
1,172,505 UART: [idev] SUBJECT.KEYID = 7
1,172,930 UART: [idev] UDS.KEYID = 0
1,173,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,904 UART: [idev] Erasing UDS.KEYID = 0
1,198,336 UART: [idev] Sha1 KeyId Algorithm
1,207,190 UART: [idev] --
1,208,293 UART: [ldev] ++
1,208,461 UART: [ldev] CDI.KEYID = 6
1,208,825 UART: [ldev] SUBJECT.KEYID = 5
1,209,252 UART: [ldev] AUTHORITY.KEYID = 7
1,209,715 UART: [ldev] FE.KEYID = 1
1,214,705 UART: [ldev] Erasing FE.KEYID = 1
1,241,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,877 UART: [ldev] --
1,280,315 UART: [fwproc] Wait for Commands...
1,280,934 UART: [fwproc] Recv command 0x46574c44
1,281,667 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,258 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,574 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,475,764 >>> mbox cmd response: failed
1,475,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,770 >>> mbox cmd response: failed
1,475,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,899 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,524 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
4,882,771 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,998,954 >>> mbox cmd response: failed
13,999,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,999,875 >>> mbox cmd response: failed
14,000,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,000,446 >>> mbox cmd response: failed
Initializing fuses
2,061,015 writing to cptra_bootfsm_go
6,922,920 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,510,597 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
4,877,883 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,999,057 >>> mbox cmd response: failed
13,999,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,000,016 >>> mbox cmd response: failed
14,000,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,000,665 >>> mbox cmd response: failed
Initializing fuses
2,056,671 writing to cptra_bootfsm_go
6,920,146 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,502,604 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
5,185,886 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,167,143 >>> mbox cmd response: failed
14,167,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,168,144 >>> mbox cmd response: failed
14,168,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,168,711 >>> mbox cmd response: failed
Initializing fuses
2,056,896 writing to cptra_bootfsm_go
10,883,557 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,325,203 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
5,184,824 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,149,111 >>> mbox cmd response: failed
14,149,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,150,032 >>> mbox cmd response: failed
14,150,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,150,608 >>> mbox cmd response: failed
Initializing fuses
2,056,890 writing to cptra_bootfsm_go
10,897,440 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,333,509 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,464,172 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,407,741 >>> mbox cmd response: failed
10,408,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,783 >>> mbox cmd response: failed
10,409,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,409,402 >>> mbox cmd response: failed
Initializing fuses
2,055,867 writing to cptra_bootfsm_go
5,529,817 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,391,886 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,463,327 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,420,135 >>> mbox cmd response: failed
10,420,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,421,229 >>> mbox cmd response: failed
10,421,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,421,791 >>> mbox cmd response: failed
Initializing fuses
2,063,507 writing to cptra_bootfsm_go
5,524,548 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,336,787 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,444,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,348,275 >>> mbox cmd response: failed
10,348,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,338 >>> mbox cmd response: failed
10,349,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,900 >>> mbox cmd response: failed
Initializing fuses
2,063,762 writing to cptra_bootfsm_go
5,509,207 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,328,177 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,780,456 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,607,182 >>> mbox cmd response: failed
10,607,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,608,114 >>> mbox cmd response: failed
10,608,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,608,679 >>> mbox cmd response: failed
Initializing fuses
2,062,910 writing to cptra_bootfsm_go
13,046,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,762,001 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,785,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,634,457 >>> mbox cmd response: failed
10,635,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,635,410 >>> mbox cmd response: failed
10,635,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,635,980 >>> mbox cmd response: failed
Initializing fuses
2,057,986 writing to cptra_bootfsm_go
13,029,927 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,757,418 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,650 >>> mbox cmd response: failed
1,179,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,656 >>> mbox cmd response: failed
1,179,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
902,144 UART: [kat] HMAC-384Kdf
906,626 UART: [kat] LMS
1,474,822 UART: [kat] --
1,475,597 UART: [cold-reset] ++
1,475,999 UART: [fht] Storing FHT @ 0x50003400
1,478,672 UART: [idev] ++
1,478,840 UART: [idev] CDI.KEYID = 6
1,479,200 UART: [idev] SUBJECT.KEYID = 7
1,479,624 UART: [idev] UDS.KEYID = 0
1,479,969 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,720 UART: [idev] Erasing UDS.KEYID = 0
1,503,638 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,144 UART: [idev] --
1,513,279 UART: [ldev] ++
1,513,447 UART: [ldev] CDI.KEYID = 6
1,513,810 UART: [ldev] SUBJECT.KEYID = 5
1,514,236 UART: [ldev] AUTHORITY.KEYID = 7
1,514,699 UART: [ldev] FE.KEYID = 1
1,519,895 UART: [ldev] Erasing FE.KEYID = 1
1,545,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,446 UART: [ldev] --
1,584,729 UART: [fwproc] Waiting for Commands...
1,585,376 UART: [fwproc] Received command 0x46574c44
1,586,167 UART: [fwproc] Received Image of size 114360 bytes
2,883,785 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,755 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,075,896 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,740 >>> mbox cmd response: failed
1,178,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,746 >>> mbox cmd response: failed
1,178,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,086 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,697 >>> mbox cmd response: failed
1,180,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,703 >>> mbox cmd response: failed
1,180,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,919 UART: [kat] LMS
1,476,115 UART: [kat] --
1,477,000 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,161 UART: [idev] ++
1,480,329 UART: [idev] CDI.KEYID = 6
1,480,689 UART: [idev] SUBJECT.KEYID = 7
1,481,113 UART: [idev] UDS.KEYID = 0
1,481,458 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,147 UART: [idev] Erasing UDS.KEYID = 0
1,505,999 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,547 UART: [idev] --
1,515,636 UART: [ldev] ++
1,515,804 UART: [ldev] CDI.KEYID = 6
1,516,167 UART: [ldev] SUBJECT.KEYID = 5
1,516,593 UART: [ldev] AUTHORITY.KEYID = 7
1,517,056 UART: [ldev] FE.KEYID = 1
1,522,412 UART: [ldev] Erasing FE.KEYID = 1
1,548,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,911 UART: [ldev] --
1,587,234 UART: [fwproc] Waiting for Commands...
1,587,951 UART: [fwproc] Received command 0x46574c44
1,588,742 UART: [fwproc] Received Image of size 114360 bytes
2,887,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,014 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,351 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,009 >>> mbox cmd response: failed
1,181,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,015 >>> mbox cmd response: failed
1,181,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,941 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,144 >>> mbox cmd response: failed
1,178,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,150 >>> mbox cmd response: failed
1,178,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
892,888 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,013 UART: [kat] ++
897,165 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,236 UART: [kat] SHA2-512-ACC
908,137 UART: [kat] ECC-384
918,002 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,703 UART: [cold-reset] ++
1,172,071 UART: [fht] FHT @ 0x50003400
1,174,660 UART: [idev] ++
1,174,828 UART: [idev] CDI.KEYID = 6
1,175,188 UART: [idev] SUBJECT.KEYID = 7
1,175,612 UART: [idev] UDS.KEYID = 0
1,175,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,806 UART: [idev] Erasing UDS.KEYID = 0
1,200,781 UART: [idev] Sha1 KeyId Algorithm
1,209,307 UART: [idev] --
1,210,339 UART: [ldev] ++
1,210,507 UART: [ldev] CDI.KEYID = 6
1,210,870 UART: [ldev] SUBJECT.KEYID = 5
1,211,296 UART: [ldev] AUTHORITY.KEYID = 7
1,211,759 UART: [ldev] FE.KEYID = 1
1,216,875 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,282,070 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,412 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,953 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,657 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,086 >>> mbox cmd response: failed
1,178,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,092 >>> mbox cmd response: failed
1,178,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,098 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,196 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,699 >>> mbox cmd response: failed
1,178,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,705 >>> mbox cmd response: failed
1,178,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,011 UART: [kat] SHA2-512-ACC
908,912 UART: [kat] ECC-384
918,697 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,359 UART: [idev] Erasing UDS.KEYID = 0
1,201,968 UART: [idev] Sha1 KeyId Algorithm
1,210,434 UART: [idev] --
1,211,724 UART: [ldev] ++
1,211,892 UART: [ldev] CDI.KEYID = 6
1,212,255 UART: [ldev] SUBJECT.KEYID = 5
1,212,681 UART: [ldev] AUTHORITY.KEYID = 7
1,213,144 UART: [ldev] FE.KEYID = 1
1,218,482 UART: [ldev] Erasing FE.KEYID = 1
1,244,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,010 UART: [ldev] --
1,284,521 UART: [fwproc] Wait for Commands...
1,285,259 UART: [fwproc] Recv command 0x46574c44
1,285,987 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,439 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,540 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,797 >>> mbox cmd response: failed
1,178,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,803 >>> mbox cmd response: failed
1,178,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,864 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,551 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,624 >>> mbox cmd response: failed
1,179,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,630 >>> mbox cmd response: failed
1,179,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
891,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,684 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,173,947 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,620 UART: [ldev] ++
1,208,788 UART: [ldev] CDI.KEYID = 6
1,209,152 UART: [ldev] SUBJECT.KEYID = 5
1,209,579 UART: [ldev] AUTHORITY.KEYID = 7
1,210,042 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,506 UART: [ldev] --
1,280,978 UART: [fwproc] Wait for Commands...
1,281,743 UART: [fwproc] Recv command 0x46574c44
1,282,476 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,797 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,920 >>> mbox cmd response: failed
1,179,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,926 >>> mbox cmd response: failed
1,179,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,999 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,043 >>> mbox cmd response: failed
1,180,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,049 >>> mbox cmd response: failed
1,180,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,198,986 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,849 UART: [ldev] ++
1,209,017 UART: [ldev] CDI.KEYID = 6
1,209,381 UART: [ldev] SUBJECT.KEYID = 5
1,209,808 UART: [ldev] AUTHORITY.KEYID = 7
1,210,271 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,709 UART: [ldev] --
1,281,023 UART: [fwproc] Wait for Commands...
1,281,742 UART: [fwproc] Recv command 0x46574c44
1,282,475 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,152 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,932 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,269 >>> mbox cmd response: failed
1,179,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,275 >>> mbox cmd response: failed
1,179,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,748 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,071 UART:
192,444 UART: Running Caliptra ROM ...
193,573 UART:
193,718 UART: [state] CFI Enabled
263,220 UART: [state] LifecycleState = Unprovisioned
265,144 UART: [state] DebugLocked = No
266,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,666 UART: [kat] SHA2-256
441,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,883 UART: [kat] ++
452,362 UART: [kat] sha1
464,699 UART: [kat] SHA2-256
467,405 UART: [kat] SHA2-384
473,816 UART: [kat] SHA2-512-ACC
476,155 UART: [kat] ECC-384
2,769,760 UART: [kat] HMAC-384Kdf
2,800,312 UART: [kat] LMS
3,990,603 UART: [kat] --
3,996,244 UART: [cold-reset] ++
3,998,403 UART: [fht] Storing FHT @ 0x50003400
4,010,596 UART: [idev] ++
4,011,166 UART: [idev] CDI.KEYID = 6
4,012,092 UART: [idev] SUBJECT.KEYID = 7
4,013,370 UART: [idev] UDS.KEYID = 0
4,019,211 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,163,356 UART: [idev] Erasing UDS.KEYID = 0
7,349,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,180 UART: [idev] --
7,375,781 UART: [ldev] ++
7,376,359 UART: [ldev] CDI.KEYID = 6
7,377,379 UART: [ldev] SUBJECT.KEYID = 5
7,378,545 UART: [ldev] AUTHORITY.KEYID = 7
7,379,779 UART: [ldev] FE.KEYID = 1
7,423,976 UART: [ldev] Erasing FE.KEYID = 1
10,753,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,150 UART: [ldev] --
13,116,580 UART: [fwproc] Waiting for Commands...
13,119,596 UART: [fwproc] Received command 0x46574c44
13,121,839 UART: [fwproc] Received Image of size 114036 bytes
13,188,396 UART: ROM Fatal Error: 0x000B0007
13,191,911 >>> mbox cmd response: failed
13,192,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,192,644 >>> mbox cmd response: failed
13,192,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,208 >>> mbox cmd response: failed
Initializing fuses
2,066,804 writing to cptra_bootfsm_go
2,256,121 UART:
2,256,490 UART: Running Caliptra ROM ...
2,257,546 UART:
2,257,702 UART: [state] CFI Enabled
2,325,347 UART: [state] LifecycleState = Unprovisioned
2,327,285 UART: [state] DebugLocked = No
2,329,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,335,073 UART: [kat] SHA2-256
2,504,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,515,287 UART: [kat] ++
2,515,744 UART: [kat] sha1
2,528,143 UART: [kat] SHA2-256
2,530,815 UART: [kat] SHA2-384
2,535,304 UART: [kat] SHA2-512-ACC
2,537,658 UART: [kat] ECC-384
4,830,418 UART: [kat] HMAC-384Kdf
4,861,298 UART: [kat] LMS
6,051,594 UART: [kat] --
6,056,689 UART: [cold-reset] ++
6,057,612 UART: [fht] Storing FHT @ 0x50003400
6,069,748 UART: [idev] ++
6,070,325 UART: [idev] CDI.KEYID = 6
6,071,240 UART: [idev] SUBJECT.KEYID = 7
6,072,510 UART: [idev] UDS.KEYID = 0
6,075,069 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,218,638 UART: [idev] Erasing UDS.KEYID = 0
9,406,360 UART: [idev] Using Sha1 for KeyId Algorithm
9,428,620 UART: [idev] --
9,432,459 UART: [ldev] ++
9,433,033 UART: [ldev] CDI.KEYID = 6
9,434,004 UART: [ldev] SUBJECT.KEYID = 5
9,435,215 UART: [ldev] AUTHORITY.KEYID = 7
9,436,455 UART: [ldev] FE.KEYID = 1
9,483,261 UART: [ldev] Erasing FE.KEYID = 1
12,819,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,130,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,145,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,160,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,174,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,192,069 UART: [ldev] --
15,196,205 UART: [fwproc] Waiting for Commands...
15,198,789 UART: [fwproc] Received command 0x46574c44
15,200,976 UART: [fwproc] Received Image of size 114036 bytes
19,255,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,331,151 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,400,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,716,989 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,788,175 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,909,522 >>> mbox cmd response: failed
12,910,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,628 >>> mbox cmd response: failed
12,910,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,205 >>> mbox cmd response: failed
Initializing fuses
2,059,634 writing to cptra_bootfsm_go
5,834,227 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,927,906 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,568 UART:
192,936 UART: Running Caliptra ROM ...
194,038 UART:
603,954 UART: [state] CFI Enabled
617,777 UART: [state] LifecycleState = Unprovisioned
619,662 UART: [state] DebugLocked = No
622,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,868 UART: [kat] SHA2-256
796,630 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,170 UART: [kat] ++
807,620 UART: [kat] sha1
818,879 UART: [kat] SHA2-256
821,567 UART: [kat] SHA2-384
827,710 UART: [kat] SHA2-512-ACC
830,050 UART: [kat] ECC-384
3,112,398 UART: [kat] HMAC-384Kdf
3,123,587 UART: [kat] LMS
4,313,695 UART: [kat] --
4,318,204 UART: [cold-reset] ++
4,320,260 UART: [fht] Storing FHT @ 0x50003400
4,330,297 UART: [idev] ++
4,330,905 UART: [idev] CDI.KEYID = 6
4,331,828 UART: [idev] SUBJECT.KEYID = 7
4,333,071 UART: [idev] UDS.KEYID = 0
4,339,071 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,390 UART: [idev] Erasing UDS.KEYID = 0
7,621,291 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,469 UART: [idev] --
7,646,958 UART: [ldev] ++
7,647,582 UART: [ldev] CDI.KEYID = 6
7,648,509 UART: [ldev] SUBJECT.KEYID = 5
7,649,724 UART: [ldev] AUTHORITY.KEYID = 7
7,650,956 UART: [ldev] FE.KEYID = 1
7,663,005 UART: [ldev] Erasing FE.KEYID = 1
10,951,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,355 UART: [ldev] --
13,312,623 UART: [fwproc] Waiting for Commands...
13,315,098 UART: [fwproc] Received command 0x46574c44
13,317,288 UART: [fwproc] Received Image of size 114036 bytes
13,385,015 UART: ROM Fatal Error: 0x000B0007
13,388,485 >>> mbox cmd response: failed
13,388,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,389,258 >>> mbox cmd response: failed
13,389,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,389,818 >>> mbox cmd response: failed
Initializing fuses
2,051,874 writing to cptra_bootfsm_go
2,241,171 UART:
2,241,525 UART: Running Caliptra ROM ...
2,242,661 UART:
7,083,009 UART: [state] CFI Enabled
7,095,887 UART: [state] LifecycleState = Unprovisioned
7,097,835 UART: [state] DebugLocked = No
7,099,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,104,538 UART: [kat] SHA2-256
7,274,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,284,818 UART: [kat] ++
7,285,311 UART: [kat] sha1
7,295,659 UART: [kat] SHA2-256
7,298,379 UART: [kat] SHA2-384
7,302,968 UART: [kat] SHA2-512-ACC
7,305,377 UART: [kat] ECC-384
9,590,676 UART: [kat] HMAC-384Kdf
9,602,373 UART: [kat] LMS
10,792,451 UART: [kat] --
10,797,743 UART: [cold-reset] ++
10,799,944 UART: [fht] Storing FHT @ 0x50003400
10,811,644 UART: [idev] ++
10,812,208 UART: [idev] CDI.KEYID = 6
10,813,171 UART: [idev] SUBJECT.KEYID = 7
10,814,385 UART: [idev] UDS.KEYID = 0
10,816,983 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,960,319 UART: [idev] Erasing UDS.KEYID = 0
14,097,318 UART: [idev] Using Sha1 for KeyId Algorithm
14,118,487 UART: [idev] --
14,123,965 UART: [ldev] ++
14,124,542 UART: [ldev] CDI.KEYID = 6
14,125,509 UART: [ldev] SUBJECT.KEYID = 5
14,126,757 UART: [ldev] AUTHORITY.KEYID = 7
14,127,992 UART: [ldev] FE.KEYID = 1
14,138,648 UART: [ldev] Erasing FE.KEYID = 1
17,428,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,720,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,734,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,749,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,764,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,784,259 UART: [ldev] --
19,788,825 UART: [fwproc] Waiting for Commands...
19,792,063 UART: [fwproc] Received command 0x46574c44
19,794,308 UART: [fwproc] Received Image of size 114036 bytes
23,849,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,924,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,993,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,310,527 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,128,029 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,110,835 >>> mbox cmd response: failed
13,111,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,111,973 >>> mbox cmd response: failed
13,112,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,112,538 >>> mbox cmd response: failed
Initializing fuses
2,053,756 writing to cptra_bootfsm_go
10,877,914 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,816,549 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,190 UART:
192,549 UART: Running Caliptra ROM ...
194,292 UART:
194,464 UART: [state] CFI Enabled
263,567 UART: [state] LifecycleState = Unprovisioned
265,382 UART: [state] DebugLocked = No
267,512 UART: [state] WD Timer not started. Device not locked for debugging
270,977 UART: [kat] SHA2-256
450,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,658 UART: [kat] ++
462,197 UART: [kat] sha1
473,347 UART: [kat] SHA2-256
476,411 UART: [kat] SHA2-384
481,088 UART: [kat] SHA2-512-ACC
484,023 UART: [kat] ECC-384
2,947,385 UART: [kat] HMAC-384Kdf
2,971,123 UART: [kat] LMS
3,500,571 UART: [kat] --
3,505,588 UART: [cold-reset] ++
3,506,595 UART: [fht] FHT @ 0x50003400
3,517,245 UART: [idev] ++
3,517,816 UART: [idev] CDI.KEYID = 6
3,518,833 UART: [idev] SUBJECT.KEYID = 7
3,519,954 UART: [idev] UDS.KEYID = 0
3,522,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,707 UART: [idev] Erasing UDS.KEYID = 0
6,024,988 UART: [idev] Sha1 KeyId Algorithm
6,047,421 UART: [idev] --
6,050,909 UART: [ldev] ++
6,051,496 UART: [ldev] CDI.KEYID = 6
6,052,412 UART: [ldev] SUBJECT.KEYID = 5
6,053,576 UART: [ldev] AUTHORITY.KEYID = 7
6,054,810 UART: [ldev] FE.KEYID = 1
6,100,543 UART: [ldev] Erasing FE.KEYID = 1
8,604,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,738 UART: [ldev] --
10,415,195 UART: [fwproc] Wait for Commands...
10,417,994 UART: [fwproc] Recv command 0x46574c44
10,420,087 UART: [fwproc] Recv'd Img size: 114360 bytes
10,487,439 UART: ROM Fatal Error: 0x000B0007
10,490,521 >>> mbox cmd response: failed
10,490,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,192 >>> mbox cmd response: failed
10,491,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,750 >>> mbox cmd response: failed
Initializing fuses
2,049,932 writing to cptra_bootfsm_go
2,239,261 UART:
2,239,614 UART: Running Caliptra ROM ...
2,240,655 UART:
2,240,807 UART: [state] CFI Enabled
2,316,330 UART: [state] LifecycleState = Unprovisioned
2,318,211 UART: [state] DebugLocked = No
2,320,116 UART: [state] WD Timer not started. Device not locked for debugging
2,324,667 UART: [kat] SHA2-256
2,503,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,515,369 UART: [kat] ++
2,515,916 UART: [kat] sha1
2,526,978 UART: [kat] SHA2-256
2,530,054 UART: [kat] SHA2-384
2,535,774 UART: [kat] SHA2-512-ACC
2,538,719 UART: [kat] ECC-384
4,999,163 UART: [kat] HMAC-384Kdf
5,023,036 UART: [kat] LMS
5,552,513 UART: [kat] --
5,556,988 UART: [cold-reset] ++
5,557,947 UART: [fht] FHT @ 0x50003400
5,570,220 UART: [idev] ++
5,570,793 UART: [idev] CDI.KEYID = 6
5,571,706 UART: [idev] SUBJECT.KEYID = 7
5,572,924 UART: [idev] UDS.KEYID = 0
5,575,454 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,719,829 UART: [idev] Erasing UDS.KEYID = 0
8,077,151 UART: [idev] Sha1 KeyId Algorithm
8,100,980 UART: [idev] --
8,104,273 UART: [ldev] ++
8,104,869 UART: [ldev] CDI.KEYID = 6
8,105,948 UART: [ldev] SUBJECT.KEYID = 5
8,107,060 UART: [ldev] AUTHORITY.KEYID = 7
8,108,261 UART: [ldev] FE.KEYID = 1
8,152,451 UART: [ldev] Erasing FE.KEYID = 1
10,654,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,439,892 UART: [ldev] --
12,445,227 UART: [fwproc] Wait for Commands...
12,448,404 UART: [fwproc] Recv command 0x46574c44
12,450,444 UART: [fwproc] Recv'd Img size: 114360 bytes
15,850,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,926,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,994,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,313,747 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,229 UART:
192,597 UART: Running Caliptra ROM ...
193,776 UART:
193,927 UART: [state] CFI Enabled
266,429 UART: [state] LifecycleState = Unprovisioned
268,826 UART: [state] DebugLocked = No
270,046 UART: [state] WD Timer not started. Device not locked for debugging
273,238 UART: [kat] SHA2-256
463,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,879 UART: [kat] ++
474,328 UART: [kat] sha1
486,903 UART: [kat] SHA2-256
489,908 UART: [kat] SHA2-384
494,625 UART: [kat] SHA2-512-ACC
497,202 UART: [kat] ECC-384
2,948,547 UART: [kat] HMAC-384Kdf
2,971,747 UART: [kat] LMS
3,503,552 UART: [kat] --
3,508,942 UART: [cold-reset] ++
3,510,451 UART: [fht] FHT @ 0x50003400
3,522,954 UART: [idev] ++
3,523,672 UART: [idev] CDI.KEYID = 6
3,524,587 UART: [idev] SUBJECT.KEYID = 7
3,525,751 UART: [idev] UDS.KEYID = 0
3,531,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,675,061 UART: [idev] Erasing UDS.KEYID = 0
6,028,870 UART: [idev] Sha1 KeyId Algorithm
6,051,085 UART: [idev] --
6,055,645 UART: [ldev] ++
6,056,336 UART: [ldev] CDI.KEYID = 6
6,057,248 UART: [ldev] SUBJECT.KEYID = 5
6,058,348 UART: [ldev] AUTHORITY.KEYID = 7
6,059,630 UART: [ldev] FE.KEYID = 1
6,099,655 UART: [ldev] Erasing FE.KEYID = 1
8,609,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,563 UART: [ldev] --
10,416,544 UART: [fwproc] Wait for Commands...
10,418,169 UART: [fwproc] Recv command 0x46574c44
10,420,428 UART: [fwproc] Recv'd Img size: 114360 bytes
10,517,468 UART: ROM Fatal Error: 0x000B0007
10,521,114 >>> mbox cmd response: failed
10,521,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,909 >>> mbox cmd response: failed
10,522,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,466 >>> mbox cmd response: failed
Initializing fuses
2,066,075 writing to cptra_bootfsm_go
2,255,380 UART:
2,255,722 UART: Running Caliptra ROM ...
2,256,877 UART:
2,257,041 UART: [state] CFI Enabled
2,326,676 UART: [state] LifecycleState = Unprovisioned
2,329,060 UART: [state] DebugLocked = No
2,331,373 UART: [state] WD Timer not started. Device not locked for debugging
2,336,268 UART: [kat] SHA2-256
2,526,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,903 UART: [kat] ++
2,537,400 UART: [kat] sha1
2,549,101 UART: [kat] SHA2-256
2,552,122 UART: [kat] SHA2-384
2,559,089 UART: [kat] SHA2-512-ACC
2,561,720 UART: [kat] ECC-384
5,014,121 UART: [kat] HMAC-384Kdf
5,036,246 UART: [kat] LMS
5,568,037 UART: [kat] --
5,573,343 UART: [cold-reset] ++
5,574,583 UART: [fht] FHT @ 0x50003400
5,587,353 UART: [idev] ++
5,588,027 UART: [idev] CDI.KEYID = 6
5,588,993 UART: [idev] SUBJECT.KEYID = 7
5,590,208 UART: [idev] UDS.KEYID = 0
5,592,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,736,711 UART: [idev] Erasing UDS.KEYID = 0
8,093,249 UART: [idev] Sha1 KeyId Algorithm
8,115,100 UART: [idev] --
8,120,102 UART: [ldev] ++
8,120,839 UART: [ldev] CDI.KEYID = 6
8,121,730 UART: [ldev] SUBJECT.KEYID = 5
8,122,893 UART: [ldev] AUTHORITY.KEYID = 7
8,124,124 UART: [ldev] FE.KEYID = 1
8,165,772 UART: [ldev] Erasing FE.KEYID = 1
10,670,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,408,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,423,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,438,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,453,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,475,378 UART: [ldev] --
12,481,464 UART: [fwproc] Wait for Commands...
12,483,668 UART: [fwproc] Recv command 0x46574c44
12,485,926 UART: [fwproc] Recv'd Img size: 114360 bytes
15,928,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,008,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,124,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,668,057 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,447,126 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,297,675 >>> mbox cmd response: failed
10,298,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,298,768 >>> mbox cmd response: failed
10,299,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,345 >>> mbox cmd response: failed
Initializing fuses
2,057,270 writing to cptra_bootfsm_go
5,489,238 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,790,200 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,216 writing to cptra_bootfsm_go
193,574 UART:
193,948 UART: Running Caliptra ROM ...
195,138 UART:
604,791 UART: [state] CFI Enabled
620,206 UART: [state] LifecycleState = Unprovisioned
622,606 UART: [state] DebugLocked = No
625,281 UART: [state] WD Timer not started. Device not locked for debugging
629,398 UART: [kat] SHA2-256
819,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,087 UART: [kat] ++
830,679 UART: [kat] sha1
841,888 UART: [kat] SHA2-256
844,897 UART: [kat] SHA2-384
851,090 UART: [kat] SHA2-512-ACC
853,705 UART: [kat] ECC-384
3,297,890 UART: [kat] HMAC-384Kdf
3,311,856 UART: [kat] LMS
3,843,658 UART: [kat] --
3,849,371 UART: [cold-reset] ++
3,851,033 UART: [fht] FHT @ 0x50003400
3,863,490 UART: [idev] ++
3,864,178 UART: [idev] CDI.KEYID = 6
3,865,199 UART: [idev] SUBJECT.KEYID = 7
3,866,307 UART: [idev] UDS.KEYID = 0
3,872,209 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,016,081 UART: [idev] Erasing UDS.KEYID = 0
6,342,030 UART: [idev] Sha1 KeyId Algorithm
6,364,336 UART: [idev] --
6,370,064 UART: [ldev] ++
6,370,765 UART: [ldev] CDI.KEYID = 6
6,371,659 UART: [ldev] SUBJECT.KEYID = 5
6,372,878 UART: [ldev] AUTHORITY.KEYID = 7
6,374,056 UART: [ldev] FE.KEYID = 1
6,384,958 UART: [ldev] Erasing FE.KEYID = 1
8,865,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,840 UART: [ldev] --
10,658,990 UART: [fwproc] Wait for Commands...
10,661,255 UART: [fwproc] Recv command 0x46574c44
10,663,570 UART: [fwproc] Recv'd Img size: 114360 bytes
10,758,290 UART: ROM Fatal Error: 0x000B0007
10,761,922 >>> mbox cmd response: failed
10,762,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,762,706 >>> mbox cmd response: failed
10,762,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,763,212 >>> mbox cmd response: failed
Initializing fuses
2,056,421 writing to cptra_bootfsm_go
2,245,709 UART:
2,246,060 UART: Running Caliptra ROM ...
2,247,148 UART:
9,693,699 UART: [state] CFI Enabled
9,707,766 UART: [state] LifecycleState = Unprovisioned
9,710,116 UART: [state] DebugLocked = No
9,712,774 UART: [state] WD Timer not started. Device not locked for debugging
9,716,574 UART: [kat] SHA2-256
9,906,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,917,247 UART: [kat] ++
9,917,761 UART: [kat] sha1
9,929,349 UART: [kat] SHA2-256
9,932,368 UART: [kat] SHA2-384
9,937,064 UART: [kat] SHA2-512-ACC
9,939,688 UART: [kat] ECC-384
12,381,925 UART: [kat] HMAC-384Kdf
12,394,048 UART: [kat] LMS
12,925,892 UART: [kat] --
12,930,642 UART: [cold-reset] ++
12,931,986 UART: [fht] FHT @ 0x50003400
12,943,942 UART: [idev] ++
12,944,614 UART: [idev] CDI.KEYID = 6
12,945,549 UART: [idev] SUBJECT.KEYID = 7
12,946,814 UART: [idev] UDS.KEYID = 0
12,949,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,093,343 UART: [idev] Erasing UDS.KEYID = 0
15,425,468 UART: [idev] Sha1 KeyId Algorithm
15,447,780 UART: [idev] --
15,453,067 UART: [ldev] ++
15,453,747 UART: [ldev] CDI.KEYID = 6
15,454,628 UART: [ldev] SUBJECT.KEYID = 5
15,455,841 UART: [ldev] AUTHORITY.KEYID = 7
15,457,072 UART: [ldev] FE.KEYID = 1
15,468,610 UART: [ldev] Erasing FE.KEYID = 1
17,948,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,667,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,682,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,697,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,712,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,734,000 UART: [ldev] --
19,740,092 UART: [fwproc] Wait for Commands...
19,743,024 UART: [fwproc] Recv command 0x46574c44
19,745,291 UART: [fwproc] Recv'd Img size: 114360 bytes
23,197,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,279,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,395,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,938,427 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,766,005 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,532,575 >>> mbox cmd response: failed
10,533,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,631 >>> mbox cmd response: failed
10,533,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,534,192 >>> mbox cmd response: failed
Initializing fuses
2,059,973 writing to cptra_bootfsm_go
13,088,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,286,598 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,159 UART: [cold-reset] ++
1,476,713 UART: [fht] Storing FHT @ 0x50003400
1,479,554 UART: [idev] ++
1,479,722 UART: [idev] CDI.KEYID = 6
1,480,082 UART: [idev] SUBJECT.KEYID = 7
1,480,506 UART: [idev] UDS.KEYID = 0
1,480,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,370 UART: [idev] Erasing UDS.KEYID = 0
1,505,030 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,597 UART: [ldev] ++
1,514,765 UART: [ldev] CDI.KEYID = 6
1,515,128 UART: [ldev] SUBJECT.KEYID = 5
1,515,554 UART: [ldev] AUTHORITY.KEYID = 7
1,516,017 UART: [ldev] FE.KEYID = 1
1,521,005 UART: [ldev] Erasing FE.KEYID = 1
1,546,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,414 UART: [ldev] --
1,585,809 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 114360 bytes
1,611,246 UART: ROM Fatal Error: 0x000B0007
1,612,403 >>> mbox cmd response: failed
1,612,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,409 >>> mbox cmd response: failed
1,612,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,463 UART: [kat] SHA2-256
892,401 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
902,972 UART: [kat] HMAC-384Kdf
907,642 UART: [kat] LMS
1,475,838 UART: [kat] --
1,476,817 UART: [cold-reset] ++
1,477,199 UART: [fht] Storing FHT @ 0x50003400
1,480,046 UART: [idev] ++
1,480,214 UART: [idev] CDI.KEYID = 6
1,480,574 UART: [idev] SUBJECT.KEYID = 7
1,480,998 UART: [idev] UDS.KEYID = 0
1,481,343 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,180 UART: [idev] Erasing UDS.KEYID = 0
1,505,600 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,288 UART: [idev] --
1,515,223 UART: [ldev] ++
1,515,391 UART: [ldev] CDI.KEYID = 6
1,515,754 UART: [ldev] SUBJECT.KEYID = 5
1,516,180 UART: [ldev] AUTHORITY.KEYID = 7
1,516,643 UART: [ldev] FE.KEYID = 1
1,521,907 UART: [ldev] Erasing FE.KEYID = 1
1,547,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,332 UART: [ldev] --
1,586,663 UART: [fwproc] Waiting for Commands...
1,587,446 UART: [fwproc] Received command 0x46574c44
1,588,237 UART: [fwproc] Received Image of size 114360 bytes
2,888,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,915,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,390 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,465,798 >>> mbox cmd response: failed
1,465,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,804 >>> mbox cmd response: failed
1,465,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,997 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,752 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,856 UART: [kat] SHA2-256
881,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,902 UART: [kat] ++
886,054 UART: [kat] sha1
890,438 UART: [kat] SHA2-256
892,376 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,221 UART: [kat] LMS
1,475,417 UART: [kat] --
1,476,214 UART: [cold-reset] ++
1,476,728 UART: [fht] Storing FHT @ 0x50003400
1,479,457 UART: [idev] ++
1,479,625 UART: [idev] CDI.KEYID = 6
1,479,985 UART: [idev] SUBJECT.KEYID = 7
1,480,409 UART: [idev] UDS.KEYID = 0
1,480,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,609 UART: [idev] Erasing UDS.KEYID = 0
1,505,565 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,123 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,522,052 UART: [ldev] Erasing FE.KEYID = 1
1,547,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,278 UART: [fwproc] Waiting for Commands...
1,587,933 UART: [fwproc] Received command 0x46574c44
1,588,724 UART: [fwproc] Received Image of size 114360 bytes
1,612,565 UART: ROM Fatal Error: 0x000B0007
1,613,722 >>> mbox cmd response: failed
1,613,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,728 >>> mbox cmd response: failed
1,613,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,167 UART: [kat] SHA2-512-ACC
897,068 UART: [kat] ECC-384
902,735 UART: [kat] HMAC-384Kdf
907,293 UART: [kat] LMS
1,475,489 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,476,928 UART: [fht] Storing FHT @ 0x50003400
1,479,707 UART: [idev] ++
1,479,875 UART: [idev] CDI.KEYID = 6
1,480,235 UART: [idev] SUBJECT.KEYID = 7
1,480,659 UART: [idev] UDS.KEYID = 0
1,481,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,805 UART: [idev] Erasing UDS.KEYID = 0
1,506,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,871 UART: [idev] --
1,515,918 UART: [ldev] ++
1,516,086 UART: [ldev] CDI.KEYID = 6
1,516,449 UART: [ldev] SUBJECT.KEYID = 5
1,516,875 UART: [ldev] AUTHORITY.KEYID = 7
1,517,338 UART: [ldev] FE.KEYID = 1
1,522,498 UART: [ldev] Erasing FE.KEYID = 1
1,548,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,165 UART: [ldev] --
1,587,454 UART: [fwproc] Waiting for Commands...
1,588,321 UART: [fwproc] Received command 0x46574c44
1,589,112 UART: [fwproc] Received Image of size 114360 bytes
2,886,366 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,218 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,557 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,465,443 >>> mbox cmd response: failed
1,465,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,449 >>> mbox cmd response: failed
1,465,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,902 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,761 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,633 UART: [fht] FHT @ 0x50003400
1,175,220 UART: [idev] ++
1,175,388 UART: [idev] CDI.KEYID = 6
1,175,748 UART: [idev] SUBJECT.KEYID = 7
1,176,172 UART: [idev] UDS.KEYID = 0
1,176,517 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,136 UART: [idev] Erasing UDS.KEYID = 0
1,201,279 UART: [idev] Sha1 KeyId Algorithm
1,209,693 UART: [idev] --
1,210,821 UART: [ldev] ++
1,210,989 UART: [ldev] CDI.KEYID = 6
1,211,352 UART: [ldev] SUBJECT.KEYID = 5
1,211,778 UART: [ldev] AUTHORITY.KEYID = 7
1,212,241 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,314 UART: [fwproc] Wait for Commands...
1,283,126 UART: [fwproc] Recv command 0x46574c44
1,283,854 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,969 UART: ROM Fatal Error: 0x000B0007
1,309,126 >>> mbox cmd response: failed
1,309,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,132 >>> mbox cmd response: failed
1,309,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,567 UART: [kat] SHA2-256
903,507 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,354 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,333 UART: [fht] FHT @ 0x50003400
1,174,888 UART: [idev] ++
1,175,056 UART: [idev] CDI.KEYID = 6
1,175,416 UART: [idev] SUBJECT.KEYID = 7
1,175,840 UART: [idev] UDS.KEYID = 0
1,176,185 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,808 UART: [idev] Erasing UDS.KEYID = 0
1,200,647 UART: [idev] Sha1 KeyId Algorithm
1,209,163 UART: [idev] --
1,210,149 UART: [ldev] ++
1,210,317 UART: [ldev] CDI.KEYID = 6
1,210,680 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,603 UART: [ldev] --
1,281,920 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,327 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,429 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,915 >>> mbox cmd response: failed
1,161,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,921 >>> mbox cmd response: failed
1,161,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,608 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,721 UART: [kat] SHA2-512-ACC
908,622 UART: [kat] ECC-384
917,959 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,742 UART: [cold-reset] ++
1,172,246 UART: [fht] FHT @ 0x50003400
1,174,755 UART: [idev] ++
1,174,923 UART: [idev] CDI.KEYID = 6
1,175,283 UART: [idev] SUBJECT.KEYID = 7
1,175,707 UART: [idev] UDS.KEYID = 0
1,176,052 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,793 UART: [idev] Erasing UDS.KEYID = 0
1,201,470 UART: [idev] Sha1 KeyId Algorithm
1,209,952 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,720 UART: [ldev] Erasing FE.KEYID = 1
1,243,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,988 UART: [ldev] --
1,282,389 UART: [fwproc] Wait for Commands...
1,283,179 UART: [fwproc] Recv command 0x46574c44
1,283,907 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,118 UART: ROM Fatal Error: 0x000B0007
1,308,275 >>> mbox cmd response: failed
1,308,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,281 >>> mbox cmd response: failed
1,308,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,767 UART: [kat] SHA2-512-ACC
908,668 UART: [kat] ECC-384
918,213 UART: [kat] HMAC-384Kdf
922,803 UART: [kat] LMS
1,171,131 UART: [kat] --
1,171,842 UART: [cold-reset] ++
1,172,270 UART: [fht] FHT @ 0x50003400
1,174,981 UART: [idev] ++
1,175,149 UART: [idev] CDI.KEYID = 6
1,175,509 UART: [idev] SUBJECT.KEYID = 7
1,175,933 UART: [idev] UDS.KEYID = 0
1,176,278 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,645 UART: [idev] Erasing UDS.KEYID = 0
1,201,110 UART: [idev] Sha1 KeyId Algorithm
1,209,586 UART: [idev] --
1,210,508 UART: [ldev] ++
1,210,676 UART: [ldev] CDI.KEYID = 6
1,211,039 UART: [ldev] SUBJECT.KEYID = 5
1,211,465 UART: [ldev] AUTHORITY.KEYID = 7
1,211,928 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,432 UART: [ldev] --
1,282,707 UART: [fwproc] Wait for Commands...
1,283,427 UART: [fwproc] Recv command 0x46574c44
1,284,155 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,672 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,164,434 >>> mbox cmd response: failed
1,164,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,440 >>> mbox cmd response: failed
1,164,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,475 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,173,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,723 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,128 UART: [ldev] --
1,280,514 UART: [fwproc] Wait for Commands...
1,281,279 UART: [fwproc] Recv command 0x46574c44
1,282,012 UART: [fwproc] Recv'd Img size: 114360 bytes
1,305,951 UART: ROM Fatal Error: 0x000B0007
1,307,108 >>> mbox cmd response: failed
1,307,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,114 >>> mbox cmd response: failed
1,307,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,598 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,585 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,180 UART: [ldev] ++
1,209,348 UART: [ldev] CDI.KEYID = 6
1,209,712 UART: [ldev] SUBJECT.KEYID = 5
1,210,139 UART: [ldev] AUTHORITY.KEYID = 7
1,210,602 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,242,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,866 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,281,863 UART: [fwproc] Recv command 0x46574c44
1,282,596 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,113 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,158,697 >>> mbox cmd response: failed
1,158,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,703 >>> mbox cmd response: failed
1,158,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,383 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,228 UART: [kat] SHA2-256
902,168 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,755 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,110 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,691 UART: [ldev] SUBJECT.KEYID = 5
1,210,118 UART: [ldev] AUTHORITY.KEYID = 7
1,210,581 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,241,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,031 UART: [ldev] --
1,280,527 UART: [fwproc] Wait for Commands...
1,281,178 UART: [fwproc] Recv command 0x46574c44
1,281,911 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,068 UART: ROM Fatal Error: 0x000B0007
1,307,225 >>> mbox cmd response: failed
1,307,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,231 >>> mbox cmd response: failed
1,307,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,174,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,296 UART: [idev] Sha1 KeyId Algorithm
1,208,278 UART: [idev] --
1,209,223 UART: [ldev] ++
1,209,391 UART: [ldev] CDI.KEYID = 6
1,209,755 UART: [ldev] SUBJECT.KEYID = 5
1,210,182 UART: [ldev] AUTHORITY.KEYID = 7
1,210,645 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,741 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,796 UART: [fwproc] Recv command 0x46574c44
1,283,529 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,188 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,692 >>> mbox cmd response: failed
1,160,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,698 >>> mbox cmd response: failed
1,160,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,052 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
4,880,774 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,867,121 >>> mbox cmd response: failed
16,867,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,868,244 >>> mbox cmd response: failed
16,868,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,868,798 >>> mbox cmd response: failed
Initializing fuses
2,062,784 writing to cptra_bootfsm_go
6,932,027 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,483,168 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
4,882,541 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,879,014 >>> mbox cmd response: failed
16,879,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,879,986 >>> mbox cmd response: failed
16,880,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,880,622 >>> mbox cmd response: failed
Initializing fuses
2,056,687 writing to cptra_bootfsm_go
6,919,485 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,473,226 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
5,184,360 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,056,891 >>> mbox cmd response: failed
17,057,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,057,904 >>> mbox cmd response: failed
17,058,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,058,466 >>> mbox cmd response: failed
Initializing fuses
2,056,815 writing to cptra_bootfsm_go
7,994,443 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,442,591 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
5,187,093 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,060,680 >>> mbox cmd response: failed
17,061,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,061,880 >>> mbox cmd response: failed
17,062,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,062,449 >>> mbox cmd response: failed
Initializing fuses
2,056,597 writing to cptra_bootfsm_go
7,996,262 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,433,329 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,440,134 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,687,138 >>> mbox cmd response: failed
12,688,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,367 >>> mbox cmd response: failed
12,688,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,923 >>> mbox cmd response: failed
Initializing fuses
2,062,098 writing to cptra_bootfsm_go
5,511,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,301,896 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,480,725 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,707,775 >>> mbox cmd response: failed
12,708,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,972 >>> mbox cmd response: failed
12,709,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,533 >>> mbox cmd response: failed
Initializing fuses
2,063,439 writing to cptra_bootfsm_go
5,485,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,308,201 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,490,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,728,783 >>> mbox cmd response: failed
12,729,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,729,868 >>> mbox cmd response: failed
12,730,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,730,455 >>> mbox cmd response: failed
Initializing fuses
2,057,702 writing to cptra_bootfsm_go
5,519,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,337,247 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,793,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,928,125 >>> mbox cmd response: failed
12,928,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,209 >>> mbox cmd response: failed
12,929,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,791 >>> mbox cmd response: failed
Initializing fuses
2,058,432 writing to cptra_bootfsm_go
10,732,331 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,468,566 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,781,583 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,895,275 >>> mbox cmd response: failed
12,895,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,896,224 >>> mbox cmd response: failed
12,896,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,896,780 >>> mbox cmd response: failed
Initializing fuses
2,062,888 writing to cptra_bootfsm_go
10,753,998 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,489,438 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,349 >>> mbox cmd response: failed
1,426,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,355 >>> mbox cmd response: failed
1,426,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,041 UART: [kat] SHA2-256
881,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,087 UART: [kat] ++
886,239 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,717 UART: [fht] Storing FHT @ 0x50003400
1,479,430 UART: [idev] ++
1,479,598 UART: [idev] CDI.KEYID = 6
1,479,958 UART: [idev] SUBJECT.KEYID = 7
1,480,382 UART: [idev] UDS.KEYID = 0
1,480,727 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,144 UART: [idev] Erasing UDS.KEYID = 0
1,504,662 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,392 UART: [idev] --
1,514,345 UART: [ldev] ++
1,514,513 UART: [ldev] CDI.KEYID = 6
1,514,876 UART: [ldev] SUBJECT.KEYID = 5
1,515,302 UART: [ldev] AUTHORITY.KEYID = 7
1,515,765 UART: [ldev] FE.KEYID = 1
1,520,913 UART: [ldev] Erasing FE.KEYID = 1
1,546,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,012 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,292 UART: [fwproc] Received command 0x46574c44
1,587,083 UART: [fwproc] Received Image of size 114360 bytes
2,885,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,817 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,169 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,998 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,917 >>> mbox cmd response: failed
1,427,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,923 >>> mbox cmd response: failed
1,427,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,472 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,429,882 >>> mbox cmd response: failed
1,429,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,888 >>> mbox cmd response: failed
1,429,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,631 UART: [kat] SHA2-512-ACC
897,532 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,147 UART: [idev] ++
1,480,315 UART: [idev] CDI.KEYID = 6
1,480,675 UART: [idev] SUBJECT.KEYID = 7
1,481,099 UART: [idev] UDS.KEYID = 0
1,481,444 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,055 UART: [idev] Erasing UDS.KEYID = 0
1,506,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,711 UART: [idev] --
1,515,758 UART: [ldev] ++
1,515,926 UART: [ldev] CDI.KEYID = 6
1,516,289 UART: [ldev] SUBJECT.KEYID = 5
1,516,715 UART: [ldev] AUTHORITY.KEYID = 7
1,517,178 UART: [ldev] FE.KEYID = 1
1,522,536 UART: [ldev] Erasing FE.KEYID = 1
1,548,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,843 UART: [ldev] --
1,587,234 UART: [fwproc] Waiting for Commands...
1,588,023 UART: [fwproc] Received command 0x46574c44
1,588,814 UART: [fwproc] Received Image of size 114360 bytes
2,886,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,602 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,797 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,600 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,244 >>> mbox cmd response: failed
1,427,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,250 >>> mbox cmd response: failed
1,427,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,323 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,833 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,229 >>> mbox cmd response: failed
1,427,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,235 >>> mbox cmd response: failed
1,427,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
918,332 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,172,405 UART: [cold-reset] ++
1,172,851 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,316 UART: [idev] Erasing UDS.KEYID = 0
1,201,859 UART: [idev] Sha1 KeyId Algorithm
1,210,473 UART: [idev] --
1,211,463 UART: [ldev] ++
1,211,631 UART: [ldev] CDI.KEYID = 6
1,211,994 UART: [ldev] SUBJECT.KEYID = 5
1,212,420 UART: [ldev] AUTHORITY.KEYID = 7
1,212,883 UART: [ldev] FE.KEYID = 1
1,218,223 UART: [ldev] Erasing FE.KEYID = 1
1,244,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,463 UART: [ldev] --
1,283,908 UART: [fwproc] Wait for Commands...
1,284,530 UART: [fwproc] Recv command 0x46574c44
1,285,258 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,799 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,355 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,913 >>> mbox cmd response: failed
1,427,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,919 >>> mbox cmd response: failed
1,427,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,886 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,674 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,428,392 >>> mbox cmd response: failed
1,428,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,398 >>> mbox cmd response: failed
1,428,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
893,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,446 UART: [kat] ++
897,598 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,607 UART: [kat] SHA2-512-ACC
908,508 UART: [kat] ECC-384
918,037 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,742 UART: [cold-reset] ++
1,172,114 UART: [fht] FHT @ 0x50003400
1,174,779 UART: [idev] ++
1,174,947 UART: [idev] CDI.KEYID = 6
1,175,307 UART: [idev] SUBJECT.KEYID = 7
1,175,731 UART: [idev] UDS.KEYID = 0
1,176,076 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,209,116 UART: [ldev] ++
1,209,284 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,802 UART: [ldev] Erasing FE.KEYID = 1
1,242,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,054 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,043 UART: [fwproc] Recv command 0x46574c44
1,282,771 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,989 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,172 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,808 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,426,136 >>> mbox cmd response: failed
1,426,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,142 >>> mbox cmd response: failed
1,426,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,112 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,357 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,933 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,425,801 >>> mbox cmd response: failed
1,425,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,807 >>> mbox cmd response: failed
1,425,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,545 UART: [idev] ++
1,172,713 UART: [idev] CDI.KEYID = 6
1,173,074 UART: [idev] SUBJECT.KEYID = 7
1,173,499 UART: [idev] UDS.KEYID = 0
1,173,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,198,263 UART: [idev] Sha1 KeyId Algorithm
1,207,061 UART: [idev] --
1,208,064 UART: [ldev] ++
1,208,232 UART: [ldev] CDI.KEYID = 6
1,208,596 UART: [ldev] SUBJECT.KEYID = 5
1,209,023 UART: [ldev] AUTHORITY.KEYID = 7
1,209,486 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,240,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,104 UART: [ldev] --
1,279,376 UART: [fwproc] Wait for Commands...
1,280,125 UART: [fwproc] Recv command 0x46574c44
1,280,858 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,105 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,573 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,427,749 >>> mbox cmd response: failed
1,427,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,755 >>> mbox cmd response: failed
1,427,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,639 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,860 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,429,688 >>> mbox cmd response: failed
1,429,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,694 >>> mbox cmd response: failed
1,429,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,174,312 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,901 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,639 UART: [fwproc] Wait for Commands...
1,282,404 UART: [fwproc] Recv command 0x46574c44
1,283,137 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,728 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,260 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,429,222 >>> mbox cmd response: failed
1,429,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,228 >>> mbox cmd response: failed
1,429,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,233 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,496 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,116 UART:
192,480 UART: Running Caliptra ROM ...
193,610 UART:
193,774 UART: [state] CFI Enabled
264,751 UART: [state] LifecycleState = Unprovisioned
266,668 UART: [state] DebugLocked = No
269,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,418 UART: [kat] SHA2-256
443,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,647 UART: [kat] ++
454,095 UART: [kat] sha1
465,245 UART: [kat] SHA2-256
467,930 UART: [kat] SHA2-384
472,323 UART: [kat] SHA2-512-ACC
474,707 UART: [kat] ECC-384
2,768,485 UART: [kat] HMAC-384Kdf
2,802,329 UART: [kat] LMS
3,992,634 UART: [kat] --
3,998,534 UART: [cold-reset] ++
4,000,445 UART: [fht] Storing FHT @ 0x50003400
4,011,075 UART: [idev] ++
4,011,647 UART: [idev] CDI.KEYID = 6
4,012,585 UART: [idev] SUBJECT.KEYID = 7
4,013,854 UART: [idev] UDS.KEYID = 0
4,016,574 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,160,192 UART: [idev] Erasing UDS.KEYID = 0
7,347,689 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,602 UART: [idev] --
7,374,683 UART: [ldev] ++
7,375,263 UART: [ldev] CDI.KEYID = 6
7,376,234 UART: [ldev] SUBJECT.KEYID = 5
7,377,455 UART: [ldev] AUTHORITY.KEYID = 7
7,378,691 UART: [ldev] FE.KEYID = 1
7,406,514 UART: [ldev] Erasing FE.KEYID = 1
10,741,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,083,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,066 UART: [ldev] --
13,120,446 UART: [fwproc] Waiting for Commands...
13,122,548 UART: [fwproc] Received command 0x46574c44
13,124,738 UART: [fwproc] Received Image of size 114036 bytes
17,171,916 UART: ROM Fatal Error: 0x000B0016
17,175,371 >>> mbox cmd response: failed
17,175,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,176,140 >>> mbox cmd response: failed
17,176,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,176,699 >>> mbox cmd response: failed
Initializing fuses
2,055,578 writing to cptra_bootfsm_go
2,244,880 UART:
2,245,221 UART: Running Caliptra ROM ...
2,246,361 UART:
2,246,530 UART: [state] CFI Enabled
2,307,330 UART: [state] LifecycleState = Unprovisioned
2,309,270 UART: [state] DebugLocked = No
2,310,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,478 UART: [kat] SHA2-256
2,485,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,695 UART: [kat] ++
2,496,191 UART: [kat] sha1
2,507,466 UART: [kat] SHA2-256
2,510,156 UART: [kat] SHA2-384
2,516,486 UART: [kat] SHA2-512-ACC
2,518,837 UART: [kat] ECC-384
4,808,050 UART: [kat] HMAC-384Kdf
4,840,189 UART: [kat] LMS
6,030,489 UART: [kat] --
6,034,060 UART: [cold-reset] ++
6,036,593 UART: [fht] Storing FHT @ 0x50003400
6,048,941 UART: [idev] ++
6,049,507 UART: [idev] CDI.KEYID = 6
6,050,490 UART: [idev] SUBJECT.KEYID = 7
6,051,708 UART: [idev] UDS.KEYID = 0
6,054,324 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,197,885 UART: [idev] Erasing UDS.KEYID = 0
9,386,827 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,443 UART: [idev] --
9,412,554 UART: [ldev] ++
9,413,145 UART: [ldev] CDI.KEYID = 6
9,414,168 UART: [ldev] SUBJECT.KEYID = 5
9,415,377 UART: [ldev] AUTHORITY.KEYID = 7
9,416,560 UART: [ldev] FE.KEYID = 1
9,444,609 UART: [ldev] Erasing FE.KEYID = 1
12,764,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,060,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,075,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,090,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,104,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,124,638 UART: [ldev] --
15,129,904 UART: [fwproc] Waiting for Commands...
15,132,704 UART: [fwproc] Received command 0x46574c44
15,134,941 UART: [fwproc] Received Image of size 114036 bytes
19,183,331 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,259,417 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,328,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,644,740 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,788,280 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,143,700 >>> mbox cmd response: failed
17,144,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,144,559 >>> mbox cmd response: failed
17,144,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,127 >>> mbox cmd response: failed
Initializing fuses
2,048,648 writing to cptra_bootfsm_go
5,835,766 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,902,517 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,404 UART:
192,775 UART: Running Caliptra ROM ...
193,868 UART:
603,555 UART: [state] CFI Enabled
619,353 UART: [state] LifecycleState = Unprovisioned
621,289 UART: [state] DebugLocked = No
623,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,753 UART: [kat] SHA2-256
798,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,037 UART: [kat] ++
809,520 UART: [kat] sha1
819,695 UART: [kat] SHA2-256
822,419 UART: [kat] SHA2-384
827,062 UART: [kat] SHA2-512-ACC
829,461 UART: [kat] ECC-384
3,113,872 UART: [kat] HMAC-384Kdf
3,124,593 UART: [kat] LMS
4,314,708 UART: [kat] --
4,319,267 UART: [cold-reset] ++
4,321,205 UART: [fht] Storing FHT @ 0x50003400
4,332,475 UART: [idev] ++
4,333,051 UART: [idev] CDI.KEYID = 6
4,333,964 UART: [idev] SUBJECT.KEYID = 7
4,335,258 UART: [idev] UDS.KEYID = 0
4,338,047 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,463 UART: [idev] Erasing UDS.KEYID = 0
7,622,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,358 UART: [idev] --
7,648,355 UART: [ldev] ++
7,648,923 UART: [ldev] CDI.KEYID = 6
7,649,884 UART: [ldev] SUBJECT.KEYID = 5
7,651,098 UART: [ldev] AUTHORITY.KEYID = 7
7,652,339 UART: [ldev] FE.KEYID = 1
7,664,066 UART: [ldev] Erasing FE.KEYID = 1
10,956,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,309 UART: [ldev] --
13,316,424 UART: [fwproc] Waiting for Commands...
13,318,631 UART: [fwproc] Received command 0x46574c44
13,320,817 UART: [fwproc] Received Image of size 114036 bytes
17,374,318 UART: ROM Fatal Error: 0x000B0016
17,377,776 >>> mbox cmd response: failed
17,378,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,378,523 >>> mbox cmd response: failed
17,379,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,379,331 >>> mbox cmd response: failed
Initializing fuses
2,053,786 writing to cptra_bootfsm_go
2,243,094 UART:
2,243,470 UART: Running Caliptra ROM ...
2,244,614 UART:
3,091,105 UART: [state] CFI Enabled
3,106,135 UART: [state] LifecycleState = Unprovisioned
3,108,045 UART: [state] DebugLocked = No
3,110,863 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,116,524 UART: [kat] SHA2-256
3,286,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,296,827 UART: [kat] ++
3,297,375 UART: [kat] sha1
3,308,053 UART: [kat] SHA2-256
3,310,762 UART: [kat] SHA2-384
3,316,374 UART: [kat] SHA2-512-ACC
3,318,781 UART: [kat] ECC-384
5,601,082 UART: [kat] HMAC-384Kdf
5,612,317 UART: [kat] LMS
6,802,437 UART: [kat] --
6,809,396 UART: [cold-reset] ++
6,811,651 UART: [fht] Storing FHT @ 0x50003400
6,822,543 UART: [idev] ++
6,823,137 UART: [idev] CDI.KEYID = 6
6,824,026 UART: [idev] SUBJECT.KEYID = 7
6,825,250 UART: [idev] UDS.KEYID = 0
6,828,236 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,971,987 UART: [idev] Erasing UDS.KEYID = 0
10,114,781 UART: [idev] Using Sha1 for KeyId Algorithm
10,136,749 UART: [idev] --
10,140,578 UART: [ldev] ++
10,141,154 UART: [ldev] CDI.KEYID = 6
10,142,172 UART: [ldev] SUBJECT.KEYID = 5
10,143,373 UART: [ldev] AUTHORITY.KEYID = 7
10,144,607 UART: [ldev] FE.KEYID = 1
10,154,356 UART: [ldev] Erasing FE.KEYID = 1
13,441,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,731,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,746,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,761,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,775,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,794,553 UART: [ldev] --
15,799,378 UART: [fwproc] Waiting for Commands...
15,801,811 UART: [fwproc] Received command 0x46574c44
15,804,000 UART: [fwproc] Received Image of size 114036 bytes
19,863,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,934,747 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,003,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,320,773 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,133,543 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,342,120 >>> mbox cmd response: failed
17,342,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,343,175 >>> mbox cmd response: failed
17,343,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,343,737 >>> mbox cmd response: failed
Initializing fuses
2,049,296 writing to cptra_bootfsm_go
6,651,779 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,584,811 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,375 UART:
192,740 UART: Running Caliptra ROM ...
193,884 UART:
194,029 UART: [state] CFI Enabled
267,322 UART: [state] LifecycleState = Unprovisioned
269,193 UART: [state] DebugLocked = No
271,071 UART: [state] WD Timer not started. Device not locked for debugging
275,011 UART: [kat] SHA2-256
454,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,738 UART: [kat] ++
466,274 UART: [kat] sha1
476,632 UART: [kat] SHA2-256
479,677 UART: [kat] SHA2-384
485,798 UART: [kat] SHA2-512-ACC
488,737 UART: [kat] ECC-384
2,952,062 UART: [kat] HMAC-384Kdf
2,973,806 UART: [kat] LMS
3,503,243 UART: [kat] --
3,509,283 UART: [cold-reset] ++
3,510,740 UART: [fht] FHT @ 0x50003400
3,520,474 UART: [idev] ++
3,521,085 UART: [idev] CDI.KEYID = 6
3,522,013 UART: [idev] SUBJECT.KEYID = 7
3,523,181 UART: [idev] UDS.KEYID = 0
3,526,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,008 UART: [idev] Erasing UDS.KEYID = 0
6,030,825 UART: [idev] Sha1 KeyId Algorithm
6,053,209 UART: [idev] --
6,056,941 UART: [ldev] ++
6,057,531 UART: [ldev] CDI.KEYID = 6
6,058,422 UART: [ldev] SUBJECT.KEYID = 5
6,059,528 UART: [ldev] AUTHORITY.KEYID = 7
6,060,873 UART: [ldev] FE.KEYID = 1
6,104,880 UART: [ldev] Erasing FE.KEYID = 1
8,607,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,599 UART: [ldev] --
10,419,498 UART: [fwproc] Wait for Commands...
10,421,979 UART: [fwproc] Recv command 0x46574c44
10,424,071 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,545 UART: ROM Fatal Error: 0x000B0016
13,821,675 >>> mbox cmd response: failed
13,822,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,368 >>> mbox cmd response: failed
13,822,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,960 >>> mbox cmd response: failed
Initializing fuses
2,055,096 writing to cptra_bootfsm_go
2,244,423 UART:
2,244,771 UART: Running Caliptra ROM ...
2,245,900 UART:
2,246,071 UART: [state] CFI Enabled
2,314,194 UART: [state] LifecycleState = Unprovisioned
2,316,067 UART: [state] DebugLocked = No
2,318,164 UART: [state] WD Timer not started. Device not locked for debugging
2,322,686 UART: [kat] SHA2-256
2,501,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,352 UART: [kat] ++
2,513,810 UART: [kat] sha1
2,525,179 UART: [kat] SHA2-256
2,528,252 UART: [kat] SHA2-384
2,534,346 UART: [kat] SHA2-512-ACC
2,537,354 UART: [kat] ECC-384
5,001,925 UART: [kat] HMAC-384Kdf
5,022,550 UART: [kat] LMS
5,552,007 UART: [kat] --
5,556,445 UART: [cold-reset] ++
5,558,917 UART: [fht] FHT @ 0x50003400
5,568,654 UART: [idev] ++
5,569,220 UART: [idev] CDI.KEYID = 6
5,570,202 UART: [idev] SUBJECT.KEYID = 7
5,571,388 UART: [idev] UDS.KEYID = 0
5,574,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,718,184 UART: [idev] Erasing UDS.KEYID = 0
8,080,161 UART: [idev] Sha1 KeyId Algorithm
8,103,023 UART: [idev] --
8,107,215 UART: [ldev] ++
8,107,795 UART: [ldev] CDI.KEYID = 6
8,108,706 UART: [ldev] SUBJECT.KEYID = 5
8,109,922 UART: [ldev] AUTHORITY.KEYID = 7
8,111,156 UART: [ldev] FE.KEYID = 1
8,151,501 UART: [ldev] Erasing FE.KEYID = 1
10,653,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,439,154 UART: [ldev] --
12,444,424 UART: [fwproc] Wait for Commands...
12,446,036 UART: [fwproc] Recv command 0x46574c44
12,448,137 UART: [fwproc] Recv'd Img size: 114360 bytes
15,853,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,925,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,993,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,312,557 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,050 UART:
192,427 UART: Running Caliptra ROM ...
193,576 UART:
193,721 UART: [state] CFI Enabled
265,103 UART: [state] LifecycleState = Unprovisioned
267,491 UART: [state] DebugLocked = No
269,245 UART: [state] WD Timer not started. Device not locked for debugging
273,460 UART: [kat] SHA2-256
463,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,095 UART: [kat] ++
474,572 UART: [kat] sha1
486,156 UART: [kat] SHA2-256
489,169 UART: [kat] SHA2-384
495,981 UART: [kat] SHA2-512-ACC
498,551 UART: [kat] ECC-384
2,949,884 UART: [kat] HMAC-384Kdf
2,974,131 UART: [kat] LMS
3,505,945 UART: [kat] --
3,508,992 UART: [cold-reset] ++
3,510,174 UART: [fht] FHT @ 0x50003400
3,521,478 UART: [idev] ++
3,522,207 UART: [idev] CDI.KEYID = 6
3,523,175 UART: [idev] SUBJECT.KEYID = 7
3,524,335 UART: [idev] UDS.KEYID = 0
3,527,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,367 UART: [idev] Erasing UDS.KEYID = 0
6,031,691 UART: [idev] Sha1 KeyId Algorithm
6,054,099 UART: [idev] --
6,057,551 UART: [ldev] ++
6,058,314 UART: [ldev] CDI.KEYID = 6
6,059,212 UART: [ldev] SUBJECT.KEYID = 5
6,060,263 UART: [ldev] AUTHORITY.KEYID = 7
6,061,564 UART: [ldev] FE.KEYID = 1
6,104,328 UART: [ldev] Erasing FE.KEYID = 1
8,610,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,719 UART: [ldev] --
10,418,886 UART: [fwproc] Wait for Commands...
10,420,719 UART: [fwproc] Recv command 0x46574c44
10,422,981 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,860 UART: ROM Fatal Error: 0x000B0016
13,872,545 >>> mbox cmd response: failed
13,872,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,873,259 >>> mbox cmd response: failed
13,873,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,873,821 >>> mbox cmd response: failed
Initializing fuses
2,054,332 writing to cptra_bootfsm_go
2,243,700 UART:
2,244,046 UART: Running Caliptra ROM ...
2,245,189 UART:
2,245,379 UART: [state] CFI Enabled
2,307,026 UART: [state] LifecycleState = Unprovisioned
2,309,367 UART: [state] DebugLocked = No
2,310,914 UART: [state] WD Timer not started. Device not locked for debugging
2,315,832 UART: [kat] SHA2-256
2,505,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,494 UART: [kat] ++
2,516,952 UART: [kat] sha1
2,527,842 UART: [kat] SHA2-256
2,530,861 UART: [kat] SHA2-384
2,536,420 UART: [kat] SHA2-512-ACC
2,538,999 UART: [kat] ECC-384
4,993,029 UART: [kat] HMAC-384Kdf
5,016,347 UART: [kat] LMS
5,548,153 UART: [kat] --
5,554,626 UART: [cold-reset] ++
5,555,867 UART: [fht] FHT @ 0x50003400
5,567,606 UART: [idev] ++
5,568,287 UART: [idev] CDI.KEYID = 6
5,569,254 UART: [idev] SUBJECT.KEYID = 7
5,570,434 UART: [idev] UDS.KEYID = 0
5,572,843 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,716,801 UART: [idev] Erasing UDS.KEYID = 0
8,070,596 UART: [idev] Sha1 KeyId Algorithm
8,092,633 UART: [idev] --
8,096,986 UART: [ldev] ++
8,097,730 UART: [ldev] CDI.KEYID = 6
8,098,643 UART: [ldev] SUBJECT.KEYID = 5
8,099,755 UART: [ldev] AUTHORITY.KEYID = 7
8,101,000 UART: [ldev] FE.KEYID = 1
8,145,602 UART: [ldev] Erasing FE.KEYID = 1
10,648,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,397 UART: [ldev] --
12,459,885 UART: [fwproc] Wait for Commands...
12,462,904 UART: [fwproc] Recv command 0x46574c44
12,465,218 UART: [fwproc] Recv'd Img size: 114360 bytes
15,911,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,138 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,101,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,643,358 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,441,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,288,946 >>> mbox cmd response: failed
14,289,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,289,934 >>> mbox cmd response: failed
14,290,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,290,491 >>> mbox cmd response: failed
Initializing fuses
2,058,723 writing to cptra_bootfsm_go
5,489,749 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,799,669 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,516 UART:
192,920 UART: Running Caliptra ROM ...
194,022 UART:
603,882 UART: [state] CFI Enabled
616,860 UART: [state] LifecycleState = Unprovisioned
619,238 UART: [state] DebugLocked = No
620,694 UART: [state] WD Timer not started. Device not locked for debugging
625,695 UART: [kat] SHA2-256
815,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,337 UART: [kat] ++
826,841 UART: [kat] sha1
837,447 UART: [kat] SHA2-256
840,462 UART: [kat] SHA2-384
846,172 UART: [kat] SHA2-512-ACC
848,781 UART: [kat] ECC-384
3,290,756 UART: [kat] HMAC-384Kdf
3,303,857 UART: [kat] LMS
3,835,687 UART: [kat] --
3,841,608 UART: [cold-reset] ++
3,843,433 UART: [fht] FHT @ 0x50003400
3,854,123 UART: [idev] ++
3,854,863 UART: [idev] CDI.KEYID = 6
3,855,747 UART: [idev] SUBJECT.KEYID = 7
3,857,011 UART: [idev] UDS.KEYID = 0
3,859,718 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,396 UART: [idev] Erasing UDS.KEYID = 0
6,334,580 UART: [idev] Sha1 KeyId Algorithm
6,357,974 UART: [idev] --
6,363,534 UART: [ldev] ++
6,364,216 UART: [ldev] CDI.KEYID = 6
6,365,124 UART: [ldev] SUBJECT.KEYID = 5
6,366,339 UART: [ldev] AUTHORITY.KEYID = 7
6,367,568 UART: [ldev] FE.KEYID = 1
6,378,532 UART: [ldev] Erasing FE.KEYID = 1
8,857,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,425 UART: [ldev] --
10,650,322 UART: [fwproc] Wait for Commands...
10,652,159 UART: [fwproc] Recv command 0x46574c44
10,654,414 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,282 UART: ROM Fatal Error: 0x000B0016
14,101,887 >>> mbox cmd response: failed
14,102,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,102,631 >>> mbox cmd response: failed
14,102,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,103,183 >>> mbox cmd response: failed
Initializing fuses
2,052,824 writing to cptra_bootfsm_go
2,242,215 UART:
2,242,572 UART: Running Caliptra ROM ...
2,243,709 UART:
6,367,187 UART: [state] CFI Enabled
6,378,723 UART: [state] LifecycleState = Unprovisioned
6,381,065 UART: [state] DebugLocked = No
6,383,924 UART: [state] WD Timer not started. Device not locked for debugging
6,387,693 UART: [kat] SHA2-256
6,577,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,588,370 UART: [kat] ++
6,588,828 UART: [kat] sha1
6,599,795 UART: [kat] SHA2-256
6,602,817 UART: [kat] SHA2-384
6,607,779 UART: [kat] SHA2-512-ACC
6,610,346 UART: [kat] ECC-384
9,049,888 UART: [kat] HMAC-384Kdf
9,063,416 UART: [kat] LMS
9,595,279 UART: [kat] --
9,597,562 UART: [cold-reset] ++
9,599,440 UART: [fht] FHT @ 0x50003400
9,610,313 UART: [idev] ++
9,611,041 UART: [idev] CDI.KEYID = 6
9,611,983 UART: [idev] SUBJECT.KEYID = 7
9,613,191 UART: [idev] UDS.KEYID = 0
9,615,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,759,643 UART: [idev] Erasing UDS.KEYID = 0
12,091,342 UART: [idev] Sha1 KeyId Algorithm
12,113,894 UART: [idev] --
12,118,753 UART: [ldev] ++
12,119,428 UART: [ldev] CDI.KEYID = 6
12,120,348 UART: [ldev] SUBJECT.KEYID = 5
12,121,509 UART: [ldev] AUTHORITY.KEYID = 7
12,122,740 UART: [ldev] FE.KEYID = 1
12,133,062 UART: [ldev] Erasing FE.KEYID = 1
14,615,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,336,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,351,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,366,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,381,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,403,334 UART: [ldev] --
16,408,496 UART: [fwproc] Wait for Commands...
16,410,763 UART: [fwproc] Recv command 0x46574c44
16,413,079 UART: [fwproc] Recv'd Img size: 114360 bytes
19,853,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,934,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,050,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,593,239 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,752,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,490,590 >>> mbox cmd response: failed
14,491,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,491,525 >>> mbox cmd response: failed
14,491,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,082 >>> mbox cmd response: failed
Initializing fuses
2,048,538 writing to cptra_bootfsm_go
9,130,391 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,324,094 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,718 UART: [kat] HMAC-384Kdf
907,134 UART: [kat] LMS
1,475,330 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,445 UART: [fht] Storing FHT @ 0x50003400
1,479,348 UART: [idev] ++
1,479,516 UART: [idev] CDI.KEYID = 6
1,479,876 UART: [idev] SUBJECT.KEYID = 7
1,480,300 UART: [idev] UDS.KEYID = 0
1,480,645 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,502 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,000 UART: [idev] --
1,514,991 UART: [ldev] ++
1,515,159 UART: [ldev] CDI.KEYID = 6
1,515,522 UART: [ldev] SUBJECT.KEYID = 5
1,515,948 UART: [ldev] AUTHORITY.KEYID = 7
1,516,411 UART: [ldev] FE.KEYID = 1
1,521,369 UART: [ldev] Erasing FE.KEYID = 1
1,547,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,190 UART: [ldev] --
1,586,623 UART: [fwproc] Waiting for Commands...
1,587,412 UART: [fwproc] Received command 0x46574c44
1,588,203 UART: [fwproc] Received Image of size 114360 bytes
2,884,848 UART: ROM Fatal Error: 0x000B0016
2,886,005 >>> mbox cmd response: failed
2,886,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,011 >>> mbox cmd response: failed
2,886,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,625 UART: [kat] SHA2-256
892,563 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,838 UART: [kat] HMAC-384Kdf
907,196 UART: [kat] LMS
1,475,392 UART: [kat] --
1,476,399 UART: [cold-reset] ++
1,476,737 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,505,402 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,958 UART: [idev] --
1,515,059 UART: [ldev] ++
1,515,227 UART: [ldev] CDI.KEYID = 6
1,515,590 UART: [ldev] SUBJECT.KEYID = 5
1,516,016 UART: [ldev] AUTHORITY.KEYID = 7
1,516,479 UART: [ldev] FE.KEYID = 1
1,521,595 UART: [ldev] Erasing FE.KEYID = 1
1,546,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,914 UART: [ldev] --
1,586,185 UART: [fwproc] Waiting for Commands...
1,587,050 UART: [fwproc] Received command 0x46574c44
1,587,841 UART: [fwproc] Received Image of size 114360 bytes
2,885,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,252 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,737,732 >>> mbox cmd response: failed
2,737,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,738 >>> mbox cmd response: failed
2,737,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,629 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,392 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
895,015 UART: [kat] SHA2-512-ACC
896,916 UART: [kat] ECC-384
902,633 UART: [kat] HMAC-384Kdf
907,249 UART: [kat] LMS
1,475,445 UART: [kat] --
1,476,496 UART: [cold-reset] ++
1,477,004 UART: [fht] Storing FHT @ 0x50003400
1,479,863 UART: [idev] ++
1,480,031 UART: [idev] CDI.KEYID = 6
1,480,391 UART: [idev] SUBJECT.KEYID = 7
1,480,815 UART: [idev] UDS.KEYID = 0
1,481,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,506,201 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,817 UART: [idev] --
1,515,804 UART: [ldev] ++
1,515,972 UART: [ldev] CDI.KEYID = 6
1,516,335 UART: [ldev] SUBJECT.KEYID = 5
1,516,761 UART: [ldev] AUTHORITY.KEYID = 7
1,517,224 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,829 UART: [ldev] --
1,587,256 UART: [fwproc] Waiting for Commands...
1,588,077 UART: [fwproc] Received command 0x46574c44
1,588,868 UART: [fwproc] Received Image of size 114360 bytes
2,885,047 UART: ROM Fatal Error: 0x000B0016
2,886,204 >>> mbox cmd response: failed
2,886,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,210 >>> mbox cmd response: failed
2,886,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,430 UART: [kat] SHA2-256
882,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,476 UART: [kat] ++
886,628 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,591 UART: [kat] SHA2-512-ACC
897,492 UART: [kat] ECC-384
903,543 UART: [kat] HMAC-384Kdf
907,985 UART: [kat] LMS
1,476,181 UART: [kat] --
1,477,136 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,467 UART: [idev] ++
1,480,635 UART: [idev] CDI.KEYID = 6
1,480,995 UART: [idev] SUBJECT.KEYID = 7
1,481,419 UART: [idev] UDS.KEYID = 0
1,481,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,317 UART: [idev] Erasing UDS.KEYID = 0
1,505,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,095 UART: [idev] --
1,515,030 UART: [ldev] ++
1,515,198 UART: [ldev] CDI.KEYID = 6
1,515,561 UART: [ldev] SUBJECT.KEYID = 5
1,515,987 UART: [ldev] AUTHORITY.KEYID = 7
1,516,450 UART: [ldev] FE.KEYID = 1
1,521,538 UART: [ldev] Erasing FE.KEYID = 1
1,546,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,077 UART: [ldev] --
1,586,442 UART: [fwproc] Waiting for Commands...
1,587,273 UART: [fwproc] Received command 0x46574c44
1,588,064 UART: [fwproc] Received Image of size 114360 bytes
2,884,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,102 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,325 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,597 >>> mbox cmd response: failed
2,738,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,603 >>> mbox cmd response: failed
2,738,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,465 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
892,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,063 UART: [kat] ++
897,215 UART: [kat] sha1
901,371 UART: [kat] SHA2-256
903,311 UART: [kat] SHA2-384
905,920 UART: [kat] SHA2-512-ACC
907,821 UART: [kat] ECC-384
918,004 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,615 UART: [cold-reset] ++
1,171,941 UART: [fht] FHT @ 0x50003400
1,174,698 UART: [idev] ++
1,174,866 UART: [idev] CDI.KEYID = 6
1,175,226 UART: [idev] SUBJECT.KEYID = 7
1,175,650 UART: [idev] UDS.KEYID = 0
1,175,995 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,764 UART: [idev] Erasing UDS.KEYID = 0
1,200,267 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,747 UART: [ldev] ++
1,209,915 UART: [ldev] CDI.KEYID = 6
1,210,278 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,105 UART: [ldev] --
1,282,454 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,970 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,397 UART: ROM Fatal Error: 0x000B0016
2,581,554 >>> mbox cmd response: failed
2,581,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,560 >>> mbox cmd response: failed
2,581,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
893,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,585 UART: [kat] ++
897,737 UART: [kat] sha1
901,901 UART: [kat] SHA2-256
903,841 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,650 UART: [kat] LMS
1,170,978 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,256 UART: [idev] Erasing UDS.KEYID = 0
1,200,129 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,864 UART: [fwproc] Recv command 0x46574c44
1,283,592 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,003 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,393 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,435,677 >>> mbox cmd response: failed
2,435,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,683 >>> mbox cmd response: failed
2,435,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,159 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,906 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,246 UART: [kat] SHA2-256
904,186 UART: [kat] SHA2-384
906,919 UART: [kat] SHA2-512-ACC
908,820 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,639 UART: [kat] LMS
1,171,967 UART: [kat] --
1,172,856 UART: [cold-reset] ++
1,173,420 UART: [fht] FHT @ 0x50003400
1,175,911 UART: [idev] ++
1,176,079 UART: [idev] CDI.KEYID = 6
1,176,439 UART: [idev] SUBJECT.KEYID = 7
1,176,863 UART: [idev] UDS.KEYID = 0
1,177,208 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,309 UART: [idev] Erasing UDS.KEYID = 0
1,202,178 UART: [idev] Sha1 KeyId Algorithm
1,210,592 UART: [idev] --
1,211,738 UART: [ldev] ++
1,211,906 UART: [ldev] CDI.KEYID = 6
1,212,269 UART: [ldev] SUBJECT.KEYID = 5
1,212,695 UART: [ldev] AUTHORITY.KEYID = 7
1,213,158 UART: [ldev] FE.KEYID = 1
1,218,400 UART: [ldev] Erasing FE.KEYID = 1
1,245,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,582 UART: [ldev] --
1,285,023 UART: [fwproc] Wait for Commands...
1,285,661 UART: [fwproc] Recv command 0x46574c44
1,286,389 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,291 UART: ROM Fatal Error: 0x000B0016
2,583,448 >>> mbox cmd response: failed
2,583,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,454 >>> mbox cmd response: failed
2,583,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
893,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,408 UART: [kat] ++
897,560 UART: [kat] sha1
901,794 UART: [kat] SHA2-256
903,734 UART: [kat] SHA2-384
906,463 UART: [kat] SHA2-512-ACC
908,364 UART: [kat] ECC-384
918,427 UART: [kat] HMAC-384Kdf
922,991 UART: [kat] LMS
1,171,319 UART: [kat] --
1,172,198 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,257 UART: [idev] ++
1,175,425 UART: [idev] CDI.KEYID = 6
1,175,785 UART: [idev] SUBJECT.KEYID = 7
1,176,209 UART: [idev] UDS.KEYID = 0
1,176,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,313 UART: [idev] Erasing UDS.KEYID = 0
1,201,428 UART: [idev] Sha1 KeyId Algorithm
1,209,978 UART: [idev] --
1,211,044 UART: [ldev] ++
1,211,212 UART: [ldev] CDI.KEYID = 6
1,211,575 UART: [ldev] SUBJECT.KEYID = 5
1,212,001 UART: [ldev] AUTHORITY.KEYID = 7
1,212,464 UART: [ldev] FE.KEYID = 1
1,217,492 UART: [ldev] Erasing FE.KEYID = 1
1,244,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,010 UART: [ldev] --
1,283,363 UART: [fwproc] Wait for Commands...
1,283,953 UART: [fwproc] Recv command 0x46574c44
1,284,681 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,678 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,437,426 >>> mbox cmd response: failed
2,437,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,432 >>> mbox cmd response: failed
2,437,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,415 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,199,027 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,310 UART: [ldev] ++
1,209,478 UART: [ldev] CDI.KEYID = 6
1,209,842 UART: [ldev] SUBJECT.KEYID = 5
1,210,269 UART: [ldev] AUTHORITY.KEYID = 7
1,210,732 UART: [ldev] FE.KEYID = 1
1,216,050 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,020 UART: [ldev] --
1,281,334 UART: [fwproc] Wait for Commands...
1,281,927 UART: [fwproc] Recv command 0x46574c44
1,282,660 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,367 UART: ROM Fatal Error: 0x000B0016
2,580,524 >>> mbox cmd response: failed
2,580,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,530 >>> mbox cmd response: failed
2,580,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,664 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,170,939 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,849 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,920 UART: [ldev] ++
1,209,088 UART: [ldev] CDI.KEYID = 6
1,209,452 UART: [ldev] SUBJECT.KEYID = 5
1,209,879 UART: [ldev] AUTHORITY.KEYID = 7
1,210,342 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,242,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,121 UART: [fwproc] Recv command 0x46574c44
1,282,854 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,335 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,370 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,431,549 >>> mbox cmd response: failed
2,431,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,555 >>> mbox cmd response: failed
2,431,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,840 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,707 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,959 UART: [ldev] ++
1,209,127 UART: [ldev] CDI.KEYID = 6
1,209,491 UART: [ldev] SUBJECT.KEYID = 5
1,209,918 UART: [ldev] AUTHORITY.KEYID = 7
1,210,381 UART: [ldev] FE.KEYID = 1
1,215,595 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,257 UART: [ldev] --
1,280,663 UART: [fwproc] Wait for Commands...
1,281,288 UART: [fwproc] Recv command 0x46574c44
1,282,021 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,904 UART: ROM Fatal Error: 0x000B0016
2,579,061 >>> mbox cmd response: failed
2,579,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,067 >>> mbox cmd response: failed
2,579,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,589 UART: [ldev] --
1,281,855 UART: [fwproc] Wait for Commands...
1,282,536 UART: [fwproc] Recv command 0x46574c44
1,283,269 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,560 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,969 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,435,466 >>> mbox cmd response: failed
2,435,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,472 >>> mbox cmd response: failed
2,435,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,689 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,812 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,122 UART:
192,500 UART: Running Caliptra ROM ...
193,684 UART:
193,835 UART: [state] CFI Enabled
265,447 UART: [state] LifecycleState = Unprovisioned
267,420 UART: [state] DebugLocked = No
270,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,024 UART: [kat] SHA2-256
444,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,169 UART: [kat] ++
455,674 UART: [kat] sha1
466,005 UART: [kat] SHA2-256
468,702 UART: [kat] SHA2-384
475,761 UART: [kat] SHA2-512-ACC
478,098 UART: [kat] ECC-384
2,767,911 UART: [kat] HMAC-384Kdf
2,778,401 UART: [kat] LMS
3,968,724 UART: [kat] --
3,974,172 UART: [cold-reset] ++
3,975,569 UART: [fht] Storing FHT @ 0x50003400
3,986,254 UART: [idev] ++
3,986,875 UART: [idev] CDI.KEYID = 6
3,987,762 UART: [idev] SUBJECT.KEYID = 7
3,989,029 UART: [idev] UDS.KEYID = 0
3,991,810 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,540 UART: [idev] Erasing UDS.KEYID = 0
7,323,165 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,029 UART: [idev] --
7,348,331 UART: [ldev] ++
7,348,956 UART: [ldev] CDI.KEYID = 6
7,349,972 UART: [ldev] SUBJECT.KEYID = 5
7,351,131 UART: [ldev] AUTHORITY.KEYID = 7
7,352,362 UART: [ldev] FE.KEYID = 1
7,380,279 UART: [ldev] Erasing FE.KEYID = 1
10,715,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,686 UART: [ldev] --
13,095,280 UART: [fwproc] Waiting for Commands...
13,097,814 UART: [fwproc] Received command 0x46574c44
13,100,007 UART: [fwproc] Received Image of size 114036 bytes
17,141,192 UART: ROM Fatal Error: 0x000B002A
17,144,598 >>> mbox cmd response: failed
17,144,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,242 >>> mbox cmd response: failed
17,145,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,862 >>> mbox cmd response: failed
Initializing fuses
2,061,524 writing to cptra_bootfsm_go
2,250,821 UART:
2,251,167 UART: Running Caliptra ROM ...
2,252,255 UART:
2,252,414 UART: [state] CFI Enabled
2,315,245 UART: [state] LifecycleState = Unprovisioned
2,317,235 UART: [state] DebugLocked = No
2,319,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,154 UART: [kat] SHA2-256
2,494,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,367 UART: [kat] ++
2,505,826 UART: [kat] sha1
2,516,443 UART: [kat] SHA2-256
2,519,103 UART: [kat] SHA2-384
2,525,092 UART: [kat] SHA2-512-ACC
2,527,501 UART: [kat] ECC-384
4,819,346 UART: [kat] HMAC-384Kdf
4,832,510 UART: [kat] LMS
6,022,806 UART: [kat] --
6,028,636 UART: [cold-reset] ++
6,030,464 UART: [fht] Storing FHT @ 0x50003400
6,042,444 UART: [idev] ++
6,043,014 UART: [idev] CDI.KEYID = 6
6,043,986 UART: [idev] SUBJECT.KEYID = 7
6,045,202 UART: [idev] UDS.KEYID = 0
6,047,650 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,191,167 UART: [idev] Erasing UDS.KEYID = 0
9,378,833 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,239 UART: [idev] --
9,405,471 UART: [ldev] ++
9,406,045 UART: [ldev] CDI.KEYID = 6
9,407,011 UART: [ldev] SUBJECT.KEYID = 5
9,408,226 UART: [ldev] AUTHORITY.KEYID = 7
9,409,473 UART: [ldev] FE.KEYID = 1
9,454,095 UART: [ldev] Erasing FE.KEYID = 1
12,788,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,081,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,125,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,144,998 UART: [ldev] --
15,150,531 UART: [fwproc] Waiting for Commands...
15,152,517 UART: [fwproc] Received command 0x46574c44
15,154,714 UART: [fwproc] Received Image of size 114036 bytes
19,206,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,283,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,352,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,669,818 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,787,058 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,128,370 >>> mbox cmd response: failed
17,128,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,129,273 >>> mbox cmd response: failed
17,129,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,129,861 >>> mbox cmd response: failed
Initializing fuses
2,056,728 writing to cptra_bootfsm_go
5,826,442 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,910,015 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,492 UART:
192,861 UART: Running Caliptra ROM ...
194,005 UART:
603,819 UART: [state] CFI Enabled
615,972 UART: [state] LifecycleState = Unprovisioned
617,904 UART: [state] DebugLocked = No
619,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,871 UART: [kat] SHA2-256
794,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,120 UART: [kat] ++
805,657 UART: [kat] sha1
817,516 UART: [kat] SHA2-256
820,259 UART: [kat] SHA2-384
826,722 UART: [kat] SHA2-512-ACC
829,125 UART: [kat] ECC-384
3,111,817 UART: [kat] HMAC-384Kdf
3,123,246 UART: [kat] LMS
4,313,335 UART: [kat] --
4,316,300 UART: [cold-reset] ++
4,317,535 UART: [fht] Storing FHT @ 0x50003400
4,329,514 UART: [idev] ++
4,330,139 UART: [idev] CDI.KEYID = 6
4,331,023 UART: [idev] SUBJECT.KEYID = 7
4,332,295 UART: [idev] UDS.KEYID = 0
4,334,864 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,386 UART: [idev] Erasing UDS.KEYID = 0
7,622,356 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,385 UART: [idev] --
7,647,825 UART: [ldev] ++
7,648,411 UART: [ldev] CDI.KEYID = 6
7,649,320 UART: [ldev] SUBJECT.KEYID = 5
7,650,560 UART: [ldev] AUTHORITY.KEYID = 7
7,651,797 UART: [ldev] FE.KEYID = 1
7,661,853 UART: [ldev] Erasing FE.KEYID = 1
10,948,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,246 UART: [ldev] --
13,308,461 UART: [fwproc] Waiting for Commands...
13,311,200 UART: [fwproc] Received command 0x46574c44
13,313,401 UART: [fwproc] Received Image of size 114036 bytes
17,362,332 UART: ROM Fatal Error: 0x000B002A
17,365,734 >>> mbox cmd response: failed
17,366,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,366,406 >>> mbox cmd response: failed
17,366,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,028 >>> mbox cmd response: failed
Initializing fuses
2,061,148 writing to cptra_bootfsm_go
2,250,443 UART:
2,250,793 UART: Running Caliptra ROM ...
2,251,843 UART:
3,088,072 UART: [state] CFI Enabled
3,102,036 UART: [state] LifecycleState = Unprovisioned
3,103,950 UART: [state] DebugLocked = No
3,105,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,110,756 UART: [kat] SHA2-256
3,280,506 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,291,038 UART: [kat] ++
3,291,525 UART: [kat] sha1
3,302,682 UART: [kat] SHA2-256
3,305,377 UART: [kat] SHA2-384
3,310,622 UART: [kat] SHA2-512-ACC
3,312,978 UART: [kat] ECC-384
5,597,103 UART: [kat] HMAC-384Kdf
5,608,904 UART: [kat] LMS
6,798,988 UART: [kat] --
6,804,948 UART: [cold-reset] ++
6,807,052 UART: [fht] Storing FHT @ 0x50003400
6,818,921 UART: [idev] ++
6,819,489 UART: [idev] CDI.KEYID = 6
6,820,471 UART: [idev] SUBJECT.KEYID = 7
6,821,720 UART: [idev] UDS.KEYID = 0
6,824,111 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,967,294 UART: [idev] Erasing UDS.KEYID = 0
10,106,320 UART: [idev] Using Sha1 for KeyId Algorithm
10,127,014 UART: [idev] --
10,129,718 UART: [ldev] ++
10,130,286 UART: [ldev] CDI.KEYID = 6
10,131,259 UART: [ldev] SUBJECT.KEYID = 5
10,132,449 UART: [ldev] AUTHORITY.KEYID = 7
10,133,739 UART: [ldev] FE.KEYID = 1
10,144,760 UART: [ldev] Erasing FE.KEYID = 1
13,434,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,727,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,742,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,757,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,771,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,789,245 UART: [ldev] --
15,793,226 UART: [fwproc] Waiting for Commands...
15,795,437 UART: [fwproc] Received command 0x46574c44
15,797,645 UART: [fwproc] Received Image of size 114036 bytes
19,851,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,925,074 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,994,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,310,850 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,123,125 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,333,195 >>> mbox cmd response: failed
17,333,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,281 >>> mbox cmd response: failed
17,334,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,857 >>> mbox cmd response: failed
Initializing fuses
2,057,516 writing to cptra_bootfsm_go
6,664,886 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,607,325 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,102 UART:
192,459 UART: Running Caliptra ROM ...
193,581 UART:
193,725 UART: [state] CFI Enabled
261,453 UART: [state] LifecycleState = Unprovisioned
263,319 UART: [state] DebugLocked = No
266,182 UART: [state] WD Timer not started. Device not locked for debugging
269,896 UART: [kat] SHA2-256
449,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,596 UART: [kat] ++
461,042 UART: [kat] sha1
472,302 UART: [kat] SHA2-256
475,318 UART: [kat] SHA2-384
482,753 UART: [kat] SHA2-512-ACC
485,734 UART: [kat] ECC-384
2,946,321 UART: [kat] HMAC-384Kdf
2,970,777 UART: [kat] LMS
3,500,252 UART: [kat] --
3,504,465 UART: [cold-reset] ++
3,506,399 UART: [fht] FHT @ 0x50003400
3,517,719 UART: [idev] ++
3,518,289 UART: [idev] CDI.KEYID = 6
3,519,198 UART: [idev] SUBJECT.KEYID = 7
3,520,411 UART: [idev] UDS.KEYID = 0
3,523,168 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,232 UART: [idev] Erasing UDS.KEYID = 0
6,027,467 UART: [idev] Sha1 KeyId Algorithm
6,050,548 UART: [idev] --
6,053,953 UART: [ldev] ++
6,054,543 UART: [ldev] CDI.KEYID = 6
6,055,433 UART: [ldev] SUBJECT.KEYID = 5
6,056,514 UART: [ldev] AUTHORITY.KEYID = 7
6,057,777 UART: [ldev] FE.KEYID = 1
6,099,992 UART: [ldev] Erasing FE.KEYID = 1
8,602,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,461 UART: [ldev] --
10,414,958 UART: [fwproc] Wait for Commands...
10,417,056 UART: [fwproc] Recv command 0x46574c44
10,419,104 UART: [fwproc] Recv'd Img size: 114360 bytes
13,818,938 UART: ROM Fatal Error: 0x000B002A
13,822,069 >>> mbox cmd response: failed
13,822,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,726 >>> mbox cmd response: failed
13,822,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,823,319 >>> mbox cmd response: failed
Initializing fuses
2,054,642 writing to cptra_bootfsm_go
2,243,992 UART:
2,244,340 UART: Running Caliptra ROM ...
2,245,476 UART:
2,245,670 UART: [state] CFI Enabled
2,313,638 UART: [state] LifecycleState = Unprovisioned
2,315,471 UART: [state] DebugLocked = No
2,318,213 UART: [state] WD Timer not started. Device not locked for debugging
2,321,853 UART: [kat] SHA2-256
2,500,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,600 UART: [kat] ++
2,513,060 UART: [kat] sha1
2,523,841 UART: [kat] SHA2-256
2,526,868 UART: [kat] SHA2-384
2,532,755 UART: [kat] SHA2-512-ACC
2,535,741 UART: [kat] ECC-384
4,996,356 UART: [kat] HMAC-384Kdf
5,018,048 UART: [kat] LMS
5,547,501 UART: [kat] --
5,551,984 UART: [cold-reset] ++
5,554,315 UART: [fht] FHT @ 0x50003400
5,565,843 UART: [idev] ++
5,566,411 UART: [idev] CDI.KEYID = 6
5,567,292 UART: [idev] SUBJECT.KEYID = 7
5,568,561 UART: [idev] UDS.KEYID = 0
5,570,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,714,766 UART: [idev] Erasing UDS.KEYID = 0
8,077,179 UART: [idev] Sha1 KeyId Algorithm
8,100,036 UART: [idev] --
8,103,657 UART: [ldev] ++
8,104,226 UART: [ldev] CDI.KEYID = 6
8,105,137 UART: [ldev] SUBJECT.KEYID = 5
8,106,353 UART: [ldev] AUTHORITY.KEYID = 7
8,107,586 UART: [ldev] FE.KEYID = 1
8,148,539 UART: [ldev] Erasing FE.KEYID = 1
10,655,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,306 UART: [ldev] --
12,461,072 UART: [fwproc] Wait for Commands...
12,463,782 UART: [fwproc] Recv command 0x46574c44
12,465,882 UART: [fwproc] Recv'd Img size: 114360 bytes
15,868,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,939,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,008,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,325,953 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,112 UART:
192,490 UART: Running Caliptra ROM ...
193,651 UART:
193,817 UART: [state] CFI Enabled
263,145 UART: [state] LifecycleState = Unprovisioned
265,553 UART: [state] DebugLocked = No
268,235 UART: [state] WD Timer not started. Device not locked for debugging
272,728 UART: [kat] SHA2-256
462,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,370 UART: [kat] ++
473,849 UART: [kat] sha1
485,649 UART: [kat] SHA2-256
488,719 UART: [kat] SHA2-384
494,377 UART: [kat] SHA2-512-ACC
496,988 UART: [kat] ECC-384
2,945,752 UART: [kat] HMAC-384Kdf
2,968,881 UART: [kat] LMS
3,500,651 UART: [kat] --
3,505,807 UART: [cold-reset] ++
3,506,846 UART: [fht] FHT @ 0x50003400
3,519,291 UART: [idev] ++
3,519,974 UART: [idev] CDI.KEYID = 6
3,520,940 UART: [idev] SUBJECT.KEYID = 7
3,522,159 UART: [idev] UDS.KEYID = 0
3,524,792 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,818 UART: [idev] Erasing UDS.KEYID = 0
6,026,484 UART: [idev] Sha1 KeyId Algorithm
6,048,918 UART: [idev] --
6,053,487 UART: [ldev] ++
6,054,177 UART: [ldev] CDI.KEYID = 6
6,055,089 UART: [ldev] SUBJECT.KEYID = 5
6,056,252 UART: [ldev] AUTHORITY.KEYID = 7
6,057,489 UART: [ldev] FE.KEYID = 1
6,098,380 UART: [ldev] Erasing FE.KEYID = 1
8,603,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,636 UART: [ldev] --
10,413,797 UART: [fwproc] Wait for Commands...
10,416,324 UART: [fwproc] Recv command 0x46574c44
10,418,639 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,346 UART: ROM Fatal Error: 0x000B002A
13,869,013 >>> mbox cmd response: failed
13,869,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,869,767 >>> mbox cmd response: failed
13,870,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,870,326 >>> mbox cmd response: failed
Initializing fuses
2,061,613 writing to cptra_bootfsm_go
2,250,906 UART:
2,251,257 UART: Running Caliptra ROM ...
2,252,396 UART:
2,252,567 UART: [state] CFI Enabled
2,324,953 UART: [state] LifecycleState = Unprovisioned
2,327,344 UART: [state] DebugLocked = No
2,329,357 UART: [state] WD Timer not started. Device not locked for debugging
2,333,892 UART: [kat] SHA2-256
2,523,784 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,517 UART: [kat] ++
2,535,004 UART: [kat] sha1
2,546,332 UART: [kat] SHA2-256
2,549,373 UART: [kat] SHA2-384
2,554,396 UART: [kat] SHA2-512-ACC
2,556,984 UART: [kat] ECC-384
5,008,610 UART: [kat] HMAC-384Kdf
5,032,245 UART: [kat] LMS
5,564,033 UART: [kat] --
5,570,782 UART: [cold-reset] ++
5,571,904 UART: [fht] FHT @ 0x50003400
5,582,000 UART: [idev] ++
5,582,677 UART: [idev] CDI.KEYID = 6
5,583,641 UART: [idev] SUBJECT.KEYID = 7
5,584,859 UART: [idev] UDS.KEYID = 0
5,587,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,731,075 UART: [idev] Erasing UDS.KEYID = 0
8,090,728 UART: [idev] Sha1 KeyId Algorithm
8,112,893 UART: [idev] --
8,117,538 UART: [ldev] ++
8,118,223 UART: [ldev] CDI.KEYID = 6
8,119,180 UART: [ldev] SUBJECT.KEYID = 5
8,120,341 UART: [ldev] AUTHORITY.KEYID = 7
8,121,574 UART: [ldev] FE.KEYID = 1
8,160,859 UART: [ldev] Erasing FE.KEYID = 1
10,668,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,918 UART: [ldev] --
12,475,395 UART: [fwproc] Wait for Commands...
12,477,973 UART: [fwproc] Recv command 0x46574c44
12,480,286 UART: [fwproc] Recv'd Img size: 114360 bytes
15,919,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,113,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,656,046 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,419,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,271,195 >>> mbox cmd response: failed
14,271,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,272,168 >>> mbox cmd response: failed
14,272,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,272,740 >>> mbox cmd response: failed
Initializing fuses
2,060,059 writing to cptra_bootfsm_go
5,497,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,793,874 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,563 UART:
192,911 UART: Running Caliptra ROM ...
194,139 UART:
603,872 UART: [state] CFI Enabled
616,819 UART: [state] LifecycleState = Unprovisioned
619,170 UART: [state] DebugLocked = No
621,683 UART: [state] WD Timer not started. Device not locked for debugging
625,554 UART: [kat] SHA2-256
815,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,214 UART: [kat] ++
826,720 UART: [kat] sha1
838,032 UART: [kat] SHA2-256
841,047 UART: [kat] SHA2-384
845,730 UART: [kat] SHA2-512-ACC
848,335 UART: [kat] ECC-384
3,291,326 UART: [kat] HMAC-384Kdf
3,303,781 UART: [kat] LMS
3,835,614 UART: [kat] --
3,838,558 UART: [cold-reset] ++
3,839,852 UART: [fht] FHT @ 0x50003400
3,850,347 UART: [idev] ++
3,851,078 UART: [idev] CDI.KEYID = 6
3,851,990 UART: [idev] SUBJECT.KEYID = 7
3,853,209 UART: [idev] UDS.KEYID = 0
3,855,935 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,999,751 UART: [idev] Erasing UDS.KEYID = 0
6,332,101 UART: [idev] Sha1 KeyId Algorithm
6,354,426 UART: [idev] --
6,359,984 UART: [ldev] ++
6,360,718 UART: [ldev] CDI.KEYID = 6
6,361,625 UART: [ldev] SUBJECT.KEYID = 5
6,362,786 UART: [ldev] AUTHORITY.KEYID = 7
6,364,019 UART: [ldev] FE.KEYID = 1
6,375,001 UART: [ldev] Erasing FE.KEYID = 1
8,853,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,731 UART: [ldev] --
10,641,736 UART: [fwproc] Wait for Commands...
10,643,620 UART: [fwproc] Recv command 0x46574c44
10,645,878 UART: [fwproc] Recv'd Img size: 114360 bytes
14,087,327 UART: ROM Fatal Error: 0x000B002A
14,091,010 >>> mbox cmd response: failed
14,091,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,091,751 >>> mbox cmd response: failed
14,092,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,092,324 >>> mbox cmd response: failed
Initializing fuses
2,054,525 writing to cptra_bootfsm_go
2,243,817 UART:
2,244,152 UART: Running Caliptra ROM ...
2,245,293 UART:
6,360,840 UART: [state] CFI Enabled
6,373,053 UART: [state] LifecycleState = Unprovisioned
6,375,406 UART: [state] DebugLocked = No
6,378,253 UART: [state] WD Timer not started. Device not locked for debugging
6,383,345 UART: [kat] SHA2-256
6,573,209 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,583,984 UART: [kat] ++
6,584,528 UART: [kat] sha1
6,596,932 UART: [kat] SHA2-256
6,599,992 UART: [kat] SHA2-384
6,607,096 UART: [kat] SHA2-512-ACC
6,609,683 UART: [kat] ECC-384
9,056,516 UART: [kat] HMAC-384Kdf
9,069,832 UART: [kat] LMS
9,601,676 UART: [kat] --
9,606,214 UART: [cold-reset] ++
9,607,450 UART: [fht] FHT @ 0x50003400
9,618,754 UART: [idev] ++
9,619,430 UART: [idev] CDI.KEYID = 6
9,620,368 UART: [idev] SUBJECT.KEYID = 7
9,621,583 UART: [idev] UDS.KEYID = 0
9,623,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,767,621 UART: [idev] Erasing UDS.KEYID = 0
12,097,176 UART: [idev] Sha1 KeyId Algorithm
12,120,352 UART: [idev] --
12,124,423 UART: [ldev] ++
12,125,125 UART: [ldev] CDI.KEYID = 6
12,126,008 UART: [ldev] SUBJECT.KEYID = 5
12,127,226 UART: [ldev] AUTHORITY.KEYID = 7
12,128,400 UART: [ldev] FE.KEYID = 1
12,140,188 UART: [ldev] Erasing FE.KEYID = 1
14,618,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,337,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,352,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,368,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,383,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,403,194 UART: [ldev] --
16,408,682 UART: [fwproc] Wait for Commands...
16,411,431 UART: [fwproc] Recv command 0x46574c44
16,413,742 UART: [fwproc] Recv'd Img size: 114360 bytes
19,858,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,936,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,052,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,595,296 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,758,832 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,497,100 >>> mbox cmd response: failed
14,497,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,036 >>> mbox cmd response: failed
14,498,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,610 >>> mbox cmd response: failed
Initializing fuses
2,055,351 writing to cptra_bootfsm_go
9,117,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,307,228 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,133 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,430 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,683 UART: [fht] Storing FHT @ 0x50003400
1,479,362 UART: [idev] ++
1,479,530 UART: [idev] CDI.KEYID = 6
1,479,890 UART: [idev] SUBJECT.KEYID = 7
1,480,314 UART: [idev] UDS.KEYID = 0
1,480,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,058 UART: [idev] Erasing UDS.KEYID = 0
1,503,998 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,578 UART: [idev] --
1,513,671 UART: [ldev] ++
1,513,839 UART: [ldev] CDI.KEYID = 6
1,514,202 UART: [ldev] SUBJECT.KEYID = 5
1,514,628 UART: [ldev] AUTHORITY.KEYID = 7
1,515,091 UART: [ldev] FE.KEYID = 1
1,520,457 UART: [ldev] Erasing FE.KEYID = 1
1,546,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,428 UART: [ldev] --
1,585,777 UART: [fwproc] Waiting for Commands...
1,586,456 UART: [fwproc] Received command 0x46574c44
1,587,247 UART: [fwproc] Received Image of size 114360 bytes
2,883,915 UART: ROM Fatal Error: 0x000B002A
2,885,074 >>> mbox cmd response: failed
2,885,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,080 >>> mbox cmd response: failed
2,885,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
906,922 UART: [kat] LMS
1,475,118 UART: [kat] --
1,475,709 UART: [cold-reset] ++
1,476,119 UART: [fht] Storing FHT @ 0x50003400
1,478,888 UART: [idev] ++
1,479,056 UART: [idev] CDI.KEYID = 6
1,479,416 UART: [idev] SUBJECT.KEYID = 7
1,479,840 UART: [idev] UDS.KEYID = 0
1,480,185 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,522 UART: [idev] Erasing UDS.KEYID = 0
1,503,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,152 UART: [idev] --
1,513,161 UART: [ldev] ++
1,513,329 UART: [ldev] CDI.KEYID = 6
1,513,692 UART: [ldev] SUBJECT.KEYID = 5
1,514,118 UART: [ldev] AUTHORITY.KEYID = 7
1,514,581 UART: [ldev] FE.KEYID = 1
1,519,903 UART: [ldev] Erasing FE.KEYID = 1
1,545,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,256 UART: [ldev] --
1,584,697 UART: [fwproc] Waiting for Commands...
1,585,416 UART: [fwproc] Received command 0x46574c44
1,586,207 UART: [fwproc] Received Image of size 114360 bytes
2,884,569 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,667 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,878 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,211 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,665 >>> mbox cmd response: failed
2,738,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,671 >>> mbox cmd response: failed
2,738,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,764 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
891,130 UART: [kat] SHA2-256
893,068 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,619 UART: [kat] HMAC-384Kdf
908,101 UART: [kat] LMS
1,476,297 UART: [kat] --
1,477,180 UART: [cold-reset] ++
1,477,726 UART: [fht] Storing FHT @ 0x50003400
1,480,445 UART: [idev] ++
1,480,613 UART: [idev] CDI.KEYID = 6
1,480,973 UART: [idev] SUBJECT.KEYID = 7
1,481,397 UART: [idev] UDS.KEYID = 0
1,481,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,553 UART: [idev] Erasing UDS.KEYID = 0
1,506,883 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,369 UART: [idev] --
1,516,292 UART: [ldev] ++
1,516,460 UART: [ldev] CDI.KEYID = 6
1,516,823 UART: [ldev] SUBJECT.KEYID = 5
1,517,249 UART: [ldev] AUTHORITY.KEYID = 7
1,517,712 UART: [ldev] FE.KEYID = 1
1,522,918 UART: [ldev] Erasing FE.KEYID = 1
1,548,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,485 UART: [ldev] --
1,587,940 UART: [fwproc] Waiting for Commands...
1,588,589 UART: [fwproc] Received command 0x46574c44
1,589,380 UART: [fwproc] Received Image of size 114360 bytes
2,886,176 UART: ROM Fatal Error: 0x000B002A
2,887,335 >>> mbox cmd response: failed
2,887,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,341 >>> mbox cmd response: failed
2,887,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,887,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,834 UART: [kat] SHA2-256
892,772 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,506,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,499 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,568 UART: [ldev] Erasing FE.KEYID = 1
1,548,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,777 UART: [ldev] --
1,588,084 UART: [fwproc] Waiting for Commands...
1,588,707 UART: [fwproc] Received command 0x46574c44
1,589,498 UART: [fwproc] Received Image of size 114360 bytes
2,887,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,951 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,984 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,690 >>> mbox cmd response: failed
2,738,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,696 >>> mbox cmd response: failed
2,738,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,776 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,129 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,533 UART: [kat] SHA2-256
903,473 UART: [kat] SHA2-384
906,076 UART: [kat] SHA2-512-ACC
907,977 UART: [kat] ECC-384
917,294 UART: [kat] HMAC-384Kdf
921,882 UART: [kat] LMS
1,170,210 UART: [kat] --
1,171,105 UART: [cold-reset] ++
1,171,667 UART: [fht] FHT @ 0x50003400
1,174,300 UART: [idev] ++
1,174,468 UART: [idev] CDI.KEYID = 6
1,174,828 UART: [idev] SUBJECT.KEYID = 7
1,175,252 UART: [idev] UDS.KEYID = 0
1,175,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,440 UART: [idev] Erasing UDS.KEYID = 0
1,200,207 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,438 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,357 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,338 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,078 UART: ROM Fatal Error: 0x000B002A
2,582,237 >>> mbox cmd response: failed
2,582,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,243 >>> mbox cmd response: failed
2,582,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
902,125 UART: [kat] SHA2-256
904,065 UART: [kat] SHA2-384
906,742 UART: [kat] SHA2-512-ACC
908,643 UART: [kat] ECC-384
918,354 UART: [kat] HMAC-384Kdf
922,750 UART: [kat] LMS
1,171,078 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,175,056 UART: [idev] ++
1,175,224 UART: [idev] CDI.KEYID = 6
1,175,584 UART: [idev] SUBJECT.KEYID = 7
1,176,008 UART: [idev] UDS.KEYID = 0
1,176,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,548 UART: [idev] Erasing UDS.KEYID = 0
1,200,721 UART: [idev] Sha1 KeyId Algorithm
1,209,269 UART: [idev] --
1,210,307 UART: [ldev] ++
1,210,475 UART: [ldev] CDI.KEYID = 6
1,210,838 UART: [ldev] SUBJECT.KEYID = 5
1,211,264 UART: [ldev] AUTHORITY.KEYID = 7
1,211,727 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,252 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,766 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,413 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,436,524 >>> mbox cmd response: failed
2,436,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,530 >>> mbox cmd response: failed
2,436,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,284 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,196 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [kat] SHA2-256
893,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,188 UART: [kat] ++
897,340 UART: [kat] sha1
901,494 UART: [kat] SHA2-256
903,434 UART: [kat] SHA2-384
906,291 UART: [kat] SHA2-512-ACC
908,192 UART: [kat] ECC-384
918,021 UART: [kat] HMAC-384Kdf
922,777 UART: [kat] LMS
1,171,105 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,308 UART: [fht] FHT @ 0x50003400
1,174,735 UART: [idev] ++
1,174,903 UART: [idev] CDI.KEYID = 6
1,175,263 UART: [idev] SUBJECT.KEYID = 7
1,175,687 UART: [idev] UDS.KEYID = 0
1,176,032 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,771 UART: [idev] Erasing UDS.KEYID = 0
1,200,342 UART: [idev] Sha1 KeyId Algorithm
1,208,970 UART: [idev] --
1,209,886 UART: [ldev] ++
1,210,054 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,843 UART: [ldev] AUTHORITY.KEYID = 7
1,211,306 UART: [ldev] FE.KEYID = 1
1,216,614 UART: [ldev] Erasing FE.KEYID = 1
1,242,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,554 UART: [ldev] --
1,281,875 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,765 UART: ROM Fatal Error: 0x000B002A
2,581,924 >>> mbox cmd response: failed
2,581,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,930 >>> mbox cmd response: failed
2,581,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,160 UART: [kat] SHA2-256
904,100 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,439 UART: [kat] HMAC-384Kdf
922,903 UART: [kat] LMS
1,171,231 UART: [kat] --
1,172,318 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,289 UART: [idev] ++
1,175,457 UART: [idev] CDI.KEYID = 6
1,175,817 UART: [idev] SUBJECT.KEYID = 7
1,176,241 UART: [idev] UDS.KEYID = 0
1,176,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,285 UART: [idev] Erasing UDS.KEYID = 0
1,201,476 UART: [idev] Sha1 KeyId Algorithm
1,210,078 UART: [idev] --
1,211,050 UART: [ldev] ++
1,211,218 UART: [ldev] CDI.KEYID = 6
1,211,581 UART: [ldev] SUBJECT.KEYID = 5
1,212,007 UART: [ldev] AUTHORITY.KEYID = 7
1,212,470 UART: [ldev] FE.KEYID = 1
1,217,854 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,174 UART: [ldev] --
1,283,439 UART: [fwproc] Wait for Commands...
1,284,173 UART: [fwproc] Recv command 0x46574c44
1,284,901 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,734 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,437,377 >>> mbox cmd response: failed
2,437,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,383 >>> mbox cmd response: failed
2,437,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,511 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
915,580 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,540 UART: [ldev] ++
1,208,708 UART: [ldev] CDI.KEYID = 6
1,209,072 UART: [ldev] SUBJECT.KEYID = 5
1,209,499 UART: [ldev] AUTHORITY.KEYID = 7
1,209,962 UART: [ldev] FE.KEYID = 1
1,215,274 UART: [ldev] Erasing FE.KEYID = 1
1,241,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,208 UART: [fwproc] Wait for Commands...
1,280,849 UART: [fwproc] Recv command 0x46574c44
1,281,582 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,040 UART: ROM Fatal Error: 0x000B002A
2,579,199 >>> mbox cmd response: failed
2,579,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,205 >>> mbox cmd response: failed
2,579,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,879 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,787 UART: [kat] ++
894,939 UART: [kat] sha1
899,139 UART: [kat] SHA2-256
901,079 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,474 UART: [kat] LMS
1,168,786 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,145 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,966 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,942 >>> mbox cmd response: failed
2,433,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,948 >>> mbox cmd response: failed
2,433,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,035 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,174,548 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,860 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Sha1 KeyId Algorithm
1,207,546 UART: [idev] --
1,208,545 UART: [ldev] ++
1,208,713 UART: [ldev] CDI.KEYID = 6
1,209,077 UART: [ldev] SUBJECT.KEYID = 5
1,209,504 UART: [ldev] AUTHORITY.KEYID = 7
1,209,967 UART: [ldev] FE.KEYID = 1
1,215,181 UART: [ldev] Erasing FE.KEYID = 1
1,241,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,339 UART: [ldev] --
1,280,623 UART: [fwproc] Wait for Commands...
1,281,194 UART: [fwproc] Recv command 0x46574c44
1,281,927 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,197 UART: ROM Fatal Error: 0x000B002A
2,579,356 >>> mbox cmd response: failed
2,579,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,362 >>> mbox cmd response: failed
2,579,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,371 UART: [kat] HMAC-384Kdf
920,123 UART: [kat] LMS
1,168,435 UART: [kat] --
1,169,288 UART: [cold-reset] ++
1,169,716 UART: [fht] FHT @ 0x50003400
1,172,456 UART: [idev] ++
1,172,624 UART: [idev] CDI.KEYID = 6
1,172,985 UART: [idev] SUBJECT.KEYID = 7
1,173,410 UART: [idev] UDS.KEYID = 0
1,173,756 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,470 UART: [idev] Erasing UDS.KEYID = 0
1,198,604 UART: [idev] Sha1 KeyId Algorithm
1,207,524 UART: [idev] --
1,208,717 UART: [ldev] ++
1,208,885 UART: [ldev] CDI.KEYID = 6
1,209,249 UART: [ldev] SUBJECT.KEYID = 5
1,209,676 UART: [ldev] AUTHORITY.KEYID = 7
1,210,139 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,241,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,925 UART: [ldev] --
1,281,219 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,458 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,433,639 >>> mbox cmd response: failed
2,433,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,645 >>> mbox cmd response: failed
2,433,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,492 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,051 UART:
192,431 UART: Running Caliptra ROM ...
193,972 UART:
194,133 UART: [state] CFI Enabled
266,590 UART: [state] LifecycleState = Unprovisioned
268,510 UART: [state] DebugLocked = No
271,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,903 UART: [kat] SHA2-256
446,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,131 UART: [kat] ++
457,616 UART: [kat] sha1
467,527 UART: [kat] SHA2-256
470,208 UART: [kat] SHA2-384
476,084 UART: [kat] SHA2-512-ACC
478,485 UART: [kat] ECC-384
2,769,705 UART: [kat] HMAC-384Kdf
2,799,605 UART: [kat] LMS
3,989,888 UART: [kat] --
3,994,926 UART: [cold-reset] ++
3,996,880 UART: [fht] Storing FHT @ 0x50003400
4,008,962 UART: [idev] ++
4,009,533 UART: [idev] CDI.KEYID = 6
4,010,503 UART: [idev] SUBJECT.KEYID = 7
4,011,721 UART: [idev] UDS.KEYID = 0
4,014,238 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,888 UART: [idev] Erasing UDS.KEYID = 0
7,345,947 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,412 UART: [idev] --
7,371,108 UART: [ldev] ++
7,371,688 UART: [ldev] CDI.KEYID = 6
7,372,598 UART: [ldev] SUBJECT.KEYID = 5
7,373,838 UART: [ldev] AUTHORITY.KEYID = 7
7,375,077 UART: [ldev] FE.KEYID = 1
7,422,518 UART: [ldev] Erasing FE.KEYID = 1
10,756,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,701 UART: [ldev] --
13,140,814 UART: [fwproc] Waiting for Commands...
13,143,456 UART: [fwproc] Received command 0x46574c44
13,145,647 UART: [fwproc] Received Image of size 114036 bytes
17,194,339 UART: ROM Fatal Error: 0x000B002B
17,197,806 >>> mbox cmd response: failed
17,198,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,198,563 >>> mbox cmd response: failed
17,198,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,199,146 >>> mbox cmd response: failed
Initializing fuses
2,055,682 writing to cptra_bootfsm_go
2,245,003 UART:
2,245,350 UART: Running Caliptra ROM ...
2,246,490 UART:
2,246,662 UART: [state] CFI Enabled
2,306,146 UART: [state] LifecycleState = Unprovisioned
2,308,085 UART: [state] DebugLocked = No
2,310,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,323 UART: [kat] SHA2-256
2,485,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,551 UART: [kat] ++
2,496,066 UART: [kat] sha1
2,508,196 UART: [kat] SHA2-256
2,510,905 UART: [kat] SHA2-384
2,516,198 UART: [kat] SHA2-512-ACC
2,518,537 UART: [kat] ECC-384
4,811,296 UART: [kat] HMAC-384Kdf
4,842,724 UART: [kat] LMS
6,032,976 UART: [kat] --
6,038,259 UART: [cold-reset] ++
6,039,716 UART: [fht] Storing FHT @ 0x50003400
6,051,425 UART: [idev] ++
6,052,061 UART: [idev] CDI.KEYID = 6
6,052,978 UART: [idev] SUBJECT.KEYID = 7
6,054,199 UART: [idev] UDS.KEYID = 0
6,056,548 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,200,181 UART: [idev] Erasing UDS.KEYID = 0
9,388,113 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,060 UART: [idev] --
9,412,222 UART: [ldev] ++
9,412,801 UART: [ldev] CDI.KEYID = 6
9,413,742 UART: [ldev] SUBJECT.KEYID = 5
9,415,014 UART: [ldev] AUTHORITY.KEYID = 7
9,416,178 UART: [ldev] FE.KEYID = 1
9,443,220 UART: [ldev] Erasing FE.KEYID = 1
12,777,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,992 UART: [ldev] --
15,157,919 UART: [fwproc] Waiting for Commands...
15,161,164 UART: [fwproc] Received command 0x46574c44
15,163,376 UART: [fwproc] Received Image of size 114036 bytes
19,222,441 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,294,471 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,363,340 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,680,730 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,804,723 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,140,760 >>> mbox cmd response: failed
17,141,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,141,675 >>> mbox cmd response: failed
17,141,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,142,235 >>> mbox cmd response: failed
Initializing fuses
2,057,535 writing to cptra_bootfsm_go
5,843,902 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,916,007 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,541 UART:
192,897 UART: Running Caliptra ROM ...
194,087 UART:
603,851 UART: [state] CFI Enabled
619,309 UART: [state] LifecycleState = Unprovisioned
621,245 UART: [state] DebugLocked = No
623,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,130 UART: [kat] SHA2-256
797,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,391 UART: [kat] ++
808,898 UART: [kat] sha1
818,267 UART: [kat] SHA2-256
820,953 UART: [kat] SHA2-384
827,740 UART: [kat] SHA2-512-ACC
830,130 UART: [kat] ECC-384
3,114,808 UART: [kat] HMAC-384Kdf
3,127,093 UART: [kat] LMS
4,317,161 UART: [kat] --
4,321,269 UART: [cold-reset] ++
4,322,342 UART: [fht] Storing FHT @ 0x50003400
4,333,662 UART: [idev] ++
4,334,225 UART: [idev] CDI.KEYID = 6
4,335,191 UART: [idev] SUBJECT.KEYID = 7
4,336,463 UART: [idev] UDS.KEYID = 0
4,339,032 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,454 UART: [idev] Erasing UDS.KEYID = 0
7,624,180 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,412 UART: [idev] --
7,650,491 UART: [ldev] ++
7,651,070 UART: [ldev] CDI.KEYID = 6
7,651,990 UART: [ldev] SUBJECT.KEYID = 5
7,653,207 UART: [ldev] AUTHORITY.KEYID = 7
7,654,497 UART: [ldev] FE.KEYID = 1
7,664,660 UART: [ldev] Erasing FE.KEYID = 1
10,955,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,391 UART: [ldev] --
13,314,306 UART: [fwproc] Waiting for Commands...
13,315,971 UART: [fwproc] Received command 0x46574c44
13,318,179 UART: [fwproc] Received Image of size 114036 bytes
17,364,980 UART: ROM Fatal Error: 0x000B002B
17,368,432 >>> mbox cmd response: failed
17,368,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,232 >>> mbox cmd response: failed
17,369,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,796 >>> mbox cmd response: failed
Initializing fuses
2,056,741 writing to cptra_bootfsm_go
2,246,069 UART:
2,246,438 UART: Running Caliptra ROM ...
2,247,576 UART:
3,082,498 UART: [state] CFI Enabled
3,097,002 UART: [state] LifecycleState = Unprovisioned
3,098,929 UART: [state] DebugLocked = No
3,100,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,105,898 UART: [kat] SHA2-256
3,275,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,286,232 UART: [kat] ++
3,286,779 UART: [kat] sha1
3,299,186 UART: [kat] SHA2-256
3,301,883 UART: [kat] SHA2-384
3,308,033 UART: [kat] SHA2-512-ACC
3,310,386 UART: [kat] ECC-384
5,594,429 UART: [kat] HMAC-384Kdf
5,605,795 UART: [kat] LMS
6,795,898 UART: [kat] --
6,801,584 UART: [cold-reset] ++
6,803,953 UART: [fht] Storing FHT @ 0x50003400
6,815,273 UART: [idev] ++
6,815,864 UART: [idev] CDI.KEYID = 6
6,816,750 UART: [idev] SUBJECT.KEYID = 7
6,818,021 UART: [idev] UDS.KEYID = 0
6,820,514 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,963,858 UART: [idev] Erasing UDS.KEYID = 0
10,106,230 UART: [idev] Using Sha1 for KeyId Algorithm
10,126,697 UART: [idev] --
10,130,034 UART: [ldev] ++
10,130,612 UART: [ldev] CDI.KEYID = 6
10,131,553 UART: [ldev] SUBJECT.KEYID = 5
10,132,882 UART: [ldev] AUTHORITY.KEYID = 7
10,133,984 UART: [ldev] FE.KEYID = 1
10,144,820 UART: [ldev] Erasing FE.KEYID = 1
13,434,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,725,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,740,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,755,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,769,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,788,185 UART: [ldev] --
15,792,974 UART: [fwproc] Waiting for Commands...
15,796,096 UART: [fwproc] Received command 0x46574c44
15,798,341 UART: [fwproc] Received Image of size 114036 bytes
19,846,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,924,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,993,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,309,843 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
4,124,972 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,322,076 >>> mbox cmd response: failed
17,322,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,322,956 >>> mbox cmd response: failed
17,323,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,323,521 >>> mbox cmd response: failed
Initializing fuses
2,061,599 writing to cptra_bootfsm_go
6,673,344 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,612,322 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,328 UART:
192,698 UART: Running Caliptra ROM ...
193,928 UART:
194,084 UART: [state] CFI Enabled
262,684 UART: [state] LifecycleState = Unprovisioned
264,594 UART: [state] DebugLocked = No
266,296 UART: [state] WD Timer not started. Device not locked for debugging
269,748 UART: [kat] SHA2-256
448,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,414 UART: [kat] ++
460,946 UART: [kat] sha1
471,766 UART: [kat] SHA2-256
474,757 UART: [kat] SHA2-384
481,066 UART: [kat] SHA2-512-ACC
484,015 UART: [kat] ECC-384
2,948,750 UART: [kat] HMAC-384Kdf
2,968,894 UART: [kat] LMS
3,498,372 UART: [kat] --
3,502,291 UART: [cold-reset] ++
3,504,322 UART: [fht] FHT @ 0x50003400
3,514,956 UART: [idev] ++
3,515,525 UART: [idev] CDI.KEYID = 6
3,516,439 UART: [idev] SUBJECT.KEYID = 7
3,517,654 UART: [idev] UDS.KEYID = 0
3,520,380 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,411 UART: [idev] Erasing UDS.KEYID = 0
6,023,748 UART: [idev] Sha1 KeyId Algorithm
6,047,037 UART: [idev] --
6,050,930 UART: [ldev] ++
6,051,505 UART: [ldev] CDI.KEYID = 6
6,052,420 UART: [ldev] SUBJECT.KEYID = 5
6,053,638 UART: [ldev] AUTHORITY.KEYID = 7
6,054,877 UART: [ldev] FE.KEYID = 1
6,098,110 UART: [ldev] Erasing FE.KEYID = 1
8,601,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,827 UART: [ldev] --
10,411,660 UART: [fwproc] Wait for Commands...
10,413,810 UART: [fwproc] Recv command 0x46574c44
10,415,856 UART: [fwproc] Recv'd Img size: 114360 bytes
13,809,742 UART: ROM Fatal Error: 0x000B002B
13,812,827 >>> mbox cmd response: failed
13,813,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,813,580 >>> mbox cmd response: failed
13,813,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,814,182 >>> mbox cmd response: failed
Initializing fuses
2,053,979 writing to cptra_bootfsm_go
2,243,407 UART:
2,243,767 UART: Running Caliptra ROM ...
2,244,902 UART:
2,245,077 UART: [state] CFI Enabled
2,317,932 UART: [state] LifecycleState = Unprovisioned
2,319,809 UART: [state] DebugLocked = No
2,321,196 UART: [state] WD Timer not started. Device not locked for debugging
2,324,238 UART: [kat] SHA2-256
2,503,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,939 UART: [kat] ++
2,515,480 UART: [kat] sha1
2,526,645 UART: [kat] SHA2-256
2,529,672 UART: [kat] SHA2-384
2,535,066 UART: [kat] SHA2-512-ACC
2,538,014 UART: [kat] ECC-384
4,982,489 UART: [kat] HMAC-384Kdf
5,004,123 UART: [kat] LMS
5,533,549 UART: [kat] --
5,537,755 UART: [cold-reset] ++
5,540,329 UART: [fht] FHT @ 0x50003400
5,551,954 UART: [idev] ++
5,552,518 UART: [idev] CDI.KEYID = 6
5,553,400 UART: [idev] SUBJECT.KEYID = 7
5,554,613 UART: [idev] UDS.KEYID = 0
5,556,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,700,900 UART: [idev] Erasing UDS.KEYID = 0
8,058,876 UART: [idev] Sha1 KeyId Algorithm
8,083,029 UART: [idev] --
8,088,443 UART: [ldev] ++
8,089,060 UART: [ldev] CDI.KEYID = 6
8,089,956 UART: [ldev] SUBJECT.KEYID = 5
8,091,085 UART: [ldev] AUTHORITY.KEYID = 7
8,092,385 UART: [ldev] FE.KEYID = 1
8,133,740 UART: [ldev] Erasing FE.KEYID = 1
10,638,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,517 UART: [ldev] --
12,446,521 UART: [fwproc] Wait for Commands...
12,449,106 UART: [fwproc] Recv command 0x46574c44
12,451,201 UART: [fwproc] Recv'd Img size: 114360 bytes
15,848,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,922,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,991,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,308,832 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,245 UART:
192,619 UART: Running Caliptra ROM ...
193,743 UART:
193,884 UART: [state] CFI Enabled
260,931 UART: [state] LifecycleState = Unprovisioned
263,322 UART: [state] DebugLocked = No
265,835 UART: [state] WD Timer not started. Device not locked for debugging
271,255 UART: [kat] SHA2-256
461,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,923 UART: [kat] ++
472,406 UART: [kat] sha1
483,452 UART: [kat] SHA2-256
486,464 UART: [kat] SHA2-384
492,983 UART: [kat] SHA2-512-ACC
495,536 UART: [kat] ECC-384
2,947,001 UART: [kat] HMAC-384Kdf
2,971,399 UART: [kat] LMS
3,503,163 UART: [kat] --
3,507,387 UART: [cold-reset] ++
3,508,891 UART: [fht] FHT @ 0x50003400
3,520,629 UART: [idev] ++
3,521,334 UART: [idev] CDI.KEYID = 6
3,522,243 UART: [idev] SUBJECT.KEYID = 7
3,523,459 UART: [idev] UDS.KEYID = 0
3,526,308 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,453 UART: [idev] Erasing UDS.KEYID = 0
6,029,113 UART: [idev] Sha1 KeyId Algorithm
6,051,183 UART: [idev] --
6,056,129 UART: [ldev] ++
6,056,829 UART: [ldev] CDI.KEYID = 6
6,057,718 UART: [ldev] SUBJECT.KEYID = 5
6,058,936 UART: [ldev] AUTHORITY.KEYID = 7
6,060,120 UART: [ldev] FE.KEYID = 1
6,099,820 UART: [ldev] Erasing FE.KEYID = 1
8,604,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,312 UART: [ldev] --
10,415,332 UART: [fwproc] Wait for Commands...
10,417,705 UART: [fwproc] Recv command 0x46574c44
10,419,963 UART: [fwproc] Recv'd Img size: 114360 bytes
13,858,565 UART: ROM Fatal Error: 0x000B002B
13,862,280 >>> mbox cmd response: failed
13,862,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,862,947 >>> mbox cmd response: failed
13,863,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,863,544 >>> mbox cmd response: failed
Initializing fuses
2,058,166 writing to cptra_bootfsm_go
2,247,509 UART:
2,247,865 UART: Running Caliptra ROM ...
2,249,321 UART:
2,249,496 UART: [state] CFI Enabled
2,313,182 UART: [state] LifecycleState = Unprovisioned
2,315,571 UART: [state] DebugLocked = No
2,317,867 UART: [state] WD Timer not started. Device not locked for debugging
2,322,934 UART: [kat] SHA2-256
2,512,830 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,565 UART: [kat] ++
2,524,058 UART: [kat] sha1
2,535,495 UART: [kat] SHA2-256
2,538,524 UART: [kat] SHA2-384
2,544,897 UART: [kat] SHA2-512-ACC
2,547,467 UART: [kat] ECC-384
4,999,170 UART: [kat] HMAC-384Kdf
5,022,077 UART: [kat] LMS
5,553,862 UART: [kat] --
5,558,927 UART: [cold-reset] ++
5,560,909 UART: [fht] FHT @ 0x50003400
5,572,383 UART: [idev] ++
5,573,064 UART: [idev] CDI.KEYID = 6
5,574,007 UART: [idev] SUBJECT.KEYID = 7
5,575,226 UART: [idev] UDS.KEYID = 0
5,577,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,721,552 UART: [idev] Erasing UDS.KEYID = 0
8,080,107 UART: [idev] Sha1 KeyId Algorithm
8,102,867 UART: [idev] --
8,108,427 UART: [ldev] ++
8,109,134 UART: [ldev] CDI.KEYID = 6
8,110,023 UART: [ldev] SUBJECT.KEYID = 5
8,111,192 UART: [ldev] AUTHORITY.KEYID = 7
8,112,450 UART: [ldev] FE.KEYID = 1
8,150,830 UART: [ldev] Erasing FE.KEYID = 1
10,656,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,262 UART: [ldev] --
12,466,274 UART: [fwproc] Wait for Commands...
12,468,424 UART: [fwproc] Recv command 0x46574c44
12,470,689 UART: [fwproc] Recv'd Img size: 114360 bytes
15,915,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,991,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,107,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,650,156 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,436,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,276,012 >>> mbox cmd response: failed
14,276,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,277,029 >>> mbox cmd response: failed
14,277,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,277,597 >>> mbox cmd response: failed
Initializing fuses
2,056,073 writing to cptra_bootfsm_go
5,479,220 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,777,578 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,324 UART:
192,689 UART: Running Caliptra ROM ...
193,823 UART:
603,554 UART: [state] CFI Enabled
617,107 UART: [state] LifecycleState = Unprovisioned
619,473 UART: [state] DebugLocked = No
622,146 UART: [state] WD Timer not started. Device not locked for debugging
626,022 UART: [kat] SHA2-256
815,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,707 UART: [kat] ++
827,214 UART: [kat] sha1
838,091 UART: [kat] SHA2-256
841,088 UART: [kat] SHA2-384
847,671 UART: [kat] SHA2-512-ACC
850,281 UART: [kat] ECC-384
3,292,569 UART: [kat] HMAC-384Kdf
3,305,248 UART: [kat] LMS
3,837,034 UART: [kat] --
3,842,351 UART: [cold-reset] ++
3,843,527 UART: [fht] FHT @ 0x50003400
3,856,447 UART: [idev] ++
3,857,137 UART: [idev] CDI.KEYID = 6
3,858,100 UART: [idev] SUBJECT.KEYID = 7
3,859,316 UART: [idev] UDS.KEYID = 0
3,862,032 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,865 UART: [idev] Erasing UDS.KEYID = 0
6,336,230 UART: [idev] Sha1 KeyId Algorithm
6,359,870 UART: [idev] --
6,365,458 UART: [ldev] ++
6,366,146 UART: [ldev] CDI.KEYID = 6
6,367,206 UART: [ldev] SUBJECT.KEYID = 5
6,368,336 UART: [ldev] AUTHORITY.KEYID = 7
6,369,510 UART: [ldev] FE.KEYID = 1
6,378,537 UART: [ldev] Erasing FE.KEYID = 1
8,860,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,619 UART: [ldev] --
10,649,639 UART: [fwproc] Wait for Commands...
10,651,356 UART: [fwproc] Recv command 0x46574c44
10,653,667 UART: [fwproc] Recv'd Img size: 114360 bytes
14,096,687 UART: ROM Fatal Error: 0x000B002B
14,100,372 >>> mbox cmd response: failed
14,100,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,101,114 >>> mbox cmd response: failed
14,101,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,101,649 >>> mbox cmd response: failed
Initializing fuses
2,054,272 writing to cptra_bootfsm_go
2,243,598 UART:
2,243,959 UART: Running Caliptra ROM ...
2,245,036 UART:
6,346,375 UART: [state] CFI Enabled
6,359,056 UART: [state] LifecycleState = Unprovisioned
6,361,449 UART: [state] DebugLocked = No
6,363,215 UART: [state] WD Timer not started. Device not locked for debugging
6,367,303 UART: [kat] SHA2-256
6,557,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,567,981 UART: [kat] ++
6,568,525 UART: [kat] sha1
6,579,201 UART: [kat] SHA2-256
6,582,232 UART: [kat] SHA2-384
6,588,223 UART: [kat] SHA2-512-ACC
6,590,843 UART: [kat] ECC-384
9,031,836 UART: [kat] HMAC-384Kdf
9,045,418 UART: [kat] LMS
9,577,241 UART: [kat] --
9,582,264 UART: [cold-reset] ++
9,584,141 UART: [fht] FHT @ 0x50003400
9,595,662 UART: [idev] ++
9,596,343 UART: [idev] CDI.KEYID = 6
9,597,279 UART: [idev] SUBJECT.KEYID = 7
9,598,488 UART: [idev] UDS.KEYID = 0
9,600,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,744,467 UART: [idev] Erasing UDS.KEYID = 0
12,079,603 UART: [idev] Sha1 KeyId Algorithm
12,102,946 UART: [idev] --
12,107,348 UART: [ldev] ++
12,108,034 UART: [ldev] CDI.KEYID = 6
12,108,916 UART: [ldev] SUBJECT.KEYID = 5
12,110,131 UART: [ldev] AUTHORITY.KEYID = 7
12,111,365 UART: [ldev] FE.KEYID = 1
12,122,253 UART: [ldev] Erasing FE.KEYID = 1
14,605,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,322,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,337,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,352,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,367,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,388,898 UART: [ldev] --
16,393,462 UART: [fwproc] Wait for Commands...
16,395,831 UART: [fwproc] Recv command 0x46574c44
16,398,163 UART: [fwproc] Recv'd Img size: 114360 bytes
19,851,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,920,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,036,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,578,743 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,754,727 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,501,752 >>> mbox cmd response: failed
14,502,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,502,650 >>> mbox cmd response: failed
14,502,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,503,203 >>> mbox cmd response: failed
Initializing fuses
2,054,494 writing to cptra_bootfsm_go
9,116,935 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,309,168 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,559 UART: [kat] SHA2-256
881,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,605 UART: [kat] ++
885,757 UART: [kat] sha1
889,779 UART: [kat] SHA2-256
891,717 UART: [kat] SHA2-384
894,488 UART: [kat] SHA2-512-ACC
896,389 UART: [kat] ECC-384
901,916 UART: [kat] HMAC-384Kdf
906,386 UART: [kat] LMS
1,474,582 UART: [kat] --
1,475,501 UART: [cold-reset] ++
1,475,887 UART: [fht] Storing FHT @ 0x50003400
1,478,642 UART: [idev] ++
1,478,810 UART: [idev] CDI.KEYID = 6
1,479,170 UART: [idev] SUBJECT.KEYID = 7
1,479,594 UART: [idev] UDS.KEYID = 0
1,479,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,604 UART: [idev] Erasing UDS.KEYID = 0
1,504,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,908 UART: [idev] --
1,513,861 UART: [ldev] ++
1,514,029 UART: [ldev] CDI.KEYID = 6
1,514,392 UART: [ldev] SUBJECT.KEYID = 5
1,514,818 UART: [ldev] AUTHORITY.KEYID = 7
1,515,281 UART: [ldev] FE.KEYID = 1
1,520,561 UART: [ldev] Erasing FE.KEYID = 1
1,545,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,056 UART: [ldev] --
1,585,385 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 114360 bytes
2,884,255 UART: ROM Fatal Error: 0x000B002B
2,885,414 >>> mbox cmd response: failed
2,885,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,420 >>> mbox cmd response: failed
2,885,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,137 UART: [kat] SHA2-256
882,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,183 UART: [kat] ++
886,335 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,652 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,189 UART: [cold-reset] ++
1,476,721 UART: [fht] Storing FHT @ 0x50003400
1,479,536 UART: [idev] ++
1,479,704 UART: [idev] CDI.KEYID = 6
1,480,064 UART: [idev] SUBJECT.KEYID = 7
1,480,488 UART: [idev] UDS.KEYID = 0
1,480,833 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,406 UART: [idev] Erasing UDS.KEYID = 0
1,504,842 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,556 UART: [idev] --
1,514,757 UART: [ldev] ++
1,514,925 UART: [ldev] CDI.KEYID = 6
1,515,288 UART: [ldev] SUBJECT.KEYID = 5
1,515,714 UART: [ldev] AUTHORITY.KEYID = 7
1,516,177 UART: [ldev] FE.KEYID = 1
1,521,237 UART: [ldev] Erasing FE.KEYID = 1
1,547,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,866 UART: [ldev] --
1,586,203 UART: [fwproc] Waiting for Commands...
1,586,914 UART: [fwproc] Received command 0x46574c44
1,587,705 UART: [fwproc] Received Image of size 114360 bytes
2,884,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,755 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,696 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,905 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,359 >>> mbox cmd response: failed
2,738,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,365 >>> mbox cmd response: failed
2,738,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,184 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
891,016 UART: [kat] SHA2-256
892,954 UART: [kat] SHA2-384
895,845 UART: [kat] SHA2-512-ACC
897,746 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,927 UART: [kat] LMS
1,476,123 UART: [kat] --
1,477,114 UART: [cold-reset] ++
1,477,462 UART: [fht] Storing FHT @ 0x50003400
1,480,245 UART: [idev] ++
1,480,413 UART: [idev] CDI.KEYID = 6
1,480,773 UART: [idev] SUBJECT.KEYID = 7
1,481,197 UART: [idev] UDS.KEYID = 0
1,481,542 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,313 UART: [idev] Erasing UDS.KEYID = 0
1,505,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,694 UART: [ldev] ++
1,515,862 UART: [ldev] CDI.KEYID = 6
1,516,225 UART: [ldev] SUBJECT.KEYID = 5
1,516,651 UART: [ldev] AUTHORITY.KEYID = 7
1,517,114 UART: [ldev] FE.KEYID = 1
1,522,392 UART: [ldev] Erasing FE.KEYID = 1
1,548,609 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,883 UART: [ldev] --
1,588,150 UART: [fwproc] Waiting for Commands...
1,589,011 UART: [fwproc] Received command 0x46574c44
1,589,802 UART: [fwproc] Received Image of size 114360 bytes
2,888,084 UART: ROM Fatal Error: 0x000B002B
2,889,243 >>> mbox cmd response: failed
2,889,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,249 >>> mbox cmd response: failed
2,889,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,889,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,140 UART: [kat] SHA2-256
882,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,186 UART: [kat] ++
886,338 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,993 UART: [kat] HMAC-384Kdf
907,583 UART: [kat] LMS
1,475,779 UART: [kat] --
1,476,816 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,799 UART: [idev] Erasing UDS.KEYID = 0
1,505,551 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,087 UART: [idev] --
1,515,048 UART: [ldev] ++
1,515,216 UART: [ldev] CDI.KEYID = 6
1,515,579 UART: [ldev] SUBJECT.KEYID = 5
1,516,005 UART: [ldev] AUTHORITY.KEYID = 7
1,516,468 UART: [ldev] FE.KEYID = 1
1,521,824 UART: [ldev] Erasing FE.KEYID = 1
1,546,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,103 UART: [ldev] --
1,586,588 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 114360 bytes
2,885,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,061 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,736,676 >>> mbox cmd response: failed
2,736,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,682 >>> mbox cmd response: failed
2,736,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,804 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,287 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,598 UART: [kat] LMS
1,170,926 UART: [kat] --
1,171,695 UART: [cold-reset] ++
1,172,263 UART: [fht] FHT @ 0x50003400
1,174,756 UART: [idev] ++
1,174,924 UART: [idev] CDI.KEYID = 6
1,175,284 UART: [idev] SUBJECT.KEYID = 7
1,175,708 UART: [idev] UDS.KEYID = 0
1,176,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,812 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,208,991 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,712 UART: [ldev] SUBJECT.KEYID = 5
1,211,138 UART: [ldev] AUTHORITY.KEYID = 7
1,211,601 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,830 UART: [fwproc] Wait for Commands...
1,283,636 UART: [fwproc] Recv command 0x46574c44
1,284,364 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,336 UART: ROM Fatal Error: 0x000B002B
2,582,495 >>> mbox cmd response: failed
2,582,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,501 >>> mbox cmd response: failed
2,582,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
893,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,555 UART: [kat] ++
897,707 UART: [kat] sha1
902,139 UART: [kat] SHA2-256
904,079 UART: [kat] SHA2-384
906,938 UART: [kat] SHA2-512-ACC
908,839 UART: [kat] ECC-384
918,714 UART: [kat] HMAC-384Kdf
923,324 UART: [kat] LMS
1,171,652 UART: [kat] --
1,172,483 UART: [cold-reset] ++
1,172,857 UART: [fht] FHT @ 0x50003400
1,175,634 UART: [idev] ++
1,175,802 UART: [idev] CDI.KEYID = 6
1,176,162 UART: [idev] SUBJECT.KEYID = 7
1,176,586 UART: [idev] UDS.KEYID = 0
1,176,931 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,896 UART: [idev] Erasing UDS.KEYID = 0
1,201,961 UART: [idev] Sha1 KeyId Algorithm
1,210,593 UART: [idev] --
1,211,531 UART: [ldev] ++
1,211,699 UART: [ldev] CDI.KEYID = 6
1,212,062 UART: [ldev] SUBJECT.KEYID = 5
1,212,488 UART: [ldev] AUTHORITY.KEYID = 7
1,212,951 UART: [ldev] FE.KEYID = 1
1,218,327 UART: [ldev] Erasing FE.KEYID = 1
1,244,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,411 UART: [ldev] --
1,283,730 UART: [fwproc] Wait for Commands...
1,284,462 UART: [fwproc] Recv command 0x46574c44
1,285,190 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,147 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,435,576 >>> mbox cmd response: failed
2,435,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,582 >>> mbox cmd response: failed
2,435,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,639 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,876 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
893,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,068 UART: [kat] ++
898,220 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,057 UART: [kat] SHA2-512-ACC
908,958 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,499 UART: [idev] ++
1,175,667 UART: [idev] CDI.KEYID = 6
1,176,027 UART: [idev] SUBJECT.KEYID = 7
1,176,451 UART: [idev] UDS.KEYID = 0
1,176,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,287 UART: [idev] Erasing UDS.KEYID = 0
1,201,536 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,211,094 UART: [ldev] ++
1,211,262 UART: [ldev] CDI.KEYID = 6
1,211,625 UART: [ldev] SUBJECT.KEYID = 5
1,212,051 UART: [ldev] AUTHORITY.KEYID = 7
1,212,514 UART: [ldev] FE.KEYID = 1
1,217,958 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,798 UART: [ldev] --
1,283,213 UART: [fwproc] Wait for Commands...
1,284,021 UART: [fwproc] Recv command 0x46574c44
1,284,749 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,605 UART: ROM Fatal Error: 0x000B002B
2,582,764 >>> mbox cmd response: failed
2,582,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,770 >>> mbox cmd response: failed
2,582,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,865 UART: [kat] HMAC-384Kdf
923,507 UART: [kat] LMS
1,171,835 UART: [kat] --
1,172,944 UART: [cold-reset] ++
1,173,384 UART: [fht] FHT @ 0x50003400
1,175,839 UART: [idev] ++
1,176,007 UART: [idev] CDI.KEYID = 6
1,176,367 UART: [idev] SUBJECT.KEYID = 7
1,176,791 UART: [idev] UDS.KEYID = 0
1,177,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,891 UART: [idev] Erasing UDS.KEYID = 0
1,201,494 UART: [idev] Sha1 KeyId Algorithm
1,210,124 UART: [idev] --
1,211,204 UART: [ldev] ++
1,211,372 UART: [ldev] CDI.KEYID = 6
1,211,735 UART: [ldev] SUBJECT.KEYID = 5
1,212,161 UART: [ldev] AUTHORITY.KEYID = 7
1,212,624 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,214 UART: [ldev] --
1,284,477 UART: [fwproc] Wait for Commands...
1,285,167 UART: [fwproc] Recv command 0x46574c44
1,285,895 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,716 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,437,505 >>> mbox cmd response: failed
2,437,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,511 >>> mbox cmd response: failed
2,437,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,168 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,011 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
916,236 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,083 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,174,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,216,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,192 UART: [ldev] --
1,281,636 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,688 UART: ROM Fatal Error: 0x000B002B
2,580,847 >>> mbox cmd response: failed
2,580,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,853 >>> mbox cmd response: failed
2,580,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,508 UART: [kat] LMS
1,168,820 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,793 UART: [idev] ++
1,172,961 UART: [idev] CDI.KEYID = 6
1,173,322 UART: [idev] SUBJECT.KEYID = 7
1,173,747 UART: [idev] UDS.KEYID = 0
1,174,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,827 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,747 UART: [fwproc] Recv command 0x46574c44
1,282,480 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,491 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,364 >>> mbox cmd response: failed
2,432,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,370 >>> mbox cmd response: failed
2,432,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,652 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,439 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,174,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,780 UART: [idev] Erasing UDS.KEYID = 0
1,198,728 UART: [idev] Sha1 KeyId Algorithm
1,207,476 UART: [idev] --
1,208,331 UART: [ldev] ++
1,208,499 UART: [ldev] CDI.KEYID = 6
1,208,863 UART: [ldev] SUBJECT.KEYID = 5
1,209,290 UART: [ldev] AUTHORITY.KEYID = 7
1,209,753 UART: [ldev] FE.KEYID = 1
1,214,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,281,994 UART: [fwproc] Recv command 0x46574c44
1,282,727 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,909 UART: ROM Fatal Error: 0x000B002B
2,581,068 >>> mbox cmd response: failed
2,581,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,074 >>> mbox cmd response: failed
2,581,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,981 UART: [state] LifecycleState = Unprovisioned
86,636 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
891,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,012 UART: [kat] ++
896,164 UART: [kat] sha1
900,550 UART: [kat] SHA2-256
902,490 UART: [kat] SHA2-384
905,213 UART: [kat] SHA2-512-ACC
907,114 UART: [kat] ECC-384
916,917 UART: [kat] HMAC-384Kdf
921,537 UART: [kat] LMS
1,169,849 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,216 UART: [fht] FHT @ 0x50003400
1,173,914 UART: [idev] ++
1,174,082 UART: [idev] CDI.KEYID = 6
1,174,443 UART: [idev] SUBJECT.KEYID = 7
1,174,868 UART: [idev] UDS.KEYID = 0
1,175,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,704 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,310 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,742 UART: [fwproc] Recv command 0x46574c44
1,283,475 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,290 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,523 >>> mbox cmd response: failed
2,432,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,529 >>> mbox cmd response: failed
2,432,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,578 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,303 UART:
192,663 UART: Running Caliptra ROM ...
193,849 UART:
194,001 UART: [state] CFI Enabled
267,385 UART: [state] LifecycleState = Unprovisioned
269,286 UART: [state] DebugLocked = No
270,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,368 UART: [kat] SHA2-256
446,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,620 UART: [kat] ++
457,099 UART: [kat] sha1
467,801 UART: [kat] SHA2-256
470,483 UART: [kat] SHA2-384
476,691 UART: [kat] SHA2-512-ACC
479,090 UART: [kat] ECC-384
2,765,747 UART: [kat] HMAC-384Kdf
2,798,730 UART: [kat] LMS
3,989,040 UART: [kat] --
3,992,499 UART: [cold-reset] ++
3,995,077 UART: [fht] Storing FHT @ 0x50003400
4,005,703 UART: [idev] ++
4,006,281 UART: [idev] CDI.KEYID = 6
4,007,202 UART: [idev] SUBJECT.KEYID = 7
4,008,476 UART: [idev] UDS.KEYID = 0
4,011,086 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,686 UART: [idev] Erasing UDS.KEYID = 0
7,345,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,380 UART: [idev] --
7,371,432 UART: [ldev] ++
7,372,005 UART: [ldev] CDI.KEYID = 6
7,372,982 UART: [ldev] SUBJECT.KEYID = 5
7,374,218 UART: [ldev] AUTHORITY.KEYID = 7
7,375,403 UART: [ldev] FE.KEYID = 1
7,420,560 UART: [ldev] Erasing FE.KEYID = 1
10,753,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,200 UART: [ldev] --
13,114,071 UART: [fwproc] Waiting for Commands...
13,116,230 UART: [fwproc] Received command 0x46574c44
13,118,419 UART: [fwproc] Received Image of size 114036 bytes
17,162,691 UART: ROM Fatal Error: 0x000B0028
17,166,155 >>> mbox cmd response: failed
17,166,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,166,890 >>> mbox cmd response: failed
17,167,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,167,475 >>> mbox cmd response: failed
Initializing fuses
2,062,089 writing to cptra_bootfsm_go
2,251,359 UART:
2,251,734 UART: Running Caliptra ROM ...
2,252,782 UART:
2,252,940 UART: [state] CFI Enabled
2,315,073 UART: [state] LifecycleState = Unprovisioned
2,317,044 UART: [state] DebugLocked = No
2,318,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,887 UART: [kat] SHA2-256
2,492,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,086 UART: [kat] ++
2,503,572 UART: [kat] sha1
2,513,708 UART: [kat] SHA2-256
2,516,402 UART: [kat] SHA2-384
2,521,962 UART: [kat] SHA2-512-ACC
2,524,373 UART: [kat] ECC-384
4,819,267 UART: [kat] HMAC-384Kdf
4,831,650 UART: [kat] LMS
6,021,980 UART: [kat] --
6,026,196 UART: [cold-reset] ++
6,027,215 UART: [fht] Storing FHT @ 0x50003400
6,039,218 UART: [idev] ++
6,039,780 UART: [idev] CDI.KEYID = 6
6,040,719 UART: [idev] SUBJECT.KEYID = 7
6,041,988 UART: [idev] UDS.KEYID = 0
6,044,152 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,187,790 UART: [idev] Erasing UDS.KEYID = 0
9,379,954 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,672 UART: [idev] --
9,404,425 UART: [ldev] ++
9,404,995 UART: [ldev] CDI.KEYID = 6
9,406,014 UART: [ldev] SUBJECT.KEYID = 5
9,407,220 UART: [ldev] AUTHORITY.KEYID = 7
9,408,458 UART: [ldev] FE.KEYID = 1
9,454,376 UART: [ldev] Erasing FE.KEYID = 1
12,785,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,080,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,094,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,109,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,143,502 UART: [ldev] --
15,147,589 UART: [fwproc] Waiting for Commands...
15,150,119 UART: [fwproc] Received command 0x46574c44
15,152,325 UART: [fwproc] Received Image of size 114036 bytes
19,204,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,285,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,354,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,670,673 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,785,618 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,122,413 >>> mbox cmd response: failed
17,122,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,123,307 >>> mbox cmd response: failed
17,123,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,123,898 >>> mbox cmd response: failed
Initializing fuses
2,062,058 writing to cptra_bootfsm_go
5,836,187 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,921,352 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,552 UART:
192,898 UART: Running Caliptra ROM ...
194,089 UART:
603,617 UART: [state] CFI Enabled
617,429 UART: [state] LifecycleState = Unprovisioned
619,363 UART: [state] DebugLocked = No
621,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,847 UART: [kat] SHA2-256
795,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,145 UART: [kat] ++
806,596 UART: [kat] sha1
816,607 UART: [kat] SHA2-256
819,297 UART: [kat] SHA2-384
824,900 UART: [kat] SHA2-512-ACC
827,245 UART: [kat] ECC-384
3,110,287 UART: [kat] HMAC-384Kdf
3,122,299 UART: [kat] LMS
4,312,425 UART: [kat] --
4,315,684 UART: [cold-reset] ++
4,318,267 UART: [fht] Storing FHT @ 0x50003400
4,329,591 UART: [idev] ++
4,330,166 UART: [idev] CDI.KEYID = 6
4,331,151 UART: [idev] SUBJECT.KEYID = 7
4,332,372 UART: [idev] UDS.KEYID = 0
4,334,970 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,342 UART: [idev] Erasing UDS.KEYID = 0
7,624,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,826 UART: [idev] --
7,648,227 UART: [ldev] ++
7,648,796 UART: [ldev] CDI.KEYID = 6
7,649,734 UART: [ldev] SUBJECT.KEYID = 5
7,650,945 UART: [ldev] AUTHORITY.KEYID = 7
7,652,232 UART: [ldev] FE.KEYID = 1
7,662,639 UART: [ldev] Erasing FE.KEYID = 1
10,955,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,624 UART: [ldev] --
13,315,863 UART: [fwproc] Waiting for Commands...
13,318,501 UART: [fwproc] Received command 0x46574c44
13,320,739 UART: [fwproc] Received Image of size 114036 bytes
17,376,898 UART: ROM Fatal Error: 0x000B0028
17,380,301 >>> mbox cmd response: failed
17,380,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,381,062 >>> mbox cmd response: failed
17,381,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,381,625 >>> mbox cmd response: failed
Initializing fuses
2,063,030 writing to cptra_bootfsm_go
2,252,343 UART:
2,252,713 UART: Running Caliptra ROM ...
2,253,852 UART:
3,077,255 UART: [state] CFI Enabled
3,092,630 UART: [state] LifecycleState = Unprovisioned
3,094,579 UART: [state] DebugLocked = No
3,095,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,100,692 UART: [kat] SHA2-256
3,270,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,280,913 UART: [kat] ++
3,281,458 UART: [kat] sha1
3,291,653 UART: [kat] SHA2-256
3,294,340 UART: [kat] SHA2-384
3,298,971 UART: [kat] SHA2-512-ACC
3,301,318 UART: [kat] ECC-384
5,583,002 UART: [kat] HMAC-384Kdf
5,596,425 UART: [kat] LMS
6,786,562 UART: [kat] --
6,790,886 UART: [cold-reset] ++
6,792,601 UART: [fht] Storing FHT @ 0x50003400
6,805,107 UART: [idev] ++
6,805,674 UART: [idev] CDI.KEYID = 6
6,806,610 UART: [idev] SUBJECT.KEYID = 7
6,807,877 UART: [idev] UDS.KEYID = 0
6,810,042 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,954,083 UART: [idev] Erasing UDS.KEYID = 0
10,097,158 UART: [idev] Using Sha1 for KeyId Algorithm
10,118,430 UART: [idev] --
10,122,482 UART: [ldev] ++
10,123,050 UART: [ldev] CDI.KEYID = 6
10,123,988 UART: [ldev] SUBJECT.KEYID = 5
10,125,237 UART: [ldev] AUTHORITY.KEYID = 7
10,126,394 UART: [ldev] FE.KEYID = 1
10,137,421 UART: [ldev] Erasing FE.KEYID = 1
13,425,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,716,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,731,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,745,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,760,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,778,904 UART: [ldev] --
15,782,931 UART: [fwproc] Waiting for Commands...
15,786,108 UART: [fwproc] Received command 0x46574c44
15,788,348 UART: [fwproc] Received Image of size 114036 bytes
19,841,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,917,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,986,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,303,763 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
4,122,028 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,326,623 >>> mbox cmd response: failed
17,327,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,327,691 >>> mbox cmd response: failed
17,327,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,328,267 >>> mbox cmd response: failed
Initializing fuses
2,056,526 writing to cptra_bootfsm_go
6,670,079 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,602,916 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,140 UART:
192,513 UART: Running Caliptra ROM ...
193,740 UART:
193,894 UART: [state] CFI Enabled
263,758 UART: [state] LifecycleState = Unprovisioned
265,621 UART: [state] DebugLocked = No
266,775 UART: [state] WD Timer not started. Device not locked for debugging
270,801 UART: [kat] SHA2-256
449,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,484 UART: [kat] ++
462,012 UART: [kat] sha1
471,765 UART: [kat] SHA2-256
474,772 UART: [kat] SHA2-384
480,695 UART: [kat] SHA2-512-ACC
483,679 UART: [kat] ECC-384
2,948,481 UART: [kat] HMAC-384Kdf
2,971,545 UART: [kat] LMS
3,501,014 UART: [kat] --
3,504,624 UART: [cold-reset] ++
3,506,130 UART: [fht] FHT @ 0x50003400
3,515,979 UART: [idev] ++
3,516,556 UART: [idev] CDI.KEYID = 6
3,517,577 UART: [idev] SUBJECT.KEYID = 7
3,518,678 UART: [idev] UDS.KEYID = 0
3,521,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,659 UART: [idev] Erasing UDS.KEYID = 0
6,023,120 UART: [idev] Sha1 KeyId Algorithm
6,046,299 UART: [idev] --
6,050,210 UART: [ldev] ++
6,050,801 UART: [ldev] CDI.KEYID = 6
6,051,736 UART: [ldev] SUBJECT.KEYID = 5
6,052,898 UART: [ldev] AUTHORITY.KEYID = 7
6,054,134 UART: [ldev] FE.KEYID = 1
6,080,983 UART: [ldev] Erasing FE.KEYID = 1
8,584,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,361 UART: [ldev] --
10,395,791 UART: [fwproc] Wait for Commands...
10,398,804 UART: [fwproc] Recv command 0x46574c44
10,400,846 UART: [fwproc] Recv'd Img size: 114360 bytes
13,796,525 UART: ROM Fatal Error: 0x000B0028
13,799,663 >>> mbox cmd response: failed
13,800,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,800,523 >>> mbox cmd response: failed
13,800,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,801,199 >>> mbox cmd response: failed
Initializing fuses
2,053,630 writing to cptra_bootfsm_go
2,242,942 UART:
2,243,295 UART: Running Caliptra ROM ...
2,244,433 UART:
2,244,605 UART: [state] CFI Enabled
2,312,244 UART: [state] LifecycleState = Unprovisioned
2,314,126 UART: [state] DebugLocked = No
2,315,682 UART: [state] WD Timer not started. Device not locked for debugging
2,319,698 UART: [kat] SHA2-256
2,498,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,378 UART: [kat] ++
2,510,926 UART: [kat] sha1
2,520,909 UART: [kat] SHA2-256
2,523,924 UART: [kat] SHA2-384
2,530,366 UART: [kat] SHA2-512-ACC
2,533,368 UART: [kat] ECC-384
4,996,461 UART: [kat] HMAC-384Kdf
5,019,660 UART: [kat] LMS
5,549,087 UART: [kat] --
5,552,329 UART: [cold-reset] ++
5,553,294 UART: [fht] FHT @ 0x50003400
5,564,649 UART: [idev] ++
5,565,229 UART: [idev] CDI.KEYID = 6
5,566,140 UART: [idev] SUBJECT.KEYID = 7
5,567,298 UART: [idev] UDS.KEYID = 0
5,569,532 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,713,434 UART: [idev] Erasing UDS.KEYID = 0
8,076,571 UART: [idev] Sha1 KeyId Algorithm
8,099,806 UART: [idev] --
8,103,976 UART: [ldev] ++
8,104,574 UART: [ldev] CDI.KEYID = 6
8,105,489 UART: [ldev] SUBJECT.KEYID = 5
8,106,654 UART: [ldev] AUTHORITY.KEYID = 7
8,107,885 UART: [ldev] FE.KEYID = 1
8,148,950 UART: [ldev] Erasing FE.KEYID = 1
10,654,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,016 UART: [ldev] --
12,462,471 UART: [fwproc] Wait for Commands...
12,464,519 UART: [fwproc] Recv command 0x46574c44
12,466,661 UART: [fwproc] Recv'd Img size: 114360 bytes
15,868,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,941,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,010,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,328,622 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,145 UART:
192,512 UART: Running Caliptra ROM ...
193,666 UART:
193,810 UART: [state] CFI Enabled
261,155 UART: [state] LifecycleState = Unprovisioned
263,572 UART: [state] DebugLocked = No
265,468 UART: [state] WD Timer not started. Device not locked for debugging
269,257 UART: [kat] SHA2-256
459,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,916 UART: [kat] ++
470,393 UART: [kat] sha1
482,029 UART: [kat] SHA2-256
485,045 UART: [kat] SHA2-384
491,461 UART: [kat] SHA2-512-ACC
494,032 UART: [kat] ECC-384
2,946,194 UART: [kat] HMAC-384Kdf
2,971,893 UART: [kat] LMS
3,503,715 UART: [kat] --
3,507,361 UART: [cold-reset] ++
3,509,411 UART: [fht] FHT @ 0x50003400
3,519,867 UART: [idev] ++
3,520,548 UART: [idev] CDI.KEYID = 6
3,521,587 UART: [idev] SUBJECT.KEYID = 7
3,522,701 UART: [idev] UDS.KEYID = 0
3,525,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,855 UART: [idev] Erasing UDS.KEYID = 0
6,030,262 UART: [idev] Sha1 KeyId Algorithm
6,052,453 UART: [idev] --
6,058,443 UART: [ldev] ++
6,059,142 UART: [ldev] CDI.KEYID = 6
6,060,061 UART: [ldev] SUBJECT.KEYID = 5
6,061,228 UART: [ldev] AUTHORITY.KEYID = 7
6,062,467 UART: [ldev] FE.KEYID = 1
6,101,577 UART: [ldev] Erasing FE.KEYID = 1
8,609,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,550 UART: [ldev] --
10,414,988 UART: [fwproc] Wait for Commands...
10,417,412 UART: [fwproc] Recv command 0x46574c44
10,419,728 UART: [fwproc] Recv'd Img size: 114360 bytes
13,855,423 UART: ROM Fatal Error: 0x000B0028
13,859,039 >>> mbox cmd response: failed
13,859,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,859,801 >>> mbox cmd response: failed
13,860,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,860,363 >>> mbox cmd response: failed
Initializing fuses
2,070,209 writing to cptra_bootfsm_go
2,259,513 UART:
2,259,911 UART: Running Caliptra ROM ...
2,261,053 UART:
2,261,219 UART: [state] CFI Enabled
2,320,821 UART: [state] LifecycleState = Unprovisioned
2,323,257 UART: [state] DebugLocked = No
2,325,620 UART: [state] WD Timer not started. Device not locked for debugging
2,330,243 UART: [kat] SHA2-256
2,520,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,933 UART: [kat] ++
2,531,478 UART: [kat] sha1
2,542,210 UART: [kat] SHA2-256
2,545,238 UART: [kat] SHA2-384
2,550,055 UART: [kat] SHA2-512-ACC
2,552,633 UART: [kat] ECC-384
5,000,244 UART: [kat] HMAC-384Kdf
5,024,412 UART: [kat] LMS
5,556,173 UART: [kat] --
5,562,484 UART: [cold-reset] ++
5,563,822 UART: [fht] FHT @ 0x50003400
5,576,690 UART: [idev] ++
5,577,422 UART: [idev] CDI.KEYID = 6
5,578,340 UART: [idev] SUBJECT.KEYID = 7
5,579,555 UART: [idev] UDS.KEYID = 0
5,581,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,725,739 UART: [idev] Erasing UDS.KEYID = 0
8,083,500 UART: [idev] Sha1 KeyId Algorithm
8,106,784 UART: [idev] --
8,111,031 UART: [ldev] ++
8,111,730 UART: [ldev] CDI.KEYID = 6
8,112,646 UART: [ldev] SUBJECT.KEYID = 5
8,113,809 UART: [ldev] AUTHORITY.KEYID = 7
8,114,990 UART: [ldev] FE.KEYID = 1
8,155,288 UART: [ldev] Erasing FE.KEYID = 1
10,663,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,673 UART: [ldev] --
12,467,802 UART: [fwproc] Wait for Commands...
12,469,476 UART: [fwproc] Recv command 0x46574c44
12,471,735 UART: [fwproc] Recv'd Img size: 114360 bytes
15,912,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,109,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,651,636 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,441,812 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,271,013 >>> mbox cmd response: failed
14,271,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,271,893 >>> mbox cmd response: failed
14,272,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,272,456 >>> mbox cmd response: failed
Initializing fuses
2,062,213 writing to cptra_bootfsm_go
5,485,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,805,348 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,604 UART:
192,960 UART: Running Caliptra ROM ...
194,116 UART:
603,661 UART: [state] CFI Enabled
618,944 UART: [state] LifecycleState = Unprovisioned
621,318 UART: [state] DebugLocked = No
623,581 UART: [state] WD Timer not started. Device not locked for debugging
628,048 UART: [kat] SHA2-256
817,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,673 UART: [kat] ++
829,202 UART: [kat] sha1
840,783 UART: [kat] SHA2-256
843,791 UART: [kat] SHA2-384
850,416 UART: [kat] SHA2-512-ACC
853,027 UART: [kat] ECC-384
3,298,377 UART: [kat] HMAC-384Kdf
3,311,638 UART: [kat] LMS
3,843,484 UART: [kat] --
3,847,607 UART: [cold-reset] ++
3,848,947 UART: [fht] FHT @ 0x50003400
3,860,577 UART: [idev] ++
3,861,255 UART: [idev] CDI.KEYID = 6
3,862,273 UART: [idev] SUBJECT.KEYID = 7
3,863,436 UART: [idev] UDS.KEYID = 0
3,866,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,010,166 UART: [idev] Erasing UDS.KEYID = 0
6,338,809 UART: [idev] Sha1 KeyId Algorithm
6,360,961 UART: [idev] --
6,365,543 UART: [ldev] ++
6,366,277 UART: [ldev] CDI.KEYID = 6
6,367,185 UART: [ldev] SUBJECT.KEYID = 5
6,368,344 UART: [ldev] AUTHORITY.KEYID = 7
6,369,580 UART: [ldev] FE.KEYID = 1
6,379,580 UART: [ldev] Erasing FE.KEYID = 1
8,860,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,417 UART: [ldev] --
10,650,045 UART: [fwproc] Wait for Commands...
10,651,552 UART: [fwproc] Recv command 0x46574c44
10,653,810 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,507 UART: ROM Fatal Error: 0x000B0028
14,108,177 >>> mbox cmd response: failed
14,108,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,108,792 >>> mbox cmd response: failed
14,109,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,109,352 >>> mbox cmd response: failed
Initializing fuses
2,055,543 writing to cptra_bootfsm_go
2,244,838 UART:
2,245,175 UART: Running Caliptra ROM ...
2,246,314 UART:
6,333,986 UART: [state] CFI Enabled
6,350,837 UART: [state] LifecycleState = Unprovisioned
6,353,236 UART: [state] DebugLocked = No
6,355,566 UART: [state] WD Timer not started. Device not locked for debugging
6,359,902 UART: [kat] SHA2-256
6,549,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,560,560 UART: [kat] ++
6,561,080 UART: [kat] sha1
6,572,837 UART: [kat] SHA2-256
6,575,866 UART: [kat] SHA2-384
6,581,556 UART: [kat] SHA2-512-ACC
6,584,180 UART: [kat] ECC-384
9,025,873 UART: [kat] HMAC-384Kdf
9,038,323 UART: [kat] LMS
9,570,156 UART: [kat] --
9,574,966 UART: [cold-reset] ++
9,577,112 UART: [fht] FHT @ 0x50003400
9,588,955 UART: [idev] ++
9,589,628 UART: [idev] CDI.KEYID = 6
9,590,563 UART: [idev] SUBJECT.KEYID = 7
9,591,839 UART: [idev] UDS.KEYID = 0
9,594,071 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,737,733 UART: [idev] Erasing UDS.KEYID = 0
12,071,593 UART: [idev] Sha1 KeyId Algorithm
12,092,938 UART: [idev] --
12,098,137 UART: [ldev] ++
12,098,840 UART: [ldev] CDI.KEYID = 6
12,099,761 UART: [ldev] SUBJECT.KEYID = 5
12,100,927 UART: [ldev] AUTHORITY.KEYID = 7
12,102,105 UART: [ldev] FE.KEYID = 1
12,113,721 UART: [ldev] Erasing FE.KEYID = 1
14,591,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,312,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,327,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,342,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,358,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,378,924 UART: [ldev] --
16,384,468 UART: [fwproc] Wait for Commands...
16,386,566 UART: [fwproc] Recv command 0x46574c44
16,388,825 UART: [fwproc] Recv'd Img size: 114360 bytes
19,836,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,915,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,031,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,573,766 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
3,756,417 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,503,890 >>> mbox cmd response: failed
14,504,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,504,813 >>> mbox cmd response: failed
14,505,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,505,374 >>> mbox cmd response: failed
Initializing fuses
2,056,050 writing to cptra_bootfsm_go
9,116,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,324,172 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,657 UART: [kat] SHA2-256
881,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,703 UART: [kat] ++
885,855 UART: [kat] sha1
890,073 UART: [kat] SHA2-256
892,011 UART: [kat] SHA2-384
894,714 UART: [kat] SHA2-512-ACC
896,615 UART: [kat] ECC-384
902,158 UART: [kat] HMAC-384Kdf
906,570 UART: [kat] LMS
1,474,766 UART: [kat] --
1,475,377 UART: [cold-reset] ++
1,475,875 UART: [fht] Storing FHT @ 0x50003400
1,478,608 UART: [idev] ++
1,478,776 UART: [idev] CDI.KEYID = 6
1,479,136 UART: [idev] SUBJECT.KEYID = 7
1,479,560 UART: [idev] UDS.KEYID = 0
1,479,905 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,828 UART: [idev] Erasing UDS.KEYID = 0
1,503,870 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,592 UART: [idev] --
1,513,623 UART: [ldev] ++
1,513,791 UART: [ldev] CDI.KEYID = 6
1,514,154 UART: [ldev] SUBJECT.KEYID = 5
1,514,580 UART: [ldev] AUTHORITY.KEYID = 7
1,515,043 UART: [ldev] FE.KEYID = 1
1,520,493 UART: [ldev] Erasing FE.KEYID = 1
1,545,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,640 UART: [ldev] --
1,584,923 UART: [fwproc] Waiting for Commands...
1,585,770 UART: [fwproc] Received command 0x46574c44
1,586,561 UART: [fwproc] Received Image of size 114360 bytes
2,883,700 UART: ROM Fatal Error: 0x000B0028
2,884,857 >>> mbox cmd response: failed
2,884,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,863 >>> mbox cmd response: failed
2,884,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,279 UART: [kat] SHA2-256
882,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,325 UART: [kat] ++
886,477 UART: [kat] sha1
890,543 UART: [kat] SHA2-256
892,481 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,486 UART: [kat] HMAC-384Kdf
907,026 UART: [kat] LMS
1,475,222 UART: [kat] --
1,475,991 UART: [cold-reset] ++
1,476,509 UART: [fht] Storing FHT @ 0x50003400
1,479,334 UART: [idev] ++
1,479,502 UART: [idev] CDI.KEYID = 6
1,479,862 UART: [idev] SUBJECT.KEYID = 7
1,480,286 UART: [idev] UDS.KEYID = 0
1,480,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,956 UART: [idev] Erasing UDS.KEYID = 0
1,504,782 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,418 UART: [idev] --
1,514,587 UART: [ldev] ++
1,514,755 UART: [ldev] CDI.KEYID = 6
1,515,118 UART: [ldev] SUBJECT.KEYID = 5
1,515,544 UART: [ldev] AUTHORITY.KEYID = 7
1,516,007 UART: [ldev] FE.KEYID = 1
1,521,199 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,952 UART: [ldev] --
1,585,441 UART: [fwproc] Waiting for Commands...
1,586,252 UART: [fwproc] Received command 0x46574c44
1,587,043 UART: [fwproc] Received Image of size 114360 bytes
2,883,921 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,209 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,536 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,737,758 >>> mbox cmd response: failed
2,737,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,764 >>> mbox cmd response: failed
2,737,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,187 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,882 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,732 UART: [kat] SHA2-256
882,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,778 UART: [kat] ++
886,930 UART: [kat] sha1
891,218 UART: [kat] SHA2-256
893,156 UART: [kat] SHA2-384
895,807 UART: [kat] SHA2-512-ACC
897,708 UART: [kat] ECC-384
903,181 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,476,972 UART: [cold-reset] ++
1,477,480 UART: [fht] Storing FHT @ 0x50003400
1,480,349 UART: [idev] ++
1,480,517 UART: [idev] CDI.KEYID = 6
1,480,877 UART: [idev] SUBJECT.KEYID = 7
1,481,301 UART: [idev] UDS.KEYID = 0
1,481,646 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,457 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,123 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,940 UART: [ldev] Erasing FE.KEYID = 1
1,546,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,969 UART: [ldev] --
1,586,300 UART: [fwproc] Waiting for Commands...
1,587,085 UART: [fwproc] Received command 0x46574c44
1,587,876 UART: [fwproc] Received Image of size 114360 bytes
2,884,867 UART: ROM Fatal Error: 0x000B0028
2,886,024 >>> mbox cmd response: failed
2,886,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,030 >>> mbox cmd response: failed
2,886,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,182 UART: [kat] SHA2-256
882,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,228 UART: [kat] ++
886,380 UART: [kat] sha1
890,644 UART: [kat] SHA2-256
892,582 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,725 UART: [kat] HMAC-384Kdf
907,267 UART: [kat] LMS
1,475,463 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,048 UART: [fht] Storing FHT @ 0x50003400
1,479,865 UART: [idev] ++
1,480,033 UART: [idev] CDI.KEYID = 6
1,480,393 UART: [idev] SUBJECT.KEYID = 7
1,480,817 UART: [idev] UDS.KEYID = 0
1,481,162 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,623 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,201 UART: [idev] --
1,515,224 UART: [ldev] ++
1,515,392 UART: [ldev] CDI.KEYID = 6
1,515,755 UART: [ldev] SUBJECT.KEYID = 5
1,516,181 UART: [ldev] AUTHORITY.KEYID = 7
1,516,644 UART: [ldev] FE.KEYID = 1
1,521,932 UART: [ldev] Erasing FE.KEYID = 1
1,546,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,441 UART: [ldev] --
1,585,950 UART: [fwproc] Waiting for Commands...
1,586,601 UART: [fwproc] Received command 0x46574c44
1,587,392 UART: [fwproc] Received Image of size 114360 bytes
2,884,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,723 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,286 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,927 >>> mbox cmd response: failed
2,738,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,933 >>> mbox cmd response: failed
2,738,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,222 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,569 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
893,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,619 UART: [kat] ++
897,771 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
917,968 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,172,081 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,748 UART: [idev] Erasing UDS.KEYID = 0
1,200,981 UART: [idev] Sha1 KeyId Algorithm
1,209,507 UART: [idev] --
1,210,431 UART: [ldev] ++
1,210,599 UART: [ldev] CDI.KEYID = 6
1,210,962 UART: [ldev] SUBJECT.KEYID = 5
1,211,388 UART: [ldev] AUTHORITY.KEYID = 7
1,211,851 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,283,042 UART: [fwproc] Wait for Commands...
1,283,720 UART: [fwproc] Recv command 0x46574c44
1,284,448 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,465 UART: ROM Fatal Error: 0x000B0028
2,582,622 >>> mbox cmd response: failed
2,582,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,628 >>> mbox cmd response: failed
2,582,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
892,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,981 UART: [kat] ++
897,133 UART: [kat] sha1
901,527 UART: [kat] SHA2-256
903,467 UART: [kat] SHA2-384
906,100 UART: [kat] SHA2-512-ACC
908,001 UART: [kat] ECC-384
918,144 UART: [kat] HMAC-384Kdf
922,574 UART: [kat] LMS
1,170,902 UART: [kat] --
1,171,819 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,069 UART: [idev] Sha1 KeyId Algorithm
1,209,473 UART: [idev] --
1,210,495 UART: [ldev] ++
1,210,663 UART: [ldev] CDI.KEYID = 6
1,211,026 UART: [ldev] SUBJECT.KEYID = 5
1,211,452 UART: [ldev] AUTHORITY.KEYID = 7
1,211,915 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,242,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,734 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,111 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,436,307 >>> mbox cmd response: failed
2,436,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,313 >>> mbox cmd response: failed
2,436,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,708 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,765 UART: [kat] HMAC-384Kdf
923,565 UART: [kat] LMS
1,171,893 UART: [kat] --
1,172,956 UART: [cold-reset] ++
1,173,494 UART: [fht] FHT @ 0x50003400
1,176,033 UART: [idev] ++
1,176,201 UART: [idev] CDI.KEYID = 6
1,176,561 UART: [idev] SUBJECT.KEYID = 7
1,176,985 UART: [idev] UDS.KEYID = 0
1,177,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,199 UART: [idev] Erasing UDS.KEYID = 0
1,202,334 UART: [idev] Sha1 KeyId Algorithm
1,210,892 UART: [idev] --
1,211,920 UART: [ldev] ++
1,212,088 UART: [ldev] CDI.KEYID = 6
1,212,451 UART: [ldev] SUBJECT.KEYID = 5
1,212,877 UART: [ldev] AUTHORITY.KEYID = 7
1,213,340 UART: [ldev] FE.KEYID = 1
1,218,508 UART: [ldev] Erasing FE.KEYID = 1
1,245,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,974 UART: [ldev] --
1,284,369 UART: [fwproc] Wait for Commands...
1,285,093 UART: [fwproc] Recv command 0x46574c44
1,285,821 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,688 UART: ROM Fatal Error: 0x000B0028
2,583,845 >>> mbox cmd response: failed
2,583,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,851 >>> mbox cmd response: failed
2,583,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,583,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,384 UART: [kat] SHA2-256
904,324 UART: [kat] SHA2-384
907,227 UART: [kat] SHA2-512-ACC
909,128 UART: [kat] ECC-384
918,463 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,896 UART: [fht] FHT @ 0x50003400
1,175,583 UART: [idev] ++
1,175,751 UART: [idev] CDI.KEYID = 6
1,176,111 UART: [idev] SUBJECT.KEYID = 7
1,176,535 UART: [idev] UDS.KEYID = 0
1,176,880 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,247 UART: [idev] Erasing UDS.KEYID = 0
1,201,688 UART: [idev] Sha1 KeyId Algorithm
1,210,288 UART: [idev] --
1,211,364 UART: [ldev] ++
1,211,532 UART: [ldev] CDI.KEYID = 6
1,211,895 UART: [ldev] SUBJECT.KEYID = 5
1,212,321 UART: [ldev] AUTHORITY.KEYID = 7
1,212,784 UART: [ldev] FE.KEYID = 1
1,217,948 UART: [ldev] Erasing FE.KEYID = 1
1,244,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,060 UART: [ldev] --
1,283,573 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,955 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,620 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,358 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,436,278 >>> mbox cmd response: failed
2,436,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,284 >>> mbox cmd response: failed
2,436,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,173 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,289 UART: [kat] ++
895,441 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,841 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,173,793 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,511 UART: [idev] --
1,208,570 UART: [ldev] ++
1,208,738 UART: [ldev] CDI.KEYID = 6
1,209,102 UART: [ldev] SUBJECT.KEYID = 5
1,209,529 UART: [ldev] AUTHORITY.KEYID = 7
1,209,992 UART: [ldev] FE.KEYID = 1
1,214,960 UART: [ldev] Erasing FE.KEYID = 1
1,240,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,524 UART: [fwproc] Wait for Commands...
1,281,163 UART: [fwproc] Recv command 0x46574c44
1,281,896 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,842 UART: ROM Fatal Error: 0x000B0028
2,578,999 >>> mbox cmd response: failed
2,578,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,005 >>> mbox cmd response: failed
2,579,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,470 UART: [kat] HMAC-384Kdf
920,060 UART: [kat] LMS
1,168,372 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,865 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,173,965 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,577 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,214,752 UART: [ldev] Erasing FE.KEYID = 1
1,240,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,370 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x46574c44
1,281,732 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,825 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,051 >>> mbox cmd response: failed
2,434,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,057 >>> mbox cmd response: failed
2,434,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,806 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,449 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,174,788 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,701 UART: [ldev] SUBJECT.KEYID = 5
1,210,128 UART: [ldev] AUTHORITY.KEYID = 7
1,210,591 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,147 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,686 UART: ROM Fatal Error: 0x000B0028
2,582,843 >>> mbox cmd response: failed
2,582,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,849 >>> mbox cmd response: failed
2,582,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,174,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,283,037 UART: [fwproc] Wait for Commands...
1,283,766 UART: [fwproc] Recv command 0x46574c44
1,284,499 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,890 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,592 >>> mbox cmd response: failed
2,432,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,598 >>> mbox cmd response: failed
2,432,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,529 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,662 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,208 UART:
192,571 UART: Running Caliptra ROM ...
193,777 UART:
193,932 UART: [state] CFI Enabled
261,139 UART: [state] LifecycleState = Unprovisioned
263,095 UART: [state] DebugLocked = No
265,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,648 UART: [kat] SHA2-256
440,388 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,878 UART: [kat] ++
451,351 UART: [kat] sha1
461,026 UART: [kat] SHA2-256
463,718 UART: [kat] SHA2-384
469,328 UART: [kat] SHA2-512-ACC
471,670 UART: [kat] ECC-384
2,765,415 UART: [kat] HMAC-384Kdf
2,796,641 UART: [kat] LMS
3,986,949 UART: [kat] --
3,993,505 UART: [cold-reset] ++
3,995,120 UART: [fht] Storing FHT @ 0x50003400
4,006,006 UART: [idev] ++
4,006,581 UART: [idev] CDI.KEYID = 6
4,007,526 UART: [idev] SUBJECT.KEYID = 7
4,008,743 UART: [idev] UDS.KEYID = 0
4,011,272 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,982 UART: [idev] Erasing UDS.KEYID = 0
7,339,929 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,389 UART: [idev] --
7,365,083 UART: [ldev] ++
7,365,661 UART: [ldev] CDI.KEYID = 6
7,366,548 UART: [ldev] SUBJECT.KEYID = 5
7,367,735 UART: [ldev] AUTHORITY.KEYID = 7
7,369,100 UART: [ldev] FE.KEYID = 1
7,396,895 UART: [ldev] Erasing FE.KEYID = 1
10,731,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,280 UART: [ldev] --
13,113,771 UART: [fwproc] Waiting for Commands...
13,116,416 UART: [fwproc] Received command 0x46574c44
13,118,607 UART: [fwproc] Received Image of size 114036 bytes
17,161,065 UART: ROM Fatal Error: 0x000B0029
17,164,478 >>> mbox cmd response: failed
17,164,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,165,260 >>> mbox cmd response: failed
17,165,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,165,841 >>> mbox cmd response: failed
Initializing fuses
2,055,483 writing to cptra_bootfsm_go
2,244,793 UART:
2,245,143 UART: Running Caliptra ROM ...
2,246,278 UART:
2,246,447 UART: [state] CFI Enabled
2,316,000 UART: [state] LifecycleState = Unprovisioned
2,317,925 UART: [state] DebugLocked = No
2,320,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,937 UART: [kat] SHA2-256
2,494,653 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,189 UART: [kat] ++
2,505,652 UART: [kat] sha1
2,515,644 UART: [kat] SHA2-256
2,518,289 UART: [kat] SHA2-384
2,523,255 UART: [kat] SHA2-512-ACC
2,525,602 UART: [kat] ECC-384
4,816,505 UART: [kat] HMAC-384Kdf
4,847,961 UART: [kat] LMS
6,038,271 UART: [kat] --
6,042,829 UART: [cold-reset] ++
6,044,557 UART: [fht] Storing FHT @ 0x50003400
6,056,946 UART: [idev] ++
6,057,520 UART: [idev] CDI.KEYID = 6
6,058,410 UART: [idev] SUBJECT.KEYID = 7
6,059,683 UART: [idev] UDS.KEYID = 0
6,061,970 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,205,621 UART: [idev] Erasing UDS.KEYID = 0
9,393,568 UART: [idev] Using Sha1 for KeyId Algorithm
9,416,813 UART: [idev] --
9,420,811 UART: [ldev] ++
9,421,384 UART: [ldev] CDI.KEYID = 6
9,422,347 UART: [ldev] SUBJECT.KEYID = 5
9,423,621 UART: [ldev] AUTHORITY.KEYID = 7
9,424,801 UART: [ldev] FE.KEYID = 1
9,452,268 UART: [ldev] Erasing FE.KEYID = 1
12,783,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,076,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,090,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,105,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,120,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,138,267 UART: [ldev] --
15,142,245 UART: [fwproc] Waiting for Commands...
15,144,888 UART: [fwproc] Received command 0x46574c44
15,147,078 UART: [fwproc] Received Image of size 114036 bytes
19,200,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,270,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,339,460 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,655,919 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
3,808,662 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,158,216 >>> mbox cmd response: failed
17,158,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,159,157 >>> mbox cmd response: failed
17,159,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,159,722 >>> mbox cmd response: failed
Initializing fuses
2,057,738 writing to cptra_bootfsm_go
5,859,982 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,907,832 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,406 UART:
192,855 UART: Running Caliptra ROM ...
193,965 UART:
603,592 UART: [state] CFI Enabled
619,463 UART: [state] LifecycleState = Unprovisioned
621,439 UART: [state] DebugLocked = No
623,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,847 UART: [kat] SHA2-256
798,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,142 UART: [kat] ++
809,631 UART: [kat] sha1
820,088 UART: [kat] SHA2-256
822,829 UART: [kat] SHA2-384
827,205 UART: [kat] SHA2-512-ACC
829,600 UART: [kat] ECC-384
3,114,845 UART: [kat] HMAC-384Kdf
3,127,085 UART: [kat] LMS
4,317,161 UART: [kat] --
4,322,692 UART: [cold-reset] ++
4,324,746 UART: [fht] Storing FHT @ 0x50003400
4,336,015 UART: [idev] ++
4,336,646 UART: [idev] CDI.KEYID = 6
4,337,537 UART: [idev] SUBJECT.KEYID = 7
4,338,754 UART: [idev] UDS.KEYID = 0
4,341,286 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,663 UART: [idev] Erasing UDS.KEYID = 0
7,624,597 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,869 UART: [idev] --
7,652,409 UART: [ldev] ++
7,652,977 UART: [ldev] CDI.KEYID = 6
7,653,913 UART: [ldev] SUBJECT.KEYID = 5
7,655,180 UART: [ldev] AUTHORITY.KEYID = 7
7,656,414 UART: [ldev] FE.KEYID = 1
7,667,146 UART: [ldev] Erasing FE.KEYID = 1
10,955,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,083 UART: [ldev] --
13,316,953 UART: [fwproc] Waiting for Commands...
13,319,116 UART: [fwproc] Received command 0x46574c44
13,321,305 UART: [fwproc] Received Image of size 114036 bytes
17,374,767 UART: ROM Fatal Error: 0x000B0029
17,378,173 >>> mbox cmd response: failed
17,378,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,378,878 >>> mbox cmd response: failed
17,379,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,379,485 >>> mbox cmd response: failed
Initializing fuses
2,055,413 writing to cptra_bootfsm_go
2,244,747 UART:
2,245,104 UART: Running Caliptra ROM ...
2,246,254 UART:
3,078,929 UART: [state] CFI Enabled
3,088,434 UART: [state] LifecycleState = Unprovisioned
3,090,352 UART: [state] DebugLocked = No
3,091,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,097,162 UART: [kat] SHA2-256
3,266,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,277,438 UART: [kat] ++
3,277,903 UART: [kat] sha1
3,288,847 UART: [kat] SHA2-256
3,291,548 UART: [kat] SHA2-384
3,296,890 UART: [kat] SHA2-512-ACC
3,299,250 UART: [kat] ECC-384
5,582,850 UART: [kat] HMAC-384Kdf
5,595,252 UART: [kat] LMS
6,785,351 UART: [kat] --
6,789,268 UART: [cold-reset] ++
6,791,261 UART: [fht] Storing FHT @ 0x50003400
6,802,236 UART: [idev] ++
6,802,824 UART: [idev] CDI.KEYID = 6
6,803,740 UART: [idev] SUBJECT.KEYID = 7
6,805,015 UART: [idev] UDS.KEYID = 0
6,807,328 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,950,511 UART: [idev] Erasing UDS.KEYID = 0
10,095,431 UART: [idev] Using Sha1 for KeyId Algorithm
10,116,880 UART: [idev] --
10,120,768 UART: [ldev] ++
10,121,340 UART: [ldev] CDI.KEYID = 6
10,122,307 UART: [ldev] SUBJECT.KEYID = 5
10,123,512 UART: [ldev] AUTHORITY.KEYID = 7
10,124,771 UART: [ldev] FE.KEYID = 1
10,136,393 UART: [ldev] Erasing FE.KEYID = 1
13,426,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,720,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,734,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,749,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,764,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,782,578 UART: [ldev] --
15,788,005 UART: [fwproc] Waiting for Commands...
15,791,134 UART: [fwproc] Received command 0x46574c44
15,793,325 UART: [fwproc] Received Image of size 114036 bytes
19,838,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,915,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,983,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,300,124 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
4,127,867 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,325,306 >>> mbox cmd response: failed
17,325,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,326,165 >>> mbox cmd response: failed
17,326,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,326,723 >>> mbox cmd response: failed
Initializing fuses
2,055,904 writing to cptra_bootfsm_go
6,669,257 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,619,302 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,389 UART:
192,747 UART: Running Caliptra ROM ...
193,954 UART:
194,103 UART: [state] CFI Enabled
264,524 UART: [state] LifecycleState = Unprovisioned
266,441 UART: [state] DebugLocked = No
268,957 UART: [state] WD Timer not started. Device not locked for debugging
273,062 UART: [kat] SHA2-256
452,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,731 UART: [kat] ++
464,374 UART: [kat] sha1
475,638 UART: [kat] SHA2-256
478,712 UART: [kat] SHA2-384
483,882 UART: [kat] SHA2-512-ACC
486,822 UART: [kat] ECC-384
2,945,050 UART: [kat] HMAC-384Kdf
2,968,628 UART: [kat] LMS
3,498,049 UART: [kat] --
3,504,235 UART: [cold-reset] ++
3,505,284 UART: [fht] FHT @ 0x50003400
3,515,241 UART: [idev] ++
3,515,817 UART: [idev] CDI.KEYID = 6
3,516,732 UART: [idev] SUBJECT.KEYID = 7
3,517,948 UART: [idev] UDS.KEYID = 0
3,520,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,714 UART: [idev] Erasing UDS.KEYID = 0
6,022,133 UART: [idev] Sha1 KeyId Algorithm
6,044,831 UART: [idev] --
6,048,619 UART: [ldev] ++
6,049,194 UART: [ldev] CDI.KEYID = 6
6,050,106 UART: [ldev] SUBJECT.KEYID = 5
6,051,329 UART: [ldev] AUTHORITY.KEYID = 7
6,052,578 UART: [ldev] FE.KEYID = 1
6,097,964 UART: [ldev] Erasing FE.KEYID = 1
8,598,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,227 UART: [ldev] --
10,409,702 UART: [fwproc] Wait for Commands...
10,411,155 UART: [fwproc] Recv command 0x46574c44
10,413,259 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,761 UART: ROM Fatal Error: 0x000B0029
13,819,888 >>> mbox cmd response: failed
13,820,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,578 >>> mbox cmd response: failed
13,820,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,821,136 >>> mbox cmd response: failed
Initializing fuses
2,052,884 writing to cptra_bootfsm_go
2,242,173 UART:
2,242,705 UART: Running Caliptra ROM ...
2,243,866 UART:
2,244,058 UART: [state] CFI Enabled
2,309,333 UART: [state] LifecycleState = Unprovisioned
2,311,173 UART: [state] DebugLocked = No
2,312,612 UART: [state] WD Timer not started. Device not locked for debugging
2,316,629 UART: [kat] SHA2-256
2,495,768 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,322 UART: [kat] ++
2,507,871 UART: [kat] sha1
2,518,871 UART: [kat] SHA2-256
2,521,889 UART: [kat] SHA2-384
2,528,524 UART: [kat] SHA2-512-ACC
2,531,478 UART: [kat] ECC-384
4,996,775 UART: [kat] HMAC-384Kdf
5,017,278 UART: [kat] LMS
5,546,738 UART: [kat] --
5,550,411 UART: [cold-reset] ++
5,551,825 UART: [fht] FHT @ 0x50003400
5,562,809 UART: [idev] ++
5,563,375 UART: [idev] CDI.KEYID = 6
5,564,343 UART: [idev] SUBJECT.KEYID = 7
5,565,504 UART: [idev] UDS.KEYID = 0
5,567,776 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,726 UART: [idev] Erasing UDS.KEYID = 0
8,072,606 UART: [idev] Sha1 KeyId Algorithm
8,095,635 UART: [idev] --
8,100,642 UART: [ldev] ++
8,101,223 UART: [ldev] CDI.KEYID = 6
8,102,133 UART: [ldev] SUBJECT.KEYID = 5
8,103,295 UART: [ldev] AUTHORITY.KEYID = 7
8,104,526 UART: [ldev] FE.KEYID = 1
8,145,802 UART: [ldev] Erasing FE.KEYID = 1
10,646,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,026 UART: [ldev] --
12,459,270 UART: [fwproc] Wait for Commands...
12,462,229 UART: [fwproc] Recv command 0x46574c44
12,464,268 UART: [fwproc] Recv'd Img size: 114360 bytes
15,861,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,938,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,007,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,325,327 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,208 UART:
192,573 UART: Running Caliptra ROM ...
193,777 UART:
193,932 UART: [state] CFI Enabled
262,017 UART: [state] LifecycleState = Unprovisioned
264,439 UART: [state] DebugLocked = No
265,825 UART: [state] WD Timer not started. Device not locked for debugging
270,153 UART: [kat] SHA2-256
460,035 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,820 UART: [kat] ++
471,310 UART: [kat] sha1
483,214 UART: [kat] SHA2-256
486,224 UART: [kat] SHA2-384
492,056 UART: [kat] SHA2-512-ACC
494,617 UART: [kat] ECC-384
2,943,870 UART: [kat] HMAC-384Kdf
2,969,232 UART: [kat] LMS
3,500,965 UART: [kat] --
3,504,949 UART: [cold-reset] ++
3,505,968 UART: [fht] FHT @ 0x50003400
3,518,354 UART: [idev] ++
3,519,028 UART: [idev] CDI.KEYID = 6
3,519,995 UART: [idev] SUBJECT.KEYID = 7
3,521,206 UART: [idev] UDS.KEYID = 0
3,523,838 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,946 UART: [idev] Erasing UDS.KEYID = 0
6,025,741 UART: [idev] Sha1 KeyId Algorithm
6,048,673 UART: [idev] --
6,052,619 UART: [ldev] ++
6,053,322 UART: [ldev] CDI.KEYID = 6
6,054,237 UART: [ldev] SUBJECT.KEYID = 5
6,055,398 UART: [ldev] AUTHORITY.KEYID = 7
6,056,891 UART: [ldev] FE.KEYID = 1
6,098,012 UART: [ldev] Erasing FE.KEYID = 1
8,606,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,899 UART: [ldev] --
10,412,060 UART: [fwproc] Wait for Commands...
10,413,887 UART: [fwproc] Recv command 0x46574c44
10,416,199 UART: [fwproc] Recv'd Img size: 114360 bytes
13,864,054 UART: ROM Fatal Error: 0x000B0029
13,867,664 >>> mbox cmd response: failed
13,868,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,868,452 >>> mbox cmd response: failed
13,868,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,869,010 >>> mbox cmd response: failed
Initializing fuses
2,055,583 writing to cptra_bootfsm_go
2,244,974 UART:
2,245,343 UART: Running Caliptra ROM ...
2,246,419 UART:
2,246,585 UART: [state] CFI Enabled
2,304,238 UART: [state] LifecycleState = Unprovisioned
2,306,669 UART: [state] DebugLocked = No
2,309,221 UART: [state] WD Timer not started. Device not locked for debugging
2,314,277 UART: [kat] SHA2-256
2,504,165 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,514,939 UART: [kat] ++
2,515,402 UART: [kat] sha1
2,528,343 UART: [kat] SHA2-256
2,531,369 UART: [kat] SHA2-384
2,538,662 UART: [kat] SHA2-512-ACC
2,541,231 UART: [kat] ECC-384
4,991,014 UART: [kat] HMAC-384Kdf
5,014,312 UART: [kat] LMS
5,546,086 UART: [kat] --
5,551,737 UART: [cold-reset] ++
5,553,428 UART: [fht] FHT @ 0x50003400
5,563,714 UART: [idev] ++
5,564,389 UART: [idev] CDI.KEYID = 6
5,565,357 UART: [idev] SUBJECT.KEYID = 7
5,566,573 UART: [idev] UDS.KEYID = 0
5,568,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,712,662 UART: [idev] Erasing UDS.KEYID = 0
8,091,295 UART: [idev] Sha1 KeyId Algorithm
8,113,172 UART: [idev] --
8,116,607 UART: [ldev] ++
8,117,298 UART: [ldev] CDI.KEYID = 6
8,118,183 UART: [ldev] SUBJECT.KEYID = 5
8,119,394 UART: [ldev] AUTHORITY.KEYID = 7
8,120,625 UART: [ldev] FE.KEYID = 1
8,164,169 UART: [ldev] Erasing FE.KEYID = 1
10,671,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,265 UART: [ldev] --
12,478,250 UART: [fwproc] Wait for Commands...
12,480,725 UART: [fwproc] Recv command 0x46574c44
12,483,041 UART: [fwproc] Recv'd Img size: 114360 bytes
15,928,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,011,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,127,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,669,188 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,439,461 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,279,879 >>> mbox cmd response: failed
14,280,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,280,781 >>> mbox cmd response: failed
14,281,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,281,369 >>> mbox cmd response: failed
Initializing fuses
2,058,210 writing to cptra_bootfsm_go
5,496,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,791,233 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,427 UART:
192,792 UART: Running Caliptra ROM ...
193,987 UART:
603,783 UART: [state] CFI Enabled
613,713 UART: [state] LifecycleState = Unprovisioned
616,115 UART: [state] DebugLocked = No
618,957 UART: [state] WD Timer not started. Device not locked for debugging
623,652 UART: [kat] SHA2-256
813,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,254 UART: [kat] ++
824,787 UART: [kat] sha1
834,941 UART: [kat] SHA2-256
837,955 UART: [kat] SHA2-384
843,393 UART: [kat] SHA2-512-ACC
845,950 UART: [kat] ECC-384
3,288,788 UART: [kat] HMAC-384Kdf
3,301,057 UART: [kat] LMS
3,832,885 UART: [kat] --
3,837,750 UART: [cold-reset] ++
3,840,223 UART: [fht] FHT @ 0x50003400
3,851,419 UART: [idev] ++
3,852,099 UART: [idev] CDI.KEYID = 6
3,853,078 UART: [idev] SUBJECT.KEYID = 7
3,854,241 UART: [idev] UDS.KEYID = 0
3,857,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,001,006 UART: [idev] Erasing UDS.KEYID = 0
6,334,078 UART: [idev] Sha1 KeyId Algorithm
6,357,652 UART: [idev] --
6,361,871 UART: [ldev] ++
6,362,550 UART: [ldev] CDI.KEYID = 6
6,363,441 UART: [ldev] SUBJECT.KEYID = 5
6,364,653 UART: [ldev] AUTHORITY.KEYID = 7
6,365,885 UART: [ldev] FE.KEYID = 1
6,376,443 UART: [ldev] Erasing FE.KEYID = 1
8,852,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,540 UART: [ldev] --
10,643,161 UART: [fwproc] Wait for Commands...
10,646,142 UART: [fwproc] Recv command 0x46574c44
10,648,456 UART: [fwproc] Recv'd Img size: 114360 bytes
14,087,741 UART: ROM Fatal Error: 0x000B0029
14,091,371 >>> mbox cmd response: failed
14,091,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,092,108 >>> mbox cmd response: failed
14,092,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,092,667 >>> mbox cmd response: failed
Initializing fuses
2,054,379 writing to cptra_bootfsm_go
2,243,714 UART:
2,244,077 UART: Running Caliptra ROM ...
2,245,167 UART:
6,359,615 UART: [state] CFI Enabled
6,374,919 UART: [state] LifecycleState = Unprovisioned
6,377,298 UART: [state] DebugLocked = No
6,379,884 UART: [state] WD Timer not started. Device not locked for debugging
6,384,060 UART: [kat] SHA2-256
6,573,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,584,728 UART: [kat] ++
6,585,328 UART: [kat] sha1
6,596,276 UART: [kat] SHA2-256
6,599,286 UART: [kat] SHA2-384
6,604,842 UART: [kat] SHA2-512-ACC
6,607,407 UART: [kat] ECC-384
9,050,353 UART: [kat] HMAC-384Kdf
9,064,359 UART: [kat] LMS
9,596,186 UART: [kat] --
9,602,773 UART: [cold-reset] ++
9,604,717 UART: [fht] FHT @ 0x50003400
9,615,771 UART: [idev] ++
9,616,450 UART: [idev] CDI.KEYID = 6
9,617,474 UART: [idev] SUBJECT.KEYID = 7
9,618,581 UART: [idev] UDS.KEYID = 0
9,620,813 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,764,547 UART: [idev] Erasing UDS.KEYID = 0
12,099,359 UART: [idev] Sha1 KeyId Algorithm
12,122,698 UART: [idev] --
12,127,090 UART: [ldev] ++
12,127,778 UART: [ldev] CDI.KEYID = 6
12,128,687 UART: [ldev] SUBJECT.KEYID = 5
12,129,845 UART: [ldev] AUTHORITY.KEYID = 7
12,131,075 UART: [ldev] FE.KEYID = 1
12,141,808 UART: [ldev] Erasing FE.KEYID = 1
14,617,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,334,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,350,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,365,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,380,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,401,210 UART: [ldev] --
16,405,890 UART: [fwproc] Wait for Commands...
16,407,555 UART: [fwproc] Recv command 0x46574c44
16,409,813 UART: [fwproc] Recv'd Img size: 114360 bytes
19,854,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,931,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,047,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,590,734 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,756,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,493,804 >>> mbox cmd response: failed
14,494,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,494,776 >>> mbox cmd response: failed
14,495,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,495,350 >>> mbox cmd response: failed
Initializing fuses
2,060,787 writing to cptra_bootfsm_go
9,125,154 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,322,895 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,014 UART: [kat] SHA2-512-ACC
896,915 UART: [kat] ECC-384
902,256 UART: [kat] HMAC-384Kdf
906,730 UART: [kat] LMS
1,474,926 UART: [kat] --
1,475,667 UART: [cold-reset] ++
1,476,163 UART: [fht] Storing FHT @ 0x50003400
1,478,904 UART: [idev] ++
1,479,072 UART: [idev] CDI.KEYID = 6
1,479,432 UART: [idev] SUBJECT.KEYID = 7
1,479,856 UART: [idev] UDS.KEYID = 0
1,480,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,566 UART: [idev] Erasing UDS.KEYID = 0
1,503,816 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,388 UART: [idev] --
1,513,471 UART: [ldev] ++
1,513,639 UART: [ldev] CDI.KEYID = 6
1,514,002 UART: [ldev] SUBJECT.KEYID = 5
1,514,428 UART: [ldev] AUTHORITY.KEYID = 7
1,514,891 UART: [ldev] FE.KEYID = 1
1,520,119 UART: [ldev] Erasing FE.KEYID = 1
1,544,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,652 UART: [ldev] --
1,583,919 UART: [fwproc] Waiting for Commands...
1,584,750 UART: [fwproc] Received command 0x46574c44
1,585,541 UART: [fwproc] Received Image of size 114360 bytes
2,881,962 UART: ROM Fatal Error: 0x000B0029
2,883,119 >>> mbox cmd response: failed
2,883,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,125 >>> mbox cmd response: failed
2,883,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,391 UART: [kat] SHA2-256
882,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,437 UART: [kat] ++
886,589 UART: [kat] sha1
890,979 UART: [kat] SHA2-256
892,917 UART: [kat] SHA2-384
895,796 UART: [kat] SHA2-512-ACC
897,697 UART: [kat] ECC-384
903,520 UART: [kat] HMAC-384Kdf
908,278 UART: [kat] LMS
1,476,474 UART: [kat] --
1,477,565 UART: [cold-reset] ++
1,477,985 UART: [fht] Storing FHT @ 0x50003400
1,480,800 UART: [idev] ++
1,480,968 UART: [idev] CDI.KEYID = 6
1,481,328 UART: [idev] SUBJECT.KEYID = 7
1,481,752 UART: [idev] UDS.KEYID = 0
1,482,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,518 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,912 UART: [idev] --
1,516,175 UART: [ldev] ++
1,516,343 UART: [ldev] CDI.KEYID = 6
1,516,706 UART: [ldev] SUBJECT.KEYID = 5
1,517,132 UART: [ldev] AUTHORITY.KEYID = 7
1,517,595 UART: [ldev] FE.KEYID = 1
1,522,797 UART: [ldev] Erasing FE.KEYID = 1
1,548,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,532 UART: [ldev] --
1,587,031 UART: [fwproc] Waiting for Commands...
1,587,786 UART: [fwproc] Received command 0x46574c44
1,588,577 UART: [fwproc] Received Image of size 114360 bytes
2,886,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,145 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,524 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,736,712 >>> mbox cmd response: failed
2,736,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,718 >>> mbox cmd response: failed
2,736,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,217 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,218 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,663 UART: [kat] HMAC-384Kdf
907,193 UART: [kat] LMS
1,475,389 UART: [kat] --
1,476,350 UART: [cold-reset] ++
1,476,894 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,613 UART: [idev] Erasing UDS.KEYID = 0
1,505,565 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,181 UART: [idev] --
1,515,148 UART: [ldev] ++
1,515,316 UART: [ldev] CDI.KEYID = 6
1,515,679 UART: [ldev] SUBJECT.KEYID = 5
1,516,105 UART: [ldev] AUTHORITY.KEYID = 7
1,516,568 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,547,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,433 UART: [ldev] --
1,586,810 UART: [fwproc] Waiting for Commands...
1,587,551 UART: [fwproc] Received command 0x46574c44
1,588,342 UART: [fwproc] Received Image of size 114360 bytes
2,885,193 UART: ROM Fatal Error: 0x000B0029
2,886,350 >>> mbox cmd response: failed
2,886,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,356 >>> mbox cmd response: failed
2,886,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,886,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,889 UART: [kat] HMAC-384Kdf
907,565 UART: [kat] LMS
1,475,761 UART: [kat] --
1,476,722 UART: [cold-reset] ++
1,477,238 UART: [fht] Storing FHT @ 0x50003400
1,480,141 UART: [idev] ++
1,480,309 UART: [idev] CDI.KEYID = 6
1,480,669 UART: [idev] SUBJECT.KEYID = 7
1,481,093 UART: [idev] UDS.KEYID = 0
1,481,438 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,506,387 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,121 UART: [idev] --
1,516,092 UART: [ldev] ++
1,516,260 UART: [ldev] CDI.KEYID = 6
1,516,623 UART: [ldev] SUBJECT.KEYID = 5
1,517,049 UART: [ldev] AUTHORITY.KEYID = 7
1,517,512 UART: [ldev] FE.KEYID = 1
1,523,030 UART: [ldev] Erasing FE.KEYID = 1
1,548,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,031 UART: [ldev] --
1,587,504 UART: [fwproc] Waiting for Commands...
1,588,343 UART: [fwproc] Received command 0x46574c44
1,589,134 UART: [fwproc] Received Image of size 114360 bytes
2,886,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,699 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,738,459 >>> mbox cmd response: failed
2,738,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,465 >>> mbox cmd response: failed
2,738,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,831 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
917,944 UART: [kat] HMAC-384Kdf
922,552 UART: [kat] LMS
1,170,880 UART: [kat] --
1,171,533 UART: [cold-reset] ++
1,171,943 UART: [fht] FHT @ 0x50003400
1,174,614 UART: [idev] ++
1,174,782 UART: [idev] CDI.KEYID = 6
1,175,142 UART: [idev] SUBJECT.KEYID = 7
1,175,566 UART: [idev] UDS.KEYID = 0
1,175,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,386 UART: [idev] Erasing UDS.KEYID = 0
1,200,501 UART: [idev] Sha1 KeyId Algorithm
1,208,879 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,488 UART: [ldev] SUBJECT.KEYID = 5
1,210,914 UART: [ldev] AUTHORITY.KEYID = 7
1,211,377 UART: [ldev] FE.KEYID = 1
1,216,725 UART: [ldev] Erasing FE.KEYID = 1
1,242,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,595 UART: ROM Fatal Error: 0x000B0029
2,581,752 >>> mbox cmd response: failed
2,581,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,758 >>> mbox cmd response: failed
2,581,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
917,870 UART: [kat] HMAC-384Kdf
922,444 UART: [kat] LMS
1,170,772 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,181 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,082 UART: [idev] Erasing UDS.KEYID = 0
1,201,065 UART: [idev] Sha1 KeyId Algorithm
1,209,533 UART: [idev] --
1,210,657 UART: [ldev] ++
1,210,825 UART: [ldev] CDI.KEYID = 6
1,211,188 UART: [ldev] SUBJECT.KEYID = 5
1,211,614 UART: [ldev] AUTHORITY.KEYID = 7
1,212,077 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,637 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,736 UART: [fwproc] Recv command 0x46574c44
1,284,464 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,191 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,027 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,436,251 >>> mbox cmd response: failed
2,436,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,257 >>> mbox cmd response: failed
2,436,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,062 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,747 UART: [kat] HMAC-384Kdf
923,479 UART: [kat] LMS
1,171,807 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,882 UART: [fht] FHT @ 0x50003400
1,175,413 UART: [idev] ++
1,175,581 UART: [idev] CDI.KEYID = 6
1,175,941 UART: [idev] SUBJECT.KEYID = 7
1,176,365 UART: [idev] UDS.KEYID = 0
1,176,710 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,293 UART: [idev] Erasing UDS.KEYID = 0
1,201,506 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,211,310 UART: [ldev] ++
1,211,478 UART: [ldev] CDI.KEYID = 6
1,211,841 UART: [ldev] SUBJECT.KEYID = 5
1,212,267 UART: [ldev] AUTHORITY.KEYID = 7
1,212,730 UART: [ldev] FE.KEYID = 1
1,218,224 UART: [ldev] Erasing FE.KEYID = 1
1,244,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,844 UART: [ldev] --
1,284,237 UART: [fwproc] Wait for Commands...
1,285,029 UART: [fwproc] Recv command 0x46574c44
1,285,757 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,114 UART: ROM Fatal Error: 0x000B0029
2,584,271 >>> mbox cmd response: failed
2,584,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,277 >>> mbox cmd response: failed
2,584,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,584,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
894,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,150 UART: [kat] ++
898,302 UART: [kat] sha1
902,468 UART: [kat] SHA2-256
904,408 UART: [kat] SHA2-384
907,275 UART: [kat] SHA2-512-ACC
909,176 UART: [kat] ECC-384
918,997 UART: [kat] HMAC-384Kdf
923,539 UART: [kat] LMS
1,171,867 UART: [kat] --
1,172,958 UART: [cold-reset] ++
1,173,298 UART: [fht] FHT @ 0x50003400
1,176,027 UART: [idev] ++
1,176,195 UART: [idev] CDI.KEYID = 6
1,176,555 UART: [idev] SUBJECT.KEYID = 7
1,176,979 UART: [idev] UDS.KEYID = 0
1,177,324 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,687 UART: [idev] Erasing UDS.KEYID = 0
1,202,252 UART: [idev] Sha1 KeyId Algorithm
1,210,710 UART: [idev] --
1,211,704 UART: [ldev] ++
1,211,872 UART: [ldev] CDI.KEYID = 6
1,212,235 UART: [ldev] SUBJECT.KEYID = 5
1,212,661 UART: [ldev] AUTHORITY.KEYID = 7
1,213,124 UART: [ldev] FE.KEYID = 1
1,218,418 UART: [ldev] Erasing FE.KEYID = 1
1,244,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,344 UART: [ldev] --
1,283,773 UART: [fwproc] Wait for Commands...
1,284,481 UART: [fwproc] Recv command 0x46574c44
1,285,209 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,224 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,437,278 >>> mbox cmd response: failed
2,437,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,284 >>> mbox cmd response: failed
2,437,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,437,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,736 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,679 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,983 UART: [kat] ++
895,135 UART: [kat] sha1
899,213 UART: [kat] SHA2-256
901,153 UART: [kat] SHA2-384
903,928 UART: [kat] SHA2-512-ACC
905,829 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,058 UART: [kat] LMS
1,168,370 UART: [kat] --
1,169,439 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
1,173,747 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,339 UART: [idev] Erasing UDS.KEYID = 0
1,198,849 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,918 UART: [ldev] --
1,280,370 UART: [fwproc] Wait for Commands...
1,280,961 UART: [fwproc] Recv command 0x46574c44
1,281,694 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,955 UART: ROM Fatal Error: 0x000B0029
2,580,112 >>> mbox cmd response: failed
2,580,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,118 >>> mbox cmd response: failed
2,580,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
915,820 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,095 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,581 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,281,088 UART: [fwproc] Wait for Commands...
1,281,705 UART: [fwproc] Recv command 0x46574c44
1,282,438 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,337 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,432,269 >>> mbox cmd response: failed
2,432,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,275 >>> mbox cmd response: failed
2,432,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,868 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,081 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,766 UART: [kat] ++
895,918 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
905,037 UART: [kat] SHA2-512-ACC
906,938 UART: [kat] ECC-384
916,973 UART: [kat] HMAC-384Kdf
921,665 UART: [kat] LMS
1,169,977 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,174,058 UART: [idev] ++
1,174,226 UART: [idev] CDI.KEYID = 6
1,174,587 UART: [idev] SUBJECT.KEYID = 7
1,175,012 UART: [idev] UDS.KEYID = 0
1,175,358 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,666 UART: [idev] Erasing UDS.KEYID = 0
1,199,652 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,813 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,478 UART: ROM Fatal Error: 0x000B0029
2,581,635 >>> mbox cmd response: failed
2,581,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,641 >>> mbox cmd response: failed
2,581,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,550 UART: [idev] ++
1,173,718 UART: [idev] CDI.KEYID = 6
1,174,079 UART: [idev] SUBJECT.KEYID = 7
1,174,504 UART: [idev] UDS.KEYID = 0
1,174,850 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,922 UART: [idev] Sha1 KeyId Algorithm
1,208,614 UART: [idev] --
1,209,591 UART: [ldev] ++
1,209,759 UART: [ldev] CDI.KEYID = 6
1,210,123 UART: [ldev] SUBJECT.KEYID = 5
1,210,550 UART: [ldev] AUTHORITY.KEYID = 7
1,211,013 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,653 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,340 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,563 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,434,174 >>> mbox cmd response: failed
2,434,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,180 >>> mbox cmd response: failed
2,434,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,657 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,471 UART:
192,819 UART: Running Caliptra ROM ...
194,007 UART:
194,162 UART: [state] CFI Enabled
263,690 UART: [state] LifecycleState = Unprovisioned
265,614 UART: [state] DebugLocked = No
266,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,455 UART: [kat] SHA2-256
441,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,682 UART: [kat] ++
452,164 UART: [kat] sha1
462,396 UART: [kat] SHA2-256
465,086 UART: [kat] SHA2-384
470,476 UART: [kat] SHA2-512-ACC
472,835 UART: [kat] ECC-384
2,765,228 UART: [kat] HMAC-384Kdf
2,797,879 UART: [kat] LMS
3,988,162 UART: [kat] --
3,993,415 UART: [cold-reset] ++
3,994,575 UART: [fht] Storing FHT @ 0x50003400
4,006,127 UART: [idev] ++
4,006,711 UART: [idev] CDI.KEYID = 6
4,007,679 UART: [idev] SUBJECT.KEYID = 7
4,008,901 UART: [idev] UDS.KEYID = 0
4,011,450 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,096 UART: [idev] Erasing UDS.KEYID = 0
7,343,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,352 UART: [idev] --
7,370,513 UART: [ldev] ++
7,371,095 UART: [ldev] CDI.KEYID = 6
7,372,088 UART: [ldev] SUBJECT.KEYID = 5
7,373,257 UART: [ldev] AUTHORITY.KEYID = 7
7,374,546 UART: [ldev] FE.KEYID = 1
7,420,678 UART: [ldev] Erasing FE.KEYID = 1
10,754,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,181 UART: [ldev] --
13,113,844 UART: [fwproc] Waiting for Commands...
13,117,228 UART: [fwproc] Received command 0x46574c44
13,119,426 UART: [fwproc] Received Image of size 114036 bytes
15,826,584 UART: ROM Fatal Error: 0x000B003F
15,830,054 >>> mbox cmd response: failed
15,830,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,830,867 >>> mbox cmd response: failed
15,831,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,428 >>> mbox cmd response: failed
Initializing fuses
2,057,592 writing to cptra_bootfsm_go
2,246,931 UART:
2,247,275 UART: Running Caliptra ROM ...
2,248,416 UART:
2,248,578 UART: [state] CFI Enabled
2,307,191 UART: [state] LifecycleState = Unprovisioned
2,309,092 UART: [state] DebugLocked = No
2,311,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,710 UART: [kat] SHA2-256
2,485,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,911 UART: [kat] ++
2,496,401 UART: [kat] sha1
2,508,370 UART: [kat] SHA2-256
2,511,063 UART: [kat] SHA2-384
2,516,023 UART: [kat] SHA2-512-ACC
2,518,374 UART: [kat] ECC-384
4,811,394 UART: [kat] HMAC-384Kdf
4,843,123 UART: [kat] LMS
6,033,438 UART: [kat] --
6,038,364 UART: [cold-reset] ++
6,040,353 UART: [fht] Storing FHT @ 0x50003400
6,051,470 UART: [idev] ++
6,052,036 UART: [idev] CDI.KEYID = 6
6,053,005 UART: [idev] SUBJECT.KEYID = 7
6,054,226 UART: [idev] UDS.KEYID = 0
6,056,502 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,200,050 UART: [idev] Erasing UDS.KEYID = 0
9,389,435 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,956 UART: [idev] --
9,416,107 UART: [ldev] ++
9,416,674 UART: [ldev] CDI.KEYID = 6
9,417,641 UART: [ldev] SUBJECT.KEYID = 5
9,418,903 UART: [ldev] AUTHORITY.KEYID = 7
9,420,145 UART: [ldev] FE.KEYID = 1
9,465,377 UART: [ldev] Erasing FE.KEYID = 1
12,798,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,280 UART: [ldev] --
15,158,659 UART: [fwproc] Waiting for Commands...
15,161,480 UART: [fwproc] Received command 0x46574c44
15,163,679 UART: [fwproc] Received Image of size 114036 bytes
19,217,649 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,289,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,675,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,784,338 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,570,552 >>> mbox cmd response: failed
15,571,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,432 >>> mbox cmd response: failed
15,571,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,989 >>> mbox cmd response: failed
Initializing fuses
2,063,410 writing to cptra_bootfsm_go
5,830,483 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,913,209 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,393 UART:
192,772 UART: Running Caliptra ROM ...
193,926 UART:
603,603 UART: [state] CFI Enabled
614,664 UART: [state] LifecycleState = Unprovisioned
616,539 UART: [state] DebugLocked = No
618,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,745 UART: [kat] SHA2-256
793,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,986 UART: [kat] ++
804,512 UART: [kat] sha1
816,310 UART: [kat] SHA2-256
819,056 UART: [kat] SHA2-384
825,955 UART: [kat] SHA2-512-ACC
828,350 UART: [kat] ECC-384
3,110,369 UART: [kat] HMAC-384Kdf
3,121,953 UART: [kat] LMS
4,312,100 UART: [kat] --
4,317,182 UART: [cold-reset] ++
4,318,420 UART: [fht] Storing FHT @ 0x50003400
4,330,177 UART: [idev] ++
4,330,740 UART: [idev] CDI.KEYID = 6
4,331,673 UART: [idev] SUBJECT.KEYID = 7
4,332,937 UART: [idev] UDS.KEYID = 0
4,335,440 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,313 UART: [idev] Erasing UDS.KEYID = 0
7,620,900 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,458 UART: [idev] --
7,646,400 UART: [ldev] ++
7,646,973 UART: [ldev] CDI.KEYID = 6
7,647,990 UART: [ldev] SUBJECT.KEYID = 5
7,649,148 UART: [ldev] AUTHORITY.KEYID = 7
7,650,440 UART: [ldev] FE.KEYID = 1
7,661,626 UART: [ldev] Erasing FE.KEYID = 1
10,954,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,995 UART: [ldev] --
13,314,982 UART: [fwproc] Waiting for Commands...
13,316,766 UART: [fwproc] Received command 0x46574c44
13,318,977 UART: [fwproc] Received Image of size 114036 bytes
16,024,925 UART: ROM Fatal Error: 0x000B003F
16,028,396 >>> mbox cmd response: failed
16,028,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,044 >>> mbox cmd response: failed
16,029,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,614 >>> mbox cmd response: failed
Initializing fuses
2,056,034 writing to cptra_bootfsm_go
2,245,434 UART:
2,245,791 UART: Running Caliptra ROM ...
2,246,931 UART:
4,426,165 UART: [state] CFI Enabled
4,440,091 UART: [state] LifecycleState = Unprovisioned
4,442,034 UART: [state] DebugLocked = No
4,444,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,198 UART: [kat] SHA2-256
4,618,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,629,477 UART: [kat] ++
4,629,970 UART: [kat] sha1
4,641,834 UART: [kat] SHA2-256
4,644,529 UART: [kat] SHA2-384
4,650,528 UART: [kat] SHA2-512-ACC
4,652,880 UART: [kat] ECC-384
6,937,681 UART: [kat] HMAC-384Kdf
6,949,106 UART: [kat] LMS
8,139,249 UART: [kat] --
8,142,566 UART: [cold-reset] ++
8,145,000 UART: [fht] Storing FHT @ 0x50003400
8,156,492 UART: [idev] ++
8,157,080 UART: [idev] CDI.KEYID = 6
8,157,998 UART: [idev] SUBJECT.KEYID = 7
8,159,216 UART: [idev] UDS.KEYID = 0
8,161,680 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,304,870 UART: [idev] Erasing UDS.KEYID = 0
11,444,390 UART: [idev] Using Sha1 for KeyId Algorithm
11,466,857 UART: [idev] --
11,471,879 UART: [ldev] ++
11,472,448 UART: [ldev] CDI.KEYID = 6
11,473,387 UART: [ldev] SUBJECT.KEYID = 5
11,474,690 UART: [ldev] AUTHORITY.KEYID = 7
11,475,926 UART: [ldev] FE.KEYID = 1
11,486,223 UART: [ldev] Erasing FE.KEYID = 1
14,779,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,072,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,086,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,101,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,115,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,135,199 UART: [ldev] --
17,140,799 UART: [fwproc] Waiting for Commands...
17,142,693 UART: [fwproc] Received command 0x46574c44
17,144,883 UART: [fwproc] Received Image of size 114036 bytes
21,192,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,266,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,335,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,651,608 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,128,655 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,763,642 >>> mbox cmd response: failed
15,764,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,612 >>> mbox cmd response: failed
15,764,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,190 >>> mbox cmd response: failed
Initializing fuses
2,062,196 writing to cptra_bootfsm_go
8,227,087 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,168,583 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,414 UART:
192,783 UART: Running Caliptra ROM ...
193,943 UART:
194,089 UART: [state] CFI Enabled
266,543 UART: [state] LifecycleState = Unprovisioned
268,421 UART: [state] DebugLocked = No
270,640 UART: [state] WD Timer not started. Device not locked for debugging
274,685 UART: [kat] SHA2-256
453,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,390 UART: [kat] ++
465,838 UART: [kat] sha1
477,359 UART: [kat] SHA2-256
480,411 UART: [kat] SHA2-384
486,842 UART: [kat] SHA2-512-ACC
489,808 UART: [kat] ECC-384
2,946,674 UART: [kat] HMAC-384Kdf
2,968,458 UART: [kat] LMS
3,497,884 UART: [kat] --
3,502,362 UART: [cold-reset] ++
3,503,164 UART: [fht] FHT @ 0x50003400
3,514,094 UART: [idev] ++
3,514,661 UART: [idev] CDI.KEYID = 6
3,515,694 UART: [idev] SUBJECT.KEYID = 7
3,516,794 UART: [idev] UDS.KEYID = 0
3,519,489 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,636 UART: [idev] Erasing UDS.KEYID = 0
6,018,551 UART: [idev] Sha1 KeyId Algorithm
6,042,381 UART: [idev] --
6,045,726 UART: [ldev] ++
6,046,298 UART: [ldev] CDI.KEYID = 6
6,047,212 UART: [ldev] SUBJECT.KEYID = 5
6,048,370 UART: [ldev] AUTHORITY.KEYID = 7
6,049,604 UART: [ldev] FE.KEYID = 1
6,076,190 UART: [ldev] Erasing FE.KEYID = 1
8,581,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,585 UART: [ldev] --
10,391,147 UART: [fwproc] Wait for Commands...
10,392,754 UART: [fwproc] Recv command 0x46574c44
10,394,848 UART: [fwproc] Recv'd Img size: 114360 bytes
12,444,762 UART: ROM Fatal Error: 0x000B003F
12,447,886 >>> mbox cmd response: failed
12,448,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,624 >>> mbox cmd response: failed
12,448,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,178 >>> mbox cmd response: failed
Initializing fuses
2,053,283 writing to cptra_bootfsm_go
2,242,572 UART:
2,242,961 UART: Running Caliptra ROM ...
2,244,043 UART:
2,244,203 UART: [state] CFI Enabled
2,317,556 UART: [state] LifecycleState = Unprovisioned
2,319,443 UART: [state] DebugLocked = No
2,320,732 UART: [state] WD Timer not started. Device not locked for debugging
2,323,939 UART: [kat] SHA2-256
2,503,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,631 UART: [kat] ++
2,515,178 UART: [kat] sha1
2,526,567 UART: [kat] SHA2-256
2,529,576 UART: [kat] SHA2-384
2,535,629 UART: [kat] SHA2-512-ACC
2,538,573 UART: [kat] ECC-384
5,002,167 UART: [kat] HMAC-384Kdf
5,024,552 UART: [kat] LMS
5,554,031 UART: [kat] --
5,558,223 UART: [cold-reset] ++
5,560,130 UART: [fht] FHT @ 0x50003400
5,569,821 UART: [idev] ++
5,570,386 UART: [idev] CDI.KEYID = 6
5,571,348 UART: [idev] SUBJECT.KEYID = 7
5,572,502 UART: [idev] UDS.KEYID = 0
5,574,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,718,746 UART: [idev] Erasing UDS.KEYID = 0
8,076,549 UART: [idev] Sha1 KeyId Algorithm
8,100,093 UART: [idev] --
8,104,458 UART: [ldev] ++
8,105,036 UART: [ldev] CDI.KEYID = 6
8,105,946 UART: [ldev] SUBJECT.KEYID = 5
8,107,109 UART: [ldev] AUTHORITY.KEYID = 7
8,108,432 UART: [ldev] FE.KEYID = 1
8,154,299 UART: [ldev] Erasing FE.KEYID = 1
10,656,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,668 UART: [ldev] --
12,466,967 UART: [fwproc] Wait for Commands...
12,469,827 UART: [fwproc] Recv command 0x46574c44
12,471,926 UART: [fwproc] Recv'd Img size: 114360 bytes
15,875,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,944,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,013,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,330,655 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,814 writing to cptra_bootfsm_go
193,145 UART:
193,504 UART: Running Caliptra ROM ...
194,700 UART:
194,861 UART: [state] CFI Enabled
262,545 UART: [state] LifecycleState = Unprovisioned
264,952 UART: [state] DebugLocked = No
267,531 UART: [state] WD Timer not started. Device not locked for debugging
271,581 UART: [kat] SHA2-256
461,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,200 UART: [kat] ++
472,655 UART: [kat] sha1
483,756 UART: [kat] SHA2-256
486,753 UART: [kat] SHA2-384
493,501 UART: [kat] SHA2-512-ACC
496,121 UART: [kat] ECC-384
2,948,351 UART: [kat] HMAC-384Kdf
2,969,817 UART: [kat] LMS
3,501,615 UART: [kat] --
3,506,232 UART: [cold-reset] ++
3,508,225 UART: [fht] FHT @ 0x50003400
3,519,275 UART: [idev] ++
3,520,014 UART: [idev] CDI.KEYID = 6
3,520,903 UART: [idev] SUBJECT.KEYID = 7
3,522,284 UART: [idev] UDS.KEYID = 0
3,524,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,795 UART: [idev] Erasing UDS.KEYID = 0
6,027,213 UART: [idev] Sha1 KeyId Algorithm
6,049,803 UART: [idev] --
6,053,806 UART: [ldev] ++
6,054,490 UART: [ldev] CDI.KEYID = 6
6,055,413 UART: [ldev] SUBJECT.KEYID = 5
6,056,576 UART: [ldev] AUTHORITY.KEYID = 7
6,057,811 UART: [ldev] FE.KEYID = 1
6,098,924 UART: [ldev] Erasing FE.KEYID = 1
8,606,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,815 UART: [ldev] --
10,411,770 UART: [fwproc] Wait for Commands...
10,414,305 UART: [fwproc] Recv command 0x46574c44
10,416,573 UART: [fwproc] Recv'd Img size: 114360 bytes
12,499,210 UART: ROM Fatal Error: 0x000B003F
12,502,875 >>> mbox cmd response: failed
12,503,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,633 >>> mbox cmd response: failed
12,503,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,195 >>> mbox cmd response: failed
Initializing fuses
2,061,306 writing to cptra_bootfsm_go
2,250,627 UART:
2,250,975 UART: Running Caliptra ROM ...
2,252,112 UART:
2,252,285 UART: [state] CFI Enabled
2,319,060 UART: [state] LifecycleState = Unprovisioned
2,321,106 UART: [state] DebugLocked = No
2,323,198 UART: [state] WD Timer not started. Device not locked for debugging
2,328,049 UART: [kat] SHA2-256
2,517,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,684 UART: [kat] ++
2,529,179 UART: [kat] sha1
2,541,095 UART: [kat] SHA2-256
2,544,102 UART: [kat] SHA2-384
2,549,776 UART: [kat] SHA2-512-ACC
2,552,363 UART: [kat] ECC-384
5,002,139 UART: [kat] HMAC-384Kdf
5,025,562 UART: [kat] LMS
5,557,333 UART: [kat] --
5,561,233 UART: [cold-reset] ++
5,563,119 UART: [fht] FHT @ 0x50003400
5,575,721 UART: [idev] ++
5,576,398 UART: [idev] CDI.KEYID = 6
5,577,361 UART: [idev] SUBJECT.KEYID = 7
5,578,675 UART: [idev] UDS.KEYID = 0
5,580,957 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,724,773 UART: [idev] Erasing UDS.KEYID = 0
8,079,676 UART: [idev] Sha1 KeyId Algorithm
8,100,654 UART: [idev] --
8,105,402 UART: [ldev] ++
8,106,141 UART: [ldev] CDI.KEYID = 6
8,107,027 UART: [ldev] SUBJECT.KEYID = 5
8,108,155 UART: [ldev] AUTHORITY.KEYID = 7
8,109,453 UART: [ldev] FE.KEYID = 1
8,153,237 UART: [ldev] Erasing FE.KEYID = 1
10,660,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,274 UART: [ldev] --
12,464,472 UART: [fwproc] Wait for Commands...
12,466,356 UART: [fwproc] Recv command 0x46574c44
12,468,677 UART: [fwproc] Recv'd Img size: 114360 bytes
15,912,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,646,067 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,439,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,300,605 >>> mbox cmd response: failed
12,301,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,544 >>> mbox cmd response: failed
12,301,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,149 >>> mbox cmd response: failed
Initializing fuses
2,059,012 writing to cptra_bootfsm_go
5,495,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,787,478 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,480 UART:
192,846 UART: Running Caliptra ROM ...
193,985 UART:
603,679 UART: [state] CFI Enabled
617,944 UART: [state] LifecycleState = Unprovisioned
620,320 UART: [state] DebugLocked = No
622,347 UART: [state] WD Timer not started. Device not locked for debugging
626,770 UART: [kat] SHA2-256
816,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,427 UART: [kat] ++
827,950 UART: [kat] sha1
839,628 UART: [kat] SHA2-256
842,609 UART: [kat] SHA2-384
847,885 UART: [kat] SHA2-512-ACC
850,448 UART: [kat] ECC-384
3,292,683 UART: [kat] HMAC-384Kdf
3,304,589 UART: [kat] LMS
3,836,424 UART: [kat] --
3,840,260 UART: [cold-reset] ++
3,841,269 UART: [fht] FHT @ 0x50003400
3,853,354 UART: [idev] ++
3,854,030 UART: [idev] CDI.KEYID = 6
3,854,970 UART: [idev] SUBJECT.KEYID = 7
3,856,183 UART: [idev] UDS.KEYID = 0
3,858,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,695 UART: [idev] Erasing UDS.KEYID = 0
6,328,075 UART: [idev] Sha1 KeyId Algorithm
6,350,712 UART: [idev] --
6,355,400 UART: [ldev] ++
6,356,094 UART: [ldev] CDI.KEYID = 6
6,356,980 UART: [ldev] SUBJECT.KEYID = 5
6,358,194 UART: [ldev] AUTHORITY.KEYID = 7
6,359,427 UART: [ldev] FE.KEYID = 1
6,371,017 UART: [ldev] Erasing FE.KEYID = 1
8,847,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,684 UART: [ldev] --
10,637,842 UART: [fwproc] Wait for Commands...
10,639,826 UART: [fwproc] Recv command 0x46574c44
10,642,137 UART: [fwproc] Recv'd Img size: 114360 bytes
12,724,082 UART: ROM Fatal Error: 0x000B003F
12,727,708 >>> mbox cmd response: failed
12,728,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,728,440 >>> mbox cmd response: failed
12,728,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,728,997 >>> mbox cmd response: failed
Initializing fuses
2,055,088 writing to cptra_bootfsm_go
2,244,386 UART:
2,244,752 UART: Running Caliptra ROM ...
2,246,028 UART:
7,715,981 UART: [state] CFI Enabled
7,730,506 UART: [state] LifecycleState = Unprovisioned
7,732,911 UART: [state] DebugLocked = No
7,735,008 UART: [state] WD Timer not started. Device not locked for debugging
7,740,400 UART: [kat] SHA2-256
7,930,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,941,066 UART: [kat] ++
7,941,670 UART: [kat] sha1
7,952,681 UART: [kat] SHA2-256
7,955,706 UART: [kat] SHA2-384
7,961,535 UART: [kat] SHA2-512-ACC
7,964,097 UART: [kat] ECC-384
10,407,585 UART: [kat] HMAC-384Kdf
10,420,840 UART: [kat] LMS
10,952,659 UART: [kat] --
10,956,553 UART: [cold-reset] ++
10,958,968 UART: [fht] FHT @ 0x50003400
10,971,131 UART: [idev] ++
10,971,803 UART: [idev] CDI.KEYID = 6
10,972,736 UART: [idev] SUBJECT.KEYID = 7
10,973,964 UART: [idev] UDS.KEYID = 0
10,976,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,119,934 UART: [idev] Erasing UDS.KEYID = 0
13,454,398 UART: [idev] Sha1 KeyId Algorithm
13,476,596 UART: [idev] --
13,481,854 UART: [ldev] ++
13,482,536 UART: [ldev] CDI.KEYID = 6
13,483,446 UART: [ldev] SUBJECT.KEYID = 5
13,484,606 UART: [ldev] AUTHORITY.KEYID = 7
13,485,838 UART: [ldev] FE.KEYID = 1
13,497,400 UART: [ldev] Erasing FE.KEYID = 1
15,976,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,711,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,741,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,869 UART: [ldev] --
17,767,651 UART: [fwproc] Wait for Commands...
17,769,478 UART: [fwproc] Recv command 0x46574c44
17,771,799 UART: [fwproc] Recv'd Img size: 114360 bytes
21,228,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,307,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,423,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,966,235 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,759,374 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,519,472 >>> mbox cmd response: failed
12,520,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,385 >>> mbox cmd response: failed
12,520,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,945 >>> mbox cmd response: failed
Initializing fuses
2,056,421 writing to cptra_bootfsm_go
11,105,155 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,307,981 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,327 UART: [kat] SHA2-256
882,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,373 UART: [kat] ++
886,525 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,574 UART: [kat] SHA2-512-ACC
897,475 UART: [kat] ECC-384
903,548 UART: [kat] HMAC-384Kdf
908,022 UART: [kat] LMS
1,476,218 UART: [kat] --
1,476,973 UART: [cold-reset] ++
1,477,389 UART: [fht] Storing FHT @ 0x50003400
1,480,162 UART: [idev] ++
1,480,330 UART: [idev] CDI.KEYID = 6
1,480,690 UART: [idev] SUBJECT.KEYID = 7
1,481,114 UART: [idev] UDS.KEYID = 0
1,481,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,346 UART: [idev] Erasing UDS.KEYID = 0
1,506,234 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,750 UART: [idev] --
1,515,813 UART: [ldev] ++
1,515,981 UART: [ldev] CDI.KEYID = 6
1,516,344 UART: [ldev] SUBJECT.KEYID = 5
1,516,770 UART: [ldev] AUTHORITY.KEYID = 7
1,517,233 UART: [ldev] FE.KEYID = 1
1,522,437 UART: [ldev] Erasing FE.KEYID = 1
1,547,892 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,794 UART: [ldev] --
1,587,255 UART: [fwproc] Waiting for Commands...
1,588,042 UART: [fwproc] Received command 0x46574c44
1,588,833 UART: [fwproc] Received Image of size 114360 bytes
1,636,079 UART: ROM Fatal Error: 0x000B003F
1,637,238 >>> mbox cmd response: failed
1,637,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,244 >>> mbox cmd response: failed
1,637,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,013 UART: [kat] SHA2-256
881,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,059 UART: [kat] ++
886,211 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
895,252 UART: [kat] SHA2-512-ACC
897,153 UART: [kat] ECC-384
902,812 UART: [kat] HMAC-384Kdf
907,358 UART: [kat] LMS
1,475,554 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,971 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,812 UART: [idev] Erasing UDS.KEYID = 0
1,505,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,550 UART: [idev] --
1,515,493 UART: [ldev] ++
1,515,661 UART: [ldev] CDI.KEYID = 6
1,516,024 UART: [ldev] SUBJECT.KEYID = 5
1,516,450 UART: [ldev] AUTHORITY.KEYID = 7
1,516,913 UART: [ldev] FE.KEYID = 1
1,521,941 UART: [ldev] Erasing FE.KEYID = 1
1,546,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,488 UART: [ldev] --
1,585,779 UART: [fwproc] Waiting for Commands...
1,586,416 UART: [fwproc] Received command 0x46574c44
1,587,207 UART: [fwproc] Received Image of size 114360 bytes
2,885,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,594 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,639 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,619 >>> mbox cmd response: failed
1,488,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,625 >>> mbox cmd response: failed
1,488,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,028 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,432 UART: [kat] SHA2-256
882,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,478 UART: [kat] ++
886,630 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
903,061 UART: [kat] HMAC-384Kdf
907,777 UART: [kat] LMS
1,475,973 UART: [kat] --
1,476,716 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,287 UART: [idev] Erasing UDS.KEYID = 0
1,506,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,297 UART: [idev] --
1,516,246 UART: [ldev] ++
1,516,414 UART: [ldev] CDI.KEYID = 6
1,516,777 UART: [ldev] SUBJECT.KEYID = 5
1,517,203 UART: [ldev] AUTHORITY.KEYID = 7
1,517,666 UART: [ldev] FE.KEYID = 1
1,523,082 UART: [ldev] Erasing FE.KEYID = 1
1,548,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,777 UART: [ldev] --
1,588,266 UART: [fwproc] Waiting for Commands...
1,589,075 UART: [fwproc] Received command 0x46574c44
1,589,866 UART: [fwproc] Received Image of size 114360 bytes
1,638,418 UART: ROM Fatal Error: 0x000B003F
1,639,577 >>> mbox cmd response: failed
1,639,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,639,583 >>> mbox cmd response: failed
1,639,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,639,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,313 UART: [kat] SHA2-512-ACC
897,214 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,451 UART: [kat] LMS
1,475,647 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,725 UART: [idev] ++
1,479,893 UART: [idev] CDI.KEYID = 6
1,480,253 UART: [idev] SUBJECT.KEYID = 7
1,480,677 UART: [idev] UDS.KEYID = 0
1,481,022 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,921 UART: [idev] Erasing UDS.KEYID = 0
1,505,397 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,153 UART: [idev] --
1,515,324 UART: [ldev] ++
1,515,492 UART: [ldev] CDI.KEYID = 6
1,515,855 UART: [ldev] SUBJECT.KEYID = 5
1,516,281 UART: [ldev] AUTHORITY.KEYID = 7
1,516,744 UART: [ldev] FE.KEYID = 1
1,522,040 UART: [ldev] Erasing FE.KEYID = 1
1,546,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,799 UART: [ldev] --
1,586,132 UART: [fwproc] Waiting for Commands...
1,586,905 UART: [fwproc] Received command 0x46574c44
1,587,696 UART: [fwproc] Received Image of size 114360 bytes
2,884,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,625 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,098 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,698 >>> mbox cmd response: failed
1,487,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,704 >>> mbox cmd response: failed
1,487,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,117 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,776 UART: [kat] SHA2-512-ACC
908,677 UART: [kat] ECC-384
918,532 UART: [kat] HMAC-384Kdf
923,244 UART: [kat] LMS
1,171,572 UART: [kat] --
1,172,683 UART: [cold-reset] ++
1,173,193 UART: [fht] FHT @ 0x50003400
1,175,732 UART: [idev] ++
1,175,900 UART: [idev] CDI.KEYID = 6
1,176,260 UART: [idev] SUBJECT.KEYID = 7
1,176,684 UART: [idev] UDS.KEYID = 0
1,177,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,988 UART: [idev] Erasing UDS.KEYID = 0
1,202,001 UART: [idev] Sha1 KeyId Algorithm
1,210,465 UART: [idev] --
1,211,635 UART: [ldev] ++
1,211,803 UART: [ldev] CDI.KEYID = 6
1,212,166 UART: [ldev] SUBJECT.KEYID = 5
1,212,592 UART: [ldev] AUTHORITY.KEYID = 7
1,213,055 UART: [ldev] FE.KEYID = 1
1,218,027 UART: [ldev] Erasing FE.KEYID = 1
1,244,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,989 UART: [ldev] --
1,283,340 UART: [fwproc] Wait for Commands...
1,283,978 UART: [fwproc] Recv command 0x46574c44
1,284,706 UART: [fwproc] Recv'd Img size: 114360 bytes
1,333,564 UART: ROM Fatal Error: 0x000B003F
1,334,723 >>> mbox cmd response: failed
1,334,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,729 >>> mbox cmd response: failed
1,334,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,774 UART: [kat] LMS
1,171,102 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,533 UART: [fht] FHT @ 0x50003400
1,175,052 UART: [idev] ++
1,175,220 UART: [idev] CDI.KEYID = 6
1,175,580 UART: [idev] SUBJECT.KEYID = 7
1,176,004 UART: [idev] UDS.KEYID = 0
1,176,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,948 UART: [idev] Erasing UDS.KEYID = 0
1,201,255 UART: [idev] Sha1 KeyId Algorithm
1,209,587 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,521 UART: [ldev] Erasing FE.KEYID = 1
1,243,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,753 UART: [ldev] --
1,283,062 UART: [fwproc] Wait for Commands...
1,283,706 UART: [fwproc] Recv command 0x46574c44
1,284,434 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,409 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,595 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,006 >>> mbox cmd response: failed
1,188,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,012 >>> mbox cmd response: failed
1,188,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,141 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,276 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
893,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,970 UART: [kat] ++
898,122 UART: [kat] sha1
902,322 UART: [kat] SHA2-256
904,262 UART: [kat] SHA2-384
907,129 UART: [kat] SHA2-512-ACC
909,030 UART: [kat] ECC-384
919,177 UART: [kat] HMAC-384Kdf
923,693 UART: [kat] LMS
1,172,021 UART: [kat] --
1,173,244 UART: [cold-reset] ++
1,173,724 UART: [fht] FHT @ 0x50003400
1,176,369 UART: [idev] ++
1,176,537 UART: [idev] CDI.KEYID = 6
1,176,897 UART: [idev] SUBJECT.KEYID = 7
1,177,321 UART: [idev] UDS.KEYID = 0
1,177,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,796 UART: [idev] Sha1 KeyId Algorithm
1,210,326 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,218,064 UART: [ldev] Erasing FE.KEYID = 1
1,244,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,546 UART: [ldev] --
1,283,823 UART: [fwproc] Wait for Commands...
1,284,535 UART: [fwproc] Recv command 0x46574c44
1,285,263 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,247 UART: ROM Fatal Error: 0x000B003F
1,333,406 >>> mbox cmd response: failed
1,333,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,412 >>> mbox cmd response: failed
1,333,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
893,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,772 UART: [kat] ++
897,924 UART: [kat] sha1
902,124 UART: [kat] SHA2-256
904,064 UART: [kat] SHA2-384
907,037 UART: [kat] SHA2-512-ACC
908,938 UART: [kat] ECC-384
918,897 UART: [kat] HMAC-384Kdf
923,359 UART: [kat] LMS
1,171,687 UART: [kat] --
1,172,360 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,593 UART: [idev] ++
1,175,761 UART: [idev] CDI.KEYID = 6
1,176,121 UART: [idev] SUBJECT.KEYID = 7
1,176,545 UART: [idev] UDS.KEYID = 0
1,176,890 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,790 UART: [idev] Sha1 KeyId Algorithm
1,210,146 UART: [idev] --
1,211,260 UART: [ldev] ++
1,211,428 UART: [ldev] CDI.KEYID = 6
1,211,791 UART: [ldev] SUBJECT.KEYID = 5
1,212,217 UART: [ldev] AUTHORITY.KEYID = 7
1,212,680 UART: [ldev] FE.KEYID = 1
1,217,998 UART: [ldev] Erasing FE.KEYID = 1
1,245,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,147 UART: [fwproc] Wait for Commands...
1,284,863 UART: [fwproc] Recv command 0x46574c44
1,285,591 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,792 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,774 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,465 >>> mbox cmd response: failed
1,188,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,471 >>> mbox cmd response: failed
1,188,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,169 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,319 UART: [state] DebugLocked = No
86,949 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
891,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,835 UART: [kat] ++
895,987 UART: [kat] sha1
900,447 UART: [kat] SHA2-256
902,387 UART: [kat] SHA2-384
905,250 UART: [kat] SHA2-512-ACC
907,151 UART: [kat] ECC-384
917,104 UART: [kat] HMAC-384Kdf
921,604 UART: [kat] LMS
1,169,916 UART: [kat] --
1,170,617 UART: [cold-reset] ++
1,171,117 UART: [fht] FHT @ 0x50003400
1,173,723 UART: [idev] ++
1,173,891 UART: [idev] CDI.KEYID = 6
1,174,252 UART: [idev] SUBJECT.KEYID = 7
1,174,677 UART: [idev] UDS.KEYID = 0
1,175,023 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,765 UART: [idev] Erasing UDS.KEYID = 0
1,199,833 UART: [idev] Sha1 KeyId Algorithm
1,208,515 UART: [idev] --
1,209,672 UART: [ldev] ++
1,209,840 UART: [ldev] CDI.KEYID = 6
1,210,204 UART: [ldev] SUBJECT.KEYID = 5
1,210,631 UART: [ldev] AUTHORITY.KEYID = 7
1,211,094 UART: [ldev] FE.KEYID = 1
1,216,006 UART: [ldev] Erasing FE.KEYID = 1
1,241,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,916 UART: [ldev] --
1,281,394 UART: [fwproc] Wait for Commands...
1,282,119 UART: [fwproc] Recv command 0x46574c44
1,282,852 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,149 UART: ROM Fatal Error: 0x000B003F
1,331,308 >>> mbox cmd response: failed
1,331,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,314 >>> mbox cmd response: failed
1,331,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,333 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,601 UART: [idev] ++
1,172,769 UART: [idev] CDI.KEYID = 6
1,173,130 UART: [idev] SUBJECT.KEYID = 7
1,173,555 UART: [idev] UDS.KEYID = 0
1,173,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,563 UART: [idev] Sha1 KeyId Algorithm
1,207,479 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,215,458 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,150 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,897 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,226 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,375 >>> mbox cmd response: failed
1,183,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,381 >>> mbox cmd response: failed
1,183,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,630 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,429 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,174,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,000 UART: [idev] Erasing UDS.KEYID = 0
1,199,276 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,395 UART: [ldev] ++
1,209,563 UART: [ldev] CDI.KEYID = 6
1,209,927 UART: [ldev] SUBJECT.KEYID = 5
1,210,354 UART: [ldev] AUTHORITY.KEYID = 7
1,210,817 UART: [ldev] FE.KEYID = 1
1,216,151 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,903 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,120 UART: ROM Fatal Error: 0x000B003F
1,331,279 >>> mbox cmd response: failed
1,331,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,285 >>> mbox cmd response: failed
1,331,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,672 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,801 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,998 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,114 >>> mbox cmd response: failed
1,184,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,120 >>> mbox cmd response: failed
1,184,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,792 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,159 UART:
192,511 UART: Running Caliptra ROM ...
193,701 UART:
193,854 UART: [state] CFI Enabled
264,825 UART: [state] LifecycleState = Unprovisioned
266,770 UART: [state] DebugLocked = No
268,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,950 UART: [kat] SHA2-256
443,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,154 UART: [kat] ++
454,632 UART: [kat] sha1
466,214 UART: [kat] SHA2-256
468,918 UART: [kat] SHA2-384
474,032 UART: [kat] SHA2-512-ACC
476,379 UART: [kat] ECC-384
2,765,957 UART: [kat] HMAC-384Kdf
2,798,106 UART: [kat] LMS
3,988,435 UART: [kat] --
3,991,902 UART: [cold-reset] ++
3,993,405 UART: [fht] Storing FHT @ 0x50003400
4,005,864 UART: [idev] ++
4,006,498 UART: [idev] CDI.KEYID = 6
4,007,413 UART: [idev] SUBJECT.KEYID = 7
4,008,634 UART: [idev] UDS.KEYID = 0
4,011,290 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,340 UART: [idev] Erasing UDS.KEYID = 0
7,343,707 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,529 UART: [idev] --
7,370,193 UART: [ldev] ++
7,370,771 UART: [ldev] CDI.KEYID = 6
7,371,739 UART: [ldev] SUBJECT.KEYID = 5
7,372,956 UART: [ldev] AUTHORITY.KEYID = 7
7,374,187 UART: [ldev] FE.KEYID = 1
7,418,428 UART: [ldev] Erasing FE.KEYID = 1
10,750,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,499 UART: [ldev] --
13,114,711 UART: [fwproc] Waiting for Commands...
13,116,917 UART: [fwproc] Received command 0x46574c44
13,119,161 UART: [fwproc] Received Image of size 114036 bytes
15,822,843 UART: ROM Fatal Error: 0x000B003C
15,826,315 >>> mbox cmd response: failed
15,826,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,066 >>> mbox cmd response: failed
15,827,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,630 >>> mbox cmd response: failed
Initializing fuses
2,059,868 writing to cptra_bootfsm_go
2,249,148 UART:
2,249,499 UART: Running Caliptra ROM ...
2,250,550 UART:
2,250,704 UART: [state] CFI Enabled
2,310,097 UART: [state] LifecycleState = Unprovisioned
2,312,044 UART: [state] DebugLocked = No
2,314,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,349 UART: [kat] SHA2-256
2,489,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,576 UART: [kat] ++
2,500,066 UART: [kat] sha1
2,510,361 UART: [kat] SHA2-256
2,513,055 UART: [kat] SHA2-384
2,519,365 UART: [kat] SHA2-512-ACC
2,521,727 UART: [kat] ECC-384
4,812,588 UART: [kat] HMAC-384Kdf
4,846,063 UART: [kat] LMS
6,036,352 UART: [kat] --
6,040,151 UART: [cold-reset] ++
6,042,358 UART: [fht] Storing FHT @ 0x50003400
6,054,125 UART: [idev] ++
6,054,731 UART: [idev] CDI.KEYID = 6
6,055,618 UART: [idev] SUBJECT.KEYID = 7
6,056,855 UART: [idev] UDS.KEYID = 0
6,059,062 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,202,461 UART: [idev] Erasing UDS.KEYID = 0
9,392,924 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,422 UART: [idev] --
9,418,626 UART: [ldev] ++
9,419,220 UART: [ldev] CDI.KEYID = 6
9,420,192 UART: [ldev] SUBJECT.KEYID = 5
9,421,410 UART: [ldev] AUTHORITY.KEYID = 7
9,422,650 UART: [ldev] FE.KEYID = 1
9,468,547 UART: [ldev] Erasing FE.KEYID = 1
12,802,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,114,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,129,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,158,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,442 UART: [ldev] --
15,183,503 UART: [fwproc] Waiting for Commands...
15,185,388 UART: [fwproc] Received command 0x46574c44
15,187,581 UART: [fwproc] Received Image of size 114036 bytes
19,233,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,320,958 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,389,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,707,080 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,808,713 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,594,689 >>> mbox cmd response: failed
15,595,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,595,768 >>> mbox cmd response: failed
15,596,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,596,335 >>> mbox cmd response: failed
Initializing fuses
2,054,429 writing to cptra_bootfsm_go
5,825,713 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,896,645 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,528 UART:
192,884 UART: Running Caliptra ROM ...
194,070 UART:
603,739 UART: [state] CFI Enabled
620,316 UART: [state] LifecycleState = Unprovisioned
622,229 UART: [state] DebugLocked = No
625,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,149 UART: [kat] SHA2-256
798,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,486 UART: [kat] ++
810,017 UART: [kat] sha1
819,612 UART: [kat] SHA2-256
822,294 UART: [kat] SHA2-384
829,509 UART: [kat] SHA2-512-ACC
831,902 UART: [kat] ECC-384
3,116,981 UART: [kat] HMAC-384Kdf
3,128,906 UART: [kat] LMS
4,319,019 UART: [kat] --
4,323,474 UART: [cold-reset] ++
4,326,115 UART: [fht] Storing FHT @ 0x50003400
4,339,221 UART: [idev] ++
4,339,849 UART: [idev] CDI.KEYID = 6
4,340,772 UART: [idev] SUBJECT.KEYID = 7
4,341,989 UART: [idev] UDS.KEYID = 0
4,344,599 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,488,102 UART: [idev] Erasing UDS.KEYID = 0
7,628,607 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,271 UART: [idev] --
7,654,276 UART: [ldev] ++
7,654,851 UART: [ldev] CDI.KEYID = 6
7,656,020 UART: [ldev] SUBJECT.KEYID = 5
7,657,191 UART: [ldev] AUTHORITY.KEYID = 7
7,658,381 UART: [ldev] FE.KEYID = 1
7,669,787 UART: [ldev] Erasing FE.KEYID = 1
10,958,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,983 UART: [ldev] --
13,317,248 UART: [fwproc] Waiting for Commands...
13,319,831 UART: [fwproc] Received command 0x46574c44
13,322,017 UART: [fwproc] Received Image of size 114036 bytes
16,031,646 UART: ROM Fatal Error: 0x000B003C
16,035,165 >>> mbox cmd response: failed
16,035,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,035,930 >>> mbox cmd response: failed
16,036,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,036,517 >>> mbox cmd response: failed
Initializing fuses
2,060,231 writing to cptra_bootfsm_go
2,249,549 UART:
2,249,897 UART: Running Caliptra ROM ...
2,250,949 UART:
4,422,545 UART: [state] CFI Enabled
4,437,780 UART: [state] LifecycleState = Unprovisioned
4,439,694 UART: [state] DebugLocked = No
4,441,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,447,078 UART: [kat] SHA2-256
4,616,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,627,318 UART: [kat] ++
4,627,799 UART: [kat] sha1
4,637,126 UART: [kat] SHA2-256
4,639,823 UART: [kat] SHA2-384
4,645,059 UART: [kat] SHA2-512-ACC
4,647,416 UART: [kat] ECC-384
6,932,727 UART: [kat] HMAC-384Kdf
6,945,016 UART: [kat] LMS
8,135,110 UART: [kat] --
8,139,711 UART: [cold-reset] ++
8,140,893 UART: [fht] Storing FHT @ 0x50003400
8,153,353 UART: [idev] ++
8,153,977 UART: [idev] CDI.KEYID = 6
8,154,890 UART: [idev] SUBJECT.KEYID = 7
8,156,167 UART: [idev] UDS.KEYID = 0
8,158,360 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,302,075 UART: [idev] Erasing UDS.KEYID = 0
11,440,764 UART: [idev] Using Sha1 for KeyId Algorithm
11,462,626 UART: [idev] --
11,466,217 UART: [ldev] ++
11,466,794 UART: [ldev] CDI.KEYID = 6
11,467,812 UART: [ldev] SUBJECT.KEYID = 5
11,469,020 UART: [ldev] AUTHORITY.KEYID = 7
11,470,209 UART: [ldev] FE.KEYID = 1
11,482,751 UART: [ldev] Erasing FE.KEYID = 1
14,776,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,098,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,131,157 UART: [ldev] --
17,136,638 UART: [fwproc] Waiting for Commands...
17,138,798 UART: [fwproc] Received command 0x46574c44
17,141,053 UART: [fwproc] Received Image of size 114036 bytes
21,198,467 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,274,163 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,343,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,659,429 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,131,544 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,767,045 >>> mbox cmd response: failed
15,767,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,933 >>> mbox cmd response: failed
15,768,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,569 >>> mbox cmd response: failed
Initializing fuses
2,056,335 writing to cptra_bootfsm_go
8,220,617 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,150,961 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,240 UART:
192,651 UART: Running Caliptra ROM ...
193,781 UART:
193,922 UART: [state] CFI Enabled
262,810 UART: [state] LifecycleState = Unprovisioned
264,685 UART: [state] DebugLocked = No
266,149 UART: [state] WD Timer not started. Device not locked for debugging
269,714 UART: [kat] SHA2-256
448,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,443 UART: [kat] ++
460,986 UART: [kat] sha1
471,444 UART: [kat] SHA2-256
474,508 UART: [kat] SHA2-384
480,862 UART: [kat] SHA2-512-ACC
483,807 UART: [kat] ECC-384
2,945,380 UART: [kat] HMAC-384Kdf
2,969,781 UART: [kat] LMS
3,499,254 UART: [kat] --
3,503,674 UART: [cold-reset] ++
3,504,798 UART: [fht] FHT @ 0x50003400
3,515,831 UART: [idev] ++
3,516,395 UART: [idev] CDI.KEYID = 6
3,517,366 UART: [idev] SUBJECT.KEYID = 7
3,518,526 UART: [idev] UDS.KEYID = 0
3,521,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,591 UART: [idev] Erasing UDS.KEYID = 0
6,027,767 UART: [idev] Sha1 KeyId Algorithm
6,051,170 UART: [idev] --
6,054,713 UART: [ldev] ++
6,055,302 UART: [ldev] CDI.KEYID = 6
6,056,195 UART: [ldev] SUBJECT.KEYID = 5
6,057,359 UART: [ldev] AUTHORITY.KEYID = 7
6,058,598 UART: [ldev] FE.KEYID = 1
6,097,762 UART: [ldev] Erasing FE.KEYID = 1
8,614,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,979 UART: [ldev] --
10,425,385 UART: [fwproc] Wait for Commands...
10,427,159 UART: [fwproc] Recv command 0x46574c44
10,429,261 UART: [fwproc] Recv'd Img size: 114360 bytes
12,482,785 UART: ROM Fatal Error: 0x000B003C
12,485,907 >>> mbox cmd response: failed
12,486,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,486,635 >>> mbox cmd response: failed
12,486,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,487,199 >>> mbox cmd response: failed
Initializing fuses
2,054,593 writing to cptra_bootfsm_go
2,243,898 UART:
2,244,254 UART: Running Caliptra ROM ...
2,245,349 UART:
2,245,528 UART: [state] CFI Enabled
2,323,063 UART: [state] LifecycleState = Unprovisioned
2,324,952 UART: [state] DebugLocked = No
2,326,343 UART: [state] WD Timer not started. Device not locked for debugging
2,329,765 UART: [kat] SHA2-256
2,508,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,520,440 UART: [kat] ++
2,520,905 UART: [kat] sha1
2,532,061 UART: [kat] SHA2-256
2,535,091 UART: [kat] SHA2-384
2,541,245 UART: [kat] SHA2-512-ACC
2,544,194 UART: [kat] ECC-384
5,003,896 UART: [kat] HMAC-384Kdf
5,027,368 UART: [kat] LMS
5,556,785 UART: [kat] --
5,559,857 UART: [cold-reset] ++
5,562,402 UART: [fht] FHT @ 0x50003400
5,573,116 UART: [idev] ++
5,573,683 UART: [idev] CDI.KEYID = 6
5,574,590 UART: [idev] SUBJECT.KEYID = 7
5,575,804 UART: [idev] UDS.KEYID = 0
5,577,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,721,894 UART: [idev] Erasing UDS.KEYID = 0
8,081,475 UART: [idev] Sha1 KeyId Algorithm
8,106,109 UART: [idev] --
8,109,584 UART: [ldev] ++
8,110,197 UART: [ldev] CDI.KEYID = 6
8,111,114 UART: [ldev] SUBJECT.KEYID = 5
8,112,219 UART: [ldev] AUTHORITY.KEYID = 7
8,113,510 UART: [ldev] FE.KEYID = 1
8,157,214 UART: [ldev] Erasing FE.KEYID = 1
10,660,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,479 UART: [ldev] --
12,472,417 UART: [fwproc] Wait for Commands...
12,475,648 UART: [fwproc] Recv command 0x46574c44
12,477,692 UART: [fwproc] Recv'd Img size: 114360 bytes
15,877,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,949,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,018,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,336,158 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,174 UART:
192,535 UART: Running Caliptra ROM ...
193,743 UART:
193,902 UART: [state] CFI Enabled
266,613 UART: [state] LifecycleState = Unprovisioned
269,075 UART: [state] DebugLocked = No
270,799 UART: [state] WD Timer not started. Device not locked for debugging
275,725 UART: [kat] SHA2-256
465,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,346 UART: [kat] ++
476,836 UART: [kat] sha1
487,765 UART: [kat] SHA2-256
490,818 UART: [kat] SHA2-384
496,262 UART: [kat] SHA2-512-ACC
498,820 UART: [kat] ECC-384
2,947,019 UART: [kat] HMAC-384Kdf
2,971,302 UART: [kat] LMS
3,503,074 UART: [kat] --
3,506,593 UART: [cold-reset] ++
3,507,553 UART: [fht] FHT @ 0x50003400
3,519,245 UART: [idev] ++
3,519,941 UART: [idev] CDI.KEYID = 6
3,520,857 UART: [idev] SUBJECT.KEYID = 7
3,522,071 UART: [idev] UDS.KEYID = 0
3,524,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,069 UART: [idev] Erasing UDS.KEYID = 0
6,030,197 UART: [idev] Sha1 KeyId Algorithm
6,052,735 UART: [idev] --
6,056,740 UART: [ldev] ++
6,057,423 UART: [ldev] CDI.KEYID = 6
6,058,332 UART: [ldev] SUBJECT.KEYID = 5
6,059,493 UART: [ldev] AUTHORITY.KEYID = 7
6,060,729 UART: [ldev] FE.KEYID = 1
6,099,202 UART: [ldev] Erasing FE.KEYID = 1
8,607,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,346 UART: [ldev] --
10,414,571 UART: [fwproc] Wait for Commands...
10,417,537 UART: [fwproc] Recv command 0x46574c44
10,419,804 UART: [fwproc] Recv'd Img size: 114360 bytes
12,504,282 UART: ROM Fatal Error: 0x000B003C
12,507,912 >>> mbox cmd response: failed
12,508,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,808 >>> mbox cmd response: failed
12,509,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,490 >>> mbox cmd response: failed
Initializing fuses
2,054,893 writing to cptra_bootfsm_go
2,244,218 UART:
2,244,582 UART: Running Caliptra ROM ...
2,245,659 UART:
2,245,815 UART: [state] CFI Enabled
2,305,889 UART: [state] LifecycleState = Unprovisioned
2,308,292 UART: [state] DebugLocked = No
2,309,694 UART: [state] WD Timer not started. Device not locked for debugging
2,313,893 UART: [kat] SHA2-256
2,503,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,514,545 UART: [kat] ++
2,515,004 UART: [kat] sha1
2,525,791 UART: [kat] SHA2-256
2,528,815 UART: [kat] SHA2-384
2,535,187 UART: [kat] SHA2-512-ACC
2,537,786 UART: [kat] ECC-384
4,989,502 UART: [kat] HMAC-384Kdf
5,012,445 UART: [kat] LMS
5,544,206 UART: [kat] --
5,548,492 UART: [cold-reset] ++
5,549,996 UART: [fht] FHT @ 0x50003400
5,560,821 UART: [idev] ++
5,561,494 UART: [idev] CDI.KEYID = 6
5,562,430 UART: [idev] SUBJECT.KEYID = 7
5,563,699 UART: [idev] UDS.KEYID = 0
5,565,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,759 UART: [idev] Erasing UDS.KEYID = 0
8,067,728 UART: [idev] Sha1 KeyId Algorithm
8,090,315 UART: [idev] --
8,094,854 UART: [ldev] ++
8,095,541 UART: [ldev] CDI.KEYID = 6
8,096,455 UART: [ldev] SUBJECT.KEYID = 5
8,097,618 UART: [ldev] AUTHORITY.KEYID = 7
8,098,871 UART: [ldev] FE.KEYID = 1
8,139,777 UART: [ldev] Erasing FE.KEYID = 1
10,646,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,088 UART: [ldev] --
12,452,812 UART: [fwproc] Wait for Commands...
12,454,908 UART: [fwproc] Recv command 0x46574c44
12,457,255 UART: [fwproc] Recv'd Img size: 114360 bytes
15,912,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,105,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,648,989 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,440,238 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,280,056 >>> mbox cmd response: failed
12,280,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,280,944 >>> mbox cmd response: failed
12,281,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,281,548 >>> mbox cmd response: failed
Initializing fuses
2,055,096 writing to cptra_bootfsm_go
5,493,616 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,781,369 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,443 UART:
192,798 UART: Running Caliptra ROM ...
193,997 UART:
603,672 UART: [state] CFI Enabled
618,513 UART: [state] LifecycleState = Unprovisioned
620,882 UART: [state] DebugLocked = No
622,685 UART: [state] WD Timer not started. Device not locked for debugging
626,511 UART: [kat] SHA2-256
816,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,170 UART: [kat] ++
827,729 UART: [kat] sha1
838,776 UART: [kat] SHA2-256
841,791 UART: [kat] SHA2-384
846,965 UART: [kat] SHA2-512-ACC
849,521 UART: [kat] ECC-384
3,290,485 UART: [kat] HMAC-384Kdf
3,302,826 UART: [kat] LMS
3,834,714 UART: [kat] --
3,838,035 UART: [cold-reset] ++
3,839,270 UART: [fht] FHT @ 0x50003400
3,851,005 UART: [idev] ++
3,851,746 UART: [idev] CDI.KEYID = 6
3,852,654 UART: [idev] SUBJECT.KEYID = 7
3,853,870 UART: [idev] UDS.KEYID = 0
3,856,515 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,351 UART: [idev] Erasing UDS.KEYID = 0
6,329,658 UART: [idev] Sha1 KeyId Algorithm
6,351,214 UART: [idev] --
6,356,177 UART: [ldev] ++
6,356,857 UART: [ldev] CDI.KEYID = 6
6,357,764 UART: [ldev] SUBJECT.KEYID = 5
6,358,926 UART: [ldev] AUTHORITY.KEYID = 7
6,360,153 UART: [ldev] FE.KEYID = 1
6,372,151 UART: [ldev] Erasing FE.KEYID = 1
8,851,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,446 UART: [ldev] --
10,640,321 UART: [fwproc] Wait for Commands...
10,643,453 UART: [fwproc] Recv command 0x46574c44
10,645,742 UART: [fwproc] Recv'd Img size: 114360 bytes
12,732,905 UART: ROM Fatal Error: 0x000B003C
12,736,555 >>> mbox cmd response: failed
12,736,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,288 >>> mbox cmd response: failed
12,737,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,847 >>> mbox cmd response: failed
Initializing fuses
2,053,840 writing to cptra_bootfsm_go
2,243,161 UART:
2,243,492 UART: Running Caliptra ROM ...
2,244,636 UART:
7,714,232 UART: [state] CFI Enabled
7,729,100 UART: [state] LifecycleState = Unprovisioned
7,731,473 UART: [state] DebugLocked = No
7,734,054 UART: [state] WD Timer not started. Device not locked for debugging
7,738,231 UART: [kat] SHA2-256
7,928,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,938,905 UART: [kat] ++
7,939,506 UART: [kat] sha1
7,951,374 UART: [kat] SHA2-256
7,954,347 UART: [kat] SHA2-384
7,960,554 UART: [kat] SHA2-512-ACC
7,963,181 UART: [kat] ECC-384
10,402,383 UART: [kat] HMAC-384Kdf
10,416,712 UART: [kat] LMS
10,948,551 UART: [kat] --
10,952,823 UART: [cold-reset] ++
10,954,979 UART: [fht] FHT @ 0x50003400
10,966,279 UART: [idev] ++
10,966,972 UART: [idev] CDI.KEYID = 6
10,967,884 UART: [idev] SUBJECT.KEYID = 7
10,969,096 UART: [idev] UDS.KEYID = 0
10,971,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,115,182 UART: [idev] Erasing UDS.KEYID = 0
13,444,638 UART: [idev] Sha1 KeyId Algorithm
13,466,102 UART: [idev] --
13,470,692 UART: [ldev] ++
13,471,367 UART: [ldev] CDI.KEYID = 6
13,472,277 UART: [ldev] SUBJECT.KEYID = 5
13,473,440 UART: [ldev] AUTHORITY.KEYID = 7
13,474,673 UART: [ldev] FE.KEYID = 1
13,484,724 UART: [ldev] Erasing FE.KEYID = 1
15,962,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,679,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,694,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,709,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,725,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,746,221 UART: [ldev] --
17,752,421 UART: [fwproc] Wait for Commands...
17,755,382 UART: [fwproc] Recv command 0x46574c44
17,757,694 UART: [fwproc] Recv'd Img size: 114360 bytes
21,204,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,280,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,396,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,939,253 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,757,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,521,060 >>> mbox cmd response: failed
12,521,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,967 >>> mbox cmd response: failed
12,522,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,522,530 >>> mbox cmd response: failed
Initializing fuses
2,060,381 writing to cptra_bootfsm_go
11,094,496 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,296,178 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,017 UART: [kat] SHA2-256
881,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,063 UART: [kat] ++
886,215 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,860 UART: [kat] SHA2-512-ACC
896,761 UART: [kat] ECC-384
902,294 UART: [kat] HMAC-384Kdf
906,886 UART: [kat] LMS
1,475,082 UART: [kat] --
1,476,103 UART: [cold-reset] ++
1,476,521 UART: [fht] Storing FHT @ 0x50003400
1,479,314 UART: [idev] ++
1,479,482 UART: [idev] CDI.KEYID = 6
1,479,842 UART: [idev] SUBJECT.KEYID = 7
1,480,266 UART: [idev] UDS.KEYID = 0
1,480,611 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,144 UART: [idev] Erasing UDS.KEYID = 0
1,504,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,942 UART: [idev] --
1,514,111 UART: [ldev] ++
1,514,279 UART: [ldev] CDI.KEYID = 6
1,514,642 UART: [ldev] SUBJECT.KEYID = 5
1,515,068 UART: [ldev] AUTHORITY.KEYID = 7
1,515,531 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,546,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,544 UART: [ldev] --
1,585,907 UART: [fwproc] Waiting for Commands...
1,586,604 UART: [fwproc] Received command 0x46574c44
1,587,395 UART: [fwproc] Received Image of size 114360 bytes
1,634,729 UART: ROM Fatal Error: 0x000B003C
1,635,888 >>> mbox cmd response: failed
1,635,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,894 >>> mbox cmd response: failed
1,635,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,600 UART: [kat] SHA2-512-ACC
897,501 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,640 UART: [idev] ++
1,479,808 UART: [idev] CDI.KEYID = 6
1,480,168 UART: [idev] SUBJECT.KEYID = 7
1,480,592 UART: [idev] UDS.KEYID = 0
1,480,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,542 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,498 UART: [idev] --
1,514,495 UART: [ldev] ++
1,514,663 UART: [ldev] CDI.KEYID = 6
1,515,026 UART: [ldev] SUBJECT.KEYID = 5
1,515,452 UART: [ldev] AUTHORITY.KEYID = 7
1,515,915 UART: [ldev] FE.KEYID = 1
1,520,909 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,418 UART: [ldev] --
1,585,751 UART: [fwproc] Waiting for Commands...
1,586,398 UART: [fwproc] Received command 0x46574c44
1,587,189 UART: [fwproc] Received Image of size 114360 bytes
2,884,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,364 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,165 >>> mbox cmd response: failed
1,488,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,171 >>> mbox cmd response: failed
1,488,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,653 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,870 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,592 UART: [cold-reset] ++
1,477,042 UART: [fht] Storing FHT @ 0x50003400
1,479,853 UART: [idev] ++
1,480,021 UART: [idev] CDI.KEYID = 6
1,480,381 UART: [idev] SUBJECT.KEYID = 7
1,480,805 UART: [idev] UDS.KEYID = 0
1,481,150 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,959 UART: [idev] Erasing UDS.KEYID = 0
1,506,075 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,639 UART: [idev] --
1,515,728 UART: [ldev] ++
1,515,896 UART: [ldev] CDI.KEYID = 6
1,516,259 UART: [ldev] SUBJECT.KEYID = 5
1,516,685 UART: [ldev] AUTHORITY.KEYID = 7
1,517,148 UART: [ldev] FE.KEYID = 1
1,522,660 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,617 UART: [ldev] --
1,587,120 UART: [fwproc] Waiting for Commands...
1,587,981 UART: [fwproc] Received command 0x46574c44
1,588,772 UART: [fwproc] Received Image of size 114360 bytes
1,636,400 UART: ROM Fatal Error: 0x000B003C
1,637,559 >>> mbox cmd response: failed
1,637,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,565 >>> mbox cmd response: failed
1,637,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,090 UART: [kat] SHA2-256
882,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,136 UART: [kat] ++
886,288 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,795 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,593 UART: [idev] Erasing UDS.KEYID = 0
1,505,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,565 UART: [idev] --
1,514,394 UART: [ldev] ++
1,514,562 UART: [ldev] CDI.KEYID = 6
1,514,925 UART: [ldev] SUBJECT.KEYID = 5
1,515,351 UART: [ldev] AUTHORITY.KEYID = 7
1,515,814 UART: [ldev] FE.KEYID = 1
1,520,884 UART: [ldev] Erasing FE.KEYID = 1
1,546,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,811 UART: [ldev] --
1,585,076 UART: [fwproc] Waiting for Commands...
1,585,911 UART: [fwproc] Received command 0x46574c44
1,586,702 UART: [fwproc] Received Image of size 114360 bytes
2,884,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,348 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,677 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,226 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,698 >>> mbox cmd response: failed
1,488,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,704 >>> mbox cmd response: failed
1,488,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,331 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,542 UART: [kat] SHA2-512-ACC
908,443 UART: [kat] ECC-384
918,316 UART: [kat] HMAC-384Kdf
922,938 UART: [kat] LMS
1,171,266 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,633 UART: [fht] FHT @ 0x50003400
1,175,282 UART: [idev] ++
1,175,450 UART: [idev] CDI.KEYID = 6
1,175,810 UART: [idev] SUBJECT.KEYID = 7
1,176,234 UART: [idev] UDS.KEYID = 0
1,176,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,200,359 UART: [idev] Sha1 KeyId Algorithm
1,208,831 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,446 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,865 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,206 UART: ROM Fatal Error: 0x000B003C
1,331,365 >>> mbox cmd response: failed
1,331,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,371 >>> mbox cmd response: failed
1,331,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,377 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,609 UART: [fht] FHT @ 0x50003400
1,175,228 UART: [idev] ++
1,175,396 UART: [idev] CDI.KEYID = 6
1,175,756 UART: [idev] SUBJECT.KEYID = 7
1,176,180 UART: [idev] UDS.KEYID = 0
1,176,525 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,233 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,988 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,343 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,637 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,835 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,235 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,934 >>> mbox cmd response: failed
1,185,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,940 >>> mbox cmd response: failed
1,185,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,422 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
906,791 UART: [kat] SHA2-512-ACC
908,692 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,069 UART: [kat] LMS
1,171,397 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,557 UART: [idev] ++
1,175,725 UART: [idev] CDI.KEYID = 6
1,176,085 UART: [idev] SUBJECT.KEYID = 7
1,176,509 UART: [idev] UDS.KEYID = 0
1,176,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,453 UART: [idev] Erasing UDS.KEYID = 0
1,201,042 UART: [idev] Sha1 KeyId Algorithm
1,209,416 UART: [idev] --
1,210,406 UART: [ldev] ++
1,210,574 UART: [ldev] CDI.KEYID = 6
1,210,937 UART: [ldev] SUBJECT.KEYID = 5
1,211,363 UART: [ldev] AUTHORITY.KEYID = 7
1,211,826 UART: [ldev] FE.KEYID = 1
1,216,832 UART: [ldev] Erasing FE.KEYID = 1
1,243,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,412 UART: [ldev] --
1,282,727 UART: [fwproc] Wait for Commands...
1,283,435 UART: [fwproc] Recv command 0x46574c44
1,284,163 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,649 UART: ROM Fatal Error: 0x000B003C
1,332,808 >>> mbox cmd response: failed
1,332,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,814 >>> mbox cmd response: failed
1,332,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,820 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,132 UART: [kat] SHA2-256
904,072 UART: [kat] SHA2-384
906,841 UART: [kat] SHA2-512-ACC
908,742 UART: [kat] ECC-384
918,755 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,308 UART: [cold-reset] ++
1,172,810 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,131 UART: [idev] Erasing UDS.KEYID = 0
1,201,150 UART: [idev] Sha1 KeyId Algorithm
1,209,520 UART: [idev] --
1,210,574 UART: [ldev] ++
1,210,742 UART: [ldev] CDI.KEYID = 6
1,211,105 UART: [ldev] SUBJECT.KEYID = 5
1,211,531 UART: [ldev] AUTHORITY.KEYID = 7
1,211,994 UART: [ldev] FE.KEYID = 1
1,217,184 UART: [ldev] Erasing FE.KEYID = 1
1,244,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,206 UART: [ldev] --
1,283,475 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,270 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,459 >>> mbox cmd response: failed
1,188,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,465 >>> mbox cmd response: failed
1,188,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,461 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,174,399 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,775 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,241,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,090 UART: [fwproc] Wait for Commands...
1,281,755 UART: [fwproc] Recv command 0x46574c44
1,282,488 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,049 UART: ROM Fatal Error: 0x000B003C
1,330,208 >>> mbox cmd response: failed
1,330,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,214 >>> mbox cmd response: failed
1,330,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,170,051 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,185 UART: [idev] Sha1 KeyId Algorithm
1,207,073 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,241,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,844 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,280,985 UART: [fwproc] Recv command 0x46574c44
1,281,718 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,253 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,375 >>> mbox cmd response: failed
1,183,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,381 >>> mbox cmd response: failed
1,183,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,777 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,772 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,241,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,317 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,042 UART: ROM Fatal Error: 0x000B003C
1,331,201 >>> mbox cmd response: failed
1,331,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,207 >>> mbox cmd response: failed
1,331,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,157 UART: [kat] LMS
1,169,469 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,944 UART: [fht] FHT @ 0x50003400
1,173,738 UART: [idev] ++
1,173,906 UART: [idev] CDI.KEYID = 6
1,174,267 UART: [idev] SUBJECT.KEYID = 7
1,174,692 UART: [idev] UDS.KEYID = 0
1,175,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,200,222 UART: [idev] Sha1 KeyId Algorithm
1,209,082 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,443 UART: [ldev] --
1,282,719 UART: [fwproc] Wait for Commands...
1,283,360 UART: [fwproc] Recv command 0x46574c44
1,284,093 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,634 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,958 >>> mbox cmd response: failed
1,182,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,964 >>> mbox cmd response: failed
1,182,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,516 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,129 UART:
192,501 UART: Running Caliptra ROM ...
193,592 UART:
193,732 UART: [state] CFI Enabled
264,021 UART: [state] LifecycleState = Manufacturing
265,994 UART: [state] DebugLocked = No
268,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,816 UART: [kat] SHA2-256
443,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,050 UART: [kat] ++
454,589 UART: [kat] sha1
464,780 UART: [kat] SHA2-256
467,457 UART: [kat] SHA2-384
473,375 UART: [kat] SHA2-512-ACC
475,743 UART: [kat] ECC-384
2,765,157 UART: [kat] HMAC-384Kdf
2,799,424 UART: [kat] LMS
3,989,699 UART: [kat] --
3,993,053 UART: [cold-reset] ++
3,995,698 UART: [fht] Storing FHT @ 0x50003400
4,006,866 UART: [idev] ++
4,007,629 UART: [idev] CDI.KEYID = 6
4,008,578 UART: [idev] SUBJECT.KEYID = 7
4,009,695 UART: [idev] UDS.KEYID = 0
4,012,542 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,038 UART: [idev] Erasing UDS.KEYID = 0
7,345,020 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,421 UART: [idev] --
7,370,780 UART: [ldev] ++
7,371,391 UART: [ldev] CDI.KEYID = 6
7,372,334 UART: [ldev] SUBJECT.KEYID = 5
7,373,506 UART: [ldev] AUTHORITY.KEYID = 7
7,374,797 UART: [ldev] FE.KEYID = 1
7,402,403 UART: [ldev] Erasing FE.KEYID = 1
10,735,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,253 UART: [ldev] --
13,096,226 UART: [fwproc] Waiting for Commands...
13,098,112 UART: [fwproc] Received command 0x46574c44
13,100,355 UART: [fwproc] Received Image of size 114036 bytes
17,185,931 UART: ROM Fatal Error: 0x000B002C
17,189,385 >>> mbox cmd response: failed
17,189,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,190,194 >>> mbox cmd response: failed
17,190,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,190,760 >>> mbox cmd response: failed
Initializing fuses
2,054,905 writing to cptra_bootfsm_go
2,244,159 UART:
2,244,506 UART: Running Caliptra ROM ...
2,245,641 UART:
2,245,828 UART: [state] CFI Enabled
2,317,578 UART: [state] LifecycleState = Manufacturing
2,319,513 UART: [state] DebugLocked = No
2,321,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,747 UART: [kat] SHA2-256
2,496,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,894 UART: [kat] ++
2,507,358 UART: [kat] sha1
2,519,476 UART: [kat] SHA2-256
2,522,185 UART: [kat] SHA2-384
2,528,281 UART: [kat] SHA2-512-ACC
2,530,627 UART: [kat] ECC-384
4,823,921 UART: [kat] HMAC-384Kdf
4,853,334 UART: [kat] LMS
6,043,610 UART: [kat] --
6,047,663 UART: [cold-reset] ++
6,049,110 UART: [fht] Storing FHT @ 0x50003400
6,059,840 UART: [idev] ++
6,060,417 UART: [idev] CDI.KEYID = 6
6,061,302 UART: [idev] SUBJECT.KEYID = 7
6,062,569 UART: [idev] UDS.KEYID = 0
6,065,116 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,208,679 UART: [idev] Erasing UDS.KEYID = 0
9,400,420 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,158 UART: [idev] --
9,427,266 UART: [ldev] ++
9,427,836 UART: [ldev] CDI.KEYID = 6
9,428,774 UART: [ldev] SUBJECT.KEYID = 5
9,430,036 UART: [ldev] AUTHORITY.KEYID = 7
9,431,280 UART: [ldev] FE.KEYID = 1
9,474,729 UART: [ldev] Erasing FE.KEYID = 1
12,806,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,116,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,287 UART: [ldev] --
15,168,384 UART: [fwproc] Waiting for Commands...
15,170,374 UART: [fwproc] Received command 0x46574c44
15,172,560 UART: [fwproc] Received Image of size 114036 bytes
19,259,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,332,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,401,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,718,259 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,698 writing to cptra_bootfsm_go
3,786,674 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,139,729 >>> mbox cmd response: failed
17,140,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,140,612 >>> mbox cmd response: failed
17,140,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,141,178 >>> mbox cmd response: failed
Initializing fuses
2,050,410 writing to cptra_bootfsm_go
5,837,133 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,966,469 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,476 UART:
192,823 UART: Running Caliptra ROM ...
194,019 UART:
603,787 UART: [state] CFI Enabled
615,319 UART: [state] LifecycleState = Manufacturing
617,242 UART: [state] DebugLocked = No
619,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,587 UART: [kat] SHA2-256
794,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,905 UART: [kat] ++
805,387 UART: [kat] sha1
817,242 UART: [kat] SHA2-256
819,939 UART: [kat] SHA2-384
825,267 UART: [kat] SHA2-512-ACC
827,609 UART: [kat] ECC-384
3,112,676 UART: [kat] HMAC-384Kdf
3,124,549 UART: [kat] LMS
4,314,639 UART: [kat] --
4,318,762 UART: [cold-reset] ++
4,320,105 UART: [fht] Storing FHT @ 0x50003400
4,330,832 UART: [idev] ++
4,331,400 UART: [idev] CDI.KEYID = 6
4,332,366 UART: [idev] SUBJECT.KEYID = 7
4,333,580 UART: [idev] UDS.KEYID = 0
4,336,341 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,783 UART: [idev] Erasing UDS.KEYID = 0
7,624,052 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,070 UART: [idev] --
7,650,184 UART: [ldev] ++
7,650,763 UART: [ldev] CDI.KEYID = 6
7,651,701 UART: [ldev] SUBJECT.KEYID = 5
7,652,912 UART: [ldev] AUTHORITY.KEYID = 7
7,654,225 UART: [ldev] FE.KEYID = 1
7,665,227 UART: [ldev] Erasing FE.KEYID = 1
10,955,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,070 UART: [ldev] --
13,315,137 UART: [fwproc] Waiting for Commands...
13,318,385 UART: [fwproc] Received command 0x46574c44
13,320,576 UART: [fwproc] Received Image of size 114036 bytes
17,401,262 UART: ROM Fatal Error: 0x000B002C
17,404,696 >>> mbox cmd response: failed
17,405,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,405,495 >>> mbox cmd response: failed
17,405,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,406,067 >>> mbox cmd response: failed
Initializing fuses
2,050,327 writing to cptra_bootfsm_go
2,239,644 UART:
2,239,999 UART: Running Caliptra ROM ...
2,241,087 UART:
3,067,030 UART: [state] CFI Enabled
3,081,131 UART: [state] LifecycleState = Manufacturing
3,083,053 UART: [state] DebugLocked = No
3,086,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,090,229 UART: [kat] SHA2-256
3,259,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,270,530 UART: [kat] ++
3,271,015 UART: [kat] sha1
3,283,311 UART: [kat] SHA2-256
3,286,060 UART: [kat] SHA2-384
3,292,488 UART: [kat] SHA2-512-ACC
3,294,838 UART: [kat] ECC-384
5,578,157 UART: [kat] HMAC-384Kdf
5,590,720 UART: [kat] LMS
6,780,870 UART: [kat] --
6,784,503 UART: [cold-reset] ++
6,786,253 UART: [fht] Storing FHT @ 0x50003400
6,798,519 UART: [idev] ++
6,799,092 UART: [idev] CDI.KEYID = 6
6,800,008 UART: [idev] SUBJECT.KEYID = 7
6,801,286 UART: [idev] UDS.KEYID = 0
6,803,916 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,947,276 UART: [idev] Erasing UDS.KEYID = 0
10,088,803 UART: [idev] Using Sha1 for KeyId Algorithm
10,110,943 UART: [idev] --
10,115,212 UART: [ldev] ++
10,115,784 UART: [ldev] CDI.KEYID = 6
10,116,749 UART: [ldev] SUBJECT.KEYID = 5
10,117,943 UART: [ldev] AUTHORITY.KEYID = 7
10,119,181 UART: [ldev] FE.KEYID = 1
10,130,691 UART: [ldev] Erasing FE.KEYID = 1
13,416,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,711,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,725,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,740,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,755,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,774,398 UART: [ldev] --
15,779,284 UART: [fwproc] Waiting for Commands...
15,781,270 UART: [fwproc] Received command 0x46574c44
15,783,475 UART: [fwproc] Received Image of size 114036 bytes
19,875,372 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,950,534 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,019,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,336,333 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
4,133,533 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,378,730 >>> mbox cmd response: failed
17,379,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,379,672 >>> mbox cmd response: failed
17,379,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,244 >>> mbox cmd response: failed
Initializing fuses
2,050,342 writing to cptra_bootfsm_go
6,606,253 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,575,072 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,171 UART:
192,546 UART: Running Caliptra ROM ...
193,662 UART:
193,805 UART: [state] CFI Enabled
263,044 UART: [state] LifecycleState = Manufacturing
264,937 UART: [state] DebugLocked = No
266,234 UART: [state] WD Timer not started. Device not locked for debugging
269,461 UART: [kat] SHA2-256
448,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,148 UART: [kat] ++
460,600 UART: [kat] sha1
472,070 UART: [kat] SHA2-256
475,084 UART: [kat] SHA2-384
481,339 UART: [kat] SHA2-512-ACC
484,271 UART: [kat] ECC-384
2,947,177 UART: [kat] HMAC-384Kdf
2,969,237 UART: [kat] LMS
3,498,682 UART: [kat] --
3,503,723 UART: [cold-reset] ++
3,505,545 UART: [fht] FHT @ 0x50003400
3,517,226 UART: [idev] ++
3,517,790 UART: [idev] CDI.KEYID = 6
3,518,759 UART: [idev] SUBJECT.KEYID = 7
3,519,918 UART: [idev] UDS.KEYID = 0
3,522,653 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,665 UART: [idev] Erasing UDS.KEYID = 0
6,022,566 UART: [idev] Sha1 KeyId Algorithm
6,046,395 UART: [idev] --
6,050,125 UART: [ldev] ++
6,050,694 UART: [ldev] CDI.KEYID = 6
6,051,818 UART: [ldev] SUBJECT.KEYID = 5
6,052,856 UART: [ldev] AUTHORITY.KEYID = 7
6,053,948 UART: [ldev] FE.KEYID = 1
6,097,730 UART: [ldev] Erasing FE.KEYID = 1
8,600,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,675 UART: [ldev] --
10,410,862 UART: [fwproc] Wait for Commands...
10,413,928 UART: [fwproc] Recv command 0x46574c44
10,416,025 UART: [fwproc] Recv'd Img size: 114360 bytes
13,847,658 UART: ROM Fatal Error: 0x000B002C
13,850,798 >>> mbox cmd response: failed
13,851,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,851,564 >>> mbox cmd response: failed
13,851,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,852,124 >>> mbox cmd response: failed
Initializing fuses
2,050,203 writing to cptra_bootfsm_go
2,239,530 UART:
2,239,872 UART: Running Caliptra ROM ...
2,241,013 UART:
2,241,178 UART: [state] CFI Enabled
2,303,667 UART: [state] LifecycleState = Manufacturing
2,305,541 UART: [state] DebugLocked = No
2,308,282 UART: [state] WD Timer not started. Device not locked for debugging
2,311,916 UART: [kat] SHA2-256
2,490,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,604 UART: [kat] ++
2,503,151 UART: [kat] sha1
2,514,425 UART: [kat] SHA2-256
2,517,469 UART: [kat] SHA2-384
2,523,635 UART: [kat] SHA2-512-ACC
2,526,622 UART: [kat] ECC-384
4,989,335 UART: [kat] HMAC-384Kdf
5,011,134 UART: [kat] LMS
5,540,612 UART: [kat] --
5,546,760 UART: [cold-reset] ++
5,548,101 UART: [fht] FHT @ 0x50003400
5,559,895 UART: [idev] ++
5,560,499 UART: [idev] CDI.KEYID = 6
5,561,392 UART: [idev] SUBJECT.KEYID = 7
5,562,500 UART: [idev] UDS.KEYID = 0
5,565,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,059 UART: [idev] Erasing UDS.KEYID = 0
8,066,145 UART: [idev] Sha1 KeyId Algorithm
8,088,839 UART: [idev] --
8,094,533 UART: [ldev] ++
8,095,107 UART: [ldev] CDI.KEYID = 6
8,095,989 UART: [ldev] SUBJECT.KEYID = 5
8,097,207 UART: [ldev] AUTHORITY.KEYID = 7
8,098,445 UART: [ldev] FE.KEYID = 1
8,140,015 UART: [ldev] Erasing FE.KEYID = 1
10,642,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,034 UART: [ldev] --
12,453,101 UART: [fwproc] Wait for Commands...
12,455,253 UART: [fwproc] Recv command 0x46574c44
12,457,297 UART: [fwproc] Recv'd Img size: 114360 bytes
15,899,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,042,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,361,260 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,126 UART:
192,497 UART: Running Caliptra ROM ...
193,639 UART:
193,787 UART: [state] CFI Enabled
263,420 UART: [state] LifecycleState = Manufacturing
265,786 UART: [state] DebugLocked = No
268,627 UART: [state] WD Timer not started. Device not locked for debugging
273,577 UART: [kat] SHA2-256
463,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,230 UART: [kat] ++
474,768 UART: [kat] sha1
486,035 UART: [kat] SHA2-256
489,050 UART: [kat] SHA2-384
493,903 UART: [kat] SHA2-512-ACC
496,516 UART: [kat] ECC-384
2,946,767 UART: [kat] HMAC-384Kdf
2,969,921 UART: [kat] LMS
3,501,681 UART: [kat] --
3,506,287 UART: [cold-reset] ++
3,507,685 UART: [fht] FHT @ 0x50003400
3,519,917 UART: [idev] ++
3,520,596 UART: [idev] CDI.KEYID = 6
3,521,618 UART: [idev] SUBJECT.KEYID = 7
3,522,774 UART: [idev] UDS.KEYID = 0
3,525,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,498 UART: [idev] Erasing UDS.KEYID = 0
6,027,392 UART: [idev] Sha1 KeyId Algorithm
6,050,384 UART: [idev] --
6,056,492 UART: [ldev] ++
6,057,180 UART: [ldev] CDI.KEYID = 6
6,058,095 UART: [ldev] SUBJECT.KEYID = 5
6,059,263 UART: [ldev] AUTHORITY.KEYID = 7
6,060,500 UART: [ldev] FE.KEYID = 1
6,098,268 UART: [ldev] Erasing FE.KEYID = 1
8,603,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,954 UART: [ldev] --
10,404,345 UART: [fwproc] Wait for Commands...
10,405,847 UART: [fwproc] Recv command 0x46574c44
10,407,837 UART: [fwproc] Recv'd Img size: 114360 bytes
13,885,278 UART: ROM Fatal Error: 0x000B002C
13,888,940 >>> mbox cmd response: failed
13,889,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,889,717 >>> mbox cmd response: failed
13,889,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,890,273 >>> mbox cmd response: failed
Initializing fuses
2,053,857 writing to cptra_bootfsm_go
2,243,179 UART:
2,243,532 UART: Running Caliptra ROM ...
2,244,687 UART:
2,244,851 UART: [state] CFI Enabled
2,305,671 UART: [state] LifecycleState = Manufacturing
2,308,050 UART: [state] DebugLocked = No
2,310,900 UART: [state] WD Timer not started. Device not locked for debugging
2,314,986 UART: [kat] SHA2-256
2,504,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,643 UART: [kat] ++
2,516,096 UART: [kat] sha1
2,527,258 UART: [kat] SHA2-256
2,530,274 UART: [kat] SHA2-384
2,535,943 UART: [kat] SHA2-512-ACC
2,538,517 UART: [kat] ECC-384
4,988,202 UART: [kat] HMAC-384Kdf
5,013,033 UART: [kat] LMS
5,544,802 UART: [kat] --
5,549,110 UART: [cold-reset] ++
5,551,216 UART: [fht] FHT @ 0x50003400
5,563,602 UART: [idev] ++
5,564,290 UART: [idev] CDI.KEYID = 6
5,565,256 UART: [idev] SUBJECT.KEYID = 7
5,566,474 UART: [idev] UDS.KEYID = 0
5,569,422 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,713,393 UART: [idev] Erasing UDS.KEYID = 0
8,090,526 UART: [idev] Sha1 KeyId Algorithm
8,113,019 UART: [idev] --
8,117,777 UART: [ldev] ++
8,118,465 UART: [ldev] CDI.KEYID = 6
8,119,348 UART: [ldev] SUBJECT.KEYID = 5
8,120,502 UART: [ldev] AUTHORITY.KEYID = 7
8,121,795 UART: [ldev] FE.KEYID = 1
8,161,858 UART: [ldev] Erasing FE.KEYID = 1
10,671,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,186 UART: [ldev] --
12,476,302 UART: [fwproc] Wait for Commands...
12,478,724 UART: [fwproc] Recv command 0x46574c44
12,480,985 UART: [fwproc] Recv'd Img size: 114360 bytes
15,955,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,037,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,153,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,697,134 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,439,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,316,566 >>> mbox cmd response: failed
14,317,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,317,557 >>> mbox cmd response: failed
14,317,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,318,120 >>> mbox cmd response: failed
Initializing fuses
2,044,381 writing to cptra_bootfsm_go
5,482,676 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,822,107 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,379 UART:
192,738 UART: Running Caliptra ROM ...
193,876 UART:
603,635 UART: [state] CFI Enabled
619,439 UART: [state] LifecycleState = Manufacturing
621,836 UART: [state] DebugLocked = No
624,623 UART: [state] WD Timer not started. Device not locked for debugging
628,498 UART: [kat] SHA2-256
818,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,198 UART: [kat] ++
829,788 UART: [kat] sha1
841,702 UART: [kat] SHA2-256
844,703 UART: [kat] SHA2-384
851,377 UART: [kat] SHA2-512-ACC
853,995 UART: [kat] ECC-384
3,295,542 UART: [kat] HMAC-384Kdf
3,307,680 UART: [kat] LMS
3,839,454 UART: [kat] --
3,843,981 UART: [cold-reset] ++
3,846,073 UART: [fht] FHT @ 0x50003400
3,856,780 UART: [idev] ++
3,857,524 UART: [idev] CDI.KEYID = 6
3,858,446 UART: [idev] SUBJECT.KEYID = 7
3,859,609 UART: [idev] UDS.KEYID = 0
3,862,378 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,006,084 UART: [idev] Erasing UDS.KEYID = 0
6,335,130 UART: [idev] Sha1 KeyId Algorithm
6,357,225 UART: [idev] --
6,361,812 UART: [ldev] ++
6,362,491 UART: [ldev] CDI.KEYID = 6
6,363,397 UART: [ldev] SUBJECT.KEYID = 5
6,364,557 UART: [ldev] AUTHORITY.KEYID = 7
6,365,788 UART: [ldev] FE.KEYID = 1
6,376,868 UART: [ldev] Erasing FE.KEYID = 1
8,854,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,934 UART: [ldev] --
10,643,551 UART: [fwproc] Wait for Commands...
10,646,357 UART: [fwproc] Recv command 0x46574c44
10,648,671 UART: [fwproc] Recv'd Img size: 114360 bytes
14,120,272 UART: ROM Fatal Error: 0x000B002C
14,123,946 >>> mbox cmd response: failed
14,124,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,124,707 >>> mbox cmd response: failed
14,124,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,125,264 >>> mbox cmd response: failed
Initializing fuses
2,056,949 writing to cptra_bootfsm_go
2,246,232 UART:
2,246,593 UART: Running Caliptra ROM ...
2,247,692 UART:
6,324,838 UART: [state] CFI Enabled
6,338,775 UART: [state] LifecycleState = Manufacturing
6,341,179 UART: [state] DebugLocked = No
6,344,131 UART: [state] WD Timer not started. Device not locked for debugging
6,347,985 UART: [kat] SHA2-256
6,537,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,548,652 UART: [kat] ++
6,549,171 UART: [kat] sha1
6,560,057 UART: [kat] SHA2-256
6,563,081 UART: [kat] SHA2-384
6,569,083 UART: [kat] SHA2-512-ACC
6,571,651 UART: [kat] ECC-384
9,013,084 UART: [kat] HMAC-384Kdf
9,026,722 UART: [kat] LMS
9,558,538 UART: [kat] --
9,565,013 UART: [cold-reset] ++
9,566,676 UART: [fht] FHT @ 0x50003400
9,578,078 UART: [idev] ++
9,578,763 UART: [idev] CDI.KEYID = 6
9,579,782 UART: [idev] SUBJECT.KEYID = 7
9,580,947 UART: [idev] UDS.KEYID = 0
9,583,615 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,727,387 UART: [idev] Erasing UDS.KEYID = 0
12,057,432 UART: [idev] Sha1 KeyId Algorithm
12,081,099 UART: [idev] --
12,085,800 UART: [ldev] ++
12,086,485 UART: [ldev] CDI.KEYID = 6
12,087,394 UART: [ldev] SUBJECT.KEYID = 5
12,088,630 UART: [ldev] AUTHORITY.KEYID = 7
12,089,809 UART: [ldev] FE.KEYID = 1
12,099,593 UART: [ldev] Erasing FE.KEYID = 1
14,577,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,298,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,313,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,328,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,343,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,364,781 UART: [ldev] --
16,370,702 UART: [fwproc] Wait for Commands...
16,372,949 UART: [fwproc] Recv command 0x46574c44
16,375,276 UART: [fwproc] Recv'd Img size: 114360 bytes
19,845,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,918,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,034,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,576,974 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,753,826 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,535,421 >>> mbox cmd response: failed
14,536,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,536,383 >>> mbox cmd response: failed
14,536,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,536,938 >>> mbox cmd response: failed
Initializing fuses
2,049,048 writing to cptra_bootfsm_go
9,085,066 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,327,885 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Manufacturing
85,907 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,742 UART: [kat] HMAC-384Kdf
907,348 UART: [kat] LMS
1,475,544 UART: [kat] --
1,476,751 UART: [cold-reset] ++
1,477,249 UART: [fht] Storing FHT @ 0x50003400
1,480,024 UART: [idev] ++
1,480,192 UART: [idev] CDI.KEYID = 6
1,480,552 UART: [idev] SUBJECT.KEYID = 7
1,480,976 UART: [idev] UDS.KEYID = 0
1,481,321 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,982 UART: [idev] Erasing UDS.KEYID = 0
1,505,424 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,268 UART: [idev] --
1,515,321 UART: [ldev] ++
1,515,489 UART: [ldev] CDI.KEYID = 6
1,515,852 UART: [ldev] SUBJECT.KEYID = 5
1,516,278 UART: [ldev] AUTHORITY.KEYID = 7
1,516,741 UART: [ldev] FE.KEYID = 1
1,522,013 UART: [ldev] Erasing FE.KEYID = 1
1,546,686 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,858 UART: [ldev] --
1,586,317 UART: [fwproc] Waiting for Commands...
1,587,110 UART: [fwproc] Received command 0x46574c44
1,587,901 UART: [fwproc] Received Image of size 114360 bytes
2,909,898 UART: ROM Fatal Error: 0x000B002C
2,911,057 >>> mbox cmd response: failed
2,911,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,063 >>> mbox cmd response: failed
2,911,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,264 UART: [kat] SHA2-512-ACC
897,165 UART: [kat] ECC-384
902,764 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,793 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,712 UART: [idev] Erasing UDS.KEYID = 0
1,505,302 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,016 UART: [idev] --
1,515,173 UART: [ldev] ++
1,515,341 UART: [ldev] CDI.KEYID = 6
1,515,704 UART: [ldev] SUBJECT.KEYID = 5
1,516,130 UART: [ldev] AUTHORITY.KEYID = 7
1,516,593 UART: [ldev] FE.KEYID = 1
1,521,819 UART: [ldev] Erasing FE.KEYID = 1
1,547,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,544 UART: [ldev] --
1,587,001 UART: [fwproc] Waiting for Commands...
1,587,786 UART: [fwproc] Received command 0x46574c44
1,588,577 UART: [fwproc] Received Image of size 114360 bytes
2,885,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,860 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,764,282 >>> mbox cmd response: failed
2,764,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,288 >>> mbox cmd response: failed
2,764,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,277 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,080 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Manufacturing
86,376 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,800 UART: [kat] SHA2-256
892,738 UART: [kat] SHA2-384
895,553 UART: [kat] SHA2-512-ACC
897,454 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,218 UART: [fht] Storing FHT @ 0x50003400
1,480,109 UART: [idev] ++
1,480,277 UART: [idev] CDI.KEYID = 6
1,480,637 UART: [idev] SUBJECT.KEYID = 7
1,481,061 UART: [idev] UDS.KEYID = 0
1,481,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,923 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,356 UART: [ldev] Erasing FE.KEYID = 1
1,546,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,991 UART: [ldev] --
1,586,456 UART: [fwproc] Waiting for Commands...
1,587,163 UART: [fwproc] Received command 0x46574c44
1,587,954 UART: [fwproc] Received Image of size 114360 bytes
2,911,069 UART: ROM Fatal Error: 0x000B002C
2,912,228 >>> mbox cmd response: failed
2,912,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,912,234 >>> mbox cmd response: failed
2,912,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,912,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,474 UART: [kat] SHA2-256
892,412 UART: [kat] SHA2-384
895,381 UART: [kat] SHA2-512-ACC
897,282 UART: [kat] ECC-384
902,499 UART: [kat] HMAC-384Kdf
907,169 UART: [kat] LMS
1,475,365 UART: [kat] --
1,476,348 UART: [cold-reset] ++
1,476,690 UART: [fht] Storing FHT @ 0x50003400
1,479,259 UART: [idev] ++
1,479,427 UART: [idev] CDI.KEYID = 6
1,479,787 UART: [idev] SUBJECT.KEYID = 7
1,480,211 UART: [idev] UDS.KEYID = 0
1,480,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,045 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,643 UART: [idev] --
1,514,678 UART: [ldev] ++
1,514,846 UART: [ldev] CDI.KEYID = 6
1,515,209 UART: [ldev] SUBJECT.KEYID = 5
1,515,635 UART: [ldev] AUTHORITY.KEYID = 7
1,516,098 UART: [ldev] FE.KEYID = 1
1,521,652 UART: [ldev] Erasing FE.KEYID = 1
1,547,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,433 UART: [ldev] --
1,586,784 UART: [fwproc] Waiting for Commands...
1,587,519 UART: [fwproc] Received command 0x46574c44
1,588,310 UART: [fwproc] Received Image of size 114360 bytes
2,886,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,319 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,764,581 >>> mbox cmd response: failed
2,764,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,587 >>> mbox cmd response: failed
2,764,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,475 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Manufacturing
85,681 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
893,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,429 UART: [kat] ++
897,581 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
917,944 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,895 UART: [cold-reset] ++
1,172,317 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,200,915 UART: [idev] Sha1 KeyId Algorithm
1,209,507 UART: [idev] --
1,210,585 UART: [ldev] ++
1,210,753 UART: [ldev] CDI.KEYID = 6
1,211,116 UART: [ldev] SUBJECT.KEYID = 5
1,211,542 UART: [ldev] AUTHORITY.KEYID = 7
1,212,005 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,082 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 114360 bytes
2,605,543 UART: ROM Fatal Error: 0x000B002C
2,606,702 >>> mbox cmd response: failed
2,606,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,708 >>> mbox cmd response: failed
2,606,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,743 UART: [kat] SHA2-256
903,683 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
918,374 UART: [kat] HMAC-384Kdf
923,012 UART: [kat] LMS
1,171,340 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,479 UART: [fht] FHT @ 0x50003400
1,175,130 UART: [idev] ++
1,175,298 UART: [idev] CDI.KEYID = 6
1,175,658 UART: [idev] SUBJECT.KEYID = 7
1,176,082 UART: [idev] UDS.KEYID = 0
1,176,427 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,246 UART: [idev] Erasing UDS.KEYID = 0
1,201,251 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,211,095 UART: [ldev] ++
1,211,263 UART: [ldev] CDI.KEYID = 6
1,211,626 UART: [ldev] SUBJECT.KEYID = 5
1,212,052 UART: [ldev] AUTHORITY.KEYID = 7
1,212,515 UART: [ldev] FE.KEYID = 1
1,217,961 UART: [ldev] Erasing FE.KEYID = 1
1,244,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,755 UART: [ldev] --
1,283,048 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,502 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,227 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,363 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,462,489 >>> mbox cmd response: failed
2,462,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,495 >>> mbox cmd response: failed
2,462,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,462,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,748 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Manufacturing
86,388 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
893,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,910 UART: [kat] ++
898,062 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
907,087 UART: [kat] SHA2-512-ACC
908,988 UART: [kat] ECC-384
918,387 UART: [kat] HMAC-384Kdf
922,951 UART: [kat] LMS
1,171,279 UART: [kat] --
1,171,838 UART: [cold-reset] ++
1,172,216 UART: [fht] FHT @ 0x50003400
1,174,807 UART: [idev] ++
1,174,975 UART: [idev] CDI.KEYID = 6
1,175,335 UART: [idev] SUBJECT.KEYID = 7
1,175,759 UART: [idev] UDS.KEYID = 0
1,176,104 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,655 UART: [idev] Erasing UDS.KEYID = 0
1,200,616 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,148 UART: [ldev] ++
1,210,316 UART: [ldev] CDI.KEYID = 6
1,210,679 UART: [ldev] SUBJECT.KEYID = 5
1,211,105 UART: [ldev] AUTHORITY.KEYID = 7
1,211,568 UART: [ldev] FE.KEYID = 1
1,216,702 UART: [ldev] Erasing FE.KEYID = 1
1,243,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,546 UART: [ldev] --
1,282,853 UART: [fwproc] Wait for Commands...
1,283,571 UART: [fwproc] Recv command 0x46574c44
1,284,299 UART: [fwproc] Recv'd Img size: 114360 bytes
2,606,996 UART: ROM Fatal Error: 0x000B002C
2,608,155 >>> mbox cmd response: failed
2,608,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,161 >>> mbox cmd response: failed
2,608,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,215 UART: [state] LifecycleState = Unprovisioned
86,870 UART: [state] DebugLocked = No
87,430 UART: [state] WD Timer not started. Device not locked for debugging
88,663 UART: [kat] SHA2-256
894,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,438 UART: [kat] ++
898,590 UART: [kat] sha1
902,912 UART: [kat] SHA2-256
904,852 UART: [kat] SHA2-384
907,645 UART: [kat] SHA2-512-ACC
909,546 UART: [kat] ECC-384
919,397 UART: [kat] HMAC-384Kdf
924,069 UART: [kat] LMS
1,172,397 UART: [kat] --
1,173,278 UART: [cold-reset] ++
1,173,770 UART: [fht] FHT @ 0x50003400
1,176,513 UART: [idev] ++
1,176,681 UART: [idev] CDI.KEYID = 6
1,177,041 UART: [idev] SUBJECT.KEYID = 7
1,177,465 UART: [idev] UDS.KEYID = 0
1,177,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,355 UART: [idev] Erasing UDS.KEYID = 0
1,201,910 UART: [idev] Sha1 KeyId Algorithm
1,210,232 UART: [idev] --
1,211,380 UART: [ldev] ++
1,211,548 UART: [ldev] CDI.KEYID = 6
1,211,911 UART: [ldev] SUBJECT.KEYID = 5
1,212,337 UART: [ldev] AUTHORITY.KEYID = 7
1,212,800 UART: [ldev] FE.KEYID = 1
1,218,102 UART: [ldev] Erasing FE.KEYID = 1
1,244,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,742 UART: [ldev] --
1,284,071 UART: [fwproc] Wait for Commands...
1,284,817 UART: [fwproc] Recv command 0x46574c44
1,285,545 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,336 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,804 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,463,034 >>> mbox cmd response: failed
2,463,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,040 >>> mbox cmd response: failed
2,463,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,591 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Manufacturing
85,751 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,335 UART: [idev] ++
1,173,503 UART: [idev] CDI.KEYID = 6
1,173,864 UART: [idev] SUBJECT.KEYID = 7
1,174,289 UART: [idev] UDS.KEYID = 0
1,174,635 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,473 UART: [idev] Erasing UDS.KEYID = 0
1,199,689 UART: [idev] Sha1 KeyId Algorithm
1,208,803 UART: [idev] --
1,209,830 UART: [ldev] ++
1,209,998 UART: [ldev] CDI.KEYID = 6
1,210,362 UART: [ldev] SUBJECT.KEYID = 5
1,210,789 UART: [ldev] AUTHORITY.KEYID = 7
1,211,252 UART: [ldev] FE.KEYID = 1
1,216,568 UART: [ldev] Erasing FE.KEYID = 1
1,243,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,324 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,511 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,742 UART: ROM Fatal Error: 0x000B002C
2,608,901 >>> mbox cmd response: failed
2,608,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,907 >>> mbox cmd response: failed
2,608,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,736 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,171,145 UART: [fht] FHT @ 0x50003400
1,173,717 UART: [idev] ++
1,173,885 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,671 UART: [idev] UDS.KEYID = 0
1,175,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,815 UART: [idev] Erasing UDS.KEYID = 0
1,200,037 UART: [idev] Sha1 KeyId Algorithm
1,208,957 UART: [idev] --
1,210,194 UART: [ldev] ++
1,210,362 UART: [ldev] CDI.KEYID = 6
1,210,726 UART: [ldev] SUBJECT.KEYID = 5
1,211,153 UART: [ldev] AUTHORITY.KEYID = 7
1,211,616 UART: [ldev] FE.KEYID = 1
1,216,694 UART: [ldev] Erasing FE.KEYID = 1
1,243,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,050 UART: [ldev] --
1,282,416 UART: [fwproc] Wait for Commands...
1,283,147 UART: [fwproc] Recv command 0x46574c44
1,283,880 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,557 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,644 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,459,852 >>> mbox cmd response: failed
2,459,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,858 >>> mbox cmd response: failed
2,459,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,326 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,751 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Manufacturing
86,218 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,200 UART: [kat] SHA2-256
902,140 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,237 UART: [kat] LMS
1,169,549 UART: [kat] --
1,170,618 UART: [cold-reset] ++
1,171,114 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,209,082 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,819 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,993 UART: [ldev] Erasing FE.KEYID = 1
1,244,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,371 UART: [ldev] --
1,283,879 UART: [fwproc] Wait for Commands...
1,284,490 UART: [fwproc] Recv command 0x46574c44
1,285,223 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,703 UART: ROM Fatal Error: 0x000B002C
2,608,862 >>> mbox cmd response: failed
2,608,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,868 >>> mbox cmd response: failed
2,608,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,608,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,174,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,604 UART: [idev] Erasing UDS.KEYID = 0
1,198,268 UART: [idev] Sha1 KeyId Algorithm
1,207,310 UART: [idev] --
1,208,381 UART: [ldev] ++
1,208,549 UART: [ldev] CDI.KEYID = 6
1,208,913 UART: [ldev] SUBJECT.KEYID = 5
1,209,340 UART: [ldev] AUTHORITY.KEYID = 7
1,209,803 UART: [ldev] FE.KEYID = 1
1,215,011 UART: [ldev] Erasing FE.KEYID = 1
1,241,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,567 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,680 UART: [fwproc] Recv command 0x46574c44
1,282,413 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,654 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,071 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,459,397 >>> mbox cmd response: failed
2,459,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,403 >>> mbox cmd response: failed
2,459,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,210 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,065 UART:
193,109 UART: Running Caliptra ROM ...
194,337 UART:
194,496 UART: [state] CFI Enabled
263,319 UART: [state] LifecycleState = Manufacturing
265,248 UART: [state] DebugLocked = No
266,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,194 UART: [kat] SHA2-256
440,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,445 UART: [kat] ++
451,898 UART: [kat] sha1
462,886 UART: [kat] SHA2-256
465,570 UART: [kat] SHA2-384
470,898 UART: [kat] SHA2-512-ACC
473,289 UART: [kat] ECC-384
2,769,371 UART: [kat] HMAC-384Kdf
2,800,521 UART: [kat] LMS
3,990,815 UART: [kat] --
3,996,189 UART: [cold-reset] ++
3,997,158 UART: [fht] Storing FHT @ 0x50003400
4,009,941 UART: [idev] ++
4,010,523 UART: [idev] CDI.KEYID = 6
4,011,498 UART: [idev] SUBJECT.KEYID = 7
4,012,715 UART: [idev] UDS.KEYID = 0
4,015,818 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,513 UART: [idev] Erasing UDS.KEYID = 0
7,345,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,535 UART: [idev] --
7,371,644 UART: [ldev] ++
7,372,215 UART: [ldev] CDI.KEYID = 6
7,373,238 UART: [ldev] SUBJECT.KEYID = 5
7,374,398 UART: [ldev] AUTHORITY.KEYID = 7
7,375,631 UART: [ldev] FE.KEYID = 1
7,421,939 UART: [ldev] Erasing FE.KEYID = 1
10,756,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,054,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,069,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,084,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,098,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,117,236 UART: [ldev] --
13,122,231 UART: [fwproc] Waiting for Commands...
13,125,195 UART: [fwproc] Received command 0x46574c44
13,127,382 UART: [fwproc] Received Image of size 114036 bytes
17,213,234 UART: ROM Fatal Error: 0x000B002E
17,216,692 >>> mbox cmd response: failed
17,217,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,217,400 >>> mbox cmd response: failed
17,217,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,218,005 >>> mbox cmd response: failed
Initializing fuses
2,056,695 writing to cptra_bootfsm_go
2,246,012 UART:
2,246,368 UART: Running Caliptra ROM ...
2,247,458 UART:
2,247,617 UART: [state] CFI Enabled
2,313,324 UART: [state] LifecycleState = Manufacturing
2,315,264 UART: [state] DebugLocked = No
2,316,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,405 UART: [kat] SHA2-256
2,491,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,602 UART: [kat] ++
2,502,092 UART: [kat] sha1
2,513,366 UART: [kat] SHA2-256
2,516,021 UART: [kat] SHA2-384
2,522,506 UART: [kat] SHA2-512-ACC
2,524,869 UART: [kat] ECC-384
4,817,368 UART: [kat] HMAC-384Kdf
4,850,123 UART: [kat] LMS
6,040,403 UART: [kat] --
6,044,476 UART: [cold-reset] ++
6,045,715 UART: [fht] Storing FHT @ 0x50003400
6,057,901 UART: [idev] ++
6,058,469 UART: [idev] CDI.KEYID = 6
6,059,409 UART: [idev] SUBJECT.KEYID = 7
6,060,685 UART: [idev] UDS.KEYID = 0
6,063,264 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,206,830 UART: [idev] Erasing UDS.KEYID = 0
9,396,674 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,550 UART: [idev] --
9,422,621 UART: [ldev] ++
9,423,196 UART: [ldev] CDI.KEYID = 6
9,424,132 UART: [ldev] SUBJECT.KEYID = 5
9,425,399 UART: [ldev] AUTHORITY.KEYID = 7
9,426,555 UART: [ldev] FE.KEYID = 1
9,472,074 UART: [ldev] Erasing FE.KEYID = 1
12,801,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,159,963 UART: [ldev] --
15,165,069 UART: [fwproc] Waiting for Commands...
15,167,500 UART: [fwproc] Received command 0x46574c44
15,169,689 UART: [fwproc] Received Image of size 114036 bytes
19,258,733 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,332,404 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,401,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,717,609 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,786,718 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,159,466 >>> mbox cmd response: failed
17,160,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,160,590 >>> mbox cmd response: failed
17,160,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,161,209 >>> mbox cmd response: failed
Initializing fuses
2,049,743 writing to cptra_bootfsm_go
5,826,252 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,949,948 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,309 UART:
192,698 UART: Running Caliptra ROM ...
193,802 UART:
603,586 UART: [state] CFI Enabled
616,214 UART: [state] LifecycleState = Manufacturing
618,155 UART: [state] DebugLocked = No
619,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,086 UART: [kat] SHA2-256
794,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,380 UART: [kat] ++
805,915 UART: [kat] sha1
816,425 UART: [kat] SHA2-256
819,147 UART: [kat] SHA2-384
824,977 UART: [kat] SHA2-512-ACC
827,322 UART: [kat] ECC-384
3,110,107 UART: [kat] HMAC-384Kdf
3,122,335 UART: [kat] LMS
4,312,437 UART: [kat] --
4,316,835 UART: [cold-reset] ++
4,319,311 UART: [fht] Storing FHT @ 0x50003400
4,331,383 UART: [idev] ++
4,331,947 UART: [idev] CDI.KEYID = 6
4,332,877 UART: [idev] SUBJECT.KEYID = 7
4,334,147 UART: [idev] UDS.KEYID = 0
4,337,077 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,393 UART: [idev] Erasing UDS.KEYID = 0
7,629,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,605 UART: [idev] --
7,656,504 UART: [ldev] ++
7,657,140 UART: [ldev] CDI.KEYID = 6
7,658,052 UART: [ldev] SUBJECT.KEYID = 5
7,659,272 UART: [ldev] AUTHORITY.KEYID = 7
7,660,564 UART: [ldev] FE.KEYID = 1
7,671,697 UART: [ldev] Erasing FE.KEYID = 1
10,959,042 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,544 UART: [ldev] --
13,319,224 UART: [fwproc] Waiting for Commands...
13,322,515 UART: [fwproc] Received command 0x46574c44
13,324,703 UART: [fwproc] Received Image of size 114036 bytes
17,405,790 UART: ROM Fatal Error: 0x000B002E
17,409,192 >>> mbox cmd response: failed
17,409,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,409,946 >>> mbox cmd response: failed
17,410,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,410,500 >>> mbox cmd response: failed
Initializing fuses
2,052,552 writing to cptra_bootfsm_go
2,241,858 UART:
2,242,220 UART: Running Caliptra ROM ...
2,243,358 UART:
3,052,344 UART: [state] CFI Enabled
3,064,058 UART: [state] LifecycleState = Manufacturing
3,065,971 UART: [state] DebugLocked = No
3,068,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,073,675 UART: [kat] SHA2-256
3,243,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,253,971 UART: [kat] ++
3,254,631 UART: [kat] sha1
3,264,445 UART: [kat] SHA2-256
3,267,137 UART: [kat] SHA2-384
3,273,346 UART: [kat] SHA2-512-ACC
3,275,700 UART: [kat] ECC-384
5,558,736 UART: [kat] HMAC-384Kdf
5,570,181 UART: [kat] LMS
6,760,279 UART: [kat] --
6,765,722 UART: [cold-reset] ++
6,767,845 UART: [fht] Storing FHT @ 0x50003400
6,779,063 UART: [idev] ++
6,779,687 UART: [idev] CDI.KEYID = 6
6,780,599 UART: [idev] SUBJECT.KEYID = 7
6,781,869 UART: [idev] UDS.KEYID = 0
6,784,498 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,927,850 UART: [idev] Erasing UDS.KEYID = 0
10,071,485 UART: [idev] Using Sha1 for KeyId Algorithm
10,092,610 UART: [idev] --
10,096,450 UART: [ldev] ++
10,097,081 UART: [ldev] CDI.KEYID = 6
10,097,968 UART: [ldev] SUBJECT.KEYID = 5
10,099,160 UART: [ldev] AUTHORITY.KEYID = 7
10,100,541 UART: [ldev] FE.KEYID = 1
10,109,867 UART: [ldev] Erasing FE.KEYID = 1
13,398,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,692,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,707,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,722,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,736,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,755,363 UART: [ldev] --
15,760,091 UART: [fwproc] Waiting for Commands...
15,762,110 UART: [fwproc] Received command 0x46574c44
15,764,345 UART: [fwproc] Received Image of size 114036 bytes
19,847,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,921,636 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,990,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,306,926 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,127,612 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,365,475 >>> mbox cmd response: failed
17,366,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,366,456 >>> mbox cmd response: failed
17,366,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,015 >>> mbox cmd response: failed
Initializing fuses
2,056,353 writing to cptra_bootfsm_go
6,634,066 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,612,252 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,073 UART:
192,453 UART: Running Caliptra ROM ...
193,640 UART:
193,796 UART: [state] CFI Enabled
262,510 UART: [state] LifecycleState = Manufacturing
264,384 UART: [state] DebugLocked = No
266,470 UART: [state] WD Timer not started. Device not locked for debugging
269,758 UART: [kat] SHA2-256
448,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,465 UART: [kat] ++
460,999 UART: [kat] sha1
472,318 UART: [kat] SHA2-256
475,332 UART: [kat] SHA2-384
481,255 UART: [kat] SHA2-512-ACC
484,242 UART: [kat] ECC-384
2,945,637 UART: [kat] HMAC-384Kdf
2,969,492 UART: [kat] LMS
3,498,957 UART: [kat] --
3,503,160 UART: [cold-reset] ++
3,504,496 UART: [fht] FHT @ 0x50003400
3,514,660 UART: [idev] ++
3,515,233 UART: [idev] CDI.KEYID = 6
3,516,146 UART: [idev] SUBJECT.KEYID = 7
3,517,303 UART: [idev] UDS.KEYID = 0
3,520,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,149 UART: [idev] Erasing UDS.KEYID = 0
6,025,165 UART: [idev] Sha1 KeyId Algorithm
6,049,448 UART: [idev] --
6,054,647 UART: [ldev] ++
6,055,220 UART: [ldev] CDI.KEYID = 6
6,056,137 UART: [ldev] SUBJECT.KEYID = 5
6,057,241 UART: [ldev] AUTHORITY.KEYID = 7
6,058,531 UART: [ldev] FE.KEYID = 1
6,097,762 UART: [ldev] Erasing FE.KEYID = 1
8,598,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,068 UART: [ldev] --
10,386,955 UART: [fwproc] Wait for Commands...
10,389,496 UART: [fwproc] Recv command 0x46574c44
10,391,597 UART: [fwproc] Recv'd Img size: 114360 bytes
13,829,868 UART: ROM Fatal Error: 0x000B002E
13,832,939 >>> mbox cmd response: failed
13,833,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,833,722 >>> mbox cmd response: failed
13,833,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,834,286 >>> mbox cmd response: failed
Initializing fuses
2,052,592 writing to cptra_bootfsm_go
2,241,965 UART:
2,242,348 UART: Running Caliptra ROM ...
2,243,417 UART:
2,243,579 UART: [state] CFI Enabled
2,319,163 UART: [state] LifecycleState = Manufacturing
2,321,045 UART: [state] DebugLocked = No
2,323,903 UART: [state] WD Timer not started. Device not locked for debugging
2,328,139 UART: [kat] SHA2-256
2,507,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,815 UART: [kat] ++
2,519,371 UART: [kat] sha1
2,529,949 UART: [kat] SHA2-256
2,532,973 UART: [kat] SHA2-384
2,538,692 UART: [kat] SHA2-512-ACC
2,541,638 UART: [kat] ECC-384
5,002,962 UART: [kat] HMAC-384Kdf
5,028,873 UART: [kat] LMS
5,558,347 UART: [kat] --
5,562,462 UART: [cold-reset] ++
5,563,640 UART: [fht] FHT @ 0x50003400
5,575,027 UART: [idev] ++
5,575,603 UART: [idev] CDI.KEYID = 6
5,576,484 UART: [idev] SUBJECT.KEYID = 7
5,577,661 UART: [idev] UDS.KEYID = 0
5,580,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,724,281 UART: [idev] Erasing UDS.KEYID = 0
8,084,330 UART: [idev] Sha1 KeyId Algorithm
8,106,962 UART: [idev] --
8,110,659 UART: [ldev] ++
8,111,238 UART: [ldev] CDI.KEYID = 6
8,112,123 UART: [ldev] SUBJECT.KEYID = 5
8,113,340 UART: [ldev] AUTHORITY.KEYID = 7
8,114,573 UART: [ldev] FE.KEYID = 1
8,157,087 UART: [ldev] Erasing FE.KEYID = 1
10,661,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,141 UART: [ldev] --
12,469,184 UART: [fwproc] Wait for Commands...
12,471,231 UART: [fwproc] Recv command 0x46574c44
12,473,279 UART: [fwproc] Recv'd Img size: 114360 bytes
15,906,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,046,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,365,432 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,469 UART:
192,819 UART: Running Caliptra ROM ...
194,003 UART:
194,158 UART: [state] CFI Enabled
262,791 UART: [state] LifecycleState = Manufacturing
265,212 UART: [state] DebugLocked = No
267,239 UART: [state] WD Timer not started. Device not locked for debugging
272,635 UART: [kat] SHA2-256
462,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,247 UART: [kat] ++
473,729 UART: [kat] sha1
484,992 UART: [kat] SHA2-256
488,008 UART: [kat] SHA2-384
492,751 UART: [kat] SHA2-512-ACC
495,361 UART: [kat] ECC-384
2,944,454 UART: [kat] HMAC-384Kdf
2,967,866 UART: [kat] LMS
3,499,630 UART: [kat] --
3,503,694 UART: [cold-reset] ++
3,504,820 UART: [fht] FHT @ 0x50003400
3,516,501 UART: [idev] ++
3,517,263 UART: [idev] CDI.KEYID = 6
3,518,177 UART: [idev] SUBJECT.KEYID = 7
3,519,390 UART: [idev] UDS.KEYID = 0
3,522,475 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,291 UART: [idev] Erasing UDS.KEYID = 0
6,026,415 UART: [idev] Sha1 KeyId Algorithm
6,049,226 UART: [idev] --
6,054,046 UART: [ldev] ++
6,054,730 UART: [ldev] CDI.KEYID = 6
6,055,658 UART: [ldev] SUBJECT.KEYID = 5
6,056,924 UART: [ldev] AUTHORITY.KEYID = 7
6,058,120 UART: [ldev] FE.KEYID = 1
6,100,072 UART: [ldev] Erasing FE.KEYID = 1
8,606,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,523 UART: [ldev] --
10,410,087 UART: [fwproc] Wait for Commands...
10,412,791 UART: [fwproc] Recv command 0x46574c44
10,415,051 UART: [fwproc] Recv'd Img size: 114360 bytes
13,899,078 UART: ROM Fatal Error: 0x000B002E
13,902,713 >>> mbox cmd response: failed
13,903,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,903,531 >>> mbox cmd response: failed
13,903,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,904,088 >>> mbox cmd response: failed
Initializing fuses
2,052,981 writing to cptra_bootfsm_go
2,242,304 UART:
2,242,651 UART: Running Caliptra ROM ...
2,243,784 UART:
2,243,954 UART: [state] CFI Enabled
2,315,038 UART: [state] LifecycleState = Manufacturing
2,317,413 UART: [state] DebugLocked = No
2,319,453 UART: [state] WD Timer not started. Device not locked for debugging
2,324,567 UART: [kat] SHA2-256
2,514,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,196 UART: [kat] ++
2,525,703 UART: [kat] sha1
2,536,593 UART: [kat] SHA2-256
2,539,615 UART: [kat] SHA2-384
2,545,551 UART: [kat] SHA2-512-ACC
2,548,124 UART: [kat] ECC-384
5,000,348 UART: [kat] HMAC-384Kdf
5,022,306 UART: [kat] LMS
5,554,088 UART: [kat] --
5,558,997 UART: [cold-reset] ++
5,560,553 UART: [fht] FHT @ 0x50003400
5,572,072 UART: [idev] ++
5,572,754 UART: [idev] CDI.KEYID = 6
5,573,715 UART: [idev] SUBJECT.KEYID = 7
5,574,925 UART: [idev] UDS.KEYID = 0
5,577,551 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,721,538 UART: [idev] Erasing UDS.KEYID = 0
8,080,677 UART: [idev] Sha1 KeyId Algorithm
8,103,424 UART: [idev] --
8,108,825 UART: [ldev] ++
8,109,503 UART: [ldev] CDI.KEYID = 6
8,110,468 UART: [ldev] SUBJECT.KEYID = 5
8,111,648 UART: [ldev] AUTHORITY.KEYID = 7
8,112,826 UART: [ldev] FE.KEYID = 1
8,150,321 UART: [ldev] Erasing FE.KEYID = 1
10,660,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,802 UART: [ldev] --
12,467,065 UART: [fwproc] Wait for Commands...
12,469,870 UART: [fwproc] Recv command 0x46574c44
12,472,377 UART: [fwproc] Recv'd Img size: 114360 bytes
15,961,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,036,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,152,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,695,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,441,424 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,319,312 >>> mbox cmd response: failed
14,319,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,320,212 >>> mbox cmd response: failed
14,320,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,320,780 >>> mbox cmd response: failed
Initializing fuses
2,059,869 writing to cptra_bootfsm_go
5,499,578 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,832,288 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,532 UART:
192,888 UART: Running Caliptra ROM ...
194,083 UART:
603,641 UART: [state] CFI Enabled
616,832 UART: [state] LifecycleState = Manufacturing
619,248 UART: [state] DebugLocked = No
621,603 UART: [state] WD Timer not started. Device not locked for debugging
625,522 UART: [kat] SHA2-256
815,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,120 UART: [kat] ++
826,629 UART: [kat] sha1
839,309 UART: [kat] SHA2-256
842,321 UART: [kat] SHA2-384
847,923 UART: [kat] SHA2-512-ACC
850,479 UART: [kat] ECC-384
3,294,618 UART: [kat] HMAC-384Kdf
3,307,123 UART: [kat] LMS
3,838,920 UART: [kat] --
3,843,614 UART: [cold-reset] ++
3,844,947 UART: [fht] FHT @ 0x50003400
3,856,469 UART: [idev] ++
3,857,152 UART: [idev] CDI.KEYID = 6
3,858,088 UART: [idev] SUBJECT.KEYID = 7
3,859,298 UART: [idev] UDS.KEYID = 0
3,862,043 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,842 UART: [idev] Erasing UDS.KEYID = 0
6,333,039 UART: [idev] Sha1 KeyId Algorithm
6,355,812 UART: [idev] --
6,360,731 UART: [ldev] ++
6,361,413 UART: [ldev] CDI.KEYID = 6
6,362,297 UART: [ldev] SUBJECT.KEYID = 5
6,363,511 UART: [ldev] AUTHORITY.KEYID = 7
6,364,750 UART: [ldev] FE.KEYID = 1
6,375,366 UART: [ldev] Erasing FE.KEYID = 1
8,849,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,294 UART: [ldev] --
10,641,866 UART: [fwproc] Wait for Commands...
10,644,403 UART: [fwproc] Recv command 0x46574c44
10,646,663 UART: [fwproc] Recv'd Img size: 114360 bytes
14,126,177 UART: ROM Fatal Error: 0x000B002E
14,129,837 >>> mbox cmd response: failed
14,130,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,130,569 >>> mbox cmd response: failed
14,130,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,131,126 >>> mbox cmd response: failed
Initializing fuses
2,053,755 writing to cptra_bootfsm_go
2,243,068 UART:
2,243,422 UART: Running Caliptra ROM ...
2,244,561 UART:
6,322,184 UART: [state] CFI Enabled
6,335,324 UART: [state] LifecycleState = Manufacturing
6,337,747 UART: [state] DebugLocked = No
6,339,757 UART: [state] WD Timer not started. Device not locked for debugging
6,343,713 UART: [kat] SHA2-256
6,533,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,544,353 UART: [kat] ++
6,544,866 UART: [kat] sha1
6,557,105 UART: [kat] SHA2-256
6,560,119 UART: [kat] SHA2-384
6,566,812 UART: [kat] SHA2-512-ACC
6,569,381 UART: [kat] ECC-384
9,012,153 UART: [kat] HMAC-384Kdf
9,023,848 UART: [kat] LMS
9,555,672 UART: [kat] --
9,561,396 UART: [cold-reset] ++
9,563,002 UART: [fht] FHT @ 0x50003400
9,574,964 UART: [idev] ++
9,575,659 UART: [idev] CDI.KEYID = 6
9,576,628 UART: [idev] SUBJECT.KEYID = 7
9,577,792 UART: [idev] UDS.KEYID = 0
9,580,500 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
9,724,267 UART: [idev] Erasing UDS.KEYID = 0
12,060,282 UART: [idev] Sha1 KeyId Algorithm
12,082,339 UART: [idev] --
12,086,391 UART: [ldev] ++
12,087,073 UART: [ldev] CDI.KEYID = 6
12,087,987 UART: [ldev] SUBJECT.KEYID = 5
12,089,147 UART: [ldev] AUTHORITY.KEYID = 7
12,090,378 UART: [ldev] FE.KEYID = 1
12,101,999 UART: [ldev] Erasing FE.KEYID = 1
14,578,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,297,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,312,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,327,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,343,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,363,792 UART: [ldev] --
16,368,412 UART: [fwproc] Wait for Commands...
16,370,886 UART: [fwproc] Recv command 0x46574c44
16,373,147 UART: [fwproc] Recv'd Img size: 114360 bytes
19,853,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,932,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,048,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
20,591,751 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,756,598 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,550,350 >>> mbox cmd response: failed
14,550,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,551,329 >>> mbox cmd response: failed
14,551,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,551,886 >>> mbox cmd response: failed
Initializing fuses
2,049,291 writing to cptra_bootfsm_go
9,060,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,306,877 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Manufacturing
85,711 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,422 UART: [kat] LMS
1,475,618 UART: [kat] --
1,476,565 UART: [cold-reset] ++
1,476,961 UART: [fht] Storing FHT @ 0x50003400
1,479,840 UART: [idev] ++
1,480,008 UART: [idev] CDI.KEYID = 6
1,480,368 UART: [idev] SUBJECT.KEYID = 7
1,480,792 UART: [idev] UDS.KEYID = 0
1,481,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,506 UART: [idev] Erasing UDS.KEYID = 0
1,505,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,864 UART: [idev] --
1,514,911 UART: [ldev] ++
1,515,079 UART: [ldev] CDI.KEYID = 6
1,515,442 UART: [ldev] SUBJECT.KEYID = 5
1,515,868 UART: [ldev] AUTHORITY.KEYID = 7
1,516,331 UART: [ldev] FE.KEYID = 1
1,521,537 UART: [ldev] Erasing FE.KEYID = 1
1,546,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,374 UART: [ldev] --
1,585,801 UART: [fwproc] Waiting for Commands...
1,586,548 UART: [fwproc] Received command 0x46574c44
1,587,339 UART: [fwproc] Received Image of size 114360 bytes
2,910,396 UART: ROM Fatal Error: 0x000B002E
2,911,555 >>> mbox cmd response: failed
2,911,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,561 >>> mbox cmd response: failed
2,911,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
906,906 UART: [kat] LMS
1,475,102 UART: [kat] --
1,476,257 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,230 UART: [idev] Erasing UDS.KEYID = 0
1,504,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,282 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,521,187 UART: [ldev] Erasing FE.KEYID = 1
1,546,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,090 UART: [ldev] --
1,585,457 UART: [fwproc] Waiting for Commands...
1,586,248 UART: [fwproc] Received command 0x46574c44
1,587,039 UART: [fwproc] Received Image of size 114360 bytes
2,884,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,833 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,094 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,897 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,764,066 >>> mbox cmd response: failed
2,764,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,072 >>> mbox cmd response: failed
2,764,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,384 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Manufacturing
86,232 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,510 UART: [kat] SHA2-256
882,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,556 UART: [kat] ++
886,708 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,067 UART: [kat] HMAC-384Kdf
907,727 UART: [kat] LMS
1,475,923 UART: [kat] --
1,476,754 UART: [cold-reset] ++
1,477,320 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,799 UART: [idev] Erasing UDS.KEYID = 0
1,505,075 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,737 UART: [idev] --
1,514,842 UART: [ldev] ++
1,515,010 UART: [ldev] CDI.KEYID = 6
1,515,373 UART: [ldev] SUBJECT.KEYID = 5
1,515,799 UART: [ldev] AUTHORITY.KEYID = 7
1,516,262 UART: [ldev] FE.KEYID = 1
1,521,674 UART: [ldev] Erasing FE.KEYID = 1
1,547,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,375 UART: [ldev] --
1,586,836 UART: [fwproc] Waiting for Commands...
1,587,519 UART: [fwproc] Received command 0x46574c44
1,588,310 UART: [fwproc] Received Image of size 114360 bytes
2,910,425 UART: ROM Fatal Error: 0x000B002E
2,911,584 >>> mbox cmd response: failed
2,911,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,590 >>> mbox cmd response: failed
2,911,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,911,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,922 UART: [kat] SHA2-256
892,860 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,571 UART: [kat] LMS
1,475,767 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,605 UART: [idev] ++
1,479,773 UART: [idev] CDI.KEYID = 6
1,480,133 UART: [idev] SUBJECT.KEYID = 7
1,480,557 UART: [idev] UDS.KEYID = 0
1,480,902 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,339 UART: [idev] Erasing UDS.KEYID = 0
1,505,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,521,442 UART: [ldev] Erasing FE.KEYID = 1
1,546,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,733 UART: [ldev] --
1,586,198 UART: [fwproc] Waiting for Commands...
1,587,059 UART: [fwproc] Received command 0x46574c44
1,587,850 UART: [fwproc] Received Image of size 114360 bytes
2,884,750 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,586 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,717 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,764,019 >>> mbox cmd response: failed
2,764,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,025 >>> mbox cmd response: failed
2,764,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,489 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Manufacturing
85,845 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,694 UART: [kat] SHA2-512-ACC
908,595 UART: [kat] ECC-384
918,296 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,172,165 UART: [cold-reset] ++
1,172,649 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,330 UART: [idev] Erasing UDS.KEYID = 0
1,201,329 UART: [idev] Sha1 KeyId Algorithm
1,209,905 UART: [idev] --
1,210,909 UART: [ldev] ++
1,211,077 UART: [ldev] CDI.KEYID = 6
1,211,440 UART: [ldev] SUBJECT.KEYID = 5
1,211,866 UART: [ldev] AUTHORITY.KEYID = 7
1,212,329 UART: [ldev] FE.KEYID = 1
1,217,751 UART: [ldev] Erasing FE.KEYID = 1
1,244,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,371 UART: [ldev] --
1,283,844 UART: [fwproc] Wait for Commands...
1,284,654 UART: [fwproc] Recv command 0x46574c44
1,285,382 UART: [fwproc] Recv'd Img size: 114360 bytes
2,608,553 UART: ROM Fatal Error: 0x000B002E
2,609,712 >>> mbox cmd response: failed
2,609,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,718 >>> mbox cmd response: failed
2,609,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
893,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,273 UART: [kat] ++
897,425 UART: [kat] sha1
901,767 UART: [kat] SHA2-256
903,707 UART: [kat] SHA2-384
906,464 UART: [kat] SHA2-512-ACC
908,365 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,913 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,844 UART: [idev] Erasing UDS.KEYID = 0
1,200,073 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,511 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,461,063 >>> mbox cmd response: failed
2,461,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,069 >>> mbox cmd response: failed
2,461,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,953 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,394 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Manufacturing
86,160 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,264 UART: [kat] SHA2-256
904,204 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,289 UART: [kat] LMS
1,171,617 UART: [kat] --
1,172,574 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,177,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,431 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,210,314 UART: [idev] --
1,211,530 UART: [ldev] ++
1,211,698 UART: [ldev] CDI.KEYID = 6
1,212,061 UART: [ldev] SUBJECT.KEYID = 5
1,212,487 UART: [ldev] AUTHORITY.KEYID = 7
1,212,950 UART: [ldev] FE.KEYID = 1
1,218,430 UART: [ldev] Erasing FE.KEYID = 1
1,245,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,560 UART: [ldev] --
1,284,855 UART: [fwproc] Wait for Commands...
1,285,617 UART: [fwproc] Recv command 0x46574c44
1,286,345 UART: [fwproc] Recv'd Img size: 114360 bytes
2,608,700 UART: ROM Fatal Error: 0x000B002E
2,609,859 >>> mbox cmd response: failed
2,609,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,865 >>> mbox cmd response: failed
2,609,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,609,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
893,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,786 UART: [kat] ++
897,938 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,113 UART: [kat] LMS
1,171,441 UART: [kat] --
1,172,426 UART: [cold-reset] ++
1,172,936 UART: [fht] FHT @ 0x50003400
1,175,591 UART: [idev] ++
1,175,759 UART: [idev] CDI.KEYID = 6
1,176,119 UART: [idev] SUBJECT.KEYID = 7
1,176,543 UART: [idev] UDS.KEYID = 0
1,176,888 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,705 UART: [idev] Erasing UDS.KEYID = 0
1,201,956 UART: [idev] Sha1 KeyId Algorithm
1,210,296 UART: [idev] --
1,211,440 UART: [ldev] ++
1,211,608 UART: [ldev] CDI.KEYID = 6
1,211,971 UART: [ldev] SUBJECT.KEYID = 5
1,212,397 UART: [ldev] AUTHORITY.KEYID = 7
1,212,860 UART: [ldev] FE.KEYID = 1
1,217,932 UART: [ldev] Erasing FE.KEYID = 1
1,243,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,362 UART: [ldev] --
1,282,717 UART: [fwproc] Wait for Commands...
1,283,457 UART: [fwproc] Recv command 0x46574c44
1,284,185 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,100 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,463,396 >>> mbox cmd response: failed
2,463,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,402 >>> mbox cmd response: failed
2,463,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,463,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,179 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Manufacturing
85,821 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,022 UART: [kat] LMS
1,168,334 UART: [kat] --
1,169,345 UART: [cold-reset] ++
1,169,807 UART: [fht] FHT @ 0x50003400
1,172,365 UART: [idev] ++
1,172,533 UART: [idev] CDI.KEYID = 6
1,172,894 UART: [idev] SUBJECT.KEYID = 7
1,173,319 UART: [idev] UDS.KEYID = 0
1,173,665 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,531 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,214,814 UART: [ldev] Erasing FE.KEYID = 1
1,240,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,886 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,281,071 UART: [fwproc] Recv command 0x46574c44
1,281,804 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,160 UART: ROM Fatal Error: 0x000B002E
2,604,319 >>> mbox cmd response: failed
2,604,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,325 >>> mbox cmd response: failed
2,604,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,322 UART: [kat] LMS
1,169,634 UART: [kat] --
1,170,615 UART: [cold-reset] ++
1,171,091 UART: [fht] FHT @ 0x50003400
1,173,879 UART: [idev] ++
1,174,047 UART: [idev] CDI.KEYID = 6
1,174,408 UART: [idev] SUBJECT.KEYID = 7
1,174,833 UART: [idev] UDS.KEYID = 0
1,175,179 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,035 UART: [idev] Erasing UDS.KEYID = 0
1,199,923 UART: [idev] Sha1 KeyId Algorithm
1,208,795 UART: [idev] --
1,209,946 UART: [ldev] ++
1,210,114 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,905 UART: [ldev] AUTHORITY.KEYID = 7
1,211,368 UART: [ldev] FE.KEYID = 1
1,216,646 UART: [ldev] Erasing FE.KEYID = 1
1,243,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,996 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,283,021 UART: [fwproc] Recv command 0x46574c44
1,283,754 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,937 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,457,096 >>> mbox cmd response: failed
2,457,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,102 >>> mbox cmd response: failed
2,457,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,880 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,903 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,871 UART: [state] LifecycleState = Manufacturing
85,526 UART: [state] DebugLocked = No
86,022 UART: [state] WD Timer not started. Device not locked for debugging
87,203 UART: [kat] SHA2-256
890,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,882 UART: [kat] ++
895,034 UART: [kat] sha1
899,374 UART: [kat] SHA2-256
901,314 UART: [kat] SHA2-384
904,217 UART: [kat] SHA2-512-ACC
906,118 UART: [kat] ECC-384
915,533 UART: [kat] HMAC-384Kdf
920,097 UART: [kat] LMS
1,168,409 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,682 UART: [idev] ++
1,172,850 UART: [idev] CDI.KEYID = 6
1,173,211 UART: [idev] SUBJECT.KEYID = 7
1,173,636 UART: [idev] UDS.KEYID = 0
1,173,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,544 UART: [idev] Erasing UDS.KEYID = 0
1,198,328 UART: [idev] Sha1 KeyId Algorithm
1,207,308 UART: [idev] --
1,208,397 UART: [ldev] ++
1,208,565 UART: [ldev] CDI.KEYID = 6
1,208,929 UART: [ldev] SUBJECT.KEYID = 5
1,209,356 UART: [ldev] AUTHORITY.KEYID = 7
1,209,819 UART: [ldev] FE.KEYID = 1
1,214,967 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,559 UART: [ldev] --
1,280,845 UART: [fwproc] Wait for Commands...
1,281,566 UART: [fwproc] Recv command 0x46574c44
1,282,299 UART: [fwproc] Recv'd Img size: 114360 bytes
2,604,449 UART: ROM Fatal Error: 0x000B002E
2,605,608 >>> mbox cmd response: failed
2,605,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,605,614 >>> mbox cmd response: failed
2,605,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,605,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,423 UART: [kat] SHA2-512-ACC
906,324 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,173,990 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,614 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,208,781 UART: [ldev] ++
1,208,949 UART: [ldev] CDI.KEYID = 6
1,209,313 UART: [ldev] SUBJECT.KEYID = 5
1,209,740 UART: [ldev] AUTHORITY.KEYID = 7
1,210,203 UART: [ldev] FE.KEYID = 1
1,215,293 UART: [ldev] Erasing FE.KEYID = 1
1,241,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,283 UART: [ldev] --
1,280,731 UART: [fwproc] Wait for Commands...
1,281,360 UART: [fwproc] Recv command 0x46574c44
1,282,093 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,648 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,457,337 >>> mbox cmd response: failed
2,457,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,343 >>> mbox cmd response: failed
2,457,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,457,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,156 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
4,876,620 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,651,582 >>> mbox cmd response: failed
16,652,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,652,561 >>> mbox cmd response: failed
16,652,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,653,125 >>> mbox cmd response: failed
Initializing fuses
2,062,458 writing to cptra_bootfsm_go
6,928,798 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,516,349 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
4,880,913 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,618,540 >>> mbox cmd response: failed
16,619,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,619,634 >>> mbox cmd response: failed
16,619,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,620,267 >>> mbox cmd response: failed
Initializing fuses
2,057,679 writing to cptra_bootfsm_go
6,923,030 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,501,757 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
5,183,567 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,796,923 >>> mbox cmd response: failed
16,797,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,798,077 >>> mbox cmd response: failed
16,798,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,798,642 >>> mbox cmd response: failed
Initializing fuses
2,056,670 writing to cptra_bootfsm_go
8,248,634 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,700,559 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
5,186,235 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,802,484 >>> mbox cmd response: failed
16,803,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,803,606 >>> mbox cmd response: failed
16,803,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,804,170 >>> mbox cmd response: failed
Initializing fuses
2,057,841 writing to cptra_bootfsm_go
8,245,399 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,679,146 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,486,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,450,812 >>> mbox cmd response: failed
12,451,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,822 >>> mbox cmd response: failed
12,452,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,401 >>> mbox cmd response: failed
Initializing fuses
2,053,678 writing to cptra_bootfsm_go
5,534,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,349,170 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,446,465 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,404,149 >>> mbox cmd response: failed
12,404,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,405,148 >>> mbox cmd response: failed
12,405,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,405,717 >>> mbox cmd response: failed
Initializing fuses
2,055,475 writing to cptra_bootfsm_go
5,523,876 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,329,921 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,485,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,429,188 >>> mbox cmd response: failed
12,429,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,430,210 >>> mbox cmd response: failed
12,430,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,430,791 >>> mbox cmd response: failed
Initializing fuses
2,058,258 writing to cptra_bootfsm_go
5,537,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,380,398 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,790,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,628,690 >>> mbox cmd response: failed
12,629,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,675 >>> mbox cmd response: failed
12,629,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,630,242 >>> mbox cmd response: failed
Initializing fuses
2,055,383 writing to cptra_bootfsm_go
11,020,529 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,734,259 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,732 writing to cptra_bootfsm_go
3,782,156 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,643,925 >>> mbox cmd response: failed
12,644,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,644,887 >>> mbox cmd response: failed
12,645,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,645,453 >>> mbox cmd response: failed
Initializing fuses
2,056,046 writing to cptra_bootfsm_go
11,011,416 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
21,727,910 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,202,923 >>> mbox cmd response: failed
1,202,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,929 >>> mbox cmd response: failed
1,202,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,286 UART: [kat] HMAC-384Kdf
906,866 UART: [kat] LMS
1,475,062 UART: [kat] --
1,475,989 UART: [cold-reset] ++
1,476,383 UART: [fht] Storing FHT @ 0x50003400
1,479,170 UART: [idev] ++
1,479,338 UART: [idev] CDI.KEYID = 6
1,479,698 UART: [idev] SUBJECT.KEYID = 7
1,480,122 UART: [idev] UDS.KEYID = 0
1,480,467 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,196 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,608 UART: [idev] --
1,514,809 UART: [ldev] ++
1,514,977 UART: [ldev] CDI.KEYID = 6
1,515,340 UART: [ldev] SUBJECT.KEYID = 5
1,515,766 UART: [ldev] AUTHORITY.KEYID = 7
1,516,229 UART: [ldev] FE.KEYID = 1
1,521,397 UART: [ldev] Erasing FE.KEYID = 1
1,546,688 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,586,005 UART: [fwproc] Waiting for Commands...
1,586,710 UART: [fwproc] Received command 0x46574c44
1,587,501 UART: [fwproc] Received Image of size 114360 bytes
2,884,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,145 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,306 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,157 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,917 >>> mbox cmd response: failed
1,203,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,923 >>> mbox cmd response: failed
1,203,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,445 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,724 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,204,676 >>> mbox cmd response: failed
1,204,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,682 >>> mbox cmd response: failed
1,204,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,197 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,477,146 UART: [cold-reset] ++
1,477,692 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,793 UART: [idev] Erasing UDS.KEYID = 0
1,506,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,619 UART: [idev] --
1,515,608 UART: [ldev] ++
1,515,776 UART: [ldev] CDI.KEYID = 6
1,516,139 UART: [ldev] SUBJECT.KEYID = 5
1,516,565 UART: [ldev] AUTHORITY.KEYID = 7
1,517,028 UART: [ldev] FE.KEYID = 1
1,522,450 UART: [ldev] Erasing FE.KEYID = 1
1,548,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,275 UART: [ldev] --
1,587,672 UART: [fwproc] Waiting for Commands...
1,588,419 UART: [fwproc] Received command 0x46574c44
1,589,210 UART: [fwproc] Received Image of size 114360 bytes
2,887,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,346 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,673 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,100 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,202,390 >>> mbox cmd response: failed
1,202,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,396 >>> mbox cmd response: failed
1,202,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,603 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,663 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,681 >>> mbox cmd response: failed
1,203,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,687 >>> mbox cmd response: failed
1,203,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
906,214 UART: [kat] SHA2-512-ACC
908,115 UART: [kat] ECC-384
917,630 UART: [kat] HMAC-384Kdf
922,102 UART: [kat] LMS
1,170,430 UART: [kat] --
1,171,189 UART: [cold-reset] ++
1,171,685 UART: [fht] FHT @ 0x50003400
1,174,516 UART: [idev] ++
1,174,684 UART: [idev] CDI.KEYID = 6
1,175,044 UART: [idev] SUBJECT.KEYID = 7
1,175,468 UART: [idev] UDS.KEYID = 0
1,175,813 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,294 UART: [idev] Erasing UDS.KEYID = 0
1,200,455 UART: [idev] Sha1 KeyId Algorithm
1,208,955 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,350 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,315 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,508 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,679 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,789 >>> mbox cmd response: failed
1,203,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,795 >>> mbox cmd response: failed
1,203,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,306 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,442 >>> mbox cmd response: failed
1,203,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,448 >>> mbox cmd response: failed
1,203,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
893,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,618 UART: [kat] ++
897,770 UART: [kat] sha1
902,090 UART: [kat] SHA2-256
904,030 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,644 UART: [cold-reset] ++
1,173,172 UART: [fht] FHT @ 0x50003400
1,175,965 UART: [idev] ++
1,176,133 UART: [idev] CDI.KEYID = 6
1,176,493 UART: [idev] SUBJECT.KEYID = 7
1,176,917 UART: [idev] UDS.KEYID = 0
1,177,262 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,005 UART: [idev] Erasing UDS.KEYID = 0
1,201,996 UART: [idev] Sha1 KeyId Algorithm
1,210,626 UART: [idev] --
1,211,548 UART: [ldev] ++
1,211,716 UART: [ldev] CDI.KEYID = 6
1,212,079 UART: [ldev] SUBJECT.KEYID = 5
1,212,505 UART: [ldev] AUTHORITY.KEYID = 7
1,212,968 UART: [ldev] FE.KEYID = 1
1,218,118 UART: [ldev] Erasing FE.KEYID = 1
1,244,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,480 UART: [ldev] --
1,283,745 UART: [fwproc] Wait for Commands...
1,284,523 UART: [fwproc] Recv command 0x46574c44
1,285,251 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,828 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,472 >>> mbox cmd response: failed
1,203,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,478 >>> mbox cmd response: failed
1,203,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,084 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,773 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,783 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,319 >>> mbox cmd response: failed
1,203,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,325 >>> mbox cmd response: failed
1,203,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,634 UART: [kat] HMAC-384Kdf
920,340 UART: [kat] LMS
1,168,652 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,174,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,283 UART: [idev] Erasing UDS.KEYID = 0
1,198,347 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,268 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,509 UART: [fwproc] Recv command 0x46574c44
1,282,242 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,535 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,579 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,149 >>> mbox cmd response: failed
1,203,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,155 >>> mbox cmd response: failed
1,203,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,450 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,585 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,836 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,202,616 >>> mbox cmd response: failed
1,202,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,622 >>> mbox cmd response: failed
1,202,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,431 UART: [kat] LMS
1,168,743 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,174,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,858 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,543 UART: [ldev] Erasing FE.KEYID = 1
1,241,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,977 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,230 UART: [fwproc] Recv command 0x46574c44
1,282,963 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,376 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,512 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,203,394 >>> mbox cmd response: failed
1,203,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,400 >>> mbox cmd response: failed
1,203,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,838 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,068 UART:
192,565 UART: Running Caliptra ROM ...
193,722 UART:
193,876 UART: [state] CFI Enabled
266,002 UART: [state] LifecycleState = Unprovisioned
267,985 UART: [state] DebugLocked = No
269,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,275 UART: [kat] SHA2-256
444,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,526 UART: [kat] ++
455,011 UART: [kat] sha1
466,163 UART: [kat] SHA2-256
468,905 UART: [kat] SHA2-384
475,068 UART: [kat] SHA2-512-ACC
477,420 UART: [kat] ECC-384
2,766,501 UART: [kat] HMAC-384Kdf
2,800,288 UART: [kat] LMS
3,990,605 UART: [kat] --
3,993,805 UART: [cold-reset] ++
3,995,955 UART: [fht] Storing FHT @ 0x50003400
4,006,365 UART: [idev] ++
4,006,934 UART: [idev] CDI.KEYID = 6
4,007,877 UART: [idev] SUBJECT.KEYID = 7
4,009,148 UART: [idev] UDS.KEYID = 0
4,011,613 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,829 UART: [idev] Erasing UDS.KEYID = 0
7,345,285 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,148 UART: [idev] --
7,371,850 UART: [ldev] ++
7,372,445 UART: [ldev] CDI.KEYID = 6
7,373,389 UART: [ldev] SUBJECT.KEYID = 5
7,374,608 UART: [ldev] AUTHORITY.KEYID = 7
7,375,842 UART: [ldev] FE.KEYID = 1
7,421,830 UART: [ldev] Erasing FE.KEYID = 1
10,756,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,906 UART: [ldev] --
13,136,955 UART: [fwproc] Waiting for Commands...
13,139,652 UART: [fwproc] Received command 0x46574c44
13,141,846 UART: [fwproc] Received Image of size 114036 bytes
15,843,746 UART: ROM Fatal Error: 0x000B0012
15,847,256 >>> mbox cmd response: failed
15,847,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,049 >>> mbox cmd response: failed
15,848,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,610 >>> mbox cmd response: failed
Initializing fuses
2,061,576 writing to cptra_bootfsm_go
2,250,893 UART:
2,251,242 UART: Running Caliptra ROM ...
2,252,300 UART:
2,252,460 UART: [state] CFI Enabled
2,310,014 UART: [state] LifecycleState = Unprovisioned
2,311,962 UART: [state] DebugLocked = No
2,314,733 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,288 UART: [kat] SHA2-256
2,490,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,495 UART: [kat] ++
2,500,952 UART: [kat] sha1
2,512,701 UART: [kat] SHA2-256
2,515,402 UART: [kat] SHA2-384
2,521,130 UART: [kat] SHA2-512-ACC
2,523,480 UART: [kat] ECC-384
4,815,312 UART: [kat] HMAC-384Kdf
4,847,689 UART: [kat] LMS
6,038,014 UART: [kat] --
6,043,714 UART: [cold-reset] ++
6,044,743 UART: [fht] Storing FHT @ 0x50003400
6,055,691 UART: [idev] ++
6,056,318 UART: [idev] CDI.KEYID = 6
6,057,230 UART: [idev] SUBJECT.KEYID = 7
6,058,504 UART: [idev] UDS.KEYID = 0
6,060,682 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,204,214 UART: [idev] Erasing UDS.KEYID = 0
9,389,023 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,520 UART: [idev] --
9,414,138 UART: [ldev] ++
9,414,773 UART: [ldev] CDI.KEYID = 6
9,415,682 UART: [ldev] SUBJECT.KEYID = 5
9,416,952 UART: [ldev] AUTHORITY.KEYID = 7
9,418,193 UART: [ldev] FE.KEYID = 1
9,446,623 UART: [ldev] Erasing FE.KEYID = 1
12,780,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,078,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,092,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,107,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,121,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,139,528 UART: [ldev] --
15,143,473 UART: [fwproc] Waiting for Commands...
15,146,177 UART: [fwproc] Received command 0x46574c44
15,148,413 UART: [fwproc] Received Image of size 114036 bytes
19,203,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,279,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,348,343 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,664,781 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,785,646 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,548,150 >>> mbox cmd response: failed
15,548,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,184 >>> mbox cmd response: failed
15,549,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,817 >>> mbox cmd response: failed
Initializing fuses
2,054,537 writing to cptra_bootfsm_go
5,855,478 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,945,862 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,485 UART:
192,871 UART: Running Caliptra ROM ...
194,039 UART:
603,781 UART: [state] CFI Enabled
617,388 UART: [state] LifecycleState = Unprovisioned
619,282 UART: [state] DebugLocked = No
621,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,922 UART: [kat] SHA2-256
795,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,203 UART: [kat] ++
806,683 UART: [kat] sha1
818,104 UART: [kat] SHA2-256
820,768 UART: [kat] SHA2-384
827,779 UART: [kat] SHA2-512-ACC
830,172 UART: [kat] ECC-384
3,115,475 UART: [kat] HMAC-384Kdf
3,128,195 UART: [kat] LMS
4,318,305 UART: [kat] --
4,322,759 UART: [cold-reset] ++
4,324,870 UART: [fht] Storing FHT @ 0x50003400
4,335,390 UART: [idev] ++
4,335,999 UART: [idev] CDI.KEYID = 6
4,336,915 UART: [idev] SUBJECT.KEYID = 7
4,338,132 UART: [idev] UDS.KEYID = 0
4,340,746 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,118 UART: [idev] Erasing UDS.KEYID = 0
7,628,600 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,253 UART: [idev] --
7,653,399 UART: [ldev] ++
7,653,977 UART: [ldev] CDI.KEYID = 6
7,654,941 UART: [ldev] SUBJECT.KEYID = 5
7,656,317 UART: [ldev] AUTHORITY.KEYID = 7
7,657,540 UART: [ldev] FE.KEYID = 1
7,668,465 UART: [ldev] Erasing FE.KEYID = 1
10,956,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,919 UART: [ldev] --
13,317,015 UART: [fwproc] Waiting for Commands...
13,319,125 UART: [fwproc] Received command 0x46574c44
13,321,370 UART: [fwproc] Received Image of size 114036 bytes
16,023,912 UART: ROM Fatal Error: 0x000B0012
16,027,424 >>> mbox cmd response: failed
16,027,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,180 >>> mbox cmd response: failed
16,028,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,745 >>> mbox cmd response: failed
Initializing fuses
2,055,676 writing to cptra_bootfsm_go
2,245,020 UART:
2,245,379 UART: Running Caliptra ROM ...
2,246,523 UART:
4,447,469 UART: [state] CFI Enabled
4,460,596 UART: [state] LifecycleState = Unprovisioned
4,462,516 UART: [state] DebugLocked = No
4,464,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,468,765 UART: [kat] SHA2-256
4,638,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,649,076 UART: [kat] ++
4,649,577 UART: [kat] sha1
4,661,330 UART: [kat] SHA2-256
4,664,032 UART: [kat] SHA2-384
4,668,949 UART: [kat] SHA2-512-ACC
4,671,357 UART: [kat] ECC-384
6,956,322 UART: [kat] HMAC-384Kdf
6,969,352 UART: [kat] LMS
8,159,437 UART: [kat] --
8,165,979 UART: [cold-reset] ++
8,167,666 UART: [fht] Storing FHT @ 0x50003400
8,178,775 UART: [idev] ++
8,179,351 UART: [idev] CDI.KEYID = 6
8,180,367 UART: [idev] SUBJECT.KEYID = 7
8,181,532 UART: [idev] UDS.KEYID = 0
8,183,823 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,327,161 UART: [idev] Erasing UDS.KEYID = 0
11,468,486 UART: [idev] Using Sha1 for KeyId Algorithm
11,489,602 UART: [idev] --
11,493,877 UART: [ldev] ++
11,494,500 UART: [ldev] CDI.KEYID = 6
11,495,461 UART: [ldev] SUBJECT.KEYID = 5
11,496,661 UART: [ldev] AUTHORITY.KEYID = 7
11,497,899 UART: [ldev] FE.KEYID = 1
11,508,452 UART: [ldev] Erasing FE.KEYID = 1
14,792,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,086,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,100,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,115,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,130,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,149,478 UART: [ldev] --
17,155,128 UART: [fwproc] Waiting for Commands...
17,158,466 UART: [fwproc] Received command 0x46574c44
17,160,650 UART: [fwproc] Received Image of size 114036 bytes
21,214,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,297,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,366,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,683,143 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,126,709 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,768,930 >>> mbox cmd response: failed
15,769,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,814 >>> mbox cmd response: failed
15,770,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,403 >>> mbox cmd response: failed
Initializing fuses
2,062,155 writing to cptra_bootfsm_go
8,210,625 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,170,982 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,166 UART:
192,542 UART: Running Caliptra ROM ...
193,731 UART:
193,887 UART: [state] CFI Enabled
266,885 UART: [state] LifecycleState = Unprovisioned
268,775 UART: [state] DebugLocked = No
270,166 UART: [state] WD Timer not started. Device not locked for debugging
273,787 UART: [kat] SHA2-256
452,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,480 UART: [kat] ++
465,012 UART: [kat] sha1
475,087 UART: [kat] SHA2-256
478,098 UART: [kat] SHA2-384
482,893 UART: [kat] SHA2-512-ACC
485,824 UART: [kat] ECC-384
2,948,665 UART: [kat] HMAC-384Kdf
2,973,916 UART: [kat] LMS
3,503,395 UART: [kat] --
3,507,543 UART: [cold-reset] ++
3,509,258 UART: [fht] FHT @ 0x50003400
3,520,793 UART: [idev] ++
3,521,354 UART: [idev] CDI.KEYID = 6
3,522,234 UART: [idev] SUBJECT.KEYID = 7
3,523,448 UART: [idev] UDS.KEYID = 0
3,525,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,087 UART: [idev] Erasing UDS.KEYID = 0
6,027,375 UART: [idev] Sha1 KeyId Algorithm
6,050,402 UART: [idev] --
6,053,863 UART: [ldev] ++
6,054,438 UART: [ldev] CDI.KEYID = 6
6,055,331 UART: [ldev] SUBJECT.KEYID = 5
6,056,550 UART: [ldev] AUTHORITY.KEYID = 7
6,057,791 UART: [ldev] FE.KEYID = 1
6,101,693 UART: [ldev] Erasing FE.KEYID = 1
8,606,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,098 UART: [ldev] --
10,417,510 UART: [fwproc] Wait for Commands...
10,419,127 UART: [fwproc] Recv command 0x46574c44
10,421,171 UART: [fwproc] Recv'd Img size: 114360 bytes
12,468,554 UART: ROM Fatal Error: 0x000B0012
12,471,684 >>> mbox cmd response: failed
12,472,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,419 >>> mbox cmd response: failed
12,472,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,977 >>> mbox cmd response: failed
Initializing fuses
2,054,545 writing to cptra_bootfsm_go
2,243,845 UART:
2,244,194 UART: Running Caliptra ROM ...
2,245,245 UART:
2,245,400 UART: [state] CFI Enabled
2,322,516 UART: [state] LifecycleState = Unprovisioned
2,324,406 UART: [state] DebugLocked = No
2,326,688 UART: [state] WD Timer not started. Device not locked for debugging
2,330,006 UART: [kat] SHA2-256
2,509,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,520,727 UART: [kat] ++
2,521,188 UART: [kat] sha1
2,532,937 UART: [kat] SHA2-256
2,535,959 UART: [kat] SHA2-384
2,542,811 UART: [kat] SHA2-512-ACC
2,545,754 UART: [kat] ECC-384
5,008,197 UART: [kat] HMAC-384Kdf
5,030,429 UART: [kat] LMS
5,559,881 UART: [kat] --
5,564,634 UART: [cold-reset] ++
5,566,024 UART: [fht] FHT @ 0x50003400
5,576,958 UART: [idev] ++
5,577,532 UART: [idev] CDI.KEYID = 6
5,578,458 UART: [idev] SUBJECT.KEYID = 7
5,579,619 UART: [idev] UDS.KEYID = 0
5,581,826 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,725,763 UART: [idev] Erasing UDS.KEYID = 0
8,088,565 UART: [idev] Sha1 KeyId Algorithm
8,111,736 UART: [idev] --
8,116,088 UART: [ldev] ++
8,116,670 UART: [ldev] CDI.KEYID = 6
8,117,553 UART: [ldev] SUBJECT.KEYID = 5
8,118,784 UART: [ldev] AUTHORITY.KEYID = 7
8,120,018 UART: [ldev] FE.KEYID = 1
8,160,294 UART: [ldev] Erasing FE.KEYID = 1
10,663,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,402,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,092 UART: [ldev] --
12,473,118 UART: [fwproc] Wait for Commands...
12,475,700 UART: [fwproc] Recv command 0x46574c44
12,477,798 UART: [fwproc] Recv'd Img size: 114360 bytes
15,886,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,954,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,023,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,341,643 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,164 UART:
192,532 UART: Running Caliptra ROM ...
193,742 UART:
193,895 UART: [state] CFI Enabled
265,557 UART: [state] LifecycleState = Unprovisioned
267,905 UART: [state] DebugLocked = No
270,421 UART: [state] WD Timer not started. Device not locked for debugging
275,105 UART: [kat] SHA2-256
465,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,787 UART: [kat] ++
476,266 UART: [kat] sha1
486,120 UART: [kat] SHA2-256
489,134 UART: [kat] SHA2-384
495,383 UART: [kat] SHA2-512-ACC
497,954 UART: [kat] ECC-384
2,948,109 UART: [kat] HMAC-384Kdf
2,972,221 UART: [kat] LMS
3,503,970 UART: [kat] --
3,509,095 UART: [cold-reset] ++
3,510,721 UART: [fht] FHT @ 0x50003400
3,522,840 UART: [idev] ++
3,523,521 UART: [idev] CDI.KEYID = 6
3,524,541 UART: [idev] SUBJECT.KEYID = 7
3,525,721 UART: [idev] UDS.KEYID = 0
3,528,233 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,507 UART: [idev] Erasing UDS.KEYID = 0
6,031,833 UART: [idev] Sha1 KeyId Algorithm
6,052,898 UART: [idev] --
6,056,781 UART: [ldev] ++
6,057,481 UART: [ldev] CDI.KEYID = 6
6,058,399 UART: [ldev] SUBJECT.KEYID = 5
6,059,569 UART: [ldev] AUTHORITY.KEYID = 7
6,060,802 UART: [ldev] FE.KEYID = 1
6,102,398 UART: [ldev] Erasing FE.KEYID = 1
8,609,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,985 UART: [ldev] --
10,414,765 UART: [fwproc] Wait for Commands...
10,416,765 UART: [fwproc] Recv command 0x46574c44
10,419,033 UART: [fwproc] Recv'd Img size: 114360 bytes
12,496,573 UART: ROM Fatal Error: 0x000B0012
12,500,245 >>> mbox cmd response: failed
12,500,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,006 >>> mbox cmd response: failed
12,501,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,571 >>> mbox cmd response: failed
Initializing fuses
2,056,571 writing to cptra_bootfsm_go
2,245,839 UART:
2,246,198 UART: Running Caliptra ROM ...
2,247,356 UART:
2,247,523 UART: [state] CFI Enabled
2,299,350 UART: [state] LifecycleState = Unprovisioned
2,301,729 UART: [state] DebugLocked = No
2,304,526 UART: [state] WD Timer not started. Device not locked for debugging
2,309,698 UART: [kat] SHA2-256
2,499,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,510,341 UART: [kat] ++
2,510,836 UART: [kat] sha1
2,523,081 UART: [kat] SHA2-256
2,526,051 UART: [kat] SHA2-384
2,531,885 UART: [kat] SHA2-512-ACC
2,534,457 UART: [kat] ECC-384
4,990,033 UART: [kat] HMAC-384Kdf
5,012,975 UART: [kat] LMS
5,544,725 UART: [kat] --
5,549,728 UART: [cold-reset] ++
5,551,774 UART: [fht] FHT @ 0x50003400
5,563,296 UART: [idev] ++
5,563,974 UART: [idev] CDI.KEYID = 6
5,564,993 UART: [idev] SUBJECT.KEYID = 7
5,566,096 UART: [idev] UDS.KEYID = 0
5,568,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,712,477 UART: [idev] Erasing UDS.KEYID = 0
8,072,945 UART: [idev] Sha1 KeyId Algorithm
8,095,210 UART: [idev] --
8,100,426 UART: [ldev] ++
8,101,144 UART: [ldev] CDI.KEYID = 6
8,102,060 UART: [ldev] SUBJECT.KEYID = 5
8,103,172 UART: [ldev] AUTHORITY.KEYID = 7
8,104,403 UART: [ldev] FE.KEYID = 1
8,142,751 UART: [ldev] Erasing FE.KEYID = 1
10,649,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,127 UART: [ldev] --
12,455,907 UART: [fwproc] Wait for Commands...
12,458,004 UART: [fwproc] Recv command 0x46574c44
12,460,265 UART: [fwproc] Recv'd Img size: 114360 bytes
15,907,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,096,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,638,524 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,441,474 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,300,326 >>> mbox cmd response: failed
12,300,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,241 >>> mbox cmd response: failed
12,301,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,855 >>> mbox cmd response: failed
Initializing fuses
2,055,910 writing to cptra_bootfsm_go
5,493,182 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,788,163 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,539 UART:
192,887 UART: Running Caliptra ROM ...
193,995 UART:
603,807 UART: [state] CFI Enabled
619,305 UART: [state] LifecycleState = Unprovisioned
621,681 UART: [state] DebugLocked = No
622,993 UART: [state] WD Timer not started. Device not locked for debugging
628,347 UART: [kat] SHA2-256
818,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,009 UART: [kat] ++
829,602 UART: [kat] sha1
840,753 UART: [kat] SHA2-256
843,765 UART: [kat] SHA2-384
850,228 UART: [kat] SHA2-512-ACC
852,835 UART: [kat] ECC-384
3,291,701 UART: [kat] HMAC-384Kdf
3,306,216 UART: [kat] LMS
3,838,021 UART: [kat] --
3,841,643 UART: [cold-reset] ++
3,843,637 UART: [fht] FHT @ 0x50003400
3,854,409 UART: [idev] ++
3,855,138 UART: [idev] CDI.KEYID = 6
3,856,066 UART: [idev] SUBJECT.KEYID = 7
3,857,290 UART: [idev] UDS.KEYID = 0
3,859,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,107 UART: [idev] Erasing UDS.KEYID = 0
6,336,476 UART: [idev] Sha1 KeyId Algorithm
6,359,325 UART: [idev] --
6,365,431 UART: [ldev] ++
6,366,168 UART: [ldev] CDI.KEYID = 6
6,367,077 UART: [ldev] SUBJECT.KEYID = 5
6,368,182 UART: [ldev] AUTHORITY.KEYID = 7
6,369,466 UART: [ldev] FE.KEYID = 1
6,379,033 UART: [ldev] Erasing FE.KEYID = 1
8,858,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,779 UART: [ldev] --
10,649,974 UART: [fwproc] Wait for Commands...
10,652,235 UART: [fwproc] Recv command 0x46574c44
10,654,548 UART: [fwproc] Recv'd Img size: 114360 bytes
12,743,866 UART: ROM Fatal Error: 0x000B0012
12,747,525 >>> mbox cmd response: failed
12,747,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,258 >>> mbox cmd response: failed
12,748,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,814 >>> mbox cmd response: failed
Initializing fuses
2,060,087 writing to cptra_bootfsm_go
2,249,410 UART:
2,249,774 UART: Running Caliptra ROM ...
2,250,823 UART:
7,725,901 UART: [state] CFI Enabled
7,740,555 UART: [state] LifecycleState = Unprovisioned
7,742,910 UART: [state] DebugLocked = No
7,744,571 UART: [state] WD Timer not started. Device not locked for debugging
7,749,770 UART: [kat] SHA2-256
7,939,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,950,426 UART: [kat] ++
7,951,025 UART: [kat] sha1
7,962,368 UART: [kat] SHA2-256
7,965,428 UART: [kat] SHA2-384
7,971,098 UART: [kat] SHA2-512-ACC
7,973,668 UART: [kat] ECC-384
10,418,382 UART: [kat] HMAC-384Kdf
10,431,676 UART: [kat] LMS
10,963,512 UART: [kat] --
10,966,861 UART: [cold-reset] ++
10,969,062 UART: [fht] FHT @ 0x50003400
10,981,395 UART: [idev] ++
10,982,076 UART: [idev] CDI.KEYID = 6
10,983,097 UART: [idev] SUBJECT.KEYID = 7
10,984,257 UART: [idev] UDS.KEYID = 0
10,986,484 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,130,212 UART: [idev] Erasing UDS.KEYID = 0
13,457,107 UART: [idev] Sha1 KeyId Algorithm
13,479,470 UART: [idev] --
13,484,235 UART: [ldev] ++
13,484,920 UART: [ldev] CDI.KEYID = 6
13,485,936 UART: [ldev] SUBJECT.KEYID = 5
13,487,041 UART: [ldev] AUTHORITY.KEYID = 7
13,488,275 UART: [ldev] FE.KEYID = 1
13,499,209 UART: [ldev] Erasing FE.KEYID = 1
15,976,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,693,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,724,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,739,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,760,161 UART: [ldev] --
17,766,018 UART: [fwproc] Wait for Commands...
17,767,643 UART: [fwproc] Recv command 0x46574c44
17,769,905 UART: [fwproc] Recv'd Img size: 114360 bytes
21,218,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,298,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,414,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,957,138 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,762,786 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,527,757 >>> mbox cmd response: failed
12,528,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,724 >>> mbox cmd response: failed
12,528,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,285 >>> mbox cmd response: failed
Initializing fuses
2,053,731 writing to cptra_bootfsm_go
11,085,839 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,285,868 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,209 UART: [kat] SHA2-256
892,147 UART: [kat] SHA2-384
894,964 UART: [kat] SHA2-512-ACC
896,865 UART: [kat] ECC-384
902,398 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,475,775 UART: [cold-reset] ++
1,476,133 UART: [fht] Storing FHT @ 0x50003400
1,478,924 UART: [idev] ++
1,479,092 UART: [idev] CDI.KEYID = 6
1,479,452 UART: [idev] SUBJECT.KEYID = 7
1,479,876 UART: [idev] UDS.KEYID = 0
1,480,221 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,808 UART: [idev] Erasing UDS.KEYID = 0
1,504,380 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,900 UART: [idev] --
1,513,913 UART: [ldev] ++
1,514,081 UART: [ldev] CDI.KEYID = 6
1,514,444 UART: [ldev] SUBJECT.KEYID = 5
1,514,870 UART: [ldev] AUTHORITY.KEYID = 7
1,515,333 UART: [ldev] FE.KEYID = 1
1,520,451 UART: [ldev] Erasing FE.KEYID = 1
1,546,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,974 UART: [ldev] --
1,585,381 UART: [fwproc] Waiting for Commands...
1,586,120 UART: [fwproc] Received command 0x46574c44
1,586,911 UART: [fwproc] Received Image of size 114360 bytes
1,633,320 UART: ROM Fatal Error: 0x000B0012
1,634,477 >>> mbox cmd response: failed
1,634,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,483 >>> mbox cmd response: failed
1,634,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
86,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,657 UART: [kat] SHA2-256
881,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,703 UART: [kat] ++
885,855 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,370 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,475,971 UART: [cold-reset] ++
1,476,443 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,502 UART: [idev] Erasing UDS.KEYID = 0
1,505,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,730 UART: [idev] --
1,514,831 UART: [ldev] ++
1,514,999 UART: [ldev] CDI.KEYID = 6
1,515,362 UART: [ldev] SUBJECT.KEYID = 5
1,515,788 UART: [ldev] AUTHORITY.KEYID = 7
1,516,251 UART: [ldev] FE.KEYID = 1
1,521,129 UART: [ldev] Erasing FE.KEYID = 1
1,546,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,438 UART: [ldev] --
1,585,949 UART: [fwproc] Waiting for Commands...
1,586,658 UART: [fwproc] Received command 0x46574c44
1,587,449 UART: [fwproc] Received Image of size 114360 bytes
2,885,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,090 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,502 >>> mbox cmd response: failed
1,489,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,508 >>> mbox cmd response: failed
1,489,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,174 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,940 UART: [kat] SHA2-256
881,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,986 UART: [kat] ++
886,138 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,119 UART: [kat] SHA2-512-ACC
897,020 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,858 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,627 UART: [idev] Erasing UDS.KEYID = 0
1,504,893 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,501 UART: [idev] --
1,514,624 UART: [ldev] ++
1,514,792 UART: [ldev] CDI.KEYID = 6
1,515,155 UART: [ldev] SUBJECT.KEYID = 5
1,515,581 UART: [ldev] AUTHORITY.KEYID = 7
1,516,044 UART: [ldev] FE.KEYID = 1
1,521,150 UART: [ldev] Erasing FE.KEYID = 1
1,546,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,297 UART: [ldev] --
1,585,576 UART: [fwproc] Waiting for Commands...
1,586,325 UART: [fwproc] Received command 0x46574c44
1,587,116 UART: [fwproc] Received Image of size 114360 bytes
1,635,843 UART: ROM Fatal Error: 0x000B0012
1,637,000 >>> mbox cmd response: failed
1,637,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,006 >>> mbox cmd response: failed
1,637,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,520 UART: [kat] SHA2-256
892,458 UART: [kat] SHA2-384
895,215 UART: [kat] SHA2-512-ACC
897,116 UART: [kat] ECC-384
902,895 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,670 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,519 UART: [idev] --
1,515,530 UART: [ldev] ++
1,515,698 UART: [ldev] CDI.KEYID = 6
1,516,061 UART: [ldev] SUBJECT.KEYID = 5
1,516,487 UART: [ldev] AUTHORITY.KEYID = 7
1,516,950 UART: [ldev] FE.KEYID = 1
1,522,324 UART: [ldev] Erasing FE.KEYID = 1
1,547,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,845 UART: [ldev] --
1,587,264 UART: [fwproc] Waiting for Commands...
1,587,923 UART: [fwproc] Received command 0x46574c44
1,588,714 UART: [fwproc] Received Image of size 114360 bytes
2,885,788 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,721 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,508 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,486,723 >>> mbox cmd response: failed
1,486,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,729 >>> mbox cmd response: failed
1,486,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,843 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
893,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,197 UART: [kat] ++
897,349 UART: [kat] sha1
901,465 UART: [kat] SHA2-256
903,405 UART: [kat] SHA2-384
906,110 UART: [kat] SHA2-512-ACC
908,011 UART: [kat] ECC-384
917,422 UART: [kat] HMAC-384Kdf
922,066 UART: [kat] LMS
1,170,394 UART: [kat] --
1,171,249 UART: [cold-reset] ++
1,171,773 UART: [fht] FHT @ 0x50003400
1,174,350 UART: [idev] ++
1,174,518 UART: [idev] CDI.KEYID = 6
1,174,878 UART: [idev] SUBJECT.KEYID = 7
1,175,302 UART: [idev] UDS.KEYID = 0
1,175,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,268 UART: [idev] Erasing UDS.KEYID = 0
1,200,695 UART: [idev] Sha1 KeyId Algorithm
1,209,157 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,264 UART: [fwproc] Wait for Commands...
1,282,990 UART: [fwproc] Recv command 0x46574c44
1,283,718 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,147 UART: ROM Fatal Error: 0x000B0012
1,330,304 >>> mbox cmd response: failed
1,330,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,310 >>> mbox cmd response: failed
1,330,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
893,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,529 UART: [kat] ++
897,681 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,294 UART: [kat] SHA2-512-ACC
908,195 UART: [kat] ECC-384
917,664 UART: [kat] HMAC-384Kdf
922,294 UART: [kat] LMS
1,170,622 UART: [kat] --
1,171,401 UART: [cold-reset] ++
1,171,809 UART: [fht] FHT @ 0x50003400
1,174,678 UART: [idev] ++
1,174,846 UART: [idev] CDI.KEYID = 6
1,175,206 UART: [idev] SUBJECT.KEYID = 7
1,175,630 UART: [idev] UDS.KEYID = 0
1,175,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,666 UART: [idev] Erasing UDS.KEYID = 0
1,200,815 UART: [idev] Sha1 KeyId Algorithm
1,209,367 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,152 UART: [ldev] SUBJECT.KEYID = 5
1,211,578 UART: [ldev] AUTHORITY.KEYID = 7
1,212,041 UART: [ldev] FE.KEYID = 1
1,217,447 UART: [ldev] Erasing FE.KEYID = 1
1,244,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,997 UART: [ldev] --
1,283,422 UART: [fwproc] Wait for Commands...
1,284,040 UART: [fwproc] Recv command 0x46574c44
1,284,768 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,890 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,053 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,999 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,186,171 >>> mbox cmd response: failed
1,186,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,177 >>> mbox cmd response: failed
1,186,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,753 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,974 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
893,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,348 UART: [kat] ++
897,500 UART: [kat] sha1
901,734 UART: [kat] SHA2-256
903,674 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,105 UART: [kat] LMS
1,171,433 UART: [kat] --
1,172,128 UART: [cold-reset] ++
1,172,704 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,643 UART: [idev] Erasing UDS.KEYID = 0
1,201,944 UART: [idev] Sha1 KeyId Algorithm
1,210,356 UART: [idev] --
1,211,412 UART: [ldev] ++
1,211,580 UART: [ldev] CDI.KEYID = 6
1,211,943 UART: [ldev] SUBJECT.KEYID = 5
1,212,369 UART: [ldev] AUTHORITY.KEYID = 7
1,212,832 UART: [ldev] FE.KEYID = 1
1,218,206 UART: [ldev] Erasing FE.KEYID = 1
1,245,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,294 UART: [ldev] --
1,284,773 UART: [fwproc] Wait for Commands...
1,285,541 UART: [fwproc] Recv command 0x46574c44
1,286,269 UART: [fwproc] Recv'd Img size: 114360 bytes
1,333,394 UART: ROM Fatal Error: 0x000B0012
1,334,551 >>> mbox cmd response: failed
1,334,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,557 >>> mbox cmd response: failed
1,334,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
922,785 UART: [kat] LMS
1,171,113 UART: [kat] --
1,171,990 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,175,289 UART: [idev] ++
1,175,457 UART: [idev] CDI.KEYID = 6
1,175,817 UART: [idev] SUBJECT.KEYID = 7
1,176,241 UART: [idev] UDS.KEYID = 0
1,176,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,389 UART: [idev] Erasing UDS.KEYID = 0
1,202,086 UART: [idev] Sha1 KeyId Algorithm
1,210,464 UART: [idev] --
1,211,542 UART: [ldev] ++
1,211,710 UART: [ldev] CDI.KEYID = 6
1,212,073 UART: [ldev] SUBJECT.KEYID = 5
1,212,499 UART: [ldev] AUTHORITY.KEYID = 7
1,212,962 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,080 UART: [ldev] --
1,283,391 UART: [fwproc] Wait for Commands...
1,284,197 UART: [fwproc] Recv command 0x46574c44
1,284,925 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,010 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,187,184 >>> mbox cmd response: failed
1,187,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,190 >>> mbox cmd response: failed
1,187,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,325 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,457 UART: [cold-reset] ++
1,169,815 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,173,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,577 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,215,074 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,486 UART: [ldev] --
1,280,752 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,315 UART: ROM Fatal Error: 0x000B0012
1,330,472 >>> mbox cmd response: failed
1,330,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,478 >>> mbox cmd response: failed
1,330,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,652 UART: [state] LifecycleState = Unprovisioned
85,307 UART: [state] DebugLocked = No
85,919 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,867 UART: [kat] ++
895,019 UART: [kat] sha1
899,307 UART: [kat] SHA2-256
901,247 UART: [kat] SHA2-384
903,978 UART: [kat] SHA2-512-ACC
905,879 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,729 UART: [idev] ++
1,172,897 UART: [idev] CDI.KEYID = 6
1,173,258 UART: [idev] SUBJECT.KEYID = 7
1,173,683 UART: [idev] UDS.KEYID = 0
1,174,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,199,245 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,094 UART: [ldev] --
1,280,562 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,587 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,470 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,193 >>> mbox cmd response: failed
1,182,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,199 >>> mbox cmd response: failed
1,182,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,581 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,120 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
890,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,264 UART: [kat] SHA2-256
901,204 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,315 UART: [kat] LMS
1,168,627 UART: [kat] --
1,169,428 UART: [cold-reset] ++
1,169,766 UART: [fht] FHT @ 0x50003400
1,172,620 UART: [idev] ++
1,172,788 UART: [idev] CDI.KEYID = 6
1,173,149 UART: [idev] SUBJECT.KEYID = 7
1,173,574 UART: [idev] UDS.KEYID = 0
1,173,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,052 UART: [idev] Erasing UDS.KEYID = 0
1,198,854 UART: [idev] Sha1 KeyId Algorithm
1,207,778 UART: [idev] --
1,208,751 UART: [ldev] ++
1,208,919 UART: [ldev] CDI.KEYID = 6
1,209,283 UART: [ldev] SUBJECT.KEYID = 5
1,209,710 UART: [ldev] AUTHORITY.KEYID = 7
1,210,173 UART: [ldev] FE.KEYID = 1
1,215,461 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,199 UART: [fwproc] Wait for Commands...
1,282,000 UART: [fwproc] Recv command 0x46574c44
1,282,733 UART: [fwproc] Recv'd Img size: 114360 bytes
1,329,298 UART: ROM Fatal Error: 0x000B0012
1,330,455 >>> mbox cmd response: failed
1,330,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,461 >>> mbox cmd response: failed
1,330,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,467 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,236 UART: [idev] ++
1,173,404 UART: [idev] CDI.KEYID = 6
1,173,765 UART: [idev] SUBJECT.KEYID = 7
1,174,190 UART: [idev] UDS.KEYID = 0
1,174,536 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,215 UART: [ldev] Erasing FE.KEYID = 1
1,243,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,921 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46574c44
1,284,235 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,948 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,530 >>> mbox cmd response: failed
1,182,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,536 >>> mbox cmd response: failed
1,182,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,498 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,059 UART:
192,429 UART: Running Caliptra ROM ...
193,619 UART:
193,772 UART: [state] CFI Enabled
257,986 UART: [state] LifecycleState = Unprovisioned
259,950 UART: [state] DebugLocked = No
261,436 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,029 UART: [kat] SHA2-256
436,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,254 UART: [kat] ++
447,745 UART: [kat] sha1
460,190 UART: [kat] SHA2-256
462,923 UART: [kat] SHA2-384
469,537 UART: [kat] SHA2-512-ACC
471,938 UART: [kat] ECC-384
2,764,596 UART: [kat] HMAC-384Kdf
2,796,990 UART: [kat] LMS
3,987,312 UART: [kat] --
3,989,474 UART: [cold-reset] ++
3,991,733 UART: [fht] Storing FHT @ 0x50003400
4,002,459 UART: [idev] ++
4,003,039 UART: [idev] CDI.KEYID = 6
4,004,012 UART: [idev] SUBJECT.KEYID = 7
4,005,252 UART: [idev] UDS.KEYID = 0
4,007,786 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,151,408 UART: [idev] Erasing UDS.KEYID = 0
7,341,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,931 UART: [idev] --
7,367,578 UART: [ldev] ++
7,368,151 UART: [ldev] CDI.KEYID = 6
7,369,111 UART: [ldev] SUBJECT.KEYID = 5
7,370,327 UART: [ldev] AUTHORITY.KEYID = 7
7,371,561 UART: [ldev] FE.KEYID = 1
7,419,312 UART: [ldev] Erasing FE.KEYID = 1
10,752,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,847 UART: [ldev] --
13,134,852 UART: [fwproc] Waiting for Commands...
13,137,977 UART: [fwproc] Received command 0x46574c44
13,140,166 UART: [fwproc] Received Image of size 114036 bytes
15,836,226 UART: ROM Fatal Error: 0x000B0010
15,839,678 >>> mbox cmd response: failed
15,840,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,840,415 >>> mbox cmd response: failed
15,840,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,840,979 >>> mbox cmd response: failed
Initializing fuses
2,055,903 writing to cptra_bootfsm_go
2,245,290 UART:
2,245,631 UART: Running Caliptra ROM ...
2,246,788 UART:
2,246,958 UART: [state] CFI Enabled
2,318,862 UART: [state] LifecycleState = Unprovisioned
2,320,798 UART: [state] DebugLocked = No
2,322,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,426 UART: [kat] SHA2-256
2,497,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,646 UART: [kat] ++
2,508,187 UART: [kat] sha1
2,518,272 UART: [kat] SHA2-256
2,520,960 UART: [kat] SHA2-384
2,527,648 UART: [kat] SHA2-512-ACC
2,530,062 UART: [kat] ECC-384
4,822,672 UART: [kat] HMAC-384Kdf
4,853,214 UART: [kat] LMS
6,043,500 UART: [kat] --
6,049,647 UART: [cold-reset] ++
6,051,225 UART: [fht] Storing FHT @ 0x50003400
6,061,752 UART: [idev] ++
6,062,360 UART: [idev] CDI.KEYID = 6
6,063,277 UART: [idev] SUBJECT.KEYID = 7
6,064,494 UART: [idev] UDS.KEYID = 0
6,066,820 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,210,190 UART: [idev] Erasing UDS.KEYID = 0
9,395,220 UART: [idev] Using Sha1 for KeyId Algorithm
9,416,062 UART: [idev] --
9,419,844 UART: [ldev] ++
9,420,451 UART: [ldev] CDI.KEYID = 6
9,421,419 UART: [ldev] SUBJECT.KEYID = 5
9,422,628 UART: [ldev] AUTHORITY.KEYID = 7
9,423,864 UART: [ldev] FE.KEYID = 1
9,453,703 UART: [ldev] Erasing FE.KEYID = 1
12,787,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,080,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,142,711 UART: [ldev] --
15,147,489 UART: [fwproc] Waiting for Commands...
15,150,291 UART: [fwproc] Received command 0x46574c44
15,152,477 UART: [fwproc] Received Image of size 114036 bytes
19,212,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,284,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,353,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,670,577 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,807,331 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,577,173 >>> mbox cmd response: failed
15,577,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,578,158 >>> mbox cmd response: failed
15,578,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,578,724 >>> mbox cmd response: failed
Initializing fuses
2,055,458 writing to cptra_bootfsm_go
5,851,473 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,913,649 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,540 UART:
192,925 UART: Running Caliptra ROM ...
194,068 UART:
603,639 UART: [state] CFI Enabled
619,305 UART: [state] LifecycleState = Unprovisioned
621,193 UART: [state] DebugLocked = No
623,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,332 UART: [kat] SHA2-256
798,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,597 UART: [kat] ++
809,134 UART: [kat] sha1
820,399 UART: [kat] SHA2-256
823,097 UART: [kat] SHA2-384
828,389 UART: [kat] SHA2-512-ACC
830,729 UART: [kat] ECC-384
3,116,041 UART: [kat] HMAC-384Kdf
3,127,684 UART: [kat] LMS
4,317,766 UART: [kat] --
4,320,058 UART: [cold-reset] ++
4,321,685 UART: [fht] Storing FHT @ 0x50003400
4,331,713 UART: [idev] ++
4,332,282 UART: [idev] CDI.KEYID = 6
4,333,192 UART: [idev] SUBJECT.KEYID = 7
4,334,465 UART: [idev] UDS.KEYID = 0
4,337,173 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,506 UART: [idev] Erasing UDS.KEYID = 0
7,621,770 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,692 UART: [idev] --
7,647,658 UART: [ldev] ++
7,648,230 UART: [ldev] CDI.KEYID = 6
7,649,196 UART: [ldev] SUBJECT.KEYID = 5
7,650,412 UART: [ldev] AUTHORITY.KEYID = 7
7,651,646 UART: [ldev] FE.KEYID = 1
7,662,729 UART: [ldev] Erasing FE.KEYID = 1
10,952,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,852 UART: [ldev] --
13,314,590 UART: [fwproc] Waiting for Commands...
13,316,375 UART: [fwproc] Received command 0x46574c44
13,318,565 UART: [fwproc] Received Image of size 114036 bytes
16,018,030 UART: ROM Fatal Error: 0x000B0010
16,021,555 >>> mbox cmd response: failed
16,021,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,022,269 >>> mbox cmd response: failed
16,022,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,022,924 >>> mbox cmd response: failed
Initializing fuses
2,056,793 writing to cptra_bootfsm_go
2,246,093 UART:
2,246,771 UART: Running Caliptra ROM ...
2,247,847 UART:
4,438,403 UART: [state] CFI Enabled
4,452,656 UART: [state] LifecycleState = Unprovisioned
4,454,588 UART: [state] DebugLocked = No
4,455,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,459,944 UART: [kat] SHA2-256
4,629,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,640,187 UART: [kat] ++
4,640,654 UART: [kat] sha1
4,651,800 UART: [kat] SHA2-256
4,654,504 UART: [kat] SHA2-384
4,661,356 UART: [kat] SHA2-512-ACC
4,663,706 UART: [kat] ECC-384
6,946,804 UART: [kat] HMAC-384Kdf
6,958,611 UART: [kat] LMS
8,148,731 UART: [kat] --
8,154,186 UART: [cold-reset] ++
8,155,668 UART: [fht] Storing FHT @ 0x50003400
8,166,840 UART: [idev] ++
8,167,412 UART: [idev] CDI.KEYID = 6
8,168,382 UART: [idev] SUBJECT.KEYID = 7
8,169,618 UART: [idev] UDS.KEYID = 0
8,172,237 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,315,595 UART: [idev] Erasing UDS.KEYID = 0
11,460,727 UART: [idev] Using Sha1 for KeyId Algorithm
11,482,914 UART: [idev] --
11,487,343 UART: [ldev] ++
11,487,914 UART: [ldev] CDI.KEYID = 6
11,488,849 UART: [ldev] SUBJECT.KEYID = 5
11,490,115 UART: [ldev] AUTHORITY.KEYID = 7
11,491,353 UART: [ldev] FE.KEYID = 1
11,500,790 UART: [ldev] Erasing FE.KEYID = 1
14,791,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,084,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,098,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,113,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,128,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,146,554 UART: [ldev] --
17,151,386 UART: [fwproc] Waiting for Commands...
17,154,780 UART: [fwproc] Received command 0x46574c44
17,156,964 UART: [fwproc] Received Image of size 114036 bytes
21,201,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,278,036 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,346,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,664,733 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,129,990 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,752,185 >>> mbox cmd response: failed
15,752,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,753,153 >>> mbox cmd response: failed
15,753,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,753,715 >>> mbox cmd response: failed
Initializing fuses
2,056,393 writing to cptra_bootfsm_go
8,243,951 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,188,905 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,372 UART:
192,719 UART: Running Caliptra ROM ...
193,930 UART:
194,082 UART: [state] CFI Enabled
264,411 UART: [state] LifecycleState = Unprovisioned
266,279 UART: [state] DebugLocked = No
269,118 UART: [state] WD Timer not started. Device not locked for debugging
273,107 UART: [kat] SHA2-256
452,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,789 UART: [kat] ++
464,323 UART: [kat] sha1
475,907 UART: [kat] SHA2-256
478,973 UART: [kat] SHA2-384
485,964 UART: [kat] SHA2-512-ACC
488,920 UART: [kat] ECC-384
2,949,091 UART: [kat] HMAC-384Kdf
2,972,296 UART: [kat] LMS
3,501,747 UART: [kat] --
3,505,478 UART: [cold-reset] ++
3,506,929 UART: [fht] FHT @ 0x50003400
3,518,832 UART: [idev] ++
3,519,432 UART: [idev] CDI.KEYID = 6
3,520,324 UART: [idev] SUBJECT.KEYID = 7
3,521,540 UART: [idev] UDS.KEYID = 0
3,524,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,405 UART: [idev] Erasing UDS.KEYID = 0
6,028,394 UART: [idev] Sha1 KeyId Algorithm
6,051,037 UART: [idev] --
6,054,520 UART: [ldev] ++
6,055,102 UART: [ldev] CDI.KEYID = 6
6,056,017 UART: [ldev] SUBJECT.KEYID = 5
6,057,237 UART: [ldev] AUTHORITY.KEYID = 7
6,058,469 UART: [ldev] FE.KEYID = 1
6,101,910 UART: [ldev] Erasing FE.KEYID = 1
8,599,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,147 UART: [ldev] --
10,392,709 UART: [fwproc] Wait for Commands...
10,394,965 UART: [fwproc] Recv command 0x46574c44
10,397,061 UART: [fwproc] Recv'd Img size: 114360 bytes
12,441,932 UART: ROM Fatal Error: 0x000B0010
12,445,026 >>> mbox cmd response: failed
12,445,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,445,803 >>> mbox cmd response: failed
12,446,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,446,413 >>> mbox cmd response: failed
Initializing fuses
2,055,014 writing to cptra_bootfsm_go
2,244,334 UART:
2,244,691 UART: Running Caliptra ROM ...
2,245,828 UART:
2,245,990 UART: [state] CFI Enabled
2,301,798 UART: [state] LifecycleState = Unprovisioned
2,303,686 UART: [state] DebugLocked = No
2,305,513 UART: [state] WD Timer not started. Device not locked for debugging
2,308,630 UART: [kat] SHA2-256
2,487,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,499,326 UART: [kat] ++
2,499,787 UART: [kat] sha1
2,510,076 UART: [kat] SHA2-256
2,513,103 UART: [kat] SHA2-384
2,519,669 UART: [kat] SHA2-512-ACC
2,522,620 UART: [kat] ECC-384
4,985,793 UART: [kat] HMAC-384Kdf
5,011,156 UART: [kat] LMS
5,540,593 UART: [kat] --
5,547,170 UART: [cold-reset] ++
5,549,318 UART: [fht] FHT @ 0x50003400
5,560,472 UART: [idev] ++
5,561,077 UART: [idev] CDI.KEYID = 6
5,562,000 UART: [idev] SUBJECT.KEYID = 7
5,563,187 UART: [idev] UDS.KEYID = 0
5,565,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,331 UART: [idev] Erasing UDS.KEYID = 0
8,065,594 UART: [idev] Sha1 KeyId Algorithm
8,089,262 UART: [idev] --
8,093,535 UART: [ldev] ++
8,094,114 UART: [ldev] CDI.KEYID = 6
8,095,026 UART: [ldev] SUBJECT.KEYID = 5
8,096,193 UART: [ldev] AUTHORITY.KEYID = 7
8,097,427 UART: [ldev] FE.KEYID = 1
8,136,705 UART: [ldev] Erasing FE.KEYID = 1
10,641,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,864 UART: [ldev] --
12,451,819 UART: [fwproc] Wait for Commands...
12,453,496 UART: [fwproc] Recv command 0x46574c44
12,455,546 UART: [fwproc] Recv'd Img size: 114360 bytes
15,857,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,931,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,317,740 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,279 UART:
192,644 UART: Running Caliptra ROM ...
193,859 UART:
194,017 UART: [state] CFI Enabled
265,295 UART: [state] LifecycleState = Unprovisioned
267,719 UART: [state] DebugLocked = No
269,915 UART: [state] WD Timer not started. Device not locked for debugging
274,130 UART: [kat] SHA2-256
464,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,797 UART: [kat] ++
475,291 UART: [kat] sha1
486,555 UART: [kat] SHA2-256
489,577 UART: [kat] SHA2-384
497,075 UART: [kat] SHA2-512-ACC
499,662 UART: [kat] ECC-384
2,945,600 UART: [kat] HMAC-384Kdf
2,970,648 UART: [kat] LMS
3,502,428 UART: [kat] --
3,507,470 UART: [cold-reset] ++
3,508,415 UART: [fht] FHT @ 0x50003400
3,519,842 UART: [idev] ++
3,520,534 UART: [idev] CDI.KEYID = 6
3,521,506 UART: [idev] SUBJECT.KEYID = 7
3,522,671 UART: [idev] UDS.KEYID = 0
3,525,443 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,501 UART: [idev] Erasing UDS.KEYID = 0
6,027,381 UART: [idev] Sha1 KeyId Algorithm
6,050,673 UART: [idev] --
6,055,859 UART: [ldev] ++
6,056,544 UART: [ldev] CDI.KEYID = 6
6,057,480 UART: [ldev] SUBJECT.KEYID = 5
6,058,648 UART: [ldev] AUTHORITY.KEYID = 7
6,059,828 UART: [ldev] FE.KEYID = 1
6,098,891 UART: [ldev] Erasing FE.KEYID = 1
8,605,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,838 UART: [ldev] --
10,412,728 UART: [fwproc] Wait for Commands...
10,414,343 UART: [fwproc] Recv command 0x46574c44
10,416,662 UART: [fwproc] Recv'd Img size: 114360 bytes
12,494,170 UART: ROM Fatal Error: 0x000B0010
12,497,808 >>> mbox cmd response: failed
12,498,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,665 >>> mbox cmd response: failed
12,498,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,499,177 >>> mbox cmd response: failed
Initializing fuses
2,059,453 writing to cptra_bootfsm_go
2,248,756 UART:
2,249,127 UART: Running Caliptra ROM ...
2,250,219 UART:
2,250,377 UART: [state] CFI Enabled
2,313,587 UART: [state] LifecycleState = Unprovisioned
2,315,969 UART: [state] DebugLocked = No
2,318,629 UART: [state] WD Timer not started. Device not locked for debugging
2,323,528 UART: [kat] SHA2-256
2,513,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,188 UART: [kat] ++
2,524,650 UART: [kat] sha1
2,534,788 UART: [kat] SHA2-256
2,537,803 UART: [kat] SHA2-384
2,542,731 UART: [kat] SHA2-512-ACC
2,545,309 UART: [kat] ECC-384
4,995,291 UART: [kat] HMAC-384Kdf
5,020,262 UART: [kat] LMS
5,551,988 UART: [kat] --
5,556,310 UART: [cold-reset] ++
5,558,348 UART: [fht] FHT @ 0x50003400
5,569,435 UART: [idev] ++
5,570,148 UART: [idev] CDI.KEYID = 6
5,571,091 UART: [idev] SUBJECT.KEYID = 7
5,572,312 UART: [idev] UDS.KEYID = 0
5,574,670 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,718,481 UART: [idev] Erasing UDS.KEYID = 0
8,075,724 UART: [idev] Sha1 KeyId Algorithm
8,099,028 UART: [idev] --
8,103,195 UART: [ldev] ++
8,103,878 UART: [ldev] CDI.KEYID = 6
8,104,815 UART: [ldev] SUBJECT.KEYID = 5
8,105,972 UART: [ldev] AUTHORITY.KEYID = 7
8,107,207 UART: [ldev] FE.KEYID = 1
8,147,683 UART: [ldev] Erasing FE.KEYID = 1
10,656,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,654 UART: [ldev] --
12,461,207 UART: [fwproc] Wait for Commands...
12,463,169 UART: [fwproc] Recv command 0x46574c44
12,465,492 UART: [fwproc] Recv'd Img size: 114360 bytes
15,917,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,113,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,656,274 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,442,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,288,706 >>> mbox cmd response: failed
12,289,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,289,628 >>> mbox cmd response: failed
12,289,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,290,190 >>> mbox cmd response: failed
Initializing fuses
2,055,527 writing to cptra_bootfsm_go
5,484,018 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,781,540 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,535 UART:
192,914 UART: Running Caliptra ROM ...
194,118 UART:
603,886 UART: [state] CFI Enabled
619,698 UART: [state] LifecycleState = Unprovisioned
622,076 UART: [state] DebugLocked = No
624,108 UART: [state] WD Timer not started. Device not locked for debugging
628,422 UART: [kat] SHA2-256
818,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,097 UART: [kat] ++
829,689 UART: [kat] sha1
841,784 UART: [kat] SHA2-256
844,795 UART: [kat] SHA2-384
850,991 UART: [kat] SHA2-512-ACC
853,608 UART: [kat] ECC-384
3,296,162 UART: [kat] HMAC-384Kdf
3,308,773 UART: [kat] LMS
3,840,600 UART: [kat] --
3,847,003 UART: [cold-reset] ++
3,848,088 UART: [fht] FHT @ 0x50003400
3,860,746 UART: [idev] ++
3,861,462 UART: [idev] CDI.KEYID = 6
3,862,383 UART: [idev] SUBJECT.KEYID = 7
3,863,600 UART: [idev] UDS.KEYID = 0
3,866,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,009,912 UART: [idev] Erasing UDS.KEYID = 0
6,342,649 UART: [idev] Sha1 KeyId Algorithm
6,364,932 UART: [idev] --
6,369,039 UART: [ldev] ++
6,369,728 UART: [ldev] CDI.KEYID = 6
6,370,612 UART: [ldev] SUBJECT.KEYID = 5
6,371,828 UART: [ldev] AUTHORITY.KEYID = 7
6,373,009 UART: [ldev] FE.KEYID = 1
6,383,850 UART: [ldev] Erasing FE.KEYID = 1
8,864,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,640 UART: [ldev] --
10,656,666 UART: [fwproc] Wait for Commands...
10,658,157 UART: [fwproc] Recv command 0x46574c44
10,660,104 UART: [fwproc] Recv'd Img size: 114360 bytes
12,737,353 UART: ROM Fatal Error: 0x000B0010
12,741,015 >>> mbox cmd response: failed
12,741,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,613 >>> mbox cmd response: failed
12,741,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,186 >>> mbox cmd response: failed
Initializing fuses
2,055,521 writing to cptra_bootfsm_go
2,244,807 UART:
2,245,157 UART: Running Caliptra ROM ...
2,246,199 UART:
7,706,572 UART: [state] CFI Enabled
7,718,247 UART: [state] LifecycleState = Unprovisioned
7,720,602 UART: [state] DebugLocked = No
7,723,036 UART: [state] WD Timer not started. Device not locked for debugging
7,727,328 UART: [kat] SHA2-256
7,917,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,928,051 UART: [kat] ++
7,928,517 UART: [kat] sha1
7,940,109 UART: [kat] SHA2-256
7,943,125 UART: [kat] SHA2-384
7,949,704 UART: [kat] SHA2-512-ACC
7,952,271 UART: [kat] ECC-384
10,393,104 UART: [kat] HMAC-384Kdf
10,407,350 UART: [kat] LMS
10,939,184 UART: [kat] --
10,942,638 UART: [cold-reset] ++
10,943,760 UART: [fht] FHT @ 0x50003400
10,956,467 UART: [idev] ++
10,957,181 UART: [idev] CDI.KEYID = 6
10,958,119 UART: [idev] SUBJECT.KEYID = 7
10,959,336 UART: [idev] UDS.KEYID = 0
10,961,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,105,118 UART: [idev] Erasing UDS.KEYID = 0
13,437,398 UART: [idev] Sha1 KeyId Algorithm
13,459,560 UART: [idev] --
13,463,758 UART: [ldev] ++
13,464,430 UART: [ldev] CDI.KEYID = 6
13,465,340 UART: [ldev] SUBJECT.KEYID = 5
13,466,501 UART: [ldev] AUTHORITY.KEYID = 7
13,467,732 UART: [ldev] FE.KEYID = 1
13,475,895 UART: [ldev] Erasing FE.KEYID = 1
15,956,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,677,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,692,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,707,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,722,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,743,219 UART: [ldev] --
17,748,052 UART: [fwproc] Wait for Commands...
17,750,044 UART: [fwproc] Recv command 0x46574c44
17,752,301 UART: [fwproc] Recv'd Img size: 114360 bytes
21,203,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,280,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,396,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,938,897 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,759,417 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,509,454 >>> mbox cmd response: failed
12,509,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,331 >>> mbox cmd response: failed
12,510,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,909 >>> mbox cmd response: failed
Initializing fuses
2,054,641 writing to cptra_bootfsm_go
11,117,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,324,778 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,135 UART: [kat] SHA2-256
882,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,181 UART: [kat] ++
886,333 UART: [kat] sha1
890,691 UART: [kat] SHA2-256
892,629 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
902,922 UART: [kat] HMAC-384Kdf
907,392 UART: [kat] LMS
1,475,588 UART: [kat] --
1,476,473 UART: [cold-reset] ++
1,476,819 UART: [fht] Storing FHT @ 0x50003400
1,479,692 UART: [idev] ++
1,479,860 UART: [idev] CDI.KEYID = 6
1,480,220 UART: [idev] SUBJECT.KEYID = 7
1,480,644 UART: [idev] UDS.KEYID = 0
1,480,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,864 UART: [idev] Erasing UDS.KEYID = 0
1,505,994 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,660 UART: [idev] --
1,515,779 UART: [ldev] ++
1,515,947 UART: [ldev] CDI.KEYID = 6
1,516,310 UART: [ldev] SUBJECT.KEYID = 5
1,516,736 UART: [ldev] AUTHORITY.KEYID = 7
1,517,199 UART: [ldev] FE.KEYID = 1
1,522,529 UART: [ldev] Erasing FE.KEYID = 1
1,548,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,258 UART: [ldev] --
1,587,533 UART: [fwproc] Waiting for Commands...
1,588,162 UART: [fwproc] Received command 0x46574c44
1,588,953 UART: [fwproc] Received Image of size 114360 bytes
1,632,502 UART: ROM Fatal Error: 0x000B0010
1,633,659 >>> mbox cmd response: failed
1,633,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,665 >>> mbox cmd response: failed
1,633,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
903,186 UART: [kat] HMAC-384Kdf
907,820 UART: [kat] LMS
1,476,016 UART: [kat] --
1,477,045 UART: [cold-reset] ++
1,477,613 UART: [fht] Storing FHT @ 0x50003400
1,480,276 UART: [idev] ++
1,480,444 UART: [idev] CDI.KEYID = 6
1,480,804 UART: [idev] SUBJECT.KEYID = 7
1,481,228 UART: [idev] UDS.KEYID = 0
1,481,573 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,282 UART: [idev] Erasing UDS.KEYID = 0
1,505,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,380 UART: [idev] --
1,515,501 UART: [ldev] ++
1,515,669 UART: [ldev] CDI.KEYID = 6
1,516,032 UART: [ldev] SUBJECT.KEYID = 5
1,516,458 UART: [ldev] AUTHORITY.KEYID = 7
1,516,921 UART: [ldev] FE.KEYID = 1
1,521,989 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,621 UART: [fwproc] Waiting for Commands...
1,586,356 UART: [fwproc] Received command 0x46574c44
1,587,147 UART: [fwproc] Received Image of size 114360 bytes
2,884,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,098 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,484,676 >>> mbox cmd response: failed
1,484,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,682 >>> mbox cmd response: failed
1,484,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,030 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,344 UART: [kat] SHA2-256
892,282 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,587 UART: [kat] HMAC-384Kdf
907,111 UART: [kat] LMS
1,475,307 UART: [kat] --
1,476,280 UART: [cold-reset] ++
1,476,808 UART: [fht] Storing FHT @ 0x50003400
1,479,607 UART: [idev] ++
1,479,775 UART: [idev] CDI.KEYID = 6
1,480,135 UART: [idev] SUBJECT.KEYID = 7
1,480,559 UART: [idev] UDS.KEYID = 0
1,480,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,505 UART: [idev] Erasing UDS.KEYID = 0
1,505,183 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,873 UART: [idev] --
1,515,076 UART: [ldev] ++
1,515,244 UART: [ldev] CDI.KEYID = 6
1,515,607 UART: [ldev] SUBJECT.KEYID = 5
1,516,033 UART: [ldev] AUTHORITY.KEYID = 7
1,516,496 UART: [ldev] FE.KEYID = 1
1,521,832 UART: [ldev] Erasing FE.KEYID = 1
1,546,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,435 UART: [ldev] --
1,585,772 UART: [fwproc] Waiting for Commands...
1,586,581 UART: [fwproc] Received command 0x46574c44
1,587,372 UART: [fwproc] Received Image of size 114360 bytes
1,629,383 UART: ROM Fatal Error: 0x000B0010
1,630,540 >>> mbox cmd response: failed
1,630,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,546 >>> mbox cmd response: failed
1,630,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,926 UART: [kat] SHA2-256
881,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,972 UART: [kat] ++
886,124 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
895,199 UART: [kat] SHA2-512-ACC
897,100 UART: [kat] ECC-384
902,793 UART: [kat] HMAC-384Kdf
907,333 UART: [kat] LMS
1,475,529 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,315 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,759 UART: [idev] --
1,515,726 UART: [ldev] ++
1,515,894 UART: [ldev] CDI.KEYID = 6
1,516,257 UART: [ldev] SUBJECT.KEYID = 5
1,516,683 UART: [ldev] AUTHORITY.KEYID = 7
1,517,146 UART: [ldev] FE.KEYID = 1
1,522,172 UART: [ldev] Erasing FE.KEYID = 1
1,547,609 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,533 UART: [ldev] --
1,586,962 UART: [fwproc] Waiting for Commands...
1,587,825 UART: [fwproc] Received command 0x46574c44
1,588,616 UART: [fwproc] Received Image of size 114360 bytes
2,886,372 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,263 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,726 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,482,829 >>> mbox cmd response: failed
1,482,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,835 >>> mbox cmd response: failed
1,482,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,403 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,043 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,328 UART: [idev] Erasing UDS.KEYID = 0
1,201,195 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,731 UART: [ldev] ++
1,210,899 UART: [ldev] CDI.KEYID = 6
1,211,262 UART: [ldev] SUBJECT.KEYID = 5
1,211,688 UART: [ldev] AUTHORITY.KEYID = 7
1,212,151 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,130 UART: [fwproc] Wait for Commands...
1,283,908 UART: [fwproc] Recv command 0x46574c44
1,284,636 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,231 UART: ROM Fatal Error: 0x000B0010
1,327,388 >>> mbox cmd response: failed
1,327,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,394 >>> mbox cmd response: failed
1,327,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
918,024 UART: [kat] HMAC-384Kdf
922,814 UART: [kat] LMS
1,171,142 UART: [kat] --
1,171,915 UART: [cold-reset] ++
1,172,359 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,500 UART: [idev] Erasing UDS.KEYID = 0
1,200,123 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,318 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,548 UART: [fwproc] Wait for Commands...
1,282,364 UART: [fwproc] Recv command 0x46574c44
1,283,092 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,245 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,319 >>> mbox cmd response: failed
1,182,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,325 >>> mbox cmd response: failed
1,182,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,289 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,498 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
893,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,490 UART: [kat] ++
897,642 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
918,099 UART: [kat] HMAC-384Kdf
922,803 UART: [kat] LMS
1,171,131 UART: [kat] --
1,171,890 UART: [cold-reset] ++
1,172,454 UART: [fht] FHT @ 0x50003400
1,175,163 UART: [idev] ++
1,175,331 UART: [idev] CDI.KEYID = 6
1,175,691 UART: [idev] SUBJECT.KEYID = 7
1,176,115 UART: [idev] UDS.KEYID = 0
1,176,460 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,861 UART: [idev] Erasing UDS.KEYID = 0
1,201,098 UART: [idev] Sha1 KeyId Algorithm
1,209,536 UART: [idev] --
1,210,708 UART: [ldev] ++
1,210,876 UART: [ldev] CDI.KEYID = 6
1,211,239 UART: [ldev] SUBJECT.KEYID = 5
1,211,665 UART: [ldev] AUTHORITY.KEYID = 7
1,212,128 UART: [ldev] FE.KEYID = 1
1,217,144 UART: [ldev] Erasing FE.KEYID = 1
1,243,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,406 UART: [ldev] --
1,282,855 UART: [fwproc] Wait for Commands...
1,283,629 UART: [fwproc] Recv command 0x46574c44
1,284,357 UART: [fwproc] Recv'd Img size: 114360 bytes
1,327,924 UART: ROM Fatal Error: 0x000B0010
1,329,081 >>> mbox cmd response: failed
1,329,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,087 >>> mbox cmd response: failed
1,329,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,443 UART: [kat] SHA2-256
893,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,218 UART: [kat] ++
897,370 UART: [kat] sha1
901,676 UART: [kat] SHA2-256
903,616 UART: [kat] SHA2-384
906,381 UART: [kat] SHA2-512-ACC
908,282 UART: [kat] ECC-384
917,841 UART: [kat] HMAC-384Kdf
922,557 UART: [kat] LMS
1,170,885 UART: [kat] --
1,171,752 UART: [cold-reset] ++
1,172,146 UART: [fht] FHT @ 0x50003400
1,174,585 UART: [idev] ++
1,174,753 UART: [idev] CDI.KEYID = 6
1,175,113 UART: [idev] SUBJECT.KEYID = 7
1,175,537 UART: [idev] UDS.KEYID = 0
1,175,882 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,731 UART: [idev] Erasing UDS.KEYID = 0
1,201,582 UART: [idev] Sha1 KeyId Algorithm
1,210,112 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,750 UART: [ldev] Erasing FE.KEYID = 1
1,244,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,593 UART: [fwproc] Wait for Commands...
1,284,163 UART: [fwproc] Recv command 0x46574c44
1,284,891 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,676 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,396 >>> mbox cmd response: failed
1,183,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,402 >>> mbox cmd response: failed
1,183,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,996 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,801 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,676 UART: [kat] SHA2-512-ACC
906,577 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,174,439 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,214,760 UART: [ldev] Erasing FE.KEYID = 1
1,241,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,342 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 114360 bytes
1,325,783 UART: ROM Fatal Error: 0x000B0010
1,326,940 >>> mbox cmd response: failed
1,326,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,946 >>> mbox cmd response: failed
1,326,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,493 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,174,493 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,199,139 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,877 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,176,651 >>> mbox cmd response: failed
1,176,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,657 >>> mbox cmd response: failed
1,176,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,922 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,219 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,174,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,718 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,588 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,253 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,862 UART: ROM Fatal Error: 0x000B0010
1,328,019 >>> mbox cmd response: failed
1,328,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,025 >>> mbox cmd response: failed
1,328,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,407 UART: [kat] SHA2-256
890,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,576 UART: [kat] SHA2-256
901,516 UART: [kat] SHA2-384
904,153 UART: [kat] SHA2-512-ACC
906,054 UART: [kat] ECC-384
915,709 UART: [kat] HMAC-384Kdf
920,375 UART: [kat] LMS
1,168,687 UART: [kat] --
1,169,802 UART: [cold-reset] ++
1,170,198 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,174,212 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,238 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,163 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,515 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,184 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,035 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,490 >>> mbox cmd response: failed
1,178,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,496 >>> mbox cmd response: failed
1,178,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,011 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,728 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,084 UART:
192,444 UART: Running Caliptra ROM ...
193,633 UART:
193,789 UART: [state] CFI Enabled
266,790 UART: [state] LifecycleState = Unprovisioned
268,765 UART: [state] DebugLocked = No
271,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,954 UART: [kat] SHA2-256
445,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,153 UART: [kat] ++
456,596 UART: [kat] sha1
467,691 UART: [kat] SHA2-256
470,389 UART: [kat] SHA2-384
475,125 UART: [kat] SHA2-512-ACC
477,528 UART: [kat] ECC-384
2,767,252 UART: [kat] HMAC-384Kdf
2,798,680 UART: [kat] LMS
3,989,010 UART: [kat] --
3,994,384 UART: [cold-reset] ++
3,995,837 UART: [fht] Storing FHT @ 0x50003400
4,007,052 UART: [idev] ++
4,007,628 UART: [idev] CDI.KEYID = 6
4,008,609 UART: [idev] SUBJECT.KEYID = 7
4,009,832 UART: [idev] UDS.KEYID = 0
4,012,379 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,003 UART: [idev] Erasing UDS.KEYID = 0
7,347,351 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,954 UART: [idev] --
7,372,815 UART: [ldev] ++
7,373,389 UART: [ldev] CDI.KEYID = 6
7,374,409 UART: [ldev] SUBJECT.KEYID = 5
7,375,575 UART: [ldev] AUTHORITY.KEYID = 7
7,376,807 UART: [ldev] FE.KEYID = 1
7,421,699 UART: [ldev] Erasing FE.KEYID = 1
10,750,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,740 UART: [ldev] --
13,112,413 UART: [fwproc] Waiting for Commands...
13,115,106 UART: [fwproc] Received command 0x46574c44
13,117,294 UART: [fwproc] Received Image of size 114036 bytes
15,820,933 UART: ROM Fatal Error: 0x000B0040
15,824,415 >>> mbox cmd response: failed
15,824,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,825,150 >>> mbox cmd response: failed
15,825,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,825,701 >>> mbox cmd response: failed
Initializing fuses
2,059,552 writing to cptra_bootfsm_go
2,248,877 UART:
2,249,226 UART: Running Caliptra ROM ...
2,250,327 UART:
2,250,487 UART: [state] CFI Enabled
2,313,631 UART: [state] LifecycleState = Unprovisioned
2,315,626 UART: [state] DebugLocked = No
2,318,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,217 UART: [kat] SHA2-256
2,492,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,439 UART: [kat] ++
2,503,898 UART: [kat] sha1
2,515,433 UART: [kat] SHA2-256
2,518,130 UART: [kat] SHA2-384
2,524,050 UART: [kat] SHA2-512-ACC
2,526,415 UART: [kat] ECC-384
4,814,516 UART: [kat] HMAC-384Kdf
4,826,321 UART: [kat] LMS
6,016,644 UART: [kat] --
6,021,463 UART: [cold-reset] ++
6,022,660 UART: [fht] Storing FHT @ 0x50003400
6,033,558 UART: [idev] ++
6,034,183 UART: [idev] CDI.KEYID = 6
6,035,107 UART: [idev] SUBJECT.KEYID = 7
6,036,345 UART: [idev] UDS.KEYID = 0
6,038,873 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,182,270 UART: [idev] Erasing UDS.KEYID = 0
9,371,707 UART: [idev] Using Sha1 for KeyId Algorithm
9,394,610 UART: [idev] --
9,397,962 UART: [ldev] ++
9,398,575 UART: [ldev] CDI.KEYID = 6
9,399,495 UART: [ldev] SUBJECT.KEYID = 5
9,400,698 UART: [ldev] AUTHORITY.KEYID = 7
9,401,884 UART: [ldev] FE.KEYID = 1
9,441,652 UART: [ldev] Erasing FE.KEYID = 1
12,774,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,070,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,084,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,099,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,113,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,131,948 UART: [ldev] --
15,136,567 UART: [fwproc] Waiting for Commands...
15,138,878 UART: [fwproc] Received command 0x46574c44
15,141,077 UART: [fwproc] Received Image of size 114036 bytes
19,195,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,276,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,345,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,662,497 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,785,571 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,529,857 >>> mbox cmd response: failed
15,530,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,530,740 >>> mbox cmd response: failed
15,531,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,531,306 >>> mbox cmd response: failed
Initializing fuses
2,055,927 writing to cptra_bootfsm_go
5,854,977 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,918,962 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,538 UART:
192,911 UART: Running Caliptra ROM ...
194,044 UART:
603,621 UART: [state] CFI Enabled
620,688 UART: [state] LifecycleState = Unprovisioned
622,565 UART: [state] DebugLocked = No
624,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,485 UART: [kat] SHA2-256
799,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,747 UART: [kat] ++
810,241 UART: [kat] sha1
820,203 UART: [kat] SHA2-256
822,894 UART: [kat] SHA2-384
829,576 UART: [kat] SHA2-512-ACC
831,903 UART: [kat] ECC-384
3,115,347 UART: [kat] HMAC-384Kdf
3,126,906 UART: [kat] LMS
4,317,061 UART: [kat] --
4,320,977 UART: [cold-reset] ++
4,322,431 UART: [fht] Storing FHT @ 0x50003400
4,335,211 UART: [idev] ++
4,335,842 UART: [idev] CDI.KEYID = 6
4,336,758 UART: [idev] SUBJECT.KEYID = 7
4,337,972 UART: [idev] UDS.KEYID = 0
4,340,575 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,086 UART: [idev] Erasing UDS.KEYID = 0
7,627,152 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,663 UART: [idev] --
7,652,876 UART: [ldev] ++
7,653,501 UART: [ldev] CDI.KEYID = 6
7,654,410 UART: [ldev] SUBJECT.KEYID = 5
7,655,627 UART: [ldev] AUTHORITY.KEYID = 7
7,656,915 UART: [ldev] FE.KEYID = 1
7,668,153 UART: [ldev] Erasing FE.KEYID = 1
10,959,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,445 UART: [ldev] --
13,317,453 UART: [fwproc] Waiting for Commands...
13,319,283 UART: [fwproc] Received command 0x46574c44
13,321,493 UART: [fwproc] Received Image of size 114036 bytes
16,029,890 UART: ROM Fatal Error: 0x000B0040
16,033,405 >>> mbox cmd response: failed
16,033,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,181 >>> mbox cmd response: failed
16,034,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,751 >>> mbox cmd response: failed
Initializing fuses
2,060,671 writing to cptra_bootfsm_go
2,249,997 UART:
2,250,361 UART: Running Caliptra ROM ...
2,251,502 UART:
4,419,361 UART: [state] CFI Enabled
4,432,694 UART: [state] LifecycleState = Unprovisioned
4,434,680 UART: [state] DebugLocked = No
4,436,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,441,308 UART: [kat] SHA2-256
4,611,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,621,597 UART: [kat] ++
4,622,060 UART: [kat] sha1
4,632,515 UART: [kat] SHA2-256
4,635,039 UART: [kat] SHA2-384
4,640,551 UART: [kat] SHA2-512-ACC
4,642,907 UART: [kat] ECC-384
6,926,057 UART: [kat] HMAC-384Kdf
6,937,644 UART: [kat] LMS
8,127,759 UART: [kat] --
8,129,497 UART: [cold-reset] ++
8,131,837 UART: [fht] Storing FHT @ 0x50003400
8,142,512 UART: [idev] ++
8,143,101 UART: [idev] CDI.KEYID = 6
8,143,983 UART: [idev] SUBJECT.KEYID = 7
8,145,251 UART: [idev] UDS.KEYID = 0
8,147,610 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,290,954 UART: [idev] Erasing UDS.KEYID = 0
11,433,309 UART: [idev] Using Sha1 for KeyId Algorithm
11,456,086 UART: [idev] --
11,459,866 UART: [ldev] ++
11,460,487 UART: [ldev] CDI.KEYID = 6
11,461,397 UART: [ldev] SUBJECT.KEYID = 5
11,462,656 UART: [ldev] AUTHORITY.KEYID = 7
11,463,892 UART: [ldev] FE.KEYID = 1
11,475,457 UART: [ldev] Erasing FE.KEYID = 1
14,764,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,057,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,072,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,087,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,101,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,120,953 UART: [ldev] --
17,125,096 UART: [fwproc] Waiting for Commands...
17,128,387 UART: [fwproc] Received command 0x46574c44
17,130,637 UART: [fwproc] Received Image of size 114036 bytes
21,187,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,261,115 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,330,034 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
21,647,015 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
4,129,083 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,772,982 >>> mbox cmd response: failed
15,773,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,773,888 >>> mbox cmd response: failed
15,774,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,774,404 >>> mbox cmd response: failed
Initializing fuses
2,063,132 writing to cptra_bootfsm_go
8,223,448 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,147,429 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,199 UART:
192,556 UART: Running Caliptra ROM ...
193,678 UART:
193,821 UART: [state] CFI Enabled
261,922 UART: [state] LifecycleState = Unprovisioned
263,844 UART: [state] DebugLocked = No
265,250 UART: [state] WD Timer not started. Device not locked for debugging
269,637 UART: [kat] SHA2-256
448,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,337 UART: [kat] ++
460,786 UART: [kat] sha1
471,011 UART: [kat] SHA2-256
474,018 UART: [kat] SHA2-384
480,593 UART: [kat] SHA2-512-ACC
483,526 UART: [kat] ECC-384
2,945,996 UART: [kat] HMAC-384Kdf
2,969,154 UART: [kat] LMS
3,498,617 UART: [kat] --
3,502,026 UART: [cold-reset] ++
3,503,483 UART: [fht] FHT @ 0x50003400
3,513,874 UART: [idev] ++
3,514,444 UART: [idev] CDI.KEYID = 6
3,515,355 UART: [idev] SUBJECT.KEYID = 7
3,516,593 UART: [idev] UDS.KEYID = 0
3,519,342 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,393 UART: [idev] Erasing UDS.KEYID = 0
6,023,156 UART: [idev] Sha1 KeyId Algorithm
6,046,986 UART: [idev] --
6,051,556 UART: [ldev] ++
6,052,149 UART: [ldev] CDI.KEYID = 6
6,053,070 UART: [ldev] SUBJECT.KEYID = 5
6,054,181 UART: [ldev] AUTHORITY.KEYID = 7
6,055,469 UART: [ldev] FE.KEYID = 1
6,097,010 UART: [ldev] Erasing FE.KEYID = 1
8,602,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,773 UART: [ldev] --
10,409,854 UART: [fwproc] Wait for Commands...
10,412,651 UART: [fwproc] Recv command 0x46574c44
10,414,703 UART: [fwproc] Recv'd Img size: 114360 bytes
12,474,376 UART: ROM Fatal Error: 0x000B0040
12,477,497 >>> mbox cmd response: failed
12,477,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,478,234 >>> mbox cmd response: failed
12,478,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,479,030 >>> mbox cmd response: failed
Initializing fuses
2,053,077 writing to cptra_bootfsm_go
2,242,388 UART:
2,242,730 UART: Running Caliptra ROM ...
2,243,884 UART:
2,244,054 UART: [state] CFI Enabled
2,308,458 UART: [state] LifecycleState = Unprovisioned
2,310,335 UART: [state] DebugLocked = No
2,311,721 UART: [state] WD Timer not started. Device not locked for debugging
2,315,792 UART: [kat] SHA2-256
2,494,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,483 UART: [kat] ++
2,507,022 UART: [kat] sha1
2,518,136 UART: [kat] SHA2-256
2,521,153 UART: [kat] SHA2-384
2,527,955 UART: [kat] SHA2-512-ACC
2,530,952 UART: [kat] ECC-384
4,990,834 UART: [kat] HMAC-384Kdf
5,015,932 UART: [kat] LMS
5,545,400 UART: [kat] --
5,548,817 UART: [cold-reset] ++
5,551,236 UART: [fht] FHT @ 0x50003400
5,561,564 UART: [idev] ++
5,562,123 UART: [idev] CDI.KEYID = 6
5,563,059 UART: [idev] SUBJECT.KEYID = 7
5,564,271 UART: [idev] UDS.KEYID = 0
5,566,775 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,710,579 UART: [idev] Erasing UDS.KEYID = 0
8,068,154 UART: [idev] Sha1 KeyId Algorithm
8,091,226 UART: [idev] --
8,095,119 UART: [ldev] ++
8,095,690 UART: [ldev] CDI.KEYID = 6
8,096,606 UART: [ldev] SUBJECT.KEYID = 5
8,097,767 UART: [ldev] AUTHORITY.KEYID = 7
8,098,998 UART: [ldev] FE.KEYID = 1
8,144,058 UART: [ldev] Erasing FE.KEYID = 1
10,649,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,641 UART: [ldev] --
12,458,507 UART: [fwproc] Wait for Commands...
12,460,877 UART: [fwproc] Recv command 0x46574c44
12,462,970 UART: [fwproc] Recv'd Img size: 114360 bytes
15,863,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,321,798 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,150 UART:
192,513 UART: Running Caliptra ROM ...
193,713 UART:
193,867 UART: [state] CFI Enabled
261,717 UART: [state] LifecycleState = Unprovisioned
264,126 UART: [state] DebugLocked = No
266,428 UART: [state] WD Timer not started. Device not locked for debugging
270,280 UART: [kat] SHA2-256
460,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,939 UART: [kat] ++
471,431 UART: [kat] sha1
483,608 UART: [kat] SHA2-256
486,628 UART: [kat] SHA2-384
494,395 UART: [kat] SHA2-512-ACC
496,957 UART: [kat] ECC-384
2,944,482 UART: [kat] HMAC-384Kdf
2,971,361 UART: [kat] LMS
3,503,111 UART: [kat] --
3,507,273 UART: [cold-reset] ++
3,508,537 UART: [fht] FHT @ 0x50003400
3,521,418 UART: [idev] ++
3,522,103 UART: [idev] CDI.KEYID = 6
3,523,041 UART: [idev] SUBJECT.KEYID = 7
3,524,259 UART: [idev] UDS.KEYID = 0
3,527,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,265 UART: [idev] Erasing UDS.KEYID = 0
6,030,267 UART: [idev] Sha1 KeyId Algorithm
6,052,532 UART: [idev] --
6,057,066 UART: [ldev] ++
6,057,753 UART: [ldev] CDI.KEYID = 6
6,058,640 UART: [ldev] SUBJECT.KEYID = 5
6,059,855 UART: [ldev] AUTHORITY.KEYID = 7
6,061,054 UART: [ldev] FE.KEYID = 1
6,098,752 UART: [ldev] Erasing FE.KEYID = 1
8,604,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,406 UART: [ldev] --
10,413,495 UART: [fwproc] Wait for Commands...
10,416,191 UART: [fwproc] Recv command 0x46574c44
10,418,504 UART: [fwproc] Recv'd Img size: 114360 bytes
12,504,170 UART: ROM Fatal Error: 0x000B0040
12,507,849 >>> mbox cmd response: failed
12,508,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,464 >>> mbox cmd response: failed
12,508,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,170 >>> mbox cmd response: failed
Initializing fuses
2,055,779 writing to cptra_bootfsm_go
2,245,077 UART:
2,245,428 UART: Running Caliptra ROM ...
2,246,555 UART:
2,246,715 UART: [state] CFI Enabled
2,324,336 UART: [state] LifecycleState = Unprovisioned
2,326,706 UART: [state] DebugLocked = No
2,329,146 UART: [state] WD Timer not started. Device not locked for debugging
2,334,367 UART: [kat] SHA2-256
2,524,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,058 UART: [kat] ++
2,535,522 UART: [kat] sha1
2,546,866 UART: [kat] SHA2-256
2,549,839 UART: [kat] SHA2-384
2,555,886 UART: [kat] SHA2-512-ACC
2,558,460 UART: [kat] ECC-384
5,006,355 UART: [kat] HMAC-384Kdf
5,028,419 UART: [kat] LMS
5,560,195 UART: [kat] --
5,564,936 UART: [cold-reset] ++
5,566,124 UART: [fht] FHT @ 0x50003400
5,576,839 UART: [idev] ++
5,577,516 UART: [idev] CDI.KEYID = 6
5,578,535 UART: [idev] SUBJECT.KEYID = 7
5,579,689 UART: [idev] UDS.KEYID = 0
5,581,830 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,725,765 UART: [idev] Erasing UDS.KEYID = 0
8,085,560 UART: [idev] Sha1 KeyId Algorithm
8,107,200 UART: [idev] --
8,112,986 UART: [ldev] ++
8,113,670 UART: [ldev] CDI.KEYID = 6
8,114,582 UART: [ldev] SUBJECT.KEYID = 5
8,115,742 UART: [ldev] AUTHORITY.KEYID = 7
8,117,141 UART: [ldev] FE.KEYID = 1
8,157,879 UART: [ldev] Erasing FE.KEYID = 1
10,665,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,351 UART: [ldev] --
12,462,596 UART: [fwproc] Wait for Commands...
12,465,394 UART: [fwproc] Recv command 0x46574c44
12,467,704 UART: [fwproc] Recv'd Img size: 114360 bytes
15,917,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,115,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,657,992 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,444,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,312,681 >>> mbox cmd response: failed
12,313,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,313,565 >>> mbox cmd response: failed
12,313,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,314,157 >>> mbox cmd response: failed
Initializing fuses
2,055,608 writing to cptra_bootfsm_go
5,468,769 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,767,353 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,418 UART:
192,764 UART: Running Caliptra ROM ...
193,955 UART:
603,657 UART: [state] CFI Enabled
616,623 UART: [state] LifecycleState = Unprovisioned
618,995 UART: [state] DebugLocked = No
621,883 UART: [state] WD Timer not started. Device not locked for debugging
625,933 UART: [kat] SHA2-256
815,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,600 UART: [kat] ++
827,100 UART: [kat] sha1
838,858 UART: [kat] SHA2-256
841,866 UART: [kat] SHA2-384
846,975 UART: [kat] SHA2-512-ACC
849,592 UART: [kat] ECC-384
3,293,448 UART: [kat] HMAC-384Kdf
3,306,009 UART: [kat] LMS
3,837,852 UART: [kat] --
3,842,176 UART: [cold-reset] ++
3,843,405 UART: [fht] FHT @ 0x50003400
3,854,930 UART: [idev] ++
3,855,660 UART: [idev] CDI.KEYID = 6
3,856,575 UART: [idev] SUBJECT.KEYID = 7
3,857,787 UART: [idev] UDS.KEYID = 0
3,860,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,229 UART: [idev] Erasing UDS.KEYID = 0
6,332,147 UART: [idev] Sha1 KeyId Algorithm
6,355,612 UART: [idev] --
6,360,687 UART: [ldev] ++
6,361,367 UART: [ldev] CDI.KEYID = 6
6,362,249 UART: [ldev] SUBJECT.KEYID = 5
6,363,460 UART: [ldev] AUTHORITY.KEYID = 7
6,364,693 UART: [ldev] FE.KEYID = 1
6,374,878 UART: [ldev] Erasing FE.KEYID = 1
8,850,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,656 UART: [ldev] --
10,638,761 UART: [fwproc] Wait for Commands...
10,640,742 UART: [fwproc] Recv command 0x46574c44
10,643,066 UART: [fwproc] Recv'd Img size: 114360 bytes
12,722,308 UART: ROM Fatal Error: 0x000B0040
12,725,919 >>> mbox cmd response: failed
12,726,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,726,643 >>> mbox cmd response: failed
12,726,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,727,194 >>> mbox cmd response: failed
Initializing fuses
2,054,161 writing to cptra_bootfsm_go
2,243,430 UART:
2,243,789 UART: Running Caliptra ROM ...
2,244,838 UART:
7,721,740 UART: [state] CFI Enabled
7,734,329 UART: [state] LifecycleState = Unprovisioned
7,736,727 UART: [state] DebugLocked = No
7,739,618 UART: [state] WD Timer not started. Device not locked for debugging
7,744,068 UART: [kat] SHA2-256
7,933,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,944,744 UART: [kat] ++
7,945,290 UART: [kat] sha1
7,955,965 UART: [kat] SHA2-256
7,958,980 UART: [kat] SHA2-384
7,964,916 UART: [kat] SHA2-512-ACC
7,967,478 UART: [kat] ECC-384
10,409,205 UART: [kat] HMAC-384Kdf
10,421,533 UART: [kat] LMS
10,953,342 UART: [kat] --
10,958,000 UART: [cold-reset] ++
10,959,946 UART: [fht] FHT @ 0x50003400
10,970,546 UART: [idev] ++
10,971,217 UART: [idev] CDI.KEYID = 6
10,972,170 UART: [idev] SUBJECT.KEYID = 7
10,973,380 UART: [idev] UDS.KEYID = 0
10,975,582 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,119,325 UART: [idev] Erasing UDS.KEYID = 0
13,448,885 UART: [idev] Sha1 KeyId Algorithm
13,470,706 UART: [idev] --
13,474,527 UART: [ldev] ++
13,475,202 UART: [ldev] CDI.KEYID = 6
13,476,086 UART: [ldev] SUBJECT.KEYID = 5
13,477,216 UART: [ldev] AUTHORITY.KEYID = 7
13,478,491 UART: [ldev] FE.KEYID = 1
13,489,949 UART: [ldev] Erasing FE.KEYID = 1
15,969,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,688,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,704,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,719,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,734,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,755,489 UART: [ldev] --
17,761,231 UART: [fwproc] Wait for Commands...
17,762,848 UART: [fwproc] Recv command 0x46574c44
17,765,158 UART: [fwproc] Recv'd Img size: 114360 bytes
21,208,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,281,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,397,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
21,940,061 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,757,655 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,523,356 >>> mbox cmd response: failed
12,523,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,250 >>> mbox cmd response: failed
12,524,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,867 >>> mbox cmd response: failed
Initializing fuses
2,055,471 writing to cptra_bootfsm_go
11,094,795 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,295,115 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,491 UART: [kat] SHA2-256
882,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,537 UART: [kat] ++
886,689 UART: [kat] sha1
891,059 UART: [kat] SHA2-256
892,997 UART: [kat] SHA2-384
895,704 UART: [kat] SHA2-512-ACC
897,605 UART: [kat] ECC-384
903,466 UART: [kat] HMAC-384Kdf
907,926 UART: [kat] LMS
1,476,122 UART: [kat] --
1,477,327 UART: [cold-reset] ++
1,477,739 UART: [fht] Storing FHT @ 0x50003400
1,480,502 UART: [idev] ++
1,480,670 UART: [idev] CDI.KEYID = 6
1,481,030 UART: [idev] SUBJECT.KEYID = 7
1,481,454 UART: [idev] UDS.KEYID = 0
1,481,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,904 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,720 UART: [idev] --
1,515,755 UART: [ldev] ++
1,515,923 UART: [ldev] CDI.KEYID = 6
1,516,286 UART: [ldev] SUBJECT.KEYID = 5
1,516,712 UART: [ldev] AUTHORITY.KEYID = 7
1,517,175 UART: [ldev] FE.KEYID = 1
1,522,171 UART: [ldev] Erasing FE.KEYID = 1
1,547,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,800 UART: [ldev] --
1,587,207 UART: [fwproc] Waiting for Commands...
1,588,068 UART: [fwproc] Received command 0x46574c44
1,588,859 UART: [fwproc] Received Image of size 114360 bytes
1,634,914 UART: ROM Fatal Error: 0x000B0040
1,636,071 >>> mbox cmd response: failed
1,636,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,077 >>> mbox cmd response: failed
1,636,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,633 UART: [kat] SHA2-256
881,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,679 UART: [kat] ++
885,831 UART: [kat] sha1
890,021 UART: [kat] SHA2-256
891,959 UART: [kat] SHA2-384
894,690 UART: [kat] SHA2-512-ACC
896,591 UART: [kat] ECC-384
902,342 UART: [kat] HMAC-384Kdf
906,934 UART: [kat] LMS
1,475,130 UART: [kat] --
1,475,853 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,002 UART: [idev] Erasing UDS.KEYID = 0
1,504,884 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,463 UART: [ldev] Erasing FE.KEYID = 1
1,547,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,162 UART: [ldev] --
1,586,501 UART: [fwproc] Waiting for Commands...
1,587,262 UART: [fwproc] Received command 0x46574c44
1,588,053 UART: [fwproc] Received Image of size 114360 bytes
2,885,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,052 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,068 >>> mbox cmd response: failed
1,487,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,074 >>> mbox cmd response: failed
1,487,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,670 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,648 UART: [kat] SHA2-256
882,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,694 UART: [kat] ++
886,846 UART: [kat] sha1
891,018 UART: [kat] SHA2-256
892,956 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
907,811 UART: [kat] LMS
1,476,007 UART: [kat] --
1,476,752 UART: [cold-reset] ++
1,477,260 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,505,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,511 UART: [idev] --
1,515,604 UART: [ldev] ++
1,515,772 UART: [ldev] CDI.KEYID = 6
1,516,135 UART: [ldev] SUBJECT.KEYID = 5
1,516,561 UART: [ldev] AUTHORITY.KEYID = 7
1,517,024 UART: [ldev] FE.KEYID = 1
1,522,434 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,955 UART: [ldev] --
1,587,432 UART: [fwproc] Waiting for Commands...
1,588,065 UART: [fwproc] Received command 0x46574c44
1,588,856 UART: [fwproc] Received Image of size 114360 bytes
1,635,991 UART: ROM Fatal Error: 0x000B0040
1,637,148 >>> mbox cmd response: failed
1,637,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,154 >>> mbox cmd response: failed
1,637,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,270 UART: [kat] SHA2-256
882,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,316 UART: [kat] ++
886,468 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,697 UART: [kat] HMAC-384Kdf
907,285 UART: [kat] LMS
1,475,481 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,787 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,411 UART: [idev] --
1,515,534 UART: [ldev] ++
1,515,702 UART: [ldev] CDI.KEYID = 6
1,516,065 UART: [ldev] SUBJECT.KEYID = 5
1,516,491 UART: [ldev] AUTHORITY.KEYID = 7
1,516,954 UART: [ldev] FE.KEYID = 1
1,522,472 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,807 UART: [ldev] --
1,587,130 UART: [fwproc] Waiting for Commands...
1,587,879 UART: [fwproc] Received command 0x46574c44
1,588,670 UART: [fwproc] Received Image of size 114360 bytes
2,886,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,844 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,025 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,086 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,885 >>> mbox cmd response: failed
1,487,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,891 >>> mbox cmd response: failed
1,487,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,158 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,351 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
902,027 UART: [kat] SHA2-256
903,967 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,466 UART: [kat] LMS
1,170,794 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,990 UART: [idev] ++
1,175,158 UART: [idev] CDI.KEYID = 6
1,175,518 UART: [idev] SUBJECT.KEYID = 7
1,175,942 UART: [idev] UDS.KEYID = 0
1,176,287 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,697 UART: [idev] Sha1 KeyId Algorithm
1,209,281 UART: [idev] --
1,210,563 UART: [ldev] ++
1,210,731 UART: [ldev] CDI.KEYID = 6
1,211,094 UART: [ldev] SUBJECT.KEYID = 5
1,211,520 UART: [ldev] AUTHORITY.KEYID = 7
1,211,983 UART: [ldev] FE.KEYID = 1
1,217,247 UART: [ldev] Erasing FE.KEYID = 1
1,244,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,207 UART: [ldev] --
1,283,632 UART: [fwproc] Wait for Commands...
1,284,204 UART: [fwproc] Recv command 0x46574c44
1,284,932 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,789 UART: ROM Fatal Error: 0x000B0040
1,332,946 >>> mbox cmd response: failed
1,332,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,952 >>> mbox cmd response: failed
1,332,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
893,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,139 UART: [kat] ++
897,291 UART: [kat] sha1
901,673 UART: [kat] SHA2-256
903,613 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
917,762 UART: [kat] HMAC-384Kdf
922,188 UART: [kat] LMS
1,170,516 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,897 UART: [fht] FHT @ 0x50003400
1,174,524 UART: [idev] ++
1,174,692 UART: [idev] CDI.KEYID = 6
1,175,052 UART: [idev] SUBJECT.KEYID = 7
1,175,476 UART: [idev] UDS.KEYID = 0
1,175,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,452 UART: [idev] Erasing UDS.KEYID = 0
1,200,745 UART: [idev] Sha1 KeyId Algorithm
1,209,207 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,780 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,216,867 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,742 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,847 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,503 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,633 >>> mbox cmd response: failed
1,188,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,639 >>> mbox cmd response: failed
1,188,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,840 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,669 UART: [kat] LMS
1,170,997 UART: [kat] --
1,171,534 UART: [cold-reset] ++
1,171,946 UART: [fht] FHT @ 0x50003400
1,174,795 UART: [idev] ++
1,174,963 UART: [idev] CDI.KEYID = 6
1,175,323 UART: [idev] SUBJECT.KEYID = 7
1,175,747 UART: [idev] UDS.KEYID = 0
1,176,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,873 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,209,912 UART: [idev] --
1,210,986 UART: [ldev] ++
1,211,154 UART: [ldev] CDI.KEYID = 6
1,211,517 UART: [ldev] SUBJECT.KEYID = 5
1,211,943 UART: [ldev] AUTHORITY.KEYID = 7
1,212,406 UART: [ldev] FE.KEYID = 1
1,217,770 UART: [ldev] Erasing FE.KEYID = 1
1,243,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,000 UART: [ldev] --
1,283,437 UART: [fwproc] Wait for Commands...
1,284,223 UART: [fwproc] Recv command 0x46574c44
1,284,951 UART: [fwproc] Recv'd Img size: 114360 bytes
1,332,592 UART: ROM Fatal Error: 0x000B0040
1,333,749 >>> mbox cmd response: failed
1,333,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,755 >>> mbox cmd response: failed
1,333,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
893,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,972 UART: [kat] ++
898,124 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,427 UART: [kat] LMS
1,171,755 UART: [kat] --
1,172,752 UART: [cold-reset] ++
1,173,116 UART: [fht] FHT @ 0x50003400
1,175,867 UART: [idev] ++
1,176,035 UART: [idev] CDI.KEYID = 6
1,176,395 UART: [idev] SUBJECT.KEYID = 7
1,176,819 UART: [idev] UDS.KEYID = 0
1,177,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,757 UART: [idev] Erasing UDS.KEYID = 0
1,202,162 UART: [idev] Sha1 KeyId Algorithm
1,210,788 UART: [idev] --
1,212,048 UART: [ldev] ++
1,212,216 UART: [ldev] CDI.KEYID = 6
1,212,579 UART: [ldev] SUBJECT.KEYID = 5
1,213,005 UART: [ldev] AUTHORITY.KEYID = 7
1,213,468 UART: [ldev] FE.KEYID = 1
1,218,426 UART: [ldev] Erasing FE.KEYID = 1
1,245,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,102 UART: [ldev] --
1,284,411 UART: [fwproc] Wait for Commands...
1,285,143 UART: [fwproc] Recv command 0x46574c44
1,285,871 UART: [fwproc] Recv'd Img size: 114360 bytes
2,584,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,880 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,188,667 >>> mbox cmd response: failed
1,188,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,673 >>> mbox cmd response: failed
1,188,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,628,301 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
903,922 UART: [kat] SHA2-512-ACC
905,823 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,142 UART: [ldev] Erasing FE.KEYID = 1
1,241,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,862 UART: [ldev] --
1,281,218 UART: [fwproc] Wait for Commands...
1,281,887 UART: [fwproc] Recv command 0x46574c44
1,282,620 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,184 UART: ROM Fatal Error: 0x000B0040
1,331,341 >>> mbox cmd response: failed
1,331,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,347 >>> mbox cmd response: failed
1,331,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,174,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,198,275 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,114 UART: [ldev] ++
1,208,282 UART: [ldev] CDI.KEYID = 6
1,208,646 UART: [ldev] SUBJECT.KEYID = 5
1,209,073 UART: [ldev] AUTHORITY.KEYID = 7
1,209,536 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,648 UART: [ldev] --
1,280,122 UART: [fwproc] Wait for Commands...
1,280,745 UART: [fwproc] Recv command 0x46574c44
1,281,478 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,859 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,836 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,208 >>> mbox cmd response: failed
1,182,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,214 >>> mbox cmd response: failed
1,182,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,945 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,172,958 UART: [idev] ++
1,173,126 UART: [idev] CDI.KEYID = 6
1,173,487 UART: [idev] SUBJECT.KEYID = 7
1,173,912 UART: [idev] UDS.KEYID = 0
1,174,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,784 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,242,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,253 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,595 UART: [fwproc] Recv'd Img size: 114360 bytes
1,331,075 UART: ROM Fatal Error: 0x000B0040
1,332,232 >>> mbox cmd response: failed
1,332,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,238 >>> mbox cmd response: failed
1,332,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,461 UART: [kat] LMS
1,169,773 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,215 UART: [idev] SUBJECT.KEYID = 7
1,174,640 UART: [idev] UDS.KEYID = 0
1,174,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,415 UART: [ldev] ++
1,209,583 UART: [ldev] CDI.KEYID = 6
1,209,947 UART: [ldev] SUBJECT.KEYID = 5
1,210,374 UART: [ldev] AUTHORITY.KEYID = 7
1,210,837 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,916 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,297 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,981 >>> mbox cmd response: failed
1,183,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,987 >>> mbox cmd response: failed
1,183,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,274 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
192,248 UART:
192,615 UART: Running Caliptra ROM ...
193,713 UART:
193,858 UART: [state] CFI Enabled
263,369 UART: [state] LifecycleState = Unprovisioned
265,301 UART: [state] DebugLocked = No
266,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,800 UART: [kat] SHA2-256
441,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,995 UART: [kat] ++
452,441 UART: [kat] sha1
464,292 UART: [kat] SHA2-256
466,983 UART: [kat] SHA2-384
473,448 UART: [kat] SHA2-512-ACC
475,797 UART: [kat] ECC-384
2,765,292 UART: [kat] HMAC-384Kdf
2,777,195 UART: [kat] LMS
3,967,474 UART: [kat] --
3,970,789 UART: [cold-reset] ++
3,971,752 UART: [fht] Storing FHT @ 0x50003400
3,983,556 UART: [idev] ++
3,984,118 UART: [idev] CDI.KEYID = 6
3,985,053 UART: [idev] SUBJECT.KEYID = 7
3,986,326 UART: [idev] UDS.KEYID = 0
3,988,869 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,132,542 UART: [idev] Erasing UDS.KEYID = 0
7,326,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,557 UART: [idev] --
7,352,177 UART: [ldev] ++
7,352,746 UART: [ldev] CDI.KEYID = 6
7,353,685 UART: [ldev] SUBJECT.KEYID = 5
7,354,901 UART: [ldev] AUTHORITY.KEYID = 7
7,356,189 UART: [ldev] FE.KEYID = 1
7,399,794 UART: [ldev] Erasing FE.KEYID = 1
10,728,780 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,783 UART: [ldev] --
13,090,918 UART: [fwproc] Waiting for Commands...
13,092,642 UART: [fwproc] Received command 0x46574c44
13,094,838 UART: [fwproc] Received Image of size 114036 bytes
17,145,467 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,219,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,288,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,606,066 >>> mbox cmd response: success
17,608,524 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
17,733,663 UART: [afmc] ++
17,734,306 UART: [afmc] CDI.KEYID = 6
17,735,198 UART: [afmc] SUBJECT.KEYID = 7
17,736,218 UART: [afmc] AUTHORITY.KEYID = 5
20,982,183 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,875 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,125 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,577 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,372 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,822 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,347,854 UART: [afmc] --
23,351,940 UART: [cold-reset] --
23,354,892 UART: [state] Locking Datavault
23,361,114 UART: [state] Locking PCR0, PCR1 and PCR31
23,362,869 UART: [state] Locking ICCM
23,365,509 UART: [exit] Launching FMC @ 0x40000130
23,373,858 UART:
23,374,137 UART: Running Caliptra FMC ...
23,375,250 UART:
23,375,406 UART: [state] CFI Enabled
23,440,967 UART: [fht] FMC Alias Private Key: 7
25,778,964 UART: [art] Extend RT PCRs Done
25,780,186 UART: [art] Lock RT PCRs Done
25,781,826 UART: [art] Populate DV Done
25,787,348 UART: [fht] FMC Alias Private Key: 7
25,788,937 UART: [art] Derive CDI
25,789,679 UART: [art] Store in in slot 0x4
25,849,334 UART: [art] Derive Key Pair
25,850,373 UART: [art] Store priv key in slot 0x5
29,143,207 UART: [art] Derive Key Pair - Done
29,155,940 UART: [art] Signing Cert with AUTHO
29,157,241 UART: RITY.KEYID = 7
31,445,658 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,178 UART: [art] PUB.X = 9FA91582C4D27CF9A2C21D933DB2F30A655AA445E26C3F7AC4A0CFAF78E47F3512095CE0A94455805EFAAF8D4FC97232
31,454,483 UART: [art] PUB.Y = EB99FF687E7BC87C46F91706A6458C4DD9B905969E520E295D45A6B0300B341AEFA849B87E125C52F97E59A40C0A5D6B
31,461,686 UART: [art] SIG.R = 4BC9E469071BBE6563FC88FA798760A6ABF85526B1F6CBC77C90347D874475B07BA00DF7524CDC8D06CBFE7E706EB27E
31,469,122 UART: [art] SIG.S = E2AD044002749FE0A18E49407E0B87142995A62F7DE6C31790CDCD472EA915ED71FCFEF8ED57BF034A5919F314E65247
32,774,640 UART: Caliptra RT
32,775,346 UART: [state] CFI Enabled
32,937,095 UART: [rt] RT listening for mailbox commands...
32,939,839 UART:
32,940,007 UART: Running Caliptra ROM ...
32,941,123 UART:
32,941,280 UART: [state] CFI Enabled
33,005,788 UART: [state] LifecycleState = Unprovisioned
33,007,721 UART: [state] DebugLocked = No
33,010,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,016,095 UART: [kat] SHA2-256
33,185,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,196,312 UART: [kat] ++
33,196,849 UART: [kat] sha1
33,208,336 UART: [kat] SHA2-256
33,211,001 UART: [kat] SHA2-384
33,216,099 UART: [kat] SHA2-512-ACC
33,218,454 UART: [kat] ECC-384
35,507,587 UART: [kat] HMAC-384Kdf
35,537,945 UART: [kat] LMS
36,728,286 UART: [kat] --
36,732,405 UART: [update-reset] ++
39,532,553 >>> mbox cmd response: failed
39,534,357 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
39,677,620 UART: ROM Non-Fatal Error: 0x000B001F
39,679,055 UART: [state] Locking Datavault
39,680,215 UART: [state] Locking PCR0, PCR1 and PCR31
39,681,752 UART: [state] Locking ICCM
39,682,657 UART: [exit] Launching FMC @ 0x40000130
39,684,081 UART:
39,684,241 UART: Running Caliptra FMC ...
39,685,360 UART:
39,685,519 UART: [state] CFI Enabled
39,686,438 UART: [art] Extend RT PCRs Done
39,687,575 UART: [art] Lock RT PCRs Done
39,688,647 UART: [art] Populate DV Done
39,689,831 UART: [fht] FMC Alias Private Key: 7
39,691,170 UART: [art] Derive CDI
39,691,912 UART: [art] Store in in slot 0x4
39,717,391 UART: [art] Derive Key Pair
39,718,390 UART: [art] Store priv key in slot 0x5
43,011,277 UART: [art] Derive Key Pair - Done
43,024,222 UART: [art] Signing Cert with AUTHO
43,025,530 UART: RITY.KEYID = 7
45,312,333 UART: [art] Erasing AUTHORITY.KEYID = 7
45,313,842 UART: [art] PUB.X = 9FA91582C4D27CF9A2C21D933DB2F30A655AA445E26C3F7AC4A0CFAF78E47F3512095CE0A94455805EFAAF8D4FC97232
45,321,121 UART: [art] PUB.Y = EB99FF687E7BC87C46F91706A6458C4DD9B905969E520E295D45A6B0300B341AEFA849B87E125C52F97E59A40C0A5D6B
45,328,389 UART: [art] SIG.R = 4BC9E469071BBE6563FC88FA798760A6ABF85526B1F6CBC77C90347D874475B07BA00DF7524CDC8D06CBFE7E706EB27E
45,335,733 UART: [art] SIG.S = E2AD044002749FE0A18E49407E0B87142995A62F7DE6C31790CDCD472EA915ED71FCFEF8ED57BF034A5919F314E65247
46,641,296 UART: Caliptra RT
46,641,997 UART: [state] CFI Enabled
46,994,122 UART: [rt] RT listening for mailbox commands...
46,996,703 UART:
46,997,069 UART: Running Caliptra ROM ...
46,998,177 UART:
46,998,339 UART: [state] CFI Enabled
47,062,647 UART: [state] LifecycleState = Unprovisioned
47,064,597 UART: [state] DebugLocked = No
47,066,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,071,167 UART: [kat] SHA2-256
47,240,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,251,353 UART: [kat] ++
47,251,812 UART: [kat] sha1
47,262,339 UART: [kat] SHA2-256
47,265,030 UART: [kat] SHA2-384
47,270,964 UART: [kat] SHA2-512-ACC
47,273,307 UART: [kat] ECC-384
49,561,931 UART: [kat] HMAC-384Kdf
49,574,976 UART: [kat] LMS
50,765,299 UART: [kat] --
50,768,603 UART: [update-reset] ++
54,908,240 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,912,771 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
55,294,735 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,810,046 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,880,144 >>> mbox cmd response: success
17,882,815 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
23,573,490 UART:
23,573,888 UART: Running Caliptra FMC ...
23,575,010 UART:
23,575,182 UART: [state] CFI Enabled
23,642,550 UART: [fht] FMC Alias Private Key: 7
25,980,159 UART: [art] Extend RT PCRs Done
25,981,409 UART: [art] Lock RT PCRs Done
25,983,097 UART: [art] Populate DV Done
25,988,589 UART: [fht] FMC Alias Private Key: 7
25,990,086 UART: [art] Derive CDI
25,990,857 UART: [art] Store in in slot 0x4
26,050,976 UART: [art] Derive Key Pair
26,052,025 UART: [art] Store priv key in slot 0x5
29,344,516 UART: [art] Derive Key Pair - Done
29,357,742 UART: [art] Signing Cert with AUTHO
29,359,048 UART: RITY.KEYID = 7
31,645,832 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,351 UART: [art] PUB.X = 058FEC7A0A21E78793B9BCC1CEAA6C59B41C4B47AF45AF4B24B5E620B67D0EA23E41EEF55D9D76FD68CCD6E47BAD1F1E
31,654,675 UART: [art] PUB.Y = 25826828408FB1FC6DA6F93A9072D104C753BACCEF68FEA5B949D9558D0ED35A73656192458928F0AE02F3292B5C2124
31,661,889 UART: [art] SIG.R = 876F401444C05FBEC38F7B96C16E022879A5CD3FE8C599D437FDC53F5E5B2CF28FE33F3A43CF1C7967A40FCCFC1484FD
31,669,248 UART: [art] SIG.S = 11481968449B050D6564C8EDBA7977EA2DC7A13F4E1559192D1D846207E6320A8D0CF30ABB224B01F97D0696DE80E1FA
32,974,310 UART: Caliptra RT
32,975,047 UART: [state] CFI Enabled
33,134,424 UART: [rt] RT listening for mailbox commands...
39,559,730 >>> mbox cmd response: failed
39,561,546 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
39,704,963 UART:
39,705,287 UART: Running Caliptra FMC ...
39,706,352 UART:
39,706,511 UART: [state] CFI Enabled
39,707,444 UART: [art] Extend RT PCRs Done
39,708,588 UART: [art] Lock RT PCRs Done
39,709,657 UART: [art] Populate DV Done
39,710,756 UART: [fht] FMC Alias Private Key: 7
39,712,076 UART: [art] Derive CDI
39,712,815 UART: [art] Store in in slot 0x4
39,741,805 UART: [art] Derive Key Pair
39,742,806 UART: [art] Store priv key in slot 0x5
43,036,223 UART: [art] Derive Key Pair - Done
43,049,324 UART: [art] Signing Cert with AUTHO
43,050,676 UART: RITY.KEYID = 7
45,337,523 UART: [art] Erasing AUTHORITY.KEYID = 7
45,339,019 UART: [art] PUB.X = 058FEC7A0A21E78793B9BCC1CEAA6C59B41C4B47AF45AF4B24B5E620B67D0EA23E41EEF55D9D76FD68CCD6E47BAD1F1E
45,346,322 UART: [art] PUB.Y = 25826828408FB1FC6DA6F93A9072D104C753BACCEF68FEA5B949D9558D0ED35A73656192458928F0AE02F3292B5C2124
45,353,549 UART: [art] SIG.R = 876F401444C05FBEC38F7B96C16E022879A5CD3FE8C599D437FDC53F5E5B2CF28FE33F3A43CF1C7967A40FCCFC1484FD
45,360,936 UART: [art] SIG.S = 11481968449B050D6564C8EDBA7977EA2DC7A13F4E1559192D1D846207E6320A8D0CF30ABB224B01F97D0696DE80E1FA
46,666,309 UART: Caliptra RT
46,667,034 UART: [state] CFI Enabled
46,999,332 UART: [rt] RT listening for mailbox commands...
55,593,370 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,598 UART:
192,944 UART: Running Caliptra ROM ...
194,138 UART:
603,936 UART: [state] CFI Enabled
617,488 UART: [state] LifecycleState = Unprovisioned
619,412 UART: [state] DebugLocked = No
621,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,321 UART: [kat] SHA2-256
795,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,630 UART: [kat] ++
806,080 UART: [kat] sha1
817,977 UART: [kat] SHA2-256
820,724 UART: [kat] SHA2-384
827,565 UART: [kat] SHA2-512-ACC
829,923 UART: [kat] ECC-384
3,112,470 UART: [kat] HMAC-384Kdf
3,124,109 UART: [kat] LMS
4,314,220 UART: [kat] --
4,319,428 UART: [cold-reset] ++
4,321,686 UART: [fht] Storing FHT @ 0x50003400
4,334,090 UART: [idev] ++
4,334,665 UART: [idev] CDI.KEYID = 6
4,335,582 UART: [idev] SUBJECT.KEYID = 7
4,336,857 UART: [idev] UDS.KEYID = 0
4,339,437 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,862 UART: [idev] Erasing UDS.KEYID = 0
7,627,004 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,839 UART: [idev] --
7,652,681 UART: [ldev] ++
7,653,252 UART: [ldev] CDI.KEYID = 6
7,654,236 UART: [ldev] SUBJECT.KEYID = 5
7,655,460 UART: [ldev] AUTHORITY.KEYID = 7
7,656,695 UART: [ldev] FE.KEYID = 1
7,665,626 UART: [ldev] Erasing FE.KEYID = 1
10,949,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,522 UART: [ldev] --
13,307,927 UART: [fwproc] Waiting for Commands...
13,311,112 UART: [fwproc] Received command 0x46574c44
13,313,299 UART: [fwproc] Received Image of size 114036 bytes
17,368,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,831,110 >>> mbox cmd response: success
17,833,455 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
17,958,244 UART: [afmc] ++
17,958,884 UART: [afmc] CDI.KEYID = 6
17,959,806 UART: [afmc] SUBJECT.KEYID = 7
17,960,915 UART: [afmc] AUTHORITY.KEYID = 5
21,151,061 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,620 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,018 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,840 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,269 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,522 UART: [afmc] --
23,515,506 UART: [cold-reset] --
23,519,586 UART: [state] Locking Datavault
23,525,808 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,536 UART: [state] Locking ICCM
23,529,362 UART: [exit] Launching FMC @ 0x40000130
23,537,768 UART:
23,538,005 UART: Running Caliptra FMC ...
23,539,113 UART:
23,539,275 UART: [state] CFI Enabled
23,547,460 UART: [fht] FMC Alias Private Key: 7
25,878,567 UART: [art] Extend RT PCRs Done
25,879,797 UART: [art] Lock RT PCRs Done
25,881,368 UART: [art] Populate DV Done
25,886,620 UART: [fht] FMC Alias Private Key: 7
25,888,210 UART: [art] Derive CDI
25,889,025 UART: [art] Store in in slot 0x4
25,931,467 UART: [art] Derive Key Pair
25,932,510 UART: [art] Store priv key in slot 0x5
29,174,684 UART: [art] Derive Key Pair - Done
29,187,594 UART: [art] Signing Cert with AUTHO
29,188,932 UART: RITY.KEYID = 7
31,468,084 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,596 UART: [art] PUB.X = E97DD1973610B0358254ACD0AEF609947AAE4F201D71089DBB08725E381EED5EB9D8DF04684166ED3FC8988F60795B27
31,476,858 UART: [art] PUB.Y = 4B67322FC75E066B1728A7F365461F17CB2BA6523E357C0609609964ABB62B49BA3C8171AB54A8DF113F64B7B08259B7
31,484,045 UART: [art] SIG.R = 75C7133561F2F09400BAFD6835E8ADD079FCB6F62E846E6741EFBF0EADEA167A9B5E5047B4713A74B0FE4C900DBA63FD
31,491,473 UART: [art] SIG.S = 7B8B54ECF9528575AD7C10095EBCDE250C5564DC1B6BB951C7D1F1B902FD2F6A6CABD606E1F75950ECFD5FFECD9BEA61
32,796,236 UART: Caliptra RT
32,796,954 UART: [state] CFI Enabled
32,913,968 UART: [rt] RT listening for mailbox commands...
32,916,548 UART:
32,916,717 UART: Running Caliptra ROM ...
32,917,830 UART:
32,918,202 UART: [state] CFI Enabled
32,935,437 UART: [state] LifecycleState = Unprovisioned
32,937,372 UART: [state] DebugLocked = No
32,940,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,944,588 UART: [kat] SHA2-256
33,114,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,124,881 UART: [kat] ++
33,125,338 UART: [kat] sha1
33,137,091 UART: [kat] SHA2-256
33,139,790 UART: [kat] SHA2-384
33,144,372 UART: [kat] SHA2-512-ACC
33,146,719 UART: [kat] ECC-384
35,430,675 UART: [kat] HMAC-384Kdf
35,443,491 UART: [kat] LMS
36,633,541 UART: [kat] --
36,637,320 UART: [update-reset] ++
39,443,545 >>> mbox cmd response: failed
39,445,409 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
39,588,689 UART: ROM Non-Fatal Error: 0x000B001F
39,590,140 UART: [state] Locking Datavault
39,591,299 UART: [state] Locking PCR0, PCR1 and PCR31
39,592,838 UART: [state] Locking ICCM
39,593,750 UART: [exit] Launching FMC @ 0x40000130
39,595,184 UART:
39,595,342 UART: Running Caliptra FMC ...
39,596,446 UART:
39,596,600 UART: [state] CFI Enabled
39,597,438 UART: [art] Extend RT PCRs Done
39,598,490 UART: [art] Lock RT PCRs Done
39,599,551 UART: [art] Populate DV Done
39,600,579 UART: [fht] FMC Alias Private Key: 7
39,601,896 UART: [art] Derive CDI
39,602,659 UART: [art] Store in in slot 0x4
39,603,830 UART: [art] Derive Key Pair
39,604,826 UART: [art] Store priv key in slot 0x5
42,805,631 UART: [art] Derive Key Pair - Done
42,818,364 UART: [art] Signing Cert with AUTHO
42,819,674 UART: RITY.KEYID = 7
45,099,324 UART: [art] Erasing AUTHORITY.KEYID = 7
45,100,843 UART: [art] PUB.X = E97DD1973610B0358254ACD0AEF609947AAE4F201D71089DBB08725E381EED5EB9D8DF04684166ED3FC8988F60795B27
45,108,061 UART: [art] PUB.Y = 4B67322FC75E066B1728A7F365461F17CB2BA6523E357C0609609964ABB62B49BA3C8171AB54A8DF113F64B7B08259B7
45,115,301 UART: [art] SIG.R = 75C7133561F2F09400BAFD6835E8ADD079FCB6F62E846E6741EFBF0EADEA167A9B5E5047B4713A74B0FE4C900DBA63FD
45,122,689 UART: [art] SIG.S = 7B8B54ECF9528575AD7C10095EBCDE250C5564DC1B6BB951C7D1F1B902FD2F6A6CABD606E1F75950ECFD5FFECD9BEA61
46,427,858 UART: Caliptra RT
46,428,582 UART: [state] CFI Enabled
46,714,985 UART: [rt] RT listening for mailbox commands...
46,717,520 UART:
46,717,698 UART: Running Caliptra ROM ...
46,718,807 UART:
46,719,129 UART: [state] CFI Enabled
46,729,182 UART: [state] LifecycleState = Unprovisioned
46,731,141 UART: [state] DebugLocked = No
46,733,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,737,738 UART: [kat] SHA2-256
46,907,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
46,917,970 UART: [kat] ++
46,918,431 UART: [kat] sha1
46,930,558 UART: [kat] SHA2-256
46,933,251 UART: [kat] SHA2-384
46,938,375 UART: [kat] SHA2-512-ACC
46,940,721 UART: [kat] ECC-384
49,225,063 UART: [kat] HMAC-384Kdf
49,238,199 UART: [kat] LMS
50,428,263 UART: [kat] --
50,431,676 UART: [update-reset] ++
54,584,589 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,587,507 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
54,969,460 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,123,621 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,081,317 >>> mbox cmd response: success
18,083,953 <<< Executing mbox cmd 0x46574c44 (99312 bytes) from SoC
23,715,583 UART:
23,715,980 UART: Running Caliptra FMC ...
23,717,080 UART:
23,717,264 UART: [state] CFI Enabled
23,725,223 UART: [fht] FMC Alias Private Key: 7
26,055,862 UART: [art] Extend RT PCRs Done
26,057,093 UART: [art] Lock RT PCRs Done
26,058,997 UART: [art] Populate DV Done
26,064,048 UART: [fht] FMC Alias Private Key: 7
26,065,702 UART: [art] Derive CDI
26,066,522 UART: [art] Store in in slot 0x4
26,109,361 UART: [art] Derive Key Pair
26,110,407 UART: [art] Store priv key in slot 0x5
29,352,572 UART: [art] Derive Key Pair - Done
29,365,571 UART: [art] Signing Cert with AUTHO
29,366,908 UART: RITY.KEYID = 7
31,646,560 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,075 UART: [art] PUB.X = E474E1948BAE3C888E22BFBAAFBDD5C463EDD1B40A679F7E68A350FDF620C146297A6F87BF61829F884960EA16ADE832
31,655,339 UART: [art] PUB.Y = 8C53D81D91883CBC40A07FE007E439DBA999EA602EA8C2C13745677A7E4C9F3D0D49CDE8C8DE9031E9D12E1B2F2B043A
31,662,558 UART: [art] SIG.R = B0DCAFC675560AF2184F5380526F3C37B5B9A7A393D700D9EBB00FBFB7B38DB96EB9C6F761C7593220EA89EA58062513
31,669,971 UART: [art] SIG.S = A1AEA0A92F22FF251C96032EA3271EF8E0E208E8F8CBE3906AD20B96E121BF27823E179DE21B96474646AAE341AEA9FA
32,974,821 UART: Caliptra RT
32,975,537 UART: [state] CFI Enabled
33,093,212 UART: [rt] RT listening for mailbox commands...
39,443,251 >>> mbox cmd response: failed
39,445,106 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
39,588,315 UART:
39,588,656 UART: Running Caliptra FMC ...
39,589,710 UART:
39,589,859 UART: [state] CFI Enabled
39,590,791 UART: [art] Extend RT PCRs Done
39,591,942 UART: [art] Lock RT PCRs Done
39,592,927 UART: [art] Populate DV Done
39,593,951 UART: [fht] FMC Alias Private Key: 7
39,595,275 UART: [art] Derive CDI
39,596,050 UART: [art] Store in in slot 0x4
39,597,246 UART: [art] Derive Key Pair
39,598,164 UART: [art] Store priv key in slot 0x5
42,798,633 UART: [art] Derive Key Pair - Done
42,811,581 UART: [art] Signing Cert with AUTHO
42,812,884 UART: RITY.KEYID = 7
45,091,946 UART: [art] Erasing AUTHORITY.KEYID = 7
45,093,457 UART: [art] PUB.X = E474E1948BAE3C888E22BFBAAFBDD5C463EDD1B40A679F7E68A350FDF620C146297A6F87BF61829F884960EA16ADE832
45,100,760 UART: [art] PUB.Y = 8C53D81D91883CBC40A07FE007E439DBA999EA602EA8C2C13745677A7E4C9F3D0D49CDE8C8DE9031E9D12E1B2F2B043A
45,108,006 UART: [art] SIG.R = B0DCAFC675560AF2184F5380526F3C37B5B9A7A393D700D9EBB00FBFB7B38DB96EB9C6F761C7593220EA89EA58062513
45,115,327 UART: [art] SIG.S = A1AEA0A92F22FF251C96032EA3271EF8E0E208E8F8CBE3906AD20B96E121BF27823E179DE21B96474646AAE341AEA9FA
46,420,784 UART: Caliptra RT
46,421,502 UART: [state] CFI Enabled
46,708,088 UART: [rt] RT listening for mailbox commands...
55,232,959 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,196 UART:
192,557 UART: Running Caliptra ROM ...
193,637 UART:
193,779 UART: [state] CFI Enabled
258,734 UART: [state] LifecycleState = Unprovisioned
260,623 UART: [state] DebugLocked = No
262,951 UART: [state] WD Timer not started. Device not locked for debugging
266,349 UART: [kat] SHA2-256
445,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,003 UART: [kat] ++
457,517 UART: [kat] sha1
467,481 UART: [kat] SHA2-256
470,498 UART: [kat] SHA2-384
477,418 UART: [kat] SHA2-512-ACC
480,358 UART: [kat] ECC-384
2,943,879 UART: [kat] HMAC-384Kdf
2,968,100 UART: [kat] LMS
3,497,567 UART: [kat] --
3,499,832 UART: [cold-reset] ++
3,501,770 UART: [fht] FHT @ 0x50003400
3,512,966 UART: [idev] ++
3,513,538 UART: [idev] CDI.KEYID = 6
3,514,445 UART: [idev] SUBJECT.KEYID = 7
3,515,657 UART: [idev] UDS.KEYID = 0
3,518,040 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,067 UART: [idev] Erasing UDS.KEYID = 0
6,022,908 UART: [idev] Sha1 KeyId Algorithm
6,046,739 UART: [idev] --
6,049,657 UART: [ldev] ++
6,050,250 UART: [ldev] CDI.KEYID = 6
6,051,160 UART: [ldev] SUBJECT.KEYID = 5
6,052,321 UART: [ldev] AUTHORITY.KEYID = 7
6,053,554 UART: [ldev] FE.KEYID = 1
6,097,210 UART: [ldev] Erasing FE.KEYID = 1
8,598,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,359 UART: [ldev] --
10,412,602 UART: [fwproc] Wait for Commands...
10,415,022 UART: [fwproc] Recv command 0x46574c44
10,417,124 UART: [fwproc] Recv'd Img size: 114360 bytes
13,821,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,280,729 >>> mbox cmd response: success
14,282,217 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
14,407,731 UART: [afmc] ++
14,408,362 UART: [afmc] CDI.KEYID = 6
14,409,258 UART: [afmc] SUBJECT.KEYID = 7
14,410,308 UART: [afmc] AUTHORITY.KEYID = 5
16,823,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,623 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,611 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,818 UART: [afmc] --
18,625,497 UART: [cold-reset] --
18,629,417 UART: [state] Locking Datavault
18,635,111 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,811 UART: [state] Locking ICCM
18,639,174 UART: [exit] Launching FMC @ 0x40000130
18,647,621 UART:
18,647,856 UART: Running Caliptra FMC ...
18,648,956 UART:
18,649,119 UART: [state] CFI Enabled
18,709,122 UART: [fht] FMC Alias Private Key: 7
20,473,826 UART: [art] Extend RT PCRs Done
20,475,063 UART: [art] Lock RT PCRs Done
20,476,613 UART: [art] Populate DV Done
20,482,298 UART: [fht] FMC Alias Private Key: 7
20,483,997 UART: [art] Derive CDI
20,484,810 UART: [art] Store in in slot 0x4
20,542,211 UART: [art] Derive Key Pair
20,543,245 UART: [art] Store priv key in slot 0x5
23,006,021 UART: [art] Derive Key Pair - Done
23,018,964 UART: [art] Signing Cert with AUTHO
23,020,298 UART: RITY.KEYID = 7
24,732,449 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,964 UART: [art] PUB.X = 06E808AB099D9CC445BC13D95CBAF4FEC0DF7A908C6173A46D4392787AF393E25155B0BCC735DBEA9DA102A3C9F41725
24,741,260 UART: [art] PUB.Y = 9585E6284A778161DB9C0EE549B451C115E0B9D9D3F5C740537C3DEFFF3FB5911CB81DC5B3EEC0F62659344B4876FA32
24,748,521 UART: [art] SIG.R = E5B40358A68AB5138B43FF73C495EB7CDA6A7FC0DCD14009E86AAF42095E39E38959E833EFB7252F728897155130660E
24,755,885 UART: [art] SIG.S = 1B86BF6AF2697C6BA479F032671E8D7CA9FDA3B3BA4F49F4FABDC36A4A24B43ACC09E91404DA0C3FCE29B1B498887E09
25,735,068 UART: Caliptra RT
25,735,786 UART: [state] CFI Enabled
25,901,247 UART: [rt] RT listening for mailbox commands...
25,904,318 UART:
25,904,576 UART: Running Caliptra ROM ...
25,905,685 UART:
25,905,846 UART: [state] CFI Enabled
25,966,936 UART: [state] LifecycleState = Unprovisioned
25,968,791 UART: [state] DebugLocked = No
25,970,926 UART: [state] WD Timer not started. Device not locked for debugging
25,975,308 UART: [kat] SHA2-256
26,154,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,166,024 UART: [kat] ++
26,166,572 UART: [kat] sha1
26,176,977 UART: [kat] SHA2-256
26,179,998 UART: [kat] SHA2-384
26,187,764 UART: [kat] SHA2-512-ACC
26,190,756 UART: [kat] ECC-384
28,653,740 UART: [kat] HMAC-384Kdf
28,675,467 UART: [kat] LMS
29,204,874 UART: [kat] --
29,210,491 UART: [update-reset] ++
31,296,013 >>> mbox cmd response: failed
31,297,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
31,441,674 UART: ROM Non-Fatal Error: 0x000B001F
31,443,110 UART: [state] Locking Datavault
31,444,269 UART: [state] Locking PCR0, PCR1 and PCR31
31,445,810 UART: [state] Locking ICCM
31,446,715 UART: [exit] Launching FMC @ 0x40000130
31,448,138 UART:
31,448,301 UART: Running Caliptra FMC ...
31,449,402 UART:
31,449,555 UART: [state] CFI Enabled
31,450,473 UART: [art] Extend RT PCRs Done
31,451,607 UART: [art] Lock RT PCRs Done
31,452,672 UART: [art] Populate DV Done
31,453,645 UART: [fht] FMC Alias Private Key: 7
31,454,959 UART: [art] Derive CDI
31,455,694 UART: [art] Store in in slot 0x4
31,487,104 UART: [art] Derive Key Pair
31,488,123 UART: [art] Store priv key in slot 0x5
33,950,925 UART: [art] Derive Key Pair - Done
33,963,820 UART: [art] Signing Cert with AUTHO
33,965,132 UART: RITY.KEYID = 7
35,676,402 UART: [art] Erasing AUTHORITY.KEYID = 7
35,677,904 UART: [art] PUB.X = 06E808AB099D9CC445BC13D95CBAF4FEC0DF7A908C6173A46D4392787AF393E25155B0BCC735DBEA9DA102A3C9F41725
35,685,184 UART: [art] PUB.Y = 9585E6284A778161DB9C0EE549B451C115E0B9D9D3F5C740537C3DEFFF3FB5911CB81DC5B3EEC0F62659344B4876FA32
35,692,468 UART: [art] SIG.R = E5B40358A68AB5138B43FF73C495EB7CDA6A7FC0DCD14009E86AAF42095E39E38959E833EFB7252F728897155130660E
35,699,839 UART: [art] SIG.S = 1B86BF6AF2697C6BA479F032671E8D7CA9FDA3B3BA4F49F4FABDC36A4A24B43ACC09E91404DA0C3FCE29B1B498887E09
36,679,543 UART: Caliptra RT
36,680,251 UART: [state] CFI Enabled
37,020,315 UART: [rt] RT listening for mailbox commands...
37,022,741 UART:
37,022,906 UART: Running Caliptra ROM ...
37,023,928 UART:
37,024,079 UART: [state] CFI Enabled
37,083,441 UART: [state] LifecycleState = Unprovisioned
37,085,285 UART: [state] DebugLocked = No
37,087,590 UART: [state] WD Timer not started. Device not locked for debugging
37,091,817 UART: [kat] SHA2-256
37,270,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
37,282,500 UART: [kat] ++
37,283,040 UART: [kat] sha1
37,294,857 UART: [kat] SHA2-256
37,297,931 UART: [kat] SHA2-384
37,304,233 UART: [kat] SHA2-512-ACC
37,307,168 UART: [kat] ECC-384
39,765,338 UART: [kat] HMAC-384Kdf
39,789,940 UART: [kat] LMS
40,319,439 UART: [kat] --
40,323,667 UART: [update-reset] ++
43,761,579 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,764,871 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
44,147,883 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,228 UART:
192,583 UART: Running Caliptra ROM ...
193,773 UART:
193,936 UART: [state] CFI Enabled
260,804 UART: [state] LifecycleState = Unprovisioned
263,166 UART: [state] DebugLocked = No
265,088 UART: [state] WD Timer not started. Device not locked for debugging
269,802 UART: [kat] SHA2-256
459,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,472 UART: [kat] ++
470,951 UART: [kat] sha1
482,641 UART: [kat] SHA2-256
485,652 UART: [kat] SHA2-384
492,186 UART: [kat] SHA2-512-ACC
494,807 UART: [kat] ECC-384
2,947,613 UART: [kat] HMAC-384Kdf
2,967,485 UART: [kat] LMS
3,499,244 UART: [kat] --
3,503,260 UART: [cold-reset] ++
3,504,849 UART: [fht] FHT @ 0x50003400
3,518,053 UART: [idev] ++
3,518,744 UART: [idev] CDI.KEYID = 6
3,519,766 UART: [idev] SUBJECT.KEYID = 7
3,520,927 UART: [idev] UDS.KEYID = 0
3,523,451 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,503 UART: [idev] Erasing UDS.KEYID = 0
6,025,221 UART: [idev] Sha1 KeyId Algorithm
6,047,765 UART: [idev] --
6,053,010 UART: [ldev] ++
6,053,705 UART: [ldev] CDI.KEYID = 6
6,054,620 UART: [ldev] SUBJECT.KEYID = 5
6,055,787 UART: [ldev] AUTHORITY.KEYID = 7
6,056,989 UART: [ldev] FE.KEYID = 1
6,097,359 UART: [ldev] Erasing FE.KEYID = 1
8,599,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,914 UART: [ldev] --
10,412,259 UART: [fwproc] Wait for Commands...
10,414,743 UART: [fwproc] Recv command 0x46574c44
10,417,059 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,593,671 >>> mbox cmd response: success
14,595,964 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
14,721,564 UART: [afmc] ++
14,722,211 UART: [afmc] CDI.KEYID = 6
14,723,297 UART: [afmc] SUBJECT.KEYID = 7
14,724,402 UART: [afmc] AUTHORITY.KEYID = 5
17,148,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,867,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,869,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,884,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,899,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,914,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,938,735 UART: [afmc] --
18,942,867 UART: [cold-reset] --
18,947,418 UART: [state] Locking Datavault
18,953,279 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,472 UART: [state] Locking ICCM
18,957,527 UART: [exit] Launching FMC @ 0x40000130
18,966,216 UART:
18,966,454 UART: Running Caliptra FMC ...
18,967,558 UART:
18,967,720 UART: [state] CFI Enabled
19,028,543 UART: [fht] FMC Alias Private Key: 7
20,792,828 UART: [art] Extend RT PCRs Done
20,794,052 UART: [art] Lock RT PCRs Done
20,795,705 UART: [art] Populate DV Done
20,801,173 UART: [fht] FMC Alias Private Key: 7
20,802,764 UART: [art] Derive CDI
20,803,579 UART: [art] Store in in slot 0x4
20,861,781 UART: [art] Derive Key Pair
20,862,779 UART: [art] Store priv key in slot 0x5
23,325,832 UART: [art] Derive Key Pair - Done
23,338,562 UART: [art] Signing Cert with AUTHO
23,339,872 UART: RITY.KEYID = 7
25,051,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,239 UART: [art] PUB.X = B09707DEB0019EAD408468290725CD12227E4D2DD447EBC027C37B5DD476741EC5D1EA40004CBC1DBC42B32463C7D674
25,060,479 UART: [art] PUB.Y = 6FE88FEBF8042E5D35EEF653D537BFDF213F9610D2DD91D77848E0B864558554633347B59FA8DE454693990616F4CBAB
25,067,765 UART: [art] SIG.R = 0418735D24C976F22802004D79F9E4D28C0AEF0B6A749121F6B909E037C5B8A7F27F6EF9B53BF57C74890AC7BFBEA829
25,075,107 UART: [art] SIG.S = 638E14655C5E012D20092F39EA1C374FD9C2F68619AA2A18F0909EDB582C2F376398FAB0E644EBD1E83B8D3E64C186E7
26,053,814 UART: Caliptra RT
26,054,516 UART: [state] CFI Enabled
26,220,020 UART: [rt] RT listening for mailbox commands...
26,222,739 UART:
26,222,996 UART: Running Caliptra ROM ...
26,224,318 UART:
26,224,491 UART: [state] CFI Enabled
26,283,808 UART: [state] LifecycleState = Unprovisioned
26,285,806 UART: [state] DebugLocked = No
26,287,290 UART: [state] WD Timer not started. Device not locked for debugging
26,291,683 UART: [kat] SHA2-256
26,481,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,492,324 UART: [kat] ++
26,492,808 UART: [kat] sha1
26,503,315 UART: [kat] SHA2-256
26,506,335 UART: [kat] SHA2-384
26,512,968 UART: [kat] SHA2-512-ACC
26,515,532 UART: [kat] ECC-384
28,970,547 UART: [kat] HMAC-384Kdf
28,993,318 UART: [kat] LMS
29,524,902 UART: [kat] --
29,527,646 UART: [update-reset] ++
31,631,030 >>> mbox cmd response: failed
31,632,811 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
31,776,772 UART: ROM Non-Fatal Error: 0x000B001F
31,778,207 UART: [state] Locking Datavault
31,779,368 UART: [state] Locking PCR0, PCR1 and PCR31
31,780,928 UART: [state] Locking ICCM
31,781,836 UART: [exit] Launching FMC @ 0x40000130
31,783,268 UART:
31,783,429 UART: Running Caliptra FMC ...
31,784,526 UART:
31,784,683 UART: [state] CFI Enabled
31,785,601 UART: [art] Extend RT PCRs Done
31,786,737 UART: [art] Lock RT PCRs Done
31,787,801 UART: [art] Populate DV Done
31,788,834 UART: [fht] FMC Alias Private Key: 7
31,790,148 UART: [art] Derive CDI
31,790,881 UART: [art] Store in in slot 0x4
31,825,674 UART: [art] Derive Key Pair
31,826,720 UART: [art] Store priv key in slot 0x5
34,289,593 UART: [art] Derive Key Pair - Done
34,302,769 UART: [art] Signing Cert with AUTHO
34,304,292 UART: RITY.KEYID = 7
36,016,445 UART: [art] Erasing AUTHORITY.KEYID = 7
36,017,961 UART: [art] PUB.X = B09707DEB0019EAD408468290725CD12227E4D2DD447EBC027C37B5DD476741EC5D1EA40004CBC1DBC42B32463C7D674
36,025,259 UART: [art] PUB.Y = 6FE88FEBF8042E5D35EEF653D537BFDF213F9610D2DD91D77848E0B864558554633347B59FA8DE454693990616F4CBAB
36,032,462 UART: [art] SIG.R = 0418735D24C976F22802004D79F9E4D28C0AEF0B6A749121F6B909E037C5B8A7F27F6EF9B53BF57C74890AC7BFBEA829
36,039,809 UART: [art] SIG.S = 638E14655C5E012D20092F39EA1C374FD9C2F68619AA2A18F0909EDB582C2F376398FAB0E644EBD1E83B8D3E64C186E7
37,018,419 UART: Caliptra RT
37,019,141 UART: [state] CFI Enabled
37,355,877 UART: [rt] RT listening for mailbox commands...
37,358,573 UART:
37,358,828 UART: Running Caliptra ROM ...
37,359,935 UART:
37,360,088 UART: [state] CFI Enabled
37,420,522 UART: [state] LifecycleState = Unprovisioned
37,422,575 UART: [state] DebugLocked = No
37,423,875 UART: [state] WD Timer not started. Device not locked for debugging
37,428,461 UART: [kat] SHA2-256
37,618,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,629,123 UART: [kat] ++
37,629,611 UART: [kat] sha1
37,641,196 UART: [kat] SHA2-256
37,644,221 UART: [kat] SHA2-384
37,649,779 UART: [kat] SHA2-512-ACC
37,652,351 UART: [kat] ECC-384
40,104,400 UART: [kat] HMAC-384Kdf
40,129,424 UART: [kat] LMS
40,660,980 UART: [kat] --
40,665,457 UART: [update-reset] ++
44,122,585 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,126,394 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
44,734,135 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,442,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,738,156 >>> mbox cmd response: success
14,740,764 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
19,026,470 UART:
19,026,862 UART: Running Caliptra FMC ...
19,027,995 UART:
19,028,159 UART: [state] CFI Enabled
19,097,053 UART: [fht] FMC Alias Private Key: 7
20,860,638 UART: [art] Extend RT PCRs Done
20,861,846 UART: [art] Lock RT PCRs Done
20,863,413 UART: [art] Populate DV Done
20,868,879 UART: [fht] FMC Alias Private Key: 7
20,870,557 UART: [art] Derive CDI
20,871,383 UART: [art] Store in in slot 0x4
20,928,955 UART: [art] Derive Key Pair
20,929,995 UART: [art] Store priv key in slot 0x5
23,392,988 UART: [art] Derive Key Pair - Done
23,406,049 UART: [art] Signing Cert with AUTHO
23,407,364 UART: RITY.KEYID = 7
25,118,784 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,283 UART: [art] PUB.X = 100D2499DAC17A6C2F44D324B8BBB3BF6576C20D17FFD5F322224E888DC6CF66436464DD242F2898D231EC7977DC5D45
25,127,565 UART: [art] PUB.Y = D54895EDA5102191D3EFC20E7E69D3721EBF845B4CD4FD560D393674236FD28ACCC1A97F87FCE0BD9DC07DE7374971EE
25,134,797 UART: [art] SIG.R = 1DCC443E262C48A60CCBEEC522512D255929F2BEBC3AAF1A1B2DECDAF05D8B7A894F3667965C63EB609078A6A06DA363
25,142,274 UART: [art] SIG.S = 924AB4B6A67CF2E1EF6BF1DC8AB72826AEA34EAD8ADA995C8057CB87C93E4A3A130F29CAD4EE2F169E4A5A28F67C10F6
26,121,009 UART: Caliptra RT
26,121,729 UART: [state] CFI Enabled
26,285,750 UART: [rt] RT listening for mailbox commands...
31,622,149 >>> mbox cmd response: failed
31,624,029 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
31,767,813 UART:
31,768,126 UART: Running Caliptra FMC ...
31,769,248 UART:
31,769,414 UART: [state] CFI Enabled
31,770,337 UART: [art] Extend RT PCRs Done
31,771,471 UART: [art] Lock RT PCRs Done
31,772,532 UART: [art] Populate DV Done
31,773,634 UART: [fht] FMC Alias Private Key: 7
31,774,952 UART: [art] Derive CDI
31,775,688 UART: [art] Store in in slot 0x4
31,808,248 UART: [art] Derive Key Pair
31,809,292 UART: [art] Store priv key in slot 0x5
34,271,978 UART: [art] Derive Key Pair - Done
34,284,924 UART: [art] Signing Cert with AUTHO
34,286,224 UART: RITY.KEYID = 7
35,997,410 UART: [art] Erasing AUTHORITY.KEYID = 7
35,998,912 UART: [art] PUB.X = 100D2499DAC17A6C2F44D324B8BBB3BF6576C20D17FFD5F322224E888DC6CF66436464DD242F2898D231EC7977DC5D45
36,006,150 UART: [art] PUB.Y = D54895EDA5102191D3EFC20E7E69D3721EBF845B4CD4FD560D393674236FD28ACCC1A97F87FCE0BD9DC07DE7374971EE
36,013,439 UART: [art] SIG.R = 1DCC443E262C48A60CCBEEC522512D255929F2BEBC3AAF1A1B2DECDAF05D8B7A894F3667965C63EB609078A6A06DA363
36,020,857 UART: [art] SIG.S = 924AB4B6A67CF2E1EF6BF1DC8AB72826AEA34EAD8ADA995C8057CB87C93E4A3A130F29CAD4EE2F169E4A5A28F67C10F6
36,999,759 UART: Caliptra RT
37,000,474 UART: [state] CFI Enabled
37,340,203 UART: [rt] RT listening for mailbox commands...
45,019,597 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,466 UART:
192,845 UART: Running Caliptra ROM ...
194,029 UART:
603,745 UART: [state] CFI Enabled
621,196 UART: [state] LifecycleState = Unprovisioned
623,572 UART: [state] DebugLocked = No
625,703 UART: [state] WD Timer not started. Device not locked for debugging
630,604 UART: [kat] SHA2-256
820,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,260 UART: [kat] ++
831,799 UART: [kat] sha1
843,552 UART: [kat] SHA2-256
846,582 UART: [kat] SHA2-384
852,622 UART: [kat] SHA2-512-ACC
855,235 UART: [kat] ECC-384
3,295,544 UART: [kat] HMAC-384Kdf
3,308,601 UART: [kat] LMS
3,840,451 UART: [kat] --
3,844,867 UART: [cold-reset] ++
3,846,562 UART: [fht] FHT @ 0x50003400
3,859,344 UART: [idev] ++
3,860,020 UART: [idev] CDI.KEYID = 6
3,860,963 UART: [idev] SUBJECT.KEYID = 7
3,862,177 UART: [idev] UDS.KEYID = 0
3,864,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,996 UART: [idev] Erasing UDS.KEYID = 0
6,336,395 UART: [idev] Sha1 KeyId Algorithm
6,360,069 UART: [idev] --
6,363,820 UART: [ldev] ++
6,364,503 UART: [ldev] CDI.KEYID = 6
6,365,443 UART: [ldev] SUBJECT.KEYID = 5
6,366,604 UART: [ldev] AUTHORITY.KEYID = 7
6,367,835 UART: [ldev] FE.KEYID = 1
6,379,750 UART: [ldev] Erasing FE.KEYID = 1
8,858,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,851 UART: [ldev] --
10,652,264 UART: [fwproc] Wait for Commands...
10,655,337 UART: [fwproc] Recv command 0x46574c44
10,657,592 UART: [fwproc] Recv'd Img size: 114360 bytes
14,110,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,848,901 >>> mbox cmd response: success
14,851,178 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
14,976,540 UART: [afmc] ++
14,977,176 UART: [afmc] CDI.KEYID = 6
14,978,099 UART: [afmc] SUBJECT.KEYID = 7
14,979,211 UART: [afmc] AUTHORITY.KEYID = 5
17,356,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,462 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,687 UART: [afmc] --
19,152,878 UART: [cold-reset] --
19,157,468 UART: [state] Locking Datavault
19,164,126 UART: [state] Locking PCR0, PCR1 and PCR31
19,166,257 UART: [state] Locking ICCM
19,167,705 UART: [exit] Launching FMC @ 0x40000130
19,176,366 UART:
19,176,620 UART: Running Caliptra FMC ...
19,177,722 UART:
19,177,879 UART: [state] CFI Enabled
19,185,657 UART: [fht] FMC Alias Private Key: 7
20,943,315 UART: [art] Extend RT PCRs Done
20,944,530 UART: [art] Lock RT PCRs Done
20,946,315 UART: [art] Populate DV Done
20,951,672 UART: [fht] FMC Alias Private Key: 7
20,953,263 UART: [art] Derive CDI
20,954,080 UART: [art] Store in in slot 0x4
20,996,625 UART: [art] Derive Key Pair
20,997,673 UART: [art] Store priv key in slot 0x5
23,424,401 UART: [art] Derive Key Pair - Done
23,437,728 UART: [art] Signing Cert with AUTHO
23,439,035 UART: RITY.KEYID = 7
25,144,640 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,145 UART: [art] PUB.X = FA1E0A449C20F79C3E1B108CB83CC9BCAFC4049F3E20083D8E5EB690357511384C1C96FC7DAC400AB1B4B597A4217364
25,153,438 UART: [art] PUB.Y = 9E13A9092CF9CA3D04E5CDDD3926865287FDFAA366106D703FB425A253E80519296CF74E79FE8DD788C0DF24A636E731
25,160,655 UART: [art] SIG.R = 312D42210DB30740124D250509F99AD986050D5DCC8F1A60E56AE1B97B9A9726E10FA916DB9341BEF07AC7B7858F3527
25,168,051 UART: [art] SIG.S = 2392623DDF6EA966F552629BB1CEBC48A8F84A144B0B2A53A20701CAB88B9296A4AE71BA28D3B4E416FD025968DA19BF
26,146,765 UART: Caliptra RT
26,147,450 UART: [state] CFI Enabled
26,265,145 UART: [rt] RT listening for mailbox commands...
26,268,063 UART:
26,268,321 UART: Running Caliptra ROM ...
26,269,344 UART:
26,269,654 UART: [state] CFI Enabled
26,281,096 UART: [state] LifecycleState = Unprovisioned
26,282,921 UART: [state] DebugLocked = No
26,284,921 UART: [state] WD Timer not started. Device not locked for debugging
26,290,050 UART: [kat] SHA2-256
26,479,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,490,714 UART: [kat] ++
26,491,171 UART: [kat] sha1
26,503,515 UART: [kat] SHA2-256
26,506,540 UART: [kat] SHA2-384
26,513,342 UART: [kat] SHA2-512-ACC
26,515,914 UART: [kat] ECC-384
28,958,124 UART: [kat] HMAC-384Kdf
28,971,905 UART: [kat] LMS
29,503,519 UART: [kat] --
29,507,777 UART: [update-reset] ++
31,614,672 >>> mbox cmd response: failed
31,616,548 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
31,760,102 UART: ROM Non-Fatal Error: 0x000B001F
31,761,521 UART: [state] Locking Datavault
31,762,592 UART: [state] Locking PCR0, PCR1 and PCR31
31,764,298 UART: [state] Locking ICCM
31,765,206 UART: [exit] Launching FMC @ 0x40000130
31,766,646 UART:
31,766,802 UART: Running Caliptra FMC ...
31,767,904 UART:
31,768,058 UART: [state] CFI Enabled
31,768,891 UART: [art] Extend RT PCRs Done
31,769,937 UART: [art] Lock RT PCRs Done
31,771,002 UART: [art] Populate DV Done
31,771,957 UART: [fht] FMC Alias Private Key: 7
31,773,192 UART: [art] Derive CDI
31,773,919 UART: [art] Store in in slot 0x4
31,775,108 UART: [art] Derive Key Pair
31,776,019 UART: [art] Store priv key in slot 0x5
34,161,744 UART: [art] Derive Key Pair - Done
34,174,582 UART: [art] Signing Cert with AUTHO
34,175,915 UART: RITY.KEYID = 7
35,881,732 UART: [art] Erasing AUTHORITY.KEYID = 7
35,883,228 UART: [art] PUB.X = FA1E0A449C20F79C3E1B108CB83CC9BCAFC4049F3E20083D8E5EB690357511384C1C96FC7DAC400AB1B4B597A4217364
35,890,534 UART: [art] PUB.Y = 9E13A9092CF9CA3D04E5CDDD3926865287FDFAA366106D703FB425A253E80519296CF74E79FE8DD788C0DF24A636E731
35,897,769 UART: [art] SIG.R = 312D42210DB30740124D250509F99AD986050D5DCC8F1A60E56AE1B97B9A9726E10FA916DB9341BEF07AC7B7858F3527
35,905,166 UART: [art] SIG.S = 2392623DDF6EA966F552629BB1CEBC48A8F84A144B0B2A53A20701CAB88B9296A4AE71BA28D3B4E416FD025968DA19BF
36,883,940 UART: Caliptra RT
36,884,773 UART: [state] CFI Enabled
37,177,514 UART: [rt] RT listening for mailbox commands...
37,180,415 UART:
37,180,580 UART: Running Caliptra ROM ...
37,181,683 UART:
37,182,024 UART: [state] CFI Enabled
40,314,031 UART: [state] LifecycleState = Unprovisioned
40,315,953 UART: [state] DebugLocked = No
40,318,717 UART: [state] WD Timer not started. Device not locked for debugging
40,322,839 UART: [kat] SHA2-256
40,512,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,523,465 UART: [kat] ++
40,523,977 UART: [kat] sha1
40,535,781 UART: [kat] SHA2-256
40,538,792 UART: [kat] SHA2-384
40,544,508 UART: [kat] SHA2-512-ACC
40,547,133 UART: [kat] ECC-384
42,986,373 UART: [kat] HMAC-384Kdf
42,999,959 UART: [kat] LMS
43,531,605 UART: [kat] --
43,535,171 UART: [update-reset] ++
46,993,663 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,997,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
47,604,748 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,754,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,955,835 >>> mbox cmd response: success
14,958,998 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
19,209,828 UART:
19,210,267 UART: Running Caliptra FMC ...
19,211,378 UART:
19,211,532 UART: [state] CFI Enabled
19,219,277 UART: [fht] FMC Alias Private Key: 7
20,976,409 UART: [art] Extend RT PCRs Done
20,977,633 UART: [art] Lock RT PCRs Done
20,979,022 UART: [art] Populate DV Done
20,984,663 UART: [fht] FMC Alias Private Key: 7
20,986,258 UART: [art] Derive CDI
20,987,010 UART: [art] Store in in slot 0x4
21,029,667 UART: [art] Derive Key Pair
21,030,714 UART: [art] Store priv key in slot 0x5
23,457,313 UART: [art] Derive Key Pair - Done
23,470,430 UART: [art] Signing Cert with AUTHO
23,471,770 UART: RITY.KEYID = 7
25,177,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,078 UART: [art] PUB.X = C017AE145C79C7606365E93E5531E5CD0FC2AC7BCF6295DFF7DEFF9BC92BB62AD0819DBD3CA396038AFFAA79FEF7CC55
25,186,365 UART: [art] PUB.Y = 3DA7F330FBE647217D023E78427A3E9A9476281B501D2398D31D8338A558C1D9DC4F8CD4C00535F493FB9CA9E8BCB0E8
25,193,621 UART: [art] SIG.R = 3B65D9FC9AFD7A40956EC92216E311FD24DE7D04E5BC1EE6BFF2B7827C214FD6189D547508137D5AA8842D25D6FCFDD7
25,201,008 UART: [art] SIG.S = 8ECC2D962446B11D7174F8A73DC6D48B545EA4F6BD156B682CFACA533CC115C3D92E46F55658F6D64BE7186AE764ABC8
26,179,897 UART: Caliptra RT
26,180,602 UART: [state] CFI Enabled
26,298,207 UART: [rt] RT listening for mailbox commands...
31,560,989 >>> mbox cmd response: failed
31,563,053 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
31,707,195 UART:
31,707,523 UART: Running Caliptra FMC ...
31,708,651 UART:
31,709,038 UART: [state] CFI Enabled
31,709,896 UART: [art] Extend RT PCRs Done
31,711,062 UART: [art] Lock RT PCRs Done
31,712,085 UART: [art] Populate DV Done
31,713,227 UART: [fht] FMC Alias Private Key: 7
31,714,470 UART: [art] Derive CDI
31,715,193 UART: [art] Store in in slot 0x4
31,716,361 UART: [art] Derive Key Pair
31,717,273 UART: [art] Store priv key in slot 0x5
34,101,799 UART: [art] Derive Key Pair - Done
34,114,739 UART: [art] Signing Cert with AUTHO
34,116,068 UART: RITY.KEYID = 7
35,820,951 UART: [art] Erasing AUTHORITY.KEYID = 7
35,822,456 UART: [art] PUB.X = C017AE145C79C7606365E93E5531E5CD0FC2AC7BCF6295DFF7DEFF9BC92BB62AD0819DBD3CA396038AFFAA79FEF7CC55
35,829,780 UART: [art] PUB.Y = 3DA7F330FBE647217D023E78427A3E9A9476281B501D2398D31D8338A558C1D9DC4F8CD4C00535F493FB9CA9E8BCB0E8
35,837,015 UART: [art] SIG.R = 3B65D9FC9AFD7A40956EC92216E311FD24DE7D04E5BC1EE6BFF2B7827C214FD6189D547508137D5AA8842D25D6FCFDD7
35,844,460 UART: [art] SIG.S = 8ECC2D962446B11D7174F8A73DC6D48B545EA4F6BD156B682CFACA533CC115C3D92E46F55658F6D64BE7186AE764ABC8
36,824,019 UART: Caliptra RT
36,824,705 UART: [state] CFI Enabled
37,115,674 UART: [rt] RT listening for mailbox commands...
47,910,377 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,341 UART: [kat] SHA2-256
882,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,387 UART: [kat] ++
886,539 UART: [kat] sha1
890,745 UART: [kat] SHA2-256
892,683 UART: [kat] SHA2-384
895,534 UART: [kat] SHA2-512-ACC
897,435 UART: [kat] ECC-384
903,326 UART: [kat] HMAC-384Kdf
907,946 UART: [kat] LMS
1,476,142 UART: [kat] --
1,476,953 UART: [cold-reset] ++
1,477,519 UART: [fht] Storing FHT @ 0x50003400
1,480,268 UART: [idev] ++
1,480,436 UART: [idev] CDI.KEYID = 6
1,480,796 UART: [idev] SUBJECT.KEYID = 7
1,481,220 UART: [idev] UDS.KEYID = 0
1,481,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,310 UART: [idev] Erasing UDS.KEYID = 0
1,506,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,932 UART: [idev] --
1,515,987 UART: [ldev] ++
1,516,155 UART: [ldev] CDI.KEYID = 6
1,516,518 UART: [ldev] SUBJECT.KEYID = 5
1,516,944 UART: [ldev] AUTHORITY.KEYID = 7
1,517,407 UART: [ldev] FE.KEYID = 1
1,522,725 UART: [ldev] Erasing FE.KEYID = 1
1,548,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,552 UART: [ldev] --
1,587,007 UART: [fwproc] Waiting for Commands...
1,587,692 UART: [fwproc] Received command 0x46574c44
1,588,483 UART: [fwproc] Received Image of size 114360 bytes
2,886,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,087 >>> mbox cmd response: success
3,079,087 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
3,080,149 UART: [afmc] ++
3,080,317 UART: [afmc] CDI.KEYID = 6
3,080,679 UART: [afmc] SUBJECT.KEYID = 7
3,081,104 UART: [afmc] AUTHORITY.KEYID = 5
3,115,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,955 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,348 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,038 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,057 UART: [afmc] --
3,159,165 UART: [cold-reset] --
3,159,657 UART: [state] Locking Datavault
3,160,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,570 UART: [state] Locking ICCM
3,162,230 UART: [exit] Launching FMC @ 0x40000130
3,167,559 UART:
3,167,575 UART: Running Caliptra FMC ...
3,167,983 UART:
3,168,037 UART: [state] CFI Enabled
3,178,524 UART: [fht] FMC Alias Private Key: 7
3,286,793 UART: [art] Extend RT PCRs Done
3,287,221 UART: [art] Lock RT PCRs Done
3,288,569 UART: [art] Populate DV Done
3,296,658 UART: [fht] FMC Alias Private Key: 7
3,297,774 UART: [art] Derive CDI
3,298,054 UART: [art] Store in in slot 0x4
3,383,749 UART: [art] Derive Key Pair
3,384,109 UART: [art] Store priv key in slot 0x5
3,397,341 UART: [art] Derive Key Pair - Done
3,412,212 UART: [art] Signing Cert with AUTHO
3,412,692 UART: RITY.KEYID = 7
3,427,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,223 UART: [art] PUB.X = C813C3D0EB17ABCD415335DC0A13B8FB13F00DD29EB7E3C1C1F184606210B8A78ECB1C8CE5D3FE569AA1E46F9ABC6865
3,435,009 UART: [art] PUB.Y = A9566AA5F42DD8AE64C56A54243A7CC915C43985F5F076B8CDC999EDEA4023EDBAB42DC0AA687A96A524B07C533185C4
3,441,973 UART: [art] SIG.R = 9F8420598D6826F464FB7CB425B85A23ED36D3C79C88C657608BC6108A5FC54AD78C8B2E7510450D5E12C18BDE3288FA
3,448,744 UART: [art] SIG.S = 620CE4C515C9502C0DE62951F340E2AFAEAA2B2E0B7C77D58EBED7402CE34174BA5C0684246FF6A1306EF42FA1E77D17
3,472,603 UART: Caliptra RT
3,472,857 UART: [state] CFI Enabled
3,580,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,962 UART:
3,581,978 UART: Running Caliptra ROM ...
3,582,386 UART:
3,582,440 UART: [state] CFI Enabled
3,585,234 UART: [state] LifecycleState = Unprovisioned
3,585,889 UART: [state] DebugLocked = No
3,586,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,588,076 UART: [kat] SHA2-256
4,382,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,386,122 UART: [kat] ++
4,386,274 UART: [kat] sha1
4,390,476 UART: [kat] SHA2-256
4,392,414 UART: [kat] SHA2-384
4,395,291 UART: [kat] SHA2-512-ACC
4,397,191 UART: [kat] ECC-384
4,402,744 UART: [kat] HMAC-384Kdf
4,407,242 UART: [kat] LMS
4,975,438 UART: [kat] --
4,976,273 UART: [update-reset] ++
5,087,896 >>> mbox cmd response: failed
5,087,896 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,088,114 UART: ROM Non-Fatal Error: 0x000B001F
5,089,106 UART: [state] Locking Datavault
5,090,006 UART: [state] Locking PCR0, PCR1 and PCR31
5,090,610 UART: [state] Locking ICCM
5,091,234 UART: [exit] Launching FMC @ 0x40000130
5,096,563 UART:
5,096,579 UART: Running Caliptra FMC ...
5,096,987 UART:
5,097,041 UART: [state] CFI Enabled
5,186,158 UART: [art] Extend RT PCRs Done
5,186,586 UART: [art] Lock RT PCRs Done
5,187,887 UART: [art] Populate DV Done
5,196,156 UART: [fht] FMC Alias Private Key: 7
5,197,326 UART: [art] Derive CDI
5,197,606 UART: [art] Store in in slot 0x4
5,283,431 UART: [art] Derive Key Pair
5,283,791 UART: [art] Store priv key in slot 0x5
5,296,653 UART: [art] Derive Key Pair - Done
5,311,310 UART: [art] Signing Cert with AUTHO
5,311,790 UART: RITY.KEYID = 7
5,326,830 UART: [art] Erasing AUTHORITY.KEYID = 7
5,327,595 UART: [art] PUB.X = C813C3D0EB17ABCD415335DC0A13B8FB13F00DD29EB7E3C1C1F184606210B8A78ECB1C8CE5D3FE569AA1E46F9ABC6865
5,334,381 UART: [art] PUB.Y = A9566AA5F42DD8AE64C56A54243A7CC915C43985F5F076B8CDC999EDEA4023EDBAB42DC0AA687A96A524B07C533185C4
5,341,345 UART: [art] SIG.R = 9F8420598D6826F464FB7CB425B85A23ED36D3C79C88C657608BC6108A5FC54AD78C8B2E7510450D5E12C18BDE3288FA
5,348,116 UART: [art] SIG.S = 620CE4C515C9502C0DE62951F340E2AFAEAA2B2E0B7C77D58EBED7402CE34174BA5C0684246FF6A1306EF42FA1E77D17
5,372,219 UART: Caliptra RT
5,372,473 UART: [state] CFI Enabled
5,655,088 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,656,887 UART:
5,656,903 UART: Running Caliptra ROM ...
5,657,311 UART:
5,657,365 UART: [state] CFI Enabled
5,660,193 UART: [state] LifecycleState = Unprovisioned
5,660,848 UART: [state] DebugLocked = No
5,661,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,663,257 UART: [kat] SHA2-256
6,457,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,461,303 UART: [kat] ++
6,461,455 UART: [kat] sha1
6,465,825 UART: [kat] SHA2-256
6,467,763 UART: [kat] SHA2-384
6,470,334 UART: [kat] SHA2-512-ACC
6,472,234 UART: [kat] ECC-384
6,477,697 UART: [kat] HMAC-384Kdf
6,482,371 UART: [kat] LMS
7,050,567 UART: [kat] --
7,051,154 UART: [update-reset] ++
8,385,137 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,386,405 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
8,536,323 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,641 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,297 >>> mbox cmd response: success
2,926,297 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,987,775 UART:
2,987,791 UART: Running Caliptra FMC ...
2,988,199 UART:
2,988,253 UART: [state] CFI Enabled
2,998,788 UART: [fht] FMC Alias Private Key: 7
3,107,039 UART: [art] Extend RT PCRs Done
3,107,467 UART: [art] Lock RT PCRs Done
3,109,227 UART: [art] Populate DV Done
3,117,646 UART: [fht] FMC Alias Private Key: 7
3,118,702 UART: [art] Derive CDI
3,118,982 UART: [art] Store in in slot 0x4
3,204,857 UART: [art] Derive Key Pair
3,205,217 UART: [art] Store priv key in slot 0x5
3,218,421 UART: [art] Derive Key Pair - Done
3,233,038 UART: [art] Signing Cert with AUTHO
3,233,518 UART: RITY.KEYID = 7
3,248,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,319 UART: [art] PUB.X = 01928C44DFC66B614B0EDC487C5347CF613C77124CDBC226FC6259D81F843323A7C09C8C630384AF83BC09FE44FA276E
3,256,083 UART: [art] PUB.Y = 625FEDDA42ABFEDF47B14D711040F8C79DB452B58408C8C1B2FF8374FF442BB22A4A60FC197D44570891444DAFEA9226
3,263,039 UART: [art] SIG.R = 95910D759078E75695CF3FBCD07EAE97A674ACE0A7C44DDBF76F93B2946BD1500FD530AF2DA7A124096B1979EFEBD5C6
3,269,816 UART: [art] SIG.S = 36EA6793F755228C98FCDD84EF9A24576033568980F9D42D2CC22F70701596E4F0E58ED183C49E186E4FE14D45286BF4
3,294,059 UART: Caliptra RT
3,294,313 UART: [state] CFI Enabled
3,402,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,794,467 >>> mbox cmd response: failed
4,794,467 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,800,226 UART:
4,800,242 UART: Running Caliptra FMC ...
4,800,650 UART:
4,800,704 UART: [state] CFI Enabled
4,889,551 UART: [art] Extend RT PCRs Done
4,889,979 UART: [art] Lock RT PCRs Done
4,891,326 UART: [art] Populate DV Done
4,899,717 UART: [fht] FMC Alias Private Key: 7
4,900,793 UART: [art] Derive CDI
4,901,073 UART: [art] Store in in slot 0x4
4,986,674 UART: [art] Derive Key Pair
4,987,034 UART: [art] Store priv key in slot 0x5
4,999,878 UART: [art] Derive Key Pair - Done
5,014,421 UART: [art] Signing Cert with AUTHO
5,014,901 UART: RITY.KEYID = 7
5,029,763 UART: [art] Erasing AUTHORITY.KEYID = 7
5,030,528 UART: [art] PUB.X = 01928C44DFC66B614B0EDC487C5347CF613C77124CDBC226FC6259D81F843323A7C09C8C630384AF83BC09FE44FA276E
5,037,292 UART: [art] PUB.Y = 625FEDDA42ABFEDF47B14D711040F8C79DB452B58408C8C1B2FF8374FF442BB22A4A60FC197D44570891444DAFEA9226
5,044,248 UART: [art] SIG.R = 95910D759078E75695CF3FBCD07EAE97A674ACE0A7C44DDBF76F93B2946BD1500FD530AF2DA7A124096B1979EFEBD5C6
5,051,025 UART: [art] SIG.S = 36EA6793F755228C98FCDD84EF9A24576033568980F9D42D2CC22F70701596E4F0E58ED183C49E186E4FE14D45286BF4
5,074,972 UART: Caliptra RT
5,075,226 UART: [state] CFI Enabled
5,361,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,125,676 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,697 UART: [kat] SHA2-512-ACC
897,598 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,849 UART: [kat] LMS
1,476,045 UART: [kat] --
1,476,722 UART: [cold-reset] ++
1,477,072 UART: [fht] Storing FHT @ 0x50003400
1,479,727 UART: [idev] ++
1,479,895 UART: [idev] CDI.KEYID = 6
1,480,255 UART: [idev] SUBJECT.KEYID = 7
1,480,679 UART: [idev] UDS.KEYID = 0
1,481,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,505,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,551 UART: [idev] --
1,515,432 UART: [ldev] ++
1,515,600 UART: [ldev] CDI.KEYID = 6
1,515,963 UART: [ldev] SUBJECT.KEYID = 5
1,516,389 UART: [ldev] AUTHORITY.KEYID = 7
1,516,852 UART: [ldev] FE.KEYID = 1
1,521,898 UART: [ldev] Erasing FE.KEYID = 1
1,547,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,723 UART: [ldev] --
1,587,018 UART: [fwproc] Waiting for Commands...
1,587,657 UART: [fwproc] Received command 0x46574c44
1,588,448 UART: [fwproc] Received Image of size 114360 bytes
2,885,679 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,514 >>> mbox cmd response: success
3,078,514 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
3,079,686 UART: [afmc] ++
3,079,854 UART: [afmc] CDI.KEYID = 6
3,080,216 UART: [afmc] SUBJECT.KEYID = 7
3,080,641 UART: [afmc] AUTHORITY.KEYID = 5
3,115,326 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,360 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,753 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,443 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,438 UART: [afmc] --
3,158,372 UART: [cold-reset] --
3,159,256 UART: [state] Locking Datavault
3,160,435 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,039 UART: [state] Locking ICCM
3,161,547 UART: [exit] Launching FMC @ 0x40000130
3,166,876 UART:
3,166,892 UART: Running Caliptra FMC ...
3,167,300 UART:
3,167,443 UART: [state] CFI Enabled
3,177,918 UART: [fht] FMC Alias Private Key: 7
3,285,507 UART: [art] Extend RT PCRs Done
3,285,935 UART: [art] Lock RT PCRs Done
3,287,633 UART: [art] Populate DV Done
3,295,872 UART: [fht] FMC Alias Private Key: 7
3,296,958 UART: [art] Derive CDI
3,297,238 UART: [art] Store in in slot 0x4
3,382,615 UART: [art] Derive Key Pair
3,382,975 UART: [art] Store priv key in slot 0x5
3,396,019 UART: [art] Derive Key Pair - Done
3,410,588 UART: [art] Signing Cert with AUTHO
3,411,068 UART: RITY.KEYID = 7
3,426,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,205 UART: [art] PUB.X = 9843328B3689E4D64E4D94C8C1A17232D49C02E7F6BAB74B14030D8A3C845EB3D285A9C35181EA71F45BCC4F170AAF45
3,433,969 UART: [art] PUB.Y = BE8CFD8DE9095CF4906C1015DF2743F10D66B5D28B17D24C7CB9715C268D59BB2E60C44FF215F08D01AD709B7D43F88F
3,440,922 UART: [art] SIG.R = EB20C9792DD22E3A414E1C830E0B0AD82355B625642096D8C8956B892A6672A23BD8FC48B7DCCB84AD41BB7721B4A1BD
3,447,693 UART: [art] SIG.S = 73B10C7CA5FC1639D868B7EF336446FF983830E716630A33AC5F9665FF52E270021292A0A05E0815E487E2D4CA5C5519
3,471,398 UART: Caliptra RT
3,471,744 UART: [state] CFI Enabled
3,579,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,347 UART:
3,581,363 UART: Running Caliptra ROM ...
3,581,771 UART:
3,581,912 UART: [state] CFI Enabled
3,584,760 UART: [state] LifecycleState = Unprovisioned
3,585,415 UART: [state] DebugLocked = No
3,586,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,628 UART: [kat] SHA2-256
4,381,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,674 UART: [kat] ++
4,385,826 UART: [kat] sha1
4,389,958 UART: [kat] SHA2-256
4,391,896 UART: [kat] SHA2-384
4,394,529 UART: [kat] SHA2-512-ACC
4,396,429 UART: [kat] ECC-384
4,402,210 UART: [kat] HMAC-384Kdf
4,406,886 UART: [kat] LMS
4,975,082 UART: [kat] --
4,976,063 UART: [update-reset] ++
5,088,080 >>> mbox cmd response: failed
5,088,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,088,338 UART: ROM Non-Fatal Error: 0x000B001F
5,089,316 UART: [state] Locking Datavault
5,090,180 UART: [state] Locking PCR0, PCR1 and PCR31
5,090,784 UART: [state] Locking ICCM
5,091,372 UART: [exit] Launching FMC @ 0x40000130
5,096,701 UART:
5,096,717 UART: Running Caliptra FMC ...
5,097,125 UART:
5,097,268 UART: [state] CFI Enabled
5,186,539 UART: [art] Extend RT PCRs Done
5,186,967 UART: [art] Lock RT PCRs Done
5,188,334 UART: [art] Populate DV Done
5,196,487 UART: [fht] FMC Alias Private Key: 7
5,197,513 UART: [art] Derive CDI
5,197,793 UART: [art] Store in in slot 0x4
5,283,562 UART: [art] Derive Key Pair
5,283,922 UART: [art] Store priv key in slot 0x5
5,297,878 UART: [art] Derive Key Pair - Done
5,312,441 UART: [art] Signing Cert with AUTHO
5,312,921 UART: RITY.KEYID = 7
5,328,057 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,822 UART: [art] PUB.X = 9843328B3689E4D64E4D94C8C1A17232D49C02E7F6BAB74B14030D8A3C845EB3D285A9C35181EA71F45BCC4F170AAF45
5,335,586 UART: [art] PUB.Y = BE8CFD8DE9095CF4906C1015DF2743F10D66B5D28B17D24C7CB9715C268D59BB2E60C44FF215F08D01AD709B7D43F88F
5,342,539 UART: [art] SIG.R = EB20C9792DD22E3A414E1C830E0B0AD82355B625642096D8C8956B892A6672A23BD8FC48B7DCCB84AD41BB7721B4A1BD
5,349,310 UART: [art] SIG.S = 73B10C7CA5FC1639D868B7EF336446FF983830E716630A33AC5F9665FF52E270021292A0A05E0815E487E2D4CA5C5519
5,373,009 UART: Caliptra RT
5,373,355 UART: [state] CFI Enabled
5,660,666 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,662,357 UART:
5,662,373 UART: Running Caliptra ROM ...
5,662,781 UART:
5,662,922 UART: [state] CFI Enabled
5,665,870 UART: [state] LifecycleState = Unprovisioned
5,666,525 UART: [state] DebugLocked = No
5,667,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,668,830 UART: [kat] SHA2-256
6,462,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,466,876 UART: [kat] ++
6,467,028 UART: [kat] sha1
6,471,110 UART: [kat] SHA2-256
6,473,048 UART: [kat] SHA2-384
6,475,659 UART: [kat] SHA2-512-ACC
6,477,559 UART: [kat] ECC-384
6,483,048 UART: [kat] HMAC-384Kdf
6,487,600 UART: [kat] LMS
7,055,796 UART: [kat] --
7,056,703 UART: [update-reset] ++
8,392,192 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,393,464 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
8,543,382 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,878 >>> mbox cmd response: success
2,928,878 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,990,120 UART:
2,990,136 UART: Running Caliptra FMC ...
2,990,544 UART:
2,990,687 UART: [state] CFI Enabled
3,001,494 UART: [fht] FMC Alias Private Key: 7
3,108,665 UART: [art] Extend RT PCRs Done
3,109,093 UART: [art] Lock RT PCRs Done
3,110,465 UART: [art] Populate DV Done
3,118,760 UART: [fht] FMC Alias Private Key: 7
3,119,786 UART: [art] Derive CDI
3,120,066 UART: [art] Store in in slot 0x4
3,205,855 UART: [art] Derive Key Pair
3,206,215 UART: [art] Store priv key in slot 0x5
3,219,393 UART: [art] Derive Key Pair - Done
3,234,118 UART: [art] Signing Cert with AUTHO
3,234,598 UART: RITY.KEYID = 7
3,249,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,425 UART: [art] PUB.X = D69EBC7DB621B3AFA7C719B4B2C729C9D73AED181B650B88E4613070E3B40AC12A1CC06435297FCB6CF39A7BE8280986
3,257,198 UART: [art] PUB.Y = 7A91D174550DD385D98DE17DE91F72F06EFE1D3F24CF619E1347AA83DD43B25535979C955F3CD18024F0FC410617EB36
3,264,146 UART: [art] SIG.R = 7F67D4CB97CA5AF8A07616A5FDF0767F1E1094B60D8813163A4534D8A9DE2E70BB7DD80544D16F7F18D5E1141073CC33
3,270,916 UART: [art] SIG.S = 5E3D1B5B6927155F5AC31F6A3EF620FD5FBCA76A760CC6BD8C58C69D75789C94836249D881621FAF9F2D4E5C5BF5759B
3,294,526 UART: Caliptra RT
3,294,872 UART: [state] CFI Enabled
3,403,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,794,604 >>> mbox cmd response: failed
4,794,604 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,800,303 UART:
4,800,319 UART: Running Caliptra FMC ...
4,800,727 UART:
4,800,870 UART: [state] CFI Enabled
4,889,755 UART: [art] Extend RT PCRs Done
4,890,183 UART: [art] Lock RT PCRs Done
4,891,448 UART: [art] Populate DV Done
4,899,907 UART: [fht] FMC Alias Private Key: 7
4,901,017 UART: [art] Derive CDI
4,901,297 UART: [art] Store in in slot 0x4
4,986,852 UART: [art] Derive Key Pair
4,987,212 UART: [art] Store priv key in slot 0x5
5,000,214 UART: [art] Derive Key Pair - Done
5,014,967 UART: [art] Signing Cert with AUTHO
5,015,447 UART: RITY.KEYID = 7
5,030,989 UART: [art] Erasing AUTHORITY.KEYID = 7
5,031,754 UART: [art] PUB.X = D69EBC7DB621B3AFA7C719B4B2C729C9D73AED181B650B88E4613070E3B40AC12A1CC06435297FCB6CF39A7BE8280986
5,038,527 UART: [art] PUB.Y = 7A91D174550DD385D98DE17DE91F72F06EFE1D3F24CF619E1347AA83DD43B25535979C955F3CD18024F0FC410617EB36
5,045,475 UART: [art] SIG.R = 7F67D4CB97CA5AF8A07616A5FDF0767F1E1094B60D8813163A4534D8A9DE2E70BB7DD80544D16F7F18D5E1141073CC33
5,052,245 UART: [art] SIG.S = 5E3D1B5B6927155F5AC31F6A3EF620FD5FBCA76A760CC6BD8C58C69D75789C94836249D881621FAF9F2D4E5C5BF5759B
5,075,355 UART: Caliptra RT
5,075,701 UART: [state] CFI Enabled
5,356,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,119,929 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
892,916 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,041 UART: [kat] ++
897,193 UART: [kat] sha1
901,305 UART: [kat] SHA2-256
903,245 UART: [kat] SHA2-384
905,910 UART: [kat] SHA2-512-ACC
907,811 UART: [kat] ECC-384
917,588 UART: [kat] HMAC-384Kdf
922,130 UART: [kat] LMS
1,170,458 UART: [kat] --
1,171,299 UART: [cold-reset] ++
1,171,685 UART: [fht] FHT @ 0x50003400
1,174,346 UART: [idev] ++
1,174,514 UART: [idev] CDI.KEYID = 6
1,174,874 UART: [idev] SUBJECT.KEYID = 7
1,175,298 UART: [idev] UDS.KEYID = 0
1,175,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,823 UART: [idev] Sha1 KeyId Algorithm
1,208,231 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,034 UART: [ldev] AUTHORITY.KEYID = 7
1,210,497 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,310 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,266 >>> mbox cmd response: success
2,774,266 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,775,328 UART: [afmc] ++
2,775,496 UART: [afmc] CDI.KEYID = 6
2,775,858 UART: [afmc] SUBJECT.KEYID = 7
2,776,283 UART: [afmc] AUTHORITY.KEYID = 5
2,811,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,051 UART: [afmc] --
2,855,031 UART: [cold-reset] --
2,855,581 UART: [state] Locking Datavault
2,856,878 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,482 UART: [state] Locking ICCM
2,857,960 UART: [exit] Launching FMC @ 0x40000130
2,863,289 UART:
2,863,305 UART: Running Caliptra FMC ...
2,863,713 UART:
2,863,767 UART: [state] CFI Enabled
2,874,172 UART: [fht] FMC Alias Private Key: 7
2,982,401 UART: [art] Extend RT PCRs Done
2,982,829 UART: [art] Lock RT PCRs Done
2,984,215 UART: [art] Populate DV Done
2,992,398 UART: [fht] FMC Alias Private Key: 7
2,993,476 UART: [art] Derive CDI
2,993,756 UART: [art] Store in in slot 0x4
3,079,325 UART: [art] Derive Key Pair
3,079,685 UART: [art] Store priv key in slot 0x5
3,093,019 UART: [art] Derive Key Pair - Done
3,107,845 UART: [art] Signing Cert with AUTHO
3,108,325 UART: RITY.KEYID = 7
3,123,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,228 UART: [art] PUB.X = 47EF5A7375DE017354784A0E6782DA67C9F14B46F1F972C56970EE465B4F1DB1DB7080AB496546B16622EC5AE6C27951
3,130,992 UART: [art] PUB.Y = E6EA310A37FFDD2DEC3B858AA0FE75E78044FA0A1C13441681057003D5D7D96BB53F86F694519E9A8EC087AB1E49004F
3,137,918 UART: [art] SIG.R = 36A4DA294D4B64EBAA91233F395F853385499D4583FCDD2F56F331C0B092D8B8FE1D68B88FD60C4AEDFA730093A74E8F
3,144,675 UART: [art] SIG.S = F3C7D752ACE9231938BC90A9D4042E39AEDF99C8AD381244500056AA2D228A63039EAD8D8453859B2B2BE9E98079CBEB
3,168,354 UART: Caliptra RT
3,168,608 UART: [state] CFI Enabled
3,276,262 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,958 UART:
3,277,974 UART: Running Caliptra ROM ...
3,278,382 UART:
3,278,437 UART: [state] CFI Enabled
3,280,921 UART: [state] LifecycleState = Unprovisioned
3,281,576 UART: [state] DebugLocked = No
3,282,218 UART: [state] WD Timer not started. Device not locked for debugging
3,283,340 UART: [kat] SHA2-256
4,088,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,115 UART: [kat] ++
4,093,267 UART: [kat] sha1
4,097,481 UART: [kat] SHA2-256
4,099,421 UART: [kat] SHA2-384
4,102,152 UART: [kat] SHA2-512-ACC
4,104,052 UART: [kat] ECC-384
4,113,551 UART: [kat] HMAC-384Kdf
4,118,025 UART: [kat] LMS
4,366,353 UART: [kat] --
4,367,271 UART: [update-reset] ++
4,457,088 >>> mbox cmd response: failed
4,457,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,457,524 UART: ROM Non-Fatal Error: 0x000B001F
4,458,528 UART: [state] Locking Datavault
4,459,458 UART: [state] Locking PCR0, PCR1 and PCR31
4,460,062 UART: [state] Locking ICCM
4,460,706 UART: [exit] Launching FMC @ 0x40000130
4,466,035 UART:
4,466,051 UART: Running Caliptra FMC ...
4,466,459 UART:
4,466,513 UART: [state] CFI Enabled
4,555,092 UART: [art] Extend RT PCRs Done
4,555,520 UART: [art] Lock RT PCRs Done
4,556,837 UART: [art] Populate DV Done
4,565,230 UART: [fht] FMC Alias Private Key: 7
4,566,304 UART: [art] Derive CDI
4,566,584 UART: [art] Store in in slot 0x4
4,652,041 UART: [art] Derive Key Pair
4,652,401 UART: [art] Store priv key in slot 0x5
4,666,193 UART: [art] Derive Key Pair - Done
4,680,821 UART: [art] Signing Cert with AUTHO
4,681,301 UART: RITY.KEYID = 7
4,697,097 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,862 UART: [art] PUB.X = 47EF5A7375DE017354784A0E6782DA67C9F14B46F1F972C56970EE465B4F1DB1DB7080AB496546B16622EC5AE6C27951
4,704,626 UART: [art] PUB.Y = E6EA310A37FFDD2DEC3B858AA0FE75E78044FA0A1C13441681057003D5D7D96BB53F86F694519E9A8EC087AB1E49004F
4,711,552 UART: [art] SIG.R = 36A4DA294D4B64EBAA91233F395F853385499D4583FCDD2F56F331C0B092D8B8FE1D68B88FD60C4AEDFA730093A74E8F
4,718,309 UART: [art] SIG.S = F3C7D752ACE9231938BC90A9D4042E39AEDF99C8AD381244500056AA2D228A63039EAD8D8453859B2B2BE9E98079CBEB
4,742,510 UART: Caliptra RT
4,742,764 UART: [state] CFI Enabled
5,029,159 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,030,959 UART:
5,030,975 UART: Running Caliptra ROM ...
5,031,383 UART:
5,031,438 UART: [state] CFI Enabled
5,033,834 UART: [state] LifecycleState = Unprovisioned
5,034,489 UART: [state] DebugLocked = No
5,035,077 UART: [state] WD Timer not started. Device not locked for debugging
5,036,435 UART: [kat] SHA2-256
5,842,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,846,210 UART: [kat] ++
5,846,362 UART: [kat] sha1
5,850,550 UART: [kat] SHA2-256
5,852,490 UART: [kat] SHA2-384
5,855,307 UART: [kat] SHA2-512-ACC
5,857,207 UART: [kat] ECC-384
5,866,758 UART: [kat] HMAC-384Kdf
5,871,440 UART: [kat] LMS
6,119,768 UART: [kat] --
6,120,468 UART: [update-reset] ++
7,432,575 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,433,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,583,648 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,787 >>> mbox cmd response: success
2,626,787 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,688,655 UART:
2,688,671 UART: Running Caliptra FMC ...
2,689,079 UART:
2,689,133 UART: [state] CFI Enabled
2,699,680 UART: [fht] FMC Alias Private Key: 7
2,807,109 UART: [art] Extend RT PCRs Done
2,807,537 UART: [art] Lock RT PCRs Done
2,808,823 UART: [art] Populate DV Done
2,817,072 UART: [fht] FMC Alias Private Key: 7
2,818,022 UART: [art] Derive CDI
2,818,302 UART: [art] Store in in slot 0x4
2,904,037 UART: [art] Derive Key Pair
2,904,397 UART: [art] Store priv key in slot 0x5
2,917,281 UART: [art] Derive Key Pair - Done
2,931,918 UART: [art] Signing Cert with AUTHO
2,932,398 UART: RITY.KEYID = 7
2,947,542 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,307 UART: [art] PUB.X = BD6DC4132DD64E2610891C2D697AD362A4EF2986D2054EF062A93E59A8D2E75DD6899802313B996CB9CC0A0AD588FD6B
2,955,073 UART: [art] PUB.Y = 2CC28FFD4BECC218AD58B2267093AE58D5D1D196DE26BCC8574DFD0D2769FF23B994BEA218BB34E66C4F7C0021240AFF
2,962,015 UART: [art] SIG.R = FE5004B74AC8C2C06297DDC64C2F26C415D71631DB48C152C6DA4C259E61127503A635CC3FD45C7498FE880446E8FD33
2,968,780 UART: [art] SIG.S = A39340841ACAD8563311BEDE123CEF426F6C67D251F3143645BF898AE0DB10093BE9B1EE81FD8AB610F506DF25D893B5
2,992,269 UART: Caliptra RT
2,992,523 UART: [state] CFI Enabled
3,100,330 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,166,948 >>> mbox cmd response: failed
4,166,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,172,861 UART:
4,172,877 UART: Running Caliptra FMC ...
4,173,285 UART:
4,173,339 UART: [state] CFI Enabled
4,262,628 UART: [art] Extend RT PCRs Done
4,263,056 UART: [art] Lock RT PCRs Done
4,264,243 UART: [art] Populate DV Done
4,272,468 UART: [fht] FMC Alias Private Key: 7
4,273,408 UART: [art] Derive CDI
4,273,688 UART: [art] Store in in slot 0x4
4,359,799 UART: [art] Derive Key Pair
4,360,159 UART: [art] Store priv key in slot 0x5
4,373,383 UART: [art] Derive Key Pair - Done
4,387,980 UART: [art] Signing Cert with AUTHO
4,388,460 UART: RITY.KEYID = 7
4,403,442 UART: [art] Erasing AUTHORITY.KEYID = 7
4,404,207 UART: [art] PUB.X = BD6DC4132DD64E2610891C2D697AD362A4EF2986D2054EF062A93E59A8D2E75DD6899802313B996CB9CC0A0AD588FD6B
4,410,973 UART: [art] PUB.Y = 2CC28FFD4BECC218AD58B2267093AE58D5D1D196DE26BCC8574DFD0D2769FF23B994BEA218BB34E66C4F7C0021240AFF
4,417,915 UART: [art] SIG.R = FE5004B74AC8C2C06297DDC64C2F26C415D71631DB48C152C6DA4C259E61127503A635CC3FD45C7498FE880446E8FD33
4,424,680 UART: [art] SIG.S = A39340841ACAD8563311BEDE123CEF426F6C67D251F3143645BF898AE0DB10093BE9B1EE81FD8AB610F506DF25D893B5
4,448,339 UART: Caliptra RT
4,448,593 UART: [state] CFI Enabled
4,731,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,170,991 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,729 UART: [kat] LMS
1,171,057 UART: [kat] --
1,171,846 UART: [cold-reset] ++
1,172,176 UART: [fht] FHT @ 0x50003400
1,174,805 UART: [idev] ++
1,174,973 UART: [idev] CDI.KEYID = 6
1,175,333 UART: [idev] SUBJECT.KEYID = 7
1,175,757 UART: [idev] UDS.KEYID = 0
1,176,102 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,561 UART: [idev] Erasing UDS.KEYID = 0
1,199,956 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,348 UART: [ldev] ++
1,209,516 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,305 UART: [ldev] AUTHORITY.KEYID = 7
1,210,768 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,242,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,594 UART: [ldev] --
1,282,009 UART: [fwproc] Wait for Commands...
1,282,671 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,155 >>> mbox cmd response: success
2,774,155 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,775,365 UART: [afmc] ++
2,775,533 UART: [afmc] CDI.KEYID = 6
2,775,895 UART: [afmc] SUBJECT.KEYID = 7
2,776,320 UART: [afmc] AUTHORITY.KEYID = 5
2,812,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,796 UART: [afmc] --
2,855,906 UART: [cold-reset] --
2,856,846 UART: [state] Locking Datavault
2,857,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,599 UART: [state] Locking ICCM
2,859,105 UART: [exit] Launching FMC @ 0x40000130
2,864,434 UART:
2,864,450 UART: Running Caliptra FMC ...
2,864,858 UART:
2,865,001 UART: [state] CFI Enabled
2,875,734 UART: [fht] FMC Alias Private Key: 7
2,983,337 UART: [art] Extend RT PCRs Done
2,983,765 UART: [art] Lock RT PCRs Done
2,985,411 UART: [art] Populate DV Done
2,993,674 UART: [fht] FMC Alias Private Key: 7
2,994,812 UART: [art] Derive CDI
2,995,092 UART: [art] Store in in slot 0x4
3,081,133 UART: [art] Derive Key Pair
3,081,493 UART: [art] Store priv key in slot 0x5
3,094,259 UART: [art] Derive Key Pair - Done
3,108,964 UART: [art] Signing Cert with AUTHO
3,109,444 UART: RITY.KEYID = 7
3,124,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,309 UART: [art] PUB.X = 82A7896D21DCD1A6AF41211A2463B3115B952AEE12441D74A7A4CD4087172F26B6EEE7B9E50D4B32CC3C63DDA6D9EDD0
3,132,090 UART: [art] PUB.Y = B9CAC77D7FA9282BB0DA902DB80D210C6734AF4AFFBD8C0DA9C6C6D165F7D492A2E38EB0B23259860C3587D92972AA55
3,139,044 UART: [art] SIG.R = C539ACCC90B43F0758C745EE2F1437F9AEF8E6C63EAB3726678898D8196E8EC7127343AFA0FDA059C625E60DAD3503B8
3,145,815 UART: [art] SIG.S = F43724F69AE023D13494318D2C6E6ACDA597EBFD5F60D6B70DDC7557F7D6A0A4EA9377C6309C24AE871F47F5550CD714
3,169,222 UART: Caliptra RT
3,169,568 UART: [state] CFI Enabled
3,277,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,121 UART:
3,279,137 UART: Running Caliptra ROM ...
3,279,545 UART:
3,279,687 UART: [state] CFI Enabled
3,282,687 UART: [state] LifecycleState = Unprovisioned
3,283,342 UART: [state] DebugLocked = No
3,283,852 UART: [state] WD Timer not started. Device not locked for debugging
3,285,074 UART: [kat] SHA2-256
4,090,724 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,849 UART: [kat] ++
4,095,001 UART: [kat] sha1
4,099,471 UART: [kat] SHA2-256
4,101,411 UART: [kat] SHA2-384
4,104,038 UART: [kat] SHA2-512-ACC
4,105,938 UART: [kat] ECC-384
4,115,245 UART: [kat] HMAC-384Kdf
4,119,865 UART: [kat] LMS
4,368,193 UART: [kat] --
4,369,027 UART: [update-reset] ++
4,458,754 >>> mbox cmd response: failed
4,458,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,459,294 UART: ROM Non-Fatal Error: 0x000B001F
4,460,276 UART: [state] Locking Datavault
4,460,944 UART: [state] Locking PCR0, PCR1 and PCR31
4,461,548 UART: [state] Locking ICCM
4,462,206 UART: [exit] Launching FMC @ 0x40000130
4,467,535 UART:
4,467,551 UART: Running Caliptra FMC ...
4,467,959 UART:
4,468,102 UART: [state] CFI Enabled
4,557,495 UART: [art] Extend RT PCRs Done
4,557,923 UART: [art] Lock RT PCRs Done
4,559,100 UART: [art] Populate DV Done
4,567,319 UART: [fht] FMC Alias Private Key: 7
4,568,247 UART: [art] Derive CDI
4,568,527 UART: [art] Store in in slot 0x4
4,654,570 UART: [art] Derive Key Pair
4,654,930 UART: [art] Store priv key in slot 0x5
4,668,278 UART: [art] Derive Key Pair - Done
4,682,905 UART: [art] Signing Cert with AUTHO
4,683,385 UART: RITY.KEYID = 7
4,698,567 UART: [art] Erasing AUTHORITY.KEYID = 7
4,699,332 UART: [art] PUB.X = 82A7896D21DCD1A6AF41211A2463B3115B952AEE12441D74A7A4CD4087172F26B6EEE7B9E50D4B32CC3C63DDA6D9EDD0
4,706,113 UART: [art] PUB.Y = B9CAC77D7FA9282BB0DA902DB80D210C6734AF4AFFBD8C0DA9C6C6D165F7D492A2E38EB0B23259860C3587D92972AA55
4,713,067 UART: [art] SIG.R = C539ACCC90B43F0758C745EE2F1437F9AEF8E6C63EAB3726678898D8196E8EC7127343AFA0FDA059C625E60DAD3503B8
4,719,838 UART: [art] SIG.S = F43724F69AE023D13494318D2C6E6ACDA597EBFD5F60D6B70DDC7557F7D6A0A4EA9377C6309C24AE871F47F5550CD714
4,743,797 UART: Caliptra RT
4,744,143 UART: [state] CFI Enabled
5,026,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,027,809 UART:
5,027,825 UART: Running Caliptra ROM ...
5,028,233 UART:
5,028,375 UART: [state] CFI Enabled
5,031,025 UART: [state] LifecycleState = Unprovisioned
5,031,680 UART: [state] DebugLocked = No
5,032,338 UART: [state] WD Timer not started. Device not locked for debugging
5,033,648 UART: [kat] SHA2-256
5,839,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,843,423 UART: [kat] ++
5,843,575 UART: [kat] sha1
5,847,783 UART: [kat] SHA2-256
5,849,723 UART: [kat] SHA2-384
5,852,424 UART: [kat] SHA2-512-ACC
5,854,324 UART: [kat] ECC-384
5,863,741 UART: [kat] HMAC-384Kdf
5,868,527 UART: [kat] LMS
6,116,855 UART: [kat] --
6,117,589 UART: [update-reset] ++
7,429,984 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,431,007 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,580,873 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,574 >>> mbox cmd response: success
2,627,574 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,689,768 UART:
2,689,784 UART: Running Caliptra FMC ...
2,690,192 UART:
2,690,335 UART: [state] CFI Enabled
2,700,562 UART: [fht] FMC Alias Private Key: 7
2,808,159 UART: [art] Extend RT PCRs Done
2,808,587 UART: [art] Lock RT PCRs Done
2,810,217 UART: [art] Populate DV Done
2,818,606 UART: [fht] FMC Alias Private Key: 7
2,819,668 UART: [art] Derive CDI
2,819,948 UART: [art] Store in in slot 0x4
2,905,439 UART: [art] Derive Key Pair
2,905,799 UART: [art] Store priv key in slot 0x5
2,919,335 UART: [art] Derive Key Pair - Done
2,934,596 UART: [art] Signing Cert with AUTHO
2,935,076 UART: RITY.KEYID = 7
2,950,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,363 UART: [art] PUB.X = CC71956B38B829A6C971DF5D1B50FE40932DDDA62AE66C652482F057561226B4A92C68812AC0EFD66741489283B84418
2,958,129 UART: [art] PUB.Y = 33009A6DCB1205412E721063BFC7D34A657664A4B40CDFDE4195B1F49032D6689A533110FAD7196D59B894EC1A449248
2,965,047 UART: [art] SIG.R = D721C42BE38924C23ED0F33DA6A462EC34645A6FB4C58AD372CD1A1EE96A5DF61A71B86351898F99E3903754F2683545
2,971,819 UART: [art] SIG.S = D03C7A08C256B805FEF7839DA4774E9977AF64D257B3F3AE90692211A648BF4470C6521CC0964A6292B5364EE59548AD
2,995,592 UART: Caliptra RT
2,995,938 UART: [state] CFI Enabled
3,103,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,144 >>> mbox cmd response: failed
4,170,144 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,175,991 UART:
4,176,007 UART: Running Caliptra FMC ...
4,176,415 UART:
4,176,558 UART: [state] CFI Enabled
4,265,637 UART: [art] Extend RT PCRs Done
4,266,065 UART: [art] Lock RT PCRs Done
4,267,298 UART: [art] Populate DV Done
4,275,593 UART: [fht] FMC Alias Private Key: 7
4,276,667 UART: [art] Derive CDI
4,276,947 UART: [art] Store in in slot 0x4
4,362,422 UART: [art] Derive Key Pair
4,362,782 UART: [art] Store priv key in slot 0x5
4,376,046 UART: [art] Derive Key Pair - Done
4,390,665 UART: [art] Signing Cert with AUTHO
4,391,145 UART: RITY.KEYID = 7
4,406,495 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,260 UART: [art] PUB.X = CC71956B38B829A6C971DF5D1B50FE40932DDDA62AE66C652482F057561226B4A92C68812AC0EFD66741489283B84418
4,414,026 UART: [art] PUB.Y = 33009A6DCB1205412E721063BFC7D34A657664A4B40CDFDE4195B1F49032D6689A533110FAD7196D59B894EC1A449248
4,420,944 UART: [art] SIG.R = D721C42BE38924C23ED0F33DA6A462EC34645A6FB4C58AD372CD1A1EE96A5DF61A71B86351898F99E3903754F2683545
4,427,716 UART: [art] SIG.S = D03C7A08C256B805FEF7839DA4774E9977AF64D257B3F3AE90692211A648BF4470C6521CC0964A6292B5364EE59548AD
4,451,577 UART: Caliptra RT
4,451,923 UART: [state] CFI Enabled
4,736,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,176,342 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,174,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,846 UART: [ldev] Erasing FE.KEYID = 1
1,242,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,082 UART: [ldev] --
1,281,572 UART: [fwproc] Wait for Commands...
1,282,219 UART: [fwproc] Recv command 0x46574c44
1,282,952 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,518 >>> mbox cmd response: success
2,773,518 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,774,743 UART: [afmc] ++
2,774,911 UART: [afmc] CDI.KEYID = 6
2,775,274 UART: [afmc] SUBJECT.KEYID = 7
2,775,700 UART: [afmc] AUTHORITY.KEYID = 5
2,811,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,814 UART: [afmc] --
2,854,732 UART: [cold-reset] --
2,855,638 UART: [state] Locking Datavault
2,856,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,347 UART: [state] Locking ICCM
2,857,861 UART: [exit] Launching FMC @ 0x40000130
2,863,190 UART:
2,863,206 UART: Running Caliptra FMC ...
2,863,614 UART:
2,863,668 UART: [state] CFI Enabled
2,874,387 UART: [fht] FMC Alias Private Key: 7
2,982,146 UART: [art] Extend RT PCRs Done
2,982,574 UART: [art] Lock RT PCRs Done
2,984,144 UART: [art] Populate DV Done
2,992,447 UART: [fht] FMC Alias Private Key: 7
2,993,515 UART: [art] Derive CDI
2,993,795 UART: [art] Store in in slot 0x4
3,079,520 UART: [art] Derive Key Pair
3,079,880 UART: [art] Store priv key in slot 0x5
3,093,058 UART: [art] Derive Key Pair - Done
3,108,009 UART: [art] Signing Cert with AUTHO
3,108,489 UART: RITY.KEYID = 7
3,123,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,060 UART: [art] PUB.X = 281ED823F8D96E9CAD706D220D8666F3A1D44B689229AED319215C3A1206844AC1AA23CB523E3BFCB323EAADC0B89C89
3,130,836 UART: [art] PUB.Y = A3F3405D6F7B24A6161CAA831CB34C3DF530C645EE0DF985F3C53DFEA01B595528C5B4D13371CF00046E2C7CCD077A8D
3,137,769 UART: [art] SIG.R = 7ED3CB02AA4A29EEB418F0ED9A3C3063C0B2845E7E5E7A2BBC4E8AAF97F2BB986C90AC91096CF6FB2B8FAB96D52751F7
3,144,559 UART: [art] SIG.S = 45584458D5DEA45B0A5116345CA8D7394602B55C62779BFDD0D27BB415A852C1562041B0FB7D90A3045497F1C90CBDE8
3,168,134 UART: Caliptra RT
3,168,388 UART: [state] CFI Enabled
3,276,686 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,240 UART:
3,278,256 UART: Running Caliptra ROM ...
3,278,664 UART:
3,278,719 UART: [state] CFI Enabled
3,281,959 UART: [state] LifecycleState = Unprovisioned
3,282,614 UART: [state] DebugLocked = No
3,283,162 UART: [state] WD Timer not started. Device not locked for debugging
3,284,282 UART: [kat] SHA2-256
4,087,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,961 UART: [kat] ++
4,092,113 UART: [kat] sha1
4,096,361 UART: [kat] SHA2-256
4,098,301 UART: [kat] SHA2-384
4,101,002 UART: [kat] SHA2-512-ACC
4,102,902 UART: [kat] ECC-384
4,112,553 UART: [kat] HMAC-384Kdf
4,117,173 UART: [kat] LMS
4,365,485 UART: [kat] --
4,366,219 UART: [update-reset] ++
4,454,637 >>> mbox cmd response: failed
4,454,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,455,237 UART: ROM Non-Fatal Error: 0x000B001F
4,455,993 UART: [state] Locking Datavault
4,456,851 UART: [state] Locking PCR0, PCR1 and PCR31
4,457,455 UART: [state] Locking ICCM
4,457,951 UART: [exit] Launching FMC @ 0x40000130
4,463,280 UART:
4,463,296 UART: Running Caliptra FMC ...
4,463,704 UART:
4,463,758 UART: [state] CFI Enabled
4,552,833 UART: [art] Extend RT PCRs Done
4,553,261 UART: [art] Lock RT PCRs Done
4,554,676 UART: [art] Populate DV Done
4,562,767 UART: [fht] FMC Alias Private Key: 7
4,563,893 UART: [art] Derive CDI
4,564,173 UART: [art] Store in in slot 0x4
4,649,898 UART: [art] Derive Key Pair
4,650,258 UART: [art] Store priv key in slot 0x5
4,663,498 UART: [art] Derive Key Pair - Done
4,678,277 UART: [art] Signing Cert with AUTHO
4,678,757 UART: RITY.KEYID = 7
4,693,719 UART: [art] Erasing AUTHORITY.KEYID = 7
4,694,484 UART: [art] PUB.X = 281ED823F8D96E9CAD706D220D8666F3A1D44B689229AED319215C3A1206844AC1AA23CB523E3BFCB323EAADC0B89C89
4,701,260 UART: [art] PUB.Y = A3F3405D6F7B24A6161CAA831CB34C3DF530C645EE0DF985F3C53DFEA01B595528C5B4D13371CF00046E2C7CCD077A8D
4,708,193 UART: [art] SIG.R = 7ED3CB02AA4A29EEB418F0ED9A3C3063C0B2845E7E5E7A2BBC4E8AAF97F2BB986C90AC91096CF6FB2B8FAB96D52751F7
4,714,983 UART: [art] SIG.S = 45584458D5DEA45B0A5116345CA8D7394602B55C62779BFDD0D27BB415A852C1562041B0FB7D90A3045497F1C90CBDE8
4,738,966 UART: Caliptra RT
4,739,220 UART: [state] CFI Enabled
5,021,037 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,022,599 UART:
5,022,615 UART: Running Caliptra ROM ...
5,023,023 UART:
5,023,078 UART: [state] CFI Enabled
5,025,470 UART: [state] LifecycleState = Unprovisioned
5,026,125 UART: [state] DebugLocked = No
5,026,615 UART: [state] WD Timer not started. Device not locked for debugging
5,027,787 UART: [kat] SHA2-256
5,831,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,835,466 UART: [kat] ++
5,835,618 UART: [kat] sha1
5,839,958 UART: [kat] SHA2-256
5,841,898 UART: [kat] SHA2-384
5,844,545 UART: [kat] SHA2-512-ACC
5,846,445 UART: [kat] ECC-384
5,856,202 UART: [kat] HMAC-384Kdf
5,860,994 UART: [kat] LMS
6,109,306 UART: [kat] --
6,110,210 UART: [update-reset] ++
7,422,704 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,423,899 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,573,765 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,772 >>> mbox cmd response: success
2,623,772 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,686,500 UART:
2,686,516 UART: Running Caliptra FMC ...
2,686,924 UART:
2,686,978 UART: [state] CFI Enabled
2,697,329 UART: [fht] FMC Alias Private Key: 7
2,805,132 UART: [art] Extend RT PCRs Done
2,805,560 UART: [art] Lock RT PCRs Done
2,807,134 UART: [art] Populate DV Done
2,815,639 UART: [fht] FMC Alias Private Key: 7
2,816,573 UART: [art] Derive CDI
2,816,853 UART: [art] Store in in slot 0x4
2,902,816 UART: [art] Derive Key Pair
2,903,176 UART: [art] Store priv key in slot 0x5
2,916,322 UART: [art] Derive Key Pair - Done
2,931,086 UART: [art] Signing Cert with AUTHO
2,931,566 UART: RITY.KEYID = 7
2,946,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,135 UART: [art] PUB.X = 6EEC841D1F6091CAE3E7D3CFC082EB5A2E930CCCFBC74BC72541929F9567560DCF9F5AA6F7DFD77D71B859CAC415A2A9
2,953,923 UART: [art] PUB.Y = 4F78358193E0411C980612584E749E6D8F2DE463C2719474320B15235716CDCA6251C6942D256E66A804E3478C4CED4D
2,960,852 UART: [art] SIG.R = 019D383935A523C5B95CA23EA6182553D02C0CEAE93FB3F6B611BFD4796E763324967F6D76353AECD6F7B34B64776052
2,967,616 UART: [art] SIG.S = 95F6F0FA062EC0F34E3953C75F40ECAA787883828E72C29B661F4CD8CF7B42B7FB2F541153EABCD85023E47E3699F2DA
2,991,628 UART: Caliptra RT
2,991,882 UART: [state] CFI Enabled
3,099,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,959 >>> mbox cmd response: failed
4,162,959 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,169,046 UART:
4,169,062 UART: Running Caliptra FMC ...
4,169,470 UART:
4,169,524 UART: [state] CFI Enabled
4,258,205 UART: [art] Extend RT PCRs Done
4,258,633 UART: [art] Lock RT PCRs Done
4,259,842 UART: [art] Populate DV Done
4,267,863 UART: [fht] FMC Alias Private Key: 7
4,269,033 UART: [art] Derive CDI
4,269,313 UART: [art] Store in in slot 0x4
4,354,796 UART: [art] Derive Key Pair
4,355,156 UART: [art] Store priv key in slot 0x5
4,368,282 UART: [art] Derive Key Pair - Done
4,382,624 UART: [art] Signing Cert with AUTHO
4,383,104 UART: RITY.KEYID = 7
4,398,322 UART: [art] Erasing AUTHORITY.KEYID = 7
4,399,087 UART: [art] PUB.X = 6EEC841D1F6091CAE3E7D3CFC082EB5A2E930CCCFBC74BC72541929F9567560DCF9F5AA6F7DFD77D71B859CAC415A2A9
4,405,875 UART: [art] PUB.Y = 4F78358193E0411C980612584E749E6D8F2DE463C2719474320B15235716CDCA6251C6942D256E66A804E3478C4CED4D
4,412,804 UART: [art] SIG.R = 019D383935A523C5B95CA23EA6182553D02C0CEAE93FB3F6B611BFD4796E763324967F6D76353AECD6F7B34B64776052
4,419,568 UART: [art] SIG.S = 95F6F0FA062EC0F34E3953C75F40ECAA787883828E72C29B661F4CD8CF7B42B7FB2F541153EABCD85023E47E3699F2DA
4,443,444 UART: Caliptra RT
4,443,698 UART: [state] CFI Enabled
4,725,869 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,158,960 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,840 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,208,885 UART: [ldev] ++
1,209,053 UART: [ldev] CDI.KEYID = 6
1,209,417 UART: [ldev] SUBJECT.KEYID = 5
1,209,844 UART: [ldev] AUTHORITY.KEYID = 7
1,210,307 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,251 UART: [ldev] --
1,281,531 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,169 >>> mbox cmd response: success
2,773,169 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,774,308 UART: [afmc] ++
2,774,476 UART: [afmc] CDI.KEYID = 6
2,774,839 UART: [afmc] SUBJECT.KEYID = 7
2,775,265 UART: [afmc] AUTHORITY.KEYID = 5
2,811,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,096 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,698 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,393 UART: [afmc] --
2,855,415 UART: [cold-reset] --
2,856,015 UART: [state] Locking Datavault
2,856,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,570 UART: [state] Locking ICCM
2,858,038 UART: [exit] Launching FMC @ 0x40000130
2,863,367 UART:
2,863,383 UART: Running Caliptra FMC ...
2,863,791 UART:
2,863,934 UART: [state] CFI Enabled
2,874,691 UART: [fht] FMC Alias Private Key: 7
2,982,038 UART: [art] Extend RT PCRs Done
2,982,466 UART: [art] Lock RT PCRs Done
2,983,788 UART: [art] Populate DV Done
2,991,833 UART: [fht] FMC Alias Private Key: 7
2,992,803 UART: [art] Derive CDI
2,993,083 UART: [art] Store in in slot 0x4
3,079,000 UART: [art] Derive Key Pair
3,079,360 UART: [art] Store priv key in slot 0x5
3,092,694 UART: [art] Derive Key Pair - Done
3,107,445 UART: [art] Signing Cert with AUTHO
3,107,925 UART: RITY.KEYID = 7
3,123,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,328 UART: [art] PUB.X = A13D03536D0A49B758CA6391EA43C96A3BBBAEA0A094EEAE204FB844AD4B537F1B05D7724024D0667E868DE86D555B06
3,131,096 UART: [art] PUB.Y = 1FACDF6616CF56D0194441685EF7B170068892D5F6B4922D0711D7405CC09DBCCF78D2DA18A717065D45DCF44E7DB074
3,138,043 UART: [art] SIG.R = EA95186EC89200017BD1FBE4AC17CA3E05670616768B846F642445B4BD005EB1E4C3C119810B47FF31AC51301467B732
3,144,755 UART: [art] SIG.S = 2AFFD090B39DA335AA6F3C18A92CB972DECB1861CBBBF45238D67C444FAD55BE9F056633B1E61E685104A650E16BBE8A
3,168,418 UART: Caliptra RT
3,168,764 UART: [state] CFI Enabled
3,276,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,666 UART:
3,278,682 UART: Running Caliptra ROM ...
3,279,090 UART:
3,279,232 UART: [state] CFI Enabled
3,282,004 UART: [state] LifecycleState = Unprovisioned
3,282,659 UART: [state] DebugLocked = No
3,283,353 UART: [state] WD Timer not started. Device not locked for debugging
3,284,505 UART: [kat] SHA2-256
4,088,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,184 UART: [kat] ++
4,092,336 UART: [kat] sha1
4,096,738 UART: [kat] SHA2-256
4,098,678 UART: [kat] SHA2-384
4,101,367 UART: [kat] SHA2-512-ACC
4,103,267 UART: [kat] ECC-384
4,113,166 UART: [kat] HMAC-384Kdf
4,117,892 UART: [kat] LMS
4,366,204 UART: [kat] --
4,367,218 UART: [update-reset] ++
4,457,274 >>> mbox cmd response: failed
4,457,274 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,457,796 UART: ROM Non-Fatal Error: 0x000B001F
4,458,658 UART: [state] Locking Datavault
4,459,354 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,958 UART: [state] Locking ICCM
4,460,476 UART: [exit] Launching FMC @ 0x40000130
4,465,805 UART:
4,465,821 UART: Running Caliptra FMC ...
4,466,229 UART:
4,466,372 UART: [state] CFI Enabled
4,555,701 UART: [art] Extend RT PCRs Done
4,556,129 UART: [art] Lock RT PCRs Done
4,557,228 UART: [art] Populate DV Done
4,565,799 UART: [fht] FMC Alias Private Key: 7
4,566,901 UART: [art] Derive CDI
4,567,181 UART: [art] Store in in slot 0x4
4,653,186 UART: [art] Derive Key Pair
4,653,546 UART: [art] Store priv key in slot 0x5
4,666,722 UART: [art] Derive Key Pair - Done
4,681,381 UART: [art] Signing Cert with AUTHO
4,681,861 UART: RITY.KEYID = 7
4,697,205 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,970 UART: [art] PUB.X = A13D03536D0A49B758CA6391EA43C96A3BBBAEA0A094EEAE204FB844AD4B537F1B05D7724024D0667E868DE86D555B06
4,704,738 UART: [art] PUB.Y = 1FACDF6616CF56D0194441685EF7B170068892D5F6B4922D0711D7405CC09DBCCF78D2DA18A717065D45DCF44E7DB074
4,711,685 UART: [art] SIG.R = EA95186EC89200017BD1FBE4AC17CA3E05670616768B846F642445B4BD005EB1E4C3C119810B47FF31AC51301467B732
4,718,397 UART: [art] SIG.S = 2AFFD090B39DA335AA6F3C18A92CB972DECB1861CBBBF45238D67C444FAD55BE9F056633B1E61E685104A650E16BBE8A
4,742,090 UART: Caliptra RT
4,742,436 UART: [state] CFI Enabled
5,024,139 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,025,935 UART:
5,025,951 UART: Running Caliptra ROM ...
5,026,359 UART:
5,026,501 UART: [state] CFI Enabled
5,029,395 UART: [state] LifecycleState = Unprovisioned
5,030,050 UART: [state] DebugLocked = No
5,030,746 UART: [state] WD Timer not started. Device not locked for debugging
5,031,940 UART: [kat] SHA2-256
5,835,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,839,619 UART: [kat] ++
5,839,771 UART: [kat] sha1
5,844,061 UART: [kat] SHA2-256
5,846,001 UART: [kat] SHA2-384
5,848,728 UART: [kat] SHA2-512-ACC
5,850,628 UART: [kat] ECC-384
5,860,765 UART: [kat] HMAC-384Kdf
5,865,567 UART: [kat] LMS
6,113,879 UART: [kat] --
6,114,613 UART: [update-reset] ++
7,427,619 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,428,778 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,578,644 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,547 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,249 >>> mbox cmd response: success
2,624,249 <<< Executing mbox cmd 0x46574c44 (99660 bytes) from SoC
2,686,263 UART:
2,686,279 UART: Running Caliptra FMC ...
2,686,687 UART:
2,686,830 UART: [state] CFI Enabled
2,697,253 UART: [fht] FMC Alias Private Key: 7
2,805,390 UART: [art] Extend RT PCRs Done
2,805,818 UART: [art] Lock RT PCRs Done
2,807,268 UART: [art] Populate DV Done
2,815,393 UART: [fht] FMC Alias Private Key: 7
2,816,401 UART: [art] Derive CDI
2,816,681 UART: [art] Store in in slot 0x4
2,902,338 UART: [art] Derive Key Pair
2,902,698 UART: [art] Store priv key in slot 0x5
2,916,280 UART: [art] Derive Key Pair - Done
2,931,417 UART: [art] Signing Cert with AUTHO
2,931,897 UART: RITY.KEYID = 7
2,946,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,714 UART: [art] PUB.X = 7D07EA55CF5C9270AA576D608822DA437F93161D9116DCCC6F89C22CC833EF8A087DD252343FDE44D516738BCA6A7C5E
2,954,488 UART: [art] PUB.Y = FD331696DB5950B82E388964AEA183E53F3EFEE37B9211C572D97C75D209CBD6BD40C8C3B6BE3E18B59E7018D0E189D3
2,961,445 UART: [art] SIG.R = 1E1E38FC969D2D8D00E02E694487627112DF225D8A47D92DEA867D3141C7DE8A3DB9E90DC15750C027A104BC65674E35
2,968,189 UART: [art] SIG.S = A84D1907EA7F99CFA1B13BE0421813FED85ED720B6B77432816B771BEBADBB3C1872376F478622894857192B2CA03343
2,992,211 UART: Caliptra RT
2,992,557 UART: [state] CFI Enabled
3,100,751 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,831 >>> mbox cmd response: failed
4,162,831 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,168,490 UART:
4,168,506 UART: Running Caliptra FMC ...
4,168,914 UART:
4,169,057 UART: [state] CFI Enabled
4,258,430 UART: [art] Extend RT PCRs Done
4,258,858 UART: [art] Lock RT PCRs Done
4,260,237 UART: [art] Populate DV Done
4,268,528 UART: [fht] FMC Alias Private Key: 7
4,269,638 UART: [art] Derive CDI
4,269,918 UART: [art] Store in in slot 0x4
4,355,543 UART: [art] Derive Key Pair
4,355,903 UART: [art] Store priv key in slot 0x5
4,369,267 UART: [art] Derive Key Pair - Done
4,384,012 UART: [art] Signing Cert with AUTHO
4,384,492 UART: RITY.KEYID = 7
4,399,654 UART: [art] Erasing AUTHORITY.KEYID = 7
4,400,419 UART: [art] PUB.X = 7D07EA55CF5C9270AA576D608822DA437F93161D9116DCCC6F89C22CC833EF8A087DD252343FDE44D516738BCA6A7C5E
4,407,193 UART: [art] PUB.Y = FD331696DB5950B82E388964AEA183E53F3EFEE37B9211C572D97C75D209CBD6BD40C8C3B6BE3E18B59E7018D0E189D3
4,414,150 UART: [art] SIG.R = 1E1E38FC969D2D8D00E02E694487627112DF225D8A47D92DEA867D3141C7DE8A3DB9E90DC15750C027A104BC65674E35
4,420,894 UART: [art] SIG.S = A84D1907EA7F99CFA1B13BE0421813FED85ED720B6B77432816B771BEBADBB3C1872376F478622894857192B2CA03343
4,444,284 UART: Caliptra RT
4,444,630 UART: [state] CFI Enabled
4,726,419 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,161,547 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
192,023 UART:
192,390 UART: Running Caliptra ROM ...
193,524 UART:
193,672 UART: [state] CFI Enabled
262,998 UART: [state] LifecycleState = Unprovisioned
264,918 UART: [state] DebugLocked = No
266,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,282 UART: [kat] SHA2-256
441,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,501 UART: [kat] ++
451,948 UART: [kat] sha1
462,504 UART: [kat] SHA2-256
465,184 UART: [kat] SHA2-384
471,699 UART: [kat] SHA2-512-ACC
474,043 UART: [kat] ECC-384
2,764,110 UART: [kat] HMAC-384Kdf
2,796,182 UART: [kat] LMS
3,986,461 UART: [kat] --
3,990,522 UART: [cold-reset] ++
3,992,620 UART: [fht] Storing FHT @ 0x50003400
4,005,289 UART: [idev] ++
4,005,858 UART: [idev] CDI.KEYID = 6
4,006,877 UART: [idev] SUBJECT.KEYID = 7
4,008,042 UART: [idev] UDS.KEYID = 0
4,010,923 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,571 UART: [idev] Erasing UDS.KEYID = 0
7,341,903 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,424 UART: [idev] --
7,368,151 UART: [ldev] ++
7,368,781 UART: [ldev] CDI.KEYID = 6
7,369,664 UART: [ldev] SUBJECT.KEYID = 5
7,370,897 UART: [ldev] AUTHORITY.KEYID = 7
7,372,122 UART: [ldev] FE.KEYID = 1
7,419,246 UART: [ldev] Erasing FE.KEYID = 1
10,749,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,926 UART: [ldev] --
13,111,112 UART: [fwproc] Waiting for Commands...
13,113,479 UART: [fwproc] Received command 0x46574c44
13,115,664 UART: [fwproc] Received Image of size 114036 bytes
17,171,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,633 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,637,066 >>> mbox cmd response: success
17,639,267 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,782,856 UART: [afmc] ++
17,783,492 UART: [afmc] CDI.KEYID = 6
17,784,391 UART: [afmc] SUBJECT.KEYID = 7
17,785,447 UART: [afmc] AUTHORITY.KEYID = 5
21,004,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,293 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,687 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,495 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,976 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,592 UART: [afmc] --
23,373,646 UART: [cold-reset] --
23,376,866 UART: [state] Locking Datavault
23,383,030 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,797 UART: [state] Locking ICCM
23,387,377 UART: [exit] Launching FMC @ 0x40000130
23,395,798 UART:
23,396,047 UART: Running Caliptra FMC ...
23,397,153 UART:
23,397,313 UART: [state] CFI Enabled
23,462,542 UART: [fht] FMC Alias Private Key: 7
25,800,772 UART: [art] Extend RT PCRs Done
25,801,990 UART: [art] Lock RT PCRs Done
25,803,775 UART: [art] Populate DV Done
25,809,076 UART: [fht] FMC Alias Private Key: 7
25,810,833 UART: [art] Derive CDI
25,811,646 UART: [art] Store in in slot 0x4
25,871,300 UART: [art] Derive Key Pair
25,872,345 UART: [art] Store priv key in slot 0x5
29,165,375 UART: [art] Derive Key Pair - Done
29,178,233 UART: [art] Signing Cert with AUTHO
29,179,542 UART: RITY.KEYID = 7
31,469,385 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,889 UART: [art] PUB.X = 5DCD8E9D77922E69CA2BF9F61141970519CBE677CFECC7D59563F377A4F73EEEE0F99F7BF41A44C8F7F24AC361CAA23B
31,478,135 UART: [art] PUB.Y = C123ED2B9DA0B740E0A07C380146D3BEA6B9DAE33931AAA440CB13FFF51C01FD582EC8B52D97BEE18DA792EB112D1278
31,485,414 UART: [art] SIG.R = 65A582E80B0093524A0123AA1543D9461B696CD63F928351B365EA7452C3A424A8F80CEC6BDCE58CBAC5B647258963D3
31,492,800 UART: [art] SIG.S = 8E09184FE7D7DB839A53E91A877702056F84286A6875AD1B7FBAA0EAD4CBA23F12AE664432773C0A64A11907E7464FE5
32,798,144 UART: Caliptra RT
32,798,850 UART: [state] CFI Enabled
32,958,493 UART: [rt] RT listening for mailbox commands...
32,961,177 UART:
32,961,342 UART: Running Caliptra ROM ...
32,962,450 UART:
32,962,608 UART: [state] CFI Enabled
33,026,179 UART: [state] LifecycleState = Unprovisioned
33,028,117 UART: [state] DebugLocked = No
33,030,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,035,863 UART: [kat] SHA2-256
33,205,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,216,027 UART: [kat] ++
33,216,492 UART: [kat] sha1
33,227,689 UART: [kat] SHA2-256
33,230,389 UART: [kat] SHA2-384
33,235,617 UART: [kat] SHA2-512-ACC
33,238,024 UART: [kat] ECC-384
35,528,778 UART: [kat] HMAC-384Kdf
35,560,175 UART: [kat] LMS
36,750,486 UART: [kat] --
36,754,872 UART: [update-reset] ++
36,858,226 >>> mbox cmd response: failed
36,860,087 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
37,003,589 UART: ROM Non-Fatal Error: 0x000B001D
37,005,025 UART: [state] Locking Datavault
37,006,192 UART: [state] Locking PCR0, PCR1 and PCR31
37,007,755 UART: [state] Locking ICCM
37,008,668 UART: [exit] Launching FMC @ 0x40000130
37,010,097 UART:
37,010,256 UART: Running Caliptra FMC ...
37,011,355 UART:
37,011,515 UART: [state] CFI Enabled
37,012,434 UART: [art] Extend RT PCRs Done
37,013,574 UART: [art] Lock RT PCRs Done
37,014,639 UART: [art] Populate DV Done
37,015,621 UART: [fht] FMC Alias Private Key: 7
37,016,936 UART: [art] Derive CDI
37,017,675 UART: [art] Store in in slot 0x4
37,050,818 UART: [art] Derive Key Pair
37,051,823 UART: [art] Store priv key in slot 0x5
40,343,798 UART: [art] Derive Key Pair - Done
40,356,367 UART: [art] Signing Cert with AUTHO
40,357,688 UART: RITY.KEYID = 7
42,645,690 UART: [art] Erasing AUTHORITY.KEYID = 7
42,647,193 UART: [art] PUB.X = 5DCD8E9D77922E69CA2BF9F61141970519CBE677CFECC7D59563F377A4F73EEEE0F99F7BF41A44C8F7F24AC361CAA23B
42,654,490 UART: [art] PUB.Y = C123ED2B9DA0B740E0A07C380146D3BEA6B9DAE33931AAA440CB13FFF51C01FD582EC8B52D97BEE18DA792EB112D1278
42,661,758 UART: [art] SIG.R = 65A582E80B0093524A0123AA1543D9461B696CD63F928351B365EA7452C3A424A8F80CEC6BDCE58CBAC5B647258963D3
42,669,099 UART: [art] SIG.S = 8E09184FE7D7DB839A53E91A877702056F84286A6875AD1B7FBAA0EAD4CBA23F12AE664432773C0A64A11907E7464FE5
43,973,952 UART: Caliptra RT
43,974,651 UART: [state] CFI Enabled
44,306,774 UART: [rt] RT listening for mailbox commands...
44,309,352 UART:
44,309,519 UART: Running Caliptra ROM ...
44,310,626 UART:
44,310,782 UART: [state] CFI Enabled
44,374,554 UART: [state] LifecycleState = Unprovisioned
44,376,484 UART: [state] DebugLocked = No
44,379,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,383,621 UART: [kat] SHA2-256
44,553,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,563,823 UART: [kat] ++
44,564,274 UART: [kat] sha1
44,574,515 UART: [kat] SHA2-256
44,577,183 UART: [kat] SHA2-384
44,582,908 UART: [kat] SHA2-512-ACC
44,585,314 UART: [kat] ECC-384
46,875,190 UART: [kat] HMAC-384Kdf
46,907,228 UART: [kat] LMS
48,097,533 UART: [kat] --
48,102,671 UART: [update-reset] ++
52,237,898 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,241,776 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
52,623,734 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,808,074 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,874,505 >>> mbox cmd response: success
17,876,432 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,570,363 UART:
23,570,826 UART: Running Caliptra FMC ...
23,571,937 UART:
23,572,099 UART: [state] CFI Enabled
23,638,456 UART: [fht] FMC Alias Private Key: 7
25,976,966 UART: [art] Extend RT PCRs Done
25,978,209 UART: [art] Lock RT PCRs Done
25,979,790 UART: [art] Populate DV Done
25,985,323 UART: [fht] FMC Alias Private Key: 7
25,986,817 UART: [art] Derive CDI
25,987,576 UART: [art] Store in in slot 0x4
26,047,623 UART: [art] Derive Key Pair
26,048,662 UART: [art] Store priv key in slot 0x5
29,341,694 UART: [art] Derive Key Pair - Done
29,354,697 UART: [art] Signing Cert with AUTHO
29,356,009 UART: RITY.KEYID = 7
31,643,750 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,266 UART: [art] PUB.X = B8D2DE29B6E9C623BC54D9D3FD940FA1194B83098BAEDE457030F570CD563778B86C41A1BCC46BF7142A8C253F68C620
31,652,481 UART: [art] PUB.Y = DD6687FAA66BF432621CA0ED8A4E88AE33F5E709DD6E409115312264860F658B8967430B510915585344799F3F0DD57E
31,659,699 UART: [art] SIG.R = E701F5B2C47D6FE1E360843C4D582FE438A268533925CE4FD53DB809BD97E6C6FE1D5BC2CCA69D0E08D41E0D6BF3C8F2
31,667,140 UART: [art] SIG.S = 84F9D5F0D5EC70D85515FD862B1D655973CEABA7EED6CE87ABDF4F2ECB21AE1BA180483CC3B277CCCFA186898637435E
32,972,217 UART: Caliptra RT
32,972,927 UART: [state] CFI Enabled
33,135,025 UART: [rt] RT listening for mailbox commands...
36,826,513 >>> mbox cmd response: failed
36,828,292 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
36,972,020 UART:
36,972,342 UART: Running Caliptra FMC ...
36,973,412 UART:
36,973,571 UART: [state] CFI Enabled
36,974,433 UART: [art] Extend RT PCRs Done
36,975,578 UART: [art] Lock RT PCRs Done
36,976,650 UART: [art] Populate DV Done
36,977,761 UART: [fht] FMC Alias Private Key: 7
36,979,084 UART: [art] Derive CDI
36,979,849 UART: [art] Store in in slot 0x4
37,013,551 UART: [art] Derive Key Pair
37,014,602 UART: [art] Store priv key in slot 0x5
40,307,707 UART: [art] Derive Key Pair - Done
40,320,323 UART: [art] Signing Cert with AUTHO
40,321,627 UART: RITY.KEYID = 7
42,609,234 UART: [art] Erasing AUTHORITY.KEYID = 7
42,610,738 UART: [art] PUB.X = B8D2DE29B6E9C623BC54D9D3FD940FA1194B83098BAEDE457030F570CD563778B86C41A1BCC46BF7142A8C253F68C620
42,618,006 UART: [art] PUB.Y = DD6687FAA66BF432621CA0ED8A4E88AE33F5E709DD6E409115312264860F658B8967430B510915585344799F3F0DD57E
42,625,209 UART: [art] SIG.R = E701F5B2C47D6FE1E360843C4D582FE438A268533925CE4FD53DB809BD97E6C6FE1D5BC2CCA69D0E08D41E0D6BF3C8F2
42,632,573 UART: [art] SIG.S = 84F9D5F0D5EC70D85515FD862B1D655973CEABA7EED6CE87ABDF4F2ECB21AE1BA180483CC3B277CCCFA186898637435E
43,937,644 UART: Caliptra RT
43,938,354 UART: [state] CFI Enabled
44,272,516 UART: [rt] RT listening for mailbox commands...
52,875,251 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,460 UART:
192,815 UART: Running Caliptra ROM ...
193,994 UART:
603,619 UART: [state] CFI Enabled
618,800 UART: [state] LifecycleState = Unprovisioned
620,701 UART: [state] DebugLocked = No
622,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,813 UART: [kat] SHA2-256
797,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,084 UART: [kat] ++
808,534 UART: [kat] sha1
818,764 UART: [kat] SHA2-256
821,443 UART: [kat] SHA2-384
827,149 UART: [kat] SHA2-512-ACC
829,496 UART: [kat] ECC-384
3,114,765 UART: [kat] HMAC-384Kdf
3,125,486 UART: [kat] LMS
4,315,577 UART: [kat] --
4,320,890 UART: [cold-reset] ++
4,322,310 UART: [fht] Storing FHT @ 0x50003400
4,334,828 UART: [idev] ++
4,335,402 UART: [idev] CDI.KEYID = 6
4,336,315 UART: [idev] SUBJECT.KEYID = 7
4,337,590 UART: [idev] UDS.KEYID = 0
4,340,738 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,156 UART: [idev] Erasing UDS.KEYID = 0
7,627,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,816 UART: [idev] --
7,653,949 UART: [ldev] ++
7,654,519 UART: [ldev] CDI.KEYID = 6
7,655,460 UART: [ldev] SUBJECT.KEYID = 5
7,656,672 UART: [ldev] AUTHORITY.KEYID = 7
7,657,964 UART: [ldev] FE.KEYID = 1
7,669,188 UART: [ldev] Erasing FE.KEYID = 1
10,958,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,892 UART: [ldev] --
13,318,726 UART: [fwproc] Waiting for Commands...
13,320,607 UART: [fwproc] Received command 0x46574c44
13,322,793 UART: [fwproc] Received Image of size 114036 bytes
17,376,814 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,632 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,842,104 >>> mbox cmd response: success
17,844,112 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,987,360 UART: [afmc] ++
17,988,007 UART: [afmc] CDI.KEYID = 6
17,988,906 UART: [afmc] SUBJECT.KEYID = 7
17,989,947 UART: [afmc] AUTHORITY.KEYID = 5
21,165,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,268 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,647 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,478 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,945 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,980 UART: [afmc] --
23,529,739 UART: [cold-reset] --
23,533,922 UART: [state] Locking Datavault
23,536,957 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,715 UART: [state] Locking ICCM
23,540,947 UART: [exit] Launching FMC @ 0x40000130
23,549,342 UART:
23,549,575 UART: Running Caliptra FMC ...
23,550,674 UART:
23,550,851 UART: [state] CFI Enabled
23,559,088 UART: [fht] FMC Alias Private Key: 7
25,890,052 UART: [art] Extend RT PCRs Done
25,891,283 UART: [art] Lock RT PCRs Done
25,892,827 UART: [art] Populate DV Done
25,898,288 UART: [fht] FMC Alias Private Key: 7
25,899,802 UART: [art] Derive CDI
25,900,546 UART: [art] Store in in slot 0x4
25,942,763 UART: [art] Derive Key Pair
25,943,759 UART: [art] Store priv key in slot 0x5
29,185,274 UART: [art] Derive Key Pair - Done
29,197,901 UART: [art] Signing Cert with AUTHO
29,199,205 UART: RITY.KEYID = 7
31,478,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,888 UART: [art] PUB.X = 41B2322F75BB3F2CD5AECEEA54C8543E5A4A4FB2058CF3D954E42422C151E0049651F14707E3721F1083F12EF816F9A1
31,487,139 UART: [art] PUB.Y = 3A2EBE50F9C80866E474F53BB6BE41C4465E9CD9B67097F2256B7B8DFE6C5255B26ABA2CEFBEC004F04B1FAEAECB15F9
31,494,404 UART: [art] SIG.R = 49B36DACA87CB60933875A691C8E147A4334A240E00D99A77B2B547A487F61B1B7BBF08654FBBC399706B21457DA94A6
31,501,796 UART: [art] SIG.S = C9D0C32CF0820B864B3746E5529B417A0FDBEEEAB237498BCF943365D3D2D68EC5A29DE8F65DBC662776CA53B8B81886
32,807,462 UART: Caliptra RT
32,808,176 UART: [state] CFI Enabled
32,927,028 UART: [rt] RT listening for mailbox commands...
32,929,509 UART:
32,929,682 UART: Running Caliptra ROM ...
32,930,731 UART:
32,931,156 UART: [state] CFI Enabled
32,948,022 UART: [state] LifecycleState = Unprovisioned
32,949,947 UART: [state] DebugLocked = No
32,951,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,956,189 UART: [kat] SHA2-256
33,125,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,136,441 UART: [kat] ++
33,136,982 UART: [kat] sha1
33,148,381 UART: [kat] SHA2-256
33,151,132 UART: [kat] SHA2-384
33,156,793 UART: [kat] SHA2-512-ACC
33,159,193 UART: [kat] ECC-384
35,441,191 UART: [kat] HMAC-384Kdf
35,453,086 UART: [kat] LMS
36,643,148 UART: [kat] --
36,646,870 UART: [update-reset] ++
36,750,863 >>> mbox cmd response: failed
36,752,573 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
36,895,863 UART: ROM Non-Fatal Error: 0x000B001D
36,897,294 UART: [state] Locking Datavault
36,898,449 UART: [state] Locking PCR0, PCR1 and PCR31
36,899,985 UART: [state] Locking ICCM
36,900,888 UART: [exit] Launching FMC @ 0x40000130
36,902,310 UART:
36,902,497 UART: Running Caliptra FMC ...
36,903,598 UART:
36,903,756 UART: [state] CFI Enabled
36,904,674 UART: [art] Extend RT PCRs Done
36,905,813 UART: [art] Lock RT PCRs Done
36,906,880 UART: [art] Populate DV Done
36,907,906 UART: [fht] FMC Alias Private Key: 7
36,909,227 UART: [art] Derive CDI
36,909,960 UART: [art] Store in in slot 0x4
36,911,126 UART: [art] Derive Key Pair
36,912,117 UART: [art] Store priv key in slot 0x5
40,112,954 UART: [art] Derive Key Pair - Done
40,125,878 UART: [art] Signing Cert with AUTHO
40,127,332 UART: RITY.KEYID = 7
42,406,518 UART: [art] Erasing AUTHORITY.KEYID = 7
42,408,027 UART: [art] PUB.X = 41B2322F75BB3F2CD5AECEEA54C8543E5A4A4FB2058CF3D954E42422C151E0049651F14707E3721F1083F12EF816F9A1
42,415,233 UART: [art] PUB.Y = 3A2EBE50F9C80866E474F53BB6BE41C4465E9CD9B67097F2256B7B8DFE6C5255B26ABA2CEFBEC004F04B1FAEAECB15F9
42,422,529 UART: [art] SIG.R = 49B36DACA87CB60933875A691C8E147A4334A240E00D99A77B2B547A487F61B1B7BBF08654FBBC399706B21457DA94A6
42,429,887 UART: [art] SIG.S = C9D0C32CF0820B864B3746E5529B417A0FDBEEEAB237498BCF943365D3D2D68EC5A29DE8F65DBC662776CA53B8B81886
43,734,939 UART: Caliptra RT
43,735,657 UART: [state] CFI Enabled
44,023,742 UART: [rt] RT listening for mailbox commands...
44,026,330 UART:
44,026,498 UART: Running Caliptra ROM ...
44,027,608 UART:
44,027,984 UART: [state] CFI Enabled
44,042,463 UART: [state] LifecycleState = Unprovisioned
44,044,350 UART: [state] DebugLocked = No
44,047,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,051,985 UART: [kat] SHA2-256
44,221,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,232,189 UART: [kat] ++
44,232,693 UART: [kat] sha1
44,245,095 UART: [kat] SHA2-256
44,247,791 UART: [kat] SHA2-384
44,254,274 UART: [kat] SHA2-512-ACC
44,256,679 UART: [kat] ECC-384
46,538,817 UART: [kat] HMAC-384Kdf
46,550,348 UART: [kat] LMS
47,740,395 UART: [kat] --
47,744,450 UART: [update-reset] ++
51,891,066 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,894,855 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
52,276,804 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
4,124,347 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,062,684 >>> mbox cmd response: success
18,064,790 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,703,001 UART:
23,703,432 UART: Running Caliptra FMC ...
23,704,547 UART:
23,704,712 UART: [state] CFI Enabled
23,712,670 UART: [fht] FMC Alias Private Key: 7
26,042,991 UART: [art] Extend RT PCRs Done
26,044,226 UART: [art] Lock RT PCRs Done
26,045,885 UART: [art] Populate DV Done
26,051,542 UART: [fht] FMC Alias Private Key: 7
26,053,200 UART: [art] Derive CDI
26,054,022 UART: [art] Store in in slot 0x4
26,096,899 UART: [art] Derive Key Pair
26,097,945 UART: [art] Store priv key in slot 0x5
29,339,848 UART: [art] Derive Key Pair - Done
29,352,688 UART: [art] Signing Cert with AUTHO
29,354,031 UART: RITY.KEYID = 7
31,633,190 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,690 UART: [art] PUB.X = 17687BF4A48E956EA7DEE0149D58BB93E61EE761CE0F25E5967F2D8B1DB4AA294C993494E7B6ACED24B1E91E273CC846
31,641,964 UART: [art] PUB.Y = 42CACEE3CDF677700EE4F00008C0C7BA843C6EE8F8C8293A5C63A217A04963C7D06FF192DD644E463878D0780B7B6368
31,649,175 UART: [art] SIG.R = 1056C73949116CDDB116B99947642717470AF25D6E9FFC2DEE1DEE2054A2C897E6DB649A906F7F71C41CB82B1439E07C
31,656,542 UART: [art] SIG.S = 1BED41B1432A71285A534F3FE951892B3CA6D795D4DC50CA36AB951245FEDC81F0C7D6F1463E48B97821D9F63979C264
32,961,296 UART: Caliptra RT
32,962,017 UART: [state] CFI Enabled
33,080,499 UART: [rt] RT listening for mailbox commands...
36,710,210 >>> mbox cmd response: failed
36,712,029 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
36,855,178 UART:
36,855,484 UART: Running Caliptra FMC ...
36,856,606 UART:
36,856,771 UART: [state] CFI Enabled
36,857,692 UART: [art] Extend RT PCRs Done
36,858,830 UART: [art] Lock RT PCRs Done
36,859,893 UART: [art] Populate DV Done
36,860,994 UART: [fht] FMC Alias Private Key: 7
36,862,315 UART: [art] Derive CDI
36,863,051 UART: [art] Store in in slot 0x4
36,864,220 UART: [art] Derive Key Pair
36,865,216 UART: [art] Store priv key in slot 0x5
40,064,685 UART: [art] Derive Key Pair - Done
40,077,850 UART: [art] Signing Cert with AUTHO
40,079,204 UART: RITY.KEYID = 7
42,358,259 UART: [art] Erasing AUTHORITY.KEYID = 7
42,359,770 UART: [art] PUB.X = 17687BF4A48E956EA7DEE0149D58BB93E61EE761CE0F25E5967F2D8B1DB4AA294C993494E7B6ACED24B1E91E273CC846
42,367,037 UART: [art] PUB.Y = 42CACEE3CDF677700EE4F00008C0C7BA843C6EE8F8C8293A5C63A217A04963C7D06FF192DD644E463878D0780B7B6368
42,374,249 UART: [art] SIG.R = 1056C73949116CDDB116B99947642717470AF25D6E9FFC2DEE1DEE2054A2C897E6DB649A906F7F71C41CB82B1439E07C
42,381,616 UART: [art] SIG.S = 1BED41B1432A71285A534F3FE951892B3CA6D795D4DC50CA36AB951245FEDC81F0C7D6F1463E48B97821D9F63979C264
43,686,075 UART: Caliptra RT
43,686,795 UART: [state] CFI Enabled
43,979,278 UART: [rt] RT listening for mailbox commands...
52,494,558 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,255 UART:
192,622 UART: Running Caliptra ROM ...
193,750 UART:
193,898 UART: [state] CFI Enabled
258,517 UART: [state] LifecycleState = Unprovisioned
260,407 UART: [state] DebugLocked = No
262,547 UART: [state] WD Timer not started. Device not locked for debugging
265,829 UART: [kat] SHA2-256
444,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,519 UART: [kat] ++
457,060 UART: [kat] sha1
468,866 UART: [kat] SHA2-256
471,923 UART: [kat] SHA2-384
478,932 UART: [kat] SHA2-512-ACC
481,866 UART: [kat] ECC-384
2,943,188 UART: [kat] HMAC-384Kdf
2,967,063 UART: [kat] LMS
3,496,511 UART: [kat] --
3,501,484 UART: [cold-reset] ++
3,502,450 UART: [fht] FHT @ 0x50003400
3,514,480 UART: [idev] ++
3,515,044 UART: [idev] CDI.KEYID = 6
3,515,933 UART: [idev] SUBJECT.KEYID = 7
3,517,147 UART: [idev] UDS.KEYID = 0
3,520,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,250 UART: [idev] Erasing UDS.KEYID = 0
6,020,606 UART: [idev] Sha1 KeyId Algorithm
6,044,278 UART: [idev] --
6,048,144 UART: [ldev] ++
6,048,732 UART: [ldev] CDI.KEYID = 6
6,049,653 UART: [ldev] SUBJECT.KEYID = 5
6,050,835 UART: [ldev] AUTHORITY.KEYID = 7
6,052,069 UART: [ldev] FE.KEYID = 1
6,094,860 UART: [ldev] Erasing FE.KEYID = 1
8,596,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,206 UART: [ldev] --
10,408,872 UART: [fwproc] Wait for Commands...
10,411,073 UART: [fwproc] Recv command 0x46574c44
10,413,114 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,274,981 >>> mbox cmd response: success
14,277,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,421,087 UART: [afmc] ++
14,421,737 UART: [afmc] CDI.KEYID = 6
14,422,634 UART: [afmc] SUBJECT.KEYID = 7
14,423,683 UART: [afmc] AUTHORITY.KEYID = 5
16,819,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,545,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,547,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,563,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,579,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,594,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,052 UART: [afmc] --
18,622,411 UART: [cold-reset] --
18,627,947 UART: [state] Locking Datavault
18,634,271 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,981 UART: [state] Locking ICCM
18,637,690 UART: [exit] Launching FMC @ 0x40000130
18,646,086 UART:
18,646,322 UART: Running Caliptra FMC ...
18,647,419 UART:
18,647,575 UART: [state] CFI Enabled
18,702,499 UART: [fht] FMC Alias Private Key: 7
20,466,078 UART: [art] Extend RT PCRs Done
20,467,296 UART: [art] Lock RT PCRs Done
20,469,105 UART: [art] Populate DV Done
20,474,458 UART: [fht] FMC Alias Private Key: 7
20,475,939 UART: [art] Derive CDI
20,476,672 UART: [art] Store in in slot 0x4
20,535,580 UART: [art] Derive Key Pair
20,536,622 UART: [art] Store priv key in slot 0x5
22,999,258 UART: [art] Derive Key Pair - Done
23,012,084 UART: [art] Signing Cert with AUTHO
23,013,443 UART: RITY.KEYID = 7
24,725,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,174 UART: [art] PUB.X = 46C721688AD675ED2E57E7A273AF638768FEE9554D8228174DE8D00B34F188891E2401E589E3924B2583993BBC992E8F
24,734,426 UART: [art] PUB.Y = CD89C89ECFEB58CF8E772A7B138688CF8884CC516F5A7180AE7A04CDA65AF39E2C5BB91BB66E6E80D64499CC1FD0F418
24,741,739 UART: [art] SIG.R = F5D39CF654BE306BABF2CC74ACBD0A8C4CC60F704E088485FCBE8D5D4D72313B8C960825C5A7D17C490E0AFAF8D77B4F
24,749,108 UART: [art] SIG.S = 219795BE937B87FA48399237835F4805C1142480E9BA04AAB64C225FCD58DF4BAB279D518E25B39CDDB913D2BE2C939F
25,728,145 UART: Caliptra RT
25,728,849 UART: [state] CFI Enabled
25,894,248 UART: [rt] RT listening for mailbox commands...
25,897,311 UART:
25,897,556 UART: Running Caliptra ROM ...
25,898,659 UART:
25,898,823 UART: [state] CFI Enabled
25,964,878 UART: [state] LifecycleState = Unprovisioned
25,966,742 UART: [state] DebugLocked = No
25,968,290 UART: [state] WD Timer not started. Device not locked for debugging
25,971,728 UART: [kat] SHA2-256
26,150,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,162,419 UART: [kat] ++
26,162,958 UART: [kat] sha1
26,175,197 UART: [kat] SHA2-256
26,178,207 UART: [kat] SHA2-384
26,184,513 UART: [kat] SHA2-512-ACC
26,187,461 UART: [kat] ECC-384
28,644,916 UART: [kat] HMAC-384Kdf
28,668,015 UART: [kat] LMS
29,197,443 UART: [kat] --
29,201,187 UART: [update-reset] ++
29,244,223 >>> mbox cmd response: failed
29,246,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,389,732 UART: ROM Non-Fatal Error: 0x000B001D
29,391,162 UART: [state] Locking Datavault
29,392,261 UART: [state] Locking PCR0, PCR1 and PCR31
29,393,803 UART: [state] Locking ICCM
29,394,685 UART: [exit] Launching FMC @ 0x40000130
29,396,023 UART:
29,396,171 UART: Running Caliptra FMC ...
29,397,270 UART:
29,397,423 UART: [state] CFI Enabled
29,398,258 UART: [art] Extend RT PCRs Done
29,399,310 UART: [art] Lock RT PCRs Done
29,400,290 UART: [art] Populate DV Done
29,401,319 UART: [fht] FMC Alias Private Key: 7
29,402,636 UART: [art] Derive CDI
29,403,369 UART: [art] Store in in slot 0x4
29,432,268 UART: [art] Derive Key Pair
29,433,318 UART: [art] Store priv key in slot 0x5
31,896,480 UART: [art] Derive Key Pair - Done
31,909,387 UART: [art] Signing Cert with AUTHO
31,910,697 UART: RITY.KEYID = 7
33,621,537 UART: [art] Erasing AUTHORITY.KEYID = 7
33,623,044 UART: [art] PUB.X = 46C721688AD675ED2E57E7A273AF638768FEE9554D8228174DE8D00B34F188891E2401E589E3924B2583993BBC992E8F
33,630,302 UART: [art] PUB.Y = CD89C89ECFEB58CF8E772A7B138688CF8884CC516F5A7180AE7A04CDA65AF39E2C5BB91BB66E6E80D64499CC1FD0F418
33,637,595 UART: [art] SIG.R = F5D39CF654BE306BABF2CC74ACBD0A8C4CC60F704E088485FCBE8D5D4D72313B8C960825C5A7D17C490E0AFAF8D77B4F
33,645,136 UART: [art] SIG.S = 219795BE937B87FA48399237835F4805C1142480E9BA04AAB64C225FCD58DF4BAB279D518E25B39CDDB913D2BE2C939F
34,623,979 UART: Caliptra RT
34,624,668 UART: [state] CFI Enabled
34,960,045 UART: [rt] RT listening for mailbox commands...
34,962,781 UART:
34,963,027 UART: Running Caliptra ROM ...
34,964,136 UART:
34,964,292 UART: [state] CFI Enabled
35,029,157 UART: [state] LifecycleState = Unprovisioned
35,031,055 UART: [state] DebugLocked = No
35,032,417 UART: [state] WD Timer not started. Device not locked for debugging
35,035,946 UART: [kat] SHA2-256
35,215,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,226,599 UART: [kat] ++
35,227,062 UART: [kat] sha1
35,237,245 UART: [kat] SHA2-256
35,240,252 UART: [kat] SHA2-384
35,246,878 UART: [kat] SHA2-512-ACC
35,249,861 UART: [kat] ECC-384
37,709,496 UART: [kat] HMAC-384Kdf
37,734,554 UART: [kat] LMS
38,264,029 UART: [kat] --
38,267,650 UART: [update-reset] ++
41,698,074 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,701,225 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
42,084,200 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,376 UART:
192,711 UART: Running Caliptra ROM ...
193,859 UART:
194,009 UART: [state] CFI Enabled
261,225 UART: [state] LifecycleState = Unprovisioned
263,643 UART: [state] DebugLocked = No
266,215 UART: [state] WD Timer not started. Device not locked for debugging
271,448 UART: [kat] SHA2-256
461,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,092 UART: [kat] ++
472,574 UART: [kat] sha1
485,616 UART: [kat] SHA2-256
488,635 UART: [kat] SHA2-384
494,834 UART: [kat] SHA2-512-ACC
497,447 UART: [kat] ECC-384
2,946,767 UART: [kat] HMAC-384Kdf
2,970,048 UART: [kat] LMS
3,501,824 UART: [kat] --
3,506,693 UART: [cold-reset] ++
3,508,572 UART: [fht] FHT @ 0x50003400
3,521,102 UART: [idev] ++
3,521,792 UART: [idev] CDI.KEYID = 6
3,522,759 UART: [idev] SUBJECT.KEYID = 7
3,523,973 UART: [idev] UDS.KEYID = 0
3,526,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,430 UART: [idev] Erasing UDS.KEYID = 0
6,026,928 UART: [idev] Sha1 KeyId Algorithm
6,049,582 UART: [idev] --
6,054,827 UART: [ldev] ++
6,055,511 UART: [ldev] CDI.KEYID = 6
6,056,426 UART: [ldev] SUBJECT.KEYID = 5
6,057,589 UART: [ldev] AUTHORITY.KEYID = 7
6,058,821 UART: [ldev] FE.KEYID = 1
6,099,539 UART: [ldev] Erasing FE.KEYID = 1
8,607,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,760 UART: [ldev] --
10,411,566 UART: [fwproc] Wait for Commands...
10,414,370 UART: [fwproc] Recv command 0x46574c44
10,416,637 UART: [fwproc] Recv'd Img size: 114360 bytes
13,862,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,602,760 >>> mbox cmd response: success
14,605,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,749,023 UART: [afmc] ++
14,749,670 UART: [afmc] CDI.KEYID = 6
14,750,599 UART: [afmc] SUBJECT.KEYID = 7
14,751,714 UART: [afmc] AUTHORITY.KEYID = 5
17,154,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,339 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,344 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,061 UART: [afmc] --
18,971,261 UART: [cold-reset] --
18,975,881 UART: [state] Locking Datavault
18,982,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,554 UART: [state] Locking ICCM
18,986,366 UART: [exit] Launching FMC @ 0x40000130
18,995,034 UART:
18,995,272 UART: Running Caliptra FMC ...
18,996,297 UART:
18,996,444 UART: [state] CFI Enabled
19,054,887 UART: [fht] FMC Alias Private Key: 7
20,818,757 UART: [art] Extend RT PCRs Done
20,819,977 UART: [art] Lock RT PCRs Done
20,821,583 UART: [art] Populate DV Done
20,826,847 UART: [fht] FMC Alias Private Key: 7
20,828,494 UART: [art] Derive CDI
20,829,232 UART: [art] Store in in slot 0x4
20,886,954 UART: [art] Derive Key Pair
20,887,989 UART: [art] Store priv key in slot 0x5
23,350,461 UART: [art] Derive Key Pair - Done
23,363,463 UART: [art] Signing Cert with AUTHO
23,364,774 UART: RITY.KEYID = 7
25,076,998 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,496 UART: [art] PUB.X = 6E47F6458E50D9A7444DF1396CBFB04C2C35E822F6FD988C4C30654393DCA353B1C94A488E914840FC73181D4A34FA3B
25,085,734 UART: [art] PUB.Y = 936644F1295E289283E6D4A321C7AE42060BA890D55A264D2BC1373C20A14DE79D2C2F3FD946488FBDCDB8AEFE8934EF
25,093,025 UART: [art] SIG.R = 9115DEA548EB16AC8D35E6A0275BF15FBF765573DC4BD145E6762E55043D64106BC1F1A437A5ACDF1E18CB04EB1280B1
25,100,433 UART: [art] SIG.S = DA66EC7EF9C918874FED8A957ACF704F14E8D3B41C49F2CD4F1DBFD06F2A9563F73257F020601FEFD8EF6ED019467687
26,079,571 UART: Caliptra RT
26,080,276 UART: [state] CFI Enabled
26,245,368 UART: [rt] RT listening for mailbox commands...
26,248,012 UART:
26,248,264 UART: Running Caliptra ROM ...
26,249,366 UART:
26,249,526 UART: [state] CFI Enabled
26,312,390 UART: [state] LifecycleState = Unprovisioned
26,314,416 UART: [state] DebugLocked = No
26,315,634 UART: [state] WD Timer not started. Device not locked for debugging
26,319,370 UART: [kat] SHA2-256
26,509,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,519,974 UART: [kat] ++
26,520,464 UART: [kat] sha1
26,530,546 UART: [kat] SHA2-256
26,533,570 UART: [kat] SHA2-384
26,539,178 UART: [kat] SHA2-512-ACC
26,541,740 UART: [kat] ECC-384
28,995,828 UART: [kat] HMAC-384Kdf
29,020,431 UART: [kat] LMS
29,552,005 UART: [kat] --
29,558,102 UART: [update-reset] ++
29,613,167 >>> mbox cmd response: failed
29,614,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,758,848 UART: ROM Non-Fatal Error: 0x000B001D
29,760,276 UART: [state] Locking Datavault
29,761,438 UART: [state] Locking PCR0, PCR1 and PCR31
29,762,985 UART: [state] Locking ICCM
29,763,890 UART: [exit] Launching FMC @ 0x40000130
29,765,320 UART:
29,765,482 UART: Running Caliptra FMC ...
29,766,584 UART:
29,766,743 UART: [state] CFI Enabled
29,767,665 UART: [art] Extend RT PCRs Done
29,768,803 UART: [art] Lock RT PCRs Done
29,769,890 UART: [art] Populate DV Done
29,770,922 UART: [fht] FMC Alias Private Key: 7
29,772,240 UART: [art] Derive CDI
29,772,975 UART: [art] Store in in slot 0x4
29,806,437 UART: [art] Derive Key Pair
29,807,440 UART: [art] Store priv key in slot 0x5
32,270,010 UART: [art] Derive Key Pair - Done
32,283,227 UART: [art] Signing Cert with AUTHO
32,284,540 UART: RITY.KEYID = 7
33,995,844 UART: [art] Erasing AUTHORITY.KEYID = 7
33,997,355 UART: [art] PUB.X = 6E47F6458E50D9A7444DF1396CBFB04C2C35E822F6FD988C4C30654393DCA353B1C94A488E914840FC73181D4A34FA3B
34,004,632 UART: [art] PUB.Y = 936644F1295E289283E6D4A321C7AE42060BA890D55A264D2BC1373C20A14DE79D2C2F3FD946488FBDCDB8AEFE8934EF
34,011,898 UART: [art] SIG.R = 9115DEA548EB16AC8D35E6A0275BF15FBF765573DC4BD145E6762E55043D64106BC1F1A437A5ACDF1E18CB04EB1280B1
34,019,327 UART: [art] SIG.S = DA66EC7EF9C918874FED8A957ACF704F14E8D3B41C49F2CD4F1DBFD06F2A9563F73257F020601FEFD8EF6ED019467687
34,998,460 UART: Caliptra RT
34,999,183 UART: [state] CFI Enabled
35,332,465 UART: [rt] RT listening for mailbox commands...
35,335,054 UART:
35,335,259 UART: Running Caliptra ROM ...
35,336,366 UART:
35,336,529 UART: [state] CFI Enabled
35,400,051 UART: [state] LifecycleState = Unprovisioned
35,402,139 UART: [state] DebugLocked = No
35,403,692 UART: [state] WD Timer not started. Device not locked for debugging
35,408,299 UART: [kat] SHA2-256
35,598,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,608,919 UART: [kat] ++
35,609,376 UART: [kat] sha1
35,620,969 UART: [kat] SHA2-256
35,623,977 UART: [kat] SHA2-384
35,629,589 UART: [kat] SHA2-512-ACC
35,632,219 UART: [kat] ECC-384
38,084,730 UART: [kat] HMAC-384Kdf
38,106,847 UART: [kat] LMS
38,638,429 UART: [kat] --
38,643,557 UART: [update-reset] ++
42,105,624 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,109,368 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
42,717,049 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,436,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,748,572 >>> mbox cmd response: success
14,750,416 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
19,041,216 UART:
19,041,633 UART: Running Caliptra FMC ...
19,042,799 UART:
19,042,970 UART: [state] CFI Enabled
19,108,619 UART: [fht] FMC Alias Private Key: 7
20,872,657 UART: [art] Extend RT PCRs Done
20,873,875 UART: [art] Lock RT PCRs Done
20,875,662 UART: [art] Populate DV Done
20,881,056 UART: [fht] FMC Alias Private Key: 7
20,882,758 UART: [art] Derive CDI
20,883,578 UART: [art] Store in in slot 0x4
20,941,043 UART: [art] Derive Key Pair
20,942,092 UART: [art] Store priv key in slot 0x5
23,404,939 UART: [art] Derive Key Pair - Done
23,418,153 UART: [art] Signing Cert with AUTHO
23,419,632 UART: RITY.KEYID = 7
25,130,603 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,148 UART: [art] PUB.X = C792781CB2A8A0D4D3465EF099F130C1DEF3B8B944D4735180DFE6EF47524A99B4B2603D19FC4C8D3540BBB8B949C621
25,139,355 UART: [art] PUB.Y = D49FC08C17313D211A3B082807D2137AF49759A538674080CD8AA022985DAF1C05EC8706C7EE2B8848D4A5E649B2D3B9
25,146,578 UART: [art] SIG.R = 95A1AA98BFE66F8703395C9C5DDD759827FAEFE7D2E8C99708EBB1F3BB9A3E7C7166446DB1DD53830788638E38C1222B
25,153,985 UART: [art] SIG.S = F20503BD48C9E522CF87A40D799A20BE226F2A02A4425B371178E6A078F96AD48AE1F21F9C014FFE6CF5441EE43C7394
26,132,892 UART: Caliptra RT
26,133,608 UART: [state] CFI Enabled
26,298,209 UART: [rt] RT listening for mailbox commands...
29,572,532 >>> mbox cmd response: failed
29,574,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,718,320 UART:
29,718,631 UART: Running Caliptra FMC ...
29,719,673 UART:
29,719,820 UART: [state] CFI Enabled
29,720,743 UART: [art] Extend RT PCRs Done
29,721,887 UART: [art] Lock RT PCRs Done
29,722,907 UART: [art] Populate DV Done
29,723,950 UART: [fht] FMC Alias Private Key: 7
29,725,296 UART: [art] Derive CDI
29,726,031 UART: [art] Store in in slot 0x4
29,752,847 UART: [art] Derive Key Pair
29,753,890 UART: [art] Store priv key in slot 0x5
32,216,401 UART: [art] Derive Key Pair - Done
32,229,635 UART: [art] Signing Cert with AUTHO
32,230,990 UART: RITY.KEYID = 7
33,941,824 UART: [art] Erasing AUTHORITY.KEYID = 7
33,943,315 UART: [art] PUB.X = C792781CB2A8A0D4D3465EF099F130C1DEF3B8B944D4735180DFE6EF47524A99B4B2603D19FC4C8D3540BBB8B949C621
33,950,604 UART: [art] PUB.Y = D49FC08C17313D211A3B082807D2137AF49759A538674080CD8AA022985DAF1C05EC8706C7EE2B8848D4A5E649B2D3B9
33,957,828 UART: [art] SIG.R = 95A1AA98BFE66F8703395C9C5DDD759827FAEFE7D2E8C99708EBB1F3BB9A3E7C7166446DB1DD53830788638E38C1222B
33,965,207 UART: [art] SIG.S = F20503BD48C9E522CF87A40D799A20BE226F2A02A4425B371178E6A078F96AD48AE1F21F9C014FFE6CF5441EE43C7394
34,943,516 UART: Caliptra RT
34,944,221 UART: [state] CFI Enabled
35,278,994 UART: [rt] RT listening for mailbox commands...
42,956,409 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,377 UART:
192,728 UART: Running Caliptra ROM ...
193,917 UART:
603,554 UART: [state] CFI Enabled
618,133 UART: [state] LifecycleState = Unprovisioned
620,535 UART: [state] DebugLocked = No
621,995 UART: [state] WD Timer not started. Device not locked for debugging
627,169 UART: [kat] SHA2-256
817,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,824 UART: [kat] ++
828,332 UART: [kat] sha1
839,427 UART: [kat] SHA2-256
842,433 UART: [kat] SHA2-384
849,808 UART: [kat] SHA2-512-ACC
852,426 UART: [kat] ECC-384
3,293,222 UART: [kat] HMAC-384Kdf
3,306,762 UART: [kat] LMS
3,838,575 UART: [kat] --
3,845,019 UART: [cold-reset] ++
3,846,689 UART: [fht] FHT @ 0x50003400
3,858,964 UART: [idev] ++
3,859,659 UART: [idev] CDI.KEYID = 6
3,860,679 UART: [idev] SUBJECT.KEYID = 7
3,861,842 UART: [idev] UDS.KEYID = 0
3,864,646 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,496 UART: [idev] Erasing UDS.KEYID = 0
6,334,105 UART: [idev] Sha1 KeyId Algorithm
6,356,040 UART: [idev] --
6,360,629 UART: [ldev] ++
6,361,308 UART: [ldev] CDI.KEYID = 6
6,362,222 UART: [ldev] SUBJECT.KEYID = 5
6,363,384 UART: [ldev] AUTHORITY.KEYID = 7
6,364,615 UART: [ldev] FE.KEYID = 1
6,377,247 UART: [ldev] Erasing FE.KEYID = 1
8,856,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,950 UART: [ldev] --
10,646,250 UART: [fwproc] Wait for Commands...
10,648,296 UART: [fwproc] Recv command 0x46574c44
10,650,551 UART: [fwproc] Recv'd Img size: 114360 bytes
14,103,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,314 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,848,703 >>> mbox cmd response: success
14,850,905 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,994,641 UART: [afmc] ++
14,995,281 UART: [afmc] CDI.KEYID = 6
14,996,210 UART: [afmc] SUBJECT.KEYID = 7
14,997,317 UART: [afmc] AUTHORITY.KEYID = 5
17,357,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,067 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,778 UART: [afmc] --
19,151,518 UART: [cold-reset] --
19,155,811 UART: [state] Locking Datavault
19,162,900 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,087 UART: [state] Locking ICCM
19,166,376 UART: [exit] Launching FMC @ 0x40000130
19,174,717 UART:
19,174,952 UART: Running Caliptra FMC ...
19,176,057 UART:
19,176,224 UART: [state] CFI Enabled
19,184,218 UART: [fht] FMC Alias Private Key: 7
20,941,770 UART: [art] Extend RT PCRs Done
20,943,001 UART: [art] Lock RT PCRs Done
20,944,767 UART: [art] Populate DV Done
20,950,353 UART: [fht] FMC Alias Private Key: 7
20,951,930 UART: [art] Derive CDI
20,952,757 UART: [art] Store in in slot 0x4
20,995,191 UART: [art] Derive Key Pair
20,996,192 UART: [art] Store priv key in slot 0x5
23,422,956 UART: [art] Derive Key Pair - Done
23,435,833 UART: [art] Signing Cert with AUTHO
23,437,171 UART: RITY.KEYID = 7
25,142,414 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,915 UART: [art] PUB.X = A290F762FA2200D255144827D84A8C679FE86418436B606A4A83B9EA3211F615C37EA143A87842FE295F2357EF97907E
25,151,122 UART: [art] PUB.Y = 3D9748299C9782B812EC0120038A764487F6F3DCD7A9782B96E54FC66177F3F9B9A69646B4FA9BA78A0402F391DFCE1B
25,158,407 UART: [art] SIG.R = 46B9F89BD52DC70550610FCB0B1D71E661AB141F6CA606BFB987A4F808CB8EC99D6CD8426AC99A0A1187DDBEE21655AC
25,165,782 UART: [art] SIG.S = 0D6E30ACBB7C7FB73430314ADC6A2AC75499D380F109F087C49CD7622B860BC7B38C156530C120AC8BA599029AE58A91
26,144,914 UART: Caliptra RT
26,145,613 UART: [state] CFI Enabled
26,262,463 UART: [rt] RT listening for mailbox commands...
26,264,925 UART:
26,265,088 UART: Running Caliptra ROM ...
26,266,319 UART:
26,266,585 UART: [state] CFI Enabled
26,278,800 UART: [state] LifecycleState = Unprovisioned
26,280,678 UART: [state] DebugLocked = No
26,282,460 UART: [state] WD Timer not started. Device not locked for debugging
26,287,325 UART: [kat] SHA2-256
26,477,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,487,958 UART: [kat] ++
26,488,444 UART: [kat] sha1
26,500,359 UART: [kat] SHA2-256
26,503,382 UART: [kat] SHA2-384
26,510,580 UART: [kat] SHA2-512-ACC
26,513,146 UART: [kat] ECC-384
28,956,233 UART: [kat] HMAC-384Kdf
28,968,792 UART: [kat] LMS
29,500,417 UART: [kat] --
29,505,701 UART: [update-reset] ++
29,561,089 >>> mbox cmd response: failed
29,562,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,706,508 UART: ROM Non-Fatal Error: 0x000B001D
29,707,942 UART: [state] Locking Datavault
29,709,098 UART: [state] Locking PCR0, PCR1 and PCR31
29,710,638 UART: [state] Locking ICCM
29,711,546 UART: [exit] Launching FMC @ 0x40000130
29,712,972 UART:
29,713,130 UART: Running Caliptra FMC ...
29,714,234 UART:
29,714,413 UART: [state] CFI Enabled
29,715,254 UART: [art] Extend RT PCRs Done
29,716,395 UART: [art] Lock RT PCRs Done
29,717,421 UART: [art] Populate DV Done
29,718,452 UART: [fht] FMC Alias Private Key: 7
29,719,689 UART: [art] Derive CDI
29,720,416 UART: [art] Store in in slot 0x4
29,721,585 UART: [art] Derive Key Pair
29,722,493 UART: [art] Store priv key in slot 0x5
32,110,122 UART: [art] Derive Key Pair - Done
32,123,615 UART: [art] Signing Cert with AUTHO
32,124,920 UART: RITY.KEYID = 7
33,830,172 UART: [art] Erasing AUTHORITY.KEYID = 7
33,831,826 UART: [art] PUB.X = A290F762FA2200D255144827D84A8C679FE86418436B606A4A83B9EA3211F615C37EA143A87842FE295F2357EF97907E
33,838,938 UART: [art] PUB.Y = 3D9748299C9782B812EC0120038A764487F6F3DCD7A9782B96E54FC66177F3F9B9A69646B4FA9BA78A0402F391DFCE1B
33,846,163 UART: [art] SIG.R = 46B9F89BD52DC70550610FCB0B1D71E661AB141F6CA606BFB987A4F808CB8EC99D6CD8426AC99A0A1187DDBEE21655AC
33,853,583 UART: [art] SIG.S = 0D6E30ACBB7C7FB73430314ADC6A2AC75499D380F109F087C49CD7622B860BC7B38C156530C120AC8BA599029AE58A91
34,832,546 UART: Caliptra RT
34,833,260 UART: [state] CFI Enabled
35,122,902 UART: [rt] RT listening for mailbox commands...
35,125,501 UART:
35,125,668 UART: Running Caliptra ROM ...
35,126,778 UART:
35,127,153 UART: [state] CFI Enabled
40,324,090 UART: [state] LifecycleState = Unprovisioned
40,326,013 UART: [state] DebugLocked = No
40,327,784 UART: [state] WD Timer not started. Device not locked for debugging
40,331,474 UART: [kat] SHA2-256
40,521,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,532,130 UART: [kat] ++
40,532,639 UART: [kat] sha1
40,543,140 UART: [kat] SHA2-256
40,546,175 UART: [kat] SHA2-384
40,552,010 UART: [kat] SHA2-512-ACC
40,554,618 UART: [kat] ECC-384
42,997,592 UART: [kat] HMAC-384Kdf
43,010,894 UART: [kat] LMS
43,542,485 UART: [kat] --
43,547,208 UART: [update-reset] ++
47,008,198 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,011,068 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
47,618,808 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,755,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,946,367 >>> mbox cmd response: success
14,948,625 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
19,196,513 UART:
19,196,925 UART: Running Caliptra FMC ...
19,198,051 UART:
19,198,208 UART: [state] CFI Enabled
19,206,271 UART: [fht] FMC Alias Private Key: 7
20,963,083 UART: [art] Extend RT PCRs Done
20,964,307 UART: [art] Lock RT PCRs Done
20,965,955 UART: [art] Populate DV Done
20,971,410 UART: [fht] FMC Alias Private Key: 7
20,972,904 UART: [art] Derive CDI
20,973,641 UART: [art] Store in in slot 0x4
21,016,295 UART: [art] Derive Key Pair
21,017,335 UART: [art] Store priv key in slot 0x5
23,443,389 UART: [art] Derive Key Pair - Done
23,456,490 UART: [art] Signing Cert with AUTHO
23,457,793 UART: RITY.KEYID = 7
25,163,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,635 UART: [art] PUB.X = AAF89D30E3B35499146C7BD5402589089C5AEC7A2984E8B7739A97F0D7FAF804A6180DA7D274C07D0DADCE352B50D399
25,171,866 UART: [art] PUB.Y = B59B37824EE1247A4CA8D7032D67744944F462E5F9AFA4E529FFFFD2EF4614BC4D574584B74096BA190DD164F34915B3
25,179,112 UART: [art] SIG.R = FA629D9861259F46ACCDEF2895664C45EFEA98F7F28516A846B91D8253458244816192DA740D75ED27B5929CFA2DD962
25,186,515 UART: [art] SIG.S = 331BB3E0D136D8AD1E27742304846222ADDA36464D4A478B6B5B49445416CC8F440921445B6F48E3B394AC90EBF7D10E
26,165,121 UART: Caliptra RT
26,165,820 UART: [state] CFI Enabled
26,282,359 UART: [rt] RT listening for mailbox commands...
29,471,162 >>> mbox cmd response: failed
29,472,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,616,627 UART:
29,616,935 UART: Running Caliptra FMC ...
29,617,972 UART:
29,618,120 UART: [state] CFI Enabled
29,619,047 UART: [art] Extend RT PCRs Done
29,620,194 UART: [art] Lock RT PCRs Done
29,621,214 UART: [art] Populate DV Done
29,622,319 UART: [fht] FMC Alias Private Key: 7
29,623,565 UART: [art] Derive CDI
29,624,291 UART: [art] Store in in slot 0x4
29,625,479 UART: [art] Derive Key Pair
29,626,392 UART: [art] Store priv key in slot 0x5
32,006,917 UART: [art] Derive Key Pair - Done
32,020,294 UART: [art] Signing Cert with AUTHO
32,021,599 UART: RITY.KEYID = 7
33,726,785 UART: [art] Erasing AUTHORITY.KEYID = 7
33,728,292 UART: [art] PUB.X = AAF89D30E3B35499146C7BD5402589089C5AEC7A2984E8B7739A97F0D7FAF804A6180DA7D274C07D0DADCE352B50D399
33,735,545 UART: [art] PUB.Y = B59B37824EE1247A4CA8D7032D67744944F462E5F9AFA4E529FFFFD2EF4614BC4D574584B74096BA190DD164F34915B3
33,742,831 UART: [art] SIG.R = FA629D9861259F46ACCDEF2895664C45EFEA98F7F28516A846B91D8253458244816192DA740D75ED27B5929CFA2DD962
33,750,169 UART: [art] SIG.S = 331BB3E0D136D8AD1E27742304846222ADDA36464D4A478B6B5B49445416CC8F440921445B6F48E3B394AC90EBF7D10E
34,729,000 UART: Caliptra RT
34,729,718 UART: [state] CFI Enabled
35,014,930 UART: [rt] RT listening for mailbox commands...
47,904,463 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,681 UART: [kat] SHA2-256
881,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,727 UART: [kat] ++
885,879 UART: [kat] sha1
890,091 UART: [kat] SHA2-256
892,029 UART: [kat] SHA2-384
894,736 UART: [kat] SHA2-512-ACC
896,637 UART: [kat] ECC-384
902,196 UART: [kat] HMAC-384Kdf
906,642 UART: [kat] LMS
1,474,838 UART: [kat] --
1,475,619 UART: [cold-reset] ++
1,475,977 UART: [fht] Storing FHT @ 0x50003400
1,478,754 UART: [idev] ++
1,478,922 UART: [idev] CDI.KEYID = 6
1,479,282 UART: [idev] SUBJECT.KEYID = 7
1,479,706 UART: [idev] UDS.KEYID = 0
1,480,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,652 UART: [idev] Erasing UDS.KEYID = 0
1,504,154 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,782 UART: [idev] --
1,513,911 UART: [ldev] ++
1,514,079 UART: [ldev] CDI.KEYID = 6
1,514,442 UART: [ldev] SUBJECT.KEYID = 5
1,514,868 UART: [ldev] AUTHORITY.KEYID = 7
1,515,331 UART: [ldev] FE.KEYID = 1
1,520,541 UART: [ldev] Erasing FE.KEYID = 1
1,545,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,636 UART: [ldev] --
1,584,939 UART: [fwproc] Waiting for Commands...
1,585,582 UART: [fwproc] Received command 0x46574c44
1,586,373 UART: [fwproc] Received Image of size 114360 bytes
2,884,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,263 >>> mbox cmd response: success
3,076,263 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,077,333 UART: [afmc] ++
3,077,501 UART: [afmc] CDI.KEYID = 6
3,077,863 UART: [afmc] SUBJECT.KEYID = 7
3,078,288 UART: [afmc] AUTHORITY.KEYID = 5
3,113,915 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,209 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,602 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,292 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,055 UART: [afmc] --
3,157,017 UART: [cold-reset] --
3,157,707 UART: [state] Locking Datavault
3,158,766 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,370 UART: [state] Locking ICCM
3,159,892 UART: [exit] Launching FMC @ 0x40000130
3,165,221 UART:
3,165,237 UART: Running Caliptra FMC ...
3,165,645 UART:
3,165,699 UART: [state] CFI Enabled
3,176,542 UART: [fht] FMC Alias Private Key: 7
3,284,613 UART: [art] Extend RT PCRs Done
3,285,041 UART: [art] Lock RT PCRs Done
3,286,561 UART: [art] Populate DV Done
3,294,610 UART: [fht] FMC Alias Private Key: 7
3,295,562 UART: [art] Derive CDI
3,295,842 UART: [art] Store in in slot 0x4
3,381,863 UART: [art] Derive Key Pair
3,382,223 UART: [art] Store priv key in slot 0x5
3,396,027 UART: [art] Derive Key Pair - Done
3,410,867 UART: [art] Signing Cert with AUTHO
3,411,347 UART: RITY.KEYID = 7
3,426,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,964 UART: [art] PUB.X = 518A8B5C54168995230E7F70D7CA72F8BAF453CC045E341BE530F7E3F692FEB82712554DE2EDE50D3EA0865E3C7E5540
3,433,731 UART: [art] PUB.Y = 338AD7B1C3244E4DDCFF0B3C6EBFFBA050325BFA1FA0E84C5824259544BAB343003917EEA9E24972FB7C30505A401F8C
3,440,670 UART: [art] SIG.R = E77025D86142DC93BCE9721BC24AC839D513D07358796C49931ACBB72DDA9B188CCE9CB628441A48714665B124BDE208
3,447,439 UART: [art] SIG.S = 688BAEAF92A0022D7F235F1D1B5636D899AAA2B0DAD810E5C3D4762BA0D3E713EC2971CBEF5ED1775B41E5E3C27B6E60
3,471,425 UART: Caliptra RT
3,471,679 UART: [state] CFI Enabled
3,580,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,152 UART:
3,582,168 UART: Running Caliptra ROM ...
3,582,576 UART:
3,582,630 UART: [state] CFI Enabled
3,585,142 UART: [state] LifecycleState = Unprovisioned
3,585,797 UART: [state] DebugLocked = No
3,586,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,588,066 UART: [kat] SHA2-256
4,381,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,386,112 UART: [kat] ++
4,386,264 UART: [kat] sha1
4,390,632 UART: [kat] SHA2-256
4,392,570 UART: [kat] SHA2-384
4,395,485 UART: [kat] SHA2-512-ACC
4,397,385 UART: [kat] ECC-384
4,403,330 UART: [kat] HMAC-384Kdf
4,407,976 UART: [kat] LMS
4,976,172 UART: [kat] --
4,977,277 UART: [update-reset] ++
5,014,760 >>> mbox cmd response: failed
5,014,760 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,015,122 UART: ROM Non-Fatal Error: 0x000B001D
5,016,052 UART: [state] Locking Datavault
5,016,688 UART: [state] Locking PCR0, PCR1 and PCR31
5,017,292 UART: [state] Locking ICCM
5,017,874 UART: [exit] Launching FMC @ 0x40000130
5,023,203 UART:
5,023,219 UART: Running Caliptra FMC ...
5,023,627 UART:
5,023,681 UART: [state] CFI Enabled
5,112,444 UART: [art] Extend RT PCRs Done
5,112,872 UART: [art] Lock RT PCRs Done
5,114,135 UART: [art] Populate DV Done
5,122,280 UART: [fht] FMC Alias Private Key: 7
5,123,394 UART: [art] Derive CDI
5,123,674 UART: [art] Store in in slot 0x4
5,209,665 UART: [art] Derive Key Pair
5,210,025 UART: [art] Store priv key in slot 0x5
5,223,219 UART: [art] Derive Key Pair - Done
5,237,773 UART: [art] Signing Cert with AUTHO
5,238,253 UART: RITY.KEYID = 7
5,253,347 UART: [art] Erasing AUTHORITY.KEYID = 7
5,254,112 UART: [art] PUB.X = 518A8B5C54168995230E7F70D7CA72F8BAF453CC045E341BE530F7E3F692FEB82712554DE2EDE50D3EA0865E3C7E5540
5,260,879 UART: [art] PUB.Y = 338AD7B1C3244E4DDCFF0B3C6EBFFBA050325BFA1FA0E84C5824259544BAB343003917EEA9E24972FB7C30505A401F8C
5,267,818 UART: [art] SIG.R = E77025D86142DC93BCE9721BC24AC839D513D07358796C49931ACBB72DDA9B188CCE9CB628441A48714665B124BDE208
5,274,587 UART: [art] SIG.S = 688BAEAF92A0022D7F235F1D1B5636D899AAA2B0DAD810E5C3D4762BA0D3E713EC2971CBEF5ED1775B41E5E3C27B6E60
5,298,005 UART: Caliptra RT
5,298,259 UART: [state] CFI Enabled
5,581,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,165 UART:
5,583,181 UART: Running Caliptra ROM ...
5,583,589 UART:
5,583,643 UART: [state] CFI Enabled
5,586,233 UART: [state] LifecycleState = Unprovisioned
5,586,888 UART: [state] DebugLocked = No
5,587,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,589,115 UART: [kat] SHA2-256
6,383,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,387,161 UART: [kat] ++
6,387,313 UART: [kat] sha1
6,391,437 UART: [kat] SHA2-256
6,393,375 UART: [kat] SHA2-384
6,396,116 UART: [kat] SHA2-512-ACC
6,398,016 UART: [kat] ECC-384
6,403,483 UART: [kat] HMAC-384Kdf
6,408,021 UART: [kat] LMS
6,976,217 UART: [kat] --
6,977,174 UART: [update-reset] ++
8,312,335 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,313,471 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
8,463,389 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,993 >>> mbox cmd response: success
2,928,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,989,869 UART:
2,989,885 UART: Running Caliptra FMC ...
2,990,293 UART:
2,990,347 UART: [state] CFI Enabled
3,001,012 UART: [fht] FMC Alias Private Key: 7
3,108,679 UART: [art] Extend RT PCRs Done
3,109,107 UART: [art] Lock RT PCRs Done
3,111,145 UART: [art] Populate DV Done
3,119,642 UART: [fht] FMC Alias Private Key: 7
3,120,818 UART: [art] Derive CDI
3,121,098 UART: [art] Store in in slot 0x4
3,206,367 UART: [art] Derive Key Pair
3,206,727 UART: [art] Store priv key in slot 0x5
3,220,329 UART: [art] Derive Key Pair - Done
3,234,652 UART: [art] Signing Cert with AUTHO
3,235,132 UART: RITY.KEYID = 7
3,250,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,049 UART: [art] PUB.X = C3465D3A586ACC5579E0E627681A47AD2E496531F05D3CCD6EC6FA150D1E46A42D8BC1291FB0E98A818B42858013AD76
3,257,822 UART: [art] PUB.Y = 42F47476ADFCDCC8AA54D697017F07F30688784C7AD2B486A7B5D20FC4AA6CC231BA3112406E1302E47F7E4069ED2199
3,264,763 UART: [art] SIG.R = B9529DC6A9295569D3B8128D45A248FE5CBEE318D0FE16AEFD28631F52CD00D558851154A37F49C92453A4D19EEAC639
3,271,517 UART: [art] SIG.S = 4AD49C2BE869E0CB93D85BEE3CE447DAAF308D99DEC837A66C04FF9C24F22D88E70B12F4CD730119043A3608839C5528
3,295,211 UART: Caliptra RT
3,295,465 UART: [state] CFI Enabled
3,403,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,779 >>> mbox cmd response: failed
4,720,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,726,804 UART:
4,726,820 UART: Running Caliptra FMC ...
4,727,228 UART:
4,727,282 UART: [state] CFI Enabled
4,816,295 UART: [art] Extend RT PCRs Done
4,816,723 UART: [art] Lock RT PCRs Done
4,818,034 UART: [art] Populate DV Done
4,826,429 UART: [fht] FMC Alias Private Key: 7
4,827,517 UART: [art] Derive CDI
4,827,797 UART: [art] Store in in slot 0x4
4,914,080 UART: [art] Derive Key Pair
4,914,440 UART: [art] Store priv key in slot 0x5
4,927,382 UART: [art] Derive Key Pair - Done
4,941,879 UART: [art] Signing Cert with AUTHO
4,942,359 UART: RITY.KEYID = 7
4,957,445 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,210 UART: [art] PUB.X = C3465D3A586ACC5579E0E627681A47AD2E496531F05D3CCD6EC6FA150D1E46A42D8BC1291FB0E98A818B42858013AD76
4,964,983 UART: [art] PUB.Y = 42F47476ADFCDCC8AA54D697017F07F30688784C7AD2B486A7B5D20FC4AA6CC231BA3112406E1302E47F7E4069ED2199
4,971,924 UART: [art] SIG.R = B9529DC6A9295569D3B8128D45A248FE5CBEE318D0FE16AEFD28631F52CD00D558851154A37F49C92453A4D19EEAC639
4,978,678 UART: [art] SIG.S = 4AD49C2BE869E0CB93D85BEE3CE447DAAF308D99DEC837A66C04FF9C24F22D88E70B12F4CD730119043A3608839C5528
5,001,942 UART: Caliptra RT
5,002,196 UART: [state] CFI Enabled
5,286,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,049,708 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,860 UART: [kat] SHA2-256
881,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,906 UART: [kat] ++
886,058 UART: [kat] sha1
890,274 UART: [kat] SHA2-256
892,212 UART: [kat] SHA2-384
894,833 UART: [kat] SHA2-512-ACC
896,734 UART: [kat] ECC-384
902,419 UART: [kat] HMAC-384Kdf
907,069 UART: [kat] LMS
1,475,265 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,722 UART: [fht] Storing FHT @ 0x50003400
1,479,713 UART: [idev] ++
1,479,881 UART: [idev] CDI.KEYID = 6
1,480,241 UART: [idev] SUBJECT.KEYID = 7
1,480,665 UART: [idev] UDS.KEYID = 0
1,481,010 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,435 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,159 UART: [idev] --
1,515,016 UART: [ldev] ++
1,515,184 UART: [ldev] CDI.KEYID = 6
1,515,547 UART: [ldev] SUBJECT.KEYID = 5
1,515,973 UART: [ldev] AUTHORITY.KEYID = 7
1,516,436 UART: [ldev] FE.KEYID = 1
1,521,716 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,973 UART: [ldev] --
1,587,362 UART: [fwproc] Waiting for Commands...
1,588,057 UART: [fwproc] Received command 0x46574c44
1,588,848 UART: [fwproc] Received Image of size 114360 bytes
2,887,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,619 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,956 >>> mbox cmd response: success
3,079,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,081,024 UART: [afmc] ++
3,081,192 UART: [afmc] CDI.KEYID = 6
3,081,554 UART: [afmc] SUBJECT.KEYID = 7
3,081,979 UART: [afmc] AUTHORITY.KEYID = 5
3,116,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,136 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,644 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,529 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,219 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,902 UART: [afmc] --
3,159,832 UART: [cold-reset] --
3,160,584 UART: [state] Locking Datavault
3,161,523 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,127 UART: [state] Locking ICCM
3,162,737 UART: [exit] Launching FMC @ 0x40000130
3,168,066 UART:
3,168,082 UART: Running Caliptra FMC ...
3,168,490 UART:
3,168,633 UART: [state] CFI Enabled
3,179,308 UART: [fht] FMC Alias Private Key: 7
3,286,955 UART: [art] Extend RT PCRs Done
3,287,383 UART: [art] Lock RT PCRs Done
3,288,651 UART: [art] Populate DV Done
3,296,822 UART: [fht] FMC Alias Private Key: 7
3,297,978 UART: [art] Derive CDI
3,298,258 UART: [art] Store in in slot 0x4
3,384,055 UART: [art] Derive Key Pair
3,384,415 UART: [art] Store priv key in slot 0x5
3,398,119 UART: [art] Derive Key Pair - Done
3,412,794 UART: [art] Signing Cert with AUTHO
3,413,274 UART: RITY.KEYID = 7
3,428,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,051 UART: [art] PUB.X = 81B45A1A03C1D0AA245DA651EC8D7DF024B486F29B533C988E77C6BE65D14797F1AC501694A851B3B88E57FF9D7738C1
3,435,824 UART: [art] PUB.Y = B1B3B740334A7B0FE188D41771A25F8F118B5C151F498BCC4D474DDED54F16D1A4A9DD6EE9403C467C16A6D18D3D58B4
3,442,783 UART: [art] SIG.R = F91F37EBF9A1B26FD7CD51888AFED70EFBB3C9683CCC4C228B1174ACAA299586284BCA615E960091BCCAF6A0E3D511AF
3,449,552 UART: [art] SIG.S = 214D1E101293501794FEC66BEB27F8272B30CB2F8F693FA437E310A7A7DA7432BBD43E029C56A7DFEDED3A4146EE69B6
3,472,874 UART: Caliptra RT
3,473,220 UART: [state] CFI Enabled
3,581,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,473 UART:
3,583,489 UART: Running Caliptra ROM ...
3,583,897 UART:
3,584,038 UART: [state] CFI Enabled
3,587,104 UART: [state] LifecycleState = Unprovisioned
3,587,759 UART: [state] DebugLocked = No
3,588,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,918 UART: [kat] SHA2-256
4,383,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,964 UART: [kat] ++
4,388,116 UART: [kat] sha1
4,392,328 UART: [kat] SHA2-256
4,394,266 UART: [kat] SHA2-384
4,397,219 UART: [kat] SHA2-512-ACC
4,399,119 UART: [kat] ECC-384
4,404,596 UART: [kat] HMAC-384Kdf
4,409,178 UART: [kat] LMS
4,977,374 UART: [kat] --
4,978,205 UART: [update-reset] ++
5,016,016 >>> mbox cmd response: failed
5,016,016 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,016,414 UART: ROM Non-Fatal Error: 0x000B001D
5,017,220 UART: [state] Locking Datavault
5,018,114 UART: [state] Locking PCR0, PCR1 and PCR31
5,018,718 UART: [state] Locking ICCM
5,019,272 UART: [exit] Launching FMC @ 0x40000130
5,024,601 UART:
5,024,617 UART: Running Caliptra FMC ...
5,025,025 UART:
5,025,168 UART: [state] CFI Enabled
5,114,171 UART: [art] Extend RT PCRs Done
5,114,599 UART: [art] Lock RT PCRs Done
5,115,922 UART: [art] Populate DV Done
5,124,061 UART: [fht] FMC Alias Private Key: 7
5,125,079 UART: [art] Derive CDI
5,125,359 UART: [art] Store in in slot 0x4
5,211,214 UART: [art] Derive Key Pair
5,211,574 UART: [art] Store priv key in slot 0x5
5,224,292 UART: [art] Derive Key Pair - Done
5,239,069 UART: [art] Signing Cert with AUTHO
5,239,549 UART: RITY.KEYID = 7
5,255,019 UART: [art] Erasing AUTHORITY.KEYID = 7
5,255,784 UART: [art] PUB.X = 81B45A1A03C1D0AA245DA651EC8D7DF024B486F29B533C988E77C6BE65D14797F1AC501694A851B3B88E57FF9D7738C1
5,262,557 UART: [art] PUB.Y = B1B3B740334A7B0FE188D41771A25F8F118B5C151F498BCC4D474DDED54F16D1A4A9DD6EE9403C467C16A6D18D3D58B4
5,269,516 UART: [art] SIG.R = F91F37EBF9A1B26FD7CD51888AFED70EFBB3C9683CCC4C228B1174ACAA299586284BCA615E960091BCCAF6A0E3D511AF
5,276,285 UART: [art] SIG.S = 214D1E101293501794FEC66BEB27F8272B30CB2F8F693FA437E310A7A7DA7432BBD43E029C56A7DFEDED3A4146EE69B6
5,300,311 UART: Caliptra RT
5,300,657 UART: [state] CFI Enabled
5,582,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,781 UART:
5,583,797 UART: Running Caliptra ROM ...
5,584,205 UART:
5,584,346 UART: [state] CFI Enabled
5,587,100 UART: [state] LifecycleState = Unprovisioned
5,587,755 UART: [state] DebugLocked = No
5,588,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,590,088 UART: [kat] SHA2-256
6,384,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,388,134 UART: [kat] ++
6,388,286 UART: [kat] sha1
6,392,662 UART: [kat] SHA2-256
6,394,600 UART: [kat] SHA2-384
6,397,283 UART: [kat] SHA2-512-ACC
6,399,183 UART: [kat] ECC-384
6,404,984 UART: [kat] HMAC-384Kdf
6,409,472 UART: [kat] LMS
6,977,668 UART: [kat] --
6,978,411 UART: [update-reset] ++
8,312,982 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,314,216 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
8,464,134 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,832 >>> mbox cmd response: success
2,930,832 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,992,504 UART:
2,992,520 UART: Running Caliptra FMC ...
2,992,928 UART:
2,993,071 UART: [state] CFI Enabled
3,003,504 UART: [fht] FMC Alias Private Key: 7
3,111,969 UART: [art] Extend RT PCRs Done
3,112,397 UART: [art] Lock RT PCRs Done
3,113,977 UART: [art] Populate DV Done
3,122,060 UART: [fht] FMC Alias Private Key: 7
3,123,054 UART: [art] Derive CDI
3,123,334 UART: [art] Store in in slot 0x4
3,209,073 UART: [art] Derive Key Pair
3,209,433 UART: [art] Store priv key in slot 0x5
3,222,561 UART: [art] Derive Key Pair - Done
3,237,297 UART: [art] Signing Cert with AUTHO
3,237,777 UART: RITY.KEYID = 7
3,252,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,674 UART: [art] PUB.X = 567B5BF3103CA0A90243C348F0D11DE4ABDE983265A840B6E530D20BF1B1AF895D7B068B509A0BCB9677B2DB18D7BFEF
3,260,448 UART: [art] PUB.Y = FC1F09F2119B96908A3A425066514E6DECD72E0BD31262BCE6B76CF714E5C461380730C189FE634D864BCDBCF4A347C8
3,267,397 UART: [art] SIG.R = 10712A90E84075F8C1018503583677767B49970B3F9939AF07FBADCABEE1D3CEA7D6F0183E8779FCE31FC55788989501
3,274,150 UART: [art] SIG.S = 237BD24E9091800A2690541D605D0F25FE13C2077D4EE20D108C07B57CA6C5182B0026E52CBFFD76A3F7684ACDB2F657
3,298,360 UART: Caliptra RT
3,298,706 UART: [state] CFI Enabled
3,406,913 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,724,410 >>> mbox cmd response: failed
4,724,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,729,931 UART:
4,729,947 UART: Running Caliptra FMC ...
4,730,355 UART:
4,730,498 UART: [state] CFI Enabled
4,819,871 UART: [art] Extend RT PCRs Done
4,820,299 UART: [art] Lock RT PCRs Done
4,821,694 UART: [art] Populate DV Done
4,829,621 UART: [fht] FMC Alias Private Key: 7
4,830,567 UART: [art] Derive CDI
4,830,847 UART: [art] Store in in slot 0x4
4,915,980 UART: [art] Derive Key Pair
4,916,340 UART: [art] Store priv key in slot 0x5
4,929,312 UART: [art] Derive Key Pair - Done
4,944,194 UART: [art] Signing Cert with AUTHO
4,944,674 UART: RITY.KEYID = 7
4,959,768 UART: [art] Erasing AUTHORITY.KEYID = 7
4,960,533 UART: [art] PUB.X = 567B5BF3103CA0A90243C348F0D11DE4ABDE983265A840B6E530D20BF1B1AF895D7B068B509A0BCB9677B2DB18D7BFEF
4,967,307 UART: [art] PUB.Y = FC1F09F2119B96908A3A425066514E6DECD72E0BD31262BCE6B76CF714E5C461380730C189FE634D864BCDBCF4A347C8
4,974,256 UART: [art] SIG.R = 10712A90E84075F8C1018503583677767B49970B3F9939AF07FBADCABEE1D3CEA7D6F0183E8779FCE31FC55788989501
4,981,009 UART: [art] SIG.S = 237BD24E9091800A2690541D605D0F25FE13C2077D4EE20D108C07B57CA6C5182B0026E52CBFFD76A3F7684ACDB2F657
5,005,177 UART: Caliptra RT
5,005,523 UART: [state] CFI Enabled
5,287,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,050,185 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
892,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,053 UART: [kat] ++
897,205 UART: [kat] sha1
901,523 UART: [kat] SHA2-256
903,463 UART: [kat] SHA2-384
906,316 UART: [kat] SHA2-512-ACC
908,217 UART: [kat] ECC-384
917,492 UART: [kat] HMAC-384Kdf
922,162 UART: [kat] LMS
1,170,490 UART: [kat] --
1,171,299 UART: [cold-reset] ++
1,171,757 UART: [fht] FHT @ 0x50003400
1,174,460 UART: [idev] ++
1,174,628 UART: [idev] CDI.KEYID = 6
1,174,988 UART: [idev] SUBJECT.KEYID = 7
1,175,412 UART: [idev] UDS.KEYID = 0
1,175,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,120 UART: [idev] Erasing UDS.KEYID = 0
1,200,191 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,844 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,118 >>> mbox cmd response: success
2,774,118 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,775,302 UART: [afmc] ++
2,775,470 UART: [afmc] CDI.KEYID = 6
2,775,832 UART: [afmc] SUBJECT.KEYID = 7
2,776,257 UART: [afmc] AUTHORITY.KEYID = 5
2,811,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,257 UART: [afmc] --
2,855,137 UART: [cold-reset] --
2,855,917 UART: [state] Locking Datavault
2,857,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,708 UART: [state] Locking ICCM
2,858,184 UART: [exit] Launching FMC @ 0x40000130
2,863,513 UART:
2,863,529 UART: Running Caliptra FMC ...
2,863,937 UART:
2,863,991 UART: [state] CFI Enabled
2,874,698 UART: [fht] FMC Alias Private Key: 7
2,982,949 UART: [art] Extend RT PCRs Done
2,983,377 UART: [art] Lock RT PCRs Done
2,984,929 UART: [art] Populate DV Done
2,992,826 UART: [fht] FMC Alias Private Key: 7
2,993,968 UART: [art] Derive CDI
2,994,248 UART: [art] Store in in slot 0x4
3,079,937 UART: [art] Derive Key Pair
3,080,297 UART: [art] Store priv key in slot 0x5
3,093,485 UART: [art] Derive Key Pair - Done
3,108,614 UART: [art] Signing Cert with AUTHO
3,109,094 UART: RITY.KEYID = 7
3,123,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,727 UART: [art] PUB.X = DB94E97115541475E3D00F91A27AC350DAE8991C2C164FAF734B6A3B06B21CCF0340267ACBDAD123FC9477BB596CC768
3,131,498 UART: [art] PUB.Y = 2EF9C1733EBA6FE6382B0F70E8A62751EF1CC58A95BD052B8AC9B89B754C184DD35223B3B1D1629B7FBCE0A6AFB890B4
3,138,460 UART: [art] SIG.R = 7E50EDB4DEB3E26BB8C608F039D46E24E13820DF43845552C91DDC5E17EFC20745BF484B9A74CC0B7501FE6B8DA11520
3,145,230 UART: [art] SIG.S = 90B48BD1B3C4961AA63CDCDD3ACBB87BF70E26541A43E46A12EF67D5940826ECCFBC89096F18141D33BDB9431A684846
3,168,650 UART: Caliptra RT
3,168,904 UART: [state] CFI Enabled
3,276,240 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,996 UART:
3,278,012 UART: Running Caliptra ROM ...
3,278,420 UART:
3,278,475 UART: [state] CFI Enabled
3,281,055 UART: [state] LifecycleState = Unprovisioned
3,281,710 UART: [state] DebugLocked = No
3,282,242 UART: [state] WD Timer not started. Device not locked for debugging
3,283,356 UART: [kat] SHA2-256
4,089,006 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,131 UART: [kat] ++
4,093,283 UART: [kat] sha1
4,097,535 UART: [kat] SHA2-256
4,099,475 UART: [kat] SHA2-384
4,102,292 UART: [kat] SHA2-512-ACC
4,104,192 UART: [kat] ECC-384
4,114,083 UART: [kat] HMAC-384Kdf
4,118,579 UART: [kat] LMS
4,366,907 UART: [kat] --
4,367,655 UART: [update-reset] ++
4,383,276 >>> mbox cmd response: failed
4,383,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,383,672 UART: ROM Non-Fatal Error: 0x000B001D
4,384,630 UART: [state] Locking Datavault
4,385,302 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,906 UART: [state] Locking ICCM
4,386,550 UART: [exit] Launching FMC @ 0x40000130
4,391,879 UART:
4,391,895 UART: Running Caliptra FMC ...
4,392,303 UART:
4,392,357 UART: [state] CFI Enabled
4,481,576 UART: [art] Extend RT PCRs Done
4,482,004 UART: [art] Lock RT PCRs Done
4,483,377 UART: [art] Populate DV Done
4,491,732 UART: [fht] FMC Alias Private Key: 7
4,492,810 UART: [art] Derive CDI
4,493,090 UART: [art] Store in in slot 0x4
4,578,949 UART: [art] Derive Key Pair
4,579,309 UART: [art] Store priv key in slot 0x5
4,592,821 UART: [art] Derive Key Pair - Done
4,607,324 UART: [art] Signing Cert with AUTHO
4,607,804 UART: RITY.KEYID = 7
4,623,228 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,993 UART: [art] PUB.X = DB94E97115541475E3D00F91A27AC350DAE8991C2C164FAF734B6A3B06B21CCF0340267ACBDAD123FC9477BB596CC768
4,630,764 UART: [art] PUB.Y = 2EF9C1733EBA6FE6382B0F70E8A62751EF1CC58A95BD052B8AC9B89B754C184DD35223B3B1D1629B7FBCE0A6AFB890B4
4,637,726 UART: [art] SIG.R = 7E50EDB4DEB3E26BB8C608F039D46E24E13820DF43845552C91DDC5E17EFC20745BF484B9A74CC0B7501FE6B8DA11520
4,644,496 UART: [art] SIG.S = 90B48BD1B3C4961AA63CDCDD3ACBB87BF70E26541A43E46A12EF67D5940826ECCFBC89096F18141D33BDB9431A684846
4,668,422 UART: Caliptra RT
4,668,676 UART: [state] CFI Enabled
4,950,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,689 UART:
4,951,705 UART: Running Caliptra ROM ...
4,952,113 UART:
4,952,168 UART: [state] CFI Enabled
4,954,644 UART: [state] LifecycleState = Unprovisioned
4,955,299 UART: [state] DebugLocked = No
4,955,997 UART: [state] WD Timer not started. Device not locked for debugging
4,957,127 UART: [kat] SHA2-256
5,762,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,766,902 UART: [kat] ++
5,767,054 UART: [kat] sha1
5,771,486 UART: [kat] SHA2-256
5,773,426 UART: [kat] SHA2-384
5,776,007 UART: [kat] SHA2-512-ACC
5,777,907 UART: [kat] ECC-384
5,787,562 UART: [kat] HMAC-384Kdf
5,792,080 UART: [kat] LMS
6,040,408 UART: [kat] --
6,041,140 UART: [update-reset] ++
7,354,033 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,355,144 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,505,010 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,693 >>> mbox cmd response: success
2,626,693 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,688,861 UART:
2,688,877 UART: Running Caliptra FMC ...
2,689,285 UART:
2,689,339 UART: [state] CFI Enabled
2,699,868 UART: [fht] FMC Alias Private Key: 7
2,808,647 UART: [art] Extend RT PCRs Done
2,809,075 UART: [art] Lock RT PCRs Done
2,810,637 UART: [art] Populate DV Done
2,818,938 UART: [fht] FMC Alias Private Key: 7
2,819,876 UART: [art] Derive CDI
2,820,156 UART: [art] Store in in slot 0x4
2,905,903 UART: [art] Derive Key Pair
2,906,263 UART: [art] Store priv key in slot 0x5
2,919,565 UART: [art] Derive Key Pair - Done
2,934,090 UART: [art] Signing Cert with AUTHO
2,934,570 UART: RITY.KEYID = 7
2,949,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,565 UART: [art] PUB.X = C8BBFC42303666A278ED349DD8E0C6099917A1458FFD37C91057AE6D8B1C612D954DDFD5BC06E78F5E7019A700FFFA8E
2,957,321 UART: [art] PUB.Y = 31DA3137BA46DCBA5F292FEACEECA439347A7B9F92F159AFAFDC05A6DCA9CDA26D48B2B9475FB5A3763F1E71EC85FC0D
2,964,297 UART: [art] SIG.R = 60A2A86F919BC91B85D2DD493F44EA62581393F53EE3CD9DFE365B595F79E6902A73C2D367583DE6DD9E2648CA13DEC9
2,971,077 UART: [art] SIG.S = CB1811C0BFA6A5E12A015D0B793458766CEE3EC270229E6124AD6B076B5AF612849A50467383C99531BDFCF670231C99
2,994,705 UART: Caliptra RT
2,994,959 UART: [state] CFI Enabled
3,103,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,643 >>> mbox cmd response: failed
4,096,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,102,540 UART:
4,102,556 UART: Running Caliptra FMC ...
4,102,964 UART:
4,103,018 UART: [state] CFI Enabled
4,192,131 UART: [art] Extend RT PCRs Done
4,192,559 UART: [art] Lock RT PCRs Done
4,193,994 UART: [art] Populate DV Done
4,202,207 UART: [fht] FMC Alias Private Key: 7
4,203,253 UART: [art] Derive CDI
4,203,533 UART: [art] Store in in slot 0x4
4,288,822 UART: [art] Derive Key Pair
4,289,182 UART: [art] Store priv key in slot 0x5
4,302,462 UART: [art] Derive Key Pair - Done
4,317,203 UART: [art] Signing Cert with AUTHO
4,317,683 UART: RITY.KEYID = 7
4,332,973 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,738 UART: [art] PUB.X = C8BBFC42303666A278ED349DD8E0C6099917A1458FFD37C91057AE6D8B1C612D954DDFD5BC06E78F5E7019A700FFFA8E
4,340,494 UART: [art] PUB.Y = 31DA3137BA46DCBA5F292FEACEECA439347A7B9F92F159AFAFDC05A6DCA9CDA26D48B2B9475FB5A3763F1E71EC85FC0D
4,347,470 UART: [art] SIG.R = 60A2A86F919BC91B85D2DD493F44EA62581393F53EE3CD9DFE365B595F79E6902A73C2D367583DE6DD9E2648CA13DEC9
4,354,250 UART: [art] SIG.S = CB1811C0BFA6A5E12A015D0B793458766CEE3EC270229E6124AD6B076B5AF612849A50467383C99531BDFCF670231C99
4,378,740 UART: Caliptra RT
4,378,994 UART: [state] CFI Enabled
4,662,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,845 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,821 UART: [kat] SHA2-512-ACC
908,722 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,655 UART: [idev] ++
1,175,823 UART: [idev] CDI.KEYID = 6
1,176,183 UART: [idev] SUBJECT.KEYID = 7
1,176,607 UART: [idev] UDS.KEYID = 0
1,176,952 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,201,262 UART: [idev] Sha1 KeyId Algorithm
1,209,760 UART: [idev] --
1,210,834 UART: [ldev] ++
1,211,002 UART: [ldev] CDI.KEYID = 6
1,211,365 UART: [ldev] SUBJECT.KEYID = 5
1,211,791 UART: [ldev] AUTHORITY.KEYID = 7
1,212,254 UART: [ldev] FE.KEYID = 1
1,217,598 UART: [ldev] Erasing FE.KEYID = 1
1,244,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,824 UART: [ldev] --
1,283,339 UART: [fwproc] Wait for Commands...
1,284,051 UART: [fwproc] Recv command 0x46574c44
1,284,779 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,302 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,279 >>> mbox cmd response: success
2,774,279 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,775,499 UART: [afmc] ++
2,775,667 UART: [afmc] CDI.KEYID = 6
2,776,029 UART: [afmc] SUBJECT.KEYID = 7
2,776,454 UART: [afmc] AUTHORITY.KEYID = 5
2,811,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,138 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,023 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,742 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,650 UART: [afmc] --
2,855,696 UART: [cold-reset] --
2,856,474 UART: [state] Locking Datavault
2,857,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,131 UART: [state] Locking ICCM
2,858,649 UART: [exit] Launching FMC @ 0x40000130
2,863,978 UART:
2,863,994 UART: Running Caliptra FMC ...
2,864,402 UART:
2,864,545 UART: [state] CFI Enabled
2,875,190 UART: [fht] FMC Alias Private Key: 7
2,983,987 UART: [art] Extend RT PCRs Done
2,984,415 UART: [art] Lock RT PCRs Done
2,986,053 UART: [art] Populate DV Done
2,994,220 UART: [fht] FMC Alias Private Key: 7
2,995,274 UART: [art] Derive CDI
2,995,554 UART: [art] Store in in slot 0x4
3,081,259 UART: [art] Derive Key Pair
3,081,619 UART: [art] Store priv key in slot 0x5
3,094,943 UART: [art] Derive Key Pair - Done
3,110,204 UART: [art] Signing Cert with AUTHO
3,110,684 UART: RITY.KEYID = 7
3,125,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,709 UART: [art] PUB.X = 4A54AD7C0B8D777F90AF3546A2EEE6C1CA19C2BFEF317546635752AEC9E1B848BA85670DD8B1FDE89BD43426BAAB79D9
3,133,493 UART: [art] PUB.Y = CDE66AC601B5D43E989455669D117FC442B0F715D7FC986BD69EFF0FBEC85C03F19A685858B5BC8CDFD2081E873A3E8F
3,140,447 UART: [art] SIG.R = 1DDDC37B8B1A74A643AAFFB3BED331E65662ADF2228C6910497A376739116825C934231C7BEA35D457ACCC5B8D96B23B
3,147,227 UART: [art] SIG.S = F94CDCD62D4AE30E1656031A15A75137589F14C703C11D374E609B7A3E54CB73B87FAF37AAB578FF442CEC0CEFCE96D9
3,171,110 UART: Caliptra RT
3,171,456 UART: [state] CFI Enabled
3,278,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,758 UART:
3,280,774 UART: Running Caliptra ROM ...
3,281,182 UART:
3,281,324 UART: [state] CFI Enabled
3,283,648 UART: [state] LifecycleState = Unprovisioned
3,284,303 UART: [state] DebugLocked = No
3,284,931 UART: [state] WD Timer not started. Device not locked for debugging
3,286,231 UART: [kat] SHA2-256
4,091,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,006 UART: [kat] ++
4,096,158 UART: [kat] sha1
4,100,452 UART: [kat] SHA2-256
4,102,392 UART: [kat] SHA2-384
4,105,129 UART: [kat] SHA2-512-ACC
4,107,029 UART: [kat] ECC-384
4,116,696 UART: [kat] HMAC-384Kdf
4,121,328 UART: [kat] LMS
4,369,656 UART: [kat] --
4,370,492 UART: [update-reset] ++
4,386,567 >>> mbox cmd response: failed
4,386,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,386,981 UART: ROM Non-Fatal Error: 0x000B001D
4,387,905 UART: [state] Locking Datavault
4,388,733 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,337 UART: [state] Locking ICCM
4,389,799 UART: [exit] Launching FMC @ 0x40000130
4,395,128 UART:
4,395,144 UART: Running Caliptra FMC ...
4,395,552 UART:
4,395,695 UART: [state] CFI Enabled
4,485,412 UART: [art] Extend RT PCRs Done
4,485,840 UART: [art] Lock RT PCRs Done
4,486,925 UART: [art] Populate DV Done
4,495,406 UART: [fht] FMC Alias Private Key: 7
4,496,386 UART: [art] Derive CDI
4,496,666 UART: [art] Store in in slot 0x4
4,582,449 UART: [art] Derive Key Pair
4,582,809 UART: [art] Store priv key in slot 0x5
4,595,743 UART: [art] Derive Key Pair - Done
4,610,332 UART: [art] Signing Cert with AUTHO
4,610,812 UART: RITY.KEYID = 7
4,626,024 UART: [art] Erasing AUTHORITY.KEYID = 7
4,626,789 UART: [art] PUB.X = 4A54AD7C0B8D777F90AF3546A2EEE6C1CA19C2BFEF317546635752AEC9E1B848BA85670DD8B1FDE89BD43426BAAB79D9
4,633,573 UART: [art] PUB.Y = CDE66AC601B5D43E989455669D117FC442B0F715D7FC986BD69EFF0FBEC85C03F19A685858B5BC8CDFD2081E873A3E8F
4,640,527 UART: [art] SIG.R = 1DDDC37B8B1A74A643AAFFB3BED331E65662ADF2228C6910497A376739116825C934231C7BEA35D457ACCC5B8D96B23B
4,647,307 UART: [art] SIG.S = F94CDCD62D4AE30E1656031A15A75137589F14C703C11D374E609B7A3E54CB73B87FAF37AAB578FF442CEC0CEFCE96D9
4,670,890 UART: Caliptra RT
4,671,236 UART: [state] CFI Enabled
4,952,989 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,954,559 UART:
4,954,575 UART: Running Caliptra ROM ...
4,954,983 UART:
4,955,125 UART: [state] CFI Enabled
4,958,095 UART: [state] LifecycleState = Unprovisioned
4,958,750 UART: [state] DebugLocked = No
4,959,344 UART: [state] WD Timer not started. Device not locked for debugging
4,960,486 UART: [kat] SHA2-256
5,766,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,770,261 UART: [kat] ++
5,770,413 UART: [kat] sha1
5,774,815 UART: [kat] SHA2-256
5,776,755 UART: [kat] SHA2-384
5,779,508 UART: [kat] SHA2-512-ACC
5,781,408 UART: [kat] ECC-384
5,790,899 UART: [kat] HMAC-384Kdf
5,795,425 UART: [kat] LMS
6,043,753 UART: [kat] --
6,044,565 UART: [update-reset] ++
7,356,330 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,357,513 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,507,379 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,660 >>> mbox cmd response: success
2,627,660 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,689,710 UART:
2,689,726 UART: Running Caliptra FMC ...
2,690,134 UART:
2,690,277 UART: [state] CFI Enabled
2,701,206 UART: [fht] FMC Alias Private Key: 7
2,809,619 UART: [art] Extend RT PCRs Done
2,810,047 UART: [art] Lock RT PCRs Done
2,811,615 UART: [art] Populate DV Done
2,819,950 UART: [fht] FMC Alias Private Key: 7
2,821,060 UART: [art] Derive CDI
2,821,340 UART: [art] Store in in slot 0x4
2,907,417 UART: [art] Derive Key Pair
2,907,777 UART: [art] Store priv key in slot 0x5
2,921,305 UART: [art] Derive Key Pair - Done
2,936,210 UART: [art] Signing Cert with AUTHO
2,936,690 UART: RITY.KEYID = 7
2,952,304 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,069 UART: [art] PUB.X = A861E5E984950E07F6DEDC48052251E9FA8106399589734966BC846EB1987D06956075ACBD8857FA9AE48AB13EF4C8E4
2,959,824 UART: [art] PUB.Y = 56FE01435EC8DCDE0D4E5788957ABEFCE4C11F0DC2616137231C76F7EF94B59BC77EEBD283DA60ACC70159C5FF47B364
2,966,780 UART: [art] SIG.R = 8F8DD3CF6CCA7E5D8DE5DDC7B32799E6B2B0EE001804BC96104064816ACF78DD5778085903A19991928FBCB88799B87D
2,973,527 UART: [art] SIG.S = A17501D72D5152887C8F7F233C2643DBA7A76D06034AB0853494AB921115508742DE59DED5F6FD47BA145AA798E6B195
2,997,373 UART: Caliptra RT
2,997,719 UART: [state] CFI Enabled
3,105,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,429 >>> mbox cmd response: failed
4,098,429 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,103,952 UART:
4,103,968 UART: Running Caliptra FMC ...
4,104,376 UART:
4,104,519 UART: [state] CFI Enabled
4,194,034 UART: [art] Extend RT PCRs Done
4,194,462 UART: [art] Lock RT PCRs Done
4,195,677 UART: [art] Populate DV Done
4,203,888 UART: [fht] FMC Alias Private Key: 7
4,204,848 UART: [art] Derive CDI
4,205,128 UART: [art] Store in in slot 0x4
4,290,879 UART: [art] Derive Key Pair
4,291,239 UART: [art] Store priv key in slot 0x5
4,304,775 UART: [art] Derive Key Pair - Done
4,319,614 UART: [art] Signing Cert with AUTHO
4,320,094 UART: RITY.KEYID = 7
4,335,120 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,885 UART: [art] PUB.X = A861E5E984950E07F6DEDC48052251E9FA8106399589734966BC846EB1987D06956075ACBD8857FA9AE48AB13EF4C8E4
4,342,640 UART: [art] PUB.Y = 56FE01435EC8DCDE0D4E5788957ABEFCE4C11F0DC2616137231C76F7EF94B59BC77EEBD283DA60ACC70159C5FF47B364
4,349,596 UART: [art] SIG.R = 8F8DD3CF6CCA7E5D8DE5DDC7B32799E6B2B0EE001804BC96104064816ACF78DD5778085903A19991928FBCB88799B87D
4,356,343 UART: [art] SIG.S = A17501D72D5152887C8F7F233C2643DBA7A76D06034AB0853494AB921115508742DE59DED5F6FD47BA145AA798E6B195
4,380,241 UART: Caliptra RT
4,380,587 UART: [state] CFI Enabled
4,658,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,704 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,578 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,174,741 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,223 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,190 UART: [ldev] ++
1,209,358 UART: [ldev] CDI.KEYID = 6
1,209,722 UART: [ldev] SUBJECT.KEYID = 5
1,210,149 UART: [ldev] AUTHORITY.KEYID = 7
1,210,612 UART: [ldev] FE.KEYID = 1
1,215,734 UART: [ldev] Erasing FE.KEYID = 1
1,242,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,664 >>> mbox cmd response: success
2,773,664 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,774,873 UART: [afmc] ++
2,775,041 UART: [afmc] CDI.KEYID = 6
2,775,404 UART: [afmc] SUBJECT.KEYID = 7
2,775,830 UART: [afmc] AUTHORITY.KEYID = 5
2,810,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,706 UART: [afmc] --
2,853,690 UART: [cold-reset] --
2,854,530 UART: [state] Locking Datavault
2,855,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,139 UART: [state] Locking ICCM
2,856,781 UART: [exit] Launching FMC @ 0x40000130
2,862,110 UART:
2,862,126 UART: Running Caliptra FMC ...
2,862,534 UART:
2,862,588 UART: [state] CFI Enabled
2,872,789 UART: [fht] FMC Alias Private Key: 7
2,980,750 UART: [art] Extend RT PCRs Done
2,981,178 UART: [art] Lock RT PCRs Done
2,982,492 UART: [art] Populate DV Done
2,990,833 UART: [fht] FMC Alias Private Key: 7
2,991,861 UART: [art] Derive CDI
2,992,141 UART: [art] Store in in slot 0x4
3,077,610 UART: [art] Derive Key Pair
3,077,970 UART: [art] Store priv key in slot 0x5
3,091,058 UART: [art] Derive Key Pair - Done
3,105,992 UART: [art] Signing Cert with AUTHO
3,106,472 UART: RITY.KEYID = 7
3,121,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,099 UART: [art] PUB.X = 5EEC4A9F58F26F052E4C159EBEFB3DA5C8FFA5F44B18EC197AC54106487E190BFE5E3C611C4692DCA800E19D0F8778A7
3,128,853 UART: [art] PUB.Y = 64968C36F7E91FD322B2448DE811740542A79202B9630DD1E6459B55190C64BC86E154F742A9F96D240FAF05148F7A45
3,135,777 UART: [art] SIG.R = D9154A2FE0E70E6FB11A6D1C5F2CB45DA387DCBADC7AE44EE5CC2A0BECB007D3ECEE637F529C1B2707689348E4273046
3,142,557 UART: [art] SIG.S = 185DC7D0B426242D80249D6E6BCC19DC735E8634294BA31A3A2FD915CC89F8FB9B4D9F2B8D5D063FE4B065C6F9813DC2
3,166,027 UART: Caliptra RT
3,166,281 UART: [state] CFI Enabled
3,274,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,775 UART:
3,275,791 UART: Running Caliptra ROM ...
3,276,199 UART:
3,276,254 UART: [state] CFI Enabled
3,279,092 UART: [state] LifecycleState = Unprovisioned
3,279,747 UART: [state] DebugLocked = No
3,280,347 UART: [state] WD Timer not started. Device not locked for debugging
3,281,581 UART: [kat] SHA2-256
4,085,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,260 UART: [kat] ++
4,089,412 UART: [kat] sha1
4,093,546 UART: [kat] SHA2-256
4,095,486 UART: [kat] SHA2-384
4,098,439 UART: [kat] SHA2-512-ACC
4,100,339 UART: [kat] ECC-384
4,109,346 UART: [kat] HMAC-384Kdf
4,113,876 UART: [kat] LMS
4,362,188 UART: [kat] --
4,363,158 UART: [update-reset] ++
4,378,403 >>> mbox cmd response: failed
4,378,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,378,663 UART: ROM Non-Fatal Error: 0x000B001D
4,379,589 UART: [state] Locking Datavault
4,380,293 UART: [state] Locking PCR0, PCR1 and PCR31
4,380,897 UART: [state] Locking ICCM
4,381,375 UART: [exit] Launching FMC @ 0x40000130
4,386,704 UART:
4,386,720 UART: Running Caliptra FMC ...
4,387,128 UART:
4,387,182 UART: [state] CFI Enabled
4,476,323 UART: [art] Extend RT PCRs Done
4,476,751 UART: [art] Lock RT PCRs Done
4,477,908 UART: [art] Populate DV Done
4,486,185 UART: [fht] FMC Alias Private Key: 7
4,487,233 UART: [art] Derive CDI
4,487,513 UART: [art] Store in in slot 0x4
4,573,176 UART: [art] Derive Key Pair
4,573,536 UART: [art] Store priv key in slot 0x5
4,586,658 UART: [art] Derive Key Pair - Done
4,601,436 UART: [art] Signing Cert with AUTHO
4,601,916 UART: RITY.KEYID = 7
4,617,634 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,399 UART: [art] PUB.X = 5EEC4A9F58F26F052E4C159EBEFB3DA5C8FFA5F44B18EC197AC54106487E190BFE5E3C611C4692DCA800E19D0F8778A7
4,625,153 UART: [art] PUB.Y = 64968C36F7E91FD322B2448DE811740542A79202B9630DD1E6459B55190C64BC86E154F742A9F96D240FAF05148F7A45
4,632,077 UART: [art] SIG.R = D9154A2FE0E70E6FB11A6D1C5F2CB45DA387DCBADC7AE44EE5CC2A0BECB007D3ECEE637F529C1B2707689348E4273046
4,638,857 UART: [art] SIG.S = 185DC7D0B426242D80249D6E6BCC19DC735E8634294BA31A3A2FD915CC89F8FB9B4D9F2B8D5D063FE4B065C6F9813DC2
4,662,799 UART: Caliptra RT
4,663,053 UART: [state] CFI Enabled
4,946,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,947,872 UART:
4,947,888 UART: Running Caliptra ROM ...
4,948,296 UART:
4,948,351 UART: [state] CFI Enabled
4,950,863 UART: [state] LifecycleState = Unprovisioned
4,951,518 UART: [state] DebugLocked = No
4,952,170 UART: [state] WD Timer not started. Device not locked for debugging
4,953,512 UART: [kat] SHA2-256
5,757,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,761,191 UART: [kat] ++
5,761,343 UART: [kat] sha1
5,765,513 UART: [kat] SHA2-256
5,767,453 UART: [kat] SHA2-384
5,770,136 UART: [kat] SHA2-512-ACC
5,772,036 UART: [kat] ECC-384
5,781,787 UART: [kat] HMAC-384Kdf
5,786,427 UART: [kat] LMS
6,034,739 UART: [kat] --
6,035,579 UART: [update-reset] ++
7,347,389 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,348,400 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,498,266 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,660 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,286 >>> mbox cmd response: success
2,623,286 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,914 UART:
2,684,930 UART: Running Caliptra FMC ...
2,685,338 UART:
2,685,392 UART: [state] CFI Enabled
2,695,655 UART: [fht] FMC Alias Private Key: 7
2,803,110 UART: [art] Extend RT PCRs Done
2,803,538 UART: [art] Lock RT PCRs Done
2,805,026 UART: [art] Populate DV Done
2,813,455 UART: [fht] FMC Alias Private Key: 7
2,814,403 UART: [art] Derive CDI
2,814,683 UART: [art] Store in in slot 0x4
2,900,152 UART: [art] Derive Key Pair
2,900,512 UART: [art] Store priv key in slot 0x5
2,913,644 UART: [art] Derive Key Pair - Done
2,928,162 UART: [art] Signing Cert with AUTHO
2,928,642 UART: RITY.KEYID = 7
2,943,678 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,443 UART: [art] PUB.X = 939872F32FE29D237AAF8DACC75C35E981CDFDE462D8F7C66A50959B15CE8ED6FFFCBA3B4D773ABB7A858534A1B23ED6
2,951,237 UART: [art] PUB.Y = CDE87586A05C53E77C97D2EB993EFEF49E320EE9D5049952383119922FF8B21E12B3438737066439DA454D7FDD7F5002
2,958,173 UART: [art] SIG.R = A2B4DE63D483EB589F7A3465A5A8960E3BCF471AF3706AD1A60F728238E834BC801095D53A78BF0F07BB30ED1A81E47C
2,964,941 UART: [art] SIG.S = 44AA8DCB89B7044A0BA9E4304888B181F7BF32A0F92DA13FB21292A98AC039EA8FB698403ED02AA7A52BFB4A8CE53517
2,989,048 UART: Caliptra RT
2,989,302 UART: [state] CFI Enabled
3,097,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,436 >>> mbox cmd response: failed
4,085,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,091,277 UART:
4,091,293 UART: Running Caliptra FMC ...
4,091,701 UART:
4,091,755 UART: [state] CFI Enabled
4,181,096 UART: [art] Extend RT PCRs Done
4,181,524 UART: [art] Lock RT PCRs Done
4,182,775 UART: [art] Populate DV Done
4,190,940 UART: [fht] FMC Alias Private Key: 7
4,191,886 UART: [art] Derive CDI
4,192,166 UART: [art] Store in in slot 0x4
4,278,007 UART: [art] Derive Key Pair
4,278,367 UART: [art] Store priv key in slot 0x5
4,291,315 UART: [art] Derive Key Pair - Done
4,306,107 UART: [art] Signing Cert with AUTHO
4,306,587 UART: RITY.KEYID = 7
4,321,727 UART: [art] Erasing AUTHORITY.KEYID = 7
4,322,492 UART: [art] PUB.X = 939872F32FE29D237AAF8DACC75C35E981CDFDE462D8F7C66A50959B15CE8ED6FFFCBA3B4D773ABB7A858534A1B23ED6
4,329,286 UART: [art] PUB.Y = CDE87586A05C53E77C97D2EB993EFEF49E320EE9D5049952383119922FF8B21E12B3438737066439DA454D7FDD7F5002
4,336,222 UART: [art] SIG.R = A2B4DE63D483EB589F7A3465A5A8960E3BCF471AF3706AD1A60F728238E834BC801095D53A78BF0F07BB30ED1A81E47C
4,342,990 UART: [art] SIG.S = 44AA8DCB89B7044A0BA9E4304888B181F7BF32A0F92DA13FB21292A98AC039EA8FB698403ED02AA7A52BFB4A8CE53517
4,366,549 UART: Caliptra RT
4,366,803 UART: [state] CFI Enabled
4,650,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,083,905 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,224 UART: [kat] SHA2-256
902,164 UART: [kat] SHA2-384
904,907 UART: [kat] SHA2-512-ACC
906,808 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,198,762 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] --
1,208,299 UART: [ldev] ++
1,208,467 UART: [ldev] CDI.KEYID = 6
1,208,831 UART: [ldev] SUBJECT.KEYID = 5
1,209,258 UART: [ldev] AUTHORITY.KEYID = 7
1,209,721 UART: [ldev] FE.KEYID = 1
1,214,989 UART: [ldev] Erasing FE.KEYID = 1
1,241,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,281,089 UART: [fwproc] Wait for Commands...
1,281,840 UART: [fwproc] Recv command 0x46574c44
1,282,573 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,629 >>> mbox cmd response: success
2,772,629 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,773,774 UART: [afmc] ++
2,773,942 UART: [afmc] CDI.KEYID = 6
2,774,305 UART: [afmc] SUBJECT.KEYID = 7
2,774,731 UART: [afmc] AUTHORITY.KEYID = 5
2,809,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,169 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,888 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,653 UART: [afmc] --
2,852,657 UART: [cold-reset] --
2,853,509 UART: [state] Locking Datavault
2,854,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,434 UART: [state] Locking ICCM
2,856,098 UART: [exit] Launching FMC @ 0x40000130
2,861,427 UART:
2,861,443 UART: Running Caliptra FMC ...
2,861,851 UART:
2,861,994 UART: [state] CFI Enabled
2,872,583 UART: [fht] FMC Alias Private Key: 7
2,980,826 UART: [art] Extend RT PCRs Done
2,981,254 UART: [art] Lock RT PCRs Done
2,982,722 UART: [art] Populate DV Done
2,990,807 UART: [fht] FMC Alias Private Key: 7
2,991,801 UART: [art] Derive CDI
2,992,081 UART: [art] Store in in slot 0x4
3,077,548 UART: [art] Derive Key Pair
3,077,908 UART: [art] Store priv key in slot 0x5
3,091,100 UART: [art] Derive Key Pair - Done
3,106,109 UART: [art] Signing Cert with AUTHO
3,106,589 UART: RITY.KEYID = 7
3,121,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,240 UART: [art] PUB.X = 3A9797379FDEBF49E3E94A30476C9B8D477B32B1E4DE44B6E08096CCEB3E8401A8DD944791F0D8844F069CB581A51869
3,129,008 UART: [art] PUB.Y = 10B6ABD8D6AC32C1A58BC6B58B4D715446AE2668B8531AE07F727161B7062D00972400F6897D3C8D64F084CFABFA1CB8
3,135,919 UART: [art] SIG.R = A80ABB54768CBEB28C1F93AC5CC09043297C5FB021A1C18ECC04012E5057C6684D64DBE38C2142D8812B4941042CDCAE
3,142,687 UART: [art] SIG.S = 5AABE15654131F8B6E97942FC861F788EC9D4345FA59F7C7F228E1F36D41F1A7F2A3F468DB9E35D8FD4EBD707DEF88A6
3,166,760 UART: Caliptra RT
3,167,106 UART: [state] CFI Enabled
3,274,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,222 UART:
3,276,238 UART: Running Caliptra ROM ...
3,276,646 UART:
3,276,788 UART: [state] CFI Enabled
3,279,812 UART: [state] LifecycleState = Unprovisioned
3,280,467 UART: [state] DebugLocked = No
3,281,099 UART: [state] WD Timer not started. Device not locked for debugging
3,282,409 UART: [kat] SHA2-256
4,085,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,088 UART: [kat] ++
4,090,240 UART: [kat] sha1
4,094,428 UART: [kat] SHA2-256
4,096,368 UART: [kat] SHA2-384
4,099,009 UART: [kat] SHA2-512-ACC
4,100,909 UART: [kat] ECC-384
4,110,966 UART: [kat] HMAC-384Kdf
4,115,566 UART: [kat] LMS
4,363,878 UART: [kat] --
4,364,654 UART: [update-reset] ++
4,379,807 >>> mbox cmd response: failed
4,379,807 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,380,163 UART: ROM Non-Fatal Error: 0x000B001D
4,381,075 UART: [state] Locking Datavault
4,381,757 UART: [state] Locking PCR0, PCR1 and PCR31
4,382,361 UART: [state] Locking ICCM
4,382,963 UART: [exit] Launching FMC @ 0x40000130
4,388,292 UART:
4,388,308 UART: Running Caliptra FMC ...
4,388,716 UART:
4,388,859 UART: [state] CFI Enabled
4,477,970 UART: [art] Extend RT PCRs Done
4,478,398 UART: [art] Lock RT PCRs Done
4,479,409 UART: [art] Populate DV Done
4,487,706 UART: [fht] FMC Alias Private Key: 7
4,488,854 UART: [art] Derive CDI
4,489,134 UART: [art] Store in in slot 0x4
4,575,097 UART: [art] Derive Key Pair
4,575,457 UART: [art] Store priv key in slot 0x5
4,588,559 UART: [art] Derive Key Pair - Done
4,603,146 UART: [art] Signing Cert with AUTHO
4,603,626 UART: RITY.KEYID = 7
4,618,824 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,589 UART: [art] PUB.X = 3A9797379FDEBF49E3E94A30476C9B8D477B32B1E4DE44B6E08096CCEB3E8401A8DD944791F0D8844F069CB581A51869
4,626,357 UART: [art] PUB.Y = 10B6ABD8D6AC32C1A58BC6B58B4D715446AE2668B8531AE07F727161B7062D00972400F6897D3C8D64F084CFABFA1CB8
4,633,268 UART: [art] SIG.R = A80ABB54768CBEB28C1F93AC5CC09043297C5FB021A1C18ECC04012E5057C6684D64DBE38C2142D8812B4941042CDCAE
4,640,036 UART: [art] SIG.S = 5AABE15654131F8B6E97942FC861F788EC9D4345FA59F7C7F228E1F36D41F1A7F2A3F468DB9E35D8FD4EBD707DEF88A6
4,663,915 UART: Caliptra RT
4,664,261 UART: [state] CFI Enabled
4,944,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,945,930 UART:
4,945,946 UART: Running Caliptra ROM ...
4,946,354 UART:
4,946,496 UART: [state] CFI Enabled
4,949,296 UART: [state] LifecycleState = Unprovisioned
4,949,951 UART: [state] DebugLocked = No
4,950,499 UART: [state] WD Timer not started. Device not locked for debugging
4,951,607 UART: [kat] SHA2-256
5,755,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,759,286 UART: [kat] ++
5,759,438 UART: [kat] sha1
5,763,770 UART: [kat] SHA2-256
5,765,710 UART: [kat] SHA2-384
5,768,527 UART: [kat] SHA2-512-ACC
5,770,427 UART: [kat] ECC-384
5,780,516 UART: [kat] HMAC-384Kdf
5,785,220 UART: [kat] LMS
6,033,532 UART: [kat] --
6,034,452 UART: [update-reset] ++
7,346,786 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,347,867 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,497,733 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,863 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,361 >>> mbox cmd response: success
2,622,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,297 UART:
2,684,313 UART: Running Caliptra FMC ...
2,684,721 UART:
2,684,864 UART: [state] CFI Enabled
2,695,551 UART: [fht] FMC Alias Private Key: 7
2,803,446 UART: [art] Extend RT PCRs Done
2,803,874 UART: [art] Lock RT PCRs Done
2,805,500 UART: [art] Populate DV Done
2,813,815 UART: [fht] FMC Alias Private Key: 7
2,814,931 UART: [art] Derive CDI
2,815,211 UART: [art] Store in in slot 0x4
2,901,042 UART: [art] Derive Key Pair
2,901,402 UART: [art] Store priv key in slot 0x5
2,914,318 UART: [art] Derive Key Pair - Done
2,929,218 UART: [art] Signing Cert with AUTHO
2,929,698 UART: RITY.KEYID = 7
2,944,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,637 UART: [art] PUB.X = 5C6DBD09B66C800163F8B42BE2ACA30A7EB19DC18DBA70F6DAADECEE40CB1EB8D9D34ABB663B875ADE02268EAE5B47E2
2,952,429 UART: [art] PUB.Y = 0A6B6F14C3F2950811CAE5A5E07E5AD8C7B82037A400AA84B1FED3682044D17CA9473B16447CA471DDE17B5E3FBD3C0D
2,959,362 UART: [art] SIG.R = 96E8E12645A9993318795489EE537B88B2A0CB3B73129354B03AC3A08699D82450A77C4AFF54C04F39164A6B79ADDD76
2,966,128 UART: [art] SIG.S = A213E8DE2A1B99646DC8FD433E313D5C87DC1ED837900C40103AB61E2A0BAE2F2B0028B0FCAB92B390AACC26EAC615D6
2,990,211 UART: Caliptra RT
2,990,557 UART: [state] CFI Enabled
3,098,512 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,521 >>> mbox cmd response: failed
4,087,521 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,092,944 UART:
4,092,960 UART: Running Caliptra FMC ...
4,093,368 UART:
4,093,511 UART: [state] CFI Enabled
4,182,678 UART: [art] Extend RT PCRs Done
4,183,106 UART: [art] Lock RT PCRs Done
4,184,405 UART: [art] Populate DV Done
4,192,716 UART: [fht] FMC Alias Private Key: 7
4,193,716 UART: [art] Derive CDI
4,193,996 UART: [art] Store in in slot 0x4
4,279,687 UART: [art] Derive Key Pair
4,280,047 UART: [art] Store priv key in slot 0x5
4,292,999 UART: [art] Derive Key Pair - Done
4,307,873 UART: [art] Signing Cert with AUTHO
4,308,353 UART: RITY.KEYID = 7
4,323,953 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,718 UART: [art] PUB.X = 5C6DBD09B66C800163F8B42BE2ACA30A7EB19DC18DBA70F6DAADECEE40CB1EB8D9D34ABB663B875ADE02268EAE5B47E2
4,331,510 UART: [art] PUB.Y = 0A6B6F14C3F2950811CAE5A5E07E5AD8C7B82037A400AA84B1FED3682044D17CA9473B16447CA471DDE17B5E3FBD3C0D
4,338,443 UART: [art] SIG.R = 96E8E12645A9993318795489EE537B88B2A0CB3B73129354B03AC3A08699D82450A77C4AFF54C04F39164A6B79ADDD76
4,345,209 UART: [art] SIG.S = A213E8DE2A1B99646DC8FD433E313D5C87DC1ED837900C40103AB61E2A0BAE2F2B0028B0FCAB92B390AACC26EAC615D6
4,369,226 UART: Caliptra RT
4,369,572 UART: [state] CFI Enabled
4,653,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,089,416 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,276 UART:
192,640 UART: Running Caliptra ROM ...
193,825 UART:
193,974 UART: [state] CFI Enabled
256,681 UART: [state] LifecycleState = Unprovisioned
258,649 UART: [state] DebugLocked = No
260,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,283 UART: [kat] SHA2-256
434,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,491 UART: [kat] ++
445,944 UART: [kat] sha1
457,796 UART: [kat] SHA2-256
460,538 UART: [kat] SHA2-384
465,542 UART: [kat] SHA2-512-ACC
467,879 UART: [kat] ECC-384
2,760,739 UART: [kat] HMAC-384Kdf
2,773,633 UART: [kat] LMS
3,963,934 UART: [kat] --
3,967,793 UART: [cold-reset] ++
3,970,375 UART: [fht] Storing FHT @ 0x50003400
3,982,581 UART: [idev] ++
3,983,155 UART: [idev] CDI.KEYID = 6
3,984,121 UART: [idev] SUBJECT.KEYID = 7
3,985,338 UART: [idev] UDS.KEYID = 0
3,988,235 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,131,847 UART: [idev] Erasing UDS.KEYID = 0
7,321,814 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,579 UART: [idev] --
7,347,958 UART: [ldev] ++
7,348,580 UART: [ldev] CDI.KEYID = 6
7,349,522 UART: [ldev] SUBJECT.KEYID = 5
7,350,739 UART: [ldev] AUTHORITY.KEYID = 7
7,351,989 UART: [ldev] FE.KEYID = 1
7,397,298 UART: [ldev] Erasing FE.KEYID = 1
10,728,969 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,123 UART: [ldev] --
13,089,095 UART: [fwproc] Waiting for Commands...
13,091,417 UART: [fwproc] Received command 0x46574c44
13,093,609 UART: [fwproc] Received Image of size 114036 bytes
17,148,442 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,222,201 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,608,069 >>> mbox cmd response: success
17,609,828 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,753,098 UART: [afmc] ++
17,753,754 UART: [afmc] CDI.KEYID = 6
17,754,843 UART: [afmc] SUBJECT.KEYID = 7
17,755,916 UART: [afmc] AUTHORITY.KEYID = 5
20,983,161 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,704 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,298,281 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,313,122 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,327,357 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,348,685 UART: [afmc] --
23,353,146 UART: [cold-reset] --
23,358,206 UART: [state] Locking Datavault
23,365,707 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,472 UART: [state] Locking ICCM
23,370,112 UART: [exit] Launching FMC @ 0x40000130
23,378,457 UART:
23,378,703 UART: Running Caliptra FMC ...
23,379,807 UART:
23,379,963 UART: [state] CFI Enabled
23,442,261 UART: [fht] FMC Alias Private Key: 7
25,780,255 UART: [art] Extend RT PCRs Done
25,781,470 UART: [art] Lock RT PCRs Done
25,783,178 UART: [art] Populate DV Done
25,788,748 UART: [fht] FMC Alias Private Key: 7
25,790,237 UART: [art] Derive CDI
25,790,974 UART: [art] Store in in slot 0x4
25,851,444 UART: [art] Derive Key Pair
25,852,482 UART: [art] Store priv key in slot 0x5
29,146,370 UART: [art] Derive Key Pair - Done
29,158,995 UART: [art] Signing Cert with AUTHO
29,160,296 UART: RITY.KEYID = 7
31,447,850 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,352 UART: [art] PUB.X = FE4D8E489913B59E5EDA3A61B56DECC81A0DA8945FE18CA900E5E14442137EF2FD206A0F26A9F11BE97F4529CD9E2A04
31,456,600 UART: [art] PUB.Y = 3A40876994A359B69B47065B6264EAF74FB531C45AEBC5753DD6DCFA35F64DD5A7A2DBC3A50146FD203ACA07ED5E21D9
31,463,882 UART: [art] SIG.R = E7D4DEFBFCE003D9E4D9C5BB912EB02F96A0929C9E5852069BCFAC5EEA31B6FDA9A3BC86A8C192D45D508A5ACE21F38B
31,471,297 UART: [art] SIG.S = 4BDC5AFFC926858A4ED4CE0234BE0EBC88237589548B332FF9BC6B8D1632450A0FBAC845655CDA8A63131F2AC9801432
32,776,260 UART: Caliptra RT
32,776,967 UART: [state] CFI Enabled
32,938,333 UART: [rt] RT listening for mailbox commands...
32,940,858 UART:
32,941,216 UART: Running Caliptra ROM ...
32,942,323 UART:
32,942,480 UART: [state] CFI Enabled
33,005,357 UART: [state] LifecycleState = Unprovisioned
33,007,290 UART: [state] DebugLocked = No
33,009,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,013,907 UART: [kat] SHA2-256
33,183,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,194,064 UART: [kat] ++
33,194,689 UART: [kat] sha1
33,204,662 UART: [kat] SHA2-256
33,207,377 UART: [kat] SHA2-384
33,212,781 UART: [kat] SHA2-512-ACC
33,215,139 UART: [kat] ECC-384
35,507,138 UART: [kat] HMAC-384Kdf
35,519,888 UART: [kat] LMS
36,710,241 UART: [kat] --
36,715,205 UART: [update-reset] ++
36,824,680 >>> mbox cmd response: failed
36,826,403 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
36,969,987 UART: ROM Non-Fatal Error: 0x000B001E
36,971,429 UART: [state] Locking Datavault
36,972,592 UART: [state] Locking PCR0, PCR1 and PCR31
36,974,130 UART: [state] Locking ICCM
36,975,032 UART: [exit] Launching FMC @ 0x40000130
36,976,459 UART:
36,976,623 UART: Running Caliptra FMC ...
36,977,740 UART:
36,977,897 UART: [state] CFI Enabled
36,978,815 UART: [art] Extend RT PCRs Done
36,979,955 UART: [art] Lock RT PCRs Done
36,981,020 UART: [art] Populate DV Done
36,982,054 UART: [fht] FMC Alias Private Key: 7
36,983,373 UART: [art] Derive CDI
36,984,109 UART: [art] Store in in slot 0x4
37,010,341 UART: [art] Derive Key Pair
37,011,346 UART: [art] Store priv key in slot 0x5
40,304,211 UART: [art] Derive Key Pair - Done
40,317,308 UART: [art] Signing Cert with AUTHO
40,318,645 UART: RITY.KEYID = 7
42,604,460 UART: [art] Erasing AUTHORITY.KEYID = 7
42,606,018 UART: [art] PUB.X = FE4D8E489913B59E5EDA3A61B56DECC81A0DA8945FE18CA900E5E14442137EF2FD206A0F26A9F11BE97F4529CD9E2A04
42,613,244 UART: [art] PUB.Y = 3A40876994A359B69B47065B6264EAF74FB531C45AEBC5753DD6DCFA35F64DD5A7A2DBC3A50146FD203ACA07ED5E21D9
42,620,463 UART: [art] SIG.R = E7D4DEFBFCE003D9E4D9C5BB912EB02F96A0929C9E5852069BCFAC5EEA31B6FDA9A3BC86A8C192D45D508A5ACE21F38B
42,627,939 UART: [art] SIG.S = 4BDC5AFFC926858A4ED4CE0234BE0EBC88237589548B332FF9BC6B8D1632450A0FBAC845655CDA8A63131F2AC9801432
43,932,966 UART: Caliptra RT
43,933,664 UART: [state] CFI Enabled
44,267,297 UART: [rt] RT listening for mailbox commands...
44,270,039 UART:
44,270,292 UART: Running Caliptra ROM ...
44,271,408 UART:
44,271,573 UART: [state] CFI Enabled
44,333,529 UART: [state] LifecycleState = Unprovisioned
44,335,460 UART: [state] DebugLocked = No
44,337,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,341,724 UART: [kat] SHA2-256
44,511,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,521,935 UART: [kat] ++
44,522,387 UART: [kat] sha1
44,533,783 UART: [kat] SHA2-256
44,536,487 UART: [kat] SHA2-384
44,541,990 UART: [kat] SHA2-512-ACC
44,544,395 UART: [kat] ECC-384
46,835,271 UART: [kat] HMAC-384Kdf
46,847,125 UART: [kat] LMS
48,037,463 UART: [kat] --
48,040,481 UART: [update-reset] ++
52,174,860 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,179,182 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
52,561,140 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,805,803 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,881,588 >>> mbox cmd response: success
17,883,496 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,563,653 UART:
23,564,068 UART: Running Caliptra FMC ...
23,565,181 UART:
23,565,341 UART: [state] CFI Enabled
23,636,275 UART: [fht] FMC Alias Private Key: 7
25,973,824 UART: [art] Extend RT PCRs Done
25,975,048 UART: [art] Lock RT PCRs Done
25,976,536 UART: [art] Populate DV Done
25,981,887 UART: [fht] FMC Alias Private Key: 7
25,983,429 UART: [art] Derive CDI
25,984,191 UART: [art] Store in in slot 0x4
26,044,234 UART: [art] Derive Key Pair
26,045,280 UART: [art] Store priv key in slot 0x5
29,337,999 UART: [art] Derive Key Pair - Done
29,351,155 UART: [art] Signing Cert with AUTHO
29,352,463 UART: RITY.KEYID = 7
31,648,505 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,018 UART: [art] PUB.X = D73C64DEAB3C83C8577842934A19A93F8F5E42A8128AE142BC68AFFFA68F2CF1F3C62CAC7928EDA623DD20EA82363B39
31,657,284 UART: [art] PUB.Y = 4D731042D25E82BA515185146F82B70FE1D9CB2DDC255A8F0AAA1F567ECEDADC32F17F3EA8CA3B3785D222DA96145C2D
31,664,554 UART: [art] SIG.R = 2168225B80125DA6E7EA0729A9415BD2DAB266929B76DCEB062F8A3783C4460DB9FB2EF034B56115F7C12C50E8135715
31,671,911 UART: [art] SIG.S = 2E08A54ABDCD3068FC638A2FE5DD68571962D95CED1760D715367ACA9FCD6AF7B5AE484C7ADC25EC6FC38230063B352F
32,976,934 UART: Caliptra RT
32,977,623 UART: [state] CFI Enabled
33,137,767 UART: [rt] RT listening for mailbox commands...
36,858,117 >>> mbox cmd response: failed
36,860,268 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
37,003,753 UART:
37,004,084 UART: Running Caliptra FMC ...
37,005,132 UART:
37,005,287 UART: [state] CFI Enabled
37,006,157 UART: [art] Extend RT PCRs Done
37,007,308 UART: [art] Lock RT PCRs Done
37,008,303 UART: [art] Populate DV Done
37,009,368 UART: [fht] FMC Alias Private Key: 7
37,010,618 UART: [art] Derive CDI
37,011,350 UART: [art] Store in in slot 0x4
37,039,524 UART: [art] Derive Key Pair
37,040,526 UART: [art] Store priv key in slot 0x5
40,332,974 UART: [art] Derive Key Pair - Done
40,346,022 UART: [art] Signing Cert with AUTHO
40,347,343 UART: RITY.KEYID = 7
42,638,928 UART: [art] Erasing AUTHORITY.KEYID = 7
42,640,436 UART: [art] PUB.X = D73C64DEAB3C83C8577842934A19A93F8F5E42A8128AE142BC68AFFFA68F2CF1F3C62CAC7928EDA623DD20EA82363B39
42,647,700 UART: [art] PUB.Y = 4D731042D25E82BA515185146F82B70FE1D9CB2DDC255A8F0AAA1F567ECEDADC32F17F3EA8CA3B3785D222DA96145C2D
42,654,977 UART: [art] SIG.R = 2168225B80125DA6E7EA0729A9415BD2DAB266929B76DCEB062F8A3783C4460DB9FB2EF034B56115F7C12C50E8135715
42,662,341 UART: [art] SIG.S = 2E08A54ABDCD3068FC638A2FE5DD68571962D95CED1760D715367ACA9FCD6AF7B5AE484C7ADC25EC6FC38230063B352F
43,968,015 UART: Caliptra RT
43,968,742 UART: [state] CFI Enabled
44,298,908 UART: [rt] RT listening for mailbox commands...
52,863,839 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,436 UART:
192,800 UART: Running Caliptra ROM ...
193,994 UART:
603,724 UART: [state] CFI Enabled
614,980 UART: [state] LifecycleState = Unprovisioned
617,043 UART: [state] DebugLocked = No
618,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,229 UART: [kat] SHA2-256
792,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,489 UART: [kat] ++
803,932 UART: [kat] sha1
815,242 UART: [kat] SHA2-256
817,981 UART: [kat] SHA2-384
824,302 UART: [kat] SHA2-512-ACC
826,644 UART: [kat] ECC-384
3,111,276 UART: [kat] HMAC-384Kdf
3,123,093 UART: [kat] LMS
4,313,250 UART: [kat] --
4,318,624 UART: [cold-reset] ++
4,320,772 UART: [fht] Storing FHT @ 0x50003400
4,331,390 UART: [idev] ++
4,332,012 UART: [idev] CDI.KEYID = 6
4,332,936 UART: [idev] SUBJECT.KEYID = 7
4,334,151 UART: [idev] UDS.KEYID = 0
4,337,275 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,480,734 UART: [idev] Erasing UDS.KEYID = 0
7,623,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,353 UART: [idev] --
7,648,177 UART: [ldev] ++
7,648,825 UART: [ldev] CDI.KEYID = 6
7,649,716 UART: [ldev] SUBJECT.KEYID = 5
7,650,932 UART: [ldev] AUTHORITY.KEYID = 7
7,652,219 UART: [ldev] FE.KEYID = 1
7,663,169 UART: [ldev] Erasing FE.KEYID = 1
10,952,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,548 UART: [ldev] --
13,314,493 UART: [fwproc] Waiting for Commands...
13,316,158 UART: [fwproc] Received command 0x46574c44
13,318,347 UART: [fwproc] Received Image of size 114036 bytes
17,372,741 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,442,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,828,218 >>> mbox cmd response: success
17,829,952 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,973,016 UART: [afmc] ++
17,973,653 UART: [afmc] CDI.KEYID = 6
17,974,548 UART: [afmc] SUBJECT.KEYID = 7
17,975,594 UART: [afmc] AUTHORITY.KEYID = 5
21,148,687 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,248 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,519 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,463,067 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,477,863 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,492,125 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,514,014 UART: [afmc] --
23,518,483 UART: [cold-reset] --
23,522,887 UART: [state] Locking Datavault
23,527,835 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,593 UART: [state] Locking ICCM
23,530,826 UART: [exit] Launching FMC @ 0x40000130
23,539,226 UART:
23,539,462 UART: Running Caliptra FMC ...
23,540,564 UART:
23,540,723 UART: [state] CFI Enabled
23,549,335 UART: [fht] FMC Alias Private Key: 7
25,880,300 UART: [art] Extend RT PCRs Done
25,881,521 UART: [art] Lock RT PCRs Done
25,883,360 UART: [art] Populate DV Done
25,888,877 UART: [fht] FMC Alias Private Key: 7
25,890,522 UART: [art] Derive CDI
25,891,336 UART: [art] Store in in slot 0x4
25,933,839 UART: [art] Derive Key Pair
25,934,882 UART: [art] Store priv key in slot 0x5
29,176,957 UART: [art] Derive Key Pair - Done
29,189,732 UART: [art] Signing Cert with AUTHO
29,191,038 UART: RITY.KEYID = 7
31,470,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,075 UART: [art] PUB.X = 46057C2DAB0E33532E2CB1910E2A2C408A7D22B12E170A81C1FF50E2533110C1CCC672377243BECB0D9AE4F177A3BCB5
31,479,337 UART: [art] PUB.Y = A174E96A670A21AE2F3FFF231FEAE0F037B56B1F20F4F70FB63011D94F52ED0C4D0F8D3E711804EA4790C701CC8C822F
31,486,597 UART: [art] SIG.R = AC8F1A9E659F1B1A122D5756B91404FDAA24FA6201C801B28084627EBD59C1D435869AC90785AB25954735649107421B
31,493,960 UART: [art] SIG.S = AAF3D2BF866A4257442A5C4FEB6E0E190A5CCEEB4456429556EA881AEFF62F4AE5D108EF180E35E7E0C705AB927BD23A
32,799,137 UART: Caliptra RT
32,799,846 UART: [state] CFI Enabled
32,917,558 UART: [rt] RT listening for mailbox commands...
32,920,188 UART:
32,920,435 UART: Running Caliptra ROM ...
32,921,539 UART:
32,921,859 UART: [state] CFI Enabled
32,936,716 UART: [state] LifecycleState = Unprovisioned
32,938,703 UART: [state] DebugLocked = No
32,940,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,946,021 UART: [kat] SHA2-256
33,115,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,126,258 UART: [kat] ++
33,126,741 UART: [kat] sha1
33,138,112 UART: [kat] SHA2-256
33,140,801 UART: [kat] SHA2-384
33,145,923 UART: [kat] SHA2-512-ACC
33,148,268 UART: [kat] ECC-384
35,433,452 UART: [kat] HMAC-384Kdf
35,444,705 UART: [kat] LMS
36,634,746 UART: [kat] --
36,638,648 UART: [update-reset] ++
36,747,079 >>> mbox cmd response: failed
36,748,790 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
36,892,116 UART: ROM Non-Fatal Error: 0x000B001E
36,893,552 UART: [state] Locking Datavault
36,894,706 UART: [state] Locking PCR0, PCR1 and PCR31
36,896,244 UART: [state] Locking ICCM
36,897,148 UART: [exit] Launching FMC @ 0x40000130
36,898,571 UART:
36,898,727 UART: Running Caliptra FMC ...
36,899,824 UART:
36,899,984 UART: [state] CFI Enabled
36,900,902 UART: [art] Extend RT PCRs Done
36,902,039 UART: [art] Lock RT PCRs Done
36,903,102 UART: [art] Populate DV Done
36,904,129 UART: [fht] FMC Alias Private Key: 7
36,905,445 UART: [art] Derive CDI
36,906,179 UART: [art] Store in in slot 0x4
36,907,346 UART: [art] Derive Key Pair
36,908,308 UART: [art] Store priv key in slot 0x5
40,109,275 UART: [art] Derive Key Pair - Done
40,122,230 UART: [art] Signing Cert with AUTHO
40,123,646 UART: RITY.KEYID = 7
42,402,862 UART: [art] Erasing AUTHORITY.KEYID = 7
42,404,385 UART: [art] PUB.X = 46057C2DAB0E33532E2CB1910E2A2C408A7D22B12E170A81C1FF50E2533110C1CCC672377243BECB0D9AE4F177A3BCB5
42,411,630 UART: [art] PUB.Y = A174E96A670A21AE2F3FFF231FEAE0F037B56B1F20F4F70FB63011D94F52ED0C4D0F8D3E711804EA4790C701CC8C822F
42,418,918 UART: [art] SIG.R = AC8F1A9E659F1B1A122D5756B91404FDAA24FA6201C801B28084627EBD59C1D435869AC90785AB25954735649107421B
42,426,252 UART: [art] SIG.S = AAF3D2BF866A4257442A5C4FEB6E0E190A5CCEEB4456429556EA881AEFF62F4AE5D108EF180E35E7E0C705AB927BD23A
43,731,658 UART: Caliptra RT
43,732,381 UART: [state] CFI Enabled
44,021,370 UART: [rt] RT listening for mailbox commands...
44,024,233 UART:
44,024,495 UART: Running Caliptra ROM ...
44,025,527 UART:
44,025,842 UART: [state] CFI Enabled
44,036,623 UART: [state] LifecycleState = Unprovisioned
44,038,525 UART: [state] DebugLocked = No
44,040,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,044,699 UART: [kat] SHA2-256
44,214,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,224,985 UART: [kat] ++
44,225,442 UART: [kat] sha1
44,235,624 UART: [kat] SHA2-256
44,238,316 UART: [kat] SHA2-384
44,244,034 UART: [kat] SHA2-512-ACC
44,246,395 UART: [kat] ECC-384
46,529,235 UART: [kat] HMAC-384Kdf
46,539,782 UART: [kat] LMS
47,729,814 UART: [kat] --
47,733,281 UART: [update-reset] ++
51,868,232 UART: [update-reset] Image verified using Vendor ECC Key Index 3
51,871,597 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
52,253,534 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,121,984 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,061,684 >>> mbox cmd response: success
18,063,635 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,698,586 UART:
23,698,990 UART: Running Caliptra FMC ...
23,700,094 UART:
23,700,251 UART: [state] CFI Enabled
23,708,008 UART: [fht] FMC Alias Private Key: 7
26,037,728 UART: [art] Extend RT PCRs Done
26,038,973 UART: [art] Lock RT PCRs Done
26,040,769 UART: [art] Populate DV Done
26,046,071 UART: [fht] FMC Alias Private Key: 7
26,047,616 UART: [art] Derive CDI
26,048,354 UART: [art] Store in in slot 0x4
26,090,794 UART: [art] Derive Key Pair
26,091,846 UART: [art] Store priv key in slot 0x5
29,333,835 UART: [art] Derive Key Pair - Done
29,346,407 UART: [art] Signing Cert with AUTHO
29,347,723 UART: RITY.KEYID = 7
31,627,086 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,592 UART: [art] PUB.X = A7B97F6AEECFDD141FBCC9C73F3CA92B96AB611DB23016560D6C1A7E4404AA1A9E82D108B17B29E5AE6D84FC8ACAE27F
31,635,872 UART: [art] PUB.Y = C0E11209F1E65CB635BAC54A924C6F46CE1B3C08EA1409E351372F58978AFE5C0F336EBED26B3F877AF0D7A2F1A08C7B
31,643,135 UART: [art] SIG.R = 5FA44FC46211E861C4CD8494AA23BCE0DE5E2C11A86DE58BF2C345B2D5715531E359BF9B785EF5380C3FD88DFC567F97
31,650,495 UART: [art] SIG.S = 8C4D905A49B2A65AD5402C8A28EBAF94AC24DE3DD33B857890B5CE50C9AE62FDBBA4C7B6CA64DCBE1654AEBB97901A65
32,955,613 UART: Caliptra RT
32,956,335 UART: [state] CFI Enabled
33,074,014 UART: [rt] RT listening for mailbox commands...
36,712,660 >>> mbox cmd response: failed
36,714,813 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
36,858,073 UART:
36,858,394 UART: Running Caliptra FMC ...
36,859,438 UART:
36,859,608 UART: [state] CFI Enabled
36,860,544 UART: [art] Extend RT PCRs Done
36,861,636 UART: [art] Lock RT PCRs Done
36,862,642 UART: [art] Populate DV Done
36,863,706 UART: [fht] FMC Alias Private Key: 7
36,865,032 UART: [art] Derive CDI
36,865,770 UART: [art] Store in in slot 0x4
36,866,856 UART: [art] Derive Key Pair
36,867,845 UART: [art] Store priv key in slot 0x5
40,068,800 UART: [art] Derive Key Pair - Done
40,081,913 UART: [art] Signing Cert with AUTHO
40,083,219 UART: RITY.KEYID = 7
42,363,008 UART: [art] Erasing AUTHORITY.KEYID = 7
42,364,526 UART: [art] PUB.X = A7B97F6AEECFDD141FBCC9C73F3CA92B96AB611DB23016560D6C1A7E4404AA1A9E82D108B17B29E5AE6D84FC8ACAE27F
42,371,806 UART: [art] PUB.Y = C0E11209F1E65CB635BAC54A924C6F46CE1B3C08EA1409E351372F58978AFE5C0F336EBED26B3F877AF0D7A2F1A08C7B
42,379,048 UART: [art] SIG.R = 5FA44FC46211E861C4CD8494AA23BCE0DE5E2C11A86DE58BF2C345B2D5715531E359BF9B785EF5380C3FD88DFC567F97
42,386,481 UART: [art] SIG.S = 8C4D905A49B2A65AD5402C8A28EBAF94AC24DE3DD33B857890B5CE50C9AE62FDBBA4C7B6CA64DCBE1654AEBB97901A65
43,690,994 UART: Caliptra RT
43,691,693 UART: [state] CFI Enabled
43,981,431 UART: [rt] RT listening for mailbox commands...
52,498,225 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,320 UART:
192,686 UART: Running Caliptra ROM ...
193,874 UART:
194,045 UART: [state] CFI Enabled
262,184 UART: [state] LifecycleState = Unprovisioned
264,105 UART: [state] DebugLocked = No
265,440 UART: [state] WD Timer not started. Device not locked for debugging
269,178 UART: [kat] SHA2-256
448,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,882 UART: [kat] ++
460,419 UART: [kat] sha1
471,192 UART: [kat] SHA2-256
474,194 UART: [kat] SHA2-384
479,208 UART: [kat] SHA2-512-ACC
482,196 UART: [kat] ECC-384
2,942,471 UART: [kat] HMAC-384Kdf
2,968,954 UART: [kat] LMS
3,498,381 UART: [kat] --
3,503,041 UART: [cold-reset] ++
3,504,215 UART: [fht] FHT @ 0x50003400
3,515,640 UART: [idev] ++
3,516,212 UART: [idev] CDI.KEYID = 6
3,517,126 UART: [idev] SUBJECT.KEYID = 7
3,518,340 UART: [idev] UDS.KEYID = 0
3,521,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,648 UART: [idev] Erasing UDS.KEYID = 0
6,022,665 UART: [idev] Sha1 KeyId Algorithm
6,045,440 UART: [idev] --
6,049,600 UART: [ldev] ++
6,050,213 UART: [ldev] CDI.KEYID = 6
6,051,134 UART: [ldev] SUBJECT.KEYID = 5
6,052,299 UART: [ldev] AUTHORITY.KEYID = 7
6,053,539 UART: [ldev] FE.KEYID = 1
6,098,273 UART: [ldev] Erasing FE.KEYID = 1
8,601,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,465 UART: [ldev] --
10,411,379 UART: [fwproc] Wait for Commands...
10,414,501 UART: [fwproc] Recv command 0x46574c44
10,416,594 UART: [fwproc] Recv'd Img size: 114360 bytes
13,822,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,895,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,282,888 >>> mbox cmd response: success
14,285,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,429,192 UART: [afmc] ++
14,429,834 UART: [afmc] CDI.KEYID = 6
14,430,729 UART: [afmc] SUBJECT.KEYID = 7
14,431,794 UART: [afmc] AUTHORITY.KEYID = 5
16,827,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,974 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,569,886 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,585,754 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,601,476 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,624,139 UART: [afmc] --
18,627,044 UART: [cold-reset] --
18,630,150 UART: [state] Locking Datavault
18,635,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,778 UART: [state] Locking ICCM
18,639,034 UART: [exit] Launching FMC @ 0x40000130
18,647,438 UART:
18,647,673 UART: Running Caliptra FMC ...
18,648,775 UART:
18,648,952 UART: [state] CFI Enabled
18,710,580 UART: [fht] FMC Alias Private Key: 7
20,474,298 UART: [art] Extend RT PCRs Done
20,475,516 UART: [art] Lock RT PCRs Done
20,477,169 UART: [art] Populate DV Done
20,482,844 UART: [fht] FMC Alias Private Key: 7
20,484,433 UART: [art] Derive CDI
20,485,170 UART: [art] Store in in slot 0x4
20,543,214 UART: [art] Derive Key Pair
20,544,256 UART: [art] Store priv key in slot 0x5
23,007,090 UART: [art] Derive Key Pair - Done
23,019,676 UART: [art] Signing Cert with AUTHO
23,021,018 UART: RITY.KEYID = 7
24,732,791 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,295 UART: [art] PUB.X = 2DC808E2DB5128CF49CCA0E2DF477931CD7C34DA899F67006AE82EBBC2A458873FA268854CF3C999AF22143D61A895FD
24,741,561 UART: [art] PUB.Y = 07F3324857207ACDF4A1F459A6D8827325D9EA2BD524D75EA48380A90D99022A9CFFE71B8D1267C28D40E6B6DE6A50B3
24,748,832 UART: [art] SIG.R = 5A8E08C392947E38C71CA38F7D030C9AAC6C013C017E115DFAED0B48C89286F764984D251A168DD6CDACABCBCD660269
24,756,183 UART: [art] SIG.S = 23081CF10626C9379A33A0664811E0133266FD8D5B8378F875A4583DD852961519004FECE2B4F758F6EE5084F4FB0BD2
25,735,426 UART: Caliptra RT
25,736,138 UART: [state] CFI Enabled
25,900,420 UART: [rt] RT listening for mailbox commands...
25,903,161 UART:
25,903,329 UART: Running Caliptra ROM ...
25,904,440 UART:
25,904,597 UART: [state] CFI Enabled
25,969,479 UART: [state] LifecycleState = Unprovisioned
25,971,294 UART: [state] DebugLocked = No
25,973,247 UART: [state] WD Timer not started. Device not locked for debugging
25,977,531 UART: [kat] SHA2-256
26,156,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,168,237 UART: [kat] ++
26,168,689 UART: [kat] sha1
26,178,077 UART: [kat] SHA2-256
26,181,090 UART: [kat] SHA2-384
26,186,585 UART: [kat] SHA2-512-ACC
26,189,533 UART: [kat] ECC-384
28,654,470 UART: [kat] HMAC-384Kdf
28,676,575 UART: [kat] LMS
29,206,020 UART: [kat] --
29,211,044 UART: [update-reset] ++
29,257,207 >>> mbox cmd response: failed
29,258,967 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,403,098 UART: ROM Non-Fatal Error: 0x000B001E
29,404,549 UART: [state] Locking Datavault
29,405,709 UART: [state] Locking PCR0, PCR1 and PCR31
29,407,242 UART: [state] Locking ICCM
29,408,150 UART: [exit] Launching FMC @ 0x40000130
29,409,803 UART:
29,410,007 UART: Running Caliptra FMC ...
29,411,126 UART:
29,411,279 UART: [state] CFI Enabled
29,412,109 UART: [art] Extend RT PCRs Done
29,413,159 UART: [art] Lock RT PCRs Done
29,414,223 UART: [art] Populate DV Done
29,415,168 UART: [fht] FMC Alias Private Key: 7
29,416,401 UART: [art] Derive CDI
29,417,131 UART: [art] Store in in slot 0x4
29,441,361 UART: [art] Derive Key Pair
29,442,363 UART: [art] Store priv key in slot 0x5
31,904,928 UART: [art] Derive Key Pair - Done
31,918,033 UART: [art] Signing Cert with AUTHO
31,919,342 UART: RITY.KEYID = 7
33,630,846 UART: [art] Erasing AUTHORITY.KEYID = 7
33,632,689 UART: [art] PUB.X = 2DC808E2DB5128CF49CCA0E2DF477931CD7C34DA899F67006AE82EBBC2A458873FA268854CF3C999AF22143D61A895FD
33,639,677 UART: [art] PUB.Y = 07F3324857207ACDF4A1F459A6D8827325D9EA2BD524D75EA48380A90D99022A9CFFE71B8D1267C28D40E6B6DE6A50B3
33,646,924 UART: [art] SIG.R = 5A8E08C392947E38C71CA38F7D030C9AAC6C013C017E115DFAED0B48C89286F764984D251A168DD6CDACABCBCD660269
33,654,335 UART: [art] SIG.S = 23081CF10626C9379A33A0664811E0133266FD8D5B8378F875A4583DD852961519004FECE2B4F758F6EE5084F4FB0BD2
34,632,843 UART: Caliptra RT
34,633,534 UART: [state] CFI Enabled
34,973,533 UART: [rt] RT listening for mailbox commands...
34,976,001 UART:
34,976,174 UART: Running Caliptra ROM ...
34,977,231 UART:
34,977,379 UART: [state] CFI Enabled
35,033,751 UART: [state] LifecycleState = Unprovisioned
35,035,624 UART: [state] DebugLocked = No
35,038,308 UART: [state] WD Timer not started. Device not locked for debugging
35,041,893 UART: [kat] SHA2-256
35,221,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,232,607 UART: [kat] ++
35,233,164 UART: [kat] sha1
35,244,813 UART: [kat] SHA2-256
35,247,830 UART: [kat] SHA2-384
35,254,955 UART: [kat] SHA2-512-ACC
35,257,881 UART: [kat] ECC-384
37,719,332 UART: [kat] HMAC-384Kdf
37,744,467 UART: [kat] LMS
38,273,904 UART: [kat] --
38,277,889 UART: [update-reset] ++
41,703,805 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,707,834 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
42,090,848 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,046 UART:
192,417 UART: Running Caliptra ROM ...
193,557 UART:
193,698 UART: [state] CFI Enabled
256,878 UART: [state] LifecycleState = Unprovisioned
259,257 UART: [state] DebugLocked = No
261,553 UART: [state] WD Timer not started. Device not locked for debugging
265,887 UART: [kat] SHA2-256
455,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,275 UART: [kat] ++
466,723 UART: [kat] sha1
478,306 UART: [kat] SHA2-256
481,370 UART: [kat] SHA2-384
487,898 UART: [kat] SHA2-512-ACC
490,513 UART: [kat] ECC-384
2,940,752 UART: [kat] HMAC-384Kdf
2,966,457 UART: [kat] LMS
3,498,252 UART: [kat] --
3,502,406 UART: [cold-reset] ++
3,504,074 UART: [fht] FHT @ 0x50003400
3,514,846 UART: [idev] ++
3,515,523 UART: [idev] CDI.KEYID = 6
3,516,546 UART: [idev] SUBJECT.KEYID = 7
3,517,706 UART: [idev] UDS.KEYID = 0
3,520,552 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,623 UART: [idev] Erasing UDS.KEYID = 0
6,026,103 UART: [idev] Sha1 KeyId Algorithm
6,048,965 UART: [idev] --
6,054,688 UART: [ldev] ++
6,055,371 UART: [ldev] CDI.KEYID = 6
6,056,287 UART: [ldev] SUBJECT.KEYID = 5
6,057,471 UART: [ldev] AUTHORITY.KEYID = 7
6,058,706 UART: [ldev] FE.KEYID = 1
6,095,547 UART: [ldev] Erasing FE.KEYID = 1
8,607,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,551 UART: [ldev] --
10,411,336 UART: [fwproc] Wait for Commands...
10,414,079 UART: [fwproc] Recv command 0x46574c44
10,416,340 UART: [fwproc] Recv'd Img size: 114360 bytes
13,858,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,936,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,596,046 >>> mbox cmd response: success
14,598,217 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,742,022 UART: [afmc] ++
14,742,667 UART: [afmc] CDI.KEYID = 6
14,743,588 UART: [afmc] SUBJECT.KEYID = 7
14,744,698 UART: [afmc] AUTHORITY.KEYID = 5
17,148,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,869,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,871,893 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,887,055 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,902,190 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,917,073 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,941,126 UART: [afmc] --
18,944,077 UART: [cold-reset] --
18,948,810 UART: [state] Locking Datavault
18,954,384 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,515 UART: [state] Locking ICCM
18,959,315 UART: [exit] Launching FMC @ 0x40000130
18,967,978 UART:
18,968,211 UART: Running Caliptra FMC ...
18,969,313 UART:
18,969,469 UART: [state] CFI Enabled
19,027,479 UART: [fht] FMC Alias Private Key: 7
20,791,104 UART: [art] Extend RT PCRs Done
20,792,299 UART: [art] Lock RT PCRs Done
20,793,946 UART: [art] Populate DV Done
20,799,187 UART: [fht] FMC Alias Private Key: 7
20,800,720 UART: [art] Derive CDI
20,801,484 UART: [art] Store in in slot 0x4
20,859,365 UART: [art] Derive Key Pair
20,860,455 UART: [art] Store priv key in slot 0x5
23,323,627 UART: [art] Derive Key Pair - Done
23,336,308 UART: [art] Signing Cert with AUTHO
23,337,631 UART: RITY.KEYID = 7
25,048,988 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,491 UART: [art] PUB.X = 1327F4F8BEF10955890792249ADAC075F9B89247D52EF556C50F02639202F199938EE801B75BEF189918B9699159AA28
25,057,776 UART: [art] PUB.Y = 57A9FA78DD7069BA28B3274A0BC4954134F3AE3C1CE36FEE9F6ED0E6F2112052A52FADE2C7ED667650B71CA68EBCDED5
25,065,055 UART: [art] SIG.R = D9F8FA572EF30BF587CB44FB3FE3673C4CB66253B381C0D9C3D79C1FDB11696DE71FFC81ADBD0084B2E958DF27D8742C
25,072,470 UART: [art] SIG.S = 9158D96A45B9098844347D6AB4766EBDDD3AB5E57A9FA31195C338A20F496152A529C2034781CD78BF7DC9399534445D
26,051,649 UART: Caliptra RT
26,052,370 UART: [state] CFI Enabled
26,217,247 UART: [rt] RT listening for mailbox commands...
26,219,880 UART:
26,220,048 UART: Running Caliptra ROM ...
26,221,157 UART:
26,221,315 UART: [state] CFI Enabled
26,287,677 UART: [state] LifecycleState = Unprovisioned
26,289,774 UART: [state] DebugLocked = No
26,292,295 UART: [state] WD Timer not started. Device not locked for debugging
26,296,488 UART: [kat] SHA2-256
26,486,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,497,100 UART: [kat] ++
26,497,640 UART: [kat] sha1
26,508,804 UART: [kat] SHA2-256
26,511,808 UART: [kat] SHA2-384
26,518,070 UART: [kat] SHA2-512-ACC
26,520,638 UART: [kat] ECC-384
28,967,992 UART: [kat] HMAC-384Kdf
28,990,633 UART: [kat] LMS
29,522,206 UART: [kat] --
29,526,807 UART: [update-reset] ++
29,587,885 >>> mbox cmd response: failed
29,589,577 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,733,380 UART: ROM Non-Fatal Error: 0x000B001E
29,734,815 UART: [state] Locking Datavault
29,735,989 UART: [state] Locking PCR0, PCR1 and PCR31
29,737,533 UART: [state] Locking ICCM
29,738,443 UART: [exit] Launching FMC @ 0x40000130
29,739,864 UART:
29,740,019 UART: Running Caliptra FMC ...
29,741,114 UART:
29,741,269 UART: [state] CFI Enabled
29,742,128 UART: [art] Extend RT PCRs Done
29,743,261 UART: [art] Lock RT PCRs Done
29,744,324 UART: [art] Populate DV Done
29,745,352 UART: [fht] FMC Alias Private Key: 7
29,746,667 UART: [art] Derive CDI
29,747,398 UART: [art] Store in in slot 0x4
29,775,839 UART: [art] Derive Key Pair
29,776,842 UART: [art] Store priv key in slot 0x5
32,239,619 UART: [art] Derive Key Pair - Done
32,252,591 UART: [art] Signing Cert with AUTHO
32,253,900 UART: RITY.KEYID = 7
33,965,463 UART: [art] Erasing AUTHORITY.KEYID = 7
33,967,010 UART: [art] PUB.X = 1327F4F8BEF10955890792249ADAC075F9B89247D52EF556C50F02639202F199938EE801B75BEF189918B9699159AA28
33,974,236 UART: [art] PUB.Y = 57A9FA78DD7069BA28B3274A0BC4954134F3AE3C1CE36FEE9F6ED0E6F2112052A52FADE2C7ED667650B71CA68EBCDED5
33,981,459 UART: [art] SIG.R = D9F8FA572EF30BF587CB44FB3FE3673C4CB66253B381C0D9C3D79C1FDB11696DE71FFC81ADBD0084B2E958DF27D8742C
33,988,876 UART: [art] SIG.S = 9158D96A45B9098844347D6AB4766EBDDD3AB5E57A9FA31195C338A20F496152A529C2034781CD78BF7DC9399534445D
34,967,929 UART: Caliptra RT
34,968,626 UART: [state] CFI Enabled
35,305,880 UART: [rt] RT listening for mailbox commands...
35,308,618 UART:
35,308,784 UART: Running Caliptra ROM ...
35,309,892 UART:
35,310,051 UART: [state] CFI Enabled
35,370,405 UART: [state] LifecycleState = Unprovisioned
35,372,452 UART: [state] DebugLocked = No
35,375,144 UART: [state] WD Timer not started. Device not locked for debugging
35,380,293 UART: [kat] SHA2-256
35,570,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,580,934 UART: [kat] ++
35,581,419 UART: [kat] sha1
35,592,790 UART: [kat] SHA2-256
35,595,809 UART: [kat] SHA2-384
35,600,345 UART: [kat] SHA2-512-ACC
35,602,910 UART: [kat] ECC-384
38,057,109 UART: [kat] HMAC-384Kdf
38,078,470 UART: [kat] LMS
38,610,008 UART: [kat] --
38,614,493 UART: [update-reset] ++
42,075,048 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,077,954 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
42,685,707 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,440,421 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,701,195 >>> mbox cmd response: success
14,703,172 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
18,985,282 UART:
18,985,693 UART: Running Caliptra FMC ...
18,986,848 UART:
18,987,010 UART: [state] CFI Enabled
19,051,064 UART: [fht] FMC Alias Private Key: 7
20,814,697 UART: [art] Extend RT PCRs Done
20,815,921 UART: [art] Lock RT PCRs Done
20,817,879 UART: [art] Populate DV Done
20,823,078 UART: [fht] FMC Alias Private Key: 7
20,824,783 UART: [art] Derive CDI
20,825,602 UART: [art] Store in in slot 0x4
20,883,491 UART: [art] Derive Key Pair
20,884,534 UART: [art] Store priv key in slot 0x5
23,347,520 UART: [art] Derive Key Pair - Done
23,360,679 UART: [art] Signing Cert with AUTHO
23,361,989 UART: RITY.KEYID = 7
25,073,720 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,382 UART: [art] PUB.X = 673D9CBFF8286540B1E47453360D2F03D8D7AAA786DD29F61E2AB037D79151EB9772DA8B6DD2FCE7CA0D1563A8E4215B
25,082,526 UART: [art] PUB.Y = BF69B12910AEDFAA61C25ED4F909D9DFE799F2A5EF4C6C762E8CCCD22A54616B9E6662E636C8047AAA30342853896AEB
25,089,750 UART: [art] SIG.R = 51C60D4AFD556D81CD3CC84C3B535A9826ADA5F4DB5905C455605DC7A010BF4CF134C6122AF41B058E2AAD0CBDC17A11
25,097,158 UART: [art] SIG.S = 39B6C2AF7BF1AA594F7EC32A837E2760EC893DBAA7EF51834C0163D465B60024AE14BC3691C36EEF55E61DA6042881E0
26,075,901 UART: Caliptra RT
26,076,617 UART: [state] CFI Enabled
26,242,806 UART: [rt] RT listening for mailbox commands...
29,516,996 >>> mbox cmd response: failed
29,518,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,662,487 UART:
29,662,808 UART: Running Caliptra FMC ...
29,663,882 UART:
29,664,039 UART: [state] CFI Enabled
29,664,973 UART: [art] Extend RT PCRs Done
29,666,119 UART: [art] Lock RT PCRs Done
29,667,187 UART: [art] Populate DV Done
29,668,282 UART: [fht] FMC Alias Private Key: 7
29,669,624 UART: [art] Derive CDI
29,670,365 UART: [art] Store in in slot 0x4
29,695,899 UART: [art] Derive Key Pair
29,696,906 UART: [art] Store priv key in slot 0x5
32,159,701 UART: [art] Derive Key Pair - Done
32,172,334 UART: [art] Signing Cert with AUTHO
32,173,637 UART: RITY.KEYID = 7
33,885,255 UART: [art] Erasing AUTHORITY.KEYID = 7
33,886,767 UART: [art] PUB.X = 673D9CBFF8286540B1E47453360D2F03D8D7AAA786DD29F61E2AB037D79151EB9772DA8B6DD2FCE7CA0D1563A8E4215B
33,894,051 UART: [art] PUB.Y = BF69B12910AEDFAA61C25ED4F909D9DFE799F2A5EF4C6C762E8CCCD22A54616B9E6662E636C8047AAA30342853896AEB
33,901,336 UART: [art] SIG.R = 51C60D4AFD556D81CD3CC84C3B535A9826ADA5F4DB5905C455605DC7A010BF4CF134C6122AF41B058E2AAD0CBDC17A11
33,908,727 UART: [art] SIG.S = 39B6C2AF7BF1AA594F7EC32A837E2760EC893DBAA7EF51834C0163D465B60024AE14BC3691C36EEF55E61DA6042881E0
34,887,495 UART: Caliptra RT
34,888,203 UART: [state] CFI Enabled
35,237,553 UART: [rt] RT listening for mailbox commands...
42,903,254 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,545 UART:
192,915 UART: Running Caliptra ROM ...
194,018 UART:
603,683 UART: [state] CFI Enabled
615,721 UART: [state] LifecycleState = Unprovisioned
618,085 UART: [state] DebugLocked = No
620,394 UART: [state] WD Timer not started. Device not locked for debugging
624,174 UART: [kat] SHA2-256
814,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,805 UART: [kat] ++
825,392 UART: [kat] sha1
835,196 UART: [kat] SHA2-256
838,254 UART: [kat] SHA2-384
844,608 UART: [kat] SHA2-512-ACC
847,193 UART: [kat] ECC-384
3,292,393 UART: [kat] HMAC-384Kdf
3,305,710 UART: [kat] LMS
3,837,530 UART: [kat] --
3,840,881 UART: [cold-reset] ++
3,842,593 UART: [fht] FHT @ 0x50003400
3,854,868 UART: [idev] ++
3,855,543 UART: [idev] CDI.KEYID = 6
3,856,482 UART: [idev] SUBJECT.KEYID = 7
3,857,693 UART: [idev] UDS.KEYID = 0
3,860,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,178 UART: [idev] Erasing UDS.KEYID = 0
6,333,268 UART: [idev] Sha1 KeyId Algorithm
6,354,990 UART: [idev] --
6,359,252 UART: [ldev] ++
6,359,938 UART: [ldev] CDI.KEYID = 6
6,360,897 UART: [ldev] SUBJECT.KEYID = 5
6,362,062 UART: [ldev] AUTHORITY.KEYID = 7
6,363,247 UART: [ldev] FE.KEYID = 1
6,376,024 UART: [ldev] Erasing FE.KEYID = 1
8,855,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,395 UART: [ldev] --
10,646,158 UART: [fwproc] Wait for Commands...
10,649,391 UART: [fwproc] Recv command 0x46574c44
10,651,650 UART: [fwproc] Recv'd Img size: 114360 bytes
14,097,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,177,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,985 >>> mbox cmd response: success
14,838,127 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,981,862 UART: [afmc] ++
14,982,501 UART: [afmc] CDI.KEYID = 6
14,983,419 UART: [afmc] SUBJECT.KEYID = 7
14,984,528 UART: [afmc] AUTHORITY.KEYID = 5
17,346,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,937 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
19,084,126 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
19,099,229 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
19,114,101 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
19,137,103 UART: [afmc] --
19,141,126 UART: [cold-reset] --
19,146,608 UART: [state] Locking Datavault
19,151,910 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,124 UART: [state] Locking ICCM
19,156,042 UART: [exit] Launching FMC @ 0x40000130
19,164,703 UART:
19,164,940 UART: Running Caliptra FMC ...
19,166,044 UART:
19,166,205 UART: [state] CFI Enabled
19,174,199 UART: [fht] FMC Alias Private Key: 7
20,931,138 UART: [art] Extend RT PCRs Done
20,932,353 UART: [art] Lock RT PCRs Done
20,934,410 UART: [art] Populate DV Done
20,940,054 UART: [fht] FMC Alias Private Key: 7
20,941,710 UART: [art] Derive CDI
20,942,526 UART: [art] Store in in slot 0x4
20,985,171 UART: [art] Derive Key Pair
20,986,169 UART: [art] Store priv key in slot 0x5
23,413,024 UART: [art] Derive Key Pair - Done
23,426,156 UART: [art] Signing Cert with AUTHO
23,427,460 UART: RITY.KEYID = 7
25,133,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,726 UART: [art] PUB.X = 9049D58030633B3BA1224D42EC73072A35572FC2ED30E3D6BFF245A046F8826E83EE9832D5EF019729EB415C2B9324EF
25,141,976 UART: [art] PUB.Y = A5363AE45CB550286B112FEAC3D80EB7EF2D2961C91D6F92978D697F82B5A2F255800DFD3204DB56AF83A6F3F193AB69
25,149,266 UART: [art] SIG.R = 47142DC4E622586CAEF8480727A5B8157B5BA2FD829C7CEC6AEB097FC73822D956E6D0E8EABF6151E0B7A68179DC38E2
25,156,684 UART: [art] SIG.S = 3AB5C1A2332C58C889A85E6DB6D52DB080B40B8A5CABBDF39F8F6A1B99606B4C5BB3C3DDB6350B9534A597067DAAD3EA
26,135,542 UART: Caliptra RT
26,136,241 UART: [state] CFI Enabled
26,253,740 UART: [rt] RT listening for mailbox commands...
26,256,583 UART:
26,256,832 UART: Running Caliptra ROM ...
26,257,888 UART:
26,258,202 UART: [state] CFI Enabled
26,272,623 UART: [state] LifecycleState = Unprovisioned
26,274,454 UART: [state] DebugLocked = No
26,276,766 UART: [state] WD Timer not started. Device not locked for debugging
26,281,959 UART: [kat] SHA2-256
26,471,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,482,571 UART: [kat] ++
26,483,160 UART: [kat] sha1
26,495,995 UART: [kat] SHA2-256
26,499,012 UART: [kat] SHA2-384
26,504,405 UART: [kat] SHA2-512-ACC
26,506,967 UART: [kat] ECC-384
28,949,585 UART: [kat] HMAC-384Kdf
28,963,386 UART: [kat] LMS
29,494,986 UART: [kat] --
29,500,506 UART: [update-reset] ++
29,562,865 >>> mbox cmd response: failed
29,564,559 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,708,254 UART: ROM Non-Fatal Error: 0x000B001E
29,709,705 UART: [state] Locking Datavault
29,710,863 UART: [state] Locking PCR0, PCR1 and PCR31
29,712,400 UART: [state] Locking ICCM
29,713,312 UART: [exit] Launching FMC @ 0x40000130
29,714,740 UART:
29,714,897 UART: Running Caliptra FMC ...
29,716,002 UART:
29,716,164 UART: [state] CFI Enabled
29,717,085 UART: [art] Extend RT PCRs Done
29,718,176 UART: [art] Lock RT PCRs Done
29,719,180 UART: [art] Populate DV Done
29,720,146 UART: [fht] FMC Alias Private Key: 7
29,721,462 UART: [art] Derive CDI
29,722,193 UART: [art] Store in in slot 0x4
29,723,280 UART: [art] Derive Key Pair
29,724,268 UART: [art] Store priv key in slot 0x5
32,112,290 UART: [art] Derive Key Pair - Done
32,125,186 UART: [art] Signing Cert with AUTHO
32,126,493 UART: RITY.KEYID = 7
33,831,785 UART: [art] Erasing AUTHORITY.KEYID = 7
33,833,349 UART: [art] PUB.X = 9049D58030633B3BA1224D42EC73072A35572FC2ED30E3D6BFF245A046F8826E83EE9832D5EF019729EB415C2B9324EF
33,840,598 UART: [art] PUB.Y = A5363AE45CB550286B112FEAC3D80EB7EF2D2961C91D6F92978D697F82B5A2F255800DFD3204DB56AF83A6F3F193AB69
33,847,832 UART: [art] SIG.R = 47142DC4E622586CAEF8480727A5B8157B5BA2FD829C7CEC6AEB097FC73822D956E6D0E8EABF6151E0B7A68179DC38E2
33,855,228 UART: [art] SIG.S = 3AB5C1A2332C58C889A85E6DB6D52DB080B40B8A5CABBDF39F8F6A1B99606B4C5BB3C3DDB6350B9534A597067DAAD3EA
34,833,325 UART: Caliptra RT
34,834,018 UART: [state] CFI Enabled
35,120,708 UART: [rt] RT listening for mailbox commands...
35,123,339 UART:
35,123,540 UART: Running Caliptra ROM ...
35,124,645 UART:
35,124,981 UART: [state] CFI Enabled
40,314,247 UART: [state] LifecycleState = Unprovisioned
40,316,236 UART: [state] DebugLocked = No
40,318,279 UART: [state] WD Timer not started. Device not locked for debugging
40,322,996 UART: [kat] SHA2-256
40,512,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,523,647 UART: [kat] ++
40,524,129 UART: [kat] sha1
40,534,534 UART: [kat] SHA2-256
40,537,533 UART: [kat] SHA2-384
40,543,150 UART: [kat] SHA2-512-ACC
40,545,727 UART: [kat] ECC-384
42,987,099 UART: [kat] HMAC-384Kdf
43,000,312 UART: [kat] LMS
43,531,936 UART: [kat] --
43,535,444 UART: [update-reset] ++
47,000,831 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
47,004,373 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
47,612,089 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,760,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,969,220 >>> mbox cmd response: success
14,971,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
19,224,949 UART:
19,225,373 UART: Running Caliptra FMC ...
19,226,509 UART:
19,226,674 UART: [state] CFI Enabled
19,234,348 UART: [fht] FMC Alias Private Key: 7
20,990,853 UART: [art] Extend RT PCRs Done
20,992,060 UART: [art] Lock RT PCRs Done
20,993,741 UART: [art] Populate DV Done
20,999,101 UART: [fht] FMC Alias Private Key: 7
21,000,817 UART: [art] Derive CDI
21,001,643 UART: [art] Store in in slot 0x4
21,044,384 UART: [art] Derive Key Pair
21,045,459 UART: [art] Store priv key in slot 0x5
23,471,485 UART: [art] Derive Key Pair - Done
23,484,484 UART: [art] Signing Cert with AUTHO
23,485,785 UART: RITY.KEYID = 7
25,191,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,567 UART: [art] PUB.X = 283B036A439CE4F1D9D07E0F615D2D7A90AECC7716BFDFF9A386F157FDFCA8D15EB9A38C70FE8DE9755AF96336B1DE9F
25,199,910 UART: [art] PUB.Y = 2BE6CDD78D374E723EF209D91E8C37C95F366559CCD18059B9E4A852A4D721E89206C33E29019370BA85706091D4A970
25,207,134 UART: [art] SIG.R = EBEB32BA855D598898178F7B515F37B4B2D6CC99B02B9AA180CB12F440713A6596DF33D9E518754570E303AEE0B1EE03
25,214,528 UART: [art] SIG.S = 516138999398A74A3525E32DEAA26392F3F13BBA2338BD4EF7D7A639441AA7B28DCC500577392BD24448F40B45690C13
26,193,001 UART: Caliptra RT
26,193,696 UART: [state] CFI Enabled
26,312,121 UART: [rt] RT listening for mailbox commands...
29,509,299 >>> mbox cmd response: failed
29,511,022 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
29,654,773 UART:
29,655,115 UART: Running Caliptra FMC ...
29,656,242 UART:
29,656,417 UART: [state] CFI Enabled
29,657,341 UART: [art] Extend RT PCRs Done
29,658,481 UART: [art] Lock RT PCRs Done
29,659,555 UART: [art] Populate DV Done
29,660,655 UART: [fht] FMC Alias Private Key: 7
29,661,982 UART: [art] Derive CDI
29,662,721 UART: [art] Store in in slot 0x4
29,663,889 UART: [art] Derive Key Pair
29,664,836 UART: [art] Store priv key in slot 0x5
32,047,252 UART: [art] Derive Key Pair - Done
32,060,097 UART: [art] Signing Cert with AUTHO
32,061,406 UART: RITY.KEYID = 7
33,767,238 UART: [art] Erasing AUTHORITY.KEYID = 7
33,768,745 UART: [art] PUB.X = 283B036A439CE4F1D9D07E0F615D2D7A90AECC7716BFDFF9A386F157FDFCA8D15EB9A38C70FE8DE9755AF96336B1DE9F
33,776,095 UART: [art] PUB.Y = 2BE6CDD78D374E723EF209D91E8C37C95F366559CCD18059B9E4A852A4D721E89206C33E29019370BA85706091D4A970
33,783,320 UART: [art] SIG.R = EBEB32BA855D598898178F7B515F37B4B2D6CC99B02B9AA180CB12F440713A6596DF33D9E518754570E303AEE0B1EE03
33,790,700 UART: [art] SIG.S = 516138999398A74A3525E32DEAA26392F3F13BBA2338BD4EF7D7A639441AA7B28DCC500577392BD24448F40B45690C13
34,769,922 UART: Caliptra RT
34,770,612 UART: [state] CFI Enabled
35,056,562 UART: [rt] RT listening for mailbox commands...
47,901,235 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,482 UART: [kat] HMAC-384Kdf
907,026 UART: [kat] LMS
1,475,222 UART: [kat] --
1,475,961 UART: [cold-reset] ++
1,476,465 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,640 UART: [idev] Erasing UDS.KEYID = 0
1,504,696 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,450 UART: [idev] --
1,514,589 UART: [ldev] ++
1,514,757 UART: [ldev] CDI.KEYID = 6
1,515,120 UART: [ldev] SUBJECT.KEYID = 5
1,515,546 UART: [ldev] AUTHORITY.KEYID = 7
1,516,009 UART: [ldev] FE.KEYID = 1
1,520,951 UART: [ldev] Erasing FE.KEYID = 1
1,545,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,814 UART: [ldev] --
1,585,141 UART: [fwproc] Waiting for Commands...
1,585,760 UART: [fwproc] Received command 0x46574c44
1,586,551 UART: [fwproc] Received Image of size 114360 bytes
2,883,743 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,911,387 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,739 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,582 >>> mbox cmd response: success
3,076,582 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,077,624 UART: [afmc] ++
3,077,792 UART: [afmc] CDI.KEYID = 6
3,078,154 UART: [afmc] SUBJECT.KEYID = 7
3,078,579 UART: [afmc] AUTHORITY.KEYID = 5
3,113,926 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,924 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,704 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,136,416 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,142,327 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,148,034 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,156,026 UART: [afmc] --
3,157,034 UART: [cold-reset] --
3,157,726 UART: [state] Locking Datavault
3,158,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,203 UART: [state] Locking ICCM
3,159,679 UART: [exit] Launching FMC @ 0x40000130
3,165,008 UART:
3,165,024 UART: Running Caliptra FMC ...
3,165,432 UART:
3,165,486 UART: [state] CFI Enabled
3,176,119 UART: [fht] FMC Alias Private Key: 7
3,284,487 UART: [art] Extend RT PCRs Done
3,284,915 UART: [art] Lock RT PCRs Done
3,286,503 UART: [art] Populate DV Done
3,294,694 UART: [fht] FMC Alias Private Key: 7
3,295,876 UART: [art] Derive CDI
3,296,156 UART: [art] Store in in slot 0x4
3,381,385 UART: [art] Derive Key Pair
3,381,745 UART: [art] Store priv key in slot 0x5
3,394,771 UART: [art] Derive Key Pair - Done
3,409,537 UART: [art] Signing Cert with AUTHO
3,410,017 UART: RITY.KEYID = 7
3,425,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,164 UART: [art] PUB.X = 142CCA36903905CBB6727E6E26B9EE748B5F93EEBEE8EFDEA4D750A780D7B3850F28255D1A6255BD69CEBA64605730BE
3,432,942 UART: [art] PUB.Y = 4FB72033F45BEFF18503F1C85E4D2747E3D5A059DC41836DEB76DF25CE48F03B44F177196AD27E1D5E3E6F0DDE5E7BBB
3,439,904 UART: [art] SIG.R = F859DDCA23C4DC5B2E527AEEF2EBDDE0DB53CCC55A2BE762A3A9A32A9754969C9BAE499EAD13D8D166E5C0BF65898C72
3,446,702 UART: [art] SIG.S = D35B306FC3201428F95B61FA01297E97FBDF5C5BCC2E7FA0FE94346B82A9A7C4B6389C21DAD5259B5463AAEC6D9150C6
3,470,314 UART: Caliptra RT
3,470,568 UART: [state] CFI Enabled
3,579,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,648 UART:
3,580,664 UART: Running Caliptra ROM ...
3,581,072 UART:
3,581,126 UART: [state] CFI Enabled
3,583,294 UART: [state] LifecycleState = Unprovisioned
3,583,949 UART: [state] DebugLocked = No
3,584,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,252 UART: [kat] SHA2-256
4,380,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,298 UART: [kat] ++
4,384,450 UART: [kat] sha1
4,388,644 UART: [kat] SHA2-256
4,390,582 UART: [kat] SHA2-384
4,393,415 UART: [kat] SHA2-512-ACC
4,395,315 UART: [kat] ECC-384
4,400,950 UART: [kat] HMAC-384Kdf
4,405,516 UART: [kat] LMS
4,973,712 UART: [kat] --
4,974,427 UART: [update-reset] ++
5,013,288 >>> mbox cmd response: failed
5,013,288 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,013,562 UART: ROM Non-Fatal Error: 0x000B001E
5,014,356 UART: [state] Locking Datavault
5,015,246 UART: [state] Locking PCR0, PCR1 and PCR31
5,015,850 UART: [state] Locking ICCM
5,016,518 UART: [exit] Launching FMC @ 0x40000130
5,021,847 UART:
5,021,863 UART: Running Caliptra FMC ...
5,022,271 UART:
5,022,325 UART: [state] CFI Enabled
5,111,160 UART: [art] Extend RT PCRs Done
5,111,588 UART: [art] Lock RT PCRs Done
5,112,835 UART: [art] Populate DV Done
5,120,944 UART: [fht] FMC Alias Private Key: 7
5,122,032 UART: [art] Derive CDI
5,122,312 UART: [art] Store in in slot 0x4
5,207,913 UART: [art] Derive Key Pair
5,208,273 UART: [art] Store priv key in slot 0x5
5,221,677 UART: [art] Derive Key Pair - Done
5,237,041 UART: [art] Signing Cert with AUTHO
5,237,521 UART: RITY.KEYID = 7
5,252,795 UART: [art] Erasing AUTHORITY.KEYID = 7
5,253,560 UART: [art] PUB.X = 142CCA36903905CBB6727E6E26B9EE748B5F93EEBEE8EFDEA4D750A780D7B3850F28255D1A6255BD69CEBA64605730BE
5,260,338 UART: [art] PUB.Y = 4FB72033F45BEFF18503F1C85E4D2747E3D5A059DC41836DEB76DF25CE48F03B44F177196AD27E1D5E3E6F0DDE5E7BBB
5,267,300 UART: [art] SIG.R = F859DDCA23C4DC5B2E527AEEF2EBDDE0DB53CCC55A2BE762A3A9A32A9754969C9BAE499EAD13D8D166E5C0BF65898C72
5,274,098 UART: [art] SIG.S = D35B306FC3201428F95B61FA01297E97FBDF5C5BCC2E7FA0FE94346B82A9A7C4B6389C21DAD5259B5463AAEC6D9150C6
5,297,204 UART: Caliptra RT
5,297,458 UART: [state] CFI Enabled
5,576,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,578,665 UART:
5,578,681 UART: Running Caliptra ROM ...
5,579,089 UART:
5,579,143 UART: [state] CFI Enabled
5,582,051 UART: [state] LifecycleState = Unprovisioned
5,582,706 UART: [state] DebugLocked = No
5,583,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,585,011 UART: [kat] SHA2-256
6,378,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,383,057 UART: [kat] ++
6,383,209 UART: [kat] sha1
6,387,371 UART: [kat] SHA2-256
6,389,309 UART: [kat] SHA2-384
6,392,196 UART: [kat] SHA2-512-ACC
6,394,096 UART: [kat] ECC-384
6,399,607 UART: [kat] HMAC-384Kdf
6,404,197 UART: [kat] LMS
6,972,393 UART: [kat] --
6,973,102 UART: [update-reset] ++
8,307,580 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,308,628 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
8,458,546 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,821 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,239 >>> mbox cmd response: success
2,926,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,988,149 UART:
2,988,165 UART: Running Caliptra FMC ...
2,988,573 UART:
2,988,627 UART: [state] CFI Enabled
2,998,862 UART: [fht] FMC Alias Private Key: 7
3,106,812 UART: [art] Extend RT PCRs Done
3,107,240 UART: [art] Lock RT PCRs Done
3,108,822 UART: [art] Populate DV Done
3,117,065 UART: [fht] FMC Alias Private Key: 7
3,118,223 UART: [art] Derive CDI
3,118,503 UART: [art] Store in in slot 0x4
3,204,504 UART: [art] Derive Key Pair
3,204,864 UART: [art] Store priv key in slot 0x5
3,218,118 UART: [art] Derive Key Pair - Done
3,232,474 UART: [art] Signing Cert with AUTHO
3,232,954 UART: RITY.KEYID = 7
3,248,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,127 UART: [art] PUB.X = 0BA0D33B8031701F3C7D5E91BB156DFDF30291128780DF558D75F91F912A6FF3715C4D250B362B0925A5A6B0E8112269
3,255,883 UART: [art] PUB.Y = 9A75A8AD210D9F4EC41C581218C1660694DB5092C49D65BC863CE1861EC5626A08248421CB8F7B5B41FDCA809AD3946E
3,262,828 UART: [art] SIG.R = 4A7FEB1830A7EC6D61AB58B4FFC593AE5FA2D8B17CC5617D7064ECFFB6FF9D72CD1B41701B703DA6B22388CE7FE18164
3,269,620 UART: [art] SIG.S = 37C2FA4C3C790E903F17C5CCA80E896F8ACAD7B0FA1267ADE06069D2189B34FF7CD21E1ED475478B4BC49C2E3A221698
3,293,393 UART: Caliptra RT
3,293,647 UART: [state] CFI Enabled
3,402,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,466 >>> mbox cmd response: failed
4,720,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,726,251 UART:
4,726,267 UART: Running Caliptra FMC ...
4,726,675 UART:
4,726,729 UART: [state] CFI Enabled
4,816,300 UART: [art] Extend RT PCRs Done
4,816,728 UART: [art] Lock RT PCRs Done
4,818,061 UART: [art] Populate DV Done
4,826,192 UART: [fht] FMC Alias Private Key: 7
4,827,256 UART: [art] Derive CDI
4,827,536 UART: [art] Store in in slot 0x4
4,913,145 UART: [art] Derive Key Pair
4,913,505 UART: [art] Store priv key in slot 0x5
4,926,775 UART: [art] Derive Key Pair - Done
4,941,693 UART: [art] Signing Cert with AUTHO
4,942,173 UART: RITY.KEYID = 7
4,957,925 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,690 UART: [art] PUB.X = 0BA0D33B8031701F3C7D5E91BB156DFDF30291128780DF558D75F91F912A6FF3715C4D250B362B0925A5A6B0E8112269
4,965,446 UART: [art] PUB.Y = 9A75A8AD210D9F4EC41C581218C1660694DB5092C49D65BC863CE1861EC5626A08248421CB8F7B5B41FDCA809AD3946E
4,972,391 UART: [art] SIG.R = 4A7FEB1830A7EC6D61AB58B4FFC593AE5FA2D8B17CC5617D7064ECFFB6FF9D72CD1B41701B703DA6B22388CE7FE18164
4,979,183 UART: [art] SIG.S = 37C2FA4C3C790E903F17C5CCA80E896F8ACAD7B0FA1267ADE06069D2189B34FF7CD21E1ED475478B4BC49C2E3A221698
5,003,392 UART: Caliptra RT
5,003,646 UART: [state] CFI Enabled
5,284,690 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,046,885 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,839 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,150 UART: [fht] Storing FHT @ 0x50003400
1,479,853 UART: [idev] ++
1,480,021 UART: [idev] CDI.KEYID = 6
1,480,381 UART: [idev] SUBJECT.KEYID = 7
1,480,805 UART: [idev] UDS.KEYID = 0
1,481,150 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,249 UART: [idev] --
1,515,370 UART: [ldev] ++
1,515,538 UART: [ldev] CDI.KEYID = 6
1,515,901 UART: [ldev] SUBJECT.KEYID = 5
1,516,327 UART: [ldev] AUTHORITY.KEYID = 7
1,516,790 UART: [ldev] FE.KEYID = 1
1,522,236 UART: [ldev] Erasing FE.KEYID = 1
1,547,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,727 UART: [ldev] --
1,587,058 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x46574c44
1,588,642 UART: [fwproc] Received Image of size 114360 bytes
2,886,799 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,914,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,396 >>> mbox cmd response: success
3,079,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,080,650 UART: [afmc] ++
3,080,818 UART: [afmc] CDI.KEYID = 6
3,081,180 UART: [afmc] SUBJECT.KEYID = 7
3,081,605 UART: [afmc] AUTHORITY.KEYID = 5
3,116,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,284 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,138,996 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,144,907 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,150,614 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,158,554 UART: [afmc] --
3,159,580 UART: [cold-reset] --
3,160,678 UART: [state] Locking Datavault
3,161,749 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,353 UART: [state] Locking ICCM
3,162,809 UART: [exit] Launching FMC @ 0x40000130
3,168,138 UART:
3,168,154 UART: Running Caliptra FMC ...
3,168,562 UART:
3,168,705 UART: [state] CFI Enabled
3,179,016 UART: [fht] FMC Alias Private Key: 7
3,287,172 UART: [art] Extend RT PCRs Done
3,287,600 UART: [art] Lock RT PCRs Done
3,289,280 UART: [art] Populate DV Done
3,297,331 UART: [fht] FMC Alias Private Key: 7
3,298,321 UART: [art] Derive CDI
3,298,601 UART: [art] Store in in slot 0x4
3,384,464 UART: [art] Derive Key Pair
3,384,824 UART: [art] Store priv key in slot 0x5
3,398,692 UART: [art] Derive Key Pair - Done
3,413,753 UART: [art] Signing Cert with AUTHO
3,414,233 UART: RITY.KEYID = 7
3,429,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,908 UART: [art] PUB.X = 303289B8A635C8CF21C0EA0DA13F43517BC3FDAF280A37F735D010660E6133E8AC5A38204652FEF61B9FBA93EAEC7236
3,436,679 UART: [art] PUB.Y = 5B9E64F6085D73453C38D8AE90C1DD1F485C605A20E2F68EE8689DD7C24B0B2BC248E59B9DC4BA05109A8A13BAF10FDD
3,443,633 UART: [art] SIG.R = C2D0D20155E488DE61A59EEA5F4265192AA37C087CB7F4A116745D77C36BA58C9B2F8D4543C58D15C3921FDB17D1798E
3,450,403 UART: [art] SIG.S = E9EFE34CE80EFA5DF8BD44EC3A0E8F80B781BDDC2A4F53E8EC87BB991DDB9B7CC1370327ABF30DB876B875303072CC5F
3,474,336 UART: Caliptra RT
3,474,682 UART: [state] CFI Enabled
3,583,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,354 UART:
3,585,370 UART: Running Caliptra ROM ...
3,585,778 UART:
3,585,919 UART: [state] CFI Enabled
3,589,025 UART: [state] LifecycleState = Unprovisioned
3,589,680 UART: [state] DebugLocked = No
3,590,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,592,043 UART: [kat] SHA2-256
4,385,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,089 UART: [kat] ++
4,390,241 UART: [kat] sha1
4,394,367 UART: [kat] SHA2-256
4,396,305 UART: [kat] SHA2-384
4,399,006 UART: [kat] SHA2-512-ACC
4,400,906 UART: [kat] ECC-384
4,406,733 UART: [kat] HMAC-384Kdf
4,411,369 UART: [kat] LMS
4,979,565 UART: [kat] --
4,980,384 UART: [update-reset] ++
5,019,471 >>> mbox cmd response: failed
5,019,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,019,983 UART: ROM Non-Fatal Error: 0x000B001E
5,020,979 UART: [state] Locking Datavault
5,021,605 UART: [state] Locking PCR0, PCR1 and PCR31
5,022,209 UART: [state] Locking ICCM
5,022,721 UART: [exit] Launching FMC @ 0x40000130
5,028,050 UART:
5,028,066 UART: Running Caliptra FMC ...
5,028,474 UART:
5,028,617 UART: [state] CFI Enabled
5,117,752 UART: [art] Extend RT PCRs Done
5,118,180 UART: [art] Lock RT PCRs Done
5,119,341 UART: [art] Populate DV Done
5,127,460 UART: [fht] FMC Alias Private Key: 7
5,128,576 UART: [art] Derive CDI
5,128,856 UART: [art] Store in in slot 0x4
5,214,629 UART: [art] Derive Key Pair
5,214,989 UART: [art] Store priv key in slot 0x5
5,228,885 UART: [art] Derive Key Pair - Done
5,243,532 UART: [art] Signing Cert with AUTHO
5,244,012 UART: RITY.KEYID = 7
5,259,050 UART: [art] Erasing AUTHORITY.KEYID = 7
5,259,815 UART: [art] PUB.X = 303289B8A635C8CF21C0EA0DA13F43517BC3FDAF280A37F735D010660E6133E8AC5A38204652FEF61B9FBA93EAEC7236
5,266,586 UART: [art] PUB.Y = 5B9E64F6085D73453C38D8AE90C1DD1F485C605A20E2F68EE8689DD7C24B0B2BC248E59B9DC4BA05109A8A13BAF10FDD
5,273,540 UART: [art] SIG.R = C2D0D20155E488DE61A59EEA5F4265192AA37C087CB7F4A116745D77C36BA58C9B2F8D4543C58D15C3921FDB17D1798E
5,280,310 UART: [art] SIG.S = E9EFE34CE80EFA5DF8BD44EC3A0E8F80B781BDDC2A4F53E8EC87BB991DDB9B7CC1370327ABF30DB876B875303072CC5F
5,304,197 UART: Caliptra RT
5,304,543 UART: [state] CFI Enabled
5,587,643 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,308 UART:
5,589,324 UART: Running Caliptra ROM ...
5,589,732 UART:
5,589,873 UART: [state] CFI Enabled
5,592,651 UART: [state] LifecycleState = Unprovisioned
5,593,306 UART: [state] DebugLocked = No
5,593,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,595,447 UART: [kat] SHA2-256
6,389,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,393,493 UART: [kat] ++
6,393,645 UART: [kat] sha1
6,397,937 UART: [kat] SHA2-256
6,399,875 UART: [kat] SHA2-384
6,402,576 UART: [kat] SHA2-512-ACC
6,404,476 UART: [kat] ECC-384
6,410,035 UART: [kat] HMAC-384Kdf
6,414,499 UART: [kat] LMS
6,982,695 UART: [kat] --
6,983,610 UART: [update-reset] ++
8,317,991 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,319,235 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
8,469,153 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,524 >>> mbox cmd response: success
2,925,524 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,987,172 UART:
2,987,188 UART: Running Caliptra FMC ...
2,987,596 UART:
2,987,739 UART: [state] CFI Enabled
2,998,388 UART: [fht] FMC Alias Private Key: 7
3,106,484 UART: [art] Extend RT PCRs Done
3,106,912 UART: [art] Lock RT PCRs Done
3,108,402 UART: [art] Populate DV Done
3,116,661 UART: [fht] FMC Alias Private Key: 7
3,117,827 UART: [art] Derive CDI
3,118,107 UART: [art] Store in in slot 0x4
3,204,176 UART: [art] Derive Key Pair
3,204,536 UART: [art] Store priv key in slot 0x5
3,218,178 UART: [art] Derive Key Pair - Done
3,232,814 UART: [art] Signing Cert with AUTHO
3,233,294 UART: RITY.KEYID = 7
3,248,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,313 UART: [art] PUB.X = 665C6148FB0DD3605AF591BD085E271BED1EDBB3395DF72FF48C49E5F1712A5B295EEE247835FC55193C2E3B85532788
3,256,083 UART: [art] PUB.Y = 5E7B6CAEE42D3D07E013FBC696F6B69D8EF73CAB03603725AD499EBA44757B47F1C4D5FB2006B9EEAFF0F85F45D5575F
3,263,044 UART: [art] SIG.R = E0BD6432694812F1A383E52846E3028D6A19F5B4EFB7B0A868FDFCB0A406B4684F009CD26D86E1E48627A01EC8FECA4D
3,269,798 UART: [art] SIG.S = 979F960AB8A44736462595754101959508FA711C89F2445FAA24B2D0FFDC1570F07BB76B6613C6EED07C35E7795B84CA
3,293,374 UART: Caliptra RT
3,293,720 UART: [state] CFI Enabled
3,402,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,721,050 >>> mbox cmd response: failed
4,721,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,727,001 UART:
4,727,017 UART: Running Caliptra FMC ...
4,727,425 UART:
4,727,568 UART: [state] CFI Enabled
4,816,347 UART: [art] Extend RT PCRs Done
4,816,775 UART: [art] Lock RT PCRs Done
4,818,182 UART: [art] Populate DV Done
4,826,415 UART: [fht] FMC Alias Private Key: 7
4,827,387 UART: [art] Derive CDI
4,827,667 UART: [art] Store in in slot 0x4
4,913,082 UART: [art] Derive Key Pair
4,913,442 UART: [art] Store priv key in slot 0x5
4,926,744 UART: [art] Derive Key Pair - Done
4,941,836 UART: [art] Signing Cert with AUTHO
4,942,316 UART: RITY.KEYID = 7
4,957,742 UART: [art] Erasing AUTHORITY.KEYID = 7
4,958,507 UART: [art] PUB.X = 665C6148FB0DD3605AF591BD085E271BED1EDBB3395DF72FF48C49E5F1712A5B295EEE247835FC55193C2E3B85532788
4,965,277 UART: [art] PUB.Y = 5E7B6CAEE42D3D07E013FBC696F6B69D8EF73CAB03603725AD499EBA44757B47F1C4D5FB2006B9EEAFF0F85F45D5575F
4,972,238 UART: [art] SIG.R = E0BD6432694812F1A383E52846E3028D6A19F5B4EFB7B0A868FDFCB0A406B4684F009CD26D86E1E48627A01EC8FECA4D
4,978,992 UART: [art] SIG.S = 979F960AB8A44736462595754101959508FA711C89F2445FAA24B2D0FFDC1570F07BB76B6613C6EED07C35E7795B84CA
5,002,582 UART: Caliptra RT
5,002,928 UART: [state] CFI Enabled
5,284,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,046,904 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
917,584 UART: [kat] HMAC-384Kdf
922,228 UART: [kat] LMS
1,170,556 UART: [kat] --
1,171,319 UART: [cold-reset] ++
1,171,699 UART: [fht] FHT @ 0x50003400
1,174,556 UART: [idev] ++
1,174,724 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,508 UART: [idev] UDS.KEYID = 0
1,175,853 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,137 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,696 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,865 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,281,894 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,988 >>> mbox cmd response: success
2,771,988 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,773,248 UART: [afmc] ++
2,773,416 UART: [afmc] CDI.KEYID = 6
2,773,778 UART: [afmc] SUBJECT.KEYID = 7
2,774,203 UART: [afmc] AUTHORITY.KEYID = 5
2,809,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,281 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,993 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,904 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,618 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,326 UART: [afmc] --
2,853,284 UART: [cold-reset] --
2,854,306 UART: [state] Locking Datavault
2,855,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,243 UART: [state] Locking ICCM
2,856,869 UART: [exit] Launching FMC @ 0x40000130
2,862,198 UART:
2,862,214 UART: Running Caliptra FMC ...
2,862,622 UART:
2,862,676 UART: [state] CFI Enabled
2,872,899 UART: [fht] FMC Alias Private Key: 7
2,980,723 UART: [art] Extend RT PCRs Done
2,981,151 UART: [art] Lock RT PCRs Done
2,982,693 UART: [art] Populate DV Done
2,990,672 UART: [fht] FMC Alias Private Key: 7
2,991,690 UART: [art] Derive CDI
2,991,970 UART: [art] Store in in slot 0x4
3,077,403 UART: [art] Derive Key Pair
3,077,763 UART: [art] Store priv key in slot 0x5
3,090,435 UART: [art] Derive Key Pair - Done
3,104,959 UART: [art] Signing Cert with AUTHO
3,105,439 UART: RITY.KEYID = 7
3,121,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,844 UART: [art] PUB.X = B8ADAFFDFFA92785917FDA64A8533A49DF573A421A3BA652786F2722DDDCE2CF81FFAD564D83BEE0C8990AD8648C4F5A
3,128,635 UART: [art] PUB.Y = 80E8337314EF01492C296ABD43D797D3E10453774363363B3760D375F6AA10B11058DDFD6847BBEDA569056CEF9C82DB
3,135,576 UART: [art] SIG.R = 9A9AB1F18ED839C0A98341907C095AD9C1D1BD183A0121A2BF2C370F002B4237A5D14434657495D2B15FAA6DFBDC101A
3,142,323 UART: [art] SIG.S = 50E602AE3BAD32C1B8B4E3FDC06F729D174D98E15D22B40296AD4BCB8B8924BF2DBCAD28AA597DB7E17FAA3531E45B12
3,165,842 UART: Caliptra RT
3,166,096 UART: [state] CFI Enabled
3,273,580 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,222 UART:
3,275,238 UART: Running Caliptra ROM ...
3,275,646 UART:
3,275,701 UART: [state] CFI Enabled
3,278,371 UART: [state] LifecycleState = Unprovisioned
3,279,026 UART: [state] DebugLocked = No
3,279,598 UART: [state] WD Timer not started. Device not locked for debugging
3,280,896 UART: [kat] SHA2-256
4,086,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,090,671 UART: [kat] ++
4,090,823 UART: [kat] sha1
4,095,127 UART: [kat] SHA2-256
4,097,067 UART: [kat] SHA2-384
4,099,816 UART: [kat] SHA2-512-ACC
4,101,716 UART: [kat] ECC-384
4,111,491 UART: [kat] HMAC-384Kdf
4,116,103 UART: [kat] LMS
4,364,431 UART: [kat] --
4,365,041 UART: [update-reset] ++
4,381,852 >>> mbox cmd response: failed
4,381,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,382,362 UART: ROM Non-Fatal Error: 0x000B001E
4,383,280 UART: [state] Locking Datavault
4,383,972 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,576 UART: [state] Locking ICCM
4,385,068 UART: [exit] Launching FMC @ 0x40000130
4,390,397 UART:
4,390,413 UART: Running Caliptra FMC ...
4,390,821 UART:
4,390,875 UART: [state] CFI Enabled
4,479,998 UART: [art] Extend RT PCRs Done
4,480,426 UART: [art] Lock RT PCRs Done
4,481,511 UART: [art] Populate DV Done
4,490,074 UART: [fht] FMC Alias Private Key: 7
4,491,246 UART: [art] Derive CDI
4,491,526 UART: [art] Store in in slot 0x4
4,577,327 UART: [art] Derive Key Pair
4,577,687 UART: [art] Store priv key in slot 0x5
4,591,189 UART: [art] Derive Key Pair - Done
4,605,969 UART: [art] Signing Cert with AUTHO
4,606,449 UART: RITY.KEYID = 7
4,621,655 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,420 UART: [art] PUB.X = B8ADAFFDFFA92785917FDA64A8533A49DF573A421A3BA652786F2722DDDCE2CF81FFAD564D83BEE0C8990AD8648C4F5A
4,629,211 UART: [art] PUB.Y = 80E8337314EF01492C296ABD43D797D3E10453774363363B3760D375F6AA10B11058DDFD6847BBEDA569056CEF9C82DB
4,636,152 UART: [art] SIG.R = 9A9AB1F18ED839C0A98341907C095AD9C1D1BD183A0121A2BF2C370F002B4237A5D14434657495D2B15FAA6DFBDC101A
4,642,899 UART: [art] SIG.S = 50E602AE3BAD32C1B8B4E3FDC06F729D174D98E15D22B40296AD4BCB8B8924BF2DBCAD28AA597DB7E17FAA3531E45B12
4,666,650 UART: Caliptra RT
4,666,904 UART: [state] CFI Enabled
4,948,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,950,271 UART:
4,950,287 UART: Running Caliptra ROM ...
4,950,695 UART:
4,950,750 UART: [state] CFI Enabled
4,953,426 UART: [state] LifecycleState = Unprovisioned
4,954,081 UART: [state] DebugLocked = No
4,954,665 UART: [state] WD Timer not started. Device not locked for debugging
4,955,789 UART: [kat] SHA2-256
5,761,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,765,564 UART: [kat] ++
5,765,716 UART: [kat] sha1
5,769,908 UART: [kat] SHA2-256
5,771,848 UART: [kat] SHA2-384
5,774,585 UART: [kat] SHA2-512-ACC
5,776,485 UART: [kat] ECC-384
5,786,290 UART: [kat] HMAC-384Kdf
5,790,746 UART: [kat] LMS
6,039,074 UART: [kat] --
6,039,862 UART: [update-reset] ++
7,352,191 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,353,214 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,503,080 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,529 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,037 >>> mbox cmd response: success
2,627,037 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,689,335 UART:
2,689,351 UART: Running Caliptra FMC ...
2,689,759 UART:
2,689,813 UART: [state] CFI Enabled
2,700,212 UART: [fht] FMC Alias Private Key: 7
2,808,058 UART: [art] Extend RT PCRs Done
2,808,486 UART: [art] Lock RT PCRs Done
2,810,264 UART: [art] Populate DV Done
2,818,447 UART: [fht] FMC Alias Private Key: 7
2,819,521 UART: [art] Derive CDI
2,819,801 UART: [art] Store in in slot 0x4
2,905,874 UART: [art] Derive Key Pair
2,906,234 UART: [art] Store priv key in slot 0x5
2,919,338 UART: [art] Derive Key Pair - Done
2,933,686 UART: [art] Signing Cert with AUTHO
2,934,166 UART: RITY.KEYID = 7
2,950,004 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,769 UART: [art] PUB.X = CD1BB6B30C82E1EBE56DBD19F56C0095B6E9A801E0A35C9720D907391D2CC86472C7A946AE1C627F913CF94EF342D3EB
2,957,522 UART: [art] PUB.Y = 8E11B256A4A6D0F602DD8B2553FAB9DF7A3A83F16316086676C7EDD3A6C94C752921B62EAA469AE22E6015166BB9BB25
2,964,474 UART: [art] SIG.R = 45412989C043B4B0AB41E52310D9F618DD3BF11D798950E8CBC5B278EE722344C022231E42AB5B20293D502C809A98EB
2,971,242 UART: [art] SIG.S = CEBD6A7901A1E136F51A900BAEDEB7ECD6C14370B6A8252B6614368A43FE8A874718B3C7651672DD45E740B82FBD92A4
2,995,175 UART: Caliptra RT
2,995,429 UART: [state] CFI Enabled
3,102,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,637 >>> mbox cmd response: failed
4,095,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,101,604 UART:
4,101,620 UART: Running Caliptra FMC ...
4,102,028 UART:
4,102,082 UART: [state] CFI Enabled
4,191,543 UART: [art] Extend RT PCRs Done
4,191,971 UART: [art] Lock RT PCRs Done
4,193,264 UART: [art] Populate DV Done
4,201,533 UART: [fht] FMC Alias Private Key: 7
4,202,703 UART: [art] Derive CDI
4,202,983 UART: [art] Store in in slot 0x4
4,288,374 UART: [art] Derive Key Pair
4,288,734 UART: [art] Store priv key in slot 0x5
4,302,136 UART: [art] Derive Key Pair - Done
4,317,210 UART: [art] Signing Cert with AUTHO
4,317,690 UART: RITY.KEYID = 7
4,333,266 UART: [art] Erasing AUTHORITY.KEYID = 7
4,334,031 UART: [art] PUB.X = CD1BB6B30C82E1EBE56DBD19F56C0095B6E9A801E0A35C9720D907391D2CC86472C7A946AE1C627F913CF94EF342D3EB
4,340,784 UART: [art] PUB.Y = 8E11B256A4A6D0F602DD8B2553FAB9DF7A3A83F16316086676C7EDD3A6C94C752921B62EAA469AE22E6015166BB9BB25
4,347,736 UART: [art] SIG.R = 45412989C043B4B0AB41E52310D9F618DD3BF11D798950E8CBC5B278EE722344C022231E42AB5B20293D502C809A98EB
4,354,504 UART: [art] SIG.S = CEBD6A7901A1E136F51A900BAEDEB7ECD6C14370B6A8252B6614368A43FE8A874718B3C7651672DD45E740B82FBD92A4
4,377,673 UART: Caliptra RT
4,377,927 UART: [state] CFI Enabled
4,660,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,736 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
907,193 UART: [kat] SHA2-512-ACC
909,094 UART: [kat] ECC-384
919,059 UART: [kat] HMAC-384Kdf
923,721 UART: [kat] LMS
1,172,049 UART: [kat] --
1,172,954 UART: [cold-reset] ++
1,173,418 UART: [fht] FHT @ 0x50003400
1,175,915 UART: [idev] ++
1,176,083 UART: [idev] CDI.KEYID = 6
1,176,443 UART: [idev] SUBJECT.KEYID = 7
1,176,867 UART: [idev] UDS.KEYID = 0
1,177,212 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,457 UART: [idev] Erasing UDS.KEYID = 0
1,202,008 UART: [idev] Sha1 KeyId Algorithm
1,210,544 UART: [idev] --
1,211,468 UART: [ldev] ++
1,211,636 UART: [ldev] CDI.KEYID = 6
1,211,999 UART: [ldev] SUBJECT.KEYID = 5
1,212,425 UART: [ldev] AUTHORITY.KEYID = 7
1,212,888 UART: [ldev] FE.KEYID = 1
1,218,230 UART: [ldev] Erasing FE.KEYID = 1
1,244,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,330 UART: [ldev] --
1,283,783 UART: [fwproc] Wait for Commands...
1,284,551 UART: [fwproc] Recv command 0x46574c44
1,285,279 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,609,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,195 >>> mbox cmd response: success
2,775,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,776,261 UART: [afmc] ++
2,776,429 UART: [afmc] CDI.KEYID = 6
2,776,791 UART: [afmc] SUBJECT.KEYID = 7
2,777,216 UART: [afmc] AUTHORITY.KEYID = 5
2,813,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,598 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,836,310 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,842,221 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,847,935 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,855,739 UART: [afmc] --
2,856,623 UART: [cold-reset] --
2,857,369 UART: [state] Locking Datavault
2,858,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,162 UART: [state] Locking ICCM
2,859,708 UART: [exit] Launching FMC @ 0x40000130
2,865,037 UART:
2,865,053 UART: Running Caliptra FMC ...
2,865,461 UART:
2,865,604 UART: [state] CFI Enabled
2,876,861 UART: [fht] FMC Alias Private Key: 7
2,984,463 UART: [art] Extend RT PCRs Done
2,984,891 UART: [art] Lock RT PCRs Done
2,986,623 UART: [art] Populate DV Done
2,995,030 UART: [fht] FMC Alias Private Key: 7
2,996,104 UART: [art] Derive CDI
2,996,384 UART: [art] Store in in slot 0x4
3,082,507 UART: [art] Derive Key Pair
3,082,867 UART: [art] Store priv key in slot 0x5
3,096,325 UART: [art] Derive Key Pair - Done
3,111,242 UART: [art] Signing Cert with AUTHO
3,111,722 UART: RITY.KEYID = 7
3,126,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,673 UART: [art] PUB.X = B04859B0D519F49C6C13A8132B4C0A579ED1588BC0A539D9248B8FDFC4983B98C80E3252483E0922BE1081E1790F118F
3,134,429 UART: [art] PUB.Y = D62140F1D46EEDDA03D3D4D43CEA76A731F9FB9109776088FA50DBF6910089DC4FE235F68EDCBFC669FE063F7B43B825
3,141,364 UART: [art] SIG.R = 990E67910B36B51211ECDE2CA1EB1D0CE8DD2115F8072916B4849262D16605F18A691BEF8E58E32ED16A7056FEC80A79
3,148,120 UART: [art] SIG.S = BED0D909A9805D939F98B950519F53A9E504FE52E12466096D7E321CD50FD8B17EF911EB16AA922079BFD3F98AEA12FF
3,171,829 UART: Caliptra RT
3,172,175 UART: [state] CFI Enabled
3,281,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,786 UART:
3,282,802 UART: Running Caliptra ROM ...
3,283,210 UART:
3,283,352 UART: [state] CFI Enabled
3,285,988 UART: [state] LifecycleState = Unprovisioned
3,286,643 UART: [state] DebugLocked = No
3,287,359 UART: [state] WD Timer not started. Device not locked for debugging
3,288,663 UART: [kat] SHA2-256
4,094,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,098,438 UART: [kat] ++
4,098,590 UART: [kat] sha1
4,102,756 UART: [kat] SHA2-256
4,104,696 UART: [kat] SHA2-384
4,107,579 UART: [kat] SHA2-512-ACC
4,109,479 UART: [kat] ECC-384
4,118,986 UART: [kat] HMAC-384Kdf
4,123,424 UART: [kat] LMS
4,371,752 UART: [kat] --
4,372,602 UART: [update-reset] ++
4,389,013 >>> mbox cmd response: failed
4,389,013 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,389,289 UART: ROM Non-Fatal Error: 0x000B001E
4,390,209 UART: [state] Locking Datavault
4,391,033 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,637 UART: [state] Locking ICCM
4,392,251 UART: [exit] Launching FMC @ 0x40000130
4,397,580 UART:
4,397,596 UART: Running Caliptra FMC ...
4,398,004 UART:
4,398,147 UART: [state] CFI Enabled
4,487,162 UART: [art] Extend RT PCRs Done
4,487,590 UART: [art] Lock RT PCRs Done
4,489,025 UART: [art] Populate DV Done
4,497,248 UART: [fht] FMC Alias Private Key: 7
4,498,420 UART: [art] Derive CDI
4,498,700 UART: [art] Store in in slot 0x4
4,584,415 UART: [art] Derive Key Pair
4,584,775 UART: [art] Store priv key in slot 0x5
4,597,397 UART: [art] Derive Key Pair - Done
4,612,294 UART: [art] Signing Cert with AUTHO
4,612,774 UART: RITY.KEYID = 7
4,628,386 UART: [art] Erasing AUTHORITY.KEYID = 7
4,629,151 UART: [art] PUB.X = B04859B0D519F49C6C13A8132B4C0A579ED1588BC0A539D9248B8FDFC4983B98C80E3252483E0922BE1081E1790F118F
4,635,907 UART: [art] PUB.Y = D62140F1D46EEDDA03D3D4D43CEA76A731F9FB9109776088FA50DBF6910089DC4FE235F68EDCBFC669FE063F7B43B825
4,642,842 UART: [art] SIG.R = 990E67910B36B51211ECDE2CA1EB1D0CE8DD2115F8072916B4849262D16605F18A691BEF8E58E32ED16A7056FEC80A79
4,649,598 UART: [art] SIG.S = BED0D909A9805D939F98B950519F53A9E504FE52E12466096D7E321CD50FD8B17EF911EB16AA922079BFD3F98AEA12FF
4,673,725 UART: Caliptra RT
4,674,071 UART: [state] CFI Enabled
4,955,939 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,957,209 UART:
4,957,225 UART: Running Caliptra ROM ...
4,957,633 UART:
4,957,775 UART: [state] CFI Enabled
4,960,549 UART: [state] LifecycleState = Unprovisioned
4,961,204 UART: [state] DebugLocked = No
4,961,776 UART: [state] WD Timer not started. Device not locked for debugging
4,963,108 UART: [kat] SHA2-256
5,768,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,772,883 UART: [kat] ++
5,773,035 UART: [kat] sha1
5,777,139 UART: [kat] SHA2-256
5,779,079 UART: [kat] SHA2-384
5,781,852 UART: [kat] SHA2-512-ACC
5,783,752 UART: [kat] ECC-384
5,793,739 UART: [kat] HMAC-384Kdf
5,798,457 UART: [kat] LMS
6,046,785 UART: [kat] --
6,047,701 UART: [update-reset] ++
7,359,802 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,360,885 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,510,751 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,820 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,954 >>> mbox cmd response: success
2,625,954 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,688,348 UART:
2,688,364 UART: Running Caliptra FMC ...
2,688,772 UART:
2,688,915 UART: [state] CFI Enabled
2,699,230 UART: [fht] FMC Alias Private Key: 7
2,807,358 UART: [art] Extend RT PCRs Done
2,807,786 UART: [art] Lock RT PCRs Done
2,809,406 UART: [art] Populate DV Done
2,817,507 UART: [fht] FMC Alias Private Key: 7
2,818,533 UART: [art] Derive CDI
2,818,813 UART: [art] Store in in slot 0x4
2,904,372 UART: [art] Derive Key Pair
2,904,732 UART: [art] Store priv key in slot 0x5
2,918,316 UART: [art] Derive Key Pair - Done
2,932,796 UART: [art] Signing Cert with AUTHO
2,933,276 UART: RITY.KEYID = 7
2,948,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,551 UART: [art] PUB.X = 93E5781CF9E11B84974D0BFF4CE0F03849FEA4ED3B9526B29928836A24F7405BF9D56C291684AD2C71CC31705228CCCB
2,956,324 UART: [art] PUB.Y = C3B6227DD6F73C0833E5BD902BC3FB96309F02A9AC86AC349D08EF9FB526C13002707A446CAA44289BDF63F7302AC3D4
2,963,272 UART: [art] SIG.R = E9648B20E3E6CB177EE861F79A29A7CADF3110FF3E91B69E1CD41433D67E4EE242F42C25297F546E063AA8013BB85D12
2,970,044 UART: [art] SIG.S = 1D826CCFC18A7A229A251C381553CF714FE9BE7D542C72584C7B0BDA95FB02FCBA71167A7CBE2776EB4C5F82BA725EBD
2,993,313 UART: Caliptra RT
2,993,659 UART: [state] CFI Enabled
3,101,167 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,914 >>> mbox cmd response: failed
4,095,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,101,861 UART:
4,101,877 UART: Running Caliptra FMC ...
4,102,285 UART:
4,102,428 UART: [state] CFI Enabled
4,191,223 UART: [art] Extend RT PCRs Done
4,191,651 UART: [art] Lock RT PCRs Done
4,192,988 UART: [art] Populate DV Done
4,201,487 UART: [fht] FMC Alias Private Key: 7
4,202,517 UART: [art] Derive CDI
4,202,797 UART: [art] Store in in slot 0x4
4,288,450 UART: [art] Derive Key Pair
4,288,810 UART: [art] Store priv key in slot 0x5
4,302,144 UART: [art] Derive Key Pair - Done
4,316,762 UART: [art] Signing Cert with AUTHO
4,317,242 UART: RITY.KEYID = 7
4,332,424 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,189 UART: [art] PUB.X = 93E5781CF9E11B84974D0BFF4CE0F03849FEA4ED3B9526B29928836A24F7405BF9D56C291684AD2C71CC31705228CCCB
4,339,962 UART: [art] PUB.Y = C3B6227DD6F73C0833E5BD902BC3FB96309F02A9AC86AC349D08EF9FB526C13002707A446CAA44289BDF63F7302AC3D4
4,346,910 UART: [art] SIG.R = E9648B20E3E6CB177EE861F79A29A7CADF3110FF3E91B69E1CD41433D67E4EE242F42C25297F546E063AA8013BB85D12
4,353,682 UART: [art] SIG.S = 1D826CCFC18A7A229A251C381553CF714FE9BE7D542C72584C7B0BDA95FB02FCBA71167A7CBE2776EB4C5F82BA725EBD
4,377,647 UART: Caliptra RT
4,377,993 UART: [state] CFI Enabled
4,660,296 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,098,111 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,604 UART: [state] LifecycleState = Unprovisioned
85,259 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,042 UART: [kat] SHA2-256
890,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,721 UART: [kat] ++
894,873 UART: [kat] sha1
899,069 UART: [kat] SHA2-256
901,009 UART: [kat] SHA2-384
903,714 UART: [kat] SHA2-512-ACC
905,615 UART: [kat] ECC-384
915,204 UART: [kat] HMAC-384Kdf
919,778 UART: [kat] LMS
1,168,090 UART: [kat] --
1,168,897 UART: [cold-reset] ++
1,169,285 UART: [fht] FHT @ 0x50003400
1,171,901 UART: [idev] ++
1,172,069 UART: [idev] CDI.KEYID = 6
1,172,430 UART: [idev] SUBJECT.KEYID = 7
1,172,855 UART: [idev] UDS.KEYID = 0
1,173,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,899 UART: [idev] Erasing UDS.KEYID = 0
1,198,669 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,434 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,427 >>> mbox cmd response: success
2,771,427 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,772,494 UART: [afmc] ++
2,772,662 UART: [afmc] CDI.KEYID = 6
2,773,025 UART: [afmc] SUBJECT.KEYID = 7
2,773,451 UART: [afmc] AUTHORITY.KEYID = 5
2,808,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,731 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,444 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,353 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,067 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,910 UART: [afmc] --
2,851,918 UART: [cold-reset] --
2,852,910 UART: [state] Locking Datavault
2,854,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,759 UART: [state] Locking ICCM
2,855,417 UART: [exit] Launching FMC @ 0x40000130
2,860,746 UART:
2,860,762 UART: Running Caliptra FMC ...
2,861,170 UART:
2,861,224 UART: [state] CFI Enabled
2,871,637 UART: [fht] FMC Alias Private Key: 7
2,979,519 UART: [art] Extend RT PCRs Done
2,979,947 UART: [art] Lock RT PCRs Done
2,981,319 UART: [art] Populate DV Done
2,989,474 UART: [fht] FMC Alias Private Key: 7
2,990,442 UART: [art] Derive CDI
2,990,722 UART: [art] Store in in slot 0x4
3,076,119 UART: [art] Derive Key Pair
3,076,479 UART: [art] Store priv key in slot 0x5
3,089,501 UART: [art] Derive Key Pair - Done
3,104,334 UART: [art] Signing Cert with AUTHO
3,104,814 UART: RITY.KEYID = 7
3,119,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,751 UART: [art] PUB.X = 6D8C753BF1C61A64615B961E1E786504F3E97BAAA3C34588343366A769405093AEFB06A8AD0EB79D724AD3A3BEEC8853
3,127,518 UART: [art] PUB.Y = FC843E0B64B13AC80E3D71BF5D26A437C71DAF4AE080BCBED4609F12E32F8A8AC2AA8E76AEEF71223294CEF18D02560E
3,134,478 UART: [art] SIG.R = E4B02DC4AD00793B0C5D0BEC644FE5E995589A412DC5E7E2DFAF486F3DCAA3FA697BA8615D6982F9D5766D55CAB7C56F
3,141,242 UART: [art] SIG.S = 51615E564F22EBDF6816095321A59497A664254244C3C6FC52B8704121A15B994AA8BF8607689FC55F7D9212B072AF93
3,164,947 UART: Caliptra RT
3,165,201 UART: [state] CFI Enabled
3,273,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,679 UART:
3,274,695 UART: Running Caliptra ROM ...
3,275,103 UART:
3,275,158 UART: [state] CFI Enabled
3,278,046 UART: [state] LifecycleState = Unprovisioned
3,278,701 UART: [state] DebugLocked = No
3,279,257 UART: [state] WD Timer not started. Device not locked for debugging
3,280,453 UART: [kat] SHA2-256
4,084,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,132 UART: [kat] ++
4,088,284 UART: [kat] sha1
4,092,484 UART: [kat] SHA2-256
4,094,424 UART: [kat] SHA2-384
4,097,073 UART: [kat] SHA2-512-ACC
4,098,973 UART: [kat] ECC-384
4,108,676 UART: [kat] HMAC-384Kdf
4,113,142 UART: [kat] LMS
4,361,454 UART: [kat] --
4,361,972 UART: [update-reset] ++
4,378,920 >>> mbox cmd response: failed
4,378,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,379,236 UART: ROM Non-Fatal Error: 0x000B001E
4,380,068 UART: [state] Locking Datavault
4,380,690 UART: [state] Locking PCR0, PCR1 and PCR31
4,381,294 UART: [state] Locking ICCM
4,381,898 UART: [exit] Launching FMC @ 0x40000130
4,387,227 UART:
4,387,243 UART: Running Caliptra FMC ...
4,387,651 UART:
4,387,705 UART: [state] CFI Enabled
4,476,886 UART: [art] Extend RT PCRs Done
4,477,314 UART: [art] Lock RT PCRs Done
4,478,859 UART: [art] Populate DV Done
4,487,126 UART: [fht] FMC Alias Private Key: 7
4,488,200 UART: [art] Derive CDI
4,488,480 UART: [art] Store in in slot 0x4
4,574,109 UART: [art] Derive Key Pair
4,574,469 UART: [art] Store priv key in slot 0x5
4,587,705 UART: [art] Derive Key Pair - Done
4,602,606 UART: [art] Signing Cert with AUTHO
4,603,086 UART: RITY.KEYID = 7
4,618,410 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,175 UART: [art] PUB.X = 6D8C753BF1C61A64615B961E1E786504F3E97BAAA3C34588343366A769405093AEFB06A8AD0EB79D724AD3A3BEEC8853
4,625,942 UART: [art] PUB.Y = FC843E0B64B13AC80E3D71BF5D26A437C71DAF4AE080BCBED4609F12E32F8A8AC2AA8E76AEEF71223294CEF18D02560E
4,632,902 UART: [art] SIG.R = E4B02DC4AD00793B0C5D0BEC644FE5E995589A412DC5E7E2DFAF486F3DCAA3FA697BA8615D6982F9D5766D55CAB7C56F
4,639,666 UART: [art] SIG.S = 51615E564F22EBDF6816095321A59497A664254244C3C6FC52B8704121A15B994AA8BF8607689FC55F7D9212B072AF93
4,663,829 UART: Caliptra RT
4,664,083 UART: [state] CFI Enabled
4,947,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,858 UART:
4,948,874 UART: Running Caliptra ROM ...
4,949,282 UART:
4,949,337 UART: [state] CFI Enabled
4,951,877 UART: [state] LifecycleState = Unprovisioned
4,952,532 UART: [state] DebugLocked = No
4,953,052 UART: [state] WD Timer not started. Device not locked for debugging
4,954,372 UART: [kat] SHA2-256
5,757,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,762,051 UART: [kat] ++
5,762,203 UART: [kat] sha1
5,766,641 UART: [kat] SHA2-256
5,768,581 UART: [kat] SHA2-384
5,771,376 UART: [kat] SHA2-512-ACC
5,773,276 UART: [kat] ECC-384
5,783,469 UART: [kat] HMAC-384Kdf
5,787,889 UART: [kat] LMS
6,036,201 UART: [kat] --
6,037,105 UART: [update-reset] ++
7,348,616 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,349,707 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,499,573 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,123 >>> mbox cmd response: success
2,622,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,684,833 UART:
2,684,849 UART: Running Caliptra FMC ...
2,685,257 UART:
2,685,311 UART: [state] CFI Enabled
2,695,836 UART: [fht] FMC Alias Private Key: 7
2,803,720 UART: [art] Extend RT PCRs Done
2,804,148 UART: [art] Lock RT PCRs Done
2,805,480 UART: [art] Populate DV Done
2,813,581 UART: [fht] FMC Alias Private Key: 7
2,814,709 UART: [art] Derive CDI
2,814,989 UART: [art] Store in in slot 0x4
2,900,464 UART: [art] Derive Key Pair
2,900,824 UART: [art] Store priv key in slot 0x5
2,913,552 UART: [art] Derive Key Pair - Done
2,928,444 UART: [art] Signing Cert with AUTHO
2,928,924 UART: RITY.KEYID = 7
2,944,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,897 UART: [art] PUB.X = 31F2B6CEEF6DCCEF46D592394D4E7F290CF695DBFFCBFC711F09C3BBCBABD10FDB16A02CA477044A3E8270CBA199F099
2,951,685 UART: [art] PUB.Y = 881D9A11E229479DE24ABDE29F75635E531420C27F897B8084F369E8494E2294D965FB8CBC43FBEA644F1FA4C1A7AC47
2,958,641 UART: [art] SIG.R = AAE2FD1AE41385FC73A491781A0B3B1F1DF4EFC955BB55C8DB0333AC5FF0B51FA2561369C9DA98F8547BDD586E5CE00E
2,965,424 UART: [art] SIG.S = E4EFFAA055CF0F94DB139063DB83381BD6E4EC3CAD4C0130D5AD9CCDD483A79A9D99A10894D4C6B7AF28BB1F0E79A124
2,989,427 UART: Caliptra RT
2,989,681 UART: [state] CFI Enabled
3,097,400 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,173 >>> mbox cmd response: failed
4,087,173 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,092,786 UART:
4,092,802 UART: Running Caliptra FMC ...
4,093,210 UART:
4,093,264 UART: [state] CFI Enabled
4,182,149 UART: [art] Extend RT PCRs Done
4,182,577 UART: [art] Lock RT PCRs Done
4,183,810 UART: [art] Populate DV Done
4,192,067 UART: [fht] FMC Alias Private Key: 7
4,193,055 UART: [art] Derive CDI
4,193,335 UART: [art] Store in in slot 0x4
4,278,852 UART: [art] Derive Key Pair
4,279,212 UART: [art] Store priv key in slot 0x5
4,292,584 UART: [art] Derive Key Pair - Done
4,307,244 UART: [art] Signing Cert with AUTHO
4,307,724 UART: RITY.KEYID = 7
4,323,288 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,053 UART: [art] PUB.X = 31F2B6CEEF6DCCEF46D592394D4E7F290CF695DBFFCBFC711F09C3BBCBABD10FDB16A02CA477044A3E8270CBA199F099
4,330,841 UART: [art] PUB.Y = 881D9A11E229479DE24ABDE29F75635E531420C27F897B8084F369E8494E2294D965FB8CBC43FBEA644F1FA4C1A7AC47
4,337,797 UART: [art] SIG.R = AAE2FD1AE41385FC73A491781A0B3B1F1DF4EFC955BB55C8DB0333AC5FF0B51FA2561369C9DA98F8547BDD586E5CE00E
4,344,580 UART: [art] SIG.S = E4EFFAA055CF0F94DB139063DB83381BD6E4EC3CAD4C0130D5AD9CCDD483A79A9D99A10894D4C6B7AF28BB1F0E79A124
4,367,957 UART: Caliptra RT
4,368,211 UART: [state] CFI Enabled
4,651,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,335 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,380 UART: [idev] ++
1,173,548 UART: [idev] CDI.KEYID = 6
1,173,909 UART: [idev] SUBJECT.KEYID = 7
1,174,334 UART: [idev] UDS.KEYID = 0
1,174,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,208,985 UART: [ldev] ++
1,209,153 UART: [ldev] CDI.KEYID = 6
1,209,517 UART: [ldev] SUBJECT.KEYID = 5
1,209,944 UART: [ldev] AUTHORITY.KEYID = 7
1,210,407 UART: [ldev] FE.KEYID = 1
1,215,397 UART: [ldev] Erasing FE.KEYID = 1
1,241,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,471 UART: [ldev] --
1,280,975 UART: [fwproc] Wait for Commands...
1,281,792 UART: [fwproc] Recv command 0x46574c44
1,282,525 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,990 >>> mbox cmd response: success
2,771,990 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,773,045 UART: [afmc] ++
2,773,213 UART: [afmc] CDI.KEYID = 6
2,773,576 UART: [afmc] SUBJECT.KEYID = 7
2,774,002 UART: [afmc] AUTHORITY.KEYID = 5
2,809,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,884 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,597 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,506 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,220 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,143 UART: [afmc] --
2,853,097 UART: [cold-reset] --
2,853,907 UART: [state] Locking Datavault
2,854,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,548 UART: [state] Locking ICCM
2,856,150 UART: [exit] Launching FMC @ 0x40000130
2,861,479 UART:
2,861,495 UART: Running Caliptra FMC ...
2,861,903 UART:
2,862,046 UART: [state] CFI Enabled
2,872,687 UART: [fht] FMC Alias Private Key: 7
2,981,009 UART: [art] Extend RT PCRs Done
2,981,437 UART: [art] Lock RT PCRs Done
2,982,581 UART: [art] Populate DV Done
2,990,776 UART: [fht] FMC Alias Private Key: 7
2,991,728 UART: [art] Derive CDI
2,992,008 UART: [art] Store in in slot 0x4
3,077,639 UART: [art] Derive Key Pair
3,077,999 UART: [art] Store priv key in slot 0x5
3,090,827 UART: [art] Derive Key Pair - Done
3,105,320 UART: [art] Signing Cert with AUTHO
3,105,800 UART: RITY.KEYID = 7
3,121,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,845 UART: [art] PUB.X = 237F39AF2997E5BBFE01E9D909DD724216013480B41B1525CBB094DAB1FC658CAA6A531B27537A614FCDC27B593E93B9
3,128,614 UART: [art] PUB.Y = C1C794D103151825973C56B0EBC24782CB5BF90A582A9895E392844B4A36151393247D39BC61F5DE48D15281336A3431
3,135,546 UART: [art] SIG.R = 0793FEBA6CBD6D2966A0C0D486B3179A12BC321ADD85EC21B7F522EBE22BF1D12AA3363FFC81648FD4F2C9BD584E23E9
3,142,333 UART: [art] SIG.S = 08B361FB8077B4DF0985BF30C9A177930BBDB86346E6CDB71B62411F3FDF49F81F352E7BF5471A66D58F89A7B73DD373
3,166,215 UART: Caliptra RT
3,166,561 UART: [state] CFI Enabled
3,275,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,995 UART:
3,277,011 UART: Running Caliptra ROM ...
3,277,419 UART:
3,277,561 UART: [state] CFI Enabled
3,279,961 UART: [state] LifecycleState = Unprovisioned
3,280,616 UART: [state] DebugLocked = No
3,281,270 UART: [state] WD Timer not started. Device not locked for debugging
3,282,416 UART: [kat] SHA2-256
4,085,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,095 UART: [kat] ++
4,090,247 UART: [kat] sha1
4,094,375 UART: [kat] SHA2-256
4,096,315 UART: [kat] SHA2-384
4,099,068 UART: [kat] SHA2-512-ACC
4,100,968 UART: [kat] ECC-384
4,110,781 UART: [kat] HMAC-384Kdf
4,115,239 UART: [kat] LMS
4,363,551 UART: [kat] --
4,364,511 UART: [update-reset] ++
4,381,415 >>> mbox cmd response: failed
4,381,415 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,381,691 UART: ROM Non-Fatal Error: 0x000B001E
4,382,605 UART: [state] Locking Datavault
4,383,519 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,123 UART: [state] Locking ICCM
4,384,661 UART: [exit] Launching FMC @ 0x40000130
4,389,990 UART:
4,390,006 UART: Running Caliptra FMC ...
4,390,414 UART:
4,390,557 UART: [state] CFI Enabled
4,479,464 UART: [art] Extend RT PCRs Done
4,479,892 UART: [art] Lock RT PCRs Done
4,480,881 UART: [art] Populate DV Done
4,488,978 UART: [fht] FMC Alias Private Key: 7
4,490,066 UART: [art] Derive CDI
4,490,346 UART: [art] Store in in slot 0x4
4,575,603 UART: [art] Derive Key Pair
4,575,963 UART: [art] Store priv key in slot 0x5
4,588,869 UART: [art] Derive Key Pair - Done
4,603,586 UART: [art] Signing Cert with AUTHO
4,604,066 UART: RITY.KEYID = 7
4,618,992 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,757 UART: [art] PUB.X = 237F39AF2997E5BBFE01E9D909DD724216013480B41B1525CBB094DAB1FC658CAA6A531B27537A614FCDC27B593E93B9
4,626,526 UART: [art] PUB.Y = C1C794D103151825973C56B0EBC24782CB5BF90A582A9895E392844B4A36151393247D39BC61F5DE48D15281336A3431
4,633,458 UART: [art] SIG.R = 0793FEBA6CBD6D2966A0C0D486B3179A12BC321ADD85EC21B7F522EBE22BF1D12AA3363FFC81648FD4F2C9BD584E23E9
4,640,245 UART: [art] SIG.S = 08B361FB8077B4DF0985BF30C9A177930BBDB86346E6CDB71B62411F3FDF49F81F352E7BF5471A66D58F89A7B73DD373
4,663,379 UART: Caliptra RT
4,663,725 UART: [state] CFI Enabled
4,946,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,947,726 UART:
4,947,742 UART: Running Caliptra ROM ...
4,948,150 UART:
4,948,292 UART: [state] CFI Enabled
4,950,848 UART: [state] LifecycleState = Unprovisioned
4,951,503 UART: [state] DebugLocked = No
4,952,155 UART: [state] WD Timer not started. Device not locked for debugging
4,953,493 UART: [kat] SHA2-256
5,757,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,761,172 UART: [kat] ++
5,761,324 UART: [kat] sha1
5,765,646 UART: [kat] SHA2-256
5,767,586 UART: [kat] SHA2-384
5,770,179 UART: [kat] SHA2-512-ACC
5,772,079 UART: [kat] ECC-384
5,781,652 UART: [kat] HMAC-384Kdf
5,786,176 UART: [kat] LMS
6,034,488 UART: [kat] --
6,035,232 UART: [update-reset] ++
7,347,695 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,348,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
7,498,656 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,932 >>> mbox cmd response: success
2,623,932 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,685,860 UART:
2,685,876 UART: Running Caliptra FMC ...
2,686,284 UART:
2,686,427 UART: [state] CFI Enabled
2,696,938 UART: [fht] FMC Alias Private Key: 7
2,805,088 UART: [art] Extend RT PCRs Done
2,805,516 UART: [art] Lock RT PCRs Done
2,807,300 UART: [art] Populate DV Done
2,815,753 UART: [fht] FMC Alias Private Key: 7
2,816,841 UART: [art] Derive CDI
2,817,121 UART: [art] Store in in slot 0x4
2,902,810 UART: [art] Derive Key Pair
2,903,170 UART: [art] Store priv key in slot 0x5
2,917,238 UART: [art] Derive Key Pair - Done
2,931,887 UART: [art] Signing Cert with AUTHO
2,932,367 UART: RITY.KEYID = 7
2,947,103 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,868 UART: [art] PUB.X = 2D8CBFD286E065642CB19D62D3FC291FD0F89A88328147754EFB1F0F11DAA938BB9E3E674F46F8F9CE6ACC26C3F74662
2,954,649 UART: [art] PUB.Y = C40E9811DE5574860555C0C88CA0C60D640EEF9877FA10B890FDDDC6EA1709AADFACABDD039F6C672F6FC70F00EEBD31
2,961,580 UART: [art] SIG.R = F6E738E9F2779AE7C0521AC906494068945A4178EBC5A977B789A0527A13F7CF8F9B120425A4EA2F5EAE56DD25B3050F
2,968,342 UART: [art] SIG.S = 776A877FAC545D6DAC7DA89282F08382D0150410D3228D14CD146A83AAE337ECBEBAB348AA1EDC3EC91BC8E02C363F10
2,992,254 UART: Caliptra RT
2,992,600 UART: [state] CFI Enabled
3,100,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,900 >>> mbox cmd response: failed
4,090,900 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,096,917 UART:
4,096,933 UART: Running Caliptra FMC ...
4,097,341 UART:
4,097,484 UART: [state] CFI Enabled
4,186,735 UART: [art] Extend RT PCRs Done
4,187,163 UART: [art] Lock RT PCRs Done
4,188,468 UART: [art] Populate DV Done
4,196,929 UART: [fht] FMC Alias Private Key: 7
4,197,933 UART: [art] Derive CDI
4,198,213 UART: [art] Store in in slot 0x4
4,283,562 UART: [art] Derive Key Pair
4,283,922 UART: [art] Store priv key in slot 0x5
4,297,360 UART: [art] Derive Key Pair - Done
4,312,203 UART: [art] Signing Cert with AUTHO
4,312,683 UART: RITY.KEYID = 7
4,327,659 UART: [art] Erasing AUTHORITY.KEYID = 7
4,328,424 UART: [art] PUB.X = 2D8CBFD286E065642CB19D62D3FC291FD0F89A88328147754EFB1F0F11DAA938BB9E3E674F46F8F9CE6ACC26C3F74662
4,335,205 UART: [art] PUB.Y = C40E9811DE5574860555C0C88CA0C60D640EEF9877FA10B890FDDDC6EA1709AADFACABDD039F6C672F6FC70F00EEBD31
4,342,136 UART: [art] SIG.R = F6E738E9F2779AE7C0521AC906494068945A4178EBC5A977B789A0527A13F7CF8F9B120425A4EA2F5EAE56DD25B3050F
4,348,898 UART: [art] SIG.S = 776A877FAC545D6DAC7DA89282F08382D0150410D3228D14CD146A83AAE337ECBEBAB348AA1EDC3EC91BC8E02C363F10
4,372,602 UART: Caliptra RT
4,372,948 UART: [state] CFI Enabled
4,653,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,994 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
193,015 UART:
193,390 UART: Running Caliptra ROM ...
194,560 UART:
194,713 UART: [state] CFI Enabled
261,069 UART: [state] LifecycleState = Unprovisioned
263,056 UART: [state] DebugLocked = No
264,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,743 UART: [kat] SHA2-256
439,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,956 UART: [kat] ++
450,444 UART: [kat] sha1
460,727 UART: [kat] SHA2-256
463,435 UART: [kat] SHA2-384
468,336 UART: [kat] SHA2-512-ACC
470,677 UART: [kat] ECC-384
2,764,882 UART: [kat] HMAC-384Kdf
2,796,195 UART: [kat] LMS
3,986,502 UART: [kat] --
3,991,530 UART: [cold-reset] ++
3,993,142 UART: [fht] Storing FHT @ 0x50003400
4,005,269 UART: [idev] ++
4,005,876 UART: [idev] CDI.KEYID = 6
4,006,770 UART: [idev] SUBJECT.KEYID = 7
4,008,049 UART: [idev] UDS.KEYID = 0
4,011,075 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,574 UART: [idev] Erasing UDS.KEYID = 0
7,342,072 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,567 UART: [idev] --
7,367,941 UART: [ldev] ++
7,368,581 UART: [ldev] CDI.KEYID = 6
7,369,515 UART: [ldev] SUBJECT.KEYID = 5
7,370,736 UART: [ldev] AUTHORITY.KEYID = 7
7,371,975 UART: [ldev] FE.KEYID = 1
7,418,920 UART: [ldev] Erasing FE.KEYID = 1
10,753,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,432 UART: [ldev] --
13,134,711 UART: [fwproc] Waiting for Commands...
13,137,742 UART: [fwproc] Received command 0x46574c44
13,139,934 UART: [fwproc] Received Image of size 114036 bytes
22,012,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,095,744 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,164,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,482,010 >>> mbox cmd response: success
22,484,102 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,627,497 UART: [afmc] ++
22,628,131 UART: [afmc] CDI.KEYID = 6
22,629,058 UART: [afmc] SUBJECT.KEYID = 7
22,630,175 UART: [afmc] AUTHORITY.KEYID = 5
25,846,679 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,145,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,148,241 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,162,793 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,177,543 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,191,739 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,212,940 UART: [afmc] --
28,217,140 UART: [cold-reset] --
28,222,048 UART: [state] Locking Datavault
28,225,846 UART: [state] Locking PCR0, PCR1 and PCR31
28,227,556 UART: [state] Locking ICCM
28,229,064 UART: [exit] Launching FMC @ 0x40000130
28,237,416 UART:
28,237,655 UART: Running Caliptra FMC ...
28,238,761 UART:
28,238,926 UART: [state] CFI Enabled
28,306,110 UART: [fht] FMC Alias Private Key: 7
30,643,994 UART: [art] Extend RT PCRs Done
30,645,230 UART: [art] Lock RT PCRs Done
30,647,124 UART: [art] Populate DV Done
30,652,382 UART: [fht] FMC Alias Private Key: 7
30,654,033 UART: [art] Derive CDI
30,654,774 UART: [art] Store in in slot 0x4
30,714,920 UART: [art] Derive Key Pair
30,715,948 UART: [art] Store priv key in slot 0x5
34,009,118 UART: [art] Derive Key Pair - Done
34,022,068 UART: [art] Signing Cert with AUTHO
34,023,384 UART: RITY.KEYID = 7
36,311,759 UART: [art] Erasing AUTHORITY.KEYID = 7
36,313,265 UART: [art] PUB.X = 82B90768A2C815B563D89C6BA0E28A89B7181376FDE24E13FDD9785F201012FF95E7E5B4E3A40798B937DBEE94DF027E
36,320,528 UART: [art] PUB.Y = C39C5BD63712B775BEEBE10746C796BC38A2AD2E7FD4F65501694E42F0ED4E1447572ECCE518A95CEDB67B32A675BEB8
36,327,776 UART: [art] SIG.R = 12205C45796A5F2F30C32D245BAE50F11FB4846E1587195EB01E0905154BB756A018D91107185396F273C8FAF8B9E86C
36,335,115 UART: [art] SIG.S = 527B6DD446D5ECC2AE1982B3D54518AA625D8F934E10F5D96DD1D90474A20588E65E90529E4CCFC8F99F7DCF2D85522A
37,640,304 UART: Caliptra RT
37,641,019 UART: [state] CFI Enabled
37,802,773 UART: [rt] RT listening for mailbox commands...
37,805,623 UART:
37,805,786 UART: Running Caliptra ROM ...
37,806,895 UART:
37,807,051 UART: [state] CFI Enabled
37,869,423 UART: [state] LifecycleState = Unprovisioned
37,871,349 UART: [state] DebugLocked = No
37,873,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,877,443 UART: [kat] SHA2-256
38,047,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,057,614 UART: [kat] ++
38,058,071 UART: [kat] sha1
38,068,856 UART: [kat] SHA2-256
38,071,549 UART: [kat] SHA2-384
38,077,645 UART: [kat] SHA2-512-ACC
38,079,996 UART: [kat] ECC-384
40,371,758 UART: [kat] HMAC-384Kdf
40,383,451 UART: [kat] LMS
41,573,786 UART: [kat] --
41,577,994 UART: [update-reset] ++
41,690,096 >>> mbox cmd response: failed
41,691,838 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
41,835,102 UART: ROM Non-Fatal Error: 0x000B003D
41,836,533 UART: [state] Locking Datavault
41,837,697 UART: [state] Locking PCR0, PCR1 and PCR31
41,839,240 UART: [state] Locking ICCM
41,840,470 UART: [exit] Launching FMC @ 0x40000130
41,841,931 UART:
41,842,092 UART: Running Caliptra FMC ...
41,843,207 UART:
41,843,365 UART: [state] CFI Enabled
41,844,203 UART: [art] Extend RT PCRs Done
41,845,343 UART: [art] Lock RT PCRs Done
41,846,358 UART: [art] Populate DV Done
41,847,495 UART: [fht] FMC Alias Private Key: 7
41,848,825 UART: [art] Derive CDI
41,849,554 UART: [art] Store in in slot 0x4
41,874,207 UART: [art] Derive Key Pair
41,875,210 UART: [art] Store priv key in slot 0x5
45,167,752 UART: [art] Derive Key Pair - Done
45,180,756 UART: [art] Signing Cert with AUTHO
45,182,067 UART: RITY.KEYID = 7
47,470,090 UART: [art] Erasing AUTHORITY.KEYID = 7
47,471,602 UART: [art] PUB.X = 82B90768A2C815B563D89C6BA0E28A89B7181376FDE24E13FDD9785F201012FF95E7E5B4E3A40798B937DBEE94DF027E
47,478,868 UART: [art] PUB.Y = C39C5BD63712B775BEEBE10746C796BC38A2AD2E7FD4F65501694E42F0ED4E1447572ECCE518A95CEDB67B32A675BEB8
47,486,119 UART: [art] SIG.R = 12205C45796A5F2F30C32D245BAE50F11FB4846E1587195EB01E0905154BB756A018D91107185396F273C8FAF8B9E86C
47,493,459 UART: [art] SIG.S = 527B6DD446D5ECC2AE1982B3D54518AA625D8F934E10F5D96DD1D90474A20588E65E90529E4CCFC8F99F7DCF2D85522A
48,798,638 UART: Caliptra RT
48,799,351 UART: [state] CFI Enabled
49,127,894 UART: [rt] RT listening for mailbox commands...
49,130,530 UART:
49,130,737 UART: Running Caliptra ROM ...
49,131,844 UART:
49,132,024 UART: [state] CFI Enabled
49,197,708 UART: [state] LifecycleState = Unprovisioned
49,200,419 UART: [state] DebugLocked = No
49,202,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
49,207,438 UART: [kat] SHA2-256
49,377,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,387,651 UART: [kat] ++
49,388,113 UART: [kat] sha1
49,399,353 UART: [kat] SHA2-256
49,401,996 UART: [kat] SHA2-384
49,406,802 UART: [kat] SHA2-512-ACC
49,409,151 UART: [kat] ECC-384
51,700,143 UART: [kat] HMAC-384Kdf
51,732,938 UART: [kat] LMS
52,923,318 UART: [kat] --
52,925,817 UART: [update-reset] ++
61,891,321 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,894,735 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
62,276,698 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,784,281 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,977,142 >>> mbox cmd response: success
21,979,078 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
27,677,303 UART:
27,677,697 UART: Running Caliptra FMC ...
27,678,820 UART:
27,678,984 UART: [state] CFI Enabled
27,747,948 UART: [fht] FMC Alias Private Key: 7
30,086,342 UART: [art] Extend RT PCRs Done
30,087,575 UART: [art] Lock RT PCRs Done
30,089,332 UART: [art] Populate DV Done
30,094,633 UART: [fht] FMC Alias Private Key: 7
30,096,182 UART: [art] Derive CDI
30,097,001 UART: [art] Store in in slot 0x4
30,156,475 UART: [art] Derive Key Pair
30,157,544 UART: [art] Store priv key in slot 0x5
33,449,975 UART: [art] Derive Key Pair - Done
33,462,944 UART: [art] Signing Cert with AUTHO
33,464,248 UART: RITY.KEYID = 7
35,751,332 UART: [art] Erasing AUTHORITY.KEYID = 7
35,752,845 UART: [art] PUB.X = AB7572F8CD290819DB462C15B9CEFDA024CDC30B6E088064C51D69330FBE1C437F404C3E17E1E47DE840F40BF55BEB13
35,760,108 UART: [art] PUB.Y = 1DF65EE435D3EDC6FE47185383250BD28E94B04BF84B40383D01018D02233296ED3F04776C7EF5F16BBEA119BEBBC044
35,767,333 UART: [art] SIG.R = DFD9650107F5D0C42EACFAAEDAF66B4FBE7C6F0B2F319122590D99899C5CE7B352159DE80AFE5D847FE1C2CD5774A342
35,774,753 UART: [art] SIG.S = 6AD5992529D024FCE404F6BF349F7E6F80A7B38E3A5DAA7EBA2D3499F6198BBEDA2C6C0681C366F488C70C8A6C3B1526
37,079,529 UART: Caliptra RT
37,080,246 UART: [state] CFI Enabled
37,240,984 UART: [rt] RT listening for mailbox commands...
40,969,753 >>> mbox cmd response: failed
40,971,534 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
41,115,044 UART:
41,115,363 UART: Running Caliptra FMC ...
41,116,483 UART:
41,116,651 UART: [state] CFI Enabled
41,117,588 UART: [art] Extend RT PCRs Done
41,118,726 UART: [art] Lock RT PCRs Done
41,119,795 UART: [art] Populate DV Done
41,120,897 UART: [fht] FMC Alias Private Key: 7
41,122,217 UART: [art] Derive CDI
41,122,954 UART: [art] Store in in slot 0x4
41,142,118 UART: [art] Derive Key Pair
41,143,109 UART: [art] Store priv key in slot 0x5
44,436,915 UART: [art] Derive Key Pair - Done
44,449,767 UART: [art] Signing Cert with AUTHO
44,451,098 UART: RITY.KEYID = 7
46,738,687 UART: [art] Erasing AUTHORITY.KEYID = 7
46,740,196 UART: [art] PUB.X = AB7572F8CD290819DB462C15B9CEFDA024CDC30B6E088064C51D69330FBE1C437F404C3E17E1E47DE840F40BF55BEB13
46,747,488 UART: [art] PUB.Y = 1DF65EE435D3EDC6FE47185383250BD28E94B04BF84B40383D01018D02233296ED3F04776C7EF5F16BBEA119BEBBC044
46,754,735 UART: [art] SIG.R = DFD9650107F5D0C42EACFAAEDAF66B4FBE7C6F0B2F319122590D99899C5CE7B352159DE80AFE5D847FE1C2CD5774A342
46,762,136 UART: [art] SIG.S = 6AD5992529D024FCE404F6BF349F7E6F80A7B38E3A5DAA7EBA2D3499F6198BBEDA2C6C0681C366F488C70C8A6C3B1526
48,067,161 UART: Caliptra RT
48,067,867 UART: [state] CFI Enabled
48,397,585 UART: [rt] RT listening for mailbox commands...
61,105,165 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,519 UART:
192,869 UART: Running Caliptra ROM ...
194,077 UART:
603,799 UART: [state] CFI Enabled
619,946 UART: [state] LifecycleState = Unprovisioned
621,887 UART: [state] DebugLocked = No
624,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,159 UART: [kat] SHA2-256
798,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,475 UART: [kat] ++
809,967 UART: [kat] sha1
819,553 UART: [kat] SHA2-256
822,292 UART: [kat] SHA2-384
828,865 UART: [kat] SHA2-512-ACC
831,214 UART: [kat] ECC-384
3,116,652 UART: [kat] HMAC-384Kdf
3,129,051 UART: [kat] LMS
4,319,163 UART: [kat] --
4,322,193 UART: [cold-reset] ++
4,324,623 UART: [fht] Storing FHT @ 0x50003400
4,336,973 UART: [idev] ++
4,337,542 UART: [idev] CDI.KEYID = 6
4,338,508 UART: [idev] SUBJECT.KEYID = 7
4,339,730 UART: [idev] UDS.KEYID = 0
4,342,701 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,126 UART: [idev] Erasing UDS.KEYID = 0
7,629,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,412 UART: [idev] --
7,655,519 UART: [ldev] ++
7,656,095 UART: [ldev] CDI.KEYID = 6
7,657,065 UART: [ldev] SUBJECT.KEYID = 5
7,658,285 UART: [ldev] AUTHORITY.KEYID = 7
7,659,519 UART: [ldev] FE.KEYID = 1
7,672,165 UART: [ldev] Erasing FE.KEYID = 1
10,957,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,983 UART: [ldev] --
13,315,471 UART: [fwproc] Waiting for Commands...
13,318,381 UART: [fwproc] Received command 0x46574c44
13,320,618 UART: [fwproc] Received Image of size 114036 bytes
21,879,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,956,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,025,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,342,673 >>> mbox cmd response: success
22,344,823 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,488,149 UART: [afmc] ++
22,488,790 UART: [afmc] CDI.KEYID = 6
22,489,731 UART: [afmc] SUBJECT.KEYID = 7
22,490,841 UART: [afmc] AUTHORITY.KEYID = 5
25,669,437 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,964,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,967,204 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,981,781 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,996,553 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,010,733 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,031,766 UART: [afmc] --
28,036,226 UART: [cold-reset] --
28,041,877 UART: [state] Locking Datavault
28,047,279 UART: [state] Locking PCR0, PCR1 and PCR31
28,049,057 UART: [state] Locking ICCM
28,051,639 UART: [exit] Launching FMC @ 0x40000130
28,060,041 UART:
28,060,283 UART: Running Caliptra FMC ...
28,061,412 UART:
28,061,577 UART: [state] CFI Enabled
28,069,898 UART: [fht] FMC Alias Private Key: 7
30,401,412 UART: [art] Extend RT PCRs Done
30,402,636 UART: [art] Lock RT PCRs Done
30,404,584 UART: [art] Populate DV Done
30,410,106 UART: [fht] FMC Alias Private Key: 7
30,411,808 UART: [art] Derive CDI
30,412,626 UART: [art] Store in in slot 0x4
30,454,965 UART: [art] Derive Key Pair
30,456,007 UART: [art] Store priv key in slot 0x5
33,698,260 UART: [art] Derive Key Pair - Done
33,710,945 UART: [art] Signing Cert with AUTHO
33,712,249 UART: RITY.KEYID = 7
35,991,743 UART: [art] Erasing AUTHORITY.KEYID = 7
35,993,250 UART: [art] PUB.X = A720D5BA93DB29508A387718AD7DFC803AA631501FEAA73AF2DDEA1BFF2302F24EE91BC9934940EDF1635ADD1037DAF6
36,000,525 UART: [art] PUB.Y = 21529EEC1E0C923E037CA2272E59EBCE2CE9543AC40EBD69EBBF9963F40B42A6C76CE3C7004C1F75966CFAEFFA3FB24D
36,007,782 UART: [art] SIG.R = FFA860A8619A5A2DA157CA8DA024147315EEFEB94BB9895FBE1481C4F140E109D22BC5E449934CA2A19D241F8783B773
36,015,148 UART: [art] SIG.S = 8DFA21BE0B9AF846CB91F03E64B469F96B8107F0C183358505B53236C3A0240A5C38CFBC2FA4766A2CD9B4B123CE427F
37,320,329 UART: Caliptra RT
37,321,044 UART: [state] CFI Enabled
37,439,451 UART: [rt] RT listening for mailbox commands...
37,442,077 UART:
37,442,248 UART: Running Caliptra ROM ...
37,443,357 UART:
37,443,731 UART: [state] CFI Enabled
37,460,702 UART: [state] LifecycleState = Unprovisioned
37,462,591 UART: [state] DebugLocked = No
37,465,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,470,295 UART: [kat] SHA2-256
37,640,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,650,541 UART: [kat] ++
37,651,013 UART: [kat] sha1
37,661,797 UART: [kat] SHA2-256
37,664,492 UART: [kat] SHA2-384
37,670,749 UART: [kat] SHA2-512-ACC
37,673,152 UART: [kat] ECC-384
39,956,816 UART: [kat] HMAC-384Kdf
39,968,007 UART: [kat] LMS
41,158,078 UART: [kat] --
41,161,427 UART: [update-reset] ++
41,271,605 >>> mbox cmd response: failed
41,273,964 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
41,417,650 UART: ROM Non-Fatal Error: 0x000B003D
41,419,094 UART: [state] Locking Datavault
41,420,171 UART: [state] Locking PCR0, PCR1 and PCR31
41,421,711 UART: [state] Locking ICCM
41,422,617 UART: [exit] Launching FMC @ 0x40000130
41,424,060 UART:
41,424,220 UART: Running Caliptra FMC ...
41,425,320 UART:
41,425,474 UART: [state] CFI Enabled
41,426,394 UART: [art] Extend RT PCRs Done
41,427,533 UART: [art] Lock RT PCRs Done
41,428,596 UART: [art] Populate DV Done
41,429,626 UART: [fht] FMC Alias Private Key: 7
41,430,943 UART: [art] Derive CDI
41,431,677 UART: [art] Store in in slot 0x4
41,432,843 UART: [art] Derive Key Pair
41,433,833 UART: [art] Store priv key in slot 0x5
44,634,826 UART: [art] Derive Key Pair - Done
44,647,885 UART: [art] Signing Cert with AUTHO
44,649,197 UART: RITY.KEYID = 7
46,928,851 UART: [art] Erasing AUTHORITY.KEYID = 7
46,930,377 UART: [art] PUB.X = A720D5BA93DB29508A387718AD7DFC803AA631501FEAA73AF2DDEA1BFF2302F24EE91BC9934940EDF1635ADD1037DAF6
46,937,640 UART: [art] PUB.Y = 21529EEC1E0C923E037CA2272E59EBCE2CE9543AC40EBD69EBBF9963F40B42A6C76CE3C7004C1F75966CFAEFFA3FB24D
46,944,895 UART: [art] SIG.R = FFA860A8619A5A2DA157CA8DA024147315EEFEB94BB9895FBE1481C4F140E109D22BC5E449934CA2A19D241F8783B773
46,952,297 UART: [art] SIG.S = 8DFA21BE0B9AF846CB91F03E64B469F96B8107F0C183358505B53236C3A0240A5C38CFBC2FA4766A2CD9B4B123CE427F
48,257,101 UART: Caliptra RT
48,257,815 UART: [state] CFI Enabled
48,551,224 UART: [rt] RT listening for mailbox commands...
48,553,753 UART:
48,553,918 UART: Running Caliptra ROM ...
48,554,964 UART:
48,555,385 UART: [state] CFI Enabled
48,570,472 UART: [state] LifecycleState = Unprovisioned
48,572,358 UART: [state] DebugLocked = No
48,573,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,577,729 UART: [kat] SHA2-256
48,747,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
48,757,973 UART: [kat] ++
48,758,570 UART: [kat] sha1
48,768,658 UART: [kat] SHA2-256
48,771,373 UART: [kat] SHA2-384
48,777,040 UART: [kat] SHA2-512-ACC
48,779,447 UART: [kat] ECC-384
51,062,724 UART: [kat] HMAC-384Kdf
51,074,466 UART: [kat] LMS
52,264,502 UART: [kat] --
52,270,505 UART: [update-reset] ++
60,912,760 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,916,538 UART: [update-reset] Loading Runtime at address 0x40005000 len 89332
61,298,489 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
4,130,958 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,912,418 >>> mbox cmd response: success
21,914,372 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
27,555,491 UART:
27,555,894 UART: Running Caliptra FMC ...
27,557,001 UART:
27,557,186 UART: [state] CFI Enabled
27,565,296 UART: [fht] FMC Alias Private Key: 7
29,895,458 UART: [art] Extend RT PCRs Done
29,896,809 UART: [art] Lock RT PCRs Done
29,898,255 UART: [art] Populate DV Done
29,903,824 UART: [fht] FMC Alias Private Key: 7
29,905,471 UART: [art] Derive CDI
29,906,206 UART: [art] Store in in slot 0x4
29,949,122 UART: [art] Derive Key Pair
29,950,124 UART: [art] Store priv key in slot 0x5
33,191,996 UART: [art] Derive Key Pair - Done
33,205,062 UART: [art] Signing Cert with AUTHO
33,206,375 UART: RITY.KEYID = 7
35,485,690 UART: [art] Erasing AUTHORITY.KEYID = 7
35,487,200 UART: [art] PUB.X = 3135EFC41D233B7023FBC694622B24215A1A1A7C36E17545B44F30A99AFC97F06BB148EB3B6EE2987A6ED74FE035FE96
35,494,401 UART: [art] PUB.Y = A819DE19D993ED143B41B80858B5BB3C7CA906F78FD3ADF6EF89FEE00351A8A6F9B553988953C65FA8647BE911D7F32E
35,501,691 UART: [art] SIG.R = 07A993AAC048D50650845F89090A62688333C40D192F218314FA39B8CC0CABC4C8CF6F9BE0877739CADC31F90126548F
35,509,062 UART: [art] SIG.S = 46807A53D039F6F0DF84F3D632CC1F900314EB51DE5401948D1219047BCB6311D1E56A0EABB99F9B3323299219AB9686
36,813,721 UART: Caliptra RT
36,814,437 UART: [state] CFI Enabled
36,931,347 UART: [rt] RT listening for mailbox commands...
40,579,747 >>> mbox cmd response: failed
40,581,440 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
40,724,733 UART:
40,725,062 UART: Running Caliptra FMC ...
40,726,196 UART:
40,726,363 UART: [state] CFI Enabled
40,727,235 UART: [art] Extend RT PCRs Done
40,728,316 UART: [art] Lock RT PCRs Done
40,729,319 UART: [art] Populate DV Done
40,730,428 UART: [fht] FMC Alias Private Key: 7
40,731,753 UART: [art] Derive CDI
40,732,508 UART: [art] Store in in slot 0x4
40,733,680 UART: [art] Derive Key Pair
40,734,623 UART: [art] Store priv key in slot 0x5
43,933,700 UART: [art] Derive Key Pair - Done
43,946,968 UART: [art] Signing Cert with AUTHO
43,948,276 UART: RITY.KEYID = 7
46,227,495 UART: [art] Erasing AUTHORITY.KEYID = 7
46,229,016 UART: [art] PUB.X = 3135EFC41D233B7023FBC694622B24215A1A1A7C36E17545B44F30A99AFC97F06BB148EB3B6EE2987A6ED74FE035FE96
46,236,232 UART: [art] PUB.Y = A819DE19D993ED143B41B80858B5BB3C7CA906F78FD3ADF6EF89FEE00351A8A6F9B553988953C65FA8647BE911D7F32E
46,243,489 UART: [art] SIG.R = 07A993AAC048D50650845F89090A62688333C40D192F218314FA39B8CC0CABC4C8CF6F9BE0877739CADC31F90126548F
46,250,842 UART: [art] SIG.S = 46807A53D039F6F0DF84F3D632CC1F900314EB51DE5401948D1219047BCB6311D1E56A0EABB99F9B3323299219AB9686
47,556,393 UART: Caliptra RT
47,557,114 UART: [state] CFI Enabled
47,848,471 UART: [rt] RT listening for mailbox commands...
60,203,804 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,397 UART:
192,758 UART: Running Caliptra ROM ...
193,934 UART:
194,090 UART: [state] CFI Enabled
257,163 UART: [state] LifecycleState = Unprovisioned
259,188 UART: [state] DebugLocked = No
260,573 UART: [state] WD Timer not started. Device not locked for debugging
264,658 UART: [kat] SHA2-256
443,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,356 UART: [kat] ++
455,893 UART: [kat] sha1
466,952 UART: [kat] SHA2-256
469,971 UART: [kat] SHA2-384
477,725 UART: [kat] SHA2-512-ACC
480,654 UART: [kat] ECC-384
2,943,007 UART: [kat] HMAC-384Kdf
2,964,912 UART: [kat] LMS
3,494,362 UART: [kat] --
3,498,575 UART: [cold-reset] ++
3,499,583 UART: [fht] FHT @ 0x50003400
3,510,614 UART: [idev] ++
3,511,187 UART: [idev] CDI.KEYID = 6
3,512,093 UART: [idev] SUBJECT.KEYID = 7
3,513,251 UART: [idev] UDS.KEYID = 0
3,516,048 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,660,093 UART: [idev] Erasing UDS.KEYID = 0
6,020,914 UART: [idev] Sha1 KeyId Algorithm
6,044,440 UART: [idev] --
6,049,198 UART: [ldev] ++
6,049,769 UART: [ldev] CDI.KEYID = 6
6,050,658 UART: [ldev] SUBJECT.KEYID = 5
6,051,871 UART: [ldev] AUTHORITY.KEYID = 7
6,053,107 UART: [ldev] FE.KEYID = 1
6,092,509 UART: [ldev] Erasing FE.KEYID = 1
8,595,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,458 UART: [ldev] --
10,406,128 UART: [fwproc] Wait for Commands...
10,407,634 UART: [fwproc] Recv command 0x46574c44
10,409,732 UART: [fwproc] Recv'd Img size: 114360 bytes
14,975,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,052,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,120,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,438,432 >>> mbox cmd response: success
15,440,719 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,584,662 UART: [afmc] ++
15,585,305 UART: [afmc] CDI.KEYID = 6
15,586,226 UART: [afmc] SUBJECT.KEYID = 7
15,587,330 UART: [afmc] AUTHORITY.KEYID = 5
17,969,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,695,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,697,073 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,713,090 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,729,048 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,744,814 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,766,131 UART: [afmc] --
19,769,576 UART: [cold-reset] --
19,771,393 UART: [state] Locking Datavault
19,777,879 UART: [state] Locking PCR0, PCR1 and PCR31
19,779,658 UART: [state] Locking ICCM
19,780,653 UART: [exit] Launching FMC @ 0x40000130
19,789,047 UART:
19,789,281 UART: Running Caliptra FMC ...
19,790,306 UART:
19,790,454 UART: [state] CFI Enabled
19,855,584 UART: [fht] FMC Alias Private Key: 7
21,619,342 UART: [art] Extend RT PCRs Done
21,620,569 UART: [art] Lock RT PCRs Done
21,622,228 UART: [art] Populate DV Done
21,627,479 UART: [fht] FMC Alias Private Key: 7
21,629,078 UART: [art] Derive CDI
21,629,894 UART: [art] Store in in slot 0x4
21,691,133 UART: [art] Derive Key Pair
21,692,134 UART: [art] Store priv key in slot 0x5
24,155,018 UART: [art] Derive Key Pair - Done
24,167,904 UART: [art] Signing Cert with AUTHO
24,169,216 UART: RITY.KEYID = 7
25,881,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,882,693 UART: [art] PUB.X = 77458B8CF251001543202BF0C22D4214179D7993B491E0274496AD3A0B8D11057681E76A6316FD68C5F0ACFA4E2A57D8
25,889,957 UART: [art] PUB.Y = DCD6F864EF0EA2AA110665A35966F82509F8326635F348F608DC22E2907E177012823CBB1BC1F7C401D4B960CCF26166
25,897,194 UART: [art] SIG.R = 59A7C8F032E84C60F3B3DE4D1138A1C030C39F62AAD8CEAE958BCCF7CC30656D0A3EEFC4AD0A4A15F663354D9218E2D7
25,904,599 UART: [art] SIG.S = 77E7106A75166C5A76D2C185811B66ED15D3070A5140ACC004304107A2FF81333AA884C4A30BD4381179B8919A9E0A40
26,883,330 UART: Caliptra RT
26,884,017 UART: [state] CFI Enabled
27,049,369 UART: [rt] RT listening for mailbox commands...
27,051,918 UART:
27,052,124 UART: Running Caliptra ROM ...
27,053,231 UART:
27,053,410 UART: [state] CFI Enabled
27,115,704 UART: [state] LifecycleState = Unprovisioned
27,117,576 UART: [state] DebugLocked = No
27,119,179 UART: [state] WD Timer not started. Device not locked for debugging
27,122,482 UART: [kat] SHA2-256
27,301,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,313,173 UART: [kat] ++
27,313,706 UART: [kat] sha1
27,324,850 UART: [kat] SHA2-256
27,327,912 UART: [kat] SHA2-384
27,333,354 UART: [kat] SHA2-512-ACC
27,336,291 UART: [kat] ECC-384
29,802,986 UART: [kat] HMAC-384Kdf
29,824,021 UART: [kat] LMS
30,353,495 UART: [kat] --
30,360,663 UART: [update-reset] ++
30,412,946 >>> mbox cmd response: failed
30,414,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,558,596 UART: ROM Non-Fatal Error: 0x000B003D
30,560,025 UART: [state] Locking Datavault
30,561,181 UART: [state] Locking PCR0, PCR1 and PCR31
30,562,716 UART: [state] Locking ICCM
30,563,623 UART: [exit] Launching FMC @ 0x40000130
30,565,042 UART:
30,565,203 UART: Running Caliptra FMC ...
30,566,299 UART:
30,566,454 UART: [state] CFI Enabled
30,567,314 UART: [art] Extend RT PCRs Done
30,568,450 UART: [art] Lock RT PCRs Done
30,569,518 UART: [art] Populate DV Done
30,570,542 UART: [fht] FMC Alias Private Key: 7
30,571,857 UART: [art] Derive CDI
30,572,610 UART: [art] Store in in slot 0x4
30,610,456 UART: [art] Derive Key Pair
30,611,498 UART: [art] Store priv key in slot 0x5
33,074,181 UART: [art] Derive Key Pair - Done
33,087,216 UART: [art] Signing Cert with AUTHO
33,088,525 UART: RITY.KEYID = 7
34,799,958 UART: [art] Erasing AUTHORITY.KEYID = 7
34,801,468 UART: [art] PUB.X = 77458B8CF251001543202BF0C22D4214179D7993B491E0274496AD3A0B8D11057681E76A6316FD68C5F0ACFA4E2A57D8
34,808,666 UART: [art] PUB.Y = DCD6F864EF0EA2AA110665A35966F82509F8326635F348F608DC22E2907E177012823CBB1BC1F7C401D4B960CCF26166
34,815,938 UART: [art] SIG.R = 59A7C8F032E84C60F3B3DE4D1138A1C030C39F62AAD8CEAE958BCCF7CC30656D0A3EEFC4AD0A4A15F663354D9218E2D7
34,823,393 UART: [art] SIG.S = 77E7106A75166C5A76D2C185811B66ED15D3070A5140ACC004304107A2FF81333AA884C4A30BD4381179B8919A9E0A40
35,801,742 UART: Caliptra RT
35,802,458 UART: [state] CFI Enabled
36,142,217 UART: [rt] RT listening for mailbox commands...
36,145,015 UART:
36,145,272 UART: Running Caliptra ROM ...
36,146,399 UART:
36,146,571 UART: [state] CFI Enabled
36,205,656 UART: [state] LifecycleState = Unprovisioned
36,207,527 UART: [state] DebugLocked = No
36,209,073 UART: [state] WD Timer not started. Device not locked for debugging
36,212,761 UART: [kat] SHA2-256
36,391,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,403,442 UART: [kat] ++
36,403,977 UART: [kat] sha1
36,415,406 UART: [kat] SHA2-256
36,418,475 UART: [kat] SHA2-384
36,425,567 UART: [kat] SHA2-512-ACC
36,428,515 UART: [kat] ECC-384
38,889,437 UART: [kat] HMAC-384Kdf
38,912,831 UART: [kat] LMS
39,442,311 UART: [kat] --
39,447,144 UART: [update-reset] ++
44,044,704 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,048,292 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
44,431,272 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,221 UART:
192,570 UART: Running Caliptra ROM ...
193,663 UART:
193,807 UART: [state] CFI Enabled
267,060 UART: [state] LifecycleState = Unprovisioned
269,478 UART: [state] DebugLocked = No
271,582 UART: [state] WD Timer not started. Device not locked for debugging
276,061 UART: [kat] SHA2-256
465,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,727 UART: [kat] ++
477,173 UART: [kat] sha1
488,210 UART: [kat] SHA2-256
491,220 UART: [kat] SHA2-384
497,096 UART: [kat] SHA2-512-ACC
499,665 UART: [kat] ECC-384
2,952,612 UART: [kat] HMAC-384Kdf
2,975,153 UART: [kat] LMS
3,506,960 UART: [kat] --
3,512,398 UART: [cold-reset] ++
3,513,572 UART: [fht] FHT @ 0x50003400
3,525,132 UART: [idev] ++
3,525,813 UART: [idev] CDI.KEYID = 6
3,526,750 UART: [idev] SUBJECT.KEYID = 7
3,527,965 UART: [idev] UDS.KEYID = 0
3,530,981 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,675,069 UART: [idev] Erasing UDS.KEYID = 0
6,032,629 UART: [idev] Sha1 KeyId Algorithm
6,056,027 UART: [idev] --
6,061,046 UART: [ldev] ++
6,061,729 UART: [ldev] CDI.KEYID = 6
6,062,670 UART: [ldev] SUBJECT.KEYID = 5
6,063,849 UART: [ldev] AUTHORITY.KEYID = 7
6,065,087 UART: [ldev] FE.KEYID = 1
6,104,079 UART: [ldev] Erasing FE.KEYID = 1
8,611,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,496 UART: [ldev] --
10,418,137 UART: [fwproc] Wait for Commands...
10,421,372 UART: [fwproc] Recv command 0x46574c44
10,423,635 UART: [fwproc] Recv'd Img size: 114360 bytes
15,047,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,130,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,247,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
15,790,259 >>> mbox cmd response: success
15,792,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,936,716 UART: [afmc] ++
15,937,364 UART: [afmc] CDI.KEYID = 6
15,938,258 UART: [afmc] SUBJECT.KEYID = 7
15,939,307 UART: [afmc] AUTHORITY.KEYID = 5
18,330,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,070,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,072,198 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,087,281 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,102,520 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,117,315 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,141,329 UART: [afmc] --
20,145,136 UART: [cold-reset] --
20,150,456 UART: [state] Locking Datavault
20,156,072 UART: [state] Locking PCR0, PCR1 and PCR31
20,158,272 UART: [state] Locking ICCM
20,160,464 UART: [exit] Launching FMC @ 0x40000130
20,169,128 UART:
20,169,372 UART: Running Caliptra FMC ...
20,170,398 UART:
20,170,545 UART: [state] CFI Enabled
20,227,196 UART: [fht] FMC Alias Private Key: 7
21,991,199 UART: [art] Extend RT PCRs Done
21,992,431 UART: [art] Lock RT PCRs Done
21,994,241 UART: [art] Populate DV Done
21,999,811 UART: [fht] FMC Alias Private Key: 7
22,001,506 UART: [art] Derive CDI
22,002,248 UART: [art] Store in in slot 0x4
22,061,212 UART: [art] Derive Key Pair
22,062,211 UART: [art] Store priv key in slot 0x5
24,524,930 UART: [art] Derive Key Pair - Done
24,537,820 UART: [art] Signing Cert with AUTHO
24,539,144 UART: RITY.KEYID = 7
26,250,904 UART: [art] Erasing AUTHORITY.KEYID = 7
26,252,418 UART: [art] PUB.X = 7AA468A141452373B0418460D8DD50B940E4FA237CAC1084F119CD1BFC795DCAF0818D5DC88E755BC1C36E9508184AE8
26,259,645 UART: [art] PUB.Y = 1C11F7F9B0427D6E4F8A79DBB9508D74B5F61C08AB521146962A1AF02B488D43CFA746B2C0B393D5E7BDC6EE05BF3C75
26,266,969 UART: [art] SIG.R = 6F9E9263C5FFFDAA5D4048348C925544F1529052C9ADA7DF7A75673AE63F146F6D959D1B49DDF72DF59BE4326EF2CC8F
26,274,371 UART: [art] SIG.S = 6114FE08E7A43CC5C510143E4E1E865149D0F16773B032C364B48DEA75E6DCFC7D4DDBABC9155DF441665BE4F001F5AD
27,253,817 UART: Caliptra RT
27,254,507 UART: [state] CFI Enabled
27,419,380 UART: [rt] RT listening for mailbox commands...
27,421,740 UART:
27,421,906 UART: Running Caliptra ROM ...
27,423,007 UART:
27,423,171 UART: [state] CFI Enabled
27,483,283 UART: [state] LifecycleState = Unprovisioned
27,485,370 UART: [state] DebugLocked = No
27,486,969 UART: [state] WD Timer not started. Device not locked for debugging
27,491,972 UART: [kat] SHA2-256
27,681,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,692,559 UART: [kat] ++
27,693,046 UART: [kat] sha1
27,704,640 UART: [kat] SHA2-256
27,707,658 UART: [kat] SHA2-384
27,714,023 UART: [kat] SHA2-512-ACC
27,716,593 UART: [kat] ECC-384
30,168,522 UART: [kat] HMAC-384Kdf
30,192,738 UART: [kat] LMS
30,724,274 UART: [kat] --
30,727,993 UART: [update-reset] ++
30,798,112 >>> mbox cmd response: failed
30,799,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,943,544 UART: ROM Non-Fatal Error: 0x000B003D
30,944,975 UART: [state] Locking Datavault
30,946,157 UART: [state] Locking PCR0, PCR1 and PCR31
30,947,704 UART: [state] Locking ICCM
30,948,612 UART: [exit] Launching FMC @ 0x40000130
30,950,033 UART:
30,950,196 UART: Running Caliptra FMC ...
30,951,505 UART:
30,951,671 UART: [state] CFI Enabled
30,952,592 UART: [art] Extend RT PCRs Done
30,953,729 UART: [art] Lock RT PCRs Done
30,954,796 UART: [art] Populate DV Done
30,955,824 UART: [fht] FMC Alias Private Key: 7
30,957,138 UART: [art] Derive CDI
30,957,872 UART: [art] Store in in slot 0x4
30,977,351 UART: [art] Derive Key Pair
30,978,346 UART: [art] Store priv key in slot 0x5
33,440,970 UART: [art] Derive Key Pair - Done
33,453,944 UART: [art] Signing Cert with AUTHO
33,455,249 UART: RITY.KEYID = 7
35,167,141 UART: [art] Erasing AUTHORITY.KEYID = 7
35,168,648 UART: [art] PUB.X = 7AA468A141452373B0418460D8DD50B940E4FA237CAC1084F119CD1BFC795DCAF0818D5DC88E755BC1C36E9508184AE8
35,175,915 UART: [art] PUB.Y = 1C11F7F9B0427D6E4F8A79DBB9508D74B5F61C08AB521146962A1AF02B488D43CFA746B2C0B393D5E7BDC6EE05BF3C75
35,183,180 UART: [art] SIG.R = 6F9E9263C5FFFDAA5D4048348C925544F1529052C9ADA7DF7A75673AE63F146F6D959D1B49DDF72DF59BE4326EF2CC8F
35,190,573 UART: [art] SIG.S = 6114FE08E7A43CC5C510143E4E1E865149D0F16773B032C364B48DEA75E6DCFC7D4DDBABC9155DF441665BE4F001F5AD
36,169,190 UART: Caliptra RT
36,169,909 UART: [state] CFI Enabled
36,503,359 UART: [rt] RT listening for mailbox commands...
36,506,001 UART:
36,506,202 UART: Running Caliptra ROM ...
36,507,312 UART:
36,507,475 UART: [state] CFI Enabled
36,569,985 UART: [state] LifecycleState = Unprovisioned
36,572,054 UART: [state] DebugLocked = No
36,574,607 UART: [state] WD Timer not started. Device not locked for debugging
36,579,707 UART: [kat] SHA2-256
36,769,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,780,299 UART: [kat] ++
36,780,755 UART: [kat] sha1
36,791,585 UART: [kat] SHA2-256
36,794,584 UART: [kat] SHA2-384
36,800,259 UART: [kat] SHA2-512-ACC
36,802,882 UART: [kat] ECC-384
39,259,084 UART: [kat] HMAC-384Kdf
39,280,536 UART: [kat] LMS
39,812,106 UART: [kat] --
39,815,958 UART: [update-reset] ++
44,443,012 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,446,353 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
45,054,068 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,420,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,797,912 >>> mbox cmd response: success
15,799,885 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,092,836 UART:
20,093,242 UART: Running Caliptra FMC ...
20,094,473 UART:
20,094,647 UART: [state] CFI Enabled
20,161,142 UART: [fht] FMC Alias Private Key: 7
21,924,892 UART: [art] Extend RT PCRs Done
21,926,114 UART: [art] Lock RT PCRs Done
21,927,770 UART: [art] Populate DV Done
21,933,005 UART: [fht] FMC Alias Private Key: 7
21,934,496 UART: [art] Derive CDI
21,935,257 UART: [art] Store in in slot 0x4
21,994,003 UART: [art] Derive Key Pair
21,995,052 UART: [art] Store priv key in slot 0x5
24,457,816 UART: [art] Derive Key Pair - Done
24,470,929 UART: [art] Signing Cert with AUTHO
24,472,257 UART: RITY.KEYID = 7
26,184,321 UART: [art] Erasing AUTHORITY.KEYID = 7
26,185,836 UART: [art] PUB.X = C64C959E50FB06E327F87A0E7FAAFC50FCE097DF30283F207CB3544F306C281081F4586A94F62F4FD18F544F64D173DB
26,193,078 UART: [art] PUB.Y = E349C4C40CA03115CDDBCE2BF2825D12F575D2C8AF6CC6788F560B6FF746708C13EE30E5C1265E154DB51C2647A47DB0
26,200,320 UART: [art] SIG.R = 873B3A2902976B5C85CE26AE99F3999B1586656AC56C35CFAB69FF3FED776407494FCECCB0D7D2EBCAEE987614FC5784
26,207,772 UART: [art] SIG.S = 0C031997A71E236D0E12F8A24E0789C812CC9D8CB63E1515F4BD1627034136D3D85A7BF7D3ADE4B62145C8657A16DEB0
27,186,886 UART: Caliptra RT
27,187,603 UART: [state] CFI Enabled
27,352,538 UART: [rt] RT listening for mailbox commands...
30,635,046 >>> mbox cmd response: failed
30,636,771 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,781,047 UART:
30,781,372 UART: Running Caliptra FMC ...
30,782,506 UART:
30,782,689 UART: [state] CFI Enabled
30,783,616 UART: [art] Extend RT PCRs Done
30,784,776 UART: [art] Lock RT PCRs Done
30,785,845 UART: [art] Populate DV Done
30,786,954 UART: [fht] FMC Alias Private Key: 7
30,788,277 UART: [art] Derive CDI
30,789,013 UART: [art] Store in in slot 0x4
30,805,312 UART: [art] Derive Key Pair
30,806,312 UART: [art] Store priv key in slot 0x5
33,269,299 UART: [art] Derive Key Pair - Done
33,282,631 UART: [art] Signing Cert with AUTHO
33,283,945 UART: RITY.KEYID = 7
34,994,644 UART: [art] Erasing AUTHORITY.KEYID = 7
34,996,151 UART: [art] PUB.X = C64C959E50FB06E327F87A0E7FAAFC50FCE097DF30283F207CB3544F306C281081F4586A94F62F4FD18F544F64D173DB
35,003,410 UART: [art] PUB.Y = E349C4C40CA03115CDDBCE2BF2825D12F575D2C8AF6CC6788F560B6FF746708C13EE30E5C1265E154DB51C2647A47DB0
35,010,659 UART: [art] SIG.R = 873B3A2902976B5C85CE26AE99F3999B1586656AC56C35CFAB69FF3FED776407494FCECCB0D7D2EBCAEE987614FC5784
35,018,098 UART: [art] SIG.S = 0C031997A71E236D0E12F8A24E0789C812CC9D8CB63E1515F4BD1627034136D3D85A7BF7D3ADE4B62145C8657A16DEB0
35,997,235 UART: Caliptra RT
35,997,954 UART: [state] CFI Enabled
36,335,703 UART: [rt] RT listening for mailbox commands...
45,100,540 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,534 UART:
192,910 UART: Running Caliptra ROM ...
194,099 UART:
603,859 UART: [state] CFI Enabled
615,996 UART: [state] LifecycleState = Unprovisioned
618,363 UART: [state] DebugLocked = No
620,840 UART: [state] WD Timer not started. Device not locked for debugging
625,095 UART: [kat] SHA2-256
814,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,744 UART: [kat] ++
826,251 UART: [kat] sha1
837,883 UART: [kat] SHA2-256
840,897 UART: [kat] SHA2-384
846,933 UART: [kat] SHA2-512-ACC
849,492 UART: [kat] ECC-384
3,291,771 UART: [kat] HMAC-384Kdf
3,305,524 UART: [kat] LMS
3,837,390 UART: [kat] --
3,842,151 UART: [cold-reset] ++
3,843,816 UART: [fht] FHT @ 0x50003400
3,854,359 UART: [idev] ++
3,855,107 UART: [idev] CDI.KEYID = 6
3,855,989 UART: [idev] SUBJECT.KEYID = 7
3,857,202 UART: [idev] UDS.KEYID = 0
3,859,874 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,377 UART: [idev] Erasing UDS.KEYID = 0
6,335,558 UART: [idev] Sha1 KeyId Algorithm
6,358,886 UART: [idev] --
6,364,093 UART: [ldev] ++
6,364,782 UART: [ldev] CDI.KEYID = 6
6,365,667 UART: [ldev] SUBJECT.KEYID = 5
6,366,875 UART: [ldev] AUTHORITY.KEYID = 7
6,368,051 UART: [ldev] FE.KEYID = 1
6,379,704 UART: [ldev] Erasing FE.KEYID = 1
8,861,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,376 UART: [ldev] --
10,654,640 UART: [fwproc] Wait for Commands...
10,656,276 UART: [fwproc] Recv command 0x46574c44
10,658,549 UART: [fwproc] Recv'd Img size: 114360 bytes
15,292,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,377,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,493,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,035,835 >>> mbox cmd response: success
16,038,114 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,181,702 UART: [afmc] ++
16,182,338 UART: [afmc] CDI.KEYID = 6
16,183,264 UART: [afmc] SUBJECT.KEYID = 7
16,184,588 UART: [afmc] AUTHORITY.KEYID = 5
18,545,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,269,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,271,316 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,286,407 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,301,589 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,316,459 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,339,731 UART: [afmc] --
20,342,680 UART: [cold-reset] --
20,346,419 UART: [state] Locking Datavault
20,352,437 UART: [state] Locking PCR0, PCR1 and PCR31
20,354,627 UART: [state] Locking ICCM
20,356,399 UART: [exit] Launching FMC @ 0x40000130
20,365,069 UART:
20,365,310 UART: Running Caliptra FMC ...
20,366,413 UART:
20,366,577 UART: [state] CFI Enabled
20,374,297 UART: [fht] FMC Alias Private Key: 7
22,131,200 UART: [art] Extend RT PCRs Done
22,132,422 UART: [art] Lock RT PCRs Done
22,134,318 UART: [art] Populate DV Done
22,139,724 UART: [fht] FMC Alias Private Key: 7
22,141,289 UART: [art] Derive CDI
22,142,110 UART: [art] Store in in slot 0x4
22,184,711 UART: [art] Derive Key Pair
22,185,750 UART: [art] Store priv key in slot 0x5
24,612,547 UART: [art] Derive Key Pair - Done
24,625,589 UART: [art] Signing Cert with AUTHO
24,626,892 UART: RITY.KEYID = 7
26,332,117 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,622 UART: [art] PUB.X = AD454537D54B290C5993FCAB9BFE5213AACAC620D7F372367EB1DB53A0449B8A398BC593D715ED76D71A327CDEB3BF03
26,340,908 UART: [art] PUB.Y = A97ACB924ED4FA78D2C2D25FB63E6B1FEA6674A3281909343CBE59411D473588D06D01710C4710CDBC0B52F40B7E6CE6
26,348,211 UART: [art] SIG.R = 1EF4C8E01EFD6A848927EBC7F5FD64CFF6DE55388F73C458524123809FC9854D939262663DB49D86EF1C1BDA985F2EAA
26,355,585 UART: [art] SIG.S = D3920700B4EC0164AEE27CB00460C760B2EFFDFF3F41B2A3EE211A387EFFEF61CC8DE0A2AC36ED5A79FC5B39FD4D2F15
27,334,299 UART: Caliptra RT
27,334,986 UART: [state] CFI Enabled
27,451,016 UART: [rt] RT listening for mailbox commands...
27,453,751 UART:
27,453,932 UART: Running Caliptra ROM ...
27,455,038 UART:
27,455,358 UART: [state] CFI Enabled
27,468,156 UART: [state] LifecycleState = Unprovisioned
27,470,074 UART: [state] DebugLocked = No
27,472,511 UART: [state] WD Timer not started. Device not locked for debugging
27,477,005 UART: [kat] SHA2-256
27,666,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,677,675 UART: [kat] ++
27,678,185 UART: [kat] sha1
27,689,501 UART: [kat] SHA2-256
27,692,515 UART: [kat] SHA2-384
27,698,770 UART: [kat] SHA2-512-ACC
27,701,333 UART: [kat] ECC-384
30,140,176 UART: [kat] HMAC-384Kdf
30,153,685 UART: [kat] LMS
30,685,319 UART: [kat] --
30,690,834 UART: [update-reset] ++
30,757,067 >>> mbox cmd response: failed
30,758,812 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,902,372 UART: ROM Non-Fatal Error: 0x000B003D
30,904,006 UART: [state] Locking Datavault
30,905,125 UART: [state] Locking PCR0, PCR1 and PCR31
30,906,668 UART: [state] Locking ICCM
30,907,575 UART: [exit] Launching FMC @ 0x40000130
30,909,003 UART:
30,909,172 UART: Running Caliptra FMC ...
30,910,272 UART:
30,910,426 UART: [state] CFI Enabled
30,911,343 UART: [art] Extend RT PCRs Done
30,912,481 UART: [art] Lock RT PCRs Done
30,913,544 UART: [art] Populate DV Done
30,914,590 UART: [fht] FMC Alias Private Key: 7
30,915,905 UART: [art] Derive CDI
30,916,639 UART: [art] Store in in slot 0x4
30,917,803 UART: [art] Derive Key Pair
30,918,791 UART: [art] Store priv key in slot 0x5
33,308,232 UART: [art] Derive Key Pair - Done
33,321,068 UART: [art] Signing Cert with AUTHO
33,322,378 UART: RITY.KEYID = 7
35,027,899 UART: [art] Erasing AUTHORITY.KEYID = 7
35,029,405 UART: [art] PUB.X = AD454537D54B290C5993FCAB9BFE5213AACAC620D7F372367EB1DB53A0449B8A398BC593D715ED76D71A327CDEB3BF03
35,036,690 UART: [art] PUB.Y = A97ACB924ED4FA78D2C2D25FB63E6B1FEA6674A3281909343CBE59411D473588D06D01710C4710CDBC0B52F40B7E6CE6
35,043,966 UART: [art] SIG.R = 1EF4C8E01EFD6A848927EBC7F5FD64CFF6DE55388F73C458524123809FC9854D939262663DB49D86EF1C1BDA985F2EAA
35,051,349 UART: [art] SIG.S = D3920700B4EC0164AEE27CB00460C760B2EFFDFF3F41B2A3EE211A387EFFEF61CC8DE0A2AC36ED5A79FC5B39FD4D2F15
36,030,229 UART: Caliptra RT
36,030,924 UART: [state] CFI Enabled
36,318,484 UART: [rt] RT listening for mailbox commands...
36,321,162 UART:
36,321,360 UART: Running Caliptra ROM ...
36,322,472 UART:
36,322,743 UART: [state] CFI Enabled
40,320,607 UART: [state] LifecycleState = Unprovisioned
40,322,525 UART: [state] DebugLocked = No
40,324,240 UART: [state] WD Timer not started. Device not locked for debugging
40,328,957 UART: [kat] SHA2-256
40,518,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,529,553 UART: [kat] ++
40,530,154 UART: [kat] sha1
40,541,427 UART: [kat] SHA2-256
40,544,440 UART: [kat] SHA2-384
40,551,613 UART: [kat] SHA2-512-ACC
40,554,185 UART: [kat] ECC-384
42,993,948 UART: [kat] HMAC-384Kdf
43,006,951 UART: [kat] LMS
43,538,572 UART: [kat] --
43,543,853 UART: [update-reset] ++
48,195,419 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,199,388 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
48,807,126 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,760,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,085,123 >>> mbox cmd response: success
16,086,981 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
20,339,224 UART:
20,339,665 UART: Running Caliptra FMC ...
20,340,816 UART:
20,340,980 UART: [state] CFI Enabled
20,348,807 UART: [fht] FMC Alias Private Key: 7
22,105,739 UART: [art] Extend RT PCRs Done
22,106,961 UART: [art] Lock RT PCRs Done
22,108,741 UART: [art] Populate DV Done
22,113,873 UART: [fht] FMC Alias Private Key: 7
22,115,412 UART: [art] Derive CDI
22,116,149 UART: [art] Store in in slot 0x4
22,158,846 UART: [art] Derive Key Pair
22,159,844 UART: [art] Store priv key in slot 0x5
24,586,507 UART: [art] Derive Key Pair - Done
24,599,518 UART: [art] Signing Cert with AUTHO
24,600,825 UART: RITY.KEYID = 7
26,306,275 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,793 UART: [art] PUB.X = 16146562DF32C0EE0A22D31FD5BE1D06F21A3AC4CA92ECE73797AE012EF3BEBC3ABCF64714A5453C8E15C32959B90497
26,315,033 UART: [art] PUB.Y = 7557F4DB6C6EAC011FFAB515398438E30A49CFDA9F6B22E40CF86031FA1394968CC7FF5F7657CCB51BD5A9CEA716CAA6
26,322,306 UART: [art] SIG.R = 2541C980D508B01B6553F8F7E4C3C9A2C51581F758B1D031A055576913AEE8BDC9A11AA50F730EB994662A3C0F2D0D14
26,329,728 UART: [art] SIG.S = F858033DF683DDECA31B267300A88E00D211B8967756AB5B02D2E7FAEEC68679F1D3D1B8BCC31376BAAB757247EFC937
27,308,614 UART: Caliptra RT
27,309,299 UART: [state] CFI Enabled
27,426,733 UART: [rt] RT listening for mailbox commands...
30,623,376 >>> mbox cmd response: failed
30,625,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,768,872 UART:
30,769,195 UART: Running Caliptra FMC ...
30,770,323 UART:
30,770,488 UART: [state] CFI Enabled
30,771,410 UART: [art] Extend RT PCRs Done
30,772,543 UART: [art] Lock RT PCRs Done
30,773,612 UART: [art] Populate DV Done
30,774,703 UART: [fht] FMC Alias Private Key: 7
30,776,020 UART: [art] Derive CDI
30,776,759 UART: [art] Store in in slot 0x4
30,777,927 UART: [art] Derive Key Pair
30,778,876 UART: [art] Store priv key in slot 0x5
33,163,479 UART: [art] Derive Key Pair - Done
33,176,519 UART: [art] Signing Cert with AUTHO
33,177,826 UART: RITY.KEYID = 7
34,883,235 UART: [art] Erasing AUTHORITY.KEYID = 7
34,884,742 UART: [art] PUB.X = 16146562DF32C0EE0A22D31FD5BE1D06F21A3AC4CA92ECE73797AE012EF3BEBC3ABCF64714A5453C8E15C32959B90497
34,892,038 UART: [art] PUB.Y = 7557F4DB6C6EAC011FFAB515398438E30A49CFDA9F6B22E40CF86031FA1394968CC7FF5F7657CCB51BD5A9CEA716CAA6
34,899,326 UART: [art] SIG.R = 2541C980D508B01B6553F8F7E4C3C9A2C51581F758B1D031A055576913AEE8BDC9A11AA50F730EB994662A3C0F2D0D14
34,906,714 UART: [art] SIG.S = F858033DF683DDECA31B267300A88E00D211B8967756AB5B02D2E7FAEEC68679F1D3D1B8BCC31376BAAB757247EFC937
35,885,652 UART: Caliptra RT
35,886,371 UART: [state] CFI Enabled
36,174,530 UART: [rt] RT listening for mailbox commands...
49,015,004 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,813 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,707 UART: [kat] SHA2-256
892,645 UART: [kat] SHA2-384
895,438 UART: [kat] SHA2-512-ACC
897,339 UART: [kat] ECC-384
903,226 UART: [kat] HMAC-384Kdf
907,816 UART: [kat] LMS
1,476,012 UART: [kat] --
1,476,929 UART: [cold-reset] ++
1,477,499 UART: [fht] Storing FHT @ 0x50003400
1,480,444 UART: [idev] ++
1,480,612 UART: [idev] CDI.KEYID = 6
1,480,972 UART: [idev] SUBJECT.KEYID = 7
1,481,396 UART: [idev] UDS.KEYID = 0
1,481,741 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,608 UART: [idev] Erasing UDS.KEYID = 0
1,506,292 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,998 UART: [idev] --
1,516,089 UART: [ldev] ++
1,516,257 UART: [ldev] CDI.KEYID = 6
1,516,620 UART: [ldev] SUBJECT.KEYID = 5
1,517,046 UART: [ldev] AUTHORITY.KEYID = 7
1,517,509 UART: [ldev] FE.KEYID = 1
1,522,659 UART: [ldev] Erasing FE.KEYID = 1
1,547,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,190 UART: [ldev] --
1,587,585 UART: [fwproc] Waiting for Commands...
1,588,346 UART: [fwproc] Received command 0x46574c44
1,589,137 UART: [fwproc] Received Image of size 114360 bytes
5,310,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,338,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,368,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,503,971 >>> mbox cmd response: success
5,503,971 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,505,205 UART: [afmc] ++
5,505,373 UART: [afmc] CDI.KEYID = 6
5,505,735 UART: [afmc] SUBJECT.KEYID = 7
5,506,160 UART: [afmc] AUTHORITY.KEYID = 5
5,540,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,557,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,557,990 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,563,699 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,569,591 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,575,292 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,583,040 UART: [afmc] --
5,583,950 UART: [cold-reset] --
5,584,892 UART: [state] Locking Datavault
5,586,253 UART: [state] Locking PCR0, PCR1 and PCR31
5,586,857 UART: [state] Locking ICCM
5,587,397 UART: [exit] Launching FMC @ 0x40000130
5,592,726 UART:
5,592,742 UART: Running Caliptra FMC ...
5,593,150 UART:
5,593,204 UART: [state] CFI Enabled
5,603,632 UART: [fht] FMC Alias Private Key: 7
5,711,966 UART: [art] Extend RT PCRs Done
5,712,394 UART: [art] Lock RT PCRs Done
5,713,622 UART: [art] Populate DV Done
5,721,884 UART: [fht] FMC Alias Private Key: 7
5,722,964 UART: [art] Derive CDI
5,723,244 UART: [art] Store in in slot 0x4
5,808,849 UART: [art] Derive Key Pair
5,809,209 UART: [art] Store priv key in slot 0x5
5,821,733 UART: [art] Derive Key Pair - Done
5,836,393 UART: [art] Signing Cert with AUTHO
5,836,873 UART: RITY.KEYID = 7
5,851,667 UART: [art] Erasing AUTHORITY.KEYID = 7
5,852,432 UART: [art] PUB.X = 9B6EF1B6855E365935709E4077F5A8439A20FA53371DB4D633E96B47B8B31F6A398837A4653ED79EEA7E968ABE59D3ED
5,859,206 UART: [art] PUB.Y = A51C141E7A147AFB086AB165B2D701C1EE214E5B1C687F29B3BE7E4FF4A0A0AD22744E112E27D62DA004FB91EC8CA3E7
5,866,165 UART: [art] SIG.R = 7BE075D7776D385E1BB2B48C2383972A0A1F34D8DE424DF956B4D16E73DC3A75B286380D939A17077497329F1F4B7EAC
5,872,928 UART: [art] SIG.S = 97E21E515EFAD19173D0429505C3AF758F082B43600EDDB01320B5B4E899A30AA10AC34EEFC411851A1625125AF4C950
5,896,328 UART: Caliptra RT
5,896,582 UART: [state] CFI Enabled
6,006,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,873 UART:
6,007,889 UART: Running Caliptra ROM ...
6,008,297 UART:
6,008,351 UART: [state] CFI Enabled
6,011,101 UART: [state] LifecycleState = Unprovisioned
6,011,756 UART: [state] DebugLocked = No
6,012,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,014,135 UART: [kat] SHA2-256
6,808,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,812,181 UART: [kat] ++
6,812,333 UART: [kat] sha1
6,816,523 UART: [kat] SHA2-256
6,818,461 UART: [kat] SHA2-384
6,821,128 UART: [kat] SHA2-512-ACC
6,823,028 UART: [kat] ECC-384
6,828,891 UART: [kat] HMAC-384Kdf
6,833,519 UART: [kat] LMS
7,401,715 UART: [kat] --
7,402,758 UART: [update-reset] ++
7,442,285 >>> mbox cmd response: failed
7,442,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
7,442,637 UART: ROM Non-Fatal Error: 0x000B003D
7,443,517 UART: [state] Locking Datavault
7,444,459 UART: [state] Locking PCR0, PCR1 and PCR31
7,445,063 UART: [state] Locking ICCM
7,445,543 UART: [exit] Launching FMC @ 0x40000130
7,450,872 UART:
7,450,888 UART: Running Caliptra FMC ...
7,451,296 UART:
7,451,350 UART: [state] CFI Enabled
7,540,693 UART: [art] Extend RT PCRs Done
7,541,121 UART: [art] Lock RT PCRs Done
7,542,298 UART: [art] Populate DV Done
7,550,644 UART: [fht] FMC Alias Private Key: 7
7,551,736 UART: [art] Derive CDI
7,552,016 UART: [art] Store in in slot 0x4
7,637,835 UART: [art] Derive Key Pair
7,638,195 UART: [art] Store priv key in slot 0x5
7,651,521 UART: [art] Derive Key Pair - Done
7,666,449 UART: [art] Signing Cert with AUTHO
7,666,929 UART: RITY.KEYID = 7
7,682,113 UART: [art] Erasing AUTHORITY.KEYID = 7
7,682,878 UART: [art] PUB.X = 9B6EF1B6855E365935709E4077F5A8439A20FA53371DB4D633E96B47B8B31F6A398837A4653ED79EEA7E968ABE59D3ED
7,689,652 UART: [art] PUB.Y = A51C141E7A147AFB086AB165B2D701C1EE214E5B1C687F29B3BE7E4FF4A0A0AD22744E112E27D62DA004FB91EC8CA3E7
7,696,611 UART: [art] SIG.R = 7BE075D7776D385E1BB2B48C2383972A0A1F34D8DE424DF956B4D16E73DC3A75B286380D939A17077497329F1F4B7EAC
7,703,374 UART: [art] SIG.S = 97E21E515EFAD19173D0429505C3AF758F082B43600EDDB01320B5B4E899A30AA10AC34EEFC411851A1625125AF4C950
7,727,096 UART: Caliptra RT
7,727,350 UART: [state] CFI Enabled
8,007,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,009,418 UART:
8,009,434 UART: Running Caliptra ROM ...
8,009,842 UART:
8,009,896 UART: [state] CFI Enabled
8,012,476 UART: [state] LifecycleState = Unprovisioned
8,013,131 UART: [state] DebugLocked = No
8,013,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,015,380 UART: [kat] SHA2-256
8,809,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,813,426 UART: [kat] ++
8,813,578 UART: [kat] sha1
8,817,660 UART: [kat] SHA2-256
8,819,598 UART: [kat] SHA2-384
8,822,507 UART: [kat] SHA2-512-ACC
8,824,407 UART: [kat] ECC-384
8,830,034 UART: [kat] HMAC-384Kdf
8,834,536 UART: [kat] LMS
9,402,732 UART: [kat] --
9,403,815 UART: [update-reset] ++
13,162,918 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,164,012 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
13,313,930 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,013,904 >>> mbox cmd response: success
5,013,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,074,981 UART:
5,074,997 UART: Running Caliptra FMC ...
5,075,405 UART:
5,075,459 UART: [state] CFI Enabled
5,085,935 UART: [fht] FMC Alias Private Key: 7
5,193,945 UART: [art] Extend RT PCRs Done
5,194,373 UART: [art] Lock RT PCRs Done
5,196,035 UART: [art] Populate DV Done
5,204,225 UART: [fht] FMC Alias Private Key: 7
5,205,261 UART: [art] Derive CDI
5,205,541 UART: [art] Store in in slot 0x4
5,290,822 UART: [art] Derive Key Pair
5,291,182 UART: [art] Store priv key in slot 0x5
5,304,096 UART: [art] Derive Key Pair - Done
5,318,729 UART: [art] Signing Cert with AUTHO
5,319,209 UART: RITY.KEYID = 7
5,334,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,335,050 UART: [art] PUB.X = C34E8A2845C35668F4287657C929A65D741BC34F6CF814D191D8DB313D550E39FE77D8F444FBCE8B72D59ADCCDD5ACE7
5,341,831 UART: [art] PUB.Y = 2DA63DD40B8FB89F2171746D3B4A6BB1048DFCB934C2979E106C2DEC9E8A58E36FE1DBA7ABF08E5DF1C5878106ACD06F
5,348,794 UART: [art] SIG.R = 4C9114CC47F3A1817BF5E42C8074FDE4F58C4453DDAA9F649D54C211C754725199328A9AC3A4C2BE680F29B13ED24324
5,355,565 UART: [art] SIG.S = DFC3277310AA0B84F53AB2ADD900B3305BBCF75F8E6C2F350D429F1C481A2DD4E0EC72283A255B310F33DCFA01DAABD2
5,379,368 UART: Caliptra RT
5,379,622 UART: [state] CFI Enabled
5,488,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,807,110 >>> mbox cmd response: failed
6,807,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,812,689 UART:
6,812,705 UART: Running Caliptra FMC ...
6,813,113 UART:
6,813,167 UART: [state] CFI Enabled
6,902,126 UART: [art] Extend RT PCRs Done
6,902,554 UART: [art] Lock RT PCRs Done
6,903,657 UART: [art] Populate DV Done
6,911,767 UART: [fht] FMC Alias Private Key: 7
6,912,771 UART: [art] Derive CDI
6,913,051 UART: [art] Store in in slot 0x4
6,999,120 UART: [art] Derive Key Pair
6,999,480 UART: [art] Store priv key in slot 0x5
7,012,388 UART: [art] Derive Key Pair - Done
7,027,385 UART: [art] Signing Cert with AUTHO
7,027,865 UART: RITY.KEYID = 7
7,043,133 UART: [art] Erasing AUTHORITY.KEYID = 7
7,043,898 UART: [art] PUB.X = C34E8A2845C35668F4287657C929A65D741BC34F6CF814D191D8DB313D550E39FE77D8F444FBCE8B72D59ADCCDD5ACE7
7,050,679 UART: [art] PUB.Y = 2DA63DD40B8FB89F2171746D3B4A6BB1048DFCB934C2979E106C2DEC9E8A58E36FE1DBA7ABF08E5DF1C5878106ACD06F
7,057,642 UART: [art] SIG.R = 4C9114CC47F3A1817BF5E42C8074FDE4F58C4453DDAA9F649D54C211C754725199328A9AC3A4C2BE680F29B13ED24324
7,064,413 UART: [art] SIG.S = DFC3277310AA0B84F53AB2ADD900B3305BBCF75F8E6C2F350D429F1C481A2DD4E0EC72283A255B310F33DCFA01DAABD2
7,087,746 UART: Caliptra RT
7,088,000 UART: [state] CFI Enabled
7,370,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,218,427 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
891,078 UART: [kat] SHA2-256
893,016 UART: [kat] SHA2-384
895,859 UART: [kat] SHA2-512-ACC
897,760 UART: [kat] ECC-384
903,301 UART: [kat] HMAC-384Kdf
908,067 UART: [kat] LMS
1,476,263 UART: [kat] --
1,477,406 UART: [cold-reset] ++
1,477,750 UART: [fht] Storing FHT @ 0x50003400
1,480,613 UART: [idev] ++
1,480,781 UART: [idev] CDI.KEYID = 6
1,481,141 UART: [idev] SUBJECT.KEYID = 7
1,481,565 UART: [idev] UDS.KEYID = 0
1,481,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,503 UART: [idev] Erasing UDS.KEYID = 0
1,506,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,773 UART: [idev] --
1,515,658 UART: [ldev] ++
1,515,826 UART: [ldev] CDI.KEYID = 6
1,516,189 UART: [ldev] SUBJECT.KEYID = 5
1,516,615 UART: [ldev] AUTHORITY.KEYID = 7
1,517,078 UART: [ldev] FE.KEYID = 1
1,522,554 UART: [ldev] Erasing FE.KEYID = 1
1,547,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,259 UART: [ldev] --
1,586,672 UART: [fwproc] Waiting for Commands...
1,587,401 UART: [fwproc] Received command 0x46574c44
1,588,192 UART: [fwproc] Received Image of size 114360 bytes
5,083,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,111,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,963 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
5,276,882 >>> mbox cmd response: success
5,276,882 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,278,058 UART: [afmc] ++
5,278,226 UART: [afmc] CDI.KEYID = 6
5,278,588 UART: [afmc] SUBJECT.KEYID = 7
5,279,013 UART: [afmc] AUTHORITY.KEYID = 5
5,313,955 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,329,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,330,749 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,336,458 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,342,350 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,348,051 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,355,991 UART: [afmc] --
5,357,003 UART: [cold-reset] --
5,357,901 UART: [state] Locking Datavault
5,359,386 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,990 UART: [state] Locking ICCM
5,360,534 UART: [exit] Launching FMC @ 0x40000130
5,365,863 UART:
5,365,879 UART: Running Caliptra FMC ...
5,366,287 UART:
5,366,430 UART: [state] CFI Enabled
5,376,980 UART: [fht] FMC Alias Private Key: 7
5,484,830 UART: [art] Extend RT PCRs Done
5,485,258 UART: [art] Lock RT PCRs Done
5,487,226 UART: [art] Populate DV Done
5,495,332 UART: [fht] FMC Alias Private Key: 7
5,496,350 UART: [art] Derive CDI
5,496,630 UART: [art] Store in in slot 0x4
5,582,545 UART: [art] Derive Key Pair
5,582,905 UART: [art] Store priv key in slot 0x5
5,596,121 UART: [art] Derive Key Pair - Done
5,610,992 UART: [art] Signing Cert with AUTHO
5,611,472 UART: RITY.KEYID = 7
5,626,244 UART: [art] Erasing AUTHORITY.KEYID = 7
5,627,009 UART: [art] PUB.X = 334880BC202A01217713DAE93F56D5910F962E5C438695228D9DBA8A536A7F82242F933181418E944F952407F8825984
5,633,752 UART: [art] PUB.Y = 349A609FCCABC0FD4195D4F2FC4E64B92A82C2DADC77B89339537C9451CE3ADDAC038F25C0E765A0F951B9CC9E6FE6FC
5,640,723 UART: [art] SIG.R = 02A2CEB5E35290FEC891FE618D4B78F12902B826FD8E48C7D45AEC427EB4909EC2C331F39FF99B1F378C295D9BDCBE1A
5,647,505 UART: [art] SIG.S = 3DC57ECB2F0F7000AAF0C418EB893B68F3D28C8FAD246B95F7AF978DE707EAE5FEFBF5DC2A739B40B4F3E6ACCD9A7E56
5,671,784 UART: Caliptra RT
5,672,130 UART: [state] CFI Enabled
5,779,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,781,580 UART:
5,781,596 UART: Running Caliptra ROM ...
5,782,004 UART:
5,782,145 UART: [state] CFI Enabled
5,784,759 UART: [state] LifecycleState = Unprovisioned
5,785,414 UART: [state] DebugLocked = No
5,785,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,787,409 UART: [kat] SHA2-256
6,581,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,585,455 UART: [kat] ++
6,585,607 UART: [kat] sha1
6,589,647 UART: [kat] SHA2-256
6,591,585 UART: [kat] SHA2-384
6,594,192 UART: [kat] SHA2-512-ACC
6,596,092 UART: [kat] ECC-384
6,601,481 UART: [kat] HMAC-384Kdf
6,606,143 UART: [kat] LMS
7,174,339 UART: [kat] --
7,175,398 UART: [update-reset] ++
7,215,711 >>> mbox cmd response: failed
7,215,711 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
7,215,965 UART: ROM Non-Fatal Error: 0x000B003D
7,216,805 UART: [state] Locking Datavault
7,217,443 UART: [state] Locking PCR0, PCR1 and PCR31
7,218,047 UART: [state] Locking ICCM
7,218,657 UART: [exit] Launching FMC @ 0x40000130
7,223,986 UART:
7,224,002 UART: Running Caliptra FMC ...
7,224,410 UART:
7,224,553 UART: [state] CFI Enabled
7,313,758 UART: [art] Extend RT PCRs Done
7,314,186 UART: [art] Lock RT PCRs Done
7,315,401 UART: [art] Populate DV Done
7,323,583 UART: [fht] FMC Alias Private Key: 7
7,324,521 UART: [art] Derive CDI
7,324,801 UART: [art] Store in in slot 0x4
7,410,602 UART: [art] Derive Key Pair
7,410,962 UART: [art] Store priv key in slot 0x5
7,423,940 UART: [art] Derive Key Pair - Done
7,438,473 UART: [art] Signing Cert with AUTHO
7,438,953 UART: RITY.KEYID = 7
7,453,953 UART: [art] Erasing AUTHORITY.KEYID = 7
7,454,718 UART: [art] PUB.X = 334880BC202A01217713DAE93F56D5910F962E5C438695228D9DBA8A536A7F82242F933181418E944F952407F8825984
7,461,461 UART: [art] PUB.Y = 349A609FCCABC0FD4195D4F2FC4E64B92A82C2DADC77B89339537C9451CE3ADDAC038F25C0E765A0F951B9CC9E6FE6FC
7,468,432 UART: [art] SIG.R = 02A2CEB5E35290FEC891FE618D4B78F12902B826FD8E48C7D45AEC427EB4909EC2C331F39FF99B1F378C295D9BDCBE1A
7,475,214 UART: [art] SIG.S = 3DC57ECB2F0F7000AAF0C418EB893B68F3D28C8FAD246B95F7AF978DE707EAE5FEFBF5DC2A739B40B4F3E6ACCD9A7E56
7,499,209 UART: Caliptra RT
7,499,555 UART: [state] CFI Enabled
7,779,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,781,664 UART:
7,781,680 UART: Running Caliptra ROM ...
7,782,088 UART:
7,782,229 UART: [state] CFI Enabled
7,784,901 UART: [state] LifecycleState = Unprovisioned
7,785,556 UART: [state] DebugLocked = No
7,786,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,787,865 UART: [kat] SHA2-256
8,581,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,585,911 UART: [kat] ++
8,586,063 UART: [kat] sha1
8,590,335 UART: [kat] SHA2-256
8,592,273 UART: [kat] SHA2-384
8,594,980 UART: [kat] SHA2-512-ACC
8,596,880 UART: [kat] ECC-384
8,602,273 UART: [kat] HMAC-384Kdf
8,606,857 UART: [kat] LMS
9,175,053 UART: [kat] --
9,175,940 UART: [update-reset] ++
12,708,541 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,709,799 UART: [update-reset] Loading Runtime at address 0x40005000 len 89676
12,859,717 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 4.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,236 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,089,441 >>> mbox cmd response: success
5,089,441 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,150,840 UART:
5,150,856 UART: Running Caliptra FMC ...
5,151,264 UART:
5,151,407 UART: [state] CFI Enabled
5,162,297 UART: [fht] FMC Alias Private Key: 7
5,270,327 UART: [art] Extend RT PCRs Done
5,270,755 UART: [art] Lock RT PCRs Done
5,272,413 UART: [art] Populate DV Done
5,280,627 UART: [fht] FMC Alias Private Key: 7
5,281,789 UART: [art] Derive CDI
5,282,069 UART: [art] Store in in slot 0x4
5,367,976 UART: [art] Derive Key Pair
5,368,336 UART: [art] Store priv key in slot 0x5
5,381,494 UART: [art] Derive Key Pair - Done
5,396,156 UART: [art] Signing Cert with AUTHO
5,396,636 UART: RITY.KEYID = 7
5,412,192 UART: [art] Erasing AUTHORITY.KEYID = 7
5,412,957 UART: [art] PUB.X = A0AD54DE4373654FDA0B2A196079CB3DA2F1FF510DF362045E22D4D7DA863A45A0C016F339E5F4E7F25C331FAB4DB6D3
5,419,734 UART: [art] PUB.Y = CD543F2966842FB0CC375526A53416E9A4BEFA7AA6509BA5203B695336F4775E8E52D9CEFEDF95B67FD6A9604EB29E3E
5,426,696 UART: [art] SIG.R = 0D51E2CB0D5D060B42EEBE442B3AF4E1AEF8ECD156BE1D1B6CE7CD0F22BE46DFD5CDD326038A285820075343F1E91E60
5,433,467 UART: [art] SIG.S = 364C78A67C0979F0FAE758FEE142BF72591B079307B47A06151180240E1A5EE3DC19CEE10301B6D378192B406BB3E9FB
5,457,491 UART: Caliptra RT
5,457,837 UART: [state] CFI Enabled
5,566,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,885,427 >>> mbox cmd response: failed
6,885,427 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,891,334 UART:
6,891,350 UART: Running Caliptra FMC ...
6,891,758 UART:
6,891,901 UART: [state] CFI Enabled
6,980,808 UART: [art] Extend RT PCRs Done
6,981,236 UART: [art] Lock RT PCRs Done
6,982,577 UART: [art] Populate DV Done
6,990,705 UART: [fht] FMC Alias Private Key: 7
6,991,883 UART: [art] Derive CDI
6,992,163 UART: [art] Store in in slot 0x4
7,077,950 UART: [art] Derive Key Pair
7,078,310 UART: [art] Store priv key in slot 0x5
7,091,486 UART: [art] Derive Key Pair - Done
7,106,238 UART: [art] Signing Cert with AUTHO
7,106,718 UART: RITY.KEYID = 7
7,121,852 UART: [art] Erasing AUTHORITY.KEYID = 7
7,122,617 UART: [art] PUB.X = A0AD54DE4373654FDA0B2A196079CB3DA2F1FF510DF362045E22D4D7DA863A45A0C016F339E5F4E7F25C331FAB4DB6D3
7,129,394 UART: [art] PUB.Y = CD543F2966842FB0CC375526A53416E9A4BEFA7AA6509BA5203B695336F4775E8E52D9CEFEDF95B67FD6A9604EB29E3E
7,136,356 UART: [art] SIG.R = 0D51E2CB0D5D060B42EEBE442B3AF4E1AEF8ECD156BE1D1B6CE7CD0F22BE46DFD5CDD326038A285820075343F1E91E60
7,143,127 UART: [art] SIG.S = 364C78A67C0979F0FAE758FEE142BF72591B079307B47A06151180240E1A5EE3DC19CEE10301B6D378192B406BB3E9FB
7,166,783 UART: Caliptra RT
7,167,129 UART: [state] CFI Enabled
7,448,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,371,888 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,530 UART: [kat] SHA2-512-ACC
908,431 UART: [kat] ECC-384
918,178 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,737 UART: [cold-reset] ++
1,172,091 UART: [fht] FHT @ 0x50003400
1,174,794 UART: [idev] ++
1,174,962 UART: [idev] CDI.KEYID = 6
1,175,322 UART: [idev] SUBJECT.KEYID = 7
1,175,746 UART: [idev] UDS.KEYID = 0
1,176,091 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,994 UART: [idev] Erasing UDS.KEYID = 0
1,200,521 UART: [idev] Sha1 KeyId Algorithm
1,209,059 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,522 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,555 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x46574c44
1,283,230 UART: [fwproc] Recv'd Img size: 114360 bytes
3,128,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,321,305 >>> mbox cmd response: success
3,321,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,322,479 UART: [afmc] ++
3,322,647 UART: [afmc] CDI.KEYID = 6
3,323,009 UART: [afmc] SUBJECT.KEYID = 7
3,323,434 UART: [afmc] AUTHORITY.KEYID = 5
3,358,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,241 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,950 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,842 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,553 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,210 UART: [afmc] --
3,401,264 UART: [cold-reset] --
3,402,250 UART: [state] Locking Datavault
3,403,195 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,799 UART: [state] Locking ICCM
3,404,403 UART: [exit] Launching FMC @ 0x40000130
3,409,732 UART:
3,409,748 UART: Running Caliptra FMC ...
3,410,156 UART:
3,410,210 UART: [state] CFI Enabled
3,420,704 UART: [fht] FMC Alias Private Key: 7
3,528,308 UART: [art] Extend RT PCRs Done
3,528,736 UART: [art] Lock RT PCRs Done
3,530,372 UART: [art] Populate DV Done
3,538,402 UART: [fht] FMC Alias Private Key: 7
3,539,504 UART: [art] Derive CDI
3,539,784 UART: [art] Store in in slot 0x4
3,625,467 UART: [art] Derive Key Pair
3,625,827 UART: [art] Store priv key in slot 0x5
3,638,993 UART: [art] Derive Key Pair - Done
3,654,019 UART: [art] Signing Cert with AUTHO
3,654,499 UART: RITY.KEYID = 7
3,670,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,882 UART: [art] PUB.X = 6352BED40721A8CE0EA3EF9AF11077FC93DF48951A13A5581A53A148D23548363A19245EDCF2CB4FD29884B1C5336010
3,677,648 UART: [art] PUB.Y = DC86108F784A400BAF430D1151ED22ADC0AFB8BBC71E3F699893DA337E6D86453189EA4104BB0AD4AB5A9F4D5A6E92BD
3,684,604 UART: [art] SIG.R = 376859F0E3A1E5D4C049B229D8C551DE0936B7810273D48B2E3E25443C78B65F519B0B96196BF14B65F09DA540385163
3,691,357 UART: [art] SIG.S = 52451327BA2E12F480172D0524C81292DED8D5C2DD9F095F7596901A19EFE5B21830EB86B3C09F687807468DCCC68891
3,715,011 UART: Caliptra RT
3,715,265 UART: [state] CFI Enabled
3,823,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,885 UART:
3,824,901 UART: Running Caliptra ROM ...
3,825,309 UART:
3,825,364 UART: [state] CFI Enabled
3,828,180 UART: [state] LifecycleState = Unprovisioned
3,828,835 UART: [state] DebugLocked = No
3,829,511 UART: [state] WD Timer not started. Device not locked for debugging
3,830,839 UART: [kat] SHA2-256
4,636,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,640,614 UART: [kat] ++
4,640,766 UART: [kat] sha1
4,645,134 UART: [kat] SHA2-256
4,647,074 UART: [kat] SHA2-384
4,649,805 UART: [kat] SHA2-512-ACC
4,651,705 UART: [kat] ECC-384
4,661,248 UART: [kat] HMAC-384Kdf
4,665,824 UART: [kat] LMS
4,914,152 UART: [kat] --
4,914,906 UART: [update-reset] ++
4,932,941 >>> mbox cmd response: failed
4,932,941 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,933,445 UART: ROM Non-Fatal Error: 0x000B003D
4,934,235 UART: [state] Locking Datavault
4,935,109 UART: [state] Locking PCR0, PCR1 and PCR31
4,935,713 UART: [state] Locking ICCM
4,936,321 UART: [exit] Launching FMC @ 0x40000130
4,941,650 UART:
4,941,666 UART: Running Caliptra FMC ...
4,942,074 UART:
4,942,128 UART: [state] CFI Enabled
5,031,263 UART: [art] Extend RT PCRs Done
5,031,691 UART: [art] Lock RT PCRs Done
5,033,042 UART: [art] Populate DV Done
5,041,240 UART: [fht] FMC Alias Private Key: 7
5,042,368 UART: [art] Derive CDI
5,042,648 UART: [art] Store in in slot 0x4
5,128,397 UART: [art] Derive Key Pair
5,128,757 UART: [art] Store priv key in slot 0x5
5,141,537 UART: [art] Derive Key Pair - Done
5,156,457 UART: [art] Signing Cert with AUTHO
5,156,937 UART: RITY.KEYID = 7
5,171,941 UART: [art] Erasing AUTHORITY.KEYID = 7
5,172,706 UART: [art] PUB.X = 6352BED40721A8CE0EA3EF9AF11077FC93DF48951A13A5581A53A148D23548363A19245EDCF2CB4FD29884B1C5336010
5,179,472 UART: [art] PUB.Y = DC86108F784A400BAF430D1151ED22ADC0AFB8BBC71E3F699893DA337E6D86453189EA4104BB0AD4AB5A9F4D5A6E92BD
5,186,428 UART: [art] SIG.R = 376859F0E3A1E5D4C049B229D8C551DE0936B7810273D48B2E3E25443C78B65F519B0B96196BF14B65F09DA540385163
5,193,181 UART: [art] SIG.S = 52451327BA2E12F480172D0524C81292DED8D5C2DD9F095F7596901A19EFE5B21830EB86B3C09F687807468DCCC68891
5,216,841 UART: Caliptra RT
5,217,095 UART: [state] CFI Enabled
5,497,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,499,024 UART:
5,499,040 UART: Running Caliptra ROM ...
5,499,448 UART:
5,499,503 UART: [state] CFI Enabled
5,502,487 UART: [state] LifecycleState = Unprovisioned
5,503,142 UART: [state] DebugLocked = No
5,503,650 UART: [state] WD Timer not started. Device not locked for debugging
5,505,004 UART: [kat] SHA2-256
6,310,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,314,779 UART: [kat] ++
6,314,931 UART: [kat] sha1
6,319,141 UART: [kat] SHA2-256
6,321,081 UART: [kat] SHA2-384
6,323,786 UART: [kat] SHA2-512-ACC
6,325,686 UART: [kat] ECC-384
6,335,755 UART: [kat] HMAC-384Kdf
6,340,507 UART: [kat] LMS
6,588,835 UART: [kat] --
6,589,847 UART: [update-reset] ++
8,448,735 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,449,848 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
8,599,714 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,169,076 >>> mbox cmd response: success
3,169,076 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,231,435 UART:
3,231,451 UART: Running Caliptra FMC ...
3,231,859 UART:
3,231,913 UART: [state] CFI Enabled
3,242,343 UART: [fht] FMC Alias Private Key: 7
3,350,521 UART: [art] Extend RT PCRs Done
3,350,949 UART: [art] Lock RT PCRs Done
3,352,489 UART: [art] Populate DV Done
3,360,901 UART: [fht] FMC Alias Private Key: 7
3,361,979 UART: [art] Derive CDI
3,362,259 UART: [art] Store in in slot 0x4
3,447,894 UART: [art] Derive Key Pair
3,448,254 UART: [art] Store priv key in slot 0x5
3,461,116 UART: [art] Derive Key Pair - Done
3,475,853 UART: [art] Signing Cert with AUTHO
3,476,333 UART: RITY.KEYID = 7
3,491,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,172 UART: [art] PUB.X = C2FBBDD35D7CEC2913EA28B6DB233E0BF110D6399B490DD9E7BF5E6C068C55806972126C36F4CAF4A710DEA0CA85B1FD
3,498,955 UART: [art] PUB.Y = 0D19CC4BEB1790776A46DBF861458B3D28338BF25907E1FC7AC6171A37AAB9641AC31CFC1B90DF5BE4B62DC0AF33D6B1
3,505,917 UART: [art] SIG.R = D371938414154DB15983FE80D53B8B286AC7C764765CFCE35E7976F89CA8BA18AD6DBA7CF4B165B9E17C79BCFC9E8DB4
3,512,703 UART: [art] SIG.S = EF6B275BCB263DCBAC2C352145AD3640A3D9FFCF11051FDBD0B2EA807C12CB7B8FC2DAED17FB9AAB78C3582B5929EB90
3,536,595 UART: Caliptra RT
3,536,849 UART: [state] CFI Enabled
3,644,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,639,773 >>> mbox cmd response: failed
4,639,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,645,636 UART:
4,645,652 UART: Running Caliptra FMC ...
4,646,060 UART:
4,646,114 UART: [state] CFI Enabled
4,735,413 UART: [art] Extend RT PCRs Done
4,735,841 UART: [art] Lock RT PCRs Done
4,736,892 UART: [art] Populate DV Done
4,745,256 UART: [fht] FMC Alias Private Key: 7
4,746,374 UART: [art] Derive CDI
4,746,654 UART: [art] Store in in slot 0x4
4,832,565 UART: [art] Derive Key Pair
4,832,925 UART: [art] Store priv key in slot 0x5
4,846,527 UART: [art] Derive Key Pair - Done
4,861,210 UART: [art] Signing Cert with AUTHO
4,861,690 UART: RITY.KEYID = 7
4,876,936 UART: [art] Erasing AUTHORITY.KEYID = 7
4,877,701 UART: [art] PUB.X = C2FBBDD35D7CEC2913EA28B6DB233E0BF110D6399B490DD9E7BF5E6C068C55806972126C36F4CAF4A710DEA0CA85B1FD
4,884,484 UART: [art] PUB.Y = 0D19CC4BEB1790776A46DBF861458B3D28338BF25907E1FC7AC6171A37AAB9641AC31CFC1B90DF5BE4B62DC0AF33D6B1
4,891,446 UART: [art] SIG.R = D371938414154DB15983FE80D53B8B286AC7C764765CFCE35E7976F89CA8BA18AD6DBA7CF4B165B9E17C79BCFC9E8DB4
4,898,232 UART: [art] SIG.S = EF6B275BCB263DCBAC2C352145AD3640A3D9FFCF11051FDBD0B2EA807C12CB7B8FC2DAED17FB9AAB78C3582B5929EB90
4,922,194 UART: Caliptra RT
4,922,448 UART: [state] CFI Enabled
5,198,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,177,504 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,675 UART: [kat] SHA2-512-ACC
908,576 UART: [kat] ECC-384
918,271 UART: [kat] HMAC-384Kdf
923,001 UART: [kat] LMS
1,171,329 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,227 UART: [idev] ++
1,175,395 UART: [idev] CDI.KEYID = 6
1,175,755 UART: [idev] SUBJECT.KEYID = 7
1,176,179 UART: [idev] UDS.KEYID = 0
1,176,524 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,069 UART: [idev] Erasing UDS.KEYID = 0
1,201,674 UART: [idev] Sha1 KeyId Algorithm
1,210,140 UART: [idev] --
1,211,134 UART: [ldev] ++
1,211,302 UART: [ldev] CDI.KEYID = 6
1,211,665 UART: [ldev] SUBJECT.KEYID = 5
1,212,091 UART: [ldev] AUTHORITY.KEYID = 7
1,212,554 UART: [ldev] FE.KEYID = 1
1,217,904 UART: [ldev] Erasing FE.KEYID = 1
1,244,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,754 UART: [ldev] --
1,284,073 UART: [fwproc] Wait for Commands...
1,284,693 UART: [fwproc] Recv command 0x46574c44
1,285,421 UART: [fwproc] Recv'd Img size: 114360 bytes
3,128,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,345 >>> mbox cmd response: success
3,322,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,323,595 UART: [afmc] ++
3,323,763 UART: [afmc] CDI.KEYID = 6
3,324,125 UART: [afmc] SUBJECT.KEYID = 7
3,324,550 UART: [afmc] AUTHORITY.KEYID = 5
3,359,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,789 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,498 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,390 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,101 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,804 UART: [afmc] --
3,402,934 UART: [cold-reset] --
3,403,670 UART: [state] Locking Datavault
3,404,787 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,391 UART: [state] Locking ICCM
3,405,973 UART: [exit] Launching FMC @ 0x40000130
3,411,302 UART:
3,411,318 UART: Running Caliptra FMC ...
3,411,726 UART:
3,411,869 UART: [state] CFI Enabled
3,422,391 UART: [fht] FMC Alias Private Key: 7
3,530,809 UART: [art] Extend RT PCRs Done
3,531,237 UART: [art] Lock RT PCRs Done
3,532,769 UART: [art] Populate DV Done
3,540,875 UART: [fht] FMC Alias Private Key: 7
3,541,901 UART: [art] Derive CDI
3,542,181 UART: [art] Store in in slot 0x4
3,627,682 UART: [art] Derive Key Pair
3,628,042 UART: [art] Store priv key in slot 0x5
3,641,596 UART: [art] Derive Key Pair - Done
3,656,311 UART: [art] Signing Cert with AUTHO
3,656,791 UART: RITY.KEYID = 7
3,671,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,222 UART: [art] PUB.X = BBB2BCF99DE37C69225C5801F17C936C022A0965C8998FF2A0F4EFE424DF05B4E1E98C7D73473AD82ECC407A91F64AC7
3,678,994 UART: [art] PUB.Y = EA9892CA90DCF5EA1A2BCE47811132D0E98AB5CF2505E22691D0AC12B137AE537D470C549A4917BE25BC48BDC0A0DE70
3,685,954 UART: [art] SIG.R = 76586F51A9A9325787C464D369100B4546A5DADAECA68BB652AD15DE172A31C270C36EE9A7D46CBA226390075BA98333
3,692,720 UART: [art] SIG.S = FBFC0FE3677C890B1F2F9AAE132B528217269A394C0E06C48FF93B3E6556C21DC295E337EB31DCC0DB86E5369BB08B69
3,716,641 UART: Caliptra RT
3,716,987 UART: [state] CFI Enabled
3,825,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,362 UART:
3,826,378 UART: Running Caliptra ROM ...
3,826,786 UART:
3,826,928 UART: [state] CFI Enabled
3,829,852 UART: [state] LifecycleState = Unprovisioned
3,830,507 UART: [state] DebugLocked = No
3,831,215 UART: [state] WD Timer not started. Device not locked for debugging
3,832,373 UART: [kat] SHA2-256
4,638,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,642,148 UART: [kat] ++
4,642,300 UART: [kat] sha1
4,646,486 UART: [kat] SHA2-256
4,648,426 UART: [kat] SHA2-384
4,651,195 UART: [kat] SHA2-512-ACC
4,653,095 UART: [kat] ECC-384
4,663,082 UART: [kat] HMAC-384Kdf
4,667,652 UART: [kat] LMS
4,915,980 UART: [kat] --
4,916,966 UART: [update-reset] ++
4,935,401 >>> mbox cmd response: failed
4,935,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,935,779 UART: ROM Non-Fatal Error: 0x000B003D
4,936,535 UART: [state] Locking Datavault
4,937,351 UART: [state] Locking PCR0, PCR1 and PCR31
4,937,955 UART: [state] Locking ICCM
4,938,391 UART: [exit] Launching FMC @ 0x40000130
4,943,720 UART:
4,943,736 UART: Running Caliptra FMC ...
4,944,144 UART:
4,944,287 UART: [state] CFI Enabled
5,033,640 UART: [art] Extend RT PCRs Done
5,034,068 UART: [art] Lock RT PCRs Done
5,035,215 UART: [art] Populate DV Done
5,043,485 UART: [fht] FMC Alias Private Key: 7
5,044,503 UART: [art] Derive CDI
5,044,783 UART: [art] Store in in slot 0x4
5,130,568 UART: [art] Derive Key Pair
5,130,928 UART: [art] Store priv key in slot 0x5
5,144,572 UART: [art] Derive Key Pair - Done
5,159,401 UART: [art] Signing Cert with AUTHO
5,159,881 UART: RITY.KEYID = 7
5,174,955 UART: [art] Erasing AUTHORITY.KEYID = 7
5,175,720 UART: [art] PUB.X = BBB2BCF99DE37C69225C5801F17C936C022A0965C8998FF2A0F4EFE424DF05B4E1E98C7D73473AD82ECC407A91F64AC7
5,182,492 UART: [art] PUB.Y = EA9892CA90DCF5EA1A2BCE47811132D0E98AB5CF2505E22691D0AC12B137AE537D470C549A4917BE25BC48BDC0A0DE70
5,189,452 UART: [art] SIG.R = 76586F51A9A9325787C464D369100B4546A5DADAECA68BB652AD15DE172A31C270C36EE9A7D46CBA226390075BA98333
5,196,218 UART: [art] SIG.S = FBFC0FE3677C890B1F2F9AAE132B528217269A394C0E06C48FF93B3E6556C21DC295E337EB31DCC0DB86E5369BB08B69
5,220,137 UART: Caliptra RT
5,220,483 UART: [state] CFI Enabled
5,499,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,501,585 UART:
5,501,601 UART: Running Caliptra ROM ...
5,502,009 UART:
5,502,151 UART: [state] CFI Enabled
5,505,001 UART: [state] LifecycleState = Unprovisioned
5,505,656 UART: [state] DebugLocked = No
5,506,202 UART: [state] WD Timer not started. Device not locked for debugging
5,507,462 UART: [kat] SHA2-256
6,313,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,317,237 UART: [kat] ++
6,317,389 UART: [kat] sha1
6,321,519 UART: [kat] SHA2-256
6,323,459 UART: [kat] SHA2-384
6,326,336 UART: [kat] SHA2-512-ACC
6,328,236 UART: [kat] ECC-384
6,338,393 UART: [kat] HMAC-384Kdf
6,342,885 UART: [kat] LMS
6,591,213 UART: [kat] --
6,592,287 UART: [update-reset] ++
8,448,702 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,449,893 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
8,599,759 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,432 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,499 >>> mbox cmd response: success
3,175,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,238,506 UART:
3,238,522 UART: Running Caliptra FMC ...
3,238,930 UART:
3,239,073 UART: [state] CFI Enabled
3,249,425 UART: [fht] FMC Alias Private Key: 7
3,357,321 UART: [art] Extend RT PCRs Done
3,357,749 UART: [art] Lock RT PCRs Done
3,359,573 UART: [art] Populate DV Done
3,367,829 UART: [fht] FMC Alias Private Key: 7
3,368,821 UART: [art] Derive CDI
3,369,101 UART: [art] Store in in slot 0x4
3,454,712 UART: [art] Derive Key Pair
3,455,072 UART: [art] Store priv key in slot 0x5
3,467,882 UART: [art] Derive Key Pair - Done
3,482,455 UART: [art] Signing Cert with AUTHO
3,482,935 UART: RITY.KEYID = 7
3,498,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,914 UART: [art] PUB.X = C1CB035EFEF13523021D5DC25DD063F4E2699E37631488B2C81C04896742DE896B457B711F5CC1B25A24487625DC14D2
3,505,673 UART: [art] PUB.Y = E1FCB5162296C3B10C98FD137FFBF6492F296981C5FC0DCFF4F0682A5D7C41742BB186E8FD14A92444BF40C5AC26FE18
3,512,631 UART: [art] SIG.R = A06A134745C8CBDEA0B784FA78293875522663259FE831D06F3AD2DDBB3F7EDA39EB09AC6F59909665D09B86C8A545AF
3,519,408 UART: [art] SIG.S = 27259F3DEB03A723585BD4BD1204AD06069261FB80360E359D9358E8BC1B637031C60A505DB5FCE6AA2846A513639E75
3,543,197 UART: Caliptra RT
3,543,543 UART: [state] CFI Enabled
3,651,504 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,835 >>> mbox cmd response: failed
4,646,835 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,652,734 UART:
4,652,750 UART: Running Caliptra FMC ...
4,653,158 UART:
4,653,301 UART: [state] CFI Enabled
4,742,366 UART: [art] Extend RT PCRs Done
4,742,794 UART: [art] Lock RT PCRs Done
4,744,053 UART: [art] Populate DV Done
4,752,177 UART: [fht] FMC Alias Private Key: 7
4,753,337 UART: [art] Derive CDI
4,753,617 UART: [art] Store in in slot 0x4
4,839,418 UART: [art] Derive Key Pair
4,839,778 UART: [art] Store priv key in slot 0x5
4,852,728 UART: [art] Derive Key Pair - Done
4,867,493 UART: [art] Signing Cert with AUTHO
4,867,973 UART: RITY.KEYID = 7
4,883,435 UART: [art] Erasing AUTHORITY.KEYID = 7
4,884,200 UART: [art] PUB.X = C1CB035EFEF13523021D5DC25DD063F4E2699E37631488B2C81C04896742DE896B457B711F5CC1B25A24487625DC14D2
4,890,959 UART: [art] PUB.Y = E1FCB5162296C3B10C98FD137FFBF6492F296981C5FC0DCFF4F0682A5D7C41742BB186E8FD14A92444BF40C5AC26FE18
4,897,917 UART: [art] SIG.R = A06A134745C8CBDEA0B784FA78293875522663259FE831D06F3AD2DDBB3F7EDA39EB09AC6F59909665D09B86C8A545AF
4,904,694 UART: [art] SIG.S = 27259F3DEB03A723585BD4BD1204AD06069261FB80360E359D9358E8BC1B637031C60A505DB5FCE6AA2846A513639E75
4,928,693 UART: Caliptra RT
4,929,039 UART: [state] CFI Enabled
5,212,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,198,033 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,227 UART: [state] DebugLocked = No
85,711 UART: [state] WD Timer not started. Device not locked for debugging
86,826 UART: [kat] SHA2-256
890,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,505 UART: [kat] ++
894,657 UART: [kat] sha1
898,963 UART: [kat] SHA2-256
900,903 UART: [kat] SHA2-384
903,520 UART: [kat] SHA2-512-ACC
905,421 UART: [kat] ECC-384
915,220 UART: [kat] HMAC-384Kdf
919,814 UART: [kat] LMS
1,168,126 UART: [kat] --
1,169,125 UART: [cold-reset] ++
1,169,549 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,173,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,674 UART: [ldev] ++
1,208,842 UART: [ldev] CDI.KEYID = 6
1,209,206 UART: [ldev] SUBJECT.KEYID = 5
1,209,633 UART: [ldev] AUTHORITY.KEYID = 7
1,210,096 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,954 UART: [fwproc] Wait for Commands...
1,281,747 UART: [fwproc] Recv command 0x46574c44
1,282,480 UART: [fwproc] Recv'd Img size: 114360 bytes
3,126,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,319,310 >>> mbox cmd response: success
3,319,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,320,429 UART: [afmc] ++
3,320,597 UART: [afmc] CDI.KEYID = 6
3,320,960 UART: [afmc] SUBJECT.KEYID = 7
3,321,386 UART: [afmc] AUTHORITY.KEYID = 5
3,356,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,881 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,591 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,481 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,192 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,984 UART: [afmc] --
3,400,006 UART: [cold-reset] --
3,400,896 UART: [state] Locking Datavault
3,401,967 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,571 UART: [state] Locking ICCM
3,403,029 UART: [exit] Launching FMC @ 0x40000130
3,408,358 UART:
3,408,374 UART: Running Caliptra FMC ...
3,408,782 UART:
3,408,836 UART: [state] CFI Enabled
3,419,490 UART: [fht] FMC Alias Private Key: 7
3,527,636 UART: [art] Extend RT PCRs Done
3,528,064 UART: [art] Lock RT PCRs Done
3,529,494 UART: [art] Populate DV Done
3,537,748 UART: [fht] FMC Alias Private Key: 7
3,538,804 UART: [art] Derive CDI
3,539,084 UART: [art] Store in in slot 0x4
3,624,887 UART: [art] Derive Key Pair
3,625,247 UART: [art] Store priv key in slot 0x5
3,638,183 UART: [art] Derive Key Pair - Done
3,653,323 UART: [art] Signing Cert with AUTHO
3,653,803 UART: RITY.KEYID = 7
3,669,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,878 UART: [art] PUB.X = 3875809D2DABAC64A4A0AF787B92A821E628367C71EC271A4BEEED8F948F0A61D3DAD08BD2F7921B73929ABF2743E063
3,676,657 UART: [art] PUB.Y = CB2838C5AC0286ECB847EB9A978A7548A30FA8B154E2AE1B67ECBFCBDA4D9AAF6CD58E5CFCA7DFC3D4B4FE66EF8C8077
3,683,637 UART: [art] SIG.R = C76028C9BEF291E46DC35F0522C606F755F9A2E339E9937839CA83BD2E82A4F9BFB775D7DDEE8B9DBFFF005B1EEC0882
3,690,394 UART: [art] SIG.S = 164D525514299917445E72888C1BC8304166B02FA5D51F00FA161043DF24930E06C6C94AA6FBFA7891F57A18339F03F6
3,714,064 UART: Caliptra RT
3,714,318 UART: [state] CFI Enabled
3,822,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,105 UART:
3,824,121 UART: Running Caliptra ROM ...
3,824,529 UART:
3,824,584 UART: [state] CFI Enabled
3,827,332 UART: [state] LifecycleState = Unprovisioned
3,827,987 UART: [state] DebugLocked = No
3,828,517 UART: [state] WD Timer not started. Device not locked for debugging
3,829,693 UART: [kat] SHA2-256
4,633,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,637,372 UART: [kat] ++
4,637,524 UART: [kat] sha1
4,641,612 UART: [kat] SHA2-256
4,643,552 UART: [kat] SHA2-384
4,646,417 UART: [kat] SHA2-512-ACC
4,648,317 UART: [kat] ECC-384
4,658,544 UART: [kat] HMAC-384Kdf
4,663,248 UART: [kat] LMS
4,911,560 UART: [kat] --
4,912,582 UART: [update-reset] ++
4,929,690 >>> mbox cmd response: failed
4,929,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,930,302 UART: ROM Non-Fatal Error: 0x000B003D
4,931,244 UART: [state] Locking Datavault
4,932,288 UART: [state] Locking PCR0, PCR1 and PCR31
4,932,892 UART: [state] Locking ICCM
4,933,406 UART: [exit] Launching FMC @ 0x40000130
4,938,735 UART:
4,938,751 UART: Running Caliptra FMC ...
4,939,159 UART:
4,939,213 UART: [state] CFI Enabled
5,027,914 UART: [art] Extend RT PCRs Done
5,028,342 UART: [art] Lock RT PCRs Done
5,029,569 UART: [art] Populate DV Done
5,037,759 UART: [fht] FMC Alias Private Key: 7
5,038,883 UART: [art] Derive CDI
5,039,163 UART: [art] Store in in slot 0x4
5,124,704 UART: [art] Derive Key Pair
5,125,064 UART: [art] Store priv key in slot 0x5
5,138,128 UART: [art] Derive Key Pair - Done
5,152,738 UART: [art] Signing Cert with AUTHO
5,153,218 UART: RITY.KEYID = 7
5,168,824 UART: [art] Erasing AUTHORITY.KEYID = 7
5,169,589 UART: [art] PUB.X = 3875809D2DABAC64A4A0AF787B92A821E628367C71EC271A4BEEED8F948F0A61D3DAD08BD2F7921B73929ABF2743E063
5,176,368 UART: [art] PUB.Y = CB2838C5AC0286ECB847EB9A978A7548A30FA8B154E2AE1B67ECBFCBDA4D9AAF6CD58E5CFCA7DFC3D4B4FE66EF8C8077
5,183,348 UART: [art] SIG.R = C76028C9BEF291E46DC35F0522C606F755F9A2E339E9937839CA83BD2E82A4F9BFB775D7DDEE8B9DBFFF005B1EEC0882
5,190,105 UART: [art] SIG.S = 164D525514299917445E72888C1BC8304166B02FA5D51F00FA161043DF24930E06C6C94AA6FBFA7891F57A18339F03F6
5,214,019 UART: Caliptra RT
5,214,273 UART: [state] CFI Enabled
5,494,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,495,849 UART:
5,495,865 UART: Running Caliptra ROM ...
5,496,273 UART:
5,496,328 UART: [state] CFI Enabled
5,499,064 UART: [state] LifecycleState = Unprovisioned
5,499,719 UART: [state] DebugLocked = No
5,500,403 UART: [state] WD Timer not started. Device not locked for debugging
5,501,619 UART: [kat] SHA2-256
6,305,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,309,298 UART: [kat] ++
6,309,450 UART: [kat] sha1
6,313,738 UART: [kat] SHA2-256
6,315,678 UART: [kat] SHA2-384
6,318,591 UART: [kat] SHA2-512-ACC
6,320,491 UART: [kat] ECC-384
6,330,152 UART: [kat] HMAC-384Kdf
6,334,852 UART: [kat] LMS
6,583,164 UART: [kat] --
6,583,778 UART: [update-reset] ++
8,442,793 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,443,998 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
8,593,864 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,734 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,177,313 >>> mbox cmd response: success
3,177,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,238,962 UART:
3,238,978 UART: Running Caliptra FMC ...
3,239,386 UART:
3,239,440 UART: [state] CFI Enabled
3,249,748 UART: [fht] FMC Alias Private Key: 7
3,358,166 UART: [art] Extend RT PCRs Done
3,358,594 UART: [art] Lock RT PCRs Done
3,360,002 UART: [art] Populate DV Done
3,368,180 UART: [fht] FMC Alias Private Key: 7
3,369,328 UART: [art] Derive CDI
3,369,608 UART: [art] Store in in slot 0x4
3,455,365 UART: [art] Derive Key Pair
3,455,725 UART: [art] Store priv key in slot 0x5
3,468,789 UART: [art] Derive Key Pair - Done
3,483,370 UART: [art] Signing Cert with AUTHO
3,483,850 UART: RITY.KEYID = 7
3,499,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,955 UART: [art] PUB.X = B27C86897AF58FD3949410A4B9530E8637DBF26B4BCE9E2CFEC08B9A147106B19A658764A619A6A261BC440932C97445
3,506,716 UART: [art] PUB.Y = 4824228FFF1DFA53C6FE5B7C09B9B3512AED97A858FED8D49C7D384EA29FB73FDC9175FE0E5FDFA4998AC15E147E1404
3,513,677 UART: [art] SIG.R = DA691CF1B1FE3B22EE559E77F73E6BE34B114627175947D9CDD64EE3086C32E0A635DD4E3C42E3A0AFA141DDD706CAD2
3,520,459 UART: [art] SIG.S = E0FD212D8603769BFC18F27E7C7B663021BFAA2EE077C763217B0A7C7020D630215ABD9AB0D44E4B864422D38BCFBD9E
3,544,060 UART: Caliptra RT
3,544,314 UART: [state] CFI Enabled
3,652,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,642,015 >>> mbox cmd response: failed
4,642,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,647,512 UART:
4,647,528 UART: Running Caliptra FMC ...
4,647,936 UART:
4,647,990 UART: [state] CFI Enabled
4,736,487 UART: [art] Extend RT PCRs Done
4,736,915 UART: [art] Lock RT PCRs Done
4,738,318 UART: [art] Populate DV Done
4,746,442 UART: [fht] FMC Alias Private Key: 7
4,747,614 UART: [art] Derive CDI
4,747,894 UART: [art] Store in in slot 0x4
4,833,365 UART: [art] Derive Key Pair
4,833,725 UART: [art] Store priv key in slot 0x5
4,847,273 UART: [art] Derive Key Pair - Done
4,862,050 UART: [art] Signing Cert with AUTHO
4,862,530 UART: RITY.KEYID = 7
4,877,190 UART: [art] Erasing AUTHORITY.KEYID = 7
4,877,955 UART: [art] PUB.X = B27C86897AF58FD3949410A4B9530E8637DBF26B4BCE9E2CFEC08B9A147106B19A658764A619A6A261BC440932C97445
4,884,716 UART: [art] PUB.Y = 4824228FFF1DFA53C6FE5B7C09B9B3512AED97A858FED8D49C7D384EA29FB73FDC9175FE0E5FDFA4998AC15E147E1404
4,891,677 UART: [art] SIG.R = DA691CF1B1FE3B22EE559E77F73E6BE34B114627175947D9CDD64EE3086C32E0A635DD4E3C42E3A0AFA141DDD706CAD2
4,898,459 UART: [art] SIG.S = E0FD212D8603769BFC18F27E7C7B663021BFAA2EE077C763217B0A7C7020D630215ABD9AB0D44E4B864422D38BCFBD9E
4,922,482 UART: Caliptra RT
4,922,736 UART: [state] CFI Enabled
5,202,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,190,246 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,790 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,174,260 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,820 UART: [idev] Erasing UDS.KEYID = 0
1,198,696 UART: [idev] Sha1 KeyId Algorithm
1,207,526 UART: [idev] --
1,208,411 UART: [ldev] ++
1,208,579 UART: [ldev] CDI.KEYID = 6
1,208,943 UART: [ldev] SUBJECT.KEYID = 5
1,209,370 UART: [ldev] AUTHORITY.KEYID = 7
1,209,833 UART: [ldev] FE.KEYID = 1
1,215,103 UART: [ldev] Erasing FE.KEYID = 1
1,241,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,403 UART: [ldev] --
1,280,797 UART: [fwproc] Wait for Commands...
1,281,580 UART: [fwproc] Recv command 0x46574c44
1,282,313 UART: [fwproc] Recv'd Img size: 114360 bytes
3,129,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
3,322,632 >>> mbox cmd response: success
3,322,632 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,323,731 UART: [afmc] ++
3,323,899 UART: [afmc] CDI.KEYID = 6
3,324,262 UART: [afmc] SUBJECT.KEYID = 7
3,324,688 UART: [afmc] AUTHORITY.KEYID = 5
3,360,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,401 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,111 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,001 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,712 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,434 UART: [afmc] --
3,403,488 UART: [cold-reset] --
3,404,266 UART: [state] Locking Datavault
3,405,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,929 UART: [state] Locking ICCM
3,406,401 UART: [exit] Launching FMC @ 0x40000130
3,411,730 UART:
3,411,746 UART: Running Caliptra FMC ...
3,412,154 UART:
3,412,297 UART: [state] CFI Enabled
3,423,173 UART: [fht] FMC Alias Private Key: 7
3,531,695 UART: [art] Extend RT PCRs Done
3,532,123 UART: [art] Lock RT PCRs Done
3,533,721 UART: [art] Populate DV Done
3,541,881 UART: [fht] FMC Alias Private Key: 7
3,542,947 UART: [art] Derive CDI
3,543,227 UART: [art] Store in in slot 0x4
3,629,396 UART: [art] Derive Key Pair
3,629,756 UART: [art] Store priv key in slot 0x5
3,642,924 UART: [art] Derive Key Pair - Done
3,657,529 UART: [art] Signing Cert with AUTHO
3,658,009 UART: RITY.KEYID = 7
3,673,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,673,960 UART: [art] PUB.X = 75A05C698297AFFB6C2C8735D9A4D6412B8228979E02256B160FE799C3A1BC48C23C78EDE858C3DA0CE5AC068A405ECE
3,680,728 UART: [art] PUB.Y = CA35483CC5E62073FA2E29A5037C14AF51707EF4ECA65B4724C62AFF90A77A17FB75A0EA5FA0497A0F7DA855CDD2FF52
3,687,690 UART: [art] SIG.R = 318DA4493F81E262146C6DA8C1A86E1E79FA540E4B2BB9ECE22AC1F25FFD36430099B20AD2A834861A218E8790F4C99A
3,694,440 UART: [art] SIG.S = B9E1BCC5F62737DA643F9A9D2DB7970A7B8D3A77EF41A6660BD871CEE8FD0BF39DDF934113A32A34EDF24FF3313AE42D
3,717,778 UART: Caliptra RT
3,718,124 UART: [state] CFI Enabled
3,825,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,263 UART:
3,827,279 UART: Running Caliptra ROM ...
3,827,687 UART:
3,827,829 UART: [state] CFI Enabled
3,830,405 UART: [state] LifecycleState = Unprovisioned
3,831,060 UART: [state] DebugLocked = No
3,831,588 UART: [state] WD Timer not started. Device not locked for debugging
3,832,930 UART: [kat] SHA2-256
4,636,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,640,609 UART: [kat] ++
4,640,761 UART: [kat] sha1
4,644,919 UART: [kat] SHA2-256
4,646,859 UART: [kat] SHA2-384
4,649,720 UART: [kat] SHA2-512-ACC
4,651,620 UART: [kat] ECC-384
4,661,445 UART: [kat] HMAC-384Kdf
4,666,055 UART: [kat] LMS
4,914,367 UART: [kat] --
4,915,271 UART: [update-reset] ++
4,933,515 >>> mbox cmd response: failed
4,933,515 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,934,019 UART: ROM Non-Fatal Error: 0x000B003D
4,934,779 UART: [state] Locking Datavault
4,935,585 UART: [state] Locking PCR0, PCR1 and PCR31
4,936,189 UART: [state] Locking ICCM
4,936,851 UART: [exit] Launching FMC @ 0x40000130
4,942,180 UART:
4,942,196 UART: Running Caliptra FMC ...
4,942,604 UART:
4,942,747 UART: [state] CFI Enabled
5,031,924 UART: [art] Extend RT PCRs Done
5,032,352 UART: [art] Lock RT PCRs Done
5,033,587 UART: [art] Populate DV Done
5,041,795 UART: [fht] FMC Alias Private Key: 7
5,042,921 UART: [art] Derive CDI
5,043,201 UART: [art] Store in in slot 0x4
5,128,796 UART: [art] Derive Key Pair
5,129,156 UART: [art] Store priv key in slot 0x5
5,142,010 UART: [art] Derive Key Pair - Done
5,156,887 UART: [art] Signing Cert with AUTHO
5,157,367 UART: RITY.KEYID = 7
5,172,459 UART: [art] Erasing AUTHORITY.KEYID = 7
5,173,224 UART: [art] PUB.X = 75A05C698297AFFB6C2C8735D9A4D6412B8228979E02256B160FE799C3A1BC48C23C78EDE858C3DA0CE5AC068A405ECE
5,179,992 UART: [art] PUB.Y = CA35483CC5E62073FA2E29A5037C14AF51707EF4ECA65B4724C62AFF90A77A17FB75A0EA5FA0497A0F7DA855CDD2FF52
5,186,954 UART: [art] SIG.R = 318DA4493F81E262146C6DA8C1A86E1E79FA540E4B2BB9ECE22AC1F25FFD36430099B20AD2A834861A218E8790F4C99A
5,193,704 UART: [art] SIG.S = B9E1BCC5F62737DA643F9A9D2DB7970A7B8D3A77EF41A6660BD871CEE8FD0BF39DDF934113A32A34EDF24FF3313AE42D
5,217,042 UART: Caliptra RT
5,217,388 UART: [state] CFI Enabled
5,500,182 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,501,746 UART:
5,501,762 UART: Running Caliptra ROM ...
5,502,170 UART:
5,502,312 UART: [state] CFI Enabled
5,505,194 UART: [state] LifecycleState = Unprovisioned
5,505,849 UART: [state] DebugLocked = No
5,506,505 UART: [state] WD Timer not started. Device not locked for debugging
5,507,745 UART: [kat] SHA2-256
6,311,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,315,424 UART: [kat] ++
6,315,576 UART: [kat] sha1
6,320,016 UART: [kat] SHA2-256
6,321,956 UART: [kat] SHA2-384
6,324,687 UART: [kat] SHA2-512-ACC
6,326,587 UART: [kat] ECC-384
6,336,504 UART: [kat] HMAC-384Kdf
6,341,342 UART: [kat] LMS
6,589,654 UART: [kat] --
6,590,602 UART: [update-reset] ++
8,450,740 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,451,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89676
8,601,791 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,160,717 >>> mbox cmd response: success
3,160,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,223,722 UART:
3,223,738 UART: Running Caliptra FMC ...
3,224,146 UART:
3,224,289 UART: [state] CFI Enabled
3,234,909 UART: [fht] FMC Alias Private Key: 7
3,342,545 UART: [art] Extend RT PCRs Done
3,342,973 UART: [art] Lock RT PCRs Done
3,344,703 UART: [art] Populate DV Done
3,353,033 UART: [fht] FMC Alias Private Key: 7
3,354,111 UART: [art] Derive CDI
3,354,391 UART: [art] Store in in slot 0x4
3,440,282 UART: [art] Derive Key Pair
3,440,642 UART: [art] Store priv key in slot 0x5
3,454,206 UART: [art] Derive Key Pair - Done
3,469,149 UART: [art] Signing Cert with AUTHO
3,469,629 UART: RITY.KEYID = 7
3,484,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,590 UART: [art] PUB.X = CD7DF539AB98F363C8338F4C3B934E42B80FAA1F004D3FEE859C173521F1EEC7CF8AD2782DE79DB6FC2BDD284386C95B
3,492,355 UART: [art] PUB.Y = 9B0A98A7FA0E3051987AC6BCD8F14C992111F44515E6D95A68AFEC1AB83EDB539E650883717B1C49F3CB6960DE5FA4A6
3,499,308 UART: [art] SIG.R = 6AB7E40AADC94524D6B266911D85F78BEE2FD9B0C2C36C611DC84B3172CA4EF567A7A909453716BE9E3A3675FED66EC5
3,506,086 UART: [art] SIG.S = 62615B1BD6FCD931EBFEB5AF9FF3A224863DF1D245F52C3F23B9F3C6E97822F3BDB1569AE9AA6EE340F7E5724DE16DBF
3,530,081 UART: Caliptra RT
3,530,427 UART: [state] CFI Enabled
3,639,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,629,883 >>> mbox cmd response: failed
4,629,883 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,635,818 UART:
4,635,834 UART: Running Caliptra FMC ...
4,636,242 UART:
4,636,385 UART: [state] CFI Enabled
4,725,322 UART: [art] Extend RT PCRs Done
4,725,750 UART: [art] Lock RT PCRs Done
4,727,221 UART: [art] Populate DV Done
4,735,453 UART: [fht] FMC Alias Private Key: 7
4,736,589 UART: [art] Derive CDI
4,736,869 UART: [art] Store in in slot 0x4
4,822,444 UART: [art] Derive Key Pair
4,822,804 UART: [art] Store priv key in slot 0x5
4,835,850 UART: [art] Derive Key Pair - Done
4,850,413 UART: [art] Signing Cert with AUTHO
4,850,893 UART: RITY.KEYID = 7
4,865,815 UART: [art] Erasing AUTHORITY.KEYID = 7
4,866,580 UART: [art] PUB.X = CD7DF539AB98F363C8338F4C3B934E42B80FAA1F004D3FEE859C173521F1EEC7CF8AD2782DE79DB6FC2BDD284386C95B
4,873,345 UART: [art] PUB.Y = 9B0A98A7FA0E3051987AC6BCD8F14C992111F44515E6D95A68AFEC1AB83EDB539E650883717B1C49F3CB6960DE5FA4A6
4,880,298 UART: [art] SIG.R = 6AB7E40AADC94524D6B266911D85F78BEE2FD9B0C2C36C611DC84B3172CA4EF567A7A909453716BE9E3A3675FED66EC5
4,887,076 UART: [art] SIG.S = 62615B1BD6FCD931EBFEB5AF9FF3A224863DF1D245F52C3F23B9F3C6E97822F3BDB1569AE9AA6EE340F7E5724DE16DBF
4,911,553 UART: Caliptra RT
4,911,899 UART: [state] CFI Enabled
5,192,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,163,653 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
192,134 UART:
192,555 UART: Running Caliptra ROM ...
193,678 UART:
193,823 UART: [state] CFI Enabled
259,902 UART: [state] LifecycleState = Unprovisioned
261,885 UART: [state] DebugLocked = No
263,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,463 UART: [kat] SHA2-256
437,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,673 UART: [kat] ++
448,163 UART: [kat] sha1
457,963 UART: [kat] SHA2-256
460,702 UART: [kat] SHA2-384
465,707 UART: [kat] SHA2-512-ACC
468,100 UART: [kat] ECC-384
2,763,055 UART: [kat] HMAC-384Kdf
2,773,899 UART: [kat] LMS
3,964,193 UART: [kat] --
3,968,480 UART: [cold-reset] ++
3,970,633 UART: [fht] Storing FHT @ 0x50003400
3,982,926 UART: [idev] ++
3,983,489 UART: [idev] CDI.KEYID = 6
3,984,506 UART: [idev] SUBJECT.KEYID = 7
3,985,667 UART: [idev] UDS.KEYID = 0
3,988,222 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,131,947 UART: [idev] Erasing UDS.KEYID = 0
7,321,889 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,590 UART: [idev] --
7,348,344 UART: [ldev] ++
7,348,975 UART: [ldev] CDI.KEYID = 6
7,349,894 UART: [ldev] SUBJECT.KEYID = 5
7,351,111 UART: [ldev] AUTHORITY.KEYID = 7
7,352,403 UART: [ldev] FE.KEYID = 1
7,396,594 UART: [ldev] Erasing FE.KEYID = 1
10,732,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,507 UART: [ldev] --
13,112,771 UART: [fwproc] Waiting for Commands...
13,114,792 UART: [fwproc] Received command 0x46574c44
13,117,039 UART: [fwproc] Received Image of size 114036 bytes
14,512,765 UART: ROM Fatal Error: 0x000B000D
14,516,267 >>> mbox cmd response: failed
14,516,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,516,994 >>> mbox cmd response: failed
14,517,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,517,555 >>> mbox cmd response: failed
Initializing fuses
2,055,157 writing to cptra_bootfsm_go
2,244,442 UART:
2,244,807 UART: Running Caliptra ROM ...
2,245,951 UART:
2,246,123 UART: [state] CFI Enabled
2,314,606 UART: [state] LifecycleState = Unprovisioned
2,316,547 UART: [state] DebugLocked = No
2,318,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,804 UART: [kat] SHA2-256
2,492,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,029 UART: [kat] ++
2,503,579 UART: [kat] sha1
2,514,694 UART: [kat] SHA2-256
2,517,380 UART: [kat] SHA2-384
2,523,375 UART: [kat] SHA2-512-ACC
2,525,730 UART: [kat] ECC-384
4,818,452 UART: [kat] HMAC-384Kdf
4,830,556 UART: [kat] LMS
6,020,848 UART: [kat] --
6,025,422 UART: [cold-reset] ++
6,027,533 UART: [fht] Storing FHT @ 0x50003400
6,038,229 UART: [idev] ++
6,038,803 UART: [idev] CDI.KEYID = 6
6,039,785 UART: [idev] SUBJECT.KEYID = 7
6,041,010 UART: [idev] UDS.KEYID = 0
6,043,617 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,187,257 UART: [idev] Erasing UDS.KEYID = 0
9,378,356 UART: [idev] Using Sha1 for KeyId Algorithm
9,399,097 UART: [idev] --
9,403,257 UART: [ldev] ++
9,403,831 UART: [ldev] CDI.KEYID = 6
9,404,796 UART: [ldev] SUBJECT.KEYID = 5
9,406,073 UART: [ldev] AUTHORITY.KEYID = 7
9,407,257 UART: [ldev] FE.KEYID = 1
9,432,619 UART: [ldev] Erasing FE.KEYID = 1
12,767,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,079,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,094,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,109,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,123,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,141,839 UART: [ldev] --
15,147,165 UART: [fwproc] Waiting for Commands...
15,150,081 UART: [fwproc] Received command 0x46574c44
15,152,271 UART: [fwproc] Received Image of size 114036 bytes
19,203,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,278,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,347,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,664,164 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,806,512 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,255,650 >>> mbox cmd response: failed
14,256,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,256,566 >>> mbox cmd response: failed
14,256,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,257,130 >>> mbox cmd response: failed
Initializing fuses
2,057,383 writing to cptra_bootfsm_go
5,842,736 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,907,285 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,656 UART:
193,011 UART: Running Caliptra ROM ...
194,205 UART:
603,836 UART: [state] CFI Enabled
619,765 UART: [state] LifecycleState = Unprovisioned
621,679 UART: [state] DebugLocked = No
624,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,873 UART: [kat] SHA2-256
798,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,147 UART: [kat] ++
809,734 UART: [kat] sha1
820,459 UART: [kat] SHA2-256
823,159 UART: [kat] SHA2-384
828,007 UART: [kat] SHA2-512-ACC
830,362 UART: [kat] ECC-384
3,112,353 UART: [kat] HMAC-384Kdf
3,124,219 UART: [kat] LMS
4,314,353 UART: [kat] --
4,317,668 UART: [cold-reset] ++
4,318,912 UART: [fht] Storing FHT @ 0x50003400
4,331,095 UART: [idev] ++
4,331,672 UART: [idev] CDI.KEYID = 6
4,332,598 UART: [idev] SUBJECT.KEYID = 7
4,333,867 UART: [idev] UDS.KEYID = 0
4,336,492 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,909 UART: [idev] Erasing UDS.KEYID = 0
7,617,637 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,416 UART: [idev] --
7,641,888 UART: [ldev] ++
7,642,459 UART: [ldev] CDI.KEYID = 6
7,643,402 UART: [ldev] SUBJECT.KEYID = 5
7,644,667 UART: [ldev] AUTHORITY.KEYID = 7
7,645,900 UART: [ldev] FE.KEYID = 1
7,657,052 UART: [ldev] Erasing FE.KEYID = 1
10,946,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,450 UART: [ldev] --
13,305,588 UART: [fwproc] Waiting for Commands...
13,307,257 UART: [fwproc] Received command 0x46574c44
13,309,453 UART: [fwproc] Received Image of size 114036 bytes
14,698,039 UART: ROM Fatal Error: 0x000B000D
14,701,501 >>> mbox cmd response: failed
14,701,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,702,238 >>> mbox cmd response: failed
14,702,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,702,798 >>> mbox cmd response: failed
Initializing fuses
2,057,009 writing to cptra_bootfsm_go
2,246,305 UART:
2,246,659 UART: Running Caliptra ROM ...
2,247,709 UART:
5,748,858 UART: [state] CFI Enabled
5,762,583 UART: [state] LifecycleState = Unprovisioned
5,764,502 UART: [state] DebugLocked = No
5,767,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,771,375 UART: [kat] SHA2-256
5,941,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,951,689 UART: [kat] ++
5,952,149 UART: [kat] sha1
5,962,926 UART: [kat] SHA2-256
5,965,624 UART: [kat] SHA2-384
5,971,128 UART: [kat] SHA2-512-ACC
5,973,480 UART: [kat] ECC-384
8,256,430 UART: [kat] HMAC-384Kdf
8,269,412 UART: [kat] LMS
9,459,491 UART: [kat] --
9,465,056 UART: [cold-reset] ++
9,467,536 UART: [fht] Storing FHT @ 0x50003400
9,479,130 UART: [idev] ++
9,479,695 UART: [idev] CDI.KEYID = 6
9,480,633 UART: [idev] SUBJECT.KEYID = 7
9,481,925 UART: [idev] UDS.KEYID = 0
9,484,183 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
9,627,407 UART: [idev] Erasing UDS.KEYID = 0
12,771,418 UART: [idev] Using Sha1 for KeyId Algorithm
12,794,042 UART: [idev] --
12,798,714 UART: [ldev] ++
12,799,291 UART: [ldev] CDI.KEYID = 6
12,800,260 UART: [ldev] SUBJECT.KEYID = 5
12,801,512 UART: [ldev] AUTHORITY.KEYID = 7
12,802,744 UART: [ldev] FE.KEYID = 1
12,816,102 UART: [ldev] Erasing FE.KEYID = 1
16,105,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,399,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,414,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,429,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,443,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,461,626 UART: [ldev] --
18,466,950 UART: [fwproc] Waiting for Commands...
18,469,281 UART: [fwproc] Received command 0x46574c44
18,471,499 UART: [fwproc] Received Image of size 114036 bytes
22,520,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,602,164 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,671,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,987,801 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
4,130,062 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,452,977 >>> mbox cmd response: failed
14,453,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,453,863 >>> mbox cmd response: failed
14,454,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,454,438 >>> mbox cmd response: failed
Initializing fuses
2,055,297 writing to cptra_bootfsm_go
9,527,295 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,467,600 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,384 UART:
192,738 UART: Running Caliptra ROM ...
193,858 UART:
193,997 UART: [state] CFI Enabled
258,319 UART: [state] LifecycleState = Unprovisioned
260,167 UART: [state] DebugLocked = No
263,034 UART: [state] WD Timer not started. Device not locked for debugging
266,427 UART: [kat] SHA2-256
445,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,123 UART: [kat] ++
457,576 UART: [kat] sha1
468,007 UART: [kat] SHA2-256
471,027 UART: [kat] SHA2-384
477,230 UART: [kat] SHA2-512-ACC
480,170 UART: [kat] ECC-384
2,945,013 UART: [kat] HMAC-384Kdf
2,965,566 UART: [kat] LMS
3,495,026 UART: [kat] --
3,499,725 UART: [cold-reset] ++
3,501,142 UART: [fht] FHT @ 0x50003400
3,513,595 UART: [idev] ++
3,514,160 UART: [idev] CDI.KEYID = 6
3,515,175 UART: [idev] SUBJECT.KEYID = 7
3,516,278 UART: [idev] UDS.KEYID = 0
3,519,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,099 UART: [idev] Erasing UDS.KEYID = 0
6,020,790 UART: [idev] Sha1 KeyId Algorithm
6,043,593 UART: [idev] --
6,047,178 UART: [ldev] ++
6,047,757 UART: [ldev] CDI.KEYID = 6
6,048,672 UART: [ldev] SUBJECT.KEYID = 5
6,049,836 UART: [ldev] AUTHORITY.KEYID = 7
6,051,071 UART: [ldev] FE.KEYID = 1
6,095,440 UART: [ldev] Erasing FE.KEYID = 1
8,599,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,990 UART: [ldev] --
10,406,448 UART: [fwproc] Wait for Commands...
10,409,260 UART: [fwproc] Recv command 0x46574c44
10,411,323 UART: [fwproc] Recv'd Img size: 114360 bytes
11,474,261 UART: ROM Fatal Error: 0x000B000D
11,477,344 >>> mbox cmd response: failed
11,477,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,478,094 >>> mbox cmd response: failed
11,478,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,478,652 >>> mbox cmd response: failed
Initializing fuses
2,053,422 writing to cptra_bootfsm_go
2,242,724 UART:
2,243,071 UART: Running Caliptra ROM ...
2,244,166 UART:
2,244,322 UART: [state] CFI Enabled
2,306,661 UART: [state] LifecycleState = Unprovisioned
2,308,545 UART: [state] DebugLocked = No
2,309,991 UART: [state] WD Timer not started. Device not locked for debugging
2,313,538 UART: [kat] SHA2-256
2,492,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,207 UART: [kat] ++
2,504,751 UART: [kat] sha1
2,515,378 UART: [kat] SHA2-256
2,518,385 UART: [kat] SHA2-384
2,524,317 UART: [kat] SHA2-512-ACC
2,527,270 UART: [kat] ECC-384
4,990,403 UART: [kat] HMAC-384Kdf
5,014,405 UART: [kat] LMS
5,543,887 UART: [kat] --
5,548,560 UART: [cold-reset] ++
5,550,059 UART: [fht] FHT @ 0x50003400
5,560,501 UART: [idev] ++
5,561,070 UART: [idev] CDI.KEYID = 6
5,562,039 UART: [idev] SUBJECT.KEYID = 7
5,563,223 UART: [idev] UDS.KEYID = 0
5,565,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,582 UART: [idev] Erasing UDS.KEYID = 0
8,069,693 UART: [idev] Sha1 KeyId Algorithm
8,092,174 UART: [idev] --
8,095,476 UART: [ldev] ++
8,096,051 UART: [ldev] CDI.KEYID = 6
8,096,965 UART: [ldev] SUBJECT.KEYID = 5
8,098,075 UART: [ldev] AUTHORITY.KEYID = 7
8,099,365 UART: [ldev] FE.KEYID = 1
8,142,135 UART: [ldev] Erasing FE.KEYID = 1
10,645,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,130 UART: [ldev] --
12,457,667 UART: [fwproc] Wait for Commands...
12,459,549 UART: [fwproc] Recv command 0x46574c44
12,461,646 UART: [fwproc] Recv'd Img size: 114360 bytes
15,866,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,939,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,008,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,325,996 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,055 UART:
192,435 UART: Running Caliptra ROM ...
193,631 UART:
193,804 UART: [state] CFI Enabled
258,286 UART: [state] LifecycleState = Unprovisioned
260,374 UART: [state] DebugLocked = No
262,573 UART: [state] WD Timer not started. Device not locked for debugging
266,427 UART: [kat] SHA2-256
456,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,036 UART: [kat] ++
467,523 UART: [kat] sha1
479,000 UART: [kat] SHA2-256
482,025 UART: [kat] SHA2-384
487,579 UART: [kat] SHA2-512-ACC
490,135 UART: [kat] ECC-384
2,945,608 UART: [kat] HMAC-384Kdf
2,968,467 UART: [kat] LMS
3,500,230 UART: [kat] --
3,503,714 UART: [cold-reset] ++
3,504,810 UART: [fht] FHT @ 0x50003400
3,516,040 UART: [idev] ++
3,516,779 UART: [idev] CDI.KEYID = 6
3,517,661 UART: [idev] SUBJECT.KEYID = 7
3,518,927 UART: [idev] UDS.KEYID = 0
3,521,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,883 UART: [idev] Erasing UDS.KEYID = 0
6,024,896 UART: [idev] Sha1 KeyId Algorithm
6,047,758 UART: [idev] --
6,053,376 UART: [ldev] ++
6,054,063 UART: [ldev] CDI.KEYID = 6
6,054,952 UART: [ldev] SUBJECT.KEYID = 5
6,056,173 UART: [ldev] AUTHORITY.KEYID = 7
6,057,354 UART: [ldev] FE.KEYID = 1
6,097,256 UART: [ldev] Erasing FE.KEYID = 1
8,602,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,573 UART: [ldev] --
10,410,919 UART: [fwproc] Wait for Commands...
10,413,501 UART: [fwproc] Recv command 0x46574c44
10,415,808 UART: [fwproc] Recv'd Img size: 114360 bytes
11,512,958 UART: ROM Fatal Error: 0x000B000D
11,516,628 >>> mbox cmd response: failed
11,516,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,517,351 >>> mbox cmd response: failed
11,517,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,517,912 >>> mbox cmd response: failed
Initializing fuses
2,055,648 writing to cptra_bootfsm_go
2,244,915 UART:
2,245,261 UART: Running Caliptra ROM ...
2,246,304 UART:
2,246,455 UART: [state] CFI Enabled
2,310,433 UART: [state] LifecycleState = Unprovisioned
2,312,815 UART: [state] DebugLocked = No
2,315,748 UART: [state] WD Timer not started. Device not locked for debugging
2,320,757 UART: [kat] SHA2-256
2,510,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,393 UART: [kat] ++
2,521,853 UART: [kat] sha1
2,533,824 UART: [kat] SHA2-256
2,536,853 UART: [kat] SHA2-384
2,543,871 UART: [kat] SHA2-512-ACC
2,546,464 UART: [kat] ECC-384
4,995,882 UART: [kat] HMAC-384Kdf
5,012,068 UART: [kat] LMS
5,543,871 UART: [kat] --
5,548,638 UART: [cold-reset] ++
5,550,088 UART: [fht] FHT @ 0x50003400
5,561,672 UART: [idev] ++
5,562,346 UART: [idev] CDI.KEYID = 6
5,563,280 UART: [idev] SUBJECT.KEYID = 7
5,564,493 UART: [idev] UDS.KEYID = 0
5,566,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,710,580 UART: [idev] Erasing UDS.KEYID = 0
8,069,342 UART: [idev] Sha1 KeyId Algorithm
8,092,904 UART: [idev] --
8,099,222 UART: [ldev] ++
8,099,948 UART: [ldev] CDI.KEYID = 6
8,100,893 UART: [ldev] SUBJECT.KEYID = 5
8,102,001 UART: [ldev] AUTHORITY.KEYID = 7
8,103,185 UART: [ldev] FE.KEYID = 1
8,139,463 UART: [ldev] Erasing FE.KEYID = 1
10,648,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,181 UART: [ldev] --
12,455,098 UART: [fwproc] Wait for Commands...
12,458,065 UART: [fwproc] Recv command 0x46574c44
12,460,393 UART: [fwproc] Recv'd Img size: 114360 bytes
15,909,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,645,942 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,438,699 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,317,563 >>> mbox cmd response: failed
11,318,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,318,588 >>> mbox cmd response: failed
11,318,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,319,146 >>> mbox cmd response: failed
Initializing fuses
2,055,282 writing to cptra_bootfsm_go
5,484,219 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,782,289 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,634 writing to cptra_bootfsm_go
192,738 UART:
193,095 UART: Running Caliptra ROM ...
194,290 UART:
603,858 UART: [state] CFI Enabled
616,180 UART: [state] LifecycleState = Unprovisioned
618,552 UART: [state] DebugLocked = No
621,009 UART: [state] WD Timer not started. Device not locked for debugging
626,470 UART: [kat] SHA2-256
816,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,155 UART: [kat] ++
827,740 UART: [kat] sha1
839,271 UART: [kat] SHA2-256
842,264 UART: [kat] SHA2-384
848,301 UART: [kat] SHA2-512-ACC
850,908 UART: [kat] ECC-384
3,294,466 UART: [kat] HMAC-384Kdf
3,307,463 UART: [kat] LMS
3,839,257 UART: [kat] --
3,845,468 UART: [cold-reset] ++
3,846,375 UART: [fht] FHT @ 0x50003400
3,858,003 UART: [idev] ++
3,858,682 UART: [idev] CDI.KEYID = 6
3,859,650 UART: [idev] SUBJECT.KEYID = 7
3,860,807 UART: [idev] UDS.KEYID = 0
3,863,477 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,269 UART: [idev] Erasing UDS.KEYID = 0
6,334,437 UART: [idev] Sha1 KeyId Algorithm
6,356,053 UART: [idev] --
6,361,583 UART: [ldev] ++
6,362,305 UART: [ldev] CDI.KEYID = 6
6,363,217 UART: [ldev] SUBJECT.KEYID = 5
6,364,401 UART: [ldev] AUTHORITY.KEYID = 7
6,365,579 UART: [ldev] FE.KEYID = 1
6,378,872 UART: [ldev] Erasing FE.KEYID = 1
8,854,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,049 UART: [ldev] --
10,643,995 UART: [fwproc] Wait for Commands...
10,645,551 UART: [fwproc] Recv command 0x46574c44
10,647,866 UART: [fwproc] Recv'd Img size: 114360 bytes
11,749,602 UART: ROM Fatal Error: 0x000B000D
11,753,264 >>> mbox cmd response: failed
11,753,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,997 >>> mbox cmd response: failed
11,754,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,754,579 >>> mbox cmd response: failed
Initializing fuses
2,054,062 writing to cptra_bootfsm_go
2,243,380 UART:
2,243,728 UART: Running Caliptra ROM ...
2,244,868 UART:
8,693,726 UART: [state] CFI Enabled
8,710,634 UART: [state] LifecycleState = Unprovisioned
8,713,032 UART: [state] DebugLocked = No
8,714,583 UART: [state] WD Timer not started. Device not locked for debugging
8,720,063 UART: [kat] SHA2-256
8,909,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,920,732 UART: [kat] ++
8,921,348 UART: [kat] sha1
8,932,242 UART: [kat] SHA2-256
8,935,297 UART: [kat] SHA2-384
8,941,454 UART: [kat] SHA2-512-ACC
8,944,031 UART: [kat] ECC-384
11,386,565 UART: [kat] HMAC-384Kdf
11,399,619 UART: [kat] LMS
11,931,450 UART: [kat] --
11,933,833 UART: [cold-reset] ++
11,936,089 UART: [fht] FHT @ 0x50003400
11,947,340 UART: [idev] ++
11,948,023 UART: [idev] CDI.KEYID = 6
11,948,993 UART: [idev] SUBJECT.KEYID = 7
11,950,095 UART: [idev] UDS.KEYID = 0
11,952,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,096,139 UART: [idev] Erasing UDS.KEYID = 0
14,423,829 UART: [idev] Sha1 KeyId Algorithm
14,445,824 UART: [idev] --
14,451,145 UART: [ldev] ++
14,451,833 UART: [ldev] CDI.KEYID = 6
14,452,741 UART: [ldev] SUBJECT.KEYID = 5
14,453,953 UART: [ldev] AUTHORITY.KEYID = 7
14,455,126 UART: [ldev] FE.KEYID = 1
14,467,011 UART: [ldev] Erasing FE.KEYID = 1
16,942,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,662,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,678,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,693,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,708,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,728,094 UART: [ldev] --
18,733,688 UART: [fwproc] Wait for Commands...
18,736,602 UART: [fwproc] Recv command 0x46574c44
18,738,942 UART: [fwproc] Recv'd Img size: 114360 bytes
22,181,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,253,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,369,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
22,911,633 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,754,240 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,534,348 >>> mbox cmd response: failed
11,534,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,535,249 >>> mbox cmd response: failed
11,535,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,535,816 >>> mbox cmd response: failed
Initializing fuses
2,054,694 writing to cptra_bootfsm_go
12,072,216 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,277,621 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,743 UART: [kat] SHA2-256
881,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,789 UART: [kat] ++
885,941 UART: [kat] sha1
890,249 UART: [kat] SHA2-256
892,187 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,598 UART: [kat] HMAC-384Kdf
907,210 UART: [kat] LMS
1,475,406 UART: [kat] --
1,476,491 UART: [cold-reset] ++
1,476,877 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,948 UART: [idev] Erasing UDS.KEYID = 0
1,504,376 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,162 UART: [idev] --
1,514,205 UART: [ldev] ++
1,514,373 UART: [ldev] CDI.KEYID = 6
1,514,736 UART: [ldev] SUBJECT.KEYID = 5
1,515,162 UART: [ldev] AUTHORITY.KEYID = 7
1,515,625 UART: [ldev] FE.KEYID = 1
1,520,725 UART: [ldev] Erasing FE.KEYID = 1
1,546,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,158 UART: [ldev] --
1,585,493 UART: [fwproc] Waiting for Commands...
1,586,346 UART: [fwproc] Received command 0x46574c44
1,587,137 UART: [fwproc] Received Image of size 114360 bytes
1,624,520 UART: ROM Fatal Error: 0x000B000D
1,625,679 >>> mbox cmd response: failed
1,625,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,685 >>> mbox cmd response: failed
1,625,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,677 UART: [kat] SHA2-256
881,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,723 UART: [kat] ++
885,875 UART: [kat] sha1
890,027 UART: [kat] SHA2-256
891,965 UART: [kat] SHA2-384
894,688 UART: [kat] SHA2-512-ACC
896,589 UART: [kat] ECC-384
902,112 UART: [kat] HMAC-384Kdf
906,756 UART: [kat] LMS
1,474,952 UART: [kat] --
1,475,443 UART: [cold-reset] ++
1,475,803 UART: [fht] Storing FHT @ 0x50003400
1,478,614 UART: [idev] ++
1,478,782 UART: [idev] CDI.KEYID = 6
1,479,142 UART: [idev] SUBJECT.KEYID = 7
1,479,566 UART: [idev] UDS.KEYID = 0
1,479,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,272 UART: [idev] Erasing UDS.KEYID = 0
1,503,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,366 UART: [idev] --
1,513,283 UART: [ldev] ++
1,513,451 UART: [ldev] CDI.KEYID = 6
1,513,814 UART: [ldev] SUBJECT.KEYID = 5
1,514,240 UART: [ldev] AUTHORITY.KEYID = 7
1,514,703 UART: [ldev] FE.KEYID = 1
1,519,801 UART: [ldev] Erasing FE.KEYID = 1
1,545,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,682 UART: [ldev] --
1,584,157 UART: [fwproc] Waiting for Commands...
1,585,018 UART: [fwproc] Received command 0x46574c44
1,585,809 UART: [fwproc] Received Image of size 114360 bytes
2,884,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,180 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,771 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,478,524 >>> mbox cmd response: failed
1,478,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,530 >>> mbox cmd response: failed
1,478,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,406 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,220 UART: [kat] SHA2-256
882,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,266 UART: [kat] ++
886,418 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,547 UART: [kat] SHA2-512-ACC
897,448 UART: [kat] ECC-384
903,243 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,476,930 UART: [cold-reset] ++
1,477,442 UART: [fht] Storing FHT @ 0x50003400
1,480,233 UART: [idev] ++
1,480,401 UART: [idev] CDI.KEYID = 6
1,480,761 UART: [idev] SUBJECT.KEYID = 7
1,481,185 UART: [idev] UDS.KEYID = 0
1,481,530 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,233 UART: [idev] Erasing UDS.KEYID = 0
1,506,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,813 UART: [idev] --
1,516,050 UART: [ldev] ++
1,516,218 UART: [ldev] CDI.KEYID = 6
1,516,581 UART: [ldev] SUBJECT.KEYID = 5
1,517,007 UART: [ldev] AUTHORITY.KEYID = 7
1,517,470 UART: [ldev] FE.KEYID = 1
1,522,694 UART: [ldev] Erasing FE.KEYID = 1
1,547,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,935 UART: [ldev] --
1,587,224 UART: [fwproc] Waiting for Commands...
1,587,967 UART: [fwproc] Received command 0x46574c44
1,588,758 UART: [fwproc] Received Image of size 114360 bytes
1,627,315 UART: ROM Fatal Error: 0x000B000D
1,628,474 >>> mbox cmd response: failed
1,628,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,480 >>> mbox cmd response: failed
1,628,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,656 UART: [kat] SHA2-256
892,594 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
903,019 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,292 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,497 UART: [idev] Erasing UDS.KEYID = 0
1,506,131 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,551 UART: [idev] --
1,515,644 UART: [ldev] ++
1,515,812 UART: [ldev] CDI.KEYID = 6
1,516,175 UART: [ldev] SUBJECT.KEYID = 5
1,516,601 UART: [ldev] AUTHORITY.KEYID = 7
1,517,064 UART: [ldev] FE.KEYID = 1
1,522,224 UART: [ldev] Erasing FE.KEYID = 1
1,547,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,359 UART: [ldev] --
1,586,652 UART: [fwproc] Waiting for Commands...
1,587,371 UART: [fwproc] Received command 0x46574c44
1,588,162 UART: [fwproc] Received Image of size 114360 bytes
2,886,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,424 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,739 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,478,599 >>> mbox cmd response: failed
1,478,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,605 >>> mbox cmd response: failed
1,478,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,599 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
902,027 UART: [kat] SHA2-256
903,967 UART: [kat] SHA2-384
906,668 UART: [kat] SHA2-512-ACC
908,569 UART: [kat] ECC-384
917,876 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,401 UART: [fht] FHT @ 0x50003400
1,175,148 UART: [idev] ++
1,175,316 UART: [idev] CDI.KEYID = 6
1,175,676 UART: [idev] SUBJECT.KEYID = 7
1,176,100 UART: [idev] UDS.KEYID = 0
1,176,445 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,201,237 UART: [idev] Sha1 KeyId Algorithm
1,209,831 UART: [idev] --
1,210,791 UART: [ldev] ++
1,210,959 UART: [ldev] CDI.KEYID = 6
1,211,322 UART: [ldev] SUBJECT.KEYID = 5
1,211,748 UART: [ldev] AUTHORITY.KEYID = 7
1,212,211 UART: [ldev] FE.KEYID = 1
1,217,247 UART: [ldev] Erasing FE.KEYID = 1
1,243,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,453 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,416 UART: [fwproc] Recv command 0x46574c44
1,284,144 UART: [fwproc] Recv'd Img size: 114360 bytes
1,322,293 UART: ROM Fatal Error: 0x000B000D
1,323,452 >>> mbox cmd response: failed
1,323,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,458 >>> mbox cmd response: failed
1,323,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,464 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
902,023 UART: [kat] SHA2-256
903,963 UART: [kat] SHA2-384
906,702 UART: [kat] SHA2-512-ACC
908,603 UART: [kat] ECC-384
918,454 UART: [kat] HMAC-384Kdf
922,976 UART: [kat] LMS
1,171,304 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,150 UART: [idev] ++
1,175,318 UART: [idev] CDI.KEYID = 6
1,175,678 UART: [idev] SUBJECT.KEYID = 7
1,176,102 UART: [idev] UDS.KEYID = 0
1,176,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,768 UART: [idev] Erasing UDS.KEYID = 0
1,200,841 UART: [idev] Sha1 KeyId Algorithm
1,209,139 UART: [idev] --
1,209,973 UART: [ldev] ++
1,210,141 UART: [ldev] CDI.KEYID = 6
1,210,504 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,614 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,022 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,513 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,697 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,859 >>> mbox cmd response: failed
1,178,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,865 >>> mbox cmd response: failed
1,178,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,162 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
893,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,480 UART: [kat] ++
897,632 UART: [kat] sha1
901,676 UART: [kat] SHA2-256
903,616 UART: [kat] SHA2-384
906,497 UART: [kat] SHA2-512-ACC
908,398 UART: [kat] ECC-384
918,143 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,802 UART: [fht] FHT @ 0x50003400
1,175,371 UART: [idev] ++
1,175,539 UART: [idev] CDI.KEYID = 6
1,175,899 UART: [idev] SUBJECT.KEYID = 7
1,176,323 UART: [idev] UDS.KEYID = 0
1,176,668 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,209 UART: [idev] Erasing UDS.KEYID = 0
1,201,276 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,432 UART: [ldev] Erasing FE.KEYID = 1
1,243,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,348 UART: [ldev] --
1,283,839 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114360 bytes
1,322,624 UART: ROM Fatal Error: 0x000B000D
1,323,783 >>> mbox cmd response: failed
1,323,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,789 >>> mbox cmd response: failed
1,323,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,835 UART: [kat] SHA2-512-ACC
908,736 UART: [kat] ECC-384
918,305 UART: [kat] HMAC-384Kdf
922,791 UART: [kat] LMS
1,171,119 UART: [kat] --
1,172,202 UART: [cold-reset] ++
1,172,764 UART: [fht] FHT @ 0x50003400
1,175,537 UART: [idev] ++
1,175,705 UART: [idev] CDI.KEYID = 6
1,176,065 UART: [idev] SUBJECT.KEYID = 7
1,176,489 UART: [idev] UDS.KEYID = 0
1,176,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,491 UART: [idev] Erasing UDS.KEYID = 0
1,201,804 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] --
1,211,520 UART: [ldev] ++
1,211,688 UART: [ldev] CDI.KEYID = 6
1,212,051 UART: [ldev] SUBJECT.KEYID = 5
1,212,477 UART: [ldev] AUTHORITY.KEYID = 7
1,212,940 UART: [ldev] FE.KEYID = 1
1,218,160 UART: [ldev] Erasing FE.KEYID = 1
1,244,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,292 UART: [ldev] --
1,283,735 UART: [fwproc] Wait for Commands...
1,284,397 UART: [fwproc] Recv command 0x46574c44
1,285,125 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,358 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,612 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,175,922 >>> mbox cmd response: failed
1,175,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,928 >>> mbox cmd response: failed
1,175,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,409 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,298 UART: [ldev] ++
1,208,466 UART: [ldev] CDI.KEYID = 6
1,208,830 UART: [ldev] SUBJECT.KEYID = 5
1,209,257 UART: [ldev] AUTHORITY.KEYID = 7
1,209,720 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,333 UART: [fwproc] Recv command 0x46574c44
1,282,066 UART: [fwproc] Recv'd Img size: 114360 bytes
1,320,177 UART: ROM Fatal Error: 0x000B000D
1,321,336 >>> mbox cmd response: failed
1,321,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,342 >>> mbox cmd response: failed
1,321,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,451 UART: [kat] SHA2-256
901,391 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,582 UART: [kat] LMS
1,168,894 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,974 UART: [ldev] --
1,280,382 UART: [fwproc] Wait for Commands...
1,280,959 UART: [fwproc] Recv command 0x46574c44
1,281,692 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,561 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,354 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,173,999 >>> mbox cmd response: failed
1,173,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,005 >>> mbox cmd response: failed
1,174,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,738 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,001 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,630 UART: [idev] Sha1 KeyId Algorithm
1,208,548 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,127 UART: [ldev] --
1,282,515 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 114360 bytes
1,322,338 UART: ROM Fatal Error: 0x000B000D
1,323,497 >>> mbox cmd response: failed
1,323,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,503 >>> mbox cmd response: failed
1,323,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
917,017 UART: [kat] HMAC-384Kdf
921,639 UART: [kat] LMS
1,169,951 UART: [kat] --
1,170,708 UART: [cold-reset] ++
1,171,106 UART: [fht] FHT @ 0x50003400
1,173,666 UART: [idev] ++
1,173,834 UART: [idev] CDI.KEYID = 6
1,174,195 UART: [idev] SUBJECT.KEYID = 7
1,174,620 UART: [idev] UDS.KEYID = 0
1,174,966 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,822 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,043 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,385 UART: [ldev] --
1,282,891 UART: [fwproc] Wait for Commands...
1,283,548 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,366 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,172,552 >>> mbox cmd response: failed
1,172,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,558 >>> mbox cmd response: failed
1,172,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,064 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,084 UART:
192,456 UART: Running Caliptra ROM ...
193,559 UART:
193,704 UART: [state] CFI Enabled
267,279 UART: [state] LifecycleState = Unprovisioned
269,263 UART: [state] DebugLocked = No
270,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,261 UART: [kat] SHA2-256
445,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,459 UART: [kat] ++
456,933 UART: [kat] sha1
467,550 UART: [kat] SHA2-256
470,286 UART: [kat] SHA2-384
476,529 UART: [kat] SHA2-512-ACC
478,920 UART: [kat] ECC-384
2,767,018 UART: [kat] HMAC-384Kdf
2,779,171 UART: [kat] LMS
3,969,465 UART: [kat] --
3,974,286 UART: [cold-reset] ++
3,975,408 UART: [fht] Storing FHT @ 0x50003400
3,987,270 UART: [idev] ++
3,987,839 UART: [idev] CDI.KEYID = 6
3,988,785 UART: [idev] SUBJECT.KEYID = 7
3,990,019 UART: [idev] UDS.KEYID = 0
3,993,108 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,774 UART: [idev] Erasing UDS.KEYID = 0
7,326,724 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,268 UART: [idev] --
7,351,614 UART: [ldev] ++
7,352,182 UART: [ldev] CDI.KEYID = 6
7,353,147 UART: [ldev] SUBJECT.KEYID = 5
7,354,364 UART: [ldev] AUTHORITY.KEYID = 7
7,355,653 UART: [ldev] FE.KEYID = 1
7,402,331 UART: [ldev] Erasing FE.KEYID = 1
10,737,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,459 UART: [ldev] --
13,115,672 UART: [fwproc] Waiting for Commands...
13,117,665 UART: [fwproc] Received command 0x46574c44
13,119,849 UART: [fwproc] Received Image of size 114036 bytes
13,189,046 UART: ROM Fatal Error: 0x000B0008
13,192,568 >>> mbox cmd response: failed
13,192,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,288 >>> mbox cmd response: failed
13,193,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,845 >>> mbox cmd response: failed
Initializing fuses
2,056,363 writing to cptra_bootfsm_go
2,245,657 UART:
2,246,038 UART: Running Caliptra ROM ...
2,247,183 UART:
2,247,356 UART: [state] CFI Enabled
2,306,540 UART: [state] LifecycleState = Unprovisioned
2,308,482 UART: [state] DebugLocked = No
2,310,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,346 UART: [kat] SHA2-256
2,486,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,568 UART: [kat] ++
2,497,029 UART: [kat] sha1
2,507,526 UART: [kat] SHA2-256
2,510,220 UART: [kat] SHA2-384
2,517,286 UART: [kat] SHA2-512-ACC
2,519,641 UART: [kat] ECC-384
4,807,539 UART: [kat] HMAC-384Kdf
4,841,218 UART: [kat] LMS
6,031,488 UART: [kat] --
6,037,858 UART: [cold-reset] ++
6,039,309 UART: [fht] Storing FHT @ 0x50003400
6,051,336 UART: [idev] ++
6,051,942 UART: [idev] CDI.KEYID = 6
6,052,970 UART: [idev] SUBJECT.KEYID = 7
6,054,131 UART: [idev] UDS.KEYID = 0
6,056,683 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,200,468 UART: [idev] Erasing UDS.KEYID = 0
9,388,333 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,735 UART: [idev] --
9,414,038 UART: [ldev] ++
9,414,630 UART: [ldev] CDI.KEYID = 6
9,415,650 UART: [ldev] SUBJECT.KEYID = 5
9,416,853 UART: [ldev] AUTHORITY.KEYID = 7
9,418,034 UART: [ldev] FE.KEYID = 1
9,464,191 UART: [ldev] Erasing FE.KEYID = 1
12,794,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,111,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,125,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,154,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,174,717 UART: [ldev] --
15,179,240 UART: [fwproc] Waiting for Commands...
15,181,351 UART: [fwproc] Received command 0x46574c44
15,183,542 UART: [fwproc] Received Image of size 114036 bytes
19,234,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,311,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,380,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,696,781 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,787,106 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,909,065 >>> mbox cmd response: failed
12,909,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,909,993 >>> mbox cmd response: failed
12,910,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,598 >>> mbox cmd response: failed
Initializing fuses
2,060,558 writing to cptra_bootfsm_go
5,854,396 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,938,388 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,510 UART:
192,873 UART: Running Caliptra ROM ...
193,959 UART:
603,583 UART: [state] CFI Enabled
617,782 UART: [state] LifecycleState = Unprovisioned
619,772 UART: [state] DebugLocked = No
621,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,960 UART: [kat] SHA2-256
795,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,251 UART: [kat] ++
806,734 UART: [kat] sha1
817,831 UART: [kat] SHA2-256
820,506 UART: [kat] SHA2-384
826,950 UART: [kat] SHA2-512-ACC
829,296 UART: [kat] ECC-384
3,114,438 UART: [kat] HMAC-384Kdf
3,126,450 UART: [kat] LMS
4,316,535 UART: [kat] --
4,320,072 UART: [cold-reset] ++
4,321,796 UART: [fht] Storing FHT @ 0x50003400
4,332,920 UART: [idev] ++
4,333,541 UART: [idev] CDI.KEYID = 6
4,334,451 UART: [idev] SUBJECT.KEYID = 7
4,335,726 UART: [idev] UDS.KEYID = 0
4,339,008 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,482,675 UART: [idev] Erasing UDS.KEYID = 0
7,624,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,356 UART: [idev] --
7,648,490 UART: [ldev] ++
7,649,063 UART: [ldev] CDI.KEYID = 6
7,650,034 UART: [ldev] SUBJECT.KEYID = 5
7,651,251 UART: [ldev] AUTHORITY.KEYID = 7
7,652,492 UART: [ldev] FE.KEYID = 1
7,663,624 UART: [ldev] Erasing FE.KEYID = 1
10,953,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,407 UART: [ldev] --
13,314,007 UART: [fwproc] Waiting for Commands...
13,315,686 UART: [fwproc] Received command 0x46574c44
13,317,875 UART: [fwproc] Received Image of size 114036 bytes
13,392,658 UART: ROM Fatal Error: 0x000B0008
13,396,172 >>> mbox cmd response: failed
13,396,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,396,926 >>> mbox cmd response: failed
13,397,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,483 >>> mbox cmd response: failed
Initializing fuses
2,050,387 writing to cptra_bootfsm_go
2,239,663 UART:
2,240,034 UART: Running Caliptra ROM ...
2,241,176 UART:
7,074,627 UART: [state] CFI Enabled
7,087,864 UART: [state] LifecycleState = Unprovisioned
7,089,785 UART: [state] DebugLocked = No
7,091,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,096,466 UART: [kat] SHA2-256
7,266,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,276,800 UART: [kat] ++
7,277,273 UART: [kat] sha1
7,286,971 UART: [kat] SHA2-256
7,289,676 UART: [kat] SHA2-384
7,295,448 UART: [kat] SHA2-512-ACC
7,297,814 UART: [kat] ECC-384
9,582,759 UART: [kat] HMAC-384Kdf
9,594,559 UART: [kat] LMS
10,784,675 UART: [kat] --
10,791,087 UART: [cold-reset] ++
10,792,585 UART: [fht] Storing FHT @ 0x50003400
10,803,741 UART: [idev] ++
10,804,312 UART: [idev] CDI.KEYID = 6
10,805,250 UART: [idev] SUBJECT.KEYID = 7
10,806,522 UART: [idev] UDS.KEYID = 0
10,809,252 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,952,617 UART: [idev] Erasing UDS.KEYID = 0
14,096,015 UART: [idev] Using Sha1 for KeyId Algorithm
14,117,615 UART: [idev] --
14,121,288 UART: [ldev] ++
14,121,856 UART: [ldev] CDI.KEYID = 6
14,122,840 UART: [ldev] SUBJECT.KEYID = 5
14,124,030 UART: [ldev] AUTHORITY.KEYID = 7
14,125,324 UART: [ldev] FE.KEYID = 1
14,136,997 UART: [ldev] Erasing FE.KEYID = 1
17,424,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,717,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,731,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,746,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,761,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,780,323 UART: [ldev] --
19,784,622 UART: [fwproc] Waiting for Commands...
19,787,425 UART: [fwproc] Received command 0x46574c44
19,789,611 UART: [fwproc] Received Image of size 114036 bytes
23,835,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,910,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,979,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,297,103 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
4,134,643 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,125,877 >>> mbox cmd response: failed
13,126,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,126,795 >>> mbox cmd response: failed
13,127,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,362 >>> mbox cmd response: failed
Initializing fuses
2,046,186 writing to cptra_bootfsm_go
10,870,975 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,806,269 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,170 UART:
192,529 UART: Running Caliptra ROM ...
193,619 UART:
193,761 UART: [state] CFI Enabled
265,872 UART: [state] LifecycleState = Unprovisioned
267,743 UART: [state] DebugLocked = No
269,183 UART: [state] WD Timer not started. Device not locked for debugging
272,468 UART: [kat] SHA2-256
451,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,171 UART: [kat] ++
463,713 UART: [kat] sha1
474,292 UART: [kat] SHA2-256
477,300 UART: [kat] SHA2-384
483,814 UART: [kat] SHA2-512-ACC
486,799 UART: [kat] ECC-384
2,946,956 UART: [kat] HMAC-384Kdf
2,968,968 UART: [kat] LMS
3,498,433 UART: [kat] --
3,503,461 UART: [cold-reset] ++
3,505,070 UART: [fht] FHT @ 0x50003400
3,514,758 UART: [idev] ++
3,515,323 UART: [idev] CDI.KEYID = 6
3,516,235 UART: [idev] SUBJECT.KEYID = 7
3,517,449 UART: [idev] UDS.KEYID = 0
3,520,149 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,579 UART: [idev] Erasing UDS.KEYID = 0
6,028,903 UART: [idev] Sha1 KeyId Algorithm
6,052,535 UART: [idev] --
6,056,621 UART: [ldev] ++
6,057,203 UART: [ldev] CDI.KEYID = 6
6,058,096 UART: [ldev] SUBJECT.KEYID = 5
6,059,317 UART: [ldev] AUTHORITY.KEYID = 7
6,060,557 UART: [ldev] FE.KEYID = 1
6,098,462 UART: [ldev] Erasing FE.KEYID = 1
8,601,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,618 UART: [ldev] --
10,412,830 UART: [fwproc] Wait for Commands...
10,414,440 UART: [fwproc] Recv command 0x46574c44
10,416,544 UART: [fwproc] Recv'd Img size: 114360 bytes
10,493,330 UART: ROM Fatal Error: 0x000B0008
10,496,475 >>> mbox cmd response: failed
10,496,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,497,144 >>> mbox cmd response: failed
10,497,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,497,703 >>> mbox cmd response: failed
Initializing fuses
2,049,265 writing to cptra_bootfsm_go
2,238,584 UART:
2,238,942 UART: Running Caliptra ROM ...
2,240,078 UART:
2,240,247 UART: [state] CFI Enabled
2,308,209 UART: [state] LifecycleState = Unprovisioned
2,310,112 UART: [state] DebugLocked = No
2,311,560 UART: [state] WD Timer not started. Device not locked for debugging
2,315,365 UART: [kat] SHA2-256
2,494,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,059 UART: [kat] ++
2,506,588 UART: [kat] sha1
2,517,968 UART: [kat] SHA2-256
2,520,990 UART: [kat] SHA2-384
2,528,166 UART: [kat] SHA2-512-ACC
2,531,124 UART: [kat] ECC-384
4,994,523 UART: [kat] HMAC-384Kdf
5,015,717 UART: [kat] LMS
5,545,166 UART: [kat] --
5,550,725 UART: [cold-reset] ++
5,551,917 UART: [fht] FHT @ 0x50003400
5,563,171 UART: [idev] ++
5,563,761 UART: [idev] CDI.KEYID = 6
5,564,675 UART: [idev] SUBJECT.KEYID = 7
5,565,889 UART: [idev] UDS.KEYID = 0
5,568,611 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,712,597 UART: [idev] Erasing UDS.KEYID = 0
8,070,490 UART: [idev] Sha1 KeyId Algorithm
8,093,491 UART: [idev] --
8,098,678 UART: [ldev] ++
8,099,254 UART: [ldev] CDI.KEYID = 6
8,100,174 UART: [ldev] SUBJECT.KEYID = 5
8,101,392 UART: [ldev] AUTHORITY.KEYID = 7
8,102,626 UART: [ldev] FE.KEYID = 1
8,142,692 UART: [ldev] Erasing FE.KEYID = 1
10,646,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,619 UART: [ldev] --
12,454,694 UART: [fwproc] Wait for Commands...
12,457,330 UART: [fwproc] Recv command 0x46574c44
12,459,429 UART: [fwproc] Recv'd Img size: 114360 bytes
15,857,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,930,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,999,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,318,252 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,099 UART:
192,459 UART: Running Caliptra ROM ...
193,656 UART:
193,809 UART: [state] CFI Enabled
261,456 UART: [state] LifecycleState = Unprovisioned
263,865 UART: [state] DebugLocked = No
265,627 UART: [state] WD Timer not started. Device not locked for debugging
269,559 UART: [kat] SHA2-256
459,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,240 UART: [kat] ++
470,687 UART: [kat] sha1
482,052 UART: [kat] SHA2-256
485,068 UART: [kat] SHA2-384
490,622 UART: [kat] SHA2-512-ACC
493,232 UART: [kat] ECC-384
2,945,865 UART: [kat] HMAC-384Kdf
2,971,393 UART: [kat] LMS
3,503,146 UART: [kat] --
3,508,391 UART: [cold-reset] ++
3,510,604 UART: [fht] FHT @ 0x50003400
3,521,652 UART: [idev] ++
3,522,332 UART: [idev] CDI.KEYID = 6
3,523,301 UART: [idev] SUBJECT.KEYID = 7
3,524,464 UART: [idev] UDS.KEYID = 0
3,527,090 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,088 UART: [idev] Erasing UDS.KEYID = 0
6,026,478 UART: [idev] Sha1 KeyId Algorithm
6,049,178 UART: [idev] --
6,054,960 UART: [ldev] ++
6,055,647 UART: [ldev] CDI.KEYID = 6
6,056,557 UART: [ldev] SUBJECT.KEYID = 5
6,057,723 UART: [ldev] AUTHORITY.KEYID = 7
6,058,954 UART: [ldev] FE.KEYID = 1
6,099,473 UART: [ldev] Erasing FE.KEYID = 1
8,610,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,397 UART: [ldev] --
10,413,372 UART: [fwproc] Wait for Commands...
10,416,454 UART: [fwproc] Recv command 0x46574c44
10,418,723 UART: [fwproc] Recv'd Img size: 114360 bytes
10,519,856 UART: ROM Fatal Error: 0x000B0008
10,523,496 >>> mbox cmd response: failed
10,523,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,248 >>> mbox cmd response: failed
10,524,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,810 >>> mbox cmd response: failed
Initializing fuses
2,051,239 writing to cptra_bootfsm_go
2,240,577 UART:
2,240,930 UART: Running Caliptra ROM ...
2,242,081 UART:
2,242,272 UART: [state] CFI Enabled
2,297,605 UART: [state] LifecycleState = Unprovisioned
2,299,979 UART: [state] DebugLocked = No
2,302,454 UART: [state] WD Timer not started. Device not locked for debugging
2,306,765 UART: [kat] SHA2-256
2,496,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,507,397 UART: [kat] ++
2,507,862 UART: [kat] sha1
2,519,867 UART: [kat] SHA2-256
2,522,894 UART: [kat] SHA2-384
2,527,970 UART: [kat] SHA2-512-ACC
2,530,593 UART: [kat] ECC-384
4,986,673 UART: [kat] HMAC-384Kdf
5,010,212 UART: [kat] LMS
5,541,955 UART: [kat] --
5,548,477 UART: [cold-reset] ++
5,550,437 UART: [fht] FHT @ 0x50003400
5,562,285 UART: [idev] ++
5,562,960 UART: [idev] CDI.KEYID = 6
5,563,930 UART: [idev] SUBJECT.KEYID = 7
5,565,245 UART: [idev] UDS.KEYID = 0
5,567,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,711,613 UART: [idev] Erasing UDS.KEYID = 0
8,088,191 UART: [idev] Sha1 KeyId Algorithm
8,109,387 UART: [idev] --
8,115,223 UART: [ldev] ++
8,115,906 UART: [ldev] CDI.KEYID = 6
8,116,925 UART: [ldev] SUBJECT.KEYID = 5
8,118,031 UART: [ldev] AUTHORITY.KEYID = 7
8,119,267 UART: [ldev] FE.KEYID = 1
8,159,674 UART: [ldev] Erasing FE.KEYID = 1
10,665,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,189 UART: [ldev] --
12,470,794 UART: [fwproc] Wait for Commands...
12,472,524 UART: [fwproc] Recv command 0x46574c44
12,474,789 UART: [fwproc] Recv'd Img size: 114360 bytes
15,922,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,117,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,659,931 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,443,359 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,322,525 >>> mbox cmd response: failed
10,323,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,323,430 >>> mbox cmd response: failed
10,323,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,019 >>> mbox cmd response: failed
Initializing fuses
2,045,155 writing to cptra_bootfsm_go
5,464,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,754,860 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,576 UART:
192,930 UART: Running Caliptra ROM ...
194,117 UART:
603,829 UART: [state] CFI Enabled
617,548 UART: [state] LifecycleState = Unprovisioned
619,966 UART: [state] DebugLocked = No
622,290 UART: [state] WD Timer not started. Device not locked for debugging
626,327 UART: [kat] SHA2-256
816,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,993 UART: [kat] ++
827,518 UART: [kat] sha1
839,750 UART: [kat] SHA2-256
842,769 UART: [kat] SHA2-384
848,696 UART: [kat] SHA2-512-ACC
851,308 UART: [kat] ECC-384
3,292,715 UART: [kat] HMAC-384Kdf
3,305,162 UART: [kat] LMS
3,836,994 UART: [kat] --
3,843,500 UART: [cold-reset] ++
3,844,737 UART: [fht] FHT @ 0x50003400
3,855,451 UART: [idev] ++
3,856,134 UART: [idev] CDI.KEYID = 6
3,857,100 UART: [idev] SUBJECT.KEYID = 7
3,858,316 UART: [idev] UDS.KEYID = 0
3,861,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,004,899 UART: [idev] Erasing UDS.KEYID = 0
6,334,415 UART: [idev] Sha1 KeyId Algorithm
6,357,152 UART: [idev] --
6,362,287 UART: [ldev] ++
6,362,975 UART: [ldev] CDI.KEYID = 6
6,364,040 UART: [ldev] SUBJECT.KEYID = 5
6,365,153 UART: [ldev] AUTHORITY.KEYID = 7
6,366,329 UART: [ldev] FE.KEYID = 1
6,378,172 UART: [ldev] Erasing FE.KEYID = 1
8,858,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,641 UART: [ldev] --
10,653,994 UART: [fwproc] Wait for Commands...
10,656,962 UART: [fwproc] Recv command 0x46574c44
10,659,242 UART: [fwproc] Recv'd Img size: 114360 bytes
10,757,468 UART: ROM Fatal Error: 0x000B0008
10,761,155 >>> mbox cmd response: failed
10,761,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,761,972 >>> mbox cmd response: failed
10,762,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,762,540 >>> mbox cmd response: failed
Initializing fuses
2,050,056 writing to cptra_bootfsm_go
2,239,352 UART:
2,239,692 UART: Running Caliptra ROM ...
2,240,836 UART:
9,690,973 UART: [state] CFI Enabled
9,706,148 UART: [state] LifecycleState = Unprovisioned
9,708,556 UART: [state] DebugLocked = No
9,711,246 UART: [state] WD Timer not started. Device not locked for debugging
9,716,667 UART: [kat] SHA2-256
9,906,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,917,338 UART: [kat] ++
9,917,881 UART: [kat] sha1
9,929,366 UART: [kat] SHA2-256
9,932,204 UART: [kat] SHA2-384
9,938,367 UART: [kat] SHA2-512-ACC
9,940,939 UART: [kat] ECC-384
12,385,489 UART: [kat] HMAC-384Kdf
12,398,210 UART: [kat] LMS
12,930,053 UART: [kat] --
12,935,561 UART: [cold-reset] ++
12,937,815 UART: [fht] FHT @ 0x50003400
12,948,978 UART: [idev] ++
12,949,652 UART: [idev] CDI.KEYID = 6
12,950,617 UART: [idev] SUBJECT.KEYID = 7
12,951,831 UART: [idev] UDS.KEYID = 0
12,954,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,098,133 UART: [idev] Erasing UDS.KEYID = 0
15,427,494 UART: [idev] Sha1 KeyId Algorithm
15,450,346 UART: [idev] --
15,455,825 UART: [ldev] ++
15,456,510 UART: [ldev] CDI.KEYID = 6
15,457,424 UART: [ldev] SUBJECT.KEYID = 5
15,458,580 UART: [ldev] AUTHORITY.KEYID = 7
15,459,811 UART: [ldev] FE.KEYID = 1
15,469,861 UART: [ldev] Erasing FE.KEYID = 1
17,949,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,667,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,682,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,697,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,712,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,732,940 UART: [ldev] --
19,738,962 UART: [fwproc] Wait for Commands...
19,741,274 UART: [fwproc] Recv command 0x46574c44
19,743,586 UART: [fwproc] Recv'd Img size: 114360 bytes
23,186,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,260,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,376,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,918,897 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,752,806 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,521,406 >>> mbox cmd response: failed
10,522,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,507 >>> mbox cmd response: failed
10,522,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,074 >>> mbox cmd response: failed
Initializing fuses
2,046,162 writing to cptra_bootfsm_go
13,098,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,298,983 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,735 UART: [kat] SHA2-256
881,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,781 UART: [kat] ++
885,933 UART: [kat] sha1
890,247 UART: [kat] SHA2-256
892,185 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
903,090 UART: [kat] HMAC-384Kdf
907,702 UART: [kat] LMS
1,475,898 UART: [kat] --
1,476,809 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,800 UART: [idev] Erasing UDS.KEYID = 0
1,505,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,098 UART: [idev] --
1,515,245 UART: [ldev] ++
1,515,413 UART: [ldev] CDI.KEYID = 6
1,515,776 UART: [ldev] SUBJECT.KEYID = 5
1,516,202 UART: [ldev] AUTHORITY.KEYID = 7
1,516,665 UART: [ldev] FE.KEYID = 1
1,521,985 UART: [ldev] Erasing FE.KEYID = 1
1,547,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,892 UART: [ldev] --
1,586,221 UART: [fwproc] Waiting for Commands...
1,586,846 UART: [fwproc] Received command 0x46574c44
1,587,637 UART: [fwproc] Received Image of size 114360 bytes
1,612,420 UART: ROM Fatal Error: 0x000B0008
1,613,577 >>> mbox cmd response: failed
1,613,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,583 >>> mbox cmd response: failed
1,613,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,779 UART: [kat] SHA2-256
881,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,825 UART: [kat] ++
885,977 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
895,114 UART: [kat] SHA2-512-ACC
897,015 UART: [kat] ECC-384
902,202 UART: [kat] HMAC-384Kdf
906,710 UART: [kat] LMS
1,474,906 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,329 UART: [fht] Storing FHT @ 0x50003400
1,479,174 UART: [idev] ++
1,479,342 UART: [idev] CDI.KEYID = 6
1,479,702 UART: [idev] SUBJECT.KEYID = 7
1,480,126 UART: [idev] UDS.KEYID = 0
1,480,471 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,082 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,457 UART: [ldev] ++
1,514,625 UART: [ldev] CDI.KEYID = 6
1,514,988 UART: [ldev] SUBJECT.KEYID = 5
1,515,414 UART: [ldev] AUTHORITY.KEYID = 7
1,515,877 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,546,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,830 UART: [ldev] --
1,586,285 UART: [fwproc] Waiting for Commands...
1,587,068 UART: [fwproc] Received command 0x46574c44
1,587,859 UART: [fwproc] Received Image of size 114360 bytes
2,884,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,524 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,465,632 >>> mbox cmd response: failed
1,465,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,638 >>> mbox cmd response: failed
1,465,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,698 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,058 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,614 UART: [kat] SHA2-256
882,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,660 UART: [kat] ++
886,812 UART: [kat] sha1
890,946 UART: [kat] SHA2-256
892,884 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,935 UART: [kat] HMAC-384Kdf
907,555 UART: [kat] LMS
1,475,751 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,479,955 UART: [idev] ++
1,480,123 UART: [idev] CDI.KEYID = 6
1,480,483 UART: [idev] SUBJECT.KEYID = 7
1,480,907 UART: [idev] UDS.KEYID = 0
1,481,252 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,477 UART: [idev] Erasing UDS.KEYID = 0
1,504,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,471 UART: [idev] --
1,514,476 UART: [ldev] ++
1,514,644 UART: [ldev] CDI.KEYID = 6
1,515,007 UART: [ldev] SUBJECT.KEYID = 5
1,515,433 UART: [ldev] AUTHORITY.KEYID = 7
1,515,896 UART: [ldev] FE.KEYID = 1
1,520,904 UART: [ldev] Erasing FE.KEYID = 1
1,546,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,945 UART: [ldev] --
1,586,398 UART: [fwproc] Waiting for Commands...
1,587,181 UART: [fwproc] Received command 0x46574c44
1,587,972 UART: [fwproc] Received Image of size 114360 bytes
1,613,483 UART: ROM Fatal Error: 0x000B0008
1,614,640 >>> mbox cmd response: failed
1,614,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,646 >>> mbox cmd response: failed
1,614,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,638 UART: [kat] SHA2-256
882,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,684 UART: [kat] ++
886,836 UART: [kat] sha1
891,094 UART: [kat] SHA2-256
893,032 UART: [kat] SHA2-384
895,787 UART: [kat] SHA2-512-ACC
897,688 UART: [kat] ECC-384
903,277 UART: [kat] HMAC-384Kdf
908,037 UART: [kat] LMS
1,476,233 UART: [kat] --
1,477,410 UART: [cold-reset] ++
1,477,900 UART: [fht] Storing FHT @ 0x50003400
1,480,643 UART: [idev] ++
1,480,811 UART: [idev] CDI.KEYID = 6
1,481,171 UART: [idev] SUBJECT.KEYID = 7
1,481,595 UART: [idev] UDS.KEYID = 0
1,481,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,257 UART: [idev] Erasing UDS.KEYID = 0
1,505,859 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,513 UART: [idev] --
1,515,542 UART: [ldev] ++
1,515,710 UART: [ldev] CDI.KEYID = 6
1,516,073 UART: [ldev] SUBJECT.KEYID = 5
1,516,499 UART: [ldev] AUTHORITY.KEYID = 7
1,516,962 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,427 UART: [ldev] --
1,586,922 UART: [fwproc] Waiting for Commands...
1,587,607 UART: [fwproc] Received command 0x46574c44
1,588,398 UART: [fwproc] Received Image of size 114360 bytes
2,885,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,028 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,466,769 >>> mbox cmd response: failed
1,466,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,775 >>> mbox cmd response: failed
1,466,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
893,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,429 UART: [kat] ++
897,581 UART: [kat] sha1
901,809 UART: [kat] SHA2-256
903,749 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
917,622 UART: [kat] HMAC-384Kdf
922,280 UART: [kat] LMS
1,170,608 UART: [kat] --
1,171,407 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,602 UART: [idev] ++
1,174,770 UART: [idev] CDI.KEYID = 6
1,175,130 UART: [idev] SUBJECT.KEYID = 7
1,175,554 UART: [idev] UDS.KEYID = 0
1,175,899 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,199 UART: [idev] --
1,210,265 UART: [ldev] ++
1,210,433 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,177 UART: [ldev] --
1,283,456 UART: [fwproc] Wait for Commands...
1,284,114 UART: [fwproc] Recv command 0x46574c44
1,284,842 UART: [fwproc] Recv'd Img size: 114360 bytes
1,310,029 UART: ROM Fatal Error: 0x000B0008
1,311,186 >>> mbox cmd response: failed
1,311,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,192 >>> mbox cmd response: failed
1,311,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,891 UART: [kat] SHA2-256
903,831 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
918,224 UART: [kat] HMAC-384Kdf
922,846 UART: [kat] LMS
1,171,174 UART: [kat] --
1,172,345 UART: [cold-reset] ++
1,172,883 UART: [fht] FHT @ 0x50003400
1,175,482 UART: [idev] ++
1,175,650 UART: [idev] CDI.KEYID = 6
1,176,010 UART: [idev] SUBJECT.KEYID = 7
1,176,434 UART: [idev] UDS.KEYID = 0
1,176,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,714 UART: [idev] Erasing UDS.KEYID = 0
1,201,497 UART: [idev] Sha1 KeyId Algorithm
1,210,145 UART: [idev] --
1,211,177 UART: [ldev] ++
1,211,345 UART: [ldev] CDI.KEYID = 6
1,211,708 UART: [ldev] SUBJECT.KEYID = 5
1,212,134 UART: [ldev] AUTHORITY.KEYID = 7
1,212,597 UART: [ldev] FE.KEYID = 1
1,217,689 UART: [ldev] Erasing FE.KEYID = 1
1,244,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,945 UART: [ldev] --
1,283,442 UART: [fwproc] Wait for Commands...
1,284,102 UART: [fwproc] Recv command 0x46574c44
1,284,830 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,417 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,575 >>> mbox cmd response: failed
1,163,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,581 >>> mbox cmd response: failed
1,163,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,191 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,068 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
906,939 UART: [kat] SHA2-512-ACC
908,840 UART: [kat] ECC-384
918,739 UART: [kat] HMAC-384Kdf
923,281 UART: [kat] LMS
1,171,609 UART: [kat] --
1,172,414 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,405 UART: [idev] ++
1,175,573 UART: [idev] CDI.KEYID = 6
1,175,933 UART: [idev] SUBJECT.KEYID = 7
1,176,357 UART: [idev] UDS.KEYID = 0
1,176,702 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,994 UART: [idev] Sha1 KeyId Algorithm
1,210,440 UART: [idev] --
1,211,476 UART: [ldev] ++
1,211,644 UART: [ldev] CDI.KEYID = 6
1,212,007 UART: [ldev] SUBJECT.KEYID = 5
1,212,433 UART: [ldev] AUTHORITY.KEYID = 7
1,212,896 UART: [ldev] FE.KEYID = 1
1,218,198 UART: [ldev] Erasing FE.KEYID = 1
1,244,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,470 UART: [ldev] --
1,283,829 UART: [fwproc] Wait for Commands...
1,284,635 UART: [fwproc] Recv command 0x46574c44
1,285,363 UART: [fwproc] Recv'd Img size: 114360 bytes
1,310,306 UART: ROM Fatal Error: 0x000B0008
1,311,463 >>> mbox cmd response: failed
1,311,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,469 >>> mbox cmd response: failed
1,311,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
893,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,214 UART: [kat] ++
897,366 UART: [kat] sha1
901,702 UART: [kat] SHA2-256
903,642 UART: [kat] SHA2-384
906,323 UART: [kat] SHA2-512-ACC
908,224 UART: [kat] ECC-384
918,365 UART: [kat] HMAC-384Kdf
922,959 UART: [kat] LMS
1,171,287 UART: [kat] --
1,172,430 UART: [cold-reset] ++
1,172,984 UART: [fht] FHT @ 0x50003400
1,175,795 UART: [idev] ++
1,175,963 UART: [idev] CDI.KEYID = 6
1,176,323 UART: [idev] SUBJECT.KEYID = 7
1,176,747 UART: [idev] UDS.KEYID = 0
1,177,092 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,655 UART: [idev] Erasing UDS.KEYID = 0
1,201,814 UART: [idev] Sha1 KeyId Algorithm
1,210,308 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,218,080 UART: [ldev] Erasing FE.KEYID = 1
1,244,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,260 UART: [ldev] --
1,283,551 UART: [fwproc] Wait for Commands...
1,284,303 UART: [fwproc] Recv command 0x46574c44
1,285,031 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,412 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,576 >>> mbox cmd response: failed
1,163,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,582 >>> mbox cmd response: failed
1,163,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,449 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,176 UART: [kat] SHA2-256
891,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,855 UART: [kat] ++
896,007 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
904,916 UART: [kat] SHA2-512-ACC
906,817 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,491 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,677 UART: [idev] ++
1,173,845 UART: [idev] CDI.KEYID = 6
1,174,206 UART: [idev] SUBJECT.KEYID = 7
1,174,631 UART: [idev] UDS.KEYID = 0
1,174,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,681 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,380 UART: [ldev] ++
1,209,548 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,339 UART: [ldev] AUTHORITY.KEYID = 7
1,210,802 UART: [ldev] FE.KEYID = 1
1,216,006 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,804 UART: [ldev] --
1,281,224 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46574c44
1,282,690 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,504 UART: ROM Fatal Error: 0x000B0008
1,308,661 >>> mbox cmd response: failed
1,308,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,667 >>> mbox cmd response: failed
1,308,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,173,047 UART: [idev] ++
1,173,215 UART: [idev] CDI.KEYID = 6
1,173,576 UART: [idev] SUBJECT.KEYID = 7
1,174,001 UART: [idev] UDS.KEYID = 0
1,174,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,215,722 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,144 UART: [ldev] --
1,280,662 UART: [fwproc] Wait for Commands...
1,281,403 UART: [fwproc] Recv command 0x46574c44
1,282,136 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,787 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,328 >>> mbox cmd response: failed
1,160,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,334 >>> mbox cmd response: failed
1,160,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,134 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,229 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,164 UART: [state] WD Timer not started. Device not locked for debugging
87,297 UART: [kat] SHA2-256
890,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,976 UART: [kat] ++
895,128 UART: [kat] sha1
899,244 UART: [kat] SHA2-256
901,184 UART: [kat] SHA2-384
903,851 UART: [kat] SHA2-512-ACC
905,752 UART: [kat] ECC-384
915,539 UART: [kat] HMAC-384Kdf
920,203 UART: [kat] LMS
1,168,515 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,662 UART: [idev] ++
1,172,830 UART: [idev] CDI.KEYID = 6
1,173,191 UART: [idev] SUBJECT.KEYID = 7
1,173,616 UART: [idev] UDS.KEYID = 0
1,173,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,272 UART: [idev] Erasing UDS.KEYID = 0
1,198,338 UART: [idev] Sha1 KeyId Algorithm
1,207,386 UART: [idev] --
1,208,399 UART: [ldev] ++
1,208,567 UART: [ldev] CDI.KEYID = 6
1,208,931 UART: [ldev] SUBJECT.KEYID = 5
1,209,358 UART: [ldev] AUTHORITY.KEYID = 7
1,209,821 UART: [ldev] FE.KEYID = 1
1,214,931 UART: [ldev] Erasing FE.KEYID = 1
1,241,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,107 UART: [ldev] --
1,280,449 UART: [fwproc] Wait for Commands...
1,281,250 UART: [fwproc] Recv command 0x46574c44
1,281,983 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,789 UART: ROM Fatal Error: 0x000B0008
1,307,946 >>> mbox cmd response: failed
1,307,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,952 >>> mbox cmd response: failed
1,307,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,222 UART: [kat] SHA2-256
902,162 UART: [kat] SHA2-384
905,087 UART: [kat] SHA2-512-ACC
906,988 UART: [kat] ECC-384
917,125 UART: [kat] HMAC-384Kdf
921,769 UART: [kat] LMS
1,170,081 UART: [kat] --
1,171,006 UART: [cold-reset] ++
1,171,344 UART: [fht] FHT @ 0x50003400
1,173,988 UART: [idev] ++
1,174,156 UART: [idev] CDI.KEYID = 6
1,174,517 UART: [idev] SUBJECT.KEYID = 7
1,174,942 UART: [idev] UDS.KEYID = 0
1,175,288 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,578 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,215,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,273 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,412 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,316 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,943 >>> mbox cmd response: failed
1,160,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,949 >>> mbox cmd response: failed
1,160,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,912 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,083 UART:
192,449 UART: Running Caliptra ROM ...
193,594 UART:
193,740 UART: [state] CFI Enabled
262,921 UART: [state] LifecycleState = Unprovisioned
264,905 UART: [state] DebugLocked = No
266,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,593 UART: [kat] SHA2-256
441,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,818 UART: [kat] ++
452,318 UART: [kat] sha1
463,362 UART: [kat] SHA2-256
466,059 UART: [kat] SHA2-384
470,859 UART: [kat] SHA2-512-ACC
473,196 UART: [kat] ECC-384
2,764,339 UART: [kat] HMAC-384Kdf
2,778,203 UART: [kat] LMS
3,968,534 UART: [kat] --
3,974,838 UART: [cold-reset] ++
3,975,856 UART: [fht] Storing FHT @ 0x50003400
3,986,963 UART: [idev] ++
3,987,537 UART: [idev] CDI.KEYID = 6
3,988,450 UART: [idev] SUBJECT.KEYID = 7
3,989,721 UART: [idev] UDS.KEYID = 0
3,992,751 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,435 UART: [idev] Erasing UDS.KEYID = 0
7,322,859 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,719 UART: [idev] --
7,349,287 UART: [ldev] ++
7,349,911 UART: [ldev] CDI.KEYID = 6
7,350,797 UART: [ldev] SUBJECT.KEYID = 5
7,352,062 UART: [ldev] AUTHORITY.KEYID = 7
7,353,299 UART: [ldev] FE.KEYID = 1
7,399,981 UART: [ldev] Erasing FE.KEYID = 1
10,734,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,122 UART: [ldev] --
13,115,847 UART: [fwproc] Waiting for Commands...
13,118,643 UART: [fwproc] Received command 0x46574c44
13,120,849 UART: [fwproc] Received Image of size 114036 bytes
13,195,059 UART: ROM Fatal Error: 0x000B0009
13,198,583 >>> mbox cmd response: failed
13,198,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,313 >>> mbox cmd response: failed
13,199,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,871 >>> mbox cmd response: failed
Initializing fuses
2,052,714 writing to cptra_bootfsm_go
2,242,135 UART:
2,242,489 UART: Running Caliptra ROM ...
2,243,626 UART:
2,243,800 UART: [state] CFI Enabled
2,317,580 UART: [state] LifecycleState = Unprovisioned
2,319,520 UART: [state] DebugLocked = No
2,321,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,257 UART: [kat] SHA2-256
2,495,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,461 UART: [kat] ++
2,507,111 UART: [kat] sha1
2,519,038 UART: [kat] SHA2-256
2,521,738 UART: [kat] SHA2-384
2,527,402 UART: [kat] SHA2-512-ACC
2,529,760 UART: [kat] ECC-384
4,818,821 UART: [kat] HMAC-384Kdf
4,830,455 UART: [kat] LMS
6,020,748 UART: [kat] --
6,025,893 UART: [cold-reset] ++
6,027,782 UART: [fht] Storing FHT @ 0x50003400
6,038,746 UART: [idev] ++
6,039,312 UART: [idev] CDI.KEYID = 6
6,040,250 UART: [idev] SUBJECT.KEYID = 7
6,041,521 UART: [idev] UDS.KEYID = 0
6,044,079 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,187,578 UART: [idev] Erasing UDS.KEYID = 0
9,376,028 UART: [idev] Using Sha1 for KeyId Algorithm
9,398,190 UART: [idev] --
9,401,576 UART: [ldev] ++
9,402,157 UART: [ldev] CDI.KEYID = 6
9,403,177 UART: [ldev] SUBJECT.KEYID = 5
9,404,396 UART: [ldev] AUTHORITY.KEYID = 7
9,405,584 UART: [ldev] FE.KEYID = 1
9,452,423 UART: [ldev] Erasing FE.KEYID = 1
12,784,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,078,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,093,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,107,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,122,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,140,539 UART: [ldev] --
15,146,174 UART: [fwproc] Waiting for Commands...
15,148,708 UART: [fwproc] Received command 0x46574c44
15,150,900 UART: [fwproc] Received Image of size 114036 bytes
19,197,972 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,282,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,351,534 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,668,721 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,807,721 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,932,549 >>> mbox cmd response: failed
12,933,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,933,535 >>> mbox cmd response: failed
12,933,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,097 >>> mbox cmd response: failed
Initializing fuses
2,052,453 writing to cptra_bootfsm_go
5,846,382 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,914,541 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,596 UART:
192,952 UART: Running Caliptra ROM ...
194,133 UART:
603,994 UART: [state] CFI Enabled
619,190 UART: [state] LifecycleState = Unprovisioned
621,145 UART: [state] DebugLocked = No
622,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,401 UART: [kat] SHA2-256
797,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,711 UART: [kat] ++
808,165 UART: [kat] sha1
818,716 UART: [kat] SHA2-256
821,399 UART: [kat] SHA2-384
827,809 UART: [kat] SHA2-512-ACC
830,198 UART: [kat] ECC-384
3,112,616 UART: [kat] HMAC-384Kdf
3,125,662 UART: [kat] LMS
4,315,743 UART: [kat] --
4,318,208 UART: [cold-reset] ++
4,320,087 UART: [fht] Storing FHT @ 0x50003400
4,332,295 UART: [idev] ++
4,332,884 UART: [idev] CDI.KEYID = 6
4,333,905 UART: [idev] SUBJECT.KEYID = 7
4,335,064 UART: [idev] UDS.KEYID = 0
4,338,131 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,481,587 UART: [idev] Erasing UDS.KEYID = 0
7,622,367 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,917 UART: [idev] --
7,646,941 UART: [ldev] ++
7,647,515 UART: [ldev] CDI.KEYID = 6
7,648,484 UART: [ldev] SUBJECT.KEYID = 5
7,649,700 UART: [ldev] AUTHORITY.KEYID = 7
7,650,934 UART: [ldev] FE.KEYID = 1
7,661,205 UART: [ldev] Erasing FE.KEYID = 1
10,945,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,368 UART: [ldev] --
13,305,985 UART: [fwproc] Waiting for Commands...
13,308,245 UART: [fwproc] Received command 0x46574c44
13,310,489 UART: [fwproc] Received Image of size 114036 bytes
13,381,181 UART: ROM Fatal Error: 0x000B0009
13,384,696 >>> mbox cmd response: failed
13,385,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,451 >>> mbox cmd response: failed
13,385,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,386,013 >>> mbox cmd response: failed
Initializing fuses
2,048,741 writing to cptra_bootfsm_go
2,238,040 UART:
2,238,403 UART: Running Caliptra ROM ...
2,239,542 UART:
7,069,622 UART: [state] CFI Enabled
7,083,832 UART: [state] LifecycleState = Unprovisioned
7,085,757 UART: [state] DebugLocked = No
7,087,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,091,638 UART: [kat] SHA2-256
7,261,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,271,881 UART: [kat] ++
7,272,340 UART: [kat] sha1
7,282,579 UART: [kat] SHA2-256
7,285,324 UART: [kat] SHA2-384
7,290,555 UART: [kat] SHA2-512-ACC
7,292,911 UART: [kat] ECC-384
9,577,035 UART: [kat] HMAC-384Kdf
9,589,214 UART: [kat] LMS
10,779,327 UART: [kat] --
10,782,743 UART: [cold-reset] ++
10,785,220 UART: [fht] Storing FHT @ 0x50003400
10,797,516 UART: [idev] ++
10,798,090 UART: [idev] CDI.KEYID = 6
10,799,113 UART: [idev] SUBJECT.KEYID = 7
10,800,270 UART: [idev] UDS.KEYID = 0
10,802,984 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,946,335 UART: [idev] Erasing UDS.KEYID = 0
14,088,785 UART: [idev] Using Sha1 for KeyId Algorithm
14,110,872 UART: [idev] --
14,114,217 UART: [ldev] ++
14,114,786 UART: [ldev] CDI.KEYID = 6
14,115,798 UART: [ldev] SUBJECT.KEYID = 5
14,117,006 UART: [ldev] AUTHORITY.KEYID = 7
14,118,191 UART: [ldev] FE.KEYID = 1
14,129,866 UART: [ldev] Erasing FE.KEYID = 1
17,414,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,707,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,721,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,736,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,750,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,770,592 UART: [ldev] --
19,776,024 UART: [fwproc] Waiting for Commands...
19,778,452 UART: [fwproc] Received command 0x46574c44
19,780,694 UART: [fwproc] Received Image of size 114036 bytes
23,832,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,911,532 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,980,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,297,326 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,128,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,126,337 >>> mbox cmd response: failed
13,127,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,433 >>> mbox cmd response: failed
13,127,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,023 >>> mbox cmd response: failed
Initializing fuses
2,051,973 writing to cptra_bootfsm_go
10,867,469 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,819,669 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,302 UART:
192,664 UART: Running Caliptra ROM ...
193,840 UART:
194,015 UART: [state] CFI Enabled
260,831 UART: [state] LifecycleState = Unprovisioned
262,709 UART: [state] DebugLocked = No
264,310 UART: [state] WD Timer not started. Device not locked for debugging
267,753 UART: [kat] SHA2-256
446,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,467 UART: [kat] ++
458,997 UART: [kat] sha1
470,706 UART: [kat] SHA2-256
473,698 UART: [kat] SHA2-384
480,385 UART: [kat] SHA2-512-ACC
483,329 UART: [kat] ECC-384
2,943,831 UART: [kat] HMAC-384Kdf
2,969,342 UART: [kat] LMS
3,498,796 UART: [kat] --
3,502,099 UART: [cold-reset] ++
3,503,398 UART: [fht] FHT @ 0x50003400
3,515,040 UART: [idev] ++
3,515,612 UART: [idev] CDI.KEYID = 6
3,516,530 UART: [idev] SUBJECT.KEYID = 7
3,517,744 UART: [idev] UDS.KEYID = 0
3,520,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,777 UART: [idev] Erasing UDS.KEYID = 0
6,024,676 UART: [idev] Sha1 KeyId Algorithm
6,046,888 UART: [idev] --
6,051,699 UART: [ldev] ++
6,052,274 UART: [ldev] CDI.KEYID = 6
6,053,158 UART: [ldev] SUBJECT.KEYID = 5
6,054,375 UART: [ldev] AUTHORITY.KEYID = 7
6,055,613 UART: [ldev] FE.KEYID = 1
6,099,582 UART: [ldev] Erasing FE.KEYID = 1
8,605,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,456 UART: [ldev] --
10,413,395 UART: [fwproc] Wait for Commands...
10,416,196 UART: [fwproc] Recv command 0x46574c44
10,418,295 UART: [fwproc] Recv'd Img size: 114360 bytes
10,490,532 UART: ROM Fatal Error: 0x000B0009
10,493,627 >>> mbox cmd response: failed
10,494,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,494,395 >>> mbox cmd response: failed
10,494,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,494,997 >>> mbox cmd response: failed
Initializing fuses
2,047,238 writing to cptra_bootfsm_go
2,236,539 UART:
2,236,878 UART: Running Caliptra ROM ...
2,238,010 UART:
2,238,188 UART: [state] CFI Enabled
2,311,118 UART: [state] LifecycleState = Unprovisioned
2,312,994 UART: [state] DebugLocked = No
2,315,627 UART: [state] WD Timer not started. Device not locked for debugging
2,319,269 UART: [kat] SHA2-256
2,498,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,975 UART: [kat] ++
2,510,522 UART: [kat] sha1
2,520,065 UART: [kat] SHA2-256
2,523,083 UART: [kat] SHA2-384
2,527,744 UART: [kat] SHA2-512-ACC
2,530,744 UART: [kat] ECC-384
4,975,054 UART: [kat] HMAC-384Kdf
4,997,232 UART: [kat] LMS
5,526,673 UART: [kat] --
5,531,766 UART: [cold-reset] ++
5,532,673 UART: [fht] FHT @ 0x50003400
5,543,655 UART: [idev] ++
5,544,225 UART: [idev] CDI.KEYID = 6
5,545,305 UART: [idev] SUBJECT.KEYID = 7
5,546,413 UART: [idev] UDS.KEYID = 0
5,548,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,692,935 UART: [idev] Erasing UDS.KEYID = 0
8,056,132 UART: [idev] Sha1 KeyId Algorithm
8,078,772 UART: [idev] --
8,082,234 UART: [ldev] ++
8,082,826 UART: [ldev] CDI.KEYID = 6
8,083,742 UART: [ldev] SUBJECT.KEYID = 5
8,084,907 UART: [ldev] AUTHORITY.KEYID = 7
8,086,141 UART: [ldev] FE.KEYID = 1
8,126,821 UART: [ldev] Erasing FE.KEYID = 1
10,629,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,369,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,385,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,401,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,416,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,553 UART: [ldev] --
12,441,495 UART: [fwproc] Wait for Commands...
12,443,537 UART: [fwproc] Recv command 0x46574c44
12,445,841 UART: [fwproc] Recv'd Img size: 114360 bytes
15,843,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,920,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,988,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,306,772 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,142 UART:
192,509 UART: Running Caliptra ROM ...
193,699 UART:
193,855 UART: [state] CFI Enabled
263,676 UART: [state] LifecycleState = Unprovisioned
266,081 UART: [state] DebugLocked = No
268,803 UART: [state] WD Timer not started. Device not locked for debugging
273,281 UART: [kat] SHA2-256
463,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,912 UART: [kat] ++
474,363 UART: [kat] sha1
487,081 UART: [kat] SHA2-256
490,090 UART: [kat] SHA2-384
495,210 UART: [kat] SHA2-512-ACC
497,805 UART: [kat] ECC-384
2,947,916 UART: [kat] HMAC-384Kdf
2,970,950 UART: [kat] LMS
3,502,720 UART: [kat] --
3,508,253 UART: [cold-reset] ++
3,509,219 UART: [fht] FHT @ 0x50003400
3,520,577 UART: [idev] ++
3,521,260 UART: [idev] CDI.KEYID = 6
3,522,250 UART: [idev] SUBJECT.KEYID = 7
3,523,410 UART: [idev] UDS.KEYID = 0
3,526,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,036 UART: [idev] Erasing UDS.KEYID = 0
6,029,806 UART: [idev] Sha1 KeyId Algorithm
6,051,454 UART: [idev] --
6,057,454 UART: [ldev] ++
6,058,142 UART: [ldev] CDI.KEYID = 6
6,059,029 UART: [ldev] SUBJECT.KEYID = 5
6,060,191 UART: [ldev] AUTHORITY.KEYID = 7
6,061,426 UART: [ldev] FE.KEYID = 1
6,100,052 UART: [ldev] Erasing FE.KEYID = 1
8,604,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,105 UART: [ldev] --
10,413,051 UART: [fwproc] Wait for Commands...
10,416,341 UART: [fwproc] Recv command 0x46574c44
10,418,330 UART: [fwproc] Recv'd Img size: 114360 bytes
10,518,304 UART: ROM Fatal Error: 0x000B0009
10,521,989 >>> mbox cmd response: failed
10,522,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,673 >>> mbox cmd response: failed
10,522,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,241 >>> mbox cmd response: failed
Initializing fuses
2,053,889 writing to cptra_bootfsm_go
2,243,213 UART:
2,243,566 UART: Running Caliptra ROM ...
2,244,610 UART:
2,244,760 UART: [state] CFI Enabled
2,304,614 UART: [state] LifecycleState = Unprovisioned
2,307,003 UART: [state] DebugLocked = No
2,308,479 UART: [state] WD Timer not started. Device not locked for debugging
2,313,808 UART: [kat] SHA2-256
2,503,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,514,463 UART: [kat] ++
2,514,949 UART: [kat] sha1
2,525,351 UART: [kat] SHA2-256
2,528,373 UART: [kat] SHA2-384
2,534,528 UART: [kat] SHA2-512-ACC
2,537,146 UART: [kat] ECC-384
4,990,531 UART: [kat] HMAC-384Kdf
5,013,020 UART: [kat] LMS
5,544,782 UART: [kat] --
5,550,612 UART: [cold-reset] ++
5,552,602 UART: [fht] FHT @ 0x50003400
5,563,802 UART: [idev] ++
5,564,475 UART: [idev] CDI.KEYID = 6
5,565,411 UART: [idev] SUBJECT.KEYID = 7
5,566,678 UART: [idev] UDS.KEYID = 0
5,569,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,713,925 UART: [idev] Erasing UDS.KEYID = 0
8,093,484 UART: [idev] Sha1 KeyId Algorithm
8,114,884 UART: [idev] --
8,120,554 UART: [ldev] ++
8,121,234 UART: [ldev] CDI.KEYID = 6
8,122,169 UART: [ldev] SUBJECT.KEYID = 5
8,123,326 UART: [ldev] AUTHORITY.KEYID = 7
8,124,579 UART: [ldev] FE.KEYID = 1
8,161,565 UART: [ldev] Erasing FE.KEYID = 1
10,671,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,095 UART: [ldev] --
12,477,489 UART: [fwproc] Wait for Commands...
12,479,212 UART: [fwproc] Recv command 0x46574c44
12,481,473 UART: [fwproc] Recv'd Img size: 114360 bytes
15,927,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,004,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,120,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,662,403 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,440,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,324,359 >>> mbox cmd response: failed
10,325,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,424 >>> mbox cmd response: failed
10,325,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,326,058 >>> mbox cmd response: failed
Initializing fuses
2,052,468 writing to cptra_bootfsm_go
5,487,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,759,004 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,437 UART:
192,779 UART: Running Caliptra ROM ...
193,975 UART:
603,534 UART: [state] CFI Enabled
616,665 UART: [state] LifecycleState = Unprovisioned
619,030 UART: [state] DebugLocked = No
621,336 UART: [state] WD Timer not started. Device not locked for debugging
626,569 UART: [kat] SHA2-256
816,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,215 UART: [kat] ++
827,802 UART: [kat] sha1
839,225 UART: [kat] SHA2-256
842,231 UART: [kat] SHA2-384
848,967 UART: [kat] SHA2-512-ACC
851,575 UART: [kat] ECC-384
3,292,926 UART: [kat] HMAC-384Kdf
3,305,318 UART: [kat] LMS
3,837,156 UART: [kat] --
3,840,404 UART: [cold-reset] ++
3,841,640 UART: [fht] FHT @ 0x50003400
3,854,138 UART: [idev] ++
3,854,814 UART: [idev] CDI.KEYID = 6
3,855,793 UART: [idev] SUBJECT.KEYID = 7
3,857,007 UART: [idev] UDS.KEYID = 0
3,859,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,003,459 UART: [idev] Erasing UDS.KEYID = 0
6,338,050 UART: [idev] Sha1 KeyId Algorithm
6,360,266 UART: [idev] --
6,363,724 UART: [ldev] ++
6,364,406 UART: [ldev] CDI.KEYID = 6
6,365,373 UART: [ldev] SUBJECT.KEYID = 5
6,366,532 UART: [ldev] AUTHORITY.KEYID = 7
6,367,763 UART: [ldev] FE.KEYID = 1
6,376,463 UART: [ldev] Erasing FE.KEYID = 1
8,854,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,932 UART: [ldev] --
10,645,233 UART: [fwproc] Wait for Commands...
10,647,441 UART: [fwproc] Recv command 0x46574c44
10,649,759 UART: [fwproc] Recv'd Img size: 114360 bytes
10,748,359 UART: ROM Fatal Error: 0x000B0009
10,752,035 >>> mbox cmd response: failed
10,752,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,752,759 >>> mbox cmd response: failed
10,753,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,753,336 >>> mbox cmd response: failed
Initializing fuses
2,055,599 writing to cptra_bootfsm_go
2,244,988 UART:
2,245,338 UART: Running Caliptra ROM ...
2,246,499 UART:
9,694,638 UART: [state] CFI Enabled
9,707,351 UART: [state] LifecycleState = Unprovisioned
9,709,753 UART: [state] DebugLocked = No
9,711,428 UART: [state] WD Timer not started. Device not locked for debugging
9,716,695 UART: [kat] SHA2-256
9,906,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,917,358 UART: [kat] ++
9,917,954 UART: [kat] sha1
9,929,009 UART: [kat] SHA2-256
9,932,038 UART: [kat] SHA2-384
9,937,707 UART: [kat] SHA2-512-ACC
9,940,329 UART: [kat] ECC-384
12,383,168 UART: [kat] HMAC-384Kdf
12,397,391 UART: [kat] LMS
12,929,223 UART: [kat] --
12,933,681 UART: [cold-reset] ++
12,935,458 UART: [fht] FHT @ 0x50003400
12,946,001 UART: [idev] ++
12,946,690 UART: [idev] CDI.KEYID = 6
12,947,627 UART: [idev] SUBJECT.KEYID = 7
12,948,837 UART: [idev] UDS.KEYID = 0
12,951,407 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,095,172 UART: [idev] Erasing UDS.KEYID = 0
15,427,557 UART: [idev] Sha1 KeyId Algorithm
15,449,334 UART: [idev] --
15,453,654 UART: [ldev] ++
15,454,338 UART: [ldev] CDI.KEYID = 6
15,455,247 UART: [ldev] SUBJECT.KEYID = 5
15,456,464 UART: [ldev] AUTHORITY.KEYID = 7
15,457,640 UART: [ldev] FE.KEYID = 1
15,468,290 UART: [ldev] Erasing FE.KEYID = 1
17,947,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,665,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,680,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,695,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,710,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,730,488 UART: [ldev] --
19,735,215 UART: [fwproc] Wait for Commands...
19,737,633 UART: [fwproc] Recv command 0x46574c44
19,739,892 UART: [fwproc] Recv'd Img size: 114360 bytes
23,194,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,272,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,388,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,931,123 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,757,828 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,536,867 >>> mbox cmd response: failed
10,537,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,537,937 >>> mbox cmd response: failed
10,538,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,538,493 >>> mbox cmd response: failed
Initializing fuses
2,052,424 writing to cptra_bootfsm_go
13,088,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,279,723 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,632 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,747 UART: [cold-reset] ++
1,477,109 UART: [fht] Storing FHT @ 0x50003400
1,479,800 UART: [idev] ++
1,479,968 UART: [idev] CDI.KEYID = 6
1,480,328 UART: [idev] SUBJECT.KEYID = 7
1,480,752 UART: [idev] UDS.KEYID = 0
1,481,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,772 UART: [idev] Erasing UDS.KEYID = 0
1,505,502 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,988 UART: [idev] --
1,515,207 UART: [ldev] ++
1,515,375 UART: [ldev] CDI.KEYID = 6
1,515,738 UART: [ldev] SUBJECT.KEYID = 5
1,516,164 UART: [ldev] AUTHORITY.KEYID = 7
1,516,627 UART: [ldev] FE.KEYID = 1
1,521,633 UART: [ldev] Erasing FE.KEYID = 1
1,546,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,828 UART: [ldev] --
1,586,181 UART: [fwproc] Waiting for Commands...
1,586,876 UART: [fwproc] Received command 0x46574c44
1,587,667 UART: [fwproc] Received Image of size 114360 bytes
1,613,009 UART: ROM Fatal Error: 0x000B0009
1,614,166 >>> mbox cmd response: failed
1,614,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,172 >>> mbox cmd response: failed
1,614,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,459 UART: [kat] SHA2-256
882,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,505 UART: [kat] ++
886,657 UART: [kat] sha1
890,887 UART: [kat] SHA2-256
892,825 UART: [kat] SHA2-384
895,652 UART: [kat] SHA2-512-ACC
897,553 UART: [kat] ECC-384
903,250 UART: [kat] HMAC-384Kdf
907,904 UART: [kat] LMS
1,476,100 UART: [kat] --
1,476,961 UART: [cold-reset] ++
1,477,299 UART: [fht] Storing FHT @ 0x50003400
1,480,256 UART: [idev] ++
1,480,424 UART: [idev] CDI.KEYID = 6
1,480,784 UART: [idev] SUBJECT.KEYID = 7
1,481,208 UART: [idev] UDS.KEYID = 0
1,481,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,304 UART: [idev] Erasing UDS.KEYID = 0
1,505,336 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,930 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,547,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,014 UART: [ldev] --
1,586,461 UART: [fwproc] Waiting for Commands...
1,587,094 UART: [fwproc] Received command 0x46574c44
1,587,885 UART: [fwproc] Received Image of size 114360 bytes
2,884,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,317 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,496 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,466,251 >>> mbox cmd response: failed
1,466,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,257 >>> mbox cmd response: failed
1,466,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,555 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,670 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,546 UART: [kat] SHA2-256
892,484 UART: [kat] SHA2-384
895,089 UART: [kat] SHA2-512-ACC
896,990 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,861 UART: [kat] LMS
1,476,057 UART: [kat] --
1,476,828 UART: [cold-reset] ++
1,477,294 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,979 UART: [idev] Erasing UDS.KEYID = 0
1,505,383 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,803 UART: [idev] --
1,514,910 UART: [ldev] ++
1,515,078 UART: [ldev] CDI.KEYID = 6
1,515,441 UART: [ldev] SUBJECT.KEYID = 5
1,515,867 UART: [ldev] AUTHORITY.KEYID = 7
1,516,330 UART: [ldev] FE.KEYID = 1
1,521,870 UART: [ldev] Erasing FE.KEYID = 1
1,546,959 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,907 UART: [ldev] --
1,586,350 UART: [fwproc] Waiting for Commands...
1,587,065 UART: [fwproc] Received command 0x46574c44
1,587,856 UART: [fwproc] Received Image of size 114360 bytes
1,612,936 UART: ROM Fatal Error: 0x000B0009
1,614,093 >>> mbox cmd response: failed
1,614,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,099 >>> mbox cmd response: failed
1,614,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,524 UART: [kat] SHA2-256
892,462 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,462 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,599 UART: [idev] ++
1,479,767 UART: [idev] CDI.KEYID = 6
1,480,127 UART: [idev] SUBJECT.KEYID = 7
1,480,551 UART: [idev] UDS.KEYID = 0
1,480,896 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,391 UART: [idev] Erasing UDS.KEYID = 0
1,505,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,889 UART: [idev] --
1,514,868 UART: [ldev] ++
1,515,036 UART: [ldev] CDI.KEYID = 6
1,515,399 UART: [ldev] SUBJECT.KEYID = 5
1,515,825 UART: [ldev] AUTHORITY.KEYID = 7
1,516,288 UART: [ldev] FE.KEYID = 1
1,521,430 UART: [ldev] Erasing FE.KEYID = 1
1,546,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,163 UART: [ldev] --
1,585,632 UART: [fwproc] Waiting for Commands...
1,586,441 UART: [fwproc] Received command 0x46574c44
1,587,232 UART: [fwproc] Received Image of size 114360 bytes
2,884,178 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,216 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,568 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,467 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,467,508 >>> mbox cmd response: failed
1,467,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,514 >>> mbox cmd response: failed
1,467,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,309 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,660 UART: [state] LifecycleState = Unprovisioned
85,315 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,244 UART: [kat] SHA2-256
892,894 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,019 UART: [kat] ++
897,171 UART: [kat] sha1
901,427 UART: [kat] SHA2-256
903,367 UART: [kat] SHA2-384
905,956 UART: [kat] SHA2-512-ACC
907,857 UART: [kat] ECC-384
917,634 UART: [kat] HMAC-384Kdf
922,122 UART: [kat] LMS
1,170,450 UART: [kat] --
1,171,039 UART: [cold-reset] ++
1,171,541 UART: [fht] FHT @ 0x50003400
1,174,170 UART: [idev] ++
1,174,338 UART: [idev] CDI.KEYID = 6
1,174,698 UART: [idev] SUBJECT.KEYID = 7
1,175,122 UART: [idev] UDS.KEYID = 0
1,175,467 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,208,995 UART: [ldev] ++
1,209,163 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,241,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,279 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,002 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,878 UART: ROM Fatal Error: 0x000B0009
1,308,035 >>> mbox cmd response: failed
1,308,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,041 >>> mbox cmd response: failed
1,308,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,683 UART: [kat] SHA2-256
903,623 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,886 UART: [idev] ++
1,175,054 UART: [idev] CDI.KEYID = 6
1,175,414 UART: [idev] SUBJECT.KEYID = 7
1,175,838 UART: [idev] UDS.KEYID = 0
1,176,183 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,098 UART: [idev] Erasing UDS.KEYID = 0
1,201,215 UART: [idev] Sha1 KeyId Algorithm
1,209,755 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,216,985 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,105 UART: [ldev] --
1,282,432 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,952 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,330 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,495 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,857 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,658 >>> mbox cmd response: failed
1,163,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,664 >>> mbox cmd response: failed
1,163,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,744 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,915 UART: [kat] HMAC-384Kdf
923,737 UART: [kat] LMS
1,172,065 UART: [kat] --
1,173,052 UART: [cold-reset] ++
1,173,434 UART: [fht] FHT @ 0x50003400
1,175,947 UART: [idev] ++
1,176,115 UART: [idev] CDI.KEYID = 6
1,176,475 UART: [idev] SUBJECT.KEYID = 7
1,176,899 UART: [idev] UDS.KEYID = 0
1,177,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,837 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,160 UART: [idev] --
1,211,454 UART: [ldev] ++
1,211,622 UART: [ldev] CDI.KEYID = 6
1,211,985 UART: [ldev] SUBJECT.KEYID = 5
1,212,411 UART: [ldev] AUTHORITY.KEYID = 7
1,212,874 UART: [ldev] FE.KEYID = 1
1,218,228 UART: [ldev] Erasing FE.KEYID = 1
1,244,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,864 UART: [ldev] --
1,284,273 UART: [fwproc] Wait for Commands...
1,285,047 UART: [fwproc] Recv command 0x46574c44
1,285,775 UART: [fwproc] Recv'd Img size: 114360 bytes
1,310,933 UART: ROM Fatal Error: 0x000B0009
1,312,090 >>> mbox cmd response: failed
1,312,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,096 >>> mbox cmd response: failed
1,312,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,407 UART: [kat] SHA2-512-ACC
908,308 UART: [kat] ECC-384
917,819 UART: [kat] HMAC-384Kdf
922,337 UART: [kat] LMS
1,170,665 UART: [kat] --
1,171,576 UART: [cold-reset] ++
1,171,912 UART: [fht] FHT @ 0x50003400
1,174,679 UART: [idev] ++
1,174,847 UART: [idev] CDI.KEYID = 6
1,175,207 UART: [idev] SUBJECT.KEYID = 7
1,175,631 UART: [idev] UDS.KEYID = 0
1,175,976 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,226 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,650 UART: [ldev] ++
1,210,818 UART: [ldev] CDI.KEYID = 6
1,211,181 UART: [ldev] SUBJECT.KEYID = 5
1,211,607 UART: [ldev] AUTHORITY.KEYID = 7
1,212,070 UART: [ldev] FE.KEYID = 1
1,217,352 UART: [ldev] Erasing FE.KEYID = 1
1,243,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,802 UART: [ldev] --
1,283,281 UART: [fwproc] Wait for Commands...
1,283,953 UART: [fwproc] Recv command 0x46574c44
1,284,681 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,956 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,218 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,167,633 >>> mbox cmd response: failed
1,167,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,639 >>> mbox cmd response: failed
1,167,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,832 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,905 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
890,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,877 UART: [kat] ++
895,029 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,650 UART: [kat] LMS
1,168,962 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,174,043 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,628 UART: [ldev] ++
1,208,796 UART: [ldev] CDI.KEYID = 6
1,209,160 UART: [ldev] SUBJECT.KEYID = 5
1,209,587 UART: [ldev] AUTHORITY.KEYID = 7
1,210,050 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,136 UART: [ldev] --
1,280,536 UART: [fwproc] Wait for Commands...
1,281,205 UART: [fwproc] Recv command 0x46574c44
1,281,938 UART: [fwproc] Recv'd Img size: 114360 bytes
1,306,544 UART: ROM Fatal Error: 0x000B0009
1,307,701 >>> mbox cmd response: failed
1,307,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,707 >>> mbox cmd response: failed
1,307,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,174,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,622 UART: [ldev] ++
1,208,790 UART: [ldev] CDI.KEYID = 6
1,209,154 UART: [ldev] SUBJECT.KEYID = 5
1,209,581 UART: [ldev] AUTHORITY.KEYID = 7
1,210,044 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,488 UART: [ldev] --
1,280,786 UART: [fwproc] Wait for Commands...
1,281,435 UART: [fwproc] Recv command 0x46574c44
1,282,168 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,933 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,160,732 >>> mbox cmd response: failed
1,160,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,738 >>> mbox cmd response: failed
1,160,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,841 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,057 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,324 UART: [idev] ++
1,173,492 UART: [idev] CDI.KEYID = 6
1,173,853 UART: [idev] SUBJECT.KEYID = 7
1,174,278 UART: [idev] UDS.KEYID = 0
1,174,624 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,776 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,223 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,147 UART: ROM Fatal Error: 0x000B0009
1,310,304 >>> mbox cmd response: failed
1,310,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,310 >>> mbox cmd response: failed
1,310,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,850 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,667 UART: [ldev] ++
1,208,835 UART: [ldev] CDI.KEYID = 6
1,209,199 UART: [ldev] SUBJECT.KEYID = 5
1,209,626 UART: [ldev] AUTHORITY.KEYID = 7
1,210,089 UART: [ldev] FE.KEYID = 1
1,215,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,019 UART: [ldev] --
1,282,307 UART: [fwproc] Wait for Commands...
1,282,894 UART: [fwproc] Recv command 0x46574c44
1,283,627 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,072 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,209 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,163,847 >>> mbox cmd response: failed
1,163,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,853 >>> mbox cmd response: failed
1,163,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,287 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,014 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,053 UART:
192,422 UART: Running Caliptra ROM ...
193,564 UART:
193,711 UART: [state] CFI Enabled
261,797 UART: [state] LifecycleState = Unprovisioned
263,724 UART: [state] DebugLocked = No
265,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,183 UART: [kat] SHA2-256
440,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,406 UART: [kat] ++
451,938 UART: [kat] sha1
462,940 UART: [kat] SHA2-256
465,628 UART: [kat] SHA2-384
472,208 UART: [kat] SHA2-512-ACC
474,602 UART: [kat] ECC-384
2,766,513 UART: [kat] HMAC-384Kdf
2,778,169 UART: [kat] LMS
3,968,451 UART: [kat] --
3,973,326 UART: [cold-reset] ++
3,974,238 UART: [fht] Storing FHT @ 0x50003400
3,984,314 UART: [idev] ++
3,984,934 UART: [idev] CDI.KEYID = 6
3,985,843 UART: [idev] SUBJECT.KEYID = 7
3,987,091 UART: [idev] UDS.KEYID = 0
3,989,869 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,133,494 UART: [idev] Erasing UDS.KEYID = 0
7,328,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,115 UART: [idev] --
7,355,553 UART: [ldev] ++
7,356,128 UART: [ldev] CDI.KEYID = 6
7,357,096 UART: [ldev] SUBJECT.KEYID = 5
7,358,260 UART: [ldev] AUTHORITY.KEYID = 7
7,359,570 UART: [ldev] FE.KEYID = 1
7,406,953 UART: [ldev] Erasing FE.KEYID = 1
10,738,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,276 UART: [ldev] --
13,101,005 UART: [fwproc] Waiting for Commands...
13,103,111 UART: [fwproc] Received command 0x46574c44
13,105,301 UART: [fwproc] Received Image of size 114036 bytes
14,497,597 UART: ROM Fatal Error: 0x000B000C
14,501,040 >>> mbox cmd response: failed
14,501,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,501,773 >>> mbox cmd response: failed
14,502,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,502,365 >>> mbox cmd response: failed
Initializing fuses
2,056,802 writing to cptra_bootfsm_go
2,246,176 UART:
2,246,535 UART: Running Caliptra ROM ...
2,247,674 UART:
2,247,844 UART: [state] CFI Enabled
2,319,795 UART: [state] LifecycleState = Unprovisioned
2,321,909 UART: [state] DebugLocked = No
2,324,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,353 UART: [kat] SHA2-256
2,499,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,551 UART: [kat] ++
2,510,065 UART: [kat] sha1
2,521,938 UART: [kat] SHA2-256
2,524,632 UART: [kat] SHA2-384
2,530,080 UART: [kat] SHA2-512-ACC
2,532,443 UART: [kat] ECC-384
4,823,524 UART: [kat] HMAC-384Kdf
4,856,164 UART: [kat] LMS
6,046,498 UART: [kat] --
6,050,130 UART: [cold-reset] ++
6,051,753 UART: [fht] Storing FHT @ 0x50003400
6,063,504 UART: [idev] ++
6,064,129 UART: [idev] CDI.KEYID = 6
6,065,041 UART: [idev] SUBJECT.KEYID = 7
6,066,263 UART: [idev] UDS.KEYID = 0
6,068,852 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,212,418 UART: [idev] Erasing UDS.KEYID = 0
9,398,260 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,232 UART: [idev] --
9,425,681 UART: [ldev] ++
9,426,311 UART: [ldev] CDI.KEYID = 6
9,427,223 UART: [ldev] SUBJECT.KEYID = 5
9,428,468 UART: [ldev] AUTHORITY.KEYID = 7
9,429,707 UART: [ldev] FE.KEYID = 1
9,478,874 UART: [ldev] Erasing FE.KEYID = 1
12,809,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,119,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,134,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,149,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,168,822 UART: [ldev] --
15,174,253 UART: [fwproc] Waiting for Commands...
15,176,088 UART: [fwproc] Received command 0x46574c44
15,178,356 UART: [fwproc] Received Image of size 114036 bytes
19,227,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,690,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,787,626 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,254,541 >>> mbox cmd response: failed
14,255,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,255,403 >>> mbox cmd response: failed
14,255,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,255,916 >>> mbox cmd response: failed
Initializing fuses
2,053,742 writing to cptra_bootfsm_go
5,822,907 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,878,362 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,555 UART:
192,904 UART: Running Caliptra ROM ...
194,100 UART:
603,629 UART: [state] CFI Enabled
620,304 UART: [state] LifecycleState = Unprovisioned
622,242 UART: [state] DebugLocked = No
623,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,326 UART: [kat] SHA2-256
799,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,614 UART: [kat] ++
810,153 UART: [kat] sha1
822,444 UART: [kat] SHA2-256
825,128 UART: [kat] SHA2-384
831,573 UART: [kat] SHA2-512-ACC
833,987 UART: [kat] ECC-384
3,118,250 UART: [kat] HMAC-384Kdf
3,130,429 UART: [kat] LMS
4,320,525 UART: [kat] --
4,323,873 UART: [cold-reset] ++
4,324,782 UART: [fht] Storing FHT @ 0x50003400
4,335,563 UART: [idev] ++
4,336,146 UART: [idev] CDI.KEYID = 6
4,337,165 UART: [idev] SUBJECT.KEYID = 7
4,338,325 UART: [idev] UDS.KEYID = 0
4,341,118 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,484,531 UART: [idev] Erasing UDS.KEYID = 0
7,622,280 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,996 UART: [idev] --
7,648,861 UART: [ldev] ++
7,649,436 UART: [ldev] CDI.KEYID = 6
7,650,412 UART: [ldev] SUBJECT.KEYID = 5
7,651,572 UART: [ldev] AUTHORITY.KEYID = 7
7,652,861 UART: [ldev] FE.KEYID = 1
7,666,761 UART: [ldev] Erasing FE.KEYID = 1
10,960,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,854 UART: [ldev] --
13,321,739 UART: [fwproc] Waiting for Commands...
13,323,892 UART: [fwproc] Received command 0x46574c44
13,326,083 UART: [fwproc] Received Image of size 114036 bytes
14,716,666 UART: ROM Fatal Error: 0x000B000C
14,720,152 >>> mbox cmd response: failed
14,720,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,720,885 >>> mbox cmd response: failed
14,721,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,721,445 >>> mbox cmd response: failed
Initializing fuses
2,050,120 writing to cptra_bootfsm_go
2,239,444 UART:
2,239,786 UART: Running Caliptra ROM ...
2,240,935 UART:
5,745,448 UART: [state] CFI Enabled
5,762,785 UART: [state] LifecycleState = Unprovisioned
5,764,708 UART: [state] DebugLocked = No
5,767,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,773,172 UART: [kat] SHA2-256
5,942,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,953,445 UART: [kat] ++
5,953,903 UART: [kat] sha1
5,964,787 UART: [kat] SHA2-256
5,967,531 UART: [kat] SHA2-384
5,973,841 UART: [kat] SHA2-512-ACC
5,976,239 UART: [kat] ECC-384
8,258,030 UART: [kat] HMAC-384Kdf
8,269,884 UART: [kat] LMS
9,459,980 UART: [kat] --
9,462,374 UART: [cold-reset] ++
9,464,373 UART: [fht] Storing FHT @ 0x50003400
9,476,023 UART: [idev] ++
9,476,655 UART: [idev] CDI.KEYID = 6
9,477,569 UART: [idev] SUBJECT.KEYID = 7
9,478,785 UART: [idev] UDS.KEYID = 0
9,481,364 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
9,624,730 UART: [idev] Erasing UDS.KEYID = 0
12,765,176 UART: [idev] Using Sha1 for KeyId Algorithm
12,787,139 UART: [idev] --
12,792,090 UART: [ldev] ++
12,792,671 UART: [ldev] CDI.KEYID = 6
12,793,608 UART: [ldev] SUBJECT.KEYID = 5
12,794,879 UART: [ldev] AUTHORITY.KEYID = 7
12,796,064 UART: [ldev] FE.KEYID = 1
12,807,960 UART: [ldev] Erasing FE.KEYID = 1
16,094,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,387,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,402,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,417,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,431,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,452,323 UART: [ldev] --
18,457,430 UART: [fwproc] Waiting for Commands...
18,460,272 UART: [fwproc] Received command 0x46574c44
18,462,466 UART: [fwproc] Received Image of size 114036 bytes
22,513,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,583,954 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,652,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
22,970,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
4,131,673 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,446,417 >>> mbox cmd response: failed
14,447,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,447,444 >>> mbox cmd response: failed
14,447,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,448,015 >>> mbox cmd response: failed
Initializing fuses
2,047,641 writing to cptra_bootfsm_go
9,557,476 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,490,838 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,238 UART:
192,638 UART: Running Caliptra ROM ...
193,815 UART:
193,975 UART: [state] CFI Enabled
261,930 UART: [state] LifecycleState = Unprovisioned
263,821 UART: [state] DebugLocked = No
265,772 UART: [state] WD Timer not started. Device not locked for debugging
269,381 UART: [kat] SHA2-256
448,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,083 UART: [kat] ++
460,622 UART: [kat] sha1
471,240 UART: [kat] SHA2-256
474,305 UART: [kat] SHA2-384
481,810 UART: [kat] SHA2-512-ACC
484,745 UART: [kat] ECC-384
2,946,703 UART: [kat] HMAC-384Kdf
2,970,588 UART: [kat] LMS
3,500,058 UART: [kat] --
3,502,778 UART: [cold-reset] ++
3,504,932 UART: [fht] FHT @ 0x50003400
3,515,047 UART: [idev] ++
3,515,621 UART: [idev] CDI.KEYID = 6
3,516,504 UART: [idev] SUBJECT.KEYID = 7
3,517,715 UART: [idev] UDS.KEYID = 0
3,520,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,860 UART: [idev] Erasing UDS.KEYID = 0
6,022,003 UART: [idev] Sha1 KeyId Algorithm
6,045,191 UART: [idev] --
6,049,353 UART: [ldev] ++
6,049,945 UART: [ldev] CDI.KEYID = 6
6,050,831 UART: [ldev] SUBJECT.KEYID = 5
6,052,048 UART: [ldev] AUTHORITY.KEYID = 7
6,053,291 UART: [ldev] FE.KEYID = 1
6,096,974 UART: [ldev] Erasing FE.KEYID = 1
8,601,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,367 UART: [ldev] --
10,411,667 UART: [fwproc] Wait for Commands...
10,413,692 UART: [fwproc] Recv command 0x46574c44
10,415,743 UART: [fwproc] Recv'd Img size: 114360 bytes
11,482,336 UART: ROM Fatal Error: 0x000B000C
11,485,460 >>> mbox cmd response: failed
11,485,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,486,232 >>> mbox cmd response: failed
11,486,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,486,787 >>> mbox cmd response: failed
Initializing fuses
2,049,691 writing to cptra_bootfsm_go
2,239,002 UART:
2,239,352 UART: Running Caliptra ROM ...
2,240,493 UART:
2,240,663 UART: [state] CFI Enabled
2,302,843 UART: [state] LifecycleState = Unprovisioned
2,304,728 UART: [state] DebugLocked = No
2,306,285 UART: [state] WD Timer not started. Device not locked for debugging
2,310,001 UART: [kat] SHA2-256
2,489,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,500,684 UART: [kat] ++
2,501,224 UART: [kat] sha1
2,512,446 UART: [kat] SHA2-256
2,515,465 UART: [kat] SHA2-384
2,521,287 UART: [kat] SHA2-512-ACC
2,524,232 UART: [kat] ECC-384
4,987,187 UART: [kat] HMAC-384Kdf
5,009,734 UART: [kat] LMS
5,539,189 UART: [kat] --
5,542,610 UART: [cold-reset] ++
5,544,442 UART: [fht] FHT @ 0x50003400
5,555,744 UART: [idev] ++
5,556,319 UART: [idev] CDI.KEYID = 6
5,557,336 UART: [idev] SUBJECT.KEYID = 7
5,558,456 UART: [idev] UDS.KEYID = 0
5,560,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,704,896 UART: [idev] Erasing UDS.KEYID = 0
8,065,359 UART: [idev] Sha1 KeyId Algorithm
8,089,614 UART: [idev] --
8,094,432 UART: [ldev] ++
8,095,006 UART: [ldev] CDI.KEYID = 6
8,095,922 UART: [ldev] SUBJECT.KEYID = 5
8,097,083 UART: [ldev] AUTHORITY.KEYID = 7
8,098,317 UART: [ldev] FE.KEYID = 1
8,137,636 UART: [ldev] Erasing FE.KEYID = 1
10,641,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,781 UART: [ldev] --
12,451,002 UART: [fwproc] Wait for Commands...
12,453,760 UART: [fwproc] Recv command 0x46574c44
12,455,855 UART: [fwproc] Recv'd Img size: 114360 bytes
15,866,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,325,387 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,143 UART:
192,513 UART: Running Caliptra ROM ...
193,716 UART:
193,868 UART: [state] CFI Enabled
264,831 UART: [state] LifecycleState = Unprovisioned
267,185 UART: [state] DebugLocked = No
268,892 UART: [state] WD Timer not started. Device not locked for debugging
274,185 UART: [kat] SHA2-256
464,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,855 UART: [kat] ++
475,323 UART: [kat] sha1
486,958 UART: [kat] SHA2-256
490,015 UART: [kat] SHA2-384
495,091 UART: [kat] SHA2-512-ACC
497,657 UART: [kat] ECC-384
2,947,998 UART: [kat] HMAC-384Kdf
2,971,615 UART: [kat] LMS
3,503,416 UART: [kat] --
3,508,577 UART: [cold-reset] ++
3,511,161 UART: [fht] FHT @ 0x50003400
3,521,765 UART: [idev] ++
3,522,450 UART: [idev] CDI.KEYID = 6
3,523,472 UART: [idev] SUBJECT.KEYID = 7
3,524,575 UART: [idev] UDS.KEYID = 0
3,527,696 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,668 UART: [idev] Erasing UDS.KEYID = 0
6,027,674 UART: [idev] Sha1 KeyId Algorithm
6,050,334 UART: [idev] --
6,054,284 UART: [ldev] ++
6,054,975 UART: [ldev] CDI.KEYID = 6
6,055,893 UART: [ldev] SUBJECT.KEYID = 5
6,057,116 UART: [ldev] AUTHORITY.KEYID = 7
6,058,297 UART: [ldev] FE.KEYID = 1
6,099,693 UART: [ldev] Erasing FE.KEYID = 1
8,607,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,583 UART: [ldev] --
10,412,672 UART: [fwproc] Wait for Commands...
10,414,187 UART: [fwproc] Recv command 0x46574c44
10,416,521 UART: [fwproc] Recv'd Img size: 114360 bytes
11,510,107 UART: ROM Fatal Error: 0x000B000C
11,513,759 >>> mbox cmd response: failed
11,514,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,514,510 >>> mbox cmd response: failed
11,514,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,515,076 >>> mbox cmd response: failed
Initializing fuses
2,049,322 writing to cptra_bootfsm_go
2,238,642 UART:
2,238,978 UART: Running Caliptra ROM ...
2,240,116 UART:
2,240,281 UART: [state] CFI Enabled
2,315,872 UART: [state] LifecycleState = Unprovisioned
2,318,299 UART: [state] DebugLocked = No
2,320,445 UART: [state] WD Timer not started. Device not locked for debugging
2,325,073 UART: [kat] SHA2-256
2,514,961 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,701 UART: [kat] ++
2,526,199 UART: [kat] sha1
2,538,608 UART: [kat] SHA2-256
2,541,677 UART: [kat] SHA2-384
2,548,261 UART: [kat] SHA2-512-ACC
2,550,883 UART: [kat] ECC-384
5,000,209 UART: [kat] HMAC-384Kdf
5,021,238 UART: [kat] LMS
5,553,027 UART: [kat] --
5,557,123 UART: [cold-reset] ++
5,559,377 UART: [fht] FHT @ 0x50003400
5,571,782 UART: [idev] ++
5,572,524 UART: [idev] CDI.KEYID = 6
5,573,436 UART: [idev] SUBJECT.KEYID = 7
5,574,651 UART: [idev] UDS.KEYID = 0
5,577,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,721,132 UART: [idev] Erasing UDS.KEYID = 0
8,077,532 UART: [idev] Sha1 KeyId Algorithm
8,098,874 UART: [idev] --
8,104,088 UART: [ldev] ++
8,104,867 UART: [ldev] CDI.KEYID = 6
8,105,758 UART: [ldev] SUBJECT.KEYID = 5
8,106,779 UART: [ldev] AUTHORITY.KEYID = 7
8,108,072 UART: [ldev] FE.KEYID = 1
8,151,210 UART: [ldev] Erasing FE.KEYID = 1
10,657,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,450 UART: [ldev] --
12,463,602 UART: [fwproc] Wait for Commands...
12,465,264 UART: [fwproc] Recv command 0x46574c44
12,467,580 UART: [fwproc] Recv'd Img size: 114360 bytes
15,916,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,109,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,653,146 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,441,208 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,310,750 >>> mbox cmd response: failed
11,311,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,311,667 >>> mbox cmd response: failed
11,311,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,312,232 >>> mbox cmd response: failed
Initializing fuses
2,045,472 writing to cptra_bootfsm_go
5,483,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,777,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,494 UART:
192,853 UART: Running Caliptra ROM ...
194,039 UART:
603,620 UART: [state] CFI Enabled
619,348 UART: [state] LifecycleState = Unprovisioned
621,711 UART: [state] DebugLocked = No
624,326 UART: [state] WD Timer not started. Device not locked for debugging
629,006 UART: [kat] SHA2-256
818,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,682 UART: [kat] ++
830,270 UART: [kat] sha1
841,859 UART: [kat] SHA2-256
844,867 UART: [kat] SHA2-384
849,871 UART: [kat] SHA2-512-ACC
852,478 UART: [kat] ECC-384
3,294,013 UART: [kat] HMAC-384Kdf
3,307,760 UART: [kat] LMS
3,839,591 UART: [kat] --
3,845,762 UART: [cold-reset] ++
3,846,795 UART: [fht] FHT @ 0x50003400
3,858,314 UART: [idev] ++
3,859,048 UART: [idev] CDI.KEYID = 6
3,859,967 UART: [idev] SUBJECT.KEYID = 7
3,861,180 UART: [idev] UDS.KEYID = 0
3,863,807 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,057 UART: [idev] Erasing UDS.KEYID = 0
6,336,938 UART: [idev] Sha1 KeyId Algorithm
6,359,023 UART: [idev] --
6,364,477 UART: [ldev] ++
6,365,157 UART: [ldev] CDI.KEYID = 6
6,366,068 UART: [ldev] SUBJECT.KEYID = 5
6,367,230 UART: [ldev] AUTHORITY.KEYID = 7
6,368,459 UART: [ldev] FE.KEYID = 1
6,379,868 UART: [ldev] Erasing FE.KEYID = 1
8,858,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,170 UART: [ldev] --
10,649,148 UART: [fwproc] Wait for Commands...
10,651,355 UART: [fwproc] Recv command 0x46574c44
10,653,669 UART: [fwproc] Recv'd Img size: 114360 bytes
11,750,047 UART: ROM Fatal Error: 0x000B000C
11,753,681 >>> mbox cmd response: failed
11,754,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,754,425 >>> mbox cmd response: failed
11,754,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,754,985 >>> mbox cmd response: failed
Initializing fuses
2,055,044 writing to cptra_bootfsm_go
2,244,372 UART:
2,244,709 UART: Running Caliptra ROM ...
2,245,848 UART:
8,705,108 UART: [state] CFI Enabled
8,720,001 UART: [state] LifecycleState = Unprovisioned
8,722,391 UART: [state] DebugLocked = No
8,725,271 UART: [state] WD Timer not started. Device not locked for debugging
8,730,478 UART: [kat] SHA2-256
8,920,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,931,154 UART: [kat] ++
8,931,673 UART: [kat] sha1
8,943,477 UART: [kat] SHA2-256
8,946,499 UART: [kat] SHA2-384
8,952,293 UART: [kat] SHA2-512-ACC
8,954,878 UART: [kat] ECC-384
11,396,202 UART: [kat] HMAC-384Kdf
11,410,808 UART: [kat] LMS
11,942,621 UART: [kat] --
11,947,853 UART: [cold-reset] ++
11,949,403 UART: [fht] FHT @ 0x50003400
11,961,187 UART: [idev] ++
11,961,919 UART: [idev] CDI.KEYID = 6
11,962,885 UART: [idev] SUBJECT.KEYID = 7
11,964,043 UART: [idev] UDS.KEYID = 0
11,966,767 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,110,505 UART: [idev] Erasing UDS.KEYID = 0
14,439,726 UART: [idev] Sha1 KeyId Algorithm
14,462,590 UART: [idev] --
14,466,532 UART: [ldev] ++
14,467,233 UART: [ldev] CDI.KEYID = 6
14,468,151 UART: [ldev] SUBJECT.KEYID = 5
14,469,306 UART: [ldev] AUTHORITY.KEYID = 7
14,470,535 UART: [ldev] FE.KEYID = 1
14,481,892 UART: [ldev] Erasing FE.KEYID = 1
16,960,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,678,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,693,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,708,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,723,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,744,150 UART: [ldev] --
18,749,089 UART: [fwproc] Wait for Commands...
18,750,865 UART: [fwproc] Recv command 0x46574c44
18,753,176 UART: [fwproc] Recv'd Img size: 114360 bytes
22,205,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,284,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,400,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
22,942,825 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,761,222 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,536,047 >>> mbox cmd response: failed
11,536,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,537,244 >>> mbox cmd response: failed
11,537,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,537,800 >>> mbox cmd response: failed
Initializing fuses
2,047,885 writing to cptra_bootfsm_go
12,097,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,294,313 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,591 UART: [kat] SHA2-256
892,529 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,046 UART: [kat] LMS
1,475,242 UART: [kat] --
1,476,165 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,722 UART: [idev] ++
1,479,890 UART: [idev] CDI.KEYID = 6
1,480,250 UART: [idev] SUBJECT.KEYID = 7
1,480,674 UART: [idev] UDS.KEYID = 0
1,481,019 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,728 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,922 UART: [idev] --
1,514,981 UART: [ldev] ++
1,515,149 UART: [ldev] CDI.KEYID = 6
1,515,512 UART: [ldev] SUBJECT.KEYID = 5
1,515,938 UART: [ldev] AUTHORITY.KEYID = 7
1,516,401 UART: [ldev] FE.KEYID = 1
1,521,835 UART: [ldev] Erasing FE.KEYID = 1
1,546,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,572 UART: [ldev] --
1,585,895 UART: [fwproc] Waiting for Commands...
1,586,612 UART: [fwproc] Received command 0x46574c44
1,587,403 UART: [fwproc] Received Image of size 114360 bytes
1,624,793 UART: ROM Fatal Error: 0x000B000C
1,625,952 >>> mbox cmd response: failed
1,625,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,958 >>> mbox cmd response: failed
1,625,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
907,000 UART: [kat] LMS
1,475,196 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,308 UART: [idev] ++
1,479,476 UART: [idev] CDI.KEYID = 6
1,479,836 UART: [idev] SUBJECT.KEYID = 7
1,480,260 UART: [idev] UDS.KEYID = 0
1,480,605 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,244 UART: [idev] Erasing UDS.KEYID = 0
1,504,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,265 UART: [ldev] Erasing FE.KEYID = 1
1,547,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,696 UART: [ldev] --
1,585,971 UART: [fwproc] Waiting for Commands...
1,586,740 UART: [fwproc] Received command 0x46574c44
1,587,531 UART: [fwproc] Received Image of size 114360 bytes
2,885,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,096 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,151 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,477,875 >>> mbox cmd response: failed
1,477,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,881 >>> mbox cmd response: failed
1,477,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,905 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,124 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,920 UART: [kat] SHA2-256
881,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,966 UART: [kat] ++
886,118 UART: [kat] sha1
890,202 UART: [kat] SHA2-256
892,140 UART: [kat] SHA2-384
894,849 UART: [kat] SHA2-512-ACC
896,750 UART: [kat] ECC-384
902,241 UART: [kat] HMAC-384Kdf
906,781 UART: [kat] LMS
1,474,977 UART: [kat] --
1,475,908 UART: [cold-reset] ++
1,476,402 UART: [fht] Storing FHT @ 0x50003400
1,479,115 UART: [idev] ++
1,479,283 UART: [idev] CDI.KEYID = 6
1,479,643 UART: [idev] SUBJECT.KEYID = 7
1,480,067 UART: [idev] UDS.KEYID = 0
1,480,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,333 UART: [idev] Erasing UDS.KEYID = 0
1,504,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,079 UART: [idev] --
1,514,204 UART: [ldev] ++
1,514,372 UART: [ldev] CDI.KEYID = 6
1,514,735 UART: [ldev] SUBJECT.KEYID = 5
1,515,161 UART: [ldev] AUTHORITY.KEYID = 7
1,515,624 UART: [ldev] FE.KEYID = 1
1,521,034 UART: [ldev] Erasing FE.KEYID = 1
1,546,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,675 UART: [ldev] --
1,586,134 UART: [fwproc] Waiting for Commands...
1,587,001 UART: [fwproc] Received command 0x46574c44
1,587,792 UART: [fwproc] Received Image of size 114360 bytes
1,625,616 UART: ROM Fatal Error: 0x000B000C
1,626,775 >>> mbox cmd response: failed
1,626,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,781 >>> mbox cmd response: failed
1,626,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,654 UART: [kat] SHA2-256
882,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,700 UART: [kat] ++
886,852 UART: [kat] sha1
891,128 UART: [kat] SHA2-256
893,066 UART: [kat] SHA2-384
895,843 UART: [kat] SHA2-512-ACC
897,744 UART: [kat] ECC-384
903,511 UART: [kat] HMAC-384Kdf
908,011 UART: [kat] LMS
1,476,207 UART: [kat] --
1,477,106 UART: [cold-reset] ++
1,477,530 UART: [fht] Storing FHT @ 0x50003400
1,480,319 UART: [idev] ++
1,480,487 UART: [idev] CDI.KEYID = 6
1,480,847 UART: [idev] SUBJECT.KEYID = 7
1,481,271 UART: [idev] UDS.KEYID = 0
1,481,616 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,099 UART: [idev] Erasing UDS.KEYID = 0
1,505,885 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,688 UART: [ldev] ++
1,515,856 UART: [ldev] CDI.KEYID = 6
1,516,219 UART: [ldev] SUBJECT.KEYID = 5
1,516,645 UART: [ldev] AUTHORITY.KEYID = 7
1,517,108 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,423 UART: [ldev] --
1,586,756 UART: [fwproc] Waiting for Commands...
1,587,559 UART: [fwproc] Received command 0x46574c44
1,588,350 UART: [fwproc] Received Image of size 114360 bytes
2,885,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,076 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,428 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,291 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,448 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,480,748 >>> mbox cmd response: failed
1,480,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,754 >>> mbox cmd response: failed
1,480,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,134 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,075 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,588 UART: [kat] SHA2-512-ACC
908,489 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
923,066 UART: [kat] LMS
1,171,394 UART: [kat] --
1,172,147 UART: [cold-reset] ++
1,172,593 UART: [fht] FHT @ 0x50003400
1,175,094 UART: [idev] ++
1,175,262 UART: [idev] CDI.KEYID = 6
1,175,622 UART: [idev] SUBJECT.KEYID = 7
1,176,046 UART: [idev] UDS.KEYID = 0
1,176,391 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,522 UART: [idev] Erasing UDS.KEYID = 0
1,200,629 UART: [idev] Sha1 KeyId Algorithm
1,209,031 UART: [idev] --
1,210,087 UART: [ldev] ++
1,210,255 UART: [ldev] CDI.KEYID = 6
1,210,618 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,221 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,262 UART: [fwproc] Recv command 0x46574c44
1,282,990 UART: [fwproc] Recv'd Img size: 114360 bytes
1,320,340 UART: ROM Fatal Error: 0x000B000C
1,321,499 >>> mbox cmd response: failed
1,321,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,505 >>> mbox cmd response: failed
1,321,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,211 UART: [kat] SHA2-256
904,151 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,600 UART: [kat] HMAC-384Kdf
923,248 UART: [kat] LMS
1,171,576 UART: [kat] --
1,172,303 UART: [cold-reset] ++
1,172,631 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,387 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,210,029 UART: [ldev] ++
1,210,197 UART: [ldev] CDI.KEYID = 6
1,210,560 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,833 UART: [ldev] Erasing FE.KEYID = 1
1,243,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,931 UART: [ldev] --
1,283,310 UART: [fwproc] Wait for Commands...
1,283,950 UART: [fwproc] Recv command 0x46574c44
1,284,678 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,431 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,887 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,177,258 >>> mbox cmd response: failed
1,177,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,264 >>> mbox cmd response: failed
1,177,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,748 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,138 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
893,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,048 UART: [kat] ++
898,200 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
906,865 UART: [kat] SHA2-512-ACC
908,766 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,383 UART: [kat] LMS
1,171,711 UART: [kat] --
1,172,548 UART: [cold-reset] ++
1,172,934 UART: [fht] FHT @ 0x50003400
1,175,565 UART: [idev] ++
1,175,733 UART: [idev] CDI.KEYID = 6
1,176,093 UART: [idev] SUBJECT.KEYID = 7
1,176,517 UART: [idev] UDS.KEYID = 0
1,176,862 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,597 UART: [idev] Erasing UDS.KEYID = 0
1,201,170 UART: [idev] Sha1 KeyId Algorithm
1,209,554 UART: [idev] --
1,210,652 UART: [ldev] ++
1,210,820 UART: [ldev] CDI.KEYID = 6
1,211,183 UART: [ldev] SUBJECT.KEYID = 5
1,211,609 UART: [ldev] AUTHORITY.KEYID = 7
1,212,072 UART: [ldev] FE.KEYID = 1
1,217,386 UART: [ldev] Erasing FE.KEYID = 1
1,244,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,876 UART: [ldev] --
1,283,375 UART: [fwproc] Wait for Commands...
1,283,971 UART: [fwproc] Recv command 0x46574c44
1,284,699 UART: [fwproc] Recv'd Img size: 114360 bytes
1,322,757 UART: ROM Fatal Error: 0x000B000C
1,323,916 >>> mbox cmd response: failed
1,323,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,922 >>> mbox cmd response: failed
1,323,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
906,869 UART: [kat] SHA2-512-ACC
908,770 UART: [kat] ECC-384
918,867 UART: [kat] HMAC-384Kdf
923,281 UART: [kat] LMS
1,171,609 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,828 UART: [fht] FHT @ 0x50003400
1,175,571 UART: [idev] ++
1,175,739 UART: [idev] CDI.KEYID = 6
1,176,099 UART: [idev] SUBJECT.KEYID = 7
1,176,523 UART: [idev] UDS.KEYID = 0
1,176,868 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,879 UART: [idev] Erasing UDS.KEYID = 0
1,202,252 UART: [idev] Sha1 KeyId Algorithm
1,210,568 UART: [idev] --
1,211,606 UART: [ldev] ++
1,211,774 UART: [ldev] CDI.KEYID = 6
1,212,137 UART: [ldev] SUBJECT.KEYID = 5
1,212,563 UART: [ldev] AUTHORITY.KEYID = 7
1,213,026 UART: [ldev] FE.KEYID = 1
1,218,524 UART: [ldev] Erasing FE.KEYID = 1
1,245,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,370 UART: [ldev] --
1,284,637 UART: [fwproc] Wait for Commands...
1,285,429 UART: [fwproc] Recv command 0x46574c44
1,286,157 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,290 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,904 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,631 >>> mbox cmd response: failed
1,178,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,637 >>> mbox cmd response: failed
1,178,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,552 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,813 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,205 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,311 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,214,812 UART: [ldev] Erasing FE.KEYID = 1
1,240,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,580 UART: [ldev] --
1,279,910 UART: [fwproc] Wait for Commands...
1,280,583 UART: [fwproc] Recv command 0x46574c44
1,281,316 UART: [fwproc] Recv'd Img size: 114360 bytes
1,319,078 UART: ROM Fatal Error: 0x000B000C
1,320,237 >>> mbox cmd response: failed
1,320,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,243 >>> mbox cmd response: failed
1,320,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
890,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,943 UART: [kat] ++
895,095 UART: [kat] sha1
899,303 UART: [kat] SHA2-256
901,243 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,252 UART: [kat] LMS
1,168,564 UART: [kat] --
1,169,201 UART: [cold-reset] ++
1,169,587 UART: [fht] FHT @ 0x50003400
1,172,291 UART: [idev] ++
1,172,459 UART: [idev] CDI.KEYID = 6
1,172,820 UART: [idev] SUBJECT.KEYID = 7
1,173,245 UART: [idev] UDS.KEYID = 0
1,173,591 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,445 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,732 UART: [ldev] Erasing FE.KEYID = 1
1,241,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,966 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,280,955 UART: [fwproc] Recv command 0x46574c44
1,281,688 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,579 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,550 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,172,564 >>> mbox cmd response: failed
1,172,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,570 >>> mbox cmd response: failed
1,172,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,781 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,800 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,174,342 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,952 UART: [idev] Erasing UDS.KEYID = 0
1,198,976 UART: [idev] Sha1 KeyId Algorithm
1,207,740 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,563 UART: [ldev] Erasing FE.KEYID = 1
1,242,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,983 UART: [ldev] --
1,281,351 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 114360 bytes
1,319,549 UART: ROM Fatal Error: 0x000B000C
1,320,708 >>> mbox cmd response: failed
1,320,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,714 >>> mbox cmd response: failed
1,320,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,752 UART: [idev] Erasing UDS.KEYID = 0
1,199,188 UART: [idev] Sha1 KeyId Algorithm
1,207,920 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,241,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,471 UART: [ldev] --
1,280,777 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,576 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,174,251 >>> mbox cmd response: failed
1,174,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,257 >>> mbox cmd response: failed
1,174,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,399 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,237 UART:
192,593 UART: Running Caliptra ROM ...
193,777 UART:
193,927 UART: [state] CFI Enabled
263,165 UART: [state] LifecycleState = Unprovisioned
265,136 UART: [state] DebugLocked = No
267,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,104 UART: [kat] SHA2-256
441,835 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,330 UART: [kat] ++
452,808 UART: [kat] sha1
462,622 UART: [kat] SHA2-256
465,299 UART: [kat] SHA2-384
471,681 UART: [kat] SHA2-512-ACC
474,022 UART: [kat] ECC-384
2,765,267 UART: [kat] HMAC-384Kdf
2,797,267 UART: [kat] LMS
3,987,530 UART: [kat] --
3,991,922 UART: [cold-reset] ++
3,994,027 UART: [fht] Storing FHT @ 0x50003400
4,005,900 UART: [idev] ++
4,006,476 UART: [idev] CDI.KEYID = 6
4,007,445 UART: [idev] SUBJECT.KEYID = 7
4,008,666 UART: [idev] UDS.KEYID = 0
4,011,426 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,048 UART: [idev] Erasing UDS.KEYID = 0
7,344,358 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,108 UART: [idev] --
7,371,001 UART: [ldev] ++
7,371,597 UART: [ldev] CDI.KEYID = 6
7,372,508 UART: [ldev] SUBJECT.KEYID = 5
7,373,728 UART: [ldev] AUTHORITY.KEYID = 7
7,374,969 UART: [ldev] FE.KEYID = 1
7,419,188 UART: [ldev] Erasing FE.KEYID = 1
10,753,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,139 UART: [ldev] --
13,113,633 UART: [fwproc] Waiting for Commands...
13,116,814 UART: [fwproc] Received command 0x46574c44
13,119,001 UART: [fwproc] Received Image of size 114036 bytes
13,217,787 UART: ROM Fatal Error: 0x000B001C
13,221,252 >>> mbox cmd response: failed
13,221,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,222,023 >>> mbox cmd response: failed
13,222,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,222,587 >>> mbox cmd response: failed
Initializing fuses
2,050,738 writing to cptra_bootfsm_go
2,240,039 UART:
2,240,398 UART: Running Caliptra ROM ...
2,241,541 UART:
2,241,711 UART: [state] CFI Enabled
2,314,056 UART: [state] LifecycleState = Unprovisioned
2,316,001 UART: [state] DebugLocked = No
2,318,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,434 UART: [kat] SHA2-256
2,494,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,639 UART: [kat] ++
2,505,192 UART: [kat] sha1
2,517,281 UART: [kat] SHA2-256
2,519,982 UART: [kat] SHA2-384
2,526,121 UART: [kat] SHA2-512-ACC
2,528,491 UART: [kat] ECC-384
4,817,091 UART: [kat] HMAC-384Kdf
4,849,253 UART: [kat] LMS
6,039,607 UART: [kat] --
6,044,404 UART: [cold-reset] ++
6,045,529 UART: [fht] Storing FHT @ 0x50003400
6,056,206 UART: [idev] ++
6,056,770 UART: [idev] CDI.KEYID = 6
6,057,738 UART: [idev] SUBJECT.KEYID = 7
6,058,974 UART: [idev] UDS.KEYID = 0
6,061,590 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,205,128 UART: [idev] Erasing UDS.KEYID = 0
9,395,923 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,836 UART: [idev] --
9,421,751 UART: [ldev] ++
9,422,334 UART: [ldev] CDI.KEYID = 6
9,423,299 UART: [ldev] SUBJECT.KEYID = 5
9,424,513 UART: [ldev] AUTHORITY.KEYID = 7
9,425,752 UART: [ldev] FE.KEYID = 1
9,471,517 UART: [ldev] Erasing FE.KEYID = 1
12,806,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,118,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,162,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,277 UART: [ldev] --
15,185,142 UART: [fwproc] Waiting for Commands...
15,187,399 UART: [fwproc] Received command 0x46574c44
15,189,588 UART: [fwproc] Received Image of size 114036 bytes
19,239,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,318,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,387,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,703,837 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,805,688 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,936,600 >>> mbox cmd response: failed
12,937,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,937,528 >>> mbox cmd response: failed
12,937,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,938,090 >>> mbox cmd response: failed
Initializing fuses
2,048,178 writing to cptra_bootfsm_go
5,816,928 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,866,830 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,061 writing to cptra_bootfsm_go
193,429 UART:
193,787 UART: Running Caliptra ROM ...
194,914 UART:
604,690 UART: [state] CFI Enabled
620,203 UART: [state] LifecycleState = Unprovisioned
622,095 UART: [state] DebugLocked = No
625,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,497 UART: [kat] SHA2-256
799,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,813 UART: [kat] ++
810,289 UART: [kat] sha1
820,417 UART: [kat] SHA2-256
823,103 UART: [kat] SHA2-384
829,731 UART: [kat] SHA2-512-ACC
832,068 UART: [kat] ECC-384
3,116,221 UART: [kat] HMAC-384Kdf
3,129,555 UART: [kat] LMS
4,319,668 UART: [kat] --
4,326,129 UART: [cold-reset] ++
4,327,059 UART: [fht] Storing FHT @ 0x50003400
4,339,893 UART: [idev] ++
4,340,522 UART: [idev] CDI.KEYID = 6
4,341,593 UART: [idev] SUBJECT.KEYID = 7
4,342,701 UART: [idev] UDS.KEYID = 0
4,345,525 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,488,964 UART: [idev] Erasing UDS.KEYID = 0
7,633,144 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,273 UART: [idev] --
7,658,377 UART: [ldev] ++
7,659,003 UART: [ldev] CDI.KEYID = 6
7,659,918 UART: [ldev] SUBJECT.KEYID = 5
7,661,131 UART: [ldev] AUTHORITY.KEYID = 7
7,662,422 UART: [ldev] FE.KEYID = 1
7,674,451 UART: [ldev] Erasing FE.KEYID = 1
10,964,254 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,770 UART: [ldev] --
13,321,827 UART: [fwproc] Waiting for Commands...
13,323,781 UART: [fwproc] Received command 0x46574c44
13,325,999 UART: [fwproc] Received Image of size 114036 bytes
13,419,818 UART: ROM Fatal Error: 0x000B001C
13,423,282 >>> mbox cmd response: failed
13,423,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,017 >>> mbox cmd response: failed
13,424,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,581 >>> mbox cmd response: failed
Initializing fuses
2,054,564 writing to cptra_bootfsm_go
2,243,859 UART:
2,244,321 UART: Running Caliptra ROM ...
2,245,381 UART:
7,045,376 UART: [state] CFI Enabled
7,060,967 UART: [state] LifecycleState = Unprovisioned
7,062,920 UART: [state] DebugLocked = No
7,064,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,070,388 UART: [kat] SHA2-256
7,240,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,250,624 UART: [kat] ++
7,251,111 UART: [kat] sha1
7,261,461 UART: [kat] SHA2-256
7,264,159 UART: [kat] SHA2-384
7,269,556 UART: [kat] SHA2-512-ACC
7,271,912 UART: [kat] ECC-384
9,555,659 UART: [kat] HMAC-384Kdf
9,568,272 UART: [kat] LMS
10,758,378 UART: [kat] --
10,762,124 UART: [cold-reset] ++
10,763,681 UART: [fht] Storing FHT @ 0x50003400
10,775,722 UART: [idev] ++
10,776,342 UART: [idev] CDI.KEYID = 6
10,777,221 UART: [idev] SUBJECT.KEYID = 7
10,778,486 UART: [idev] UDS.KEYID = 0
10,781,192 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,924,562 UART: [idev] Erasing UDS.KEYID = 0
14,068,148 UART: [idev] Using Sha1 for KeyId Algorithm
14,089,878 UART: [idev] --
14,093,818 UART: [ldev] ++
14,094,390 UART: [ldev] CDI.KEYID = 6
14,095,331 UART: [ldev] SUBJECT.KEYID = 5
14,096,597 UART: [ldev] AUTHORITY.KEYID = 7
14,097,758 UART: [ldev] FE.KEYID = 1
14,109,838 UART: [ldev] Erasing FE.KEYID = 1
17,398,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,688,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,702,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,717,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,731,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,750,443 UART: [ldev] --
19,755,761 UART: [fwproc] Waiting for Commands...
19,758,291 UART: [fwproc] Received command 0x46574c44
19,760,540 UART: [fwproc] Received Image of size 114036 bytes
23,807,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,881,075 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,949,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,266,840 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
4,129,415 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,165,063 >>> mbox cmd response: failed
13,165,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,165,941 >>> mbox cmd response: failed
13,166,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,166,564 >>> mbox cmd response: failed
Initializing fuses
2,048,325 writing to cptra_bootfsm_go
10,834,583 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,785,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,348 UART:
192,699 UART: Running Caliptra ROM ...
193,897 UART:
194,047 UART: [state] CFI Enabled
262,007 UART: [state] LifecycleState = Unprovisioned
263,929 UART: [state] DebugLocked = No
266,046 UART: [state] WD Timer not started. Device not locked for debugging
269,175 UART: [kat] SHA2-256
448,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,882 UART: [kat] ++
460,424 UART: [kat] sha1
472,820 UART: [kat] SHA2-256
475,874 UART: [kat] SHA2-384
481,902 UART: [kat] SHA2-512-ACC
484,847 UART: [kat] ECC-384
2,947,442 UART: [kat] HMAC-384Kdf
2,970,429 UART: [kat] LMS
3,499,891 UART: [kat] --
3,503,788 UART: [cold-reset] ++
3,504,644 UART: [fht] FHT @ 0x50003400
3,515,759 UART: [idev] ++
3,516,317 UART: [idev] CDI.KEYID = 6
3,517,270 UART: [idev] SUBJECT.KEYID = 7
3,518,484 UART: [idev] UDS.KEYID = 0
3,521,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,665,204 UART: [idev] Erasing UDS.KEYID = 0
6,025,744 UART: [idev] Sha1 KeyId Algorithm
6,048,450 UART: [idev] --
6,051,158 UART: [ldev] ++
6,051,733 UART: [ldev] CDI.KEYID = 6
6,052,648 UART: [ldev] SUBJECT.KEYID = 5
6,053,811 UART: [ldev] AUTHORITY.KEYID = 7
6,055,258 UART: [ldev] FE.KEYID = 1
6,098,569 UART: [ldev] Erasing FE.KEYID = 1
8,603,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,093 UART: [ldev] --
10,412,877 UART: [fwproc] Wait for Commands...
10,414,593 UART: [fwproc] Recv command 0x46574c44
10,416,639 UART: [fwproc] Recv'd Img size: 114360 bytes
10,513,990 UART: ROM Fatal Error: 0x000B001C
10,517,092 >>> mbox cmd response: failed
10,517,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,517,834 >>> mbox cmd response: failed
10,518,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,518,397 >>> mbox cmd response: failed
Initializing fuses
2,051,895 writing to cptra_bootfsm_go
2,241,233 UART:
2,241,572 UART: Running Caliptra ROM ...
2,242,645 UART:
2,242,805 UART: [state] CFI Enabled
2,309,219 UART: [state] LifecycleState = Unprovisioned
2,311,106 UART: [state] DebugLocked = No
2,312,554 UART: [state] WD Timer not started. Device not locked for debugging
2,315,665 UART: [kat] SHA2-256
2,494,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,377 UART: [kat] ++
2,506,934 UART: [kat] sha1
2,518,752 UART: [kat] SHA2-256
2,521,822 UART: [kat] SHA2-384
2,528,131 UART: [kat] SHA2-512-ACC
2,531,073 UART: [kat] ECC-384
4,993,090 UART: [kat] HMAC-384Kdf
5,014,911 UART: [kat] LMS
5,544,370 UART: [kat] --
5,548,254 UART: [cold-reset] ++
5,549,378 UART: [fht] FHT @ 0x50003400
5,560,466 UART: [idev] ++
5,561,030 UART: [idev] CDI.KEYID = 6
5,561,941 UART: [idev] SUBJECT.KEYID = 7
5,563,161 UART: [idev] UDS.KEYID = 0
5,565,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,710,039 UART: [idev] Erasing UDS.KEYID = 0
8,070,529 UART: [idev] Sha1 KeyId Algorithm
8,093,170 UART: [idev] --
8,098,039 UART: [ldev] ++
8,098,658 UART: [ldev] CDI.KEYID = 6
8,099,577 UART: [ldev] SUBJECT.KEYID = 5
8,100,691 UART: [ldev] AUTHORITY.KEYID = 7
8,101,953 UART: [ldev] FE.KEYID = 1
8,142,955 UART: [ldev] Erasing FE.KEYID = 1
10,642,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,363,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,379,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,395,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,411,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,430,522 UART: [ldev] --
12,435,905 UART: [fwproc] Wait for Commands...
12,438,110 UART: [fwproc] Recv command 0x46574c44
12,440,153 UART: [fwproc] Recv'd Img size: 114360 bytes
15,846,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,920,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,988,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,306,350 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,378 UART:
192,745 UART: Running Caliptra ROM ...
193,939 UART:
194,090 UART: [state] CFI Enabled
259,494 UART: [state] LifecycleState = Unprovisioned
261,901 UART: [state] DebugLocked = No
264,633 UART: [state] WD Timer not started. Device not locked for debugging
269,328 UART: [kat] SHA2-256
459,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,982 UART: [kat] ++
470,460 UART: [kat] sha1
481,541 UART: [kat] SHA2-256
484,511 UART: [kat] SHA2-384
489,952 UART: [kat] SHA2-512-ACC
492,563 UART: [kat] ECC-384
2,946,259 UART: [kat] HMAC-384Kdf
2,970,071 UART: [kat] LMS
3,501,812 UART: [kat] --
3,506,625 UART: [cold-reset] ++
3,508,106 UART: [fht] FHT @ 0x50003400
3,519,751 UART: [idev] ++
3,520,435 UART: [idev] CDI.KEYID = 6
3,521,375 UART: [idev] SUBJECT.KEYID = 7
3,522,584 UART: [idev] UDS.KEYID = 0
3,525,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,673 UART: [idev] Erasing UDS.KEYID = 0
6,026,881 UART: [idev] Sha1 KeyId Algorithm
6,047,737 UART: [idev] --
6,053,304 UART: [ldev] ++
6,053,988 UART: [ldev] CDI.KEYID = 6
6,054,875 UART: [ldev] SUBJECT.KEYID = 5
6,056,091 UART: [ldev] AUTHORITY.KEYID = 7
6,057,327 UART: [ldev] FE.KEYID = 1
6,097,694 UART: [ldev] Erasing FE.KEYID = 1
8,603,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,064 UART: [ldev] --
10,411,297 UART: [fwproc] Wait for Commands...
10,413,774 UART: [fwproc] Recv command 0x46574c44
10,416,057 UART: [fwproc] Recv'd Img size: 114360 bytes
10,543,847 UART: ROM Fatal Error: 0x000B001C
10,547,509 >>> mbox cmd response: failed
10,547,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,314 >>> mbox cmd response: failed
10,548,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,815 >>> mbox cmd response: failed
Initializing fuses
2,054,005 writing to cptra_bootfsm_go
2,243,407 UART:
2,243,770 UART: Running Caliptra ROM ...
2,245,027 UART:
2,245,202 UART: [state] CFI Enabled
2,317,074 UART: [state] LifecycleState = Unprovisioned
2,319,444 UART: [state] DebugLocked = No
2,321,593 UART: [state] WD Timer not started. Device not locked for debugging
2,325,472 UART: [kat] SHA2-256
2,515,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,158 UART: [kat] ++
2,526,708 UART: [kat] sha1
2,537,818 UART: [kat] SHA2-256
2,540,846 UART: [kat] SHA2-384
2,547,644 UART: [kat] SHA2-512-ACC
2,550,223 UART: [kat] ECC-384
5,001,947 UART: [kat] HMAC-384Kdf
5,026,547 UART: [kat] LMS
5,558,305 UART: [kat] --
5,563,647 UART: [cold-reset] ++
5,566,122 UART: [fht] FHT @ 0x50003400
5,577,771 UART: [idev] ++
5,578,461 UART: [idev] CDI.KEYID = 6
5,579,375 UART: [idev] SUBJECT.KEYID = 7
5,580,590 UART: [idev] UDS.KEYID = 0
5,582,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,726,887 UART: [idev] Erasing UDS.KEYID = 0
8,083,798 UART: [idev] Sha1 KeyId Algorithm
8,105,690 UART: [idev] --
8,110,280 UART: [ldev] ++
8,110,972 UART: [ldev] CDI.KEYID = 6
8,111,856 UART: [ldev] SUBJECT.KEYID = 5
8,113,072 UART: [ldev] AUTHORITY.KEYID = 7
8,114,255 UART: [ldev] FE.KEYID = 1
8,154,307 UART: [ldev] Erasing FE.KEYID = 1
10,662,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,462 UART: [ldev] --
12,469,993 UART: [fwproc] Wait for Commands...
12,472,468 UART: [fwproc] Recv command 0x46574c44
12,474,727 UART: [fwproc] Recv'd Img size: 114360 bytes
15,927,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,007,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,123,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,665,915 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,440,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,346,193 >>> mbox cmd response: failed
10,347,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,762 >>> mbox cmd response: failed
10,348,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,348,323 >>> mbox cmd response: failed
Initializing fuses
2,055,807 writing to cptra_bootfsm_go
5,466,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,781,705 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,413 UART:
192,771 UART: Running Caliptra ROM ...
193,957 UART:
603,681 UART: [state] CFI Enabled
621,562 UART: [state] LifecycleState = Unprovisioned
623,929 UART: [state] DebugLocked = No
626,304 UART: [state] WD Timer not started. Device not locked for debugging
630,050 UART: [kat] SHA2-256
819,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,530 UART: [kat] ++
831,031 UART: [kat] sha1
842,670 UART: [kat] SHA2-256
845,683 UART: [kat] SHA2-384
852,576 UART: [kat] SHA2-512-ACC
855,149 UART: [kat] ECC-384
3,296,144 UART: [kat] HMAC-384Kdf
3,309,134 UART: [kat] LMS
3,840,931 UART: [kat] --
3,845,859 UART: [cold-reset] ++
3,847,360 UART: [fht] FHT @ 0x50003400
3,859,374 UART: [idev] ++
3,860,064 UART: [idev] CDI.KEYID = 6
3,860,976 UART: [idev] SUBJECT.KEYID = 7
3,862,189 UART: [idev] UDS.KEYID = 0
3,864,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,642 UART: [idev] Erasing UDS.KEYID = 0
6,337,865 UART: [idev] Sha1 KeyId Algorithm
6,360,461 UART: [idev] --
6,365,648 UART: [ldev] ++
6,366,327 UART: [ldev] CDI.KEYID = 6
6,367,365 UART: [ldev] SUBJECT.KEYID = 5
6,368,483 UART: [ldev] AUTHORITY.KEYID = 7
6,369,666 UART: [ldev] FE.KEYID = 1
6,381,174 UART: [ldev] Erasing FE.KEYID = 1
8,858,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,845 UART: [ldev] --
10,652,875 UART: [fwproc] Wait for Commands...
10,655,516 UART: [fwproc] Recv command 0x46574c44
10,657,774 UART: [fwproc] Recv'd Img size: 114360 bytes
10,781,977 UART: ROM Fatal Error: 0x000B001C
10,785,606 >>> mbox cmd response: failed
10,786,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,786,359 >>> mbox cmd response: failed
10,786,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,786,922 >>> mbox cmd response: failed
Initializing fuses
2,051,864 writing to cptra_bootfsm_go
2,241,162 UART:
2,241,518 UART: Running Caliptra ROM ...
2,242,569 UART:
9,661,646 UART: [state] CFI Enabled
9,676,576 UART: [state] LifecycleState = Unprovisioned
9,678,972 UART: [state] DebugLocked = No
9,680,675 UART: [state] WD Timer not started. Device not locked for debugging
9,685,327 UART: [kat] SHA2-256
9,875,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,885,961 UART: [kat] ++
9,886,476 UART: [kat] sha1
9,897,582 UART: [kat] SHA2-256
9,900,604 UART: [kat] SHA2-384
9,906,817 UART: [kat] SHA2-512-ACC
9,909,439 UART: [kat] ECC-384
12,353,143 UART: [kat] HMAC-384Kdf
12,367,314 UART: [kat] LMS
12,899,128 UART: [kat] --
12,903,329 UART: [cold-reset] ++
12,904,337 UART: [fht] FHT @ 0x50003400
12,914,910 UART: [idev] ++
12,915,637 UART: [idev] CDI.KEYID = 6
12,916,518 UART: [idev] SUBJECT.KEYID = 7
12,917,785 UART: [idev] UDS.KEYID = 0
12,920,441 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,064,216 UART: [idev] Erasing UDS.KEYID = 0
15,393,496 UART: [idev] Sha1 KeyId Algorithm
15,415,933 UART: [idev] --
15,420,577 UART: [ldev] ++
15,421,255 UART: [ldev] CDI.KEYID = 6
15,422,135 UART: [ldev] SUBJECT.KEYID = 5
15,423,346 UART: [ldev] AUTHORITY.KEYID = 7
15,424,582 UART: [ldev] FE.KEYID = 1
15,435,959 UART: [ldev] Erasing FE.KEYID = 1
17,915,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,632,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,648,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,663,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,678,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,699,233 UART: [ldev] --
19,703,827 UART: [fwproc] Wait for Commands...
19,705,393 UART: [fwproc] Recv command 0x46574c44
19,707,660 UART: [fwproc] Recv'd Img size: 114360 bytes
23,147,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,224,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,340,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,882,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
3,755,559 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,567,393 >>> mbox cmd response: failed
10,567,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,568,314 >>> mbox cmd response: failed
10,568,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,568,874 >>> mbox cmd response: failed
Initializing fuses
2,053,890 writing to cptra_bootfsm_go
13,058,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,253,532 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,235 UART: [kat] SHA2-256
882,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,281 UART: [kat] ++
886,433 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,326 UART: [kat] SHA2-512-ACC
897,227 UART: [kat] ECC-384
902,740 UART: [kat] HMAC-384Kdf
907,188 UART: [kat] LMS
1,475,384 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,180 UART: [idev] ++
1,479,348 UART: [idev] CDI.KEYID = 6
1,479,708 UART: [idev] SUBJECT.KEYID = 7
1,480,132 UART: [idev] UDS.KEYID = 0
1,480,477 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,228 UART: [idev] Erasing UDS.KEYID = 0
1,504,608 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,356 UART: [idev] --
1,514,495 UART: [ldev] ++
1,514,663 UART: [ldev] CDI.KEYID = 6
1,515,026 UART: [ldev] SUBJECT.KEYID = 5
1,515,452 UART: [ldev] AUTHORITY.KEYID = 7
1,515,915 UART: [ldev] FE.KEYID = 1
1,521,099 UART: [ldev] Erasing FE.KEYID = 1
1,546,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,016 UART: [ldev] --
1,586,365 UART: [fwproc] Waiting for Commands...
1,587,034 UART: [fwproc] Received command 0x46574c44
1,587,825 UART: [fwproc] Received Image of size 114360 bytes
1,623,383 UART: ROM Fatal Error: 0x000B001C
1,624,542 >>> mbox cmd response: failed
1,624,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,548 >>> mbox cmd response: failed
1,624,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
85,877 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,553 UART: [kat] SHA2-256
881,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,599 UART: [kat] ++
885,751 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,318 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,476,037 UART: [cold-reset] ++
1,476,393 UART: [fht] Storing FHT @ 0x50003400
1,479,154 UART: [idev] ++
1,479,322 UART: [idev] CDI.KEYID = 6
1,479,682 UART: [idev] SUBJECT.KEYID = 7
1,480,106 UART: [idev] UDS.KEYID = 0
1,480,451 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,978 UART: [idev] Erasing UDS.KEYID = 0
1,504,420 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,958 UART: [idev] --
1,513,889 UART: [ldev] ++
1,514,057 UART: [ldev] CDI.KEYID = 6
1,514,420 UART: [ldev] SUBJECT.KEYID = 5
1,514,846 UART: [ldev] AUTHORITY.KEYID = 7
1,515,309 UART: [ldev] FE.KEYID = 1
1,520,279 UART: [ldev] Erasing FE.KEYID = 1
1,546,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,130 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 114360 bytes
2,883,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,277 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,629 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,458 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,476,555 >>> mbox cmd response: failed
1,476,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,561 >>> mbox cmd response: failed
1,476,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,871 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,925,412 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,715 UART: [kat] SHA2-512-ACC
897,616 UART: [kat] ECC-384
903,415 UART: [kat] HMAC-384Kdf
908,011 UART: [kat] LMS
1,476,207 UART: [kat] --
1,477,152 UART: [cold-reset] ++
1,477,536 UART: [fht] Storing FHT @ 0x50003400
1,480,379 UART: [idev] ++
1,480,547 UART: [idev] CDI.KEYID = 6
1,480,907 UART: [idev] SUBJECT.KEYID = 7
1,481,331 UART: [idev] UDS.KEYID = 0
1,481,676 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,487 UART: [idev] Erasing UDS.KEYID = 0
1,505,727 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,179 UART: [idev] --
1,515,122 UART: [ldev] ++
1,515,290 UART: [ldev] CDI.KEYID = 6
1,515,653 UART: [ldev] SUBJECT.KEYID = 5
1,516,079 UART: [ldev] AUTHORITY.KEYID = 7
1,516,542 UART: [ldev] FE.KEYID = 1
1,521,628 UART: [ldev] Erasing FE.KEYID = 1
1,547,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,207 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,383 UART: [fwproc] Received command 0x46574c44
1,588,174 UART: [fwproc] Received Image of size 114360 bytes
1,624,070 UART: ROM Fatal Error: 0x000B001C
1,625,229 >>> mbox cmd response: failed
1,625,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,235 >>> mbox cmd response: failed
1,625,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,966 UART: [kat] SHA2-256
881,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,012 UART: [kat] ++
886,164 UART: [kat] sha1
890,364 UART: [kat] SHA2-256
892,302 UART: [kat] SHA2-384
894,943 UART: [kat] SHA2-512-ACC
896,844 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,597 UART: [idev] Erasing UDS.KEYID = 0
1,505,363 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,268 UART: [ldev] ++
1,515,436 UART: [ldev] CDI.KEYID = 6
1,515,799 UART: [ldev] SUBJECT.KEYID = 5
1,516,225 UART: [ldev] AUTHORITY.KEYID = 7
1,516,688 UART: [ldev] FE.KEYID = 1
1,522,026 UART: [ldev] Erasing FE.KEYID = 1
1,547,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,863 UART: [ldev] --
1,586,220 UART: [fwproc] Waiting for Commands...
1,586,911 UART: [fwproc] Received command 0x46574c44
1,587,702 UART: [fwproc] Received Image of size 114360 bytes
2,885,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,492 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,844 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,859 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,086 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,476,440 >>> mbox cmd response: failed
1,476,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,446 >>> mbox cmd response: failed
1,476,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,098 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,777 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
918,050 UART: [kat] HMAC-384Kdf
922,650 UART: [kat] LMS
1,170,978 UART: [kat] --
1,171,993 UART: [cold-reset] ++
1,172,551 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,201,479 UART: [idev] Sha1 KeyId Algorithm
1,210,151 UART: [idev] --
1,211,119 UART: [ldev] ++
1,211,287 UART: [ldev] CDI.KEYID = 6
1,211,650 UART: [ldev] SUBJECT.KEYID = 5
1,212,076 UART: [ldev] AUTHORITY.KEYID = 7
1,212,539 UART: [ldev] FE.KEYID = 1
1,217,491 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,853 UART: [ldev] --
1,283,330 UART: [fwproc] Wait for Commands...
1,284,092 UART: [fwproc] Recv command 0x46574c44
1,284,820 UART: [fwproc] Recv'd Img size: 114360 bytes
1,320,320 UART: ROM Fatal Error: 0x000B001C
1,321,479 >>> mbox cmd response: failed
1,321,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,485 >>> mbox cmd response: failed
1,321,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,817 UART: [cold-reset] ++
1,172,193 UART: [fht] FHT @ 0x50003400
1,175,064 UART: [idev] ++
1,175,232 UART: [idev] CDI.KEYID = 6
1,175,592 UART: [idev] SUBJECT.KEYID = 7
1,176,016 UART: [idev] UDS.KEYID = 0
1,176,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,523 UART: [idev] Sha1 KeyId Algorithm
1,210,175 UART: [idev] --
1,211,199 UART: [ldev] ++
1,211,367 UART: [ldev] CDI.KEYID = 6
1,211,730 UART: [ldev] SUBJECT.KEYID = 5
1,212,156 UART: [ldev] AUTHORITY.KEYID = 7
1,212,619 UART: [ldev] FE.KEYID = 1
1,217,665 UART: [ldev] Erasing FE.KEYID = 1
1,243,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,909 UART: [ldev] --
1,283,200 UART: [fwproc] Wait for Commands...
1,283,878 UART: [fwproc] Recv command 0x46574c44
1,284,606 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,174,226 >>> mbox cmd response: failed
1,174,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,232 >>> mbox cmd response: failed
1,174,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,470 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,014 UART: [kat] SHA2-256
903,954 UART: [kat] SHA2-384
906,651 UART: [kat] SHA2-512-ACC
908,552 UART: [kat] ECC-384
918,169 UART: [kat] HMAC-384Kdf
922,803 UART: [kat] LMS
1,171,131 UART: [kat] --
1,171,724 UART: [cold-reset] ++
1,172,222 UART: [fht] FHT @ 0x50003400
1,174,981 UART: [idev] ++
1,175,149 UART: [idev] CDI.KEYID = 6
1,175,509 UART: [idev] SUBJECT.KEYID = 7
1,175,933 UART: [idev] UDS.KEYID = 0
1,176,278 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,903 UART: [idev] Erasing UDS.KEYID = 0
1,201,562 UART: [idev] Sha1 KeyId Algorithm
1,210,080 UART: [idev] --
1,211,190 UART: [ldev] ++
1,211,358 UART: [ldev] CDI.KEYID = 6
1,211,721 UART: [ldev] SUBJECT.KEYID = 5
1,212,147 UART: [ldev] AUTHORITY.KEYID = 7
1,212,610 UART: [ldev] FE.KEYID = 1
1,218,098 UART: [ldev] Erasing FE.KEYID = 1
1,244,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,642 UART: [ldev] --
1,283,907 UART: [fwproc] Wait for Commands...
1,284,633 UART: [fwproc] Recv command 0x46574c44
1,285,361 UART: [fwproc] Recv'd Img size: 114360 bytes
1,320,513 UART: ROM Fatal Error: 0x000B001C
1,321,672 >>> mbox cmd response: failed
1,321,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,678 >>> mbox cmd response: failed
1,321,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,343 UART: [kat] SHA2-256
893,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,118 UART: [kat] ++
898,270 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,045 UART: [kat] SHA2-512-ACC
908,946 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,161 UART: [kat] LMS
1,171,489 UART: [kat] --
1,172,580 UART: [cold-reset] ++
1,172,992 UART: [fht] FHT @ 0x50003400
1,175,693 UART: [idev] ++
1,175,861 UART: [idev] CDI.KEYID = 6
1,176,221 UART: [idev] SUBJECT.KEYID = 7
1,176,645 UART: [idev] UDS.KEYID = 0
1,176,990 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,539 UART: [idev] Erasing UDS.KEYID = 0
1,201,926 UART: [idev] Sha1 KeyId Algorithm
1,210,284 UART: [idev] --
1,211,584 UART: [ldev] ++
1,211,752 UART: [ldev] CDI.KEYID = 6
1,212,115 UART: [ldev] SUBJECT.KEYID = 5
1,212,541 UART: [ldev] AUTHORITY.KEYID = 7
1,213,004 UART: [ldev] FE.KEYID = 1
1,218,206 UART: [ldev] Erasing FE.KEYID = 1
1,244,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,476 UART: [ldev] --
1,283,807 UART: [fwproc] Wait for Commands...
1,284,555 UART: [fwproc] Recv command 0x46574c44
1,285,283 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,456 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,176,067 >>> mbox cmd response: failed
1,176,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,073 >>> mbox cmd response: failed
1,176,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,507 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,273 UART: [state] DebugLocked = No
87,001 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,795 UART: [kat] ++
895,947 UART: [kat] sha1
900,229 UART: [kat] SHA2-256
902,169 UART: [kat] SHA2-384
904,952 UART: [kat] SHA2-512-ACC
906,853 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,519 UART: [idev] ++
1,173,687 UART: [idev] CDI.KEYID = 6
1,174,048 UART: [idev] SUBJECT.KEYID = 7
1,174,473 UART: [idev] UDS.KEYID = 0
1,174,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,659 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,297 UART: [idev] --
1,209,472 UART: [ldev] ++
1,209,640 UART: [ldev] CDI.KEYID = 6
1,210,004 UART: [ldev] SUBJECT.KEYID = 5
1,210,431 UART: [ldev] AUTHORITY.KEYID = 7
1,210,894 UART: [ldev] FE.KEYID = 1
1,216,300 UART: [ldev] Erasing FE.KEYID = 1
1,242,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,724 UART: [ldev] --
1,282,196 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,540 UART: [fwproc] Recv'd Img size: 114360 bytes
1,317,966 UART: ROM Fatal Error: 0x000B001C
1,319,125 >>> mbox cmd response: failed
1,319,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,131 >>> mbox cmd response: failed
1,319,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,732 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,591 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,174,089 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,549 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,810 UART: [ldev] --
1,281,328 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,045 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,324 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,170,192 >>> mbox cmd response: failed
1,170,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,198 >>> mbox cmd response: failed
1,170,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,655 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,526 UART: [cold-reset] ++
1,170,912 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,174,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,027 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,321 UART: [fwproc] Wait for Commands...
1,283,126 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: [fwproc] Recv'd Img size: 114360 bytes
1,319,225 UART: ROM Fatal Error: 0x000B001C
1,320,384 >>> mbox cmd response: failed
1,320,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,390 >>> mbox cmd response: failed
1,320,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,871 UART: [state] LifecycleState = Unprovisioned
86,526 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,954 UART: [kat] ++
896,106 UART: [kat] sha1
900,314 UART: [kat] SHA2-256
902,254 UART: [kat] SHA2-384
905,223 UART: [kat] SHA2-512-ACC
907,124 UART: [kat] ECC-384
916,887 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,171,098 UART: [fht] FHT @ 0x50003400
1,173,888 UART: [idev] ++
1,174,056 UART: [idev] CDI.KEYID = 6
1,174,417 UART: [idev] SUBJECT.KEYID = 7
1,174,842 UART: [idev] UDS.KEYID = 0
1,175,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,702 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,345 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,787 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,211 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,374 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,651 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,171,109 >>> mbox cmd response: failed
1,171,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,115 >>> mbox cmd response: failed
1,171,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,223 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,744 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
4,880,259 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,040,687 >>> mbox cmd response: failed
14,041,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,041,651 >>> mbox cmd response: failed
14,041,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,042,229 >>> mbox cmd response: failed
Initializing fuses
2,066,056 writing to cptra_bootfsm_go
6,939,104 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,514,255 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
4,883,662 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,036,875 >>> mbox cmd response: failed
14,037,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,037,858 >>> mbox cmd response: failed
14,038,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,420 >>> mbox cmd response: failed
Initializing fuses
2,055,490 writing to cptra_bootfsm_go
6,924,899 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,491,822 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
5,188,654 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,203,843 >>> mbox cmd response: failed
14,204,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,204,994 >>> mbox cmd response: failed
14,205,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,205,556 >>> mbox cmd response: failed
Initializing fuses
2,056,980 writing to cptra_bootfsm_go
10,828,964 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,259,299 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
5,192,440 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,209,703 >>> mbox cmd response: failed
14,210,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,210,612 >>> mbox cmd response: failed
14,210,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,211,215 >>> mbox cmd response: failed
Initializing fuses
2,057,113 writing to cptra_bootfsm_go
10,829,672 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,262,302 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,461,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,474,815 >>> mbox cmd response: failed
10,475,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,475,683 >>> mbox cmd response: failed
10,475,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,243 >>> mbox cmd response: failed
Initializing fuses
2,057,713 writing to cptra_bootfsm_go
5,488,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,310,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,446,171 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,471,101 >>> mbox cmd response: failed
10,471,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,032 >>> mbox cmd response: failed
10,472,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,626 >>> mbox cmd response: failed
Initializing fuses
2,061,403 writing to cptra_bootfsm_go
5,506,906 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,333,441 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,485,928 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,462,923 >>> mbox cmd response: failed
10,464,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,411 >>> mbox cmd response: failed
10,464,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,998 >>> mbox cmd response: failed
Initializing fuses
2,058,273 writing to cptra_bootfsm_go
5,521,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,359,461 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,785,782 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,672,670 >>> mbox cmd response: failed
10,673,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,673,628 >>> mbox cmd response: failed
10,673,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,674,186 >>> mbox cmd response: failed
Initializing fuses
2,064,037 writing to cptra_bootfsm_go
12,978,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,693,201 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,786,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,689,765 >>> mbox cmd response: failed
10,690,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,690,679 >>> mbox cmd response: failed
10,690,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,691,245 >>> mbox cmd response: failed
Initializing fuses
2,055,664 writing to cptra_bootfsm_go
12,958,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,675,141 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,194,605 >>> mbox cmd response: failed
1,194,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,611 >>> mbox cmd response: failed
1,194,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,284 UART: [kat] HMAC-384Kdf
907,004 UART: [kat] LMS
1,475,200 UART: [kat] --
1,476,109 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,216 UART: [idev] ++
1,479,384 UART: [idev] CDI.KEYID = 6
1,479,744 UART: [idev] SUBJECT.KEYID = 7
1,480,168 UART: [idev] UDS.KEYID = 0
1,480,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,034 UART: [idev] Erasing UDS.KEYID = 0
1,504,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,056 UART: [idev] --
1,514,155 UART: [ldev] ++
1,514,323 UART: [ldev] CDI.KEYID = 6
1,514,686 UART: [ldev] SUBJECT.KEYID = 5
1,515,112 UART: [ldev] AUTHORITY.KEYID = 7
1,515,575 UART: [ldev] FE.KEYID = 1
1,520,511 UART: [ldev] Erasing FE.KEYID = 1
1,546,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,692 UART: [ldev] --
1,585,047 UART: [fwproc] Waiting for Commands...
1,585,904 UART: [fwproc] Received command 0x46574c44
1,586,695 UART: [fwproc] Received Image of size 114360 bytes
2,884,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,842 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,171 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,194,053 >>> mbox cmd response: failed
1,194,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,059 >>> mbox cmd response: failed
1,194,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,893 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,566 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,872 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,193,552 >>> mbox cmd response: failed
1,193,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,558 >>> mbox cmd response: failed
1,193,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,432 UART: [kat] SHA2-256
892,370 UART: [kat] SHA2-384
895,057 UART: [kat] SHA2-512-ACC
896,958 UART: [kat] ECC-384
902,593 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,441 UART: [idev] ++
1,479,609 UART: [idev] CDI.KEYID = 6
1,479,969 UART: [idev] SUBJECT.KEYID = 7
1,480,393 UART: [idev] UDS.KEYID = 0
1,480,738 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,493 UART: [idev] Erasing UDS.KEYID = 0
1,505,033 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,895 UART: [idev] --
1,514,802 UART: [ldev] ++
1,514,970 UART: [ldev] CDI.KEYID = 6
1,515,333 UART: [ldev] SUBJECT.KEYID = 5
1,515,759 UART: [ldev] AUTHORITY.KEYID = 7
1,516,222 UART: [ldev] FE.KEYID = 1
1,521,824 UART: [ldev] Erasing FE.KEYID = 1
1,546,737 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,787 UART: [ldev] --
1,586,124 UART: [fwproc] Waiting for Commands...
1,586,743 UART: [fwproc] Received command 0x46574c44
1,587,534 UART: [fwproc] Received Image of size 114360 bytes
2,884,690 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,048 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,069 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,084 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,195,714 >>> mbox cmd response: failed
1,195,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,720 >>> mbox cmd response: failed
1,195,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,427 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,555 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,194,745 >>> mbox cmd response: failed
1,194,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,751 >>> mbox cmd response: failed
1,194,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
893,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,177 UART: [kat] ++
897,329 UART: [kat] sha1
901,441 UART: [kat] SHA2-256
903,381 UART: [kat] SHA2-384
906,012 UART: [kat] SHA2-512-ACC
907,913 UART: [kat] ECC-384
918,000 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,869 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,175,066 UART: [idev] ++
1,175,234 UART: [idev] CDI.KEYID = 6
1,175,594 UART: [idev] SUBJECT.KEYID = 7
1,176,018 UART: [idev] UDS.KEYID = 0
1,176,363 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,120 UART: [idev] Erasing UDS.KEYID = 0
1,201,099 UART: [idev] Sha1 KeyId Algorithm
1,209,363 UART: [idev] --
1,210,583 UART: [ldev] ++
1,210,751 UART: [ldev] CDI.KEYID = 6
1,211,114 UART: [ldev] SUBJECT.KEYID = 5
1,211,540 UART: [ldev] AUTHORITY.KEYID = 7
1,212,003 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,844 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,049 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,193,045 >>> mbox cmd response: failed
1,193,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,051 >>> mbox cmd response: failed
1,193,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,285 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,988 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,195,496 >>> mbox cmd response: failed
1,195,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,502 >>> mbox cmd response: failed
1,195,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,815 UART: [kat] HMAC-384Kdf
923,273 UART: [kat] LMS
1,171,601 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,852 UART: [fht] FHT @ 0x50003400
1,175,519 UART: [idev] ++
1,175,687 UART: [idev] CDI.KEYID = 6
1,176,047 UART: [idev] SUBJECT.KEYID = 7
1,176,471 UART: [idev] UDS.KEYID = 0
1,176,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,649 UART: [idev] Erasing UDS.KEYID = 0
1,201,468 UART: [idev] Sha1 KeyId Algorithm
1,210,032 UART: [idev] --
1,210,944 UART: [ldev] ++
1,211,112 UART: [ldev] CDI.KEYID = 6
1,211,475 UART: [ldev] SUBJECT.KEYID = 5
1,211,901 UART: [ldev] AUTHORITY.KEYID = 7
1,212,364 UART: [ldev] FE.KEYID = 1
1,217,858 UART: [ldev] Erasing FE.KEYID = 1
1,244,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,226 UART: [ldev] --
1,283,689 UART: [fwproc] Wait for Commands...
1,284,277 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,684 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,194,318 >>> mbox cmd response: failed
1,194,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,324 >>> mbox cmd response: failed
1,194,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,222 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,251 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,194,417 >>> mbox cmd response: failed
1,194,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,423 >>> mbox cmd response: failed
1,194,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,308 UART: [kat] LMS
1,168,620 UART: [kat] --
1,169,315 UART: [cold-reset] ++
1,169,703 UART: [fht] FHT @ 0x50003400
1,172,423 UART: [idev] ++
1,172,591 UART: [idev] CDI.KEYID = 6
1,172,952 UART: [idev] SUBJECT.KEYID = 7
1,173,377 UART: [idev] UDS.KEYID = 0
1,173,723 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,199,089 UART: [idev] Sha1 KeyId Algorithm
1,207,869 UART: [idev] --
1,208,826 UART: [ldev] ++
1,208,994 UART: [ldev] CDI.KEYID = 6
1,209,358 UART: [ldev] SUBJECT.KEYID = 5
1,209,785 UART: [ldev] AUTHORITY.KEYID = 7
1,210,248 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,182 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,125 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,197 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,195,987 >>> mbox cmd response: failed
1,195,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,993 >>> mbox cmd response: failed
1,195,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,014 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,229 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,193,852 >>> mbox cmd response: failed
1,193,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,858 >>> mbox cmd response: failed
1,193,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,174,716 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,051 UART: [ldev] ++
1,209,219 UART: [ldev] CDI.KEYID = 6
1,209,583 UART: [ldev] SUBJECT.KEYID = 5
1,210,010 UART: [ldev] AUTHORITY.KEYID = 7
1,210,473 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,390 UART: [fwproc] Recv command 0x46574c44
1,283,123 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,450 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,480 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,195,300 >>> mbox cmd response: failed
1,195,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,306 >>> mbox cmd response: failed
1,195,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,412 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,309 UART:
192,664 UART: Running Caliptra ROM ...
193,856 UART:
194,006 UART: [state] CFI Enabled
266,810 UART: [state] LifecycleState = Unprovisioned
268,728 UART: [state] DebugLocked = No
271,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,777 UART: [kat] SHA2-256
446,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,967 UART: [kat] ++
457,419 UART: [kat] sha1
468,295 UART: [kat] SHA2-256
470,987 UART: [kat] SHA2-384
477,297 UART: [kat] SHA2-512-ACC
479,648 UART: [kat] ECC-384
2,768,797 UART: [kat] HMAC-384Kdf
2,799,201 UART: [kat] LMS
3,989,539 UART: [kat] --
3,993,023 UART: [cold-reset] ++
3,994,777 UART: [fht] Storing FHT @ 0x50003400
4,005,808 UART: [idev] ++
4,006,382 UART: [idev] CDI.KEYID = 6
4,007,404 UART: [idev] SUBJECT.KEYID = 7
4,008,572 UART: [idev] UDS.KEYID = 0
4,011,160 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,154,894 UART: [idev] Erasing UDS.KEYID = 0
7,344,361 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,061 UART: [idev] --
7,371,474 UART: [ldev] ++
7,372,055 UART: [ldev] CDI.KEYID = 6
7,373,026 UART: [ldev] SUBJECT.KEYID = 5
7,374,250 UART: [ldev] AUTHORITY.KEYID = 7
7,375,485 UART: [ldev] FE.KEYID = 1
7,420,268 UART: [ldev] Erasing FE.KEYID = 1
10,749,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,495 UART: [ldev] --
13,113,016 UART: [fwproc] Waiting for Commands...
13,115,282 UART: [fwproc] Received command 0x46574c44
13,117,484 UART: [fwproc] Received Image of size 114036 bytes
16,956,302 UART: ROM Fatal Error: 0x000B0030
16,959,712 >>> mbox cmd response: failed
16,960,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,960,483 >>> mbox cmd response: failed
16,960,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,961,044 >>> mbox cmd response: failed
Initializing fuses
2,052,564 writing to cptra_bootfsm_go
2,241,928 UART:
2,242,304 UART: Running Caliptra ROM ...
2,243,385 UART:
2,243,549 UART: [state] CFI Enabled
2,308,485 UART: [state] LifecycleState = Unprovisioned
2,310,414 UART: [state] DebugLocked = No
2,312,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,482 UART: [kat] SHA2-256
2,487,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,661 UART: [kat] ++
2,498,151 UART: [kat] sha1
2,507,688 UART: [kat] SHA2-256
2,510,391 UART: [kat] SHA2-384
2,516,276 UART: [kat] SHA2-512-ACC
2,518,625 UART: [kat] ECC-384
4,811,724 UART: [kat] HMAC-384Kdf
4,842,532 UART: [kat] LMS
6,032,849 UART: [kat] --
6,037,672 UART: [cold-reset] ++
6,039,234 UART: [fht] Storing FHT @ 0x50003400
6,050,238 UART: [idev] ++
6,050,815 UART: [idev] CDI.KEYID = 6
6,051,839 UART: [idev] SUBJECT.KEYID = 7
6,053,000 UART: [idev] UDS.KEYID = 0
6,055,163 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,198,701 UART: [idev] Erasing UDS.KEYID = 0
9,386,347 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,628 UART: [idev] --
9,411,888 UART: [ldev] ++
9,412,457 UART: [ldev] CDI.KEYID = 6
9,413,397 UART: [ldev] SUBJECT.KEYID = 5
9,414,699 UART: [ldev] AUTHORITY.KEYID = 7
9,415,803 UART: [ldev] FE.KEYID = 1
9,463,593 UART: [ldev] Erasing FE.KEYID = 1
12,799,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,141,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,177,116 UART: [ldev] --
15,182,001 UART: [fwproc] Waiting for Commands...
15,184,806 UART: [fwproc] Received command 0x46574c44
15,186,995 UART: [fwproc] Received Image of size 114036 bytes
19,240,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,316,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,385,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,702,161 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,806,985 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,449,635 >>> mbox cmd response: failed
16,450,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,450,627 >>> mbox cmd response: failed
16,450,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,451,192 >>> mbox cmd response: failed
Initializing fuses
2,051,286 writing to cptra_bootfsm_go
5,850,070 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,947,818 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,556 UART:
192,901 UART: Running Caliptra ROM ...
193,996 UART:
603,929 UART: [state] CFI Enabled
617,963 UART: [state] LifecycleState = Unprovisioned
619,906 UART: [state] DebugLocked = No
621,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,643 UART: [kat] SHA2-256
795,374 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,966 UART: [kat] ++
806,418 UART: [kat] sha1
817,725 UART: [kat] SHA2-256
820,461 UART: [kat] SHA2-384
825,845 UART: [kat] SHA2-512-ACC
828,238 UART: [kat] ECC-384
3,111,611 UART: [kat] HMAC-384Kdf
3,122,432 UART: [kat] LMS
4,312,547 UART: [kat] --
4,315,648 UART: [cold-reset] ++
4,317,804 UART: [fht] Storing FHT @ 0x50003400
4,327,832 UART: [idev] ++
4,328,404 UART: [idev] CDI.KEYID = 6
4,329,339 UART: [idev] SUBJECT.KEYID = 7
4,330,560 UART: [idev] UDS.KEYID = 0
4,333,208 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,476,736 UART: [idev] Erasing UDS.KEYID = 0
7,614,343 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,805 UART: [idev] --
7,640,746 UART: [ldev] ++
7,641,316 UART: [ldev] CDI.KEYID = 6
7,642,338 UART: [ldev] SUBJECT.KEYID = 5
7,643,496 UART: [ldev] AUTHORITY.KEYID = 7
7,644,784 UART: [ldev] FE.KEYID = 1
7,656,137 UART: [ldev] Erasing FE.KEYID = 1
10,944,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,893 UART: [ldev] --
13,303,868 UART: [fwproc] Waiting for Commands...
13,306,618 UART: [fwproc] Received command 0x46574c44
13,308,805 UART: [fwproc] Received Image of size 114036 bytes
17,078,143 UART: ROM Fatal Error: 0x000B0030
17,081,544 >>> mbox cmd response: failed
17,081,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,082,288 >>> mbox cmd response: failed
17,082,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,082,854 >>> mbox cmd response: failed
Initializing fuses
2,055,315 writing to cptra_bootfsm_go
2,244,639 UART:
2,245,011 UART: Running Caliptra ROM ...
2,246,160 UART:
3,391,111 UART: [state] CFI Enabled
3,404,124 UART: [state] LifecycleState = Unprovisioned
3,406,035 UART: [state] DebugLocked = No
3,407,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,412,713 UART: [kat] SHA2-256
3,582,456 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,592,978 UART: [kat] ++
3,593,521 UART: [kat] sha1
3,604,687 UART: [kat] SHA2-256
3,607,375 UART: [kat] SHA2-384
3,612,602 UART: [kat] SHA2-512-ACC
3,615,007 UART: [kat] ECC-384
5,897,112 UART: [kat] HMAC-384Kdf
5,908,508 UART: [kat] LMS
7,098,617 UART: [kat] --
7,104,296 UART: [cold-reset] ++
7,105,584 UART: [fht] Storing FHT @ 0x50003400
7,116,853 UART: [idev] ++
7,117,417 UART: [idev] CDI.KEYID = 6
7,118,356 UART: [idev] SUBJECT.KEYID = 7
7,119,622 UART: [idev] UDS.KEYID = 0
7,122,065 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
7,265,414 UART: [idev] Erasing UDS.KEYID = 0
10,403,888 UART: [idev] Using Sha1 for KeyId Algorithm
10,425,379 UART: [idev] --
10,430,107 UART: [ldev] ++
10,430,683 UART: [ldev] CDI.KEYID = 6
10,431,648 UART: [ldev] SUBJECT.KEYID = 5
10,432,917 UART: [ldev] AUTHORITY.KEYID = 7
10,434,154 UART: [ldev] FE.KEYID = 1
10,444,497 UART: [ldev] Erasing FE.KEYID = 1
13,733,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,026,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,041,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,055,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,070,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,088,329 UART: [ldev] --
16,093,323 UART: [fwproc] Waiting for Commands...
16,095,420 UART: [fwproc] Received command 0x46574c44
16,097,916 UART: [fwproc] Received Image of size 114036 bytes
20,151,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,231,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,300,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,617,818 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
4,126,392 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,498,280 >>> mbox cmd response: failed
16,498,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,499,188 >>> mbox cmd response: failed
16,499,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,499,752 >>> mbox cmd response: failed
Initializing fuses
2,053,472 writing to cptra_bootfsm_go
7,497,981 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,442,123 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,118 UART:
192,485 UART: Running Caliptra ROM ...
193,714 UART:
193,866 UART: [state] CFI Enabled
264,549 UART: [state] LifecycleState = Unprovisioned
266,469 UART: [state] DebugLocked = No
267,959 UART: [state] WD Timer not started. Device not locked for debugging
272,545 UART: [kat] SHA2-256
451,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,237 UART: [kat] ++
463,769 UART: [kat] sha1
474,705 UART: [kat] SHA2-256
477,716 UART: [kat] SHA2-384
483,423 UART: [kat] SHA2-512-ACC
486,355 UART: [kat] ECC-384
2,950,454 UART: [kat] HMAC-384Kdf
2,973,981 UART: [kat] LMS
3,503,439 UART: [kat] --
3,508,487 UART: [cold-reset] ++
3,510,267 UART: [fht] FHT @ 0x50003400
3,520,943 UART: [idev] ++
3,521,509 UART: [idev] CDI.KEYID = 6
3,522,392 UART: [idev] SUBJECT.KEYID = 7
3,523,605 UART: [idev] UDS.KEYID = 0
3,526,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,352 UART: [idev] Erasing UDS.KEYID = 0
6,027,653 UART: [idev] Sha1 KeyId Algorithm
6,050,612 UART: [idev] --
6,054,126 UART: [ldev] ++
6,054,695 UART: [ldev] CDI.KEYID = 6
6,055,609 UART: [ldev] SUBJECT.KEYID = 5
6,056,828 UART: [ldev] AUTHORITY.KEYID = 7
6,058,068 UART: [ldev] FE.KEYID = 1
6,103,389 UART: [ldev] Erasing FE.KEYID = 1
8,605,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,114 UART: [ldev] --
10,415,864 UART: [fwproc] Wait for Commands...
10,417,578 UART: [fwproc] Recv command 0x46574c44
10,419,677 UART: [fwproc] Recv'd Img size: 114360 bytes
12,069,941 UART: ROM Fatal Error: 0x000B0030
12,073,056 >>> mbox cmd response: failed
12,073,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,073,811 >>> mbox cmd response: failed
12,074,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,074,412 >>> mbox cmd response: failed
Initializing fuses
2,051,031 writing to cptra_bootfsm_go
2,240,316 UART:
2,240,667 UART: Running Caliptra ROM ...
2,241,711 UART:
2,241,864 UART: [state] CFI Enabled
2,313,224 UART: [state] LifecycleState = Unprovisioned
2,315,106 UART: [state] DebugLocked = No
2,316,847 UART: [state] WD Timer not started. Device not locked for debugging
2,320,594 UART: [kat] SHA2-256
2,499,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,305 UART: [kat] ++
2,511,849 UART: [kat] sha1
2,522,202 UART: [kat] SHA2-256
2,525,269 UART: [kat] SHA2-384
2,530,276 UART: [kat] SHA2-512-ACC
2,533,227 UART: [kat] ECC-384
4,996,086 UART: [kat] HMAC-384Kdf
5,019,451 UART: [kat] LMS
5,548,873 UART: [kat] --
5,552,995 UART: [cold-reset] ++
5,554,636 UART: [fht] FHT @ 0x50003400
5,565,946 UART: [idev] ++
5,566,512 UART: [idev] CDI.KEYID = 6
5,567,531 UART: [idev] SUBJECT.KEYID = 7
5,568,630 UART: [idev] UDS.KEYID = 0
5,570,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,714,932 UART: [idev] Erasing UDS.KEYID = 0
8,074,856 UART: [idev] Sha1 KeyId Algorithm
8,097,273 UART: [idev] --
8,101,920 UART: [ldev] ++
8,102,492 UART: [ldev] CDI.KEYID = 6
8,103,401 UART: [ldev] SUBJECT.KEYID = 5
8,104,638 UART: [ldev] AUTHORITY.KEYID = 7
8,105,882 UART: [ldev] FE.KEYID = 1
8,146,777 UART: [ldev] Erasing FE.KEYID = 1
10,647,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,415,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,435,380 UART: [ldev] --
12,439,578 UART: [fwproc] Wait for Commands...
12,441,944 UART: [fwproc] Recv command 0x46574c44
12,444,038 UART: [fwproc] Recv'd Img size: 114360 bytes
15,850,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,920,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,989,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,308,433 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,029 UART:
192,399 UART: Running Caliptra ROM ...
193,599 UART:
193,760 UART: [state] CFI Enabled
264,734 UART: [state] LifecycleState = Unprovisioned
267,140 UART: [state] DebugLocked = No
269,390 UART: [state] WD Timer not started. Device not locked for debugging
273,613 UART: [kat] SHA2-256
463,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,287 UART: [kat] ++
474,732 UART: [kat] sha1
486,208 UART: [kat] SHA2-256
489,254 UART: [kat] SHA2-384
496,375 UART: [kat] SHA2-512-ACC
498,934 UART: [kat] ECC-384
2,949,001 UART: [kat] HMAC-384Kdf
2,974,515 UART: [kat] LMS
3,506,296 UART: [kat] --
3,510,669 UART: [cold-reset] ++
3,512,338 UART: [fht] FHT @ 0x50003400
3,522,839 UART: [idev] ++
3,523,516 UART: [idev] CDI.KEYID = 6
3,524,487 UART: [idev] SUBJECT.KEYID = 7
3,525,742 UART: [idev] UDS.KEYID = 0
3,528,322 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,202 UART: [idev] Erasing UDS.KEYID = 0
6,032,837 UART: [idev] Sha1 KeyId Algorithm
6,055,868 UART: [idev] --
6,061,758 UART: [ldev] ++
6,062,448 UART: [ldev] CDI.KEYID = 6
6,063,333 UART: [ldev] SUBJECT.KEYID = 5
6,064,546 UART: [ldev] AUTHORITY.KEYID = 7
6,065,778 UART: [ldev] FE.KEYID = 1
6,103,064 UART: [ldev] Erasing FE.KEYID = 1
8,609,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,881 UART: [ldev] --
10,414,672 UART: [fwproc] Wait for Commands...
10,417,702 UART: [fwproc] Recv command 0x46574c44
10,419,965 UART: [fwproc] Recv'd Img size: 114360 bytes
12,076,732 UART: ROM Fatal Error: 0x000B0030
12,080,161 >>> mbox cmd response: failed
12,080,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,080,920 >>> mbox cmd response: failed
12,081,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,081,482 >>> mbox cmd response: failed
Initializing fuses
2,053,669 writing to cptra_bootfsm_go
2,242,978 UART:
2,243,509 UART: Running Caliptra ROM ...
2,244,602 UART:
2,244,793 UART: [state] CFI Enabled
2,306,001 UART: [state] LifecycleState = Unprovisioned
2,308,352 UART: [state] DebugLocked = No
2,310,548 UART: [state] WD Timer not started. Device not locked for debugging
2,315,233 UART: [kat] SHA2-256
2,505,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,908 UART: [kat] ++
2,516,458 UART: [kat] sha1
2,527,570 UART: [kat] SHA2-256
2,530,593 UART: [kat] SHA2-384
2,537,768 UART: [kat] SHA2-512-ACC
2,540,343 UART: [kat] ECC-384
4,990,556 UART: [kat] HMAC-384Kdf
5,015,490 UART: [kat] LMS
5,547,240 UART: [kat] --
5,551,126 UART: [cold-reset] ++
5,553,620 UART: [fht] FHT @ 0x50003400
5,566,063 UART: [idev] ++
5,566,754 UART: [idev] CDI.KEYID = 6
5,567,688 UART: [idev] SUBJECT.KEYID = 7
5,568,904 UART: [idev] UDS.KEYID = 0
5,571,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,715,042 UART: [idev] Erasing UDS.KEYID = 0
8,075,049 UART: [idev] Sha1 KeyId Algorithm
8,097,854 UART: [idev] --
8,103,021 UART: [ldev] ++
8,103,725 UART: [ldev] CDI.KEYID = 6
8,104,636 UART: [ldev] SUBJECT.KEYID = 5
8,105,802 UART: [ldev] AUTHORITY.KEYID = 7
8,107,037 UART: [ldev] FE.KEYID = 1
8,144,632 UART: [ldev] Erasing FE.KEYID = 1
10,653,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,365 UART: [ldev] --
12,459,601 UART: [fwproc] Wait for Commands...
12,462,397 UART: [fwproc] Recv command 0x46574c44
12,464,662 UART: [fwproc] Recv'd Img size: 114360 bytes
15,917,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,653,415 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,439,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,862,827 >>> mbox cmd response: failed
11,863,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,863,777 >>> mbox cmd response: failed
11,864,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,864,343 >>> mbox cmd response: failed
Initializing fuses
2,052,440 writing to cptra_bootfsm_go
5,484,258 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,760,446 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,438 UART:
192,794 UART: Running Caliptra ROM ...
193,956 UART:
603,626 UART: [state] CFI Enabled
617,398 UART: [state] LifecycleState = Unprovisioned
619,728 UART: [state] DebugLocked = No
622,614 UART: [state] WD Timer not started. Device not locked for debugging
626,657 UART: [kat] SHA2-256
816,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,262 UART: [kat] ++
827,795 UART: [kat] sha1
840,783 UART: [kat] SHA2-256
843,790 UART: [kat] SHA2-384
849,611 UART: [kat] SHA2-512-ACC
852,220 UART: [kat] ECC-384
3,294,862 UART: [kat] HMAC-384Kdf
3,307,655 UART: [kat] LMS
3,839,455 UART: [kat] --
3,844,223 UART: [cold-reset] ++
3,845,839 UART: [fht] FHT @ 0x50003400
3,858,006 UART: [idev] ++
3,858,690 UART: [idev] CDI.KEYID = 6
3,859,707 UART: [idev] SUBJECT.KEYID = 7
3,860,870 UART: [idev] UDS.KEYID = 0
3,863,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,411 UART: [idev] Erasing UDS.KEYID = 0
6,340,507 UART: [idev] Sha1 KeyId Algorithm
6,362,972 UART: [idev] --
6,366,774 UART: [ldev] ++
6,367,460 UART: [ldev] CDI.KEYID = 6
6,368,348 UART: [ldev] SUBJECT.KEYID = 5
6,369,564 UART: [ldev] AUTHORITY.KEYID = 7
6,370,797 UART: [ldev] FE.KEYID = 1
6,381,256 UART: [ldev] Erasing FE.KEYID = 1
8,864,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,345 UART: [ldev] --
10,656,286 UART: [fwproc] Wait for Commands...
10,659,457 UART: [fwproc] Recv command 0x46574c44
10,661,767 UART: [fwproc] Recv'd Img size: 114360 bytes
12,362,264 UART: ROM Fatal Error: 0x000B0030
12,365,700 >>> mbox cmd response: failed
12,366,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,366,355 >>> mbox cmd response: failed
12,366,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,366,958 >>> mbox cmd response: failed
Initializing fuses
2,052,190 writing to cptra_bootfsm_go
2,241,476 UART:
2,241,814 UART: Running Caliptra ROM ...
2,242,864 UART:
8,105,565 UART: [state] CFI Enabled
8,120,274 UART: [state] LifecycleState = Unprovisioned
8,122,676 UART: [state] DebugLocked = No
8,124,112 UART: [state] WD Timer not started. Device not locked for debugging
8,128,685 UART: [kat] SHA2-256
8,318,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,329,348 UART: [kat] ++
8,329,943 UART: [kat] sha1
8,342,189 UART: [kat] SHA2-256
8,345,211 UART: [kat] SHA2-384
8,351,170 UART: [kat] SHA2-512-ACC
8,353,739 UART: [kat] ECC-384
10,794,217 UART: [kat] HMAC-384Kdf
10,806,824 UART: [kat] LMS
11,338,688 UART: [kat] --
11,342,739 UART: [cold-reset] ++
11,343,589 UART: [fht] FHT @ 0x50003400
11,354,734 UART: [idev] ++
11,355,404 UART: [idev] CDI.KEYID = 6
11,356,419 UART: [idev] SUBJECT.KEYID = 7
11,357,578 UART: [idev] UDS.KEYID = 0
11,359,809 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,503,540 UART: [idev] Erasing UDS.KEYID = 0
13,833,195 UART: [idev] Sha1 KeyId Algorithm
13,856,209 UART: [idev] --
13,861,554 UART: [ldev] ++
13,862,305 UART: [ldev] CDI.KEYID = 6
13,863,221 UART: [ldev] SUBJECT.KEYID = 5
13,864,376 UART: [ldev] AUTHORITY.KEYID = 7
13,865,550 UART: [ldev] FE.KEYID = 1
13,876,088 UART: [ldev] Erasing FE.KEYID = 1
16,353,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,073,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,088,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,103,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,118,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,140,539 UART: [ldev] --
18,145,297 UART: [fwproc] Wait for Commands...
18,148,540 UART: [fwproc] Recv command 0x46574c44
18,150,812 UART: [fwproc] Recv'd Img size: 114360 bytes
21,597,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,674,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,791,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
22,334,196 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,754,138 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,068,593 >>> mbox cmd response: failed
12,069,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,069,506 >>> mbox cmd response: failed
12,069,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,070,068 >>> mbox cmd response: failed
Initializing fuses
2,051,815 writing to cptra_bootfsm_go
11,552,966 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,754,476 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,459 UART: [kat] SHA2-256
892,397 UART: [kat] SHA2-384
894,976 UART: [kat] SHA2-512-ACC
896,877 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,457 UART: [fht] Storing FHT @ 0x50003400
1,479,226 UART: [idev] ++
1,479,394 UART: [idev] CDI.KEYID = 6
1,479,754 UART: [idev] SUBJECT.KEYID = 7
1,480,178 UART: [idev] UDS.KEYID = 0
1,480,523 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,110 UART: [idev] Erasing UDS.KEYID = 0
1,504,720 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,370 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,521,077 UART: [ldev] Erasing FE.KEYID = 1
1,546,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,296 UART: [ldev] --
1,585,577 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 114360 bytes
2,914,177 UART: ROM Fatal Error: 0x000B0030
2,915,334 >>> mbox cmd response: failed
2,915,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,915,340 >>> mbox cmd response: failed
2,915,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,915,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
907,066 UART: [kat] LMS
1,475,262 UART: [kat] --
1,476,109 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,378 UART: [idev] ++
1,479,546 UART: [idev] CDI.KEYID = 6
1,479,906 UART: [idev] SUBJECT.KEYID = 7
1,480,330 UART: [idev] UDS.KEYID = 0
1,480,675 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,386 UART: [idev] Erasing UDS.KEYID = 0
1,505,274 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,020 UART: [idev] --
1,515,137 UART: [ldev] ++
1,515,305 UART: [ldev] CDI.KEYID = 6
1,515,668 UART: [ldev] SUBJECT.KEYID = 5
1,516,094 UART: [ldev] AUTHORITY.KEYID = 7
1,516,557 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,547,306 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,452 UART: [ldev] --
1,586,847 UART: [fwproc] Waiting for Commands...
1,587,526 UART: [fwproc] Received command 0x46574c44
1,588,317 UART: [fwproc] Received Image of size 114360 bytes
2,886,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,930 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,959 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,577,352 >>> mbox cmd response: failed
2,577,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,358 >>> mbox cmd response: failed
2,577,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,391 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,084 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,845 UART: [kat] SHA2-512-ACC
897,746 UART: [kat] ECC-384
903,619 UART: [kat] HMAC-384Kdf
908,235 UART: [kat] LMS
1,476,431 UART: [kat] --
1,477,302 UART: [cold-reset] ++
1,477,762 UART: [fht] Storing FHT @ 0x50003400
1,480,517 UART: [idev] ++
1,480,685 UART: [idev] CDI.KEYID = 6
1,481,045 UART: [idev] SUBJECT.KEYID = 7
1,481,469 UART: [idev] UDS.KEYID = 0
1,481,814 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,567 UART: [idev] Erasing UDS.KEYID = 0
1,505,697 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,303 UART: [idev] --
1,515,406 UART: [ldev] ++
1,515,574 UART: [ldev] CDI.KEYID = 6
1,515,937 UART: [ldev] SUBJECT.KEYID = 5
1,516,363 UART: [ldev] AUTHORITY.KEYID = 7
1,516,826 UART: [ldev] FE.KEYID = 1
1,522,266 UART: [ldev] Erasing FE.KEYID = 1
1,547,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,005 UART: [ldev] --
1,587,316 UART: [fwproc] Waiting for Commands...
1,588,075 UART: [fwproc] Received command 0x46574c44
1,588,866 UART: [fwproc] Received Image of size 114360 bytes
2,801,655 UART: ROM Fatal Error: 0x000B0030
2,802,812 >>> mbox cmd response: failed
2,802,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,802,818 >>> mbox cmd response: failed
2,802,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,802,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,326 UART: [kat] SHA2-256
892,264 UART: [kat] SHA2-384
895,175 UART: [kat] SHA2-512-ACC
897,076 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,319 UART: [kat] LMS
1,475,515 UART: [kat] --
1,476,260 UART: [cold-reset] ++
1,476,784 UART: [fht] Storing FHT @ 0x50003400
1,479,601 UART: [idev] ++
1,479,769 UART: [idev] CDI.KEYID = 6
1,480,129 UART: [idev] SUBJECT.KEYID = 7
1,480,553 UART: [idev] UDS.KEYID = 0
1,480,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,873 UART: [idev] Erasing UDS.KEYID = 0
1,505,339 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,113 UART: [idev] --
1,515,206 UART: [ldev] ++
1,515,374 UART: [ldev] CDI.KEYID = 6
1,515,737 UART: [ldev] SUBJECT.KEYID = 5
1,516,163 UART: [ldev] AUTHORITY.KEYID = 7
1,516,626 UART: [ldev] FE.KEYID = 1
1,521,908 UART: [ldev] Erasing FE.KEYID = 1
1,547,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,228 UART: [fwproc] Waiting for Commands...
1,587,867 UART: [fwproc] Received command 0x46574c44
1,588,658 UART: [fwproc] Received Image of size 114360 bytes
2,885,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,003 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,579,411 >>> mbox cmd response: failed
2,579,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,417 >>> mbox cmd response: failed
2,579,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,505 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,171,697 UART: [cold-reset] ++
1,172,197 UART: [fht] FHT @ 0x50003400
1,174,904 UART: [idev] ++
1,175,072 UART: [idev] CDI.KEYID = 6
1,175,432 UART: [idev] SUBJECT.KEYID = 7
1,175,856 UART: [idev] UDS.KEYID = 0
1,176,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,200,989 UART: [idev] Sha1 KeyId Algorithm
1,209,553 UART: [idev] --
1,210,719 UART: [ldev] ++
1,210,887 UART: [ldev] CDI.KEYID = 6
1,211,250 UART: [ldev] SUBJECT.KEYID = 5
1,211,676 UART: [ldev] AUTHORITY.KEYID = 7
1,212,139 UART: [ldev] FE.KEYID = 1
1,217,259 UART: [ldev] Erasing FE.KEYID = 1
1,244,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,991 UART: [ldev] --
1,283,256 UART: [fwproc] Wait for Commands...
1,283,882 UART: [fwproc] Recv command 0x46574c44
1,284,610 UART: [fwproc] Recv'd Img size: 114360 bytes
1,595,201 UART: ROM Fatal Error: 0x000B0030
1,596,358 >>> mbox cmd response: failed
1,596,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,364 >>> mbox cmd response: failed
1,596,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,494 UART: [state] LifecycleState = Unprovisioned
85,149 UART: [state] DebugLocked = No
85,865 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
892,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,913 UART: [kat] ++
897,065 UART: [kat] sha1
901,223 UART: [kat] SHA2-256
903,163 UART: [kat] SHA2-384
905,866 UART: [kat] SHA2-512-ACC
907,767 UART: [kat] ECC-384
917,412 UART: [kat] HMAC-384Kdf
922,202 UART: [kat] LMS
1,170,530 UART: [kat] --
1,171,483 UART: [cold-reset] ++
1,171,827 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,391 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,693 UART: [ldev] ++
1,209,861 UART: [ldev] CDI.KEYID = 6
1,210,224 UART: [ldev] SUBJECT.KEYID = 5
1,210,650 UART: [ldev] AUTHORITY.KEYID = 7
1,211,113 UART: [ldev] FE.KEYID = 1
1,216,243 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,730 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,574 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,369 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,453,482 >>> mbox cmd response: failed
1,453,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,488 >>> mbox cmd response: failed
1,453,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
918,129 UART: [kat] HMAC-384Kdf
922,751 UART: [kat] LMS
1,171,079 UART: [kat] --
1,171,890 UART: [cold-reset] ++
1,172,392 UART: [fht] FHT @ 0x50003400
1,175,021 UART: [idev] ++
1,175,189 UART: [idev] CDI.KEYID = 6
1,175,549 UART: [idev] SUBJECT.KEYID = 7
1,175,973 UART: [idev] UDS.KEYID = 0
1,176,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,585 UART: [idev] Erasing UDS.KEYID = 0
1,200,862 UART: [idev] Sha1 KeyId Algorithm
1,209,364 UART: [idev] --
1,210,256 UART: [ldev] ++
1,210,424 UART: [ldev] CDI.KEYID = 6
1,210,787 UART: [ldev] SUBJECT.KEYID = 5
1,211,213 UART: [ldev] AUTHORITY.KEYID = 7
1,211,676 UART: [ldev] FE.KEYID = 1
1,216,906 UART: [ldev] Erasing FE.KEYID = 1
1,242,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,222 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,067 UART: [fwproc] Recv'd Img size: 114360 bytes
1,595,697 UART: ROM Fatal Error: 0x000B0030
1,596,854 >>> mbox cmd response: failed
1,596,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,860 >>> mbox cmd response: failed
1,596,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
893,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,396 UART: [kat] ++
897,548 UART: [kat] sha1
901,600 UART: [kat] SHA2-256
903,540 UART: [kat] SHA2-384
906,375 UART: [kat] SHA2-512-ACC
908,276 UART: [kat] ECC-384
917,897 UART: [kat] HMAC-384Kdf
922,469 UART: [kat] LMS
1,170,797 UART: [kat] --
1,171,650 UART: [cold-reset] ++
1,172,150 UART: [fht] FHT @ 0x50003400
1,174,867 UART: [idev] ++
1,175,035 UART: [idev] CDI.KEYID = 6
1,175,395 UART: [idev] SUBJECT.KEYID = 7
1,175,819 UART: [idev] UDS.KEYID = 0
1,176,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,919 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,778 UART: [idev] --
1,210,744 UART: [ldev] ++
1,210,912 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,701 UART: [ldev] AUTHORITY.KEYID = 7
1,212,164 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,620 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,705 UART: [fwproc] Recv command 0x46574c44
1,284,433 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,728 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,445,462 >>> mbox cmd response: failed
1,445,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,468 >>> mbox cmd response: failed
1,445,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,855 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,903 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,566 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,701 UART: [fwproc] Recv command 0x46574c44
1,282,434 UART: [fwproc] Recv'd Img size: 114360 bytes
1,597,683 UART: ROM Fatal Error: 0x000B0030
1,598,840 >>> mbox cmd response: failed
1,598,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,846 >>> mbox cmd response: failed
1,598,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,918 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,455 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,215,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,568 UART: [ldev] --
1,279,898 UART: [fwproc] Wait for Commands...
1,280,533 UART: [fwproc] Recv command 0x46574c44
1,281,266 UART: [fwproc] Recv'd Img size: 114360 bytes
2,577,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,079 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,967 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,204 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,454,142 >>> mbox cmd response: failed
1,454,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,148 >>> mbox cmd response: failed
1,454,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,283 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,190 UART: [kat] SHA2-256
902,130 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,125 UART: [kat] LMS
1,169,437 UART: [kat] --
1,170,434 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 114360 bytes
1,591,763 UART: ROM Fatal Error: 0x000B0030
1,592,920 >>> mbox cmd response: failed
1,592,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,926 >>> mbox cmd response: failed
1,592,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,174,168 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,676 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,548 UART: [idev] --
1,208,455 UART: [ldev] ++
1,208,623 UART: [ldev] CDI.KEYID = 6
1,208,987 UART: [ldev] SUBJECT.KEYID = 5
1,209,414 UART: [ldev] AUTHORITY.KEYID = 7
1,209,877 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,241,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,513 UART: [ldev] --
1,280,947 UART: [fwproc] Wait for Commands...
1,281,736 UART: [fwproc] Recv command 0x46574c44
1,282,469 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,562 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,446,704 >>> mbox cmd response: failed
1,446,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,710 >>> mbox cmd response: failed
1,446,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,314 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,113 UART:
192,477 UART: Running Caliptra ROM ...
193,609 UART:
193,753 UART: [state] CFI Enabled
264,451 UART: [state] LifecycleState = Unprovisioned
266,393 UART: [state] DebugLocked = No
269,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,066 UART: [kat] SHA2-256
443,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,282 UART: [kat] ++
454,756 UART: [kat] sha1
465,529 UART: [kat] SHA2-256
468,214 UART: [kat] SHA2-384
474,403 UART: [kat] SHA2-512-ACC
476,796 UART: [kat] ECC-384
2,767,689 UART: [kat] HMAC-384Kdf
2,800,339 UART: [kat] LMS
3,990,622 UART: [kat] --
3,993,943 UART: [cold-reset] ++
3,996,370 UART: [fht] Storing FHT @ 0x50003400
4,008,232 UART: [idev] ++
4,008,885 UART: [idev] CDI.KEYID = 6
4,009,802 UART: [idev] SUBJECT.KEYID = 7
4,011,025 UART: [idev] UDS.KEYID = 0
4,013,883 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,157,548 UART: [idev] Erasing UDS.KEYID = 0
7,345,424 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,089 UART: [idev] --
7,370,767 UART: [ldev] ++
7,371,342 UART: [ldev] CDI.KEYID = 6
7,372,363 UART: [ldev] SUBJECT.KEYID = 5
7,373,528 UART: [ldev] AUTHORITY.KEYID = 7
7,374,772 UART: [ldev] FE.KEYID = 1
7,422,314 UART: [ldev] Erasing FE.KEYID = 1
10,755,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,592 UART: [ldev] --
13,117,587 UART: [fwproc] Waiting for Commands...
13,119,418 UART: [fwproc] Received command 0x46574c44
13,121,604 UART: [fwproc] Received Image of size 114036 bytes
13,196,614 UART: ROM Fatal Error: 0x000B0032
13,200,080 >>> mbox cmd response: failed
13,200,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,200,849 >>> mbox cmd response: failed
13,201,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,201,409 >>> mbox cmd response: failed
Initializing fuses
2,048,265 writing to cptra_bootfsm_go
2,237,533 UART:
2,237,899 UART: Running Caliptra ROM ...
2,238,952 UART:
2,239,105 UART: [state] CFI Enabled
2,315,080 UART: [state] LifecycleState = Unprovisioned
2,317,022 UART: [state] DebugLocked = No
2,319,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,360 UART: [kat] SHA2-256
2,494,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,534 UART: [kat] ++
2,505,031 UART: [kat] sha1
2,515,717 UART: [kat] SHA2-256
2,518,366 UART: [kat] SHA2-384
2,523,671 UART: [kat] SHA2-512-ACC
2,526,026 UART: [kat] ECC-384
4,817,289 UART: [kat] HMAC-384Kdf
4,850,414 UART: [kat] LMS
6,040,756 UART: [kat] --
6,044,232 UART: [cold-reset] ++
6,046,116 UART: [fht] Storing FHT @ 0x50003400
6,059,276 UART: [idev] ++
6,059,852 UART: [idev] CDI.KEYID = 6
6,060,734 UART: [idev] SUBJECT.KEYID = 7
6,062,004 UART: [idev] UDS.KEYID = 0
6,064,583 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,208,124 UART: [idev] Erasing UDS.KEYID = 0
9,397,207 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,484 UART: [idev] --
9,422,266 UART: [ldev] ++
9,422,836 UART: [ldev] CDI.KEYID = 6
9,423,801 UART: [ldev] SUBJECT.KEYID = 5
9,425,073 UART: [ldev] AUTHORITY.KEYID = 7
9,426,261 UART: [ldev] FE.KEYID = 1
9,472,327 UART: [ldev] Erasing FE.KEYID = 1
12,805,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,122,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,337 UART: [ldev] --
15,189,495 UART: [fwproc] Waiting for Commands...
15,191,270 UART: [fwproc] Received command 0x46574c44
15,193,454 UART: [fwproc] Received Image of size 114036 bytes
19,248,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,327,736 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,396,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,713,086 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,808,238 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,953,811 >>> mbox cmd response: failed
12,954,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,954,749 >>> mbox cmd response: failed
12,955,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,955,314 >>> mbox cmd response: failed
Initializing fuses
2,051,651 writing to cptra_bootfsm_go
5,843,186 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,931,570 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,479 UART:
192,857 UART: Running Caliptra ROM ...
193,984 UART:
603,530 UART: [state] CFI Enabled
616,269 UART: [state] LifecycleState = Unprovisioned
618,157 UART: [state] DebugLocked = No
619,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,337 UART: [kat] SHA2-256
794,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,618 UART: [kat] ++
805,105 UART: [kat] sha1
816,096 UART: [kat] SHA2-256
818,807 UART: [kat] SHA2-384
826,150 UART: [kat] SHA2-512-ACC
828,484 UART: [kat] ECC-384
3,114,720 UART: [kat] HMAC-384Kdf
3,126,706 UART: [kat] LMS
4,316,799 UART: [kat] --
4,320,992 UART: [cold-reset] ++
4,323,306 UART: [fht] Storing FHT @ 0x50003400
4,333,718 UART: [idev] ++
4,334,288 UART: [idev] CDI.KEYID = 6
4,335,308 UART: [idev] SUBJECT.KEYID = 7
4,336,469 UART: [idev] UDS.KEYID = 0
4,339,912 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,848 UART: [idev] Erasing UDS.KEYID = 0
7,622,940 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,952 UART: [idev] --
7,648,060 UART: [ldev] ++
7,648,638 UART: [ldev] CDI.KEYID = 6
7,649,552 UART: [ldev] SUBJECT.KEYID = 5
7,650,772 UART: [ldev] AUTHORITY.KEYID = 7
7,652,062 UART: [ldev] FE.KEYID = 1
7,662,498 UART: [ldev] Erasing FE.KEYID = 1
10,949,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,594 UART: [ldev] --
13,309,096 UART: [fwproc] Waiting for Commands...
13,311,908 UART: [fwproc] Received command 0x46574c44
13,314,119 UART: [fwproc] Received Image of size 114036 bytes
13,387,750 UART: ROM Fatal Error: 0x000B0032
13,391,270 >>> mbox cmd response: failed
13,391,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,024 >>> mbox cmd response: failed
13,392,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,588 >>> mbox cmd response: failed
Initializing fuses
2,054,400 writing to cptra_bootfsm_go
2,243,657 UART:
2,244,024 UART: Running Caliptra ROM ...
2,245,290 UART:
7,076,580 UART: [state] CFI Enabled
7,094,277 UART: [state] LifecycleState = Unprovisioned
7,096,197 UART: [state] DebugLocked = No
7,098,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,103,666 UART: [kat] SHA2-256
7,273,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,283,984 UART: [kat] ++
7,284,442 UART: [kat] sha1
7,295,381 UART: [kat] SHA2-256
7,298,084 UART: [kat] SHA2-384
7,304,619 UART: [kat] SHA2-512-ACC
7,306,973 UART: [kat] ECC-384
9,591,871 UART: [kat] HMAC-384Kdf
9,604,264 UART: [kat] LMS
10,794,402 UART: [kat] --
10,799,490 UART: [cold-reset] ++
10,801,157 UART: [fht] Storing FHT @ 0x50003400
10,813,900 UART: [idev] ++
10,814,476 UART: [idev] CDI.KEYID = 6
10,815,497 UART: [idev] SUBJECT.KEYID = 7
10,816,655 UART: [idev] UDS.KEYID = 0
10,819,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,962,682 UART: [idev] Erasing UDS.KEYID = 0
14,101,868 UART: [idev] Using Sha1 for KeyId Algorithm
14,124,930 UART: [idev] --
14,129,084 UART: [ldev] ++
14,129,658 UART: [ldev] CDI.KEYID = 6
14,130,601 UART: [ldev] SUBJECT.KEYID = 5
14,131,861 UART: [ldev] AUTHORITY.KEYID = 7
14,133,044 UART: [ldev] FE.KEYID = 1
14,144,282 UART: [ldev] Erasing FE.KEYID = 1
17,430,346 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,722,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,736,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,751,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,766,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,784,940 UART: [ldev] --
19,789,236 UART: [fwproc] Waiting for Commands...
19,791,503 UART: [fwproc] Received command 0x46574c44
19,793,692 UART: [fwproc] Received Image of size 114036 bytes
23,847,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,919,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,988,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,306,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,131,445 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,129,812 >>> mbox cmd response: failed
13,130,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,130,748 >>> mbox cmd response: failed
13,131,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,131,334 >>> mbox cmd response: failed
Initializing fuses
2,044,481 writing to cptra_bootfsm_go
10,859,289 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,800,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,306 UART:
192,664 UART: Running Caliptra ROM ...
193,859 UART:
194,012 UART: [state] CFI Enabled
261,910 UART: [state] LifecycleState = Unprovisioned
263,801 UART: [state] DebugLocked = No
265,776 UART: [state] WD Timer not started. Device not locked for debugging
268,736 UART: [kat] SHA2-256
447,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,438 UART: [kat] ++
459,974 UART: [kat] sha1
472,131 UART: [kat] SHA2-256
475,184 UART: [kat] SHA2-384
480,789 UART: [kat] SHA2-512-ACC
483,723 UART: [kat] ECC-384
2,947,452 UART: [kat] HMAC-384Kdf
2,969,112 UART: [kat] LMS
3,498,560 UART: [kat] --
3,502,571 UART: [cold-reset] ++
3,503,587 UART: [fht] FHT @ 0x50003400
3,514,561 UART: [idev] ++
3,515,167 UART: [idev] CDI.KEYID = 6
3,516,087 UART: [idev] SUBJECT.KEYID = 7
3,517,253 UART: [idev] UDS.KEYID = 0
3,520,162 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,664,056 UART: [idev] Erasing UDS.KEYID = 0
6,024,523 UART: [idev] Sha1 KeyId Algorithm
6,046,433 UART: [idev] --
6,050,597 UART: [ldev] ++
6,051,168 UART: [ldev] CDI.KEYID = 6
6,052,058 UART: [ldev] SUBJECT.KEYID = 5
6,053,167 UART: [ldev] AUTHORITY.KEYID = 7
6,054,514 UART: [ldev] FE.KEYID = 1
6,099,973 UART: [ldev] Erasing FE.KEYID = 1
8,604,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,008 UART: [ldev] --
10,413,939 UART: [fwproc] Wait for Commands...
10,416,414 UART: [fwproc] Recv command 0x46574c44
10,418,509 UART: [fwproc] Recv'd Img size: 114360 bytes
10,493,626 UART: ROM Fatal Error: 0x000B0032
10,496,757 >>> mbox cmd response: failed
10,497,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,497,404 >>> mbox cmd response: failed
10,497,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,497,957 >>> mbox cmd response: failed
Initializing fuses
2,047,156 writing to cptra_bootfsm_go
2,236,439 UART:
2,236,788 UART: Running Caliptra ROM ...
2,237,922 UART:
2,238,095 UART: [state] CFI Enabled
2,311,464 UART: [state] LifecycleState = Unprovisioned
2,313,320 UART: [state] DebugLocked = No
2,316,114 UART: [state] WD Timer not started. Device not locked for debugging
2,319,427 UART: [kat] SHA2-256
2,498,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,176 UART: [kat] ++
2,510,725 UART: [kat] sha1
2,521,295 UART: [kat] SHA2-256
2,524,363 UART: [kat] SHA2-384
2,531,917 UART: [kat] SHA2-512-ACC
2,534,849 UART: [kat] ECC-384
4,994,385 UART: [kat] HMAC-384Kdf
5,019,405 UART: [kat] LMS
5,548,834 UART: [kat] --
5,554,511 UART: [cold-reset] ++
5,555,747 UART: [fht] FHT @ 0x50003400
5,567,050 UART: [idev] ++
5,567,640 UART: [idev] CDI.KEYID = 6
5,568,606 UART: [idev] SUBJECT.KEYID = 7
5,569,718 UART: [idev] UDS.KEYID = 0
5,572,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,716,350 UART: [idev] Erasing UDS.KEYID = 0
8,074,403 UART: [idev] Sha1 KeyId Algorithm
8,097,478 UART: [idev] --
8,101,802 UART: [ldev] ++
8,102,378 UART: [ldev] CDI.KEYID = 6
8,103,451 UART: [ldev] SUBJECT.KEYID = 5
8,104,559 UART: [ldev] AUTHORITY.KEYID = 7
8,105,738 UART: [ldev] FE.KEYID = 1
8,147,399 UART: [ldev] Erasing FE.KEYID = 1
10,648,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,242 UART: [ldev] --
12,459,193 UART: [fwproc] Wait for Commands...
12,462,164 UART: [fwproc] Recv command 0x46574c44
12,464,262 UART: [fwproc] Recv'd Img size: 114360 bytes
15,863,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,938,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,324,917 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,112 UART:
192,476 UART: Running Caliptra ROM ...
193,580 UART:
193,720 UART: [state] CFI Enabled
259,834 UART: [state] LifecycleState = Unprovisioned
262,250 UART: [state] DebugLocked = No
263,867 UART: [state] WD Timer not started. Device not locked for debugging
268,729 UART: [kat] SHA2-256
458,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,381 UART: [kat] ++
469,824 UART: [kat] sha1
479,860 UART: [kat] SHA2-256
482,874 UART: [kat] SHA2-384
489,447 UART: [kat] SHA2-512-ACC
492,006 UART: [kat] ECC-384
2,944,101 UART: [kat] HMAC-384Kdf
2,969,893 UART: [kat] LMS
3,501,646 UART: [kat] --
3,506,023 UART: [cold-reset] ++
3,507,259 UART: [fht] FHT @ 0x50003400
3,518,138 UART: [idev] ++
3,518,826 UART: [idev] CDI.KEYID = 6
3,519,843 UART: [idev] SUBJECT.KEYID = 7
3,520,951 UART: [idev] UDS.KEYID = 0
3,523,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,626 UART: [idev] Erasing UDS.KEYID = 0
6,027,286 UART: [idev] Sha1 KeyId Algorithm
6,050,011 UART: [idev] --
6,055,025 UART: [ldev] ++
6,055,728 UART: [ldev] CDI.KEYID = 6
6,056,648 UART: [ldev] SUBJECT.KEYID = 5
6,057,817 UART: [ldev] AUTHORITY.KEYID = 7
6,059,052 UART: [ldev] FE.KEYID = 1
6,098,001 UART: [ldev] Erasing FE.KEYID = 1
8,605,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,249 UART: [ldev] --
10,414,161 UART: [fwproc] Wait for Commands...
10,416,581 UART: [fwproc] Recv command 0x46574c44
10,418,888 UART: [fwproc] Recv'd Img size: 114360 bytes
10,522,116 UART: ROM Fatal Error: 0x000B0032
10,525,784 >>> mbox cmd response: failed
10,526,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,526,530 >>> mbox cmd response: failed
10,526,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,527,094 >>> mbox cmd response: failed
Initializing fuses
2,048,313 writing to cptra_bootfsm_go
2,237,586 UART:
2,237,940 UART: Running Caliptra ROM ...
2,238,986 UART:
2,239,137 UART: [state] CFI Enabled
2,296,730 UART: [state] LifecycleState = Unprovisioned
2,299,087 UART: [state] DebugLocked = No
2,300,503 UART: [state] WD Timer not started. Device not locked for debugging
2,304,588 UART: [kat] SHA2-256
2,494,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,505,263 UART: [kat] ++
2,505,722 UART: [kat] sha1
2,516,881 UART: [kat] SHA2-256
2,519,914 UART: [kat] SHA2-384
2,526,720 UART: [kat] SHA2-512-ACC
2,529,290 UART: [kat] ECC-384
4,982,984 UART: [kat] HMAC-384Kdf
5,006,518 UART: [kat] LMS
5,538,280 UART: [kat] --
5,541,136 UART: [cold-reset] ++
5,541,987 UART: [fht] FHT @ 0x50003400
5,553,562 UART: [idev] ++
5,554,264 UART: [idev] CDI.KEYID = 6
5,555,180 UART: [idev] SUBJECT.KEYID = 7
5,556,397 UART: [idev] UDS.KEYID = 0
5,558,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,703,311 UART: [idev] Erasing UDS.KEYID = 0
8,063,332 UART: [idev] Sha1 KeyId Algorithm
8,084,457 UART: [idev] --
8,089,719 UART: [ldev] ++
8,090,416 UART: [ldev] CDI.KEYID = 6
8,091,334 UART: [ldev] SUBJECT.KEYID = 5
8,092,498 UART: [ldev] AUTHORITY.KEYID = 7
8,093,680 UART: [ldev] FE.KEYID = 1
8,134,733 UART: [ldev] Erasing FE.KEYID = 1
10,641,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,536 UART: [ldev] --
12,448,012 UART: [fwproc] Wait for Commands...
12,450,651 UART: [fwproc] Recv command 0x46574c44
12,452,920 UART: [fwproc] Recv'd Img size: 114360 bytes
15,895,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,971,321 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,087,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,629,931 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,441,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,323,000 >>> mbox cmd response: failed
10,323,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,323,906 >>> mbox cmd response: failed
10,324,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,478 >>> mbox cmd response: failed
Initializing fuses
2,048,735 writing to cptra_bootfsm_go
5,487,692 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,757,139 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,455 UART:
192,817 UART: Running Caliptra ROM ...
193,952 UART:
603,415 UART: [state] CFI Enabled
618,179 UART: [state] LifecycleState = Unprovisioned
620,548 UART: [state] DebugLocked = No
622,953 UART: [state] WD Timer not started. Device not locked for debugging
627,689 UART: [kat] SHA2-256
817,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,340 UART: [kat] ++
828,847 UART: [kat] sha1
839,235 UART: [kat] SHA2-256
842,240 UART: [kat] SHA2-384
848,613 UART: [kat] SHA2-512-ACC
851,171 UART: [kat] ECC-384
3,292,731 UART: [kat] HMAC-384Kdf
3,306,500 UART: [kat] LMS
3,838,339 UART: [kat] --
3,841,299 UART: [cold-reset] ++
3,843,232 UART: [fht] FHT @ 0x50003400
3,853,341 UART: [idev] ++
3,854,066 UART: [idev] CDI.KEYID = 6
3,855,085 UART: [idev] SUBJECT.KEYID = 7
3,856,190 UART: [idev] UDS.KEYID = 0
3,858,987 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,681 UART: [idev] Erasing UDS.KEYID = 0
6,335,235 UART: [idev] Sha1 KeyId Algorithm
6,357,083 UART: [idev] --
6,362,437 UART: [ldev] ++
6,363,139 UART: [ldev] CDI.KEYID = 6
6,364,103 UART: [ldev] SUBJECT.KEYID = 5
6,365,211 UART: [ldev] AUTHORITY.KEYID = 7
6,366,385 UART: [ldev] FE.KEYID = 1
6,379,087 UART: [ldev] Erasing FE.KEYID = 1
8,858,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,934 UART: [ldev] --
10,648,602 UART: [fwproc] Wait for Commands...
10,651,023 UART: [fwproc] Recv command 0x46574c44
10,653,334 UART: [fwproc] Recv'd Img size: 114360 bytes
10,762,604 UART: ROM Fatal Error: 0x000B0032
10,766,289 >>> mbox cmd response: failed
10,766,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,990 >>> mbox cmd response: failed
10,767,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,767,542 >>> mbox cmd response: failed
Initializing fuses
2,055,045 writing to cptra_bootfsm_go
2,244,328 UART:
2,244,701 UART: Running Caliptra ROM ...
2,245,754 UART:
9,688,726 UART: [state] CFI Enabled
9,701,977 UART: [state] LifecycleState = Unprovisioned
9,704,386 UART: [state] DebugLocked = No
9,705,775 UART: [state] WD Timer not started. Device not locked for debugging
9,710,514 UART: [kat] SHA2-256
9,900,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,911,195 UART: [kat] ++
9,911,796 UART: [kat] sha1
9,922,799 UART: [kat] SHA2-256
9,925,812 UART: [kat] SHA2-384
9,932,557 UART: [kat] SHA2-512-ACC
9,935,140 UART: [kat] ECC-384
12,376,879 UART: [kat] HMAC-384Kdf
12,391,371 UART: [kat] LMS
12,923,195 UART: [kat] --
12,925,579 UART: [cold-reset] ++
12,928,051 UART: [fht] FHT @ 0x50003400
12,939,923 UART: [idev] ++
12,940,615 UART: [idev] CDI.KEYID = 6
12,941,633 UART: [idev] SUBJECT.KEYID = 7
12,942,812 UART: [idev] UDS.KEYID = 0
12,945,455 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,089,230 UART: [idev] Erasing UDS.KEYID = 0
15,420,855 UART: [idev] Sha1 KeyId Algorithm
15,444,145 UART: [idev] --
15,448,139 UART: [ldev] ++
15,448,825 UART: [ldev] CDI.KEYID = 6
15,449,734 UART: [ldev] SUBJECT.KEYID = 5
15,450,947 UART: [ldev] AUTHORITY.KEYID = 7
15,452,121 UART: [ldev] FE.KEYID = 1
15,463,142 UART: [ldev] Erasing FE.KEYID = 1
17,937,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,656,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,671,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,686,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,701,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,722,516 UART: [ldev] --
19,728,104 UART: [fwproc] Wait for Commands...
19,730,687 UART: [fwproc] Recv command 0x46574c44
19,733,014 UART: [fwproc] Recv'd Img size: 114360 bytes
23,179,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,253,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,370,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,913,565 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,761,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,545,564 >>> mbox cmd response: failed
10,546,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,452 >>> mbox cmd response: failed
10,546,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,007 >>> mbox cmd response: failed
Initializing fuses
2,046,399 writing to cptra_bootfsm_go
13,075,657 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,267,020 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,676 UART: [state] LifecycleState = Unprovisioned
86,331 UART: [state] DebugLocked = No
86,859 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,565 UART: [kat] SHA2-256
882,496 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,611 UART: [kat] ++
886,763 UART: [kat] sha1
890,983 UART: [kat] SHA2-256
892,921 UART: [kat] SHA2-384
895,492 UART: [kat] SHA2-512-ACC
897,393 UART: [kat] ECC-384
903,084 UART: [kat] HMAC-384Kdf
907,608 UART: [kat] LMS
1,475,804 UART: [kat] --
1,476,577 UART: [cold-reset] ++
1,476,911 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,696 UART: [idev] Erasing UDS.KEYID = 0
1,505,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,174 UART: [idev] --
1,515,077 UART: [ldev] ++
1,515,245 UART: [ldev] CDI.KEYID = 6
1,515,608 UART: [ldev] SUBJECT.KEYID = 5
1,516,034 UART: [ldev] AUTHORITY.KEYID = 7
1,516,497 UART: [ldev] FE.KEYID = 1
1,521,809 UART: [ldev] Erasing FE.KEYID = 1
1,546,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,806 UART: [ldev] --
1,586,297 UART: [fwproc] Waiting for Commands...
1,586,924 UART: [fwproc] Received command 0x46574c44
1,587,715 UART: [fwproc] Received Image of size 114360 bytes
1,613,085 UART: ROM Fatal Error: 0x000B0032
1,614,242 >>> mbox cmd response: failed
1,614,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,248 >>> mbox cmd response: failed
1,614,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,262 UART: [kat] HMAC-384Kdf
906,890 UART: [kat] LMS
1,475,086 UART: [kat] --
1,475,779 UART: [cold-reset] ++
1,476,209 UART: [fht] Storing FHT @ 0x50003400
1,478,894 UART: [idev] ++
1,479,062 UART: [idev] CDI.KEYID = 6
1,479,422 UART: [idev] SUBJECT.KEYID = 7
1,479,846 UART: [idev] UDS.KEYID = 0
1,480,191 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,978 UART: [idev] Erasing UDS.KEYID = 0
1,504,752 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,330 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,520,985 UART: [ldev] Erasing FE.KEYID = 1
1,546,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,418 UART: [ldev] --
1,585,685 UART: [fwproc] Waiting for Commands...
1,586,366 UART: [fwproc] Received command 0x46574c44
1,587,157 UART: [fwproc] Received Image of size 114360 bytes
2,884,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,211 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,350 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,359 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,468,161 >>> mbox cmd response: failed
1,468,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,167 >>> mbox cmd response: failed
1,468,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,803 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,846 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,092 UART: [kat] SHA2-256
882,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,138 UART: [kat] ++
886,290 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
902,489 UART: [kat] HMAC-384Kdf
907,217 UART: [kat] LMS
1,475,413 UART: [kat] --
1,476,326 UART: [cold-reset] ++
1,476,742 UART: [fht] Storing FHT @ 0x50003400
1,479,527 UART: [idev] ++
1,479,695 UART: [idev] CDI.KEYID = 6
1,480,055 UART: [idev] SUBJECT.KEYID = 7
1,480,479 UART: [idev] UDS.KEYID = 0
1,480,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,505,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,261 UART: [idev] --
1,515,162 UART: [ldev] ++
1,515,330 UART: [ldev] CDI.KEYID = 6
1,515,693 UART: [ldev] SUBJECT.KEYID = 5
1,516,119 UART: [ldev] AUTHORITY.KEYID = 7
1,516,582 UART: [ldev] FE.KEYID = 1
1,521,918 UART: [ldev] Erasing FE.KEYID = 1
1,547,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,457 UART: [ldev] --
1,586,914 UART: [fwproc] Waiting for Commands...
1,587,581 UART: [fwproc] Received command 0x46574c44
1,588,372 UART: [fwproc] Received Image of size 114360 bytes
1,614,396 UART: ROM Fatal Error: 0x000B0032
1,615,553 >>> mbox cmd response: failed
1,615,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,559 >>> mbox cmd response: failed
1,615,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,312 UART: [kat] SHA2-256
882,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,358 UART: [kat] ++
886,510 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,395 UART: [kat] SHA2-512-ACC
897,296 UART: [kat] ECC-384
902,741 UART: [kat] HMAC-384Kdf
907,495 UART: [kat] LMS
1,475,691 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,850 UART: [fht] Storing FHT @ 0x50003400
1,479,417 UART: [idev] ++
1,479,585 UART: [idev] CDI.KEYID = 6
1,479,945 UART: [idev] SUBJECT.KEYID = 7
1,480,369 UART: [idev] UDS.KEYID = 0
1,480,714 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,695 UART: [idev] Erasing UDS.KEYID = 0
1,505,391 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,999 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,521,808 UART: [ldev] Erasing FE.KEYID = 1
1,547,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,479 UART: [ldev] --
1,586,892 UART: [fwproc] Waiting for Commands...
1,587,725 UART: [fwproc] Received command 0x46574c44
1,588,516 UART: [fwproc] Received Image of size 114360 bytes
2,885,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,147 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,468,258 >>> mbox cmd response: failed
1,468,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,264 >>> mbox cmd response: failed
1,468,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,266 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,629 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,608 UART: [state] LifecycleState = Unprovisioned
85,263 UART: [state] DebugLocked = No
85,941 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
892,886 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,011 UART: [kat] ++
897,163 UART: [kat] sha1
901,343 UART: [kat] SHA2-256
903,283 UART: [kat] SHA2-384
906,108 UART: [kat] SHA2-512-ACC
908,009 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,444 UART: [kat] LMS
1,170,772 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,172,173 UART: [fht] FHT @ 0x50003400
1,174,960 UART: [idev] ++
1,175,128 UART: [idev] CDI.KEYID = 6
1,175,488 UART: [idev] SUBJECT.KEYID = 7
1,175,912 UART: [idev] UDS.KEYID = 0
1,176,257 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,740 UART: [idev] Erasing UDS.KEYID = 0
1,200,723 UART: [idev] Sha1 KeyId Algorithm
1,209,105 UART: [idev] --
1,210,095 UART: [ldev] ++
1,210,263 UART: [ldev] CDI.KEYID = 6
1,210,626 UART: [ldev] SUBJECT.KEYID = 5
1,211,052 UART: [ldev] AUTHORITY.KEYID = 7
1,211,515 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,046 UART: [fwproc] Wait for Commands...
1,282,712 UART: [fwproc] Recv command 0x46574c44
1,283,440 UART: [fwproc] Recv'd Img size: 114360 bytes
1,309,284 UART: ROM Fatal Error: 0x000B0032
1,310,441 >>> mbox cmd response: failed
1,310,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,447 >>> mbox cmd response: failed
1,310,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,981 UART: [kat] SHA2-256
903,921 UART: [kat] SHA2-384
906,604 UART: [kat] SHA2-512-ACC
908,505 UART: [kat] ECC-384
917,900 UART: [kat] HMAC-384Kdf
922,672 UART: [kat] LMS
1,171,000 UART: [kat] --
1,171,951 UART: [cold-reset] ++
1,172,415 UART: [fht] FHT @ 0x50003400
1,175,050 UART: [idev] ++
1,175,218 UART: [idev] CDI.KEYID = 6
1,175,578 UART: [idev] SUBJECT.KEYID = 7
1,176,002 UART: [idev] UDS.KEYID = 0
1,176,347 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,843 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,990 UART: [ldev] SUBJECT.KEYID = 5
1,211,416 UART: [ldev] AUTHORITY.KEYID = 7
1,211,879 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,414 UART: [fwproc] Recv command 0x46574c44
1,284,142 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,835 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,165,696 >>> mbox cmd response: failed
1,165,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,702 >>> mbox cmd response: failed
1,165,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,800 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,754 UART: [kat] SHA2-256
903,694 UART: [kat] SHA2-384
906,397 UART: [kat] SHA2-512-ACC
908,298 UART: [kat] ECC-384
918,179 UART: [kat] HMAC-384Kdf
922,627 UART: [kat] LMS
1,170,955 UART: [kat] --
1,172,056 UART: [cold-reset] ++
1,172,530 UART: [fht] FHT @ 0x50003400
1,175,261 UART: [idev] ++
1,175,429 UART: [idev] CDI.KEYID = 6
1,175,789 UART: [idev] SUBJECT.KEYID = 7
1,176,213 UART: [idev] UDS.KEYID = 0
1,176,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,333 UART: [idev] Erasing UDS.KEYID = 0
1,201,502 UART: [idev] Sha1 KeyId Algorithm
1,209,864 UART: [idev] --
1,210,904 UART: [ldev] ++
1,211,072 UART: [ldev] CDI.KEYID = 6
1,211,435 UART: [ldev] SUBJECT.KEYID = 5
1,211,861 UART: [ldev] AUTHORITY.KEYID = 7
1,212,324 UART: [ldev] FE.KEYID = 1
1,217,884 UART: [ldev] Erasing FE.KEYID = 1
1,244,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,362 UART: [ldev] --
1,283,835 UART: [fwproc] Wait for Commands...
1,284,653 UART: [fwproc] Recv command 0x46574c44
1,285,381 UART: [fwproc] Recv'd Img size: 114360 bytes
1,311,163 UART: ROM Fatal Error: 0x000B0032
1,312,320 >>> mbox cmd response: failed
1,312,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,326 >>> mbox cmd response: failed
1,312,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,338 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,613 UART: [idev] Erasing UDS.KEYID = 0
1,202,102 UART: [idev] Sha1 KeyId Algorithm
1,210,468 UART: [idev] --
1,211,610 UART: [ldev] ++
1,211,778 UART: [ldev] CDI.KEYID = 6
1,212,141 UART: [ldev] SUBJECT.KEYID = 5
1,212,567 UART: [ldev] AUTHORITY.KEYID = 7
1,213,030 UART: [ldev] FE.KEYID = 1
1,218,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,586 UART: [ldev] --
1,283,985 UART: [fwproc] Wait for Commands...
1,284,763 UART: [fwproc] Recv command 0x46574c44
1,285,491 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,823 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,088 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,166,233 >>> mbox cmd response: failed
1,166,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,239 >>> mbox cmd response: failed
1,166,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,044 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,563 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,881 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,219 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,976 UART: [ldev] --
1,280,264 UART: [fwproc] Wait for Commands...
1,281,053 UART: [fwproc] Recv command 0x46574c44
1,281,786 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,952 UART: ROM Fatal Error: 0x000B0032
1,309,109 >>> mbox cmd response: failed
1,309,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,115 >>> mbox cmd response: failed
1,309,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,556 UART: [kat] HMAC-384Kdf
920,228 UART: [kat] LMS
1,168,540 UART: [kat] --
1,169,305 UART: [cold-reset] ++
1,169,713 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,173,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,638 UART: [ldev] ++
1,208,806 UART: [ldev] CDI.KEYID = 6
1,209,170 UART: [ldev] SUBJECT.KEYID = 5
1,209,597 UART: [ldev] AUTHORITY.KEYID = 7
1,210,060 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,944 UART: [ldev] --
1,281,210 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,557 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,754 >>> mbox cmd response: failed
1,162,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,760 >>> mbox cmd response: failed
1,162,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,272 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,245 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,438 UART: [kat] SHA2-256
902,378 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,215,765 UART: [ldev] Erasing FE.KEYID = 1
1,242,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,925 UART: [ldev] --
1,281,433 UART: [fwproc] Wait for Commands...
1,282,174 UART: [fwproc] Recv command 0x46574c44
1,282,907 UART: [fwproc] Recv'd Img size: 114360 bytes
1,308,589 UART: ROM Fatal Error: 0x000B0032
1,309,746 >>> mbox cmd response: failed
1,309,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,752 >>> mbox cmd response: failed
1,309,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,174,286 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,198,932 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,208,855 UART: [ldev] ++
1,209,023 UART: [ldev] CDI.KEYID = 6
1,209,387 UART: [ldev] SUBJECT.KEYID = 5
1,209,814 UART: [ldev] AUTHORITY.KEYID = 7
1,210,277 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,241,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,637 UART: [ldev] --
1,281,119 UART: [fwproc] Wait for Commands...
1,281,748 UART: [fwproc] Recv command 0x46574c44
1,282,481 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,680 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,219 >>> mbox cmd response: failed
1,161,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,225 >>> mbox cmd response: failed
1,161,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,073 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,520 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,038 UART:
192,404 UART: Running Caliptra ROM ...
193,571 UART:
193,720 UART: [state] CFI Enabled
260,971 UART: [state] LifecycleState = Unprovisioned
262,934 UART: [state] DebugLocked = No
264,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,815 UART: [kat] SHA2-256
438,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,021 UART: [kat] ++
449,504 UART: [kat] sha1
460,163 UART: [kat] SHA2-256
462,847 UART: [kat] SHA2-384
467,747 UART: [kat] SHA2-512-ACC
470,083 UART: [kat] ECC-384
2,766,004 UART: [kat] HMAC-384Kdf
2,779,887 UART: [kat] LMS
3,970,204 UART: [kat] --
3,971,782 UART: [cold-reset] ++
3,974,011 UART: [fht] Storing FHT @ 0x50003400
3,986,977 UART: [idev] ++
3,987,612 UART: [idev] CDI.KEYID = 6
3,988,527 UART: [idev] SUBJECT.KEYID = 7
3,989,745 UART: [idev] UDS.KEYID = 0
3,992,850 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,515 UART: [idev] Erasing UDS.KEYID = 0
7,326,517 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,323 UART: [idev] --
7,353,267 UART: [ldev] ++
7,353,835 UART: [ldev] CDI.KEYID = 6
7,354,773 UART: [ldev] SUBJECT.KEYID = 5
7,355,907 UART: [ldev] AUTHORITY.KEYID = 7
7,357,257 UART: [ldev] FE.KEYID = 1
7,402,230 UART: [ldev] Erasing FE.KEYID = 1
10,732,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,723 UART: [ldev] --
13,108,819 UART: [fwproc] Waiting for Commands...
13,110,598 UART: [fwproc] Received command 0x46574c44
13,112,788 UART: [fwproc] Received Image of size 114036 bytes
13,194,765 UART: ROM Fatal Error: 0x00B0003A
13,198,225 >>> mbox cmd response: failed
13,198,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,198,942 >>> mbox cmd response: failed
13,199,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,497 >>> mbox cmd response: failed
Initializing fuses
2,065,079 writing to cptra_bootfsm_go
2,254,374 UART:
2,254,716 UART: Running Caliptra ROM ...
2,255,765 UART:
2,255,917 UART: [state] CFI Enabled
2,331,607 UART: [state] LifecycleState = Unprovisioned
2,333,561 UART: [state] DebugLocked = No
2,336,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,340,269 UART: [kat] SHA2-256
2,509,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,520,464 UART: [kat] ++
2,520,920 UART: [kat] sha1
2,532,020 UART: [kat] SHA2-256
2,534,708 UART: [kat] SHA2-384
2,541,029 UART: [kat] SHA2-512-ACC
2,543,402 UART: [kat] ECC-384
4,836,644 UART: [kat] HMAC-384Kdf
4,868,330 UART: [kat] LMS
6,058,632 UART: [kat] --
6,061,819 UART: [cold-reset] ++
6,064,296 UART: [fht] Storing FHT @ 0x50003400
6,075,727 UART: [idev] ++
6,076,308 UART: [idev] CDI.KEYID = 6
6,077,227 UART: [idev] SUBJECT.KEYID = 7
6,078,502 UART: [idev] UDS.KEYID = 0
6,080,986 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,224,544 UART: [idev] Erasing UDS.KEYID = 0
9,416,500 UART: [idev] Using Sha1 for KeyId Algorithm
9,438,057 UART: [idev] --
9,442,868 UART: [ldev] ++
9,443,442 UART: [ldev] CDI.KEYID = 6
9,444,432 UART: [ldev] SUBJECT.KEYID = 5
9,445,629 UART: [ldev] AUTHORITY.KEYID = 7
9,446,864 UART: [ldev] FE.KEYID = 1
9,490,904 UART: [ldev] Erasing FE.KEYID = 1
12,822,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,131,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,146,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,680 UART: [ldev] --
15,185,232 UART: [fwproc] Waiting for Commands...
15,188,480 UART: [fwproc] Received command 0x46574c44
15,190,723 UART: [fwproc] Received Image of size 114036 bytes
19,234,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,463 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,695,678 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,810,317 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,965,796 >>> mbox cmd response: failed
12,966,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,740 >>> mbox cmd response: failed
12,967,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,967,321 >>> mbox cmd response: failed
Initializing fuses
2,055,546 writing to cptra_bootfsm_go
5,842,240 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,931,735 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,530 UART:
192,876 UART: Running Caliptra ROM ...
194,004 UART:
603,675 UART: [state] CFI Enabled
620,936 UART: [state] LifecycleState = Unprovisioned
622,869 UART: [state] DebugLocked = No
624,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,387 UART: [kat] SHA2-256
799,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,684 UART: [kat] ++
810,135 UART: [kat] sha1
821,573 UART: [kat] SHA2-256
824,317 UART: [kat] SHA2-384
830,134 UART: [kat] SHA2-512-ACC
832,477 UART: [kat] ECC-384
3,114,297 UART: [kat] HMAC-384Kdf
3,126,848 UART: [kat] LMS
4,316,959 UART: [kat] --
4,321,403 UART: [cold-reset] ++
4,322,477 UART: [fht] Storing FHT @ 0x50003400
4,334,393 UART: [idev] ++
4,335,016 UART: [idev] CDI.KEYID = 6
4,335,930 UART: [idev] SUBJECT.KEYID = 7
4,337,203 UART: [idev] UDS.KEYID = 0
4,339,919 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,483,324 UART: [idev] Erasing UDS.KEYID = 0
7,623,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,238 UART: [idev] --
7,647,106 UART: [ldev] ++
7,647,680 UART: [ldev] CDI.KEYID = 6
7,648,622 UART: [ldev] SUBJECT.KEYID = 5
7,649,779 UART: [ldev] AUTHORITY.KEYID = 7
7,651,148 UART: [ldev] FE.KEYID = 1
7,663,395 UART: [ldev] Erasing FE.KEYID = 1
10,952,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,405 UART: [ldev] --
13,311,916 UART: [fwproc] Waiting for Commands...
13,313,957 UART: [fwproc] Received command 0x46574c44
13,316,145 UART: [fwproc] Received Image of size 114036 bytes
13,394,613 UART: ROM Fatal Error: 0x00B0003A
13,398,029 >>> mbox cmd response: failed
13,398,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,398,728 >>> mbox cmd response: failed
13,398,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,399,289 >>> mbox cmd response: failed
Initializing fuses
2,051,525 writing to cptra_bootfsm_go
2,240,813 UART:
2,241,172 UART: Running Caliptra ROM ...
2,242,215 UART:
7,065,697 UART: [state] CFI Enabled
7,080,953 UART: [state] LifecycleState = Unprovisioned
7,082,895 UART: [state] DebugLocked = No
7,084,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,089,503 UART: [kat] SHA2-256
7,259,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,269,825 UART: [kat] ++
7,270,313 UART: [kat] sha1
7,281,477 UART: [kat] SHA2-256
7,284,182 UART: [kat] SHA2-384
7,289,529 UART: [kat] SHA2-512-ACC
7,291,884 UART: [kat] ECC-384
9,577,288 UART: [kat] HMAC-384Kdf
9,587,785 UART: [kat] LMS
10,777,883 UART: [kat] --
10,782,846 UART: [cold-reset] ++
10,784,615 UART: [fht] Storing FHT @ 0x50003400
10,794,910 UART: [idev] ++
10,795,494 UART: [idev] CDI.KEYID = 6
10,796,431 UART: [idev] SUBJECT.KEYID = 7
10,797,705 UART: [idev] UDS.KEYID = 0
10,800,260 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,943,631 UART: [idev] Erasing UDS.KEYID = 0
14,082,541 UART: [idev] Using Sha1 for KeyId Algorithm
14,105,010 UART: [idev] --
14,108,510 UART: [ldev] ++
14,109,092 UART: [ldev] CDI.KEYID = 6
14,110,060 UART: [ldev] SUBJECT.KEYID = 5
14,111,326 UART: [ldev] AUTHORITY.KEYID = 7
14,112,511 UART: [ldev] FE.KEYID = 1
14,122,194 UART: [ldev] Erasing FE.KEYID = 1
17,408,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,701,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,715,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,730,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,745,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,764,009 UART: [ldev] --
19,769,442 UART: [fwproc] Waiting for Commands...
19,771,210 UART: [fwproc] Received command 0x46574c44
19,773,247 UART: [fwproc] Received Image of size 114036 bytes
23,823,246 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,902,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,971,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,288,226 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
4,128,323 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,132,851 >>> mbox cmd response: failed
13,133,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,133,735 >>> mbox cmd response: failed
13,134,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,134,304 >>> mbox cmd response: failed
Initializing fuses
2,049,261 writing to cptra_bootfsm_go
10,862,775 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,802,338 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,253 UART:
192,616 UART: Running Caliptra ROM ...
193,802 UART:
193,952 UART: [state] CFI Enabled
260,774 UART: [state] LifecycleState = Unprovisioned
262,720 UART: [state] DebugLocked = No
264,376 UART: [state] WD Timer not started. Device not locked for debugging
267,279 UART: [kat] SHA2-256
446,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,973 UART: [kat] ++
458,510 UART: [kat] sha1
469,753 UART: [kat] SHA2-256
472,813 UART: [kat] SHA2-384
479,662 UART: [kat] SHA2-512-ACC
482,659 UART: [kat] ECC-384
2,944,020 UART: [kat] HMAC-384Kdf
2,968,446 UART: [kat] LMS
3,497,880 UART: [kat] --
3,500,168 UART: [cold-reset] ++
3,501,408 UART: [fht] FHT @ 0x50003400
3,511,350 UART: [idev] ++
3,511,929 UART: [idev] CDI.KEYID = 6
3,512,845 UART: [idev] SUBJECT.KEYID = 7
3,514,062 UART: [idev] UDS.KEYID = 0
3,517,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,661,024 UART: [idev] Erasing UDS.KEYID = 0
6,022,184 UART: [idev] Sha1 KeyId Algorithm
6,045,426 UART: [idev] --
6,050,400 UART: [ldev] ++
6,050,977 UART: [ldev] CDI.KEYID = 6
6,051,890 UART: [ldev] SUBJECT.KEYID = 5
6,053,055 UART: [ldev] AUTHORITY.KEYID = 7
6,054,293 UART: [ldev] FE.KEYID = 1
6,096,598 UART: [ldev] Erasing FE.KEYID = 1
8,603,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,369 UART: [ldev] --
10,413,253 UART: [fwproc] Wait for Commands...
10,416,375 UART: [fwproc] Recv command 0x46574c44
10,418,468 UART: [fwproc] Recv'd Img size: 114360 bytes
10,493,488 UART: ROM Fatal Error: 0x00B0003A
10,496,569 >>> mbox cmd response: failed
10,496,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,497,225 >>> mbox cmd response: failed
10,497,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,497,783 >>> mbox cmd response: failed
Initializing fuses
2,060,354 writing to cptra_bootfsm_go
2,249,648 UART:
2,249,997 UART: Running Caliptra ROM ...
2,251,068 UART:
2,251,227 UART: [state] CFI Enabled
2,305,396 UART: [state] LifecycleState = Unprovisioned
2,307,241 UART: [state] DebugLocked = No
2,309,174 UART: [state] WD Timer not started. Device not locked for debugging
2,313,204 UART: [kat] SHA2-256
2,492,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,908 UART: [kat] ++
2,504,450 UART: [kat] sha1
2,517,182 UART: [kat] SHA2-256
2,520,200 UART: [kat] SHA2-384
2,526,729 UART: [kat] SHA2-512-ACC
2,529,662 UART: [kat] ECC-384
4,991,078 UART: [kat] HMAC-384Kdf
5,014,730 UART: [kat] LMS
5,544,214 UART: [kat] --
5,549,063 UART: [cold-reset] ++
5,550,791 UART: [fht] FHT @ 0x50003400
5,560,100 UART: [idev] ++
5,560,667 UART: [idev] CDI.KEYID = 6
5,561,633 UART: [idev] SUBJECT.KEYID = 7
5,562,792 UART: [idev] UDS.KEYID = 0
5,565,563 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,709,375 UART: [idev] Erasing UDS.KEYID = 0
8,068,767 UART: [idev] Sha1 KeyId Algorithm
8,092,442 UART: [idev] --
8,096,936 UART: [ldev] ++
8,097,509 UART: [ldev] CDI.KEYID = 6
8,098,420 UART: [ldev] SUBJECT.KEYID = 5
8,099,592 UART: [ldev] AUTHORITY.KEYID = 7
8,100,832 UART: [ldev] FE.KEYID = 1
8,144,599 UART: [ldev] Erasing FE.KEYID = 1
10,647,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,365,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,381,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,397,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,413,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,434,595 UART: [ldev] --
12,438,938 UART: [fwproc] Wait for Commands...
12,440,493 UART: [fwproc] Recv command 0x46574c44
12,442,587 UART: [fwproc] Recv'd Img size: 114360 bytes
15,839,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,913,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,982,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,300,045 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,193 UART:
192,544 UART: Running Caliptra ROM ...
193,644 UART:
193,789 UART: [state] CFI Enabled
262,113 UART: [state] LifecycleState = Unprovisioned
264,517 UART: [state] DebugLocked = No
266,972 UART: [state] WD Timer not started. Device not locked for debugging
271,124 UART: [kat] SHA2-256
461,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,816 UART: [kat] ++
472,266 UART: [kat] sha1
484,552 UART: [kat] SHA2-256
487,566 UART: [kat] SHA2-384
493,601 UART: [kat] SHA2-512-ACC
496,158 UART: [kat] ECC-384
2,944,063 UART: [kat] HMAC-384Kdf
2,970,653 UART: [kat] LMS
3,502,471 UART: [kat] --
3,508,267 UART: [cold-reset] ++
3,510,149 UART: [fht] FHT @ 0x50003400
3,522,272 UART: [idev] ++
3,522,949 UART: [idev] CDI.KEYID = 6
3,523,951 UART: [idev] SUBJECT.KEYID = 7
3,525,119 UART: [idev] UDS.KEYID = 0
3,528,106 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,673,821 UART: [idev] Erasing UDS.KEYID = 0
6,028,696 UART: [idev] Sha1 KeyId Algorithm
6,052,215 UART: [idev] --
6,056,377 UART: [ldev] ++
6,057,099 UART: [ldev] CDI.KEYID = 6
6,058,033 UART: [ldev] SUBJECT.KEYID = 5
6,059,149 UART: [ldev] AUTHORITY.KEYID = 7
6,060,386 UART: [ldev] FE.KEYID = 1
6,098,378 UART: [ldev] Erasing FE.KEYID = 1
8,608,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,362 UART: [ldev] --
10,413,898 UART: [fwproc] Wait for Commands...
10,415,564 UART: [fwproc] Recv command 0x46574c44
10,417,883 UART: [fwproc] Recv'd Img size: 114360 bytes
10,528,374 UART: ROM Fatal Error: 0x00B0003A
10,532,003 >>> mbox cmd response: failed
10,532,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,767 >>> mbox cmd response: failed
10,533,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,335 >>> mbox cmd response: failed
Initializing fuses
2,052,532 writing to cptra_bootfsm_go
2,241,859 UART:
2,242,377 UART: Running Caliptra ROM ...
2,243,437 UART:
2,243,594 UART: [state] CFI Enabled
2,315,798 UART: [state] LifecycleState = Unprovisioned
2,318,138 UART: [state] DebugLocked = No
2,319,364 UART: [state] WD Timer not started. Device not locked for debugging
2,322,366 UART: [kat] SHA2-256
2,512,173 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,522,925 UART: [kat] ++
2,523,423 UART: [kat] sha1
2,534,642 UART: [kat] SHA2-256
2,537,672 UART: [kat] SHA2-384
2,543,561 UART: [kat] SHA2-512-ACC
2,546,135 UART: [kat] ECC-384
4,997,262 UART: [kat] HMAC-384Kdf
5,022,045 UART: [kat] LMS
5,553,823 UART: [kat] --
5,559,614 UART: [cold-reset] ++
5,560,796 UART: [fht] FHT @ 0x50003400
5,571,301 UART: [idev] ++
5,572,034 UART: [idev] CDI.KEYID = 6
5,572,920 UART: [idev] SUBJECT.KEYID = 7
5,574,130 UART: [idev] UDS.KEYID = 0
5,576,848 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,720,824 UART: [idev] Erasing UDS.KEYID = 0
8,079,668 UART: [idev] Sha1 KeyId Algorithm
8,101,211 UART: [idev] --
8,104,909 UART: [ldev] ++
8,105,597 UART: [ldev] CDI.KEYID = 6
8,106,481 UART: [ldev] SUBJECT.KEYID = 5
8,107,694 UART: [ldev] AUTHORITY.KEYID = 7
8,108,951 UART: [ldev] FE.KEYID = 1
8,149,119 UART: [ldev] Erasing FE.KEYID = 1
10,657,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,383 UART: [ldev] --
12,463,485 UART: [fwproc] Wait for Commands...
12,464,990 UART: [fwproc] Recv command 0x46574c44
12,467,311 UART: [fwproc] Recv'd Img size: 114360 bytes
15,912,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,991,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,107,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,651,079 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,434,840 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,318,066 >>> mbox cmd response: failed
10,318,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,318,969 >>> mbox cmd response: failed
10,319,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,561 >>> mbox cmd response: failed
Initializing fuses
2,047,703 writing to cptra_bootfsm_go
5,488,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,780,937 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,415 UART:
192,800 UART: Running Caliptra ROM ...
193,894 UART:
603,724 UART: [state] CFI Enabled
619,484 UART: [state] LifecycleState = Unprovisioned
621,850 UART: [state] DebugLocked = No
624,418 UART: [state] WD Timer not started. Device not locked for debugging
628,177 UART: [kat] SHA2-256
818,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,877 UART: [kat] ++
829,409 UART: [kat] sha1
840,777 UART: [kat] SHA2-256
843,793 UART: [kat] SHA2-384
850,691 UART: [kat] SHA2-512-ACC
853,297 UART: [kat] ECC-384
3,293,276 UART: [kat] HMAC-384Kdf
3,306,176 UART: [kat] LMS
3,838,003 UART: [kat] --
3,842,595 UART: [cold-reset] ++
3,845,004 UART: [fht] FHT @ 0x50003400
3,855,981 UART: [idev] ++
3,856,691 UART: [idev] CDI.KEYID = 6
3,857,579 UART: [idev] SUBJECT.KEYID = 7
3,858,845 UART: [idev] UDS.KEYID = 0
3,861,488 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,005,143 UART: [idev] Erasing UDS.KEYID = 0
6,329,805 UART: [idev] Sha1 KeyId Algorithm
6,351,636 UART: [idev] --
6,357,090 UART: [ldev] ++
6,357,780 UART: [ldev] CDI.KEYID = 6
6,358,695 UART: [ldev] SUBJECT.KEYID = 5
6,359,857 UART: [ldev] AUTHORITY.KEYID = 7
6,361,089 UART: [ldev] FE.KEYID = 1
6,373,136 UART: [ldev] Erasing FE.KEYID = 1
8,851,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,899 UART: [ldev] --
10,640,985 UART: [fwproc] Wait for Commands...
10,643,678 UART: [fwproc] Recv command 0x46574c44
10,645,939 UART: [fwproc] Recv'd Img size: 114360 bytes
10,759,150 UART: ROM Fatal Error: 0x00B0003A
10,762,783 >>> mbox cmd response: failed
10,763,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,763,554 >>> mbox cmd response: failed
10,763,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,764,113 >>> mbox cmd response: failed
Initializing fuses
2,053,443 writing to cptra_bootfsm_go
2,242,784 UART:
2,243,128 UART: Running Caliptra ROM ...
2,244,261 UART:
9,691,647 UART: [state] CFI Enabled
9,704,907 UART: [state] LifecycleState = Unprovisioned
9,707,311 UART: [state] DebugLocked = No
9,709,508 UART: [state] WD Timer not started. Device not locked for debugging
9,714,819 UART: [kat] SHA2-256
9,904,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,915,487 UART: [kat] ++
9,916,087 UART: [kat] sha1
9,928,193 UART: [kat] SHA2-256
9,931,215 UART: [kat] SHA2-384
9,937,363 UART: [kat] SHA2-512-ACC
9,939,994 UART: [kat] ECC-384
12,381,941 UART: [kat] HMAC-384Kdf
12,395,570 UART: [kat] LMS
12,927,395 UART: [kat] --
12,931,129 UART: [cold-reset] ++
12,933,226 UART: [fht] FHT @ 0x50003400
12,946,144 UART: [idev] ++
12,946,815 UART: [idev] CDI.KEYID = 6
12,947,756 UART: [idev] SUBJECT.KEYID = 7
12,949,017 UART: [idev] UDS.KEYID = 0
12,951,671 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,095,435 UART: [idev] Erasing UDS.KEYID = 0
15,423,485 UART: [idev] Sha1 KeyId Algorithm
15,446,459 UART: [idev] --
15,450,727 UART: [ldev] ++
15,451,406 UART: [ldev] CDI.KEYID = 6
15,452,310 UART: [ldev] SUBJECT.KEYID = 5
15,453,518 UART: [ldev] AUTHORITY.KEYID = 7
15,454,692 UART: [ldev] FE.KEYID = 1
15,466,577 UART: [ldev] Erasing FE.KEYID = 1
17,945,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,666,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,681,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,696,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,712,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,732,790 UART: [ldev] --
19,737,848 UART: [fwproc] Wait for Commands...
19,740,702 UART: [fwproc] Recv command 0x46574c44
19,743,013 UART: [fwproc] Recv'd Img size: 114360 bytes
23,183,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,265,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,381,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,923,325 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,753,777 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,551,455 >>> mbox cmd response: failed
10,552,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,452 >>> mbox cmd response: failed
10,552,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,011 >>> mbox cmd response: failed
Initializing fuses
2,047,633 writing to cptra_bootfsm_go
13,078,573 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,272,254 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,583 UART: [fht] Storing FHT @ 0x50003400
1,479,302 UART: [idev] ++
1,479,470 UART: [idev] CDI.KEYID = 6
1,479,830 UART: [idev] SUBJECT.KEYID = 7
1,480,254 UART: [idev] UDS.KEYID = 0
1,480,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,162 UART: [idev] Erasing UDS.KEYID = 0
1,504,998 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,594 UART: [idev] --
1,514,705 UART: [ldev] ++
1,514,873 UART: [ldev] CDI.KEYID = 6
1,515,236 UART: [ldev] SUBJECT.KEYID = 5
1,515,662 UART: [ldev] AUTHORITY.KEYID = 7
1,516,125 UART: [ldev] FE.KEYID = 1
1,521,323 UART: [ldev] Erasing FE.KEYID = 1
1,546,718 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,126 UART: [ldev] --
1,586,475 UART: [fwproc] Waiting for Commands...
1,587,112 UART: [fwproc] Received command 0x46574c44
1,587,903 UART: [fwproc] Received Image of size 114360 bytes
1,613,742 UART: ROM Fatal Error: 0x00B0003A
1,614,903 >>> mbox cmd response: failed
1,614,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,909 >>> mbox cmd response: failed
1,614,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,863 UART: [kat] SHA2-256
892,801 UART: [kat] SHA2-384
895,620 UART: [kat] SHA2-512-ACC
897,521 UART: [kat] ECC-384
903,220 UART: [kat] HMAC-384Kdf
907,734 UART: [kat] LMS
1,475,930 UART: [kat] --
1,476,941 UART: [cold-reset] ++
1,477,443 UART: [fht] Storing FHT @ 0x50003400
1,480,264 UART: [idev] ++
1,480,432 UART: [idev] CDI.KEYID = 6
1,480,792 UART: [idev] SUBJECT.KEYID = 7
1,481,216 UART: [idev] UDS.KEYID = 0
1,481,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,842 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,901 UART: [ldev] ++
1,515,069 UART: [ldev] CDI.KEYID = 6
1,515,432 UART: [ldev] SUBJECT.KEYID = 5
1,515,858 UART: [ldev] AUTHORITY.KEYID = 7
1,516,321 UART: [ldev] FE.KEYID = 1
1,521,495 UART: [ldev] Erasing FE.KEYID = 1
1,547,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,370 UART: [ldev] --
1,586,847 UART: [fwproc] Waiting for Commands...
1,587,666 UART: [fwproc] Received command 0x46574c44
1,588,457 UART: [fwproc] Received Image of size 114360 bytes
2,885,617 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,422 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,307 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,467,626 >>> mbox cmd response: failed
1,467,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,632 >>> mbox cmd response: failed
1,467,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,856 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,352 UART: [kat] SHA2-256
882,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,398 UART: [kat] ++
886,550 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,441 UART: [kat] SHA2-512-ACC
897,342 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,701 UART: [kat] LMS
1,475,897 UART: [kat] --
1,476,740 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,480,117 UART: [idev] ++
1,480,285 UART: [idev] CDI.KEYID = 6
1,480,645 UART: [idev] SUBJECT.KEYID = 7
1,481,069 UART: [idev] UDS.KEYID = 0
1,481,414 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,997 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,652 UART: [ldev] Erasing FE.KEYID = 1
1,547,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,357 UART: [ldev] --
1,586,802 UART: [fwproc] Waiting for Commands...
1,587,525 UART: [fwproc] Received command 0x46574c44
1,588,316 UART: [fwproc] Received Image of size 114360 bytes
1,615,033 UART: ROM Fatal Error: 0x00B0003A
1,616,194 >>> mbox cmd response: failed
1,616,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,200 >>> mbox cmd response: failed
1,616,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,754 UART: [kat] SHA2-256
882,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,800 UART: [kat] ++
886,952 UART: [kat] sha1
891,202 UART: [kat] SHA2-256
893,140 UART: [kat] SHA2-384
896,063 UART: [kat] SHA2-512-ACC
897,964 UART: [kat] ECC-384
903,521 UART: [kat] HMAC-384Kdf
908,157 UART: [kat] LMS
1,476,353 UART: [kat] --
1,476,934 UART: [cold-reset] ++
1,477,270 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,943 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,211 UART: [idev] --
1,515,168 UART: [ldev] ++
1,515,336 UART: [ldev] CDI.KEYID = 6
1,515,699 UART: [ldev] SUBJECT.KEYID = 5
1,516,125 UART: [ldev] AUTHORITY.KEYID = 7
1,516,588 UART: [ldev] FE.KEYID = 1
1,521,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,955 UART: [ldev] --
1,586,422 UART: [fwproc] Waiting for Commands...
1,587,143 UART: [fwproc] Received command 0x46574c44
1,587,934 UART: [fwproc] Received Image of size 114360 bytes
2,885,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,991 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,804 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,466,839 >>> mbox cmd response: failed
1,466,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,845 >>> mbox cmd response: failed
1,466,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,955 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
893,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,501 UART: [kat] ++
897,653 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,222 UART: [kat] HMAC-384Kdf
922,738 UART: [kat] LMS
1,171,066 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,956 UART: [idev] ++
1,175,124 UART: [idev] CDI.KEYID = 6
1,175,484 UART: [idev] SUBJECT.KEYID = 7
1,175,908 UART: [idev] UDS.KEYID = 0
1,176,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,304 UART: [idev] Erasing UDS.KEYID = 0
1,201,267 UART: [idev] Sha1 KeyId Algorithm
1,209,725 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,454 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,675 UART: [ldev] Erasing FE.KEYID = 1
1,243,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,791 UART: [ldev] --
1,283,186 UART: [fwproc] Wait for Commands...
1,283,834 UART: [fwproc] Recv command 0x46574c44
1,284,562 UART: [fwproc] Recv'd Img size: 114360 bytes
1,311,133 UART: ROM Fatal Error: 0x00B0003A
1,312,294 >>> mbox cmd response: failed
1,312,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,300 >>> mbox cmd response: failed
1,312,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,765 UART: [kat] SHA2-256
903,705 UART: [kat] SHA2-384
906,440 UART: [kat] SHA2-512-ACC
908,341 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,506 UART: [kat] LMS
1,170,834 UART: [kat] --
1,171,717 UART: [cold-reset] ++
1,172,241 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,217,061 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,568 UART: [fwproc] Wait for Commands...
1,283,356 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,669 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,871 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,165,307 >>> mbox cmd response: failed
1,165,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,313 >>> mbox cmd response: failed
1,165,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,974 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,720 UART: [kat] SHA2-256
903,660 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,171,986 UART: [cold-reset] ++
1,172,440 UART: [fht] FHT @ 0x50003400
1,175,345 UART: [idev] ++
1,175,513 UART: [idev] CDI.KEYID = 6
1,175,873 UART: [idev] SUBJECT.KEYID = 7
1,176,297 UART: [idev] UDS.KEYID = 0
1,176,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,201,494 UART: [idev] Sha1 KeyId Algorithm
1,209,834 UART: [idev] --
1,210,824 UART: [ldev] ++
1,210,992 UART: [ldev] CDI.KEYID = 6
1,211,355 UART: [ldev] SUBJECT.KEYID = 5
1,211,781 UART: [ldev] AUTHORITY.KEYID = 7
1,212,244 UART: [ldev] FE.KEYID = 1
1,217,672 UART: [ldev] Erasing FE.KEYID = 1
1,244,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,292 UART: [ldev] --
1,283,751 UART: [fwproc] Wait for Commands...
1,284,395 UART: [fwproc] Recv command 0x46574c44
1,285,123 UART: [fwproc] Recv'd Img size: 114360 bytes
1,311,482 UART: ROM Fatal Error: 0x00B0003A
1,312,643 >>> mbox cmd response: failed
1,312,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,649 >>> mbox cmd response: failed
1,312,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
893,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,460 UART: [kat] ++
897,612 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,527 UART: [kat] SHA2-512-ACC
908,428 UART: [kat] ECC-384
917,905 UART: [kat] HMAC-384Kdf
922,529 UART: [kat] LMS
1,170,857 UART: [kat] --
1,171,690 UART: [cold-reset] ++
1,172,170 UART: [fht] FHT @ 0x50003400
1,174,771 UART: [idev] ++
1,174,939 UART: [idev] CDI.KEYID = 6
1,175,299 UART: [idev] SUBJECT.KEYID = 7
1,175,723 UART: [idev] UDS.KEYID = 0
1,176,068 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,281 UART: [idev] Erasing UDS.KEYID = 0
1,200,610 UART: [idev] Sha1 KeyId Algorithm
1,209,128 UART: [idev] --
1,210,098 UART: [ldev] ++
1,210,266 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,055 UART: [ldev] AUTHORITY.KEYID = 7
1,211,518 UART: [ldev] FE.KEYID = 1
1,216,610 UART: [ldev] Erasing FE.KEYID = 1
1,243,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,282 UART: [ldev] --
1,282,603 UART: [fwproc] Wait for Commands...
1,283,357 UART: [fwproc] Recv command 0x46574c44
1,284,085 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,470 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,278 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,167,094 >>> mbox cmd response: failed
1,167,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,100 >>> mbox cmd response: failed
1,167,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,002 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,568 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,762 UART: [state] LifecycleState = Unprovisioned
85,417 UART: [state] DebugLocked = No
86,007 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
903,990 UART: [kat] SHA2-512-ACC
905,891 UART: [kat] ECC-384
915,542 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,489 UART: [idev] ++
1,172,657 UART: [idev] CDI.KEYID = 6
1,173,018 UART: [idev] SUBJECT.KEYID = 7
1,173,443 UART: [idev] UDS.KEYID = 0
1,173,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,317 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,215,008 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,122 UART: [ldev] --
1,280,436 UART: [fwproc] Wait for Commands...
1,281,145 UART: [fwproc] Recv command 0x46574c44
1,281,878 UART: [fwproc] Recv'd Img size: 114360 bytes
1,307,663 UART: ROM Fatal Error: 0x00B0003A
1,308,824 >>> mbox cmd response: failed
1,308,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,830 >>> mbox cmd response: failed
1,308,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,600 UART: [kat] LMS
1,168,912 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,917 UART: [idev] Sha1 KeyId Algorithm
1,208,781 UART: [idev] --
1,209,994 UART: [ldev] ++
1,210,162 UART: [ldev] CDI.KEYID = 6
1,210,526 UART: [ldev] SUBJECT.KEYID = 5
1,210,953 UART: [ldev] AUTHORITY.KEYID = 7
1,211,416 UART: [ldev] FE.KEYID = 1
1,216,344 UART: [ldev] Erasing FE.KEYID = 1
1,242,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,724 UART: [ldev] --
1,282,076 UART: [fwproc] Wait for Commands...
1,282,763 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,813 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,927 >>> mbox cmd response: failed
1,162,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,933 >>> mbox cmd response: failed
1,162,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,155 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,919 UART: [kat] SHA2-512-ACC
906,820 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,535 UART: [fwproc] Wait for Commands...
1,283,302 UART: [fwproc] Recv command 0x46574c44
1,284,035 UART: [fwproc] Recv'd Img size: 114360 bytes
1,310,148 UART: ROM Fatal Error: 0x00B0003A
1,311,309 >>> mbox cmd response: failed
1,311,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,315 >>> mbox cmd response: failed
1,311,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,174,828 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,310 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,349 UART: [ldev] --
1,281,621 UART: [fwproc] Wait for Commands...
1,282,256 UART: [fwproc] Recv command 0x46574c44
1,282,989 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,598 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,162,846 >>> mbox cmd response: failed
1,162,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,852 >>> mbox cmd response: failed
1,162,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,773 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,131 UART:
192,518 UART: Running Caliptra ROM ...
193,706 UART:
193,863 UART: [state] CFI Enabled
264,996 UART: [state] LifecycleState = Unprovisioned
266,942 UART: [state] DebugLocked = No
268,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,916 UART: [kat] SHA2-256
443,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,100 UART: [kat] ++
454,685 UART: [kat] sha1
466,059 UART: [kat] SHA2-256
468,797 UART: [kat] SHA2-384
474,716 UART: [kat] SHA2-512-ACC
477,062 UART: [kat] ECC-384
2,766,015 UART: [kat] HMAC-384Kdf
2,778,966 UART: [kat] LMS
3,969,266 UART: [kat] --
3,973,853 UART: [cold-reset] ++
3,975,415 UART: [fht] Storing FHT @ 0x50003400
3,985,835 UART: [idev] ++
3,986,402 UART: [idev] CDI.KEYID = 6
3,987,325 UART: [idev] SUBJECT.KEYID = 7
3,988,597 UART: [idev] UDS.KEYID = 0
3,991,608 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,135,292 UART: [idev] Erasing UDS.KEYID = 0
7,327,692 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,086 UART: [idev] --
7,352,761 UART: [ldev] ++
7,353,395 UART: [ldev] CDI.KEYID = 6
7,354,308 UART: [ldev] SUBJECT.KEYID = 5
7,355,528 UART: [ldev] AUTHORITY.KEYID = 7
7,356,761 UART: [ldev] FE.KEYID = 1
7,402,442 UART: [ldev] Erasing FE.KEYID = 1
10,734,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,373 UART: [ldev] --
13,095,645 UART: [fwproc] Waiting for Commands...
13,098,503 UART: [fwproc] Received command 0x46574c44
13,100,702 UART: [fwproc] Received Image of size 114036 bytes
16,945,171 UART: ROM Fatal Error: 0x000B0033
16,948,628 >>> mbox cmd response: failed
16,949,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,949,389 >>> mbox cmd response: failed
16,949,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,949,954 >>> mbox cmd response: failed
Initializing fuses
2,047,863 writing to cptra_bootfsm_go
2,237,173 UART:
2,237,528 UART: Running Caliptra ROM ...
2,238,669 UART:
2,238,834 UART: [state] CFI Enabled
2,299,786 UART: [state] LifecycleState = Unprovisioned
2,301,730 UART: [state] DebugLocked = No
2,304,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,471 UART: [kat] SHA2-256
2,478,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,642 UART: [kat] ++
2,489,157 UART: [kat] sha1
2,501,059 UART: [kat] SHA2-256
2,503,762 UART: [kat] SHA2-384
2,508,196 UART: [kat] SHA2-512-ACC
2,510,602 UART: [kat] ECC-384
4,803,633 UART: [kat] HMAC-384Kdf
4,836,492 UART: [kat] LMS
6,026,746 UART: [kat] --
6,030,973 UART: [cold-reset] ++
6,032,291 UART: [fht] Storing FHT @ 0x50003400
6,042,820 UART: [idev] ++
6,043,391 UART: [idev] CDI.KEYID = 6
6,044,329 UART: [idev] SUBJECT.KEYID = 7
6,045,604 UART: [idev] UDS.KEYID = 0
6,048,033 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,191,331 UART: [idev] Erasing UDS.KEYID = 0
9,383,881 UART: [idev] Using Sha1 for KeyId Algorithm
9,406,506 UART: [idev] --
9,410,529 UART: [ldev] ++
9,411,110 UART: [ldev] CDI.KEYID = 6
9,412,082 UART: [ldev] SUBJECT.KEYID = 5
9,413,295 UART: [ldev] AUTHORITY.KEYID = 7
9,414,534 UART: [ldev] FE.KEYID = 1
9,458,941 UART: [ldev] Erasing FE.KEYID = 1
12,789,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,122,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,137,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,170,122 UART: [ldev] --
15,175,241 UART: [fwproc] Waiting for Commands...
15,177,721 UART: [fwproc] Received command 0x46574c44
15,179,914 UART: [fwproc] Received Image of size 114036 bytes
19,228,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,303,029 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,371,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,689,383 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,782,763 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,490,505 >>> mbox cmd response: failed
16,491,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,491,419 >>> mbox cmd response: failed
16,491,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,491,977 >>> mbox cmd response: failed
Initializing fuses
2,045,131 writing to cptra_bootfsm_go
5,848,250 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,923,079 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,574 UART:
192,935 UART: Running Caliptra ROM ...
194,051 UART:
603,812 UART: [state] CFI Enabled
620,757 UART: [state] LifecycleState = Unprovisioned
622,698 UART: [state] DebugLocked = No
624,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,949 UART: [kat] SHA2-256
799,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,211 UART: [kat] ++
810,658 UART: [kat] sha1
822,294 UART: [kat] SHA2-256
824,988 UART: [kat] SHA2-384
831,831 UART: [kat] SHA2-512-ACC
834,171 UART: [kat] ECC-384
3,117,542 UART: [kat] HMAC-384Kdf
3,129,347 UART: [kat] LMS
4,319,495 UART: [kat] --
4,324,567 UART: [cold-reset] ++
4,325,796 UART: [fht] Storing FHT @ 0x50003400
4,337,184 UART: [idev] ++
4,337,762 UART: [idev] CDI.KEYID = 6
4,338,649 UART: [idev] SUBJECT.KEYID = 7
4,339,921 UART: [idev] UDS.KEYID = 0
4,342,976 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,488 UART: [idev] Erasing UDS.KEYID = 0
7,629,975 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,345 UART: [idev] --
7,655,131 UART: [ldev] ++
7,655,712 UART: [ldev] CDI.KEYID = 6
7,656,682 UART: [ldev] SUBJECT.KEYID = 5
7,657,846 UART: [ldev] AUTHORITY.KEYID = 7
7,659,138 UART: [ldev] FE.KEYID = 1
7,670,325 UART: [ldev] Erasing FE.KEYID = 1
10,961,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,128 UART: [ldev] --
13,323,135 UART: [fwproc] Waiting for Commands...
13,324,812 UART: [fwproc] Received command 0x46574c44
13,327,061 UART: [fwproc] Received Image of size 114036 bytes
17,088,024 UART: ROM Fatal Error: 0x000B0033
17,091,409 >>> mbox cmd response: failed
17,091,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,092,215 >>> mbox cmd response: failed
17,092,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,092,788 >>> mbox cmd response: failed
Initializing fuses
2,056,565 writing to cptra_bootfsm_go
2,245,907 UART:
2,246,243 UART: Running Caliptra ROM ...
2,247,386 UART:
3,377,075 UART: [state] CFI Enabled
3,388,138 UART: [state] LifecycleState = Unprovisioned
3,390,046 UART: [state] DebugLocked = No
3,392,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,396,945 UART: [kat] SHA2-256
3,566,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,577,233 UART: [kat] ++
3,577,725 UART: [kat] sha1
3,587,968 UART: [kat] SHA2-256
3,590,656 UART: [kat] SHA2-384
3,596,818 UART: [kat] SHA2-512-ACC
3,599,144 UART: [kat] ECC-384
5,884,370 UART: [kat] HMAC-384Kdf
5,896,546 UART: [kat] LMS
7,086,648 UART: [kat] --
7,090,426 UART: [cold-reset] ++
7,092,967 UART: [fht] Storing FHT @ 0x50003400
7,105,107 UART: [idev] ++
7,105,712 UART: [idev] CDI.KEYID = 6
7,106,624 UART: [idev] SUBJECT.KEYID = 7
7,107,844 UART: [idev] UDS.KEYID = 0
7,110,620 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
7,253,815 UART: [idev] Erasing UDS.KEYID = 0
10,397,389 UART: [idev] Using Sha1 for KeyId Algorithm
10,419,031 UART: [idev] --
10,423,509 UART: [ldev] ++
10,424,134 UART: [ldev] CDI.KEYID = 6
10,425,064 UART: [ldev] SUBJECT.KEYID = 5
10,426,331 UART: [ldev] AUTHORITY.KEYID = 7
10,427,573 UART: [ldev] FE.KEYID = 1
10,440,872 UART: [ldev] Erasing FE.KEYID = 1
13,734,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,026,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,041,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,056,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,070,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,089,199 UART: [ldev] --
16,093,557 UART: [fwproc] Waiting for Commands...
16,096,526 UART: [fwproc] Received command 0x46574c44
16,098,718 UART: [fwproc] Received Image of size 114036 bytes
20,151,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,220,943 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,289,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,607,370 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,129,907 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
16,565,244 >>> mbox cmd response: failed
16,565,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,566,168 >>> mbox cmd response: failed
16,566,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,566,687 >>> mbox cmd response: failed
Initializing fuses
2,044,437 writing to cptra_bootfsm_go
7,437,590 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
21,393,355 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,226 UART:
192,594 UART: Running Caliptra ROM ...
193,739 UART:
193,887 UART: [state] CFI Enabled
261,457 UART: [state] LifecycleState = Unprovisioned
263,327 UART: [state] DebugLocked = No
265,004 UART: [state] WD Timer not started. Device not locked for debugging
268,082 UART: [kat] SHA2-256
447,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,774 UART: [kat] ++
459,312 UART: [kat] sha1
469,978 UART: [kat] SHA2-256
473,034 UART: [kat] SHA2-384
479,506 UART: [kat] SHA2-512-ACC
482,436 UART: [kat] ECC-384
2,947,550 UART: [kat] HMAC-384Kdf
2,968,858 UART: [kat] LMS
3,498,274 UART: [kat] --
3,502,492 UART: [cold-reset] ++
3,503,668 UART: [fht] FHT @ 0x50003400
3,513,942 UART: [idev] ++
3,514,516 UART: [idev] CDI.KEYID = 6
3,515,445 UART: [idev] SUBJECT.KEYID = 7
3,516,601 UART: [idev] UDS.KEYID = 0
3,519,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,663,446 UART: [idev] Erasing UDS.KEYID = 0
6,025,575 UART: [idev] Sha1 KeyId Algorithm
6,048,107 UART: [idev] --
6,051,027 UART: [ldev] ++
6,051,605 UART: [ldev] CDI.KEYID = 6
6,052,514 UART: [ldev] SUBJECT.KEYID = 5
6,053,675 UART: [ldev] AUTHORITY.KEYID = 7
6,054,966 UART: [ldev] FE.KEYID = 1
6,098,948 UART: [ldev] Erasing FE.KEYID = 1
8,600,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,481 UART: [ldev] --
10,410,285 UART: [fwproc] Wait for Commands...
10,412,702 UART: [fwproc] Recv command 0x46574c44
10,414,794 UART: [fwproc] Recv'd Img size: 114360 bytes
12,079,806 UART: ROM Fatal Error: 0x000B0033
12,082,946 >>> mbox cmd response: failed
12,083,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,083,717 >>> mbox cmd response: failed
12,084,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,084,329 >>> mbox cmd response: failed
Initializing fuses
2,048,573 writing to cptra_bootfsm_go
2,237,897 UART:
2,238,247 UART: Running Caliptra ROM ...
2,239,295 UART:
2,239,445 UART: [state] CFI Enabled
2,297,157 UART: [state] LifecycleState = Unprovisioned
2,299,044 UART: [state] DebugLocked = No
2,300,545 UART: [state] WD Timer not started. Device not locked for debugging
2,304,025 UART: [kat] SHA2-256
2,483,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,494,688 UART: [kat] ++
2,495,186 UART: [kat] sha1
2,507,267 UART: [kat] SHA2-256
2,510,292 UART: [kat] SHA2-384
2,516,715 UART: [kat] SHA2-512-ACC
2,519,657 UART: [kat] ECC-384
4,983,520 UART: [kat] HMAC-384Kdf
5,007,867 UART: [kat] LMS
5,537,319 UART: [kat] --
5,540,927 UART: [cold-reset] ++
5,542,639 UART: [fht] FHT @ 0x50003400
5,553,614 UART: [idev] ++
5,554,177 UART: [idev] CDI.KEYID = 6
5,555,083 UART: [idev] SUBJECT.KEYID = 7
5,556,302 UART: [idev] UDS.KEYID = 0
5,558,840 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,702,807 UART: [idev] Erasing UDS.KEYID = 0
8,059,103 UART: [idev] Sha1 KeyId Algorithm
8,080,818 UART: [idev] --
8,084,607 UART: [ldev] ++
8,085,177 UART: [ldev] CDI.KEYID = 6
8,086,092 UART: [ldev] SUBJECT.KEYID = 5
8,087,254 UART: [ldev] AUTHORITY.KEYID = 7
8,088,566 UART: [ldev] FE.KEYID = 1
8,135,348 UART: [ldev] Erasing FE.KEYID = 1
10,640,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,358,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,374,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,390,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,405,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,426,759 UART: [ldev] --
12,430,901 UART: [fwproc] Wait for Commands...
12,433,917 UART: [fwproc] Recv command 0x46574c44
12,436,010 UART: [fwproc] Recv'd Img size: 114360 bytes
15,847,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,918,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,986,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,304,932 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,293 UART:
192,721 UART: Running Caliptra ROM ...
193,841 UART:
193,984 UART: [state] CFI Enabled
263,924 UART: [state] LifecycleState = Unprovisioned
266,347 UART: [state] DebugLocked = No
267,961 UART: [state] WD Timer not started. Device not locked for debugging
272,890 UART: [kat] SHA2-256
462,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,531 UART: [kat] ++
473,987 UART: [kat] sha1
486,484 UART: [kat] SHA2-256
489,496 UART: [kat] SHA2-384
495,965 UART: [kat] SHA2-512-ACC
498,582 UART: [kat] ECC-384
2,945,774 UART: [kat] HMAC-384Kdf
2,970,385 UART: [kat] LMS
3,502,128 UART: [kat] --
3,505,696 UART: [cold-reset] ++
3,506,982 UART: [fht] FHT @ 0x50003400
3,519,101 UART: [idev] ++
3,519,831 UART: [idev] CDI.KEYID = 6
3,520,818 UART: [idev] SUBJECT.KEYID = 7
3,521,982 UART: [idev] UDS.KEYID = 0
3,524,864 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,940 UART: [idev] Erasing UDS.KEYID = 0
6,027,061 UART: [idev] Sha1 KeyId Algorithm
6,050,142 UART: [idev] --
6,054,790 UART: [ldev] ++
6,055,474 UART: [ldev] CDI.KEYID = 6
6,056,385 UART: [ldev] SUBJECT.KEYID = 5
6,057,548 UART: [ldev] AUTHORITY.KEYID = 7
6,058,931 UART: [ldev] FE.KEYID = 1
6,099,457 UART: [ldev] Erasing FE.KEYID = 1
8,603,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,240 UART: [ldev] --
10,415,103 UART: [fwproc] Wait for Commands...
10,418,061 UART: [fwproc] Recv command 0x46574c44
10,420,331 UART: [fwproc] Recv'd Img size: 114360 bytes
12,119,164 UART: ROM Fatal Error: 0x000B0033
12,122,617 >>> mbox cmd response: failed
12,122,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,123,279 >>> mbox cmd response: failed
12,123,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,123,869 >>> mbox cmd response: failed
Initializing fuses
2,049,588 writing to cptra_bootfsm_go
2,238,970 UART:
2,239,324 UART: Running Caliptra ROM ...
2,240,410 UART:
2,240,574 UART: [state] CFI Enabled
2,308,035 UART: [state] LifecycleState = Unprovisioned
2,310,420 UART: [state] DebugLocked = No
2,311,981 UART: [state] WD Timer not started. Device not locked for debugging
2,317,040 UART: [kat] SHA2-256
2,506,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,517,700 UART: [kat] ++
2,518,166 UART: [kat] sha1
2,529,919 UART: [kat] SHA2-256
2,532,940 UART: [kat] SHA2-384
2,538,506 UART: [kat] SHA2-512-ACC
2,541,047 UART: [kat] ECC-384
4,997,946 UART: [kat] HMAC-384Kdf
5,025,112 UART: [kat] LMS
5,556,896 UART: [kat] --
5,560,946 UART: [cold-reset] ++
5,562,987 UART: [fht] FHT @ 0x50003400
5,574,610 UART: [idev] ++
5,575,346 UART: [idev] CDI.KEYID = 6
5,576,238 UART: [idev] SUBJECT.KEYID = 7
5,577,453 UART: [idev] UDS.KEYID = 0
5,580,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,724,493 UART: [idev] Erasing UDS.KEYID = 0
8,083,694 UART: [idev] Sha1 KeyId Algorithm
8,105,163 UART: [idev] --
8,110,643 UART: [ldev] ++
8,111,339 UART: [ldev] CDI.KEYID = 6
8,112,286 UART: [ldev] SUBJECT.KEYID = 5
8,113,447 UART: [ldev] AUTHORITY.KEYID = 7
8,114,624 UART: [ldev] FE.KEYID = 1
8,154,926 UART: [ldev] Erasing FE.KEYID = 1
10,664,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,344 UART: [ldev] --
12,467,256 UART: [fwproc] Wait for Commands...
12,470,056 UART: [fwproc] Recv command 0x46574c44
12,472,373 UART: [fwproc] Recv'd Img size: 114360 bytes
15,908,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,647,464 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,443,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,878,293 >>> mbox cmd response: failed
11,879,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,879,397 >>> mbox cmd response: failed
11,879,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,879,959 >>> mbox cmd response: failed
Initializing fuses
2,044,355 writing to cptra_bootfsm_go
5,475,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,767,421 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,498 UART:
192,853 UART: Running Caliptra ROM ...
193,966 UART:
603,732 UART: [state] CFI Enabled
619,775 UART: [state] LifecycleState = Unprovisioned
622,114 UART: [state] DebugLocked = No
624,305 UART: [state] WD Timer not started. Device not locked for debugging
629,798 UART: [kat] SHA2-256
819,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,435 UART: [kat] ++
831,018 UART: [kat] sha1
841,101 UART: [kat] SHA2-256
844,108 UART: [kat] SHA2-384
850,513 UART: [kat] SHA2-512-ACC
853,123 UART: [kat] ECC-384
3,290,482 UART: [kat] HMAC-384Kdf
3,303,846 UART: [kat] LMS
3,835,674 UART: [kat] --
3,838,108 UART: [cold-reset] ++
3,838,983 UART: [fht] FHT @ 0x50003400
3,850,896 UART: [idev] ++
3,851,612 UART: [idev] CDI.KEYID = 6
3,852,529 UART: [idev] SUBJECT.KEYID = 7
3,853,743 UART: [idev] UDS.KEYID = 0
3,856,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,477 UART: [idev] Erasing UDS.KEYID = 0
6,332,775 UART: [idev] Sha1 KeyId Algorithm
6,354,118 UART: [idev] --
6,358,702 UART: [ldev] ++
6,359,382 UART: [ldev] CDI.KEYID = 6
6,360,268 UART: [ldev] SUBJECT.KEYID = 5
6,361,478 UART: [ldev] AUTHORITY.KEYID = 7
6,362,710 UART: [ldev] FE.KEYID = 1
6,374,063 UART: [ldev] Erasing FE.KEYID = 1
8,848,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,119 UART: [ldev] --
10,638,064 UART: [fwproc] Wait for Commands...
10,639,841 UART: [fwproc] Recv command 0x46574c44
10,642,154 UART: [fwproc] Recv'd Img size: 114360 bytes
12,342,313 UART: ROM Fatal Error: 0x000B0033
12,345,763 >>> mbox cmd response: failed
12,346,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,346,536 >>> mbox cmd response: failed
12,346,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,347,041 >>> mbox cmd response: failed
Initializing fuses
2,049,921 writing to cptra_bootfsm_go
2,239,230 UART:
2,239,578 UART: Running Caliptra ROM ...
2,240,624 UART:
8,114,387 UART: [state] CFI Enabled
8,125,281 UART: [state] LifecycleState = Unprovisioned
8,127,635 UART: [state] DebugLocked = No
8,130,328 UART: [state] WD Timer not started. Device not locked for debugging
8,134,724 UART: [kat] SHA2-256
8,324,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,335,402 UART: [kat] ++
8,336,004 UART: [kat] sha1
8,348,851 UART: [kat] SHA2-256
8,351,864 UART: [kat] SHA2-384
8,358,041 UART: [kat] SHA2-512-ACC
8,360,621 UART: [kat] ECC-384
10,802,001 UART: [kat] HMAC-384Kdf
10,814,173 UART: [kat] LMS
11,346,004 UART: [kat] --
11,351,887 UART: [cold-reset] ++
11,353,716 UART: [fht] FHT @ 0x50003400
11,366,147 UART: [idev] ++
11,366,872 UART: [idev] CDI.KEYID = 6
11,367,889 UART: [idev] SUBJECT.KEYID = 7
11,368,990 UART: [idev] UDS.KEYID = 0
11,372,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,515,866 UART: [idev] Erasing UDS.KEYID = 0
13,840,558 UART: [idev] Sha1 KeyId Algorithm
13,862,869 UART: [idev] --
13,867,078 UART: [ldev] ++
13,867,778 UART: [ldev] CDI.KEYID = 6
13,868,665 UART: [ldev] SUBJECT.KEYID = 5
13,869,879 UART: [ldev] AUTHORITY.KEYID = 7
13,871,058 UART: [ldev] FE.KEYID = 1
13,882,637 UART: [ldev] Erasing FE.KEYID = 1
16,359,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,076,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,091,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,107,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,122,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,143,474 UART: [ldev] --
18,148,512 UART: [fwproc] Wait for Commands...
18,151,113 UART: [fwproc] Recv command 0x46574c44
18,153,433 UART: [fwproc] Recv'd Img size: 114360 bytes
21,601,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,676,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,792,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
22,334,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,762,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,070,273 >>> mbox cmd response: failed
12,070,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,071,149 >>> mbox cmd response: failed
12,071,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,071,720 >>> mbox cmd response: failed
Initializing fuses
2,045,813 writing to cptra_bootfsm_go
11,547,655 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,753,375 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,437 UART: [kat] SHA2-256
892,375 UART: [kat] SHA2-384
894,998 UART: [kat] SHA2-512-ACC
896,899 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,834 UART: [kat] LMS
1,475,030 UART: [kat] --
1,476,033 UART: [cold-reset] ++
1,476,441 UART: [fht] Storing FHT @ 0x50003400
1,479,022 UART: [idev] ++
1,479,190 UART: [idev] CDI.KEYID = 6
1,479,550 UART: [idev] SUBJECT.KEYID = 7
1,479,974 UART: [idev] UDS.KEYID = 0
1,480,319 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,550 UART: [idev] Erasing UDS.KEYID = 0
1,503,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,464 UART: [idev] --
1,513,493 UART: [ldev] ++
1,513,661 UART: [ldev] CDI.KEYID = 6
1,514,024 UART: [ldev] SUBJECT.KEYID = 5
1,514,450 UART: [ldev] AUTHORITY.KEYID = 7
1,514,913 UART: [ldev] FE.KEYID = 1
1,520,197 UART: [ldev] Erasing FE.KEYID = 1
1,545,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,216 UART: [ldev] --
1,584,619 UART: [fwproc] Waiting for Commands...
1,585,486 UART: [fwproc] Received command 0x46574c44
1,586,277 UART: [fwproc] Received Image of size 114360 bytes
2,760,970 UART: ROM Fatal Error: 0x000B0033
2,762,127 >>> mbox cmd response: failed
2,762,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,133 >>> mbox cmd response: failed
2,762,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,256 UART: [kat] LMS
1,475,452 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,434 UART: [idev] ++
1,479,602 UART: [idev] CDI.KEYID = 6
1,479,962 UART: [idev] SUBJECT.KEYID = 7
1,480,386 UART: [idev] UDS.KEYID = 0
1,480,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,282 UART: [idev] Erasing UDS.KEYID = 0
1,504,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,418 UART: [idev] --
1,514,469 UART: [ldev] ++
1,514,637 UART: [ldev] CDI.KEYID = 6
1,515,000 UART: [ldev] SUBJECT.KEYID = 5
1,515,426 UART: [ldev] AUTHORITY.KEYID = 7
1,515,889 UART: [ldev] FE.KEYID = 1
1,521,213 UART: [ldev] Erasing FE.KEYID = 1
1,546,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,036 UART: [ldev] --
1,585,529 UART: [fwproc] Waiting for Commands...
1,586,368 UART: [fwproc] Received command 0x46574c44
1,587,159 UART: [fwproc] Received Image of size 114360 bytes
2,885,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,903 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,256 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,651 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,654,057 >>> mbox cmd response: failed
2,654,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,063 >>> mbox cmd response: failed
2,654,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,532 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,380 UART: [kat] SHA2-256
892,318 UART: [kat] SHA2-384
895,049 UART: [kat] SHA2-512-ACC
896,950 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,195 UART: [kat] LMS
1,475,391 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,618 UART: [fht] Storing FHT @ 0x50003400
1,479,241 UART: [idev] ++
1,479,409 UART: [idev] CDI.KEYID = 6
1,479,769 UART: [idev] SUBJECT.KEYID = 7
1,480,193 UART: [idev] UDS.KEYID = 0
1,480,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,445 UART: [idev] Erasing UDS.KEYID = 0
1,504,631 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,259 UART: [idev] --
1,514,484 UART: [ldev] ++
1,514,652 UART: [ldev] CDI.KEYID = 6
1,515,015 UART: [ldev] SUBJECT.KEYID = 5
1,515,441 UART: [ldev] AUTHORITY.KEYID = 7
1,515,904 UART: [ldev] FE.KEYID = 1
1,521,166 UART: [ldev] Erasing FE.KEYID = 1
1,546,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,705 UART: [ldev] --
1,586,072 UART: [fwproc] Waiting for Commands...
1,586,719 UART: [fwproc] Received command 0x46574c44
1,587,510 UART: [fwproc] Received Image of size 114360 bytes
2,724,876 UART: ROM Fatal Error: 0x000B0033
2,726,033 >>> mbox cmd response: failed
2,726,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,726,039 >>> mbox cmd response: failed
2,726,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,726,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,810 UART: [kat] SHA2-256
882,741 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,856 UART: [kat] ++
887,008 UART: [kat] sha1
891,308 UART: [kat] SHA2-256
893,246 UART: [kat] SHA2-384
896,091 UART: [kat] SHA2-512-ACC
897,992 UART: [kat] ECC-384
903,527 UART: [kat] HMAC-384Kdf
908,057 UART: [kat] LMS
1,476,253 UART: [kat] --
1,477,312 UART: [cold-reset] ++
1,477,692 UART: [fht] Storing FHT @ 0x50003400
1,480,487 UART: [idev] ++
1,480,655 UART: [idev] CDI.KEYID = 6
1,481,015 UART: [idev] SUBJECT.KEYID = 7
1,481,439 UART: [idev] UDS.KEYID = 0
1,481,784 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,173 UART: [idev] Erasing UDS.KEYID = 0
1,505,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,751 UART: [idev] --
1,515,782 UART: [ldev] ++
1,515,950 UART: [ldev] CDI.KEYID = 6
1,516,313 UART: [ldev] SUBJECT.KEYID = 5
1,516,739 UART: [ldev] AUTHORITY.KEYID = 7
1,517,202 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,647 UART: [ldev] --
1,587,010 UART: [fwproc] Waiting for Commands...
1,587,655 UART: [fwproc] Received command 0x46574c44
1,588,446 UART: [fwproc] Received Image of size 114360 bytes
2,885,292 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,780 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,579,370 >>> mbox cmd response: failed
2,579,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,376 >>> mbox cmd response: failed
2,579,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,606 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,637 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,562 UART: [kat] LMS
1,170,890 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,189 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,596 UART: [idev] Erasing UDS.KEYID = 0
1,200,733 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,712 UART: [ldev] SUBJECT.KEYID = 5
1,211,138 UART: [ldev] AUTHORITY.KEYID = 7
1,211,601 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,244,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,887 UART: [ldev] --
1,283,300 UART: [fwproc] Wait for Commands...
1,283,876 UART: [fwproc] Recv command 0x46574c44
1,284,604 UART: [fwproc] Recv'd Img size: 114360 bytes
1,588,984 UART: ROM Fatal Error: 0x000B0033
1,590,141 >>> mbox cmd response: failed
1,590,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,147 >>> mbox cmd response: failed
1,590,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
892,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,115 UART: [kat] ++
897,267 UART: [kat] sha1
901,487 UART: [kat] SHA2-256
903,427 UART: [kat] SHA2-384
906,420 UART: [kat] SHA2-512-ACC
908,321 UART: [kat] ECC-384
918,040 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,599 UART: [cold-reset] ++
1,172,101 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,888 UART: [idev] Erasing UDS.KEYID = 0
1,200,745 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,748 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,546 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,283,996 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,331 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,079 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,450,963 >>> mbox cmd response: failed
1,450,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,969 >>> mbox cmd response: failed
1,450,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,994 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
918,763 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,780 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,855 UART: [idev] Erasing UDS.KEYID = 0
1,201,424 UART: [idev] Sha1 KeyId Algorithm
1,209,968 UART: [idev] --
1,211,020 UART: [ldev] ++
1,211,188 UART: [ldev] CDI.KEYID = 6
1,211,551 UART: [ldev] SUBJECT.KEYID = 5
1,211,977 UART: [ldev] AUTHORITY.KEYID = 7
1,212,440 UART: [ldev] FE.KEYID = 1
1,217,306 UART: [ldev] Erasing FE.KEYID = 1
1,243,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,794 UART: [ldev] --
1,283,063 UART: [fwproc] Wait for Commands...
1,283,681 UART: [fwproc] Recv command 0x46574c44
1,284,409 UART: [fwproc] Recv'd Img size: 114360 bytes
1,592,288 UART: ROM Fatal Error: 0x000B0033
1,593,445 >>> mbox cmd response: failed
1,593,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,451 >>> mbox cmd response: failed
1,593,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,445 UART: [kat] SHA2-512-ACC
908,346 UART: [kat] ECC-384
918,143 UART: [kat] HMAC-384Kdf
922,897 UART: [kat] LMS
1,171,225 UART: [kat] --
1,172,080 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,175,259 UART: [idev] ++
1,175,427 UART: [idev] CDI.KEYID = 6
1,175,787 UART: [idev] SUBJECT.KEYID = 7
1,176,211 UART: [idev] UDS.KEYID = 0
1,176,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,093 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,808 UART: [idev] --
1,211,002 UART: [ldev] ++
1,211,170 UART: [ldev] CDI.KEYID = 6
1,211,533 UART: [ldev] SUBJECT.KEYID = 5
1,211,959 UART: [ldev] AUTHORITY.KEYID = 7
1,212,422 UART: [ldev] FE.KEYID = 1
1,217,788 UART: [ldev] Erasing FE.KEYID = 1
1,244,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,048 UART: [ldev] --
1,283,447 UART: [fwproc] Wait for Commands...
1,284,027 UART: [fwproc] Recv command 0x46574c44
1,284,755 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,542 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,130 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,444,623 >>> mbox cmd response: failed
1,444,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,629 >>> mbox cmd response: failed
1,444,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,890 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,373 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,178 UART: [kat] SHA2-256
891,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,857 UART: [kat] ++
896,009 UART: [kat] sha1
900,411 UART: [kat] SHA2-256
902,351 UART: [kat] SHA2-384
904,922 UART: [kat] SHA2-512-ACC
906,823 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,147 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,048 UART: [ldev] --
1,280,330 UART: [fwproc] Wait for Commands...
1,281,077 UART: [fwproc] Recv command 0x46574c44
1,281,810 UART: [fwproc] Recv'd Img size: 114360 bytes
1,591,958 UART: ROM Fatal Error: 0x000B0033
1,593,115 >>> mbox cmd response: failed
1,593,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,121 >>> mbox cmd response: failed
1,593,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,127 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,120 UART: [ldev] Erasing FE.KEYID = 1
1,241,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,280,897 UART: [fwproc] Recv command 0x46574c44
1,281,630 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,379 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,112 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,447,587 >>> mbox cmd response: failed
1,447,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,593 >>> mbox cmd response: failed
1,447,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,325 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
915,611 UART: [kat] HMAC-384Kdf
920,277 UART: [kat] LMS
1,168,589 UART: [kat] --
1,169,604 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,173,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,857 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,343 UART: [fwproc] Recv'd Img size: 114360 bytes
1,592,859 UART: ROM Fatal Error: 0x000B0033
1,594,016 >>> mbox cmd response: failed
1,594,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,022 >>> mbox cmd response: failed
1,594,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,932 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,631 UART: [ldev] --
1,281,019 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,417 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,296 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,453,482 >>> mbox cmd response: failed
1,453,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,488 >>> mbox cmd response: failed
1,453,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,372 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
4,878,763 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,324,967 >>> mbox cmd response: failed
15,325,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,325,964 >>> mbox cmd response: failed
15,326,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,326,531 >>> mbox cmd response: failed
Initializing fuses
2,049,983 writing to cptra_bootfsm_go
6,913,330 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,496,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
4,880,452 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,334,915 >>> mbox cmd response: failed
15,335,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,336,112 >>> mbox cmd response: failed
15,336,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,336,692 >>> mbox cmd response: failed
Initializing fuses
2,057,709 writing to cptra_bootfsm_go
6,928,163 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,507,923 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
5,188,795 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,496,461 >>> mbox cmd response: failed
15,497,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,497,482 >>> mbox cmd response: failed
15,497,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,498,046 >>> mbox cmd response: failed
Initializing fuses
2,049,684 writing to cptra_bootfsm_go
9,556,437 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
23,001,092 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
5,192,301 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,495,157 >>> mbox cmd response: failed
15,495,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,496,176 >>> mbox cmd response: failed
15,496,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,496,739 >>> mbox cmd response: failed
Initializing fuses
2,056,460 writing to cptra_bootfsm_go
9,552,686 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
22,980,972 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,482,801 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,428,795 >>> mbox cmd response: failed
11,429,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,429,782 >>> mbox cmd response: failed
11,430,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,430,352 >>> mbox cmd response: failed
Initializing fuses
2,047,467 writing to cptra_bootfsm_go
5,488,946 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,335,236 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,442,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,437,740 >>> mbox cmd response: failed
11,438,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,438,823 >>> mbox cmd response: failed
11,439,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,439,389 >>> mbox cmd response: failed
Initializing fuses
2,055,963 writing to cptra_bootfsm_go
5,484,353 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,339,299 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,447,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,403,880 >>> mbox cmd response: failed
11,404,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,404,979 >>> mbox cmd response: failed
11,405,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,405,546 >>> mbox cmd response: failed
Initializing fuses
2,059,636 writing to cptra_bootfsm_go
5,505,105 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,365,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,785,311 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,645,399 >>> mbox cmd response: failed
11,646,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,646,366 >>> mbox cmd response: failed
11,646,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,646,924 >>> mbox cmd response: failed
Initializing fuses
2,051,611 writing to cptra_bootfsm_go
11,995,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,746,749 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,792,774 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
11,654,091 >>> mbox cmd response: failed
11,654,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,655,021 >>> mbox cmd response: failed
11,655,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,655,588 >>> mbox cmd response: failed
Initializing fuses
2,050,493 writing to cptra_bootfsm_go
11,991,230 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
22,736,032 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,215 >>> mbox cmd response: failed
1,197,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,221 >>> mbox cmd response: failed
1,197,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,328 UART: [kat] HMAC-384Kdf
906,970 UART: [kat] LMS
1,475,166 UART: [kat] --
1,475,995 UART: [cold-reset] ++
1,476,327 UART: [fht] Storing FHT @ 0x50003400
1,479,004 UART: [idev] ++
1,479,172 UART: [idev] CDI.KEYID = 6
1,479,532 UART: [idev] SUBJECT.KEYID = 7
1,479,956 UART: [idev] UDS.KEYID = 0
1,480,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,196 UART: [idev] Erasing UDS.KEYID = 0
1,505,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,922 UART: [idev] --
1,515,125 UART: [ldev] ++
1,515,293 UART: [ldev] CDI.KEYID = 6
1,515,656 UART: [ldev] SUBJECT.KEYID = 5
1,516,082 UART: [ldev] AUTHORITY.KEYID = 7
1,516,545 UART: [ldev] FE.KEYID = 1
1,521,753 UART: [ldev] Erasing FE.KEYID = 1
1,546,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,818 UART: [ldev] --
1,586,275 UART: [fwproc] Waiting for Commands...
1,587,120 UART: [fwproc] Received command 0x46574c44
1,587,911 UART: [fwproc] Received Image of size 114360 bytes
2,886,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,096 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,337 >>> mbox cmd response: failed
1,197,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,343 >>> mbox cmd response: failed
1,197,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,278 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,894 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,656 >>> mbox cmd response: failed
1,199,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,662 >>> mbox cmd response: failed
1,199,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,012 UART: [kat] SHA2-256
881,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,058 UART: [kat] ++
886,210 UART: [kat] sha1
890,538 UART: [kat] SHA2-256
892,476 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,747 UART: [kat] HMAC-384Kdf
907,223 UART: [kat] LMS
1,475,419 UART: [kat] --
1,476,208 UART: [cold-reset] ++
1,476,780 UART: [fht] Storing FHT @ 0x50003400
1,479,599 UART: [idev] ++
1,479,767 UART: [idev] CDI.KEYID = 6
1,480,127 UART: [idev] SUBJECT.KEYID = 7
1,480,551 UART: [idev] UDS.KEYID = 0
1,480,896 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,621 UART: [idev] Erasing UDS.KEYID = 0
1,505,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,977 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,726 UART: [ldev] Erasing FE.KEYID = 1
1,547,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,649 UART: [ldev] --
1,587,102 UART: [fwproc] Waiting for Commands...
1,587,913 UART: [fwproc] Received command 0x46574c44
1,588,704 UART: [fwproc] Received Image of size 114360 bytes
2,886,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,574 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,751 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,386 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,198,508 >>> mbox cmd response: failed
1,198,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,514 >>> mbox cmd response: failed
1,198,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,499 >>> mbox cmd response: failed
1,197,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,505 >>> mbox cmd response: failed
1,197,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
917,574 UART: [kat] HMAC-384Kdf
922,146 UART: [kat] LMS
1,170,474 UART: [kat] --
1,171,369 UART: [cold-reset] ++
1,171,801 UART: [fht] FHT @ 0x50003400
1,174,442 UART: [idev] ++
1,174,610 UART: [idev] CDI.KEYID = 6
1,174,970 UART: [idev] SUBJECT.KEYID = 7
1,175,394 UART: [idev] UDS.KEYID = 0
1,175,739 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,177 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,675 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,106 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,733 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,807 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,196,683 >>> mbox cmd response: failed
1,196,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,689 >>> mbox cmd response: failed
1,196,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,760 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,466 >>> mbox cmd response: failed
1,199,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,472 >>> mbox cmd response: failed
1,199,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
893,883 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,008 UART: [kat] ++
898,160 UART: [kat] sha1
902,368 UART: [kat] SHA2-256
904,308 UART: [kat] SHA2-384
907,115 UART: [kat] SHA2-512-ACC
909,016 UART: [kat] ECC-384
918,441 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,196 UART: [cold-reset] ++
1,172,550 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,461 UART: [idev] Erasing UDS.KEYID = 0
1,201,042 UART: [idev] Sha1 KeyId Algorithm
1,209,506 UART: [idev] --
1,210,492 UART: [ldev] ++
1,210,660 UART: [ldev] CDI.KEYID = 6
1,211,023 UART: [ldev] SUBJECT.KEYID = 5
1,211,449 UART: [ldev] AUTHORITY.KEYID = 7
1,211,912 UART: [ldev] FE.KEYID = 1
1,217,120 UART: [ldev] Erasing FE.KEYID = 1
1,243,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,548 UART: [ldev] --
1,282,861 UART: [fwproc] Wait for Commands...
1,283,577 UART: [fwproc] Recv command 0x46574c44
1,284,305 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,402 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,156 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,194 >>> mbox cmd response: failed
1,199,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,200 >>> mbox cmd response: failed
1,199,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,523 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,073 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,133 >>> mbox cmd response: failed
1,197,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,139 >>> mbox cmd response: failed
1,197,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,500 UART: [kat] HMAC-384Kdf
920,014 UART: [kat] LMS
1,168,326 UART: [kat] --
1,169,139 UART: [cold-reset] ++
1,169,591 UART: [fht] FHT @ 0x50003400
1,172,253 UART: [idev] ++
1,172,421 UART: [idev] CDI.KEYID = 6
1,172,782 UART: [idev] SUBJECT.KEYID = 7
1,173,207 UART: [idev] UDS.KEYID = 0
1,173,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,499 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,088 UART: [ldev] Erasing FE.KEYID = 1
1,241,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,478 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,745 UART: [fwproc] Recv command 0x46574c44
1,282,478 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,207 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,197,655 >>> mbox cmd response: failed
1,197,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,661 >>> mbox cmd response: failed
1,197,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,246 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,853 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,199,576 >>> mbox cmd response: failed
1,199,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,582 >>> mbox cmd response: failed
1,199,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,174,476 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,198,996 UART: [idev] Sha1 KeyId Algorithm
1,207,960 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,149 UART: [ldev] --
1,281,457 UART: [fwproc] Wait for Commands...
1,282,198 UART: [fwproc] Recv command 0x46574c44
1,282,931 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,664 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,282 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,198,912 >>> mbox cmd response: failed
1,198,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,918 >>> mbox cmd response: failed
1,198,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
4,879,710 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,995,173 >>> mbox cmd response: failed
13,996,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,996,425 >>> mbox cmd response: failed
13,996,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,996,988 >>> mbox cmd response: failed
Initializing fuses
2,058,903 writing to cptra_bootfsm_go
6,916,420 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,529,129 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
4,879,643 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,997,157 >>> mbox cmd response: failed
13,997,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,998,209 >>> mbox cmd response: failed
13,998,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,998,768 >>> mbox cmd response: failed
Initializing fuses
2,052,044 writing to cptra_bootfsm_go
6,918,049 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,529,746 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
5,189,818 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,164,291 >>> mbox cmd response: failed
14,165,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,165,419 >>> mbox cmd response: failed
14,165,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,166,037 >>> mbox cmd response: failed
Initializing fuses
2,058,134 writing to cptra_bootfsm_go
10,882,064 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,360,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
5,190,419 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
14,171,740 >>> mbox cmd response: failed
14,172,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,172,696 >>> mbox cmd response: failed
14,172,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,173,261 >>> mbox cmd response: failed
Initializing fuses
2,051,008 writing to cptra_bootfsm_go
10,873,996 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,347,067 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,461,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,392,305 >>> mbox cmd response: failed
10,392,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,393,176 >>> mbox cmd response: failed
10,393,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,393,740 >>> mbox cmd response: failed
Initializing fuses
2,049,520 writing to cptra_bootfsm_go
5,494,079 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,368,697 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,472,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,467,670 >>> mbox cmd response: failed
10,468,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,468,609 >>> mbox cmd response: failed
10,468,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,469,166 >>> mbox cmd response: failed
Initializing fuses
2,051,100 writing to cptra_bootfsm_go
5,499,146 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,340,042 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,465,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,436,726 >>> mbox cmd response: failed
10,437,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,437,719 >>> mbox cmd response: failed
10,437,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,438,289 >>> mbox cmd response: failed
Initializing fuses
2,057,676 writing to cptra_bootfsm_go
5,505,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,362,038 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,790,544 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,624,325 >>> mbox cmd response: failed
10,625,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,508 >>> mbox cmd response: failed
10,625,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,626,070 >>> mbox cmd response: failed
Initializing fuses
2,053,474 writing to cptra_bootfsm_go
13,020,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,787,689 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,787,683 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,632,413 >>> mbox cmd response: failed
10,633,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,633,521 >>> mbox cmd response: failed
10,633,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,634,085 >>> mbox cmd response: failed
Initializing fuses
2,065,280 writing to cptra_bootfsm_go
13,017,995 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
23,777,019 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,459 >>> mbox cmd response: failed
1,179,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,465 >>> mbox cmd response: failed
1,179,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,261 UART: [kat] SHA2-256
882,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,307 UART: [kat] ++
886,459 UART: [kat] sha1
890,785 UART: [kat] SHA2-256
892,723 UART: [kat] SHA2-384
895,496 UART: [kat] SHA2-512-ACC
897,397 UART: [kat] ECC-384
903,088 UART: [kat] HMAC-384Kdf
907,744 UART: [kat] LMS
1,475,940 UART: [kat] --
1,476,533 UART: [cold-reset] ++
1,476,907 UART: [fht] Storing FHT @ 0x50003400
1,479,654 UART: [idev] ++
1,479,822 UART: [idev] CDI.KEYID = 6
1,480,182 UART: [idev] SUBJECT.KEYID = 7
1,480,606 UART: [idev] UDS.KEYID = 0
1,480,951 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,890 UART: [idev] Erasing UDS.KEYID = 0
1,505,604 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,280 UART: [idev] --
1,515,449 UART: [ldev] ++
1,515,617 UART: [ldev] CDI.KEYID = 6
1,515,980 UART: [ldev] SUBJECT.KEYID = 5
1,516,406 UART: [ldev] AUTHORITY.KEYID = 7
1,516,869 UART: [ldev] FE.KEYID = 1
1,522,221 UART: [ldev] Erasing FE.KEYID = 1
1,547,310 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,842 UART: [ldev] --
1,586,303 UART: [fwproc] Waiting for Commands...
1,587,148 UART: [fwproc] Received command 0x46574c44
1,587,939 UART: [fwproc] Received Image of size 114360 bytes
2,885,769 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,881 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,233 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,152 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,717 >>> mbox cmd response: failed
1,179,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,723 >>> mbox cmd response: failed
1,179,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,467 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,242 >>> mbox cmd response: failed
1,180,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,248 >>> mbox cmd response: failed
1,180,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,916 UART: [kat] SHA2-256
892,854 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
903,183 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,750 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,129 UART: [idev] --
1,515,304 UART: [ldev] ++
1,515,472 UART: [ldev] CDI.KEYID = 6
1,515,835 UART: [ldev] SUBJECT.KEYID = 5
1,516,261 UART: [ldev] AUTHORITY.KEYID = 7
1,516,724 UART: [ldev] FE.KEYID = 1
1,522,104 UART: [ldev] Erasing FE.KEYID = 1
1,547,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,891 UART: [ldev] --
1,587,238 UART: [fwproc] Waiting for Commands...
1,588,019 UART: [fwproc] Received command 0x46574c44
1,588,810 UART: [fwproc] Received Image of size 114360 bytes
2,887,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,580 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,949 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,774 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,556 >>> mbox cmd response: failed
1,179,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,562 >>> mbox cmd response: failed
1,179,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,674 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,997 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,797 >>> mbox cmd response: failed
1,179,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,803 >>> mbox cmd response: failed
1,179,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
893,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,395 UART: [kat] ++
897,547 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,624 UART: [kat] HMAC-384Kdf
922,216 UART: [kat] LMS
1,170,544 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,172,049 UART: [fht] FHT @ 0x50003400
1,174,540 UART: [idev] ++
1,174,708 UART: [idev] CDI.KEYID = 6
1,175,068 UART: [idev] SUBJECT.KEYID = 7
1,175,492 UART: [idev] UDS.KEYID = 0
1,175,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,157 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,677 UART: [ldev] --
1,281,028 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,412 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,423 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,763 >>> mbox cmd response: failed
1,179,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,769 >>> mbox cmd response: failed
1,179,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,338 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,206 >>> mbox cmd response: failed
1,181,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,212 >>> mbox cmd response: failed
1,181,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,789 UART: [kat] SHA2-512-ACC
908,690 UART: [kat] ECC-384
918,245 UART: [kat] HMAC-384Kdf
922,887 UART: [kat] LMS
1,171,215 UART: [kat] --
1,171,940 UART: [cold-reset] ++
1,172,310 UART: [fht] FHT @ 0x50003400
1,174,899 UART: [idev] ++
1,175,067 UART: [idev] CDI.KEYID = 6
1,175,427 UART: [idev] SUBJECT.KEYID = 7
1,175,851 UART: [idev] UDS.KEYID = 0
1,176,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,184 UART: [idev] Sha1 KeyId Algorithm
1,209,754 UART: [idev] --
1,210,780 UART: [ldev] ++
1,210,948 UART: [ldev] CDI.KEYID = 6
1,211,311 UART: [ldev] SUBJECT.KEYID = 5
1,211,737 UART: [ldev] AUTHORITY.KEYID = 7
1,212,200 UART: [ldev] FE.KEYID = 1
1,217,358 UART: [ldev] Erasing FE.KEYID = 1
1,243,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,292 UART: [ldev] --
1,282,677 UART: [fwproc] Wait for Commands...
1,283,497 UART: [fwproc] Recv command 0x46574c44
1,284,225 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,180 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,180,182 >>> mbox cmd response: failed
1,180,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,188 >>> mbox cmd response: failed
1,180,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,475 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,635 >>> mbox cmd response: failed
1,181,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,641 >>> mbox cmd response: failed
1,181,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,582 UART: [kat] HMAC-384Kdf
920,124 UART: [kat] LMS
1,168,436 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,169,933 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,173,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,569 UART: [idev] Sha1 KeyId Algorithm
1,207,315 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,338 UART: [ldev] --
1,279,736 UART: [fwproc] Wait for Commands...
1,280,407 UART: [fwproc] Recv command 0x46574c44
1,281,140 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,833 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,863 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,537 >>> mbox cmd response: failed
1,179,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,543 >>> mbox cmd response: failed
1,179,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,262 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,381 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,844 >>> mbox cmd response: failed
1,179,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,850 >>> mbox cmd response: failed
1,179,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,853 UART: [state] LifecycleState = Unprovisioned
85,508 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,635 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,484 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,174,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,662 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,606 UART: [idev] --
1,208,521 UART: [ldev] ++
1,208,689 UART: [ldev] CDI.KEYID = 6
1,209,053 UART: [ldev] SUBJECT.KEYID = 5
1,209,480 UART: [ldev] AUTHORITY.KEYID = 7
1,209,943 UART: [ldev] FE.KEYID = 1
1,215,359 UART: [ldev] Erasing FE.KEYID = 1
1,242,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,273 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,352 UART: [fwproc] Recv command 0x46574c44
1,283,085 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,902 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,179,470 >>> mbox cmd response: failed
1,179,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,476 >>> mbox cmd response: failed
1,179,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,677 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,950 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,265 UART:
192,635 UART: Running Caliptra ROM ...
193,829 UART:
193,982 UART: [state] CFI Enabled
264,506 UART: [state] LifecycleState = Manufacturing
266,491 UART: [state] DebugLocked = No
268,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,710 UART: [kat] SHA2-256
443,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,864 UART: [kat] ++
454,451 UART: [kat] sha1
464,113 UART: [kat] SHA2-256
466,793 UART: [kat] SHA2-384
472,717 UART: [kat] SHA2-512-ACC
475,122 UART: [kat] ECC-384
2,768,164 UART: [kat] HMAC-384Kdf
2,799,305 UART: [kat] LMS
3,989,621 UART: [kat] --
3,993,516 UART: [cold-reset] ++
3,995,029 UART: [fht] Storing FHT @ 0x50003400
4,006,579 UART: [idev] ++
4,007,187 UART: [idev] CDI.KEYID = 6
4,008,109 UART: [idev] SUBJECT.KEYID = 7
4,009,330 UART: [idev] UDS.KEYID = 0
4,014,917 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,651 UART: [idev] Erasing UDS.KEYID = 0
7,343,291 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,334 UART: [idev] --
7,369,521 UART: [ldev] ++
7,370,100 UART: [ldev] CDI.KEYID = 6
7,371,071 UART: [ldev] SUBJECT.KEYID = 5
7,372,233 UART: [ldev] AUTHORITY.KEYID = 7
7,373,519 UART: [ldev] FE.KEYID = 1
7,421,809 UART: [ldev] Erasing FE.KEYID = 1
10,758,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,140 UART: [ldev] --
13,136,146 UART: [fwproc] Waiting for Commands...
13,139,276 UART: [fwproc] Received command 0x46574c44
13,141,487 UART: [fwproc] Received Image of size 114036 bytes
13,203,321 UART: ROM Fatal Error: 0x000B0003
13,206,841 >>> mbox cmd response: failed
13,207,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,207,559 >>> mbox cmd response: failed
13,207,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,208,123 >>> mbox cmd response: failed
Initializing fuses
2,051,084 writing to cptra_bootfsm_go
2,240,421 UART:
2,240,782 UART: Running Caliptra ROM ...
2,241,914 UART:
2,242,083 UART: [state] CFI Enabled
2,310,107 UART: [state] LifecycleState = Manufacturing
2,312,043 UART: [state] DebugLocked = No
2,314,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,234 UART: [kat] SHA2-256
2,489,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,449 UART: [kat] ++
2,500,994 UART: [kat] sha1
2,512,755 UART: [kat] SHA2-256
2,515,451 UART: [kat] SHA2-384
2,521,439 UART: [kat] SHA2-512-ACC
2,523,844 UART: [kat] ECC-384
4,811,921 UART: [kat] HMAC-384Kdf
4,844,321 UART: [kat] LMS
6,034,658 UART: [kat] --
6,038,027 UART: [cold-reset] ++
6,039,531 UART: [fht] Storing FHT @ 0x50003400
6,051,887 UART: [idev] ++
6,052,454 UART: [idev] CDI.KEYID = 6
6,053,438 UART: [idev] SUBJECT.KEYID = 7
6,054,657 UART: [idev] UDS.KEYID = 0
6,057,232 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,200,785 UART: [idev] Erasing UDS.KEYID = 0
9,392,274 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,739 UART: [idev] --
9,420,249 UART: [ldev] ++
9,420,825 UART: [ldev] CDI.KEYID = 6
9,421,795 UART: [ldev] SUBJECT.KEYID = 5
9,423,007 UART: [ldev] AUTHORITY.KEYID = 7
9,424,272 UART: [ldev] FE.KEYID = 1
9,465,663 UART: [ldev] Erasing FE.KEYID = 1
12,798,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,111,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,126,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,141,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,155,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,175,137 UART: [ldev] --
15,179,597 UART: [fwproc] Waiting for Commands...
15,182,557 UART: [fwproc] Received command 0x46574c44
15,184,798 UART: [fwproc] Received Image of size 114036 bytes
19,265,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,342,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,411,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,728,871 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,791,227 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,922,171 >>> mbox cmd response: failed
12,922,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,283 >>> mbox cmd response: failed
12,923,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,845 >>> mbox cmd response: failed
Initializing fuses
2,057,990 writing to cptra_bootfsm_go
5,836,559 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,932,264 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,378 UART:
192,757 UART: Running Caliptra ROM ...
193,893 UART:
603,716 UART: [state] CFI Enabled
615,768 UART: [state] LifecycleState = Manufacturing
617,702 UART: [state] DebugLocked = No
619,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,935 UART: [kat] SHA2-256
794,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,237 UART: [kat] ++
805,686 UART: [kat] sha1
816,040 UART: [kat] SHA2-256
818,783 UART: [kat] SHA2-384
825,305 UART: [kat] SHA2-512-ACC
827,693 UART: [kat] ECC-384
3,112,580 UART: [kat] HMAC-384Kdf
3,124,275 UART: [kat] LMS
4,314,373 UART: [kat] --
4,320,592 UART: [cold-reset] ++
4,322,096 UART: [fht] Storing FHT @ 0x50003400
4,334,472 UART: [idev] ++
4,335,048 UART: [idev] CDI.KEYID = 6
4,336,069 UART: [idev] SUBJECT.KEYID = 7
4,337,236 UART: [idev] UDS.KEYID = 0
4,343,432 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,486,780 UART: [idev] Erasing UDS.KEYID = 0
7,621,905 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,782 UART: [idev] --
7,647,672 UART: [ldev] ++
7,648,298 UART: [ldev] CDI.KEYID = 6
7,649,221 UART: [ldev] SUBJECT.KEYID = 5
7,650,439 UART: [ldev] AUTHORITY.KEYID = 7
7,651,731 UART: [ldev] FE.KEYID = 1
7,661,839 UART: [ldev] Erasing FE.KEYID = 1
10,950,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,411 UART: [ldev] --
13,310,933 UART: [fwproc] Waiting for Commands...
13,313,520 UART: [fwproc] Received command 0x46574c44
13,315,708 UART: [fwproc] Received Image of size 114036 bytes
13,378,719 UART: ROM Fatal Error: 0x000B0003
13,382,259 >>> mbox cmd response: failed
13,382,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,382,917 >>> mbox cmd response: failed
13,383,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,383,476 >>> mbox cmd response: failed
Initializing fuses
2,050,158 writing to cptra_bootfsm_go
2,239,453 UART:
2,239,830 UART: Running Caliptra ROM ...
2,240,931 UART:
7,083,958 UART: [state] CFI Enabled
7,098,337 UART: [state] LifecycleState = Manufacturing
7,100,258 UART: [state] DebugLocked = No
7,102,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,106,842 UART: [kat] SHA2-256
7,276,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,287,130 UART: [kat] ++
7,287,588 UART: [kat] sha1
7,298,264 UART: [kat] SHA2-256
7,300,958 UART: [kat] SHA2-384
7,307,007 UART: [kat] SHA2-512-ACC
7,309,368 UART: [kat] ECC-384
9,592,901 UART: [kat] HMAC-384Kdf
9,605,373 UART: [kat] LMS
10,795,498 UART: [kat] --
10,801,668 UART: [cold-reset] ++
10,803,370 UART: [fht] Storing FHT @ 0x50003400
10,815,244 UART: [idev] ++
10,815,810 UART: [idev] CDI.KEYID = 6
10,816,746 UART: [idev] SUBJECT.KEYID = 7
10,818,030 UART: [idev] UDS.KEYID = 0
10,820,674 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,964,032 UART: [idev] Erasing UDS.KEYID = 0
14,105,282 UART: [idev] Using Sha1 for KeyId Algorithm
14,126,880 UART: [idev] --
14,131,141 UART: [ldev] ++
14,131,709 UART: [ldev] CDI.KEYID = 6
14,132,673 UART: [ldev] SUBJECT.KEYID = 5
14,133,925 UART: [ldev] AUTHORITY.KEYID = 7
14,135,169 UART: [ldev] FE.KEYID = 1
14,145,710 UART: [ldev] Erasing FE.KEYID = 1
17,434,240 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,727,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,741,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,756,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,789,624 UART: [ldev] --
19,794,787 UART: [fwproc] Waiting for Commands...
19,797,268 UART: [fwproc] Received command 0x46574c44
19,799,457 UART: [fwproc] Received Image of size 114036 bytes
23,883,625 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,960,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,029,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,346,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,135,529 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,113,244 >>> mbox cmd response: failed
13,114,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,114,405 >>> mbox cmd response: failed
13,114,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,114,977 >>> mbox cmd response: failed
Initializing fuses
2,054,278 writing to cptra_bootfsm_go
10,889,121 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,870,596 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,443 UART:
192,794 UART: Running Caliptra ROM ...
193,975 UART:
194,132 UART: [state] CFI Enabled
266,050 UART: [state] LifecycleState = Manufacturing
267,974 UART: [state] DebugLocked = No
270,543 UART: [state] WD Timer not started. Device not locked for debugging
273,883 UART: [kat] SHA2-256
453,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,563 UART: [kat] ++
465,124 UART: [kat] sha1
477,816 UART: [kat] SHA2-256
480,875 UART: [kat] SHA2-384
486,760 UART: [kat] SHA2-512-ACC
489,694 UART: [kat] ECC-384
2,951,529 UART: [kat] HMAC-384Kdf
2,974,726 UART: [kat] LMS
3,504,159 UART: [kat] --
3,508,717 UART: [cold-reset] ++
3,511,202 UART: [fht] FHT @ 0x50003400
3,522,595 UART: [idev] ++
3,523,235 UART: [idev] CDI.KEYID = 6
3,524,163 UART: [idev] SUBJECT.KEYID = 7
3,525,274 UART: [idev] UDS.KEYID = 0
3,528,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,908 UART: [idev] Erasing UDS.KEYID = 0
6,029,354 UART: [idev] Sha1 KeyId Algorithm
6,053,458 UART: [idev] --
6,058,533 UART: [ldev] ++
6,059,106 UART: [ldev] CDI.KEYID = 6
6,060,017 UART: [ldev] SUBJECT.KEYID = 5
6,061,238 UART: [ldev] AUTHORITY.KEYID = 7
6,062,473 UART: [ldev] FE.KEYID = 1
6,102,408 UART: [ldev] Erasing FE.KEYID = 1
8,607,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,481 UART: [ldev] --
10,418,026 UART: [fwproc] Wait for Commands...
10,421,151 UART: [fwproc] Recv command 0x46574c44
10,423,277 UART: [fwproc] Recv'd Img size: 114360 bytes
10,481,888 UART: ROM Fatal Error: 0x000B0003
10,485,025 >>> mbox cmd response: failed
10,485,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,485,681 >>> mbox cmd response: failed
10,485,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,486,232 >>> mbox cmd response: failed
Initializing fuses
2,046,967 writing to cptra_bootfsm_go
2,236,243 UART:
2,236,600 UART: Running Caliptra ROM ...
2,237,732 UART:
2,237,924 UART: [state] CFI Enabled
2,302,270 UART: [state] LifecycleState = Manufacturing
2,304,106 UART: [state] DebugLocked = No
2,306,626 UART: [state] WD Timer not started. Device not locked for debugging
2,310,382 UART: [kat] SHA2-256
2,489,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,501,117 UART: [kat] ++
2,501,579 UART: [kat] sha1
2,512,411 UART: [kat] SHA2-256
2,515,418 UART: [kat] SHA2-384
2,522,544 UART: [kat] SHA2-512-ACC
2,525,492 UART: [kat] ECC-384
4,987,239 UART: [kat] HMAC-384Kdf
5,009,896 UART: [kat] LMS
5,539,322 UART: [kat] --
5,542,789 UART: [cold-reset] ++
5,543,988 UART: [fht] FHT @ 0x50003400
5,554,811 UART: [idev] ++
5,555,379 UART: [idev] CDI.KEYID = 6
5,556,460 UART: [idev] SUBJECT.KEYID = 7
5,557,566 UART: [idev] UDS.KEYID = 0
5,560,234 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,704,191 UART: [idev] Erasing UDS.KEYID = 0
8,064,324 UART: [idev] Sha1 KeyId Algorithm
8,088,356 UART: [idev] --
8,092,062 UART: [ldev] ++
8,092,665 UART: [ldev] CDI.KEYID = 6
8,093,747 UART: [ldev] SUBJECT.KEYID = 5
8,094,859 UART: [ldev] AUTHORITY.KEYID = 7
8,096,044 UART: [ldev] FE.KEYID = 1
8,138,561 UART: [ldev] Erasing FE.KEYID = 1
10,641,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,189 UART: [ldev] --
12,451,344 UART: [fwproc] Wait for Commands...
12,453,820 UART: [fwproc] Recv command 0x46574c44
12,455,929 UART: [fwproc] Recv'd Img size: 114360 bytes
15,894,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,969,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,038,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,357,360 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,227 UART:
192,609 UART: Running Caliptra ROM ...
193,794 UART:
193,946 UART: [state] CFI Enabled
265,395 UART: [state] LifecycleState = Manufacturing
267,847 UART: [state] DebugLocked = No
269,609 UART: [state] WD Timer not started. Device not locked for debugging
274,820 UART: [kat] SHA2-256
464,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,492 UART: [kat] ++
475,942 UART: [kat] sha1
486,930 UART: [kat] SHA2-256
489,937 UART: [kat] SHA2-384
496,510 UART: [kat] SHA2-512-ACC
499,096 UART: [kat] ECC-384
2,947,322 UART: [kat] HMAC-384Kdf
2,971,123 UART: [kat] LMS
3,502,853 UART: [kat] --
3,507,439 UART: [cold-reset] ++
3,509,803 UART: [fht] FHT @ 0x50003400
3,522,946 UART: [idev] ++
3,523,628 UART: [idev] CDI.KEYID = 6
3,524,563 UART: [idev] SUBJECT.KEYID = 7
3,525,781 UART: [idev] UDS.KEYID = 0
3,531,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,675,250 UART: [idev] Erasing UDS.KEYID = 0
6,027,389 UART: [idev] Sha1 KeyId Algorithm
6,050,009 UART: [idev] --
6,054,529 UART: [ldev] ++
6,055,255 UART: [ldev] CDI.KEYID = 6
6,056,193 UART: [ldev] SUBJECT.KEYID = 5
6,057,306 UART: [ldev] AUTHORITY.KEYID = 7
6,058,549 UART: [ldev] FE.KEYID = 1
6,091,343 UART: [ldev] Erasing FE.KEYID = 1
8,596,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,191 UART: [ldev] --
10,404,411 UART: [fwproc] Wait for Commands...
10,406,996 UART: [fwproc] Recv command 0x46574c44
10,409,254 UART: [fwproc] Recv'd Img size: 114360 bytes
10,502,992 UART: ROM Fatal Error: 0x000B0003
10,506,682 >>> mbox cmd response: failed
10,507,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,481 >>> mbox cmd response: failed
10,507,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,508,040 >>> mbox cmd response: failed
Initializing fuses
2,056,292 writing to cptra_bootfsm_go
2,245,611 UART:
2,245,958 UART: Running Caliptra ROM ...
2,247,089 UART:
2,247,275 UART: [state] CFI Enabled
2,314,695 UART: [state] LifecycleState = Manufacturing
2,317,075 UART: [state] DebugLocked = No
2,320,003 UART: [state] WD Timer not started. Device not locked for debugging
2,324,368 UART: [kat] SHA2-256
2,514,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,017 UART: [kat] ++
2,525,566 UART: [kat] sha1
2,537,703 UART: [kat] SHA2-256
2,540,722 UART: [kat] SHA2-384
2,546,118 UART: [kat] SHA2-512-ACC
2,548,692 UART: [kat] ECC-384
4,993,648 UART: [kat] HMAC-384Kdf
5,018,516 UART: [kat] LMS
5,550,325 UART: [kat] --
5,553,347 UART: [cold-reset] ++
5,555,676 UART: [fht] FHT @ 0x50003400
5,567,741 UART: [idev] ++
5,568,416 UART: [idev] CDI.KEYID = 6
5,569,386 UART: [idev] SUBJECT.KEYID = 7
5,570,604 UART: [idev] UDS.KEYID = 0
5,573,121 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,717,071 UART: [idev] Erasing UDS.KEYID = 0
8,073,986 UART: [idev] Sha1 KeyId Algorithm
8,096,411 UART: [idev] --
8,101,441 UART: [ldev] ++
8,102,216 UART: [ldev] CDI.KEYID = 6
8,103,136 UART: [ldev] SUBJECT.KEYID = 5
8,104,242 UART: [ldev] AUTHORITY.KEYID = 7
8,105,422 UART: [ldev] FE.KEYID = 1
8,145,561 UART: [ldev] Erasing FE.KEYID = 1
10,652,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,317 UART: [ldev] --
12,459,476 UART: [fwproc] Wait for Commands...
12,461,843 UART: [fwproc] Recv command 0x46574c44
12,464,107 UART: [fwproc] Recv'd Img size: 114360 bytes
15,950,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,026,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,142,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,685,552 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
3,442,499 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,307,600 >>> mbox cmd response: failed
10,308,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,308,535 >>> mbox cmd response: failed
10,308,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,309,126 >>> mbox cmd response: failed
Initializing fuses
2,056,330 writing to cptra_bootfsm_go
5,487,827 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,826,543 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,429 UART:
192,790 UART: Running Caliptra ROM ...
193,975 UART:
603,460 UART: [state] CFI Enabled
616,310 UART: [state] LifecycleState = Manufacturing
618,655 UART: [state] DebugLocked = No
620,379 UART: [state] WD Timer not started. Device not locked for debugging
624,264 UART: [kat] SHA2-256
814,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,938 UART: [kat] ++
825,467 UART: [kat] sha1
836,346 UART: [kat] SHA2-256
839,356 UART: [kat] SHA2-384
844,846 UART: [kat] SHA2-512-ACC
847,466 UART: [kat] ECC-384
3,292,002 UART: [kat] HMAC-384Kdf
3,306,237 UART: [kat] LMS
3,838,093 UART: [kat] --
3,842,626 UART: [cold-reset] ++
3,845,050 UART: [fht] FHT @ 0x50003400
3,857,430 UART: [idev] ++
3,858,162 UART: [idev] CDI.KEYID = 6
3,859,053 UART: [idev] SUBJECT.KEYID = 7
3,860,274 UART: [idev] UDS.KEYID = 0
3,865,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,009,257 UART: [idev] Erasing UDS.KEYID = 0
6,337,212 UART: [idev] Sha1 KeyId Algorithm
6,361,160 UART: [idev] --
6,367,639 UART: [ldev] ++
6,368,325 UART: [ldev] CDI.KEYID = 6
6,369,286 UART: [ldev] SUBJECT.KEYID = 5
6,370,446 UART: [ldev] AUTHORITY.KEYID = 7
6,371,680 UART: [ldev] FE.KEYID = 1
6,380,542 UART: [ldev] Erasing FE.KEYID = 1
8,857,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,479 UART: [ldev] --
10,649,470 UART: [fwproc] Wait for Commands...
10,651,695 UART: [fwproc] Recv command 0x46574c44
10,654,106 UART: [fwproc] Recv'd Img size: 114360 bytes
10,747,204 UART: ROM Fatal Error: 0x000B0003
10,750,891 >>> mbox cmd response: failed
10,751,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,751,621 >>> mbox cmd response: failed
10,751,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,752,186 >>> mbox cmd response: failed
Initializing fuses
2,051,039 writing to cptra_bootfsm_go
2,240,363 UART:
2,240,706 UART: Running Caliptra ROM ...
2,241,852 UART:
9,716,558 UART: [state] CFI Enabled
9,728,979 UART: [state] LifecycleState = Manufacturing
9,731,387 UART: [state] DebugLocked = No
9,734,341 UART: [state] WD Timer not started. Device not locked for debugging
9,738,197 UART: [kat] SHA2-256
9,928,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,938,844 UART: [kat] ++
9,939,362 UART: [kat] sha1
9,950,251 UART: [kat] SHA2-256
9,953,280 UART: [kat] SHA2-384
9,959,486 UART: [kat] SHA2-512-ACC
9,962,053 UART: [kat] ECC-384
12,405,467 UART: [kat] HMAC-384Kdf
12,419,318 UART: [kat] LMS
12,951,157 UART: [kat] --
12,955,389 UART: [cold-reset] ++
12,957,914 UART: [fht] FHT @ 0x50003400
12,969,103 UART: [idev] ++
12,969,784 UART: [idev] CDI.KEYID = 6
12,970,751 UART: [idev] SUBJECT.KEYID = 7
12,971,966 UART: [idev] UDS.KEYID = 0
12,974,679 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,118,432 UART: [idev] Erasing UDS.KEYID = 0
15,450,471 UART: [idev] Sha1 KeyId Algorithm
15,472,037 UART: [idev] --
15,475,763 UART: [ldev] ++
15,476,445 UART: [ldev] CDI.KEYID = 6
15,477,352 UART: [ldev] SUBJECT.KEYID = 5
15,478,583 UART: [ldev] AUTHORITY.KEYID = 7
15,479,761 UART: [ldev] FE.KEYID = 1
15,491,093 UART: [ldev] Erasing FE.KEYID = 1
17,968,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,686,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,702,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,717,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,732,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,753,082 UART: [ldev] --
19,759,332 UART: [fwproc] Wait for Commands...
19,761,376 UART: [fwproc] Recv command 0x46574c44
19,763,690 UART: [fwproc] Recv'd Img size: 114360 bytes
23,245,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,323,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,439,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,982,295 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,761,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,529,573 >>> mbox cmd response: failed
10,530,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,750 >>> mbox cmd response: failed
10,531,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,531,320 >>> mbox cmd response: failed
Initializing fuses
2,058,521 writing to cptra_bootfsm_go
13,097,688 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,330,932 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Manufacturing
85,561 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
890,133 UART: [kat] SHA2-256
892,071 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
902,106 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,568 UART: [idev] ++
1,479,736 UART: [idev] CDI.KEYID = 6
1,480,096 UART: [idev] SUBJECT.KEYID = 7
1,480,520 UART: [idev] UDS.KEYID = 0
1,480,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,530 UART: [idev] Erasing UDS.KEYID = 0
1,504,882 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,643 UART: [ldev] ++
1,514,811 UART: [ldev] CDI.KEYID = 6
1,515,174 UART: [ldev] SUBJECT.KEYID = 5
1,515,600 UART: [ldev] AUTHORITY.KEYID = 7
1,516,063 UART: [ldev] FE.KEYID = 1
1,521,139 UART: [ldev] Erasing FE.KEYID = 1
1,546,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,136 UART: [ldev] --
1,585,479 UART: [fwproc] Waiting for Commands...
1,586,168 UART: [fwproc] Received command 0x46574c44
1,586,959 UART: [fwproc] Received Image of size 114360 bytes
1,607,499 UART: ROM Fatal Error: 0x000B0003
1,608,656 >>> mbox cmd response: failed
1,608,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,662 >>> mbox cmd response: failed
1,608,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,442 UART: [kat] SHA2-512-ACC
897,343 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,354 UART: [kat] LMS
1,475,550 UART: [kat] --
1,476,549 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,628 UART: [idev] ++
1,479,796 UART: [idev] CDI.KEYID = 6
1,480,156 UART: [idev] SUBJECT.KEYID = 7
1,480,580 UART: [idev] UDS.KEYID = 0
1,480,925 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,575 UART: [ldev] ++
1,514,743 UART: [ldev] CDI.KEYID = 6
1,515,106 UART: [ldev] SUBJECT.KEYID = 5
1,515,532 UART: [ldev] AUTHORITY.KEYID = 7
1,515,995 UART: [ldev] FE.KEYID = 1
1,521,295 UART: [ldev] Erasing FE.KEYID = 1
1,546,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,416 UART: [ldev] --
1,585,911 UART: [fwproc] Waiting for Commands...
1,586,720 UART: [fwproc] Received command 0x46574c44
1,587,511 UART: [fwproc] Received Image of size 114360 bytes
2,884,839 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,996 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,395 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,460,563 >>> mbox cmd response: failed
1,460,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,569 >>> mbox cmd response: failed
1,460,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,090 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Manufacturing
85,664 UART: [state] DebugLocked = No
86,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,884 UART: [kat] SHA2-256
881,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,930 UART: [kat] ++
886,082 UART: [kat] sha1
890,428 UART: [kat] SHA2-256
892,366 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
902,545 UART: [kat] HMAC-384Kdf
907,281 UART: [kat] LMS
1,475,477 UART: [kat] --
1,476,596 UART: [cold-reset] ++
1,477,088 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,651 UART: [idev] Erasing UDS.KEYID = 0
1,505,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,423 UART: [idev] --
1,515,510 UART: [ldev] ++
1,515,678 UART: [ldev] CDI.KEYID = 6
1,516,041 UART: [ldev] SUBJECT.KEYID = 5
1,516,467 UART: [ldev] AUTHORITY.KEYID = 7
1,516,930 UART: [ldev] FE.KEYID = 1
1,522,314 UART: [ldev] Erasing FE.KEYID = 1
1,548,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,221 UART: [ldev] --
1,587,658 UART: [fwproc] Waiting for Commands...
1,588,469 UART: [fwproc] Received command 0x46574c44
1,589,260 UART: [fwproc] Received Image of size 114360 bytes
1,609,818 UART: ROM Fatal Error: 0x000B0003
1,610,975 >>> mbox cmd response: failed
1,610,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,981 >>> mbox cmd response: failed
1,610,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
86,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,541 UART: [kat] LMS
1,475,737 UART: [kat] --
1,476,868 UART: [cold-reset] ++
1,477,284 UART: [fht] Storing FHT @ 0x50003400
1,480,281 UART: [idev] ++
1,480,449 UART: [idev] CDI.KEYID = 6
1,480,809 UART: [idev] SUBJECT.KEYID = 7
1,481,233 UART: [idev] UDS.KEYID = 0
1,481,578 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,219 UART: [idev] Erasing UDS.KEYID = 0
1,505,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,559 UART: [idev] --
1,515,538 UART: [ldev] ++
1,515,706 UART: [ldev] CDI.KEYID = 6
1,516,069 UART: [ldev] SUBJECT.KEYID = 5
1,516,495 UART: [ldev] AUTHORITY.KEYID = 7
1,516,958 UART: [ldev] FE.KEYID = 1
1,522,346 UART: [ldev] Erasing FE.KEYID = 1
1,547,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,885 UART: [ldev] --
1,587,342 UART: [fwproc] Waiting for Commands...
1,588,179 UART: [fwproc] Received command 0x46574c44
1,588,970 UART: [fwproc] Received Image of size 114360 bytes
2,886,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,387 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,532 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,461,778 >>> mbox cmd response: failed
1,461,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,784 >>> mbox cmd response: failed
1,461,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,718 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,827 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Manufacturing
85,971 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
893,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,663 UART: [kat] ++
897,815 UART: [kat] sha1
902,103 UART: [kat] SHA2-256
904,043 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
918,354 UART: [kat] HMAC-384Kdf
922,946 UART: [kat] LMS
1,171,274 UART: [kat] --
1,172,225 UART: [cold-reset] ++
1,172,559 UART: [fht] FHT @ 0x50003400
1,175,368 UART: [idev] ++
1,175,536 UART: [idev] CDI.KEYID = 6
1,175,896 UART: [idev] SUBJECT.KEYID = 7
1,176,320 UART: [idev] UDS.KEYID = 0
1,176,665 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,837 UART: [idev] Sha1 KeyId Algorithm
1,209,493 UART: [idev] --
1,210,565 UART: [ldev] ++
1,210,733 UART: [ldev] CDI.KEYID = 6
1,211,096 UART: [ldev] SUBJECT.KEYID = 5
1,211,522 UART: [ldev] AUTHORITY.KEYID = 7
1,211,985 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,179 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,434 UART: [fwproc] Recv command 0x46574c44
1,284,162 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,666 UART: ROM Fatal Error: 0x000B0003
1,305,823 >>> mbox cmd response: failed
1,305,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,829 >>> mbox cmd response: failed
1,305,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
893,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,253 UART: [kat] ++
897,405 UART: [kat] sha1
901,739 UART: [kat] SHA2-256
903,679 UART: [kat] SHA2-384
906,408 UART: [kat] SHA2-512-ACC
908,309 UART: [kat] ECC-384
918,298 UART: [kat] HMAC-384Kdf
922,874 UART: [kat] LMS
1,171,202 UART: [kat] --
1,171,855 UART: [cold-reset] ++
1,172,217 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,625 UART: [idev] Sha1 KeyId Algorithm
1,208,951 UART: [idev] --
1,209,863 UART: [ldev] ++
1,210,031 UART: [ldev] CDI.KEYID = 6
1,210,394 UART: [ldev] SUBJECT.KEYID = 5
1,210,820 UART: [ldev] AUTHORITY.KEYID = 7
1,211,283 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,805 UART: [ldev] --
1,281,276 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,676 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,159,602 >>> mbox cmd response: failed
1,159,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,608 >>> mbox cmd response: failed
1,159,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,605 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,770 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Manufacturing
86,264 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
893,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,030 UART: [kat] ++
898,182 UART: [kat] sha1
902,480 UART: [kat] SHA2-256
904,420 UART: [kat] SHA2-384
907,253 UART: [kat] SHA2-512-ACC
909,154 UART: [kat] ECC-384
918,725 UART: [kat] HMAC-384Kdf
923,151 UART: [kat] LMS
1,171,479 UART: [kat] --
1,172,518 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,687 UART: [idev] Erasing UDS.KEYID = 0
1,201,746 UART: [idev] Sha1 KeyId Algorithm
1,210,064 UART: [idev] --
1,210,986 UART: [ldev] ++
1,211,154 UART: [ldev] CDI.KEYID = 6
1,211,517 UART: [ldev] SUBJECT.KEYID = 5
1,211,943 UART: [ldev] AUTHORITY.KEYID = 7
1,212,406 UART: [ldev] FE.KEYID = 1
1,217,850 UART: [ldev] Erasing FE.KEYID = 1
1,244,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,956 UART: [ldev] --
1,283,353 UART: [fwproc] Wait for Commands...
1,284,175 UART: [fwproc] Recv command 0x46574c44
1,284,903 UART: [fwproc] Recv'd Img size: 114360 bytes
1,304,665 UART: ROM Fatal Error: 0x000B0003
1,305,822 >>> mbox cmd response: failed
1,305,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,828 >>> mbox cmd response: failed
1,305,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
918,379 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,068 UART: [cold-reset] ++
1,172,412 UART: [fht] FHT @ 0x50003400
1,175,283 UART: [idev] ++
1,175,451 UART: [idev] CDI.KEYID = 6
1,175,811 UART: [idev] SUBJECT.KEYID = 7
1,176,235 UART: [idev] UDS.KEYID = 0
1,176,580 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,477 UART: [idev] Erasing UDS.KEYID = 0
1,201,532 UART: [idev] Sha1 KeyId Algorithm
1,209,978 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,217,932 UART: [ldev] Erasing FE.KEYID = 1
1,244,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,796 UART: [ldev] --
1,284,107 UART: [fwproc] Wait for Commands...
1,284,929 UART: [fwproc] Recv command 0x46574c44
1,285,657 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,850 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,161,721 >>> mbox cmd response: failed
1,161,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,727 >>> mbox cmd response: failed
1,161,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,282 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,719 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Manufacturing
85,855 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,475 UART: [idev] ++
1,173,643 UART: [idev] CDI.KEYID = 6
1,174,004 UART: [idev] SUBJECT.KEYID = 7
1,174,429 UART: [idev] UDS.KEYID = 0
1,174,775 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,653 UART: [idev] Erasing UDS.KEYID = 0
1,199,761 UART: [idev] Sha1 KeyId Algorithm
1,208,587 UART: [idev] --
1,209,480 UART: [ldev] ++
1,209,648 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,439 UART: [ldev] AUTHORITY.KEYID = 7
1,210,902 UART: [ldev] FE.KEYID = 1
1,216,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,346 UART: [ldev] --
1,281,726 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,076 UART: [fwproc] Recv'd Img size: 114360 bytes
1,303,387 UART: ROM Fatal Error: 0x000B0003
1,304,544 >>> mbox cmd response: failed
1,304,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,550 >>> mbox cmd response: failed
1,304,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,775 UART: [idev] ++
1,172,943 UART: [idev] CDI.KEYID = 6
1,173,304 UART: [idev] SUBJECT.KEYID = 7
1,173,729 UART: [idev] UDS.KEYID = 0
1,174,075 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,864 UART: [ldev] ++
1,209,032 UART: [ldev] CDI.KEYID = 6
1,209,396 UART: [ldev] SUBJECT.KEYID = 5
1,209,823 UART: [ldev] AUTHORITY.KEYID = 7
1,210,286 UART: [ldev] FE.KEYID = 1
1,215,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,192 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,303 UART: [fwproc] Recv command 0x46574c44
1,283,036 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,167 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,468 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,154,283 >>> mbox cmd response: failed
1,154,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,289 >>> mbox cmd response: failed
1,154,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,165 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Manufacturing
86,458 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
891,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,094 UART: [kat] ++
896,246 UART: [kat] sha1
900,282 UART: [kat] SHA2-256
902,222 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,382 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 114360 bytes
1,302,718 UART: ROM Fatal Error: 0x000B0003
1,303,875 >>> mbox cmd response: failed
1,303,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,881 >>> mbox cmd response: failed
1,303,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,818 UART: [kat] ++
895,970 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,905 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,928 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,174,832 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,635 UART: [ldev] --
1,282,091 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,908 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,877 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,157,340 >>> mbox cmd response: failed
1,157,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,346 >>> mbox cmd response: failed
1,157,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,457 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,428 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,038 UART:
192,419 UART: Running Caliptra ROM ...
193,602 UART:
193,756 UART: [state] CFI Enabled
261,844 UART: [state] LifecycleState = Unprovisioned
263,782 UART: [state] DebugLocked = No
265,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,372 UART: [kat] SHA2-256
440,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,536 UART: [kat] ++
450,983 UART: [kat] sha1
461,647 UART: [kat] SHA2-256
464,336 UART: [kat] SHA2-384
469,399 UART: [kat] SHA2-512-ACC
471,795 UART: [kat] ECC-384
2,767,563 UART: [kat] HMAC-384Kdf
2,798,874 UART: [kat] LMS
3,989,147 UART: [kat] --
3,993,980 UART: [cold-reset] ++
3,995,214 UART: [fht] Storing FHT @ 0x50003400
4,007,468 UART: [idev] ++
4,008,087 UART: [idev] CDI.KEYID = 6
4,008,985 UART: [idev] SUBJECT.KEYID = 7
4,010,209 UART: [idev] UDS.KEYID = 0
4,013,215 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,156,723 UART: [idev] Erasing UDS.KEYID = 0
7,344,796 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,235 UART: [idev] --
7,371,181 UART: [ldev] ++
7,371,759 UART: [ldev] CDI.KEYID = 6
7,372,780 UART: [ldev] SUBJECT.KEYID = 5
7,373,961 UART: [ldev] AUTHORITY.KEYID = 7
7,375,196 UART: [ldev] FE.KEYID = 1
7,421,704 UART: [ldev] Erasing FE.KEYID = 1
10,754,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,264 UART: [ldev] --
13,116,044 UART: [fwproc] Waiting for Commands...
13,118,848 UART: [fwproc] Received command 0x46574c44
13,121,035 UART: [fwproc] Received Image of size 114036 bytes
13,219,441 UART: ROM Fatal Error: 0x000B001B
13,222,910 >>> mbox cmd response: failed
13,223,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,223,638 >>> mbox cmd response: failed
13,223,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,224,215 >>> mbox cmd response: failed
Initializing fuses
2,052,021 writing to cptra_bootfsm_go
2,241,341 UART:
2,241,705 UART: Running Caliptra ROM ...
2,242,753 UART:
2,242,905 UART: [state] CFI Enabled
2,312,928 UART: [state] LifecycleState = Unprovisioned
2,314,867 UART: [state] DebugLocked = No
2,317,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,732 UART: [kat] SHA2-256
2,492,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,982 UART: [kat] ++
2,503,480 UART: [kat] sha1
2,515,224 UART: [kat] SHA2-256
2,517,924 UART: [kat] SHA2-384
2,523,693 UART: [kat] SHA2-512-ACC
2,526,051 UART: [kat] ECC-384
4,819,020 UART: [kat] HMAC-384Kdf
4,851,546 UART: [kat] LMS
6,041,854 UART: [kat] --
6,046,875 UART: [cold-reset] ++
6,048,333 UART: [fht] Storing FHT @ 0x50003400
6,060,103 UART: [idev] ++
6,060,810 UART: [idev] CDI.KEYID = 6
6,061,813 UART: [idev] SUBJECT.KEYID = 7
6,062,933 UART: [idev] UDS.KEYID = 0
6,065,601 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,209,013 UART: [idev] Erasing UDS.KEYID = 0
9,395,701 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,282 UART: [idev] --
9,422,080 UART: [ldev] ++
9,422,696 UART: [ldev] CDI.KEYID = 6
9,423,592 UART: [ldev] SUBJECT.KEYID = 5
9,424,868 UART: [ldev] AUTHORITY.KEYID = 7
9,426,104 UART: [ldev] FE.KEYID = 1
9,472,612 UART: [ldev] Erasing FE.KEYID = 1
12,804,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,120,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,164,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,495 UART: [ldev] --
15,188,364 UART: [fwproc] Waiting for Commands...
15,190,000 UART: [fwproc] Received command 0x46574c44
15,192,195 UART: [fwproc] Received Image of size 114036 bytes
19,244,471 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,320,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,389,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,705,205 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,729 writing to cptra_bootfsm_go
3,788,310 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,964,999 >>> mbox cmd response: failed
12,965,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,132 >>> mbox cmd response: failed
12,966,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,700 >>> mbox cmd response: failed
Initializing fuses
2,051,254 writing to cptra_bootfsm_go
5,832,408 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,899,777 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,393 UART:
192,755 UART: Running Caliptra ROM ...
193,906 UART:
603,591 UART: [state] CFI Enabled
615,766 UART: [state] LifecycleState = Unprovisioned
617,703 UART: [state] DebugLocked = No
620,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,431 UART: [kat] SHA2-256
795,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,705 UART: [kat] ++
806,150 UART: [kat] sha1
817,296 UART: [kat] SHA2-256
820,014 UART: [kat] SHA2-384
824,597 UART: [kat] SHA2-512-ACC
826,946 UART: [kat] ECC-384
3,109,523 UART: [kat] HMAC-384Kdf
3,121,122 UART: [kat] LMS
4,311,213 UART: [kat] --
4,316,077 UART: [cold-reset] ++
4,317,094 UART: [fht] Storing FHT @ 0x50003400
4,327,500 UART: [idev] ++
4,328,074 UART: [idev] CDI.KEYID = 6
4,329,096 UART: [idev] SUBJECT.KEYID = 7
4,330,260 UART: [idev] UDS.KEYID = 0
4,333,045 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,476,492 UART: [idev] Erasing UDS.KEYID = 0
7,622,630 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,569 UART: [idev] --
7,649,210 UART: [ldev] ++
7,649,782 UART: [ldev] CDI.KEYID = 6
7,650,744 UART: [ldev] SUBJECT.KEYID = 5
7,651,985 UART: [ldev] AUTHORITY.KEYID = 7
7,653,224 UART: [ldev] FE.KEYID = 1
7,663,494 UART: [ldev] Erasing FE.KEYID = 1
10,950,694 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,587 UART: [ldev] --
13,312,436 UART: [fwproc] Waiting for Commands...
13,315,675 UART: [fwproc] Received command 0x46574c44
13,317,866 UART: [fwproc] Received Image of size 114036 bytes
13,417,372 UART: ROM Fatal Error: 0x000B001B
13,420,829 >>> mbox cmd response: failed
13,421,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,421,586 >>> mbox cmd response: failed
13,421,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,422,171 >>> mbox cmd response: failed
Initializing fuses
2,052,462 writing to cptra_bootfsm_go
2,241,762 UART:
2,242,132 UART: Running Caliptra ROM ...
2,243,278 UART:
7,048,676 UART: [state] CFI Enabled
7,067,049 UART: [state] LifecycleState = Unprovisioned
7,068,974 UART: [state] DebugLocked = No
7,070,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,075,822 UART: [kat] SHA2-256
7,245,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,256,139 UART: [kat] ++
7,256,688 UART: [kat] sha1
7,267,640 UART: [kat] SHA2-256
7,270,389 UART: [kat] SHA2-384
7,276,485 UART: [kat] SHA2-512-ACC
7,278,839 UART: [kat] ECC-384
9,562,482 UART: [kat] HMAC-384Kdf
9,573,632 UART: [kat] LMS
10,763,726 UART: [kat] --
10,767,415 UART: [cold-reset] ++
10,769,786 UART: [fht] Storing FHT @ 0x50003400
10,781,324 UART: [idev] ++
10,781,887 UART: [idev] CDI.KEYID = 6
10,782,822 UART: [idev] SUBJECT.KEYID = 7
10,784,092 UART: [idev] UDS.KEYID = 0
10,786,722 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,930,100 UART: [idev] Erasing UDS.KEYID = 0
14,070,468 UART: [idev] Using Sha1 for KeyId Algorithm
14,092,234 UART: [idev] --
14,095,852 UART: [ldev] ++
14,096,421 UART: [ldev] CDI.KEYID = 6
14,097,358 UART: [ldev] SUBJECT.KEYID = 5
14,098,614 UART: [ldev] AUTHORITY.KEYID = 7
14,099,854 UART: [ldev] FE.KEYID = 1
14,112,860 UART: [ldev] Erasing FE.KEYID = 1
17,402,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,696,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,725,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,740,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,758,930 UART: [ldev] --
19,763,604 UART: [fwproc] Waiting for Commands...
19,766,315 UART: [fwproc] Received command 0x46574c44
19,768,509 UART: [fwproc] Received Image of size 114036 bytes
23,819,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,893,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,962,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,279,054 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,131,649 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,161,322 >>> mbox cmd response: failed
13,161,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,243 >>> mbox cmd response: failed
13,162,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,812 >>> mbox cmd response: failed
Initializing fuses
2,049,089 writing to cptra_bootfsm_go
10,836,480 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,770,327 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,210 UART:
192,573 UART: Running Caliptra ROM ...
193,761 UART:
193,916 UART: [state] CFI Enabled
262,070 UART: [state] LifecycleState = Unprovisioned
263,946 UART: [state] DebugLocked = No
265,386 UART: [state] WD Timer not started. Device not locked for debugging
269,636 UART: [kat] SHA2-256
448,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,373 UART: [kat] ++
460,921 UART: [kat] sha1
471,623 UART: [kat] SHA2-256
474,655 UART: [kat] SHA2-384
480,708 UART: [kat] SHA2-512-ACC
483,647 UART: [kat] ECC-384
2,946,446 UART: [kat] HMAC-384Kdf
2,970,783 UART: [kat] LMS
3,500,261 UART: [kat] --
3,504,028 UART: [cold-reset] ++
3,505,345 UART: [fht] FHT @ 0x50003400
3,517,439 UART: [idev] ++
3,518,010 UART: [idev] CDI.KEYID = 6
3,518,896 UART: [idev] SUBJECT.KEYID = 7
3,520,114 UART: [idev] UDS.KEYID = 0
3,522,909 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,201 UART: [idev] Erasing UDS.KEYID = 0
6,022,447 UART: [idev] Sha1 KeyId Algorithm
6,045,754 UART: [idev] --
6,050,296 UART: [ldev] ++
6,050,869 UART: [ldev] CDI.KEYID = 6
6,051,757 UART: [ldev] SUBJECT.KEYID = 5
6,052,978 UART: [ldev] AUTHORITY.KEYID = 7
6,054,216 UART: [ldev] FE.KEYID = 1
6,097,735 UART: [ldev] Erasing FE.KEYID = 1
8,602,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,648 UART: [ldev] --
10,413,434 UART: [fwproc] Wait for Commands...
10,415,691 UART: [fwproc] Recv command 0x46574c44
10,417,733 UART: [fwproc] Recv'd Img size: 114360 bytes
10,512,403 UART: ROM Fatal Error: 0x000B001B
10,515,496 >>> mbox cmd response: failed
10,515,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,516,271 >>> mbox cmd response: failed
10,516,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,516,871 >>> mbox cmd response: failed
Initializing fuses
2,052,140 writing to cptra_bootfsm_go
2,241,513 UART:
2,241,872 UART: Running Caliptra ROM ...
2,243,012 UART:
2,243,191 UART: [state] CFI Enabled
2,308,252 UART: [state] LifecycleState = Unprovisioned
2,310,168 UART: [state] DebugLocked = No
2,311,727 UART: [state] WD Timer not started. Device not locked for debugging
2,315,210 UART: [kat] SHA2-256
2,494,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,505,887 UART: [kat] ++
2,506,647 UART: [kat] sha1
2,517,592 UART: [kat] SHA2-256
2,520,620 UART: [kat] SHA2-384
2,525,747 UART: [kat] SHA2-512-ACC
2,528,694 UART: [kat] ECC-384
4,992,840 UART: [kat] HMAC-384Kdf
5,017,118 UART: [kat] LMS
5,546,585 UART: [kat] --
5,551,444 UART: [cold-reset] ++
5,553,807 UART: [fht] FHT @ 0x50003400
5,563,767 UART: [idev] ++
5,564,357 UART: [idev] CDI.KEYID = 6
5,565,270 UART: [idev] SUBJECT.KEYID = 7
5,566,434 UART: [idev] UDS.KEYID = 0
5,568,981 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,712,941 UART: [idev] Erasing UDS.KEYID = 0
8,070,594 UART: [idev] Sha1 KeyId Algorithm
8,093,501 UART: [idev] --
8,097,339 UART: [ldev] ++
8,097,912 UART: [ldev] CDI.KEYID = 6
8,098,827 UART: [ldev] SUBJECT.KEYID = 5
8,099,990 UART: [ldev] AUTHORITY.KEYID = 7
8,101,228 UART: [ldev] FE.KEYID = 1
8,144,988 UART: [ldev] Erasing FE.KEYID = 1
10,646,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,274 UART: [ldev] --
12,459,657 UART: [fwproc] Wait for Commands...
12,462,240 UART: [fwproc] Recv command 0x46574c44
12,464,287 UART: [fwproc] Recv'd Img size: 114360 bytes
15,866,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,321,618 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,130 UART:
192,494 UART: Running Caliptra ROM ...
193,629 UART:
193,774 UART: [state] CFI Enabled
264,384 UART: [state] LifecycleState = Unprovisioned
266,746 UART: [state] DebugLocked = No
268,507 UART: [state] WD Timer not started. Device not locked for debugging
273,746 UART: [kat] SHA2-256
463,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,380 UART: [kat] ++
474,878 UART: [kat] sha1
486,578 UART: [kat] SHA2-256
489,596 UART: [kat] SHA2-384
495,147 UART: [kat] SHA2-512-ACC
497,705 UART: [kat] ECC-384
2,949,248 UART: [kat] HMAC-384Kdf
2,971,692 UART: [kat] LMS
3,503,483 UART: [kat] --
3,506,190 UART: [cold-reset] ++
3,508,663 UART: [fht] FHT @ 0x50003400
3,521,262 UART: [idev] ++
3,521,948 UART: [idev] CDI.KEYID = 6
3,522,964 UART: [idev] SUBJECT.KEYID = 7
3,524,069 UART: [idev] UDS.KEYID = 0
3,526,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,784 UART: [idev] Erasing UDS.KEYID = 0
6,030,038 UART: [idev] Sha1 KeyId Algorithm
6,052,036 UART: [idev] --
6,056,996 UART: [ldev] ++
6,057,699 UART: [ldev] CDI.KEYID = 6
6,058,617 UART: [ldev] SUBJECT.KEYID = 5
6,059,721 UART: [ldev] AUTHORITY.KEYID = 7
6,061,010 UART: [ldev] FE.KEYID = 1
6,100,344 UART: [ldev] Erasing FE.KEYID = 1
8,605,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,189 UART: [ldev] --
10,413,993 UART: [fwproc] Wait for Commands...
10,417,115 UART: [fwproc] Recv command 0x46574c44
10,419,447 UART: [fwproc] Recv'd Img size: 114360 bytes
10,544,535 UART: ROM Fatal Error: 0x000B001B
10,548,187 >>> mbox cmd response: failed
10,548,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,942 >>> mbox cmd response: failed
10,549,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,549,503 >>> mbox cmd response: failed
Initializing fuses
2,052,398 writing to cptra_bootfsm_go
2,241,756 UART:
2,242,106 UART: Running Caliptra ROM ...
2,243,248 UART:
2,243,420 UART: [state] CFI Enabled
2,302,153 UART: [state] LifecycleState = Unprovisioned
2,304,579 UART: [state] DebugLocked = No
2,306,888 UART: [state] WD Timer not started. Device not locked for debugging
2,311,677 UART: [kat] SHA2-256
2,501,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,293 UART: [kat] ++
2,512,783 UART: [kat] sha1
2,524,053 UART: [kat] SHA2-256
2,527,084 UART: [kat] SHA2-384
2,534,174 UART: [kat] SHA2-512-ACC
2,536,795 UART: [kat] ECC-384
4,983,737 UART: [kat] HMAC-384Kdf
5,007,959 UART: [kat] LMS
5,539,747 UART: [kat] --
5,543,087 UART: [cold-reset] ++
5,545,505 UART: [fht] FHT @ 0x50003400
5,556,025 UART: [idev] ++
5,556,713 UART: [idev] CDI.KEYID = 6
5,557,730 UART: [idev] SUBJECT.KEYID = 7
5,558,835 UART: [idev] UDS.KEYID = 0
5,561,227 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,705,186 UART: [idev] Erasing UDS.KEYID = 0
8,065,709 UART: [idev] Sha1 KeyId Algorithm
8,089,765 UART: [idev] --
8,095,279 UART: [ldev] ++
8,095,966 UART: [ldev] CDI.KEYID = 6
8,097,032 UART: [ldev] SUBJECT.KEYID = 5
8,098,149 UART: [ldev] AUTHORITY.KEYID = 7
8,099,325 UART: [ldev] FE.KEYID = 1
8,137,530 UART: [ldev] Erasing FE.KEYID = 1
10,641,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,443,929 UART: [ldev] --
12,448,809 UART: [fwproc] Wait for Commands...
12,451,376 UART: [fwproc] Recv command 0x46574c44
12,453,708 UART: [fwproc] Recv'd Img size: 114360 bytes
15,897,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,972,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,089,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,632,240 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,454,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,359,454 >>> mbox cmd response: failed
10,359,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,360,320 >>> mbox cmd response: failed
10,360,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,360,874 >>> mbox cmd response: failed
Initializing fuses
2,049,655 writing to cptra_bootfsm_go
5,489,238 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,770,077 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,585 UART:
192,936 UART: Running Caliptra ROM ...
194,035 UART:
603,792 UART: [state] CFI Enabled
620,338 UART: [state] LifecycleState = Unprovisioned
622,710 UART: [state] DebugLocked = No
624,628 UART: [state] WD Timer not started. Device not locked for debugging
630,071 UART: [kat] SHA2-256
819,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,742 UART: [kat] ++
831,329 UART: [kat] sha1
842,049 UART: [kat] SHA2-256
845,066 UART: [kat] SHA2-384
850,818 UART: [kat] SHA2-512-ACC
853,436 UART: [kat] ECC-384
3,295,298 UART: [kat] HMAC-384Kdf
3,308,788 UART: [kat] LMS
3,840,624 UART: [kat] --
3,843,859 UART: [cold-reset] ++
3,846,060 UART: [fht] FHT @ 0x50003400
3,858,659 UART: [idev] ++
3,859,340 UART: [idev] CDI.KEYID = 6
3,860,275 UART: [idev] SUBJECT.KEYID = 7
3,861,486 UART: [idev] UDS.KEYID = 0
3,864,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,918 UART: [idev] Erasing UDS.KEYID = 0
6,341,273 UART: [idev] Sha1 KeyId Algorithm
6,363,437 UART: [idev] --
6,368,324 UART: [ldev] ++
6,369,018 UART: [ldev] CDI.KEYID = 6
6,369,904 UART: [ldev] SUBJECT.KEYID = 5
6,371,120 UART: [ldev] AUTHORITY.KEYID = 7
6,372,275 UART: [ldev] FE.KEYID = 1
6,384,216 UART: [ldev] Erasing FE.KEYID = 1
8,861,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,809 UART: [ldev] --
10,651,047 UART: [fwproc] Wait for Commands...
10,652,670 UART: [fwproc] Recv command 0x46574c44
10,654,985 UART: [fwproc] Recv'd Img size: 114360 bytes
10,784,050 UART: ROM Fatal Error: 0x000B001B
10,787,737 >>> mbox cmd response: failed
10,788,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,788,480 >>> mbox cmd response: failed
10,788,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,789,003 >>> mbox cmd response: failed
Initializing fuses
2,051,128 writing to cptra_bootfsm_go
2,240,463 UART:
2,240,823 UART: Running Caliptra ROM ...
2,241,905 UART:
9,665,267 UART: [state] CFI Enabled
9,682,534 UART: [state] LifecycleState = Unprovisioned
9,684,905 UART: [state] DebugLocked = No
9,687,861 UART: [state] WD Timer not started. Device not locked for debugging
9,692,306 UART: [kat] SHA2-256
9,882,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,893,007 UART: [kat] ++
9,893,567 UART: [kat] sha1
9,905,435 UART: [kat] SHA2-256
9,908,438 UART: [kat] SHA2-384
9,914,394 UART: [kat] SHA2-512-ACC
9,916,962 UART: [kat] ECC-384
12,360,069 UART: [kat] HMAC-384Kdf
12,372,194 UART: [kat] LMS
12,903,993 UART: [kat] --
12,908,841 UART: [cold-reset] ++
12,910,289 UART: [fht] FHT @ 0x50003400
12,922,401 UART: [idev] ++
12,923,127 UART: [idev] CDI.KEYID = 6
12,924,059 UART: [idev] SUBJECT.KEYID = 7
12,925,269 UART: [idev] UDS.KEYID = 0
12,928,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,071,995 UART: [idev] Erasing UDS.KEYID = 0
15,405,190 UART: [idev] Sha1 KeyId Algorithm
15,426,166 UART: [idev] --
15,430,777 UART: [ldev] ++
15,431,457 UART: [ldev] CDI.KEYID = 6
15,432,338 UART: [ldev] SUBJECT.KEYID = 5
15,433,549 UART: [ldev] AUTHORITY.KEYID = 7
15,434,782 UART: [ldev] FE.KEYID = 1
15,446,911 UART: [ldev] Erasing FE.KEYID = 1
17,925,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,645,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,660,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,675,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,690,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,712,359 UART: [ldev] --
19,717,944 UART: [fwproc] Wait for Commands...
19,719,929 UART: [fwproc] Recv command 0x46574c44
19,722,210 UART: [fwproc] Recv'd Img size: 114360 bytes
23,168,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,250,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,366,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,909,504 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,755,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,564,766 >>> mbox cmd response: failed
10,565,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,634 >>> mbox cmd response: failed
10,565,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,566,368 >>> mbox cmd response: failed
Initializing fuses
2,048,159 writing to cptra_bootfsm_go
13,055,987 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,244,303 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,113 UART: [kat] SHA2-256
882,044 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,159 UART: [kat] ++
886,311 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,250 UART: [kat] LMS
1,475,446 UART: [kat] --
1,476,387 UART: [cold-reset] ++
1,476,879 UART: [fht] Storing FHT @ 0x50003400
1,479,826 UART: [idev] ++
1,479,994 UART: [idev] CDI.KEYID = 6
1,480,354 UART: [idev] SUBJECT.KEYID = 7
1,480,778 UART: [idev] UDS.KEYID = 0
1,481,123 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,258 UART: [idev] Erasing UDS.KEYID = 0
1,504,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,146 UART: [idev] --
1,514,171 UART: [ldev] ++
1,514,339 UART: [ldev] CDI.KEYID = 6
1,514,702 UART: [ldev] SUBJECT.KEYID = 5
1,515,128 UART: [ldev] AUTHORITY.KEYID = 7
1,515,591 UART: [ldev] FE.KEYID = 1
1,520,755 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,586 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,708 UART: [fwproc] Received command 0x46574c44
1,587,499 UART: [fwproc] Received Image of size 114360 bytes
1,623,166 UART: ROM Fatal Error: 0x000B001B
1,624,325 >>> mbox cmd response: failed
1,624,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,331 >>> mbox cmd response: failed
1,624,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,237 UART: [kat] SHA2-256
882,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,283 UART: [kat] ++
886,435 UART: [kat] sha1
890,817 UART: [kat] SHA2-256
892,755 UART: [kat] SHA2-384
895,308 UART: [kat] SHA2-512-ACC
897,209 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,674 UART: [kat] LMS
1,475,870 UART: [kat] --
1,476,643 UART: [cold-reset] ++
1,477,171 UART: [fht] Storing FHT @ 0x50003400
1,480,084 UART: [idev] ++
1,480,252 UART: [idev] CDI.KEYID = 6
1,480,612 UART: [idev] SUBJECT.KEYID = 7
1,481,036 UART: [idev] UDS.KEYID = 0
1,481,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,474 UART: [idev] Erasing UDS.KEYID = 0
1,505,724 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,128 UART: [idev] --
1,515,289 UART: [ldev] ++
1,515,457 UART: [ldev] CDI.KEYID = 6
1,515,820 UART: [ldev] SUBJECT.KEYID = 5
1,516,246 UART: [ldev] AUTHORITY.KEYID = 7
1,516,709 UART: [ldev] FE.KEYID = 1
1,521,655 UART: [ldev] Erasing FE.KEYID = 1
1,546,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,236 UART: [ldev] --
1,586,721 UART: [fwproc] Waiting for Commands...
1,587,502 UART: [fwproc] Received command 0x46574c44
1,588,293 UART: [fwproc] Received Image of size 114360 bytes
2,885,649 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,995 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,230 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,355 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,477,432 >>> mbox cmd response: failed
1,477,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,438 >>> mbox cmd response: failed
1,477,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,825 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,856 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,291 UART: [kat] SHA2-512-ACC
897,192 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,713 UART: [idev] Erasing UDS.KEYID = 0
1,505,787 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,436 UART: [ldev] ++
1,515,604 UART: [ldev] CDI.KEYID = 6
1,515,967 UART: [ldev] SUBJECT.KEYID = 5
1,516,393 UART: [ldev] AUTHORITY.KEYID = 7
1,516,856 UART: [ldev] FE.KEYID = 1
1,522,270 UART: [ldev] Erasing FE.KEYID = 1
1,547,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,425 UART: [ldev] --
1,586,828 UART: [fwproc] Waiting for Commands...
1,587,519 UART: [fwproc] Received command 0x46574c44
1,588,310 UART: [fwproc] Received Image of size 114360 bytes
1,623,697 UART: ROM Fatal Error: 0x000B001B
1,624,856 >>> mbox cmd response: failed
1,624,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,862 >>> mbox cmd response: failed
1,624,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,735 UART: [kat] HMAC-384Kdf
907,413 UART: [kat] LMS
1,475,609 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,480,085 UART: [idev] ++
1,480,253 UART: [idev] CDI.KEYID = 6
1,480,613 UART: [idev] SUBJECT.KEYID = 7
1,481,037 UART: [idev] UDS.KEYID = 0
1,481,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,605 UART: [idev] --
1,515,728 UART: [ldev] ++
1,515,896 UART: [ldev] CDI.KEYID = 6
1,516,259 UART: [ldev] SUBJECT.KEYID = 5
1,516,685 UART: [ldev] AUTHORITY.KEYID = 7
1,517,148 UART: [ldev] FE.KEYID = 1
1,522,256 UART: [ldev] Erasing FE.KEYID = 1
1,547,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,941 UART: [ldev] --
1,587,448 UART: [fwproc] Waiting for Commands...
1,588,309 UART: [fwproc] Received command 0x46574c44
1,589,100 UART: [fwproc] Received Image of size 114360 bytes
2,887,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,038 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,423 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,476,751 >>> mbox cmd response: failed
1,476,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,757 >>> mbox cmd response: failed
1,476,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,793 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,376 UART: [kat] SHA2-512-ACC
908,277 UART: [kat] ECC-384
918,022 UART: [kat] HMAC-384Kdf
922,750 UART: [kat] LMS
1,171,078 UART: [kat] --
1,171,913 UART: [cold-reset] ++
1,172,283 UART: [fht] FHT @ 0x50003400
1,175,004 UART: [idev] ++
1,175,172 UART: [idev] CDI.KEYID = 6
1,175,532 UART: [idev] SUBJECT.KEYID = 7
1,175,956 UART: [idev] UDS.KEYID = 0
1,176,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,096 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,320 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,766 UART: [fwproc] Recv'd Img size: 114360 bytes
1,318,729 UART: ROM Fatal Error: 0x000B001B
1,319,888 >>> mbox cmd response: failed
1,319,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,894 >>> mbox cmd response: failed
1,319,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,226 UART: [kat] HMAC-384Kdf
922,890 UART: [kat] LMS
1,171,218 UART: [kat] --
1,172,099 UART: [cold-reset] ++
1,172,461 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,044 UART: [idev] Erasing UDS.KEYID = 0
1,200,985 UART: [idev] Sha1 KeyId Algorithm
1,209,487 UART: [idev] --
1,210,615 UART: [ldev] ++
1,210,783 UART: [ldev] CDI.KEYID = 6
1,211,146 UART: [ldev] SUBJECT.KEYID = 5
1,211,572 UART: [ldev] AUTHORITY.KEYID = 7
1,212,035 UART: [ldev] FE.KEYID = 1
1,217,141 UART: [ldev] Erasing FE.KEYID = 1
1,243,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,657 UART: [ldev] --
1,281,940 UART: [fwproc] Wait for Commands...
1,282,706 UART: [fwproc] Recv command 0x46574c44
1,283,434 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,883 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,176,231 >>> mbox cmd response: failed
1,176,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,237 >>> mbox cmd response: failed
1,176,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,180 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,251 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,172,184 UART: [cold-reset] ++
1,172,534 UART: [fht] FHT @ 0x50003400
1,175,141 UART: [idev] ++
1,175,309 UART: [idev] CDI.KEYID = 6
1,175,669 UART: [idev] SUBJECT.KEYID = 7
1,176,093 UART: [idev] UDS.KEYID = 0
1,176,438 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,965 UART: [idev] Erasing UDS.KEYID = 0
1,201,600 UART: [idev] Sha1 KeyId Algorithm
1,209,952 UART: [idev] --
1,211,150 UART: [ldev] ++
1,211,318 UART: [ldev] CDI.KEYID = 6
1,211,681 UART: [ldev] SUBJECT.KEYID = 5
1,212,107 UART: [ldev] AUTHORITY.KEYID = 7
1,212,570 UART: [ldev] FE.KEYID = 1
1,217,734 UART: [ldev] Erasing FE.KEYID = 1
1,244,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,236 UART: [ldev] --
1,283,577 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,955 UART: [fwproc] Recv'd Img size: 114360 bytes
1,321,044 UART: ROM Fatal Error: 0x000B001B
1,322,203 >>> mbox cmd response: failed
1,322,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,209 >>> mbox cmd response: failed
1,322,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,330 UART: [kat] SHA2-256
904,270 UART: [kat] SHA2-384
906,935 UART: [kat] SHA2-512-ACC
908,836 UART: [kat] ECC-384
918,381 UART: [kat] HMAC-384Kdf
922,823 UART: [kat] LMS
1,171,151 UART: [kat] --
1,172,030 UART: [cold-reset] ++
1,172,378 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,997 UART: [idev] Erasing UDS.KEYID = 0
1,200,984 UART: [idev] Sha1 KeyId Algorithm
1,209,480 UART: [idev] --
1,210,496 UART: [ldev] ++
1,210,664 UART: [ldev] CDI.KEYID = 6
1,211,027 UART: [ldev] SUBJECT.KEYID = 5
1,211,453 UART: [ldev] AUTHORITY.KEYID = 7
1,211,916 UART: [ldev] FE.KEYID = 1
1,217,218 UART: [ldev] Erasing FE.KEYID = 1
1,243,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,556 UART: [ldev] --
1,282,911 UART: [fwproc] Wait for Commands...
1,283,613 UART: [fwproc] Recv command 0x46574c44
1,284,341 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,972 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,176,212 >>> mbox cmd response: failed
1,176,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,218 >>> mbox cmd response: failed
1,176,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,480 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,557 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,675 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,463 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,518 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46574c44
1,281,842 UART: [fwproc] Recv'd Img size: 114360 bytes
1,316,749 UART: ROM Fatal Error: 0x000B001B
1,317,908 >>> mbox cmd response: failed
1,317,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,914 >>> mbox cmd response: failed
1,317,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,222 UART: [kat] SHA2-512-ACC
906,123 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,501 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,173,687 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,171 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,992 UART: [ldev] --
1,280,434 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,771,095 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,172,131 >>> mbox cmd response: failed
1,172,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,137 >>> mbox cmd response: failed
1,172,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,624,627 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
917,093 UART: [kat] HMAC-384Kdf
921,883 UART: [kat] LMS
1,170,195 UART: [kat] --
1,171,082 UART: [cold-reset] ++
1,171,494 UART: [fht] FHT @ 0x50003400
1,174,236 UART: [idev] ++
1,174,404 UART: [idev] CDI.KEYID = 6
1,174,765 UART: [idev] SUBJECT.KEYID = 7
1,175,190 UART: [idev] UDS.KEYID = 0
1,175,536 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,174 UART: [idev] Sha1 KeyId Algorithm
1,209,082 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,181 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 114360 bytes
1,318,592 UART: ROM Fatal Error: 0x000B001B
1,319,751 >>> mbox cmd response: failed
1,319,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,757 >>> mbox cmd response: failed
1,319,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,940 UART: [kat] ++
896,092 UART: [kat] sha1
900,216 UART: [kat] SHA2-256
902,156 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,174,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,948 UART: [idev] Sha1 KeyId Algorithm
1,208,900 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,399 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,905 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,500 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,373 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,173,242 >>> mbox cmd response: failed
1,173,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,248 >>> mbox cmd response: failed
1,173,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,163 UART:
192,537 UART: Running Caliptra ROM ...
193,731 UART:
193,880 UART: [state] CFI Enabled
258,150 UART: [state] LifecycleState = Manufacturing
260,131 UART: [state] DebugLocked = No
262,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,676 UART: [kat] SHA2-256
437,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,886 UART: [kat] ++
448,475 UART: [kat] sha1
458,121 UART: [kat] SHA2-256
460,804 UART: [kat] SHA2-384
467,655 UART: [kat] SHA2-512-ACC
470,034 UART: [kat] ECC-384
2,763,811 UART: [kat] HMAC-384Kdf
2,796,740 UART: [kat] LMS
3,987,074 UART: [kat] --
3,991,457 UART: [cold-reset] ++
3,993,073 UART: [fht] Storing FHT @ 0x50003400
4,004,018 UART: [idev] ++
4,004,592 UART: [idev] CDI.KEYID = 6
4,005,564 UART: [idev] SUBJECT.KEYID = 7
4,006,784 UART: [idev] UDS.KEYID = 0
4,012,247 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,892 UART: [idev] Erasing UDS.KEYID = 0
7,342,087 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,870 UART: [idev] --
7,366,908 UART: [ldev] ++
7,367,504 UART: [ldev] CDI.KEYID = 6
7,368,471 UART: [ldev] SUBJECT.KEYID = 5
7,369,686 UART: [ldev] AUTHORITY.KEYID = 7
7,370,925 UART: [ldev] FE.KEYID = 1
7,419,003 UART: [ldev] Erasing FE.KEYID = 1
10,754,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,687 UART: [ldev] --
13,132,422 UART: [fwproc] Waiting for Commands...
13,135,072 UART: [fwproc] Received command 0x46574c44
13,137,266 UART: [fwproc] Received Image of size 114036 bytes
13,228,509 UART: ROM Fatal Error: 0x000B0005
13,231,965 >>> mbox cmd response: failed
13,232,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,232,713 >>> mbox cmd response: failed
13,232,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,233,271 >>> mbox cmd response: failed
Initializing fuses
2,060,190 writing to cptra_bootfsm_go
2,249,521 UART:
2,249,874 UART: Running Caliptra ROM ...
2,251,012 UART:
2,251,186 UART: [state] CFI Enabled
2,321,474 UART: [state] LifecycleState = Manufacturing
2,323,411 UART: [state] DebugLocked = No
2,325,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,569 UART: [kat] SHA2-256
2,499,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,785 UART: [kat] ++
2,510,248 UART: [kat] sha1
2,520,866 UART: [kat] SHA2-256
2,523,586 UART: [kat] SHA2-384
2,528,195 UART: [kat] SHA2-512-ACC
2,530,546 UART: [kat] ECC-384
4,823,977 UART: [kat] HMAC-384Kdf
4,855,424 UART: [kat] LMS
6,045,725 UART: [kat] --
6,049,931 UART: [cold-reset] ++
6,052,192 UART: [fht] Storing FHT @ 0x50003400
6,063,085 UART: [idev] ++
6,063,654 UART: [idev] CDI.KEYID = 6
6,064,622 UART: [idev] SUBJECT.KEYID = 7
6,065,842 UART: [idev] UDS.KEYID = 0
6,068,526 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,212,067 UART: [idev] Erasing UDS.KEYID = 0
9,403,122 UART: [idev] Using Sha1 for KeyId Algorithm
9,425,216 UART: [idev] --
9,430,729 UART: [ldev] ++
9,431,323 UART: [ldev] CDI.KEYID = 6
9,432,210 UART: [ldev] SUBJECT.KEYID = 5
9,433,430 UART: [ldev] AUTHORITY.KEYID = 7
9,434,735 UART: [ldev] FE.KEYID = 1
9,479,055 UART: [ldev] Erasing FE.KEYID = 1
12,813,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,126,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,141,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,156,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,170,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,189,510 UART: [ldev] --
15,195,001 UART: [fwproc] Waiting for Commands...
15,197,646 UART: [fwproc] Received command 0x46574c44
15,199,835 UART: [fwproc] Received Image of size 114036 bytes
19,289,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,366,862 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,435,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,753,444 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,810,803 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
12,980,140 >>> mbox cmd response: failed
12,980,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,069 >>> mbox cmd response: failed
12,981,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,634 >>> mbox cmd response: failed
Initializing fuses
2,051,645 writing to cptra_bootfsm_go
5,817,354 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
19,929,085 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,513 UART:
192,873 UART: Running Caliptra ROM ...
194,070 UART:
603,817 UART: [state] CFI Enabled
618,886 UART: [state] LifecycleState = Manufacturing
620,817 UART: [state] DebugLocked = No
622,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,484 UART: [kat] SHA2-256
798,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,812 UART: [kat] ++
809,300 UART: [kat] sha1
819,640 UART: [kat] SHA2-256
822,330 UART: [kat] SHA2-384
828,631 UART: [kat] SHA2-512-ACC
831,024 UART: [kat] ECC-384
3,117,222 UART: [kat] HMAC-384Kdf
3,130,108 UART: [kat] LMS
4,320,191 UART: [kat] --
4,323,106 UART: [cold-reset] ++
4,325,307 UART: [fht] Storing FHT @ 0x50003400
4,335,226 UART: [idev] ++
4,335,798 UART: [idev] CDI.KEYID = 6
4,336,681 UART: [idev] SUBJECT.KEYID = 7
4,337,947 UART: [idev] UDS.KEYID = 0
4,343,822 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,487,315 UART: [idev] Erasing UDS.KEYID = 0
7,626,350 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,518 UART: [idev] --
7,653,717 UART: [ldev] ++
7,654,304 UART: [ldev] CDI.KEYID = 6
7,655,278 UART: [ldev] SUBJECT.KEYID = 5
7,656,437 UART: [ldev] AUTHORITY.KEYID = 7
7,657,727 UART: [ldev] FE.KEYID = 1
7,667,619 UART: [ldev] Erasing FE.KEYID = 1
10,955,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,725 UART: [ldev] --
13,314,834 UART: [fwproc] Waiting for Commands...
13,316,659 UART: [fwproc] Received command 0x46574c44
13,318,859 UART: [fwproc] Received Image of size 114036 bytes
13,413,547 UART: ROM Fatal Error: 0x000B0005
13,417,016 >>> mbox cmd response: failed
13,417,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,417,766 >>> mbox cmd response: failed
13,418,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,418,333 >>> mbox cmd response: failed
Initializing fuses
2,052,885 writing to cptra_bootfsm_go
2,242,263 UART:
2,242,624 UART: Running Caliptra ROM ...
2,243,712 UART:
7,050,352 UART: [state] CFI Enabled
7,067,478 UART: [state] LifecycleState = Manufacturing
7,069,394 UART: [state] DebugLocked = No
7,070,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,074,992 UART: [kat] SHA2-256
7,244,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,255,281 UART: [kat] ++
7,255,822 UART: [kat] sha1
7,267,426 UART: [kat] SHA2-256
7,270,165 UART: [kat] SHA2-384
7,277,372 UART: [kat] SHA2-512-ACC
7,279,733 UART: [kat] ECC-384
9,561,664 UART: [kat] HMAC-384Kdf
9,572,812 UART: [kat] LMS
10,762,955 UART: [kat] --
10,767,776 UART: [cold-reset] ++
10,770,198 UART: [fht] Storing FHT @ 0x50003400
10,782,974 UART: [idev] ++
10,783,576 UART: [idev] CDI.KEYID = 6
10,784,487 UART: [idev] SUBJECT.KEYID = 7
10,785,757 UART: [idev] UDS.KEYID = 0
10,788,421 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
10,931,621 UART: [idev] Erasing UDS.KEYID = 0
14,071,878 UART: [idev] Using Sha1 for KeyId Algorithm
14,093,864 UART: [idev] --
14,096,727 UART: [ldev] ++
14,097,322 UART: [ldev] CDI.KEYID = 6
14,098,232 UART: [ldev] SUBJECT.KEYID = 5
14,099,476 UART: [ldev] AUTHORITY.KEYID = 7
14,100,714 UART: [ldev] FE.KEYID = 1
14,112,391 UART: [ldev] Erasing FE.KEYID = 1
17,401,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,696,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,740,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,760,858 UART: [ldev] --
19,765,586 UART: [fwproc] Waiting for Commands...
19,768,924 UART: [fwproc] Received command 0x46574c44
19,771,108 UART: [fwproc] Received Image of size 114036 bytes
23,855,298 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,938,012 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,006,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
24,324,426 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
4,134,909 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
13,162,916 >>> mbox cmd response: failed
13,163,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,163,876 >>> mbox cmd response: failed
13,164,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,164,556 >>> mbox cmd response: failed
Initializing fuses
2,059,673 writing to cptra_bootfsm_go
10,830,060 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
24,805,882 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,192 UART:
192,594 UART: Running Caliptra ROM ...
193,727 UART:
193,899 UART: [state] CFI Enabled
263,599 UART: [state] LifecycleState = Manufacturing
265,476 UART: [state] DebugLocked = No
267,713 UART: [state] WD Timer not started. Device not locked for debugging
271,791 UART: [kat] SHA2-256
450,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,487 UART: [kat] ++
463,023 UART: [kat] sha1
473,211 UART: [kat] SHA2-256
476,264 UART: [kat] SHA2-384
482,993 UART: [kat] SHA2-512-ACC
485,928 UART: [kat] ECC-384
2,948,580 UART: [kat] HMAC-384Kdf
2,971,073 UART: [kat] LMS
3,500,542 UART: [kat] --
3,504,866 UART: [cold-reset] ++
3,507,199 UART: [fht] FHT @ 0x50003400
3,517,538 UART: [idev] ++
3,518,103 UART: [idev] CDI.KEYID = 6
3,518,989 UART: [idev] SUBJECT.KEYID = 7
3,520,203 UART: [idev] UDS.KEYID = 0
3,522,942 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,006 UART: [idev] Erasing UDS.KEYID = 0
6,029,910 UART: [idev] Sha1 KeyId Algorithm
6,053,471 UART: [idev] --
6,058,228 UART: [ldev] ++
6,058,803 UART: [ldev] CDI.KEYID = 6
6,059,715 UART: [ldev] SUBJECT.KEYID = 5
6,060,877 UART: [ldev] AUTHORITY.KEYID = 7
6,062,109 UART: [ldev] FE.KEYID = 1
6,098,960 UART: [ldev] Erasing FE.KEYID = 1
8,603,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,718 UART: [ldev] --
10,415,820 UART: [fwproc] Wait for Commands...
10,418,512 UART: [fwproc] Recv command 0x46574c44
10,420,556 UART: [fwproc] Recv'd Img size: 114360 bytes
10,507,308 UART: ROM Fatal Error: 0x000B0005
10,510,445 >>> mbox cmd response: failed
10,510,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,511,248 >>> mbox cmd response: failed
10,511,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,511,813 >>> mbox cmd response: failed
Initializing fuses
2,050,356 writing to cptra_bootfsm_go
2,239,644 UART:
2,240,002 UART: Running Caliptra ROM ...
2,241,144 UART:
2,241,307 UART: [state] CFI Enabled
2,301,222 UART: [state] LifecycleState = Manufacturing
2,303,069 UART: [state] DebugLocked = No
2,305,596 UART: [state] WD Timer not started. Device not locked for debugging
2,309,774 UART: [kat] SHA2-256
2,488,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,500,464 UART: [kat] ++
2,501,010 UART: [kat] sha1
2,513,093 UART: [kat] SHA2-256
2,516,136 UART: [kat] SHA2-384
2,523,099 UART: [kat] SHA2-512-ACC
2,526,057 UART: [kat] ECC-384
4,984,670 UART: [kat] HMAC-384Kdf
5,006,413 UART: [kat] LMS
5,535,870 UART: [kat] --
5,540,238 UART: [cold-reset] ++
5,541,190 UART: [fht] FHT @ 0x50003400
5,551,365 UART: [idev] ++
5,551,929 UART: [idev] CDI.KEYID = 6
5,552,903 UART: [idev] SUBJECT.KEYID = 7
5,554,066 UART: [idev] UDS.KEYID = 0
5,556,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,700,883 UART: [idev] Erasing UDS.KEYID = 0
8,060,782 UART: [idev] Sha1 KeyId Algorithm
8,083,964 UART: [idev] --
8,087,094 UART: [ldev] ++
8,087,598 UART: [ldev] CDI.KEYID = 6
8,088,626 UART: [ldev] SUBJECT.KEYID = 5
8,089,687 UART: [ldev] AUTHORITY.KEYID = 7
8,090,980 UART: [ldev] FE.KEYID = 1
8,135,911 UART: [ldev] Erasing FE.KEYID = 1
10,641,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,641 UART: [ldev] --
12,447,368 UART: [fwproc] Wait for Commands...
12,450,057 UART: [fwproc] Recv command 0x46574c44
12,452,112 UART: [fwproc] Recv'd Img size: 114360 bytes
15,890,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,960,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,028,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,346,790 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,147 UART:
192,518 UART: Running Caliptra ROM ...
193,656 UART:
193,806 UART: [state] CFI Enabled
266,339 UART: [state] LifecycleState = Manufacturing
268,730 UART: [state] DebugLocked = No
269,894 UART: [state] WD Timer not started. Device not locked for debugging
272,872 UART: [kat] SHA2-256
462,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,472 UART: [kat] ++
473,944 UART: [kat] sha1
485,581 UART: [kat] SHA2-256
488,598 UART: [kat] SHA2-384
494,364 UART: [kat] SHA2-512-ACC
496,924 UART: [kat] ECC-384
2,948,138 UART: [kat] HMAC-384Kdf
2,971,243 UART: [kat] LMS
3,502,983 UART: [kat] --
3,507,460 UART: [cold-reset] ++
3,509,230 UART: [fht] FHT @ 0x50003400
3,519,895 UART: [idev] ++
3,520,569 UART: [idev] CDI.KEYID = 6
3,521,533 UART: [idev] SUBJECT.KEYID = 7
3,522,747 UART: [idev] UDS.KEYID = 0
3,528,536 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,672,980 UART: [idev] Erasing UDS.KEYID = 0
6,029,202 UART: [idev] Sha1 KeyId Algorithm
6,052,337 UART: [idev] --
6,057,795 UART: [ldev] ++
6,058,480 UART: [ldev] CDI.KEYID = 6
6,059,416 UART: [ldev] SUBJECT.KEYID = 5
6,060,582 UART: [ldev] AUTHORITY.KEYID = 7
6,061,760 UART: [ldev] FE.KEYID = 1
6,100,174 UART: [ldev] Erasing FE.KEYID = 1
8,608,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,693 UART: [ldev] --
10,413,847 UART: [fwproc] Wait for Commands...
10,415,836 UART: [fwproc] Recv command 0x46574c44
10,418,096 UART: [fwproc] Recv'd Img size: 114360 bytes
10,537,768 UART: ROM Fatal Error: 0x000B0005
10,541,402 >>> mbox cmd response: failed
10,541,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,542,220 >>> mbox cmd response: failed
10,542,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,542,781 >>> mbox cmd response: failed
Initializing fuses
2,051,708 writing to cptra_bootfsm_go
2,241,013 UART:
2,241,387 UART: Running Caliptra ROM ...
2,242,484 UART:
2,242,646 UART: [state] CFI Enabled
2,307,734 UART: [state] LifecycleState = Manufacturing
2,310,114 UART: [state] DebugLocked = No
2,312,317 UART: [state] WD Timer not started. Device not locked for debugging
2,316,458 UART: [kat] SHA2-256
2,506,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,517,097 UART: [kat] ++
2,517,749 UART: [kat] sha1
2,530,366 UART: [kat] SHA2-256
2,533,394 UART: [kat] SHA2-384
2,539,711 UART: [kat] SHA2-512-ACC
2,542,281 UART: [kat] ECC-384
4,988,231 UART: [kat] HMAC-384Kdf
5,013,474 UART: [kat] LMS
5,545,280 UART: [kat] --
5,548,998 UART: [cold-reset] ++
5,551,475 UART: [fht] FHT @ 0x50003400
5,562,928 UART: [idev] ++
5,563,677 UART: [idev] CDI.KEYID = 6
5,564,600 UART: [idev] SUBJECT.KEYID = 7
5,565,771 UART: [idev] UDS.KEYID = 0
5,568,630 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,712,472 UART: [idev] Erasing UDS.KEYID = 0
8,070,940 UART: [idev] Sha1 KeyId Algorithm
8,093,394 UART: [idev] --
8,098,205 UART: [ldev] ++
8,098,888 UART: [ldev] CDI.KEYID = 6
8,099,779 UART: [ldev] SUBJECT.KEYID = 5
8,100,946 UART: [ldev] AUTHORITY.KEYID = 7
8,102,239 UART: [ldev] FE.KEYID = 1
8,146,458 UART: [ldev] Erasing FE.KEYID = 1
10,654,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,391 UART: [ldev] --
12,459,236 UART: [fwproc] Wait for Commands...
12,461,981 UART: [fwproc] Recv command 0x46574c44
12,464,293 UART: [fwproc] Recv'd Img size: 114360 bytes
15,945,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,024,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,140,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,682,818 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,444,419 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,349,590 >>> mbox cmd response: failed
10,350,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,350,490 >>> mbox cmd response: failed
10,350,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,351,054 >>> mbox cmd response: failed
Initializing fuses
2,058,392 writing to cptra_bootfsm_go
5,488,228 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
16,829,516 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,574 UART:
192,938 UART: Running Caliptra ROM ...
194,035 UART:
603,698 UART: [state] CFI Enabled
618,354 UART: [state] LifecycleState = Manufacturing
620,757 UART: [state] DebugLocked = No
623,510 UART: [state] WD Timer not started. Device not locked for debugging
627,726 UART: [kat] SHA2-256
817,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,392 UART: [kat] ++
828,894 UART: [kat] sha1
841,550 UART: [kat] SHA2-256
844,580 UART: [kat] SHA2-384
851,375 UART: [kat] SHA2-512-ACC
853,938 UART: [kat] ECC-384
3,295,819 UART: [kat] HMAC-384Kdf
3,307,888 UART: [kat] LMS
3,839,692 UART: [kat] --
3,844,423 UART: [cold-reset] ++
3,845,499 UART: [fht] FHT @ 0x50003400
3,858,049 UART: [idev] ++
3,858,731 UART: [idev] CDI.KEYID = 6
3,859,710 UART: [idev] SUBJECT.KEYID = 7
3,860,924 UART: [idev] UDS.KEYID = 0
3,867,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,010,767 UART: [idev] Erasing UDS.KEYID = 0
6,336,343 UART: [idev] Sha1 KeyId Algorithm
6,358,854 UART: [idev] --
6,362,509 UART: [ldev] ++
6,363,212 UART: [ldev] CDI.KEYID = 6
6,364,105 UART: [ldev] SUBJECT.KEYID = 5
6,365,214 UART: [ldev] AUTHORITY.KEYID = 7
6,366,420 UART: [ldev] FE.KEYID = 1
6,378,530 UART: [ldev] Erasing FE.KEYID = 1
8,856,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,369 UART: [ldev] --
10,647,261 UART: [fwproc] Wait for Commands...
10,650,384 UART: [fwproc] Recv command 0x46574c44
10,652,693 UART: [fwproc] Recv'd Img size: 114360 bytes
10,774,706 UART: ROM Fatal Error: 0x000B0005
10,778,358 >>> mbox cmd response: failed
10,778,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,779,015 >>> mbox cmd response: failed
10,779,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,779,575 >>> mbox cmd response: failed
Initializing fuses
2,053,117 writing to cptra_bootfsm_go
2,242,434 UART:
2,242,791 UART: Running Caliptra ROM ...
2,243,935 UART:
9,687,801 UART: [state] CFI Enabled
9,703,911 UART: [state] LifecycleState = Manufacturing
9,706,263 UART: [state] DebugLocked = No
9,708,545 UART: [state] WD Timer not started. Device not locked for debugging
9,712,827 UART: [kat] SHA2-256
9,902,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,913,531 UART: [kat] ++
9,914,050 UART: [kat] sha1
9,926,022 UART: [kat] SHA2-256
9,929,047 UART: [kat] SHA2-384
9,934,181 UART: [kat] SHA2-512-ACC
9,936,748 UART: [kat] ECC-384
12,378,393 UART: [kat] HMAC-384Kdf
12,390,957 UART: [kat] LMS
12,922,787 UART: [kat] --
12,929,531 UART: [cold-reset] ++
12,932,043 UART: [fht] FHT @ 0x50003400
12,944,058 UART: [idev] ++
12,944,739 UART: [idev] CDI.KEYID = 6
12,945,756 UART: [idev] SUBJECT.KEYID = 7
12,946,921 UART: [idev] UDS.KEYID = 0
12,949,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,093,433 UART: [idev] Erasing UDS.KEYID = 0
15,424,663 UART: [idev] Sha1 KeyId Algorithm
15,448,277 UART: [idev] --
15,454,537 UART: [ldev] ++
15,455,216 UART: [ldev] CDI.KEYID = 6
15,456,097 UART: [ldev] SUBJECT.KEYID = 5
15,457,311 UART: [ldev] AUTHORITY.KEYID = 7
15,458,543 UART: [ldev] FE.KEYID = 1
15,470,691 UART: [ldev] Erasing FE.KEYID = 1
17,950,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,669,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,685,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,700,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,715,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,735,570 UART: [ldev] --
19,740,579 UART: [fwproc] Wait for Commands...
19,742,737 UART: [fwproc] Recv command 0x46574c44
19,745,051 UART: [fwproc] Recv'd Img size: 114360 bytes
23,226,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,301,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,417,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
23,961,110 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
3,760,992 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
10,566,405 >>> mbox cmd response: failed
10,566,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,355 >>> mbox cmd response: failed
10,567,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,943 >>> mbox cmd response: failed
Initializing fuses
2,058,508 writing to cptra_bootfsm_go
13,057,666 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
24,307,794 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Manufacturing
85,671 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,191 UART: [kat] SHA2-256
892,129 UART: [kat] SHA2-384
894,838 UART: [kat] SHA2-512-ACC
896,739 UART: [kat] ECC-384
902,132 UART: [kat] HMAC-384Kdf
906,738 UART: [kat] LMS
1,474,934 UART: [kat] --
1,475,835 UART: [cold-reset] ++
1,476,221 UART: [fht] Storing FHT @ 0x50003400
1,478,950 UART: [idev] ++
1,479,118 UART: [idev] CDI.KEYID = 6
1,479,478 UART: [idev] SUBJECT.KEYID = 7
1,479,902 UART: [idev] UDS.KEYID = 0
1,480,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,014 UART: [idev] Erasing UDS.KEYID = 0
1,504,400 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,104 UART: [idev] --
1,514,037 UART: [ldev] ++
1,514,205 UART: [ldev] CDI.KEYID = 6
1,514,568 UART: [ldev] SUBJECT.KEYID = 5
1,514,994 UART: [ldev] AUTHORITY.KEYID = 7
1,515,457 UART: [ldev] FE.KEYID = 1
1,520,273 UART: [ldev] Erasing FE.KEYID = 1
1,545,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,120 UART: [ldev] --
1,584,497 UART: [fwproc] Waiting for Commands...
1,585,302 UART: [fwproc] Received command 0x46574c44
1,586,093 UART: [fwproc] Received Image of size 114360 bytes
1,631,902 UART: ROM Fatal Error: 0x000B0005
1,633,059 >>> mbox cmd response: failed
1,633,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,065 >>> mbox cmd response: failed
1,633,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
902,984 UART: [kat] HMAC-384Kdf
907,688 UART: [kat] LMS
1,475,884 UART: [kat] --
1,476,989 UART: [cold-reset] ++
1,477,421 UART: [fht] Storing FHT @ 0x50003400
1,480,188 UART: [idev] ++
1,480,356 UART: [idev] CDI.KEYID = 6
1,480,716 UART: [idev] SUBJECT.KEYID = 7
1,481,140 UART: [idev] UDS.KEYID = 0
1,481,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,994 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,436 UART: [idev] --
1,515,317 UART: [ldev] ++
1,515,485 UART: [ldev] CDI.KEYID = 6
1,515,848 UART: [ldev] SUBJECT.KEYID = 5
1,516,274 UART: [ldev] AUTHORITY.KEYID = 7
1,516,737 UART: [ldev] FE.KEYID = 1
1,521,837 UART: [ldev] Erasing FE.KEYID = 1
1,547,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,236 UART: [ldev] --
1,586,709 UART: [fwproc] Waiting for Commands...
1,587,340 UART: [fwproc] Received command 0x46574c44
1,588,131 UART: [fwproc] Received Image of size 114360 bytes
2,885,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,384 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,485,258 >>> mbox cmd response: failed
1,485,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,264 >>> mbox cmd response: failed
1,485,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,067 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Manufacturing
85,964 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,659 UART: [kat] LMS
1,475,855 UART: [kat] --
1,476,662 UART: [cold-reset] ++
1,477,222 UART: [fht] Storing FHT @ 0x50003400
1,480,047 UART: [idev] ++
1,480,215 UART: [idev] CDI.KEYID = 6
1,480,575 UART: [idev] SUBJECT.KEYID = 7
1,480,999 UART: [idev] UDS.KEYID = 0
1,481,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,673 UART: [idev] Erasing UDS.KEYID = 0
1,504,999 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,719 UART: [idev] --
1,514,776 UART: [ldev] ++
1,514,944 UART: [ldev] CDI.KEYID = 6
1,515,307 UART: [ldev] SUBJECT.KEYID = 5
1,515,733 UART: [ldev] AUTHORITY.KEYID = 7
1,516,196 UART: [ldev] FE.KEYID = 1
1,521,278 UART: [ldev] Erasing FE.KEYID = 1
1,546,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,263 UART: [ldev] --
1,585,636 UART: [fwproc] Waiting for Commands...
1,586,381 UART: [fwproc] Received command 0x46574c44
1,587,172 UART: [fwproc] Received Image of size 114360 bytes
1,632,297 UART: ROM Fatal Error: 0x000B0005
1,633,454 >>> mbox cmd response: failed
1,633,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,460 >>> mbox cmd response: failed
1,633,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,488 UART: [kat] SHA2-256
882,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,534 UART: [kat] ++
886,686 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
903,287 UART: [kat] HMAC-384Kdf
907,887 UART: [kat] LMS
1,476,083 UART: [kat] --
1,477,160 UART: [cold-reset] ++
1,477,602 UART: [fht] Storing FHT @ 0x50003400
1,480,501 UART: [idev] ++
1,480,669 UART: [idev] CDI.KEYID = 6
1,481,029 UART: [idev] SUBJECT.KEYID = 7
1,481,453 UART: [idev] UDS.KEYID = 0
1,481,798 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,489,693 UART: [idev] Erasing UDS.KEYID = 0
1,506,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,901 UART: [idev] --
1,516,076 UART: [ldev] ++
1,516,244 UART: [ldev] CDI.KEYID = 6
1,516,607 UART: [ldev] SUBJECT.KEYID = 5
1,517,033 UART: [ldev] AUTHORITY.KEYID = 7
1,517,496 UART: [ldev] FE.KEYID = 1
1,523,080 UART: [ldev] Erasing FE.KEYID = 1
1,548,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,411 UART: [ldev] --
1,587,674 UART: [fwproc] Waiting for Commands...
1,588,401 UART: [fwproc] Received command 0x46574c44
1,589,192 UART: [fwproc] Received Image of size 114360 bytes
2,887,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,781 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,264 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,485,517 >>> mbox cmd response: failed
1,485,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,523 >>> mbox cmd response: failed
1,485,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,362 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,359 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Manufacturing
85,819 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,713 UART: [kat] SHA2-256
903,653 UART: [kat] SHA2-384
906,228 UART: [kat] SHA2-512-ACC
908,129 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,360 UART: [kat] LMS
1,170,688 UART: [kat] --
1,171,507 UART: [cold-reset] ++
1,171,847 UART: [fht] FHT @ 0x50003400
1,174,674 UART: [idev] ++
1,174,842 UART: [idev] CDI.KEYID = 6
1,175,202 UART: [idev] SUBJECT.KEYID = 7
1,175,626 UART: [idev] UDS.KEYID = 0
1,175,971 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,770 UART: [idev] Erasing UDS.KEYID = 0
1,201,521 UART: [idev] Sha1 KeyId Algorithm
1,209,965 UART: [idev] --
1,211,087 UART: [ldev] ++
1,211,255 UART: [ldev] CDI.KEYID = 6
1,211,618 UART: [ldev] SUBJECT.KEYID = 5
1,212,044 UART: [ldev] AUTHORITY.KEYID = 7
1,212,507 UART: [ldev] FE.KEYID = 1
1,217,731 UART: [ldev] Erasing FE.KEYID = 1
1,244,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,553 UART: [ldev] --
1,284,036 UART: [fwproc] Wait for Commands...
1,284,638 UART: [fwproc] Recv command 0x46574c44
1,285,366 UART: [fwproc] Recv'd Img size: 114360 bytes
1,330,175 UART: ROM Fatal Error: 0x000B0005
1,331,332 >>> mbox cmd response: failed
1,331,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,338 >>> mbox cmd response: failed
1,331,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,471 UART: [kat] SHA2-256
903,411 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
918,214 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,172,069 UART: [cold-reset] ++
1,172,599 UART: [fht] FHT @ 0x50003400
1,175,250 UART: [idev] ++
1,175,418 UART: [idev] CDI.KEYID = 6
1,175,778 UART: [idev] SUBJECT.KEYID = 7
1,176,202 UART: [idev] UDS.KEYID = 0
1,176,547 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,214 UART: [idev] Erasing UDS.KEYID = 0
1,201,439 UART: [idev] Sha1 KeyId Algorithm
1,209,691 UART: [idev] --
1,210,631 UART: [ldev] ++
1,210,799 UART: [ldev] CDI.KEYID = 6
1,211,162 UART: [ldev] SUBJECT.KEYID = 5
1,211,588 UART: [ldev] AUTHORITY.KEYID = 7
1,212,051 UART: [ldev] FE.KEYID = 1
1,217,719 UART: [ldev] Erasing FE.KEYID = 1
1,244,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,120 UART: [fwproc] Wait for Commands...
1,283,938 UART: [fwproc] Recv command 0x46574c44
1,284,666 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,181 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,149 >>> mbox cmd response: failed
1,184,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,155 >>> mbox cmd response: failed
1,184,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,116 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Manufacturing
86,092 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
902,224 UART: [kat] SHA2-256
904,164 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,309 UART: [kat] HMAC-384Kdf
923,009 UART: [kat] LMS
1,171,337 UART: [kat] --
1,172,100 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,271 UART: [idev] ++
1,175,439 UART: [idev] CDI.KEYID = 6
1,175,799 UART: [idev] SUBJECT.KEYID = 7
1,176,223 UART: [idev] UDS.KEYID = 0
1,176,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,159 UART: [idev] Erasing UDS.KEYID = 0
1,200,344 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,830 UART: [ldev] ++
1,209,998 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,787 UART: [ldev] AUTHORITY.KEYID = 7
1,211,250 UART: [ldev] FE.KEYID = 1
1,216,542 UART: [ldev] Erasing FE.KEYID = 1
1,242,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,524 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,611 UART: [fwproc] Recv command 0x46574c44
1,283,339 UART: [fwproc] Recv'd Img size: 114360 bytes
1,328,520 UART: ROM Fatal Error: 0x000B0005
1,329,677 >>> mbox cmd response: failed
1,329,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,683 >>> mbox cmd response: failed
1,329,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
893,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,606 UART: [kat] ++
897,758 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,629 UART: [kat] SHA2-512-ACC
908,530 UART: [kat] ECC-384
917,911 UART: [kat] HMAC-384Kdf
922,493 UART: [kat] LMS
1,170,821 UART: [kat] --
1,171,914 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,215 UART: [idev] ++
1,175,383 UART: [idev] CDI.KEYID = 6
1,175,743 UART: [idev] SUBJECT.KEYID = 7
1,176,167 UART: [idev] UDS.KEYID = 0
1,176,512 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,471 UART: [idev] Erasing UDS.KEYID = 0
1,202,400 UART: [idev] Sha1 KeyId Algorithm
1,210,868 UART: [idev] --
1,211,876 UART: [ldev] ++
1,212,044 UART: [ldev] CDI.KEYID = 6
1,212,407 UART: [ldev] SUBJECT.KEYID = 5
1,212,833 UART: [ldev] AUTHORITY.KEYID = 7
1,213,296 UART: [ldev] FE.KEYID = 1
1,218,500 UART: [ldev] Erasing FE.KEYID = 1
1,244,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,178 UART: [ldev] --
1,284,475 UART: [fwproc] Wait for Commands...
1,285,279 UART: [fwproc] Recv command 0x46574c44
1,286,007 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,718 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,120 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,762 >>> mbox cmd response: failed
1,184,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,768 >>> mbox cmd response: failed
1,184,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,412 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,167 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Manufacturing
85,327 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,919 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,173,771 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,365 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,282 UART: [ldev] ++
1,208,450 UART: [ldev] CDI.KEYID = 6
1,208,814 UART: [ldev] SUBJECT.KEYID = 5
1,209,241 UART: [ldev] AUTHORITY.KEYID = 7
1,209,704 UART: [ldev] FE.KEYID = 1
1,214,954 UART: [ldev] Erasing FE.KEYID = 1
1,241,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,448 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,425 UART: [fwproc] Recv command 0x46574c44
1,282,158 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,771 UART: ROM Fatal Error: 0x000B0005
1,327,928 >>> mbox cmd response: failed
1,327,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,934 >>> mbox cmd response: failed
1,327,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,905 UART: [kat] ++
895,057 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,618 UART: [kat] HMAC-384Kdf
920,100 UART: [kat] LMS
1,168,412 UART: [kat] --
1,168,963 UART: [cold-reset] ++
1,169,503 UART: [fht] FHT @ 0x50003400
1,171,969 UART: [idev] ++
1,172,137 UART: [idev] CDI.KEYID = 6
1,172,498 UART: [idev] SUBJECT.KEYID = 7
1,172,923 UART: [idev] UDS.KEYID = 0
1,173,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,005 UART: [idev] Erasing UDS.KEYID = 0
1,197,877 UART: [idev] Sha1 KeyId Algorithm
1,206,803 UART: [idev] --
1,207,898 UART: [ldev] ++
1,208,066 UART: [ldev] CDI.KEYID = 6
1,208,430 UART: [ldev] SUBJECT.KEYID = 5
1,208,857 UART: [ldev] AUTHORITY.KEYID = 7
1,209,320 UART: [ldev] FE.KEYID = 1
1,214,584 UART: [ldev] Erasing FE.KEYID = 1
1,240,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,374 UART: [fwproc] Wait for Commands...
1,281,171 UART: [fwproc] Recv command 0x46574c44
1,281,904 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,057 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,178,837 >>> mbox cmd response: failed
1,178,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,843 >>> mbox cmd response: failed
1,178,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,619,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Manufacturing
85,716 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
915,589 UART: [kat] HMAC-384Kdf
920,299 UART: [kat] LMS
1,168,611 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,169,920 UART: [fht] FHT @ 0x50003400
1,172,678 UART: [idev] ++
1,172,846 UART: [idev] CDI.KEYID = 6
1,173,207 UART: [idev] SUBJECT.KEYID = 7
1,173,632 UART: [idev] UDS.KEYID = 0
1,173,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,354 UART: [idev] Erasing UDS.KEYID = 0
1,198,252 UART: [idev] Sha1 KeyId Algorithm
1,207,238 UART: [idev] --
1,208,185 UART: [ldev] ++
1,208,353 UART: [ldev] CDI.KEYID = 6
1,208,717 UART: [ldev] SUBJECT.KEYID = 5
1,209,144 UART: [ldev] AUTHORITY.KEYID = 7
1,209,607 UART: [ldev] FE.KEYID = 1
1,214,629 UART: [ldev] Erasing FE.KEYID = 1
1,241,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,049 UART: [ldev] --
1,280,459 UART: [fwproc] Wait for Commands...
1,281,152 UART: [fwproc] Recv command 0x46574c44
1,281,885 UART: [fwproc] Recv'd Img size: 114360 bytes
1,326,606 UART: ROM Fatal Error: 0x000B0005
1,327,763 >>> mbox cmd response: failed
1,327,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,769 >>> mbox cmd response: failed
1,327,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,174,482 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,198,622 UART: [idev] Sha1 KeyId Algorithm
1,207,680 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46574c44
1,282,839 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,698 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,205 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,898 >>> mbox cmd response: failed
1,181,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,904 >>> mbox cmd response: failed
1,181,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,370 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,477 UART:
191,830 UART: Running Caliptra ROM ...
192,937 UART:
193,101 UART: [state] CFI Enabled
263,409 UART: [state] LifecycleState = Unprovisioned
265,355 UART: [state] DebugLocked = Yes
268,234 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,944 UART: [kat] SHA2-256
443,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,205 UART: [kat] ++
454,698 UART: [kat] sha1
466,602 UART: [kat] SHA2-256
469,284 UART: [kat] SHA2-384
476,228 UART: [kat] SHA2-512-ACC
478,574 UART: [kat] ECC-384
2,765,179 UART: [kat] HMAC-384Kdf
2,796,689 UART: [kat] LMS
3,986,949 UART: [kat] --
3,992,242 UART: [cold-reset] ++
3,994,791 UART: [fht] Storing FHT @ 0x50003400
4,006,121 UART: [idev] ++
4,006,696 UART: [idev] CDI.KEYID = 6
4,007,672 UART: [idev] SUBJECT.KEYID = 7
4,008,895 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
194,743 UART:
195,597 UART: Running Caliptra ROM ...
196,769 UART:
196,916 UART: [state] CFI Enabled
255,456 UART: [state] LifecycleState = Manufacturing
257,380 UART: [state] DebugLocked = Yes
259,510 UART: [state] Starting the Watchdog Timer 40000000 cycles
265,606 UART: [kat] SHA2-256
435,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,819 UART: [kat] ++
446,372 UART: [kat] sha1
458,064 UART: [kat] SHA2-256
460,750 UART: [kat] SHA2-384
466,237 UART: [kat] SHA2-512-ACC
468,632 UART: [kat] ECC-384
2,758,896 UART: [kat] HMAC-384Kdf
2,789,760 UART: [kat] LMS
3,980,047 UART: [kat] --
3,983,842 UART: [cold-reset] ++
3,986,047 UART: [fht] Storing FHT @ 0x50003400
3,996,993 UART: [idev] ++
3,997,561 UART: [idev] CDI.KEYID = 6
3,998,526 UART: [idev] SUBJECT.KEYID = 7
3,999,743 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
191,584 UART:
191,955 UART: Running Caliptra ROM ...
193,044 UART:
193,192 UART: [state] CFI Enabled
263,063 UART: [state] LifecycleState = Unknown
264,756 UART: [state] DebugLocked = Yes
266,741 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,787 UART: [kat] SHA2-256
442,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,996 UART: [kat] ++
453,463 UART: [kat] sha1
464,123 UART: [kat] SHA2-256
466,807 UART: [kat] SHA2-384
474,101 UART: [kat] SHA2-512-ACC
476,452 UART: [kat] ECC-384
2,767,108 UART: [kat] HMAC-384Kdf
2,797,501 UART: [kat] LMS
3,987,811 UART: [kat] --
3,991,710 UART: [cold-reset] ++
3,993,101 UART: [fht] Storing FHT @ 0x50003400
4,004,646 UART: [idev] ++
4,005,216 UART: [idev] CDI.KEYID = 6
4,006,157 UART: [idev] SUBJECT.KEYID = 7
4,007,377 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
191,692 UART:
192,547 UART: Running Caliptra ROM ...
193,736 UART:
193,888 UART: [state] CFI Enabled
259,369 UART: [state] LifecycleState = Production
261,237 UART: [state] DebugLocked = Yes
264,145 UART: [state] Starting the Watchdog Timer 40000000 cycles
269,710 UART: [kat] SHA2-256
439,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,976 UART: [kat] ++
450,489 UART: [kat] sha1
460,867 UART: [kat] SHA2-256
463,548 UART: [kat] SHA2-384
469,155 UART: [kat] SHA2-512-ACC
471,552 UART: [kat] ECC-384
2,762,681 UART: [kat] HMAC-384Kdf
2,774,397 UART: [kat] LMS
3,964,688 UART: [kat] --
3,969,392 UART: [cold-reset] ++
3,970,472 UART: [fht] Storing FHT @ 0x50003400
3,981,743 UART: [idev] ++
3,982,312 UART: [idev] CDI.KEYID = 6
3,983,296 UART: [idev] SUBJECT.KEYID = 7
3,984,515 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,289 UART:
193,006 UART: Running Caliptra ROM ...
194,184 UART:
194,329 UART: [state] CFI Enabled
270,081 UART: [state] LifecycleState = Unprovisioned
272,040 UART: [state] DebugLocked = No
273,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,840 UART: [kat] SHA2-256
448,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,027 UART: [kat] ++
459,529 UART: [kat] sha1
470,377 UART: [kat] SHA2-256
473,077 UART: [kat] SHA2-384
478,146 UART: [kat] SHA2-512-ACC
480,484 UART: [kat] ECC-384
2,772,857 UART: [kat] HMAC-384Kdf
2,805,920 UART: [kat] LMS
3,996,190 UART: [kat] --
4,003,209 UART: [cold-reset] ++
4,004,716 UART: [fht] Storing FHT @ 0x50003400
4,015,344 UART: [idev] ++
4,015,922 UART: [idev] CDI.KEYID = 6
4,016,836 UART: [idev] SUBJECT.KEYID = 7
4,018,111 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,171 UART:
192,541 UART: Running Caliptra ROM ...
193,690 UART:
193,836 UART: [state] CFI Enabled
264,056 UART: [state] LifecycleState = Manufacturing
266,020 UART: [state] DebugLocked = No
268,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,351 UART: [kat] SHA2-256
443,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,528 UART: [kat] ++
454,029 UART: [kat] sha1
464,819 UART: [kat] SHA2-256
467,560 UART: [kat] SHA2-384
472,407 UART: [kat] SHA2-512-ACC
474,745 UART: [kat] ECC-384
2,765,550 UART: [kat] HMAC-384Kdf
2,797,285 UART: [kat] LMS
3,987,585 UART: [kat] --
3,993,574 UART: [cold-reset] ++
3,996,098 UART: [fht] Storing FHT @ 0x50003400
4,007,358 UART: [idev] ++
4,007,989 UART: [idev] CDI.KEYID = 6
4,008,884 UART: [idev] SUBJECT.KEYID = 7
4,010,108 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,226 UART:
192,586 UART: Running Caliptra ROM ...
193,699 UART:
193,840 UART: [state] CFI Enabled
263,719 UART: [state] LifecycleState = Unknown
265,396 UART: [state] DebugLocked = No
268,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,811 UART: [kat] SHA2-256
443,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,022 UART: [kat] ++
454,477 UART: [kat] sha1
465,246 UART: [kat] SHA2-256
467,936 UART: [kat] SHA2-384
475,158 UART: [kat] SHA2-512-ACC
477,568 UART: [kat] ECC-384
2,767,809 UART: [kat] HMAC-384Kdf
2,799,819 UART: [kat] LMS
3,990,142 UART: [kat] --
3,995,072 UART: [cold-reset] ++
3,996,316 UART: [fht] Storing FHT @ 0x50003400
4,007,424 UART: [idev] ++
4,008,051 UART: [idev] CDI.KEYID = 6
4,008,969 UART: [idev] SUBJECT.KEYID = 7
4,010,192 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,227 UART:
192,598 UART: Running Caliptra ROM ...
193,921 UART:
194,084 UART: [state] CFI Enabled
261,551 UART: [state] LifecycleState = Production
263,329 UART: [state] DebugLocked = No
265,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,592 UART: [kat] SHA2-256
440,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,790 UART: [kat] ++
451,236 UART: [kat] sha1
461,573 UART: [kat] SHA2-256
464,271 UART: [kat] SHA2-384
469,599 UART: [kat] SHA2-512-ACC
471,955 UART: [kat] ECC-384
2,765,159 UART: [kat] HMAC-384Kdf
2,793,366 UART: [kat] LMS
3,983,688 UART: [kat] --
3,987,077 UART: [cold-reset] ++
3,988,103 UART: [fht] Storing FHT @ 0x50003400
4,000,247 UART: [idev] ++
4,000,824 UART: [idev] CDI.KEYID = 6
4,001,800 UART: [idev] SUBJECT.KEYID = 7
4,003,023 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
191,778 UART:
192,139 UART: Running Caliptra ROM ...
193,296 UART:
603,037 UART: [state] CFI Enabled
617,830 UART: [state] LifecycleState = Unprovisioned
619,736 UART: [state] DebugLocked = Yes
621,415 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,944 UART: [kat] SHA2-256
795,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,269 UART: [kat] ++
806,951 UART: [kat] sha1
817,351 UART: [kat] SHA2-256
820,067 UART: [kat] SHA2-384
826,323 UART: [kat] SHA2-512-ACC
828,672 UART: [kat] ECC-384
3,116,203 UART: [kat] HMAC-384Kdf
3,128,095 UART: [kat] LMS
4,318,230 UART: [kat] --
4,322,983 UART: [cold-reset] ++
4,324,162 UART: [fht] Storing FHT @ 0x50003400
4,335,322 UART: [idev] ++
4,335,898 UART: [idev] CDI.KEYID = 6
4,336,868 UART: [idev] SUBJECT.KEYID = 7
4,338,086 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,722 UART:
193,653 UART: Running Caliptra ROM ...
194,814 UART:
604,021 UART: [state] CFI Enabled
618,788 UART: [state] LifecycleState = Manufacturing
620,709 UART: [state] DebugLocked = Yes
623,379 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,920 UART: [kat] SHA2-256
798,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,204 UART: [kat] ++
809,698 UART: [kat] sha1
820,899 UART: [kat] SHA2-256
823,642 UART: [kat] SHA2-384
828,868 UART: [kat] SHA2-512-ACC
831,267 UART: [kat] ECC-384
3,115,176 UART: [kat] HMAC-384Kdf
3,128,020 UART: [kat] LMS
4,318,166 UART: [kat] --
4,322,897 UART: [cold-reset] ++
4,324,840 UART: [fht] Storing FHT @ 0x50003400
4,336,061 UART: [idev] ++
4,336,644 UART: [idev] CDI.KEYID = 6
4,337,557 UART: [idev] SUBJECT.KEYID = 7
4,338,828 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,977 writing to cptra_bootfsm_go
192,609 UART:
192,994 UART: Running Caliptra ROM ...
194,202 UART:
603,756 UART: [state] CFI Enabled
619,868 UART: [state] LifecycleState = Unknown
621,566 UART: [state] DebugLocked = Yes
623,843 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,962 UART: [kat] SHA2-256
798,783 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,278 UART: [kat] ++
809,741 UART: [kat] sha1
820,994 UART: [kat] SHA2-256
823,671 UART: [kat] SHA2-384
828,193 UART: [kat] SHA2-512-ACC
830,589 UART: [kat] ECC-384
3,112,972 UART: [kat] HMAC-384Kdf
3,124,457 UART: [kat] LMS
4,314,542 UART: [kat] --
4,319,746 UART: [cold-reset] ++
4,321,706 UART: [fht] Storing FHT @ 0x50003400
4,333,634 UART: [idev] ++
4,334,210 UART: [idev] CDI.KEYID = 6
4,335,174 UART: [idev] SUBJECT.KEYID = 7
4,336,393 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
18,830 writing to cptra_bootfsm_go
207,437 UART:
208,275 UART: Running Caliptra ROM ...
209,428 UART:
618,810 UART: [state] CFI Enabled
630,701 UART: [state] LifecycleState = Production
632,494 UART: [state] DebugLocked = Yes
634,836 UART: [state] Starting the Watchdog Timer 40000000 cycles
639,204 UART: [kat] SHA2-256
808,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
819,513 UART: [kat] ++
820,075 UART: [kat] sha1
832,162 UART: [kat] SHA2-256
834,843 UART: [kat] SHA2-384
841,011 UART: [kat] SHA2-512-ACC
843,360 UART: [kat] ECC-384
3,126,694 UART: [kat] HMAC-384Kdf
3,137,857 UART: [kat] LMS
4,328,005 UART: [kat] --
4,331,597 UART: [cold-reset] ++
4,333,000 UART: [fht] Storing FHT @ 0x50003400
4,344,004 UART: [idev] ++
4,344,580 UART: [idev] CDI.KEYID = 6
4,345,597 UART: [idev] SUBJECT.KEYID = 7
4,346,755 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
32,969 writing to cptra_bootfsm_go
224,075 UART:
224,890 UART: Running Caliptra ROM ...
226,042 UART:
635,332 UART: [state] CFI Enabled
651,567 UART: [state] LifecycleState = Unprovisioned
653,495 UART: [state] DebugLocked = No
655,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
659,525 UART: [kat] SHA2-256
829,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
839,858 UART: [kat] ++
840,392 UART: [kat] sha1
851,111 UART: [kat] SHA2-256
853,794 UART: [kat] SHA2-384
860,363 UART: [kat] SHA2-512-ACC
862,756 UART: [kat] ECC-384
3,148,011 UART: [kat] HMAC-384Kdf
3,159,230 UART: [kat] LMS
4,349,339 UART: [kat] --
4,354,214 UART: [cold-reset] ++
4,355,127 UART: [fht] Storing FHT @ 0x50003400
4,366,449 UART: [idev] ++
4,367,016 UART: [idev] CDI.KEYID = 6
4,368,037 UART: [idev] SUBJECT.KEYID = 7
4,369,200 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,671 UART:
193,030 UART: Running Caliptra ROM ...
194,134 UART:
603,813 UART: [state] CFI Enabled
617,119 UART: [state] LifecycleState = Manufacturing
619,065 UART: [state] DebugLocked = No
621,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,182 UART: [kat] SHA2-256
795,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,478 UART: [kat] ++
807,011 UART: [kat] sha1
818,439 UART: [kat] SHA2-256
821,142 UART: [kat] SHA2-384
827,071 UART: [kat] SHA2-512-ACC
829,416 UART: [kat] ECC-384
3,112,507 UART: [kat] HMAC-384Kdf
3,125,083 UART: [kat] LMS
4,315,227 UART: [kat] --
4,319,322 UART: [cold-reset] ++
4,320,713 UART: [fht] Storing FHT @ 0x50003400
4,331,979 UART: [idev] ++
4,332,605 UART: [idev] CDI.KEYID = 6
4,333,538 UART: [idev] SUBJECT.KEYID = 7
4,334,753 UART: [idev] UDS.KEYID = 0
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,618 UART:
192,973 UART: Running Caliptra ROM ...
194,165 UART:
603,736 UART: [state] CFI Enabled
619,203 UART: [state] LifecycleState = Unknown
620,859 UART: [state] DebugLocked = No
622,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,506 UART: [kat] SHA2-256
798,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,808 UART: [kat] ++
809,393 UART: [kat] sha1
820,490 UART: [kat] SHA2-256
823,176 UART: [kat] SHA2-384
829,155 UART: [kat] SHA2-512-ACC
831,566 UART: [kat] ECC-384
3,115,945 UART: [kat] HMAC-384Kdf
3,127,340 UART: [kat] LMS
4,317,452 UART: [kat] --
4,321,830 UART: [cold-reset] ++
4,323,011 UART: [fht] Storing FHT @ 0x50003400
4,335,037 UART: [idev] ++
4,335,602 UART: [idev] CDI.KEYID = 6
4,336,713 UART: [idev] SUBJECT.KEYID = 7
4,337,818 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,622 UART:
192,971 UART: Running Caliptra ROM ...
194,171 UART:
603,929 UART: [state] CFI Enabled
619,653 UART: [state] LifecycleState = Production
621,465 UART: [state] DebugLocked = No
624,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,454 UART: [kat] SHA2-256
798,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,776 UART: [kat] ++
809,256 UART: [kat] sha1
821,914 UART: [kat] SHA2-256
824,596 UART: [kat] SHA2-384
830,572 UART: [kat] SHA2-512-ACC
832,918 UART: [kat] ECC-384
3,115,764 UART: [kat] HMAC-384Kdf
3,126,119 UART: [kat] LMS
4,316,206 UART: [kat] --
4,322,498 UART: [cold-reset] ++
4,323,898 UART: [fht] Storing FHT @ 0x50003400
4,335,547 UART: [idev] ++
4,336,122 UART: [idev] CDI.KEYID = 6
4,337,028 UART: [idev] SUBJECT.KEYID = 7
4,338,301 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
15,955 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
51,476 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
191,739 UART:
192,162 UART: Running Caliptra ROM ...
193,264 UART:
193,418 UART: [state] CFI Enabled
262,403 UART: [state] LifecycleState = Unprovisioned
264,298 UART: [state] DebugLocked = Yes
267,123 UART: [state] Starting the WD Timer 40000000 cycles
272,106 UART: [kat] SHA2-256
451,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,836 UART: [kat] ++
463,340 UART: [kat] sha1
474,651 UART: [kat] SHA2-256
477,703 UART: [kat] SHA2-384
484,123 UART: [kat] SHA2-512-ACC
487,062 UART: [kat] ECC-384
2,945,553 UART: [kat] HMAC-384Kdf
2,969,346 UART: [kat] LMS
3,498,809 UART: [kat] --
3,503,871 UART: [cold-reset] ++
3,505,404 UART: [fht] FHT @ 0x50003400
3,516,667 UART: [idev] ++
3,517,236 UART: [idev] CDI.KEYID = 6
3,518,199 UART: [idev] SUBJECT.KEYID = 7
3,519,358 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
6,908 writing to cptra_bootfsm_go
196,117 UART:
196,892 UART: Running Caliptra ROM ...
198,071 UART:
198,230 UART: [state] CFI Enabled
274,476 UART: [state] LifecycleState = Manufacturing
276,400 UART: [state] DebugLocked = Yes
277,839 UART: [state] Starting the WD Timer 40000000 cycles
282,498 UART: [kat] SHA2-256
461,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
473,198 UART: [kat] ++
473,755 UART: [kat] sha1
486,365 UART: [kat] SHA2-256
489,376 UART: [kat] SHA2-384
495,082 UART: [kat] SHA2-512-ACC
498,039 UART: [kat] ECC-384
2,952,856 UART: [kat] HMAC-384Kdf
2,976,295 UART: [kat] LMS
3,505,780 UART: [kat] --
3,509,934 UART: [cold-reset] ++
3,512,028 UART: [fht] FHT @ 0x50003400
3,522,696 UART: [idev] ++
3,523,269 UART: [idev] CDI.KEYID = 6
3,524,232 UART: [idev] SUBJECT.KEYID = 7
3,525,386 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
20,423 writing to cptra_bootfsm_go
209,031 UART:
209,904 UART: Running Caliptra ROM ...
211,093 UART:
211,241 UART: [state] CFI Enabled
274,917 UART: [state] LifecycleState = Unknown
276,514 UART: [state] DebugLocked = Yes
279,442 UART: [state] Starting the WD Timer 40000000 cycles
284,777 UART: [kat] SHA2-256
463,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
475,459 UART: [kat] ++
476,011 UART: [kat] sha1
485,416 UART: [kat] SHA2-256
488,482 UART: [kat] SHA2-384
494,510 UART: [kat] SHA2-512-ACC
497,507 UART: [kat] ECC-384
2,957,201 UART: [kat] HMAC-384Kdf
2,980,683 UART: [kat] LMS
3,510,172 UART: [kat] --
3,514,385 UART: [cold-reset] ++
3,515,667 UART: [fht] FHT @ 0x50003400
3,525,838 UART: [idev] ++
3,526,398 UART: [idev] CDI.KEYID = 6
3,527,282 UART: [idev] SUBJECT.KEYID = 7
3,528,437 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
7,414 writing to cptra_bootfsm_go
196,027 UART:
196,814 UART: Running Caliptra ROM ...
197,945 UART:
198,094 UART: [state] CFI Enabled
262,080 UART: [state] LifecycleState = Production
263,823 UART: [state] DebugLocked = Yes
266,108 UART: [state] Starting the WD Timer 40000000 cycles
271,074 UART: [kat] SHA2-256
450,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,776 UART: [kat] ++
462,313 UART: [kat] sha1
474,567 UART: [kat] SHA2-256
477,578 UART: [kat] SHA2-384
482,848 UART: [kat] SHA2-512-ACC
485,837 UART: [kat] ECC-384
2,946,238 UART: [kat] HMAC-384Kdf
2,969,992 UART: [kat] LMS
3,499,457 UART: [kat] --
3,503,125 UART: [cold-reset] ++
3,505,219 UART: [fht] FHT @ 0x50003400
3,515,762 UART: [idev] ++
3,516,329 UART: [idev] CDI.KEYID = 6
3,517,209 UART: [idev] SUBJECT.KEYID = 7
3,518,420 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,222 writing to cptra_bootfsm_go
193,363 UART:
194,084 UART: Running Caliptra ROM ...
195,211 UART:
195,377 UART: [state] CFI Enabled
261,962 UART: [state] LifecycleState = Unprovisioned
263,822 UART: [state] DebugLocked = No
265,531 UART: [state] WD Timer not started. Device not locked for debugging
270,096 UART: [kat] SHA2-256
449,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,809 UART: [kat] ++
461,356 UART: [kat] sha1
471,116 UART: [kat] SHA2-256
474,176 UART: [kat] SHA2-384
480,537 UART: [kat] SHA2-512-ACC
483,472 UART: [kat] ECC-384
2,950,094 UART: [kat] HMAC-384Kdf
2,972,346 UART: [kat] LMS
3,501,809 UART: [kat] --
3,506,088 UART: [cold-reset] ++
3,508,580 UART: [fht] FHT @ 0x50003400
3,518,156 UART: [idev] ++
3,518,727 UART: [idev] CDI.KEYID = 6
3,519,665 UART: [idev] SUBJECT.KEYID = 7
3,520,877 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
192,343 UART:
192,698 UART: Running Caliptra ROM ...
193,900 UART:
194,051 UART: [state] CFI Enabled
258,076 UART: [state] LifecycleState = Manufacturing
259,939 UART: [state] DebugLocked = No
262,258 UART: [state] WD Timer not started. Device not locked for debugging
265,642 UART: [kat] SHA2-256
444,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,326 UART: [kat] ++
456,862 UART: [kat] sha1
467,216 UART: [kat] SHA2-256
470,212 UART: [kat] SHA2-384
477,225 UART: [kat] SHA2-512-ACC
480,160 UART: [kat] ECC-384
2,941,446 UART: [kat] HMAC-384Kdf
2,966,161 UART: [kat] LMS
3,495,624 UART: [kat] --
3,498,753 UART: [cold-reset] ++
3,499,899 UART: [fht] FHT @ 0x50003400
3,512,101 UART: [idev] ++
3,512,677 UART: [idev] CDI.KEYID = 6
3,513,675 UART: [idev] SUBJECT.KEYID = 7
3,514,839 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,127 UART:
192,495 UART: Running Caliptra ROM ...
193,583 UART:
193,725 UART: [state] CFI Enabled
261,143 UART: [state] LifecycleState = Unknown
262,819 UART: [state] DebugLocked = No
265,468 UART: [state] WD Timer not started. Device not locked for debugging
269,834 UART: [kat] SHA2-256
448,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,540 UART: [kat] ++
460,988 UART: [kat] sha1
472,456 UART: [kat] SHA2-256
475,460 UART: [kat] SHA2-384
481,332 UART: [kat] SHA2-512-ACC
484,266 UART: [kat] ECC-384
2,943,199 UART: [kat] HMAC-384Kdf
2,967,502 UART: [kat] LMS
3,496,952 UART: [kat] --
3,500,970 UART: [cold-reset] ++
3,502,212 UART: [fht] FHT @ 0x50003400
3,511,952 UART: [idev] ++
3,512,520 UART: [idev] CDI.KEYID = 6
3,513,429 UART: [idev] SUBJECT.KEYID = 7
3,514,641 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,235 UART:
192,598 UART: Running Caliptra ROM ...
193,782 UART:
193,934 UART: [state] CFI Enabled
257,941 UART: [state] LifecycleState = Production
259,657 UART: [state] DebugLocked = No
261,523 UART: [state] WD Timer not started. Device not locked for debugging
265,307 UART: [kat] SHA2-256
444,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,965 UART: [kat] ++
456,509 UART: [kat] sha1
467,178 UART: [kat] SHA2-256
470,183 UART: [kat] SHA2-384
476,861 UART: [kat] SHA2-512-ACC
479,812 UART: [kat] ECC-384
2,945,029 UART: [kat] HMAC-384Kdf
2,967,880 UART: [kat] LMS
3,497,353 UART: [kat] --
3,503,292 UART: [cold-reset] ++
3,504,418 UART: [fht] FHT @ 0x50003400
3,515,129 UART: [idev] ++
3,515,696 UART: [idev] CDI.KEYID = 6
3,516,601 UART: [idev] SUBJECT.KEYID = 7
3,517,817 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,534 UART:
191,937 UART: Running Caliptra ROM ...
193,022 UART:
193,173 UART: [state] CFI Enabled
262,324 UART: [state] LifecycleState = Unprovisioned
264,706 UART: [state] DebugLocked = Yes
266,449 UART: [state] Starting the WD Timer 40000000 cycles
271,091 UART: [kat] SHA2-256
460,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,758 UART: [kat] ++
472,306 UART: [kat] sha1
482,718 UART: [kat] SHA2-256
485,731 UART: [kat] SHA2-384
491,495 UART: [kat] SHA2-512-ACC
494,056 UART: [kat] ECC-384
2,947,122 UART: [kat] HMAC-384Kdf
2,971,786 UART: [kat] LMS
3,503,577 UART: [kat] --
3,508,271 UART: [cold-reset] ++
3,509,665 UART: [fht] FHT @ 0x50003400
3,521,571 UART: [idev] ++
3,522,245 UART: [idev] CDI.KEYID = 6
3,523,186 UART: [idev] SUBJECT.KEYID = 7
3,524,396 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
192,963 UART:
193,704 UART: Running Caliptra ROM ...
194,888 UART:
195,029 UART: [state] CFI Enabled
267,469 UART: [state] LifecycleState = Manufacturing
269,859 UART: [state] DebugLocked = Yes
271,823 UART: [state] Starting the WD Timer 40000000 cycles
276,845 UART: [kat] SHA2-256
466,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,485 UART: [kat] ++
478,089 UART: [kat] sha1
488,976 UART: [kat] SHA2-256
491,979 UART: [kat] SHA2-384
499,327 UART: [kat] SHA2-512-ACC
501,920 UART: [kat] ECC-384
2,950,360 UART: [kat] HMAC-384Kdf
2,973,253 UART: [kat] LMS
3,505,034 UART: [kat] --
3,510,509 UART: [cold-reset] ++
3,511,588 UART: [fht] FHT @ 0x50003400
3,523,089 UART: [idev] ++
3,523,772 UART: [idev] CDI.KEYID = 6
3,524,715 UART: [idev] SUBJECT.KEYID = 7
3,525,933 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
192,299 UART:
193,109 UART: Running Caliptra ROM ...
194,256 UART:
194,401 UART: [state] CFI Enabled
270,449 UART: [state] LifecycleState = Unknown
272,513 UART: [state] DebugLocked = Yes
275,230 UART: [state] Starting the WD Timer 40000000 cycles
280,409 UART: [kat] SHA2-256
470,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
481,058 UART: [kat] ++
481,662 UART: [kat] sha1
494,070 UART: [kat] SHA2-256
497,082 UART: [kat] SHA2-384
502,907 UART: [kat] SHA2-512-ACC
505,507 UART: [kat] ECC-384
2,952,817 UART: [kat] HMAC-384Kdf
2,974,191 UART: [kat] LMS
3,505,971 UART: [kat] --
3,508,223 UART: [cold-reset] ++
3,510,813 UART: [fht] FHT @ 0x50003400
3,521,797 UART: [idev] ++
3,522,483 UART: [idev] CDI.KEYID = 6
3,523,499 UART: [idev] SUBJECT.KEYID = 7
3,524,562 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
191,718 UART:
192,453 UART: Running Caliptra ROM ...
193,609 UART:
193,753 UART: [state] CFI Enabled
257,257 UART: [state] LifecycleState = Production
259,492 UART: [state] DebugLocked = Yes
261,798 UART: [state] Starting the WD Timer 40000000 cycles
267,849 UART: [kat] SHA2-256
457,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,462 UART: [kat] ++
469,000 UART: [kat] sha1
481,264 UART: [kat] SHA2-256
484,278 UART: [kat] SHA2-384
488,694 UART: [kat] SHA2-512-ACC
491,282 UART: [kat] ECC-384
2,940,807 UART: [kat] HMAC-384Kdf
2,964,585 UART: [kat] LMS
3,496,350 UART: [kat] --
3,500,466 UART: [cold-reset] ++
3,502,302 UART: [fht] FHT @ 0x50003400
3,515,115 UART: [idev] ++
3,515,798 UART: [idev] CDI.KEYID = 6
3,516,764 UART: [idev] SUBJECT.KEYID = 7
3,517,977 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,444 UART:
193,349 UART: Running Caliptra ROM ...
194,520 UART:
194,667 UART: [state] CFI Enabled
261,312 UART: [state] LifecycleState = Unprovisioned
263,713 UART: [state] DebugLocked = No
266,090 UART: [state] WD Timer not started. Device not locked for debugging
269,898 UART: [kat] SHA2-256
459,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,545 UART: [kat] ++
471,200 UART: [kat] sha1
481,982 UART: [kat] SHA2-256
484,994 UART: [kat] SHA2-384
490,594 UART: [kat] SHA2-512-ACC
493,155 UART: [kat] ECC-384
2,942,846 UART: [kat] HMAC-384Kdf
2,967,676 UART: [kat] LMS
3,499,459 UART: [kat] --
3,502,458 UART: [cold-reset] ++
3,504,511 UART: [fht] FHT @ 0x50003400
3,515,806 UART: [idev] ++
3,516,499 UART: [idev] CDI.KEYID = 6
3,517,467 UART: [idev] SUBJECT.KEYID = 7
3,518,649 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,117 UART:
192,507 UART: Running Caliptra ROM ...
193,612 UART:
193,753 UART: [state] CFI Enabled
259,360 UART: [state] LifecycleState = Manufacturing
261,717 UART: [state] DebugLocked = No
264,151 UART: [state] WD Timer not started. Device not locked for debugging
268,698 UART: [kat] SHA2-256
458,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,343 UART: [kat] ++
469,788 UART: [kat] sha1
481,476 UART: [kat] SHA2-256
484,485 UART: [kat] SHA2-384
490,030 UART: [kat] SHA2-512-ACC
492,592 UART: [kat] ECC-384
2,941,207 UART: [kat] HMAC-384Kdf
2,966,351 UART: [kat] LMS
3,498,142 UART: [kat] --
3,503,444 UART: [cold-reset] ++
3,505,975 UART: [fht] FHT @ 0x50003400
3,516,902 UART: [idev] ++
3,517,583 UART: [idev] CDI.KEYID = 6
3,518,492 UART: [idev] SUBJECT.KEYID = 7
3,519,704 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,227 UART:
192,597 UART: Running Caliptra ROM ...
193,933 UART:
194,088 UART: [state] CFI Enabled
259,568 UART: [state] LifecycleState = Unknown
261,608 UART: [state] DebugLocked = No
263,927 UART: [state] WD Timer not started. Device not locked for debugging
269,223 UART: [kat] SHA2-256
459,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,863 UART: [kat] ++
470,341 UART: [kat] sha1
482,354 UART: [kat] SHA2-256
485,364 UART: [kat] SHA2-384
490,482 UART: [kat] SHA2-512-ACC
493,094 UART: [kat] ECC-384
2,942,955 UART: [kat] HMAC-384Kdf
2,967,438 UART: [kat] LMS
3,499,178 UART: [kat] --
3,502,794 UART: [cold-reset] ++
3,505,003 UART: [fht] FHT @ 0x50003400
3,516,307 UART: [idev] ++
3,516,979 UART: [idev] CDI.KEYID = 6
3,518,011 UART: [idev] SUBJECT.KEYID = 7
3,519,118 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,400 UART:
192,763 UART: Running Caliptra ROM ...
193,959 UART:
194,110 UART: [state] CFI Enabled
263,470 UART: [state] LifecycleState = Production
265,718 UART: [state] DebugLocked = No
267,533 UART: [state] WD Timer not started. Device not locked for debugging
271,959 UART: [kat] SHA2-256
461,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,601 UART: [kat] ++
473,083 UART: [kat] sha1
483,717 UART: [kat] SHA2-256
486,751 UART: [kat] SHA2-384
493,345 UART: [kat] SHA2-512-ACC
495,960 UART: [kat] ECC-384
2,940,682 UART: [kat] HMAC-384Kdf
2,967,965 UART: [kat] LMS
3,499,729 UART: [kat] --
3,504,069 UART: [cold-reset] ++
3,505,362 UART: [fht] FHT @ 0x50003400
3,516,021 UART: [idev] ++
3,516,710 UART: [idev] CDI.KEYID = 6
3,517,674 UART: [idev] SUBJECT.KEYID = 7
3,518,891 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
191,694 UART:
192,072 UART: Running Caliptra ROM ...
193,227 UART:
603,007 UART: [state] CFI Enabled
616,542 UART: [state] LifecycleState = Unprovisioned
618,573 UART: [state] DebugLocked = Yes
620,635 UART: [state] Starting the WD Timer 40000000 cycles
625,859 UART: [kat] SHA2-256
815,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,525 UART: [kat] ++
827,128 UART: [kat] sha1
839,953 UART: [kat] SHA2-256
842,966 UART: [kat] SHA2-384
848,455 UART: [kat] SHA2-512-ACC
851,064 UART: [kat] ECC-384
3,293,324 UART: [kat] HMAC-384Kdf
3,306,643 UART: [kat] LMS
3,838,465 UART: [kat] --
3,842,180 UART: [cold-reset] ++
3,843,267 UART: [fht] FHT @ 0x50003400
3,854,465 UART: [idev] ++
3,855,172 UART: [idev] CDI.KEYID = 6
3,856,054 UART: [idev] SUBJECT.KEYID = 7
3,857,277 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,577 UART:
193,479 UART: Running Caliptra ROM ...
194,643 UART:
603,888 UART: [state] CFI Enabled
614,776 UART: [state] LifecycleState = Manufacturing
617,201 UART: [state] DebugLocked = Yes
619,482 UART: [state] Starting the WD Timer 40000000 cycles
625,295 UART: [kat] SHA2-256
815,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,981 UART: [kat] ++
826,546 UART: [kat] sha1
837,913 UART: [kat] SHA2-256
840,983 UART: [kat] SHA2-384
847,027 UART: [kat] SHA2-512-ACC
849,613 UART: [kat] ECC-384
3,292,150 UART: [kat] HMAC-384Kdf
3,305,317 UART: [kat] LMS
3,837,134 UART: [kat] --
3,840,953 UART: [cold-reset] ++
3,842,611 UART: [fht] FHT @ 0x50003400
3,853,593 UART: [idev] ++
3,854,286 UART: [idev] CDI.KEYID = 6
3,855,302 UART: [idev] SUBJECT.KEYID = 7
3,856,463 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
191,813 UART:
192,695 UART: Running Caliptra ROM ...
193,802 UART:
602,968 UART: [state] CFI Enabled
613,645 UART: [state] LifecycleState = Unknown
615,679 UART: [state] DebugLocked = Yes
618,549 UART: [state] Starting the WD Timer 40000000 cycles
624,422 UART: [kat] SHA2-256
814,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,140 UART: [kat] ++
825,730 UART: [kat] sha1
837,683 UART: [kat] SHA2-256
840,693 UART: [kat] SHA2-384
845,751 UART: [kat] SHA2-512-ACC
848,302 UART: [kat] ECC-384
3,294,358 UART: [kat] HMAC-384Kdf
3,306,605 UART: [kat] LMS
3,838,440 UART: [kat] --
3,841,132 UART: [cold-reset] ++
3,843,284 UART: [fht] FHT @ 0x50003400
3,853,104 UART: [idev] ++
3,853,793 UART: [idev] CDI.KEYID = 6
3,854,812 UART: [idev] SUBJECT.KEYID = 7
3,855,974 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
15,742 writing to cptra_bootfsm_go
204,360 UART:
205,097 UART: Running Caliptra ROM ...
206,336 UART:
615,680 UART: [state] CFI Enabled
630,781 UART: [state] LifecycleState = Production
632,976 UART: [state] DebugLocked = Yes
635,093 UART: [state] Starting the WD Timer 40000000 cycles
640,674 UART: [kat] SHA2-256
830,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
841,402 UART: [kat] ++
841,989 UART: [kat] sha1
854,472 UART: [kat] SHA2-256
857,467 UART: [kat] SHA2-384
864,320 UART: [kat] SHA2-512-ACC
866,929 UART: [kat] ECC-384
3,308,708 UART: [kat] HMAC-384Kdf
3,322,995 UART: [kat] LMS
3,854,815 UART: [kat] --
3,860,001 UART: [cold-reset] ++
3,861,237 UART: [fht] FHT @ 0x50003400
3,872,979 UART: [idev] ++
3,873,661 UART: [idev] CDI.KEYID = 6
3,874,677 UART: [idev] SUBJECT.KEYID = 7
3,875,854 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
53,413 writing to cptra_bootfsm_go
243,142 UART:
243,879 UART: Running Caliptra ROM ...
245,031 UART:
654,519 UART: [state] CFI Enabled
671,874 UART: [state] LifecycleState = Unprovisioned
674,272 UART: [state] DebugLocked = No
676,470 UART: [state] WD Timer not started. Device not locked for debugging
681,549 UART: [kat] SHA2-256
871,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
882,242 UART: [kat] ++
882,822 UART: [kat] sha1
894,298 UART: [kat] SHA2-256
897,319 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
3,348,721 UART: [kat] HMAC-384Kdf
3,361,990 UART: [kat] LMS
3,893,796 UART: [kat] --
3,899,698 UART: [cold-reset] ++
3,900,665 UART: [fht] FHT @ 0x50003400
3,911,915 UART: [idev] ++
3,912,600 UART: [idev] CDI.KEYID = 6
3,913,571 UART: [idev] SUBJECT.KEYID = 7
3,914,748 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,027 writing to cptra_bootfsm_go
193,388 UART:
193,753 UART: Running Caliptra ROM ...
194,952 UART:
604,516 UART: [state] CFI Enabled
618,073 UART: [state] LifecycleState = Manufacturing
620,474 UART: [state] DebugLocked = No
621,803 UART: [state] WD Timer not started. Device not locked for debugging
625,504 UART: [kat] SHA2-256
815,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,143 UART: [kat] ++
826,726 UART: [kat] sha1
839,774 UART: [kat] SHA2-256
842,776 UART: [kat] SHA2-384
847,995 UART: [kat] SHA2-512-ACC
850,543 UART: [kat] ECC-384
3,289,815 UART: [kat] HMAC-384Kdf
3,302,864 UART: [kat] LMS
3,834,725 UART: [kat] --
3,837,800 UART: [cold-reset] ++
3,839,101 UART: [fht] FHT @ 0x50003400
3,851,920 UART: [idev] ++
3,852,656 UART: [idev] CDI.KEYID = 6
3,853,582 UART: [idev] SUBJECT.KEYID = 7
3,854,791 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,429 UART:
192,810 UART: Running Caliptra ROM ...
194,031 UART:
603,798 UART: [state] CFI Enabled
617,160 UART: [state] LifecycleState = Unknown
619,192 UART: [state] DebugLocked = No
621,055 UART: [state] WD Timer not started. Device not locked for debugging
625,088 UART: [kat] SHA2-256
814,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,759 UART: [kat] ++
826,341 UART: [kat] sha1
838,468 UART: [kat] SHA2-256
841,459 UART: [kat] SHA2-384
849,112 UART: [kat] SHA2-512-ACC
851,669 UART: [kat] ECC-384
3,291,342 UART: [kat] HMAC-384Kdf
3,305,110 UART: [kat] LMS
3,836,896 UART: [kat] --
3,841,572 UART: [cold-reset] ++
3,842,539 UART: [fht] FHT @ 0x50003400
3,853,946 UART: [idev] ++
3,854,617 UART: [idev] CDI.KEYID = 6
3,855,635 UART: [idev] SUBJECT.KEYID = 7
3,856,790 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,530 UART:
192,914 UART: Running Caliptra ROM ...
194,121 UART:
603,504 UART: [state] CFI Enabled
618,271 UART: [state] LifecycleState = Production
620,530 UART: [state] DebugLocked = No
622,990 UART: [state] WD Timer not started. Device not locked for debugging
626,959 UART: [kat] SHA2-256
816,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,643 UART: [kat] ++
828,179 UART: [kat] sha1
839,004 UART: [kat] SHA2-256
842,025 UART: [kat] SHA2-384
848,330 UART: [kat] SHA2-512-ACC
850,939 UART: [kat] ECC-384
3,297,874 UART: [kat] HMAC-384Kdf
3,311,946 UART: [kat] LMS
3,843,781 UART: [kat] --
3,849,326 UART: [cold-reset] ++
3,850,746 UART: [fht] FHT @ 0x50003400
3,862,105 UART: [idev] ++
3,862,790 UART: [idev] CDI.KEYID = 6
3,863,758 UART: [idev] SUBJECT.KEYID = 7
3,864,915 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
4,872,843 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,493,550 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
4,874,461 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,540,670 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
5,182,149 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,670,684 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
5,182,653 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,670,206 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,460,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,345,417 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,436,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,316,174 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,460,171 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,375,252 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,790,308 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,576,244 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,784,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,558,036 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,671,604 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,744 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,671,590 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,415 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,672,092 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,927 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,674,220 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,894 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,671,294 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,434 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,672,186 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,672,540 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,672,418 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,440 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,672,881 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,948 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,674,027 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,199 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,673,145 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,607 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,673,351 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
191,554 UART:
191,950 UART: Running Caliptra ROM ...
193,126 UART:
193,280 UART: [state] CFI Enabled
262,364 UART: [state] LifecycleState = Production
264,156 UART: [state] DebugLocked = Yes
267,033 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,323 UART: [kat] SHA2-256
442,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,514 UART: [kat] ++
453,005 UART: [kat] sha1
464,052 UART: [kat] SHA2-256
466,743 UART: [kat] SHA2-384
473,638 UART: [kat] SHA2-512-ACC
475,990 UART: [kat] ECC-384
2,767,591 UART: [kat] HMAC-384Kdf
2,800,039 UART: [kat] LMS
3,990,379 UART: [kat] --
3,994,390 UART: [cold-reset] ++
3,995,569 UART: [fht] Storing FHT @ 0x50003400
4,007,164 UART: [idev] ++
4,007,794 UART: [idev] CDI.KEYID = 6
4,008,714 UART: [idev] SUBJECT.KEYID = 7
4,009,940 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
191,766 UART:
192,128 UART: Running Caliptra ROM ...
193,307 UART:
602,890 UART: [state] CFI Enabled
618,334 UART: [state] LifecycleState = Production
620,082 UART: [state] DebugLocked = Yes
622,257 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,928 UART: [kat] SHA2-256
797,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,242 UART: [kat] ++
808,702 UART: [kat] sha1
819,468 UART: [kat] SHA2-256
822,214 UART: [kat] SHA2-384
827,544 UART: [kat] SHA2-512-ACC
829,934 UART: [kat] ECC-384
3,113,908 UART: [kat] HMAC-384Kdf
3,125,396 UART: [kat] LMS
4,315,538 UART: [kat] --
4,319,767 UART: [cold-reset] ++
4,320,785 UART: [fht] Storing FHT @ 0x50003400
4,331,839 UART: [idev] ++
4,332,402 UART: [idev] CDI.KEYID = 6
4,333,367 UART: [idev] SUBJECT.KEYID = 7
4,334,578 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
191,630 UART:
192,173 UART: Running Caliptra ROM ...
193,386 UART:
193,536 UART: [state] CFI Enabled
261,713 UART: [state] LifecycleState = Production
263,448 UART: [state] DebugLocked = Yes
265,197 UART: [state] Starting the WD Timer 40000000 cycles
269,626 UART: [kat] SHA2-256
448,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,355 UART: [kat] ++
460,887 UART: [kat] sha1
472,553 UART: [kat] SHA2-256
475,568 UART: [kat] SHA2-384
482,842 UART: [kat] SHA2-512-ACC
485,761 UART: [kat] ECC-384
2,946,516 UART: [kat] HMAC-384Kdf
2,970,984 UART: [kat] LMS
3,500,459 UART: [kat] --
3,504,284 UART: [cold-reset] ++
3,505,364 UART: [fht] FHT @ 0x50003400
3,516,834 UART: [idev] ++
3,517,402 UART: [idev] CDI.KEYID = 6
3,518,319 UART: [idev] SUBJECT.KEYID = 7
3,519,532 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
191,499 UART:
191,894 UART: Running Caliptra ROM ...
193,076 UART:
193,229 UART: [state] CFI Enabled
261,233 UART: [state] LifecycleState = Production
263,448 UART: [state] DebugLocked = Yes
264,811 UART: [state] Starting the WD Timer 40000000 cycles
270,479 UART: [kat] SHA2-256
460,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,135 UART: [kat] ++
471,669 UART: [kat] sha1
482,890 UART: [kat] SHA2-256
485,906 UART: [kat] SHA2-384
490,374 UART: [kat] SHA2-512-ACC
492,989 UART: [kat] ECC-384
2,947,037 UART: [kat] HMAC-384Kdf
2,970,209 UART: [kat] LMS
3,501,975 UART: [kat] --
3,506,893 UART: [cold-reset] ++
3,507,798 UART: [fht] FHT @ 0x50003400
3,519,055 UART: [idev] ++
3,519,743 UART: [idev] CDI.KEYID = 6
3,520,713 UART: [idev] SUBJECT.KEYID = 7
3,521,878 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
191,828 UART:
192,211 UART: Running Caliptra ROM ...
193,388 UART:
603,037 UART: [state] CFI Enabled
615,411 UART: [state] LifecycleState = Production
617,604 UART: [state] DebugLocked = Yes
619,665 UART: [state] Starting the WD Timer 40000000 cycles
625,592 UART: [kat] SHA2-256
815,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,313 UART: [kat] ++
826,851 UART: [kat] sha1
838,988 UART: [kat] SHA2-256
842,004 UART: [kat] SHA2-384
846,875 UART: [kat] SHA2-512-ACC
849,495 UART: [kat] ECC-384
3,291,846 UART: [kat] HMAC-384Kdf
3,304,565 UART: [kat] LMS
3,836,387 UART: [kat] --
3,841,025 UART: [cold-reset] ++
3,842,151 UART: [fht] FHT @ 0x50003400
3,852,814 UART: [idev] ++
3,853,547 UART: [idev] CDI.KEYID = 6
3,854,511 UART: [idev] SUBJECT.KEYID = 7
3,855,671 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Production
86,071 UART: [state] DebugLocked = Yes
86,639 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,394 UART: [kat] SHA2-512-ACC
897,295 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,542 UART: [kat] LMS
1,475,738 UART: [kat] --
1,476,693 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,560 UART: [state] LifecycleState = Production
86,168 UART: [state] DebugLocked = Yes
86,716 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,936 UART: [kat] SHA2-256
892,874 UART: [kat] SHA2-384
895,655 UART: [kat] SHA2-512-ACC
897,556 UART: [kat] ECC-384
903,435 UART: [kat] HMAC-384Kdf
907,999 UART: [kat] LMS
1,476,195 UART: [kat] --
1,476,980 UART: [cold-reset] ++
1,477,353 UART: [fht] Storing FHT @ 0x50003400
1,480,144 UART: [idev] ++
1,480,312 UART: [idev] CDI.KEYID = 6
1,480,672 UART: [idev] SUBJECT.KEYID = 7
1,481,096 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,857 UART: [state] LifecycleState = Production
85,465 UART: [state] DebugLocked = Yes
86,193 UART: [state] Starting the WD Timer 40000000 cycles
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,153 UART: [kat] SHA2-256
904,093 UART: [kat] SHA2-384
906,934 UART: [kat] SHA2-512-ACC
908,835 UART: [kat] ECC-384
918,768 UART: [kat] HMAC-384Kdf
923,290 UART: [kat] LMS
1,171,618 UART: [kat] --
1,172,607 UART: [cold-reset] ++
1,173,174 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Production
85,786 UART: [state] DebugLocked = Yes
86,448 UART: [state] Starting the WD Timer 40000000 cycles
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
901,926 UART: [kat] SHA2-256
903,866 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,895 UART: [kat] LMS
1,171,223 UART: [kat] --
1,171,990 UART: [cold-reset] ++
1,172,349 UART: [fht] FHT @ 0x50003400
1,174,912 UART: [idev] ++
1,175,080 UART: [idev] CDI.KEYID = 6
1,175,440 UART: [idev] SUBJECT.KEYID = 7
1,175,864 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,599 UART: [state] LifecycleState = Production
85,207 UART: [state] DebugLocked = Yes
85,853 UART: [state] Starting the WD Timer 40000000 cycles
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Production
85,528 UART: [state] DebugLocked = Yes
86,264 UART: [state] Starting the WD Timer 40000000 cycles
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
191,594 UART:
191,968 UART: Running Caliptra ROM ...
193,168 UART:
193,327 UART: [state] CFI Enabled
265,140 UART: [state] LifecycleState = Production
266,941 UART: [state] DebugLocked = Yes
268,663 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,256 UART: [kat] SHA2-256
443,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,474 UART: [kat] ++
454,965 UART: [kat] sha1
465,699 UART: [kat] SHA2-256
468,361 UART: [kat] SHA2-384
475,075 UART: [kat] SHA2-512-ACC
477,459 UART: [kat] ECC-384
2,766,621 UART: [kat] HMAC-384Kdf
2,777,456 UART: [kat] LMS
3,967,741 UART: [kat] --
3,971,979 UART: [cold-reset] ++
3,972,860 UART: [fht] Storing FHT @ 0x50003400
3,985,367 UART: [idev] ++
3,985,938 UART: [idev] CDI.KEYID = 6
3,986,854 UART: [idev] SUBJECT.KEYID = 7
3,988,114 UART: [idev] UDS.KEYID = 0
3,989,042 ready_for_fw is high
3,989,267 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,132,745 UART: [idev] Erasing UDS.KEYID = 0
7,323,121 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,068 UART: [idev] --
7,348,288 UART: [ldev] ++
7,348,863 UART: [ldev] CDI.KEYID = 6
7,349,830 UART: [ldev] SUBJECT.KEYID = 5
7,351,049 UART: [ldev] AUTHORITY.KEYID = 7
7,352,288 UART: [ldev] FE.KEYID = 1
7,398,961 UART: [ldev] Erasing FE.KEYID = 1
10,732,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,421 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,039,936 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,054,593 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,068,949 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,087,853 UART: [ldev] --
13,093,024 UART: [fwproc] Waiting for Commands...
13,094,600 UART: [fwproc] Received command 0x46574c44
13,096,794 UART: [fwproc] Received Image of size 114036 bytes
17,197,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,693 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,658,859 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,806,193 ready_for_fw is high
3,807,118 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,914,212 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
191,912 UART:
192,274 UART: Running Caliptra ROM ...
193,478 UART:
602,955 UART: [state] CFI Enabled
619,105 UART: [state] LifecycleState = Production
620,940 UART: [state] DebugLocked = Yes
622,581 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,308 UART: [kat] SHA2-256
797,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,662 UART: [kat] ++
808,270 UART: [kat] sha1
819,581 UART: [kat] SHA2-256
822,232 UART: [kat] SHA2-384
828,166 UART: [kat] SHA2-512-ACC
830,540 UART: [kat] ECC-384
3,113,638 UART: [kat] HMAC-384Kdf
3,125,293 UART: [kat] LMS
4,315,443 UART: [kat] --
4,318,056 UART: [cold-reset] ++
4,319,290 UART: [fht] Storing FHT @ 0x50003400
4,331,134 UART: [idev] ++
4,331,708 UART: [idev] CDI.KEYID = 6
4,332,631 UART: [idev] SUBJECT.KEYID = 7
4,333,880 UART: [idev] UDS.KEYID = 0
4,334,884 ready_for_fw is high
4,335,111 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,455 UART: [idev] Erasing UDS.KEYID = 0
7,621,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,320 UART: [idev] --
7,647,288 UART: [ldev] ++
7,647,858 UART: [ldev] CDI.KEYID = 6
7,648,799 UART: [ldev] SUBJECT.KEYID = 5
7,650,015 UART: [ldev] AUTHORITY.KEYID = 7
7,651,253 UART: [ldev] FE.KEYID = 1
7,661,418 UART: [ldev] Erasing FE.KEYID = 1
10,947,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,918 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,254,474 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,269,150 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,283,499 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,302,832 UART: [ldev] --
13,307,459 UART: [fwproc] Waiting for Commands...
13,310,439 UART: [fwproc] Received command 0x46574c44
13,312,631 UART: [fwproc] Received Image of size 114036 bytes
17,396,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,471,054 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,539,963 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,856,509 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,126,299 ready_for_fw is high
4,126,759 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,106,751 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
191,567 UART:
191,941 UART: Running Caliptra ROM ...
193,197 UART:
193,357 UART: [state] CFI Enabled
265,339 UART: [state] LifecycleState = Production
267,090 UART: [state] DebugLocked = Yes
268,391 UART: [state] Starting the WD Timer 40000000 cycles
272,917 UART: [kat] SHA2-256
452,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,587 UART: [kat] ++
464,040 UART: [kat] sha1
476,575 UART: [kat] SHA2-256
479,592 UART: [kat] SHA2-384
486,113 UART: [kat] SHA2-512-ACC
489,023 UART: [kat] ECC-384
2,951,724 UART: [kat] HMAC-384Kdf
2,972,716 UART: [kat] LMS
3,502,143 UART: [kat] --
3,506,471 UART: [cold-reset] ++
3,508,984 UART: [fht] FHT @ 0x50003400
3,519,896 UART: [idev] ++
3,520,468 UART: [idev] CDI.KEYID = 6
3,521,379 UART: [idev] SUBJECT.KEYID = 7
3,522,555 UART: [idev] UDS.KEYID = 0
3,523,698 ready_for_fw is high
3,523,909 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,667,788 UART: [idev] Erasing UDS.KEYID = 0
6,029,029 UART: [idev] Sha1 KeyId Algorithm
6,052,910 UART: [idev] --
6,056,378 UART: [ldev] ++
6,056,955 UART: [ldev] CDI.KEYID = 6
6,057,846 UART: [ldev] SUBJECT.KEYID = 5
6,059,072 UART: [ldev] AUTHORITY.KEYID = 7
6,060,232 UART: [ldev] FE.KEYID = 1
6,104,255 UART: [ldev] Erasing FE.KEYID = 1
8,609,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,202 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,360,185 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,376,049 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,999 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,412,774 UART: [ldev] --
10,417,894 UART: [fwproc] Wait for Commands...
10,419,564 UART: [fwproc] Recv command 0x46574c44
10,421,607 UART: [fwproc] Recv'd Img size: 114360 bytes
13,861,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,999,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,318,384 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
191,645 UART:
192,021 UART: Running Caliptra ROM ...
193,218 UART:
193,395 UART: [state] CFI Enabled
269,680 UART: [state] LifecycleState = Production
271,911 UART: [state] DebugLocked = Yes
274,831 UART: [state] Starting the WD Timer 40000000 cycles
279,654 UART: [kat] SHA2-256
469,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
480,305 UART: [kat] ++
480,795 UART: [kat] sha1
492,153 UART: [kat] SHA2-256
495,137 UART: [kat] SHA2-384
499,720 UART: [kat] SHA2-512-ACC
502,314 UART: [kat] ECC-384
2,950,096 UART: [kat] HMAC-384Kdf
2,973,853 UART: [kat] LMS
3,505,594 UART: [kat] --
3,510,941 UART: [cold-reset] ++
3,512,685 UART: [fht] FHT @ 0x50003400
3,523,245 UART: [idev] ++
3,523,965 UART: [idev] CDI.KEYID = 6
3,525,186 UART: [idev] SUBJECT.KEYID = 7
3,526,332 UART: [idev] UDS.KEYID = 0
3,527,273 ready_for_fw is high
3,527,475 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,671,212 UART: [idev] Erasing UDS.KEYID = 0
6,031,520 UART: [idev] Sha1 KeyId Algorithm
6,053,908 UART: [idev] --
6,059,045 UART: [ldev] ++
6,059,728 UART: [ldev] CDI.KEYID = 6
6,060,640 UART: [ldev] SUBJECT.KEYID = 5
6,061,806 UART: [ldev] AUTHORITY.KEYID = 7
6,063,040 UART: [ldev] FE.KEYID = 1
6,102,703 UART: [ldev] Erasing FE.KEYID = 1
8,605,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,006 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,235 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,314 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,320 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,495 UART: [ldev] --
10,415,125 UART: [fwproc] Wait for Commands...
10,416,528 UART: [fwproc] Recv command 0x46574c44
10,418,519 UART: [fwproc] Recv'd Img size: 114360 bytes
13,901,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,098,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,640,463 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,436,823 ready_for_fw is high
3,437,221 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,749,234 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
191,848 UART:
192,213 UART: Running Caliptra ROM ...
193,395 UART:
603,161 UART: [state] CFI Enabled
618,250 UART: [state] LifecycleState = Production
620,467 UART: [state] DebugLocked = Yes
622,384 UART: [state] Starting the WD Timer 40000000 cycles
626,922 UART: [kat] SHA2-256
816,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,650 UART: [kat] ++
828,169 UART: [kat] sha1
840,156 UART: [kat] SHA2-256
843,172 UART: [kat] SHA2-384
849,451 UART: [kat] SHA2-512-ACC
852,022 UART: [kat] ECC-384
3,296,115 UART: [kat] HMAC-384Kdf
3,309,282 UART: [kat] LMS
3,841,050 UART: [kat] --
3,847,674 UART: [cold-reset] ++
3,849,259 UART: [fht] FHT @ 0x50003400
3,860,235 UART: [idev] ++
3,860,871 UART: [idev] CDI.KEYID = 6
3,861,861 UART: [idev] SUBJECT.KEYID = 7
3,863,037 UART: [idev] UDS.KEYID = 0
3,863,967 ready_for_fw is high
3,864,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,007,808 UART: [idev] Erasing UDS.KEYID = 0
6,334,863 UART: [idev] Sha1 KeyId Algorithm
6,358,921 UART: [idev] --
6,364,538 UART: [ldev] ++
6,365,218 UART: [ldev] CDI.KEYID = 6
6,366,131 UART: [ldev] SUBJECT.KEYID = 5
6,367,292 UART: [ldev] AUTHORITY.KEYID = 7
6,368,522 UART: [ldev] FE.KEYID = 1
6,379,352 UART: [ldev] Erasing FE.KEYID = 1
8,858,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,374 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,593,565 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,608,650 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,623,644 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,643,594 UART: [ldev] --
10,649,243 UART: [fwproc] Wait for Commands...
10,652,268 UART: [fwproc] Recv command 0x46574c44
10,654,277 UART: [fwproc] Recv'd Img size: 114360 bytes
14,130,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,207,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,323,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,866,983 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,758,234 ready_for_fw is high
3,758,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
15,005,981 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,433 UART: [state] LifecycleState = Production
85,041 UART: [state] DebugLocked = Yes
85,655 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,397 UART: [kat] SHA2-256
881,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,443 UART: [kat] ++
885,595 UART: [kat] sha1
889,727 UART: [kat] SHA2-256
891,665 UART: [kat] SHA2-384
894,418 UART: [kat] SHA2-512-ACC
896,319 UART: [kat] ECC-384
901,646 UART: [kat] HMAC-384Kdf
906,194 UART: [kat] LMS
1,474,390 UART: [kat] --
1,475,289 UART: [cold-reset] ++
1,475,628 UART: [fht] Storing FHT @ 0x50003400
1,478,467 UART: [idev] ++
1,478,635 UART: [idev] CDI.KEYID = 6
1,478,995 UART: [idev] SUBJECT.KEYID = 7
1,479,419 UART: [idev] UDS.KEYID = 0
1,479,764 ready_for_fw is high
1,479,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,612 UART: [idev] Erasing UDS.KEYID = 0
1,504,349 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,828 UART: [idev] --
1,513,773 UART: [ldev] ++
1,513,941 UART: [ldev] CDI.KEYID = 6
1,514,304 UART: [ldev] SUBJECT.KEYID = 5
1,514,730 UART: [ldev] AUTHORITY.KEYID = 7
1,515,193 UART: [ldev] FE.KEYID = 1
1,520,353 UART: [ldev] Erasing FE.KEYID = 1
1,545,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,765 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,564,459 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,331 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,037 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,069 UART: [ldev] --
1,584,366 UART: [fwproc] Waiting for Commands...
1,585,011 UART: [fwproc] Received command 0x46574c44
1,585,802 UART: [fwproc] Received Image of size 114360 bytes
2,908,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,935,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,964,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,100,701 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,126 ready_for_fw is high
1,363,126 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,953,811 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Production
86,006 UART: [state] DebugLocked = Yes
86,668 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,296 UART: [kat] SHA2-256
882,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,342 UART: [kat] ++
886,494 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
903,029 UART: [kat] HMAC-384Kdf
907,573 UART: [kat] LMS
1,475,769 UART: [kat] --
1,476,766 UART: [cold-reset] ++
1,477,201 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 ready_for_fw is high
1,481,213 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,875 UART: [idev] Erasing UDS.KEYID = 0
1,505,632 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,357 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,316 UART: [ldev] Erasing FE.KEYID = 1
1,547,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,126 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,820 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,692 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,398 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,396 UART: [ldev] --
1,586,779 UART: [fwproc] Waiting for Commands...
1,587,588 UART: [fwproc] Received command 0x46574c44
1,588,379 UART: [fwproc] Received Image of size 114360 bytes
2,912,551 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,939,760 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,969,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,104,906 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,205 ready_for_fw is high
1,363,205 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,951,614 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Production
85,971 UART: [state] DebugLocked = Yes
86,587 UART: [state] Starting the WD Timer 40000000 cycles
88,274 UART: [kat] SHA2-256
893,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,049 UART: [kat] ++
898,201 UART: [kat] sha1
902,473 UART: [kat] SHA2-256
904,413 UART: [kat] SHA2-384
907,120 UART: [kat] SHA2-512-ACC
909,021 UART: [kat] ECC-384
918,748 UART: [kat] HMAC-384Kdf
923,530 UART: [kat] LMS
1,171,858 UART: [kat] --
1,173,043 UART: [cold-reset] ++
1,173,568 UART: [fht] FHT @ 0x50003400
1,176,087 UART: [idev] ++
1,176,255 UART: [idev] CDI.KEYID = 6
1,176,615 UART: [idev] SUBJECT.KEYID = 7
1,177,039 UART: [idev] UDS.KEYID = 0
1,177,384 ready_for_fw is high
1,177,384 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,185,024 UART: [idev] Erasing UDS.KEYID = 0
1,202,134 UART: [idev] Sha1 KeyId Algorithm
1,210,611 UART: [idev] --
1,211,497 UART: [ldev] ++
1,211,665 UART: [ldev] CDI.KEYID = 6
1,212,028 UART: [ldev] SUBJECT.KEYID = 5
1,212,454 UART: [ldev] AUTHORITY.KEYID = 7
1,212,917 UART: [ldev] FE.KEYID = 1
1,218,501 UART: [ldev] Erasing FE.KEYID = 1
1,244,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,747 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,441 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,313 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,019 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,172 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,205 UART: [fwproc] Recv command 0x46574c44
1,284,933 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,664,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,799,956 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,080 ready_for_fw is high
1,061,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,651,933 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Production
85,790 UART: [state] DebugLocked = Yes
86,314 UART: [state] Starting the WD Timer 40000000 cycles
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,260 UART: [kat] SHA2-256
904,200 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
918,963 UART: [kat] HMAC-384Kdf
923,507 UART: [kat] LMS
1,171,835 UART: [kat] --
1,172,726 UART: [cold-reset] ++
1,173,089 UART: [fht] FHT @ 0x50003400
1,175,616 UART: [idev] ++
1,175,784 UART: [idev] CDI.KEYID = 6
1,176,144 UART: [idev] SUBJECT.KEYID = 7
1,176,568 UART: [idev] UDS.KEYID = 0
1,176,913 ready_for_fw is high
1,176,913 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,361 UART: [idev] Erasing UDS.KEYID = 0
1,201,969 UART: [idev] Sha1 KeyId Algorithm
1,210,488 UART: [idev] --
1,211,650 UART: [ldev] ++
1,211,818 UART: [ldev] CDI.KEYID = 6
1,212,181 UART: [ldev] SUBJECT.KEYID = 5
1,212,607 UART: [ldev] AUTHORITY.KEYID = 7
1,213,070 UART: [ldev] FE.KEYID = 1
1,218,146 UART: [ldev] Erasing FE.KEYID = 1
1,244,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,250 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,944 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,816 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,522 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,465 UART: [ldev] --
1,283,806 UART: [fwproc] Wait for Commands...
1,284,444 UART: [fwproc] Recv command 0x46574c44
1,285,172 UART: [fwproc] Recv'd Img size: 114360 bytes
2,609,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,666,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,801,783 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,651,646 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,789 UART: [state] LifecycleState = Production
85,397 UART: [state] DebugLocked = Yes
85,993 UART: [state] Starting the WD Timer 40000000 cycles
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,392 UART: [kat] LMS
1,168,704 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,174,166 ready_for_fw is high
1,174,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,569 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,531 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,401 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,107 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,187 UART: [ldev] --
1,280,675 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 114360 bytes
2,603,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,795,640 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,461 ready_for_fw is high
1,056,461 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,530 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Production
86,222 UART: [state] DebugLocked = Yes
86,790 UART: [state] Starting the WD Timer 40000000 cycles
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,686 UART: [cold-reset] ++
1,171,229 UART: [fht] FHT @ 0x50003400
1,173,805 UART: [idev] ++
1,173,973 UART: [idev] CDI.KEYID = 6
1,174,334 UART: [idev] SUBJECT.KEYID = 7
1,174,759 UART: [idev] UDS.KEYID = 0
1,175,105 ready_for_fw is high
1,175,105 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,999 UART: [idev] Sha1 KeyId Algorithm
1,209,862 UART: [idev] --
1,210,863 UART: [ldev] ++
1,211,031 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,667 UART: [ldev] Erasing FE.KEYID = 1
1,244,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,780 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,474 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,344 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,050 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,004 UART: [ldev] --
1,283,284 UART: [fwproc] Wait for Commands...
1,283,875 UART: [fwproc] Recv command 0x46574c44
1,284,608 UART: [fwproc] Recv'd Img size: 114360 bytes
2,607,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,799,545 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,078 ready_for_fw is high
1,057,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,649,117 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
7,080,192 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
7,090,060 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
7,391,131 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
7,396,319 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
5,653,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
5,673,242 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
5,649,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
6,008,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,089 writing to cptra_bootfsm_go
5,987,894 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,453 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,828 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,336 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,569 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,881 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,592 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,669 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,478 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,346 UART:
192,719 UART: Running Caliptra ROM ...
193,889 UART:
194,042 UART: [state] CFI Enabled
263,776 UART: [state] LifecycleState = Unprovisioned
266,156 UART: [state] DebugLocked = No
268,989 UART: [state] WD Timer not started. Device not locked for debugging
273,080 UART: [kat] SHA2-256
455,026 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,164 UART: ROM integrity test failed
467,413 UART: ROM Fatal Error: 0x90080001
2,716,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,860,498 >>> mbox cmd response: failed
2,861,046 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,004,280 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,161 UART:
192,547 UART: Running Caliptra ROM ...
193,700 UART:
193,857 UART: [state] CFI Enabled
261,445 UART: [state] LifecycleState = Unprovisioned
263,824 UART: [state] DebugLocked = No
265,905 UART: [state] WD Timer not started. Device not locked for debugging
270,426 UART: [kat] SHA2-256
452,379 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,563 UART: ROM integrity test failed
464,811 UART: ROM Fatal Error: 0x90080001
2,716,492 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,860,597 >>> mbox cmd response: failed
2,861,154 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,004,375 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,480 UART:
192,841 UART: Running Caliptra ROM ...
194,005 UART:
603,404 UART: [state] CFI Enabled
612,469 UART: [state] LifecycleState = Unprovisioned
614,823 UART: [state] DebugLocked = No
616,033 UART: [state] WD Timer not started. Device not locked for debugging
619,789 UART: [kat] SHA2-256
801,775 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
812,958 UART: ROM integrity test failed
814,192 UART: ROM Fatal Error: 0x90080001
3,065,088 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,209,373 >>> mbox cmd response: failed
3,209,938 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,353,162 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,540 writing to cptra_bootfsm_go
192,679 UART:
193,074 UART: Running Caliptra ROM ...
194,190 UART:
603,769 UART: [state] CFI Enabled
616,840 UART: [state] LifecycleState = Unprovisioned
619,206 UART: [state] DebugLocked = No
621,229 UART: [state] WD Timer not started. Device not locked for debugging
625,539 UART: [kat] SHA2-256
807,546 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,750 UART: ROM integrity test failed
820,010 UART: ROM Fatal Error: 0x90080001
3,072,510 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,216,576 >>> mbox cmd response: failed
3,217,145 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,360,370 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,731 writing to cptra_bootfsm_go
193,982 UART:
194,347 UART: Running Caliptra ROM ...
195,519 UART:
195,672 UART: [state] CFI Enabled
267,233 UART: [state] LifecycleState = Unprovisioned
269,124 UART: [state] DebugLocked = No
271,316 UART: [state] WD Timer not started. Device not locked for debugging
274,696 UART: [kat] SHA2-256
453,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,871 UART: ROM integrity test failed
466,073 UART: ROM Fatal Error: 0x90080001
2,708,737 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,853,256 >>> mbox cmd response: failed
2,853,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,997,425 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,258 UART:
192,612 UART: Running Caliptra ROM ...
193,779 UART:
193,933 UART: [state] CFI Enabled
262,269 UART: [state] LifecycleState = Unprovisioned
264,153 UART: [state] DebugLocked = No
266,558 UART: [state] WD Timer not started. Device not locked for debugging
269,869 UART: [kat] SHA2-256
448,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,002 UART: ROM integrity test failed
461,261 UART: ROM Fatal Error: 0x90080001
2,714,835 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,859,164 >>> mbox cmd response: failed
2,859,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,003,642 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,268 UART:
192,620 UART: Running Caliptra ROM ...
193,782 UART:
193,935 UART: [state] CFI Enabled
261,755 UART: [state] LifecycleState = Unprovisioned
263,644 UART: [state] DebugLocked = No
265,637 UART: [state] WD Timer not started. Device not locked for debugging
269,172 UART: [kat] SHA2-256
448,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,339 UART: ROM integrity test failed
460,546 UART: ROM Fatal Error: 0x90080001
2,711,289 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,855,737 >>> mbox cmd response: failed
2,856,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,999,947 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,648 UART:
193,083 UART: Running Caliptra ROM ...
194,202 UART:
603,758 UART: [state] CFI Enabled
616,396 UART: [state] LifecycleState = Unprovisioned
618,260 UART: [state] DebugLocked = No
619,582 UART: [state] WD Timer not started. Device not locked for debugging
622,737 UART: [kat] SHA2-256
801,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,860 UART: ROM integrity test failed
814,139 UART: ROM Fatal Error: 0x90080001
3,072,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,217,790 >>> mbox cmd response: failed
3,218,381 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,362,018 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,748 UART:
193,117 UART: Running Caliptra ROM ...
194,226 UART:
603,676 UART: [state] CFI Enabled
618,183 UART: [state] LifecycleState = Unprovisioned
620,039 UART: [state] DebugLocked = No
621,583 UART: [state] WD Timer not started. Device not locked for debugging
624,989 UART: [kat] SHA2-256
804,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,140 UART: ROM integrity test failed
816,394 UART: ROM Fatal Error: 0x90080001
3,067,037 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,211,573 >>> mbox cmd response: failed
3,212,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,355,763 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: ROM integrity test failed
895,480 UART: ROM Fatal Error: 0x90080001
897,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,101 >>> mbox cmd response: failed
897,101 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,107 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: ROM integrity test failed
895,882 UART: ROM Fatal Error: 0x90080001
897,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,503 >>> mbox cmd response: failed
897,503 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,509 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,336 UART: ROM integrity test failed
895,783 UART: ROM Fatal Error: 0x90080001
897,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,404 >>> mbox cmd response: failed
897,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,410 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: ROM integrity test failed
895,911 UART: ROM Fatal Error: 0x90080001
897,526 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,532 >>> mbox cmd response: failed
897,532 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,538 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: ROM integrity test failed
895,638 UART: ROM Fatal Error: 0x90080001
897,253 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,259 >>> mbox cmd response: failed
897,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,265 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: ROM integrity test failed
895,644 UART: ROM Fatal Error: 0x90080001
897,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,265 >>> mbox cmd response: failed
897,265 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,271 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,018 UART: ROM integrity test failed
895,465 UART: ROM Fatal Error: 0x90080001
897,080 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,086 >>> mbox cmd response: failed
897,086 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,092 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,174 UART: [state] WD Timer not started. Device not locked for debugging
87,363 UART: [kat] SHA2-256
890,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,884 UART: ROM integrity test failed
895,331 UART: ROM Fatal Error: 0x90080001
896,946 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
896,952 >>> mbox cmd response: failed
896,952 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
896,958 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: ROM integrity test failed
895,802 UART: ROM Fatal Error: 0x90080001
897,417 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,423 >>> mbox cmd response: failed
897,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,429 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: ROM integrity test failed
895,914 UART: ROM Fatal Error: 0x90080001
897,529 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,535 >>> mbox cmd response: failed
897,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
897,541 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,437 UART: [kat] SHA2-256
891,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: ROM integrity test failed
896,405 UART: ROM Fatal Error: 0x90080001
898,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
898,026 >>> mbox cmd response: failed
898,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
898,032 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "44b5adceed7cb3e544aa532343c679dab30233a8ebcab15f9d02de4c06d59261f7a88da0b602f49c95891747995783ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,373 UART: [kat] SHA2-256
890,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,894 UART: ROM integrity test failed
895,341 UART: ROM Fatal Error: 0x90080001
896,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
896,962 >>> mbox cmd response: failed
896,962 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
896,968 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,700,655 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,844,739 >>> mbox cmd response: failed
2,845,300 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,988,522 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
4,874,392 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,452,175 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,710,396 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,854,498 >>> mbox cmd response: failed
2,855,074 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,998,157 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
4,869,181 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,417,001 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,048,619 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,192,669 >>> mbox cmd response: failed
3,193,244 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,336,434 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,572,090 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,017,783 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,054,671 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,198,585 >>> mbox cmd response: failed
3,199,128 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,342,347 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
21,576,352 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,016,010 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,709,659 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,854,171 >>> mbox cmd response: failed
2,854,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,998,379 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,424,508 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,267,445 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,711,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,856,341 >>> mbox cmd response: failed
2,856,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,000,599 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
3,445,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,258,882 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,706,013 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,850,564 >>> mbox cmd response: failed
2,851,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,994,795 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,466,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,251,170 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,601 writing to cptra_bootfsm_go
3,065,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,210,435 >>> mbox cmd response: failed
3,211,032 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,354,692 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,174,250 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,902,430 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,060,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,204,863 >>> mbox cmd response: failed
3,205,437 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,349,030 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,184,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,921,568 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,650 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,658 >>> mbox cmd response: failed
814,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,014 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,708 >>> mbox cmd response: failed
814,708 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,394 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,641 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,649 >>> mbox cmd response: failed
814,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,377 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,431 >>> mbox cmd response: failed
814,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,872 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,047 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,194 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
815,202 >>> mbox cmd response: failed
815,202 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
815,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,607 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,264 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,636 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,644 >>> mbox cmd response: failed
814,644 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,447 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,994 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,337 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
815,345 >>> mbox cmd response: failed
815,345 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
815,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,812 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,417 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,713 >>> mbox cmd response: failed
814,713 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,556 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,587 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,292 >>> mbox cmd response: failed
814,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,510 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,042 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,050 >>> mbox cmd response: failed
814,050 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,690 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,899 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,907 >>> mbox cmd response: failed
814,907 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
814,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,161 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
815,103 >>> mbox cmd response: failed
815,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
815,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,689 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,126 UART:
192,491 UART: Running Caliptra ROM ...
193,589 UART:
193,730 UART: [state] CFI Enabled
263,028 UART: [state] LifecycleState = Unprovisioned
264,953 UART: [state] DebugLocked = No
266,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,425 UART: [kat] SHA2-256
440,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,590 UART: [kat] ++
451,041 UART: [kat] sha1
463,642 UART: [kat] SHA2-256
466,306 UART: [kat] SHA2-384
472,095 UART: [kat] SHA2-512-ACC
474,469 UART: [kat] ECC-384
2,769,542 UART: [kat] HMAC-384Kdf
2,791,946 UART: [kat] LMS
3,982,232 UART: [kat] --
3,986,889 UART: [cold-reset] ++
3,987,835 UART: [fht] Storing FHT @ 0x50003400
3,998,256 UART: [idev] ++
3,998,823 UART: [idev] CDI.KEYID = 6
3,999,862 UART: [idev] SUBJECT.KEYID = 7
4,001,043 UART: [idev] UDS.KEYID = 0
4,002,037 ready_for_fw is high
4,002,245 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,146,796 UART: [idev] Erasing UDS.KEYID = 0
7,339,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,148 UART: [idev] --
7,363,230 UART: [ldev] ++
7,363,802 UART: [ldev] CDI.KEYID = 6
7,364,770 UART: [ldev] SUBJECT.KEYID = 5
7,365,991 UART: [ldev] AUTHORITY.KEYID = 7
7,367,228 UART: [ldev] FE.KEYID = 1
7,394,140 UART: [ldev] Erasing FE.KEYID = 1
10,725,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,020,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,035,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,050,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,064,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,083,089 UART: [ldev] --
13,087,671 UART: [fwproc] Waiting for Commands...
13,090,522 UART: [fwproc] Received command 0x46574c44
13,092,743 UART: [fwproc] Received Image of size 114916 bytes
17,149,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,619,916 >>> mbox cmd response: success
17,624,695 UART: [afmc] ++
17,625,283 UART: [afmc] CDI.KEYID = 6
17,626,251 UART: [afmc] SUBJECT.KEYID = 7
17,627,467 UART: [afmc] AUTHORITY.KEYID = 5
21,001,096 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,490 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,800 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,191 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,040 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,481 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,720 UART: [afmc] --
23,371,792 UART: [cold-reset] --
23,376,035 UART: [state] Locking Datavault
23,383,880 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,580 UART: [state] Locking ICCM
23,386,813 UART: [exit] Launching FMC @ 0x40000130
23,395,207 UART:
23,395,444 UART: Running Caliptra FMC ...
23,396,546 UART:
23,396,702 UART: [state] CFI Enabled
23,463,009 UART: [fht] FMC Alias Private Key: 7
25,800,926 UART: [art] Extend RT PCRs Done
25,802,152 UART: [art] Lock RT PCRs Done
25,804,157 UART: [art] Populate DV Done
25,809,417 UART: [fht] FMC Alias Private Key: 7
25,810,998 UART: [art] Derive CDI
25,811,823 UART: [art] Store in in slot 0x4
25,874,027 UART: [art] Derive Key Pair
25,875,033 UART: [art] Store priv key in slot 0x5
29,168,181 UART: [art] Derive Key Pair - Done
29,181,434 UART: [art] Signing Cert with AUTHO
29,182,743 UART: RITY.KEYID = 7
31,470,598 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,109 UART: [art] PUB.X = 202DD803E80301B67662346B3956547EBDF271573546959F4CA7987D3B31C48AB106740685B44697A6A799F1FADAA5DC
31,479,311 UART: [art] PUB.Y = 1D7BAD543D059DC58F2AD4A089F05AD938D8448FD67DE2BB41BF172A30E6A2AF021814F0ECB37A0ED96030838AE464C0
31,486,551 UART: [art] SIG.R = BC3990729F9B59043B23C9F2B7A900C22827786EECF4588CF76B4693335F40BBB39C4F1E1ABB97FFF5207E5C69AB25B0
31,493,990 UART: [art] SIG.S = 18502381404CE01C3C1D7B0BC403AE937D6A0B178DE0B24C8BD44C26B46184404DB9694A6573483CD90A79018E2F3C52
32,799,351 UART: Caliptra RT
32,800,079 UART: [state] CFI Enabled
32,979,530 UART: [rt] RT listening for mailbox commands...
32,981,388 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,011,023 UART: [rt]cmd =0x46504c54, len=4
33,012,634 >>> mbox cmd response data (8 bytes)
33,013,744 UART: [rt] FIPS self test
33,014,701 UART: [kat] ++
33,015,156 UART: [kat] sha1
33,019,628 UART: [kat] SHA2-256
33,021,562 UART: [kat] SHA2-384
33,024,522 UART: [kat] SHA2-512-ACC
33,026,824 UART: [kat] ECC-384
33,028,669 UART: Fatal Error: 0x90040004
33,063,879 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,208,207 >>> mbox cmd response: failed
33,208,884 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,353,159 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,001 UART:
190,304 UART: Running Caliptra ROM ...
191,436 UART:
191,588 UART: [state] CFI Enabled
247,817 UART: [state] LifecycleState = Unprovisioned
249,742 UART: [state] DebugLocked = No
251,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,498 UART: [kat] SHA2-256
426,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
436,679 UART: [kat] ++
437,212 UART: [kat] sha1
448,094 UART: [kat] SHA2-256
450,785 UART: [kat] SHA2-384
456,433 UART: [kat] SHA2-512-ACC
458,756 UART: [kat] ECC-384
2,752,042 UART: [kat] HMAC-384Kdf
2,783,019 UART: [kat] LMS
3,973,360 UART: [kat] --
3,976,927 UART: [cold-reset] ++
3,979,138 UART: [fht] Storing FHT @ 0x50003400
3,989,654 UART: [idev] ++
3,990,224 UART: [idev] CDI.KEYID = 6
3,991,245 UART: [idev] SUBJECT.KEYID = 7
3,992,406 UART: [idev] UDS.KEYID = 0
3,994,039 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,138,807 UART: [idev] Erasing UDS.KEYID = 0
7,328,765 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,749 UART: [idev] --
7,353,538 UART: [ldev] ++
7,354,126 UART: [ldev] CDI.KEYID = 6
7,355,062 UART: [ldev] SUBJECT.KEYID = 5
7,356,197 UART: [ldev] AUTHORITY.KEYID = 7
7,357,532 UART: [ldev] FE.KEYID = 1
7,404,077 UART: [ldev] Erasing FE.KEYID = 1
10,737,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,304 UART: [ldev] --
13,118,334 UART: [fwproc] Waiting for Commands...
13,120,325 UART: [fwproc] Received command 0x46574c44
13,122,510 UART: [fwproc] Received Image of size 114916 bytes
17,182,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,020 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,649,072 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,783,860 ready_for_fw is high
3,784,523 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,890,990 >>> mbox cmd response: success
23,579,270 UART:
23,579,769 UART: Running Caliptra FMC ...
23,580,904 UART:
23,581,068 UART: [state] CFI Enabled
23,650,960 UART: [fht] FMC Alias Private Key: 7
25,988,985 UART: [art] Extend RT PCRs Done
25,990,224 UART: [art] Lock RT PCRs Done
25,991,888 UART: [art] Populate DV Done
25,997,114 UART: [fht] FMC Alias Private Key: 7
25,998,664 UART: [art] Derive CDI
25,999,432 UART: [art] Store in in slot 0x4
26,060,102 UART: [art] Derive Key Pair
26,061,152 UART: [art] Store priv key in slot 0x5
29,353,808 UART: [art] Derive Key Pair - Done
29,366,546 UART: [art] Signing Cert with AUTHO
29,367,854 UART: RITY.KEYID = 7
31,655,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,652 UART: [art] PUB.X = 306299B6007B13B35F95457983BEB649BEB765D4705669AD4B6D9EB441B301567B697289A9313E0A24F20328CF5DF2AC
31,663,881 UART: [art] PUB.Y = 77F861A68E6047F8B66A366BCAD5F167E18AF7D82E069CAA08F7718DA374D9F58BE3FFD78FF801663896F5EC9F71B743
31,671,132 UART: [art] SIG.R = 51196E698DAA779CF1AFC05EEB4DD7F5D769AD33D020657D297F63D3FBBB5CB8AEA13ACCCBC2567EA755E2AF323E54D2
31,678,585 UART: [art] SIG.S = 6658B3465ECEAAD590005D5480B8B141BCDF9FF1334856F700FBF205D4225BB0C3155650D3461C87779832B793A66248
32,983,732 UART: Caliptra RT
32,984,444 UART: [state] CFI Enabled
33,144,096 UART: [rt] RT listening for mailbox commands...
33,145,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,175,639 UART: [rt]cmd =0x46504c54, len=4
33,177,036 >>> mbox cmd response data (8 bytes)
33,178,228 UART: [rt] FIPS self test
33,179,173 UART: [kat] ++
33,179,626 UART: [kat] sha1
33,184,139 UART: [kat] SHA2-256
33,186,070 UART: [kat] SHA2-384
33,189,201 UART: [kat] SHA2-512-ACC
33,191,458 UART: [kat] ECC-384
33,193,198 UART: Fatal Error: 0x90040004
33,228,410 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,373,153 >>> mbox cmd response: failed
33,373,843 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,518,105 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,770,388 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,874,944 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,489 UART:
192,854 UART: Running Caliptra ROM ...
194,047 UART:
603,944 UART: [state] CFI Enabled
616,406 UART: [state] LifecycleState = Unprovisioned
618,282 UART: [state] DebugLocked = No
620,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,742 UART: [kat] SHA2-256
795,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,079 UART: [kat] ++
806,531 UART: [kat] sha1
817,194 UART: [kat] SHA2-256
819,918 UART: [kat] SHA2-384
825,413 UART: [kat] SHA2-512-ACC
827,783 UART: [kat] ECC-384
3,112,863 UART: [kat] HMAC-384Kdf
3,124,383 UART: [kat] LMS
4,314,509 UART: [kat] --
4,319,443 UART: [cold-reset] ++
4,321,661 UART: [fht] Storing FHT @ 0x50003400
4,333,851 UART: [idev] ++
4,334,416 UART: [idev] CDI.KEYID = 6
4,335,371 UART: [idev] SUBJECT.KEYID = 7
4,336,617 UART: [idev] UDS.KEYID = 0
4,337,597 ready_for_fw is high
4,337,798 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,482,132 UART: [idev] Erasing UDS.KEYID = 0
7,622,009 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,491 UART: [idev] --
7,647,852 UART: [ldev] ++
7,648,424 UART: [ldev] CDI.KEYID = 6
7,649,367 UART: [ldev] SUBJECT.KEYID = 5
7,650,580 UART: [ldev] AUTHORITY.KEYID = 7
7,651,867 UART: [ldev] FE.KEYID = 1
7,662,761 UART: [ldev] Erasing FE.KEYID = 1
10,950,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,561 UART: [ldev] --
13,312,589 UART: [fwproc] Waiting for Commands...
13,314,257 UART: [fwproc] Received command 0x46574c44
13,316,449 UART: [fwproc] Received Image of size 114916 bytes
17,373,551 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,851 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,837,257 >>> mbox cmd response: success
17,842,167 UART: [afmc] ++
17,842,754 UART: [afmc] CDI.KEYID = 6
17,843,665 UART: [afmc] SUBJECT.KEYID = 7
17,844,938 UART: [afmc] AUTHORITY.KEYID = 5
21,159,090 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,305 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,681 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,501 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,976 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,606 UART: [afmc] --
23,526,641 UART: [cold-reset] --
23,532,610 UART: [state] Locking Datavault
23,538,403 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,158 UART: [state] Locking ICCM
23,541,203 UART: [exit] Launching FMC @ 0x40000130
23,549,597 UART:
23,549,833 UART: Running Caliptra FMC ...
23,550,861 UART:
23,551,008 UART: [state] CFI Enabled
23,558,797 UART: [fht] FMC Alias Private Key: 7
25,889,699 UART: [art] Extend RT PCRs Done
25,890,930 UART: [art] Lock RT PCRs Done
25,892,587 UART: [art] Populate DV Done
25,898,126 UART: [fht] FMC Alias Private Key: 7
25,899,722 UART: [art] Derive CDI
25,900,460 UART: [art] Store in in slot 0x4
25,943,108 UART: [art] Derive Key Pair
25,944,145 UART: [art] Store priv key in slot 0x5
29,185,756 UART: [art] Derive Key Pair - Done
29,198,700 UART: [art] Signing Cert with AUTHO
29,200,042 UART: RITY.KEYID = 7
31,479,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,986 UART: [art] PUB.X = 7918FDA8C939C745A90212552CC0B665E98D14C997F3F6791C4336CD129A47B6A85C1AAF73F9402ADAC8683B8D021602
31,488,191 UART: [art] PUB.Y = 40BFAB60EC79228D3CD19FA1D40C8890F1E1016F065D587824B957769CC592B8740A280525D5A8013EA2A65397A89EB4
31,495,437 UART: [art] SIG.R = 7ED6ECB78BF0F5FF7AF78056DB3716D1E9EA51B63AB6ADE8330BBE772E31643C3E4E175DEBB47E45BB7B3CF3E81051DC
31,502,904 UART: [art] SIG.S = 618CF0FA8A86C2CD920F5CCCD0F38D3E21726DBD93D5635BD4D577A17F3BCABDE74259547FB19C3AF2BA3737D971ABED
32,808,028 UART: Caliptra RT
32,808,751 UART: [state] CFI Enabled
32,926,143 UART: [rt] RT listening for mailbox commands...
32,928,014 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,495 UART: [rt]cmd =0x46504c54, len=4
32,959,216 >>> mbox cmd response data (8 bytes)
32,960,255 UART: [rt] FIPS self test
32,961,200 UART: [kat] ++
32,961,652 UART: [kat] sha1
32,966,108 UART: [kat] SHA2-256
32,968,043 UART: [kat] SHA2-384
32,971,122 UART: [kat] SHA2-512-ACC
32,973,361 UART: [kat] ECC-384
32,975,525 UART: Fatal Error: 0x90040004
33,010,730 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,155,104 >>> mbox cmd response: failed
33,155,704 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,299,938 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
190,145 UART:
190,434 UART: Running Caliptra ROM ...
191,547 UART:
7,224,668 UART: [state] CFI Enabled
7,238,404 UART: [state] LifecycleState = Unprovisioned
7,240,321 UART: [state] DebugLocked = No
7,241,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,246,506 UART: [kat] SHA2-256
7,416,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,426,772 UART: [kat] ++
7,427,259 UART: [kat] sha1
7,437,880 UART: [kat] SHA2-256
7,440,575 UART: [kat] SHA2-384
7,446,512 UART: [kat] SHA2-512-ACC
7,448,860 UART: [kat] ECC-384
9,731,144 UART: [kat] HMAC-384Kdf
9,742,744 UART: [kat] LMS
10,932,889 UART: [kat] --
10,936,579 UART: [cold-reset] ++
10,939,110 UART: [fht] Storing FHT @ 0x50003400
10,951,291 UART: [idev] ++
10,951,861 UART: [idev] CDI.KEYID = 6
10,952,824 UART: [idev] SUBJECT.KEYID = 7
10,954,037 UART: [idev] UDS.KEYID = 0
10,955,621 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,099,916 UART: [idev] Erasing UDS.KEYID = 0
14,239,311 UART: [idev] Using Sha1 for KeyId Algorithm
14,262,107 UART: [idev] --
14,264,649 UART: [ldev] ++
14,265,227 UART: [ldev] CDI.KEYID = 6
14,266,189 UART: [ldev] SUBJECT.KEYID = 5
14,267,422 UART: [ldev] AUTHORITY.KEYID = 7
14,268,658 UART: [ldev] FE.KEYID = 1
14,279,948 UART: [ldev] Erasing FE.KEYID = 1
17,565,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,857,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,872,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,886,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,901,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,919,941 UART: [ldev] --
19,924,939 UART: [fwproc] Waiting for Commands...
19,926,821 UART: [fwproc] Received command 0x46574c44
19,929,015 UART: [fwproc] Received Image of size 114916 bytes
23,988,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,068,220 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,137,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,457,048 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,132,055 ready_for_fw is high
4,132,492 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,091,124 >>> mbox cmd response: success
23,734,348 UART:
23,734,743 UART: Running Caliptra FMC ...
23,735,852 UART:
23,736,008 UART: [state] CFI Enabled
23,743,861 UART: [fht] FMC Alias Private Key: 7
26,073,968 UART: [art] Extend RT PCRs Done
26,075,209 UART: [art] Lock RT PCRs Done
26,076,928 UART: [art] Populate DV Done
26,082,477 UART: [fht] FMC Alias Private Key: 7
26,083,975 UART: [art] Derive CDI
26,084,719 UART: [art] Store in in slot 0x4
26,127,601 UART: [art] Derive Key Pair
26,128,645 UART: [art] Store priv key in slot 0x5
29,370,578 UART: [art] Derive Key Pair - Done
29,383,399 UART: [art] Signing Cert with AUTHO
29,384,742 UART: RITY.KEYID = 7
31,664,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,570 UART: [art] PUB.X = B4144E1BDD5F515CE596A03C55FC4415A1753083D72B0E7E0D95D5F14623B52DA033C130B3FB3864492C75356DE97A71
31,672,768 UART: [art] PUB.Y = 1D36F5C80E4EDB664D49CFE1EDB038CDEDFBD6F9DE0D4BA83830AC795979E1CB64BADA03AB65E052ED8D5893759DD74A
31,680,055 UART: [art] SIG.R = 6704F650190DDE16ECB6EACE3A5BAAB4DF1EB580BF53448A63D92147AB34EF5A9E6C67D7E538DDC5B1BD97B4F22153DE
31,687,466 UART: [art] SIG.S = 7845A1A20CBDC9F42B1E3C3C3AA4ACA34F704386F9FD33A6B168737DE7658E1D82631BE22B7574BCDC9FA51DA5256A95
32,992,588 UART: Caliptra RT
32,993,300 UART: [state] CFI Enabled
33,111,763 UART: [rt] RT listening for mailbox commands...
33,113,640 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,143,281 UART: [rt]cmd =0x46504c54, len=4
33,144,948 >>> mbox cmd response data (8 bytes)
33,145,920 UART: [rt] FIPS self test
33,146,862 UART: [kat] ++
33,147,312 UART: [kat] sha1
33,151,553 UART: [kat] SHA2-256
33,153,437 UART: [kat] SHA2-384
33,156,472 UART: [kat] SHA2-512-ACC
33,158,725 UART: [kat] ECC-384
33,160,515 UART: Fatal Error: 0x90040004
33,195,720 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,340,090 >>> mbox cmd response: failed
33,340,756 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,485,002 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
10,579,499 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,534,980 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,239 UART:
192,624 UART: Running Caliptra ROM ...
193,826 UART:
193,980 UART: [state] CFI Enabled
261,181 UART: [state] LifecycleState = Unprovisioned
263,084 UART: [state] DebugLocked = No
265,903 UART: [state] WD Timer not started. Device not locked for debugging
269,596 UART: [kat] SHA2-256
448,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,333 UART: [kat] ++
460,894 UART: [kat] sha1
471,992 UART: [kat] SHA2-256
475,000 UART: [kat] SHA2-384
481,637 UART: [kat] SHA2-512-ACC
484,579 UART: [kat] ECC-384
2,948,340 UART: [kat] HMAC-384Kdf
2,972,331 UART: [kat] LMS
3,501,796 UART: [kat] --
3,506,719 UART: [cold-reset] ++
3,509,147 UART: [fht] FHT @ 0x50003400
3,521,627 UART: [idev] ++
3,522,190 UART: [idev] CDI.KEYID = 6
3,523,095 UART: [idev] SUBJECT.KEYID = 7
3,524,273 UART: [idev] UDS.KEYID = 0
3,525,326 ready_for_fw is high
3,525,542 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,670,530 UART: [idev] Erasing UDS.KEYID = 0
6,026,195 UART: [idev] Sha1 KeyId Algorithm
6,049,116 UART: [idev] --
6,053,061 UART: [ldev] ++
6,053,636 UART: [ldev] CDI.KEYID = 6
6,054,555 UART: [ldev] SUBJECT.KEYID = 5
6,055,717 UART: [ldev] AUTHORITY.KEYID = 7
6,056,953 UART: [ldev] FE.KEYID = 1
6,101,744 UART: [ldev] Erasing FE.KEYID = 1
8,602,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,445 UART: [ldev] --
10,395,222 UART: [fwproc] Wait for Commands...
10,398,043 UART: [fwproc] Recv command 0x46574c44
10,400,091 UART: [fwproc] Recv'd Img size: 115224 bytes
13,810,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,014 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,277,169 >>> mbox cmd response: success
14,281,588 UART: [afmc] ++
14,282,182 UART: [afmc] CDI.KEYID = 6
14,283,094 UART: [afmc] SUBJECT.KEYID = 7
14,284,258 UART: [afmc] AUTHORITY.KEYID = 5
16,808,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,058 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,023 UART: [afmc] --
18,610,255 UART: [cold-reset] --
18,615,625 UART: [state] Locking Datavault
18,621,897 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,548 UART: [state] Locking ICCM
18,625,536 UART: [exit] Launching FMC @ 0x40000130
18,633,988 UART:
18,634,223 UART: Running Caliptra FMC ...
18,635,325 UART:
18,635,483 UART: [state] CFI Enabled
18,691,514 UART: [fht] FMC Alias Private Key: 7
20,455,939 UART: [art] Extend RT PCRs Done
20,457,157 UART: [art] Lock RT PCRs Done
20,458,703 UART: [art] Populate DV Done
20,464,227 UART: [fht] FMC Alias Private Key: 7
20,465,869 UART: [art] Derive CDI
20,466,704 UART: [art] Store in in slot 0x4
20,523,484 UART: [art] Derive Key Pair
20,524,521 UART: [art] Store priv key in slot 0x5
22,987,514 UART: [art] Derive Key Pair - Done
23,000,410 UART: [art] Signing Cert with AUTHO
23,001,716 UART: RITY.KEYID = 7
24,713,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,933 UART: [art] PUB.X = FBB9B55B3DFDE12DBF88F95FCE17D6B55427D6F668011D59B0466EE527450B561A6753AFD86CBB21E0C1C881612C3F68
24,722,241 UART: [art] PUB.Y = 47EC028C458FADAEC79EDED1496E24009B2769F103983C319693519696837390CCDC2FA44E85D185E0E153F31BE87FDE
24,729,465 UART: [art] SIG.R = 168D37A1156C1D7AD7C7416F8C6B1E2A0DEDA506ED14DE2AC4E47594C94CD46130DB0BE1D3B3852E46B8F486D6404280
24,736,879 UART: [art] SIG.S = A5DF81BB8638C8AEC9B7B67C787B3DC19D9C81DBA3A4FD4B40009ABFA84DBF27403FFA60E8D94E37B8A8469E51E6838B
25,716,080 UART: Caliptra RT
25,716,801 UART: [state] CFI Enabled
25,881,104 UART: [rt] RT listening for mailbox commands...
25,882,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,912,769 UART: [rt]cmd =0x46504c54, len=4
25,914,424 >>> mbox cmd response data (8 bytes)
25,915,212 UART: [rt] FIPS self test
25,916,159 UART: [kat] ++
25,916,614 UART: [kat] sha1
25,921,179 UART: [kat] SHA2-256
25,923,109 UART: [kat] SHA2-384
25,925,829 UART: [kat] SHA2-512-ACC
25,928,096 UART: [kat] ECC-384
25,929,808 UART: Fatal Error: 0x90040004
25,965,020 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,109,748 >>> mbox cmd response: failed
26,110,395 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,255,034 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,002 UART:
190,313 UART: Running Caliptra ROM ...
191,341 UART:
191,481 UART: [state] CFI Enabled
250,562 UART: [state] LifecycleState = Unprovisioned
252,418 UART: [state] DebugLocked = No
254,038 UART: [state] WD Timer not started. Device not locked for debugging
257,225 UART: [kat] SHA2-256
436,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,953 UART: [kat] ++
448,397 UART: [kat] sha1
460,026 UART: [kat] SHA2-256
463,086 UART: [kat] SHA2-384
468,314 UART: [kat] SHA2-512-ACC
471,249 UART: [kat] ECC-384
2,931,053 UART: [kat] HMAC-384Kdf
2,955,543 UART: [kat] LMS
3,484,990 UART: [kat] --
3,490,819 UART: [cold-reset] ++
3,491,782 UART: [fht] FHT @ 0x50003400
3,502,702 UART: [idev] ++
3,503,273 UART: [idev] CDI.KEYID = 6
3,504,182 UART: [idev] SUBJECT.KEYID = 7
3,505,394 UART: [idev] UDS.KEYID = 0
3,506,903 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,651,852 UART: [idev] Erasing UDS.KEYID = 0
6,006,690 UART: [idev] Sha1 KeyId Algorithm
6,029,627 UART: [idev] --
6,033,141 UART: [ldev] ++
6,033,715 UART: [ldev] CDI.KEYID = 6
6,034,622 UART: [ldev] SUBJECT.KEYID = 5
6,035,784 UART: [ldev] AUTHORITY.KEYID = 7
6,037,019 UART: [ldev] FE.KEYID = 1
6,082,975 UART: [ldev] Erasing FE.KEYID = 1
8,585,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,858 UART: [ldev] --
10,396,185 UART: [fwproc] Wait for Commands...
10,399,262 UART: [fwproc] Recv command 0x46574c44
10,401,308 UART: [fwproc] Recv'd Img size: 115224 bytes
13,813,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,951,749 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,272,736 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,473 UART:
193,191 UART: Running Caliptra ROM ...
194,322 UART:
194,468 UART: [state] CFI Enabled
266,676 UART: [state] LifecycleState = Unprovisioned
269,101 UART: [state] DebugLocked = No
270,789 UART: [state] WD Timer not started. Device not locked for debugging
275,624 UART: [kat] SHA2-256
465,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,264 UART: [kat] ++
476,804 UART: [kat] sha1
486,904 UART: [kat] SHA2-256
489,909 UART: [kat] SHA2-384
495,978 UART: [kat] SHA2-512-ACC
498,585 UART: [kat] ECC-384
2,948,429 UART: [kat] HMAC-384Kdf
2,973,561 UART: [kat] LMS
3,505,303 UART: [kat] --
3,508,894 UART: [cold-reset] ++
3,510,478 UART: [fht] FHT @ 0x50003400
3,521,893 UART: [idev] ++
3,522,539 UART: [idev] CDI.KEYID = 6
3,523,575 UART: [idev] SUBJECT.KEYID = 7
3,524,678 UART: [idev] UDS.KEYID = 0
3,525,610 ready_for_fw is high
3,525,840 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,670,910 UART: [idev] Erasing UDS.KEYID = 0
6,030,747 UART: [idev] Sha1 KeyId Algorithm
6,053,486 UART: [idev] --
6,059,162 UART: [ldev] ++
6,059,864 UART: [ldev] CDI.KEYID = 6
6,060,751 UART: [ldev] SUBJECT.KEYID = 5
6,061,914 UART: [ldev] AUTHORITY.KEYID = 7
6,063,151 UART: [ldev] FE.KEYID = 1
6,104,056 UART: [ldev] Erasing FE.KEYID = 1
8,606,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,937 UART: [ldev] --
10,418,365 UART: [fwproc] Wait for Commands...
10,421,173 UART: [fwproc] Recv command 0x46574c44
10,423,489 UART: [fwproc] Recv'd Img size: 115224 bytes
13,884,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,251 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,629,550 >>> mbox cmd response: success
14,633,176 UART: [afmc] ++
14,633,925 UART: [afmc] CDI.KEYID = 6
14,635,071 UART: [afmc] SUBJECT.KEYID = 7
14,636,596 UART: [afmc] AUTHORITY.KEYID = 5
17,173,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,900,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,902,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,917,552 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,932,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,947,742 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,970,652 UART: [afmc] --
18,973,431 UART: [cold-reset] --
18,976,115 UART: [state] Locking Datavault
18,980,608 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,811 UART: [state] Locking ICCM
18,985,721 UART: [exit] Launching FMC @ 0x40000130
18,994,338 UART:
18,994,574 UART: Running Caliptra FMC ...
18,995,674 UART:
18,995,835 UART: [state] CFI Enabled
19,055,823 UART: [fht] FMC Alias Private Key: 7
20,819,717 UART: [art] Extend RT PCRs Done
20,820,936 UART: [art] Lock RT PCRs Done
20,822,461 UART: [art] Populate DV Done
20,827,656 UART: [fht] FMC Alias Private Key: 7
20,829,408 UART: [art] Derive CDI
20,830,233 UART: [art] Store in in slot 0x4
20,888,332 UART: [art] Derive Key Pair
20,889,378 UART: [art] Store priv key in slot 0x5
23,351,816 UART: [art] Derive Key Pair - Done
23,364,622 UART: [art] Signing Cert with AUTHO
23,365,932 UART: RITY.KEYID = 7
25,077,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,989 UART: [art] PUB.X = B7C78C2749CF8C6695A0C45300F7DFF7BC116A4EF9CF615E00E0FDF719B756810A4AE361694FA751FB99EB460E11815C
25,086,252 UART: [art] PUB.Y = F1CD891E779006B4408C1EE47959F7A4066A807CD37EA2C1177BC701D7805A6561D3EE288AAFBF2CEC9E9BF435EA1359
25,093,491 UART: [art] SIG.R = 0FB7366D35B62E22B32F0486EC29D4C792AC5E60EF0277D3B6F77EFEBF4FABFA8571AB74DD994698F2A6680E7D91FA07
25,100,897 UART: [art] SIG.S = 8FD18B5219BB5B7C93833BD02AEB599B67B6C9F3F46B010272429FF5981B336788907545C871A856D53B5E40A44707BF
26,079,651 UART: Caliptra RT
26,080,361 UART: [state] CFI Enabled
26,246,730 UART: [rt] RT listening for mailbox commands...
26,248,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,278,340 UART: [rt]cmd =0x46504c54, len=4
26,279,756 >>> mbox cmd response data (8 bytes)
26,280,767 UART: [rt] FIPS self test
26,281,708 UART: [kat] ++
26,282,156 UART: [kat] sha1
26,286,558 UART: [kat] SHA2-256
26,288,490 UART: [kat] SHA2-384
26,291,395 UART: [kat] SHA2-512-ACC
26,293,686 UART: [kat] ECC-384
26,295,582 UART: Fatal Error: 0x90040004
26,330,933 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,476,280 >>> mbox cmd response: failed
26,476,960 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,621,460 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,088 UART:
190,392 UART: Running Caliptra ROM ...
191,420 UART:
191,558 UART: [state] CFI Enabled
248,003 UART: [state] LifecycleState = Unprovisioned
250,384 UART: [state] DebugLocked = No
253,303 UART: [state] WD Timer not started. Device not locked for debugging
257,857 UART: [kat] SHA2-256
447,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,552 UART: [kat] ++
458,995 UART: [kat] sha1
470,847 UART: [kat] SHA2-256
473,857 UART: [kat] SHA2-384
480,972 UART: [kat] SHA2-512-ACC
483,546 UART: [kat] ECC-384
2,931,882 UART: [kat] HMAC-384Kdf
2,957,653 UART: [kat] LMS
3,489,444 UART: [kat] --
3,494,455 UART: [cold-reset] ++
3,496,664 UART: [fht] FHT @ 0x50003400
3,508,191 UART: [idev] ++
3,508,893 UART: [idev] CDI.KEYID = 6
3,509,784 UART: [idev] SUBJECT.KEYID = 7
3,511,059 UART: [idev] UDS.KEYID = 0
3,512,634 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,658,046 UART: [idev] Erasing UDS.KEYID = 0
6,016,005 UART: [idev] Sha1 KeyId Algorithm
6,038,197 UART: [idev] --
6,043,018 UART: [ldev] ++
6,043,706 UART: [ldev] CDI.KEYID = 6
6,044,592 UART: [ldev] SUBJECT.KEYID = 5
6,045,811 UART: [ldev] AUTHORITY.KEYID = 7
6,047,010 UART: [ldev] FE.KEYID = 1
6,086,107 UART: [ldev] Erasing FE.KEYID = 1
8,590,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,826 UART: [ldev] --
10,399,716 UART: [fwproc] Wait for Commands...
10,401,762 UART: [fwproc] Recv command 0x46574c44
10,404,127 UART: [fwproc] Recv'd Img size: 115224 bytes
13,865,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,779 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,611,573 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,416,203 ready_for_fw is high
3,416,828 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,784,379 >>> mbox cmd response: success
19,081,752 UART:
19,082,177 UART: Running Caliptra FMC ...
19,083,297 UART:
19,083,454 UART: [state] CFI Enabled
19,150,499 UART: [fht] FMC Alias Private Key: 7
20,914,210 UART: [art] Extend RT PCRs Done
20,915,448 UART: [art] Lock RT PCRs Done
20,917,215 UART: [art] Populate DV Done
20,922,533 UART: [fht] FMC Alias Private Key: 7
20,924,183 UART: [art] Derive CDI
20,925,000 UART: [art] Store in in slot 0x4
20,983,451 UART: [art] Derive Key Pair
20,984,485 UART: [art] Store priv key in slot 0x5
23,447,407 UART: [art] Derive Key Pair - Done
23,460,072 UART: [art] Signing Cert with AUTHO
23,461,376 UART: RITY.KEYID = 7
25,173,507 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,017 UART: [art] PUB.X = 85501E0B6A41AB88A61F72506ADFEF6922E3367C74583B2B239FAA8B4A3F8154F622E8E6F32DEFB4A4A94F577D1F9C7E
25,182,278 UART: [art] PUB.Y = E7BF31BBB46A5934DB2F8CB84461A65A71FEDF0D3CF41D7B59742CBC45E15AED491D4F165CAB02899407E016939C22F9
25,189,549 UART: [art] SIG.R = D6A436C790CA3C0A405F0AC7A38038E269AD889278A802661C860AD283354AC70C7141B4B62514B1351E00BD996B65BA
25,196,903 UART: [art] SIG.S = 5183410ABA03561236E01C39ABA04987B9D05C9376E8B1EC93E601C4F39AB14AEBA47DBFB932E323757DD517B2D8A7A2
26,175,780 UART: Caliptra RT
26,176,478 UART: [state] CFI Enabled
26,342,893 UART: [rt] RT listening for mailbox commands...
26,344,877 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,374,509 UART: [rt]cmd =0x46504c54, len=4
26,376,143 >>> mbox cmd response data (8 bytes)
26,377,272 UART: [rt] FIPS self test
26,378,215 UART: [kat] ++
26,378,660 UART: [kat] sha1
26,382,951 UART: [kat] SHA2-256
26,384,885 UART: [kat] SHA2-384
26,387,629 UART: [kat] SHA2-512-ACC
26,389,924 UART: [kat] ECC-384
26,391,717 UART: Fatal Error: 0x90040004
26,427,102 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,571,699 >>> mbox cmd response: failed
26,572,382 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,717,083 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,422,474 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,726,720 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,603 UART:
192,967 UART: Running Caliptra ROM ...
194,166 UART:
603,671 UART: [state] CFI Enabled
621,872 UART: [state] LifecycleState = Unprovisioned
624,256 UART: [state] DebugLocked = No
625,715 UART: [state] WD Timer not started. Device not locked for debugging
630,326 UART: [kat] SHA2-256
820,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,997 UART: [kat] ++
831,606 UART: [kat] sha1
842,634 UART: [kat] SHA2-256
845,615 UART: [kat] SHA2-384
850,839 UART: [kat] SHA2-512-ACC
853,432 UART: [kat] ECC-384
3,295,108 UART: [kat] HMAC-384Kdf
3,307,644 UART: [kat] LMS
3,839,468 UART: [kat] --
3,843,466 UART: [cold-reset] ++
3,844,408 UART: [fht] FHT @ 0x50003400
3,855,888 UART: [idev] ++
3,856,599 UART: [idev] CDI.KEYID = 6
3,857,584 UART: [idev] SUBJECT.KEYID = 7
3,858,760 UART: [idev] UDS.KEYID = 0
3,859,689 ready_for_fw is high
3,859,911 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,004,699 UART: [idev] Erasing UDS.KEYID = 0
6,333,386 UART: [idev] Sha1 KeyId Algorithm
6,355,266 UART: [idev] --
6,359,362 UART: [ldev] ++
6,360,099 UART: [ldev] CDI.KEYID = 6
6,361,010 UART: [ldev] SUBJECT.KEYID = 5
6,362,191 UART: [ldev] AUTHORITY.KEYID = 7
6,363,370 UART: [ldev] FE.KEYID = 1
6,373,961 UART: [ldev] Erasing FE.KEYID = 1
8,849,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,426 UART: [ldev] --
10,641,113 UART: [fwproc] Wait for Commands...
10,642,844 UART: [fwproc] Recv command 0x46574c44
10,645,102 UART: [fwproc] Recv'd Img size: 115224 bytes
14,105,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,078 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,852,270 >>> mbox cmd response: success
14,857,205 UART: [afmc] ++
14,857,909 UART: [afmc] CDI.KEYID = 6
14,859,090 UART: [afmc] SUBJECT.KEYID = 7
14,860,577 UART: [afmc] AUTHORITY.KEYID = 5
17,362,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,087,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,118,041 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,133,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,240 UART: [afmc] --
19,160,459 UART: [cold-reset] --
19,164,909 UART: [state] Locking Datavault
19,169,665 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,842 UART: [state] Locking ICCM
19,174,566 UART: [exit] Launching FMC @ 0x40000130
19,183,244 UART:
19,183,479 UART: Running Caliptra FMC ...
19,184,581 UART:
19,184,738 UART: [state] CFI Enabled
19,193,055 UART: [fht] FMC Alias Private Key: 7
20,950,329 UART: [art] Extend RT PCRs Done
20,951,567 UART: [art] Lock RT PCRs Done
20,953,274 UART: [art] Populate DV Done
20,958,646 UART: [fht] FMC Alias Private Key: 7
20,960,227 UART: [art] Derive CDI
20,960,972 UART: [art] Store in in slot 0x4
21,003,405 UART: [art] Derive Key Pair
21,004,420 UART: [art] Store priv key in slot 0x5
23,430,801 UART: [art] Derive Key Pair - Done
23,443,630 UART: [art] Signing Cert with AUTHO
23,444,959 UART: RITY.KEYID = 7
25,150,479 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,990 UART: [art] PUB.X = B18DFA4012D759886FD2EFEB14B7D3F99F83BEFCE329BC1B2D0E3946F3CB7B170A51259F9D422BE05B8BF47BCE18D8C0
25,159,298 UART: [art] PUB.Y = 596010356F0197AC809ACA8C7FC0CAD372A08408FC90EBAD6FED8B2451E88E1F053DAED78224061FE86F9427FEB28ECD
25,166,588 UART: [art] SIG.R = 972ECC920FA3F201297F3E9A52EC32DF8847211B93B2DE7917806EC685E5BF423314E8FE219C18F709F2DF389D14AF43
25,173,928 UART: [art] SIG.S = FDF8D66CEBFB72DAEACDFFC72D795194F5F956F46588D6BE705717BCDCFE90649ECAA198D0FAF19C7634048057281B87
26,153,300 UART: Caliptra RT
26,153,986 UART: [state] CFI Enabled
26,271,011 UART: [rt] RT listening for mailbox commands...
26,272,867 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,302,601 UART: [rt]cmd =0x46504c54, len=4
26,304,284 >>> mbox cmd response data (8 bytes)
26,305,300 UART: [rt] FIPS self test
26,306,239 UART: [kat] ++
26,306,690 UART: [kat] sha1
26,311,091 UART: [kat] SHA2-256
26,313,019 UART: [kat] SHA2-384
26,316,008 UART: [kat] SHA2-512-ACC
26,318,239 UART: [kat] ECC-384
26,319,980 UART: Fatal Error: 0x90040004
26,355,187 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,499,877 >>> mbox cmd response: failed
26,500,516 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,645,196 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,025 UART:
190,315 UART: Running Caliptra ROM ...
191,336 UART:
13,882,780 UART: [state] CFI Enabled
13,896,753 UART: [state] LifecycleState = Unprovisioned
13,899,098 UART: [state] DebugLocked = No
13,900,733 UART: [state] WD Timer not started. Device not locked for debugging
13,905,942 UART: [kat] SHA2-256
14,095,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,106,606 UART: [kat] ++
14,107,118 UART: [kat] sha1
14,118,492 UART: [kat] SHA2-256
14,121,504 UART: [kat] SHA2-384
14,127,379 UART: [kat] SHA2-512-ACC
14,129,945 UART: [kat] ECC-384
16,571,716 UART: [kat] HMAC-384Kdf
16,584,485 UART: [kat] LMS
17,116,308 UART: [kat] --
17,119,717 UART: [cold-reset] ++
17,121,269 UART: [fht] FHT @ 0x50003400
17,133,490 UART: [idev] ++
17,134,215 UART: [idev] CDI.KEYID = 6
17,135,150 UART: [idev] SUBJECT.KEYID = 7
17,136,377 UART: [idev] UDS.KEYID = 0
17,137,878 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,282,616 UART: [idev] Erasing UDS.KEYID = 0
19,612,238 UART: [idev] Sha1 KeyId Algorithm
19,633,359 UART: [idev] --
19,637,892 UART: [ldev] ++
19,638,571 UART: [ldev] CDI.KEYID = 6
19,639,481 UART: [ldev] SUBJECT.KEYID = 5
19,640,695 UART: [ldev] AUTHORITY.KEYID = 7
19,641,872 UART: [ldev] FE.KEYID = 1
19,652,463 UART: [ldev] Erasing FE.KEYID = 1
22,128,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,848,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,863,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,878,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,893,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,914,323 UART: [ldev] --
23,919,628 UART: [fwproc] Wait for Commands...
23,922,171 UART: [fwproc] Recv command 0x46574c44
23,924,436 UART: [fwproc] Recv'd Img size: 115224 bytes
27,379,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,456,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,572,923 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,120,304 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,852 writing to cptra_bootfsm_go
3,757,427 ready_for_fw is high
3,757,941 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,963,018 >>> mbox cmd response: success
19,214,007 UART:
19,214,409 UART: Running Caliptra FMC ...
19,215,559 UART:
19,215,721 UART: [state] CFI Enabled
19,223,555 UART: [fht] FMC Alias Private Key: 7
20,980,850 UART: [art] Extend RT PCRs Done
20,982,075 UART: [art] Lock RT PCRs Done
20,983,620 UART: [art] Populate DV Done
20,988,992 UART: [fht] FMC Alias Private Key: 7
20,990,545 UART: [art] Derive CDI
20,991,362 UART: [art] Store in in slot 0x4
21,033,919 UART: [art] Derive Key Pair
21,034,971 UART: [art] Store priv key in slot 0x5
23,462,070 UART: [art] Derive Key Pair - Done
23,475,029 UART: [art] Signing Cert with AUTHO
23,476,334 UART: RITY.KEYID = 7
25,181,360 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,871 UART: [art] PUB.X = DEC707D835591F1CF646E26863F987275C4E2C519E8A72137340EAB12482359A00DC99F4A22D7E91BFBFBD84438E1C68
25,190,133 UART: [art] PUB.Y = 1ED8937625BD43841E79B1D11DE708F24A8FADC76E7EDE277BFD9952A9FA916D6652E5A47BAEC70F807CC5215E5DFDCB
25,197,393 UART: [art] SIG.R = 8D93A1472CD7D7753CC556948A1A7BACF114EC921A1748C5602363A64F47D5770D2F00201E43301B34E556CE2A31DED0
25,204,737 UART: [art] SIG.S = 93044055CB5423CBBB9C3B0A053EC341AD97F642B699E97918F1D38E91B50EFB6157CE8B27014EE4E3609812FDB72D94
26,183,839 UART: Caliptra RT
26,184,531 UART: [state] CFI Enabled
26,301,844 UART: [rt] RT listening for mailbox commands...
26,303,704 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,333,377 UART: [rt]cmd =0x46504c54, len=4
26,334,954 >>> mbox cmd response data (8 bytes)
26,335,669 UART: [rt] FIPS self test
26,336,614 UART: [kat] ++
26,337,066 UART: [kat] sha1
26,341,578 UART: [kat] SHA2-256
26,343,509 UART: [kat] SHA2-384
26,346,195 UART: [kat] SHA2-512-ACC
26,348,502 UART: [kat] ECC-384
26,350,282 UART: Fatal Error: 0x90040004
26,386,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,530,642 >>> mbox cmd response: failed
26,531,268 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,675,905 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,005,196 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,225,511 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,698 UART: [kat] SHA2-512-ACC
896,599 UART: [kat] ECC-384
902,336 UART: [kat] HMAC-384Kdf
907,140 UART: [kat] LMS
1,475,336 UART: [kat] --
1,476,179 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,142 UART: [idev] Erasing UDS.KEYID = 0
1,505,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,515,091 UART: [ldev] ++
1,515,259 UART: [ldev] CDI.KEYID = 6
1,515,622 UART: [ldev] SUBJECT.KEYID = 5
1,516,048 UART: [ldev] AUTHORITY.KEYID = 7
1,516,511 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,546,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,560 UART: [ldev] --
1,586,071 UART: [fwproc] Waiting for Commands...
1,586,868 UART: [fwproc] Received command 0x46574c44
1,587,659 UART: [fwproc] Received Image of size 115224 bytes
2,895,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,566 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,155 >>> mbox cmd response: success
3,090,281 UART: [afmc] ++
3,090,449 UART: [afmc] CDI.KEYID = 6
3,090,811 UART: [afmc] SUBJECT.KEYID = 7
3,091,236 UART: [afmc] AUTHORITY.KEYID = 5
3,126,225 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,559 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,339 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,952 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,642 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,645 UART: [afmc] --
3,169,757 UART: [cold-reset] --
3,170,629 UART: [state] Locking Datavault
3,171,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,584 UART: [state] Locking ICCM
3,173,214 UART: [exit] Launching FMC @ 0x40000130
3,178,543 UART:
3,178,559 UART: Running Caliptra FMC ...
3,178,967 UART:
3,179,021 UART: [state] CFI Enabled
3,189,678 UART: [fht] FMC Alias Private Key: 7
3,297,809 UART: [art] Extend RT PCRs Done
3,298,237 UART: [art] Lock RT PCRs Done
3,299,791 UART: [art] Populate DV Done
3,307,726 UART: [fht] FMC Alias Private Key: 7
3,308,850 UART: [art] Derive CDI
3,309,130 UART: [art] Store in in slot 0x4
3,394,847 UART: [art] Derive Key Pair
3,395,207 UART: [art] Store priv key in slot 0x5
3,408,099 UART: [art] Derive Key Pair - Done
3,422,705 UART: [art] Signing Cert with AUTHO
3,423,185 UART: RITY.KEYID = 7
3,438,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,646 UART: [art] PUB.X = 17BD3D827A93A0CCCF69C45107ABDAF0AD8EBFA2EDD8CEF49717A8EDBC40393345C4748810D1CF86B4BA52A06EED9949
3,446,437 UART: [art] PUB.Y = B69D538B252EF74E6E4581D256D28AEDE171A0C8C28E17D0AAD8FA2C5A178DF7F023F35C99AE7A4D95A7E261C4042207
3,453,393 UART: [art] SIG.R = 8C8ADF806C8FDCAF1F15A045C2E1E4118A5188233B2EC207C70C95F803B39D6F2BC78041E398277C2A5A00E47B7B4C8D
3,460,142 UART: [art] SIG.S = 6CE18A4FC0161F8E11E52D36D13C11DDD28DC772EC3BDF2A7058C1D96EDB6D80EBA6366940D04B5F6640629B4CCAAED3
3,484,477 UART: Caliptra RT
3,484,731 UART: [state] CFI Enabled
3,592,181 UART: [rt] RT listening for mailbox commands...
3,592,844 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,390 UART: [rt]cmd =0x46504c54, len=4
3,623,460 >>> mbox cmd response data (8 bytes)
3,623,677 UART: [rt] FIPS self test
3,624,005 UART: [kat] ++
3,624,157 UART: [kat] sha1
3,628,281 UART: [kat] SHA2-256
3,630,303 UART: [kat] SHA2-384
3,633,186 UART: [kat] SHA2-512-ACC
3,635,113 UART: [kat] ECC-384
3,636,658 UART: Fatal Error: 0x90040004
3,638,208 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,638,213 >>> mbox cmd response: failed
3,638,213 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,638,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,040 UART: [kat] SHA2-512-ACC
896,941 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,783 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,718 UART: [idev] Erasing UDS.KEYID = 0
1,505,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,154 UART: [idev] --
1,515,271 UART: [ldev] ++
1,515,439 UART: [ldev] CDI.KEYID = 6
1,515,802 UART: [ldev] SUBJECT.KEYID = 5
1,516,228 UART: [ldev] AUTHORITY.KEYID = 7
1,516,691 UART: [ldev] FE.KEYID = 1
1,522,001 UART: [ldev] Erasing FE.KEYID = 1
1,547,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,114 UART: [ldev] --
1,586,571 UART: [fwproc] Waiting for Commands...
1,587,364 UART: [fwproc] Received command 0x46574c44
1,588,155 UART: [fwproc] Received Image of size 115224 bytes
2,896,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,982 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,589 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 ready_for_fw is high
1,362,489 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,081 >>> mbox cmd response: success
3,000,997 UART:
3,001,013 UART: Running Caliptra FMC ...
3,001,421 UART:
3,001,475 UART: [state] CFI Enabled
3,012,028 UART: [fht] FMC Alias Private Key: 7
3,120,261 UART: [art] Extend RT PCRs Done
3,120,689 UART: [art] Lock RT PCRs Done
3,122,273 UART: [art] Populate DV Done
3,130,436 UART: [fht] FMC Alias Private Key: 7
3,131,552 UART: [art] Derive CDI
3,131,832 UART: [art] Store in in slot 0x4
3,217,277 UART: [art] Derive Key Pair
3,217,637 UART: [art] Store priv key in slot 0x5
3,230,813 UART: [art] Derive Key Pair - Done
3,245,600 UART: [art] Signing Cert with AUTHO
3,246,080 UART: RITY.KEYID = 7
3,261,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,973 UART: [art] PUB.X = 81160B91A5AAF88E2AC065246B97530321BC916CA4DC65213008D64F695C9CF50FBD955D056FBFF55FB71951BDDF0FC6
3,268,735 UART: [art] PUB.Y = 427CCEFFD9C5265D01B7CF66BB238DBEFEFA69D275075C4ACF7A2FA4598F26A5CFB2AE271BD1E18492929E274C216814
3,275,697 UART: [art] SIG.R = 6CFD08E331954F71D076986F3F122B0D5278131413E58C3D0C4249118097507FB676AC57A45CA4096921330EAB1F9393
3,282,440 UART: [art] SIG.S = 0B11A7DA061B59BAF2B0C3EF2029EB234F72ACDEA959433D4675B224357C7FE1C4C2C7108BBC5FFD5BB64A3E38BF4740
3,305,973 UART: Caliptra RT
3,306,227 UART: [state] CFI Enabled
3,414,724 UART: [rt] RT listening for mailbox commands...
3,415,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,975 UART: [rt]cmd =0x46504c54, len=4
3,445,979 >>> mbox cmd response data (8 bytes)
3,446,200 UART: [rt] FIPS self test
3,446,528 UART: [kat] ++
3,446,680 UART: [kat] sha1
3,450,966 UART: [kat] SHA2-256
3,452,988 UART: [kat] SHA2-384
3,455,855 UART: [kat] SHA2-512-ACC
3,457,782 UART: [kat] ECC-384
3,459,279 UART: Fatal Error: 0x90040004
3,460,829 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,460,834 >>> mbox cmd response: failed
3,460,834 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,460,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,317 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,957 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Unprovisioned
85,684 UART: [state] DebugLocked = No
86,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,884 UART: [kat] SHA2-256
881,815 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,930 UART: [kat] ++
886,082 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
894,815 UART: [kat] SHA2-512-ACC
896,716 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 ready_for_fw is high
1,481,202 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,505,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,113 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,521,652 UART: [ldev] Erasing FE.KEYID = 1
1,547,451 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,535 UART: [ldev] --
1,587,006 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 115224 bytes
2,896,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,859 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,366 >>> mbox cmd response: success
3,091,524 UART: [afmc] ++
3,091,692 UART: [afmc] CDI.KEYID = 6
3,092,054 UART: [afmc] SUBJECT.KEYID = 7
3,092,479 UART: [afmc] AUTHORITY.KEYID = 5
3,127,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,501 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,191 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,072 UART: [afmc] --
3,171,108 UART: [cold-reset] --
3,171,792 UART: [state] Locking Datavault
3,172,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,539 UART: [state] Locking ICCM
3,174,179 UART: [exit] Launching FMC @ 0x40000130
3,179,508 UART:
3,179,524 UART: Running Caliptra FMC ...
3,179,932 UART:
3,180,075 UART: [state] CFI Enabled
3,190,490 UART: [fht] FMC Alias Private Key: 7
3,298,287 UART: [art] Extend RT PCRs Done
3,298,715 UART: [art] Lock RT PCRs Done
3,300,379 UART: [art] Populate DV Done
3,308,864 UART: [fht] FMC Alias Private Key: 7
3,309,806 UART: [art] Derive CDI
3,310,086 UART: [art] Store in in slot 0x4
3,395,639 UART: [art] Derive Key Pair
3,395,999 UART: [art] Store priv key in slot 0x5
3,409,685 UART: [art] Derive Key Pair - Done
3,424,529 UART: [art] Signing Cert with AUTHO
3,425,009 UART: RITY.KEYID = 7
3,440,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,898 UART: [art] PUB.X = 8A5D74F7A2204D6110194A9A83760B7489E6A26F11148FDE9559E3D786AE39A331865D44FF4BCE5C9D0F92206E568FDF
3,447,664 UART: [art] PUB.Y = EF9EEEC9C3DEFFDF7C23E074E6EBB034A387B4188ACED2707B7AE0E92186B0E190B11521C3C7DB11B1C59F17A7CDBAA5
3,454,642 UART: [art] SIG.R = 7EA8A38D0A3C30D676865F1B2F2687891170F8755A1E388CF30D523E61EBD7523D15B91FDACD10A01F1C314F9EF13AAE
3,461,416 UART: [art] SIG.S = 612051B7E8C7CE4AC6D46FE27E54BAB1FA9EBFBC0D4442E9380B9C8682CE4A766D6FDD870F1983E4AD0519070484841B
3,484,859 UART: Caliptra RT
3,485,205 UART: [state] CFI Enabled
3,593,632 UART: [rt] RT listening for mailbox commands...
3,594,295 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,839 UART: [rt]cmd =0x46504c54, len=4
3,624,955 >>> mbox cmd response data (8 bytes)
3,625,088 UART: [rt] FIPS self test
3,625,416 UART: [kat] ++
3,625,568 UART: [kat] sha1
3,629,760 UART: [kat] SHA2-256
3,631,782 UART: [kat] SHA2-384
3,634,619 UART: [kat] SHA2-512-ACC
3,636,546 UART: [kat] ECC-384
3,637,977 UART: Fatal Error: 0x90040004
3,639,527 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,639,532 >>> mbox cmd response: failed
3,639,532 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,639,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,713 UART: [kat] LMS
1,475,909 UART: [kat] --
1,476,944 UART: [cold-reset] ++
1,477,420 UART: [fht] Storing FHT @ 0x50003400
1,480,251 UART: [idev] ++
1,480,419 UART: [idev] CDI.KEYID = 6
1,480,779 UART: [idev] SUBJECT.KEYID = 7
1,481,203 UART: [idev] UDS.KEYID = 0
1,481,548 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,091 UART: [idev] Erasing UDS.KEYID = 0
1,506,501 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,275 UART: [idev] --
1,516,508 UART: [ldev] ++
1,516,676 UART: [ldev] CDI.KEYID = 6
1,517,039 UART: [ldev] SUBJECT.KEYID = 5
1,517,465 UART: [ldev] AUTHORITY.KEYID = 7
1,517,928 UART: [ldev] FE.KEYID = 1
1,523,094 UART: [ldev] Erasing FE.KEYID = 1
1,548,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,060 UART: [fwproc] Waiting for Commands...
1,587,753 UART: [fwproc] Received command 0x46574c44
1,588,544 UART: [fwproc] Received Image of size 115224 bytes
2,897,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,175 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,614 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,194 ready_for_fw is high
1,362,194 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,544 >>> mbox cmd response: success
3,000,644 UART:
3,000,660 UART: Running Caliptra FMC ...
3,001,068 UART:
3,001,211 UART: [state] CFI Enabled
3,012,056 UART: [fht] FMC Alias Private Key: 7
3,120,045 UART: [art] Extend RT PCRs Done
3,120,473 UART: [art] Lock RT PCRs Done
3,121,897 UART: [art] Populate DV Done
3,129,954 UART: [fht] FMC Alias Private Key: 7
3,130,898 UART: [art] Derive CDI
3,131,178 UART: [art] Store in in slot 0x4
3,216,919 UART: [art] Derive Key Pair
3,217,279 UART: [art] Store priv key in slot 0x5
3,230,771 UART: [art] Derive Key Pair - Done
3,245,531 UART: [art] Signing Cert with AUTHO
3,246,011 UART: RITY.KEYID = 7
3,261,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,918 UART: [art] PUB.X = B5BF2E481EC4C328BF646DCE6C13698BA9E70ADA81D3125EC9A536BE107E0E9E67B9C13FB82FCEF8CB24B2AADAA2AE1F
3,268,714 UART: [art] PUB.Y = 6045A4069F4C1FA7C7E731D55AA394ACB98EEA299E4AC0D9BE7C8745A7823A1573B00A86007C9291D1B9E32C94420EF3
3,275,639 UART: [art] SIG.R = BD8DD1C8F37F5FDDF5B6F337CDAB65CB267400905955C125B0BAAA3D536DB589C37134BDC034CB13C765A3888A57F63F
3,282,403 UART: [art] SIG.S = AB14F7638ECAB10A6672DB2C4ADC3F4AEBB7F02951F97CAD308F07B1E92C146418064CC143859581965F06BA33336C1F
3,306,094 UART: Caliptra RT
3,306,440 UART: [state] CFI Enabled
3,414,057 UART: [rt] RT listening for mailbox commands...
3,414,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,222 UART: [rt]cmd =0x46504c54, len=4
3,445,312 >>> mbox cmd response data (8 bytes)
3,445,427 UART: [rt] FIPS self test
3,445,755 UART: [kat] ++
3,445,907 UART: [kat] sha1
3,449,991 UART: [kat] SHA2-256
3,452,013 UART: [kat] SHA2-384
3,454,840 UART: [kat] SHA2-512-ACC
3,456,767 UART: [kat] ECC-384
3,458,462 UART: Fatal Error: 0x90040004
3,460,012 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,460,017 >>> mbox cmd response: failed
3,460,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,460,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,034 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,648 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,840 UART: [kat] SHA2-512-ACC
908,741 UART: [kat] ECC-384
918,528 UART: [kat] HMAC-384Kdf
923,112 UART: [kat] LMS
1,171,440 UART: [kat] --
1,172,531 UART: [cold-reset] ++
1,173,027 UART: [fht] FHT @ 0x50003400
1,175,802 UART: [idev] ++
1,175,970 UART: [idev] CDI.KEYID = 6
1,176,330 UART: [idev] SUBJECT.KEYID = 7
1,176,754 UART: [idev] UDS.KEYID = 0
1,177,099 ready_for_fw is high
1,177,099 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,708 UART: [idev] Erasing UDS.KEYID = 0
1,201,447 UART: [idev] Sha1 KeyId Algorithm
1,209,863 UART: [idev] --
1,211,003 UART: [ldev] ++
1,211,171 UART: [ldev] CDI.KEYID = 6
1,211,534 UART: [ldev] SUBJECT.KEYID = 5
1,211,960 UART: [ldev] AUTHORITY.KEYID = 7
1,212,423 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,243,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,761 UART: [ldev] --
1,283,156 UART: [fwproc] Wait for Commands...
1,283,940 UART: [fwproc] Recv command 0x46574c44
1,284,668 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,169 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,302 >>> mbox cmd response: success
2,786,546 UART: [afmc] ++
2,786,714 UART: [afmc] CDI.KEYID = 6
2,787,076 UART: [afmc] SUBJECT.KEYID = 7
2,787,501 UART: [afmc] AUTHORITY.KEYID = 5
2,822,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,613 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,583 UART: [afmc] --
2,865,705 UART: [cold-reset] --
2,866,571 UART: [state] Locking Datavault
2,867,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,226 UART: [state] Locking ICCM
2,868,840 UART: [exit] Launching FMC @ 0x40000130
2,874,169 UART:
2,874,185 UART: Running Caliptra FMC ...
2,874,593 UART:
2,874,647 UART: [state] CFI Enabled
2,885,196 UART: [fht] FMC Alias Private Key: 7
2,993,119 UART: [art] Extend RT PCRs Done
2,993,547 UART: [art] Lock RT PCRs Done
2,994,939 UART: [art] Populate DV Done
3,003,148 UART: [fht] FMC Alias Private Key: 7
3,004,278 UART: [art] Derive CDI
3,004,558 UART: [art] Store in in slot 0x4
3,090,027 UART: [art] Derive Key Pair
3,090,387 UART: [art] Store priv key in slot 0x5
3,103,217 UART: [art] Derive Key Pair - Done
3,117,834 UART: [art] Signing Cert with AUTHO
3,118,314 UART: RITY.KEYID = 7
3,133,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,999 UART: [art] PUB.X = 178A219148C246FB7FA2BE85C64BF12A9F2005AB16FEEC7F12A1189A4C217C909531C450CB55C28D4D9516A0B9E51AED
3,140,776 UART: [art] PUB.Y = CA4E7F5BB08332F210AD24883BEB836CB5C339C2C7C07A819404EFF96CC1E693C74DF6840F7B3DB36C4A412BFDE1822A
3,147,736 UART: [art] SIG.R = 6A51CE7D17C0E7BCAF29C1A06AEB94059AE8D3FD8FFD1BE1DC80895E988623F63A9E2AC5CFA895304C26565E2DE77C1F
3,154,525 UART: [art] SIG.S = 9E523DC2BB138143A6B71B0B594D3E9D2092D6D96BCED8D9DB03E0D7BD86D34F218A566B73D6EA204970ED5B27D06313
3,178,162 UART: Caliptra RT
3,178,416 UART: [state] CFI Enabled
3,285,918 UART: [rt] RT listening for mailbox commands...
3,286,581 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,007 UART: [rt]cmd =0x46504c54, len=4
3,317,181 >>> mbox cmd response data (8 bytes)
3,317,480 UART: [rt] FIPS self test
3,317,808 UART: [kat] ++
3,317,960 UART: [kat] sha1
3,322,216 UART: [kat] SHA2-256
3,324,238 UART: [kat] SHA2-384
3,327,077 UART: [kat] SHA2-512-ACC
3,329,004 UART: [kat] ECC-384
3,330,735 UART: Fatal Error: 0x90040004
3,332,285 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,332,290 >>> mbox cmd response: failed
3,332,290 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,332,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
893,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,581 UART: [kat] ++
897,733 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,652 UART: [kat] SHA2-512-ACC
908,553 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,824 UART: [kat] LMS
1,171,152 UART: [kat] --
1,172,285 UART: [cold-reset] ++
1,172,793 UART: [fht] FHT @ 0x50003400
1,175,446 UART: [idev] ++
1,175,614 UART: [idev] CDI.KEYID = 6
1,175,974 UART: [idev] SUBJECT.KEYID = 7
1,176,398 UART: [idev] UDS.KEYID = 0
1,176,743 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,337 UART: [idev] Sha1 KeyId Algorithm
1,209,735 UART: [idev] --
1,210,679 UART: [ldev] ++
1,210,847 UART: [ldev] CDI.KEYID = 6
1,211,210 UART: [ldev] SUBJECT.KEYID = 5
1,211,636 UART: [ldev] AUTHORITY.KEYID = 7
1,212,099 UART: [ldev] FE.KEYID = 1
1,217,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,247 UART: [ldev] --
1,282,626 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,597 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,700 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,611 ready_for_fw is high
1,060,611 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,123 >>> mbox cmd response: success
2,701,061 UART:
2,701,077 UART: Running Caliptra FMC ...
2,701,485 UART:
2,701,539 UART: [state] CFI Enabled
2,711,720 UART: [fht] FMC Alias Private Key: 7
2,820,153 UART: [art] Extend RT PCRs Done
2,820,581 UART: [art] Lock RT PCRs Done
2,822,159 UART: [art] Populate DV Done
2,830,158 UART: [fht] FMC Alias Private Key: 7
2,831,252 UART: [art] Derive CDI
2,831,532 UART: [art] Store in in slot 0x4
2,917,161 UART: [art] Derive Key Pair
2,917,521 UART: [art] Store priv key in slot 0x5
2,930,621 UART: [art] Derive Key Pair - Done
2,945,249 UART: [art] Signing Cert with AUTHO
2,945,729 UART: RITY.KEYID = 7
2,960,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,666 UART: [art] PUB.X = FE9E1E6DD4ECF560053281DB8C5D5F2E8BBB73D24263509A0E1AEB86CE4F4AC3EC2BF6AAAEEB5C39DA757275D8016419
2,968,451 UART: [art] PUB.Y = 42165757EB4427729EDE2811D0FAF03EB6AFEA9DC3208A2D6177E4AC2EBCDE8AEFB2AA1620BC513F5013DB526E551589
2,975,417 UART: [art] SIG.R = 0E51C306A6739761B1D07590FBA1E1AF0F0B6590FDE2B628DAEBCAD1EAD2C8EE5199F9972D25F75E409DD3351B47FD42
2,982,191 UART: [art] SIG.S = F6F462FF9AC7F5E9750CB9AC4E29D9B316985AD8C50AF42F70F03C0C4638DD45C0E25014A962F156A54864CB5DF847F9
3,006,579 UART: Caliptra RT
3,006,833 UART: [state] CFI Enabled
3,114,623 UART: [rt] RT listening for mailbox commands...
3,115,286 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,772 UART: [rt]cmd =0x46504c54, len=4
3,145,882 >>> mbox cmd response data (8 bytes)
3,146,031 UART: [rt] FIPS self test
3,146,359 UART: [kat] ++
3,146,511 UART: [kat] sha1
3,150,969 UART: [kat] SHA2-256
3,152,991 UART: [kat] SHA2-384
3,155,872 UART: [kat] SHA2-512-ACC
3,157,799 UART: [kat] ECC-384
3,159,540 UART: Fatal Error: 0x90040004
3,161,090 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,161,095 >>> mbox cmd response: failed
3,161,095 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,161,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,823 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,131 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,043 UART: [kat] HMAC-384Kdf
922,509 UART: [kat] LMS
1,170,837 UART: [kat] --
1,171,582 UART: [cold-reset] ++
1,171,908 UART: [fht] FHT @ 0x50003400
1,174,707 UART: [idev] ++
1,174,875 UART: [idev] CDI.KEYID = 6
1,175,235 UART: [idev] SUBJECT.KEYID = 7
1,175,659 UART: [idev] UDS.KEYID = 0
1,176,004 ready_for_fw is high
1,176,004 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,695 UART: [idev] Erasing UDS.KEYID = 0
1,200,946 UART: [idev] Sha1 KeyId Algorithm
1,209,446 UART: [idev] --
1,210,694 UART: [ldev] ++
1,210,862 UART: [ldev] CDI.KEYID = 6
1,211,225 UART: [ldev] SUBJECT.KEYID = 5
1,211,651 UART: [ldev] AUTHORITY.KEYID = 7
1,212,114 UART: [ldev] FE.KEYID = 1
1,217,324 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,048 UART: [ldev] --
1,283,531 UART: [fwproc] Wait for Commands...
1,284,321 UART: [fwproc] Recv command 0x46574c44
1,285,049 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,050 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,263 >>> mbox cmd response: success
2,787,449 UART: [afmc] ++
2,787,617 UART: [afmc] CDI.KEYID = 6
2,787,979 UART: [afmc] SUBJECT.KEYID = 7
2,788,404 UART: [afmc] AUTHORITY.KEYID = 5
2,823,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,817 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,536 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,482 UART: [afmc] --
2,867,418 UART: [cold-reset] --
2,868,322 UART: [state] Locking Datavault
2,869,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,855 UART: [state] Locking ICCM
2,870,433 UART: [exit] Launching FMC @ 0x40000130
2,875,762 UART:
2,875,778 UART: Running Caliptra FMC ...
2,876,186 UART:
2,876,329 UART: [state] CFI Enabled
2,886,644 UART: [fht] FMC Alias Private Key: 7
2,994,837 UART: [art] Extend RT PCRs Done
2,995,265 UART: [art] Lock RT PCRs Done
2,996,705 UART: [art] Populate DV Done
3,004,902 UART: [fht] FMC Alias Private Key: 7
3,005,846 UART: [art] Derive CDI
3,006,126 UART: [art] Store in in slot 0x4
3,091,735 UART: [art] Derive Key Pair
3,092,095 UART: [art] Store priv key in slot 0x5
3,105,345 UART: [art] Derive Key Pair - Done
3,119,843 UART: [art] Signing Cert with AUTHO
3,120,323 UART: RITY.KEYID = 7
3,135,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,648 UART: [art] PUB.X = 19D0CFB6B931147FB062AA2270D5CA0438E4AD33A57B483FEA87B8556354F8597F86748951D75822194F3EEF7ECECF0E
3,143,418 UART: [art] PUB.Y = 1603D8E7ED88AEC575C74C5C71EF4F7D9B6CD932626D7A58F80EB3397237AF3F7660C7161777B64922DFADD3E6872930
3,150,366 UART: [art] SIG.R = E4871EBDF615425172A66713096B0C2A58025DB3F83F94B2431398E137424D0D8B79AE576EE6C9FE53559B7B187A644F
3,157,120 UART: [art] SIG.S = C910A452B04D57C88689DE1C55135E2F69F78BB68D944478D30BEF109F12D3E9A188CEA28B990827505C467FD46D175F
3,181,021 UART: Caliptra RT
3,181,367 UART: [state] CFI Enabled
3,289,014 UART: [rt] RT listening for mailbox commands...
3,289,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,013 UART: [rt]cmd =0x46504c54, len=4
3,320,243 >>> mbox cmd response data (8 bytes)
3,320,520 UART: [rt] FIPS self test
3,320,848 UART: [kat] ++
3,321,000 UART: [kat] sha1
3,325,108 UART: [kat] SHA2-256
3,327,130 UART: [kat] SHA2-384
3,329,825 UART: [kat] SHA2-512-ACC
3,331,752 UART: [kat] ECC-384
3,333,275 UART: Fatal Error: 0x90040004
3,334,825 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,334,830 >>> mbox cmd response: failed
3,334,830 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,334,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
893,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,530 UART: [kat] ++
897,682 UART: [kat] sha1
901,856 UART: [kat] SHA2-256
903,796 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,789 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,532 UART: [cold-reset] ++
1,172,954 UART: [fht] FHT @ 0x50003400
1,175,471 UART: [idev] ++
1,175,639 UART: [idev] CDI.KEYID = 6
1,175,999 UART: [idev] SUBJECT.KEYID = 7
1,176,423 UART: [idev] UDS.KEYID = 0
1,176,768 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,459 UART: [idev] Erasing UDS.KEYID = 0
1,201,770 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,211,194 UART: [ldev] ++
1,211,362 UART: [ldev] CDI.KEYID = 6
1,211,725 UART: [ldev] SUBJECT.KEYID = 5
1,212,151 UART: [ldev] AUTHORITY.KEYID = 7
1,212,614 UART: [ldev] FE.KEYID = 1
1,217,922 UART: [ldev] Erasing FE.KEYID = 1
1,244,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,432 UART: [ldev] --
1,283,769 UART: [fwproc] Wait for Commands...
1,284,581 UART: [fwproc] Recv command 0x46574c44
1,285,309 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,856 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,105 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 ready_for_fw is high
1,060,344 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,014 >>> mbox cmd response: success
2,701,604 UART:
2,701,620 UART: Running Caliptra FMC ...
2,702,028 UART:
2,702,171 UART: [state] CFI Enabled
2,712,428 UART: [fht] FMC Alias Private Key: 7
2,820,749 UART: [art] Extend RT PCRs Done
2,821,177 UART: [art] Lock RT PCRs Done
2,822,701 UART: [art] Populate DV Done
2,831,044 UART: [fht] FMC Alias Private Key: 7
2,832,184 UART: [art] Derive CDI
2,832,464 UART: [art] Store in in slot 0x4
2,918,441 UART: [art] Derive Key Pair
2,918,801 UART: [art] Store priv key in slot 0x5
2,931,791 UART: [art] Derive Key Pair - Done
2,946,580 UART: [art] Signing Cert with AUTHO
2,947,060 UART: RITY.KEYID = 7
2,962,460 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,225 UART: [art] PUB.X = A5F35689D776DFC30FF40BFF7DDCF77CB3B6F89CA94B498311FE116A60C4F8FC0590EC420A6835FFF6BD2C48AC9B791A
2,970,005 UART: [art] PUB.Y = 96EB3A63CBADFD0D33C3DA6CAAF372FE867B5B18162570379D3103D9B9811E35F85776E64E955F055AE45B73595A846D
2,976,952 UART: [art] SIG.R = 943E100B304003B4F153734D5CC544F4E7C307637BDF6C81590E315DBCA77D9AD99B9CE498514FCE26C9EC011499C793
2,983,709 UART: [art] SIG.S = 10D8B5C7C855E1DC1DBEF745AEF2CB7C7EB63B71BABF59607E401540A2C040E0A776EC57DFCCB2D0447531CEA8278A40
3,007,664 UART: Caliptra RT
3,008,010 UART: [state] CFI Enabled
3,116,042 UART: [rt] RT listening for mailbox commands...
3,116,705 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,293 UART: [rt]cmd =0x46504c54, len=4
3,147,579 >>> mbox cmd response data (8 bytes)
3,147,768 UART: [rt] FIPS self test
3,148,096 UART: [kat] ++
3,148,248 UART: [kat] sha1
3,152,320 UART: [kat] SHA2-256
3,154,342 UART: [kat] SHA2-384
3,157,209 UART: [kat] SHA2-512-ACC
3,159,136 UART: [kat] ECC-384
3,160,585 UART: Fatal Error: 0x90040004
3,162,135 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,162,140 >>> mbox cmd response: failed
3,162,140 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,162,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,026 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,396 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,131 UART: [idev] ++
1,173,299 UART: [idev] CDI.KEYID = 6
1,173,660 UART: [idev] SUBJECT.KEYID = 7
1,174,085 UART: [idev] UDS.KEYID = 0
1,174,431 ready_for_fw is high
1,174,431 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,888 UART: [ldev] Erasing FE.KEYID = 1
1,242,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,496 UART: [ldev] --
1,281,760 UART: [fwproc] Wait for Commands...
1,282,527 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,734 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,816 >>> mbox cmd response: success
2,785,997 UART: [afmc] ++
2,786,165 UART: [afmc] CDI.KEYID = 6
2,786,528 UART: [afmc] SUBJECT.KEYID = 7
2,786,954 UART: [afmc] AUTHORITY.KEYID = 5
2,821,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,510 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,229 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,074 UART: [afmc] --
2,864,966 UART: [cold-reset] --
2,865,826 UART: [state] Locking Datavault
2,866,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,481 UART: [state] Locking ICCM
2,867,983 UART: [exit] Launching FMC @ 0x40000130
2,873,312 UART:
2,873,328 UART: Running Caliptra FMC ...
2,873,736 UART:
2,873,790 UART: [state] CFI Enabled
2,884,133 UART: [fht] FMC Alias Private Key: 7
2,992,000 UART: [art] Extend RT PCRs Done
2,992,428 UART: [art] Lock RT PCRs Done
2,993,916 UART: [art] Populate DV Done
3,002,059 UART: [fht] FMC Alias Private Key: 7
3,003,219 UART: [art] Derive CDI
3,003,499 UART: [art] Store in in slot 0x4
3,089,342 UART: [art] Derive Key Pair
3,089,702 UART: [art] Store priv key in slot 0x5
3,102,950 UART: [art] Derive Key Pair - Done
3,117,581 UART: [art] Signing Cert with AUTHO
3,118,061 UART: RITY.KEYID = 7
3,132,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,626 UART: [art] PUB.X = B20AE6557925600009B013C8C7D72A5EACE4DF1E50720292C2192721E2515F324525850A26B6B37A43CC38A2F381EAF9
3,140,358 UART: [art] PUB.Y = DF743A3D032174A7EC5EE77C7752FBA6C8A0E0A4B62CA703381DD59F9FF6DBF019B836A18A038675AA44B75E8054BACB
3,147,315 UART: [art] SIG.R = 7E2F3428CF762A84949A6D5E0BE95C5D48DF0FB08C90C1220DCF338DD06DD37ACC1CE48D3E65C6F1A4FACAA8174DC9E4
3,154,100 UART: [art] SIG.S = E2DC099160FE5FDBB8683A4A85D2976931916D6E81F3E400086DB6A2EF0AAB21D850986133B9BAF7BD51DFCCDC8BA88A
3,178,012 UART: Caliptra RT
3,178,266 UART: [state] CFI Enabled
3,286,314 UART: [rt] RT listening for mailbox commands...
3,286,977 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,415 UART: [rt]cmd =0x46504c54, len=4
3,317,513 >>> mbox cmd response data (8 bytes)
3,317,780 UART: [rt] FIPS self test
3,318,108 UART: [kat] ++
3,318,260 UART: [kat] sha1
3,322,406 UART: [kat] SHA2-256
3,324,428 UART: [kat] SHA2-384
3,327,325 UART: [kat] SHA2-512-ACC
3,329,252 UART: [kat] ECC-384
3,330,553 UART: Fatal Error: 0x90040004
3,332,103 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,332,108 >>> mbox cmd response: failed
3,332,108 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,332,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,397 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,207,323 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,890 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,779 UART: [fwproc] Recv command 0x46574c44
1,281,512 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,240 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,434 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,550 ready_for_fw is high
1,055,550 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,570 >>> mbox cmd response: success
2,695,856 UART:
2,695,872 UART: Running Caliptra FMC ...
2,696,280 UART:
2,696,334 UART: [state] CFI Enabled
2,707,065 UART: [fht] FMC Alias Private Key: 7
2,814,836 UART: [art] Extend RT PCRs Done
2,815,264 UART: [art] Lock RT PCRs Done
2,816,960 UART: [art] Populate DV Done
2,825,333 UART: [fht] FMC Alias Private Key: 7
2,826,271 UART: [art] Derive CDI
2,826,551 UART: [art] Store in in slot 0x4
2,911,802 UART: [art] Derive Key Pair
2,912,162 UART: [art] Store priv key in slot 0x5
2,924,712 UART: [art] Derive Key Pair - Done
2,939,611 UART: [art] Signing Cert with AUTHO
2,940,091 UART: RITY.KEYID = 7
2,955,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,032 UART: [art] PUB.X = AADB81B8BFC6BFD0ADAB17DA4E4D807891E6B551352A09B9D74F2CC5CDB68498169E5BBF9366124D60AAD2D473E16252
2,962,817 UART: [art] PUB.Y = B99C8E78B8A9C15D5A9137408026DD1AB22733BA8B1F03C0EBC4F8070C871E08FFCF0570C7875A79B7423EEDC76526A9
2,969,760 UART: [art] SIG.R = B8E26EFDFD9A190EDBDD29AF595FDF99389A31CC6D9A764A120E39DBDD4A5D12A7194DBBCEC2449BFA3A5480F4802442
2,976,548 UART: [art] SIG.S = B3151A45D2C659EF06A87FB5B4E682B4F02A9096198EB901FD1F724B0582F4A3D8ED1448A9E028B05B764781236D6A37
3,000,514 UART: Caliptra RT
3,000,768 UART: [state] CFI Enabled
3,108,693 UART: [rt] RT listening for mailbox commands...
3,109,356 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,904 UART: [rt]cmd =0x46504c54, len=4
3,140,180 >>> mbox cmd response data (8 bytes)
3,140,505 UART: [rt] FIPS self test
3,140,833 UART: [kat] ++
3,140,985 UART: [kat] sha1
3,145,249 UART: [kat] SHA2-256
3,147,271 UART: [kat] SHA2-384
3,150,126 UART: [kat] SHA2-512-ACC
3,152,053 UART: [kat] ECC-384
3,153,700 UART: Fatal Error: 0x90040004
3,155,250 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,255 >>> mbox cmd response: failed
3,155,255 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,342 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,300 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,025 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,174,510 ready_for_fw is high
1,174,510 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,798 UART: [idev] Erasing UDS.KEYID = 0
1,198,824 UART: [idev] Sha1 KeyId Algorithm
1,207,668 UART: [idev] --
1,208,785 UART: [ldev] ++
1,208,953 UART: [ldev] CDI.KEYID = 6
1,209,317 UART: [ldev] SUBJECT.KEYID = 5
1,209,744 UART: [ldev] AUTHORITY.KEYID = 7
1,210,207 UART: [ldev] FE.KEYID = 1
1,215,589 UART: [ldev] Erasing FE.KEYID = 1
1,241,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,951 UART: [ldev] --
1,281,291 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,579 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,627 >>> mbox cmd response: success
2,785,834 UART: [afmc] ++
2,786,002 UART: [afmc] CDI.KEYID = 6
2,786,365 UART: [afmc] SUBJECT.KEYID = 7
2,786,791 UART: [afmc] AUTHORITY.KEYID = 5
2,822,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,769 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,331 UART: [afmc] --
2,865,459 UART: [cold-reset] --
2,866,235 UART: [state] Locking Datavault
2,867,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,986 UART: [state] Locking ICCM
2,868,636 UART: [exit] Launching FMC @ 0x40000130
2,873,965 UART:
2,873,981 UART: Running Caliptra FMC ...
2,874,389 UART:
2,874,532 UART: [state] CFI Enabled
2,884,917 UART: [fht] FMC Alias Private Key: 7
2,992,932 UART: [art] Extend RT PCRs Done
2,993,360 UART: [art] Lock RT PCRs Done
2,994,928 UART: [art] Populate DV Done
3,003,053 UART: [fht] FMC Alias Private Key: 7
3,004,033 UART: [art] Derive CDI
3,004,313 UART: [art] Store in in slot 0x4
3,089,960 UART: [art] Derive Key Pair
3,090,320 UART: [art] Store priv key in slot 0x5
3,103,392 UART: [art] Derive Key Pair - Done
3,118,036 UART: [art] Signing Cert with AUTHO
3,118,516 UART: RITY.KEYID = 7
3,134,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,839 UART: [art] PUB.X = 07263C17B4D5CC7990C8A03EC487F15A182B0431BB6C308E3A1F696D4759F951D24D103776E0C2CD9447B707B47CECF1
3,141,602 UART: [art] PUB.Y = 8D3A26753164D4CAD02AE9B37CC551A13CC2C470F68104C34B1C103388B7E24C47F1D16B13ACEC580CCF64216D75F282
3,148,552 UART: [art] SIG.R = 34223E0C06DAB80A275CBFA1F0B6840A7BF6693499A59815FCCA44FFFD8CB2EC4179F1D5732E6F02F2459E6034D85D89
3,155,317 UART: [art] SIG.S = 327AE44AD1DEC1741486EA9BC061787B4A769DE5DD7CCDD1CF193D5A4802F7F337487A2AAE3BEF9FF968DA117FE0A8D4
3,178,539 UART: Caliptra RT
3,178,885 UART: [state] CFI Enabled
3,286,793 UART: [rt] RT listening for mailbox commands...
3,287,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,022 UART: [rt]cmd =0x46504c54, len=4
3,318,164 >>> mbox cmd response data (8 bytes)
3,318,427 UART: [rt] FIPS self test
3,318,755 UART: [kat] ++
3,318,907 UART: [kat] sha1
3,323,167 UART: [kat] SHA2-256
3,325,189 UART: [kat] SHA2-384
3,328,240 UART: [kat] SHA2-512-ACC
3,330,167 UART: [kat] ECC-384
3,331,886 UART: Fatal Error: 0x90040004
3,333,436 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,441 >>> mbox cmd response: failed
3,333,441 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,194 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,216,131 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,221 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,305 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,157 ready_for_fw is high
1,056,157 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,763 >>> mbox cmd response: success
2,695,097 UART:
2,695,113 UART: Running Caliptra FMC ...
2,695,521 UART:
2,695,664 UART: [state] CFI Enabled
2,706,559 UART: [fht] FMC Alias Private Key: 7
2,815,006 UART: [art] Extend RT PCRs Done
2,815,434 UART: [art] Lock RT PCRs Done
2,816,700 UART: [art] Populate DV Done
2,825,159 UART: [fht] FMC Alias Private Key: 7
2,826,293 UART: [art] Derive CDI
2,826,573 UART: [art] Store in in slot 0x4
2,912,410 UART: [art] Derive Key Pair
2,912,770 UART: [art] Store priv key in slot 0x5
2,926,278 UART: [art] Derive Key Pair - Done
2,940,763 UART: [art] Signing Cert with AUTHO
2,941,243 UART: RITY.KEYID = 7
2,956,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,586 UART: [art] PUB.X = 1E3550CE561AA9AAA4949A2530016EE9A608C017CF605E0C38440325220E81E148155267F73A1E104D050384149DD6C7
2,964,325 UART: [art] PUB.Y = 870FC53FE5AF7EAB44AADAF0EAD86434D97CF40227E5202986B223641DAB3C336D93AC6F5EEA2C5315A065E762FF80F3
2,971,285 UART: [art] SIG.R = 87463D067C9DC026A534CB020C212F508AB88C3574710ABB62955591AA17AC6DEA0F098481FF04BFECAD83D9AE75BD82
2,978,044 UART: [art] SIG.S = 64115CDAE236D2746F85FF82D47A3344992D58001D77DFF21CB0337C541FE4276E1869057ED07BD71B82F9C7202F6468
3,001,352 UART: Caliptra RT
3,001,698 UART: [state] CFI Enabled
3,109,110 UART: [rt] RT listening for mailbox commands...
3,109,773 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,351 UART: [rt]cmd =0x46504c54, len=4
3,140,569 >>> mbox cmd response data (8 bytes)
3,140,732 UART: [rt] FIPS self test
3,141,060 UART: [kat] ++
3,141,212 UART: [kat] sha1
3,145,330 UART: [kat] SHA2-256
3,147,352 UART: [kat] SHA2-384
3,150,361 UART: [kat] SHA2-512-ACC
3,152,288 UART: [kat] ECC-384
3,153,989 UART: Fatal Error: 0x90040004
3,155,539 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,544 >>> mbox cmd response: failed
3,155,544 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,701 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
5,972,718 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,117,037 >>> mbox cmd response: failed
6,117,837 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,261,741 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
4,864,451 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,426,877 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,978,902 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,123,018 >>> mbox cmd response: failed
6,123,592 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,266,880 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,875,311 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,429,777 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
6,293,544 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,437,670 >>> mbox cmd response: failed
6,438,228 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,581,993 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
18,466,408 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,909,516 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
6,300,741 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,445,590 >>> mbox cmd response: failed
6,446,184 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,589,460 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
18,457,020 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,900,164 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
5,173,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,318,058 >>> mbox cmd response: failed
5,318,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,462,302 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,457,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,274,576 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
5,193,642 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,338,924 >>> mbox cmd response: failed
5,339,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,483,291 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,460,910 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,284,409 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,151,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,296,082 >>> mbox cmd response: failed
5,296,655 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,440,138 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,459,587 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,302,483 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
5,500,431 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,645,729 >>> mbox cmd response: failed
5,646,479 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,790,233 >>> mbox cmd response: failed
Initializing fuses
986 writing to cptra_bootfsm_go
17,864,528 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,595,393 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
5,506,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,651,313 >>> mbox cmd response: failed
5,651,876 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,796,076 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
17,859,127 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,576,529 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,634 >>> mbox cmd response: failed
822,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,315 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,008 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
820,916 >>> mbox cmd response: failed
820,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
820,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,510 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,853 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,861 >>> mbox cmd response: failed
821,861 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,052 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,695 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,911 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,919 >>> mbox cmd response: failed
821,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,870 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,435 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,592 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,600 >>> mbox cmd response: failed
821,600 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,320 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,392 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,400 >>> mbox cmd response: failed
822,400 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,880 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,861 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,869 >>> mbox cmd response: failed
821,869 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,423 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,751 >>> mbox cmd response: failed
822,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,822 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,835 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,554 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,562 >>> mbox cmd response: failed
821,562 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,146 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,866 >>> mbox cmd response: failed
821,866 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
821,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,062 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,729 >>> mbox cmd response: failed
822,729 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,294 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,681 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,393 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,401 >>> mbox cmd response: failed
822,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,348 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,767 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,141 UART:
192,506 UART: Running Caliptra ROM ...
193,693 UART:
193,845 UART: [state] CFI Enabled
262,664 UART: [state] LifecycleState = Unprovisioned
264,593 UART: [state] DebugLocked = No
266,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,430 UART: [kat] SHA2-256
441,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,657 UART: [kat] ++
452,103 UART: [kat] sha1
463,410 UART: [kat] SHA2-256
466,111 UART: [kat] SHA2-384
471,329 UART: [kat] SHA2-512-ACC
473,700 UART: [kat] ECC-384
2,767,558 UART: [kat] HMAC-384Kdf
2,799,631 UART: [kat] LMS
3,989,921 UART: [kat] --
3,994,002 UART: [cold-reset] ++
3,996,511 UART: [fht] Storing FHT @ 0x50003400
4,008,282 UART: [idev] ++
4,008,871 UART: [idev] CDI.KEYID = 6
4,009,785 UART: [idev] SUBJECT.KEYID = 7
4,011,042 UART: [idev] UDS.KEYID = 0
4,012,091 ready_for_fw is high
4,012,291 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,156,873 UART: [idev] Erasing UDS.KEYID = 0
7,343,617 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,405 UART: [idev] --
7,368,135 UART: [ldev] ++
7,368,707 UART: [ldev] CDI.KEYID = 6
7,369,671 UART: [ldev] SUBJECT.KEYID = 5
7,370,890 UART: [ldev] AUTHORITY.KEYID = 7
7,372,124 UART: [ldev] FE.KEYID = 1
7,399,953 UART: [ldev] Erasing FE.KEYID = 1
10,733,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,370 UART: [ldev] --
13,093,476 UART: [fwproc] Waiting for Commands...
13,096,711 UART: [fwproc] Received command 0x46574c44
13,098,897 UART: [fwproc] Received Image of size 114916 bytes
17,164,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,623,008 >>> mbox cmd response: success
17,627,510 UART: [afmc] ++
17,628,093 UART: [afmc] CDI.KEYID = 6
17,629,062 UART: [afmc] SUBJECT.KEYID = 7
17,630,279 UART: [afmc] AUTHORITY.KEYID = 5
21,003,065 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,256 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,647 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,458 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,922 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,734 UART: [afmc] --
23,376,971 UART: [cold-reset] --
23,380,200 UART: [state] Locking Datavault
23,384,540 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,240 UART: [state] Locking ICCM
23,388,097 UART: [exit] Launching FMC @ 0x40000130
23,396,498 UART:
23,396,739 UART: Running Caliptra FMC ...
23,397,846 UART:
23,398,008 UART: [state] CFI Enabled
23,462,606 UART: [fht] FMC Alias Private Key: 7
25,800,770 UART: [art] Extend RT PCRs Done
25,801,992 UART: [art] Lock RT PCRs Done
25,803,904 UART: [art] Populate DV Done
25,809,423 UART: [fht] FMC Alias Private Key: 7
25,811,121 UART: [art] Derive CDI
25,811,935 UART: [art] Store in in slot 0x4
25,870,436 UART: [art] Derive Key Pair
25,871,475 UART: [art] Store priv key in slot 0x5
29,164,451 UART: [art] Derive Key Pair - Done
29,177,248 UART: [art] Signing Cert with AUTHO
29,178,552 UART: RITY.KEYID = 7
31,466,119 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,626 UART: [art] PUB.X = FA953EEDA46F54716DC93D963A5170B0BA17EBC488AA4ED4A34D2B2368F95017402DC05114E8F0CB711322D408600938
31,474,836 UART: [art] PUB.Y = AE822C54DBED353734E9ED7BF9F5253334A6281F210D95854D4B776D00844C0A50497866138FCF150ACD450A91D194DD
31,482,080 UART: [art] SIG.R = 651FFA21A210DF21EF6B687856A9966FBC972E83BBAC0003D317F50DBA8675C8AB532F872127552BD072E934EDF45812
31,489,431 UART: [art] SIG.S = 43EBA079ECA2A568E20C53E68CC48194A839A54B55D33A721FD9FA990659E3B1AB5A3F7366BDF8C350B6129FAC1A1094
32,794,405 UART: Caliptra RT
32,795,119 UART: [state] CFI Enabled
32,956,675 UART: [rt] RT listening for mailbox commands...
32,958,534 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,988,376 UART: [rt]cmd =0x46504c54, len=4
32,990,011 >>> mbox cmd response data (8 bytes)
32,990,987 UART: [rt] FIPS self test
32,991,934 UART: [kat] ++
32,992,418 UART: [kat] sha1
32,996,928 UART: [kat] SHA2-256
32,998,858 UART: [kat] SHA2-384
33,001,873 UART: [kat] SHA2-512-ACC
33,004,118 UART: [kat] ECC-384
36,267,658 UART: Fatal Error: 0x90040005
36,303,097 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,447,325 >>> mbox cmd response: failed
36,448,006 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,592,275 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
190,123 UART:
190,431 UART: Running Caliptra ROM ...
191,457 UART:
191,601 UART: [state] CFI Enabled
248,908 UART: [state] LifecycleState = Unprovisioned
250,787 UART: [state] DebugLocked = No
252,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,586 UART: [kat] SHA2-256
426,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
436,793 UART: [kat] ++
437,242 UART: [kat] sha1
446,825 UART: [kat] SHA2-256
449,478 UART: [kat] SHA2-384
454,052 UART: [kat] SHA2-512-ACC
456,451 UART: [kat] ECC-384
2,752,937 UART: [kat] HMAC-384Kdf
2,782,717 UART: [kat] LMS
3,973,064 UART: [kat] --
3,977,061 UART: [cold-reset] ++
3,977,965 UART: [fht] Storing FHT @ 0x50003400
3,989,697 UART: [idev] ++
3,990,266 UART: [idev] CDI.KEYID = 6
3,991,204 UART: [idev] SUBJECT.KEYID = 7
3,992,474 UART: [idev] UDS.KEYID = 0
3,993,974 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,138,510 UART: [idev] Erasing UDS.KEYID = 0
7,331,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,069 UART: [idev] --
7,358,252 UART: [ldev] ++
7,358,829 UART: [ldev] CDI.KEYID = 6
7,359,794 UART: [ldev] SUBJECT.KEYID = 5
7,361,005 UART: [ldev] AUTHORITY.KEYID = 7
7,362,242 UART: [ldev] FE.KEYID = 1
7,404,876 UART: [ldev] Erasing FE.KEYID = 1
10,736,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,309 UART: [ldev] --
13,117,497 UART: [fwproc] Waiting for Commands...
13,120,785 UART: [fwproc] Received command 0x46574c44
13,122,971 UART: [fwproc] Received Image of size 114916 bytes
17,185,372 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,649,897 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,784,854 ready_for_fw is high
3,785,443 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,869,307 >>> mbox cmd response: success
23,567,353 UART:
23,567,749 UART: Running Caliptra FMC ...
23,568,896 UART:
23,569,050 UART: [state] CFI Enabled
23,635,972 UART: [fht] FMC Alias Private Key: 7
25,973,813 UART: [art] Extend RT PCRs Done
25,975,034 UART: [art] Lock RT PCRs Done
25,976,800 UART: [art] Populate DV Done
25,982,218 UART: [fht] FMC Alias Private Key: 7
25,983,709 UART: [art] Derive CDI
25,984,475 UART: [art] Store in in slot 0x4
26,043,577 UART: [art] Derive Key Pair
26,044,624 UART: [art] Store priv key in slot 0x5
29,337,193 UART: [art] Derive Key Pair - Done
29,350,480 UART: [art] Signing Cert with AUTHO
29,351,795 UART: RITY.KEYID = 7
31,639,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,388 UART: [art] PUB.X = B39E0E2C489F2330736499098E14259E73DCFA7EBDADA68E1C5AAFD13218493B0F13F24B26BAEFD9DD7EB48F6C2F3341
31,648,688 UART: [art] PUB.Y = D58B90870EB54C5E13D0E1D64E6C59226B98C721439499F96F6759E16454B169A1A20E814A201CE50396ADFBEBE85EB0
31,655,900 UART: [art] SIG.R = 79A09C4B01A09AAFDB8E25C77B8252B533FA5DAC36721D6A4C1F98288B8FCD44F495581019D67B22D5BFEF2AB158F2BB
31,663,311 UART: [art] SIG.S = 81EAE4E8A5D66F0EBFCA3507B5189BAC91C02E27929A5A4838DCCA10C3F8DC02D0EB4211128822B335505E5DE153B769
32,968,638 UART: Caliptra RT
32,969,344 UART: [state] CFI Enabled
33,129,971 UART: [rt] RT listening for mailbox commands...
33,131,831 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,161,681 UART: [rt]cmd =0x46504c54, len=4
33,163,187 >>> mbox cmd response data (8 bytes)
33,164,590 UART: [rt] FIPS self test
33,165,534 UART: [kat] ++
33,165,989 UART: [kat] sha1
33,170,394 UART: [kat] SHA2-256
33,172,334 UART: [kat] SHA2-384
33,175,351 UART: [kat] SHA2-512-ACC
33,177,597 UART: [kat] ECC-384
36,440,940 UART: Fatal Error: 0x90040005
36,476,240 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,621,048 >>> mbox cmd response: failed
36,621,737 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,765,998 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,768,371 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,847,304 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,506 UART:
192,883 UART: Running Caliptra ROM ...
194,009 UART:
603,603 UART: [state] CFI Enabled
611,578 UART: [state] LifecycleState = Unprovisioned
613,524 UART: [state] DebugLocked = No
615,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
620,276 UART: [kat] SHA2-256
789,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
800,558 UART: [kat] ++
801,091 UART: [kat] sha1
812,068 UART: [kat] SHA2-256
814,826 UART: [kat] SHA2-384
819,870 UART: [kat] SHA2-512-ACC
822,258 UART: [kat] ECC-384
3,105,557 UART: [kat] HMAC-384Kdf
3,115,954 UART: [kat] LMS
4,306,095 UART: [kat] --
4,310,614 UART: [cold-reset] ++
4,311,724 UART: [fht] Storing FHT @ 0x50003400
4,322,926 UART: [idev] ++
4,323,502 UART: [idev] CDI.KEYID = 6
4,324,409 UART: [idev] SUBJECT.KEYID = 7
4,325,659 UART: [idev] UDS.KEYID = 0
4,326,702 ready_for_fw is high
4,326,920 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,471,303 UART: [idev] Erasing UDS.KEYID = 0
7,611,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,634,511 UART: [idev] --
7,637,926 UART: [ldev] ++
7,638,506 UART: [ldev] CDI.KEYID = 6
7,639,452 UART: [ldev] SUBJECT.KEYID = 5
7,640,666 UART: [ldev] AUTHORITY.KEYID = 7
7,641,824 UART: [ldev] FE.KEYID = 1
7,653,547 UART: [ldev] Erasing FE.KEYID = 1
10,942,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,233,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,715 UART: [ldev] --
13,302,915 UART: [fwproc] Waiting for Commands...
13,305,185 UART: [fwproc] Received command 0x46574c44
13,307,373 UART: [fwproc] Received Image of size 114916 bytes
17,369,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,241 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,836,473 >>> mbox cmd response: success
17,841,343 UART: [afmc] ++
17,841,942 UART: [afmc] CDI.KEYID = 6
17,842,967 UART: [afmc] SUBJECT.KEYID = 7
17,844,150 UART: [afmc] AUTHORITY.KEYID = 5
21,159,394 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,648 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,957 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,289 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,144 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,557 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,440 UART: [afmc] --
23,529,004 UART: [cold-reset] --
23,534,112 UART: [state] Locking Datavault
23,539,288 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,045 UART: [state] Locking ICCM
23,542,202 UART: [exit] Launching FMC @ 0x40000130
23,550,601 UART:
23,550,834 UART: Running Caliptra FMC ...
23,551,861 UART:
23,552,026 UART: [state] CFI Enabled
23,559,864 UART: [fht] FMC Alias Private Key: 7
25,890,303 UART: [art] Extend RT PCRs Done
25,891,528 UART: [art] Lock RT PCRs Done
25,893,127 UART: [art] Populate DV Done
25,898,539 UART: [fht] FMC Alias Private Key: 7
25,900,079 UART: [art] Derive CDI
25,900,845 UART: [art] Store in in slot 0x4
25,943,492 UART: [art] Derive Key Pair
25,944,532 UART: [art] Store priv key in slot 0x5
29,186,385 UART: [art] Derive Key Pair - Done
29,199,439 UART: [art] Signing Cert with AUTHO
29,200,749 UART: RITY.KEYID = 7
31,480,288 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,798 UART: [art] PUB.X = 4A33285A44DFDA30DB55CC50BD731B9494385E58772742805DEC2C749C32ED8670FEDF207E87C75760671F76EDE230B6
31,489,001 UART: [art] PUB.Y = A5C31ED99180B5FBF20C986CD7C839A54D697B2BACA277121E9E78D7A5FA2BA7F33009EE679C9CC910BCD4DAD66711E0
31,496,265 UART: [art] SIG.R = 6C4B8F26008435D8D2C513B46F7588A6B4D0A2A942A9EF0E4744D46AD217BC35AAE1BDF281F4F15C8DE34B79BB604974
31,503,679 UART: [art] SIG.S = 6CE0936AF794F4F30E0F27B0B06E0E7E6F7F541525953AF2457FE87560666D3332AEF17B332BA7019F7F1E228FFEA9E3
32,808,999 UART: Caliptra RT
32,809,697 UART: [state] CFI Enabled
32,927,199 UART: [rt] RT listening for mailbox commands...
32,929,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,958,887 UART: [rt]cmd =0x46504c54, len=4
32,960,469 >>> mbox cmd response data (8 bytes)
32,961,590 UART: [rt] FIPS self test
32,962,537 UART: [kat] ++
32,962,993 UART: [kat] sha1
32,967,318 UART: [kat] SHA2-256
32,969,259 UART: [kat] SHA2-384
32,972,330 UART: [kat] SHA2-512-ACC
32,974,623 UART: [kat] ECC-384
36,213,311 UART: Fatal Error: 0x90040005
36,248,617 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,393,016 >>> mbox cmd response: failed
36,393,658 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,537,933 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,002 UART:
190,300 UART: Running Caliptra ROM ...
191,331 UART:
3,999,916 UART: [state] CFI Enabled
4,015,465 UART: [state] LifecycleState = Unprovisioned
4,017,434 UART: [state] DebugLocked = No
4,020,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,024,788 UART: [kat] SHA2-256
4,194,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,205,110 UART: [kat] ++
4,205,595 UART: [kat] sha1
4,215,620 UART: [kat] SHA2-256
4,218,321 UART: [kat] SHA2-384
4,223,719 UART: [kat] SHA2-512-ACC
4,226,070 UART: [kat] ECC-384
6,509,589 UART: [kat] HMAC-384Kdf
6,520,346 UART: [kat] LMS
7,710,417 UART: [kat] --
7,714,258 UART: [cold-reset] ++
7,716,173 UART: [fht] Storing FHT @ 0x50003400
7,727,421 UART: [idev] ++
7,728,056 UART: [idev] CDI.KEYID = 6
7,728,976 UART: [idev] SUBJECT.KEYID = 7
7,730,195 UART: [idev] UDS.KEYID = 0
7,731,817 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
7,876,091 UART: [idev] Erasing UDS.KEYID = 0
11,021,362 UART: [idev] Using Sha1 for KeyId Algorithm
11,043,451 UART: [idev] --
11,047,063 UART: [ldev] ++
11,047,647 UART: [ldev] CDI.KEYID = 6
11,048,558 UART: [ldev] SUBJECT.KEYID = 5
11,049,777 UART: [ldev] AUTHORITY.KEYID = 7
11,051,066 UART: [ldev] FE.KEYID = 1
11,060,531 UART: [ldev] Erasing FE.KEYID = 1
14,350,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,644,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,658,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,673,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,688,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,707,902 UART: [ldev] --
16,713,500 UART: [fwproc] Waiting for Commands...
16,715,923 UART: [fwproc] Received command 0x46574c44
16,718,136 UART: [fwproc] Received Image of size 114916 bytes
20,776,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,850,378 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,919,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
21,239,711 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,128,957 ready_for_fw is high
4,129,381 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,099,464 >>> mbox cmd response: success
23,741,256 UART:
23,741,673 UART: Running Caliptra FMC ...
23,742,790 UART:
23,742,943 UART: [state] CFI Enabled
23,750,625 UART: [fht] FMC Alias Private Key: 7
26,081,448 UART: [art] Extend RT PCRs Done
26,082,676 UART: [art] Lock RT PCRs Done
26,084,386 UART: [art] Populate DV Done
26,089,754 UART: [fht] FMC Alias Private Key: 7
26,091,250 UART: [art] Derive CDI
26,091,989 UART: [art] Store in in slot 0x4
26,134,763 UART: [art] Derive Key Pair
26,135,806 UART: [art] Store priv key in slot 0x5
29,378,452 UART: [art] Derive Key Pair - Done
29,391,352 UART: [art] Signing Cert with AUTHO
29,392,663 UART: RITY.KEYID = 7
31,672,063 UART: [art] Erasing AUTHORITY.KEYID = 7
31,673,591 UART: [art] PUB.X = DBE4A3F3CEA95B1DDB864582438627565756D796DC873EE1C4D95777BD6853713DA586DF8354AFFAD382B571E6AF0831
31,680,792 UART: [art] PUB.Y = FBF615CCB7C94A85E574A145F0B081F5F4ABE7B099BD307A4410BAA429D879F4CF82C056BFF81EC561ED55A80276D54A
31,688,034 UART: [art] SIG.R = 186C977A57610865B6D32C6DF874DBC98133D377FC14055F5B4DC16247351B5D950B16FCAFAE54339FE155C26213B732
31,695,437 UART: [art] SIG.S = 96EABF225524BEC4BB662D30581630371DB297BBFD8BBC2F76D88F810F2D12211E678D4D0E6718FB010679F20737CAD0
33,000,320 UART: Caliptra RT
33,001,027 UART: [state] CFI Enabled
33,118,316 UART: [rt] RT listening for mailbox commands...
33,120,163 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,149,910 UART: [rt]cmd =0x46504c54, len=4
33,151,630 >>> mbox cmd response data (8 bytes)
33,152,809 UART: [rt] FIPS self test
33,153,755 UART: [kat] ++
33,154,208 UART: [kat] sha1
33,158,770 UART: [kat] SHA2-256
33,160,645 UART: [kat] SHA2-384
33,163,579 UART: [kat] SHA2-512-ACC
33,165,891 UART: [kat] ECC-384
36,404,623 UART: Fatal Error: 0x90040005
36,440,085 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,584,457 >>> mbox cmd response: failed
36,585,139 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,729,247 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
7,328,017 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
21,286,287 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,249 UART:
192,621 UART: Running Caliptra ROM ...
193,766 UART:
193,913 UART: [state] CFI Enabled
264,044 UART: [state] LifecycleState = Unprovisioned
265,945 UART: [state] DebugLocked = No
268,678 UART: [state] WD Timer not started. Device not locked for debugging
272,584 UART: [kat] SHA2-256
451,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,318 UART: [kat] ++
463,864 UART: [kat] sha1
474,965 UART: [kat] SHA2-256
477,968 UART: [kat] SHA2-384
484,884 UART: [kat] SHA2-512-ACC
487,832 UART: [kat] ECC-384
2,951,387 UART: [kat] HMAC-384Kdf
2,974,002 UART: [kat] LMS
3,503,473 UART: [kat] --
3,505,312 UART: [cold-reset] ++
3,506,347 UART: [fht] FHT @ 0x50003400
3,517,122 UART: [idev] ++
3,517,686 UART: [idev] CDI.KEYID = 6
3,518,641 UART: [idev] SUBJECT.KEYID = 7
3,519,816 UART: [idev] UDS.KEYID = 0
3,520,718 ready_for_fw is high
3,520,949 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,665,950 UART: [idev] Erasing UDS.KEYID = 0
6,032,054 UART: [idev] Sha1 KeyId Algorithm
6,054,263 UART: [idev] --
6,057,775 UART: [ldev] ++
6,058,355 UART: [ldev] CDI.KEYID = 6
6,059,269 UART: [ldev] SUBJECT.KEYID = 5
6,060,432 UART: [ldev] AUTHORITY.KEYID = 7
6,061,668 UART: [ldev] FE.KEYID = 1
6,103,344 UART: [ldev] Erasing FE.KEYID = 1
8,606,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,363 UART: [ldev] --
10,418,801 UART: [fwproc] Wait for Commands...
10,420,801 UART: [fwproc] Recv command 0x46574c44
10,422,842 UART: [fwproc] Recv'd Img size: 115224 bytes
13,836,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,454 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,296,603 >>> mbox cmd response: success
14,301,390 UART: [afmc] ++
14,301,995 UART: [afmc] CDI.KEYID = 6
14,302,927 UART: [afmc] SUBJECT.KEYID = 7
14,304,092 UART: [afmc] AUTHORITY.KEYID = 5
16,831,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,104 UART: [afmc] --
18,632,315 UART: [cold-reset] --
18,636,012 UART: [state] Locking Datavault
18,640,719 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,425 UART: [state] Locking ICCM
18,644,279 UART: [exit] Launching FMC @ 0x40000130
18,652,671 UART:
18,652,943 UART: Running Caliptra FMC ...
18,653,993 UART:
18,654,143 UART: [state] CFI Enabled
18,715,316 UART: [fht] FMC Alias Private Key: 7
20,478,553 UART: [art] Extend RT PCRs Done
20,479,771 UART: [art] Lock RT PCRs Done
20,481,098 UART: [art] Populate DV Done
20,486,731 UART: [fht] FMC Alias Private Key: 7
20,488,327 UART: [art] Derive CDI
20,489,067 UART: [art] Store in in slot 0x4
20,548,798 UART: [art] Derive Key Pair
20,549,809 UART: [art] Store priv key in slot 0x5
23,012,951 UART: [art] Derive Key Pair - Done
23,026,066 UART: [art] Signing Cert with AUTHO
23,027,382 UART: RITY.KEYID = 7
24,738,740 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,248 UART: [art] PUB.X = 88C7C31F9716F01CBD555FF88EEA7462038EDC02342D565D2E78F9ABAC3CF547BF9048031B0E5B40B966F3D40F3506F3
24,747,526 UART: [art] PUB.Y = 40E34163EA70EA4F9ECA933921363D8251DACC3755286E87A61A56E4DB0E1DAD23F5C50E977062D12D5CD8626048D350
24,754,766 UART: [art] SIG.R = 2BFDCC2F8103039D5FB8AEA30108920A4671F9BC7594F35D5E79CA979FE4EED7EC3A21BA9486023AD7C99EF2912A1E40
24,762,162 UART: [art] SIG.S = 71540C95FF6F3FB903F69FAE5C3E57933CE1724F93AFAAE26F014EAD2838FE6EC3D4C985EF0DE36F9634F965A1F4A081
25,741,297 UART: Caliptra RT
25,742,000 UART: [state] CFI Enabled
25,907,104 UART: [rt] RT listening for mailbox commands...
25,908,949 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,780 UART: [rt]cmd =0x46504c54, len=4
25,940,500 >>> mbox cmd response data (8 bytes)
25,941,417 UART: [rt] FIPS self test
25,942,363 UART: [kat] ++
25,942,814 UART: [kat] sha1
25,947,324 UART: [kat] SHA2-256
25,949,199 UART: [kat] SHA2-384
25,952,319 UART: [kat] SHA2-512-ACC
25,954,556 UART: [kat] ECC-384
28,389,741 UART: Fatal Error: 0x90040005
28,425,131 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,569,928 >>> mbox cmd response: failed
28,570,561 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,715,043 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,053 UART:
190,355 UART: Running Caliptra ROM ...
191,469 UART:
191,621 UART: [state] CFI Enabled
267,228 UART: [state] LifecycleState = Unprovisioned
269,147 UART: [state] DebugLocked = No
270,630 UART: [state] WD Timer not started. Device not locked for debugging
273,874 UART: [kat] SHA2-256
453,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,606 UART: [kat] ++
465,052 UART: [kat] sha1
477,115 UART: [kat] SHA2-256
480,182 UART: [kat] SHA2-384
485,997 UART: [kat] SHA2-512-ACC
488,929 UART: [kat] ECC-384
2,952,820 UART: [kat] HMAC-384Kdf
2,974,383 UART: [kat] LMS
3,503,862 UART: [kat] --
3,509,358 UART: [cold-reset] ++
3,511,183 UART: [fht] FHT @ 0x50003400
3,522,917 UART: [idev] ++
3,523,491 UART: [idev] CDI.KEYID = 6
3,524,510 UART: [idev] SUBJECT.KEYID = 7
3,525,617 UART: [idev] UDS.KEYID = 0
3,527,129 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,994 UART: [idev] Erasing UDS.KEYID = 0
6,026,835 UART: [idev] Sha1 KeyId Algorithm
6,048,614 UART: [idev] --
6,052,501 UART: [ldev] ++
6,053,085 UART: [ldev] CDI.KEYID = 6
6,053,998 UART: [ldev] SUBJECT.KEYID = 5
6,055,159 UART: [ldev] AUTHORITY.KEYID = 7
6,056,397 UART: [ldev] FE.KEYID = 1
6,102,210 UART: [ldev] Erasing FE.KEYID = 1
8,607,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,872 UART: [ldev] --
10,416,395 UART: [fwproc] Wait for Commands...
10,417,948 UART: [fwproc] Recv command 0x46574c44
10,420,065 UART: [fwproc] Recv'd Img size: 115224 bytes
13,833,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,058 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,297,493 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,153 UART:
192,513 UART: Running Caliptra ROM ...
193,705 UART:
193,862 UART: [state] CFI Enabled
263,951 UART: [state] LifecycleState = Unprovisioned
266,361 UART: [state] DebugLocked = No
268,047 UART: [state] WD Timer not started. Device not locked for debugging
272,239 UART: [kat] SHA2-256
462,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,875 UART: [kat] ++
473,357 UART: [kat] sha1
486,512 UART: [kat] SHA2-256
489,522 UART: [kat] SHA2-384
496,462 UART: [kat] SHA2-512-ACC
499,028 UART: [kat] ECC-384
2,948,605 UART: [kat] HMAC-384Kdf
2,970,746 UART: [kat] LMS
3,502,526 UART: [kat] --
3,507,379 UART: [cold-reset] ++
3,509,314 UART: [fht] FHT @ 0x50003400
3,520,295 UART: [idev] ++
3,520,936 UART: [idev] CDI.KEYID = 6
3,521,973 UART: [idev] SUBJECT.KEYID = 7
3,523,149 UART: [idev] UDS.KEYID = 0
3,524,088 ready_for_fw is high
3,524,330 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,324 UART: [idev] Erasing UDS.KEYID = 0
6,029,583 UART: [idev] Sha1 KeyId Algorithm
6,051,900 UART: [idev] --
6,055,883 UART: [ldev] ++
6,056,614 UART: [ldev] CDI.KEYID = 6
6,057,538 UART: [ldev] SUBJECT.KEYID = 5
6,058,654 UART: [ldev] AUTHORITY.KEYID = 7
6,059,887 UART: [ldev] FE.KEYID = 1
6,098,622 UART: [ldev] Erasing FE.KEYID = 1
8,602,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,333 UART: [ldev] --
10,411,977 UART: [fwproc] Wait for Commands...
10,414,455 UART: [fwproc] Recv command 0x46574c44
10,416,773 UART: [fwproc] Recv'd Img size: 115224 bytes
13,867,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,847 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,612,324 >>> mbox cmd response: success
14,616,418 UART: [afmc] ++
14,617,146 UART: [afmc] CDI.KEYID = 6
14,618,398 UART: [afmc] SUBJECT.KEYID = 7
14,619,837 UART: [afmc] AUTHORITY.KEYID = 5
17,157,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,918,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,933,471 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,948,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,972,808 UART: [afmc] --
18,976,244 UART: [cold-reset] --
18,980,807 UART: [state] Locking Datavault
18,985,857 UART: [state] Locking PCR0, PCR1 and PCR31
18,988,044 UART: [state] Locking ICCM
18,989,342 UART: [exit] Launching FMC @ 0x40000130
18,998,012 UART:
18,998,250 UART: Running Caliptra FMC ...
18,999,354 UART:
18,999,521 UART: [state] CFI Enabled
19,058,814 UART: [fht] FMC Alias Private Key: 7
20,822,766 UART: [art] Extend RT PCRs Done
20,823,983 UART: [art] Lock RT PCRs Done
20,825,503 UART: [art] Populate DV Done
20,830,916 UART: [fht] FMC Alias Private Key: 7
20,832,507 UART: [art] Derive CDI
20,833,324 UART: [art] Store in in slot 0x4
20,891,505 UART: [art] Derive Key Pair
20,892,541 UART: [art] Store priv key in slot 0x5
23,356,488 UART: [art] Derive Key Pair - Done
23,369,544 UART: [art] Signing Cert with AUTHO
23,370,852 UART: RITY.KEYID = 7
25,081,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,083,491 UART: [art] PUB.X = 3430DF60FC30AD5D6736EFB4FC8C581F85D3D43866637093802BEB6D1BAAC04F4DE2D861D748C3F3056E3E15FF03627C
25,090,755 UART: [art] PUB.Y = 86D109FCD4F54EE370B88033585BD4221DE684EB972A71BE3893FE947B862EBD786392E96DEF3FB978209A776C87B7FA
25,097,993 UART: [art] SIG.R = 6FD8B38293988AA9E0CE5D0689CDC6D0E47B5C27E30D7840BA55AE3439C9232128295ED2D69BBCA726085A7D166075F0
25,105,404 UART: [art] SIG.S = 00B2376B28ACB297D8FDC72F527A2DCBF5E13E05565F7898F6025AA5329B79A86F9277A881947FCBCCDE8C2489D1635A
26,083,810 UART: Caliptra RT
26,084,529 UART: [state] CFI Enabled
26,250,149 UART: [rt] RT listening for mailbox commands...
26,252,015 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,281,871 UART: [rt]cmd =0x46504c54, len=4
26,283,504 >>> mbox cmd response data (8 bytes)
26,284,745 UART: [rt] FIPS self test
26,285,687 UART: [kat] ++
26,286,156 UART: [kat] sha1
26,290,642 UART: [kat] SHA2-256
26,292,572 UART: [kat] SHA2-384
26,295,367 UART: [kat] SHA2-512-ACC
26,297,586 UART: [kat] ECC-384
28,732,021 UART: Fatal Error: 0x90040005
28,767,263 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,912,411 >>> mbox cmd response: failed
28,913,069 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,057,716 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,143 UART:
190,436 UART: Running Caliptra ROM ...
191,467 UART:
191,610 UART: [state] CFI Enabled
269,132 UART: [state] LifecycleState = Unprovisioned
271,554 UART: [state] DebugLocked = No
273,642 UART: [state] WD Timer not started. Device not locked for debugging
278,395 UART: [kat] SHA2-256
468,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,060 UART: [kat] ++
479,538 UART: [kat] sha1
492,199 UART: [kat] SHA2-256
495,206 UART: [kat] SHA2-384
499,835 UART: [kat] SHA2-512-ACC
502,459 UART: [kat] ECC-384
2,951,965 UART: [kat] HMAC-384Kdf
2,976,240 UART: [kat] LMS
3,507,964 UART: [kat] --
3,512,447 UART: [cold-reset] ++
3,514,275 UART: [fht] FHT @ 0x50003400
3,526,194 UART: [idev] ++
3,526,879 UART: [idev] CDI.KEYID = 6
3,527,822 UART: [idev] SUBJECT.KEYID = 7
3,529,037 UART: [idev] UDS.KEYID = 0
3,530,557 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,675,414 UART: [idev] Erasing UDS.KEYID = 0
6,032,864 UART: [idev] Sha1 KeyId Algorithm
6,056,358 UART: [idev] --
6,060,245 UART: [ldev] ++
6,060,942 UART: [ldev] CDI.KEYID = 6
6,061,858 UART: [ldev] SUBJECT.KEYID = 5
6,062,960 UART: [ldev] AUTHORITY.KEYID = 7
6,064,250 UART: [ldev] FE.KEYID = 1
6,104,762 UART: [ldev] Erasing FE.KEYID = 1
8,608,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,445 UART: [ldev] --
10,418,438 UART: [fwproc] Wait for Commands...
10,421,346 UART: [fwproc] Recv command 0x46574c44
10,423,610 UART: [fwproc] Recv'd Img size: 115224 bytes
13,883,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,961,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,042 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,626,047 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,436,957 ready_for_fw is high
3,437,341 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,750,715 >>> mbox cmd response: success
19,063,416 UART:
19,063,833 UART: Running Caliptra FMC ...
19,064,949 UART:
19,065,115 UART: [state] CFI Enabled
19,129,653 UART: [fht] FMC Alias Private Key: 7
20,893,069 UART: [art] Extend RT PCRs Done
20,894,353 UART: [art] Lock RT PCRs Done
20,896,331 UART: [art] Populate DV Done
20,901,606 UART: [fht] FMC Alias Private Key: 7
20,903,208 UART: [art] Derive CDI
20,904,027 UART: [art] Store in in slot 0x4
20,962,372 UART: [art] Derive Key Pair
20,963,410 UART: [art] Store priv key in slot 0x5
23,426,310 UART: [art] Derive Key Pair - Done
23,439,570 UART: [art] Signing Cert with AUTHO
23,440,972 UART: RITY.KEYID = 7
25,152,844 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,383 UART: [art] PUB.X = A383515EA7646B7FA2C710F5C90A56A006FE60A24B459EC18CE2D9172162B2C9E8E17F410EE2262534D2392CBA737D09
25,161,605 UART: [art] PUB.Y = 7CCF7EC1357C609B368AA862E1E89310367724F41D5D861F90DA38988DB892F38EEA7917F0C9A03CB971F82079A6FC07
25,168,888 UART: [art] SIG.R = 5350438FE0F70B2853F78657F9508F1E2D48EA6DBA4521A74BC0CCFF5FA0702927A124FD2EBCA20541A5BF1AE14AE4E1
25,176,293 UART: [art] SIG.S = 382ABEFD7C421AC23D06B1BAE15C4435E9902CF3BCC9DA70958F05344E11F078BB0774BE7E67C536B0F9A8063AF0B24D
26,154,971 UART: Caliptra RT
26,155,686 UART: [state] CFI Enabled
26,321,148 UART: [rt] RT listening for mailbox commands...
26,323,007 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,352,716 UART: [rt]cmd =0x46504c54, len=4
26,354,240 >>> mbox cmd response data (8 bytes)
26,355,214 UART: [rt] FIPS self test
26,356,155 UART: [kat] ++
26,356,616 UART: [kat] sha1
26,361,073 UART: [kat] SHA2-256
26,362,974 UART: [kat] SHA2-384
26,365,945 UART: [kat] SHA2-512-ACC
26,368,201 UART: [kat] ECC-384
28,803,131 UART: Fatal Error: 0x90040005
28,838,377 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,983,147 >>> mbox cmd response: failed
28,983,819 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,128,512 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,419,472 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,714,267 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,487 UART:
192,849 UART: Running Caliptra ROM ...
193,944 UART:
603,647 UART: [state] CFI Enabled
618,458 UART: [state] LifecycleState = Unprovisioned
620,852 UART: [state] DebugLocked = No
622,178 UART: [state] WD Timer not started. Device not locked for debugging
626,951 UART: [kat] SHA2-256
816,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,646 UART: [kat] ++
828,097 UART: [kat] sha1
838,833 UART: [kat] SHA2-256
841,923 UART: [kat] SHA2-384
847,491 UART: [kat] SHA2-512-ACC
850,073 UART: [kat] ECC-384
3,288,760 UART: [kat] HMAC-384Kdf
3,302,060 UART: [kat] LMS
3,833,869 UART: [kat] --
3,838,788 UART: [cold-reset] ++
3,839,657 UART: [fht] FHT @ 0x50003400
3,852,635 UART: [idev] ++
3,853,349 UART: [idev] CDI.KEYID = 6
3,854,393 UART: [idev] SUBJECT.KEYID = 7
3,855,502 UART: [idev] UDS.KEYID = 0
3,856,456 ready_for_fw is high
3,856,658 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,001,378 UART: [idev] Erasing UDS.KEYID = 0
6,333,261 UART: [idev] Sha1 KeyId Algorithm
6,355,197 UART: [idev] --
6,359,994 UART: [ldev] ++
6,360,727 UART: [ldev] CDI.KEYID = 6
6,361,637 UART: [ldev] SUBJECT.KEYID = 5
6,362,792 UART: [ldev] AUTHORITY.KEYID = 7
6,364,024 UART: [ldev] FE.KEYID = 1
6,374,345 UART: [ldev] Erasing FE.KEYID = 1
8,848,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,908 UART: [ldev] --
10,637,837 UART: [fwproc] Wait for Commands...
10,640,424 UART: [fwproc] Recv command 0x46574c44
10,642,742 UART: [fwproc] Recv'd Img size: 115224 bytes
14,105,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,467 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,850,700 >>> mbox cmd response: success
14,854,631 UART: [afmc] ++
14,855,337 UART: [afmc] CDI.KEYID = 6
14,856,527 UART: [afmc] SUBJECT.KEYID = 7
14,858,022 UART: [afmc] AUTHORITY.KEYID = 5
17,359,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,946 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,985 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,327 UART: [afmc] --
19,158,300 UART: [cold-reset] --
19,160,970 UART: [state] Locking Datavault
19,166,865 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,048 UART: [state] Locking ICCM
19,170,370 UART: [exit] Launching FMC @ 0x40000130
19,179,030 UART:
19,179,269 UART: Running Caliptra FMC ...
19,180,370 UART:
19,180,527 UART: [state] CFI Enabled
19,188,417 UART: [fht] FMC Alias Private Key: 7
20,945,691 UART: [art] Extend RT PCRs Done
20,946,894 UART: [art] Lock RT PCRs Done
20,948,654 UART: [art] Populate DV Done
20,954,025 UART: [fht] FMC Alias Private Key: 7
20,955,729 UART: [art] Derive CDI
20,956,465 UART: [art] Store in in slot 0x4
20,999,222 UART: [art] Derive Key Pair
21,000,223 UART: [art] Store priv key in slot 0x5
23,427,108 UART: [art] Derive Key Pair - Done
23,440,377 UART: [art] Signing Cert with AUTHO
23,441,681 UART: RITY.KEYID = 7
25,147,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,636 UART: [art] PUB.X = 3DC51B109F135F73B77CD4BBA88D696FC2ACB4348E83D60F46AA4FAA6521EBBDDEA47F0B47C1159ACA288F99820B3124
25,155,939 UART: [art] PUB.Y = 6F211485AFFB85DBCC140103FA986D54586ABA3228B945A903173E9232D3482E90DEDA7B4A635F359FB7D5EF7696A94E
25,163,172 UART: [art] SIG.R = FFB32566B4CCF8FDE60B4399C7CF122AE1CC500A1660903A5CF3A14EE6A1A568EB0FC49FE1F3B82A4142382B3C5693DA
25,170,563 UART: [art] SIG.S = 5E5038C975EE0B10CAAA007F6B691777C4ACCD51CABB13CFD0C2675956DD0CD889C90E60BC8610CE852F0067742F9C8E
26,150,041 UART: Caliptra RT
26,150,753 UART: [state] CFI Enabled
26,268,036 UART: [rt] RT listening for mailbox commands...
26,269,908 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,299,755 UART: [rt]cmd =0x46504c54, len=4
26,301,505 >>> mbox cmd response data (8 bytes)
26,302,714 UART: [rt] FIPS self test
26,303,665 UART: [kat] ++
26,304,122 UART: [kat] sha1
26,308,526 UART: [kat] SHA2-256
26,310,399 UART: [kat] SHA2-384
26,313,461 UART: [kat] SHA2-512-ACC
26,315,697 UART: [kat] ECC-384
28,739,707 UART: Fatal Error: 0x90040005
28,774,957 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,919,727 >>> mbox cmd response: failed
28,920,321 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,064,992 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
190,159 UART:
190,448 UART: Running Caliptra ROM ...
191,557 UART:
11,468,130 UART: [state] CFI Enabled
11,482,499 UART: [state] LifecycleState = Unprovisioned
11,484,871 UART: [state] DebugLocked = No
11,486,749 UART: [state] WD Timer not started. Device not locked for debugging
11,490,458 UART: [kat] SHA2-256
11,680,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,690,944 UART: [kat] ++
11,691,539 UART: [kat] sha1
11,703,565 UART: [kat] SHA2-256
11,706,584 UART: [kat] SHA2-384
11,711,925 UART: [kat] SHA2-512-ACC
11,714,491 UART: [kat] ECC-384
14,152,841 UART: [kat] HMAC-384Kdf
14,166,849 UART: [kat] LMS
14,698,662 UART: [kat] --
14,704,595 UART: [cold-reset] ++
14,706,740 UART: [fht] FHT @ 0x50003400
14,717,930 UART: [idev] ++
14,718,605 UART: [idev] CDI.KEYID = 6
14,719,565 UART: [idev] SUBJECT.KEYID = 7
14,720,777 UART: [idev] UDS.KEYID = 0
14,722,292 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,866,939 UART: [idev] Erasing UDS.KEYID = 0
17,195,230 UART: [idev] Sha1 KeyId Algorithm
17,218,406 UART: [idev] --
17,223,855 UART: [ldev] ++
17,224,531 UART: [ldev] CDI.KEYID = 6
17,225,435 UART: [ldev] SUBJECT.KEYID = 5
17,226,614 UART: [ldev] AUTHORITY.KEYID = 7
17,227,842 UART: [ldev] FE.KEYID = 1
17,238,768 UART: [ldev] Erasing FE.KEYID = 1
19,716,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,437,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,453,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,468,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,483,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,505,105 UART: [ldev] --
21,510,319 UART: [fwproc] Wait for Commands...
21,512,738 UART: [fwproc] Recv command 0x46574c44
21,515,057 UART: [fwproc] Recv'd Img size: 115224 bytes
24,985,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,060,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,176,238 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
25,724,130 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,106 writing to cptra_bootfsm_go
3,751,916 ready_for_fw is high
3,752,354 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,979,422 >>> mbox cmd response: success
19,230,003 UART:
19,230,426 UART: Running Caliptra FMC ...
19,231,549 UART:
19,231,713 UART: [state] CFI Enabled
19,239,927 UART: [fht] FMC Alias Private Key: 7
20,996,884 UART: [art] Extend RT PCRs Done
20,998,159 UART: [art] Lock RT PCRs Done
20,999,928 UART: [art] Populate DV Done
21,005,419 UART: [fht] FMC Alias Private Key: 7
21,007,131 UART: [art] Derive CDI
21,007,955 UART: [art] Store in in slot 0x4
21,050,585 UART: [art] Derive Key Pair
21,051,627 UART: [art] Store priv key in slot 0x5
23,477,986 UART: [art] Derive Key Pair - Done
23,490,883 UART: [art] Signing Cert with AUTHO
23,492,196 UART: RITY.KEYID = 7
25,197,896 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,403 UART: [art] PUB.X = 5CA08A64B190554ED805FAE50D517DCC42AF195632A3EEF17A85A0C01D1639741A8D0D545D347BCF8277C1AA38C2D6EC
25,206,690 UART: [art] PUB.Y = AA49BC475D0827CD8FE3EFC7A35D867230BFA6C0AE3BC09B3CAD9438E915ED3FF2B4B58CC2E20F106DDC30216920417F
25,213,973 UART: [art] SIG.R = 9FF17729A846B73A4490BBBCC0B084150300FB050732DF533FD7A50593927DCE1B8C0D03201301B32235C063AE280F57
25,221,327 UART: [art] SIG.S = C54195B1BCCEFB7CC0F530957C21ECD8F6E63A2EBB58343F2297B787DB6251801C77AD821C18B0E5A78004A3DBBD36FE
26,199,872 UART: Caliptra RT
26,200,585 UART: [state] CFI Enabled
26,318,275 UART: [rt] RT listening for mailbox commands...
26,320,126 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,349,989 UART: [rt]cmd =0x46504c54, len=4
26,351,759 >>> mbox cmd response data (8 bytes)
26,352,771 UART: [rt] FIPS self test
26,353,722 UART: [kat] ++
26,354,172 UART: [kat] sha1
26,358,520 UART: [kat] SHA2-256
26,360,447 UART: [kat] SHA2-384
26,363,355 UART: [kat] SHA2-512-ACC
26,365,656 UART: [kat] ECC-384
28,789,408 UART: Fatal Error: 0x90040005
28,824,850 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,969,569 >>> mbox cmd response: failed
28,970,245 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,114,708 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
14,568,431 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
25,790,937 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,649 UART: [kat] SHA2-256
892,587 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
907,028 UART: [kat] LMS
1,475,224 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,471 UART: [fht] Storing FHT @ 0x50003400
1,479,354 UART: [idev] ++
1,479,522 UART: [idev] CDI.KEYID = 6
1,479,882 UART: [idev] SUBJECT.KEYID = 7
1,480,306 UART: [idev] UDS.KEYID = 0
1,480,651 ready_for_fw is high
1,480,651 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,996 UART: [idev] Erasing UDS.KEYID = 0
1,504,828 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,404 UART: [idev] --
1,514,585 UART: [ldev] ++
1,514,753 UART: [ldev] CDI.KEYID = 6
1,515,116 UART: [ldev] SUBJECT.KEYID = 5
1,515,542 UART: [ldev] AUTHORITY.KEYID = 7
1,516,005 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,672 UART: [ldev] --
1,586,039 UART: [fwproc] Waiting for Commands...
1,586,834 UART: [fwproc] Received command 0x46574c44
1,587,625 UART: [fwproc] Received Image of size 115224 bytes
2,895,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,290 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,767 >>> mbox cmd response: success
3,090,797 UART: [afmc] ++
3,090,965 UART: [afmc] CDI.KEYID = 6
3,091,327 UART: [afmc] SUBJECT.KEYID = 7
3,091,752 UART: [afmc] AUTHORITY.KEYID = 5
3,127,321 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,531 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,924 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,614 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,731 UART: [afmc] --
3,170,641 UART: [cold-reset] --
3,171,285 UART: [state] Locking Datavault
3,172,444 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,048 UART: [state] Locking ICCM
3,173,722 UART: [exit] Launching FMC @ 0x40000130
3,179,051 UART:
3,179,067 UART: Running Caliptra FMC ...
3,179,475 UART:
3,179,529 UART: [state] CFI Enabled
3,190,074 UART: [fht] FMC Alias Private Key: 7
3,298,259 UART: [art] Extend RT PCRs Done
3,298,687 UART: [art] Lock RT PCRs Done
3,300,291 UART: [art] Populate DV Done
3,308,568 UART: [fht] FMC Alias Private Key: 7
3,309,516 UART: [art] Derive CDI
3,309,796 UART: [art] Store in in slot 0x4
3,395,269 UART: [art] Derive Key Pair
3,395,629 UART: [art] Store priv key in slot 0x5
3,408,351 UART: [art] Derive Key Pair - Done
3,423,169 UART: [art] Signing Cert with AUTHO
3,423,649 UART: RITY.KEYID = 7
3,438,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,208 UART: [art] PUB.X = 7785C8D0FA99D7BAEAEF679924637E7233C609971F48556345E05AE419227E9B84B921EEC5B47B191E31D5F0F3949A24
3,445,973 UART: [art] PUB.Y = CBA8830DA454CA49585ABCB74D54BEDDC4C321E27CC8D288CD507F582E30149214890E2EFEFFBE90720760395A9D6F5F
3,452,928 UART: [art] SIG.R = 6A24EA45F4D30478C77713BD3789C211C0AC910E1AC0139ADF3766E493EE8217CFBB6AC13D0F797D8C378419755C9430
3,459,691 UART: [art] SIG.S = 0706283503F8EE5F4C4DE9EF2AE200734D2ABF77D5A698707336B4D0EBCF7EE9D25AAAC525FC8219666C10F6E15147B1
3,483,687 UART: Caliptra RT
3,483,941 UART: [state] CFI Enabled
3,591,838 UART: [rt] RT listening for mailbox commands...
3,592,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,843 UART: [rt]cmd =0x46504c54, len=4
3,622,923 >>> mbox cmd response data (8 bytes)
3,623,182 UART: [rt] FIPS self test
3,623,510 UART: [kat] ++
3,623,662 UART: [kat] sha1
3,628,020 UART: [kat] SHA2-256
3,630,042 UART: [kat] SHA2-384
3,633,009 UART: [kat] SHA2-512-ACC
3,634,936 UART: [kat] ECC-384
3,644,039 UART: Fatal Error: 0x90040005
3,645,589 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,645,594 >>> mbox cmd response: failed
3,645,594 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,645,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,997 UART: [kat] SHA2-256
881,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,043 UART: [kat] ++
886,195 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
894,940 UART: [kat] SHA2-512-ACC
896,841 UART: [kat] ECC-384
902,240 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,476,267 UART: [cold-reset] ++
1,476,667 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,832 UART: [idev] Erasing UDS.KEYID = 0
1,505,002 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,574 UART: [idev] --
1,514,551 UART: [ldev] ++
1,514,719 UART: [ldev] CDI.KEYID = 6
1,515,082 UART: [ldev] SUBJECT.KEYID = 5
1,515,508 UART: [ldev] AUTHORITY.KEYID = 7
1,515,971 UART: [ldev] FE.KEYID = 1
1,520,911 UART: [ldev] Erasing FE.KEYID = 1
1,546,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,136 UART: [ldev] --
1,585,437 UART: [fwproc] Waiting for Commands...
1,586,236 UART: [fwproc] Received command 0x46574c44
1,587,027 UART: [fwproc] Received Image of size 115224 bytes
2,894,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,106 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,725 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,285 ready_for_fw is high
1,362,285 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,393 >>> mbox cmd response: success
3,001,521 UART:
3,001,537 UART: Running Caliptra FMC ...
3,001,945 UART:
3,001,999 UART: [state] CFI Enabled
3,012,582 UART: [fht] FMC Alias Private Key: 7
3,120,225 UART: [art] Extend RT PCRs Done
3,120,653 UART: [art] Lock RT PCRs Done
3,122,341 UART: [art] Populate DV Done
3,130,624 UART: [fht] FMC Alias Private Key: 7
3,131,694 UART: [art] Derive CDI
3,131,974 UART: [art] Store in in slot 0x4
3,218,067 UART: [art] Derive Key Pair
3,218,427 UART: [art] Store priv key in slot 0x5
3,232,201 UART: [art] Derive Key Pair - Done
3,246,871 UART: [art] Signing Cert with AUTHO
3,247,351 UART: RITY.KEYID = 7
3,262,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,140 UART: [art] PUB.X = 78B27821BA2B6156E4FEA3F8373DFD696B99BC315FA0F17981D523DCD81F743A79C72E4F97D6FFC53FC94B96040309B3
3,269,909 UART: [art] PUB.Y = 74D2F671050B007192603378FDBC21A8A519E6A00D93A40EB3DE3183F34A186A5883AF8CBDDD20F76FC3791A2AFDF608
3,276,830 UART: [art] SIG.R = B2CA38A12BF4A5184109036CD72BE95FF16BF43BA7047BC5553D2E5D546961B1DEBD15FDC579C0BF7ADA237E45F7FA9D
3,283,611 UART: [art] SIG.S = CDBB01BB21DB68978660930EDD080565E7F6676B607BBA36DD8728B656F76DF36AC675E3EBEDE59264C5C49E0CD964CF
3,307,461 UART: Caliptra RT
3,307,715 UART: [state] CFI Enabled
3,416,130 UART: [rt] RT listening for mailbox commands...
3,416,793 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,223 UART: [rt]cmd =0x46504c54, len=4
3,447,323 >>> mbox cmd response data (8 bytes)
3,447,598 UART: [rt] FIPS self test
3,447,926 UART: [kat] ++
3,448,078 UART: [kat] sha1
3,452,318 UART: [kat] SHA2-256
3,454,340 UART: [kat] SHA2-384
3,457,227 UART: [kat] SHA2-512-ACC
3,459,154 UART: [kat] ECC-384
3,468,371 UART: Fatal Error: 0x90040005
3,469,921 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,469,926 >>> mbox cmd response: failed
3,469,926 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,469,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,361 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,951 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,574 UART: [kat] SHA2-256
882,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,620 UART: [kat] ++
886,772 UART: [kat] sha1
891,206 UART: [kat] SHA2-256
893,144 UART: [kat] SHA2-384
896,059 UART: [kat] SHA2-512-ACC
897,960 UART: [kat] ECC-384
903,821 UART: [kat] HMAC-384Kdf
908,401 UART: [kat] LMS
1,476,597 UART: [kat] --
1,477,698 UART: [cold-reset] ++
1,478,190 UART: [fht] Storing FHT @ 0x50003400
1,480,971 UART: [idev] ++
1,481,139 UART: [idev] CDI.KEYID = 6
1,481,499 UART: [idev] SUBJECT.KEYID = 7
1,481,923 UART: [idev] UDS.KEYID = 0
1,482,268 ready_for_fw is high
1,482,268 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,490,071 UART: [idev] Erasing UDS.KEYID = 0
1,506,515 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,199 UART: [idev] --
1,516,226 UART: [ldev] ++
1,516,394 UART: [ldev] CDI.KEYID = 6
1,516,757 UART: [ldev] SUBJECT.KEYID = 5
1,517,183 UART: [ldev] AUTHORITY.KEYID = 7
1,517,646 UART: [ldev] FE.KEYID = 1
1,522,826 UART: [ldev] Erasing FE.KEYID = 1
1,548,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,843 UART: [ldev] --
1,587,198 UART: [fwproc] Waiting for Commands...
1,587,915 UART: [fwproc] Received command 0x46574c44
1,588,706 UART: [fwproc] Received Image of size 115224 bytes
2,896,973 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,689 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,256 >>> mbox cmd response: success
3,092,284 UART: [afmc] ++
3,092,452 UART: [afmc] CDI.KEYID = 6
3,092,814 UART: [afmc] SUBJECT.KEYID = 7
3,093,239 UART: [afmc] AUTHORITY.KEYID = 5
3,128,600 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,068 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,461 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,151 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,100 UART: [afmc] --
3,172,214 UART: [cold-reset] --
3,172,762 UART: [state] Locking Datavault
3,173,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,313 UART: [state] Locking ICCM
3,174,765 UART: [exit] Launching FMC @ 0x40000130
3,180,094 UART:
3,180,110 UART: Running Caliptra FMC ...
3,180,518 UART:
3,180,661 UART: [state] CFI Enabled
3,191,294 UART: [fht] FMC Alias Private Key: 7
3,299,373 UART: [art] Extend RT PCRs Done
3,299,801 UART: [art] Lock RT PCRs Done
3,301,433 UART: [art] Populate DV Done
3,309,734 UART: [fht] FMC Alias Private Key: 7
3,310,796 UART: [art] Derive CDI
3,311,076 UART: [art] Store in in slot 0x4
3,396,735 UART: [art] Derive Key Pair
3,397,095 UART: [art] Store priv key in slot 0x5
3,410,927 UART: [art] Derive Key Pair - Done
3,425,485 UART: [art] Signing Cert with AUTHO
3,425,965 UART: RITY.KEYID = 7
3,441,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,016 UART: [art] PUB.X = A6F131C077E921773C1B1E6B4A93DA9A0DB4639AAACC541C4EB6BCFF87BE9D2AD9B0828FC9DFC86DE21F8BAFCC98C4D5
3,448,815 UART: [art] PUB.Y = 2B9403E4FB0CCE473817C3D43041459E7596C28A5990D7130C5A6E381E9BC8DF5B66A9D70BA6034F4EB7C8F0393F9B08
3,455,751 UART: [art] SIG.R = 917D13F91BA7C95172368192C2AA2C9C152648B2658398E8FB7F796753B122A9402CDF800FA73382370478CD2773F61A
3,462,505 UART: [art] SIG.S = BE6B8E0C8BC83C9234A228D4FF0EC2709F02BBDEBEC9A82047D3947A1F8950E2794BF9D4D9F62593044E2BD30DD14824
3,485,607 UART: Caliptra RT
3,485,953 UART: [state] CFI Enabled
3,594,332 UART: [rt] RT listening for mailbox commands...
3,594,995 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,455 UART: [rt]cmd =0x46504c54, len=4
3,625,579 >>> mbox cmd response data (8 bytes)
3,625,798 UART: [rt] FIPS self test
3,626,126 UART: [kat] ++
3,626,278 UART: [kat] sha1
3,630,580 UART: [kat] SHA2-256
3,632,602 UART: [kat] SHA2-384
3,635,369 UART: [kat] SHA2-512-ACC
3,637,296 UART: [kat] ECC-384
3,646,685 UART: Fatal Error: 0x90040005
3,648,235 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,648,240 >>> mbox cmd response: failed
3,648,240 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,648,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,916 UART: [kat] SHA2-256
892,854 UART: [kat] SHA2-384
895,587 UART: [kat] SHA2-512-ACC
897,488 UART: [kat] ECC-384
903,233 UART: [kat] HMAC-384Kdf
907,907 UART: [kat] LMS
1,476,103 UART: [kat] --
1,477,014 UART: [cold-reset] ++
1,477,396 UART: [fht] Storing FHT @ 0x50003400
1,480,031 UART: [idev] ++
1,480,199 UART: [idev] CDI.KEYID = 6
1,480,559 UART: [idev] SUBJECT.KEYID = 7
1,480,983 UART: [idev] UDS.KEYID = 0
1,481,328 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,249 UART: [idev] Erasing UDS.KEYID = 0
1,505,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,481 UART: [idev] --
1,515,624 UART: [ldev] ++
1,515,792 UART: [ldev] CDI.KEYID = 6
1,516,155 UART: [ldev] SUBJECT.KEYID = 5
1,516,581 UART: [ldev] AUTHORITY.KEYID = 7
1,517,044 UART: [ldev] FE.KEYID = 1
1,522,318 UART: [ldev] Erasing FE.KEYID = 1
1,547,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,221 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,323 UART: [fwproc] Received command 0x46574c44
1,588,114 UART: [fwproc] Received Image of size 115224 bytes
2,896,133 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,029 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,522 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,940 ready_for_fw is high
1,362,940 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,798 >>> mbox cmd response: success
3,001,600 UART:
3,001,616 UART: Running Caliptra FMC ...
3,002,024 UART:
3,002,167 UART: [state] CFI Enabled
3,012,982 UART: [fht] FMC Alias Private Key: 7
3,120,921 UART: [art] Extend RT PCRs Done
3,121,349 UART: [art] Lock RT PCRs Done
3,122,773 UART: [art] Populate DV Done
3,131,010 UART: [fht] FMC Alias Private Key: 7
3,132,082 UART: [art] Derive CDI
3,132,362 UART: [art] Store in in slot 0x4
3,217,649 UART: [art] Derive Key Pair
3,218,009 UART: [art] Store priv key in slot 0x5
3,231,485 UART: [art] Derive Key Pair - Done
3,246,048 UART: [art] Signing Cert with AUTHO
3,246,528 UART: RITY.KEYID = 7
3,261,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,761 UART: [art] PUB.X = 3E16B28DEA008A8C21A896032DCDFF399018E4047183ADABDC88B0B9B528CB0BA4375470889FD6C9E526DA440854C7FF
3,269,507 UART: [art] PUB.Y = 30CD49B29F472E593E60405ED50557FE98E13CAD066A6F8ACB2AD2B6D4062E57018BDE714A487B9443AC6DE0ACC5E71D
3,276,459 UART: [art] SIG.R = 6EC46F81DF8E7665EDC55CDB31F94B3C63321462B7A467391621626519886C71EA0BFEBA1FAE01F6B2C29FFAED7E9624
3,283,235 UART: [art] SIG.S = F149513EE1FE9667A6BF14C41DD0A0ABD2B43B3F481840312F2807D274B1E2801A57F1F873909410660A5290FF512755
3,307,210 UART: Caliptra RT
3,307,556 UART: [state] CFI Enabled
3,415,238 UART: [rt] RT listening for mailbox commands...
3,415,901 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,413 UART: [rt]cmd =0x46504c54, len=4
3,446,691 >>> mbox cmd response data (8 bytes)
3,447,002 UART: [rt] FIPS self test
3,447,330 UART: [kat] ++
3,447,482 UART: [kat] sha1
3,451,832 UART: [kat] SHA2-256
3,453,854 UART: [kat] SHA2-384
3,456,713 UART: [kat] SHA2-512-ACC
3,458,640 UART: [kat] ECC-384
3,467,765 UART: Fatal Error: 0x90040005
3,469,315 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,469,320 >>> mbox cmd response: failed
3,469,320 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,469,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,382 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,941,024 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,814 UART: [kat] SHA2-512-ACC
908,715 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,852 UART: [kat] LMS
1,171,180 UART: [kat] --
1,171,963 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,175,012 UART: [idev] ++
1,175,180 UART: [idev] CDI.KEYID = 6
1,175,540 UART: [idev] SUBJECT.KEYID = 7
1,175,964 UART: [idev] UDS.KEYID = 0
1,176,309 ready_for_fw is high
1,176,309 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,916 UART: [idev] Erasing UDS.KEYID = 0
1,201,439 UART: [idev] Sha1 KeyId Algorithm
1,209,941 UART: [idev] --
1,210,867 UART: [ldev] ++
1,211,035 UART: [ldev] CDI.KEYID = 6
1,211,398 UART: [ldev] SUBJECT.KEYID = 5
1,211,824 UART: [ldev] AUTHORITY.KEYID = 7
1,212,287 UART: [ldev] FE.KEYID = 1
1,217,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,811 UART: [ldev] --
1,283,312 UART: [fwproc] Wait for Commands...
1,284,112 UART: [fwproc] Recv command 0x46574c44
1,284,840 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,943 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,998 >>> mbox cmd response: success
2,787,248 UART: [afmc] ++
2,787,416 UART: [afmc] CDI.KEYID = 6
2,787,778 UART: [afmc] SUBJECT.KEYID = 7
2,788,203 UART: [afmc] AUTHORITY.KEYID = 5
2,823,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,255 UART: [afmc] --
2,866,285 UART: [cold-reset] --
2,867,133 UART: [state] Locking Datavault
2,868,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,890 UART: [state] Locking ICCM
2,869,508 UART: [exit] Launching FMC @ 0x40000130
2,874,837 UART:
2,874,853 UART: Running Caliptra FMC ...
2,875,261 UART:
2,875,315 UART: [state] CFI Enabled
2,885,904 UART: [fht] FMC Alias Private Key: 7
2,994,309 UART: [art] Extend RT PCRs Done
2,994,737 UART: [art] Lock RT PCRs Done
2,996,213 UART: [art] Populate DV Done
3,004,558 UART: [fht] FMC Alias Private Key: 7
3,005,568 UART: [art] Derive CDI
3,005,848 UART: [art] Store in in slot 0x4
3,091,125 UART: [art] Derive Key Pair
3,091,485 UART: [art] Store priv key in slot 0x5
3,103,741 UART: [art] Derive Key Pair - Done
3,118,488 UART: [art] Signing Cert with AUTHO
3,118,968 UART: RITY.KEYID = 7
3,134,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,795 UART: [art] PUB.X = 6540488982F6A42C4DF7E31B0B61FCE943993966D417A861732721095A082C915D536933BBEEA7B515DA4565D8968887
3,141,544 UART: [art] PUB.Y = 3AD8B2BDEFD52F703E7DBE74C42A006506730424179B98222C4AB41687F7DAC573E85081F4AA06741A66065F6C881BA5
3,148,462 UART: [art] SIG.R = 51934EFBBDE939E1377C1AC3A3381AE6D10CEA6DA414D0F5CC0B9BC9CD53FC91B9A66476F5D4CBB26B6C2F0F6DA67EAB
3,155,253 UART: [art] SIG.S = 2574A95B04B5AC14A224F663581F7E233D1D5A773BAA0A410FBB7137B5F9A8F903D8EF5D1C640D20CAC51B0004B8ACE7
3,179,512 UART: Caliptra RT
3,179,766 UART: [state] CFI Enabled
3,286,734 UART: [rt] RT listening for mailbox commands...
3,287,397 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,201 UART: [rt]cmd =0x46504c54, len=4
3,318,269 >>> mbox cmd response data (8 bytes)
3,318,548 UART: [rt] FIPS self test
3,318,876 UART: [kat] ++
3,319,028 UART: [kat] sha1
3,323,346 UART: [kat] SHA2-256
3,325,368 UART: [kat] SHA2-384
3,328,393 UART: [kat] SHA2-512-ACC
3,330,320 UART: [kat] ECC-384
3,339,023 UART: Fatal Error: 0x90040005
3,340,573 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,578 >>> mbox cmd response: failed
3,340,578 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
893,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,581 UART: [kat] ++
897,733 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,812 UART: [kat] SHA2-512-ACC
908,713 UART: [kat] ECC-384
918,250 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,171,977 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,175,058 UART: [idev] ++
1,175,226 UART: [idev] CDI.KEYID = 6
1,175,586 UART: [idev] SUBJECT.KEYID = 7
1,176,010 UART: [idev] UDS.KEYID = 0
1,176,355 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,134 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,209,067 UART: [idev] --
1,210,059 UART: [ldev] ++
1,210,227 UART: [ldev] CDI.KEYID = 6
1,210,590 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,105 UART: [ldev] --
1,282,564 UART: [fwproc] Wait for Commands...
1,283,364 UART: [fwproc] Recv command 0x46574c44
1,284,092 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,211 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,418 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,935 ready_for_fw is high
1,059,935 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,975 >>> mbox cmd response: success
2,698,941 UART:
2,698,957 UART: Running Caliptra FMC ...
2,699,365 UART:
2,699,419 UART: [state] CFI Enabled
2,709,994 UART: [fht] FMC Alias Private Key: 7
2,818,249 UART: [art] Extend RT PCRs Done
2,818,677 UART: [art] Lock RT PCRs Done
2,820,395 UART: [art] Populate DV Done
2,828,782 UART: [fht] FMC Alias Private Key: 7
2,829,774 UART: [art] Derive CDI
2,830,054 UART: [art] Store in in slot 0x4
2,915,535 UART: [art] Derive Key Pair
2,915,895 UART: [art] Store priv key in slot 0x5
2,929,127 UART: [art] Derive Key Pair - Done
2,944,119 UART: [art] Signing Cert with AUTHO
2,944,599 UART: RITY.KEYID = 7
2,959,919 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,684 UART: [art] PUB.X = 2AF0CF29B23BAB2E06E64C1536920DCD4A818BA3032B34EF7AA9278D16739430F6D92C8522421A94A6C4EEC303871980
2,967,444 UART: [art] PUB.Y = CCC5BCF77FB6B8CBF30DAFAD4C12E496992521E471E564B18739351CE9C580C51511E9F574FE761B269196BBAF2E42F9
2,974,403 UART: [art] SIG.R = 798F6D4415F2687D2DDC40E51745E69D8816005B3D230FFFC74ED30EC4B2B773EE2C3849BD36DDAC6FFAE1A1B05AA63A
2,981,163 UART: [art] SIG.S = 4506AE144EADFB9FB7D9F3C5812E73AAC42C0D4CB1231C26DA7A751C977CDB68F1F32A7B9387B595D885012689CE5314
3,004,997 UART: Caliptra RT
3,005,251 UART: [state] CFI Enabled
3,113,045 UART: [rt] RT listening for mailbox commands...
3,113,708 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,188 UART: [rt]cmd =0x46504c54, len=4
3,144,374 >>> mbox cmd response data (8 bytes)
3,144,595 UART: [rt] FIPS self test
3,144,923 UART: [kat] ++
3,145,075 UART: [kat] sha1
3,149,097 UART: [kat] SHA2-256
3,151,119 UART: [kat] SHA2-384
3,154,118 UART: [kat] SHA2-512-ACC
3,156,045 UART: [kat] ECC-384
3,164,576 UART: Fatal Error: 0x90040005
3,166,126 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,166,131 >>> mbox cmd response: failed
3,166,131 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,166,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,581 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,459 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,070 UART: [cold-reset] ++
1,172,528 UART: [fht] FHT @ 0x50003400
1,175,183 UART: [idev] ++
1,175,351 UART: [idev] CDI.KEYID = 6
1,175,711 UART: [idev] SUBJECT.KEYID = 7
1,176,135 UART: [idev] UDS.KEYID = 0
1,176,480 ready_for_fw is high
1,176,480 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,201,918 UART: [idev] Sha1 KeyId Algorithm
1,210,466 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,082 UART: [ldev] Erasing FE.KEYID = 1
1,244,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,256 UART: [ldev] --
1,283,535 UART: [fwproc] Wait for Commands...
1,284,315 UART: [fwproc] Recv command 0x46574c44
1,285,043 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,806 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,847 >>> mbox cmd response: success
2,787,075 UART: [afmc] ++
2,787,243 UART: [afmc] CDI.KEYID = 6
2,787,605 UART: [afmc] SUBJECT.KEYID = 7
2,788,030 UART: [afmc] AUTHORITY.KEYID = 5
2,823,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,570 UART: [afmc] --
2,866,534 UART: [cold-reset] --
2,867,460 UART: [state] Locking Datavault
2,868,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,301 UART: [state] Locking ICCM
2,869,793 UART: [exit] Launching FMC @ 0x40000130
2,875,122 UART:
2,875,138 UART: Running Caliptra FMC ...
2,875,546 UART:
2,875,689 UART: [state] CFI Enabled
2,886,244 UART: [fht] FMC Alias Private Key: 7
2,994,967 UART: [art] Extend RT PCRs Done
2,995,395 UART: [art] Lock RT PCRs Done
2,996,669 UART: [art] Populate DV Done
3,004,724 UART: [fht] FMC Alias Private Key: 7
3,005,852 UART: [art] Derive CDI
3,006,132 UART: [art] Store in in slot 0x4
3,091,985 UART: [art] Derive Key Pair
3,092,345 UART: [art] Store priv key in slot 0x5
3,105,569 UART: [art] Derive Key Pair - Done
3,120,530 UART: [art] Signing Cert with AUTHO
3,121,010 UART: RITY.KEYID = 7
3,136,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,391 UART: [art] PUB.X = 5BA8300D601FBD02B60191A78EDCE3A48B6235E0C1D50CEBCE255F7C771DCC63599E23DACC38515B5CB1453C988E17C3
3,144,163 UART: [art] PUB.Y = A561C8A5D99F9E83BF2A268554CEC8C690302716A9C149E84E6975B2A0E2FE59DD00F6CCD9C6E647A947D114B5DF3899
3,151,099 UART: [art] SIG.R = 3C55B047E6F78CAF745C6AAD263E31D4D63A1BB9426E193CE71EDB1DE658D0200CD528181A7D3DD56C0AE25C93371E60
3,157,875 UART: [art] SIG.S = B35F249B814E53160E0778CD0167520A53D94D6BA5FA6CE83289D8B480F8E5218E54F03FB58A923274CDF63750E394F0
3,181,870 UART: Caliptra RT
3,182,216 UART: [state] CFI Enabled
3,290,438 UART: [rt] RT listening for mailbox commands...
3,291,101 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,649 UART: [rt]cmd =0x46504c54, len=4
3,321,621 >>> mbox cmd response data (8 bytes)
3,321,948 UART: [rt] FIPS self test
3,322,276 UART: [kat] ++
3,322,428 UART: [kat] sha1
3,326,756 UART: [kat] SHA2-256
3,328,778 UART: [kat] SHA2-384
3,331,763 UART: [kat] SHA2-512-ACC
3,333,690 UART: [kat] ECC-384
3,342,687 UART: Fatal Error: 0x90040005
3,344,237 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,242 >>> mbox cmd response: failed
3,344,242 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,092 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
893,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,988 UART: [kat] ++
898,140 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
906,863 UART: [kat] SHA2-512-ACC
908,764 UART: [kat] ECC-384
918,425 UART: [kat] HMAC-384Kdf
922,953 UART: [kat] LMS
1,171,281 UART: [kat] --
1,172,500 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,209,968 UART: [idev] --
1,211,116 UART: [ldev] ++
1,211,284 UART: [ldev] CDI.KEYID = 6
1,211,647 UART: [ldev] SUBJECT.KEYID = 5
1,212,073 UART: [ldev] AUTHORITY.KEYID = 7
1,212,536 UART: [ldev] FE.KEYID = 1
1,217,830 UART: [ldev] Erasing FE.KEYID = 1
1,244,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,982 UART: [ldev] --
1,283,447 UART: [fwproc] Wait for Commands...
1,284,091 UART: [fwproc] Recv command 0x46574c44
1,284,819 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,356 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,591 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,348 ready_for_fw is high
1,060,348 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,172 >>> mbox cmd response: success
2,698,742 UART:
2,698,758 UART: Running Caliptra FMC ...
2,699,166 UART:
2,699,309 UART: [state] CFI Enabled
2,709,746 UART: [fht] FMC Alias Private Key: 7
2,818,279 UART: [art] Extend RT PCRs Done
2,818,707 UART: [art] Lock RT PCRs Done
2,820,569 UART: [art] Populate DV Done
2,828,932 UART: [fht] FMC Alias Private Key: 7
2,829,978 UART: [art] Derive CDI
2,830,258 UART: [art] Store in in slot 0x4
2,915,827 UART: [art] Derive Key Pair
2,916,187 UART: [art] Store priv key in slot 0x5
2,930,193 UART: [art] Derive Key Pair - Done
2,944,961 UART: [art] Signing Cert with AUTHO
2,945,441 UART: RITY.KEYID = 7
2,961,023 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,788 UART: [art] PUB.X = DA70FB8B96E0D4A5B9169DB74619EEC0F08A96996AF5E5E361CF3A99C8757D6B81FC41A5ECC8A555CEC65BE84EE18C09
2,968,575 UART: [art] PUB.Y = 004608C08E0E09BB7CF0C8E1D17F8BC7327BCCDB1A0A6A6EEDF3011F4A83495C4A9A566B91F9944B891FA29C721FD6F0
2,975,504 UART: [art] SIG.R = 3A80F3259C2BE990AD42BD8A44ECDAF66CBAF8B5D5AC012958F498CD66059F58BE4D9B887B8DC277C58B407562253065
2,982,278 UART: [art] SIG.S = DA040A42E9B723C4942ECC7D07796195FB9913021D81A489953F51AF3CC2F95862EADFD505B9BB62F75958CB7393B73E
3,006,346 UART: Caliptra RT
3,006,692 UART: [state] CFI Enabled
3,115,256 UART: [rt] RT listening for mailbox commands...
3,115,919 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,421 UART: [rt]cmd =0x46504c54, len=4
3,146,571 >>> mbox cmd response data (8 bytes)
3,146,890 UART: [rt] FIPS self test
3,147,218 UART: [kat] ++
3,147,370 UART: [kat] sha1
3,151,550 UART: [kat] SHA2-256
3,153,572 UART: [kat] SHA2-384
3,156,237 UART: [kat] SHA2-512-ACC
3,158,164 UART: [kat] ECC-384
3,167,219 UART: Fatal Error: 0x90040005
3,168,769 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,168,774 >>> mbox cmd response: failed
3,168,774 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,168,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,416 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,232 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,174,249 ready_for_fw is high
1,174,249 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,597 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,258 UART: [ldev] ++
1,208,426 UART: [ldev] CDI.KEYID = 6
1,208,790 UART: [ldev] SUBJECT.KEYID = 5
1,209,217 UART: [ldev] AUTHORITY.KEYID = 7
1,209,680 UART: [ldev] FE.KEYID = 1
1,214,828 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,506 UART: [ldev] --
1,279,870 UART: [fwproc] Wait for Commands...
1,280,537 UART: [fwproc] Recv command 0x46574c44
1,281,270 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,306 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,540 >>> mbox cmd response: success
2,783,599 UART: [afmc] ++
2,783,767 UART: [afmc] CDI.KEYID = 6
2,784,130 UART: [afmc] SUBJECT.KEYID = 7
2,784,556 UART: [afmc] AUTHORITY.KEYID = 5
2,820,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,381 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,264 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,983 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,644 UART: [afmc] --
2,863,664 UART: [cold-reset] --
2,864,644 UART: [state] Locking Datavault
2,866,073 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,677 UART: [state] Locking ICCM
2,867,203 UART: [exit] Launching FMC @ 0x40000130
2,872,532 UART:
2,872,548 UART: Running Caliptra FMC ...
2,872,956 UART:
2,873,010 UART: [state] CFI Enabled
2,883,425 UART: [fht] FMC Alias Private Key: 7
2,991,618 UART: [art] Extend RT PCRs Done
2,992,046 UART: [art] Lock RT PCRs Done
2,993,762 UART: [art] Populate DV Done
3,002,165 UART: [fht] FMC Alias Private Key: 7
3,003,109 UART: [art] Derive CDI
3,003,389 UART: [art] Store in in slot 0x4
3,089,254 UART: [art] Derive Key Pair
3,089,614 UART: [art] Store priv key in slot 0x5
3,102,536 UART: [art] Derive Key Pair - Done
3,117,204 UART: [art] Signing Cert with AUTHO
3,117,684 UART: RITY.KEYID = 7
3,132,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,343 UART: [art] PUB.X = 1CF5B464EE0553412D034981A7473EF8B96823A0C75792E1F314CC03C0A3AE745CD4E081B4357BA6D6F0DCD40515F9EE
3,140,107 UART: [art] PUB.Y = A57EDDF8C421574487A0BB10687A8E106CC0AC9CF136827C7D45442058BB898C58F640DFCA1278638DA7B51E786454C6
3,147,059 UART: [art] SIG.R = AC278DFB33E371565B139A93B6486E75036F07F1C52A5170CAF327C01BE0E63592BEA84C55B0B6E19EED8E70FF991643
3,153,829 UART: [art] SIG.S = 0C346FD9474568A9BFAA8AAF8A24866F2500F858E5F9E959CA8E2C21B031F8887BF3FF96D5454122A43A9B94A55033AD
3,177,919 UART: Caliptra RT
3,178,173 UART: [state] CFI Enabled
3,286,397 UART: [rt] RT listening for mailbox commands...
3,287,060 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,646 UART: [rt]cmd =0x46504c54, len=4
3,317,976 >>> mbox cmd response data (8 bytes)
3,318,319 UART: [rt] FIPS self test
3,318,647 UART: [kat] ++
3,318,799 UART: [kat] sha1
3,323,193 UART: [kat] SHA2-256
3,325,215 UART: [kat] SHA2-384
3,328,080 UART: [kat] SHA2-512-ACC
3,330,007 UART: [kat] ECC-384
3,338,662 UART: Fatal Error: 0x90040005
3,340,212 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,217 >>> mbox cmd response: failed
3,340,217 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,722 UART: [state] LifecycleState = Unprovisioned
86,377 UART: [state] DebugLocked = No
86,871 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,174,733 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,785 UART: [idev] Erasing UDS.KEYID = 0
1,199,795 UART: [idev] Sha1 KeyId Algorithm
1,208,681 UART: [idev] --
1,209,708 UART: [ldev] ++
1,209,876 UART: [ldev] CDI.KEYID = 6
1,210,240 UART: [ldev] SUBJECT.KEYID = 5
1,210,667 UART: [ldev] AUTHORITY.KEYID = 7
1,211,130 UART: [ldev] FE.KEYID = 1
1,216,292 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,377 UART: [fwproc] Recv command 0x46574c44
1,283,110 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,908 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,162 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,976 ready_for_fw is high
1,055,976 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,328 >>> mbox cmd response: success
2,697,308 UART:
2,697,324 UART: Running Caliptra FMC ...
2,697,732 UART:
2,697,786 UART: [state] CFI Enabled
2,707,967 UART: [fht] FMC Alias Private Key: 7
2,816,354 UART: [art] Extend RT PCRs Done
2,816,782 UART: [art] Lock RT PCRs Done
2,818,714 UART: [art] Populate DV Done
2,827,057 UART: [fht] FMC Alias Private Key: 7
2,828,031 UART: [art] Derive CDI
2,828,311 UART: [art] Store in in slot 0x4
2,913,906 UART: [art] Derive Key Pair
2,914,266 UART: [art] Store priv key in slot 0x5
2,927,136 UART: [art] Derive Key Pair - Done
2,942,111 UART: [art] Signing Cert with AUTHO
2,942,591 UART: RITY.KEYID = 7
2,957,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,490 UART: [art] PUB.X = 237845FA8657C2C7EDD6C103750FD1EE3A05044D95722AD6B2470B67C274B75E298EBA440D767C96BA0AFE12DFAEF6CE
2,965,253 UART: [art] PUB.Y = 561C6CEEF7DDA0FC4FDEC0B864BA5A9FAE644CA0AC7D1A5150C192D360C1D0376B3A0D97E6B4D633C342C110299D26E3
2,972,220 UART: [art] SIG.R = 39FB76DA2222D2A280460CC33B2DCE20E8B9EE1413623531D854679B46225BC0B4693551BED08E8F7F1C8919CE0EDE92
2,978,988 UART: [art] SIG.S = 19094BB976AEA664389373E3AABEE5B44A9424A79DFF9B9D75148455BB093D873D417EF4C059EBF145EB0C9230CE78F9
3,002,732 UART: Caliptra RT
3,002,986 UART: [state] CFI Enabled
3,111,418 UART: [rt] RT listening for mailbox commands...
3,112,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,717 UART: [rt]cmd =0x46504c54, len=4
3,142,949 >>> mbox cmd response data (8 bytes)
3,143,304 UART: [rt] FIPS self test
3,143,632 UART: [kat] ++
3,143,784 UART: [kat] sha1
3,148,102 UART: [kat] SHA2-256
3,150,124 UART: [kat] SHA2-384
3,153,001 UART: [kat] SHA2-512-ACC
3,154,928 UART: [kat] ECC-384
3,163,815 UART: Fatal Error: 0x90040005
3,165,365 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,165,370 >>> mbox cmd response: failed
3,165,370 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,165,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,414 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,631,312 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,026 UART: [kat] ++
896,178 UART: [kat] sha1
900,442 UART: [kat] SHA2-256
902,382 UART: [kat] SHA2-384
905,183 UART: [kat] SHA2-512-ACC
907,084 UART: [kat] ECC-384
916,953 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,922 UART: [cold-reset] ++
1,171,434 UART: [fht] FHT @ 0x50003400
1,174,036 UART: [idev] ++
1,174,204 UART: [idev] CDI.KEYID = 6
1,174,565 UART: [idev] SUBJECT.KEYID = 7
1,174,990 UART: [idev] UDS.KEYID = 0
1,175,336 ready_for_fw is high
1,175,336 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,067 UART: [fwproc] Wait for Commands...
1,282,658 UART: [fwproc] Recv command 0x46574c44
1,283,391 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,677 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,963 >>> mbox cmd response: success
2,785,120 UART: [afmc] ++
2,785,288 UART: [afmc] CDI.KEYID = 6
2,785,651 UART: [afmc] SUBJECT.KEYID = 7
2,786,077 UART: [afmc] AUTHORITY.KEYID = 5
2,821,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,037 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,766 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,368 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,327 UART: [afmc] --
2,865,309 UART: [cold-reset] --
2,865,975 UART: [state] Locking Datavault
2,867,026 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,630 UART: [state] Locking ICCM
2,868,068 UART: [exit] Launching FMC @ 0x40000130
2,873,397 UART:
2,873,413 UART: Running Caliptra FMC ...
2,873,821 UART:
2,873,964 UART: [state] CFI Enabled
2,884,567 UART: [fht] FMC Alias Private Key: 7
2,992,734 UART: [art] Extend RT PCRs Done
2,993,162 UART: [art] Lock RT PCRs Done
2,994,624 UART: [art] Populate DV Done
3,002,749 UART: [fht] FMC Alias Private Key: 7
3,003,757 UART: [art] Derive CDI
3,004,037 UART: [art] Store in in slot 0x4
3,089,492 UART: [art] Derive Key Pair
3,089,852 UART: [art] Store priv key in slot 0x5
3,103,350 UART: [art] Derive Key Pair - Done
3,117,792 UART: [art] Signing Cert with AUTHO
3,118,272 UART: RITY.KEYID = 7
3,133,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,081 UART: [art] PUB.X = 74948F11321E3D9F52FDAE6AD8F4ED6B24DFD4D2234805A4084D93187E76008CE72B7889D4AE6AEE164C2F75A623614E
3,140,829 UART: [art] PUB.Y = 371D091D4651C916B449768AE12300501AC0E055C4832D73EE2381D9256FBC0820BAD212DC0E7734E6F588D6060B05B4
3,147,733 UART: [art] SIG.R = 4B51F1752752B50B9DD8FF493C0CB38894B3EBC351C708765815975AAF5353018E7BD14447F155D54FFD86E601FC7CF2
3,154,490 UART: [art] SIG.S = 26CC73424DDF1A9BDD69A1A07935C86AAAA2EFBE530612840937077268861712CA3AC5D94EB1301D2EADCB194060EBB1
3,178,090 UART: Caliptra RT
3,178,436 UART: [state] CFI Enabled
3,287,190 UART: [rt] RT listening for mailbox commands...
3,287,853 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,561 UART: [rt]cmd =0x46504c54, len=4
3,318,723 >>> mbox cmd response data (8 bytes)
3,318,972 UART: [rt] FIPS self test
3,319,300 UART: [kat] ++
3,319,452 UART: [kat] sha1
3,323,496 UART: [kat] SHA2-256
3,325,518 UART: [kat] SHA2-384
3,328,275 UART: [kat] SHA2-512-ACC
3,330,202 UART: [kat] ECC-384
3,339,401 UART: Fatal Error: 0x90040005
3,340,951 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,956 >>> mbox cmd response: failed
3,340,956 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,171,000 UART: [fht] FHT @ 0x50003400
1,173,578 UART: [idev] ++
1,173,746 UART: [idev] CDI.KEYID = 6
1,174,107 UART: [idev] SUBJECT.KEYID = 7
1,174,532 UART: [idev] UDS.KEYID = 0
1,174,878 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,046 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,635 UART: [ldev] SUBJECT.KEYID = 5
1,211,062 UART: [ldev] AUTHORITY.KEYID = 7
1,211,525 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x46574c44
1,283,543 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,123 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,249 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,625 ready_for_fw is high
1,055,625 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,749 >>> mbox cmd response: success
2,697,627 UART:
2,697,643 UART: Running Caliptra FMC ...
2,698,051 UART:
2,698,194 UART: [state] CFI Enabled
2,708,737 UART: [fht] FMC Alias Private Key: 7
2,816,276 UART: [art] Extend RT PCRs Done
2,816,704 UART: [art] Lock RT PCRs Done
2,818,368 UART: [art] Populate DV Done
2,826,537 UART: [fht] FMC Alias Private Key: 7
2,827,497 UART: [art] Derive CDI
2,827,777 UART: [art] Store in in slot 0x4
2,913,368 UART: [art] Derive Key Pair
2,913,728 UART: [art] Store priv key in slot 0x5
2,927,278 UART: [art] Derive Key Pair - Done
2,942,101 UART: [art] Signing Cert with AUTHO
2,942,581 UART: RITY.KEYID = 7
2,957,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,530 UART: [art] PUB.X = 67A936E25117E97B1480F3F6725CCCD43EC8653ABAA7D5E5329E6CE7E0BED9D7B09680991FED7E9344F7C3C723C96D2A
2,965,312 UART: [art] PUB.Y = EDBD874D90F04FE0CCD793DFA34AF5205F4BDABF7A7F18569BBC5720182FCFE46B37E88CBFF541B952EC7642FB56F4A4
2,972,288 UART: [art] SIG.R = 7AE8699C8738E830F7D652B4FD77077D0FDA1F01AD15FDA06D8DFFA93643E5071E0DDAA1E3FE5CB94ABCDE3548DD40C2
2,979,067 UART: [art] SIG.S = D1F591BDF0731C9C3E896AC4DBF4DFB96E7AB9E14DB3786FD960CF60CD031C48F54407F6099F21B0D740DD34F934E878
3,003,015 UART: Caliptra RT
3,003,361 UART: [state] CFI Enabled
3,111,405 UART: [rt] RT listening for mailbox commands...
3,112,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,540 UART: [rt]cmd =0x46504c54, len=4
3,142,654 >>> mbox cmd response data (8 bytes)
3,143,019 UART: [rt] FIPS self test
3,143,347 UART: [kat] ++
3,143,499 UART: [kat] sha1
3,147,749 UART: [kat] SHA2-256
3,149,771 UART: [kat] SHA2-384
3,152,602 UART: [kat] SHA2-512-ACC
3,154,529 UART: [kat] ECC-384
3,163,158 UART: Fatal Error: 0x90040005
3,164,708 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,164,713 >>> mbox cmd response: failed
3,164,713 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,164,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,101 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,675,454 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,820,174 >>> mbox cmd response: failed
3,820,750 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,963,973 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
4,880,244 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,457,695 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,677,967 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,822,101 >>> mbox cmd response: failed
3,822,663 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,965,743 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
4,873,289 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,453,078 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
4,010,988 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,155,503 >>> mbox cmd response: failed
4,156,102 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,299,204 >>> mbox cmd response: failed
Initializing fuses
1,164 writing to cptra_bootfsm_go
20,745,594 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,197,233 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
4,015,086 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,159,246 >>> mbox cmd response: failed
4,159,965 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,303,202 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
20,743,225 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
34,183,134 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,459,477 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,604,616 >>> mbox cmd response: failed
3,605,185 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,748,811 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,445,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,308,459 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,444,605 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,589,142 >>> mbox cmd response: failed
3,589,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,733,350 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,482,067 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,319,735 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,458,584 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,603,109 >>> mbox cmd response: failed
3,603,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,747,303 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,444,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,283,531 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
3,785,947 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,930,469 >>> mbox cmd response: failed
3,931,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,074,730 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
19,580,792 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,296,760 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,786,596 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,931,259 >>> mbox cmd response: failed
3,931,835 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,075,572 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
19,572,129 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,304,978 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,623 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,631 >>> mbox cmd response: failed
816,631 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,149 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,938 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,545 >>> mbox cmd response: failed
816,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,425 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,482 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,214 >>> mbox cmd response: failed
817,214 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,268 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,525 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,194 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,202 >>> mbox cmd response: failed
817,202 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,000 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,349 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,717 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,725 >>> mbox cmd response: failed
816,725 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,228 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,681 >>> mbox cmd response: failed
816,681 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,445 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,762 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,014 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,022 >>> mbox cmd response: failed
817,022 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,317 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,390 >>> mbox cmd response: failed
817,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,191 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,235 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,243 >>> mbox cmd response: failed
817,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,045 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,152 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,569 >>> mbox cmd response: failed
816,569 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
816,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,262 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,036 >>> mbox cmd response: failed
817,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,774 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,721 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,018 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,026 >>> mbox cmd response: failed
817,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
817,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,059 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,191 UART:
192,556 UART: Running Caliptra ROM ...
193,751 UART:
193,904 UART: [state] CFI Enabled
266,348 UART: [state] LifecycleState = Unprovisioned
268,249 UART: [state] DebugLocked = No
269,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,368 UART: [kat] SHA2-256
444,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,611 UART: [kat] ++
455,144 UART: [kat] sha1
466,742 UART: [kat] SHA2-256
469,476 UART: [kat] SHA2-384
475,769 UART: [kat] SHA2-512-ACC
478,072 UART: [kat] ECC-384
2,766,875 UART: [kat] HMAC-384Kdf
2,800,014 UART: [kat] LMS
3,990,265 UART: [kat] --
3,994,712 UART: [cold-reset] ++
3,996,580 UART: [fht] Storing FHT @ 0x50003400
4,008,349 UART: [idev] ++
4,008,922 UART: [idev] CDI.KEYID = 6
4,009,837 UART: [idev] SUBJECT.KEYID = 7
4,011,097 UART: [idev] UDS.KEYID = 0
4,012,147 ready_for_fw is high
4,012,357 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,156,904 UART: [idev] Erasing UDS.KEYID = 0
7,346,933 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,768 UART: [idev] --
7,372,789 UART: [ldev] ++
7,373,415 UART: [ldev] CDI.KEYID = 6
7,374,345 UART: [ldev] SUBJECT.KEYID = 5
7,375,564 UART: [ldev] AUTHORITY.KEYID = 7
7,376,801 UART: [ldev] FE.KEYID = 1
7,423,195 UART: [ldev] Erasing FE.KEYID = 1
10,755,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,717 UART: [ldev] --
13,115,046 UART: [fwproc] Waiting for Commands...
13,117,426 UART: [fwproc] Received command 0x46574c44
13,119,613 UART: [fwproc] Received Image of size 114916 bytes
17,183,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,654,384 >>> mbox cmd response: success
17,658,347 UART: [afmc] ++
17,658,969 UART: [afmc] CDI.KEYID = 6
17,659,883 UART: [afmc] SUBJECT.KEYID = 7
17,661,104 UART: [afmc] AUTHORITY.KEYID = 5
21,030,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,321 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,578 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,054 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,821 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,311 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,113 UART: [afmc] --
23,401,869 UART: [cold-reset] --
23,404,220 UART: [state] Locking Datavault
23,409,309 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,071 UART: [state] Locking ICCM
23,412,707 UART: [exit] Launching FMC @ 0x40000130
23,421,112 UART:
23,421,389 UART: Running Caliptra FMC ...
23,422,498 UART:
23,422,661 UART: [state] CFI Enabled
23,489,896 UART: [fht] FMC Alias Private Key: 7
25,827,853 UART: [art] Extend RT PCRs Done
25,829,080 UART: [art] Lock RT PCRs Done
25,830,655 UART: [art] Populate DV Done
25,836,284 UART: [fht] FMC Alias Private Key: 7
25,837,874 UART: [art] Derive CDI
25,838,693 UART: [art] Store in in slot 0x4
25,900,980 UART: [art] Derive Key Pair
25,902,021 UART: [art] Store priv key in slot 0x5
29,194,819 UART: [art] Derive Key Pair - Done
29,207,774 UART: [art] Signing Cert with AUTHO
29,209,107 UART: RITY.KEYID = 7
31,497,403 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,037 UART: [art] PUB.X = 27A6FAA7FAA044D45C4738587012A7979C750A99FF25FE33752CBC65B80256F02FC2004D16D6EF6150B44A257A311A37
31,506,157 UART: [art] PUB.Y = 1E59FDB58E76BDD9600DE235ECF79C6468A71F47F62E0C8DF0F869B8E931A719C7667CFB89334B6A93FACB45C178935F
31,513,400 UART: [art] SIG.R = 4A3AAE8040465C0E16E5AE59A94DF2CE1C33CD982DD1DF5FE7E78A53A987BAAF0166F1E93316061046647FD6EE70C1E2
31,520,799 UART: [art] SIG.S = 6C2B3BB63FA4EE0BCA80F06979B2A654EEDD66055C53D2734915EDD0ACCDC8C9E08514E0AEB1B3BFED966B07D146A2C1
32,825,985 UART: Caliptra RT
32,826,704 UART: [state] CFI Enabled
32,987,783 UART: [rt] RT listening for mailbox commands...
32,989,644 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,019,329 UART: [rt]cmd =0x46504c54, len=4
33,020,785 >>> mbox cmd response data (8 bytes)
33,022,308 UART: [rt] FIPS self test
33,023,258 UART: [kat] ++
33,023,712 UART: [kat] sha1
33,027,954 UART: [kat] SHA2-256
33,029,853 UART: [kat] SHA2-384
33,032,763 UART: [kat] SHA2-512-ACC
33,035,060 UART: [kat] ECC-384
34,003,938 UART: Fatal Error: 0x90040004
34,039,212 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,183,549 >>> mbox cmd response: failed
34,184,150 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,328,403 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,082 UART:
190,367 UART: Running Caliptra ROM ...
191,472 UART:
191,618 UART: [state] CFI Enabled
262,907 UART: [state] LifecycleState = Unprovisioned
264,827 UART: [state] DebugLocked = No
266,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,248 UART: [kat] SHA2-256
442,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,496 UART: [kat] ++
453,032 UART: [kat] sha1
464,622 UART: [kat] SHA2-256
467,356 UART: [kat] SHA2-384
472,195 UART: [kat] SHA2-512-ACC
474,530 UART: [kat] ECC-384
2,763,239 UART: [kat] HMAC-384Kdf
2,796,417 UART: [kat] LMS
3,986,728 UART: [kat] --
3,992,240 UART: [cold-reset] ++
3,994,016 UART: [fht] Storing FHT @ 0x50003400
4,004,695 UART: [idev] ++
4,005,263 UART: [idev] CDI.KEYID = 6
4,006,221 UART: [idev] SUBJECT.KEYID = 7
4,007,442 UART: [idev] UDS.KEYID = 0
4,008,993 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,153,541 UART: [idev] Erasing UDS.KEYID = 0
7,343,431 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,313 UART: [idev] --
7,368,844 UART: [ldev] ++
7,369,422 UART: [ldev] CDI.KEYID = 6
7,370,390 UART: [ldev] SUBJECT.KEYID = 5
7,371,604 UART: [ldev] AUTHORITY.KEYID = 7
7,372,841 UART: [ldev] FE.KEYID = 1
7,419,467 UART: [ldev] Erasing FE.KEYID = 1
10,751,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,272 UART: [ldev] --
13,112,821 UART: [fwproc] Waiting for Commands...
13,114,822 UART: [fwproc] Received command 0x46574c44
13,117,013 UART: [fwproc] Received Image of size 114916 bytes
17,183,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,485 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,646,951 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,806,130 ready_for_fw is high
3,806,676 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,913,182 >>> mbox cmd response: success
23,610,111 UART:
23,610,527 UART: Running Caliptra FMC ...
23,611,749 UART:
23,611,921 UART: [state] CFI Enabled
23,678,454 UART: [fht] FMC Alias Private Key: 7
26,016,323 UART: [art] Extend RT PCRs Done
26,017,549 UART: [art] Lock RT PCRs Done
26,019,129 UART: [art] Populate DV Done
26,024,595 UART: [fht] FMC Alias Private Key: 7
26,026,193 UART: [art] Derive CDI
26,027,011 UART: [art] Store in in slot 0x4
26,086,871 UART: [art] Derive Key Pair
26,087,908 UART: [art] Store priv key in slot 0x5
29,381,949 UART: [art] Derive Key Pair - Done
29,394,955 UART: [art] Signing Cert with AUTHO
29,396,267 UART: RITY.KEYID = 7
31,682,216 UART: [art] Erasing AUTHORITY.KEYID = 7
31,683,753 UART: [art] PUB.X = 27DC70A663055AB37246331C1995AB0671C197B0712C75478A148B66DECFF5BD85491DFF78C992D634B8B28CF2216201
31,690,957 UART: [art] PUB.Y = BC181F3D418882A35222B0D8131F6C122232A2444C5B216DEDF2FF9EC1249C74A37779D6F0678D0BF6E3699C374DAAA3
31,698,211 UART: [art] SIG.R = 03DB69A2A6C67237FE6C1864DF1A730AC8F95B073BEBBEFD72A44E249312E845E2E09CCC5BDAB856041B6BFE1AB6F3B2
31,705,614 UART: [art] SIG.S = 5ED997BAFD9EF7CD5CADBA56D3DEFD4AA1145C14E1876DF8BF8FF071D9C8E2F4C106950AD3AEBAEEF0928D67165AC046
33,010,273 UART: Caliptra RT
33,010,990 UART: [state] CFI Enabled
33,172,990 UART: [rt] RT listening for mailbox commands...
33,174,877 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,204,574 UART: [rt]cmd =0x46504c54, len=4
33,206,190 >>> mbox cmd response data (8 bytes)
33,207,316 UART: [rt] FIPS self test
33,208,271 UART: [kat] ++
33,208,721 UART: [kat] sha1
33,213,284 UART: [kat] SHA2-256
33,215,215 UART: [kat] SHA2-384
33,218,096 UART: [kat] SHA2-512-ACC
33,220,357 UART: [kat] ECC-384
34,189,330 UART: Fatal Error: 0x90040004
34,224,594 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,368,969 >>> mbox cmd response: failed
34,369,615 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,513,862 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,780,063 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,884,280 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,418 UART:
192,787 UART: Running Caliptra ROM ...
193,910 UART:
603,513 UART: [state] CFI Enabled
616,760 UART: [state] LifecycleState = Unprovisioned
618,710 UART: [state] DebugLocked = No
620,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,110 UART: [kat] SHA2-256
794,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,427 UART: [kat] ++
805,905 UART: [kat] sha1
816,710 UART: [kat] SHA2-256
819,435 UART: [kat] SHA2-384
826,219 UART: [kat] SHA2-512-ACC
828,593 UART: [kat] ECC-384
3,112,468 UART: [kat] HMAC-384Kdf
3,123,359 UART: [kat] LMS
4,313,505 UART: [kat] --
4,319,208 UART: [cold-reset] ++
4,321,374 UART: [fht] Storing FHT @ 0x50003400
4,333,361 UART: [idev] ++
4,333,925 UART: [idev] CDI.KEYID = 6
4,334,806 UART: [idev] SUBJECT.KEYID = 7
4,336,128 UART: [idev] UDS.KEYID = 0
4,337,278 ready_for_fw is high
4,337,488 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,482,027 UART: [idev] Erasing UDS.KEYID = 0
7,630,128 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,542 UART: [idev] --
7,653,842 UART: [ldev] ++
7,654,411 UART: [ldev] CDI.KEYID = 6
7,655,385 UART: [ldev] SUBJECT.KEYID = 5
7,656,599 UART: [ldev] AUTHORITY.KEYID = 7
7,657,830 UART: [ldev] FE.KEYID = 1
7,669,773 UART: [ldev] Erasing FE.KEYID = 1
10,959,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,766 UART: [ldev] --
13,319,074 UART: [fwproc] Waiting for Commands...
13,321,568 UART: [fwproc] Received command 0x46574c44
13,323,761 UART: [fwproc] Received Image of size 114916 bytes
17,385,668 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,460,997 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,529,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,849,740 >>> mbox cmd response: success
17,854,110 UART: [afmc] ++
17,854,706 UART: [afmc] CDI.KEYID = 6
17,855,623 UART: [afmc] SUBJECT.KEYID = 7
17,856,914 UART: [afmc] AUTHORITY.KEYID = 5
21,172,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,465,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,019 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,482,424 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,241 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,511,677 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,532,879 UART: [afmc] --
23,537,400 UART: [cold-reset] --
23,540,981 UART: [state] Locking Datavault
23,544,998 UART: [state] Locking PCR0, PCR1 and PCR31
23,546,753 UART: [state] Locking ICCM
23,548,690 UART: [exit] Launching FMC @ 0x40000130
23,557,083 UART:
23,557,331 UART: Running Caliptra FMC ...
23,558,435 UART:
23,558,629 UART: [state] CFI Enabled
23,566,849 UART: [fht] FMC Alias Private Key: 7
25,897,640 UART: [art] Extend RT PCRs Done
25,898,864 UART: [art] Lock RT PCRs Done
25,900,193 UART: [art] Populate DV Done
25,905,721 UART: [fht] FMC Alias Private Key: 7
25,907,375 UART: [art] Derive CDI
25,908,198 UART: [art] Store in in slot 0x4
25,950,639 UART: [art] Derive Key Pair
25,951,679 UART: [art] Store priv key in slot 0x5
29,193,559 UART: [art] Derive Key Pair - Done
29,206,404 UART: [art] Signing Cert with AUTHO
29,207,709 UART: RITY.KEYID = 7
31,487,003 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,520 UART: [art] PUB.X = E965ED90DC893C7712DED1EDCDCF8684065A995B237C5589FA23F23CF92ED1FDEE982160B631305AE8663707F597F457
31,495,719 UART: [art] PUB.Y = 3E0654498BF6CBBF482F1A2E933BFC0DD0E0E6A33D64956EFFB9EC7C98CE0CDC03581F5B8522A8D9EE6EE51BCE088483
31,503,047 UART: [art] SIG.R = 3CF12BA8A971B02388CDD352443E313DC1189AD4EC2DAE693979B7F2E44C92BD150C99A0DDC1EF998B3C0A94F494A721
31,510,399 UART: [art] SIG.S = D0074C4A72F2C1A0D0E1F174DAA85B85DEBDA4E5AA98533DB8AB9E530CC28DDC3426576BB4936036FDDA4A7216BF052D
32,815,742 UART: Caliptra RT
32,816,451 UART: [state] CFI Enabled
32,933,724 UART: [rt] RT listening for mailbox commands...
32,935,620 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,965,150 UART: [rt]cmd =0x46504c54, len=4
32,966,726 >>> mbox cmd response data (8 bytes)
32,967,707 UART: [rt] FIPS self test
32,968,655 UART: [kat] ++
32,969,112 UART: [kat] sha1
32,973,464 UART: [kat] SHA2-256
32,975,396 UART: [kat] SHA2-384
32,978,311 UART: [kat] SHA2-512-ACC
32,980,596 UART: [kat] ECC-384
33,944,330 UART: Fatal Error: 0x90040004
33,979,579 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,123,965 >>> mbox cmd response: failed
34,124,622 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,268,860 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,135 UART:
190,422 UART: Running Caliptra ROM ...
191,449 UART:
6,252,530 UART: [state] CFI Enabled
6,265,188 UART: [state] LifecycleState = Unprovisioned
6,267,155 UART: [state] DebugLocked = No
6,269,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,273,131 UART: [kat] SHA2-256
6,442,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,453,411 UART: [kat] ++
6,453,893 UART: [kat] sha1
6,464,568 UART: [kat] SHA2-256
6,467,316 UART: [kat] SHA2-384
6,473,019 UART: [kat] SHA2-512-ACC
6,475,384 UART: [kat] ECC-384
8,759,310 UART: [kat] HMAC-384Kdf
8,770,939 UART: [kat] LMS
9,961,029 UART: [kat] --
9,966,129 UART: [cold-reset] ++
9,967,794 UART: [fht] Storing FHT @ 0x50003400
9,979,929 UART: [idev] ++
9,980,495 UART: [idev] CDI.KEYID = 6
9,981,510 UART: [idev] SUBJECT.KEYID = 7
9,982,727 UART: [idev] UDS.KEYID = 0
9,984,251 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
10,128,529 UART: [idev] Erasing UDS.KEYID = 0
13,266,204 UART: [idev] Using Sha1 for KeyId Algorithm
13,288,096 UART: [idev] --
13,291,224 UART: [ldev] ++
13,291,790 UART: [ldev] CDI.KEYID = 6
13,292,750 UART: [ldev] SUBJECT.KEYID = 5
13,293,963 UART: [ldev] AUTHORITY.KEYID = 7
13,295,248 UART: [ldev] FE.KEYID = 1
13,305,570 UART: [ldev] Erasing FE.KEYID = 1
16,592,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,883,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,897,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,912,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,927,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,946,002 UART: [ldev] --
18,951,063 UART: [fwproc] Waiting for Commands...
18,952,826 UART: [fwproc] Received command 0x46574c44
18,955,047 UART: [fwproc] Received Image of size 114916 bytes
23,016,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,095,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,164,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
23,484,144 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,124,316 ready_for_fw is high
4,124,706 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,081,293 >>> mbox cmd response: success
23,715,934 UART:
23,716,333 UART: Running Caliptra FMC ...
23,717,456 UART:
23,717,614 UART: [state] CFI Enabled
23,725,512 UART: [fht] FMC Alias Private Key: 7
26,056,186 UART: [art] Extend RT PCRs Done
26,057,417 UART: [art] Lock RT PCRs Done
26,059,134 UART: [art] Populate DV Done
26,064,563 UART: [fht] FMC Alias Private Key: 7
26,066,001 UART: [art] Derive CDI
26,066,745 UART: [art] Store in in slot 0x4
26,109,454 UART: [art] Derive Key Pair
26,110,497 UART: [art] Store priv key in slot 0x5
29,351,913 UART: [art] Derive Key Pair - Done
29,365,339 UART: [art] Signing Cert with AUTHO
29,366,677 UART: RITY.KEYID = 7
31,646,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,610 UART: [art] PUB.X = 5F2FC21A623834D6B01DFC6BA9B3DCBF3A2BF18E68D9EA5B5F840BB9EB268EF64F7BD9C4D42B6CDA0F96E88C0904E349
31,654,865 UART: [art] PUB.Y = E06683DFDD0DE659755415A5B544E59EB65C7AFD91C4D8A5E0CE37EF2CDA17AAA5946A7B1EACC61782B3EF20A734E7E2
31,662,162 UART: [art] SIG.R = 18E1CFC35F268DCC010DF5042525695DA7134559F8D399CE6B730DED61B637577DDA064C0FE42432D69527C2B6580338
31,669,500 UART: [art] SIG.S = 760562A951059CEBD5C5CD7C3B5B7C927DC97C2CAF083C04579B1137E61E0CDD75594F48876F27D2C77E5F08537CF3C2
32,975,097 UART: Caliptra RT
32,975,815 UART: [state] CFI Enabled
33,093,988 UART: [rt] RT listening for mailbox commands...
33,095,840 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,125,469 UART: [rt]cmd =0x46504c54, len=4
33,127,031 >>> mbox cmd response data (8 bytes)
33,127,825 UART: [rt] FIPS self test
33,128,684 UART: [kat] ++
33,129,131 UART: [kat] sha1
33,133,534 UART: [kat] SHA2-256
33,135,470 UART: [kat] SHA2-384
33,138,650 UART: [kat] SHA2-512-ACC
33,140,911 UART: [kat] ECC-384
34,104,771 UART: Fatal Error: 0x90040004
34,140,010 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,284,734 >>> mbox cmd response: failed
34,285,363 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
34,429,617 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
9,632,056 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
23,588,257 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,943 writing to cptra_bootfsm_go
194,115 UART:
194,479 UART: Running Caliptra ROM ...
195,613 UART:
195,755 UART: [state] CFI Enabled
264,352 UART: [state] LifecycleState = Unprovisioned
266,193 UART: [state] DebugLocked = No
267,580 UART: [state] WD Timer not started. Device not locked for debugging
271,832 UART: [kat] SHA2-256
450,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,488 UART: [kat] ++
462,956 UART: [kat] sha1
475,180 UART: [kat] SHA2-256
478,184 UART: [kat] SHA2-384
483,560 UART: [kat] SHA2-512-ACC
486,473 UART: [kat] ECC-384
2,947,385 UART: [kat] HMAC-384Kdf
2,971,132 UART: [kat] LMS
3,500,595 UART: [kat] --
3,506,223 UART: [cold-reset] ++
3,507,308 UART: [fht] FHT @ 0x50003400
3,518,785 UART: [idev] ++
3,519,348 UART: [idev] CDI.KEYID = 6
3,520,329 UART: [idev] SUBJECT.KEYID = 7
3,521,574 UART: [idev] UDS.KEYID = 0
3,522,479 ready_for_fw is high
3,522,674 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,667,477 UART: [idev] Erasing UDS.KEYID = 0
6,028,066 UART: [idev] Sha1 KeyId Algorithm
6,051,891 UART: [idev] --
6,056,157 UART: [ldev] ++
6,056,727 UART: [ldev] CDI.KEYID = 6
6,057,636 UART: [ldev] SUBJECT.KEYID = 5
6,058,795 UART: [ldev] AUTHORITY.KEYID = 7
6,060,032 UART: [ldev] FE.KEYID = 1
6,100,499 UART: [ldev] Erasing FE.KEYID = 1
8,601,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,981 UART: [ldev] --
10,414,829 UART: [fwproc] Wait for Commands...
10,416,570 UART: [fwproc] Recv command 0x46574c44
10,418,669 UART: [fwproc] Recv'd Img size: 115224 bytes
13,834,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,907,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,976,692 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,298,187 >>> mbox cmd response: success
14,302,810 UART: [afmc] ++
14,303,403 UART: [afmc] CDI.KEYID = 6
14,304,483 UART: [afmc] SUBJECT.KEYID = 7
14,305,583 UART: [afmc] AUTHORITY.KEYID = 5
16,827,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,582 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,287 UART: [afmc] --
18,629,891 UART: [cold-reset] --
18,633,427 UART: [state] Locking Datavault
18,637,645 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,291 UART: [state] Locking ICCM
18,640,366 UART: [exit] Launching FMC @ 0x40000130
18,648,788 UART:
18,649,041 UART: Running Caliptra FMC ...
18,650,076 UART:
18,650,228 UART: [state] CFI Enabled
18,712,269 UART: [fht] FMC Alias Private Key: 7
20,476,659 UART: [art] Extend RT PCRs Done
20,477,885 UART: [art] Lock RT PCRs Done
20,479,483 UART: [art] Populate DV Done
20,485,018 UART: [fht] FMC Alias Private Key: 7
20,486,547 UART: [art] Derive CDI
20,487,336 UART: [art] Store in in slot 0x4
20,545,032 UART: [art] Derive Key Pair
20,546,041 UART: [art] Store priv key in slot 0x5
23,009,745 UART: [art] Derive Key Pair - Done
23,022,749 UART: [art] Signing Cert with AUTHO
23,024,065 UART: RITY.KEYID = 7
24,735,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,634 UART: [art] PUB.X = 72BD4277BAD11D8DCDC6CA07C42CE8041208A879EDB4FD04DA4FC4982737E7F25A1EDE05AF7988C3B852BC9A2697C652
24,743,940 UART: [art] PUB.Y = EB07FF823585F69DDF1805316FEEEFB05147C2CE3408C86A99758DE65BE250C38855483C2A582BCD4B3C849FFC178652
24,751,181 UART: [art] SIG.R = 0A1A3867DCDA61BC1DFBDC293C32C6ECA8BD101C00C68C439B528A8E4E4593FBB694DF711A924756F77FB833A2BED65B
24,758,582 UART: [art] SIG.S = 8BB13E30AC691DFA7FB1374A8B3359A5E23B8C7DF9C79FDC1F6D19C5813485947495EC5030BBFBF547DC4BE31CBE4C8C
25,737,539 UART: Caliptra RT
25,738,253 UART: [state] CFI Enabled
25,904,349 UART: [rt] RT listening for mailbox commands...
25,906,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,935,939 UART: [rt]cmd =0x46504c54, len=4
25,937,571 >>> mbox cmd response data (8 bytes)
25,938,548 UART: [rt] FIPS self test
25,939,491 UART: [kat] ++
25,939,937 UART: [kat] sha1
25,944,442 UART: [kat] SHA2-256
25,946,377 UART: [kat] SHA2-384
25,949,529 UART: [kat] SHA2-512-ACC
25,951,759 UART: [kat] ECC-384
26,680,377 UART: Fatal Error: 0x90040004
26,715,643 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,860,388 >>> mbox cmd response: failed
26,861,032 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,005,677 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,015 UART:
190,354 UART: Running Caliptra ROM ...
191,385 UART:
191,525 UART: [state] CFI Enabled
266,282 UART: [state] LifecycleState = Unprovisioned
268,203 UART: [state] DebugLocked = No
271,064 UART: [state] WD Timer not started. Device not locked for debugging
274,846 UART: [kat] SHA2-256
453,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,479 UART: [kat] ++
465,929 UART: [kat] sha1
476,429 UART: [kat] SHA2-256
479,441 UART: [kat] SHA2-384
484,506 UART: [kat] SHA2-512-ACC
487,495 UART: [kat] ECC-384
2,949,598 UART: [kat] HMAC-384Kdf
2,973,170 UART: [kat] LMS
3,502,671 UART: [kat] --
3,506,666 UART: [cold-reset] ++
3,508,330 UART: [fht] FHT @ 0x50003400
3,519,532 UART: [idev] ++
3,520,098 UART: [idev] CDI.KEYID = 6
3,521,010 UART: [idev] SUBJECT.KEYID = 7
3,522,177 UART: [idev] UDS.KEYID = 0
3,523,794 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,668,674 UART: [idev] Erasing UDS.KEYID = 0
6,030,060 UART: [idev] Sha1 KeyId Algorithm
6,051,463 UART: [idev] --
6,054,898 UART: [ldev] ++
6,055,480 UART: [ldev] CDI.KEYID = 6
6,056,371 UART: [ldev] SUBJECT.KEYID = 5
6,057,533 UART: [ldev] AUTHORITY.KEYID = 7
6,058,766 UART: [ldev] FE.KEYID = 1
6,100,763 UART: [ldev] Erasing FE.KEYID = 1
8,608,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,249 UART: [ldev] --
10,416,409 UART: [fwproc] Wait for Commands...
10,418,501 UART: [fwproc] Recv command 0x46574c44
10,420,600 UART: [fwproc] Recv'd Img size: 115224 bytes
13,834,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,625 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,296,168 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,234 UART:
192,610 UART: Running Caliptra ROM ...
193,702 UART:
193,846 UART: [state] CFI Enabled
263,847 UART: [state] LifecycleState = Unprovisioned
266,283 UART: [state] DebugLocked = No
268,875 UART: [state] WD Timer not started. Device not locked for debugging
273,346 UART: [kat] SHA2-256
463,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,988 UART: [kat] ++
474,439 UART: [kat] sha1
486,522 UART: [kat] SHA2-256
489,544 UART: [kat] SHA2-384
494,991 UART: [kat] SHA2-512-ACC
497,583 UART: [kat] ECC-384
2,948,431 UART: [kat] HMAC-384Kdf
2,972,676 UART: [kat] LMS
3,504,409 UART: [kat] --
3,508,217 UART: [cold-reset] ++
3,509,305 UART: [fht] FHT @ 0x50003400
3,522,281 UART: [idev] ++
3,522,920 UART: [idev] CDI.KEYID = 6
3,523,955 UART: [idev] SUBJECT.KEYID = 7
3,525,131 UART: [idev] UDS.KEYID = 0
3,526,064 ready_for_fw is high
3,526,270 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,194 UART: [idev] Erasing UDS.KEYID = 0
6,051,992 UART: [idev] Sha1 KeyId Algorithm
6,074,650 UART: [idev] --
6,079,809 UART: [ldev] ++
6,080,497 UART: [ldev] CDI.KEYID = 6
6,081,419 UART: [ldev] SUBJECT.KEYID = 5
6,082,637 UART: [ldev] AUTHORITY.KEYID = 7
6,083,814 UART: [ldev] FE.KEYID = 1
6,121,432 UART: [ldev] Erasing FE.KEYID = 1
8,629,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,284 UART: [ldev] --
10,435,564 UART: [fwproc] Wait for Commands...
10,438,210 UART: [fwproc] Recv command 0x46574c44
10,440,472 UART: [fwproc] Recv'd Img size: 115224 bytes
13,903,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,978,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,094,716 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,643,001 >>> mbox cmd response: success
14,646,738 UART: [afmc] ++
14,647,433 UART: [afmc] CDI.KEYID = 6
14,648,674 UART: [afmc] SUBJECT.KEYID = 7
14,650,108 UART: [afmc] AUTHORITY.KEYID = 5
17,190,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,915,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,917,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,932,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,947,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,963,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,985,961 UART: [afmc] --
18,989,646 UART: [cold-reset] --
18,994,000 UART: [state] Locking Datavault
18,997,652 UART: [state] Locking PCR0, PCR1 and PCR31
18,999,791 UART: [state] Locking ICCM
19,001,145 UART: [exit] Launching FMC @ 0x40000130
19,009,820 UART:
19,010,060 UART: Running Caliptra FMC ...
19,011,167 UART:
19,011,331 UART: [state] CFI Enabled
19,072,826 UART: [fht] FMC Alias Private Key: 7
20,837,273 UART: [art] Extend RT PCRs Done
20,838,500 UART: [art] Lock RT PCRs Done
20,840,262 UART: [art] Populate DV Done
20,845,780 UART: [fht] FMC Alias Private Key: 7
20,847,268 UART: [art] Derive CDI
20,848,003 UART: [art] Store in in slot 0x4
20,905,634 UART: [art] Derive Key Pair
20,906,676 UART: [art] Store priv key in slot 0x5
23,369,298 UART: [art] Derive Key Pair - Done
23,382,241 UART: [art] Signing Cert with AUTHO
23,383,542 UART: RITY.KEYID = 7
25,096,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,635 UART: [art] PUB.X = 0D7560B68815F9BF22159D84802234ADF1DF9020585D01B3366926D3F6365360A5DED3BD99E0634638016938E3D1A429
25,104,848 UART: [art] PUB.Y = 960AA4CE2A30EB0F45D4DB077A1C8CEC4233F4D739C035F18A74572B712206267D5281559A3DA27E4DF5F75D12ED6608
25,112,145 UART: [art] SIG.R = 626F742B6558E6D9C9BFF1D6505585FD6C12F79D4933A7753931F20D71CDA0A17F6C891BB787745F4A0FE852824DC2FC
25,119,492 UART: [art] SIG.S = DF59EB44AFEACCD2CFA0257E3A6F17E420961CB0A89B13DE492A03E63C07BF8344AEEBE7FA55B701740C78B24F7D9FCA
26,098,628 UART: Caliptra RT
26,099,345 UART: [state] CFI Enabled
26,264,793 UART: [rt] RT listening for mailbox commands...
26,266,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,296,534 UART: [rt]cmd =0x46504c54, len=4
26,298,116 >>> mbox cmd response data (8 bytes)
26,299,500 UART: [rt] FIPS self test
26,300,436 UART: [kat] ++
26,300,969 UART: [kat] sha1
26,305,533 UART: [kat] SHA2-256
26,307,411 UART: [kat] SHA2-384
26,310,476 UART: [kat] SHA2-512-ACC
26,312,712 UART: [kat] ECC-384
27,040,463 UART: Fatal Error: 0x90040004
27,075,884 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,220,535 >>> mbox cmd response: failed
27,221,164 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,365,851 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,105 UART:
190,408 UART: Running Caliptra ROM ...
191,466 UART:
191,614 UART: [state] CFI Enabled
265,515 UART: [state] LifecycleState = Unprovisioned
267,929 UART: [state] DebugLocked = No
270,031 UART: [state] WD Timer not started. Device not locked for debugging
274,319 UART: [kat] SHA2-256
464,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,942 UART: [kat] ++
475,420 UART: [kat] sha1
485,868 UART: [kat] SHA2-256
488,883 UART: [kat] SHA2-384
493,567 UART: [kat] SHA2-512-ACC
496,181 UART: [kat] ECC-384
2,949,992 UART: [kat] HMAC-384Kdf
2,974,648 UART: [kat] LMS
3,506,423 UART: [kat] --
3,510,087 UART: [cold-reset] ++
3,511,214 UART: [fht] FHT @ 0x50003400
3,524,057 UART: [idev] ++
3,524,734 UART: [idev] CDI.KEYID = 6
3,525,670 UART: [idev] SUBJECT.KEYID = 7
3,526,881 UART: [idev] UDS.KEYID = 0
3,528,367 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,673,226 UART: [idev] Erasing UDS.KEYID = 0
6,032,153 UART: [idev] Sha1 KeyId Algorithm
6,053,212 UART: [idev] --
6,056,728 UART: [ldev] ++
6,057,416 UART: [ldev] CDI.KEYID = 6
6,058,301 UART: [ldev] SUBJECT.KEYID = 5
6,059,518 UART: [ldev] AUTHORITY.KEYID = 7
6,060,643 UART: [ldev] FE.KEYID = 1
6,103,777 UART: [ldev] Erasing FE.KEYID = 1
8,609,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,985 UART: [ldev] --
10,417,143 UART: [fwproc] Wait for Commands...
10,418,860 UART: [fwproc] Recv command 0x46574c44
10,421,221 UART: [fwproc] Recv'd Img size: 115224 bytes
13,881,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,068 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,619,972 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,440,234 ready_for_fw is high
3,440,818 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,759,755 >>> mbox cmd response: success
19,069,855 UART:
19,070,253 UART: Running Caliptra FMC ...
19,071,398 UART:
19,071,564 UART: [state] CFI Enabled
19,137,120 UART: [fht] FMC Alias Private Key: 7
20,901,363 UART: [art] Extend RT PCRs Done
20,902,586 UART: [art] Lock RT PCRs Done
20,904,593 UART: [art] Populate DV Done
20,909,909 UART: [fht] FMC Alias Private Key: 7
20,911,505 UART: [art] Derive CDI
20,912,318 UART: [art] Store in in slot 0x4
20,969,306 UART: [art] Derive Key Pair
20,970,352 UART: [art] Store priv key in slot 0x5
23,433,226 UART: [art] Derive Key Pair - Done
23,446,183 UART: [art] Signing Cert with AUTHO
23,447,501 UART: RITY.KEYID = 7
25,158,748 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,264 UART: [art] PUB.X = 97BE098F273FF070103D8CDFF3318067C085AEE37D11619E64A739685A80A37A36B3B79A3144BEC82E1893D65D6B326C
25,167,543 UART: [art] PUB.Y = FFFA53C66E4F240BF6CB5508D8B02FEDC08492B01C809900B40BFCE1012000ACCD7D0E00DD3302481A1A4486404D9DD0
25,174,755 UART: [art] SIG.R = 897FD3F73A25F1CF5A586A2DC22FC24D6D0779557D1DF4C4F85E7434766D2AA74613F854C0E82CC6C49F96AEF46DBD77
25,182,169 UART: [art] SIG.S = 8CF1DF02B070302AEB3F471589BF64A1DDC4A3F4F3D079BF65AB287344620378A9D40F8A8D1655EA3405D73559371BD9
26,161,451 UART: Caliptra RT
26,162,144 UART: [state] CFI Enabled
26,325,852 UART: [rt] RT listening for mailbox commands...
26,327,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,449 UART: [rt]cmd =0x46504c54, len=4
26,359,191 >>> mbox cmd response data (8 bytes)
26,360,091 UART: [rt] FIPS self test
26,361,034 UART: [kat] ++
26,361,507 UART: [kat] sha1
26,366,175 UART: [kat] SHA2-256
26,368,105 UART: [kat] SHA2-384
26,370,846 UART: [kat] SHA2-512-ACC
26,373,096 UART: [kat] ECC-384
27,101,792 UART: Fatal Error: 0x90040004
27,137,078 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,281,963 >>> mbox cmd response: failed
27,282,635 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,427,288 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,441,069 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,751,630 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,577 UART:
192,937 UART: Running Caliptra ROM ...
194,118 UART:
603,846 UART: [state] CFI Enabled
616,811 UART: [state] LifecycleState = Unprovisioned
619,203 UART: [state] DebugLocked = No
620,530 UART: [state] WD Timer not started. Device not locked for debugging
625,160 UART: [kat] SHA2-256
815,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,817 UART: [kat] ++
826,422 UART: [kat] sha1
837,374 UART: [kat] SHA2-256
840,391 UART: [kat] SHA2-384
847,043 UART: [kat] SHA2-512-ACC
849,667 UART: [kat] ECC-384
3,290,037 UART: [kat] HMAC-384Kdf
3,304,558 UART: [kat] LMS
3,836,342 UART: [kat] --
3,841,498 UART: [cold-reset] ++
3,844,075 UART: [fht] FHT @ 0x50003400
3,855,134 UART: [idev] ++
3,855,855 UART: [idev] CDI.KEYID = 6
3,856,769 UART: [idev] SUBJECT.KEYID = 7
3,858,039 UART: [idev] UDS.KEYID = 0
3,858,968 ready_for_fw is high
3,859,177 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,003,883 UART: [idev] Erasing UDS.KEYID = 0
6,335,067 UART: [idev] Sha1 KeyId Algorithm
6,356,143 UART: [idev] --
6,360,788 UART: [ldev] ++
6,361,468 UART: [ldev] CDI.KEYID = 6
6,362,434 UART: [ldev] SUBJECT.KEYID = 5
6,363,595 UART: [ldev] AUTHORITY.KEYID = 7
6,364,826 UART: [ldev] FE.KEYID = 1
6,377,040 UART: [ldev] Erasing FE.KEYID = 1
8,854,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,497 UART: [ldev] --
10,648,339 UART: [fwproc] Wait for Commands...
10,650,385 UART: [fwproc] Recv command 0x46574c44
10,652,643 UART: [fwproc] Recv'd Img size: 115224 bytes
14,099,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,571 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,844,240 >>> mbox cmd response: success
14,847,962 UART: [afmc] ++
14,848,695 UART: [afmc] CDI.KEYID = 6
14,849,887 UART: [afmc] SUBJECT.KEYID = 7
14,851,323 UART: [afmc] AUTHORITY.KEYID = 5
17,358,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,404 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,516 UART: [afmc] --
19,156,167 UART: [cold-reset] --
19,160,244 UART: [state] Locking Datavault
19,166,251 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,479 UART: [state] Locking ICCM
19,171,344 UART: [exit] Launching FMC @ 0x40000130
19,180,007 UART:
19,180,257 UART: Running Caliptra FMC ...
19,181,366 UART:
19,181,531 UART: [state] CFI Enabled
19,189,313 UART: [fht] FMC Alias Private Key: 7
20,946,405 UART: [art] Extend RT PCRs Done
20,947,626 UART: [art] Lock RT PCRs Done
20,949,274 UART: [art] Populate DV Done
20,954,797 UART: [fht] FMC Alias Private Key: 7
20,956,498 UART: [art] Derive CDI
20,957,320 UART: [art] Store in in slot 0x4
20,999,537 UART: [art] Derive Key Pair
21,000,541 UART: [art] Store priv key in slot 0x5
23,427,130 UART: [art] Derive Key Pair - Done
23,439,858 UART: [art] Signing Cert with AUTHO
23,441,168 UART: RITY.KEYID = 7
25,146,963 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,471 UART: [art] PUB.X = 87ECC23ACF47DFEC711BAA819D9992F6EBC821673229BD71662BAEC8A6FBDCC68A330BCEC9D5316F33BAB4C0BED2E347
25,155,786 UART: [art] PUB.Y = 53594811AA7E9727341F60773EBB339AB18F9E84C38FA7C5A3E4846F2CF47B0660CD264FC9BACDE7BD05EB4A8C1C2D1F
25,163,080 UART: [art] SIG.R = 499A77FF84BEBEB964FB05E60706AA60E9F68D9BE18C39087C766EC6088D0A010BF39F88C36507BD343B7D677287E920
25,170,511 UART: [art] SIG.S = CDE9B6CDABB38813320A4B21B842A040DA1C3CB2561C691B2D370FC39BF9C0AB8BAF3BE187882EE2EA5C500FF93D4791
26,149,559 UART: Caliptra RT
26,150,243 UART: [state] CFI Enabled
26,268,235 UART: [rt] RT listening for mailbox commands...
26,270,082 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,299,769 UART: [rt]cmd =0x46504c54, len=4
26,301,272 >>> mbox cmd response data (8 bytes)
26,302,291 UART: [rt] FIPS self test
26,303,236 UART: [kat] ++
26,303,690 UART: [kat] sha1
26,307,985 UART: [kat] SHA2-256
26,309,911 UART: [kat] SHA2-384
26,312,828 UART: [kat] SHA2-512-ACC
26,315,119 UART: [kat] ECC-384
27,037,580 UART: Fatal Error: 0x90040004
27,072,903 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,217,616 >>> mbox cmd response: failed
27,218,284 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,362,959 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,137 UART:
190,433 UART: Running Caliptra ROM ...
191,548 UART:
13,160,371 UART: [state] CFI Enabled
13,175,475 UART: [state] LifecycleState = Unprovisioned
13,177,853 UART: [state] DebugLocked = No
13,179,816 UART: [state] WD Timer not started. Device not locked for debugging
13,183,825 UART: [kat] SHA2-256
13,373,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,384,499 UART: [kat] ++
13,384,955 UART: [kat] sha1
13,397,086 UART: [kat] SHA2-256
13,400,108 UART: [kat] SHA2-384
13,406,036 UART: [kat] SHA2-512-ACC
13,408,606 UART: [kat] ECC-384
15,851,319 UART: [kat] HMAC-384Kdf
15,863,226 UART: [kat] LMS
16,395,045 UART: [kat] --
16,401,516 UART: [cold-reset] ++
16,403,716 UART: [fht] FHT @ 0x50003400
16,415,228 UART: [idev] ++
16,415,907 UART: [idev] CDI.KEYID = 6
16,416,921 UART: [idev] SUBJECT.KEYID = 7
16,418,024 UART: [idev] UDS.KEYID = 0
16,419,700 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
16,564,343 UART: [idev] Erasing UDS.KEYID = 0
18,895,488 UART: [idev] Sha1 KeyId Algorithm
18,918,827 UART: [idev] --
18,923,518 UART: [ldev] ++
18,924,231 UART: [ldev] CDI.KEYID = 6
18,925,168 UART: [ldev] SUBJECT.KEYID = 5
18,926,273 UART: [ldev] AUTHORITY.KEYID = 7
18,927,505 UART: [ldev] FE.KEYID = 1
18,938,620 UART: [ldev] Erasing FE.KEYID = 1
21,417,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,137,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,152,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,167,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,183,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,204,015 UART: [ldev] --
23,209,819 UART: [fwproc] Wait for Commands...
23,211,597 UART: [fwproc] Recv command 0x46574c44
23,213,916 UART: [fwproc] Recv'd Img size: 115224 bytes
26,668,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,747,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
26,864,024 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
27,411,636 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,752,445 ready_for_fw is high
3,752,915 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,967,902 >>> mbox cmd response: success
19,219,468 UART:
19,219,954 UART: Running Caliptra FMC ...
19,221,084 UART:
19,221,238 UART: [state] CFI Enabled
19,228,988 UART: [fht] FMC Alias Private Key: 7
20,985,692 UART: [art] Extend RT PCRs Done
20,986,944 UART: [art] Lock RT PCRs Done
20,988,597 UART: [art] Populate DV Done
20,994,069 UART: [fht] FMC Alias Private Key: 7
20,995,561 UART: [art] Derive CDI
20,996,330 UART: [art] Store in in slot 0x4
21,038,979 UART: [art] Derive Key Pair
21,039,988 UART: [art] Store priv key in slot 0x5
23,467,214 UART: [art] Derive Key Pair - Done
23,480,113 UART: [art] Signing Cert with AUTHO
23,481,426 UART: RITY.KEYID = 7
25,186,999 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,513 UART: [art] PUB.X = 1792CF32B91F4FBDC15D99C9E3A734E0E8A19D652B9C500C03C260F5E862C1AEA870F056922C61EF607262BE0B747504
25,195,718 UART: [art] PUB.Y = BBAE316AC499D10FB2DEEFB6190E75E267B6A032F3267FD6E7ED04CCB35B0D2BFBC8A310DFF8949C07676A0360932D1B
25,203,038 UART: [art] SIG.R = E62A9C232F5004E2CA0AF2659A8A5D41BEF93E09343F135D1B2C7979AF7C77644F06E720BB1F3FFCEC990787C5EB0C72
25,210,382 UART: [art] SIG.S = 4ECA7C82FCBCBBF5E7FFF122C2885B0DA39BADC2DE78108C7178E2221C3970F187C08C3EF9F1AFD92174D88EE7A434D7
26,189,121 UART: Caliptra RT
26,189,853 UART: [state] CFI Enabled
26,306,926 UART: [rt] RT listening for mailbox commands...
26,308,782 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,372 UART: [rt]cmd =0x46504c54, len=4
26,339,923 >>> mbox cmd response data (8 bytes)
26,341,025 UART: [rt] FIPS self test
26,341,977 UART: [kat] ++
26,342,431 UART: [kat] sha1
26,346,698 UART: [kat] SHA2-256
26,348,631 UART: [kat] SHA2-384
26,351,648 UART: [kat] SHA2-512-ACC
26,353,890 UART: [kat] ECC-384
27,076,520 UART: Fatal Error: 0x90040004
27,111,736 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,256,424 >>> mbox cmd response: failed
27,257,072 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,401,713 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
16,281,490 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
27,502,173 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,005 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,595 UART: [kat] SHA2-256
881,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,641 UART: [kat] ++
885,793 UART: [kat] sha1
889,967 UART: [kat] SHA2-256
891,905 UART: [kat] SHA2-384
894,528 UART: [kat] SHA2-512-ACC
896,429 UART: [kat] ECC-384
901,986 UART: [kat] HMAC-384Kdf
906,448 UART: [kat] LMS
1,474,644 UART: [kat] --
1,475,713 UART: [cold-reset] ++
1,476,115 UART: [fht] Storing FHT @ 0x50003400
1,478,984 UART: [idev] ++
1,479,152 UART: [idev] CDI.KEYID = 6
1,479,512 UART: [idev] SUBJECT.KEYID = 7
1,479,936 UART: [idev] UDS.KEYID = 0
1,480,281 ready_for_fw is high
1,480,281 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,780 UART: [idev] Erasing UDS.KEYID = 0
1,504,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,888 UART: [idev] --
1,513,973 UART: [ldev] ++
1,514,141 UART: [ldev] CDI.KEYID = 6
1,514,504 UART: [ldev] SUBJECT.KEYID = 5
1,514,930 UART: [ldev] AUTHORITY.KEYID = 7
1,515,393 UART: [ldev] FE.KEYID = 1
1,520,651 UART: [ldev] Erasing FE.KEYID = 1
1,545,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,360 UART: [ldev] --
1,584,821 UART: [fwproc] Waiting for Commands...
1,585,644 UART: [fwproc] Received command 0x46574c44
1,586,435 UART: [fwproc] Received Image of size 115224 bytes
2,893,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,764 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,087,293 >>> mbox cmd response: success
3,088,397 UART: [afmc] ++
3,088,565 UART: [afmc] CDI.KEYID = 6
3,088,927 UART: [afmc] SUBJECT.KEYID = 7
3,089,352 UART: [afmc] AUTHORITY.KEYID = 5
3,124,223 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,828 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,518 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,369 UART: [afmc] --
3,167,273 UART: [cold-reset] --
3,168,161 UART: [state] Locking Datavault
3,169,404 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,008 UART: [state] Locking ICCM
3,170,582 UART: [exit] Launching FMC @ 0x40000130
3,175,911 UART:
3,175,927 UART: Running Caliptra FMC ...
3,176,335 UART:
3,176,389 UART: [state] CFI Enabled
3,187,018 UART: [fht] FMC Alias Private Key: 7
3,294,921 UART: [art] Extend RT PCRs Done
3,295,349 UART: [art] Lock RT PCRs Done
3,296,661 UART: [art] Populate DV Done
3,304,994 UART: [fht] FMC Alias Private Key: 7
3,306,150 UART: [art] Derive CDI
3,306,430 UART: [art] Store in in slot 0x4
3,391,831 UART: [art] Derive Key Pair
3,392,191 UART: [art] Store priv key in slot 0x5
3,404,525 UART: [art] Derive Key Pair - Done
3,419,441 UART: [art] Signing Cert with AUTHO
3,419,921 UART: RITY.KEYID = 7
3,435,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,370 UART: [art] PUB.X = 35D398D0CD41895E59422377ADAA988E8E8C0710E83324D9EAAB72CEE5A78512A88AD86FFE7A1DBE56F008F5CB03572D
3,443,143 UART: [art] PUB.Y = CB4BD28B7EAC1A6ECB9C774556D4F3657978CFAA48BF9A4E8C8685D11970572B7E5AB8ABFA4B03F7D857D50EE8426BAE
3,450,109 UART: [art] SIG.R = 159441C036F0B2F78AF6B9E1B0118F8F9848232C5812BFCBA3E77AFC9FA9BA59498B5B5723C212B81599DC50859E00F8
3,456,861 UART: [art] SIG.S = 8BA1C9997DD3AADF9BF8A264E9A983DE164FDFBB7C5BB1C99EC9F83C0639CDBA6AEE4F4DC52175C385B1AE621BED9F51
3,480,707 UART: Caliptra RT
3,480,961 UART: [state] CFI Enabled
3,588,743 UART: [rt] RT listening for mailbox commands...
3,589,406 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,686 UART: [rt]cmd =0x46504c54, len=4
3,619,956 >>> mbox cmd response data (8 bytes)
3,620,271 UART: [rt] FIPS self test
3,620,599 UART: [kat] ++
3,620,751 UART: [kat] sha1
3,625,013 UART: [kat] SHA2-256
3,627,035 UART: [kat] SHA2-384
3,629,954 UART: [kat] SHA2-512-ACC
3,631,881 UART: [kat] ECC-384
3,635,433 UART: Fatal Error: 0x90040004
3,636,983 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,636,988 >>> mbox cmd response: failed
3,636,988 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,636,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,782 UART: [kat] HMAC-384Kdf
907,490 UART: [kat] LMS
1,475,686 UART: [kat] --
1,476,643 UART: [cold-reset] ++
1,477,013 UART: [fht] Storing FHT @ 0x50003400
1,479,860 UART: [idev] ++
1,480,028 UART: [idev] CDI.KEYID = 6
1,480,388 UART: [idev] SUBJECT.KEYID = 7
1,480,812 UART: [idev] UDS.KEYID = 0
1,481,157 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,504,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,600 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,521,265 UART: [ldev] Erasing FE.KEYID = 1
1,546,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,846 UART: [ldev] --
1,586,319 UART: [fwproc] Waiting for Commands...
1,587,038 UART: [fwproc] Received command 0x46574c44
1,587,829 UART: [fwproc] Received Image of size 115224 bytes
2,895,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,808 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,325 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,789 ready_for_fw is high
1,362,789 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,933 >>> mbox cmd response: success
3,001,273 UART:
3,001,289 UART: Running Caliptra FMC ...
3,001,697 UART:
3,001,751 UART: [state] CFI Enabled
3,012,036 UART: [fht] FMC Alias Private Key: 7
3,120,129 UART: [art] Extend RT PCRs Done
3,120,557 UART: [art] Lock RT PCRs Done
3,122,115 UART: [art] Populate DV Done
3,130,460 UART: [fht] FMC Alias Private Key: 7
3,131,474 UART: [art] Derive CDI
3,131,754 UART: [art] Store in in slot 0x4
3,217,497 UART: [art] Derive Key Pair
3,217,857 UART: [art] Store priv key in slot 0x5
3,230,707 UART: [art] Derive Key Pair - Done
3,245,282 UART: [art] Signing Cert with AUTHO
3,245,762 UART: RITY.KEYID = 7
3,260,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,385 UART: [art] PUB.X = 90EEB4B345CA47178F3E772864050069CE2278150157280DE4E7652BB54CEC294BED021BD1198DF78BEA38D5813BED6A
3,268,125 UART: [art] PUB.Y = 3A987ABF41DAADEBD5BA36FABD0BC80A655756E0B8BDA0A3BD2D70C1D6553731945AE694EC4D9560D82C0C0705113331
3,275,076 UART: [art] SIG.R = 910EB526B3A61DDF81F12AD9B9798C74CAEF11EC48A15A3A57788F1C6450E6CF63E4A44D5DD2EFA80AC4F084FFFB8BED
3,281,866 UART: [art] SIG.S = 1695DD81FF09021EDB84C8DCF6EFFB2212E86BF7AA3133DE4A2C4CE6DC21ED8D8D58A26A2D94CA58340A330EA9508147
3,305,161 UART: Caliptra RT
3,305,415 UART: [state] CFI Enabled
3,413,827 UART: [rt] RT listening for mailbox commands...
3,414,490 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,042 UART: [rt]cmd =0x46504c54, len=4
3,445,156 >>> mbox cmd response data (8 bytes)
3,445,361 UART: [rt] FIPS self test
3,445,689 UART: [kat] ++
3,445,841 UART: [kat] sha1
3,450,185 UART: [kat] SHA2-256
3,452,207 UART: [kat] SHA2-384
3,455,006 UART: [kat] SHA2-512-ACC
3,456,933 UART: [kat] ECC-384
3,460,503 UART: Fatal Error: 0x90040004
3,462,053 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,462,058 >>> mbox cmd response: failed
3,462,058 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,462,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,229 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,637 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,488 UART: [kat] SHA2-256
892,426 UART: [kat] SHA2-384
895,081 UART: [kat] SHA2-512-ACC
896,982 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,667 UART: [kat] LMS
1,475,863 UART: [kat] --
1,477,018 UART: [cold-reset] ++
1,477,482 UART: [fht] Storing FHT @ 0x50003400
1,480,271 UART: [idev] ++
1,480,439 UART: [idev] CDI.KEYID = 6
1,480,799 UART: [idev] SUBJECT.KEYID = 7
1,481,223 UART: [idev] UDS.KEYID = 0
1,481,568 ready_for_fw is high
1,481,568 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,361 UART: [idev] Erasing UDS.KEYID = 0
1,506,125 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,695 UART: [idev] --
1,515,816 UART: [ldev] ++
1,515,984 UART: [ldev] CDI.KEYID = 6
1,516,347 UART: [ldev] SUBJECT.KEYID = 5
1,516,773 UART: [ldev] AUTHORITY.KEYID = 7
1,517,236 UART: [ldev] FE.KEYID = 1
1,522,674 UART: [ldev] Erasing FE.KEYID = 1
1,547,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,211 UART: [ldev] --
1,587,536 UART: [fwproc] Waiting for Commands...
1,588,185 UART: [fwproc] Received command 0x46574c44
1,588,976 UART: [fwproc] Received Image of size 115224 bytes
2,897,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,345 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,840 >>> mbox cmd response: success
3,092,860 UART: [afmc] ++
3,093,028 UART: [afmc] CDI.KEYID = 6
3,093,390 UART: [afmc] SUBJECT.KEYID = 7
3,093,815 UART: [afmc] AUTHORITY.KEYID = 5
3,129,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,108 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,993 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,683 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,464 UART: [afmc] --
3,172,382 UART: [cold-reset] --
3,173,348 UART: [state] Locking Datavault
3,174,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,091 UART: [state] Locking ICCM
3,175,765 UART: [exit] Launching FMC @ 0x40000130
3,181,094 UART:
3,181,110 UART: Running Caliptra FMC ...
3,181,518 UART:
3,181,661 UART: [state] CFI Enabled
3,192,190 UART: [fht] FMC Alias Private Key: 7
3,300,731 UART: [art] Extend RT PCRs Done
3,301,159 UART: [art] Lock RT PCRs Done
3,302,787 UART: [art] Populate DV Done
3,310,802 UART: [fht] FMC Alias Private Key: 7
3,311,762 UART: [art] Derive CDI
3,312,042 UART: [art] Store in in slot 0x4
3,397,647 UART: [art] Derive Key Pair
3,398,007 UART: [art] Store priv key in slot 0x5
3,411,605 UART: [art] Derive Key Pair - Done
3,426,703 UART: [art] Signing Cert with AUTHO
3,427,183 UART: RITY.KEYID = 7
3,441,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,618 UART: [art] PUB.X = F92951FDAD142EE1EC382737A73A558BD7982E57683D8C4326A1C98BB1D81A504723915CFBBC503BE2C99940EE1D39CC
3,449,396 UART: [art] PUB.Y = 1B7DAB51FE519C772EA707DE9D21E541A106F025AE1EDEB1606A1DD5A6C2E3B9E3C8C51D40A73C86BA2C2433DECA5DCC
3,456,366 UART: [art] SIG.R = 1F59C53AF52526BBD88A889BCAC6C6E8D375EDF15B47872FA57A9AD4DEFAA34512E6C5E04580F495A79B3E3830674707
3,463,143 UART: [art] SIG.S = 241160C385CFA42D09F4B75D4F7D8C06A96DB6EE325865093EB7C51D79733EF4C5AC80F91A2BC691A591150C3A1A35F6
3,486,676 UART: Caliptra RT
3,487,022 UART: [state] CFI Enabled
3,595,371 UART: [rt] RT listening for mailbox commands...
3,596,034 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,666 UART: [rt]cmd =0x46504c54, len=4
3,626,716 >>> mbox cmd response data (8 bytes)
3,626,851 UART: [rt] FIPS self test
3,627,179 UART: [kat] ++
3,627,331 UART: [kat] sha1
3,631,589 UART: [kat] SHA2-256
3,633,611 UART: [kat] SHA2-384
3,636,376 UART: [kat] SHA2-512-ACC
3,638,303 UART: [kat] ECC-384
3,641,829 UART: Fatal Error: 0x90040004
3,643,379 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,643,384 >>> mbox cmd response: failed
3,643,384 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,643,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,939 UART: [state] LifecycleState = Unprovisioned
86,594 UART: [state] DebugLocked = No
87,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,728 UART: [kat] SHA2-256
882,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,774 UART: [kat] ++
886,926 UART: [kat] sha1
891,082 UART: [kat] SHA2-256
893,020 UART: [kat] SHA2-384
895,839 UART: [kat] SHA2-512-ACC
897,740 UART: [kat] ECC-384
903,285 UART: [kat] HMAC-384Kdf
907,809 UART: [kat] LMS
1,476,005 UART: [kat] --
1,476,990 UART: [cold-reset] ++
1,477,376 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,173 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,065 UART: [idev] --
1,515,058 UART: [ldev] ++
1,515,226 UART: [ldev] CDI.KEYID = 6
1,515,589 UART: [ldev] SUBJECT.KEYID = 5
1,516,015 UART: [ldev] AUTHORITY.KEYID = 7
1,516,478 UART: [ldev] FE.KEYID = 1
1,521,832 UART: [ldev] Erasing FE.KEYID = 1
1,546,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,711 UART: [ldev] --
1,586,076 UART: [fwproc] Waiting for Commands...
1,586,825 UART: [fwproc] Received command 0x46574c44
1,587,616 UART: [fwproc] Received Image of size 115224 bytes
2,895,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,451 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,803 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,980 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,282 ready_for_fw is high
1,363,282 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,394 >>> mbox cmd response: success
3,002,060 UART:
3,002,076 UART: Running Caliptra FMC ...
3,002,484 UART:
3,002,627 UART: [state] CFI Enabled
3,013,106 UART: [fht] FMC Alias Private Key: 7
3,120,857 UART: [art] Extend RT PCRs Done
3,121,285 UART: [art] Lock RT PCRs Done
3,122,985 UART: [art] Populate DV Done
3,131,240 UART: [fht] FMC Alias Private Key: 7
3,132,170 UART: [art] Derive CDI
3,132,450 UART: [art] Store in in slot 0x4
3,218,117 UART: [art] Derive Key Pair
3,218,477 UART: [art] Store priv key in slot 0x5
3,231,657 UART: [art] Derive Key Pair - Done
3,246,447 UART: [art] Signing Cert with AUTHO
3,246,927 UART: RITY.KEYID = 7
3,262,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,226 UART: [art] PUB.X = 0D53B287674CF4255D1FDFDA555958C5826382DB5E5F96814989A9CD7EB6C0C2B336A38F0E3C8612CC6801ACC18BDB4F
3,269,997 UART: [art] PUB.Y = FFED021853D19C2AB6F6298BAA26E543CD85A108A4EB50700CED61B114994FD9A2DB97846EBF74CF1CBD6143C8C11457
3,276,952 UART: [art] SIG.R = 971176F6D8DABF61DDE664D7D4E6C1F6E3F3E6EE01C070FCDC47564FBDF136E071E188D67A55A9D8BB278092D8872AF4
3,283,735 UART: [art] SIG.S = 8F9E07B38517183BA1AD08832CEC5C57887021F483E01DD5B6C133BFC5A29218E9B5140C4B0D63455D1431AB7BC2EE4F
3,307,478 UART: Caliptra RT
3,307,824 UART: [state] CFI Enabled
3,416,307 UART: [rt] RT listening for mailbox commands...
3,416,970 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,426 UART: [rt]cmd =0x46504c54, len=4
3,447,778 >>> mbox cmd response data (8 bytes)
3,448,145 UART: [rt] FIPS self test
3,448,473 UART: [kat] ++
3,448,625 UART: [kat] sha1
3,452,957 UART: [kat] SHA2-256
3,454,979 UART: [kat] SHA2-384
3,457,854 UART: [kat] SHA2-512-ACC
3,459,781 UART: [kat] ECC-384
3,463,409 UART: Fatal Error: 0x90040004
3,464,959 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,464,964 >>> mbox cmd response: failed
3,464,964 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,464,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,318 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
893,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,597 UART: [kat] ++
897,749 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,632 UART: [kat] SHA2-512-ACC
908,533 UART: [kat] ECC-384
917,854 UART: [kat] HMAC-384Kdf
922,404 UART: [kat] LMS
1,170,732 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,171,949 UART: [fht] FHT @ 0x50003400
1,174,638 UART: [idev] ++
1,174,806 UART: [idev] CDI.KEYID = 6
1,175,166 UART: [idev] SUBJECT.KEYID = 7
1,175,590 UART: [idev] UDS.KEYID = 0
1,175,935 ready_for_fw is high
1,175,935 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,600 UART: [idev] Erasing UDS.KEYID = 0
1,200,977 UART: [idev] Sha1 KeyId Algorithm
1,209,657 UART: [idev] --
1,210,781 UART: [ldev] ++
1,210,949 UART: [ldev] CDI.KEYID = 6
1,211,312 UART: [ldev] SUBJECT.KEYID = 5
1,211,738 UART: [ldev] AUTHORITY.KEYID = 7
1,212,201 UART: [ldev] FE.KEYID = 1
1,217,501 UART: [ldev] Erasing FE.KEYID = 1
1,244,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,246 UART: [fwproc] Wait for Commands...
1,283,896 UART: [fwproc] Recv command 0x46574c44
1,284,624 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,953 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,150 >>> mbox cmd response: success
2,788,294 UART: [afmc] ++
2,788,462 UART: [afmc] CDI.KEYID = 6
2,788,824 UART: [afmc] SUBJECT.KEYID = 7
2,789,249 UART: [afmc] AUTHORITY.KEYID = 5
2,824,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,104 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,823 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,789 UART: [afmc] --
2,868,811 UART: [cold-reset] --
2,869,829 UART: [state] Locking Datavault
2,870,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,558 UART: [state] Locking ICCM
2,872,142 UART: [exit] Launching FMC @ 0x40000130
2,877,471 UART:
2,877,487 UART: Running Caliptra FMC ...
2,877,895 UART:
2,877,949 UART: [state] CFI Enabled
2,888,338 UART: [fht] FMC Alias Private Key: 7
2,996,169 UART: [art] Extend RT PCRs Done
2,996,597 UART: [art] Lock RT PCRs Done
2,998,127 UART: [art] Populate DV Done
3,006,238 UART: [fht] FMC Alias Private Key: 7
3,007,306 UART: [art] Derive CDI
3,007,586 UART: [art] Store in in slot 0x4
3,093,657 UART: [art] Derive Key Pair
3,094,017 UART: [art] Store priv key in slot 0x5
3,107,409 UART: [art] Derive Key Pair - Done
3,122,090 UART: [art] Signing Cert with AUTHO
3,122,570 UART: RITY.KEYID = 7
3,138,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,869 UART: [art] PUB.X = 3E1BAAACCCD5B793B164909DFC97D771DAC6CA9DDF1C8C48AF469DBD9D258AF71737B4F42426862FA0E269B2108305E9
3,145,654 UART: [art] PUB.Y = B78AC6DA1C51EFC7ADE705A937F02DF394F645C834CFB40CEABC1282190D50CD3E4F25C19DC693E2D9248F7BE172178B
3,152,613 UART: [art] SIG.R = A194050361FBE95407EF88C9B610CDEAA38C78E8D167846AD6FE7F9DFF8D36DE5CD68754DCCD689E5AB4EC8FA86203BF
3,159,393 UART: [art] SIG.S = 7F3D5CB8EB310A699E9CA36FBD00C3A1434983A7D3B76AF64E869868A223171BF22908EA9702A0A8D66738AECFECC453
3,182,903 UART: Caliptra RT
3,183,157 UART: [state] CFI Enabled
3,291,659 UART: [rt] RT listening for mailbox commands...
3,292,322 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,802 UART: [rt]cmd =0x46504c54, len=4
3,323,142 >>> mbox cmd response data (8 bytes)
3,323,345 UART: [rt] FIPS self test
3,323,673 UART: [kat] ++
3,323,825 UART: [kat] sha1
3,328,107 UART: [kat] SHA2-256
3,330,129 UART: [kat] SHA2-384
3,333,142 UART: [kat] SHA2-512-ACC
3,335,069 UART: [kat] ECC-384
3,338,629 UART: Fatal Error: 0x90040004
3,340,179 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,184 >>> mbox cmd response: failed
3,340,184 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
918,114 UART: [kat] HMAC-384Kdf
922,520 UART: [kat] LMS
1,170,848 UART: [kat] --
1,171,405 UART: [cold-reset] ++
1,171,779 UART: [fht] FHT @ 0x50003400
1,174,390 UART: [idev] ++
1,174,558 UART: [idev] CDI.KEYID = 6
1,174,918 UART: [idev] SUBJECT.KEYID = 7
1,175,342 UART: [idev] UDS.KEYID = 0
1,175,687 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,294 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,209,227 UART: [idev] --
1,210,181 UART: [ldev] ++
1,210,349 UART: [ldev] CDI.KEYID = 6
1,210,712 UART: [ldev] SUBJECT.KEYID = 5
1,211,138 UART: [ldev] AUTHORITY.KEYID = 7
1,211,601 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,450 UART: [fwproc] Wait for Commands...
1,283,110 UART: [fwproc] Recv command 0x46574c44
1,283,838 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,439 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,548 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 ready_for_fw is high
1,060,319 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,225 >>> mbox cmd response: success
2,701,707 UART:
2,701,723 UART: Running Caliptra FMC ...
2,702,131 UART:
2,702,185 UART: [state] CFI Enabled
2,712,342 UART: [fht] FMC Alias Private Key: 7
2,820,115 UART: [art] Extend RT PCRs Done
2,820,543 UART: [art] Lock RT PCRs Done
2,821,877 UART: [art] Populate DV Done
2,829,972 UART: [fht] FMC Alias Private Key: 7
2,830,922 UART: [art] Derive CDI
2,831,202 UART: [art] Store in in slot 0x4
2,916,389 UART: [art] Derive Key Pair
2,916,749 UART: [art] Store priv key in slot 0x5
2,929,923 UART: [art] Derive Key Pair - Done
2,944,843 UART: [art] Signing Cert with AUTHO
2,945,323 UART: RITY.KEYID = 7
2,960,211 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,976 UART: [art] PUB.X = F6E2E5A88F05FA9728C47B7DFAFA6465DBB3E79C0ED634C807D4A66979521A43DEBD59AE2BCAB53A91E11D63DBCF0D2B
2,967,760 UART: [art] PUB.Y = 108E4DB4C341450232C5A25ACC43671AEF179E56392705AACD7F8D2DEA0E378DABE647FD0D778EBC5ED62ED3A2BCE24C
2,974,720 UART: [art] SIG.R = 63697464AFCBFEF90F77E7361AFD3B9AB806A84F8E488CA82CB7ECBF14DF667D26C923491A7B3302E0126E7DB5C083A4
2,981,495 UART: [art] SIG.S = 1F6D171D3904C278CDE2ADF087B21D1C82F0A2C041A05890AD57FD628541A5C93FBB30153C90BED77A8E11A42BB58D0A
3,005,480 UART: Caliptra RT
3,005,734 UART: [state] CFI Enabled
3,113,356 UART: [rt] RT listening for mailbox commands...
3,114,019 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,463 UART: [rt]cmd =0x46504c54, len=4
3,144,603 >>> mbox cmd response data (8 bytes)
3,144,930 UART: [rt] FIPS self test
3,145,258 UART: [kat] ++
3,145,410 UART: [kat] sha1
3,149,682 UART: [kat] SHA2-256
3,151,704 UART: [kat] SHA2-384
3,154,403 UART: [kat] SHA2-512-ACC
3,156,330 UART: [kat] ECC-384
3,159,946 UART: Fatal Error: 0x90040004
3,161,496 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,161,501 >>> mbox cmd response: failed
3,161,501 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,161,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,640,219 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
893,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,916 UART: [kat] ++
898,068 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
922,995 UART: [kat] LMS
1,171,323 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,568 UART: [fht] FHT @ 0x50003400
1,175,073 UART: [idev] ++
1,175,241 UART: [idev] CDI.KEYID = 6
1,175,601 UART: [idev] SUBJECT.KEYID = 7
1,176,025 UART: [idev] UDS.KEYID = 0
1,176,370 ready_for_fw is high
1,176,370 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,371 UART: [idev] Erasing UDS.KEYID = 0
1,201,442 UART: [idev] Sha1 KeyId Algorithm
1,209,946 UART: [idev] --
1,210,860 UART: [ldev] ++
1,211,028 UART: [ldev] CDI.KEYID = 6
1,211,391 UART: [ldev] SUBJECT.KEYID = 5
1,211,817 UART: [ldev] AUTHORITY.KEYID = 7
1,212,280 UART: [ldev] FE.KEYID = 1
1,217,620 UART: [ldev] Erasing FE.KEYID = 1
1,243,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,026 UART: [ldev] --
1,283,541 UART: [fwproc] Wait for Commands...
1,284,261 UART: [fwproc] Recv command 0x46574c44
1,284,989 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,838 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,873 >>> mbox cmd response: success
2,788,019 UART: [afmc] ++
2,788,187 UART: [afmc] CDI.KEYID = 6
2,788,549 UART: [afmc] SUBJECT.KEYID = 7
2,788,974 UART: [afmc] AUTHORITY.KEYID = 5
2,825,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,350 UART: [afmc] --
2,869,276 UART: [cold-reset] --
2,870,192 UART: [state] Locking Datavault
2,871,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,123 UART: [state] Locking ICCM
2,872,715 UART: [exit] Launching FMC @ 0x40000130
2,878,044 UART:
2,878,060 UART: Running Caliptra FMC ...
2,878,468 UART:
2,878,611 UART: [state] CFI Enabled
2,889,606 UART: [fht] FMC Alias Private Key: 7
2,997,647 UART: [art] Extend RT PCRs Done
2,998,075 UART: [art] Lock RT PCRs Done
2,999,789 UART: [art] Populate DV Done
3,007,810 UART: [fht] FMC Alias Private Key: 7
3,008,804 UART: [art] Derive CDI
3,009,084 UART: [art] Store in in slot 0x4
3,094,597 UART: [art] Derive Key Pair
3,094,957 UART: [art] Store priv key in slot 0x5
3,108,309 UART: [art] Derive Key Pair - Done
3,123,387 UART: [art] Signing Cert with AUTHO
3,123,867 UART: RITY.KEYID = 7
3,139,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,790 UART: [art] PUB.X = 87CDE745F3F92D4436C9D4505510B70830A6F01F3AD92CB168E0F12E0BB11505DE5177110CE907B8569E72833A773B60
3,146,541 UART: [art] PUB.Y = 5A218DB1292B2DFE8DB0A761D58E299BDC63AD0945D43AB056ACA1DF520F4B3C2AF24F15DCED112C19EF82896A46E07D
3,153,505 UART: [art] SIG.R = 127479024E29E59FECD428BC020DE1060A213B37B2A67B968C2B5571C3D24F7F82EAA322FB0A505ADB9A471D1AF6BFCB
3,160,271 UART: [art] SIG.S = 30EC79C957D470AB87B89F753187B854E736B8FF998A57C62CC7F621AB3DB02AA7FDEBC509D593A67714936F1AF43415
3,183,843 UART: Caliptra RT
3,184,189 UART: [state] CFI Enabled
3,292,691 UART: [rt] RT listening for mailbox commands...
3,293,354 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,720 UART: [rt]cmd =0x46504c54, len=4
3,323,730 >>> mbox cmd response data (8 bytes)
3,323,911 UART: [rt] FIPS self test
3,324,239 UART: [kat] ++
3,324,391 UART: [kat] sha1
3,328,621 UART: [kat] SHA2-256
3,330,643 UART: [kat] SHA2-384
3,333,620 UART: [kat] SHA2-512-ACC
3,335,547 UART: [kat] ECC-384
3,339,251 UART: Fatal Error: 0x90040004
3,340,801 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,806 >>> mbox cmd response: failed
3,340,806 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,340,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,927 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,082 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
893,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,022 UART: [kat] ++
898,174 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
922,919 UART: [kat] LMS
1,171,247 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,407 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,211,220 UART: [ldev] ++
1,211,388 UART: [ldev] CDI.KEYID = 6
1,211,751 UART: [ldev] SUBJECT.KEYID = 5
1,212,177 UART: [ldev] AUTHORITY.KEYID = 7
1,212,640 UART: [ldev] FE.KEYID = 1
1,217,988 UART: [ldev] Erasing FE.KEYID = 1
1,245,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,998 UART: [ldev] --
1,284,495 UART: [fwproc] Wait for Commands...
1,285,067 UART: [fwproc] Recv command 0x46574c44
1,285,795 UART: [fwproc] Recv'd Img size: 115224 bytes
2,594,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,258 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,788,483 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 ready_for_fw is high
1,060,424 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,802 >>> mbox cmd response: success
2,702,186 UART:
2,702,202 UART: Running Caliptra FMC ...
2,702,610 UART:
2,702,753 UART: [state] CFI Enabled
2,713,724 UART: [fht] FMC Alias Private Key: 7
2,821,459 UART: [art] Extend RT PCRs Done
2,821,887 UART: [art] Lock RT PCRs Done
2,823,069 UART: [art] Populate DV Done
2,831,120 UART: [fht] FMC Alias Private Key: 7
2,832,142 UART: [art] Derive CDI
2,832,422 UART: [art] Store in in slot 0x4
2,918,333 UART: [art] Derive Key Pair
2,918,693 UART: [art] Store priv key in slot 0x5
2,931,769 UART: [art] Derive Key Pair - Done
2,946,906 UART: [art] Signing Cert with AUTHO
2,947,386 UART: RITY.KEYID = 7
2,962,900 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,665 UART: [art] PUB.X = E7462E0D9EBE788C9B098CC0D508DEBF1B4239033DA9500DF603F9D22C977DB59BF80344C6CA78C93A38A47E986FF15A
2,970,426 UART: [art] PUB.Y = F28A71588BF4758F33D92CC6F0E30F73AC677A7E07C01CCF1D2D6136710EBAFC72D894E0D5312D267C0717A921CBC827
2,977,372 UART: [art] SIG.R = 30F310DD4C5F3831A5BC0133FE9CE60D7A5F212B68262A6DA521057BC16110E646D19A9F3524359FA982E5DCC58C2922
2,984,135 UART: [art] SIG.S = B2D7953D4B0C19CCDB6B04E9482B9FE87FD41D93062553714D8278205576967053038F47F5152443074DCE8E4D52F58E
3,008,053 UART: Caliptra RT
3,008,399 UART: [state] CFI Enabled
3,116,609 UART: [rt] RT listening for mailbox commands...
3,117,272 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,018 UART: [rt]cmd =0x46504c54, len=4
3,148,214 >>> mbox cmd response data (8 bytes)
3,148,347 UART: [rt] FIPS self test
3,148,675 UART: [kat] ++
3,148,827 UART: [kat] sha1
3,153,029 UART: [kat] SHA2-256
3,155,051 UART: [kat] SHA2-384
3,157,782 UART: [kat] SHA2-512-ACC
3,159,709 UART: [kat] ECC-384
3,163,427 UART: Fatal Error: 0x90040004
3,164,977 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,164,982 >>> mbox cmd response: failed
3,164,982 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,164,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,464 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,051 UART: [fht] FHT @ 0x50003400
1,172,609 UART: [idev] ++
1,172,777 UART: [idev] CDI.KEYID = 6
1,173,138 UART: [idev] SUBJECT.KEYID = 7
1,173,563 UART: [idev] UDS.KEYID = 0
1,173,909 ready_for_fw is high
1,173,909 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,658 UART: [ldev] --
1,280,972 UART: [fwproc] Wait for Commands...
1,281,775 UART: [fwproc] Recv command 0x46574c44
1,282,508 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,158 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,254 >>> mbox cmd response: success
2,785,283 UART: [afmc] ++
2,785,451 UART: [afmc] CDI.KEYID = 6
2,785,814 UART: [afmc] SUBJECT.KEYID = 7
2,786,240 UART: [afmc] AUTHORITY.KEYID = 5
2,821,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,344 UART: [afmc] --
2,865,236 UART: [cold-reset] --
2,866,068 UART: [state] Locking Datavault
2,867,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,733 UART: [state] Locking ICCM
2,868,365 UART: [exit] Launching FMC @ 0x40000130
2,873,694 UART:
2,873,710 UART: Running Caliptra FMC ...
2,874,118 UART:
2,874,172 UART: [state] CFI Enabled
2,884,633 UART: [fht] FMC Alias Private Key: 7
2,992,646 UART: [art] Extend RT PCRs Done
2,993,074 UART: [art] Lock RT PCRs Done
2,994,656 UART: [art] Populate DV Done
3,002,957 UART: [fht] FMC Alias Private Key: 7
3,003,913 UART: [art] Derive CDI
3,004,193 UART: [art] Store in in slot 0x4
3,089,868 UART: [art] Derive Key Pair
3,090,228 UART: [art] Store priv key in slot 0x5
3,103,588 UART: [art] Derive Key Pair - Done
3,118,415 UART: [art] Signing Cert with AUTHO
3,118,895 UART: RITY.KEYID = 7
3,134,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,884 UART: [art] PUB.X = 971BF179F186FBB7A27D26F325E63F9FC76DFE00E0E913F4CC6FB02B0AF3D3E3BD929DA1B0D8B6469982FC5BE4FBBE6C
3,141,655 UART: [art] PUB.Y = EF2DA110ED4AB0CB8859FB64F509BE64BA446FD49CCEAE4E07833BA33B073E1FD6948E41BCC8CB4053ED7F55BB183003
3,148,615 UART: [art] SIG.R = D2D8E7B8C83C3BF92E0E6DBC87BF7D6B68FC1923318DC63F695367B41C534930D1E872291B700620A2770DF5396385A5
3,155,376 UART: [art] SIG.S = 6BFF7D93D97EFC07AC18457F01DEA00CF2C98D8FE183DDDDAF7A8AC78AD441AD73E897BE37BE2B61B817A5567DDD5F95
3,179,386 UART: Caliptra RT
3,179,640 UART: [state] CFI Enabled
3,287,802 UART: [rt] RT listening for mailbox commands...
3,288,465 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,079 UART: [rt]cmd =0x46504c54, len=4
3,319,243 >>> mbox cmd response data (8 bytes)
3,319,420 UART: [rt] FIPS self test
3,319,748 UART: [kat] ++
3,319,900 UART: [kat] sha1
3,324,246 UART: [kat] SHA2-256
3,326,268 UART: [kat] SHA2-384
3,329,147 UART: [kat] SHA2-512-ACC
3,331,074 UART: [kat] ECC-384
3,334,804 UART: Fatal Error: 0x90040004
3,336,354 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,336,359 >>> mbox cmd response: failed
3,336,359 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,336,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,573 UART: [cold-reset] ++
1,170,967 UART: [fht] FHT @ 0x50003400
1,173,731 UART: [idev] ++
1,173,899 UART: [idev] CDI.KEYID = 6
1,174,260 UART: [idev] SUBJECT.KEYID = 7
1,174,685 UART: [idev] UDS.KEYID = 0
1,175,031 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,545 UART: [idev] Erasing UDS.KEYID = 0
1,199,581 UART: [idev] Sha1 KeyId Algorithm
1,208,507 UART: [idev] --
1,209,614 UART: [ldev] ++
1,209,782 UART: [ldev] CDI.KEYID = 6
1,210,146 UART: [ldev] SUBJECT.KEYID = 5
1,210,573 UART: [ldev] AUTHORITY.KEYID = 7
1,211,036 UART: [ldev] FE.KEYID = 1
1,216,196 UART: [ldev] Erasing FE.KEYID = 1
1,242,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,960 UART: [ldev] --
1,282,382 UART: [fwproc] Wait for Commands...
1,283,039 UART: [fwproc] Recv command 0x46574c44
1,283,772 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,274 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,340 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,258 ready_for_fw is high
1,056,258 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,010 >>> mbox cmd response: success
2,695,384 UART:
2,695,400 UART: Running Caliptra FMC ...
2,695,808 UART:
2,695,862 UART: [state] CFI Enabled
2,706,167 UART: [fht] FMC Alias Private Key: 7
2,814,146 UART: [art] Extend RT PCRs Done
2,814,574 UART: [art] Lock RT PCRs Done
2,816,310 UART: [art] Populate DV Done
2,824,359 UART: [fht] FMC Alias Private Key: 7
2,825,403 UART: [art] Derive CDI
2,825,683 UART: [art] Store in in slot 0x4
2,911,164 UART: [art] Derive Key Pair
2,911,524 UART: [art] Store priv key in slot 0x5
2,924,324 UART: [art] Derive Key Pair - Done
2,938,930 UART: [art] Signing Cert with AUTHO
2,939,410 UART: RITY.KEYID = 7
2,954,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,567 UART: [art] PUB.X = 9277AFA9E094E05D8784194FF8859F9FAD1E8EB792B49931836D5792BA26F4D534DE2E1B0EF7C7463F6C638E3241B2D1
2,962,338 UART: [art] PUB.Y = B97F0FAA807BF5AA475F0E5543C1E5C9DF151FC2EB0B1A33499AA82D80E49CABD527FCAC153F7A9CAA373628DD5C0D77
2,969,300 UART: [art] SIG.R = CBEB8919CD9B8EFEA51C01F0C2EA4F618E8A5E994865DA0A312EBD0421A78FB72633982E25540056C0F63349F28F9244
2,976,045 UART: [art] SIG.S = AD0F0AE08BC2E4700C4B2CF2DF8B080A721E4431EB2AE5478BF7C7DE90AE8B38653011BD1A7C984D43BB71CA8F01C433
3,000,146 UART: Caliptra RT
3,000,400 UART: [state] CFI Enabled
3,108,339 UART: [rt] RT listening for mailbox commands...
3,109,002 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,734 UART: [rt]cmd =0x46504c54, len=4
3,139,760 >>> mbox cmd response data (8 bytes)
3,139,907 UART: [rt] FIPS self test
3,140,235 UART: [kat] ++
3,140,387 UART: [kat] sha1
3,144,749 UART: [kat] SHA2-256
3,146,771 UART: [kat] SHA2-384
3,149,634 UART: [kat] SHA2-512-ACC
3,151,561 UART: [kat] ECC-384
3,155,313 UART: Fatal Error: 0x90040004
3,156,863 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,156,868 >>> mbox cmd response: failed
3,156,868 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,156,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,660 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,820 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,803 UART: [state] LifecycleState = Unprovisioned
85,458 UART: [state] DebugLocked = No
86,124 UART: [state] WD Timer not started. Device not locked for debugging
87,281 UART: [kat] SHA2-256
890,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,960 UART: [kat] ++
895,112 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,062 UART: [fht] FHT @ 0x50003400
1,172,798 UART: [idev] ++
1,172,966 UART: [idev] CDI.KEYID = 6
1,173,327 UART: [idev] SUBJECT.KEYID = 7
1,173,752 UART: [idev] UDS.KEYID = 0
1,174,098 ready_for_fw is high
1,174,098 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,199,038 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,201 UART: [ldev] ++
1,209,369 UART: [ldev] CDI.KEYID = 6
1,209,733 UART: [ldev] SUBJECT.KEYID = 5
1,210,160 UART: [ldev] AUTHORITY.KEYID = 7
1,210,623 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,199 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,663 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,169 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,281 >>> mbox cmd response: success
2,787,496 UART: [afmc] ++
2,787,664 UART: [afmc] CDI.KEYID = 6
2,788,027 UART: [afmc] SUBJECT.KEYID = 7
2,788,453 UART: [afmc] AUTHORITY.KEYID = 5
2,824,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,094 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,977 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,696 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,675 UART: [afmc] --
2,867,601 UART: [cold-reset] --
2,868,369 UART: [state] Locking Datavault
2,869,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,402 UART: [state] Locking ICCM
2,870,968 UART: [exit] Launching FMC @ 0x40000130
2,876,297 UART:
2,876,313 UART: Running Caliptra FMC ...
2,876,721 UART:
2,876,864 UART: [state] CFI Enabled
2,887,155 UART: [fht] FMC Alias Private Key: 7
2,994,456 UART: [art] Extend RT PCRs Done
2,994,884 UART: [art] Lock RT PCRs Done
2,996,360 UART: [art] Populate DV Done
3,004,465 UART: [fht] FMC Alias Private Key: 7
3,005,509 UART: [art] Derive CDI
3,005,789 UART: [art] Store in in slot 0x4
3,091,290 UART: [art] Derive Key Pair
3,091,650 UART: [art] Store priv key in slot 0x5
3,105,008 UART: [art] Derive Key Pair - Done
3,120,014 UART: [art] Signing Cert with AUTHO
3,120,494 UART: RITY.KEYID = 7
3,135,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,037 UART: [art] PUB.X = 229409A0F1D29EB5B7B21E39756301155251B35A9E1AFFA62AD50A87B6732921AB400F8B6B218152603B31F1CBEE7969
3,142,793 UART: [art] PUB.Y = 0D63F1F1D6F26AA7AC93A94DED7ED7699B4B1D626D3CC251065B55D8EA685DEB3CF0AFC5A0C5BEBD01E587ABB1836A20
3,149,760 UART: [art] SIG.R = F7EC536E8950FF14BBD2DA44D61915A221A68FB0D9C4C1B12523014EFD2C43112F132AFF12E9FA80522CB40C1FCD49F7
3,156,538 UART: [art] SIG.S = 6C741A28D8F4BD628EB5CDD9082619970AE2328CCACC99EFFD3343276F9A9EAD184960E1504CADF2B784A3F5CB2C0EAC
3,180,576 UART: Caliptra RT
3,180,922 UART: [state] CFI Enabled
3,289,728 UART: [rt] RT listening for mailbox commands...
3,290,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,993 UART: [rt]cmd =0x46504c54, len=4
3,321,003 >>> mbox cmd response data (8 bytes)
3,321,116 UART: [rt] FIPS self test
3,321,444 UART: [kat] ++
3,321,596 UART: [kat] sha1
3,325,718 UART: [kat] SHA2-256
3,327,740 UART: [kat] SHA2-384
3,330,683 UART: [kat] SHA2-512-ACC
3,332,610 UART: [kat] ECC-384
3,336,502 UART: Fatal Error: 0x90040004
3,338,052 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,338,057 >>> mbox cmd response: failed
3,338,057 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,338,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,632 UART: [kat] SHA2-256
901,572 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,169,818 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,173,102 UART: [idev] ++
1,173,270 UART: [idev] CDI.KEYID = 6
1,173,631 UART: [idev] SUBJECT.KEYID = 7
1,174,056 UART: [idev] UDS.KEYID = 0
1,174,402 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,804 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,441 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,635 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,655 ready_for_fw is high
1,056,655 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,337 >>> mbox cmd response: success
2,697,725 UART:
2,697,741 UART: Running Caliptra FMC ...
2,698,149 UART:
2,698,292 UART: [state] CFI Enabled
2,708,911 UART: [fht] FMC Alias Private Key: 7
2,816,806 UART: [art] Extend RT PCRs Done
2,817,234 UART: [art] Lock RT PCRs Done
2,818,800 UART: [art] Populate DV Done
2,826,997 UART: [fht] FMC Alias Private Key: 7
2,827,987 UART: [art] Derive CDI
2,828,267 UART: [art] Store in in slot 0x4
2,913,552 UART: [art] Derive Key Pair
2,913,912 UART: [art] Store priv key in slot 0x5
2,927,138 UART: [art] Derive Key Pair - Done
2,942,308 UART: [art] Signing Cert with AUTHO
2,942,788 UART: RITY.KEYID = 7
2,958,258 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,023 UART: [art] PUB.X = E7ADBDE50C7B50F7374B2D2785A305C127E082764384A16761C995D390C16DD06040FEBED95052C086DC9DC65D3BDB70
2,965,793 UART: [art] PUB.Y = 93D22F15EB12975497900A6C4F4BFCD5DB20CB586E513D63BE49CEE5D76B16C5C39ABA00E830A76FC05F9DC72DDCFB72
2,972,738 UART: [art] SIG.R = 33614A80E9E84E40916FE08DD980E20151F685FCF4582922BA1188CC223E19C77EED36D09EEB4EC7F4D6AE12E05CF43A
2,979,515 UART: [art] SIG.S = 30972E50C58C8DE56EE81496570459385FC58CE4896D2592F76FBA8D2F0A55A7A35D89A99785EBD10B1795F9E80C1073
3,002,854 UART: Caliptra RT
3,003,200 UART: [state] CFI Enabled
3,111,362 UART: [rt] RT listening for mailbox commands...
3,112,025 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,363 UART: [rt]cmd =0x46504c54, len=4
3,142,663 >>> mbox cmd response data (8 bytes)
3,143,030 UART: [rt] FIPS self test
3,143,358 UART: [kat] ++
3,143,510 UART: [kat] sha1
3,147,800 UART: [kat] SHA2-256
3,149,822 UART: [kat] SHA2-384
3,152,861 UART: [kat] SHA2-512-ACC
3,154,788 UART: [kat] ECC-384
3,158,530 UART: Fatal Error: 0x90040004
3,160,080 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,085 >>> mbox cmd response: failed
3,160,085 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,755 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
5,971,138 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,115,568 >>> mbox cmd response: failed
6,116,142 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,259,449 >>> mbox cmd response: failed
Initializing fuses
993 writing to cptra_bootfsm_go
4,866,987 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,449,224 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
5,978,133 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,122,398 >>> mbox cmd response: failed
6,122,965 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,266,242 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
4,860,017 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,435,528 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,975 writing to cptra_bootfsm_go
6,300,626 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,444,740 >>> mbox cmd response: failed
6,445,318 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,588,522 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
18,461,590 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,892,557 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
6,299,071 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,443,200 >>> mbox cmd response: failed
6,443,765 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,586,869 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
18,461,340 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,911,835 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
5,137,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,282,044 >>> mbox cmd response: failed
5,282,614 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,426,094 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,480,382 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,300,372 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
5,177,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,322,074 >>> mbox cmd response: failed
5,322,643 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,466,272 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,453,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,313,803 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
5,201,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,345,978 >>> mbox cmd response: failed
5,346,540 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,490,171 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,450,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,296,800 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
5,500,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,645,281 >>> mbox cmd response: failed
5,645,835 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,789,455 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,858,303 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,589,958 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
5,507,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,651,815 >>> mbox cmd response: failed
5,652,552 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,796,019 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,844,219 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,592,695 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,487 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,495 >>> mbox cmd response: failed
822,495 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,506 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,017 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,025 >>> mbox cmd response: failed
823,025 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,255 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,972 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,006 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,014 >>> mbox cmd response: failed
823,014 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,402 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,053 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,926 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,934 >>> mbox cmd response: failed
822,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,110 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,649,075 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,003 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,011 >>> mbox cmd response: failed
822,011 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,017 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,209 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,264 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,791 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,799 >>> mbox cmd response: failed
822,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,115 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,472 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,762 >>> mbox cmd response: failed
822,762 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,588 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,275 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,522 >>> mbox cmd response: failed
823,522 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,732 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,025 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,639 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,647 >>> mbox cmd response: failed
822,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,983 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,544 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,193 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,201 >>> mbox cmd response: failed
822,201 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,207 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,120 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,968 >>> mbox cmd response: failed
823,968 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,938 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,417 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,842 >>> mbox cmd response: failed
822,842 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
822,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,832 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,697 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,111 UART:
192,485 UART: Running Caliptra ROM ...
193,611 UART:
193,756 UART: [state] CFI Enabled
267,728 UART: [state] LifecycleState = Unprovisioned
269,708 UART: [state] DebugLocked = No
272,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,035 UART: [kat] SHA2-256
446,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,211 UART: [kat] ++
457,746 UART: [kat] sha1
469,188 UART: [kat] SHA2-256
471,849 UART: [kat] SHA2-384
478,855 UART: [kat] SHA2-512-ACC
481,228 UART: [kat] ECC-384
2,769,053 UART: [kat] HMAC-384Kdf
2,801,201 UART: [kat] LMS
3,991,474 UART: [kat] --
3,996,632 UART: [cold-reset] ++
3,999,000 UART: [fht] Storing FHT @ 0x50003400
4,010,418 UART: [idev] ++
4,011,056 UART: [idev] CDI.KEYID = 6
4,011,954 UART: [idev] SUBJECT.KEYID = 7
4,013,208 UART: [idev] UDS.KEYID = 0
4,014,202 ready_for_fw is high
4,014,408 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,158,997 UART: [idev] Erasing UDS.KEYID = 0
7,348,917 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,621 UART: [idev] --
7,373,610 UART: [ldev] ++
7,374,183 UART: [ldev] CDI.KEYID = 6
7,375,149 UART: [ldev] SUBJECT.KEYID = 5
7,376,364 UART: [ldev] AUTHORITY.KEYID = 7
7,377,654 UART: [ldev] FE.KEYID = 1
7,424,073 UART: [ldev] Erasing FE.KEYID = 1
10,758,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,436 UART: [ldev] --
13,137,540 UART: [fwproc] Waiting for Commands...
13,139,532 UART: [fwproc] Received command 0x46574c44
13,141,727 UART: [fwproc] Received Image of size 114916 bytes
17,205,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,932 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,665,753 >>> mbox cmd response: success
17,669,977 UART: [afmc] ++
17,670,619 UART: [afmc] CDI.KEYID = 6
17,671,528 UART: [afmc] SUBJECT.KEYID = 7
17,672,744 UART: [afmc] AUTHORITY.KEYID = 5
21,032,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,718 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,169 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,974 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,457 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,362 UART: [afmc] --
23,399,449 UART: [cold-reset] --
23,401,625 UART: [state] Locking Datavault
23,406,047 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,806 UART: [state] Locking ICCM
23,409,578 UART: [exit] Launching FMC @ 0x40000130
23,417,973 UART:
23,418,209 UART: Running Caliptra FMC ...
23,419,315 UART:
23,419,477 UART: [state] CFI Enabled
23,489,899 UART: [fht] FMC Alias Private Key: 7
25,828,041 UART: [art] Extend RT PCRs Done
25,829,268 UART: [art] Lock RT PCRs Done
25,830,984 UART: [art] Populate DV Done
25,836,509 UART: [fht] FMC Alias Private Key: 7
25,838,218 UART: [art] Derive CDI
25,839,034 UART: [art] Store in in slot 0x4
25,898,331 UART: [art] Derive Key Pair
25,899,369 UART: [art] Store priv key in slot 0x5
29,192,223 UART: [art] Derive Key Pair - Done
29,205,544 UART: [art] Signing Cert with AUTHO
29,206,840 UART: RITY.KEYID = 7
31,493,057 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,578 UART: [art] PUB.X = 54DB67D82F498DF207471D159DC8725B162CCEFCE357EAF8ACFD7CE03CEED60849FE8D43D3898372773EFD917B6C9241
31,501,794 UART: [art] PUB.Y = F42B3FD334542F63934B930DFF94C1BB62F41E236AC2BB5DB6859ADC2E703D6D72CADD66F43122035F7A0375E26FB25A
31,509,043 UART: [art] SIG.R = 8A77FCA077D887EC121B4FB4B9BC5A760EFFF1CDABBE296A64FC890776927CB4471758850AF43696440FCF45185EF59A
31,516,454 UART: [art] SIG.S = E1134AB6F248D29FB7ABD21616B5F92C9253B9B8A180050A7B7E94B41B1D0F885751FD2206F6A65327FFE3152163D0CE
32,822,124 UART: Caliptra RT
32,822,826 UART: [state] CFI Enabled
32,982,449 UART: [rt] RT listening for mailbox commands...
32,984,326 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,013,906 UART: [rt]cmd =0x46504c54, len=4
33,015,415 >>> mbox cmd response data (8 bytes)
33,016,714 UART: [rt] FIPS self test
33,017,672 UART: [kat] ++
33,018,141 UART: [kat] sha1
33,022,543 UART: [kat] SHA2-256
33,024,420 UART: [kat] SHA2-384
33,027,465 UART: [kat] SHA2-512-ACC
33,029,753 UART: [kat] ECC-384
36,295,676 UART: Fatal Error: 0x90040003
36,330,974 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,475,374 >>> mbox cmd response: failed
36,475,994 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,620,308 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,086 UART:
190,388 UART: Running Caliptra ROM ...
191,500 UART:
191,650 UART: [state] CFI Enabled
267,017 UART: [state] LifecycleState = Unprovisioned
268,942 UART: [state] DebugLocked = No
270,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,138 UART: [kat] SHA2-256
445,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,363 UART: [kat] ++
456,839 UART: [kat] sha1
466,748 UART: [kat] SHA2-256
469,450 UART: [kat] SHA2-384
475,162 UART: [kat] SHA2-512-ACC
477,554 UART: [kat] ECC-384
2,771,697 UART: [kat] HMAC-384Kdf
2,802,179 UART: [kat] LMS
3,992,479 UART: [kat] --
3,998,638 UART: [cold-reset] ++
4,000,197 UART: [fht] Storing FHT @ 0x50003400
4,011,760 UART: [idev] ++
4,012,333 UART: [idev] CDI.KEYID = 6
4,013,304 UART: [idev] SUBJECT.KEYID = 7
4,014,523 UART: [idev] UDS.KEYID = 0
4,016,090 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,160,547 UART: [idev] Erasing UDS.KEYID = 0
7,348,416 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,780 UART: [idev] --
7,375,587 UART: [ldev] ++
7,376,164 UART: [ldev] CDI.KEYID = 6
7,377,131 UART: [ldev] SUBJECT.KEYID = 5
7,378,210 UART: [ldev] AUTHORITY.KEYID = 7
7,379,474 UART: [ldev] FE.KEYID = 1
7,425,112 UART: [ldev] Erasing FE.KEYID = 1
10,759,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,088,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,117,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,708 UART: [ldev] --
13,140,187 UART: [fwproc] Waiting for Commands...
13,142,771 UART: [fwproc] Received command 0x46574c44
13,144,959 UART: [fwproc] Received Image of size 114916 bytes
17,205,259 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,351,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,670,745 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,808,797 ready_for_fw is high
3,809,399 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,917,796 >>> mbox cmd response: success
23,608,016 UART:
23,608,415 UART: Running Caliptra FMC ...
23,609,741 UART:
23,609,905 UART: [state] CFI Enabled
23,678,695 UART: [fht] FMC Alias Private Key: 7
26,016,661 UART: [art] Extend RT PCRs Done
26,017,893 UART: [art] Lock RT PCRs Done
26,019,440 UART: [art] Populate DV Done
26,024,753 UART: [fht] FMC Alias Private Key: 7
26,026,407 UART: [art] Derive CDI
26,027,230 UART: [art] Store in in slot 0x4
26,085,964 UART: [art] Derive Key Pair
26,087,013 UART: [art] Store priv key in slot 0x5
29,378,953 UART: [art] Derive Key Pair - Done
29,391,573 UART: [art] Signing Cert with AUTHO
29,392,878 UART: RITY.KEYID = 7
31,680,751 UART: [art] Erasing AUTHORITY.KEYID = 7
31,682,265 UART: [art] PUB.X = C377A82D56070A308F28F94BF3D006B519F5955548854564207BDE21FD3D45B72B01A4926090668FB3F43201C5E3FE07
31,689,486 UART: [art] PUB.Y = 900F13FFD92E2CBCDE2EC19BE6A82C69FAD460691918252E0C02450A201483285BCF91286E5A37B4D75BC8482515D1D0
31,696,730 UART: [art] SIG.R = 4F4A6695E9B7E861E776B5D638C4B0F15FC511FD9A18F1318C5BEDEFF03285E0DFCB6BDAC825A96BB96107D6579A9098
31,704,133 UART: [art] SIG.S = 65D417156D6F9DDA70A6273E4DEDE316EBF1EB6F4A0EBF33DDB1B984B3CA06E5294D7ED097CDD34811C25A13B9410440
33,009,780 UART: Caliptra RT
33,010,505 UART: [state] CFI Enabled
33,170,124 UART: [rt] RT listening for mailbox commands...
33,171,980 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,201,925 UART: [rt]cmd =0x46504c54, len=4
33,203,558 >>> mbox cmd response data (8 bytes)
33,204,938 UART: [rt] FIPS self test
33,205,882 UART: [kat] ++
33,206,328 UART: [kat] sha1
33,210,730 UART: [kat] SHA2-256
33,212,605 UART: [kat] SHA2-384
33,215,542 UART: [kat] SHA2-512-ACC
33,217,800 UART: [kat] ECC-384
36,484,346 UART: Fatal Error: 0x90040003
36,519,658 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,663,996 >>> mbox cmd response: failed
36,664,644 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,808,999 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,764,569 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,854,605 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,517 UART:
192,882 UART: Running Caliptra ROM ...
193,986 UART:
603,539 UART: [state] CFI Enabled
615,281 UART: [state] LifecycleState = Unprovisioned
617,220 UART: [state] DebugLocked = No
619,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,385 UART: [kat] SHA2-256
793,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,672 UART: [kat] ++
804,130 UART: [kat] sha1
814,932 UART: [kat] SHA2-256
817,587 UART: [kat] SHA2-384
823,099 UART: [kat] SHA2-512-ACC
825,452 UART: [kat] ECC-384
3,109,435 UART: [kat] HMAC-384Kdf
3,121,465 UART: [kat] LMS
4,311,589 UART: [kat] --
4,314,976 UART: [cold-reset] ++
4,316,490 UART: [fht] Storing FHT @ 0x50003400
4,328,538 UART: [idev] ++
4,329,120 UART: [idev] CDI.KEYID = 6
4,330,005 UART: [idev] SUBJECT.KEYID = 7
4,331,261 UART: [idev] UDS.KEYID = 0
4,332,312 ready_for_fw is high
4,332,519 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,476,842 UART: [idev] Erasing UDS.KEYID = 0
7,618,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,218 UART: [idev] --
7,642,468 UART: [ldev] ++
7,643,059 UART: [ldev] CDI.KEYID = 6
7,644,031 UART: [ldev] SUBJECT.KEYID = 5
7,645,205 UART: [ldev] AUTHORITY.KEYID = 7
7,646,498 UART: [ldev] FE.KEYID = 1
7,658,247 UART: [ldev] Erasing FE.KEYID = 1
10,945,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,195 UART: [ldev] --
13,307,718 UART: [fwproc] Waiting for Commands...
13,309,770 UART: [fwproc] Received command 0x46574c44
13,311,963 UART: [fwproc] Received Image of size 114916 bytes
17,373,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,365 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,839,721 >>> mbox cmd response: success
17,843,740 UART: [afmc] ++
17,844,337 UART: [afmc] CDI.KEYID = 6
17,845,250 UART: [afmc] SUBJECT.KEYID = 7
17,846,523 UART: [afmc] AUTHORITY.KEYID = 5
21,159,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,939 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,255 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,630 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,443 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,867 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,510 UART: [afmc] --
23,525,694 UART: [cold-reset] --
23,529,067 UART: [state] Locking Datavault
23,533,881 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,634 UART: [state] Locking ICCM
23,537,056 UART: [exit] Launching FMC @ 0x40000130
23,545,459 UART:
23,545,739 UART: Running Caliptra FMC ...
23,546,792 UART:
23,546,943 UART: [state] CFI Enabled
23,554,892 UART: [fht] FMC Alias Private Key: 7
25,885,149 UART: [art] Extend RT PCRs Done
25,886,375 UART: [art] Lock RT PCRs Done
25,888,137 UART: [art] Populate DV Done
25,893,344 UART: [fht] FMC Alias Private Key: 7
25,895,045 UART: [art] Derive CDI
25,895,868 UART: [art] Store in in slot 0x4
25,938,313 UART: [art] Derive Key Pair
25,939,315 UART: [art] Store priv key in slot 0x5
29,181,577 UART: [art] Derive Key Pair - Done
29,194,586 UART: [art] Signing Cert with AUTHO
29,195,894 UART: RITY.KEYID = 7
31,475,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,779 UART: [art] PUB.X = 30B90DF129FD346F07DD0ADC5961D18B1560629D9413E022ACD7E18DC6374BF4CF75D6F898E581982CCDFEDF571BC53F
31,484,054 UART: [art] PUB.Y = F6BA7850AEEA34ED7AA3DDD9926B3549EC460811D1F95FE1E737A1C0DB4940B36BE7A331CABEDB78A23A1876D8235C14
31,491,302 UART: [art] SIG.R = BFA88329B9DC35E84A4A3671507D886CB9FC891A627F65E0E45CBF67C34273D7D0D5289B1978222144DE8D8EA980C5C8
31,498,650 UART: [art] SIG.S = 1EC0567C717C534944690D418B10A5A5657452AD72CA8375D493E71A32FDD7AE27125A5E17D67B135FE30591281DA9F5
32,804,694 UART: Caliptra RT
32,805,410 UART: [state] CFI Enabled
32,922,924 UART: [rt] RT listening for mailbox commands...
32,924,782 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,954,409 UART: [rt]cmd =0x46504c54, len=4
32,955,938 >>> mbox cmd response data (8 bytes)
32,956,975 UART: [rt] FIPS self test
32,957,921 UART: [kat] ++
32,958,375 UART: [kat] sha1
32,962,940 UART: [kat] SHA2-256
32,964,868 UART: [kat] SHA2-384
32,967,885 UART: [kat] SHA2-512-ACC
32,970,126 UART: [kat] ECC-384
36,211,152 UART: Fatal Error: 0x90040003
36,246,390 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,391,068 >>> mbox cmd response: failed
36,391,757 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,536,027 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,106 UART:
190,401 UART: Running Caliptra ROM ...
191,430 UART:
4,004,946 UART: [state] CFI Enabled
4,020,724 UART: [state] LifecycleState = Unprovisioned
4,022,643 UART: [state] DebugLocked = No
4,024,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,029,322 UART: [kat] SHA2-256
4,199,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,209,597 UART: [kat] ++
4,210,152 UART: [kat] sha1
4,221,001 UART: [kat] SHA2-256
4,223,710 UART: [kat] SHA2-384
4,230,030 UART: [kat] SHA2-512-ACC
4,232,388 UART: [kat] ECC-384
6,515,295 UART: [kat] HMAC-384Kdf
6,526,702 UART: [kat] LMS
7,716,792 UART: [kat] --
7,721,162 UART: [cold-reset] ++
7,723,370 UART: [fht] Storing FHT @ 0x50003400
7,734,648 UART: [idev] ++
7,735,256 UART: [idev] CDI.KEYID = 6
7,736,177 UART: [idev] SUBJECT.KEYID = 7
7,737,454 UART: [idev] UDS.KEYID = 0
7,738,976 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
7,883,102 UART: [idev] Erasing UDS.KEYID = 0
11,020,989 UART: [idev] Using Sha1 for KeyId Algorithm
11,042,595 UART: [idev] --
11,047,999 UART: [ldev] ++
11,048,572 UART: [ldev] CDI.KEYID = 6
11,049,595 UART: [ldev] SUBJECT.KEYID = 5
11,050,755 UART: [ldev] AUTHORITY.KEYID = 7
11,051,991 UART: [ldev] FE.KEYID = 1
11,063,991 UART: [ldev] Erasing FE.KEYID = 1
14,353,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,647,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,661,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,676,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,691,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,710,009 UART: [ldev] --
16,715,008 UART: [fwproc] Waiting for Commands...
16,718,322 UART: [fwproc] Received command 0x46574c44
16,720,511 UART: [fwproc] Received Image of size 114916 bytes
20,778,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,854,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,923,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
21,242,597 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
4,130,502 ready_for_fw is high
4,130,902 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,092,609 >>> mbox cmd response: success
23,734,465 UART:
23,734,862 UART: Running Caliptra FMC ...
23,735,974 UART:
23,736,137 UART: [state] CFI Enabled
23,744,311 UART: [fht] FMC Alias Private Key: 7
26,074,929 UART: [art] Extend RT PCRs Done
26,076,161 UART: [art] Lock RT PCRs Done
26,077,904 UART: [art] Populate DV Done
26,083,352 UART: [fht] FMC Alias Private Key: 7
26,084,900 UART: [art] Derive CDI
26,085,724 UART: [art] Store in in slot 0x4
26,127,948 UART: [art] Derive Key Pair
26,128,952 UART: [art] Store priv key in slot 0x5
29,370,820 UART: [art] Derive Key Pair - Done
29,383,770 UART: [art] Signing Cert with AUTHO
29,385,081 UART: RITY.KEYID = 7
31,664,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,783 UART: [art] PUB.X = 03CC46012B91BD70E16F43A04A153C442A6A48C964D71955BF9465732AEB00E6764B06FF83D479903D23CD24B7656BF9
31,673,031 UART: [art] PUB.Y = 5C7DD8527BB45AFDDDBC1F395A7135F7835B66209038ADF6E51DE27A7D4BCF60F309852DE5343A9AE4DB3C9135558172
31,680,271 UART: [art] SIG.R = 98E2D4AA250786AA416D1716620580AB9B20C8B842D74C34FF2755374C61EABB29BE537A92949DB9FA76AE73F895F849
31,687,679 UART: [art] SIG.S = 67102E6B74302E15492FDFE198862AF13D73C51E7EB584794E2A3A0B0DD1430B8F83D842F681A582BB41FAC04FA34D53
32,992,833 UART: Caliptra RT
32,993,556 UART: [state] CFI Enabled
33,110,965 UART: [rt] RT listening for mailbox commands...
33,112,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,142,730 UART: [rt]cmd =0x46504c54, len=4
33,144,471 >>> mbox cmd response data (8 bytes)
33,145,520 UART: [rt] FIPS self test
33,146,459 UART: [kat] ++
33,146,905 UART: [kat] sha1
33,151,251 UART: [kat] SHA2-256
33,153,181 UART: [kat] SHA2-384
33,156,316 UART: [kat] SHA2-512-ACC
33,158,580 UART: [kat] ECC-384
36,399,691 UART: Fatal Error: 0x90040003
36,435,055 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,579,405 >>> mbox cmd response: failed
36,580,044 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,724,343 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
7,337,417 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
21,295,763 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,330 UART:
192,691 UART: Running Caliptra ROM ...
193,852 UART:
194,016 UART: [state] CFI Enabled
266,940 UART: [state] LifecycleState = Unprovisioned
268,811 UART: [state] DebugLocked = No
270,970 UART: [state] WD Timer not started. Device not locked for debugging
275,529 UART: [kat] SHA2-256
454,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,246 UART: [kat] ++
466,790 UART: [kat] sha1
477,821 UART: [kat] SHA2-256
480,824 UART: [kat] SHA2-384
487,383 UART: [kat] SHA2-512-ACC
490,328 UART: [kat] ECC-384
2,946,713 UART: [kat] HMAC-384Kdf
2,971,237 UART: [kat] LMS
3,500,691 UART: [kat] --
3,506,221 UART: [cold-reset] ++
3,508,750 UART: [fht] FHT @ 0x50003400
3,519,447 UART: [idev] ++
3,520,013 UART: [idev] CDI.KEYID = 6
3,521,084 UART: [idev] SUBJECT.KEYID = 7
3,522,190 UART: [idev] UDS.KEYID = 0
3,523,124 ready_for_fw is high
3,523,347 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,668,407 UART: [idev] Erasing UDS.KEYID = 0
6,029,410 UART: [idev] Sha1 KeyId Algorithm
6,053,228 UART: [idev] --
6,057,235 UART: [ldev] ++
6,057,809 UART: [ldev] CDI.KEYID = 6
6,058,699 UART: [ldev] SUBJECT.KEYID = 5
6,059,921 UART: [ldev] AUTHORITY.KEYID = 7
6,061,157 UART: [ldev] FE.KEYID = 1
6,103,074 UART: [ldev] Erasing FE.KEYID = 1
8,603,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,000 UART: [ldev] --
10,415,811 UART: [fwproc] Wait for Commands...
10,417,366 UART: [fwproc] Recv command 0x46574c44
10,419,464 UART: [fwproc] Recv'd Img size: 115224 bytes
13,839,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,982,804 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,304,359 >>> mbox cmd response: success
14,308,619 UART: [afmc] ++
14,309,222 UART: [afmc] CDI.KEYID = 6
14,310,136 UART: [afmc] SUBJECT.KEYID = 7
14,311,315 UART: [afmc] AUTHORITY.KEYID = 5
16,854,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,611 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,614,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,630,390 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,646,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,668,444 UART: [afmc] --
18,671,451 UART: [cold-reset] --
18,674,432 UART: [state] Locking Datavault
18,681,684 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,332 UART: [state] Locking ICCM
18,685,806 UART: [exit] Launching FMC @ 0x40000130
18,694,206 UART:
18,694,440 UART: Running Caliptra FMC ...
18,695,541 UART:
18,695,716 UART: [state] CFI Enabled
18,754,780 UART: [fht] FMC Alias Private Key: 7
20,519,180 UART: [art] Extend RT PCRs Done
20,520,405 UART: [art] Lock RT PCRs Done
20,521,946 UART: [art] Populate DV Done
20,527,514 UART: [fht] FMC Alias Private Key: 7
20,529,107 UART: [art] Derive CDI
20,529,921 UART: [art] Store in in slot 0x4
20,587,607 UART: [art] Derive Key Pair
20,588,610 UART: [art] Store priv key in slot 0x5
23,051,467 UART: [art] Derive Key Pair - Done
23,064,513 UART: [art] Signing Cert with AUTHO
23,065,812 UART: RITY.KEYID = 7
24,776,756 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,264 UART: [art] PUB.X = D560CF9F2CADC48EE8330DA808E2EA818E638CDD6993203660023290A8A7BB6CBFAA91ED0E9D5C284776878BDCC069AD
24,785,516 UART: [art] PUB.Y = 4CBD1BEC96ABD795E2CA20DE9B85AD499DF557B9A4CF178DEBE8B5E48C4710F7EEB6C8254709F5FA8B131B6418CF0D60
24,792,839 UART: [art] SIG.R = F572DCBE0D8AA3A4EBA1D61B213B11EC4B09A27F504FFD6B246DC432D40901CEB6335BB44C43CB60FA85F85C0C95DB85
24,800,243 UART: [art] SIG.S = C02AE4ACBFFE68E437A5B782923078A76FEC30874B72E6453AE1702AA5BD0D87E1BAB07F102C813E75C9AB21730B5E97
25,779,403 UART: Caliptra RT
25,780,116 UART: [state] CFI Enabled
25,944,483 UART: [rt] RT listening for mailbox commands...
25,946,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,976,059 UART: [rt]cmd =0x46504c54, len=4
25,977,785 >>> mbox cmd response data (8 bytes)
25,979,170 UART: [rt] FIPS self test
25,980,112 UART: [kat] ++
25,980,561 UART: [kat] sha1
25,984,800 UART: [kat] SHA2-256
25,986,736 UART: [kat] SHA2-384
25,989,855 UART: [kat] SHA2-512-ACC
25,992,142 UART: [kat] ECC-384
28,427,654 UART: Fatal Error: 0x90040003
28,463,057 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,607,807 >>> mbox cmd response: failed
28,608,417 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,753,060 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,091 UART:
190,396 UART: Running Caliptra ROM ...
191,449 UART:
191,591 UART: [state] CFI Enabled
265,676 UART: [state] LifecycleState = Unprovisioned
267,539 UART: [state] DebugLocked = No
270,264 UART: [state] WD Timer not started. Device not locked for debugging
274,646 UART: [kat] SHA2-256
453,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,347 UART: [kat] ++
465,895 UART: [kat] sha1
478,447 UART: [kat] SHA2-256
481,486 UART: [kat] SHA2-384
487,423 UART: [kat] SHA2-512-ACC
490,410 UART: [kat] ECC-384
2,947,338 UART: [kat] HMAC-384Kdf
2,971,773 UART: [kat] LMS
3,501,240 UART: [kat] --
3,504,425 UART: [cold-reset] ++
3,506,302 UART: [fht] FHT @ 0x50003400
3,517,389 UART: [idev] ++
3,517,988 UART: [idev] CDI.KEYID = 6
3,518,873 UART: [idev] SUBJECT.KEYID = 7
3,520,089 UART: [idev] UDS.KEYID = 0
3,521,604 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,666,299 UART: [idev] Erasing UDS.KEYID = 0
6,023,478 UART: [idev] Sha1 KeyId Algorithm
6,046,024 UART: [idev] --
6,051,269 UART: [ldev] ++
6,051,847 UART: [ldev] CDI.KEYID = 6
6,052,760 UART: [ldev] SUBJECT.KEYID = 5
6,053,977 UART: [ldev] AUTHORITY.KEYID = 7
6,055,216 UART: [ldev] FE.KEYID = 1
6,098,762 UART: [ldev] Erasing FE.KEYID = 1
8,598,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,310 UART: [ldev] --
10,392,083 UART: [fwproc] Wait for Commands...
10,393,913 UART: [fwproc] Recv command 0x46574c44
10,395,973 UART: [fwproc] Recv'd Img size: 115224 bytes
13,813,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,823 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,627 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,271,508 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,568 UART:
192,936 UART: Running Caliptra ROM ...
194,136 UART:
194,293 UART: [state] CFI Enabled
264,171 UART: [state] LifecycleState = Unprovisioned
266,526 UART: [state] DebugLocked = No
268,657 UART: [state] WD Timer not started. Device not locked for debugging
273,627 UART: [kat] SHA2-256
463,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,315 UART: [kat] ++
474,768 UART: [kat] sha1
487,136 UART: [kat] SHA2-256
490,155 UART: [kat] SHA2-384
497,572 UART: [kat] SHA2-512-ACC
500,157 UART: [kat] ECC-384
2,949,767 UART: [kat] HMAC-384Kdf
2,973,330 UART: [kat] LMS
3,505,064 UART: [kat] --
3,510,170 UART: [cold-reset] ++
3,512,468 UART: [fht] FHT @ 0x50003400
3,523,235 UART: [idev] ++
3,523,874 UART: [idev] CDI.KEYID = 6
3,524,851 UART: [idev] SUBJECT.KEYID = 7
3,526,030 UART: [idev] UDS.KEYID = 0
3,526,939 ready_for_fw is high
3,527,171 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,672,199 UART: [idev] Erasing UDS.KEYID = 0
6,028,266 UART: [idev] Sha1 KeyId Algorithm
6,051,012 UART: [idev] --
6,056,228 UART: [ldev] ++
6,056,921 UART: [ldev] CDI.KEYID = 6
6,057,845 UART: [ldev] SUBJECT.KEYID = 5
6,059,009 UART: [ldev] AUTHORITY.KEYID = 7
6,060,247 UART: [ldev] FE.KEYID = 1
6,101,681 UART: [ldev] Erasing FE.KEYID = 1
8,607,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,511 UART: [ldev] --
10,416,238 UART: [fwproc] Wait for Commands...
10,418,388 UART: [fwproc] Recv command 0x46574c44
10,420,704 UART: [fwproc] Recv'd Img size: 115224 bytes
13,872,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,001 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,619,691 >>> mbox cmd response: success
14,624,060 UART: [afmc] ++
14,624,767 UART: [afmc] CDI.KEYID = 6
14,626,002 UART: [afmc] SUBJECT.KEYID = 7
14,627,437 UART: [afmc] AUTHORITY.KEYID = 5
17,155,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,386 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,864 UART: [afmc] --
18,953,952 UART: [cold-reset] --
18,959,330 UART: [state] Locking Datavault
18,964,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,966,937 UART: [state] Locking ICCM
18,969,902 UART: [exit] Launching FMC @ 0x40000130
18,978,573 UART:
18,978,809 UART: Running Caliptra FMC ...
18,979,843 UART:
18,979,992 UART: [state] CFI Enabled
19,035,484 UART: [fht] FMC Alias Private Key: 7
20,798,981 UART: [art] Extend RT PCRs Done
20,800,238 UART: [art] Lock RT PCRs Done
20,802,081 UART: [art] Populate DV Done
20,807,725 UART: [fht] FMC Alias Private Key: 7
20,809,218 UART: [art] Derive CDI
20,809,955 UART: [art] Store in in slot 0x4
20,867,978 UART: [art] Derive Key Pair
20,869,019 UART: [art] Store priv key in slot 0x5
23,332,461 UART: [art] Derive Key Pair - Done
23,345,363 UART: [art] Signing Cert with AUTHO
23,346,672 UART: RITY.KEYID = 7
25,058,517 UART: [art] Erasing AUTHORITY.KEYID = 7
25,060,043 UART: [art] PUB.X = DD3166189DEFB53E2494FF2FAA56D2DF01EDD9E95732F8C26629748F0BED87D83AED702054048C5583C97E4FCEC64A01
25,067,308 UART: [art] PUB.Y = EFFBC0C186E7177222D9D2AB5346FE295D1FE21F2BF98C18B4C5B8548864ABF9EF9204050AFC7F467135D8B1FDF00EB7
25,074,556 UART: [art] SIG.R = 8BD0900287F5295980290B8E7C2F29A17AD04EB77B49E32E45AADC8D27827DC3B803A44086BE21EFC47B1B80D364CE61
25,081,960 UART: [art] SIG.S = 3969FA5106F427EB5C2DE5CB7B3F101D65BB0A8FAF07711E0432C731F0E43580C5B34CA01D0E8D92016D94F8759FA922
26,060,620 UART: Caliptra RT
26,061,356 UART: [state] CFI Enabled
26,233,503 UART: [rt] RT listening for mailbox commands...
26,235,367 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,264,845 UART: [rt]cmd =0x46504c54, len=4
26,266,474 >>> mbox cmd response data (8 bytes)
26,267,546 UART: [rt] FIPS self test
26,268,481 UART: [kat] ++
26,268,934 UART: [kat] sha1
26,273,444 UART: [kat] SHA2-256
26,275,375 UART: [kat] SHA2-384
26,278,282 UART: [kat] SHA2-512-ACC
26,280,573 UART: [kat] ECC-384
28,716,971 UART: Fatal Error: 0x90040003
28,752,270 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,897,046 >>> mbox cmd response: failed
28,897,719 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,042,427 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
190,123 UART:
190,421 UART: Running Caliptra ROM ...
191,450 UART:
191,591 UART: [state] CFI Enabled
265,352 UART: [state] LifecycleState = Unprovisioned
267,713 UART: [state] DebugLocked = No
270,034 UART: [state] WD Timer not started. Device not locked for debugging
274,004 UART: [kat] SHA2-256
463,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,646 UART: [kat] ++
475,091 UART: [kat] sha1
485,163 UART: [kat] SHA2-256
488,167 UART: [kat] SHA2-384
494,599 UART: [kat] SHA2-512-ACC
497,158 UART: [kat] ECC-384
2,951,348 UART: [kat] HMAC-384Kdf
2,971,693 UART: [kat] LMS
3,503,443 UART: [kat] --
3,506,329 UART: [cold-reset] ++
3,508,222 UART: [fht] FHT @ 0x50003400
3,520,446 UART: [idev] ++
3,521,122 UART: [idev] CDI.KEYID = 6
3,522,145 UART: [idev] SUBJECT.KEYID = 7
3,523,251 UART: [idev] UDS.KEYID = 0
3,524,764 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,613 UART: [idev] Erasing UDS.KEYID = 0
6,025,912 UART: [idev] Sha1 KeyId Algorithm
6,048,438 UART: [idev] --
6,054,740 UART: [ldev] ++
6,055,455 UART: [ldev] CDI.KEYID = 6
6,056,373 UART: [ldev] SUBJECT.KEYID = 5
6,057,537 UART: [ldev] AUTHORITY.KEYID = 7
6,058,717 UART: [ldev] FE.KEYID = 1
6,100,957 UART: [ldev] Erasing FE.KEYID = 1
8,605,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,563 UART: [ldev] --
10,412,514 UART: [fwproc] Wait for Commands...
10,414,125 UART: [fwproc] Recv command 0x46574c44
10,416,442 UART: [fwproc] Recv'd Img size: 115224 bytes
13,873,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,607 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,611,274 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,438,428 ready_for_fw is high
3,438,871 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,744,849 >>> mbox cmd response: success
19,049,375 UART:
19,049,807 UART: Running Caliptra FMC ...
19,050,936 UART:
19,051,098 UART: [state] CFI Enabled
19,116,064 UART: [fht] FMC Alias Private Key: 7
20,880,038 UART: [art] Extend RT PCRs Done
20,881,265 UART: [art] Lock RT PCRs Done
20,882,580 UART: [art] Populate DV Done
20,888,211 UART: [fht] FMC Alias Private Key: 7
20,889,820 UART: [art] Derive CDI
20,890,640 UART: [art] Store in in slot 0x4
20,948,792 UART: [art] Derive Key Pair
20,949,833 UART: [art] Store priv key in slot 0x5
23,412,646 UART: [art] Derive Key Pair - Done
23,425,920 UART: [art] Signing Cert with AUTHO
23,427,233 UART: RITY.KEYID = 7
25,138,594 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,099 UART: [art] PUB.X = FD0E6D17344DFF3A7D661486AF31AD9FE0A030A14ABBEE5F91B81C21287DDAA17871DCB8B4751C8A56A4470C82D4B335
25,147,369 UART: [art] PUB.Y = DF31E6E3846AE6653F33435BB39939CE8800A6F9935E6B9080708F7AB09FC6EE3DACC20BA02BE8FEFF99F2092331FEDD
25,154,641 UART: [art] SIG.R = 8EACB101C250B0F1DBA494C5765490ACC3D5B5691B95205EFF7B2AA10FFBB3B15619F930C3F242465055A79410448165
25,161,993 UART: [art] SIG.S = F54200FD195423A540C06C3C176983B950F4A89E4E821B0B57DBB707A458CE71985B31C6A6EF9D5645DD369CE706EE6F
26,140,736 UART: Caliptra RT
26,141,428 UART: [state] CFI Enabled
26,306,808 UART: [rt] RT listening for mailbox commands...
26,308,662 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,624 UART: [rt]cmd =0x46504c54, len=4
26,340,421 >>> mbox cmd response data (8 bytes)
26,341,667 UART: [rt] FIPS self test
26,342,613 UART: [kat] ++
26,343,061 UART: [kat] sha1
26,347,573 UART: [kat] SHA2-256
26,349,503 UART: [kat] SHA2-384
26,352,461 UART: [kat] SHA2-512-ACC
26,354,720 UART: [kat] ECC-384
28,792,279 UART: Fatal Error: 0x90040003
28,827,569 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,972,699 >>> mbox cmd response: failed
28,973,360 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,118,059 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,438,391 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,767,504 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,470 UART:
192,851 UART: Running Caliptra ROM ...
193,956 UART:
603,525 UART: [state] CFI Enabled
618,057 UART: [state] LifecycleState = Unprovisioned
620,471 UART: [state] DebugLocked = No
622,229 UART: [state] WD Timer not started. Device not locked for debugging
626,063 UART: [kat] SHA2-256
815,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,781 UART: [kat] ++
827,275 UART: [kat] sha1
839,575 UART: [kat] SHA2-256
842,598 UART: [kat] SHA2-384
849,750 UART: [kat] SHA2-512-ACC
852,322 UART: [kat] ECC-384
3,292,347 UART: [kat] HMAC-384Kdf
3,305,315 UART: [kat] LMS
3,837,132 UART: [kat] --
3,842,263 UART: [cold-reset] ++
3,843,704 UART: [fht] FHT @ 0x50003400
3,855,546 UART: [idev] ++
3,856,254 UART: [idev] CDI.KEYID = 6
3,857,139 UART: [idev] SUBJECT.KEYID = 7
3,858,383 UART: [idev] UDS.KEYID = 0
3,859,291 ready_for_fw is high
3,859,498 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,004,202 UART: [idev] Erasing UDS.KEYID = 0
6,332,488 UART: [idev] Sha1 KeyId Algorithm
6,354,456 UART: [idev] --
6,359,533 UART: [ldev] ++
6,360,234 UART: [ldev] CDI.KEYID = 6
6,361,150 UART: [ldev] SUBJECT.KEYID = 5
6,362,314 UART: [ldev] AUTHORITY.KEYID = 7
6,363,548 UART: [ldev] FE.KEYID = 1
6,375,665 UART: [ldev] Erasing FE.KEYID = 1
8,848,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,024 UART: [ldev] --
10,639,250 UART: [fwproc] Wait for Commands...
10,641,459 UART: [fwproc] Recv command 0x46574c44
10,643,775 UART: [fwproc] Recv'd Img size: 115224 bytes
14,096,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,924 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,841,914 >>> mbox cmd response: success
14,845,607 UART: [afmc] ++
14,846,317 UART: [afmc] CDI.KEYID = 6
14,847,562 UART: [afmc] SUBJECT.KEYID = 7
14,849,040 UART: [afmc] AUTHORITY.KEYID = 5
17,353,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,725 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,861 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,575 UART: [afmc] --
19,150,063 UART: [cold-reset] --
19,154,695 UART: [state] Locking Datavault
19,160,162 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,362 UART: [state] Locking ICCM
19,164,676 UART: [exit] Launching FMC @ 0x40000130
19,173,348 UART:
19,173,630 UART: Running Caliptra FMC ...
19,174,745 UART:
19,174,908 UART: [state] CFI Enabled
19,182,957 UART: [fht] FMC Alias Private Key: 7
20,939,599 UART: [art] Extend RT PCRs Done
20,940,824 UART: [art] Lock RT PCRs Done
20,942,449 UART: [art] Populate DV Done
20,947,749 UART: [fht] FMC Alias Private Key: 7
20,949,450 UART: [art] Derive CDI
20,950,263 UART: [art] Store in in slot 0x4
20,992,856 UART: [art] Derive Key Pair
20,993,855 UART: [art] Store priv key in slot 0x5
23,420,371 UART: [art] Derive Key Pair - Done
23,433,343 UART: [art] Signing Cert with AUTHO
23,434,653 UART: RITY.KEYID = 7
25,140,156 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,669 UART: [art] PUB.X = 75AD3623314EA08ABE98A7F5323D164629A5E5EAD572CDD3D1E8ADBC6E407A997CC076A7D975483831D4A26C41B5CCBE
25,148,927 UART: [art] PUB.Y = EC6ABB55ADD0CC673A33272BB8DF027B809B098C488D7C794C83E4BF881B63AA2A807110677ECFF2DDC6850F4182331A
25,156,216 UART: [art] SIG.R = 69A640991E75E3BE4B8035844E7434E5F52143B1BABB2D2398AF966FC5A9F463D929F05B48D002A58AF02841F5C9516E
25,163,608 UART: [art] SIG.S = 5D79B37D2D3A3F71C9FB7D954CD648A2F35AC62A871E91FE58C67234AED0A5DA87BE82B3450363E91326AF333CF8A1E9
26,142,662 UART: Caliptra RT
26,143,356 UART: [state] CFI Enabled
26,261,328 UART: [rt] RT listening for mailbox commands...
26,263,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,292,864 UART: [rt]cmd =0x46504c54, len=4
26,294,418 >>> mbox cmd response data (8 bytes)
26,295,268 UART: [rt] FIPS self test
26,296,218 UART: [kat] ++
26,296,671 UART: [kat] sha1
26,301,147 UART: [kat] SHA2-256
26,303,033 UART: [kat] SHA2-384
26,306,160 UART: [kat] SHA2-512-ACC
26,308,398 UART: [kat] ECC-384
28,734,093 UART: Fatal Error: 0x90040003
28,769,501 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,914,095 >>> mbox cmd response: failed
28,914,681 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,059,373 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,093 UART:
190,415 UART: Running Caliptra ROM ...
191,529 UART:
11,474,827 UART: [state] CFI Enabled
11,490,228 UART: [state] LifecycleState = Unprovisioned
11,492,656 UART: [state] DebugLocked = No
11,494,368 UART: [state] WD Timer not started. Device not locked for debugging
11,499,467 UART: [kat] SHA2-256
11,689,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,700,116 UART: [kat] ++
11,700,711 UART: [kat] sha1
11,712,467 UART: [kat] SHA2-256
11,715,516 UART: [kat] SHA2-384
11,721,834 UART: [kat] SHA2-512-ACC
11,724,453 UART: [kat] ECC-384
14,165,814 UART: [kat] HMAC-384Kdf
14,179,797 UART: [kat] LMS
14,711,642 UART: [kat] --
14,716,089 UART: [cold-reset] ++
14,717,157 UART: [fht] FHT @ 0x50003400
14,728,952 UART: [idev] ++
14,729,697 UART: [idev] CDI.KEYID = 6
14,730,584 UART: [idev] SUBJECT.KEYID = 7
14,731,793 UART: [idev] UDS.KEYID = 0
14,733,354 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,878,101 UART: [idev] Erasing UDS.KEYID = 0
17,209,079 UART: [idev] Sha1 KeyId Algorithm
17,231,341 UART: [idev] --
17,237,304 UART: [ldev] ++
17,238,045 UART: [ldev] CDI.KEYID = 6
17,238,931 UART: [ldev] SUBJECT.KEYID = 5
17,240,086 UART: [ldev] AUTHORITY.KEYID = 7
17,241,323 UART: [ldev] FE.KEYID = 1
17,251,050 UART: [ldev] Erasing FE.KEYID = 1
19,730,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,449,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,465,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,480,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,495,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,516,549 UART: [ldev] --
21,521,380 UART: [fwproc] Wait for Commands...
21,524,016 UART: [fwproc] Recv command 0x46574c44
21,526,340 UART: [fwproc] Recv'd Img size: 115224 bytes
24,983,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,057,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,173,585 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
25,722,146 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,756,809 ready_for_fw is high
3,757,434 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,981,828 >>> mbox cmd response: success
19,241,818 UART:
19,242,217 UART: Running Caliptra FMC ...
19,243,530 UART:
19,243,704 UART: [state] CFI Enabled
19,252,016 UART: [fht] FMC Alias Private Key: 7
21,007,940 UART: [art] Extend RT PCRs Done
21,009,169 UART: [art] Lock RT PCRs Done
21,010,802 UART: [art] Populate DV Done
21,016,343 UART: [fht] FMC Alias Private Key: 7
21,017,890 UART: [art] Derive CDI
21,018,633 UART: [art] Store in in slot 0x4
21,061,292 UART: [art] Derive Key Pair
21,062,338 UART: [art] Store priv key in slot 0x5
23,489,191 UART: [art] Derive Key Pair - Done
23,502,142 UART: [art] Signing Cert with AUTHO
23,503,452 UART: RITY.KEYID = 7
25,209,035 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,543 UART: [art] PUB.X = B0179DA18A071E06258501C6DFFD42003D84788142BC44C9BD3CEB696B450D3259EA9D1B731337EB66E2F74A37B3A831
25,217,826 UART: [art] PUB.Y = 705C1DE0C5788D56B7224C11EC4B9549343D3F2451A15BB53F4E02A7DD0DE79992E971CE446A652CA3B06DA0E9069259
25,225,041 UART: [art] SIG.R = 9AEC97C3347315023383F50DB2925C845B36373DB6F5451DF422E9F9AF12ACE7271F8F09D125EFEDDA02E25B02BE9544
25,232,443 UART: [art] SIG.S = 997B7ABDB98DEB472A2F0B7A258CCFFA8171EEC409E5A2270D308D6EE462C4C793F26080EE35F97775EC951FD872CAA6
26,210,643 UART: Caliptra RT
26,211,336 UART: [state] CFI Enabled
26,328,879 UART: [rt] RT listening for mailbox commands...
26,330,733 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,360,418 UART: [rt]cmd =0x46504c54, len=4
26,362,030 >>> mbox cmd response data (8 bytes)
26,363,136 UART: [rt] FIPS self test
26,364,078 UART: [kat] ++
26,364,548 UART: [kat] sha1
26,368,898 UART: [kat] SHA2-256
26,370,776 UART: [kat] SHA2-384
26,373,789 UART: [kat] SHA2-512-ACC
26,376,040 UART: [kat] ECC-384
28,801,980 UART: Fatal Error: 0x90040003
28,837,369 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,982,150 >>> mbox cmd response: failed
28,982,800 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,127,334 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
14,550,417 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
25,755,171 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,681 UART: [kat] SHA2-256
881,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,727 UART: [kat] ++
885,879 UART: [kat] sha1
890,261 UART: [kat] SHA2-256
892,199 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,256 UART: [kat] HMAC-384Kdf
906,830 UART: [kat] LMS
1,475,026 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,351 UART: [fht] Storing FHT @ 0x50003400
1,479,014 UART: [idev] ++
1,479,182 UART: [idev] CDI.KEYID = 6
1,479,542 UART: [idev] SUBJECT.KEYID = 7
1,479,966 UART: [idev] UDS.KEYID = 0
1,480,311 ready_for_fw is high
1,480,311 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,884 UART: [idev] Erasing UDS.KEYID = 0
1,504,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,952 UART: [idev] --
1,513,917 UART: [ldev] ++
1,514,085 UART: [ldev] CDI.KEYID = 6
1,514,448 UART: [ldev] SUBJECT.KEYID = 5
1,514,874 UART: [ldev] AUTHORITY.KEYID = 7
1,515,337 UART: [ldev] FE.KEYID = 1
1,520,281 UART: [ldev] Erasing FE.KEYID = 1
1,545,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,576 UART: [ldev] --
1,585,063 UART: [fwproc] Waiting for Commands...
1,585,820 UART: [fwproc] Received command 0x46574c44
1,586,611 UART: [fwproc] Received Image of size 115224 bytes
2,893,544 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,506 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,087,103 >>> mbox cmd response: success
3,088,227 UART: [afmc] ++
3,088,395 UART: [afmc] CDI.KEYID = 6
3,088,757 UART: [afmc] SUBJECT.KEYID = 7
3,089,182 UART: [afmc] AUTHORITY.KEYID = 5
3,123,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,000 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,690 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,695 UART: [afmc] --
3,167,579 UART: [cold-reset] --
3,168,567 UART: [state] Locking Datavault
3,169,896 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,500 UART: [state] Locking ICCM
3,170,986 UART: [exit] Launching FMC @ 0x40000130
3,176,315 UART:
3,176,331 UART: Running Caliptra FMC ...
3,176,739 UART:
3,176,793 UART: [state] CFI Enabled
3,187,224 UART: [fht] FMC Alias Private Key: 7
3,295,187 UART: [art] Extend RT PCRs Done
3,295,615 UART: [art] Lock RT PCRs Done
3,297,413 UART: [art] Populate DV Done
3,305,658 UART: [fht] FMC Alias Private Key: 7
3,306,648 UART: [art] Derive CDI
3,306,928 UART: [art] Store in in slot 0x4
3,392,581 UART: [art] Derive Key Pair
3,392,941 UART: [art] Store priv key in slot 0x5
3,406,137 UART: [art] Derive Key Pair - Done
3,421,111 UART: [art] Signing Cert with AUTHO
3,421,591 UART: RITY.KEYID = 7
3,436,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,304 UART: [art] PUB.X = C5D19C5797F6F55135C1CBECB57B8611A4567F8577AAC0BDC289285A55504C8427B72EB7A5FAD4A3CD5360DB9546431D
3,444,082 UART: [art] PUB.Y = 28488EEF24B02C3F4C32A4ED8580E081D467416E93A057ACD8604A14BCD4FFB7CDBC0EF9443C40FFDC3F8BDD758FD39A
3,451,051 UART: [art] SIG.R = 8B7761A0F7B8BDFA683A717003B940672DDB6341CB765FCEE80B3BE17EF7484CB85EEEBD1FCBC916440EF0DA622CDAD3
3,457,836 UART: [art] SIG.S = DDBAF45C93B1012283441086A257D06BFDBC8C39E8F2167E688ADCBBFED75829892540D6EB11C96A60245CF549DE004E
3,481,702 UART: Caliptra RT
3,481,956 UART: [state] CFI Enabled
3,590,783 UART: [rt] RT listening for mailbox commands...
3,591,446 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,022 UART: [rt]cmd =0x46504c54, len=4
3,622,202 >>> mbox cmd response data (8 bytes)
3,622,403 UART: [rt] FIPS self test
3,622,731 UART: [kat] ++
3,622,883 UART: [kat] sha1
3,627,089 UART: [kat] SHA2-256
3,629,111 UART: [kat] SHA2-384
3,632,102 UART: [kat] SHA2-512-ACC
3,634,029 UART: [kat] ECC-384
3,643,725 UART: Fatal Error: 0x90040003
3,645,275 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,645,280 >>> mbox cmd response: failed
3,645,280 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,645,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,319 UART: [kat] SHA2-256
882,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,365 UART: [kat] ++
886,517 UART: [kat] sha1
890,665 UART: [kat] SHA2-256
892,603 UART: [kat] SHA2-384
895,310 UART: [kat] SHA2-512-ACC
897,211 UART: [kat] ECC-384
902,774 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,497 UART: [fht] Storing FHT @ 0x50003400
1,479,416 UART: [idev] ++
1,479,584 UART: [idev] CDI.KEYID = 6
1,479,944 UART: [idev] SUBJECT.KEYID = 7
1,480,368 UART: [idev] UDS.KEYID = 0
1,480,713 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,080 UART: [idev] Erasing UDS.KEYID = 0
1,504,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,278 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,521,189 UART: [ldev] Erasing FE.KEYID = 1
1,545,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,816 UART: [ldev] --
1,585,227 UART: [fwproc] Waiting for Commands...
1,586,060 UART: [fwproc] Received command 0x46574c44
1,586,851 UART: [fwproc] Received Image of size 115224 bytes
2,894,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,138 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,490 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,655 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,895 >>> mbox cmd response: success
3,002,005 UART:
3,002,021 UART: Running Caliptra FMC ...
3,002,429 UART:
3,002,483 UART: [state] CFI Enabled
3,013,222 UART: [fht] FMC Alias Private Key: 7
3,120,891 UART: [art] Extend RT PCRs Done
3,121,319 UART: [art] Lock RT PCRs Done
3,122,747 UART: [art] Populate DV Done
3,130,854 UART: [fht] FMC Alias Private Key: 7
3,131,858 UART: [art] Derive CDI
3,132,138 UART: [art] Store in in slot 0x4
3,217,761 UART: [art] Derive Key Pair
3,218,121 UART: [art] Store priv key in slot 0x5
3,231,623 UART: [art] Derive Key Pair - Done
3,246,192 UART: [art] Signing Cert with AUTHO
3,246,672 UART: RITY.KEYID = 7
3,261,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,635 UART: [art] PUB.X = A2C4F58BC2DF2D5967FFF059AFD811D6025485E3AE06258842B66D261CFD5086A7AEF47C4B0AB5AA92D36DCC24ACA8DB
3,269,418 UART: [art] PUB.Y = BFC952659A8BEDF2431EA641183B0E5BE598904E85A65D7F811CABB6B08F8D60AFE4B68C11142A07C7895F0F60920669
3,276,362 UART: [art] SIG.R = 1A31B420B470F67EC75952BD535A47CF461E13804F442DD6A12F58F2947A032E03492AE420F2CE872CD3AEDE5950CBCF
3,283,134 UART: [art] SIG.S = F9EFCCE68BB7966E63BAB2A036BA31A10799DBD1F0F933C11344D3F559810C8BD06BC34269E885711D65176FEF1B7CA4
3,306,903 UART: Caliptra RT
3,307,157 UART: [state] CFI Enabled
3,415,329 UART: [rt] RT listening for mailbox commands...
3,415,992 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,546 UART: [rt]cmd =0x46504c54, len=4
3,446,700 >>> mbox cmd response data (8 bytes)
3,446,897 UART: [rt] FIPS self test
3,447,225 UART: [kat] ++
3,447,377 UART: [kat] sha1
3,451,407 UART: [kat] SHA2-256
3,453,429 UART: [kat] SHA2-384
3,456,432 UART: [kat] SHA2-512-ACC
3,458,359 UART: [kat] ECC-384
3,467,529 UART: Fatal Error: 0x90040003
3,469,079 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,469,084 >>> mbox cmd response: failed
3,469,084 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,469,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,997 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,626 UART: [kat] SHA2-256
881,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,672 UART: [kat] ++
885,824 UART: [kat] sha1
890,018 UART: [kat] SHA2-256
891,956 UART: [kat] SHA2-384
894,555 UART: [kat] SHA2-512-ACC
896,456 UART: [kat] ECC-384
901,929 UART: [kat] HMAC-384Kdf
906,391 UART: [kat] LMS
1,474,587 UART: [kat] --
1,475,638 UART: [cold-reset] ++
1,476,094 UART: [fht] Storing FHT @ 0x50003400
1,478,779 UART: [idev] ++
1,478,947 UART: [idev] CDI.KEYID = 6
1,479,307 UART: [idev] SUBJECT.KEYID = 7
1,479,731 UART: [idev] UDS.KEYID = 0
1,480,076 ready_for_fw is high
1,480,076 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,715 UART: [idev] Erasing UDS.KEYID = 0
1,504,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,459 UART: [idev] --
1,514,442 UART: [ldev] ++
1,514,610 UART: [ldev] CDI.KEYID = 6
1,514,973 UART: [ldev] SUBJECT.KEYID = 5
1,515,399 UART: [ldev] AUTHORITY.KEYID = 7
1,515,862 UART: [ldev] FE.KEYID = 1
1,521,306 UART: [ldev] Erasing FE.KEYID = 1
1,547,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,233 UART: [ldev] --
1,586,700 UART: [fwproc] Waiting for Commands...
1,587,363 UART: [fwproc] Received command 0x46574c44
1,588,154 UART: [fwproc] Received Image of size 115224 bytes
2,896,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,527 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,084 >>> mbox cmd response: success
3,091,206 UART: [afmc] ++
3,091,374 UART: [afmc] CDI.KEYID = 6
3,091,736 UART: [afmc] SUBJECT.KEYID = 7
3,092,161 UART: [afmc] AUTHORITY.KEYID = 5
3,127,346 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,257 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,947 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,678 UART: [afmc] --
3,170,770 UART: [cold-reset] --
3,171,646 UART: [state] Locking Datavault
3,173,009 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,613 UART: [state] Locking ICCM
3,174,175 UART: [exit] Launching FMC @ 0x40000130
3,179,504 UART:
3,179,520 UART: Running Caliptra FMC ...
3,179,928 UART:
3,180,071 UART: [state] CFI Enabled
3,190,564 UART: [fht] FMC Alias Private Key: 7
3,298,405 UART: [art] Extend RT PCRs Done
3,298,833 UART: [art] Lock RT PCRs Done
3,300,431 UART: [art] Populate DV Done
3,308,766 UART: [fht] FMC Alias Private Key: 7
3,309,874 UART: [art] Derive CDI
3,310,154 UART: [art] Store in in slot 0x4
3,396,319 UART: [art] Derive Key Pair
3,396,679 UART: [art] Store priv key in slot 0x5
3,409,785 UART: [art] Derive Key Pair - Done
3,424,855 UART: [art] Signing Cert with AUTHO
3,425,335 UART: RITY.KEYID = 7
3,440,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,090 UART: [art] PUB.X = E61271F2446FB2CDEF9F1F04F362B901917206073BC648004A2F42A8B552BEACC6AA976FAAD7B51C54B42C69B8E184E1
3,447,836 UART: [art] PUB.Y = F890C1DE0811137356D2798DEA195D116F4928BF3BDD8518FE601DB9048708A2C83511F9A1D78E63F3FF057FA06FEFF3
3,454,780 UART: [art] SIG.R = 24C71AACD6CCAFB10FACE3B3D9F5A07CC5ED0D0A2E69884A2D654B53138987FD7B3805C7435C960960A14481AD80D827
3,461,547 UART: [art] SIG.S = F0C4BDE20D5C30A6C00CC4FFE3E4812978B9B3D7F3D34D2E1C2D8CD06D1907877D67717344BF04B038DE046308ABA0B6
3,485,540 UART: Caliptra RT
3,485,886 UART: [state] CFI Enabled
3,594,648 UART: [rt] RT listening for mailbox commands...
3,595,311 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,789 UART: [rt]cmd =0x46504c54, len=4
3,625,959 >>> mbox cmd response data (8 bytes)
3,626,250 UART: [rt] FIPS self test
3,626,578 UART: [kat] ++
3,626,730 UART: [kat] sha1
3,631,072 UART: [kat] SHA2-256
3,633,094 UART: [kat] SHA2-384
3,635,875 UART: [kat] SHA2-512-ACC
3,637,802 UART: [kat] ECC-384
3,647,494 UART: Fatal Error: 0x90040003
3,649,044 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,649,049 >>> mbox cmd response: failed
3,649,049 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,649,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,651 UART: [kat] LMS
1,475,847 UART: [kat] --
1,476,424 UART: [cold-reset] ++
1,476,916 UART: [fht] Storing FHT @ 0x50003400
1,479,727 UART: [idev] ++
1,479,895 UART: [idev] CDI.KEYID = 6
1,480,255 UART: [idev] SUBJECT.KEYID = 7
1,480,679 UART: [idev] UDS.KEYID = 0
1,481,024 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,553 UART: [idev] Erasing UDS.KEYID = 0
1,505,691 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,345 UART: [idev] --
1,515,330 UART: [ldev] ++
1,515,498 UART: [ldev] CDI.KEYID = 6
1,515,861 UART: [ldev] SUBJECT.KEYID = 5
1,516,287 UART: [ldev] AUTHORITY.KEYID = 7
1,516,750 UART: [ldev] FE.KEYID = 1
1,521,824 UART: [ldev] Erasing FE.KEYID = 1
1,547,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,029 UART: [ldev] --
1,586,332 UART: [fwproc] Waiting for Commands...
1,587,159 UART: [fwproc] Received command 0x46574c44
1,587,950 UART: [fwproc] Received Image of size 115224 bytes
2,896,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,891 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,404 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 ready_for_fw is high
1,362,818 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,848 >>> mbox cmd response: success
3,000,266 UART:
3,000,282 UART: Running Caliptra FMC ...
3,000,690 UART:
3,000,833 UART: [state] CFI Enabled
3,011,780 UART: [fht] FMC Alias Private Key: 7
3,120,147 UART: [art] Extend RT PCRs Done
3,120,575 UART: [art] Lock RT PCRs Done
3,122,337 UART: [art] Populate DV Done
3,130,276 UART: [fht] FMC Alias Private Key: 7
3,131,248 UART: [art] Derive CDI
3,131,528 UART: [art] Store in in slot 0x4
3,217,119 UART: [art] Derive Key Pair
3,217,479 UART: [art] Store priv key in slot 0x5
3,231,011 UART: [art] Derive Key Pair - Done
3,245,675 UART: [art] Signing Cert with AUTHO
3,246,155 UART: RITY.KEYID = 7
3,261,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,234 UART: [art] PUB.X = 87344D917A8DAB52CC2C9CB53E66DCC939797553EF94D1992AA2D345FB194B270E47D68FC3E86445B35FF9F878B59151
3,269,005 UART: [art] PUB.Y = 599DD652985F2FF7585B943CE3C1C5407365572CC06C9AD63AB8921C2C160C17B0CACB4809BBE118C01042E39EFE385C
3,275,955 UART: [art] SIG.R = 7405FE2629771D04AE740BEFC3F9894C0AC6EFF013D2CC861E42A1A4436E2EDF99A447B992FE204C1120A1B986528463
3,282,717 UART: [art] SIG.S = 53F6D4A158485FBCA826AFC4294E2F30A9ADB4C2F94BD00E9F3FCFE0137FEC9E327BC9916AFB80AFAB0A533289ECF320
3,306,634 UART: Caliptra RT
3,306,980 UART: [state] CFI Enabled
3,415,793 UART: [rt] RT listening for mailbox commands...
3,416,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,092 UART: [rt]cmd =0x46504c54, len=4
3,447,300 >>> mbox cmd response data (8 bytes)
3,447,515 UART: [rt] FIPS self test
3,447,843 UART: [kat] ++
3,447,995 UART: [kat] sha1
3,452,181 UART: [kat] SHA2-256
3,454,203 UART: [kat] SHA2-384
3,457,272 UART: [kat] SHA2-512-ACC
3,459,199 UART: [kat] ECC-384
3,468,937 UART: Fatal Error: 0x90040003
3,470,487 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,470,492 >>> mbox cmd response: failed
3,470,492 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,470,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,284 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,942,418 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
893,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,247 UART: [kat] ++
897,399 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,824 UART: [kat] LMS
1,171,152 UART: [kat] --
1,171,723 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,772 UART: [idev] ++
1,174,940 UART: [idev] CDI.KEYID = 6
1,175,300 UART: [idev] SUBJECT.KEYID = 7
1,175,724 UART: [idev] UDS.KEYID = 0
1,176,069 ready_for_fw is high
1,176,069 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,784 UART: [idev] Erasing UDS.KEYID = 0
1,200,877 UART: [idev] Sha1 KeyId Algorithm
1,209,433 UART: [idev] --
1,210,431 UART: [ldev] ++
1,210,599 UART: [ldev] CDI.KEYID = 6
1,210,962 UART: [ldev] SUBJECT.KEYID = 5
1,211,388 UART: [ldev] AUTHORITY.KEYID = 7
1,211,851 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,416 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,747 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,846 >>> mbox cmd response: success
2,787,036 UART: [afmc] ++
2,787,204 UART: [afmc] CDI.KEYID = 6
2,787,566 UART: [afmc] SUBJECT.KEYID = 7
2,787,991 UART: [afmc] AUTHORITY.KEYID = 5
2,823,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,073 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,885 UART: [afmc] --
2,867,017 UART: [cold-reset] --
2,867,977 UART: [state] Locking Datavault
2,869,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,746 UART: [state] Locking ICCM
2,870,366 UART: [exit] Launching FMC @ 0x40000130
2,875,695 UART:
2,875,711 UART: Running Caliptra FMC ...
2,876,119 UART:
2,876,173 UART: [state] CFI Enabled
2,887,000 UART: [fht] FMC Alias Private Key: 7
2,995,283 UART: [art] Extend RT PCRs Done
2,995,711 UART: [art] Lock RT PCRs Done
2,997,507 UART: [art] Populate DV Done
3,005,980 UART: [fht] FMC Alias Private Key: 7
3,007,014 UART: [art] Derive CDI
3,007,294 UART: [art] Store in in slot 0x4
3,092,493 UART: [art] Derive Key Pair
3,092,853 UART: [art] Store priv key in slot 0x5
3,106,077 UART: [art] Derive Key Pair - Done
3,120,577 UART: [art] Signing Cert with AUTHO
3,121,057 UART: RITY.KEYID = 7
3,136,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,994 UART: [art] PUB.X = 898D60DA29A79CDA9E182FB0D50CAB2495763C88554E6C370734CB2E4CE47429AF4F682C711DFFA36DFF3E5492E38179
3,143,766 UART: [art] PUB.Y = 283C8BB9487C34632331A03CE4626950AD1B13F2782DC8E4930E119422C9B6544276CDECB3DA6DCA7C1B6D9D17F6D83B
3,150,719 UART: [art] SIG.R = 3E109F51D85153FCA8AD0BC73813508325B654646690392EDBA4F0B4027771FB7E6D20408E61544FBEF76E7358145F71
3,157,477 UART: [art] SIG.S = B895C715DAD7735CA2E624068D3802E98A0A947844B94E405098C9095A89FEB437D022BC4179D9A848FC4BAE51322BB1
3,181,164 UART: Caliptra RT
3,181,418 UART: [state] CFI Enabled
3,289,940 UART: [rt] RT listening for mailbox commands...
3,290,603 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,943 UART: [rt]cmd =0x46504c54, len=4
3,321,083 >>> mbox cmd response data (8 bytes)
3,321,372 UART: [rt] FIPS self test
3,321,700 UART: [kat] ++
3,321,852 UART: [kat] sha1
3,326,062 UART: [kat] SHA2-256
3,328,084 UART: [kat] SHA2-384
3,331,015 UART: [kat] SHA2-512-ACC
3,332,942 UART: [kat] ECC-384
3,342,568 UART: Fatal Error: 0x90040003
3,344,118 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,123 >>> mbox cmd response: failed
3,344,123 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
918,366 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,172,105 UART: [cold-reset] ++
1,172,493 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,162 UART: [idev] Erasing UDS.KEYID = 0
1,201,283 UART: [idev] Sha1 KeyId Algorithm
1,209,893 UART: [idev] --
1,211,045 UART: [ldev] ++
1,211,213 UART: [ldev] CDI.KEYID = 6
1,211,576 UART: [ldev] SUBJECT.KEYID = 5
1,212,002 UART: [ldev] AUTHORITY.KEYID = 7
1,212,465 UART: [ldev] FE.KEYID = 1
1,217,773 UART: [ldev] Erasing FE.KEYID = 1
1,244,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,161 UART: [ldev] --
1,283,462 UART: [fwproc] Wait for Commands...
1,284,178 UART: [fwproc] Recv command 0x46574c44
1,284,906 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,057 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,210 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,693 ready_for_fw is high
1,060,693 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,763 >>> mbox cmd response: success
2,700,343 UART:
2,700,359 UART: Running Caliptra FMC ...
2,700,767 UART:
2,700,821 UART: [state] CFI Enabled
2,711,472 UART: [fht] FMC Alias Private Key: 7
2,818,961 UART: [art] Extend RT PCRs Done
2,819,389 UART: [art] Lock RT PCRs Done
2,820,921 UART: [art] Populate DV Done
2,828,980 UART: [fht] FMC Alias Private Key: 7
2,830,104 UART: [art] Derive CDI
2,830,384 UART: [art] Store in in slot 0x4
2,915,783 UART: [art] Derive Key Pair
2,916,143 UART: [art] Store priv key in slot 0x5
2,929,051 UART: [art] Derive Key Pair - Done
2,944,308 UART: [art] Signing Cert with AUTHO
2,944,788 UART: RITY.KEYID = 7
2,959,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,651 UART: [art] PUB.X = 3AA297A302075CBDB05EDBF88436BAB86FA662B838B5DFA5ACDA712AC1DC211C844E99C855EBB869746B054A6BC70A75
2,967,427 UART: [art] PUB.Y = 83FE5E1C666BD035D3442ECBB559A33AB4B635D42DAF8FFD17C74EF2FD7848C306B13E80059FAB8764D9376DE53363D7
2,974,383 UART: [art] SIG.R = 389A55295C6FF6560B099845ADF402EEA11B533DC9F5878BAFDC351F84E61FD4AF89E87425B12681361CB95E99AC0DE2
2,981,149 UART: [art] SIG.S = 9254E9203718974C710FEB5C21936FA5479515E23C94ED439660F8C292F22891CEFBB1A466EAB587A5184D01FDBEEB50
3,005,194 UART: Caliptra RT
3,005,448 UART: [state] CFI Enabled
3,114,046 UART: [rt] RT listening for mailbox commands...
3,114,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,557 UART: [rt]cmd =0x46504c54, len=4
3,145,715 >>> mbox cmd response data (8 bytes)
3,145,908 UART: [rt] FIPS self test
3,146,236 UART: [kat] ++
3,146,388 UART: [kat] sha1
3,150,540 UART: [kat] SHA2-256
3,152,562 UART: [kat] SHA2-384
3,155,447 UART: [kat] SHA2-512-ACC
3,157,374 UART: [kat] ECC-384
3,166,960 UART: Fatal Error: 0x90040003
3,168,510 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,168,515 >>> mbox cmd response: failed
3,168,515 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,168,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,001 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,731 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
893,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,042 UART: [kat] ++
898,194 UART: [kat] sha1
902,260 UART: [kat] SHA2-256
904,200 UART: [kat] SHA2-384
906,769 UART: [kat] SHA2-512-ACC
908,670 UART: [kat] ECC-384
918,279 UART: [kat] HMAC-384Kdf
922,979 UART: [kat] LMS
1,171,307 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,576 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,202,348 UART: [idev] Sha1 KeyId Algorithm
1,210,606 UART: [idev] --
1,211,568 UART: [ldev] ++
1,211,736 UART: [ldev] CDI.KEYID = 6
1,212,099 UART: [ldev] SUBJECT.KEYID = 5
1,212,525 UART: [ldev] AUTHORITY.KEYID = 7
1,212,988 UART: [ldev] FE.KEYID = 1
1,218,286 UART: [ldev] Erasing FE.KEYID = 1
1,244,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,392 UART: [ldev] --
1,283,655 UART: [fwproc] Wait for Commands...
1,284,449 UART: [fwproc] Recv command 0x46574c44
1,285,177 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,250 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,339 >>> mbox cmd response: success
2,787,381 UART: [afmc] ++
2,787,549 UART: [afmc] CDI.KEYID = 6
2,787,911 UART: [afmc] SUBJECT.KEYID = 7
2,788,336 UART: [afmc] AUTHORITY.KEYID = 5
2,824,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,266 UART: [afmc] --
2,867,200 UART: [cold-reset] --
2,868,084 UART: [state] Locking Datavault
2,869,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,759 UART: [state] Locking ICCM
2,870,263 UART: [exit] Launching FMC @ 0x40000130
2,875,592 UART:
2,875,608 UART: Running Caliptra FMC ...
2,876,016 UART:
2,876,159 UART: [state] CFI Enabled
2,887,000 UART: [fht] FMC Alias Private Key: 7
2,995,033 UART: [art] Extend RT PCRs Done
2,995,461 UART: [art] Lock RT PCRs Done
2,997,507 UART: [art] Populate DV Done
3,005,832 UART: [fht] FMC Alias Private Key: 7
3,006,814 UART: [art] Derive CDI
3,007,094 UART: [art] Store in in slot 0x4
3,092,795 UART: [art] Derive Key Pair
3,093,155 UART: [art] Store priv key in slot 0x5
3,107,047 UART: [art] Derive Key Pair - Done
3,121,511 UART: [art] Signing Cert with AUTHO
3,121,991 UART: RITY.KEYID = 7
3,137,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,992 UART: [art] PUB.X = CF109D014B1DED18A6840CBFEDDEA4C110FCF93C43E879511A4FD78040D8DA49EFCB8214CC2266FCA5DC6FF3FDE56C12
3,144,784 UART: [art] PUB.Y = AE3BFE4C9C2C0013FCEE7D5422DCCDCF6EAE84482D9FF8D568C63395F19C07C1D1B342D52DB0D844C62FB22C50ADD61E
3,151,735 UART: [art] SIG.R = 63336BA7F8A3D6C3EBE481510384CEFB2FE0256F9342D7C979EBB48110E27ED277483B22AAB515B46BEEC2350816036E
3,158,502 UART: [art] SIG.S = F206F7D315A9CD01F766035BD7D288912B77372D6A5DDF0EE22A9C774C50B9C1E9DE3176668A83F6D8E4A57E28ACF50C
3,182,632 UART: Caliptra RT
3,182,978 UART: [state] CFI Enabled
3,291,018 UART: [rt] RT listening for mailbox commands...
3,291,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,075 UART: [rt]cmd =0x46504c54, len=4
3,322,275 >>> mbox cmd response data (8 bytes)
3,322,392 UART: [rt] FIPS self test
3,322,720 UART: [kat] ++
3,322,872 UART: [kat] sha1
3,326,904 UART: [kat] SHA2-256
3,328,926 UART: [kat] SHA2-384
3,331,871 UART: [kat] SHA2-512-ACC
3,333,798 UART: [kat] ECC-384
3,343,442 UART: Fatal Error: 0x90040003
3,344,992 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,997 >>> mbox cmd response: failed
3,344,997 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,345,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,367 UART: [kat] SHA2-256
894,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,142 UART: [kat] ++
898,294 UART: [kat] sha1
902,734 UART: [kat] SHA2-256
904,674 UART: [kat] SHA2-384
907,347 UART: [kat] SHA2-512-ACC
909,248 UART: [kat] ECC-384
918,567 UART: [kat] HMAC-384Kdf
923,283 UART: [kat] LMS
1,171,611 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,451 UART: [idev] Erasing UDS.KEYID = 0
1,201,236 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,746 UART: [ldev] ++
1,210,914 UART: [ldev] CDI.KEYID = 6
1,211,277 UART: [ldev] SUBJECT.KEYID = 5
1,211,703 UART: [ldev] AUTHORITY.KEYID = 7
1,212,166 UART: [ldev] FE.KEYID = 1
1,217,316 UART: [ldev] Erasing FE.KEYID = 1
1,244,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,478 UART: [ldev] --
1,283,987 UART: [fwproc] Wait for Commands...
1,284,775 UART: [fwproc] Recv command 0x46574c44
1,285,503 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,568 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,647 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,244 ready_for_fw is high
1,061,244 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,008 >>> mbox cmd response: success
2,700,598 UART:
2,700,614 UART: Running Caliptra FMC ...
2,701,022 UART:
2,701,165 UART: [state] CFI Enabled
2,711,704 UART: [fht] FMC Alias Private Key: 7
2,819,645 UART: [art] Extend RT PCRs Done
2,820,073 UART: [art] Lock RT PCRs Done
2,821,289 UART: [art] Populate DV Done
2,829,612 UART: [fht] FMC Alias Private Key: 7
2,830,650 UART: [art] Derive CDI
2,830,930 UART: [art] Store in in slot 0x4
2,916,817 UART: [art] Derive Key Pair
2,917,177 UART: [art] Store priv key in slot 0x5
2,930,629 UART: [art] Derive Key Pair - Done
2,945,706 UART: [art] Signing Cert with AUTHO
2,946,186 UART: RITY.KEYID = 7
2,961,388 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,153 UART: [art] PUB.X = 7CC533BF2E20250C3670E7DC62CE7A989A25381D9F7D7A15B611A26E8B15E4A116A99962AAAF2B4429CF73CCE817AC53
2,968,930 UART: [art] PUB.Y = 9D958A5C82207DD47DBAAC74A1311F7C4C8104FA208081FEEC210D44E2CDE4D905B24B78B83DB50185890FC82C264ED9
2,975,875 UART: [art] SIG.R = 5CFB475AB77801D6C527D69ADA0CBB8B07E797E634FD26FA671DCB753BCEB688D96FC085FCD066B6045E9FA85CC075A3
2,982,653 UART: [art] SIG.S = 7227876430AF53D87941358818E56A394B5F877152DE56EB1E83409181D9BF834A7422219FFDB6D3BD618CE9EE8380C1
3,006,186 UART: Caliptra RT
3,006,532 UART: [state] CFI Enabled
3,115,578 UART: [rt] RT listening for mailbox commands...
3,116,241 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,783 UART: [rt]cmd =0x46504c54, len=4
3,147,089 >>> mbox cmd response data (8 bytes)
3,147,310 UART: [rt] FIPS self test
3,147,638 UART: [kat] ++
3,147,790 UART: [kat] sha1
3,151,946 UART: [kat] SHA2-256
3,153,968 UART: [kat] SHA2-384
3,156,799 UART: [kat] SHA2-512-ACC
3,158,726 UART: [kat] ECC-384
3,168,610 UART: Fatal Error: 0x90040003
3,170,160 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,170,165 >>> mbox cmd response: failed
3,170,165 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,170,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,362 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
890,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,959 UART: [kat] ++
895,111 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 ready_for_fw is high
1,174,275 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,207,927 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,242,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,196 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,323 UART: [fwproc] Recv command 0x46574c44
1,283,056 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,406 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,532 >>> mbox cmd response: success
2,785,765 UART: [afmc] ++
2,785,933 UART: [afmc] CDI.KEYID = 6
2,786,296 UART: [afmc] SUBJECT.KEYID = 7
2,786,722 UART: [afmc] AUTHORITY.KEYID = 5
2,821,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,842 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,173 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,154 UART: [afmc] --
2,865,098 UART: [cold-reset] --
2,865,848 UART: [state] Locking Datavault
2,867,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,643 UART: [state] Locking ICCM
2,868,277 UART: [exit] Launching FMC @ 0x40000130
2,873,606 UART:
2,873,622 UART: Running Caliptra FMC ...
2,874,030 UART:
2,874,084 UART: [state] CFI Enabled
2,884,633 UART: [fht] FMC Alias Private Key: 7
2,992,488 UART: [art] Extend RT PCRs Done
2,992,916 UART: [art] Lock RT PCRs Done
2,994,518 UART: [art] Populate DV Done
3,002,663 UART: [fht] FMC Alias Private Key: 7
3,003,705 UART: [art] Derive CDI
3,003,985 UART: [art] Store in in slot 0x4
3,089,724 UART: [art] Derive Key Pair
3,090,084 UART: [art] Store priv key in slot 0x5
3,103,054 UART: [art] Derive Key Pair - Done
3,117,801 UART: [art] Signing Cert with AUTHO
3,118,281 UART: RITY.KEYID = 7
3,133,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,536 UART: [art] PUB.X = 97BC095F493FFF4EFCF92DA76D824BB6A6F7287DA6AFE146DABF09A84855616D67AE05AFE1FDC29E32014FD2A69C7742
3,141,314 UART: [art] PUB.Y = 17C362F55805F32044F0F881F55EE50AA36F30C72D7CA057D738E7F5EB37BFD39178F1CA7FFB2C9959AA55585DB2EEE7
3,148,270 UART: [art] SIG.R = A0BBBFE4774AE286476950E08B4E732AA2F3E68A9AC4512496D7F16A27CD8980C5E955FD4780F4B2AE66A87D3128EF55
3,155,048 UART: [art] SIG.S = 3152C339826B19D588D7CB5AA065ACEDFC000E5BF9F5FA34E5725FB6BD9661032DE379B38A0BE9DC4A3472A5D0828624
3,178,990 UART: Caliptra RT
3,179,244 UART: [state] CFI Enabled
3,286,586 UART: [rt] RT listening for mailbox commands...
3,287,249 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,855 UART: [rt]cmd =0x46504c54, len=4
3,317,931 >>> mbox cmd response data (8 bytes)
3,318,298 UART: [rt] FIPS self test
3,318,626 UART: [kat] ++
3,318,778 UART: [kat] sha1
3,323,036 UART: [kat] SHA2-256
3,325,058 UART: [kat] SHA2-384
3,328,033 UART: [kat] SHA2-512-ACC
3,329,960 UART: [kat] ECC-384
3,339,672 UART: Fatal Error: 0x90040003
3,341,222 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,341,227 >>> mbox cmd response: failed
3,341,227 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,341,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,734 UART: [kat] HMAC-384Kdf
920,294 UART: [kat] LMS
1,168,606 UART: [kat] --
1,169,511 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,173,867 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,141 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,206,967 UART: [idev] --
1,207,884 UART: [ldev] ++
1,208,052 UART: [ldev] CDI.KEYID = 6
1,208,416 UART: [ldev] SUBJECT.KEYID = 5
1,208,843 UART: [ldev] AUTHORITY.KEYID = 7
1,209,306 UART: [ldev] FE.KEYID = 1
1,214,402 UART: [ldev] Erasing FE.KEYID = 1
1,240,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,632 UART: [ldev] --
1,280,060 UART: [fwproc] Wait for Commands...
1,280,869 UART: [fwproc] Recv command 0x46574c44
1,281,602 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,938 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,152 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,782 ready_for_fw is high
1,055,782 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,356 >>> mbox cmd response: success
2,694,098 UART:
2,694,114 UART: Running Caliptra FMC ...
2,694,522 UART:
2,694,576 UART: [state] CFI Enabled
2,705,457 UART: [fht] FMC Alias Private Key: 7
2,813,804 UART: [art] Extend RT PCRs Done
2,814,232 UART: [art] Lock RT PCRs Done
2,815,632 UART: [art] Populate DV Done
2,823,715 UART: [fht] FMC Alias Private Key: 7
2,824,857 UART: [art] Derive CDI
2,825,137 UART: [art] Store in in slot 0x4
2,910,886 UART: [art] Derive Key Pair
2,911,246 UART: [art] Store priv key in slot 0x5
2,924,958 UART: [art] Derive Key Pair - Done
2,939,578 UART: [art] Signing Cert with AUTHO
2,940,058 UART: RITY.KEYID = 7
2,954,782 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,547 UART: [art] PUB.X = 82892223169248F167C1794D2F2A96CD923D412E562A58CD7716FDED5D61475C8E023B9468A454084D6043290450FC32
2,962,294 UART: [art] PUB.Y = D38547B80BBCE0E253E6091984DF08AC2A14132A122A279E0A8AFA0F5A53E23D48B5FFFEE102A69F76A84E1537CCC45F
2,969,240 UART: [art] SIG.R = C9E89F666D0434EDC5988227B1BB322931C85A5F257BFF3058888BD1D340E0C6270B8B041DDE47F9652C3407AE5229AC
2,976,000 UART: [art] SIG.S = 910BAE299B7585BB9CDED292FA96C592F37E83894109F9DF30669AB98E51B2BE1AA4B7D96104CD9DEECA9AFFF183CFBA
2,999,364 UART: Caliptra RT
2,999,618 UART: [state] CFI Enabled
3,107,721 UART: [rt] RT listening for mailbox commands...
3,108,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,124 UART: [rt]cmd =0x46504c54, len=4
3,139,264 >>> mbox cmd response data (8 bytes)
3,139,571 UART: [rt] FIPS self test
3,139,899 UART: [kat] ++
3,140,051 UART: [kat] sha1
3,144,369 UART: [kat] SHA2-256
3,146,391 UART: [kat] SHA2-384
3,149,274 UART: [kat] SHA2-512-ACC
3,151,201 UART: [kat] ECC-384
3,161,331 UART: Fatal Error: 0x90040003
3,162,881 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,162,886 >>> mbox cmd response: failed
3,162,886 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,162,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,182 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,631,020 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
921,137 UART: [kat] LMS
1,169,449 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,174,922 ready_for_fw is high
1,174,922 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,644 UART: [idev] Erasing UDS.KEYID = 0
1,200,058 UART: [idev] Sha1 KeyId Algorithm
1,208,962 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,565 UART: [ldev] SUBJECT.KEYID = 5
1,210,992 UART: [ldev] AUTHORITY.KEYID = 7
1,211,455 UART: [ldev] FE.KEYID = 1
1,216,695 UART: [ldev] Erasing FE.KEYID = 1
1,242,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,973 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,795 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,029 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,103 >>> mbox cmd response: success
2,787,246 UART: [afmc] ++
2,787,414 UART: [afmc] CDI.KEYID = 6
2,787,777 UART: [afmc] SUBJECT.KEYID = 7
2,788,203 UART: [afmc] AUTHORITY.KEYID = 5
2,824,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,316 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,233 UART: [afmc] --
2,867,351 UART: [cold-reset] --
2,868,379 UART: [state] Locking Datavault
2,869,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,244 UART: [state] Locking ICCM
2,870,728 UART: [exit] Launching FMC @ 0x40000130
2,876,057 UART:
2,876,073 UART: Running Caliptra FMC ...
2,876,481 UART:
2,876,624 UART: [state] CFI Enabled
2,887,377 UART: [fht] FMC Alias Private Key: 7
2,995,030 UART: [art] Extend RT PCRs Done
2,995,458 UART: [art] Lock RT PCRs Done
2,997,078 UART: [art] Populate DV Done
3,005,119 UART: [fht] FMC Alias Private Key: 7
3,006,131 UART: [art] Derive CDI
3,006,411 UART: [art] Store in in slot 0x4
3,092,344 UART: [art] Derive Key Pair
3,092,704 UART: [art] Store priv key in slot 0x5
3,105,460 UART: [art] Derive Key Pair - Done
3,120,327 UART: [art] Signing Cert with AUTHO
3,120,807 UART: RITY.KEYID = 7
3,136,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,364 UART: [art] PUB.X = 1E6D255505AA071B4A7E8DA8D203499E5D3EA558A9CAA18AB7FBC8F2AFD0D9024E5667F509A856EF645D897EA8E4627C
3,144,133 UART: [art] PUB.Y = 7BA5DFEDE850F0C6BB16680FF1B54A0DF5707531E03D1C41B135928B25E159D9B8A98A776F89D0BE02BE061C7B661E91
3,151,081 UART: [art] SIG.R = 46DD3848BC2A666C39E8DA35091BC943EF8A3876991731E454E5F147B425ACF115163C6E5B04E8F50F360F242EBB9C59
3,157,841 UART: [art] SIG.S = 64D923E9D03404C4777CB46CBA0E95B55A01FD5FE645844AEF96E1DB5B2D8B342AAB9F2ADD3CD47048E776D0B56AA9F4
3,181,729 UART: Caliptra RT
3,182,075 UART: [state] CFI Enabled
3,289,549 UART: [rt] RT listening for mailbox commands...
3,290,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,876 UART: [rt]cmd =0x46504c54, len=4
3,321,234 >>> mbox cmd response data (8 bytes)
3,321,379 UART: [rt] FIPS self test
3,321,707 UART: [kat] ++
3,321,859 UART: [kat] sha1
3,326,151 UART: [kat] SHA2-256
3,328,173 UART: [kat] SHA2-384
3,330,986 UART: [kat] SHA2-512-ACC
3,332,913 UART: [kat] ECC-384
3,342,453 UART: Fatal Error: 0x90040003
3,344,003 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,008 >>> mbox cmd response: failed
3,344,008 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,489 UART: [kat] SHA2-512-ACC
906,390 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,169,992 UART: [fht] FHT @ 0x50003400
1,172,586 UART: [idev] ++
1,172,754 UART: [idev] CDI.KEYID = 6
1,173,115 UART: [idev] SUBJECT.KEYID = 7
1,173,540 UART: [idev] UDS.KEYID = 0
1,173,886 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,358 UART: [idev] Erasing UDS.KEYID = 0
1,197,740 UART: [idev] Sha1 KeyId Algorithm
1,206,576 UART: [idev] --
1,207,489 UART: [ldev] ++
1,207,657 UART: [ldev] CDI.KEYID = 6
1,208,021 UART: [ldev] SUBJECT.KEYID = 5
1,208,448 UART: [ldev] AUTHORITY.KEYID = 7
1,208,911 UART: [ldev] FE.KEYID = 1
1,213,809 UART: [ldev] Erasing FE.KEYID = 1
1,240,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,889 UART: [ldev] --
1,279,327 UART: [fwproc] Wait for Commands...
1,280,050 UART: [fwproc] Recv command 0x46574c44
1,280,783 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,653 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,705 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,389 ready_for_fw is high
1,056,389 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,895 >>> mbox cmd response: success
2,695,461 UART:
2,695,477 UART: Running Caliptra FMC ...
2,695,885 UART:
2,696,028 UART: [state] CFI Enabled
2,706,459 UART: [fht] FMC Alias Private Key: 7
2,813,728 UART: [art] Extend RT PCRs Done
2,814,156 UART: [art] Lock RT PCRs Done
2,815,702 UART: [art] Populate DV Done
2,824,007 UART: [fht] FMC Alias Private Key: 7
2,825,037 UART: [art] Derive CDI
2,825,317 UART: [art] Store in in slot 0x4
2,911,378 UART: [art] Derive Key Pair
2,911,738 UART: [art] Store priv key in slot 0x5
2,925,014 UART: [art] Derive Key Pair - Done
2,939,645 UART: [art] Signing Cert with AUTHO
2,940,125 UART: RITY.KEYID = 7
2,955,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,130 UART: [art] PUB.X = D34F00041E0EBE88159B75336ADF7C707E03CA7AB7A7148E498FB86D71996700E238E506C396049CE1DC6B36E1CD547A
2,962,845 UART: [art] PUB.Y = 8DE7A03CFD3E299C22A101C0AC362080BD3D584A685C8DDACAAF2580C260EC1DDB8A324E92E8561714B72A2A2E394859
2,969,804 UART: [art] SIG.R = 1695498D0C4420CA08F8208EF77A9148D07C175A6557DE5B97C15B787A97A1C71EC77C089011BE5D1E0311213D96B044
2,976,556 UART: [art] SIG.S = A9AA49A976AE0086152B28FD2E051B5F276BEE39EB27654A468157E0E985B4E05CF03D7B9C22650A49AC4ABBCEAB3919
2,999,937 UART: Caliptra RT
3,000,283 UART: [state] CFI Enabled
3,107,317 UART: [rt] RT listening for mailbox commands...
3,107,980 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,458 UART: [rt]cmd =0x46504c54, len=4
3,138,510 >>> mbox cmd response data (8 bytes)
3,138,655 UART: [rt] FIPS self test
3,138,983 UART: [kat] ++
3,139,135 UART: [kat] sha1
3,143,397 UART: [kat] SHA2-256
3,145,419 UART: [kat] SHA2-384
3,148,152 UART: [kat] SHA2-512-ACC
3,150,079 UART: [kat] ECC-384
3,159,161 UART: Fatal Error: 0x90040003
3,160,711 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,716 >>> mbox cmd response: failed
3,160,716 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,319 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,109 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
276,146 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
276,629 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
653,428 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
619,870 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
311,148 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
310,938 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
276,265 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
653,629 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
653,391 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,003 writing to cptra_bootfsm_go
5,980,216 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,124,610 >>> mbox cmd response: failed
6,125,287 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,269,215 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,857,509 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,437,835 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
5,981,444 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,125,641 >>> mbox cmd response: failed
6,126,204 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,269,431 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
4,878,138 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,479,562 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
6,311,903 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,455,840 >>> mbox cmd response: failed
6,456,405 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,599,619 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
18,457,454 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,904,044 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
6,295,712 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,439,798 >>> mbox cmd response: failed
6,440,360 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,583,969 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
18,464,180 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,904,552 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
5,175,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,320,934 >>> mbox cmd response: failed
5,321,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,465,017 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,456,871 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,308,545 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
5,197,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,341,722 >>> mbox cmd response: failed
5,342,292 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,485,925 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,438,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,304,121 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
5,148,244 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,292,587 >>> mbox cmd response: failed
5,293,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,436,774 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,447,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,297,334 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,929 writing to cptra_bootfsm_go
5,511,812 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,656,354 >>> mbox cmd response: failed
5,656,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,800,546 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
17,860,098 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,576,651 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
5,505,328 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,650,013 >>> mbox cmd response: failed
5,650,586 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,794,062 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,864,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,594,583 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,015 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,023 >>> mbox cmd response: failed
824,023 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,160 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,837 >>> mbox cmd response: failed
823,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,248 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,034 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,042 >>> mbox cmd response: failed
824,042 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,676 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,111 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,566 >>> mbox cmd response: failed
824,566 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,200 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,881 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,085 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,093 >>> mbox cmd response: failed
824,093 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,329 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,558 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,473 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,481 >>> mbox cmd response: failed
823,481 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,277 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,630 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,308 >>> mbox cmd response: failed
824,308 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,644 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,367 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,638 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,646 >>> mbox cmd response: failed
824,646 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,600 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,497 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,831 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,839 >>> mbox cmd response: failed
824,839 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,661 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,418 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,317 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,325 >>> mbox cmd response: failed
823,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,688 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,428 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,436 >>> mbox cmd response: failed
824,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
824,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,471 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,694 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,702 >>> mbox cmd response: failed
823,702 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
823,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,094 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,743 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,168 UART:
192,535 UART: Running Caliptra ROM ...
193,720 UART:
193,874 UART: [state] CFI Enabled
261,639 UART: [state] LifecycleState = Unprovisioned
263,610 UART: [state] DebugLocked = No
265,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,228 UART: [kat] SHA2-256
439,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,381 UART: [kat] ++
450,982 UART: [kat] sha1
461,224 UART: [kat] SHA2-256
463,871 UART: [kat] SHA2-384
470,799 UART: [kat] SHA2-512-ACC
473,184 UART: [kat] ECC-384
2,767,243 UART: [kat] HMAC-384Kdf
2,798,497 UART: [kat] LMS
3,988,800 UART: [kat] --
3,993,740 UART: [cold-reset] ++
3,995,190 UART: [fht] Storing FHT @ 0x50003400
4,007,467 UART: [idev] ++
4,008,108 UART: [idev] CDI.KEYID = 6
4,009,001 UART: [idev] SUBJECT.KEYID = 7
4,010,258 UART: [idev] UDS.KEYID = 0
4,011,312 ready_for_fw is high
4,011,527 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,156,146 UART: [idev] Erasing UDS.KEYID = 0
7,345,753 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,224 UART: [idev] --
7,371,257 UART: [ldev] ++
7,371,883 UART: [ldev] CDI.KEYID = 6
7,372,967 UART: [ldev] SUBJECT.KEYID = 5
7,374,075 UART: [ldev] AUTHORITY.KEYID = 7
7,375,315 UART: [ldev] FE.KEYID = 1
7,420,693 UART: [ldev] Erasing FE.KEYID = 1
10,753,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,167 UART: [ldev] --
13,137,379 UART: [fwproc] Waiting for Commands...
13,139,752 UART: [fwproc] Received command 0x46574c44
13,141,942 UART: [fwproc] Received Image of size 114916 bytes
17,198,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,585 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,501 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,661,333 >>> mbox cmd response: success
17,664,997 UART: [afmc] ++
17,665,600 UART: [afmc] CDI.KEYID = 6
17,666,575 UART: [afmc] SUBJECT.KEYID = 7
17,667,793 UART: [afmc] AUTHORITY.KEYID = 5
21,032,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,976 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,234 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,663 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,488 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,918 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,915 UART: [afmc] --
23,399,776 UART: [cold-reset] --
23,404,281 UART: [state] Locking Datavault
23,408,610 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,365 UART: [state] Locking ICCM
23,411,400 UART: [exit] Launching FMC @ 0x40000130
23,419,800 UART:
23,420,050 UART: Running Caliptra FMC ...
23,421,158 UART:
23,421,322 UART: [state] CFI Enabled
23,488,328 UART: [fht] FMC Alias Private Key: 7
25,825,964 UART: [art] Extend RT PCRs Done
25,827,187 UART: [art] Lock RT PCRs Done
25,828,870 UART: [art] Populate DV Done
25,834,284 UART: [fht] FMC Alias Private Key: 7
25,835,876 UART: [art] Derive CDI
25,836,694 UART: [art] Store in in slot 0x4
25,896,062 UART: [art] Derive Key Pair
25,897,107 UART: [art] Store priv key in slot 0x5
29,189,972 UART: [art] Derive Key Pair - Done
29,202,868 UART: [art] Signing Cert with AUTHO
29,204,197 UART: RITY.KEYID = 7
31,490,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,686 UART: [art] PUB.X = 7B038F7325BF0A1C2480B42ED727CFE955CA51842B5DC223306A70AF40C1CBC871436C0302A56DB4A46B9221023197A5
31,499,744 UART: [art] PUB.Y = 4EE724DB9788BBBEE31741E4E04761A147FD89D8E9950D01F1BA8E25786CD1C6A8E47DE4A0D348FF75922E7672EFBEA6
31,506,956 UART: [art] SIG.R = 6AC4379BD33DB12BF157B53E5E2F2E91677FABFC021CE7A5440E2D60078D5F46F15666DD0B7D95C995CA361531202329
31,514,355 UART: [art] SIG.S = 4656B83D9336C16A45CB22941E4A2D67E3CCC265629FFF63313C7BEAAC3F727E7BC91CCB50684ECA8ECB69C994B18E53
32,819,277 UART: Caliptra RT
32,819,989 UART: [state] CFI Enabled
32,981,255 UART: [rt] RT listening for mailbox commands...
32,983,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,012,815 UART: [rt]cmd =0x46504c54, len=4
33,014,377 >>> mbox cmd response data (8 bytes)
33,015,759 UART: [rt] FIPS self test
33,016,712 UART: [kat] ++
33,017,170 UART: [kat] sha1
33,021,664 UART: [kat] SHA2-256
33,023,623 UART: [kat] SHA2-384
33,026,642 UART: [kat] SHA2-512-ACC
33,028,883 UART: [kat] ECC-384
36,296,292 UART: [kat] HMAC-384Kdf
36,297,655 UART: Fatal Error: 0x90030001
36,332,797 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,477,474 >>> mbox cmd response: failed
36,478,159 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,622,465 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,028 UART:
190,330 UART: Running Caliptra ROM ...
191,392 UART:
191,532 UART: [state] CFI Enabled
267,429 UART: [state] LifecycleState = Unprovisioned
269,374 UART: [state] DebugLocked = No
272,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,011 UART: [kat] SHA2-256
446,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,253 UART: [kat] ++
457,784 UART: [kat] sha1
467,968 UART: [kat] SHA2-256
470,656 UART: [kat] SHA2-384
476,019 UART: [kat] SHA2-512-ACC
478,371 UART: [kat] ECC-384
2,766,216 UART: [kat] HMAC-384Kdf
2,778,716 UART: [kat] LMS
3,969,013 UART: [kat] --
3,972,916 UART: [cold-reset] ++
3,974,264 UART: [fht] Storing FHT @ 0x50003400
3,986,296 UART: [idev] ++
3,986,889 UART: [idev] CDI.KEYID = 6
3,987,773 UART: [idev] SUBJECT.KEYID = 7
3,989,045 UART: [idev] UDS.KEYID = 0
3,990,739 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,135,154 UART: [idev] Erasing UDS.KEYID = 0
7,324,758 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,244 UART: [idev] --
7,349,751 UART: [ldev] ++
7,350,359 UART: [ldev] CDI.KEYID = 6
7,351,281 UART: [ldev] SUBJECT.KEYID = 5
7,352,503 UART: [ldev] AUTHORITY.KEYID = 7
7,353,739 UART: [ldev] FE.KEYID = 1
7,401,487 UART: [ldev] Erasing FE.KEYID = 1
10,735,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,255 UART: [ldev] --
13,116,027 UART: [fwproc] Waiting for Commands...
13,118,135 UART: [fwproc] Received command 0x46574c44
13,120,383 UART: [fwproc] Received Image of size 114916 bytes
17,184,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,646,985 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,805,425 ready_for_fw is high
3,805,809 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,893,320 >>> mbox cmd response: success
23,590,818 UART:
23,591,256 UART: Running Caliptra FMC ...
23,592,369 UART:
23,592,528 UART: [state] CFI Enabled
23,661,774 UART: [fht] FMC Alias Private Key: 7
25,999,059 UART: [art] Extend RT PCRs Done
26,000,289 UART: [art] Lock RT PCRs Done
26,002,059 UART: [art] Populate DV Done
26,007,419 UART: [fht] FMC Alias Private Key: 7
26,009,019 UART: [art] Derive CDI
26,009,846 UART: [art] Store in in slot 0x4
26,071,150 UART: [art] Derive Key Pair
26,072,245 UART: [art] Store priv key in slot 0x5
29,365,066 UART: [art] Derive Key Pair - Done
29,378,078 UART: [art] Signing Cert with AUTHO
29,379,384 UART: RITY.KEYID = 7
31,666,475 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,991 UART: [art] PUB.X = E374D326D5D22AC1E623F7CA2FBD57B93A5CA3DEB30EF94C71182C912A0B6276CEE9D06A4B76026BC521D7A1D085C335
31,675,209 UART: [art] PUB.Y = 7B664A34345E5B7030A6DF17CFD90E0B006615E08DAD0610F7370FDFF6823A7B327F68842841BCBC3AF79114EDD26C76
31,682,462 UART: [art] SIG.R = 4F3A78A0315DD6BC1BF19528FD951824A1B6A09FC79CCE0702F270CA09F55969E9F6216ADD1AE8DE7617BDEF0D34D9EC
31,689,861 UART: [art] SIG.S = 3D9B6231458C39C9CCE8ACC4FA8959E1105BD7D77C88C5EB3073408D78E9B757A546A06CC780807CCD1E50C874C70DD1
32,995,640 UART: Caliptra RT
32,996,360 UART: [state] CFI Enabled
33,157,092 UART: [rt] RT listening for mailbox commands...
33,158,952 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,188,614 UART: [rt]cmd =0x46504c54, len=4
33,190,063 >>> mbox cmd response data (8 bytes)
33,191,057 UART: [rt] FIPS self test
33,192,005 UART: [kat] ++
33,192,459 UART: [kat] sha1
33,196,702 UART: [kat] SHA2-256
33,198,630 UART: [kat] SHA2-384
33,201,694 UART: [kat] SHA2-512-ACC
33,203,953 UART: [kat] ECC-384
36,472,094 UART: [kat] HMAC-384Kdf
36,473,312 UART: Fatal Error: 0x90030001
36,508,458 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,652,784 >>> mbox cmd response: failed
36,653,466 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,797,719 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,788,847 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,869,072 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,287 writing to cptra_bootfsm_go
193,448 UART:
193,813 UART: Running Caliptra ROM ...
194,897 UART:
604,770 UART: [state] CFI Enabled
617,642 UART: [state] LifecycleState = Unprovisioned
619,583 UART: [state] DebugLocked = No
622,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,412 UART: [kat] SHA2-256
797,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,705 UART: [kat] ++
808,159 UART: [kat] sha1
818,754 UART: [kat] SHA2-256
821,487 UART: [kat] SHA2-384
827,127 UART: [kat] SHA2-512-ACC
829,502 UART: [kat] ECC-384
3,112,245 UART: [kat] HMAC-384Kdf
3,124,365 UART: [kat] LMS
4,314,436 UART: [kat] --
4,320,077 UART: [cold-reset] ++
4,322,147 UART: [fht] Storing FHT @ 0x50003400
4,333,788 UART: [idev] ++
4,334,362 UART: [idev] CDI.KEYID = 6
4,335,421 UART: [idev] SUBJECT.KEYID = 7
4,336,529 UART: [idev] UDS.KEYID = 0
4,337,614 ready_for_fw is high
4,337,847 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,482,248 UART: [idev] Erasing UDS.KEYID = 0
7,623,992 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,493 UART: [idev] --
7,649,272 UART: [ldev] ++
7,649,840 UART: [ldev] CDI.KEYID = 6
7,650,804 UART: [ldev] SUBJECT.KEYID = 5
7,652,020 UART: [ldev] AUTHORITY.KEYID = 7
7,653,254 UART: [ldev] FE.KEYID = 1
7,662,821 UART: [ldev] Erasing FE.KEYID = 1
10,953,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,398 UART: [ldev] --
13,313,423 UART: [fwproc] Waiting for Commands...
13,315,037 UART: [fwproc] Received command 0x46574c44
13,317,236 UART: [fwproc] Received Image of size 114916 bytes
17,377,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,541 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,839,040 >>> mbox cmd response: success
17,842,823 UART: [afmc] ++
17,843,443 UART: [afmc] CDI.KEYID = 6
17,844,361 UART: [afmc] SUBJECT.KEYID = 7
17,845,580 UART: [afmc] AUTHORITY.KEYID = 5
21,162,447 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,432 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,759 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,612 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,029 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,678 UART: [afmc] --
23,528,606 UART: [cold-reset] --
23,531,508 UART: [state] Locking Datavault
23,534,599 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,295 UART: [state] Locking ICCM
23,538,982 UART: [exit] Launching FMC @ 0x40000130
23,547,321 UART:
23,547,558 UART: Running Caliptra FMC ...
23,548,658 UART:
23,548,818 UART: [state] CFI Enabled
23,556,703 UART: [fht] FMC Alias Private Key: 7
25,887,526 UART: [art] Extend RT PCRs Done
25,888,777 UART: [art] Lock RT PCRs Done
25,890,350 UART: [art] Populate DV Done
25,895,712 UART: [fht] FMC Alias Private Key: 7
25,897,359 UART: [art] Derive CDI
25,898,174 UART: [art] Store in in slot 0x4
25,940,883 UART: [art] Derive Key Pair
25,941,923 UART: [art] Store priv key in slot 0x5
29,183,455 UART: [art] Derive Key Pair - Done
29,196,949 UART: [art] Signing Cert with AUTHO
29,198,260 UART: RITY.KEYID = 7
31,477,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,173 UART: [art] PUB.X = D9FD1C4836F8DB097F3C222654FC8A711C41FE11248409DADE4705A2A709BB733E36CFA0558A664097A30C00E887C9BB
31,486,375 UART: [art] PUB.Y = EB5FA2588D142AA1EE1E7B94DE8323F83C8A0E4F50E8F264C4781E9AEDAD1068D5D95A40D0686C4C9F7E877248395022
31,493,670 UART: [art] SIG.R = 8F717F67633502F9D906D8580E88F2FB7BF1A474651B56E6B1664EF8AF687EA9F13658310D77DCF7F2B45BE33C6BE758
31,501,079 UART: [art] SIG.S = B29455F766F1CE72B16E7A63965A3BBA2114A11AE8DF2A57C2EF08B4A52B3743F8F41790F7FA046BD18D118756F11EA4
32,806,269 UART: Caliptra RT
32,807,009 UART: [state] CFI Enabled
32,924,331 UART: [rt] RT listening for mailbox commands...
32,926,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,955,931 UART: [rt]cmd =0x46504c54, len=4
32,957,614 >>> mbox cmd response data (8 bytes)
32,958,973 UART: [rt] FIPS self test
32,959,913 UART: [kat] ++
32,960,570 UART: [kat] sha1
32,964,772 UART: [kat] SHA2-256
32,966,713 UART: [kat] SHA2-384
32,969,624 UART: [kat] SHA2-512-ACC
32,971,916 UART: [kat] ECC-384
36,214,733 UART: [kat] HMAC-384Kdf
36,216,152 UART: Fatal Error: 0x90030001
36,251,457 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,395,667 >>> mbox cmd response: failed
36,396,322 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,540,565 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,146 UART:
190,443 UART: Running Caliptra ROM ...
191,498 UART:
3,989,650 UART: [state] CFI Enabled
4,003,159 UART: [state] LifecycleState = Unprovisioned
4,005,080 UART: [state] DebugLocked = No
4,007,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,013,351 UART: [kat] SHA2-256
4,183,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,193,640 UART: [kat] ++
4,194,100 UART: [kat] sha1
4,205,906 UART: [kat] SHA2-256
4,208,626 UART: [kat] SHA2-384
4,214,570 UART: [kat] SHA2-512-ACC
4,216,979 UART: [kat] ECC-384
6,502,402 UART: [kat] HMAC-384Kdf
6,514,245 UART: [kat] LMS
7,704,365 UART: [kat] --
7,709,722 UART: [cold-reset] ++
7,710,744 UART: [fht] Storing FHT @ 0x50003400
7,722,148 UART: [idev] ++
7,722,705 UART: [idev] CDI.KEYID = 6
7,723,641 UART: [idev] SUBJECT.KEYID = 7
7,724,911 UART: [idev] UDS.KEYID = 0
7,726,409 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
7,870,656 UART: [idev] Erasing UDS.KEYID = 0
11,007,076 UART: [idev] Using Sha1 for KeyId Algorithm
11,028,572 UART: [idev] --
11,032,049 UART: [ldev] ++
11,032,621 UART: [ldev] CDI.KEYID = 6
11,033,559 UART: [ldev] SUBJECT.KEYID = 5
11,034,832 UART: [ldev] AUTHORITY.KEYID = 7
11,035,983 UART: [ldev] FE.KEYID = 1
11,046,762 UART: [ldev] Erasing FE.KEYID = 1
14,333,211 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,627,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,642,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,657,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,671,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,691,226 UART: [ldev] --
16,696,278 UART: [fwproc] Waiting for Commands...
16,698,378 UART: [fwproc] Received command 0x46574c44
16,700,566 UART: [fwproc] Received Image of size 114916 bytes
20,762,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,840,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,909,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
21,228,989 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
4,128,340 ready_for_fw is high
4,128,923 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,097,321 >>> mbox cmd response: success
23,740,452 UART:
23,740,833 UART: Running Caliptra FMC ...
23,741,970 UART:
23,742,146 UART: [state] CFI Enabled
23,750,208 UART: [fht] FMC Alias Private Key: 7
26,080,727 UART: [art] Extend RT PCRs Done
26,081,961 UART: [art] Lock RT PCRs Done
26,083,783 UART: [art] Populate DV Done
26,089,096 UART: [fht] FMC Alias Private Key: 7
26,090,596 UART: [art] Derive CDI
26,091,363 UART: [art] Store in in slot 0x4
26,134,608 UART: [art] Derive Key Pair
26,135,609 UART: [art] Store priv key in slot 0x5
29,377,013 UART: [art] Derive Key Pair - Done
29,389,694 UART: [art] Signing Cert with AUTHO
29,390,998 UART: RITY.KEYID = 7
31,670,319 UART: [art] Erasing AUTHORITY.KEYID = 7
31,671,842 UART: [art] PUB.X = 5D180504A35DA14C1E17E735C251F9B7F62B1FF58A1A34FA278311C24D3C6F09CF1256080DF304996B886751EF23F232
31,679,105 UART: [art] PUB.Y = 89D716F0169A7ECAC40FA26824CEAC44DC58D892BD49AA500442F078E02573A02D6A4700F9FE0533276D936DE3415881
31,686,313 UART: [art] SIG.R = 0AEA857644F5CD72081F95453D832AC8F8F47D1E8D8534758BB07F4BB6F1EF4DD5865AA464932090A9C39BB71286871E
31,693,656 UART: [art] SIG.S = 6DE4D8638297DF8EAEFBB076ED5D18BCDC82F81127A324E5FABD1C5ABA63DCD4332CE6F4E13AB44AFA3A5A6EE12C9E2E
32,998,679 UART: Caliptra RT
32,999,385 UART: [state] CFI Enabled
33,117,116 UART: [rt] RT listening for mailbox commands...
33,118,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,148,907 UART: [rt]cmd =0x46504c54, len=4
33,150,491 >>> mbox cmd response data (8 bytes)
33,151,642 UART: [rt] FIPS self test
33,152,585 UART: [kat] ++
33,153,036 UART: [kat] sha1
33,157,552 UART: [kat] SHA2-256
33,159,428 UART: [kat] SHA2-384
33,162,495 UART: [kat] SHA2-512-ACC
33,164,737 UART: [kat] ECC-384
36,407,493 UART: [kat] HMAC-384Kdf
36,408,998 UART: Fatal Error: 0x90030001
36,444,228 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,588,598 >>> mbox cmd response: failed
36,589,244 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,733,485 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
7,321,624 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
21,281,115 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,320 UART:
192,699 UART: Running Caliptra ROM ...
193,927 UART:
194,083 UART: [state] CFI Enabled
259,387 UART: [state] LifecycleState = Unprovisioned
261,213 UART: [state] DebugLocked = No
263,242 UART: [state] WD Timer not started. Device not locked for debugging
267,496 UART: [kat] SHA2-256
446,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,157 UART: [kat] ++
458,609 UART: [kat] sha1
468,633 UART: [kat] SHA2-256
471,649 UART: [kat] SHA2-384
477,952 UART: [kat] SHA2-512-ACC
480,906 UART: [kat] ECC-384
2,925,044 UART: [kat] HMAC-384Kdf
2,947,937 UART: [kat] LMS
3,477,429 UART: [kat] --
3,482,285 UART: [cold-reset] ++
3,483,795 UART: [fht] FHT @ 0x50003400
3,494,563 UART: [idev] ++
3,495,128 UART: [idev] CDI.KEYID = 6
3,496,128 UART: [idev] SUBJECT.KEYID = 7
3,497,302 UART: [idev] UDS.KEYID = 0
3,498,211 ready_for_fw is high
3,498,439 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,643,433 UART: [idev] Erasing UDS.KEYID = 0
5,999,546 UART: [idev] Sha1 KeyId Algorithm
6,023,842 UART: [idev] --
6,026,870 UART: [ldev] ++
6,027,461 UART: [ldev] CDI.KEYID = 6
6,028,380 UART: [ldev] SUBJECT.KEYID = 5
6,029,544 UART: [ldev] AUTHORITY.KEYID = 7
6,030,783 UART: [ldev] FE.KEYID = 1
6,076,972 UART: [ldev] Erasing FE.KEYID = 1
8,578,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,807 UART: [ldev] --
10,388,151 UART: [fwproc] Wait for Commands...
10,391,379 UART: [fwproc] Recv command 0x46574c44
10,393,469 UART: [fwproc] Recv'd Img size: 115224 bytes
13,812,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,027 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,278,774 >>> mbox cmd response: success
14,282,960 UART: [afmc] ++
14,283,550 UART: [afmc] CDI.KEYID = 6
14,284,461 UART: [afmc] SUBJECT.KEYID = 7
14,285,619 UART: [afmc] AUTHORITY.KEYID = 5
16,826,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,334 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,988 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,902 UART: [afmc] --
18,625,956 UART: [cold-reset] --
18,630,138 UART: [state] Locking Datavault
18,635,135 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,790 UART: [state] Locking ICCM
18,639,158 UART: [exit] Launching FMC @ 0x40000130
18,647,557 UART:
18,647,789 UART: Running Caliptra FMC ...
18,648,893 UART:
18,649,055 UART: [state] CFI Enabled
18,710,601 UART: [fht] FMC Alias Private Key: 7
20,474,762 UART: [art] Extend RT PCRs Done
20,475,986 UART: [art] Lock RT PCRs Done
20,477,799 UART: [art] Populate DV Done
20,483,106 UART: [fht] FMC Alias Private Key: 7
20,484,601 UART: [art] Derive CDI
20,485,367 UART: [art] Store in in slot 0x4
20,543,393 UART: [art] Derive Key Pair
20,544,436 UART: [art] Store priv key in slot 0x5
23,008,382 UART: [art] Derive Key Pair - Done
23,021,436 UART: [art] Signing Cert with AUTHO
23,022,750 UART: RITY.KEYID = 7
24,733,871 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,524 UART: [art] PUB.X = C2FC63727453FBB674E95AFA0C3E35998B1A6FB73EAF90DDF2C343F426B4E13C7A8389A7EA88089F8F4559A57057A27F
24,742,634 UART: [art] PUB.Y = 921A9A2876AF098CB384C12450463657D3A7164A8E4E649CF922AFF947C02FA042D3689AE292C40523334F58568A066F
24,749,880 UART: [art] SIG.R = 90A5AA61AFDF24D1889A80F98D4807D118671DD3606860EF158771EDC5673D8520DFDB7778FA2BFE68E5F48240D1BADB
24,757,273 UART: [art] SIG.S = 396A2759C33643419014F33CEF3F8D12229E09C212848BA936D85FA76BADD219AF51E7F6D8F5DA8952CD973BF2ED8C16
25,736,229 UART: Caliptra RT
25,736,945 UART: [state] CFI Enabled
25,900,221 UART: [rt] RT listening for mailbox commands...
25,902,070 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,931,691 UART: [rt]cmd =0x46504c54, len=4
25,933,485 >>> mbox cmd response data (8 bytes)
25,934,444 UART: [rt] FIPS self test
25,935,592 UART: [kat] ++
25,936,067 UART: [kat] sha1
25,940,369 UART: [kat] SHA2-256
25,942,297 UART: [kat] SHA2-384
25,945,321 UART: [kat] SHA2-512-ACC
25,947,612 UART: [kat] ECC-384
28,386,689 UART: [kat] HMAC-384Kdf
28,387,845 UART: Fatal Error: 0x90030001
28,423,239 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,567,894 >>> mbox cmd response: failed
28,568,561 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,713,190 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,067 UART:
190,363 UART: Running Caliptra ROM ...
191,476 UART:
191,649 UART: [state] CFI Enabled
261,836 UART: [state] LifecycleState = Unprovisioned
263,694 UART: [state] DebugLocked = No
266,635 UART: [state] WD Timer not started. Device not locked for debugging
270,473 UART: [kat] SHA2-256
449,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,167 UART: [kat] ++
461,700 UART: [kat] sha1
471,993 UART: [kat] SHA2-256
474,999 UART: [kat] SHA2-384
481,735 UART: [kat] SHA2-512-ACC
484,720 UART: [kat] ECC-384
2,948,227 UART: [kat] HMAC-384Kdf
2,970,715 UART: [kat] LMS
3,500,198 UART: [kat] --
3,504,350 UART: [cold-reset] ++
3,505,222 UART: [fht] FHT @ 0x50003400
3,516,282 UART: [idev] ++
3,516,849 UART: [idev] CDI.KEYID = 6
3,517,786 UART: [idev] SUBJECT.KEYID = 7
3,518,997 UART: [idev] UDS.KEYID = 0
3,520,496 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,665,471 UART: [idev] Erasing UDS.KEYID = 0
6,027,145 UART: [idev] Sha1 KeyId Algorithm
6,049,621 UART: [idev] --
6,054,323 UART: [ldev] ++
6,054,896 UART: [ldev] CDI.KEYID = 6
6,055,779 UART: [ldev] SUBJECT.KEYID = 5
6,056,995 UART: [ldev] AUTHORITY.KEYID = 7
6,058,231 UART: [ldev] FE.KEYID = 1
6,099,530 UART: [ldev] Erasing FE.KEYID = 1
8,604,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,776 UART: [ldev] --
10,411,038 UART: [fwproc] Wait for Commands...
10,412,659 UART: [fwproc] Recv command 0x46574c44
10,414,763 UART: [fwproc] Recv'd Img size: 115224 bytes
13,819,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,760 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,284,455 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,038 UART:
192,401 UART: Running Caliptra ROM ...
193,603 UART:
193,758 UART: [state] CFI Enabled
262,555 UART: [state] LifecycleState = Unprovisioned
264,972 UART: [state] DebugLocked = No
267,085 UART: [state] WD Timer not started. Device not locked for debugging
272,201 UART: [kat] SHA2-256
462,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,806 UART: [kat] ++
473,319 UART: [kat] sha1
485,976 UART: [kat] SHA2-256
488,997 UART: [kat] SHA2-384
495,565 UART: [kat] SHA2-512-ACC
498,157 UART: [kat] ECC-384
2,949,841 UART: [kat] HMAC-384Kdf
2,972,979 UART: [kat] LMS
3,504,771 UART: [kat] --
3,510,192 UART: [cold-reset] ++
3,512,133 UART: [fht] FHT @ 0x50003400
3,523,193 UART: [idev] ++
3,523,840 UART: [idev] CDI.KEYID = 6
3,524,883 UART: [idev] SUBJECT.KEYID = 7
3,525,989 UART: [idev] UDS.KEYID = 0
3,526,892 ready_for_fw is high
3,527,170 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,672,197 UART: [idev] Erasing UDS.KEYID = 0
6,030,462 UART: [idev] Sha1 KeyId Algorithm
6,054,035 UART: [idev] --
6,059,211 UART: [ldev] ++
6,059,904 UART: [ldev] CDI.KEYID = 6
6,060,835 UART: [ldev] SUBJECT.KEYID = 5
6,061,996 UART: [ldev] AUTHORITY.KEYID = 7
6,063,229 UART: [ldev] FE.KEYID = 1
6,101,265 UART: [ldev] Erasing FE.KEYID = 1
8,610,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,904 UART: [ldev] --
10,415,464 UART: [fwproc] Wait for Commands...
10,417,191 UART: [fwproc] Recv command 0x46574c44
10,419,449 UART: [fwproc] Recv'd Img size: 115224 bytes
13,874,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,469 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,619,860 >>> mbox cmd response: success
14,624,199 UART: [afmc] ++
14,624,914 UART: [afmc] CDI.KEYID = 6
14,626,101 UART: [afmc] SUBJECT.KEYID = 7
14,627,535 UART: [afmc] AUTHORITY.KEYID = 5
17,148,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,420 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,943 UART: [afmc] --
18,952,605 UART: [cold-reset] --
18,956,852 UART: [state] Locking Datavault
18,962,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,946 UART: [state] Locking ICCM
18,967,053 UART: [exit] Launching FMC @ 0x40000130
18,975,734 UART:
18,975,971 UART: Running Caliptra FMC ...
18,977,082 UART:
18,977,249 UART: [state] CFI Enabled
19,033,184 UART: [fht] FMC Alias Private Key: 7
20,797,091 UART: [art] Extend RT PCRs Done
20,798,321 UART: [art] Lock RT PCRs Done
20,799,678 UART: [art] Populate DV Done
20,805,098 UART: [fht] FMC Alias Private Key: 7
20,806,768 UART: [art] Derive CDI
20,807,595 UART: [art] Store in in slot 0x4
20,866,002 UART: [art] Derive Key Pair
20,867,052 UART: [art] Store priv key in slot 0x5
23,330,425 UART: [art] Derive Key Pair - Done
23,343,167 UART: [art] Signing Cert with AUTHO
23,344,475 UART: RITY.KEYID = 7
25,055,975 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,476 UART: [art] PUB.X = A90B2045C311B189C45A64AE76DCAC03A5A9F821DCAE50AEE0E125BA594A32CF6EE7D078A577C75AFBED436FA5B1FC0A
25,064,790 UART: [art] PUB.Y = 89E8FDA59964030124AC646ADB5B04D3E93465F9288E19312EE14EDD7135042E5AAE2AFEB7F7FAB1ED2388B1FABA35C1
25,072,096 UART: [art] SIG.R = 20F706433B2D8C6F2F1A528E23380E887F9945572CB3D48ED166C5842BA56498F5F45C571F89B1766F51B2F1D8FFEB22
25,079,473 UART: [art] SIG.S = 4BAD044B72D7604B27FE2A88A1D6B27FFDAE7677D2370D043F782A6DA88ADD5DBEA782BD09D916EE25C20BCCD70C76EE
26,058,527 UART: Caliptra RT
26,059,247 UART: [state] CFI Enabled
26,224,156 UART: [rt] RT listening for mailbox commands...
26,226,010 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,255,611 UART: [rt]cmd =0x46504c54, len=4
26,257,143 >>> mbox cmd response data (8 bytes)
26,258,041 UART: [rt] FIPS self test
26,258,986 UART: [kat] ++
26,259,433 UART: [kat] sha1
26,263,722 UART: [kat] SHA2-256
26,265,660 UART: [kat] SHA2-384
26,268,706 UART: [kat] SHA2-512-ACC
26,270,990 UART: [kat] ECC-384
28,710,408 UART: [kat] HMAC-384Kdf
28,711,730 UART: Fatal Error: 0x90030001
28,746,965 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,891,675 >>> mbox cmd response: failed
28,892,274 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,036,909 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
190,023 UART:
190,321 UART: Running Caliptra ROM ...
191,349 UART:
191,489 UART: [state] CFI Enabled
262,850 UART: [state] LifecycleState = Unprovisioned
265,268 UART: [state] DebugLocked = No
268,181 UART: [state] WD Timer not started. Device not locked for debugging
273,445 UART: [kat] SHA2-256
463,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,110 UART: [kat] ++
474,592 UART: [kat] sha1
486,660 UART: [kat] SHA2-256
489,667 UART: [kat] SHA2-384
494,244 UART: [kat] SHA2-512-ACC
496,860 UART: [kat] ECC-384
2,942,927 UART: [kat] HMAC-384Kdf
2,968,550 UART: [kat] LMS
3,500,350 UART: [kat] --
3,505,434 UART: [cold-reset] ++
3,507,370 UART: [fht] FHT @ 0x50003400
3,519,754 UART: [idev] ++
3,520,439 UART: [idev] CDI.KEYID = 6
3,521,410 UART: [idev] SUBJECT.KEYID = 7
3,522,634 UART: [idev] UDS.KEYID = 0
3,524,203 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,049 UART: [idev] Erasing UDS.KEYID = 0
6,024,894 UART: [idev] Sha1 KeyId Algorithm
6,046,931 UART: [idev] --
6,051,664 UART: [ldev] ++
6,052,358 UART: [ldev] CDI.KEYID = 6
6,053,253 UART: [ldev] SUBJECT.KEYID = 5
6,054,446 UART: [ldev] AUTHORITY.KEYID = 7
6,055,631 UART: [ldev] FE.KEYID = 1
6,098,310 UART: [ldev] Erasing FE.KEYID = 1
8,605,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,130 UART: [ldev] --
10,413,968 UART: [fwproc] Wait for Commands...
10,416,229 UART: [fwproc] Recv command 0x46574c44
10,418,546 UART: [fwproc] Recv'd Img size: 115224 bytes
13,879,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,073,486 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,621,546 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,439,097 ready_for_fw is high
3,439,543 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,756,573 >>> mbox cmd response: success
19,046,408 UART:
19,046,812 UART: Running Caliptra FMC ...
19,047,939 UART:
19,048,094 UART: [state] CFI Enabled
19,113,882 UART: [fht] FMC Alias Private Key: 7
20,877,985 UART: [art] Extend RT PCRs Done
20,879,217 UART: [art] Lock RT PCRs Done
20,880,600 UART: [art] Populate DV Done
20,886,019 UART: [fht] FMC Alias Private Key: 7
20,887,622 UART: [art] Derive CDI
20,888,558 UART: [art] Store in in slot 0x4
20,946,921 UART: [art] Derive Key Pair
20,947,932 UART: [art] Store priv key in slot 0x5
23,411,245 UART: [art] Derive Key Pair - Done
23,424,411 UART: [art] Signing Cert with AUTHO
23,425,739 UART: RITY.KEYID = 7
25,137,218 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,726 UART: [art] PUB.X = B47928976107988C78592ECA4AD83850BA0B73FE3866AC7FEFBB1444BBC58A4E133F4FF6EA037CDA62656CE80D130DD7
25,146,048 UART: [art] PUB.Y = 871AC5B09AF0C1F04F96BA9C9FDF9BC6828C7D7C877ECEB42CB53D311BD29E1EE57566E9DE94BDE4238453D9502BC658
25,153,275 UART: [art] SIG.R = 7B60CAE528A7CD70495BACA28E628CE02949C166DE60E3011FCC225C0936BCF29B7C10A2902B4E24F22149C055FA9D51
25,160,684 UART: [art] SIG.S = C1A6F9CDBBD80E4F2C16E9628F82D467A454D89118D88F99AD743596D993784660FDC47D90800C52B01F9A24DB3575B6
26,139,955 UART: Caliptra RT
26,140,643 UART: [state] CFI Enabled
26,306,252 UART: [rt] RT listening for mailbox commands...
26,308,114 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,875 UART: [rt]cmd =0x46504c54, len=4
26,339,459 >>> mbox cmd response data (8 bytes)
26,340,317 UART: [rt] FIPS self test
26,341,266 UART: [kat] ++
26,341,719 UART: [kat] sha1
26,346,209 UART: [kat] SHA2-256
26,348,109 UART: [kat] SHA2-384
26,351,233 UART: [kat] SHA2-512-ACC
26,353,498 UART: [kat] ECC-384
28,790,640 UART: [kat] HMAC-384Kdf
28,792,168 UART: Fatal Error: 0x90030001
28,827,557 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,972,299 >>> mbox cmd response: failed
28,972,969 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,117,457 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,436,164 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,745,888 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,472 UART:
192,838 UART: Running Caliptra ROM ...
193,976 UART:
603,530 UART: [state] CFI Enabled
617,986 UART: [state] LifecycleState = Unprovisioned
620,314 UART: [state] DebugLocked = No
622,135 UART: [state] WD Timer not started. Device not locked for debugging
626,680 UART: [kat] SHA2-256
816,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,335 UART: [kat] ++
827,948 UART: [kat] sha1
839,546 UART: [kat] SHA2-256
842,571 UART: [kat] SHA2-384
848,139 UART: [kat] SHA2-512-ACC
850,733 UART: [kat] ECC-384
3,293,886 UART: [kat] HMAC-384Kdf
3,307,554 UART: [kat] LMS
3,839,443 UART: [kat] --
3,844,011 UART: [cold-reset] ++
3,845,101 UART: [fht] FHT @ 0x50003400
3,856,093 UART: [idev] ++
3,856,807 UART: [idev] CDI.KEYID = 6
3,857,721 UART: [idev] SUBJECT.KEYID = 7
3,858,968 UART: [idev] UDS.KEYID = 0
3,859,894 ready_for_fw is high
3,860,095 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,004,800 UART: [idev] Erasing UDS.KEYID = 0
6,332,824 UART: [idev] Sha1 KeyId Algorithm
6,355,911 UART: [idev] --
6,360,724 UART: [ldev] ++
6,361,409 UART: [ldev] CDI.KEYID = 6
6,362,319 UART: [ldev] SUBJECT.KEYID = 5
6,363,480 UART: [ldev] AUTHORITY.KEYID = 7
6,364,713 UART: [ldev] FE.KEYID = 1
6,376,561 UART: [ldev] Erasing FE.KEYID = 1
8,853,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,900 UART: [ldev] --
10,643,609 UART: [fwproc] Wait for Commands...
10,645,342 UART: [fwproc] Recv command 0x46574c44
10,647,604 UART: [fwproc] Recv'd Img size: 115224 bytes
14,107,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,821 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,850,317 >>> mbox cmd response: success
14,855,222 UART: [afmc] ++
14,855,920 UART: [afmc] CDI.KEYID = 6
14,857,109 UART: [afmc] SUBJECT.KEYID = 7
14,858,594 UART: [afmc] AUTHORITY.KEYID = 5
17,363,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,087,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,089,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,104,786 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,119,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,134,895 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,158,170 UART: [afmc] --
19,162,578 UART: [cold-reset] --
19,166,081 UART: [state] Locking Datavault
19,173,816 UART: [state] Locking PCR0, PCR1 and PCR31
19,175,995 UART: [state] Locking ICCM
19,177,537 UART: [exit] Launching FMC @ 0x40000130
19,186,206 UART:
19,186,484 UART: Running Caliptra FMC ...
19,187,510 UART:
19,187,658 UART: [state] CFI Enabled
19,195,893 UART: [fht] FMC Alias Private Key: 7
20,952,616 UART: [art] Extend RT PCRs Done
20,953,833 UART: [art] Lock RT PCRs Done
20,955,188 UART: [art] Populate DV Done
20,960,451 UART: [fht] FMC Alias Private Key: 7
20,962,110 UART: [art] Derive CDI
20,962,932 UART: [art] Store in in slot 0x4
21,005,259 UART: [art] Derive Key Pair
21,006,315 UART: [art] Store priv key in slot 0x5
23,433,207 UART: [art] Derive Key Pair - Done
23,446,433 UART: [art] Signing Cert with AUTHO
23,447,742 UART: RITY.KEYID = 7
25,153,793 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,290 UART: [art] PUB.X = 4C1272AC21564F508BEF18272546F444FBA293BD548DF72EB6EAD9A7FB4021D554053A0465BB57DF7EB0E8E75DA48719
25,162,596 UART: [art] PUB.Y = 462C5A675F1859D35FD7769F16DB0BF7016DB377B1A1E552A47D8EEAB36CB7B4B05B587FE733A5DB81D71D9A15E9DD9C
25,169,829 UART: [art] SIG.R = 92FCFF55C902C7092920ADAC533CA5E370EA5385948B6BC1569CA4E5972A06AD10F8A3EF257B7B7C56157B385CDD9BA7
25,177,282 UART: [art] SIG.S = 76E94A6CE31E6815FA8C713672237D4BD3FE0344F9894F95D10F991BBFC6BDC572B9A5C8E3C7A6280FBBB437FF23D12A
26,156,438 UART: Caliptra RT
26,157,153 UART: [state] CFI Enabled
26,274,212 UART: [rt] RT listening for mailbox commands...
26,276,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,305,640 UART: [rt]cmd =0x46504c54, len=4
26,307,248 >>> mbox cmd response data (8 bytes)
26,308,317 UART: [rt] FIPS self test
26,309,281 UART: [kat] ++
26,309,735 UART: [kat] sha1
26,314,296 UART: [kat] SHA2-256
26,316,225 UART: [kat] SHA2-384
26,319,338 UART: [kat] SHA2-512-ACC
26,321,626 UART: [kat] ECC-384
28,748,975 UART: [kat] HMAC-384Kdf
28,750,264 UART: Fatal Error: 0x90030001
28,785,648 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,930,244 >>> mbox cmd response: failed
28,930,903 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,075,527 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,114 UART:
190,406 UART: Running Caliptra ROM ...
191,452 UART:
11,460,260 UART: [state] CFI Enabled
11,475,986 UART: [state] LifecycleState = Unprovisioned
11,478,362 UART: [state] DebugLocked = No
11,480,616 UART: [state] WD Timer not started. Device not locked for debugging
11,484,953 UART: [kat] SHA2-256
11,674,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,685,627 UART: [kat] ++
11,686,220 UART: [kat] sha1
11,698,783 UART: [kat] SHA2-256
11,701,796 UART: [kat] SHA2-384
11,707,302 UART: [kat] SHA2-512-ACC
11,709,870 UART: [kat] ECC-384
14,149,086 UART: [kat] HMAC-384Kdf
14,161,648 UART: [kat] LMS
14,693,485 UART: [kat] --
14,698,130 UART: [cold-reset] ++
14,699,788 UART: [fht] FHT @ 0x50003400
14,710,927 UART: [idev] ++
14,711,597 UART: [idev] CDI.KEYID = 6
14,712,534 UART: [idev] SUBJECT.KEYID = 7
14,713,741 UART: [idev] UDS.KEYID = 0
14,715,234 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,859,892 UART: [idev] Erasing UDS.KEYID = 0
17,190,241 UART: [idev] Sha1 KeyId Algorithm
17,211,640 UART: [idev] --
17,215,962 UART: [ldev] ++
17,216,651 UART: [ldev] CDI.KEYID = 6
17,217,559 UART: [ldev] SUBJECT.KEYID = 5
17,218,772 UART: [ldev] AUTHORITY.KEYID = 7
17,219,950 UART: [ldev] FE.KEYID = 1
17,229,952 UART: [ldev] Erasing FE.KEYID = 1
19,710,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,432,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,448,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,463,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,478,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,500,349 UART: [ldev] --
21,505,015 UART: [fwproc] Wait for Commands...
21,506,899 UART: [fwproc] Recv command 0x46574c44
21,509,156 UART: [fwproc] Recv'd Img size: 115224 bytes
24,963,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,038,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,155,045 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
25,702,919 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,748 writing to cptra_bootfsm_go
3,755,423 ready_for_fw is high
3,755,857 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,989,762 >>> mbox cmd response: success
19,241,698 UART:
19,242,093 UART: Running Caliptra FMC ...
19,243,216 UART:
19,243,368 UART: [state] CFI Enabled
19,251,586 UART: [fht] FMC Alias Private Key: 7
21,008,059 UART: [art] Extend RT PCRs Done
21,009,300 UART: [art] Lock RT PCRs Done
21,011,181 UART: [art] Populate DV Done
21,016,660 UART: [fht] FMC Alias Private Key: 7
21,018,211 UART: [art] Derive CDI
21,018,950 UART: [art] Store in in slot 0x4
21,062,091 UART: [art] Derive Key Pair
21,063,141 UART: [art] Store priv key in slot 0x5
23,489,641 UART: [art] Derive Key Pair - Done
23,502,436 UART: [art] Signing Cert with AUTHO
23,503,739 UART: RITY.KEYID = 7
25,209,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,651 UART: [art] PUB.X = 2C20C4B33F720BA4812F6B0314953737635D6088D4DBE862842EEC9109422697E8442FA4DB7AE20980FB2FCDFB227971
25,217,907 UART: [art] PUB.Y = F519DBA26EBE95C5BD9EC3B8285FBB2912F13C28195B0DC8D1072A2899D63B2F9CF4AC50AD6F0706B39A1AD5CD58160F
25,225,168 UART: [art] SIG.R = 019BE4D55523CBD0043863AC1BB3430D0A418DB676D35BBB44DF49604217A57B7F39B7217023A7A1D3E25FA75702CB83
25,232,577 UART: [art] SIG.S = 55945B9D5393183EAD2909557906BF2928392D98FA873307CDC4708BAB04ACDC02B890B945505A0EE81A7E7820663045
26,211,485 UART: Caliptra RT
26,212,197 UART: [state] CFI Enabled
26,329,403 UART: [rt] RT listening for mailbox commands...
26,331,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,361,037 UART: [rt]cmd =0x46504c54, len=4
26,362,561 >>> mbox cmd response data (8 bytes)
26,363,604 UART: [rt] FIPS self test
26,364,551 UART: [kat] ++
26,365,007 UART: [kat] sha1
26,369,631 UART: [kat] SHA2-256
26,371,567 UART: [kat] SHA2-384
26,374,366 UART: [kat] SHA2-512-ACC
26,376,612 UART: [kat] ECC-384
28,804,132 UART: [kat] HMAC-384Kdf
28,805,501 UART: Fatal Error: 0x90030001
28,840,729 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,985,449 >>> mbox cmd response: failed
28,986,090 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,130,724 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
14,545,322 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
25,749,470 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,557 UART: [kat] SHA2-256
881,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,603 UART: [kat] ++
885,755 UART: [kat] sha1
890,011 UART: [kat] SHA2-256
891,949 UART: [kat] SHA2-384
894,612 UART: [kat] SHA2-512-ACC
896,513 UART: [kat] ECC-384
902,302 UART: [kat] HMAC-384Kdf
906,790 UART: [kat] LMS
1,474,986 UART: [kat] --
1,475,673 UART: [cold-reset] ++
1,476,121 UART: [fht] Storing FHT @ 0x50003400
1,479,004 UART: [idev] ++
1,479,172 UART: [idev] CDI.KEYID = 6
1,479,532 UART: [idev] SUBJECT.KEYID = 7
1,479,956 UART: [idev] UDS.KEYID = 0
1,480,301 ready_for_fw is high
1,480,301 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,952 UART: [idev] Erasing UDS.KEYID = 0
1,504,496 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,144 UART: [idev] --
1,514,319 UART: [ldev] ++
1,514,487 UART: [ldev] CDI.KEYID = 6
1,514,850 UART: [ldev] SUBJECT.KEYID = 5
1,515,276 UART: [ldev] AUTHORITY.KEYID = 7
1,515,739 UART: [ldev] FE.KEYID = 1
1,520,805 UART: [ldev] Erasing FE.KEYID = 1
1,545,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,256 UART: [ldev] --
1,584,747 UART: [fwproc] Waiting for Commands...
1,585,540 UART: [fwproc] Received command 0x46574c44
1,586,331 UART: [fwproc] Received Image of size 115224 bytes
2,893,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,136 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,087,695 >>> mbox cmd response: success
3,088,925 UART: [afmc] ++
3,089,093 UART: [afmc] CDI.KEYID = 6
3,089,455 UART: [afmc] SUBJECT.KEYID = 7
3,089,880 UART: [afmc] AUTHORITY.KEYID = 5
3,124,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,439 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,832 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,522 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,299 UART: [afmc] --
3,167,197 UART: [cold-reset] --
3,167,819 UART: [state] Locking Datavault
3,169,054 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,658 UART: [state] Locking ICCM
3,170,226 UART: [exit] Launching FMC @ 0x40000130
3,175,555 UART:
3,175,571 UART: Running Caliptra FMC ...
3,175,979 UART:
3,176,033 UART: [state] CFI Enabled
3,186,332 UART: [fht] FMC Alias Private Key: 7
3,294,067 UART: [art] Extend RT PCRs Done
3,294,495 UART: [art] Lock RT PCRs Done
3,296,279 UART: [art] Populate DV Done
3,304,488 UART: [fht] FMC Alias Private Key: 7
3,305,626 UART: [art] Derive CDI
3,305,906 UART: [art] Store in in slot 0x4
3,391,429 UART: [art] Derive Key Pair
3,391,789 UART: [art] Store priv key in slot 0x5
3,405,081 UART: [art] Derive Key Pair - Done
3,419,760 UART: [art] Signing Cert with AUTHO
3,420,240 UART: RITY.KEYID = 7
3,435,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,289 UART: [art] PUB.X = 5EF69F95BAF4805ECA13B817D4AB31780BFAAFBD489742BB28A4779BB46E204A9CBB1978C6AFC03D90FF4A6764853831
3,443,070 UART: [art] PUB.Y = 3EDB5DE3F4BD37CA8AFE2E1ACCCB4EF33504381A177E0E5602BE032C47F7806EF376CEAE2FA4AF4802599FEF047AC61B
3,450,028 UART: [art] SIG.R = C0FB9293B84C2CB85B59F842F53B6660AF15567B1B472B6E2E4CB56E946BD774A1C1C8E6C28EBDE8A9867D55556BF69B
3,456,810 UART: [art] SIG.S = A3DC51FD4F47F3015B8EA98D1FD6ECB34DF4713FEA4190D85F723292E752B868F530BE3732F8BD4AF49D8B454A5A9A90
3,480,694 UART: Caliptra RT
3,480,948 UART: [state] CFI Enabled
3,589,287 UART: [rt] RT listening for mailbox commands...
3,589,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,408 UART: [rt]cmd =0x46504c54, len=4
3,620,640 >>> mbox cmd response data (8 bytes)
3,620,843 UART: [rt] FIPS self test
3,621,171 UART: [kat] ++
3,621,323 UART: [kat] sha1
3,625,495 UART: [kat] SHA2-256
3,627,517 UART: [kat] SHA2-384
3,630,544 UART: [kat] SHA2-512-ACC
3,632,471 UART: [kat] ECC-384
3,642,419 UART: [kat] HMAC-384Kdf
3,643,417 UART: Fatal Error: 0x90030001
3,644,967 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,644,972 >>> mbox cmd response: failed
3,644,972 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,644,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,435 UART: [kat] SHA2-256
882,366 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,481 UART: [kat] ++
886,633 UART: [kat] sha1
890,917 UART: [kat] SHA2-256
892,855 UART: [kat] SHA2-384
895,648 UART: [kat] SHA2-512-ACC
897,549 UART: [kat] ECC-384
903,322 UART: [kat] HMAC-384Kdf
907,862 UART: [kat] LMS
1,476,058 UART: [kat] --
1,476,777 UART: [cold-reset] ++
1,477,339 UART: [fht] Storing FHT @ 0x50003400
1,480,096 UART: [idev] ++
1,480,264 UART: [idev] CDI.KEYID = 6
1,480,624 UART: [idev] SUBJECT.KEYID = 7
1,481,048 UART: [idev] UDS.KEYID = 0
1,481,393 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,898 UART: [idev] Erasing UDS.KEYID = 0
1,505,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,952 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,443 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,770 UART: [ldev] --
1,586,187 UART: [fwproc] Waiting for Commands...
1,586,914 UART: [fwproc] Received command 0x46574c44
1,587,705 UART: [fwproc] Received Image of size 115224 bytes
2,895,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,070 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,422 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,665 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 ready_for_fw is high
1,362,443 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,149 >>> mbox cmd response: success
2,999,245 UART:
2,999,261 UART: Running Caliptra FMC ...
2,999,669 UART:
2,999,723 UART: [state] CFI Enabled
3,010,126 UART: [fht] FMC Alias Private Key: 7
3,118,185 UART: [art] Extend RT PCRs Done
3,118,613 UART: [art] Lock RT PCRs Done
3,119,969 UART: [art] Populate DV Done
3,128,036 UART: [fht] FMC Alias Private Key: 7
3,128,970 UART: [art] Derive CDI
3,129,250 UART: [art] Store in in slot 0x4
3,214,951 UART: [art] Derive Key Pair
3,215,311 UART: [art] Store priv key in slot 0x5
3,228,409 UART: [art] Derive Key Pair - Done
3,243,216 UART: [art] Signing Cert with AUTHO
3,243,696 UART: RITY.KEYID = 7
3,259,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,941 UART: [art] PUB.X = 22CF5E7E04F7AA06D92267D68C592E8C61AF8A0D52D4394797FE72262C42EBE71356834CA1B765761B8D62F1FA0BF149
3,266,703 UART: [art] PUB.Y = 6D64A7918D1897137E120ABA45368771A8BB5589A5E11107892592F346AD280B563DC8D22511FA6B895B6E1A897F1F5D
3,273,638 UART: [art] SIG.R = 7C081466E1B795E9EFA191441A88748985823FB0D3AD9EE827148EA823938BE8E6DC0029FD84DDA20EE848821D13CB6F
3,280,384 UART: [art] SIG.S = A6CFCB76BF22F03BDCFEF57158811C8A1F41877931BE5C298516D5751AB92F174FC9FB66D156B8EBED7FDE36BBD8714C
3,304,653 UART: Caliptra RT
3,304,907 UART: [state] CFI Enabled
3,413,409 UART: [rt] RT listening for mailbox commands...
3,414,072 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,676 UART: [rt]cmd =0x46504c54, len=4
3,444,652 >>> mbox cmd response data (8 bytes)
3,444,765 UART: [rt] FIPS self test
3,445,093 UART: [kat] ++
3,445,245 UART: [kat] sha1
3,449,653 UART: [kat] SHA2-256
3,451,675 UART: [kat] SHA2-384
3,454,412 UART: [kat] SHA2-512-ACC
3,456,339 UART: [kat] ECC-384
3,466,163 UART: [kat] HMAC-384Kdf
3,467,195 UART: Fatal Error: 0x90030001
3,468,745 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,468,750 >>> mbox cmd response: failed
3,468,750 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,468,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,803 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,937,919 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
902,735 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,368 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,575 UART: [idev] ++
1,479,743 UART: [idev] CDI.KEYID = 6
1,480,103 UART: [idev] SUBJECT.KEYID = 7
1,480,527 UART: [idev] UDS.KEYID = 0
1,480,872 ready_for_fw is high
1,480,872 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,737 UART: [idev] --
1,514,846 UART: [ldev] ++
1,515,014 UART: [ldev] CDI.KEYID = 6
1,515,377 UART: [ldev] SUBJECT.KEYID = 5
1,515,803 UART: [ldev] AUTHORITY.KEYID = 7
1,516,266 UART: [ldev] FE.KEYID = 1
1,521,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,255 UART: [ldev] --
1,586,668 UART: [fwproc] Waiting for Commands...
1,587,311 UART: [fwproc] Received command 0x46574c44
1,588,102 UART: [fwproc] Received Image of size 115224 bytes
2,896,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,932 >>> mbox cmd response: success
3,092,076 UART: [afmc] ++
3,092,244 UART: [afmc] CDI.KEYID = 6
3,092,606 UART: [afmc] SUBJECT.KEYID = 7
3,093,031 UART: [afmc] AUTHORITY.KEYID = 5
3,128,304 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,636 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,029 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,719 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,660 UART: [afmc] --
3,171,602 UART: [cold-reset] --
3,172,702 UART: [state] Locking Datavault
3,173,787 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,391 UART: [state] Locking ICCM
3,175,051 UART: [exit] Launching FMC @ 0x40000130
3,180,380 UART:
3,180,396 UART: Running Caliptra FMC ...
3,180,804 UART:
3,180,947 UART: [state] CFI Enabled
3,192,146 UART: [fht] FMC Alias Private Key: 7
3,300,481 UART: [art] Extend RT PCRs Done
3,300,909 UART: [art] Lock RT PCRs Done
3,302,731 UART: [art] Populate DV Done
3,310,974 UART: [fht] FMC Alias Private Key: 7
3,312,118 UART: [art] Derive CDI
3,312,398 UART: [art] Store in in slot 0x4
3,397,805 UART: [art] Derive Key Pair
3,398,165 UART: [art] Store priv key in slot 0x5
3,411,047 UART: [art] Derive Key Pair - Done
3,425,746 UART: [art] Signing Cert with AUTHO
3,426,226 UART: RITY.KEYID = 7
3,441,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,745 UART: [art] PUB.X = 8343759D243ABDCE817C02DBABF122730EE8DBE184773856AB9FC65A49D00CB546585A72EC476026812F2026AB9CAADE
3,449,516 UART: [art] PUB.Y = 8CACCEDD4148083014AA334D946A137213B5ACC8C4B3D5F14A8401671B1881821ECB6E259F4F0847429046AEB411ACE4
3,456,461 UART: [art] SIG.R = 353E8171668214936551384C2E8384F516591F49C3A7FE9650E9B4F4C136A4DDEECCEF1FF00CA000FE0B43FBDCE1220D
3,463,208 UART: [art] SIG.S = 9C2D44469FFE6EEFC7BFE2F3867868CC0E450BFD0B870376B935D5680668DC6EED5B08641D5AF21F52CD0B89AEC63F54
3,486,394 UART: Caliptra RT
3,486,740 UART: [state] CFI Enabled
3,595,908 UART: [rt] RT listening for mailbox commands...
3,596,571 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,119 UART: [rt]cmd =0x46504c54, len=4
3,627,201 >>> mbox cmd response data (8 bytes)
3,627,374 UART: [rt] FIPS self test
3,627,702 UART: [kat] ++
3,627,854 UART: [kat] sha1
3,631,956 UART: [kat] SHA2-256
3,633,978 UART: [kat] SHA2-384
3,637,003 UART: [kat] SHA2-512-ACC
3,638,930 UART: [kat] ECC-384
3,648,774 UART: [kat] HMAC-384Kdf
3,649,642 UART: Fatal Error: 0x90030001
3,651,192 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,651,197 >>> mbox cmd response: failed
3,651,197 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,651,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,254 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,758 UART: [kat] SHA2-256
881,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,804 UART: [kat] ++
885,956 UART: [kat] sha1
890,312 UART: [kat] SHA2-256
892,250 UART: [kat] SHA2-384
894,937 UART: [kat] SHA2-512-ACC
896,838 UART: [kat] ECC-384
902,461 UART: [kat] HMAC-384Kdf
906,999 UART: [kat] LMS
1,475,195 UART: [kat] --
1,476,130 UART: [cold-reset] ++
1,476,678 UART: [fht] Storing FHT @ 0x50003400
1,479,557 UART: [idev] ++
1,479,725 UART: [idev] CDI.KEYID = 6
1,480,085 UART: [idev] SUBJECT.KEYID = 7
1,480,509 UART: [idev] UDS.KEYID = 0
1,480,854 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,857 UART: [idev] Erasing UDS.KEYID = 0
1,505,279 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,983 UART: [idev] --
1,515,282 UART: [ldev] ++
1,515,450 UART: [ldev] CDI.KEYID = 6
1,515,813 UART: [ldev] SUBJECT.KEYID = 5
1,516,239 UART: [ldev] AUTHORITY.KEYID = 7
1,516,702 UART: [ldev] FE.KEYID = 1
1,521,800 UART: [ldev] Erasing FE.KEYID = 1
1,547,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,909 UART: [ldev] --
1,586,266 UART: [fwproc] Waiting for Commands...
1,586,921 UART: [fwproc] Received command 0x46574c44
1,587,712 UART: [fwproc] Received Image of size 115224 bytes
2,897,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,955 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,034 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,742 ready_for_fw is high
1,362,742 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,026 >>> mbox cmd response: success
2,999,356 UART:
2,999,372 UART: Running Caliptra FMC ...
2,999,780 UART:
2,999,923 UART: [state] CFI Enabled
3,010,540 UART: [fht] FMC Alias Private Key: 7
3,117,789 UART: [art] Extend RT PCRs Done
3,118,217 UART: [art] Lock RT PCRs Done
3,119,771 UART: [art] Populate DV Done
3,127,908 UART: [fht] FMC Alias Private Key: 7
3,128,858 UART: [art] Derive CDI
3,129,138 UART: [art] Store in in slot 0x4
3,214,995 UART: [art] Derive Key Pair
3,215,355 UART: [art] Store priv key in slot 0x5
3,228,895 UART: [art] Derive Key Pair - Done
3,243,401 UART: [art] Signing Cert with AUTHO
3,243,881 UART: RITY.KEYID = 7
3,259,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,880 UART: [art] PUB.X = 1D5ECF7C02B5CD87EB9F5270AD42343C97E8D8A61206B3CB14F674319AC75F75D74C7517C1F8CBC377CEFD7CEC80D746
3,266,660 UART: [art] PUB.Y = 147617E2FCA1028591CC9CFB9193392664C07D5AFF7F14DB7AD8F22B6DD08834C4EBE9EF93336C6B509A7834F8F32625
3,273,613 UART: [art] SIG.R = F3EBC0A8E97ADED2144F64CBE0F9FCF2B4F84BBD5F53F6AC8349FFBB07B412F91DAB7960FE22734FBA0119E91E8641A3
3,280,403 UART: [art] SIG.S = C0FEE7F94FCF54F34A1BD5833DEA5AEB8413418ABD155BCDE50137CBA089F5455C2BB11D5BDF0BCC92486A0178732FBF
3,303,927 UART: Caliptra RT
3,304,273 UART: [state] CFI Enabled
3,412,614 UART: [rt] RT listening for mailbox commands...
3,413,277 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,541 UART: [rt]cmd =0x46504c54, len=4
3,443,633 >>> mbox cmd response data (8 bytes)
3,443,814 UART: [rt] FIPS self test
3,444,142 UART: [kat] ++
3,444,294 UART: [kat] sha1
3,448,474 UART: [kat] SHA2-256
3,450,496 UART: [kat] SHA2-384
3,453,321 UART: [kat] SHA2-512-ACC
3,455,248 UART: [kat] ECC-384
3,465,250 UART: [kat] HMAC-384Kdf
3,466,198 UART: Fatal Error: 0x90030001
3,467,748 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,467,753 >>> mbox cmd response: failed
3,467,753 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,467,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,242 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,656 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,311 UART: [kat] SHA2-256
904,251 UART: [kat] SHA2-384
906,940 UART: [kat] SHA2-512-ACC
908,841 UART: [kat] ECC-384
918,722 UART: [kat] HMAC-384Kdf
923,374 UART: [kat] LMS
1,171,702 UART: [kat] --
1,172,759 UART: [cold-reset] ++
1,173,145 UART: [fht] FHT @ 0x50003400
1,175,650 UART: [idev] ++
1,175,818 UART: [idev] CDI.KEYID = 6
1,176,178 UART: [idev] SUBJECT.KEYID = 7
1,176,602 UART: [idev] UDS.KEYID = 0
1,176,947 ready_for_fw is high
1,176,947 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,302 UART: [idev] Erasing UDS.KEYID = 0
1,201,603 UART: [idev] Sha1 KeyId Algorithm
1,210,067 UART: [idev] --
1,211,177 UART: [ldev] ++
1,211,345 UART: [ldev] CDI.KEYID = 6
1,211,708 UART: [ldev] SUBJECT.KEYID = 5
1,212,134 UART: [ldev] AUTHORITY.KEYID = 7
1,212,597 UART: [ldev] FE.KEYID = 1
1,217,759 UART: [ldev] Erasing FE.KEYID = 1
1,244,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,381 UART: [ldev] --
1,283,862 UART: [fwproc] Wait for Commands...
1,284,440 UART: [fwproc] Recv command 0x46574c44
1,285,168 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,161 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,465 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,724 >>> mbox cmd response: success
2,786,766 UART: [afmc] ++
2,786,934 UART: [afmc] CDI.KEYID = 6
2,787,296 UART: [afmc] SUBJECT.KEYID = 7
2,787,721 UART: [afmc] AUTHORITY.KEYID = 5
2,822,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,725 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,453 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,338 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,721 UART: [afmc] --
2,865,709 UART: [cold-reset] --
2,866,609 UART: [state] Locking Datavault
2,867,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,370 UART: [state] Locking ICCM
2,868,898 UART: [exit] Launching FMC @ 0x40000130
2,874,227 UART:
2,874,243 UART: Running Caliptra FMC ...
2,874,651 UART:
2,874,705 UART: [state] CFI Enabled
2,885,014 UART: [fht] FMC Alias Private Key: 7
2,993,423 UART: [art] Extend RT PCRs Done
2,993,851 UART: [art] Lock RT PCRs Done
2,995,355 UART: [art] Populate DV Done
3,003,674 UART: [fht] FMC Alias Private Key: 7
3,004,644 UART: [art] Derive CDI
3,004,924 UART: [art] Store in in slot 0x4
3,090,551 UART: [art] Derive Key Pair
3,090,911 UART: [art] Store priv key in slot 0x5
3,103,905 UART: [art] Derive Key Pair - Done
3,118,418 UART: [art] Signing Cert with AUTHO
3,118,898 UART: RITY.KEYID = 7
3,134,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,973 UART: [art] PUB.X = 69A7288A7B77A437FFE38A03E28B25EA603742D979E161FB84CE6B2CD225F23C0ADD49C66029A48751FF71A320305134
3,141,737 UART: [art] PUB.Y = C5A58E23DB6F9666B5F3549265584C9F69002CDDC887678F1C4CAE38CBD7C6D579A6DF284FACB64B3E195A2D450D41CD
3,148,676 UART: [art] SIG.R = E3154E5E806A43B01189A0A94FEC78EFCEBA9A098941EDC01ED6DEAC046FABB3D3D20526D382C81C6130BD86B72342D4
3,155,453 UART: [art] SIG.S = 3DD1CBF7FC5CDC59D935B2C58EA5501987AD42C22184E933FCCEC1E7717BB18BA2A4D4C22EDC6317A39CF57B4BA5D670
3,179,264 UART: Caliptra RT
3,179,518 UART: [state] CFI Enabled
3,286,626 UART: [rt] RT listening for mailbox commands...
3,287,289 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,865 UART: [rt]cmd =0x46504c54, len=4
3,317,951 >>> mbox cmd response data (8 bytes)
3,318,178 UART: [rt] FIPS self test
3,318,506 UART: [kat] ++
3,318,658 UART: [kat] sha1
3,322,990 UART: [kat] SHA2-256
3,325,012 UART: [kat] SHA2-384
3,327,969 UART: [kat] SHA2-512-ACC
3,329,896 UART: [kat] ECC-384
3,339,716 UART: [kat] HMAC-384Kdf
3,340,664 UART: Fatal Error: 0x90030001
3,342,214 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,342,219 >>> mbox cmd response: failed
3,342,219 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,342,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
893,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,701 UART: [kat] ++
897,853 UART: [kat] sha1
902,233 UART: [kat] SHA2-256
904,173 UART: [kat] SHA2-384
906,834 UART: [kat] SHA2-512-ACC
908,735 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,467 UART: [fht] FHT @ 0x50003400
1,175,176 UART: [idev] ++
1,175,344 UART: [idev] CDI.KEYID = 6
1,175,704 UART: [idev] SUBJECT.KEYID = 7
1,176,128 UART: [idev] UDS.KEYID = 0
1,176,473 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,378 UART: [idev] Erasing UDS.KEYID = 0
1,201,625 UART: [idev] Sha1 KeyId Algorithm
1,210,167 UART: [idev] --
1,211,111 UART: [ldev] ++
1,211,279 UART: [ldev] CDI.KEYID = 6
1,211,642 UART: [ldev] SUBJECT.KEYID = 5
1,212,068 UART: [ldev] AUTHORITY.KEYID = 7
1,212,531 UART: [ldev] FE.KEYID = 1
1,217,983 UART: [ldev] Erasing FE.KEYID = 1
1,243,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,715 UART: [ldev] --
1,283,028 UART: [fwproc] Wait for Commands...
1,283,802 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,273 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,528 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 ready_for_fw is high
1,060,263 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,033 >>> mbox cmd response: success
2,700,853 UART:
2,700,869 UART: Running Caliptra FMC ...
2,701,277 UART:
2,701,331 UART: [state] CFI Enabled
2,711,806 UART: [fht] FMC Alias Private Key: 7
2,819,081 UART: [art] Extend RT PCRs Done
2,819,509 UART: [art] Lock RT PCRs Done
2,821,343 UART: [art] Populate DV Done
2,829,440 UART: [fht] FMC Alias Private Key: 7
2,830,518 UART: [art] Derive CDI
2,830,798 UART: [art] Store in in slot 0x4
2,916,309 UART: [art] Derive Key Pair
2,916,669 UART: [art] Store priv key in slot 0x5
2,929,151 UART: [art] Derive Key Pair - Done
2,943,768 UART: [art] Signing Cert with AUTHO
2,944,248 UART: RITY.KEYID = 7
2,959,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,065 UART: [art] PUB.X = 7F1CF8633522476A0CB6B0040EB252E17223EDAC433BD8DB12F19F3C76FCD26636DC7908A084282C9A536BCB9C62B9CF
2,966,833 UART: [art] PUB.Y = BC5283BF13190AE98BB4D4A71574577F0E930E861C4B319E961DFE51FE9E9B267ECAB4987C47EB0DCBAB720B1D3922EB
2,973,784 UART: [art] SIG.R = A61251B83E01A13A6C269300402C8452ECE428A3E078DB44DAFEC3B3D83074EFEB35B0F7655A9BF9F565F7B8D0009F8C
2,980,517 UART: [art] SIG.S = 4516120B6DF1D998EB35EB336DD2E9431D06D4923CAEBDC61A7FEA522570BFA2FEADB4E52E32A3F0C7FC86F387DB295D
3,004,112 UART: Caliptra RT
3,004,366 UART: [state] CFI Enabled
3,112,198 UART: [rt] RT listening for mailbox commands...
3,112,861 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,339 UART: [rt]cmd =0x46504c54, len=4
3,143,343 >>> mbox cmd response data (8 bytes)
3,143,692 UART: [rt] FIPS self test
3,144,020 UART: [kat] ++
3,144,172 UART: [kat] sha1
3,148,468 UART: [kat] SHA2-256
3,150,490 UART: [kat] SHA2-384
3,153,161 UART: [kat] SHA2-512-ACC
3,155,088 UART: [kat] ECC-384
3,164,772 UART: [kat] HMAC-384Kdf
3,165,872 UART: Fatal Error: 0x90030001
3,167,422 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,167,427 >>> mbox cmd response: failed
3,167,427 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,167,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,591 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
893,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,690 UART: [kat] ++
897,842 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,025 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,171,888 UART: [cold-reset] ++
1,172,344 UART: [fht] FHT @ 0x50003400
1,175,011 UART: [idev] ++
1,175,179 UART: [idev] CDI.KEYID = 6
1,175,539 UART: [idev] SUBJECT.KEYID = 7
1,175,963 UART: [idev] UDS.KEYID = 0
1,176,308 ready_for_fw is high
1,176,308 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,013 UART: [idev] Erasing UDS.KEYID = 0
1,201,254 UART: [idev] Sha1 KeyId Algorithm
1,209,944 UART: [idev] --
1,210,910 UART: [ldev] ++
1,211,078 UART: [ldev] CDI.KEYID = 6
1,211,441 UART: [ldev] SUBJECT.KEYID = 5
1,211,867 UART: [ldev] AUTHORITY.KEYID = 7
1,212,330 UART: [ldev] FE.KEYID = 1
1,217,702 UART: [ldev] Erasing FE.KEYID = 1
1,244,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,760 UART: [ldev] --
1,283,059 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,015 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,082 >>> mbox cmd response: success
2,788,156 UART: [afmc] ++
2,788,324 UART: [afmc] CDI.KEYID = 6
2,788,686 UART: [afmc] SUBJECT.KEYID = 7
2,789,111 UART: [afmc] AUTHORITY.KEYID = 5
2,825,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,643 UART: [afmc] --
2,868,727 UART: [cold-reset] --
2,869,725 UART: [state] Locking Datavault
2,870,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,174 UART: [state] Locking ICCM
2,871,634 UART: [exit] Launching FMC @ 0x40000130
2,876,963 UART:
2,876,979 UART: Running Caliptra FMC ...
2,877,387 UART:
2,877,530 UART: [state] CFI Enabled
2,888,393 UART: [fht] FMC Alias Private Key: 7
2,996,096 UART: [art] Extend RT PCRs Done
2,996,524 UART: [art] Lock RT PCRs Done
2,997,840 UART: [art] Populate DV Done
3,006,067 UART: [fht] FMC Alias Private Key: 7
3,007,235 UART: [art] Derive CDI
3,007,515 UART: [art] Store in in slot 0x4
3,093,344 UART: [art] Derive Key Pair
3,093,704 UART: [art] Store priv key in slot 0x5
3,107,040 UART: [art] Derive Key Pair - Done
3,121,699 UART: [art] Signing Cert with AUTHO
3,122,179 UART: RITY.KEYID = 7
3,137,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,048 UART: [art] PUB.X = 356C1A9C6A0D06FEE0C32FA35F7BFA96DA43892D7F974B30A7DDF04D645B9838011ADE018366DAAFE64C9BD7A9FE8F6C
3,144,828 UART: [art] PUB.Y = B9B6FDF349438A98582A49A9D4682BCCEAF1ECBF73E16CAB71B38DDB1625B2D9731C547743BDFFB5521AC15CA37485D0
3,151,796 UART: [art] SIG.R = F108D2B75696314BFCBB44A4C6F87CBD82F9BFC45E1736A36602AF31A8892117E69926BD75ED59D75E754551886ECE11
3,158,564 UART: [art] SIG.S = D45CF563D92E9C354ED3FEBA8A572D3B6235A6074CA4C8FDF2028430B348A742B52609E5BD805F4256CCA62C864AB9AA
3,182,212 UART: Caliptra RT
3,182,558 UART: [state] CFI Enabled
3,290,367 UART: [rt] RT listening for mailbox commands...
3,291,030 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,554 UART: [rt]cmd =0x46504c54, len=4
3,321,686 >>> mbox cmd response data (8 bytes)
3,321,801 UART: [rt] FIPS self test
3,322,129 UART: [kat] ++
3,322,281 UART: [kat] sha1
3,326,383 UART: [kat] SHA2-256
3,328,405 UART: [kat] SHA2-384
3,331,226 UART: [kat] SHA2-512-ACC
3,333,153 UART: [kat] ECC-384
3,343,249 UART: [kat] HMAC-384Kdf
3,344,441 UART: Fatal Error: 0x90030001
3,345,991 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,345,996 >>> mbox cmd response: failed
3,345,996 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,346,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
893,823 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,948 UART: [kat] ++
898,100 UART: [kat] sha1
902,132 UART: [kat] SHA2-256
904,072 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
922,823 UART: [kat] LMS
1,171,151 UART: [kat] --
1,172,054 UART: [cold-reset] ++
1,172,564 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,167 UART: [idev] Erasing UDS.KEYID = 0
1,201,084 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,632 UART: [ldev] ++
1,210,800 UART: [ldev] CDI.KEYID = 6
1,211,163 UART: [ldev] SUBJECT.KEYID = 5
1,211,589 UART: [ldev] AUTHORITY.KEYID = 7
1,212,052 UART: [ldev] FE.KEYID = 1
1,217,468 UART: [ldev] Erasing FE.KEYID = 1
1,243,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,960 UART: [ldev] --
1,283,415 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,671 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,850 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,036 ready_for_fw is high
1,061,036 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,650 >>> mbox cmd response: success
2,700,570 UART:
2,700,586 UART: Running Caliptra FMC ...
2,700,994 UART:
2,701,137 UART: [state] CFI Enabled
2,711,822 UART: [fht] FMC Alias Private Key: 7
2,819,707 UART: [art] Extend RT PCRs Done
2,820,135 UART: [art] Lock RT PCRs Done
2,821,753 UART: [art] Populate DV Done
2,829,884 UART: [fht] FMC Alias Private Key: 7
2,830,956 UART: [art] Derive CDI
2,831,236 UART: [art] Store in in slot 0x4
2,916,535 UART: [art] Derive Key Pair
2,916,895 UART: [art] Store priv key in slot 0x5
2,930,099 UART: [art] Derive Key Pair - Done
2,944,901 UART: [art] Signing Cert with AUTHO
2,945,381 UART: RITY.KEYID = 7
2,960,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,292 UART: [art] PUB.X = B382C18170B8C59DC10399D89D0FEBEC2880A99BB7AD4312E30D7A16AC10880A12352B012E1991C8CA033027C8264F9B
2,968,046 UART: [art] PUB.Y = 96A84EFBBFE6F9BC3268FB4E0EDAE980E6317DADB6D1A61BBAA8B80734CF5503A0957C296718EC22C5146C76688ED617
2,975,003 UART: [art] SIG.R = DE793D0434D6F6CA5AA637DE58A8628B18A22D60620D6184F5056D33EA2BEBD80DC1E361C43043F15750F76E0E51A31F
2,981,764 UART: [art] SIG.S = 38EBC0393153A40B7141BB88633DF0FF05DF271DFF0F8686D02C714486CD70E557F16AF9EBAA8F476115D7AA5AF6E09E
3,006,234 UART: Caliptra RT
3,006,580 UART: [state] CFI Enabled
3,114,888 UART: [rt] RT listening for mailbox commands...
3,115,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,075 UART: [rt]cmd =0x46504c54, len=4
3,146,291 >>> mbox cmd response data (8 bytes)
3,146,498 UART: [rt] FIPS self test
3,146,826 UART: [kat] ++
3,146,978 UART: [kat] sha1
3,151,288 UART: [kat] SHA2-256
3,153,310 UART: [kat] SHA2-384
3,156,043 UART: [kat] SHA2-512-ACC
3,157,970 UART: [kat] ECC-384
3,168,546 UART: [kat] HMAC-384Kdf
3,169,778 UART: Fatal Error: 0x90030001
3,171,328 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,171,333 >>> mbox cmd response: failed
3,171,333 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,171,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,236 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,156 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,088 UART: [kat] SHA2-256
890,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,767 UART: [kat] ++
894,919 UART: [kat] sha1
899,017 UART: [kat] SHA2-256
900,957 UART: [kat] SHA2-384
903,590 UART: [kat] SHA2-512-ACC
905,491 UART: [kat] ECC-384
914,934 UART: [kat] HMAC-384Kdf
919,612 UART: [kat] LMS
1,167,924 UART: [kat] --
1,169,109 UART: [cold-reset] ++
1,169,539 UART: [fht] FHT @ 0x50003400
1,172,235 UART: [idev] ++
1,172,403 UART: [idev] CDI.KEYID = 6
1,172,764 UART: [idev] SUBJECT.KEYID = 7
1,173,189 UART: [idev] UDS.KEYID = 0
1,173,535 ready_for_fw is high
1,173,535 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,233 UART: [idev] Erasing UDS.KEYID = 0
1,197,797 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,400 UART: [ldev] Erasing FE.KEYID = 1
1,240,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,568 UART: [ldev] --
1,279,914 UART: [fwproc] Wait for Commands...
1,280,599 UART: [fwproc] Recv command 0x46574c44
1,281,332 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,032 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,210 >>> mbox cmd response: success
2,784,455 UART: [afmc] ++
2,784,623 UART: [afmc] CDI.KEYID = 6
2,784,986 UART: [afmc] SUBJECT.KEYID = 7
2,785,412 UART: [afmc] AUTHORITY.KEYID = 5
2,821,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,278 UART: [afmc] --
2,865,258 UART: [cold-reset] --
2,866,142 UART: [state] Locking Datavault
2,867,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,859 UART: [state] Locking ICCM
2,868,293 UART: [exit] Launching FMC @ 0x40000130
2,873,622 UART:
2,873,638 UART: Running Caliptra FMC ...
2,874,046 UART:
2,874,100 UART: [state] CFI Enabled
2,884,545 UART: [fht] FMC Alias Private Key: 7
2,992,392 UART: [art] Extend RT PCRs Done
2,992,820 UART: [art] Lock RT PCRs Done
2,994,504 UART: [art] Populate DV Done
3,002,851 UART: [fht] FMC Alias Private Key: 7
3,003,907 UART: [art] Derive CDI
3,004,187 UART: [art] Store in in slot 0x4
3,089,936 UART: [art] Derive Key Pair
3,090,296 UART: [art] Store priv key in slot 0x5
3,103,432 UART: [art] Derive Key Pair - Done
3,118,106 UART: [art] Signing Cert with AUTHO
3,118,586 UART: RITY.KEYID = 7
3,134,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,777 UART: [art] PUB.X = 75531C0FE20657942C45482C3C1EE02E63C21E6524C56C2ACD84567862AC5685ECB422F378EAF36DFC9160E49A0B0A1E
3,141,539 UART: [art] PUB.Y = D77A3B550F2918D8E98329A68A189E9E3B982BDCD23170C1A7AF3641E9257259AB0659A1F4C792372189E047A05F0672
3,148,474 UART: [art] SIG.R = 079A53DD63201EB71C332745B5ABC37D4694F86F30454EE98BDC6C84758C4E1216D9F0D8817B2DA7C4B5D035A17524D2
3,155,243 UART: [art] SIG.S = 1E03F03CFBD35F1E187250F3DA90471375DFCE4D55E3290ED00DCA53D89C8B5EBC3A5376D81E0C8FF1AB1149247D448D
3,179,344 UART: Caliptra RT
3,179,598 UART: [state] CFI Enabled
3,286,688 UART: [rt] RT listening for mailbox commands...
3,287,351 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,979 UART: [rt]cmd =0x46504c54, len=4
3,318,135 >>> mbox cmd response data (8 bytes)
3,318,326 UART: [rt] FIPS self test
3,318,654 UART: [kat] ++
3,318,806 UART: [kat] sha1
3,323,078 UART: [kat] SHA2-256
3,325,100 UART: [kat] SHA2-384
3,327,811 UART: [kat] SHA2-512-ACC
3,329,738 UART: [kat] ECC-384
3,339,768 UART: [kat] HMAC-384Kdf
3,340,486 UART: Fatal Error: 0x90030001
3,342,036 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,342,041 >>> mbox cmd response: failed
3,342,041 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,342,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,779 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,240,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,492 UART: [ldev] --
1,279,772 UART: [fwproc] Wait for Commands...
1,280,415 UART: [fwproc] Recv command 0x46574c44
1,281,148 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,988 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,134 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,948 ready_for_fw is high
1,056,948 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,514 >>> mbox cmd response: success
2,698,170 UART:
2,698,186 UART: Running Caliptra FMC ...
2,698,594 UART:
2,698,648 UART: [state] CFI Enabled
2,709,079 UART: [fht] FMC Alias Private Key: 7
2,817,056 UART: [art] Extend RT PCRs Done
2,817,484 UART: [art] Lock RT PCRs Done
2,819,078 UART: [art] Populate DV Done
2,827,283 UART: [fht] FMC Alias Private Key: 7
2,828,253 UART: [art] Derive CDI
2,828,533 UART: [art] Store in in slot 0x4
2,914,252 UART: [art] Derive Key Pair
2,914,612 UART: [art] Store priv key in slot 0x5
2,927,610 UART: [art] Derive Key Pair - Done
2,942,638 UART: [art] Signing Cert with AUTHO
2,943,118 UART: RITY.KEYID = 7
2,958,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,917 UART: [art] PUB.X = 2940F9300D64430166DE234BE8458660DE591DB0CAD8070A84DD82B9866DBAEF28245F98ECE1DA2CD301BACA07A0B440
2,965,679 UART: [art] PUB.Y = B4164030014D6620DF4D5A08356B008986EFDFD7205D114FD49F80091CE0FC95978A4D75E3A1D8C2D51FFCD5D148A7C9
2,972,604 UART: [art] SIG.R = 821CE97CD84C96B865A6406B831D26584FFFD38B7A7971C587B987F0F904D74B4E27B5E3FE70F57119A92A811ACAA711
2,979,375 UART: [art] SIG.S = 11D52E0A895B29D3288C23BDD260F03A28949F6325785D3BB2116A0E51EA8376C80B78D2A6F743787EC772C169C2962C
3,003,125 UART: Caliptra RT
3,003,379 UART: [state] CFI Enabled
3,111,811 UART: [rt] RT listening for mailbox commands...
3,112,474 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,012 UART: [rt]cmd =0x46504c54, len=4
3,143,072 >>> mbox cmd response data (8 bytes)
3,143,235 UART: [rt] FIPS self test
3,143,563 UART: [kat] ++
3,143,715 UART: [kat] sha1
3,147,873 UART: [kat] SHA2-256
3,149,895 UART: [kat] SHA2-384
3,152,752 UART: [kat] SHA2-512-ACC
3,154,679 UART: [kat] ECC-384
3,164,963 UART: [kat] HMAC-384Kdf
3,165,857 UART: Fatal Error: 0x90030001
3,167,407 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,167,412 >>> mbox cmd response: failed
3,167,412 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,167,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,332 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,720 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,382 ready_for_fw is high
1,174,382 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,773 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0x46574c44
1,283,187 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,015 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,301 >>> mbox cmd response: success
2,786,420 UART: [afmc] ++
2,786,588 UART: [afmc] CDI.KEYID = 6
2,786,951 UART: [afmc] SUBJECT.KEYID = 7
2,787,377 UART: [afmc] AUTHORITY.KEYID = 5
2,823,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,282 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,165 UART: [afmc] --
2,866,097 UART: [cold-reset] --
2,867,041 UART: [state] Locking Datavault
2,868,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,862 UART: [state] Locking ICCM
2,869,412 UART: [exit] Launching FMC @ 0x40000130
2,874,741 UART:
2,874,757 UART: Running Caliptra FMC ...
2,875,165 UART:
2,875,308 UART: [state] CFI Enabled
2,885,955 UART: [fht] FMC Alias Private Key: 7
2,994,006 UART: [art] Extend RT PCRs Done
2,994,434 UART: [art] Lock RT PCRs Done
2,996,044 UART: [art] Populate DV Done
3,004,219 UART: [fht] FMC Alias Private Key: 7
3,005,253 UART: [art] Derive CDI
3,005,533 UART: [art] Store in in slot 0x4
3,091,116 UART: [art] Derive Key Pair
3,091,476 UART: [art] Store priv key in slot 0x5
3,104,856 UART: [art] Derive Key Pair - Done
3,119,344 UART: [art] Signing Cert with AUTHO
3,119,824 UART: RITY.KEYID = 7
3,135,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,991 UART: [art] PUB.X = 08C9E1AC74DA036A4CF10A58348F3980BB5CB6858A58778492D7C0DAC01631BA8672E0E5DE3293EBF659B8C4B94335EB
3,142,760 UART: [art] PUB.Y = 079DF36A7A6A3D9F0697C5A6C1FF98CF538BC6914B007C5D77A1EE9243C3F3D6CBB3A80C1F2FBF44D474B4CDA1825ECC
3,149,701 UART: [art] SIG.R = FA39067A735CCB5C565EBA2FE56B9A1A7D34675BFB686C66D4E51CA73EA48E5196096225FDE2FB6764603CB34C94C456
3,156,475 UART: [art] SIG.S = 554C14F82AC75DE033853D1698413F0720A35E2AA859B841D09B68A93B08A121A027395227F8C08001A47AD693299CD8
3,180,103 UART: Caliptra RT
3,180,449 UART: [state] CFI Enabled
3,288,077 UART: [rt] RT listening for mailbox commands...
3,288,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,134 UART: [rt]cmd =0x46504c54, len=4
3,319,442 >>> mbox cmd response data (8 bytes)
3,319,581 UART: [rt] FIPS self test
3,319,909 UART: [kat] ++
3,320,061 UART: [kat] sha1
3,324,389 UART: [kat] SHA2-256
3,326,411 UART: [kat] SHA2-384
3,329,140 UART: [kat] SHA2-512-ACC
3,331,067 UART: [kat] ECC-384
3,341,129 UART: [kat] HMAC-384Kdf
3,342,303 UART: Fatal Error: 0x90030001
3,343,853 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,343,858 >>> mbox cmd response: failed
3,343,858 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,343,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,568 UART: [kat] SHA2-256
902,508 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,512 UART: [cold-reset] ++
1,171,030 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,198,656 UART: [idev] Sha1 KeyId Algorithm
1,207,532 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,095 UART: [fwproc] Wait for Commands...
1,281,698 UART: [fwproc] Recv command 0x46574c44
1,282,431 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,463 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,663 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,835 ready_for_fw is high
1,056,835 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,543 >>> mbox cmd response: success
2,697,605 UART:
2,697,621 UART: Running Caliptra FMC ...
2,698,029 UART:
2,698,172 UART: [state] CFI Enabled
2,708,955 UART: [fht] FMC Alias Private Key: 7
2,816,986 UART: [art] Extend RT PCRs Done
2,817,414 UART: [art] Lock RT PCRs Done
2,818,790 UART: [art] Populate DV Done
2,826,765 UART: [fht] FMC Alias Private Key: 7
2,827,719 UART: [art] Derive CDI
2,827,999 UART: [art] Store in in slot 0x4
2,914,278 UART: [art] Derive Key Pair
2,914,638 UART: [art] Store priv key in slot 0x5
2,927,394 UART: [art] Derive Key Pair - Done
2,942,268 UART: [art] Signing Cert with AUTHO
2,942,748 UART: RITY.KEYID = 7
2,957,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,511 UART: [art] PUB.X = 1ABA22A28BF810297573DBDAC1837F9904F6D3922BA8CF5BE5F2241D9A553BB67A3FC7B342F426019C9601E4B54C15B4
2,965,280 UART: [art] PUB.Y = A63EF9A587616A9717C85F8E006F2769352827BEA2E75F4857B2D2460D2E9A68FD77BD007C65AD41A5FFE09958AC5135
2,972,185 UART: [art] SIG.R = 6FE3F6006388CF799E45FF1F567DD8C263FF75A844E1095A3FC470146EDFC32B40DE00AE2CC6C3AB92F133388E0E2C45
2,978,917 UART: [art] SIG.S = 1E8B9BA8CD89CC73521409E8EFB135AE86C8E311AC88F6DE1F737E1A790CB766DFC495FEBE8384E3C4A8ABB44FC1284D
3,002,754 UART: Caliptra RT
3,003,100 UART: [state] CFI Enabled
3,111,370 UART: [rt] RT listening for mailbox commands...
3,112,033 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,533 UART: [rt]cmd =0x46504c54, len=4
3,142,803 >>> mbox cmd response data (8 bytes)
3,143,072 UART: [rt] FIPS self test
3,143,400 UART: [kat] ++
3,143,552 UART: [kat] sha1
3,147,660 UART: [kat] SHA2-256
3,149,682 UART: [kat] SHA2-384
3,152,439 UART: [kat] SHA2-512-ACC
3,154,366 UART: [kat] ECC-384
3,164,514 UART: [kat] HMAC-384Kdf
3,165,602 UART: Fatal Error: 0x90030001
3,167,152 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,167,157 >>> mbox cmd response: failed
3,167,157 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,167,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,049 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,647 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
6,002,942 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,147,069 >>> mbox cmd response: failed
6,147,637 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,291,406 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
4,879,710 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,454,175 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
6,002,463 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,147,164 >>> mbox cmd response: failed
6,147,771 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,291,046 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
4,872,120 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,457,646 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
6,316,222 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,460,271 >>> mbox cmd response: failed
6,460,830 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,603,918 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
18,445,884 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,884,141 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
6,330,478 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,474,573 >>> mbox cmd response: failed
6,475,137 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
6,618,883 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
18,435,624 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
31,883,162 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
5,169,252 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,314,119 >>> mbox cmd response: failed
5,314,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,458,373 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,437,335 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,277,895 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
5,172,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,316,841 >>> mbox cmd response: failed
5,317,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,461,039 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,460,726 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,283,015 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
5,223,228 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,367,767 >>> mbox cmd response: failed
5,368,351 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,511,971 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,452,164 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,286,577 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
5,505,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,649,610 >>> mbox cmd response: failed
5,650,181 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,793,810 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,845,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,575,278 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
5,520,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,664,541 >>> mbox cmd response: failed
5,665,094 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,808,565 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
17,821,956 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,537,446 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,144 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,152 >>> mbox cmd response: failed
827,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,574 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,654 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,662 >>> mbox cmd response: failed
827,662 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,589 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,066 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,513 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,521 >>> mbox cmd response: failed
827,521 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,658 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,241 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,955 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,963 >>> mbox cmd response: failed
827,963 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,314 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,619 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,186 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,194 >>> mbox cmd response: failed
827,194 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,709 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,032 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,388 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,396 >>> mbox cmd response: failed
827,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,269 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,426 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,841 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,849 >>> mbox cmd response: failed
827,849 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,445 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,485 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,493 >>> mbox cmd response: failed
827,493 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,262 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,035 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,426 >>> mbox cmd response: failed
827,426 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,051 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,602 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,184 >>> mbox cmd response: failed
827,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,975 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,886 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,069 >>> mbox cmd response: failed
827,069 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,276 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,295 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,857 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,865 >>> mbox cmd response: failed
827,865 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
827,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,134 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,941 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,088 UART:
192,482 UART: Running Caliptra ROM ...
193,600 UART:
193,745 UART: [state] CFI Enabled
263,008 UART: [state] LifecycleState = Unprovisioned
264,924 UART: [state] DebugLocked = No
267,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,598 UART: [kat] SHA2-256
442,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,808 UART: [kat] ++
453,257 UART: [kat] sha1
465,341 UART: [kat] SHA2-256
468,000 UART: [kat] SHA2-384
475,347 UART: [kat] SHA2-512-ACC
477,655 UART: [kat] ECC-384
2,768,442 UART: [kat] HMAC-384Kdf
2,799,226 UART: [kat] LMS
3,989,562 UART: [kat] --
3,993,598 UART: [cold-reset] ++
3,994,473 UART: [fht] Storing FHT @ 0x50003400
4,005,598 UART: [idev] ++
4,006,246 UART: [idev] CDI.KEYID = 6
4,007,137 UART: [idev] SUBJECT.KEYID = 7
4,008,390 UART: [idev] UDS.KEYID = 0
4,009,491 ready_for_fw is high
4,009,726 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,154,440 UART: [idev] Erasing UDS.KEYID = 0
7,345,917 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,895 UART: [idev] --
7,370,920 UART: [ldev] ++
7,371,489 UART: [ldev] CDI.KEYID = 6
7,372,425 UART: [ldev] SUBJECT.KEYID = 5
7,373,710 UART: [ldev] AUTHORITY.KEYID = 7
7,374,865 UART: [ldev] FE.KEYID = 1
7,423,032 UART: [ldev] Erasing FE.KEYID = 1
10,754,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,376 UART: [ldev] --
13,115,402 UART: [fwproc] Waiting for Commands...
13,118,419 UART: [fwproc] Received command 0x46574c44
13,120,607 UART: [fwproc] Received Image of size 114916 bytes
17,185,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,786 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,646,096 >>> mbox cmd response: success
17,650,159 UART: [afmc] ++
17,650,761 UART: [afmc] CDI.KEYID = 6
17,651,647 UART: [afmc] SUBJECT.KEYID = 7
17,652,917 UART: [afmc] AUTHORITY.KEYID = 5
21,008,632 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,925 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,186 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,581 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,448 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,870 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,606 UART: [afmc] --
23,377,823 UART: [cold-reset] --
23,382,778 UART: [state] Locking Datavault
23,389,528 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,291 UART: [state] Locking ICCM
23,392,692 UART: [exit] Launching FMC @ 0x40000130
23,401,052 UART:
23,401,305 UART: Running Caliptra FMC ...
23,402,409 UART:
23,402,567 UART: [state] CFI Enabled
23,467,746 UART: [fht] FMC Alias Private Key: 7
25,805,669 UART: [art] Extend RT PCRs Done
25,806,893 UART: [art] Lock RT PCRs Done
25,808,391 UART: [art] Populate DV Done
25,813,692 UART: [fht] FMC Alias Private Key: 7
25,815,280 UART: [art] Derive CDI
25,816,019 UART: [art] Store in in slot 0x4
25,875,545 UART: [art] Derive Key Pair
25,876,584 UART: [art] Store priv key in slot 0x5
29,169,366 UART: [art] Derive Key Pair - Done
29,182,150 UART: [art] Signing Cert with AUTHO
29,183,457 UART: RITY.KEYID = 7
31,471,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,776 UART: [art] PUB.X = 2205890D2B78317F1F5F438EE4423FC77EDB9CB1B78CF22F3AD1E77A8F41F0A8B72D0340089BDAF13FB7367BCB6866A3
31,479,983 UART: [art] PUB.Y = AF98DE89407E5EC75066B276243FBDB6BA35DB4CA0052874B7E01EC8BB8DC7600178C15563582DD24C025C7505510CEA
31,487,226 UART: [art] SIG.R = AA5A99666709BB8EEBFB5394B07B33535EFE698EA65455FDB94684748702B2BCCB1970A55F11257334F51FC14CF90117
31,494,635 UART: [art] SIG.S = 5A46C39AF41D00993A5153FD9609F0CDFBA8ED8DD841401C0BD51B9B76650FACAA4099262700694DE81AEF7E48DD1009
32,799,705 UART: Caliptra RT
32,800,425 UART: [state] CFI Enabled
32,962,860 UART: [rt] RT listening for mailbox commands...
32,964,714 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,994,494 UART: [rt]cmd =0x46504c54, len=4
32,996,262 >>> mbox cmd response data (8 bytes)
32,997,289 UART: [rt] FIPS self test
32,998,238 UART: [kat] ++
32,998,691 UART: [kat] sha1
33,003,093 UART: [kat] SHA2-256
33,005,040 UART: [kat] SHA2-384
33,007,974 UART: [kat] SHA2-512-ACC
33,010,219 UART: [kat] ECC-384
36,279,316 UART: [kat] HMAC-384Kdf
36,286,259 UART: Fatal Error: 0x90030002
36,321,484 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,466,191 >>> mbox cmd response: failed
36,466,820 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,611,081 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,041 UART:
190,343 UART: Running Caliptra ROM ...
191,457 UART:
191,610 UART: [state] CFI Enabled
254,158 UART: [state] LifecycleState = Unprovisioned
256,135 UART: [state] DebugLocked = No
258,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,966 UART: [kat] SHA2-256
432,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,158 UART: [kat] ++
443,632 UART: [kat] sha1
454,049 UART: [kat] SHA2-256
456,782 UART: [kat] SHA2-384
461,905 UART: [kat] SHA2-512-ACC
464,254 UART: [kat] ECC-384
2,761,598 UART: [kat] HMAC-384Kdf
2,774,795 UART: [kat] LMS
3,965,085 UART: [kat] --
3,969,445 UART: [cold-reset] ++
3,970,713 UART: [fht] Storing FHT @ 0x50003400
3,982,209 UART: [idev] ++
3,982,775 UART: [idev] CDI.KEYID = 6
3,983,764 UART: [idev] SUBJECT.KEYID = 7
3,984,984 UART: [idev] UDS.KEYID = 0
3,986,509 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,131,004 UART: [idev] Erasing UDS.KEYID = 0
7,323,639 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,428 UART: [idev] --
7,350,130 UART: [ldev] ++
7,350,712 UART: [ldev] CDI.KEYID = 6
7,351,656 UART: [ldev] SUBJECT.KEYID = 5
7,352,791 UART: [ldev] AUTHORITY.KEYID = 7
7,354,139 UART: [ldev] FE.KEYID = 1
7,398,467 UART: [ldev] Erasing FE.KEYID = 1
10,728,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,005 UART: [ldev] --
13,090,476 UART: [fwproc] Waiting for Commands...
13,093,486 UART: [fwproc] Received command 0x46574c44
13,095,685 UART: [fwproc] Received Image of size 114916 bytes
17,166,168 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,630,781 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,804,560 ready_for_fw is high
3,805,175 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,868,216 >>> mbox cmd response: success
23,567,137 UART:
23,567,546 UART: Running Caliptra FMC ...
23,568,669 UART:
23,568,852 UART: [state] CFI Enabled
23,619,591 UART: [fht] FMC Alias Private Key: 7
25,957,520 UART: [art] Extend RT PCRs Done
25,958,758 UART: [art] Lock RT PCRs Done
25,960,248 UART: [art] Populate DV Done
25,965,947 UART: [fht] FMC Alias Private Key: 7
25,967,420 UART: [art] Derive CDI
25,968,195 UART: [art] Store in in slot 0x4
26,027,616 UART: [art] Derive Key Pair
26,028,618 UART: [art] Store priv key in slot 0x5
29,322,159 UART: [art] Derive Key Pair - Done
29,334,917 UART: [art] Signing Cert with AUTHO
29,336,227 UART: RITY.KEYID = 7
31,616,708 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,214 UART: [art] PUB.X = 642D20E6B613C0BC87612F126C8011F0C1A782AB1DC472E0BC800F79D5F8777BCCEEFDE308E7575F75BB4D50E3E93B54
31,625,480 UART: [art] PUB.Y = 75685B6E1DDE2E4265D2A7AFBEA8A28858116257249A91EA4F8DA778F25EB105478611E5B2057C9EF2758E0AF8C7AABA
31,632,751 UART: [art] SIG.R = D82B11253D8A53F5D07D424F89CFC88DD97450935AA3828322D8D042017C1923490BF3E327531942930CFA9986EFE05C
31,640,106 UART: [art] SIG.S = 2F4CB7622283D93BB263BC6F50FB7137580CC13BBA272E69006EC9BF4D154FC20F21CB6B1A6AF1801E242EA9015664C8
32,945,054 UART: Caliptra RT
32,945,772 UART: [state] CFI Enabled
33,105,381 UART: [rt] RT listening for mailbox commands...
33,107,237 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,137,041 UART: [rt]cmd =0x46504c54, len=4
33,138,742 >>> mbox cmd response data (8 bytes)
33,139,916 UART: [rt] FIPS self test
33,140,863 UART: [kat] ++
33,141,318 UART: [kat] sha1
33,145,805 UART: [kat] SHA2-256
33,147,739 UART: [kat] SHA2-384
33,150,481 UART: [kat] SHA2-512-ACC
33,152,734 UART: [kat] ECC-384
36,421,471 UART: [kat] HMAC-384Kdf
36,428,761 UART: Fatal Error: 0x90030002
36,464,157 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,608,517 >>> mbox cmd response: failed
36,609,179 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,753,742 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,780,647 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,862,534 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,399 UART:
192,761 UART: Running Caliptra ROM ...
193,876 UART:
603,476 UART: [state] CFI Enabled
616,798 UART: [state] LifecycleState = Unprovisioned
618,741 UART: [state] DebugLocked = No
620,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,223 UART: [kat] SHA2-256
795,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,518 UART: [kat] ++
805,992 UART: [kat] sha1
817,385 UART: [kat] SHA2-256
820,076 UART: [kat] SHA2-384
826,083 UART: [kat] SHA2-512-ACC
828,458 UART: [kat] ECC-384
3,111,632 UART: [kat] HMAC-384Kdf
3,123,588 UART: [kat] LMS
4,313,670 UART: [kat] --
4,318,097 UART: [cold-reset] ++
4,320,181 UART: [fht] Storing FHT @ 0x50003400
4,331,047 UART: [idev] ++
4,331,621 UART: [idev] CDI.KEYID = 6
4,332,540 UART: [idev] SUBJECT.KEYID = 7
4,333,789 UART: [idev] UDS.KEYID = 0
4,334,861 ready_for_fw is high
4,335,334 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,479,608 UART: [idev] Erasing UDS.KEYID = 0
7,622,223 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,106 UART: [idev] --
7,647,236 UART: [ldev] ++
7,647,805 UART: [ldev] CDI.KEYID = 6
7,648,744 UART: [ldev] SUBJECT.KEYID = 5
7,649,955 UART: [ldev] AUTHORITY.KEYID = 7
7,651,244 UART: [ldev] FE.KEYID = 1
7,663,267 UART: [ldev] Erasing FE.KEYID = 1
10,949,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,378 UART: [ldev] --
13,310,899 UART: [fwproc] Waiting for Commands...
13,312,520 UART: [fwproc] Received command 0x46574c44
13,314,712 UART: [fwproc] Received Image of size 114916 bytes
17,385,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,571 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,847,529 >>> mbox cmd response: success
17,852,393 UART: [afmc] ++
17,852,987 UART: [afmc] CDI.KEYID = 6
17,853,871 UART: [afmc] SUBJECT.KEYID = 7
17,855,347 UART: [afmc] AUTHORITY.KEYID = 5
21,170,360 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,469,043 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,381 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,236 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,649 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,146 UART: [afmc] --
23,537,695 UART: [cold-reset] --
23,541,756 UART: [state] Locking Datavault
23,548,260 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,017 UART: [state] Locking ICCM
23,552,439 UART: [exit] Launching FMC @ 0x40000130
23,560,835 UART:
23,561,071 UART: Running Caliptra FMC ...
23,562,180 UART:
23,562,341 UART: [state] CFI Enabled
23,570,514 UART: [fht] FMC Alias Private Key: 7
25,901,496 UART: [art] Extend RT PCRs Done
25,902,738 UART: [art] Lock RT PCRs Done
25,904,500 UART: [art] Populate DV Done
25,910,023 UART: [fht] FMC Alias Private Key: 7
25,911,622 UART: [art] Derive CDI
25,912,446 UART: [art] Store in in slot 0x4
25,954,947 UART: [art] Derive Key Pair
25,956,009 UART: [art] Store priv key in slot 0x5
29,197,491 UART: [art] Derive Key Pair - Done
29,210,808 UART: [art] Signing Cert with AUTHO
29,212,112 UART: RITY.KEYID = 7
31,491,194 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,705 UART: [art] PUB.X = 2C2CFDB8EB9C1DF438BB6D9160F1E22CC709B90AD35B16F6A0B1D3C710F6350E97F6BBD8C63F6A6E7751AD705775BAD4
31,499,962 UART: [art] PUB.Y = 17515B1872BCEE743315B64CDDAF51A589966F28AFD02CA72B95017E2047E2AE59A03A86C7F87AAADF8451BD279E2A9E
31,507,210 UART: [art] SIG.R = 29BB61686A0078DB754B6F41673D4CF6F90133B546A43B1AF580C0C0B8EEEF8DFF23F8AC2EE54D2B5BAA56C2FBF7C0EF
31,514,639 UART: [art] SIG.S = 8518EB4821AADE3A98C9755A9FF5F564F6DCFD00E5D0A2F0273874FF5EEE4D9E852635ABF5005A5083D23F9FE2F11989
32,819,969 UART: Caliptra RT
32,820,680 UART: [state] CFI Enabled
32,937,532 UART: [rt] RT listening for mailbox commands...
32,939,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,969,195 UART: [rt]cmd =0x46504c54, len=4
32,970,990 >>> mbox cmd response data (8 bytes)
32,972,351 UART: [rt] FIPS self test
32,973,288 UART: [kat] ++
32,973,738 UART: [kat] sha1
32,978,094 UART: [kat] SHA2-256
32,980,017 UART: [kat] SHA2-384
32,983,101 UART: [kat] SHA2-512-ACC
32,985,394 UART: [kat] ECC-384
36,228,179 UART: [kat] HMAC-384Kdf
36,233,709 UART: Fatal Error: 0x90030002
36,269,077 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,413,643 >>> mbox cmd response: failed
36,414,274 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,558,582 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,109 UART:
190,403 UART: Running Caliptra ROM ...
191,431 UART:
3,978,305 UART: [state] CFI Enabled
3,991,541 UART: [state] LifecycleState = Unprovisioned
3,993,460 UART: [state] DebugLocked = No
3,995,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,000,719 UART: [kat] SHA2-256
4,170,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,181,027 UART: [kat] ++
4,181,595 UART: [kat] sha1
4,192,653 UART: [kat] SHA2-256
4,195,344 UART: [kat] SHA2-384
4,200,576 UART: [kat] SHA2-512-ACC
4,202,935 UART: [kat] ECC-384
6,486,037 UART: [kat] HMAC-384Kdf
6,496,959 UART: [kat] LMS
7,687,031 UART: [kat] --
7,689,939 UART: [cold-reset] ++
7,692,362 UART: [fht] Storing FHT @ 0x50003400
7,703,679 UART: [idev] ++
7,704,288 UART: [idev] CDI.KEYID = 6
7,705,211 UART: [idev] SUBJECT.KEYID = 7
7,706,434 UART: [idev] UDS.KEYID = 0
7,708,067 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
7,852,264 UART: [idev] Erasing UDS.KEYID = 0
10,992,813 UART: [idev] Using Sha1 for KeyId Algorithm
11,014,512 UART: [idev] --
11,018,994 UART: [ldev] ++
11,019,576 UART: [ldev] CDI.KEYID = 6
11,020,706 UART: [ldev] SUBJECT.KEYID = 5
11,021,813 UART: [ldev] AUTHORITY.KEYID = 7
11,022,985 UART: [ldev] FE.KEYID = 1
11,035,362 UART: [ldev] Erasing FE.KEYID = 1
14,324,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,616,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,631,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,646,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,660,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,678,590 UART: [ldev] --
16,684,020 UART: [fwproc] Waiting for Commands...
16,686,013 UART: [fwproc] Received command 0x46574c44
16,688,223 UART: [fwproc] Received Image of size 114916 bytes
20,755,822 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,825,794 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,894,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
21,215,570 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
4,126,134 ready_for_fw is high
4,126,566 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,092,427 >>> mbox cmd response: success
23,725,225 UART:
23,725,623 UART: Running Caliptra FMC ...
23,726,748 UART:
23,726,903 UART: [state] CFI Enabled
23,734,825 UART: [fht] FMC Alias Private Key: 7
26,065,351 UART: [art] Extend RT PCRs Done
26,066,590 UART: [art] Lock RT PCRs Done
26,068,193 UART: [art] Populate DV Done
26,073,781 UART: [fht] FMC Alias Private Key: 7
26,075,486 UART: [art] Derive CDI
26,076,231 UART: [art] Store in in slot 0x4
26,118,665 UART: [art] Derive Key Pair
26,119,667 UART: [art] Store priv key in slot 0x5
29,361,197 UART: [art] Derive Key Pair - Done
29,374,201 UART: [art] Signing Cert with AUTHO
29,375,511 UART: RITY.KEYID = 7
31,655,254 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,775 UART: [art] PUB.X = DCEADA8B19C9088CBFF6F69B4A45A5270F8003462277BB6B3D0DBA5093902CF6F7EFFDB4CB7C978C583F3B51A7CCFB44
31,664,031 UART: [art] PUB.Y = AAF763ABC721C5EAC3389D793265E9D4935CFCA61632017DC07821A33D1F7B505E093FB03F9AC7DD3DE0DDC08B21BDF8
31,671,287 UART: [art] SIG.R = 7A2067B632776426A837CF2A6FDE2E389F7A54CAD370163E83ACE93A3F5917E73B031899256D38F88C9E68BA02AA87A4
31,678,701 UART: [art] SIG.S = 2E65C2C4529E9012BA9EC7DD2DF2D14DC21D47F5B481F0DA755D64879F67229DCF27628A98F0B3EA82A80A373AA4366A
32,983,983 UART: Caliptra RT
32,984,708 UART: [state] CFI Enabled
33,102,774 UART: [rt] RT listening for mailbox commands...
33,104,631 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,134,372 UART: [rt]cmd =0x46504c54, len=4
33,135,792 >>> mbox cmd response data (8 bytes)
33,136,742 UART: [rt] FIPS self test
33,137,626 UART: [kat] ++
33,138,069 UART: [kat] sha1
33,142,552 UART: [kat] SHA2-256
33,144,440 UART: [kat] SHA2-384
33,147,407 UART: [kat] SHA2-512-ACC
33,149,658 UART: [kat] ECC-384
36,392,572 UART: [kat] HMAC-384Kdf
36,398,050 UART: Fatal Error: 0x90030002
36,433,304 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,577,635 >>> mbox cmd response: failed
36,578,281 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
36,722,523 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
7,334,491 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
21,274,382 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,230 UART:
192,615 UART: Running Caliptra ROM ...
193,830 UART:
193,989 UART: [state] CFI Enabled
266,145 UART: [state] LifecycleState = Unprovisioned
268,051 UART: [state] DebugLocked = No
270,166 UART: [state] WD Timer not started. Device not locked for debugging
273,577 UART: [kat] SHA2-256
452,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,288 UART: [kat] ++
464,735 UART: [kat] sha1
475,966 UART: [kat] SHA2-256
478,984 UART: [kat] SHA2-384
486,469 UART: [kat] SHA2-512-ACC
489,479 UART: [kat] ECC-384
2,951,290 UART: [kat] HMAC-384Kdf
2,972,846 UART: [kat] LMS
3,502,276 UART: [kat] --
3,505,419 UART: [cold-reset] ++
3,507,567 UART: [fht] FHT @ 0x50003400
3,518,211 UART: [idev] ++
3,518,784 UART: [idev] CDI.KEYID = 6
3,519,769 UART: [idev] SUBJECT.KEYID = 7
3,520,950 UART: [idev] UDS.KEYID = 0
3,521,855 ready_for_fw is high
3,522,062 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,667,022 UART: [idev] Erasing UDS.KEYID = 0
6,027,901 UART: [idev] Sha1 KeyId Algorithm
6,051,887 UART: [idev] --
6,056,163 UART: [ldev] ++
6,056,739 UART: [ldev] CDI.KEYID = 6
6,057,629 UART: [ldev] SUBJECT.KEYID = 5
6,058,844 UART: [ldev] AUTHORITY.KEYID = 7
6,060,080 UART: [ldev] FE.KEYID = 1
6,101,441 UART: [ldev] Erasing FE.KEYID = 1
8,606,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,056 UART: [ldev] --
10,418,108 UART: [fwproc] Wait for Commands...
10,420,419 UART: [fwproc] Recv command 0x46574c44
10,422,518 UART: [fwproc] Recv'd Img size: 115224 bytes
13,837,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,253 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,293,752 >>> mbox cmd response: success
14,298,827 UART: [afmc] ++
14,299,419 UART: [afmc] CDI.KEYID = 6
14,300,333 UART: [afmc] SUBJECT.KEYID = 7
14,301,493 UART: [afmc] AUTHORITY.KEYID = 5
16,831,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,591,510 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,607,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,623,363 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,645,659 UART: [afmc] --
18,648,708 UART: [cold-reset] --
18,652,998 UART: [state] Locking Datavault
18,658,240 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,886 UART: [state] Locking ICCM
18,662,226 UART: [exit] Launching FMC @ 0x40000130
18,670,686 UART:
18,670,935 UART: Running Caliptra FMC ...
18,671,974 UART:
18,672,123 UART: [state] CFI Enabled
18,733,532 UART: [fht] FMC Alias Private Key: 7
20,497,667 UART: [art] Extend RT PCRs Done
20,498,885 UART: [art] Lock RT PCRs Done
20,500,306 UART: [art] Populate DV Done
20,505,885 UART: [fht] FMC Alias Private Key: 7
20,507,628 UART: [art] Derive CDI
20,508,450 UART: [art] Store in in slot 0x4
20,553,534 UART: [art] Derive Key Pair
20,554,528 UART: [art] Store priv key in slot 0x5
23,017,427 UART: [art] Derive Key Pair - Done
23,030,327 UART: [art] Signing Cert with AUTHO
23,031,637 UART: RITY.KEYID = 7
24,743,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,744,822 UART: [art] PUB.X = E61ABB1BE27A24122877BC72C50844A4926C33346B9D9013AD8B4777C4A8E301D11C1CA180EC2D2EF7A7F7109F1B25F6
24,751,915 UART: [art] PUB.Y = 27CAEA43BF56A91B062F28651E196CFF0921DC1FB524CBF36EAA336A52D01B5CC2257B5A240B0B49618F2337F066BE85
24,759,217 UART: [art] SIG.R = E38B6D2B51899891C5FDCC75DF0E361BC96F99CA6C94A17CA73202DEE1EF12E986B95B1D1789EDEDDA976D241F4442CE
24,766,629 UART: [art] SIG.S = 5010A4AB5D0DB98F7E1FB0B90600573C7B1696C7BA4774CC620D994D4710526546B53A455E1A48A7A58952170B0954E2
25,745,218 UART: Caliptra RT
25,745,921 UART: [state] CFI Enabled
25,911,854 UART: [rt] RT listening for mailbox commands...
25,913,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,943,159 UART: [rt]cmd =0x46504c54, len=4
25,944,715 >>> mbox cmd response data (8 bytes)
25,946,057 UART: [rt] FIPS self test
25,947,012 UART: [kat] ++
25,947,464 UART: [kat] sha1
25,951,917 UART: [kat] SHA2-256
25,953,847 UART: [kat] SHA2-384
25,956,646 UART: [kat] SHA2-512-ACC
25,958,882 UART: [kat] ECC-384
28,396,212 UART: [kat] HMAC-384Kdf
28,402,451 UART: Fatal Error: 0x90030002
28,437,854 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,582,514 >>> mbox cmd response: failed
28,583,142 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,728,175 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,024 UART:
190,323 UART: Running Caliptra ROM ...
191,352 UART:
191,489 UART: [state] CFI Enabled
258,457 UART: [state] LifecycleState = Unprovisioned
260,327 UART: [state] DebugLocked = No
262,005 UART: [state] WD Timer not started. Device not locked for debugging
265,203 UART: [kat] SHA2-256
444,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,890 UART: [kat] ++
456,358 UART: [kat] sha1
466,965 UART: [kat] SHA2-256
469,969 UART: [kat] SHA2-384
476,703 UART: [kat] SHA2-512-ACC
479,643 UART: [kat] ECC-384
2,940,945 UART: [kat] HMAC-384Kdf
2,964,129 UART: [kat] LMS
3,493,574 UART: [kat] --
3,497,295 UART: [cold-reset] ++
3,499,446 UART: [fht] FHT @ 0x50003400
3,511,937 UART: [idev] ++
3,512,500 UART: [idev] CDI.KEYID = 6
3,513,379 UART: [idev] SUBJECT.KEYID = 7
3,514,647 UART: [idev] UDS.KEYID = 0
3,516,130 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,661,094 UART: [idev] Erasing UDS.KEYID = 0
6,015,731 UART: [idev] Sha1 KeyId Algorithm
6,039,189 UART: [idev] --
6,042,808 UART: [ldev] ++
6,043,381 UART: [ldev] CDI.KEYID = 6
6,044,291 UART: [ldev] SUBJECT.KEYID = 5
6,045,510 UART: [ldev] AUTHORITY.KEYID = 7
6,046,746 UART: [ldev] FE.KEYID = 1
6,091,963 UART: [ldev] Erasing FE.KEYID = 1
8,592,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,059 UART: [ldev] --
10,403,087 UART: [fwproc] Wait for Commands...
10,405,890 UART: [fwproc] Recv command 0x46574c44
10,408,004 UART: [fwproc] Recv'd Img size: 115224 bytes
13,818,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,150 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,272,553 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,136 UART:
192,513 UART: Running Caliptra ROM ...
193,648 UART:
193,794 UART: [state] CFI Enabled
265,136 UART: [state] LifecycleState = Unprovisioned
267,552 UART: [state] DebugLocked = No
269,160 UART: [state] WD Timer not started. Device not locked for debugging
273,497 UART: [kat] SHA2-256
463,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,145 UART: [kat] ++
474,619 UART: [kat] sha1
485,431 UART: [kat] SHA2-256
488,453 UART: [kat] SHA2-384
493,617 UART: [kat] SHA2-512-ACC
496,218 UART: [kat] ECC-384
2,948,106 UART: [kat] HMAC-384Kdf
2,973,059 UART: [kat] LMS
3,504,842 UART: [kat] --
3,508,790 UART: [cold-reset] ++
3,509,808 UART: [fht] FHT @ 0x50003400
3,521,655 UART: [idev] ++
3,522,367 UART: [idev] CDI.KEYID = 6
3,523,276 UART: [idev] SUBJECT.KEYID = 7
3,524,454 UART: [idev] UDS.KEYID = 0
3,525,380 ready_for_fw is high
3,525,588 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,670,533 UART: [idev] Erasing UDS.KEYID = 0
6,031,596 UART: [idev] Sha1 KeyId Algorithm
6,054,824 UART: [idev] --
6,059,713 UART: [ldev] ++
6,060,401 UART: [ldev] CDI.KEYID = 6
6,061,317 UART: [ldev] SUBJECT.KEYID = 5
6,062,478 UART: [ldev] AUTHORITY.KEYID = 7
6,063,709 UART: [ldev] FE.KEYID = 1
6,101,225 UART: [ldev] Erasing FE.KEYID = 1
8,607,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,586 UART: [ldev] --
10,411,847 UART: [fwproc] Wait for Commands...
10,415,029 UART: [fwproc] Recv command 0x46574c44
10,417,350 UART: [fwproc] Recv'd Img size: 115224 bytes
13,876,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,704 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,616,187 >>> mbox cmd response: success
14,620,940 UART: [afmc] ++
14,621,636 UART: [afmc] CDI.KEYID = 6
14,622,820 UART: [afmc] SUBJECT.KEYID = 7
14,624,305 UART: [afmc] AUTHORITY.KEYID = 5
17,148,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,341 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,925 UART: [afmc] --
18,949,327 UART: [cold-reset] --
18,953,084 UART: [state] Locking Datavault
18,959,381 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,571 UART: [state] Locking ICCM
18,964,477 UART: [exit] Launching FMC @ 0x40000130
18,973,140 UART:
18,973,379 UART: Running Caliptra FMC ...
18,974,482 UART:
18,974,647 UART: [state] CFI Enabled
19,030,287 UART: [fht] FMC Alias Private Key: 7
20,794,295 UART: [art] Extend RT PCRs Done
20,795,521 UART: [art] Lock RT PCRs Done
20,797,117 UART: [art] Populate DV Done
20,802,849 UART: [fht] FMC Alias Private Key: 7
20,804,440 UART: [art] Derive CDI
20,805,177 UART: [art] Store in in slot 0x4
20,862,268 UART: [art] Derive Key Pair
20,863,311 UART: [art] Store priv key in slot 0x5
23,326,588 UART: [art] Derive Key Pair - Done
23,339,855 UART: [art] Signing Cert with AUTHO
23,341,155 UART: RITY.KEYID = 7
25,052,436 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,958 UART: [art] PUB.X = B523333D27C9271E981245261877B0F060DF1F115FB1FE701E5B774934E6CDF5C1781ECDC8CAD7BDE1617797C017B07E
25,061,217 UART: [art] PUB.Y = C1A4ACD70977DDB4D9F4291D1D1B233603C6310611CE3FFEBF6597ACA1AC2191530957CDB2A794C789743751641D4477
25,068,491 UART: [art] SIG.R = B9186A8552CDC713218A22450B49E0E6B19F24DE0B568144181B31F26D346D837C1E9810F3A7D65D66EB1398911F7EA7
25,075,859 UART: [art] SIG.S = 8D38789B42114206FBEDE4A6498089F104A95E730E799E83BCCEFD5F348D5C5A68ED4054C1240CA1AE600FAE77444540
26,054,760 UART: Caliptra RT
26,055,473 UART: [state] CFI Enabled
26,220,911 UART: [rt] RT listening for mailbox commands...
26,222,774 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,252,516 UART: [rt]cmd =0x46504c54, len=4
26,253,983 >>> mbox cmd response data (8 bytes)
26,255,385 UART: [rt] FIPS self test
26,256,334 UART: [kat] ++
26,256,803 UART: [kat] sha1
26,261,366 UART: [kat] SHA2-256
26,263,242 UART: [kat] SHA2-384
26,266,311 UART: [kat] SHA2-512-ACC
26,268,593 UART: [kat] ECC-384
28,706,709 UART: [kat] HMAC-384Kdf
28,733,343 UART: Fatal Error: 0x90030002
28,768,738 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,913,528 >>> mbox cmd response: failed
28,914,185 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,058,682 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,105 UART:
190,401 UART: Running Caliptra ROM ...
191,517 UART:
191,687 UART: [state] CFI Enabled
258,987 UART: [state] LifecycleState = Unprovisioned
261,395 UART: [state] DebugLocked = No
262,715 UART: [state] WD Timer not started. Device not locked for debugging
266,622 UART: [kat] SHA2-256
456,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,254 UART: [kat] ++
467,702 UART: [kat] sha1
479,773 UART: [kat] SHA2-256
482,839 UART: [kat] SHA2-384
488,548 UART: [kat] SHA2-512-ACC
491,146 UART: [kat] ECC-384
2,942,087 UART: [kat] HMAC-384Kdf
2,966,990 UART: [kat] LMS
3,498,753 UART: [kat] --
3,504,657 UART: [cold-reset] ++
3,506,400 UART: [fht] FHT @ 0x50003400
3,517,006 UART: [idev] ++
3,517,691 UART: [idev] CDI.KEYID = 6
3,518,599 UART: [idev] SUBJECT.KEYID = 7
3,519,817 UART: [idev] UDS.KEYID = 0
3,521,327 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,666,192 UART: [idev] Erasing UDS.KEYID = 0
6,024,751 UART: [idev] Sha1 KeyId Algorithm
6,047,558 UART: [idev] --
6,051,879 UART: [ldev] ++
6,052,565 UART: [ldev] CDI.KEYID = 6
6,053,480 UART: [ldev] SUBJECT.KEYID = 5
6,054,640 UART: [ldev] AUTHORITY.KEYID = 7
6,055,885 UART: [ldev] FE.KEYID = 1
6,095,897 UART: [ldev] Erasing FE.KEYID = 1
8,601,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,089 UART: [ldev] --
10,409,306 UART: [fwproc] Wait for Commands...
10,411,441 UART: [fwproc] Recv command 0x46574c44
10,413,764 UART: [fwproc] Recv'd Img size: 115224 bytes
13,873,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,216 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,618,899 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,438,877 ready_for_fw is high
3,439,311 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,750,866 >>> mbox cmd response: success
19,046,800 UART:
19,047,184 UART: Running Caliptra FMC ...
19,048,347 UART:
19,048,506 UART: [state] CFI Enabled
19,113,471 UART: [fht] FMC Alias Private Key: 7
20,877,317 UART: [art] Extend RT PCRs Done
20,878,548 UART: [art] Lock RT PCRs Done
20,880,200 UART: [art] Populate DV Done
20,885,467 UART: [fht] FMC Alias Private Key: 7
20,887,010 UART: [art] Derive CDI
20,887,781 UART: [art] Store in in slot 0x4
20,946,773 UART: [art] Derive Key Pair
20,947,817 UART: [art] Store priv key in slot 0x5
23,410,695 UART: [art] Derive Key Pair - Done
23,423,673 UART: [art] Signing Cert with AUTHO
23,424,983 UART: RITY.KEYID = 7
25,136,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,218 UART: [art] PUB.X = 7201879205F1BD8755F06B7246EB24AF9010D3066560CE1CC1B63688719F46C14097C4048419B92E233BAF93D24F1BCA
25,145,425 UART: [art] PUB.Y = 00D83123E7EAB5790F7CCF62F2950DA1C96C42F5CA063F627E9808A5C7BAFBFFF5841DFE41289203E2C023C8D2BED3AE
25,152,687 UART: [art] SIG.R = CFE2D701288232BADDC7BD2586570A3129D6D9472A0CC3E23BEBC94BA9BFA481CA2BAFC448BFACB3E4F7065AEC10ED8C
25,160,080 UART: [art] SIG.S = 6949284178329A0701970781986A771514995AE90FB45C0992CE371C7A216FA5C54CFCBA258270DBBA1C6B4979EF8B6D
26,139,248 UART: Caliptra RT
26,139,959 UART: [state] CFI Enabled
26,304,873 UART: [rt] RT listening for mailbox commands...
26,306,733 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,336,512 UART: [rt]cmd =0x46504c54, len=4
26,338,253 >>> mbox cmd response data (8 bytes)
26,339,413 UART: [rt] FIPS self test
26,340,352 UART: [kat] ++
26,340,801 UART: [kat] sha1
26,345,275 UART: [kat] SHA2-256
26,347,203 UART: [kat] SHA2-384
26,350,009 UART: [kat] SHA2-512-ACC
26,352,261 UART: [kat] ECC-384
28,790,528 UART: [kat] HMAC-384Kdf
28,796,121 UART: Fatal Error: 0x90030002
28,831,349 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,976,119 >>> mbox cmd response: failed
28,976,711 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,121,352 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,433,233 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,736,342 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,555 UART:
192,917 UART: Running Caliptra ROM ...
194,118 UART:
603,656 UART: [state] CFI Enabled
616,548 UART: [state] LifecycleState = Unprovisioned
618,894 UART: [state] DebugLocked = No
620,932 UART: [state] WD Timer not started. Device not locked for debugging
624,838 UART: [kat] SHA2-256
814,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,503 UART: [kat] ++
826,112 UART: [kat] sha1
837,423 UART: [kat] SHA2-256
840,432 UART: [kat] SHA2-384
847,135 UART: [kat] SHA2-512-ACC
849,727 UART: [kat] ECC-384
3,290,873 UART: [kat] HMAC-384Kdf
3,303,884 UART: [kat] LMS
3,835,691 UART: [kat] --
3,839,973 UART: [cold-reset] ++
3,842,621 UART: [fht] FHT @ 0x50003400
3,855,236 UART: [idev] ++
3,855,952 UART: [idev] CDI.KEYID = 6
3,856,866 UART: [idev] SUBJECT.KEYID = 7
3,858,114 UART: [idev] UDS.KEYID = 0
3,859,061 ready_for_fw is high
3,859,269 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,004,341 UART: [idev] Erasing UDS.KEYID = 0
6,336,168 UART: [idev] Sha1 KeyId Algorithm
6,358,765 UART: [idev] --
6,364,062 UART: [ldev] ++
6,364,754 UART: [ldev] CDI.KEYID = 6
6,365,672 UART: [ldev] SUBJECT.KEYID = 5
6,366,829 UART: [ldev] AUTHORITY.KEYID = 7
6,368,059 UART: [ldev] FE.KEYID = 1
6,378,086 UART: [ldev] Erasing FE.KEYID = 1
8,856,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,864 UART: [ldev] --
10,646,564 UART: [fwproc] Wait for Commands...
10,649,092 UART: [fwproc] Recv command 0x46574c44
10,651,409 UART: [fwproc] Recv'd Img size: 115224 bytes
14,105,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,404 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,847,578 >>> mbox cmd response: success
14,851,802 UART: [afmc] ++
14,852,507 UART: [afmc] CDI.KEYID = 6
14,853,746 UART: [afmc] SUBJECT.KEYID = 7
14,855,175 UART: [afmc] AUTHORITY.KEYID = 5
17,359,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,614 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,349 UART: [afmc] --
19,155,481 UART: [cold-reset] --
19,160,592 UART: [state] Locking Datavault
19,165,408 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,594 UART: [state] Locking ICCM
19,169,528 UART: [exit] Launching FMC @ 0x40000130
19,178,193 UART:
19,178,474 UART: Running Caliptra FMC ...
19,179,586 UART:
19,179,754 UART: [state] CFI Enabled
19,187,857 UART: [fht] FMC Alias Private Key: 7
20,945,136 UART: [art] Extend RT PCRs Done
20,946,357 UART: [art] Lock RT PCRs Done
20,948,095 UART: [art] Populate DV Done
20,953,476 UART: [fht] FMC Alias Private Key: 7
20,955,176 UART: [art] Derive CDI
20,955,990 UART: [art] Store in in slot 0x4
20,998,743 UART: [art] Derive Key Pair
20,999,751 UART: [art] Store priv key in slot 0x5
23,426,255 UART: [art] Derive Key Pair - Done
23,439,248 UART: [art] Signing Cert with AUTHO
23,440,558 UART: RITY.KEYID = 7
25,146,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,700 UART: [art] PUB.X = B1B75A6639254A00DBF949C6FA63FD31DCBFB60E9C8364C189C8FA38A455879A805895146F403E3C825BFF19BBEF20B3
25,154,958 UART: [art] PUB.Y = F49B38A78FEED079CD420FA0919ADB296BF42BABDCF7D74D3955FE1E4843176AFA95C980C161BAC1A78D7C0B29A01B5B
25,162,245 UART: [art] SIG.R = 6D874420E7B8491BA4AE824E0164F8466E291D0DB037704D2B0C1E93A43A994A4DE03D5BB5F1AE4C8EF33018E5370835
25,169,637 UART: [art] SIG.S = ACD5EAA2E9114D4653C52482A9B8D6D1872D12599949D29701CDA6831F4960B9F3428E1A7C08BCCB052D4AAAA2A1BCC0
26,148,361 UART: Caliptra RT
26,149,052 UART: [state] CFI Enabled
26,266,109 UART: [rt] RT listening for mailbox commands...
26,267,970 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,297,545 UART: [rt]cmd =0x46504c54, len=4
26,299,157 >>> mbox cmd response data (8 bytes)
26,300,501 UART: [rt] FIPS self test
26,301,447 UART: [kat] ++
26,301,906 UART: [kat] sha1
26,306,469 UART: [kat] SHA2-256
26,308,398 UART: [kat] SHA2-384
26,311,192 UART: [kat] SHA2-512-ACC
26,313,481 UART: [kat] ECC-384
28,740,919 UART: [kat] HMAC-384Kdf
28,746,344 UART: Fatal Error: 0x90030002
28,781,733 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,926,370 >>> mbox cmd response: failed
28,927,003 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,072,059 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,127 UART:
190,416 UART: Running Caliptra ROM ...
191,526 UART:
11,468,208 UART: [state] CFI Enabled
11,482,035 UART: [state] LifecycleState = Unprovisioned
11,484,451 UART: [state] DebugLocked = No
11,486,970 UART: [state] WD Timer not started. Device not locked for debugging
11,492,277 UART: [kat] SHA2-256
11,682,160 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,692,930 UART: [kat] ++
11,693,471 UART: [kat] sha1
11,705,274 UART: [kat] SHA2-256
11,708,287 UART: [kat] SHA2-384
11,714,608 UART: [kat] SHA2-512-ACC
11,717,191 UART: [kat] ECC-384
14,156,232 UART: [kat] HMAC-384Kdf
14,169,110 UART: [kat] LMS
14,700,945 UART: [kat] --
14,705,760 UART: [cold-reset] ++
14,707,695 UART: [fht] FHT @ 0x50003400
14,718,948 UART: [idev] ++
14,719,619 UART: [idev] CDI.KEYID = 6
14,720,560 UART: [idev] SUBJECT.KEYID = 7
14,721,767 UART: [idev] UDS.KEYID = 0
14,723,299 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,868,046 UART: [idev] Erasing UDS.KEYID = 0
17,197,706 UART: [idev] Sha1 KeyId Algorithm
17,219,365 UART: [idev] --
17,224,267 UART: [ldev] ++
17,224,984 UART: [ldev] CDI.KEYID = 6
17,226,075 UART: [ldev] SUBJECT.KEYID = 5
17,227,187 UART: [ldev] AUTHORITY.KEYID = 7
17,228,366 UART: [ldev] FE.KEYID = 1
17,238,912 UART: [ldev] Erasing FE.KEYID = 1
19,718,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,439,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,454,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,470,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,485,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,506,743 UART: [ldev] --
21,511,524 UART: [fwproc] Wait for Commands...
21,513,243 UART: [fwproc] Recv command 0x46574c44
21,515,505 UART: [fwproc] Recv'd Img size: 115224 bytes
24,970,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,048,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,164,597 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
25,711,885 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,751,852 ready_for_fw is high
3,752,297 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,958,473 >>> mbox cmd response: success
19,213,133 UART:
19,213,513 UART: Running Caliptra FMC ...
19,214,721 UART:
19,214,891 UART: [state] CFI Enabled
19,222,775 UART: [fht] FMC Alias Private Key: 7
20,979,631 UART: [art] Extend RT PCRs Done
20,980,859 UART: [art] Lock RT PCRs Done
20,982,434 UART: [art] Populate DV Done
20,987,797 UART: [fht] FMC Alias Private Key: 7
20,989,448 UART: [art] Derive CDI
20,990,284 UART: [art] Store in in slot 0x4
21,033,422 UART: [art] Derive Key Pair
21,034,418 UART: [art] Store priv key in slot 0x5
23,461,380 UART: [art] Derive Key Pair - Done
23,474,490 UART: [art] Signing Cert with AUTHO
23,475,795 UART: RITY.KEYID = 7
25,181,227 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,739 UART: [art] PUB.X = A9C8E0C90E9516FB3F4E0897CACDF71E58B626788ABEDEE73ABD00018A7F90969984EC2E30D51FE5A43E0D17C14E96AD
25,190,006 UART: [art] PUB.Y = B74E7B3070C1CC1FE63C57188B0801ED9C4266180560B1F65076498675B64E4AA8C45C630B1D2793714981B303B5A20E
25,197,215 UART: [art] SIG.R = 8CA47A5EF9FAAA17B08C2E6A8CC9291ADE1940E3DA335F911FA491B3E99DA9C96DDC41206341CA2552B5EF34600351AB
25,204,643 UART: [art] SIG.S = E3BAFE55388FCB5F8BD6ABF4EF8B4AC355FE855F5AF47228A2755D973A12441E34575B01967EA19EAEB15115ACB721E8
26,184,060 UART: Caliptra RT
26,184,782 UART: [state] CFI Enabled
26,301,746 UART: [rt] RT listening for mailbox commands...
26,303,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,333,106 UART: [rt]cmd =0x46504c54, len=4
26,334,790 >>> mbox cmd response data (8 bytes)
26,335,627 UART: [rt] FIPS self test
26,336,574 UART: [kat] ++
26,337,028 UART: [kat] sha1
26,341,488 UART: [kat] SHA2-256
26,343,416 UART: [kat] SHA2-384
26,346,155 UART: [kat] SHA2-512-ACC
26,348,403 UART: [kat] ECC-384
28,776,179 UART: [kat] HMAC-384Kdf
28,781,652 UART: Fatal Error: 0x90030002
28,817,040 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,961,820 >>> mbox cmd response: failed
28,962,470 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,106,955 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
14,579,573 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
25,793,503 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,485 UART: [kat] SHA2-256
882,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,531 UART: [kat] ++
886,683 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,646 UART: [kat] SHA2-512-ACC
897,547 UART: [kat] ECC-384
903,294 UART: [kat] HMAC-384Kdf
907,804 UART: [kat] LMS
1,476,000 UART: [kat] --
1,476,681 UART: [cold-reset] ++
1,477,243 UART: [fht] Storing FHT @ 0x50003400
1,479,828 UART: [idev] ++
1,479,996 UART: [idev] CDI.KEYID = 6
1,480,356 UART: [idev] SUBJECT.KEYID = 7
1,480,780 UART: [idev] UDS.KEYID = 0
1,481,125 ready_for_fw is high
1,481,125 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,648 UART: [idev] Erasing UDS.KEYID = 0
1,505,384 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,930 UART: [idev] --
1,514,973 UART: [ldev] ++
1,515,141 UART: [ldev] CDI.KEYID = 6
1,515,504 UART: [ldev] SUBJECT.KEYID = 5
1,515,930 UART: [ldev] AUTHORITY.KEYID = 7
1,516,393 UART: [ldev] FE.KEYID = 1
1,521,413 UART: [ldev] Erasing FE.KEYID = 1
1,546,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,274 UART: [ldev] --
1,585,585 UART: [fwproc] Waiting for Commands...
1,586,220 UART: [fwproc] Received command 0x46574c44
1,587,011 UART: [fwproc] Received Image of size 115224 bytes
2,894,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,379 >>> mbox cmd response: success
3,089,443 UART: [afmc] ++
3,089,611 UART: [afmc] CDI.KEYID = 6
3,089,973 UART: [afmc] SUBJECT.KEYID = 7
3,090,398 UART: [afmc] AUTHORITY.KEYID = 5
3,125,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,776 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,466 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,259 UART: [afmc] --
3,168,221 UART: [cold-reset] --
3,169,049 UART: [state] Locking Datavault
3,170,068 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,672 UART: [state] Locking ICCM
3,171,304 UART: [exit] Launching FMC @ 0x40000130
3,176,633 UART:
3,176,649 UART: Running Caliptra FMC ...
3,177,057 UART:
3,177,111 UART: [state] CFI Enabled
3,187,674 UART: [fht] FMC Alias Private Key: 7
3,295,741 UART: [art] Extend RT PCRs Done
3,296,169 UART: [art] Lock RT PCRs Done
3,297,967 UART: [art] Populate DV Done
3,305,934 UART: [fht] FMC Alias Private Key: 7
3,306,908 UART: [art] Derive CDI
3,307,188 UART: [art] Store in in slot 0x4
3,392,553 UART: [art] Derive Key Pair
3,392,913 UART: [art] Store priv key in slot 0x5
3,405,711 UART: [art] Derive Key Pair - Done
3,420,886 UART: [art] Signing Cert with AUTHO
3,421,366 UART: RITY.KEYID = 7
3,436,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,407 UART: [art] PUB.X = 3BBF8126C02DF6D6D96B03AE5538ECE5A5F205918F5A334309DB433AAA0AEE047C3D39B1AB8C0E30AB9AECA79BFB6754
3,444,181 UART: [art] PUB.Y = 58096F119D27231F3F8DBEDE1699B5DCD275E82359298B8C3F942C1BB7109304A2A5FBB6138ADD260E461ADD39BB8278
3,451,128 UART: [art] SIG.R = 2788D30A932314BDADABF5D296A1406D06550F00986669E9E53CDDF0D101233E9AF54EBC747EF72B6E556AD8792A5B04
3,457,867 UART: [art] SIG.S = 59B81164D12A4C426E9898E87BA7CC319E5C0F195BEE0B024F8F8B66CFA98D2A51738006C3C218DEF7F931B2A80CFEAC
3,482,051 UART: Caliptra RT
3,482,305 UART: [state] CFI Enabled
3,590,742 UART: [rt] RT listening for mailbox commands...
3,591,405 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,991 UART: [rt]cmd =0x46504c54, len=4
3,622,193 >>> mbox cmd response data (8 bytes)
3,622,316 UART: [rt] FIPS self test
3,622,644 UART: [kat] ++
3,622,796 UART: [kat] sha1
3,626,930 UART: [kat] SHA2-256
3,628,952 UART: [kat] SHA2-384
3,631,705 UART: [kat] SHA2-512-ACC
3,633,632 UART: [kat] ECC-384
3,643,842 UART: [kat] HMAC-384Kdf
3,648,204 UART: Fatal Error: 0x90030002
3,649,754 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,649,759 >>> mbox cmd response: failed
3,649,759 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,649,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,695 UART: [kat] SHA2-256
892,633 UART: [kat] SHA2-384
895,628 UART: [kat] SHA2-512-ACC
897,529 UART: [kat] ECC-384
902,934 UART: [kat] HMAC-384Kdf
907,678 UART: [kat] LMS
1,475,874 UART: [kat] --
1,477,019 UART: [cold-reset] ++
1,477,555 UART: [fht] Storing FHT @ 0x50003400
1,480,312 UART: [idev] ++
1,480,480 UART: [idev] CDI.KEYID = 6
1,480,840 UART: [idev] SUBJECT.KEYID = 7
1,481,264 UART: [idev] UDS.KEYID = 0
1,481,609 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,486 UART: [idev] Erasing UDS.KEYID = 0
1,506,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,854 UART: [idev] --
1,515,905 UART: [ldev] ++
1,516,073 UART: [ldev] CDI.KEYID = 6
1,516,436 UART: [ldev] SUBJECT.KEYID = 5
1,516,862 UART: [ldev] AUTHORITY.KEYID = 7
1,517,325 UART: [ldev] FE.KEYID = 1
1,522,453 UART: [ldev] Erasing FE.KEYID = 1
1,547,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,464 UART: [ldev] --
1,586,845 UART: [fwproc] Waiting for Commands...
1,587,496 UART: [fwproc] Received command 0x46574c44
1,588,287 UART: [fwproc] Received Image of size 115224 bytes
2,896,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,074 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,426 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,601 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,001 ready_for_fw is high
1,363,001 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,937,723 >>> mbox cmd response: success
2,998,915 UART:
2,998,931 UART: Running Caliptra FMC ...
2,999,339 UART:
2,999,393 UART: [state] CFI Enabled
3,010,218 UART: [fht] FMC Alias Private Key: 7
3,117,687 UART: [art] Extend RT PCRs Done
3,118,115 UART: [art] Lock RT PCRs Done
3,119,291 UART: [art] Populate DV Done
3,127,660 UART: [fht] FMC Alias Private Key: 7
3,128,668 UART: [art] Derive CDI
3,128,948 UART: [art] Store in in slot 0x4
3,214,853 UART: [art] Derive Key Pair
3,215,213 UART: [art] Store priv key in slot 0x5
3,229,275 UART: [art] Derive Key Pair - Done
3,244,124 UART: [art] Signing Cert with AUTHO
3,244,604 UART: RITY.KEYID = 7
3,260,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,153 UART: [art] PUB.X = 38649BCBF242030926241EFDC303A57CB4122807961D309813B9DCFFC2D3BA6D35C722F1C7039A2F7D262092E84249AC
3,267,908 UART: [art] PUB.Y = 941C7AAF7E862093395E03736C19567668139EFD4D7B1FC3E8553C821CCFF99130E7E15CC81D63F6A26DDF9D867F2048
3,274,857 UART: [art] SIG.R = D02705F8434F827C0B04863A07722D66AABB506CD8505DF695BFC53BF78623DD9799E30C6A5F9369627133DC1C608D75
3,281,610 UART: [art] SIG.S = 831F884B3333ACB1B22F49D05BC00955B9A809D6DCEC0A954EC5FF9F8494DAA86F0E9CDE2E880D2E93149EBD6262AF37
3,305,890 UART: Caliptra RT
3,306,144 UART: [state] CFI Enabled
3,414,243 UART: [rt] RT listening for mailbox commands...
3,414,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,124 UART: [rt]cmd =0x46504c54, len=4
3,445,486 >>> mbox cmd response data (8 bytes)
3,445,775 UART: [rt] FIPS self test
3,446,103 UART: [kat] ++
3,446,255 UART: [kat] sha1
3,450,521 UART: [kat] SHA2-256
3,452,543 UART: [kat] SHA2-384
3,455,380 UART: [kat] SHA2-512-ACC
3,457,307 UART: [kat] ECC-384
3,467,347 UART: [kat] HMAC-384Kdf
3,471,931 UART: Fatal Error: 0x90030002
3,473,481 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,473,486 >>> mbox cmd response: failed
3,473,486 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,473,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,705 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,941,715 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,689 UART: [kat] SHA2-512-ACC
897,590 UART: [kat] ECC-384
903,501 UART: [kat] HMAC-384Kdf
907,909 UART: [kat] LMS
1,476,105 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,709 UART: [idev] Erasing UDS.KEYID = 0
1,505,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,921 UART: [idev] --
1,514,748 UART: [ldev] ++
1,514,916 UART: [ldev] CDI.KEYID = 6
1,515,279 UART: [ldev] SUBJECT.KEYID = 5
1,515,705 UART: [ldev] AUTHORITY.KEYID = 7
1,516,168 UART: [ldev] FE.KEYID = 1
1,521,338 UART: [ldev] Erasing FE.KEYID = 1
1,546,851 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,855 UART: [ldev] --
1,586,134 UART: [fwproc] Waiting for Commands...
1,586,833 UART: [fwproc] Received command 0x46574c44
1,587,624 UART: [fwproc] Received Image of size 115224 bytes
2,895,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,993 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,642 >>> mbox cmd response: success
3,089,770 UART: [afmc] ++
3,089,938 UART: [afmc] CDI.KEYID = 6
3,090,300 UART: [afmc] SUBJECT.KEYID = 7
3,090,725 UART: [afmc] AUTHORITY.KEYID = 5
3,126,102 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,706 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,099 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,789 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,828 UART: [afmc] --
3,169,880 UART: [cold-reset] --
3,170,510 UART: [state] Locking Datavault
3,171,807 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,411 UART: [state] Locking ICCM
3,173,075 UART: [exit] Launching FMC @ 0x40000130
3,178,404 UART:
3,178,420 UART: Running Caliptra FMC ...
3,178,828 UART:
3,178,971 UART: [state] CFI Enabled
3,189,826 UART: [fht] FMC Alias Private Key: 7
3,298,229 UART: [art] Extend RT PCRs Done
3,298,657 UART: [art] Lock RT PCRs Done
3,300,143 UART: [art] Populate DV Done
3,308,478 UART: [fht] FMC Alias Private Key: 7
3,309,638 UART: [art] Derive CDI
3,309,918 UART: [art] Store in in slot 0x4
3,395,639 UART: [art] Derive Key Pair
3,395,999 UART: [art] Store priv key in slot 0x5
3,409,171 UART: [art] Derive Key Pair - Done
3,424,036 UART: [art] Signing Cert with AUTHO
3,424,516 UART: RITY.KEYID = 7
3,439,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,559 UART: [art] PUB.X = 880EA06AF92AB5C68A80F5F3D4326A6C342D2D6EA71DB675A5E9E6EC99FC301B800F8F0C9949E67D2E62BA6B02755C9E
3,447,331 UART: [art] PUB.Y = 6178EF768F7F43240B12DA263169341F687FED36CF6AD4993D4456843D52D67952A3ED35661B565EACB5C19B848DFC99
3,454,278 UART: [art] SIG.R = B572F86C70B4E165A7EF82C22DDC793F689454F64C2EB6DADAC94B5EA1AC55025C5557E9CD1B3E862594B0B7E1C08D7C
3,461,061 UART: [art] SIG.S = DF675C4C4922994050C217F383B531E5953F77E9E7F5E33701DA7A1D679F9C575479F98552887EB29515B4881599EB17
3,484,663 UART: Caliptra RT
3,485,009 UART: [state] CFI Enabled
3,594,242 UART: [rt] RT listening for mailbox commands...
3,594,905 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,505 UART: [rt]cmd =0x46504c54, len=4
3,625,645 >>> mbox cmd response data (8 bytes)
3,626,010 UART: [rt] FIPS self test
3,626,338 UART: [kat] ++
3,626,490 UART: [kat] sha1
3,630,750 UART: [kat] SHA2-256
3,632,772 UART: [kat] SHA2-384
3,635,743 UART: [kat] SHA2-512-ACC
3,637,670 UART: [kat] ECC-384
3,647,824 UART: [kat] HMAC-384Kdf
3,652,462 UART: Fatal Error: 0x90030002
3,654,012 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,654,017 >>> mbox cmd response: failed
3,654,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,654,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,848 UART: [kat] SHA2-256
892,786 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,325 UART: [kat] LMS
1,475,521 UART: [kat] --
1,476,250 UART: [cold-reset] ++
1,476,768 UART: [fht] Storing FHT @ 0x50003400
1,479,643 UART: [idev] ++
1,479,811 UART: [idev] CDI.KEYID = 6
1,480,171 UART: [idev] SUBJECT.KEYID = 7
1,480,595 UART: [idev] UDS.KEYID = 0
1,480,940 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,407 UART: [idev] Erasing UDS.KEYID = 0
1,505,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,037 UART: [idev] --
1,515,118 UART: [ldev] ++
1,515,286 UART: [ldev] CDI.KEYID = 6
1,515,649 UART: [ldev] SUBJECT.KEYID = 5
1,516,075 UART: [ldev] AUTHORITY.KEYID = 7
1,516,538 UART: [ldev] FE.KEYID = 1
1,521,774 UART: [ldev] Erasing FE.KEYID = 1
1,547,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,641 UART: [ldev] --
1,587,128 UART: [fwproc] Waiting for Commands...
1,587,995 UART: [fwproc] Received command 0x46574c44
1,588,786 UART: [fwproc] Received Image of size 115224 bytes
2,896,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,663 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,124 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,536 ready_for_fw is high
1,363,536 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,290 >>> mbox cmd response: success
3,000,660 UART:
3,000,676 UART: Running Caliptra FMC ...
3,001,084 UART:
3,001,227 UART: [state] CFI Enabled
3,012,162 UART: [fht] FMC Alias Private Key: 7
3,120,155 UART: [art] Extend RT PCRs Done
3,120,583 UART: [art] Lock RT PCRs Done
3,122,071 UART: [art] Populate DV Done
3,130,150 UART: [fht] FMC Alias Private Key: 7
3,131,218 UART: [art] Derive CDI
3,131,498 UART: [art] Store in in slot 0x4
3,216,999 UART: [art] Derive Key Pair
3,217,359 UART: [art] Store priv key in slot 0x5
3,230,191 UART: [art] Derive Key Pair - Done
3,244,688 UART: [art] Signing Cert with AUTHO
3,245,168 UART: RITY.KEYID = 7
3,260,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,425 UART: [art] PUB.X = 3001C77E0F1A51439DA068FC6CF98049EA595274A89B2E02505ECAFFB347B9BFDDAB63B58B383B9109E31CA825B16E53
3,268,193 UART: [art] PUB.Y = 14566E246C47043578278576CD198A1046F78D98C6217829FB4E36E2BD532AA418E4F31B4DD168EA5DFC2FB1CFE7A951
3,275,142 UART: [art] SIG.R = B82FF2E1A52C4065B7B7176DFC7024982CDDAAE34FD2B71264307E7EFDAE268991DF24253E7B265BF363CF4087BC4617
3,281,922 UART: [art] SIG.S = 881F30859DF9F00DBE268CF1A9E5C4BBF88066473E3B664C42490EC8C02521B1D0445AB6EF7048CED1B85497FC3BD0C2
3,305,981 UART: Caliptra RT
3,306,327 UART: [state] CFI Enabled
3,414,768 UART: [rt] RT listening for mailbox commands...
3,415,431 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,815 UART: [rt]cmd =0x46504c54, len=4
3,445,915 >>> mbox cmd response data (8 bytes)
3,446,048 UART: [rt] FIPS self test
3,446,376 UART: [kat] ++
3,446,528 UART: [kat] sha1
3,450,574 UART: [kat] SHA2-256
3,452,596 UART: [kat] SHA2-384
3,455,345 UART: [kat] SHA2-512-ACC
3,457,272 UART: [kat] ECC-384
3,467,372 UART: [kat] HMAC-384Kdf
3,472,124 UART: Fatal Error: 0x90030002
3,473,674 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,473,679 >>> mbox cmd response: failed
3,473,679 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,473,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,168 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,232 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
893,478 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,603 UART: [kat] ++
897,755 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
922,878 UART: [kat] LMS
1,171,206 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 ready_for_fw is high
1,176,419 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,162 UART: [idev] Erasing UDS.KEYID = 0
1,200,895 UART: [idev] Sha1 KeyId Algorithm
1,209,131 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,995 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46574c44
1,283,810 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,983 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,126 >>> mbox cmd response: success
2,786,268 UART: [afmc] ++
2,786,436 UART: [afmc] CDI.KEYID = 6
2,786,798 UART: [afmc] SUBJECT.KEYID = 7
2,787,223 UART: [afmc] AUTHORITY.KEYID = 5
2,822,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,617 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,345 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,949 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,661 UART: [afmc] --
2,865,715 UART: [cold-reset] --
2,866,463 UART: [state] Locking Datavault
2,867,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,492 UART: [state] Locking ICCM
2,869,004 UART: [exit] Launching FMC @ 0x40000130
2,874,333 UART:
2,874,349 UART: Running Caliptra FMC ...
2,874,757 UART:
2,874,811 UART: [state] CFI Enabled
2,885,348 UART: [fht] FMC Alias Private Key: 7
2,993,219 UART: [art] Extend RT PCRs Done
2,993,647 UART: [art] Lock RT PCRs Done
2,995,169 UART: [art] Populate DV Done
3,003,260 UART: [fht] FMC Alias Private Key: 7
3,004,204 UART: [art] Derive CDI
3,004,484 UART: [art] Store in in slot 0x4
3,090,391 UART: [art] Derive Key Pair
3,090,751 UART: [art] Store priv key in slot 0x5
3,104,119 UART: [art] Derive Key Pair - Done
3,119,131 UART: [art] Signing Cert with AUTHO
3,119,611 UART: RITY.KEYID = 7
3,135,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,766 UART: [art] PUB.X = 7DA1B6FF565E2C692051DA0E966313EDE80A2DEFEA19A5570B3BBAB5109D4967895C3AACF19304581973CDC8981B1F13
3,142,534 UART: [art] PUB.Y = 5AA84CCC9C4ADA7CB4DEC137EB15F5A7F218FFA7C1C825A6F5832B86B6FC084D3041A4FC98D63ECCB88F9ACD5B84FF90
3,149,511 UART: [art] SIG.R = 26410CC1BA090DEC44C852937C6DF0754CC04A0B79A5DB171330FC19D7978FE3C6AD81182951525830415B42D20F7115
3,156,262 UART: [art] SIG.S = A7D5381FD0117C51A722C5DC4A380733FA6667A68A18D7EA7F080721E36377287DDE4851979E79676D407014DF3AFEA5
3,180,308 UART: Caliptra RT
3,180,562 UART: [state] CFI Enabled
3,287,824 UART: [rt] RT listening for mailbox commands...
3,288,487 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,039 UART: [rt]cmd =0x46504c54, len=4
3,319,093 >>> mbox cmd response data (8 bytes)
3,319,214 UART: [rt] FIPS self test
3,319,542 UART: [kat] ++
3,319,694 UART: [kat] sha1
3,323,768 UART: [kat] SHA2-256
3,325,790 UART: [kat] SHA2-384
3,328,781 UART: [kat] SHA2-512-ACC
3,330,708 UART: [kat] ECC-384
3,340,732 UART: [kat] HMAC-384Kdf
3,345,336 UART: Fatal Error: 0x90030002
3,346,886 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,346,891 >>> mbox cmd response: failed
3,346,891 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,346,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
893,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,735 UART: [kat] ++
897,887 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
906,948 UART: [kat] SHA2-512-ACC
908,849 UART: [kat] ECC-384
918,758 UART: [kat] HMAC-384Kdf
923,332 UART: [kat] LMS
1,171,660 UART: [kat] --
1,172,615 UART: [cold-reset] ++
1,172,955 UART: [fht] FHT @ 0x50003400
1,175,662 UART: [idev] ++
1,175,830 UART: [idev] CDI.KEYID = 6
1,176,190 UART: [idev] SUBJECT.KEYID = 7
1,176,614 UART: [idev] UDS.KEYID = 0
1,176,959 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,185,236 UART: [idev] Erasing UDS.KEYID = 0
1,201,863 UART: [idev] Sha1 KeyId Algorithm
1,210,257 UART: [idev] --
1,211,329 UART: [ldev] ++
1,211,497 UART: [ldev] CDI.KEYID = 6
1,211,860 UART: [ldev] SUBJECT.KEYID = 5
1,212,286 UART: [ldev] AUTHORITY.KEYID = 7
1,212,749 UART: [ldev] FE.KEYID = 1
1,217,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,424 UART: [fwproc] Wait for Commands...
1,283,002 UART: [fwproc] Recv command 0x46574c44
1,283,730 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,077 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,278 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,723 ready_for_fw is high
1,059,723 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,689 >>> mbox cmd response: success
2,699,505 UART:
2,699,521 UART: Running Caliptra FMC ...
2,699,929 UART:
2,699,983 UART: [state] CFI Enabled
2,710,340 UART: [fht] FMC Alias Private Key: 7
2,818,475 UART: [art] Extend RT PCRs Done
2,818,903 UART: [art] Lock RT PCRs Done
2,820,295 UART: [art] Populate DV Done
2,828,424 UART: [fht] FMC Alias Private Key: 7
2,829,364 UART: [art] Derive CDI
2,829,644 UART: [art] Store in in slot 0x4
2,915,511 UART: [art] Derive Key Pair
2,915,871 UART: [art] Store priv key in slot 0x5
2,929,199 UART: [art] Derive Key Pair - Done
2,943,606 UART: [art] Signing Cert with AUTHO
2,944,086 UART: RITY.KEYID = 7
2,959,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,239 UART: [art] PUB.X = 43A4E3961C26896F4D319C276827452A6A524C6266F5E563FC2E654EF206A246255D9ABFADD2E5E14C419F6091C3D19E
2,967,006 UART: [art] PUB.Y = 9E4FB2AC5E0299B0899924D5D23A6A67B0B1B1C9EAC0DC43E73F12A1B763883380CD24460A6EFCA4B7D2D33DEC1974D5
2,973,964 UART: [art] SIG.R = 7843D4398949A249BDD5B837F3EC90C6B430089E5E0EAD5A75F269BDFC4A4C6E43FC53C70163DE8F2CAD777BC893F9E8
2,980,739 UART: [art] SIG.S = 9BBF2D6DAF23AA64414E1371D4F6C0545F10807EDE2244574EA6FE251FB3E011D71E9E7A58B1F50B839D6F6D2056B6C4
3,004,889 UART: Caliptra RT
3,005,143 UART: [state] CFI Enabled
3,113,631 UART: [rt] RT listening for mailbox commands...
3,114,294 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,646 UART: [rt]cmd =0x46504c54, len=4
3,144,794 >>> mbox cmd response data (8 bytes)
3,144,949 UART: [rt] FIPS self test
3,145,277 UART: [kat] ++
3,145,429 UART: [kat] sha1
3,149,761 UART: [kat] SHA2-256
3,151,783 UART: [kat] SHA2-384
3,154,520 UART: [kat] SHA2-512-ACC
3,156,447 UART: [kat] ECC-384
3,166,603 UART: [kat] HMAC-384Kdf
3,171,151 UART: Fatal Error: 0x90030002
3,172,701 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,172,706 >>> mbox cmd response: failed
3,172,706 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,172,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,449 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,577 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
893,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,860 UART: [kat] ++
898,012 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
919,075 UART: [kat] HMAC-384Kdf
923,691 UART: [kat] LMS
1,172,019 UART: [kat] --
1,172,992 UART: [cold-reset] ++
1,173,412 UART: [fht] FHT @ 0x50003400
1,176,057 UART: [idev] ++
1,176,225 UART: [idev] CDI.KEYID = 6
1,176,585 UART: [idev] SUBJECT.KEYID = 7
1,177,009 UART: [idev] UDS.KEYID = 0
1,177,354 ready_for_fw is high
1,177,354 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,185,071 UART: [idev] Erasing UDS.KEYID = 0
1,202,530 UART: [idev] Sha1 KeyId Algorithm
1,211,216 UART: [idev] --
1,212,418 UART: [ldev] ++
1,212,586 UART: [ldev] CDI.KEYID = 6
1,212,949 UART: [ldev] SUBJECT.KEYID = 5
1,213,375 UART: [ldev] AUTHORITY.KEYID = 7
1,213,838 UART: [ldev] FE.KEYID = 1
1,219,040 UART: [ldev] Erasing FE.KEYID = 1
1,244,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,498 UART: [ldev] --
1,283,885 UART: [fwproc] Wait for Commands...
1,284,701 UART: [fwproc] Recv command 0x46574c44
1,285,429 UART: [fwproc] Recv'd Img size: 115224 bytes
2,594,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,616 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,793 >>> mbox cmd response: success
2,788,913 UART: [afmc] ++
2,789,081 UART: [afmc] CDI.KEYID = 6
2,789,443 UART: [afmc] SUBJECT.KEYID = 7
2,789,868 UART: [afmc] AUTHORITY.KEYID = 5
2,825,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,406 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,019 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,738 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,610 UART: [afmc] --
2,868,668 UART: [cold-reset] --
2,869,544 UART: [state] Locking Datavault
2,870,673 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,277 UART: [state] Locking ICCM
2,871,739 UART: [exit] Launching FMC @ 0x40000130
2,877,068 UART:
2,877,084 UART: Running Caliptra FMC ...
2,877,492 UART:
2,877,635 UART: [state] CFI Enabled
2,888,148 UART: [fht] FMC Alias Private Key: 7
2,996,265 UART: [art] Extend RT PCRs Done
2,996,693 UART: [art] Lock RT PCRs Done
2,998,189 UART: [art] Populate DV Done
3,006,306 UART: [fht] FMC Alias Private Key: 7
3,007,296 UART: [art] Derive CDI
3,007,576 UART: [art] Store in in slot 0x4
3,093,035 UART: [art] Derive Key Pair
3,093,395 UART: [art] Store priv key in slot 0x5
3,106,747 UART: [art] Derive Key Pair - Done
3,121,764 UART: [art] Signing Cert with AUTHO
3,122,244 UART: RITY.KEYID = 7
3,137,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,237 UART: [art] PUB.X = 8251411F3B6EB5119A51F7CE37B3D1755B690E885175047FFA7F0C73717B36F1996F5A241676D8DEE79D9780C57140AD
3,144,994 UART: [art] PUB.Y = 53BE7AB24F159BCD679C652747DF12A380ACA4AE0E1C2602797EE0FE23611E057E860AFB0FF2479A232F37F6C339671E
3,151,937 UART: [art] SIG.R = 39C5B4618B1018092B6BDB070C22FD1BD9DA4B19D1628F72FB15E28FA62EABB0DFA0123090C7BF98BD77F227C29F0F04
3,158,706 UART: [art] SIG.S = 0D1E3CA7EE0FD792984CE1ABCB32AA15488AF7F8385585877C7B6C3C09852F8F2635C318C5016B8A61FDA48FB5115C4C
3,183,197 UART: Caliptra RT
3,183,543 UART: [state] CFI Enabled
3,290,883 UART: [rt] RT listening for mailbox commands...
3,291,546 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,150 UART: [rt]cmd =0x46504c54, len=4
3,322,162 >>> mbox cmd response data (8 bytes)
3,322,487 UART: [rt] FIPS self test
3,322,815 UART: [kat] ++
3,322,967 UART: [kat] sha1
3,327,185 UART: [kat] SHA2-256
3,329,207 UART: [kat] SHA2-384
3,332,088 UART: [kat] SHA2-512-ACC
3,334,015 UART: [kat] ECC-384
3,344,199 UART: [kat] HMAC-384Kdf
3,348,821 UART: Fatal Error: 0x90030002
3,350,371 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,350,376 >>> mbox cmd response: failed
3,350,376 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,350,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
893,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,938 UART: [kat] ++
898,090 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,775 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,677 UART: [idev] ++
1,175,845 UART: [idev] CDI.KEYID = 6
1,176,205 UART: [idev] SUBJECT.KEYID = 7
1,176,629 UART: [idev] UDS.KEYID = 0
1,176,974 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,615 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,550 UART: [idev] --
1,210,712 UART: [ldev] ++
1,210,880 UART: [ldev] CDI.KEYID = 6
1,211,243 UART: [ldev] SUBJECT.KEYID = 5
1,211,669 UART: [ldev] AUTHORITY.KEYID = 7
1,212,132 UART: [ldev] FE.KEYID = 1
1,217,212 UART: [ldev] Erasing FE.KEYID = 1
1,243,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,028 UART: [ldev] --
1,283,503 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,696 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,969 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 ready_for_fw is high
1,060,678 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,808 >>> mbox cmd response: success
2,698,840 UART:
2,698,856 UART: Running Caliptra FMC ...
2,699,264 UART:
2,699,407 UART: [state] CFI Enabled
2,710,462 UART: [fht] FMC Alias Private Key: 7
2,818,497 UART: [art] Extend RT PCRs Done
2,818,925 UART: [art] Lock RT PCRs Done
2,820,401 UART: [art] Populate DV Done
2,828,652 UART: [fht] FMC Alias Private Key: 7
2,829,678 UART: [art] Derive CDI
2,829,958 UART: [art] Store in in slot 0x4
2,915,955 UART: [art] Derive Key Pair
2,916,315 UART: [art] Store priv key in slot 0x5
2,930,287 UART: [art] Derive Key Pair - Done
2,945,254 UART: [art] Signing Cert with AUTHO
2,945,734 UART: RITY.KEYID = 7
2,960,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,725 UART: [art] PUB.X = B4C66528417F940A072D6F746A5143DBA2017D5AB998FDC389624F0F1260114C780C66DE49038BB09A24D0EE935D9A25
2,968,475 UART: [art] PUB.Y = 44DCF819363D516671B2B4715809B6F7497C029609A22684157715F8B18D26B4CE70FF734671EC771A8DFD86B5316444
2,975,404 UART: [art] SIG.R = BFB6E202580B135281BE9EE43E90BBD16508F87C3F33FEC661FAE68A60D38F25BDE833D16222D8B68ED37AF36F480257
2,982,172 UART: [art] SIG.S = D5C56B7F2FC38B9238210685F7981CD4A77C7BDCECDD7A826412450A981338B082AE48FAFAF36CFBBBA36E72612F4399
3,006,123 UART: Caliptra RT
3,006,469 UART: [state] CFI Enabled
3,114,684 UART: [rt] RT listening for mailbox commands...
3,115,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,909 UART: [rt]cmd =0x46504c54, len=4
3,145,871 >>> mbox cmd response data (8 bytes)
3,146,196 UART: [rt] FIPS self test
3,146,524 UART: [kat] ++
3,146,676 UART: [kat] sha1
3,150,958 UART: [kat] SHA2-256
3,152,980 UART: [kat] SHA2-384
3,155,671 UART: [kat] SHA2-512-ACC
3,157,598 UART: [kat] ECC-384
3,167,602 UART: [kat] HMAC-384Kdf
3,172,524 UART: Fatal Error: 0x90030002
3,174,074 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,174,079 >>> mbox cmd response: failed
3,174,079 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,174,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,104 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,640,802 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
891,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,693 UART: [idev] ++
1,172,861 UART: [idev] CDI.KEYID = 6
1,173,222 UART: [idev] SUBJECT.KEYID = 7
1,173,647 UART: [idev] UDS.KEYID = 0
1,173,993 ready_for_fw is high
1,173,993 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,727 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,598 UART: [ldev] ++
1,208,766 UART: [ldev] CDI.KEYID = 6
1,209,130 UART: [ldev] SUBJECT.KEYID = 5
1,209,557 UART: [ldev] AUTHORITY.KEYID = 7
1,210,020 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,182 UART: [ldev] --
1,280,474 UART: [fwproc] Wait for Commands...
1,281,201 UART: [fwproc] Recv command 0x46574c44
1,281,934 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,408 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,496 >>> mbox cmd response: success
2,784,555 UART: [afmc] ++
2,784,723 UART: [afmc] CDI.KEYID = 6
2,785,086 UART: [afmc] SUBJECT.KEYID = 7
2,785,512 UART: [afmc] AUTHORITY.KEYID = 5
2,821,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,911 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,736 UART: [afmc] --
2,864,688 UART: [cold-reset] --
2,865,452 UART: [state] Locking Datavault
2,866,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,601 UART: [state] Locking ICCM
2,868,143 UART: [exit] Launching FMC @ 0x40000130
2,873,472 UART:
2,873,488 UART: Running Caliptra FMC ...
2,873,896 UART:
2,873,950 UART: [state] CFI Enabled
2,884,449 UART: [fht] FMC Alias Private Key: 7
2,992,268 UART: [art] Extend RT PCRs Done
2,992,696 UART: [art] Lock RT PCRs Done
2,994,170 UART: [art] Populate DV Done
3,002,305 UART: [fht] FMC Alias Private Key: 7
3,003,349 UART: [art] Derive CDI
3,003,629 UART: [art] Store in in slot 0x4
3,089,144 UART: [art] Derive Key Pair
3,089,504 UART: [art] Store priv key in slot 0x5
3,102,088 UART: [art] Derive Key Pair - Done
3,116,859 UART: [art] Signing Cert with AUTHO
3,117,339 UART: RITY.KEYID = 7
3,132,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,302 UART: [art] PUB.X = 1E74B9F6FA9D405E237CF05FFD0EE471157484269A6EDD3D33703EC11B5D1249077B951B0651216104D616454E54B2A7
3,140,056 UART: [art] PUB.Y = 0B7D8AACEF85699D0227FE1572A2E3D99FAF1CC65F8F5E9A3B4CBF28C110CB355B21A1D07F9B68EAA9FD156B05EC149E
3,147,021 UART: [art] SIG.R = 47F46CC3684BD495EBB356E87E8A32707465808A4903A53879AEEDF8A3A4EB22D9DE3D4A0DEC1BFB550B51D7E285E5BF
3,153,798 UART: [art] SIG.S = B665B6F41D0B555481D1FEF2899CB3F1447602B8EC4FC90C991774DB27C9FE1A860036F863D7785587974BA60E49DE1A
3,177,157 UART: Caliptra RT
3,177,411 UART: [state] CFI Enabled
3,284,861 UART: [rt] RT listening for mailbox commands...
3,285,524 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,190 UART: [rt]cmd =0x46504c54, len=4
3,316,434 >>> mbox cmd response data (8 bytes)
3,316,777 UART: [rt] FIPS self test
3,317,105 UART: [kat] ++
3,317,257 UART: [kat] sha1
3,321,499 UART: [kat] SHA2-256
3,323,521 UART: [kat] SHA2-384
3,326,570 UART: [kat] SHA2-512-ACC
3,328,497 UART: [kat] ECC-384
3,338,401 UART: [kat] HMAC-384Kdf
3,343,087 UART: Fatal Error: 0x90030002
3,344,637 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,642 >>> mbox cmd response: failed
3,344,642 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,344,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
904,136 UART: [kat] SHA2-512-ACC
906,037 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,684 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,711 UART: [fwproc] Recv command 0x46574c44
1,282,444 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,174 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,412 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,142 ready_for_fw is high
1,056,142 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,958 >>> mbox cmd response: success
2,697,128 UART:
2,697,144 UART: Running Caliptra FMC ...
2,697,552 UART:
2,697,606 UART: [state] CFI Enabled
2,708,211 UART: [fht] FMC Alias Private Key: 7
2,816,622 UART: [art] Extend RT PCRs Done
2,817,050 UART: [art] Lock RT PCRs Done
2,818,494 UART: [art] Populate DV Done
2,826,675 UART: [fht] FMC Alias Private Key: 7
2,827,833 UART: [art] Derive CDI
2,828,113 UART: [art] Store in in slot 0x4
2,913,692 UART: [art] Derive Key Pair
2,914,052 UART: [art] Store priv key in slot 0x5
2,927,180 UART: [art] Derive Key Pair - Done
2,942,037 UART: [art] Signing Cert with AUTHO
2,942,517 UART: RITY.KEYID = 7
2,957,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,280 UART: [art] PUB.X = 069657CCACA6FE2FED0003EA673E345BA77B78DC37A6E59B6556624EF9B2551E9CE589414DF3F27F961D7B54F8E66185
2,965,030 UART: [art] PUB.Y = 6D1112DDDC35B379744598D951B322CA1A63457841EE1F4C15BA37D0F7BEA1FB66721491A5E808D71A88E1CA1EA174B8
2,971,983 UART: [art] SIG.R = BE3C87C6C9528E271E1432FDBFAF56859179DF7F42ADCEC4FC5DBDA81E3D8A180646DC9EB7286640BE7775002A6C3F5B
2,978,746 UART: [art] SIG.S = 673979676B88555C72D4F469264F48865BA42EC792718733265A076B178D15E1544125739D303751523014BA58AE5302
3,002,543 UART: Caliptra RT
3,002,797 UART: [state] CFI Enabled
3,110,889 UART: [rt] RT listening for mailbox commands...
3,111,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,242 UART: [rt]cmd =0x46504c54, len=4
3,142,592 >>> mbox cmd response data (8 bytes)
3,142,887 UART: [rt] FIPS self test
3,143,215 UART: [kat] ++
3,143,367 UART: [kat] sha1
3,147,765 UART: [kat] SHA2-256
3,149,787 UART: [kat] SHA2-384
3,152,636 UART: [kat] SHA2-512-ACC
3,154,563 UART: [kat] ECC-384
3,164,417 UART: [kat] HMAC-384Kdf
3,169,071 UART: Fatal Error: 0x90030002
3,170,621 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,170,626 >>> mbox cmd response: failed
3,170,626 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,170,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,882 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,954 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
915,667 UART: [kat] HMAC-384Kdf
920,111 UART: [kat] LMS
1,168,423 UART: [kat] --
1,169,428 UART: [cold-reset] ++
1,169,816 UART: [fht] FHT @ 0x50003400
1,172,554 UART: [idev] ++
1,172,722 UART: [idev] CDI.KEYID = 6
1,173,083 UART: [idev] SUBJECT.KEYID = 7
1,173,508 UART: [idev] UDS.KEYID = 0
1,173,854 ready_for_fw is high
1,173,854 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,374 UART: [idev] Erasing UDS.KEYID = 0
1,198,578 UART: [idev] Sha1 KeyId Algorithm
1,207,536 UART: [idev] --
1,208,543 UART: [ldev] ++
1,208,711 UART: [ldev] CDI.KEYID = 6
1,209,075 UART: [ldev] SUBJECT.KEYID = 5
1,209,502 UART: [ldev] AUTHORITY.KEYID = 7
1,209,965 UART: [ldev] FE.KEYID = 1
1,215,141 UART: [ldev] Erasing FE.KEYID = 1
1,241,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,401 UART: [ldev] --
1,280,727 UART: [fwproc] Wait for Commands...
1,281,372 UART: [fwproc] Recv command 0x46574c44
1,282,105 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,519 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,585 >>> mbox cmd response: success
2,784,604 UART: [afmc] ++
2,784,772 UART: [afmc] CDI.KEYID = 6
2,785,135 UART: [afmc] SUBJECT.KEYID = 7
2,785,561 UART: [afmc] AUTHORITY.KEYID = 5
2,821,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,395 UART: [afmc] --
2,864,421 UART: [cold-reset] --
2,865,203 UART: [state] Locking Datavault
2,866,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,932 UART: [state] Locking ICCM
2,867,422 UART: [exit] Launching FMC @ 0x40000130
2,872,751 UART:
2,872,767 UART: Running Caliptra FMC ...
2,873,175 UART:
2,873,318 UART: [state] CFI Enabled
2,884,053 UART: [fht] FMC Alias Private Key: 7
2,991,796 UART: [art] Extend RT PCRs Done
2,992,224 UART: [art] Lock RT PCRs Done
2,993,756 UART: [art] Populate DV Done
3,002,003 UART: [fht] FMC Alias Private Key: 7
3,002,931 UART: [art] Derive CDI
3,003,211 UART: [art] Store in in slot 0x4
3,088,734 UART: [art] Derive Key Pair
3,089,094 UART: [art] Store priv key in slot 0x5
3,101,836 UART: [art] Derive Key Pair - Done
3,116,624 UART: [art] Signing Cert with AUTHO
3,117,104 UART: RITY.KEYID = 7
3,132,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,321 UART: [art] PUB.X = 6AC4C651C1B7853C0F977051B188984AE0BA362C54106AFE53820540CEDE3AF38835B11D8936620B7510B414EBAF639F
3,140,082 UART: [art] PUB.Y = 3C145AAA8AD363F84865DEC802067274359863523B5A304298ED74FFEAC19B49E5A030099D4A88989A4A3B278F047D87
3,147,016 UART: [art] SIG.R = B6DA8155B70D4DE4C3FF0F3376F1CD848D295ABA070C16E0FA78E9DAE32F0FF92F3E6B139F526407D51B0CABA30C9249
3,153,780 UART: [art] SIG.S = EA543A2D8BC50F5EE7CA6E2DAE2A6DCB59633AFACD93A9582686BA768DD24B7C3C9B7CB52597B14EF1A3683034BABFDE
3,177,488 UART: Caliptra RT
3,177,834 UART: [state] CFI Enabled
3,286,379 UART: [rt] RT listening for mailbox commands...
3,287,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,582 UART: [rt]cmd =0x46504c54, len=4
3,317,608 >>> mbox cmd response data (8 bytes)
3,317,871 UART: [rt] FIPS self test
3,318,199 UART: [kat] ++
3,318,351 UART: [kat] sha1
3,322,615 UART: [kat] SHA2-256
3,324,637 UART: [kat] SHA2-384
3,327,426 UART: [kat] SHA2-512-ACC
3,329,353 UART: [kat] ECC-384
3,339,517 UART: [kat] HMAC-384Kdf
3,344,327 UART: Fatal Error: 0x90030002
3,345,877 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,345,882 >>> mbox cmd response: failed
3,345,882 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,345,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,652 UART: [cold-reset] ++
1,171,064 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,174,938 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,503 UART: [ldev] Erasing FE.KEYID = 1
1,241,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,445 UART: [ldev] --
1,280,941 UART: [fwproc] Wait for Commands...
1,281,628 UART: [fwproc] Recv command 0x46574c44
1,282,361 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,859 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,999 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,227 ready_for_fw is high
1,056,227 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,797 >>> mbox cmd response: success
2,697,949 UART:
2,697,965 UART: Running Caliptra FMC ...
2,698,373 UART:
2,698,516 UART: [state] CFI Enabled
2,708,911 UART: [fht] FMC Alias Private Key: 7
2,816,972 UART: [art] Extend RT PCRs Done
2,817,400 UART: [art] Lock RT PCRs Done
2,819,222 UART: [art] Populate DV Done
2,827,345 UART: [fht] FMC Alias Private Key: 7
2,828,435 UART: [art] Derive CDI
2,828,715 UART: [art] Store in in slot 0x4
2,914,658 UART: [art] Derive Key Pair
2,915,018 UART: [art] Store priv key in slot 0x5
2,927,696 UART: [art] Derive Key Pair - Done
2,942,894 UART: [art] Signing Cert with AUTHO
2,943,374 UART: RITY.KEYID = 7
2,958,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,579 UART: [art] PUB.X = 5B276AD410A55737A917AFE62AF777716AB18089A49EFAEB85A8A9AF72279DAC9D130F2426FB34EFEB2A2517EF4BCCA2
2,966,364 UART: [art] PUB.Y = EDC5F91BE6D282A0271FD0104A1FD742CE91ADF79359C9BC991EDA896BCDD34A3DDAF36C1037DEB7D3DF98EE64F04C16
2,973,340 UART: [art] SIG.R = F3D73FA0B72A41DA29BD4A069569011126D6AD095C8A8E95FAA73AE4E6D20CD6199D02E57C74DD09AB1DD5868A3FCBFB
2,980,112 UART: [art] SIG.S = 76AEBBD35E5E1B9D66C7A9C86DCD2341F4BB1A645F99AB0760A3027C536FA04CF15D1AD18C22DE65A4096D8EF1D6DFCD
3,004,058 UART: Caliptra RT
3,004,404 UART: [state] CFI Enabled
3,111,930 UART: [rt] RT listening for mailbox commands...
3,112,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,075 UART: [rt]cmd =0x46504c54, len=4
3,143,247 >>> mbox cmd response data (8 bytes)
3,143,504 UART: [rt] FIPS self test
3,143,832 UART: [kat] ++
3,143,984 UART: [kat] sha1
3,148,394 UART: [kat] SHA2-256
3,150,416 UART: [kat] SHA2-384
3,153,393 UART: [kat] SHA2-512-ACC
3,155,320 UART: [kat] ECC-384
3,165,554 UART: [kat] HMAC-384Kdf
3,170,050 UART: Fatal Error: 0x90030002
3,171,600 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,171,605 >>> mbox cmd response: failed
3,171,605 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,171,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,785 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,615 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
8,192,881 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,336,959 >>> mbox cmd response: failed
8,337,512 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,480,736 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
4,863,988 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,414,000 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
8,187,105 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,331,254 >>> mbox cmd response: failed
8,331,844 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,475,070 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,865,830 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,455,067 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
8,499,336 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,643,939 >>> mbox cmd response: failed
8,644,518 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,787,764 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
16,263,669 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
29,711,410 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
8,498,161 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,642,249 >>> mbox cmd response: failed
8,642,828 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
8,786,054 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
16,266,202 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
29,708,594 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
5,734,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,879,494 >>> mbox cmd response: failed
5,880,061 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,024,390 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,473,274 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,290,570 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
5,739,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,884,426 >>> mbox cmd response: failed
5,884,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,028,639 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,451,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,263,500 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,715,245 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
5,859,752 >>> mbox cmd response: failed
5,860,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,003,809 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,430,895 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,265,008 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
6,070,941 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,215,667 >>> mbox cmd response: failed
6,216,251 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,359,756 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,286,407 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,011,716 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
6,059,272 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,203,961 >>> mbox cmd response: failed
6,204,530 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
6,348,051 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
17,304,704 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
28,024,820 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,508 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,097,516 >>> mbox cmd response: failed
1,097,516 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,097,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,449 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,412 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,120 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,128 >>> mbox cmd response: failed
1,098,128 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,134 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,455 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,818 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,297 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,305 >>> mbox cmd response: failed
1,098,305 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,726 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,385 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,685 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,693 >>> mbox cmd response: failed
1,098,693 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,510 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,373 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,690 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,698 >>> mbox cmd response: failed
1,098,698 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,088 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,056 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,064 >>> mbox cmd response: failed
1,098,064 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,399 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,000 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,845 >>> mbox cmd response: failed
1,098,845 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,737 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,357 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,097,365 >>> mbox cmd response: failed
1,097,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,097,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,344 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,029 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,232 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,240 >>> mbox cmd response: failed
1,098,240 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,780 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,356 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,364 >>> mbox cmd response: failed
1,098,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,794 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,203 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,211 >>> mbox cmd response: failed
1,098,211 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,098,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,360 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,937 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,897 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,097,905 >>> mbox cmd response: failed
1,097,905 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,097,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,084 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,563 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,982 UART:
192,358 UART: Running Caliptra ROM ...
193,486 UART:
193,632 UART: [state] CFI Enabled
265,372 UART: [state] LifecycleState = Unprovisioned
267,341 UART: [state] DebugLocked = No
269,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,319 UART: [kat] SHA2-256
443,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,563 UART: [kat] ++
454,100 UART: [kat] sha1
466,230 UART: [kat] SHA2-256
468,895 UART: [kat] SHA2-384
474,603 UART: [kat] SHA2-512-ACC
476,977 UART: [kat] ECC-384
2,768,729 UART: [kat] HMAC-384Kdf
2,780,774 UART: [kat] LMS
3,971,019 UART: [kat] --
3,974,402 UART: [cold-reset] ++
3,975,565 UART: [fht] Storing FHT @ 0x50003400
3,985,765 UART: [idev] ++
3,986,329 UART: [idev] CDI.KEYID = 6
3,987,240 UART: [idev] SUBJECT.KEYID = 7
3,988,486 UART: [idev] UDS.KEYID = 0
3,989,540 ready_for_fw is high
3,989,758 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,134,321 UART: [idev] Erasing UDS.KEYID = 0
7,327,408 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,999 UART: [idev] --
7,353,755 UART: [ldev] ++
7,354,325 UART: [ldev] CDI.KEYID = 6
7,355,271 UART: [ldev] SUBJECT.KEYID = 5
7,356,485 UART: [ldev] AUTHORITY.KEYID = 7
7,357,774 UART: [ldev] FE.KEYID = 1
7,402,924 UART: [ldev] Erasing FE.KEYID = 1
10,734,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,972 UART: [ldev] --
13,095,714 UART: [fwproc] Waiting for Commands...
13,098,411 UART: [fwproc] Received command 0x46574c44
13,100,653 UART: [fwproc] Received Image of size 114916 bytes
17,163,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,650 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,305,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,626,376 >>> mbox cmd response: success
17,629,892 UART: [afmc] ++
17,630,486 UART: [afmc] CDI.KEYID = 6
17,631,372 UART: [afmc] SUBJECT.KEYID = 7
17,632,642 UART: [afmc] AUTHORITY.KEYID = 5
20,991,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,290,725 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,988 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,307,382 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,191 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,336,696 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,551 UART: [afmc] --
23,361,523 UART: [cold-reset] --
23,363,383 UART: [state] Locking Datavault
23,369,301 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,096 UART: [state] Locking ICCM
23,372,255 UART: [exit] Launching FMC @ 0x40000130
23,380,658 UART:
23,380,897 UART: Running Caliptra FMC ...
23,382,003 UART:
23,382,167 UART: [state] CFI Enabled
23,450,376 UART: [fht] FMC Alias Private Key: 7
25,788,642 UART: [art] Extend RT PCRs Done
25,789,863 UART: [art] Lock RT PCRs Done
25,791,382 UART: [art] Populate DV Done
25,796,744 UART: [fht] FMC Alias Private Key: 7
25,798,248 UART: [art] Derive CDI
25,799,011 UART: [art] Store in in slot 0x4
25,858,658 UART: [art] Derive Key Pair
25,859,697 UART: [art] Store priv key in slot 0x5
29,152,249 UART: [art] Derive Key Pair - Done
29,165,141 UART: [art] Signing Cert with AUTHO
29,166,441 UART: RITY.KEYID = 7
31,454,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,764 UART: [art] PUB.X = 90575DFE057AA33B20639EA804424350BDFAD352725E7ACE5E4C188ED42F9C83688818515C2FFB1A7F57454A28869F0A
31,463,022 UART: [art] PUB.Y = 320A735945009FF2A977678FDEC9090B98FB48672EEBD2DDC9B0E791A7B8D83393FDC48D98ACB9CA8F7471B7ED35F604
31,470,286 UART: [art] SIG.R = 948204B4BAEFEF72C4597EF69A4430D78012DF91286168BBEB545ACDDFC80AC1D5CA4B3CD853676E4DE18B285FC2FE56
31,477,698 UART: [art] SIG.S = 3230BCFDF43BD5EB560F3D4074502515E7B4F4518FB8676085B26FF762BDF7C459CA5980C8F7F4AF6E2A0816B0700F6B
32,783,584 UART: Caliptra RT
32,784,285 UART: [state] CFI Enabled
32,947,814 UART: [rt] RT listening for mailbox commands...
32,949,696 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,979,513 UART: [rt]cmd =0x46504c54, len=4
32,981,024 >>> mbox cmd response data (8 bytes)
32,982,007 UART: [rt] FIPS self test
32,982,958 UART: [kat] ++
32,983,409 UART: [kat] sha1
32,987,999 UART: [kat] SHA2-256
32,989,933 UART: [kat] SHA2-384
32,993,054 UART: [kat] SHA2-512-ACC
32,995,295 UART: [kat] ECC-384
36,261,736 UART: [kat] HMAC-384Kdf
36,268,943 UART: [kat] LMS
37,014,416 UART: Fatal Error: 0x90070002
37,049,868 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,194,154 >>> mbox cmd response: failed
37,194,807 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,339,072 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,108 UART:
190,409 UART: Running Caliptra ROM ...
191,437 UART:
191,574 UART: [state] CFI Enabled
259,349 UART: [state] LifecycleState = Unprovisioned
261,228 UART: [state] DebugLocked = No
263,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,055 UART: [kat] SHA2-256
437,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,239 UART: [kat] ++
448,739 UART: [kat] sha1
460,587 UART: [kat] SHA2-256
463,275 UART: [kat] SHA2-384
469,578 UART: [kat] SHA2-512-ACC
471,934 UART: [kat] ECC-384
2,763,547 UART: [kat] HMAC-384Kdf
2,795,209 UART: [kat] LMS
3,985,487 UART: [kat] --
3,991,927 UART: [cold-reset] ++
3,994,191 UART: [fht] Storing FHT @ 0x50003400
4,006,914 UART: [idev] ++
4,007,491 UART: [idev] CDI.KEYID = 6
4,008,430 UART: [idev] SUBJECT.KEYID = 7
4,009,703 UART: [idev] UDS.KEYID = 0
4,011,189 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,155,647 UART: [idev] Erasing UDS.KEYID = 0
7,340,996 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,227 UART: [idev] --
7,365,976 UART: [ldev] ++
7,366,548 UART: [ldev] CDI.KEYID = 6
7,367,504 UART: [ldev] SUBJECT.KEYID = 5
7,368,641 UART: [ldev] AUTHORITY.KEYID = 7
7,369,986 UART: [ldev] FE.KEYID = 1
7,416,742 UART: [ldev] Erasing FE.KEYID = 1
10,746,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,753 UART: [ldev] --
13,128,974 UART: [fwproc] Waiting for Commands...
13,132,266 UART: [fwproc] Received command 0x46574c44
13,134,459 UART: [fwproc] Received Image of size 114916 bytes
17,196,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,667 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,541 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,661,693 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,806,566 ready_for_fw is high
3,807,030 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,899,394 >>> mbox cmd response: success
23,595,378 UART:
23,595,775 UART: Running Caliptra FMC ...
23,596,912 UART:
23,597,074 UART: [state] CFI Enabled
23,663,239 UART: [fht] FMC Alias Private Key: 7
26,000,738 UART: [art] Extend RT PCRs Done
26,001,968 UART: [art] Lock RT PCRs Done
26,003,819 UART: [art] Populate DV Done
26,009,355 UART: [fht] FMC Alias Private Key: 7
26,010,846 UART: [art] Derive CDI
26,011,610 UART: [art] Store in in slot 0x4
26,072,062 UART: [art] Derive Key Pair
26,073,113 UART: [art] Store priv key in slot 0x5
29,366,781 UART: [art] Derive Key Pair - Done
29,379,566 UART: [art] Signing Cert with AUTHO
29,380,895 UART: RITY.KEYID = 7
31,668,553 UART: [art] Erasing AUTHORITY.KEYID = 7
31,670,065 UART: [art] PUB.X = D18B043CA8A589C60A1D894CDE5DEE292C65DB823173A40F0AD306E254DC39AEC561A574656B1C94EA6C8B71CD5A1955
31,677,287 UART: [art] PUB.Y = 053BAB253875BACC81CD2C6277B822247AC11F3FBDE76468C65FEA18C5CECA33B69120D38A3A541B68ED06EE0CF7E5E5
31,684,583 UART: [art] SIG.R = C4AB9B438F47EC0A275CB1B96ECAD7CE28A4B4462564451B777C279417ED176C97C7DE9892B424B616F72F76090C6932
31,691,948 UART: [art] SIG.S = 10828BBB683DB79F130E77C11AB0BF01BDBA524FF6860E2485F1AB675E96493EB41F3BEEC2FD90BD6047DDBEA9EA6EB2
32,996,918 UART: Caliptra RT
32,997,639 UART: [state] CFI Enabled
33,160,179 UART: [rt] RT listening for mailbox commands...
33,162,036 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,191,721 UART: [rt]cmd =0x46504c54, len=4
33,193,415 >>> mbox cmd response data (8 bytes)
33,194,865 UART: [rt] FIPS self test
33,195,815 UART: [kat] ++
33,196,267 UART: [kat] sha1
33,200,667 UART: [kat] SHA2-256
33,202,618 UART: [kat] SHA2-384
33,205,632 UART: [kat] SHA2-512-ACC
33,207,884 UART: [kat] ECC-384
36,477,327 UART: [kat] HMAC-384Kdf
36,484,532 UART: [kat] LMS
37,230,010 UART: Fatal Error: 0x90070002
37,265,428 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,410,304 >>> mbox cmd response: failed
37,410,953 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,555,127 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,780,891 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,885,137 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,509 UART:
192,880 UART: Running Caliptra ROM ...
193,972 UART:
603,531 UART: [state] CFI Enabled
619,190 UART: [state] LifecycleState = Unprovisioned
621,074 UART: [state] DebugLocked = No
622,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,410 UART: [kat] SHA2-256
798,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,737 UART: [kat] ++
809,234 UART: [kat] sha1
820,892 UART: [kat] SHA2-256
823,590 UART: [kat] SHA2-384
829,591 UART: [kat] SHA2-512-ACC
831,965 UART: [kat] ECC-384
3,118,299 UART: [kat] HMAC-384Kdf
3,129,998 UART: [kat] LMS
4,320,082 UART: [kat] --
4,325,650 UART: [cold-reset] ++
4,326,659 UART: [fht] Storing FHT @ 0x50003400
4,337,495 UART: [idev] ++
4,338,063 UART: [idev] CDI.KEYID = 6
4,339,025 UART: [idev] SUBJECT.KEYID = 7
4,340,246 UART: [idev] UDS.KEYID = 0
4,341,291 ready_for_fw is high
4,341,526 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,485,776 UART: [idev] Erasing UDS.KEYID = 0
7,630,114 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,647 UART: [idev] --
7,655,707 UART: [ldev] ++
7,656,278 UART: [ldev] CDI.KEYID = 6
7,657,224 UART: [ldev] SUBJECT.KEYID = 5
7,658,436 UART: [ldev] AUTHORITY.KEYID = 7
7,659,665 UART: [ldev] FE.KEYID = 1
7,669,697 UART: [ldev] Erasing FE.KEYID = 1
10,957,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,326 UART: [ldev] --
13,318,931 UART: [fwproc] Waiting for Commands...
13,321,318 UART: [fwproc] Received command 0x46574c44
13,323,507 UART: [fwproc] Received Image of size 114916 bytes
17,382,956 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,847,163 >>> mbox cmd response: success
17,851,978 UART: [afmc] ++
17,852,569 UART: [afmc] CDI.KEYID = 6
17,853,453 UART: [afmc] SUBJECT.KEYID = 7
17,854,727 UART: [afmc] AUTHORITY.KEYID = 5
21,169,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,536 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,917 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,766 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,187 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,101 UART: [afmc] --
23,533,809 UART: [cold-reset] --
23,538,319 UART: [state] Locking Datavault
23,543,395 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,161 UART: [state] Locking ICCM
23,547,097 UART: [exit] Launching FMC @ 0x40000130
23,555,498 UART:
23,555,731 UART: Running Caliptra FMC ...
23,556,831 UART:
23,556,989 UART: [state] CFI Enabled
23,565,200 UART: [fht] FMC Alias Private Key: 7
25,896,185 UART: [art] Extend RT PCRs Done
25,897,424 UART: [art] Lock RT PCRs Done
25,899,293 UART: [art] Populate DV Done
25,904,455 UART: [fht] FMC Alias Private Key: 7
25,905,996 UART: [art] Derive CDI
25,906,833 UART: [art] Store in in slot 0x4
25,949,277 UART: [art] Derive Key Pair
25,950,320 UART: [art] Store priv key in slot 0x5
29,192,450 UART: [art] Derive Key Pair - Done
29,205,457 UART: [art] Signing Cert with AUTHO
29,206,758 UART: RITY.KEYID = 7
31,485,978 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,486 UART: [art] PUB.X = E75D0A1D1E507244430997C4B948F2E659537D6470DDC1C72F377A1AFF72E85C616BEBE8D5A8FCB9B1787ED072D02D38
31,494,755 UART: [art] PUB.Y = 9F7FFF336066EE53E5F40B6401ADB7E57E33960F020E919AA18969BA5119CA5E8C29CC2426BE9413A8E2E0084CC6EA6D
31,501,999 UART: [art] SIG.R = 01B8DDE48BEB6DA118374C813E16A86BAECEF0C671210A20B4F8118FFE32AEDB81DAC36965E2361737CB4DD503F108EF
31,509,405 UART: [art] SIG.S = 8CC319C8BD538D53B7CC41DEB2CFC9B2233DD68D800F02C92932763ED3727DBE346B538017F1A51BC5C26CE48A505629
32,814,122 UART: Caliptra RT
32,814,837 UART: [state] CFI Enabled
32,932,297 UART: [rt] RT listening for mailbox commands...
32,934,158 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,964,017 UART: [rt]cmd =0x46504c54, len=4
32,965,674 >>> mbox cmd response data (8 bytes)
32,966,591 UART: [rt] FIPS self test
32,967,536 UART: [kat] ++
32,967,984 UART: [kat] sha1
32,972,381 UART: [kat] SHA2-256
32,974,310 UART: [kat] SHA2-384
32,977,325 UART: [kat] SHA2-512-ACC
32,979,578 UART: [kat] ECC-384
36,222,285 UART: [kat] HMAC-384Kdf
36,228,190 UART: [kat] LMS
36,973,773 UART: Fatal Error: 0x90070002
37,009,186 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,153,585 >>> mbox cmd response: failed
37,154,254 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,298,357 >>> mbox cmd response: failed
Initializing fuses
1,144 writing to cptra_bootfsm_go
190,362 UART:
190,661 UART: Running Caliptra ROM ...
191,686 UART:
3,225,854 UART: [state] CFI Enabled
3,242,917 UART: [state] LifecycleState = Unprovisioned
3,244,836 UART: [state] DebugLocked = No
3,246,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,251,096 UART: [kat] SHA2-256
3,420,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,431,368 UART: [kat] ++
3,431,824 UART: [kat] sha1
3,444,061 UART: [kat] SHA2-256
3,446,742 UART: [kat] SHA2-384
3,452,253 UART: [kat] SHA2-512-ACC
3,454,603 UART: [kat] ECC-384
5,737,819 UART: [kat] HMAC-384Kdf
5,751,229 UART: [kat] LMS
6,941,365 UART: [kat] --
6,947,474 UART: [cold-reset] ++
6,948,823 UART: [fht] Storing FHT @ 0x50003400
6,959,282 UART: [idev] ++
6,959,848 UART: [idev] CDI.KEYID = 6
6,960,936 UART: [idev] SUBJECT.KEYID = 7
6,961,967 UART: [idev] UDS.KEYID = 0
6,963,587 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
7,107,688 UART: [idev] Erasing UDS.KEYID = 0
10,249,733 UART: [idev] Using Sha1 for KeyId Algorithm
10,272,205 UART: [idev] --
10,276,146 UART: [ldev] ++
10,276,713 UART: [ldev] CDI.KEYID = 6
10,277,678 UART: [ldev] SUBJECT.KEYID = 5
10,278,912 UART: [ldev] AUTHORITY.KEYID = 7
10,280,153 UART: [ldev] FE.KEYID = 1
10,290,048 UART: [ldev] Erasing FE.KEYID = 1
13,577,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,870,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,885,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,900,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,914,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,933,623 UART: [ldev] --
15,939,062 UART: [fwproc] Waiting for Commands...
15,942,354 UART: [fwproc] Received command 0x46574c44
15,944,550 UART: [fwproc] Received Image of size 114916 bytes
20,001,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,074,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,143,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
20,463,674 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,127,349 ready_for_fw is high
4,127,789 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,076,460 >>> mbox cmd response: success
23,717,685 UART:
23,718,203 UART: Running Caliptra FMC ...
23,719,350 UART:
23,719,507 UART: [state] CFI Enabled
23,726,980 UART: [fht] FMC Alias Private Key: 7
26,057,836 UART: [art] Extend RT PCRs Done
26,059,070 UART: [art] Lock RT PCRs Done
26,060,729 UART: [art] Populate DV Done
26,066,269 UART: [fht] FMC Alias Private Key: 7
26,067,815 UART: [art] Derive CDI
26,068,638 UART: [art] Store in in slot 0x4
26,111,246 UART: [art] Derive Key Pair
26,112,254 UART: [art] Store priv key in slot 0x5
29,354,183 UART: [art] Derive Key Pair - Done
29,367,301 UART: [art] Signing Cert with AUTHO
29,368,613 UART: RITY.KEYID = 7
31,648,100 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,619 UART: [art] PUB.X = 9191B5F8A80D9F9B39519A682113CE00205BB203A6163C7B096625859195A556E8C33D747E5449171594EB2B51F3D373
31,656,839 UART: [art] PUB.Y = D78479B4E24428BD70AEEEA651F5257751DDD430A3C1DC00D455EA10E179C5FE1918A13F0C9A227202561CA8383C5C52
31,664,024 UART: [art] SIG.R = A78215169764853937AA9F424C82E8DCB1A6C5A3661645563FE3A8788E0A647E5A5F89D1EA478F16E20B095852AFD9DE
31,671,430 UART: [art] SIG.S = 375C531D0A89CCC06AA39BA7083BE3C62D8D731E32395D73BBDDE7F7919B4C9787D8012B62D342E62AC1073AA2474C96
32,976,846 UART: Caliptra RT
32,977,568 UART: [state] CFI Enabled
33,095,843 UART: [rt] RT listening for mailbox commands...
33,097,706 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,127,187 UART: [rt]cmd =0x46504c54, len=4
33,128,771 >>> mbox cmd response data (8 bytes)
33,130,067 UART: [rt] FIPS self test
33,131,007 UART: [kat] ++
33,131,456 UART: [kat] sha1
33,135,858 UART: [kat] SHA2-256
33,137,794 UART: [kat] SHA2-384
33,140,878 UART: [kat] SHA2-512-ACC
33,143,190 UART: [kat] ECC-384
36,386,237 UART: [kat] HMAC-384Kdf
36,392,150 UART: [kat] LMS
37,137,627 UART: Fatal Error: 0x90070002
37,173,064 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,317,263 >>> mbox cmd response: failed
37,317,923 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
37,462,288 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
6,595,075 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
20,556,676 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,396 UART:
192,777 UART: Running Caliptra ROM ...
193,979 UART:
194,138 UART: [state] CFI Enabled
264,207 UART: [state] LifecycleState = Unprovisioned
266,108 UART: [state] DebugLocked = No
268,070 UART: [state] WD Timer not started. Device not locked for debugging
272,405 UART: [kat] SHA2-256
451,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,168 UART: [kat] ++
463,710 UART: [kat] sha1
475,307 UART: [kat] SHA2-256
478,323 UART: [kat] SHA2-384
483,816 UART: [kat] SHA2-512-ACC
486,827 UART: [kat] ECC-384
2,947,345 UART: [kat] HMAC-384Kdf
2,972,487 UART: [kat] LMS
3,501,882 UART: [kat] --
3,506,376 UART: [cold-reset] ++
3,508,955 UART: [fht] FHT @ 0x50003400
3,520,577 UART: [idev] ++
3,521,152 UART: [idev] CDI.KEYID = 6
3,522,065 UART: [idev] SUBJECT.KEYID = 7
3,523,245 UART: [idev] UDS.KEYID = 0
3,524,174 ready_for_fw is high
3,524,403 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,430 UART: [idev] Erasing UDS.KEYID = 0
6,024,179 UART: [idev] Sha1 KeyId Algorithm
6,046,719 UART: [idev] --
6,050,396 UART: [ldev] ++
6,050,971 UART: [ldev] CDI.KEYID = 6
6,051,902 UART: [ldev] SUBJECT.KEYID = 5
6,053,068 UART: [ldev] AUTHORITY.KEYID = 7
6,054,307 UART: [ldev] FE.KEYID = 1
6,101,108 UART: [ldev] Erasing FE.KEYID = 1
8,602,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,280 UART: [ldev] --
10,414,936 UART: [fwproc] Wait for Commands...
10,416,728 UART: [fwproc] Recv command 0x46574c44
10,418,828 UART: [fwproc] Recv'd Img size: 115224 bytes
13,827,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,455 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,286,316 >>> mbox cmd response: success
14,291,433 UART: [afmc] ++
14,292,027 UART: [afmc] CDI.KEYID = 6
14,292,925 UART: [afmc] SUBJECT.KEYID = 7
14,294,030 UART: [afmc] AUTHORITY.KEYID = 5
16,831,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,590,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,606,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,622,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,646,392 UART: [afmc] --
18,650,381 UART: [cold-reset] --
18,654,064 UART: [state] Locking Datavault
18,658,133 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,846 UART: [state] Locking ICCM
18,661,695 UART: [exit] Launching FMC @ 0x40000130
18,670,093 UART:
18,670,333 UART: Running Caliptra FMC ...
18,671,434 UART:
18,671,592 UART: [state] CFI Enabled
18,731,089 UART: [fht] FMC Alias Private Key: 7
20,494,862 UART: [art] Extend RT PCRs Done
20,496,078 UART: [art] Lock RT PCRs Done
20,497,952 UART: [art] Populate DV Done
20,503,418 UART: [fht] FMC Alias Private Key: 7
20,504,964 UART: [art] Derive CDI
20,505,779 UART: [art] Store in in slot 0x4
20,563,040 UART: [art] Derive Key Pair
20,564,043 UART: [art] Store priv key in slot 0x5
23,027,116 UART: [art] Derive Key Pair - Done
23,040,169 UART: [art] Signing Cert with AUTHO
23,041,492 UART: RITY.KEYID = 7
24,752,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,390 UART: [art] PUB.X = 60DF0AFEC55693AE55DB5771D7FE45B08D31084447045789DA8B1DF2A6C533A2D0267449DFADD0E2DFBB149C96C0B32B
24,761,701 UART: [art] PUB.Y = 01F1A76BBD4DCD5A95FE9569119B7236C3740F1CAF4EBFEED00DECD7FF4433A576F78BF8C67C0031AA1680C8746A56AB
24,768,936 UART: [art] SIG.R = 8FAD3064E5D1D4E03C85C48C22D90EC23A5F00C5EE5732EAF16EB62B1AC9BBEBF14807675E2BB95F37C00CB00DE5C19C
24,776,329 UART: [art] SIG.S = 9B3CB9E73C448703F1BD795BB23F660117FDE06991E2035EECC84ED09723E94E1BAC82124744597F5F09B8AB5F846D62
25,754,999 UART: Caliptra RT
25,755,704 UART: [state] CFI Enabled
25,921,350 UART: [rt] RT listening for mailbox commands...
25,923,196 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,952,933 UART: [rt]cmd =0x46504c54, len=4
25,954,599 >>> mbox cmd response data (8 bytes)
25,955,817 UART: [rt] FIPS self test
25,956,761 UART: [kat] ++
25,957,213 UART: [kat] sha1
25,961,724 UART: [kat] SHA2-256
25,963,671 UART: [kat] SHA2-384
25,966,630 UART: [kat] SHA2-512-ACC
25,968,866 UART: [kat] ECC-384
28,406,729 UART: [kat] HMAC-384Kdf
28,413,102 UART: [kat] LMS
28,634,422 UART: Fatal Error: 0x90070002
28,669,869 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,814,964 >>> mbox cmd response: failed
28,815,606 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,960,159 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,114 UART:
190,407 UART: Running Caliptra ROM ...
191,520 UART:
191,670 UART: [state] CFI Enabled
249,417 UART: [state] LifecycleState = Unprovisioned
251,281 UART: [state] DebugLocked = No
253,467 UART: [state] WD Timer not started. Device not locked for debugging
257,035 UART: [kat] SHA2-256
436,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,741 UART: [kat] ++
448,270 UART: [kat] sha1
459,261 UART: [kat] SHA2-256
462,264 UART: [kat] SHA2-384
467,808 UART: [kat] SHA2-512-ACC
470,742 UART: [kat] ECC-384
2,931,376 UART: [kat] HMAC-384Kdf
2,956,366 UART: [kat] LMS
3,485,796 UART: [kat] --
3,490,003 UART: [cold-reset] ++
3,491,349 UART: [fht] FHT @ 0x50003400
3,503,370 UART: [idev] ++
3,503,938 UART: [idev] CDI.KEYID = 6
3,504,908 UART: [idev] SUBJECT.KEYID = 7
3,506,067 UART: [idev] UDS.KEYID = 0
3,507,579 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,652,406 UART: [idev] Erasing UDS.KEYID = 0
6,013,029 UART: [idev] Sha1 KeyId Algorithm
6,035,072 UART: [idev] --
6,039,337 UART: [ldev] ++
6,039,954 UART: [ldev] CDI.KEYID = 6
6,040,844 UART: [ldev] SUBJECT.KEYID = 5
6,041,953 UART: [ldev] AUTHORITY.KEYID = 7
6,043,309 UART: [ldev] FE.KEYID = 1
6,085,641 UART: [ldev] Erasing FE.KEYID = 1
8,590,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,952 UART: [ldev] --
10,400,111 UART: [fwproc] Wait for Commands...
10,403,340 UART: [fwproc] Recv command 0x46574c44
10,405,381 UART: [fwproc] Recv'd Img size: 115224 bytes
13,827,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,122 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,288,375 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,199 UART:
192,577 UART: Running Caliptra ROM ...
193,764 UART:
193,924 UART: [state] CFI Enabled
262,849 UART: [state] LifecycleState = Unprovisioned
265,254 UART: [state] DebugLocked = No
267,925 UART: [state] WD Timer not started. Device not locked for debugging
271,691 UART: [kat] SHA2-256
461,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,309 UART: [kat] ++
472,758 UART: [kat] sha1
485,486 UART: [kat] SHA2-256
488,504 UART: [kat] SHA2-384
494,782 UART: [kat] SHA2-512-ACC
497,367 UART: [kat] ECC-384
2,948,971 UART: [kat] HMAC-384Kdf
2,971,501 UART: [kat] LMS
3,503,261 UART: [kat] --
3,507,476 UART: [cold-reset] ++
3,509,788 UART: [fht] FHT @ 0x50003400
3,522,295 UART: [idev] ++
3,523,024 UART: [idev] CDI.KEYID = 6
3,523,942 UART: [idev] SUBJECT.KEYID = 7
3,525,187 UART: [idev] UDS.KEYID = 0
3,526,382 ready_for_fw is high
3,526,585 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,510 UART: [idev] Erasing UDS.KEYID = 0
6,029,954 UART: [idev] Sha1 KeyId Algorithm
6,052,108 UART: [idev] --
6,057,559 UART: [ldev] ++
6,058,244 UART: [ldev] CDI.KEYID = 6
6,059,156 UART: [ldev] SUBJECT.KEYID = 5
6,060,373 UART: [ldev] AUTHORITY.KEYID = 7
6,061,574 UART: [ldev] FE.KEYID = 1
6,099,653 UART: [ldev] Erasing FE.KEYID = 1
8,608,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,319 UART: [ldev] --
10,414,189 UART: [fwproc] Wait for Commands...
10,416,183 UART: [fwproc] Recv command 0x46574c44
10,418,499 UART: [fwproc] Recv'd Img size: 115224 bytes
13,873,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,584 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,618,918 >>> mbox cmd response: success
14,622,784 UART: [afmc] ++
14,623,504 UART: [afmc] CDI.KEYID = 6
14,624,691 UART: [afmc] SUBJECT.KEYID = 7
14,626,124 UART: [afmc] AUTHORITY.KEYID = 5
17,154,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,644 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,351 UART: [afmc] --
18,968,190 UART: [cold-reset] --
18,971,944 UART: [state] Locking Datavault
18,977,622 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,805 UART: [state] Locking ICCM
18,981,879 UART: [exit] Launching FMC @ 0x40000130
18,990,534 UART:
18,990,790 UART: Running Caliptra FMC ...
18,991,819 UART:
18,991,969 UART: [state] CFI Enabled
19,053,035 UART: [fht] FMC Alias Private Key: 7
20,817,789 UART: [art] Extend RT PCRs Done
20,819,012 UART: [art] Lock RT PCRs Done
20,820,399 UART: [art] Populate DV Done
20,825,760 UART: [fht] FMC Alias Private Key: 7
20,827,458 UART: [art] Derive CDI
20,828,195 UART: [art] Store in in slot 0x4
20,885,928 UART: [art] Derive Key Pair
20,886,969 UART: [art] Store priv key in slot 0x5
23,349,667 UART: [art] Derive Key Pair - Done
23,362,716 UART: [art] Signing Cert with AUTHO
23,364,022 UART: RITY.KEYID = 7
25,075,432 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,962 UART: [art] PUB.X = 8F77E9E25C4FFF201048B3808FB250775EB530A0AD654A3663181DE45C0FD9DA8B6E76F57AD8C77FE0206BF491C9BFC1
25,084,180 UART: [art] PUB.Y = 5806AC2B6D95A09F155AB7BFF5A4FB95784A1656BCC47F04B1E7A4477C578B3C1989E63BBC1BBB1CA4995F4E2FEE7E7C
25,091,480 UART: [art] SIG.R = AFE2DC12CEC8BF318C6C6E4D5EC80C951BF12E21D7A360828BE2A098F5C62B6374FE9B2A7ED4A02C7CEC1878EA94E0A4
25,098,928 UART: [art] SIG.S = C6616861C5DCA99F3FFF20415E9E668CFE6F80A1263F1815D6316E6FE5E769560BD25B48E22D473CF044E5E30D3F09E4
26,077,745 UART: Caliptra RT
26,078,461 UART: [state] CFI Enabled
26,242,554 UART: [rt] RT listening for mailbox commands...
26,244,405 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,274,039 UART: [rt]cmd =0x46504c54, len=4
26,275,508 >>> mbox cmd response data (8 bytes)
26,276,349 UART: [rt] FIPS self test
26,277,289 UART: [kat] ++
26,277,736 UART: [kat] sha1
26,282,112 UART: [kat] SHA2-256
26,284,041 UART: [kat] SHA2-384
26,287,111 UART: [kat] SHA2-512-ACC
26,289,417 UART: [kat] ECC-384
28,728,554 UART: [kat] HMAC-384Kdf
28,755,297 UART: [kat] LMS
28,976,554 UART: Fatal Error: 0x90070002
29,011,836 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,156,562 >>> mbox cmd response: failed
29,157,219 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,301,841 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,140 UART:
190,429 UART: Running Caliptra ROM ...
191,454 UART:
191,592 UART: [state] CFI Enabled
248,401 UART: [state] LifecycleState = Unprovisioned
250,819 UART: [state] DebugLocked = No
252,887 UART: [state] WD Timer not started. Device not locked for debugging
257,229 UART: [kat] SHA2-256
447,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,852 UART: [kat] ++
458,299 UART: [kat] sha1
468,642 UART: [kat] SHA2-256
471,652 UART: [kat] SHA2-384
478,119 UART: [kat] SHA2-512-ACC
480,730 UART: [kat] ECC-384
2,933,164 UART: [kat] HMAC-384Kdf
2,957,224 UART: [kat] LMS
3,488,963 UART: [kat] --
3,492,204 UART: [cold-reset] ++
3,493,167 UART: [fht] FHT @ 0x50003400
3,505,442 UART: [idev] ++
3,506,119 UART: [idev] CDI.KEYID = 6
3,507,154 UART: [idev] SUBJECT.KEYID = 7
3,508,257 UART: [idev] UDS.KEYID = 0
3,509,765 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,654,605 UART: [idev] Erasing UDS.KEYID = 0
6,013,471 UART: [idev] Sha1 KeyId Algorithm
6,034,329 UART: [idev] --
6,039,784 UART: [ldev] ++
6,040,471 UART: [ldev] CDI.KEYID = 6
6,041,356 UART: [ldev] SUBJECT.KEYID = 5
6,042,572 UART: [ldev] AUTHORITY.KEYID = 7
6,043,811 UART: [ldev] FE.KEYID = 1
6,084,964 UART: [ldev] Erasing FE.KEYID = 1
8,594,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,950 UART: [ldev] --
10,401,542 UART: [fwproc] Wait for Commands...
10,404,241 UART: [fwproc] Recv command 0x46574c44
10,406,550 UART: [fwproc] Recv'd Img size: 115224 bytes
13,859,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,087 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,596,219 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,436,803 ready_for_fw is high
3,437,461 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,747,560 >>> mbox cmd response: success
19,022,128 UART:
19,022,509 UART: Running Caliptra FMC ...
19,023,728 UART:
19,023,899 UART: [state] CFI Enabled
19,092,609 UART: [fht] FMC Alias Private Key: 7
20,857,351 UART: [art] Extend RT PCRs Done
20,858,576 UART: [art] Lock RT PCRs Done
20,860,262 UART: [art] Populate DV Done
20,865,891 UART: [fht] FMC Alias Private Key: 7
20,867,375 UART: [art] Derive CDI
20,868,141 UART: [art] Store in in slot 0x4
20,925,157 UART: [art] Derive Key Pair
20,926,197 UART: [art] Store priv key in slot 0x5
23,389,263 UART: [art] Derive Key Pair - Done
23,402,266 UART: [art] Signing Cert with AUTHO
23,403,571 UART: RITY.KEYID = 7
25,114,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,166 UART: [art] PUB.X = 1680E3120B1DF4EADC7FEC09D32054D21EE3CA4D829EDAD7FD55BDD4192483418FA4B1B07BA2EF9A10F06C113C3A034E
25,123,479 UART: [art] PUB.Y = F3268918539C7B5A18B96EF3360F94259E140019AAD0937AFA30C267BCE6E5C45B5A3A8A740C745BD4B378941EE4B4F3
25,130,695 UART: [art] SIG.R = 304D8492C89F354EB2BA21090828B40787D4809BE0A77D5C09F6D0310B87B807C274153701DC86876BB2FCCA86BE4FC8
25,138,096 UART: [art] SIG.S = C222C8E4CCF6FC8421B4335F8B3F8797608AFAD61AF407E9DDC5F81875D4BE25F82EE1538F0B324B0EA675450D69C6D4
26,116,718 UART: Caliptra RT
26,117,429 UART: [state] CFI Enabled
26,283,043 UART: [rt] RT listening for mailbox commands...
26,284,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,314,740 UART: [rt]cmd =0x46504c54, len=4
26,316,214 >>> mbox cmd response data (8 bytes)
26,317,293 UART: [rt] FIPS self test
26,318,234 UART: [kat] ++
26,318,685 UART: [kat] sha1
26,323,033 UART: [kat] SHA2-256
26,324,974 UART: [kat] SHA2-384
26,327,938 UART: [kat] SHA2-512-ACC
26,330,188 UART: [kat] ECC-384
28,767,702 UART: [kat] HMAC-384Kdf
28,773,628 UART: [kat] LMS
28,994,951 UART: Fatal Error: 0x90070002
29,030,216 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,174,945 >>> mbox cmd response: failed
29,175,547 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,320,231 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,425,359 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,737,107 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,478 UART:
192,862 UART: Running Caliptra ROM ...
193,995 UART:
603,803 UART: [state] CFI Enabled
617,176 UART: [state] LifecycleState = Unprovisioned
619,541 UART: [state] DebugLocked = No
622,212 UART: [state] WD Timer not started. Device not locked for debugging
627,475 UART: [kat] SHA2-256
817,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,185 UART: [kat] ++
828,788 UART: [kat] sha1
840,334 UART: [kat] SHA2-256
843,388 UART: [kat] SHA2-384
849,316 UART: [kat] SHA2-512-ACC
851,902 UART: [kat] ECC-384
3,294,817 UART: [kat] HMAC-384Kdf
3,308,975 UART: [kat] LMS
3,840,858 UART: [kat] --
3,846,437 UART: [cold-reset] ++
3,848,660 UART: [fht] FHT @ 0x50003400
3,860,634 UART: [idev] ++
3,861,350 UART: [idev] CDI.KEYID = 6
3,862,383 UART: [idev] SUBJECT.KEYID = 7
3,863,488 UART: [idev] UDS.KEYID = 0
3,864,425 ready_for_fw is high
3,864,661 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,009,489 UART: [idev] Erasing UDS.KEYID = 0
6,341,293 UART: [idev] Sha1 KeyId Algorithm
6,363,239 UART: [idev] --
6,368,127 UART: [ldev] ++
6,368,823 UART: [ldev] CDI.KEYID = 6
6,369,709 UART: [ldev] SUBJECT.KEYID = 5
6,370,929 UART: [ldev] AUTHORITY.KEYID = 7
6,372,128 UART: [ldev] FE.KEYID = 1
6,383,078 UART: [ldev] Erasing FE.KEYID = 1
8,860,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,920 UART: [ldev] --
10,653,726 UART: [fwproc] Wait for Commands...
10,656,475 UART: [fwproc] Recv command 0x46574c44
10,658,790 UART: [fwproc] Recv'd Img size: 115224 bytes
14,114,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,270 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,858,795 >>> mbox cmd response: success
14,862,873 UART: [afmc] ++
14,863,598 UART: [afmc] CDI.KEYID = 6
14,864,783 UART: [afmc] SUBJECT.KEYID = 7
14,866,216 UART: [afmc] AUTHORITY.KEYID = 5
17,371,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,096,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,098,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,113,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,128,955 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,143,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,167,638 UART: [afmc] --
19,171,629 UART: [cold-reset] --
19,176,304 UART: [state] Locking Datavault
19,181,762 UART: [state] Locking PCR0, PCR1 and PCR31
19,183,948 UART: [state] Locking ICCM
19,186,404 UART: [exit] Launching FMC @ 0x40000130
19,195,069 UART:
19,195,326 UART: Running Caliptra FMC ...
19,196,353 UART:
19,196,499 UART: [state] CFI Enabled
19,204,927 UART: [fht] FMC Alias Private Key: 7
20,962,180 UART: [art] Extend RT PCRs Done
20,963,398 UART: [art] Lock RT PCRs Done
20,965,215 UART: [art] Populate DV Done
20,970,847 UART: [fht] FMC Alias Private Key: 7
20,972,334 UART: [art] Derive CDI
20,973,070 UART: [art] Store in in slot 0x4
21,015,783 UART: [art] Derive Key Pair
21,016,828 UART: [art] Store priv key in slot 0x5
23,443,472 UART: [art] Derive Key Pair - Done
23,456,568 UART: [art] Signing Cert with AUTHO
23,457,875 UART: RITY.KEYID = 7
25,163,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,108 UART: [art] PUB.X = 1DFD0DC75AE2770D471D8D8C2232CC08C5FF95082F9A8D263706843DB5CE3A86A3CC937EF1F84EE882DDA688B95AB267
25,172,366 UART: [art] PUB.Y = 4F9FCF55F4242107086FF982E43A877509CD21ABF9DB3416B68C9C545B1E84113E30A2DAD8D04CFA5D049B1069A6E418
25,179,660 UART: [art] SIG.R = C66531D93CFA4B33B3EA8C8B6765FADE32EFBC0280AE010B3A5BC8539029413981705E6BCF4168188B9A03E88E329D33
25,187,001 UART: [art] SIG.S = B1D24EEF2C379D2B7FAF4511BAEEA9679EB99DC84EAFBA4808B1D24E306423A3EC022D54CE682CC47EB3907B00C7A755
26,166,224 UART: Caliptra RT
26,166,914 UART: [state] CFI Enabled
26,284,035 UART: [rt] RT listening for mailbox commands...
26,285,909 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,315,641 UART: [rt]cmd =0x46504c54, len=4
26,317,279 >>> mbox cmd response data (8 bytes)
26,318,454 UART: [rt] FIPS self test
26,319,393 UART: [kat] ++
26,319,844 UART: [kat] sha1
26,324,411 UART: [kat] SHA2-256
26,326,338 UART: [kat] SHA2-384
26,329,402 UART: [kat] SHA2-512-ACC
26,331,656 UART: [kat] ECC-384
28,758,449 UART: [kat] HMAC-384Kdf
28,764,292 UART: [kat] LMS
28,985,700 UART: Fatal Error: 0x90070002
29,021,063 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,165,768 >>> mbox cmd response: failed
29,166,383 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,311,017 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,110 UART:
190,402 UART: Running Caliptra ROM ...
191,431 UART:
11,211,875 UART: [state] CFI Enabled
11,225,122 UART: [state] LifecycleState = Unprovisioned
11,227,201 UART: [state] DebugLocked = No
11,229,827 UART: [state] WD Timer not started. Device not locked for debugging
11,234,814 UART: [kat] SHA2-256
11,424,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,435,478 UART: [kat] ++
11,435,938 UART: [kat] sha1
11,447,318 UART: [kat] SHA2-256
11,450,342 UART: [kat] SHA2-384
11,455,865 UART: [kat] SHA2-512-ACC
11,458,433 UART: [kat] ECC-384
13,900,045 UART: [kat] HMAC-384Kdf
13,913,362 UART: [kat] LMS
14,445,230 UART: [kat] --
14,450,622 UART: [cold-reset] ++
14,452,829 UART: [fht] FHT @ 0x50003400
14,464,018 UART: [idev] ++
14,464,692 UART: [idev] CDI.KEYID = 6
14,465,690 UART: [idev] SUBJECT.KEYID = 7
14,466,787 UART: [idev] UDS.KEYID = 0
14,468,505 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,613,185 UART: [idev] Erasing UDS.KEYID = 0
16,949,988 UART: [idev] Sha1 KeyId Algorithm
16,973,592 UART: [idev] --
16,978,040 UART: [ldev] ++
16,978,725 UART: [ldev] CDI.KEYID = 6
16,979,603 UART: [ldev] SUBJECT.KEYID = 5
16,980,813 UART: [ldev] AUTHORITY.KEYID = 7
16,982,042 UART: [ldev] FE.KEYID = 1
16,993,203 UART: [ldev] Erasing FE.KEYID = 1
19,469,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,189,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,204,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,219,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,234,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,255,498 UART: [ldev] --
21,261,843 UART: [fwproc] Wait for Commands...
21,264,159 UART: [fwproc] Recv command 0x46574c44
21,266,477 UART: [fwproc] Recv'd Img size: 115224 bytes
24,727,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,809,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
24,925,549 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
25,472,921 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,759,235 ready_for_fw is high
3,759,852 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,973,172 >>> mbox cmd response: success
19,230,813 UART:
19,231,205 UART: Running Caliptra FMC ...
19,232,376 UART:
19,232,544 UART: [state] CFI Enabled
19,240,384 UART: [fht] FMC Alias Private Key: 7
20,996,667 UART: [art] Extend RT PCRs Done
20,997,873 UART: [art] Lock RT PCRs Done
20,999,654 UART: [art] Populate DV Done
21,005,185 UART: [fht] FMC Alias Private Key: 7
21,006,843 UART: [art] Derive CDI
21,007,667 UART: [art] Store in in slot 0x4
21,049,831 UART: [art] Derive Key Pair
21,050,831 UART: [art] Store priv key in slot 0x5
23,477,723 UART: [art] Derive Key Pair - Done
23,490,773 UART: [art] Signing Cert with AUTHO
23,492,082 UART: RITY.KEYID = 7
25,197,343 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,840 UART: [art] PUB.X = ECFCC09CAE767F0420AE48CFEA2B0CE1DD1057784824FF8D1BDA7B62B8D84B97CAFC55F0BB9E5483698D868A9715BD90
25,206,179 UART: [art] PUB.Y = A86BF990FDEF0A746DAEB1D62C31B93BC9ABCDD05AA56A51B4B80EE7A7BF5E76B811D078F0732BCD9B4375CB3CCD0DD2
25,213,440 UART: [art] SIG.R = 7541FEA2BF532C2820FEB7F4B29A246360EA47B93B740D20F4928ED91C1D933227EBD468B9C5A6F24D390E8976F35197
25,220,860 UART: [art] SIG.S = 31AD68E4677E94F29CDD58FF7450AACA08BA4EFC15819AD1F4392E616A4002F25B0BE2E73A784EEB17F24B2C6EBC4E2D
26,199,840 UART: Caliptra RT
26,200,541 UART: [state] CFI Enabled
26,318,308 UART: [rt] RT listening for mailbox commands...
26,320,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,349,780 UART: [rt]cmd =0x46504c54, len=4
26,351,340 >>> mbox cmd response data (8 bytes)
26,352,399 UART: [rt] FIPS self test
26,353,345 UART: [kat] ++
26,353,799 UART: [kat] sha1
26,358,311 UART: [kat] SHA2-256
26,360,237 UART: [kat] SHA2-384
26,363,211 UART: [kat] SHA2-512-ACC
26,365,472 UART: [kat] ECC-384
28,792,738 UART: [kat] HMAC-384Kdf
28,798,504 UART: [kat] LMS
29,019,751 UART: Fatal Error: 0x90070002
29,055,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,199,794 >>> mbox cmd response: failed
29,200,454 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
29,345,106 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
14,339,004 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
25,566,149 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,649 UART: [kat] SHA2-256
892,587 UART: [kat] SHA2-384
895,364 UART: [kat] SHA2-512-ACC
897,265 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,474 UART: [kat] LMS
1,475,670 UART: [kat] --
1,476,663 UART: [cold-reset] ++
1,477,229 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 ready_for_fw is high
1,481,189 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,505,358 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,988 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,743 UART: [ldev] Erasing FE.KEYID = 1
1,547,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,032 UART: [ldev] --
1,586,407 UART: [fwproc] Waiting for Commands...
1,587,068 UART: [fwproc] Received command 0x46574c44
1,587,859 UART: [fwproc] Received Image of size 115224 bytes
2,896,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,556 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,081 >>> mbox cmd response: success
3,091,249 UART: [afmc] ++
3,091,417 UART: [afmc] CDI.KEYID = 6
3,091,779 UART: [afmc] SUBJECT.KEYID = 7
3,092,204 UART: [afmc] AUTHORITY.KEYID = 5
3,127,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,084 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,774 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,479 UART: [afmc] --
3,170,555 UART: [cold-reset] --
3,171,545 UART: [state] Locking Datavault
3,172,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,468 UART: [state] Locking ICCM
3,173,950 UART: [exit] Launching FMC @ 0x40000130
3,179,279 UART:
3,179,295 UART: Running Caliptra FMC ...
3,179,703 UART:
3,179,757 UART: [state] CFI Enabled
3,189,862 UART: [fht] FMC Alias Private Key: 7
3,297,659 UART: [art] Extend RT PCRs Done
3,298,087 UART: [art] Lock RT PCRs Done
3,299,225 UART: [art] Populate DV Done
3,307,696 UART: [fht] FMC Alias Private Key: 7
3,308,826 UART: [art] Derive CDI
3,309,106 UART: [art] Store in in slot 0x4
3,395,133 UART: [art] Derive Key Pair
3,395,493 UART: [art] Store priv key in slot 0x5
3,409,313 UART: [art] Derive Key Pair - Done
3,424,113 UART: [art] Signing Cert with AUTHO
3,424,593 UART: RITY.KEYID = 7
3,439,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,572 UART: [art] PUB.X = C7E8477109293EA3764C83CF2D56E003944277A872CB47E4D987C4B004234516F4364F83185B5213ECC65EDE3B7F795D
3,447,327 UART: [art] PUB.Y = 9C26F58033A8FDC6F42355A485178AB2921F2A6ABC35EA721A98160B102BA3C4727FA85843927853527EB0DF53ED846F
3,454,274 UART: [art] SIG.R = D7E99354364E3169D8617C9A19E468B147FCEA30280AF731D41898E797F6AFDEB3382841F8034C53C221003D9F11F613
3,461,010 UART: [art] SIG.S = 1C77C3904EFF6783517090DCA9DD89C67DB9B2F570C87B1A02B40D67C2335887091F7854D127CC40F53C04357531F2C9
3,485,059 UART: Caliptra RT
3,485,313 UART: [state] CFI Enabled
3,593,781 UART: [rt] RT listening for mailbox commands...
3,594,444 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,928 UART: [rt]cmd =0x46504c54, len=4
3,624,958 >>> mbox cmd response data (8 bytes)
3,625,159 UART: [rt] FIPS self test
3,625,487 UART: [kat] ++
3,625,639 UART: [kat] sha1
3,629,997 UART: [kat] SHA2-256
3,632,019 UART: [kat] SHA2-384
3,634,704 UART: [kat] SHA2-512-ACC
3,636,631 UART: [kat] ECC-384
3,646,677 UART: [kat] HMAC-384Kdf
3,651,257 UART: [kat] LMS
3,919,951 UART: Fatal Error: 0x90070002
3,921,501 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,921,506 >>> mbox cmd response: failed
3,921,506 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,921,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,377 UART: [kat] SHA2-256
882,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,423 UART: [kat] ++
886,575 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,430 UART: [kat] SHA2-512-ACC
897,331 UART: [kat] ECC-384
903,216 UART: [kat] HMAC-384Kdf
907,950 UART: [kat] LMS
1,476,146 UART: [kat] --
1,477,127 UART: [cold-reset] ++
1,477,659 UART: [fht] Storing FHT @ 0x50003400
1,480,382 UART: [idev] ++
1,480,550 UART: [idev] CDI.KEYID = 6
1,480,910 UART: [idev] SUBJECT.KEYID = 7
1,481,334 UART: [idev] UDS.KEYID = 0
1,481,679 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,254 UART: [idev] Erasing UDS.KEYID = 0
1,506,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,948 UART: [idev] --
1,515,877 UART: [ldev] ++
1,516,045 UART: [ldev] CDI.KEYID = 6
1,516,408 UART: [ldev] SUBJECT.KEYID = 5
1,516,834 UART: [ldev] AUTHORITY.KEYID = 7
1,517,297 UART: [ldev] FE.KEYID = 1
1,522,419 UART: [ldev] Erasing FE.KEYID = 1
1,547,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,860 UART: [ldev] --
1,587,181 UART: [fwproc] Waiting for Commands...
1,587,818 UART: [fwproc] Received command 0x46574c44
1,588,609 UART: [fwproc] Received Image of size 115224 bytes
2,896,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,043 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,595 ready_for_fw is high
1,362,595 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,829 >>> mbox cmd response: success
2,999,707 UART:
2,999,723 UART: Running Caliptra FMC ...
3,000,131 UART:
3,000,185 UART: [state] CFI Enabled
3,010,480 UART: [fht] FMC Alias Private Key: 7
3,119,135 UART: [art] Extend RT PCRs Done
3,119,563 UART: [art] Lock RT PCRs Done
3,120,883 UART: [art] Populate DV Done
3,129,176 UART: [fht] FMC Alias Private Key: 7
3,130,118 UART: [art] Derive CDI
3,130,398 UART: [art] Store in in slot 0x4
3,216,083 UART: [art] Derive Key Pair
3,216,443 UART: [art] Store priv key in slot 0x5
3,229,397 UART: [art] Derive Key Pair - Done
3,244,035 UART: [art] Signing Cert with AUTHO
3,244,515 UART: RITY.KEYID = 7
3,259,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,414 UART: [art] PUB.X = 950F0BA7A8C856852B635F40AAEA025D39C3271651EC4592A23FF93D1D7F3A8F8992BA2C9425F67FFEC952A7C5DCB502
3,267,182 UART: [art] PUB.Y = 78ECAC032EA69CC8EEE2736B2C7AD1D592285FB4EAF79FCFE03E992DC5F0BBA51D93910D8103DAEC72B01919F06B2158
3,274,143 UART: [art] SIG.R = 8637129EAF8A17A295B2127628A39A858D17C764B921AE036E53AC1981655602D173A15B48760087D2E7FE28AE6CE18E
3,280,879 UART: [art] SIG.S = 5A18893DF1321D2ACD3D817E19D7512F07A5C5F730BDECE171D0AB3776F64A3F77F3ABE9D10F9FFE9CE9798F6F497861
3,304,954 UART: Caliptra RT
3,305,208 UART: [state] CFI Enabled
3,414,046 UART: [rt] RT listening for mailbox commands...
3,414,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,935 UART: [rt]cmd =0x46504c54, len=4
3,445,269 >>> mbox cmd response data (8 bytes)
3,445,600 UART: [rt] FIPS self test
3,445,928 UART: [kat] ++
3,446,080 UART: [kat] sha1
3,450,196 UART: [kat] SHA2-256
3,452,218 UART: [kat] SHA2-384
3,455,047 UART: [kat] SHA2-512-ACC
3,456,974 UART: [kat] ECC-384
3,466,782 UART: [kat] HMAC-384Kdf
3,471,448 UART: [kat] LMS
3,740,134 UART: Fatal Error: 0x90070002
3,741,684 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,741,689 >>> mbox cmd response: failed
3,741,689 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,741,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,951 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,135 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,588 UART: [kat] SHA2-256
882,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,634 UART: [kat] ++
886,786 UART: [kat] sha1
891,134 UART: [kat] SHA2-256
893,072 UART: [kat] SHA2-384
895,823 UART: [kat] SHA2-512-ACC
897,724 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,947 UART: [idev] ++
1,480,115 UART: [idev] CDI.KEYID = 6
1,480,475 UART: [idev] SUBJECT.KEYID = 7
1,480,899 UART: [idev] UDS.KEYID = 0
1,481,244 ready_for_fw is high
1,481,244 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,867 UART: [idev] Erasing UDS.KEYID = 0
1,505,767 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,307 UART: [idev] --
1,515,380 UART: [ldev] ++
1,515,548 UART: [ldev] CDI.KEYID = 6
1,515,911 UART: [ldev] SUBJECT.KEYID = 5
1,516,337 UART: [ldev] AUTHORITY.KEYID = 7
1,516,800 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,007 UART: [ldev] --
1,587,378 UART: [fwproc] Waiting for Commands...
1,588,087 UART: [fwproc] Received command 0x46574c44
1,588,878 UART: [fwproc] Received Image of size 115224 bytes
2,897,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,975 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,100 >>> mbox cmd response: success
3,092,130 UART: [afmc] ++
3,092,298 UART: [afmc] CDI.KEYID = 6
3,092,660 UART: [afmc] SUBJECT.KEYID = 7
3,093,085 UART: [afmc] AUTHORITY.KEYID = 5
3,128,572 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,441 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,131 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,186 UART: [afmc] --
3,172,310 UART: [cold-reset] --
3,173,040 UART: [state] Locking Datavault
3,174,465 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,069 UART: [state] Locking ICCM
3,175,511 UART: [exit] Launching FMC @ 0x40000130
3,180,840 UART:
3,180,856 UART: Running Caliptra FMC ...
3,181,264 UART:
3,181,407 UART: [state] CFI Enabled
3,192,314 UART: [fht] FMC Alias Private Key: 7
3,300,047 UART: [art] Extend RT PCRs Done
3,300,475 UART: [art] Lock RT PCRs Done
3,302,015 UART: [art] Populate DV Done
3,310,118 UART: [fht] FMC Alias Private Key: 7
3,311,056 UART: [art] Derive CDI
3,311,336 UART: [art] Store in in slot 0x4
3,396,631 UART: [art] Derive Key Pair
3,396,991 UART: [art] Store priv key in slot 0x5
3,410,179 UART: [art] Derive Key Pair - Done
3,425,026 UART: [art] Signing Cert with AUTHO
3,425,506 UART: RITY.KEYID = 7
3,440,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,607 UART: [art] PUB.X = 828C08D56CF82423961B62528EBA753C6BBE32D8F5F84D523D0F3EAA7B7615BE8D0C2CAF5168C57BB416FC8290109D3A
3,448,378 UART: [art] PUB.Y = 85C273138D657FB366D33855C39C0995DD6F87456CFC3B67B5F2B55CDB4016A74FAF7439F3E5D053D336405F827A720E
3,455,322 UART: [art] SIG.R = B4DE1D66A65AF4CF7C2D76CF7656C6E0BA924A856850AE44DBEF98D145798013503826EC1A1267AD731949194905F176
3,462,089 UART: [art] SIG.S = E4839A7D6E7E57B96BEAE85D8BD96BC6ED4F7836FC948984BCDA5B8B306DC88A5B7207316AF6A1D59E8C530847D9DAAF
3,485,438 UART: Caliptra RT
3,485,784 UART: [state] CFI Enabled
3,593,857 UART: [rt] RT listening for mailbox commands...
3,594,520 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,866 UART: [rt]cmd =0x46504c54, len=4
3,624,934 >>> mbox cmd response data (8 bytes)
3,625,229 UART: [rt] FIPS self test
3,625,557 UART: [kat] ++
3,625,709 UART: [kat] sha1
3,629,981 UART: [kat] SHA2-256
3,632,003 UART: [kat] SHA2-384
3,635,106 UART: [kat] SHA2-512-ACC
3,637,033 UART: [kat] ECC-384
3,646,765 UART: [kat] HMAC-384Kdf
3,651,301 UART: [kat] LMS
3,919,953 UART: Fatal Error: 0x90070002
3,921,503 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,921,508 >>> mbox cmd response: failed
3,921,508 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,921,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,895 UART: [kat] HMAC-384Kdf
907,511 UART: [kat] LMS
1,475,707 UART: [kat] --
1,476,736 UART: [cold-reset] ++
1,477,190 UART: [fht] Storing FHT @ 0x50003400
1,479,911 UART: [idev] ++
1,480,079 UART: [idev] CDI.KEYID = 6
1,480,439 UART: [idev] SUBJECT.KEYID = 7
1,480,863 UART: [idev] UDS.KEYID = 0
1,481,208 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,229 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,169 UART: [idev] --
1,515,352 UART: [ldev] ++
1,515,520 UART: [ldev] CDI.KEYID = 6
1,515,883 UART: [ldev] SUBJECT.KEYID = 5
1,516,309 UART: [ldev] AUTHORITY.KEYID = 7
1,516,772 UART: [ldev] FE.KEYID = 1
1,521,864 UART: [ldev] Erasing FE.KEYID = 1
1,547,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,213 UART: [ldev] --
1,586,574 UART: [fwproc] Waiting for Commands...
1,587,393 UART: [fwproc] Received command 0x46574c44
1,588,184 UART: [fwproc] Received Image of size 115224 bytes
2,896,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,228 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,340 ready_for_fw is high
1,362,340 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,864 >>> mbox cmd response: success
3,002,240 UART:
3,002,256 UART: Running Caliptra FMC ...
3,002,664 UART:
3,002,807 UART: [state] CFI Enabled
3,013,700 UART: [fht] FMC Alias Private Key: 7
3,121,367 UART: [art] Extend RT PCRs Done
3,121,795 UART: [art] Lock RT PCRs Done
3,123,459 UART: [art] Populate DV Done
3,131,848 UART: [fht] FMC Alias Private Key: 7
3,132,946 UART: [art] Derive CDI
3,133,226 UART: [art] Store in in slot 0x4
3,218,675 UART: [art] Derive Key Pair
3,219,035 UART: [art] Store priv key in slot 0x5
3,231,819 UART: [art] Derive Key Pair - Done
3,246,542 UART: [art] Signing Cert with AUTHO
3,247,022 UART: RITY.KEYID = 7
3,261,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,673 UART: [art] PUB.X = 238B2EDD6CD9C48F40833060310A01574EBC2E36396F480C3EC48861ECD9C9627532B9091BBF72B08E5E099923162258
3,269,422 UART: [art] PUB.Y = 62DCE21EA4267ED3B4FF8C5F5A08220C3DC4AB3F2DC07D40578649E3D00C19C1D3B1E43C26E82503FE60C272140BF3E9
3,276,369 UART: [art] SIG.R = 71BD3D03DB02AB6B9DFF4F88142BCB183D71D4EE4294F296A74137A0586105DD8BFB4CFA993569DB0FDF7607D15C5B78
3,283,138 UART: [art] SIG.S = B13E6BA116965681BD99CFCE0A4E632D7D08E174B4004FAD4886059F97D66DDDA42FA40B32C7C60CBA915F8ECAD29083
3,307,116 UART: Caliptra RT
3,307,462 UART: [state] CFI Enabled
3,416,294 UART: [rt] RT listening for mailbox commands...
3,416,957 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,451 UART: [rt]cmd =0x46504c54, len=4
3,447,771 >>> mbox cmd response data (8 bytes)
3,447,904 UART: [rt] FIPS self test
3,448,232 UART: [kat] ++
3,448,384 UART: [kat] sha1
3,452,446 UART: [kat] SHA2-256
3,454,468 UART: [kat] SHA2-384
3,457,201 UART: [kat] SHA2-512-ACC
3,459,128 UART: [kat] ECC-384
3,469,242 UART: [kat] HMAC-384Kdf
3,473,924 UART: [kat] LMS
3,742,436 UART: Fatal Error: 0x90070002
3,743,986 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,743,991 >>> mbox cmd response: failed
3,743,991 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,743,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,260 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,719 UART: [kat] SHA2-256
903,659 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,548 UART: [kat] LMS
1,170,876 UART: [kat] --
1,171,761 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 ready_for_fw is high
1,176,067 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,209,183 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,918 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,282,078 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,053 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,116 >>> mbox cmd response: success
2,786,360 UART: [afmc] ++
2,786,528 UART: [afmc] CDI.KEYID = 6
2,786,890 UART: [afmc] SUBJECT.KEYID = 7
2,787,315 UART: [afmc] AUTHORITY.KEYID = 5
2,822,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,603 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,665 UART: [afmc] --
2,866,759 UART: [cold-reset] --
2,867,523 UART: [state] Locking Datavault
2,868,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,230 UART: [state] Locking ICCM
2,869,666 UART: [exit] Launching FMC @ 0x40000130
2,874,995 UART:
2,875,011 UART: Running Caliptra FMC ...
2,875,419 UART:
2,875,473 UART: [state] CFI Enabled
2,885,676 UART: [fht] FMC Alias Private Key: 7
2,993,845 UART: [art] Extend RT PCRs Done
2,994,273 UART: [art] Lock RT PCRs Done
2,995,875 UART: [art] Populate DV Done
3,004,032 UART: [fht] FMC Alias Private Key: 7
3,005,118 UART: [art] Derive CDI
3,005,398 UART: [art] Store in in slot 0x4
3,091,117 UART: [art] Derive Key Pair
3,091,477 UART: [art] Store priv key in slot 0x5
3,104,711 UART: [art] Derive Key Pair - Done
3,119,631 UART: [art] Signing Cert with AUTHO
3,120,111 UART: RITY.KEYID = 7
3,135,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,810 UART: [art] PUB.X = 344F0059E73C49FB7D9A5C5D6A0DBAE4D4612C86F9EAC22C792E583A0C786E50F27D74C6F825E0B8EC5C21986327381A
3,142,560 UART: [art] PUB.Y = 583422DBE1125B4B5D3013725EF1E06157589D85689517D6866D88B2ED6AE9F29DFCDFC2696F56D76A848142D0DE03A0
3,149,507 UART: [art] SIG.R = 0301B4586221002B0F0651079B9777663DAA7B1372FC3C8F7D3A20B8F93DBE0E6E66D8946D042CEB813BDAAFA6CE9C54
3,156,242 UART: [art] SIG.S = CE90AC343A1182FF6E224626499B6D1FAE7F71A4E4AAB4ACC40D0CE776211508A50F5F0BD3F6DBE61FAFCA5D826B9832
3,180,178 UART: Caliptra RT
3,180,432 UART: [state] CFI Enabled
3,288,746 UART: [rt] RT listening for mailbox commands...
3,289,409 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,845 UART: [rt]cmd =0x46504c54, len=4
3,319,933 >>> mbox cmd response data (8 bytes)
3,320,160 UART: [rt] FIPS self test
3,320,488 UART: [kat] ++
3,320,640 UART: [kat] sha1
3,325,094 UART: [kat] SHA2-256
3,327,116 UART: [kat] SHA2-384
3,329,947 UART: [kat] SHA2-512-ACC
3,331,874 UART: [kat] ECC-384
3,342,334 UART: [kat] HMAC-384Kdf
3,346,970 UART: [kat] LMS
3,615,660 UART: Fatal Error: 0x90070002
3,617,210 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,617,215 >>> mbox cmd response: failed
3,617,215 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,617,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,311 UART: [kat] SHA2-256
904,251 UART: [kat] SHA2-384
906,936 UART: [kat] SHA2-512-ACC
908,837 UART: [kat] ECC-384
918,674 UART: [kat] HMAC-384Kdf
923,062 UART: [kat] LMS
1,171,390 UART: [kat] --
1,172,177 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,560 UART: [idev] ++
1,175,728 UART: [idev] CDI.KEYID = 6
1,176,088 UART: [idev] SUBJECT.KEYID = 7
1,176,512 UART: [idev] UDS.KEYID = 0
1,176,857 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,432 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,471 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,446 UART: [fwproc] Recv command 0x46574c44
1,284,174 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,541 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,614 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,835 ready_for_fw is high
1,059,835 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,185 >>> mbox cmd response: success
2,697,427 UART:
2,697,443 UART: Running Caliptra FMC ...
2,697,851 UART:
2,697,905 UART: [state] CFI Enabled
2,708,260 UART: [fht] FMC Alias Private Key: 7
2,815,781 UART: [art] Extend RT PCRs Done
2,816,209 UART: [art] Lock RT PCRs Done
2,817,867 UART: [art] Populate DV Done
2,825,914 UART: [fht] FMC Alias Private Key: 7
2,826,904 UART: [art] Derive CDI
2,827,184 UART: [art] Store in in slot 0x4
2,912,537 UART: [art] Derive Key Pair
2,912,897 UART: [art] Store priv key in slot 0x5
2,925,777 UART: [art] Derive Key Pair - Done
2,940,661 UART: [art] Signing Cert with AUTHO
2,941,141 UART: RITY.KEYID = 7
2,956,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,016 UART: [art] PUB.X = 5140D5EC3E297E2B488C00EC19FB5F1EAE23D99A16A61132FFA80D73F010A8EAFF6001AE8929C4192AB1C5DA4FA08F1D
2,963,776 UART: [art] PUB.Y = FC058CCBA771671ECF593368B03539021B39D755CD22C453E212289AC14FC3ED24F8572879C0EF4C102B9CC76605D10A
2,970,716 UART: [art] SIG.R = 8E1A9811AF305136090A530055E09CFAF32C7401627B3117DEB33A5F6C52DB28591CB10B25BFE8A06C5BD66C2C154B91
2,977,456 UART: [art] SIG.S = C0B3DE71208D434CE076BCF80798B8F0A4F2B48192735C3DB1DB97A95067ADE7D9FA9709B5CCBFEE11A1948F6DA61D8B
3,001,651 UART: Caliptra RT
3,001,905 UART: [state] CFI Enabled
3,108,744 UART: [rt] RT listening for mailbox commands...
3,109,407 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,817 UART: [rt]cmd =0x46504c54, len=4
3,140,049 >>> mbox cmd response data (8 bytes)
3,140,414 UART: [rt] FIPS self test
3,140,742 UART: [kat] ++
3,140,894 UART: [kat] sha1
3,145,184 UART: [kat] SHA2-256
3,147,206 UART: [kat] SHA2-384
3,150,067 UART: [kat] SHA2-512-ACC
3,151,994 UART: [kat] ECC-384
3,161,838 UART: [kat] HMAC-384Kdf
3,166,282 UART: [kat] LMS
3,435,002 UART: Fatal Error: 0x90070002
3,436,552 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,436,557 >>> mbox cmd response: failed
3,436,557 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,436,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,413 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,701 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
923,157 UART: [kat] LMS
1,171,485 UART: [kat] --
1,172,478 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,527 UART: [idev] ++
1,175,695 UART: [idev] CDI.KEYID = 6
1,176,055 UART: [idev] SUBJECT.KEYID = 7
1,176,479 UART: [idev] UDS.KEYID = 0
1,176,824 ready_for_fw is high
1,176,824 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,674 UART: [idev] Sha1 KeyId Algorithm
1,210,080 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,258 UART: [ldev] --
1,283,669 UART: [fwproc] Wait for Commands...
1,284,239 UART: [fwproc] Recv command 0x46574c44
1,284,967 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,580 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,753 >>> mbox cmd response: success
2,787,007 UART: [afmc] ++
2,787,175 UART: [afmc] CDI.KEYID = 6
2,787,537 UART: [afmc] SUBJECT.KEYID = 7
2,787,962 UART: [afmc] AUTHORITY.KEYID = 5
2,823,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,477 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,196 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,050 UART: [afmc] --
2,867,140 UART: [cold-reset] --
2,867,926 UART: [state] Locking Datavault
2,869,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,745 UART: [state] Locking ICCM
2,870,169 UART: [exit] Launching FMC @ 0x40000130
2,875,498 UART:
2,875,514 UART: Running Caliptra FMC ...
2,875,922 UART:
2,876,065 UART: [state] CFI Enabled
2,886,580 UART: [fht] FMC Alias Private Key: 7
2,994,773 UART: [art] Extend RT PCRs Done
2,995,201 UART: [art] Lock RT PCRs Done
2,996,685 UART: [art] Populate DV Done
3,004,794 UART: [fht] FMC Alias Private Key: 7
3,005,736 UART: [art] Derive CDI
3,006,016 UART: [art] Store in in slot 0x4
3,091,479 UART: [art] Derive Key Pair
3,091,839 UART: [art] Store priv key in slot 0x5
3,104,799 UART: [art] Derive Key Pair - Done
3,119,700 UART: [art] Signing Cert with AUTHO
3,120,180 UART: RITY.KEYID = 7
3,135,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,477 UART: [art] PUB.X = 3F9584D55BF7CFF5EEA06CF1CFCADB5C51A63B6AF96715862DEB2D23240B40CA247CDDDEDF55F04370A33521DEEF097D
3,143,267 UART: [art] PUB.Y = 0AD618171B69CF9B44F6586DCD4689A57B6EC104ACB0A5EDCE0D5E4E5ED0012ED4A6B1ED3DFCAFDE56491A592B29CE7A
3,150,233 UART: [art] SIG.R = F4BF486E85F0D2E76229069E83BB3EFE19ED0DB824110381B1F6D5A64E2C66F0DA2C7CDD7BF40A79FA40BFB85C0111E4
3,157,006 UART: [art] SIG.S = 65DFA9C13BC097925650A16B7743371B34E05EDC17CD6809A1C195099260F3CC489021323D5EC83D3E7E6FC467CC4FFB
3,181,315 UART: Caliptra RT
3,181,661 UART: [state] CFI Enabled
3,288,987 UART: [rt] RT listening for mailbox commands...
3,289,650 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,940 UART: [rt]cmd =0x46504c54, len=4
3,320,128 >>> mbox cmd response data (8 bytes)
3,320,301 UART: [rt] FIPS self test
3,320,629 UART: [kat] ++
3,320,781 UART: [kat] sha1
3,325,003 UART: [kat] SHA2-256
3,327,025 UART: [kat] SHA2-384
3,329,854 UART: [kat] SHA2-512-ACC
3,331,781 UART: [kat] ECC-384
3,342,003 UART: [kat] HMAC-384Kdf
3,346,645 UART: [kat] LMS
3,615,335 UART: Fatal Error: 0x90070002
3,616,885 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,616,890 >>> mbox cmd response: failed
3,616,890 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,616,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,509 UART: [kat] SHA2-512-ACC
908,410 UART: [kat] ECC-384
917,777 UART: [kat] HMAC-384Kdf
922,347 UART: [kat] LMS
1,170,675 UART: [kat] --
1,171,956 UART: [cold-reset] ++
1,172,514 UART: [fht] FHT @ 0x50003400
1,175,157 UART: [idev] ++
1,175,325 UART: [idev] CDI.KEYID = 6
1,175,685 UART: [idev] SUBJECT.KEYID = 7
1,176,109 UART: [idev] UDS.KEYID = 0
1,176,454 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,943 UART: [idev] Erasing UDS.KEYID = 0
1,201,180 UART: [idev] Sha1 KeyId Algorithm
1,209,750 UART: [idev] --
1,210,824 UART: [ldev] ++
1,210,992 UART: [ldev] CDI.KEYID = 6
1,211,355 UART: [ldev] SUBJECT.KEYID = 5
1,211,781 UART: [ldev] AUTHORITY.KEYID = 7
1,212,244 UART: [ldev] FE.KEYID = 1
1,217,532 UART: [ldev] Erasing FE.KEYID = 1
1,244,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,474 UART: [ldev] --
1,283,947 UART: [fwproc] Wait for Commands...
1,284,573 UART: [fwproc] Recv command 0x46574c44
1,285,301 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,154 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,313 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,490 ready_for_fw is high
1,061,490 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,414 >>> mbox cmd response: success
2,701,534 UART:
2,701,550 UART: Running Caliptra FMC ...
2,701,958 UART:
2,702,101 UART: [state] CFI Enabled
2,712,770 UART: [fht] FMC Alias Private Key: 7
2,821,217 UART: [art] Extend RT PCRs Done
2,821,645 UART: [art] Lock RT PCRs Done
2,823,339 UART: [art] Populate DV Done
2,831,658 UART: [fht] FMC Alias Private Key: 7
2,832,830 UART: [art] Derive CDI
2,833,110 UART: [art] Store in in slot 0x4
2,918,683 UART: [art] Derive Key Pair
2,919,043 UART: [art] Store priv key in slot 0x5
2,931,757 UART: [art] Derive Key Pair - Done
2,946,555 UART: [art] Signing Cert with AUTHO
2,947,035 UART: RITY.KEYID = 7
2,962,211 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,976 UART: [art] PUB.X = 5EDCF1EDD80E92D79416F2321E9BFA8DC61345F17E9D11C7E7415F5B3DF90BADCF58E2F6DF838C8394506037590CF7F2
2,969,751 UART: [art] PUB.Y = 0C58B0B0EC3260BDBCB0D98F22FAD5BBC614522CEB6424508502061AA3D1F93D84AE335D01C57289D0D18A19B1758ED8
2,976,699 UART: [art] SIG.R = 8BD0544FCEF0E0CDB2B2A94F4869C2627B40117E1E2D6F5FB69AC3D0A1C04328EF804012BBF5E72AE6B0085F9CE3A7AB
2,983,486 UART: [art] SIG.S = 7D152283DB864E0B4D30D800344664399D7E63BF6BB31B19F4B9291F2BB3EC18C800E2AB68096189EB52B2C21067FB84
3,006,559 UART: Caliptra RT
3,006,905 UART: [state] CFI Enabled
3,114,435 UART: [rt] RT listening for mailbox commands...
3,115,098 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,520 UART: [rt]cmd =0x46504c54, len=4
3,145,720 >>> mbox cmd response data (8 bytes)
3,145,905 UART: [rt] FIPS self test
3,146,233 UART: [kat] ++
3,146,385 UART: [kat] sha1
3,150,565 UART: [kat] SHA2-256
3,152,587 UART: [kat] SHA2-384
3,155,532 UART: [kat] SHA2-512-ACC
3,157,459 UART: [kat] ECC-384
3,167,655 UART: [kat] HMAC-384Kdf
3,172,163 UART: [kat] LMS
3,440,797 UART: Fatal Error: 0x90070002
3,442,347 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,442,352 >>> mbox cmd response: failed
3,442,352 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,442,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,070 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,916 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 ready_for_fw is high
1,174,421 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,174 UART: [ldev] ++
1,208,342 UART: [ldev] CDI.KEYID = 6
1,208,706 UART: [ldev] SUBJECT.KEYID = 5
1,209,133 UART: [ldev] AUTHORITY.KEYID = 7
1,209,596 UART: [ldev] FE.KEYID = 1
1,214,638 UART: [ldev] Erasing FE.KEYID = 1
1,240,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,144 UART: [ldev] --
1,279,638 UART: [fwproc] Wait for Commands...
1,280,325 UART: [fwproc] Recv command 0x46574c44
1,281,058 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,890 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,970 >>> mbox cmd response: success
2,784,089 UART: [afmc] ++
2,784,257 UART: [afmc] CDI.KEYID = 6
2,784,620 UART: [afmc] SUBJECT.KEYID = 7
2,785,046 UART: [afmc] AUTHORITY.KEYID = 5
2,820,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,505 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,086 UART: [afmc] --
2,864,020 UART: [cold-reset] --
2,864,916 UART: [state] Locking Datavault
2,865,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,575 UART: [state] Locking ICCM
2,867,131 UART: [exit] Launching FMC @ 0x40000130
2,872,460 UART:
2,872,476 UART: Running Caliptra FMC ...
2,872,884 UART:
2,872,938 UART: [state] CFI Enabled
2,883,201 UART: [fht] FMC Alias Private Key: 7
2,991,368 UART: [art] Extend RT PCRs Done
2,991,796 UART: [art] Lock RT PCRs Done
2,993,530 UART: [art] Populate DV Done
3,001,675 UART: [fht] FMC Alias Private Key: 7
3,002,651 UART: [art] Derive CDI
3,002,931 UART: [art] Store in in slot 0x4
3,087,914 UART: [art] Derive Key Pair
3,088,274 UART: [art] Store priv key in slot 0x5
3,101,024 UART: [art] Derive Key Pair - Done
3,115,607 UART: [art] Signing Cert with AUTHO
3,116,087 UART: RITY.KEYID = 7
3,131,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,430 UART: [art] PUB.X = 4B920B1B3D7F16096BDDCE9B0783D49EEAA6D83710726188B6861C414B764A53A146E7B5B39DDCCF9EC931AEAC86B23E
3,139,205 UART: [art] PUB.Y = 6F138554F3A996C1CC8186C89EB7FE0C2CB72BAF75AE26239249818906B3F6B3957828A4DCA8396FE0C6658440B46EA1
3,146,151 UART: [art] SIG.R = 0F8B172773DA86840D6363DE5B459AA5B8F868EEB735308FCAF4F0F07D024025DD4481B016999CBE42A81A5FA4419280
3,152,914 UART: [art] SIG.S = DB944F2590CE68C57A4DDD6AB639EFDA49C3EFBE3B81BF38626A1D36B1FC1810ED98276C60BF1DD96AABB903BC59A7D9
3,176,722 UART: Caliptra RT
3,176,976 UART: [state] CFI Enabled
3,284,664 UART: [rt] RT listening for mailbox commands...
3,285,327 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,829 UART: [rt]cmd =0x46504c54, len=4
3,315,961 >>> mbox cmd response data (8 bytes)
3,316,162 UART: [rt] FIPS self test
3,316,490 UART: [kat] ++
3,316,642 UART: [kat] sha1
3,320,670 UART: [kat] SHA2-256
3,322,692 UART: [kat] SHA2-384
3,325,669 UART: [kat] SHA2-512-ACC
3,327,596 UART: [kat] ECC-384
3,337,864 UART: [kat] HMAC-384Kdf
3,342,488 UART: [kat] LMS
3,611,062 UART: Fatal Error: 0x90070002
3,612,612 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,612,617 >>> mbox cmd response: failed
3,612,617 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,612,622 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,087 UART: [idev] ++
1,173,255 UART: [idev] CDI.KEYID = 6
1,173,616 UART: [idev] SUBJECT.KEYID = 7
1,174,041 UART: [idev] UDS.KEYID = 0
1,174,387 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,237 UART: [idev] Erasing UDS.KEYID = 0
1,199,443 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,308 UART: [ldev] ++
1,209,476 UART: [ldev] CDI.KEYID = 6
1,209,840 UART: [ldev] SUBJECT.KEYID = 5
1,210,267 UART: [ldev] AUTHORITY.KEYID = 7
1,210,730 UART: [ldev] FE.KEYID = 1
1,215,820 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,710 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,986 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,734 ready_for_fw is high
1,055,734 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,408 >>> mbox cmd response: success
2,696,302 UART:
2,696,318 UART: Running Caliptra FMC ...
2,696,726 UART:
2,696,780 UART: [state] CFI Enabled
2,707,193 UART: [fht] FMC Alias Private Key: 7
2,814,646 UART: [art] Extend RT PCRs Done
2,815,074 UART: [art] Lock RT PCRs Done
2,816,594 UART: [art] Populate DV Done
2,824,495 UART: [fht] FMC Alias Private Key: 7
2,825,651 UART: [art] Derive CDI
2,825,931 UART: [art] Store in in slot 0x4
2,911,664 UART: [art] Derive Key Pair
2,912,024 UART: [art] Store priv key in slot 0x5
2,925,520 UART: [art] Derive Key Pair - Done
2,940,342 UART: [art] Signing Cert with AUTHO
2,940,822 UART: RITY.KEYID = 7
2,955,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,313 UART: [art] PUB.X = D79122CA6B20B16606CBF63A346713D075B14B8E7DEEDF908EBF22704056E864247AAF0729C31E50976849E3473C29C8
2,963,075 UART: [art] PUB.Y = 1B23B4EF91AE0701B0305263D51096154DC879E1DD52CC91523103159B2EE892EE9589C0D6FFE8A1C4834680523FED0F
2,970,013 UART: [art] SIG.R = 80ABC881F7521EC45188CE79EF74E8E0A787370BAD39B51445BC7D6E183CA6745D6279135CA3644514156A31252063A4
2,976,774 UART: [art] SIG.S = 1CA1C9CB717BBE06204B0E7DE3B95EB1417B8C4AF8E284AD5F3FD8D93F6ACF66D538BB37891708590F7162558552C608
3,000,578 UART: Caliptra RT
3,000,832 UART: [state] CFI Enabled
3,108,388 UART: [rt] RT listening for mailbox commands...
3,109,051 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,533 UART: [rt]cmd =0x46504c54, len=4
3,139,731 >>> mbox cmd response data (8 bytes)
3,139,906 UART: [rt] FIPS self test
3,140,234 UART: [kat] ++
3,140,386 UART: [kat] sha1
3,144,604 UART: [kat] SHA2-256
3,146,626 UART: [kat] SHA2-384
3,149,319 UART: [kat] SHA2-512-ACC
3,151,246 UART: [kat] ECC-384
3,160,872 UART: [kat] HMAC-384Kdf
3,165,658 UART: [kat] LMS
3,434,302 UART: Fatal Error: 0x90070002
3,435,852 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,435,857 >>> mbox cmd response: failed
3,435,857 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,435,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,462 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,376 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,686 UART: [cold-reset] ++
1,171,200 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,175,078 ready_for_fw is high
1,175,078 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,086 UART: [idev] --
1,209,021 UART: [ldev] ++
1,209,189 UART: [ldev] CDI.KEYID = 6
1,209,553 UART: [ldev] SUBJECT.KEYID = 5
1,209,980 UART: [ldev] AUTHORITY.KEYID = 7
1,210,443 UART: [ldev] FE.KEYID = 1
1,215,629 UART: [ldev] Erasing FE.KEYID = 1
1,241,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,740 UART: [fwproc] Recv command 0x46574c44
1,282,473 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,497 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,547 >>> mbox cmd response: success
2,785,810 UART: [afmc] ++
2,785,978 UART: [afmc] CDI.KEYID = 6
2,786,341 UART: [afmc] SUBJECT.KEYID = 7
2,786,767 UART: [afmc] AUTHORITY.KEYID = 5
2,822,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,243 UART: [afmc] --
2,865,243 UART: [cold-reset] --
2,865,879 UART: [state] Locking Datavault
2,867,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,688 UART: [state] Locking ICCM
2,868,266 UART: [exit] Launching FMC @ 0x40000130
2,873,595 UART:
2,873,611 UART: Running Caliptra FMC ...
2,874,019 UART:
2,874,162 UART: [state] CFI Enabled
2,884,549 UART: [fht] FMC Alias Private Key: 7
2,992,730 UART: [art] Extend RT PCRs Done
2,993,158 UART: [art] Lock RT PCRs Done
2,994,638 UART: [art] Populate DV Done
3,002,697 UART: [fht] FMC Alias Private Key: 7
3,003,861 UART: [art] Derive CDI
3,004,141 UART: [art] Store in in slot 0x4
3,089,900 UART: [art] Derive Key Pair
3,090,260 UART: [art] Store priv key in slot 0x5
3,104,038 UART: [art] Derive Key Pair - Done
3,118,867 UART: [art] Signing Cert with AUTHO
3,119,347 UART: RITY.KEYID = 7
3,134,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,694 UART: [art] PUB.X = 7EACD9AFAC302CCC16D1DFF1B412DDE6F32BD03823FA85BF600AEC16DA7D7FE0200B37160A124A6580004ACD35582AE8
3,142,455 UART: [art] PUB.Y = 196FB6A5C7A00E3E31199DB0B344F2759F5531D2D9A6D866EFD79338C1BF0743CAFEC26C4BC7A90D9F477DF9F0C711BE
3,149,412 UART: [art] SIG.R = 4D5035F10F265EC68E1112B7BDA347B0766467D8EC711EE56DD5ED483888BF80CC383E9D45D9F424A96F2391952824C5
3,156,179 UART: [art] SIG.S = 19B859ED0186B455726204D16374537CDD782E78562A33DEA348019D75F8494345AA9718405F1FBD9820B95C918CD0B1
3,179,811 UART: Caliptra RT
3,180,157 UART: [state] CFI Enabled
3,286,889 UART: [rt] RT listening for mailbox commands...
3,287,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,158 UART: [rt]cmd =0x46504c54, len=4
3,318,374 >>> mbox cmd response data (8 bytes)
3,318,573 UART: [rt] FIPS self test
3,318,901 UART: [kat] ++
3,319,053 UART: [kat] sha1
3,323,373 UART: [kat] SHA2-256
3,325,395 UART: [kat] SHA2-384
3,328,232 UART: [kat] SHA2-512-ACC
3,330,159 UART: [kat] ECC-384
3,339,887 UART: [kat] HMAC-384Kdf
3,344,415 UART: [kat] LMS
3,613,025 UART: Fatal Error: 0x90070002
3,614,575 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,614,580 >>> mbox cmd response: failed
3,614,580 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,614,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,532 UART: [kat] SHA2-256
902,472 UART: [kat] SHA2-384
905,253 UART: [kat] SHA2-512-ACC
907,154 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
1,174,868 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,811 UART: [ldev] ++
1,209,979 UART: [ldev] CDI.KEYID = 6
1,210,343 UART: [ldev] SUBJECT.KEYID = 5
1,210,770 UART: [ldev] AUTHORITY.KEYID = 7
1,211,233 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,833 UART: [fwproc] Wait for Commands...
1,283,584 UART: [fwproc] Recv command 0x46574c44
1,284,317 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,871 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,157 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,261 ready_for_fw is high
1,056,261 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,677 >>> mbox cmd response: success
2,695,469 UART:
2,695,485 UART: Running Caliptra FMC ...
2,695,893 UART:
2,696,036 UART: [state] CFI Enabled
2,706,679 UART: [fht] FMC Alias Private Key: 7
2,814,548 UART: [art] Extend RT PCRs Done
2,814,976 UART: [art] Lock RT PCRs Done
2,816,496 UART: [art] Populate DV Done
2,824,851 UART: [fht] FMC Alias Private Key: 7
2,825,979 UART: [art] Derive CDI
2,826,259 UART: [art] Store in in slot 0x4
2,911,930 UART: [art] Derive Key Pair
2,912,290 UART: [art] Store priv key in slot 0x5
2,926,608 UART: [art] Derive Key Pair - Done
2,941,180 UART: [art] Signing Cert with AUTHO
2,941,660 UART: RITY.KEYID = 7
2,957,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,863 UART: [art] PUB.X = 0092663EA3E444D053A2FA222894AF3CE9B6F7F1E2709FD6EAB14ECAF60BE204F27DF73E3CE424AF725391AE83CD7B64
2,964,621 UART: [art] PUB.Y = 7ECF9F7F1243BF0EAF6ACED4128C1FE9E213E9AD703CD33EF56C671FEA77E474D6664435EE39408476E5E87473EE76AE
2,971,584 UART: [art] SIG.R = 63D4A3290107030958076B4F67DC8F0575E9F151805AA748D81C0FF007BB8FF229A2D1B7AE491C5D342C4271EB03513C
2,978,325 UART: [art] SIG.S = F1CE64123B8B6EB5ACDA4F8B12EAB83226F0974D03E22C126577E03D2B3DC9C92948F7DF6A128B4DF31969A9DC57C5A1
3,001,773 UART: Caliptra RT
3,002,119 UART: [state] CFI Enabled
3,110,729 UART: [rt] RT listening for mailbox commands...
3,111,392 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,830 UART: [rt]cmd =0x46504c54, len=4
3,141,820 >>> mbox cmd response data (8 bytes)
3,142,009 UART: [rt] FIPS self test
3,142,337 UART: [kat] ++
3,142,489 UART: [kat] sha1
3,146,925 UART: [kat] SHA2-256
3,148,947 UART: [kat] SHA2-384
3,151,830 UART: [kat] SHA2-512-ACC
3,153,757 UART: [kat] ECC-384
3,163,931 UART: [kat] HMAC-384Kdf
3,168,513 UART: [kat] LMS
3,437,121 UART: Fatal Error: 0x90070002
3,438,671 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,438,676 >>> mbox cmd response: failed
3,438,676 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,438,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,899 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
2,674,343 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,818,288 >>> mbox cmd response: failed
2,818,834 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,962,112 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
4,880,190 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,456,959 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,664,886 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,808,893 >>> mbox cmd response: failed
2,809,472 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,952,708 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,865,103 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,465,855 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,017,902 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,162,598 >>> mbox cmd response: failed
3,163,189 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,306,403 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
21,580,390 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,019,759 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,020,975 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,165,086 >>> mbox cmd response: failed
3,165,744 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,308,970 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
21,581,274 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,032,765 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,677,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,822,482 >>> mbox cmd response: failed
2,823,057 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,967,248 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,455,819 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,290,019 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,679,700 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,824,445 >>> mbox cmd response: failed
2,825,031 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,968,668 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,484,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,306,376 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,681,621 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,826,173 >>> mbox cmd response: failed
2,826,736 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,970,216 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,460,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,296,288 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,038,792 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,183,289 >>> mbox cmd response: failed
3,183,853 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,327,482 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,178,902 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,910,276 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,030,984 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,175,611 >>> mbox cmd response: failed
3,176,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,319,674 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,166,058 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,883,958 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,672 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,680 >>> mbox cmd response: failed
803,680 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,757 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,664 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,696 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,704 >>> mbox cmd response: failed
803,704 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,587 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,610 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,131 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,139 >>> mbox cmd response: failed
804,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,475 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,997 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,005 >>> mbox cmd response: failed
804,005 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,528 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,955 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,124 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,132 >>> mbox cmd response: failed
804,132 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,565 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,366 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,218 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,226 >>> mbox cmd response: failed
803,226 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,309 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,138 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,443 >>> mbox cmd response: failed
803,443 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,129 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,111 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,119 >>> mbox cmd response: failed
804,119 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
804,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,285 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,762 >>> mbox cmd response: failed
803,762 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,142 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,630 >>> mbox cmd response: failed
803,630 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,097 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,596 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,703 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,711 >>> mbox cmd response: failed
803,711 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,194 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,537 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,743 >>> mbox cmd response: failed
803,743 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
803,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,208 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,683 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
193,017 UART:
193,373 UART: Running Caliptra ROM ...
194,551 UART:
194,701 UART: [state] CFI Enabled
265,149 UART: [state] LifecycleState = Unprovisioned
267,059 UART: [state] DebugLocked = No
269,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,560 UART: [kat] SHA2-256
444,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,742 UART: [kat] ++
455,236 UART: [kat] sha1
466,399 UART: [kat] SHA2-256
469,060 UART: [kat] SHA2-384
474,846 UART: [kat] SHA2-512-ACC
477,217 UART: [kat] ECC-384
2,765,190 UART: [kat] HMAC-384Kdf
2,777,879 UART: [kat] LMS
3,968,192 UART: [kat] --
3,971,931 UART: [cold-reset] ++
3,973,372 UART: [fht] Storing FHT @ 0x50003400
3,985,005 UART: [idev] ++
3,985,580 UART: [idev] CDI.KEYID = 6
3,986,486 UART: [idev] SUBJECT.KEYID = 7
3,987,738 UART: [idev] UDS.KEYID = 0
3,988,713 ready_for_fw is high
3,988,915 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,133,483 UART: [idev] Erasing UDS.KEYID = 0
7,320,978 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,252 UART: [idev] --
7,348,030 UART: [ldev] ++
7,348,603 UART: [ldev] CDI.KEYID = 6
7,349,543 UART: [ldev] SUBJECT.KEYID = 5
7,350,762 UART: [ldev] AUTHORITY.KEYID = 7
7,352,048 UART: [ldev] FE.KEYID = 1
7,394,167 UART: [ldev] Erasing FE.KEYID = 1
10,727,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,508 UART: [ldev] --
13,091,101 UART: [fwproc] Waiting for Commands...
13,093,689 UART: [fwproc] Received command 0x46574c44
13,095,880 UART: [fwproc] Received Image of size 114916 bytes
17,159,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,623,670 >>> mbox cmd response: success
17,628,302 UART: [afmc] ++
17,628,899 UART: [afmc] CDI.KEYID = 6
17,629,784 UART: [afmc] SUBJECT.KEYID = 7
17,631,057 UART: [afmc] AUTHORITY.KEYID = 5
20,996,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,666 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,057 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,924 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,335 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,369,129 UART: [afmc] --
23,372,867 UART: [cold-reset] --
23,378,138 UART: [state] Locking Datavault
23,383,332 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,041 UART: [state] Locking ICCM
23,387,249 UART: [exit] Launching FMC @ 0x40000130
23,395,595 UART:
23,395,833 UART: Running Caliptra FMC ...
23,396,938 UART:
23,397,100 UART: [state] CFI Enabled
23,461,654 UART: [fht] FMC Alias Private Key: 7
25,799,088 UART: [art] Extend RT PCRs Done
25,800,328 UART: [art] Lock RT PCRs Done
25,802,090 UART: [art] Populate DV Done
25,807,512 UART: [fht] FMC Alias Private Key: 7
25,809,161 UART: [art] Derive CDI
25,809,979 UART: [art] Store in in slot 0x4
25,870,646 UART: [art] Derive Key Pair
25,871,690 UART: [art] Store priv key in slot 0x5
29,164,373 UART: [art] Derive Key Pair - Done
29,177,756 UART: [art] Signing Cert with AUTHO
29,179,065 UART: RITY.KEYID = 7
31,465,805 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,311 UART: [art] PUB.X = 4F17F8FB5CF2831A3AC512D02B486452DA79272F87FCEA9B9DA119649AD096507762B2EA86A90A641961016A332A6466
31,474,524 UART: [art] PUB.Y = 58C618FF762EF0100A658C8184ED51219A9949EEBD86816349F6E7A70D90F9DDCF8AB24A3133657DD338E0FFD29B2D46
31,481,778 UART: [art] SIG.R = 158F56533F61ABB8367E3B38E8AE52AF40C6D11C4ACA330E092CECEF051C507DE88D66E23F40805381B5D282B479684D
31,489,125 UART: [art] SIG.S = FCC6F46EFB1E78B885760443B9CCD05AED9CFA7D16A3985213C499B1F6C9875489CB4D5D8441AB2514912DA1E5A2E5B1
32,794,296 UART: Caliptra RT
32,795,028 UART: [state] CFI Enabled
32,958,406 UART: [rt] RT listening for mailbox commands...
32,960,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,990,097 UART: [rt]cmd =0x46504c54, len=4
32,991,559 >>> mbox cmd response data (8 bytes)
32,992,638 UART: [rt] FIPS self test
32,993,591 UART: [kat] ++
32,994,042 UART: [kat] sha1
32,994,827 UART: Fatal Error: 0x90060001
33,029,951 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,174,321 >>> mbox cmd response: failed
33,174,915 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,319,231 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
189,992 UART:
190,304 UART: Running Caliptra ROM ...
191,423 UART:
191,578 UART: [state] CFI Enabled
259,188 UART: [state] LifecycleState = Unprovisioned
261,171 UART: [state] DebugLocked = No
262,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,709 UART: [kat] SHA2-256
437,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,944 UART: [kat] ++
448,419 UART: [kat] sha1
459,027 UART: [kat] SHA2-256
461,712 UART: [kat] SHA2-384
468,228 UART: [kat] SHA2-512-ACC
470,628 UART: [kat] ECC-384
2,761,310 UART: [kat] HMAC-384Kdf
2,773,710 UART: [kat] LMS
3,964,017 UART: [kat] --
3,968,951 UART: [cold-reset] ++
3,970,564 UART: [fht] Storing FHT @ 0x50003400
3,983,073 UART: [idev] ++
3,983,644 UART: [idev] CDI.KEYID = 6
3,984,608 UART: [idev] SUBJECT.KEYID = 7
3,985,824 UART: [idev] UDS.KEYID = 0
3,987,450 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,132,367 UART: [idev] Erasing UDS.KEYID = 0
7,324,863 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,387 UART: [idev] --
7,347,923 UART: [ldev] ++
7,348,551 UART: [ldev] CDI.KEYID = 6
7,349,432 UART: [ldev] SUBJECT.KEYID = 5
7,350,620 UART: [ldev] AUTHORITY.KEYID = 7
7,351,956 UART: [ldev] FE.KEYID = 1
7,395,866 UART: [ldev] Erasing FE.KEYID = 1
10,726,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,083,546 UART: [ldev] --
13,088,370 UART: [fwproc] Waiting for Commands...
13,090,751 UART: [fwproc] Received command 0x46574c44
13,092,948 UART: [fwproc] Received Image of size 114916 bytes
17,152,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,080 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,620,186 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,807,257 ready_for_fw is high
3,807,687 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,910,498 >>> mbox cmd response: success
23,615,967 UART:
23,616,351 UART: Running Caliptra FMC ...
23,617,492 UART:
23,617,652 UART: [state] CFI Enabled
23,681,796 UART: [fht] FMC Alias Private Key: 7
26,020,030 UART: [art] Extend RT PCRs Done
26,021,264 UART: [art] Lock RT PCRs Done
26,023,137 UART: [art] Populate DV Done
26,028,443 UART: [fht] FMC Alias Private Key: 7
26,030,091 UART: [art] Derive CDI
26,030,833 UART: [art] Store in in slot 0x4
26,091,570 UART: [art] Derive Key Pair
26,092,620 UART: [art] Store priv key in slot 0x5
29,385,613 UART: [art] Derive Key Pair - Done
29,398,670 UART: [art] Signing Cert with AUTHO
29,399,986 UART: RITY.KEYID = 7
31,686,892 UART: [art] Erasing AUTHORITY.KEYID = 7
31,688,402 UART: [art] PUB.X = 2555CC32049D372A22628B2547F04091C625660CBD215C4F5A37A4284DCDD6AC9F369D024449B076BB1BB637D00F2B31
31,695,659 UART: [art] PUB.Y = D0CFAEBDF429D1C0A449E06690F65C45C72A9EA8553DEFB8294C9C6B7A5D72C86B4000BEADAF88DA2A4148C87E771427
31,702,913 UART: [art] SIG.R = 85D2F684C3873E0BA363054FE3F71DB2CF91E5F555E2EA8522B426B18882B258F93FDD6E4EEDE2C06C86C2C4B9BAC5D1
31,710,324 UART: [art] SIG.S = CCDE5C8E32D5E09B13267F84105C933815C85A14C72BB5D54F59C5C3DE67CABC89D3DE95FEB74581F6DF218A1C46659C
33,016,172 UART: Caliptra RT
33,016,897 UART: [state] CFI Enabled
33,177,191 UART: [rt] RT listening for mailbox commands...
33,179,049 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,208,848 UART: [rt]cmd =0x46504c54, len=4
33,210,305 >>> mbox cmd response data (8 bytes)
33,211,536 UART: [rt] FIPS self test
33,212,485 UART: [kat] ++
33,212,935 UART: [kat] sha1
33,213,699 UART: Fatal Error: 0x90060001
33,248,913 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,393,243 >>> mbox cmd response: failed
33,393,862 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,538,162 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
3,785,275 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,859,193 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,537 UART:
192,912 UART: Running Caliptra ROM ...
194,428 UART:
603,588 UART: [state] CFI Enabled
619,092 UART: [state] LifecycleState = Unprovisioned
621,043 UART: [state] DebugLocked = No
622,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,941 UART: [kat] SHA2-256
797,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,251 UART: [kat] ++
808,788 UART: [kat] sha1
819,360 UART: [kat] SHA2-256
822,097 UART: [kat] SHA2-384
829,184 UART: [kat] SHA2-512-ACC
831,489 UART: [kat] ECC-384
3,114,643 UART: [kat] HMAC-384Kdf
3,126,309 UART: [kat] LMS
4,316,416 UART: [kat] --
4,320,507 UART: [cold-reset] ++
4,322,807 UART: [fht] Storing FHT @ 0x50003400
4,334,365 UART: [idev] ++
4,334,933 UART: [idev] CDI.KEYID = 6
4,335,888 UART: [idev] SUBJECT.KEYID = 7
4,337,137 UART: [idev] UDS.KEYID = 0
4,338,099 ready_for_fw is high
4,338,300 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,482,622 UART: [idev] Erasing UDS.KEYID = 0
7,621,477 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,507 UART: [idev] --
7,648,566 UART: [ldev] ++
7,649,150 UART: [ldev] CDI.KEYID = 6
7,650,171 UART: [ldev] SUBJECT.KEYID = 5
7,651,333 UART: [ldev] AUTHORITY.KEYID = 7
7,652,564 UART: [ldev] FE.KEYID = 1
7,662,645 UART: [ldev] Erasing FE.KEYID = 1
10,947,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,635 UART: [ldev] --
13,304,146 UART: [fwproc] Waiting for Commands...
13,306,461 UART: [fwproc] Received command 0x46574c44
13,308,645 UART: [fwproc] Received Image of size 114916 bytes
17,371,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,841,856 >>> mbox cmd response: success
17,846,474 UART: [afmc] ++
17,847,071 UART: [afmc] CDI.KEYID = 6
17,847,988 UART: [afmc] SUBJECT.KEYID = 7
17,849,206 UART: [afmc] AUTHORITY.KEYID = 5
21,162,996 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,036 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,297 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,699 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,513 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,973 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,560 UART: [afmc] --
23,532,421 UART: [cold-reset] --
23,538,549 UART: [state] Locking Datavault
23,544,462 UART: [state] Locking PCR0, PCR1 and PCR31
23,546,158 UART: [state] Locking ICCM
23,547,690 UART: [exit] Launching FMC @ 0x40000130
23,556,090 UART:
23,556,367 UART: Running Caliptra FMC ...
23,557,399 UART:
23,557,546 UART: [state] CFI Enabled
23,565,601 UART: [fht] FMC Alias Private Key: 7
25,896,596 UART: [art] Extend RT PCRs Done
25,897,870 UART: [art] Lock RT PCRs Done
25,899,147 UART: [art] Populate DV Done
25,904,836 UART: [fht] FMC Alias Private Key: 7
25,906,374 UART: [art] Derive CDI
25,907,192 UART: [art] Store in in slot 0x4
25,949,569 UART: [art] Derive Key Pair
25,950,573 UART: [art] Store priv key in slot 0x5
29,192,881 UART: [art] Derive Key Pair - Done
29,205,664 UART: [art] Signing Cert with AUTHO
29,206,968 UART: RITY.KEYID = 7
31,486,388 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,895 UART: [art] PUB.X = 8FB1B2322A2DCDA7BDB956B96296F549E7382E8B36CF89C7942BFEF37EC68F4D2B99C66EF22070A440B74E39A00B66EC
31,495,164 UART: [art] PUB.Y = A615D16AA92E307EF215B19DA832E58D4A2300768530180B0A927A80411F29EF791DF529676817F955E3EBE6C66AA25A
31,502,363 UART: [art] SIG.R = 817B7C0B0B834CBF92D3706CA7ADFE32B8EFBA7E8C21FCC173F9EA4D4C7BA4284A1D0AA0A91427E4D2272FF33CA1E6EB
31,509,825 UART: [art] SIG.S = 481BC75C128D2FF496536A6C056BF308B7AFA3F3CB89BD58737ED8F76D1749BC3A81D8A739FF3B2C532C6F98539AE6AA
32,814,966 UART: Caliptra RT
32,815,687 UART: [state] CFI Enabled
32,932,809 UART: [rt] RT listening for mailbox commands...
32,934,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,964,517 UART: [rt]cmd =0x46504c54, len=4
32,966,091 >>> mbox cmd response data (8 bytes)
32,967,343 UART: [rt] FIPS self test
32,968,284 UART: [kat] ++
32,968,756 UART: [kat] sha1
32,969,270 UART: Fatal Error: 0x90060001
33,004,562 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,148,812 >>> mbox cmd response: failed
33,149,464 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,293,764 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,000 UART:
190,295 UART: Running Caliptra ROM ...
191,325 UART:
7,240,496 UART: [state] CFI Enabled
7,253,513 UART: [state] LifecycleState = Unprovisioned
7,255,429 UART: [state] DebugLocked = No
7,257,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,262,608 UART: [kat] SHA2-256
7,432,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,442,903 UART: [kat] ++
7,443,395 UART: [kat] sha1
7,453,962 UART: [kat] SHA2-256
7,456,663 UART: [kat] SHA2-384
7,463,375 UART: [kat] SHA2-512-ACC
7,465,770 UART: [kat] ECC-384
9,747,418 UART: [kat] HMAC-384Kdf
9,759,478 UART: [kat] LMS
10,949,579 UART: [kat] --
10,952,321 UART: [cold-reset] ++
10,954,521 UART: [fht] Storing FHT @ 0x50003400
10,965,848 UART: [idev] ++
10,966,467 UART: [idev] CDI.KEYID = 6
10,967,346 UART: [idev] SUBJECT.KEYID = 7
10,968,614 UART: [idev] UDS.KEYID = 0
10,970,176 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,114,510 UART: [idev] Erasing UDS.KEYID = 0
14,259,186 UART: [idev] Using Sha1 for KeyId Algorithm
14,281,736 UART: [idev] --
14,285,086 UART: [ldev] ++
14,285,659 UART: [ldev] CDI.KEYID = 6
14,286,680 UART: [ldev] SUBJECT.KEYID = 5
14,287,840 UART: [ldev] AUTHORITY.KEYID = 7
14,289,130 UART: [ldev] FE.KEYID = 1
14,300,909 UART: [ldev] Erasing FE.KEYID = 1
17,593,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,884,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,899,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,913,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,928,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,945,868 UART: [ldev] --
19,951,006 UART: [fwproc] Waiting for Commands...
19,952,906 UART: [fwproc] Received command 0x46574c44
19,955,153 UART: [fwproc] Received Image of size 114916 bytes
24,022,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,093,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,162,033 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,482,215 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
4,127,193 ready_for_fw is high
4,127,611 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,080,298 >>> mbox cmd response: success
23,722,089 UART:
23,722,487 UART: Running Caliptra FMC ...
23,723,603 UART:
23,723,766 UART: [state] CFI Enabled
23,731,929 UART: [fht] FMC Alias Private Key: 7
26,062,342 UART: [art] Extend RT PCRs Done
26,063,576 UART: [art] Lock RT PCRs Done
26,065,343 UART: [art] Populate DV Done
26,070,723 UART: [fht] FMC Alias Private Key: 7
26,072,324 UART: [art] Derive CDI
26,073,142 UART: [art] Store in in slot 0x4
26,115,256 UART: [art] Derive Key Pair
26,116,309 UART: [art] Store priv key in slot 0x5
29,358,454 UART: [art] Derive Key Pair - Done
29,371,348 UART: [art] Signing Cert with AUTHO
29,372,655 UART: RITY.KEYID = 7
31,651,831 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,335 UART: [art] PUB.X = AA8B8C44753C9F143E05D34F8BA70D1791A256140EDFED20BCB3FD896F47FDA2BBF0782959A1218165217DDBC5A7E811
31,660,653 UART: [art] PUB.Y = EA4CAC8206ACF73D94692177F28E84D0D0878D922ACB52A5712EA16EA26F9CBBB898C7F561096FDA12693ADA01577E70
31,667,837 UART: [art] SIG.R = 4CF28D59344E20656627A4D6E692A41457FBFEAA1BC2CE234662EBBF4595BF30165B40180ED9171D7CBFE82A2C9CFED1
31,675,237 UART: [art] SIG.S = 8F936430F148A0D92A3BC5B1B98A13673B0C12E8CDBFC4E8525A505E63DD5CFF138C68AF0292CB61E0E09C5E89BB1BFF
32,980,409 UART: Caliptra RT
32,981,129 UART: [state] CFI Enabled
33,098,325 UART: [rt] RT listening for mailbox commands...
33,100,186 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,130,185 UART: [rt]cmd =0x46504c54, len=4
33,131,601 >>> mbox cmd response data (8 bytes)
33,132,714 UART: [rt] FIPS self test
33,133,676 UART: [kat] ++
33,134,130 UART: [kat] sha1
33,134,643 UART: Fatal Error: 0x90060001
33,170,376 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,314,756 >>> mbox cmd response: failed
33,315,413 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,459,506 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
10,606,483 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,567,439 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,000 writing to cptra_bootfsm_go
193,270 UART:
193,637 UART: Running Caliptra ROM ...
194,883 UART:
195,038 UART: [state] CFI Enabled
265,157 UART: [state] LifecycleState = Unprovisioned
267,060 UART: [state] DebugLocked = No
268,388 UART: [state] WD Timer not started. Device not locked for debugging
271,935 UART: [kat] SHA2-256
451,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,642 UART: [kat] ++
463,174 UART: [kat] sha1
472,919 UART: [kat] SHA2-256
475,927 UART: [kat] SHA2-384
481,282 UART: [kat] SHA2-512-ACC
484,205 UART: [kat] ECC-384
2,948,215 UART: [kat] HMAC-384Kdf
2,972,319 UART: [kat] LMS
3,501,766 UART: [kat] --
3,506,777 UART: [cold-reset] ++
3,508,784 UART: [fht] FHT @ 0x50003400
3,518,271 UART: [idev] ++
3,518,844 UART: [idev] CDI.KEYID = 6
3,519,726 UART: [idev] SUBJECT.KEYID = 7
3,520,850 UART: [idev] UDS.KEYID = 0
3,521,942 ready_for_fw is high
3,522,151 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,666,925 UART: [idev] Erasing UDS.KEYID = 0
6,027,099 UART: [idev] Sha1 KeyId Algorithm
6,049,693 UART: [idev] --
6,052,613 UART: [ldev] ++
6,053,192 UART: [ldev] CDI.KEYID = 6
6,054,075 UART: [ldev] SUBJECT.KEYID = 5
6,055,237 UART: [ldev] AUTHORITY.KEYID = 7
6,056,527 UART: [ldev] FE.KEYID = 1
6,085,899 UART: [ldev] Erasing FE.KEYID = 1
8,587,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,107 UART: [ldev] --
10,378,157 UART: [fwproc] Wait for Commands...
10,379,664 UART: [fwproc] Recv command 0x46574c44
10,381,759 UART: [fwproc] Recv'd Img size: 115224 bytes
13,790,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,861,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,172 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,250,877 >>> mbox cmd response: success
14,255,016 UART: [afmc] ++
14,255,612 UART: [afmc] CDI.KEYID = 6
14,256,539 UART: [afmc] SUBJECT.KEYID = 7
14,257,645 UART: [afmc] AUTHORITY.KEYID = 5
16,791,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,516,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,517,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,533,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,549,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,565,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,586,706 UART: [afmc] --
18,591,055 UART: [cold-reset] --
18,594,865 UART: [state] Locking Datavault
18,599,307 UART: [state] Locking PCR0, PCR1 and PCR31
18,601,011 UART: [state] Locking ICCM
18,603,140 UART: [exit] Launching FMC @ 0x40000130
18,611,532 UART:
18,611,768 UART: Running Caliptra FMC ...
18,612,888 UART:
18,613,048 UART: [state] CFI Enabled
18,677,105 UART: [fht] FMC Alias Private Key: 7
20,440,933 UART: [art] Extend RT PCRs Done
20,442,141 UART: [art] Lock RT PCRs Done
20,443,598 UART: [art] Populate DV Done
20,448,900 UART: [fht] FMC Alias Private Key: 7
20,450,602 UART: [art] Derive CDI
20,451,417 UART: [art] Store in in slot 0x4
20,509,647 UART: [art] Derive Key Pair
20,510,684 UART: [art] Store priv key in slot 0x5
22,973,911 UART: [art] Derive Key Pair - Done
22,987,177 UART: [art] Signing Cert with AUTHO
22,988,483 UART: RITY.KEYID = 7
24,698,923 UART: [art] Erasing AUTHORITY.KEYID = 7
24,700,410 UART: [art] PUB.X = 60108B45FF6BE1336C7AA5B92D72300833C7912CF981F0B231135AD5AF9E6F5080835320BFB858C4C79FECCE36F6EC1B
24,707,684 UART: [art] PUB.Y = 1EC3C03A816FF1D9F1B1D441D5C0F0EFACC76DA221AC374BD920384AC20EEB8BB60BC5380BA1559BC292253ABF67FD06
24,714,978 UART: [art] SIG.R = 64F42D472F3F999A3C0CB8493F761EFCAF0E17F4653945CF4D55E42D01EA4774A527CBC6875968D68A540FDCBA97A80E
24,722,755 UART: [art] SIG.S = CAF5950E6854FF6689CC47470172DFBD92B0F144C436AB2E33139288F9702E27E21855DE0E87627FCD5EABD96635603C
25,700,958 UART: Caliptra RT
25,701,659 UART: [state] CFI Enabled
25,866,597 UART: [rt] RT listening for mailbox commands...
25,868,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,897,963 UART: [rt]cmd =0x46504c54, len=4
25,899,488 >>> mbox cmd response data (8 bytes)
25,900,705 UART: [rt] FIPS self test
25,901,650 UART: [kat] ++
25,902,102 UART: [kat] sha1
25,902,722 UART: Fatal Error: 0x90060001
25,938,096 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,082,835 >>> mbox cmd response: failed
26,083,483 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,227,991 >>> mbox cmd response: failed
Initializing fuses
1,008 writing to cptra_bootfsm_go
190,078 UART:
190,374 UART: Running Caliptra ROM ...
191,483 UART:
191,636 UART: [state] CFI Enabled
263,691 UART: [state] LifecycleState = Unprovisioned
265,612 UART: [state] DebugLocked = No
267,096 UART: [state] WD Timer not started. Device not locked for debugging
270,671 UART: [kat] SHA2-256
449,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,358 UART: [kat] ++
461,888 UART: [kat] sha1
472,936 UART: [kat] SHA2-256
475,936 UART: [kat] SHA2-384
482,630 UART: [kat] SHA2-512-ACC
485,627 UART: [kat] ECC-384
2,947,161 UART: [kat] HMAC-384Kdf
2,967,122 UART: [kat] LMS
3,496,578 UART: [kat] --
3,502,299 UART: [cold-reset] ++
3,504,027 UART: [fht] FHT @ 0x50003400
3,515,402 UART: [idev] ++
3,515,970 UART: [idev] CDI.KEYID = 6
3,516,878 UART: [idev] SUBJECT.KEYID = 7
3,518,089 UART: [idev] UDS.KEYID = 0
3,519,604 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,664,467 UART: [idev] Erasing UDS.KEYID = 0
6,024,839 UART: [idev] Sha1 KeyId Algorithm
6,048,452 UART: [idev] --
6,052,723 UART: [ldev] ++
6,053,315 UART: [ldev] CDI.KEYID = 6
6,054,228 UART: [ldev] SUBJECT.KEYID = 5
6,055,391 UART: [ldev] AUTHORITY.KEYID = 7
6,056,625 UART: [ldev] FE.KEYID = 1
6,096,443 UART: [ldev] Erasing FE.KEYID = 1
8,598,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,912 UART: [ldev] --
10,410,799 UART: [fwproc] Wait for Commands...
10,413,390 UART: [fwproc] Recv command 0x46574c44
10,415,418 UART: [fwproc] Recv'd Img size: 115224 bytes
13,831,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,951 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,291,768 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,220 UART:
192,590 UART: Running Caliptra ROM ...
193,789 UART:
193,940 UART: [state] CFI Enabled
264,974 UART: [state] LifecycleState = Unprovisioned
267,397 UART: [state] DebugLocked = No
269,151 UART: [state] WD Timer not started. Device not locked for debugging
274,326 UART: [kat] SHA2-256
464,173 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,984 UART: [kat] ++
475,452 UART: [kat] sha1
487,041 UART: [kat] SHA2-256
490,067 UART: [kat] SHA2-384
495,643 UART: [kat] SHA2-512-ACC
498,228 UART: [kat] ECC-384
2,948,737 UART: [kat] HMAC-384Kdf
2,973,305 UART: [kat] LMS
3,505,132 UART: [kat] --
3,509,154 UART: [cold-reset] ++
3,510,453 UART: [fht] FHT @ 0x50003400
3,523,004 UART: [idev] ++
3,523,717 UART: [idev] CDI.KEYID = 6
3,524,677 UART: [idev] SUBJECT.KEYID = 7
3,525,855 UART: [idev] UDS.KEYID = 0
3,526,790 ready_for_fw is high
3,527,025 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,672,809 UART: [idev] Erasing UDS.KEYID = 0
6,031,816 UART: [idev] Sha1 KeyId Algorithm
6,055,163 UART: [idev] --
6,059,541 UART: [ldev] ++
6,060,223 UART: [ldev] CDI.KEYID = 6
6,061,202 UART: [ldev] SUBJECT.KEYID = 5
6,062,365 UART: [ldev] AUTHORITY.KEYID = 7
6,063,539 UART: [ldev] FE.KEYID = 1
6,101,410 UART: [ldev] Erasing FE.KEYID = 1
8,606,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,289 UART: [ldev] --
10,414,981 UART: [fwproc] Wait for Commands...
10,417,526 UART: [fwproc] Recv command 0x46574c44
10,419,841 UART: [fwproc] Recv'd Img size: 115224 bytes
13,885,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,967,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,083,666 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,631,679 >>> mbox cmd response: success
14,635,924 UART: [afmc] ++
14,636,634 UART: [afmc] CDI.KEYID = 6
14,637,875 UART: [afmc] SUBJECT.KEYID = 7
14,639,308 UART: [afmc] AUTHORITY.KEYID = 5
17,173,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,668 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,684 UART: [afmc] --
18,970,880 UART: [cold-reset] --
18,975,500 UART: [state] Locking Datavault
18,981,830 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,063 UART: [state] Locking ICCM
18,985,311 UART: [exit] Launching FMC @ 0x40000130
18,993,977 UART:
18,994,212 UART: Running Caliptra FMC ...
18,995,313 UART:
18,995,473 UART: [state] CFI Enabled
19,052,101 UART: [fht] FMC Alias Private Key: 7
20,816,311 UART: [art] Extend RT PCRs Done
20,817,536 UART: [art] Lock RT PCRs Done
20,819,123 UART: [art] Populate DV Done
20,824,432 UART: [fht] FMC Alias Private Key: 7
20,826,115 UART: [art] Derive CDI
20,826,959 UART: [art] Store in in slot 0x4
20,884,808 UART: [art] Derive Key Pair
20,885,811 UART: [art] Store priv key in slot 0x5
23,348,950 UART: [art] Derive Key Pair - Done
23,362,170 UART: [art] Signing Cert with AUTHO
23,363,470 UART: RITY.KEYID = 7
25,075,890 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,412 UART: [art] PUB.X = 7415C70868EF070629CD8FB055A33D94B2D1A01276BDFB188243BFB9607D9FBDD37458B6BB36F275191BA946251A079F
25,084,683 UART: [art] PUB.Y = AECDFB0C883F62F7C1D7DCC2919772243717E2B563110E77C177CF6A2F0AC99A7B710A9551302696C81FC339936994D8
25,091,945 UART: [art] SIG.R = 1A0C598CC1A17717FA6929F0E51211F2A45446A5EAD6B9BB22B009EFF8CC7148D91C7D228EF3D647FADF45ADCFB9AB46
25,099,347 UART: [art] SIG.S = 3E150B0885347D07BE70B029488FC31D17C7A0C13B02B4BBF0134782AD77465455517DAEE2C0D2462ACC1EBCB4D7995D
26,078,005 UART: Caliptra RT
26,078,704 UART: [state] CFI Enabled
26,243,500 UART: [rt] RT listening for mailbox commands...
26,245,345 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,275,121 UART: [rt]cmd =0x46504c54, len=4
26,276,663 >>> mbox cmd response data (8 bytes)
26,277,784 UART: [rt] FIPS self test
26,278,739 UART: [kat] ++
26,279,189 UART: [kat] sha1
26,279,751 UART: Fatal Error: 0x90060001
26,314,869 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,459,642 >>> mbox cmd response: failed
26,460,277 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,604,917 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,004 UART:
190,298 UART: Running Caliptra ROM ...
191,325 UART:
191,463 UART: [state] CFI Enabled
259,181 UART: [state] LifecycleState = Unprovisioned
261,561 UART: [state] DebugLocked = No
263,212 UART: [state] WD Timer not started. Device not locked for debugging
268,419 UART: [kat] SHA2-256
458,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,092 UART: [kat] ++
469,569 UART: [kat] sha1
480,607 UART: [kat] SHA2-256
483,666 UART: [kat] SHA2-384
489,862 UART: [kat] SHA2-512-ACC
492,477 UART: [kat] ECC-384
2,942,698 UART: [kat] HMAC-384Kdf
2,966,436 UART: [kat] LMS
3,498,190 UART: [kat] --
3,501,868 UART: [cold-reset] ++
3,503,149 UART: [fht] FHT @ 0x50003400
3,514,784 UART: [idev] ++
3,515,483 UART: [idev] CDI.KEYID = 6
3,516,428 UART: [idev] SUBJECT.KEYID = 7
3,517,644 UART: [idev] UDS.KEYID = 0
3,519,125 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,663,995 UART: [idev] Erasing UDS.KEYID = 0
6,021,953 UART: [idev] Sha1 KeyId Algorithm
6,044,601 UART: [idev] --
6,049,464 UART: [ldev] ++
6,050,153 UART: [ldev] CDI.KEYID = 6
6,051,044 UART: [ldev] SUBJECT.KEYID = 5
6,052,154 UART: [ldev] AUTHORITY.KEYID = 7
6,053,446 UART: [ldev] FE.KEYID = 1
6,094,483 UART: [ldev] Erasing FE.KEYID = 1
8,601,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,787 UART: [ldev] --
10,392,548 UART: [fwproc] Wait for Commands...
10,394,871 UART: [fwproc] Recv command 0x46574c44
10,397,186 UART: [fwproc] Recv'd Img size: 115224 bytes
13,848,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,044,322 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,592,064 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,922 writing to cptra_bootfsm_go
3,439,735 ready_for_fw is high
3,440,135 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,773,948 >>> mbox cmd response: success
19,080,282 UART:
19,080,687 UART: Running Caliptra FMC ...
19,081,814 UART:
19,081,988 UART: [state] CFI Enabled
19,150,482 UART: [fht] FMC Alias Private Key: 7
20,914,661 UART: [art] Extend RT PCRs Done
20,915,895 UART: [art] Lock RT PCRs Done
20,917,466 UART: [art] Populate DV Done
20,922,670 UART: [fht] FMC Alias Private Key: 7
20,924,213 UART: [art] Derive CDI
20,925,033 UART: [art] Store in in slot 0x4
20,982,911 UART: [art] Derive Key Pair
20,983,954 UART: [art] Store priv key in slot 0x5
23,447,284 UART: [art] Derive Key Pair - Done
23,459,852 UART: [art] Signing Cert with AUTHO
23,461,169 UART: RITY.KEYID = 7
25,173,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,732 UART: [art] PUB.X = DE758B807EBB939B8DF2B267A2F5CF7E8D9A604CB4A5F40AC1BAA23BCE71EB60F602B4B14D62E005C69030882C2BEF31
25,181,995 UART: [art] PUB.Y = 312705867C66BF00F48D22F089BE58DE745BD16E427B7640815090014B1A73A3CB21ECAB78342D0C9F08A68987DDB511
25,189,222 UART: [art] SIG.R = 2741B74554C552CD6424B97EE1D81CAD7950EE6BDA780A060548C0ADC2D34ECBC57EEFACD2DD2F3846E462B583D075F0
25,196,632 UART: [art] SIG.S = 32C71AEE5939BF16ADBB392A37E0400AD93A18DB8F32D2C8DB58DE3EE810C76DF38D96AD347BEFA02E0C30C28C68731B
26,175,769 UART: Caliptra RT
26,176,476 UART: [state] CFI Enabled
26,342,624 UART: [rt] RT listening for mailbox commands...
26,344,475 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,374,218 UART: [rt]cmd =0x46504c54, len=4
26,375,632 >>> mbox cmd response data (8 bytes)
26,376,633 UART: [rt] FIPS self test
26,377,509 UART: [kat] ++
26,377,953 UART: [kat] sha1
26,378,600 UART: Fatal Error: 0x90060001
26,413,988 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,558,633 >>> mbox cmd response: failed
26,559,285 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,703,933 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,432,425 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,715,250 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,739 UART:
193,101 UART: Running Caliptra ROM ...
194,219 UART:
603,788 UART: [state] CFI Enabled
620,074 UART: [state] LifecycleState = Unprovisioned
622,467 UART: [state] DebugLocked = No
624,046 UART: [state] WD Timer not started. Device not locked for debugging
628,035 UART: [kat] SHA2-256
817,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,662 UART: [kat] ++
829,269 UART: [kat] sha1
840,807 UART: [kat] SHA2-256
843,820 UART: [kat] SHA2-384
850,664 UART: [kat] SHA2-512-ACC
853,253 UART: [kat] ECC-384
3,294,820 UART: [kat] HMAC-384Kdf
3,306,699 UART: [kat] LMS
3,838,512 UART: [kat] --
3,840,907 UART: [cold-reset] ++
3,841,926 UART: [fht] FHT @ 0x50003400
3,852,983 UART: [idev] ++
3,853,701 UART: [idev] CDI.KEYID = 6
3,854,618 UART: [idev] SUBJECT.KEYID = 7
3,855,797 UART: [idev] UDS.KEYID = 0
3,856,726 ready_for_fw is high
3,856,951 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,001,712 UART: [idev] Erasing UDS.KEYID = 0
6,330,556 UART: [idev] Sha1 KeyId Algorithm
6,353,194 UART: [idev] --
6,357,244 UART: [ldev] ++
6,357,922 UART: [ldev] CDI.KEYID = 6
6,358,830 UART: [ldev] SUBJECT.KEYID = 5
6,360,041 UART: [ldev] AUTHORITY.KEYID = 7
6,361,219 UART: [ldev] FE.KEYID = 1
6,374,128 UART: [ldev] Erasing FE.KEYID = 1
8,850,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,892 UART: [ldev] --
10,641,187 UART: [fwproc] Wait for Commands...
10,643,073 UART: [fwproc] Recv command 0x46574c44
10,645,412 UART: [fwproc] Recv'd Img size: 115224 bytes
14,100,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,921 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,844,059 >>> mbox cmd response: success
14,847,994 UART: [afmc] ++
14,848,688 UART: [afmc] CDI.KEYID = 6
14,849,926 UART: [afmc] SUBJECT.KEYID = 7
14,851,406 UART: [afmc] AUTHORITY.KEYID = 5
17,351,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,259 UART: [afmc] --
19,150,546 UART: [cold-reset] --
19,153,922 UART: [state] Locking Datavault
19,160,298 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,492 UART: [state] Locking ICCM
19,164,045 UART: [exit] Launching FMC @ 0x40000130
19,172,716 UART:
19,172,950 UART: Running Caliptra FMC ...
19,174,051 UART:
19,174,210 UART: [state] CFI Enabled
19,182,419 UART: [fht] FMC Alias Private Key: 7
20,939,776 UART: [art] Extend RT PCRs Done
20,941,010 UART: [art] Lock RT PCRs Done
20,942,553 UART: [art] Populate DV Done
20,947,941 UART: [fht] FMC Alias Private Key: 7
20,949,648 UART: [art] Derive CDI
20,950,461 UART: [art] Store in in slot 0x4
20,993,016 UART: [art] Derive Key Pair
20,994,023 UART: [art] Store priv key in slot 0x5
23,420,898 UART: [art] Derive Key Pair - Done
23,434,332 UART: [art] Signing Cert with AUTHO
23,435,666 UART: RITY.KEYID = 7
25,141,425 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,930 UART: [art] PUB.X = DBEADD80ACE5DA4AD5272A558D36D535104AEF53D0714553FBEE31BB2CA41AE5AFED2764C847E36010A7BB1E22A9D240
25,150,231 UART: [art] PUB.Y = 3F6FACB088F2AA9E3712EA89985F66495A1DE7F86AB969BEA49D433FDE1FD120EDFCB6F403A109ECFC60DB5A1EA47F9F
25,157,530 UART: [art] SIG.R = 047279215F0DB6C958E9D89352FE0C37B37A57A23A125E0F58A9CB4EC76F1037C468F348648CBB64DA17A22A474E1FA9
25,164,921 UART: [art] SIG.S = 3812B4401E8CE1535AD99561C5B20B6DEB92C7F1C20719CECE98EF1D60A3E24A22645AB04B3DFB48168A87A4907CF33C
26,143,766 UART: Caliptra RT
26,144,450 UART: [state] CFI Enabled
26,262,472 UART: [rt] RT listening for mailbox commands...
26,264,316 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,294,053 UART: [rt]cmd =0x46504c54, len=4
26,295,738 >>> mbox cmd response data (8 bytes)
26,296,706 UART: [rt] FIPS self test
26,297,648 UART: [kat] ++
26,298,100 UART: [kat] sha1
26,298,774 UART: Fatal Error: 0x90060001
26,334,195 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,478,967 >>> mbox cmd response: failed
26,479,563 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,624,562 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,098 UART:
190,397 UART: Running Caliptra ROM ...
191,451 UART:
13,909,068 UART: [state] CFI Enabled
13,927,007 UART: [state] LifecycleState = Unprovisioned
13,929,388 UART: [state] DebugLocked = No
13,932,333 UART: [state] WD Timer not started. Device not locked for debugging
13,936,616 UART: [kat] SHA2-256
14,126,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,137,293 UART: [kat] ++
14,137,752 UART: [kat] sha1
14,147,828 UART: [kat] SHA2-256
14,150,892 UART: [kat] SHA2-384
14,157,636 UART: [kat] SHA2-512-ACC
14,160,240 UART: [kat] ECC-384
16,600,388 UART: [kat] HMAC-384Kdf
16,613,216 UART: [kat] LMS
17,145,041 UART: [kat] --
17,149,845 UART: [cold-reset] ++
17,151,451 UART: [fht] FHT @ 0x50003400
17,163,194 UART: [idev] ++
17,163,867 UART: [idev] CDI.KEYID = 6
17,164,847 UART: [idev] SUBJECT.KEYID = 7
17,166,055 UART: [idev] UDS.KEYID = 0
17,167,573 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,312,253 UART: [idev] Erasing UDS.KEYID = 0
19,647,659 UART: [idev] Sha1 KeyId Algorithm
19,669,917 UART: [idev] --
19,675,472 UART: [ldev] ++
19,676,148 UART: [ldev] CDI.KEYID = 6
19,677,025 UART: [ldev] SUBJECT.KEYID = 5
19,678,325 UART: [ldev] AUTHORITY.KEYID = 7
19,679,514 UART: [ldev] FE.KEYID = 1
19,691,113 UART: [ldev] Erasing FE.KEYID = 1
22,164,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,883,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,898,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,914,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,929,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,949,108 UART: [ldev] --
23,955,189 UART: [fwproc] Wait for Commands...
23,956,962 UART: [fwproc] Recv command 0x46574c44
23,959,274 UART: [fwproc] Recv'd Img size: 115224 bytes
27,420,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,502,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,618,191 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,165,952 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,757,446 ready_for_fw is high
3,757,879 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,972,938 >>> mbox cmd response: success
19,223,208 UART:
19,223,579 UART: Running Caliptra FMC ...
19,224,690 UART:
19,224,844 UART: [state] CFI Enabled
19,232,627 UART: [fht] FMC Alias Private Key: 7
20,988,548 UART: [art] Extend RT PCRs Done
20,989,766 UART: [art] Lock RT PCRs Done
20,991,654 UART: [art] Populate DV Done
20,997,119 UART: [fht] FMC Alias Private Key: 7
20,998,712 UART: [art] Derive CDI
20,999,532 UART: [art] Store in in slot 0x4
21,042,418 UART: [art] Derive Key Pair
21,043,491 UART: [art] Store priv key in slot 0x5
23,470,196 UART: [art] Derive Key Pair - Done
23,483,246 UART: [art] Signing Cert with AUTHO
23,484,554 UART: RITY.KEYID = 7
25,189,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,362 UART: [art] PUB.X = 40351B28AF81FB6F65F120945D813F080A6D01C0823C43BD81B2C8E0CCBCB504C99B8B8B7386A5B00E04F1C6465EEBD9
25,198,625 UART: [art] PUB.Y = 63AEC80CB10AB0681854903532ECEE2F9BD8412961718B739C6E8209E5B4171BB9E4B5720B7B1A02A340A604D34BC540
25,205,886 UART: [art] SIG.R = 7E929F825EDC51A30D5184665857F6135790419EC0A878938D4612F94D85801C6B2B3593800B1E97785CDD7F15C62A47
25,213,235 UART: [art] SIG.S = 0006C646312FBFD4DA0CB095D23AA2E8B10DC90B15023BAAB94D4160EB539828385AF0691B63C2971A07B2E75663526B
26,192,231 UART: Caliptra RT
26,192,940 UART: [state] CFI Enabled
26,309,937 UART: [rt] RT listening for mailbox commands...
26,311,791 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,341,620 UART: [rt]cmd =0x46504c54, len=4
26,343,093 >>> mbox cmd response data (8 bytes)
26,344,187 UART: [rt] FIPS self test
26,345,130 UART: [kat] ++
26,345,576 UART: [kat] sha1
26,346,192 UART: Fatal Error: 0x90060001
26,381,532 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,526,108 >>> mbox cmd response: failed
26,526,678 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,671,294 >>> mbox cmd response: failed
Initializing fuses
923 writing to cptra_bootfsm_go
17,016,801 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,231,306 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,001 UART: [kat] SHA2-256
891,939 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
907,208 UART: [kat] LMS
1,475,404 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,807 UART: [fht] Storing FHT @ 0x50003400
1,479,502 UART: [idev] ++
1,479,670 UART: [idev] CDI.KEYID = 6
1,480,030 UART: [idev] SUBJECT.KEYID = 7
1,480,454 UART: [idev] UDS.KEYID = 0
1,480,799 ready_for_fw is high
1,480,799 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,776 UART: [idev] --
1,514,869 UART: [ldev] ++
1,515,037 UART: [ldev] CDI.KEYID = 6
1,515,400 UART: [ldev] SUBJECT.KEYID = 5
1,515,826 UART: [ldev] AUTHORITY.KEYID = 7
1,516,289 UART: [ldev] FE.KEYID = 1
1,521,357 UART: [ldev] Erasing FE.KEYID = 1
1,546,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,856 UART: [ldev] --
1,586,167 UART: [fwproc] Waiting for Commands...
1,586,902 UART: [fwproc] Received command 0x46574c44
1,587,693 UART: [fwproc] Received Image of size 115224 bytes
2,895,556 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,384 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,921 >>> mbox cmd response: success
3,090,137 UART: [afmc] ++
3,090,305 UART: [afmc] CDI.KEYID = 6
3,090,667 UART: [afmc] SUBJECT.KEYID = 7
3,091,092 UART: [afmc] AUTHORITY.KEYID = 5
3,125,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,269 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,049 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,777 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,662 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,352 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,159 UART: [afmc] --
3,169,229 UART: [cold-reset] --
3,169,967 UART: [state] Locking Datavault
3,170,942 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,546 UART: [state] Locking ICCM
3,172,158 UART: [exit] Launching FMC @ 0x40000130
3,177,487 UART:
3,177,503 UART: Running Caliptra FMC ...
3,177,911 UART:
3,177,965 UART: [state] CFI Enabled
3,188,436 UART: [fht] FMC Alias Private Key: 7
3,296,901 UART: [art] Extend RT PCRs Done
3,297,329 UART: [art] Lock RT PCRs Done
3,299,005 UART: [art] Populate DV Done
3,307,066 UART: [fht] FMC Alias Private Key: 7
3,308,088 UART: [art] Derive CDI
3,308,368 UART: [art] Store in in slot 0x4
3,393,869 UART: [art] Derive Key Pair
3,394,229 UART: [art] Store priv key in slot 0x5
3,407,347 UART: [art] Derive Key Pair - Done
3,422,702 UART: [art] Signing Cert with AUTHO
3,423,182 UART: RITY.KEYID = 7
3,437,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,607 UART: [art] PUB.X = 0C5E8BA6294707BA71647F34799A6337FEA28851167F9AF22515F3CA4C57059C3681FD7893C6F58DBB9B3BADC837A9DC
3,445,374 UART: [art] PUB.Y = 23B5C38DD5D924103C8AB1D9F51E083FDC0F90B62EC0EE1B3769C5DBEFBF8CDC94BAA4ED5C4BA29F293F930CA4FC9E19
3,452,345 UART: [art] SIG.R = 4506DCA10686CA103B7DA8FF755D0F47BB5C60E8DF04D13299179F0826276331680A16A8B87F135424CF9FDB5DBA886C
3,459,101 UART: [art] SIG.S = 23ECCB08713CC38291177B1C4B9333B9541CA2A6C3ABA3A437086D1A9550280CB4AAC1AA7DFB3BAEF1DB2FA7B00A12BB
3,482,468 UART: Caliptra RT
3,482,722 UART: [state] CFI Enabled
3,591,001 UART: [rt] RT listening for mailbox commands...
3,591,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,218 UART: [rt]cmd =0x46504c54, len=4
3,622,294 >>> mbox cmd response data (8 bytes)
3,622,573 UART: [rt] FIPS self test
3,622,901 UART: [kat] ++
3,623,053 UART: [kat] sha1
3,623,669 UART: Fatal Error: 0x90060001
3,625,219 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,625,224 >>> mbox cmd response: failed
3,625,224 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,625,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
85,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,553 UART: [kat] SHA2-256
881,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,599 UART: [kat] ++
885,751 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,814 UART: [kat] SHA2-512-ACC
896,715 UART: [kat] ECC-384
902,210 UART: [kat] HMAC-384Kdf
906,806 UART: [kat] LMS
1,475,002 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,375 UART: [fht] Storing FHT @ 0x50003400
1,479,136 UART: [idev] ++
1,479,304 UART: [idev] CDI.KEYID = 6
1,479,664 UART: [idev] SUBJECT.KEYID = 7
1,480,088 UART: [idev] UDS.KEYID = 0
1,480,433 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,202 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,770 UART: [idev] --
1,514,867 UART: [ldev] ++
1,515,035 UART: [ldev] CDI.KEYID = 6
1,515,398 UART: [ldev] SUBJECT.KEYID = 5
1,515,824 UART: [ldev] AUTHORITY.KEYID = 7
1,516,287 UART: [ldev] FE.KEYID = 1
1,521,385 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,478 UART: [ldev] --
1,585,985 UART: [fwproc] Waiting for Commands...
1,586,764 UART: [fwproc] Received command 0x46574c44
1,587,555 UART: [fwproc] Received Image of size 115224 bytes
2,895,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,444 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,796 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,893 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,503 ready_for_fw is high
1,362,503 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,029 >>> mbox cmd response: success
2,998,967 UART:
2,998,983 UART: Running Caliptra FMC ...
2,999,391 UART:
2,999,445 UART: [state] CFI Enabled
3,010,130 UART: [fht] FMC Alias Private Key: 7
3,118,297 UART: [art] Extend RT PCRs Done
3,118,725 UART: [art] Lock RT PCRs Done
3,120,507 UART: [art] Populate DV Done
3,128,522 UART: [fht] FMC Alias Private Key: 7
3,129,546 UART: [art] Derive CDI
3,129,826 UART: [art] Store in in slot 0x4
3,215,215 UART: [art] Derive Key Pair
3,215,575 UART: [art] Store priv key in slot 0x5
3,228,763 UART: [art] Derive Key Pair - Done
3,243,582 UART: [art] Signing Cert with AUTHO
3,244,062 UART: RITY.KEYID = 7
3,259,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,771 UART: [art] PUB.X = 880A5AD50C13A09A9948556B90746319BF62C8CA31D78FDFD27593FE5BE0E4DB9C96A6B81DE9FF305752C54887557A01
3,266,536 UART: [art] PUB.Y = BE255D374EC0B8B4F4F3220E9C1EEE4183DC184E9570DCA439387686A8B3E2C72B73C839AF1199CE751E7FBF99B1AAB1
3,273,497 UART: [art] SIG.R = 630A44B884936C5EB05E6E1565B06D8846ECCE875AA1FDE628C3C60DF1E8989F82269CC624C269A8C1458818565B322A
3,280,261 UART: [art] SIG.S = 4B2DF7CC75520A3591A773C5F092C882175495A6091C973BBD4548EA614C75D3E4C222E7A8E47370E999127E18A89683
3,304,486 UART: Caliptra RT
3,304,740 UART: [state] CFI Enabled
3,412,441 UART: [rt] RT listening for mailbox commands...
3,413,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,438 UART: [rt]cmd =0x46504c54, len=4
3,443,576 >>> mbox cmd response data (8 bytes)
3,443,849 UART: [rt] FIPS self test
3,444,177 UART: [kat] ++
3,444,329 UART: [kat] sha1
3,445,109 UART: Fatal Error: 0x90060001
3,446,659 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,446,664 >>> mbox cmd response: failed
3,446,664 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,446,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,959 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,937,491 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,890 UART: [kat] SHA2-256
892,828 UART: [kat] SHA2-384
895,699 UART: [kat] SHA2-512-ACC
897,600 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,955 UART: [kat] LMS
1,476,151 UART: [kat] --
1,477,056 UART: [cold-reset] ++
1,477,624 UART: [fht] Storing FHT @ 0x50003400
1,480,467 UART: [idev] ++
1,480,635 UART: [idev] CDI.KEYID = 6
1,480,995 UART: [idev] SUBJECT.KEYID = 7
1,481,419 UART: [idev] UDS.KEYID = 0
1,481,764 ready_for_fw is high
1,481,764 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,305 UART: [idev] Erasing UDS.KEYID = 0
1,506,571 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,161 UART: [idev] --
1,516,178 UART: [ldev] ++
1,516,346 UART: [ldev] CDI.KEYID = 6
1,516,709 UART: [ldev] SUBJECT.KEYID = 5
1,517,135 UART: [ldev] AUTHORITY.KEYID = 7
1,517,598 UART: [ldev] FE.KEYID = 1
1,522,702 UART: [ldev] Erasing FE.KEYID = 1
1,548,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,307 UART: [ldev] --
1,587,572 UART: [fwproc] Waiting for Commands...
1,588,433 UART: [fwproc] Received command 0x46574c44
1,589,224 UART: [fwproc] Received Image of size 115224 bytes
2,898,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,907 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,534 >>> mbox cmd response: success
3,092,590 UART: [afmc] ++
3,092,758 UART: [afmc] CDI.KEYID = 6
3,093,120 UART: [afmc] SUBJECT.KEYID = 7
3,093,545 UART: [afmc] AUTHORITY.KEYID = 5
3,128,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,644 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,037 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,727 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,674 UART: [afmc] --
3,171,674 UART: [cold-reset] --
3,172,498 UART: [state] Locking Datavault
3,173,481 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,085 UART: [state] Locking ICCM
3,174,723 UART: [exit] Launching FMC @ 0x40000130
3,180,052 UART:
3,180,068 UART: Running Caliptra FMC ...
3,180,476 UART:
3,180,619 UART: [state] CFI Enabled
3,191,550 UART: [fht] FMC Alias Private Key: 7
3,300,005 UART: [art] Extend RT PCRs Done
3,300,433 UART: [art] Lock RT PCRs Done
3,301,989 UART: [art] Populate DV Done
3,310,190 UART: [fht] FMC Alias Private Key: 7
3,311,284 UART: [art] Derive CDI
3,311,564 UART: [art] Store in in slot 0x4
3,397,061 UART: [art] Derive Key Pair
3,397,421 UART: [art] Store priv key in slot 0x5
3,410,203 UART: [art] Derive Key Pair - Done
3,425,360 UART: [art] Signing Cert with AUTHO
3,425,840 UART: RITY.KEYID = 7
3,441,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,442,221 UART: [art] PUB.X = 1264440FDC0E0C52FD63E8DA76BD6E17A3EF44C5E3618B7AAF85D4CC08F813CAACA74604E87E5AD037B109A607F58B38
3,448,986 UART: [art] PUB.Y = B2B692239B7C9047CA2F8CFF902EEA16DD7E07BE92F4D1E8400E4492F464D0628BF4B52CEC07CE6CFDC0AE8472850B49
3,455,940 UART: [art] SIG.R = FC599E12F1AD26D60EB13B86A13350DB6D903FD9886295CEBA29652FB0EEA5D2C4FD042813297A39265B29331FFA9C00
3,462,690 UART: [art] SIG.S = 62AAC4F2CD6517073D64D19E50B9A89F8B0FA472F1ECA1910F11139E49B159097DFAC2C78FBD43D8EA275B69F4A3374B
3,486,541 UART: Caliptra RT
3,486,887 UART: [state] CFI Enabled
3,595,345 UART: [rt] RT listening for mailbox commands...
3,596,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,382 UART: [rt]cmd =0x46504c54, len=4
3,626,500 >>> mbox cmd response data (8 bytes)
3,626,837 UART: [rt] FIPS self test
3,627,165 UART: [kat] ++
3,627,317 UART: [kat] sha1
3,628,129 UART: Fatal Error: 0x90060001
3,629,679 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,629,684 >>> mbox cmd response: failed
3,629,684 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,629,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,730 UART: [kat] SHA2-256
892,668 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,993 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,454 UART: [cold-reset] ++
1,476,966 UART: [fht] Storing FHT @ 0x50003400
1,479,647 UART: [idev] ++
1,479,815 UART: [idev] CDI.KEYID = 6
1,480,175 UART: [idev] SUBJECT.KEYID = 7
1,480,599 UART: [idev] UDS.KEYID = 0
1,480,944 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,783 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,264 UART: [ldev] ++
1,515,432 UART: [ldev] CDI.KEYID = 6
1,515,795 UART: [ldev] SUBJECT.KEYID = 5
1,516,221 UART: [ldev] AUTHORITY.KEYID = 7
1,516,684 UART: [ldev] FE.KEYID = 1
1,522,306 UART: [ldev] Erasing FE.KEYID = 1
1,547,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,511 UART: [ldev] --
1,586,806 UART: [fwproc] Waiting for Commands...
1,587,429 UART: [fwproc] Received command 0x46574c44
1,588,220 UART: [fwproc] Received Image of size 115224 bytes
2,896,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,169 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,521 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,756 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 ready_for_fw is high
1,363,094 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,941,276 >>> mbox cmd response: success
3,003,182 UART:
3,003,198 UART: Running Caliptra FMC ...
3,003,606 UART:
3,003,749 UART: [state] CFI Enabled
3,014,338 UART: [fht] FMC Alias Private Key: 7
3,122,931 UART: [art] Extend RT PCRs Done
3,123,359 UART: [art] Lock RT PCRs Done
3,124,567 UART: [art] Populate DV Done
3,132,650 UART: [fht] FMC Alias Private Key: 7
3,133,758 UART: [art] Derive CDI
3,134,038 UART: [art] Store in in slot 0x4
3,219,495 UART: [art] Derive Key Pair
3,219,855 UART: [art] Store priv key in slot 0x5
3,233,023 UART: [art] Derive Key Pair - Done
3,247,728 UART: [art] Signing Cert with AUTHO
3,248,208 UART: RITY.KEYID = 7
3,263,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,151 UART: [art] PUB.X = 2E0ADF414BBC5E6482F3DC6B97D751B17CF2353032F49B895FECFEF0516255EE6451E0637BB28D0FED042850C8D0969B
3,270,922 UART: [art] PUB.Y = DFCC1D48EE917FB54A1724FE48252848A484993219DFF3177D777E1E8383315E9170BD2E2524C943CAB2ABACAE4CB119
3,277,880 UART: [art] SIG.R = 4E90079BBAFEE963F1F951476B94245992F169F135006A9290F7D825F58D55CE9643B34F5EC8081962599F47E4556574
3,284,610 UART: [art] SIG.S = D4957E1A3F9664171E8CD6AB12CFC66DDB880EBAB18D798B6C291DDA96DF231C4F390D559B187BBC2352162BC4E95176
3,308,107 UART: Caliptra RT
3,308,453 UART: [state] CFI Enabled
3,417,379 UART: [rt] RT listening for mailbox commands...
3,418,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,586 UART: [rt]cmd =0x46504c54, len=4
3,448,684 >>> mbox cmd response data (8 bytes)
3,448,865 UART: [rt] FIPS self test
3,449,193 UART: [kat] ++
3,449,345 UART: [kat] sha1
3,450,107 UART: Fatal Error: 0x90060001
3,451,657 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,451,662 >>> mbox cmd response: failed
3,451,662 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,451,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,360 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,960 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
892,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,959 UART: [kat] ++
897,111 UART: [kat] sha1
901,441 UART: [kat] SHA2-256
903,381 UART: [kat] SHA2-384
906,136 UART: [kat] SHA2-512-ACC
908,037 UART: [kat] ECC-384
918,122 UART: [kat] HMAC-384Kdf
922,828 UART: [kat] LMS
1,171,156 UART: [kat] --
1,171,967 UART: [cold-reset] ++
1,172,469 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 ready_for_fw is high
1,176,421 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,318 UART: [idev] Erasing UDS.KEYID = 0
1,201,241 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,243,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,353 UART: [ldev] --
1,282,726 UART: [fwproc] Wait for Commands...
1,283,404 UART: [fwproc] Recv command 0x46574c44
1,284,132 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,919 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,014 >>> mbox cmd response: success
2,787,164 UART: [afmc] ++
2,787,332 UART: [afmc] CDI.KEYID = 6
2,787,694 UART: [afmc] SUBJECT.KEYID = 7
2,788,119 UART: [afmc] AUTHORITY.KEYID = 5
2,823,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,735 UART: [afmc] --
2,866,819 UART: [cold-reset] --
2,867,685 UART: [state] Locking Datavault
2,868,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,424 UART: [state] Locking ICCM
2,869,876 UART: [exit] Launching FMC @ 0x40000130
2,875,205 UART:
2,875,221 UART: Running Caliptra FMC ...
2,875,629 UART:
2,875,683 UART: [state] CFI Enabled
2,886,292 UART: [fht] FMC Alias Private Key: 7
2,994,221 UART: [art] Extend RT PCRs Done
2,994,649 UART: [art] Lock RT PCRs Done
2,995,915 UART: [art] Populate DV Done
3,004,176 UART: [fht] FMC Alias Private Key: 7
3,005,178 UART: [art] Derive CDI
3,005,458 UART: [art] Store in in slot 0x4
3,091,309 UART: [art] Derive Key Pair
3,091,669 UART: [art] Store priv key in slot 0x5
3,104,527 UART: [art] Derive Key Pair - Done
3,119,230 UART: [art] Signing Cert with AUTHO
3,119,710 UART: RITY.KEYID = 7
3,135,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,869 UART: [art] PUB.X = 488F6B786E529295EF81A5DD4D50A0D67253DF99D27EF8AD65DA7E6D8807DB0FFF6B3545AA0D22962A792A10E30A5874
3,142,635 UART: [art] PUB.Y = 649B7FF963046F99B73BB5D12154C1173DDF81384BF60C965194C4107754023A213FEDB510770E08B4B60F5B80AA9FC7
3,149,565 UART: [art] SIG.R = A63C806C5C858F58928DF951A1108A93F9ED7CB6004769D22FD9ED3302EA1B3D60718CD88BF7F7D468DF93A61C8B0547
3,156,313 UART: [art] SIG.S = 5E698077259DC4A2FB344A4321E2D02EF4D611FC45835275CEED9944F7212097AECCEB6B6A7AFE1961B1121185CF80E0
3,180,090 UART: Caliptra RT
3,180,344 UART: [state] CFI Enabled
3,287,260 UART: [rt] RT listening for mailbox commands...
3,287,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,427 UART: [rt]cmd =0x46504c54, len=4
3,318,563 >>> mbox cmd response data (8 bytes)
3,318,742 UART: [rt] FIPS self test
3,319,070 UART: [kat] ++
3,319,222 UART: [kat] sha1
3,319,944 UART: Fatal Error: 0x90060001
3,321,494 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,321,499 >>> mbox cmd response: failed
3,321,499 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,321,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,953 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,176,597 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,402 UART: [idev] Erasing UDS.KEYID = 0
1,201,387 UART: [idev] Sha1 KeyId Algorithm
1,209,997 UART: [idev] --
1,210,979 UART: [ldev] ++
1,211,147 UART: [ldev] CDI.KEYID = 6
1,211,510 UART: [ldev] SUBJECT.KEYID = 5
1,211,936 UART: [ldev] AUTHORITY.KEYID = 7
1,212,399 UART: [ldev] FE.KEYID = 1
1,217,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,653 UART: [ldev] --
1,283,054 UART: [fwproc] Wait for Commands...
1,283,632 UART: [fwproc] Recv command 0x46574c44
1,284,360 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,235 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,284 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 ready_for_fw is high
1,060,143 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,905 >>> mbox cmd response: success
2,699,697 UART:
2,699,713 UART: Running Caliptra FMC ...
2,700,121 UART:
2,700,175 UART: [state] CFI Enabled
2,710,788 UART: [fht] FMC Alias Private Key: 7
2,818,679 UART: [art] Extend RT PCRs Done
2,819,107 UART: [art] Lock RT PCRs Done
2,820,657 UART: [art] Populate DV Done
2,828,810 UART: [fht] FMC Alias Private Key: 7
2,829,740 UART: [art] Derive CDI
2,830,020 UART: [art] Store in in slot 0x4
2,915,473 UART: [art] Derive Key Pair
2,915,833 UART: [art] Store priv key in slot 0x5
2,928,339 UART: [art] Derive Key Pair - Done
2,943,378 UART: [art] Signing Cert with AUTHO
2,943,858 UART: RITY.KEYID = 7
2,959,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,109 UART: [art] PUB.X = 71B34A7C2E785CC4FA11A16E5EFF78C5FF5EAF9FF25151B8988BF29D1CDF5342794C40272303999DD7C58348405BCEA9
2,966,886 UART: [art] PUB.Y = 0955EDF8DDB0F6C294A9E9FD1AFEFDFC653E2511331FF9EC022EAA287B1619F5177A00E9C741D7FD8FECDE4E65991D2A
2,973,832 UART: [art] SIG.R = 5316F622F7D580275F49910A29801CAEC78A0321ED61D8E033C1FAA86F91DF224FE417A17D9A46585462E57C9B6A9F2F
2,980,598 UART: [art] SIG.S = A1F649152E8E68E0B2CC6DEEA4872563FFB260A12C0F737298BB397EBCFB22B43683F516B3B2389DB3EB49E5DBF94D9D
3,004,072 UART: Caliptra RT
3,004,326 UART: [state] CFI Enabled
3,111,846 UART: [rt] RT listening for mailbox commands...
3,112,509 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,953 UART: [rt]cmd =0x46504c54, len=4
3,143,183 >>> mbox cmd response data (8 bytes)
3,143,466 UART: [rt] FIPS self test
3,143,794 UART: [kat] ++
3,143,946 UART: [kat] sha1
3,144,652 UART: Fatal Error: 0x90060001
3,146,202 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,146,207 >>> mbox cmd response: failed
3,146,207 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,146,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,525 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,157 UART: [kat] HMAC-384Kdf
922,913 UART: [kat] LMS
1,171,241 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,470 UART: [fht] FHT @ 0x50003400
1,175,023 UART: [idev] ++
1,175,191 UART: [idev] CDI.KEYID = 6
1,175,551 UART: [idev] SUBJECT.KEYID = 7
1,175,975 UART: [idev] UDS.KEYID = 0
1,176,320 ready_for_fw is high
1,176,320 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,953 UART: [idev] Erasing UDS.KEYID = 0
1,200,914 UART: [idev] Sha1 KeyId Algorithm
1,209,578 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,036 UART: [ldev] Erasing FE.KEYID = 1
1,243,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,898 UART: [ldev] --
1,283,163 UART: [fwproc] Wait for Commands...
1,283,835 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,478 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,571 >>> mbox cmd response: success
2,787,689 UART: [afmc] ++
2,787,857 UART: [afmc] CDI.KEYID = 6
2,788,219 UART: [afmc] SUBJECT.KEYID = 7
2,788,644 UART: [afmc] AUTHORITY.KEYID = 5
2,824,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,295 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,014 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,846 UART: [afmc] --
2,867,882 UART: [cold-reset] --
2,868,940 UART: [state] Locking Datavault
2,870,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,925 UART: [state] Locking ICCM
2,871,557 UART: [exit] Launching FMC @ 0x40000130
2,876,886 UART:
2,876,902 UART: Running Caliptra FMC ...
2,877,310 UART:
2,877,453 UART: [state] CFI Enabled
2,888,354 UART: [fht] FMC Alias Private Key: 7
2,997,005 UART: [art] Extend RT PCRs Done
2,997,433 UART: [art] Lock RT PCRs Done
2,999,259 UART: [art] Populate DV Done
3,007,626 UART: [fht] FMC Alias Private Key: 7
3,008,608 UART: [art] Derive CDI
3,008,888 UART: [art] Store in in slot 0x4
3,094,689 UART: [art] Derive Key Pair
3,095,049 UART: [art] Store priv key in slot 0x5
3,108,137 UART: [art] Derive Key Pair - Done
3,123,073 UART: [art] Signing Cert with AUTHO
3,123,553 UART: RITY.KEYID = 7
3,138,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,542 UART: [art] PUB.X = D6150A5EB9E6E782DF96FD9411E7C624083EAA46D0EE73EEE09F9017A92030C3FAACF4050050015767EFF4142054219E
3,146,282 UART: [art] PUB.Y = AC22642CB784CA743EB7B31F79C6C5EBD3451ECE49C5B0D68A1BDCCE1AB7E30E63C8580B98CA13491A82C58DCDFCC032
3,153,250 UART: [art] SIG.R = 42E3DC9A55320EF42B6E420B10D76C95F94CBBF94DFA607D7AD4FBB9E6E0F0A05B0F7571F56DEDCB28F9429E4B45BE21
3,160,033 UART: [art] SIG.S = CA0E65F4A5197D40313D82297F7DA97F2CDC6C4B2E137C57F9F38678AF5E71BA5AD0A85B28AE245AED3E8D32020E8284
3,184,081 UART: Caliptra RT
3,184,427 UART: [state] CFI Enabled
3,293,395 UART: [rt] RT listening for mailbox commands...
3,294,058 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,434 UART: [rt]cmd =0x46504c54, len=4
3,324,646 >>> mbox cmd response data (8 bytes)
3,324,827 UART: [rt] FIPS self test
3,325,155 UART: [kat] ++
3,325,307 UART: [kat] sha1
3,326,077 UART: Fatal Error: 0x90060001
3,327,627 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,632 >>> mbox cmd response: failed
3,327,632 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
893,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,606 UART: [kat] ++
897,758 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,637 UART: [kat] SHA2-512-ACC
908,538 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,303 UART: [kat] LMS
1,171,631 UART: [kat] --
1,172,668 UART: [cold-reset] ++
1,173,118 UART: [fht] FHT @ 0x50003400
1,175,913 UART: [idev] ++
1,176,081 UART: [idev] CDI.KEYID = 6
1,176,441 UART: [idev] SUBJECT.KEYID = 7
1,176,865 UART: [idev] UDS.KEYID = 0
1,177,210 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,851 UART: [idev] Erasing UDS.KEYID = 0
1,202,250 UART: [idev] Sha1 KeyId Algorithm
1,210,716 UART: [idev] --
1,211,954 UART: [ldev] ++
1,212,122 UART: [ldev] CDI.KEYID = 6
1,212,485 UART: [ldev] SUBJECT.KEYID = 5
1,212,911 UART: [ldev] AUTHORITY.KEYID = 7
1,213,374 UART: [ldev] FE.KEYID = 1
1,218,840 UART: [ldev] Erasing FE.KEYID = 1
1,245,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,978 UART: [ldev] --
1,284,467 UART: [fwproc] Wait for Commands...
1,285,133 UART: [fwproc] Recv command 0x46574c44
1,285,861 UART: [fwproc] Recv'd Img size: 115224 bytes
2,594,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,622,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,944 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,789,101 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,480 ready_for_fw is high
1,061,480 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,136 >>> mbox cmd response: success
2,700,408 UART:
2,700,424 UART: Running Caliptra FMC ...
2,700,832 UART:
2,700,975 UART: [state] CFI Enabled
2,711,616 UART: [fht] FMC Alias Private Key: 7
2,819,815 UART: [art] Extend RT PCRs Done
2,820,243 UART: [art] Lock RT PCRs Done
2,821,709 UART: [art] Populate DV Done
2,829,828 UART: [fht] FMC Alias Private Key: 7
2,830,898 UART: [art] Derive CDI
2,831,178 UART: [art] Store in in slot 0x4
2,916,623 UART: [art] Derive Key Pair
2,916,983 UART: [art] Store priv key in slot 0x5
2,930,359 UART: [art] Derive Key Pair - Done
2,944,861 UART: [art] Signing Cert with AUTHO
2,945,341 UART: RITY.KEYID = 7
2,960,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,582 UART: [art] PUB.X = DC5644F16ACB4D278AEB2CDF49BBE7607746E98660F9E3ED63A6618F7A91EE8879F696E08AE9BED26821FEF3E05D30F3
2,968,368 UART: [art] PUB.Y = 0F208A9FCD21B9F954B4C61ABD63CE3BA017FD281B8277B534B4747710DF8EF1CE103053146ACCA6ECA7C9872408B06B
2,975,324 UART: [art] SIG.R = 0FEC49FB971564BCCDC52F60D729D25CF9B9C06CCD67C7F9AF52366F5176BF96E7831F451BF39C43B32D69F7278AC992
2,982,103 UART: [art] SIG.S = 885A2E033736CBA79FC7AC90FD59CA7B68632C77003FB89AF114BD241C959979882A35F20977790C2BFF78279F1AE6B1
3,006,031 UART: Caliptra RT
3,006,377 UART: [state] CFI Enabled
3,114,287 UART: [rt] RT listening for mailbox commands...
3,114,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,764 UART: [rt]cmd =0x46504c54, len=4
3,145,912 >>> mbox cmd response data (8 bytes)
3,146,225 UART: [rt] FIPS self test
3,146,553 UART: [kat] ++
3,146,705 UART: [kat] sha1
3,147,567 UART: Fatal Error: 0x90060001
3,149,117 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,149,122 >>> mbox cmd response: failed
3,149,122 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,149,127 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,162 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,984 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,895 UART: [idev] ++
1,173,063 UART: [idev] CDI.KEYID = 6
1,173,424 UART: [idev] SUBJECT.KEYID = 7
1,173,849 UART: [idev] UDS.KEYID = 0
1,174,195 ready_for_fw is high
1,174,195 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,197,975 UART: [idev] Sha1 KeyId Algorithm
1,206,699 UART: [idev] --
1,207,692 UART: [ldev] ++
1,207,860 UART: [ldev] CDI.KEYID = 6
1,208,224 UART: [ldev] SUBJECT.KEYID = 5
1,208,651 UART: [ldev] AUTHORITY.KEYID = 7
1,209,114 UART: [ldev] FE.KEYID = 1
1,214,102 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,994 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,123 UART: [fwproc] Recv command 0x46574c44
1,281,856 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,806 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,936 >>> mbox cmd response: success
2,784,173 UART: [afmc] ++
2,784,341 UART: [afmc] CDI.KEYID = 6
2,784,704 UART: [afmc] SUBJECT.KEYID = 7
2,785,130 UART: [afmc] AUTHORITY.KEYID = 5
2,820,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,991 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,264 UART: [afmc] --
2,863,254 UART: [cold-reset] --
2,864,116 UART: [state] Locking Datavault
2,865,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,687 UART: [state] Locking ICCM
2,866,317 UART: [exit] Launching FMC @ 0x40000130
2,871,646 UART:
2,871,662 UART: Running Caliptra FMC ...
2,872,070 UART:
2,872,124 UART: [state] CFI Enabled
2,882,383 UART: [fht] FMC Alias Private Key: 7
2,989,940 UART: [art] Extend RT PCRs Done
2,990,368 UART: [art] Lock RT PCRs Done
2,991,656 UART: [art] Populate DV Done
2,999,933 UART: [fht] FMC Alias Private Key: 7
3,001,057 UART: [art] Derive CDI
3,001,337 UART: [art] Store in in slot 0x4
3,087,354 UART: [art] Derive Key Pair
3,087,714 UART: [art] Store priv key in slot 0x5
3,100,592 UART: [art] Derive Key Pair - Done
3,115,064 UART: [art] Signing Cert with AUTHO
3,115,544 UART: RITY.KEYID = 7
3,130,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,499 UART: [art] PUB.X = 320081025A07F5648F89324C8E425F1DEC7014F4A0373C420BE8BD80432459FE4268025714DE3F8D9869C499B5C34944
3,138,223 UART: [art] PUB.Y = B01992A749F16D8C20645ABEAF332BBE10490293ED417348224EC103CDB9B03B2F900DF471BBDB74F2235674C772A5F9
3,145,168 UART: [art] SIG.R = 72C9C85FBAE17BBB9619069CABBFEB4BF57C8E497DC4AB24C2C3D7BB78BE300B12E9AF47DE411A44D72F6AD7E35E6AE7
3,151,962 UART: [art] SIG.S = A2DFC261E4688644AB0BEA95B6DA3DD335CB7120E6D7589C3FD34A7BC0B0CD16C92497871FD4135E5FA5D2D971C59636
3,175,456 UART: Caliptra RT
3,175,710 UART: [state] CFI Enabled
3,283,822 UART: [rt] RT listening for mailbox commands...
3,284,485 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,807 UART: [rt]cmd =0x46504c54, len=4
3,315,147 >>> mbox cmd response data (8 bytes)
3,315,264 UART: [rt] FIPS self test
3,315,592 UART: [kat] ++
3,315,744 UART: [kat] sha1
3,316,412 UART: Fatal Error: 0x90060001
3,317,962 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,317,967 >>> mbox cmd response: failed
3,317,967 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,317,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,206 UART: [kat] LMS
1,169,518 UART: [kat] --
1,170,315 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,174,615 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,351 UART: [idev] Erasing UDS.KEYID = 0
1,199,669 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,215,812 UART: [ldev] Erasing FE.KEYID = 1
1,241,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,554 UART: [ldev] --
1,280,888 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,698 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,768 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,782 ready_for_fw is high
1,055,782 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,456 >>> mbox cmd response: success
2,694,946 UART:
2,694,962 UART: Running Caliptra FMC ...
2,695,370 UART:
2,695,424 UART: [state] CFI Enabled
2,706,141 UART: [fht] FMC Alias Private Key: 7
2,814,242 UART: [art] Extend RT PCRs Done
2,814,670 UART: [art] Lock RT PCRs Done
2,816,140 UART: [art] Populate DV Done
2,824,231 UART: [fht] FMC Alias Private Key: 7
2,825,301 UART: [art] Derive CDI
2,825,581 UART: [art] Store in in slot 0x4
2,910,992 UART: [art] Derive Key Pair
2,911,352 UART: [art] Store priv key in slot 0x5
2,924,536 UART: [art] Derive Key Pair - Done
2,939,242 UART: [art] Signing Cert with AUTHO
2,939,722 UART: RITY.KEYID = 7
2,955,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,237 UART: [art] PUB.X = 4075E13EE414CCF280FCDD69745FFC6BA830202DFF9EC640FF2FE83330703254D20CB48483850F13B0DC8FBB202946CA
2,963,011 UART: [art] PUB.Y = CBBBAE0E0C305E585E5074F6E709F75A953C581F1DAF2CA659C3AFB42EF1307EA1192A16D9D6E0850F4EB6EB95867E45
2,969,965 UART: [art] SIG.R = BC749041C61942438548DA3607E76D437B59D8988C11845117AC5A470F4D30B7BE4BB2E61A115999F874B56A2E558443
2,976,719 UART: [art] SIG.S = 6EE7E8340CF48F719C270A9155643DE28FD4144FB661F0C8EF899A212256276C22C523C6EEA2506AD8D97F271E8EB2ED
3,000,714 UART: Caliptra RT
3,000,968 UART: [state] CFI Enabled
3,108,454 UART: [rt] RT listening for mailbox commands...
3,109,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,715 UART: [rt]cmd =0x46504c54, len=4
3,139,883 >>> mbox cmd response data (8 bytes)
3,140,100 UART: [rt] FIPS self test
3,140,428 UART: [kat] ++
3,140,580 UART: [kat] sha1
3,141,584 UART: Fatal Error: 0x90060001
3,143,134 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,143,139 >>> mbox cmd response: failed
3,143,139 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,143,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,786 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,988 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,834 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,174,056 ready_for_fw is high
1,174,056 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,198,486 UART: [idev] Sha1 KeyId Algorithm
1,207,458 UART: [idev] --
1,208,561 UART: [ldev] ++
1,208,729 UART: [ldev] CDI.KEYID = 6
1,209,093 UART: [ldev] SUBJECT.KEYID = 5
1,209,520 UART: [ldev] AUTHORITY.KEYID = 7
1,209,983 UART: [ldev] FE.KEYID = 1
1,215,259 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,795 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,926 UART: [fwproc] Recv command 0x46574c44
1,282,659 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,583 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,761 >>> mbox cmd response: success
2,785,946 UART: [afmc] ++
2,786,114 UART: [afmc] CDI.KEYID = 6
2,786,477 UART: [afmc] SUBJECT.KEYID = 7
2,786,903 UART: [afmc] AUTHORITY.KEYID = 5
2,822,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,919 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,085 UART: [afmc] --
2,866,133 UART: [cold-reset] --
2,867,125 UART: [state] Locking Datavault
2,868,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,070 UART: [state] Locking ICCM
2,869,512 UART: [exit] Launching FMC @ 0x40000130
2,874,841 UART:
2,874,857 UART: Running Caliptra FMC ...
2,875,265 UART:
2,875,408 UART: [state] CFI Enabled
2,886,365 UART: [fht] FMC Alias Private Key: 7
2,994,402 UART: [art] Extend RT PCRs Done
2,994,830 UART: [art] Lock RT PCRs Done
2,996,702 UART: [art] Populate DV Done
3,005,085 UART: [fht] FMC Alias Private Key: 7
3,006,201 UART: [art] Derive CDI
3,006,481 UART: [art] Store in in slot 0x4
3,092,190 UART: [art] Derive Key Pair
3,092,550 UART: [art] Store priv key in slot 0x5
3,106,048 UART: [art] Derive Key Pair - Done
3,120,879 UART: [art] Signing Cert with AUTHO
3,121,359 UART: RITY.KEYID = 7
3,136,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,418 UART: [art] PUB.X = A28169A134C6CC511C39BFFF7835D6B134AE1CA018E19B6295E7B7F5F44223E504B8B17AD7CCE44C512AA7A3DF666304
3,144,192 UART: [art] PUB.Y = 5C80B56ADD0F1C68BD8BE16EDD3FD5CA8E703C74BCB8F5590CC16B7A2BA92F5D896A4392490C91517D571FB87266B672
3,151,147 UART: [art] SIG.R = 1E15C45D2CBE3596E6E3590C2FE03313B0B12A9635F4AABBF7B359FBC62955F61F4D57E168FFE87B392078C64FE01F0D
3,157,923 UART: [art] SIG.S = D6FA90E468575272ACA85D092D635319A90951E61E420020849E0AD54875B126D8F122606A46A715E90C10E52EC93874
3,182,104 UART: Caliptra RT
3,182,450 UART: [state] CFI Enabled
3,289,634 UART: [rt] RT listening for mailbox commands...
3,290,297 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,759 UART: [rt]cmd =0x46504c54, len=4
3,320,985 >>> mbox cmd response data (8 bytes)
3,321,322 UART: [rt] FIPS self test
3,321,650 UART: [kat] ++
3,321,802 UART: [kat] sha1
3,322,572 UART: Fatal Error: 0x90060001
3,324,122 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,324,127 >>> mbox cmd response: failed
3,324,127 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,324,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,933 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,606 UART: [cold-reset] ++
1,170,022 UART: [fht] FHT @ 0x50003400
1,172,606 UART: [idev] ++
1,172,774 UART: [idev] CDI.KEYID = 6
1,173,135 UART: [idev] SUBJECT.KEYID = 7
1,173,560 UART: [idev] UDS.KEYID = 0
1,173,906 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,648 UART: [idev] Erasing UDS.KEYID = 0
1,198,528 UART: [idev] Sha1 KeyId Algorithm
1,207,408 UART: [idev] --
1,208,409 UART: [ldev] ++
1,208,577 UART: [ldev] CDI.KEYID = 6
1,208,941 UART: [ldev] SUBJECT.KEYID = 5
1,209,368 UART: [ldev] AUTHORITY.KEYID = 7
1,209,831 UART: [ldev] FE.KEYID = 1
1,214,977 UART: [ldev] Erasing FE.KEYID = 1
1,241,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,741 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,762 UART: [fwproc] Recv command 0x46574c44
1,282,495 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,941 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,973 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 ready_for_fw is high
1,056,275 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,857 >>> mbox cmd response: success
2,698,183 UART:
2,698,199 UART: Running Caliptra FMC ...
2,698,607 UART:
2,698,750 UART: [state] CFI Enabled
2,709,483 UART: [fht] FMC Alias Private Key: 7
2,817,038 UART: [art] Extend RT PCRs Done
2,817,466 UART: [art] Lock RT PCRs Done
2,818,794 UART: [art] Populate DV Done
2,826,993 UART: [fht] FMC Alias Private Key: 7
2,828,031 UART: [art] Derive CDI
2,828,311 UART: [art] Store in in slot 0x4
2,913,620 UART: [art] Derive Key Pair
2,913,980 UART: [art] Store priv key in slot 0x5
2,927,234 UART: [art] Derive Key Pair - Done
2,941,647 UART: [art] Signing Cert with AUTHO
2,942,127 UART: RITY.KEYID = 7
2,957,509 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,274 UART: [art] PUB.X = 44D3196A6F9EED54903F49C0861FA679676F365E4F9D8C354EFB197115AA840227D80F1EA19690D90C7AA831572F805D
2,965,033 UART: [art] PUB.Y = AFB77925B6E195C24C00D8DA899168DD52275FB578ECA53B51689D6970F17BA158DCA7C4308F38F510F7BFEB7E375E54
2,971,969 UART: [art] SIG.R = A44F612D33E8152AB3131C2B54549C23BDB76F53C7CC76DC49F589A8E9D1056A154573A0A67CE94E1D321800865DFDF1
2,978,718 UART: [art] SIG.S = 95D21DB1E748BD468C87813DA30EE5C7794C899524A72ABCC39C2ABE4CCA9251602C567FD00A3F86E303A38B4E984C89
3,002,780 UART: Caliptra RT
3,003,126 UART: [state] CFI Enabled
3,110,687 UART: [rt] RT listening for mailbox commands...
3,111,350 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,624 UART: [rt]cmd =0x46504c54, len=4
3,141,816 >>> mbox cmd response data (8 bytes)
3,142,135 UART: [rt] FIPS self test
3,142,463 UART: [kat] ++
3,142,615 UART: [kat] sha1
3,143,437 UART: Fatal Error: 0x90060001
3,144,987 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,144,992 >>> mbox cmd response: failed
3,144,992 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,144,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,213 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,675,019 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,819,122 >>> mbox cmd response: failed
2,819,670 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,962,757 >>> mbox cmd response: failed
Initializing fuses
1,125 writing to cptra_bootfsm_go
4,879,289 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,463,119 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,691,335 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,835,491 >>> mbox cmd response: failed
2,836,045 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,979,131 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
4,861,789 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,452,343 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,033,532 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,177,696 >>> mbox cmd response: failed
3,178,267 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,321,465 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,581,049 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,017,453 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,030,732 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,174,640 >>> mbox cmd response: failed
3,175,202 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,318,442 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
21,583,109 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,018,025 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,686,778 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,831,523 >>> mbox cmd response: failed
2,832,105 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,976,323 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,449,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,275,254 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,699,231 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,843,775 >>> mbox cmd response: failed
2,844,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,987,979 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,426,459 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,245,938 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,696,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,841,756 >>> mbox cmd response: failed
2,842,321 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,985,991 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,438,760 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,272,446 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
3,041,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,186,417 >>> mbox cmd response: failed
3,187,008 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,330,491 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,177,606 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,893,544 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,727 writing to cptra_bootfsm_go
3,049,024 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,193,309 >>> mbox cmd response: failed
3,193,863 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,337,464 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
20,165,765 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,889,592 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,591 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,599 >>> mbox cmd response: failed
807,599 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,532 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,593 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,601 >>> mbox cmd response: failed
807,601 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,607 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,973 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,644 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,514 >>> mbox cmd response: failed
807,514 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,298 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,225 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,916 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,924 >>> mbox cmd response: failed
807,924 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,990 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,657 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,291 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,299 >>> mbox cmd response: failed
807,299 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,117 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,640 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,913 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,921 >>> mbox cmd response: failed
807,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,720 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,722 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,730 >>> mbox cmd response: failed
807,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,898 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,089 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,384 >>> mbox cmd response: failed
807,384 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,440 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,611 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,667 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,675 >>> mbox cmd response: failed
807,675 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,048 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
806,927 >>> mbox cmd response: failed
806,927 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
806,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,789 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,318 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,746 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,754 >>> mbox cmd response: failed
807,754 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,352 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,495 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,732 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,740 >>> mbox cmd response: failed
807,740 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
807,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,438 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,533 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,220 UART:
192,586 UART: Running Caliptra ROM ...
193,775 UART:
193,925 UART: [state] CFI Enabled
265,944 UART: [state] LifecycleState = Unprovisioned
267,843 UART: [state] DebugLocked = No
269,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,924 UART: [kat] SHA2-256
443,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,126 UART: [kat] ++
454,605 UART: [kat] sha1
464,852 UART: [kat] SHA2-256
467,562 UART: [kat] SHA2-384
472,645 UART: [kat] SHA2-512-ACC
475,029 UART: [kat] ECC-384
2,767,496 UART: [kat] HMAC-384Kdf
2,781,141 UART: [kat] LMS
3,971,392 UART: [kat] --
3,976,743 UART: [cold-reset] ++
3,977,622 UART: [fht] Storing FHT @ 0x50003400
3,989,621 UART: [idev] ++
3,990,223 UART: [idev] CDI.KEYID = 6
3,991,158 UART: [idev] SUBJECT.KEYID = 7
3,992,340 UART: [idev] UDS.KEYID = 0
3,993,420 ready_for_fw is high
3,993,650 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,138,131 UART: [idev] Erasing UDS.KEYID = 0
7,328,348 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,198 UART: [idev] --
7,356,733 UART: [ldev] ++
7,357,312 UART: [ldev] CDI.KEYID = 6
7,358,199 UART: [ldev] SUBJECT.KEYID = 5
7,359,410 UART: [ldev] AUTHORITY.KEYID = 7
7,360,704 UART: [ldev] FE.KEYID = 1
7,404,838 UART: [ldev] Erasing FE.KEYID = 1
10,736,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,412 UART: [ldev] --
13,119,849 UART: [fwproc] Waiting for Commands...
13,123,090 UART: [fwproc] Received command 0x46574c44
13,125,288 UART: [fwproc] Received Image of size 114916 bytes
17,183,741 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,652,615 >>> mbox cmd response: success
17,656,127 UART: [afmc] ++
17,656,721 UART: [afmc] CDI.KEYID = 6
17,657,634 UART: [afmc] SUBJECT.KEYID = 7
17,658,854 UART: [afmc] AUTHORITY.KEYID = 5
21,032,336 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,073 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,480 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,302 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,741 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,851 UART: [afmc] --
23,403,262 UART: [cold-reset] --
23,406,966 UART: [state] Locking Datavault
23,411,783 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,535 UART: [state] Locking ICCM
23,414,821 UART: [exit] Launching FMC @ 0x40000130
23,423,231 UART:
23,423,510 UART: Running Caliptra FMC ...
23,424,630 UART:
23,424,797 UART: [state] CFI Enabled
23,491,003 UART: [fht] FMC Alias Private Key: 7
25,829,266 UART: [art] Extend RT PCRs Done
25,830,505 UART: [art] Lock RT PCRs Done
25,831,864 UART: [art] Populate DV Done
25,837,444 UART: [fht] FMC Alias Private Key: 7
25,839,143 UART: [art] Derive CDI
25,839,964 UART: [art] Store in in slot 0x4
25,899,014 UART: [art] Derive Key Pair
25,900,017 UART: [art] Store priv key in slot 0x5
29,192,784 UART: [art] Derive Key Pair - Done
29,205,733 UART: [art] Signing Cert with AUTHO
29,207,042 UART: RITY.KEYID = 7
31,494,191 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,700 UART: [art] PUB.X = C3DC2F49D05D4901F7B4388AF42A15DD72B6F0B07474F3322235170F199B3B102E5DC123E14E38D51B35BAB91242E5C4
31,502,935 UART: [art] PUB.Y = 41B35EB9E97D3C48E4CE68701601DBC477E4C763A939D47C69F29B1B03C696D39D303ED6D13BAA8B76F405E05F46627B
31,510,198 UART: [art] SIG.R = 11388EB553FD3F4BD989D5A627BEA411F293C585F3553827CE2AD4BC1968879F97E420C5E64039D5C520D542F77921D8
31,517,547 UART: [art] SIG.S = 9218ADC93D56D9536B77230CA11F55E0C29E81D2CC14BD6A114A6A0E8D1F2DBA96A4930213665A0710D67418A973DFA0
32,822,669 UART: Caliptra RT
32,823,400 UART: [state] CFI Enabled
32,983,708 UART: [rt] RT listening for mailbox commands...
32,985,561 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,015,462 UART: [rt]cmd =0x46504c54, len=4
33,017,039 >>> mbox cmd response data (8 bytes)
33,018,285 UART: [rt] FIPS self test
33,019,236 UART: [kat] ++
33,019,694 UART: [kat] sha1
33,024,089 UART: Fatal Error: 0x90060002
33,059,265 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,203,607 >>> mbox cmd response: failed
33,204,245 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,348,477 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,084 UART:
190,397 UART: Running Caliptra ROM ...
191,510 UART:
191,664 UART: [state] CFI Enabled
259,930 UART: [state] LifecycleState = Unprovisioned
261,851 UART: [state] DebugLocked = No
263,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,319 UART: [kat] SHA2-256
437,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,558 UART: [kat] ++
448,087 UART: [kat] sha1
457,466 UART: [kat] SHA2-256
460,202 UART: [kat] SHA2-384
467,417 UART: [kat] SHA2-512-ACC
469,816 UART: [kat] ECC-384
2,759,818 UART: [kat] HMAC-384Kdf
2,793,974 UART: [kat] LMS
3,984,268 UART: [kat] --
3,988,631 UART: [cold-reset] ++
3,990,244 UART: [fht] Storing FHT @ 0x50003400
4,002,308 UART: [idev] ++
4,002,894 UART: [idev] CDI.KEYID = 6
4,003,807 UART: [idev] SUBJECT.KEYID = 7
4,005,082 UART: [idev] UDS.KEYID = 0
4,006,599 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,150,890 UART: [idev] Erasing UDS.KEYID = 0
7,339,622 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,636 UART: [idev] --
7,364,463 UART: [ldev] ++
7,365,040 UART: [ldev] CDI.KEYID = 6
7,366,007 UART: [ldev] SUBJECT.KEYID = 5
7,367,170 UART: [ldev] AUTHORITY.KEYID = 7
7,368,457 UART: [ldev] FE.KEYID = 1
7,415,018 UART: [ldev] Erasing FE.KEYID = 1
10,751,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,855 UART: [ldev] --
13,131,106 UART: [fwproc] Waiting for Commands...
13,133,206 UART: [fwproc] Received command 0x46574c44
13,135,404 UART: [fwproc] Received Image of size 114916 bytes
17,189,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,415 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,653,080 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,784,591 ready_for_fw is high
3,785,221 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,891,310 >>> mbox cmd response: success
23,591,473 UART:
23,591,872 UART: Running Caliptra FMC ...
23,593,022 UART:
23,593,193 UART: [state] CFI Enabled
23,656,797 UART: [fht] FMC Alias Private Key: 7
25,994,397 UART: [art] Extend RT PCRs Done
25,995,622 UART: [art] Lock RT PCRs Done
25,997,445 UART: [art] Populate DV Done
26,002,747 UART: [fht] FMC Alias Private Key: 7
26,004,199 UART: [art] Derive CDI
26,004,945 UART: [art] Store in in slot 0x4
26,066,533 UART: [art] Derive Key Pair
26,067,541 UART: [art] Store priv key in slot 0x5
29,360,469 UART: [art] Derive Key Pair - Done
29,373,598 UART: [art] Signing Cert with AUTHO
29,374,911 UART: RITY.KEYID = 7
31,662,286 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,795 UART: [art] PUB.X = C84A55F67C962FEBF398B53624E9C3C443E3FCB148F7FE21DEA378B3D6963D3795ED1528226F8033283FB3014C048112
31,671,106 UART: [art] PUB.Y = 0FB4384E148EBEB253BE311F886000E3C2F9EC0BA46848F8AB35F6A76E965FFA7F48F8A321DAABDADBD43EA969720557
31,678,350 UART: [art] SIG.R = BFEAA00061F146BA4BEBEAA05799C12F343F623A97B5599937D169574CB321E8FD6B9F10DBDAFF25CE19CE92045F5AB2
31,685,722 UART: [art] SIG.S = 7672A8D23CBC83714C77157E2BD78DB3C96DD358EF786BB91FC09D81593BA18735DEA2E08DAE74DE7B670057AEE71003
32,990,901 UART: Caliptra RT
32,991,615 UART: [state] CFI Enabled
33,152,836 UART: [rt] RT listening for mailbox commands...
33,154,699 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,184,621 UART: [rt]cmd =0x46504c54, len=4
33,186,151 >>> mbox cmd response data (8 bytes)
33,187,179 UART: [rt] FIPS self test
33,188,130 UART: [kat] ++
33,188,582 UART: [kat] sha1
33,192,656 UART: Fatal Error: 0x90060002
33,228,042 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,372,399 >>> mbox cmd response: failed
33,373,049 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,517,156 >>> mbox cmd response: failed
Initializing fuses
1,153 writing to cptra_bootfsm_go
3,798,274 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,900,051 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,513 UART:
192,879 UART: Running Caliptra ROM ...
194,021 UART:
603,807 UART: [state] CFI Enabled
616,625 UART: [state] LifecycleState = Unprovisioned
618,509 UART: [state] DebugLocked = No
620,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,202 UART: [kat] SHA2-256
795,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,530 UART: [kat] ++
806,979 UART: [kat] sha1
817,993 UART: [kat] SHA2-256
820,652 UART: [kat] SHA2-384
826,079 UART: [kat] SHA2-512-ACC
828,473 UART: [kat] ECC-384
3,113,185 UART: [kat] HMAC-384Kdf
3,126,053 UART: [kat] LMS
4,316,171 UART: [kat] --
4,319,316 UART: [cold-reset] ++
4,320,973 UART: [fht] Storing FHT @ 0x50003400
4,332,596 UART: [idev] ++
4,333,162 UART: [idev] CDI.KEYID = 6
4,334,198 UART: [idev] SUBJECT.KEYID = 7
4,335,378 UART: [idev] UDS.KEYID = 0
4,336,430 ready_for_fw is high
4,336,646 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,480,985 UART: [idev] Erasing UDS.KEYID = 0
7,622,923 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,433 UART: [idev] --
7,647,127 UART: [ldev] ++
7,647,729 UART: [ldev] CDI.KEYID = 6
7,648,657 UART: [ldev] SUBJECT.KEYID = 5
7,649,878 UART: [ldev] AUTHORITY.KEYID = 7
7,651,114 UART: [ldev] FE.KEYID = 1
7,662,678 UART: [ldev] Erasing FE.KEYID = 1
10,949,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,436 UART: [ldev] --
13,310,025 UART: [fwproc] Waiting for Commands...
13,312,397 UART: [fwproc] Received command 0x46574c44
13,314,582 UART: [fwproc] Received Image of size 114916 bytes
17,375,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,839,805 >>> mbox cmd response: success
17,844,703 UART: [afmc] ++
17,845,291 UART: [afmc] CDI.KEYID = 6
17,846,264 UART: [afmc] SUBJECT.KEYID = 7
17,847,483 UART: [afmc] AUTHORITY.KEYID = 5
21,160,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,360 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,622 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,017 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,864 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,296 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,189 UART: [afmc] --
23,523,626 UART: [cold-reset] --
23,527,432 UART: [state] Locking Datavault
23,532,844 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,627 UART: [state] Locking ICCM
23,537,155 UART: [exit] Launching FMC @ 0x40000130
23,545,555 UART:
23,545,791 UART: Running Caliptra FMC ...
23,546,898 UART:
23,547,060 UART: [state] CFI Enabled
23,555,222 UART: [fht] FMC Alias Private Key: 7
25,885,323 UART: [art] Extend RT PCRs Done
25,886,555 UART: [art] Lock RT PCRs Done
25,888,134 UART: [art] Populate DV Done
25,893,605 UART: [fht] FMC Alias Private Key: 7
25,895,144 UART: [art] Derive CDI
25,895,961 UART: [art] Store in in slot 0x4
25,938,239 UART: [art] Derive Key Pair
25,939,239 UART: [art] Store priv key in slot 0x5
29,181,304 UART: [art] Derive Key Pair - Done
29,194,437 UART: [art] Signing Cert with AUTHO
29,195,748 UART: RITY.KEYID = 7
31,475,077 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,598 UART: [art] PUB.X = 4D93D37C63285F5CFAC4CF52D82AE0875B3C42EBBFC3C4511C4ABE901348AEF881A41609F238CF082401773E91ADFDFA
31,484,036 UART: [art] PUB.Y = 0C03DAA775D90AC006EA2A1D35D578EF5E903610AA15998BF08201C4399D38E05B11E3C99FF59E3E69A8DFE8AE53F5F2
31,491,093 UART: [art] SIG.R = 555F61E84C3D97D0303E755299A23C57A3DE6B42B8F9BD3AFF874B0F1E784425D2C15EE1500CE839997BB0C16008B13A
31,498,505 UART: [art] SIG.S = 9F68D3AA16C64BB99B93CD6456A82AB47EF2D142413788E6F993D884BA32D1385CB4615195670E10842E652296C5680F
32,803,361 UART: Caliptra RT
32,804,074 UART: [state] CFI Enabled
32,922,278 UART: [rt] RT listening for mailbox commands...
32,924,278 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,954,066 UART: [rt]cmd =0x46504c54, len=4
32,955,648 >>> mbox cmd response data (8 bytes)
32,956,956 UART: [rt] FIPS self test
32,957,896 UART: [kat] ++
32,958,347 UART: [kat] sha1
32,962,606 UART: Fatal Error: 0x90060002
32,997,807 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,142,182 >>> mbox cmd response: failed
33,142,854 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,287,098 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,115 UART:
190,410 UART: Running Caliptra ROM ...
191,520 UART:
7,241,358 UART: [state] CFI Enabled
7,257,131 UART: [state] LifecycleState = Unprovisioned
7,259,051 UART: [state] DebugLocked = No
7,261,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,267,185 UART: [kat] SHA2-256
7,436,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,447,491 UART: [kat] ++
7,448,035 UART: [kat] sha1
7,459,855 UART: [kat] SHA2-256
7,462,544 UART: [kat] SHA2-384
7,468,639 UART: [kat] SHA2-512-ACC
7,470,989 UART: [kat] ECC-384
9,754,310 UART: [kat] HMAC-384Kdf
9,766,163 UART: [kat] LMS
10,956,282 UART: [kat] --
10,960,342 UART: [cold-reset] ++
10,962,494 UART: [fht] Storing FHT @ 0x50003400
10,973,337 UART: [idev] ++
10,973,903 UART: [idev] CDI.KEYID = 6
10,974,864 UART: [idev] SUBJECT.KEYID = 7
10,976,131 UART: [idev] UDS.KEYID = 0
10,977,650 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,121,921 UART: [idev] Erasing UDS.KEYID = 0
14,265,512 UART: [idev] Using Sha1 for KeyId Algorithm
14,287,259 UART: [idev] --
14,291,552 UART: [ldev] ++
14,292,127 UART: [ldev] CDI.KEYID = 6
14,293,092 UART: [ldev] SUBJECT.KEYID = 5
14,294,311 UART: [ldev] AUTHORITY.KEYID = 7
14,295,602 UART: [ldev] FE.KEYID = 1
14,304,465 UART: [ldev] Erasing FE.KEYID = 1
17,591,450 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,884,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,898,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,913,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,928,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,948,673 UART: [ldev] --
19,952,650 UART: [fwproc] Waiting for Commands...
19,955,634 UART: [fwproc] Received command 0x46574c44
19,957,875 UART: [fwproc] Received Image of size 114916 bytes
24,022,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,096,752 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,165,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,486,546 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,204 writing to cptra_bootfsm_go
4,131,126 ready_for_fw is high
4,131,525 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,081,076 >>> mbox cmd response: success
23,720,459 UART:
23,720,853 UART: Running Caliptra FMC ...
23,722,003 UART:
23,722,202 UART: [state] CFI Enabled
23,730,152 UART: [fht] FMC Alias Private Key: 7
26,061,257 UART: [art] Extend RT PCRs Done
26,062,488 UART: [art] Lock RT PCRs Done
26,063,984 UART: [art] Populate DV Done
26,069,524 UART: [fht] FMC Alias Private Key: 7
26,071,131 UART: [art] Derive CDI
26,071,876 UART: [art] Store in in slot 0x4
26,114,374 UART: [art] Derive Key Pair
26,115,421 UART: [art] Store priv key in slot 0x5
29,357,327 UART: [art] Derive Key Pair - Done
29,369,954 UART: [art] Signing Cert with AUTHO
29,371,299 UART: RITY.KEYID = 7
31,650,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,984 UART: [art] PUB.X = 87FA44FBEAADBAAE72AE2922122279C11ED2CE660D5D9DBBEEF71C2C510875F0578242F9AC6225C235DBA8199527214F
31,659,235 UART: [art] PUB.Y = 64CAF3588619554B858937483FAA397BF1A55AAD591F7BA395E32CE9F2828FC6132DD6DE80AB267FD1E26F894AF4F2BA
31,666,491 UART: [art] SIG.R = 803A98B186490D07D382DC6F2FB66CFCF3D2774F0BA6473D043552DC3A4DD1C4DA70941B741FC1BB29DA651CDEABAC7C
31,673,898 UART: [art] SIG.S = A9E1A597DEAC7F3770749F8C692CE618A9CC98923F86B419344F9AAF90E5E1682FF5EAAF7FD75F99208B8338405307B6
32,979,439 UART: Caliptra RT
32,980,164 UART: [state] CFI Enabled
33,097,737 UART: [rt] RT listening for mailbox commands...
33,099,644 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,129,356 UART: [rt]cmd =0x46504c54, len=4
33,130,868 >>> mbox cmd response data (8 bytes)
33,131,982 UART: [rt] FIPS self test
33,132,926 UART: [kat] ++
33,133,376 UART: [kat] sha1
33,137,666 UART: Fatal Error: 0x90060002
33,172,876 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,317,196 >>> mbox cmd response: failed
33,317,879 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,462,100 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
10,605,468 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,568,762 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,343 UART:
192,734 UART: Running Caliptra ROM ...
193,971 UART:
194,127 UART: [state] CFI Enabled
264,864 UART: [state] LifecycleState = Unprovisioned
266,765 UART: [state] DebugLocked = No
269,105 UART: [state] WD Timer not started. Device not locked for debugging
272,456 UART: [kat] SHA2-256
451,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,136 UART: [kat] ++
463,673 UART: [kat] sha1
474,484 UART: [kat] SHA2-256
477,559 UART: [kat] SHA2-384
484,190 UART: [kat] SHA2-512-ACC
487,131 UART: [kat] ECC-384
2,950,496 UART: [kat] HMAC-384Kdf
2,974,113 UART: [kat] LMS
3,503,556 UART: [kat] --
3,507,854 UART: [cold-reset] ++
3,509,937 UART: [fht] FHT @ 0x50003400
3,522,127 UART: [idev] ++
3,522,697 UART: [idev] CDI.KEYID = 6
3,523,684 UART: [idev] SUBJECT.KEYID = 7
3,524,882 UART: [idev] UDS.KEYID = 0
3,526,028 ready_for_fw is high
3,526,237 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,035 UART: [idev] Erasing UDS.KEYID = 0
6,026,782 UART: [idev] Sha1 KeyId Algorithm
6,049,320 UART: [idev] --
6,053,642 UART: [ldev] ++
6,054,213 UART: [ldev] CDI.KEYID = 6
6,055,100 UART: [ldev] SUBJECT.KEYID = 5
6,056,316 UART: [ldev] AUTHORITY.KEYID = 7
6,057,553 UART: [ldev] FE.KEYID = 1
6,101,386 UART: [ldev] Erasing FE.KEYID = 1
8,604,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,596 UART: [ldev] --
10,414,981 UART: [fwproc] Wait for Commands...
10,416,922 UART: [fwproc] Recv command 0x46574c44
10,419,028 UART: [fwproc] Recv'd Img size: 115224 bytes
13,838,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,829 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,299,470 >>> mbox cmd response: success
14,303,128 UART: [afmc] ++
14,303,716 UART: [afmc] CDI.KEYID = 6
14,304,598 UART: [afmc] SUBJECT.KEYID = 7
14,305,808 UART: [afmc] AUTHORITY.KEYID = 5
16,832,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,732 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,791 UART: [afmc] --
18,630,076 UART: [cold-reset] --
18,633,287 UART: [state] Locking Datavault
18,638,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,020 UART: [state] Locking ICCM
18,641,063 UART: [exit] Launching FMC @ 0x40000130
18,649,461 UART:
18,649,736 UART: Running Caliptra FMC ...
18,650,770 UART:
18,650,919 UART: [state] CFI Enabled
18,712,584 UART: [fht] FMC Alias Private Key: 7
20,476,242 UART: [art] Extend RT PCRs Done
20,477,460 UART: [art] Lock RT PCRs Done
20,478,697 UART: [art] Populate DV Done
20,484,006 UART: [fht] FMC Alias Private Key: 7
20,485,719 UART: [art] Derive CDI
20,486,488 UART: [art] Store in in slot 0x4
20,544,898 UART: [art] Derive Key Pair
20,545,902 UART: [art] Store priv key in slot 0x5
23,008,944 UART: [art] Derive Key Pair - Done
23,021,736 UART: [art] Signing Cert with AUTHO
23,023,043 UART: RITY.KEYID = 7
24,739,803 UART: [art] Erasing AUTHORITY.KEYID = 7
24,741,305 UART: [art] PUB.X = 90977FAD8D38657714112DE95067CB4D66FBDF997BA3C94127F6BB2F301E6917FF4C7A661F3E6FDB166C8BF48760EA72
24,748,559 UART: [art] PUB.Y = 28D405F7C54B8BC09FB640704F1C3252360F83FDC8CF964172DEAC9C8C24BDB0C4EED6B87F8006200DAE3A00362AEDC8
24,755,852 UART: [art] SIG.R = E1716FC1180612AFB16D71336DF0CEE7FBA298A446FA2850F490254C96C94CD9D9368454AFC97D17FBB1DDA80C0EC52A
24,763,199 UART: [art] SIG.S = 1D1C92FE9DEE36CBF7D56987E481416E30791BAB2A43285AC003137BF29CF2709BCD6F41413B241B4E26B11C38273153
25,741,967 UART: Caliptra RT
25,742,671 UART: [state] CFI Enabled
25,909,147 UART: [rt] RT listening for mailbox commands...
25,910,995 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,940,833 UART: [rt]cmd =0x46504c54, len=4
25,942,442 >>> mbox cmd response data (8 bytes)
25,943,890 UART: [rt] FIPS self test
25,944,828 UART: [kat] ++
25,945,274 UART: [kat] sha1
25,949,404 UART: Fatal Error: 0x90060002
25,984,607 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,129,367 >>> mbox cmd response: failed
26,129,964 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,274,600 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,100 UART:
190,410 UART: Running Caliptra ROM ...
191,544 UART:
191,700 UART: [state] CFI Enabled
256,563 UART: [state] LifecycleState = Unprovisioned
258,428 UART: [state] DebugLocked = No
259,640 UART: [state] WD Timer not started. Device not locked for debugging
264,232 UART: [kat] SHA2-256
443,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,882 UART: [kat] ++
455,328 UART: [kat] sha1
465,395 UART: [kat] SHA2-256
468,404 UART: [kat] SHA2-384
473,517 UART: [kat] SHA2-512-ACC
476,445 UART: [kat] ECC-384
2,941,945 UART: [kat] HMAC-384Kdf
2,962,165 UART: [kat] LMS
3,491,615 UART: [kat] --
3,495,796 UART: [cold-reset] ++
3,497,565 UART: [fht] FHT @ 0x50003400
3,509,027 UART: [idev] ++
3,509,591 UART: [idev] CDI.KEYID = 6
3,510,530 UART: [idev] SUBJECT.KEYID = 7
3,511,740 UART: [idev] UDS.KEYID = 0
3,513,227 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,658,088 UART: [idev] Erasing UDS.KEYID = 0
6,018,915 UART: [idev] Sha1 KeyId Algorithm
6,041,069 UART: [idev] --
6,046,041 UART: [ldev] ++
6,046,622 UART: [ldev] CDI.KEYID = 6
6,047,534 UART: [ldev] SUBJECT.KEYID = 5
6,048,696 UART: [ldev] AUTHORITY.KEYID = 7
6,049,984 UART: [ldev] FE.KEYID = 1
6,091,317 UART: [ldev] Erasing FE.KEYID = 1
8,588,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,309,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,325,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,356,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,375,717 UART: [ldev] --
10,380,774 UART: [fwproc] Wait for Commands...
10,383,635 UART: [fwproc] Recv command 0x46574c44
10,385,731 UART: [fwproc] Recv'd Img size: 115224 bytes
13,799,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,037 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,259,808 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,126 UART:
192,499 UART: Running Caliptra ROM ...
193,639 UART:
193,786 UART: [state] CFI Enabled
263,480 UART: [state] LifecycleState = Unprovisioned
265,884 UART: [state] DebugLocked = No
268,692 UART: [state] WD Timer not started. Device not locked for debugging
272,594 UART: [kat] SHA2-256
462,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,196 UART: [kat] ++
473,649 UART: [kat] sha1
485,170 UART: [kat] SHA2-256
488,255 UART: [kat] SHA2-384
494,737 UART: [kat] SHA2-512-ACC
497,334 UART: [kat] ECC-384
2,947,365 UART: [kat] HMAC-384Kdf
2,973,453 UART: [kat] LMS
3,505,286 UART: [kat] --
3,507,297 UART: [cold-reset] ++
3,508,888 UART: [fht] FHT @ 0x50003400
3,520,153 UART: [idev] ++
3,520,865 UART: [idev] CDI.KEYID = 6
3,521,820 UART: [idev] SUBJECT.KEYID = 7
3,522,996 UART: [idev] UDS.KEYID = 0
3,523,921 ready_for_fw is high
3,524,153 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,145 UART: [idev] Erasing UDS.KEYID = 0
6,033,827 UART: [idev] Sha1 KeyId Algorithm
6,056,517 UART: [idev] --
6,061,114 UART: [ldev] ++
6,061,802 UART: [ldev] CDI.KEYID = 6
6,062,721 UART: [ldev] SUBJECT.KEYID = 5
6,063,935 UART: [ldev] AUTHORITY.KEYID = 7
6,065,111 UART: [ldev] FE.KEYID = 1
6,102,445 UART: [ldev] Erasing FE.KEYID = 1
8,604,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,297 UART: [ldev] --
10,396,619 UART: [fwproc] Wait for Commands...
10,399,414 UART: [fwproc] Recv command 0x46574c44
10,401,674 UART: [fwproc] Recv'd Img size: 115224 bytes
13,861,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,505 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,605,705 >>> mbox cmd response: success
14,610,340 UART: [afmc] ++
14,611,042 UART: [afmc] CDI.KEYID = 6
14,612,233 UART: [afmc] SUBJECT.KEYID = 7
14,613,725 UART: [afmc] AUTHORITY.KEYID = 5
17,154,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,773 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,796 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,910 UART: [afmc] --
18,952,721 UART: [cold-reset] --
18,958,308 UART: [state] Locking Datavault
18,964,201 UART: [state] Locking PCR0, PCR1 and PCR31
18,966,333 UART: [state] Locking ICCM
18,968,532 UART: [exit] Launching FMC @ 0x40000130
18,977,222 UART:
18,977,473 UART: Running Caliptra FMC ...
18,978,504 UART:
18,978,651 UART: [state] CFI Enabled
19,034,959 UART: [fht] FMC Alias Private Key: 7
20,799,226 UART: [art] Extend RT PCRs Done
20,800,445 UART: [art] Lock RT PCRs Done
20,801,678 UART: [art] Populate DV Done
20,807,170 UART: [fht] FMC Alias Private Key: 7
20,808,881 UART: [art] Derive CDI
20,809,682 UART: [art] Store in in slot 0x4
20,867,435 UART: [art] Derive Key Pair
20,868,441 UART: [art] Store priv key in slot 0x5
23,332,173 UART: [art] Derive Key Pair - Done
23,345,398 UART: [art] Signing Cert with AUTHO
23,346,714 UART: RITY.KEYID = 7
25,057,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,269 UART: [art] PUB.X = 2C3D01C9B0AA1E86E2771F156CAF53C6212240B99AA81CFA62C0BF240BB8747BD5E516198373C35D10BDF4BE21607429
25,066,531 UART: [art] PUB.Y = A90411DD53E9CF864256823B19610168E0B0EAB4A0F3983C95A6972B6381101832CFE661F73C9C1AD2D971AD9C271466
25,073,825 UART: [art] SIG.R = 846F017FE2131B98A470088FB4F7B74C3BEEC594AB46920D517AFC1FB4844ACDE807AF97D19E2CBB3B35D2FD1EC058C8
25,081,229 UART: [art] SIG.S = E2DAD2F5905FCDF152F3F143B393AFB3DAE5565EC6E953CE8AE81CB3F0E96C3B80918C0B01B2F5681DD50129A20F3E93
26,060,497 UART: Caliptra RT
26,061,198 UART: [state] CFI Enabled
26,225,405 UART: [rt] RT listening for mailbox commands...
26,227,272 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,257,069 UART: [rt]cmd =0x46504c54, len=4
26,258,577 >>> mbox cmd response data (8 bytes)
26,259,510 UART: [rt] FIPS self test
26,260,393 UART: [kat] ++
26,260,836 UART: [kat] sha1
26,265,424 UART: Fatal Error: 0x90060002
26,300,633 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,445,352 >>> mbox cmd response: failed
26,446,009 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,590,678 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,043 UART:
190,338 UART: Running Caliptra ROM ...
191,363 UART:
191,523 UART: [state] CFI Enabled
253,962 UART: [state] LifecycleState = Unprovisioned
256,325 UART: [state] DebugLocked = No
258,191 UART: [state] WD Timer not started. Device not locked for debugging
263,339 UART: [kat] SHA2-256
453,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,008 UART: [kat] ++
464,497 UART: [kat] sha1
476,834 UART: [kat] SHA2-256
479,839 UART: [kat] SHA2-384
484,425 UART: [kat] SHA2-512-ACC
487,037 UART: [kat] ECC-384
2,941,859 UART: [kat] HMAC-384Kdf
2,963,533 UART: [kat] LMS
3,495,294 UART: [kat] --
3,501,613 UART: [cold-reset] ++
3,503,878 UART: [fht] FHT @ 0x50003400
3,515,248 UART: [idev] ++
3,515,929 UART: [idev] CDI.KEYID = 6
3,516,891 UART: [idev] SUBJECT.KEYID = 7
3,518,104 UART: [idev] UDS.KEYID = 0
3,519,616 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,664,455 UART: [idev] Erasing UDS.KEYID = 0
6,022,016 UART: [idev] Sha1 KeyId Algorithm
6,044,976 UART: [idev] --
6,050,268 UART: [ldev] ++
6,050,951 UART: [ldev] CDI.KEYID = 6
6,051,866 UART: [ldev] SUBJECT.KEYID = 5
6,053,026 UART: [ldev] AUTHORITY.KEYID = 7
6,054,261 UART: [ldev] FE.KEYID = 1
6,092,194 UART: [ldev] Erasing FE.KEYID = 1
8,600,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,946 UART: [ldev] --
10,406,113 UART: [fwproc] Wait for Commands...
10,409,183 UART: [fwproc] Recv command 0x46574c44
10,411,443 UART: [fwproc] Recv'd Img size: 115224 bytes
13,866,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,607 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,611,243 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,435,103 ready_for_fw is high
3,435,503 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,756,862 >>> mbox cmd response: success
19,052,859 UART:
19,053,259 UART: Running Caliptra FMC ...
19,054,418 UART:
19,054,580 UART: [state] CFI Enabled
19,117,388 UART: [fht] FMC Alias Private Key: 7
20,881,002 UART: [art] Extend RT PCRs Done
20,882,229 UART: [art] Lock RT PCRs Done
20,883,824 UART: [art] Populate DV Done
20,889,026 UART: [fht] FMC Alias Private Key: 7
20,890,676 UART: [art] Derive CDI
20,891,439 UART: [art] Store in in slot 0x4
20,949,674 UART: [art] Derive Key Pair
20,950,716 UART: [art] Store priv key in slot 0x5
23,413,298 UART: [art] Derive Key Pair - Done
23,426,084 UART: [art] Signing Cert with AUTHO
23,427,433 UART: RITY.KEYID = 7
25,140,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,703 UART: [art] PUB.X = BB62B76DD81489D8E30871BA6DA63E9D2E695CFB856E423A40D7939245D1E07348F2CB9C2A6192C46373E6D5FE4854BD
25,148,970 UART: [art] PUB.Y = FE20F7F047FF4C52574A2F94FF77E9B964B72990E3EAA5260A796F9FA16D5C71344371C5B24F0E821984EB32C24C746E
25,156,228 UART: [art] SIG.R = E81190E77C372C3F20DB7C07249CDF1E857E430B2989DDF0E4DE98C0B8A31364EE8A91611EDC2A07D904D3175EEF105A
25,163,618 UART: [art] SIG.S = 26080E0A7ADD4AE49276E6DE91C37C52C4CFDC222F61420CCD77CDCF4584B999C66BDABCBA10E0F8E7F2D6DB1ADED2A9
26,142,527 UART: Caliptra RT
26,143,229 UART: [state] CFI Enabled
26,308,196 UART: [rt] RT listening for mailbox commands...
26,310,049 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,692 UART: [rt]cmd =0x46504c54, len=4
26,341,236 >>> mbox cmd response data (8 bytes)
26,342,270 UART: [rt] FIPS self test
26,343,217 UART: [kat] ++
26,343,670 UART: [kat] sha1
26,348,074 UART: Fatal Error: 0x90060002
26,383,453 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,528,107 >>> mbox cmd response: failed
26,528,777 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,673,801 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,429,990 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,744,812 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,502 UART:
192,864 UART: Running Caliptra ROM ...
193,998 UART:
603,633 UART: [state] CFI Enabled
616,190 UART: [state] LifecycleState = Unprovisioned
618,533 UART: [state] DebugLocked = No
620,362 UART: [state] WD Timer not started. Device not locked for debugging
625,046 UART: [kat] SHA2-256
814,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,719 UART: [kat] ++
826,349 UART: [kat] sha1
838,371 UART: [kat] SHA2-256
841,390 UART: [kat] SHA2-384
847,331 UART: [kat] SHA2-512-ACC
849,959 UART: [kat] ECC-384
3,291,717 UART: [kat] HMAC-384Kdf
3,304,239 UART: [kat] LMS
3,836,045 UART: [kat] --
3,840,544 UART: [cold-reset] ++
3,841,557 UART: [fht] FHT @ 0x50003400
3,854,029 UART: [idev] ++
3,854,674 UART: [idev] CDI.KEYID = 6
3,855,662 UART: [idev] SUBJECT.KEYID = 7
3,856,841 UART: [idev] UDS.KEYID = 0
3,857,768 ready_for_fw is high
3,857,970 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,002,707 UART: [idev] Erasing UDS.KEYID = 0
6,338,134 UART: [idev] Sha1 KeyId Algorithm
6,359,746 UART: [idev] --
6,364,117 UART: [ldev] ++
6,364,799 UART: [ldev] CDI.KEYID = 6
6,365,819 UART: [ldev] SUBJECT.KEYID = 5
6,367,145 UART: [ldev] AUTHORITY.KEYID = 7
6,368,342 UART: [ldev] FE.KEYID = 1
6,380,565 UART: [ldev] Erasing FE.KEYID = 1
8,861,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,572 UART: [ldev] --
10,650,569 UART: [fwproc] Wait for Commands...
10,652,534 UART: [fwproc] Recv command 0x46574c44
10,654,795 UART: [fwproc] Recv'd Img size: 115224 bytes
14,116,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,198,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,314,861 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,862,153 >>> mbox cmd response: success
14,866,191 UART: [afmc] ++
14,866,904 UART: [afmc] CDI.KEYID = 6
14,868,092 UART: [afmc] SUBJECT.KEYID = 7
14,869,580 UART: [afmc] AUTHORITY.KEYID = 5
17,376,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,095,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,097,030 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,112,224 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,127,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,142,365 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,165,088 UART: [afmc] --
19,168,058 UART: [cold-reset] --
19,170,292 UART: [state] Locking Datavault
19,174,683 UART: [state] Locking PCR0, PCR1 and PCR31
19,176,870 UART: [state] Locking ICCM
19,179,593 UART: [exit] Launching FMC @ 0x40000130
19,188,304 UART:
19,188,554 UART: Running Caliptra FMC ...
19,189,659 UART:
19,189,814 UART: [state] CFI Enabled
19,197,482 UART: [fht] FMC Alias Private Key: 7
20,954,506 UART: [art] Extend RT PCRs Done
20,955,708 UART: [art] Lock RT PCRs Done
20,957,278 UART: [art] Populate DV Done
20,962,417 UART: [fht] FMC Alias Private Key: 7
20,963,953 UART: [art] Derive CDI
20,964,736 UART: [art] Store in in slot 0x4
21,007,386 UART: [art] Derive Key Pair
21,008,461 UART: [art] Store priv key in slot 0x5
23,435,005 UART: [art] Derive Key Pair - Done
23,447,952 UART: [art] Signing Cert with AUTHO
23,449,256 UART: RITY.KEYID = 7
25,154,887 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,378 UART: [art] PUB.X = 22DABC7B2A79BDAE3C12781EAC8F7E71077B35226172A519E7C8F112E82E60A6A046989ED2C6CA2BBA02207B7EBA2765
25,163,686 UART: [art] PUB.Y = E0B5BD82F38B0A1D890005AB6CB9B902467567BC347699BF4CC2722296229E882D9CFC9E0488932E2DF747E7609BB96A
25,170,915 UART: [art] SIG.R = 5D9977DF9EB75ACEB6401BA2B6F9F226916430EAC5C638A1280435AB9C4305EEF081B283E991241C51D3B13511393E27
25,178,327 UART: [art] SIG.S = 9222780E1AEB2FD88A8D66F93C1EEF01C322C989DDE93A504FAA4E584C550828B10B6C3DB1A938A8CFDF7A503AAC4C2F
26,157,457 UART: Caliptra RT
26,158,148 UART: [state] CFI Enabled
26,275,210 UART: [rt] RT listening for mailbox commands...
26,277,053 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,306,674 UART: [rt]cmd =0x46504c54, len=4
26,308,413 >>> mbox cmd response data (8 bytes)
26,309,307 UART: [rt] FIPS self test
26,310,254 UART: [kat] ++
26,310,744 UART: [kat] sha1
26,314,856 UART: Fatal Error: 0x90060002
26,350,071 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,494,766 >>> mbox cmd response: failed
26,495,339 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,639,969 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,019 UART:
190,309 UART: Running Caliptra ROM ...
191,416 UART:
13,885,960 UART: [state] CFI Enabled
13,899,087 UART: [state] LifecycleState = Unprovisioned
13,901,461 UART: [state] DebugLocked = No
13,903,235 UART: [state] WD Timer not started. Device not locked for debugging
13,908,003 UART: [kat] SHA2-256
14,097,907 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,108,692 UART: [kat] ++
14,109,235 UART: [kat] sha1
14,121,420 UART: [kat] SHA2-256
14,124,435 UART: [kat] SHA2-384
14,130,471 UART: [kat] SHA2-512-ACC
14,133,069 UART: [kat] ECC-384
16,575,030 UART: [kat] HMAC-384Kdf
16,588,723 UART: [kat] LMS
17,120,560 UART: [kat] --
17,124,008 UART: [cold-reset] ++
17,126,001 UART: [fht] FHT @ 0x50003400
17,136,553 UART: [idev] ++
17,137,241 UART: [idev] CDI.KEYID = 6
17,138,179 UART: [idev] SUBJECT.KEYID = 7
17,139,392 UART: [idev] UDS.KEYID = 0
17,140,888 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,285,972 UART: [idev] Erasing UDS.KEYID = 0
19,613,470 UART: [idev] Sha1 KeyId Algorithm
19,636,205 UART: [idev] --
19,642,628 UART: [ldev] ++
19,643,312 UART: [ldev] CDI.KEYID = 6
19,644,189 UART: [ldev] SUBJECT.KEYID = 5
19,645,404 UART: [ldev] AUTHORITY.KEYID = 7
19,646,774 UART: [ldev] FE.KEYID = 1
19,655,622 UART: [ldev] Erasing FE.KEYID = 1
22,131,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,849,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,864,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,879,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,894,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,916,425 UART: [ldev] --
23,922,337 UART: [fwproc] Wait for Commands...
23,925,360 UART: [fwproc] Recv command 0x46574c44
23,927,670 UART: [fwproc] Recv'd Img size: 115224 bytes
27,380,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,459,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,576,123 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,124,324 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,753,437 ready_for_fw is high
3,753,888 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,986,711 >>> mbox cmd response: success
19,241,811 UART:
19,242,201 UART: Running Caliptra FMC ...
19,243,359 UART:
19,243,520 UART: [state] CFI Enabled
19,251,236 UART: [fht] FMC Alias Private Key: 7
21,008,233 UART: [art] Extend RT PCRs Done
21,009,470 UART: [art] Lock RT PCRs Done
21,011,299 UART: [art] Populate DV Done
21,016,794 UART: [fht] FMC Alias Private Key: 7
21,018,431 UART: [art] Derive CDI
21,019,182 UART: [art] Store in in slot 0x4
21,062,104 UART: [art] Derive Key Pair
21,063,114 UART: [art] Store priv key in slot 0x5
23,489,701 UART: [art] Derive Key Pair - Done
23,502,915 UART: [art] Signing Cert with AUTHO
23,504,245 UART: RITY.KEYID = 7
25,209,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,434 UART: [art] PUB.X = 7EC623EBBFFC4FD0877FD29642FD91834895D6D53C46933B15A24300D75A974082BA1708D207FFDF8CC5403CEF304A9B
25,218,696 UART: [art] PUB.Y = 774CCD01C2A03C54FC00C688C9D49AF75C9A67F6146AF5A5CE7DA44C87C35E0DB4C93ACE8A26DF2E216013127A2B2195
25,225,908 UART: [art] SIG.R = BECECA6868BEA884C40D1A358D7361F8FC7450079788CB7655C04C5BD2B34ACA5DDC123548FBCFDD163BC0E275C77143
25,233,318 UART: [art] SIG.S = AE332624372C36250608CA68C43B5CFBE3DECA45B62212DA1E83A8E47448A24CA29A59471216E328A4AACED2AD5AB88A
26,211,941 UART: Caliptra RT
26,212,652 UART: [state] CFI Enabled
26,330,218 UART: [rt] RT listening for mailbox commands...
26,332,072 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,361,856 UART: [rt]cmd =0x46504c54, len=4
26,363,436 >>> mbox cmd response data (8 bytes)
26,364,538 UART: [rt] FIPS self test
26,365,478 UART: [kat] ++
26,365,951 UART: [kat] sha1
26,370,167 UART: Fatal Error: 0x90060002
26,405,545 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,550,277 >>> mbox cmd response: failed
26,550,917 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,695,553 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,983,649 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,208,426 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,695 UART: [kat] SHA2-256
892,633 UART: [kat] SHA2-384
895,528 UART: [kat] SHA2-512-ACC
897,429 UART: [kat] ECC-384
903,212 UART: [kat] HMAC-384Kdf
907,726 UART: [kat] LMS
1,475,922 UART: [kat] --
1,476,711 UART: [cold-reset] ++
1,477,187 UART: [fht] Storing FHT @ 0x50003400
1,479,880 UART: [idev] ++
1,480,048 UART: [idev] CDI.KEYID = 6
1,480,408 UART: [idev] SUBJECT.KEYID = 7
1,480,832 UART: [idev] UDS.KEYID = 0
1,481,177 ready_for_fw is high
1,481,177 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,280 UART: [idev] Erasing UDS.KEYID = 0
1,505,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,580 UART: [idev] --
1,515,649 UART: [ldev] ++
1,515,817 UART: [ldev] CDI.KEYID = 6
1,516,180 UART: [ldev] SUBJECT.KEYID = 5
1,516,606 UART: [ldev] AUTHORITY.KEYID = 7
1,517,069 UART: [ldev] FE.KEYID = 1
1,522,557 UART: [ldev] Erasing FE.KEYID = 1
1,547,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,434 UART: [ldev] --
1,586,757 UART: [fwproc] Waiting for Commands...
1,587,404 UART: [fwproc] Received command 0x46574c44
1,588,195 UART: [fwproc] Received Image of size 115224 bytes
2,895,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,356 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,813 >>> mbox cmd response: success
3,090,009 UART: [afmc] ++
3,090,177 UART: [afmc] CDI.KEYID = 6
3,090,539 UART: [afmc] SUBJECT.KEYID = 7
3,090,964 UART: [afmc] AUTHORITY.KEYID = 5
3,125,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,579 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,972 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,662 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,635 UART: [afmc] --
3,169,633 UART: [cold-reset] --
3,170,479 UART: [state] Locking Datavault
3,171,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,232 UART: [state] Locking ICCM
3,172,724 UART: [exit] Launching FMC @ 0x40000130
3,178,053 UART:
3,178,069 UART: Running Caliptra FMC ...
3,178,477 UART:
3,178,531 UART: [state] CFI Enabled
3,189,056 UART: [fht] FMC Alias Private Key: 7
3,297,177 UART: [art] Extend RT PCRs Done
3,297,605 UART: [art] Lock RT PCRs Done
3,299,139 UART: [art] Populate DV Done
3,307,754 UART: [fht] FMC Alias Private Key: 7
3,308,862 UART: [art] Derive CDI
3,309,142 UART: [art] Store in in slot 0x4
3,394,753 UART: [art] Derive Key Pair
3,395,113 UART: [art] Store priv key in slot 0x5
3,408,445 UART: [art] Derive Key Pair - Done
3,423,419 UART: [art] Signing Cert with AUTHO
3,423,899 UART: RITY.KEYID = 7
3,439,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,304 UART: [art] PUB.X = 93F42019AAB87C493A81734BCBE5AEA4C9DCF90C04C77DF3E1EF0A8ED75E2928A0CBED320BC6DE5B66E7C8607657D089
3,447,082 UART: [art] PUB.Y = 31F206E5812787FA864C1A00867B2BBF2DD38F4E9098455E84EB2871A0DEEB3955379A5D06332301281AA96F816A527B
3,453,997 UART: [art] SIG.R = 067CBB48DB4F9C411B020B4433D976B6E829C53E3CFD25E0DF67C59251DC068ACE67492900DB6EB7278604183502A1D8
3,460,729 UART: [art] SIG.S = 99CF0ED6A6AF00CEAD4568B65DEC4C997421FE96BB33B7A16563A6ADF0EABF9AC600AD425730C8BC20356EEDEA4D8B42
3,484,431 UART: Caliptra RT
3,484,685 UART: [state] CFI Enabled
3,594,415 UART: [rt] RT listening for mailbox commands...
3,595,078 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,516 UART: [rt]cmd =0x46504c54, len=4
3,625,758 >>> mbox cmd response data (8 bytes)
3,625,921 UART: [rt] FIPS self test
3,626,249 UART: [kat] ++
3,626,401 UART: [kat] sha1
3,630,740 UART: Fatal Error: 0x90060002
3,632,290 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,632,295 >>> mbox cmd response: failed
3,632,295 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,632,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,278 UART: [kat] SHA2-512-ACC
897,179 UART: [kat] ECC-384
902,762 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,607 UART: [cold-reset] ++
1,477,045 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,572 UART: [idev] Erasing UDS.KEYID = 0
1,504,562 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,134 UART: [idev] --
1,514,237 UART: [ldev] ++
1,514,405 UART: [ldev] CDI.KEYID = 6
1,514,768 UART: [ldev] SUBJECT.KEYID = 5
1,515,194 UART: [ldev] AUTHORITY.KEYID = 7
1,515,657 UART: [ldev] FE.KEYID = 1
1,520,953 UART: [ldev] Erasing FE.KEYID = 1
1,545,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,894 UART: [ldev] --
1,585,255 UART: [fwproc] Waiting for Commands...
1,585,920 UART: [fwproc] Received command 0x46574c44
1,586,711 UART: [fwproc] Received Image of size 115224 bytes
2,895,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,436 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,033 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,107 >>> mbox cmd response: success
3,001,171 UART:
3,001,187 UART: Running Caliptra FMC ...
3,001,595 UART:
3,001,649 UART: [state] CFI Enabled
3,011,936 UART: [fht] FMC Alias Private Key: 7
3,119,685 UART: [art] Extend RT PCRs Done
3,120,113 UART: [art] Lock RT PCRs Done
3,121,613 UART: [art] Populate DV Done
3,129,798 UART: [fht] FMC Alias Private Key: 7
3,130,788 UART: [art] Derive CDI
3,131,068 UART: [art] Store in in slot 0x4
3,216,487 UART: [art] Derive Key Pair
3,216,847 UART: [art] Store priv key in slot 0x5
3,230,575 UART: [art] Derive Key Pair - Done
3,245,161 UART: [art] Signing Cert with AUTHO
3,245,641 UART: RITY.KEYID = 7
3,260,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,486 UART: [art] PUB.X = 5C47C2F27EB0BA60C3AF9C83381BB09EC476D9093BA983ECD3D060AC86E092670D6FBCF8562C518AB52CD5C5B7A09954
3,268,264 UART: [art] PUB.Y = 73A291E197169409F1D4F1B5B69BC30352B363D7D89E341E8F2225401D16573A039D0F21266F7997EAA8CF029BBF43D0
3,275,195 UART: [art] SIG.R = 6594AAD18E2BACC5316FC1E0B64BDEDD997A9839BFC8BDFAE9D0A94F4A93F665A13E4BA55D0B27BB67823738C93890FB
3,281,984 UART: [art] SIG.S = 0DED9FCFA5302629E41A57858750FA7C8BCB94CE04AD87BD8C4C8EB11B067BB2E68535D44DB955E50DC124E9ED51D681
3,305,891 UART: Caliptra RT
3,306,145 UART: [state] CFI Enabled
3,413,250 UART: [rt] RT listening for mailbox commands...
3,413,913 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,443 UART: [rt]cmd =0x46504c54, len=4
3,444,769 >>> mbox cmd response data (8 bytes)
3,444,974 UART: [rt] FIPS self test
3,445,302 UART: [kat] ++
3,445,454 UART: [kat] sha1
3,449,539 UART: Fatal Error: 0x90060002
3,451,089 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,451,094 >>> mbox cmd response: failed
3,451,094 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,451,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,139 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,267 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,858 UART: [kat] SHA2-256
881,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,904 UART: [kat] ++
886,056 UART: [kat] sha1
890,256 UART: [kat] SHA2-256
892,194 UART: [kat] SHA2-384
894,903 UART: [kat] SHA2-512-ACC
896,804 UART: [kat] ECC-384
902,425 UART: [kat] HMAC-384Kdf
907,207 UART: [kat] LMS
1,475,403 UART: [kat] --
1,476,146 UART: [cold-reset] ++
1,476,510 UART: [fht] Storing FHT @ 0x50003400
1,479,307 UART: [idev] ++
1,479,475 UART: [idev] CDI.KEYID = 6
1,479,835 UART: [idev] SUBJECT.KEYID = 7
1,480,259 UART: [idev] UDS.KEYID = 0
1,480,604 ready_for_fw is high
1,480,604 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,501 UART: [idev] Erasing UDS.KEYID = 0
1,505,541 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,227 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,936 UART: [fwproc] Waiting for Commands...
1,587,641 UART: [fwproc] Received command 0x46574c44
1,588,432 UART: [fwproc] Received Image of size 115224 bytes
2,896,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,248 >>> mbox cmd response: success
3,091,260 UART: [afmc] ++
3,091,428 UART: [afmc] CDI.KEYID = 6
3,091,790 UART: [afmc] SUBJECT.KEYID = 7
3,092,215 UART: [afmc] AUTHORITY.KEYID = 5
3,127,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,151 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,841 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,888 UART: [afmc] --
3,170,890 UART: [cold-reset] --
3,171,546 UART: [state] Locking Datavault
3,172,909 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,513 UART: [state] Locking ICCM
3,174,129 UART: [exit] Launching FMC @ 0x40000130
3,179,458 UART:
3,179,474 UART: Running Caliptra FMC ...
3,179,882 UART:
3,180,025 UART: [state] CFI Enabled
3,190,384 UART: [fht] FMC Alias Private Key: 7
3,298,465 UART: [art] Extend RT PCRs Done
3,298,893 UART: [art] Lock RT PCRs Done
3,300,285 UART: [art] Populate DV Done
3,308,668 UART: [fht] FMC Alias Private Key: 7
3,309,784 UART: [art] Derive CDI
3,310,064 UART: [art] Store in in slot 0x4
3,395,687 UART: [art] Derive Key Pair
3,396,047 UART: [art] Store priv key in slot 0x5
3,409,609 UART: [art] Derive Key Pair - Done
3,424,574 UART: [art] Signing Cert with AUTHO
3,425,054 UART: RITY.KEYID = 7
3,440,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,843 UART: [art] PUB.X = F0D2B9543232E613DAE5BCF73B87DE429947C4AE007C584E8687F3E7B22DFC8A0CF41D2347C1E12ABAFF913DAB1D73FF
3,447,608 UART: [art] PUB.Y = 662287949EC4A781E356978AE008ABF977150492627144118245DDFD6E776F080BCD916F425A7CAA8B0B0CA92428F87A
3,454,536 UART: [art] SIG.R = 5BA4FD20212D62E48402EA9356AFF20CC818C8F54F0CAA9EC4A17C54C4B8664D21D73C14EC63AE8F0BCA70B688B2FC57
3,461,312 UART: [art] SIG.S = 45F6E8DB73AEA24CE5D5E237A9B23991E5704F9BF1CB07FC0FAB4595D2F3E8A742D8F58E5337A3BC69F16B1F1CE7AC58
3,485,353 UART: Caliptra RT
3,485,699 UART: [state] CFI Enabled
3,593,570 UART: [rt] RT listening for mailbox commands...
3,594,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,777 UART: [rt]cmd =0x46504c54, len=4
3,625,019 >>> mbox cmd response data (8 bytes)
3,625,286 UART: [rt] FIPS self test
3,625,614 UART: [kat] ++
3,625,766 UART: [kat] sha1
3,630,145 UART: Fatal Error: 0x90060002
3,631,695 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,700 >>> mbox cmd response: failed
3,631,700 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,854 UART: [kat] SHA2-256
881,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,900 UART: [kat] ++
886,052 UART: [kat] sha1
890,392 UART: [kat] SHA2-256
892,330 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
902,887 UART: [kat] HMAC-384Kdf
907,659 UART: [kat] LMS
1,475,855 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,134 UART: [fht] Storing FHT @ 0x50003400
1,480,117 UART: [idev] ++
1,480,285 UART: [idev] CDI.KEYID = 6
1,480,645 UART: [idev] SUBJECT.KEYID = 7
1,481,069 UART: [idev] UDS.KEYID = 0
1,481,414 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,027 UART: [idev] Erasing UDS.KEYID = 0
1,505,643 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,123 UART: [idev] --
1,515,342 UART: [ldev] ++
1,515,510 UART: [ldev] CDI.KEYID = 6
1,515,873 UART: [ldev] SUBJECT.KEYID = 5
1,516,299 UART: [ldev] AUTHORITY.KEYID = 7
1,516,762 UART: [ldev] FE.KEYID = 1
1,521,854 UART: [ldev] Erasing FE.KEYID = 1
1,547,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,719 UART: [ldev] --
1,587,018 UART: [fwproc] Waiting for Commands...
1,587,817 UART: [fwproc] Received command 0x46574c44
1,588,608 UART: [fwproc] Received Image of size 115224 bytes
2,895,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,418 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,994 ready_for_fw is high
1,362,994 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,942,286 >>> mbox cmd response: success
3,003,754 UART:
3,003,770 UART: Running Caliptra FMC ...
3,004,178 UART:
3,004,321 UART: [state] CFI Enabled
3,014,936 UART: [fht] FMC Alias Private Key: 7
3,122,859 UART: [art] Extend RT PCRs Done
3,123,287 UART: [art] Lock RT PCRs Done
3,124,489 UART: [art] Populate DV Done
3,132,430 UART: [fht] FMC Alias Private Key: 7
3,133,408 UART: [art] Derive CDI
3,133,688 UART: [art] Store in in slot 0x4
3,219,475 UART: [art] Derive Key Pair
3,219,835 UART: [art] Store priv key in slot 0x5
3,233,003 UART: [art] Derive Key Pair - Done
3,247,735 UART: [art] Signing Cert with AUTHO
3,248,215 UART: RITY.KEYID = 7
3,263,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,078 UART: [art] PUB.X = 6FECE8B6A9D6DBF2F7BAFD7DBEB4A69FE96AB84D91C181A5B95CAB8C47D989E7C9304C1343EB2F400BA8EBB143741AA2
3,270,875 UART: [art] PUB.Y = F1EB22F1627C6B04C219AF51428168158120E7EE5087324F4DDD92F440B1E8F60220950D1A45429BEBD6A19AFF958408
3,277,811 UART: [art] SIG.R = CA9193C48C57B6005A36C0B7E898B1E8802322291DEF408A2507A7AFB3F30FAD6E61D9540F2C14AC7B30A87FD280E3D3
3,284,558 UART: [art] SIG.S = 21031A18BC04A1212876CC67F4DB64E429466ED085664EB0E3FAD2C6D715AF0175573E70A87EFACD1967B909355EBD8E
3,308,431 UART: Caliptra RT
3,308,777 UART: [state] CFI Enabled
3,416,179 UART: [rt] RT listening for mailbox commands...
3,416,842 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,436 UART: [rt]cmd =0x46504c54, len=4
3,447,596 >>> mbox cmd response data (8 bytes)
3,447,953 UART: [rt] FIPS self test
3,448,281 UART: [kat] ++
3,448,433 UART: [kat] sha1
3,452,530 UART: Fatal Error: 0x90060002
3,454,080 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,454,085 >>> mbox cmd response: failed
3,454,085 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,454,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,778 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,820 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
892,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,045 UART: [kat] ++
897,197 UART: [kat] sha1
901,595 UART: [kat] SHA2-256
903,535 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
918,032 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,559 UART: [idev] Sha1 KeyId Algorithm
1,209,007 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,480 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,491 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,919 UART: [ldev] --
1,281,216 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,353 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,490 >>> mbox cmd response: success
2,785,670 UART: [afmc] ++
2,785,838 UART: [afmc] CDI.KEYID = 6
2,786,200 UART: [afmc] SUBJECT.KEYID = 7
2,786,625 UART: [afmc] AUTHORITY.KEYID = 5
2,822,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,003 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,888 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,607 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,425 UART: [afmc] --
2,865,503 UART: [cold-reset] --
2,866,363 UART: [state] Locking Datavault
2,867,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,220 UART: [state] Locking ICCM
2,868,732 UART: [exit] Launching FMC @ 0x40000130
2,874,061 UART:
2,874,077 UART: Running Caliptra FMC ...
2,874,485 UART:
2,874,539 UART: [state] CFI Enabled
2,885,162 UART: [fht] FMC Alias Private Key: 7
2,993,429 UART: [art] Extend RT PCRs Done
2,993,857 UART: [art] Lock RT PCRs Done
2,995,279 UART: [art] Populate DV Done
3,003,488 UART: [fht] FMC Alias Private Key: 7
3,004,518 UART: [art] Derive CDI
3,004,798 UART: [art] Store in in slot 0x4
3,090,199 UART: [art] Derive Key Pair
3,090,559 UART: [art] Store priv key in slot 0x5
3,103,705 UART: [art] Derive Key Pair - Done
3,118,372 UART: [art] Signing Cert with AUTHO
3,118,852 UART: RITY.KEYID = 7
3,134,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,339 UART: [art] PUB.X = 180E2808BC1D5A0950D2335A8CBF4F86B5FF82AAC3C42594CDBED7942B5D49F6C3D178DF59DB8E7B5F66044E736BF11F
3,142,113 UART: [art] PUB.Y = DA3353B0DAD9E7CBF5A64E5F0CE93BF5B552F6B3AD7F4D413BCD8748E038250D8611D8075B9D2868C1F89A21110C6576
3,149,061 UART: [art] SIG.R = 792752EE92E2101F7114AF7BEE21BD0800CA43E62FE09D5257D7118DFEDAD0595B04CD7BFC836C71BCD9C892165FB1C5
3,155,817 UART: [art] SIG.S = D7A24A9FEB55D1EB474C7B16E0BC2447B4C0A08896887E67BE4926E207112F6560159C3685CD131E0B171592801D264F
3,179,286 UART: Caliptra RT
3,179,540 UART: [state] CFI Enabled
3,286,920 UART: [rt] RT listening for mailbox commands...
3,287,583 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,201 UART: [rt]cmd =0x46504c54, len=4
3,318,443 >>> mbox cmd response data (8 bytes)
3,318,592 UART: [rt] FIPS self test
3,318,920 UART: [kat] ++
3,319,072 UART: [kat] sha1
3,323,501 UART: Fatal Error: 0x90060002
3,325,051 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,325,056 >>> mbox cmd response: failed
3,325,056 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,325,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,610 UART: [kat] SHA2-512-ACC
908,511 UART: [kat] ECC-384
918,088 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,172,049 UART: [cold-reset] ++
1,172,625 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,201,041 UART: [idev] Sha1 KeyId Algorithm
1,209,605 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,594 UART: [fwproc] Wait for Commands...
1,283,380 UART: [fwproc] Recv command 0x46574c44
1,284,108 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,763 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,826 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,595 ready_for_fw is high
1,060,595 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,681 >>> mbox cmd response: success
2,700,247 UART:
2,700,263 UART: Running Caliptra FMC ...
2,700,671 UART:
2,700,725 UART: [state] CFI Enabled
2,711,348 UART: [fht] FMC Alias Private Key: 7
2,819,721 UART: [art] Extend RT PCRs Done
2,820,149 UART: [art] Lock RT PCRs Done
2,821,741 UART: [art] Populate DV Done
2,830,228 UART: [fht] FMC Alias Private Key: 7
2,831,244 UART: [art] Derive CDI
2,831,524 UART: [art] Store in in slot 0x4
2,917,131 UART: [art] Derive Key Pair
2,917,491 UART: [art] Store priv key in slot 0x5
2,930,501 UART: [art] Derive Key Pair - Done
2,945,611 UART: [art] Signing Cert with AUTHO
2,946,091 UART: RITY.KEYID = 7
2,961,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,866 UART: [art] PUB.X = E71093DF11B0C6999B532D0928BAF31DD2DBD73495DE700506393A812667C885A51EB33A196FECF6BA01BBA3B7CDB57B
2,968,636 UART: [art] PUB.Y = 3BC29E33569F4156BE682802C4D4F91D00B3619C6D2EEAFD457E950BB39A3D0950B592A4BE2AA9AB1564B21251B69DD4
2,975,563 UART: [art] SIG.R = FCE4DCE18EEDC9EF31F23F31598200DBEFF5B9FF0F2048817655C43A50048537E30E021BAB4AC6BD64134AEEBB533DB3
2,982,319 UART: [art] SIG.S = 21959ED96BFDF060A85550494A9CFA53E84CBEE281F2BB600552AEAF3F78C03FF3E19E503BCF06FD1E5D60519EC085DA
3,005,602 UART: Caliptra RT
3,005,856 UART: [state] CFI Enabled
3,113,618 UART: [rt] RT listening for mailbox commands...
3,114,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,781 UART: [rt]cmd =0x46504c54, len=4
3,145,011 >>> mbox cmd response data (8 bytes)
3,145,346 UART: [rt] FIPS self test
3,145,674 UART: [kat] ++
3,145,826 UART: [kat] sha1
3,150,253 UART: Fatal Error: 0x90060002
3,151,803 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,808 >>> mbox cmd response: failed
3,151,808 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,449 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,119 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,625 UART: [kat] SHA2-512-ACC
908,526 UART: [kat] ECC-384
917,997 UART: [kat] HMAC-384Kdf
922,417 UART: [kat] LMS
1,170,745 UART: [kat] --
1,171,434 UART: [cold-reset] ++
1,171,806 UART: [fht] FHT @ 0x50003400
1,174,469 UART: [idev] ++
1,174,637 UART: [idev] CDI.KEYID = 6
1,174,997 UART: [idev] SUBJECT.KEYID = 7
1,175,421 UART: [idev] UDS.KEYID = 0
1,175,766 ready_for_fw is high
1,175,766 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,639 UART: [idev] Erasing UDS.KEYID = 0
1,200,656 UART: [idev] Sha1 KeyId Algorithm
1,209,090 UART: [idev] --
1,210,060 UART: [ldev] ++
1,210,228 UART: [ldev] CDI.KEYID = 6
1,210,591 UART: [ldev] SUBJECT.KEYID = 5
1,211,017 UART: [ldev] AUTHORITY.KEYID = 7
1,211,480 UART: [ldev] FE.KEYID = 1
1,216,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,024 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,071 UART: [fwproc] Recv command 0x46574c44
1,283,799 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,800 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,943 >>> mbox cmd response: success
2,787,177 UART: [afmc] ++
2,787,345 UART: [afmc] CDI.KEYID = 6
2,787,707 UART: [afmc] SUBJECT.KEYID = 7
2,788,132 UART: [afmc] AUTHORITY.KEYID = 5
2,824,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,554 UART: [afmc] --
2,867,576 UART: [cold-reset] --
2,868,392 UART: [state] Locking Datavault
2,869,751 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,355 UART: [state] Locking ICCM
2,870,905 UART: [exit] Launching FMC @ 0x40000130
2,876,234 UART:
2,876,250 UART: Running Caliptra FMC ...
2,876,658 UART:
2,876,801 UART: [state] CFI Enabled
2,886,956 UART: [fht] FMC Alias Private Key: 7
2,995,245 UART: [art] Extend RT PCRs Done
2,995,673 UART: [art] Lock RT PCRs Done
2,997,125 UART: [art] Populate DV Done
3,005,436 UART: [fht] FMC Alias Private Key: 7
3,006,548 UART: [art] Derive CDI
3,006,828 UART: [art] Store in in slot 0x4
3,092,731 UART: [art] Derive Key Pair
3,093,091 UART: [art] Store priv key in slot 0x5
3,106,825 UART: [art] Derive Key Pair - Done
3,121,564 UART: [art] Signing Cert with AUTHO
3,122,044 UART: RITY.KEYID = 7
3,136,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,585 UART: [art] PUB.X = DA661ED3CA1D15277E01EF9265E209B18E77B55DF60DB527E373E615FCD6CC8C63804F66368DB5FFB7C3A7E972EA94C4
3,144,360 UART: [art] PUB.Y = B5C0222B40D15CF4592AF23D1B2A640072C340CF292AAC83BA261280EA40790DC0851D0DEFB59B1C9283D05E7EC97DA9
3,151,292 UART: [art] SIG.R = 8D8CFF84E371B8E4B1C6B8BBE7FB89F983ECF7EFAF4BB500261520716604D39F3F380E88A023FDF12A53D92A80BABF0D
3,158,051 UART: [art] SIG.S = 99D1FED0B21DB6D8049EDD1F56FF3F4ADB0AEFC0C75FD2941116E80748FE07A618C69C30BB3631F22A967F0573F60BF2
3,182,052 UART: Caliptra RT
3,182,398 UART: [state] CFI Enabled
3,289,375 UART: [rt] RT listening for mailbox commands...
3,290,038 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,712 UART: [rt]cmd =0x46504c54, len=4
3,320,686 >>> mbox cmd response data (8 bytes)
3,321,035 UART: [rt] FIPS self test
3,321,363 UART: [kat] ++
3,321,515 UART: [kat] sha1
3,325,958 UART: Fatal Error: 0x90060002
3,327,508 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,513 >>> mbox cmd response: failed
3,327,513 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,518 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,307 UART: [kat] HMAC-384Kdf
922,927 UART: [kat] LMS
1,171,255 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,109 UART: [idev] Erasing UDS.KEYID = 0
1,201,296 UART: [idev] Sha1 KeyId Algorithm
1,209,706 UART: [idev] --
1,210,756 UART: [ldev] ++
1,210,924 UART: [ldev] CDI.KEYID = 6
1,211,287 UART: [ldev] SUBJECT.KEYID = 5
1,211,713 UART: [ldev] AUTHORITY.KEYID = 7
1,212,176 UART: [ldev] FE.KEYID = 1
1,217,340 UART: [ldev] Erasing FE.KEYID = 1
1,243,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,616 UART: [ldev] --
1,283,131 UART: [fwproc] Wait for Commands...
1,283,817 UART: [fwproc] Recv command 0x46574c44
1,284,545 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,928 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,001 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,696 ready_for_fw is high
1,060,696 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,672 >>> mbox cmd response: success
2,701,698 UART:
2,701,714 UART: Running Caliptra FMC ...
2,702,122 UART:
2,702,265 UART: [state] CFI Enabled
2,712,786 UART: [fht] FMC Alias Private Key: 7
2,820,051 UART: [art] Extend RT PCRs Done
2,820,479 UART: [art] Lock RT PCRs Done
2,822,125 UART: [art] Populate DV Done
2,830,252 UART: [fht] FMC Alias Private Key: 7
2,831,230 UART: [art] Derive CDI
2,831,510 UART: [art] Store in in slot 0x4
2,917,129 UART: [art] Derive Key Pair
2,917,489 UART: [art] Store priv key in slot 0x5
2,930,679 UART: [art] Derive Key Pair - Done
2,945,303 UART: [art] Signing Cert with AUTHO
2,945,783 UART: RITY.KEYID = 7
2,960,915 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,680 UART: [art] PUB.X = 63EAC7BBEDA88D9036D8C8E3A4FB710D916152F2E6B18A2B2079C30A9BF407132542D8574DA919CC7AE534AAC083E3D6
2,968,453 UART: [art] PUB.Y = 0CFB7172498FAC477415F9B481820E169385A802290396416D086096DE11693C804FF0ADA718D238984E9F8FF162C49D
2,975,378 UART: [art] SIG.R = 9682CC8F02F1B5D7F6EFC1BEE963BBEAB13DD5EF6EE2F6CF8D9A492E5605CC2E8251244118E9A13AB68434BEB2AE72F9
2,982,166 UART: [art] SIG.S = A68B019A9904C781EFF0C2FB60BB9B3A36E97827D9CB1BC6B0B5021CF886A73FE6A481647803FF6FECC08D34684ABECA
3,006,369 UART: Caliptra RT
3,006,715 UART: [state] CFI Enabled
3,115,372 UART: [rt] RT listening for mailbox commands...
3,116,035 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,495 UART: [rt]cmd =0x46504c54, len=4
3,146,889 >>> mbox cmd response data (8 bytes)
3,147,236 UART: [rt] FIPS self test
3,147,564 UART: [kat] ++
3,147,716 UART: [kat] sha1
3,151,957 UART: Fatal Error: 0x90060002
3,153,507 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,153,512 >>> mbox cmd response: failed
3,153,512 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,153,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,176 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,640,390 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,334 UART: [state] LifecycleState = Unprovisioned
84,989 UART: [state] DebugLocked = No
85,605 UART: [state] WD Timer not started. Device not locked for debugging
86,812 UART: [kat] SHA2-256
890,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,491 UART: [kat] ++
894,643 UART: [kat] sha1
898,871 UART: [kat] SHA2-256
900,811 UART: [kat] SHA2-384
903,672 UART: [kat] SHA2-512-ACC
905,573 UART: [kat] ECC-384
915,126 UART: [kat] HMAC-384Kdf
919,892 UART: [kat] LMS
1,168,204 UART: [kat] --
1,169,111 UART: [cold-reset] ++
1,169,575 UART: [fht] FHT @ 0x50003400
1,172,161 UART: [idev] ++
1,172,329 UART: [idev] CDI.KEYID = 6
1,172,690 UART: [idev] SUBJECT.KEYID = 7
1,173,115 UART: [idev] UDS.KEYID = 0
1,173,461 ready_for_fw is high
1,173,461 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,180,937 UART: [idev] Erasing UDS.KEYID = 0
1,197,879 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,644 UART: [ldev] ++
1,207,812 UART: [ldev] CDI.KEYID = 6
1,208,176 UART: [ldev] SUBJECT.KEYID = 5
1,208,603 UART: [ldev] AUTHORITY.KEYID = 7
1,209,066 UART: [ldev] FE.KEYID = 1
1,214,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,112 UART: [ldev] --
1,280,450 UART: [fwproc] Wait for Commands...
1,281,063 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,328 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,456 >>> mbox cmd response: success
2,784,589 UART: [afmc] ++
2,784,757 UART: [afmc] CDI.KEYID = 6
2,785,120 UART: [afmc] SUBJECT.KEYID = 7
2,785,546 UART: [afmc] AUTHORITY.KEYID = 5
2,820,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,934 UART: [afmc] --
2,863,822 UART: [cold-reset] --
2,864,794 UART: [state] Locking Datavault
2,865,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,507 UART: [state] Locking ICCM
2,867,059 UART: [exit] Launching FMC @ 0x40000130
2,872,388 UART:
2,872,404 UART: Running Caliptra FMC ...
2,872,812 UART:
2,872,866 UART: [state] CFI Enabled
2,883,505 UART: [fht] FMC Alias Private Key: 7
2,991,570 UART: [art] Extend RT PCRs Done
2,991,998 UART: [art] Lock RT PCRs Done
2,993,574 UART: [art] Populate DV Done
3,002,009 UART: [fht] FMC Alias Private Key: 7
3,003,099 UART: [art] Derive CDI
3,003,379 UART: [art] Store in in slot 0x4
3,089,258 UART: [art] Derive Key Pair
3,089,618 UART: [art] Store priv key in slot 0x5
3,102,866 UART: [art] Derive Key Pair - Done
3,117,494 UART: [art] Signing Cert with AUTHO
3,117,974 UART: RITY.KEYID = 7
3,133,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,021 UART: [art] PUB.X = 3D5826B2BF72663F798553A88D5DDBF655A64D8188B8C73997CCDBEBA455FEECAF6DF4DC9911DBC6D7039DEEDB813665
3,140,808 UART: [art] PUB.Y = FB9228083A2739118AC68C678AF4DDBAFB7F8CC5324109B5BDA3F1067FCCB1E7E43213C8F5EA0BA7DF41A44F5A425199
3,147,762 UART: [art] SIG.R = 5B3A3C47D440D84AD129CC070D908F8494FC66DA411680DDB4D3E523A53AC94C35C3E182CB15EBD12F24835D8EBF72CC
3,154,540 UART: [art] SIG.S = 4794416728DFF6F249FA99C1BA6277F0F17C811329B6873706D7F1DE77E75248B1F1A4D41D6F20B6BEBDBF5CFEF9B173
3,177,946 UART: Caliptra RT
3,178,200 UART: [state] CFI Enabled
3,285,380 UART: [rt] RT listening for mailbox commands...
3,286,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,511 UART: [rt]cmd =0x46504c54, len=4
3,316,475 >>> mbox cmd response data (8 bytes)
3,316,776 UART: [rt] FIPS self test
3,317,104 UART: [kat] ++
3,317,256 UART: [kat] sha1
3,321,415 UART: Fatal Error: 0x90060002
3,322,965 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,322,970 >>> mbox cmd response: failed
3,322,970 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,322,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,457 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,174,273 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,199,057 UART: [idev] Sha1 KeyId Algorithm
1,208,175 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,215,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,364 UART: [ldev] --
1,280,674 UART: [fwproc] Wait for Commands...
1,281,399 UART: [fwproc] Recv command 0x46574c44
1,282,132 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,864 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,781,922 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,874 ready_for_fw is high
1,055,874 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,750 >>> mbox cmd response: success
2,695,242 UART:
2,695,258 UART: Running Caliptra FMC ...
2,695,666 UART:
2,695,720 UART: [state] CFI Enabled
2,706,339 UART: [fht] FMC Alias Private Key: 7
2,814,240 UART: [art] Extend RT PCRs Done
2,814,668 UART: [art] Lock RT PCRs Done
2,816,298 UART: [art] Populate DV Done
2,824,387 UART: [fht] FMC Alias Private Key: 7
2,825,365 UART: [art] Derive CDI
2,825,645 UART: [art] Store in in slot 0x4
2,911,700 UART: [art] Derive Key Pair
2,912,060 UART: [art] Store priv key in slot 0x5
2,924,904 UART: [art] Derive Key Pair - Done
2,939,501 UART: [art] Signing Cert with AUTHO
2,939,981 UART: RITY.KEYID = 7
2,955,177 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,942 UART: [art] PUB.X = 6F29851D8E523923B8659D6B374981A613F668365101412C42B46A7FD5F2C7CA6A35D8F6EB40F77C52A4492D86DCEAF2
2,962,709 UART: [art] PUB.Y = D6C5E266692BEDA7D7330D4EA257ADD61884D3ED557B408FB9F91D0BA2FF19C4A996DE552F89CE8A25E8CBA722A26D61
2,969,671 UART: [art] SIG.R = 66855A4B19E1BEF1DA1AE3CC0DECDDD308939DDEB41A5DB37D2219E31A047D6218B130E65496AA714A18A1989B8E9F4C
2,976,448 UART: [art] SIG.S = 02767666C97DA72819E60F4B1D7A484260A162355ACF7BE7F1E989800AD18B9ECF493B836A4853DAEE5A82072E441A96
3,000,205 UART: Caliptra RT
3,000,459 UART: [state] CFI Enabled
3,108,509 UART: [rt] RT listening for mailbox commands...
3,109,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,764 UART: [rt]cmd =0x46504c54, len=4
3,139,840 >>> mbox cmd response data (8 bytes)
3,140,059 UART: [rt] FIPS self test
3,140,387 UART: [kat] ++
3,140,539 UART: [kat] sha1
3,144,570 UART: Fatal Error: 0x90060002
3,146,120 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,146,125 >>> mbox cmd response: failed
3,146,125 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,146,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,348 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,756 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,260 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,062 UART: [kat] ++
896,214 UART: [kat] sha1
900,432 UART: [kat] SHA2-256
902,372 UART: [kat] SHA2-384
905,127 UART: [kat] SHA2-512-ACC
907,028 UART: [kat] ECC-384
916,639 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,786 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,174,558 ready_for_fw is high
1,174,558 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,716 UART: [idev] Erasing UDS.KEYID = 0
1,198,706 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,563 UART: [ldev] ++
1,208,731 UART: [ldev] CDI.KEYID = 6
1,209,095 UART: [ldev] SUBJECT.KEYID = 5
1,209,522 UART: [ldev] AUTHORITY.KEYID = 7
1,209,985 UART: [ldev] FE.KEYID = 1
1,215,341 UART: [ldev] Erasing FE.KEYID = 1
1,241,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,053 UART: [ldev] --
1,280,485 UART: [fwproc] Wait for Commands...
1,281,260 UART: [fwproc] Recv command 0x46574c44
1,281,993 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,795 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,905 >>> mbox cmd response: success
2,785,076 UART: [afmc] ++
2,785,244 UART: [afmc] CDI.KEYID = 6
2,785,607 UART: [afmc] SUBJECT.KEYID = 7
2,786,033 UART: [afmc] AUTHORITY.KEYID = 5
2,821,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,547 UART: [afmc] --
2,864,513 UART: [cold-reset] --
2,865,503 UART: [state] Locking Datavault
2,866,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,416 UART: [state] Locking ICCM
2,867,864 UART: [exit] Launching FMC @ 0x40000130
2,873,193 UART:
2,873,209 UART: Running Caliptra FMC ...
2,873,617 UART:
2,873,760 UART: [state] CFI Enabled
2,884,253 UART: [fht] FMC Alias Private Key: 7
2,991,896 UART: [art] Extend RT PCRs Done
2,992,324 UART: [art] Lock RT PCRs Done
2,994,284 UART: [art] Populate DV Done
3,002,605 UART: [fht] FMC Alias Private Key: 7
3,003,715 UART: [art] Derive CDI
3,003,995 UART: [art] Store in in slot 0x4
3,090,066 UART: [art] Derive Key Pair
3,090,426 UART: [art] Store priv key in slot 0x5
3,103,818 UART: [art] Derive Key Pair - Done
3,118,468 UART: [art] Signing Cert with AUTHO
3,118,948 UART: RITY.KEYID = 7
3,134,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,021 UART: [art] PUB.X = 0BD6AC0D13F11B4102703F64BD69D7659A28B9D787F6A828F98DD8D4A381B3701C13181E2778CCF245C739F351DD126B
3,141,784 UART: [art] PUB.Y = D66D7B6E6CE9EBC419A828A144347910AE5E531B18BEB8A558187B10B5391B3EFD5ABC0221940504DC4CA5F0787721DB
3,148,733 UART: [art] SIG.R = 34162D7029ADAADFF5A96893239EAE07E01F3990FB2024968F5083B4FCF6D525D0A8A7DD5FC569B6EF72AF3973616E80
3,155,508 UART: [art] SIG.S = 8DCCDA35484C99130D58820FC00B4BBFAEB9E7598C24C012B4D39BF5331E71F0D4E50865339C16108F06390B1B037DEC
3,178,970 UART: Caliptra RT
3,179,316 UART: [state] CFI Enabled
3,286,276 UART: [rt] RT listening for mailbox commands...
3,286,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,543 UART: [rt]cmd =0x46504c54, len=4
3,317,701 >>> mbox cmd response data (8 bytes)
3,317,900 UART: [rt] FIPS self test
3,318,228 UART: [kat] ++
3,318,380 UART: [kat] sha1
3,322,885 UART: Fatal Error: 0x90060002
3,324,435 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,324,440 >>> mbox cmd response: failed
3,324,440 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,324,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,686 UART: [kat] ++
895,838 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,628 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,174,894 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,199,960 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,809 UART: [ldev] ++
1,209,977 UART: [ldev] CDI.KEYID = 6
1,210,341 UART: [ldev] SUBJECT.KEYID = 5
1,210,768 UART: [ldev] AUTHORITY.KEYID = 7
1,211,231 UART: [ldev] FE.KEYID = 1
1,216,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,445 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,131 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,403 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,139 ready_for_fw is high
1,057,139 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,457 >>> mbox cmd response: success
2,699,215 UART:
2,699,231 UART: Running Caliptra FMC ...
2,699,639 UART:
2,699,782 UART: [state] CFI Enabled
2,710,229 UART: [fht] FMC Alias Private Key: 7
2,818,534 UART: [art] Extend RT PCRs Done
2,818,962 UART: [art] Lock RT PCRs Done
2,820,676 UART: [art] Populate DV Done
2,828,883 UART: [fht] FMC Alias Private Key: 7
2,829,955 UART: [art] Derive CDI
2,830,235 UART: [art] Store in in slot 0x4
2,915,736 UART: [art] Derive Key Pair
2,916,096 UART: [art] Store priv key in slot 0x5
2,929,432 UART: [art] Derive Key Pair - Done
2,944,197 UART: [art] Signing Cert with AUTHO
2,944,677 UART: RITY.KEYID = 7
2,960,085 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,850 UART: [art] PUB.X = 15C13D6E37E10CF23B0FDB904B4EC43DC383CB5B35DB6C13E86D27E2EFCA18E5623F75CCD5E4CFB595662A728CA81533
2,967,632 UART: [art] PUB.Y = 03333CD056FCFBBD8F1E970852C3D0A6A0D9A39429FCCB9049CC7EA12A1FB7CDC1CB9848D5FF68526D7E315564F3A232
2,974,592 UART: [art] SIG.R = 756779D736AD926B8D00CFB0937CDEDE09514665BFCFFEEA993185B50F6070256426D32DF6742E6A14D7454726272A68
2,981,332 UART: [art] SIG.S = E635346D15545EF575167091E116D6FA752955D66FF2C6031356F7FA09B53F4F7773F301F4EA00D4A8D9A24F6A2012E0
3,004,314 UART: Caliptra RT
3,004,660 UART: [state] CFI Enabled
3,112,064 UART: [rt] RT listening for mailbox commands...
3,112,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,211 UART: [rt]cmd =0x46504c54, len=4
3,143,141 >>> mbox cmd response data (8 bytes)
3,143,320 UART: [rt] FIPS self test
3,143,648 UART: [kat] ++
3,143,800 UART: [kat] sha1
3,148,247 UART: Fatal Error: 0x90060002
3,149,797 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,149,802 >>> mbox cmd response: failed
3,149,802 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,149,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,955 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,615 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,512,514 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,657,088 >>> mbox cmd response: failed
2,657,673 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,800,951 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,867,335 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,448,052 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,506,823 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,650,977 >>> mbox cmd response: failed
2,651,559 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,794,639 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
4,880,737 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,453,574 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,856,539 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,000,674 >>> mbox cmd response: failed
3,001,276 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,144,977 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
21,580,758 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,018,418 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,868,858 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,013,225 >>> mbox cmd response: failed
3,013,809 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,157,085 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
21,582,791 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,031,171 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,518,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,663,077 >>> mbox cmd response: failed
2,663,656 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,807,331 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,432,414 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,271,713 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,520,838 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,665,365 >>> mbox cmd response: failed
2,665,923 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,809,544 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,427,504 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,202,266 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
2,514,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,659,167 >>> mbox cmd response: failed
2,659,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,803,636 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,449,330 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,243,413 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,880,628 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,024,981 >>> mbox cmd response: failed
3,025,540 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,169,160 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
20,175,914 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,899,519 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,875,640 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,020,136 >>> mbox cmd response: failed
3,020,705 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,164,338 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,174,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,903,243 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,078 >>> mbox cmd response: failed
86,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,265 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,886 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
85,576 >>> mbox cmd response: failed
85,576 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
85,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,323 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,326 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,629 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,637 >>> mbox cmd response: failed
86,637 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,134 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,811 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,001 >>> mbox cmd response: failed
86,001 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,404 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,411 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,122 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,130 >>> mbox cmd response: failed
86,130 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,121 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,040 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
85,160 >>> mbox cmd response: failed
85,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
85,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,549 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,724 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,163 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,171 >>> mbox cmd response: failed
86,171 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,470 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,125 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,267 >>> mbox cmd response: failed
86,267 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,180 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,301 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,310 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,318 >>> mbox cmd response: failed
86,318 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,324 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,649 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,318 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,004 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,012 >>> mbox cmd response: failed
86,012 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,403 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,036 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
85,945 >>> mbox cmd response: failed
85,945 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
85,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,396 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,155 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,379 >>> mbox cmd response: failed
86,379 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,764 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,037 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,233 UART:
192,600 UART: Running Caliptra ROM ...
193,789 UART:
193,940 UART: [state] CFI Enabled
263,786 UART: [state] LifecycleState = Unprovisioned
265,786 UART: [state] DebugLocked = No
267,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,353 UART: [kat] SHA2-256
442,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,583 UART: [kat] ++
453,030 UART: [kat] sha1
463,542 UART: [kat] SHA2-256
465,845 UART: [kat] SHA2-384
471,927 UART: [kat] SHA2-512-ACC
474,299 UART: [kat] ECC-384
2,769,998 UART: [kat] HMAC-384Kdf
2,802,463 UART: [kat] LMS
3,992,739 UART: [kat] --
3,998,511 UART: [cold-reset] ++
3,999,734 UART: [fht] Storing FHT @ 0x50003400
4,010,867 UART: [idev] ++
4,011,442 UART: [idev] CDI.KEYID = 6
4,012,349 UART: [idev] SUBJECT.KEYID = 7
4,013,601 UART: [idev] UDS.KEYID = 0
4,014,567 ready_for_fw is high
4,014,766 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,159,304 UART: [idev] Erasing UDS.KEYID = 0
7,345,773 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,793 UART: [idev] --
7,373,166 UART: [ldev] ++
7,373,792 UART: [ldev] CDI.KEYID = 6
7,374,715 UART: [ldev] SUBJECT.KEYID = 5
7,375,932 UART: [ldev] AUTHORITY.KEYID = 7
7,377,217 UART: [ldev] FE.KEYID = 1
7,422,958 UART: [ldev] Erasing FE.KEYID = 1
10,755,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,867 UART: [ldev] --
13,113,907 UART: [fwproc] Waiting for Commands...
13,117,303 UART: [fwproc] Received command 0x46574c44
13,119,486 UART: [fwproc] Received Image of size 114916 bytes
17,184,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,191 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,648,590 >>> mbox cmd response: success
17,653,547 UART: [afmc] ++
17,654,137 UART: [afmc] CDI.KEYID = 6
17,655,078 UART: [afmc] SUBJECT.KEYID = 7
17,656,296 UART: [afmc] AUTHORITY.KEYID = 5
21,027,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,687 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,962 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,428 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,227 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,650 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,205 UART: [afmc] --
23,401,011 UART: [cold-reset] --
23,406,922 UART: [state] Locking Datavault
23,412,122 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,876 UART: [state] Locking ICCM
23,415,783 UART: [exit] Launching FMC @ 0x40000130
23,424,131 UART:
23,424,410 UART: Running Caliptra FMC ...
23,425,447 UART:
23,425,595 UART: [state] CFI Enabled
23,487,532 UART: [fht] FMC Alias Private Key: 7
25,826,036 UART: [art] Extend RT PCRs Done
25,827,282 UART: [art] Lock RT PCRs Done
25,828,663 UART: [art] Populate DV Done
25,833,921 UART: [fht] FMC Alias Private Key: 7
25,835,515 UART: [art] Derive CDI
25,836,334 UART: [art] Store in in slot 0x4
25,895,430 UART: [art] Derive Key Pair
25,896,435 UART: [art] Store priv key in slot 0x5
29,188,882 UART: [art] Derive Key Pair - Done
29,202,096 UART: [art] Signing Cert with AUTHO
29,203,412 UART: RITY.KEYID = 7
31,490,633 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,139 UART: [art] PUB.X = FA808C9FD35867F21DC9888206994D835079C920262D1510BA62821BCDD013FBFA4D4D707C9A0799D87090BBE6C54340
31,499,354 UART: [art] PUB.Y = 286EF3A936D4D06F62C9E4A815E177981A8BBE5CCB59CD12DED3FE96BF9D8BCAC4DA846C5858A31615C19957FE45D25D
31,506,622 UART: [art] SIG.R = D72496FC40CA94378CD33C67B81382457724AB14CE5E29478A1E7F9C17B492B39D9BC5941A521EB2F4BC099DA766B250
31,513,983 UART: [art] SIG.S = 05F37697B037A540EBEE8E472772E941AD94A89C9B6925602CFA2CEA6526E41622F85E1ECA1E39D939E84F84934E34BA
32,819,653 UART: Caliptra RT
32,820,389 UART: [state] CFI Enabled
33,000,475 UART: [rt] RT listening for mailbox commands...
33,002,344 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,031,927 UART: [rt]cmd =0x46504c54, len=4
33,033,706 >>> mbox cmd response data (8 bytes)
33,034,905 UART: [rt] FIPS self test
33,035,853 UART: [kat] ++
33,036,307 UART: [kat] sha1
33,040,549 UART: [kat] SHA2-256
33,041,345 UART: Fatal Error: 0x90010001
33,076,478 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,220,851 >>> mbox cmd response: failed
33,221,561 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,365,854 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,121 UART:
190,416 UART: Running Caliptra ROM ...
191,523 UART:
191,679 UART: [state] CFI Enabled
256,260 UART: [state] LifecycleState = Unprovisioned
258,173 UART: [state] DebugLocked = No
260,148 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,310 UART: [kat] SHA2-256
435,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,504 UART: [kat] ++
446,022 UART: [kat] sha1
457,730 UART: [kat] SHA2-256
460,394 UART: [kat] SHA2-384
465,303 UART: [kat] SHA2-512-ACC
467,696 UART: [kat] ECC-384
2,759,276 UART: [kat] HMAC-384Kdf
2,791,388 UART: [kat] LMS
3,981,729 UART: [kat] --
3,988,214 UART: [cold-reset] ++
3,989,399 UART: [fht] Storing FHT @ 0x50003400
4,000,505 UART: [idev] ++
4,001,072 UART: [idev] CDI.KEYID = 6
4,001,962 UART: [idev] SUBJECT.KEYID = 7
4,003,240 UART: [idev] UDS.KEYID = 0
4,004,796 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,149,346 UART: [idev] Erasing UDS.KEYID = 0
7,337,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,368 UART: [idev] --
7,363,628 UART: [ldev] ++
7,364,197 UART: [ldev] CDI.KEYID = 6
7,365,164 UART: [ldev] SUBJECT.KEYID = 5
7,366,378 UART: [ldev] AUTHORITY.KEYID = 7
7,367,688 UART: [ldev] FE.KEYID = 1
7,413,068 UART: [ldev] Erasing FE.KEYID = 1
10,748,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,429 UART: [ldev] --
13,128,408 UART: [fwproc] Waiting for Commands...
13,131,437 UART: [fwproc] Received command 0x46574c44
13,133,625 UART: [fwproc] Received Image of size 114916 bytes
17,200,545 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,017 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,661,713 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,805,762 ready_for_fw is high
3,806,171 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,894,500 >>> mbox cmd response: success
23,584,540 UART:
23,584,930 UART: Running Caliptra FMC ...
23,586,055 UART:
23,586,215 UART: [state] CFI Enabled
23,655,090 UART: [fht] FMC Alias Private Key: 7
25,992,546 UART: [art] Extend RT PCRs Done
25,993,788 UART: [art] Lock RT PCRs Done
25,995,339 UART: [art] Populate DV Done
26,000,713 UART: [fht] FMC Alias Private Key: 7
26,002,253 UART: [art] Derive CDI
26,003,001 UART: [art] Store in in slot 0x4
26,063,624 UART: [art] Derive Key Pair
26,064,626 UART: [art] Store priv key in slot 0x5
29,356,968 UART: [art] Derive Key Pair - Done
29,369,890 UART: [art] Signing Cert with AUTHO
29,371,194 UART: RITY.KEYID = 7
31,657,613 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,123 UART: [art] PUB.X = FFFFFB58CC1524370BA1BB2D9D7A6E36552A1E90C9C603E06F8282CB22AB5D7B6929EFA9BF5ABBDF94AC176FFD98547A
31,666,393 UART: [art] PUB.Y = 359823B2EC8A9033844EAFEB73CA48BFBE6D5B21BA562E7A0D8458FEB15CD2FF28400F08BBD23DE78C355FCD4B5D689C
31,673,650 UART: [art] SIG.R = 3AE715A9764CE39EFB85C67783E11AFDC9FC112485847D1CFABE963D56445ED1C4A2E516EA2AE7398C45D661D1E89803
31,681,097 UART: [art] SIG.S = B197EBF27FB84641697663D52F4A27556FBB628734F8180D662EF5534A0ADA895E604750A10D2F8456E0251E13D75693
32,985,987 UART: Caliptra RT
32,986,705 UART: [state] CFI Enabled
33,149,055 UART: [rt] RT listening for mailbox commands...
33,150,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,180,499 UART: [rt]cmd =0x46504c54, len=4
33,182,294 >>> mbox cmd response data (8 bytes)
33,183,477 UART: [rt] FIPS self test
33,184,419 UART: [kat] ++
33,184,901 UART: [kat] sha1
33,189,258 UART: [kat] SHA2-256
33,190,162 UART: Fatal Error: 0x90010001
33,225,558 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,369,963 >>> mbox cmd response: failed
33,370,596 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,514,703 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,795,333 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,920,717 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,624 UART:
192,980 UART: Running Caliptra ROM ...
194,077 UART:
603,875 UART: [state] CFI Enabled
618,452 UART: [state] LifecycleState = Unprovisioned
620,400 UART: [state] DebugLocked = No
622,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,366 UART: [kat] SHA2-256
797,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,678 UART: [kat] ++
808,158 UART: [kat] sha1
818,701 UART: [kat] SHA2-256
821,429 UART: [kat] SHA2-384
826,424 UART: [kat] SHA2-512-ACC
828,797 UART: [kat] ECC-384
3,112,765 UART: [kat] HMAC-384Kdf
3,125,149 UART: [kat] LMS
4,315,259 UART: [kat] --
4,320,776 UART: [cold-reset] ++
4,321,722 UART: [fht] Storing FHT @ 0x50003400
4,332,998 UART: [idev] ++
4,333,570 UART: [idev] CDI.KEYID = 6
4,334,606 UART: [idev] SUBJECT.KEYID = 7
4,335,791 UART: [idev] UDS.KEYID = 0
4,336,779 ready_for_fw is high
4,336,990 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,481,349 UART: [idev] Erasing UDS.KEYID = 0
7,621,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,846 UART: [idev] --
7,646,621 UART: [ldev] ++
7,647,288 UART: [ldev] CDI.KEYID = 6
7,648,206 UART: [ldev] SUBJECT.KEYID = 5
7,649,373 UART: [ldev] AUTHORITY.KEYID = 7
7,650,662 UART: [ldev] FE.KEYID = 1
7,661,959 UART: [ldev] Erasing FE.KEYID = 1
10,951,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,507 UART: [ldev] --
13,311,286 UART: [fwproc] Waiting for Commands...
13,313,602 UART: [fwproc] Received command 0x46574c44
13,315,809 UART: [fwproc] Received Image of size 114916 bytes
17,383,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,955 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,848,819 >>> mbox cmd response: success
17,853,678 UART: [afmc] ++
17,854,330 UART: [afmc] CDI.KEYID = 6
17,855,240 UART: [afmc] SUBJECT.KEYID = 7
17,856,455 UART: [afmc] AUTHORITY.KEYID = 5
21,170,771 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,322 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,572 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,953 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,758 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,199 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,155 UART: [afmc] --
23,533,281 UART: [cold-reset] --
23,537,468 UART: [state] Locking Datavault
23,543,691 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,443 UART: [state] Locking ICCM
23,548,183 UART: [exit] Launching FMC @ 0x40000130
23,556,579 UART:
23,556,825 UART: Running Caliptra FMC ...
23,557,928 UART:
23,558,091 UART: [state] CFI Enabled
23,566,354 UART: [fht] FMC Alias Private Key: 7
25,897,657 UART: [art] Extend RT PCRs Done
25,898,922 UART: [art] Lock RT PCRs Done
25,900,635 UART: [art] Populate DV Done
25,906,431 UART: [fht] FMC Alias Private Key: 7
25,907,871 UART: [art] Derive CDI
25,908,795 UART: [art] Store in in slot 0x4
25,951,521 UART: [art] Derive Key Pair
25,952,525 UART: [art] Store priv key in slot 0x5
29,195,240 UART: [art] Derive Key Pair - Done
29,208,429 UART: [art] Signing Cert with AUTHO
29,209,735 UART: RITY.KEYID = 7
31,489,497 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,015 UART: [art] PUB.X = E2B0F3FDBA9CA80FF9F6B183E737588B9233DA47C86CE7BB2020FA52B7B3553E89BD0615BD148BC74A2DA28D7E0FEDF1
31,498,287 UART: [art] PUB.Y = 5280A0561C5CEF603EDEDEAC1913D479A843046736729DB932524B8D7AA36530D57D03A50A6D37E1BDF7678B21A4C57A
31,505,484 UART: [art] SIG.R = 534709851606B6B4D02D87F5DD85C5E57E3A65B263193C7E7F034CEA1879180CA4E622D667802C9F8C68E9FB47561856
31,512,886 UART: [art] SIG.S = 5E741ADE453A18C2A1A5DA5A52FCE7BBC7833DA1EC9E7D12964E8FCC9CBB4CDA67D870A14E5886DDAD6A74D29E4E77A3
32,818,014 UART: Caliptra RT
32,818,730 UART: [state] CFI Enabled
32,935,655 UART: [rt] RT listening for mailbox commands...
32,937,511 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,967,262 UART: [rt]cmd =0x46504c54, len=4
32,968,789 >>> mbox cmd response data (8 bytes)
32,969,999 UART: [rt] FIPS self test
32,970,952 UART: [kat] ++
32,971,404 UART: [kat] sha1
32,975,723 UART: [kat] SHA2-256
32,976,525 UART: Fatal Error: 0x90010001
33,011,802 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,156,067 >>> mbox cmd response: failed
33,156,741 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,300,993 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,098 UART:
190,403 UART: Running Caliptra ROM ...
191,430 UART:
7,233,893 UART: [state] CFI Enabled
7,248,157 UART: [state] LifecycleState = Unprovisioned
7,250,097 UART: [state] DebugLocked = No
7,253,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,258,455 UART: [kat] SHA2-256
7,428,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,438,737 UART: [kat] ++
7,439,223 UART: [kat] sha1
7,450,114 UART: [kat] SHA2-256
7,452,806 UART: [kat] SHA2-384
7,460,037 UART: [kat] SHA2-512-ACC
7,462,552 UART: [kat] ECC-384
9,746,149 UART: [kat] HMAC-384Kdf
9,758,595 UART: [kat] LMS
10,948,678 UART: [kat] --
10,950,949 UART: [cold-reset] ++
10,953,046 UART: [fht] Storing FHT @ 0x50003400
10,963,998 UART: [idev] ++
10,964,642 UART: [idev] CDI.KEYID = 6
10,965,552 UART: [idev] SUBJECT.KEYID = 7
10,966,768 UART: [idev] UDS.KEYID = 0
10,968,342 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,112,602 UART: [idev] Erasing UDS.KEYID = 0
14,255,379 UART: [idev] Using Sha1 for KeyId Algorithm
14,277,299 UART: [idev] --
14,282,134 UART: [ldev] ++
14,282,713 UART: [ldev] CDI.KEYID = 6
14,283,676 UART: [ldev] SUBJECT.KEYID = 5
14,284,887 UART: [ldev] AUTHORITY.KEYID = 7
14,286,118 UART: [ldev] FE.KEYID = 1
14,297,733 UART: [ldev] Erasing FE.KEYID = 1
17,589,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,881,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,895,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,910,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,924,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,944,768 UART: [ldev] --
19,950,068 UART: [fwproc] Waiting for Commands...
19,951,968 UART: [fwproc] Received command 0x46574c44
19,954,159 UART: [fwproc] Received Image of size 114916 bytes
24,008,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,081,363 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,150,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,471,051 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,123,323 ready_for_fw is high
4,123,736 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,087,752 >>> mbox cmd response: success
23,726,626 UART:
23,727,006 UART: Running Caliptra FMC ...
23,728,226 UART:
23,728,396 UART: [state] CFI Enabled
23,736,224 UART: [fht] FMC Alias Private Key: 7
26,066,679 UART: [art] Extend RT PCRs Done
26,067,908 UART: [art] Lock RT PCRs Done
26,069,542 UART: [art] Populate DV Done
26,075,082 UART: [fht] FMC Alias Private Key: 7
26,076,733 UART: [art] Derive CDI
26,077,553 UART: [art] Store in in slot 0x4
26,120,136 UART: [art] Derive Key Pair
26,121,182 UART: [art] Store priv key in slot 0x5
29,363,555 UART: [art] Derive Key Pair - Done
29,376,670 UART: [art] Signing Cert with AUTHO
29,377,977 UART: RITY.KEYID = 7
31,657,211 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,724 UART: [art] PUB.X = EC8F14C291C2A22173E421E3EE822D9CC4BBDE829E1C43E3B4BEEF2B592278B68CA53214FE8ECD50B6BA4FAF73A4A2A4
31,665,967 UART: [art] PUB.Y = 88DEF61CADF66EE2033AA84DCB9C8E56C3D962162D64A7734F9489CC44A7CB42CDF3CE350B12E8117C54329962EC0939
31,673,254 UART: [art] SIG.R = D726A269082E48A32AD634A251FA72CFB292E42BE0E184F9AE146FE96A1C701C0B35F73E265E66B0AF2E0203435E8016
31,680,653 UART: [art] SIG.S = B0241477A14CBE74D9FE6AF20200871A04BE1B5E574584D6F0B0A4CF16742CF0AD9904E602083AF0ED7D9B093DFC3AAB
32,985,332 UART: Caliptra RT
32,986,039 UART: [state] CFI Enabled
33,102,801 UART: [rt] RT listening for mailbox commands...
33,104,659 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,134,721 UART: [rt]cmd =0x46504c54, len=4
33,136,400 >>> mbox cmd response data (8 bytes)
33,137,616 UART: [rt] FIPS self test
33,138,553 UART: [kat] ++
33,139,026 UART: [kat] sha1
33,143,595 UART: [kat] SHA2-256
33,144,398 UART: Fatal Error: 0x90010001
33,179,847 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,324,240 >>> mbox cmd response: failed
33,324,884 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,469,531 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
10,596,642 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,550,499 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,395 UART:
192,764 UART: Running Caliptra ROM ...
193,981 UART:
194,133 UART: [state] CFI Enabled
263,622 UART: [state] LifecycleState = Unprovisioned
265,520 UART: [state] DebugLocked = No
268,268 UART: [state] WD Timer not started. Device not locked for debugging
272,306 UART: [kat] SHA2-256
451,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,031 UART: [kat] ++
463,579 UART: [kat] sha1
474,604 UART: [kat] SHA2-256
477,683 UART: [kat] SHA2-384
483,530 UART: [kat] SHA2-512-ACC
486,469 UART: [kat] ECC-384
2,964,021 UART: [kat] HMAC-384Kdf
2,986,508 UART: [kat] LMS
3,515,941 UART: [kat] --
3,519,179 UART: [cold-reset] ++
3,520,554 UART: [fht] FHT @ 0x50003400
3,532,197 UART: [idev] ++
3,532,800 UART: [idev] CDI.KEYID = 6
3,533,722 UART: [idev] SUBJECT.KEYID = 7
3,534,831 UART: [idev] UDS.KEYID = 0
3,535,759 ready_for_fw is high
3,535,983 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,680,750 UART: [idev] Erasing UDS.KEYID = 0
6,042,061 UART: [idev] Sha1 KeyId Algorithm
6,066,464 UART: [idev] --
6,068,841 UART: [ldev] ++
6,069,419 UART: [ldev] CDI.KEYID = 6
6,070,307 UART: [ldev] SUBJECT.KEYID = 5
6,071,443 UART: [ldev] AUTHORITY.KEYID = 7
6,072,702 UART: [ldev] FE.KEYID = 1
6,116,306 UART: [ldev] Erasing FE.KEYID = 1
8,620,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,390,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,406,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,986 UART: [ldev] --
10,432,450 UART: [fwproc] Wait for Commands...
10,435,307 UART: [fwproc] Recv command 0x46574c44
10,437,350 UART: [fwproc] Recv'd Img size: 115224 bytes
13,856,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,999,597 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,321,257 >>> mbox cmd response: success
14,326,410 UART: [afmc] ++
14,327,013 UART: [afmc] CDI.KEYID = 6
14,327,904 UART: [afmc] SUBJECT.KEYID = 7
14,329,065 UART: [afmc] AUTHORITY.KEYID = 5
16,869,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,612,495 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,628,497 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,644,393 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,667,057 UART: [afmc] --
18,671,581 UART: [cold-reset] --
18,676,523 UART: [state] Locking Datavault
18,683,172 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,875 UART: [state] Locking ICCM
18,685,997 UART: [exit] Launching FMC @ 0x40000130
18,694,451 UART:
18,694,685 UART: Running Caliptra FMC ...
18,695,785 UART:
18,695,939 UART: [state] CFI Enabled
18,751,114 UART: [fht] FMC Alias Private Key: 7
20,514,695 UART: [art] Extend RT PCRs Done
20,515,917 UART: [art] Lock RT PCRs Done
20,517,895 UART: [art] Populate DV Done
20,523,250 UART: [fht] FMC Alias Private Key: 7
20,524,862 UART: [art] Derive CDI
20,525,676 UART: [art] Store in in slot 0x4
20,583,202 UART: [art] Derive Key Pair
20,584,243 UART: [art] Store priv key in slot 0x5
23,047,062 UART: [art] Derive Key Pair - Done
23,059,411 UART: [art] Signing Cert with AUTHO
23,060,747 UART: RITY.KEYID = 7
24,773,505 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,008 UART: [art] PUB.X = 71A38048D9420C4E9BDAE0C83BB53137549C3E58B3FF83DFE2E449BF14E97DBD83C89B16EC0A1F33959BD1F078FA50D5
24,782,328 UART: [art] PUB.Y = EDE7768E60C7C53586FB64A454A3AD0D6ECEB34E909BFE1E35FE790F6E30D18971D5D297BF6A8DCDA460AECE7B1EECF5
24,789,619 UART: [art] SIG.R = 9A9B241E9CA90FEBC70FDC2CF1DD67E2CDB6A8EAA82D3F97BFED5D9B04E1699309E59CD0CCA6B64A6D9630E78411441C
24,797,017 UART: [art] SIG.S = D4B44AAE6527A962C758C8E85897F53E849DB8B80D5CF7734630F01EDD8DC6C46BAEDC10EEE7A0DB9C891E9983B25261
25,776,097 UART: Caliptra RT
25,776,802 UART: [state] CFI Enabled
25,940,048 UART: [rt] RT listening for mailbox commands...
25,941,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,971,725 UART: [rt]cmd =0x46504c54, len=4
25,973,306 >>> mbox cmd response data (8 bytes)
25,974,362 UART: [rt] FIPS self test
25,975,304 UART: [kat] ++
25,975,751 UART: [kat] sha1
25,980,261 UART: [kat] SHA2-256
25,981,107 UART: Fatal Error: 0x90010001
26,016,414 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,161,063 >>> mbox cmd response: failed
26,161,721 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,306,398 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,112 UART:
190,423 UART: Running Caliptra ROM ...
191,457 UART:
191,617 UART: [state] CFI Enabled
255,189 UART: [state] LifecycleState = Unprovisioned
257,019 UART: [state] DebugLocked = No
258,832 UART: [state] WD Timer not started. Device not locked for debugging
261,699 UART: [kat] SHA2-256
440,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,436 UART: [kat] ++
452,965 UART: [kat] sha1
464,173 UART: [kat] SHA2-256
467,231 UART: [kat] SHA2-384
472,563 UART: [kat] SHA2-512-ACC
475,549 UART: [kat] ECC-384
2,940,014 UART: [kat] HMAC-384Kdf
2,961,647 UART: [kat] LMS
3,491,081 UART: [kat] --
3,494,165 UART: [cold-reset] ++
3,495,248 UART: [fht] FHT @ 0x50003400
3,504,798 UART: [idev] ++
3,505,357 UART: [idev] CDI.KEYID = 6
3,506,239 UART: [idev] SUBJECT.KEYID = 7
3,507,396 UART: [idev] UDS.KEYID = 0
3,509,001 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,653,847 UART: [idev] Erasing UDS.KEYID = 0
6,016,876 UART: [idev] Sha1 KeyId Algorithm
6,038,974 UART: [idev] --
6,043,812 UART: [ldev] ++
6,044,394 UART: [ldev] CDI.KEYID = 6
6,045,281 UART: [ldev] SUBJECT.KEYID = 5
6,046,497 UART: [ldev] AUTHORITY.KEYID = 7
6,047,733 UART: [ldev] FE.KEYID = 1
6,090,521 UART: [ldev] Erasing FE.KEYID = 1
8,592,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,079 UART: [ldev] --
10,404,237 UART: [fwproc] Wait for Commands...
10,406,875 UART: [fwproc] Recv command 0x46574c44
10,408,976 UART: [fwproc] Recv'd Img size: 115224 bytes
13,815,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,577 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,281,266 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,131 writing to cptra_bootfsm_go
194,426 UART:
194,815 UART: Running Caliptra ROM ...
195,970 UART:
196,119 UART: [state] CFI Enabled
262,704 UART: [state] LifecycleState = Unprovisioned
265,059 UART: [state] DebugLocked = No
266,817 UART: [state] WD Timer not started. Device not locked for debugging
271,017 UART: [kat] SHA2-256
460,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,619 UART: [kat] ++
472,099 UART: [kat] sha1
483,695 UART: [kat] SHA2-256
486,664 UART: [kat] SHA2-384
491,578 UART: [kat] SHA2-512-ACC
494,172 UART: [kat] ECC-384
2,949,849 UART: [kat] HMAC-384Kdf
2,972,333 UART: [kat] LMS
3,504,091 UART: [kat] --
3,508,112 UART: [cold-reset] ++
3,509,983 UART: [fht] FHT @ 0x50003400
3,521,678 UART: [idev] ++
3,522,390 UART: [idev] CDI.KEYID = 6
3,523,426 UART: [idev] SUBJECT.KEYID = 7
3,524,529 UART: [idev] UDS.KEYID = 0
3,525,466 ready_for_fw is high
3,525,689 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,670,690 UART: [idev] Erasing UDS.KEYID = 0
6,028,187 UART: [idev] Sha1 KeyId Algorithm
6,051,446 UART: [idev] --
6,056,204 UART: [ldev] ++
6,056,992 UART: [ldev] CDI.KEYID = 6
6,057,911 UART: [ldev] SUBJECT.KEYID = 5
6,059,024 UART: [ldev] AUTHORITY.KEYID = 7
6,060,167 UART: [ldev] FE.KEYID = 1
6,101,061 UART: [ldev] Erasing FE.KEYID = 1
8,603,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,974 UART: [ldev] --
10,412,670 UART: [fwproc] Wait for Commands...
10,414,275 UART: [fwproc] Recv command 0x46574c44
10,416,540 UART: [fwproc] Recv'd Img size: 115224 bytes
13,870,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,871 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,612,254 >>> mbox cmd response: success
14,616,806 UART: [afmc] ++
14,617,530 UART: [afmc] CDI.KEYID = 6
14,618,640 UART: [afmc] SUBJECT.KEYID = 7
14,620,185 UART: [afmc] AUTHORITY.KEYID = 5
17,155,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,899,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,916,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,931,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,946,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,564 UART: [afmc] --
18,973,051 UART: [cold-reset] --
18,977,369 UART: [state] Locking Datavault
18,981,915 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,100 UART: [state] Locking ICCM
18,985,815 UART: [exit] Launching FMC @ 0x40000130
18,994,483 UART:
18,994,718 UART: Running Caliptra FMC ...
18,995,823 UART:
18,995,980 UART: [state] CFI Enabled
19,055,855 UART: [fht] FMC Alias Private Key: 7
20,820,008 UART: [art] Extend RT PCRs Done
20,821,231 UART: [art] Lock RT PCRs Done
20,822,856 UART: [art] Populate DV Done
20,828,056 UART: [fht] FMC Alias Private Key: 7
20,829,657 UART: [art] Derive CDI
20,830,472 UART: [art] Store in in slot 0x4
20,888,599 UART: [art] Derive Key Pair
20,889,657 UART: [art] Store priv key in slot 0x5
23,353,041 UART: [art] Derive Key Pair - Done
23,366,157 UART: [art] Signing Cert with AUTHO
23,367,468 UART: RITY.KEYID = 7
25,078,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,080,180 UART: [art] PUB.X = ADF5052D47614D023353C6AC95C57E872CBA2B87273D44988871E3BF5FE20748D20B4F566754931AD8E84ECC030D5AF3
25,087,450 UART: [art] PUB.Y = F2570CE7178718B35C69E494D31E6EC086D06E41451AD61D03A3EBFCF0066E6D453EDD95FEFEBBF535FF2D385EC28D43
25,094,745 UART: [art] SIG.R = 51739FCB4FA27BFD8D9FBFCFF6DA467D8224483D878A745A67A8C64D6899CABF01BB0E251C8E9CB7251BAFB135A3E194
25,102,181 UART: [art] SIG.S = 1F90F2F0844256B3190DE8E2BF910DE3E6D91D2E3675DFD486DDE6F62F653B9F83A6B69C1E4DEBE1C2E749307486B60C
26,081,122 UART: Caliptra RT
26,081,839 UART: [state] CFI Enabled
26,247,956 UART: [rt] RT listening for mailbox commands...
26,249,807 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,279,488 UART: [rt]cmd =0x46504c54, len=4
26,281,070 >>> mbox cmd response data (8 bytes)
26,282,036 UART: [rt] FIPS self test
26,282,998 UART: [kat] ++
26,283,453 UART: [kat] sha1
26,288,074 UART: [kat] SHA2-256
26,288,872 UART: Fatal Error: 0x90010001
26,324,251 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,468,993 >>> mbox cmd response: failed
26,469,612 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,614,157 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,094 UART:
190,400 UART: Running Caliptra ROM ...
191,433 UART:
191,578 UART: [state] CFI Enabled
259,952 UART: [state] LifecycleState = Unprovisioned
262,370 UART: [state] DebugLocked = No
264,363 UART: [state] WD Timer not started. Device not locked for debugging
268,815 UART: [kat] SHA2-256
458,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,467 UART: [kat] ++
469,941 UART: [kat] sha1
480,926 UART: [kat] SHA2-256
483,962 UART: [kat] SHA2-384
489,793 UART: [kat] SHA2-512-ACC
492,354 UART: [kat] ECC-384
2,941,823 UART: [kat] HMAC-384Kdf
2,965,068 UART: [kat] LMS
3,496,830 UART: [kat] --
3,502,996 UART: [cold-reset] ++
3,504,017 UART: [fht] FHT @ 0x50003400
3,514,629 UART: [idev] ++
3,515,307 UART: [idev] CDI.KEYID = 6
3,516,292 UART: [idev] SUBJECT.KEYID = 7
3,517,512 UART: [idev] UDS.KEYID = 0
3,519,027 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,664,240 UART: [idev] Erasing UDS.KEYID = 0
6,021,181 UART: [idev] Sha1 KeyId Algorithm
6,042,952 UART: [idev] --
6,046,684 UART: [ldev] ++
6,047,372 UART: [ldev] CDI.KEYID = 6
6,048,289 UART: [ldev] SUBJECT.KEYID = 5
6,049,453 UART: [ldev] AUTHORITY.KEYID = 7
6,050,689 UART: [ldev] FE.KEYID = 1
6,093,102 UART: [ldev] Erasing FE.KEYID = 1
8,600,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,293 UART: [ldev] --
10,407,547 UART: [fwproc] Wait for Commands...
10,409,062 UART: [fwproc] Recv command 0x46574c44
10,411,333 UART: [fwproc] Recv'd Img size: 115224 bytes
13,875,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,233 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,615,255 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,419,957 ready_for_fw is high
3,420,402 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,733,802 >>> mbox cmd response: success
19,031,320 UART:
19,031,712 UART: Running Caliptra FMC ...
19,032,839 UART:
19,033,002 UART: [state] CFI Enabled
19,094,433 UART: [fht] FMC Alias Private Key: 7
20,859,085 UART: [art] Extend RT PCRs Done
20,860,300 UART: [art] Lock RT PCRs Done
20,861,953 UART: [art] Populate DV Done
20,867,426 UART: [fht] FMC Alias Private Key: 7
20,869,188 UART: [art] Derive CDI
20,870,008 UART: [art] Store in in slot 0x4
20,927,384 UART: [art] Derive Key Pair
20,928,418 UART: [art] Store priv key in slot 0x5
23,391,530 UART: [art] Derive Key Pair - Done
23,404,473 UART: [art] Signing Cert with AUTHO
23,405,788 UART: RITY.KEYID = 7
25,116,561 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,061 UART: [art] PUB.X = D7A7C14E0F2D24DA84E96DA135EBABD28D0246BAEF4E7923FCBAAB3AEC09259964D0CFBCF371FDFB4B6346A78333CF8F
25,125,379 UART: [art] PUB.Y = 561A86081B1FA13275CA2FF03EB5E9B10BE103891BB7ADFB5C94055A057AE2C045431B17DC4E9528BD2AC289A6BCB4AB
25,132,656 UART: [art] SIG.R = 0A75901982E2FAB045B25A41A2DF46419AF780F50972386079F5C0BC4F47E72830AC914F0F5AAC69DF4791D02829D69E
25,140,026 UART: [art] SIG.S = E16BCCCFEA17C1FF9D77345CDAC98A3A5A3BA82E16D06E995543E305EACCBBC0FA546408ADD844FEFF916EA5EE29CB98
26,118,987 UART: Caliptra RT
26,119,703 UART: [state] CFI Enabled
26,285,108 UART: [rt] RT listening for mailbox commands...
26,286,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,316,826 UART: [rt]cmd =0x46504c54, len=4
26,318,571 >>> mbox cmd response data (8 bytes)
26,319,522 UART: [rt] FIPS self test
26,320,461 UART: [kat] ++
26,320,913 UART: [kat] sha1
26,325,366 UART: [kat] SHA2-256
26,326,218 UART: Fatal Error: 0x90010001
26,361,660 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,506,416 >>> mbox cmd response: failed
26,507,053 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,651,604 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,430,042 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,742,394 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,403 UART:
192,767 UART: Running Caliptra ROM ...
193,867 UART:
603,611 UART: [state] CFI Enabled
620,318 UART: [state] LifecycleState = Unprovisioned
622,717 UART: [state] DebugLocked = No
625,035 UART: [state] WD Timer not started. Device not locked for debugging
629,937 UART: [kat] SHA2-256
819,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,653 UART: [kat] ++
831,187 UART: [kat] sha1
842,229 UART: [kat] SHA2-256
845,269 UART: [kat] SHA2-384
850,634 UART: [kat] SHA2-512-ACC
853,216 UART: [kat] ECC-384
3,299,267 UART: [kat] HMAC-384Kdf
3,314,057 UART: [kat] LMS
3,845,912 UART: [kat] --
3,851,548 UART: [cold-reset] ++
3,853,266 UART: [fht] FHT @ 0x50003400
3,864,812 UART: [idev] ++
3,865,549 UART: [idev] CDI.KEYID = 6
3,866,429 UART: [idev] SUBJECT.KEYID = 7
3,867,679 UART: [idev] UDS.KEYID = 0
3,868,585 ready_for_fw is high
3,868,787 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,013,503 UART: [idev] Erasing UDS.KEYID = 0
6,344,942 UART: [idev] Sha1 KeyId Algorithm
6,367,373 UART: [idev] --
6,372,214 UART: [ldev] ++
6,372,914 UART: [ldev] CDI.KEYID = 6
6,373,839 UART: [ldev] SUBJECT.KEYID = 5
6,375,005 UART: [ldev] AUTHORITY.KEYID = 7
6,376,242 UART: [ldev] FE.KEYID = 1
6,388,681 UART: [ldev] Erasing FE.KEYID = 1
8,866,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,729 UART: [ldev] --
10,656,462 UART: [fwproc] Wait for Commands...
10,658,719 UART: [fwproc] Recv command 0x46574c44
10,661,038 UART: [fwproc] Recv'd Img size: 115224 bytes
14,112,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,275 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,848,225 >>> mbox cmd response: success
14,852,283 UART: [afmc] ++
14,852,987 UART: [afmc] CDI.KEYID = 6
14,854,152 UART: [afmc] SUBJECT.KEYID = 7
14,855,686 UART: [afmc] AUTHORITY.KEYID = 5
17,358,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,027 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,043 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,983 UART: [afmc] --
19,155,008 UART: [cold-reset] --
19,158,449 UART: [state] Locking Datavault
19,162,719 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,890 UART: [state] Locking ICCM
19,167,859 UART: [exit] Launching FMC @ 0x40000130
19,176,530 UART:
19,176,776 UART: Running Caliptra FMC ...
19,177,881 UART:
19,178,040 UART: [state] CFI Enabled
19,186,089 UART: [fht] FMC Alias Private Key: 7
20,943,052 UART: [art] Extend RT PCRs Done
20,944,285 UART: [art] Lock RT PCRs Done
20,945,888 UART: [art] Populate DV Done
20,951,355 UART: [fht] FMC Alias Private Key: 7
20,953,054 UART: [art] Derive CDI
20,953,791 UART: [art] Store in in slot 0x4
20,996,331 UART: [art] Derive Key Pair
20,997,330 UART: [art] Store priv key in slot 0x5
23,423,821 UART: [art] Derive Key Pair - Done
23,436,974 UART: [art] Signing Cert with AUTHO
23,438,282 UART: RITY.KEYID = 7
25,144,066 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,578 UART: [art] PUB.X = 5A9406F0DDFC12D1A6C2121C22482688FEC72DAAF39FD19971CAE6D8403089F8757D94836C34AA083FB02F6F5D232CD1
25,152,839 UART: [art] PUB.Y = E1659B2BBB7831321AE0E32267AAB1B280B60A327D7D0C50DDC430318A504E63CBC69C015956EF90C07FD689A3FE7091
25,160,127 UART: [art] SIG.R = 0BCA08F89F1D60042FA02496EDAC495C0048441DDD5A3619D72D05EE2F78114462F1756B61D9B5289E821281AC2B2600
25,167,465 UART: [art] SIG.S = 8C1464BD75C69FC7BB5B67538BD8E5D582FDDDCB62F4ED1982D6C916BABEEB443BCC0148F7CE26D547F4F4DC215F1AF9
26,146,379 UART: Caliptra RT
26,147,098 UART: [state] CFI Enabled
26,265,465 UART: [rt] RT listening for mailbox commands...
26,267,314 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,296,886 UART: [rt]cmd =0x46504c54, len=4
26,298,441 >>> mbox cmd response data (8 bytes)
26,299,462 UART: [rt] FIPS self test
26,300,409 UART: [kat] ++
26,300,858 UART: [kat] sha1
26,305,312 UART: [kat] SHA2-256
26,306,163 UART: Fatal Error: 0x90010001
26,341,294 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,486,038 >>> mbox cmd response: failed
26,486,698 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,631,321 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,065 UART:
190,359 UART: Running Caliptra ROM ...
191,383 UART:
13,892,938 UART: [state] CFI Enabled
13,909,161 UART: [state] LifecycleState = Unprovisioned
13,911,557 UART: [state] DebugLocked = No
13,913,021 UART: [state] WD Timer not started. Device not locked for debugging
13,917,678 UART: [kat] SHA2-256
14,107,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,118,347 UART: [kat] ++
14,118,858 UART: [kat] sha1
14,129,792 UART: [kat] SHA2-256
14,132,801 UART: [kat] SHA2-384
14,139,284 UART: [kat] SHA2-512-ACC
14,141,848 UART: [kat] ECC-384
16,584,122 UART: [kat] HMAC-384Kdf
16,596,778 UART: [kat] LMS
17,128,626 UART: [kat] --
17,132,414 UART: [cold-reset] ++
17,134,784 UART: [fht] FHT @ 0x50003400
17,145,439 UART: [idev] ++
17,146,175 UART: [idev] CDI.KEYID = 6
17,147,078 UART: [idev] SUBJECT.KEYID = 7
17,148,289 UART: [idev] UDS.KEYID = 0
17,149,810 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,294,476 UART: [idev] Erasing UDS.KEYID = 0
19,629,617 UART: [idev] Sha1 KeyId Algorithm
19,651,331 UART: [idev] --
19,656,377 UART: [ldev] ++
19,657,063 UART: [ldev] CDI.KEYID = 6
19,657,975 UART: [ldev] SUBJECT.KEYID = 5
19,659,209 UART: [ldev] AUTHORITY.KEYID = 7
19,660,386 UART: [ldev] FE.KEYID = 1
19,673,247 UART: [ldev] Erasing FE.KEYID = 1
22,151,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,869,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,884,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,899,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,914,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,935,055 UART: [ldev] --
23,940,969 UART: [fwproc] Wait for Commands...
23,942,964 UART: [fwproc] Recv command 0x46574c44
23,945,269 UART: [fwproc] Recv'd Img size: 115224 bytes
27,398,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,476,537 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,592,697 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,140,180 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,760,223 ready_for_fw is high
3,760,677 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,986,002 >>> mbox cmd response: success
19,240,745 UART:
19,241,214 UART: Running Caliptra FMC ...
19,242,335 UART:
19,242,487 UART: [state] CFI Enabled
19,250,122 UART: [fht] FMC Alias Private Key: 7
21,006,984 UART: [art] Extend RT PCRs Done
21,008,208 UART: [art] Lock RT PCRs Done
21,009,868 UART: [art] Populate DV Done
21,015,445 UART: [fht] FMC Alias Private Key: 7
21,016,993 UART: [art] Derive CDI
21,017,729 UART: [art] Store in in slot 0x4
21,059,891 UART: [art] Derive Key Pair
21,060,935 UART: [art] Store priv key in slot 0x5
23,487,707 UART: [art] Derive Key Pair - Done
23,500,786 UART: [art] Signing Cert with AUTHO
23,502,100 UART: RITY.KEYID = 7
25,207,441 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,930 UART: [art] PUB.X = 011D362453560AC4C464A0BD4CACD1E79926D014ECC72C068C06FB509E29E8423A9B07580281C82E791D9A933395ECC7
25,216,183 UART: [art] PUB.Y = 28092A4322EA5EB456057B1BDBBD171F3F28E4387B78A21B15E9866EFE07E38D61E70C267BBEB46250A7E84D2BCA1B33
25,223,449 UART: [art] SIG.R = F864A056A70EA50AC31460799ED7397C70D0D26E6E69DB08B9A1FCB498E8C9B727526C4F8C56673AF1C400B652E4DC19
25,230,791 UART: [art] SIG.S = 316CDB1A131F0447D8AAECDB4E31F9989ECF1EA9CB17A487DA9DA78277672C0A278EC36D6A746EA6F336E8F9B989A74F
26,209,295 UART: Caliptra RT
26,210,010 UART: [state] CFI Enabled
26,327,959 UART: [rt] RT listening for mailbox commands...
26,329,828 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,359,626 UART: [rt]cmd =0x46504c54, len=4
26,361,310 >>> mbox cmd response data (8 bytes)
26,362,249 UART: [rt] FIPS self test
26,363,190 UART: [kat] ++
26,363,672 UART: [kat] sha1
26,367,931 UART: [kat] SHA2-256
26,368,681 UART: Fatal Error: 0x90010001
26,404,129 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,548,759 >>> mbox cmd response: failed
26,549,419 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,694,095 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
16,973,355 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,190,011 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,398 UART: [kat] SHA2-512-ACC
897,299 UART: [kat] ECC-384
902,636 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 ready_for_fw is high
1,481,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,505,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,164 UART: [idev] --
1,515,309 UART: [ldev] ++
1,515,477 UART: [ldev] CDI.KEYID = 6
1,515,840 UART: [ldev] SUBJECT.KEYID = 5
1,516,266 UART: [ldev] AUTHORITY.KEYID = 7
1,516,729 UART: [ldev] FE.KEYID = 1
1,522,083 UART: [ldev] Erasing FE.KEYID = 1
1,547,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,848 UART: [ldev] --
1,587,351 UART: [fwproc] Waiting for Commands...
1,588,182 UART: [fwproc] Received command 0x46574c44
1,588,973 UART: [fwproc] Received Image of size 115224 bytes
2,896,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,778 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,855 >>> mbox cmd response: success
3,092,035 UART: [afmc] ++
3,092,203 UART: [afmc] CDI.KEYID = 6
3,092,565 UART: [afmc] SUBJECT.KEYID = 7
3,092,990 UART: [afmc] AUTHORITY.KEYID = 5
3,127,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,196 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,886 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,837 UART: [afmc] --
3,170,865 UART: [cold-reset] --
3,171,923 UART: [state] Locking Datavault
3,173,366 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,970 UART: [state] Locking ICCM
3,174,436 UART: [exit] Launching FMC @ 0x40000130
3,179,765 UART:
3,179,781 UART: Running Caliptra FMC ...
3,180,189 UART:
3,180,243 UART: [state] CFI Enabled
3,190,844 UART: [fht] FMC Alias Private Key: 7
3,298,679 UART: [art] Extend RT PCRs Done
3,299,107 UART: [art] Lock RT PCRs Done
3,300,649 UART: [art] Populate DV Done
3,308,922 UART: [fht] FMC Alias Private Key: 7
3,310,088 UART: [art] Derive CDI
3,310,368 UART: [art] Store in in slot 0x4
3,395,799 UART: [art] Derive Key Pair
3,396,159 UART: [art] Store priv key in slot 0x5
3,409,353 UART: [art] Derive Key Pair - Done
3,423,915 UART: [art] Signing Cert with AUTHO
3,424,395 UART: RITY.KEYID = 7
3,439,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,440,540 UART: [art] PUB.X = A61CA3BFC624EDEF6DE875A79A7682AF86E7745CCEBFE2A20665FE64FED12B16695F0636B8955F53A23E1757CF2575CC
3,447,320 UART: [art] PUB.Y = C961FD97C37709D274E635D8000FDCD71E6DC6852587D3143150FCAD2B38E15A739DE16E5AF96CE298AE52DACB1A1176
3,454,252 UART: [art] SIG.R = 1F2E0EF672A47EE27E4D93D5C0D8470D445AA611342176EA2A41D55ABF20FA04F7669EE9994CFFCE29662735BBD1B5CB
3,461,027 UART: [art] SIG.S = A1CCC7C20EB42BD8048699B4C5E05E4E4781BE17CE0089D48E456B767139279CD68281AB523E5812D40809A6F462140E
3,484,671 UART: Caliptra RT
3,484,925 UART: [state] CFI Enabled
3,592,851 UART: [rt] RT listening for mailbox commands...
3,593,514 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,092 UART: [rt]cmd =0x46504c54, len=4
3,624,140 >>> mbox cmd response data (8 bytes)
3,624,489 UART: [rt] FIPS self test
3,624,817 UART: [kat] ++
3,624,969 UART: [kat] sha1
3,629,043 UART: [kat] SHA2-256
3,629,427 UART: Fatal Error: 0x90010001
3,630,977 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,630,982 >>> mbox cmd response: failed
3,630,982 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,630,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,519 UART: [kat] SHA2-256
892,457 UART: [kat] SHA2-384
895,324 UART: [kat] SHA2-512-ACC
897,225 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,343 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,576 UART: [idev] ++
1,479,744 UART: [idev] CDI.KEYID = 6
1,480,104 UART: [idev] SUBJECT.KEYID = 7
1,480,528 UART: [idev] UDS.KEYID = 0
1,480,873 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,256 UART: [idev] Erasing UDS.KEYID = 0
1,505,568 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,084 UART: [idev] --
1,515,117 UART: [ldev] ++
1,515,285 UART: [ldev] CDI.KEYID = 6
1,515,648 UART: [ldev] SUBJECT.KEYID = 5
1,516,074 UART: [ldev] AUTHORITY.KEYID = 7
1,516,537 UART: [ldev] FE.KEYID = 1
1,521,667 UART: [ldev] Erasing FE.KEYID = 1
1,546,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,490 UART: [ldev] --
1,585,899 UART: [fwproc] Waiting for Commands...
1,586,672 UART: [fwproc] Received command 0x46574c44
1,587,463 UART: [fwproc] Received Image of size 115224 bytes
2,895,614 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,982 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,491 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,487 ready_for_fw is high
1,362,487 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,789 >>> mbox cmd response: success
3,000,409 UART:
3,000,425 UART: Running Caliptra FMC ...
3,000,833 UART:
3,000,887 UART: [state] CFI Enabled
3,011,152 UART: [fht] FMC Alias Private Key: 7
3,119,265 UART: [art] Extend RT PCRs Done
3,119,693 UART: [art] Lock RT PCRs Done
3,121,363 UART: [art] Populate DV Done
3,129,622 UART: [fht] FMC Alias Private Key: 7
3,130,702 UART: [art] Derive CDI
3,130,982 UART: [art] Store in in slot 0x4
3,216,271 UART: [art] Derive Key Pair
3,216,631 UART: [art] Store priv key in slot 0x5
3,229,763 UART: [art] Derive Key Pair - Done
3,244,418 UART: [art] Signing Cert with AUTHO
3,244,898 UART: RITY.KEYID = 7
3,259,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,735 UART: [art] PUB.X = 22A123D64EF7E399E8D205C8F5118AD817AF88C8066D7C3F0EAD3D5BE590813014AEFC387A79320565E48FB78A6D9A59
3,267,499 UART: [art] PUB.Y = B6BC6B4D09F01847A73BDA331CC7D16ADFCF75ADFA5486F0DDADFBADA3CF7D358DE27B3CDD4239039DEF773B3E148EC9
3,274,477 UART: [art] SIG.R = 37F80D27F084A5F215FAF6C1AEDB46E7BCF5FE7A21B59448B510E1B16DBFA7873FF365D68E75E9C960816A2AA41331D2
3,281,258 UART: [art] SIG.S = 0E7752AEEDCEFCBD4F994E73762D5D90EEE9B7E025DB1198D2EA87CF4F7925D525FE9A46839B6BA9E512A7158088520E
3,305,037 UART: Caliptra RT
3,305,291 UART: [state] CFI Enabled
3,413,254 UART: [rt] RT listening for mailbox commands...
3,413,917 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,327 UART: [rt]cmd =0x46504c54, len=4
3,444,361 >>> mbox cmd response data (8 bytes)
3,444,480 UART: [rt] FIPS self test
3,444,808 UART: [kat] ++
3,444,960 UART: [kat] sha1
3,449,428 UART: [kat] SHA2-256
3,449,864 UART: Fatal Error: 0x90010001
3,451,414 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,451,419 >>> mbox cmd response: failed
3,451,419 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,451,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,719 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,339 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,359 UART: [kat] SHA2-512-ACC
897,260 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,843 UART: [kat] LMS
1,476,039 UART: [kat] --
1,476,932 UART: [cold-reset] ++
1,477,504 UART: [fht] Storing FHT @ 0x50003400
1,480,359 UART: [idev] ++
1,480,527 UART: [idev] CDI.KEYID = 6
1,480,887 UART: [idev] SUBJECT.KEYID = 7
1,481,311 UART: [idev] UDS.KEYID = 0
1,481,656 ready_for_fw is high
1,481,656 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,377 UART: [idev] Erasing UDS.KEYID = 0
1,505,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,629 UART: [idev] --
1,515,550 UART: [ldev] ++
1,515,718 UART: [ldev] CDI.KEYID = 6
1,516,081 UART: [ldev] SUBJECT.KEYID = 5
1,516,507 UART: [ldev] AUTHORITY.KEYID = 7
1,516,970 UART: [ldev] FE.KEYID = 1
1,522,260 UART: [ldev] Erasing FE.KEYID = 1
1,548,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,053 UART: [ldev] --
1,587,486 UART: [fwproc] Waiting for Commands...
1,588,163 UART: [fwproc] Received command 0x46574c44
1,588,954 UART: [fwproc] Received Image of size 115224 bytes
2,896,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,011 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,452 >>> mbox cmd response: success
3,091,506 UART: [afmc] ++
3,091,674 UART: [afmc] CDI.KEYID = 6
3,092,036 UART: [afmc] SUBJECT.KEYID = 7
3,092,461 UART: [afmc] AUTHORITY.KEYID = 5
3,127,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,355 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,045 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,916 UART: [afmc] --
3,170,984 UART: [cold-reset] --
3,171,912 UART: [state] Locking Datavault
3,173,129 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,733 UART: [state] Locking ICCM
3,174,211 UART: [exit] Launching FMC @ 0x40000130
3,179,540 UART:
3,179,556 UART: Running Caliptra FMC ...
3,179,964 UART:
3,180,107 UART: [state] CFI Enabled
3,191,066 UART: [fht] FMC Alias Private Key: 7
3,299,277 UART: [art] Extend RT PCRs Done
3,299,705 UART: [art] Lock RT PCRs Done
3,301,089 UART: [art] Populate DV Done
3,309,564 UART: [fht] FMC Alias Private Key: 7
3,310,722 UART: [art] Derive CDI
3,311,002 UART: [art] Store in in slot 0x4
3,396,517 UART: [art] Derive Key Pair
3,396,877 UART: [art] Store priv key in slot 0x5
3,410,373 UART: [art] Derive Key Pair - Done
3,424,949 UART: [art] Signing Cert with AUTHO
3,425,429 UART: RITY.KEYID = 7
3,440,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,550 UART: [art] PUB.X = 880395A18A6F8F5FB88017EF8648BB80711B2B901B98ADDC14E7A014BFB6E8628834AF156B4BFA1FFA3F505689A77041
3,448,323 UART: [art] PUB.Y = C6B6BE1C99E86654D99BDEE1A130634EAC5032F31B5C78D5C1881D97C559E13DA1002541CA166ABDF9DA6BAA1DF4A292
3,455,267 UART: [art] SIG.R = CACFA120EA32F5273E3ECED29CD4EEDFB12D18F61F0DBC42D0F5A8027E2727A28B1887C20190AC1B3648543FD8EB61BE
3,462,050 UART: [art] SIG.S = 656351E67C7096D804828A10B5C417BCC8355F1CF7EBB0CA49CDE67EDC9EDBD82B5088AAFDA8174C3152C68F8324D14A
3,485,300 UART: Caliptra RT
3,485,646 UART: [state] CFI Enabled
3,594,006 UART: [rt] RT listening for mailbox commands...
3,594,669 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,059 UART: [rt]cmd =0x46504c54, len=4
3,625,287 >>> mbox cmd response data (8 bytes)
3,625,466 UART: [rt] FIPS self test
3,625,794 UART: [kat] ++
3,625,946 UART: [kat] sha1
3,630,266 UART: [kat] SHA2-256
3,630,794 UART: Fatal Error: 0x90010001
3,632,344 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,632,349 >>> mbox cmd response: failed
3,632,349 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,632,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,705 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,250 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,533 UART: [idev] ++
1,479,701 UART: [idev] CDI.KEYID = 6
1,480,061 UART: [idev] SUBJECT.KEYID = 7
1,480,485 UART: [idev] UDS.KEYID = 0
1,480,830 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,765 UART: [idev] Erasing UDS.KEYID = 0
1,506,095 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,797 UART: [idev] --
1,515,832 UART: [ldev] ++
1,516,000 UART: [ldev] CDI.KEYID = 6
1,516,363 UART: [ldev] SUBJECT.KEYID = 5
1,516,789 UART: [ldev] AUTHORITY.KEYID = 7
1,517,252 UART: [ldev] FE.KEYID = 1
1,522,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,015 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,211 UART: [fwproc] Received command 0x46574c44
1,589,002 UART: [fwproc] Received Image of size 115224 bytes
2,897,329 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,473 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,092 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 ready_for_fw is high
1,362,550 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,488 >>> mbox cmd response: success
3,002,282 UART:
3,002,298 UART: Running Caliptra FMC ...
3,002,706 UART:
3,002,849 UART: [state] CFI Enabled
3,013,742 UART: [fht] FMC Alias Private Key: 7
3,122,001 UART: [art] Extend RT PCRs Done
3,122,429 UART: [art] Lock RT PCRs Done
3,123,855 UART: [art] Populate DV Done
3,131,976 UART: [fht] FMC Alias Private Key: 7
3,133,048 UART: [art] Derive CDI
3,133,328 UART: [art] Store in in slot 0x4
3,218,853 UART: [art] Derive Key Pair
3,219,213 UART: [art] Store priv key in slot 0x5
3,232,619 UART: [art] Derive Key Pair - Done
3,247,220 UART: [art] Signing Cert with AUTHO
3,247,700 UART: RITY.KEYID = 7
3,263,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,983 UART: [art] PUB.X = 31A1ED327C501A28F8F58891B5B09A906AFAEDCA154A998DF1CEED2F9F0DC436B6D9103135C2CEE2CBF1A2B1E1BB87F3
3,270,774 UART: [art] PUB.Y = F80F8B8FBF9D2528242E93528463EC7600FDBCEAF9257839107293DE2DB1B61583D3DAE5375DF9B63EE9DCAA6E0C3480
3,277,708 UART: [art] SIG.R = 95B5B1EE36661C51E5DF6EAE384BA1C2D9D48F8CE9AE8A3BBC7EA8D67B65B9D96076644EFA929D82D6425BD172CF5CAB
3,284,502 UART: [art] SIG.S = 7F775668FEFCBAE18F8EA4B252D4D55D76A27E648B956A522052899C4C1FA167EB0473217CE4B21AC0CC0CE6118AAAE6
3,308,061 UART: Caliptra RT
3,308,407 UART: [state] CFI Enabled
3,416,599 UART: [rt] RT listening for mailbox commands...
3,417,262 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,562 UART: [rt]cmd =0x46504c54, len=4
3,447,678 >>> mbox cmd response data (8 bytes)
3,448,007 UART: [rt] FIPS self test
3,448,335 UART: [kat] ++
3,448,487 UART: [kat] sha1
3,452,923 UART: [kat] SHA2-256
3,453,515 UART: Fatal Error: 0x90010001
3,455,065 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,455,070 >>> mbox cmd response: failed
3,455,070 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,455,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,540 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,942,244 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,739 UART: [kat] SHA2-256
903,679 UART: [kat] SHA2-384
906,264 UART: [kat] SHA2-512-ACC
908,165 UART: [kat] ECC-384
917,786 UART: [kat] HMAC-384Kdf
922,186 UART: [kat] LMS
1,170,514 UART: [kat] --
1,171,377 UART: [cold-reset] ++
1,171,893 UART: [fht] FHT @ 0x50003400
1,174,598 UART: [idev] ++
1,174,766 UART: [idev] CDI.KEYID = 6
1,175,126 UART: [idev] SUBJECT.KEYID = 7
1,175,550 UART: [idev] UDS.KEYID = 0
1,175,895 ready_for_fw is high
1,175,895 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,240 UART: [idev] Erasing UDS.KEYID = 0
1,200,267 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,204 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,701 UART: [ldev] --
1,281,002 UART: [fwproc] Wait for Commands...
1,281,634 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,417 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,458 >>> mbox cmd response: success
2,785,698 UART: [afmc] ++
2,785,866 UART: [afmc] CDI.KEYID = 6
2,786,228 UART: [afmc] SUBJECT.KEYID = 7
2,786,653 UART: [afmc] AUTHORITY.KEYID = 5
2,822,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,803 UART: [afmc] --
2,865,833 UART: [cold-reset] --
2,866,437 UART: [state] Locking Datavault
2,867,844 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,448 UART: [state] Locking ICCM
2,869,088 UART: [exit] Launching FMC @ 0x40000130
2,874,417 UART:
2,874,433 UART: Running Caliptra FMC ...
2,874,841 UART:
2,874,895 UART: [state] CFI Enabled
2,885,182 UART: [fht] FMC Alias Private Key: 7
2,992,849 UART: [art] Extend RT PCRs Done
2,993,277 UART: [art] Lock RT PCRs Done
2,995,039 UART: [art] Populate DV Done
3,003,438 UART: [fht] FMC Alias Private Key: 7
3,004,410 UART: [art] Derive CDI
3,004,690 UART: [art] Store in in slot 0x4
3,090,567 UART: [art] Derive Key Pair
3,090,927 UART: [art] Store priv key in slot 0x5
3,104,021 UART: [art] Derive Key Pair - Done
3,118,706 UART: [art] Signing Cert with AUTHO
3,119,186 UART: RITY.KEYID = 7
3,133,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,609 UART: [art] PUB.X = 661651000030974CE14DB4AAD92B8DE841FB3BE0D32DE500762346C37E720FAFDD39D82D83A1ABF9945D5ABB7BDB5BF2
3,141,326 UART: [art] PUB.Y = 1340D0CDD5E1346677F2CD558A6BF4D585294B71A824F16373E9A7B1257371B61865D722383F9087D062D986BC9E9296
3,148,266 UART: [art] SIG.R = CACD2FB8C3EF9A3707044E5FDD05B24FE6C259D7074D3C5CA4FDD6BF9C4A3E6CBAA10E98654BC33B9C04201ADF483822
3,155,042 UART: [art] SIG.S = B6CC3CCAA8647686E9603EE8E64A2694AC0FC35411F0FFD7AD695F9B3A6A664C0A4A421F15BD465B126BD5012EEF9372
3,179,228 UART: Caliptra RT
3,179,482 UART: [state] CFI Enabled
3,286,345 UART: [rt] RT listening for mailbox commands...
3,287,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,434 UART: [rt]cmd =0x46504c54, len=4
3,317,650 >>> mbox cmd response data (8 bytes)
3,318,003 UART: [rt] FIPS self test
3,318,331 UART: [kat] ++
3,318,483 UART: [kat] sha1
3,322,647 UART: [kat] SHA2-256
3,323,239 UART: Fatal Error: 0x90010001
3,324,789 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,324,794 >>> mbox cmd response: failed
3,324,794 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,324,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,632 UART: [kat] SHA2-512-ACC
908,533 UART: [kat] ECC-384
918,602 UART: [kat] HMAC-384Kdf
923,234 UART: [kat] LMS
1,171,562 UART: [kat] --
1,172,403 UART: [cold-reset] ++
1,172,903 UART: [fht] FHT @ 0x50003400
1,175,532 UART: [idev] ++
1,175,700 UART: [idev] CDI.KEYID = 6
1,176,060 UART: [idev] SUBJECT.KEYID = 7
1,176,484 UART: [idev] UDS.KEYID = 0
1,176,829 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,756 UART: [idev] Erasing UDS.KEYID = 0
1,202,103 UART: [idev] Sha1 KeyId Algorithm
1,210,437 UART: [idev] --
1,211,589 UART: [ldev] ++
1,211,757 UART: [ldev] CDI.KEYID = 6
1,212,120 UART: [ldev] SUBJECT.KEYID = 5
1,212,546 UART: [ldev] AUTHORITY.KEYID = 7
1,213,009 UART: [ldev] FE.KEYID = 1
1,217,877 UART: [ldev] Erasing FE.KEYID = 1
1,244,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,087 UART: [ldev] --
1,283,556 UART: [fwproc] Wait for Commands...
1,284,242 UART: [fwproc] Recv command 0x46574c44
1,284,970 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,777 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,902 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 ready_for_fw is high
1,060,019 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,223 >>> mbox cmd response: success
2,699,469 UART:
2,699,485 UART: Running Caliptra FMC ...
2,699,893 UART:
2,699,947 UART: [state] CFI Enabled
2,710,324 UART: [fht] FMC Alias Private Key: 7
2,818,439 UART: [art] Extend RT PCRs Done
2,818,867 UART: [art] Lock RT PCRs Done
2,820,567 UART: [art] Populate DV Done
2,828,812 UART: [fht] FMC Alias Private Key: 7
2,829,936 UART: [art] Derive CDI
2,830,216 UART: [art] Store in in slot 0x4
2,916,105 UART: [art] Derive Key Pair
2,916,465 UART: [art] Store priv key in slot 0x5
2,929,345 UART: [art] Derive Key Pair - Done
2,943,933 UART: [art] Signing Cert with AUTHO
2,944,413 UART: RITY.KEYID = 7
2,959,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,072 UART: [art] PUB.X = 35FFD4890C240A944673327708535896E333ABC0DECCEDC3A75E3B73C2006B8FB1FDCF208318F00238DAF81864B07368
2,966,810 UART: [art] PUB.Y = BB6CFD4CE87A5B075796C9D0D40E5EE36992F1D33735DE78D8063C77D6BB445B29BB7B53F0455A78EA82A913F4B5B540
2,973,761 UART: [art] SIG.R = C6507386F2A2D1D67B3E99F3CD8F3695796864144B8F1144768ACD339F3D82662179082CF791CA32C19BBE8A8A263D3F
2,980,526 UART: [art] SIG.S = C1D07C95EC37FFFE1B7A3FAD964BA4D5BE2785E8BC159D9864D5051EAF3ABB22066839DAA8467AC6AC5777F18F5E19E6
3,004,961 UART: Caliptra RT
3,005,215 UART: [state] CFI Enabled
3,112,396 UART: [rt] RT listening for mailbox commands...
3,113,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,431 UART: [rt]cmd =0x46504c54, len=4
3,143,419 >>> mbox cmd response data (8 bytes)
3,143,612 UART: [rt] FIPS self test
3,143,940 UART: [kat] ++
3,144,092 UART: [kat] sha1
3,148,346 UART: [kat] SHA2-256
3,148,960 UART: Fatal Error: 0x90010001
3,150,510 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,515 >>> mbox cmd response: failed
3,150,515 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,083 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,943 UART: [state] LifecycleState = Unprovisioned
86,598 UART: [state] DebugLocked = No
87,182 UART: [state] WD Timer not started. Device not locked for debugging
88,373 UART: [kat] SHA2-256
894,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,148 UART: [kat] ++
898,300 UART: [kat] sha1
902,774 UART: [kat] SHA2-256
904,714 UART: [kat] SHA2-384
907,491 UART: [kat] SHA2-512-ACC
909,392 UART: [kat] ECC-384
919,531 UART: [kat] HMAC-384Kdf
924,221 UART: [kat] LMS
1,172,549 UART: [kat] --
1,173,430 UART: [cold-reset] ++
1,173,940 UART: [fht] FHT @ 0x50003400
1,176,539 UART: [idev] ++
1,176,707 UART: [idev] CDI.KEYID = 6
1,177,067 UART: [idev] SUBJECT.KEYID = 7
1,177,491 UART: [idev] UDS.KEYID = 0
1,177,836 ready_for_fw is high
1,177,836 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,185,447 UART: [idev] Erasing UDS.KEYID = 0
1,202,422 UART: [idev] Sha1 KeyId Algorithm
1,210,842 UART: [idev] --
1,211,798 UART: [ldev] ++
1,211,966 UART: [ldev] CDI.KEYID = 6
1,212,329 UART: [ldev] SUBJECT.KEYID = 5
1,212,755 UART: [ldev] AUTHORITY.KEYID = 7
1,213,218 UART: [ldev] FE.KEYID = 1
1,218,602 UART: [ldev] Erasing FE.KEYID = 1
1,245,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,044 UART: [ldev] --
1,284,449 UART: [fwproc] Wait for Commands...
1,285,271 UART: [fwproc] Recv command 0x46574c44
1,285,999 UART: [fwproc] Recv'd Img size: 115224 bytes
2,594,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,296 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,788,485 >>> mbox cmd response: success
2,789,669 UART: [afmc] ++
2,789,837 UART: [afmc] CDI.KEYID = 6
2,790,199 UART: [afmc] SUBJECT.KEYID = 7
2,790,624 UART: [afmc] AUTHORITY.KEYID = 5
2,826,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,843,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,843,868 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,849,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,855,481 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,861,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,869,022 UART: [afmc] --
2,870,024 UART: [cold-reset] --
2,870,904 UART: [state] Locking Datavault
2,872,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,872,693 UART: [state] Locking ICCM
2,873,315 UART: [exit] Launching FMC @ 0x40000130
2,878,644 UART:
2,878,660 UART: Running Caliptra FMC ...
2,879,068 UART:
2,879,211 UART: [state] CFI Enabled
2,890,078 UART: [fht] FMC Alias Private Key: 7
2,997,917 UART: [art] Extend RT PCRs Done
2,998,345 UART: [art] Lock RT PCRs Done
2,999,821 UART: [art] Populate DV Done
3,008,290 UART: [fht] FMC Alias Private Key: 7
3,009,310 UART: [art] Derive CDI
3,009,590 UART: [art] Store in in slot 0x4
3,095,177 UART: [art] Derive Key Pair
3,095,537 UART: [art] Store priv key in slot 0x5
3,108,813 UART: [art] Derive Key Pair - Done
3,123,696 UART: [art] Signing Cert with AUTHO
3,124,176 UART: RITY.KEYID = 7
3,139,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,140,505 UART: [art] PUB.X = 5D1049B99CF8957B2AA284F5A5631F4F8E358B7F433AB714C8D60FA5671E5045BD8295C7A6B35CA73B8691FFBCEDD46B
3,147,284 UART: [art] PUB.Y = F64B6670F1CA47A9CEF46D675C6A50ECFACC5DCE9AF59251DD0B3E1A93295B6DB14B5AAC09540E90A1DBACFDCC7D2D20
3,154,257 UART: [art] SIG.R = 791308CFE8B9ED4AD04D2B307234655060A3954E9FD1DAEF6AEFDD191A036C86B356B03D633E0370B5CFAF9B56A5526B
3,161,030 UART: [art] SIG.S = D0C0780A6C687445E47A0EF42038FDE693EF40830BB048FD522BBE67A9EF280B6D5348AD2EACACB26F06B6A17F898AD4
3,185,222 UART: Caliptra RT
3,185,568 UART: [state] CFI Enabled
3,293,286 UART: [rt] RT listening for mailbox commands...
3,293,949 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,649 UART: [rt]cmd =0x46504c54, len=4
3,324,617 >>> mbox cmd response data (8 bytes)
3,324,856 UART: [rt] FIPS self test
3,325,184 UART: [kat] ++
3,325,336 UART: [kat] sha1
3,329,564 UART: [kat] SHA2-256
3,330,004 UART: Fatal Error: 0x90010001
3,331,554 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,331,559 >>> mbox cmd response: failed
3,331,559 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,331,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
901,928 UART: [kat] SHA2-256
903,868 UART: [kat] SHA2-384
906,455 UART: [kat] SHA2-512-ACC
908,356 UART: [kat] ECC-384
917,977 UART: [kat] HMAC-384Kdf
922,727 UART: [kat] LMS
1,171,055 UART: [kat] --
1,171,964 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,174,981 UART: [idev] ++
1,175,149 UART: [idev] CDI.KEYID = 6
1,175,509 UART: [idev] SUBJECT.KEYID = 7
1,175,933 UART: [idev] UDS.KEYID = 0
1,176,278 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,987 UART: [idev] Erasing UDS.KEYID = 0
1,201,226 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,850 UART: [ldev] ++
1,211,018 UART: [ldev] CDI.KEYID = 6
1,211,381 UART: [ldev] SUBJECT.KEYID = 5
1,211,807 UART: [ldev] AUTHORITY.KEYID = 7
1,212,270 UART: [ldev] FE.KEYID = 1
1,217,502 UART: [ldev] Erasing FE.KEYID = 1
1,244,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,712 UART: [ldev] --
1,283,059 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,824 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,943 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,422 ready_for_fw is high
1,061,422 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,236 >>> mbox cmd response: success
2,701,010 UART:
2,701,026 UART: Running Caliptra FMC ...
2,701,434 UART:
2,701,577 UART: [state] CFI Enabled
2,711,862 UART: [fht] FMC Alias Private Key: 7
2,819,935 UART: [art] Extend RT PCRs Done
2,820,363 UART: [art] Lock RT PCRs Done
2,821,855 UART: [art] Populate DV Done
2,829,986 UART: [fht] FMC Alias Private Key: 7
2,830,994 UART: [art] Derive CDI
2,831,274 UART: [art] Store in in slot 0x4
2,916,263 UART: [art] Derive Key Pair
2,916,623 UART: [art] Store priv key in slot 0x5
2,930,007 UART: [art] Derive Key Pair - Done
2,944,666 UART: [art] Signing Cert with AUTHO
2,945,146 UART: RITY.KEYID = 7
2,960,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,091 UART: [art] PUB.X = C563611A3395A19AD0D134AB12BD308AC3E2A0DCD212726934804A3CFA06F6755FC30158514066385F9EDF20CB99032B
2,967,852 UART: [art] PUB.Y = 8538FBF41CFE12DE38FF18DDCA5B96F5549011AFE42BAE3F38F7C76C28C3C8FFFBA70B44A471DD53E16979D3D1F57A52
2,974,821 UART: [art] SIG.R = 97D305F78CF73C82060A33B074B21B16CC438897D0CDCB8D2DF94009FF9F5BC3AC3A2488E438CB23A8E4C17EA1995139
2,981,587 UART: [art] SIG.S = 4C531A9EA4E42F321CC89B9F86DB6E25D51283B281838C137B3CC444273CD0FB3E782656D6FA5EA46571CF36966FC9C7
3,005,336 UART: Caliptra RT
3,005,682 UART: [state] CFI Enabled
3,113,432 UART: [rt] RT listening for mailbox commands...
3,114,095 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,389 UART: [rt]cmd =0x46504c54, len=4
3,144,341 >>> mbox cmd response data (8 bytes)
3,144,458 UART: [rt] FIPS self test
3,144,786 UART: [kat] ++
3,144,938 UART: [kat] sha1
3,149,128 UART: [kat] SHA2-256
3,149,558 UART: Fatal Error: 0x90010001
3,151,108 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,113 >>> mbox cmd response: failed
3,151,113 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,764 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: [kat] ++
895,099 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,354 UART: [kat] HMAC-384Kdf
920,012 UART: [kat] LMS
1,168,324 UART: [kat] --
1,168,921 UART: [cold-reset] ++
1,169,257 UART: [fht] FHT @ 0x50003400
1,172,077 UART: [idev] ++
1,172,245 UART: [idev] CDI.KEYID = 6
1,172,606 UART: [idev] SUBJECT.KEYID = 7
1,173,031 UART: [idev] UDS.KEYID = 0
1,173,377 ready_for_fw is high
1,173,377 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,658 UART: [ldev] ++
1,208,826 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,617 UART: [ldev] AUTHORITY.KEYID = 7
1,210,080 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,280,928 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x46574c44
1,282,310 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,082 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,326 >>> mbox cmd response: success
2,785,487 UART: [afmc] ++
2,785,655 UART: [afmc] CDI.KEYID = 6
2,786,018 UART: [afmc] SUBJECT.KEYID = 7
2,786,444 UART: [afmc] AUTHORITY.KEYID = 5
2,822,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,674 UART: [afmc] --
2,865,722 UART: [cold-reset] --
2,866,638 UART: [state] Locking Datavault
2,867,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,319 UART: [state] Locking ICCM
2,868,877 UART: [exit] Launching FMC @ 0x40000130
2,874,206 UART:
2,874,222 UART: Running Caliptra FMC ...
2,874,630 UART:
2,874,684 UART: [state] CFI Enabled
2,885,127 UART: [fht] FMC Alias Private Key: 7
2,993,574 UART: [art] Extend RT PCRs Done
2,994,002 UART: [art] Lock RT PCRs Done
2,995,908 UART: [art] Populate DV Done
3,004,115 UART: [fht] FMC Alias Private Key: 7
3,005,081 UART: [art] Derive CDI
3,005,361 UART: [art] Store in in slot 0x4
3,090,850 UART: [art] Derive Key Pair
3,091,210 UART: [art] Store priv key in slot 0x5
3,103,976 UART: [art] Derive Key Pair - Done
3,118,684 UART: [art] Signing Cert with AUTHO
3,119,164 UART: RITY.KEYID = 7
3,134,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,065 UART: [art] PUB.X = 8026E0D8AD93EB25B4DD7334511E3F95759EB468EE9455D065D71D7B0E15EFCBF14B2224CF9D31EEDFBFB54FEEA0ED4E
3,141,856 UART: [art] PUB.Y = 12E2C4CB425D8A18EF2B6546256E03F121622575EC7AF00AEC807978EB3D9F82724B33BA803A44348915203FCAA6D89F
3,148,802 UART: [art] SIG.R = 2DFD96E3C2BBAA106403B225C29DA9F4BAFD9EE5B6368AB91FB905D9A211D270724F2233EE160C5D5018C2177860C245
3,155,571 UART: [art] SIG.S = 8EA166FC621F1965830BFC3F571AC1066E3CB78E40FB43373BE67C387F4A95BF00D7E3A401CB228659702215285D0CFD
3,179,480 UART: Caliptra RT
3,179,734 UART: [state] CFI Enabled
3,287,424 UART: [rt] RT listening for mailbox commands...
3,288,087 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,599 UART: [rt]cmd =0x46504c54, len=4
3,318,623 >>> mbox cmd response data (8 bytes)
3,318,856 UART: [rt] FIPS self test
3,319,184 UART: [kat] ++
3,319,336 UART: [kat] sha1
3,323,554 UART: [kat] SHA2-256
3,324,178 UART: Fatal Error: 0x90010001
3,325,728 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,325,733 >>> mbox cmd response: failed
3,325,733 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,325,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,210 UART: [kat] SHA2-512-ACC
906,111 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,765 UART: [idev] ++
1,172,933 UART: [idev] CDI.KEYID = 6
1,173,294 UART: [idev] SUBJECT.KEYID = 7
1,173,719 UART: [idev] UDS.KEYID = 0
1,174,065 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,741 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,215,068 UART: [ldev] Erasing FE.KEYID = 1
1,240,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,300 UART: [fwproc] Wait for Commands...
1,280,875 UART: [fwproc] Recv command 0x46574c44
1,281,608 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,172 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,316 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,986 ready_for_fw is high
1,055,986 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,631,996 >>> mbox cmd response: success
2,694,472 UART:
2,694,488 UART: Running Caliptra FMC ...
2,694,896 UART:
2,694,950 UART: [state] CFI Enabled
2,705,473 UART: [fht] FMC Alias Private Key: 7
2,813,174 UART: [art] Extend RT PCRs Done
2,813,602 UART: [art] Lock RT PCRs Done
2,815,320 UART: [art] Populate DV Done
2,823,651 UART: [fht] FMC Alias Private Key: 7
2,824,747 UART: [art] Derive CDI
2,825,027 UART: [art] Store in in slot 0x4
2,910,906 UART: [art] Derive Key Pair
2,911,266 UART: [art] Store priv key in slot 0x5
2,924,540 UART: [art] Derive Key Pair - Done
2,939,451 UART: [art] Signing Cert with AUTHO
2,939,931 UART: RITY.KEYID = 7
2,954,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,480 UART: [art] PUB.X = 1F183D286456F7DC77D08223437F49177F59CD208A90B687193AE0AA001B382DE5223B3B91057B212821892301D75983
2,962,206 UART: [art] PUB.Y = 6C56581046F115A3264BE035761B38163BE5477FD8C674FA8807005651802F31EBD62869F44F340C46190A02A4908A0F
2,969,105 UART: [art] SIG.R = 8A19FA402F55DCD79619BCC7685A5F5F7D8E266D8A3CE0C82F1AFFF0082DD704AFF0CF668928BA46D04A29059BAF9FAD
2,975,888 UART: [art] SIG.S = A7CF260B427FFB6AB909BAE838DFAF8E8FFDF43B8EFD93FE30E02956AD21C86D8FACC599DA35A8EDEB6EB4265A3CEE66
2,999,399 UART: Caliptra RT
2,999,653 UART: [state] CFI Enabled
3,107,084 UART: [rt] RT listening for mailbox commands...
3,107,747 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,135 UART: [rt]cmd =0x46504c54, len=4
3,138,331 >>> mbox cmd response data (8 bytes)
3,138,622 UART: [rt] FIPS self test
3,138,950 UART: [kat] ++
3,139,102 UART: [kat] sha1
3,143,404 UART: [kat] SHA2-256
3,143,784 UART: Fatal Error: 0x90010001
3,145,334 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,145,339 >>> mbox cmd response: failed
3,145,339 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,145,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,532 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,631,418 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,515 UART: [kat] SHA2-256
892,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,194 UART: [kat] ++
896,346 UART: [kat] sha1
900,410 UART: [kat] SHA2-256
902,350 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,493 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,634 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 ready_for_fw is high
1,174,634 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,974 UART: [idev] Erasing UDS.KEYID = 0
1,198,920 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,671 UART: [ldev] ++
1,208,839 UART: [ldev] CDI.KEYID = 6
1,209,203 UART: [ldev] SUBJECT.KEYID = 5
1,209,630 UART: [ldev] AUTHORITY.KEYID = 7
1,210,093 UART: [ldev] FE.KEYID = 1
1,215,129 UART: [ldev] Erasing FE.KEYID = 1
1,241,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,933 UART: [ldev] --
1,280,355 UART: [fwproc] Wait for Commands...
1,281,092 UART: [fwproc] Recv command 0x46574c44
1,281,825 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,313 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,445 >>> mbox cmd response: success
2,783,610 UART: [afmc] ++
2,783,778 UART: [afmc] CDI.KEYID = 6
2,784,141 UART: [afmc] SUBJECT.KEYID = 7
2,784,567 UART: [afmc] AUTHORITY.KEYID = 5
2,820,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,779 UART: [afmc] --
2,863,851 UART: [cold-reset] --
2,864,767 UART: [state] Locking Datavault
2,865,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,324 UART: [state] Locking ICCM
2,866,818 UART: [exit] Launching FMC @ 0x40000130
2,872,147 UART:
2,872,163 UART: Running Caliptra FMC ...
2,872,571 UART:
2,872,714 UART: [state] CFI Enabled
2,883,073 UART: [fht] FMC Alias Private Key: 7
2,991,122 UART: [art] Extend RT PCRs Done
2,991,550 UART: [art] Lock RT PCRs Done
2,992,848 UART: [art] Populate DV Done
3,001,125 UART: [fht] FMC Alias Private Key: 7
3,002,201 UART: [art] Derive CDI
3,002,481 UART: [art] Store in in slot 0x4
3,087,724 UART: [art] Derive Key Pair
3,088,084 UART: [art] Store priv key in slot 0x5
3,101,444 UART: [art] Derive Key Pair - Done
3,116,029 UART: [art] Signing Cert with AUTHO
3,116,509 UART: RITY.KEYID = 7
3,131,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,930 UART: [art] PUB.X = 2832CA820A3C63C5025E88836B69A9F418AB7F6EFC1A85FF8589BF290E19817FBCBE47D1235CEC4C24087D116ABEC807
3,138,695 UART: [art] PUB.Y = FB93F4FD3A5AE61B5DAC8F9C0883AA37944B22BA1FF4DA776947C6A259EED42372D9B5665199685BAFCDD9D4CE7397C0
3,145,660 UART: [art] SIG.R = B0EFD30E335C968AE6398C9C0C9357B59CB82EB0CFF7D8C4FB714EFB18CD4DD29C6043B278990BC8EFDF662A2C83AF8C
3,152,445 UART: [art] SIG.S = C1AC97B86156B2B21AF9FD7F99EE5C06D922D4CE9A28B337D5B477131B158155E72F4E0E19E9CB3855DA61C5FAA9130E
3,175,927 UART: Caliptra RT
3,176,273 UART: [state] CFI Enabled
3,284,106 UART: [rt] RT listening for mailbox commands...
3,284,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,413 UART: [rt]cmd =0x46504c54, len=4
3,315,633 >>> mbox cmd response data (8 bytes)
3,315,952 UART: [rt] FIPS self test
3,316,280 UART: [kat] ++
3,316,432 UART: [kat] sha1
3,320,864 UART: [kat] SHA2-256
3,321,326 UART: Fatal Error: 0x90010001
3,322,876 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,322,881 >>> mbox cmd response: failed
3,322,881 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,322,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,491 UART: [kat] LMS
1,168,803 UART: [kat] --
1,169,552 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,546 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,550 UART: [idev] --
1,208,633 UART: [ldev] ++
1,208,801 UART: [ldev] CDI.KEYID = 6
1,209,165 UART: [ldev] SUBJECT.KEYID = 5
1,209,592 UART: [ldev] AUTHORITY.KEYID = 7
1,210,055 UART: [ldev] FE.KEYID = 1
1,215,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,929 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,958 UART: [fwproc] Recv command 0x46574c44
1,282,691 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,019 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,157 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,099 ready_for_fw is high
1,057,099 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,223 >>> mbox cmd response: success
2,697,913 UART:
2,697,929 UART: Running Caliptra FMC ...
2,698,337 UART:
2,698,480 UART: [state] CFI Enabled
2,709,323 UART: [fht] FMC Alias Private Key: 7
2,817,008 UART: [art] Extend RT PCRs Done
2,817,436 UART: [art] Lock RT PCRs Done
2,818,934 UART: [art] Populate DV Done
2,827,189 UART: [fht] FMC Alias Private Key: 7
2,828,153 UART: [art] Derive CDI
2,828,433 UART: [art] Store in in slot 0x4
2,914,202 UART: [art] Derive Key Pair
2,914,562 UART: [art] Store priv key in slot 0x5
2,928,174 UART: [art] Derive Key Pair - Done
2,942,997 UART: [art] Signing Cert with AUTHO
2,943,477 UART: RITY.KEYID = 7
2,958,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,486 UART: [art] PUB.X = A36656A51A83062D55C9149BE584097D4958A1FD53A9F56A03F5F46EC6E8C3EF8B44BDEA86BD422F4B0D15B221EC2058
2,966,252 UART: [art] PUB.Y = AC7B1A5353A3CFD50AFCAEEEFE5611C20EBF128E0AB9942FFE5B508CF7733B89CDA861DAA3715A3A0CECD86507A69C7A
2,973,217 UART: [art] SIG.R = 64A8CEF4B0A6CCC2B87434E98F10911BF5CB18CFFDC16A6B69EE839E19255B5C85E3316748EFAC2CC6252F00B67D45B6
2,979,981 UART: [art] SIG.S = E429AE3B8E2286FB6E24FF6345D023D1F2DF83D7A3F53F27A3D289F6EEFE2851DC756E7C1AB44A9AFCB10DF174CFE5DD
3,003,927 UART: Caliptra RT
3,004,273 UART: [state] CFI Enabled
3,111,991 UART: [rt] RT listening for mailbox commands...
3,112,654 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,230 UART: [rt]cmd =0x46504c54, len=4
3,143,258 >>> mbox cmd response data (8 bytes)
3,143,445 UART: [rt] FIPS self test
3,143,773 UART: [kat] ++
3,143,925 UART: [kat] sha1
3,148,195 UART: [kat] SHA2-256
3,148,695 UART: Fatal Error: 0x90010001
3,150,245 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,250 >>> mbox cmd response: failed
3,150,250 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,377 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,535 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,508,532 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,652,640 >>> mbox cmd response: failed
2,653,209 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,796,432 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
4,868,378 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,462,161 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,522,425 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,667,237 >>> mbox cmd response: failed
2,667,855 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,811,122 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
4,855,155 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,430,602 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,870,075 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,014,159 >>> mbox cmd response: failed
3,014,717 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,157,915 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
21,584,259 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,031,012 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
2,859,510 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,003,585 >>> mbox cmd response: failed
3,004,155 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,147,369 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
21,558,548 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,016,249 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,511,902 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,656,953 >>> mbox cmd response: failed
2,657,545 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,801,206 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,451,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,315,806 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,524,109 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,668,604 >>> mbox cmd response: failed
2,669,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,812,652 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,443,291 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,282,682 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,517,678 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,662,214 >>> mbox cmd response: failed
2,662,767 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,806,397 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,444,905 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,263,451 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
2,888,558 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,033,053 >>> mbox cmd response: failed
3,033,623 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,177,242 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,177,868 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,924,352 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
2,876,052 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,020,589 >>> mbox cmd response: failed
3,021,166 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,164,774 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,184,660 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,915,803 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,414 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,422 >>> mbox cmd response: failed
87,422 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,184 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,878 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,886 >>> mbox cmd response: failed
86,886 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
86,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,340 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,561 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,569 >>> mbox cmd response: failed
87,569 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,340 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,113 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,961 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,969 >>> mbox cmd response: failed
87,969 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,506 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,063 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,400 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,408 >>> mbox cmd response: failed
87,408 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,667 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,648 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,046 >>> mbox cmd response: failed
87,046 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,443 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,522 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,427 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,435 >>> mbox cmd response: failed
87,435 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,248 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,541 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,509 >>> mbox cmd response: failed
87,509 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,492 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,943 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,028 >>> mbox cmd response: failed
87,028 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,553 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,380 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,780 >>> mbox cmd response: failed
87,780 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,458 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,723 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,731 >>> mbox cmd response: failed
87,731 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,523 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,587 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,595 >>> mbox cmd response: failed
87,595 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
87,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,422 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,727 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,033 UART:
192,408 UART: Running Caliptra ROM ...
194,157 UART:
194,324 UART: [state] CFI Enabled
266,712 UART: [state] LifecycleState = Unprovisioned
268,644 UART: [state] DebugLocked = No
270,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,931 UART: [kat] SHA2-256
444,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,135 UART: [kat] ++
455,580 UART: [kat] sha1
465,462 UART: [kat] SHA2-256
468,124 UART: [kat] SHA2-384
474,333 UART: [kat] SHA2-512-ACC
476,705 UART: [kat] ECC-384
2,768,592 UART: [kat] HMAC-384Kdf
2,800,650 UART: [kat] LMS
3,990,908 UART: [kat] --
3,995,217 UART: [cold-reset] ++
3,996,235 UART: [fht] Storing FHT @ 0x50003400
4,007,215 UART: [idev] ++
4,007,792 UART: [idev] CDI.KEYID = 6
4,008,754 UART: [idev] SUBJECT.KEYID = 7
4,010,009 UART: [idev] UDS.KEYID = 0
4,011,053 ready_for_fw is high
4,011,276 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,155,927 UART: [idev] Erasing UDS.KEYID = 0
7,346,180 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,642 UART: [idev] --
7,372,152 UART: [ldev] ++
7,372,722 UART: [ldev] CDI.KEYID = 6
7,373,741 UART: [ldev] SUBJECT.KEYID = 5
7,374,901 UART: [ldev] AUTHORITY.KEYID = 7
7,376,130 UART: [ldev] FE.KEYID = 1
7,403,103 UART: [ldev] Erasing FE.KEYID = 1
10,736,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,932 UART: [ldev] --
13,113,180 UART: [fwproc] Waiting for Commands...
13,115,823 UART: [fwproc] Received command 0x46574c44
13,118,065 UART: [fwproc] Received Image of size 114916 bytes
17,172,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,525 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,641,234 >>> mbox cmd response: success
17,644,956 UART: [afmc] ++
17,645,549 UART: [afmc] CDI.KEYID = 6
17,646,435 UART: [afmc] SUBJECT.KEYID = 7
17,647,703 UART: [afmc] AUTHORITY.KEYID = 5
21,005,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,295 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,751 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,569 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,036 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,512 UART: [afmc] --
23,379,212 UART: [cold-reset] --
23,383,990 UART: [state] Locking Datavault
23,386,976 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,677 UART: [state] Locking ICCM
23,390,234 UART: [exit] Launching FMC @ 0x40000130
23,398,639 UART:
23,398,915 UART: Running Caliptra FMC ...
23,400,026 UART:
23,400,191 UART: [state] CFI Enabled
23,467,420 UART: [fht] FMC Alias Private Key: 7
25,805,155 UART: [art] Extend RT PCRs Done
25,806,377 UART: [art] Lock RT PCRs Done
25,807,833 UART: [art] Populate DV Done
25,813,376 UART: [fht] FMC Alias Private Key: 7
25,815,022 UART: [art] Derive CDI
25,815,764 UART: [art] Store in in slot 0x4
25,875,358 UART: [art] Derive Key Pair
25,876,398 UART: [art] Store priv key in slot 0x5
29,169,259 UART: [art] Derive Key Pair - Done
29,182,251 UART: [art] Signing Cert with AUTHO
29,183,550 UART: RITY.KEYID = 7
31,470,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,740 UART: [art] PUB.X = 3E8BDDCAB45420E9C9B29BF2C9EFEC854761C29BC313A4F0015C2DAC8211379896748BC0851401CA997080EE2DE326A2
31,478,981 UART: [art] PUB.Y = 7B969CC5D558CCE140B40747EC19525CAFE703FADCFD02B10E2D9688EEC4C2EC174889D27BC45F374005DB3E6D4A6DFB
31,486,246 UART: [art] SIG.R = AD0AF48D45F1F7787C80BD55107805398AA337F327DC8F53612B2558AA21BA923EEDE6A7486942195378FEB7E247F425
31,493,595 UART: [art] SIG.S = FE1AFE7C8CD742D6712197F7A8DC7191DD63E1FAAAD212B2ECA2B6B06508C6E939C92FEC42DA9551082AEAE723AEFA12
32,798,580 UART: Caliptra RT
32,799,289 UART: [state] CFI Enabled
32,961,059 UART: [rt] RT listening for mailbox commands...
32,962,928 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,992,544 UART: [rt]cmd =0x46504c54, len=4
32,994,209 >>> mbox cmd response data (8 bytes)
32,995,182 UART: [rt] FIPS self test
32,996,138 UART: [kat] ++
32,996,586 UART: [kat] sha1
33,001,095 UART: [kat] SHA2-256
33,002,545 UART: Fatal Error: 0x90010002
33,037,686 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,182,062 >>> mbox cmd response: failed
33,182,700 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,326,955 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,028 UART:
190,318 UART: Running Caliptra ROM ...
191,363 UART:
191,502 UART: [state] CFI Enabled
255,460 UART: [state] LifecycleState = Unprovisioned
257,380 UART: [state] DebugLocked = No
260,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,623 UART: [kat] SHA2-256
435,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,808 UART: [kat] ++
446,251 UART: [kat] sha1
458,153 UART: [kat] SHA2-256
460,830 UART: [kat] SHA2-384
467,344 UART: [kat] SHA2-512-ACC
469,722 UART: [kat] ECC-384
2,756,427 UART: [kat] HMAC-384Kdf
2,789,609 UART: [kat] LMS
3,979,908 UART: [kat] --
3,983,078 UART: [cold-reset] ++
3,984,476 UART: [fht] Storing FHT @ 0x50003400
3,995,822 UART: [idev] ++
3,996,394 UART: [idev] CDI.KEYID = 6
3,997,337 UART: [idev] SUBJECT.KEYID = 7
3,998,611 UART: [idev] UDS.KEYID = 0
4,000,189 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,144,850 UART: [idev] Erasing UDS.KEYID = 0
7,333,957 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,207 UART: [idev] --
7,360,553 UART: [ldev] ++
7,361,137 UART: [ldev] CDI.KEYID = 6
7,362,107 UART: [ldev] SUBJECT.KEYID = 5
7,363,320 UART: [ldev] AUTHORITY.KEYID = 7
7,364,550 UART: [ldev] FE.KEYID = 1
7,411,062 UART: [ldev] Erasing FE.KEYID = 1
10,746,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,102,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,681 UART: [ldev] --
13,126,880 UART: [fwproc] Waiting for Commands...
13,129,097 UART: [fwproc] Received command 0x46574c44
13,131,290 UART: [fwproc] Received Image of size 114916 bytes
17,199,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,344 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,662,416 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,786,977 ready_for_fw is high
3,787,794 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,894,675 >>> mbox cmd response: success
23,589,806 UART:
23,590,210 UART: Running Caliptra FMC ...
23,591,360 UART:
23,591,526 UART: [state] CFI Enabled
23,661,231 UART: [fht] FMC Alias Private Key: 7
25,999,523 UART: [art] Extend RT PCRs Done
26,000,786 UART: [art] Lock RT PCRs Done
26,002,772 UART: [art] Populate DV Done
26,008,042 UART: [fht] FMC Alias Private Key: 7
26,009,548 UART: [art] Derive CDI
26,010,339 UART: [art] Store in in slot 0x4
26,069,947 UART: [art] Derive Key Pair
26,070,993 UART: [art] Store priv key in slot 0x5
29,363,833 UART: [art] Derive Key Pair - Done
29,376,631 UART: [art] Signing Cert with AUTHO
29,377,936 UART: RITY.KEYID = 7
31,666,412 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,917 UART: [art] PUB.X = 65F5D67CD02B6DF4D9B82A08C38B7A2AD74F6C45B910292C056A2142CD50B4950F55B30810F04BD6C923821F21C65DBF
31,675,131 UART: [art] PUB.Y = 61F17DD70D306597A803D122608B4C803744A28567831BBC97DC1790B5C84BBC2F19F5273C4F8078E026CD65C022D19B
31,682,388 UART: [art] SIG.R = 1662C0201B42324F756CE204BEE7E57ED20D727A8CF65028C1CED1C12B6A97D75E68D19C58E0ECA354F5A2DBBBECD7DA
31,689,731 UART: [art] SIG.S = 589929B76EFCB7CC5DF94E5F0F5264E8E896D2C278F95B0F1240AD8587967195499EA287EAC500201B3818B843EC25FD
32,994,694 UART: Caliptra RT
32,995,413 UART: [state] CFI Enabled
33,157,873 UART: [rt] RT listening for mailbox commands...
33,159,728 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,189,749 UART: [rt]cmd =0x46504c54, len=4
33,191,434 >>> mbox cmd response data (8 bytes)
33,192,567 UART: [rt] FIPS self test
33,193,517 UART: [kat] ++
33,194,019 UART: [kat] sha1
33,198,430 UART: [kat] SHA2-256
33,199,984 UART: Fatal Error: 0x90010002
33,235,259 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,379,598 >>> mbox cmd response: failed
33,380,256 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,524,565 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,775,298 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,855,050 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,397 UART:
192,761 UART: Running Caliptra ROM ...
194,846 UART:
603,621 UART: [state] CFI Enabled
619,546 UART: [state] LifecycleState = Unprovisioned
621,499 UART: [state] DebugLocked = No
624,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,187 UART: [kat] SHA2-256
797,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,474 UART: [kat] ++
809,019 UART: [kat] sha1
819,990 UART: [kat] SHA2-256
822,651 UART: [kat] SHA2-384
828,148 UART: [kat] SHA2-512-ACC
830,517 UART: [kat] ECC-384
3,114,902 UART: [kat] HMAC-384Kdf
3,125,571 UART: [kat] LMS
4,315,695 UART: [kat] --
4,318,344 UART: [cold-reset] ++
4,320,286 UART: [fht] Storing FHT @ 0x50003400
4,332,833 UART: [idev] ++
4,333,397 UART: [idev] CDI.KEYID = 6
4,334,352 UART: [idev] SUBJECT.KEYID = 7
4,335,596 UART: [idev] UDS.KEYID = 0
4,336,543 ready_for_fw is high
4,336,752 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,481,487 UART: [idev] Erasing UDS.KEYID = 0
7,621,702 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,876 UART: [idev] --
7,648,072 UART: [ldev] ++
7,648,654 UART: [ldev] CDI.KEYID = 6
7,649,537 UART: [ldev] SUBJECT.KEYID = 5
7,650,804 UART: [ldev] AUTHORITY.KEYID = 7
7,652,096 UART: [ldev] FE.KEYID = 1
7,662,831 UART: [ldev] Erasing FE.KEYID = 1
10,950,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,394 UART: [ldev] --
13,311,306 UART: [fwproc] Waiting for Commands...
13,313,133 UART: [fwproc] Received command 0x46574c44
13,315,384 UART: [fwproc] Received Image of size 114916 bytes
17,374,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,845,356 >>> mbox cmd response: success
17,850,194 UART: [afmc] ++
17,850,783 UART: [afmc] CDI.KEYID = 6
17,851,697 UART: [afmc] SUBJECT.KEYID = 7
17,852,916 UART: [afmc] AUTHORITY.KEYID = 5
21,168,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,009 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,371 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,199 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,630 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,659 UART: [afmc] --
23,534,741 UART: [cold-reset] --
23,537,468 UART: [state] Locking Datavault
23,544,333 UART: [state] Locking PCR0, PCR1 and PCR31
23,546,083 UART: [state] Locking ICCM
23,547,315 UART: [exit] Launching FMC @ 0x40000130
23,555,661 UART:
23,555,937 UART: Running Caliptra FMC ...
23,557,050 UART:
23,557,219 UART: [state] CFI Enabled
23,565,157 UART: [fht] FMC Alias Private Key: 7
25,896,440 UART: [art] Extend RT PCRs Done
25,897,668 UART: [art] Lock RT PCRs Done
25,899,401 UART: [art] Populate DV Done
25,904,922 UART: [fht] FMC Alias Private Key: 7
25,906,516 UART: [art] Derive CDI
25,907,331 UART: [art] Store in in slot 0x4
25,949,892 UART: [art] Derive Key Pair
25,950,896 UART: [art] Store priv key in slot 0x5
29,192,751 UART: [art] Derive Key Pair - Done
29,205,975 UART: [art] Signing Cert with AUTHO
29,207,284 UART: RITY.KEYID = 7
31,486,714 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,513 UART: [art] PUB.X = EE5E4FADE555C24123D24040858F02E3668572F7495187CA359AE7A650923F71399FA0E563EEB004F17C8762BC4EBD51
31,495,447 UART: [art] PUB.Y = 36E9EF614D7E47BC7F1E911BE221A498490117C14F17DF597498162823458AAD4FFB0CBC0C87DA0B3E1304C83087F072
31,502,703 UART: [art] SIG.R = 9DFFF4FA217EA653701B9B704C922C1866C5177F3552B5A5AFD48E5392858A9F17B406374A305A8A62D071705C015526
31,510,058 UART: [art] SIG.S = 242E7DB0C56BC13877E976F28F3722DFA20C6B3E148F6BEAB607057A39449D0BA5759A03772892D02BC785F4F26BC9B2
32,815,539 UART: Caliptra RT
32,816,250 UART: [state] CFI Enabled
32,934,095 UART: [rt] RT listening for mailbox commands...
32,935,957 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,965,720 UART: [rt]cmd =0x46504c54, len=4
32,967,360 >>> mbox cmd response data (8 bytes)
32,968,439 UART: [rt] FIPS self test
32,969,392 UART: [kat] ++
32,969,886 UART: [kat] sha1
32,974,127 UART: [kat] SHA2-256
32,975,785 UART: Fatal Error: 0x90010002
33,011,175 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,155,524 >>> mbox cmd response: failed
33,156,203 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,300,294 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,096 UART:
190,598 UART: Running Caliptra ROM ...
191,638 UART:
7,241,174 UART: [state] CFI Enabled
7,255,101 UART: [state] LifecycleState = Unprovisioned
7,257,027 UART: [state] DebugLocked = No
7,259,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,263,384 UART: [kat] SHA2-256
7,433,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,443,690 UART: [kat] ++
7,444,149 UART: [kat] sha1
7,455,043 UART: [kat] SHA2-256
7,457,721 UART: [kat] SHA2-384
7,462,586 UART: [kat] SHA2-512-ACC
7,464,938 UART: [kat] ECC-384
9,750,242 UART: [kat] HMAC-384Kdf
9,761,713 UART: [kat] LMS
10,951,830 UART: [kat] --
10,955,675 UART: [cold-reset] ++
10,957,775 UART: [fht] Storing FHT @ 0x50003400
10,970,927 UART: [idev] ++
10,971,517 UART: [idev] CDI.KEYID = 6
10,972,430 UART: [idev] SUBJECT.KEYID = 7
10,973,676 UART: [idev] UDS.KEYID = 0
10,975,243 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,119,469 UART: [idev] Erasing UDS.KEYID = 0
14,261,086 UART: [idev] Using Sha1 for KeyId Algorithm
14,283,497 UART: [idev] --
14,288,519 UART: [ldev] ++
14,289,087 UART: [ldev] CDI.KEYID = 6
14,290,107 UART: [ldev] SUBJECT.KEYID = 5
14,291,266 UART: [ldev] AUTHORITY.KEYID = 7
14,292,497 UART: [ldev] FE.KEYID = 1
14,304,171 UART: [ldev] Erasing FE.KEYID = 1
17,596,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,889,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,904,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,919,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,933,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,953,619 UART: [ldev] --
19,957,642 UART: [fwproc] Waiting for Commands...
19,959,795 UART: [fwproc] Received command 0x46574c44
19,961,985 UART: [fwproc] Received Image of size 114916 bytes
24,017,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,093,796 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,162,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,483,006 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
4,131,067 ready_for_fw is high
4,131,481 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,091,020 >>> mbox cmd response: success
23,735,522 UART:
23,735,901 UART: Running Caliptra FMC ...
23,737,054 UART:
23,737,217 UART: [state] CFI Enabled
23,745,018 UART: [fht] FMC Alias Private Key: 7
26,075,411 UART: [art] Extend RT PCRs Done
26,076,646 UART: [art] Lock RT PCRs Done
26,078,383 UART: [art] Populate DV Done
26,083,690 UART: [fht] FMC Alias Private Key: 7
26,085,342 UART: [art] Derive CDI
26,086,163 UART: [art] Store in in slot 0x4
26,128,230 UART: [art] Derive Key Pair
26,129,273 UART: [art] Store priv key in slot 0x5
29,370,962 UART: [art] Derive Key Pair - Done
29,384,342 UART: [art] Signing Cert with AUTHO
29,385,683 UART: RITY.KEYID = 7
31,665,527 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,036 UART: [art] PUB.X = 2F70F81E57AA432FF98BA23E15A8086618CC21F911DBDF4C3D9F4F004FB637AC14BA6F99A87CACAA9F2A3C4D2C3C2C5E
31,674,283 UART: [art] PUB.Y = 93C3C8DC43BF9D956908575A2A494008DBFA3839059535A5D3C6A1EF900B64D13B02AC286891F642B57DB16E45C67292
31,681,522 UART: [art] SIG.R = DB4D4CEC0195BDED8F88AD7E376A08D3BD890F2DFEF4C6F63CC2DB65D7B113CCE809641462DA362A5F9496042A8F711A
31,688,946 UART: [art] SIG.S = 0E1FD78BDAD208806A7D505C10C0B76A6667A3A7BD97284D1BD2B7CB095A7EDCCCD8074B130F18A77DD284DB17EEAD7E
32,994,205 UART: Caliptra RT
32,994,921 UART: [state] CFI Enabled
33,111,881 UART: [rt] RT listening for mailbox commands...
33,113,731 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,143,505 UART: [rt]cmd =0x46504c54, len=4
33,144,896 >>> mbox cmd response data (8 bytes)
33,146,442 UART: [rt] FIPS self test
33,147,387 UART: [kat] ++
33,147,839 UART: [kat] sha1
33,152,242 UART: [kat] SHA2-256
33,153,792 UART: Fatal Error: 0x90010002
33,189,059 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,333,440 >>> mbox cmd response: failed
33,334,052 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,478,296 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
10,582,460 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,539,914 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,432 UART:
192,821 UART: Running Caliptra ROM ...
193,945 UART:
194,088 UART: [state] CFI Enabled
265,153 UART: [state] LifecycleState = Unprovisioned
267,059 UART: [state] DebugLocked = No
268,728 UART: [state] WD Timer not started. Device not locked for debugging
272,780 UART: [kat] SHA2-256
451,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,495 UART: [kat] ++
464,031 UART: [kat] sha1
475,911 UART: [kat] SHA2-256
478,915 UART: [kat] SHA2-384
485,704 UART: [kat] SHA2-512-ACC
488,640 UART: [kat] ECC-384
2,951,272 UART: [kat] HMAC-384Kdf
2,972,616 UART: [kat] LMS
3,502,099 UART: [kat] --
3,508,374 UART: [cold-reset] ++
3,509,246 UART: [fht] FHT @ 0x50003400
3,520,658 UART: [idev] ++
3,521,225 UART: [idev] CDI.KEYID = 6
3,522,222 UART: [idev] SUBJECT.KEYID = 7
3,523,399 UART: [idev] UDS.KEYID = 0
3,524,325 ready_for_fw is high
3,524,528 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,458 UART: [idev] Erasing UDS.KEYID = 0
6,028,433 UART: [idev] Sha1 KeyId Algorithm
6,051,311 UART: [idev] --
6,055,758 UART: [ldev] ++
6,056,406 UART: [ldev] CDI.KEYID = 6
6,057,306 UART: [ldev] SUBJECT.KEYID = 5
6,058,331 UART: [ldev] AUTHORITY.KEYID = 7
6,059,674 UART: [ldev] FE.KEYID = 1
6,101,632 UART: [ldev] Erasing FE.KEYID = 1
8,602,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,665 UART: [ldev] --
10,393,011 UART: [fwproc] Wait for Commands...
10,394,946 UART: [fwproc] Recv command 0x46574c44
10,397,050 UART: [fwproc] Recv'd Img size: 115224 bytes
13,809,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,995 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,271,374 >>> mbox cmd response: success
14,275,573 UART: [afmc] ++
14,276,168 UART: [afmc] CDI.KEYID = 6
14,277,048 UART: [afmc] SUBJECT.KEYID = 7
14,278,265 UART: [afmc] AUTHORITY.KEYID = 5
16,803,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,098 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,603 UART: [afmc] --
18,606,956 UART: [cold-reset] --
18,610,001 UART: [state] Locking Datavault
18,616,999 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,657 UART: [state] Locking ICCM
18,620,726 UART: [exit] Launching FMC @ 0x40000130
18,629,117 UART:
18,629,351 UART: Running Caliptra FMC ...
18,630,376 UART:
18,630,522 UART: [state] CFI Enabled
18,689,808 UART: [fht] FMC Alias Private Key: 7
20,453,424 UART: [art] Extend RT PCRs Done
20,454,628 UART: [art] Lock RT PCRs Done
20,456,170 UART: [art] Populate DV Done
20,461,632 UART: [fht] FMC Alias Private Key: 7
20,463,283 UART: [art] Derive CDI
20,464,023 UART: [art] Store in in slot 0x4
20,522,639 UART: [art] Derive Key Pair
20,523,680 UART: [art] Store priv key in slot 0x5
22,987,036 UART: [art] Derive Key Pair - Done
22,999,983 UART: [art] Signing Cert with AUTHO
23,001,293 UART: RITY.KEYID = 7
24,712,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,218 UART: [art] PUB.X = 2E542C3923163CDCAD133BC2A47C97C8108D2185584CACD0468A1BCFD8A8E78166239B0B80CC18E7F00C696A1EB2701A
24,721,536 UART: [art] PUB.Y = E7721842F3EB973519EF93FA8A562E7A5A3DD962B094709FDF7D6C80B8636215CEFF302FA563A3696B31E1DA5DC0944B
24,728,780 UART: [art] SIG.R = 511DAA2CA2463F70B566775AFBD5B5646B238C8B675C6C8C40D2278AC37AA9560BA1F234E996F5C53BA3EED013241010
24,736,213 UART: [art] SIG.S = B88F55628D865B3A8F76E95D26E1116E6F8963819166C3BBC0EF35108E252C26448A63CA0200F282FA4EF8CCF54C123F
25,715,730 UART: Caliptra RT
25,716,444 UART: [state] CFI Enabled
25,881,505 UART: [rt] RT listening for mailbox commands...
25,883,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,913,168 UART: [rt]cmd =0x46504c54, len=4
25,914,913 >>> mbox cmd response data (8 bytes)
25,916,138 UART: [rt] FIPS self test
25,917,073 UART: [kat] ++
25,917,547 UART: [kat] sha1
25,921,789 UART: [kat] SHA2-256
25,923,285 UART: Fatal Error: 0x90010002
25,958,672 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,103,457 >>> mbox cmd response: failed
26,104,103 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,248,591 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,085 UART:
190,378 UART: Running Caliptra ROM ...
191,487 UART:
191,634 UART: [state] CFI Enabled
252,601 UART: [state] LifecycleState = Unprovisioned
254,466 UART: [state] DebugLocked = No
256,222 UART: [state] WD Timer not started. Device not locked for debugging
260,080 UART: [kat] SHA2-256
439,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,794 UART: [kat] ++
451,325 UART: [kat] sha1
463,290 UART: [kat] SHA2-256
466,301 UART: [kat] SHA2-384
472,817 UART: [kat] SHA2-512-ACC
475,746 UART: [kat] ECC-384
2,938,278 UART: [kat] HMAC-384Kdf
2,961,091 UART: [kat] LMS
3,490,551 UART: [kat] --
3,495,670 UART: [cold-reset] ++
3,497,331 UART: [fht] FHT @ 0x50003400
3,508,307 UART: [idev] ++
3,508,880 UART: [idev] CDI.KEYID = 6
3,509,842 UART: [idev] SUBJECT.KEYID = 7
3,511,021 UART: [idev] UDS.KEYID = 0
3,512,528 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,657,734 UART: [idev] Erasing UDS.KEYID = 0
6,015,981 UART: [idev] Sha1 KeyId Algorithm
6,038,793 UART: [idev] --
6,042,792 UART: [ldev] ++
6,043,366 UART: [ldev] CDI.KEYID = 6
6,044,247 UART: [ldev] SUBJECT.KEYID = 5
6,045,461 UART: [ldev] AUTHORITY.KEYID = 7
6,046,697 UART: [ldev] FE.KEYID = 1
6,089,896 UART: [ldev] Erasing FE.KEYID = 1
8,591,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,479 UART: [ldev] --
10,402,342 UART: [fwproc] Wait for Commands...
10,404,282 UART: [fwproc] Recv command 0x46574c44
10,406,512 UART: [fwproc] Recv'd Img size: 115224 bytes
13,816,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,267 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,280,047 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,170 UART:
192,565 UART: Running Caliptra ROM ...
193,742 UART:
193,887 UART: [state] CFI Enabled
265,865 UART: [state] LifecycleState = Unprovisioned
268,221 UART: [state] DebugLocked = No
269,908 UART: [state] WD Timer not started. Device not locked for debugging
274,942 UART: [kat] SHA2-256
464,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,604 UART: [kat] ++
476,079 UART: [kat] sha1
487,838 UART: [kat] SHA2-256
490,896 UART: [kat] SHA2-384
497,061 UART: [kat] SHA2-512-ACC
499,656 UART: [kat] ECC-384
2,950,156 UART: [kat] HMAC-384Kdf
2,972,281 UART: [kat] LMS
3,504,024 UART: [kat] --
3,509,871 UART: [cold-reset] ++
3,511,239 UART: [fht] FHT @ 0x50003400
3,522,365 UART: [idev] ++
3,523,077 UART: [idev] CDI.KEYID = 6
3,523,990 UART: [idev] SUBJECT.KEYID = 7
3,525,237 UART: [idev] UDS.KEYID = 0
3,526,354 ready_for_fw is high
3,526,571 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,435 UART: [idev] Erasing UDS.KEYID = 0
6,031,086 UART: [idev] Sha1 KeyId Algorithm
6,053,523 UART: [idev] --
6,057,600 UART: [ldev] ++
6,058,293 UART: [ldev] CDI.KEYID = 6
6,059,204 UART: [ldev] SUBJECT.KEYID = 5
6,060,367 UART: [ldev] AUTHORITY.KEYID = 7
6,061,602 UART: [ldev] FE.KEYID = 1
6,100,150 UART: [ldev] Erasing FE.KEYID = 1
8,605,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,690 UART: [ldev] --
10,416,851 UART: [fwproc] Wait for Commands...
10,420,031 UART: [fwproc] Recv command 0x46574c44
10,422,290 UART: [fwproc] Recv'd Img size: 115224 bytes
13,876,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,406 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,615,249 >>> mbox cmd response: success
14,618,940 UART: [afmc] ++
14,619,640 UART: [afmc] CDI.KEYID = 6
14,620,803 UART: [afmc] SUBJECT.KEYID = 7
14,622,333 UART: [afmc] AUTHORITY.KEYID = 5
17,151,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,568 UART: [afmc] --
18,948,589 UART: [cold-reset] --
18,951,000 UART: [state] Locking Datavault
18,957,404 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,591 UART: [state] Locking ICCM
18,962,283 UART: [exit] Launching FMC @ 0x40000130
18,970,958 UART:
18,971,238 UART: Running Caliptra FMC ...
18,972,349 UART:
18,972,513 UART: [state] CFI Enabled
19,031,625 UART: [fht] FMC Alias Private Key: 7
20,796,056 UART: [art] Extend RT PCRs Done
20,797,284 UART: [art] Lock RT PCRs Done
20,798,801 UART: [art] Populate DV Done
20,803,998 UART: [fht] FMC Alias Private Key: 7
20,805,537 UART: [art] Derive CDI
20,806,305 UART: [art] Store in in slot 0x4
20,864,924 UART: [art] Derive Key Pair
20,865,921 UART: [art] Store priv key in slot 0x5
23,328,945 UART: [art] Derive Key Pair - Done
23,342,260 UART: [art] Signing Cert with AUTHO
23,343,564 UART: RITY.KEYID = 7
25,054,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,236 UART: [art] PUB.X = 9E77E0195F1ECD038A5FBE4E585A45F8F7EB7C2DE70535B62A0F00BE26462CA84042C4CBB0545C61E676E2D0839DFE72
25,063,490 UART: [art] PUB.Y = 3BA44465A46CC9B78FF8E064908AB7C96C0ABD224E40F7E7CF4626F3090BB07E3507DA2BE9D1013768D32DD58B37D01E
25,070,724 UART: [art] SIG.R = 42A9BAB4B7C5D93EC98D8D0EEDFB11B546BAEA40F3322A9854A0EE4DEB5ADFE87ACF996225B07BF932A959E1736CBB93
25,078,185 UART: [art] SIG.S = 145D32C09A2B7DA09CD8F9F75A9838949F4704AA89F2AAD415E77C024234D55BCA12309A86396C0EBE98642408D48866
26,057,122 UART: Caliptra RT
26,057,817 UART: [state] CFI Enabled
26,223,558 UART: [rt] RT listening for mailbox commands...
26,225,406 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,255,287 UART: [rt]cmd =0x46504c54, len=4
26,256,807 >>> mbox cmd response data (8 bytes)
26,258,305 UART: [rt] FIPS self test
26,259,253 UART: [kat] ++
26,259,724 UART: [kat] sha1
26,264,180 UART: [kat] SHA2-256
26,265,678 UART: Fatal Error: 0x90010002
26,300,807 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,445,516 >>> mbox cmd response: failed
26,446,123 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,590,821 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,073 UART:
190,364 UART: Running Caliptra ROM ...
191,475 UART:
191,624 UART: [state] CFI Enabled
252,370 UART: [state] LifecycleState = Unprovisioned
254,775 UART: [state] DebugLocked = No
257,148 UART: [state] WD Timer not started. Device not locked for debugging
261,501 UART: [kat] SHA2-256
451,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
462,157 UART: [kat] ++
462,608 UART: [kat] sha1
474,837 UART: [kat] SHA2-256
477,849 UART: [kat] SHA2-384
484,151 UART: [kat] SHA2-512-ACC
486,757 UART: [kat] ECC-384
2,937,135 UART: [kat] HMAC-384Kdf
2,960,939 UART: [kat] LMS
3,492,671 UART: [kat] --
3,497,931 UART: [cold-reset] ++
3,500,159 UART: [fht] FHT @ 0x50003400
3,511,578 UART: [idev] ++
3,512,251 UART: [idev] CDI.KEYID = 6
3,513,189 UART: [idev] SUBJECT.KEYID = 7
3,514,419 UART: [idev] UDS.KEYID = 0
3,515,901 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,660,775 UART: [idev] Erasing UDS.KEYID = 0
6,016,009 UART: [idev] Sha1 KeyId Algorithm
6,037,308 UART: [idev] --
6,041,955 UART: [ldev] ++
6,042,646 UART: [ldev] CDI.KEYID = 6
6,043,560 UART: [ldev] SUBJECT.KEYID = 5
6,044,723 UART: [ldev] AUTHORITY.KEYID = 7
6,045,957 UART: [ldev] FE.KEYID = 1
6,089,592 UART: [ldev] Erasing FE.KEYID = 1
8,595,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,691 UART: [ldev] --
10,403,714 UART: [fwproc] Wait for Commands...
10,406,244 UART: [fwproc] Recv command 0x46574c44
10,408,552 UART: [fwproc] Recv'd Img size: 115224 bytes
13,864,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,168 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,601,961 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,439,099 ready_for_fw is high
3,439,626 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,759,392 >>> mbox cmd response: success
19,046,127 UART:
19,046,534 UART: Running Caliptra FMC ...
19,047,749 UART:
19,047,922 UART: [state] CFI Enabled
19,114,622 UART: [fht] FMC Alias Private Key: 7
20,878,954 UART: [art] Extend RT PCRs Done
20,880,173 UART: [art] Lock RT PCRs Done
20,881,861 UART: [art] Populate DV Done
20,887,494 UART: [fht] FMC Alias Private Key: 7
20,888,979 UART: [art] Derive CDI
20,889,765 UART: [art] Store in in slot 0x4
20,947,314 UART: [art] Derive Key Pair
20,948,355 UART: [art] Store priv key in slot 0x5
23,411,447 UART: [art] Derive Key Pair - Done
23,424,776 UART: [art] Signing Cert with AUTHO
23,426,076 UART: RITY.KEYID = 7
25,137,529 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,050 UART: [art] PUB.X = 5C909BC75DF56D24F0B00E6E213E9439A45749C98A9E89BD277AEAE55601A2CBD3A84715919D67DF9D13DCFE9DAA224B
25,146,315 UART: [art] PUB.Y = A3687622104BD4624DFF3BE984BE3DFB6963B7F39904DBE66669900D9EF07D74387CE1EBA83AC7446D929FA74B806123
25,153,598 UART: [art] SIG.R = 2323D216FCE607A6F6E26B684B60B1A875BAA6D71ED3F269ECF9284BF68AFBEE780C56773FDB20EAECAB40B7FF5C30F0
25,161,002 UART: [art] SIG.S = 0A60929204C89BB9322662656B5EEE26A2E60D20D185BFBA937FE10480450E4706C213E7B29B87273233501FAB365F3F
26,140,353 UART: Caliptra RT
26,141,046 UART: [state] CFI Enabled
26,306,928 UART: [rt] RT listening for mailbox commands...
26,308,908 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,638 UART: [rt]cmd =0x46504c54, len=4
26,340,450 >>> mbox cmd response data (8 bytes)
26,341,395 UART: [rt] FIPS self test
26,342,337 UART: [kat] ++
26,342,789 UART: [kat] sha1
26,347,190 UART: [kat] SHA2-256
26,348,795 UART: Fatal Error: 0x90010002
26,384,062 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,528,768 >>> mbox cmd response: failed
26,529,361 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,673,987 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,428,406 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,743,890 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,597 UART:
192,962 UART: Running Caliptra ROM ...
194,155 UART:
603,701 UART: [state] CFI Enabled
616,858 UART: [state] LifecycleState = Unprovisioned
619,241 UART: [state] DebugLocked = No
621,830 UART: [state] WD Timer not started. Device not locked for debugging
625,680 UART: [kat] SHA2-256
815,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,307 UART: [kat] ++
826,824 UART: [kat] sha1
838,268 UART: [kat] SHA2-256
841,287 UART: [kat] SHA2-384
845,860 UART: [kat] SHA2-512-ACC
848,448 UART: [kat] ECC-384
3,292,475 UART: [kat] HMAC-384Kdf
3,305,860 UART: [kat] LMS
3,837,752 UART: [kat] --
3,842,911 UART: [cold-reset] ++
3,845,421 UART: [fht] FHT @ 0x50003400
3,856,899 UART: [idev] ++
3,857,621 UART: [idev] CDI.KEYID = 6
3,858,510 UART: [idev] SUBJECT.KEYID = 7
3,859,780 UART: [idev] UDS.KEYID = 0
3,860,715 ready_for_fw is high
3,860,919 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,005,653 UART: [idev] Erasing UDS.KEYID = 0
6,340,295 UART: [idev] Sha1 KeyId Algorithm
6,363,907 UART: [idev] --
6,367,799 UART: [ldev] ++
6,368,481 UART: [ldev] CDI.KEYID = 6
6,369,390 UART: [ldev] SUBJECT.KEYID = 5
6,370,549 UART: [ldev] AUTHORITY.KEYID = 7
6,371,780 UART: [ldev] FE.KEYID = 1
6,383,935 UART: [ldev] Erasing FE.KEYID = 1
8,865,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,529 UART: [ldev] --
10,659,892 UART: [fwproc] Wait for Commands...
10,663,071 UART: [fwproc] Recv command 0x46574c44
10,665,389 UART: [fwproc] Recv'd Img size: 115224 bytes
14,125,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,203,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,319,147 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,866,738 >>> mbox cmd response: success
14,870,844 UART: [afmc] ++
14,871,547 UART: [afmc] CDI.KEYID = 6
14,872,783 UART: [afmc] SUBJECT.KEYID = 7
14,874,214 UART: [afmc] AUTHORITY.KEYID = 5
17,373,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,096,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,098,850 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,114,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,129,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,144,209 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,167,117 UART: [afmc] --
19,171,092 UART: [cold-reset] --
19,173,772 UART: [state] Locking Datavault
19,179,450 UART: [state] Locking PCR0, PCR1 and PCR31
19,181,584 UART: [state] Locking ICCM
19,183,465 UART: [exit] Launching FMC @ 0x40000130
19,192,132 UART:
19,192,375 UART: Running Caliptra FMC ...
19,193,476 UART:
19,193,637 UART: [state] CFI Enabled
19,201,637 UART: [fht] FMC Alias Private Key: 7
20,958,446 UART: [art] Extend RT PCRs Done
20,959,664 UART: [art] Lock RT PCRs Done
20,961,177 UART: [art] Populate DV Done
20,966,594 UART: [fht] FMC Alias Private Key: 7
20,968,299 UART: [art] Derive CDI
20,969,116 UART: [art] Store in in slot 0x4
21,011,827 UART: [art] Derive Key Pair
21,012,830 UART: [art] Store priv key in slot 0x5
23,439,829 UART: [art] Derive Key Pair - Done
23,452,927 UART: [art] Signing Cert with AUTHO
23,454,233 UART: RITY.KEYID = 7
25,159,425 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,927 UART: [art] PUB.X = 28324A88DAFDE517FA6C57687AD3D68ECAEFF38DF81457632E295D0F5F18C8A7CF7D04806D7653B1ECE0A9380C4F081F
25,168,187 UART: [art] PUB.Y = BF5E43A4CF15D9D419D16C4736E1C575DCBD570F19FDEECD8E05EA3DB6CA4B4BC4D2C86C053E18526FA5607904893DBC
25,175,477 UART: [art] SIG.R = F621BBC146A74FF32BCFDE33A472E9AB4280B677E464C72BE401D3A49CF8E4FD663CD8E02A48C3706E64F8EBE37BD7B8
25,182,872 UART: [art] SIG.S = 2614D3AFDBAA9F26C6B0C92DBDBA210C857A7F005A3FAEA9240334C42504A410DBB79C93FA0CEC93B31890C6A6259DBF
26,161,584 UART: Caliptra RT
26,162,266 UART: [state] CFI Enabled
26,279,393 UART: [rt] RT listening for mailbox commands...
26,281,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,310,921 UART: [rt]cmd =0x46504c54, len=4
26,312,492 >>> mbox cmd response data (8 bytes)
26,313,656 UART: [rt] FIPS self test
26,314,601 UART: [kat] ++
26,315,051 UART: [kat] sha1
26,319,676 UART: [kat] SHA2-256
26,321,219 UART: Fatal Error: 0x90010002
26,356,431 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,501,118 >>> mbox cmd response: failed
26,501,765 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,646,807 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,108 UART:
190,423 UART: Running Caliptra ROM ...
191,453 UART:
13,883,939 UART: [state] CFI Enabled
13,894,297 UART: [state] LifecycleState = Unprovisioned
13,896,701 UART: [state] DebugLocked = No
13,898,487 UART: [state] WD Timer not started. Device not locked for debugging
13,903,032 UART: [kat] SHA2-256
14,092,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,103,711 UART: [kat] ++
14,104,236 UART: [kat] sha1
14,115,287 UART: [kat] SHA2-256
14,118,300 UART: [kat] SHA2-384
14,124,072 UART: [kat] SHA2-512-ACC
14,126,636 UART: [kat] ECC-384
16,570,056 UART: [kat] HMAC-384Kdf
16,584,327 UART: [kat] LMS
17,116,157 UART: [kat] --
17,120,756 UART: [cold-reset] ++
17,121,666 UART: [fht] FHT @ 0x50003400
17,132,050 UART: [idev] ++
17,132,725 UART: [idev] CDI.KEYID = 6
17,133,688 UART: [idev] SUBJECT.KEYID = 7
17,134,901 UART: [idev] UDS.KEYID = 0
17,136,416 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,281,155 UART: [idev] Erasing UDS.KEYID = 0
19,610,668 UART: [idev] Sha1 KeyId Algorithm
19,633,465 UART: [idev] --
19,637,941 UART: [ldev] ++
19,638,625 UART: [ldev] CDI.KEYID = 6
19,639,534 UART: [ldev] SUBJECT.KEYID = 5
19,640,697 UART: [ldev] AUTHORITY.KEYID = 7
19,641,925 UART: [ldev] FE.KEYID = 1
19,652,911 UART: [ldev] Erasing FE.KEYID = 1
22,135,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,854,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,869,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,884,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,899,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,921,027 UART: [ldev] --
23,925,711 UART: [fwproc] Wait for Commands...
23,927,432 UART: [fwproc] Recv command 0x46574c44
23,929,690 UART: [fwproc] Recv'd Img size: 115224 bytes
27,380,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,458,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,574,691 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,121,978 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,755,572 ready_for_fw is high
3,756,136 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,975,460 >>> mbox cmd response: success
19,228,009 UART:
19,228,414 UART: Running Caliptra FMC ...
19,229,625 UART:
19,229,796 UART: [state] CFI Enabled
19,237,581 UART: [fht] FMC Alias Private Key: 7
20,994,328 UART: [art] Extend RT PCRs Done
20,995,543 UART: [art] Lock RT PCRs Done
20,997,008 UART: [art] Populate DV Done
21,002,591 UART: [fht] FMC Alias Private Key: 7
21,004,249 UART: [art] Derive CDI
21,005,075 UART: [art] Store in in slot 0x4
21,047,959 UART: [art] Derive Key Pair
21,049,004 UART: [art] Store priv key in slot 0x5
23,475,474 UART: [art] Derive Key Pair - Done
23,488,738 UART: [art] Signing Cert with AUTHO
23,490,037 UART: RITY.KEYID = 7
25,195,361 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,892 UART: [art] PUB.X = 5A23EA7E833E81B1CACA2C04733CA9DB21F33190A669FBA30EF3F3CCE5985AFFE8CBE90ECD3F195BFCABC413EDDB85AA
25,204,044 UART: [art] PUB.Y = 687C5B254D7ED61FE9F8AFF27BA495FB70F2232AE03254901E116BD67C98F4A923CAD498EC443DC5E6480EC2A46952BE
25,211,364 UART: [art] SIG.R = F290E5EDA192B2161DA05209435E5CF210E50D92BF870DF33B73EEDCD9436911CC108B8959C4541D2B254A86D488AC90
25,218,718 UART: [art] SIG.S = 15EDA493182A1B835958D38A0EE411BE2018451C4BDDFF62A24952D4CAE77057663931661B996D3FF44E38EDACBC4469
26,198,032 UART: Caliptra RT
26,198,723 UART: [state] CFI Enabled
26,316,277 UART: [rt] RT listening for mailbox commands...
26,318,134 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,347,757 UART: [rt]cmd =0x46504c54, len=4
26,349,281 >>> mbox cmd response data (8 bytes)
26,350,427 UART: [rt] FIPS self test
26,351,373 UART: [kat] ++
26,351,817 UART: [kat] sha1
26,356,324 UART: [kat] SHA2-256
26,357,874 UART: Fatal Error: 0x90010002
26,393,089 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,537,810 >>> mbox cmd response: failed
26,538,404 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,683,081 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
16,997,208 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,237,459 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,194 UART: [kat] LMS
1,475,390 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,531 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 ready_for_fw is high
1,480,717 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,237 UART: [ldev] ++
1,515,405 UART: [ldev] CDI.KEYID = 6
1,515,768 UART: [ldev] SUBJECT.KEYID = 5
1,516,194 UART: [ldev] AUTHORITY.KEYID = 7
1,516,657 UART: [ldev] FE.KEYID = 1
1,521,627 UART: [ldev] Erasing FE.KEYID = 1
1,547,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,790 UART: [ldev] --
1,586,065 UART: [fwproc] Waiting for Commands...
1,586,752 UART: [fwproc] Received command 0x46574c44
1,587,543 UART: [fwproc] Received Image of size 115224 bytes
2,895,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,448 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,800 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,061 >>> mbox cmd response: success
3,090,131 UART: [afmc] ++
3,090,299 UART: [afmc] CDI.KEYID = 6
3,090,661 UART: [afmc] SUBJECT.KEYID = 7
3,091,086 UART: [afmc] AUTHORITY.KEYID = 5
3,125,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,735 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,128 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,818 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,721 UART: [afmc] --
3,169,783 UART: [cold-reset] --
3,170,425 UART: [state] Locking Datavault
3,171,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,250 UART: [state] Locking ICCM
3,172,846 UART: [exit] Launching FMC @ 0x40000130
3,178,175 UART:
3,178,191 UART: Running Caliptra FMC ...
3,178,599 UART:
3,178,653 UART: [state] CFI Enabled
3,189,282 UART: [fht] FMC Alias Private Key: 7
3,297,295 UART: [art] Extend RT PCRs Done
3,297,723 UART: [art] Lock RT PCRs Done
3,299,185 UART: [art] Populate DV Done
3,307,470 UART: [fht] FMC Alias Private Key: 7
3,308,624 UART: [art] Derive CDI
3,308,904 UART: [art] Store in in slot 0x4
3,394,899 UART: [art] Derive Key Pair
3,395,259 UART: [art] Store priv key in slot 0x5
3,408,261 UART: [art] Derive Key Pair - Done
3,422,565 UART: [art] Signing Cert with AUTHO
3,423,045 UART: RITY.KEYID = 7
3,437,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,686 UART: [art] PUB.X = B1FFA8D252BE8C7456C519E6A55067CC145E38990528E2E4B4B4A4D68E151433E4207DA38248837D012420A7692716E6
3,445,442 UART: [art] PUB.Y = 861EEB96F5271AA13A730BF4EA891C946680B50D228B29879C809526C6CCCBBE02292F60D40C6127F5FE38CB58B43DF2
3,452,386 UART: [art] SIG.R = 9CE9F4B6C563A5B90797FE1528A29C985781DB907B01D8432D5FECB27891407F02E25B0F81F5D35E73CD14AA648675DC
3,459,148 UART: [art] SIG.S = 244873A8129BCCB65E2C8E01D4B5114668CA5E954C3CD4C49006EA3C50931712B3AB2DD19A27B4DFE90358BF4A607E77
3,482,998 UART: Caliptra RT
3,483,252 UART: [state] CFI Enabled
3,592,008 UART: [rt] RT listening for mailbox commands...
3,592,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,063 UART: [rt]cmd =0x46504c54, len=4
3,623,145 >>> mbox cmd response data (8 bytes)
3,623,376 UART: [rt] FIPS self test
3,623,704 UART: [kat] ++
3,623,856 UART: [kat] sha1
3,628,028 UART: [kat] SHA2-256
3,630,022 UART: Fatal Error: 0x90010002
3,631,572 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,577 >>> mbox cmd response: failed
3,631,577 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
85,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,555 UART: [kat] SHA2-256
881,486 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,601 UART: [kat] ++
885,753 UART: [kat] sha1
889,939 UART: [kat] SHA2-256
891,877 UART: [kat] SHA2-384
894,538 UART: [kat] SHA2-512-ACC
896,439 UART: [kat] ECC-384
902,176 UART: [kat] HMAC-384Kdf
906,776 UART: [kat] LMS
1,474,972 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,555 UART: [fht] Storing FHT @ 0x50003400
1,479,332 UART: [idev] ++
1,479,500 UART: [idev] CDI.KEYID = 6
1,479,860 UART: [idev] SUBJECT.KEYID = 7
1,480,284 UART: [idev] UDS.KEYID = 0
1,480,629 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,038 UART: [idev] Erasing UDS.KEYID = 0
1,504,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,190 UART: [idev] --
1,514,345 UART: [ldev] ++
1,514,513 UART: [ldev] CDI.KEYID = 6
1,514,876 UART: [ldev] SUBJECT.KEYID = 5
1,515,302 UART: [ldev] AUTHORITY.KEYID = 7
1,515,765 UART: [ldev] FE.KEYID = 1
1,521,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,026 UART: [ldev] --
1,585,485 UART: [fwproc] Waiting for Commands...
1,586,216 UART: [fwproc] Received command 0x46574c44
1,587,007 UART: [fwproc] Received Image of size 115224 bytes
2,894,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,039 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,195 ready_for_fw is high
1,362,195 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,795 >>> mbox cmd response: success
3,002,483 UART:
3,002,499 UART: Running Caliptra FMC ...
3,002,907 UART:
3,002,961 UART: [state] CFI Enabled
3,013,296 UART: [fht] FMC Alias Private Key: 7
3,120,805 UART: [art] Extend RT PCRs Done
3,121,233 UART: [art] Lock RT PCRs Done
3,122,807 UART: [art] Populate DV Done
3,130,796 UART: [fht] FMC Alias Private Key: 7
3,131,822 UART: [art] Derive CDI
3,132,102 UART: [art] Store in in slot 0x4
3,217,965 UART: [art] Derive Key Pair
3,218,325 UART: [art] Store priv key in slot 0x5
3,232,149 UART: [art] Derive Key Pair - Done
3,246,948 UART: [art] Signing Cert with AUTHO
3,247,428 UART: RITY.KEYID = 7
3,262,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,355 UART: [art] PUB.X = 9C13B6B810AB7EBFCE61C22F9B207DB63D30856AB3C3D60471885144845B587AF943F84740DEB32215E7BB35E7EF70C7
3,270,128 UART: [art] PUB.Y = 07B23E7A226488DDD45C80AAA572EE06F4E1EE52A378442DD9E5CB8D42499B7CEA1E3EA26DA9F58B821EF952BD8C248E
3,277,090 UART: [art] SIG.R = 604877E522CDBBBA628059993BA97609F1BBC3897041CD08F15022854D4D211FAB3B8131AA8158164CF2646C619978F0
3,283,848 UART: [art] SIG.S = 9A9CCC64AEFC4D73DCCFCA9A353A7C09B09804C769EDF922C19DA724980B35A7024EA00B2E52AE9CC94E45A58007434F
3,307,067 UART: Caliptra RT
3,307,321 UART: [state] CFI Enabled
3,414,893 UART: [rt] RT listening for mailbox commands...
3,415,556 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,182 UART: [rt]cmd =0x46504c54, len=4
3,446,442 >>> mbox cmd response data (8 bytes)
3,446,759 UART: [rt] FIPS self test
3,447,087 UART: [kat] ++
3,447,239 UART: [kat] sha1
3,451,561 UART: [kat] SHA2-256
3,453,577 UART: Fatal Error: 0x90010002
3,455,127 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,455,132 >>> mbox cmd response: failed
3,455,132 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,455,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,403 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,287 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,374 UART: [kat] SHA2-256
892,312 UART: [kat] SHA2-384
894,979 UART: [kat] SHA2-512-ACC
896,880 UART: [kat] ECC-384
902,747 UART: [kat] HMAC-384Kdf
907,265 UART: [kat] LMS
1,475,461 UART: [kat] --
1,476,160 UART: [cold-reset] ++
1,476,600 UART: [fht] Storing FHT @ 0x50003400
1,479,383 UART: [idev] ++
1,479,551 UART: [idev] CDI.KEYID = 6
1,479,911 UART: [idev] SUBJECT.KEYID = 7
1,480,335 UART: [idev] UDS.KEYID = 0
1,480,680 ready_for_fw is high
1,480,680 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,245 UART: [idev] Erasing UDS.KEYID = 0
1,505,189 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,819 UART: [idev] --
1,514,900 UART: [ldev] ++
1,515,068 UART: [ldev] CDI.KEYID = 6
1,515,431 UART: [ldev] SUBJECT.KEYID = 5
1,515,857 UART: [ldev] AUTHORITY.KEYID = 7
1,516,320 UART: [ldev] FE.KEYID = 1
1,521,632 UART: [ldev] Erasing FE.KEYID = 1
1,546,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,263 UART: [ldev] --
1,585,574 UART: [fwproc] Waiting for Commands...
1,586,299 UART: [fwproc] Received command 0x46574c44
1,587,090 UART: [fwproc] Received Image of size 115224 bytes
2,894,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,916 >>> mbox cmd response: success
3,090,002 UART: [afmc] ++
3,090,170 UART: [afmc] CDI.KEYID = 6
3,090,532 UART: [afmc] SUBJECT.KEYID = 7
3,090,957 UART: [afmc] AUTHORITY.KEYID = 5
3,125,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,991 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,681 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,560 UART: [afmc] --
3,169,468 UART: [cold-reset] --
3,170,292 UART: [state] Locking Datavault
3,171,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,051 UART: [state] Locking ICCM
3,172,697 UART: [exit] Launching FMC @ 0x40000130
3,178,026 UART:
3,178,042 UART: Running Caliptra FMC ...
3,178,450 UART:
3,178,593 UART: [state] CFI Enabled
3,189,042 UART: [fht] FMC Alias Private Key: 7
3,296,953 UART: [art] Extend RT PCRs Done
3,297,381 UART: [art] Lock RT PCRs Done
3,298,751 UART: [art] Populate DV Done
3,306,966 UART: [fht] FMC Alias Private Key: 7
3,307,972 UART: [art] Derive CDI
3,308,252 UART: [art] Store in in slot 0x4
3,393,557 UART: [art] Derive Key Pair
3,393,917 UART: [art] Store priv key in slot 0x5
3,407,531 UART: [art] Derive Key Pair - Done
3,422,310 UART: [art] Signing Cert with AUTHO
3,422,790 UART: RITY.KEYID = 7
3,438,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,903 UART: [art] PUB.X = F61A48F91EE526C1086145426BD088B47F924049C16AD6CB310535F8149E0F62CE87AA68BE4DAE3CA4EFE39823C71B95
3,445,670 UART: [art] PUB.Y = 8A2DC5DCDE36B9CA21005FA9E8D811F58C0314DFD3EC5292E9A0A0D8E7AD7B44B6964867D825730BAA198CC408067B8C
3,452,600 UART: [art] SIG.R = 99604877A7B465A13B9F12607CD0ED407E6389C9B85EC53125EFA798F6579C4497CF90CF1E6CF633A5C0C63BED39C8AE
3,459,378 UART: [art] SIG.S = F09FD86BC3E337E83F2EBE6429EEB0AF00A2D066D0F1F48DE07A749CFF9E349326664341289FCEB036D2ED5264AB2580
3,483,205 UART: Caliptra RT
3,483,551 UART: [state] CFI Enabled
3,591,380 UART: [rt] RT listening for mailbox commands...
3,592,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,693 UART: [rt]cmd =0x46504c54, len=4
3,622,787 >>> mbox cmd response data (8 bytes)
3,622,988 UART: [rt] FIPS self test
3,623,316 UART: [kat] ++
3,623,468 UART: [kat] sha1
3,627,580 UART: [kat] SHA2-256
3,629,580 UART: Fatal Error: 0x90010002
3,631,130 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,135 >>> mbox cmd response: failed
3,631,135 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,138 UART: [kat] SHA2-256
882,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,184 UART: [kat] ++
886,336 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
895,231 UART: [kat] SHA2-512-ACC
897,132 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,416 UART: [fht] Storing FHT @ 0x50003400
1,480,395 UART: [idev] ++
1,480,563 UART: [idev] CDI.KEYID = 6
1,480,923 UART: [idev] SUBJECT.KEYID = 7
1,481,347 UART: [idev] UDS.KEYID = 0
1,481,692 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,367 UART: [idev] Erasing UDS.KEYID = 0
1,506,757 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,273 UART: [idev] --
1,516,268 UART: [ldev] ++
1,516,436 UART: [ldev] CDI.KEYID = 6
1,516,799 UART: [ldev] SUBJECT.KEYID = 5
1,517,225 UART: [ldev] AUTHORITY.KEYID = 7
1,517,688 UART: [ldev] FE.KEYID = 1
1,523,132 UART: [ldev] Erasing FE.KEYID = 1
1,549,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,379 UART: [ldev] --
1,588,706 UART: [fwproc] Waiting for Commands...
1,589,403 UART: [fwproc] Received command 0x46574c44
1,590,194 UART: [fwproc] Received Image of size 115224 bytes
2,897,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,164 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,358 ready_for_fw is high
1,362,358 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,941,122 >>> mbox cmd response: success
3,003,060 UART:
3,003,076 UART: Running Caliptra FMC ...
3,003,484 UART:
3,003,627 UART: [state] CFI Enabled
3,014,554 UART: [fht] FMC Alias Private Key: 7
3,122,183 UART: [art] Extend RT PCRs Done
3,122,611 UART: [art] Lock RT PCRs Done
3,124,341 UART: [art] Populate DV Done
3,132,564 UART: [fht] FMC Alias Private Key: 7
3,133,566 UART: [art] Derive CDI
3,133,846 UART: [art] Store in in slot 0x4
3,219,665 UART: [art] Derive Key Pair
3,220,025 UART: [art] Store priv key in slot 0x5
3,233,231 UART: [art] Derive Key Pair - Done
3,247,630 UART: [art] Signing Cert with AUTHO
3,248,110 UART: RITY.KEYID = 7
3,263,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,129 UART: [art] PUB.X = B89B224642173D40E16163E8AE49452F49FC3FB096BAC0A7F1A8C8441DAD7943297DFAC0C5D93E0647158A5D76FB9F49
3,270,902 UART: [art] PUB.Y = 53E40005F3131DBAD8D342EDB7BF152553E9634492F747308A8E79419681E805BEBD3FBBD029510C9A0D01FECAE7F638
3,277,821 UART: [art] SIG.R = B23702EB63B3B7AAFBB7A94379C97FE7EA59E627DF1D8ABC47E70E4B29F25C74380EE8DEDB34891A5B7089C7A1F68196
3,284,598 UART: [art] SIG.S = E00A110830A948469D7EFC2333B2594178254E588D916E7CB53F9D9FD0FD88E32F18C727AFF4FC885890D800CB11B9ED
3,308,723 UART: Caliptra RT
3,309,069 UART: [state] CFI Enabled
3,417,612 UART: [rt] RT listening for mailbox commands...
3,418,275 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,727 UART: [rt]cmd =0x46504c54, len=4
3,448,885 >>> mbox cmd response data (8 bytes)
3,449,220 UART: [rt] FIPS self test
3,449,548 UART: [kat] ++
3,449,700 UART: [kat] sha1
3,453,876 UART: [kat] SHA2-256
3,456,000 UART: Fatal Error: 0x90010002
3,457,550 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,457,555 >>> mbox cmd response: failed
3,457,555 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,457,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,630 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
893,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,741 UART: [kat] ++
897,893 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,708 UART: [kat] SHA2-512-ACC
908,609 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,539 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 ready_for_fw is high
1,176,483 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,200,907 UART: [idev] Sha1 KeyId Algorithm
1,209,239 UART: [idev] --
1,210,317 UART: [ldev] ++
1,210,485 UART: [ldev] CDI.KEYID = 6
1,210,848 UART: [ldev] SUBJECT.KEYID = 5
1,211,274 UART: [ldev] AUTHORITY.KEYID = 7
1,211,737 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,159 UART: [ldev] --
1,282,490 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,864 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,457 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,544 >>> mbox cmd response: success
2,786,796 UART: [afmc] ++
2,786,964 UART: [afmc] CDI.KEYID = 6
2,787,326 UART: [afmc] SUBJECT.KEYID = 7
2,787,751 UART: [afmc] AUTHORITY.KEYID = 5
2,822,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,439 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,343 UART: [afmc] --
2,866,423 UART: [cold-reset] --
2,867,305 UART: [state] Locking Datavault
2,868,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,096 UART: [state] Locking ICCM
2,869,750 UART: [exit] Launching FMC @ 0x40000130
2,875,079 UART:
2,875,095 UART: Running Caliptra FMC ...
2,875,503 UART:
2,875,557 UART: [state] CFI Enabled
2,885,936 UART: [fht] FMC Alias Private Key: 7
2,993,941 UART: [art] Extend RT PCRs Done
2,994,369 UART: [art] Lock RT PCRs Done
2,996,051 UART: [art] Populate DV Done
3,004,142 UART: [fht] FMC Alias Private Key: 7
3,005,248 UART: [art] Derive CDI
3,005,528 UART: [art] Store in in slot 0x4
3,091,303 UART: [art] Derive Key Pair
3,091,663 UART: [art] Store priv key in slot 0x5
3,104,401 UART: [art] Derive Key Pair - Done
3,118,803 UART: [art] Signing Cert with AUTHO
3,119,283 UART: RITY.KEYID = 7
3,134,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,602 UART: [art] PUB.X = 0DC6524FA4E6D3A681FFB40B175CDBE5B47C00052FB3C010F4957E7AA8214445029DF07AA0B846920BB497039369E182
3,142,334 UART: [art] PUB.Y = E43F393E6EA24066AFFA227905164526E0333DC404AA63C4AAEF7945D16F8F4A9682BE39B3795ED68764A2A47B556B99
3,149,280 UART: [art] SIG.R = C3A80EBFBBDFE27A27E1A3E6A8610621FDD70EE0BCEBEC366EFE9356A866BFE86264E62900F817B9266A231F57B28D5A
3,156,039 UART: [art] SIG.S = C907562CE7330A885DEF643F4AD29217334F67BE4FD9EC70D6B5D0D649856553E36FC8A4342360D3B807A9B2C9DA18A2
3,179,219 UART: Caliptra RT
3,179,473 UART: [state] CFI Enabled
3,287,108 UART: [rt] RT listening for mailbox commands...
3,287,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,533 UART: [rt]cmd =0x46504c54, len=4
3,318,869 >>> mbox cmd response data (8 bytes)
3,319,148 UART: [rt] FIPS self test
3,319,476 UART: [kat] ++
3,319,628 UART: [kat] sha1
3,323,762 UART: [kat] SHA2-256
3,325,736 UART: Fatal Error: 0x90010002
3,327,286 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,291 >>> mbox cmd response: failed
3,327,291 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
893,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,787 UART: [kat] ++
897,939 UART: [kat] sha1
902,215 UART: [kat] SHA2-256
904,155 UART: [kat] SHA2-384
906,742 UART: [kat] SHA2-512-ACC
908,643 UART: [kat] ECC-384
918,594 UART: [kat] HMAC-384Kdf
923,330 UART: [kat] LMS
1,171,658 UART: [kat] --
1,172,487 UART: [cold-reset] ++
1,173,017 UART: [fht] FHT @ 0x50003400
1,175,606 UART: [idev] ++
1,175,774 UART: [idev] CDI.KEYID = 6
1,176,134 UART: [idev] SUBJECT.KEYID = 7
1,176,558 UART: [idev] UDS.KEYID = 0
1,176,903 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,458 UART: [idev] Erasing UDS.KEYID = 0
1,201,517 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,210,925 UART: [ldev] ++
1,211,093 UART: [ldev] CDI.KEYID = 6
1,211,456 UART: [ldev] SUBJECT.KEYID = 5
1,211,882 UART: [ldev] AUTHORITY.KEYID = 7
1,212,345 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,625 UART: [ldev] --
1,283,046 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,551 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,692 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,587 ready_for_fw is high
1,060,587 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,951 >>> mbox cmd response: success
2,699,651 UART:
2,699,667 UART: Running Caliptra FMC ...
2,700,075 UART:
2,700,129 UART: [state] CFI Enabled
2,710,694 UART: [fht] FMC Alias Private Key: 7
2,818,801 UART: [art] Extend RT PCRs Done
2,819,229 UART: [art] Lock RT PCRs Done
2,820,871 UART: [art] Populate DV Done
2,828,878 UART: [fht] FMC Alias Private Key: 7
2,830,046 UART: [art] Derive CDI
2,830,326 UART: [art] Store in in slot 0x4
2,915,919 UART: [art] Derive Key Pair
2,916,279 UART: [art] Store priv key in slot 0x5
2,929,229 UART: [art] Derive Key Pair - Done
2,944,227 UART: [art] Signing Cert with AUTHO
2,944,707 UART: RITY.KEYID = 7
2,960,213 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,978 UART: [art] PUB.X = 134F4B59205DC3FD88D514647A207FD32397C67DFA4AD515105E18777EFAB64BC4425798ACD703754C955C6D5B7FDAA9
2,967,751 UART: [art] PUB.Y = FA07E7984D73D38FD19A33E10C11422BD70A26D90B4A8E710264D34DE27AD201A30DA931154DDDF94546106D5ABF33FF
2,974,688 UART: [art] SIG.R = 27542747FDEDD07618314F061152BDF962492E87C49442A857BD9CABA51881A88581EEB0A7F574987DD329062A50E330
2,981,446 UART: [art] SIG.S = DD6A364394BB45002E0878A512AA3A9489B963C503AFAABD16D98BA39B9365C33F398434A2560B493D95B5E265F29596
3,005,458 UART: Caliptra RT
3,005,712 UART: [state] CFI Enabled
3,113,658 UART: [rt] RT listening for mailbox commands...
3,114,321 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,875 UART: [rt]cmd =0x46504c54, len=4
3,145,015 >>> mbox cmd response data (8 bytes)
3,145,248 UART: [rt] FIPS self test
3,145,576 UART: [kat] ++
3,145,728 UART: [kat] sha1
3,149,998 UART: [kat] SHA2-256
3,152,078 UART: Fatal Error: 0x90010002
3,153,628 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,153,633 >>> mbox cmd response: failed
3,153,633 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,153,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,557 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,417 UART: [kat] HMAC-384Kdf
922,943 UART: [kat] LMS
1,171,271 UART: [kat] --
1,172,096 UART: [cold-reset] ++
1,172,510 UART: [fht] FHT @ 0x50003400
1,175,067 UART: [idev] ++
1,175,235 UART: [idev] CDI.KEYID = 6
1,175,595 UART: [idev] SUBJECT.KEYID = 7
1,176,019 UART: [idev] UDS.KEYID = 0
1,176,364 ready_for_fw is high
1,176,364 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,787 UART: [idev] Erasing UDS.KEYID = 0
1,200,974 UART: [idev] Sha1 KeyId Algorithm
1,209,414 UART: [idev] --
1,210,308 UART: [ldev] ++
1,210,476 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,265 UART: [ldev] AUTHORITY.KEYID = 7
1,211,728 UART: [ldev] FE.KEYID = 1
1,217,004 UART: [ldev] Erasing FE.KEYID = 1
1,242,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,098 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,331 UART: [fwproc] Recv command 0x46574c44
1,284,059 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,399 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,490 >>> mbox cmd response: success
2,786,700 UART: [afmc] ++
2,786,868 UART: [afmc] CDI.KEYID = 6
2,787,230 UART: [afmc] SUBJECT.KEYID = 7
2,787,655 UART: [afmc] AUTHORITY.KEYID = 5
2,823,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,632 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,351 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,327 UART: [afmc] --
2,867,293 UART: [cold-reset] --
2,868,161 UART: [state] Locking Datavault
2,869,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,166 UART: [state] Locking ICCM
2,870,732 UART: [exit] Launching FMC @ 0x40000130
2,876,061 UART:
2,876,077 UART: Running Caliptra FMC ...
2,876,485 UART:
2,876,628 UART: [state] CFI Enabled
2,887,165 UART: [fht] FMC Alias Private Key: 7
2,994,804 UART: [art] Extend RT PCRs Done
2,995,232 UART: [art] Lock RT PCRs Done
2,996,940 UART: [art] Populate DV Done
3,005,023 UART: [fht] FMC Alias Private Key: 7
3,006,111 UART: [art] Derive CDI
3,006,391 UART: [art] Store in in slot 0x4
3,092,270 UART: [art] Derive Key Pair
3,092,630 UART: [art] Store priv key in slot 0x5
3,105,840 UART: [art] Derive Key Pair - Done
3,120,857 UART: [art] Signing Cert with AUTHO
3,121,337 UART: RITY.KEYID = 7
3,136,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,416 UART: [art] PUB.X = DC47041CD440D081B818004432942EF5CBD59499B4AFAD0A84BAF4BA9FD90221486F50914F6A0F656F8ECCE9718FFAC0
3,144,164 UART: [art] PUB.Y = EF655B93632152ECE34D3FE6B6A502B851CF2611FED61FC6A0AA4198C4CFE71E589CD57F600C5254C655B96002CFE463
3,151,115 UART: [art] SIG.R = 9ECBB398F692C98FC49F0C18572795BF5F0C23BC03B920C61D0DE17B8019A91DACE4698E7D48C21FB8E1742B491592EC
3,157,883 UART: [art] SIG.S = 481CA6BE5746E9BD6431432A3E0617EF421C957DC5D45CED01383EACD9936C92751D34D4F0C91A3F682B6035552289D3
3,181,698 UART: Caliptra RT
3,182,044 UART: [state] CFI Enabled
3,290,080 UART: [rt] RT listening for mailbox commands...
3,290,743 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,367 UART: [rt]cmd =0x46504c54, len=4
3,321,491 >>> mbox cmd response data (8 bytes)
3,321,834 UART: [rt] FIPS self test
3,322,162 UART: [kat] ++
3,322,314 UART: [kat] sha1
3,326,646 UART: [kat] SHA2-256
3,328,588 UART: Fatal Error: 0x90010002
3,330,138 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,330,143 >>> mbox cmd response: failed
3,330,143 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,330,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
902,100 UART: [kat] SHA2-256
904,040 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,571 UART: [kat] HMAC-384Kdf
923,347 UART: [kat] LMS
1,171,675 UART: [kat] --
1,172,558 UART: [cold-reset] ++
1,173,110 UART: [fht] FHT @ 0x50003400
1,175,711 UART: [idev] ++
1,175,879 UART: [idev] CDI.KEYID = 6
1,176,239 UART: [idev] SUBJECT.KEYID = 7
1,176,663 UART: [idev] UDS.KEYID = 0
1,177,008 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,797 UART: [idev] Erasing UDS.KEYID = 0
1,201,848 UART: [idev] Sha1 KeyId Algorithm
1,210,276 UART: [idev] --
1,211,262 UART: [ldev] ++
1,211,430 UART: [ldev] CDI.KEYID = 6
1,211,793 UART: [ldev] SUBJECT.KEYID = 5
1,212,219 UART: [ldev] AUTHORITY.KEYID = 7
1,212,682 UART: [ldev] FE.KEYID = 1
1,217,944 UART: [ldev] Erasing FE.KEYID = 1
1,244,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,588 UART: [ldev] --
1,283,949 UART: [fwproc] Wait for Commands...
1,284,569 UART: [fwproc] Recv command 0x46574c44
1,285,297 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,467 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,552 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,492 ready_for_fw is high
1,060,492 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,180 >>> mbox cmd response: success
2,699,844 UART:
2,699,860 UART: Running Caliptra FMC ...
2,700,268 UART:
2,700,411 UART: [state] CFI Enabled
2,710,536 UART: [fht] FMC Alias Private Key: 7
2,818,445 UART: [art] Extend RT PCRs Done
2,818,873 UART: [art] Lock RT PCRs Done
2,820,387 UART: [art] Populate DV Done
2,828,900 UART: [fht] FMC Alias Private Key: 7
2,829,978 UART: [art] Derive CDI
2,830,258 UART: [art] Store in in slot 0x4
2,915,963 UART: [art] Derive Key Pair
2,916,323 UART: [art] Store priv key in slot 0x5
2,930,455 UART: [art] Derive Key Pair - Done
2,944,998 UART: [art] Signing Cert with AUTHO
2,945,478 UART: RITY.KEYID = 7
2,960,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,299 UART: [art] PUB.X = 3297AC24970DB0620471760F98BC8BE27C5C1D7D03F494323633EC201F7F44C384AB0AAA9E9661C7B2BB98EF6A5CCE68
2,968,062 UART: [art] PUB.Y = B65E0A7992C6E43B4E34870AF669476D8CCFFA507E3F5234A201FC10ED6D5796383EDF619D69B28011520B2365BD8376
2,975,000 UART: [art] SIG.R = 4258FC5FB61684BD089F7CE03BD98A71CADBAB2D4F4B3CDFBB40787CD688AF62380A386E9C90F93438E70A4166014809
2,981,765 UART: [art] SIG.S = EC071510F258F4BF4C8603D405F39BD5689AD245914BA85923A57406046C70DFC8B51A3B65242C163A60A116B23910C0
3,006,149 UART: Caliptra RT
3,006,495 UART: [state] CFI Enabled
3,114,069 UART: [rt] RT listening for mailbox commands...
3,114,732 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,186 UART: [rt]cmd =0x46504c54, len=4
3,145,444 >>> mbox cmd response data (8 bytes)
3,145,575 UART: [rt] FIPS self test
3,145,903 UART: [kat] ++
3,146,055 UART: [kat] sha1
3,150,309 UART: [kat] SHA2-256
3,152,299 UART: Fatal Error: 0x90010002
3,153,849 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,153,854 >>> mbox cmd response: failed
3,153,854 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,153,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,112 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,058 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,160 UART: [kat] SHA2-512-ACC
906,061 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,174,267 ready_for_fw is high
1,174,267 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,831 UART: [idev] Erasing UDS.KEYID = 0
1,199,367 UART: [idev] Sha1 KeyId Algorithm
1,208,259 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,503 UART: [ldev] AUTHORITY.KEYID = 7
1,210,966 UART: [ldev] FE.KEYID = 1
1,216,192 UART: [ldev] Erasing FE.KEYID = 1
1,242,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,296 UART: [ldev] --
1,281,786 UART: [fwproc] Wait for Commands...
1,282,365 UART: [fwproc] Recv command 0x46574c44
1,283,098 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,078 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,144 >>> mbox cmd response: success
2,785,367 UART: [afmc] ++
2,785,535 UART: [afmc] CDI.KEYID = 6
2,785,898 UART: [afmc] SUBJECT.KEYID = 7
2,786,324 UART: [afmc] AUTHORITY.KEYID = 5
2,822,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,488 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,217 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,819 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,732 UART: [afmc] --
2,865,692 UART: [cold-reset] --
2,866,798 UART: [state] Locking Datavault
2,867,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,517 UART: [state] Locking ICCM
2,869,035 UART: [exit] Launching FMC @ 0x40000130
2,874,364 UART:
2,874,380 UART: Running Caliptra FMC ...
2,874,788 UART:
2,874,842 UART: [state] CFI Enabled
2,885,569 UART: [fht] FMC Alias Private Key: 7
2,993,564 UART: [art] Extend RT PCRs Done
2,993,992 UART: [art] Lock RT PCRs Done
2,995,850 UART: [art] Populate DV Done
3,004,019 UART: [fht] FMC Alias Private Key: 7
3,005,007 UART: [art] Derive CDI
3,005,287 UART: [art] Store in in slot 0x4
3,090,484 UART: [art] Derive Key Pair
3,090,844 UART: [art] Store priv key in slot 0x5
3,103,714 UART: [art] Derive Key Pair - Done
3,118,842 UART: [art] Signing Cert with AUTHO
3,119,322 UART: RITY.KEYID = 7
3,134,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,125 UART: [art] PUB.X = 3D99D5C495ECAADDA9015F257D81AF1BD49C044428224D221EA98C8928D0E0EE813D458A0AEE7A69C5E46AE9125E6B68
3,141,898 UART: [art] PUB.Y = 4313847CF2725E41167DF91F1ED6E9C7146FA3B08DF2B137982E54A6E62144B69946FCF6C37C56657342046FF071A701
3,148,836 UART: [art] SIG.R = 0AC656E9620E8CD7D271DCE7DEFDDB38298B48E5D5D775AD33C65958A03B5418247F5479B5EE0C516D6C01C34DA66D52
3,155,604 UART: [art] SIG.S = 9122D842F454E3D5BD896A3DB9C246F0A0D1755100971BB188C455C19EB6E1AB450A9A4CD4A3A7168CC03CA72D2C3218
3,179,534 UART: Caliptra RT
3,179,788 UART: [state] CFI Enabled
3,287,686 UART: [rt] RT listening for mailbox commands...
3,288,349 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,975 UART: [rt]cmd =0x46504c54, len=4
3,319,277 >>> mbox cmd response data (8 bytes)
3,319,484 UART: [rt] FIPS self test
3,319,812 UART: [kat] ++
3,319,964 UART: [kat] sha1
3,324,074 UART: [kat] SHA2-256
3,326,200 UART: Fatal Error: 0x90010002
3,327,750 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,755 >>> mbox cmd response: failed
3,327,755 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
919,990 UART: [kat] LMS
1,168,302 UART: [kat] --
1,169,099 UART: [cold-reset] ++
1,169,631 UART: [fht] FHT @ 0x50003400
1,172,323 UART: [idev] ++
1,172,491 UART: [idev] CDI.KEYID = 6
1,172,852 UART: [idev] SUBJECT.KEYID = 7
1,173,277 UART: [idev] UDS.KEYID = 0
1,173,623 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,073 UART: [idev] Erasing UDS.KEYID = 0
1,198,563 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,332 UART: [fwproc] Wait for Commands...
1,280,963 UART: [fwproc] Recv command 0x46574c44
1,281,696 UART: [fwproc] Recv'd Img size: 115224 bytes
2,588,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,580 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,756 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,162 ready_for_fw is high
1,056,162 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,582 >>> mbox cmd response: success
2,695,594 UART:
2,695,610 UART: Running Caliptra FMC ...
2,696,018 UART:
2,696,072 UART: [state] CFI Enabled
2,706,869 UART: [fht] FMC Alias Private Key: 7
2,814,736 UART: [art] Extend RT PCRs Done
2,815,164 UART: [art] Lock RT PCRs Done
2,816,588 UART: [art] Populate DV Done
2,824,653 UART: [fht] FMC Alias Private Key: 7
2,825,623 UART: [art] Derive CDI
2,825,903 UART: [art] Store in in slot 0x4
2,911,780 UART: [art] Derive Key Pair
2,912,140 UART: [art] Store priv key in slot 0x5
2,925,208 UART: [art] Derive Key Pair - Done
2,939,675 UART: [art] Signing Cert with AUTHO
2,940,155 UART: RITY.KEYID = 7
2,955,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,224 UART: [art] PUB.X = 937555981A304B3D18915E7B4127900CC2EF38435E43E1A5038752DB115E2D9AEFFAC17B2BE3BF5792B12049CED8C5B4
2,962,992 UART: [art] PUB.Y = B2D3516E0EBDE18917F8E4DB148AFFF5AEF25D576E2B72BC985CFF94982858F670C57852856DF89C88D1A2ED1AFE430F
2,969,952 UART: [art] SIG.R = 4A3240C2BAFC47CF20931C2E7A0C4327F8611EEB7551DAE1D1D52B911F93F3A578A2794510A99CB7DC8BA8022D92CDA2
2,976,728 UART: [art] SIG.S = C06A1DF00B594D4DD1569FDA5FB62168900D0EF7532E8585A2225EF0C4D29268EA9BE9BE40AF0C89FBE784C9D5A6DD14
3,000,813 UART: Caliptra RT
3,001,067 UART: [state] CFI Enabled
3,108,765 UART: [rt] RT listening for mailbox commands...
3,109,428 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,064 UART: [rt]cmd =0x46504c54, len=4
3,140,332 >>> mbox cmd response data (8 bytes)
3,140,645 UART: [rt] FIPS self test
3,140,973 UART: [kat] ++
3,141,125 UART: [kat] sha1
3,145,259 UART: [kat] SHA2-256
3,147,317 UART: Fatal Error: 0x90010002
3,148,867 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,148,872 >>> mbox cmd response: failed
3,148,872 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,148,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,638 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,910 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,953 UART: [kat] HMAC-384Kdf
921,615 UART: [kat] LMS
1,169,927 UART: [kat] --
1,170,878 UART: [cold-reset] ++
1,171,238 UART: [fht] FHT @ 0x50003400
1,173,950 UART: [idev] ++
1,174,118 UART: [idev] CDI.KEYID = 6
1,174,479 UART: [idev] SUBJECT.KEYID = 7
1,174,904 UART: [idev] UDS.KEYID = 0
1,175,250 ready_for_fw is high
1,175,250 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,858 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,513 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,282,065 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,767 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,029 >>> mbox cmd response: success
2,785,296 UART: [afmc] ++
2,785,464 UART: [afmc] CDI.KEYID = 6
2,785,827 UART: [afmc] SUBJECT.KEYID = 7
2,786,253 UART: [afmc] AUTHORITY.KEYID = 5
2,821,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,931 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,257 UART: [afmc] --
2,865,217 UART: [cold-reset] --
2,865,991 UART: [state] Locking Datavault
2,866,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,558 UART: [state] Locking ICCM
2,868,140 UART: [exit] Launching FMC @ 0x40000130
2,873,469 UART:
2,873,485 UART: Running Caliptra FMC ...
2,873,893 UART:
2,874,036 UART: [state] CFI Enabled
2,884,507 UART: [fht] FMC Alias Private Key: 7
2,991,908 UART: [art] Extend RT PCRs Done
2,992,336 UART: [art] Lock RT PCRs Done
2,994,102 UART: [art] Populate DV Done
3,002,211 UART: [fht] FMC Alias Private Key: 7
3,003,237 UART: [art] Derive CDI
3,003,517 UART: [art] Store in in slot 0x4
3,089,326 UART: [art] Derive Key Pair
3,089,686 UART: [art] Store priv key in slot 0x5
3,102,764 UART: [art] Derive Key Pair - Done
3,117,610 UART: [art] Signing Cert with AUTHO
3,118,090 UART: RITY.KEYID = 7
3,133,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,309 UART: [art] PUB.X = 64A6E02483845431B47B758670B589BE1CC162177F4DA95DE61D84D69F305EB7BD2518EF3E9EA1DFCF99E9ADC2279EB9
3,141,089 UART: [art] PUB.Y = D34CF7E83868731CD93B4B39D5FFBD0FB4EC7CC1ACB537D797AF8D2957C7D628C55952381D7240428081BABF8EB573F6
3,148,048 UART: [art] SIG.R = DB00FCC75909BC4DFE53F818C361FE5A53B45EC2A90351F235C3313840787B0401192559496E976A03B5FEC903D545C1
3,154,776 UART: [art] SIG.S = E7363FB192343B2D9189C00794B40E77B6354D08683690E61AC82CCD7B0F338E244B100627858117A33C6EC378708350
3,178,836 UART: Caliptra RT
3,179,182 UART: [state] CFI Enabled
3,286,735 UART: [rt] RT listening for mailbox commands...
3,287,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,910 UART: [rt]cmd =0x46504c54, len=4
3,318,140 >>> mbox cmd response data (8 bytes)
3,318,409 UART: [rt] FIPS self test
3,318,737 UART: [kat] ++
3,318,889 UART: [kat] sha1
3,323,245 UART: [kat] SHA2-256
3,325,179 UART: Fatal Error: 0x90010002
3,326,729 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,326,734 >>> mbox cmd response: failed
3,326,734 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,326,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,208 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,209,001 UART: [ldev] ++
1,209,169 UART: [ldev] CDI.KEYID = 6
1,209,533 UART: [ldev] SUBJECT.KEYID = 5
1,209,960 UART: [ldev] AUTHORITY.KEYID = 7
1,210,423 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,241,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,873 UART: [ldev] --
1,281,155 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,619 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,751 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,029 ready_for_fw is high
1,056,029 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,429 >>> mbox cmd response: success
2,695,969 UART:
2,695,985 UART: Running Caliptra FMC ...
2,696,393 UART:
2,696,536 UART: [state] CFI Enabled
2,707,403 UART: [fht] FMC Alias Private Key: 7
2,815,180 UART: [art] Extend RT PCRs Done
2,815,608 UART: [art] Lock RT PCRs Done
2,817,544 UART: [art] Populate DV Done
2,826,007 UART: [fht] FMC Alias Private Key: 7
2,827,087 UART: [art] Derive CDI
2,827,367 UART: [art] Store in in slot 0x4
2,913,076 UART: [art] Derive Key Pair
2,913,436 UART: [art] Store priv key in slot 0x5
2,926,420 UART: [art] Derive Key Pair - Done
2,941,491 UART: [art] Signing Cert with AUTHO
2,941,971 UART: RITY.KEYID = 7
2,957,519 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,284 UART: [art] PUB.X = 8E416FE828F8AF293064B69A1C34DFE2F3793F5443133A88AA4BD6F17DA2411A4442E06E1DE8943283869FD26EDAD941
2,965,058 UART: [art] PUB.Y = 9871E4565FD40F84FADE8BDF7DDA39346585785628A22EA826958C324C0EC6035012BD9101A3C9B516EC8FA0EE9CCD83
2,972,004 UART: [art] SIG.R = 43417A48EE0C7BE06E57ABDDAA5C922AE3F76DCBE509226581B385B8C01A39B1ABE310F82A1DE73837BD91CE82924DA9
2,978,784 UART: [art] SIG.S = 4348766CC28056927A32897C634669E30A4EDE3DCC1A404D23875DB85B5F451C97B3A08BFE58973903E26B60C9686B47
3,002,663 UART: Caliptra RT
3,003,009 UART: [state] CFI Enabled
3,110,651 UART: [rt] RT listening for mailbox commands...
3,111,314 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,856 UART: [rt]cmd =0x46504c54, len=4
3,142,006 >>> mbox cmd response data (8 bytes)
3,142,347 UART: [rt] FIPS self test
3,142,675 UART: [kat] ++
3,142,827 UART: [kat] sha1
3,147,093 UART: [kat] SHA2-256
3,149,205 UART: Fatal Error: 0x90010002
3,150,755 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,760 >>> mbox cmd response: failed
3,150,760 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,775 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,839 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,694,429 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,838,928 >>> mbox cmd response: failed
2,840,168 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,983,981 >>> mbox cmd response: failed
Initializing fuses
1,006 writing to cptra_bootfsm_go
4,870,223 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,421,153 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,693,586 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,838,251 >>> mbox cmd response: failed
2,839,500 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,983,132 >>> mbox cmd response: failed
Initializing fuses
1,034 writing to cptra_bootfsm_go
4,863,378 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,466,328 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,046,729 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,190,722 >>> mbox cmd response: failed
3,191,297 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,334,725 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,579,719 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,021,696 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,043,418 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,187,513 >>> mbox cmd response: failed
3,188,081 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,331,137 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
21,591,432 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,031,448 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,694,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,839,321 >>> mbox cmd response: failed
2,839,889 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,983,522 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,444,401 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,252,030 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,704,776 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,849,290 >>> mbox cmd response: failed
2,849,856 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,993,534 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,433,436 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,261,830 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,706,477 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,850,857 >>> mbox cmd response: failed
2,851,425 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,995,586 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,451,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,249,407 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,613 writing to cptra_bootfsm_go
3,062,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,207,364 >>> mbox cmd response: failed
3,207,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,351,402 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,164,284 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,870,397 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,055,423 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,200,511 >>> mbox cmd response: failed
3,201,077 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,344,704 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
20,191,978 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,897,330 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,458 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,466 >>> mbox cmd response: failed
812,466 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,283 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,480 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,192 >>> mbox cmd response: failed
812,192 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,979 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,718 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,065 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,073 >>> mbox cmd response: failed
812,073 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,934 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,465 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,669 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,677 >>> mbox cmd response: failed
812,677 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,338 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,027 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,198 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,206 >>> mbox cmd response: failed
811,206 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,581 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,702 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,070 >>> mbox cmd response: failed
812,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,673 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,630 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,929 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,937 >>> mbox cmd response: failed
811,937 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,018 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,495 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,173 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,181 >>> mbox cmd response: failed
812,181 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,228 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,649,199 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,892 >>> mbox cmd response: failed
811,892 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,838 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,944 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,952 >>> mbox cmd response: failed
811,952 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,533 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,258 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,041 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,049 >>> mbox cmd response: failed
812,049 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,448 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,257 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,483 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,491 >>> mbox cmd response: failed
812,491 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,702 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,385 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,026 UART:
192,392 UART: Running Caliptra ROM ...
193,526 UART:
193,673 UART: [state] CFI Enabled
262,839 UART: [state] LifecycleState = Unprovisioned
264,754 UART: [state] DebugLocked = No
267,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,445 UART: [kat] SHA2-256
442,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,643 UART: [kat] ++
453,171 UART: [kat] sha1
464,217 UART: [kat] SHA2-256
466,946 UART: [kat] SHA2-384
472,732 UART: [kat] SHA2-512-ACC
475,114 UART: [kat] ECC-384
2,771,336 UART: [kat] HMAC-384Kdf
2,803,041 UART: [kat] LMS
3,993,375 UART: [kat] --
3,996,681 UART: [cold-reset] ++
3,999,254 UART: [fht] Storing FHT @ 0x50003400
4,010,457 UART: [idev] ++
4,011,026 UART: [idev] CDI.KEYID = 6
4,011,917 UART: [idev] SUBJECT.KEYID = 7
4,013,236 UART: [idev] UDS.KEYID = 0
4,014,223 ready_for_fw is high
4,014,451 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,159,071 UART: [idev] Erasing UDS.KEYID = 0
7,350,456 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,493 UART: [idev] --
7,376,385 UART: [ldev] ++
7,377,010 UART: [ldev] CDI.KEYID = 6
7,377,941 UART: [ldev] SUBJECT.KEYID = 5
7,379,161 UART: [ldev] AUTHORITY.KEYID = 7
7,380,398 UART: [ldev] FE.KEYID = 1
7,425,058 UART: [ldev] Erasing FE.KEYID = 1
10,757,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,402 UART: [ldev] --
13,118,363 UART: [fwproc] Waiting for Commands...
13,120,572 UART: [fwproc] Received command 0x46574c44
13,122,816 UART: [fwproc] Received Image of size 114916 bytes
17,186,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,049 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,653,808 >>> mbox cmd response: success
17,658,555 UART: [afmc] ++
17,659,148 UART: [afmc] CDI.KEYID = 6
17,660,061 UART: [afmc] SUBJECT.KEYID = 7
17,661,283 UART: [afmc] AUTHORITY.KEYID = 5
21,028,539 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,352 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,749 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,557 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,057 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,667 UART: [afmc] --
23,399,702 UART: [cold-reset] --
23,403,727 UART: [state] Locking Datavault
23,407,608 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,319 UART: [state] Locking ICCM
23,410,608 UART: [exit] Launching FMC @ 0x40000130
23,418,956 UART:
23,419,195 UART: Running Caliptra FMC ...
23,420,295 UART:
23,420,461 UART: [state] CFI Enabled
23,489,645 UART: [fht] FMC Alias Private Key: 7
25,827,692 UART: [art] Extend RT PCRs Done
25,828,918 UART: [art] Lock RT PCRs Done
25,830,757 UART: [art] Populate DV Done
25,836,171 UART: [fht] FMC Alias Private Key: 7
25,837,727 UART: [art] Derive CDI
25,838,549 UART: [art] Store in in slot 0x4
25,897,794 UART: [art] Derive Key Pair
25,898,834 UART: [art] Store priv key in slot 0x5
29,191,706 UART: [art] Derive Key Pair - Done
29,204,814 UART: [art] Signing Cert with AUTHO
29,206,124 UART: RITY.KEYID = 7
31,493,178 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,682 UART: [art] PUB.X = B349D59C3EEA73A208D7CF0DB62A6365504716A7F70A0609E1D61666A30EF1B921A1F10884E04454C78B822EB9FE5160
31,501,936 UART: [art] PUB.Y = F0CE7C9B55AB5ED7F63BF0D1CED3656D1DE56BA4860C4607C5366C12480713B85BC8B60365749A89FD0D2E994F544458
31,509,188 UART: [art] SIG.R = 3FCEC70FFD9C8B64E31797D1F78EA11F38EB0058C48B619D66A8FC889C1A7D4E53996BE94504A2EECB5651111DF5EBAF
31,516,535 UART: [art] SIG.S = 6E3410CC18E27D43D6BAA4A75129E9ACEE896324639C576128A0E72B854B091262F38F41D700C186DF8425836B1AE871
32,821,735 UART: Caliptra RT
32,822,437 UART: [state] CFI Enabled
33,002,964 UART: [rt] RT listening for mailbox commands...
33,004,827 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,034,642 UART: [rt]cmd =0x46504c54, len=4
33,036,218 >>> mbox cmd response data (8 bytes)
33,037,357 UART: [rt] FIPS self test
33,038,308 UART: [kat] ++
33,038,761 UART: [kat] sha1
33,043,166 UART: [kat] SHA2-256
33,045,094 UART: [kat] SHA2-384
33,048,229 UART: [kat] SHA2-512-ACC
33,049,116 UART: Droping operation
33,049,887 UART: Fatal Error: 0x90050002
33,085,525 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,229,763 >>> mbox cmd response: failed
33,230,430 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,374,686 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,030 UART:
190,327 UART: Running Caliptra ROM ...
191,351 UART:
191,491 UART: [state] CFI Enabled
248,584 UART: [state] LifecycleState = Unprovisioned
250,526 UART: [state] DebugLocked = No
252,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,681 UART: [kat] SHA2-256
426,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
436,888 UART: [kat] ++
437,420 UART: [kat] sha1
448,631 UART: [kat] SHA2-256
451,313 UART: [kat] SHA2-384
458,096 UART: [kat] SHA2-512-ACC
460,440 UART: [kat] ECC-384
2,752,502 UART: [kat] HMAC-384Kdf
2,784,911 UART: [kat] LMS
3,975,240 UART: [kat] --
3,981,303 UART: [cold-reset] ++
3,983,182 UART: [fht] Storing FHT @ 0x50003400
3,995,847 UART: [idev] ++
3,996,411 UART: [idev] CDI.KEYID = 6
3,997,290 UART: [idev] SUBJECT.KEYID = 7
3,998,556 UART: [idev] UDS.KEYID = 0
4,000,100 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,144,744 UART: [idev] Erasing UDS.KEYID = 0
7,334,094 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,342 UART: [idev] --
7,359,139 UART: [ldev] ++
7,359,712 UART: [ldev] CDI.KEYID = 6
7,360,653 UART: [ldev] SUBJECT.KEYID = 5
7,361,841 UART: [ldev] AUTHORITY.KEYID = 7
7,363,200 UART: [ldev] FE.KEYID = 1
7,405,535 UART: [ldev] Erasing FE.KEYID = 1
10,739,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,614 UART: [ldev] --
13,100,775 UART: [fwproc] Waiting for Commands...
13,103,360 UART: [fwproc] Received command 0x46574c44
13,105,650 UART: [fwproc] Received Image of size 114916 bytes
17,169,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,638,849 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,802,152 ready_for_fw is high
3,802,588 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,864,322 >>> mbox cmd response: success
23,546,983 UART:
23,547,392 UART: Running Caliptra FMC ...
23,548,543 UART:
23,548,709 UART: [state] CFI Enabled
23,613,732 UART: [fht] FMC Alias Private Key: 7
25,952,390 UART: [art] Extend RT PCRs Done
25,953,613 UART: [art] Lock RT PCRs Done
25,955,240 UART: [art] Populate DV Done
25,960,659 UART: [fht] FMC Alias Private Key: 7
25,962,308 UART: [art] Derive CDI
25,963,125 UART: [art] Store in in slot 0x4
26,021,691 UART: [art] Derive Key Pair
26,022,730 UART: [art] Store priv key in slot 0x5
29,316,580 UART: [art] Derive Key Pair - Done
29,329,690 UART: [art] Signing Cert with AUTHO
29,330,999 UART: RITY.KEYID = 7
31,617,944 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,454 UART: [art] PUB.X = CD99DC5A662AB315CB4E6FB37D6E24AC10BC7A31C5EAA1A5C5AA9ACB6695563130AC36424E827C86660CD5F95BD36B70
31,626,717 UART: [art] PUB.Y = CE9F4BF1E97F010E0AFE242CC95B954F64F93D040317AB3F5EBC5D793ECDF369911C537227D91FFA250AF26C6DECBCE7
31,633,972 UART: [art] SIG.R = C6EB58F08D4D33D58DCD2E69B7B40E4A6E5B6158F5E26BF76170C599B1DBDA331BF87DAA7F6D7D57DE73F1BE68CA340B
31,641,406 UART: [art] SIG.S = 44C7EC7C0F97F9E4A92F0F9CA5951C9F8DA3ADD4BCE3E87231BACB397FF912C2CB24AE01FF7B9ADBFA242D80D13D9CB0
32,946,722 UART: Caliptra RT
32,947,435 UART: [state] CFI Enabled
33,128,377 UART: [rt] RT listening for mailbox commands...
33,130,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,160,109 UART: [rt]cmd =0x46504c54, len=4
33,161,586 >>> mbox cmd response data (8 bytes)
33,162,492 UART: [rt] FIPS self test
33,163,375 UART: [kat] ++
33,163,820 UART: [kat] sha1
33,168,412 UART: [kat] SHA2-256
33,170,304 UART: [kat] SHA2-384
33,173,429 UART: [kat] SHA2-512-ACC
33,174,425 UART: Droping operation
33,175,207 UART: Fatal Error: 0x90050002
33,210,361 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,354,745 >>> mbox cmd response: failed
33,355,429 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,499,735 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,792,131 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,856,676 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,310 UART:
192,674 UART: Running Caliptra ROM ...
193,881 UART:
603,534 UART: [state] CFI Enabled
614,734 UART: [state] LifecycleState = Unprovisioned
616,677 UART: [state] DebugLocked = No
618,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,721 UART: [kat] SHA2-256
792,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,018 UART: [kat] ++
803,504 UART: [kat] sha1
813,811 UART: [kat] SHA2-256
816,474 UART: [kat] SHA2-384
822,114 UART: [kat] SHA2-512-ACC
824,485 UART: [kat] ECC-384
3,111,340 UART: [kat] HMAC-384Kdf
3,122,200 UART: [kat] LMS
4,312,310 UART: [kat] --
4,317,598 UART: [cold-reset] ++
4,318,850 UART: [fht] Storing FHT @ 0x50003400
4,330,494 UART: [idev] ++
4,331,131 UART: [idev] CDI.KEYID = 6
4,332,009 UART: [idev] SUBJECT.KEYID = 7
4,333,263 UART: [idev] UDS.KEYID = 0
4,334,216 ready_for_fw is high
4,334,417 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,478,737 UART: [idev] Erasing UDS.KEYID = 0
7,615,664 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,750 UART: [idev] --
7,642,884 UART: [ldev] ++
7,643,453 UART: [ldev] CDI.KEYID = 6
7,644,415 UART: [ldev] SUBJECT.KEYID = 5
7,645,656 UART: [ldev] AUTHORITY.KEYID = 7
7,646,899 UART: [ldev] FE.KEYID = 1
7,658,742 UART: [ldev] Erasing FE.KEYID = 1
10,945,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,282 UART: [ldev] --
13,306,767 UART: [fwproc] Waiting for Commands...
13,309,566 UART: [fwproc] Received command 0x46574c44
13,311,815 UART: [fwproc] Received Image of size 114916 bytes
17,371,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,309 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,839,192 >>> mbox cmd response: success
17,843,105 UART: [afmc] ++
17,843,698 UART: [afmc] CDI.KEYID = 6
17,844,720 UART: [afmc] SUBJECT.KEYID = 7
17,845,882 UART: [afmc] AUTHORITY.KEYID = 5
21,161,020 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,560 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,945 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,765 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,198 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,108 UART: [afmc] --
23,527,591 UART: [cold-reset] --
23,531,895 UART: [state] Locking Datavault
23,538,603 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,360 UART: [state] Locking ICCM
23,542,509 UART: [exit] Launching FMC @ 0x40000130
23,550,883 UART:
23,551,125 UART: Running Caliptra FMC ...
23,552,232 UART:
23,552,392 UART: [state] CFI Enabled
23,560,385 UART: [fht] FMC Alias Private Key: 7
25,891,666 UART: [art] Extend RT PCRs Done
25,892,892 UART: [art] Lock RT PCRs Done
25,894,545 UART: [art] Populate DV Done
25,900,066 UART: [fht] FMC Alias Private Key: 7
25,901,716 UART: [art] Derive CDI
25,902,531 UART: [art] Store in in slot 0x4
25,945,240 UART: [art] Derive Key Pair
25,946,283 UART: [art] Store priv key in slot 0x5
29,188,667 UART: [art] Derive Key Pair - Done
29,201,846 UART: [art] Signing Cert with AUTHO
29,203,183 UART: RITY.KEYID = 7
31,482,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,996 UART: [art] PUB.X = 267809A4C0767402DE7206E36EE5DB0F4CADC18133215BE3487CD9D2D55E356322C545345C7362FEB3D274F885358086
31,491,204 UART: [art] PUB.Y = 8DEA41621AB22D273BD773747E087268C70C9AD2AC7A144500AEED20EB0422B8BDEC5325AB83C813269B7EE71E7E115B
31,498,494 UART: [art] SIG.R = 1C404C834B3F668CCF729BBD060226017978580B102E21BBCC60D5867D1857822E43EBEB96237EFC7DE63A79C038C048
31,505,844 UART: [art] SIG.S = 03741BE03CF979AFF49E4105619CB7FE2F92E27F84BD2AB8BCB8BEE24670AFE8072219E358B2D76E68B3FE5A7868162E
32,811,202 UART: Caliptra RT
32,811,922 UART: [state] CFI Enabled
32,929,258 UART: [rt] RT listening for mailbox commands...
32,931,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,960,762 UART: [rt]cmd =0x46504c54, len=4
32,962,215 >>> mbox cmd response data (8 bytes)
32,963,372 UART: [rt] FIPS self test
32,964,325 UART: [kat] ++
32,964,774 UART: [kat] sha1
32,969,337 UART: [kat] SHA2-256
32,971,265 UART: [kat] SHA2-384
32,974,416 UART: [kat] SHA2-512-ACC
32,975,301 UART: Droping operation
32,976,073 UART: Fatal Error: 0x90050002
33,011,141 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,155,503 >>> mbox cmd response: failed
33,156,175 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,300,475 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
189,986 UART:
190,272 UART: Running Caliptra ROM ...
191,301 UART:
7,218,525 UART: [state] CFI Enabled
7,233,566 UART: [state] LifecycleState = Unprovisioned
7,235,486 UART: [state] DebugLocked = No
7,237,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,242,249 UART: [kat] SHA2-256
7,412,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,422,514 UART: [kat] ++
7,422,979 UART: [kat] sha1
7,434,737 UART: [kat] SHA2-256
7,437,428 UART: [kat] SHA2-384
7,443,307 UART: [kat] SHA2-512-ACC
7,445,709 UART: [kat] ECC-384
9,732,301 UART: [kat] HMAC-384Kdf
9,743,712 UART: [kat] LMS
10,933,842 UART: [kat] --
10,937,476 UART: [cold-reset] ++
10,939,086 UART: [fht] Storing FHT @ 0x50003400
10,951,600 UART: [idev] ++
10,952,165 UART: [idev] CDI.KEYID = 6
10,953,131 UART: [idev] SUBJECT.KEYID = 7
10,954,363 UART: [idev] UDS.KEYID = 0
10,955,941 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,100,197 UART: [idev] Erasing UDS.KEYID = 0
14,241,294 UART: [idev] Using Sha1 for KeyId Algorithm
14,262,785 UART: [idev] --
14,268,241 UART: [ldev] ++
14,268,812 UART: [ldev] CDI.KEYID = 6
14,269,746 UART: [ldev] SUBJECT.KEYID = 5
14,271,017 UART: [ldev] AUTHORITY.KEYID = 7
14,272,176 UART: [ldev] FE.KEYID = 1
14,282,092 UART: [ldev] Erasing FE.KEYID = 1
17,573,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,866,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,880,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,895,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,910,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,928,509 UART: [ldev] --
19,933,292 UART: [fwproc] Waiting for Commands...
19,936,469 UART: [fwproc] Received command 0x46574c44
19,938,660 UART: [fwproc] Received Image of size 114916 bytes
23,996,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,072,602 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,141,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,461,680 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,126,425 ready_for_fw is high
4,126,798 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,081,054 >>> mbox cmd response: success
23,723,475 UART:
23,723,856 UART: Running Caliptra FMC ...
23,725,173 UART:
23,725,346 UART: [state] CFI Enabled
23,733,342 UART: [fht] FMC Alias Private Key: 7
26,063,895 UART: [art] Extend RT PCRs Done
26,065,123 UART: [art] Lock RT PCRs Done
26,066,921 UART: [art] Populate DV Done
26,072,236 UART: [fht] FMC Alias Private Key: 7
26,073,727 UART: [art] Derive CDI
26,074,471 UART: [art] Store in in slot 0x4
26,117,066 UART: [art] Derive Key Pair
26,118,072 UART: [art] Store priv key in slot 0x5
29,360,208 UART: [art] Derive Key Pair - Done
29,373,273 UART: [art] Signing Cert with AUTHO
29,374,605 UART: RITY.KEYID = 7
31,653,944 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,457 UART: [art] PUB.X = C06B12D1827C9F800411E898D4CFC0E0DAD387EB819A9DFA5FB25DF23AE0DAA549909AB4DAC895374E07A9D4B3269BE2
31,662,754 UART: [art] PUB.Y = 78F7287D6CABEA343B7C67A8E3B389F07E8BFD71BC0773615E30993096919C0031848A2B59B34AEB8A232B29BDF93BD6
31,669,964 UART: [art] SIG.R = AC594CAA3C97633809A7374CB099CC87BAC8D0F9070548FCF37640E55220ECC4C2CF8B6E7804CC02B0B43D5067D98FC2
31,677,377 UART: [art] SIG.S = E27D0DC2F24EF990B3448B33C5C5565F161B1A312BB210D0BA9783F6DACEBF9282305CFBB7FEAF82F84E5695A3DE1534
32,981,998 UART: Caliptra RT
32,982,696 UART: [state] CFI Enabled
33,100,294 UART: [rt] RT listening for mailbox commands...
33,102,147 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,131,846 UART: [rt]cmd =0x46504c54, len=4
33,133,407 >>> mbox cmd response data (8 bytes)
33,134,577 UART: [rt] FIPS self test
33,135,516 UART: [kat] ++
33,135,965 UART: [kat] sha1
33,140,228 UART: [kat] SHA2-256
33,142,178 UART: [kat] SHA2-384
33,145,190 UART: [kat] SHA2-512-ACC
33,146,149 UART: Droping operation
33,146,923 UART: Fatal Error: 0x90050002
33,182,066 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,326,815 >>> mbox cmd response: failed
33,327,452 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,471,687 >>> mbox cmd response: failed
Initializing fuses
922 writing to cptra_bootfsm_go
10,585,110 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,543,777 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,563 UART:
192,956 UART: Running Caliptra ROM ...
194,167 UART:
194,325 UART: [state] CFI Enabled
262,125 UART: [state] LifecycleState = Unprovisioned
263,981 UART: [state] DebugLocked = No
265,521 UART: [state] WD Timer not started. Device not locked for debugging
269,276 UART: [kat] SHA2-256
448,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,026 UART: [kat] ++
460,568 UART: [kat] sha1
471,243 UART: [kat] SHA2-256
474,252 UART: [kat] SHA2-384
481,399 UART: [kat] SHA2-512-ACC
484,343 UART: [kat] ECC-384
2,946,164 UART: [kat] HMAC-384Kdf
2,972,467 UART: [kat] LMS
3,501,886 UART: [kat] --
3,507,944 UART: [cold-reset] ++
3,509,801 UART: [fht] FHT @ 0x50003400
3,519,857 UART: [idev] ++
3,520,420 UART: [idev] CDI.KEYID = 6
3,521,300 UART: [idev] SUBJECT.KEYID = 7
3,522,548 UART: [idev] UDS.KEYID = 0
3,523,477 ready_for_fw is high
3,523,682 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,668,607 UART: [idev] Erasing UDS.KEYID = 0
6,026,386 UART: [idev] Sha1 KeyId Algorithm
6,049,168 UART: [idev] --
6,053,891 UART: [ldev] ++
6,054,464 UART: [ldev] CDI.KEYID = 6
6,055,353 UART: [ldev] SUBJECT.KEYID = 5
6,056,573 UART: [ldev] AUTHORITY.KEYID = 7
6,057,806 UART: [ldev] FE.KEYID = 1
6,100,293 UART: [ldev] Erasing FE.KEYID = 1
8,603,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,050 UART: [ldev] --
10,413,910 UART: [fwproc] Wait for Commands...
10,415,572 UART: [fwproc] Recv command 0x46574c44
10,417,668 UART: [fwproc] Recv'd Img size: 115224 bytes
13,825,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,129 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,285,342 >>> mbox cmd response: success
14,288,830 UART: [afmc] ++
14,289,417 UART: [afmc] CDI.KEYID = 6
14,290,331 UART: [afmc] SUBJECT.KEYID = 7
14,291,488 UART: [afmc] AUTHORITY.KEYID = 5
16,827,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,487 UART: [afmc] --
18,626,190 UART: [cold-reset] --
18,629,992 UART: [state] Locking Datavault
18,636,872 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,572 UART: [state] Locking ICCM
18,640,693 UART: [exit] Launching FMC @ 0x40000130
18,649,138 UART:
18,649,380 UART: Running Caliptra FMC ...
18,650,483 UART:
18,650,641 UART: [state] CFI Enabled
18,709,761 UART: [fht] FMC Alias Private Key: 7
20,474,271 UART: [art] Extend RT PCRs Done
20,475,504 UART: [art] Lock RT PCRs Done
20,477,323 UART: [art] Populate DV Done
20,482,847 UART: [fht] FMC Alias Private Key: 7
20,484,389 UART: [art] Derive CDI
20,485,204 UART: [art] Store in in slot 0x4
20,542,514 UART: [art] Derive Key Pair
20,543,560 UART: [art] Store priv key in slot 0x5
23,019,369 UART: [art] Derive Key Pair - Done
23,032,369 UART: [art] Signing Cert with AUTHO
23,033,681 UART: RITY.KEYID = 7
24,745,270 UART: [art] Erasing AUTHORITY.KEYID = 7
24,746,773 UART: [art] PUB.X = F552C275CDED41098A360BB3879B333AD45B9263294494B925E3F70F218C913BDFDF0A09B1793A386EDB79A2C993794A
24,754,035 UART: [art] PUB.Y = 0D12F429CF23C071BDAED69B67389CC198AB1087C3031E0DB7377B3E0E245B8FDABECB432956CD4BAA01C5B8DF718C15
24,761,280 UART: [art] SIG.R = 14B98026FC764F63A22A12F2BDAB3A307EDD892CB85F3CA6ACA7B37DCAC3BFA6DCF97A2A5CD50789A818A92994D96F6A
24,768,733 UART: [art] SIG.S = 079FF67BE331C5F2CD211C9558DC775F68102CA2D4AD596CAF8F3F64BFBC84E15D46B7623480E72E65906E7625244D9C
25,747,784 UART: Caliptra RT
25,748,506 UART: [state] CFI Enabled
25,912,700 UART: [rt] RT listening for mailbox commands...
25,914,546 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,944,273 UART: [rt]cmd =0x46504c54, len=4
25,945,885 >>> mbox cmd response data (8 bytes)
25,947,120 UART: [rt] FIPS self test
25,948,062 UART: [kat] ++
25,948,535 UART: [kat] sha1
25,953,137 UART: [kat] SHA2-256
25,955,017 UART: [kat] SHA2-384
25,957,868 UART: [kat] SHA2-512-ACC
25,958,752 UART: Droping operation
25,959,526 UART: Fatal Error: 0x90050002
25,994,667 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,139,455 >>> mbox cmd response: failed
26,140,102 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,284,782 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,027 UART:
190,322 UART: Running Caliptra ROM ...
191,348 UART:
191,488 UART: [state] CFI Enabled
248,659 UART: [state] LifecycleState = Unprovisioned
250,528 UART: [state] DebugLocked = No
251,769 UART: [state] WD Timer not started. Device not locked for debugging
255,714 UART: [kat] SHA2-256
434,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
446,407 UART: [kat] ++
446,909 UART: [kat] sha1
458,539 UART: [kat] SHA2-256
461,577 UART: [kat] SHA2-384
467,289 UART: [kat] SHA2-512-ACC
470,275 UART: [kat] ECC-384
2,948,589 UART: [kat] HMAC-384Kdf
2,971,471 UART: [kat] LMS
3,500,932 UART: [kat] --
3,506,058 UART: [cold-reset] ++
3,508,428 UART: [fht] FHT @ 0x50003400
3,519,744 UART: [idev] ++
3,520,318 UART: [idev] CDI.KEYID = 6
3,521,283 UART: [idev] SUBJECT.KEYID = 7
3,522,440 UART: [idev] UDS.KEYID = 0
3,524,065 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,019 UART: [idev] Erasing UDS.KEYID = 0
6,027,606 UART: [idev] Sha1 KeyId Algorithm
6,050,230 UART: [idev] --
6,054,221 UART: [ldev] ++
6,054,802 UART: [ldev] CDI.KEYID = 6
6,055,694 UART: [ldev] SUBJECT.KEYID = 5
6,056,853 UART: [ldev] AUTHORITY.KEYID = 7
6,058,283 UART: [ldev] FE.KEYID = 1
6,102,018 UART: [ldev] Erasing FE.KEYID = 1
8,602,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,067 UART: [ldev] --
10,392,890 UART: [fwproc] Wait for Commands...
10,396,067 UART: [fwproc] Recv command 0x46574c44
10,398,120 UART: [fwproc] Recv'd Img size: 115224 bytes
13,815,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,567 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,282,314 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,170 UART:
192,527 UART: Running Caliptra ROM ...
193,635 UART:
193,782 UART: [state] CFI Enabled
264,340 UART: [state] LifecycleState = Unprovisioned
266,438 UART: [state] DebugLocked = No
269,100 UART: [state] WD Timer not started. Device not locked for debugging
273,444 UART: [kat] SHA2-256
463,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,054 UART: [kat] ++
474,505 UART: [kat] sha1
485,685 UART: [kat] SHA2-256
488,711 UART: [kat] SHA2-384
494,851 UART: [kat] SHA2-512-ACC
497,436 UART: [kat] ECC-384
2,950,880 UART: [kat] HMAC-384Kdf
2,974,847 UART: [kat] LMS
3,506,648 UART: [kat] --
3,511,160 UART: [cold-reset] ++
3,513,168 UART: [fht] FHT @ 0x50003400
3,524,291 UART: [idev] ++
3,524,937 UART: [idev] CDI.KEYID = 6
3,525,919 UART: [idev] SUBJECT.KEYID = 7
3,527,095 UART: [idev] UDS.KEYID = 0
3,528,025 ready_for_fw is high
3,528,239 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,673,174 UART: [idev] Erasing UDS.KEYID = 0
6,033,548 UART: [idev] Sha1 KeyId Algorithm
6,054,327 UART: [idev] --
6,058,351 UART: [ldev] ++
6,059,043 UART: [ldev] CDI.KEYID = 6
6,059,931 UART: [ldev] SUBJECT.KEYID = 5
6,061,038 UART: [ldev] AUTHORITY.KEYID = 7
6,062,334 UART: [ldev] FE.KEYID = 1
6,103,043 UART: [ldev] Erasing FE.KEYID = 1
8,607,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,013 UART: [ldev] --
10,416,118 UART: [fwproc] Wait for Commands...
10,419,078 UART: [fwproc] Recv command 0x46574c44
10,421,408 UART: [fwproc] Recv'd Img size: 115224 bytes
13,879,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,238 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,625,553 >>> mbox cmd response: success
14,629,712 UART: [afmc] ++
14,630,420 UART: [afmc] CDI.KEYID = 6
14,631,581 UART: [afmc] SUBJECT.KEYID = 7
14,633,113 UART: [afmc] AUTHORITY.KEYID = 5
17,175,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,917,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,919,310 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,934,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,949,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,964,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,988,579 UART: [afmc] --
18,992,463 UART: [cold-reset] --
18,996,273 UART: [state] Locking Datavault
19,001,146 UART: [state] Locking PCR0, PCR1 and PCR31
19,003,436 UART: [state] Locking ICCM
19,005,181 UART: [exit] Launching FMC @ 0x40000130
19,013,804 UART:
19,014,042 UART: Running Caliptra FMC ...
19,015,148 UART:
19,015,306 UART: [state] CFI Enabled
19,075,289 UART: [fht] FMC Alias Private Key: 7
20,839,321 UART: [art] Extend RT PCRs Done
20,840,544 UART: [art] Lock RT PCRs Done
20,842,098 UART: [art] Populate DV Done
20,847,273 UART: [fht] FMC Alias Private Key: 7
20,848,883 UART: [art] Derive CDI
20,849,650 UART: [art] Store in in slot 0x4
20,907,897 UART: [art] Derive Key Pair
20,908,906 UART: [art] Store priv key in slot 0x5
23,371,026 UART: [art] Derive Key Pair - Done
23,384,198 UART: [art] Signing Cert with AUTHO
23,385,505 UART: RITY.KEYID = 7
25,097,449 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,962 UART: [art] PUB.X = 85EC38180D3B4AC802782CC9AA4A7F36FAC6E0452DBD3F4592836264BE3C458DE9BDAACABD936CEAE20D413832C99D43
25,106,224 UART: [art] PUB.Y = 0066591B9E3099B8EEC9E0FAA65B6E28E0EAC4FA0011D4EF7D8786C457A63193C87ED94D16C26F4AD0F18A0A09493CC0
25,113,467 UART: [art] SIG.R = BC33D95B2F91CF41E70D26C5A787D0B4F59F14A8731D588D928255CC63BF2059EE70A87463F7520E6EABD66EAF093445
25,120,884 UART: [art] SIG.S = 86172A59A87A5A01955166EA68035283EE66A9632674969C65ADCAAC05A4DA80BEB703BB41EEB7A658ACB4D52BDA21B1
26,100,616 UART: Caliptra RT
26,101,327 UART: [state] CFI Enabled
26,266,994 UART: [rt] RT listening for mailbox commands...
26,268,849 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,298,425 UART: [rt]cmd =0x46504c54, len=4
26,300,033 >>> mbox cmd response data (8 bytes)
26,301,129 UART: [rt] FIPS self test
26,302,089 UART: [kat] ++
26,302,543 UART: [kat] sha1
26,307,030 UART: [kat] SHA2-256
26,308,971 UART: [kat] SHA2-384
26,311,931 UART: [kat] SHA2-512-ACC
26,312,818 UART: Droping operation
26,313,594 UART: Fatal Error: 0x90050002
26,348,735 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,493,424 >>> mbox cmd response: failed
26,494,072 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,638,745 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,004 UART:
190,300 UART: Running Caliptra ROM ...
191,348 UART:
191,489 UART: [state] CFI Enabled
249,990 UART: [state] LifecycleState = Unprovisioned
252,078 UART: [state] DebugLocked = No
253,752 UART: [state] WD Timer not started. Device not locked for debugging
258,305 UART: [kat] SHA2-256
448,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,955 UART: [kat] ++
459,397 UART: [kat] sha1
472,111 UART: [kat] SHA2-256
475,128 UART: [kat] SHA2-384
481,651 UART: [kat] SHA2-512-ACC
484,266 UART: [kat] ECC-384
2,932,577 UART: [kat] HMAC-384Kdf
2,957,063 UART: [kat] LMS
3,488,845 UART: [kat] --
3,494,326 UART: [cold-reset] ++
3,495,460 UART: [fht] FHT @ 0x50003400
3,507,147 UART: [idev] ++
3,507,820 UART: [idev] CDI.KEYID = 6
3,508,782 UART: [idev] SUBJECT.KEYID = 7
3,509,998 UART: [idev] UDS.KEYID = 0
3,511,512 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,656,392 UART: [idev] Erasing UDS.KEYID = 0
6,014,005 UART: [idev] Sha1 KeyId Algorithm
6,036,326 UART: [idev] --
6,041,673 UART: [ldev] ++
6,042,354 UART: [ldev] CDI.KEYID = 6
6,043,318 UART: [ldev] SUBJECT.KEYID = 5
6,044,634 UART: [ldev] AUTHORITY.KEYID = 7
6,045,773 UART: [ldev] FE.KEYID = 1
6,086,043 UART: [ldev] Erasing FE.KEYID = 1
8,591,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,915 UART: [ldev] --
10,399,130 UART: [fwproc] Wait for Commands...
10,401,873 UART: [fwproc] Recv command 0x46574c44
10,404,190 UART: [fwproc] Recv'd Img size: 115224 bytes
13,865,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,497 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,615,171 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,439,896 ready_for_fw is high
3,440,438 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,764,972 >>> mbox cmd response: success
19,050,942 UART:
19,051,366 UART: Running Caliptra FMC ...
19,052,500 UART:
19,052,667 UART: [state] CFI Enabled
19,119,794 UART: [fht] FMC Alias Private Key: 7
20,883,322 UART: [art] Extend RT PCRs Done
20,884,557 UART: [art] Lock RT PCRs Done
20,886,229 UART: [art] Populate DV Done
20,891,654 UART: [fht] FMC Alias Private Key: 7
20,893,361 UART: [art] Derive CDI
20,894,178 UART: [art] Store in in slot 0x4
20,952,954 UART: [art] Derive Key Pair
20,953,997 UART: [art] Store priv key in slot 0x5
23,417,252 UART: [art] Derive Key Pair - Done
23,429,724 UART: [art] Signing Cert with AUTHO
23,431,071 UART: RITY.KEYID = 7
25,142,658 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,160 UART: [art] PUB.X = 0983F84D8FFB83598294F1EBD79BF333BC403AC435254D48D4C3164D77EAD9EB17378B222F9C334BFF03E9A2429C75E2
25,151,429 UART: [art] PUB.Y = 79E94EC2D5CA0E169BF2208E03869842FFA1AE50C7C67F578524CF818C1B5E0C69F76C38174C738E93B90962BC8C9C74
25,158,699 UART: [art] SIG.R = DB425D8B402DADC9DB172414E1063A471130C2405EB67ED8417B394082CFBBE7BBCD2D193BF5636A91A3C16AF53C5716
25,166,113 UART: [art] SIG.S = ECC3B4E1D68F75C5E90848C205F0CB5F569BE1209C174A6D593BC07F5863273494A06A8905B9500269A966AFE8F7FBE8
26,144,812 UART: Caliptra RT
26,145,528 UART: [state] CFI Enabled
26,311,395 UART: [rt] RT listening for mailbox commands...
26,313,246 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,343,155 UART: [rt]cmd =0x46504c54, len=4
26,344,581 >>> mbox cmd response data (8 bytes)
26,345,756 UART: [rt] FIPS self test
26,346,703 UART: [kat] ++
26,347,155 UART: [kat] sha1
26,351,770 UART: [kat] SHA2-256
26,353,700 UART: [kat] SHA2-384
26,356,716 UART: [kat] SHA2-512-ACC
26,357,681 UART: Droping operation
26,358,457 UART: Fatal Error: 0x90050002
26,393,779 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,538,429 >>> mbox cmd response: failed
26,539,060 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,683,747 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,405,394 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,726,976 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,663 UART:
193,028 UART: Running Caliptra ROM ...
194,167 UART:
603,773 UART: [state] CFI Enabled
617,666 UART: [state] LifecycleState = Unprovisioned
620,026 UART: [state] DebugLocked = No
621,555 UART: [state] WD Timer not started. Device not locked for debugging
625,456 UART: [kat] SHA2-256
815,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,130 UART: [kat] ++
826,654 UART: [kat] sha1
837,528 UART: [kat] SHA2-256
840,537 UART: [kat] SHA2-384
846,317 UART: [kat] SHA2-512-ACC
848,908 UART: [kat] ECC-384
3,290,693 UART: [kat] HMAC-384Kdf
3,302,296 UART: [kat] LMS
3,834,106 UART: [kat] --
3,836,521 UART: [cold-reset] ++
3,837,975 UART: [fht] FHT @ 0x50003400
3,848,539 UART: [idev] ++
3,849,193 UART: [idev] CDI.KEYID = 6
3,850,230 UART: [idev] SUBJECT.KEYID = 7
3,851,333 UART: [idev] UDS.KEYID = 0
3,852,264 ready_for_fw is high
3,852,491 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,997,286 UART: [idev] Erasing UDS.KEYID = 0
6,329,230 UART: [idev] Sha1 KeyId Algorithm
6,352,646 UART: [idev] --
6,359,181 UART: [ldev] ++
6,359,871 UART: [ldev] CDI.KEYID = 6
6,360,944 UART: [ldev] SUBJECT.KEYID = 5
6,362,054 UART: [ldev] AUTHORITY.KEYID = 7
6,363,236 UART: [ldev] FE.KEYID = 1
6,375,777 UART: [ldev] Erasing FE.KEYID = 1
8,849,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,465 UART: [ldev] --
10,638,574 UART: [fwproc] Wait for Commands...
10,641,327 UART: [fwproc] Recv command 0x46574c44
10,643,646 UART: [fwproc] Recv'd Img size: 115224 bytes
14,101,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,093 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,838,653 >>> mbox cmd response: success
14,841,895 UART: [afmc] ++
14,842,600 UART: [afmc] CDI.KEYID = 6
14,843,709 UART: [afmc] SUBJECT.KEYID = 7
14,845,244 UART: [afmc] AUTHORITY.KEYID = 5
17,349,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,845 UART: [afmc] --
19,146,599 UART: [cold-reset] --
19,150,136 UART: [state] Locking Datavault
19,156,090 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,275 UART: [state] Locking ICCM
19,161,016 UART: [exit] Launching FMC @ 0x40000130
19,169,631 UART:
19,169,866 UART: Running Caliptra FMC ...
19,170,976 UART:
19,171,133 UART: [state] CFI Enabled
19,178,987 UART: [fht] FMC Alias Private Key: 7
20,935,809 UART: [art] Extend RT PCRs Done
20,937,026 UART: [art] Lock RT PCRs Done
20,938,968 UART: [art] Populate DV Done
20,944,150 UART: [fht] FMC Alias Private Key: 7
20,945,864 UART: [art] Derive CDI
20,946,680 UART: [art] Store in in slot 0x4
20,988,841 UART: [art] Derive Key Pair
20,989,841 UART: [art] Store priv key in slot 0x5
23,416,731 UART: [art] Derive Key Pair - Done
23,429,688 UART: [art] Signing Cert with AUTHO
23,431,033 UART: RITY.KEYID = 7
25,136,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,243 UART: [art] PUB.X = BBC526A2E7403AB0D5704D865B5424B72D995AFDF0725F88D41588AFE64E4D9FB78664CDF257986D138F34C1A0F35153
25,145,494 UART: [art] PUB.Y = 5AF5B5C02F042FF5C9B07C3E650C9F1902DA502B3939EC17CDB5CCD21EC987FD4E15A6F431D4F582817E8A23DD223C28
25,152,794 UART: [art] SIG.R = E14CE0C92A8B4855783B5F2138F4DB888FD05C02F51F4A6DF2EB9176F0E1401C42344AA3025F70886485968B9C158539
25,160,150 UART: [art] SIG.S = 366897B83417B11E3E1185E7EC60E75A401E808964CACEEBCA156702CB871BC7CB8C615350B650E92AE201AAFEC76A03
26,139,249 UART: Caliptra RT
26,139,948 UART: [state] CFI Enabled
26,257,169 UART: [rt] RT listening for mailbox commands...
26,259,016 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,288,928 UART: [rt]cmd =0x46504c54, len=4
26,290,506 >>> mbox cmd response data (8 bytes)
26,291,581 UART: [rt] FIPS self test
26,292,523 UART: [kat] ++
26,292,974 UART: [kat] sha1
26,297,535 UART: [kat] SHA2-256
26,299,466 UART: [kat] SHA2-384
26,302,359 UART: [kat] SHA2-512-ACC
26,303,257 UART: Droping operation
26,304,029 UART: Fatal Error: 0x90050002
26,339,176 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,483,939 >>> mbox cmd response: failed
26,484,595 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,629,219 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
190,114 UART:
190,406 UART: Running Caliptra ROM ...
191,430 UART:
13,896,435 UART: [state] CFI Enabled
13,907,914 UART: [state] LifecycleState = Unprovisioned
13,910,335 UART: [state] DebugLocked = No
13,913,187 UART: [state] WD Timer not started. Device not locked for debugging
13,918,013 UART: [kat] SHA2-256
14,107,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,118,672 UART: [kat] ++
14,119,187 UART: [kat] sha1
14,130,578 UART: [kat] SHA2-256
14,133,592 UART: [kat] SHA2-384
14,139,465 UART: [kat] SHA2-512-ACC
14,142,075 UART: [kat] ECC-384
16,583,756 UART: [kat] HMAC-384Kdf
16,597,446 UART: [kat] LMS
17,129,279 UART: [kat] --
17,135,933 UART: [cold-reset] ++
17,137,863 UART: [fht] FHT @ 0x50003400
17,150,506 UART: [idev] ++
17,151,174 UART: [idev] CDI.KEYID = 6
17,152,109 UART: [idev] SUBJECT.KEYID = 7
17,153,368 UART: [idev] UDS.KEYID = 0
17,154,855 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,299,472 UART: [idev] Erasing UDS.KEYID = 0
19,633,854 UART: [idev] Sha1 KeyId Algorithm
19,656,782 UART: [idev] --
19,662,825 UART: [ldev] ++
19,663,499 UART: [ldev] CDI.KEYID = 6
19,664,377 UART: [ldev] SUBJECT.KEYID = 5
19,665,584 UART: [ldev] AUTHORITY.KEYID = 7
19,666,815 UART: [ldev] FE.KEYID = 1
19,677,302 UART: [ldev] Erasing FE.KEYID = 1
22,152,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,870,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,885,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,900,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,915,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,937,070 UART: [ldev] --
23,943,042 UART: [fwproc] Wait for Commands...
23,945,356 UART: [fwproc] Recv command 0x46574c44
23,947,665 UART: [fwproc] Recv'd Img size: 115224 bytes
27,404,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,489,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,605,660 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,153,247 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,757,306 ready_for_fw is high
3,757,908 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,989,005 >>> mbox cmd response: success
19,235,487 UART:
19,235,893 UART: Running Caliptra FMC ...
19,237,041 UART:
19,237,204 UART: [state] CFI Enabled
19,245,399 UART: [fht] FMC Alias Private Key: 7
21,002,643 UART: [art] Extend RT PCRs Done
21,003,879 UART: [art] Lock RT PCRs Done
21,005,295 UART: [art] Populate DV Done
21,010,663 UART: [fht] FMC Alias Private Key: 7
21,012,164 UART: [art] Derive CDI
21,012,930 UART: [art] Store in in slot 0x4
21,055,532 UART: [art] Derive Key Pair
21,056,580 UART: [art] Store priv key in slot 0x5
23,482,666 UART: [art] Derive Key Pair - Done
23,495,771 UART: [art] Signing Cert with AUTHO
23,497,073 UART: RITY.KEYID = 7
25,203,043 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,572 UART: [art] PUB.X = 29D471E1D6DFD3138BAB2EE08C3A5326D76E2C0A19E4CEEBB71FCE5D93B8343B2A15CA1097FFB47F35FADAC7BEDA07B9
25,211,842 UART: [art] PUB.Y = 676FD8EE4C3080FBDF68859A210F304D98A76AEABAEC0C40F977D26B2BED071413BD68665E85EC1FAF8157217FEFF690
25,219,182 UART: [art] SIG.R = E7A3AEE8503AD6DD2638C38E996A05FB16758AECBF39775A6B51EFDCB531F802FCF21B318EE1596A26A216D2CF1E6F52
25,226,552 UART: [art] SIG.S = E15EC29F2771B6D5A63F5C5852589664B8B0B32DC025220CC2C15EE76E147EDD20722C08BB05B9A142F6C1910A6F666C
26,205,264 UART: Caliptra RT
26,205,959 UART: [state] CFI Enabled
26,323,843 UART: [rt] RT listening for mailbox commands...
26,325,688 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,444 UART: [rt]cmd =0x46504c54, len=4
26,356,961 >>> mbox cmd response data (8 bytes)
26,358,020 UART: [rt] FIPS self test
26,358,964 UART: [kat] ++
26,359,434 UART: [kat] sha1
26,363,834 UART: [kat] SHA2-256
26,365,760 UART: [kat] SHA2-384
26,368,749 UART: [kat] SHA2-512-ACC
26,369,696 UART: Droping operation
26,370,466 UART: Fatal Error: 0x90050002
26,406,100 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,550,729 >>> mbox cmd response: failed
26,551,394 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,696,073 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
16,998,061 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,217,561 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,334 UART: [kat] SHA2-512-ACC
897,235 UART: [kat] ECC-384
902,972 UART: [kat] HMAC-384Kdf
907,428 UART: [kat] LMS
1,475,624 UART: [kat] --
1,476,361 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 ready_for_fw is high
1,480,827 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,334 UART: [idev] Erasing UDS.KEYID = 0
1,504,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,140 UART: [idev] --
1,514,233 UART: [ldev] ++
1,514,401 UART: [ldev] CDI.KEYID = 6
1,514,764 UART: [ldev] SUBJECT.KEYID = 5
1,515,190 UART: [ldev] AUTHORITY.KEYID = 7
1,515,653 UART: [ldev] FE.KEYID = 1
1,520,499 UART: [ldev] Erasing FE.KEYID = 1
1,546,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,232 UART: [ldev] --
1,585,727 UART: [fwproc] Waiting for Commands...
1,586,434 UART: [fwproc] Received command 0x46574c44
1,587,225 UART: [fwproc] Received Image of size 115224 bytes
2,895,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,077 >>> mbox cmd response: success
3,090,331 UART: [afmc] ++
3,090,499 UART: [afmc] CDI.KEYID = 6
3,090,861 UART: [afmc] SUBJECT.KEYID = 7
3,091,286 UART: [afmc] AUTHORITY.KEYID = 5
3,126,321 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,567 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,075 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,960 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,650 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,719 UART: [afmc] --
3,169,719 UART: [cold-reset] --
3,170,563 UART: [state] Locking Datavault
3,171,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,316 UART: [state] Locking ICCM
3,172,760 UART: [exit] Launching FMC @ 0x40000130
3,178,089 UART:
3,178,105 UART: Running Caliptra FMC ...
3,178,513 UART:
3,178,567 UART: [state] CFI Enabled
3,188,940 UART: [fht] FMC Alias Private Key: 7
3,296,557 UART: [art] Extend RT PCRs Done
3,296,985 UART: [art] Lock RT PCRs Done
3,298,493 UART: [art] Populate DV Done
3,306,780 UART: [fht] FMC Alias Private Key: 7
3,307,906 UART: [art] Derive CDI
3,308,186 UART: [art] Store in in slot 0x4
3,393,751 UART: [art] Derive Key Pair
3,394,111 UART: [art] Store priv key in slot 0x5
3,407,027 UART: [art] Derive Key Pair - Done
3,421,708 UART: [art] Signing Cert with AUTHO
3,422,188 UART: RITY.KEYID = 7
3,437,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,153 UART: [art] PUB.X = 9732E7B00A5A17A7A33B1F7E506063AF10DE1F7F5E9C8F27D72E2EBDA291E4D6884FFFDD52CB711B8D75A5034A8CD8AC
3,444,937 UART: [art] PUB.Y = D1464697B8D9C2D7485C559603AF9E2FF055F0D0BED588D73026EB5B92CEA3EC7DAE8CF3262680448CBA77E665231CFA
3,451,896 UART: [art] SIG.R = D4FEAB261EF3737488AEC2D04DFF1818CCEF68755320EF2A4A00C61A578BCB91DAE83C575D38652C1D55DDF55768C8B2
3,458,660 UART: [art] SIG.S = 538733E2889E38034008B4A12DC63380A1949983046D92F3303ADA755BFEF8AC6EEF4E2C8C11D8A49A3EA461F21F9AC1
3,482,298 UART: Caliptra RT
3,482,552 UART: [state] CFI Enabled
3,591,224 UART: [rt] RT listening for mailbox commands...
3,591,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,453 UART: [rt]cmd =0x46504c54, len=4
3,622,625 >>> mbox cmd response data (8 bytes)
3,622,960 UART: [rt] FIPS self test
3,623,288 UART: [kat] ++
3,623,440 UART: [kat] sha1
3,627,754 UART: [kat] SHA2-256
3,629,776 UART: [kat] SHA2-384
3,632,433 UART: [kat] SHA2-512-ACC
3,632,838 UART: Droping operation
3,633,243 UART: Fatal Error: 0x90050002
3,634,793 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,798 >>> mbox cmd response: failed
3,634,798 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,028 UART: [kat] SHA2-512-ACC
896,929 UART: [kat] ECC-384
902,458 UART: [kat] HMAC-384Kdf
907,188 UART: [kat] LMS
1,475,384 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,817 UART: [fht] Storing FHT @ 0x50003400
1,479,772 UART: [idev] ++
1,479,940 UART: [idev] CDI.KEYID = 6
1,480,300 UART: [idev] SUBJECT.KEYID = 7
1,480,724 UART: [idev] UDS.KEYID = 0
1,481,069 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,992 UART: [idev] Erasing UDS.KEYID = 0
1,505,226 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,012 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,522,127 UART: [ldev] Erasing FE.KEYID = 1
1,547,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,382 UART: [ldev] --
1,586,691 UART: [fwproc] Waiting for Commands...
1,587,308 UART: [fwproc] Received command 0x46574c44
1,588,099 UART: [fwproc] Received Image of size 115224 bytes
2,896,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,162 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,514 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,831 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 ready_for_fw is high
1,362,907 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,751 >>> mbox cmd response: success
3,003,537 UART:
3,003,553 UART: Running Caliptra FMC ...
3,003,961 UART:
3,004,015 UART: [state] CFI Enabled
3,014,240 UART: [fht] FMC Alias Private Key: 7
3,122,083 UART: [art] Extend RT PCRs Done
3,122,511 UART: [art] Lock RT PCRs Done
3,124,501 UART: [art] Populate DV Done
3,132,770 UART: [fht] FMC Alias Private Key: 7
3,133,776 UART: [art] Derive CDI
3,134,056 UART: [art] Store in in slot 0x4
3,219,527 UART: [art] Derive Key Pair
3,219,887 UART: [art] Store priv key in slot 0x5
3,233,029 UART: [art] Derive Key Pair - Done
3,248,011 UART: [art] Signing Cert with AUTHO
3,248,491 UART: RITY.KEYID = 7
3,263,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,664 UART: [art] PUB.X = EB6D8FAFEF33168884BF25B7C677262520740A95F7827B265B3F7B9DC8C3FC3FB6F0280C662EFAC4D34548A08A377BAB
3,271,440 UART: [art] PUB.Y = E7A963858458115D0A715020BAB053A7B57B6036FF9AFA4CE681AD69984084BA512C2166BD9494B97DC03B6979F67D50
3,278,385 UART: [art] SIG.R = 98749E604E96AB6E0A49CD8092459915706A6F3EEE7F686A5E53B925DD54944C97F5700AF3CD575210C5FF87F0534553
3,285,145 UART: [art] SIG.S = CC9EC805F82E0074C9680E74F0CE8AC373342D397E1A4760F76801F177571939B34784EBCF7FDDC38433B871CACDF785
3,309,077 UART: Caliptra RT
3,309,331 UART: [state] CFI Enabled
3,417,622 UART: [rt] RT listening for mailbox commands...
3,418,285 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,937 UART: [rt]cmd =0x46504c54, len=4
3,449,339 >>> mbox cmd response data (8 bytes)
3,449,604 UART: [rt] FIPS self test
3,449,932 UART: [kat] ++
3,450,084 UART: [kat] sha1
3,454,342 UART: [kat] SHA2-256
3,456,364 UART: [kat] SHA2-384
3,459,105 UART: [kat] SHA2-512-ACC
3,459,510 UART: Droping operation
3,459,953 UART: Fatal Error: 0x90050002
3,461,503 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,461,508 >>> mbox cmd response: failed
3,461,508 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,461,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,995 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,094 UART: [kat] SHA2-256
882,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,140 UART: [kat] ++
886,292 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,481 UART: [kat] SHA2-512-ACC
897,382 UART: [kat] ECC-384
903,051 UART: [kat] HMAC-384Kdf
907,631 UART: [kat] LMS
1,475,827 UART: [kat] --
1,476,792 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 ready_for_fw is high
1,481,288 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,047 UART: [idev] Erasing UDS.KEYID = 0
1,505,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,859 UART: [idev] --
1,515,032 UART: [ldev] ++
1,515,200 UART: [ldev] CDI.KEYID = 6
1,515,563 UART: [ldev] SUBJECT.KEYID = 5
1,515,989 UART: [ldev] AUTHORITY.KEYID = 7
1,516,452 UART: [ldev] FE.KEYID = 1
1,521,872 UART: [ldev] Erasing FE.KEYID = 1
1,547,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,835 UART: [ldev] --
1,587,288 UART: [fwproc] Waiting for Commands...
1,588,123 UART: [fwproc] Received command 0x46574c44
1,588,914 UART: [fwproc] Received Image of size 115224 bytes
2,898,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,925,585 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,092,214 >>> mbox cmd response: success
3,093,330 UART: [afmc] ++
3,093,498 UART: [afmc] CDI.KEYID = 6
3,093,860 UART: [afmc] SUBJECT.KEYID = 7
3,094,285 UART: [afmc] AUTHORITY.KEYID = 5
3,129,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,145,834 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,146,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,152,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,158,227 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,163,917 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,171,788 UART: [afmc] --
3,172,902 UART: [cold-reset] --
3,173,624 UART: [state] Locking Datavault
3,174,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,175,393 UART: [state] Locking ICCM
3,175,919 UART: [exit] Launching FMC @ 0x40000130
3,181,248 UART:
3,181,264 UART: Running Caliptra FMC ...
3,181,672 UART:
3,181,815 UART: [state] CFI Enabled
3,192,718 UART: [fht] FMC Alias Private Key: 7
3,300,575 UART: [art] Extend RT PCRs Done
3,301,003 UART: [art] Lock RT PCRs Done
3,302,609 UART: [art] Populate DV Done
3,310,982 UART: [fht] FMC Alias Private Key: 7
3,312,082 UART: [art] Derive CDI
3,312,362 UART: [art] Store in in slot 0x4
3,398,003 UART: [art] Derive Key Pair
3,398,363 UART: [art] Store priv key in slot 0x5
3,411,543 UART: [art] Derive Key Pair - Done
3,426,426 UART: [art] Signing Cert with AUTHO
3,426,906 UART: RITY.KEYID = 7
3,442,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,443,043 UART: [art] PUB.X = 7C7BF737AC7C0AD541BC08C26FFA456BE5840F0296BA3CB235C288040E126BE45BA39CBF433E6FEF29BF92AB6FDA98D8
3,449,817 UART: [art] PUB.Y = 6566E5FF8CE6E7D4B9F5F453FA4418ADB39299D73B5EE1F2D67750FB2166C15C50F2239684D0963366E37FF4EA542054
3,456,769 UART: [art] SIG.R = D0CAE4ADE8935A1BB9E7C5C8A34D51EC08117B3B9C9F894F2ACBCD02A9F04CBD3AA503DF1D25379DCAEA4B80FF467026
3,463,558 UART: [art] SIG.S = 69739768CDDEDBD223EDC87CC3B4CA76A42B990CD65CC9CC8130C0729B03E33E0F152BD2EC3D2D574099F5CF42687B0C
3,487,373 UART: Caliptra RT
3,487,719 UART: [state] CFI Enabled
3,595,729 UART: [rt] RT listening for mailbox commands...
3,596,392 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,958 UART: [rt]cmd =0x46504c54, len=4
3,627,094 >>> mbox cmd response data (8 bytes)
3,627,299 UART: [rt] FIPS self test
3,627,627 UART: [kat] ++
3,627,779 UART: [kat] sha1
3,632,129 UART: [kat] SHA2-256
3,634,151 UART: [kat] SHA2-384
3,637,004 UART: [kat] SHA2-512-ACC
3,637,409 UART: Droping operation
3,637,834 UART: Fatal Error: 0x90050002
3,639,384 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,639,389 >>> mbox cmd response: failed
3,639,389 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,639,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,994 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,536 UART: [kat] SHA2-256
882,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,582 UART: [kat] ++
886,734 UART: [kat] sha1
891,176 UART: [kat] SHA2-256
893,114 UART: [kat] SHA2-384
895,775 UART: [kat] SHA2-512-ACC
897,676 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,712 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,911 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,597 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,282 UART: [ldev] Erasing FE.KEYID = 1
1,548,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,049 UART: [ldev] --
1,587,438 UART: [fwproc] Waiting for Commands...
1,588,109 UART: [fwproc] Received command 0x46574c44
1,588,900 UART: [fwproc] Received Image of size 115224 bytes
2,897,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,246 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,822 >>> mbox cmd response: success
3,001,346 UART:
3,001,362 UART: Running Caliptra FMC ...
3,001,770 UART:
3,001,913 UART: [state] CFI Enabled
3,012,110 UART: [fht] FMC Alias Private Key: 7
3,120,205 UART: [art] Extend RT PCRs Done
3,120,633 UART: [art] Lock RT PCRs Done
3,122,225 UART: [art] Populate DV Done
3,130,462 UART: [fht] FMC Alias Private Key: 7
3,131,588 UART: [art] Derive CDI
3,131,868 UART: [art] Store in in slot 0x4
3,217,151 UART: [art] Derive Key Pair
3,217,511 UART: [art] Store priv key in slot 0x5
3,230,511 UART: [art] Derive Key Pair - Done
3,245,135 UART: [art] Signing Cert with AUTHO
3,245,615 UART: RITY.KEYID = 7
3,260,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,142 UART: [art] PUB.X = B8A73713BD0AEB5C4C4F419F06D2791E0D78B20894E407EF51BF6F66CC33C456913DDDE34A6A09F5F379DEC883754C7B
3,267,906 UART: [art] PUB.Y = C24FCE832B54A43B4CFD1F1F99F6AC28E8F7FE8D7ECD3414ABEB545926001488345B606F964D093017B60234546D42A1
3,274,832 UART: [art] SIG.R = D779041F78BCFCDC75CFFEC97A2470E3D2471C1B6598E6E78C18796C25F13D1F8AB26798FB97F8F92BF171610D590DCA
3,281,605 UART: [art] SIG.S = 857142D28CD7C18E024E2D771CDAD93BC2D9FDBB3CABC3ACB6064AF41A67B45777B8FC83C71EF27643E7B0A40882C813
3,304,973 UART: Caliptra RT
3,305,319 UART: [state] CFI Enabled
3,413,462 UART: [rt] RT listening for mailbox commands...
3,414,125 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,605 UART: [rt]cmd =0x46504c54, len=4
3,444,923 >>> mbox cmd response data (8 bytes)
3,445,226 UART: [rt] FIPS self test
3,445,554 UART: [kat] ++
3,445,706 UART: [kat] sha1
3,449,896 UART: [kat] SHA2-256
3,451,918 UART: [kat] SHA2-384
3,454,653 UART: [kat] SHA2-512-ACC
3,455,058 UART: Droping operation
3,455,553 UART: Fatal Error: 0x90050002
3,457,103 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,457,108 >>> mbox cmd response: failed
3,457,108 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,457,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,046 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,732 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
893,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,703 UART: [kat] ++
897,855 UART: [kat] sha1
902,145 UART: [kat] SHA2-256
904,085 UART: [kat] SHA2-384
906,916 UART: [kat] SHA2-512-ACC
908,817 UART: [kat] ECC-384
918,734 UART: [kat] HMAC-384Kdf
923,470 UART: [kat] LMS
1,171,798 UART: [kat] --
1,172,629 UART: [cold-reset] ++
1,172,981 UART: [fht] FHT @ 0x50003400
1,175,642 UART: [idev] ++
1,175,810 UART: [idev] CDI.KEYID = 6
1,176,170 UART: [idev] SUBJECT.KEYID = 7
1,176,594 UART: [idev] UDS.KEYID = 0
1,176,939 ready_for_fw is high
1,176,939 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,386 UART: [idev] Erasing UDS.KEYID = 0
1,201,073 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] --
1,210,613 UART: [ldev] ++
1,210,781 UART: [ldev] CDI.KEYID = 6
1,211,144 UART: [ldev] SUBJECT.KEYID = 5
1,211,570 UART: [ldev] AUTHORITY.KEYID = 7
1,212,033 UART: [ldev] FE.KEYID = 1
1,217,271 UART: [ldev] Erasing FE.KEYID = 1
1,243,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,702 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,229 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,416 >>> mbox cmd response: success
2,786,674 UART: [afmc] ++
2,786,842 UART: [afmc] CDI.KEYID = 6
2,787,204 UART: [afmc] SUBJECT.KEYID = 7
2,787,629 UART: [afmc] AUTHORITY.KEYID = 5
2,823,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,803 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,767 UART: [afmc] --
2,866,753 UART: [cold-reset] --
2,867,587 UART: [state] Locking Datavault
2,868,964 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,568 UART: [state] Locking ICCM
2,870,186 UART: [exit] Launching FMC @ 0x40000130
2,875,515 UART:
2,875,531 UART: Running Caliptra FMC ...
2,875,939 UART:
2,875,993 UART: [state] CFI Enabled
2,886,150 UART: [fht] FMC Alias Private Key: 7
2,994,149 UART: [art] Extend RT PCRs Done
2,994,577 UART: [art] Lock RT PCRs Done
2,996,115 UART: [art] Populate DV Done
3,004,376 UART: [fht] FMC Alias Private Key: 7
3,005,546 UART: [art] Derive CDI
3,005,826 UART: [art] Store in in slot 0x4
3,091,657 UART: [art] Derive Key Pair
3,092,017 UART: [art] Store priv key in slot 0x5
3,105,021 UART: [art] Derive Key Pair - Done
3,119,921 UART: [art] Signing Cert with AUTHO
3,120,401 UART: RITY.KEYID = 7
3,135,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,716 UART: [art] PUB.X = 48F860499AE27AA4C71426A9C0CEB9A83FADF9933C00201D6A985D8819612C21521B6582487E1B3DD06603EBA88CBB1C
3,143,465 UART: [art] PUB.Y = 793B264EC327D9AF7053813BA38E03E2D0BF3F152610DD304DF645FAF21706DAE9D730DF13A5A1D7B3A886621D2386AB
3,150,417 UART: [art] SIG.R = B5A537CA639C69F7B7C87344FE5C4655767EA683F56E997DB2030935BBAA897F72DE99AF0D6A115C742687C4C0E89D62
3,157,182 UART: [art] SIG.S = 61FB5FBF91244CD42182F11509954337BBF982E976357BCEF48EF2419152AA6F4A884825076BED8A8936CA585D962F94
3,181,303 UART: Caliptra RT
3,181,557 UART: [state] CFI Enabled
3,289,585 UART: [rt] RT listening for mailbox commands...
3,290,248 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,818 UART: [rt]cmd =0x46504c54, len=4
3,320,972 >>> mbox cmd response data (8 bytes)
3,321,199 UART: [rt] FIPS self test
3,321,527 UART: [kat] ++
3,321,679 UART: [kat] sha1
3,325,787 UART: [kat] SHA2-256
3,327,809 UART: [kat] SHA2-384
3,330,580 UART: [kat] SHA2-512-ACC
3,330,985 UART: Droping operation
3,331,458 UART: Fatal Error: 0x90050002
3,333,008 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,013 >>> mbox cmd response: failed
3,333,013 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,171,885 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,992 UART: [idev] Erasing UDS.KEYID = 0
1,201,107 UART: [idev] Sha1 KeyId Algorithm
1,209,475 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,287 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,481 UART: [ldev] --
1,282,786 UART: [fwproc] Wait for Commands...
1,283,566 UART: [fwproc] Recv command 0x46574c44
1,284,294 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,909 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,988 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,451 >>> mbox cmd response: success
2,700,433 UART:
2,700,449 UART: Running Caliptra FMC ...
2,700,857 UART:
2,700,911 UART: [state] CFI Enabled
2,711,596 UART: [fht] FMC Alias Private Key: 7
2,819,841 UART: [art] Extend RT PCRs Done
2,820,269 UART: [art] Lock RT PCRs Done
2,821,901 UART: [art] Populate DV Done
2,830,328 UART: [fht] FMC Alias Private Key: 7
2,831,408 UART: [art] Derive CDI
2,831,688 UART: [art] Store in in slot 0x4
2,917,397 UART: [art] Derive Key Pair
2,917,757 UART: [art] Store priv key in slot 0x5
2,930,955 UART: [art] Derive Key Pair - Done
2,945,910 UART: [art] Signing Cert with AUTHO
2,946,390 UART: RITY.KEYID = 7
2,961,256 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,021 UART: [art] PUB.X = 64DB9029BACED019EB99AA317ADC1CEA4DB215427910C1631A5EAC7528CBC1C8341A05DDBFA06C4C732BAAC2C2349DCF
2,968,814 UART: [art] PUB.Y = 6A4BD275B3871C82B84659EEC0BC911F24CDBA852D108E263B4AC38C173CEBF2865A632FA91DBBF24ED38CAD36F2DEBA
2,975,788 UART: [art] SIG.R = 0D5F1E397CC772223A1A70B7046FFD0F782FF5745A7B18ABD5044BAC1429DFE1F962B047A74B8E378400E51E45B84F3E
2,982,532 UART: [art] SIG.S = 0493274F4400B1D70FE4CED28ECA3A137C043B8F78CE65E9682CD3FFD7606C2747704653C12FC27506BAE2D3A6B08D25
3,006,903 UART: Caliptra RT
3,007,157 UART: [state] CFI Enabled
3,116,017 UART: [rt] RT listening for mailbox commands...
3,116,680 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,240 UART: [rt]cmd =0x46504c54, len=4
3,147,470 >>> mbox cmd response data (8 bytes)
3,147,711 UART: [rt] FIPS self test
3,148,039 UART: [kat] ++
3,148,191 UART: [kat] sha1
3,152,641 UART: [kat] SHA2-256
3,154,663 UART: [kat] SHA2-384
3,157,682 UART: [kat] SHA2-512-ACC
3,158,087 UART: Droping operation
3,158,624 UART: Fatal Error: 0x90050002
3,160,174 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,179 >>> mbox cmd response: failed
3,160,179 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,145 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
901,778 UART: [kat] SHA2-256
903,718 UART: [kat] SHA2-384
906,505 UART: [kat] SHA2-512-ACC
908,406 UART: [kat] ECC-384
918,171 UART: [kat] HMAC-384Kdf
922,617 UART: [kat] LMS
1,170,945 UART: [kat] --
1,172,032 UART: [cold-reset] ++
1,172,454 UART: [fht] FHT @ 0x50003400
1,174,977 UART: [idev] ++
1,175,145 UART: [idev] CDI.KEYID = 6
1,175,505 UART: [idev] SUBJECT.KEYID = 7
1,175,929 UART: [idev] UDS.KEYID = 0
1,176,274 ready_for_fw is high
1,176,274 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,837 UART: [idev] Erasing UDS.KEYID = 0
1,200,962 UART: [idev] Sha1 KeyId Algorithm
1,209,366 UART: [idev] --
1,210,542 UART: [ldev] ++
1,210,710 UART: [ldev] CDI.KEYID = 6
1,211,073 UART: [ldev] SUBJECT.KEYID = 5
1,211,499 UART: [ldev] AUTHORITY.KEYID = 7
1,211,962 UART: [ldev] FE.KEYID = 1
1,217,152 UART: [ldev] Erasing FE.KEYID = 1
1,243,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,389 UART: [fwproc] Wait for Commands...
1,283,991 UART: [fwproc] Recv command 0x46574c44
1,284,719 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,304 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,411 >>> mbox cmd response: success
2,787,657 UART: [afmc] ++
2,787,825 UART: [afmc] CDI.KEYID = 6
2,788,187 UART: [afmc] SUBJECT.KEYID = 7
2,788,612 UART: [afmc] AUTHORITY.KEYID = 5
2,824,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,114 UART: [afmc] --
2,868,202 UART: [cold-reset] --
2,868,928 UART: [state] Locking Datavault
2,870,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,855 UART: [state] Locking ICCM
2,871,385 UART: [exit] Launching FMC @ 0x40000130
2,876,714 UART:
2,876,730 UART: Running Caliptra FMC ...
2,877,138 UART:
2,877,281 UART: [state] CFI Enabled
2,887,702 UART: [fht] FMC Alias Private Key: 7
2,996,037 UART: [art] Extend RT PCRs Done
2,996,465 UART: [art] Lock RT PCRs Done
2,998,055 UART: [art] Populate DV Done
3,006,282 UART: [fht] FMC Alias Private Key: 7
3,007,402 UART: [art] Derive CDI
3,007,682 UART: [art] Store in in slot 0x4
3,093,551 UART: [art] Derive Key Pair
3,093,911 UART: [art] Store priv key in slot 0x5
3,107,521 UART: [art] Derive Key Pair - Done
3,122,358 UART: [art] Signing Cert with AUTHO
3,122,838 UART: RITY.KEYID = 7
3,138,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,065 UART: [art] PUB.X = C30232E5AD6A9E1DC678F63E385E28C7AF6D5F274E3A6BE8AD943BD96D97F9015FAA42B62B8523E12948145615A524F6
3,145,835 UART: [art] PUB.Y = 6FA9F97A3A26ECFC773333D6F5C10EE93D0563E5D1A0D040C6E5DDFBC9358FEBF2457DDCF313743AA1676E09CA3AB6BB
3,152,800 UART: [art] SIG.R = AC52AC95766EE1AD4C3C9AD11B94A4C22E2B1B5A6C4D2E7865E6A3FE499589C3A204EF74B76AF7DD974DCA3943F8D2C0
3,159,587 UART: [art] SIG.S = B57836341C309915C731A9A9DAF0D1ED88DCCCB53B1B4E6EDDA923135C1B788AB5EF07EA98E58770A93EC57442D3D616
3,183,385 UART: Caliptra RT
3,183,731 UART: [state] CFI Enabled
3,292,288 UART: [rt] RT listening for mailbox commands...
3,292,951 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,603 UART: [rt]cmd =0x46504c54, len=4
3,323,679 >>> mbox cmd response data (8 bytes)
3,324,014 UART: [rt] FIPS self test
3,324,342 UART: [kat] ++
3,324,494 UART: [kat] sha1
3,328,812 UART: [kat] SHA2-256
3,330,834 UART: [kat] SHA2-384
3,333,629 UART: [kat] SHA2-512-ACC
3,334,034 UART: Droping operation
3,334,509 UART: Fatal Error: 0x90050002
3,336,059 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,336,064 >>> mbox cmd response: failed
3,336,064 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,336,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
893,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,894 UART: [kat] ++
898,046 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,823 UART: [kat] SHA2-512-ACC
908,724 UART: [kat] ECC-384
918,389 UART: [kat] HMAC-384Kdf
923,145 UART: [kat] LMS
1,171,473 UART: [kat] --
1,172,242 UART: [cold-reset] ++
1,172,718 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,200,836 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] --
1,210,078 UART: [ldev] ++
1,210,246 UART: [ldev] CDI.KEYID = 6
1,210,609 UART: [ldev] SUBJECT.KEYID = 5
1,211,035 UART: [ldev] AUTHORITY.KEYID = 7
1,211,498 UART: [ldev] FE.KEYID = 1
1,216,636 UART: [ldev] Erasing FE.KEYID = 1
1,242,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,702 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,283,011 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,876 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,079 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,240 ready_for_fw is high
1,061,240 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,562 >>> mbox cmd response: success
2,702,734 UART:
2,702,750 UART: Running Caliptra FMC ...
2,703,158 UART:
2,703,301 UART: [state] CFI Enabled
2,713,776 UART: [fht] FMC Alias Private Key: 7
2,821,305 UART: [art] Extend RT PCRs Done
2,821,733 UART: [art] Lock RT PCRs Done
2,823,143 UART: [art] Populate DV Done
2,831,322 UART: [fht] FMC Alias Private Key: 7
2,832,492 UART: [art] Derive CDI
2,832,772 UART: [art] Store in in slot 0x4
2,918,461 UART: [art] Derive Key Pair
2,918,821 UART: [art] Store priv key in slot 0x5
2,933,155 UART: [art] Derive Key Pair - Done
2,947,742 UART: [art] Signing Cert with AUTHO
2,948,222 UART: RITY.KEYID = 7
2,963,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,361 UART: [art] PUB.X = F858E839C801B5AA7C5D984EF883D480B8C6B86B31D62425A849EFEA3F3AA18C88E646CA45ED51EAACCF870EA6BF5607
2,971,140 UART: [art] PUB.Y = 64CC8902AC818195BD0AC529AEFF7341823D3D52AED00380C7567666C0E8ECA91AFED339673BB93B5778210745EDBE08
2,978,081 UART: [art] SIG.R = 6A06A883530B856C310D9E17E015A8BA378B936AED48226CCCDA35FFECAD8878E5733EBA98647768F0A5BACBCE2CB013
2,984,858 UART: [art] SIG.S = 9A1DB28D212974810D7E20495A21AF321033E5F985BABA6A16204B56B8E495F44594F8C63005E3E1960B75089F0C3B75
3,009,226 UART: Caliptra RT
3,009,572 UART: [state] CFI Enabled
3,117,342 UART: [rt] RT listening for mailbox commands...
3,118,005 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,585 UART: [rt]cmd =0x46504c54, len=4
3,148,885 >>> mbox cmd response data (8 bytes)
3,149,020 UART: [rt] FIPS self test
3,149,348 UART: [kat] ++
3,149,500 UART: [kat] sha1
3,153,556 UART: [kat] SHA2-256
3,155,578 UART: [kat] SHA2-384
3,158,601 UART: [kat] SHA2-512-ACC
3,159,006 UART: Droping operation
3,159,525 UART: Fatal Error: 0x90050002
3,161,075 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,161,080 >>> mbox cmd response: failed
3,161,080 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,161,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,984 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,640,892 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,170,011 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 ready_for_fw is high
1,174,335 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,442 UART: [ldev] --
1,280,836 UART: [fwproc] Wait for Commands...
1,281,513 UART: [fwproc] Recv command 0x46574c44
1,282,246 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,700 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,746 >>> mbox cmd response: success
2,783,839 UART: [afmc] ++
2,784,007 UART: [afmc] CDI.KEYID = 6
2,784,370 UART: [afmc] SUBJECT.KEYID = 7
2,784,796 UART: [afmc] AUTHORITY.KEYID = 5
2,819,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,714 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,433 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,138 UART: [afmc] --
2,863,118 UART: [cold-reset] --
2,864,126 UART: [state] Locking Datavault
2,865,485 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,089 UART: [state] Locking ICCM
2,866,759 UART: [exit] Launching FMC @ 0x40000130
2,872,088 UART:
2,872,104 UART: Running Caliptra FMC ...
2,872,512 UART:
2,872,566 UART: [state] CFI Enabled
2,883,071 UART: [fht] FMC Alias Private Key: 7
2,991,392 UART: [art] Extend RT PCRs Done
2,991,820 UART: [art] Lock RT PCRs Done
2,993,528 UART: [art] Populate DV Done
3,001,777 UART: [fht] FMC Alias Private Key: 7
3,002,829 UART: [art] Derive CDI
3,003,109 UART: [art] Store in in slot 0x4
3,088,918 UART: [art] Derive Key Pair
3,089,278 UART: [art] Store priv key in slot 0x5
3,102,392 UART: [art] Derive Key Pair - Done
3,117,207 UART: [art] Signing Cert with AUTHO
3,117,687 UART: RITY.KEYID = 7
3,132,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,428 UART: [art] PUB.X = BE5446917DA6D4BBF887609DC4A5214D5577570468F02DBC16E68D6B86746DF7027F94AEA2C474D025B5291DB4FE8750
3,140,194 UART: [art] PUB.Y = D8F4FFA337FC7806559992B7BB754322F0612146DA697EB79B13C31D8D99E0DC038D9A54352347C6BE2ADD504F56EE9E
3,147,144 UART: [art] SIG.R = 7F949057BD7B8CB0E4C36EE864FF1645F4B24E43BAFEAF4D475F4559DFE9BF48CFFEE2C4B06AB0177B08CF0B157C5D6F
3,153,934 UART: [art] SIG.S = E78BEF919817885E6A0775BE177109538F65E9C02D00667796054DE27115F5CD8ADB77D1806883003501203CF399BBDC
3,177,059 UART: Caliptra RT
3,177,313 UART: [state] CFI Enabled
3,285,007 UART: [rt] RT listening for mailbox commands...
3,285,670 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,294 UART: [rt]cmd =0x46504c54, len=4
3,316,296 >>> mbox cmd response data (8 bytes)
3,316,589 UART: [rt] FIPS self test
3,316,917 UART: [kat] ++
3,317,069 UART: [kat] sha1
3,321,111 UART: [kat] SHA2-256
3,323,133 UART: [kat] SHA2-384
3,325,996 UART: [kat] SHA2-512-ACC
3,326,401 UART: Droping operation
3,326,918 UART: Fatal Error: 0x90050002
3,328,468 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,473 >>> mbox cmd response: failed
3,328,473 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,120 UART: [kat] SHA2-256
890,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,799 UART: [kat] ++
894,951 UART: [kat] sha1
899,051 UART: [kat] SHA2-256
900,991 UART: [kat] SHA2-384
903,728 UART: [kat] SHA2-512-ACC
905,629 UART: [kat] ECC-384
915,578 UART: [kat] HMAC-384Kdf
919,976 UART: [kat] LMS
1,168,288 UART: [kat] --
1,169,323 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,173,941 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,515 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,240,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,256 UART: [fwproc] Wait for Commands...
1,280,829 UART: [fwproc] Recv command 0x46574c44
1,281,562 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,112 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,296 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,438 ready_for_fw is high
1,056,438 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,962 >>> mbox cmd response: success
2,695,078 UART:
2,695,094 UART: Running Caliptra FMC ...
2,695,502 UART:
2,695,556 UART: [state] CFI Enabled
2,705,983 UART: [fht] FMC Alias Private Key: 7
2,814,508 UART: [art] Extend RT PCRs Done
2,814,936 UART: [art] Lock RT PCRs Done
2,816,662 UART: [art] Populate DV Done
2,824,617 UART: [fht] FMC Alias Private Key: 7
2,825,743 UART: [art] Derive CDI
2,826,023 UART: [art] Store in in slot 0x4
2,911,610 UART: [art] Derive Key Pair
2,911,970 UART: [art] Store priv key in slot 0x5
2,924,898 UART: [art] Derive Key Pair - Done
2,939,519 UART: [art] Signing Cert with AUTHO
2,939,999 UART: RITY.KEYID = 7
2,955,031 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,796 UART: [art] PUB.X = B83B1CFA3E404284AA7BB4CEC93C06D12F71CE08ED19F59988FB0C53FBEFCD3660C54D7FAAA0BF39E5174652A9419C45
2,962,577 UART: [art] PUB.Y = 6838F54C5DE2DE9A960F701C9DDC68D9D691ADCD0A0DC49AEB522495ADBA82481D8E4BE0777CCE659AB417B904577618
2,969,529 UART: [art] SIG.R = C70A8F69A01B44EFF13E3DF4897BBB3DFE68842DA81C409DEFBB6453682587AF0538E651CE52D4B2881739FC89BDD46A
2,976,307 UART: [art] SIG.S = CA7D2EAEBF183129903590CF01DA48D1A7B0304FF0B9E3E429431FD8C535C015C52688CAD3757952BA4541AEB1633AD0
3,000,085 UART: Caliptra RT
3,000,339 UART: [state] CFI Enabled
3,107,280 UART: [rt] RT listening for mailbox commands...
3,107,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,281 UART: [rt]cmd =0x46504c54, len=4
3,138,577 >>> mbox cmd response data (8 bytes)
3,138,736 UART: [rt] FIPS self test
3,139,064 UART: [kat] ++
3,139,216 UART: [kat] sha1
3,143,548 UART: [kat] SHA2-256
3,145,570 UART: [kat] SHA2-384
3,148,467 UART: [kat] SHA2-512-ACC
3,148,872 UART: Droping operation
3,149,441 UART: Fatal Error: 0x90050002
3,150,991 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,150,996 >>> mbox cmd response: failed
3,150,996 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,050 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,182 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,806 UART: [fht] FHT @ 0x50003400
1,173,394 UART: [idev] ++
1,173,562 UART: [idev] CDI.KEYID = 6
1,173,923 UART: [idev] SUBJECT.KEYID = 7
1,174,348 UART: [idev] UDS.KEYID = 0
1,174,694 ready_for_fw is high
1,174,694 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,006 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,726 UART: [idev] --
1,208,685 UART: [ldev] ++
1,208,853 UART: [ldev] CDI.KEYID = 6
1,209,217 UART: [ldev] SUBJECT.KEYID = 5
1,209,644 UART: [ldev] AUTHORITY.KEYID = 7
1,210,107 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,317 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46574c44
1,282,839 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,775 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,979 >>> mbox cmd response: success
2,785,132 UART: [afmc] ++
2,785,300 UART: [afmc] CDI.KEYID = 6
2,785,663 UART: [afmc] SUBJECT.KEYID = 7
2,786,089 UART: [afmc] AUTHORITY.KEYID = 5
2,821,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,301 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,913 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,632 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,279 UART: [afmc] --
2,865,271 UART: [cold-reset] --
2,866,179 UART: [state] Locking Datavault
2,867,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,112 UART: [state] Locking ICCM
2,868,626 UART: [exit] Launching FMC @ 0x40000130
2,873,955 UART:
2,873,971 UART: Running Caliptra FMC ...
2,874,379 UART:
2,874,522 UART: [state] CFI Enabled
2,884,939 UART: [fht] FMC Alias Private Key: 7
2,993,310 UART: [art] Extend RT PCRs Done
2,993,738 UART: [art] Lock RT PCRs Done
2,995,608 UART: [art] Populate DV Done
3,004,101 UART: [fht] FMC Alias Private Key: 7
3,005,209 UART: [art] Derive CDI
3,005,489 UART: [art] Store in in slot 0x4
3,091,194 UART: [art] Derive Key Pair
3,091,554 UART: [art] Store priv key in slot 0x5
3,104,946 UART: [art] Derive Key Pair - Done
3,119,653 UART: [art] Signing Cert with AUTHO
3,120,133 UART: RITY.KEYID = 7
3,135,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,982 UART: [art] PUB.X = 7913FD2DCFDB108DE36EE17624D0E7A0236FC59B307C8066E7E629522DC4D6BB258245B2EE05741F4C0E1AB2AE9C3ABA
3,142,762 UART: [art] PUB.Y = ED367DE7EBD1CE295C029095443FEBA3EFAE007F6DE95D8B0ACF2DFC000DD49170B9DA027700125A98B7B380A583CF5E
3,149,654 UART: [art] SIG.R = 8DC8FCE4794858BD3725D7229ED3C2A098121F28916A9F30ACA91C7C7218CCB7B0D102D798CD5334FD80DAF458DB1E63
3,156,431 UART: [art] SIG.S = B40BC3ECD3F243EAF901367847DF741074BAEA48DB2F1783AE1A4313F7C747376DBE7A5A29958E2D9BDE2B702E0CE207
3,180,308 UART: Caliptra RT
3,180,654 UART: [state] CFI Enabled
3,289,629 UART: [rt] RT listening for mailbox commands...
3,290,292 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,876 UART: [rt]cmd =0x46504c54, len=4
3,321,032 >>> mbox cmd response data (8 bytes)
3,321,187 UART: [rt] FIPS self test
3,321,515 UART: [kat] ++
3,321,667 UART: [kat] sha1
3,326,061 UART: [kat] SHA2-256
3,328,083 UART: [kat] SHA2-384
3,331,014 UART: [kat] SHA2-512-ACC
3,331,419 UART: Droping operation
3,331,944 UART: Fatal Error: 0x90050002
3,333,494 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,499 >>> mbox cmd response: failed
3,333,499 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,088 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,174,332 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,906 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,071 UART: [ldev] ++
1,209,239 UART: [ldev] CDI.KEYID = 6
1,209,603 UART: [ldev] SUBJECT.KEYID = 5
1,210,030 UART: [ldev] AUTHORITY.KEYID = 7
1,210,493 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,282,116 UART: [fwproc] Recv command 0x46574c44
1,282,849 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,889 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,959 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,589 ready_for_fw is high
1,056,589 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,327 >>> mbox cmd response: success
2,697,559 UART:
2,697,575 UART: Running Caliptra FMC ...
2,697,983 UART:
2,698,126 UART: [state] CFI Enabled
2,708,917 UART: [fht] FMC Alias Private Key: 7
2,816,856 UART: [art] Extend RT PCRs Done
2,817,284 UART: [art] Lock RT PCRs Done
2,819,062 UART: [art] Populate DV Done
2,827,193 UART: [fht] FMC Alias Private Key: 7
2,828,323 UART: [art] Derive CDI
2,828,603 UART: [art] Store in in slot 0x4
2,914,490 UART: [art] Derive Key Pair
2,914,850 UART: [art] Store priv key in slot 0x5
2,928,324 UART: [art] Derive Key Pair - Done
2,942,989 UART: [art] Signing Cert with AUTHO
2,943,469 UART: RITY.KEYID = 7
2,958,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,490 UART: [art] PUB.X = 6C4C00ECA4B49F9B497D4A35AE68890E75DCA88E49E232134A2F2FFD62A3A90D5E27A00E8DB95A44BFA81A54DC231269
2,966,243 UART: [art] PUB.Y = 08D0434FF7FB1397BB9A0E86902F0695EA5EB78501F0FDE6FE04910E7EBC1795BB2E5F89A349BEFF9F1F5F6527CEE3E4
2,973,193 UART: [art] SIG.R = B44FCE733425610D646D5E8F1589430E5E192C33A38C8A12DF115A297442FEB0450B902784AE316C4A6C687BFD66BF7F
2,979,956 UART: [art] SIG.S = 34B041374E9FB2B64D7F96F47F6D422FBCE894CF0CB5ACEF626F6D7CED790E0333235A2A683F711A66AA65E61BC6AF74
3,003,926 UART: Caliptra RT
3,004,272 UART: [state] CFI Enabled
3,113,402 UART: [rt] RT listening for mailbox commands...
3,114,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,591 UART: [rt]cmd =0x46504c54, len=4
3,144,611 >>> mbox cmd response data (8 bytes)
3,144,784 UART: [rt] FIPS self test
3,145,112 UART: [kat] ++
3,145,264 UART: [kat] sha1
3,149,424 UART: [kat] SHA2-256
3,151,446 UART: [kat] SHA2-384
3,154,463 UART: [kat] SHA2-512-ACC
3,154,868 UART: Droping operation
3,155,255 UART: Fatal Error: 0x90050002
3,156,805 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,156,810 >>> mbox cmd response: failed
3,156,810 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,156,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,607 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,099 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,694,504 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,838,633 >>> mbox cmd response: failed
2,839,194 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,982,396 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
4,872,968 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,468,345 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,692,018 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,836,123 >>> mbox cmd response: failed
2,836,692 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,979,768 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,859,560 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,439,983 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,044,215 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,188,304 >>> mbox cmd response: failed
3,188,876 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,332,298 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
21,575,518 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,022,933 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,039,368 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,183,511 >>> mbox cmd response: failed
3,184,061 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,327,246 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
21,583,161 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,011,363 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,701,735 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,846,558 >>> mbox cmd response: failed
2,847,184 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,990,765 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
3,454,234 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,262,955 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,693,037 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,837,469 >>> mbox cmd response: failed
2,838,062 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,981,720 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
3,440,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,284,502 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,696,057 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,840,591 >>> mbox cmd response: failed
2,841,163 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,984,834 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,478,026 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,349,830 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,047,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,192,743 >>> mbox cmd response: failed
3,193,365 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,337,006 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
20,190,695 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,906,230 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,062,493 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,207,034 >>> mbox cmd response: failed
3,207,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,351,996 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,183,059 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,884,275 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,618 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,626 >>> mbox cmd response: failed
813,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,853 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,294 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,464 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,472 >>> mbox cmd response: failed
813,472 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,515 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,246 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,215 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,223 >>> mbox cmd response: failed
813,223 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,074 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,575 >>> mbox cmd response: failed
813,575 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,575 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,238 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,246 >>> mbox cmd response: failed
813,246 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,130 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,674 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,682 >>> mbox cmd response: failed
812,682 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,799 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,366 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,751 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,759 >>> mbox cmd response: failed
812,759 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,622 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,963 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,647 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,655 >>> mbox cmd response: failed
813,655 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,661 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,784 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,111 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,728 >>> mbox cmd response: failed
813,728 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,443 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,562 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,530 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,538 >>> mbox cmd response: failed
812,538 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,371 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,204 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,985 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,993 >>> mbox cmd response: failed
812,993 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,418 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,733 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,713 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,721 >>> mbox cmd response: failed
813,721 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
813,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,686 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,157 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,101 UART:
192,471 UART: Running Caliptra ROM ...
193,586 UART:
193,731 UART: [state] CFI Enabled
264,062 UART: [state] LifecycleState = Unprovisioned
265,980 UART: [state] DebugLocked = No
268,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,734 UART: [kat] SHA2-256
443,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,938 UART: [kat] ++
454,486 UART: [kat] sha1
465,576 UART: [kat] SHA2-256
468,229 UART: [kat] SHA2-384
473,224 UART: [kat] SHA2-512-ACC
475,594 UART: [kat] ECC-384
2,767,404 UART: [kat] HMAC-384Kdf
2,799,724 UART: [kat] LMS
3,990,027 UART: [kat] --
3,994,105 UART: [cold-reset] ++
3,995,477 UART: [fht] Storing FHT @ 0x50003400
4,007,530 UART: [idev] ++
4,008,102 UART: [idev] CDI.KEYID = 6
4,009,022 UART: [idev] SUBJECT.KEYID = 7
4,010,278 UART: [idev] UDS.KEYID = 0
4,011,627 ready_for_fw is high
4,011,879 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,156,367 UART: [idev] Erasing UDS.KEYID = 0
7,347,449 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,549 UART: [idev] --
7,374,619 UART: [ldev] ++
7,375,222 UART: [ldev] CDI.KEYID = 6
7,376,114 UART: [ldev] SUBJECT.KEYID = 5
7,377,343 UART: [ldev] AUTHORITY.KEYID = 7
7,378,643 UART: [ldev] FE.KEYID = 1
7,421,106 UART: [ldev] Erasing FE.KEYID = 1
10,754,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,102 UART: [ldev] --
13,134,096 UART: [fwproc] Waiting for Commands...
13,137,230 UART: [fwproc] Received command 0x46574c44
13,139,434 UART: [fwproc] Received Image of size 114916 bytes
17,205,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,347,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,668,439 >>> mbox cmd response: success
17,672,867 UART: [afmc] ++
17,673,461 UART: [afmc] CDI.KEYID = 6
17,674,430 UART: [afmc] SUBJECT.KEYID = 7
17,675,647 UART: [afmc] AUTHORITY.KEYID = 5
21,043,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,420 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,729 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,364,117 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,378,971 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,393,399 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,414,268 UART: [afmc] --
23,418,667 UART: [cold-reset] --
23,424,042 UART: [state] Locking Datavault
23,429,558 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,310 UART: [state] Locking ICCM
23,433,652 UART: [exit] Launching FMC @ 0x40000130
23,442,041 UART:
23,442,283 UART: Running Caliptra FMC ...
23,443,385 UART:
23,443,543 UART: [state] CFI Enabled
23,505,965 UART: [fht] FMC Alias Private Key: 7
25,844,353 UART: [art] Extend RT PCRs Done
25,845,589 UART: [art] Lock RT PCRs Done
25,847,299 UART: [art] Populate DV Done
25,852,680 UART: [fht] FMC Alias Private Key: 7
25,854,160 UART: [art] Derive CDI
25,855,094 UART: [art] Store in in slot 0x4
25,912,853 UART: [art] Derive Key Pair
25,913,851 UART: [art] Store priv key in slot 0x5
29,206,790 UART: [art] Derive Key Pair - Done
29,220,044 UART: [art] Signing Cert with AUTHO
29,221,376 UART: RITY.KEYID = 7
31,507,160 UART: [art] Erasing AUTHORITY.KEYID = 7
31,508,666 UART: [art] PUB.X = 886031E4D647BC5F597A9A863E088CCF9533B25479B7A4B51C74F27391B9BB197535408CCFC26BCEE76FBB762AB07F12
31,515,927 UART: [art] PUB.Y = EAECB5C84D636C3579EF27DC934C24034BDD93FF8FD7BAEB0EC03CDD207B249132173096C07B378D8E855D168DF415C1
31,523,165 UART: [art] SIG.R = 9A989788EFA891305355D8802E2B0D701019F6291878F90B10006379230D122272F95130165A21E0D7000FFED983EAE1
31,530,463 UART: [art] SIG.S = D3C585C74A3C34F146053052996E567DC205C997E9B831714C6C5F61A337D1A5A9EA9FE8AE160C087B5CEE8B7C645451
32,835,291 UART: Caliptra RT
32,836,005 UART: [state] CFI Enabled
32,996,805 UART: [rt] RT listening for mailbox commands...
32,998,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,028,640 UART: [rt]cmd =0x46504c54, len=4
33,030,009 >>> mbox cmd response data (8 bytes)
33,031,378 UART: [rt] FIPS self test
33,032,328 UART: [kat] ++
33,032,779 UART: [kat] sha1
33,037,291 UART: [kat] SHA2-256
33,039,225 UART: [kat] SHA2-384
33,042,238 UART: [kat] SHA2-512-ACC
33,043,236 UART: Droping operation
33,044,208 UART: Fatal Error: 0x90050003
33,079,524 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,223,904 >>> mbox cmd response: failed
33,224,546 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,368,657 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
190,146 UART:
190,433 UART: Running Caliptra ROM ...
191,541 UART:
191,692 UART: [state] CFI Enabled
250,024 UART: [state] LifecycleState = Unprovisioned
252,028 UART: [state] DebugLocked = No
253,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
257,765 UART: [kat] SHA2-256
427,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,960 UART: [kat] ++
438,488 UART: [kat] sha1
450,184 UART: [kat] SHA2-256
452,866 UART: [kat] SHA2-384
460,248 UART: [kat] SHA2-512-ACC
462,638 UART: [kat] ECC-384
2,752,800 UART: [kat] HMAC-384Kdf
2,784,153 UART: [kat] LMS
3,974,432 UART: [kat] --
3,978,208 UART: [cold-reset] ++
3,980,088 UART: [fht] Storing FHT @ 0x50003400
3,992,487 UART: [idev] ++
3,993,054 UART: [idev] CDI.KEYID = 6
3,993,968 UART: [idev] SUBJECT.KEYID = 7
3,995,238 UART: [idev] UDS.KEYID = 0
3,996,953 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,141,496 UART: [idev] Erasing UDS.KEYID = 0
7,332,550 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,315 UART: [idev] --
7,359,234 UART: [ldev] ++
7,359,807 UART: [ldev] CDI.KEYID = 6
7,360,772 UART: [ldev] SUBJECT.KEYID = 5
7,362,089 UART: [ldev] AUTHORITY.KEYID = 7
7,363,230 UART: [ldev] FE.KEYID = 1
7,405,611 UART: [ldev] Erasing FE.KEYID = 1
10,741,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,095 UART: [ldev] --
13,117,121 UART: [fwproc] Waiting for Commands...
13,119,821 UART: [fwproc] Received command 0x46574c44
13,122,062 UART: [fwproc] Received Image of size 114916 bytes
17,180,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,404 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,646,862 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,782,594 ready_for_fw is high
3,783,233 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,868,644 >>> mbox cmd response: success
23,567,186 UART:
23,567,625 UART: Running Caliptra FMC ...
23,568,757 UART:
23,568,913 UART: [state] CFI Enabled
23,639,029 UART: [fht] FMC Alias Private Key: 7
25,977,189 UART: [art] Extend RT PCRs Done
25,978,420 UART: [art] Lock RT PCRs Done
25,980,159 UART: [art] Populate DV Done
25,985,623 UART: [fht] FMC Alias Private Key: 7
25,987,335 UART: [art] Derive CDI
25,988,157 UART: [art] Store in in slot 0x4
26,047,265 UART: [art] Derive Key Pair
26,048,314 UART: [art] Store priv key in slot 0x5
29,340,980 UART: [art] Derive Key Pair - Done
29,354,141 UART: [art] Signing Cert with AUTHO
29,355,446 UART: RITY.KEYID = 7
31,643,332 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,865 UART: [art] PUB.X = 2ECA2A994D537C4C191BAE2D4785D0D97B740E5EEAC5B95E21DBB20B633DBA404220E058E458B91722FDDDB90264F316
31,652,075 UART: [art] PUB.Y = E1D81561A62241485362E83A242E902C322991275E27EAEAA6508763EB78E066CA6ED8599C4A7AFEADE30E9AE3767DC4
31,659,286 UART: [art] SIG.R = 61E1CAD7B81247117C1C8FF98BAC15C17A69C4BDA1F749CF906DBFE21B7ED95BBCA74DC4C36D763956278EACE1553BDD
31,666,702 UART: [art] SIG.S = 6E1C5E05F937F1493686A0FECE25F3ABBAE03853C7118E1E1398BB288E8616F208D6F04C52F5144965F19FB2B09094AE
32,971,793 UART: Caliptra RT
32,972,518 UART: [state] CFI Enabled
33,144,656 UART: [rt] RT listening for mailbox commands...
33,146,537 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,176,326 UART: [rt]cmd =0x46504c54, len=4
33,177,963 >>> mbox cmd response data (8 bytes)
33,178,771 UART: [rt] FIPS self test
33,179,722 UART: [kat] ++
33,180,175 UART: [kat] sha1
33,184,559 UART: [kat] SHA2-256
33,186,495 UART: [kat] SHA2-384
33,189,670 UART: [kat] SHA2-512-ACC
33,190,650 UART: Droping operation
33,191,536 UART: Fatal Error: 0x90050003
33,226,861 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,371,203 >>> mbox cmd response: failed
33,371,855 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,516,017 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,768,725 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,859,007 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,405 UART:
192,901 UART: Running Caliptra ROM ...
194,042 UART:
603,481 UART: [state] CFI Enabled
620,439 UART: [state] LifecycleState = Unprovisioned
622,434 UART: [state] DebugLocked = No
624,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,209 UART: [kat] SHA2-256
799,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,514 UART: [kat] ++
810,047 UART: [kat] sha1
820,934 UART: [kat] SHA2-256
823,593 UART: [kat] SHA2-384
829,447 UART: [kat] SHA2-512-ACC
831,767 UART: [kat] ECC-384
3,118,417 UART: [kat] HMAC-384Kdf
3,130,677 UART: [kat] LMS
4,320,739 UART: [kat] --
4,324,264 UART: [cold-reset] ++
4,325,424 UART: [fht] Storing FHT @ 0x50003400
4,338,613 UART: [idev] ++
4,339,181 UART: [idev] CDI.KEYID = 6
4,340,105 UART: [idev] SUBJECT.KEYID = 7
4,341,355 UART: [idev] UDS.KEYID = 0
4,342,399 ready_for_fw is high
4,342,633 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,487,083 UART: [idev] Erasing UDS.KEYID = 0
7,625,387 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,045 UART: [idev] --
7,649,894 UART: [ldev] ++
7,650,538 UART: [ldev] CDI.KEYID = 6
7,651,458 UART: [ldev] SUBJECT.KEYID = 5
7,652,624 UART: [ldev] AUTHORITY.KEYID = 7
7,653,858 UART: [ldev] FE.KEYID = 1
7,665,467 UART: [ldev] Erasing FE.KEYID = 1
10,952,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,967 UART: [ldev] --
13,312,259 UART: [fwproc] Waiting for Commands...
13,315,218 UART: [fwproc] Received command 0x46574c44
13,317,415 UART: [fwproc] Received Image of size 114916 bytes
17,375,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,841,537 >>> mbox cmd response: success
17,845,582 UART: [afmc] ++
17,846,176 UART: [afmc] CDI.KEYID = 6
17,847,060 UART: [afmc] SUBJECT.KEYID = 7
17,848,331 UART: [afmc] AUTHORITY.KEYID = 5
21,164,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,134 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,434 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,776 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,617 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,055 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,194 UART: [afmc] --
23,532,922 UART: [cold-reset] --
23,537,321 UART: [state] Locking Datavault
23,541,698 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,469 UART: [state] Locking ICCM
23,544,701 UART: [exit] Launching FMC @ 0x40000130
23,553,095 UART:
23,553,343 UART: Running Caliptra FMC ...
23,554,446 UART:
23,554,602 UART: [state] CFI Enabled
23,562,053 UART: [fht] FMC Alias Private Key: 7
25,893,118 UART: [art] Extend RT PCRs Done
25,894,343 UART: [art] Lock RT PCRs Done
25,896,078 UART: [art] Populate DV Done
25,901,708 UART: [fht] FMC Alias Private Key: 7
25,903,310 UART: [art] Derive CDI
25,904,126 UART: [art] Store in in slot 0x4
25,946,125 UART: [art] Derive Key Pair
25,947,124 UART: [art] Store priv key in slot 0x5
29,188,912 UART: [art] Derive Key Pair - Done
29,202,038 UART: [art] Signing Cert with AUTHO
29,203,348 UART: RITY.KEYID = 7
31,482,993 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,515 UART: [art] PUB.X = CD3C70FC86D217376683A6F3BEB937798736C6F4B954ACDD18647D1D96A9852B8A3E0B2F8AB65841246FD13DD86F2DA2
31,491,745 UART: [art] PUB.Y = DA0121CD687498C2D1231F98339E3FC78B3A44F8D2E61A71F62622D5176237E325A597AFAA43124F4961A74381721B06
31,498,960 UART: [art] SIG.R = C87B7D2D3596E02697D6AF922329B114FBBF714FFAE4CE54A28F4D7BE29E96CB20D30DF4D4B76BFFEA3C9C2DDC37BA44
31,506,358 UART: [art] SIG.S = 57EE0EFB7EF8A2A99BCFD775BFD99838B6969504030215B380F7F805A6C0A552004F9E72645719C87796AFB185CA772B
32,811,816 UART: Caliptra RT
32,812,529 UART: [state] CFI Enabled
32,928,818 UART: [rt] RT listening for mailbox commands...
32,930,669 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,960,355 UART: [rt]cmd =0x46504c54, len=4
32,962,042 >>> mbox cmd response data (8 bytes)
32,962,952 UART: [rt] FIPS self test
32,963,892 UART: [kat] ++
32,964,341 UART: [kat] sha1
32,968,951 UART: [kat] SHA2-256
32,970,888 UART: [kat] SHA2-384
32,973,898 UART: [kat] SHA2-512-ACC
32,974,945 UART: Droping operation
32,975,907 UART: Fatal Error: 0x90050003
33,011,221 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,155,465 >>> mbox cmd response: failed
33,156,070 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,300,295 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,077 UART:
190,392 UART: Running Caliptra ROM ...
191,447 UART:
7,236,665 UART: [state] CFI Enabled
7,253,686 UART: [state] LifecycleState = Unprovisioned
7,255,617 UART: [state] DebugLocked = No
7,257,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,261,579 UART: [kat] SHA2-256
7,431,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,441,882 UART: [kat] ++
7,442,338 UART: [kat] sha1
7,452,365 UART: [kat] SHA2-256
7,455,061 UART: [kat] SHA2-384
7,462,186 UART: [kat] SHA2-512-ACC
7,464,534 UART: [kat] ECC-384
9,748,952 UART: [kat] HMAC-384Kdf
9,761,876 UART: [kat] LMS
10,951,982 UART: [kat] --
10,956,317 UART: [cold-reset] ++
10,958,956 UART: [fht] Storing FHT @ 0x50003400
10,969,952 UART: [idev] ++
10,970,543 UART: [idev] CDI.KEYID = 6
10,971,450 UART: [idev] SUBJECT.KEYID = 7
10,972,719 UART: [idev] UDS.KEYID = 0
10,974,235 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,118,529 UART: [idev] Erasing UDS.KEYID = 0
14,258,727 UART: [idev] Using Sha1 for KeyId Algorithm
14,279,781 UART: [idev] --
14,283,262 UART: [ldev] ++
14,283,849 UART: [ldev] CDI.KEYID = 6
14,284,814 UART: [ldev] SUBJECT.KEYID = 5
14,286,031 UART: [ldev] AUTHORITY.KEYID = 7
14,287,265 UART: [ldev] FE.KEYID = 1
14,297,045 UART: [ldev] Erasing FE.KEYID = 1
17,583,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,873,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,917,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,935,280 UART: [ldev] --
19,940,710 UART: [fwproc] Waiting for Commands...
19,943,403 UART: [fwproc] Received command 0x46574c44
19,945,599 UART: [fwproc] Received Image of size 114916 bytes
24,006,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,085,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,154,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,474,016 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,128,225 ready_for_fw is high
4,128,669 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,083,671 >>> mbox cmd response: success
23,724,764 UART:
23,725,145 UART: Running Caliptra FMC ...
23,726,258 UART:
23,726,412 UART: [state] CFI Enabled
23,735,013 UART: [fht] FMC Alias Private Key: 7
26,065,715 UART: [art] Extend RT PCRs Done
26,066,945 UART: [art] Lock RT PCRs Done
26,068,599 UART: [art] Populate DV Done
26,073,910 UART: [fht] FMC Alias Private Key: 7
26,075,454 UART: [art] Derive CDI
26,076,192 UART: [art] Store in in slot 0x4
26,118,736 UART: [art] Derive Key Pair
26,119,736 UART: [art] Store priv key in slot 0x5
29,361,739 UART: [art] Derive Key Pair - Done
29,374,903 UART: [art] Signing Cert with AUTHO
29,376,203 UART: RITY.KEYID = 7
31,655,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,200 UART: [art] PUB.X = DCD2B7143A14BBC4E373210F4349627F5F692D9D1184796E30A059AB91108067D26EAB298B3058A8C3F53D665D68763E
31,664,459 UART: [art] PUB.Y = 9FC29C877EB547BBB73B630DD9604BA2185024892EBF9D5661341CAC9B76D28187B0D1108677633F8D7ACDB96431A47F
31,671,641 UART: [art] SIG.R = 7012A591A02D7B59C07454BB3F774DAD2BA49D057EF9C948873D4910F326A7F67DFBAF0FD38B1F16023E39F1CFFD22DD
31,679,036 UART: [art] SIG.S = 23EAE0C32D38AA693FF06C6BD27C024CBD1E745A66F9E4FAB2FA5256128CE1E8CA6CEF3FAD269AE63045BB8C76B14021
32,984,142 UART: Caliptra RT
32,984,862 UART: [state] CFI Enabled
33,101,878 UART: [rt] RT listening for mailbox commands...
33,103,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,133,545 UART: [rt]cmd =0x46504c54, len=4
33,135,231 >>> mbox cmd response data (8 bytes)
33,136,117 UART: [rt] FIPS self test
33,137,061 UART: [kat] ++
33,137,509 UART: [kat] sha1
33,141,911 UART: [kat] SHA2-256
33,143,837 UART: [kat] SHA2-384
33,146,829 UART: [kat] SHA2-512-ACC
33,147,831 UART: Droping operation
33,148,827 UART: Fatal Error: 0x90050003
33,184,200 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,328,396 >>> mbox cmd response: failed
33,328,988 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,473,232 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
10,578,300 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,554,247 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,434 UART:
192,791 UART: Running Caliptra ROM ...
194,009 UART:
194,166 UART: [state] CFI Enabled
260,327 UART: [state] LifecycleState = Unprovisioned
262,155 UART: [state] DebugLocked = No
264,566 UART: [state] WD Timer not started. Device not locked for debugging
267,419 UART: [kat] SHA2-256
446,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,111 UART: [kat] ++
458,589 UART: [kat] sha1
469,239 UART: [kat] SHA2-256
472,274 UART: [kat] SHA2-384
478,492 UART: [kat] SHA2-512-ACC
481,437 UART: [kat] ECC-384
2,945,078 UART: [kat] HMAC-384Kdf
2,968,622 UART: [kat] LMS
3,498,087 UART: [kat] --
3,500,805 UART: [cold-reset] ++
3,503,263 UART: [fht] FHT @ 0x50003400
3,513,611 UART: [idev] ++
3,514,175 UART: [idev] CDI.KEYID = 6
3,515,228 UART: [idev] SUBJECT.KEYID = 7
3,516,332 UART: [idev] UDS.KEYID = 0
3,517,262 ready_for_fw is high
3,517,489 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,662,532 UART: [idev] Erasing UDS.KEYID = 0
6,025,938 UART: [idev] Sha1 KeyId Algorithm
6,048,975 UART: [idev] --
6,052,712 UART: [ldev] ++
6,053,283 UART: [ldev] CDI.KEYID = 6
6,054,193 UART: [ldev] SUBJECT.KEYID = 5
6,055,407 UART: [ldev] AUTHORITY.KEYID = 7
6,056,637 UART: [ldev] FE.KEYID = 1
6,097,489 UART: [ldev] Erasing FE.KEYID = 1
8,600,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,729 UART: [ldev] --
10,410,585 UART: [fwproc] Wait for Commands...
10,413,438 UART: [fwproc] Recv command 0x46574c44
10,415,535 UART: [fwproc] Recv'd Img size: 115224 bytes
13,835,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,227 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,296,428 >>> mbox cmd response: success
14,300,057 UART: [afmc] ++
14,300,684 UART: [afmc] CDI.KEYID = 6
14,301,602 UART: [afmc] SUBJECT.KEYID = 7
14,302,772 UART: [afmc] AUTHORITY.KEYID = 5
16,845,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,567,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,569,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,585,253 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,601,299 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,617,124 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,641,025 UART: [afmc] --
18,644,844 UART: [cold-reset] --
18,648,818 UART: [state] Locking Datavault
18,653,691 UART: [state] Locking PCR0, PCR1 and PCR31
18,655,366 UART: [state] Locking ICCM
18,656,714 UART: [exit] Launching FMC @ 0x40000130
18,665,170 UART:
18,665,417 UART: Running Caliptra FMC ...
18,666,522 UART:
18,666,688 UART: [state] CFI Enabled
18,729,060 UART: [fht] FMC Alias Private Key: 7
20,492,696 UART: [art] Extend RT PCRs Done
20,493,928 UART: [art] Lock RT PCRs Done
20,495,388 UART: [art] Populate DV Done
20,500,801 UART: [fht] FMC Alias Private Key: 7
20,502,445 UART: [art] Derive CDI
20,503,258 UART: [art] Store in in slot 0x4
20,561,270 UART: [art] Derive Key Pair
20,562,300 UART: [art] Store priv key in slot 0x5
23,024,940 UART: [art] Derive Key Pair - Done
23,037,738 UART: [art] Signing Cert with AUTHO
23,039,047 UART: RITY.KEYID = 7
24,750,665 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,180 UART: [art] PUB.X = 434F6F69EE7E7E4A49A96D0A0ED33C265163F594095B976FED8DDDE4C81D9367C9FD2CB90A65EF1C9DA73CE8E06BD107
24,759,440 UART: [art] PUB.Y = 3E0133A7ED20FE33045C517742278A94B9AD354D04E20648FC077F0C7D38639B88842238D95E9E5BEC043D82713B83D5
24,766,681 UART: [art] SIG.R = 72A9AE5AF971B842C38C1F5208C4F6CAACF098CB512EFCC4DBF1B2384A1F96479A95E40DE149EC89F5F0CC9BB36966DD
24,774,091 UART: [art] SIG.S = D6AFFDCA3EC033EF6CCAC37C189219FD9BC502140F1FC1493EACCB25CCED5281DB19CD0C022B61DA9D89559951188735
25,752,742 UART: Caliptra RT
25,753,459 UART: [state] CFI Enabled
25,919,334 UART: [rt] RT listening for mailbox commands...
25,921,188 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,950,968 UART: [rt]cmd =0x46504c54, len=4
25,952,591 >>> mbox cmd response data (8 bytes)
25,953,712 UART: [rt] FIPS self test
25,954,656 UART: [kat] ++
25,955,100 UART: [kat] sha1
25,959,717 UART: [kat] SHA2-256
25,961,643 UART: [kat] SHA2-384
25,964,496 UART: [kat] SHA2-512-ACC
25,965,487 UART: Droping operation
25,966,312 UART: Fatal Error: 0x90050003
26,001,626 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,146,360 >>> mbox cmd response: failed
26,147,010 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,291,527 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
189,997 UART:
190,286 UART: Running Caliptra ROM ...
191,312 UART:
191,450 UART: [state] CFI Enabled
249,987 UART: [state] LifecycleState = Unprovisioned
251,846 UART: [state] DebugLocked = No
253,299 UART: [state] WD Timer not started. Device not locked for debugging
256,433 UART: [kat] SHA2-256
435,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,094 UART: [kat] ++
447,633 UART: [kat] sha1
457,870 UART: [kat] SHA2-256
460,870 UART: [kat] SHA2-384
467,354 UART: [kat] SHA2-512-ACC
470,301 UART: [kat] ECC-384
2,929,891 UART: [kat] HMAC-384Kdf
2,957,740 UART: [kat] LMS
3,487,151 UART: [kat] --
3,493,085 UART: [cold-reset] ++
3,495,558 UART: [fht] FHT @ 0x50003400
3,506,972 UART: [idev] ++
3,507,535 UART: [idev] CDI.KEYID = 6
3,508,416 UART: [idev] SUBJECT.KEYID = 7
3,509,629 UART: [idev] UDS.KEYID = 0
3,511,191 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,656,120 UART: [idev] Erasing UDS.KEYID = 0
6,010,835 UART: [idev] Sha1 KeyId Algorithm
6,033,154 UART: [idev] --
6,036,619 UART: [ldev] ++
6,037,214 UART: [ldev] CDI.KEYID = 6
6,038,099 UART: [ldev] SUBJECT.KEYID = 5
6,039,267 UART: [ldev] AUTHORITY.KEYID = 7
6,040,566 UART: [ldev] FE.KEYID = 1
6,084,687 UART: [ldev] Erasing FE.KEYID = 1
8,589,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,512 UART: [ldev] --
10,398,422 UART: [fwproc] Wait for Commands...
10,400,142 UART: [fwproc] Recv command 0x46574c44
10,402,191 UART: [fwproc] Recv'd Img size: 115224 bytes
13,807,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,286 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,266,188 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,467 UART:
192,841 UART: Running Caliptra ROM ...
193,989 UART:
194,137 UART: [state] CFI Enabled
266,112 UART: [state] LifecycleState = Unprovisioned
268,456 UART: [state] DebugLocked = No
270,570 UART: [state] WD Timer not started. Device not locked for debugging
275,675 UART: [kat] SHA2-256
465,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,335 UART: [kat] ++
476,810 UART: [kat] sha1
486,644 UART: [kat] SHA2-256
489,663 UART: [kat] SHA2-384
495,232 UART: [kat] SHA2-512-ACC
497,885 UART: [kat] ECC-384
2,948,092 UART: [kat] HMAC-384Kdf
2,971,486 UART: [kat] LMS
3,503,218 UART: [kat] --
3,507,291 UART: [cold-reset] ++
3,509,581 UART: [fht] FHT @ 0x50003400
3,521,842 UART: [idev] ++
3,522,480 UART: [idev] CDI.KEYID = 6
3,523,510 UART: [idev] SUBJECT.KEYID = 7
3,524,688 UART: [idev] UDS.KEYID = 0
3,525,616 ready_for_fw is high
3,525,822 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,108 UART: [idev] Erasing UDS.KEYID = 0
6,029,316 UART: [idev] Sha1 KeyId Algorithm
6,051,701 UART: [idev] --
6,056,895 UART: [ldev] ++
6,057,584 UART: [ldev] CDI.KEYID = 6
6,058,507 UART: [ldev] SUBJECT.KEYID = 5
6,059,728 UART: [ldev] AUTHORITY.KEYID = 7
6,060,907 UART: [ldev] FE.KEYID = 1
6,092,137 UART: [ldev] Erasing FE.KEYID = 1
8,600,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,342 UART: [ldev] --
10,407,012 UART: [fwproc] Wait for Commands...
10,409,924 UART: [fwproc] Recv command 0x46574c44
10,412,269 UART: [fwproc] Recv'd Img size: 115224 bytes
13,863,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,013 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,609,027 >>> mbox cmd response: success
14,613,360 UART: [afmc] ++
14,614,068 UART: [afmc] CDI.KEYID = 6
14,615,312 UART: [afmc] SUBJECT.KEYID = 7
14,616,740 UART: [afmc] AUTHORITY.KEYID = 5
17,145,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,887,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,889,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,904,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,919,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,934,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,958,556 UART: [afmc] --
18,962,006 UART: [cold-reset] --
18,965,932 UART: [state] Locking Datavault
18,970,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,972,621 UART: [state] Locking ICCM
18,975,531 UART: [exit] Launching FMC @ 0x40000130
18,984,200 UART:
18,984,441 UART: Running Caliptra FMC ...
18,985,758 UART:
18,985,931 UART: [state] CFI Enabled
19,046,681 UART: [fht] FMC Alias Private Key: 7
20,810,816 UART: [art] Extend RT PCRs Done
20,812,040 UART: [art] Lock RT PCRs Done
20,813,585 UART: [art] Populate DV Done
20,818,840 UART: [fht] FMC Alias Private Key: 7
20,820,377 UART: [art] Derive CDI
20,821,110 UART: [art] Store in in slot 0x4
20,879,413 UART: [art] Derive Key Pair
20,880,458 UART: [art] Store priv key in slot 0x5
23,343,611 UART: [art] Derive Key Pair - Done
23,356,503 UART: [art] Signing Cert with AUTHO
23,357,809 UART: RITY.KEYID = 7
25,068,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,979 UART: [art] PUB.X = 9EC07F23258F16D30FF04C4A7B9C0ED27293D6C16AEAB4462FBA9E8B0DE88BBDB1B342A03039382CC3146AD847BE46FD
25,077,242 UART: [art] PUB.Y = 6657CB1659F013D34162C438FA0227552968931C1CBA5B15E360EE04E230D2D9865C2DCA156F52E499EC219F3A0079D9
25,084,485 UART: [art] SIG.R = 6E20B07B6C90D72D5CA53A97EBD5BFCFB26CBC6D0EBB66C290CB3D10350432BDB003055D95150A6560EBEA610F6DC4AA
25,091,895 UART: [art] SIG.S = 7E73BB89E189861B2FF4F7335F79FFD5BE9E8A6C0B2823F482A1928F2A468D7762D2A03A77515F04171373F7900FA2EE
26,070,800 UART: Caliptra RT
26,071,511 UART: [state] CFI Enabled
26,251,283 UART: [rt] RT listening for mailbox commands...
26,253,135 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,282,769 UART: [rt]cmd =0x46504c54, len=4
26,284,497 >>> mbox cmd response data (8 bytes)
26,285,645 UART: [rt] FIPS self test
26,286,598 UART: [kat] ++
26,287,050 UART: [kat] sha1
26,291,510 UART: [kat] SHA2-256
26,293,391 UART: [kat] SHA2-384
26,296,351 UART: [kat] SHA2-512-ACC
26,297,294 UART: Droping operation
26,298,152 UART: Fatal Error: 0x90050003
26,333,355 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,478,131 >>> mbox cmd response: failed
26,478,797 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,623,892 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,120 UART:
190,415 UART: Running Caliptra ROM ...
191,499 UART:
191,645 UART: [state] CFI Enabled
249,113 UART: [state] LifecycleState = Unprovisioned
251,536 UART: [state] DebugLocked = No
254,342 UART: [state] WD Timer not started. Device not locked for debugging
258,357 UART: [kat] SHA2-256
448,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,002 UART: [kat] ++
459,457 UART: [kat] sha1
471,851 UART: [kat] SHA2-256
474,857 UART: [kat] SHA2-384
480,780 UART: [kat] SHA2-512-ACC
483,399 UART: [kat] ECC-384
2,934,692 UART: [kat] HMAC-384Kdf
2,956,926 UART: [kat] LMS
3,488,684 UART: [kat] --
3,492,324 UART: [cold-reset] ++
3,494,099 UART: [fht] FHT @ 0x50003400
3,505,569 UART: [idev] ++
3,506,250 UART: [idev] CDI.KEYID = 6
3,507,191 UART: [idev] SUBJECT.KEYID = 7
3,508,405 UART: [idev] UDS.KEYID = 0
3,509,901 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,654,849 UART: [idev] Erasing UDS.KEYID = 0
6,017,070 UART: [idev] Sha1 KeyId Algorithm
6,040,266 UART: [idev] --
6,045,155 UART: [ldev] ++
6,045,852 UART: [ldev] CDI.KEYID = 6
6,046,775 UART: [ldev] SUBJECT.KEYID = 5
6,047,934 UART: [ldev] AUTHORITY.KEYID = 7
6,049,168 UART: [ldev] FE.KEYID = 1
6,084,611 UART: [ldev] Erasing FE.KEYID = 1
8,588,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,165 UART: [ldev] --
10,398,760 UART: [fwproc] Wait for Commands...
10,401,458 UART: [fwproc] Recv command 0x46574c44
10,403,725 UART: [fwproc] Recv'd Img size: 115224 bytes
13,859,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,129 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,603,571 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,438,551 ready_for_fw is high
3,438,964 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,760,975 >>> mbox cmd response: success
19,040,286 UART:
19,040,685 UART: Running Caliptra FMC ...
19,041,800 UART:
19,041,958 UART: [state] CFI Enabled
19,111,482 UART: [fht] FMC Alias Private Key: 7
20,875,760 UART: [art] Extend RT PCRs Done
20,876,990 UART: [art] Lock RT PCRs Done
20,878,751 UART: [art] Populate DV Done
20,884,122 UART: [fht] FMC Alias Private Key: 7
20,885,788 UART: [art] Derive CDI
20,886,609 UART: [art] Store in in slot 0x4
20,943,392 UART: [art] Derive Key Pair
20,944,435 UART: [art] Store priv key in slot 0x5
23,407,078 UART: [art] Derive Key Pair - Done
23,419,990 UART: [art] Signing Cert with AUTHO
23,421,331 UART: RITY.KEYID = 7
25,132,668 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,163 UART: [art] PUB.X = 31531931F9EE8D24EB368EE4B4798B1DEC9CA0D230A4F8877FBCBB315D8F8600BFF17286FD97B9EF79D111F09395D7E9
25,141,426 UART: [art] PUB.Y = D0331E11B6FEA5CE826F9C8D739753D5AD434DDA3093F3F4F55717231DEDE3D7C02FC23D39C9798ABEA761E713096B33
25,148,695 UART: [art] SIG.R = 4031781E4CE91045A19F3C3502DED2ABDD91C13A6CE4023475659D0AF41DD667D2ECB14D0FFF45AC112E5EE7BFF675BC
25,156,086 UART: [art] SIG.S = A2BDEF016680F87170385B682EBF17B794C028FA3979143677C996621ED7D60F0C3D3EA3D030409C65F7D2F1256012F3
26,134,957 UART: Caliptra RT
26,135,665 UART: [state] CFI Enabled
26,299,208 UART: [rt] RT listening for mailbox commands...
26,301,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,330,881 UART: [rt]cmd =0x46504c54, len=4
26,332,298 >>> mbox cmd response data (8 bytes)
26,333,501 UART: [rt] FIPS self test
26,334,440 UART: [kat] ++
26,334,891 UART: [kat] sha1
26,339,399 UART: [kat] SHA2-256
26,341,325 UART: [kat] SHA2-384
26,344,255 UART: [kat] SHA2-512-ACC
26,345,264 UART: Droping operation
26,346,035 UART: Fatal Error: 0x90050003
26,381,366 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,525,959 >>> mbox cmd response: failed
26,526,541 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,671,180 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,404,058 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,715,668 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,257 writing to cptra_bootfsm_go
194,583 UART:
194,936 UART: Running Caliptra ROM ...
196,029 UART:
605,905 UART: [state] CFI Enabled
622,078 UART: [state] LifecycleState = Unprovisioned
624,462 UART: [state] DebugLocked = No
626,194 UART: [state] WD Timer not started. Device not locked for debugging
631,659 UART: [kat] SHA2-256
821,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,310 UART: [kat] ++
832,831 UART: [kat] sha1
845,271 UART: [kat] SHA2-256
848,285 UART: [kat] SHA2-384
854,427 UART: [kat] SHA2-512-ACC
857,015 UART: [kat] ECC-384
3,298,386 UART: [kat] HMAC-384Kdf
3,311,447 UART: [kat] LMS
3,843,262 UART: [kat] --
3,847,469 UART: [cold-reset] ++
3,849,478 UART: [fht] FHT @ 0x50003400
3,860,129 UART: [idev] ++
3,860,842 UART: [idev] CDI.KEYID = 6
3,861,759 UART: [idev] SUBJECT.KEYID = 7
3,862,876 UART: [idev] UDS.KEYID = 0
3,863,868 ready_for_fw is high
3,864,104 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,008,877 UART: [idev] Erasing UDS.KEYID = 0
6,342,886 UART: [idev] Sha1 KeyId Algorithm
6,363,964 UART: [idev] --
6,368,274 UART: [ldev] ++
6,368,953 UART: [ldev] CDI.KEYID = 6
6,369,861 UART: [ldev] SUBJECT.KEYID = 5
6,371,023 UART: [ldev] AUTHORITY.KEYID = 7
6,372,258 UART: [ldev] FE.KEYID = 1
6,382,413 UART: [ldev] Erasing FE.KEYID = 1
8,861,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,240 UART: [ldev] --
10,652,120 UART: [fwproc] Wait for Commands...
10,654,446 UART: [fwproc] Recv command 0x46574c44
10,656,760 UART: [fwproc] Recv'd Img size: 115224 bytes
14,107,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,647 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,849,718 >>> mbox cmd response: success
14,853,097 UART: [afmc] ++
14,853,800 UART: [afmc] CDI.KEYID = 6
14,854,963 UART: [afmc] SUBJECT.KEYID = 7
14,856,499 UART: [afmc] AUTHORITY.KEYID = 5
17,359,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,083,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,085,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,100,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,115,879 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,130,924 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,601 UART: [afmc] --
19,159,846 UART: [cold-reset] --
19,164,300 UART: [state] Locking Datavault
19,169,926 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,110 UART: [state] Locking ICCM
19,174,262 UART: [exit] Launching FMC @ 0x40000130
19,182,928 UART:
19,183,170 UART: Running Caliptra FMC ...
19,184,271 UART:
19,184,428 UART: [state] CFI Enabled
19,192,389 UART: [fht] FMC Alias Private Key: 7
20,950,755 UART: [art] Extend RT PCRs Done
20,951,982 UART: [art] Lock RT PCRs Done
20,953,795 UART: [art] Populate DV Done
20,959,100 UART: [fht] FMC Alias Private Key: 7
20,960,749 UART: [art] Derive CDI
20,961,486 UART: [art] Store in in slot 0x4
21,004,420 UART: [art] Derive Key Pair
21,005,442 UART: [art] Store priv key in slot 0x5
23,432,335 UART: [art] Derive Key Pair - Done
23,445,141 UART: [art] Signing Cert with AUTHO
23,446,480 UART: RITY.KEYID = 7
25,151,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,259 UART: [art] PUB.X = F1415324490CE5F85F2F32E2981DC5DA56A8F296EBAD30681C1C470B0A3049E3FC38929511554CDF1C78765203ED4756
25,160,518 UART: [art] PUB.Y = 2AEDDADFBDAC10BCEFE7657FB86E772AD740C1FA1BB7A66963CAA65D800F62395AE7A9FBC1406B3CB14302BF68D9B64F
25,167,811 UART: [art] SIG.R = CE9F7E2BE9A40E78A13E72B5EC200161054AD76FEDB32206D8F430B18421A6DB584134E00B4037D71C594C4EBB9D0CC1
25,175,222 UART: [art] SIG.S = 90C7B0C5152EC165C6AD0F9DE658C764F8150B6B804859045DDB5AFC1026B43060A52CA94A6B312216ACBD0FC91303BC
26,154,154 UART: Caliptra RT
26,154,865 UART: [state] CFI Enabled
26,271,899 UART: [rt] RT listening for mailbox commands...
26,273,758 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,303,551 UART: [rt]cmd =0x46504c54, len=4
26,305,239 >>> mbox cmd response data (8 bytes)
26,306,292 UART: [rt] FIPS self test
26,307,247 UART: [kat] ++
26,307,701 UART: [kat] sha1
26,312,104 UART: [kat] SHA2-256
26,313,991 UART: [kat] SHA2-384
26,317,011 UART: [kat] SHA2-512-ACC
26,318,012 UART: Droping operation
26,318,873 UART: Fatal Error: 0x90050003
26,354,253 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,499,009 >>> mbox cmd response: failed
26,499,604 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,644,255 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,085 UART:
190,384 UART: Running Caliptra ROM ...
191,414 UART:
13,889,134 UART: [state] CFI Enabled
13,902,453 UART: [state] LifecycleState = Unprovisioned
13,904,859 UART: [state] DebugLocked = No
13,907,056 UART: [state] WD Timer not started. Device not locked for debugging
13,910,911 UART: [kat] SHA2-256
14,100,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,111,589 UART: [kat] ++
14,112,105 UART: [kat] sha1
14,124,309 UART: [kat] SHA2-256
14,127,337 UART: [kat] SHA2-384
14,132,141 UART: [kat] SHA2-512-ACC
14,134,706 UART: [kat] ECC-384
16,576,492 UART: [kat] HMAC-384Kdf
16,589,207 UART: [kat] LMS
17,121,078 UART: [kat] --
17,128,148 UART: [cold-reset] ++
17,129,867 UART: [fht] FHT @ 0x50003400
17,141,489 UART: [idev] ++
17,142,223 UART: [idev] CDI.KEYID = 6
17,143,136 UART: [idev] SUBJECT.KEYID = 7
17,144,347 UART: [idev] UDS.KEYID = 0
17,145,876 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,290,551 UART: [idev] Erasing UDS.KEYID = 0
19,621,402 UART: [idev] Sha1 KeyId Algorithm
19,643,897 UART: [idev] --
19,648,757 UART: [ldev] ++
19,649,489 UART: [ldev] CDI.KEYID = 6
19,650,400 UART: [ldev] SUBJECT.KEYID = 5
19,651,479 UART: [ldev] AUTHORITY.KEYID = 7
19,652,759 UART: [ldev] FE.KEYID = 1
19,665,275 UART: [ldev] Erasing FE.KEYID = 1
22,144,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,866,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,881,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,896,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,911,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,932,949 UART: [ldev] --
23,938,187 UART: [fwproc] Wait for Commands...
23,940,776 UART: [fwproc] Recv command 0x46574c44
23,943,036 UART: [fwproc] Recv'd Img size: 115224 bytes
27,406,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,482,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,598,420 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,145,807 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,761,920 ready_for_fw is high
3,762,336 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,977,596 >>> mbox cmd response: success
19,230,667 UART:
19,231,070 UART: Running Caliptra FMC ...
19,232,197 UART:
19,232,347 UART: [state] CFI Enabled
19,240,664 UART: [fht] FMC Alias Private Key: 7
20,997,433 UART: [art] Extend RT PCRs Done
20,998,659 UART: [art] Lock RT PCRs Done
21,000,315 UART: [art] Populate DV Done
21,005,521 UART: [fht] FMC Alias Private Key: 7
21,007,023 UART: [art] Derive CDI
21,007,801 UART: [art] Store in in slot 0x4
21,050,508 UART: [art] Derive Key Pair
21,051,551 UART: [art] Store priv key in slot 0x5
23,478,181 UART: [art] Derive Key Pair - Done
23,491,073 UART: [art] Signing Cert with AUTHO
23,492,378 UART: RITY.KEYID = 7
25,198,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,597 UART: [art] PUB.X = E54A4FF2D9DA172567C5B1EC0160B3EFB05E4581E0912A560A1649BC2923C304672201A604FAFCC94DBE046ACFE87F12
25,206,886 UART: [art] PUB.Y = 23B5E16D90091AD8F1FC116F679871C04F0DC546B3AFBD2C3D8C055CDE1F444610F0B10F2CAB666E829452BC99534A75
25,214,089 UART: [art] SIG.R = 43C71BDC3585CCAAB93FED4BD3459DF7E8F660C57A2168C5B4D44068A525DA75666014B504E3F3BC713828E98D3A1BC8
25,221,503 UART: [art] SIG.S = 9764F7D4FDC161E56CDC345C16363968EF941EE797D12798F50DF46C212189335CB9DA60F96162088358A7B9D1D4F5BF
26,200,633 UART: Caliptra RT
26,201,348 UART: [state] CFI Enabled
26,318,247 UART: [rt] RT listening for mailbox commands...
26,320,100 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,349,765 UART: [rt]cmd =0x46504c54, len=4
26,351,185 >>> mbox cmd response data (8 bytes)
26,352,165 UART: [rt] FIPS self test
26,353,107 UART: [kat] ++
26,353,557 UART: [kat] sha1
26,358,066 UART: [kat] SHA2-256
26,360,002 UART: [kat] SHA2-384
26,362,803 UART: [kat] SHA2-512-ACC
26,363,814 UART: Droping operation
26,364,750 UART: Fatal Error: 0x90050003
26,400,135 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,544,921 >>> mbox cmd response: failed
26,545,555 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,690,038 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
16,984,781 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,198,126 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,531 UART: [kat] SHA2-256
882,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,577 UART: [kat] ++
886,729 UART: [kat] sha1
891,085 UART: [kat] SHA2-256
893,023 UART: [kat] SHA2-384
895,816 UART: [kat] SHA2-512-ACC
897,717 UART: [kat] ECC-384
903,320 UART: [kat] HMAC-384Kdf
907,874 UART: [kat] LMS
1,476,070 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,059 UART: [fht] Storing FHT @ 0x50003400
1,479,716 UART: [idev] ++
1,479,884 UART: [idev] CDI.KEYID = 6
1,480,244 UART: [idev] SUBJECT.KEYID = 7
1,480,668 UART: [idev] UDS.KEYID = 0
1,481,013 ready_for_fw is high
1,481,013 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,236 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,838 UART: [idev] --
1,514,963 UART: [ldev] ++
1,515,131 UART: [ldev] CDI.KEYID = 6
1,515,494 UART: [ldev] SUBJECT.KEYID = 5
1,515,920 UART: [ldev] AUTHORITY.KEYID = 7
1,516,383 UART: [ldev] FE.KEYID = 1
1,521,621 UART: [ldev] Erasing FE.KEYID = 1
1,547,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,274 UART: [ldev] --
1,586,701 UART: [fwproc] Waiting for Commands...
1,587,522 UART: [fwproc] Received command 0x46574c44
1,588,313 UART: [fwproc] Received Image of size 115224 bytes
2,896,046 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,921 >>> mbox cmd response: success
3,091,093 UART: [afmc] ++
3,091,261 UART: [afmc] CDI.KEYID = 6
3,091,623 UART: [afmc] SUBJECT.KEYID = 7
3,092,048 UART: [afmc] AUTHORITY.KEYID = 5
3,126,549 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,094 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,784 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,799 UART: [afmc] --
3,169,705 UART: [cold-reset] --
3,170,441 UART: [state] Locking Datavault
3,171,582 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,186 UART: [state] Locking ICCM
3,172,634 UART: [exit] Launching FMC @ 0x40000130
3,177,963 UART:
3,177,979 UART: Running Caliptra FMC ...
3,178,387 UART:
3,178,441 UART: [state] CFI Enabled
3,188,820 UART: [fht] FMC Alias Private Key: 7
3,297,005 UART: [art] Extend RT PCRs Done
3,297,433 UART: [art] Lock RT PCRs Done
3,299,099 UART: [art] Populate DV Done
3,307,220 UART: [fht] FMC Alias Private Key: 7
3,308,218 UART: [art] Derive CDI
3,308,498 UART: [art] Store in in slot 0x4
3,394,219 UART: [art] Derive Key Pair
3,394,579 UART: [art] Store priv key in slot 0x5
3,408,017 UART: [art] Derive Key Pair - Done
3,422,738 UART: [art] Signing Cert with AUTHO
3,423,218 UART: RITY.KEYID = 7
3,438,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,381 UART: [art] PUB.X = 2CAF0A32649BAC7BEA8A78939A976608604BAAF977A25CAFB4FD2E44E9B49C8DF74BA4B78064182D3CB8AFCF1341069A
3,446,160 UART: [art] PUB.Y = BB07279B05CD2A78BAE6FF3FB83C817F3FF64719C3C6626D9112C9E5E5EA87A4FA2DD6E75FC6279C55C640B2A2D93211
3,453,118 UART: [art] SIG.R = AA08FBD8475FA8F5CA82F2A1AD3A37E059977BFD84F06DC065B5D68EAEECFBD5A7534870C26F77AE28D80938D7D5F02A
3,459,904 UART: [art] SIG.S = C4964B82FDBE0342D7F64CD68AFB9A2F8ADAF5CB0E3B9D4C2D50B1F6D3D3CF8AFC886178055013106D2F766AEF871296
3,484,730 UART: Caliptra RT
3,484,984 UART: [state] CFI Enabled
3,593,657 UART: [rt] RT listening for mailbox commands...
3,594,320 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,820 UART: [rt]cmd =0x46504c54, len=4
3,624,886 >>> mbox cmd response data (8 bytes)
3,625,011 UART: [rt] FIPS self test
3,625,339 UART: [kat] ++
3,625,491 UART: [kat] sha1
3,629,791 UART: [kat] SHA2-256
3,631,813 UART: [kat] SHA2-384
3,634,750 UART: [kat] SHA2-512-ACC
3,636,233 UART: Droping operation
3,636,862 UART: Fatal Error: 0x90050003
3,638,412 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,638,417 >>> mbox cmd response: failed
3,638,417 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,638,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,525 UART: [kat] SHA2-256
892,463 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,650 UART: [kat] HMAC-384Kdf
907,120 UART: [kat] LMS
1,475,316 UART: [kat] --
1,476,089 UART: [cold-reset] ++
1,476,607 UART: [fht] Storing FHT @ 0x50003400
1,479,430 UART: [idev] ++
1,479,598 UART: [idev] CDI.KEYID = 6
1,479,958 UART: [idev] SUBJECT.KEYID = 7
1,480,382 UART: [idev] UDS.KEYID = 0
1,480,727 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,505,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,334 UART: [idev] --
1,515,557 UART: [ldev] ++
1,515,725 UART: [ldev] CDI.KEYID = 6
1,516,088 UART: [ldev] SUBJECT.KEYID = 5
1,516,514 UART: [ldev] AUTHORITY.KEYID = 7
1,516,977 UART: [ldev] FE.KEYID = 1
1,522,007 UART: [ldev] Erasing FE.KEYID = 1
1,547,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,810 UART: [ldev] --
1,586,155 UART: [fwproc] Waiting for Commands...
1,586,998 UART: [fwproc] Received command 0x46574c44
1,587,789 UART: [fwproc] Received Image of size 115224 bytes
2,895,592 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,058 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,088,663 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,749 ready_for_fw is high
1,362,749 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,759 >>> mbox cmd response: success
3,000,617 UART:
3,000,633 UART: Running Caliptra FMC ...
3,001,041 UART:
3,001,095 UART: [state] CFI Enabled
3,011,588 UART: [fht] FMC Alias Private Key: 7
3,119,531 UART: [art] Extend RT PCRs Done
3,119,959 UART: [art] Lock RT PCRs Done
3,121,675 UART: [art] Populate DV Done
3,129,816 UART: [fht] FMC Alias Private Key: 7
3,130,860 UART: [art] Derive CDI
3,131,140 UART: [art] Store in in slot 0x4
3,216,933 UART: [art] Derive Key Pair
3,217,293 UART: [art] Store priv key in slot 0x5
3,229,973 UART: [art] Derive Key Pair - Done
3,244,816 UART: [art] Signing Cert with AUTHO
3,245,296 UART: RITY.KEYID = 7
3,261,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,929 UART: [art] PUB.X = 215EDCC26F4E779790CC12EAF33B88C5423BDE74A271B4F571BAFA203B26F33793DB6FEDC3C647803B85D85FF6EAD8A6
3,268,717 UART: [art] PUB.Y = 2EFAA139EEE5C9A7D1D27D4C7779424FEA33142C00907D670CA58487898189E7D14D222305A03A636BC1B818FE5D2F2A
3,275,643 UART: [art] SIG.R = C0D8C5417867EBAEE63DB0D67A377D15D7288D0BE93E459CDDAA711130FB644932C11D0E0399E8F7D4BD77EFEF4C65A3
3,282,420 UART: [art] SIG.S = 772A1DFABE7B353C11D211AC66D4ACDAF9D117336AC28818305B60C85CFF5FDFEB8AF9DCB319092F21DCAA23736329D2
3,305,836 UART: Caliptra RT
3,306,090 UART: [state] CFI Enabled
3,414,266 UART: [rt] RT listening for mailbox commands...
3,414,929 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,257 UART: [rt]cmd =0x46504c54, len=4
3,445,589 >>> mbox cmd response data (8 bytes)
3,445,804 UART: [rt] FIPS self test
3,446,132 UART: [kat] ++
3,446,284 UART: [kat] sha1
3,450,516 UART: [kat] SHA2-256
3,452,538 UART: [kat] SHA2-384
3,455,443 UART: [kat] SHA2-512-ACC
3,456,926 UART: Droping operation
3,457,327 UART: Fatal Error: 0x90050003
3,458,877 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,882 >>> mbox cmd response: failed
3,458,882 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,293 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,011 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,498 UART: [kat] SHA2-256
882,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,544 UART: [kat] ++
886,696 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,738 UART: [cold-reset] ++
1,477,294 UART: [fht] Storing FHT @ 0x50003400
1,480,085 UART: [idev] ++
1,480,253 UART: [idev] CDI.KEYID = 6
1,480,613 UART: [idev] SUBJECT.KEYID = 7
1,481,037 UART: [idev] UDS.KEYID = 0
1,481,382 ready_for_fw is high
1,481,382 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,505,391 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,173 UART: [idev] --
1,515,136 UART: [ldev] ++
1,515,304 UART: [ldev] CDI.KEYID = 6
1,515,667 UART: [ldev] SUBJECT.KEYID = 5
1,516,093 UART: [ldev] AUTHORITY.KEYID = 7
1,516,556 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,546,881 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,643 UART: [ldev] --
1,585,952 UART: [fwproc] Waiting for Commands...
1,586,775 UART: [fwproc] Received command 0x46574c44
1,587,566 UART: [fwproc] Received Image of size 115224 bytes
2,895,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,181 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,416 >>> mbox cmd response: success
3,090,554 UART: [afmc] ++
3,090,722 UART: [afmc] CDI.KEYID = 6
3,091,084 UART: [afmc] SUBJECT.KEYID = 7
3,091,509 UART: [afmc] AUTHORITY.KEYID = 5
3,126,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,898 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,678 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,291 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,981 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,816 UART: [afmc] --
3,169,834 UART: [cold-reset] --
3,170,688 UART: [state] Locking Datavault
3,171,829 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,433 UART: [state] Locking ICCM
3,173,023 UART: [exit] Launching FMC @ 0x40000130
3,178,352 UART:
3,178,368 UART: Running Caliptra FMC ...
3,178,776 UART:
3,178,919 UART: [state] CFI Enabled
3,189,394 UART: [fht] FMC Alias Private Key: 7
3,296,835 UART: [art] Extend RT PCRs Done
3,297,263 UART: [art] Lock RT PCRs Done
3,298,865 UART: [art] Populate DV Done
3,307,156 UART: [fht] FMC Alias Private Key: 7
3,308,264 UART: [art] Derive CDI
3,308,544 UART: [art] Store in in slot 0x4
3,394,157 UART: [art] Derive Key Pair
3,394,517 UART: [art] Store priv key in slot 0x5
3,407,951 UART: [art] Derive Key Pair - Done
3,422,712 UART: [art] Signing Cert with AUTHO
3,423,192 UART: RITY.KEYID = 7
3,438,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,385 UART: [art] PUB.X = D12162B5E2EABDA428688157258CC942B97CD6BE0DEDEFB37EA2898CD7F6D2749321FEEB0C75FFA6011C064B61F1470B
3,446,156 UART: [art] PUB.Y = 388FE92FA82A58E300D3B17B9C479E3C9B2B07162F6CA7595C8B09D36DED08B46734D0E900689BB1D58B1F027315A0B1
3,453,054 UART: [art] SIG.R = 1BB8C6AF8CBBFAFD929822210EDD550CF26D3E307B45E52F51A7518DADE920B9F78DB91544AEA294E34DE7C496339228
3,459,832 UART: [art] SIG.S = 923A8A90570790C9CB41BD5DDB5721BB90EF361C141FE85319BBC7A0771E93E19F0F3C8DEDF53F5FBC72F75FD6DCECC6
3,483,719 UART: Caliptra RT
3,484,065 UART: [state] CFI Enabled
3,592,565 UART: [rt] RT listening for mailbox commands...
3,593,228 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,730 UART: [rt]cmd =0x46504c54, len=4
3,623,920 >>> mbox cmd response data (8 bytes)
3,624,217 UART: [rt] FIPS self test
3,624,545 UART: [kat] ++
3,624,697 UART: [kat] sha1
3,628,975 UART: [kat] SHA2-256
3,630,997 UART: [kat] SHA2-384
3,633,784 UART: [kat] SHA2-512-ACC
3,635,267 UART: Droping operation
3,635,662 UART: Fatal Error: 0x90050003
3,637,212 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,637,217 >>> mbox cmd response: failed
3,637,217 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,637,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,338 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,984 UART: [kat] SHA2-256
881,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,030 UART: [kat] ++
886,182 UART: [kat] sha1
890,356 UART: [kat] SHA2-256
892,294 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,427 UART: [kat] HMAC-384Kdf
907,089 UART: [kat] LMS
1,475,285 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,727 UART: [idev] ++
1,479,895 UART: [idev] CDI.KEYID = 6
1,480,255 UART: [idev] SUBJECT.KEYID = 7
1,480,679 UART: [idev] UDS.KEYID = 0
1,481,024 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,505,451 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,135 UART: [idev] --
1,515,194 UART: [ldev] ++
1,515,362 UART: [ldev] CDI.KEYID = 6
1,515,725 UART: [ldev] SUBJECT.KEYID = 5
1,516,151 UART: [ldev] AUTHORITY.KEYID = 7
1,516,614 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,547,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,483 UART: [ldev] --
1,586,884 UART: [fwproc] Waiting for Commands...
1,587,707 UART: [fwproc] Received command 0x46574c44
1,588,498 UART: [fwproc] Received Image of size 115224 bytes
2,896,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,253 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,880 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,594 >>> mbox cmd response: success
3,000,168 UART:
3,000,184 UART: Running Caliptra FMC ...
3,000,592 UART:
3,000,735 UART: [state] CFI Enabled
3,011,306 UART: [fht] FMC Alias Private Key: 7
3,119,281 UART: [art] Extend RT PCRs Done
3,119,709 UART: [art] Lock RT PCRs Done
3,121,329 UART: [art] Populate DV Done
3,129,668 UART: [fht] FMC Alias Private Key: 7
3,130,748 UART: [art] Derive CDI
3,131,028 UART: [art] Store in in slot 0x4
3,216,901 UART: [art] Derive Key Pair
3,217,261 UART: [art] Store priv key in slot 0x5
3,229,917 UART: [art] Derive Key Pair - Done
3,244,659 UART: [art] Signing Cert with AUTHO
3,245,139 UART: RITY.KEYID = 7
3,260,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,036 UART: [art] PUB.X = 6F2B9C393DAFA3356E8E52FACEBCB0CA41E0300C6DC53783610102896D51B7CF4013BB256CB65FF889A9D628EA1F6D93
3,267,811 UART: [art] PUB.Y = 1CCD2FE0E247211A5A141ED5C64B0DAD4F42BC6BADBFB52E6D4DC8110D7189DC6C09233A1C287C55DB7F11008A95AC7D
3,274,752 UART: [art] SIG.R = D41116412A5E1DFA908EA373F2D6B3A79D4BEF84DB5764920469A7D856F40899E798C0841B652A2D59D3DA0E61C4D7C9
3,281,517 UART: [art] SIG.S = 13646C6DF6A6C9B4EAEDB86B95F230D73F1AA04F5EB2275C2EACEAFCC2B972EFDDFF2240F6304325AE41BF74A3AFD892
3,306,044 UART: Caliptra RT
3,306,390 UART: [state] CFI Enabled
3,414,344 UART: [rt] RT listening for mailbox commands...
3,415,007 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,377 UART: [rt]cmd =0x46504c54, len=4
3,445,327 >>> mbox cmd response data (8 bytes)
3,445,688 UART: [rt] FIPS self test
3,446,016 UART: [kat] ++
3,446,168 UART: [kat] sha1
3,450,424 UART: [kat] SHA2-256
3,452,446 UART: [kat] SHA2-384
3,455,369 UART: [kat] SHA2-512-ACC
3,456,852 UART: Droping operation
3,457,417 UART: Fatal Error: 0x90050003
3,458,967 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,972 >>> mbox cmd response: failed
3,458,972 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,874 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,576 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,248 UART: [kat] SHA2-512-ACC
908,149 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,172,039 UART: [cold-reset] ++
1,172,461 UART: [fht] FHT @ 0x50003400
1,175,028 UART: [idev] ++
1,175,196 UART: [idev] CDI.KEYID = 6
1,175,556 UART: [idev] SUBJECT.KEYID = 7
1,175,980 UART: [idev] UDS.KEYID = 0
1,176,325 ready_for_fw is high
1,176,325 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,226 UART: [idev] Erasing UDS.KEYID = 0
1,201,125 UART: [idev] Sha1 KeyId Algorithm
1,209,601 UART: [idev] --
1,210,715 UART: [ldev] ++
1,210,883 UART: [ldev] CDI.KEYID = 6
1,211,246 UART: [ldev] SUBJECT.KEYID = 5
1,211,672 UART: [ldev] AUTHORITY.KEYID = 7
1,212,135 UART: [ldev] FE.KEYID = 1
1,217,325 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,854 UART: [fwproc] Wait for Commands...
1,283,436 UART: [fwproc] Recv command 0x46574c44
1,284,164 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,879 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,004 >>> mbox cmd response: success
2,786,240 UART: [afmc] ++
2,786,408 UART: [afmc] CDI.KEYID = 6
2,786,770 UART: [afmc] SUBJECT.KEYID = 7
2,787,195 UART: [afmc] AUTHORITY.KEYID = 5
2,822,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,695 UART: [afmc] --
2,865,631 UART: [cold-reset] --
2,866,463 UART: [state] Locking Datavault
2,867,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,050 UART: [state] Locking ICCM
2,868,570 UART: [exit] Launching FMC @ 0x40000130
2,873,899 UART:
2,873,915 UART: Running Caliptra FMC ...
2,874,323 UART:
2,874,377 UART: [state] CFI Enabled
2,884,750 UART: [fht] FMC Alias Private Key: 7
2,992,653 UART: [art] Extend RT PCRs Done
2,993,081 UART: [art] Lock RT PCRs Done
2,994,707 UART: [art] Populate DV Done
3,002,904 UART: [fht] FMC Alias Private Key: 7
3,003,928 UART: [art] Derive CDI
3,004,208 UART: [art] Store in in slot 0x4
3,089,835 UART: [art] Derive Key Pair
3,090,195 UART: [art] Store priv key in slot 0x5
3,103,079 UART: [art] Derive Key Pair - Done
3,118,048 UART: [art] Signing Cert with AUTHO
3,118,528 UART: RITY.KEYID = 7
3,133,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,163 UART: [art] PUB.X = 4E01EB2D372F8C8D63E498AA59D5BB6D839DC9582C5D83038FBA9D2A19409EF94D3E9140E0CC065488F3CF324C546B63
3,140,932 UART: [art] PUB.Y = 34E203272764D64ABD91036A2B08E869EE369B50829BFABEFA018EC7756AE687B3EDE5CD715FFDE5B6E390A42AAF96FB
3,147,888 UART: [art] SIG.R = A70F901111C9BC1F4E6AAF5B1C63832320559642DF96069EE36959CB079C54740CA75F2A871DF00322E5E878D520F5A1
3,154,641 UART: [art] SIG.S = 326BAA21F5ACCD49812A36B7B462689B2FB297F48585D3B45AAE0614BB8FA63EDBB80D4684A5DEC2A4D9D8955B036F39
3,178,609 UART: Caliptra RT
3,178,863 UART: [state] CFI Enabled
3,287,705 UART: [rt] RT listening for mailbox commands...
3,288,368 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,080 UART: [rt]cmd =0x46504c54, len=4
3,319,152 >>> mbox cmd response data (8 bytes)
3,319,485 UART: [rt] FIPS self test
3,319,813 UART: [kat] ++
3,319,965 UART: [kat] sha1
3,324,219 UART: [kat] SHA2-256
3,326,241 UART: [kat] SHA2-384
3,329,176 UART: [kat] SHA2-512-ACC
3,330,659 UART: Droping operation
3,331,284 UART: Fatal Error: 0x90050003
3,332,834 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,332,839 >>> mbox cmd response: failed
3,332,839 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,332,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
892,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,087 UART: [kat] ++
897,239 UART: [kat] sha1
901,463 UART: [kat] SHA2-256
903,403 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,618 UART: [kat] HMAC-384Kdf
922,016 UART: [kat] LMS
1,170,344 UART: [kat] --
1,171,319 UART: [cold-reset] ++
1,171,723 UART: [fht] FHT @ 0x50003400
1,174,246 UART: [idev] ++
1,174,414 UART: [idev] CDI.KEYID = 6
1,174,774 UART: [idev] SUBJECT.KEYID = 7
1,175,198 UART: [idev] UDS.KEYID = 0
1,175,543 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,076 UART: [idev] Erasing UDS.KEYID = 0
1,200,211 UART: [idev] Sha1 KeyId Algorithm
1,208,641 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,402 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,431 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,282,024 UART: [fwproc] Wait for Commands...
1,282,714 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,103 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,164 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,877 ready_for_fw is high
1,059,877 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,077 >>> mbox cmd response: success
2,698,529 UART:
2,698,545 UART: Running Caliptra FMC ...
2,698,953 UART:
2,699,007 UART: [state] CFI Enabled
2,709,858 UART: [fht] FMC Alias Private Key: 7
2,817,507 UART: [art] Extend RT PCRs Done
2,817,935 UART: [art] Lock RT PCRs Done
2,819,707 UART: [art] Populate DV Done
2,827,864 UART: [fht] FMC Alias Private Key: 7
2,828,932 UART: [art] Derive CDI
2,829,212 UART: [art] Store in in slot 0x4
2,914,831 UART: [art] Derive Key Pair
2,915,191 UART: [art] Store priv key in slot 0x5
2,928,353 UART: [art] Derive Key Pair - Done
2,943,392 UART: [art] Signing Cert with AUTHO
2,943,872 UART: RITY.KEYID = 7
2,958,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,319 UART: [art] PUB.X = 0E1F13AC72BDACE93C3A5A02E9AAF7406F8E2A183E8A96C93A19C77768533A8C2E6ED634DF8BE4E14A00F93F28E3E37D
2,966,079 UART: [art] PUB.Y = BAB5C3698D8C7CD889586242512FAF7024D770F212D141F1254E5DE2F3D404197C593A0A9E50A6552E8CEA4C81F5BBA7
2,973,029 UART: [art] SIG.R = 3F2C8F1ECC6D0BE14BEEEDDFC61CE433F0F92324E8437F987ABC66D00AC713D878EEF0B5BDFCF2594ED34E106337DB75
2,979,819 UART: [art] SIG.S = 1E62A40CD1A22CF962D2B1378ED005F71A3BA4B13C1EEC6518A46861BE727FEBEC417B10F67EDC1EFFEF240EC4885E93
3,003,837 UART: Caliptra RT
3,004,091 UART: [state] CFI Enabled
3,112,285 UART: [rt] RT listening for mailbox commands...
3,112,948 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,578 UART: [rt]cmd =0x46504c54, len=4
3,143,746 >>> mbox cmd response data (8 bytes)
3,143,941 UART: [rt] FIPS self test
3,144,269 UART: [kat] ++
3,144,421 UART: [kat] sha1
3,148,447 UART: [kat] SHA2-256
3,150,469 UART: [kat] SHA2-384
3,153,492 UART: [kat] SHA2-512-ACC
3,154,975 UART: Droping operation
3,155,582 UART: Fatal Error: 0x90050003
3,157,132 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,137 >>> mbox cmd response: failed
3,157,137 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,423 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,061 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
893,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,504 UART: [kat] ++
897,656 UART: [kat] sha1
901,770 UART: [kat] SHA2-256
903,710 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,581 UART: [kat] HMAC-384Kdf
923,113 UART: [kat] LMS
1,171,441 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,273 UART: [idev] ++
1,175,441 UART: [idev] CDI.KEYID = 6
1,175,801 UART: [idev] SUBJECT.KEYID = 7
1,176,225 UART: [idev] UDS.KEYID = 0
1,176,570 ready_for_fw is high
1,176,570 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,157 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,211,150 UART: [ldev] ++
1,211,318 UART: [ldev] CDI.KEYID = 6
1,211,681 UART: [ldev] SUBJECT.KEYID = 5
1,212,107 UART: [ldev] AUTHORITY.KEYID = 7
1,212,570 UART: [ldev] FE.KEYID = 1
1,218,156 UART: [ldev] Erasing FE.KEYID = 1
1,244,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,170 UART: [ldev] --
1,283,557 UART: [fwproc] Wait for Commands...
1,284,179 UART: [fwproc] Recv command 0x46574c44
1,284,907 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,574 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,878 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,051 >>> mbox cmd response: success
2,788,067 UART: [afmc] ++
2,788,235 UART: [afmc] CDI.KEYID = 6
2,788,597 UART: [afmc] SUBJECT.KEYID = 7
2,789,022 UART: [afmc] AUTHORITY.KEYID = 5
2,825,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,750 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,652 UART: [afmc] --
2,868,708 UART: [cold-reset] --
2,869,548 UART: [state] Locking Datavault
2,870,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,071 UART: [state] Locking ICCM
2,871,647 UART: [exit] Launching FMC @ 0x40000130
2,876,976 UART:
2,876,992 UART: Running Caliptra FMC ...
2,877,400 UART:
2,877,543 UART: [state] CFI Enabled
2,887,974 UART: [fht] FMC Alias Private Key: 7
2,996,473 UART: [art] Extend RT PCRs Done
2,996,901 UART: [art] Lock RT PCRs Done
2,998,331 UART: [art] Populate DV Done
3,006,736 UART: [fht] FMC Alias Private Key: 7
3,007,742 UART: [art] Derive CDI
3,008,022 UART: [art] Store in in slot 0x4
3,093,945 UART: [art] Derive Key Pair
3,094,305 UART: [art] Store priv key in slot 0x5
3,108,157 UART: [art] Derive Key Pair - Done
3,123,080 UART: [art] Signing Cert with AUTHO
3,123,560 UART: RITY.KEYID = 7
3,138,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,139,357 UART: [art] PUB.X = 58459365E156670BC0F944F3A1B6A8E21B148D56F825332F98842940B66EF88313BFA26DE4FD06931ADEC1F3B9E68830
3,146,119 UART: [art] PUB.Y = CF65DF6FDEB20CA7668BBDDA4E088BEF3C99AB4155F0FDCEC9A0B1EDFBC07097EDE49A4FA6239C4227CFC955C6CE294C
3,153,099 UART: [art] SIG.R = D786A7EF824FED4A8106DB65F3C03F2FC3BC1823A483288BA8947B65A1E6F64F717600D11F2525F8B5AEC55C2ADDF607
3,159,853 UART: [art] SIG.S = EF669901D00123BD65A9B3056D44710E44559F5E02FC8AE6B29955F0DF8C4368CA5BC3B2CDCD6B0F22718EB156CAC765
3,183,436 UART: Caliptra RT
3,183,782 UART: [state] CFI Enabled
3,291,467 UART: [rt] RT listening for mailbox commands...
3,292,130 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,516 UART: [rt]cmd =0x46504c54, len=4
3,322,478 >>> mbox cmd response data (8 bytes)
3,322,703 UART: [rt] FIPS self test
3,323,031 UART: [kat] ++
3,323,183 UART: [kat] sha1
3,327,625 UART: [kat] SHA2-256
3,329,647 UART: [kat] SHA2-384
3,332,630 UART: [kat] SHA2-512-ACC
3,334,113 UART: Droping operation
3,334,600 UART: Fatal Error: 0x90050003
3,336,150 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,336,155 >>> mbox cmd response: failed
3,336,155 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,336,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
893,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,694 UART: [kat] ++
897,846 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,175 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,171,874 UART: [cold-reset] ++
1,172,312 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,957 UART: [idev] Erasing UDS.KEYID = 0
1,201,734 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,280 UART: [ldev] ++
1,211,448 UART: [ldev] CDI.KEYID = 6
1,211,811 UART: [ldev] SUBJECT.KEYID = 5
1,212,237 UART: [ldev] AUTHORITY.KEYID = 7
1,212,700 UART: [ldev] FE.KEYID = 1
1,218,076 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,236 UART: [ldev] --
1,284,643 UART: [fwproc] Wait for Commands...
1,285,441 UART: [fwproc] Recv command 0x46574c44
1,286,169 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,416 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,651 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,630 ready_for_fw is high
1,059,630 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,458 >>> mbox cmd response: success
2,701,706 UART:
2,701,722 UART: Running Caliptra FMC ...
2,702,130 UART:
2,702,273 UART: [state] CFI Enabled
2,713,000 UART: [fht] FMC Alias Private Key: 7
2,820,627 UART: [art] Extend RT PCRs Done
2,821,055 UART: [art] Lock RT PCRs Done
2,822,593 UART: [art] Populate DV Done
2,830,850 UART: [fht] FMC Alias Private Key: 7
2,831,898 UART: [art] Derive CDI
2,832,178 UART: [art] Store in in slot 0x4
2,917,575 UART: [art] Derive Key Pair
2,917,935 UART: [art] Store priv key in slot 0x5
2,931,261 UART: [art] Derive Key Pair - Done
2,946,099 UART: [art] Signing Cert with AUTHO
2,946,579 UART: RITY.KEYID = 7
2,961,851 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,616 UART: [art] PUB.X = F2714D0AF579F4ADA661EFEFA8DFC0445E99D5BA6430D7ECAF2FC75C892396095EC9FF858C784087520D2A5509800A96
2,969,381 UART: [art] PUB.Y = 58BE07525CC3A543892C8DEB882EA3DAC752685B06191F663635E281358DF754B04E2959A97BC447171775BE1E4D47A4
2,976,321 UART: [art] SIG.R = 3330B11F67BE871CED62A903331CFBCA6DFAC1986FDF87FA7D555AE0E1CCCD54502EF9631B023BCE4E7E64AD81EA93EA
2,983,111 UART: [art] SIG.S = EFF422A3393141663D2EAA766CB52BC770EFB0F84433ABC6F8A9FC27B8661B7CD26CBCC8100DC857C2D88957DC036EF6
3,006,622 UART: Caliptra RT
3,006,968 UART: [state] CFI Enabled
3,115,236 UART: [rt] RT listening for mailbox commands...
3,115,899 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,399 UART: [rt]cmd =0x46504c54, len=4
3,146,523 >>> mbox cmd response data (8 bytes)
3,146,872 UART: [rt] FIPS self test
3,147,200 UART: [kat] ++
3,147,352 UART: [kat] sha1
3,151,556 UART: [kat] SHA2-256
3,153,578 UART: [kat] SHA2-384
3,156,531 UART: [kat] SHA2-512-ACC
3,158,014 UART: Droping operation
3,158,561 UART: Fatal Error: 0x90050003
3,160,111 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,116 >>> mbox cmd response: failed
3,160,116 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,160,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,576 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,710 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
891,602 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,174,667 ready_for_fw is high
1,174,667 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,715 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,294 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,383 UART: [fwproc] Recv command 0x46574c44
1,283,116 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,028 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,096 >>> mbox cmd response: success
2,785,317 UART: [afmc] ++
2,785,485 UART: [afmc] CDI.KEYID = 6
2,785,848 UART: [afmc] SUBJECT.KEYID = 7
2,786,274 UART: [afmc] AUTHORITY.KEYID = 5
2,821,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,014 UART: [afmc] --
2,864,996 UART: [cold-reset] --
2,865,910 UART: [state] Locking Datavault
2,867,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,719 UART: [state] Locking ICCM
2,868,305 UART: [exit] Launching FMC @ 0x40000130
2,873,634 UART:
2,873,650 UART: Running Caliptra FMC ...
2,874,058 UART:
2,874,112 UART: [state] CFI Enabled
2,884,951 UART: [fht] FMC Alias Private Key: 7
2,992,908 UART: [art] Extend RT PCRs Done
2,993,336 UART: [art] Lock RT PCRs Done
2,995,094 UART: [art] Populate DV Done
3,003,031 UART: [fht] FMC Alias Private Key: 7
3,004,175 UART: [art] Derive CDI
3,004,455 UART: [art] Store in in slot 0x4
3,090,274 UART: [art] Derive Key Pair
3,090,634 UART: [art] Store priv key in slot 0x5
3,103,414 UART: [art] Derive Key Pair - Done
3,118,261 UART: [art] Signing Cert with AUTHO
3,118,741 UART: RITY.KEYID = 7
3,133,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,668 UART: [art] PUB.X = DFD58041CB5D5AF8B93A4909E7FC83BD56FBB456AC43B9847F464F50E90EC81F39CCD966847B4ABE70F34D2A31765B17
3,141,446 UART: [art] PUB.Y = F652E327F036C458F9A877AE8BB92ABDC038ACE8F1D4EFB82FB0FFA88A7AB345818B71919F2BEF67DD8A4C5913954BB9
3,148,416 UART: [art] SIG.R = BC81E1DDFB9CB200AEDDEC45BDF8D37BD9760B5F5C22E196E965306B3A4C73CA39BD0EE5E2E3B72A6C6A7EC0D2AB2833
3,155,188 UART: [art] SIG.S = DC474F7F32151C2B8AC568512FF927FABCE84FAA1EF4D0360F90D90B33D697DC593F8F0DE88028D8763130C99D8636B1
3,178,350 UART: Caliptra RT
3,178,604 UART: [state] CFI Enabled
3,286,741 UART: [rt] RT listening for mailbox commands...
3,287,404 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,812 UART: [rt]cmd =0x46504c54, len=4
3,318,152 >>> mbox cmd response data (8 bytes)
3,318,415 UART: [rt] FIPS self test
3,318,743 UART: [kat] ++
3,318,895 UART: [kat] sha1
3,323,221 UART: [kat] SHA2-256
3,325,243 UART: [kat] SHA2-384
3,328,302 UART: [kat] SHA2-512-ACC
3,329,785 UART: Droping operation
3,330,342 UART: Fatal Error: 0x90050003
3,331,892 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,331,897 >>> mbox cmd response: failed
3,331,897 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,331,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x46574c44
1,281,948 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,720 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,998 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,990 ready_for_fw is high
1,055,990 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,474 >>> mbox cmd response: success
2,697,892 UART:
2,697,908 UART: Running Caliptra FMC ...
2,698,316 UART:
2,698,370 UART: [state] CFI Enabled
2,709,111 UART: [fht] FMC Alias Private Key: 7
2,817,336 UART: [art] Extend RT PCRs Done
2,817,764 UART: [art] Lock RT PCRs Done
2,819,542 UART: [art] Populate DV Done
2,827,807 UART: [fht] FMC Alias Private Key: 7
2,828,743 UART: [art] Derive CDI
2,829,023 UART: [art] Store in in slot 0x4
2,914,766 UART: [art] Derive Key Pair
2,915,126 UART: [art] Store priv key in slot 0x5
2,928,450 UART: [art] Derive Key Pair - Done
2,943,176 UART: [art] Signing Cert with AUTHO
2,943,656 UART: RITY.KEYID = 7
2,958,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,309 UART: [art] PUB.X = 913E9707D16E623CDB165AC871C6F347802E455CAAD4FC8A6F90B3B346D72BAA36F191EA2CFAA30136DAB3EEB104CA12
2,966,088 UART: [art] PUB.Y = A4C1A8E888F262FC9B42ABAB280F5B91258BA5ED80C5AB3AA27BA90B16317DF2D5092C2A3504E9265256D3A27E7F56A3
2,973,038 UART: [art] SIG.R = 848A3C026A48C6EF5BE58EA4A699C0E2F3689ABC6E344C33538A3CE7E7B313E1B4CA382EFB0FADADFB9701E7163170D2
2,979,817 UART: [art] SIG.S = 3B7D7A890199003FA9380D2C7645948736801CEE73BC36A85AD530D14D058A200EC61B81F0CAB2B4C8B12765BF26524D
3,003,274 UART: Caliptra RT
3,003,528 UART: [state] CFI Enabled
3,110,528 UART: [rt] RT listening for mailbox commands...
3,111,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,567 UART: [rt]cmd =0x46504c54, len=4
3,141,791 >>> mbox cmd response data (8 bytes)
3,141,942 UART: [rt] FIPS self test
3,142,270 UART: [kat] ++
3,142,422 UART: [kat] sha1
3,146,678 UART: [kat] SHA2-256
3,148,700 UART: [kat] SHA2-384
3,151,751 UART: [kat] SHA2-512-ACC
3,153,234 UART: Droping operation
3,153,853 UART: Fatal Error: 0x90050003
3,155,403 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,408 >>> mbox cmd response: failed
3,155,408 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,114 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,512 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
905,069 UART: [kat] SHA2-512-ACC
906,970 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,587 UART: [kat] LMS
1,169,899 UART: [kat] --
1,171,020 UART: [cold-reset] ++
1,171,470 UART: [fht] FHT @ 0x50003400
1,174,280 UART: [idev] ++
1,174,448 UART: [idev] CDI.KEYID = 6
1,174,809 UART: [idev] SUBJECT.KEYID = 7
1,175,234 UART: [idev] UDS.KEYID = 0
1,175,580 ready_for_fw is high
1,175,580 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,892 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,516 UART: [idev] --
1,209,521 UART: [ldev] ++
1,209,689 UART: [ldev] CDI.KEYID = 6
1,210,053 UART: [ldev] SUBJECT.KEYID = 5
1,210,480 UART: [ldev] AUTHORITY.KEYID = 7
1,210,943 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,717 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,003 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,095 >>> mbox cmd response: success
2,787,266 UART: [afmc] ++
2,787,434 UART: [afmc] CDI.KEYID = 6
2,787,797 UART: [afmc] SUBJECT.KEYID = 7
2,788,223 UART: [afmc] AUTHORITY.KEYID = 5
2,823,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,955 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,674 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,503 UART: [afmc] --
2,867,501 UART: [cold-reset] --
2,868,495 UART: [state] Locking Datavault
2,869,468 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,072 UART: [state] Locking ICCM
2,870,550 UART: [exit] Launching FMC @ 0x40000130
2,875,879 UART:
2,875,895 UART: Running Caliptra FMC ...
2,876,303 UART:
2,876,446 UART: [state] CFI Enabled
2,887,031 UART: [fht] FMC Alias Private Key: 7
2,995,316 UART: [art] Extend RT PCRs Done
2,995,744 UART: [art] Lock RT PCRs Done
2,997,526 UART: [art] Populate DV Done
3,005,809 UART: [fht] FMC Alias Private Key: 7
3,006,769 UART: [art] Derive CDI
3,007,049 UART: [art] Store in in slot 0x4
3,092,462 UART: [art] Derive Key Pair
3,092,822 UART: [art] Store priv key in slot 0x5
3,106,434 UART: [art] Derive Key Pair - Done
3,120,936 UART: [art] Signing Cert with AUTHO
3,121,416 UART: RITY.KEYID = 7
3,136,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,661 UART: [art] PUB.X = 456FA2CB3706DB63FF7382AD010C23D982F3D22F867829C7EE8415D770C0AB0D24A1D772FA78F55B5AF1DA94B2DF92B2
3,144,431 UART: [art] PUB.Y = D5F689242585FF0262CBFD0722E36501B690602F1E6C417B9F825A61C70D90756E70EAEC543F81C514FEED300FCDB3D6
3,151,372 UART: [art] SIG.R = 6054331746FB5AA29390C677EEFEED7EF82925F26808168A1E3D680155B20BB5EA8955E642DB36582B768496146D7D04
3,158,124 UART: [art] SIG.S = 40F650A8FA9142EE27BB46F66DA1EEAF1D590E06D3B9B7C1A0C425B0D60BF07547BD058B86A7E9AC0A333E06243E774C
3,181,953 UART: Caliptra RT
3,182,299 UART: [state] CFI Enabled
3,290,413 UART: [rt] RT listening for mailbox commands...
3,291,076 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,610 UART: [rt]cmd =0x46504c54, len=4
3,321,750 >>> mbox cmd response data (8 bytes)
3,322,057 UART: [rt] FIPS self test
3,322,385 UART: [kat] ++
3,322,537 UART: [kat] sha1
3,326,721 UART: [kat] SHA2-256
3,328,743 UART: [kat] SHA2-384
3,331,620 UART: [kat] SHA2-512-ACC
3,333,103 UART: Droping operation
3,333,550 UART: Fatal Error: 0x90050003
3,335,100 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,335,105 >>> mbox cmd response: failed
3,335,105 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,335,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,000 UART: [kat] ++
896,152 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,157 UART: [kat] LMS
1,169,469 UART: [kat] --
1,170,516 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,730 UART: [idev] ++
1,173,898 UART: [idev] CDI.KEYID = 6
1,174,259 UART: [idev] SUBJECT.KEYID = 7
1,174,684 UART: [idev] UDS.KEYID = 0
1,175,030 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,870 UART: [idev] Sha1 KeyId Algorithm
1,208,708 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,665 UART: [fwproc] Wait for Commands...
1,283,388 UART: [fwproc] Recv command 0x46574c44
1,284,121 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,082 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,391 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,643 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,737 ready_for_fw is high
1,056,737 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,403 >>> mbox cmd response: success
2,697,503 UART:
2,697,519 UART: Running Caliptra FMC ...
2,697,927 UART:
2,698,070 UART: [state] CFI Enabled
2,708,765 UART: [fht] FMC Alias Private Key: 7
2,816,872 UART: [art] Extend RT PCRs Done
2,817,300 UART: [art] Lock RT PCRs Done
2,818,852 UART: [art] Populate DV Done
2,827,301 UART: [fht] FMC Alias Private Key: 7
2,828,269 UART: [art] Derive CDI
2,828,549 UART: [art] Store in in slot 0x4
2,914,698 UART: [art] Derive Key Pair
2,915,058 UART: [art] Store priv key in slot 0x5
2,927,468 UART: [art] Derive Key Pair - Done
2,942,341 UART: [art] Signing Cert with AUTHO
2,942,821 UART: RITY.KEYID = 7
2,958,345 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,110 UART: [art] PUB.X = F2AC67B0BD0114AA09CE76101F48E970AAB9902F8EC4BDA61EA7FF4341F55B327AF4A2206D62536E4EB51285199B60BF
2,965,886 UART: [art] PUB.Y = A35EE3DC3F7910AC8A066DB53164CE52EFE04A9C63CB8303AA9FBE40D3B757CC41A455E5CA39222CD6971CFB8D719A7F
2,972,850 UART: [art] SIG.R = D4E9B034CA3C472E895CC41B61C8283E8A5413C9073CA096C6073F2DB7F4DA784CDBFC1E88FA4C1DF1EB3120C42ADD09
2,979,629 UART: [art] SIG.S = 798680A7B399C6AFC3D423AFD003810252FD8559E77E46F86BF7B9C397C4561AD74E345389F903C60CB39E1F4DE26118
3,003,920 UART: Caliptra RT
3,004,266 UART: [state] CFI Enabled
3,112,618 UART: [rt] RT listening for mailbox commands...
3,113,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,717 UART: [rt]cmd =0x46504c54, len=4
3,143,673 >>> mbox cmd response data (8 bytes)
3,143,822 UART: [rt] FIPS self test
3,144,150 UART: [kat] ++
3,144,302 UART: [kat] sha1
3,148,572 UART: [kat] SHA2-256
3,150,594 UART: [kat] SHA2-384
3,153,561 UART: [kat] SHA2-512-ACC
3,155,044 UART: Droping operation
3,155,537 UART: Fatal Error: 0x90050003
3,157,087 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,092 >>> mbox cmd response: failed
3,157,092 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,947 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,203 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,688,685 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,832,802 >>> mbox cmd response: failed
2,833,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,976,589 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,865,313 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,450,129 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,696,159 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,840,132 >>> mbox cmd response: failed
2,840,693 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,983,931 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
4,856,381 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,467,266 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,038,209 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,182,300 >>> mbox cmd response: failed
3,182,853 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,326,068 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,581,360 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,020,920 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,476 writing to cptra_bootfsm_go
3,049,327 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,193,304 >>> mbox cmd response: failed
3,193,859 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,337,079 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,578,344 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,016,635 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
2,699,940 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,844,682 >>> mbox cmd response: failed
2,845,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,988,928 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,459,363 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,315,565 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
2,699,852 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,844,410 >>> mbox cmd response: failed
2,844,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,988,624 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,437,342 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,309,227 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,705,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,849,949 >>> mbox cmd response: failed
2,850,520 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,994,629 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,450,227 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,249,521 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,059,073 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,204,326 >>> mbox cmd response: failed
3,204,915 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,348,402 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,177,493 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,906,713 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,058,139 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,202,681 >>> mbox cmd response: failed
3,203,259 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,346,879 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
20,179,677 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,899,094 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,912 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,920 >>> mbox cmd response: failed
811,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,045 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,604 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,816 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,824 >>> mbox cmd response: failed
811,824 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,903 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,656 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,725 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,733 >>> mbox cmd response: failed
812,733 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,494 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,655 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,167 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,175 >>> mbox cmd response: failed
812,175 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,532 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,705 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,070 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,078 >>> mbox cmd response: failed
812,078 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,619 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,264 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,152 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,160 >>> mbox cmd response: failed
812,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,837 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,258 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,469 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,477 >>> mbox cmd response: failed
812,477 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,960 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,649,139 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,701 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,709 >>> mbox cmd response: failed
812,709 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,086 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,493 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,248 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,256 >>> mbox cmd response: failed
812,256 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,881 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,930 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,196 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,204 >>> mbox cmd response: failed
812,204 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,809 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,638 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,317 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,325 >>> mbox cmd response: failed
812,325 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,312 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,591 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,369 >>> mbox cmd response: failed
812,369 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,496 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,467 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,209 UART:
192,567 UART: Running Caliptra ROM ...
193,749 UART:
193,905 UART: [state] CFI Enabled
262,091 UART: [state] LifecycleState = Unprovisioned
264,026 UART: [state] DebugLocked = No
266,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,368 UART: [kat] SHA2-256
441,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,614 UART: [kat] ++
452,091 UART: [kat] sha1
461,768 UART: [kat] SHA2-256
464,442 UART: [kat] SHA2-384
471,878 UART: [kat] SHA2-512-ACC
474,226 UART: [kat] ECC-384
2,765,464 UART: [kat] HMAC-384Kdf
2,778,068 UART: [kat] LMS
3,968,317 UART: [kat] --
3,972,679 UART: [cold-reset] ++
3,975,132 UART: [fht] Storing FHT @ 0x50003400
3,987,970 UART: [idev] ++
3,988,541 UART: [idev] CDI.KEYID = 6
3,989,636 UART: [idev] SUBJECT.KEYID = 7
3,990,679 UART: [idev] UDS.KEYID = 0
3,991,739 ready_for_fw is high
3,991,942 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,136,372 UART: [idev] Erasing UDS.KEYID = 0
7,326,902 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,695 UART: [idev] --
7,353,237 UART: [ldev] ++
7,353,854 UART: [ldev] CDI.KEYID = 6
7,354,775 UART: [ldev] SUBJECT.KEYID = 5
7,355,998 UART: [ldev] AUTHORITY.KEYID = 7
7,357,232 UART: [ldev] FE.KEYID = 1
7,403,017 UART: [ldev] Erasing FE.KEYID = 1
10,736,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,778 UART: [ldev] --
13,097,347 UART: [fwproc] Waiting for Commands...
13,100,425 UART: [fwproc] Received command 0x46574c44
13,102,610 UART: [fwproc] Received Image of size 114916 bytes
17,161,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,628,593 >>> mbox cmd response: success
17,632,007 UART: [afmc] ++
17,632,615 UART: [afmc] CDI.KEYID = 6
17,633,524 UART: [afmc] SUBJECT.KEYID = 7
17,634,797 UART: [afmc] AUTHORITY.KEYID = 5
20,990,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,762 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,152 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,018 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,451 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,964 UART: [afmc] --
23,358,597 UART: [cold-reset] --
23,363,188 UART: [state] Locking Datavault
23,367,901 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,604 UART: [state] Locking ICCM
23,371,915 UART: [exit] Launching FMC @ 0x40000130
23,380,316 UART:
23,380,551 UART: Running Caliptra FMC ...
23,381,655 UART:
23,381,817 UART: [state] CFI Enabled
23,450,368 UART: [fht] FMC Alias Private Key: 7
25,788,556 UART: [art] Extend RT PCRs Done
25,789,792 UART: [art] Lock RT PCRs Done
25,791,113 UART: [art] Populate DV Done
25,796,750 UART: [fht] FMC Alias Private Key: 7
25,798,345 UART: [art] Derive CDI
25,799,167 UART: [art] Store in in slot 0x4
25,860,013 UART: [art] Derive Key Pair
25,861,100 UART: [art] Store priv key in slot 0x5
29,153,625 UART: [art] Derive Key Pair - Done
29,166,692 UART: [art] Signing Cert with AUTHO
29,168,008 UART: RITY.KEYID = 7
31,456,128 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,634 UART: [art] PUB.X = 59C6C39117C2537330713A5EF0A49244291A09B8F832D9711E5444C3EE2E08A4FACE774A49078CA3E71DB4344FD84443
31,464,893 UART: [art] PUB.Y = C44E9595AA3FB7352CF71F10B775315C29BFA0300DEE641FFB34A1CA9959A2A593CEB37AE26CEAF3130F1965A9D22B67
31,472,130 UART: [art] SIG.R = 607C535DFBE90669E29534727DCE306DB01D444CB5684E235554213934D5A5F9677B28B366CA01AE6BC743BC07A5DAC0
31,479,480 UART: [art] SIG.S = BC84024DBE19B681DE5367CDA34ED122BF98EB041B6296A7964445750D68C3FB1C34653B3331C30C02FC5F4160A85D28
32,784,781 UART: Caliptra RT
32,785,494 UART: [state] CFI Enabled
32,945,740 UART: [rt] RT listening for mailbox commands...
32,947,596 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,977,389 UART: [rt]cmd =0x46504c54, len=4
32,979,006 >>> mbox cmd response data (8 bytes)
32,980,321 UART: [rt] FIPS self test
32,981,289 UART: [kat] ++
32,981,745 UART: [kat] sha1
32,986,045 UART: [kat] SHA2-256
32,987,981 UART: [kat] SHA2-384
32,990,941 UART: [kat] SHA2-512-ACC
32,991,991 UART: Fatal Error: 0x90050001
33,027,199 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,171,541 >>> mbox cmd response: failed
33,172,140 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,316,446 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,130 UART:
190,422 UART: Running Caliptra ROM ...
191,535 UART:
191,687 UART: [state] CFI Enabled
248,950 UART: [state] LifecycleState = Unprovisioned
250,846 UART: [state] DebugLocked = No
252,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,257 UART: [kat] SHA2-256
425,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
436,404 UART: [kat] ++
436,853 UART: [kat] sha1
448,485 UART: [kat] SHA2-256
451,164 UART: [kat] SHA2-384
457,630 UART: [kat] SHA2-512-ACC
460,032 UART: [kat] ECC-384
2,752,523 UART: [kat] HMAC-384Kdf
2,764,381 UART: [kat] LMS
3,954,720 UART: [kat] --
3,959,110 UART: [cold-reset] ++
3,960,888 UART: [fht] Storing FHT @ 0x50003400
3,974,007 UART: [idev] ++
3,974,581 UART: [idev] CDI.KEYID = 6
3,975,597 UART: [idev] SUBJECT.KEYID = 7
3,976,763 UART: [idev] UDS.KEYID = 0
3,978,386 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,123,041 UART: [idev] Erasing UDS.KEYID = 0
7,313,826 UART: [idev] Using Sha1 for KeyId Algorithm
7,335,154 UART: [idev] --
7,338,340 UART: [ldev] ++
7,338,910 UART: [ldev] CDI.KEYID = 6
7,339,851 UART: [ldev] SUBJECT.KEYID = 5
7,341,064 UART: [ldev] AUTHORITY.KEYID = 7
7,342,358 UART: [ldev] FE.KEYID = 1
7,388,837 UART: [ldev] Erasing FE.KEYID = 1
10,722,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,048,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,063,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,832 UART: [ldev] --
13,100,131 UART: [fwproc] Waiting for Commands...
13,103,208 UART: [fwproc] Received command 0x46574c44
13,105,399 UART: [fwproc] Received Image of size 114916 bytes
17,164,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,061 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,631,810 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,787,433 ready_for_fw is high
3,787,873 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,890,077 >>> mbox cmd response: success
23,595,098 UART:
23,595,510 UART: Running Caliptra FMC ...
23,596,620 UART:
23,596,784 UART: [state] CFI Enabled
23,662,550 UART: [fht] FMC Alias Private Key: 7
26,000,554 UART: [art] Extend RT PCRs Done
26,001,844 UART: [art] Lock RT PCRs Done
26,003,674 UART: [art] Populate DV Done
26,009,326 UART: [fht] FMC Alias Private Key: 7
26,011,025 UART: [art] Derive CDI
26,011,854 UART: [art] Store in in slot 0x4
26,070,951 UART: [art] Derive Key Pair
26,071,951 UART: [art] Store priv key in slot 0x5
29,365,540 UART: [art] Derive Key Pair - Done
29,378,680 UART: [art] Signing Cert with AUTHO
29,380,016 UART: RITY.KEYID = 7
31,666,730 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,235 UART: [art] PUB.X = 139D97A8B5293BFD1A5E4CA7B8560B423F3534753B8D2A1B5AB00CBB6516F99F5083218A726FEB53EBD9079CE1948915
31,675,496 UART: [art] PUB.Y = 96ADEC7F61E7162A2FEBB651A2AF00E09FE2C019544E1F99507183CE6D9D7185024B00EB7B8665D4DE599A570480767B
31,682,697 UART: [art] SIG.R = E4C9863D7B33C68C9346C0487054142ABD8176F2C23D26164DA1F33190C9CC3ECCE8C3F5C6BC0C9DDC6F42AB20FA2A71
31,690,144 UART: [art] SIG.S = 689214D454CD1E9DDBDD0B7038D0EBCDCB5E93760464CE4DC8566FA0B6123F0A8AD3DD58D5D171E9FA96845167B905EE
32,995,253 UART: Caliptra RT
32,995,984 UART: [state] CFI Enabled
33,157,241 UART: [rt] RT listening for mailbox commands...
33,159,097 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,188,838 UART: [rt]cmd =0x46504c54, len=4
33,190,414 >>> mbox cmd response data (8 bytes)
33,191,531 UART: [rt] FIPS self test
33,192,477 UART: [kat] ++
33,192,923 UART: [kat] sha1
33,197,430 UART: [kat] SHA2-256
33,199,358 UART: [kat] SHA2-384
33,202,348 UART: [kat] SHA2-512-ACC
33,203,292 UART: Fatal Error: 0x90050001
33,238,534 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,382,928 >>> mbox cmd response: failed
33,383,595 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,527,846 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,771,165 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,876,081 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,559 UART:
192,920 UART: Running Caliptra ROM ...
194,009 UART:
603,736 UART: [state] CFI Enabled
616,839 UART: [state] LifecycleState = Unprovisioned
618,713 UART: [state] DebugLocked = No
621,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,234 UART: [kat] SHA2-256
795,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,493 UART: [kat] ++
806,940 UART: [kat] sha1
818,170 UART: [kat] SHA2-256
820,914 UART: [kat] SHA2-384
825,771 UART: [kat] SHA2-512-ACC
828,142 UART: [kat] ECC-384
3,110,846 UART: [kat] HMAC-384Kdf
3,122,147 UART: [kat] LMS
4,312,243 UART: [kat] --
4,318,093 UART: [cold-reset] ++
4,320,318 UART: [fht] Storing FHT @ 0x50003400
4,332,865 UART: [idev] ++
4,333,504 UART: [idev] CDI.KEYID = 6
4,334,414 UART: [idev] SUBJECT.KEYID = 7
4,335,663 UART: [idev] UDS.KEYID = 0
4,336,731 ready_for_fw is high
4,336,969 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,481,774 UART: [idev] Erasing UDS.KEYID = 0
7,620,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,328 UART: [idev] --
7,647,203 UART: [ldev] ++
7,647,787 UART: [ldev] CDI.KEYID = 6
7,648,809 UART: [ldev] SUBJECT.KEYID = 5
7,649,911 UART: [ldev] AUTHORITY.KEYID = 7
7,651,221 UART: [ldev] FE.KEYID = 1
7,660,175 UART: [ldev] Erasing FE.KEYID = 1
10,948,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,480 UART: [ldev] --
13,308,824 UART: [fwproc] Waiting for Commands...
13,311,677 UART: [fwproc] Received command 0x46574c44
13,313,862 UART: [fwproc] Received Image of size 114916 bytes
17,369,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,832,020 >>> mbox cmd response: success
17,835,906 UART: [afmc] ++
17,836,540 UART: [afmc] CDI.KEYID = 6
17,837,437 UART: [afmc] SUBJECT.KEYID = 7
17,838,590 UART: [afmc] AUTHORITY.KEYID = 5
21,157,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,447 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,756 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,122 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,944 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,374 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,554 UART: [afmc] --
23,522,230 UART: [cold-reset] --
23,525,677 UART: [state] Locking Datavault
23,530,113 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,864 UART: [state] Locking ICCM
23,533,696 UART: [exit] Launching FMC @ 0x40000130
23,542,092 UART:
23,542,333 UART: Running Caliptra FMC ...
23,543,434 UART:
23,543,593 UART: [state] CFI Enabled
23,551,642 UART: [fht] FMC Alias Private Key: 7
25,882,169 UART: [art] Extend RT PCRs Done
25,883,386 UART: [art] Lock RT PCRs Done
25,884,983 UART: [art] Populate DV Done
25,890,664 UART: [fht] FMC Alias Private Key: 7
25,892,359 UART: [art] Derive CDI
25,893,095 UART: [art] Store in in slot 0x4
25,935,958 UART: [art] Derive Key Pair
25,936,978 UART: [art] Store priv key in slot 0x5
29,179,318 UART: [art] Derive Key Pair - Done
29,192,436 UART: [art] Signing Cert with AUTHO
29,193,740 UART: RITY.KEYID = 7
31,473,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,001 UART: [art] PUB.X = 2EE96FAC42359C35A7C20D3943ACF649A3B2D0763C36D66FFB3B895318E5E78128037096B33EEBBA5DB9ABCDE4F14E30
31,482,207 UART: [art] PUB.Y = EA88EA13BD32246ADD031B28B218843C8ED98A299844429788C9D365275A31816FF7DEF92D84CDFEDFFCCE1E8239CE63
31,489,416 UART: [art] SIG.R = 1F424150F1AD89074364F77BCABD0778BE509809C6A75ACF9EC39628E7837D3A1DB26AB4B8E211FACB73FE82ED309E4A
31,496,821 UART: [art] SIG.S = 1B9A3DC394A1B2A1E9E5DAEED401262C09381EADD3F247FF4ACBB1607666C7952CD85AF3CFBE3FE61F5598685D2CF7E7
32,801,315 UART: Caliptra RT
32,802,017 UART: [state] CFI Enabled
32,920,017 UART: [rt] RT listening for mailbox commands...
32,921,872 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,951,618 UART: [rt]cmd =0x46504c54, len=4
32,953,248 >>> mbox cmd response data (8 bytes)
32,954,548 UART: [rt] FIPS self test
32,955,509 UART: [kat] ++
32,955,963 UART: [kat] sha1
32,960,259 UART: [kat] SHA2-256
32,962,183 UART: [kat] SHA2-384
32,965,300 UART: [kat] SHA2-512-ACC
32,966,240 UART: Fatal Error: 0x90050001
33,001,614 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,145,811 >>> mbox cmd response: failed
33,146,454 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,290,672 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
190,053 UART:
190,360 UART: Running Caliptra ROM ...
191,391 UART:
7,253,279 UART: [state] CFI Enabled
7,262,928 UART: [state] LifecycleState = Unprovisioned
7,264,847 UART: [state] DebugLocked = No
7,266,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,271,139 UART: [kat] SHA2-256
7,440,877 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,451,455 UART: [kat] ++
7,451,998 UART: [kat] sha1
7,463,165 UART: [kat] SHA2-256
7,465,861 UART: [kat] SHA2-384
7,471,806 UART: [kat] SHA2-512-ACC
7,474,143 UART: [kat] ECC-384
9,759,194 UART: [kat] HMAC-384Kdf
9,771,748 UART: [kat] LMS
10,961,872 UART: [kat] --
10,965,827 UART: [cold-reset] ++
10,966,952 UART: [fht] Storing FHT @ 0x50003400
10,978,182 UART: [idev] ++
10,978,748 UART: [idev] CDI.KEYID = 6
10,979,762 UART: [idev] SUBJECT.KEYID = 7
10,980,918 UART: [idev] UDS.KEYID = 0
10,982,543 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,126,806 UART: [idev] Erasing UDS.KEYID = 0
14,268,996 UART: [idev] Using Sha1 for KeyId Algorithm
14,290,902 UART: [idev] --
14,294,722 UART: [ldev] ++
14,295,284 UART: [ldev] CDI.KEYID = 6
14,296,243 UART: [ldev] SUBJECT.KEYID = 5
14,297,453 UART: [ldev] AUTHORITY.KEYID = 7
14,298,740 UART: [ldev] FE.KEYID = 1
14,311,917 UART: [ldev] Erasing FE.KEYID = 1
17,600,933 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,892,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,906,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,921,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,936,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,955,026 UART: [ldev] --
19,959,712 UART: [fwproc] Waiting for Commands...
19,962,847 UART: [fwproc] Received command 0x46574c44
19,965,033 UART: [fwproc] Received Image of size 114916 bytes
24,030,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,107,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,176,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,497,284 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
4,127,713 ready_for_fw is high
4,128,149 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,089,629 >>> mbox cmd response: success
23,726,852 UART:
23,727,231 UART: Running Caliptra FMC ...
23,728,371 UART:
23,728,523 UART: [state] CFI Enabled
23,736,085 UART: [fht] FMC Alias Private Key: 7
26,066,883 UART: [art] Extend RT PCRs Done
26,068,119 UART: [art] Lock RT PCRs Done
26,069,751 UART: [art] Populate DV Done
26,075,071 UART: [fht] FMC Alias Private Key: 7
26,076,770 UART: [art] Derive CDI
26,077,544 UART: [art] Store in in slot 0x4
26,120,206 UART: [art] Derive Key Pair
26,121,260 UART: [art] Store priv key in slot 0x5
29,363,843 UART: [art] Derive Key Pair - Done
29,376,878 UART: [art] Signing Cert with AUTHO
29,378,192 UART: RITY.KEYID = 7
31,657,231 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,747 UART: [art] PUB.X = 88E8E4281C37EEA5FD8ABEE83F651DA17585DC295580AF6F10EE5500C7080C8026F6CD01B18586708AF12726218D5AEE
31,665,968 UART: [art] PUB.Y = 86B6266A6D1520BE05742C7B0F2BD4D66FB59FD668E80375C710E05EAF09E83F6EF8840395488A6146397DB31835A073
31,673,230 UART: [art] SIG.R = 6E68E5883E25F7EFAB837CF1AAA4BFA5BC835A63888FA99A452400267E82BE3EABA0B2CEAE2FEC455023CD4017C62554
31,680,621 UART: [art] SIG.S = 634E5D3E67D170D9A7F0B08F0D566A42FAD383CF86B403326B0831728AE16814AA923FC61C51D23745BE2580E15374C4
32,986,089 UART: Caliptra RT
32,986,813 UART: [state] CFI Enabled
33,104,098 UART: [rt] RT listening for mailbox commands...
33,105,954 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,136,019 UART: [rt]cmd =0x46504c54, len=4
33,137,585 >>> mbox cmd response data (8 bytes)
33,138,810 UART: [rt] FIPS self test
33,139,751 UART: [kat] ++
33,140,207 UART: [kat] sha1
33,144,773 UART: [kat] SHA2-256
33,146,701 UART: [kat] SHA2-384
33,149,603 UART: [kat] SHA2-512-ACC
33,150,557 UART: Fatal Error: 0x90050001
33,185,732 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,330,051 >>> mbox cmd response: failed
33,330,684 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,475,020 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
10,581,718 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,542,694 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,382 UART:
192,737 UART: Running Caliptra ROM ...
193,951 UART:
194,126 UART: [state] CFI Enabled
261,652 UART: [state] LifecycleState = Unprovisioned
263,503 UART: [state] DebugLocked = No
265,972 UART: [state] WD Timer not started. Device not locked for debugging
270,303 UART: [kat] SHA2-256
449,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,992 UART: [kat] ++
461,531 UART: [kat] sha1
473,341 UART: [kat] SHA2-256
476,406 UART: [kat] SHA2-384
482,058 UART: [kat] SHA2-512-ACC
485,003 UART: [kat] ECC-384
2,947,140 UART: [kat] HMAC-384Kdf
2,972,257 UART: [kat] LMS
3,501,719 UART: [kat] --
3,505,655 UART: [cold-reset] ++
3,507,756 UART: [fht] FHT @ 0x50003400
3,520,088 UART: [idev] ++
3,520,654 UART: [idev] CDI.KEYID = 6
3,521,538 UART: [idev] SUBJECT.KEYID = 7
3,522,782 UART: [idev] UDS.KEYID = 0
3,523,685 ready_for_fw is high
3,523,899 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,613 UART: [idev] Erasing UDS.KEYID = 0
6,024,837 UART: [idev] Sha1 KeyId Algorithm
6,048,782 UART: [idev] --
6,052,194 UART: [ldev] ++
6,052,766 UART: [ldev] CDI.KEYID = 6
6,053,648 UART: [ldev] SUBJECT.KEYID = 5
6,054,865 UART: [ldev] AUTHORITY.KEYID = 7
6,056,101 UART: [ldev] FE.KEYID = 1
6,100,471 UART: [ldev] Erasing FE.KEYID = 1
8,602,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,821 UART: [ldev] --
10,413,390 UART: [fwproc] Wait for Commands...
10,415,434 UART: [fwproc] Recv command 0x46574c44
10,417,471 UART: [fwproc] Recv'd Img size: 115224 bytes
13,822,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,555 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,289,570 >>> mbox cmd response: success
14,294,698 UART: [afmc] ++
14,295,288 UART: [afmc] CDI.KEYID = 6
14,296,170 UART: [afmc] SUBJECT.KEYID = 7
14,297,346 UART: [afmc] AUTHORITY.KEYID = 5
16,823,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,363 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,240 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,164 UART: [afmc] --
18,627,653 UART: [cold-reset] --
18,630,708 UART: [state] Locking Datavault
18,635,584 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,231 UART: [state] Locking ICCM
18,639,922 UART: [exit] Launching FMC @ 0x40000130
18,648,369 UART:
18,648,603 UART: Running Caliptra FMC ...
18,649,706 UART:
18,649,880 UART: [state] CFI Enabled
18,708,997 UART: [fht] FMC Alias Private Key: 7
20,472,707 UART: [art] Extend RT PCRs Done
20,473,918 UART: [art] Lock RT PCRs Done
20,475,113 UART: [art] Populate DV Done
20,480,741 UART: [fht] FMC Alias Private Key: 7
20,482,226 UART: [art] Derive CDI
20,482,988 UART: [art] Store in in slot 0x4
20,542,698 UART: [art] Derive Key Pair
20,543,748 UART: [art] Store priv key in slot 0x5
23,006,573 UART: [art] Derive Key Pair - Done
23,019,355 UART: [art] Signing Cert with AUTHO
23,020,666 UART: RITY.KEYID = 7
24,732,964 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,478 UART: [art] PUB.X = 05658DE00F5A9806127FC81B1D2A607020CF45BB0755C6C48AC29DE197CB6F614BA42F953FB4362119180522C6895944
24,741,733 UART: [art] PUB.Y = 3A96E908D52818E4AA4AF19CE235DEB445D91F3D7787594A7D3EE5E5B59675F9AC993740D371054626E73B318C4C7D3F
24,748,997 UART: [art] SIG.R = CA8F97C229D3F800C1C6D30D1008921BFECD99376E80F6BDCCBB481EE3F57C7A04C48586B1E36EE4D6A0BBEA247A4EB3
24,756,403 UART: [art] SIG.S = 9A625A6B233D9AA1687009A2E2C3DF417AD214D333FEDA44C69788167B935A62A5394465C93B5851EF01CF3C1B67EDD8
25,735,227 UART: Caliptra RT
25,735,927 UART: [state] CFI Enabled
25,901,314 UART: [rt] RT listening for mailbox commands...
25,903,295 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,933,127 UART: [rt]cmd =0x46504c54, len=4
25,934,768 >>> mbox cmd response data (8 bytes)
25,935,961 UART: [rt] FIPS self test
25,936,908 UART: [kat] ++
25,937,355 UART: [kat] sha1
25,941,754 UART: [kat] SHA2-256
25,943,627 UART: [kat] SHA2-384
25,946,475 UART: [kat] SHA2-512-ACC
25,947,412 UART: Fatal Error: 0x90050001
25,982,794 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,127,456 >>> mbox cmd response: failed
26,128,092 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,272,700 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,098 UART:
190,391 UART: Running Caliptra ROM ...
191,504 UART:
191,655 UART: [state] CFI Enabled
249,286 UART: [state] LifecycleState = Unprovisioned
251,106 UART: [state] DebugLocked = No
253,421 UART: [state] WD Timer not started. Device not locked for debugging
256,977 UART: [kat] SHA2-256
436,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,675 UART: [kat] ++
448,126 UART: [kat] sha1
460,802 UART: [kat] SHA2-256
463,814 UART: [kat] SHA2-384
468,818 UART: [kat] SHA2-512-ACC
471,745 UART: [kat] ECC-384
2,933,453 UART: [kat] HMAC-384Kdf
2,956,048 UART: [kat] LMS
3,485,472 UART: [kat] --
3,489,793 UART: [cold-reset] ++
3,492,095 UART: [fht] FHT @ 0x50003400
3,501,838 UART: [idev] ++
3,502,405 UART: [idev] CDI.KEYID = 6
3,503,340 UART: [idev] SUBJECT.KEYID = 7
3,504,551 UART: [idev] UDS.KEYID = 0
3,506,034 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,651,509 UART: [idev] Erasing UDS.KEYID = 0
6,011,432 UART: [idev] Sha1 KeyId Algorithm
6,034,189 UART: [idev] --
6,037,735 UART: [ldev] ++
6,038,318 UART: [ldev] CDI.KEYID = 6
6,039,234 UART: [ldev] SUBJECT.KEYID = 5
6,040,452 UART: [ldev] AUTHORITY.KEYID = 7
6,041,687 UART: [ldev] FE.KEYID = 1
6,085,597 UART: [ldev] Erasing FE.KEYID = 1
8,586,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,737 UART: [ldev] --
10,399,890 UART: [fwproc] Wait for Commands...
10,402,361 UART: [fwproc] Recv command 0x46574c44
10,404,405 UART: [fwproc] Recv'd Img size: 115224 bytes
13,813,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,223 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,275,063 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,183 UART:
192,550 UART: Running Caliptra ROM ...
193,653 UART:
193,795 UART: [state] CFI Enabled
263,746 UART: [state] LifecycleState = Unprovisioned
266,100 UART: [state] DebugLocked = No
267,416 UART: [state] WD Timer not started. Device not locked for debugging
272,740 UART: [kat] SHA2-256
462,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,418 UART: [kat] ++
473,921 UART: [kat] sha1
485,685 UART: [kat] SHA2-256
488,742 UART: [kat] SHA2-384
494,533 UART: [kat] SHA2-512-ACC
497,127 UART: [kat] ECC-384
2,945,904 UART: [kat] HMAC-384Kdf
2,971,583 UART: [kat] LMS
3,503,396 UART: [kat] --
3,506,968 UART: [cold-reset] ++
3,508,899 UART: [fht] FHT @ 0x50003400
3,520,116 UART: [idev] ++
3,520,796 UART: [idev] CDI.KEYID = 6
3,521,758 UART: [idev] SUBJECT.KEYID = 7
3,522,939 UART: [idev] UDS.KEYID = 0
3,523,841 ready_for_fw is high
3,524,066 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,668,858 UART: [idev] Erasing UDS.KEYID = 0
6,029,969 UART: [idev] Sha1 KeyId Algorithm
6,052,059 UART: [idev] --
6,055,312 UART: [ldev] ++
6,055,995 UART: [ldev] CDI.KEYID = 6
6,056,919 UART: [ldev] SUBJECT.KEYID = 5
6,058,080 UART: [ldev] AUTHORITY.KEYID = 7
6,059,318 UART: [ldev] FE.KEYID = 1
6,102,485 UART: [ldev] Erasing FE.KEYID = 1
8,607,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,449 UART: [ldev] --
10,415,095 UART: [fwproc] Wait for Commands...
10,416,721 UART: [fwproc] Recv command 0x46574c44
10,419,044 UART: [fwproc] Recv'd Img size: 115224 bytes
13,873,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,259 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,619,096 >>> mbox cmd response: success
14,622,302 UART: [afmc] ++
14,623,002 UART: [afmc] CDI.KEYID = 6
14,624,191 UART: [afmc] SUBJECT.KEYID = 7
14,625,676 UART: [afmc] AUTHORITY.KEYID = 5
17,153,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,381 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,453 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,949,112 UART: [afmc] --
18,952,926 UART: [cold-reset] --
18,955,013 UART: [state] Locking Datavault
18,961,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,530 UART: [state] Locking ICCM
18,965,473 UART: [exit] Launching FMC @ 0x40000130
18,974,148 UART:
18,974,394 UART: Running Caliptra FMC ...
18,975,501 UART:
18,975,661 UART: [state] CFI Enabled
19,034,673 UART: [fht] FMC Alias Private Key: 7
20,798,209 UART: [art] Extend RT PCRs Done
20,799,439 UART: [art] Lock RT PCRs Done
20,801,642 UART: [art] Populate DV Done
20,807,004 UART: [fht] FMC Alias Private Key: 7
20,808,517 UART: [art] Derive CDI
20,809,283 UART: [art] Store in in slot 0x4
20,867,401 UART: [art] Derive Key Pair
20,868,417 UART: [art] Store priv key in slot 0x5
23,331,233 UART: [art] Derive Key Pair - Done
23,344,080 UART: [art] Signing Cert with AUTHO
23,345,388 UART: RITY.KEYID = 7
25,057,309 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,819 UART: [art] PUB.X = B6DEFA276A5BC33D8521C67CF907018DE110AA8A8C4C3772C70C63673E453ABD94480FAE17B855D094D016887BA213CD
25,066,080 UART: [art] PUB.Y = F4D552BC1BE6FFF046A9871922EFA0CED792D986ADD138219E6DF3D11604B9E0D0149E1378B6B754B012168F1655D0EE
25,073,339 UART: [art] SIG.R = 98B4339C3896E7036BEF57D99580CF2AF745E38668D2012BFEFBE864B1D8ECF06A8C235DFF7019A4EA18C9A9B26F63F0
25,080,739 UART: [art] SIG.S = 30DD8378E585C222ECF74608D3CFF4B928583B2D108E9957ACE54F6B6A7008D09CB07A9BC8B3A8ED1CC259508DD5AC43
26,059,319 UART: Caliptra RT
26,060,049 UART: [state] CFI Enabled
26,225,098 UART: [rt] RT listening for mailbox commands...
26,226,958 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,256,674 UART: [rt]cmd =0x46504c54, len=4
26,258,290 >>> mbox cmd response data (8 bytes)
26,259,309 UART: [rt] FIPS self test
26,260,257 UART: [kat] ++
26,260,709 UART: [kat] sha1
26,265,054 UART: [kat] SHA2-256
26,266,986 UART: [kat] SHA2-384
26,270,139 UART: [kat] SHA2-512-ACC
26,271,015 UART: Fatal Error: 0x90050001
26,306,151 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,450,859 >>> mbox cmd response: failed
26,451,494 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,596,184 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
189,999 UART:
190,307 UART: Running Caliptra ROM ...
191,335 UART:
191,476 UART: [state] CFI Enabled
254,567 UART: [state] LifecycleState = Unprovisioned
256,927 UART: [state] DebugLocked = No
259,356 UART: [state] WD Timer not started. Device not locked for debugging
263,430 UART: [kat] SHA2-256
453,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,100 UART: [kat] ++
464,547 UART: [kat] sha1
476,075 UART: [kat] SHA2-256
479,094 UART: [kat] SHA2-384
484,432 UART: [kat] SHA2-512-ACC
486,988 UART: [kat] ECC-384
2,949,654 UART: [kat] HMAC-384Kdf
2,970,769 UART: [kat] LMS
3,502,494 UART: [kat] --
3,507,526 UART: [cold-reset] ++
3,508,917 UART: [fht] FHT @ 0x50003400
3,521,359 UART: [idev] ++
3,522,036 UART: [idev] CDI.KEYID = 6
3,522,975 UART: [idev] SUBJECT.KEYID = 7
3,524,245 UART: [idev] UDS.KEYID = 0
3,525,728 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,670,572 UART: [idev] Erasing UDS.KEYID = 0
6,032,619 UART: [idev] Sha1 KeyId Algorithm
6,056,128 UART: [idev] --
6,060,699 UART: [ldev] ++
6,061,400 UART: [ldev] CDI.KEYID = 6
6,062,285 UART: [ldev] SUBJECT.KEYID = 5
6,063,500 UART: [ldev] AUTHORITY.KEYID = 7
6,064,742 UART: [ldev] FE.KEYID = 1
6,100,240 UART: [ldev] Erasing FE.KEYID = 1
8,607,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,544 UART: [ldev] --
10,416,812 UART: [fwproc] Wait for Commands...
10,419,882 UART: [fwproc] Recv command 0x46574c44
10,422,143 UART: [fwproc] Recv'd Img size: 115224 bytes
13,881,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,961,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,077,202 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,624,365 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,440,018 ready_for_fw is high
3,440,499 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,749,811 >>> mbox cmd response: success
19,041,975 UART:
19,042,402 UART: Running Caliptra FMC ...
19,043,543 UART:
19,043,704 UART: [state] CFI Enabled
19,113,123 UART: [fht] FMC Alias Private Key: 7
20,876,795 UART: [art] Extend RT PCRs Done
20,878,022 UART: [art] Lock RT PCRs Done
20,879,981 UART: [art] Populate DV Done
20,885,510 UART: [fht] FMC Alias Private Key: 7
20,887,105 UART: [art] Derive CDI
20,887,922 UART: [art] Store in in slot 0x4
20,945,024 UART: [art] Derive Key Pair
20,946,064 UART: [art] Store priv key in slot 0x5
23,409,201 UART: [art] Derive Key Pair - Done
23,422,055 UART: [art] Signing Cert with AUTHO
23,423,367 UART: RITY.KEYID = 7
25,135,616 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,272 UART: [art] PUB.X = 2053382FA235735DB1404A1C8DC8166A8ACA393AF5AA614CE36D20933A19BA2446CEBABD7E42EAB741B4B9B772F19521
25,144,380 UART: [art] PUB.Y = 0A8838A2974D07084A317A4DB9BAD3BE64226EB05B7D8666E5B6270D3CE3AA8FB14E511FA5ED2B24CA686403132C07F4
25,151,666 UART: [art] SIG.R = B952CB0C528F3905D486E25B262714A5BD6F3F3C7AD96C1E693A38CC8B7A91CE20C5FC4407210661E2949D0160C08EF9
25,159,034 UART: [art] SIG.S = F9A9CBBFD56DA02D1BF534862D1305CC00D329729C0F37075FEE8872D491D6ECE6635C676ED23CF6B7C3944D8ECB262D
26,138,159 UART: Caliptra RT
26,138,855 UART: [state] CFI Enabled
26,303,423 UART: [rt] RT listening for mailbox commands...
26,305,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,335,036 UART: [rt]cmd =0x46504c54, len=4
26,336,711 >>> mbox cmd response data (8 bytes)
26,337,944 UART: [rt] FIPS self test
26,338,890 UART: [kat] ++
26,339,342 UART: [kat] sha1
26,343,717 UART: [kat] SHA2-256
26,345,594 UART: [kat] SHA2-384
26,348,602 UART: [kat] SHA2-512-ACC
26,349,553 UART: Fatal Error: 0x90050001
26,384,766 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,529,540 >>> mbox cmd response: failed
26,530,257 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,674,895 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,423,762 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,740,612 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,575 UART:
192,947 UART: Running Caliptra ROM ...
194,050 UART:
603,619 UART: [state] CFI Enabled
616,726 UART: [state] LifecycleState = Unprovisioned
619,109 UART: [state] DebugLocked = No
621,838 UART: [state] WD Timer not started. Device not locked for debugging
627,031 UART: [kat] SHA2-256
816,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,682 UART: [kat] ++
828,210 UART: [kat] sha1
838,087 UART: [kat] SHA2-256
841,107 UART: [kat] SHA2-384
848,096 UART: [kat] SHA2-512-ACC
850,690 UART: [kat] ECC-384
3,291,651 UART: [kat] HMAC-384Kdf
3,305,231 UART: [kat] LMS
3,837,102 UART: [kat] --
3,841,421 UART: [cold-reset] ++
3,842,860 UART: [fht] FHT @ 0x50003400
3,853,982 UART: [idev] ++
3,854,622 UART: [idev] CDI.KEYID = 6
3,855,654 UART: [idev] SUBJECT.KEYID = 7
3,856,845 UART: [idev] UDS.KEYID = 0
3,857,772 ready_for_fw is high
3,857,969 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,002,675 UART: [idev] Erasing UDS.KEYID = 0
6,330,749 UART: [idev] Sha1 KeyId Algorithm
6,352,572 UART: [idev] --
6,357,024 UART: [ldev] ++
6,357,714 UART: [ldev] CDI.KEYID = 6
6,358,595 UART: [ldev] SUBJECT.KEYID = 5
6,359,809 UART: [ldev] AUTHORITY.KEYID = 7
6,361,041 UART: [ldev] FE.KEYID = 1
6,373,880 UART: [ldev] Erasing FE.KEYID = 1
8,851,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,072 UART: [ldev] --
10,641,225 UART: [fwproc] Wait for Commands...
10,643,753 UART: [fwproc] Recv command 0x46574c44
10,646,018 UART: [fwproc] Recv'd Img size: 115224 bytes
14,106,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,192,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,308,542 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,856,583 >>> mbox cmd response: success
14,859,998 UART: [afmc] ++
14,860,697 UART: [afmc] CDI.KEYID = 6
14,861,855 UART: [afmc] SUBJECT.KEYID = 7
14,863,387 UART: [afmc] AUTHORITY.KEYID = 5
17,369,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,090,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,092,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,108,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,123,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,138,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,162,400 UART: [afmc] --
19,165,298 UART: [cold-reset] --
19,170,131 UART: [state] Locking Datavault
19,173,647 UART: [state] Locking PCR0, PCR1 and PCR31
19,175,832 UART: [state] Locking ICCM
19,178,392 UART: [exit] Launching FMC @ 0x40000130
19,187,051 UART:
19,187,288 UART: Running Caliptra FMC ...
19,188,390 UART:
19,188,549 UART: [state] CFI Enabled
19,196,812 UART: [fht] FMC Alias Private Key: 7
20,953,707 UART: [art] Extend RT PCRs Done
20,954,915 UART: [art] Lock RT PCRs Done
20,956,636 UART: [art] Populate DV Done
20,962,098 UART: [fht] FMC Alias Private Key: 7
20,963,635 UART: [art] Derive CDI
20,964,366 UART: [art] Store in in slot 0x4
21,007,216 UART: [art] Derive Key Pair
21,008,254 UART: [art] Store priv key in slot 0x5
23,434,551 UART: [art] Derive Key Pair - Done
23,447,818 UART: [art] Signing Cert with AUTHO
23,449,130 UART: RITY.KEYID = 7
25,154,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,070 UART: [art] PUB.X = 891464CE16FA0FFCC3417582A73EA09DBA18AEFF32151E14EF01177EB892E7DE2FF16DF32438245AD3997B1CB0360310
25,163,374 UART: [art] PUB.Y = 94A48DB3C07A142E89D11B2F29EB214FF9B3249F9912120DCCB8DEA206885016D5817D496CBC23852BF42ABD7FCDC9CF
25,170,658 UART: [art] SIG.R = 9167D1C77BC8E86A37670B1C42E66673B114615EA9BA7627FA89DF396DCEDE932F545C589C83B980E5555F38A4D4CEEF
25,178,047 UART: [art] SIG.S = 173E02B56269FFE4E0F786E9F951454A53C4597AE3ABF919AA3B1C6FDEA7927495AF76A9A7085D02CDC9E32E87C96979
26,156,994 UART: Caliptra RT
26,157,715 UART: [state] CFI Enabled
26,276,053 UART: [rt] RT listening for mailbox commands...
26,277,911 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,307,805 UART: [rt]cmd =0x46504c54, len=4
26,309,324 >>> mbox cmd response data (8 bytes)
26,310,703 UART: [rt] FIPS self test
26,311,638 UART: [kat] ++
26,312,084 UART: [kat] sha1
26,316,730 UART: [kat] SHA2-256
26,318,656 UART: [kat] SHA2-384
26,321,611 UART: [kat] SHA2-512-ACC
26,322,605 UART: Fatal Error: 0x90050001
26,357,976 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,502,554 >>> mbox cmd response: failed
26,503,135 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,647,794 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,050 UART:
190,338 UART: Running Caliptra ROM ...
191,359 UART:
13,888,505 UART: [state] CFI Enabled
13,904,823 UART: [state] LifecycleState = Unprovisioned
13,907,216 UART: [state] DebugLocked = No
13,909,192 UART: [state] WD Timer not started. Device not locked for debugging
13,914,497 UART: [kat] SHA2-256
14,104,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,115,146 UART: [kat] ++
14,115,745 UART: [kat] sha1
14,127,503 UART: [kat] SHA2-256
14,130,511 UART: [kat] SHA2-384
14,136,927 UART: [kat] SHA2-512-ACC
14,139,544 UART: [kat] ECC-384
16,582,429 UART: [kat] HMAC-384Kdf
16,595,671 UART: [kat] LMS
17,127,479 UART: [kat] --
17,132,490 UART: [cold-reset] ++
17,134,846 UART: [fht] FHT @ 0x50003400
17,146,460 UART: [idev] ++
17,147,175 UART: [idev] CDI.KEYID = 6
17,148,069 UART: [idev] SUBJECT.KEYID = 7
17,149,287 UART: [idev] UDS.KEYID = 0
17,150,808 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,295,413 UART: [idev] Erasing UDS.KEYID = 0
19,627,566 UART: [idev] Sha1 KeyId Algorithm
19,649,500 UART: [idev] --
19,654,840 UART: [ldev] ++
19,655,527 UART: [ldev] CDI.KEYID = 6
19,656,440 UART: [ldev] SUBJECT.KEYID = 5
19,657,617 UART: [ldev] AUTHORITY.KEYID = 7
19,658,852 UART: [ldev] FE.KEYID = 1
19,669,070 UART: [ldev] Erasing FE.KEYID = 1
22,146,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,863,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,878,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,893,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,908,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,928,769 UART: [ldev] --
23,934,624 UART: [fwproc] Wait for Commands...
23,936,783 UART: [fwproc] Recv command 0x46574c44
23,939,084 UART: [fwproc] Recv'd Img size: 115224 bytes
27,394,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,473,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,589,716 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,138,343 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,749,302 ready_for_fw is high
3,749,766 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,962,108 >>> mbox cmd response: success
19,213,712 UART:
19,214,098 UART: Running Caliptra FMC ...
19,215,250 UART:
19,215,412 UART: [state] CFI Enabled
19,223,692 UART: [fht] FMC Alias Private Key: 7
20,981,478 UART: [art] Extend RT PCRs Done
20,982,712 UART: [art] Lock RT PCRs Done
20,984,294 UART: [art] Populate DV Done
20,989,669 UART: [fht] FMC Alias Private Key: 7
20,991,211 UART: [art] Derive CDI
20,992,026 UART: [art] Store in in slot 0x4
21,034,277 UART: [art] Derive Key Pair
21,035,328 UART: [art] Store priv key in slot 0x5
23,462,111 UART: [art] Derive Key Pair - Done
23,475,005 UART: [art] Signing Cert with AUTHO
23,476,320 UART: RITY.KEYID = 7
25,181,634 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,283 UART: [art] PUB.X = 51C701A0A11712605B67A893B88AA5F5EF112250B074D377748D2610DE62BD2AE1DFA8481365BD03AF196FE36EE6ECE9
25,190,398 UART: [art] PUB.Y = A7C1C8F45CE0F4F9D9B7E4006A90425A6DAEA3C4B3476CB20AE103E59DF63EFC5967754F002F637C7B3F7A5043D017BB
25,197,609 UART: [art] SIG.R = 8B7F8B8B376A55CFA160982756C57D520ACCEE9C1F238D2483DD5D9F31A63191ACD12CA11F9B8F6F4CD52E118788C554
25,205,006 UART: [art] SIG.S = 771E636A06203C4EE0C3A025BF336FF11DBE7195179475D318DE952654970381365D099D14067123AAC21F59AEA9093E
26,184,167 UART: Caliptra RT
26,184,876 UART: [state] CFI Enabled
26,301,119 UART: [rt] RT listening for mailbox commands...
26,303,130 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,332,998 UART: [rt]cmd =0x46504c54, len=4
26,334,531 >>> mbox cmd response data (8 bytes)
26,335,978 UART: [rt] FIPS self test
26,336,928 UART: [kat] ++
26,337,384 UART: [kat] sha1
26,341,731 UART: [kat] SHA2-256
26,343,667 UART: [kat] SHA2-384
26,346,577 UART: [kat] SHA2-512-ACC
26,347,538 UART: Fatal Error: 0x90050001
26,382,691 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,527,406 >>> mbox cmd response: failed
26,528,060 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,672,743 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
17,005,956 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,224,098 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,207 UART: [kat] SHA2-256
892,145 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,320 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 ready_for_fw is high
1,480,975 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,896 UART: [idev] Erasing UDS.KEYID = 0
1,505,486 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,112 UART: [idev] --
1,515,187 UART: [ldev] ++
1,515,355 UART: [ldev] CDI.KEYID = 6
1,515,718 UART: [ldev] SUBJECT.KEYID = 5
1,516,144 UART: [ldev] AUTHORITY.KEYID = 7
1,516,607 UART: [ldev] FE.KEYID = 1
1,521,737 UART: [ldev] Erasing FE.KEYID = 1
1,546,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,720 UART: [ldev] --
1,586,047 UART: [fwproc] Waiting for Commands...
1,586,916 UART: [fwproc] Received command 0x46574c44
1,587,707 UART: [fwproc] Received Image of size 115224 bytes
2,895,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,031 >>> mbox cmd response: success
3,090,257 UART: [afmc] ++
3,090,425 UART: [afmc] CDI.KEYID = 6
3,090,787 UART: [afmc] SUBJECT.KEYID = 7
3,091,212 UART: [afmc] AUTHORITY.KEYID = 5
3,126,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,355 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,748 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,438 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,493 UART: [afmc] --
3,169,603 UART: [cold-reset] --
3,170,365 UART: [state] Locking Datavault
3,171,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,110 UART: [state] Locking ICCM
3,172,658 UART: [exit] Launching FMC @ 0x40000130
3,177,987 UART:
3,178,003 UART: Running Caliptra FMC ...
3,178,411 UART:
3,178,465 UART: [state] CFI Enabled
3,188,772 UART: [fht] FMC Alias Private Key: 7
3,295,865 UART: [art] Extend RT PCRs Done
3,296,293 UART: [art] Lock RT PCRs Done
3,297,841 UART: [art] Populate DV Done
3,306,336 UART: [fht] FMC Alias Private Key: 7
3,307,464 UART: [art] Derive CDI
3,307,744 UART: [art] Store in in slot 0x4
3,393,475 UART: [art] Derive Key Pair
3,393,835 UART: [art] Store priv key in slot 0x5
3,407,059 UART: [art] Derive Key Pair - Done
3,421,959 UART: [art] Signing Cert with AUTHO
3,422,439 UART: RITY.KEYID = 7
3,438,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,922 UART: [art] PUB.X = B16D9E80E505FA4047D3E7B59250F38D984041B8CF11CE13309367962A9EC280866A1DD2B5EDC90ADA32C0BB06C436F0
3,445,689 UART: [art] PUB.Y = 981E7DE0C1FAFBD2E4F39800A34859E28743567CA906BDB41871EFEDDFBE39816C9E29645F6C349A69ECB4557879104A
3,452,622 UART: [art] SIG.R = 49DBF5BB1682F4BF1BE8B610D7C9EDF43D4DCB9CCCF14A6F3265A998A1F638BADCBD96A189AADE9AFCCE97E4D52D71A8
3,459,428 UART: [art] SIG.S = AF02B937D45879B66D9D2411ED190D720C82DF465A875C266217CD3DBA288D484838F139AC003496CF0EC2C6E263DF61
3,483,021 UART: Caliptra RT
3,483,275 UART: [state] CFI Enabled
3,591,065 UART: [rt] RT listening for mailbox commands...
3,591,728 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,378 UART: [rt]cmd =0x46504c54, len=4
3,622,610 >>> mbox cmd response data (8 bytes)
3,622,745 UART: [rt] FIPS self test
3,623,073 UART: [kat] ++
3,623,225 UART: [kat] sha1
3,627,529 UART: [kat] SHA2-256
3,629,551 UART: [kat] SHA2-384
3,632,500 UART: [kat] SHA2-512-ACC
3,633,048 UART: Fatal Error: 0x90050001
3,634,598 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,603 >>> mbox cmd response: failed
3,634,603 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,757 UART: [kat] SHA2-256
892,695 UART: [kat] SHA2-384
895,542 UART: [kat] SHA2-512-ACC
897,443 UART: [kat] ECC-384
903,266 UART: [kat] HMAC-384Kdf
907,868 UART: [kat] LMS
1,476,064 UART: [kat] --
1,476,787 UART: [cold-reset] ++
1,477,347 UART: [fht] Storing FHT @ 0x50003400
1,480,102 UART: [idev] ++
1,480,270 UART: [idev] CDI.KEYID = 6
1,480,630 UART: [idev] SUBJECT.KEYID = 7
1,481,054 UART: [idev] UDS.KEYID = 0
1,481,399 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,046 UART: [idev] Erasing UDS.KEYID = 0
1,505,740 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,160 UART: [idev] --
1,515,225 UART: [ldev] ++
1,515,393 UART: [ldev] CDI.KEYID = 6
1,515,756 UART: [ldev] SUBJECT.KEYID = 5
1,516,182 UART: [ldev] AUTHORITY.KEYID = 7
1,516,645 UART: [ldev] FE.KEYID = 1
1,521,773 UART: [ldev] Erasing FE.KEYID = 1
1,547,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,130 UART: [ldev] --
1,586,645 UART: [fwproc] Waiting for Commands...
1,587,380 UART: [fwproc] Received command 0x46574c44
1,588,171 UART: [fwproc] Received Image of size 115224 bytes
2,895,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,821 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,219 ready_for_fw is high
1,362,219 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,417 >>> mbox cmd response: success
3,000,799 UART:
3,000,815 UART: Running Caliptra FMC ...
3,001,223 UART:
3,001,277 UART: [state] CFI Enabled
3,011,716 UART: [fht] FMC Alias Private Key: 7
3,119,765 UART: [art] Extend RT PCRs Done
3,120,193 UART: [art] Lock RT PCRs Done
3,121,971 UART: [art] Populate DV Done
3,130,064 UART: [fht] FMC Alias Private Key: 7
3,131,128 UART: [art] Derive CDI
3,131,408 UART: [art] Store in in slot 0x4
3,216,945 UART: [art] Derive Key Pair
3,217,305 UART: [art] Store priv key in slot 0x5
3,230,129 UART: [art] Derive Key Pair - Done
3,244,935 UART: [art] Signing Cert with AUTHO
3,245,415 UART: RITY.KEYID = 7
3,261,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,848 UART: [art] PUB.X = E1D874C1E3A4AA2BBA9156D417C7429010DF57E1E49D449DAC00F995D835A87F22A5CF258AC7B7F5B2554E6DFE3269EC
3,268,610 UART: [art] PUB.Y = BA669D4F198C20DF7FD2B1CC647B34320B0DEECD0584D7D3BDB2B1F534401A04505343B70D178549B6C437E036164A9C
3,275,551 UART: [art] SIG.R = 94E216FD3611A6831D093CA7AD47745AB69A783541E90489D23406A484DC82E42CCAE42BF840F41B3709E06742BA63F3
3,282,307 UART: [art] SIG.S = 17B2EAA29F623D376AC1FD60D38FE0DB611B950EEB728836D7B02A4B4B98B3F4D89AF131C54F501923D8A6D55D4E8761
3,306,503 UART: Caliptra RT
3,306,757 UART: [state] CFI Enabled
3,415,533 UART: [rt] RT listening for mailbox commands...
3,416,196 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,714 UART: [rt]cmd =0x46504c54, len=4
3,446,794 >>> mbox cmd response data (8 bytes)
3,447,157 UART: [rt] FIPS self test
3,447,485 UART: [kat] ++
3,447,637 UART: [kat] sha1
3,451,861 UART: [kat] SHA2-256
3,453,883 UART: [kat] SHA2-384
3,456,806 UART: [kat] SHA2-512-ACC
3,457,364 UART: Fatal Error: 0x90050001
3,458,914 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,919 >>> mbox cmd response: failed
3,458,919 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,195 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,049 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,296 UART: [kat] SHA2-256
882,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,342 UART: [kat] ++
886,494 UART: [kat] sha1
890,730 UART: [kat] SHA2-256
892,668 UART: [kat] SHA2-384
895,613 UART: [kat] SHA2-512-ACC
897,514 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,476,822 UART: [cold-reset] ++
1,477,274 UART: [fht] Storing FHT @ 0x50003400
1,480,173 UART: [idev] ++
1,480,341 UART: [idev] CDI.KEYID = 6
1,480,701 UART: [idev] SUBJECT.KEYID = 7
1,481,125 UART: [idev] UDS.KEYID = 0
1,481,470 ready_for_fw is high
1,481,470 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,055 UART: [idev] Erasing UDS.KEYID = 0
1,505,777 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,249 UART: [idev] --
1,515,140 UART: [ldev] ++
1,515,308 UART: [ldev] CDI.KEYID = 6
1,515,671 UART: [ldev] SUBJECT.KEYID = 5
1,516,097 UART: [ldev] AUTHORITY.KEYID = 7
1,516,560 UART: [ldev] FE.KEYID = 1
1,522,116 UART: [ldev] Erasing FE.KEYID = 1
1,547,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,793 UART: [ldev] --
1,587,100 UART: [fwproc] Waiting for Commands...
1,587,821 UART: [fwproc] Received command 0x46574c44
1,588,612 UART: [fwproc] Received Image of size 115224 bytes
2,895,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,641 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,206 >>> mbox cmd response: success
3,090,360 UART: [afmc] ++
3,090,528 UART: [afmc] CDI.KEYID = 6
3,090,890 UART: [afmc] SUBJECT.KEYID = 7
3,091,315 UART: [afmc] AUTHORITY.KEYID = 5
3,126,232 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,166 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,559 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,249 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,172 UART: [afmc] --
3,169,238 UART: [cold-reset] --
3,170,020 UART: [state] Locking Datavault
3,170,981 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,585 UART: [state] Locking ICCM
3,172,121 UART: [exit] Launching FMC @ 0x40000130
3,177,450 UART:
3,177,466 UART: Running Caliptra FMC ...
3,177,874 UART:
3,178,017 UART: [state] CFI Enabled
3,188,444 UART: [fht] FMC Alias Private Key: 7
3,295,471 UART: [art] Extend RT PCRs Done
3,295,899 UART: [art] Lock RT PCRs Done
3,297,201 UART: [art] Populate DV Done
3,305,500 UART: [fht] FMC Alias Private Key: 7
3,306,430 UART: [art] Derive CDI
3,306,710 UART: [art] Store in in slot 0x4
3,392,255 UART: [art] Derive Key Pair
3,392,615 UART: [art] Store priv key in slot 0x5
3,405,851 UART: [art] Derive Key Pair - Done
3,420,716 UART: [art] Signing Cert with AUTHO
3,421,196 UART: RITY.KEYID = 7
3,436,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,285 UART: [art] PUB.X = 698C73F6CC3A119423C6E2C81E6D503135B4E8547E6FD78B6B361CF94A10FFE1F3A2893874CF70A715C400CD10449516
3,444,033 UART: [art] PUB.Y = 00BAF5BAA215AE965547DD27D93003BF0B1970A16932D8EAA6FD2CB96C482C520F3AD43C263B6D4D72DE7D81A32A5F67
3,450,966 UART: [art] SIG.R = 6097270C89CB841562DA18C8BD9713AD39BFCE7DAECB52EC3D58AB5052A512F09879295CB1713BE070D7EA44718BD98F
3,457,743 UART: [art] SIG.S = 7B1795D7C656A0B37407CC89A2530E51B6A3D27EB1C4D944E88E57085C4C32DC688C5D83EDD98E169D79F33B5504DEB3
3,481,680 UART: Caliptra RT
3,482,026 UART: [state] CFI Enabled
3,590,203 UART: [rt] RT listening for mailbox commands...
3,590,866 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,206 UART: [rt]cmd =0x46504c54, len=4
3,621,324 >>> mbox cmd response data (8 bytes)
3,621,511 UART: [rt] FIPS self test
3,621,839 UART: [kat] ++
3,621,991 UART: [kat] sha1
3,626,021 UART: [kat] SHA2-256
3,628,043 UART: [kat] SHA2-384
3,630,706 UART: [kat] SHA2-512-ACC
3,631,246 UART: Fatal Error: 0x90050001
3,632,796 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,632,801 >>> mbox cmd response: failed
3,632,801 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,632,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,144 UART: [kat] SHA2-256
882,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,190 UART: [kat] ++
886,342 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
903,163 UART: [kat] HMAC-384Kdf
907,669 UART: [kat] LMS
1,475,865 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,220 UART: [fht] Storing FHT @ 0x50003400
1,480,029 UART: [idev] ++
1,480,197 UART: [idev] CDI.KEYID = 6
1,480,557 UART: [idev] SUBJECT.KEYID = 7
1,480,981 UART: [idev] UDS.KEYID = 0
1,481,326 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,307 UART: [idev] Erasing UDS.KEYID = 0
1,506,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,711 UART: [idev] --
1,515,624 UART: [ldev] ++
1,515,792 UART: [ldev] CDI.KEYID = 6
1,516,155 UART: [ldev] SUBJECT.KEYID = 5
1,516,581 UART: [ldev] AUTHORITY.KEYID = 7
1,517,044 UART: [ldev] FE.KEYID = 1
1,522,116 UART: [ldev] Erasing FE.KEYID = 1
1,547,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,383 UART: [ldev] --
1,586,702 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 115224 bytes
2,895,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,814 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,854 ready_for_fw is high
1,362,854 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,828 >>> mbox cmd response: success
3,002,252 UART:
3,002,268 UART: Running Caliptra FMC ...
3,002,676 UART:
3,002,819 UART: [state] CFI Enabled
3,013,330 UART: [fht] FMC Alias Private Key: 7
3,121,877 UART: [art] Extend RT PCRs Done
3,122,305 UART: [art] Lock RT PCRs Done
3,123,711 UART: [art] Populate DV Done
3,132,158 UART: [fht] FMC Alias Private Key: 7
3,133,110 UART: [art] Derive CDI
3,133,390 UART: [art] Store in in slot 0x4
3,219,459 UART: [art] Derive Key Pair
3,219,819 UART: [art] Store priv key in slot 0x5
3,232,713 UART: [art] Derive Key Pair - Done
3,247,248 UART: [art] Signing Cert with AUTHO
3,247,728 UART: RITY.KEYID = 7
3,262,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,303 UART: [art] PUB.X = 570EEDE83C622C94EAB1C7DAC16EA7C1048C76961DB43D97BA91C4A6FAE3B428C25A02208276712834E4AE1FFEF9D22C
3,270,080 UART: [art] PUB.Y = 5EC601EE44C477F07501083BA87F83FEA059855840B9BBA1049556F2EE8E1A6C7C570BF46DF298FF404283D959EEB07E
3,277,021 UART: [art] SIG.R = 0C6B33AD007104BDBC65F543CCB407462F5A2856D5057799FEB3F7644F83AD3138ECA2F1E64CDAEED724B6BB93DC9CF8
3,283,775 UART: [art] SIG.S = 81983430CFEF0D345DA5EE83278B00306DCA0A524D25F518CF3A8312D563DAB94CB1E3C7E24B52B266A861B23395CA0D
3,307,707 UART: Caliptra RT
3,308,053 UART: [state] CFI Enabled
3,416,699 UART: [rt] RT listening for mailbox commands...
3,417,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,974 UART: [rt]cmd =0x46504c54, len=4
3,448,078 >>> mbox cmd response data (8 bytes)
3,448,411 UART: [rt] FIPS self test
3,448,739 UART: [kat] ++
3,448,891 UART: [kat] sha1
3,453,193 UART: [kat] SHA2-256
3,455,215 UART: [kat] SHA2-384
3,458,242 UART: [kat] SHA2-512-ACC
3,458,902 UART: Fatal Error: 0x90050001
3,460,452 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,460,457 >>> mbox cmd response: failed
3,460,457 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,460,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,216 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
917,780 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,433 UART: [cold-reset] ++
1,171,905 UART: [fht] FHT @ 0x50003400
1,174,590 UART: [idev] ++
1,174,758 UART: [idev] CDI.KEYID = 6
1,175,118 UART: [idev] SUBJECT.KEYID = 7
1,175,542 UART: [idev] UDS.KEYID = 0
1,175,887 ready_for_fw is high
1,175,887 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,503 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,482 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,957 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,840 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,771 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,014 >>> mbox cmd response: success
2,786,144 UART: [afmc] ++
2,786,312 UART: [afmc] CDI.KEYID = 6
2,786,674 UART: [afmc] SUBJECT.KEYID = 7
2,787,099 UART: [afmc] AUTHORITY.KEYID = 5
2,822,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,005 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,275 UART: [afmc] --
2,866,243 UART: [cold-reset] --
2,867,033 UART: [state] Locking Datavault
2,868,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,728 UART: [state] Locking ICCM
2,869,342 UART: [exit] Launching FMC @ 0x40000130
2,874,671 UART:
2,874,687 UART: Running Caliptra FMC ...
2,875,095 UART:
2,875,149 UART: [state] CFI Enabled
2,885,856 UART: [fht] FMC Alias Private Key: 7
2,993,919 UART: [art] Extend RT PCRs Done
2,994,347 UART: [art] Lock RT PCRs Done
2,996,107 UART: [art] Populate DV Done
3,004,458 UART: [fht] FMC Alias Private Key: 7
3,005,486 UART: [art] Derive CDI
3,005,766 UART: [art] Store in in slot 0x4
3,091,383 UART: [art] Derive Key Pair
3,091,743 UART: [art] Store priv key in slot 0x5
3,104,115 UART: [art] Derive Key Pair - Done
3,119,116 UART: [art] Signing Cert with AUTHO
3,119,596 UART: RITY.KEYID = 7
3,134,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,959 UART: [art] PUB.X = DAEA8E19C57D321F5EED992BB2D428880854DEB9C4112A53AD54858FA8EBB864CB17CA481948A98A6271A8A6CC8365BB
3,141,740 UART: [art] PUB.Y = 83B5024CBEE32399A6CC209CA911800C2ADD548687C333AC595CC1837D0152FDB63793104D6275931D8FCC20943882A2
3,148,677 UART: [art] SIG.R = 78E6A0C697F4669A68E09CCCAB9CE2F3943AFAA0F4EBB3595AAE5FC38AA17C094AA0184C3433DDC9267877238067B468
3,155,456 UART: [art] SIG.S = 51D813A870B75F66A3DD4CF4E3972661628FAED0E6DA270E7F2A25149EA36A4DFFAEDC631F7D410A9E50D22FFB0EEC4E
3,179,362 UART: Caliptra RT
3,179,616 UART: [state] CFI Enabled
3,287,974 UART: [rt] RT listening for mailbox commands...
3,288,637 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,439 UART: [rt]cmd =0x46504c54, len=4
3,319,493 >>> mbox cmd response data (8 bytes)
3,319,676 UART: [rt] FIPS self test
3,320,004 UART: [kat] ++
3,320,156 UART: [kat] sha1
3,324,368 UART: [kat] SHA2-256
3,326,390 UART: [kat] SHA2-384
3,329,089 UART: [kat] SHA2-512-ACC
3,329,649 UART: Fatal Error: 0x90050001
3,331,199 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,331,204 >>> mbox cmd response: failed
3,331,204 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,331,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
893,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,671 UART: [kat] ++
897,823 UART: [kat] sha1
902,139 UART: [kat] SHA2-256
904,079 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
923,126 UART: [kat] LMS
1,171,454 UART: [kat] --
1,172,261 UART: [cold-reset] ++
1,172,599 UART: [fht] FHT @ 0x50003400
1,175,164 UART: [idev] ++
1,175,332 UART: [idev] CDI.KEYID = 6
1,175,692 UART: [idev] SUBJECT.KEYID = 7
1,176,116 UART: [idev] UDS.KEYID = 0
1,176,461 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,595 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,574 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,391 UART: [ldev] --
1,280,680 UART: [fwproc] Wait for Commands...
1,281,442 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,529 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,760 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,039 ready_for_fw is high
1,060,039 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,451 >>> mbox cmd response: success
2,699,635 UART:
2,699,651 UART: Running Caliptra FMC ...
2,700,059 UART:
2,700,113 UART: [state] CFI Enabled
2,710,406 UART: [fht] FMC Alias Private Key: 7
2,817,697 UART: [art] Extend RT PCRs Done
2,818,125 UART: [art] Lock RT PCRs Done
2,819,735 UART: [art] Populate DV Done
2,828,028 UART: [fht] FMC Alias Private Key: 7
2,829,034 UART: [art] Derive CDI
2,829,314 UART: [art] Store in in slot 0x4
2,914,877 UART: [art] Derive Key Pair
2,915,237 UART: [art] Store priv key in slot 0x5
2,928,625 UART: [art] Derive Key Pair - Done
2,943,685 UART: [art] Signing Cert with AUTHO
2,944,165 UART: RITY.KEYID = 7
2,959,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,802 UART: [art] PUB.X = B094D73B35962829559A993F078AFDDFACFA5E571D3814862CA057887134F263D256E11A1DA7B6B70919D1129BB388FF
2,966,566 UART: [art] PUB.Y = F9E858521F350049643F62FFE0EDB2451265EAFE03881074B9D1321C2AB7EF94FF6EB584E9C05AE041E1312F06760567
2,973,485 UART: [art] SIG.R = EBFB5467FC19D5DAA5BFE66243EC5E2AAE7532991E55ED38C6AD28773EEDF481831375A2F601145B57F12D2081A92811
2,980,260 UART: [art] SIG.S = 1FA0E28A529D8BFD77D5C1510CEF9EBD2A512E894D47168F47D90ABB4C54D03BD506E3867469D94CAF08FFAC361E486C
3,004,225 UART: Caliptra RT
3,004,479 UART: [state] CFI Enabled
3,112,029 UART: [rt] RT listening for mailbox commands...
3,112,692 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,204 UART: [rt]cmd =0x46504c54, len=4
3,143,218 >>> mbox cmd response data (8 bytes)
3,143,351 UART: [rt] FIPS self test
3,143,679 UART: [kat] ++
3,143,831 UART: [kat] sha1
3,148,217 UART: [kat] SHA2-256
3,150,239 UART: [kat] SHA2-384
3,153,018 UART: [kat] SHA2-512-ACC
3,153,606 UART: Fatal Error: 0x90050001
3,155,156 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,161 >>> mbox cmd response: failed
3,155,161 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,771 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,071 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
893,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,916 UART: [kat] ++
898,068 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
907,173 UART: [kat] SHA2-512-ACC
909,074 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,044 UART: [cold-reset] ++
1,172,508 UART: [fht] FHT @ 0x50003400
1,175,081 UART: [idev] ++
1,175,249 UART: [idev] CDI.KEYID = 6
1,175,609 UART: [idev] SUBJECT.KEYID = 7
1,176,033 UART: [idev] UDS.KEYID = 0
1,176,378 ready_for_fw is high
1,176,378 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,969 UART: [idev] Erasing UDS.KEYID = 0
1,200,508 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,328 UART: [ldev] ++
1,210,496 UART: [ldev] CDI.KEYID = 6
1,210,859 UART: [ldev] SUBJECT.KEYID = 5
1,211,285 UART: [ldev] AUTHORITY.KEYID = 7
1,211,748 UART: [ldev] FE.KEYID = 1
1,217,054 UART: [ldev] Erasing FE.KEYID = 1
1,243,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,420 UART: [ldev] --
1,282,741 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,864 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,953 >>> mbox cmd response: success
2,785,965 UART: [afmc] ++
2,786,133 UART: [afmc] CDI.KEYID = 6
2,786,495 UART: [afmc] SUBJECT.KEYID = 7
2,786,920 UART: [afmc] AUTHORITY.KEYID = 5
2,822,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,558 UART: [afmc] --
2,865,556 UART: [cold-reset] --
2,866,310 UART: [state] Locking Datavault
2,867,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,095 UART: [state] Locking ICCM
2,868,671 UART: [exit] Launching FMC @ 0x40000130
2,874,000 UART:
2,874,016 UART: Running Caliptra FMC ...
2,874,424 UART:
2,874,567 UART: [state] CFI Enabled
2,884,986 UART: [fht] FMC Alias Private Key: 7
2,993,041 UART: [art] Extend RT PCRs Done
2,993,469 UART: [art] Lock RT PCRs Done
2,995,315 UART: [art] Populate DV Done
3,003,416 UART: [fht] FMC Alias Private Key: 7
3,004,558 UART: [art] Derive CDI
3,004,838 UART: [art] Store in in slot 0x4
3,090,701 UART: [art] Derive Key Pair
3,091,061 UART: [art] Store priv key in slot 0x5
3,104,177 UART: [art] Derive Key Pair - Done
3,119,156 UART: [art] Signing Cert with AUTHO
3,119,636 UART: RITY.KEYID = 7
3,134,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,475 UART: [art] PUB.X = ED7ECBB3D5EC41B9C759B81FE9E9CFCAC689D9F33643FA5C9F2F4990235B288ADF41B5FD18072A0A93BC4A87DD220927
3,142,256 UART: [art] PUB.Y = 0FD21C392F44F87E95AB3C697B860A753C8953EECAA5D696BE3212BC59F95DC1517AAE590236A46DEE4A1A3D547CCB2F
3,149,213 UART: [art] SIG.R = 8ECB03FE689C66142D7989360689FB95D3C527BD202CF8F25EAF49680BA043CE7DCB58CF78F8E240FCEBFDEEA2EB01D1
3,155,993 UART: [art] SIG.S = 3301861DF79DC4AF49137FD5E4309CED317511590C8983083ECEF81F34170D0CB44D46E9ECC31D076575161E32A46773
3,179,840 UART: Caliptra RT
3,180,186 UART: [state] CFI Enabled
3,287,850 UART: [rt] RT listening for mailbox commands...
3,288,513 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,977 UART: [rt]cmd =0x46504c54, len=4
3,318,901 >>> mbox cmd response data (8 bytes)
3,319,016 UART: [rt] FIPS self test
3,319,344 UART: [kat] ++
3,319,496 UART: [kat] sha1
3,323,580 UART: [kat] SHA2-256
3,325,602 UART: [kat] SHA2-384
3,328,445 UART: [kat] SHA2-512-ACC
3,328,975 UART: Fatal Error: 0x90050001
3,330,525 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,330,530 >>> mbox cmd response: failed
3,330,530 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,330,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,263 UART: [kat] LMS
1,171,591 UART: [kat] --
1,172,242 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,271 UART: [idev] ++
1,175,439 UART: [idev] CDI.KEYID = 6
1,175,799 UART: [idev] SUBJECT.KEYID = 7
1,176,223 UART: [idev] UDS.KEYID = 0
1,176,568 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,247 UART: [idev] Erasing UDS.KEYID = 0
1,201,708 UART: [idev] Sha1 KeyId Algorithm
1,210,288 UART: [idev] --
1,211,388 UART: [ldev] ++
1,211,556 UART: [ldev] CDI.KEYID = 6
1,211,919 UART: [ldev] SUBJECT.KEYID = 5
1,212,345 UART: [ldev] AUTHORITY.KEYID = 7
1,212,808 UART: [ldev] FE.KEYID = 1
1,218,286 UART: [ldev] Erasing FE.KEYID = 1
1,244,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,928 UART: [ldev] --
1,284,289 UART: [fwproc] Wait for Commands...
1,284,955 UART: [fwproc] Recv command 0x46574c44
1,285,683 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,790 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,897 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 ready_for_fw is high
1,060,940 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,380 >>> mbox cmd response: success
2,699,334 UART:
2,699,350 UART: Running Caliptra FMC ...
2,699,758 UART:
2,699,901 UART: [state] CFI Enabled
2,710,852 UART: [fht] FMC Alias Private Key: 7
2,819,283 UART: [art] Extend RT PCRs Done
2,819,711 UART: [art] Lock RT PCRs Done
2,821,421 UART: [art] Populate DV Done
2,829,470 UART: [fht] FMC Alias Private Key: 7
2,830,592 UART: [art] Derive CDI
2,830,872 UART: [art] Store in in slot 0x4
2,916,747 UART: [art] Derive Key Pair
2,917,107 UART: [art] Store priv key in slot 0x5
2,930,723 UART: [art] Derive Key Pair - Done
2,945,579 UART: [art] Signing Cert with AUTHO
2,946,059 UART: RITY.KEYID = 7
2,960,993 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,758 UART: [art] PUB.X = A58CE77C08B233482D8BE5D3967CBD4ED79BBFC5F309D07068D56B36418E0064D76283346DB0E725EB5528A72917075B
2,968,497 UART: [art] PUB.Y = 3AD63401CDB224CC90F96B7E5464DAE21F16A5C46BC038C146C0F9130F192FDE9318BC99F6A8B81200693EF3F4FA265F
2,975,429 UART: [art] SIG.R = 3959EA02B753E05C8E66B3D00D2745B2918AEFA195BD4F2F675EFCA8FDE0228B4989759AA35001506810A8AB07234C6F
2,982,191 UART: [art] SIG.S = BC9B705F984B26CA9C3F54E61BF5802E1A4AC9E7370A2F40233E7DB0F9554B106B5D8FCAF76BCA120FF474278DB7CF25
3,005,482 UART: Caliptra RT
3,005,828 UART: [state] CFI Enabled
3,114,080 UART: [rt] RT listening for mailbox commands...
3,114,743 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,223 UART: [rt]cmd =0x46504c54, len=4
3,145,407 >>> mbox cmd response data (8 bytes)
3,145,620 UART: [rt] FIPS self test
3,145,948 UART: [kat] ++
3,146,100 UART: [kat] sha1
3,150,298 UART: [kat] SHA2-256
3,152,320 UART: [kat] SHA2-384
3,155,187 UART: [kat] SHA2-512-ACC
3,155,905 UART: Fatal Error: 0x90050001
3,157,455 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,460 >>> mbox cmd response: failed
3,157,460 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,848 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,608 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 ready_for_fw is high
1,174,173 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,643 UART: [idev] Erasing UDS.KEYID = 0
1,197,765 UART: [idev] Sha1 KeyId Algorithm
1,206,629 UART: [idev] --
1,207,868 UART: [ldev] ++
1,208,036 UART: [ldev] CDI.KEYID = 6
1,208,400 UART: [ldev] SUBJECT.KEYID = 5
1,208,827 UART: [ldev] AUTHORITY.KEYID = 7
1,209,290 UART: [ldev] FE.KEYID = 1
1,214,416 UART: [ldev] Erasing FE.KEYID = 1
1,240,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,244 UART: [ldev] --
1,279,674 UART: [fwproc] Wait for Commands...
1,280,353 UART: [fwproc] Recv command 0x46574c44
1,281,086 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,574 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,782,648 >>> mbox cmd response: success
2,783,913 UART: [afmc] ++
2,784,081 UART: [afmc] CDI.KEYID = 6
2,784,444 UART: [afmc] SUBJECT.KEYID = 7
2,784,870 UART: [afmc] AUTHORITY.KEYID = 5
2,820,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,899 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,782 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,501 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,176 UART: [afmc] --
2,864,138 UART: [cold-reset] --
2,865,012 UART: [state] Locking Datavault
2,865,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,503 UART: [state] Locking ICCM
2,867,001 UART: [exit] Launching FMC @ 0x40000130
2,872,330 UART:
2,872,346 UART: Running Caliptra FMC ...
2,872,754 UART:
2,872,808 UART: [state] CFI Enabled
2,883,155 UART: [fht] FMC Alias Private Key: 7
2,991,388 UART: [art] Extend RT PCRs Done
2,991,816 UART: [art] Lock RT PCRs Done
2,993,120 UART: [art] Populate DV Done
3,001,311 UART: [fht] FMC Alias Private Key: 7
3,002,347 UART: [art] Derive CDI
3,002,627 UART: [art] Store in in slot 0x4
3,088,754 UART: [art] Derive Key Pair
3,089,114 UART: [art] Store priv key in slot 0x5
3,102,442 UART: [art] Derive Key Pair - Done
3,117,196 UART: [art] Signing Cert with AUTHO
3,117,676 UART: RITY.KEYID = 7
3,132,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,295 UART: [art] PUB.X = 29B0BB4C8EC03D82E709F7CC08AFCD591BF5470D4A11D94126A224C3711AAE915B0B161B88CA696BCD645A69C9A9F759
3,140,065 UART: [art] PUB.Y = DC0CF68EAD5CCA1835755097ED4E2F1BCC3F9E6C4FA51FC1C2A7730733E09BDC9D6DEFFFCB500BE90038ECB8C7B657F7
3,147,014 UART: [art] SIG.R = 298750AC9DD547224AE3055220406AA1F563A6E536FE10EF58549F301A50CBBC6B182E8C7CA426808F0B907FAF9FAA98
3,153,784 UART: [art] SIG.S = B471ED28184EAC108926AD1A7BC10463FF2D3F0889C4CDB88138FCF32E18BA9F2E6CBA2C6DDFD897A02180788B077409
3,176,767 UART: Caliptra RT
3,177,021 UART: [state] CFI Enabled
3,284,163 UART: [rt] RT listening for mailbox commands...
3,284,826 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,428 UART: [rt]cmd =0x46504c54, len=4
3,315,640 >>> mbox cmd response data (8 bytes)
3,315,849 UART: [rt] FIPS self test
3,316,177 UART: [kat] ++
3,316,329 UART: [kat] sha1
3,320,673 UART: [kat] SHA2-256
3,322,695 UART: [kat] SHA2-384
3,325,712 UART: [kat] SHA2-512-ACC
3,326,218 UART: Fatal Error: 0x90050001
3,327,768 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,773 >>> mbox cmd response: failed
3,327,773 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,327,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
915,586 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,265 UART: [cold-reset] ++
1,169,711 UART: [fht] FHT @ 0x50003400
1,172,277 UART: [idev] ++
1,172,445 UART: [idev] CDI.KEYID = 6
1,172,806 UART: [idev] SUBJECT.KEYID = 7
1,173,231 UART: [idev] UDS.KEYID = 0
1,173,577 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,175 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,314 UART: [ldev] ++
1,208,482 UART: [ldev] CDI.KEYID = 6
1,208,846 UART: [ldev] SUBJECT.KEYID = 5
1,209,273 UART: [ldev] AUTHORITY.KEYID = 7
1,209,736 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,222 UART: [ldev] --
1,280,726 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,320 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,430 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,022 ready_for_fw is high
1,055,022 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,772 >>> mbox cmd response: success
2,694,856 UART:
2,694,872 UART: Running Caliptra FMC ...
2,695,280 UART:
2,695,334 UART: [state] CFI Enabled
2,705,605 UART: [fht] FMC Alias Private Key: 7
2,813,670 UART: [art] Extend RT PCRs Done
2,814,098 UART: [art] Lock RT PCRs Done
2,815,774 UART: [art] Populate DV Done
2,823,851 UART: [fht] FMC Alias Private Key: 7
2,824,969 UART: [art] Derive CDI
2,825,249 UART: [art] Store in in slot 0x4
2,911,142 UART: [art] Derive Key Pair
2,911,502 UART: [art] Store priv key in slot 0x5
2,924,090 UART: [art] Derive Key Pair - Done
2,938,651 UART: [art] Signing Cert with AUTHO
2,939,131 UART: RITY.KEYID = 7
2,954,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,124 UART: [art] PUB.X = 3F8C3C648DFD67DCEF2CCA6FEE21EC169AC497F85927E6C2B68F52D4F3E358496CD7E43AE98A60AF09116B2929F12AC2
2,961,909 UART: [art] PUB.Y = DA9143AA1B2856287A0AFB6B8FAF36AB57C23F56F02BDAAA62950A1783C34156FDEEFE7C4D167B65AE07D3C90804D5DA
2,968,864 UART: [art] SIG.R = F5516B21A6D08B9F91CFA0C62132FEC6E0E02FCE2A2D5F48D34EDA28E4BE4FA0B73B157619348EFE1EDC7630D37054D4
2,975,652 UART: [art] SIG.S = 944A3669338BE63CBE13A233B2C866F4CCD5FF1E0C3139F8E0E2C0F02578B7B341CE14F513C414032E1229BAED08C704
2,999,795 UART: Caliptra RT
3,000,049 UART: [state] CFI Enabled
3,107,802 UART: [rt] RT listening for mailbox commands...
3,108,465 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,971 UART: [rt]cmd =0x46504c54, len=4
3,138,977 >>> mbox cmd response data (8 bytes)
3,139,322 UART: [rt] FIPS self test
3,139,650 UART: [kat] ++
3,139,802 UART: [kat] sha1
3,143,948 UART: [kat] SHA2-256
3,145,970 UART: [kat] SHA2-384
3,148,741 UART: [kat] SHA2-512-ACC
3,149,471 UART: Fatal Error: 0x90050001
3,151,021 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,026 >>> mbox cmd response: failed
3,151,026 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,151,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,800 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,770 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,704 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,726 UART: [idev] ++
1,172,894 UART: [idev] CDI.KEYID = 6
1,173,255 UART: [idev] SUBJECT.KEYID = 7
1,173,680 UART: [idev] UDS.KEYID = 0
1,174,026 ready_for_fw is high
1,174,026 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,706 UART: [idev] --
1,208,769 UART: [ldev] ++
1,208,937 UART: [ldev] CDI.KEYID = 6
1,209,301 UART: [ldev] SUBJECT.KEYID = 5
1,209,728 UART: [ldev] AUTHORITY.KEYID = 7
1,210,191 UART: [ldev] FE.KEYID = 1
1,215,027 UART: [ldev] Erasing FE.KEYID = 1
1,241,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,017 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,145 >>> mbox cmd response: success
2,785,182 UART: [afmc] ++
2,785,350 UART: [afmc] CDI.KEYID = 6
2,785,713 UART: [afmc] SUBJECT.KEYID = 7
2,786,139 UART: [afmc] AUTHORITY.KEYID = 5
2,821,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,156 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,967 UART: [afmc] --
2,864,847 UART: [cold-reset] --
2,865,469 UART: [state] Locking Datavault
2,866,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,128 UART: [state] Locking ICCM
2,867,574 UART: [exit] Launching FMC @ 0x40000130
2,872,903 UART:
2,872,919 UART: Running Caliptra FMC ...
2,873,327 UART:
2,873,470 UART: [state] CFI Enabled
2,884,143 UART: [fht] FMC Alias Private Key: 7
2,992,400 UART: [art] Extend RT PCRs Done
2,992,828 UART: [art] Lock RT PCRs Done
2,994,264 UART: [art] Populate DV Done
3,002,225 UART: [fht] FMC Alias Private Key: 7
3,003,327 UART: [art] Derive CDI
3,003,607 UART: [art] Store in in slot 0x4
3,088,918 UART: [art] Derive Key Pair
3,089,278 UART: [art] Store priv key in slot 0x5
3,101,804 UART: [art] Derive Key Pair - Done
3,116,387 UART: [art] Signing Cert with AUTHO
3,116,867 UART: RITY.KEYID = 7
3,132,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,962 UART: [art] PUB.X = 6945DD7EBB808C4EDEC59B9B7F860543BDFF0E5B574A6764E852E8CE22244109EA5D42C32EBC671E36634D71AB957A72
3,139,733 UART: [art] PUB.Y = 2140902641E5319CF23599B6D9FD71E95B733A3307DB840A4B2F05E6DA0509C8897FEAD942233D01A662F5F015E95A1A
3,146,663 UART: [art] SIG.R = 3DF0D1D0B77E7821A50067E9DB1454E979C03CBD59A3BF9F415AB5C55B7B012C5D19835EA58C547CA10EA41CD58D3F69
3,153,417 UART: [art] SIG.S = 5B5206203B09E3DB837075C8BB008A7C77C46C702C29455FE9694A94CC7EEB0348F8A724C3EF47F4B251219308A37F41
3,177,102 UART: Caliptra RT
3,177,448 UART: [state] CFI Enabled
3,285,714 UART: [rt] RT listening for mailbox commands...
3,286,377 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,923 UART: [rt]cmd =0x46504c54, len=4
3,317,025 >>> mbox cmd response data (8 bytes)
3,317,378 UART: [rt] FIPS self test
3,317,706 UART: [kat] ++
3,317,858 UART: [kat] sha1
3,321,946 UART: [kat] SHA2-256
3,323,968 UART: [kat] SHA2-384
3,326,631 UART: [kat] SHA2-512-ACC
3,327,191 UART: Fatal Error: 0x90050001
3,328,741 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,746 >>> mbox cmd response: failed
3,328,746 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,509 UART: [kat] LMS
1,169,821 UART: [kat] --
1,170,776 UART: [cold-reset] ++
1,171,228 UART: [fht] FHT @ 0x50003400
1,174,088 UART: [idev] ++
1,174,256 UART: [idev] CDI.KEYID = 6
1,174,617 UART: [idev] SUBJECT.KEYID = 7
1,175,042 UART: [idev] UDS.KEYID = 0
1,175,388 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,263 UART: [fwproc] Wait for Commands...
1,283,008 UART: [fwproc] Recv command 0x46574c44
1,283,741 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,825 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,069 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,123 ready_for_fw is high
1,057,123 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,285 >>> mbox cmd response: success
2,697,573 UART:
2,697,589 UART: Running Caliptra FMC ...
2,697,997 UART:
2,698,140 UART: [state] CFI Enabled
2,708,907 UART: [fht] FMC Alias Private Key: 7
2,817,246 UART: [art] Extend RT PCRs Done
2,817,674 UART: [art] Lock RT PCRs Done
2,819,152 UART: [art] Populate DV Done
2,827,333 UART: [fht] FMC Alias Private Key: 7
2,828,455 UART: [art] Derive CDI
2,828,735 UART: [art] Store in in slot 0x4
2,914,748 UART: [art] Derive Key Pair
2,915,108 UART: [art] Store priv key in slot 0x5
2,928,114 UART: [art] Derive Key Pair - Done
2,942,859 UART: [art] Signing Cert with AUTHO
2,943,339 UART: RITY.KEYID = 7
2,958,359 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,124 UART: [art] PUB.X = 601965BAC7CB5E659DB85227584926C8692D4618D1C659C71902A5540F24161058DB18B764ED9C976AE818AD84A219FE
2,965,882 UART: [art] PUB.Y = E0766FFBAF1FFC583E2250A54E117DAD788FB5274F5F9CBD82CBF9D53C5020770F00CA76C009226052CE50E72B4DB6D7
2,972,818 UART: [art] SIG.R = E8E9C06B1686D380A54C32D5F37ABE6EC457B25F7E0EFBE29C9AC34073F958A01A469BFBDC0BD4EC6E83A1B69121A6C7
2,979,602 UART: [art] SIG.S = BAFF08261B74C2D39C933E10F985CD5D128DADDA6DEFB65A2A410FB4DC9F48F11D3D865F1EBBF8C34F531AE3BDBF167B
3,003,257 UART: Caliptra RT
3,003,603 UART: [state] CFI Enabled
3,112,024 UART: [rt] RT listening for mailbox commands...
3,112,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,301 UART: [rt]cmd =0x46504c54, len=4
3,143,295 >>> mbox cmd response data (8 bytes)
3,143,448 UART: [rt] FIPS self test
3,143,776 UART: [kat] ++
3,143,928 UART: [kat] sha1
3,148,306 UART: [kat] SHA2-256
3,150,328 UART: [kat] SHA2-384
3,153,125 UART: [kat] SHA2-512-ACC
3,153,671 UART: Fatal Error: 0x90050001
3,155,221 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,226 >>> mbox cmd response: failed
3,155,226 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,639 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,569 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
2,676,474 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,821,119 >>> mbox cmd response: failed
2,821,717 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,964,942 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,872,553 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,464,810 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,687,495 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,832,288 >>> mbox cmd response: failed
2,833,089 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,976,323 >>> mbox cmd response: failed
Initializing fuses
995 writing to cptra_bootfsm_go
4,867,361 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,436,809 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,034,619 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,178,550 >>> mbox cmd response: failed
3,179,110 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,322,315 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
21,575,948 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,021,196 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,038,041 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,182,119 >>> mbox cmd response: failed
3,182,690 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,325,753 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
21,585,641 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,012,061 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,694,275 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,838,789 >>> mbox cmd response: failed
2,839,349 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,982,967 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,442,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,263,304 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,709,082 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,854,196 >>> mbox cmd response: failed
2,854,752 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,998,246 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,450,301 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,307,338 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,701,072 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,845,613 >>> mbox cmd response: failed
2,846,173 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,989,677 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,484,220 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,330,057 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,046,354 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,190,929 >>> mbox cmd response: failed
3,191,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,335,350 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,175,977 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,881,171 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,057,419 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,201,935 >>> mbox cmd response: failed
3,202,522 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,346,104 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,188,502 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,921,023 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,136 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,144 >>> mbox cmd response: failed
809,144 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,193 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,488 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,800 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,808 >>> mbox cmd response: failed
809,808 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,873 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,516 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,755 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,763 >>> mbox cmd response: failed
809,763 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,652 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,105 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,737 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,745 >>> mbox cmd response: failed
809,745 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,142 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,023 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,168 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
810,176 >>> mbox cmd response: failed
810,176 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
810,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,939 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,796 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,288 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,296 >>> mbox cmd response: failed
809,296 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,217 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,642 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,913 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,921 >>> mbox cmd response: failed
809,921 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,106 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,543 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
810,391 >>> mbox cmd response: failed
810,391 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
810,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,483 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,390 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,398 >>> mbox cmd response: failed
809,398 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,653 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,792 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,030 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,038 >>> mbox cmd response: failed
809,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,785 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,550 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,595 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,603 >>> mbox cmd response: failed
809,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,088 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,619 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,519 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,527 >>> mbox cmd response: failed
809,527 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
809,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,811 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
192,065 UART:
192,435 UART: Running Caliptra ROM ...
193,618 UART:
193,770 UART: [state] CFI Enabled
262,004 UART: [state] LifecycleState = Unprovisioned
263,916 UART: [state] DebugLocked = No
266,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,031 UART: [kat] SHA2-256
441,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,258 UART: [kat] ++
452,757 UART: [kat] sha1
463,495 UART: [kat] SHA2-256
466,161 UART: [kat] SHA2-384
471,658 UART: [kat] SHA2-512-ACC
474,028 UART: [kat] ECC-384
2,768,552 UART: [kat] HMAC-384Kdf
2,800,194 UART: [kat] LMS
3,990,485 UART: [kat] --
3,994,858 UART: [cold-reset] ++
3,997,436 UART: [fht] Storing FHT @ 0x50003400
4,009,645 UART: [idev] ++
4,010,228 UART: [idev] CDI.KEYID = 6
4,011,298 UART: [idev] SUBJECT.KEYID = 7
4,012,409 UART: [idev] UDS.KEYID = 0
4,013,454 ready_for_fw is high
4,013,666 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,158,243 UART: [idev] Erasing UDS.KEYID = 0
7,347,351 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,216 UART: [idev] --
7,373,859 UART: [ldev] ++
7,374,430 UART: [ldev] CDI.KEYID = 6
7,375,404 UART: [ldev] SUBJECT.KEYID = 5
7,376,625 UART: [ldev] AUTHORITY.KEYID = 7
7,377,860 UART: [ldev] FE.KEYID = 1
7,422,437 UART: [ldev] Erasing FE.KEYID = 1
10,753,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,557 UART: [ldev] --
13,119,095 UART: [fwproc] Waiting for Commands...
13,121,469 UART: [fwproc] Received command 0x46574c44
13,123,657 UART: [fwproc] Received Image of size 114916 bytes
17,176,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,289 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,645,994 >>> mbox cmd response: success
17,649,314 UART: [afmc] ++
17,649,906 UART: [afmc] CDI.KEYID = 6
17,650,816 UART: [afmc] SUBJECT.KEYID = 7
17,652,090 UART: [afmc] AUTHORITY.KEYID = 5
21,011,004 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,292 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,552 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,970 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,787 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,214 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,240 UART: [afmc] --
23,382,208 UART: [cold-reset] --
23,385,954 UART: [state] Locking Datavault
23,392,224 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,975 UART: [state] Locking ICCM
23,395,017 UART: [exit] Launching FMC @ 0x40000130
23,403,414 UART:
23,403,658 UART: Running Caliptra FMC ...
23,404,762 UART:
23,404,916 UART: [state] CFI Enabled
23,471,012 UART: [fht] FMC Alias Private Key: 7
25,808,829 UART: [art] Extend RT PCRs Done
25,810,045 UART: [art] Lock RT PCRs Done
25,811,809 UART: [art] Populate DV Done
25,817,327 UART: [fht] FMC Alias Private Key: 7
25,818,917 UART: [art] Derive CDI
25,819,731 UART: [art] Store in in slot 0x4
25,879,908 UART: [art] Derive Key Pair
25,880,911 UART: [art] Store priv key in slot 0x5
29,174,093 UART: [art] Derive Key Pair - Done
29,187,145 UART: [art] Signing Cert with AUTHO
29,188,446 UART: RITY.KEYID = 7
31,474,866 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,379 UART: [art] PUB.X = 097C05960E39DC72F42ECBA35330617E0D0FF405C5D551846A8C3BAA24C87C07B9D23CCC35D74DA0CA9E174436E3F918
31,483,634 UART: [art] PUB.Y = 0259C4EE4A65D726AA46191FA7C1643A39C730DB51C3740773645EC976ABBBCD3A02F29AC1B38A9F50B79624FC0A236A
31,490,865 UART: [art] SIG.R = FA47AC3EA0A0B7A4A13D7AEF69B05023C1603311B4A553F0E5A8401C59BEAD2BABB6A29E5A3E11E9F904FDD823188046
31,498,318 UART: [art] SIG.S = 8A403EFD9CC45B1FCC4DD7DF4FA0E317CE489F511ECABBEE689DE4AD41FFA7DF118A69D480AAA42DD23368E85377EBD9
32,803,405 UART: Caliptra RT
32,804,114 UART: [state] CFI Enabled
32,963,927 UART: [rt] RT listening for mailbox commands...
32,965,781 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,995,734 UART: [rt]cmd =0x46504c54, len=4
32,997,313 >>> mbox cmd response data (8 bytes)
32,998,284 UART: [rt] FIPS self test
32,999,225 UART: [kat] ++
32,999,679 UART: [kat] sha1
33,004,076 UART: [kat] SHA2-256
33,005,986 UART: [kat] SHA2-384
33,007,105 UART: Fatal Error: 0x90020001
33,042,329 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,186,723 >>> mbox cmd response: failed
33,187,366 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,331,705 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,112 UART:
190,424 UART: Running Caliptra ROM ...
191,542 UART:
191,692 UART: [state] CFI Enabled
255,166 UART: [state] LifecycleState = Unprovisioned
257,139 UART: [state] DebugLocked = No
259,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,146 UART: [kat] SHA2-256
432,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,385 UART: [kat] ++
443,911 UART: [kat] sha1
456,093 UART: [kat] SHA2-256
458,782 UART: [kat] SHA2-384
465,210 UART: [kat] SHA2-512-ACC
467,547 UART: [kat] ECC-384
2,755,952 UART: [kat] HMAC-384Kdf
2,787,569 UART: [kat] LMS
3,977,843 UART: [kat] --
3,982,554 UART: [cold-reset] ++
3,984,163 UART: [fht] Storing FHT @ 0x50003400
3,995,048 UART: [idev] ++
3,995,665 UART: [idev] CDI.KEYID = 6
3,996,558 UART: [idev] SUBJECT.KEYID = 7
3,997,826 UART: [idev] UDS.KEYID = 0
3,999,367 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,143,859 UART: [idev] Erasing UDS.KEYID = 0
7,336,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,960 UART: [idev] --
7,360,610 UART: [ldev] ++
7,361,214 UART: [ldev] CDI.KEYID = 6
7,362,128 UART: [ldev] SUBJECT.KEYID = 5
7,363,346 UART: [ldev] AUTHORITY.KEYID = 7
7,364,638 UART: [ldev] FE.KEYID = 1
7,408,824 UART: [ldev] Erasing FE.KEYID = 1
10,741,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,383 UART: [ldev] --
13,120,502 UART: [fwproc] Waiting for Commands...
13,123,045 UART: [fwproc] Received command 0x46574c44
13,125,238 UART: [fwproc] Received Image of size 114916 bytes
17,190,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,988 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,655,305 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,804,097 ready_for_fw is high
3,804,548 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,884,087 >>> mbox cmd response: success
23,586,463 UART:
23,586,875 UART: Running Caliptra FMC ...
23,587,977 UART:
23,588,129 UART: [state] CFI Enabled
23,657,313 UART: [fht] FMC Alias Private Key: 7
25,995,263 UART: [art] Extend RT PCRs Done
25,996,490 UART: [art] Lock RT PCRs Done
25,997,889 UART: [art] Populate DV Done
26,003,492 UART: [fht] FMC Alias Private Key: 7
26,005,158 UART: [art] Derive CDI
26,005,905 UART: [art] Store in in slot 0x4
26,066,682 UART: [art] Derive Key Pair
26,067,688 UART: [art] Store priv key in slot 0x5
29,360,647 UART: [art] Derive Key Pair - Done
29,373,858 UART: [art] Signing Cert with AUTHO
29,375,169 UART: RITY.KEYID = 7
31,654,927 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,461 UART: [art] PUB.X = EAFC3EBB2DD6D9121C63C67265EC7897871BEE2EC067F4B659EE7A1AC4B00FE173694D08EEBB79ACB230E3526EB5E5C4
31,663,740 UART: [art] PUB.Y = DE7FFFA76574092C468DBD2405892E19BAD10BB77377A2AF5239A4F7A8A1E040723E0D74E45F7508DC227A8F40FD8C18
31,670,995 UART: [art] SIG.R = EF6B8A302CA9CF375D38E43C99A7D739593CD5C020484A1E44291445AB5E9F07CB31F02651B86554700EB8BA65553FC8
31,678,352 UART: [art] SIG.S = 00FE2E38289CFCA48225111FA999D76E7374CA9ED2B652C735F03103EE656968B41FB3FE6CD9E7401435A9E1463798B0
32,983,187 UART: Caliptra RT
32,983,885 UART: [state] CFI Enabled
33,146,572 UART: [rt] RT listening for mailbox commands...
33,148,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,178,147 UART: [rt]cmd =0x46504c54, len=4
33,179,669 >>> mbox cmd response data (8 bytes)
33,180,995 UART: [rt] FIPS self test
33,181,940 UART: [kat] ++
33,182,393 UART: [kat] sha1
33,186,797 UART: [kat] SHA2-256
33,188,672 UART: [kat] SHA2-384
33,189,799 UART: Fatal Error: 0x90020001
33,225,208 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,369,556 >>> mbox cmd response: failed
33,370,155 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,514,317 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,774,216 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,881,965 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,494 UART:
192,848 UART: Running Caliptra ROM ...
194,068 UART:
603,617 UART: [state] CFI Enabled
617,571 UART: [state] LifecycleState = Unprovisioned
619,520 UART: [state] DebugLocked = No
620,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,991 UART: [kat] SHA2-256
795,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,266 UART: [kat] ++
806,749 UART: [kat] sha1
816,560 UART: [kat] SHA2-256
819,286 UART: [kat] SHA2-384
824,788 UART: [kat] SHA2-512-ACC
827,159 UART: [kat] ECC-384
3,110,966 UART: [kat] HMAC-384Kdf
3,121,479 UART: [kat] LMS
4,311,606 UART: [kat] --
4,317,898 UART: [cold-reset] ++
4,319,051 UART: [fht] Storing FHT @ 0x50003400
4,330,918 UART: [idev] ++
4,331,594 UART: [idev] CDI.KEYID = 6
4,332,510 UART: [idev] SUBJECT.KEYID = 7
4,333,691 UART: [idev] UDS.KEYID = 0
4,334,776 ready_for_fw is high
4,335,020 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,479,339 UART: [idev] Erasing UDS.KEYID = 0
7,621,766 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,540 UART: [idev] --
7,647,595 UART: [ldev] ++
7,648,168 UART: [ldev] CDI.KEYID = 6
7,649,127 UART: [ldev] SUBJECT.KEYID = 5
7,650,343 UART: [ldev] AUTHORITY.KEYID = 7
7,651,633 UART: [ldev] FE.KEYID = 1
7,663,113 UART: [ldev] Erasing FE.KEYID = 1
10,949,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,614 UART: [ldev] --
13,308,567 UART: [fwproc] Waiting for Commands...
13,310,883 UART: [fwproc] Received command 0x46574c44
13,313,072 UART: [fwproc] Received Image of size 114916 bytes
17,377,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,849 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,842,579 >>> mbox cmd response: success
17,847,569 UART: [afmc] ++
17,848,192 UART: [afmc] CDI.KEYID = 6
17,849,102 UART: [afmc] SUBJECT.KEYID = 7
17,850,320 UART: [afmc] AUTHORITY.KEYID = 5
21,167,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,603 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,001 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,816 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,231 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,165 UART: [afmc] --
23,531,471 UART: [cold-reset] --
23,535,617 UART: [state] Locking Datavault
23,540,001 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,707 UART: [state] Locking ICCM
23,544,289 UART: [exit] Launching FMC @ 0x40000130
23,552,700 UART:
23,552,948 UART: Running Caliptra FMC ...
23,554,074 UART:
23,554,240 UART: [state] CFI Enabled
23,562,508 UART: [fht] FMC Alias Private Key: 7
25,893,353 UART: [art] Extend RT PCRs Done
25,894,569 UART: [art] Lock RT PCRs Done
25,896,086 UART: [art] Populate DV Done
25,901,229 UART: [fht] FMC Alias Private Key: 7
25,902,937 UART: [art] Derive CDI
25,903,757 UART: [art] Store in in slot 0x4
25,946,136 UART: [art] Derive Key Pair
25,947,175 UART: [art] Store priv key in slot 0x5
29,189,629 UART: [art] Derive Key Pair - Done
29,202,899 UART: [art] Signing Cert with AUTHO
29,204,206 UART: RITY.KEYID = 7
31,483,541 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,067 UART: [art] PUB.X = 7FB51BD79F83CD6059F179D4FFEFBB7E4E31EBC2BC3F9D11E33B872DFC76E4007199247C34656679C625B877411AC57F
31,492,301 UART: [art] PUB.Y = 7F67615F85B6848B25D1045BC62908EB607619CD0DEB4108B6329FCBD97775B58470DB46C8802C1AB766CE44ACF99A14
31,499,547 UART: [art] SIG.R = DACDE832A7BF20BB7CA204820E550523FB0DA5E536F0BD8C67E117F1D6A87A613DB2FF44A5F90611BF246693A61F3A04
31,506,966 UART: [art] SIG.S = 3FD2F1CAD035F06F994DAACAABB94770FE8EDED0F7AD7139A3103AAB7EDBE09385C004926DF076E52DDC662AFA92C8B0
32,812,673 UART: Caliptra RT
32,813,390 UART: [state] CFI Enabled
32,931,102 UART: [rt] RT listening for mailbox commands...
32,932,947 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,962,731 UART: [rt]cmd =0x46504c54, len=4
32,964,308 >>> mbox cmd response data (8 bytes)
32,965,333 UART: [rt] FIPS self test
32,966,243 UART: [kat] ++
32,966,692 UART: [kat] sha1
32,971,174 UART: [kat] SHA2-256
32,973,113 UART: [kat] SHA2-384
32,974,367 UART: Fatal Error: 0x90020001
33,009,573 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,153,907 >>> mbox cmd response: failed
33,154,517 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,298,838 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,092 UART:
190,384 UART: Running Caliptra ROM ...
191,407 UART:
7,243,428 UART: [state] CFI Enabled
7,258,671 UART: [state] LifecycleState = Unprovisioned
7,260,593 UART: [state] DebugLocked = No
7,263,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,268,352 UART: [kat] SHA2-256
7,438,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,448,631 UART: [kat] ++
7,449,176 UART: [kat] sha1
7,461,818 UART: [kat] SHA2-256
7,464,565 UART: [kat] SHA2-384
7,470,281 UART: [kat] SHA2-512-ACC
7,472,641 UART: [kat] ECC-384
9,756,871 UART: [kat] HMAC-384Kdf
9,769,262 UART: [kat] LMS
10,959,374 UART: [kat] --
10,964,673 UART: [cold-reset] ++
10,966,931 UART: [fht] Storing FHT @ 0x50003400
10,977,978 UART: [idev] ++
10,978,605 UART: [idev] CDI.KEYID = 6
10,979,512 UART: [idev] SUBJECT.KEYID = 7
10,980,781 UART: [idev] UDS.KEYID = 0
10,982,307 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,126,576 UART: [idev] Erasing UDS.KEYID = 0
14,269,271 UART: [idev] Using Sha1 for KeyId Algorithm
14,290,934 UART: [idev] --
14,294,222 UART: [ldev] ++
14,294,790 UART: [ldev] CDI.KEYID = 6
14,295,730 UART: [ldev] SUBJECT.KEYID = 5
14,296,996 UART: [ldev] AUTHORITY.KEYID = 7
14,298,228 UART: [ldev] FE.KEYID = 1
14,307,827 UART: [ldev] Erasing FE.KEYID = 1
17,599,688 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,894,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,908,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,923,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,938,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,957,022 UART: [ldev] --
19,962,562 UART: [fwproc] Waiting for Commands...
19,964,933 UART: [fwproc] Received command 0x46574c44
19,967,121 UART: [fwproc] Received Image of size 114916 bytes
24,031,660 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,108,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,177,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,497,580 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,121,986 ready_for_fw is high
4,122,474 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,084,628 >>> mbox cmd response: success
23,720,974 UART:
23,721,364 UART: Running Caliptra FMC ...
23,722,513 UART:
23,722,674 UART: [state] CFI Enabled
23,730,814 UART: [fht] FMC Alias Private Key: 7
26,061,396 UART: [art] Extend RT PCRs Done
26,062,626 UART: [art] Lock RT PCRs Done
26,064,480 UART: [art] Populate DV Done
26,069,999 UART: [fht] FMC Alias Private Key: 7
26,071,731 UART: [art] Derive CDI
26,072,560 UART: [art] Store in in slot 0x4
26,115,231 UART: [art] Derive Key Pair
26,116,235 UART: [art] Store priv key in slot 0x5
29,358,328 UART: [art] Derive Key Pair - Done
29,371,497 UART: [art] Signing Cert with AUTHO
29,372,840 UART: RITY.KEYID = 7
31,652,371 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,891 UART: [art] PUB.X = 7899D9B1B936729C8E3F3BFFCF90EDBF39E9936CB6A50223697720EE64E414D2C2FCFA1F3BD8A9D81E1EDFBD4BCFDFB0
31,661,142 UART: [art] PUB.Y = 85EA5F26595FA32C2BD13FE885F850BA5BADDE9D8BC2022A84742BA94E00A0093302CFF2519706B396B15F955C2F3958
31,668,426 UART: [art] SIG.R = FAFAE655602AA0D54B05FD7FCCAA81D8D8FC601834DF03B3DA17B77BBF40112E1E14545FE3A04FEEBBD2EF9AA05EDA4F
31,675,830 UART: [art] SIG.S = 03E91223ACCD8A732093A1EB41F3CE531201C7BFFBD6B3681C87B3E006E125B7503E045968C8C99203CB4B6DDF5BA0D2
32,981,345 UART: Caliptra RT
32,982,052 UART: [state] CFI Enabled
33,100,807 UART: [rt] RT listening for mailbox commands...
33,102,659 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,132,556 UART: [rt]cmd =0x46504c54, len=4
33,134,167 >>> mbox cmd response data (8 bytes)
33,135,354 UART: [rt] FIPS self test
33,136,309 UART: [kat] ++
33,136,763 UART: [kat] sha1
33,141,219 UART: [kat] SHA2-256
33,143,150 UART: [kat] SHA2-384
33,144,384 UART: Fatal Error: 0x90020001
33,179,603 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,323,977 >>> mbox cmd response: failed
33,324,595 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,468,885 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
10,589,150 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,533,501 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,613 UART:
192,981 UART: Running Caliptra ROM ...
194,138 UART:
194,283 UART: [state] CFI Enabled
261,813 UART: [state] LifecycleState = Unprovisioned
263,719 UART: [state] DebugLocked = No
265,542 UART: [state] WD Timer not started. Device not locked for debugging
268,741 UART: [kat] SHA2-256
447,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,437 UART: [kat] ++
459,974 UART: [kat] sha1
470,149 UART: [kat] SHA2-256
473,166 UART: [kat] SHA2-384
479,745 UART: [kat] SHA2-512-ACC
482,698 UART: [kat] ECC-384
2,949,668 UART: [kat] HMAC-384Kdf
2,971,926 UART: [kat] LMS
3,501,363 UART: [kat] --
3,506,665 UART: [cold-reset] ++
3,508,464 UART: [fht] FHT @ 0x50003400
3,520,160 UART: [idev] ++
3,520,733 UART: [idev] CDI.KEYID = 6
3,521,653 UART: [idev] SUBJECT.KEYID = 7
3,522,827 UART: [idev] UDS.KEYID = 0
3,523,884 ready_for_fw is high
3,524,122 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,669,145 UART: [idev] Erasing UDS.KEYID = 0
6,025,207 UART: [idev] Sha1 KeyId Algorithm
6,048,548 UART: [idev] --
6,051,465 UART: [ldev] ++
6,052,050 UART: [ldev] CDI.KEYID = 6
6,052,938 UART: [ldev] SUBJECT.KEYID = 5
6,054,048 UART: [ldev] AUTHORITY.KEYID = 7
6,055,396 UART: [ldev] FE.KEYID = 1
6,101,349 UART: [ldev] Erasing FE.KEYID = 1
8,606,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,919 UART: [ldev] --
10,415,798 UART: [fwproc] Wait for Commands...
10,417,682 UART: [fwproc] Recv command 0x46574c44
10,419,777 UART: [fwproc] Recv'd Img size: 115224 bytes
13,827,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,876 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,294,309 >>> mbox cmd response: success
14,298,111 UART: [afmc] ++
14,298,699 UART: [afmc] CDI.KEYID = 6
14,299,585 UART: [afmc] SUBJECT.KEYID = 7
14,300,800 UART: [afmc] AUTHORITY.KEYID = 5
16,829,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,120 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,582 UART: [afmc] --
18,627,697 UART: [cold-reset] --
18,630,479 UART: [state] Locking Datavault
18,635,691 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,400 UART: [state] Locking ICCM
18,638,853 UART: [exit] Launching FMC @ 0x40000130
18,647,251 UART:
18,647,484 UART: Running Caliptra FMC ...
18,648,587 UART:
18,648,751 UART: [state] CFI Enabled
18,712,531 UART: [fht] FMC Alias Private Key: 7
20,476,466 UART: [art] Extend RT PCRs Done
20,477,683 UART: [art] Lock RT PCRs Done
20,479,251 UART: [art] Populate DV Done
20,484,499 UART: [fht] FMC Alias Private Key: 7
20,486,050 UART: [art] Derive CDI
20,486,871 UART: [art] Store in in slot 0x4
20,544,723 UART: [art] Derive Key Pair
20,545,756 UART: [art] Store priv key in slot 0x5
23,009,314 UART: [art] Derive Key Pair - Done
23,022,276 UART: [art] Signing Cert with AUTHO
23,023,592 UART: RITY.KEYID = 7
24,735,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,615 UART: [art] PUB.X = CF24650BD31629ACE5E745DA6902CBA51229BAA41924F0B6D21457187A7680DE56EC203A8D6126B4BB456C34D170DECE
24,743,880 UART: [art] PUB.Y = 047E4D233CB5BC182439FEDE4764F475348089B164332CDE122B7363EF3BA796B86CAE44A2C80C718B825DB2CD7B0F1E
24,751,176 UART: [art] SIG.R = 82E86DA94C62D9B3B9A54EE8A6B22DF5E9371DE5B9788FAC7562B22947FE5CC8FC97CC49EB611CFAF1191D7C810CA89B
24,758,577 UART: [art] SIG.S = FC178658EF8A55048BA4C2F8BEB3DE30056B788D3126E29C70C0EBE19C96DE9E6C7B4B739F88EA88379D6EAEEC2B8D90
25,737,263 UART: Caliptra RT
25,737,967 UART: [state] CFI Enabled
25,905,032 UART: [rt] RT listening for mailbox commands...
25,906,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,936,746 UART: [rt]cmd =0x46504c54, len=4
25,938,329 >>> mbox cmd response data (8 bytes)
25,939,392 UART: [rt] FIPS self test
25,940,336 UART: [kat] ++
25,940,806 UART: [kat] sha1
25,945,317 UART: [kat] SHA2-256
25,947,249 UART: [kat] SHA2-384
25,948,533 UART: Fatal Error: 0x90020001
25,983,915 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,128,657 >>> mbox cmd response: failed
26,129,300 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,273,766 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,119 UART:
190,426 UART: Running Caliptra ROM ...
191,546 UART:
191,697 UART: [state] CFI Enabled
256,934 UART: [state] LifecycleState = Unprovisioned
258,796 UART: [state] DebugLocked = No
261,756 UART: [state] WD Timer not started. Device not locked for debugging
266,139 UART: [kat] SHA2-256
445,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,889 UART: [kat] ++
457,417 UART: [kat] sha1
467,368 UART: [kat] SHA2-256
470,372 UART: [kat] SHA2-384
477,104 UART: [kat] SHA2-512-ACC
480,035 UART: [kat] ECC-384
2,935,301 UART: [kat] HMAC-384Kdf
2,960,277 UART: [kat] LMS
3,489,703 UART: [kat] --
3,493,907 UART: [cold-reset] ++
3,494,976 UART: [fht] FHT @ 0x50003400
3,506,847 UART: [idev] ++
3,507,415 UART: [idev] CDI.KEYID = 6
3,508,318 UART: [idev] SUBJECT.KEYID = 7
3,509,534 UART: [idev] UDS.KEYID = 0
3,511,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,655,940 UART: [idev] Erasing UDS.KEYID = 0
6,016,936 UART: [idev] Sha1 KeyId Algorithm
6,040,134 UART: [idev] --
6,044,409 UART: [ldev] ++
6,044,988 UART: [ldev] CDI.KEYID = 6
6,045,907 UART: [ldev] SUBJECT.KEYID = 5
6,047,129 UART: [ldev] AUTHORITY.KEYID = 7
6,048,366 UART: [ldev] FE.KEYID = 1
6,090,132 UART: [ldev] Erasing FE.KEYID = 1
8,593,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,107 UART: [ldev] --
10,401,664 UART: [fwproc] Wait for Commands...
10,403,226 UART: [fwproc] Recv command 0x46574c44
10,405,271 UART: [fwproc] Recv'd Img size: 115224 bytes
13,820,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,842 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,286,251 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,142 UART:
192,516 UART: Running Caliptra ROM ...
193,717 UART:
193,868 UART: [state] CFI Enabled
264,734 UART: [state] LifecycleState = Unprovisioned
267,193 UART: [state] DebugLocked = No
270,015 UART: [state] WD Timer not started. Device not locked for debugging
274,291 UART: [kat] SHA2-256
464,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,894 UART: [kat] ++
475,393 UART: [kat] sha1
486,911 UART: [kat] SHA2-256
489,931 UART: [kat] SHA2-384
495,213 UART: [kat] SHA2-512-ACC
497,802 UART: [kat] ECC-384
2,948,586 UART: [kat] HMAC-384Kdf
2,973,182 UART: [kat] LMS
3,504,916 UART: [kat] --
3,508,151 UART: [cold-reset] ++
3,509,663 UART: [fht] FHT @ 0x50003400
3,522,772 UART: [idev] ++
3,523,410 UART: [idev] CDI.KEYID = 6
3,524,395 UART: [idev] SUBJECT.KEYID = 7
3,525,575 UART: [idev] UDS.KEYID = 0
3,526,654 ready_for_fw is high
3,526,901 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,672,409 UART: [idev] Erasing UDS.KEYID = 0
6,032,653 UART: [idev] Sha1 KeyId Algorithm
6,055,541 UART: [idev] --
6,060,607 UART: [ldev] ++
6,061,304 UART: [ldev] CDI.KEYID = 6
6,062,243 UART: [ldev] SUBJECT.KEYID = 5
6,063,409 UART: [ldev] AUTHORITY.KEYID = 7
6,064,589 UART: [ldev] FE.KEYID = 1
6,104,432 UART: [ldev] Erasing FE.KEYID = 1
8,609,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,085 UART: [ldev] --
10,418,352 UART: [fwproc] Wait for Commands...
10,421,152 UART: [fwproc] Recv command 0x46574c44
10,423,473 UART: [fwproc] Recv'd Img size: 115224 bytes
13,885,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,801 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,628,028 >>> mbox cmd response: success
14,632,874 UART: [afmc] ++
14,633,587 UART: [afmc] CDI.KEYID = 6
14,634,830 UART: [afmc] SUBJECT.KEYID = 7
14,636,264 UART: [afmc] AUTHORITY.KEYID = 5
17,177,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,921,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,923,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,938,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,953,666 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,968,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,993,264 UART: [afmc] --
18,996,961 UART: [cold-reset] --
18,999,365 UART: [state] Locking Datavault
19,003,920 UART: [state] Locking PCR0, PCR1 and PCR31
19,006,057 UART: [state] Locking ICCM
19,008,831 UART: [exit] Launching FMC @ 0x40000130
19,017,513 UART:
19,017,792 UART: Running Caliptra FMC ...
19,018,910 UART:
19,019,075 UART: [state] CFI Enabled
19,078,142 UART: [fht] FMC Alias Private Key: 7
20,841,863 UART: [art] Extend RT PCRs Done
20,843,086 UART: [art] Lock RT PCRs Done
20,844,724 UART: [art] Populate DV Done
20,850,029 UART: [fht] FMC Alias Private Key: 7
20,851,735 UART: [art] Derive CDI
20,852,551 UART: [art] Store in in slot 0x4
20,910,400 UART: [art] Derive Key Pair
20,911,445 UART: [art] Store priv key in slot 0x5
23,374,350 UART: [art] Derive Key Pair - Done
23,387,188 UART: [art] Signing Cert with AUTHO
23,388,517 UART: RITY.KEYID = 7
25,099,725 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,238 UART: [art] PUB.X = EEADB67E0FC3BB004C2CECD62DECBD774B23D65D6E3D4D297D2234D1B66CFC17BD61BD01F0529340C64CCA645235EE05
25,108,557 UART: [art] PUB.Y = BFFB950160696AA9FA30D03A5EFC880E2711ACD97C3A7AB4F05447D8F094EA1DECE4E71692D4606562E083E29CD958DC
25,115,801 UART: [art] SIG.R = 5278C5910151180216933BBDC8269B440AB311E15C82BB5104B38666C90E2649C8209FE66CEC1FCDE9907E604EC5D7F0
25,123,153 UART: [art] SIG.S = 19ACF85B90D1CBFAA4DAADF6B4B2BCB5F0E718A140EB1A8AA1135B2D310C5F5F87B0B592D2E6370F87566D33A703EC0C
26,102,630 UART: Caliptra RT
26,103,353 UART: [state] CFI Enabled
26,267,057 UART: [rt] RT listening for mailbox commands...
26,268,914 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,298,870 UART: [rt]cmd =0x46504c54, len=4
26,300,485 >>> mbox cmd response data (8 bytes)
26,301,685 UART: [rt] FIPS self test
26,302,632 UART: [kat] ++
26,303,081 UART: [kat] sha1
26,307,701 UART: [kat] SHA2-256
26,309,648 UART: [kat] SHA2-384
26,310,610 UART: Fatal Error: 0x90020001
26,345,814 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,490,864 >>> mbox cmd response: failed
26,491,528 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,636,153 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
189,984 UART:
190,274 UART: Running Caliptra ROM ...
191,300 UART:
191,437 UART: [state] CFI Enabled
252,744 UART: [state] LifecycleState = Unprovisioned
255,155 UART: [state] DebugLocked = No
256,827 UART: [state] WD Timer not started. Device not locked for debugging
260,845 UART: [kat] SHA2-256
450,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,480 UART: [kat] ++
461,926 UART: [kat] sha1
473,072 UART: [kat] SHA2-256
476,085 UART: [kat] SHA2-384
482,171 UART: [kat] SHA2-512-ACC
484,738 UART: [kat] ECC-384
2,938,156 UART: [kat] HMAC-384Kdf
2,959,337 UART: [kat] LMS
3,491,089 UART: [kat] --
3,495,202 UART: [cold-reset] ++
3,496,383 UART: [fht] FHT @ 0x50003400
3,507,487 UART: [idev] ++
3,508,207 UART: [idev] CDI.KEYID = 6
3,509,098 UART: [idev] SUBJECT.KEYID = 7
3,510,322 UART: [idev] UDS.KEYID = 0
3,512,017 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,656,720 UART: [idev] Erasing UDS.KEYID = 0
6,016,746 UART: [idev] Sha1 KeyId Algorithm
6,040,259 UART: [idev] --
6,045,014 UART: [ldev] ++
6,045,701 UART: [ldev] CDI.KEYID = 6
6,046,667 UART: [ldev] SUBJECT.KEYID = 5
6,047,830 UART: [ldev] AUTHORITY.KEYID = 7
6,049,066 UART: [ldev] FE.KEYID = 1
6,088,265 UART: [ldev] Erasing FE.KEYID = 1
8,596,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,305 UART: [ldev] --
10,402,545 UART: [fwproc] Wait for Commands...
10,405,246 UART: [fwproc] Recv command 0x46574c44
10,407,506 UART: [fwproc] Recv'd Img size: 115224 bytes
13,865,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,287 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,608,644 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,418,674 ready_for_fw is high
3,419,124 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,728,328 >>> mbox cmd response: success
19,024,186 UART:
19,024,601 UART: Running Caliptra FMC ...
19,025,763 UART:
19,025,924 UART: [state] CFI Enabled
19,091,211 UART: [fht] FMC Alias Private Key: 7
20,854,423 UART: [art] Extend RT PCRs Done
20,855,640 UART: [art] Lock RT PCRs Done
20,857,457 UART: [art] Populate DV Done
20,863,038 UART: [fht] FMC Alias Private Key: 7
20,864,586 UART: [art] Derive CDI
20,865,409 UART: [art] Store in in slot 0x4
20,923,535 UART: [art] Derive Key Pair
20,924,571 UART: [art] Store priv key in slot 0x5
23,387,607 UART: [art] Derive Key Pair - Done
23,400,429 UART: [art] Signing Cert with AUTHO
23,401,763 UART: RITY.KEYID = 7
25,114,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,395 UART: [art] PUB.X = CC8940EE48F360F860E56FDF78D6BC6485E35588BF8A80C1F9EF4538D360DB71D40BE0E4E61827E1925DF7544F93786B
25,123,677 UART: [art] PUB.Y = 499F76EF1CB22A28EF3C355AF0008D79A0B7E16420B4247AAE2BB1D868E492C517166B69C0A0B91F7A14F4CE4F959C50
25,130,905 UART: [art] SIG.R = CBBF1C9B23E5489AC6DF15936CCBECF046677660F6353E9FAB896410ADCFB99C2972F4BF394C4A6FE0022653C9FEDB67
25,138,310 UART: [art] SIG.S = 45F6D55E3410563B144963B4CA08BFA34B3C9C4780E410080136C1D978DB8B65D0BA1642FD1621872DEBFFF3F691427C
26,117,748 UART: Caliptra RT
26,118,571 UART: [state] CFI Enabled
26,282,767 UART: [rt] RT listening for mailbox commands...
26,284,635 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,314,274 UART: [rt]cmd =0x46504c54, len=4
26,315,853 >>> mbox cmd response data (8 bytes)
26,316,914 UART: [rt] FIPS self test
26,317,857 UART: [kat] ++
26,318,305 UART: [kat] sha1
26,322,801 UART: [kat] SHA2-256
26,324,736 UART: [kat] SHA2-384
26,326,076 UART: Fatal Error: 0x90020001
26,361,469 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,506,135 >>> mbox cmd response: failed
26,506,796 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,651,433 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,430,627 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,738,409 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,130 writing to cptra_bootfsm_go
193,388 UART:
193,742 UART: Running Caliptra ROM ...
194,947 UART:
604,455 UART: [state] CFI Enabled
616,615 UART: [state] LifecycleState = Unprovisioned
618,997 UART: [state] DebugLocked = No
621,807 UART: [state] WD Timer not started. Device not locked for debugging
625,991 UART: [kat] SHA2-256
815,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,666 UART: [kat] ++
827,273 UART: [kat] sha1
838,368 UART: [kat] SHA2-256
841,399 UART: [kat] SHA2-384
847,112 UART: [kat] SHA2-512-ACC
849,700 UART: [kat] ECC-384
3,294,201 UART: [kat] HMAC-384Kdf
3,307,077 UART: [kat] LMS
3,838,938 UART: [kat] --
3,844,926 UART: [cold-reset] ++
3,846,909 UART: [fht] FHT @ 0x50003400
3,857,906 UART: [idev] ++
3,858,485 UART: [idev] CDI.KEYID = 6
3,859,522 UART: [idev] SUBJECT.KEYID = 7
3,860,629 UART: [idev] UDS.KEYID = 0
3,861,560 ready_for_fw is high
3,861,763 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,006,502 UART: [idev] Erasing UDS.KEYID = 0
6,339,992 UART: [idev] Sha1 KeyId Algorithm
6,361,680 UART: [idev] --
6,365,840 UART: [ldev] ++
6,366,521 UART: [ldev] CDI.KEYID = 6
6,367,492 UART: [ldev] SUBJECT.KEYID = 5
6,368,648 UART: [ldev] AUTHORITY.KEYID = 7
6,369,879 UART: [ldev] FE.KEYID = 1
6,383,740 UART: [ldev] Erasing FE.KEYID = 1
8,864,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,094 UART: [ldev] --
10,655,940 UART: [fwproc] Wait for Commands...
10,658,360 UART: [fwproc] Recv command 0x46574c44
10,660,621 UART: [fwproc] Recv'd Img size: 115224 bytes
14,127,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,203,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,319,772 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,868,436 >>> mbox cmd response: success
14,872,479 UART: [afmc] ++
14,873,180 UART: [afmc] CDI.KEYID = 6
14,874,290 UART: [afmc] SUBJECT.KEYID = 7
14,875,820 UART: [afmc] AUTHORITY.KEYID = 5
17,381,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,104,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,106,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,121,613 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,136,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,151,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,175,053 UART: [afmc] --
19,179,024 UART: [cold-reset] --
19,181,450 UART: [state] Locking Datavault
19,187,670 UART: [state] Locking PCR0, PCR1 and PCR31
19,189,859 UART: [state] Locking ICCM
19,191,717 UART: [exit] Launching FMC @ 0x40000130
19,200,381 UART:
19,200,615 UART: Running Caliptra FMC ...
19,201,638 UART:
19,201,784 UART: [state] CFI Enabled
19,209,856 UART: [fht] FMC Alias Private Key: 7
20,966,530 UART: [art] Extend RT PCRs Done
20,967,753 UART: [art] Lock RT PCRs Done
20,969,508 UART: [art] Populate DV Done
20,974,980 UART: [fht] FMC Alias Private Key: 7
20,976,681 UART: [art] Derive CDI
20,977,421 UART: [art] Store in in slot 0x4
21,020,176 UART: [art] Derive Key Pair
21,021,196 UART: [art] Store priv key in slot 0x5
23,447,561 UART: [art] Derive Key Pair - Done
23,460,398 UART: [art] Signing Cert with AUTHO
23,461,701 UART: RITY.KEYID = 7
25,167,132 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,642 UART: [art] PUB.X = DD72434AAF56386AA5E5C30C9686C581B8E38E9912F40B62E21E7BDA51B90157E94A17C2D64C10B883C0E542FBA729D9
25,175,899 UART: [art] PUB.Y = 85C6A3A3E86E6956A30DD639FBF68DBE2DB7285A69D54E6E4DF1A2EA8CDB8CFAD9D2B2E10C13BD09A6AB2C3A23EAAEE8
25,183,183 UART: [art] SIG.R = A10B6FD34CC71BD4179906AF15608AD3A6B96C894442164AD148A9E1EDE52977AB42C86CF1673998086BFEC6C0EB41DC
25,190,584 UART: [art] SIG.S = 60F9D4AB6BF33245E34C30AB0F5F2C0E551AAA26A6BBA54F318E3A4BA4074D7F9D2BB24BD14FC6DB5565E5444FEDDF37
26,169,950 UART: Caliptra RT
26,170,657 UART: [state] CFI Enabled
26,288,040 UART: [rt] RT listening for mailbox commands...
26,289,882 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,319,569 UART: [rt]cmd =0x46504c54, len=4
26,321,095 >>> mbox cmd response data (8 bytes)
26,322,273 UART: [rt] FIPS self test
26,323,433 UART: [kat] ++
26,323,889 UART: [kat] sha1
26,328,077 UART: [kat] SHA2-256
26,330,009 UART: [kat] SHA2-384
26,331,197 UART: Fatal Error: 0x90020001
26,366,405 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,511,099 >>> mbox cmd response: failed
26,511,739 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,656,471 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,111 UART:
190,424 UART: Running Caliptra ROM ...
191,455 UART:
13,892,228 UART: [state] CFI Enabled
13,906,010 UART: [state] LifecycleState = Unprovisioned
13,908,406 UART: [state] DebugLocked = No
13,910,091 UART: [state] WD Timer not started. Device not locked for debugging
13,914,331 UART: [kat] SHA2-256
14,104,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,114,956 UART: [kat] ++
14,115,474 UART: [kat] sha1
14,127,171 UART: [kat] SHA2-256
14,130,184 UART: [kat] SHA2-384
14,136,544 UART: [kat] SHA2-512-ACC
14,139,161 UART: [kat] ECC-384
16,581,900 UART: [kat] HMAC-384Kdf
16,594,719 UART: [kat] LMS
17,126,522 UART: [kat] --
17,129,124 UART: [cold-reset] ++
17,131,167 UART: [fht] FHT @ 0x50003400
17,141,603 UART: [idev] ++
17,142,293 UART: [idev] CDI.KEYID = 6
17,143,311 UART: [idev] SUBJECT.KEYID = 7
17,144,467 UART: [idev] UDS.KEYID = 0
17,145,954 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,290,673 UART: [idev] Erasing UDS.KEYID = 0
19,628,816 UART: [idev] Sha1 KeyId Algorithm
19,650,484 UART: [idev] --
19,654,643 UART: [ldev] ++
19,655,377 UART: [ldev] CDI.KEYID = 6
19,656,289 UART: [ldev] SUBJECT.KEYID = 5
19,657,446 UART: [ldev] AUTHORITY.KEYID = 7
19,658,672 UART: [ldev] FE.KEYID = 1
19,669,052 UART: [ldev] Erasing FE.KEYID = 1
22,145,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,866,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,881,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,896,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,911,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,932,717 UART: [ldev] --
23,938,204 UART: [fwproc] Wait for Commands...
23,940,195 UART: [fwproc] Recv command 0x46574c44
23,942,509 UART: [fwproc] Recv'd Img size: 115224 bytes
27,400,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,478,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,595,124 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,142,300 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,748,387 ready_for_fw is high
3,748,773 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,975,386 >>> mbox cmd response: success
19,226,322 UART:
19,226,715 UART: Running Caliptra FMC ...
19,227,866 UART:
19,228,033 UART: [state] CFI Enabled
19,235,962 UART: [fht] FMC Alias Private Key: 7
20,992,271 UART: [art] Extend RT PCRs Done
20,993,501 UART: [art] Lock RT PCRs Done
20,995,181 UART: [art] Populate DV Done
21,000,757 UART: [fht] FMC Alias Private Key: 7
21,002,366 UART: [art] Derive CDI
21,003,192 UART: [art] Store in in slot 0x4
21,046,010 UART: [art] Derive Key Pair
21,047,061 UART: [art] Store priv key in slot 0x5
23,473,981 UART: [art] Derive Key Pair - Done
23,487,040 UART: [art] Signing Cert with AUTHO
23,488,347 UART: RITY.KEYID = 7
25,193,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,115 UART: [art] PUB.X = DDCF3B5B293D7502151CCA612E2B97877B82DD43F49F08B960C8B44A540A0A34F4E783DE3715D0CD3E42ED45BD493308
25,202,430 UART: [art] PUB.Y = 3C69757D57EB727D075E36C1F8CABFEA6B2707720A6CFF2562CF171B8857EB32780CD04DD0EE4DE9D857E7BBFFA281A9
25,209,694 UART: [art] SIG.R = 0A2F75DA849A75E5DE2B91DD44DA45FB78F502792FEA5CB45B78C6FC4F1B6C2F95CD1515856090D64FDF2AD82C6D195B
25,217,100 UART: [art] SIG.S = 29460DD8DCAE5611292538868D8CC170894715FF64B6774831841325D0EB9D31FDC3792313DBCE26B758D34F1093730E
26,195,984 UART: Caliptra RT
26,196,675 UART: [state] CFI Enabled
26,313,696 UART: [rt] RT listening for mailbox commands...
26,315,540 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,345,102 UART: [rt]cmd =0x46504c54, len=4
26,346,837 >>> mbox cmd response data (8 bytes)
26,348,141 UART: [rt] FIPS self test
26,349,088 UART: [kat] ++
26,349,536 UART: [kat] sha1
26,354,200 UART: [kat] SHA2-256
26,356,073 UART: [kat] SHA2-384
26,357,487 UART: Fatal Error: 0x90020001
26,392,886 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,537,601 >>> mbox cmd response: failed
26,538,265 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,682,794 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
16,995,131 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,210,981 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,082 UART: [kat] SHA2-512-ACC
896,983 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,476,359 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,716 UART: [idev] ++
1,479,884 UART: [idev] CDI.KEYID = 6
1,480,244 UART: [idev] SUBJECT.KEYID = 7
1,480,668 UART: [idev] UDS.KEYID = 0
1,481,013 ready_for_fw is high
1,481,013 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,828 UART: [idev] Erasing UDS.KEYID = 0
1,504,940 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,626 UART: [idev] --
1,514,639 UART: [ldev] ++
1,514,807 UART: [ldev] CDI.KEYID = 6
1,515,170 UART: [ldev] SUBJECT.KEYID = 5
1,515,596 UART: [ldev] AUTHORITY.KEYID = 7
1,516,059 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,894 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,010 UART: [ldev] --
1,586,383 UART: [fwproc] Waiting for Commands...
1,587,182 UART: [fwproc] Received command 0x46574c44
1,587,973 UART: [fwproc] Received Image of size 115224 bytes
2,895,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,740 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,357 >>> mbox cmd response: success
3,090,583 UART: [afmc] ++
3,090,751 UART: [afmc] CDI.KEYID = 6
3,091,113 UART: [afmc] SUBJECT.KEYID = 7
3,091,538 UART: [afmc] AUTHORITY.KEYID = 5
3,125,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,180 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,870 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,659 UART: [afmc] --
3,168,577 UART: [cold-reset] --
3,169,249 UART: [state] Locking Datavault
3,170,464 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,068 UART: [state] Locking ICCM
3,171,726 UART: [exit] Launching FMC @ 0x40000130
3,177,055 UART:
3,177,071 UART: Running Caliptra FMC ...
3,177,479 UART:
3,177,533 UART: [state] CFI Enabled
3,188,020 UART: [fht] FMC Alias Private Key: 7
3,295,675 UART: [art] Extend RT PCRs Done
3,296,103 UART: [art] Lock RT PCRs Done
3,297,349 UART: [art] Populate DV Done
3,305,770 UART: [fht] FMC Alias Private Key: 7
3,306,774 UART: [art] Derive CDI
3,307,054 UART: [art] Store in in slot 0x4
3,392,465 UART: [art] Derive Key Pair
3,392,825 UART: [art] Store priv key in slot 0x5
3,405,743 UART: [art] Derive Key Pair - Done
3,420,380 UART: [art] Signing Cert with AUTHO
3,420,860 UART: RITY.KEYID = 7
3,436,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,103 UART: [art] PUB.X = B8C362048C67D753B63BEA1A39BC6C466353E44FE79B200C6F1A023F6A482BE6D32D56F70F8F3B1A47CDC0FC895F41A1
3,443,873 UART: [art] PUB.Y = 049A82F102FA24B960D6382FAF506C0474DBE2D834ADF7B624B05EF8B6DA07F1717B6E28DCD452ED80235A893A759B3D
3,450,821 UART: [art] SIG.R = B98401C9A74069ADDE77DFA95A9F97DB5720EB4087E05E585DE42DB66606DE97DE8DBDCD6E29D033E97F3D3F395E3D2B
3,457,603 UART: [art] SIG.S = BED09571B345C29BE948F60A0BE8912E2960A2D3FFA7ADE3FD67F1CCD3B1F665D699E8C5CD1F8928BEA68207E0A19E4B
3,481,199 UART: Caliptra RT
3,481,453 UART: [state] CFI Enabled
3,590,174 UART: [rt] RT listening for mailbox commands...
3,590,837 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,457 UART: [rt]cmd =0x46504c54, len=4
3,621,709 >>> mbox cmd response data (8 bytes)
3,621,892 UART: [rt] FIPS self test
3,622,220 UART: [kat] ++
3,622,372 UART: [kat] sha1
3,626,728 UART: [kat] SHA2-256
3,628,750 UART: [kat] SHA2-384
3,629,686 UART: Fatal Error: 0x90020001
3,631,236 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,241 >>> mbox cmd response: failed
3,631,241 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,631,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
903,098 UART: [kat] HMAC-384Kdf
907,766 UART: [kat] LMS
1,475,962 UART: [kat] --
1,476,779 UART: [cold-reset] ++
1,477,113 UART: [fht] Storing FHT @ 0x50003400
1,479,898 UART: [idev] ++
1,480,066 UART: [idev] CDI.KEYID = 6
1,480,426 UART: [idev] SUBJECT.KEYID = 7
1,480,850 UART: [idev] UDS.KEYID = 0
1,481,195 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,742 UART: [idev] Erasing UDS.KEYID = 0
1,505,206 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,910 UART: [idev] --
1,514,963 UART: [ldev] ++
1,515,131 UART: [ldev] CDI.KEYID = 6
1,515,494 UART: [ldev] SUBJECT.KEYID = 5
1,515,920 UART: [ldev] AUTHORITY.KEYID = 7
1,516,383 UART: [ldev] FE.KEYID = 1
1,521,455 UART: [ldev] Erasing FE.KEYID = 1
1,546,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,282 UART: [ldev] --
1,585,641 UART: [fwproc] Waiting for Commands...
1,586,490 UART: [fwproc] Received command 0x46574c44
1,587,281 UART: [fwproc] Received Image of size 115224 bytes
2,895,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,590 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,942 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,117 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,225 ready_for_fw is high
1,363,225 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,940,587 >>> mbox cmd response: success
3,001,669 UART:
3,001,685 UART: Running Caliptra FMC ...
3,002,093 UART:
3,002,147 UART: [state] CFI Enabled
3,012,848 UART: [fht] FMC Alias Private Key: 7
3,120,727 UART: [art] Extend RT PCRs Done
3,121,155 UART: [art] Lock RT PCRs Done
3,122,615 UART: [art] Populate DV Done
3,130,764 UART: [fht] FMC Alias Private Key: 7
3,131,912 UART: [art] Derive CDI
3,132,192 UART: [art] Store in in slot 0x4
3,217,801 UART: [art] Derive Key Pair
3,218,161 UART: [art] Store priv key in slot 0x5
3,231,553 UART: [art] Derive Key Pair - Done
3,246,363 UART: [art] Signing Cert with AUTHO
3,246,843 UART: RITY.KEYID = 7
3,261,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,538 UART: [art] PUB.X = D56F92E4F28762B527F96EA255F4BFBDB19A64AC4248A8978865D4F4178E5BF301E3E1506011F24C319DB05CA3509B66
3,269,307 UART: [art] PUB.Y = 4F5520D9DDC305555405A6CF6BAF7160FE0FE3965A6A474CCB339150B1108FDA027D7FE0A462237A1D8A7948998CF2D9
3,276,251 UART: [art] SIG.R = A757531E2F4ACFD667577D61B974B5C56C140CAF2972B44CC17DF0FECF3FD4C7D09FD29F7D65D645AC5B827D38EC61EA
3,283,038 UART: [art] SIG.S = 6FBA5FDF00A71820F012B89438AB02C560E44AAEBC63C370FDDCA8D93DB74B23CF53FECA5ABFD4CF6DE73CF421FD7C32
3,306,648 UART: Caliptra RT
3,306,902 UART: [state] CFI Enabled
3,414,944 UART: [rt] RT listening for mailbox commands...
3,415,607 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,983 UART: [rt]cmd =0x46504c54, len=4
3,446,191 >>> mbox cmd response data (8 bytes)
3,446,474 UART: [rt] FIPS self test
3,446,802 UART: [kat] ++
3,446,954 UART: [kat] sha1
3,451,126 UART: [kat] SHA2-256
3,453,148 UART: [kat] SHA2-384
3,453,914 UART: Fatal Error: 0x90020001
3,455,464 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,455,469 >>> mbox cmd response: failed
3,455,469 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,455,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,515 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,371 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
891,078 UART: [kat] SHA2-256
893,016 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,071 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,910 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,085 UART: [idev] ++
1,480,253 UART: [idev] CDI.KEYID = 6
1,480,613 UART: [idev] SUBJECT.KEYID = 7
1,481,037 UART: [idev] UDS.KEYID = 0
1,481,382 ready_for_fw is high
1,481,382 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,207 UART: [idev] Erasing UDS.KEYID = 0
1,505,703 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,315 UART: [idev] --
1,515,398 UART: [ldev] ++
1,515,566 UART: [ldev] CDI.KEYID = 6
1,515,929 UART: [ldev] SUBJECT.KEYID = 5
1,516,355 UART: [ldev] AUTHORITY.KEYID = 7
1,516,818 UART: [ldev] FE.KEYID = 1
1,521,972 UART: [ldev] Erasing FE.KEYID = 1
1,547,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,739 UART: [ldev] --
1,587,106 UART: [fwproc] Waiting for Commands...
1,587,925 UART: [fwproc] Received command 0x46574c44
1,588,716 UART: [fwproc] Received Image of size 115224 bytes
2,895,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,076 >>> mbox cmd response: success
3,090,294 UART: [afmc] ++
3,090,462 UART: [afmc] CDI.KEYID = 6
3,090,824 UART: [afmc] SUBJECT.KEYID = 7
3,091,249 UART: [afmc] AUTHORITY.KEYID = 5
3,126,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,155 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,845 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,716 UART: [afmc] --
3,169,830 UART: [cold-reset] --
3,170,438 UART: [state] Locking Datavault
3,171,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,137 UART: [state] Locking ICCM
3,172,649 UART: [exit] Launching FMC @ 0x40000130
3,177,978 UART:
3,177,994 UART: Running Caliptra FMC ...
3,178,402 UART:
3,178,545 UART: [state] CFI Enabled
3,189,150 UART: [fht] FMC Alias Private Key: 7
3,297,303 UART: [art] Extend RT PCRs Done
3,297,731 UART: [art] Lock RT PCRs Done
3,298,873 UART: [art] Populate DV Done
3,307,078 UART: [fht] FMC Alias Private Key: 7
3,308,090 UART: [art] Derive CDI
3,308,370 UART: [art] Store in in slot 0x4
3,394,235 UART: [art] Derive Key Pair
3,394,595 UART: [art] Store priv key in slot 0x5
3,407,741 UART: [art] Derive Key Pair - Done
3,422,570 UART: [art] Signing Cert with AUTHO
3,423,050 UART: RITY.KEYID = 7
3,438,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,835 UART: [art] PUB.X = B246E74B16EFB013BF905AABE7367C747C2146261DFCB56145C2645F9DB55BDEDF7FBBF0E197986E472DD4310FDDEBE6
3,445,622 UART: [art] PUB.Y = 4F9C07E11FA2D5208C95A28AA0D92B66FC7DFCE456BA5D03C179DDD8E06EB35C0C9E0D57E319D7B17E25E69FCE4D14E0
3,452,582 UART: [art] SIG.R = A89C0CB340CB0117264A6A14A54B2BAC6296C901F6B3458C3702C1E4D7C32D9502B641262EF1CD03AB5EB09CC8C25EFE
3,459,346 UART: [art] SIG.S = 33CAA2D310441E23F1F38FA7663F6DACDA2798232B9F9273C8DDBD69E804969D7EEEFEE6BEF69F39594546A596686841
3,482,898 UART: Caliptra RT
3,483,244 UART: [state] CFI Enabled
3,592,300 UART: [rt] RT listening for mailbox commands...
3,592,963 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,373 UART: [rt]cmd =0x46504c54, len=4
3,623,391 >>> mbox cmd response data (8 bytes)
3,623,630 UART: [rt] FIPS self test
3,623,958 UART: [kat] ++
3,624,110 UART: [kat] sha1
3,628,460 UART: [kat] SHA2-256
3,630,482 UART: [kat] SHA2-384
3,631,582 UART: Fatal Error: 0x90020001
3,633,132 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,633,137 >>> mbox cmd response: failed
3,633,137 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,633,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,304 UART: [kat] SHA2-256
882,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,350 UART: [kat] ++
886,502 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,398 UART: [cold-reset] ++
1,476,842 UART: [fht] Storing FHT @ 0x50003400
1,479,687 UART: [idev] ++
1,479,855 UART: [idev] CDI.KEYID = 6
1,480,215 UART: [idev] SUBJECT.KEYID = 7
1,480,639 UART: [idev] UDS.KEYID = 0
1,480,984 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,815 UART: [idev] Erasing UDS.KEYID = 0
1,504,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,631 UART: [idev] --
1,514,796 UART: [ldev] ++
1,514,964 UART: [ldev] CDI.KEYID = 6
1,515,327 UART: [ldev] SUBJECT.KEYID = 5
1,515,753 UART: [ldev] AUTHORITY.KEYID = 7
1,516,216 UART: [ldev] FE.KEYID = 1
1,521,668 UART: [ldev] Erasing FE.KEYID = 1
1,546,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,881 UART: [ldev] --
1,586,224 UART: [fwproc] Waiting for Commands...
1,586,975 UART: [fwproc] Received command 0x46574c44
1,587,766 UART: [fwproc] Received Image of size 115224 bytes
2,895,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,586 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,520 ready_for_fw is high
1,362,520 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,430 >>> mbox cmd response: success
3,000,574 UART:
3,000,590 UART: Running Caliptra FMC ...
3,000,998 UART:
3,001,141 UART: [state] CFI Enabled
3,011,856 UART: [fht] FMC Alias Private Key: 7
3,119,871 UART: [art] Extend RT PCRs Done
3,120,299 UART: [art] Lock RT PCRs Done
3,121,725 UART: [art] Populate DV Done
3,129,780 UART: [fht] FMC Alias Private Key: 7
3,130,872 UART: [art] Derive CDI
3,131,152 UART: [art] Store in in slot 0x4
3,216,769 UART: [art] Derive Key Pair
3,217,129 UART: [art] Store priv key in slot 0x5
3,230,649 UART: [art] Derive Key Pair - Done
3,245,117 UART: [art] Signing Cert with AUTHO
3,245,597 UART: RITY.KEYID = 7
3,260,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,156 UART: [art] PUB.X = 8E6990044C0A76A3AF275567F2129C143DF914A00A16A9077E39B73EA1633FC842C5240D5EB62C65990455FFEB60BCC2
3,267,908 UART: [art] PUB.Y = E3DDF22C2B432F1054BF6A9A6F4389EFA2975E38C334D86CF7EA18AC1B8D52DEB2E75837A45CD2BD96CCFD9E3361E00F
3,274,877 UART: [art] SIG.R = 6501F5D3C96270F20B112C35AF97ADCFB9AD0A0FE8FAB3C5C74BC776902894F950A28D92A15BC06E24CF3400C75CBDCA
3,281,631 UART: [art] SIG.S = A6868927395461E8189AEEB4DFB73A6B6D91D893B24E758E029E746D2E21A65827289F77C181E387474CC163ACC6C7E6
3,304,855 UART: Caliptra RT
3,305,201 UART: [state] CFI Enabled
3,413,121 UART: [rt] RT listening for mailbox commands...
3,413,784 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,470 UART: [rt]cmd =0x46504c54, len=4
3,444,704 >>> mbox cmd response data (8 bytes)
3,444,855 UART: [rt] FIPS self test
3,445,183 UART: [kat] ++
3,445,335 UART: [kat] sha1
3,449,471 UART: [kat] SHA2-256
3,451,493 UART: [kat] SHA2-384
3,452,497 UART: Fatal Error: 0x90020001
3,454,047 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,454,052 >>> mbox cmd response: failed
3,454,052 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,454,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,478 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,576 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
892,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,097 UART: [kat] ++
897,249 UART: [kat] sha1
901,399 UART: [kat] SHA2-256
903,339 UART: [kat] SHA2-384
906,144 UART: [kat] SHA2-512-ACC
908,045 UART: [kat] ECC-384
917,744 UART: [kat] HMAC-384Kdf
922,258 UART: [kat] LMS
1,170,586 UART: [kat] --
1,171,465 UART: [cold-reset] ++
1,172,023 UART: [fht] FHT @ 0x50003400
1,174,892 UART: [idev] ++
1,175,060 UART: [idev] CDI.KEYID = 6
1,175,420 UART: [idev] SUBJECT.KEYID = 7
1,175,844 UART: [idev] UDS.KEYID = 0
1,176,189 ready_for_fw is high
1,176,189 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,422 UART: [idev] Erasing UDS.KEYID = 0
1,200,655 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,624 UART: [fwproc] Wait for Commands...
1,283,380 UART: [fwproc] Recv command 0x46574c44
1,284,108 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,777 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,936 >>> mbox cmd response: success
2,786,158 UART: [afmc] ++
2,786,326 UART: [afmc] CDI.KEYID = 6
2,786,688 UART: [afmc] SUBJECT.KEYID = 7
2,787,113 UART: [afmc] AUTHORITY.KEYID = 5
2,822,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,891 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,504 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,223 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,955 UART: [afmc] --
2,865,989 UART: [cold-reset] --
2,866,993 UART: [state] Locking Datavault
2,868,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,846 UART: [state] Locking ICCM
2,869,502 UART: [exit] Launching FMC @ 0x40000130
2,874,831 UART:
2,874,847 UART: Running Caliptra FMC ...
2,875,255 UART:
2,875,309 UART: [state] CFI Enabled
2,885,796 UART: [fht] FMC Alias Private Key: 7
2,993,643 UART: [art] Extend RT PCRs Done
2,994,071 UART: [art] Lock RT PCRs Done
2,995,415 UART: [art] Populate DV Done
3,003,746 UART: [fht] FMC Alias Private Key: 7
3,004,784 UART: [art] Derive CDI
3,005,064 UART: [art] Store in in slot 0x4
3,091,183 UART: [art] Derive Key Pair
3,091,543 UART: [art] Store priv key in slot 0x5
3,104,675 UART: [art] Derive Key Pair - Done
3,119,513 UART: [art] Signing Cert with AUTHO
3,119,993 UART: RITY.KEYID = 7
3,135,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,940 UART: [art] PUB.X = FA47BF6E7EE9C70989A6FC98D4556E94C35F27BE03C266B2668D70DC3D874A3955801D27E4AD8E04BA346606265776BF
3,142,702 UART: [art] PUB.Y = 33905D191A5A886D8FE6A9BAC7651400D05D37C87C393DA5A55DC7DC0AF41056C85F228768CAD12D0A60C0BC9BA5B5B9
3,149,636 UART: [art] SIG.R = B625593F4DE569E14537C1BF4BF50E880BF1E42645940586AC8070F93A3C523C10BC94853F84ACE546353772DBF9A895
3,156,395 UART: [art] SIG.S = 17C7B1D0D8C7C6FEF2A0C564A21C1595F0AA762A47894A40F4FEA10E15455733A08B22D970CC5FF9166EC92DBBD216D7
3,180,353 UART: Caliptra RT
3,180,607 UART: [state] CFI Enabled
3,288,939 UART: [rt] RT listening for mailbox commands...
3,289,602 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,870 UART: [rt]cmd =0x46504c54, len=4
3,319,950 >>> mbox cmd response data (8 bytes)
3,320,067 UART: [rt] FIPS self test
3,320,395 UART: [kat] ++
3,320,547 UART: [kat] sha1
3,324,851 UART: [kat] SHA2-256
3,326,873 UART: [kat] SHA2-384
3,327,943 UART: Fatal Error: 0x90020001
3,329,493 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,329,498 >>> mbox cmd response: failed
3,329,498 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,329,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,875 UART: [state] WD Timer not started. Device not locked for debugging
87,054 UART: [kat] SHA2-256
892,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,829 UART: [kat] ++
896,981 UART: [kat] sha1
901,143 UART: [kat] SHA2-256
903,083 UART: [kat] SHA2-384
906,072 UART: [kat] SHA2-512-ACC
907,973 UART: [kat] ECC-384
917,510 UART: [kat] HMAC-384Kdf
922,020 UART: [kat] LMS
1,170,348 UART: [kat] --
1,171,133 UART: [cold-reset] ++
1,171,615 UART: [fht] FHT @ 0x50003400
1,174,286 UART: [idev] ++
1,174,454 UART: [idev] CDI.KEYID = 6
1,174,814 UART: [idev] SUBJECT.KEYID = 7
1,175,238 UART: [idev] UDS.KEYID = 0
1,175,583 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,084 UART: [idev] Erasing UDS.KEYID = 0
1,200,031 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,000 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,968 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,169 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,278 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,023 ready_for_fw is high
1,060,023 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,823 >>> mbox cmd response: success
2,700,465 UART:
2,700,481 UART: Running Caliptra FMC ...
2,700,889 UART:
2,700,943 UART: [state] CFI Enabled
2,711,384 UART: [fht] FMC Alias Private Key: 7
2,819,455 UART: [art] Extend RT PCRs Done
2,819,883 UART: [art] Lock RT PCRs Done
2,821,537 UART: [art] Populate DV Done
2,829,942 UART: [fht] FMC Alias Private Key: 7
2,830,870 UART: [art] Derive CDI
2,831,150 UART: [art] Store in in slot 0x4
2,916,671 UART: [art] Derive Key Pair
2,917,031 UART: [art] Store priv key in slot 0x5
2,929,709 UART: [art] Derive Key Pair - Done
2,944,851 UART: [art] Signing Cert with AUTHO
2,945,331 UART: RITY.KEYID = 7
2,960,563 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,328 UART: [art] PUB.X = CDDCE8085EF48DDE5AE4777CA2BD2FCFDD25FB7B691A4F3869104FB0AF3AA2695A2310DBB9845F36B640F324D6DEBF82
2,968,121 UART: [art] PUB.Y = 3711BA56CEFDDF40B149EA5024BD07AF8BB1442848E5726BEA377D80554D16BAA01ECB2D520E2E5B8E472CD0F5E98238
2,975,079 UART: [art] SIG.R = 709B386EDA6886E5327AB5814DD4BC986DB473180626766804D74835CDF8E7A07B519AC72DECD0E660D813A691E8B819
2,981,843 UART: [art] SIG.S = 2E5224E8DAA3740BB9F278AD96666FF63B02D83A81E824AE26BFB46FCEDBF11CA715DFDA4234B05C48B2CBFDA55DE7DF
3,005,746 UART: Caliptra RT
3,006,000 UART: [state] CFI Enabled
3,114,024 UART: [rt] RT listening for mailbox commands...
3,114,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,183 UART: [rt]cmd =0x46504c54, len=4
3,145,493 >>> mbox cmd response data (8 bytes)
3,145,826 UART: [rt] FIPS self test
3,146,154 UART: [kat] ++
3,146,306 UART: [kat] sha1
3,150,516 UART: [kat] SHA2-256
3,152,538 UART: [kat] SHA2-384
3,153,638 UART: Fatal Error: 0x90020001
3,155,188 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,193 >>> mbox cmd response: failed
3,155,193 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,587 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
893,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,662 UART: [kat] ++
897,814 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,417 UART: [kat] HMAC-384Kdf
923,197 UART: [kat] LMS
1,171,525 UART: [kat] --
1,172,590 UART: [cold-reset] ++
1,173,162 UART: [fht] FHT @ 0x50003400
1,175,871 UART: [idev] ++
1,176,039 UART: [idev] CDI.KEYID = 6
1,176,399 UART: [idev] SUBJECT.KEYID = 7
1,176,823 UART: [idev] UDS.KEYID = 0
1,177,168 ready_for_fw is high
1,177,168 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,557 UART: [idev] Erasing UDS.KEYID = 0
1,201,762 UART: [idev] Sha1 KeyId Algorithm
1,210,430 UART: [idev] --
1,211,350 UART: [ldev] ++
1,211,518 UART: [ldev] CDI.KEYID = 6
1,211,881 UART: [ldev] SUBJECT.KEYID = 5
1,212,307 UART: [ldev] AUTHORITY.KEYID = 7
1,212,770 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,245,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,002 UART: [ldev] --
1,284,509 UART: [fwproc] Wait for Commands...
1,285,255 UART: [fwproc] Recv command 0x46574c44
1,285,983 UART: [fwproc] Recv'd Img size: 115224 bytes
2,594,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,651,192 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,788,393 >>> mbox cmd response: success
2,789,629 UART: [afmc] ++
2,789,797 UART: [afmc] CDI.KEYID = 6
2,790,159 UART: [afmc] SUBJECT.KEYID = 7
2,790,584 UART: [afmc] AUTHORITY.KEYID = 5
2,825,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,842,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,854,545 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,860,264 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,868,096 UART: [afmc] --
2,868,980 UART: [cold-reset] --
2,869,544 UART: [state] Locking Datavault
2,870,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,871,157 UART: [state] Locking ICCM
2,871,713 UART: [exit] Launching FMC @ 0x40000130
2,877,042 UART:
2,877,058 UART: Running Caliptra FMC ...
2,877,466 UART:
2,877,609 UART: [state] CFI Enabled
2,888,388 UART: [fht] FMC Alias Private Key: 7
2,995,947 UART: [art] Extend RT PCRs Done
2,996,375 UART: [art] Lock RT PCRs Done
2,998,161 UART: [art] Populate DV Done
3,006,520 UART: [fht] FMC Alias Private Key: 7
3,007,546 UART: [art] Derive CDI
3,007,826 UART: [art] Store in in slot 0x4
3,093,419 UART: [art] Derive Key Pair
3,093,779 UART: [art] Store priv key in slot 0x5
3,107,125 UART: [art] Derive Key Pair - Done
3,122,020 UART: [art] Signing Cert with AUTHO
3,122,500 UART: RITY.KEYID = 7
3,137,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,703 UART: [art] PUB.X = 5C04C979CA5DFF7DBD85D29A968612578EE08F797DF1D43B456A88146D1C30194B5565F8DE3E34128A31BED1C90999A0
3,145,471 UART: [art] PUB.Y = 7FA3BD7F6028011B141B749198B314B3FB11D2DA1D51A3A608E5D50DDC08044DA222E8D5FB32DF6B396CCB74D39C6A5C
3,152,420 UART: [art] SIG.R = 874AB6DF716D226A917A73F1AF6B5882C5985A5ED35013E29F01175F0372195944AA4DD2F7E60C2822B47D48DEB0E33F
3,159,183 UART: [art] SIG.S = A35E4DBBAB22DA7A7E294609B7D8004441D40F84F8AD0C3643A40060E47A21D75205534E93DCEE3D5F82A61BC9D897DA
3,183,636 UART: Caliptra RT
3,183,982 UART: [state] CFI Enabled
3,292,847 UART: [rt] RT listening for mailbox commands...
3,293,510 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,122 UART: [rt]cmd =0x46504c54, len=4
3,324,222 >>> mbox cmd response data (8 bytes)
3,324,345 UART: [rt] FIPS self test
3,324,673 UART: [kat] ++
3,324,825 UART: [kat] sha1
3,328,903 UART: [kat] SHA2-256
3,330,925 UART: [kat] SHA2-384
3,332,121 UART: Fatal Error: 0x90020001
3,333,671 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,676 >>> mbox cmd response: failed
3,333,676 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,333,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,465 UART: [idev] ++
1,175,633 UART: [idev] CDI.KEYID = 6
1,175,993 UART: [idev] SUBJECT.KEYID = 7
1,176,417 UART: [idev] UDS.KEYID = 0
1,176,762 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,531 UART: [idev] Erasing UDS.KEYID = 0
1,202,350 UART: [idev] Sha1 KeyId Algorithm
1,210,960 UART: [idev] --
1,212,192 UART: [ldev] ++
1,212,360 UART: [ldev] CDI.KEYID = 6
1,212,723 UART: [ldev] SUBJECT.KEYID = 5
1,213,149 UART: [ldev] AUTHORITY.KEYID = 7
1,213,612 UART: [ldev] FE.KEYID = 1
1,218,850 UART: [ldev] Erasing FE.KEYID = 1
1,244,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,260 UART: [ldev] --
1,283,597 UART: [fwproc] Wait for Commands...
1,284,267 UART: [fwproc] Recv command 0x46574c44
1,284,995 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,621,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,650,694 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,909 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,322 ready_for_fw is high
1,060,322 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,768 >>> mbox cmd response: success
2,700,432 UART:
2,700,448 UART: Running Caliptra FMC ...
2,700,856 UART:
2,700,999 UART: [state] CFI Enabled
2,711,842 UART: [fht] FMC Alias Private Key: 7
2,819,479 UART: [art] Extend RT PCRs Done
2,819,907 UART: [art] Lock RT PCRs Done
2,821,905 UART: [art] Populate DV Done
2,830,152 UART: [fht] FMC Alias Private Key: 7
2,831,252 UART: [art] Derive CDI
2,831,532 UART: [art] Store in in slot 0x4
2,917,283 UART: [art] Derive Key Pair
2,917,643 UART: [art] Store priv key in slot 0x5
2,931,711 UART: [art] Derive Key Pair - Done
2,946,567 UART: [art] Signing Cert with AUTHO
2,947,047 UART: RITY.KEYID = 7
2,962,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,348 UART: [art] PUB.X = A1B5D13828E296B9163A7BF274CE0B5C4035271E216BBAA0827747EC312F203267D0237F88FEE4C069B9E52940A0E2CF
2,970,117 UART: [art] PUB.Y = 05213CAD0A35C59BB6223CB7F86C78F73ACA73B169E7A256BE297CA3F056C3B927AB08406B938370C920DF9487123893
2,977,058 UART: [art] SIG.R = 5A67A557703BA77C074A8A7BA1ED4493E80F57433DEE5B9DFAE05C6DA40DF2992ACD6C028E83F24BA1F5E941CD06979E
2,983,829 UART: [art] SIG.S = BFFA8B7F131AE57C230965B6BC1C17C40123274E3580AD7CD01EE15D9C37075306CF4EE56ABA88EEE3C6B6E43DE084F0
3,007,374 UART: Caliptra RT
3,007,720 UART: [state] CFI Enabled
3,115,510 UART: [rt] RT listening for mailbox commands...
3,116,173 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,655 UART: [rt]cmd =0x46504c54, len=4
3,146,755 >>> mbox cmd response data (8 bytes)
3,147,002 UART: [rt] FIPS self test
3,147,330 UART: [kat] ++
3,147,482 UART: [kat] sha1
3,151,890 UART: [kat] SHA2-256
3,153,912 UART: [kat] SHA2-384
3,154,652 UART: Fatal Error: 0x90020001
3,156,202 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,156,207 >>> mbox cmd response: failed
3,156,207 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,156,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,518 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,870 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,559 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,174,593 ready_for_fw is high
1,174,593 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,242,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,139 UART: [fwproc] Recv command 0x46574c44
1,282,872 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,586 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,712 >>> mbox cmd response: success
2,784,773 UART: [afmc] ++
2,784,941 UART: [afmc] CDI.KEYID = 6
2,785,304 UART: [afmc] SUBJECT.KEYID = 7
2,785,730 UART: [afmc] AUTHORITY.KEYID = 5
2,821,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,384 UART: [afmc] --
2,864,266 UART: [cold-reset] --
2,865,396 UART: [state] Locking Datavault
2,866,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,891 UART: [state] Locking ICCM
2,867,497 UART: [exit] Launching FMC @ 0x40000130
2,872,826 UART:
2,872,842 UART: Running Caliptra FMC ...
2,873,250 UART:
2,873,304 UART: [state] CFI Enabled
2,883,709 UART: [fht] FMC Alias Private Key: 7
2,991,710 UART: [art] Extend RT PCRs Done
2,992,138 UART: [art] Lock RT PCRs Done
2,993,308 UART: [art] Populate DV Done
3,001,887 UART: [fht] FMC Alias Private Key: 7
3,002,881 UART: [art] Derive CDI
3,003,161 UART: [art] Store in in slot 0x4
3,089,278 UART: [art] Derive Key Pair
3,089,638 UART: [art] Store priv key in slot 0x5
3,103,234 UART: [art] Derive Key Pair - Done
3,117,947 UART: [art] Signing Cert with AUTHO
3,118,427 UART: RITY.KEYID = 7
3,133,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,430 UART: [art] PUB.X = 357E80CE109766915E37B41767E0CE184BA713A284E335592DC85250653D704E26A3D55D04670EA238C3A1BF50E908B4
3,141,183 UART: [art] PUB.Y = 0CBAD6F1E6B8AB1722387F5C3797AF34B06341CF1779ABA14383A2940A29F2DE610D77D7EB1F3864227D1C2EF3616AC5
3,148,132 UART: [art] SIG.R = D1B7C4700A965B3B7E7F08C0FA31539A81DD46730EB981BBCA8725F78715151315E04F900458597F9C54C04F1BF369D8
3,154,888 UART: [art] SIG.S = C0895B89E8E24333FF0DCB3F389C9EBB61D25482221CC49A81D0B1A7A72AA9D953428667ACDB3D4A5D064C94118DD85D
3,178,973 UART: Caliptra RT
3,179,227 UART: [state] CFI Enabled
3,286,966 UART: [rt] RT listening for mailbox commands...
3,287,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,367 UART: [rt]cmd =0x46504c54, len=4
3,318,565 >>> mbox cmd response data (8 bytes)
3,318,806 UART: [rt] FIPS self test
3,319,134 UART: [kat] ++
3,319,286 UART: [kat] sha1
3,323,420 UART: [kat] SHA2-256
3,325,442 UART: [kat] SHA2-384
3,326,502 UART: Fatal Error: 0x90020001
3,328,052 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,057 >>> mbox cmd response: failed
3,328,057 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,174,229 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,419 UART: [idev] Sha1 KeyId Algorithm
1,208,253 UART: [idev] --
1,209,424 UART: [ldev] ++
1,209,592 UART: [ldev] CDI.KEYID = 6
1,209,956 UART: [ldev] SUBJECT.KEYID = 5
1,210,383 UART: [ldev] AUTHORITY.KEYID = 7
1,210,846 UART: [ldev] FE.KEYID = 1
1,216,058 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,236 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,076 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,154 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,572 ready_for_fw is high
1,055,572 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,632,918 >>> mbox cmd response: success
2,695,130 UART:
2,695,146 UART: Running Caliptra FMC ...
2,695,554 UART:
2,695,608 UART: [state] CFI Enabled
2,706,051 UART: [fht] FMC Alias Private Key: 7
2,813,844 UART: [art] Extend RT PCRs Done
2,814,272 UART: [art] Lock RT PCRs Done
2,815,858 UART: [art] Populate DV Done
2,824,077 UART: [fht] FMC Alias Private Key: 7
2,825,243 UART: [art] Derive CDI
2,825,523 UART: [art] Store in in slot 0x4
2,911,290 UART: [art] Derive Key Pair
2,911,650 UART: [art] Store priv key in slot 0x5
2,924,654 UART: [art] Derive Key Pair - Done
2,939,278 UART: [art] Signing Cert with AUTHO
2,939,758 UART: RITY.KEYID = 7
2,955,150 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,915 UART: [art] PUB.X = 1324A9EFF39D37E7979D9D6F32F5BDA4818B4D713562ACCE9691578737BFAB40E8F6D99841F10316DBF7925EA3F1D44A
2,962,690 UART: [art] PUB.Y = A987D929FFAB994AADF4B3D2E51B06C2691AF5FC89640B8ECE9CC6AC014F78BEA19E48E535368DF6D177816CA9188B57
2,969,647 UART: [art] SIG.R = DFC27F1A6F0B1C4370E812DD993642F9A3E77C4880CB6DD8860D2B7FD72239A4D14D685E3AB0DAF9F0743C6BDA23A736
2,976,425 UART: [art] SIG.S = 52C58C4DD9FFAAB25D530BC2C20D9B23E1019F15E98AF2504068C731E70BF56496137FA7EEDEE79AE9F7F7D28AB1F5E0
3,000,404 UART: Caliptra RT
3,000,658 UART: [state] CFI Enabled
3,108,260 UART: [rt] RT listening for mailbox commands...
3,108,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,125 UART: [rt]cmd =0x46504c54, len=4
3,139,411 >>> mbox cmd response data (8 bytes)
3,139,768 UART: [rt] FIPS self test
3,140,096 UART: [kat] ++
3,140,248 UART: [kat] sha1
3,144,304 UART: [kat] SHA2-256
3,146,326 UART: [kat] SHA2-384
3,147,422 UART: Fatal Error: 0x90020001
3,148,972 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,148,977 >>> mbox cmd response: failed
3,148,977 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,148,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,430 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,633,906 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,775 UART: [kat] HMAC-384Kdf
921,443 UART: [kat] LMS
1,169,755 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,171,118 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,331 UART: [idev] SUBJECT.KEYID = 7
1,174,756 UART: [idev] UDS.KEYID = 0
1,175,102 ready_for_fw is high
1,175,102 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,208,694 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,455 UART: [ldev] Erasing FE.KEYID = 1
1,243,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,825 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,963 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,185 >>> mbox cmd response: success
2,787,302 UART: [afmc] ++
2,787,470 UART: [afmc] CDI.KEYID = 6
2,787,833 UART: [afmc] SUBJECT.KEYID = 7
2,788,259 UART: [afmc] AUTHORITY.KEYID = 5
2,824,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,527 UART: [afmc] --
2,867,523 UART: [cold-reset] --
2,868,215 UART: [state] Locking Datavault
2,869,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,918 UART: [state] Locking ICCM
2,870,436 UART: [exit] Launching FMC @ 0x40000130
2,875,765 UART:
2,875,781 UART: Running Caliptra FMC ...
2,876,189 UART:
2,876,332 UART: [state] CFI Enabled
2,887,077 UART: [fht] FMC Alias Private Key: 7
2,994,836 UART: [art] Extend RT PCRs Done
2,995,264 UART: [art] Lock RT PCRs Done
2,996,768 UART: [art] Populate DV Done
3,005,123 UART: [fht] FMC Alias Private Key: 7
3,006,233 UART: [art] Derive CDI
3,006,513 UART: [art] Store in in slot 0x4
3,091,980 UART: [art] Derive Key Pair
3,092,340 UART: [art] Store priv key in slot 0x5
3,104,788 UART: [art] Derive Key Pair - Done
3,119,381 UART: [art] Signing Cert with AUTHO
3,119,861 UART: RITY.KEYID = 7
3,135,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,462 UART: [art] PUB.X = 339979BD6E07EDEE1D7D3A24CC3B4070F385C2F16742E8A7216D8EB9DB5CD6BC811F1E96862947FAA2E8E3993EFCF4D5
3,143,245 UART: [art] PUB.Y = AFD2B15AC610162D54383F6ABE246A8FED40FEF38416CDB14482FACE9899A17DB69BF4B5FDB89549F353741AD596FA4E
3,150,213 UART: [art] SIG.R = C4A498CE7435D16E224154F056790F17C1CB3207EE5141A8DF7C41537B746D20AA46A75971107FBFD28F75F7EDD7617B
3,156,979 UART: [art] SIG.S = 544595A8267941230C23C666100BD54E7C82BDB9BF54E584B403EA853E98A2B65990074F149019D723018173763D085B
3,180,946 UART: Caliptra RT
3,181,292 UART: [state] CFI Enabled
3,288,642 UART: [rt] RT listening for mailbox commands...
3,289,305 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,803 UART: [rt]cmd =0x46504c54, len=4
3,319,863 >>> mbox cmd response data (8 bytes)
3,320,130 UART: [rt] FIPS self test
3,320,458 UART: [kat] ++
3,320,610 UART: [kat] sha1
3,324,630 UART: [kat] SHA2-256
3,326,652 UART: [kat] SHA2-384
3,327,540 UART: Fatal Error: 0x90020001
3,329,090 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,329,095 >>> mbox cmd response: failed
3,329,095 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,329,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,174,172 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,389 UART: [fwproc] Recv'd Img size: 115224 bytes
2,592,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,177 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,786,321 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,053 ready_for_fw is high
1,056,053 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,371 >>> mbox cmd response: success
2,698,401 UART:
2,698,417 UART: Running Caliptra FMC ...
2,698,825 UART:
2,698,968 UART: [state] CFI Enabled
2,709,611 UART: [fht] FMC Alias Private Key: 7
2,818,448 UART: [art] Extend RT PCRs Done
2,818,876 UART: [art] Lock RT PCRs Done
2,820,594 UART: [art] Populate DV Done
2,828,805 UART: [fht] FMC Alias Private Key: 7
2,829,799 UART: [art] Derive CDI
2,830,079 UART: [art] Store in in slot 0x4
2,915,816 UART: [art] Derive Key Pair
2,916,176 UART: [art] Store priv key in slot 0x5
2,929,764 UART: [art] Derive Key Pair - Done
2,944,500 UART: [art] Signing Cert with AUTHO
2,944,980 UART: RITY.KEYID = 7
2,960,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,329 UART: [art] PUB.X = A26F98C23532DBD5B556F9CFABF3FC3311567325329BD903EC8419CE2FA93AC015F2D2C50D85EE8EF04268556EC7D386
2,968,103 UART: [art] PUB.Y = 92F4E770BC5AA19AFDFE75FC087EBA2B8CDD8FC4E05C9B9AD640AB59003515C05D40B282D0B4F586460EA2A87ADA9832
2,975,045 UART: [art] SIG.R = DE6E89374678C9FC267EEACFAAF89621CA8E3F50B8A682214CC154C368A6BAB16564A88C48B29628BB86625488FD6394
2,981,821 UART: [art] SIG.S = 64F058D868CA40E793CD032E3DCD11EF13B4637E938894EBA130C7D30BCAC5976A994B8D36A622635999D7F32F74448F
3,005,742 UART: Caliptra RT
3,006,088 UART: [state] CFI Enabled
3,115,240 UART: [rt] RT listening for mailbox commands...
3,115,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,405 UART: [rt]cmd =0x46504c54, len=4
3,146,383 >>> mbox cmd response data (8 bytes)
3,146,588 UART: [rt] FIPS self test
3,146,916 UART: [kat] ++
3,147,068 UART: [kat] sha1
3,151,338 UART: [kat] SHA2-256
3,153,360 UART: [kat] SHA2-384
3,154,324 UART: Fatal Error: 0x90020001
3,155,874 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,879 >>> mbox cmd response: failed
3,155,879 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,884 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,161 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,007 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,693,987 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,838,306 >>> mbox cmd response: failed
2,838,873 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,982,148 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
4,878,129 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,452,545 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,690,684 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,834,785 >>> mbox cmd response: failed
2,835,363 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
2,978,584 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,864,026 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,434,873 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,052,020 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,196,217 >>> mbox cmd response: failed
3,196,809 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,340,016 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
21,574,038 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,018,095 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,040,194 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,184,273 >>> mbox cmd response: failed
3,184,836 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
3,327,903 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
21,584,534 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
35,027,524 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,693,919 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,838,454 >>> mbox cmd response: failed
2,839,020 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,982,653 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,463,038 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,264,789 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,698,597 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,843,327 >>> mbox cmd response: failed
2,843,908 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,987,580 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,481,546 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,324,571 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,710,313 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,855,040 >>> mbox cmd response: failed
2,855,603 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,999,247 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,428,949 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,247,939 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,048,920 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,193,380 >>> mbox cmd response: failed
3,193,938 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,337,410 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,162,917 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,866,444 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,052,609 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,197,129 >>> mbox cmd response: failed
3,197,730 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,341,343 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,180,300 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
30,884,175 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,779 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,787 >>> mbox cmd response: failed
811,787 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,397 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,064 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,839 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,847 >>> mbox cmd response: failed
811,847 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,696 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,560 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,568 >>> mbox cmd response: failed
811,568 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,574 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,182 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,331 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,626 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,634 >>> mbox cmd response: failed
811,634 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,372 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,648,385 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,137 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,145 >>> mbox cmd response: failed
811,145 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,535 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,872 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,529 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,537 >>> mbox cmd response: failed
811,537 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,383 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,652 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,160 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,168 >>> mbox cmd response: failed
812,168 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
812,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,406 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,739 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,724 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,732 >>> mbox cmd response: failed
811,732 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,808 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,915 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,243 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,251 >>> mbox cmd response: failed
811,251 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,359 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,646,152 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,583 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,591 >>> mbox cmd response: failed
811,591 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,411 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,644,947 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,788 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,796 >>> mbox cmd response: failed
811,796 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,802 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,364 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,647,675 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,230 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,238 >>> mbox cmd response: failed
811,238 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
811,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0bd55e68f3480bec963b2610b40b9761471fe78cddc24475daabae6e66a0b436627d4a98fa36031d6f7b6f8e6cc2503c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,546 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,645,853 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,225 UART:
192,598 UART: Running Caliptra ROM ...
193,746 UART:
193,897 UART: [state] CFI Enabled
265,566 UART: [state] LifecycleState = Unprovisioned
267,499 UART: [state] DebugLocked = No
269,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,756 UART: [kat] SHA2-256
444,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,992 UART: [kat] ++
455,470 UART: [kat] sha1
465,923 UART: [kat] SHA2-256
468,580 UART: [kat] SHA2-384
475,943 UART: [kat] SHA2-512-ACC
478,325 UART: [kat] ECC-384
2,768,259 UART: [kat] HMAC-384Kdf
2,801,031 UART: [kat] LMS
3,991,383 UART: [kat] --
3,995,242 UART: [cold-reset] ++
3,996,894 UART: [fht] Storing FHT @ 0x50003400
4,009,731 UART: [idev] ++
4,010,300 UART: [idev] CDI.KEYID = 6
4,011,188 UART: [idev] SUBJECT.KEYID = 7
4,012,439 UART: [idev] UDS.KEYID = 0
4,013,414 ready_for_fw is high
4,013,625 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,158,215 UART: [idev] Erasing UDS.KEYID = 0
7,347,720 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,156 UART: [idev] --
7,375,040 UART: [ldev] ++
7,375,677 UART: [ldev] CDI.KEYID = 6
7,376,591 UART: [ldev] SUBJECT.KEYID = 5
7,377,807 UART: [ldev] AUTHORITY.KEYID = 7
7,379,097 UART: [ldev] FE.KEYID = 1
7,422,217 UART: [ldev] Erasing FE.KEYID = 1
10,754,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,068 UART: [ldev] --
13,115,225 UART: [fwproc] Waiting for Commands...
13,117,212 UART: [fwproc] Received command 0x46574c44
13,119,441 UART: [fwproc] Received Image of size 114916 bytes
17,175,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,647,835 >>> mbox cmd response: success
17,651,989 UART: [afmc] ++
17,652,588 UART: [afmc] CDI.KEYID = 6
17,653,503 UART: [afmc] SUBJECT.KEYID = 7
17,654,723 UART: [afmc] AUTHORITY.KEYID = 5
21,013,170 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,127 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,379 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,963 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,625 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,095 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,708 UART: [afmc] --
23,382,167 UART: [cold-reset] --
23,385,433 UART: [state] Locking Datavault
23,390,211 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,911 UART: [state] Locking ICCM
23,394,654 UART: [exit] Launching FMC @ 0x40000130
23,402,994 UART:
23,403,238 UART: Running Caliptra FMC ...
23,404,343 UART:
23,404,508 UART: [state] CFI Enabled
23,472,499 UART: [fht] FMC Alias Private Key: 7
25,810,781 UART: [art] Extend RT PCRs Done
25,811,997 UART: [art] Lock RT PCRs Done
25,813,593 UART: [art] Populate DV Done
25,819,004 UART: [fht] FMC Alias Private Key: 7
25,820,551 UART: [art] Derive CDI
25,821,365 UART: [art] Store in in slot 0x4
25,881,755 UART: [art] Derive Key Pair
25,882,758 UART: [art] Store priv key in slot 0x5
29,176,101 UART: [art] Derive Key Pair - Done
29,189,263 UART: [art] Signing Cert with AUTHO
29,190,566 UART: RITY.KEYID = 7
31,477,756 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,258 UART: [art] PUB.X = 4EC33EF4D53E4D50E00157320D42D78901E27593583B9B1B3F11C955A1578A61A9926740D4061494BDE9FA2DA1CACCA7
31,486,695 UART: [art] PUB.Y = CCF59A814056C571C11F0A93BFC6B1C5F53D8EAB6AC32F5C95015849C2A4F0F864DB5768D37C5BFCABD62C7477230ABD
31,493,761 UART: [art] SIG.R = 28D7D46B7445F62EC6274754AF8C80DD24F44CF9C3F1677719DB1BA620E7805295D8D560135A4579A0A17B58C17FD04F
31,501,125 UART: [art] SIG.S = C9B722B64ECD4BAE07DF55C39CA65B6F07F4DED5FE4F02558300EBE3596F3ECEB52FE874FA5C69C9446499A863EA4839
32,806,878 UART: Caliptra RT
32,807,578 UART: [state] CFI Enabled
32,969,340 UART: [rt] RT listening for mailbox commands...
32,971,188 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,000,700 UART: [rt]cmd =0x46504c54, len=4
33,002,440 >>> mbox cmd response data (8 bytes)
33,003,794 UART: [rt] FIPS self test
33,004,739 UART: [kat] ++
33,005,210 UART: [kat] sha1
33,009,594 UART: [kat] SHA2-256
33,011,527 UART: [kat] SHA2-384
33,013,611 UART: Fatal Error: 0x90020002
33,048,817 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,193,145 >>> mbox cmd response: failed
33,193,797 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,338,095 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
189,994 UART:
190,300 UART: Running Caliptra ROM ...
191,329 UART:
191,471 UART: [state] CFI Enabled
251,001 UART: [state] LifecycleState = Unprovisioned
252,924 UART: [state] DebugLocked = No
255,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,131 UART: [kat] SHA2-256
428,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,353 UART: [kat] ++
439,795 UART: [kat] sha1
451,647 UART: [kat] SHA2-256
454,380 UART: [kat] SHA2-384
460,893 UART: [kat] SHA2-512-ACC
463,236 UART: [kat] ECC-384
2,757,604 UART: [kat] HMAC-384Kdf
2,787,502 UART: [kat] LMS
3,977,802 UART: [kat] --
3,982,819 UART: [cold-reset] ++
3,983,723 UART: [fht] Storing FHT @ 0x50003400
3,994,628 UART: [idev] ++
3,995,238 UART: [idev] CDI.KEYID = 6
3,996,146 UART: [idev] SUBJECT.KEYID = 7
3,997,424 UART: [idev] UDS.KEYID = 0
3,998,915 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,143,216 UART: [idev] Erasing UDS.KEYID = 0
7,336,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,707 UART: [idev] --
7,361,898 UART: [ldev] ++
7,362,483 UART: [ldev] CDI.KEYID = 6
7,363,507 UART: [ldev] SUBJECT.KEYID = 5
7,364,612 UART: [ldev] AUTHORITY.KEYID = 7
7,365,899 UART: [ldev] FE.KEYID = 1
7,410,300 UART: [ldev] Erasing FE.KEYID = 1
10,742,903 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,057,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,072,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,087,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,101,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,120,802 UART: [ldev] --
13,125,591 UART: [fwproc] Waiting for Commands...
13,127,310 UART: [fwproc] Received command 0x46574c44
13,129,563 UART: [fwproc] Received Image of size 114916 bytes
17,190,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,162 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,656,891 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,803,995 ready_for_fw is high
3,804,556 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,871,016 >>> mbox cmd response: success
23,565,273 UART:
23,565,712 UART: Running Caliptra FMC ...
23,566,835 UART:
23,566,996 UART: [state] CFI Enabled
23,634,784 UART: [fht] FMC Alias Private Key: 7
25,972,627 UART: [art] Extend RT PCRs Done
25,973,857 UART: [art] Lock RT PCRs Done
25,975,760 UART: [art] Populate DV Done
25,981,505 UART: [fht] FMC Alias Private Key: 7
25,983,215 UART: [art] Derive CDI
25,984,033 UART: [art] Store in in slot 0x4
26,042,871 UART: [art] Derive Key Pair
26,043,921 UART: [art] Store priv key in slot 0x5
29,337,194 UART: [art] Derive Key Pair - Done
29,350,359 UART: [art] Signing Cert with AUTHO
29,351,698 UART: RITY.KEYID = 7
31,638,546 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,058 UART: [art] PUB.X = 8B1800D20576ABD80911602502DA8CFE0AC9D2E71CF0BD576D8785BF7DF4AF5A55FE62B2AC5C5D42A6E35970945292CF
31,647,335 UART: [art] PUB.Y = A8A1A2B9D695222DF00D16F0A2CEBA98A1A903AB5E6A2672DB030A2E959641775F6A4B05C376AC6EF230EEFD094768C5
31,654,597 UART: [art] SIG.R = A7D8D46420B4EDB6EB6693DC2DCA2CAC38F4CD33E6018EBB472B9B3B2D21B4777372F458EFDFA3B5FD4CD31B19F29F73
31,662,002 UART: [art] SIG.S = 06B5F91F9F0ED86BCE1C83C63E3912FA934203CB577375D7877AA6C9AF5880B203836455CEADC9CC30359A9E09D36C78
32,966,869 UART: Caliptra RT
32,967,580 UART: [state] CFI Enabled
33,130,153 UART: [rt] RT listening for mailbox commands...
33,132,017 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,161,780 UART: [rt]cmd =0x46504c54, len=4
33,163,362 >>> mbox cmd response data (8 bytes)
33,164,370 UART: [rt] FIPS self test
33,165,318 UART: [kat] ++
33,165,790 UART: [kat] sha1
33,170,176 UART: [kat] SHA2-256
33,172,058 UART: [kat] SHA2-384
33,174,383 UART: Fatal Error: 0x90020002
33,209,799 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,354,201 >>> mbox cmd response: failed
33,354,852 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,498,959 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,794,803 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,896,886 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,476 UART:
192,843 UART: Running Caliptra ROM ...
194,356 UART:
603,854 UART: [state] CFI Enabled
619,928 UART: [state] LifecycleState = Unprovisioned
621,870 UART: [state] DebugLocked = No
623,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,423 UART: [kat] SHA2-256
797,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,722 UART: [kat] ++
808,166 UART: [kat] sha1
819,721 UART: [kat] SHA2-256
822,381 UART: [kat] SHA2-384
828,951 UART: [kat] SHA2-512-ACC
831,324 UART: [kat] ECC-384
3,116,348 UART: [kat] HMAC-384Kdf
3,129,090 UART: [kat] LMS
4,319,212 UART: [kat] --
4,322,168 UART: [cold-reset] ++
4,323,115 UART: [fht] Storing FHT @ 0x50003400
4,333,667 UART: [idev] ++
4,334,234 UART: [idev] CDI.KEYID = 6
4,335,228 UART: [idev] SUBJECT.KEYID = 7
4,336,427 UART: [idev] UDS.KEYID = 0
4,337,500 ready_for_fw is high
4,337,747 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,483,533 UART: [idev] Erasing UDS.KEYID = 0
7,623,795 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,317 UART: [idev] --
7,649,676 UART: [ldev] ++
7,650,258 UART: [ldev] CDI.KEYID = 6
7,651,275 UART: [ldev] SUBJECT.KEYID = 5
7,652,433 UART: [ldev] AUTHORITY.KEYID = 7
7,653,661 UART: [ldev] FE.KEYID = 1
7,663,658 UART: [ldev] Erasing FE.KEYID = 1
10,954,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,424 UART: [ldev] --
13,312,664 UART: [fwproc] Waiting for Commands...
13,314,488 UART: [fwproc] Received command 0x46574c44
13,316,690 UART: [fwproc] Received Image of size 114916 bytes
17,384,220 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,461,864 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,530,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,851,238 >>> mbox cmd response: success
17,855,170 UART: [afmc] ++
17,855,765 UART: [afmc] CDI.KEYID = 6
17,856,782 UART: [afmc] SUBJECT.KEYID = 7
17,857,942 UART: [afmc] AUTHORITY.KEYID = 5
21,171,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,465,795 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,056 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,482,443 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,265 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,511,685 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,979 UART: [afmc] --
23,535,243 UART: [cold-reset] --
23,538,558 UART: [state] Locking Datavault
23,543,963 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,715 UART: [state] Locking ICCM
23,548,189 UART: [exit] Launching FMC @ 0x40000130
23,556,587 UART:
23,556,874 UART: Running Caliptra FMC ...
23,557,986 UART:
23,558,149 UART: [state] CFI Enabled
23,566,034 UART: [fht] FMC Alias Private Key: 7
25,896,650 UART: [art] Extend RT PCRs Done
25,897,874 UART: [art] Lock RT PCRs Done
25,899,766 UART: [art] Populate DV Done
25,905,020 UART: [fht] FMC Alias Private Key: 7
25,906,623 UART: [art] Derive CDI
25,907,443 UART: [art] Store in in slot 0x4
25,949,820 UART: [art] Derive Key Pair
25,950,819 UART: [art] Store priv key in slot 0x5
29,193,120 UART: [art] Derive Key Pair - Done
29,206,094 UART: [art] Signing Cert with AUTHO
29,207,405 UART: RITY.KEYID = 7
31,486,861 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,728 UART: [art] PUB.X = 1249CAB9ADB9E4480BE1FFBAABC48A4C84401EC6AE0EE126C80D38F7E72A4D0917D7153EAEA1486B611ECBF2DE8CFFDE
31,495,631 UART: [art] PUB.Y = D3BBAD257CA3EF310F427C849EB9D2853B1F66DD1F60DF15951D28557A67417D9782B837FC218F487AEAF2EE255490A2
31,502,876 UART: [art] SIG.R = 61AF98929BE8AA44657D88443D6E1D2B5E9D29279BAD1F504EEFBC1F851F06C2EA0DD11B998AB041A9911DD10DAF06F7
31,510,279 UART: [art] SIG.S = 7C1E82B124C8C18FECA8A2DE7654BCA8081EFDB47DCF11B405DA6CC39E580DEF0CFCD71662814BDCE39930E2284C46E1
32,814,916 UART: Caliptra RT
32,815,642 UART: [state] CFI Enabled
32,932,730 UART: [rt] RT listening for mailbox commands...
32,934,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,964,351 UART: [rt]cmd =0x46504c54, len=4
32,965,722 >>> mbox cmd response data (8 bytes)
32,966,768 UART: [rt] FIPS self test
32,967,707 UART: [kat] ++
32,968,153 UART: [kat] sha1
32,972,390 UART: [kat] SHA2-256
32,974,325 UART: [kat] SHA2-384
32,976,634 UART: Fatal Error: 0x90020002
33,012,025 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,156,371 >>> mbox cmd response: failed
33,157,026 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,301,127 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,138 UART:
190,421 UART: Running Caliptra ROM ...
191,533 UART:
7,234,210 UART: [state] CFI Enabled
7,246,272 UART: [state] LifecycleState = Unprovisioned
7,248,198 UART: [state] DebugLocked = No
7,249,863 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,254,280 UART: [kat] SHA2-256
7,424,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,434,581 UART: [kat] ++
7,435,042 UART: [kat] sha1
7,445,553 UART: [kat] SHA2-256
7,448,242 UART: [kat] SHA2-384
7,453,347 UART: [kat] SHA2-512-ACC
7,455,726 UART: [kat] ECC-384
9,738,408 UART: [kat] HMAC-384Kdf
9,750,166 UART: [kat] LMS
10,940,259 UART: [kat] --
10,944,859 UART: [cold-reset] ++
10,946,519 UART: [fht] Storing FHT @ 0x50003400
10,957,403 UART: [idev] ++
10,957,971 UART: [idev] CDI.KEYID = 6
10,958,938 UART: [idev] SUBJECT.KEYID = 7
10,960,151 UART: [idev] UDS.KEYID = 0
10,961,731 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
11,105,984 UART: [idev] Erasing UDS.KEYID = 0
14,253,995 UART: [idev] Using Sha1 for KeyId Algorithm
14,275,055 UART: [idev] --
14,279,051 UART: [ldev] ++
14,279,624 UART: [ldev] CDI.KEYID = 6
14,280,564 UART: [ldev] SUBJECT.KEYID = 5
14,281,834 UART: [ldev] AUTHORITY.KEYID = 7
14,283,002 UART: [ldev] FE.KEYID = 1
14,293,139 UART: [ldev] Erasing FE.KEYID = 1
17,582,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,874,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,918,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,937,711 UART: [ldev] --
19,942,472 UART: [fwproc] Waiting for Commands...
19,945,875 UART: [fwproc] Received command 0x46574c44
19,948,066 UART: [fwproc] Received Image of size 114916 bytes
24,008,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,083,595 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,152,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
24,473,358 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,125,644 ready_for_fw is high
4,126,267 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,092,989 >>> mbox cmd response: success
23,741,938 UART:
23,742,327 UART: Running Caliptra FMC ...
23,743,446 UART:
23,743,613 UART: [state] CFI Enabled
23,751,662 UART: [fht] FMC Alias Private Key: 7
26,081,915 UART: [art] Extend RT PCRs Done
26,083,144 UART: [art] Lock RT PCRs Done
26,084,723 UART: [art] Populate DV Done
26,090,154 UART: [fht] FMC Alias Private Key: 7
26,091,805 UART: [art] Derive CDI
26,092,629 UART: [art] Store in in slot 0x4
26,135,279 UART: [art] Derive Key Pair
26,136,328 UART: [art] Store priv key in slot 0x5
29,378,623 UART: [art] Derive Key Pair - Done
29,391,625 UART: [art] Signing Cert with AUTHO
29,392,925 UART: RITY.KEYID = 7
31,672,538 UART: [art] Erasing AUTHORITY.KEYID = 7
31,674,058 UART: [art] PUB.X = C3E45C220A25452212ECECAF04C9DD3CD35CD737921E3B3A986DF61FA0733C7BD557222D49E55C201079224B73F531BC
31,681,322 UART: [art] PUB.Y = A13DF7C4C4F913D50D6BE2B45AAE402A18DCE8635EB6CE2622116BEB712E8B450B0E963A33C52D8FE50E1135E3067654
31,688,558 UART: [art] SIG.R = 6BB42E45ADAE3CFD466766D45FF6CB82D6256A00346DC7D0B9B8C1A08C96420A35094BEC2B3562598E327369058FEA79
31,695,897 UART: [art] SIG.S = CED1E61B35CDBF8DAD2ECFE4770F6405F7EAD55ABEB223ECDCF9338309977703B7F5E6947C6A1A19F7CACB809D982478
33,001,796 UART: Caliptra RT
33,002,497 UART: [state] CFI Enabled
33,120,777 UART: [rt] RT listening for mailbox commands...
33,122,633 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,152,365 UART: [rt]cmd =0x46504c54, len=4
33,154,160 >>> mbox cmd response data (8 bytes)
33,155,110 UART: [rt] FIPS self test
33,156,052 UART: [kat] ++
33,156,525 UART: [kat] sha1
33,160,772 UART: [kat] SHA2-256
33,162,700 UART: [kat] SHA2-384
33,164,849 UART: Fatal Error: 0x90020002
33,200,243 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,344,578 >>> mbox cmd response: failed
33,345,205 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
33,489,735 >>> mbox cmd response: failed
Initializing fuses
1,101 writing to cptra_bootfsm_go
10,567,356 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
24,533,379 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,273 UART:
192,800 UART: Running Caliptra ROM ...
194,043 UART:
194,210 UART: [state] CFI Enabled
265,563 UART: [state] LifecycleState = Unprovisioned
267,427 UART: [state] DebugLocked = No
268,958 UART: [state] WD Timer not started. Device not locked for debugging
272,606 UART: [kat] SHA2-256
451,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,292 UART: [kat] ++
463,749 UART: [kat] sha1
475,605 UART: [kat] SHA2-256
478,617 UART: [kat] SHA2-384
485,604 UART: [kat] SHA2-512-ACC
488,552 UART: [kat] ECC-384
2,948,355 UART: [kat] HMAC-384Kdf
2,971,921 UART: [kat] LMS
3,501,363 UART: [kat] --
3,504,745 UART: [cold-reset] ++
3,506,544 UART: [fht] FHT @ 0x50003400
3,517,310 UART: [idev] ++
3,517,876 UART: [idev] CDI.KEYID = 6
3,518,791 UART: [idev] SUBJECT.KEYID = 7
3,519,969 UART: [idev] UDS.KEYID = 0
3,520,894 ready_for_fw is high
3,521,125 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,666,142 UART: [idev] Erasing UDS.KEYID = 0
6,027,599 UART: [idev] Sha1 KeyId Algorithm
6,049,750 UART: [idev] --
6,054,204 UART: [ldev] ++
6,054,786 UART: [ldev] CDI.KEYID = 6
6,055,701 UART: [ldev] SUBJECT.KEYID = 5
6,056,864 UART: [ldev] AUTHORITY.KEYID = 7
6,058,095 UART: [ldev] FE.KEYID = 1
6,098,899 UART: [ldev] Erasing FE.KEYID = 1
8,605,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,844 UART: [ldev] --
10,414,134 UART: [fwproc] Wait for Commands...
10,416,070 UART: [fwproc] Recv command 0x46574c44
10,418,170 UART: [fwproc] Recv'd Img size: 115224 bytes
13,833,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,935 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,293,768 >>> mbox cmd response: success
14,298,212 UART: [afmc] ++
14,298,803 UART: [afmc] CDI.KEYID = 6
14,299,733 UART: [afmc] SUBJECT.KEYID = 7
14,300,841 UART: [afmc] AUTHORITY.KEYID = 5
16,828,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,136 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,794 UART: [afmc] --
18,631,363 UART: [cold-reset] --
18,636,520 UART: [state] Locking Datavault
18,640,791 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,437 UART: [state] Locking ICCM
18,643,454 UART: [exit] Launching FMC @ 0x40000130
18,651,848 UART:
18,652,087 UART: Running Caliptra FMC ...
18,653,214 UART:
18,653,374 UART: [state] CFI Enabled
18,711,734 UART: [fht] FMC Alias Private Key: 7
20,475,770 UART: [art] Extend RT PCRs Done
20,476,994 UART: [art] Lock RT PCRs Done
20,478,624 UART: [art] Populate DV Done
20,484,038 UART: [fht] FMC Alias Private Key: 7
20,485,526 UART: [art] Derive CDI
20,486,285 UART: [art] Store in in slot 0x4
20,544,789 UART: [art] Derive Key Pair
20,545,832 UART: [art] Store priv key in slot 0x5
23,008,638 UART: [art] Derive Key Pair - Done
23,021,704 UART: [art] Signing Cert with AUTHO
23,023,008 UART: RITY.KEYID = 7
24,734,121 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,625 UART: [art] PUB.X = B27DBECF3ABB1B0A87933F68A08167CD0F9C2807718071144FA62B9B00F6B6192E283A60C8D24E8FFC6FF933EAEAAD2E
24,742,896 UART: [art] PUB.Y = 52DEEDCC5E7C4F4BB871A9EA262AB1C59A656E2D6A86195ADF48EDFC40B73EC5FCD7663CF117E3A0B747AC94D9168667
24,750,197 UART: [art] SIG.R = BE8C1AF943300A3FF532209267789D136FA4654C2CBD58B859F114148AFC084DC2E1FEF196FA9F2830306ABC76B9F7E7
24,757,639 UART: [art] SIG.S = A4F3052A905A06325793D8689F316F3B102B71FD23086ED7687A2397A5715FEEE137D287442E764C4BC7E5D6A89B6E63
25,736,673 UART: Caliptra RT
25,737,385 UART: [state] CFI Enabled
25,901,046 UART: [rt] RT listening for mailbox commands...
25,902,904 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,932,628 UART: [rt]cmd =0x46504c54, len=4
25,934,371 >>> mbox cmd response data (8 bytes)
25,935,477 UART: [rt] FIPS self test
25,936,414 UART: [kat] ++
25,936,862 UART: [kat] sha1
25,941,428 UART: [kat] SHA2-256
25,943,362 UART: [kat] SHA2-384
25,945,461 UART: Fatal Error: 0x90020002
25,980,832 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,125,639 >>> mbox cmd response: failed
26,126,210 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,270,671 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,006 UART:
190,298 UART: Running Caliptra ROM ...
191,325 UART:
191,465 UART: [state] CFI Enabled
250,546 UART: [state] LifecycleState = Unprovisioned
252,397 UART: [state] DebugLocked = No
255,091 UART: [state] WD Timer not started. Device not locked for debugging
258,507 UART: [kat] SHA2-256
437,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
449,215 UART: [kat] ++
449,660 UART: [kat] sha1
461,144 UART: [kat] SHA2-256
464,204 UART: [kat] SHA2-384
470,552 UART: [kat] SHA2-512-ACC
473,489 UART: [kat] ECC-384
2,916,005 UART: [kat] HMAC-384Kdf
2,939,262 UART: [kat] LMS
3,468,718 UART: [kat] --
3,473,136 UART: [cold-reset] ++
3,474,204 UART: [fht] FHT @ 0x50003400
3,484,726 UART: [idev] ++
3,485,284 UART: [idev] CDI.KEYID = 6
3,486,167 UART: [idev] SUBJECT.KEYID = 7
3,487,383 UART: [idev] UDS.KEYID = 0
3,489,052 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,325 UART: [idev] Erasing UDS.KEYID = 0
5,997,909 UART: [idev] Sha1 KeyId Algorithm
6,020,020 UART: [idev] --
6,023,673 UART: [ldev] ++
6,024,258 UART: [ldev] CDI.KEYID = 6
6,025,144 UART: [ldev] SUBJECT.KEYID = 5
6,026,363 UART: [ldev] AUTHORITY.KEYID = 7
6,027,600 UART: [ldev] FE.KEYID = 1
6,068,894 UART: [ldev] Erasing FE.KEYID = 1
8,574,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,545 UART: [ldev] --
10,382,942 UART: [fwproc] Wait for Commands...
10,386,007 UART: [fwproc] Recv command 0x46574c44
10,388,060 UART: [fwproc] Recv'd Img size: 115224 bytes
13,793,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,861,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,069 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,251,973 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,113 UART:
192,502 UART: Running Caliptra ROM ...
193,608 UART:
193,749 UART: [state] CFI Enabled
264,792 UART: [state] LifecycleState = Unprovisioned
267,164 UART: [state] DebugLocked = No
268,946 UART: [state] WD Timer not started. Device not locked for debugging
272,921 UART: [kat] SHA2-256
462,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,572 UART: [kat] ++
474,050 UART: [kat] sha1
487,136 UART: [kat] SHA2-256
490,151 UART: [kat] SHA2-384
496,927 UART: [kat] SHA2-512-ACC
499,485 UART: [kat] ECC-384
2,948,410 UART: [kat] HMAC-384Kdf
2,973,086 UART: [kat] LMS
3,504,866 UART: [kat] --
3,509,576 UART: [cold-reset] ++
3,511,086 UART: [fht] FHT @ 0x50003400
3,521,013 UART: [idev] ++
3,521,734 UART: [idev] CDI.KEYID = 6
3,522,645 UART: [idev] SUBJECT.KEYID = 7
3,523,821 UART: [idev] UDS.KEYID = 0
3,524,772 ready_for_fw is high
3,525,004 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,670,026 UART: [idev] Erasing UDS.KEYID = 0
6,031,387 UART: [idev] Sha1 KeyId Algorithm
6,054,044 UART: [idev] --
6,059,236 UART: [ldev] ++
6,059,924 UART: [ldev] CDI.KEYID = 6
6,060,837 UART: [ldev] SUBJECT.KEYID = 5
6,062,003 UART: [ldev] AUTHORITY.KEYID = 7
6,063,241 UART: [ldev] FE.KEYID = 1
6,101,900 UART: [ldev] Erasing FE.KEYID = 1
8,609,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,763 UART: [ldev] --
10,415,360 UART: [fwproc] Wait for Commands...
10,418,586 UART: [fwproc] Recv command 0x46574c44
10,420,857 UART: [fwproc] Recv'd Img size: 115224 bytes
13,880,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,073,250 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,621,552 >>> mbox cmd response: success
14,625,746 UART: [afmc] ++
14,626,444 UART: [afmc] CDI.KEYID = 6
14,627,678 UART: [afmc] SUBJECT.KEYID = 7
14,629,109 UART: [afmc] AUTHORITY.KEYID = 5
17,172,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,916,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,918,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,933,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,948,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,963,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,988,765 UART: [afmc] --
18,991,676 UART: [cold-reset] --
18,996,795 UART: [state] Locking Datavault
19,002,908 UART: [state] Locking PCR0, PCR1 and PCR31
19,005,047 UART: [state] Locking ICCM
19,006,879 UART: [exit] Launching FMC @ 0x40000130
19,015,550 UART:
19,015,798 UART: Running Caliptra FMC ...
19,016,901 UART:
19,017,071 UART: [state] CFI Enabled
19,073,033 UART: [fht] FMC Alias Private Key: 7
20,836,715 UART: [art] Extend RT PCRs Done
20,837,923 UART: [art] Lock RT PCRs Done
20,839,764 UART: [art] Populate DV Done
20,845,250 UART: [fht] FMC Alias Private Key: 7
20,846,907 UART: [art] Derive CDI
20,847,653 UART: [art] Store in in slot 0x4
20,905,018 UART: [art] Derive Key Pair
20,906,059 UART: [art] Store priv key in slot 0x5
23,369,735 UART: [art] Derive Key Pair - Done
23,382,589 UART: [art] Signing Cert with AUTHO
23,383,924 UART: RITY.KEYID = 7
25,096,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,675 UART: [art] PUB.X = F960FF4828D5E68D7432CF3BAD86319D49DA5DEB3C8CC3C328F942FE7477459F191299FDB6CB204C30D6783E49ECA2E7
25,104,937 UART: [art] PUB.Y = 0435CEF4FB7BA69DAEE7A260333158E54D4C9B5F7B5D7B4645498A9714F1E88B238388E27CB4A0AB96AC24FDDC3E056D
25,112,177 UART: [art] SIG.R = EA90C7BA1CDD729AB452DFEC3DD6A8BB56420206187BF143953DCFE8B6ABBF7EE322985B4CFBEDE15A89BF04AE8E00F3
25,119,581 UART: [art] SIG.S = 5E718DB988E7D493FA244549AC478C18C9E1081CFA097D7D8332B471A376AEB2AAC5B4979185AB44253830B9700C899C
26,098,319 UART: Caliptra RT
26,099,051 UART: [state] CFI Enabled
26,265,000 UART: [rt] RT listening for mailbox commands...
26,266,874 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,296,512 UART: [rt]cmd =0x46504c54, len=4
26,298,043 >>> mbox cmd response data (8 bytes)
26,299,342 UART: [rt] FIPS self test
26,300,287 UART: [kat] ++
26,300,739 UART: [kat] sha1
26,305,190 UART: [kat] SHA2-256
26,307,114 UART: [kat] SHA2-384
26,309,268 UART: Fatal Error: 0x90020002
26,344,648 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,489,234 >>> mbox cmd response: failed
26,489,882 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,634,516 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,022 UART:
190,332 UART: Running Caliptra ROM ...
191,448 UART:
191,599 UART: [state] CFI Enabled
251,222 UART: [state] LifecycleState = Unprovisioned
253,547 UART: [state] DebugLocked = No
254,919 UART: [state] WD Timer not started. Device not locked for debugging
260,335 UART: [kat] SHA2-256
450,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,013 UART: [kat] ++
461,548 UART: [kat] sha1
471,568 UART: [kat] SHA2-256
474,574 UART: [kat] SHA2-384
480,173 UART: [kat] SHA2-512-ACC
482,729 UART: [kat] ECC-384
2,934,966 UART: [kat] HMAC-384Kdf
2,957,627 UART: [kat] LMS
3,489,391 UART: [kat] --
3,493,285 UART: [cold-reset] ++
3,495,816 UART: [fht] FHT @ 0x50003400
3,508,147 UART: [idev] ++
3,508,819 UART: [idev] CDI.KEYID = 6
3,509,758 UART: [idev] SUBJECT.KEYID = 7
3,510,972 UART: [idev] UDS.KEYID = 0
3,512,461 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,657,310 UART: [idev] Erasing UDS.KEYID = 0
6,013,675 UART: [idev] Sha1 KeyId Algorithm
6,037,289 UART: [idev] --
6,041,260 UART: [ldev] ++
6,041,956 UART: [ldev] CDI.KEYID = 6
6,042,843 UART: [ldev] SUBJECT.KEYID = 5
6,044,008 UART: [ldev] AUTHORITY.KEYID = 7
6,045,246 UART: [ldev] FE.KEYID = 1
6,086,299 UART: [ldev] Erasing FE.KEYID = 1
8,593,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,433 UART: [ldev] --
10,402,729 UART: [fwproc] Wait for Commands...
10,405,153 UART: [fwproc] Recv command 0x46574c44
10,407,409 UART: [fwproc] Recv'd Img size: 115224 bytes
13,865,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,355 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,603,515 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,439,895 ready_for_fw is high
3,440,363 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,732,655 >>> mbox cmd response: success
19,028,862 UART:
19,029,261 UART: Running Caliptra FMC ...
19,030,427 UART:
19,030,597 UART: [state] CFI Enabled
19,095,413 UART: [fht] FMC Alias Private Key: 7
20,858,825 UART: [art] Extend RT PCRs Done
20,860,049 UART: [art] Lock RT PCRs Done
20,861,625 UART: [art] Populate DV Done
20,866,997 UART: [fht] FMC Alias Private Key: 7
20,868,650 UART: [art] Derive CDI
20,869,473 UART: [art] Store in in slot 0x4
20,927,301 UART: [art] Derive Key Pair
20,928,343 UART: [art] Store priv key in slot 0x5
23,391,574 UART: [art] Derive Key Pair - Done
23,404,543 UART: [art] Signing Cert with AUTHO
23,405,851 UART: RITY.KEYID = 7
25,117,156 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,822 UART: [art] PUB.X = EB23F811641FD42D3097DF9B2772AAC407441AFFFD32F8E43C67E6260BE4F24A05C14E0EC019501F6F94FDE7B949A39E
25,125,943 UART: [art] PUB.Y = 1737012BD841C53B3595A519C4F996C06AF00BE2133FCA6029AC689A70A90FB3782E242C02BA9867413715895A376BB7
25,133,170 UART: [art] SIG.R = 516C26D16928664E46E41FB7DB9ED446E0AE01E4E4CAD215A4C67B9CF4ED40D9B4EF8F40670C8A786A78B9C5BE57EFDF
25,140,569 UART: [art] SIG.S = 9C77DC2CAE6E1A382BD4C15FC6AE552A3B6F4AF9951BAE4175F8D2D9235EF86DAA8DB0D98F0988D2476A251ADBE58A2D
26,119,903 UART: Caliptra RT
26,120,594 UART: [state] CFI Enabled
26,285,086 UART: [rt] RT listening for mailbox commands...
26,286,941 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,316,502 UART: [rt]cmd =0x46504c54, len=4
26,318,191 >>> mbox cmd response data (8 bytes)
26,319,614 UART: [rt] FIPS self test
26,320,583 UART: [kat] ++
26,321,036 UART: [kat] sha1
26,325,621 UART: [kat] SHA2-256
26,327,508 UART: [kat] SHA2-384
26,330,015 UART: Fatal Error: 0x90020002
26,365,231 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,510,337 >>> mbox cmd response: failed
26,510,993 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,655,634 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,427,405 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,749,603 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,748 UART:
193,109 UART: Running Caliptra ROM ...
194,250 UART:
603,853 UART: [state] CFI Enabled
621,855 UART: [state] LifecycleState = Unprovisioned
624,230 UART: [state] DebugLocked = No
625,765 UART: [state] WD Timer not started. Device not locked for debugging
629,453 UART: [kat] SHA2-256
819,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,113 UART: [kat] ++
830,719 UART: [kat] sha1
842,402 UART: [kat] SHA2-256
845,418 UART: [kat] SHA2-384
850,768 UART: [kat] SHA2-512-ACC
853,358 UART: [kat] ECC-384
3,298,309 UART: [kat] HMAC-384Kdf
3,310,829 UART: [kat] LMS
3,842,632 UART: [kat] --
3,847,549 UART: [cold-reset] ++
3,848,488 UART: [fht] FHT @ 0x50003400
3,859,820 UART: [idev] ++
3,860,560 UART: [idev] CDI.KEYID = 6
3,861,451 UART: [idev] SUBJECT.KEYID = 7
3,862,698 UART: [idev] UDS.KEYID = 0
3,863,898 ready_for_fw is high
3,864,106 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
4,008,803 UART: [idev] Erasing UDS.KEYID = 0
6,342,765 UART: [idev] Sha1 KeyId Algorithm
6,364,476 UART: [idev] --
6,368,897 UART: [ldev] ++
6,369,574 UART: [ldev] CDI.KEYID = 6
6,370,492 UART: [ldev] SUBJECT.KEYID = 5
6,371,651 UART: [ldev] AUTHORITY.KEYID = 7
6,372,884 UART: [ldev] FE.KEYID = 1
6,382,831 UART: [ldev] Erasing FE.KEYID = 1
8,856,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,843 UART: [ldev] --
10,646,877 UART: [fwproc] Wait for Commands...
10,649,197 UART: [fwproc] Recv command 0x46574c44
10,651,530 UART: [fwproc] Recv'd Img size: 115224 bytes
14,108,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,066 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,853,922 >>> mbox cmd response: success
14,858,077 UART: [afmc] ++
14,858,779 UART: [afmc] CDI.KEYID = 6
14,859,960 UART: [afmc] SUBJECT.KEYID = 7
14,861,443 UART: [afmc] AUTHORITY.KEYID = 5
17,365,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,089,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,091,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,106,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,121,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,136,394 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,159,562 UART: [afmc] --
19,163,780 UART: [cold-reset] --
19,168,506 UART: [state] Locking Datavault
19,175,414 UART: [state] Locking PCR0, PCR1 and PCR31
19,177,556 UART: [state] Locking ICCM
19,179,228 UART: [exit] Launching FMC @ 0x40000130
19,187,892 UART:
19,188,125 UART: Running Caliptra FMC ...
19,189,227 UART:
19,189,391 UART: [state] CFI Enabled
19,197,285 UART: [fht] FMC Alias Private Key: 7
20,953,849 UART: [art] Extend RT PCRs Done
20,955,057 UART: [art] Lock RT PCRs Done
20,957,004 UART: [art] Populate DV Done
20,962,577 UART: [fht] FMC Alias Private Key: 7
20,964,229 UART: [art] Derive CDI
20,965,041 UART: [art] Store in in slot 0x4
21,007,659 UART: [art] Derive Key Pair
21,008,665 UART: [art] Store priv key in slot 0x5
23,435,384 UART: [art] Derive Key Pair - Done
23,448,055 UART: [art] Signing Cert with AUTHO
23,449,361 UART: RITY.KEYID = 7
25,154,847 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,348 UART: [art] PUB.X = 6A0624F7C67038666826A37D6A44FE1EA78EA7B61143AB698C1758A435C584BE70354DA290C866B0331128F957C3F57D
25,163,602 UART: [art] PUB.Y = B2BAACD5EE2FB45BFF602FB525848D5338224073ACEC8B6C668391A0786D8EC80047A6568334A6620A0C363EA546E95F
25,170,842 UART: [art] SIG.R = 36C4F18A57A3F9A4E7D5350379E6E8F16B5756ADFC6E113A28BE5AC64EED3567E50B0C681B00CEFBDEAACB83ACA8CBAF
25,178,243 UART: [art] SIG.S = 1EF8B68024E59B355285601492CB5D593E3E89EAB1C0C046770ED3442441BF891E3184D2D545102CC0650ED9738FCEFA
26,156,734 UART: Caliptra RT
26,157,440 UART: [state] CFI Enabled
26,274,123 UART: [rt] RT listening for mailbox commands...
26,275,970 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,305,549 UART: [rt]cmd =0x46504c54, len=4
26,307,178 >>> mbox cmd response data (8 bytes)
26,308,365 UART: [rt] FIPS self test
26,309,310 UART: [kat] ++
26,309,762 UART: [kat] sha1
26,314,283 UART: [kat] SHA2-256
26,316,199 UART: [kat] SHA2-384
26,318,358 UART: Fatal Error: 0x90020002
26,353,562 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,498,250 >>> mbox cmd response: failed
26,498,888 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,643,568 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,142 UART:
190,444 UART: Running Caliptra ROM ...
191,469 UART:
13,891,383 UART: [state] CFI Enabled
13,908,126 UART: [state] LifecycleState = Unprovisioned
13,910,508 UART: [state] DebugLocked = No
13,913,439 UART: [state] WD Timer not started. Device not locked for debugging
13,918,917 UART: [kat] SHA2-256
14,108,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,119,619 UART: [kat] ++
14,120,074 UART: [kat] sha1
14,130,153 UART: [kat] SHA2-256
14,133,167 UART: [kat] SHA2-384
14,139,149 UART: [kat] SHA2-512-ACC
14,141,763 UART: [kat] ECC-384
16,582,671 UART: [kat] HMAC-384Kdf
16,595,763 UART: [kat] LMS
17,127,607 UART: [kat] --
17,132,244 UART: [cold-reset] ++
17,133,419 UART: [fht] FHT @ 0x50003400
17,145,015 UART: [idev] ++
17,145,700 UART: [idev] CDI.KEYID = 6
17,146,640 UART: [idev] SUBJECT.KEYID = 7
17,147,849 UART: [idev] UDS.KEYID = 0
17,149,361 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
17,294,006 UART: [idev] Erasing UDS.KEYID = 0
19,624,549 UART: [idev] Sha1 KeyId Algorithm
19,645,791 UART: [idev] --
19,650,432 UART: [ldev] ++
19,651,114 UART: [ldev] CDI.KEYID = 6
19,652,022 UART: [ldev] SUBJECT.KEYID = 5
19,653,182 UART: [ldev] AUTHORITY.KEYID = 7
19,654,412 UART: [ldev] FE.KEYID = 1
19,664,794 UART: [ldev] Erasing FE.KEYID = 1
22,139,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,860,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,875,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,891,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,906,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,925,879 UART: [ldev] --
23,930,883 UART: [fwproc] Wait for Commands...
23,933,802 UART: [fwproc] Recv command 0x46574c44
23,936,120 UART: [fwproc] Recv'd Img size: 115224 bytes
27,392,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,473,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,589,794 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
28,138,383 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,757,300 ready_for_fw is high
3,757,869 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,979,467 >>> mbox cmd response: success
19,237,024 UART:
19,237,423 UART: Running Caliptra FMC ...
19,238,585 UART:
19,238,748 UART: [state] CFI Enabled
19,246,458 UART: [fht] FMC Alias Private Key: 7
21,003,188 UART: [art] Extend RT PCRs Done
21,004,421 UART: [art] Lock RT PCRs Done
21,006,222 UART: [art] Populate DV Done
21,011,757 UART: [fht] FMC Alias Private Key: 7
21,013,409 UART: [art] Derive CDI
21,014,227 UART: [art] Store in in slot 0x4
21,056,722 UART: [art] Derive Key Pair
21,057,786 UART: [art] Store priv key in slot 0x5
23,483,818 UART: [art] Derive Key Pair - Done
23,496,551 UART: [art] Signing Cert with AUTHO
23,497,857 UART: RITY.KEYID = 7
25,203,464 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,977 UART: [art] PUB.X = 5EBCF18ADFDF02DE13590BDE6B0C756CECBC0FA0375B8BA3E8901B2E4E7A7704F1B5855E927206788A7BD73676FA13EC
25,212,292 UART: [art] PUB.Y = 95B1AB7F258B5A39AF6813AF8DDED8F91F32C2FECA7ECCA0F523260BB1651AFA073884B4F582286F3CF0017504C0AD5B
25,219,567 UART: [art] SIG.R = C5C5717A811198EFFCF90FBDE7E5AC5B2F0A21791D0C41062B6D1BB3CA999F62FF5EDB48ECDED481EDD622C19D28DF4B
25,226,968 UART: [art] SIG.S = E4E29F1B383711D095525E5BF6019AB2A3D80E63116EB46D77465A4442D4409542AB0F0D63F2BC7D6792976B81A60CE3
26,205,904 UART: Caliptra RT
26,206,611 UART: [state] CFI Enabled
26,324,465 UART: [rt] RT listening for mailbox commands...
26,326,354 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,356,088 UART: [rt]cmd =0x46504c54, len=4
26,357,777 >>> mbox cmd response data (8 bytes)
26,358,871 UART: [rt] FIPS self test
26,359,834 UART: [kat] ++
26,360,291 UART: [kat] sha1
26,364,530 UART: [kat] SHA2-256
26,366,464 UART: [kat] SHA2-384
26,368,723 UART: Fatal Error: 0x90020002
26,404,135 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,548,711 >>> mbox cmd response: failed
26,549,315 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
26,694,001 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
16,983,716 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
28,209,132 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,627 UART: [kat] SHA2-256
881,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,673 UART: [kat] ++
885,825 UART: [kat] sha1
890,061 UART: [kat] SHA2-256
891,999 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,098 UART: [kat] HMAC-384Kdf
906,626 UART: [kat] LMS
1,474,822 UART: [kat] --
1,475,549 UART: [cold-reset] ++
1,475,989 UART: [fht] Storing FHT @ 0x50003400
1,478,618 UART: [idev] ++
1,478,786 UART: [idev] CDI.KEYID = 6
1,479,146 UART: [idev] SUBJECT.KEYID = 7
1,479,570 UART: [idev] UDS.KEYID = 0
1,479,915 ready_for_fw is high
1,479,915 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,058 UART: [idev] Erasing UDS.KEYID = 0
1,502,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,511,474 UART: [idev] --
1,512,547 UART: [ldev] ++
1,512,715 UART: [ldev] CDI.KEYID = 6
1,513,078 UART: [ldev] SUBJECT.KEYID = 5
1,513,504 UART: [ldev] AUTHORITY.KEYID = 7
1,513,967 UART: [ldev] FE.KEYID = 1
1,519,125 UART: [ldev] Erasing FE.KEYID = 1
1,544,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,557,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,574,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,581,826 UART: [ldev] --
1,583,123 UART: [fwproc] Waiting for Commands...
1,583,982 UART: [fwproc] Received command 0x46574c44
1,584,773 UART: [fwproc] Received Image of size 115224 bytes
2,892,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,658 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,087,299 >>> mbox cmd response: success
3,088,551 UART: [afmc] ++
3,088,719 UART: [afmc] CDI.KEYID = 6
3,089,081 UART: [afmc] SUBJECT.KEYID = 7
3,089,506 UART: [afmc] AUTHORITY.KEYID = 5
3,124,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,023 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,416 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,106 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,041 UART: [afmc] --
3,168,039 UART: [cold-reset] --
3,168,919 UART: [state] Locking Datavault
3,170,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,820 UART: [state] Locking ICCM
3,171,454 UART: [exit] Launching FMC @ 0x40000130
3,176,783 UART:
3,176,799 UART: Running Caliptra FMC ...
3,177,207 UART:
3,177,261 UART: [state] CFI Enabled
3,187,730 UART: [fht] FMC Alias Private Key: 7
3,295,971 UART: [art] Extend RT PCRs Done
3,296,399 UART: [art] Lock RT PCRs Done
3,298,277 UART: [art] Populate DV Done
3,306,624 UART: [fht] FMC Alias Private Key: 7
3,307,610 UART: [art] Derive CDI
3,307,890 UART: [art] Store in in slot 0x4
3,393,921 UART: [art] Derive Key Pair
3,394,281 UART: [art] Store priv key in slot 0x5
3,407,511 UART: [art] Derive Key Pair - Done
3,421,992 UART: [art] Signing Cert with AUTHO
3,422,472 UART: RITY.KEYID = 7
3,437,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,533 UART: [art] PUB.X = 52A4293E86FDEC1B6ACD4A3B97FB216E95C6E38F8553AED16D179418215B7836B4052E03CC6B080588DE4156DFF59197
3,445,295 UART: [art] PUB.Y = B5C60A4DE1BA46C4AF604A135CF4D54F43D38C763E66A9295E36FBA75E5DD9C63588CAEC4FAE7CADD218E63CC018A8F1
3,452,266 UART: [art] SIG.R = B3BB2B75155EA152445F8752D9B8E96DC7C6B4535B5783372EC3D18D0E081F5584B3EC5D4E29EB89FC030DFC08611610
3,459,025 UART: [art] SIG.S = 1AC98D75218417D60AD6EA48ED227DA6D1069EAFFA4B473086CA54356F9402F601B6A8EE6D6478A7C58207762FEAD7F8
3,483,157 UART: Caliptra RT
3,483,411 UART: [state] CFI Enabled
3,591,311 UART: [rt] RT listening for mailbox commands...
3,591,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,440 UART: [rt]cmd =0x46504c54, len=4
3,622,642 >>> mbox cmd response data (8 bytes)
3,622,917 UART: [rt] FIPS self test
3,623,245 UART: [kat] ++
3,623,397 UART: [kat] sha1
3,627,745 UART: [kat] SHA2-256
3,629,767 UART: [kat] SHA2-384
3,632,594 UART: Fatal Error: 0x90020002
3,634,144 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,149 >>> mbox cmd response: failed
3,634,149 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,439 UART: [kat] SHA2-256
882,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,485 UART: [kat] ++
886,637 UART: [kat] sha1
891,089 UART: [kat] SHA2-256
893,027 UART: [kat] SHA2-384
895,662 UART: [kat] SHA2-512-ACC
897,563 UART: [kat] ECC-384
903,158 UART: [kat] HMAC-384Kdf
907,626 UART: [kat] LMS
1,475,822 UART: [kat] --
1,476,479 UART: [cold-reset] ++
1,477,025 UART: [fht] Storing FHT @ 0x50003400
1,479,722 UART: [idev] ++
1,479,890 UART: [idev] CDI.KEYID = 6
1,480,250 UART: [idev] SUBJECT.KEYID = 7
1,480,674 UART: [idev] UDS.KEYID = 0
1,481,019 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,956 UART: [idev] Erasing UDS.KEYID = 0
1,505,626 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,204 UART: [idev] --
1,515,185 UART: [ldev] ++
1,515,353 UART: [ldev] CDI.KEYID = 6
1,515,716 UART: [ldev] SUBJECT.KEYID = 5
1,516,142 UART: [ldev] AUTHORITY.KEYID = 7
1,516,605 UART: [ldev] FE.KEYID = 1
1,521,851 UART: [ldev] Erasing FE.KEYID = 1
1,547,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,574 UART: [ldev] --
1,586,905 UART: [fwproc] Waiting for Commands...
1,587,678 UART: [fwproc] Received command 0x46574c44
1,588,469 UART: [fwproc] Received Image of size 115224 bytes
2,897,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,810 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,162 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,441 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,887 ready_for_fw is high
1,361,887 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,937,841 >>> mbox cmd response: success
3,000,639 UART:
3,000,655 UART: Running Caliptra FMC ...
3,001,063 UART:
3,001,117 UART: [state] CFI Enabled
3,011,466 UART: [fht] FMC Alias Private Key: 7
3,119,313 UART: [art] Extend RT PCRs Done
3,119,741 UART: [art] Lock RT PCRs Done
3,121,535 UART: [art] Populate DV Done
3,129,512 UART: [fht] FMC Alias Private Key: 7
3,130,624 UART: [art] Derive CDI
3,130,904 UART: [art] Store in in slot 0x4
3,216,539 UART: [art] Derive Key Pair
3,216,899 UART: [art] Store priv key in slot 0x5
3,230,083 UART: [art] Derive Key Pair - Done
3,244,725 UART: [art] Signing Cert with AUTHO
3,245,205 UART: RITY.KEYID = 7
3,259,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,680 UART: [art] PUB.X = 2A6FA84FC7ABE6888271E518A99D82A0535948278C66D90E288B756D7029A415AF41E5B5A04027464110D92401A9D6BC
3,267,438 UART: [art] PUB.Y = 58539E6FCB33A639493D3539A274FBAF206B437788380A8619FDB4134529BD357EDBCB4B14D5D9A0F43EF6C9EAD2014B
3,274,390 UART: [art] SIG.R = 1BF80A03CFCAEC410B6A2EAF26414716BA781EC4B65BB718A29FC945B1AE9EBA6A7EFE19189A77C8E558477358C903A4
3,281,164 UART: [art] SIG.S = 7ADD315C5C110C9DEE9D78942063CB06E2267C56859C96B217690B2DBF0C6CF149DC7306DF351599DB0FD5D2EBDB8D3D
3,305,661 UART: Caliptra RT
3,305,915 UART: [state] CFI Enabled
3,413,994 UART: [rt] RT listening for mailbox commands...
3,414,657 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,335 UART: [rt]cmd =0x46504c54, len=4
3,445,275 >>> mbox cmd response data (8 bytes)
3,445,580 UART: [rt] FIPS self test
3,445,908 UART: [kat] ++
3,446,060 UART: [kat] sha1
3,450,114 UART: [kat] SHA2-256
3,452,136 UART: [kat] SHA2-384
3,454,867 UART: Fatal Error: 0x90020002
3,456,417 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,456,422 >>> mbox cmd response: failed
3,456,422 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,456,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,937,905 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,586 UART: [kat] SHA2-256
882,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,632 UART: [kat] ++
886,784 UART: [kat] sha1
891,066 UART: [kat] SHA2-256
893,004 UART: [kat] SHA2-384
895,777 UART: [kat] SHA2-512-ACC
897,678 UART: [kat] ECC-384
903,545 UART: [kat] HMAC-384Kdf
908,259 UART: [kat] LMS
1,476,455 UART: [kat] --
1,477,492 UART: [cold-reset] ++
1,478,066 UART: [fht] Storing FHT @ 0x50003400
1,480,795 UART: [idev] ++
1,480,963 UART: [idev] CDI.KEYID = 6
1,481,323 UART: [idev] SUBJECT.KEYID = 7
1,481,747 UART: [idev] UDS.KEYID = 0
1,482,092 ready_for_fw is high
1,482,092 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,771 UART: [idev] Erasing UDS.KEYID = 0
1,506,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,347 UART: [idev] --
1,516,344 UART: [ldev] ++
1,516,512 UART: [ldev] CDI.KEYID = 6
1,516,875 UART: [ldev] SUBJECT.KEYID = 5
1,517,301 UART: [ldev] AUTHORITY.KEYID = 7
1,517,764 UART: [ldev] FE.KEYID = 1
1,523,216 UART: [ldev] Erasing FE.KEYID = 1
1,548,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,559 UART: [ldev] --
1,588,028 UART: [fwproc] Waiting for Commands...
1,588,745 UART: [fwproc] Received command 0x46574c44
1,589,536 UART: [fwproc] Received Image of size 115224 bytes
2,897,149 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,954,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,091,162 >>> mbox cmd response: success
3,092,422 UART: [afmc] ++
3,092,590 UART: [afmc] CDI.KEYID = 6
3,092,952 UART: [afmc] SUBJECT.KEYID = 7
3,093,377 UART: [afmc] AUTHORITY.KEYID = 5
3,128,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,144,684 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,145,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,151,192 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,157,077 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,162,767 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,170,630 UART: [afmc] --
3,171,626 UART: [cold-reset] --
3,172,620 UART: [state] Locking Datavault
3,173,667 UART: [state] Locking PCR0, PCR1 and PCR31
3,174,271 UART: [state] Locking ICCM
3,174,897 UART: [exit] Launching FMC @ 0x40000130
3,180,226 UART:
3,180,242 UART: Running Caliptra FMC ...
3,180,650 UART:
3,180,793 UART: [state] CFI Enabled
3,191,388 UART: [fht] FMC Alias Private Key: 7
3,299,597 UART: [art] Extend RT PCRs Done
3,300,025 UART: [art] Lock RT PCRs Done
3,301,521 UART: [art] Populate DV Done
3,309,620 UART: [fht] FMC Alias Private Key: 7
3,310,628 UART: [art] Derive CDI
3,310,908 UART: [art] Store in in slot 0x4
3,396,691 UART: [art] Derive Key Pair
3,397,051 UART: [art] Store priv key in slot 0x5
3,409,979 UART: [art] Derive Key Pair - Done
3,424,643 UART: [art] Signing Cert with AUTHO
3,425,123 UART: RITY.KEYID = 7
3,440,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,194 UART: [art] PUB.X = 0A10F5EDA0944765A8392ACFD9FA6B723D971E88AA7C7E57CEC05B6381B54C411E42BA8E32045D638089FEE45685C89D
3,447,966 UART: [art] PUB.Y = 84E14C7F3AEEC4E2AB23D91E3B8DE9EBD7C1FBAFA98DDF09C8B0540D35BE38042584E2E97868907812BB2A9B8575192B
3,454,923 UART: [art] SIG.R = A98145603EB47B3A0E97F7FE95718217F503B9EBB0B93C2297C73A082CA0EB46AB129720946CFD7FD5A378387B7C1F8B
3,461,690 UART: [art] SIG.S = 86142A14E849BCBB43589BBB36B0E00ED913689710C13C2D16DA2A8C6CD5F903E62BDA9DB4FCA4065CFCEECD62215204
3,485,385 UART: Caliptra RT
3,485,731 UART: [state] CFI Enabled
3,592,812 UART: [rt] RT listening for mailbox commands...
3,593,475 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,917 UART: [rt]cmd =0x46504c54, len=4
3,624,103 >>> mbox cmd response data (8 bytes)
3,624,230 UART: [rt] FIPS self test
3,624,558 UART: [kat] ++
3,624,710 UART: [kat] sha1
3,628,684 UART: [kat] SHA2-256
3,630,706 UART: [kat] SHA2-384
3,633,335 UART: Fatal Error: 0x90020002
3,634,885 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,890 >>> mbox cmd response: failed
3,634,890 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,634,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,426 UART: [kat] SHA2-256
882,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,472 UART: [kat] ++
886,624 UART: [kat] sha1
891,006 UART: [kat] SHA2-256
892,944 UART: [kat] SHA2-384
895,817 UART: [kat] SHA2-512-ACC
897,718 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,825 UART: [kat] LMS
1,476,021 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,320 UART: [fht] Storing FHT @ 0x50003400
1,480,079 UART: [idev] ++
1,480,247 UART: [idev] CDI.KEYID = 6
1,480,607 UART: [idev] SUBJECT.KEYID = 7
1,481,031 UART: [idev] UDS.KEYID = 0
1,481,376 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,489,191 UART: [idev] Erasing UDS.KEYID = 0
1,506,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,787 UART: [idev] --
1,515,810 UART: [ldev] ++
1,515,978 UART: [ldev] CDI.KEYID = 6
1,516,341 UART: [ldev] SUBJECT.KEYID = 5
1,516,767 UART: [ldev] AUTHORITY.KEYID = 7
1,517,230 UART: [ldev] FE.KEYID = 1
1,522,460 UART: [ldev] Erasing FE.KEYID = 1
1,547,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,553 UART: [ldev] --
1,587,004 UART: [fwproc] Waiting for Commands...
1,587,681 UART: [fwproc] Received command 0x46574c44
1,588,472 UART: [fwproc] Received Image of size 115224 bytes
2,896,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,924,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,726 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,358 ready_for_fw is high
1,362,358 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,236 >>> mbox cmd response: success
3,001,478 UART:
3,001,494 UART: Running Caliptra FMC ...
3,001,902 UART:
3,002,045 UART: [state] CFI Enabled
3,012,624 UART: [fht] FMC Alias Private Key: 7
3,120,161 UART: [art] Extend RT PCRs Done
3,120,589 UART: [art] Lock RT PCRs Done
3,122,505 UART: [art] Populate DV Done
3,130,924 UART: [fht] FMC Alias Private Key: 7
3,132,054 UART: [art] Derive CDI
3,132,334 UART: [art] Store in in slot 0x4
3,218,437 UART: [art] Derive Key Pair
3,218,797 UART: [art] Store priv key in slot 0x5
3,231,985 UART: [art] Derive Key Pair - Done
3,246,604 UART: [art] Signing Cert with AUTHO
3,247,084 UART: RITY.KEYID = 7
3,262,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,023 UART: [art] PUB.X = B1A16854F2FF7113112AD5DC4B97E8AB4F73DA77F444F24D3C1D5CA5B57D5A2CFF3CDDCE3EBA215386ACA4F430334DA5
3,269,817 UART: [art] PUB.Y = A3E608F3BE0D5F4F6BDA0AD26D6CCCF252D6F5ADF02823CF0A395E5345E9D94BC035DC6C4AFD1FB5F9C9FBC072C01121
3,276,783 UART: [art] SIG.R = E97E7802D8D559FF49CE2423698BC71C5432DDA32963FBF06EB41509A7C7AC03E01FDB63FA008B89A5BB3F98365F3E59
3,283,532 UART: [art] SIG.S = 709AF51D625F31B99AA2B5E89401DB76E5B97A5A17984A8D1B732DF1197A4C21CBEB8A7D165E9FB74C4E0E84333ABAF6
3,307,767 UART: Caliptra RT
3,308,113 UART: [state] CFI Enabled
3,415,379 UART: [rt] RT listening for mailbox commands...
3,416,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,748 UART: [rt]cmd =0x46504c54, len=4
3,447,004 >>> mbox cmd response data (8 bytes)
3,447,243 UART: [rt] FIPS self test
3,447,571 UART: [kat] ++
3,447,723 UART: [kat] sha1
3,452,117 UART: [kat] SHA2-256
3,454,139 UART: [kat] SHA2-384
3,457,078 UART: Fatal Error: 0x90020002
3,458,628 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,633 >>> mbox cmd response: failed
3,458,633 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,458,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,362 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,660 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,601 UART: [kat] SHA2-256
903,541 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,726 UART: [kat] LMS
1,171,054 UART: [kat] --
1,171,973 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 ready_for_fw is high
1,176,323 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,080 UART: [idev] Erasing UDS.KEYID = 0
1,200,669 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,210,037 UART: [ldev] ++
1,210,205 UART: [ldev] CDI.KEYID = 6
1,210,568 UART: [ldev] SUBJECT.KEYID = 5
1,210,994 UART: [ldev] AUTHORITY.KEYID = 7
1,211,457 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,481 UART: [ldev] --
1,281,902 UART: [fwproc] Wait for Commands...
1,282,710 UART: [fwproc] Recv command 0x46574c44
1,283,438 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,069 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,785,274 >>> mbox cmd response: success
2,786,434 UART: [afmc] ++
2,786,602 UART: [afmc] CDI.KEYID = 6
2,786,964 UART: [afmc] SUBJECT.KEYID = 7
2,787,389 UART: [afmc] AUTHORITY.KEYID = 5
2,823,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,419 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,653 UART: [afmc] --
2,866,665 UART: [cold-reset] --
2,867,627 UART: [state] Locking Datavault
2,868,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,178 UART: [state] Locking ICCM
2,869,832 UART: [exit] Launching FMC @ 0x40000130
2,875,161 UART:
2,875,177 UART: Running Caliptra FMC ...
2,875,585 UART:
2,875,639 UART: [state] CFI Enabled
2,885,750 UART: [fht] FMC Alias Private Key: 7
2,993,609 UART: [art] Extend RT PCRs Done
2,994,037 UART: [art] Lock RT PCRs Done
2,995,421 UART: [art] Populate DV Done
3,003,572 UART: [fht] FMC Alias Private Key: 7
3,004,674 UART: [art] Derive CDI
3,004,954 UART: [art] Store in in slot 0x4
3,090,477 UART: [art] Derive Key Pair
3,090,837 UART: [art] Store priv key in slot 0x5
3,104,099 UART: [art] Derive Key Pair - Done
3,118,807 UART: [art] Signing Cert with AUTHO
3,119,287 UART: RITY.KEYID = 7
3,134,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,286 UART: [art] PUB.X = DCCD2CCB77EDF32D34D0767D1D627AAFC33232179D0399294FAB997B5D09E1355194A92484EFA93CEEFFE87035ACA417
3,142,064 UART: [art] PUB.Y = F289325A14208C6340DFAA3F08AE7CC3505CAB48CACE6F60F766C030D9DCF27C0716B304CEA56C46801197B82B5C4D25
3,149,015 UART: [art] SIG.R = 860F07D4FD43D5007736CCD04F4897AA934DCD5982782816FAC695ED9045E7CC4D1E0BD68E3BE5924472A86EC46007F2
3,155,755 UART: [art] SIG.S = 16387E596357E7E0D66401DF95016370C07530690664092C5EC1D18CE0F2940C3122847CA03C71AC27281609A2D69EC9
3,179,760 UART: Caliptra RT
3,180,014 UART: [state] CFI Enabled
3,287,552 UART: [rt] RT listening for mailbox commands...
3,288,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,731 UART: [rt]cmd =0x46504c54, len=4
3,318,855 >>> mbox cmd response data (8 bytes)
3,318,992 UART: [rt] FIPS self test
3,319,320 UART: [kat] ++
3,319,472 UART: [kat] sha1
3,323,528 UART: [kat] SHA2-256
3,325,550 UART: [kat] SHA2-384
3,328,231 UART: Fatal Error: 0x90020002
3,329,781 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,329,786 >>> mbox cmd response: failed
3,329,786 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,329,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
893,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,617 UART: [kat] ++
897,769 UART: [kat] sha1
902,111 UART: [kat] SHA2-256
904,051 UART: [kat] SHA2-384
906,682 UART: [kat] SHA2-512-ACC
908,583 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,656 UART: [idev] ++
1,174,824 UART: [idev] CDI.KEYID = 6
1,175,184 UART: [idev] SUBJECT.KEYID = 7
1,175,608 UART: [idev] UDS.KEYID = 0
1,175,953 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,849 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,205 UART: [ldev] ++
1,209,373 UART: [ldev] CDI.KEYID = 6
1,209,736 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,241,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,656 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,160 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,809 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,920 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 ready_for_fw is high
1,060,271 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,191 >>> mbox cmd response: success
2,697,247 UART:
2,697,263 UART: Running Caliptra FMC ...
2,697,671 UART:
2,697,725 UART: [state] CFI Enabled
2,708,352 UART: [fht] FMC Alias Private Key: 7
2,815,783 UART: [art] Extend RT PCRs Done
2,816,211 UART: [art] Lock RT PCRs Done
2,817,519 UART: [art] Populate DV Done
2,825,764 UART: [fht] FMC Alias Private Key: 7
2,826,754 UART: [art] Derive CDI
2,827,034 UART: [art] Store in in slot 0x4
2,912,187 UART: [art] Derive Key Pair
2,912,547 UART: [art] Store priv key in slot 0x5
2,926,041 UART: [art] Derive Key Pair - Done
2,940,789 UART: [art] Signing Cert with AUTHO
2,941,269 UART: RITY.KEYID = 7
2,956,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,678 UART: [art] PUB.X = 49A9FE937AC5637410D4249AC2E217BCA8138BAF56B8953A3144F59D350DECAB8A8ECA8C6CBD6659B7B8D1922569C60B
2,964,454 UART: [art] PUB.Y = 935EAF9821102F3883771E57724320DF740B2CB481ADA48E1B8BF7D64ABC21B0F24B408F96C503CAFAA328BF63024B48
2,971,401 UART: [art] SIG.R = 919E161AD4E501F027A10F24C42A9F17F41E81BD1F641EA58FB3AAF54FF1E924C269F968E137F06E192A471BB25C2891
2,978,171 UART: [art] SIG.S = 985E8D2730C2FC0EBD906373658A44D64519A014ADCDA3B3B599548584DA53827741E7E48AEA45A4CDBDEC35E0F30C8A
3,001,860 UART: Caliptra RT
3,002,114 UART: [state] CFI Enabled
3,109,421 UART: [rt] RT listening for mailbox commands...
3,110,084 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,526 UART: [rt]cmd =0x46504c54, len=4
3,140,792 >>> mbox cmd response data (8 bytes)
3,141,011 UART: [rt] FIPS self test
3,141,339 UART: [kat] ++
3,141,491 UART: [kat] sha1
3,145,687 UART: [kat] SHA2-256
3,147,709 UART: [kat] SHA2-384
3,150,522 UART: Fatal Error: 0x90020002
3,152,072 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,152,077 >>> mbox cmd response: failed
3,152,077 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,152,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,825 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,919 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,881 UART: [state] LifecycleState = Unprovisioned
85,536 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
893,211 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,336 UART: [kat] ++
897,488 UART: [kat] sha1
901,656 UART: [kat] SHA2-256
903,596 UART: [kat] SHA2-384
906,225 UART: [kat] SHA2-512-ACC
908,126 UART: [kat] ECC-384
918,177 UART: [kat] HMAC-384Kdf
922,981 UART: [kat] LMS
1,171,309 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,329 UART: [idev] ++
1,175,497 UART: [idev] CDI.KEYID = 6
1,175,857 UART: [idev] SUBJECT.KEYID = 7
1,176,281 UART: [idev] UDS.KEYID = 0
1,176,626 ready_for_fw is high
1,176,626 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,331 UART: [idev] Erasing UDS.KEYID = 0
1,202,160 UART: [idev] Sha1 KeyId Algorithm
1,210,468 UART: [idev] --
1,211,758 UART: [ldev] ++
1,211,926 UART: [ldev] CDI.KEYID = 6
1,212,289 UART: [ldev] SUBJECT.KEYID = 5
1,212,715 UART: [ldev] AUTHORITY.KEYID = 7
1,213,178 UART: [ldev] FE.KEYID = 1
1,218,450 UART: [ldev] Erasing FE.KEYID = 1
1,244,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,934 UART: [ldev] --
1,284,315 UART: [fwproc] Wait for Commands...
1,284,951 UART: [fwproc] Recv command 0x46574c44
1,285,679 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,828 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,075 >>> mbox cmd response: success
2,788,327 UART: [afmc] ++
2,788,495 UART: [afmc] CDI.KEYID = 6
2,788,857 UART: [afmc] SUBJECT.KEYID = 7
2,789,282 UART: [afmc] AUTHORITY.KEYID = 5
2,824,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,848,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,402 UART: [afmc] --
2,868,504 UART: [cold-reset] --
2,869,234 UART: [state] Locking Datavault
2,870,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,737 UART: [state] Locking ICCM
2,871,387 UART: [exit] Launching FMC @ 0x40000130
2,876,716 UART:
2,876,732 UART: Running Caliptra FMC ...
2,877,140 UART:
2,877,283 UART: [state] CFI Enabled
2,887,690 UART: [fht] FMC Alias Private Key: 7
2,995,985 UART: [art] Extend RT PCRs Done
2,996,413 UART: [art] Lock RT PCRs Done
2,998,087 UART: [art] Populate DV Done
3,006,306 UART: [fht] FMC Alias Private Key: 7
3,007,440 UART: [art] Derive CDI
3,007,720 UART: [art] Store in in slot 0x4
3,093,399 UART: [art] Derive Key Pair
3,093,759 UART: [art] Store priv key in slot 0x5
3,106,827 UART: [art] Derive Key Pair - Done
3,121,702 UART: [art] Signing Cert with AUTHO
3,122,182 UART: RITY.KEYID = 7
3,137,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,123 UART: [art] PUB.X = ED33782FF2EB97816F28312FC1E38A9D3BC78432880FF056E157EC1C2E108F90C2A7629487A5D296A74013431BE7107C
3,144,888 UART: [art] PUB.Y = 02EB86C8F2BF374D362FC3542BD8509BBF3112C859165DCF94625AB8AA86738C7AC1E01487454955154EC956F38A2C68
3,151,835 UART: [art] SIG.R = AE329CC7F904C597DE1076A18B070D9CFC6F69FB8BE256D16DE1B34EC496F7008F045077C10244EC507233E86C7829B5
3,158,572 UART: [art] SIG.S = 21FEE500EE4921306FAAAF0FCE4A276C6C1ABF9ED6282E8B1DCA710A0AB4A15921710CB700D0BAFB3BC87DA86DD67816
3,182,125 UART: Caliptra RT
3,182,471 UART: [state] CFI Enabled
3,288,571 UART: [rt] RT listening for mailbox commands...
3,289,234 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,816 UART: [rt]cmd =0x46504c54, len=4
3,319,838 >>> mbox cmd response data (8 bytes)
3,319,979 UART: [rt] FIPS self test
3,320,307 UART: [kat] ++
3,320,459 UART: [kat] sha1
3,324,501 UART: [kat] SHA2-256
3,326,523 UART: [kat] SHA2-384
3,329,288 UART: Fatal Error: 0x90020002
3,330,838 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,330,843 >>> mbox cmd response: failed
3,330,843 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,330,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
893,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,460 UART: [kat] ++
897,612 UART: [kat] sha1
901,816 UART: [kat] SHA2-256
903,756 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
922,973 UART: [kat] LMS
1,171,301 UART: [kat] --
1,171,876 UART: [cold-reset] ++
1,172,266 UART: [fht] FHT @ 0x50003400
1,174,929 UART: [idev] ++
1,175,097 UART: [idev] CDI.KEYID = 6
1,175,457 UART: [idev] SUBJECT.KEYID = 7
1,175,881 UART: [idev] UDS.KEYID = 0
1,176,226 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,879 UART: [idev] Erasing UDS.KEYID = 0
1,200,440 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,210,002 UART: [ldev] ++
1,210,170 UART: [ldev] CDI.KEYID = 6
1,210,533 UART: [ldev] SUBJECT.KEYID = 5
1,210,959 UART: [ldev] AUTHORITY.KEYID = 7
1,211,422 UART: [ldev] FE.KEYID = 1
1,216,602 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,430 UART: [ldev] --
1,281,781 UART: [fwproc] Wait for Commands...
1,282,451 UART: [fwproc] Recv command 0x46574c44
1,283,179 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,252 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,395 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,154 ready_for_fw is high
1,061,154 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,080 >>> mbox cmd response: success
2,700,656 UART:
2,700,672 UART: Running Caliptra FMC ...
2,701,080 UART:
2,701,223 UART: [state] CFI Enabled
2,711,912 UART: [fht] FMC Alias Private Key: 7
2,819,675 UART: [art] Extend RT PCRs Done
2,820,103 UART: [art] Lock RT PCRs Done
2,821,517 UART: [art] Populate DV Done
2,829,724 UART: [fht] FMC Alias Private Key: 7
2,830,770 UART: [art] Derive CDI
2,831,050 UART: [art] Store in in slot 0x4
2,916,929 UART: [art] Derive Key Pair
2,917,289 UART: [art] Store priv key in slot 0x5
2,930,255 UART: [art] Derive Key Pair - Done
2,944,888 UART: [art] Signing Cert with AUTHO
2,945,368 UART: RITY.KEYID = 7
2,960,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,125 UART: [art] PUB.X = 364B2A43143EC8CAB48B3F04DF4F5B8B3D7C8B0D5945655E8878CC954929887C7719556FD6A3F558D56C701A49A5C221
2,967,889 UART: [art] PUB.Y = 19B3A18815C99BC7CAC147E23700F9635ACF325D98EC9BC4AC09FEBE22E057454F0AD30661E268B77FA217279B87C23A
2,974,816 UART: [art] SIG.R = AAE8DEB75502A7E43D186134D2E4349D6BC678466FF5A195D389151710D5EB44D490295D07A56713631A7025D7DDE539
2,981,576 UART: [art] SIG.S = FD8C2543F7EC7991E670430F96AF36D91557CBFE457E08786CC7064E44EBCCABEF4E3E2BE322835F62079FD6757F0535
3,005,644 UART: Caliptra RT
3,005,990 UART: [state] CFI Enabled
3,114,097 UART: [rt] RT listening for mailbox commands...
3,114,760 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,466 UART: [rt]cmd =0x46504c54, len=4
3,145,714 >>> mbox cmd response data (8 bytes)
3,146,065 UART: [rt] FIPS self test
3,146,393 UART: [kat] ++
3,146,545 UART: [kat] sha1
3,150,703 UART: [kat] SHA2-256
3,152,725 UART: [kat] SHA2-384
3,155,514 UART: Fatal Error: 0x90020002
3,157,064 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,069 >>> mbox cmd response: failed
3,157,069 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,157,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,790 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,639,010 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,174,115 ready_for_fw is high
1,174,115 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,132 UART: [ldev] --
1,281,622 UART: [fwproc] Wait for Commands...
1,282,203 UART: [fwproc] Recv command 0x46574c44
1,282,936 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,025 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,334 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,542 >>> mbox cmd response: success
2,784,655 UART: [afmc] ++
2,784,823 UART: [afmc] CDI.KEYID = 6
2,785,186 UART: [afmc] SUBJECT.KEYID = 7
2,785,612 UART: [afmc] AUTHORITY.KEYID = 5
2,820,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,064 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,176 UART: [afmc] --
2,864,214 UART: [cold-reset] --
2,864,866 UART: [state] Locking Datavault
2,866,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,883 UART: [state] Locking ICCM
2,867,459 UART: [exit] Launching FMC @ 0x40000130
2,872,788 UART:
2,872,804 UART: Running Caliptra FMC ...
2,873,212 UART:
2,873,266 UART: [state] CFI Enabled
2,883,963 UART: [fht] FMC Alias Private Key: 7
2,991,912 UART: [art] Extend RT PCRs Done
2,992,340 UART: [art] Lock RT PCRs Done
2,993,926 UART: [art] Populate DV Done
3,002,145 UART: [fht] FMC Alias Private Key: 7
3,003,311 UART: [art] Derive CDI
3,003,591 UART: [art] Store in in slot 0x4
3,089,400 UART: [art] Derive Key Pair
3,089,760 UART: [art] Store priv key in slot 0x5
3,102,816 UART: [art] Derive Key Pair - Done
3,117,644 UART: [art] Signing Cert with AUTHO
3,118,124 UART: RITY.KEYID = 7
3,133,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,399 UART: [art] PUB.X = A8D1233454FED57F1750ED6D5F21677F46C17D5DF00C1B7DD5B41DA2C6032B8A05B1BDA361BC22F94FEEF0F9E265F54F
3,141,178 UART: [art] PUB.Y = B868DC85D8CA2C00D7047F30B9BA105D89CED2555EDF99A03F608CD275552C69DB08F26226039E6C3D3875C1CB6F48EC
3,148,107 UART: [art] SIG.R = 70E6373793AAD9DC1C4D80542BF4915DDB25B63EEC40CCF823E425583D383AB891923683BA6D945C4D1CC56F99A45764
3,154,881 UART: [art] SIG.S = 056F509BF2E4F2CA69D8CEC3FF7CD873DE118CDBA7566F88217DD5FB72C494656402995FC0426AFFD1F3484ED698466B
3,178,418 UART: Caliptra RT
3,178,672 UART: [state] CFI Enabled
3,286,242 UART: [rt] RT listening for mailbox commands...
3,286,905 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,231 UART: [rt]cmd =0x46504c54, len=4
3,317,413 >>> mbox cmd response data (8 bytes)
3,317,598 UART: [rt] FIPS self test
3,317,926 UART: [kat] ++
3,318,078 UART: [kat] sha1
3,322,452 UART: [kat] SHA2-256
3,324,474 UART: [kat] SHA2-384
3,327,249 UART: Fatal Error: 0x90020002
3,328,799 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,804 >>> mbox cmd response: failed
3,328,804 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
914,964 UART: [kat] HMAC-384Kdf
919,598 UART: [kat] LMS
1,167,910 UART: [kat] --
1,168,741 UART: [cold-reset] ++
1,169,129 UART: [fht] FHT @ 0x50003400
1,171,655 UART: [idev] ++
1,171,823 UART: [idev] CDI.KEYID = 6
1,172,184 UART: [idev] SUBJECT.KEYID = 7
1,172,609 UART: [idev] UDS.KEYID = 0
1,172,955 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,180,449 UART: [idev] Erasing UDS.KEYID = 0
1,197,367 UART: [idev] Sha1 KeyId Algorithm
1,206,191 UART: [idev] --
1,207,278 UART: [ldev] ++
1,207,446 UART: [ldev] CDI.KEYID = 6
1,207,810 UART: [ldev] SUBJECT.KEYID = 5
1,208,237 UART: [ldev] AUTHORITY.KEYID = 7
1,208,700 UART: [ldev] FE.KEYID = 1
1,213,550 UART: [ldev] Erasing FE.KEYID = 1
1,239,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,174 UART: [ldev] --
1,279,680 UART: [fwproc] Wait for Commands...
1,280,303 UART: [fwproc] Recv command 0x46574c44
1,281,036 UART: [fwproc] Recv'd Img size: 115224 bytes
2,587,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,696 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,781,840 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,370 ready_for_fw is high
1,056,370 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,635,310 >>> mbox cmd response: success
2,697,140 UART:
2,697,156 UART: Running Caliptra FMC ...
2,697,564 UART:
2,697,618 UART: [state] CFI Enabled
2,708,109 UART: [fht] FMC Alias Private Key: 7
2,815,642 UART: [art] Extend RT PCRs Done
2,816,070 UART: [art] Lock RT PCRs Done
2,817,806 UART: [art] Populate DV Done
2,825,869 UART: [fht] FMC Alias Private Key: 7
2,826,955 UART: [art] Derive CDI
2,827,235 UART: [art] Store in in slot 0x4
2,912,484 UART: [art] Derive Key Pair
2,912,844 UART: [art] Store priv key in slot 0x5
2,925,578 UART: [art] Derive Key Pair - Done
2,940,498 UART: [art] Signing Cert with AUTHO
2,940,978 UART: RITY.KEYID = 7
2,955,768 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,533 UART: [art] PUB.X = 60DC19F2D99B2D50FCE67188DCB9897813A425184F229CA4D0B3EC69FB4CE8921B7D6B84F77B389942D737A57CD33A1C
2,963,311 UART: [art] PUB.Y = CD7DFB64A8E3CC4D9809E5824DFF838F5AECAAB1E49CC6990C3E71721EA0911F7302CD970E6E0D50151F826B218DF7EE
2,970,264 UART: [art] SIG.R = EABA484162031D401E880CC3979E0FFA84FB0A07069472CEAC728C2A8AB2F7C08F472F96F43FF0EB11616DC1AA31B7B4
2,977,030 UART: [art] SIG.S = 84CFEFDAC2635962693F14DCBDA5D0CAA4CE9C035CF23588991BCBEEDF78F77DFF06EA9C4A2965C2F7A2ED44FBAF1F98
3,000,429 UART: Caliptra RT
3,000,683 UART: [state] CFI Enabled
3,107,476 UART: [rt] RT listening for mailbox commands...
3,108,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,539 UART: [rt]cmd =0x46504c54, len=4
3,138,563 >>> mbox cmd response data (8 bytes)
3,138,752 UART: [rt] FIPS self test
3,139,080 UART: [kat] ++
3,139,232 UART: [kat] sha1
3,143,506 UART: [kat] SHA2-256
3,145,528 UART: [kat] SHA2-384
3,148,171 UART: Fatal Error: 0x90020002
3,149,721 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,149,726 >>> mbox cmd response: failed
3,149,726 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,149,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,040 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,631,812 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,084 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,907 UART: [ldev] ++
1,209,075 UART: [ldev] CDI.KEYID = 6
1,209,439 UART: [ldev] SUBJECT.KEYID = 5
1,209,866 UART: [ldev] AUTHORITY.KEYID = 7
1,210,329 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,241,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,673 UART: [ldev] --
1,281,123 UART: [fwproc] Wait for Commands...
1,281,932 UART: [fwproc] Recv command 0x46574c44
1,282,665 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,578 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,887 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,045 >>> mbox cmd response: success
2,785,206 UART: [afmc] ++
2,785,374 UART: [afmc] CDI.KEYID = 6
2,785,737 UART: [afmc] SUBJECT.KEYID = 7
2,786,163 UART: [afmc] AUTHORITY.KEYID = 5
2,822,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,731 UART: [afmc] --
2,865,763 UART: [cold-reset] --
2,866,681 UART: [state] Locking Datavault
2,867,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,320 UART: [state] Locking ICCM
2,868,842 UART: [exit] Launching FMC @ 0x40000130
2,874,171 UART:
2,874,187 UART: Running Caliptra FMC ...
2,874,595 UART:
2,874,738 UART: [state] CFI Enabled
2,885,249 UART: [fht] FMC Alias Private Key: 7
2,992,962 UART: [art] Extend RT PCRs Done
2,993,390 UART: [art] Lock RT PCRs Done
2,994,944 UART: [art] Populate DV Done
3,003,083 UART: [fht] FMC Alias Private Key: 7
3,004,179 UART: [art] Derive CDI
3,004,459 UART: [art] Store in in slot 0x4
3,089,854 UART: [art] Derive Key Pair
3,090,214 UART: [art] Store priv key in slot 0x5
3,103,306 UART: [art] Derive Key Pair - Done
3,117,945 UART: [art] Signing Cert with AUTHO
3,118,425 UART: RITY.KEYID = 7
3,133,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,160 UART: [art] PUB.X = 735A2693415F854ED4F628D8FF918CF7F803C13253CA2CDA960DAE0132B839FF421F83B576E428BE6D81EB1DC955805B
3,140,927 UART: [art] PUB.Y = 16DD7318C536214D83CE71F3859EB734A77C06CE0442C0BFDABCE4611589DDF7A63A32D82FAE95064B77FAA6C41B2D00
3,147,858 UART: [art] SIG.R = 8065A053450A83C4B39E2CBE9A1CAF41E9232F5E8E765AC627EE19A0F228E8AC00B63C1F8EE3A167E8279B9D56C9F466
3,154,613 UART: [art] SIG.S = D2B20B43396C03C5054AB7274346E22A7786CCBB9CBAA51B6822CF67C228F3F275AD96CBBD864252D4E4E8DBC1D87417
3,178,721 UART: Caliptra RT
3,179,067 UART: [state] CFI Enabled
3,286,356 UART: [rt] RT listening for mailbox commands...
3,287,019 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,527 UART: [rt]cmd =0x46504c54, len=4
3,317,593 >>> mbox cmd response data (8 bytes)
3,317,860 UART: [rt] FIPS self test
3,318,188 UART: [kat] ++
3,318,340 UART: [kat] sha1
3,322,640 UART: [kat] SHA2-256
3,324,662 UART: [kat] SHA2-384
3,327,283 UART: Fatal Error: 0x90020002
3,328,833 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,838 >>> mbox cmd response: failed
3,328,838 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,328,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,964 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
904,993 UART: [kat] SHA2-512-ACC
906,894 UART: [kat] ECC-384
916,869 UART: [kat] HMAC-384Kdf
921,509 UART: [kat] LMS
1,169,821 UART: [kat] --
1,170,932 UART: [cold-reset] ++
1,171,364 UART: [fht] FHT @ 0x50003400
1,174,024 UART: [idev] ++
1,174,192 UART: [idev] CDI.KEYID = 6
1,174,553 UART: [idev] SUBJECT.KEYID = 7
1,174,978 UART: [idev] UDS.KEYID = 0
1,175,324 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,770 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,739 UART: [ldev] ++
1,209,907 UART: [ldev] CDI.KEYID = 6
1,210,271 UART: [ldev] SUBJECT.KEYID = 5
1,210,698 UART: [ldev] AUTHORITY.KEYID = 7
1,211,161 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,373 UART: [ldev] --
1,282,721 UART: [fwproc] Wait for Commands...
1,283,424 UART: [fwproc] Recv command 0x46574c44
1,284,157 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,321 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,433 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,509 ready_for_fw is high
1,056,509 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,109 >>> mbox cmd response: success
2,698,441 UART:
2,698,457 UART: Running Caliptra FMC ...
2,698,865 UART:
2,699,008 UART: [state] CFI Enabled
2,709,925 UART: [fht] FMC Alias Private Key: 7
2,818,394 UART: [art] Extend RT PCRs Done
2,818,822 UART: [art] Lock RT PCRs Done
2,820,648 UART: [art] Populate DV Done
2,828,977 UART: [fht] FMC Alias Private Key: 7
2,830,043 UART: [art] Derive CDI
2,830,323 UART: [art] Store in in slot 0x4
2,915,910 UART: [art] Derive Key Pair
2,916,270 UART: [art] Store priv key in slot 0x5
2,929,272 UART: [art] Derive Key Pair - Done
2,944,162 UART: [art] Signing Cert with AUTHO
2,944,642 UART: RITY.KEYID = 7
2,959,908 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,673 UART: [art] PUB.X = 927872CDD7F7643E4A8086065CD459FCC64C134B20B45A985A453EA90AD32F6C091529FE95818ADA7D6A74507B65DB4F
2,967,438 UART: [art] PUB.Y = 99DDA9E9BC7F5515BB2146B40FD72047034A9CB07F3F59734DAEB1017C97DC082BA5505BAAAD48C795D9056302350BF7
2,974,375 UART: [art] SIG.R = 7497E1C91191AD5BB90CAC1F40F29DF9EFA0178FE248FAE177FDF583AA0FE66EC3017EE07F82354C4275E2618419E6EF
2,981,150 UART: [art] SIG.S = 9765E9632AD7B06EAA18AE430B22765E948C09917881060B09EF88C33007AD19AB94EEA018609FFC7F9C8F10F92C73FF
3,004,943 UART: Caliptra RT
3,005,289 UART: [state] CFI Enabled
3,113,373 UART: [rt] RT listening for mailbox commands...
3,114,036 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,666 UART: [rt]cmd =0x46504c54, len=4
3,144,650 >>> mbox cmd response data (8 bytes)
3,144,803 UART: [rt] FIPS self test
3,145,131 UART: [kat] ++
3,145,283 UART: [kat] sha1
3,149,505 UART: [kat] SHA2-256
3,151,527 UART: [kat] SHA2-384
3,154,206 UART: Fatal Error: 0x90020002
3,155,756 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,761 >>> mbox cmd response: failed
3,155,761 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,155,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,305 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,723 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,044 UART:
192,422 UART: Running Caliptra ROM ...
193,575 UART:
193,729 UART: [state] CFI Enabled
262,998 UART: [state] LifecycleState = Unprovisioned
264,902 UART: [state] DebugLocked = No
266,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,263 UART: [kat] SHA2-256
441,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,507 UART: [kat] ++
452,041 UART: [kat] sha1
462,657 UART: [kat] SHA2-256
465,342 UART: [kat] SHA2-384
471,642 UART: [kat] SHA2-512-ACC
474,033 UART: [kat] ECC-384
2,764,539 UART: [kat] HMAC-384Kdf
2,774,911 UART: [kat] LMS
3,965,232 UART: [kat] --
3,969,086 UART: [cold-reset] ++
3,971,083 UART: [fht] Storing FHT @ 0x50003400
3,982,855 UART: [idev] ++
3,983,486 UART: [idev] CDI.KEYID = 6
3,984,376 UART: [idev] SUBJECT.KEYID = 7
3,985,645 UART: [idev] UDS.KEYID = 0
3,986,677 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,010,609 UART: [idev] Erasing UDS.KEYID = 0
7,321,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,535 UART: [idev] --
7,347,769 UART: [ldev] ++
7,348,339 UART: [ldev] CDI.KEYID = 6
7,349,360 UART: [ldev] SUBJECT.KEYID = 5
7,350,517 UART: [ldev] AUTHORITY.KEYID = 7
7,351,754 UART: [ldev] FE.KEYID = 1
7,396,801 UART: [ldev] Erasing FE.KEYID = 1
10,731,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,913 UART: [ldev] --
13,090,865 UART: [fwproc] Waiting for Commands...
13,092,480 UART: [fwproc] Received command 0x46505652
13,094,886 UART: [rt] FIPS Version
13,096,559 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,782,577 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,822,873 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,467 UART:
192,874 UART: Running Caliptra ROM ...
193,954 UART:
603,638 UART: [state] CFI Enabled
616,633 UART: [state] LifecycleState = Unprovisioned
618,589 UART: [state] DebugLocked = No
620,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,128 UART: [kat] SHA2-256
795,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,384 UART: [kat] ++
806,916 UART: [kat] sha1
818,660 UART: [kat] SHA2-256
821,343 UART: [kat] SHA2-384
827,915 UART: [kat] SHA2-512-ACC
830,315 UART: [kat] ECC-384
3,115,836 UART: [kat] HMAC-384Kdf
3,127,757 UART: [kat] LMS
4,317,884 UART: [kat] --
4,323,143 UART: [cold-reset] ++
4,324,924 UART: [fht] Storing FHT @ 0x50003400
4,336,576 UART: [idev] ++
4,337,150 UART: [idev] CDI.KEYID = 6
4,338,168 UART: [idev] SUBJECT.KEYID = 7
4,339,331 UART: [idev] UDS.KEYID = 0
4,340,464 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,355,853 UART: [idev] Erasing UDS.KEYID = 0
7,625,979 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,478 UART: [idev] --
7,652,021 UART: [ldev] ++
7,652,655 UART: [ldev] CDI.KEYID = 6
7,653,566 UART: [ldev] SUBJECT.KEYID = 5
7,654,781 UART: [ldev] AUTHORITY.KEYID = 7
7,656,063 UART: [ldev] FE.KEYID = 1
7,665,173 UART: [ldev] Erasing FE.KEYID = 1
10,957,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,956 UART: [ldev] --
13,318,031 UART: [fwproc] Waiting for Commands...
13,320,942 UART: [fwproc] Received command 0x46505652
13,323,347 UART: [rt] FIPS Version
13,325,017 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,126,160 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,040,380 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,095 UART:
192,466 UART: Running Caliptra ROM ...
193,607 UART:
193,752 UART: [state] CFI Enabled
259,192 UART: [state] LifecycleState = Unprovisioned
261,096 UART: [state] DebugLocked = No
262,374 UART: [state] WD Timer not started. Device not locked for debugging
266,718 UART: [kat] SHA2-256
445,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,412 UART: [kat] ++
457,949 UART: [kat] sha1
467,592 UART: [kat] SHA2-256
470,593 UART: [kat] SHA2-384
476,838 UART: [kat] SHA2-512-ACC
479,767 UART: [kat] ECC-384
2,946,477 UART: [kat] HMAC-384Kdf
2,968,190 UART: [kat] LMS
3,497,639 UART: [kat] --
3,503,348 UART: [cold-reset] ++
3,505,723 UART: [fht] FHT @ 0x50003400
3,516,972 UART: [idev] ++
3,517,543 UART: [idev] CDI.KEYID = 6
3,518,510 UART: [idev] SUBJECT.KEYID = 7
3,519,665 UART: [idev] UDS.KEYID = 0
3,520,719 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,541,260 UART: [idev] Erasing UDS.KEYID = 0
6,023,508 UART: [idev] Sha1 KeyId Algorithm
6,046,907 UART: [idev] --
6,049,582 UART: [ldev] ++
6,050,173 UART: [ldev] CDI.KEYID = 6
6,051,085 UART: [ldev] SUBJECT.KEYID = 5
6,052,257 UART: [ldev] AUTHORITY.KEYID = 7
6,053,494 UART: [ldev] FE.KEYID = 1
6,098,388 UART: [ldev] Erasing FE.KEYID = 1
8,600,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,703 UART: [ldev] --
10,412,801 UART: [fwproc] Wait for Commands...
10,414,796 UART: [fwproc] Recv command 0x46505652
10,417,163 UART: [rt] FIPS Version
10,418,641 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,350 UART:
192,708 UART: Running Caliptra ROM ...
193,873 UART:
194,022 UART: [state] CFI Enabled
257,816 UART: [state] LifecycleState = Unprovisioned
260,250 UART: [state] DebugLocked = No
261,682 UART: [state] WD Timer not started. Device not locked for debugging
265,501 UART: [kat] SHA2-256
455,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,151 UART: [kat] ++
466,601 UART: [kat] sha1
478,571 UART: [kat] SHA2-256
481,605 UART: [kat] SHA2-384
487,063 UART: [kat] SHA2-512-ACC
489,686 UART: [kat] ECC-384
2,944,409 UART: [kat] HMAC-384Kdf
2,968,346 UART: [kat] LMS
3,500,105 UART: [kat] --
3,503,990 UART: [cold-reset] ++
3,506,250 UART: [fht] FHT @ 0x50003400
3,518,091 UART: [idev] ++
3,518,757 UART: [idev] CDI.KEYID = 6
3,519,700 UART: [idev] SUBJECT.KEYID = 7
3,520,917 UART: [idev] UDS.KEYID = 0
3,521,883 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,540,574 UART: [idev] Erasing UDS.KEYID = 0
6,022,472 UART: [idev] Sha1 KeyId Algorithm
6,045,163 UART: [idev] --
6,049,761 UART: [ldev] ++
6,050,443 UART: [ldev] CDI.KEYID = 6
6,051,360 UART: [ldev] SUBJECT.KEYID = 5
6,052,539 UART: [ldev] AUTHORITY.KEYID = 7
6,053,719 UART: [ldev] FE.KEYID = 1
6,096,886 UART: [ldev] Erasing FE.KEYID = 1
8,603,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,535 UART: [ldev] --
10,410,112 UART: [fwproc] Wait for Commands...
10,412,749 UART: [fwproc] Recv command 0x46505652
10,415,280 UART: [rt] FIPS Version
10,417,006 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,436,984 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,266,521 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,511 UART:
193,076 UART: Running Caliptra ROM ...
194,180 UART:
603,856 UART: [state] CFI Enabled
618,695 UART: [state] LifecycleState = Unprovisioned
621,093 UART: [state] DebugLocked = No
622,853 UART: [state] WD Timer not started. Device not locked for debugging
627,045 UART: [kat] SHA2-256
816,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,751 UART: [kat] ++
828,344 UART: [kat] sha1
838,907 UART: [kat] SHA2-256
841,964 UART: [kat] SHA2-384
847,312 UART: [kat] SHA2-512-ACC
849,869 UART: [kat] ECC-384
3,289,818 UART: [kat] HMAC-384Kdf
3,302,735 UART: [kat] LMS
3,834,552 UART: [kat] --
3,839,427 UART: [cold-reset] ++
3,841,748 UART: [fht] FHT @ 0x50003400
3,852,297 UART: [idev] ++
3,853,025 UART: [idev] CDI.KEYID = 6
3,853,941 UART: [idev] SUBJECT.KEYID = 7
3,855,157 UART: [idev] UDS.KEYID = 0
3,856,148 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,873,546 UART: [idev] Erasing UDS.KEYID = 0
6,337,674 UART: [idev] Sha1 KeyId Algorithm
6,359,546 UART: [idev] --
6,364,864 UART: [ldev] ++
6,365,570 UART: [ldev] CDI.KEYID = 6
6,366,482 UART: [ldev] SUBJECT.KEYID = 5
6,367,643 UART: [ldev] AUTHORITY.KEYID = 7
6,368,878 UART: [ldev] FE.KEYID = 1
6,380,386 UART: [ldev] Erasing FE.KEYID = 1
8,854,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,569 UART: [ldev] --
10,647,242 UART: [fwproc] Wait for Commands...
10,649,719 UART: [fwproc] Recv command 0x46505652
10,652,303 UART: [rt] FIPS Version
10,653,972 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,759,398 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,469,330 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
86,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,601 UART: [kat] SHA2-256
881,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,647 UART: [kat] ++
885,799 UART: [kat] sha1
889,991 UART: [kat] SHA2-256
891,929 UART: [kat] SHA2-384
894,644 UART: [kat] SHA2-512-ACC
896,545 UART: [kat] ECC-384
901,782 UART: [kat] HMAC-384Kdf
906,466 UART: [kat] LMS
1,474,662 UART: [kat] --
1,475,749 UART: [cold-reset] ++
1,476,233 UART: [fht] Storing FHT @ 0x50003400
1,478,970 UART: [idev] ++
1,479,138 UART: [idev] CDI.KEYID = 6
1,479,498 UART: [idev] SUBJECT.KEYID = 7
1,479,922 UART: [idev] UDS.KEYID = 0
1,480,267 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,487,536 UART: [idev] Erasing UDS.KEYID = 0
1,503,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,754 UART: [idev] --
1,513,745 UART: [ldev] ++
1,513,913 UART: [ldev] CDI.KEYID = 6
1,514,276 UART: [ldev] SUBJECT.KEYID = 5
1,514,702 UART: [ldev] AUTHORITY.KEYID = 7
1,515,165 UART: [ldev] FE.KEYID = 1
1,520,553 UART: [ldev] Erasing FE.KEYID = 1
1,546,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,372 UART: [ldev] --
1,585,735 UART: [fwproc] Waiting for Commands...
1,586,450 UART: [fwproc] Received command 0x46505652
1,587,332 UART: [rt] FIPS Version
1,587,885 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,731 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,666 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,477,296 UART: [cold-reset] ++
1,477,872 UART: [fht] Storing FHT @ 0x50003400
1,480,547 UART: [idev] ++
1,480,715 UART: [idev] CDI.KEYID = 6
1,481,075 UART: [idev] SUBJECT.KEYID = 7
1,481,499 UART: [idev] UDS.KEYID = 0
1,481,844 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,417 UART: [idev] Erasing UDS.KEYID = 0
1,506,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,893 UART: [idev] --
1,515,964 UART: [ldev] ++
1,516,132 UART: [ldev] CDI.KEYID = 6
1,516,495 UART: [ldev] SUBJECT.KEYID = 5
1,516,921 UART: [ldev] AUTHORITY.KEYID = 7
1,517,384 UART: [ldev] FE.KEYID = 1
1,522,548 UART: [ldev] Erasing FE.KEYID = 1
1,548,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,347 UART: [ldev] --
1,587,836 UART: [fwproc] Waiting for Commands...
1,588,465 UART: [fwproc] Received command 0x46505652
1,589,347 UART: [rt] FIPS Version
1,589,900 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,388 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,901 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
901,981 UART: [kat] SHA2-256
903,921 UART: [kat] SHA2-384
906,790 UART: [kat] SHA2-512-ACC
908,691 UART: [kat] ECC-384
918,482 UART: [kat] HMAC-384Kdf
923,044 UART: [kat] LMS
1,171,372 UART: [kat] --
1,172,477 UART: [cold-reset] ++
1,172,957 UART: [fht] FHT @ 0x50003400
1,175,642 UART: [idev] ++
1,175,810 UART: [idev] CDI.KEYID = 6
1,176,170 UART: [idev] SUBJECT.KEYID = 7
1,176,594 UART: [idev] UDS.KEYID = 0
1,176,939 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,532 UART: [idev] Erasing UDS.KEYID = 0
1,201,469 UART: [idev] Sha1 KeyId Algorithm
1,210,041 UART: [idev] --
1,210,981 UART: [ldev] ++
1,211,149 UART: [ldev] CDI.KEYID = 6
1,211,512 UART: [ldev] SUBJECT.KEYID = 5
1,211,938 UART: [ldev] AUTHORITY.KEYID = 7
1,212,401 UART: [ldev] FE.KEYID = 1
1,217,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,350 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46505652
1,283,903 UART: [rt] FIPS Version
1,284,457 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,295 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,957 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
893,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,426 UART: [kat] ++
897,578 UART: [kat] sha1
901,856 UART: [kat] SHA2-256
903,796 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
918,343 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,473 UART: [idev] ++
1,175,641 UART: [idev] CDI.KEYID = 6
1,176,001 UART: [idev] SUBJECT.KEYID = 7
1,176,425 UART: [idev] UDS.KEYID = 0
1,176,770 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,443 UART: [idev] Erasing UDS.KEYID = 0
1,201,706 UART: [idev] Sha1 KeyId Algorithm
1,210,160 UART: [idev] --
1,211,194 UART: [ldev] ++
1,211,362 UART: [ldev] CDI.KEYID = 6
1,211,725 UART: [ldev] SUBJECT.KEYID = 5
1,212,151 UART: [ldev] AUTHORITY.KEYID = 7
1,212,614 UART: [ldev] FE.KEYID = 1
1,217,908 UART: [ldev] Erasing FE.KEYID = 1
1,244,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,546 UART: [ldev] --
1,283,875 UART: [fwproc] Wait for Commands...
1,284,561 UART: [fwproc] Recv command 0x46505652
1,285,382 UART: [rt] FIPS Version
1,285,936 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,896 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,496 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,983 UART: [kat] ++
895,135 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,582 UART: [kat] LMS
1,168,894 UART: [kat] --
1,169,661 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,199,317 UART: [idev] Sha1 KeyId Algorithm
1,208,333 UART: [idev] --
1,209,372 UART: [ldev] ++
1,209,540 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,331 UART: [ldev] AUTHORITY.KEYID = 7
1,210,794 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,241,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,634 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46505652
1,283,034 UART: [rt] FIPS Version
1,283,595 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,512 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,492 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,174,266 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,844 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46505652
1,283,709 UART: [rt] FIPS Version
1,284,270 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,699 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,211 UART:
192,591 UART: Running Caliptra ROM ...
193,732 UART:
193,883 UART: [state] CFI Enabled
266,519 UART: [state] LifecycleState = Unprovisioned
268,521 UART: [state] DebugLocked = No
269,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,446 UART: [kat] SHA2-256
445,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,625 UART: [kat] ++
456,102 UART: [kat] sha1
465,707 UART: [kat] SHA2-256
468,439 UART: [kat] SHA2-384
473,719 UART: [kat] SHA2-512-ACC
476,092 UART: [kat] ECC-384
2,765,871 UART: [kat] HMAC-384Kdf
2,779,627 UART: [kat] LMS
3,969,924 UART: [kat] --
3,975,698 UART: [cold-reset] ++
3,977,418 UART: [fht] Storing FHT @ 0x50003400
3,988,904 UART: [idev] ++
3,989,496 UART: [idev] CDI.KEYID = 6
3,990,535 UART: [idev] SUBJECT.KEYID = 7
3,991,717 UART: [idev] UDS.KEYID = 0
3,992,761 ready_for_fw is high
3,992,976 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,136,455 UART: [idev] Erasing UDS.KEYID = 0
7,325,152 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,270 UART: [idev] --
7,349,727 UART: [ldev] ++
7,350,302 UART: [ldev] CDI.KEYID = 6
7,351,241 UART: [ldev] SUBJECT.KEYID = 5
7,352,460 UART: [ldev] AUTHORITY.KEYID = 7
7,353,749 UART: [ldev] FE.KEYID = 1
7,400,728 UART: [ldev] Erasing FE.KEYID = 1
10,734,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,483 UART: [ldev] --
13,118,370 UART: [fwproc] Waiting for Commands...
13,121,334 UART: [fwproc] Received command 0x46574c44
13,123,523 UART: [fwproc] Received Image of size 114036 bytes
17,178,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,642,461 >>> mbox cmd response: success
17,643,037 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,646,875 UART: [afmc] ++
17,647,461 UART: [afmc] CDI.KEYID = 6
17,648,396 UART: [afmc] SUBJECT.KEYID = 7
17,649,665 UART: [afmc] AUTHORITY.KEYID = 5
21,002,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,091 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,347 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,318,767 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,333,590 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,039 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,113 UART: [afmc] --
23,374,622 UART: [cold-reset] --
23,379,237 UART: [state] Locking Datavault
23,383,690 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,430 UART: [state] Locking ICCM
23,387,270 UART: [exit] Launching FMC @ 0x40000130
23,395,670 UART:
23,395,907 UART: Running Caliptra FMC ...
23,397,007 UART:
23,397,170 UART: [state] CFI Enabled
23,461,797 UART: [fht] FMC Alias Private Key: 7
25,800,122 UART: [art] Extend RT PCRs Done
25,801,343 UART: [art] Lock RT PCRs Done
25,803,052 UART: [art] Populate DV Done
25,808,573 UART: [fht] FMC Alias Private Key: 7
25,810,053 UART: [art] Derive CDI
25,810,791 UART: [art] Store in in slot 0x4
25,869,988 UART: [art] Derive Key Pair
25,871,020 UART: [art] Store priv key in slot 0x5
29,163,183 UART: [art] Derive Key Pair - Done
29,176,025 UART: [art] Signing Cert with AUTHO
29,177,336 UART: RITY.KEYID = 7
31,464,797 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,305 UART: [art] PUB.X = 34804F95890DE9CDA2B954094DF5A053F3461D19706358FC1D5070099AA7138AABFBBAE8DACE2B216FA1B2A793147847
31,473,544 UART: [art] PUB.Y = E0BC8D642B439CFE8C866DCA438F0A8036B2CB06516962199898B78B9B6D8F4C93E2C42A0CA6204192A7DC24F34E6CBD
31,480,767 UART: [art] SIG.R = 61B29C2A2380906E2746BA10C18C620F379543BA452DB98116E3D6D31AD3CF35F71D4D77362D147ABF724939C14D746E
31,488,172 UART: [art] SIG.S = ECF11BF35DD4FBB308B432D818701FDFECE1E1DBCEDF0C58D4E6ADE80A24439C21711CD7BA98DFDB5CE0526EE0CE3221
32,793,317 UART: Caliptra RT
32,794,041 UART: [state] CFI Enabled
32,954,337 UART: [rt] RT listening for mailbox commands...
32,985,477 UART: [rt]cmd =0x46505652, len=4
32,986,806 UART: [rt] FIPS Version
32,988,077 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,804,850 ready_for_fw is high
3,805,300 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,895,891 >>> mbox cmd response: success
17,896,771 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,584,424 UART:
23,584,849 UART: Running Caliptra FMC ...
23,585,978 UART:
23,586,129 UART: [state] CFI Enabled
23,653,034 UART: [fht] FMC Alias Private Key: 7
25,990,236 UART: [art] Extend RT PCRs Done
25,991,471 UART: [art] Lock RT PCRs Done
25,993,400 UART: [art] Populate DV Done
25,998,947 UART: [fht] FMC Alias Private Key: 7
26,000,530 UART: [art] Derive CDI
26,001,274 UART: [art] Store in in slot 0x4
26,060,725 UART: [art] Derive Key Pair
26,061,730 UART: [art] Store priv key in slot 0x5
29,354,664 UART: [art] Derive Key Pair - Done
29,367,550 UART: [art] Signing Cert with AUTHO
29,368,891 UART: RITY.KEYID = 7
31,655,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,930 UART: [art] PUB.X = DD50646A6D6ECC644816457F52BB0A07A22F4A427E4A21C8B35B11BCC3105F1DABA0E91D576EE98250D00305F6FF026A
31,664,176 UART: [art] PUB.Y = 3C247C907FA1835539BC87CEF5B654EB31295A91426C886C6713CA7C37E2414FB1745CA9E87B52383533C8E710F38BC1
31,671,414 UART: [art] SIG.R = 3FE3DA2C5BEF196A152ED092C56FC6CCF81CDEF9473688884DC8968FCCDF1B38F4E766503565A2AE08C596C85A88FE93
31,678,817 UART: [art] SIG.S = D24293C34F4AB88E46C42D5D22B78A87E4DFDF9E84B06173AF99940A7EC9302E88D472CE19B42CE15478EBEF2620DCBE
32,983,922 UART: Caliptra RT
32,984,639 UART: [state] CFI Enabled
33,144,436 UART: [rt] RT listening for mailbox commands...
33,175,599 UART: [rt]cmd =0x46505652, len=4
33,176,849 UART: [rt] FIPS Version
33,178,112 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,510 UART:
192,868 UART: Running Caliptra ROM ...
194,011 UART:
603,585 UART: [state] CFI Enabled
617,139 UART: [state] LifecycleState = Unprovisioned
619,051 UART: [state] DebugLocked = No
621,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,378 UART: [kat] SHA2-256
796,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,656 UART: [kat] ++
807,107 UART: [kat] sha1
819,192 UART: [kat] SHA2-256
821,841 UART: [kat] SHA2-384
826,559 UART: [kat] SHA2-512-ACC
828,937 UART: [kat] ECC-384
3,113,353 UART: [kat] HMAC-384Kdf
3,124,383 UART: [kat] LMS
4,314,497 UART: [kat] --
4,318,471 UART: [cold-reset] ++
4,320,198 UART: [fht] Storing FHT @ 0x50003400
4,331,471 UART: [idev] ++
4,332,050 UART: [idev] CDI.KEYID = 6
4,333,092 UART: [idev] SUBJECT.KEYID = 7
4,334,274 UART: [idev] UDS.KEYID = 0
4,335,337 ready_for_fw is high
4,335,553 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,478,756 UART: [idev] Erasing UDS.KEYID = 0
7,621,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,732 UART: [idev] --
7,647,462 UART: [ldev] ++
7,648,074 UART: [ldev] CDI.KEYID = 6
7,648,967 UART: [ldev] SUBJECT.KEYID = 5
7,650,020 UART: [ldev] AUTHORITY.KEYID = 7
7,651,312 UART: [ldev] FE.KEYID = 1
7,663,712 UART: [ldev] Erasing FE.KEYID = 1
10,948,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,291 UART: [ldev] --
13,310,132 UART: [fwproc] Waiting for Commands...
13,313,096 UART: [fwproc] Received command 0x46574c44
13,315,289 UART: [fwproc] Received Image of size 114036 bytes
17,363,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,823,050 >>> mbox cmd response: success
17,823,570 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,827,544 UART: [afmc] ++
17,828,131 UART: [afmc] CDI.KEYID = 6
17,829,066 UART: [afmc] SUBJECT.KEYID = 7
17,830,340 UART: [afmc] AUTHORITY.KEYID = 5
21,138,468 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,433,410 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,447,811 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,462,621 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,052 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,498,423 UART: [afmc] --
23,501,765 UART: [cold-reset] --
23,503,628 UART: [state] Locking Datavault
23,508,230 UART: [state] Locking PCR0, PCR1 and PCR31
23,509,927 UART: [state] Locking ICCM
23,511,647 UART: [exit] Launching FMC @ 0x40000130
23,520,047 UART:
23,520,294 UART: Running Caliptra FMC ...
23,521,397 UART:
23,521,558 UART: [state] CFI Enabled
23,529,902 UART: [fht] FMC Alias Private Key: 7
25,861,043 UART: [art] Extend RT PCRs Done
25,862,268 UART: [art] Lock RT PCRs Done
25,864,156 UART: [art] Populate DV Done
25,869,733 UART: [fht] FMC Alias Private Key: 7
25,871,378 UART: [art] Derive CDI
25,872,114 UART: [art] Store in in slot 0x4
25,914,765 UART: [art] Derive Key Pair
25,915,807 UART: [art] Store priv key in slot 0x5
29,158,592 UART: [art] Derive Key Pair - Done
29,171,905 UART: [art] Signing Cert with AUTHO
29,173,234 UART: RITY.KEYID = 7
31,452,605 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,110 UART: [art] PUB.X = 4E6F5EC64574C8FE281DB8B8D62C3B4504FBE294E8630CCC002379C4C2070A95DA8373CD33CD5144752B8AE6B37CC3AE
31,461,360 UART: [art] PUB.Y = 461E3E97DB53AE6AF69A358AE16F1A7374DD2BBF5BD73D01A30CA8E663DBBFDAF3705B319EC740A0E8BBCE7DDDB337E0
31,468,722 UART: [art] SIG.R = 67765171F04C2B22F92A20BDF6D1237032632C9F43088EC33F8B12AA5F41A0799ADC8D5FE261612112298D1ABFCD4A03
31,476,062 UART: [art] SIG.S = 50A464B73F8330A6A83D75ECA769BF2ADC6848D22FC1E376689C47E198432C74F046F6C5C003F2C5E0909BE050580FD3
32,781,708 UART: Caliptra RT
32,782,420 UART: [state] CFI Enabled
32,900,256 UART: [rt] RT listening for mailbox commands...
32,931,241 UART: [rt]cmd =0x46505652, len=4
32,932,524 UART: [rt] FIPS Version
32,933,739 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,122,386 ready_for_fw is high
4,122,816 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,077,694 >>> mbox cmd response: success
18,078,677 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,717,527 UART:
23,717,917 UART: Running Caliptra FMC ...
23,719,045 UART:
23,719,231 UART: [state] CFI Enabled
23,726,845 UART: [fht] FMC Alias Private Key: 7
26,058,448 UART: [art] Extend RT PCRs Done
26,059,670 UART: [art] Lock RT PCRs Done
26,061,519 UART: [art] Populate DV Done
26,067,094 UART: [fht] FMC Alias Private Key: 7
26,068,638 UART: [art] Derive CDI
26,069,375 UART: [art] Store in in slot 0x4
26,112,088 UART: [art] Derive Key Pair
26,113,134 UART: [art] Store priv key in slot 0x5
29,355,089 UART: [art] Derive Key Pair - Done
29,368,093 UART: [art] Signing Cert with AUTHO
29,369,405 UART: RITY.KEYID = 7
31,648,975 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,480 UART: [art] PUB.X = 4CC56639F5D980AA5CF8E1686D4B7DCCCDC6175A12C701D07B0252461D2062976CB4046ABF1F3AFA0C1276F352F38021
31,657,729 UART: [art] PUB.Y = F0FEAD00A0DF785C5641A31EFCE6F052753A6C0EA83722CAFF2D9569506B85EC98BC0B1D083C2B126CD073AE4DDC4AD6
31,664,983 UART: [art] SIG.R = F497955F1F946E7337D99353D02CFCC80C1D5897AFE5FC770A90741015F3C69E387510BF21AB88AAFF3E31EC76CF6B3E
31,672,388 UART: [art] SIG.S = 26ED06DFC58F70BC19A98D1BBB4EE41E48875DF843F6C95EF90C1D453FE05E25F23304BC0820F7FE0EB77E0BD741FE12
32,977,369 UART: Caliptra RT
32,978,074 UART: [state] CFI Enabled
33,095,247 UART: [rt] RT listening for mailbox commands...
33,126,384 UART: [rt]cmd =0x46505652, len=4
33,127,629 UART: [rt] FIPS Version
33,129,112 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,297 UART:
192,667 UART: Running Caliptra ROM ...
193,887 UART:
194,038 UART: [state] CFI Enabled
265,236 UART: [state] LifecycleState = Unprovisioned
267,158 UART: [state] DebugLocked = No
269,406 UART: [state] WD Timer not started. Device not locked for debugging
273,013 UART: [kat] SHA2-256
452,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,733 UART: [kat] ++
464,265 UART: [kat] sha1
474,244 UART: [kat] SHA2-256
477,254 UART: [kat] SHA2-384
483,103 UART: [kat] SHA2-512-ACC
486,110 UART: [kat] ECC-384
2,948,950 UART: [kat] HMAC-384Kdf
2,973,270 UART: [kat] LMS
3,502,726 UART: [kat] --
3,505,869 UART: [cold-reset] ++
3,507,655 UART: [fht] FHT @ 0x50003400
3,518,636 UART: [idev] ++
3,519,208 UART: [idev] CDI.KEYID = 6
3,520,090 UART: [idev] SUBJECT.KEYID = 7
3,521,339 UART: [idev] UDS.KEYID = 0
3,522,241 ready_for_fw is high
3,522,440 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,666,275 UART: [idev] Erasing UDS.KEYID = 0
6,029,870 UART: [idev] Sha1 KeyId Algorithm
6,053,150 UART: [idev] --
6,056,690 UART: [ldev] ++
6,057,277 UART: [ldev] CDI.KEYID = 6
6,058,193 UART: [ldev] SUBJECT.KEYID = 5
6,059,354 UART: [ldev] AUTHORITY.KEYID = 7
6,060,593 UART: [ldev] FE.KEYID = 1
6,101,677 UART: [ldev] Erasing FE.KEYID = 1
8,604,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,885 UART: [ldev] --
10,416,557 UART: [fwproc] Wait for Commands...
10,418,229 UART: [fwproc] Recv command 0x46574c44
10,420,347 UART: [fwproc] Recv'd Img size: 114360 bytes
13,820,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,279 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,275,806 >>> mbox cmd response: success
14,276,385 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,279,930 UART: [afmc] ++
14,280,513 UART: [afmc] CDI.KEYID = 6
14,281,423 UART: [afmc] SUBJECT.KEYID = 7
14,282,581 UART: [afmc] AUTHORITY.KEYID = 5
16,808,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,867 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,073 UART: [afmc] --
18,607,893 UART: [cold-reset] --
18,611,465 UART: [state] Locking Datavault
18,618,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,590 UART: [state] Locking ICCM
18,623,171 UART: [exit] Launching FMC @ 0x40000130
18,631,569 UART:
18,631,804 UART: Running Caliptra FMC ...
18,632,906 UART:
18,633,064 UART: [state] CFI Enabled
18,690,914 UART: [fht] FMC Alias Private Key: 7
20,454,810 UART: [art] Extend RT PCRs Done
20,456,038 UART: [art] Lock RT PCRs Done
20,457,395 UART: [art] Populate DV Done
20,462,701 UART: [fht] FMC Alias Private Key: 7
20,464,354 UART: [art] Derive CDI
20,465,197 UART: [art] Store in in slot 0x4
20,523,136 UART: [art] Derive Key Pair
20,524,140 UART: [art] Store priv key in slot 0x5
22,987,265 UART: [art] Derive Key Pair - Done
23,000,322 UART: [art] Signing Cert with AUTHO
23,001,637 UART: RITY.KEYID = 7
24,714,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,585 UART: [art] PUB.X = 4447FCC4E7D4AD2A71BCD4C4DAE58EDE3EAFA6358028A8DEE94C31511C54C7677EE164D158DD89CFDA611EF85A5E917F
24,722,855 UART: [art] PUB.Y = 94D5EBEA03A5C1E42337345F3BB16A210806005C4634E5302809E452B03BF689EF388C1469E76F11E97FEB8AA26F7101
24,730,128 UART: [art] SIG.R = C6C17754E679BB4E3846B197002BD96D2EB105775DFBDE58A1DF5C1B002DEB6140ED8DBEE31497397DBAA5C4622B572C
24,737,463 UART: [art] SIG.S = 05F5C3525DAF330B7581B4EF6BE8C78F6F3D020FCB6F0781BF60A7CFBCC355F8BBE514F87623F60B4F5A797B12F0E196
25,716,079 UART: Caliptra RT
25,716,777 UART: [state] CFI Enabled
25,881,162 UART: [rt] RT listening for mailbox commands...
25,912,269 UART: [rt]cmd =0x46505652, len=4
25,913,560 UART: [rt] FIPS Version
25,914,850 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,388 UART:
192,759 UART: Running Caliptra ROM ...
193,869 UART:
194,012 UART: [state] CFI Enabled
263,666 UART: [state] LifecycleState = Unprovisioned
266,035 UART: [state] DebugLocked = No
268,060 UART: [state] WD Timer not started. Device not locked for debugging
273,490 UART: [kat] SHA2-256
463,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,173 UART: [kat] ++
474,622 UART: [kat] sha1
485,715 UART: [kat] SHA2-256
488,731 UART: [kat] SHA2-384
493,822 UART: [kat] SHA2-512-ACC
496,410 UART: [kat] ECC-384
2,951,097 UART: [kat] HMAC-384Kdf
2,972,221 UART: [kat] LMS
3,503,990 UART: [kat] --
3,508,555 UART: [cold-reset] ++
3,511,055 UART: [fht] FHT @ 0x50003400
3,522,108 UART: [idev] ++
3,522,811 UART: [idev] CDI.KEYID = 6
3,523,793 UART: [idev] SUBJECT.KEYID = 7
3,524,969 UART: [idev] UDS.KEYID = 0
3,525,943 ready_for_fw is high
3,526,150 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,004 UART: [idev] Erasing UDS.KEYID = 0
6,029,608 UART: [idev] Sha1 KeyId Algorithm
6,051,556 UART: [idev] --
6,057,123 UART: [ldev] ++
6,057,825 UART: [ldev] CDI.KEYID = 6
6,058,737 UART: [ldev] SUBJECT.KEYID = 5
6,059,901 UART: [ldev] AUTHORITY.KEYID = 7
6,061,136 UART: [ldev] FE.KEYID = 1
6,102,575 UART: [ldev] Erasing FE.KEYID = 1
8,604,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,122 UART: [ldev] --
10,416,438 UART: [fwproc] Wait for Commands...
10,418,209 UART: [fwproc] Recv command 0x46574c44
10,420,521 UART: [fwproc] Recv'd Img size: 114360 bytes
13,867,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,608,530 >>> mbox cmd response: success
14,609,129 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,612,101 UART: [afmc] ++
14,612,896 UART: [afmc] CDI.KEYID = 6
14,613,951 UART: [afmc] SUBJECT.KEYID = 7
14,615,490 UART: [afmc] AUTHORITY.KEYID = 5
17,157,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,809 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,919,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,934,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,949,153 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,972,696 UART: [afmc] --
18,976,555 UART: [cold-reset] --
18,981,677 UART: [state] Locking Datavault
18,987,794 UART: [state] Locking PCR0, PCR1 and PCR31
18,989,986 UART: [state] Locking ICCM
18,992,666 UART: [exit] Launching FMC @ 0x40000130
19,001,321 UART:
19,001,578 UART: Running Caliptra FMC ...
19,002,610 UART:
19,002,763 UART: [state] CFI Enabled
19,058,670 UART: [fht] FMC Alias Private Key: 7
20,822,545 UART: [art] Extend RT PCRs Done
20,823,765 UART: [art] Lock RT PCRs Done
20,825,200 UART: [art] Populate DV Done
20,830,289 UART: [fht] FMC Alias Private Key: 7
20,831,933 UART: [art] Derive CDI
20,832,876 UART: [art] Store in in slot 0x4
20,891,211 UART: [art] Derive Key Pair
20,892,237 UART: [art] Store priv key in slot 0x5
23,355,141 UART: [art] Derive Key Pair - Done
23,368,191 UART: [art] Signing Cert with AUTHO
23,369,497 UART: RITY.KEYID = 7
25,081,080 UART: [art] Erasing AUTHORITY.KEYID = 7
25,082,591 UART: [art] PUB.X = 7BDC8B0B395411AA03AD631709541AF9BF4D1F19B8684491AB880463C92B0733502B7FC384C9CE809CAF504361BD2E09
25,089,873 UART: [art] PUB.Y = 423DF757C763DF3DFC49C0A99D1ED9017C359B2B0D5151D110BB676E525B3D2052B5493CBE3391093A895F5D7E8D1E8F
25,097,130 UART: [art] SIG.R = E503E64FFB23A34DC6C3095E7B27CF510487F89E9BAF356FDC89C350F57A473A1BB9E033F39418999356CA30C26A23C5
25,104,504 UART: [art] SIG.S = F4D0DD87EE4F2615CB903103E5385F6A81204029A3C14AE1B689C9667C0EC88DF86ED83B731821BD462F4EBCA66C200B
26,083,499 UART: Caliptra RT
26,084,194 UART: [state] CFI Enabled
26,249,169 UART: [rt] RT listening for mailbox commands...
26,280,031 UART: [rt]cmd =0x46505652, len=4
26,281,367 UART: [rt] FIPS Version
26,282,417 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,436,363 ready_for_fw is high
3,436,761 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,731,250 >>> mbox cmd response: success
14,732,000 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,048,812 UART:
19,049,204 UART: Running Caliptra FMC ...
19,050,344 UART:
19,050,508 UART: [state] CFI Enabled
19,114,134 UART: [fht] FMC Alias Private Key: 7
20,877,917 UART: [art] Extend RT PCRs Done
20,879,149 UART: [art] Lock RT PCRs Done
20,881,017 UART: [art] Populate DV Done
20,886,131 UART: [fht] FMC Alias Private Key: 7
20,887,781 UART: [art] Derive CDI
20,888,617 UART: [art] Store in in slot 0x4
20,947,108 UART: [art] Derive Key Pair
20,948,144 UART: [art] Store priv key in slot 0x5
23,411,367 UART: [art] Derive Key Pair - Done
23,424,358 UART: [art] Signing Cert with AUTHO
23,425,657 UART: RITY.KEYID = 7
25,137,195 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,707 UART: [art] PUB.X = 7FCCC9569F05F79CAED00786D0A119FBCFC97BF9C81C176307B6868953EDFEF005FC5B41AC3610561D9CCDD149A129D4
25,145,993 UART: [art] PUB.Y = 712CB3C88C9D9F365813B66ED7C5C1A003350DB374FB5A80D010F4D320A0077F7AC54AB53935D5ABE2CD81C0196C9BF3
25,153,274 UART: [art] SIG.R = 33D0C7F16F4B1C542E16790D95D28DCE0E8DF50231CA75FA58E8A48F086A8D7C8C9B43B311671CA950483140AA2687BF
25,160,663 UART: [art] SIG.S = 3041979B36472D918449DE219934DB2361A3D615F126142FCF7ACD2BAB5C0F9B83D32E7606566020519F787A8B8DB26F
26,139,517 UART: Caliptra RT
26,140,226 UART: [state] CFI Enabled
26,306,076 UART: [rt] RT listening for mailbox commands...
26,337,034 UART: [rt]cmd =0x46505652, len=4
26,338,346 UART: [rt] FIPS Version
26,339,634 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,560 UART:
192,914 UART: Running Caliptra ROM ...
194,020 UART:
603,732 UART: [state] CFI Enabled
619,522 UART: [state] LifecycleState = Unprovisioned
621,895 UART: [state] DebugLocked = No
623,853 UART: [state] WD Timer not started. Device not locked for debugging
628,174 UART: [kat] SHA2-256
818,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,800 UART: [kat] ++
829,355 UART: [kat] sha1
841,460 UART: [kat] SHA2-256
844,479 UART: [kat] SHA2-384
850,402 UART: [kat] SHA2-512-ACC
852,987 UART: [kat] ECC-384
3,298,325 UART: [kat] HMAC-384Kdf
3,309,996 UART: [kat] LMS
3,841,859 UART: [kat] --
3,846,014 UART: [cold-reset] ++
3,848,520 UART: [fht] FHT @ 0x50003400
3,860,423 UART: [idev] ++
3,861,131 UART: [idev] CDI.KEYID = 6
3,862,013 UART: [idev] SUBJECT.KEYID = 7
3,863,264 UART: [idev] UDS.KEYID = 0
3,864,168 ready_for_fw is high
3,864,375 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,008,012 UART: [idev] Erasing UDS.KEYID = 0
6,338,836 UART: [idev] Sha1 KeyId Algorithm
6,362,408 UART: [idev] --
6,366,565 UART: [ldev] ++
6,367,249 UART: [ldev] CDI.KEYID = 6
6,368,161 UART: [ldev] SUBJECT.KEYID = 5
6,369,377 UART: [ldev] AUTHORITY.KEYID = 7
6,370,549 UART: [ldev] FE.KEYID = 1
6,380,277 UART: [ldev] Erasing FE.KEYID = 1
8,855,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,317 UART: [ldev] --
10,648,403 UART: [fwproc] Wait for Commands...
10,651,537 UART: [fwproc] Recv command 0x46574c44
10,653,817 UART: [fwproc] Recv'd Img size: 114360 bytes
14,104,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,838,621 >>> mbox cmd response: success
14,839,198 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,842,862 UART: [afmc] ++
14,843,565 UART: [afmc] CDI.KEYID = 6
14,844,756 UART: [afmc] SUBJECT.KEYID = 7
14,846,240 UART: [afmc] AUTHORITY.KEYID = 5
17,350,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,699 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,239 UART: [afmc] --
19,148,086 UART: [cold-reset] --
19,152,600 UART: [state] Locking Datavault
19,157,360 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,545 UART: [state] Locking ICCM
19,161,000 UART: [exit] Launching FMC @ 0x40000130
19,169,673 UART:
19,169,907 UART: Running Caliptra FMC ...
19,171,008 UART:
19,171,168 UART: [state] CFI Enabled
19,179,216 UART: [fht] FMC Alias Private Key: 7
20,936,170 UART: [art] Extend RT PCRs Done
20,937,432 UART: [art] Lock RT PCRs Done
20,938,821 UART: [art] Populate DV Done
20,944,295 UART: [fht] FMC Alias Private Key: 7
20,946,060 UART: [art] Derive CDI
20,946,942 UART: [art] Store in in slot 0x4
20,989,063 UART: [art] Derive Key Pair
20,990,072 UART: [art] Store priv key in slot 0x5
23,417,547 UART: [art] Derive Key Pair - Done
23,430,484 UART: [art] Signing Cert with AUTHO
23,431,819 UART: RITY.KEYID = 7
25,137,164 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,676 UART: [art] PUB.X = 88D3F6B51FB3EE3AA598C0531FF9808244548D8113C78B32D5A1D3C8F818050F0F95DD035282A03B32AD79419A3D22FD
25,145,926 UART: [art] PUB.Y = B685FD89B679A2000872DEFF22B2FD1647F502BCB97AF0B1C7FE8905D88158D7CA6F7C2A360291041C74275C757D519E
25,153,151 UART: [art] SIG.R = 08D097F54C663B13B9B3CC0A5E38FB7285CBD6B1A28EE288D3DBAFEC598D987CF0DACEF10B5ACE2C412C50A6A02CA04E
25,160,606 UART: [art] SIG.S = 206BAF528470CE7CA386C5620A89FEB989C2B5ECAA74F26B66EC8B3099BF331DA6F6BC5A78E8170A114D19FF8289B940
26,139,567 UART: Caliptra RT
26,140,257 UART: [state] CFI Enabled
26,258,360 UART: [rt] RT listening for mailbox commands...
26,289,457 UART: [rt]cmd =0x46505652, len=4
26,290,757 UART: [rt] FIPS Version
26,292,046 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,752,439 ready_for_fw is high
3,752,896 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,950,923 >>> mbox cmd response: success
14,951,722 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,203,217 UART:
19,203,616 UART: Running Caliptra FMC ...
19,204,753 UART:
19,204,908 UART: [state] CFI Enabled
19,212,674 UART: [fht] FMC Alias Private Key: 7
20,969,879 UART: [art] Extend RT PCRs Done
20,971,098 UART: [art] Lock RT PCRs Done
20,972,947 UART: [art] Populate DV Done
20,978,328 UART: [fht] FMC Alias Private Key: 7
20,979,874 UART: [art] Derive CDI
20,980,693 UART: [art] Store in in slot 0x4
21,023,780 UART: [art] Derive Key Pair
21,024,821 UART: [art] Store priv key in slot 0x5
23,451,526 UART: [art] Derive Key Pair - Done
23,464,413 UART: [art] Signing Cert with AUTHO
23,465,723 UART: RITY.KEYID = 7
25,171,202 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,708 UART: [art] PUB.X = 5FCA0532E2ED1EC7C3B767C26468A33AE4FD8BFFF69D0BA5B8B7604772E9A8921441875453063425D79762285F44F981
25,179,952 UART: [art] PUB.Y = 1BB734E555C79184EAE0E1422B6E6DD291F40B8E5C8EBF8C2FC37BC4DBB5A0E09314254E4D54BF323AA16B1C0FB40F95
25,187,222 UART: [art] SIG.R = E83B587A37B5C36AD4B2EEEC7D254959383BA1ADAE164D6E22505125B636610E01F57E2C7DC7505428847584C8AA457F
25,194,646 UART: [art] SIG.S = 7424BA7B72FB9E032A2F8A5EE7A2F9A2483DC264BAF3B39FC440F5572403E8778A27D1B31BD661E673AC1F89EA032064
26,173,375 UART: Caliptra RT
26,174,085 UART: [state] CFI Enabled
26,291,159 UART: [rt] RT listening for mailbox commands...
26,321,889 UART: [rt]cmd =0x46505652, len=4
26,323,196 UART: [rt] FIPS Version
26,324,302 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,891 UART: [kat] SHA2-256
881,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,937 UART: [kat] ++
886,089 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,570 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,113 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,260 UART: [idev] ++
1,479,428 UART: [idev] CDI.KEYID = 6
1,479,788 UART: [idev] SUBJECT.KEYID = 7
1,480,212 UART: [idev] UDS.KEYID = 0
1,480,557 ready_for_fw is high
1,480,557 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,136 UART: [idev] Erasing UDS.KEYID = 0
1,504,652 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,262 UART: [idev] --
1,514,383 UART: [ldev] ++
1,514,551 UART: [ldev] CDI.KEYID = 6
1,514,914 UART: [ldev] SUBJECT.KEYID = 5
1,515,340 UART: [ldev] AUTHORITY.KEYID = 7
1,515,803 UART: [ldev] FE.KEYID = 1
1,521,049 UART: [ldev] Erasing FE.KEYID = 1
1,545,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,286 UART: [ldev] --
1,584,753 UART: [fwproc] Waiting for Commands...
1,585,452 UART: [fwproc] Received command 0x46574c44
1,586,243 UART: [fwproc] Received Image of size 114360 bytes
2,883,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,014 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,076,161 >>> mbox cmd response: success
3,076,161 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,213 UART: [afmc] ++
3,077,381 UART: [afmc] CDI.KEYID = 6
3,077,743 UART: [afmc] SUBJECT.KEYID = 7
3,078,168 UART: [afmc] AUTHORITY.KEYID = 5
3,113,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,052 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,742 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,577 UART: [afmc] --
3,156,697 UART: [cold-reset] --
3,157,751 UART: [state] Locking Datavault
3,158,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,502 UART: [state] Locking ICCM
3,159,960 UART: [exit] Launching FMC @ 0x40000130
3,165,289 UART:
3,165,305 UART: Running Caliptra FMC ...
3,165,713 UART:
3,165,767 UART: [state] CFI Enabled
3,176,216 UART: [fht] FMC Alias Private Key: 7
3,284,233 UART: [art] Extend RT PCRs Done
3,284,661 UART: [art] Lock RT PCRs Done
3,286,103 UART: [art] Populate DV Done
3,294,256 UART: [fht] FMC Alias Private Key: 7
3,295,406 UART: [art] Derive CDI
3,295,686 UART: [art] Store in in slot 0x4
3,381,149 UART: [art] Derive Key Pair
3,381,509 UART: [art] Store priv key in slot 0x5
3,394,551 UART: [art] Derive Key Pair - Done
3,409,132 UART: [art] Signing Cert with AUTHO
3,409,612 UART: RITY.KEYID = 7
3,425,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,811 UART: [art] PUB.X = 5197C46ABE119DADD5394EC41E26F2DEB50DBAD81C2B2774912410FF4B3028AFDC4A08E6779D4B79B354822E9F97F90D
3,432,584 UART: [art] PUB.Y = 4103101C5627EFC06A47B39E3F0B4E3122F04A9C7A2DD39CCFD8FB21A84EC2EF66CC7C65AE4AB635AD0C4F2A7B198507
3,439,540 UART: [art] SIG.R = 29867DB84D0F96E3E2247A305A1343A9F6DD03CC60032A05F01F1D3DDB683D7BC97C571306A9972546A8A79D0B21998D
3,446,292 UART: [art] SIG.S = 47EA9AD73C3D636E6CFC86B41905BDEF90771A89711C75EC58CF7883402557151A7B853979B2BB532A82E271A31D515D
3,470,596 UART: Caliptra RT
3,470,850 UART: [state] CFI Enabled
3,578,959 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,034 UART: [rt]cmd =0x46505652, len=4
3,609,705 UART: [rt] FIPS Version
3,611,003 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,195 ready_for_fw is high
1,362,195 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,926,687 >>> mbox cmd response: success
2,926,687 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,987,877 UART:
2,987,893 UART: Running Caliptra FMC ...
2,988,301 UART:
2,988,355 UART: [state] CFI Enabled
2,998,532 UART: [fht] FMC Alias Private Key: 7
3,106,495 UART: [art] Extend RT PCRs Done
3,106,923 UART: [art] Lock RT PCRs Done
3,108,441 UART: [art] Populate DV Done
3,116,672 UART: [fht] FMC Alias Private Key: 7
3,117,642 UART: [art] Derive CDI
3,117,922 UART: [art] Store in in slot 0x4
3,203,625 UART: [art] Derive Key Pair
3,203,985 UART: [art] Store priv key in slot 0x5
3,217,019 UART: [art] Derive Key Pair - Done
3,231,827 UART: [art] Signing Cert with AUTHO
3,232,307 UART: RITY.KEYID = 7
3,247,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,900 UART: [art] PUB.X = 37F4FE95E302AE40ED837FDD21B94F94F7E1819BA860F16D41EAAFB1E67270D9AE4EC162096CC8C9A12E9CB9377987B0
3,254,678 UART: [art] PUB.Y = B2C1ED3272240ADA1007103FC40E2BC4B8D360629B86FD0D34C0DAFBD2B9EE1567DF01EE113593B1FD859214BACF3A95
3,261,629 UART: [art] SIG.R = 86141A0DCC984616B008F8B6AC621480E980401E17382FBC93E5984D5DF8791724352BA3923AEEF3EAB8E125311470B3
3,268,389 UART: [art] SIG.S = D7010021430FD0697D301B4E904BF9FD7C8870413B40675B194C756BCD9D3DC2D2992157945CAA99001CAD34EA9635E7
3,292,622 UART: Caliptra RT
3,292,876 UART: [state] CFI Enabled
3,401,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,248 UART: [rt]cmd =0x46505652, len=4
3,431,919 UART: [rt] FIPS Version
3,433,095 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,506 UART: [kat] SHA2-256
892,444 UART: [kat] SHA2-384
895,303 UART: [kat] SHA2-512-ACC
897,204 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,541 UART: [kat] LMS
1,475,737 UART: [kat] --
1,476,578 UART: [cold-reset] ++
1,477,088 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,755 UART: [idev] Erasing UDS.KEYID = 0
1,505,939 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,531 UART: [idev] --
1,515,644 UART: [ldev] ++
1,515,812 UART: [ldev] CDI.KEYID = 6
1,516,175 UART: [ldev] SUBJECT.KEYID = 5
1,516,601 UART: [ldev] AUTHORITY.KEYID = 7
1,517,064 UART: [ldev] FE.KEYID = 1
1,522,128 UART: [ldev] Erasing FE.KEYID = 1
1,547,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,697 UART: [ldev] --
1,586,990 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 114360 bytes
2,885,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,078,670 >>> mbox cmd response: success
3,078,670 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,079,746 UART: [afmc] ++
3,079,914 UART: [afmc] CDI.KEYID = 6
3,080,276 UART: [afmc] SUBJECT.KEYID = 7
3,080,701 UART: [afmc] AUTHORITY.KEYID = 5
3,116,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,688 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,416 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,301 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,991 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,944 UART: [afmc] --
3,159,926 UART: [cold-reset] --
3,160,640 UART: [state] Locking Datavault
3,161,905 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,509 UART: [state] Locking ICCM
3,162,995 UART: [exit] Launching FMC @ 0x40000130
3,168,324 UART:
3,168,340 UART: Running Caliptra FMC ...
3,168,748 UART:
3,168,891 UART: [state] CFI Enabled
3,179,344 UART: [fht] FMC Alias Private Key: 7
3,286,787 UART: [art] Extend RT PCRs Done
3,287,215 UART: [art] Lock RT PCRs Done
3,288,687 UART: [art] Populate DV Done
3,296,748 UART: [fht] FMC Alias Private Key: 7
3,297,716 UART: [art] Derive CDI
3,297,996 UART: [art] Store in in slot 0x4
3,383,595 UART: [art] Derive Key Pair
3,383,955 UART: [art] Store priv key in slot 0x5
3,397,505 UART: [art] Derive Key Pair - Done
3,412,516 UART: [art] Signing Cert with AUTHO
3,412,996 UART: RITY.KEYID = 7
3,428,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,979 UART: [art] PUB.X = 01443D1524AAA53C9F9248ADAFA66E89AA3E3C37443ACD951A99F410391C81BC07E1B4D8E30FF977ED977B89516EE551
3,435,748 UART: [art] PUB.Y = 278D7553ED677B8692750AAEBE468CF53CB61DDF5537003EF0587EFD2A78F6F5CB40D94B6F47E3817CFBEA1E3B190943
3,442,682 UART: [art] SIG.R = 995025D86C4DDB75528B21DDD0DFE9B46A75074F842E6FADD0BE08893348EB59886EE8AFCFF9B1FF89BBE8CC45F97ABC
3,449,470 UART: [art] SIG.S = 356501292E3CEC2D80E442A37E493D45BCA6B38CE96C338CBE252C5F03B5F6DBA03E6B8C4AFAD6018DDEEA7129A82018
3,473,322 UART: Caliptra RT
3,473,668 UART: [state] CFI Enabled
3,582,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,223 UART: [rt]cmd =0x46505652, len=4
3,612,894 UART: [rt] FIPS Version
3,613,856 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 ready_for_fw is high
1,362,972 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,930,532 >>> mbox cmd response: success
2,930,532 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,860 UART:
2,991,876 UART: Running Caliptra FMC ...
2,992,284 UART:
2,992,427 UART: [state] CFI Enabled
3,003,132 UART: [fht] FMC Alias Private Key: 7
3,111,471 UART: [art] Extend RT PCRs Done
3,111,899 UART: [art] Lock RT PCRs Done
3,113,257 UART: [art] Populate DV Done
3,121,512 UART: [fht] FMC Alias Private Key: 7
3,122,646 UART: [art] Derive CDI
3,122,926 UART: [art] Store in in slot 0x4
3,209,115 UART: [art] Derive Key Pair
3,209,475 UART: [art] Store priv key in slot 0x5
3,222,921 UART: [art] Derive Key Pair - Done
3,237,599 UART: [art] Signing Cert with AUTHO
3,238,079 UART: RITY.KEYID = 7
3,253,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,150 UART: [art] PUB.X = 838703737545685BACA11F4AB112CEC702E41A2790A7079C14210DAB509A0A09CD4E4CF4E538F9AB48E237BF57BC0609
3,260,900 UART: [art] PUB.Y = 3F9AACA331AFBF7AEFB84B4857701F02F88098E7FC02D20881BC86958AE27DD2CBDA1A3E78B5A80D28BA3F310D21336B
3,267,853 UART: [art] SIG.R = FC383295D45A3803E4580AA1FA7D960DDFAB263A6B1969F7836D32792FF31629B9C2BE1ED309876656D27710883497F5
3,274,607 UART: [art] SIG.S = 48AAD3FF893152CE2CAD61FE5EBAB315949C3358244AFF8775AD993758655EBC9DA4FCCD6CF7C64C7D0F2E9955F2EECC
3,298,621 UART: Caliptra RT
3,298,967 UART: [state] CFI Enabled
3,406,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,662 UART: [rt]cmd =0x46505652, len=4
3,437,333 UART: [rt] FIPS Version
3,438,415 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,430 UART: [kat] HMAC-384Kdf
923,196 UART: [kat] LMS
1,171,524 UART: [kat] --
1,172,325 UART: [cold-reset] ++
1,172,899 UART: [fht] FHT @ 0x50003400
1,175,532 UART: [idev] ++
1,175,700 UART: [idev] CDI.KEYID = 6
1,176,060 UART: [idev] SUBJECT.KEYID = 7
1,176,484 UART: [idev] UDS.KEYID = 0
1,176,829 ready_for_fw is high
1,176,829 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,201,455 UART: [idev] Sha1 KeyId Algorithm
1,209,971 UART: [idev] --
1,210,959 UART: [ldev] ++
1,211,127 UART: [ldev] CDI.KEYID = 6
1,211,490 UART: [ldev] SUBJECT.KEYID = 5
1,211,916 UART: [ldev] AUTHORITY.KEYID = 7
1,212,379 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,244,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,151 UART: [ldev] --
1,283,498 UART: [fwproc] Wait for Commands...
1,284,162 UART: [fwproc] Recv command 0x46574c44
1,284,890 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,292 >>> mbox cmd response: success
2,775,292 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,338 UART: [afmc] ++
2,776,506 UART: [afmc] CDI.KEYID = 6
2,776,868 UART: [afmc] SUBJECT.KEYID = 7
2,777,293 UART: [afmc] AUTHORITY.KEYID = 5
2,812,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,030 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,701 UART: [afmc] --
2,855,801 UART: [cold-reset] --
2,856,677 UART: [state] Locking Datavault
2,858,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,654 UART: [state] Locking ICCM
2,859,122 UART: [exit] Launching FMC @ 0x40000130
2,864,451 UART:
2,864,467 UART: Running Caliptra FMC ...
2,864,875 UART:
2,864,929 UART: [state] CFI Enabled
2,875,538 UART: [fht] FMC Alias Private Key: 7
2,983,129 UART: [art] Extend RT PCRs Done
2,983,557 UART: [art] Lock RT PCRs Done
2,984,571 UART: [art] Populate DV Done
2,992,660 UART: [fht] FMC Alias Private Key: 7
2,993,800 UART: [art] Derive CDI
2,994,080 UART: [art] Store in in slot 0x4
3,079,455 UART: [art] Derive Key Pair
3,079,815 UART: [art] Store priv key in slot 0x5
3,093,679 UART: [art] Derive Key Pair - Done
3,109,011 UART: [art] Signing Cert with AUTHO
3,109,491 UART: RITY.KEYID = 7
3,124,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,276 UART: [art] PUB.X = E84BE84CF478BD0BC06955434A8AEFDF63678B72CC470FC6F43734E2FD1741148358651C4EB4C1F4CC3936CA34A3D3BF
3,132,052 UART: [art] PUB.Y = 1DBC457AD83428C6E724B1AAADC814AB6255F25C5D90D487F4DCDFFE1C9DF93D03EF5178CDA96466FE317FB650483290
3,139,015 UART: [art] SIG.R = 3C87FBCCD25DBE4E6E65556B225501EC9336EC60CF1696876C5EDFD73CE0D625AD88E3A1302AAC0F8AD226C1F5DB55DA
3,145,801 UART: [art] SIG.S = 73D883FB7EDB7F00C9F12FD61725B2F28C8D393416844EAF1FE96C026FA1A744D33AF7ECB41C7A2FCDC12538A936D7EB
3,169,561 UART: Caliptra RT
3,169,815 UART: [state] CFI Enabled
3,277,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,158 UART: [rt]cmd =0x46505652, len=4
3,307,829 UART: [rt] FIPS Version
3,308,901 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,989 ready_for_fw is high
1,059,989 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,949 >>> mbox cmd response: success
2,623,949 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,999 UART:
2,686,015 UART: Running Caliptra FMC ...
2,686,423 UART:
2,686,477 UART: [state] CFI Enabled
2,697,158 UART: [fht] FMC Alias Private Key: 7
2,805,427 UART: [art] Extend RT PCRs Done
2,805,855 UART: [art] Lock RT PCRs Done
2,807,503 UART: [art] Populate DV Done
2,815,720 UART: [fht] FMC Alias Private Key: 7
2,816,844 UART: [art] Derive CDI
2,817,124 UART: [art] Store in in slot 0x4
2,903,055 UART: [art] Derive Key Pair
2,903,415 UART: [art] Store priv key in slot 0x5
2,916,541 UART: [art] Derive Key Pair - Done
2,931,300 UART: [art] Signing Cert with AUTHO
2,931,780 UART: RITY.KEYID = 7
2,947,024 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,789 UART: [art] PUB.X = 24D2E763834E70E5B7E5A5EAF4607F0A5C88E3A24EDE243362085C52416FFEB5D7B897DFE02A1C12E0FD3E9E652A55A9
2,954,565 UART: [art] PUB.Y = E818C8F36033B5F94223AAA294ABFF670651941631192B9A01E2A6CF9B3D8C5A532EA928FDCAB9EB90F0203F68B1D85D
2,961,519 UART: [art] SIG.R = BF67A09ED9C33CF81F862213E713323A78AB6C854050D87E51A64305E55D9883A219976DA4665016333C618773A849CE
2,968,276 UART: [art] SIG.S = 7FD89A2BD9442CEE1A05EF9815FB89289439D239DA439707A902A2EA7A5144A73541C20098ADD023004A5CAA2E484626
2,992,052 UART: Caliptra RT
2,992,306 UART: [state] CFI Enabled
3,100,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,691 UART: [rt]cmd =0x46505652, len=4
3,131,362 UART: [rt] FIPS Version
3,132,354 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,769 UART: [kat] HMAC-384Kdf
923,393 UART: [kat] LMS
1,171,721 UART: [kat] --
1,172,718 UART: [cold-reset] ++
1,173,290 UART: [fht] FHT @ 0x50003400
1,175,895 UART: [idev] ++
1,176,063 UART: [idev] CDI.KEYID = 6
1,176,423 UART: [idev] SUBJECT.KEYID = 7
1,176,847 UART: [idev] UDS.KEYID = 0
1,177,192 ready_for_fw is high
1,177,192 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,719 UART: [idev] Erasing UDS.KEYID = 0
1,202,072 UART: [idev] Sha1 KeyId Algorithm
1,210,546 UART: [idev] --
1,211,504 UART: [ldev] ++
1,211,672 UART: [ldev] CDI.KEYID = 6
1,212,035 UART: [ldev] SUBJECT.KEYID = 5
1,212,461 UART: [ldev] AUTHORITY.KEYID = 7
1,212,924 UART: [ldev] FE.KEYID = 1
1,218,020 UART: [ldev] Erasing FE.KEYID = 1
1,244,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,208 UART: [ldev] --
1,283,559 UART: [fwproc] Wait for Commands...
1,284,183 UART: [fwproc] Recv command 0x46574c44
1,284,911 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,329 >>> mbox cmd response: success
2,775,329 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,776,471 UART: [afmc] ++
2,776,639 UART: [afmc] CDI.KEYID = 6
2,777,001 UART: [afmc] SUBJECT.KEYID = 7
2,777,426 UART: [afmc] AUTHORITY.KEYID = 5
2,812,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,152 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,910 UART: [afmc] --
2,855,800 UART: [cold-reset] --
2,856,618 UART: [state] Locking Datavault
2,857,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,541 UART: [state] Locking ICCM
2,859,021 UART: [exit] Launching FMC @ 0x40000130
2,864,350 UART:
2,864,366 UART: Running Caliptra FMC ...
2,864,774 UART:
2,864,917 UART: [state] CFI Enabled
2,875,352 UART: [fht] FMC Alias Private Key: 7
2,982,441 UART: [art] Extend RT PCRs Done
2,982,869 UART: [art] Lock RT PCRs Done
2,984,677 UART: [art] Populate DV Done
2,993,150 UART: [fht] FMC Alias Private Key: 7
2,994,308 UART: [art] Derive CDI
2,994,588 UART: [art] Store in in slot 0x4
3,080,321 UART: [art] Derive Key Pair
3,080,681 UART: [art] Store priv key in slot 0x5
3,093,975 UART: [art] Derive Key Pair - Done
3,109,055 UART: [art] Signing Cert with AUTHO
3,109,535 UART: RITY.KEYID = 7
3,124,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,058 UART: [art] PUB.X = 7CA5E54AC43A56DBE594FAF20BE18644236F3C161A4645D3EF6842BC38E49D3EBE6479E8B9E21A07501E4562F8536D0F
3,131,827 UART: [art] PUB.Y = 4E83C2B56B032C400B8892DB87E31F1EC8845E9A2AC8EAE3C744B78246408BCD6092E1D2CB956DA34AD5D7FD96A4D442
3,138,783 UART: [art] SIG.R = 34C1D5B65D75CF59019CBFAA1E9DC0AD27A0DFE81A1DEF7A9B65CB404464B0D6143051A620ECC5609436CA148EFBB56C
3,145,570 UART: [art] SIG.S = 060CA10438EDE62FC8FE27FDCE4B2A6A660F6225E8F1A33453ED274E938524F050C6BD569B5FC97E0D4AEC5C22120F88
3,169,909 UART: Caliptra RT
3,170,255 UART: [state] CFI Enabled
3,278,353 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,472 UART: [rt]cmd =0x46505652, len=4
3,309,143 UART: [rt] FIPS Version
3,310,183 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,410 ready_for_fw is high
1,060,410 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,214 >>> mbox cmd response: success
2,626,214 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,100 UART:
2,689,116 UART: Running Caliptra FMC ...
2,689,524 UART:
2,689,667 UART: [state] CFI Enabled
2,700,414 UART: [fht] FMC Alias Private Key: 7
2,808,553 UART: [art] Extend RT PCRs Done
2,808,981 UART: [art] Lock RT PCRs Done
2,810,243 UART: [art] Populate DV Done
2,818,216 UART: [fht] FMC Alias Private Key: 7
2,819,376 UART: [art] Derive CDI
2,819,656 UART: [art] Store in in slot 0x4
2,905,505 UART: [art] Derive Key Pair
2,905,865 UART: [art] Store priv key in slot 0x5
2,919,253 UART: [art] Derive Key Pair - Done
2,934,173 UART: [art] Signing Cert with AUTHO
2,934,653 UART: RITY.KEYID = 7
2,950,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,270 UART: [art] PUB.X = 5DA46BB7814E38DBB1FA121DDF0AE0700AA47D146948CA374DEF88F81E538F8A0AC0FE27EB5E6090892F98BDD936A5D3
2,958,049 UART: [art] PUB.Y = 2EB3D836864613B9BBEDE0DF9B9E78B493E92F45C1B0AC800262FFF0ACCF52B89ECFE4FBC8E025F462C963C331F1F54E
2,965,018 UART: [art] SIG.R = A080CCFA3BCA657C6A65E86385C6C2ABF4DD60441C4702265E36E16DB469F54B09F636BC2DE5B9160719E6C57175BA40
2,971,787 UART: [art] SIG.S = EFB05C021A019E9F5B650A15BE0FD1D4DCBB081395A000ECC6CE62B7C4D4D21A7FD083310BDCFFE18CFDDB1C3705BDF1
2,994,883 UART: Caliptra RT
2,995,229 UART: [state] CFI Enabled
3,104,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,305 UART: [rt]cmd =0x46505652, len=4
3,134,976 UART: [rt] FIPS Version
3,136,174 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
903,996 UART: [kat] SHA2-512-ACC
905,897 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,261 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 ready_for_fw is high
1,174,361 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,695 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,541 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,610 UART: [ldev] --
1,280,080 UART: [fwproc] Wait for Commands...
1,280,869 UART: [fwproc] Recv command 0x46574c44
1,281,602 UART: [fwproc] Recv'd Img size: 114360 bytes
2,578,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,850 >>> mbox cmd response: success
2,770,850 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,079 UART: [afmc] ++
2,772,247 UART: [afmc] CDI.KEYID = 6
2,772,610 UART: [afmc] SUBJECT.KEYID = 7
2,773,036 UART: [afmc] AUTHORITY.KEYID = 5
2,808,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,746 UART: [afmc] --
2,851,724 UART: [cold-reset] --
2,852,624 UART: [state] Locking Datavault
2,853,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,601 UART: [state] Locking ICCM
2,855,185 UART: [exit] Launching FMC @ 0x40000130
2,860,514 UART:
2,860,530 UART: Running Caliptra FMC ...
2,860,938 UART:
2,860,992 UART: [state] CFI Enabled
2,871,267 UART: [fht] FMC Alias Private Key: 7
2,979,606 UART: [art] Extend RT PCRs Done
2,980,034 UART: [art] Lock RT PCRs Done
2,981,658 UART: [art] Populate DV Done
2,989,927 UART: [fht] FMC Alias Private Key: 7
2,991,087 UART: [art] Derive CDI
2,991,367 UART: [art] Store in in slot 0x4
3,076,948 UART: [art] Derive Key Pair
3,077,308 UART: [art] Store priv key in slot 0x5
3,090,224 UART: [art] Derive Key Pair - Done
3,104,624 UART: [art] Signing Cert with AUTHO
3,105,104 UART: RITY.KEYID = 7
3,119,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,747 UART: [art] PUB.X = 6665A21C749013ADA1F7D27F95F9D4FCCEED7FB55FA88786EA954CE59BBF6D1DED2284C24885EB03FD318F0A35A8F666
3,127,529 UART: [art] PUB.Y = E1207CE91615D73461A58113C65F46EB1AC41F8A41D0FB286A64CA4AA8703400A79926426970ED34B45E212600DF9DAA
3,134,435 UART: [art] SIG.R = D9F1BBF1CE07EB72A45761F884CC59B486C1FE3D3636B246480B69482A783DA17E9117F83F37F9478EF54F61E18B760A
3,141,200 UART: [art] SIG.S = 1ADBFB67DB7631E1AB23E4FDCFBD75FE00AC57D8303EA2D94C73BF6CE402F6BA10935331A1CE77818E77EC0C7386988C
3,165,177 UART: Caliptra RT
3,165,431 UART: [state] CFI Enabled
3,274,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,536 UART: [rt]cmd =0x46505652, len=4
3,305,207 UART: [rt] FIPS Version
3,306,193 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,118 ready_for_fw is high
1,056,118 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,140 >>> mbox cmd response: success
2,622,140 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,712 UART:
2,683,728 UART: Running Caliptra FMC ...
2,684,136 UART:
2,684,190 UART: [state] CFI Enabled
2,694,857 UART: [fht] FMC Alias Private Key: 7
2,802,776 UART: [art] Extend RT PCRs Done
2,803,204 UART: [art] Lock RT PCRs Done
2,804,864 UART: [art] Populate DV Done
2,813,127 UART: [fht] FMC Alias Private Key: 7
2,814,279 UART: [art] Derive CDI
2,814,559 UART: [art] Store in in slot 0x4
2,899,966 UART: [art] Derive Key Pair
2,900,326 UART: [art] Store priv key in slot 0x5
2,913,428 UART: [art] Derive Key Pair - Done
2,927,852 UART: [art] Signing Cert with AUTHO
2,928,332 UART: RITY.KEYID = 7
2,944,008 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,773 UART: [art] PUB.X = AB83EC6142957C056BFDA9233CB51B43CD09EEB738ADCA79A2BD1892CD8641A714FBC8D3A890ED180AC1678EBB936631
2,951,550 UART: [art] PUB.Y = 450C0AB8C5910E7D89D3DFB927B2B788D01CBAE0C922F419678C45C2D97B7E28035665BBB8137AEF81DAAB215BEEB3C9
2,958,504 UART: [art] SIG.R = BF26EA353A982AF4B21AF439DEABE5DD07DB2F9A23EC3CD039589428059B2030481D21828E4CA07ACD5413AA57029210
2,965,273 UART: [art] SIG.S = 3BE3677CCF4BD468EF675210AAA07DE1B956E3FDF040F4FA90F7573C8B7C3096C58C4440F5DD54A6FE0E1C814E4BE24C
2,988,781 UART: Caliptra RT
2,989,035 UART: [state] CFI Enabled
3,096,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,290 UART: [rt]cmd =0x46505652, len=4
3,126,961 UART: [rt] FIPS Version
3,128,083 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,174,480 ready_for_fw is high
1,174,480 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,507 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,389 >>> mbox cmd response: success
2,774,389 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,462 UART: [afmc] ++
2,775,630 UART: [afmc] CDI.KEYID = 6
2,775,993 UART: [afmc] SUBJECT.KEYID = 7
2,776,419 UART: [afmc] AUTHORITY.KEYID = 5
2,811,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,925 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,644 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,543 UART: [afmc] --
2,855,481 UART: [cold-reset] --
2,856,211 UART: [state] Locking Datavault
2,857,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,188 UART: [state] Locking ICCM
2,858,650 UART: [exit] Launching FMC @ 0x40000130
2,863,979 UART:
2,863,995 UART: Running Caliptra FMC ...
2,864,403 UART:
2,864,546 UART: [state] CFI Enabled
2,875,351 UART: [fht] FMC Alias Private Key: 7
2,983,536 UART: [art] Extend RT PCRs Done
2,983,964 UART: [art] Lock RT PCRs Done
2,985,298 UART: [art] Populate DV Done
2,993,613 UART: [fht] FMC Alias Private Key: 7
2,994,709 UART: [art] Derive CDI
2,994,989 UART: [art] Store in in slot 0x4
3,080,262 UART: [art] Derive Key Pair
3,080,622 UART: [art] Store priv key in slot 0x5
3,093,788 UART: [art] Derive Key Pair - Done
3,108,535 UART: [art] Signing Cert with AUTHO
3,109,015 UART: RITY.KEYID = 7
3,123,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,750 UART: [art] PUB.X = D8321FBEC1758D5D77425F3920AFEF8B9D89AAAC9F99AE9A1937926C8EEDD0ABB1FB00BC537DB1CD15BE95A586895A3F
3,131,522 UART: [art] PUB.Y = E3EA61B60755EBC474B36C40B7EF980D1A3501E9D889BB6E59A401549C351D852A39CE02C00901F794C0A9DFC431DF49
3,138,457 UART: [art] SIG.R = 72BF992CEA9E043C186D3A31B7592C8FB9FF47ACE0489D14D607F6A7F24762B7EA76B59AB9DDDE5CC8A2B4AC6E106460
3,145,239 UART: [art] SIG.S = AF72E23725DF0C43BC702A5AC06CDD2A4255E76C501A74265EB73CB5BFDB1CE832A877DBD9FC80346544A7186683025D
3,169,204 UART: Caliptra RT
3,169,550 UART: [state] CFI Enabled
3,276,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,161 UART: [rt]cmd =0x46505652, len=4
3,307,832 UART: [rt] FIPS Version
3,308,976 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 ready_for_fw is high
1,056,373 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,643 >>> mbox cmd response: success
2,621,643 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,725 UART:
2,683,741 UART: Running Caliptra FMC ...
2,684,149 UART:
2,684,292 UART: [state] CFI Enabled
2,694,823 UART: [fht] FMC Alias Private Key: 7
2,803,786 UART: [art] Extend RT PCRs Done
2,804,214 UART: [art] Lock RT PCRs Done
2,805,880 UART: [art] Populate DV Done
2,813,981 UART: [fht] FMC Alias Private Key: 7
2,815,141 UART: [art] Derive CDI
2,815,421 UART: [art] Store in in slot 0x4
2,901,296 UART: [art] Derive Key Pair
2,901,656 UART: [art] Store priv key in slot 0x5
2,915,122 UART: [art] Derive Key Pair - Done
2,929,526 UART: [art] Signing Cert with AUTHO
2,930,006 UART: RITY.KEYID = 7
2,945,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,179 UART: [art] PUB.X = 28F7A08C96E2C76C6F627512C0061B645A7187D792481ADFF10E907BFDAC72829B8CCECC2CDC381239BB9749126D685F
2,952,949 UART: [art] PUB.Y = A3664F5DE5E8E1ED9D74660313D51809AC08C655BAA76BA45B782A259B0CB7C65570DC1BD1D6B960A8EADC305C78F069
2,959,899 UART: [art] SIG.R = AF006F9BC27EF17E2C6C72EAB3017FB8F9D51D4CEFD23D27B6DDE12C6954A8E85EF10BB769A3416A6B6BB663185E484E
2,966,661 UART: [art] SIG.S = 685B66272881222FE2D81F92E70738C982801C730E4D407F301D200569173730AD0F2E1DD8BA394AE8DE218E2FF5079F
2,990,689 UART: Caliptra RT
2,991,035 UART: [state] CFI Enabled
3,099,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,336 UART: [rt]cmd =0x46505652, len=4
3,130,007 UART: [rt] FIPS Version
3,131,043 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,461 writing to cptra_bootfsm_go
193,746 UART:
194,087 UART: Running Caliptra ROM ...
195,243 UART:
195,402 UART: [state] CFI Enabled
264,858 UART: [state] LifecycleState = Unprovisioned
266,802 UART: [state] DebugLocked = No
269,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,115 UART: [kat] SHA2-256
443,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,306 UART: [kat] ++
454,895 UART: [kat] sha1
465,770 UART: [kat] SHA2-256
468,447 UART: [kat] SHA2-384
474,744 UART: [kat] SHA2-512-ACC
477,081 UART: [kat] ECC-384
2,767,771 UART: [kat] HMAC-384Kdf
2,799,674 UART: [kat] LMS
3,989,991 UART: [kat] --
3,993,300 UART: [cold-reset] ++
3,994,650 UART: [fht] Storing FHT @ 0x50003400
4,006,517 UART: [idev] ++
4,007,128 UART: [idev] CDI.KEYID = 6
4,008,052 UART: [idev] SUBJECT.KEYID = 7
4,009,277 UART: [idev] UDS.KEYID = 0
4,096,037 UART: [idev] Erasing UDS.KEYID = 0
4,098,434 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,344,977 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,374 UART: [idev] --
7,371,467 UART: [ldev] ++
7,372,050 UART: [ldev] CDI.KEYID = 6
7,372,998 UART: [ldev] SUBJECT.KEYID = 5
7,374,215 UART: [ldev] AUTHORITY.KEYID = 7
7,375,417 UART: [ldev] FE.KEYID = 1
7,420,743 UART: [ldev] Erasing FE.KEYID = 1
10,755,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,310 UART: [ldev] --
13,137,247 UART: [fwproc] Waiting for Commands...
13,139,835 UART: [fwproc] Received command 0x46505652
13,142,208 UART: [rt] FIPS Version
13,143,854 >>> mbox cmd response data (36 bytes)
13,144,682 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,145,429 UART: [fwproc] Received command 0x46504c54
13,147,908 UART: [kat] SHA2-256
13,317,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,327,911 UART: [kat] ++
13,328,366 UART: [kat] sha1
13,339,307 UART: [kat] SHA2-256
13,341,993 UART: [kat] SHA2-384
13,347,330 UART: [kat] SHA2-512-ACC
13,349,728 UART: [kat] ECC-384
15,651,779 UART: [kat] HMAC-384Kdf
15,683,399 UART: [kat] LMS
16,872,915 UART: [kat] --
16,873,575 >>> mbox cmd response data (8 bytes)
16,873,931 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,874,313 UART: [fwproc] Received command 0x46504c67
16,877,017 >>> mbox cmd response data (8 bytes)
16,877,336 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,879,060 UART: [fwproc] Received command 0x43415053
16,882,077 >>> mbox cmd response data (24 bytes)
16,882,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,883,934 UART: [fwproc] Received command 0x4d454153
16,892,961 >>> mbox cmd response data (12 bytes)
16,893,400 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,894,701 UART: [fwproc] Received command 0x46505344
16,897,496 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,873,413 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,822,513 >>> mbox cmd response data (36 bytes)
12,823,618 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,335,134 >>> mbox cmd response data (8 bytes)
16,335,667 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,337,909 >>> mbox cmd response data (8 bytes)
16,338,330 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,340,060 >>> mbox cmd response data (24 bytes)
16,340,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,350,066 >>> mbox cmd response data (12 bytes)
16,350,544 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,351,906 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,429 UART:
192,809 UART: Running Caliptra ROM ...
193,914 UART:
603,533 UART: [state] CFI Enabled
619,257 UART: [state] LifecycleState = Unprovisioned
621,180 UART: [state] DebugLocked = No
623,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,771 UART: [kat] SHA2-256
798,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,052 UART: [kat] ++
809,593 UART: [kat] sha1
818,908 UART: [kat] SHA2-256
821,611 UART: [kat] SHA2-384
827,171 UART: [kat] SHA2-512-ACC
829,509 UART: [kat] ECC-384
3,113,417 UART: [kat] HMAC-384Kdf
3,126,379 UART: [kat] LMS
4,316,499 UART: [kat] --
4,319,466 UART: [cold-reset] ++
4,321,506 UART: [fht] Storing FHT @ 0x50003400
4,332,607 UART: [idev] ++
4,333,177 UART: [idev] CDI.KEYID = 6
4,334,058 UART: [idev] SUBJECT.KEYID = 7
4,335,329 UART: [idev] UDS.KEYID = 0
4,420,903 UART: [idev] Erasing UDS.KEYID = 0
4,423,967 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,620,144 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,243 UART: [idev] --
7,645,585 UART: [ldev] ++
7,646,175 UART: [ldev] CDI.KEYID = 6
7,647,200 UART: [ldev] SUBJECT.KEYID = 5
7,648,385 UART: [ldev] AUTHORITY.KEYID = 7
7,649,623 UART: [ldev] FE.KEYID = 1
7,663,573 UART: [ldev] Erasing FE.KEYID = 1
10,946,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,240 UART: [ldev] --
13,307,143 UART: [fwproc] Waiting for Commands...
13,309,147 UART: [fwproc] Received command 0x46505652
13,311,555 UART: [rt] FIPS Version
13,313,168 >>> mbox cmd response data (36 bytes)
13,314,025 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,314,863 UART: [fwproc] Received command 0x46504c54
13,317,364 UART: [kat] SHA2-256
13,487,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,497,403 UART: [kat] ++
13,497,948 UART: [kat] sha1
13,510,408 UART: [kat] SHA2-256
13,513,102 UART: [kat] SHA2-384
13,519,410 UART: [kat] SHA2-512-ACC
13,521,810 UART: [kat] ECC-384
15,803,765 UART: [kat] HMAC-384Kdf
15,816,103 UART: [kat] LMS
17,005,574 UART: [kat] --
17,006,239 >>> mbox cmd response data (8 bytes)
17,006,598 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,008,334 UART: [fwproc] Received command 0x46504c67
17,010,985 >>> mbox cmd response data (8 bytes)
17,011,305 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,011,753 UART: [fwproc] Received command 0x43415053
17,014,724 >>> mbox cmd response data (24 bytes)
17,015,236 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,016,506 UART: [fwproc] Received command 0x4d454153
17,025,463 >>> mbox cmd response data (12 bytes)
17,025,890 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,026,489 UART: [fwproc] Received command 0x46505344
17,029,231 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
4,213,683 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,046,622 >>> mbox cmd response data (36 bytes)
13,047,712 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,547,651 >>> mbox cmd response data (8 bytes)
16,548,147 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,549,356 >>> mbox cmd response data (8 bytes)
16,549,770 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,550,964 >>> mbox cmd response data (24 bytes)
16,551,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,560,410 >>> mbox cmd response data (12 bytes)
16,560,838 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,562,351 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,593 UART:
192,964 UART: Running Caliptra ROM ...
194,104 UART:
194,252 UART: [state] CFI Enabled
264,645 UART: [state] LifecycleState = Unprovisioned
266,538 UART: [state] DebugLocked = No
268,937 UART: [state] WD Timer not started. Device not locked for debugging
272,855 UART: [kat] SHA2-256
451,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,575 UART: [kat] ++
464,109 UART: [kat] sha1
476,126 UART: [kat] SHA2-256
479,185 UART: [kat] SHA2-384
484,582 UART: [kat] SHA2-512-ACC
487,568 UART: [kat] ECC-384
2,946,057 UART: [kat] HMAC-384Kdf
2,969,461 UART: [kat] LMS
3,498,955 UART: [kat] --
3,503,562 UART: [cold-reset] ++
3,505,069 UART: [fht] FHT @ 0x50003400
3,514,871 UART: [idev] ++
3,515,438 UART: [idev] CDI.KEYID = 6
3,516,350 UART: [idev] SUBJECT.KEYID = 7
3,517,566 UART: [idev] UDS.KEYID = 0
3,598,661 UART: [idev] Erasing UDS.KEYID = 0
3,600,870 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,022,693 UART: [idev] Sha1 KeyId Algorithm
6,045,200 UART: [idev] --
6,049,240 UART: [ldev] ++
6,049,825 UART: [ldev] CDI.KEYID = 6
6,050,719 UART: [ldev] SUBJECT.KEYID = 5
6,051,888 UART: [ldev] AUTHORITY.KEYID = 7
6,053,142 UART: [ldev] FE.KEYID = 1
6,096,168 UART: [ldev] Erasing FE.KEYID = 1
8,599,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,887 UART: [ldev] --
10,408,260 UART: [fwproc] Wait for Commands...
10,410,468 UART: [fwproc] Recv command 0x46505652
10,412,782 UART: [rt] FIPS Version
10,414,261 >>> mbox cmd response data (36 bytes)
10,414,989 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,416,983 UART: [fwproc] Recv command 0x46504c54
10,419,369 UART: [kat] SHA2-256
10,598,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,610,150 UART: [kat] ++
10,610,609 UART: [kat] sha1
10,620,359 UART: [kat] SHA2-256
10,623,386 UART: [kat] SHA2-384
10,629,316 UART: [kat] SHA2-512-ACC
10,632,256 UART: [kat] ECC-384
13,096,027 UART: [kat] HMAC-384Kdf
13,121,215 UART: [kat] LMS
13,650,770 UART: [kat] --
13,651,428 >>> mbox cmd response data (8 bytes)
13,651,773 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,652,311 UART: [fwproc] Recv command 0x46504c67
13,654,863 >>> mbox cmd response data (8 bytes)
13,655,178 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,656,949 UART: [fwproc] Recv command 0x43415053
13,659,659 >>> mbox cmd response data (24 bytes)
13,660,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,661,502 UART: [fwproc] Recv command 0x4d454153
13,670,043 >>> mbox cmd response data (12 bytes)
13,670,457 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,670,889 UART: [fwproc] Recv command 0x46505344
13,673,422 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,264 UART:
192,665 UART: Running Caliptra ROM ...
193,833 UART:
193,986 UART: [state] CFI Enabled
263,007 UART: [state] LifecycleState = Unprovisioned
265,394 UART: [state] DebugLocked = No
267,442 UART: [state] WD Timer not started. Device not locked for debugging
272,403 UART: [kat] SHA2-256
462,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,037 UART: [kat] ++
473,538 UART: [kat] sha1
485,769 UART: [kat] SHA2-256
488,785 UART: [kat] SHA2-384
495,470 UART: [kat] SHA2-512-ACC
498,028 UART: [kat] ECC-384
2,946,206 UART: [kat] HMAC-384Kdf
2,970,007 UART: [kat] LMS
3,501,766 UART: [kat] --
3,504,468 UART: [cold-reset] ++
3,507,044 UART: [fht] FHT @ 0x50003400
3,517,650 UART: [idev] ++
3,518,329 UART: [idev] CDI.KEYID = 6
3,519,317 UART: [idev] SUBJECT.KEYID = 7
3,520,537 UART: [idev] UDS.KEYID = 0
3,606,221 UART: [idev] Erasing UDS.KEYID = 0
3,608,464 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,024,586 UART: [idev] Sha1 KeyId Algorithm
6,046,663 UART: [idev] --
6,050,295 UART: [ldev] ++
6,050,986 UART: [ldev] CDI.KEYID = 6
6,051,909 UART: [ldev] SUBJECT.KEYID = 5
6,053,075 UART: [ldev] AUTHORITY.KEYID = 7
6,054,258 UART: [ldev] FE.KEYID = 1
6,097,210 UART: [ldev] Erasing FE.KEYID = 1
8,602,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,932 UART: [ldev] --
10,411,709 UART: [fwproc] Wait for Commands...
10,414,839 UART: [fwproc] Recv command 0x46505652
10,417,371 UART: [rt] FIPS Version
10,419,095 >>> mbox cmd response data (36 bytes)
10,420,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,420,998 UART: [fwproc] Recv command 0x46504c54
10,423,550 UART: [kat] SHA2-256
10,613,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,624,059 UART: [kat] ++
10,624,602 UART: [kat] sha1
10,637,161 UART: [kat] SHA2-256
10,640,177 UART: [kat] SHA2-384
10,645,573 UART: [kat] SHA2-512-ACC
10,648,191 UART: [kat] ECC-384
13,102,707 UART: [kat] HMAC-384Kdf
13,123,590 UART: [kat] LMS
13,655,437 UART: [kat] --
13,656,139 >>> mbox cmd response data (8 bytes)
13,656,483 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,657,566 UART: [fwproc] Recv command 0x46504c67
13,660,060 >>> mbox cmd response data (8 bytes)
13,660,376 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,661,178 UART: [fwproc] Recv command 0x43415053
13,664,158 >>> mbox cmd response data (24 bytes)
13,664,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,665,501 UART: [fwproc] Recv command 0x4d454153
13,675,186 >>> mbox cmd response data (12 bytes)
13,675,616 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,676,376 UART: [fwproc] Recv command 0x46505344
13,679,023 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,522,575 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,241,443 >>> mbox cmd response data (36 bytes)
10,242,536 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,382,988 >>> mbox cmd response data (8 bytes)
13,383,501 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,385,038 >>> mbox cmd response data (8 bytes)
13,385,455 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,387,027 >>> mbox cmd response data (24 bytes)
13,387,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,395,389 >>> mbox cmd response data (12 bytes)
13,395,817 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,397,226 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,421 UART:
192,964 UART: Running Caliptra ROM ...
194,053 UART:
603,800 UART: [state] CFI Enabled
617,781 UART: [state] LifecycleState = Unprovisioned
620,126 UART: [state] DebugLocked = No
622,852 UART: [state] WD Timer not started. Device not locked for debugging
627,840 UART: [kat] SHA2-256
817,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,505 UART: [kat] ++
829,187 UART: [kat] sha1
841,685 UART: [kat] SHA2-256
844,699 UART: [kat] SHA2-384
849,282 UART: [kat] SHA2-512-ACC
851,888 UART: [kat] ECC-384
3,294,010 UART: [kat] HMAC-384Kdf
3,307,034 UART: [kat] LMS
3,838,820 UART: [kat] --
3,841,796 UART: [cold-reset] ++
3,842,781 UART: [fht] FHT @ 0x50003400
3,853,438 UART: [idev] ++
3,854,125 UART: [idev] CDI.KEYID = 6
3,855,040 UART: [idev] SUBJECT.KEYID = 7
3,856,254 UART: [idev] UDS.KEYID = 0
3,942,521 UART: [idev] Erasing UDS.KEYID = 0
3,944,736 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,332,554 UART: [idev] Sha1 KeyId Algorithm
6,355,033 UART: [idev] --
6,360,634 UART: [ldev] ++
6,361,329 UART: [ldev] CDI.KEYID = 6
6,362,248 UART: [ldev] SUBJECT.KEYID = 5
6,363,409 UART: [ldev] AUTHORITY.KEYID = 7
6,364,646 UART: [ldev] FE.KEYID = 1
6,375,621 UART: [ldev] Erasing FE.KEYID = 1
8,856,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,751 UART: [ldev] --
10,649,046 UART: [fwproc] Wait for Commands...
10,650,720 UART: [fwproc] Recv command 0x46505652
10,653,248 UART: [rt] FIPS Version
10,654,976 >>> mbox cmd response data (36 bytes)
10,655,715 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,657,126 UART: [fwproc] Recv command 0x46504c54
10,659,307 UART: [kat] SHA2-256
10,849,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,859,850 UART: [kat] ++
10,860,369 UART: [kat] sha1
10,872,929 UART: [kat] SHA2-256
10,875,944 UART: [kat] SHA2-384
10,881,611 UART: [kat] SHA2-512-ACC
10,884,197 UART: [kat] ECC-384
13,324,949 UART: [kat] HMAC-384Kdf
13,338,142 UART: [kat] LMS
13,870,031 UART: [kat] --
13,870,746 >>> mbox cmd response data (8 bytes)
13,871,101 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,871,747 UART: [fwproc] Recv command 0x46504c67
13,874,238 >>> mbox cmd response data (8 bytes)
13,874,549 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,875,295 UART: [fwproc] Recv command 0x43415053
13,877,998 >>> mbox cmd response data (24 bytes)
13,878,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,879,541 UART: [fwproc] Recv command 0x4d454153
13,889,217 >>> mbox cmd response data (12 bytes)
13,889,631 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,890,604 UART: [fwproc] Recv command 0x46505344
13,893,322 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,842,742 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,473,838 >>> mbox cmd response data (36 bytes)
10,475,130 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,599,947 >>> mbox cmd response data (8 bytes)
13,600,529 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,601,959 >>> mbox cmd response data (8 bytes)
13,602,374 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,603,465 >>> mbox cmd response data (24 bytes)
13,603,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,611,947 >>> mbox cmd response data (12 bytes)
13,612,375 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,613,784 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,752 UART: [state] LifecycleState = Unprovisioned
86,407 UART: [state] DebugLocked = No
87,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,643 UART: [kat] SHA2-256
882,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,689 UART: [kat] ++
886,841 UART: [kat] sha1
891,071 UART: [kat] SHA2-256
893,009 UART: [kat] SHA2-384
895,672 UART: [kat] SHA2-512-ACC
897,573 UART: [kat] ECC-384
903,374 UART: [kat] HMAC-384Kdf
908,070 UART: [kat] LMS
1,476,266 UART: [kat] --
1,477,343 UART: [cold-reset] ++
1,477,883 UART: [fht] Storing FHT @ 0x50003400
1,480,646 UART: [idev] ++
1,480,814 UART: [idev] CDI.KEYID = 6
1,481,174 UART: [idev] SUBJECT.KEYID = 7
1,481,598 UART: [idev] UDS.KEYID = 0
1,481,943 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,770 UART: [idev] Erasing UDS.KEYID = 0
1,506,346 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,762 UART: [idev] --
1,515,981 UART: [ldev] ++
1,516,149 UART: [ldev] CDI.KEYID = 6
1,516,512 UART: [ldev] SUBJECT.KEYID = 5
1,516,938 UART: [ldev] AUTHORITY.KEYID = 7
1,517,401 UART: [ldev] FE.KEYID = 1
1,522,525 UART: [ldev] Erasing FE.KEYID = 1
1,547,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,798 UART: [ldev] --
1,587,191 UART: [fwproc] Waiting for Commands...
1,587,838 UART: [fwproc] Received command 0x46505652
1,588,720 UART: [rt] FIPS Version
1,589,273 >>> mbox cmd response data (36 bytes)
1,589,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,589,518 UART: [fwproc] Received command 0x46504c54
1,590,425 UART: [kat] SHA2-256
2,384,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,388,471 UART: [kat] ++
2,388,623 UART: [kat] sha1
2,392,929 UART: [kat] SHA2-256
2,394,867 UART: [kat] SHA2-384
2,397,484 UART: [kat] SHA2-512-ACC
2,399,384 UART: [kat] ECC-384
2,405,181 UART: [kat] HMAC-384Kdf
2,409,705 UART: [kat] LMS
2,977,901 UART: [kat] --
2,978,139 >>> mbox cmd response data (8 bytes)
2,978,140 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,978,300 UART: [fwproc] Received command 0x46504c67
2,979,254 >>> mbox cmd response data (8 bytes)
2,979,255 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,979,327 UART: [fwproc] Received command 0x43415053
2,980,375 >>> mbox cmd response data (24 bytes)
2,980,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,980,494 UART: [fwproc] Received command 0x4d454153
2,984,558 >>> mbox cmd response data (12 bytes)
2,984,559 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,669 UART: [fwproc] Received command 0x46505344
2,985,617 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,257 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,626 >>> mbox cmd response data (36 bytes)
1,440,627 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,715,522 >>> mbox cmd response data (8 bytes)
2,715,523 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,715,767 >>> mbox cmd response data (8 bytes)
2,715,768 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,716,194 >>> mbox cmd response data (24 bytes)
2,716,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,719,697 >>> mbox cmd response data (12 bytes)
2,719,698 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,720,011 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,834 UART: [kat] SHA2-256
892,772 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,477,038 UART: [fht] Storing FHT @ 0x50003400
1,479,677 UART: [idev] ++
1,479,845 UART: [idev] CDI.KEYID = 6
1,480,205 UART: [idev] SUBJECT.KEYID = 7
1,480,629 UART: [idev] UDS.KEYID = 0
1,480,974 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,467 UART: [idev] Erasing UDS.KEYID = 0
1,505,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,639 UART: [idev] --
1,514,708 UART: [ldev] ++
1,514,876 UART: [ldev] CDI.KEYID = 6
1,515,239 UART: [ldev] SUBJECT.KEYID = 5
1,515,665 UART: [ldev] AUTHORITY.KEYID = 7
1,516,128 UART: [ldev] FE.KEYID = 1
1,521,114 UART: [ldev] Erasing FE.KEYID = 1
1,546,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,411 UART: [ldev] --
1,585,862 UART: [fwproc] Waiting for Commands...
1,586,699 UART: [fwproc] Received command 0x46505652
1,587,581 UART: [rt] FIPS Version
1,588,134 >>> mbox cmd response data (36 bytes)
1,588,135 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,205 UART: [fwproc] Received command 0x46504c54
1,589,112 UART: [kat] SHA2-256
2,383,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,158 UART: [kat] ++
2,387,310 UART: [kat] sha1
2,391,754 UART: [kat] SHA2-256
2,393,692 UART: [kat] SHA2-384
2,396,445 UART: [kat] SHA2-512-ACC
2,398,345 UART: [kat] ECC-384
2,403,962 UART: [kat] HMAC-384Kdf
2,408,642 UART: [kat] LMS
2,976,838 UART: [kat] --
2,977,076 >>> mbox cmd response data (8 bytes)
2,977,077 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,179 UART: [fwproc] Received command 0x46504c67
2,978,133 >>> mbox cmd response data (8 bytes)
2,978,134 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,280 UART: [fwproc] Received command 0x43415053
2,979,328 >>> mbox cmd response data (24 bytes)
2,979,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,625 UART: [fwproc] Received command 0x4d454153
2,983,689 >>> mbox cmd response data (12 bytes)
2,983,690 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,842 UART: [fwproc] Received command 0x46505344
2,984,790 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,738 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,121 >>> mbox cmd response data (36 bytes)
1,442,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,185 >>> mbox cmd response data (8 bytes)
2,717,186 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,560 >>> mbox cmd response data (8 bytes)
2,717,561 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,101 >>> mbox cmd response data (24 bytes)
2,718,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,484 >>> mbox cmd response data (12 bytes)
2,721,485 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,778 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
917,668 UART: [kat] HMAC-384Kdf
922,204 UART: [kat] LMS
1,170,532 UART: [kat] --
1,171,373 UART: [cold-reset] ++
1,171,731 UART: [fht] FHT @ 0x50003400
1,174,374 UART: [idev] ++
1,174,542 UART: [idev] CDI.KEYID = 6
1,174,902 UART: [idev] SUBJECT.KEYID = 7
1,175,326 UART: [idev] UDS.KEYID = 0
1,175,671 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,837 UART: [idev] Sha1 KeyId Algorithm
1,208,175 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,791 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,022 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x46505652
1,283,631 UART: [rt] FIPS Version
1,284,185 >>> mbox cmd response data (36 bytes)
1,284,186 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,474 UART: [fwproc] Recv command 0x46504c54
1,285,320 UART: [kat] SHA2-256
2,090,970 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,095 UART: [kat] ++
2,095,247 UART: [kat] sha1
2,099,417 UART: [kat] SHA2-256
2,101,357 UART: [kat] SHA2-384
2,104,052 UART: [kat] SHA2-512-ACC
2,105,952 UART: [kat] ECC-384
2,115,617 UART: [kat] HMAC-384Kdf
2,120,165 UART: [kat] LMS
2,368,493 UART: [kat] --
2,368,731 >>> mbox cmd response data (8 bytes)
2,368,732 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,931 UART: [fwproc] Recv command 0x46504c67
2,369,824 >>> mbox cmd response data (8 bytes)
2,369,825 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,370,068 UART: [fwproc] Recv command 0x43415053
2,371,051 >>> mbox cmd response data (24 bytes)
2,371,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,371,143 UART: [fwproc] Recv command 0x4d454153
2,375,152 >>> mbox cmd response data (12 bytes)
2,375,153 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,375,414 UART: [fwproc] Recv command 0x46505344
2,376,301 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,241 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,425 >>> mbox cmd response data (36 bytes)
1,138,426 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,454 >>> mbox cmd response data (8 bytes)
2,111,455 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,929 >>> mbox cmd response data (8 bytes)
2,111,930 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,112,496 >>> mbox cmd response data (24 bytes)
2,112,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,115,889 >>> mbox cmd response data (12 bytes)
2,115,890 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,322 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
902,066 UART: [kat] SHA2-256
904,006 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,199 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,172,074 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,067 UART: [idev] ++
1,175,235 UART: [idev] CDI.KEYID = 6
1,175,595 UART: [idev] SUBJECT.KEYID = 7
1,176,019 UART: [idev] UDS.KEYID = 0
1,176,364 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,578 UART: [idev] Sha1 KeyId Algorithm
1,210,252 UART: [idev] --
1,211,274 UART: [ldev] ++
1,211,442 UART: [ldev] CDI.KEYID = 6
1,211,805 UART: [ldev] SUBJECT.KEYID = 5
1,212,231 UART: [ldev] AUTHORITY.KEYID = 7
1,212,694 UART: [ldev] FE.KEYID = 1
1,217,654 UART: [ldev] Erasing FE.KEYID = 1
1,243,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,040 UART: [ldev] --
1,282,493 UART: [fwproc] Wait for Commands...
1,283,173 UART: [fwproc] Recv command 0x46505652
1,283,994 UART: [rt] FIPS Version
1,284,548 >>> mbox cmd response data (36 bytes)
1,284,549 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,773 UART: [fwproc] Recv command 0x46504c54
1,285,619 UART: [kat] SHA2-256
2,091,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,394 UART: [kat] ++
2,095,546 UART: [kat] sha1
2,099,638 UART: [kat] SHA2-256
2,101,578 UART: [kat] SHA2-384
2,104,457 UART: [kat] SHA2-512-ACC
2,106,357 UART: [kat] ECC-384
2,116,244 UART: [kat] HMAC-384Kdf
2,120,776 UART: [kat] LMS
2,369,104 UART: [kat] --
2,369,342 >>> mbox cmd response data (8 bytes)
2,369,343 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,369,520 UART: [fwproc] Recv command 0x46504c67
2,370,413 >>> mbox cmd response data (8 bytes)
2,370,414 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,370,631 UART: [fwproc] Recv command 0x43415053
2,371,614 >>> mbox cmd response data (24 bytes)
2,371,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,371,732 UART: [fwproc] Recv command 0x4d454153
2,375,741 >>> mbox cmd response data (12 bytes)
2,375,742 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,035 UART: [fwproc] Recv command 0x46505344
2,376,922 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,528 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,668 >>> mbox cmd response data (36 bytes)
1,140,669 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,939 >>> mbox cmd response data (8 bytes)
2,112,940 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,310 >>> mbox cmd response data (8 bytes)
2,113,311 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,833 >>> mbox cmd response data (24 bytes)
2,113,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,222 >>> mbox cmd response data (12 bytes)
2,117,223 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,579 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,684 UART: [state] LifecycleState = Unprovisioned
86,339 UART: [state] DebugLocked = No
86,987 UART: [state] WD Timer not started. Device not locked for debugging
88,310 UART: [kat] SHA2-256
891,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,989 UART: [kat] ++
896,141 UART: [kat] sha1
900,301 UART: [kat] SHA2-256
902,241 UART: [kat] SHA2-384
905,216 UART: [kat] SHA2-512-ACC
907,117 UART: [kat] ECC-384
916,974 UART: [kat] HMAC-384Kdf
921,472 UART: [kat] LMS
1,169,784 UART: [kat] --
1,170,973 UART: [cold-reset] ++
1,171,345 UART: [fht] FHT @ 0x50003400
1,174,013 UART: [idev] ++
1,174,181 UART: [idev] CDI.KEYID = 6
1,174,542 UART: [idev] SUBJECT.KEYID = 7
1,174,967 UART: [idev] UDS.KEYID = 0
1,175,313 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,821 UART: [idev] Erasing UDS.KEYID = 0
1,200,267 UART: [idev] Sha1 KeyId Algorithm
1,209,115 UART: [idev] --
1,210,064 UART: [ldev] ++
1,210,232 UART: [ldev] CDI.KEYID = 6
1,210,596 UART: [ldev] SUBJECT.KEYID = 5
1,211,023 UART: [ldev] AUTHORITY.KEYID = 7
1,211,486 UART: [ldev] FE.KEYID = 1
1,216,316 UART: [ldev] Erasing FE.KEYID = 1
1,242,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,750 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,629 UART: [fwproc] Recv command 0x46505652
1,283,456 UART: [rt] FIPS Version
1,284,017 >>> mbox cmd response data (36 bytes)
1,284,018 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,251 UART: [fwproc] Recv command 0x46504c54
1,285,105 UART: [kat] SHA2-256
2,088,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,784 UART: [kat] ++
2,092,936 UART: [kat] sha1
2,097,090 UART: [kat] SHA2-256
2,099,030 UART: [kat] SHA2-384
2,101,773 UART: [kat] SHA2-512-ACC
2,103,673 UART: [kat] ECC-384
2,113,404 UART: [kat] HMAC-384Kdf
2,118,084 UART: [kat] LMS
2,366,396 UART: [kat] --
2,366,637 >>> mbox cmd response data (8 bytes)
2,366,638 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,888 UART: [fwproc] Recv command 0x46504c67
2,367,792 >>> mbox cmd response data (8 bytes)
2,367,793 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,915 UART: [fwproc] Recv command 0x43415053
2,368,910 >>> mbox cmd response data (24 bytes)
2,368,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,016 UART: [fwproc] Recv command 0x4d454153
2,373,043 >>> mbox cmd response data (12 bytes)
2,373,044 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,123 UART: [fwproc] Recv command 0x46505344
2,374,026 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,526 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,384 >>> mbox cmd response data (36 bytes)
1,136,385 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,539 >>> mbox cmd response data (8 bytes)
2,104,540 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,876 >>> mbox cmd response data (8 bytes)
2,104,877 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,105,262 >>> mbox cmd response data (24 bytes)
2,105,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,108,811 >>> mbox cmd response data (12 bytes)
2,108,812 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,109,304 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,600 UART: [kat] SHA2-256
901,540 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,174,620 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,050 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,209,005 UART: [ldev] ++
1,209,173 UART: [ldev] CDI.KEYID = 6
1,209,537 UART: [ldev] SUBJECT.KEYID = 5
1,209,964 UART: [ldev] AUTHORITY.KEYID = 7
1,210,427 UART: [ldev] FE.KEYID = 1
1,215,515 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,783 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46505652
1,282,809 UART: [rt] FIPS Version
1,283,370 >>> mbox cmd response data (36 bytes)
1,283,371 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,504 UART: [fwproc] Recv command 0x46504c54
1,284,358 UART: [kat] SHA2-256
2,087,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,037 UART: [kat] ++
2,092,189 UART: [kat] sha1
2,096,637 UART: [kat] SHA2-256
2,098,577 UART: [kat] SHA2-384
2,101,402 UART: [kat] SHA2-512-ACC
2,103,302 UART: [kat] ECC-384
2,113,275 UART: [kat] HMAC-384Kdf
2,117,941 UART: [kat] LMS
2,366,253 UART: [kat] --
2,366,494 >>> mbox cmd response data (8 bytes)
2,366,495 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,707 UART: [fwproc] Recv command 0x46504c67
2,367,611 >>> mbox cmd response data (8 bytes)
2,367,612 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,828 UART: [fwproc] Recv command 0x43415053
2,368,823 >>> mbox cmd response data (24 bytes)
2,368,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,063 UART: [fwproc] Recv command 0x4d454153
2,373,090 >>> mbox cmd response data (12 bytes)
2,373,091 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,394 UART: [fwproc] Recv command 0x46505344
2,374,297 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,831 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,803 >>> mbox cmd response data (36 bytes)
1,136,804 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,920 >>> mbox cmd response data (8 bytes)
2,105,921 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,229 >>> mbox cmd response data (8 bytes)
2,106,230 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,807 >>> mbox cmd response data (24 bytes)
2,106,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,396 >>> mbox cmd response data (12 bytes)
2,110,397 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,681 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,184 UART:
192,567 UART: Running Caliptra ROM ...
193,708 UART:
193,858 UART: [state] CFI Enabled
266,533 UART: [state] LifecycleState = Unprovisioned
268,543 UART: [state] DebugLocked = No
270,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,089 UART: [kat] SHA2-256
444,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,354 UART: [kat] ++
455,804 UART: [kat] sha1
467,608 UART: [kat] SHA2-256
470,342 UART: [kat] SHA2-384
474,495 UART: [kat] SHA2-512-ACC
476,869 UART: [kat] ECC-384
2,770,530 UART: [kat] HMAC-384Kdf
2,801,243 UART: [kat] LMS
3,991,568 UART: [kat] --
3,996,837 UART: [cold-reset] ++
3,999,337 UART: [fht] Storing FHT @ 0x50003400
4,010,632 UART: [idev] ++
4,011,258 UART: [idev] CDI.KEYID = 6
4,012,184 UART: [idev] SUBJECT.KEYID = 7
4,013,443 UART: [idev] UDS.KEYID = 0
4,014,486 ready_for_fw is high
4,014,697 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,053 UART: [idev] Erasing UDS.KEYID = 0
7,348,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,631 UART: [idev] --
7,374,799 UART: [ldev] ++
7,375,385 UART: [ldev] CDI.KEYID = 6
7,376,404 UART: [ldev] SUBJECT.KEYID = 5
7,377,564 UART: [ldev] AUTHORITY.KEYID = 7
7,378,798 UART: [ldev] FE.KEYID = 1
7,424,679 UART: [ldev] Erasing FE.KEYID = 1
10,757,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,120 UART: [ldev] --
13,137,801 UART: [fwproc] Waiting for Commands...
13,141,037 UART: [fwproc] Received command 0x46574c44
13,143,223 UART: [fwproc] Received Image of size 114036 bytes
17,193,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,406 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,276 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,646,642 >>> mbox cmd response: success
17,649,614 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,650,949 UART: [afmc] ++
17,651,599 UART: [afmc] CDI.KEYID = 6
17,652,507 UART: [afmc] SUBJECT.KEYID = 7
17,653,732 UART: [afmc] AUTHORITY.KEYID = 5
21,007,358 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,867 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,285 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,125 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,567 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,935 UART: [afmc] --
23,377,948 UART: [cold-reset] --
23,381,978 UART: [state] Locking Datavault
23,387,384 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,136 UART: [state] Locking ICCM
23,390,528 UART: [exit] Launching FMC @ 0x40000130
23,398,924 UART:
23,399,162 UART: Running Caliptra FMC ...
23,400,261 UART:
23,400,422 UART: [state] CFI Enabled
23,466,809 UART: [fht] FMC Alias Private Key: 7
25,804,649 UART: [art] Extend RT PCRs Done
25,805,867 UART: [art] Lock RT PCRs Done
25,807,523 UART: [art] Populate DV Done
25,812,884 UART: [fht] FMC Alias Private Key: 7
25,814,380 UART: [art] Derive CDI
25,815,145 UART: [art] Store in in slot 0x4
25,876,810 UART: [art] Derive Key Pair
25,877,850 UART: [art] Store priv key in slot 0x5
29,170,632 UART: [art] Derive Key Pair - Done
29,183,688 UART: [art] Signing Cert with AUTHO
29,184,992 UART: RITY.KEYID = 7
31,473,411 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,916 UART: [art] PUB.X = C6D215948810B4A158B4D71F98838961A66DE532A6B3F8D9D63FC6022AF5ABE4CB881E3B3335CBEC406A06AF8009C46B
31,482,163 UART: [art] PUB.Y = C0E5F1E2DD0F122A0DD9D8F317F56A2FC4F325A855FFA9B2A8CAD77C8CDFFF61CBEFF1C23D648A123A1D79498C7CF2F4
31,489,441 UART: [art] SIG.R = 3F641F84FA6CDDD1F353B2E84EC86AB51666FD8233540E5351500DABD9C8A06743EBA835B53DFABB17CB15C14DC1E2A3
31,496,906 UART: [art] SIG.S = 5120F2BA8F4CD9577898368A13904B906C8565F623D2563AC95E344ECAAFCFAADC2AADE53B37AD483E8BC5B9B9479841
32,801,976 UART: Caliptra RT
32,802,680 UART: [state] CFI Enabled
32,962,753 UART: [rt] RT listening for mailbox commands...
32,993,879 UART: [rt]cmd =0x46505652, len=4
32,995,209 UART: [rt] FIPS Version
32,996,321 >>> mbox cmd response data (36 bytes)
32,997,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,026,439 UART: [rt]cmd =0x46504c54, len=4
33,027,924 >>> mbox cmd response data (8 bytes)
33,028,264 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,057,749 UART: [rt]cmd =0x46504c67, len=4
33,059,297 >>> mbox cmd response: failed
33,060,130 UART: [rt] FIPS self test
33,061,069 UART: [kat] ++
33,061,522 UART: [kat] sha1
33,065,930 UART: [kat] SHA2-256
33,067,735 UART: [kat] SHA2-384
33,070,606 UART: [kat] SHA2-512-ACC
33,072,824 UART: [kat] ECC-384
36,342,526 UART: [kat] HMAC-384Kdf
36,349,633 UART: [kat] LMS
36,759,596 UART: [kat] --
36,911,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,742,984 UART: [rt] Verify complete
40,904,719 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,934,510 UART: [rt]cmd =0x46504c67, len=4
40,935,994 >>> mbox cmd response data (8 bytes)
40,936,398 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,966,154 UART: [rt]cmd =0x49444543, len=4
40,973,045 >>> mbox cmd response data (37 bytes)
40,973,675 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,003,246 UART: [rt]cmd =0x49444549, len=4
41,005,809 >>> mbox cmd response data (104 bytes)
41,006,601 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,036,469 UART: [rt]cmd =0x49444550, len=4
41,047,114 >>> mbox cmd response data (8 bytes)
41,047,516 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,077,216 UART: [rt]cmd =0x4c444556, len=4
41,088,280 >>> mbox cmd response data (687 bytes)
41,091,797 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,121,372 UART: [rt]cmd =0x43455246, len=4
41,134,411 >>> mbox cmd response data (920 bytes)
41,138,984 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,168,889 UART: [rt]cmd =0x43455252, len=4
41,180,244 >>> mbox cmd response data (782 bytes)
41,184,943 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,216,623 UART: [rt]cmd =0x53494756, len=196
42,508,105 >>> mbox cmd response data (8 bytes)
42,508,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,539,146 UART: [rt]cmd =0x4d454153, len=108
42,557,541 >>> mbox cmd response data (12 bytes)
42,557,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,587,901 UART: [rt]cmd =0x494e464f, len=4
42,591,948 >>> mbox cmd response data (264 bytes)
42,594,235 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,624,145 UART: [rt]cmd =0x54514754, len=24
42,626,956 >>> mbox cmd response data (8 bytes)
42,627,366 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,657,104 UART: [rt]cmd =0x47544744, len=8
42,659,968 >>> mbox cmd response data (104 bytes)
42,660,832 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,690,438 UART: [rt]cmd =0x50435252, len=8
42,692,610 >>> mbox cmd response data (8 bytes)
42,693,044 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,723,145 UART: [rt]cmd =0x50435251, len=36
43,897,351 >>> mbox cmd response data (1848 bytes)
43,906,269 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,936,442 UART: [rt]cmd =0x50435245, len=56
43,939,613 >>> mbox cmd response data (8 bytes)
43,940,075 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,969,869 UART: [rt]cmd =0x44504543, len=20
43,997,941 >>> mbox cmd response data (44 bytes)
43,998,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,028,521 UART: [rt]cmd =0x44504543, len=24
44,075,804 >>> mbox cmd response data (40 bytes)
44,076,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,107,072 UART: [rt]cmd =0x44504543, len=96
44,167,378 >>> mbox cmd response data (56 bytes)
44,168,122 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,198,739 UART: [rt]cmd =0x44504543, len=92
52,277,391 >>> mbox cmd response data (6284 bytes)
52,306,478 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,337,644 UART: [rt]cmd =0x44504543, len=136
57,972,151 >>> mbox cmd response data (136 bytes)
57,973,384 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,003,436 UART: [rt]cmd =0x44504543, len=40
58,040,897 >>> mbox cmd response data (40 bytes)
58,041,617 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,071,530 UART: [rt]cmd =0x44504543, len=28
58,122,211 >>> mbox cmd response data (2076 bytes)
58,132,148 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,162,278 UART: [rt]cmd =0x44504543, len=36
58,183,725 >>> mbox cmd response data (24 bytes)
58,184,330 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,213,990 UART: [rt]cmd =0x4453424c, len=4
61,504,707 >>> mbox cmd response data (8 bytes)
61,505,287 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,534,823 UART: [rt]cmd =0x46505344, len=4
61,644,575 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,783,343 ready_for_fw is high
3,784,241 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,877,079 >>> mbox cmd response: success
17,880,358 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,561,502 UART:
23,561,894 UART: Running Caliptra FMC ...
23,563,053 UART:
23,563,225 UART: [state] CFI Enabled
23,631,056 UART: [fht] FMC Alias Private Key: 7
25,969,497 UART: [art] Extend RT PCRs Done
25,970,734 UART: [art] Lock RT PCRs Done
25,972,630 UART: [art] Populate DV Done
25,977,989 UART: [fht] FMC Alias Private Key: 7
25,979,654 UART: [art] Derive CDI
25,980,475 UART: [art] Store in in slot 0x4
26,039,711 UART: [art] Derive Key Pair
26,040,762 UART: [art] Store priv key in slot 0x5
29,333,815 UART: [art] Derive Key Pair - Done
29,346,709 UART: [art] Signing Cert with AUTHO
29,348,013 UART: RITY.KEYID = 7
31,635,881 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,390 UART: [art] PUB.X = 87045E054EF5013EE1FCFF8C1A73FBB14B04E26669EA9EED3D9B1807B8244886503DFA64DD0AABB8C325F0DF86A76B75
31,644,644 UART: [art] PUB.Y = 7EE6254F598470684AB67911B3934301AF05E518A4561057409788D08E025FB8C7D400A11A79CAEEE22B904028151662
31,651,868 UART: [art] SIG.R = 235561D9AD29E0915DF92516952DE84F455951D297A36F4BFE73687AF31CEB0D70CA6BDB62C372A0B0FEB88245FB2A4A
31,659,258 UART: [art] SIG.S = B9797D7C013B384BB6447FC2C6B29AE4B1765776D80219B811DE086417F2F0ACC12C71A201777260479FE8E42FDB5E60
32,965,016 UART: Caliptra RT
32,965,735 UART: [state] CFI Enabled
33,125,000 UART: [rt] RT listening for mailbox commands...
33,156,097 UART: [rt]cmd =0x46505652, len=4
33,157,379 UART: [rt] FIPS Version
33,158,437 >>> mbox cmd response data (36 bytes)
33,159,125 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,188,922 UART: [rt]cmd =0x46504c54, len=4
33,190,563 >>> mbox cmd response data (8 bytes)
33,190,909 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,220,956 UART: [rt]cmd =0x46504c67, len=4
33,222,404 >>> mbox cmd response: failed
33,223,783 UART: [rt] FIPS self test
33,224,774 UART: [kat] ++
33,225,228 UART: [kat] sha1
33,229,551 UART: [kat] SHA2-256
33,231,346 UART: [kat] SHA2-384
33,234,131 UART: [kat] SHA2-512-ACC
33,236,306 UART: [kat] ECC-384
36,505,021 UART: [kat] HMAC-384Kdf
36,512,359 UART: [kat] LMS
36,922,301 UART: [kat] --
37,054,228 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,886,568 UART: [rt] Verify complete
41,067,396 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,097,103 UART: [rt]cmd =0x46504c67, len=4
41,098,593 >>> mbox cmd response data (8 bytes)
41,098,970 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,128,887 UART: [rt]cmd =0x49444543, len=4
41,135,870 >>> mbox cmd response data (37 bytes)
41,136,466 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,166,031 UART: [rt]cmd =0x49444549, len=4
41,168,727 >>> mbox cmd response data (104 bytes)
41,169,612 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,199,315 UART: [rt]cmd =0x49444550, len=4
41,209,858 >>> mbox cmd response data (8 bytes)
41,210,269 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,240,095 UART: [rt]cmd =0x4c444556, len=4
41,251,110 >>> mbox cmd response data (687 bytes)
41,254,627 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,284,420 UART: [rt]cmd =0x43455246, len=4
41,297,607 >>> mbox cmd response data (920 bytes)
41,302,342 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,332,170 UART: [rt]cmd =0x43455252, len=4
41,343,477 >>> mbox cmd response data (783 bytes)
41,348,179 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,379,489 UART: [rt]cmd =0x53494756, len=196
42,671,154 >>> mbox cmd response data (8 bytes)
42,671,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,702,169 UART: [rt]cmd =0x4d454153, len=108
42,720,153 >>> mbox cmd response data (12 bytes)
42,720,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,750,526 UART: [rt]cmd =0x494e464f, len=4
42,754,570 >>> mbox cmd response data (264 bytes)
42,756,871 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,786,963 UART: [rt]cmd =0x54514754, len=24
42,789,669 >>> mbox cmd response data (8 bytes)
42,789,999 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,819,468 UART: [rt]cmd =0x47544744, len=8
42,822,156 >>> mbox cmd response data (104 bytes)
42,822,936 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,852,856 UART: [rt]cmd =0x50435252, len=8
42,854,976 >>> mbox cmd response data (8 bytes)
42,855,302 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,885,309 UART: [rt]cmd =0x50435251, len=36
44,057,046 >>> mbox cmd response data (1848 bytes)
44,066,016 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,096,554 UART: [rt]cmd =0x50435245, len=56
44,099,550 >>> mbox cmd response data (8 bytes)
44,099,980 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,129,603 UART: [rt]cmd =0x44504543, len=20
44,158,014 >>> mbox cmd response data (44 bytes)
44,158,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,188,909 UART: [rt]cmd =0x44504543, len=24
44,233,234 >>> mbox cmd response data (40 bytes)
44,233,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,264,566 UART: [rt]cmd =0x44504543, len=96
44,324,819 >>> mbox cmd response data (56 bytes)
44,325,561 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,355,880 UART: [rt]cmd =0x44504543, len=92
52,416,557 >>> mbox cmd response data (6284 bytes)
52,445,839 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,476,808 UART: [rt]cmd =0x44504543, len=136
58,114,764 >>> mbox cmd response data (136 bytes)
58,115,998 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,146,259 UART: [rt]cmd =0x44504543, len=40
58,186,361 >>> mbox cmd response data (40 bytes)
58,187,081 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,217,058 UART: [rt]cmd =0x44504543, len=28
58,267,197 >>> mbox cmd response data (2076 bytes)
58,277,123 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,307,419 UART: [rt]cmd =0x44504543, len=36
58,329,069 >>> mbox cmd response data (24 bytes)
58,329,640 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,359,372 UART: [rt]cmd =0x4453424c, len=4
61,649,880 >>> mbox cmd response data (8 bytes)
61,650,369 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,680,137 UART: [rt]cmd =0x46505344, len=4
61,789,945 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,617 UART:
192,974 UART: Running Caliptra ROM ...
194,069 UART:
603,718 UART: [state] CFI Enabled
618,457 UART: [state] LifecycleState = Unprovisioned
620,408 UART: [state] DebugLocked = No
622,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,388 UART: [kat] SHA2-256
797,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,697 UART: [kat] ++
808,145 UART: [kat] sha1
818,031 UART: [kat] SHA2-256
820,722 UART: [kat] SHA2-384
827,858 UART: [kat] SHA2-512-ACC
830,234 UART: [kat] ECC-384
3,116,260 UART: [kat] HMAC-384Kdf
3,128,645 UART: [kat] LMS
4,318,750 UART: [kat] --
4,324,600 UART: [cold-reset] ++
4,326,752 UART: [fht] Storing FHT @ 0x50003400
4,339,513 UART: [idev] ++
4,340,079 UART: [idev] CDI.KEYID = 6
4,341,067 UART: [idev] SUBJECT.KEYID = 7
4,342,316 UART: [idev] UDS.KEYID = 0
4,343,290 ready_for_fw is high
4,343,495 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,487,092 UART: [idev] Erasing UDS.KEYID = 0
7,624,649 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,234 UART: [idev] --
7,650,236 UART: [ldev] ++
7,650,809 UART: [ldev] CDI.KEYID = 6
7,651,774 UART: [ldev] SUBJECT.KEYID = 5
7,652,988 UART: [ldev] AUTHORITY.KEYID = 7
7,654,220 UART: [ldev] FE.KEYID = 1
7,665,731 UART: [ldev] Erasing FE.KEYID = 1
10,951,164 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,824 UART: [ldev] --
13,310,177 UART: [fwproc] Waiting for Commands...
13,313,033 UART: [fwproc] Received command 0x46574c44
13,315,221 UART: [fwproc] Received Image of size 114036 bytes
17,364,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,822,358 >>> mbox cmd response: success
17,825,302 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,826,302 UART: [afmc] ++
17,826,897 UART: [afmc] CDI.KEYID = 6
17,828,032 UART: [afmc] SUBJECT.KEYID = 7
17,829,160 UART: [afmc] AUTHORITY.KEYID = 5
21,143,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,366 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,625 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,969 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,833 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,252 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,409 UART: [afmc] --
23,508,869 UART: [cold-reset] --
23,512,512 UART: [state] Locking Datavault
23,515,877 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,631 UART: [state] Locking ICCM
23,519,888 UART: [exit] Launching FMC @ 0x40000130
23,528,288 UART:
23,528,521 UART: Running Caliptra FMC ...
23,529,623 UART:
23,529,786 UART: [state] CFI Enabled
23,537,943 UART: [fht] FMC Alias Private Key: 7
25,868,822 UART: [art] Extend RT PCRs Done
25,870,049 UART: [art] Lock RT PCRs Done
25,871,381 UART: [art] Populate DV Done
25,876,959 UART: [fht] FMC Alias Private Key: 7
25,878,548 UART: [art] Derive CDI
25,879,287 UART: [art] Store in in slot 0x4
25,921,903 UART: [art] Derive Key Pair
25,922,949 UART: [art] Store priv key in slot 0x5
29,164,781 UART: [art] Derive Key Pair - Done
29,177,745 UART: [art] Signing Cert with AUTHO
29,179,053 UART: RITY.KEYID = 7
31,458,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,893 UART: [art] PUB.X = 59E70D4C346E864A8E7BD1532117FD615D2F99CCCC5E4E9DF431DD5A43808D9EFEE5CCE950C57F99323704348718B924
31,467,135 UART: [art] PUB.Y = 6FF7A06F4B5617CC5E669A15C3806E87C524D4BD00796075E26E07E9D7C17C216822694374A912EB59E1195BB813D4F2
31,474,391 UART: [art] SIG.R = A5CAA805523A90F40CAC2C14789FD241DA008C1803CD2A2711ADBAC4FE5F66AB2CA5842AB9A6903EE5BF5D0AAEE13E5E
31,481,808 UART: [art] SIG.S = 992C99F75955AB5F69352615BFF18F4A25476C70A702FD13F50615F220F98E3430CD99DF6B1B9910E48DD98B1EC17D0C
32,786,905 UART: Caliptra RT
32,787,754 UART: [state] CFI Enabled
32,905,958 UART: [rt] RT listening for mailbox commands...
32,936,991 UART: [rt]cmd =0x46505652, len=4
32,938,235 UART: [rt] FIPS Version
32,939,554 >>> mbox cmd response data (36 bytes)
32,940,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,969,887 UART: [rt]cmd =0x46504c54, len=4
32,971,615 >>> mbox cmd response data (8 bytes)
32,971,968 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,002,159 UART: [rt]cmd =0x46504c67, len=4
33,003,613 >>> mbox cmd response: failed
33,005,058 UART: [rt] FIPS self test
33,005,994 UART: [kat] ++
33,006,448 UART: [kat] sha1
33,010,758 UART: [kat] SHA2-256
33,012,559 UART: [kat] SHA2-384
33,015,482 UART: [kat] SHA2-512-ACC
33,017,694 UART: [kat] ECC-384
36,260,027 UART: [kat] HMAC-384Kdf
36,265,869 UART: [kat] LMS
36,675,701 UART: [kat] --
36,828,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,659,298 UART: [rt] Verify complete
40,849,797 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,879,523 UART: [rt]cmd =0x46504c67, len=4
40,881,022 >>> mbox cmd response data (8 bytes)
40,881,389 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,911,037 UART: [rt]cmd =0x49444543, len=4
40,917,862 >>> mbox cmd response data (37 bytes)
40,918,448 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,948,259 UART: [rt]cmd =0x49444549, len=4
40,951,105 >>> mbox cmd response data (104 bytes)
40,951,997 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
40,982,029 UART: [rt]cmd =0x49444550, len=4
40,992,896 >>> mbox cmd response data (8 bytes)
40,993,293 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,022,994 UART: [rt]cmd =0x4c444556, len=4
41,034,161 >>> mbox cmd response data (687 bytes)
41,037,714 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,067,299 UART: [rt]cmd =0x43455246, len=4
41,080,438 >>> mbox cmd response data (920 bytes)
41,084,973 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,114,836 UART: [rt]cmd =0x43455252, len=4
41,125,958 >>> mbox cmd response data (784 bytes)
41,130,678 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,162,125 UART: [rt]cmd =0x53494756, len=196
42,453,805 >>> mbox cmd response data (8 bytes)
42,454,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,484,952 UART: [rt]cmd =0x4d454153, len=108
42,502,677 >>> mbox cmd response data (12 bytes)
42,503,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,532,986 UART: [rt]cmd =0x494e464f, len=4
42,537,046 >>> mbox cmd response data (264 bytes)
42,539,381 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,569,200 UART: [rt]cmd =0x54514754, len=24
42,571,771 >>> mbox cmd response data (8 bytes)
42,572,204 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,601,863 UART: [rt]cmd =0x47544744, len=8
42,604,898 >>> mbox cmd response data (104 bytes)
42,605,747 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,635,415 UART: [rt]cmd =0x50435252, len=8
42,637,513 >>> mbox cmd response data (8 bytes)
42,637,935 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,667,892 UART: [rt]cmd =0x50435251, len=36
43,823,191 >>> mbox cmd response data (1848 bytes)
43,832,241 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,862,466 UART: [rt]cmd =0x50435245, len=56
43,865,326 >>> mbox cmd response data (8 bytes)
43,865,686 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,895,542 UART: [rt]cmd =0x44504543, len=20
43,923,731 >>> mbox cmd response data (44 bytes)
43,924,499 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,954,396 UART: [rt]cmd =0x44504543, len=24
43,988,252 >>> mbox cmd response data (40 bytes)
43,988,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,019,516 UART: [rt]cmd =0x44504543, len=96
44,064,341 >>> mbox cmd response data (56 bytes)
44,065,079 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,095,466 UART: [rt]cmd =0x44504543, len=92
52,083,774 >>> mbox cmd response data (6284 bytes)
52,112,879 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,143,812 UART: [rt]cmd =0x44504543, len=136
57,712,647 >>> mbox cmd response data (136 bytes)
57,713,842 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,743,728 UART: [rt]cmd =0x44504543, len=40
57,777,730 >>> mbox cmd response data (40 bytes)
57,778,450 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,808,524 UART: [rt]cmd =0x44504543, len=28
57,859,291 >>> mbox cmd response data (2076 bytes)
57,869,212 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,899,497 UART: [rt]cmd =0x44504543, len=36
57,921,203 >>> mbox cmd response data (24 bytes)
57,921,794 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
57,951,728 UART: [rt]cmd =0x4453424c, len=4
61,194,986 >>> mbox cmd response data (8 bytes)
61,195,480 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,225,083 UART: [rt]cmd =0x46505344, len=4
61,334,897 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,130,001 ready_for_fw is high
4,130,423 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,083,528 >>> mbox cmd response: success
18,086,815 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,730,281 UART:
23,730,662 UART: Running Caliptra FMC ...
23,731,810 UART:
23,731,974 UART: [state] CFI Enabled
23,739,753 UART: [fht] FMC Alias Private Key: 7
26,069,774 UART: [art] Extend RT PCRs Done
26,071,027 UART: [art] Lock RT PCRs Done
26,072,548 UART: [art] Populate DV Done
26,077,880 UART: [fht] FMC Alias Private Key: 7
26,079,537 UART: [art] Derive CDI
26,080,359 UART: [art] Store in in slot 0x4
26,123,118 UART: [art] Derive Key Pair
26,124,125 UART: [art] Store priv key in slot 0x5
29,365,998 UART: [art] Derive Key Pair - Done
29,378,944 UART: [art] Signing Cert with AUTHO
29,380,260 UART: RITY.KEYID = 7
31,659,831 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,483 UART: [art] PUB.X = DB9AF70B61628EA8B976172DA26B00116CA4FD2030E83D5D6BBCB938B92F038509E9F10205ACBDA612C48E3E57804D8B
31,668,586 UART: [art] PUB.Y = C0EED2A846135707A9A654B1D8FC4F14649FECDBD4ED6253DF7184D4882D68FCA0158290534CE05475880B565F1F9DC6
31,675,845 UART: [art] SIG.R = FF3C8577044782109971F5F74242863AEA3ABA7C9C1335568C029D84E39F7E7FF151A7652AE5E915282049F24C89E4CB
31,683,223 UART: [art] SIG.S = AE123231653ED228B65DE0A71204459B2BF5AA38EF5986D627C361BEF536AC0BE555EE133CC7700346684B1D9AB2764C
32,988,887 UART: Caliptra RT
32,989,607 UART: [state] CFI Enabled
33,107,376 UART: [rt] RT listening for mailbox commands...
33,138,260 UART: [rt]cmd =0x46505652, len=4
33,139,515 UART: [rt] FIPS Version
33,140,621 >>> mbox cmd response data (36 bytes)
33,141,366 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,170,960 UART: [rt]cmd =0x46504c54, len=4
33,172,498 >>> mbox cmd response data (8 bytes)
33,172,829 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,202,985 UART: [rt]cmd =0x46504c67, len=4
33,204,372 >>> mbox cmd response: failed
33,205,069 UART: [rt] FIPS self test
33,206,066 UART: [kat] ++
33,206,522 UART: [kat] sha1
33,210,653 UART: [kat] SHA2-256
33,212,459 UART: [kat] SHA2-384
33,215,316 UART: [kat] SHA2-512-ACC
33,217,516 UART: [kat] ECC-384
36,459,887 UART: [kat] HMAC-384Kdf
36,465,619 UART: [kat] LMS
36,875,467 UART: [kat] --
37,007,425 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,839,625 UART: [rt] Verify complete
41,050,503 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,080,292 UART: [rt]cmd =0x46504c67, len=4
41,081,774 >>> mbox cmd response data (8 bytes)
41,082,164 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,111,895 UART: [rt]cmd =0x49444543, len=4
41,118,658 >>> mbox cmd response data (37 bytes)
41,119,270 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,149,036 UART: [rt]cmd =0x49444549, len=4
41,151,753 >>> mbox cmd response data (104 bytes)
41,152,633 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,182,382 UART: [rt]cmd =0x49444550, len=4
41,193,126 >>> mbox cmd response data (8 bytes)
41,193,537 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,223,189 UART: [rt]cmd =0x4c444556, len=4
41,234,215 >>> mbox cmd response data (687 bytes)
41,237,714 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,267,470 UART: [rt]cmd =0x43455246, len=4
41,280,369 >>> mbox cmd response data (920 bytes)
41,284,917 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,314,824 UART: [rt]cmd =0x43455252, len=4
41,326,118 >>> mbox cmd response data (784 bytes)
41,330,810 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,362,170 UART: [rt]cmd =0x53494756, len=196
42,654,259 >>> mbox cmd response data (8 bytes)
42,654,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,685,505 UART: [rt]cmd =0x4d454153, len=108
42,704,358 >>> mbox cmd response data (12 bytes)
42,704,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,734,491 UART: [rt]cmd =0x494e464f, len=4
42,738,397 >>> mbox cmd response data (264 bytes)
42,740,672 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,770,867 UART: [rt]cmd =0x54514754, len=24
42,773,299 >>> mbox cmd response data (8 bytes)
42,773,716 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,803,350 UART: [rt]cmd =0x47544744, len=8
42,806,214 >>> mbox cmd response data (104 bytes)
42,807,080 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,836,936 UART: [rt]cmd =0x50435252, len=8
42,839,001 >>> mbox cmd response data (8 bytes)
42,839,419 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,869,344 UART: [rt]cmd =0x50435251, len=36
44,025,188 >>> mbox cmd response data (1848 bytes)
44,034,129 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,064,254 UART: [rt]cmd =0x50435245, len=56
44,067,423 >>> mbox cmd response data (8 bytes)
44,067,881 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,097,726 UART: [rt]cmd =0x44504543, len=20
44,126,015 >>> mbox cmd response data (44 bytes)
44,126,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,156,584 UART: [rt]cmd =0x44504543, len=24
44,190,254 >>> mbox cmd response data (40 bytes)
44,190,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,221,413 UART: [rt]cmd =0x44504543, len=96
44,266,589 >>> mbox cmd response data (56 bytes)
44,267,331 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,297,743 UART: [rt]cmd =0x44504543, len=92
52,286,870 >>> mbox cmd response data (6284 bytes)
52,316,242 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,347,265 UART: [rt]cmd =0x44504543, len=136
57,915,724 >>> mbox cmd response data (136 bytes)
57,916,999 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,947,156 UART: [rt]cmd =0x44504543, len=40
57,981,357 >>> mbox cmd response data (40 bytes)
57,982,073 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,012,043 UART: [rt]cmd =0x44504543, len=28
58,062,781 >>> mbox cmd response data (2076 bytes)
58,072,714 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,103,002 UART: [rt]cmd =0x44504543, len=36
58,124,610 >>> mbox cmd response data (24 bytes)
58,125,168 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,154,785 UART: [rt]cmd =0x4453424c, len=4
61,397,869 >>> mbox cmd response data (8 bytes)
61,398,374 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,427,894 UART: [rt]cmd =0x46505344, len=4
61,537,853 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,184 UART:
192,546 UART: Running Caliptra ROM ...
193,776 UART:
193,929 UART: [state] CFI Enabled
264,324 UART: [state] LifecycleState = Unprovisioned
266,231 UART: [state] DebugLocked = No
268,339 UART: [state] WD Timer not started. Device not locked for debugging
271,807 UART: [kat] SHA2-256
450,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,509 UART: [kat] ++
462,980 UART: [kat] sha1
473,926 UART: [kat] SHA2-256
476,939 UART: [kat] SHA2-384
483,436 UART: [kat] SHA2-512-ACC
486,385 UART: [kat] ECC-384
2,948,688 UART: [kat] HMAC-384Kdf
2,972,149 UART: [kat] LMS
3,501,608 UART: [kat] --
3,506,028 UART: [cold-reset] ++
3,508,599 UART: [fht] FHT @ 0x50003400
3,520,432 UART: [idev] ++
3,520,999 UART: [idev] CDI.KEYID = 6
3,521,984 UART: [idev] SUBJECT.KEYID = 7
3,523,160 UART: [idev] UDS.KEYID = 0
3,524,084 ready_for_fw is high
3,524,295 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,668,163 UART: [idev] Erasing UDS.KEYID = 0
6,028,814 UART: [idev] Sha1 KeyId Algorithm
6,050,895 UART: [idev] --
6,054,549 UART: [ldev] ++
6,055,131 UART: [ldev] CDI.KEYID = 6
6,056,049 UART: [ldev] SUBJECT.KEYID = 5
6,057,133 UART: [ldev] AUTHORITY.KEYID = 7
6,058,420 UART: [ldev] FE.KEYID = 1
6,102,797 UART: [ldev] Erasing FE.KEYID = 1
8,607,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,768 UART: [ldev] --
10,415,276 UART: [fwproc] Wait for Commands...
10,417,287 UART: [fwproc] Recv command 0x46574c44
10,419,333 UART: [fwproc] Recv'd Img size: 114360 bytes
13,823,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,283,908 >>> mbox cmd response: success
14,286,863 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,287,843 UART: [afmc] ++
14,288,430 UART: [afmc] CDI.KEYID = 6
14,289,339 UART: [afmc] SUBJECT.KEYID = 7
14,290,438 UART: [afmc] AUTHORITY.KEYID = 5
16,833,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,214 UART: [afmc] --
18,629,845 UART: [cold-reset] --
18,634,565 UART: [state] Locking Datavault
18,641,321 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,965 UART: [state] Locking ICCM
18,645,432 UART: [exit] Launching FMC @ 0x40000130
18,653,825 UART:
18,654,062 UART: Running Caliptra FMC ...
18,655,169 UART:
18,655,332 UART: [state] CFI Enabled
18,711,554 UART: [fht] FMC Alias Private Key: 7
20,475,420 UART: [art] Extend RT PCRs Done
20,476,628 UART: [art] Lock RT PCRs Done
20,478,488 UART: [art] Populate DV Done
20,484,105 UART: [fht] FMC Alias Private Key: 7
20,485,658 UART: [art] Derive CDI
20,486,395 UART: [art] Store in in slot 0x4
20,543,999 UART: [art] Derive Key Pair
20,545,101 UART: [art] Store priv key in slot 0x5
23,007,989 UART: [art] Derive Key Pair - Done
23,020,989 UART: [art] Signing Cert with AUTHO
23,022,295 UART: RITY.KEYID = 7
24,734,310 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,798 UART: [art] PUB.X = 6A53AF1E4B77FCB60C416ADD04B316FEA762ADD196C238C8D817EC53121558FE9C13DA5236C92D1327F5FC783C311263
24,743,043 UART: [art] PUB.Y = 42AA34D9F2D8C7EB353A5788066A6B373BDE533D4C6F8DEB3EFA8409FA6D367FCF4E7A8F2D0497D87E7B6C17E86A9946
24,750,342 UART: [art] SIG.R = BA2199A0AB65C6A2A0ECC7DA05BCD12739E88BF636582D379A2F6D70F200DF5EFB271C8244C919809BB59F5701F4C0DB
24,757,766 UART: [art] SIG.S = A5C64CCE98DBE1171ECC3B36A0A771079490FDF347F64A427E55E647C9295FA076724D0329299BCB55FC14BA21FD0054
25,736,526 UART: Caliptra RT
25,737,247 UART: [state] CFI Enabled
25,902,808 UART: [rt] RT listening for mailbox commands...
25,933,900 UART: [rt]cmd =0x46505652, len=4
25,935,171 UART: [rt] FIPS Version
25,936,493 >>> mbox cmd response data (36 bytes)
25,937,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,966,858 UART: [rt]cmd =0x46504c54, len=4
25,968,367 >>> mbox cmd response data (8 bytes)
25,968,710 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,999,107 UART: [rt]cmd =0x46504c67, len=4
26,000,404 >>> mbox cmd response: failed
26,001,818 UART: [rt] FIPS self test
26,002,751 UART: [kat] ++
26,003,210 UART: [kat] sha1
26,007,638 UART: [kat] SHA2-256
26,009,441 UART: [kat] SHA2-384
26,012,091 UART: [kat] SHA2-512-ACC
26,014,305 UART: [kat] ECC-384
28,452,996 UART: [kat] HMAC-384Kdf
28,479,480 UART: [kat] LMS
28,677,226 UART: [kat] --
28,830,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,012,997 UART: [rt] Verify complete
32,142,639 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,172,595 UART: [rt]cmd =0x46504c67, len=4
32,174,237 >>> mbox cmd response data (8 bytes)
32,174,622 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,204,377 UART: [rt]cmd =0x49444543, len=4
32,211,295 >>> mbox cmd response data (37 bytes)
32,211,896 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,241,441 UART: [rt]cmd =0x49444549, len=4
32,244,043 >>> mbox cmd response data (104 bytes)
32,244,920 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,274,574 UART: [rt]cmd =0x49444550, len=4
32,285,221 >>> mbox cmd response data (8 bytes)
32,285,682 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,315,224 UART: [rt]cmd =0x4c444556, len=4
32,326,363 >>> mbox cmd response data (687 bytes)
32,329,887 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,359,633 UART: [rt]cmd =0x43455246, len=4
32,372,153 >>> mbox cmd response data (887 bytes)
32,376,562 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,406,405 UART: [rt]cmd =0x43455252, len=4
32,417,755 >>> mbox cmd response data (784 bytes)
32,422,444 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,453,806 UART: [rt]cmd =0x53494756, len=196
33,419,219 >>> mbox cmd response data (8 bytes)
33,419,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,450,314 UART: [rt]cmd =0x4d454153, len=108
33,469,790 >>> mbox cmd response data (12 bytes)
33,470,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,500,000 UART: [rt]cmd =0x494e464f, len=4
33,503,889 >>> mbox cmd response data (264 bytes)
33,506,156 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,536,395 UART: [rt]cmd =0x54514754, len=24
33,538,720 >>> mbox cmd response data (8 bytes)
33,539,138 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,569,036 UART: [rt]cmd =0x47544744, len=8
33,572,113 >>> mbox cmd response data (104 bytes)
33,572,981 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,602,855 UART: [rt]cmd =0x50435252, len=8
33,604,484 >>> mbox cmd response data (8 bytes)
33,604,811 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,634,654 UART: [rt]cmd =0x50435251, len=36
34,542,944 >>> mbox cmd response data (1848 bytes)
34,551,848 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,582,059 UART: [rt]cmd =0x50435245, len=56
34,585,214 >>> mbox cmd response data (8 bytes)
34,585,663 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,615,465 UART: [rt]cmd =0x44504543, len=20
34,643,905 >>> mbox cmd response data (44 bytes)
34,644,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,674,505 UART: [rt]cmd =0x44504543, len=24
34,710,633 >>> mbox cmd response data (40 bytes)
34,711,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,741,875 UART: [rt]cmd =0x44504543, len=96
34,802,530 >>> mbox cmd response data (56 bytes)
34,803,317 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,833,849 UART: [rt]cmd =0x44504543, len=92
40,954,316 >>> mbox cmd response data (6284 bytes)
40,983,389 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,014,164 UART: [rt]cmd =0x44504543, len=136
45,241,297 >>> mbox cmd response data (136 bytes)
45,242,532 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,272,662 UART: [rt]cmd =0x44504543, len=40
45,309,877 >>> mbox cmd response data (40 bytes)
45,310,526 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,340,502 UART: [rt]cmd =0x44504543, len=28
45,390,928 >>> mbox cmd response data (2076 bytes)
45,401,006 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,431,267 UART: [rt]cmd =0x44504543, len=36
45,453,183 >>> mbox cmd response data (24 bytes)
45,453,744 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,483,425 UART: [rt]cmd =0x4453424c, len=4
47,944,620 >>> mbox cmd response data (8 bytes)
47,945,111 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,974,996 UART: [rt]cmd =0x46505344, len=4
48,084,830 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,252 UART:
192,629 UART: Running Caliptra ROM ...
193,828 UART:
193,983 UART: [state] CFI Enabled
262,345 UART: [state] LifecycleState = Unprovisioned
264,697 UART: [state] DebugLocked = No
266,814 UART: [state] WD Timer not started. Device not locked for debugging
270,860 UART: [kat] SHA2-256
460,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,538 UART: [kat] ++
472,017 UART: [kat] sha1
484,771 UART: [kat] SHA2-256
487,786 UART: [kat] SHA2-384
494,290 UART: [kat] SHA2-512-ACC
496,880 UART: [kat] ECC-384
2,946,800 UART: [kat] HMAC-384Kdf
2,971,903 UART: [kat] LMS
3,503,659 UART: [kat] --
3,509,025 UART: [cold-reset] ++
3,511,398 UART: [fht] FHT @ 0x50003400
3,522,242 UART: [idev] ++
3,522,952 UART: [idev] CDI.KEYID = 6
3,523,989 UART: [idev] SUBJECT.KEYID = 7
3,525,093 UART: [idev] UDS.KEYID = 0
3,526,028 ready_for_fw is high
3,526,246 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,670,131 UART: [idev] Erasing UDS.KEYID = 0
6,028,844 UART: [idev] Sha1 KeyId Algorithm
6,050,783 UART: [idev] --
6,056,495 UART: [ldev] ++
6,057,190 UART: [ldev] CDI.KEYID = 6
6,058,077 UART: [ldev] SUBJECT.KEYID = 5
6,059,296 UART: [ldev] AUTHORITY.KEYID = 7
6,060,528 UART: [ldev] FE.KEYID = 1
6,101,158 UART: [ldev] Erasing FE.KEYID = 1
8,605,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,039 UART: [ldev] --
10,415,181 UART: [fwproc] Wait for Commands...
10,417,122 UART: [fwproc] Recv command 0x46574c44
10,419,456 UART: [fwproc] Recv'd Img size: 114360 bytes
13,868,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,607,479 >>> mbox cmd response: success
14,610,641 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,611,798 UART: [afmc] ++
14,612,509 UART: [afmc] CDI.KEYID = 6
14,613,744 UART: [afmc] SUBJECT.KEYID = 7
14,615,178 UART: [afmc] AUTHORITY.KEYID = 5
17,151,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,665 UART: [afmc] --
18,948,006 UART: [cold-reset] --
18,952,795 UART: [state] Locking Datavault
18,958,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,989 UART: [state] Locking ICCM
18,963,898 UART: [exit] Launching FMC @ 0x40000130
18,972,517 UART:
18,972,753 UART: Running Caliptra FMC ...
18,973,851 UART:
18,974,013 UART: [state] CFI Enabled
19,032,516 UART: [fht] FMC Alias Private Key: 7
20,796,507 UART: [art] Extend RT PCRs Done
20,797,726 UART: [art] Lock RT PCRs Done
20,799,354 UART: [art] Populate DV Done
20,804,931 UART: [fht] FMC Alias Private Key: 7
20,806,468 UART: [art] Derive CDI
20,807,298 UART: [art] Store in in slot 0x4
20,865,851 UART: [art] Derive Key Pair
20,866,891 UART: [art] Store priv key in slot 0x5
23,329,749 UART: [art] Derive Key Pair - Done
23,342,694 UART: [art] Signing Cert with AUTHO
23,344,000 UART: RITY.KEYID = 7
25,054,539 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,062 UART: [art] PUB.X = 2B9AC14E5644813107E557696FBDB73CD1101251C547A976B4DD26925611ED55F5845FD48A526D7243D53048AAD82203
25,063,254 UART: [art] PUB.Y = 8FC7662BDC99318792D21D0F657C124C125E880E5A2EF4D695D074FF27D3DC04652BAAB82AEEF5357BA48D77F6B71DFB
25,070,536 UART: [art] SIG.R = 4A3E2676009C54CAB876798C0787379B5D3250771BE7F15790E46C5AD7BC6E20CF3B73191855A7ACDB410248CACFB3BD
25,077,955 UART: [art] SIG.S = 067DEE90D8E9E47CAEEA60D2011C7B70BFFABBF68C36114A92FA388932025FB92DF0558AE0E50B6E4C2688F9B4AB20CB
26,057,208 UART: Caliptra RT
26,057,919 UART: [state] CFI Enabled
26,223,915 UART: [rt] RT listening for mailbox commands...
26,254,872 UART: [rt]cmd =0x46505652, len=4
26,256,121 UART: [rt] FIPS Version
26,257,358 >>> mbox cmd response data (36 bytes)
26,258,063 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,287,838 UART: [rt]cmd =0x46504c54, len=4
26,289,369 >>> mbox cmd response data (8 bytes)
26,289,713 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,319,464 UART: [rt]cmd =0x46504c67, len=4
26,320,758 >>> mbox cmd response: failed
26,321,621 UART: [rt] FIPS self test
26,322,552 UART: [kat] ++
26,323,006 UART: [kat] sha1
26,327,234 UART: [kat] SHA2-256
26,329,036 UART: [kat] SHA2-384
26,332,102 UART: [kat] SHA2-512-ACC
26,334,320 UART: [kat] ECC-384
28,774,389 UART: [kat] HMAC-384Kdf
28,801,034 UART: [kat] LMS
28,998,696 UART: [kat] --
29,152,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,334,789 UART: [rt] Verify complete
32,463,131 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,492,986 UART: [rt]cmd =0x46504c67, len=4
32,494,468 >>> mbox cmd response data (8 bytes)
32,494,806 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,524,560 UART: [rt]cmd =0x49444543, len=4
32,531,620 >>> mbox cmd response data (37 bytes)
32,532,244 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,561,853 UART: [rt]cmd =0x49444549, len=4
32,564,572 >>> mbox cmd response data (104 bytes)
32,565,448 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,595,101 UART: [rt]cmd =0x49444550, len=4
32,605,638 >>> mbox cmd response data (8 bytes)
32,606,035 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,635,830 UART: [rt]cmd =0x4c444556, len=4
32,646,854 >>> mbox cmd response data (687 bytes)
32,650,380 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,680,393 UART: [rt]cmd =0x43455246, len=4
32,693,205 >>> mbox cmd response data (887 bytes)
32,697,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,727,520 UART: [rt]cmd =0x43455252, len=4
32,738,931 >>> mbox cmd response data (782 bytes)
32,743,622 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,775,150 UART: [rt]cmd =0x53494756, len=196
33,740,753 >>> mbox cmd response data (8 bytes)
33,741,236 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,771,782 UART: [rt]cmd =0x4d454153, len=108
33,790,877 >>> mbox cmd response data (12 bytes)
33,791,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,821,026 UART: [rt]cmd =0x494e464f, len=4
33,824,978 >>> mbox cmd response data (264 bytes)
33,827,311 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,857,282 UART: [rt]cmd =0x54514754, len=24
33,859,769 >>> mbox cmd response data (8 bytes)
33,860,185 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,889,803 UART: [rt]cmd =0x47544744, len=8
33,892,786 >>> mbox cmd response data (104 bytes)
33,893,665 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,923,327 UART: [rt]cmd =0x50435252, len=8
33,925,395 >>> mbox cmd response data (8 bytes)
33,925,767 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,955,781 UART: [rt]cmd =0x50435251, len=36
34,875,559 >>> mbox cmd response data (1848 bytes)
34,884,478 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,914,638 UART: [rt]cmd =0x50435245, len=56
34,917,447 >>> mbox cmd response data (8 bytes)
34,917,843 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,947,625 UART: [rt]cmd =0x44504543, len=20
34,975,693 >>> mbox cmd response data (44 bytes)
34,976,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,006,432 UART: [rt]cmd =0x44504543, len=24
35,043,710 >>> mbox cmd response data (40 bytes)
35,044,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,075,228 UART: [rt]cmd =0x44504543, len=96
35,135,436 >>> mbox cmd response data (56 bytes)
35,136,260 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,166,682 UART: [rt]cmd =0x44504543, len=92
41,287,313 >>> mbox cmd response data (6284 bytes)
41,316,379 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,347,321 UART: [rt]cmd =0x44504543, len=136
45,575,780 >>> mbox cmd response data (136 bytes)
45,577,066 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,607,007 UART: [rt]cmd =0x44504543, len=40
45,644,193 >>> mbox cmd response data (40 bytes)
45,644,851 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,674,942 UART: [rt]cmd =0x44504543, len=28
45,725,420 >>> mbox cmd response data (2076 bytes)
45,735,495 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,765,730 UART: [rt]cmd =0x44504543, len=36
45,787,302 >>> mbox cmd response data (24 bytes)
45,787,877 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,817,678 UART: [rt]cmd =0x4453424c, len=4
48,278,418 >>> mbox cmd response data (8 bytes)
48,278,923 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,308,492 UART: [rt]cmd =0x46505344, len=4
48,418,433 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,435,729 ready_for_fw is high
3,436,149 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,750,625 >>> mbox cmd response: success
14,753,909 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,033,015 UART:
19,033,451 UART: Running Caliptra FMC ...
19,034,606 UART:
19,034,780 UART: [state] CFI Enabled
19,102,785 UART: [fht] FMC Alias Private Key: 7
20,866,928 UART: [art] Extend RT PCRs Done
20,868,156 UART: [art] Lock RT PCRs Done
20,870,052 UART: [art] Populate DV Done
20,875,582 UART: [fht] FMC Alias Private Key: 7
20,877,070 UART: [art] Derive CDI
20,877,836 UART: [art] Store in in slot 0x4
20,935,776 UART: [art] Derive Key Pair
20,936,817 UART: [art] Store priv key in slot 0x5
23,399,669 UART: [art] Derive Key Pair - Done
23,412,662 UART: [art] Signing Cert with AUTHO
23,414,006 UART: RITY.KEYID = 7
25,125,550 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,059 UART: [art] PUB.X = C3E83176C6255F5D9264BA12D6290675C07B42646737C7112CA15017512A2521896AB366FE94514113DC92E6D218DD43
25,134,305 UART: [art] PUB.Y = 2BEA2FFFE38D48855A5AF50DA35E58B3150A4761F324BB1BA880142A4A7AA9BFF3A56E9546D3B3BD11A25CC6EA44CDB4
25,141,588 UART: [art] SIG.R = 00B76EB4F391949EB3FBE075CE0C5D4424A75C33AB356978C73C29A5279DB4511825A3622F4B7D96E5D7E9CEA60A84E0
25,148,938 UART: [art] SIG.S = D29F32FF6269C967813689FB4687D64C2A8F350DC5BD90120754248D9D394AE211C9F44DF904BDBC3D006951605710B4
26,127,866 UART: Caliptra RT
26,128,567 UART: [state] CFI Enabled
26,293,319 UART: [rt] RT listening for mailbox commands...
26,324,188 UART: [rt]cmd =0x46505652, len=4
26,325,435 UART: [rt] FIPS Version
26,326,920 >>> mbox cmd response data (36 bytes)
26,327,646 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,241 UART: [rt]cmd =0x46504c54, len=4
26,358,882 >>> mbox cmd response data (8 bytes)
26,359,220 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,388,881 UART: [rt]cmd =0x46504c67, len=4
26,390,208 >>> mbox cmd response: failed
26,391,450 UART: [rt] FIPS self test
26,392,440 UART: [kat] ++
26,392,893 UART: [kat] sha1
26,397,045 UART: [kat] SHA2-256
26,398,866 UART: [kat] SHA2-384
26,401,654 UART: [kat] SHA2-512-ACC
26,403,869 UART: [kat] ECC-384
28,844,268 UART: [kat] HMAC-384Kdf
28,870,986 UART: [kat] LMS
29,068,626 UART: [kat] --
29,202,600 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,384,211 UART: [rt] Verify complete
32,532,743 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,562,546 UART: [rt]cmd =0x46504c67, len=4
32,564,242 >>> mbox cmd response data (8 bytes)
32,564,594 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,594,404 UART: [rt]cmd =0x49444543, len=4
32,601,275 >>> mbox cmd response data (37 bytes)
32,601,860 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,631,535 UART: [rt]cmd =0x49444549, len=4
32,634,298 >>> mbox cmd response data (104 bytes)
32,635,187 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,665,054 UART: [rt]cmd =0x49444550, len=4
32,675,484 >>> mbox cmd response data (8 bytes)
32,675,893 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,705,446 UART: [rt]cmd =0x4c444556, len=4
32,716,723 >>> mbox cmd response data (687 bytes)
32,720,242 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,750,149 UART: [rt]cmd =0x43455246, len=4
32,762,899 >>> mbox cmd response data (887 bytes)
32,767,492 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,797,322 UART: [rt]cmd =0x43455252, len=4
32,808,946 >>> mbox cmd response data (783 bytes)
32,813,641 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,845,048 UART: [rt]cmd =0x53494756, len=196
33,810,822 >>> mbox cmd response data (8 bytes)
33,811,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,841,848 UART: [rt]cmd =0x4d454153, len=108
33,860,405 >>> mbox cmd response data (12 bytes)
33,860,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,890,492 UART: [rt]cmd =0x494e464f, len=4
33,894,535 >>> mbox cmd response data (264 bytes)
33,896,585 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,926,507 UART: [rt]cmd =0x54514754, len=24
33,929,366 >>> mbox cmd response data (8 bytes)
33,929,779 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,959,660 UART: [rt]cmd =0x47544744, len=8
33,962,857 >>> mbox cmd response data (104 bytes)
33,963,710 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,993,453 UART: [rt]cmd =0x50435252, len=8
33,995,174 >>> mbox cmd response data (8 bytes)
33,995,514 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,025,658 UART: [rt]cmd =0x50435251, len=36
34,955,004 >>> mbox cmd response data (1848 bytes)
34,963,922 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,994,356 UART: [rt]cmd =0x50435245, len=56
34,997,753 >>> mbox cmd response data (8 bytes)
34,998,191 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,028,248 UART: [rt]cmd =0x44504543, len=20
35,056,120 >>> mbox cmd response data (44 bytes)
35,056,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,086,678 UART: [rt]cmd =0x44504543, len=24
35,122,307 >>> mbox cmd response data (40 bytes)
35,122,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,153,725 UART: [rt]cmd =0x44504543, len=96
35,214,113 >>> mbox cmd response data (56 bytes)
35,214,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,245,310 UART: [rt]cmd =0x44504543, len=92
41,366,520 >>> mbox cmd response data (6284 bytes)
41,395,594 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,426,867 UART: [rt]cmd =0x44504543, len=136
45,655,781 >>> mbox cmd response data (136 bytes)
45,657,043 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,687,018 UART: [rt]cmd =0x44504543, len=40
45,724,749 >>> mbox cmd response data (40 bytes)
45,725,443 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,755,359 UART: [rt]cmd =0x44504543, len=28
45,805,655 >>> mbox cmd response data (2076 bytes)
45,815,574 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,845,590 UART: [rt]cmd =0x44504543, len=36
45,867,458 >>> mbox cmd response data (24 bytes)
45,868,022 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,897,705 UART: [rt]cmd =0x4453424c, len=4
48,359,862 >>> mbox cmd response data (8 bytes)
48,360,362 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,390,082 UART: [rt]cmd =0x46505344, len=4
48,499,808 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,546 UART:
192,923 UART: Running Caliptra ROM ...
194,061 UART:
603,906 UART: [state] CFI Enabled
617,631 UART: [state] LifecycleState = Unprovisioned
620,005 UART: [state] DebugLocked = No
621,473 UART: [state] WD Timer not started. Device not locked for debugging
625,949 UART: [kat] SHA2-256
815,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,618 UART: [kat] ++
827,164 UART: [kat] sha1
837,616 UART: [kat] SHA2-256
840,634 UART: [kat] SHA2-384
847,148 UART: [kat] SHA2-512-ACC
849,738 UART: [kat] ECC-384
3,292,423 UART: [kat] HMAC-384Kdf
3,305,660 UART: [kat] LMS
3,837,463 UART: [kat] --
3,840,761 UART: [cold-reset] ++
3,841,710 UART: [fht] FHT @ 0x50003400
3,852,426 UART: [idev] ++
3,853,173 UART: [idev] CDI.KEYID = 6
3,854,095 UART: [idev] SUBJECT.KEYID = 7
3,855,278 UART: [idev] UDS.KEYID = 0
3,856,209 ready_for_fw is high
3,856,442 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,000,006 UART: [idev] Erasing UDS.KEYID = 0
6,331,552 UART: [idev] Sha1 KeyId Algorithm
6,355,619 UART: [idev] --
6,360,291 UART: [ldev] ++
6,360,975 UART: [ldev] CDI.KEYID = 6
6,361,884 UART: [ldev] SUBJECT.KEYID = 5
6,363,046 UART: [ldev] AUTHORITY.KEYID = 7
6,364,282 UART: [ldev] FE.KEYID = 1
6,376,008 UART: [ldev] Erasing FE.KEYID = 1
8,854,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,457 UART: [ldev] --
10,644,669 UART: [fwproc] Wait for Commands...
10,646,223 UART: [fwproc] Recv command 0x46574c44
10,648,548 UART: [fwproc] Recv'd Img size: 114360 bytes
14,093,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,828,226 >>> mbox cmd response: success
14,831,264 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,833,075 UART: [afmc] ++
14,833,779 UART: [afmc] CDI.KEYID = 6
14,834,963 UART: [afmc] SUBJECT.KEYID = 7
14,836,452 UART: [afmc] AUTHORITY.KEYID = 5
17,342,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,365 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,110 UART: [afmc] --
19,137,850 UART: [cold-reset] --
19,141,681 UART: [state] Locking Datavault
19,146,776 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,962 UART: [state] Locking ICCM
19,150,625 UART: [exit] Launching FMC @ 0x40000130
19,159,294 UART:
19,159,527 UART: Running Caliptra FMC ...
19,160,626 UART:
19,160,786 UART: [state] CFI Enabled
19,169,045 UART: [fht] FMC Alias Private Key: 7
20,926,297 UART: [art] Extend RT PCRs Done
20,927,525 UART: [art] Lock RT PCRs Done
20,929,121 UART: [art] Populate DV Done
20,934,529 UART: [fht] FMC Alias Private Key: 7
20,936,227 UART: [art] Derive CDI
20,937,042 UART: [art] Store in in slot 0x4
20,979,534 UART: [art] Derive Key Pair
20,980,588 UART: [art] Store priv key in slot 0x5
23,407,358 UART: [art] Derive Key Pair - Done
23,420,415 UART: [art] Signing Cert with AUTHO
23,421,726 UART: RITY.KEYID = 7
25,127,282 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,800 UART: [art] PUB.X = 08469E50704A1F6E1052F2522D3954FFBC344AA8847F695CA93E4846F61E150EF50096B2A3B49131016F61E63FBD1748
25,136,015 UART: [art] PUB.Y = 078C3DA3F9B112EBA29A8EAD66EF60D79173B9B85AC34865758FC6B9B36566D0EC224BBE275E3BBAE8899F18D84E53B3
25,143,298 UART: [art] SIG.R = A44B1E9C3A6B95EB6D1593C7DC9C2BC7BB1CDA9335DE85ED8B8AD497758A9CB7A65149779CBF9D77CC796C9B95565B25
25,150,708 UART: [art] SIG.S = 55B57373195A866F1F7E3F5BCA5A0B1577A543AAA928F1D9245C2E08703D75F6FE93DF61F5334E59F05BE1EDC2C3AA2A
26,129,545 UART: Caliptra RT
26,130,235 UART: [state] CFI Enabled
26,247,639 UART: [rt] RT listening for mailbox commands...
26,278,681 UART: [rt]cmd =0x46505652, len=4
26,279,926 UART: [rt] FIPS Version
26,281,299 >>> mbox cmd response data (36 bytes)
26,282,041 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,311,570 UART: [rt]cmd =0x46504c54, len=4
26,313,211 >>> mbox cmd response data (8 bytes)
26,313,553 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,343,856 UART: [rt]cmd =0x46504c67, len=4
26,345,341 >>> mbox cmd response: failed
26,346,404 UART: [rt] FIPS self test
26,347,335 UART: [kat] ++
26,347,782 UART: [kat] sha1
26,352,097 UART: [kat] SHA2-256
26,353,894 UART: [kat] SHA2-384
26,356,701 UART: [kat] SHA2-512-ACC
26,358,918 UART: [kat] ECC-384
28,785,911 UART: [kat] HMAC-384Kdf
28,791,853 UART: [kat] LMS
28,989,522 UART: [kat] --
29,143,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,325,258 UART: [rt] Verify complete
32,487,253 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,517,272 UART: [rt]cmd =0x46504c67, len=4
32,518,748 >>> mbox cmd response data (8 bytes)
32,519,088 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,548,790 UART: [rt]cmd =0x49444543, len=4
32,555,929 >>> mbox cmd response data (37 bytes)
32,556,512 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,586,180 UART: [rt]cmd =0x49444549, len=4
32,589,040 >>> mbox cmd response data (104 bytes)
32,589,834 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,619,721 UART: [rt]cmd =0x49444550, len=4
32,630,428 >>> mbox cmd response data (8 bytes)
32,630,830 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,660,594 UART: [rt]cmd =0x4c444556, len=4
32,671,820 >>> mbox cmd response data (687 bytes)
32,675,361 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,705,101 UART: [rt]cmd =0x43455246, len=4
32,717,916 >>> mbox cmd response data (887 bytes)
32,722,321 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,752,077 UART: [rt]cmd =0x43455252, len=4
32,763,528 >>> mbox cmd response data (783 bytes)
32,768,231 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,799,623 UART: [rt]cmd =0x53494756, len=196
33,765,019 >>> mbox cmd response data (8 bytes)
33,765,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,796,234 UART: [rt]cmd =0x4d454153, len=108
33,814,724 >>> mbox cmd response data (12 bytes)
33,815,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,845,088 UART: [rt]cmd =0x494e464f, len=4
33,849,166 >>> mbox cmd response data (264 bytes)
33,851,435 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,881,692 UART: [rt]cmd =0x54514754, len=24
33,884,397 >>> mbox cmd response data (8 bytes)
33,884,819 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,914,799 UART: [rt]cmd =0x47544744, len=8
33,917,729 >>> mbox cmd response data (104 bytes)
33,918,584 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,948,583 UART: [rt]cmd =0x50435252, len=8
33,950,522 >>> mbox cmd response data (8 bytes)
33,950,893 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,981,009 UART: [rt]cmd =0x50435251, len=36
34,889,079 >>> mbox cmd response data (1848 bytes)
34,897,994 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,928,100 UART: [rt]cmd =0x50435245, len=56
34,931,181 >>> mbox cmd response data (8 bytes)
34,931,568 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,961,505 UART: [rt]cmd =0x44504543, len=20
34,989,828 >>> mbox cmd response data (44 bytes)
34,990,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,020,320 UART: [rt]cmd =0x44504543, len=24
35,054,676 >>> mbox cmd response data (40 bytes)
35,055,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,085,858 UART: [rt]cmd =0x44504543, len=96
35,130,747 >>> mbox cmd response data (56 bytes)
35,131,522 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,161,933 UART: [rt]cmd =0x44504543, len=92
41,188,233 >>> mbox cmd response data (6284 bytes)
41,217,495 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,248,601 UART: [rt]cmd =0x44504543, len=136
45,428,919 >>> mbox cmd response data (136 bytes)
45,430,149 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,460,096 UART: [rt]cmd =0x44504543, len=40
45,494,332 >>> mbox cmd response data (40 bytes)
45,495,027 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,524,777 UART: [rt]cmd =0x44504543, len=28
45,575,506 >>> mbox cmd response data (2076 bytes)
45,585,432 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,615,624 UART: [rt]cmd =0x44504543, len=36
45,637,041 >>> mbox cmd response data (24 bytes)
45,637,612 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,667,427 UART: [rt]cmd =0x4453424c, len=4
48,095,598 >>> mbox cmd response data (8 bytes)
48,096,100 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,125,706 UART: [rt]cmd =0x46505344, len=4
48,235,512 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,756,685 ready_for_fw is high
3,757,333 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,947,896 >>> mbox cmd response: success
14,950,963 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,205,664 UART:
19,206,087 UART: Running Caliptra FMC ...
19,207,238 UART:
19,207,391 UART: [state] CFI Enabled
19,215,155 UART: [fht] FMC Alias Private Key: 7
20,972,230 UART: [art] Extend RT PCRs Done
20,973,454 UART: [art] Lock RT PCRs Done
20,974,893 UART: [art] Populate DV Done
20,980,314 UART: [fht] FMC Alias Private Key: 7
20,981,825 UART: [art] Derive CDI
20,982,592 UART: [art] Store in in slot 0x4
21,024,969 UART: [art] Derive Key Pair
21,025,975 UART: [art] Store priv key in slot 0x5
23,452,789 UART: [art] Derive Key Pair - Done
23,465,840 UART: [art] Signing Cert with AUTHO
23,467,145 UART: RITY.KEYID = 7
25,172,343 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,839 UART: [art] PUB.X = 6F9AF7BAB57E4C4F86ED95AC04857F259CD925D224ED4D9F025C1A50A8013D580E01387CD17EC5A9704848A52C8BFCE0
25,181,134 UART: [art] PUB.Y = 80C1615E44EB7576F972C8A299D676A7BA27B1C148BAB6414B4A8EC0260B24F0E53E1EF52E14F0CD3796C615EA2F9334
25,188,403 UART: [art] SIG.R = 0A650E764351DEB6B155EC5B8ED645197E72CF83D9717A3E5CF2A7A26AD235E3D3E44E322B4C05CC8FDDCC6C759A9EBF
25,195,829 UART: [art] SIG.S = 4FCB09D179D9D0AD75B8254C38DCB4714EF956D14841CDDF733FD9FDB098353EFC34E300137ABAEAA242B764E8F71620
26,174,260 UART: Caliptra RT
26,174,961 UART: [state] CFI Enabled
26,292,025 UART: [rt] RT listening for mailbox commands...
26,322,991 UART: [rt]cmd =0x46505652, len=4
26,324,337 UART: [rt] FIPS Version
26,325,661 >>> mbox cmd response data (36 bytes)
26,326,368 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,356,302 UART: [rt]cmd =0x46504c54, len=4
26,357,726 >>> mbox cmd response data (8 bytes)
26,358,054 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,387,643 UART: [rt]cmd =0x46504c67, len=4
26,388,928 >>> mbox cmd response: failed
26,390,168 UART: [rt] FIPS self test
26,391,156 UART: [kat] ++
26,391,605 UART: [kat] sha1
26,395,918 UART: [kat] SHA2-256
26,397,725 UART: [kat] SHA2-384
26,400,688 UART: [kat] SHA2-512-ACC
26,402,899 UART: [kat] ECC-384
28,830,274 UART: [kat] HMAC-384Kdf
28,836,089 UART: [kat] LMS
29,033,762 UART: [kat] --
29,167,764 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,350,471 UART: [rt] Verify complete
32,530,681 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,560,421 UART: [rt]cmd =0x46504c67, len=4
32,561,978 >>> mbox cmd response data (8 bytes)
32,562,330 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,591,917 UART: [rt]cmd =0x49444543, len=4
32,599,059 >>> mbox cmd response data (37 bytes)
32,599,648 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,629,405 UART: [rt]cmd =0x49444549, len=4
32,632,117 >>> mbox cmd response data (104 bytes)
32,632,907 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,662,604 UART: [rt]cmd =0x49444550, len=4
32,673,103 >>> mbox cmd response data (8 bytes)
32,673,525 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,703,067 UART: [rt]cmd =0x4c444556, len=4
32,714,261 >>> mbox cmd response data (687 bytes)
32,717,808 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,747,601 UART: [rt]cmd =0x43455246, len=4
32,760,198 >>> mbox cmd response data (887 bytes)
32,764,590 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,794,338 UART: [rt]cmd =0x43455252, len=4
32,805,787 >>> mbox cmd response data (782 bytes)
32,810,498 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,841,946 UART: [rt]cmd =0x53494756, len=196
33,807,363 >>> mbox cmd response data (8 bytes)
33,807,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,838,389 UART: [rt]cmd =0x4d454153, len=108
33,857,263 >>> mbox cmd response data (12 bytes)
33,857,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,887,367 UART: [rt]cmd =0x494e464f, len=4
33,891,259 >>> mbox cmd response data (264 bytes)
33,893,243 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,923,077 UART: [rt]cmd =0x54514754, len=24
33,925,445 >>> mbox cmd response data (8 bytes)
33,925,870 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,955,474 UART: [rt]cmd =0x47544744, len=8
33,958,667 >>> mbox cmd response data (104 bytes)
33,959,526 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,989,132 UART: [rt]cmd =0x50435252, len=8
33,991,033 >>> mbox cmd response data (8 bytes)
33,991,364 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,021,447 UART: [rt]cmd =0x50435251, len=36
34,929,046 >>> mbox cmd response data (1848 bytes)
34,937,949 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,968,330 UART: [rt]cmd =0x50435245, len=56
34,971,674 >>> mbox cmd response data (8 bytes)
34,972,124 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,002,073 UART: [rt]cmd =0x44504543, len=20
35,030,323 >>> mbox cmd response data (44 bytes)
35,031,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,061,094 UART: [rt]cmd =0x44504543, len=24
35,095,100 >>> mbox cmd response data (40 bytes)
35,095,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,126,423 UART: [rt]cmd =0x44504543, len=96
35,171,495 >>> mbox cmd response data (56 bytes)
35,172,251 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,202,785 UART: [rt]cmd =0x44504543, len=92
41,229,206 >>> mbox cmd response data (6284 bytes)
41,258,318 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,289,363 UART: [rt]cmd =0x44504543, len=136
45,468,706 >>> mbox cmd response data (136 bytes)
45,469,931 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,499,866 UART: [rt]cmd =0x44504543, len=40
45,534,021 >>> mbox cmd response data (40 bytes)
45,534,742 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,564,650 UART: [rt]cmd =0x44504543, len=28
45,615,052 >>> mbox cmd response data (2076 bytes)
45,624,974 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,654,889 UART: [rt]cmd =0x44504543, len=36
45,676,553 >>> mbox cmd response data (24 bytes)
45,677,160 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,706,926 UART: [rt]cmd =0x4453424c, len=4
48,134,445 >>> mbox cmd response data (8 bytes)
48,134,931 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,164,755 UART: [rt]cmd =0x46505344, len=4
48,274,372 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,405 UART: [kat] SHA2-256
882,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,451 UART: [kat] ++
886,603 UART: [kat] sha1
890,987 UART: [kat] SHA2-256
892,925 UART: [kat] SHA2-384
895,680 UART: [kat] SHA2-512-ACC
897,581 UART: [kat] ECC-384
903,210 UART: [kat] HMAC-384Kdf
907,646 UART: [kat] LMS
1,475,842 UART: [kat] --
1,476,651 UART: [cold-reset] ++
1,477,191 UART: [fht] Storing FHT @ 0x50003400
1,479,828 UART: [idev] ++
1,479,996 UART: [idev] CDI.KEYID = 6
1,480,356 UART: [idev] SUBJECT.KEYID = 7
1,480,780 UART: [idev] UDS.KEYID = 0
1,481,125 ready_for_fw is high
1,481,125 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,504,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,547,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,540 UART: [ldev] --
1,586,951 UART: [fwproc] Waiting for Commands...
1,587,776 UART: [fwproc] Received command 0x46574c44
1,588,567 UART: [fwproc] Received Image of size 114360 bytes
2,887,216 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,901 >>> mbox cmd response: success
3,079,901 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,983 UART: [afmc] ++
3,081,151 UART: [afmc] CDI.KEYID = 6
3,081,513 UART: [afmc] SUBJECT.KEYID = 7
3,081,938 UART: [afmc] AUTHORITY.KEYID = 5
3,116,253 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,185 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,913 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,798 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,488 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,265 UART: [afmc] --
3,159,385 UART: [cold-reset] --
3,160,105 UART: [state] Locking Datavault
3,161,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,990 UART: [state] Locking ICCM
3,162,568 UART: [exit] Launching FMC @ 0x40000130
3,167,897 UART:
3,167,913 UART: Running Caliptra FMC ...
3,168,321 UART:
3,168,375 UART: [state] CFI Enabled
3,178,950 UART: [fht] FMC Alias Private Key: 7
3,286,271 UART: [art] Extend RT PCRs Done
3,286,699 UART: [art] Lock RT PCRs Done
3,288,289 UART: [art] Populate DV Done
3,296,568 UART: [fht] FMC Alias Private Key: 7
3,297,564 UART: [art] Derive CDI
3,297,844 UART: [art] Store in in slot 0x4
3,383,369 UART: [art] Derive Key Pair
3,383,729 UART: [art] Store priv key in slot 0x5
3,396,899 UART: [art] Derive Key Pair - Done
3,411,454 UART: [art] Signing Cert with AUTHO
3,411,934 UART: RITY.KEYID = 7
3,427,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,793 UART: [art] PUB.X = 2D1D18A235A9B1CBD329C845098C237AD8CD3140CC0BE86131078DB64B3B833483AB3E9E633532A7790C1AD486383159
3,434,549 UART: [art] PUB.Y = 3E64FCE6E37C48C6A49D621F11E22E418EAADB23A93B2D54F7053EBABAF2FB425643F779580DC8D00779164059EAE2DB
3,441,504 UART: [art] SIG.R = D3F94B1D39725AC12FD3946C4D0EDA79730ADB8382C441B953B6734A2040E1833922ECAE5D26180F4AF3E042AFB8FF38
3,448,273 UART: [art] SIG.S = 70A3BA3402413BC9B4155A827906650AAA50A669D99F0C365AC30259B2BBA14D49E1D18AA1D3233B0D705C5818A85B0A
3,471,805 UART: Caliptra RT
3,472,059 UART: [state] CFI Enabled
3,579,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,008 UART: [rt]cmd =0x46505652, len=4
3,610,679 UART: [rt] FIPS Version
3,611,773 >>> mbox cmd response data (36 bytes)
3,611,774 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,213 UART: [rt]cmd =0x46504c54, len=4
3,642,541 >>> mbox cmd response data (8 bytes)
3,642,542 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,672,221 UART: [rt]cmd =0x46504c67, len=4
3,673,219 >>> mbox cmd response: failed
3,673,369 UART: [rt] FIPS self test
3,673,700 UART: [kat] ++
3,673,852 UART: [kat] sha1
3,678,047 UART: [kat] SHA2-256
3,679,977 UART: [kat] SHA2-384
3,682,964 UART: [kat] SHA2-512-ACC
3,684,859 UART: [kat] ECC-384
3,694,472 UART: [kat] HMAC-384Kdf
3,698,991 UART: [kat] LMS
3,947,882 UART: [kat] --
4,742,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,171,080 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,969 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,263 UART: [rt]cmd =0x46504c67, len=4
6,203,406 >>> mbox cmd response data (8 bytes)
6,203,407 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,232,916 UART: [rt]cmd =0x49444543, len=4
6,239,246 >>> mbox cmd response data (37 bytes)
6,239,247 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,452 UART: [rt]cmd =0x49444549, len=4
6,270,675 >>> mbox cmd response data (104 bytes)
6,270,676 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,007 UART: [rt]cmd =0x49444550, len=4
6,310,232 >>> mbox cmd response data (8 bytes)
6,310,233 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,494 UART: [rt]cmd =0x4c444556, len=4
6,349,963 >>> mbox cmd response data (687 bytes)
6,349,964 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,141 UART: [rt]cmd =0x43455246, len=4
6,391,448 >>> mbox cmd response data (920 bytes)
6,391,449 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,420,856 UART: [rt]cmd =0x43455252, len=4
6,431,550 >>> mbox cmd response data (783 bytes)
6,431,551 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,462,320 UART: [rt]cmd =0x53494756, len=196
6,467,546 >>> mbox cmd response data (8 bytes)
6,467,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,497,744 UART: [rt]cmd =0x4d454153, len=108
6,518,375 >>> mbox cmd response data (12 bytes)
6,518,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,547,873 UART: [rt]cmd =0x494e464f, len=4
6,551,013 >>> mbox cmd response data (264 bytes)
6,551,014 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,621 UART: [rt]cmd =0x54514754, len=24
6,582,799 >>> mbox cmd response data (8 bytes)
6,582,800 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,251 UART: [rt]cmd =0x47544744, len=8
6,614,649 >>> mbox cmd response data (104 bytes)
6,614,650 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,643,989 UART: [rt]cmd =0x50435252, len=8
6,645,579 >>> mbox cmd response data (8 bytes)
6,645,580 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,675,029 UART: [rt]cmd =0x50435251, len=36
6,842,490 >>> mbox cmd response data (1848 bytes)
6,842,491 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,872,276 UART: [rt]cmd =0x50435245, len=56
6,875,586 >>> mbox cmd response data (8 bytes)
6,875,587 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,188 UART: [rt]cmd =0x44504543, len=20
6,934,077 >>> mbox cmd response data (44 bytes)
6,934,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,963,629 UART: [rt]cmd =0x44504543, len=24
6,997,473 >>> mbox cmd response data (40 bytes)
6,997,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,027,101 UART: [rt]cmd =0x44504543, len=96
7,072,167 >>> mbox cmd response data (56 bytes)
7,072,168 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,237 UART: [rt]cmd =0x44504543, len=92
7,338,349 >>> mbox cmd response data (6284 bytes)
7,338,350 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,368,441 UART: [rt]cmd =0x44504543, len=136
7,442,100 >>> mbox cmd response data (136 bytes)
7,442,101 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,471,784 UART: [rt]cmd =0x44504543, len=40
7,505,585 >>> mbox cmd response data (40 bytes)
7,505,586 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,534,919 UART: [rt]cmd =0x44504543, len=28
7,586,102 >>> mbox cmd response data (2076 bytes)
7,586,103 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,615,896 UART: [rt]cmd =0x44504543, len=36
7,637,858 >>> mbox cmd response data (24 bytes)
7,637,859 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,667,168 UART: [rt]cmd =0x4453424c, len=4
7,681,001 >>> mbox cmd response data (8 bytes)
7,681,002 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,710,439 UART: [rt]cmd =0x46505344, len=4
7,818,801 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,497 ready_for_fw is high
1,363,497 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,013 >>> mbox cmd response: success
2,928,013 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,985 UART:
2,990,001 UART: Running Caliptra FMC ...
2,990,409 UART:
2,990,463 UART: [state] CFI Enabled
3,000,662 UART: [fht] FMC Alias Private Key: 7
3,108,367 UART: [art] Extend RT PCRs Done
3,108,795 UART: [art] Lock RT PCRs Done
3,110,055 UART: [art] Populate DV Done
3,118,118 UART: [fht] FMC Alias Private Key: 7
3,119,204 UART: [art] Derive CDI
3,119,484 UART: [art] Store in in slot 0x4
3,204,795 UART: [art] Derive Key Pair
3,205,155 UART: [art] Store priv key in slot 0x5
3,218,607 UART: [art] Derive Key Pair - Done
3,233,672 UART: [art] Signing Cert with AUTHO
3,234,152 UART: RITY.KEYID = 7
3,249,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,413 UART: [art] PUB.X = BC941A8A1CA4FDFDCE5ACE1BA41B4E42382CF0C972F50A79BFFFF1D098699702CD44FD3A8CC6B8EA3CBDEF1E9603C476
3,257,206 UART: [art] PUB.Y = 6F8C834A52DDE1FE8349194AA66E343D1C354DD8300DC3F557A9E4A7953C61DB9E267646FB808009C493235C6BD5FF58
3,264,154 UART: [art] SIG.R = BB324C2FFFEDB1131E52FB7D8900569D9E9C428484EC0F6CAC87066715433FFEC245A107D7821A81A7F9DF65197255DD
3,270,901 UART: [art] SIG.S = D650DC3875FA8E7C875C8547EA137C4B8FC8DB23579570F2908B138B61D5233224678B1038037132BFD8B53DDA2396BB
3,294,827 UART: Caliptra RT
3,295,081 UART: [state] CFI Enabled
3,403,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,329 UART: [rt]cmd =0x46505652, len=4
3,434,000 UART: [rt] FIPS Version
3,435,086 >>> mbox cmd response data (36 bytes)
3,435,087 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,388 UART: [rt]cmd =0x46504c54, len=4
3,465,434 >>> mbox cmd response data (8 bytes)
3,465,435 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,495,050 UART: [rt]cmd =0x46504c67, len=4
3,496,114 >>> mbox cmd response: failed
3,496,470 UART: [rt] FIPS self test
3,496,801 UART: [kat] ++
3,496,953 UART: [kat] sha1
3,501,038 UART: [kat] SHA2-256
3,502,968 UART: [kat] SHA2-384
3,505,735 UART: [kat] SHA2-512-ACC
3,507,630 UART: [kat] ECC-384
3,517,387 UART: [kat] HMAC-384Kdf
3,521,774 UART: [kat] LMS
3,770,665 UART: [kat] --
4,458,046 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,885,596 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,895,874 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,925,272 UART: [rt]cmd =0x46504c67, len=4
5,926,569 >>> mbox cmd response data (8 bytes)
5,926,570 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,955,767 UART: [rt]cmd =0x49444543, len=4
5,962,047 >>> mbox cmd response data (37 bytes)
5,962,048 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,991,475 UART: [rt]cmd =0x49444549, len=4
5,993,648 >>> mbox cmd response data (104 bytes)
5,993,649 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,023,176 UART: [rt]cmd =0x49444550, len=4
6,033,304 >>> mbox cmd response data (8 bytes)
6,033,305 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,492 UART: [rt]cmd =0x4c444556, len=4
6,073,161 >>> mbox cmd response data (687 bytes)
6,073,162 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,102,473 UART: [rt]cmd =0x43455246, len=4
6,114,830 >>> mbox cmd response data (920 bytes)
6,114,831 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,144,330 UART: [rt]cmd =0x43455252, len=4
6,155,315 >>> mbox cmd response data (784 bytes)
6,155,316 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,185,949 UART: [rt]cmd =0x53494756, len=196
6,191,269 >>> mbox cmd response data (8 bytes)
6,191,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,221,079 UART: [rt]cmd =0x4d454153, len=108
6,241,780 >>> mbox cmd response data (12 bytes)
6,241,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,271,152 UART: [rt]cmd =0x494e464f, len=4
6,274,310 >>> mbox cmd response data (264 bytes)
6,274,311 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,303,852 UART: [rt]cmd =0x54514754, len=24
6,305,812 >>> mbox cmd response data (8 bytes)
6,305,813 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,335,082 UART: [rt]cmd =0x47544744, len=8
6,337,648 >>> mbox cmd response data (104 bytes)
6,337,649 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,367,256 UART: [rt]cmd =0x50435252, len=8
6,368,730 >>> mbox cmd response data (8 bytes)
6,368,731 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,398,386 UART: [rt]cmd =0x50435251, len=36
6,565,963 >>> mbox cmd response data (1848 bytes)
6,565,964 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,595,521 UART: [rt]cmd =0x50435245, len=56
6,599,025 >>> mbox cmd response data (8 bytes)
6,599,026 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,628,647 UART: [rt]cmd =0x44504543, len=20
6,657,230 >>> mbox cmd response data (44 bytes)
6,657,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,686,838 UART: [rt]cmd =0x44504543, len=24
6,721,050 >>> mbox cmd response data (40 bytes)
6,721,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,750,930 UART: [rt]cmd =0x44504543, len=96
6,795,364 >>> mbox cmd response data (56 bytes)
6,795,365 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,825,362 UART: [rt]cmd =0x44504543, len=92
7,061,167 >>> mbox cmd response data (6284 bytes)
7,061,168 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,091,489 UART: [rt]cmd =0x44504543, len=136
7,167,102 >>> mbox cmd response data (136 bytes)
7,167,103 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,196,586 UART: [rt]cmd =0x44504543, len=40
7,230,543 >>> mbox cmd response data (40 bytes)
7,230,544 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,260,021 UART: [rt]cmd =0x44504543, len=28
7,311,112 >>> mbox cmd response data (2076 bytes)
7,311,113 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,340,666 UART: [rt]cmd =0x44504543, len=36
7,363,140 >>> mbox cmd response data (24 bytes)
7,363,141 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,392,292 UART: [rt]cmd =0x4453424c, len=4
7,405,665 >>> mbox cmd response data (8 bytes)
7,405,666 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,435,093 UART: [rt]cmd =0x46505344, len=4
7,543,623 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,174 UART: [kat] SHA2-256
882,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,220 UART: [kat] ++
886,372 UART: [kat] sha1
890,544 UART: [kat] SHA2-256
892,482 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,261 UART: [kat] LMS
1,475,457 UART: [kat] --
1,476,030 UART: [cold-reset] ++
1,476,502 UART: [fht] Storing FHT @ 0x50003400
1,479,079 UART: [idev] ++
1,479,247 UART: [idev] CDI.KEYID = 6
1,479,607 UART: [idev] SUBJECT.KEYID = 7
1,480,031 UART: [idev] UDS.KEYID = 0
1,480,376 ready_for_fw is high
1,480,376 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,487,945 UART: [idev] Erasing UDS.KEYID = 0
1,504,879 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,491 UART: [idev] --
1,514,638 UART: [ldev] ++
1,514,806 UART: [ldev] CDI.KEYID = 6
1,515,169 UART: [ldev] SUBJECT.KEYID = 5
1,515,595 UART: [ldev] AUTHORITY.KEYID = 7
1,516,058 UART: [ldev] FE.KEYID = 1
1,521,300 UART: [ldev] Erasing FE.KEYID = 1
1,547,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,385 UART: [ldev] --
1,586,652 UART: [fwproc] Waiting for Commands...
1,587,287 UART: [fwproc] Received command 0x46574c44
1,588,078 UART: [fwproc] Received Image of size 114360 bytes
2,885,635 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,998 >>> mbox cmd response: success
3,077,998 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,079,168 UART: [afmc] ++
3,079,336 UART: [afmc] CDI.KEYID = 6
3,079,698 UART: [afmc] SUBJECT.KEYID = 7
3,080,123 UART: [afmc] AUTHORITY.KEYID = 5
3,115,340 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,580 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,973 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,663 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,558 UART: [afmc] --
3,158,504 UART: [cold-reset] --
3,159,322 UART: [state] Locking Datavault
3,160,453 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,057 UART: [state] Locking ICCM
3,161,511 UART: [exit] Launching FMC @ 0x40000130
3,166,840 UART:
3,166,856 UART: Running Caliptra FMC ...
3,167,264 UART:
3,167,407 UART: [state] CFI Enabled
3,178,188 UART: [fht] FMC Alias Private Key: 7
3,286,053 UART: [art] Extend RT PCRs Done
3,286,481 UART: [art] Lock RT PCRs Done
3,287,717 UART: [art] Populate DV Done
3,296,252 UART: [fht] FMC Alias Private Key: 7
3,297,346 UART: [art] Derive CDI
3,297,626 UART: [art] Store in in slot 0x4
3,383,097 UART: [art] Derive Key Pair
3,383,457 UART: [art] Store priv key in slot 0x5
3,396,835 UART: [art] Derive Key Pair - Done
3,411,673 UART: [art] Signing Cert with AUTHO
3,412,153 UART: RITY.KEYID = 7
3,427,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,166 UART: [art] PUB.X = 22294CCB966D0AB1C6853AACD312ECD308E3E856B5511D2C74AB0EDF238FC7805649CB1EB9BBE37E30709EE236FCEC7D
3,434,947 UART: [art] PUB.Y = D28AFC9607E0A5021CDDD3A324E516E8B2020F27368BBCBCFCEFEFA21922EE11BBB5A68C1A6F796AB935693693ACBE8F
3,441,909 UART: [art] SIG.R = 4AC6FBBB35A21485D04C04C8A125F4AEF047F996426EB9241D930F3F524A3640E92B9FD70A6B2567786D6E9011B59824
3,448,670 UART: [art] SIG.S = 3142D20AB32899E9EEBB54E940FD6A1BE2C3DF211F6187EA89375515383457AC93F9858BE707EEC8027A0F06060F9AF2
3,472,152 UART: Caliptra RT
3,472,498 UART: [state] CFI Enabled
3,580,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,938 UART: [rt]cmd =0x46505652, len=4
3,611,609 UART: [rt] FIPS Version
3,612,811 >>> mbox cmd response data (36 bytes)
3,612,812 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,221 UART: [rt]cmd =0x46504c54, len=4
3,643,511 >>> mbox cmd response data (8 bytes)
3,643,512 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,673,087 UART: [rt]cmd =0x46504c67, len=4
3,674,217 >>> mbox cmd response: failed
3,674,477 UART: [rt] FIPS self test
3,674,808 UART: [kat] ++
3,674,960 UART: [kat] sha1
3,679,209 UART: [kat] SHA2-256
3,681,139 UART: [kat] SHA2-384
3,683,698 UART: [kat] SHA2-512-ACC
3,685,593 UART: [kat] ECC-384
3,695,268 UART: [kat] HMAC-384Kdf
3,699,975 UART: [kat] LMS
3,948,866 UART: [kat] --
4,743,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,171,786 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,967 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,263 UART: [rt]cmd =0x46504c67, len=4
6,204,246 >>> mbox cmd response data (8 bytes)
6,204,247 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,233,706 UART: [rt]cmd =0x49444543, len=4
6,240,078 >>> mbox cmd response data (37 bytes)
6,240,079 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,269,338 UART: [rt]cmd =0x49444549, len=4
6,271,777 >>> mbox cmd response data (104 bytes)
6,271,778 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,301,099 UART: [rt]cmd =0x49444550, len=4
6,311,245 >>> mbox cmd response data (8 bytes)
6,311,246 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,340,625 UART: [rt]cmd =0x4c444556, len=4
6,351,264 >>> mbox cmd response data (687 bytes)
6,351,265 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,380,308 UART: [rt]cmd =0x43455246, len=4
6,392,767 >>> mbox cmd response data (920 bytes)
6,392,768 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,422,379 UART: [rt]cmd =0x43455252, len=4
6,433,105 >>> mbox cmd response data (782 bytes)
6,433,106 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,463,661 UART: [rt]cmd =0x53494756, len=196
6,469,021 >>> mbox cmd response data (8 bytes)
6,469,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,499,149 UART: [rt]cmd =0x4d454153, len=108
6,520,114 >>> mbox cmd response data (12 bytes)
6,520,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,549,228 UART: [rt]cmd =0x494e464f, len=4
6,552,692 >>> mbox cmd response data (264 bytes)
6,552,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,900 UART: [rt]cmd =0x54514754, len=24
6,584,272 >>> mbox cmd response data (8 bytes)
6,584,273 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,800 UART: [rt]cmd =0x47544744, len=8
6,616,204 >>> mbox cmd response data (104 bytes)
6,616,205 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,780 UART: [rt]cmd =0x50435252, len=8
6,647,068 >>> mbox cmd response data (8 bytes)
6,647,069 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,676,554 UART: [rt]cmd =0x50435251, len=36
6,844,029 >>> mbox cmd response data (1848 bytes)
6,844,030 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,873,585 UART: [rt]cmd =0x50435245, len=56
6,877,203 >>> mbox cmd response data (8 bytes)
6,877,204 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,906,545 UART: [rt]cmd =0x44504543, len=20
6,935,150 >>> mbox cmd response data (44 bytes)
6,935,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,964,610 UART: [rt]cmd =0x44504543, len=24
6,999,066 >>> mbox cmd response data (40 bytes)
6,999,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,029,354 UART: [rt]cmd =0x44504543, len=96
7,074,018 >>> mbox cmd response data (56 bytes)
7,074,019 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,103,866 UART: [rt]cmd =0x44504543, len=92
7,340,481 >>> mbox cmd response data (6284 bytes)
7,340,482 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,597 UART: [rt]cmd =0x44504543, len=136
7,444,692 >>> mbox cmd response data (136 bytes)
7,444,693 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,474,106 UART: [rt]cmd =0x44504543, len=40
7,508,359 >>> mbox cmd response data (40 bytes)
7,508,360 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,537,619 UART: [rt]cmd =0x44504543, len=28
7,588,660 >>> mbox cmd response data (2076 bytes)
7,588,661 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,618,212 UART: [rt]cmd =0x44504543, len=36
7,640,410 >>> mbox cmd response data (24 bytes)
7,640,411 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,669,648 UART: [rt]cmd =0x4453424c, len=4
7,683,457 >>> mbox cmd response data (8 bytes)
7,683,458 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,712,851 UART: [rt]cmd =0x46505344, len=4
7,821,425 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 ready_for_fw is high
1,362,884 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,736 >>> mbox cmd response: success
2,928,736 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,990,880 UART:
2,990,896 UART: Running Caliptra FMC ...
2,991,304 UART:
2,991,447 UART: [state] CFI Enabled
3,002,332 UART: [fht] FMC Alias Private Key: 7
3,110,355 UART: [art] Extend RT PCRs Done
3,110,783 UART: [art] Lock RT PCRs Done
3,112,345 UART: [art] Populate DV Done
3,120,544 UART: [fht] FMC Alias Private Key: 7
3,121,718 UART: [art] Derive CDI
3,121,998 UART: [art] Store in in slot 0x4
3,207,679 UART: [art] Derive Key Pair
3,208,039 UART: [art] Store priv key in slot 0x5
3,221,619 UART: [art] Derive Key Pair - Done
3,236,839 UART: [art] Signing Cert with AUTHO
3,237,319 UART: RITY.KEYID = 7
3,252,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,370 UART: [art] PUB.X = 32888C2C2C5AD8AD0EC19967A521BDA59C146624EC378D4229735B321FFD3E7C86FA3DBEAAC18BC017EBFD6888D617CF
3,260,155 UART: [art] PUB.Y = E8B107E1173188C571136FF1E6D90ADA87BBA77E3B55BC67E752F72E8B5E17FA04A56192A9E703AA644C7A4B26ACB741
3,267,103 UART: [art] SIG.R = F8347C9ED242FE0EDB120643CFB172B188865A9A2443FA09D5A22CA490696A686D88206C27198A39DFED69CB95B64DEA
3,273,872 UART: [art] SIG.S = D946BD917B55440F962B3D3F8B8DE50D84BD9AB28FCD5E7B3B51002ECDAD3398B360CC7B36BB0F2A541D728BBE90E620
3,297,492 UART: Caliptra RT
3,297,838 UART: [state] CFI Enabled
3,405,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,060 UART: [rt]cmd =0x46505652, len=4
3,436,731 UART: [rt] FIPS Version
3,437,841 >>> mbox cmd response data (36 bytes)
3,437,842 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,125 UART: [rt]cmd =0x46504c54, len=4
3,468,501 >>> mbox cmd response data (8 bytes)
3,468,502 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,498,137 UART: [rt]cmd =0x46504c67, len=4
3,499,289 >>> mbox cmd response: failed
3,499,455 UART: [rt] FIPS self test
3,499,786 UART: [kat] ++
3,499,938 UART: [kat] sha1
3,504,357 UART: [kat] SHA2-256
3,506,287 UART: [kat] SHA2-384
3,509,040 UART: [kat] SHA2-512-ACC
3,510,935 UART: [kat] ECC-384
3,520,648 UART: [kat] HMAC-384Kdf
3,525,191 UART: [kat] LMS
3,774,082 UART: [kat] --
4,461,551 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,889,515 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,049 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,928,203 UART: [rt]cmd =0x46504c67, len=4
5,929,256 >>> mbox cmd response data (8 bytes)
5,929,257 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,958,630 UART: [rt]cmd =0x49444543, len=4
5,964,912 >>> mbox cmd response data (37 bytes)
5,964,913 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,994,220 UART: [rt]cmd =0x49444549, len=4
5,996,565 >>> mbox cmd response data (104 bytes)
5,996,566 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,026,055 UART: [rt]cmd =0x49444550, len=4
6,036,185 >>> mbox cmd response data (8 bytes)
6,036,186 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,065,445 UART: [rt]cmd =0x4c444556, len=4
6,075,960 >>> mbox cmd response data (687 bytes)
6,075,961 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,105,414 UART: [rt]cmd =0x43455246, len=4
6,117,789 >>> mbox cmd response data (920 bytes)
6,117,790 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,147,083 UART: [rt]cmd =0x43455252, len=4
6,157,982 >>> mbox cmd response data (784 bytes)
6,157,983 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,724 UART: [rt]cmd =0x53494756, len=196
6,193,696 >>> mbox cmd response data (8 bytes)
6,193,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,223,668 UART: [rt]cmd =0x4d454153, len=108
6,244,435 >>> mbox cmd response data (12 bytes)
6,244,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,273,801 UART: [rt]cmd =0x494e464f, len=4
6,277,277 >>> mbox cmd response data (264 bytes)
6,277,278 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,306,791 UART: [rt]cmd =0x54514754, len=24
6,308,775 >>> mbox cmd response data (8 bytes)
6,308,776 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,338,215 UART: [rt]cmd =0x47544744, len=8
6,340,983 >>> mbox cmd response data (104 bytes)
6,340,984 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,370,539 UART: [rt]cmd =0x50435252, len=8
6,372,087 >>> mbox cmd response data (8 bytes)
6,372,088 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,401,357 UART: [rt]cmd =0x50435251, len=36
6,568,686 >>> mbox cmd response data (1848 bytes)
6,568,687 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,598,324 UART: [rt]cmd =0x50435245, len=56
6,601,778 >>> mbox cmd response data (8 bytes)
6,601,779 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,631,192 UART: [rt]cmd =0x44504543, len=20
6,660,039 >>> mbox cmd response data (44 bytes)
6,660,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,689,503 UART: [rt]cmd =0x44504543, len=24
6,723,823 >>> mbox cmd response data (40 bytes)
6,723,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,753,839 UART: [rt]cmd =0x44504543, len=96
6,799,125 >>> mbox cmd response data (56 bytes)
6,799,126 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,829,019 UART: [rt]cmd =0x44504543, len=92
7,065,514 >>> mbox cmd response data (6284 bytes)
7,065,515 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,095,724 UART: [rt]cmd =0x44504543, len=136
7,169,909 >>> mbox cmd response data (136 bytes)
7,169,910 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,199,599 UART: [rt]cmd =0x44504543, len=40
7,233,734 >>> mbox cmd response data (40 bytes)
7,233,735 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,263,042 UART: [rt]cmd =0x44504543, len=28
7,314,113 >>> mbox cmd response data (2076 bytes)
7,314,114 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,343,773 UART: [rt]cmd =0x44504543, len=36
7,365,965 >>> mbox cmd response data (24 bytes)
7,365,966 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,395,451 UART: [rt]cmd =0x4453424c, len=4
7,410,072 >>> mbox cmd response data (8 bytes)
7,410,073 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,439,442 UART: [rt]cmd =0x46505344, len=4
7,547,682 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
892,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,101 UART: [kat] ++
897,253 UART: [kat] sha1
901,439 UART: [kat] SHA2-256
903,379 UART: [kat] SHA2-384
906,224 UART: [kat] SHA2-512-ACC
908,125 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,360 UART: [kat] LMS
1,170,688 UART: [kat] --
1,171,617 UART: [cold-reset] ++
1,171,943 UART: [fht] FHT @ 0x50003400
1,174,554 UART: [idev] ++
1,174,722 UART: [idev] CDI.KEYID = 6
1,175,082 UART: [idev] SUBJECT.KEYID = 7
1,175,506 UART: [idev] UDS.KEYID = 0
1,175,851 ready_for_fw is high
1,175,851 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,568 UART: [idev] Erasing UDS.KEYID = 0
1,200,443 UART: [idev] Sha1 KeyId Algorithm
1,209,029 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,646 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,437 UART: [ldev] --
1,281,742 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,304 >>> mbox cmd response: success
2,773,304 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,526 UART: [afmc] ++
2,774,694 UART: [afmc] CDI.KEYID = 6
2,775,056 UART: [afmc] SUBJECT.KEYID = 7
2,775,481 UART: [afmc] AUTHORITY.KEYID = 5
2,810,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,341 UART: [afmc] --
2,854,389 UART: [cold-reset] --
2,855,019 UART: [state] Locking Datavault
2,856,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,988 UART: [state] Locking ICCM
2,857,430 UART: [exit] Launching FMC @ 0x40000130
2,862,759 UART:
2,862,775 UART: Running Caliptra FMC ...
2,863,183 UART:
2,863,237 UART: [state] CFI Enabled
2,873,398 UART: [fht] FMC Alias Private Key: 7
2,981,331 UART: [art] Extend RT PCRs Done
2,981,759 UART: [art] Lock RT PCRs Done
2,983,469 UART: [art] Populate DV Done
2,991,596 UART: [fht] FMC Alias Private Key: 7
2,992,582 UART: [art] Derive CDI
2,992,862 UART: [art] Store in in slot 0x4
3,078,667 UART: [art] Derive Key Pair
3,079,027 UART: [art] Store priv key in slot 0x5
3,092,305 UART: [art] Derive Key Pair - Done
3,107,015 UART: [art] Signing Cert with AUTHO
3,107,495 UART: RITY.KEYID = 7
3,122,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,482 UART: [art] PUB.X = 6826450D2958209E185E70D2368D529C16B02FD21C9F8BA66BFE8A081745A65E3E916D50C2F8FB19DB57C3FB419D51EB
3,130,250 UART: [art] PUB.Y = 17B6B5E306C9FF5F3DEA6062B95805F3C22BB8039EC67828DA18AAF30E61F33E95C772B907B9CC391226537F9C5AEF9C
3,137,195 UART: [art] SIG.R = DD67AB06327793B2B1659F78CE2376E26BB1C3215A21409D8ADCB316314D94525D494FC9CB30457F93DCA129C8BC883E
3,143,966 UART: [art] SIG.S = 0EEAA888C046EA3FAD9CE8EBADC853CD5A50F653A98F71B838A18973597C5AAE6738C8330B0F006E8977A2E881C4A244
3,167,782 UART: Caliptra RT
3,168,036 UART: [state] CFI Enabled
3,276,064 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,117 UART: [rt]cmd =0x46505652, len=4
3,306,788 UART: [rt] FIPS Version
3,307,798 >>> mbox cmd response data (36 bytes)
3,307,799 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,986 UART: [rt]cmd =0x46504c54, len=4
3,338,224 >>> mbox cmd response data (8 bytes)
3,338,225 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,367,816 UART: [rt]cmd =0x46504c67, len=4
3,368,798 >>> mbox cmd response: failed
3,369,076 UART: [rt] FIPS self test
3,369,407 UART: [kat] ++
3,369,559 UART: [kat] sha1
3,373,842 UART: [kat] SHA2-256
3,375,772 UART: [kat] SHA2-384
3,378,397 UART: [kat] SHA2-512-ACC
3,380,292 UART: [kat] ECC-384
3,390,085 UART: [kat] HMAC-384Kdf
3,394,572 UART: [kat] LMS
3,643,463 UART: [kat] --
4,447,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,875,371 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,547 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,907,897 UART: [rt]cmd =0x46504c67, len=4
5,908,928 >>> mbox cmd response data (8 bytes)
5,908,929 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,938,444 UART: [rt]cmd =0x49444543, len=4
5,944,928 >>> mbox cmd response data (37 bytes)
5,944,929 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,208 UART: [rt]cmd =0x49444549, len=4
5,976,511 >>> mbox cmd response data (104 bytes)
5,976,512 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,867 UART: [rt]cmd =0x49444550, len=4
6,016,135 >>> mbox cmd response data (8 bytes)
6,016,136 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,433 UART: [rt]cmd =0x4c444556, len=4
6,055,880 >>> mbox cmd response data (687 bytes)
6,055,881 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,085,206 UART: [rt]cmd =0x43455246, len=4
6,097,151 >>> mbox cmd response data (887 bytes)
6,097,152 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,529 UART: [rt]cmd =0x43455252, len=4
6,137,171 >>> mbox cmd response data (783 bytes)
6,137,172 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,875 UART: [rt]cmd =0x53494756, len=196
6,173,441 >>> mbox cmd response data (8 bytes)
6,173,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,287 UART: [rt]cmd =0x4d454153, len=108
6,224,206 >>> mbox cmd response data (12 bytes)
6,224,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,416 UART: [rt]cmd =0x494e464f, len=4
6,256,840 >>> mbox cmd response data (264 bytes)
6,256,841 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,286,406 UART: [rt]cmd =0x54514754, len=24
6,288,500 >>> mbox cmd response data (8 bytes)
6,288,501 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,317,946 UART: [rt]cmd =0x47544744, len=8
6,320,520 >>> mbox cmd response data (104 bytes)
6,320,521 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,924 UART: [rt]cmd =0x50435252, len=8
6,351,306 >>> mbox cmd response data (8 bytes)
6,351,307 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,380,608 UART: [rt]cmd =0x50435251, len=36
6,547,557 >>> mbox cmd response data (1848 bytes)
6,547,558 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,577,083 UART: [rt]cmd =0x50435245, len=56
6,580,485 >>> mbox cmd response data (8 bytes)
6,580,486 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,609,891 UART: [rt]cmd =0x44504543, len=20
6,638,658 >>> mbox cmd response data (44 bytes)
6,638,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,668,248 UART: [rt]cmd =0x44504543, len=24
6,702,426 >>> mbox cmd response data (40 bytes)
6,702,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,732,248 UART: [rt]cmd =0x44504543, len=96
6,777,318 >>> mbox cmd response data (56 bytes)
6,777,319 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,807,128 UART: [rt]cmd =0x44504543, len=92
7,043,278 >>> mbox cmd response data (6284 bytes)
7,043,279 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,073,566 UART: [rt]cmd =0x44504543, len=136
7,148,097 >>> mbox cmd response data (136 bytes)
7,148,098 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,177,847 UART: [rt]cmd =0x44504543, len=40
7,211,382 >>> mbox cmd response data (40 bytes)
7,211,383 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,241,032 UART: [rt]cmd =0x44504543, len=28
7,292,079 >>> mbox cmd response data (2076 bytes)
7,292,080 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,321,479 UART: [rt]cmd =0x44504543, len=36
7,343,549 >>> mbox cmd response data (24 bytes)
7,343,550 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,373,079 UART: [rt]cmd =0x4453424c, len=4
7,386,356 >>> mbox cmd response data (8 bytes)
7,386,357 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,415,864 UART: [rt]cmd =0x46505344, len=4
7,524,500 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,635 ready_for_fw is high
1,060,635 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,993 >>> mbox cmd response: success
2,625,993 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,995 UART:
2,688,011 UART: Running Caliptra FMC ...
2,688,419 UART:
2,688,473 UART: [state] CFI Enabled
2,698,876 UART: [fht] FMC Alias Private Key: 7
2,806,523 UART: [art] Extend RT PCRs Done
2,806,951 UART: [art] Lock RT PCRs Done
2,808,569 UART: [art] Populate DV Done
2,816,480 UART: [fht] FMC Alias Private Key: 7
2,817,514 UART: [art] Derive CDI
2,817,794 UART: [art] Store in in slot 0x4
2,903,093 UART: [art] Derive Key Pair
2,903,453 UART: [art] Store priv key in slot 0x5
2,917,039 UART: [art] Derive Key Pair - Done
2,932,001 UART: [art] Signing Cert with AUTHO
2,932,481 UART: RITY.KEYID = 7
2,947,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,738 UART: [art] PUB.X = 7DC751D6D4A4BB5C8A365C9E0B71F90EE4B343F38F70369DB3A2672296BFFF464BB4CB0D9D9CD0F6FFF0DFF47FC91E9B
2,955,525 UART: [art] PUB.Y = 34C4B8CD8717D03B51B761C814E1635851D82C019584D04C88C4D3EB70AEFDA46A46F79B93751923412057D52AC3030D
2,962,462 UART: [art] SIG.R = A4C297C4C2FF914CC4CA4D6E77DF27C4E76931253601D341E1C41328BDBC5187667873FCBD506FC3753C8612FAB3F91A
2,969,237 UART: [art] SIG.S = F59C70C5E9413DBCC6F257D436B3641A37AAB7FEE218A2D7E16BC2BD47CCCB9E21149AF70C704D7BBA52DCC674C2D424
2,993,189 UART: Caliptra RT
2,993,443 UART: [state] CFI Enabled
3,101,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,503 UART: [rt]cmd =0x46505652, len=4
3,132,174 UART: [rt] FIPS Version
3,133,266 >>> mbox cmd response data (36 bytes)
3,133,267 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,550 UART: [rt]cmd =0x46504c54, len=4
3,163,850 >>> mbox cmd response data (8 bytes)
3,163,851 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,193,604 UART: [rt]cmd =0x46504c67, len=4
3,194,548 >>> mbox cmd response: failed
3,194,770 UART: [rt] FIPS self test
3,195,101 UART: [kat] ++
3,195,253 UART: [kat] sha1
3,199,424 UART: [kat] SHA2-256
3,201,354 UART: [kat] SHA2-384
3,203,931 UART: [kat] SHA2-512-ACC
3,205,826 UART: [kat] ECC-384
3,215,865 UART: [kat] HMAC-384Kdf
3,220,338 UART: [kat] LMS
3,469,229 UART: [kat] --
4,168,288 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,597,211 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,604,307 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,633,831 UART: [rt]cmd =0x46504c67, len=4
5,635,106 >>> mbox cmd response data (8 bytes)
5,635,107 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,664,424 UART: [rt]cmd =0x49444543, len=4
5,670,778 >>> mbox cmd response data (37 bytes)
5,670,779 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,700,184 UART: [rt]cmd =0x49444549, len=4
5,702,697 >>> mbox cmd response data (104 bytes)
5,702,698 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,169 UART: [rt]cmd =0x49444550, len=4
5,742,528 >>> mbox cmd response data (8 bytes)
5,742,529 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,771,846 UART: [rt]cmd =0x4c444556, len=4
5,782,131 >>> mbox cmd response data (687 bytes)
5,782,132 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,811,467 UART: [rt]cmd =0x43455246, len=4
5,823,352 >>> mbox cmd response data (887 bytes)
5,823,353 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,852,606 UART: [rt]cmd =0x43455252, len=4
5,863,525 >>> mbox cmd response data (784 bytes)
5,863,526 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,033 UART: [rt]cmd =0x53494756, len=196
5,898,895 >>> mbox cmd response data (8 bytes)
5,898,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,928,855 UART: [rt]cmd =0x4d454153, len=108
5,949,096 >>> mbox cmd response data (12 bytes)
5,949,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,560 UART: [rt]cmd =0x494e464f, len=4
5,981,776 >>> mbox cmd response data (264 bytes)
5,981,777 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,288 UART: [rt]cmd =0x54514754, len=24
6,013,526 >>> mbox cmd response data (8 bytes)
6,013,527 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,042,844 UART: [rt]cmd =0x47544744, len=8
6,045,490 >>> mbox cmd response data (104 bytes)
6,045,491 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,074,890 UART: [rt]cmd =0x50435252, len=8
6,076,414 >>> mbox cmd response data (8 bytes)
6,076,415 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,105,960 UART: [rt]cmd =0x50435251, len=36
6,273,265 >>> mbox cmd response data (1848 bytes)
6,273,266 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,302,947 UART: [rt]cmd =0x50435245, len=56
6,306,625 >>> mbox cmd response data (8 bytes)
6,306,626 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,335,927 UART: [rt]cmd =0x44504543, len=20
6,364,386 >>> mbox cmd response data (44 bytes)
6,364,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,394,042 UART: [rt]cmd =0x44504543, len=24
6,428,234 >>> mbox cmd response data (40 bytes)
6,428,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,457,968 UART: [rt]cmd =0x44504543, len=96
6,502,900 >>> mbox cmd response data (56 bytes)
6,502,901 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,532,952 UART: [rt]cmd =0x44504543, len=92
6,767,448 >>> mbox cmd response data (6284 bytes)
6,767,449 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,797,318 UART: [rt]cmd =0x44504543, len=136
6,871,179 >>> mbox cmd response data (136 bytes)
6,871,180 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,900,589 UART: [rt]cmd =0x44504543, len=40
6,934,688 >>> mbox cmd response data (40 bytes)
6,934,689 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,964,288 UART: [rt]cmd =0x44504543, len=28
7,015,387 >>> mbox cmd response data (2076 bytes)
7,015,388 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,045,251 UART: [rt]cmd =0x44504543, len=36
7,068,047 >>> mbox cmd response data (24 bytes)
7,068,048 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,097,723 UART: [rt]cmd =0x4453424c, len=4
7,111,884 >>> mbox cmd response data (8 bytes)
7,111,885 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,141,134 UART: [rt]cmd =0x46505344, len=4
7,249,588 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Unprovisioned
85,572 UART: [state] DebugLocked = No
86,110 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
893,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,162 UART: [kat] ++
897,314 UART: [kat] sha1
901,570 UART: [kat] SHA2-256
903,510 UART: [kat] SHA2-384
906,179 UART: [kat] SHA2-512-ACC
908,080 UART: [kat] ECC-384
917,687 UART: [kat] HMAC-384Kdf
922,123 UART: [kat] LMS
1,170,451 UART: [kat] --
1,171,280 UART: [cold-reset] ++
1,171,668 UART: [fht] FHT @ 0x50003400
1,174,473 UART: [idev] ++
1,174,641 UART: [idev] CDI.KEYID = 6
1,175,001 UART: [idev] SUBJECT.KEYID = 7
1,175,425 UART: [idev] UDS.KEYID = 0
1,175,770 ready_for_fw is high
1,175,770 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,184,007 UART: [idev] Erasing UDS.KEYID = 0
1,201,282 UART: [idev] Sha1 KeyId Algorithm
1,209,836 UART: [idev] --
1,210,930 UART: [ldev] ++
1,211,098 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,887 UART: [ldev] AUTHORITY.KEYID = 7
1,212,350 UART: [ldev] FE.KEYID = 1
1,217,668 UART: [ldev] Erasing FE.KEYID = 1
1,244,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,290 UART: [ldev] --
1,283,611 UART: [fwproc] Wait for Commands...
1,284,337 UART: [fwproc] Recv command 0x46574c44
1,285,065 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,776,307 >>> mbox cmd response: success
2,776,307 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,365 UART: [afmc] ++
2,777,533 UART: [afmc] CDI.KEYID = 6
2,777,895 UART: [afmc] SUBJECT.KEYID = 7
2,778,320 UART: [afmc] AUTHORITY.KEYID = 5
2,813,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,192 UART: [afmc] --
2,857,316 UART: [cold-reset] --
2,858,152 UART: [state] Locking Datavault
2,859,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,917 UART: [state] Locking ICCM
2,860,433 UART: [exit] Launching FMC @ 0x40000130
2,865,762 UART:
2,865,778 UART: Running Caliptra FMC ...
2,866,186 UART:
2,866,329 UART: [state] CFI Enabled
2,876,890 UART: [fht] FMC Alias Private Key: 7
2,985,975 UART: [art] Extend RT PCRs Done
2,986,403 UART: [art] Lock RT PCRs Done
2,987,777 UART: [art] Populate DV Done
2,995,966 UART: [fht] FMC Alias Private Key: 7
2,997,044 UART: [art] Derive CDI
2,997,324 UART: [art] Store in in slot 0x4
3,083,237 UART: [art] Derive Key Pair
3,083,597 UART: [art] Store priv key in slot 0x5
3,096,393 UART: [art] Derive Key Pair - Done
3,111,418 UART: [art] Signing Cert with AUTHO
3,111,898 UART: RITY.KEYID = 7
3,127,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,253 UART: [art] PUB.X = 09AA1218E219B8BCC896F5A206008395916A6ABF42E103E708D4E421724E5D798DF68466AF8522B38E2602E60341E72F
3,134,977 UART: [art] PUB.Y = 64D1B4617C0B4517542FA79B1CB66B19E24C0DD69D0B342FA858ECE5432F58DDA837B7A811530C7233A58C3E0539BF5C
3,141,918 UART: [art] SIG.R = E59A631D1D8F5463BAF519D655AB6BE18DA944846925AE1224014EA7DF384A456EA886D6CC6FF68E374D6C2DD30F7FA3
3,148,694 UART: [art] SIG.S = 20214D28E3A11A4877C5B67E72F6EF7EAC02B2B343B5C103E0C05846AC4B0C38A49A0051B3DD1C43717AD089E748C3FC
3,172,512 UART: Caliptra RT
3,172,858 UART: [state] CFI Enabled
3,279,934 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,021 UART: [rt]cmd =0x46505652, len=4
3,310,692 UART: [rt] FIPS Version
3,311,660 >>> mbox cmd response data (36 bytes)
3,311,661 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,038 UART: [rt]cmd =0x46504c54, len=4
3,342,006 >>> mbox cmd response data (8 bytes)
3,342,007 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,371,578 UART: [rt]cmd =0x46504c67, len=4
3,372,546 >>> mbox cmd response: failed
3,372,874 UART: [rt] FIPS self test
3,373,205 UART: [kat] ++
3,373,357 UART: [kat] sha1
3,377,772 UART: [kat] SHA2-256
3,379,702 UART: [kat] SHA2-384
3,382,543 UART: [kat] SHA2-512-ACC
3,384,438 UART: [kat] ECC-384
3,394,149 UART: [kat] HMAC-384Kdf
3,398,688 UART: [kat] LMS
3,647,579 UART: [kat] --
4,451,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,880,311 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,882,295 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,911,571 UART: [rt]cmd =0x46504c67, len=4
5,912,682 >>> mbox cmd response data (8 bytes)
5,912,683 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,942,018 UART: [rt]cmd =0x49444543, len=4
5,948,448 >>> mbox cmd response data (37 bytes)
5,948,449 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,672 UART: [rt]cmd =0x49444549, len=4
5,979,931 >>> mbox cmd response data (104 bytes)
5,979,932 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,009,463 UART: [rt]cmd =0x49444550, len=4
6,019,351 >>> mbox cmd response data (8 bytes)
6,019,352 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,048,829 UART: [rt]cmd =0x4c444556, len=4
6,059,266 >>> mbox cmd response data (687 bytes)
6,059,267 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,088,642 UART: [rt]cmd =0x43455246, len=4
6,100,709 >>> mbox cmd response data (887 bytes)
6,100,710 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,130,221 UART: [rt]cmd =0x43455252, len=4
6,141,057 >>> mbox cmd response data (783 bytes)
6,141,058 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,171,667 UART: [rt]cmd =0x53494756, len=196
6,176,727 >>> mbox cmd response data (8 bytes)
6,176,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,206,949 UART: [rt]cmd =0x4d454153, len=108
6,228,044 >>> mbox cmd response data (12 bytes)
6,228,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,257,388 UART: [rt]cmd =0x494e464f, len=4
6,260,792 >>> mbox cmd response data (264 bytes)
6,260,793 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,290,414 UART: [rt]cmd =0x54514754, len=24
6,292,374 >>> mbox cmd response data (8 bytes)
6,292,375 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,321,618 UART: [rt]cmd =0x47544744, len=8
6,324,184 >>> mbox cmd response data (104 bytes)
6,324,185 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,353,296 UART: [rt]cmd =0x50435252, len=8
6,354,448 >>> mbox cmd response data (8 bytes)
6,354,449 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,384,034 UART: [rt]cmd =0x50435251, len=36
6,551,195 >>> mbox cmd response data (1848 bytes)
6,551,196 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,901 UART: [rt]cmd =0x50435245, len=56
6,584,681 >>> mbox cmd response data (8 bytes)
6,584,682 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,614,155 UART: [rt]cmd =0x44504543, len=20
6,642,764 >>> mbox cmd response data (44 bytes)
6,642,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,672,310 UART: [rt]cmd =0x44504543, len=24
6,706,582 >>> mbox cmd response data (40 bytes)
6,706,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,736,692 UART: [rt]cmd =0x44504543, len=96
6,781,294 >>> mbox cmd response data (56 bytes)
6,781,295 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,811,418 UART: [rt]cmd =0x44504543, len=92
7,047,792 >>> mbox cmd response data (6284 bytes)
7,047,793 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,078,050 UART: [rt]cmd =0x44504543, len=136
7,152,695 >>> mbox cmd response data (136 bytes)
7,152,696 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,182,397 UART: [rt]cmd =0x44504543, len=40
7,216,226 >>> mbox cmd response data (40 bytes)
7,216,227 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,245,780 UART: [rt]cmd =0x44504543, len=28
7,296,977 >>> mbox cmd response data (2076 bytes)
7,296,978 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,326,397 UART: [rt]cmd =0x44504543, len=36
7,348,779 >>> mbox cmd response data (24 bytes)
7,348,780 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,378,161 UART: [rt]cmd =0x4453424c, len=4
7,391,592 >>> mbox cmd response data (8 bytes)
7,391,593 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,420,962 UART: [rt]cmd =0x46505344, len=4
7,529,454 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,164 >>> mbox cmd response: success
2,626,164 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,448 UART:
2,687,464 UART: Running Caliptra FMC ...
2,687,872 UART:
2,688,015 UART: [state] CFI Enabled
2,698,834 UART: [fht] FMC Alias Private Key: 7
2,807,045 UART: [art] Extend RT PCRs Done
2,807,473 UART: [art] Lock RT PCRs Done
2,809,001 UART: [art] Populate DV Done
2,817,120 UART: [fht] FMC Alias Private Key: 7
2,818,178 UART: [art] Derive CDI
2,818,458 UART: [art] Store in in slot 0x4
2,903,953 UART: [art] Derive Key Pair
2,904,313 UART: [art] Store priv key in slot 0x5
2,917,565 UART: [art] Derive Key Pair - Done
2,932,682 UART: [art] Signing Cert with AUTHO
2,933,162 UART: RITY.KEYID = 7
2,948,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,235 UART: [art] PUB.X = B6CB6ACEE36DA99729987BFF2C7E4149BD89AC0DD4AD09FED13BEE6D8ABD4BC38AA8512800E5741A0F9B3CDEAF2B7E73
2,956,006 UART: [art] PUB.Y = 4D9E28E883191CE74CA6C267E94F5E96D8A76F7A1E890003754FD64F530552EEF02A55EB9AD514C3CE1C5921E0529DBF
2,962,936 UART: [art] SIG.R = 84475B917026662E93D99801C2AEC995CD3A232A8795694A3CE40D18D8375F0A79D2D72D99491D39CF681EC132594ACA
2,969,693 UART: [art] SIG.S = E7B8F1F7A312904D1098DAB3E3AE33551096085BC05F32E2BF8B9B5B320E6A7D8A07BA7F6D4C4D42A797363BA496A7E4
2,993,421 UART: Caliptra RT
2,993,767 UART: [state] CFI Enabled
3,102,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,225 UART: [rt]cmd =0x46505652, len=4
3,132,896 UART: [rt] FIPS Version
3,134,052 >>> mbox cmd response data (36 bytes)
3,134,053 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,568 UART: [rt]cmd =0x46504c54, len=4
3,164,772 >>> mbox cmd response data (8 bytes)
3,164,773 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,194,278 UART: [rt]cmd =0x46504c67, len=4
3,195,358 >>> mbox cmd response: failed
3,195,488 UART: [rt] FIPS self test
3,195,819 UART: [kat] ++
3,195,971 UART: [kat] sha1
3,200,202 UART: [kat] SHA2-256
3,202,132 UART: [kat] SHA2-384
3,204,861 UART: [kat] SHA2-512-ACC
3,206,756 UART: [kat] ECC-384
3,216,371 UART: [kat] HMAC-384Kdf
3,221,020 UART: [kat] LMS
3,469,911 UART: [kat] --
4,169,020 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,598,401 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,605,117 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,634,417 UART: [rt]cmd =0x46504c67, len=4
5,635,454 >>> mbox cmd response data (8 bytes)
5,635,455 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,664,860 UART: [rt]cmd =0x49444543, len=4
5,671,286 >>> mbox cmd response data (37 bytes)
5,671,287 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,700,790 UART: [rt]cmd =0x49444549, len=4
5,703,097 >>> mbox cmd response data (104 bytes)
5,703,098 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,303 UART: [rt]cmd =0x49444550, len=4
5,742,372 >>> mbox cmd response data (8 bytes)
5,742,373 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,771,916 UART: [rt]cmd =0x4c444556, len=4
5,782,577 >>> mbox cmd response data (687 bytes)
5,782,578 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,811,791 UART: [rt]cmd =0x43455246, len=4
5,824,014 >>> mbox cmd response data (887 bytes)
5,824,015 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,326 UART: [rt]cmd =0x43455252, len=4
5,864,335 >>> mbox cmd response data (784 bytes)
5,864,336 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,895,025 UART: [rt]cmd =0x53494756, len=196
5,900,247 >>> mbox cmd response data (8 bytes)
5,900,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,930,107 UART: [rt]cmd =0x4d454153, len=108
5,950,278 >>> mbox cmd response data (12 bytes)
5,950,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,979,652 UART: [rt]cmd =0x494e464f, len=4
5,983,174 >>> mbox cmd response data (264 bytes)
5,983,175 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,742 UART: [rt]cmd =0x54514754, len=24
6,014,710 >>> mbox cmd response data (8 bytes)
6,014,711 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,050 UART: [rt]cmd =0x47544744, len=8
6,046,464 >>> mbox cmd response data (104 bytes)
6,046,465 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,075,928 UART: [rt]cmd =0x50435252, len=8
6,077,472 >>> mbox cmd response data (8 bytes)
6,077,473 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,106,930 UART: [rt]cmd =0x50435251, len=36
6,274,631 >>> mbox cmd response data (1848 bytes)
6,274,632 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,304,129 UART: [rt]cmd =0x50435245, len=56
6,307,579 >>> mbox cmd response data (8 bytes)
6,307,580 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,337,263 UART: [rt]cmd =0x44504543, len=20
6,365,900 >>> mbox cmd response data (44 bytes)
6,365,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,395,498 UART: [rt]cmd =0x44504543, len=24
6,429,672 >>> mbox cmd response data (40 bytes)
6,429,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,459,588 UART: [rt]cmd =0x44504543, len=96
6,505,150 >>> mbox cmd response data (56 bytes)
6,505,151 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,535,154 UART: [rt]cmd =0x44504543, len=92
6,770,706 >>> mbox cmd response data (6284 bytes)
6,770,707 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,800,746 UART: [rt]cmd =0x44504543, len=136
6,875,131 >>> mbox cmd response data (136 bytes)
6,875,132 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,904,979 UART: [rt]cmd =0x44504543, len=40
6,938,752 >>> mbox cmd response data (40 bytes)
6,938,753 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,968,156 UART: [rt]cmd =0x44504543, len=28
7,019,313 >>> mbox cmd response data (2076 bytes)
7,019,314 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,049,129 UART: [rt]cmd =0x44504543, len=36
7,071,351 >>> mbox cmd response data (24 bytes)
7,071,352 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,715 UART: [rt]cmd =0x4453424c, len=4
7,114,570 >>> mbox cmd response data (8 bytes)
7,114,571 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,143,810 UART: [rt]cmd =0x46505344, len=4
7,252,104 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,281 UART: [idev] ++
1,173,449 UART: [idev] CDI.KEYID = 6
1,173,810 UART: [idev] SUBJECT.KEYID = 7
1,174,235 UART: [idev] UDS.KEYID = 0
1,174,581 ready_for_fw is high
1,174,581 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,961 UART: [idev] Sha1 KeyId Algorithm
1,207,833 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,956 UART: [fwproc] Wait for Commands...
1,281,593 UART: [fwproc] Recv command 0x46574c44
1,282,326 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,770,642 >>> mbox cmd response: success
2,770,642 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,669 UART: [afmc] ++
2,771,837 UART: [afmc] CDI.KEYID = 6
2,772,200 UART: [afmc] SUBJECT.KEYID = 7
2,772,626 UART: [afmc] AUTHORITY.KEYID = 5
2,808,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,602 UART: [afmc] --
2,851,524 UART: [cold-reset] --
2,852,532 UART: [state] Locking Datavault
2,853,637 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,241 UART: [state] Locking ICCM
2,854,897 UART: [exit] Launching FMC @ 0x40000130
2,860,226 UART:
2,860,242 UART: Running Caliptra FMC ...
2,860,650 UART:
2,860,704 UART: [state] CFI Enabled
2,870,909 UART: [fht] FMC Alias Private Key: 7
2,978,840 UART: [art] Extend RT PCRs Done
2,979,268 UART: [art] Lock RT PCRs Done
2,980,830 UART: [art] Populate DV Done
2,988,701 UART: [fht] FMC Alias Private Key: 7
2,989,871 UART: [art] Derive CDI
2,990,151 UART: [art] Store in in slot 0x4
3,076,062 UART: [art] Derive Key Pair
3,076,422 UART: [art] Store priv key in slot 0x5
3,089,182 UART: [art] Derive Key Pair - Done
3,103,863 UART: [art] Signing Cert with AUTHO
3,104,343 UART: RITY.KEYID = 7
3,119,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,038 UART: [art] PUB.X = D22D1271E9B6952A6D25366C63BFB3374E0ABC2CED380F3DF966E4836008248F78264AD6BA4E253987309FC04D01F1EE
3,126,800 UART: [art] PUB.Y = FDD843CD9B01D42431C6CF6E5D4D5339D516A55BD8025BDF8C70C5DFD88A90630016C56F87E000CFEB6D4FEDF69886C9
3,133,716 UART: [art] SIG.R = AC09CB5F7B00C8DA80BA0882816C5EB9F1846911460AF6C94EFB4B039E98FE3F3AE5C09E6A379F10637CFA524ABB8C4C
3,140,470 UART: [art] SIG.S = A92651FB828669E0723E660BDF56E34AED38E94A1D5FD229B61A257BD52F57624EADE101C5840E106954FD845F0478D4
3,164,259 UART: Caliptra RT
3,164,513 UART: [state] CFI Enabled
3,273,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,875 UART: [rt]cmd =0x46505652, len=4
3,304,546 UART: [rt] FIPS Version
3,305,582 >>> mbox cmd response data (36 bytes)
3,305,583 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,686 UART: [rt]cmd =0x46504c54, len=4
3,335,734 >>> mbox cmd response data (8 bytes)
3,335,735 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,365,622 UART: [rt]cmd =0x46504c67, len=4
3,366,624 >>> mbox cmd response: failed
3,366,850 UART: [rt] FIPS self test
3,367,181 UART: [kat] ++
3,367,333 UART: [kat] sha1
3,371,480 UART: [kat] SHA2-256
3,373,410 UART: [kat] SHA2-384
3,376,319 UART: [kat] SHA2-512-ACC
3,378,214 UART: [kat] ECC-384
3,387,855 UART: [kat] HMAC-384Kdf
3,392,360 UART: [kat] LMS
3,641,251 UART: [kat] --
4,443,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,871,289 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,876,373 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,905,777 UART: [rt]cmd =0x46504c67, len=4
5,907,034 >>> mbox cmd response data (8 bytes)
5,907,035 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,936,318 UART: [rt]cmd =0x49444543, len=4
5,942,940 >>> mbox cmd response data (37 bytes)
5,942,941 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,972,344 UART: [rt]cmd =0x49444549, len=4
5,974,841 >>> mbox cmd response data (104 bytes)
5,974,842 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,993 UART: [rt]cmd =0x49444550, len=4
6,014,096 >>> mbox cmd response data (8 bytes)
6,014,097 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,043,582 UART: [rt]cmd =0x4c444556, len=4
6,053,871 >>> mbox cmd response data (687 bytes)
6,053,872 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,083,167 UART: [rt]cmd =0x43455246, len=4
6,095,082 >>> mbox cmd response data (887 bytes)
6,095,083 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,124,564 UART: [rt]cmd =0x43455252, len=4
6,135,235 >>> mbox cmd response data (784 bytes)
6,135,236 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,825 UART: [rt]cmd =0x53494756, len=196
6,171,095 >>> mbox cmd response data (8 bytes)
6,171,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,200,913 UART: [rt]cmd =0x4d454153, len=108
6,221,826 >>> mbox cmd response data (12 bytes)
6,221,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,251,178 UART: [rt]cmd =0x494e464f, len=4
6,254,578 >>> mbox cmd response data (264 bytes)
6,254,579 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,284,106 UART: [rt]cmd =0x54514754, len=24
6,286,136 >>> mbox cmd response data (8 bytes)
6,286,137 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,315,496 UART: [rt]cmd =0x47544744, len=8
6,318,138 >>> mbox cmd response data (104 bytes)
6,318,139 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,347,592 UART: [rt]cmd =0x50435252, len=8
6,349,054 >>> mbox cmd response data (8 bytes)
6,349,055 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,378,556 UART: [rt]cmd =0x50435251, len=36
6,545,699 >>> mbox cmd response data (1848 bytes)
6,545,700 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,575,665 UART: [rt]cmd =0x50435245, len=56
6,579,373 >>> mbox cmd response data (8 bytes)
6,579,374 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,608,839 UART: [rt]cmd =0x44504543, len=20
6,637,516 >>> mbox cmd response data (44 bytes)
6,637,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,666,966 UART: [rt]cmd =0x44504543, len=24
6,701,030 >>> mbox cmd response data (40 bytes)
6,701,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,730,828 UART: [rt]cmd =0x44504543, len=96
6,776,236 >>> mbox cmd response data (56 bytes)
6,776,237 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,806,302 UART: [rt]cmd =0x44504543, len=92
7,041,819 >>> mbox cmd response data (6284 bytes)
7,041,820 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,071,875 UART: [rt]cmd =0x44504543, len=136
7,145,876 >>> mbox cmd response data (136 bytes)
7,145,877 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,175,458 UART: [rt]cmd =0x44504543, len=40
7,209,407 >>> mbox cmd response data (40 bytes)
7,209,408 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,238,981 UART: [rt]cmd =0x44504543, len=28
7,290,060 >>> mbox cmd response data (2076 bytes)
7,290,061 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,319,584 UART: [rt]cmd =0x44504543, len=36
7,341,820 >>> mbox cmd response data (24 bytes)
7,341,821 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,942 UART: [rt]cmd =0x4453424c, len=4
7,385,051 >>> mbox cmd response data (8 bytes)
7,385,052 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,414,185 UART: [rt]cmd =0x46505344, len=4
7,522,603 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,478 ready_for_fw is high
1,056,478 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,450 >>> mbox cmd response: success
2,622,450 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,128 UART:
2,685,144 UART: Running Caliptra FMC ...
2,685,552 UART:
2,685,606 UART: [state] CFI Enabled
2,695,917 UART: [fht] FMC Alias Private Key: 7
2,803,866 UART: [art] Extend RT PCRs Done
2,804,294 UART: [art] Lock RT PCRs Done
2,806,006 UART: [art] Populate DV Done
2,814,239 UART: [fht] FMC Alias Private Key: 7
2,815,179 UART: [art] Derive CDI
2,815,459 UART: [art] Store in in slot 0x4
2,901,084 UART: [art] Derive Key Pair
2,901,444 UART: [art] Store priv key in slot 0x5
2,914,492 UART: [art] Derive Key Pair - Done
2,929,077 UART: [art] Signing Cert with AUTHO
2,929,557 UART: RITY.KEYID = 7
2,944,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,430 UART: [art] PUB.X = 758261ACF7A0AC5B98CB18F1755B59F43CDB5A88C96B050FE91DB483DA31201BF89190AF373CFB4393DD078928BA7986
2,952,199 UART: [art] PUB.Y = 0B0D1F94C30A47CB2A1A48A0E010FEB7E22082AE97596A1372B9DE38C70E6383D8EAA2A5BC99EAF7EBB804E6ABE1BB86
2,959,156 UART: [art] SIG.R = 97AB4BA5A5DD792ED7F01D0CEF0EAFE92DF2DFB633ED5DCAA3935AEFDBFD7FFA41C2D45EE5F583C06CA59C8FB717CE7B
2,965,964 UART: [art] SIG.S = F8624232168BCCE56F8E2FEACF26AC6340878891C3F961F3908EC0225BFDB664B45525E798196505AB385DC5501562B8
2,989,882 UART: Caliptra RT
2,990,136 UART: [state] CFI Enabled
3,098,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,376 UART: [rt]cmd =0x46505652, len=4
3,129,047 UART: [rt] FIPS Version
3,130,211 >>> mbox cmd response data (36 bytes)
3,130,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,427 UART: [rt]cmd =0x46504c54, len=4
3,160,399 >>> mbox cmd response data (8 bytes)
3,160,400 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,190,253 UART: [rt]cmd =0x46504c67, len=4
3,191,299 >>> mbox cmd response: failed
3,191,517 UART: [rt] FIPS self test
3,191,848 UART: [kat] ++
3,192,000 UART: [kat] sha1
3,196,351 UART: [kat] SHA2-256
3,198,281 UART: [kat] SHA2-384
3,201,014 UART: [kat] SHA2-512-ACC
3,202,909 UART: [kat] ECC-384
3,212,434 UART: [kat] HMAC-384Kdf
3,216,951 UART: [kat] LMS
3,465,842 UART: [kat] --
4,160,619 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,588,034 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,591,059 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,620,313 UART: [rt]cmd =0x46504c67, len=4
5,621,524 >>> mbox cmd response data (8 bytes)
5,621,525 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,650,772 UART: [rt]cmd =0x49444543, len=4
5,657,248 >>> mbox cmd response data (37 bytes)
5,657,249 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,480 UART: [rt]cmd =0x49444549, len=4
5,688,671 >>> mbox cmd response data (104 bytes)
5,688,672 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,718,011 UART: [rt]cmd =0x49444550, len=4
5,728,154 >>> mbox cmd response data (8 bytes)
5,728,155 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,450 UART: [rt]cmd =0x4c444556, len=4
5,768,065 >>> mbox cmd response data (687 bytes)
5,768,066 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,797,367 UART: [rt]cmd =0x43455246, len=4
5,809,348 >>> mbox cmd response data (887 bytes)
5,809,349 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,758 UART: [rt]cmd =0x43455252, len=4
5,849,467 >>> mbox cmd response data (784 bytes)
5,849,468 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,880,303 UART: [rt]cmd =0x53494756, len=196
5,885,823 >>> mbox cmd response data (8 bytes)
5,885,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,059 UART: [rt]cmd =0x4d454153, len=108
5,936,436 >>> mbox cmd response data (12 bytes)
5,936,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,965,866 UART: [rt]cmd =0x494e464f, len=4
5,969,224 >>> mbox cmd response data (264 bytes)
5,969,225 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,696 UART: [rt]cmd =0x54514754, len=24
6,000,920 >>> mbox cmd response data (8 bytes)
6,000,921 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,030,212 UART: [rt]cmd =0x47544744, len=8
6,032,688 >>> mbox cmd response data (104 bytes)
6,032,689 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,160 UART: [rt]cmd =0x50435252, len=8
6,063,656 >>> mbox cmd response data (8 bytes)
6,063,657 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,092,906 UART: [rt]cmd =0x50435251, len=36
6,260,411 >>> mbox cmd response data (1848 bytes)
6,260,412 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,290,103 UART: [rt]cmd =0x50435245, len=56
6,293,855 >>> mbox cmd response data (8 bytes)
6,293,856 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,323,345 UART: [rt]cmd =0x44504543, len=20
6,351,802 >>> mbox cmd response data (44 bytes)
6,351,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,362 UART: [rt]cmd =0x44504543, len=24
6,415,552 >>> mbox cmd response data (40 bytes)
6,415,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,445,532 UART: [rt]cmd =0x44504543, len=96
6,490,474 >>> mbox cmd response data (56 bytes)
6,490,475 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,520,642 UART: [rt]cmd =0x44504543, len=92
6,756,628 >>> mbox cmd response data (6284 bytes)
6,756,629 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,786,818 UART: [rt]cmd =0x44504543, len=136
6,862,117 >>> mbox cmd response data (136 bytes)
6,862,118 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,891,817 UART: [rt]cmd =0x44504543, len=40
6,925,676 >>> mbox cmd response data (40 bytes)
6,925,677 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,955,106 UART: [rt]cmd =0x44504543, len=28
7,006,277 >>> mbox cmd response data (2076 bytes)
7,006,278 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,035,867 UART: [rt]cmd =0x44504543, len=36
7,058,153 >>> mbox cmd response data (24 bytes)
7,058,154 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,559 UART: [rt]cmd =0x4453424c, len=4
7,101,398 >>> mbox cmd response data (8 bytes)
7,101,399 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,130,760 UART: [rt]cmd =0x46505344, len=4
7,239,220 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,936 UART: [kat] ++
896,088 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,503 UART: [kat] LMS
1,169,815 UART: [kat] --
1,171,020 UART: [cold-reset] ++
1,171,596 UART: [fht] FHT @ 0x50003400
1,174,420 UART: [idev] ++
1,174,588 UART: [idev] CDI.KEYID = 6
1,174,949 UART: [idev] SUBJECT.KEYID = 7
1,175,374 UART: [idev] UDS.KEYID = 0
1,175,720 ready_for_fw is high
1,175,720 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,298 UART: [idev] Erasing UDS.KEYID = 0
1,200,872 UART: [idev] Sha1 KeyId Algorithm
1,209,702 UART: [idev] --
1,210,863 UART: [ldev] ++
1,211,031 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,847 UART: [ldev] --
1,283,249 UART: [fwproc] Wait for Commands...
1,283,966 UART: [fwproc] Recv command 0x46574c44
1,284,699 UART: [fwproc] Recv'd Img size: 114360 bytes
2,582,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,675 >>> mbox cmd response: success
2,774,675 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,876 UART: [afmc] ++
2,776,044 UART: [afmc] CDI.KEYID = 6
2,776,407 UART: [afmc] SUBJECT.KEYID = 7
2,776,833 UART: [afmc] AUTHORITY.KEYID = 5
2,812,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,821 UART: [afmc] --
2,855,947 UART: [cold-reset] --
2,856,601 UART: [state] Locking Datavault
2,857,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,264 UART: [state] Locking ICCM
2,858,718 UART: [exit] Launching FMC @ 0x40000130
2,864,047 UART:
2,864,063 UART: Running Caliptra FMC ...
2,864,471 UART:
2,864,614 UART: [state] CFI Enabled
2,875,359 UART: [fht] FMC Alias Private Key: 7
2,983,392 UART: [art] Extend RT PCRs Done
2,983,820 UART: [art] Lock RT PCRs Done
2,985,256 UART: [art] Populate DV Done
2,993,327 UART: [fht] FMC Alias Private Key: 7
2,994,443 UART: [art] Derive CDI
2,994,723 UART: [art] Store in in slot 0x4
3,080,694 UART: [art] Derive Key Pair
3,081,054 UART: [art] Store priv key in slot 0x5
3,094,214 UART: [art] Derive Key Pair - Done
3,108,937 UART: [art] Signing Cert with AUTHO
3,109,417 UART: RITY.KEYID = 7
3,125,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,884 UART: [art] PUB.X = 5253CEC8C29561348784E6B8F1DC33F106CBCA954586D0FFC58C52715BE3FE49F98E380D0EB9BF958440B8352CBA5501
3,132,648 UART: [art] PUB.Y = B9A9B7B3AC88D7204BA69EF43036BBE0205267BC2EB9BA1138F15D090D0A6DCA1DD03F676033245E21AAFCF7A47AD200
3,139,583 UART: [art] SIG.R = C1CBE74F1265D041AC07AD7C3EEE5708D49FD398A8291B04B24724B4E4736E279E5A5C67B46698153116663481DBCA75
3,146,344 UART: [art] SIG.S = D1DF72E98BD519237212E1F041A9F141B98A6724E1FE5BAD6B885B0E34C342BBCAA6DDCBFC16B90D34D2195327A38010
3,170,189 UART: Caliptra RT
3,170,535 UART: [state] CFI Enabled
3,278,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,341 UART: [rt]cmd =0x46505652, len=4
3,309,012 UART: [rt] FIPS Version
3,309,888 >>> mbox cmd response data (36 bytes)
3,309,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,142 UART: [rt]cmd =0x46504c54, len=4
3,340,512 >>> mbox cmd response data (8 bytes)
3,340,513 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,370,448 UART: [rt]cmd =0x46504c67, len=4
3,371,336 >>> mbox cmd response: failed
3,371,610 UART: [rt] FIPS self test
3,371,941 UART: [kat] ++
3,372,093 UART: [kat] sha1
3,376,204 UART: [kat] SHA2-256
3,378,134 UART: [kat] SHA2-384
3,380,855 UART: [kat] SHA2-512-ACC
3,382,750 UART: [kat] ECC-384
3,392,533 UART: [kat] HMAC-384Kdf
3,397,114 UART: [kat] LMS
3,646,005 UART: [kat] --
4,447,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,877,187 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,085 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,910,497 UART: [rt]cmd =0x46504c67, len=4
5,911,526 >>> mbox cmd response data (8 bytes)
5,911,527 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,888 UART: [rt]cmd =0x49444543, len=4
5,947,240 >>> mbox cmd response data (37 bytes)
5,947,241 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,552 UART: [rt]cmd =0x49444549, len=4
5,978,969 >>> mbox cmd response data (104 bytes)
5,978,970 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,269 UART: [rt]cmd =0x49444550, len=4
6,018,416 >>> mbox cmd response data (8 bytes)
6,018,417 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,748 UART: [rt]cmd =0x4c444556, len=4
6,058,187 >>> mbox cmd response data (687 bytes)
6,058,188 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,479 UART: [rt]cmd =0x43455246, len=4
6,099,360 >>> mbox cmd response data (887 bytes)
6,099,361 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,720 UART: [rt]cmd =0x43455252, len=4
6,139,707 >>> mbox cmd response data (784 bytes)
6,139,708 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,045 UART: [rt]cmd =0x53494756, len=196
6,175,123 >>> mbox cmd response data (8 bytes)
6,175,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,205 UART: [rt]cmd =0x4d454153, len=108
6,225,886 >>> mbox cmd response data (12 bytes)
6,225,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,255,192 UART: [rt]cmd =0x494e464f, len=4
6,258,340 >>> mbox cmd response data (264 bytes)
6,258,341 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,288,076 UART: [rt]cmd =0x54514754, len=24
6,290,016 >>> mbox cmd response data (8 bytes)
6,290,017 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,319,384 UART: [rt]cmd =0x47544744, len=8
6,322,030 >>> mbox cmd response data (104 bytes)
6,322,031 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,351,320 UART: [rt]cmd =0x50435252, len=8
6,352,972 >>> mbox cmd response data (8 bytes)
6,352,973 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,368 UART: [rt]cmd =0x50435251, len=36
6,549,931 >>> mbox cmd response data (1848 bytes)
6,549,932 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,579,553 UART: [rt]cmd =0x50435245, len=56
6,582,945 >>> mbox cmd response data (8 bytes)
6,582,946 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,435 UART: [rt]cmd =0x44504543, len=20
6,641,328 >>> mbox cmd response data (44 bytes)
6,641,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,670,780 UART: [rt]cmd =0x44504543, len=24
6,705,250 >>> mbox cmd response data (40 bytes)
6,705,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,735,098 UART: [rt]cmd =0x44504543, len=96
6,779,672 >>> mbox cmd response data (56 bytes)
6,779,673 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,809,726 UART: [rt]cmd =0x44504543, len=92
7,046,354 >>> mbox cmd response data (6284 bytes)
7,046,355 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,076,388 UART: [rt]cmd =0x44504543, len=136
7,151,703 >>> mbox cmd response data (136 bytes)
7,151,704 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,181,277 UART: [rt]cmd =0x44504543, len=40
7,215,504 >>> mbox cmd response data (40 bytes)
7,215,505 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,245,050 UART: [rt]cmd =0x44504543, len=28
7,295,785 >>> mbox cmd response data (2076 bytes)
7,295,786 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,325,395 UART: [rt]cmd =0x44504543, len=36
7,347,379 >>> mbox cmd response data (24 bytes)
7,347,380 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,376,509 UART: [rt]cmd =0x4453424c, len=4
7,390,830 >>> mbox cmd response data (8 bytes)
7,390,831 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,420,230 UART: [rt]cmd =0x46505344, len=4
7,528,908 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,501 ready_for_fw is high
1,056,501 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,620,495 >>> mbox cmd response: success
2,620,495 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,283 UART:
2,682,299 UART: Running Caliptra FMC ...
2,682,707 UART:
2,682,850 UART: [state] CFI Enabled
2,693,571 UART: [fht] FMC Alias Private Key: 7
2,801,500 UART: [art] Extend RT PCRs Done
2,801,928 UART: [art] Lock RT PCRs Done
2,803,446 UART: [art] Populate DV Done
2,811,659 UART: [fht] FMC Alias Private Key: 7
2,812,779 UART: [art] Derive CDI
2,813,059 UART: [art] Store in in slot 0x4
2,898,664 UART: [art] Derive Key Pair
2,899,024 UART: [art] Store priv key in slot 0x5
2,912,542 UART: [art] Derive Key Pair - Done
2,927,471 UART: [art] Signing Cert with AUTHO
2,927,951 UART: RITY.KEYID = 7
2,943,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,202 UART: [art] PUB.X = 61CCA13CAABEC9E98FDACF045683BB5ACBC54BC31D1AB8026C4F26016F097B311246D1D7087E43FEC60D24CFED6D0881
2,950,973 UART: [art] PUB.Y = 420FEFF55D2E13AFBA3FD78F2E87359F4691251C5A55C2D3E46D70F54F521C410192E6033D093AAD1D640B0763C90AB1
2,957,908 UART: [art] SIG.R = D371A01AC53CB900CF45DAF9492E7DCA68DE2D5FB910EB5786694F73630D07D3AC9D42075DEA6AE875498442A64BC422
2,964,657 UART: [art] SIG.S = 8D1E628EC455010E702BE17634C934D9CB5904F766DF8266F0F9CB859A2D7276260448831A0704BF733976638326BBF4
2,988,050 UART: Caliptra RT
2,988,396 UART: [state] CFI Enabled
3,096,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,768 UART: [rt]cmd =0x46505652, len=4
3,127,439 UART: [rt] FIPS Version
3,128,449 >>> mbox cmd response data (36 bytes)
3,128,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,889 UART: [rt]cmd =0x46504c54, len=4
3,159,089 >>> mbox cmd response data (8 bytes)
3,159,090 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,188,531 UART: [rt]cmd =0x46504c67, len=4
3,189,679 >>> mbox cmd response: failed
3,189,965 UART: [rt] FIPS self test
3,190,296 UART: [kat] ++
3,190,448 UART: [kat] sha1
3,194,865 UART: [kat] SHA2-256
3,196,795 UART: [kat] SHA2-384
3,199,484 UART: [kat] SHA2-512-ACC
3,201,379 UART: [kat] ECC-384
3,211,476 UART: [kat] HMAC-384Kdf
3,216,047 UART: [kat] LMS
3,464,938 UART: [kat] --
4,159,901 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,588,296 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,439 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,618,699 UART: [rt]cmd =0x46504c67, len=4
5,619,984 >>> mbox cmd response data (8 bytes)
5,619,985 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,454 UART: [rt]cmd =0x49444543, len=4
5,655,944 >>> mbox cmd response data (37 bytes)
5,655,945 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,468 UART: [rt]cmd =0x49444549, len=4
5,687,871 >>> mbox cmd response data (104 bytes)
5,687,872 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,717,269 UART: [rt]cmd =0x49444550, len=4
5,727,550 >>> mbox cmd response data (8 bytes)
5,727,551 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,912 UART: [rt]cmd =0x4c444556, len=4
5,767,231 >>> mbox cmd response data (687 bytes)
5,767,232 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,796,489 UART: [rt]cmd =0x43455246, len=4
5,808,598 >>> mbox cmd response data (887 bytes)
5,808,599 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,870 UART: [rt]cmd =0x43455252, len=4
5,848,753 >>> mbox cmd response data (784 bytes)
5,848,754 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,441 UART: [rt]cmd =0x53494756, len=196
5,884,781 >>> mbox cmd response data (8 bytes)
5,884,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,914,911 UART: [rt]cmd =0x4d454153, len=108
5,935,538 >>> mbox cmd response data (12 bytes)
5,935,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,964,978 UART: [rt]cmd =0x494e464f, len=4
5,968,234 >>> mbox cmd response data (264 bytes)
5,968,235 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,706 UART: [rt]cmd =0x54514754, len=24
5,999,822 >>> mbox cmd response data (8 bytes)
5,999,823 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,029,446 UART: [rt]cmd =0x47544744, len=8
6,031,856 >>> mbox cmd response data (104 bytes)
6,031,857 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,061,284 UART: [rt]cmd =0x50435252, len=8
6,062,854 >>> mbox cmd response data (8 bytes)
6,062,855 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,092,518 UART: [rt]cmd =0x50435251, len=36
6,259,955 >>> mbox cmd response data (1848 bytes)
6,259,956 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,289,757 UART: [rt]cmd =0x50435245, len=56
6,293,605 >>> mbox cmd response data (8 bytes)
6,293,606 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,323,107 UART: [rt]cmd =0x44504543, len=20
6,351,718 >>> mbox cmd response data (44 bytes)
6,351,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,040 UART: [rt]cmd =0x44504543, len=24
6,415,176 >>> mbox cmd response data (40 bytes)
6,415,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,444,992 UART: [rt]cmd =0x44504543, len=96
6,489,618 >>> mbox cmd response data (56 bytes)
6,489,619 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,519,596 UART: [rt]cmd =0x44504543, len=92
6,756,145 >>> mbox cmd response data (6284 bytes)
6,756,146 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,786,277 UART: [rt]cmd =0x44504543, len=136
6,861,554 >>> mbox cmd response data (136 bytes)
6,861,555 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,891,084 UART: [rt]cmd =0x44504543, len=40
6,924,825 >>> mbox cmd response data (40 bytes)
6,924,826 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,954,377 UART: [rt]cmd =0x44504543, len=28
7,005,276 >>> mbox cmd response data (2076 bytes)
7,005,277 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,034,802 UART: [rt]cmd =0x44504543, len=36
7,057,184 >>> mbox cmd response data (24 bytes)
7,057,185 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,688 UART: [rt]cmd =0x4453424c, len=4
7,100,903 >>> mbox cmd response data (8 bytes)
7,100,904 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,130,299 UART: [rt]cmd =0x46505344, len=4
7,238,573 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,152 UART:
192,505 UART: Running Caliptra ROM ...
193,666 UART:
193,815 UART: [state] CFI Enabled
264,803 UART: [state] LifecycleState = Unprovisioned
266,792 UART: [state] DebugLocked = No
268,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,968 UART: [kat] SHA2-256
442,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,172 UART: [kat] ++
453,659 UART: [kat] sha1
464,038 UART: [kat] SHA2-256
466,707 UART: [kat] SHA2-384
472,154 UART: [kat] SHA2-512-ACC
474,548 UART: [kat] ECC-384
2,766,423 UART: [kat] HMAC-384Kdf
2,797,486 UART: [kat] LMS
3,987,786 UART: [kat] --
3,992,017 UART: [cold-reset] ++
3,993,741 UART: [fht] Storing FHT @ 0x50003400
4,005,568 UART: [idev] ++
4,006,152 UART: [idev] CDI.KEYID = 6
4,007,041 UART: [idev] SUBJECT.KEYID = 7
4,008,314 UART: [idev] UDS.KEYID = 0
4,009,408 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,033,056 UART: [idev] Erasing UDS.KEYID = 0
7,345,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,268 UART: [idev] --
7,369,888 UART: [ldev] ++
7,370,458 UART: [ldev] CDI.KEYID = 6
7,371,433 UART: [ldev] SUBJECT.KEYID = 5
7,372,646 UART: [ldev] AUTHORITY.KEYID = 7
7,373,879 UART: [ldev] FE.KEYID = 1
7,420,056 UART: [ldev] Erasing FE.KEYID = 1
10,757,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,282 UART: [ldev] --
13,134,692 UART: [fwproc] Waiting for Commands...
13,136,900 UART: [fwproc] Received command 0x46504c54
13,139,413 UART: [kat] SHA2-256
13,309,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,319,412 UART: [kat] ++
13,319,897 UART: [kat] sha1
13,330,944 UART: [kat] SHA2-256
13,333,635 UART: [kat] SHA2-384
13,338,917 UART: [kat] SHA2-512-ACC
13,341,299 UART: [kat] ECC-384
15,628,627 UART: [kat] HMAC-384Kdf
15,660,670 UART: [kat] LMS
16,850,151 UART: [kat] --
16,850,877 >>> mbox cmd response data (8 bytes)
16,851,314 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,851,862 UART: [fwproc] Received command 0x46504c67
16,854,559 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,334 writing to cptra_bootfsm_go
3,784,540 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,373,784 >>> mbox cmd response data (8 bytes)
16,374,496 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,375,779 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,378 UART:
192,740 UART: Running Caliptra ROM ...
193,837 UART:
603,470 UART: [state] CFI Enabled
620,034 UART: [state] LifecycleState = Unprovisioned
621,956 UART: [state] DebugLocked = No
623,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,186 UART: [kat] SHA2-256
797,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,492 UART: [kat] ++
808,967 UART: [kat] sha1
818,410 UART: [kat] SHA2-256
821,151 UART: [kat] SHA2-384
826,428 UART: [kat] SHA2-512-ACC
828,765 UART: [kat] ECC-384
3,114,792 UART: [kat] HMAC-384Kdf
3,127,355 UART: [kat] LMS
4,317,467 UART: [kat] --
4,322,181 UART: [cold-reset] ++
4,324,446 UART: [fht] Storing FHT @ 0x50003400
4,335,282 UART: [idev] ++
4,335,899 UART: [idev] CDI.KEYID = 6
4,336,806 UART: [idev] SUBJECT.KEYID = 7
4,338,073 UART: [idev] UDS.KEYID = 0
4,339,123 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,353,557 UART: [idev] Erasing UDS.KEYID = 0
7,626,508 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,457 UART: [idev] --
7,651,296 UART: [ldev] ++
7,651,872 UART: [ldev] CDI.KEYID = 6
7,652,839 UART: [ldev] SUBJECT.KEYID = 5
7,654,059 UART: [ldev] AUTHORITY.KEYID = 7
7,655,292 UART: [ldev] FE.KEYID = 1
7,665,507 UART: [ldev] Erasing FE.KEYID = 1
10,949,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,825 UART: [ldev] --
13,307,872 UART: [fwproc] Waiting for Commands...
13,310,614 UART: [fwproc] Received command 0x46504c54
13,313,128 UART: [kat] SHA2-256
13,482,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,493,137 UART: [kat] ++
13,493,592 UART: [kat] sha1
13,505,018 UART: [kat] SHA2-256
13,507,709 UART: [kat] SHA2-384
13,512,298 UART: [kat] SHA2-512-ACC
13,514,643 UART: [kat] ECC-384
15,798,934 UART: [kat] HMAC-384Kdf
15,810,242 UART: [kat] LMS
16,999,694 UART: [kat] --
17,000,443 >>> mbox cmd response data (8 bytes)
17,000,881 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,002,460 UART: [fwproc] Received command 0x46504c67
17,005,107 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
4,132,085 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,535,120 >>> mbox cmd response data (8 bytes)
16,535,804 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,536,763 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,914 writing to cptra_bootfsm_go
193,053 UART:
193,448 UART: Running Caliptra ROM ...
194,632 UART:
194,782 UART: [state] CFI Enabled
261,472 UART: [state] LifecycleState = Unprovisioned
263,371 UART: [state] DebugLocked = No
265,567 UART: [state] WD Timer not started. Device not locked for debugging
269,755 UART: [kat] SHA2-256
448,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,502 UART: [kat] ++
461,041 UART: [kat] sha1
471,447 UART: [kat] SHA2-256
474,502 UART: [kat] SHA2-384
480,861 UART: [kat] SHA2-512-ACC
483,822 UART: [kat] ECC-384
2,948,835 UART: [kat] HMAC-384Kdf
2,970,208 UART: [kat] LMS
3,499,669 UART: [kat] --
3,505,551 UART: [cold-reset] ++
3,507,811 UART: [fht] FHT @ 0x50003400
3,518,462 UART: [idev] ++
3,519,028 UART: [idev] CDI.KEYID = 6
3,520,101 UART: [idev] SUBJECT.KEYID = 7
3,521,211 UART: [idev] UDS.KEYID = 0
3,522,399 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,543,151 UART: [idev] Erasing UDS.KEYID = 0
6,024,175 UART: [idev] Sha1 KeyId Algorithm
6,047,618 UART: [idev] --
6,051,836 UART: [ldev] ++
6,052,418 UART: [ldev] CDI.KEYID = 6
6,053,309 UART: [ldev] SUBJECT.KEYID = 5
6,054,529 UART: [ldev] AUTHORITY.KEYID = 7
6,055,716 UART: [ldev] FE.KEYID = 1
6,099,850 UART: [ldev] Erasing FE.KEYID = 1
8,602,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,368 UART: [ldev] --
10,413,131 UART: [fwproc] Wait for Commands...
10,415,671 UART: [fwproc] Recv command 0x46504c54
10,418,043 UART: [kat] SHA2-256
10,597,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,608,865 UART: [kat] ++
10,609,405 UART: [kat] sha1
10,619,214 UART: [kat] SHA2-256
10,622,275 UART: [kat] SHA2-384
10,629,334 UART: [kat] SHA2-512-ACC
10,632,245 UART: [kat] ECC-384
13,078,368 UART: [kat] HMAC-384Kdf
13,102,099 UART: [kat] LMS
13,631,635 UART: [kat] --
13,632,300 >>> mbox cmd response data (8 bytes)
13,632,786 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,633,565 UART: [fwproc] Recv command 0x46504c67
13,636,068 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
191,975 UART:
192,362 UART: Running Caliptra ROM ...
193,471 UART:
193,612 UART: [state] CFI Enabled
263,385 UART: [state] LifecycleState = Unprovisioned
265,831 UART: [state] DebugLocked = No
267,539 UART: [state] WD Timer not started. Device not locked for debugging
272,390 UART: [kat] SHA2-256
462,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,009 UART: [kat] ++
473,486 UART: [kat] sha1
485,879 UART: [kat] SHA2-256
488,895 UART: [kat] SHA2-384
496,118 UART: [kat] SHA2-512-ACC
498,677 UART: [kat] ECC-384
2,945,368 UART: [kat] HMAC-384Kdf
2,971,443 UART: [kat] LMS
3,503,193 UART: [kat] --
3,508,110 UART: [cold-reset] ++
3,509,993 UART: [fht] FHT @ 0x50003400
3,521,945 UART: [idev] ++
3,522,621 UART: [idev] CDI.KEYID = 6
3,523,587 UART: [idev] SUBJECT.KEYID = 7
3,524,804 UART: [idev] UDS.KEYID = 0
3,525,795 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,543,718 UART: [idev] Erasing UDS.KEYID = 0
6,025,712 UART: [idev] Sha1 KeyId Algorithm
6,047,793 UART: [idev] --
6,052,524 UART: [ldev] ++
6,053,215 UART: [ldev] CDI.KEYID = 6
6,054,106 UART: [ldev] SUBJECT.KEYID = 5
6,055,318 UART: [ldev] AUTHORITY.KEYID = 7
6,056,502 UART: [ldev] FE.KEYID = 1
6,098,418 UART: [ldev] Erasing FE.KEYID = 1
8,601,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,295 UART: [ldev] --
10,412,455 UART: [fwproc] Wait for Commands...
10,414,280 UART: [fwproc] Recv command 0x46504c54
10,416,863 UART: [kat] SHA2-256
10,606,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,617,408 UART: [kat] ++
10,617,924 UART: [kat] sha1
10,629,189 UART: [kat] SHA2-256
10,632,254 UART: [kat] SHA2-384
10,637,049 UART: [kat] SHA2-512-ACC
10,639,643 UART: [kat] ECC-384
13,101,166 UART: [kat] HMAC-384Kdf
13,123,813 UART: [kat] LMS
13,655,651 UART: [kat] --
13,656,343 >>> mbox cmd response data (8 bytes)
13,656,797 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,658,217 UART: [fwproc] Recv command 0x46504c67
13,660,713 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,435,614 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,382,628 >>> mbox cmd response data (8 bytes)
13,383,408 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,385,355 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,515 UART:
192,887 UART: Running Caliptra ROM ...
193,986 UART:
603,647 UART: [state] CFI Enabled
620,112 UART: [state] LifecycleState = Unprovisioned
622,518 UART: [state] DebugLocked = No
624,646 UART: [state] WD Timer not started. Device not locked for debugging
628,404 UART: [kat] SHA2-256
818,291 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,079 UART: [kat] ++
829,636 UART: [kat] sha1
842,324 UART: [kat] SHA2-256
845,317 UART: [kat] SHA2-384
850,437 UART: [kat] SHA2-512-ACC
852,994 UART: [kat] ECC-384
3,296,028 UART: [kat] HMAC-384Kdf
3,310,109 UART: [kat] LMS
3,841,947 UART: [kat] --
3,847,136 UART: [cold-reset] ++
3,848,749 UART: [fht] FHT @ 0x50003400
3,861,184 UART: [idev] ++
3,861,872 UART: [idev] CDI.KEYID = 6
3,862,894 UART: [idev] SUBJECT.KEYID = 7
3,864,007 UART: [idev] UDS.KEYID = 0
3,865,000 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,880,390 UART: [idev] Erasing UDS.KEYID = 0
6,345,374 UART: [idev] Sha1 KeyId Algorithm
6,367,820 UART: [idev] --
6,373,524 UART: [ldev] ++
6,374,218 UART: [ldev] CDI.KEYID = 6
6,375,142 UART: [ldev] SUBJECT.KEYID = 5
6,376,311 UART: [ldev] AUTHORITY.KEYID = 7
6,377,487 UART: [ldev] FE.KEYID = 1
6,387,701 UART: [ldev] Erasing FE.KEYID = 1
8,866,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,654,069 UART: [ldev] --
10,660,426 UART: [fwproc] Wait for Commands...
10,662,524 UART: [fwproc] Recv command 0x46504c54
10,665,131 UART: [kat] SHA2-256
10,854,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,865,721 UART: [kat] ++
10,866,203 UART: [kat] sha1
10,876,661 UART: [kat] SHA2-256
10,879,672 UART: [kat] SHA2-384
10,885,385 UART: [kat] SHA2-512-ACC
10,887,958 UART: [kat] ECC-384
13,331,918 UART: [kat] HMAC-384Kdf
13,345,970 UART: [kat] LMS
13,877,853 UART: [kat] --
13,878,498 >>> mbox cmd response data (8 bytes)
13,879,108 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,880,243 UART: [fwproc] Recv command 0x46504c67
13,882,735 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,755,444 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,582,865 >>> mbox cmd response data (8 bytes)
13,583,550 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,585,606 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,609 UART: [kat] SHA2-256
881,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,655 UART: [kat] ++
885,807 UART: [kat] sha1
890,199 UART: [kat] SHA2-256
892,137 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,804 UART: [kat] LMS
1,475,000 UART: [kat] --
1,475,987 UART: [cold-reset] ++
1,476,531 UART: [fht] Storing FHT @ 0x50003400
1,479,140 UART: [idev] ++
1,479,308 UART: [idev] CDI.KEYID = 6
1,479,668 UART: [idev] SUBJECT.KEYID = 7
1,480,092 UART: [idev] UDS.KEYID = 0
1,480,437 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,112 UART: [idev] Erasing UDS.KEYID = 0
1,504,762 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,542 UART: [idev] --
1,514,557 UART: [ldev] ++
1,514,725 UART: [ldev] CDI.KEYID = 6
1,515,088 UART: [ldev] SUBJECT.KEYID = 5
1,515,514 UART: [ldev] AUTHORITY.KEYID = 7
1,515,977 UART: [ldev] FE.KEYID = 1
1,521,027 UART: [ldev] Erasing FE.KEYID = 1
1,546,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,964 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,246 UART: [fwproc] Received command 0x46504c54
1,587,153 UART: [kat] SHA2-256
2,381,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,385,199 UART: [kat] ++
2,385,351 UART: [kat] sha1
2,389,557 UART: [kat] SHA2-256
2,391,495 UART: [kat] SHA2-384
2,394,400 UART: [kat] SHA2-512-ACC
2,396,300 UART: [kat] ECC-384
2,401,847 UART: [kat] HMAC-384Kdf
2,406,353 UART: [kat] LMS
2,974,549 UART: [kat] --
2,974,787 >>> mbox cmd response data (8 bytes)
2,974,788 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,066 UART: [fwproc] Received command 0x46504c67
2,976,020 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,715,489 >>> mbox cmd response data (8 bytes)
2,715,490 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,715,766 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,696 UART: [kat] SHA2-256
892,634 UART: [kat] SHA2-384
895,301 UART: [kat] SHA2-512-ACC
897,202 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,197 UART: [kat] LMS
1,475,393 UART: [kat] --
1,476,012 UART: [cold-reset] ++
1,476,378 UART: [fht] Storing FHT @ 0x50003400
1,479,087 UART: [idev] ++
1,479,255 UART: [idev] CDI.KEYID = 6
1,479,615 UART: [idev] SUBJECT.KEYID = 7
1,480,039 UART: [idev] UDS.KEYID = 0
1,480,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,119 UART: [idev] Erasing UDS.KEYID = 0
1,504,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,791 UART: [idev] --
1,513,688 UART: [ldev] ++
1,513,856 UART: [ldev] CDI.KEYID = 6
1,514,219 UART: [ldev] SUBJECT.KEYID = 5
1,514,645 UART: [ldev] AUTHORITY.KEYID = 7
1,515,108 UART: [ldev] FE.KEYID = 1
1,520,232 UART: [ldev] Erasing FE.KEYID = 1
1,545,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,091 UART: [ldev] --
1,584,446 UART: [fwproc] Waiting for Commands...
1,585,095 UART: [fwproc] Received command 0x46504c54
1,586,002 UART: [kat] SHA2-256
2,379,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,384,048 UART: [kat] ++
2,384,200 UART: [kat] sha1
2,388,522 UART: [kat] SHA2-256
2,390,460 UART: [kat] SHA2-384
2,393,277 UART: [kat] SHA2-512-ACC
2,395,177 UART: [kat] ECC-384
2,400,828 UART: [kat] HMAC-384Kdf
2,405,312 UART: [kat] LMS
2,973,508 UART: [kat] --
2,973,746 >>> mbox cmd response data (8 bytes)
2,973,747 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,973,851 UART: [fwproc] Received command 0x46504c67
2,974,805 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,712 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,690 >>> mbox cmd response data (8 bytes)
2,716,691 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,075 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,144 UART: [kat] HMAC-384Kdf
922,768 UART: [kat] LMS
1,171,096 UART: [kat] --
1,172,313 UART: [cold-reset] ++
1,172,703 UART: [fht] FHT @ 0x50003400
1,175,592 UART: [idev] ++
1,175,760 UART: [idev] CDI.KEYID = 6
1,176,120 UART: [idev] SUBJECT.KEYID = 7
1,176,544 UART: [idev] UDS.KEYID = 0
1,176,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,758 UART: [idev] Erasing UDS.KEYID = 0
1,202,019 UART: [idev] Sha1 KeyId Algorithm
1,210,533 UART: [idev] --
1,211,719 UART: [ldev] ++
1,211,887 UART: [ldev] CDI.KEYID = 6
1,212,250 UART: [ldev] SUBJECT.KEYID = 5
1,212,676 UART: [ldev] AUTHORITY.KEYID = 7
1,213,139 UART: [ldev] FE.KEYID = 1
1,218,429 UART: [ldev] Erasing FE.KEYID = 1
1,244,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,201 UART: [ldev] --
1,283,476 UART: [fwproc] Wait for Commands...
1,284,084 UART: [fwproc] Recv command 0x46504c54
1,284,930 UART: [kat] SHA2-256
2,090,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,705 UART: [kat] ++
2,094,857 UART: [kat] sha1
2,099,111 UART: [kat] SHA2-256
2,101,051 UART: [kat] SHA2-384
2,103,920 UART: [kat] SHA2-512-ACC
2,105,820 UART: [kat] ECC-384
2,115,411 UART: [kat] HMAC-384Kdf
2,119,781 UART: [kat] LMS
2,368,109 UART: [kat] --
2,368,347 >>> mbox cmd response data (8 bytes)
2,368,348 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,423 UART: [fwproc] Recv command 0x46504c67
2,369,316 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,110,960 >>> mbox cmd response data (8 bytes)
2,110,961 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,269 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,452 UART: [cold-reset] ++
1,172,974 UART: [fht] FHT @ 0x50003400
1,175,721 UART: [idev] ++
1,175,889 UART: [idev] CDI.KEYID = 6
1,176,249 UART: [idev] SUBJECT.KEYID = 7
1,176,673 UART: [idev] UDS.KEYID = 0
1,177,018 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,385 UART: [idev] Erasing UDS.KEYID = 0
1,200,768 UART: [idev] Sha1 KeyId Algorithm
1,209,108 UART: [idev] --
1,210,118 UART: [ldev] ++
1,210,286 UART: [ldev] CDI.KEYID = 6
1,210,649 UART: [ldev] SUBJECT.KEYID = 5
1,211,075 UART: [ldev] AUTHORITY.KEYID = 7
1,211,538 UART: [ldev] FE.KEYID = 1
1,216,928 UART: [ldev] Erasing FE.KEYID = 1
1,243,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,466 UART: [ldev] --
1,282,899 UART: [fwproc] Wait for Commands...
1,283,487 UART: [fwproc] Recv command 0x46504c54
1,284,333 UART: [kat] SHA2-256
2,089,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,108 UART: [kat] ++
2,094,260 UART: [kat] sha1
2,098,600 UART: [kat] SHA2-256
2,100,540 UART: [kat] SHA2-384
2,103,409 UART: [kat] SHA2-512-ACC
2,105,309 UART: [kat] ECC-384
2,115,236 UART: [kat] HMAC-384Kdf
2,120,020 UART: [kat] LMS
2,368,348 UART: [kat] --
2,368,586 >>> mbox cmd response data (8 bytes)
2,368,587 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,844 UART: [fwproc] Recv command 0x46504c67
2,369,737 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,968 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,079 >>> mbox cmd response data (8 bytes)
2,113,080 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,558 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,681 UART: [idev] ++
1,172,849 UART: [idev] CDI.KEYID = 6
1,173,210 UART: [idev] SUBJECT.KEYID = 7
1,173,635 UART: [idev] UDS.KEYID = 0
1,173,981 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,452 UART: [ldev] --
1,280,836 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46504c54
1,282,293 UART: [kat] SHA2-256
2,085,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,089,972 UART: [kat] ++
2,090,124 UART: [kat] sha1
2,094,320 UART: [kat] SHA2-256
2,096,260 UART: [kat] SHA2-384
2,098,975 UART: [kat] SHA2-512-ACC
2,100,875 UART: [kat] ECC-384
2,111,126 UART: [kat] HMAC-384Kdf
2,115,630 UART: [kat] LMS
2,363,942 UART: [kat] --
2,364,183 >>> mbox cmd response data (8 bytes)
2,364,184 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,432 UART: [fwproc] Recv command 0x46504c67
2,365,336 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,115 >>> mbox cmd response data (8 bytes)
2,104,116 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,592 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,634 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,174,596 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,555 UART: [fwproc] Wait for Commands...
1,283,328 UART: [fwproc] Recv command 0x46504c54
1,284,182 UART: [kat] SHA2-256
2,087,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,091,861 UART: [kat] ++
2,092,013 UART: [kat] sha1
2,096,431 UART: [kat] SHA2-256
2,098,371 UART: [kat] SHA2-384
2,101,036 UART: [kat] SHA2-512-ACC
2,102,936 UART: [kat] ECC-384
2,112,835 UART: [kat] HMAC-384Kdf
2,117,479 UART: [kat] LMS
2,365,791 UART: [kat] --
2,366,032 >>> mbox cmd response data (8 bytes)
2,366,033 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,197 UART: [fwproc] Recv command 0x46504c67
2,367,101 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,107 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,462 >>> mbox cmd response data (8 bytes)
2,105,463 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,901 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,287 UART:
192,655 UART: Running Caliptra ROM ...
193,845 UART:
194,005 UART: [state] CFI Enabled
264,893 UART: [state] LifecycleState = Unprovisioned
266,819 UART: [state] DebugLocked = No
269,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,952 UART: [kat] SHA2-256
443,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,194 UART: [kat] ++
454,659 UART: [kat] sha1
466,207 UART: [kat] SHA2-256
468,921 UART: [kat] SHA2-384
474,994 UART: [kat] SHA2-512-ACC
477,368 UART: [kat] ECC-384
2,769,320 UART: [kat] HMAC-384Kdf
2,800,266 UART: [kat] LMS
3,990,601 UART: [kat] --
3,995,876 UART: [cold-reset] ++
3,997,672 UART: [fht] Storing FHT @ 0x50003400
4,010,715 UART: [idev] ++
4,011,292 UART: [idev] CDI.KEYID = 6
4,012,183 UART: [idev] SUBJECT.KEYID = 7
4,013,432 UART: [idev] UDS.KEYID = 0
4,014,451 ready_for_fw is high
4,014,709 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,158,266 UART: [idev] Erasing UDS.KEYID = 0
7,347,379 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,789 UART: [idev] --
7,373,678 UART: [ldev] ++
7,374,248 UART: [ldev] CDI.KEYID = 6
7,375,184 UART: [ldev] SUBJECT.KEYID = 5
7,376,451 UART: [ldev] AUTHORITY.KEYID = 7
7,377,598 UART: [ldev] FE.KEYID = 1
7,423,278 UART: [ldev] Erasing FE.KEYID = 1
10,753,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,806 UART: [ldev] --
13,114,160 UART: [fwproc] Waiting for Commands...
13,115,793 UART: [fwproc] Received command 0x46574c44
13,117,989 UART: [fwproc] Received Image of size 114036 bytes
17,171,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,221 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,630,037 >>> mbox cmd response: success
17,630,467 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,633,573 UART: [afmc] ++
17,634,154 UART: [afmc] CDI.KEYID = 6
17,635,065 UART: [afmc] SUBJECT.KEYID = 7
17,636,280 UART: [afmc] AUTHORITY.KEYID = 5
21,005,564 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,304,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,306,652 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,054 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,861 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,350,375 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,055 UART: [afmc] --
23,377,790 UART: [cold-reset] --
23,381,442 UART: [state] Locking Datavault
23,387,452 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,154 UART: [state] Locking ICCM
23,390,277 UART: [exit] Launching FMC @ 0x40000130
23,398,624 UART:
23,398,859 UART: Running Caliptra FMC ...
23,399,960 UART:
23,400,120 UART: [state] CFI Enabled
23,467,638 UART: [fht] FMC Alias Private Key: 7
25,806,534 UART: [art] Extend RT PCRs Done
25,807,750 UART: [art] Lock RT PCRs Done
25,809,430 UART: [art] Populate DV Done
25,814,897 UART: [fht] FMC Alias Private Key: 7
25,816,612 UART: [art] Derive CDI
25,817,382 UART: [art] Store in in slot 0x4
25,875,643 UART: [art] Derive Key Pair
25,876,640 UART: [art] Store priv key in slot 0x5
29,169,296 UART: [art] Derive Key Pair - Done
29,182,504 UART: [art] Signing Cert with AUTHO
29,183,832 UART: RITY.KEYID = 7
31,471,133 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,637 UART: [art] PUB.X = 77897CA0B0B03BE9FA0F7B58F96C5F406CEA1997C0D7DA474AF79C668CF7F6A054DB6C0255F8E29D2F0B433D36C2E104
31,479,900 UART: [art] PUB.Y = 59D997EC1585074433AE729655DA31EF3676BC343E170CC86D5A9C546CAE4896E85E2D5FFCB646DD2CF506733558741F
31,487,138 UART: [art] SIG.R = B576333A0A24FC97EBE5AEB656F0557DE6737BFE5EB690FDA2D2290D638169178B3B15FEE590F0FCE2FBF6E22FC2CD01
31,494,528 UART: [art] SIG.S = 11CD6A2247AF8F818CEC8262214A27E02A2ED7B3722C441D233BC44707C4F5415AEC8ABD00AD718DCABD549A6DF9653E
32,799,797 UART: Caliptra RT
32,800,514 UART: [state] CFI Enabled
32,962,594 UART: [rt] RT listening for mailbox commands...
32,993,528 UART: [rt]cmd =0x46504c54, len=4
32,995,069 >>> mbox cmd response data (8 bytes)
32,995,509 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,025,396 UART: [rt]cmd =0x46504c67, len=4
33,026,890 >>> mbox cmd response: failed
33,028,163 UART: [rt] FIPS self test
33,029,105 UART: [kat] ++
33,029,585 UART: [kat] sha1
33,033,840 UART: [kat] SHA2-256
33,035,636 UART: [kat] SHA2-384
33,038,326 UART: [kat] SHA2-512-ACC
33,040,539 UART: [kat] ECC-384
36,320,616 UART: [kat] HMAC-384Kdf
36,327,407 UART: [kat] LMS
36,737,395 UART: [kat] --
36,888,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,720,422 UART: [rt] Verify complete
40,872,134 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,902,033 UART: [rt]cmd =0x46504c67, len=4
40,903,734 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,786,482 ready_for_fw is high
3,787,089 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
17,848,173 >>> mbox cmd response: success
17,848,752 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,543,400 UART:
23,543,783 UART: Running Caliptra FMC ...
23,544,957 UART:
23,545,116 UART: [state] CFI Enabled
23,611,821 UART: [fht] FMC Alias Private Key: 7
25,948,792 UART: [art] Extend RT PCRs Done
25,950,025 UART: [art] Lock RT PCRs Done
25,951,849 UART: [art] Populate DV Done
25,957,273 UART: [fht] FMC Alias Private Key: 7
25,958,974 UART: [art] Derive CDI
25,959,790 UART: [art] Store in in slot 0x4
26,019,912 UART: [art] Derive Key Pair
26,020,961 UART: [art] Store priv key in slot 0x5
29,313,390 UART: [art] Derive Key Pair - Done
29,326,281 UART: [art] Signing Cert with AUTHO
29,327,594 UART: RITY.KEYID = 7
31,614,308 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,814 UART: [art] PUB.X = 4A6B056BB9E681B95F16E2186C34909345B68E1F1A3180A5FA6822F5898AF70FC9E18AE79DD89DFA80F108841AD1C7F7
31,623,059 UART: [art] PUB.Y = 898084A35F969BCA823F45D67E0D399AF6AA4135A291EC39273022BF5C4AC34CF231EAF4780B5FC9BBAB55A91135A6DB
31,630,293 UART: [art] SIG.R = 2278F45A6B0B96029D4CDA023F4458DB212920645602621D48630EAE976225838D7BBED9AECA98F3436AEC0B1154B82B
31,637,691 UART: [art] SIG.S = 7D27F81735BA0ACC9031A94590C6F2D09AEF87F1A7DFFCAC1B22B9EC05B495B676DC51E8B5E0E0749C3A20275C3A14F6
32,942,978 UART: Caliptra RT
32,943,684 UART: [state] CFI Enabled
33,104,034 UART: [rt] RT listening for mailbox commands...
33,134,972 UART: [rt]cmd =0x46504c54, len=4
33,136,411 >>> mbox cmd response data (8 bytes)
33,136,843 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,167,094 UART: [rt]cmd =0x46504c67, len=4
33,168,554 >>> mbox cmd response: failed
33,169,821 UART: [rt] FIPS self test
33,170,752 UART: [kat] ++
33,171,205 UART: [kat] sha1
33,175,392 UART: [kat] SHA2-256
33,177,203 UART: [kat] SHA2-384
33,179,961 UART: [kat] SHA2-512-ACC
33,182,174 UART: [kat] ECC-384
36,461,955 UART: [kat] HMAC-384Kdf
36,468,827 UART: [kat] LMS
36,878,808 UART: [kat] --
37,010,582 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,842,131 UART: [rt] Verify complete
41,012,958 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,042,687 UART: [rt]cmd =0x46504c67, len=4
41,044,355 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,564 UART:
192,918 UART: Running Caliptra ROM ...
194,038 UART:
603,676 UART: [state] CFI Enabled
614,152 UART: [state] LifecycleState = Unprovisioned
616,103 UART: [state] DebugLocked = No
618,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,021 UART: [kat] SHA2-256
792,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,295 UART: [kat] ++
803,830 UART: [kat] sha1
816,349 UART: [kat] SHA2-256
819,073 UART: [kat] SHA2-384
825,355 UART: [kat] SHA2-512-ACC
827,724 UART: [kat] ECC-384
3,112,269 UART: [kat] HMAC-384Kdf
3,123,934 UART: [kat] LMS
4,314,003 UART: [kat] --
4,318,168 UART: [cold-reset] ++
4,320,532 UART: [fht] Storing FHT @ 0x50003400
4,331,381 UART: [idev] ++
4,331,946 UART: [idev] CDI.KEYID = 6
4,332,926 UART: [idev] SUBJECT.KEYID = 7
4,334,196 UART: [idev] UDS.KEYID = 0
4,335,232 ready_for_fw is high
4,335,444 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
4,479,875 UART: [idev] Erasing UDS.KEYID = 0
7,619,150 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,539 UART: [idev] --
7,646,450 UART: [ldev] ++
7,647,094 UART: [ldev] CDI.KEYID = 6
7,648,016 UART: [ldev] SUBJECT.KEYID = 5
7,649,232 UART: [ldev] AUTHORITY.KEYID = 7
7,650,466 UART: [ldev] FE.KEYID = 1
7,660,140 UART: [ldev] Erasing FE.KEYID = 1
10,946,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,645 UART: [ldev] --
13,308,531 UART: [fwproc] Waiting for Commands...
13,311,114 UART: [fwproc] Received command 0x46574c44
13,313,298 UART: [fwproc] Received Image of size 114036 bytes
17,364,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,000 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
17,828,192 >>> mbox cmd response: success
17,828,633 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,832,399 UART: [afmc] ++
17,832,979 UART: [afmc] CDI.KEYID = 6
17,833,943 UART: [afmc] SUBJECT.KEYID = 7
17,835,157 UART: [afmc] AUTHORITY.KEYID = 5
21,150,951 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,838 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,097 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,520 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,353 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,855 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,748 UART: [afmc] --
23,515,456 UART: [cold-reset] --
23,519,805 UART: [state] Locking Datavault
23,525,163 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,914 UART: [state] Locking ICCM
23,528,850 UART: [exit] Launching FMC @ 0x40000130
23,537,255 UART:
23,537,531 UART: Running Caliptra FMC ...
23,538,564 UART:
23,538,718 UART: [state] CFI Enabled
23,546,763 UART: [fht] FMC Alias Private Key: 7
25,877,384 UART: [art] Extend RT PCRs Done
25,878,666 UART: [art] Lock RT PCRs Done
25,880,304 UART: [art] Populate DV Done
25,885,603 UART: [fht] FMC Alias Private Key: 7
25,887,067 UART: [art] Derive CDI
25,887,841 UART: [art] Store in in slot 0x4
25,930,598 UART: [art] Derive Key Pair
25,931,596 UART: [art] Store priv key in slot 0x5
29,173,810 UART: [art] Derive Key Pair - Done
29,187,085 UART: [art] Signing Cert with AUTHO
29,188,391 UART: RITY.KEYID = 7
31,468,043 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,560 UART: [art] PUB.X = 8884CBA1AEA9E2894D51B3C4C5D72CB8AB37F9B7A5CF1A520047491AD64711588B0E8513D1CBF611E326D615D6803CA7
31,476,811 UART: [art] PUB.Y = 4EF3D009AC29EA7CB296DCB146FFFA88535C5AB7819E02B482321C5AD055F7A557A033678E5B5F43F8448B5D72340B60
31,484,088 UART: [art] SIG.R = 37CA5F66E09B71B7E3E86D6DF3D83D473DD2FF44561043412EA094B31D02E19510B5438316F954079AE54D5F382FF5A7
31,491,468 UART: [art] SIG.S = 0A30C982A1A0F82E102B5C30D545C5189D94DFF0F9CB2E54053E9F7C50C066564598841370FC0D5EB48BB7238954BF07
32,796,428 UART: Caliptra RT
32,797,152 UART: [state] CFI Enabled
32,914,814 UART: [rt] RT listening for mailbox commands...
32,945,631 UART: [rt]cmd =0x46504c54, len=4
32,947,397 >>> mbox cmd response data (8 bytes)
32,947,882 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,977,817 UART: [rt]cmd =0x46504c67, len=4
32,979,211 >>> mbox cmd response: failed
32,980,220 UART: [rt] FIPS self test
32,981,143 UART: [kat] ++
32,981,593 UART: [kat] sha1
32,986,083 UART: [kat] SHA2-256
32,987,876 UART: [kat] SHA2-384
32,990,765 UART: [kat] SHA2-512-ACC
32,992,977 UART: [kat] ECC-384
36,235,504 UART: [kat] HMAC-384Kdf
36,241,501 UART: [kat] LMS
36,651,395 UART: [kat] --
36,803,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,635,818 UART: [rt] Verify complete
40,825,078 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,854,890 UART: [rt]cmd =0x46504c67, len=4
40,856,504 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
4,130,494 ready_for_fw is high
4,131,130 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
18,075,119 >>> mbox cmd response: success
18,075,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,716,952 UART:
23,717,341 UART: Running Caliptra FMC ...
23,718,486 UART:
23,718,641 UART: [state] CFI Enabled
23,726,958 UART: [fht] FMC Alias Private Key: 7
26,057,049 UART: [art] Extend RT PCRs Done
26,058,282 UART: [art] Lock RT PCRs Done
26,060,000 UART: [art] Populate DV Done
26,065,542 UART: [fht] FMC Alias Private Key: 7
26,067,257 UART: [art] Derive CDI
26,068,004 UART: [art] Store in in slot 0x4
26,110,394 UART: [art] Derive Key Pair
26,111,397 UART: [art] Store priv key in slot 0x5
29,353,818 UART: [art] Derive Key Pair - Done
29,366,616 UART: [art] Signing Cert with AUTHO
29,367,928 UART: RITY.KEYID = 7
31,647,006 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,532 UART: [art] PUB.X = BEF0F2CF18FF76F3451FBB84B3BF9E048F0368A67E4FDDDC4171A9DB9BAD43ED709EE446B0149450F45C7CFB592F9D00
31,655,811 UART: [art] PUB.Y = 487894646C1C25622A70D4584AB06336007180AA896401278C5DF359810EC03036B491EEE8598AA8E0A20E2B9CD39E50
31,662,999 UART: [art] SIG.R = C013AEA64D48F9A9584C64925BAF765577FF2A636DFE27211D441DE831B9076A65435B585C4096D3AC4ECA22115FCB4D
31,670,410 UART: [art] SIG.S = A23999634B80AE2733CA85F6D8E442B09C5776E3303180A148B567345D4FC6111EA6599C7C444C147B59BB0FBEF77C6E
32,975,583 UART: Caliptra RT
32,976,299 UART: [state] CFI Enabled
33,093,871 UART: [rt] RT listening for mailbox commands...
33,125,077 UART: [rt]cmd =0x46504c54, len=4
33,126,547 >>> mbox cmd response data (8 bytes)
33,126,969 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,156,617 UART: [rt]cmd =0x46504c67, len=4
33,158,020 >>> mbox cmd response: failed
33,159,344 UART: [rt] FIPS self test
33,160,274 UART: [kat] ++
33,160,727 UART: [kat] sha1
33,165,117 UART: [kat] SHA2-256
33,166,942 UART: [kat] SHA2-384
33,169,663 UART: [kat] SHA2-512-ACC
33,171,875 UART: [kat] ECC-384
36,413,835 UART: [kat] HMAC-384Kdf
36,419,707 UART: [kat] LMS
36,829,579 UART: [kat] --
36,961,470 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
40,793,535 UART: [rt] Verify complete
41,004,089 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,033,877 UART: [rt]cmd =0x46504c67, len=4
41,035,336 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,371 UART:
192,743 UART: Running Caliptra ROM ...
193,974 UART:
194,124 UART: [state] CFI Enabled
260,133 UART: [state] LifecycleState = Unprovisioned
262,041 UART: [state] DebugLocked = No
264,502 UART: [state] WD Timer not started. Device not locked for debugging
268,107 UART: [kat] SHA2-256
447,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,832 UART: [kat] ++
459,286 UART: [kat] sha1
471,861 UART: [kat] SHA2-256
474,878 UART: [kat] SHA2-384
481,153 UART: [kat] SHA2-512-ACC
484,092 UART: [kat] ECC-384
2,951,235 UART: [kat] HMAC-384Kdf
2,970,521 UART: [kat] LMS
3,500,007 UART: [kat] --
3,502,735 UART: [cold-reset] ++
3,504,029 UART: [fht] FHT @ 0x50003400
3,514,438 UART: [idev] ++
3,514,996 UART: [idev] CDI.KEYID = 6
3,515,878 UART: [idev] SUBJECT.KEYID = 7
3,517,121 UART: [idev] UDS.KEYID = 0
3,518,043 ready_for_fw is high
3,518,247 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,662,099 UART: [idev] Erasing UDS.KEYID = 0
6,024,221 UART: [idev] Sha1 KeyId Algorithm
6,046,219 UART: [idev] --
6,051,192 UART: [ldev] ++
6,051,767 UART: [ldev] CDI.KEYID = 6
6,052,680 UART: [ldev] SUBJECT.KEYID = 5
6,053,883 UART: [ldev] AUTHORITY.KEYID = 7
6,054,989 UART: [ldev] FE.KEYID = 1
6,099,729 UART: [ldev] Erasing FE.KEYID = 1
8,602,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,943 UART: [ldev] --
10,412,319 UART: [fwproc] Wait for Commands...
10,414,847 UART: [fwproc] Recv command 0x46574c44
10,416,887 UART: [fwproc] Recv'd Img size: 114360 bytes
13,816,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,415 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,277,952 >>> mbox cmd response: success
14,278,378 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,282,775 UART: [afmc] ++
14,283,363 UART: [afmc] CDI.KEYID = 6
14,284,247 UART: [afmc] SUBJECT.KEYID = 7
14,285,463 UART: [afmc] AUTHORITY.KEYID = 5
16,825,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,840 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,326 UART: [afmc] --
18,627,418 UART: [cold-reset] --
18,633,866 UART: [state] Locking Datavault
18,637,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,564 UART: [state] Locking ICCM
18,640,686 UART: [exit] Launching FMC @ 0x40000130
18,649,132 UART:
18,649,375 UART: Running Caliptra FMC ...
18,650,476 UART:
18,650,633 UART: [state] CFI Enabled
18,710,323 UART: [fht] FMC Alias Private Key: 7
20,474,421 UART: [art] Extend RT PCRs Done
20,475,638 UART: [art] Lock RT PCRs Done
20,477,310 UART: [art] Populate DV Done
20,482,719 UART: [fht] FMC Alias Private Key: 7
20,484,201 UART: [art] Derive CDI
20,484,936 UART: [art] Store in in slot 0x4
20,543,062 UART: [art] Derive Key Pair
20,544,100 UART: [art] Store priv key in slot 0x5
23,006,648 UART: [art] Derive Key Pair - Done
23,019,704 UART: [art] Signing Cert with AUTHO
23,021,041 UART: RITY.KEYID = 7
24,732,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,321 UART: [art] PUB.X = B74E2BA5AA715074AA0E6D581F79BB548225AFA542B72C2AA9138527384B1DB66B2B2BDB9419A9D376D9B8A1A37682D5
24,741,629 UART: [art] PUB.Y = F07BAB4EF0A9E8669F31BE400FEA89DB822C626F190D5AD6C802C3974964F9D930C04716543C381188FB8D15141446E5
24,748,874 UART: [art] SIG.R = 583C18FE76ABFD01549485B51D5B458D1B9C0E3BA54306F8E5A8FC120777D7218530BCC9325B289E3238397A02495F78
24,756,216 UART: [art] SIG.S = 721CE04F4E865FEB1276575CADB6BA212BEF844402F748895C0D695EB2D1A3951141F08F92196F1AB5EF9B55BA62BBFE
25,735,467 UART: Caliptra RT
25,736,169 UART: [state] CFI Enabled
25,902,658 UART: [rt] RT listening for mailbox commands...
25,933,808 UART: [rt]cmd =0x46504c54, len=4
25,935,367 >>> mbox cmd response data (8 bytes)
25,935,789 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,965,606 UART: [rt]cmd =0x46504c67, len=4
25,967,064 >>> mbox cmd response: failed
25,968,095 UART: [rt] FIPS self test
25,969,026 UART: [kat] ++
25,969,479 UART: [kat] sha1
25,973,935 UART: [kat] SHA2-256
25,975,765 UART: [kat] SHA2-384
25,978,425 UART: [kat] SHA2-512-ACC
25,980,645 UART: [kat] ECC-384
28,429,912 UART: [kat] HMAC-384Kdf
28,456,324 UART: [kat] LMS
28,653,987 UART: [kat] --
28,807,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,989,698 UART: [rt] Verify complete
32,109,985 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,140,098 UART: [rt]cmd =0x46504c67, len=4
32,141,770 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,280 UART:
192,663 UART: Running Caliptra ROM ...
193,809 UART:
193,953 UART: [state] CFI Enabled
263,842 UART: [state] LifecycleState = Unprovisioned
266,193 UART: [state] DebugLocked = No
267,786 UART: [state] WD Timer not started. Device not locked for debugging
272,608 UART: [kat] SHA2-256
462,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,255 UART: [kat] ++
473,708 UART: [kat] sha1
484,160 UART: [kat] SHA2-256
487,172 UART: [kat] SHA2-384
493,306 UART: [kat] SHA2-512-ACC
495,891 UART: [kat] ECC-384
2,947,737 UART: [kat] HMAC-384Kdf
2,969,858 UART: [kat] LMS
3,501,627 UART: [kat] --
3,507,565 UART: [cold-reset] ++
3,509,076 UART: [fht] FHT @ 0x50003400
3,521,912 UART: [idev] ++
3,522,631 UART: [idev] CDI.KEYID = 6
3,523,552 UART: [idev] SUBJECT.KEYID = 7
3,524,799 UART: [idev] UDS.KEYID = 0
3,525,729 ready_for_fw is high
3,525,932 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
3,669,784 UART: [idev] Erasing UDS.KEYID = 0
6,027,855 UART: [idev] Sha1 KeyId Algorithm
6,051,638 UART: [idev] --
6,055,776 UART: [ldev] ++
6,056,467 UART: [ldev] CDI.KEYID = 6
6,057,383 UART: [ldev] SUBJECT.KEYID = 5
6,058,545 UART: [ldev] AUTHORITY.KEYID = 7
6,059,724 UART: [ldev] FE.KEYID = 1
6,099,883 UART: [ldev] Erasing FE.KEYID = 1
8,607,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,095 UART: [ldev] --
10,413,824 UART: [fwproc] Wait for Commands...
10,416,635 UART: [fwproc] Recv command 0x46574c44
10,418,899 UART: [fwproc] Recv'd Img size: 114360 bytes
13,865,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,794 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,602,193 >>> mbox cmd response: success
14,603,095 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,605,904 UART: [afmc] ++
14,606,627 UART: [afmc] CDI.KEYID = 6
14,607,737 UART: [afmc] SUBJECT.KEYID = 7
14,609,291 UART: [afmc] AUTHORITY.KEYID = 5
17,150,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,029 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,153 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,340 UART: [afmc] --
18,950,345 UART: [cold-reset] --
18,954,971 UART: [state] Locking Datavault
18,963,082 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,271 UART: [state] Locking ICCM
18,966,555 UART: [exit] Launching FMC @ 0x40000130
18,975,220 UART:
18,975,484 UART: Running Caliptra FMC ...
18,976,586 UART:
18,976,742 UART: [state] CFI Enabled
19,031,613 UART: [fht] FMC Alias Private Key: 7
20,796,151 UART: [art] Extend RT PCRs Done
20,797,357 UART: [art] Lock RT PCRs Done
20,798,925 UART: [art] Populate DV Done
20,804,328 UART: [fht] FMC Alias Private Key: 7
20,805,864 UART: [art] Derive CDI
20,806,679 UART: [art] Store in in slot 0x4
20,864,302 UART: [art] Derive Key Pair
20,865,355 UART: [art] Store priv key in slot 0x5
23,328,650 UART: [art] Derive Key Pair - Done
23,341,478 UART: [art] Signing Cert with AUTHO
23,342,776 UART: RITY.KEYID = 7
25,054,376 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,904 UART: [art] PUB.X = C88AFB26DC49193C0CA5832FAA9BEEDE9AD797751AAC844BF75A141151D6916EA7CF0D3AA91E5D9F1F05E4C05DAF68CD
25,063,182 UART: [art] PUB.Y = 9310EB997BC3967CAC301CC1BC281679C84052B389B34629D4E831FD6E286779AF97F9ABA9E205033F1DFEF49DEA5CDE
25,070,442 UART: [art] SIG.R = 7E267153AF5B62097E447C9A2930D44F544E957E7A95AAA892FA1A1E98D3FB6D2E1EAAD4B504E9C8F7CA160B279968CC
25,077,861 UART: [art] SIG.S = 5F063D27EFAF8103103E2F2CD01B9E039CCCC75D35EB04FA8FC2BFF3538C0AD3057A19A79AF9FC36CB017433D44F5646
26,056,747 UART: Caliptra RT
26,057,432 UART: [state] CFI Enabled
26,224,255 UART: [rt] RT listening for mailbox commands...
26,255,188 UART: [rt]cmd =0x46504c54, len=4
26,256,655 >>> mbox cmd response data (8 bytes)
26,257,058 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,287,262 UART: [rt]cmd =0x46504c67, len=4
26,288,576 >>> mbox cmd response: failed
26,289,814 UART: [rt] FIPS self test
26,290,752 UART: [kat] ++
26,291,202 UART: [kat] sha1
26,295,826 UART: [kat] SHA2-256
26,297,637 UART: [kat] SHA2-384
26,300,286 UART: [kat] SHA2-512-ACC
26,302,496 UART: [kat] ECC-384
28,751,909 UART: [kat] HMAC-384Kdf
28,757,574 UART: [kat] LMS
28,955,258 UART: [kat] --
29,109,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,290,734 UART: [rt] Verify complete
32,430,951 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,460,785 UART: [rt]cmd =0x46504c67, len=4
32,462,300 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,440,999 ready_for_fw is high
3,441,567 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,740,915 >>> mbox cmd response: success
14,741,440 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,026,108 UART:
19,026,491 UART: Running Caliptra FMC ...
19,027,642 UART:
19,027,803 UART: [state] CFI Enabled
19,096,976 UART: [fht] FMC Alias Private Key: 7
20,861,883 UART: [art] Extend RT PCRs Done
20,863,112 UART: [art] Lock RT PCRs Done
20,865,202 UART: [art] Populate DV Done
20,870,828 UART: [fht] FMC Alias Private Key: 7
20,872,436 UART: [art] Derive CDI
20,873,177 UART: [art] Store in in slot 0x4
20,929,762 UART: [art] Derive Key Pair
20,930,761 UART: [art] Store priv key in slot 0x5
23,394,017 UART: [art] Derive Key Pair - Done
23,407,183 UART: [art] Signing Cert with AUTHO
23,408,488 UART: RITY.KEYID = 7
25,120,519 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,027 UART: [art] PUB.X = E9481F158F47E503C3E04110EF7FE01C7CA08E3489DC766E4104596DA674308E46E68572030558B1383F47548EED2668
25,129,241 UART: [art] PUB.Y = D44A31446D72B991472C02EBFD1390DE2DFA7E62B48B92F0BC3B7FBF01B9E753E90AA60584441EE219D38B6E4CC7CF1D
25,136,545 UART: [art] SIG.R = 449C89FD169D506C63623D13E8FBAB45F01B005E0A61E146FB13D504F697FA12CE9A1D19D96C9862C0986CBCA5E2CBC2
25,143,894 UART: [art] SIG.S = E09B692F235E91F6C383D8D20722C897D367A61B71F9E89423739C741B25CDBB4B12CDA9D02CCF5515178F16CE821F98
26,122,939 UART: Caliptra RT
26,123,632 UART: [state] CFI Enabled
26,287,700 UART: [rt] RT listening for mailbox commands...
26,318,782 UART: [rt]cmd =0x46504c54, len=4
26,320,338 >>> mbox cmd response data (8 bytes)
26,320,755 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,351,004 UART: [rt]cmd =0x46504c67, len=4
26,352,518 >>> mbox cmd response: failed
26,353,633 UART: [rt] FIPS self test
26,354,566 UART: [kat] ++
26,355,013 UART: [kat] sha1
26,359,502 UART: [kat] SHA2-256
26,361,298 UART: [kat] SHA2-384
26,364,244 UART: [kat] SHA2-512-ACC
26,366,485 UART: [kat] ECC-384
28,815,624 UART: [kat] HMAC-384Kdf
28,842,135 UART: [kat] LMS
29,039,793 UART: [kat] --
29,173,746 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,355,451 UART: [rt] Verify complete
32,495,331 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,525,077 UART: [rt]cmd =0x46504c67, len=4
32,526,511 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,514 UART:
192,910 UART: Running Caliptra ROM ...
194,121 UART:
603,661 UART: [state] CFI Enabled
619,857 UART: [state] LifecycleState = Unprovisioned
622,266 UART: [state] DebugLocked = No
624,375 UART: [state] WD Timer not started. Device not locked for debugging
628,419 UART: [kat] SHA2-256
818,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,101 UART: [kat] ++
829,595 UART: [kat] sha1
840,755 UART: [kat] SHA2-256
843,766 UART: [kat] SHA2-384
848,715 UART: [kat] SHA2-512-ACC
851,344 UART: [kat] ECC-384
3,293,347 UART: [kat] HMAC-384Kdf
3,305,599 UART: [kat] LMS
3,837,433 UART: [kat] --
3,842,092 UART: [cold-reset] ++
3,843,755 UART: [fht] FHT @ 0x50003400
3,854,458 UART: [idev] ++
3,855,177 UART: [idev] CDI.KEYID = 6
3,856,238 UART: [idev] SUBJECT.KEYID = 7
3,857,345 UART: [idev] UDS.KEYID = 0
3,858,275 ready_for_fw is high
3,858,482 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
4,002,135 UART: [idev] Erasing UDS.KEYID = 0
6,332,639 UART: [idev] Sha1 KeyId Algorithm
6,355,451 UART: [idev] --
6,361,022 UART: [ldev] ++
6,361,709 UART: [ldev] CDI.KEYID = 6
6,362,675 UART: [ldev] SUBJECT.KEYID = 5
6,363,836 UART: [ldev] AUTHORITY.KEYID = 7
6,365,085 UART: [ldev] FE.KEYID = 1
6,374,517 UART: [ldev] Erasing FE.KEYID = 1
8,850,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,838 UART: [ldev] --
10,644,405 UART: [fwproc] Wait for Commands...
10,646,885 UART: [fwproc] Recv command 0x46574c44
10,649,145 UART: [fwproc] Recv'd Img size: 114360 bytes
14,098,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
14,835,247 >>> mbox cmd response: success
14,835,650 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,838,832 UART: [afmc] ++
14,839,532 UART: [afmc] CDI.KEYID = 6
14,840,722 UART: [afmc] SUBJECT.KEYID = 7
14,842,158 UART: [afmc] AUTHORITY.KEYID = 5
17,346,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,127 UART: [afmc] --
19,143,349 UART: [cold-reset] --
19,146,891 UART: [state] Locking Datavault
19,151,818 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,006 UART: [state] Locking ICCM
19,156,052 UART: [exit] Launching FMC @ 0x40000130
19,164,750 UART:
19,164,994 UART: Running Caliptra FMC ...
19,166,099 UART:
19,166,260 UART: [state] CFI Enabled
19,174,155 UART: [fht] FMC Alias Private Key: 7
20,931,140 UART: [art] Extend RT PCRs Done
20,932,370 UART: [art] Lock RT PCRs Done
20,933,698 UART: [art] Populate DV Done
20,939,219 UART: [fht] FMC Alias Private Key: 7
20,940,867 UART: [art] Derive CDI
20,941,683 UART: [art] Store in in slot 0x4
20,984,492 UART: [art] Derive Key Pair
20,985,497 UART: [art] Store priv key in slot 0x5
23,411,643 UART: [art] Derive Key Pair - Done
23,424,586 UART: [art] Signing Cert with AUTHO
23,425,897 UART: RITY.KEYID = 7
25,131,099 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,619 UART: [art] PUB.X = 47E189F2B17AA5DDC7549FE5BB74809D7E3DF7808FBF825BDA8A866FDE2B509F9A25C44E0916CA88969B5A71D753A531
25,139,925 UART: [art] PUB.Y = 06932AE097BC695F8CF3F6508E00DE311FFD7E8C0C428ED9300401D03CED48EEF945B72EB85A194C9C483E6598027EE4
25,147,149 UART: [art] SIG.R = 74B829EED160535B9ADA4CEF729B425832F8E66173B0855FA5702C07B9A38D5A73C141F468193038AE218C8659E4EA06
25,154,528 UART: [art] SIG.S = 9718E61286F77F34B4E04A2E6BDA13BA0213F40367F8EEEA1A75D774965A35F0560AFE30D04C974B7A0666154A06D8C9
26,132,771 UART: Caliptra RT
26,133,463 UART: [state] CFI Enabled
26,250,249 UART: [rt] RT listening for mailbox commands...
26,281,329 UART: [rt]cmd =0x46504c54, len=4
26,283,121 >>> mbox cmd response data (8 bytes)
26,283,522 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,313,671 UART: [rt]cmd =0x46504c67, len=4
26,314,999 >>> mbox cmd response: failed
26,316,169 UART: [rt] FIPS self test
26,317,106 UART: [kat] ++
26,317,557 UART: [kat] sha1
26,322,135 UART: [kat] SHA2-256
26,323,934 UART: [kat] SHA2-384
26,326,822 UART: [kat] SHA2-512-ACC
26,329,039 UART: [kat] ECC-384
28,756,202 UART: [kat] HMAC-384Kdf
28,762,139 UART: [kat] LMS
28,959,788 UART: [kat] --
29,113,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,296,794 UART: [rt] Verify complete
32,457,337 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,487,249 UART: [rt]cmd =0x46504c67, len=4
32,488,999 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,753,838 ready_for_fw is high
3,754,290 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
14,970,290 >>> mbox cmd response: success
14,971,029 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,228,091 UART:
19,228,486 UART: Running Caliptra FMC ...
19,229,664 UART:
19,229,827 UART: [state] CFI Enabled
19,237,858 UART: [fht] FMC Alias Private Key: 7
20,994,491 UART: [art] Extend RT PCRs Done
20,995,708 UART: [art] Lock RT PCRs Done
20,997,524 UART: [art] Populate DV Done
21,003,122 UART: [fht] FMC Alias Private Key: 7
21,004,832 UART: [art] Derive CDI
21,005,833 UART: [art] Store in in slot 0x4
21,048,164 UART: [art] Derive Key Pair
21,049,182 UART: [art] Store priv key in slot 0x5
23,475,568 UART: [art] Derive Key Pair - Done
23,488,669 UART: [art] Signing Cert with AUTHO
23,490,010 UART: RITY.KEYID = 7
25,195,311 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,812 UART: [art] PUB.X = 0507F51FBD76163768A0F7A878C7C7E731333F01E22A9A454FFF885DBF9A56764C93BE21C8EB52239BFB6ACE278BB749
25,204,046 UART: [art] PUB.Y = B08164B40FF655E56BF49B898AD0D2A4A4B83E00300E4A54EEA69F3412DAD4CFCF9B3A33F9107E3A698115DE65211984
25,211,299 UART: [art] SIG.R = 1A92433005A9A8BBFD5FF23D9223334C03C864B6AB784D989B7FB5FB8C411412C3324ED27D28221FC1E78FA691039467
25,218,699 UART: [art] SIG.S = 21E48F3796838812029EFA37B1996A62B8ABBBFA645B4B616620DDE671B7E81BD396ADEBFEAB5CA0FD67BA61A2E34B87
26,197,571 UART: Caliptra RT
26,198,280 UART: [state] CFI Enabled
26,315,675 UART: [rt] RT listening for mailbox commands...
26,346,662 UART: [rt]cmd =0x46504c54, len=4
26,348,238 >>> mbox cmd response data (8 bytes)
26,348,661 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,378,822 UART: [rt]cmd =0x46504c67, len=4
26,380,148 >>> mbox cmd response: failed
26,381,184 UART: [rt] FIPS self test
26,382,057 UART: [kat] ++
26,382,502 UART: [kat] sha1
26,386,984 UART: [kat] SHA2-256
26,388,794 UART: [kat] SHA2-384
26,391,505 UART: [kat] SHA2-512-ACC
26,393,716 UART: [kat] ECC-384
28,821,156 UART: [kat] HMAC-384Kdf
28,827,019 UART: [kat] LMS
29,024,677 UART: [kat] --
29,158,647 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
32,339,814 UART: [rt] Verify complete
32,521,420 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,551,308 UART: [rt]cmd =0x46504c67, len=4
32,552,885 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,603 UART: [kat] SHA2-256
892,541 UART: [kat] SHA2-384
895,414 UART: [kat] SHA2-512-ACC
897,315 UART: [kat] ECC-384
902,684 UART: [kat] HMAC-384Kdf
907,366 UART: [kat] LMS
1,475,562 UART: [kat] --
1,476,449 UART: [cold-reset] ++
1,476,881 UART: [fht] Storing FHT @ 0x50003400
1,479,846 UART: [idev] ++
1,480,014 UART: [idev] CDI.KEYID = 6
1,480,374 UART: [idev] SUBJECT.KEYID = 7
1,480,798 UART: [idev] UDS.KEYID = 0
1,481,143 ready_for_fw is high
1,481,143 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,702 UART: [idev] Erasing UDS.KEYID = 0
1,505,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,052 UART: [idev] --
1,514,891 UART: [ldev] ++
1,515,059 UART: [ldev] CDI.KEYID = 6
1,515,422 UART: [ldev] SUBJECT.KEYID = 5
1,515,848 UART: [ldev] AUTHORITY.KEYID = 7
1,516,311 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,066 UART: [ldev] --
1,586,513 UART: [fwproc] Waiting for Commands...
1,587,252 UART: [fwproc] Received command 0x46574c44
1,588,043 UART: [fwproc] Received Image of size 114360 bytes
2,885,416 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,616 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,968 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,077,893 >>> mbox cmd response: success
3,077,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,079,043 UART: [afmc] ++
3,079,211 UART: [afmc] CDI.KEYID = 6
3,079,573 UART: [afmc] SUBJECT.KEYID = 7
3,079,998 UART: [afmc] AUTHORITY.KEYID = 5
3,114,907 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,672 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,362 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,243 UART: [afmc] --
3,158,275 UART: [cold-reset] --
3,159,089 UART: [state] Locking Datavault
3,160,416 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,020 UART: [state] Locking ICCM
3,161,692 UART: [exit] Launching FMC @ 0x40000130
3,167,021 UART:
3,167,037 UART: Running Caliptra FMC ...
3,167,445 UART:
3,167,499 UART: [state] CFI Enabled
3,178,024 UART: [fht] FMC Alias Private Key: 7
3,287,001 UART: [art] Extend RT PCRs Done
3,287,429 UART: [art] Lock RT PCRs Done
3,289,347 UART: [art] Populate DV Done
3,297,748 UART: [fht] FMC Alias Private Key: 7
3,298,804 UART: [art] Derive CDI
3,299,084 UART: [art] Store in in slot 0x4
3,384,835 UART: [art] Derive Key Pair
3,385,195 UART: [art] Store priv key in slot 0x5
3,398,455 UART: [art] Derive Key Pair - Done
3,413,296 UART: [art] Signing Cert with AUTHO
3,413,776 UART: RITY.KEYID = 7
3,429,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,141 UART: [art] PUB.X = 219DE4077BBA49DD25BA5048903FFAA37C5CB264433624E2A5066C957D7528A19AFCB9E20D0CD8FCF756415D2B5A1372
3,436,907 UART: [art] PUB.Y = 9892C5DB21566DF8A010387C9B848B70B4E4E2F348B19AB68D12737F197DB27A4D8179EC1380BEEE0EFCB48843768FA3
3,443,860 UART: [art] SIG.R = 54FD3136E0E6D8CFC5B46E46B50468BBBB4E58343EFA870AF6AA8EAF77933D2D50339458A832B3507F782CB461F66F20
3,450,632 UART: [art] SIG.S = 497FAAC0C7043D460560CD0830F0ADD0685D18E37E1FEB3CAEA1D1FFECD8F7F0ACC268834311489BCC169D28D1E80B7B
3,474,567 UART: Caliptra RT
3,474,821 UART: [state] CFI Enabled
3,582,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,173 UART: [rt]cmd =0x46504c54, len=4
3,613,353 >>> mbox cmd response data (8 bytes)
3,613,354 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,643,101 UART: [rt]cmd =0x46504c67, len=4
3,644,215 >>> mbox cmd response: failed
3,644,511 UART: [rt] FIPS self test
3,644,842 UART: [kat] ++
3,644,994 UART: [kat] sha1
3,649,055 UART: [kat] SHA2-256
3,650,985 UART: [kat] SHA2-384
3,653,714 UART: [kat] SHA2-512-ACC
3,655,609 UART: [kat] ECC-384
3,665,304 UART: [kat] HMAC-384Kdf
3,669,991 UART: [kat] LMS
3,918,882 UART: [kat] --
4,713,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,142,136 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,143,965 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,405 UART: [rt]cmd =0x46504c67, len=4
6,174,384 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,095 ready_for_fw is high
1,363,095 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,928,253 >>> mbox cmd response: success
2,928,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,989,131 UART:
2,989,147 UART: Running Caliptra FMC ...
2,989,555 UART:
2,989,609 UART: [state] CFI Enabled
3,000,340 UART: [fht] FMC Alias Private Key: 7
3,107,991 UART: [art] Extend RT PCRs Done
3,108,419 UART: [art] Lock RT PCRs Done
3,109,741 UART: [art] Populate DV Done
3,117,920 UART: [fht] FMC Alias Private Key: 7
3,118,856 UART: [art] Derive CDI
3,119,136 UART: [art] Store in in slot 0x4
3,204,407 UART: [art] Derive Key Pair
3,204,767 UART: [art] Store priv key in slot 0x5
3,217,803 UART: [art] Derive Key Pair - Done
3,232,528 UART: [art] Signing Cert with AUTHO
3,233,008 UART: RITY.KEYID = 7
3,248,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,941 UART: [art] PUB.X = 46E4E05439E3CC1E709681A2D20BEF32CA21DB2C4EA4D1B15672F3165A0BF6DF1F6F2A9A4A69278A2CDDA6F820D3C600
3,255,699 UART: [art] PUB.Y = 52DCC5652BD107F39ABA0019C0AC25A14F00439621AB4FBA03D959D90B64CC3E7D6ECED3C05AB5717985A7B1A9CFE325
3,262,612 UART: [art] SIG.R = 141A06B4B05EEA3337A2E3E97164C221A3EF809173FC18C196B49F010D4E078FECAEF0B54610BD9B465B7F57B815DED9
3,269,380 UART: [art] SIG.S = FBFA7AA555D0661CB6E19B433AD1AB8529A8D1E62B8E456CD20164DC36892607E3F1B81248C774AAB18C0E9E41A52A66
3,293,230 UART: Caliptra RT
3,293,484 UART: [state] CFI Enabled
3,401,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,673 UART: [rt]cmd =0x46504c54, len=4
3,432,785 >>> mbox cmd response data (8 bytes)
3,432,786 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,462,475 UART: [rt]cmd =0x46504c67, len=4
3,463,575 >>> mbox cmd response: failed
3,463,857 UART: [rt] FIPS self test
3,464,188 UART: [kat] ++
3,464,340 UART: [kat] sha1
3,468,439 UART: [kat] SHA2-256
3,470,369 UART: [kat] SHA2-384
3,472,972 UART: [kat] SHA2-512-ACC
3,474,867 UART: [kat] ECC-384
3,484,398 UART: [kat] HMAC-384Kdf
3,488,909 UART: [kat] LMS
3,737,800 UART: [kat] --
4,425,235 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,853,391 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,335 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,892,563 UART: [rt]cmd =0x46504c67, len=4
5,893,792 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,644 UART: [kat] SHA2-256
892,582 UART: [kat] SHA2-384
895,385 UART: [kat] SHA2-512-ACC
897,286 UART: [kat] ECC-384
902,971 UART: [kat] HMAC-384Kdf
907,641 UART: [kat] LMS
1,475,837 UART: [kat] --
1,476,570 UART: [cold-reset] ++
1,477,100 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 ready_for_fw is high
1,481,170 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,371 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,791 UART: [idev] --
1,514,922 UART: [ldev] ++
1,515,090 UART: [ldev] CDI.KEYID = 6
1,515,453 UART: [ldev] SUBJECT.KEYID = 5
1,515,879 UART: [ldev] AUTHORITY.KEYID = 7
1,516,342 UART: [ldev] FE.KEYID = 1
1,521,718 UART: [ldev] Erasing FE.KEYID = 1
1,547,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,399 UART: [ldev] --
1,586,668 UART: [fwproc] Waiting for Commands...
1,587,411 UART: [fwproc] Received command 0x46574c44
1,588,202 UART: [fwproc] Received Image of size 114360 bytes
2,887,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,374 >>> mbox cmd response: success
3,079,374 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,080,498 UART: [afmc] ++
3,080,666 UART: [afmc] CDI.KEYID = 6
3,081,028 UART: [afmc] SUBJECT.KEYID = 7
3,081,453 UART: [afmc] AUTHORITY.KEYID = 5
3,116,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,145 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,835 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,650 UART: [afmc] --
3,159,692 UART: [cold-reset] --
3,160,554 UART: [state] Locking Datavault
3,161,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,313 UART: [state] Locking ICCM
3,162,873 UART: [exit] Launching FMC @ 0x40000130
3,168,202 UART:
3,168,218 UART: Running Caliptra FMC ...
3,168,626 UART:
3,168,769 UART: [state] CFI Enabled
3,179,568 UART: [fht] FMC Alias Private Key: 7
3,287,335 UART: [art] Extend RT PCRs Done
3,287,763 UART: [art] Lock RT PCRs Done
3,289,351 UART: [art] Populate DV Done
3,297,722 UART: [fht] FMC Alias Private Key: 7
3,298,760 UART: [art] Derive CDI
3,299,040 UART: [art] Store in in slot 0x4
3,384,591 UART: [art] Derive Key Pair
3,384,951 UART: [art] Store priv key in slot 0x5
3,398,009 UART: [art] Derive Key Pair - Done
3,413,193 UART: [art] Signing Cert with AUTHO
3,413,673 UART: RITY.KEYID = 7
3,429,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,766 UART: [art] PUB.X = 0E48D396DE26297431133117A998B9AF43E28E8505D984B3E938C664337A612893D6B63431ACD84AC6EC267D694FBEEC
3,436,528 UART: [art] PUB.Y = 6B3392F630C0F23280135FC768C04801C2CA77FB96AB6F957002590088DC858B9EAE58983BA12F177C8B3B7DB2BE2BBA
3,443,456 UART: [art] SIG.R = 75ABE1F2CDD7AC8737621755681580428FBD1515B0FC0FB141A0E0BA956BF2C152FFF5828AE5B8787D1CF450D337CFE5
3,450,235 UART: [art] SIG.S = 387245399D5BC5010D73BD132D2FD733FDC681E48BA6D86C441A46B49CD7191E92E0E36FF81514447F3A4A728586FFCD
3,474,124 UART: Caliptra RT
3,474,470 UART: [state] CFI Enabled
3,582,203 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,408 UART: [rt]cmd =0x46504c54, len=4
3,613,502 >>> mbox cmd response data (8 bytes)
3,613,503 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,642,920 UART: [rt]cmd =0x46504c67, len=4
3,643,894 >>> mbox cmd response: failed
3,644,242 UART: [rt] FIPS self test
3,644,573 UART: [kat] ++
3,644,725 UART: [kat] sha1
3,648,932 UART: [kat] SHA2-256
3,650,862 UART: [kat] SHA2-384
3,653,529 UART: [kat] SHA2-512-ACC
3,655,424 UART: [kat] ECC-384
3,664,791 UART: [kat] HMAC-384Kdf
3,669,452 UART: [kat] LMS
3,918,343 UART: [kat] --
4,712,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,141,991 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,143,644 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,866 UART: [rt]cmd =0x46504c67, len=4
6,173,911 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,854 ready_for_fw is high
1,362,854 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,931,022 >>> mbox cmd response: success
2,931,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,993,108 UART:
2,993,124 UART: Running Caliptra FMC ...
2,993,532 UART:
2,993,675 UART: [state] CFI Enabled
3,004,500 UART: [fht] FMC Alias Private Key: 7
3,111,795 UART: [art] Extend RT PCRs Done
3,112,223 UART: [art] Lock RT PCRs Done
3,113,765 UART: [art] Populate DV Done
3,122,188 UART: [fht] FMC Alias Private Key: 7
3,123,134 UART: [art] Derive CDI
3,123,414 UART: [art] Store in in slot 0x4
3,209,371 UART: [art] Derive Key Pair
3,209,731 UART: [art] Store priv key in slot 0x5
3,222,571 UART: [art] Derive Key Pair - Done
3,237,059 UART: [art] Signing Cert with AUTHO
3,237,539 UART: RITY.KEYID = 7
3,252,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,116 UART: [art] PUB.X = CA421E2B1DEE3F9B0A6563F841B42F4421ED531F52C29C2CBE752DF98823FD678F78C6645B00D5F46E4F631C9CBDC0B2
3,259,875 UART: [art] PUB.Y = 15AF397E3E0784AF8C07918819071FEDA4DD1FF8A966424E17855003CA9BF40B1EDECE9EACD97927C861DE6947858883
3,266,816 UART: [art] SIG.R = 9B616F9B37CC59B93EA426525EF786F35D126663A364549AD229C8B4F3CD22A7A5139FC0A2AC976C06EDD11BA8029C09
3,273,583 UART: [art] SIG.S = 71D67B8891D9DF0F12B3B3A1045ADC43E8E572A4D5E2024B10F619698EE1CBEC2B82D04E8F17D329AD0B91B58B9BACDF
3,297,854 UART: Caliptra RT
3,298,200 UART: [state] CFI Enabled
3,406,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,091 UART: [rt]cmd =0x46504c54, len=4
3,438,335 >>> mbox cmd response data (8 bytes)
3,438,336 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,467,903 UART: [rt]cmd =0x46504c67, len=4
3,468,815 >>> mbox cmd response: failed
3,468,955 UART: [rt] FIPS self test
3,469,286 UART: [kat] ++
3,469,438 UART: [kat] sha1
3,473,585 UART: [kat] SHA2-256
3,475,515 UART: [kat] SHA2-384
3,478,158 UART: [kat] SHA2-512-ACC
3,480,053 UART: [kat] ECC-384
3,489,700 UART: [kat] HMAC-384Kdf
3,494,409 UART: [kat] LMS
3,743,300 UART: [kat] --
4,430,721 UART: ROM Digest: 6D02FB958125550A641546C1DDE5A31A6E4AC8F9C54CDB38DA4815295B533ADD
5,859,927 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,868,575 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,897,943 UART: [rt]cmd =0x46504c67, len=4
5,899,076 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,844 UART: [kat] HMAC-384Kdf
922,222 UART: [kat] LMS
1,170,550 UART: [kat] --
1,171,605 UART: [cold-reset] ++
1,172,017 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 ready_for_fw is high
1,176,103 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,866 UART: [idev] Erasing UDS.KEYID = 0
1,200,959 UART: [idev] Sha1 KeyId Algorithm
1,209,513 UART: [idev] --
1,210,645 UART: [ldev] ++
1,210,813 UART: [ldev] CDI.KEYID = 6
1,211,176 UART: [ldev] SUBJECT.KEYID = 5
1,211,602 UART: [ldev] AUTHORITY.KEYID = 7
1,212,065 UART: [ldev] FE.KEYID = 1
1,217,431 UART: [ldev] Erasing FE.KEYID = 1
1,243,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,783 UART: [ldev] --
1,283,066 UART: [fwproc] Wait for Commands...
1,283,722 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,582 >>> mbox cmd response: success
2,775,582 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,776,812 UART: [afmc] ++
2,776,980 UART: [afmc] CDI.KEYID = 6
2,777,342 UART: [afmc] SUBJECT.KEYID = 7
2,777,767 UART: [afmc] AUTHORITY.KEYID = 5
2,813,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,715 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,617 UART: [afmc] --
2,856,565 UART: [cold-reset] --
2,857,525 UART: [state] Locking Datavault
2,858,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,414 UART: [state] Locking ICCM
2,860,050 UART: [exit] Launching FMC @ 0x40000130
2,865,379 UART:
2,865,395 UART: Running Caliptra FMC ...
2,865,803 UART:
2,865,857 UART: [state] CFI Enabled
2,876,466 UART: [fht] FMC Alias Private Key: 7
2,985,051 UART: [art] Extend RT PCRs Done
2,985,479 UART: [art] Lock RT PCRs Done
2,986,889 UART: [art] Populate DV Done
2,994,920 UART: [fht] FMC Alias Private Key: 7
2,996,066 UART: [art] Derive CDI
2,996,346 UART: [art] Store in in slot 0x4
3,081,959 UART: [art] Derive Key Pair
3,082,319 UART: [art] Store priv key in slot 0x5
3,095,181 UART: [art] Derive Key Pair - Done
3,110,187 UART: [art] Signing Cert with AUTHO
3,110,667 UART: RITY.KEYID = 7
3,125,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,678 UART: [art] PUB.X = CB816A304EF77ECAE60F8E6C69BBCA17F37FF54E1903D31E9AAFE0274B2D758CC892506CE6AA27880B1FF0892F5CBE94
3,133,459 UART: [art] PUB.Y = BA0D64C63066F282DFFB79406F363A7322DC77F34E038827268498D079C2F31A6BDF800E5916EACBE78C238233798BF2
3,140,400 UART: [art] SIG.R = 7C10C3C7CF503157201E35C428DC145383CE42226DEBB0BDC450188262BE60272370E5704A4E23C8204DF482B9974FBE
3,147,168 UART: [art] SIG.S = BD34B95176E30FD9BA5761D7736E075566B165581321B521841B18C45595830784B580DE7DDD6733FCE772DD79974225
3,171,052 UART: Caliptra RT
3,171,306 UART: [state] CFI Enabled
3,278,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,077 UART: [rt]cmd =0x46504c54, len=4
3,310,161 >>> mbox cmd response data (8 bytes)
3,310,162 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,339,705 UART: [rt]cmd =0x46504c67, len=4
3,340,745 >>> mbox cmd response: failed
3,341,069 UART: [rt] FIPS self test
3,341,400 UART: [kat] ++
3,341,552 UART: [kat] sha1
3,345,909 UART: [kat] SHA2-256
3,347,839 UART: [kat] SHA2-384
3,350,544 UART: [kat] SHA2-512-ACC
3,352,439 UART: [kat] ECC-384
3,361,746 UART: [kat] HMAC-384Kdf
3,366,375 UART: [kat] LMS
3,615,266 UART: [kat] --
4,419,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,848,424 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,850,494 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,952 UART: [rt]cmd =0x46504c67, len=4
5,881,085 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,197 ready_for_fw is high
1,060,197 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,625,149 >>> mbox cmd response: success
2,625,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,687,203 UART:
2,687,219 UART: Running Caliptra FMC ...
2,687,627 UART:
2,687,681 UART: [state] CFI Enabled
2,698,420 UART: [fht] FMC Alias Private Key: 7
2,806,099 UART: [art] Extend RT PCRs Done
2,806,527 UART: [art] Lock RT PCRs Done
2,808,017 UART: [art] Populate DV Done
2,816,482 UART: [fht] FMC Alias Private Key: 7
2,817,496 UART: [art] Derive CDI
2,817,776 UART: [art] Store in in slot 0x4
2,903,543 UART: [art] Derive Key Pair
2,903,903 UART: [art] Store priv key in slot 0x5
2,916,883 UART: [art] Derive Key Pair - Done
2,931,754 UART: [art] Signing Cert with AUTHO
2,932,234 UART: RITY.KEYID = 7
2,947,590 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,355 UART: [art] PUB.X = 527943870F774F28A35DCD2092235ECC693FD97DE825772BEE8192E0168A4773BFFD419972FCA08ACF4E493911F83991
2,955,120 UART: [art] PUB.Y = 9A0F83C2BB64099A5ED0A4E50EEC6B27463A55B7AF3F40DFCD53E9BD1B348B4FCA8039C32CEFC5BB89BEB51BB662609E
2,962,087 UART: [art] SIG.R = 09C856A8D887556AC77C2CFC809CAAA65B93E2313EBEEB2F1CFEB34C99BEE8D2BA63A7DE3C105CB05BC49B772A256E6E
2,968,880 UART: [art] SIG.S = 5F350900296ACE1F9167811242AC336B19B0C55FF2BF2FC7BD56962579258B5BA02CF95A83C574D082DD70DDBF90870A
2,992,171 UART: Caliptra RT
2,992,425 UART: [state] CFI Enabled
3,099,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,256 UART: [rt]cmd =0x46504c54, len=4
3,130,518 >>> mbox cmd response data (8 bytes)
3,130,519 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,160,176 UART: [rt]cmd =0x46504c67, len=4
3,161,330 >>> mbox cmd response: failed
3,161,562 UART: [rt] FIPS self test
3,161,893 UART: [kat] ++
3,162,045 UART: [kat] sha1
3,166,276 UART: [kat] SHA2-256
3,168,206 UART: [kat] SHA2-384
3,170,789 UART: [kat] SHA2-512-ACC
3,172,684 UART: [kat] ECC-384
3,182,319 UART: [kat] HMAC-384Kdf
3,186,906 UART: [kat] LMS
3,435,797 UART: [kat] --
4,134,776 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,562,865 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,571,089 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,600,219 UART: [rt]cmd =0x46504c67, len=4
5,601,502 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
893,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,458 UART: [kat] ++
897,610 UART: [kat] sha1
901,624 UART: [kat] SHA2-256
903,564 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
917,915 UART: [kat] HMAC-384Kdf
922,545 UART: [kat] LMS
1,170,873 UART: [kat] --
1,171,630 UART: [cold-reset] ++
1,172,130 UART: [fht] FHT @ 0x50003400
1,174,739 UART: [idev] ++
1,174,907 UART: [idev] CDI.KEYID = 6
1,175,267 UART: [idev] SUBJECT.KEYID = 7
1,175,691 UART: [idev] UDS.KEYID = 0
1,176,036 ready_for_fw is high
1,176,036 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,183,875 UART: [idev] Erasing UDS.KEYID = 0
1,201,136 UART: [idev] Sha1 KeyId Algorithm
1,209,724 UART: [idev] --
1,210,870 UART: [ldev] ++
1,211,038 UART: [ldev] CDI.KEYID = 6
1,211,401 UART: [ldev] SUBJECT.KEYID = 5
1,211,827 UART: [ldev] AUTHORITY.KEYID = 7
1,212,290 UART: [ldev] FE.KEYID = 1
1,217,706 UART: [ldev] Erasing FE.KEYID = 1
1,244,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,812 UART: [ldev] --
1,284,105 UART: [fwproc] Wait for Commands...
1,284,927 UART: [fwproc] Recv command 0x46574c44
1,285,655 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,893 >>> mbox cmd response: success
2,775,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,776,999 UART: [afmc] ++
2,777,167 UART: [afmc] CDI.KEYID = 6
2,777,529 UART: [afmc] SUBJECT.KEYID = 7
2,777,954 UART: [afmc] AUTHORITY.KEYID = 5
2,812,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,004 UART: [afmc] --
2,856,112 UART: [cold-reset] --
2,857,054 UART: [state] Locking Datavault
2,858,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,781 UART: [state] Locking ICCM
2,859,315 UART: [exit] Launching FMC @ 0x40000130
2,864,644 UART:
2,864,660 UART: Running Caliptra FMC ...
2,865,068 UART:
2,865,211 UART: [state] CFI Enabled
2,875,866 UART: [fht] FMC Alias Private Key: 7
2,983,389 UART: [art] Extend RT PCRs Done
2,983,817 UART: [art] Lock RT PCRs Done
2,984,937 UART: [art] Populate DV Done
2,993,122 UART: [fht] FMC Alias Private Key: 7
2,994,290 UART: [art] Derive CDI
2,994,570 UART: [art] Store in in slot 0x4
3,080,483 UART: [art] Derive Key Pair
3,080,843 UART: [art] Store priv key in slot 0x5
3,094,541 UART: [art] Derive Key Pair - Done
3,109,150 UART: [art] Signing Cert with AUTHO
3,109,630 UART: RITY.KEYID = 7
3,124,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,467 UART: [art] PUB.X = F7F1E5990103F097292882057000B70A57674B7BD1099F6EA912484D285AE1C76C16E43EC3FD659DBC17887EDBC1261E
3,132,198 UART: [art] PUB.Y = 0282FE1DDE3F7577A183A24A7D8CF08A5FC6CAA86B53A91B4E57DF9203AD89E31627ECEAC4B24E507F4CC0799422C9C5
3,139,158 UART: [art] SIG.R = F8B05783701345F2C0CC37B800D94E532A26E0E3AE5AFA8A25EC5D54F49CA3BD2657B8AE25751C6ADD4E3627ED752772
3,145,916 UART: [art] SIG.S = 1CAF80749598D7B983CCDDCE19AE4B1BE443C58856884590CE77E05DE6B9FF7E0385BE9974986FCA44B36D452CE4B407
3,169,675 UART: Caliptra RT
3,170,021 UART: [state] CFI Enabled
3,278,357 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,372 UART: [rt]cmd =0x46504c54, len=4
3,309,608 >>> mbox cmd response data (8 bytes)
3,309,609 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,339,226 UART: [rt]cmd =0x46504c67, len=4
3,340,216 >>> mbox cmd response: failed
3,340,570 UART: [rt] FIPS self test
3,340,901 UART: [kat] ++
3,341,053 UART: [kat] sha1
3,345,174 UART: [kat] SHA2-256
3,347,104 UART: [kat] SHA2-384
3,349,773 UART: [kat] SHA2-512-ACC
3,351,668 UART: [kat] ECC-384
3,361,567 UART: [kat] HMAC-384Kdf
3,366,180 UART: [kat] LMS
3,615,071 UART: [kat] --
4,419,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,847,199 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,965 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,125 UART: [rt]cmd =0x46504c67, len=4
5,880,308 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,370 ready_for_fw is high
1,060,370 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,626,040 >>> mbox cmd response: success
2,626,040 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,646 UART:
2,688,662 UART: Running Caliptra FMC ...
2,689,070 UART:
2,689,213 UART: [state] CFI Enabled
2,700,244 UART: [fht] FMC Alias Private Key: 7
2,808,663 UART: [art] Extend RT PCRs Done
2,809,091 UART: [art] Lock RT PCRs Done
2,810,713 UART: [art] Populate DV Done
2,819,000 UART: [fht] FMC Alias Private Key: 7
2,820,020 UART: [art] Derive CDI
2,820,300 UART: [art] Store in in slot 0x4
2,906,047 UART: [art] Derive Key Pair
2,906,407 UART: [art] Store priv key in slot 0x5
2,919,559 UART: [art] Derive Key Pair - Done
2,934,202 UART: [art] Signing Cert with AUTHO
2,934,682 UART: RITY.KEYID = 7
2,949,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,679 UART: [art] PUB.X = C8E68F73161405E421E500F0D0FC4DC23C6E30A14842AC5CAFD00D5E817BA12C31553E6A51365094234E4170B6AA4F7A
2,957,425 UART: [art] PUB.Y = 23E80DEAD44FD0589D30839A8607FA274A4A0EE43F97F2450852674096E780DBF799D9C457253532177B2178F94496B5
2,964,353 UART: [art] SIG.R = 2D93D12EEFD7F74DF03F8041F3841A64FC88B18E0598DC255F158667DA5EAA3791FB4F0A0B41FADD1C53A2DEC79AB9B3
2,971,134 UART: [art] SIG.S = 9FF311F70DA7ECD4FD97D1286D02CDFC058B4D9B3FEF1684EF2424B9B2CE2E5BF2EABD3B681F093E570B015D92B914D0
2,994,987 UART: Caliptra RT
2,995,333 UART: [state] CFI Enabled
3,102,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,046 UART: [rt]cmd =0x46504c54, len=4
3,134,230 >>> mbox cmd response data (8 bytes)
3,134,231 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,164,026 UART: [rt]cmd =0x46504c67, len=4
3,165,074 >>> mbox cmd response: failed
3,165,324 UART: [rt] FIPS self test
3,165,655 UART: [kat] ++
3,165,807 UART: [kat] sha1
3,169,944 UART: [kat] SHA2-256
3,171,874 UART: [kat] SHA2-384
3,174,613 UART: [kat] SHA2-512-ACC
3,176,508 UART: [kat] ECC-384
3,186,109 UART: [kat] HMAC-384Kdf
3,190,672 UART: [kat] LMS
3,439,563 UART: [kat] --
4,138,626 UART: ROM Digest: 37F8F863A2B563757DB9CAEC87B5C901765515E0AC61FE6F8DA766B262638702
5,566,245 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,574,833 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,604,325 UART: [rt]cmd =0x46504c67, len=4
5,605,470 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,174,107 ready_for_fw is high
1,174,107 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,440 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,529 UART: [fwproc] Recv command 0x46574c44
1,282,262 UART: [fwproc] Recv'd Img size: 114360 bytes
2,579,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,772,722 >>> mbox cmd response: success
2,772,722 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,773,773 UART: [afmc] ++
2,773,941 UART: [afmc] CDI.KEYID = 6
2,774,304 UART: [afmc] SUBJECT.KEYID = 7
2,774,730 UART: [afmc] AUTHORITY.KEYID = 5
2,809,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,568 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,134 UART: [afmc] --
2,853,134 UART: [cold-reset] --
2,853,880 UART: [state] Locking Datavault
2,855,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,671 UART: [state] Locking ICCM
2,856,229 UART: [exit] Launching FMC @ 0x40000130
2,861,558 UART:
2,861,574 UART: Running Caliptra FMC ...
2,861,982 UART:
2,862,036 UART: [state] CFI Enabled
2,872,621 UART: [fht] FMC Alias Private Key: 7
2,980,510 UART: [art] Extend RT PCRs Done
2,980,938 UART: [art] Lock RT PCRs Done
2,982,332 UART: [art] Populate DV Done
2,990,693 UART: [fht] FMC Alias Private Key: 7
2,991,789 UART: [art] Derive CDI
2,992,069 UART: [art] Store in in slot 0x4
3,077,778 UART: [art] Derive Key Pair
3,078,138 UART: [art] Store priv key in slot 0x5
3,091,600 UART: [art] Derive Key Pair - Done
3,106,305 UART: [art] Signing Cert with AUTHO
3,106,785 UART: RITY.KEYID = 7
3,121,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,764 UART: [art] PUB.X = 7815B52A26131E0120BE8A610431ED5B3C94CDE8F5F775BEC2C4AD6FE57FF8B4D65A1CE3088EA97231D7CD5E4FA78B66
3,129,541 UART: [art] PUB.Y = F3D7E86307F3A8B95964D0B313837EA5F590FA9272DEF19AAD6D9F8892E04C05741720014B81965B8D4524AABCC460C4
3,136,484 UART: [art] SIG.R = 0CFC6B3486F42BCB073CA1FE7D9B02A37ED351023F58D49A531800F27ED8E5A2D5394AE2735CE701D0820B69DE236AAF
3,143,226 UART: [art] SIG.S = 66F47D982901D0204EB0A23BAFC192B92E69074EE3B3248999A37E64A188FAE4A489C8DC42C4A4031C2C89C52CDE8D28
3,166,244 UART: Caliptra RT
3,166,498 UART: [state] CFI Enabled
3,274,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,601 UART: [rt]cmd =0x46504c54, len=4
3,305,677 >>> mbox cmd response data (8 bytes)
3,305,678 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,335,301 UART: [rt]cmd =0x46504c67, len=4
3,336,153 >>> mbox cmd response: failed
3,336,411 UART: [rt] FIPS self test
3,336,742 UART: [kat] ++
3,336,894 UART: [kat] sha1
3,341,003 UART: [kat] SHA2-256
3,342,933 UART: [kat] SHA2-384
3,345,798 UART: [kat] SHA2-512-ACC
3,347,693 UART: [kat] ECC-384
3,357,368 UART: [kat] HMAC-384Kdf
3,361,965 UART: [kat] LMS
3,610,856 UART: [kat] --
4,412,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,841,338 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,845,902 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,232 UART: [rt]cmd =0x46504c67, len=4
5,876,303 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,826 ready_for_fw is high
1,055,826 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,250 >>> mbox cmd response: success
2,622,250 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,685,168 UART:
2,685,184 UART: Running Caliptra FMC ...
2,685,592 UART:
2,685,646 UART: [state] CFI Enabled
2,696,039 UART: [fht] FMC Alias Private Key: 7
2,803,648 UART: [art] Extend RT PCRs Done
2,804,076 UART: [art] Lock RT PCRs Done
2,805,654 UART: [art] Populate DV Done
2,813,895 UART: [fht] FMC Alias Private Key: 7
2,815,013 UART: [art] Derive CDI
2,815,293 UART: [art] Store in in slot 0x4
2,901,066 UART: [art] Derive Key Pair
2,901,426 UART: [art] Store priv key in slot 0x5
2,914,618 UART: [art] Derive Key Pair - Done
2,929,333 UART: [art] Signing Cert with AUTHO
2,929,813 UART: RITY.KEYID = 7
2,944,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,490 UART: [art] PUB.X = 3819E351499163A7CF96E780DCE2DC471143D2752FA2AE69C43BADEEF783F174538A5C9E82C82CAC69B1E0AC7A4FC077
2,952,272 UART: [art] PUB.Y = BA617052D597EC401DE492292FC094427074A485ACE069DB70A6D87E4829D40479BE47FD1C6CD419A1561CC8DCB4315D
2,959,223 UART: [art] SIG.R = 59816AEE3DE82CF17BC9D3BC56F81BCBDBC1B465C834E45985E7396F3523899117591CF8D2DB2F2F6C3FD97EB8F0F803
2,966,004 UART: [art] SIG.S = 2D88C929C27D5133AE452D371A12FDE46CF7CA0CEA61A93649ED8F04B35F14C96B5F6345B9966B2EADE157EE5F5E78C1
2,989,577 UART: Caliptra RT
2,989,831 UART: [state] CFI Enabled
3,097,767 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,920 UART: [rt]cmd =0x46504c54, len=4
3,129,112 >>> mbox cmd response data (8 bytes)
3,129,113 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,158,698 UART: [rt]cmd =0x46504c67, len=4
3,159,500 >>> mbox cmd response: failed
3,159,652 UART: [rt] FIPS self test
3,159,983 UART: [kat] ++
3,160,135 UART: [kat] sha1
3,164,514 UART: [kat] SHA2-256
3,166,444 UART: [kat] SHA2-384
3,169,283 UART: [kat] SHA2-512-ACC
3,171,178 UART: [kat] ECC-384
3,181,045 UART: [kat] HMAC-384Kdf
3,185,630 UART: [kat] LMS
3,434,521 UART: [kat] --
4,129,426 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,557,579 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,559,260 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,730 UART: [rt]cmd =0x46504c67, len=4
5,589,887 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
891,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,972 UART: [kat] ++
896,124 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,347 UART: [kat] LMS
1,169,659 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,174,846 ready_for_fw is high
1,174,846 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,962 UART: [idev] Sha1 KeyId Algorithm
1,208,842 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,029 UART: [ldev] --
1,282,387 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,903 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,774,023 >>> mbox cmd response: success
2,774,023 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,775,212 UART: [afmc] ++
2,775,380 UART: [afmc] CDI.KEYID = 6
2,775,743 UART: [afmc] SUBJECT.KEYID = 7
2,776,169 UART: [afmc] AUTHORITY.KEYID = 5
2,811,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,374 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,671 UART: [afmc] --
2,854,675 UART: [cold-reset] --
2,855,345 UART: [state] Locking Datavault
2,856,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,210 UART: [state] Locking ICCM
2,857,770 UART: [exit] Launching FMC @ 0x40000130
2,863,099 UART:
2,863,115 UART: Running Caliptra FMC ...
2,863,523 UART:
2,863,666 UART: [state] CFI Enabled
2,874,177 UART: [fht] FMC Alias Private Key: 7
2,982,062 UART: [art] Extend RT PCRs Done
2,982,490 UART: [art] Lock RT PCRs Done
2,984,166 UART: [art] Populate DV Done
2,992,353 UART: [fht] FMC Alias Private Key: 7
2,993,471 UART: [art] Derive CDI
2,993,751 UART: [art] Store in in slot 0x4
3,079,798 UART: [art] Derive Key Pair
3,080,158 UART: [art] Store priv key in slot 0x5
3,093,802 UART: [art] Derive Key Pair - Done
3,108,477 UART: [art] Signing Cert with AUTHO
3,108,957 UART: RITY.KEYID = 7
3,124,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,222 UART: [art] PUB.X = EBCACC72AC0A977656C20FE913FF585FD1EEFFF9C28B29B8B30C9DD86336F4ABDD0D025D3B60C615FFA93DC3BAC2210A
3,132,004 UART: [art] PUB.Y = E8BD9791C355121CF8E704B39BBC74903AEB95C77BA7F463C4B71347E596F01DE6D052D95977CC3A381F1D1A8DD44A53
3,138,959 UART: [art] SIG.R = 888488CAA6C67581507F4366E9277FC8F8986E0E4C5A93C3E4F780875E45B386C9C1A11D29CC2262C05991D6B3DFAA21
3,145,726 UART: [art] SIG.S = 924DE0AA5313FDCEB1D98996515A499FC180339AAD080DC01478D000E20082334AEE8719F8FB4C58DFB92C484DA75BEC
3,169,375 UART: Caliptra RT
3,169,721 UART: [state] CFI Enabled
3,277,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,759 UART: [rt]cmd =0x46504c54, len=4
3,309,049 >>> mbox cmd response data (8 bytes)
3,309,050 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,891 UART: [rt]cmd =0x46504c67, len=4
3,339,763 >>> mbox cmd response: failed
3,339,879 UART: [rt] FIPS self test
3,340,210 UART: [kat] ++
3,340,362 UART: [kat] sha1
3,344,499 UART: [kat] SHA2-256
3,346,429 UART: [kat] SHA2-384
3,349,162 UART: [kat] SHA2-512-ACC
3,351,057 UART: [kat] ECC-384
3,360,520 UART: [kat] HMAC-384Kdf
3,365,281 UART: [kat] LMS
3,614,172 UART: [kat] --
4,416,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,845,340 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,849,512 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,862 UART: [rt]cmd =0x46504c67, len=4
5,879,859 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,995 ready_for_fw is high
1,055,995 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,623,127 >>> mbox cmd response: success
2,623,127 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,685,925 UART:
2,685,941 UART: Running Caliptra FMC ...
2,686,349 UART:
2,686,492 UART: [state] CFI Enabled
2,697,049 UART: [fht] FMC Alias Private Key: 7
2,804,156 UART: [art] Extend RT PCRs Done
2,804,584 UART: [art] Lock RT PCRs Done
2,806,182 UART: [art] Populate DV Done
2,814,447 UART: [fht] FMC Alias Private Key: 7
2,815,449 UART: [art] Derive CDI
2,815,729 UART: [art] Store in in slot 0x4
2,901,742 UART: [art] Derive Key Pair
2,902,102 UART: [art] Store priv key in slot 0x5
2,915,288 UART: [art] Derive Key Pair - Done
2,930,038 UART: [art] Signing Cert with AUTHO
2,930,518 UART: RITY.KEYID = 7
2,945,792 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,557 UART: [art] PUB.X = CFCD515CB834CD173B5BCE5D2485125AA9AA194493D1FE1EF689FC1B6166DA579A354AB8825C4C51CF3D1ED64C0DD247
2,953,342 UART: [art] PUB.Y = 2C98B09B59F514CFCBCA62B3192F0CE6BE8CFA62A62365D59E51133049A2A683B1AC0B24FF014150E49A17F6F0B09B51
2,960,293 UART: [art] SIG.R = A0865FCEC6B88F9B45415EBFB6A40CA6284E74CDF46030BE90341513F7EF9F1C6FD5CBD3CA68E5F363688B4790D4CD89
2,967,076 UART: [art] SIG.S = 18A7CBFB83FAE57FC440FB6AA3973A9617BDB4E621F5A33AC9544EEC22896C8D5760E16E28AFA9E387E02F5FCE7C482C
2,990,799 UART: Caliptra RT
2,991,145 UART: [state] CFI Enabled
3,098,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,434 UART: [rt]cmd =0x46504c54, len=4
3,129,608 >>> mbox cmd response data (8 bytes)
3,129,609 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,159,298 UART: [rt]cmd =0x46504c67, len=4
3,160,420 >>> mbox cmd response: failed
3,160,550 UART: [rt] FIPS self test
3,160,881 UART: [kat] ++
3,161,033 UART: [kat] sha1
3,165,420 UART: [kat] SHA2-256
3,167,350 UART: [kat] SHA2-384
3,169,951 UART: [kat] SHA2-512-ACC
3,171,846 UART: [kat] ECC-384
3,181,393 UART: [kat] HMAC-384Kdf
3,185,776 UART: [kat] LMS
3,434,667 UART: [kat] --
4,129,438 UART: ROM Digest: E4CA4EF0B668720123D4CB8DF642EA513279D193E6CB510FEDDB742E86CCDC80
5,556,819 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,560,180 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,438 UART: [rt]cmd =0x46504c67, len=4
5,590,481 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,226 UART:
192,576 UART: Running Caliptra ROM ...
193,720 UART:
193,874 UART: [state] CFI Enabled
265,176 UART: [state] LifecycleState = Unprovisioned
267,114 UART: [state] DebugLocked = No
269,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,478 UART: [kat] SHA2-256
444,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,697 UART: [kat] ++
455,181 UART: [kat] sha1
466,307 UART: [kat] SHA2-256
468,977 UART: [kat] SHA2-384
475,286 UART: [kat] SHA2-512-ACC
477,689 UART: [kat] ECC-384
2,766,395 UART: [kat] HMAC-384Kdf
2,777,400 UART: [kat] LMS
3,967,697 UART: [kat] --
3,973,020 UART: [cold-reset] ++
3,975,557 UART: [fht] Storing FHT @ 0x50003400
3,987,742 UART: [idev] ++
3,988,367 UART: [idev] CDI.KEYID = 6
3,989,259 UART: [idev] SUBJECT.KEYID = 7
3,990,478 UART: [idev] UDS.KEYID = 0
3,991,620 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,011,284 UART: [idev] Erasing UDS.KEYID = 0
7,322,015 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,725 UART: [idev] --
7,348,978 UART: [ldev] ++
7,349,558 UART: [ldev] CDI.KEYID = 6
7,350,527 UART: [ldev] SUBJECT.KEYID = 5
7,351,744 UART: [ldev] AUTHORITY.KEYID = 7
7,352,994 UART: [ldev] FE.KEYID = 1
7,380,010 UART: [ldev] Erasing FE.KEYID = 1
10,709,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,004,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,018,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,033,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,048,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,066,421 UART: [ldev] --
13,070,663 UART: [fwproc] Waiting for Commands...
13,072,658 UART: [fwproc] Received command 0x46505652
13,075,063 UART: [rt] FIPS Version
13,076,738 >>> mbox cmd response data (36 bytes)
15,296,946 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,441,575 UART: [fwproc] Received command 0x46574c44
15,443,892 UART: [fwproc] Received Image of size 114036 bytes
19,494,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,572,557 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,641,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
19,959,290 >>> mbox cmd response: success
19,959,656 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,964,005 UART: [afmc] ++
19,964,592 UART: [afmc] CDI.KEYID = 6
19,965,515 UART: [afmc] SUBJECT.KEYID = 7
19,966,731 UART: [afmc] AUTHORITY.KEYID = 5
23,336,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,632,327 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,634,590 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,648,987 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,663,858 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,678,332 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,700,788 UART: [afmc] --
25,704,437 UART: [cold-reset] --
25,709,060 UART: [state] Locking Datavault
25,716,153 UART: [state] Locking PCR0, PCR1 and PCR31
25,717,909 UART: [state] Locking ICCM
25,720,115 UART: [exit] Launching FMC @ 0x40000130
25,728,515 UART:
25,728,761 UART: Running Caliptra FMC ...
25,729,868 UART:
25,730,026 UART: [state] CFI Enabled
25,792,262 UART: [fht] FMC Alias Private Key: 7
28,129,939 UART: [art] Extend RT PCRs Done
28,131,206 UART: [art] Lock RT PCRs Done
28,132,754 UART: [art] Populate DV Done
28,138,196 UART: [fht] FMC Alias Private Key: 7
28,139,724 UART: [art] Derive CDI
28,140,462 UART: [art] Store in in slot 0x4
28,200,504 UART: [art] Derive Key Pair
28,201,504 UART: [art] Store priv key in slot 0x5
31,494,154 UART: [art] Derive Key Pair - Done
31,506,772 UART: [art] Signing Cert with AUTHO
31,508,099 UART: RITY.KEYID = 7
33,794,732 UART: [art] Erasing AUTHORITY.KEYID = 7
33,796,252 UART: [art] PUB.X = 4C3ECD37450C69A4B03C898A88430476A1BD303A728752BD580A4CA8A51CB1931F7DB1A8EC7A88DEC51E34036799465D
33,803,515 UART: [art] PUB.Y = 08F4AEC70A327E37D79E0BF8D1D6FADB0FADDF6D2BA3F19242A7B2C482D37AFD30072F16B32FD908315C0BA97E07F066
33,810,771 UART: [art] SIG.R = 3FBCA111894E9F4597805BA848D9537B4033A668108B778672A334BFB56C8F2B4C0D7F673157401FFDADEDA2304B10FA
33,818,324 UART: [art] SIG.S = 4AB2C8663D7DE378518FCA0156D9472E0B7E4749BAE16857C2CA098867644D0201C83049DBCAF700961EF706EE53718A
35,123,005 UART: Caliptra RT
35,123,719 UART: [state] CFI Enabled
35,285,014 UART: [rt] RT listening for mailbox commands...
35,316,258 UART: [rt]cmd =0x46505652, len=4
35,317,567 UART: [rt] FIPS Version
35,318,678 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,785,593 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,846,056 >>> mbox cmd response data (36 bytes)
15,069,720 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,237,407 >>> mbox cmd response: success
20,237,880 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,928,533 UART:
25,929,080 UART: Running Caliptra FMC ...
25,930,230 UART:
25,930,392 UART: [state] CFI Enabled
25,992,513 UART: [fht] FMC Alias Private Key: 7
28,330,694 UART: [art] Extend RT PCRs Done
28,331,916 UART: [art] Lock RT PCRs Done
28,333,648 UART: [art] Populate DV Done
28,339,007 UART: [fht] FMC Alias Private Key: 7
28,340,555 UART: [art] Derive CDI
28,341,289 UART: [art] Store in in slot 0x4
28,400,785 UART: [art] Derive Key Pair
28,401,789 UART: [art] Store priv key in slot 0x5
31,694,737 UART: [art] Derive Key Pair - Done
31,707,795 UART: [art] Signing Cert with AUTHO
31,709,099 UART: RITY.KEYID = 7
33,996,283 UART: [art] Erasing AUTHORITY.KEYID = 7
33,997,798 UART: [art] PUB.X = D175194215588EA315F85E6B09AA457BDD0C1DA726FFE22A0CC429338DF79E86C43E58D90DF7AE384E1ABBBEE34E2FC4
34,005,058 UART: [art] PUB.Y = B08B9F459359011725685F61C405E5B95B9DA954F8264DF549C53C8AE5E59CDD0F776C91688F4A2D2720082E8425FE1A
34,012,307 UART: [art] SIG.R = E1E1495EAF44F1A0F4003F3162110090F4609CAB32AB434BA2EC45E9B17F9A8DEADE98B2FA0A74C80611C8D092D15101
34,019,685 UART: [art] SIG.S = E0CCAB4655CB08B5D8F3D429D80DEDEAC8C65301CA3C330CEBF7390C4EF2C1E240FC00E2597005DEF5C31EDCC05ECB41
35,324,930 UART: Caliptra RT
35,325,630 UART: [state] CFI Enabled
35,486,574 UART: [rt] RT listening for mailbox commands...
35,517,505 UART: [rt]cmd =0x46505652, len=4
35,518,807 UART: [rt] FIPS Version
35,520,231 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,507 UART:
192,877 UART: Running Caliptra ROM ...
194,027 UART:
603,870 UART: [state] CFI Enabled
620,825 UART: [state] LifecycleState = Unprovisioned
622,740 UART: [state] DebugLocked = No
625,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,620 UART: [kat] SHA2-256
799,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,899 UART: [kat] ++
810,492 UART: [kat] sha1
822,624 UART: [kat] SHA2-256
825,326 UART: [kat] SHA2-384
831,355 UART: [kat] SHA2-512-ACC
833,694 UART: [kat] ECC-384
3,117,162 UART: [kat] HMAC-384Kdf
3,128,529 UART: [kat] LMS
4,318,664 UART: [kat] --
4,324,041 UART: [cold-reset] ++
4,325,498 UART: [fht] Storing FHT @ 0x50003400
4,336,670 UART: [idev] ++
4,337,233 UART: [idev] CDI.KEYID = 6
4,338,198 UART: [idev] SUBJECT.KEYID = 7
4,339,412 UART: [idev] UDS.KEYID = 0
4,340,594 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,354,962 UART: [idev] Erasing UDS.KEYID = 0
7,628,895 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,601 UART: [idev] --
7,655,161 UART: [ldev] ++
7,655,737 UART: [ldev] CDI.KEYID = 6
7,656,701 UART: [ldev] SUBJECT.KEYID = 5
7,657,914 UART: [ldev] AUTHORITY.KEYID = 7
7,659,148 UART: [ldev] FE.KEYID = 1
7,669,417 UART: [ldev] Erasing FE.KEYID = 1
10,955,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,881 UART: [ldev] --
13,315,611 UART: [fwproc] Waiting for Commands...
13,317,333 UART: [fwproc] Received command 0x46505652
13,319,743 UART: [rt] FIPS Version
13,321,361 >>> mbox cmd response data (36 bytes)
15,538,725 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
15,683,526 UART: [fwproc] Received command 0x46574c44
15,685,847 UART: [fwproc] Received Image of size 114036 bytes
19,736,867 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,816,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,885,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 89332
20,202,847 >>> mbox cmd response: success
20,203,211 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,207,553 UART: [afmc] ++
20,208,131 UART: [afmc] CDI.KEYID = 6
20,209,042 UART: [afmc] SUBJECT.KEYID = 7
20,210,320 UART: [afmc] AUTHORITY.KEYID = 5
23,525,311 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,817,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,819,869 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,834,228 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,849,084 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,863,538 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,885,334 UART: [afmc] --
25,888,986 UART: [cold-reset] --
25,893,334 UART: [state] Locking Datavault
25,898,422 UART: [state] Locking PCR0, PCR1 and PCR31
25,900,119 UART: [state] Locking ICCM
25,901,836 UART: [exit] Launching FMC @ 0x40000130
25,910,233 UART:
25,910,474 UART: Running Caliptra FMC ...
25,911,578 UART:
25,911,738 UART: [state] CFI Enabled
25,920,086 UART: [fht] FMC Alias Private Key: 7
28,251,175 UART: [art] Extend RT PCRs Done
28,252,395 UART: [art] Lock RT PCRs Done
28,254,149 UART: [art] Populate DV Done
28,259,571 UART: [fht] FMC Alias Private Key: 7
28,261,165 UART: [art] Derive CDI
28,261,980 UART: [art] Store in in slot 0x4
28,304,626 UART: [art] Derive Key Pair
28,305,622 UART: [art] Store priv key in slot 0x5
31,547,828 UART: [art] Derive Key Pair - Done
31,560,772 UART: [art] Signing Cert with AUTHO
31,562,070 UART: RITY.KEYID = 7
33,841,971 UART: [art] Erasing AUTHORITY.KEYID = 7
33,843,489 UART: [art] PUB.X = A8B7DC306F282BFC1B9DB58B412FD4B59E969515BD8CB73B32285FA22EB553BEDD4ECCF4A94D1CC8D35F5602FA2C941E
33,850,742 UART: [art] PUB.Y = C869CB80356697F2DC5AFD636887C170CCEDC1620A90F14FD7B71C36589F2F26B81E8777C6196D89451424DA3919B196
33,857,976 UART: [art] SIG.R = A05124EB3F1F7051AB4D93F5EC693938944BFF1222C78410563C9113E8B14F8AF7AD0E275D418FD3FA010725051806FF
33,865,347 UART: [art] SIG.S = CF25F756DC631446EE3703AF79CC1D32E9316B563A9D6168CC4842F3A9F1E2CBA716F1783A4B92D47CA7CCA948194991
35,170,854 UART: Caliptra RT
35,171,556 UART: [state] CFI Enabled
35,289,870 UART: [rt] RT listening for mailbox commands...
35,320,855 UART: [rt]cmd =0x46505652, len=4
35,322,106 UART: [rt] FIPS Version
35,323,263 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,128,107 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,039,999 >>> mbox cmd response data (36 bytes)
15,261,775 <<< Executing mbox cmd 0x46574c44 (114036 bytes) from SoC
20,444,978 >>> mbox cmd response: success
20,445,454 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,088,018 UART:
26,088,423 UART: Running Caliptra FMC ...
26,089,529 UART:
26,089,691 UART: [state] CFI Enabled
26,097,709 UART: [fht] FMC Alias Private Key: 7
28,428,747 UART: [art] Extend RT PCRs Done
28,429,992 UART: [art] Lock RT PCRs Done
28,431,908 UART: [art] Populate DV Done
28,437,320 UART: [fht] FMC Alias Private Key: 7
28,439,024 UART: [art] Derive CDI
28,439,845 UART: [art] Store in in slot 0x4
28,482,501 UART: [art] Derive Key Pair
28,483,547 UART: [art] Store priv key in slot 0x5
31,725,863 UART: [art] Derive Key Pair - Done
31,738,980 UART: [art] Signing Cert with AUTHO
31,740,284 UART: RITY.KEYID = 7
34,019,637 UART: [art] Erasing AUTHORITY.KEYID = 7
34,021,167 UART: [art] PUB.X = 247E4B7D5025CF73F1579A148AD0656F3526F5FF289A8BEF290371A7EC762E804B97DD722E58F873D457B85D94BBD600
34,028,320 UART: [art] PUB.Y = 83F07084803A6F42F1E6FE8CE74247D875A864376571432F89CBD340150020E822F1CF0432C9C3AE22325D86897EEFD7
34,035,582 UART: [art] SIG.R = 23FE7E9628ACE690115847104073E8CD6A1FE666BDF814650A87F7E2BACD2B56EF3857AC7F2D1738DCCDF4E1DC7CF033
34,043,006 UART: [art] SIG.S = 65629030040C424E987DE7CB611EDE5581491C621F135496647C634F77F9BEF5F7B7AEF253AE0CB6B2DC2D2184A12B3B
35,347,762 UART: Caliptra RT
35,348,465 UART: [state] CFI Enabled
35,466,413 UART: [rt] RT listening for mailbox commands...
35,497,289 UART: [rt]cmd =0x46505652, len=4
35,498,598 UART: [rt] FIPS Version
35,499,807 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,130 UART:
192,499 UART: Running Caliptra ROM ...
193,622 UART:
193,786 UART: [state] CFI Enabled
261,014 UART: [state] LifecycleState = Unprovisioned
262,914 UART: [state] DebugLocked = No
265,126 UART: [state] WD Timer not started. Device not locked for debugging
269,260 UART: [kat] SHA2-256
448,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,965 UART: [kat] ++
460,497 UART: [kat] sha1
470,571 UART: [kat] SHA2-256
473,567 UART: [kat] SHA2-384
478,513 UART: [kat] SHA2-512-ACC
481,444 UART: [kat] ECC-384
2,947,366 UART: [kat] HMAC-384Kdf
2,964,202 UART: [kat] LMS
3,493,687 UART: [kat] --
3,498,324 UART: [cold-reset] ++
3,500,649 UART: [fht] FHT @ 0x50003400
3,510,872 UART: [idev] ++
3,511,434 UART: [idev] CDI.KEYID = 6
3,512,397 UART: [idev] SUBJECT.KEYID = 7
3,513,558 UART: [idev] UDS.KEYID = 0
3,514,643 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,535,258 UART: [idev] Erasing UDS.KEYID = 0
6,018,210 UART: [idev] Sha1 KeyId Algorithm
6,040,435 UART: [idev] --
6,045,564 UART: [ldev] ++
6,046,195 UART: [ldev] CDI.KEYID = 6
6,047,109 UART: [ldev] SUBJECT.KEYID = 5
6,048,312 UART: [ldev] AUTHORITY.KEYID = 7
6,049,442 UART: [ldev] FE.KEYID = 1
6,093,838 UART: [ldev] Erasing FE.KEYID = 1
8,594,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,660 UART: [ldev] --
10,385,330 UART: [fwproc] Wait for Commands...
10,387,475 UART: [fwproc] Recv command 0x46505652
10,389,840 UART: [rt] FIPS Version
10,391,321 >>> mbox cmd response data (36 bytes)
12,609,772 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,754,773 UART: [fwproc] Recv command 0x46574c44
12,756,942 UART: [fwproc] Recv'd Img size: 114360 bytes
16,154,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,224,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,293,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,611,732 >>> mbox cmd response: success
16,612,108 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,615,966 UART: [afmc] ++
16,616,546 UART: [afmc] CDI.KEYID = 6
16,617,461 UART: [afmc] SUBJECT.KEYID = 7
16,618,620 UART: [afmc] AUTHORITY.KEYID = 5
19,145,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,871,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,873,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,889,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,905,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,920,985 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,943,808 UART: [afmc] --
20,946,759 UART: [cold-reset] --
20,950,512 UART: [state] Locking Datavault
20,956,890 UART: [state] Locking PCR0, PCR1 and PCR31
20,958,551 UART: [state] Locking ICCM
20,961,103 UART: [exit] Launching FMC @ 0x40000130
20,969,498 UART:
20,969,731 UART: Running Caliptra FMC ...
20,970,763 UART:
20,970,910 UART: [state] CFI Enabled
21,029,128 UART: [fht] FMC Alias Private Key: 7
22,792,610 UART: [art] Extend RT PCRs Done
22,793,831 UART: [art] Lock RT PCRs Done
22,795,593 UART: [art] Populate DV Done
22,800,951 UART: [fht] FMC Alias Private Key: 7
22,802,492 UART: [art] Derive CDI
22,803,223 UART: [art] Store in in slot 0x4
22,861,859 UART: [art] Derive Key Pair
22,862,897 UART: [art] Store priv key in slot 0x5
25,326,103 UART: [art] Derive Key Pair - Done
25,339,111 UART: [art] Signing Cert with AUTHO
25,340,414 UART: RITY.KEYID = 7
27,051,612 UART: [art] Erasing AUTHORITY.KEYID = 7
27,053,118 UART: [art] PUB.X = 55B8644E3A6663B614A430351BFD15C5BEFD7CE672AF8A25E3FDE506036F9A6BCA284AEC6132893DBA20129C917223AB
27,060,345 UART: [art] PUB.Y = DE68692A03354F4D887AB626AE7615C79A5BE2D57AC51FF3D7C31CB33137939FE70A54684AC594E147CA7AC4B242D221
27,067,625 UART: [art] SIG.R = 29F6E65219B53FF8D1EAC286736FB90EF6A0E47932ABF58F94D130EE10A66374288C7CE3049F67B18950D6BA56505D13
27,075,003 UART: [art] SIG.S = 5F64B9CEAC1E477EA35E6EFD5A6646B50AA0E78B8AD0831E5CDA27DB09DC217DD82503B4BC54652ECC5E417397D47E8E
28,053,795 UART: Caliptra RT
28,054,505 UART: [state] CFI Enabled
28,221,170 UART: [rt] RT listening for mailbox commands...
28,252,313 UART: [rt]cmd =0x46505652, len=4
28,253,564 UART: [rt] FIPS Version
28,254,614 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,069 UART:
192,474 UART: Running Caliptra ROM ...
193,634 UART:
193,786 UART: [state] CFI Enabled
263,616 UART: [state] LifecycleState = Unprovisioned
266,007 UART: [state] DebugLocked = No
267,177 UART: [state] WD Timer not started. Device not locked for debugging
271,738 UART: [kat] SHA2-256
461,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,394 UART: [kat] ++
472,854 UART: [kat] sha1
483,668 UART: [kat] SHA2-256
486,687 UART: [kat] SHA2-384
493,452 UART: [kat] SHA2-512-ACC
496,030 UART: [kat] ECC-384
2,949,202 UART: [kat] HMAC-384Kdf
2,970,958 UART: [kat] LMS
3,502,725 UART: [kat] --
3,507,630 UART: [cold-reset] ++
3,508,858 UART: [fht] FHT @ 0x50003400
3,519,735 UART: [idev] ++
3,520,465 UART: [idev] CDI.KEYID = 6
3,521,404 UART: [idev] SUBJECT.KEYID = 7
3,522,612 UART: [idev] UDS.KEYID = 0
3,523,665 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,269 UART: [idev] Erasing UDS.KEYID = 0
6,027,106 UART: [idev] Sha1 KeyId Algorithm
6,050,384 UART: [idev] --
6,054,827 UART: [ldev] ++
6,055,511 UART: [ldev] CDI.KEYID = 6
6,056,434 UART: [ldev] SUBJECT.KEYID = 5
6,057,597 UART: [ldev] AUTHORITY.KEYID = 7
6,058,830 UART: [ldev] FE.KEYID = 1
6,099,184 UART: [ldev] Erasing FE.KEYID = 1
8,606,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,276 UART: [ldev] --
10,412,370 UART: [fwproc] Wait for Commands...
10,414,873 UART: [fwproc] Recv command 0x46505652
10,417,460 UART: [rt] FIPS Version
10,419,125 >>> mbox cmd response data (36 bytes)
12,649,742 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
12,794,412 UART: [fwproc] Recv command 0x46574c44
12,796,409 UART: [fwproc] Recv'd Img size: 114360 bytes
16,245,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,322,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,438,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
16,982,013 >>> mbox cmd response: success
16,982,396 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,985,286 UART: [afmc] ++
16,986,039 UART: [afmc] CDI.KEYID = 6
16,987,244 UART: [afmc] SUBJECT.KEYID = 7
16,988,684 UART: [afmc] AUTHORITY.KEYID = 5
19,517,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,260,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,262,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,277,402 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,292,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,307,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,331,490 UART: [afmc] --
21,335,254 UART: [cold-reset] --
21,338,142 UART: [state] Locking Datavault
21,342,745 UART: [state] Locking PCR0, PCR1 and PCR31
21,344,876 UART: [state] Locking ICCM
21,346,437 UART: [exit] Launching FMC @ 0x40000130
21,355,157 UART:
21,355,391 UART: Running Caliptra FMC ...
21,356,513 UART:
21,356,679 UART: [state] CFI Enabled
21,417,663 UART: [fht] FMC Alias Private Key: 7
23,181,754 UART: [art] Extend RT PCRs Done
23,182,960 UART: [art] Lock RT PCRs Done
23,184,818 UART: [art] Populate DV Done
23,190,169 UART: [fht] FMC Alias Private Key: 7
23,191,758 UART: [art] Derive CDI
23,192,569 UART: [art] Store in in slot 0x4
23,250,344 UART: [art] Derive Key Pair
23,251,408 UART: [art] Store priv key in slot 0x5
25,714,568 UART: [art] Derive Key Pair - Done
25,727,946 UART: [art] Signing Cert with AUTHO
25,729,283 UART: RITY.KEYID = 7
27,440,225 UART: [art] Erasing AUTHORITY.KEYID = 7
27,441,738 UART: [art] PUB.X = D67E555F3A3D326631C88ACE6174B544C3E6D2BF9BF51B6AEF84207C05E0DF0A509F8F9A525BC3816953924A810A6838
27,449,088 UART: [art] PUB.Y = DC17524C811DCEE36506319DCC7249DD692E48C23F971C4C4633FE8B3938CBA737A9A2A141C425FABEF575B9C5B25362
27,456,258 UART: [art] SIG.R = 8B65870EF77B04D71703EFE34D2BB7F9A9FBAD11C57D8CF670C341AEDD207A7A6D63469F37322F615C3007A7B739CC0E
27,463,695 UART: [art] SIG.S = 472DAFEBCC40AAA9801D2E94A19F3D67653D5146C526E715F17CF752FD2F4667D6C24671C91D5BA760638092733E3E7E
28,442,509 UART: Caliptra RT
28,443,229 UART: [state] CFI Enabled
28,609,241 UART: [rt] RT listening for mailbox commands...
28,640,230 UART: [rt]cmd =0x46505652, len=4
28,641,531 UART: [rt] FIPS Version
28,642,793 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,439,287 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,845 >>> mbox cmd response data (36 bytes)
12,479,033 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
17,105,049 >>> mbox cmd response: success
17,105,493 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,392,867 UART:
21,393,264 UART: Running Caliptra FMC ...
21,394,360 UART:
21,394,513 UART: [state] CFI Enabled
21,464,028 UART: [fht] FMC Alias Private Key: 7
23,228,150 UART: [art] Extend RT PCRs Done
23,229,376 UART: [art] Lock RT PCRs Done
23,230,880 UART: [art] Populate DV Done
23,236,118 UART: [fht] FMC Alias Private Key: 7
23,237,765 UART: [art] Derive CDI
23,238,500 UART: [art] Store in in slot 0x4
23,296,431 UART: [art] Derive Key Pair
23,297,469 UART: [art] Store priv key in slot 0x5
25,760,210 UART: [art] Derive Key Pair - Done
25,773,273 UART: [art] Signing Cert with AUTHO
25,774,585 UART: RITY.KEYID = 7
27,486,644 UART: [art] Erasing AUTHORITY.KEYID = 7
27,488,314 UART: [art] PUB.X = 68ABAC5424F013ABFA4248C282A65B7ADAD373C418025AE9DDCD8C390BEABFD4C4B8B4CF009225BBD2B8BC1B074CE8A3
27,495,435 UART: [art] PUB.Y = 14F786EACB691D64A597C34E0A4303740B70CF7FDF581EFB339200E4146C77F15FC44C31578A7B818BEB9661ECE8E402
27,502,659 UART: [art] SIG.R = 635F7EFBCF59010A0354FDF221CA2C72EF9EE21D07E7AB54FB23FBC6D3E85A9931F962C2C5856A24423C79898B36C3F5
27,510,068 UART: [art] SIG.S = 56771EE1B850DAAF0D0D959398CB621FA8CE6E010392AACBB748EA194A373EEE2F7C9EDBE7BE29DD68F88409264172BE
28,488,970 UART: Caliptra RT
28,489,681 UART: [state] CFI Enabled
28,654,734 UART: [rt] RT listening for mailbox commands...
28,685,611 UART: [rt]cmd =0x46505652, len=4
28,686,858 UART: [rt] FIPS Version
28,688,227 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,553 UART:
192,921 UART: Running Caliptra ROM ...
194,090 UART:
603,604 UART: [state] CFI Enabled
616,443 UART: [state] LifecycleState = Unprovisioned
618,845 UART: [state] DebugLocked = No
621,678 UART: [state] WD Timer not started. Device not locked for debugging
626,514 UART: [kat] SHA2-256
816,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,144 UART: [kat] ++
827,685 UART: [kat] sha1
839,698 UART: [kat] SHA2-256
842,717 UART: [kat] SHA2-384
848,642 UART: [kat] SHA2-512-ACC
851,197 UART: [kat] ECC-384
3,294,818 UART: [kat] HMAC-384Kdf
3,309,382 UART: [kat] LMS
3,841,228 UART: [kat] --
3,845,562 UART: [cold-reset] ++
3,846,796 UART: [fht] FHT @ 0x50003400
3,858,042 UART: [idev] ++
3,858,732 UART: [idev] CDI.KEYID = 6
3,859,644 UART: [idev] SUBJECT.KEYID = 7
3,860,856 UART: [idev] UDS.KEYID = 0
3,862,099 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,877,964 UART: [idev] Erasing UDS.KEYID = 0
6,338,832 UART: [idev] Sha1 KeyId Algorithm
6,361,526 UART: [idev] --
6,367,194 UART: [ldev] ++
6,367,874 UART: [ldev] CDI.KEYID = 6
6,368,893 UART: [ldev] SUBJECT.KEYID = 5
6,369,995 UART: [ldev] AUTHORITY.KEYID = 7
6,371,220 UART: [ldev] FE.KEYID = 1
6,383,922 UART: [ldev] Erasing FE.KEYID = 1
8,860,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,199 UART: [ldev] --
10,648,369 UART: [fwproc] Wait for Commands...
10,651,470 UART: [fwproc] Recv command 0x46505652
10,654,005 UART: [rt] FIPS Version
10,655,731 >>> mbox cmd response data (36 bytes)
12,874,541 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
13,019,837 UART: [fwproc] Recv command 0x46574c44
13,021,847 UART: [fwproc] Recv'd Img size: 114360 bytes
16,466,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,545,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,661,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
17,204,918 >>> mbox cmd response: success
17,205,271 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,208,209 UART: [afmc] ++
17,208,894 UART: [afmc] CDI.KEYID = 6
17,210,068 UART: [afmc] SUBJECT.KEYID = 7
17,211,561 UART: [afmc] AUTHORITY.KEYID = 5
19,718,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,439,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,440,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,456,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,471,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,486,280 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,509,842 UART: [afmc] --
21,514,069 UART: [cold-reset] --
21,518,538 UART: [state] Locking Datavault
21,524,923 UART: [state] Locking PCR0, PCR1 and PCR31
21,527,112 UART: [state] Locking ICCM
21,528,558 UART: [exit] Launching FMC @ 0x40000130
21,537,280 UART:
21,537,512 UART: Running Caliptra FMC ...
21,538,635 UART:
21,538,794 UART: [state] CFI Enabled
21,546,845 UART: [fht] FMC Alias Private Key: 7
23,303,760 UART: [art] Extend RT PCRs Done
23,304,987 UART: [art] Lock RT PCRs Done
23,306,838 UART: [art] Populate DV Done
23,312,306 UART: [fht] FMC Alias Private Key: 7
23,313,952 UART: [art] Derive CDI
23,314,768 UART: [art] Store in in slot 0x4
23,357,132 UART: [art] Derive Key Pair
23,358,201 UART: [art] Store priv key in slot 0x5
25,785,327 UART: [art] Derive Key Pair - Done
25,798,324 UART: [art] Signing Cert with AUTHO
25,799,633 UART: RITY.KEYID = 7
27,504,879 UART: [art] Erasing AUTHORITY.KEYID = 7
27,506,406 UART: [art] PUB.X = 28AB415B401BEB3357839BCF2BB8FA756AD3D2D7E2B1F319341633078E30441CCC5AE492C9FCA398EEA992DB38EC610D
27,513,699 UART: [art] PUB.Y = 393A20EC03FD922EB2840A27D81D8A6004F30C7AE5748BD8AE115AFCFE10AD288C8DFA71C5BA83CEF8CCD3B260DB10C8
27,520,945 UART: [art] SIG.R = 53B97B408B50D52D040D4377C32D9376DC56BEA3981A2B99BA235F0E3AD04E8E9C1D44E92ED865B61D638C5EA2E8F8FD
27,528,343 UART: [art] SIG.S = B583EEAED2C65323BD0F5093A979991D566484C32CFC950FB7FBB32DC91C8F3B693AD06DAB4B8E23C8B43663EFD191E2
28,507,503 UART: Caliptra RT
28,508,224 UART: [state] CFI Enabled
28,625,040 UART: [rt] RT listening for mailbox commands...
28,656,017 UART: [rt]cmd =0x46505652, len=4
28,657,357 UART: [rt] FIPS Version
28,658,357 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,760 writing to cptra_bootfsm_go
3,758,611 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,474,639 >>> mbox cmd response data (36 bytes)
12,693,858 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
17,339,313 >>> mbox cmd response: success
17,339,787 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,586,664 UART:
21,587,055 UART: Running Caliptra FMC ...
21,588,183 UART:
21,588,340 UART: [state] CFI Enabled
21,596,524 UART: [fht] FMC Alias Private Key: 7
23,353,106 UART: [art] Extend RT PCRs Done
23,354,327 UART: [art] Lock RT PCRs Done
23,355,600 UART: [art] Populate DV Done
23,360,846 UART: [fht] FMC Alias Private Key: 7
23,362,415 UART: [art] Derive CDI
23,363,189 UART: [art] Store in in slot 0x4
23,405,418 UART: [art] Derive Key Pair
23,406,431 UART: [art] Store priv key in slot 0x5
25,833,104 UART: [art] Derive Key Pair - Done
25,845,823 UART: [art] Signing Cert with AUTHO
25,847,159 UART: RITY.KEYID = 7
27,553,126 UART: [art] Erasing AUTHORITY.KEYID = 7
27,554,638 UART: [art] PUB.X = 00F87731DCC9EE9B25EC76F7772C8991EC122B023DB77EA38F494BFFE587D9882ED59D1AB0A653EDC426A6C3A5749B5C
27,562,002 UART: [art] PUB.Y = 64EA9961D90FCFB92DD806BB6C58FE4307C509AE03B0BD37C359B347B24DCB3BCA9E2E4AFE29FDB44BDB2829504DCCB6
27,569,249 UART: [art] SIG.R = 822B1EA663B380C08C0E22EA12F7463F182B8C4948665C5BB0E8C4C374F0B9BC51869B3A2863233641DFEA3A6DC5431B
27,576,661 UART: [art] SIG.S = 5AF9B6F05B2B60443FA2AAF46BCA1DECD1B3E8945AA68C8CCC1A6EBE3442BB9909B58B6B37BBA1D8AAA63096062FCE84
28,555,864 UART: Caliptra RT
28,556,576 UART: [state] CFI Enabled
28,673,276 UART: [rt] RT listening for mailbox commands...
28,704,317 UART: [rt]cmd =0x46505652, len=4
28,705,636 UART: [rt] FIPS Version
28,707,063 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,095 UART: [kat] SHA2-256
882,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,141 UART: [kat] ++
886,293 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,292 UART: [kat] LMS
1,475,488 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,923 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,378 UART: [idev] Erasing UDS.KEYID = 0
1,504,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,312 UART: [idev] --
1,514,325 UART: [ldev] ++
1,514,493 UART: [ldev] CDI.KEYID = 6
1,514,856 UART: [ldev] SUBJECT.KEYID = 5
1,515,282 UART: [ldev] AUTHORITY.KEYID = 7
1,515,745 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,546,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,884 UART: [ldev] --
1,585,229 UART: [fwproc] Waiting for Commands...
1,585,876 UART: [fwproc] Received command 0x46505652
1,586,758 UART: [rt] FIPS Version
1,587,311 >>> mbox cmd response data (36 bytes)
1,587,312 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,587,542 UART: [fwproc] Received command 0x46574c44
1,588,333 UART: [fwproc] Received Image of size 114360 bytes
2,886,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,079,629 >>> mbox cmd response: success
3,079,629 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,080,805 UART: [afmc] ++
3,080,973 UART: [afmc] CDI.KEYID = 6
3,081,335 UART: [afmc] SUBJECT.KEYID = 7
3,081,760 UART: [afmc] AUTHORITY.KEYID = 5
3,116,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,133,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,151,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,159,091 UART: [afmc] --
3,160,065 UART: [cold-reset] --
3,160,997 UART: [state] Locking Datavault
3,162,152 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,756 UART: [state] Locking ICCM
3,163,340 UART: [exit] Launching FMC @ 0x40000130
3,168,669 UART:
3,168,685 UART: Running Caliptra FMC ...
3,169,093 UART:
3,169,147 UART: [state] CFI Enabled
3,179,524 UART: [fht] FMC Alias Private Key: 7
3,287,225 UART: [art] Extend RT PCRs Done
3,287,653 UART: [art] Lock RT PCRs Done
3,288,933 UART: [art] Populate DV Done
3,297,284 UART: [fht] FMC Alias Private Key: 7
3,298,436 UART: [art] Derive CDI
3,298,716 UART: [art] Store in in slot 0x4
3,384,357 UART: [art] Derive Key Pair
3,384,717 UART: [art] Store priv key in slot 0x5
3,398,119 UART: [art] Derive Key Pair - Done
3,412,956 UART: [art] Signing Cert with AUTHO
3,413,436 UART: RITY.KEYID = 7
3,428,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,561 UART: [art] PUB.X = F3D640DAEEB7297E9281C87A19501D7D487EF92E59476F562CE3CF07D95109420E7DB701F6D6D523A1E996BD038CA2A9
3,436,322 UART: [art] PUB.Y = 1CF24617B576E5B68CF7551321E264DE71F4772A2CF31B263D51B3D06AE1406BA20E9B6A2E7FFDF2BE117DCA19886BAC
3,443,283 UART: [art] SIG.R = C083846BF9615B217E354BB5B8F4D5A273001E5DB1C44620BC071D47E550B72E8DBCAD1BB16BBE3790ADE3E6D3F13782
3,450,040 UART: [art] SIG.S = 916F4DA9EEDC39EB0975B99D24AF6B7B6C5E67481AA85FBA96F781FCA24CE92DC867A1B6C46191BD781B4D866B0229CB
3,473,565 UART: Caliptra RT
3,473,819 UART: [state] CFI Enabled
3,582,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,555 UART: [rt]cmd =0x46505652, len=4
3,613,226 UART: [rt] FIPS Version
3,614,276 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,449 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,714 >>> mbox cmd response data (36 bytes)
1,441,715 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,927,904 >>> mbox cmd response: success
2,927,904 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,989,882 UART:
2,989,898 UART: Running Caliptra FMC ...
2,990,306 UART:
2,990,360 UART: [state] CFI Enabled
3,000,787 UART: [fht] FMC Alias Private Key: 7
3,107,900 UART: [art] Extend RT PCRs Done
3,108,328 UART: [art] Lock RT PCRs Done
3,109,816 UART: [art] Populate DV Done
3,118,125 UART: [fht] FMC Alias Private Key: 7
3,119,111 UART: [art] Derive CDI
3,119,391 UART: [art] Store in in slot 0x4
3,205,322 UART: [art] Derive Key Pair
3,205,682 UART: [art] Store priv key in slot 0x5
3,218,430 UART: [art] Derive Key Pair - Done
3,233,298 UART: [art] Signing Cert with AUTHO
3,233,778 UART: RITY.KEYID = 7
3,249,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,861 UART: [art] PUB.X = DFDD01AF1F018FDE9BCF45331DDC36B41AC512092A3085991EFE2151B839E776A9528A5E7DD141EC70CB87F3E91F7377
3,256,634 UART: [art] PUB.Y = AF15DA932F7815D49B816C63C65E5786E915061232F86683D15B1E1456BEAB0AA57929D59707C4DE3A06552FF8C09769
3,263,568 UART: [art] SIG.R = D92DDD399B23FE20BDCD9452697BFC162DF3D4E3F38B86626F5749827912CB4AE374167531956AE0B9266218478AE543
3,270,336 UART: [art] SIG.S = D3F60D10D2646894B62E250B654AE73AB54552BFE991497CB3EB74D8324BF5C3B412FC15FF74A1933CA2E462401AF9D3
3,294,187 UART: Caliptra RT
3,294,441 UART: [state] CFI Enabled
3,402,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,339 UART: [rt]cmd =0x46505652, len=4
3,433,010 UART: [rt] FIPS Version
3,434,252 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,116 UART: [kat] SHA2-256
882,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,162 UART: [kat] ++
886,314 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,744 UART: [cold-reset] ++
1,477,274 UART: [fht] Storing FHT @ 0x50003400
1,479,999 UART: [idev] ++
1,480,167 UART: [idev] CDI.KEYID = 6
1,480,527 UART: [idev] SUBJECT.KEYID = 7
1,480,951 UART: [idev] UDS.KEYID = 0
1,481,296 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,505,763 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,579 UART: [idev] --
1,515,618 UART: [ldev] ++
1,515,786 UART: [ldev] CDI.KEYID = 6
1,516,149 UART: [ldev] SUBJECT.KEYID = 5
1,516,575 UART: [ldev] AUTHORITY.KEYID = 7
1,517,038 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,649 UART: [ldev] --
1,587,138 UART: [fwproc] Waiting for Commands...
1,587,835 UART: [fwproc] Received command 0x46505652
1,588,717 UART: [rt] FIPS Version
1,589,270 >>> mbox cmd response data (36 bytes)
1,589,271 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,589,533 UART: [fwproc] Received command 0x46574c44
1,590,324 UART: [fwproc] Received Image of size 114360 bytes
2,888,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89676
3,080,036 >>> mbox cmd response: success
3,080,036 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,081,072 UART: [afmc] ++
3,081,240 UART: [afmc] CDI.KEYID = 6
3,081,602 UART: [afmc] SUBJECT.KEYID = 7
3,082,027 UART: [afmc] AUTHORITY.KEYID = 5
3,118,014 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,135,292 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,141,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,905 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,595 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,304 UART: [afmc] --
3,161,216 UART: [cold-reset] --
3,162,246 UART: [state] Locking Datavault
3,163,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,164,047 UART: [state] Locking ICCM
3,164,707 UART: [exit] Launching FMC @ 0x40000130
3,170,036 UART:
3,170,052 UART: Running Caliptra FMC ...
3,170,460 UART:
3,170,603 UART: [state] CFI Enabled
3,181,052 UART: [fht] FMC Alias Private Key: 7
3,289,127 UART: [art] Extend RT PCRs Done
3,289,555 UART: [art] Lock RT PCRs Done
3,290,855 UART: [art] Populate DV Done
3,299,116 UART: [fht] FMC Alias Private Key: 7
3,300,046 UART: [art] Derive CDI
3,300,326 UART: [art] Store in in slot 0x4
3,385,983 UART: [art] Derive Key Pair
3,386,343 UART: [art] Store priv key in slot 0x5
3,399,447 UART: [art] Derive Key Pair - Done
3,414,219 UART: [art] Signing Cert with AUTHO
3,414,699 UART: RITY.KEYID = 7
3,429,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,204 UART: [art] PUB.X = 607F6E0D84EFD4929003153B890DB9D96E48217369D2F858CCD1F1142E1AF6AC508578BE5CFFB6835D287ADCDA40B316
3,436,973 UART: [art] PUB.Y = A02AA714C7E29FD9586A7B2B181B34743003D045CE4F2258ABABEF61062FBB15C79FC1CB439DEF981F724F81AF2BC53D
3,443,933 UART: [art] SIG.R = E3436AD24B41A1F71D97B25650A487226A070889A7C10F0800F8E44995AE5EC53D182EAECD7732CBFF8D28841B125A5D
3,450,673 UART: [art] SIG.S = E26252A33619553C5C4839C1F6FCC795A7D8A55B51126BC828B55CB02E6E626A59E344BEEC216100CACC0BA56E45B9FB
3,474,755 UART: Caliptra RT
3,475,101 UART: [state] CFI Enabled
3,583,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,677 UART: [rt]cmd =0x46505652, len=4
3,614,348 UART: [rt] FIPS Version
3,615,482 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,303 >>> mbox cmd response data (36 bytes)
1,442,304 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,929,503 >>> mbox cmd response: success
2,929,503 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,991,655 UART:
2,991,671 UART: Running Caliptra FMC ...
2,992,079 UART:
2,992,222 UART: [state] CFI Enabled
3,002,955 UART: [fht] FMC Alias Private Key: 7
3,110,842 UART: [art] Extend RT PCRs Done
3,111,270 UART: [art] Lock RT PCRs Done
3,112,744 UART: [art] Populate DV Done
3,120,803 UART: [fht] FMC Alias Private Key: 7
3,121,761 UART: [art] Derive CDI
3,122,041 UART: [art] Store in in slot 0x4
3,207,476 UART: [art] Derive Key Pair
3,207,836 UART: [art] Store priv key in slot 0x5
3,220,658 UART: [art] Derive Key Pair - Done
3,235,704 UART: [art] Signing Cert with AUTHO
3,236,184 UART: RITY.KEYID = 7
3,251,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,147 UART: [art] PUB.X = BF8EC99402982DE5C391C9ADF4A18D1438B81F120145EED1DC4DFD7AB2D0EFBE8A0CA3CE34EA72E4B22EA8B1EED24ED0
3,258,940 UART: [art] PUB.Y = 2C8E672B2F1EE2F36B5D39EAA5C80CB573A25C62C5DF2C1A6D48BAD7CF6B6175045CEB7351A1476F86C8B78674A18BA2
3,265,900 UART: [art] SIG.R = 126A26AEBC06A0F4E523E544DB0913B9AE7328753AF7320E86AD89550B261367CB8FCFEC09A255059D25CC1A413E18CD
3,272,660 UART: [art] SIG.S = BAF7A6F4CAA19AFFF774D1738450A95E4FB7214BF9D586FD4F852CB13F3F96ACEEBBC82F43BF946C6442918ACF884DD0
3,296,367 UART: Caliptra RT
3,296,713 UART: [state] CFI Enabled
3,405,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,664 UART: [rt]cmd =0x46505652, len=4
3,436,335 UART: [rt] FIPS Version
3,437,527 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,565 UART: [kat] SHA2-256
903,505 UART: [kat] SHA2-384
906,042 UART: [kat] SHA2-512-ACC
907,943 UART: [kat] ECC-384
917,286 UART: [kat] HMAC-384Kdf
921,840 UART: [kat] LMS
1,170,168 UART: [kat] --
1,171,223 UART: [cold-reset] ++
1,171,763 UART: [fht] FHT @ 0x50003400
1,174,304 UART: [idev] ++
1,174,472 UART: [idev] CDI.KEYID = 6
1,174,832 UART: [idev] SUBJECT.KEYID = 7
1,175,256 UART: [idev] UDS.KEYID = 0
1,175,601 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,158 UART: [idev] Erasing UDS.KEYID = 0
1,200,595 UART: [idev] Sha1 KeyId Algorithm
1,209,133 UART: [idev] --
1,210,307 UART: [ldev] ++
1,210,475 UART: [ldev] CDI.KEYID = 6
1,210,838 UART: [ldev] SUBJECT.KEYID = 5
1,211,264 UART: [ldev] AUTHORITY.KEYID = 7
1,211,727 UART: [ldev] FE.KEYID = 1
1,216,755 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x46505652
1,283,427 UART: [rt] FIPS Version
1,283,981 >>> mbox cmd response data (36 bytes)
1,283,982 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,284,124 UART: [fwproc] Recv command 0x46574c44
1,284,852 UART: [fwproc] Recv'd Img size: 114360 bytes
2,583,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,775,860 >>> mbox cmd response: success
2,775,860 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,777,010 UART: [afmc] ++
2,777,178 UART: [afmc] CDI.KEYID = 6
2,777,540 UART: [afmc] SUBJECT.KEYID = 7
2,777,965 UART: [afmc] AUTHORITY.KEYID = 5
2,813,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,167 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,153 UART: [afmc] --
2,857,267 UART: [cold-reset] --
2,858,253 UART: [state] Locking Datavault
2,859,458 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,062 UART: [state] Locking ICCM
2,860,626 UART: [exit] Launching FMC @ 0x40000130
2,865,955 UART:
2,865,971 UART: Running Caliptra FMC ...
2,866,379 UART:
2,866,433 UART: [state] CFI Enabled
2,876,864 UART: [fht] FMC Alias Private Key: 7
2,984,441 UART: [art] Extend RT PCRs Done
2,984,869 UART: [art] Lock RT PCRs Done
2,986,253 UART: [art] Populate DV Done
2,994,184 UART: [fht] FMC Alias Private Key: 7
2,995,362 UART: [art] Derive CDI
2,995,642 UART: [art] Store in in slot 0x4
3,080,933 UART: [art] Derive Key Pair
3,081,293 UART: [art] Store priv key in slot 0x5
3,094,143 UART: [art] Derive Key Pair - Done
3,109,002 UART: [art] Signing Cert with AUTHO
3,109,482 UART: RITY.KEYID = 7
3,124,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,487 UART: [art] PUB.X = DA6C0FA4C567E33F2AE76FADFF48A94BFEC516229EBD5D2F1AE7BD0A2C608C3270132551F78ACF48C48EA71F4B61994C
3,132,273 UART: [art] PUB.Y = A178B26785E5052066D5D305DA92A090242A43EAFA2FB0835E8304F41414A106F80E3876F9953DB0106932E8248A8B4F
3,139,200 UART: [art] SIG.R = 76BCFCD742F6A3B91757AE73B11E3F6D867366883F2F3F6A6369C823839E1F1345FCDD4855D8EC01F90363B7FC177167
3,145,966 UART: [art] SIG.S = CB85667EA0BC55981972A93E72D7DE49BE6A0BB910C7F974C816068795364F0FA9452A866543092C9387D3B59DFA5AB7
3,170,177 UART: Caliptra RT
3,170,431 UART: [state] CFI Enabled
3,278,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,820 UART: [rt]cmd =0x46505652, len=4
3,309,491 UART: [rt] FIPS Version
3,310,619 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,187 >>> mbox cmd response data (36 bytes)
1,140,188 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,455 >>> mbox cmd response: success
2,627,455 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,845 UART:
2,689,861 UART: Running Caliptra FMC ...
2,690,269 UART:
2,690,323 UART: [state] CFI Enabled
2,700,622 UART: [fht] FMC Alias Private Key: 7
2,808,347 UART: [art] Extend RT PCRs Done
2,808,775 UART: [art] Lock RT PCRs Done
2,809,935 UART: [art] Populate DV Done
2,818,144 UART: [fht] FMC Alias Private Key: 7
2,819,100 UART: [art] Derive CDI
2,819,380 UART: [art] Store in in slot 0x4
2,904,947 UART: [art] Derive Key Pair
2,905,307 UART: [art] Store priv key in slot 0x5
2,917,823 UART: [art] Derive Key Pair - Done
2,932,487 UART: [art] Signing Cert with AUTHO
2,932,967 UART: RITY.KEYID = 7
2,948,427 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,192 UART: [art] PUB.X = A53CFAD3F91BB851C1380196E13D8C0596435D54F9AC266A293017A723B09188661E602E0D2050D9D0E01778511E14CB
2,955,947 UART: [art] PUB.Y = 3E96E0070BCE277F0D567308D5B3D33C671613FD3C2755224A73931183FE4E91737B305162D788E7CD9A4DB6B2A36632
2,962,879 UART: [art] SIG.R = 6B86DC32D6BAD323AB3F0FD83CEDB1FCD74E08A20D999BDAFED05E4FC0F4F2689D5A41C8D72E2DBEE5495C9F4C6F1378
2,969,670 UART: [art] SIG.S = A0B0BD1965073F2868307545AAF16E0B3BF2736967C8E5183D5CA21714D444FED0F176EC0053814F6D6021BB07282BB1
2,992,840 UART: Caliptra RT
2,993,094 UART: [state] CFI Enabled
3,101,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,919 UART: [rt]cmd =0x46505652, len=4
3,132,590 UART: [rt] FIPS Version
3,133,454 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,142 UART: [kat] SHA2-256
904,082 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
919,015 UART: [kat] HMAC-384Kdf
923,797 UART: [kat] LMS
1,172,125 UART: [kat] --
1,173,226 UART: [cold-reset] ++
1,173,648 UART: [fht] FHT @ 0x50003400
1,176,225 UART: [idev] ++
1,176,393 UART: [idev] CDI.KEYID = 6
1,176,753 UART: [idev] SUBJECT.KEYID = 7
1,177,177 UART: [idev] UDS.KEYID = 0
1,177,522 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,185,627 UART: [idev] Erasing UDS.KEYID = 0
1,202,616 UART: [idev] Sha1 KeyId Algorithm
1,211,080 UART: [idev] --
1,211,940 UART: [ldev] ++
1,212,108 UART: [ldev] CDI.KEYID = 6
1,212,471 UART: [ldev] SUBJECT.KEYID = 5
1,212,897 UART: [ldev] AUTHORITY.KEYID = 7
1,213,360 UART: [ldev] FE.KEYID = 1
1,218,774 UART: [ldev] Erasing FE.KEYID = 1
1,245,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,066 UART: [ldev] --
1,284,335 UART: [fwproc] Wait for Commands...
1,285,029 UART: [fwproc] Recv command 0x46505652
1,285,850 UART: [rt] FIPS Version
1,286,404 >>> mbox cmd response data (36 bytes)
1,286,405 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,286,629 UART: [fwproc] Recv command 0x46574c44
1,287,357 UART: [fwproc] Recv'd Img size: 114360 bytes
2,586,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,778,667 >>> mbox cmd response: success
2,778,667 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,779,887 UART: [afmc] ++
2,780,055 UART: [afmc] CDI.KEYID = 6
2,780,417 UART: [afmc] SUBJECT.KEYID = 7
2,780,842 UART: [afmc] AUTHORITY.KEYID = 5
2,816,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,225 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,890 UART: [afmc] --
2,860,016 UART: [cold-reset] --
2,860,878 UART: [state] Locking Datavault
2,862,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,807 UART: [state] Locking ICCM
2,863,317 UART: [exit] Launching FMC @ 0x40000130
2,868,646 UART:
2,868,662 UART: Running Caliptra FMC ...
2,869,070 UART:
2,869,213 UART: [state] CFI Enabled
2,879,438 UART: [fht] FMC Alias Private Key: 7
2,988,021 UART: [art] Extend RT PCRs Done
2,988,449 UART: [art] Lock RT PCRs Done
2,989,747 UART: [art] Populate DV Done
2,998,036 UART: [fht] FMC Alias Private Key: 7
2,999,118 UART: [art] Derive CDI
2,999,398 UART: [art] Store in in slot 0x4
3,085,079 UART: [art] Derive Key Pair
3,085,439 UART: [art] Store priv key in slot 0x5
3,098,303 UART: [art] Derive Key Pair - Done
3,113,278 UART: [art] Signing Cert with AUTHO
3,113,758 UART: RITY.KEYID = 7
3,128,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,389 UART: [art] PUB.X = E17DFA0681C095424848CC16B5CE12292A64776ACD99FE596E0627A1BEF7B2600F818A450000900EAF9B6D4DEFB7260A
3,136,106 UART: [art] PUB.Y = 1C654A1D0C27CEB87DDDD82E0AF296A8F090C65463A70900B59FAECB7A9316F4D533FD668D4A992F914403317CA1FF73
3,143,032 UART: [art] SIG.R = AE7FF63E43CC327FC3269A8FBFA3EEE530CEA231171EF205409CE8B9664487C6D4EADA1E82043B71E6D82569CC49997D
3,149,810 UART: [art] SIG.S = 940B8A019742D88A87C4BEE939F5E6F0A607EC7522F2E1A7D8720AF9A8353CF7D43F3A073869BAFCB64D7E30E8F69DCB
3,173,714 UART: Caliptra RT
3,174,060 UART: [state] CFI Enabled
3,281,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,624 UART: [rt]cmd =0x46505652, len=4
3,312,295 UART: [rt] FIPS Version
3,313,275 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,824 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,176 >>> mbox cmd response data (36 bytes)
1,141,177 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,627,924 >>> mbox cmd response: success
2,627,924 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,690,174 UART:
2,690,190 UART: Running Caliptra FMC ...
2,690,598 UART:
2,690,741 UART: [state] CFI Enabled
2,701,456 UART: [fht] FMC Alias Private Key: 7
2,808,897 UART: [art] Extend RT PCRs Done
2,809,325 UART: [art] Lock RT PCRs Done
2,810,403 UART: [art] Populate DV Done
2,818,520 UART: [fht] FMC Alias Private Key: 7
2,819,490 UART: [art] Derive CDI
2,819,770 UART: [art] Store in in slot 0x4
2,905,873 UART: [art] Derive Key Pair
2,906,233 UART: [art] Store priv key in slot 0x5
2,918,863 UART: [art] Derive Key Pair - Done
2,933,941 UART: [art] Signing Cert with AUTHO
2,934,421 UART: RITY.KEYID = 7
2,949,615 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,380 UART: [art] PUB.X = 27559A33F57AD1CAC89C4F6138CEAB64A1AA4A643F033D321479C9AA31496DE05C37960AD908E72541253690633C49E3
2,957,139 UART: [art] PUB.Y = C2ECBFAB5D8375C162273B45AB4EE2789E6558F92F9F6CB16E18F231BB6D7025EBA2CBAD54F7A1CBD3AB0EE2DC5FFA6D
2,964,118 UART: [art] SIG.R = C79B4DDA27C44B1AAB23576BE7FC6CACF3EC622678343BC242B1650130732FFE7FCA87FEF0A864878BD21B73C4616AFC
2,970,903 UART: [art] SIG.S = 47D2D6602887A8F21D56283DC594EDE529A67502224E06813B56E5F57E64B72EA48DB292A1B7584C7FF66C83C0DC13E2
2,994,326 UART: Caliptra RT
2,994,672 UART: [state] CFI Enabled
3,102,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,585 UART: [rt]cmd =0x46505652, len=4
3,133,256 UART: [rt] FIPS Version
3,134,478 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,612 UART: [kat] HMAC-384Kdf
921,310 UART: [kat] LMS
1,169,622 UART: [kat] --
1,170,411 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,347 UART: [idev] Erasing UDS.KEYID = 0
1,199,817 UART: [idev] Sha1 KeyId Algorithm
1,208,583 UART: [idev] --
1,209,618 UART: [ldev] ++
1,209,786 UART: [ldev] CDI.KEYID = 6
1,210,150 UART: [ldev] SUBJECT.KEYID = 5
1,210,577 UART: [ldev] AUTHORITY.KEYID = 7
1,211,040 UART: [ldev] FE.KEYID = 1
1,216,082 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,068 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46505652
1,282,552 UART: [rt] FIPS Version
1,283,113 >>> mbox cmd response data (36 bytes)
1,283,114 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,283,281 UART: [fwproc] Recv command 0x46574c44
1,284,014 UART: [fwproc] Recv'd Img size: 114360 bytes
2,580,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,112 >>> mbox cmd response: success
2,773,112 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,327 UART: [afmc] ++
2,774,495 UART: [afmc] CDI.KEYID = 6
2,774,858 UART: [afmc] SUBJECT.KEYID = 7
2,775,284 UART: [afmc] AUTHORITY.KEYID = 5
2,810,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,990 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,602 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,358 UART: [afmc] --
2,854,356 UART: [cold-reset] --
2,855,170 UART: [state] Locking Datavault
2,856,253 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,857 UART: [state] Locking ICCM
2,857,415 UART: [exit] Launching FMC @ 0x40000130
2,862,744 UART:
2,862,760 UART: Running Caliptra FMC ...
2,863,168 UART:
2,863,222 UART: [state] CFI Enabled
2,873,583 UART: [fht] FMC Alias Private Key: 7
2,981,588 UART: [art] Extend RT PCRs Done
2,982,016 UART: [art] Lock RT PCRs Done
2,983,214 UART: [art] Populate DV Done
2,991,291 UART: [fht] FMC Alias Private Key: 7
2,992,339 UART: [art] Derive CDI
2,992,619 UART: [art] Store in in slot 0x4
3,078,144 UART: [art] Derive Key Pair
3,078,504 UART: [art] Store priv key in slot 0x5
3,091,442 UART: [art] Derive Key Pair - Done
3,105,827 UART: [art] Signing Cert with AUTHO
3,106,307 UART: RITY.KEYID = 7
3,121,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,246 UART: [art] PUB.X = 2D250CE29BC842129FCDE9A8631A545320BB51E5A031DFBBE7815602C72B946B5DFB0395254FDF1094375CCD8065FE05
3,129,010 UART: [art] PUB.Y = A5442F6C9327EA94CB0E978FA4ABC20EBB04FC5A5C1762770268061987B58F94377BC4E8CCB0910C4CF7CF2D94460BDC
3,135,951 UART: [art] SIG.R = BD569B5245C2E279A9385CCAF7D54366F09D2339BC65BC7117CB1A577284D0B2EF15DCCC656AFFD1EF729DD32DDB1AC1
3,142,741 UART: [art] SIG.S = A154E2E8B6358DD1856CE5723188C400BDCB07C216734AA7B770536FE8CC33702A09F444B96CA5DEDC69487E23EDA1D4
3,166,702 UART: Caliptra RT
3,166,956 UART: [state] CFI Enabled
3,274,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,658 UART: [rt]cmd =0x46505652, len=4
3,305,329 UART: [rt] FIPS Version
3,306,267 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,966 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,900 >>> mbox cmd response data (36 bytes)
1,135,901 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,621,428 >>> mbox cmd response: success
2,621,428 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,772 UART:
2,683,788 UART: Running Caliptra FMC ...
2,684,196 UART:
2,684,250 UART: [state] CFI Enabled
2,694,799 UART: [fht] FMC Alias Private Key: 7
2,802,604 UART: [art] Extend RT PCRs Done
2,803,032 UART: [art] Lock RT PCRs Done
2,804,718 UART: [art] Populate DV Done
2,813,023 UART: [fht] FMC Alias Private Key: 7
2,814,137 UART: [art] Derive CDI
2,814,417 UART: [art] Store in in slot 0x4
2,900,020 UART: [art] Derive Key Pair
2,900,380 UART: [art] Store priv key in slot 0x5
2,913,922 UART: [art] Derive Key Pair - Done
2,928,723 UART: [art] Signing Cert with AUTHO
2,929,203 UART: RITY.KEYID = 7
2,943,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,676 UART: [art] PUB.X = F0DC3A2D05DABAF9B0CE9922CCCAE05983296784216CE10662025C184F4371B890C7B9F455D153736F5E2BF5CF2A5459
2,951,443 UART: [art] PUB.Y = AAF65F8A20515D085E2CE231BC4204C6D6B43E3EE251F57700B17B25F77FAA8F05315B37EC34A8F9B112B59CA0019ED6
2,958,369 UART: [art] SIG.R = 2D7E40D4BCCD3F235E4CAA2C2AC4DD6974669CE544D1088F0057B6DFF930A151FC7A79AE3B0081DC69E0BB16C0A9A424
2,965,110 UART: [art] SIG.S = 8017A63177431C51B20404D8E8B336CB8FB2B926CF7DA1B6FFF6AECF769A3636515C0C7E0E2ED1ADCEDA330FC27873A8
2,989,038 UART: Caliptra RT
2,989,292 UART: [state] CFI Enabled
3,096,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,457 UART: [rt]cmd =0x46505652, len=4
3,127,128 UART: [rt] FIPS Version
3,128,184 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,198,456 UART: [idev] Sha1 KeyId Algorithm
1,207,380 UART: [idev] --
1,208,461 UART: [ldev] ++
1,208,629 UART: [ldev] CDI.KEYID = 6
1,208,993 UART: [ldev] SUBJECT.KEYID = 5
1,209,420 UART: [ldev] AUTHORITY.KEYID = 7
1,209,883 UART: [ldev] FE.KEYID = 1
1,215,099 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,339 UART: [ldev] --
1,280,639 UART: [fwproc] Wait for Commands...
1,281,268 UART: [fwproc] Recv command 0x46505652
1,282,095 UART: [rt] FIPS Version
1,282,656 >>> mbox cmd response data (36 bytes)
1,282,657 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
1,282,774 UART: [fwproc] Recv command 0x46574c44
1,283,507 UART: [fwproc] Recv'd Img size: 114360 bytes
2,581,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89676
2,773,567 >>> mbox cmd response: success
2,773,567 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,742 UART: [afmc] ++
2,774,910 UART: [afmc] CDI.KEYID = 6
2,775,273 UART: [afmc] SUBJECT.KEYID = 7
2,775,699 UART: [afmc] AUTHORITY.KEYID = 5
2,812,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,355 UART: [afmc] --
2,855,285 UART: [cold-reset] --
2,856,107 UART: [state] Locking Datavault
2,857,468 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,072 UART: [state] Locking ICCM
2,858,536 UART: [exit] Launching FMC @ 0x40000130
2,863,865 UART:
2,863,881 UART: Running Caliptra FMC ...
2,864,289 UART:
2,864,432 UART: [state] CFI Enabled
2,874,893 UART: [fht] FMC Alias Private Key: 7
2,982,662 UART: [art] Extend RT PCRs Done
2,983,090 UART: [art] Lock RT PCRs Done
2,984,832 UART: [art] Populate DV Done
2,993,029 UART: [fht] FMC Alias Private Key: 7
2,994,061 UART: [art] Derive CDI
2,994,341 UART: [art] Store in in slot 0x4
3,079,702 UART: [art] Derive Key Pair
3,080,062 UART: [art] Store priv key in slot 0x5
3,093,428 UART: [art] Derive Key Pair - Done
3,108,045 UART: [art] Signing Cert with AUTHO
3,108,525 UART: RITY.KEYID = 7
3,123,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,238 UART: [art] PUB.X = CB34F24EFC7F892C41DB6B9D9895B87A41CAC84EE75709D4E60A442972D1757252BF7FD8A941274570B07C14F60BA509
3,131,000 UART: [art] PUB.Y = 89822C2048B33E5F73CA100FFCA11BFEC63440D086866B61D40F3BE165864E2BA0E81848E0A4E3075A47D5263FC81B09
3,137,940 UART: [art] SIG.R = D89335DD194294ED7641D110D9CD99964B569FC689FC1BFF38D4B1F956070152D469CD97EB11CD15301A2D121E98BA9E
3,144,708 UART: [art] SIG.S = 277888B53FBF9D5E6425232A588790D282A1FAB11E54E429A77C1A13AEC338035FD5062357CF363ED3A0519E9CD8550B
3,168,604 UART: Caliptra RT
3,168,950 UART: [state] CFI Enabled
3,276,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,539 UART: [rt]cmd =0x46505652, len=4
3,307,210 UART: [rt] FIPS Version
3,308,234 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,731 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,973 >>> mbox cmd response data (36 bytes)
1,135,974 <<< Executing mbox cmd 0x46574c44 (114360 bytes) from SoC
2,622,705 >>> mbox cmd response: success
2,622,705 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,809 UART:
2,684,825 UART: Running Caliptra FMC ...
2,685,233 UART:
2,685,376 UART: [state] CFI Enabled
2,696,059 UART: [fht] FMC Alias Private Key: 7
2,804,600 UART: [art] Extend RT PCRs Done
2,805,028 UART: [art] Lock RT PCRs Done
2,806,680 UART: [art] Populate DV Done
2,814,837 UART: [fht] FMC Alias Private Key: 7
2,815,765 UART: [art] Derive CDI
2,816,045 UART: [art] Store in in slot 0x4
2,901,780 UART: [art] Derive Key Pair
2,902,140 UART: [art] Store priv key in slot 0x5
2,915,858 UART: [art] Derive Key Pair - Done
2,930,707 UART: [art] Signing Cert with AUTHO
2,931,187 UART: RITY.KEYID = 7
2,946,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,268 UART: [art] PUB.X = 5DC80CA74A44D05BC958456500D4A76308E0B96E43E31784BB58440587E31BE3AB320B3DE889535431B3D351B8BA996A
2,954,002 UART: [art] PUB.Y = C7FCD778C0ED1215438BA16B62147CE376BE265AC768AAD229804A50FB19B943238D973D805B3810875E42BF2F3C8375
2,960,952 UART: [art] SIG.R = 85E85B7AFEB4A5644CC398B9E04F314E2499D028E7863EE531B24C4AECBD30BCFD3C75F785A6CD1C257A440B29D57691
2,967,731 UART: [art] SIG.S = C2A073D90E5F40DE409DA53EE344C122676FAE1B294AE6A4AB62A8C064401F996753EEB99FA5D5F616FF7C4CB9CAB599
2,991,697 UART: Caliptra RT
2,992,043 UART: [state] CFI Enabled
3,099,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,071 UART: [rt]cmd =0x46505652, len=4
3,130,742 UART: [rt] FIPS Version
3,131,764 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,059 UART:
192,432 UART: Running Caliptra ROM ...
193,568 UART:
193,715 UART: [state] CFI Enabled
262,943 UART: [state] LifecycleState = Unprovisioned
264,935 UART: [state] DebugLocked = No
267,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,059 UART: [kat] SHA2-256
441,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,286 UART: [kat] ++
452,741 UART: [kat] sha1
464,824 UART: [kat] SHA2-256
467,560 UART: [kat] SHA2-384
473,486 UART: [kat] SHA2-512-ACC
475,879 UART: [kat] ECC-384
2,766,950 UART: [kat] HMAC-384Kdf
2,778,864 UART: [kat] LMS
3,969,166 UART: [kat] --
3,975,102 UART: [cold-reset] ++
3,976,438 UART: [fht] Storing FHT @ 0x50003400
3,989,710 UART: [idev] ++
3,990,289 UART: [idev] CDI.KEYID = 6
3,991,280 UART: [idev] SUBJECT.KEYID = 7
3,992,460 UART: [idev] UDS.KEYID = 0
3,993,567 ready_for_fw is high
3,993,797 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,138,427 UART: [idev] Erasing UDS.KEYID = 0
7,323,242 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,142 UART: [idev] --
7,348,328 UART: [ldev] ++
7,348,925 UART: [ldev] CDI.KEYID = 6
7,349,953 UART: [ldev] SUBJECT.KEYID = 5
7,351,117 UART: [ldev] AUTHORITY.KEYID = 7
7,352,357 UART: [ldev] FE.KEYID = 1
7,380,269 UART: [ldev] Erasing FE.KEYID = 1
10,716,410 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,543 UART: [ldev] --
13,094,368 UART: [fwproc] Waiting for Commands...
13,097,568 UART: [fwproc] Received command 0x46574c44
13,099,762 UART: [fwproc] Received Image of size 114916 bytes
17,170,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,641,459 >>> mbox cmd response: success
17,641,892 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,645,266 UART: [afmc] ++
17,645,850 UART: [afmc] CDI.KEYID = 6
17,646,792 UART: [afmc] SUBJECT.KEYID = 7
17,648,033 UART: [afmc] AUTHORITY.KEYID = 5
21,011,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,756 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,155 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,998 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,440 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,965 UART: [afmc] --
23,382,801 UART: [cold-reset] --
23,387,115 UART: [state] Locking Datavault
23,391,733 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,473 UART: [state] Locking ICCM
23,395,773 UART: [exit] Launching FMC @ 0x40000130
23,404,165 UART:
23,404,401 UART: Running Caliptra FMC ...
23,405,499 UART:
23,405,659 UART: [state] CFI Enabled
23,471,886 UART: [fht] FMC Alias Private Key: 7
25,810,216 UART: [art] Extend RT PCRs Done
25,811,435 UART: [art] Lock RT PCRs Done
25,812,910 UART: [art] Populate DV Done
25,818,588 UART: [fht] FMC Alias Private Key: 7
25,820,155 UART: [art] Derive CDI
25,820,891 UART: [art] Store in in slot 0x4
25,880,535 UART: [art] Derive Key Pair
25,881,534 UART: [art] Store priv key in slot 0x5
29,174,178 UART: [art] Derive Key Pair - Done
29,187,349 UART: [art] Signing Cert with AUTHO
29,188,655 UART: RITY.KEYID = 7
31,475,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,671 UART: [art] PUB.X = DC424E217A949583B7A92E620BE623AD3A5CAB0532FD70C35068133D96176EDA18ABF8A0C9008BF555A277E5FB08AA28
31,483,911 UART: [art] PUB.Y = 9819D90D7C862C5A51AC20933F62CA85518CAC9DFAFA296572451E2F1B554534AF1D42C122EB6127636B6C83A9A985EC
31,491,168 UART: [art] SIG.R = 17F70996B08A5BE30BB20A13A59BAD16DF8503F0E542B0B14EA23E202E743A5B6221D647D93ADC16D30FAC6086F5BF43
31,498,576 UART: [art] SIG.S = 77700AFB8FE7C487AF2E4BEFDE4EA552B5C4C96416112995BCD852264EED18A0F13C74D48D6D0729751BBA0FAEB3516E
32,803,351 UART: Caliptra RT
32,804,070 UART: [state] CFI Enabled
32,966,897 UART: [rt] RT listening for mailbox commands...
32,998,072 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,804,431 ready_for_fw is high
3,805,219 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
17,903,001 >>> mbox cmd response: success
17,903,863 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,592,848 UART:
23,593,254 UART: Running Caliptra FMC ...
23,594,389 UART:
23,594,549 UART: [state] CFI Enabled
23,664,008 UART: [fht] FMC Alias Private Key: 7
26,002,142 UART: [art] Extend RT PCRs Done
26,003,446 UART: [art] Lock RT PCRs Done
26,005,240 UART: [art] Populate DV Done
26,010,744 UART: [fht] FMC Alias Private Key: 7
26,012,203 UART: [art] Derive CDI
26,012,938 UART: [art] Store in in slot 0x4
26,072,794 UART: [art] Derive Key Pair
26,073,876 UART: [art] Store priv key in slot 0x5
29,367,376 UART: [art] Derive Key Pair - Done
29,380,309 UART: [art] Signing Cert with AUTHO
29,381,620 UART: RITY.KEYID = 7
31,668,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,670,443 UART: [art] PUB.X = 446F6FAC8CF6EECD868FF4E342304CD2905E013B714AE4DD08F2316E8AA57027B7EAC8F3E4FBD5E615202B1B1F141B00
31,677,658 UART: [art] PUB.Y = B3A30590F9B0384C0BCDE687DB5932D581348EFF6DC0140CCEA70AB7BD6A0FC6F84308423216995159AF00A3F915E989
31,684,915 UART: [art] SIG.R = 8C11B87F8A97CD9198246731273C8015D21311BBCA3534FC8FC8672392AD0BB15F74DC01DCE16CBE57A2366770789ACA
31,692,308 UART: [art] SIG.S = 7C16A407A98CE92678F65C1EC8F8DCCE91A63FB64214ACAF06A48FE67815D6376683795AEC8C1D2E6E770F52B14675F7
32,997,455 UART: Caliptra RT
32,998,164 UART: [state] CFI Enabled
33,159,903 UART: [rt] RT listening for mailbox commands...
33,191,076 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,726 writing to cptra_bootfsm_go
194,042 UART:
194,403 UART: Running Caliptra ROM ...
195,499 UART:
605,490 UART: [state] CFI Enabled
620,944 UART: [state] LifecycleState = Unprovisioned
622,831 UART: [state] DebugLocked = No
625,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,380 UART: [kat] SHA2-256
800,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,641 UART: [kat] ++
811,123 UART: [kat] sha1
820,725 UART: [kat] SHA2-256
823,456 UART: [kat] SHA2-384
828,667 UART: [kat] SHA2-512-ACC
831,038 UART: [kat] ECC-384
3,116,208 UART: [kat] HMAC-384Kdf
3,127,811 UART: [kat] LMS
4,317,954 UART: [kat] --
4,322,615 UART: [cold-reset] ++
4,324,299 UART: [fht] Storing FHT @ 0x50003400
4,335,388 UART: [idev] ++
4,335,954 UART: [idev] CDI.KEYID = 6
4,336,937 UART: [idev] SUBJECT.KEYID = 7
4,338,187 UART: [idev] UDS.KEYID = 0
4,339,237 ready_for_fw is high
4,339,456 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
4,483,799 UART: [idev] Erasing UDS.KEYID = 0
7,624,105 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,321 UART: [idev] --
7,650,891 UART: [ldev] ++
7,651,466 UART: [ldev] CDI.KEYID = 6
7,652,441 UART: [ldev] SUBJECT.KEYID = 5
7,653,655 UART: [ldev] AUTHORITY.KEYID = 7
7,654,889 UART: [ldev] FE.KEYID = 1
7,665,212 UART: [ldev] Erasing FE.KEYID = 1
10,950,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,450 UART: [ldev] --
13,310,908 UART: [fwproc] Waiting for Commands...
13,313,437 UART: [fwproc] Received command 0x46574c44
13,315,683 UART: [fwproc] Received Image of size 114916 bytes
17,374,510 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 90212
17,843,828 >>> mbox cmd response: success
17,844,263 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,847,790 UART: [afmc] ++
17,848,370 UART: [afmc] CDI.KEYID = 6
17,849,331 UART: [afmc] SUBJECT.KEYID = 7
17,850,561 UART: [afmc] AUTHORITY.KEYID = 5
21,166,673 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,603 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,989 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,839 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,242 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,501 UART: [afmc] --
23,533,579 UART: [cold-reset] --
23,536,535 UART: [state] Locking Datavault
23,540,677 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,411 UART: [state] Locking ICCM
23,544,675 UART: [exit] Launching FMC @ 0x40000130
23,553,066 UART:
23,553,304 UART: Running Caliptra FMC ...
23,554,404 UART:
23,554,585 UART: [state] CFI Enabled
23,562,693 UART: [fht] FMC Alias Private Key: 7
25,893,217 UART: [art] Extend RT PCRs Done
25,894,444 UART: [art] Lock RT PCRs Done
25,896,299 UART: [art] Populate DV Done
25,901,494 UART: [fht] FMC Alias Private Key: 7
25,903,117 UART: [art] Derive CDI
25,903,852 UART: [art] Store in in slot 0x4
25,946,727 UART: [art] Derive Key Pair
25,947,774 UART: [art] Store priv key in slot 0x5
29,189,898 UART: [art] Derive Key Pair - Done
29,202,787 UART: [art] Signing Cert with AUTHO
29,204,120 UART: RITY.KEYID = 7
31,483,323 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,830 UART: [art] PUB.X = 629441B3282DBB39F7DB999470A556ABE7E44F1F7B93A6B159E49666F666A842D2D7FDE23CFE514B7CC7948B7D24C876
31,492,074 UART: [art] PUB.Y = 38C106D7B3AE9E5DF544344E3697A9138BAF39ACE8B081726412C4E1912DAF913ABB580D34E19499BC013E882C8B0273
31,499,327 UART: [art] SIG.R = B5F8A0E20EE6818EAB5A741862DC815D3C9400BCE1175B94900F04328A60C37AD399545B9EDC887B17AD20A5011E311F
31,506,698 UART: [art] SIG.S = FFF08DE3B98AEAFB1F2F2547DB0EF8EFD6BDA6811C7BAC29B5C50C0647C3D8A32BC384EB472238A8431F3A1AE6AADAFE
32,812,181 UART: Caliptra RT
32,812,912 UART: [state] CFI Enabled
32,929,963 UART: [rt] RT listening for mailbox commands...
32,960,937 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,131,831 ready_for_fw is high
4,132,364 <<< Executing mbox cmd 0x46574c44 (114916 bytes) from SoC
18,089,014 >>> mbox cmd response: success
18,089,529 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,731,614 UART:
23,732,000 UART: Running Caliptra FMC ...
23,733,146 UART:
23,733,299 UART: [state] CFI Enabled
23,741,367 UART: [fht] FMC Alias Private Key: 7
26,072,283 UART: [art] Extend RT PCRs Done
26,073,513 UART: [art] Lock RT PCRs Done
26,074,927 UART: [art] Populate DV Done
26,080,413 UART: [fht] FMC Alias Private Key: 7
26,082,115 UART: [art] Derive CDI
26,082,855 UART: [art] Store in in slot 0x4
26,125,398 UART: [art] Derive Key Pair
26,126,397 UART: [art] Store priv key in slot 0x5
29,368,699 UART: [art] Derive Key Pair - Done
29,381,579 UART: [art] Signing Cert with AUTHO
29,382,884 UART: RITY.KEYID = 7
31,662,154 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,673 UART: [art] PUB.X = 9FABD8D9BFD262202174742074D0790BB4AF79C8BC519D4FCF4A5458502DF8ECD0DD8CF2D6AB55E6C66041467FAB07C6
31,670,926 UART: [art] PUB.Y = 9731DC5D8EE6D7D2DCC0978F321CE10663BAC0A314A11570540BD293AB694804AA31D92030E6C8266BD10DE35BC0316E
31,678,191 UART: [art] SIG.R = 3E8C09D02B963A54FFA3A8B64213D94A268056EBB2B0F5C77B8B894226570E9A705CD37585A5B6014B1E4F016D420049
31,685,523 UART: [art] SIG.S = 1CF0C84461F9789047F07CC4F60A59C66AEE43A674D9BD8D068C4E4C8956DED31B85FCEED051BE7DA40A2109AEB066D5
32,990,793 UART: Caliptra RT
32,991,505 UART: [state] CFI Enabled
33,108,810 UART: [rt] RT listening for mailbox commands...
33,139,905 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,170 UART:
192,546 UART: Running Caliptra ROM ...
193,774 UART:
193,926 UART: [state] CFI Enabled
270,165 UART: [state] LifecycleState = Unprovisioned
272,096 UART: [state] DebugLocked = No
274,565 UART: [state] WD Timer not started. Device not locked for debugging
278,603 UART: [kat] SHA2-256
457,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
469,322 UART: [kat] ++
469,852 UART: [kat] sha1
480,095 UART: [kat] SHA2-256
483,111 UART: [kat] SHA2-384
489,667 UART: [kat] SHA2-512-ACC
492,584 UART: [kat] ECC-384
2,951,959 UART: [kat] HMAC-384Kdf
2,973,801 UART: [kat] LMS
3,503,282 UART: [kat] --
3,506,642 UART: [cold-reset] ++
3,507,652 UART: [fht] FHT @ 0x50003400
3,518,500 UART: [idev] ++
3,519,092 UART: [idev] CDI.KEYID = 6
3,519,981 UART: [idev] SUBJECT.KEYID = 7
3,521,233 UART: [idev] UDS.KEYID = 0
3,522,161 ready_for_fw is high
3,522,369 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,667,311 UART: [idev] Erasing UDS.KEYID = 0
6,028,329 UART: [idev] Sha1 KeyId Algorithm
6,052,567 UART: [idev] --
6,057,597 UART: [ldev] ++
6,058,175 UART: [ldev] CDI.KEYID = 6
6,059,065 UART: [ldev] SUBJECT.KEYID = 5
6,060,282 UART: [ldev] AUTHORITY.KEYID = 7
6,061,516 UART: [ldev] FE.KEYID = 1
6,104,201 UART: [ldev] Erasing FE.KEYID = 1
8,606,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,283 UART: [ldev] --
10,418,290 UART: [fwproc] Wait for Commands...
10,421,322 UART: [fwproc] Recv command 0x46574c44
10,423,419 UART: [fwproc] Recv'd Img size: 115224 bytes
13,838,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,977,860 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,298,745 >>> mbox cmd response: success
14,299,153 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,303,676 UART: [afmc] ++
14,304,252 UART: [afmc] CDI.KEYID = 6
14,305,172 UART: [afmc] SUBJECT.KEYID = 7
14,306,377 UART: [afmc] AUTHORITY.KEYID = 5
16,832,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,639 UART: [afmc] --
18,631,401 UART: [cold-reset] --
18,635,853 UART: [state] Locking Datavault
18,640,494 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,175 UART: [state] Locking ICCM
18,644,302 UART: [exit] Launching FMC @ 0x40000130
18,652,718 UART:
18,652,992 UART: Running Caliptra FMC ...
18,654,102 UART:
18,654,260 UART: [state] CFI Enabled
18,713,656 UART: [fht] FMC Alias Private Key: 7
20,477,533 UART: [art] Extend RT PCRs Done
20,478,753 UART: [art] Lock RT PCRs Done
20,480,257 UART: [art] Populate DV Done
20,485,884 UART: [fht] FMC Alias Private Key: 7
20,487,414 UART: [art] Derive CDI
20,488,173 UART: [art] Store in in slot 0x4
20,545,984 UART: [art] Derive Key Pair
20,547,022 UART: [art] Store priv key in slot 0x5
23,009,159 UART: [art] Derive Key Pair - Done
23,022,433 UART: [art] Signing Cert with AUTHO
23,023,746 UART: RITY.KEYID = 7
24,735,370 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,856 UART: [art] PUB.X = D937B8C13812503664C96DA62952EE7E6AC106F94F381A99BE8548AB391B25CBF834CBE71462CC53F4C220E17C8B92BB
24,744,171 UART: [art] PUB.Y = 4FA77B76A09783C3A523B1F039C4965A75B15D45A7FE90FD4BF8736FE48267BE1909624C044BA233796F16D36FCBCECE
24,751,434 UART: [art] SIG.R = CD2595D616AAFFD1DCB372C8F6E5FF251CCC0153136012FFF75B948554C41EF9E6A398B00CBFACE7F3223F7BE4B17A61
24,758,847 UART: [art] SIG.S = A578F73FC79E147F3731ABF8E5589BA84C727DF2D4677CB635FFCFDE1895732F574F562F3756A463B2995B229DA2DBBC
25,737,626 UART: Caliptra RT
25,738,336 UART: [state] CFI Enabled
25,903,849 UART: [rt] RT listening for mailbox commands...
25,934,793 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,054 UART:
192,435 UART: Running Caliptra ROM ...
193,533 UART:
193,673 UART: [state] CFI Enabled
261,136 UART: [state] LifecycleState = Unprovisioned
263,492 UART: [state] DebugLocked = No
266,149 UART: [state] WD Timer not started. Device not locked for debugging
270,840 UART: [kat] SHA2-256
460,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,512 UART: [kat] ++
471,957 UART: [kat] sha1
482,693 UART: [kat] SHA2-256
485,775 UART: [kat] SHA2-384
492,407 UART: [kat] SHA2-512-ACC
494,998 UART: [kat] ECC-384
2,946,882 UART: [kat] HMAC-384Kdf
2,972,356 UART: [kat] LMS
3,504,173 UART: [kat] --
3,508,952 UART: [cold-reset] ++
3,510,319 UART: [fht] FHT @ 0x50003400
3,522,720 UART: [idev] ++
3,523,365 UART: [idev] CDI.KEYID = 6
3,524,349 UART: [idev] SUBJECT.KEYID = 7
3,525,545 UART: [idev] UDS.KEYID = 0
3,526,470 ready_for_fw is high
3,526,678 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,671,629 UART: [idev] Erasing UDS.KEYID = 0
6,029,509 UART: [idev] Sha1 KeyId Algorithm
6,052,604 UART: [idev] --
6,057,232 UART: [ldev] ++
6,057,924 UART: [ldev] CDI.KEYID = 6
6,058,840 UART: [ldev] SUBJECT.KEYID = 5
6,060,003 UART: [ldev] AUTHORITY.KEYID = 7
6,061,242 UART: [ldev] FE.KEYID = 1
6,103,749 UART: [ldev] Erasing FE.KEYID = 1
8,611,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,202 UART: [ldev] --
10,416,095 UART: [fwproc] Wait for Commands...
10,417,712 UART: [fwproc] Recv command 0x46574c44
10,420,026 UART: [fwproc] Recv'd Img size: 115224 bytes
13,884,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,079,677 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,628,121 >>> mbox cmd response: success
14,628,601 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,632,961 UART: [afmc] ++
14,633,680 UART: [afmc] CDI.KEYID = 6
14,634,980 UART: [afmc] SUBJECT.KEYID = 7
14,636,338 UART: [afmc] AUTHORITY.KEYID = 5
17,172,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,545 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,551 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,661 UART: [afmc] --
18,970,691 UART: [cold-reset] --
18,974,093 UART: [state] Locking Datavault
18,978,835 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,016 UART: [state] Locking ICCM
18,982,417 UART: [exit] Launching FMC @ 0x40000130
18,991,070 UART:
18,991,313 UART: Running Caliptra FMC ...
18,992,537 UART:
18,992,701 UART: [state] CFI Enabled
19,053,468 UART: [fht] FMC Alias Private Key: 7
20,817,354 UART: [art] Extend RT PCRs Done
20,818,599 UART: [art] Lock RT PCRs Done
20,820,424 UART: [art] Populate DV Done
20,826,118 UART: [fht] FMC Alias Private Key: 7
20,827,743 UART: [art] Derive CDI
20,828,551 UART: [art] Store in in slot 0x4
20,885,729 UART: [art] Derive Key Pair
20,886,771 UART: [art] Store priv key in slot 0x5
23,349,659 UART: [art] Derive Key Pair - Done
23,362,330 UART: [art] Signing Cert with AUTHO
23,363,625 UART: RITY.KEYID = 7
25,075,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,942 UART: [art] PUB.X = 88BC0C931CE7AC8596302B723A92F38164B57B69C6C5A23F3BBB80D692183097DE29C7664FA9E0FCA0ECB5464EA61042
25,084,197 UART: [art] PUB.Y = 87E898D062688AF1C91022E5EF5BDE53907D8D3172BAF697C6DC6E2A6ADD4E71117F655EBABB0394F69D2F4AF32C0329
25,091,466 UART: [art] SIG.R = B2D3FAC69697B2F88E778CE7EEC385EB9D57E54AC87762F5DAB2E6EECD916F6EBFAECA93D27824A23EFEA90BDA2D2689
25,098,906 UART: [art] SIG.S = 62067E786B7B49ED0249EF76D11A76E4B26545F0A980FD59443FC9E10A8DFBF44549FDB7BB295DFA57568F56FEDF55EC
26,077,612 UART: Caliptra RT
26,078,344 UART: [state] CFI Enabled
26,244,259 UART: [rt] RT listening for mailbox commands...
26,275,232 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,437,169 ready_for_fw is high
3,437,606 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,757,729 >>> mbox cmd response: success
14,758,205 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,044,716 UART:
19,045,110 UART: Running Caliptra FMC ...
19,046,294 UART:
19,046,462 UART: [state] CFI Enabled
19,116,320 UART: [fht] FMC Alias Private Key: 7
20,880,230 UART: [art] Extend RT PCRs Done
20,881,454 UART: [art] Lock RT PCRs Done
20,882,857 UART: [art] Populate DV Done
20,888,000 UART: [fht] FMC Alias Private Key: 7
20,889,672 UART: [art] Derive CDI
20,890,493 UART: [art] Store in in slot 0x4
20,949,890 UART: [art] Derive Key Pair
20,950,951 UART: [art] Store priv key in slot 0x5
23,413,991 UART: [art] Derive Key Pair - Done
23,427,114 UART: [art] Signing Cert with AUTHO
23,428,426 UART: RITY.KEYID = 7
25,139,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,182 UART: [art] PUB.X = B6C49B2525B1FEA3AD99BCB82A2945083DF5F571ED0BB9FE6043DB0E06AA927FC67DDA15ED7071905FE3C8D197AE2BB4
25,148,341 UART: [art] PUB.Y = 59E5BF243F2EC9876BEEA04FEF95A59738BA3574AEC2D2F28A0F74DEACC1962561ABF65152FFCDD5303469B81996283B
25,155,624 UART: [art] SIG.R = 1B63783A79A73F9F2CCE3AF83B2532636BCC252F3C42957EF3EAAB229FFDFFCC4489B031097FAD8C88DD1B90EAC3041B
25,163,034 UART: [art] SIG.S = A8F94696E06F9D23E2CD1BEE3352E845657CE998091BB299C67E14C7E7BA4FEADC3FE7A524B767FA25F2DD37CB274B52
26,141,976 UART: Caliptra RT
26,142,693 UART: [state] CFI Enabled
26,308,062 UART: [rt] RT listening for mailbox commands...
26,338,896 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,548 UART:
192,916 UART: Running Caliptra ROM ...
194,058 UART:
603,904 UART: [state] CFI Enabled
613,518 UART: [state] LifecycleState = Unprovisioned
615,891 UART: [state] DebugLocked = No
617,708 UART: [state] WD Timer not started. Device not locked for debugging
622,880 UART: [kat] SHA2-256
812,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,558 UART: [kat] ++
824,033 UART: [kat] sha1
835,415 UART: [kat] SHA2-256
838,426 UART: [kat] SHA2-384
844,510 UART: [kat] SHA2-512-ACC
847,094 UART: [kat] ECC-384
3,287,820 UART: [kat] HMAC-384Kdf
3,299,563 UART: [kat] LMS
3,831,405 UART: [kat] --
3,834,772 UART: [cold-reset] ++
3,835,668 UART: [fht] FHT @ 0x50003400
3,848,005 UART: [idev] ++
3,848,729 UART: [idev] CDI.KEYID = 6
3,849,638 UART: [idev] SUBJECT.KEYID = 7
3,850,886 UART: [idev] UDS.KEYID = 0
3,851,811 ready_for_fw is high
3,852,014 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
3,997,123 UART: [idev] Erasing UDS.KEYID = 0
6,327,957 UART: [idev] Sha1 KeyId Algorithm
6,349,144 UART: [idev] --
6,352,998 UART: [ldev] ++
6,353,686 UART: [ldev] CDI.KEYID = 6
6,354,569 UART: [ldev] SUBJECT.KEYID = 5
6,355,784 UART: [ldev] AUTHORITY.KEYID = 7
6,357,021 UART: [ldev] FE.KEYID = 1
6,367,188 UART: [ldev] Erasing FE.KEYID = 1
8,845,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,120 UART: [ldev] --
10,639,636 UART: [fwproc] Wait for Commands...
10,641,313 UART: [fwproc] Recv command 0x46574c44
10,643,574 UART: [fwproc] Recv'd Img size: 115224 bytes
14,101,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,616 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,797 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
14,846,231 >>> mbox cmd response: success
14,846,677 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,849,476 UART: [afmc] ++
14,850,202 UART: [afmc] CDI.KEYID = 6
14,851,401 UART: [afmc] SUBJECT.KEYID = 7
14,852,844 UART: [afmc] AUTHORITY.KEYID = 5
17,358,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,662 UART: [afmc] --
19,155,495 UART: [cold-reset] --
19,158,953 UART: [state] Locking Datavault
19,165,588 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,767 UART: [state] Locking ICCM
19,169,778 UART: [exit] Launching FMC @ 0x40000130
19,178,445 UART:
19,178,684 UART: Running Caliptra FMC ...
19,179,788 UART:
19,179,948 UART: [state] CFI Enabled
19,188,108 UART: [fht] FMC Alias Private Key: 7
20,945,232 UART: [art] Extend RT PCRs Done
20,946,452 UART: [art] Lock RT PCRs Done
20,947,958 UART: [art] Populate DV Done
20,953,447 UART: [fht] FMC Alias Private Key: 7
20,954,996 UART: [art] Derive CDI
20,955,739 UART: [art] Store in in slot 0x4
20,998,413 UART: [art] Derive Key Pair
20,999,435 UART: [art] Store priv key in slot 0x5
23,426,943 UART: [art] Derive Key Pair - Done
23,439,805 UART: [art] Signing Cert with AUTHO
23,441,139 UART: RITY.KEYID = 7
25,146,368 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,874 UART: [art] PUB.X = 11CC6E4AF13CC51C8448F70DC451F61AF03D36EC24825C926ADFEFAF83F5F6868DD4040557089A2197B9FC71BA75DA46
25,155,164 UART: [art] PUB.Y = 953629304867C8719CA77D71B7820E8F42710D7148A1D0CD60E6A3B1EC45CBF7310DD01727F841F055F93BFC4397EB1D
25,162,431 UART: [art] SIG.R = 34D4FFB10A286E9DA1B2B63F2C1168707A3EEA61D602F73CB228B8E823644C66966F329EB86D0FEB827F40CB06CFA248
25,169,834 UART: [art] SIG.S = 754AE3348F2E4888D8762F599775DA856E83EF9519EDCDDE02B9F7FEE88507D3D424F4FE7449E010A3D9888CAF29F4C0
26,148,129 UART: Caliptra RT
26,148,815 UART: [state] CFI Enabled
26,266,032 UART: [rt] RT listening for mailbox commands...
26,297,095 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,750,969 ready_for_fw is high
3,751,515 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
14,970,516 >>> mbox cmd response: success
14,971,134 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,227,383 UART:
19,227,775 UART: Running Caliptra FMC ...
19,228,921 UART:
19,229,076 UART: [state] CFI Enabled
19,236,783 UART: [fht] FMC Alias Private Key: 7
20,993,569 UART: [art] Extend RT PCRs Done
20,994,803 UART: [art] Lock RT PCRs Done
20,996,422 UART: [art] Populate DV Done
21,001,800 UART: [fht] FMC Alias Private Key: 7
21,003,335 UART: [art] Derive CDI
21,004,083 UART: [art] Store in in slot 0x4
21,046,409 UART: [art] Derive Key Pair
21,047,454 UART: [art] Store priv key in slot 0x5
23,474,543 UART: [art] Derive Key Pair - Done
23,487,365 UART: [art] Signing Cert with AUTHO
23,488,669 UART: RITY.KEYID = 7
25,194,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,617 UART: [art] PUB.X = 2315FDE4670D4694E1B4FDC69A26276B6A9511E5306CB4517A8507AE334939DE9639D04F4BAEA178E6D09E8E5EA6F3B8
25,202,862 UART: [art] PUB.Y = 0091EAD51961EE954B8DD2A8198676201C15F2560509404B043FBFA00867486DC1F5C52C3B8B0A90EAD769DA86DA7F25
25,210,123 UART: [art] SIG.R = FCE8D8066334736C5540C94D80A9CAC8B49DC07B9F4C7972B6AD01833D6E02730B3633C3FA45F752D9E464FE57A7E518
25,217,521 UART: [art] SIG.S = 0B340EC19CBA8416F1281F38AA8AE5A843DC904119F79261B324A8A5829ABCE33F20C7BFFA5D39840F2A7DA7DE02A9F5
26,196,931 UART: Caliptra RT
26,197,648 UART: [state] CFI Enabled
26,315,662 UART: [rt] RT listening for mailbox commands...
26,346,875 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,057 UART: [kat] SHA2-256
881,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,103 UART: [kat] ++
886,255 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,244 UART: [kat] LMS
1,475,440 UART: [kat] --
1,476,295 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,710 UART: [idev] ++
1,479,878 UART: [idev] CDI.KEYID = 6
1,480,238 UART: [idev] SUBJECT.KEYID = 7
1,480,662 UART: [idev] UDS.KEYID = 0
1,481,007 ready_for_fw is high
1,481,007 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,043 UART: [ldev] ++
1,515,211 UART: [ldev] CDI.KEYID = 6
1,515,574 UART: [ldev] SUBJECT.KEYID = 5
1,516,000 UART: [ldev] AUTHORITY.KEYID = 7
1,516,463 UART: [ldev] FE.KEYID = 1
1,521,655 UART: [ldev] Erasing FE.KEYID = 1
1,546,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,728 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,782 UART: [fwproc] Received command 0x46574c44
1,587,573 UART: [fwproc] Received Image of size 115224 bytes
2,895,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,090,007 >>> mbox cmd response: success
3,090,007 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,091,061 UART: [afmc] ++
3,091,229 UART: [afmc] CDI.KEYID = 6
3,091,591 UART: [afmc] SUBJECT.KEYID = 7
3,092,016 UART: [afmc] AUTHORITY.KEYID = 5
3,126,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,147 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,540 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,230 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,179 UART: [afmc] --
3,170,075 UART: [cold-reset] --
3,170,995 UART: [state] Locking Datavault
3,172,156 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,760 UART: [state] Locking ICCM
3,173,354 UART: [exit] Launching FMC @ 0x40000130
3,178,683 UART:
3,178,699 UART: Running Caliptra FMC ...
3,179,107 UART:
3,179,161 UART: [state] CFI Enabled
3,189,618 UART: [fht] FMC Alias Private Key: 7
3,297,591 UART: [art] Extend RT PCRs Done
3,298,019 UART: [art] Lock RT PCRs Done
3,299,945 UART: [art] Populate DV Done
3,308,146 UART: [fht] FMC Alias Private Key: 7
3,309,196 UART: [art] Derive CDI
3,309,476 UART: [art] Store in in slot 0x4
3,395,077 UART: [art] Derive Key Pair
3,395,437 UART: [art] Store priv key in slot 0x5
3,408,543 UART: [art] Derive Key Pair - Done
3,423,160 UART: [art] Signing Cert with AUTHO
3,423,640 UART: RITY.KEYID = 7
3,439,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,857 UART: [art] PUB.X = 0134FA88E998AD163DEB766347A14A382AC0D77B1C0E9282C400BE84E8E9E19F436AF500DB53B90C65E6B72EEBEDD7E9
3,446,588 UART: [art] PUB.Y = 2F3AC13176BDEF50CF1D699F3B9A85A545491B981297B0BC6BF5958623259976295C96E1ABA894A93B656067023EE3F0
3,453,533 UART: [art] SIG.R = 49DBC6EDCCDEAC6A1961595D4B84A22820C7FDA9D953010A9F86978E305ED2CF1DC2C9EB555AD1354730D4C596EAEF9C
3,460,317 UART: [art] SIG.S = AE5BAFA1C2F384E7747E20E7643ABDC6ECB070AACA44C3DCA10CD13A7A5B9C91782AE1FCE1A222669F6C0C920C04EA84
3,484,576 UART: Caliptra RT
3,484,830 UART: [state] CFI Enabled
3,592,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,155 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,437 ready_for_fw is high
1,362,437 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,938,857 >>> mbox cmd response: success
2,938,857 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,000,589 UART:
3,000,605 UART: Running Caliptra FMC ...
3,001,013 UART:
3,001,067 UART: [state] CFI Enabled
3,011,284 UART: [fht] FMC Alias Private Key: 7
3,118,973 UART: [art] Extend RT PCRs Done
3,119,401 UART: [art] Lock RT PCRs Done
3,120,925 UART: [art] Populate DV Done
3,129,190 UART: [fht] FMC Alias Private Key: 7
3,130,122 UART: [art] Derive CDI
3,130,402 UART: [art] Store in in slot 0x4
3,216,081 UART: [art] Derive Key Pair
3,216,441 UART: [art] Store priv key in slot 0x5
3,229,369 UART: [art] Derive Key Pair - Done
3,244,133 UART: [art] Signing Cert with AUTHO
3,244,613 UART: RITY.KEYID = 7
3,259,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,644 UART: [art] PUB.X = AAFD658F30828FEE8D664A64F8C036B6B15E13FFA787EB1656EC71F24ED0B1FB1ACD67E0F1FDC82CD17CFB943F063A39
3,267,435 UART: [art] PUB.Y = 09848992AD74E54ED03083374F9FF9C3D7A18A8F48851E753D4BC22CB41C6623024B99068A3B339ED525BEB3DA139C20
3,274,376 UART: [art] SIG.R = 28D0E63E5811A2049B53FFED4927B3EAC46CD2DB26A95E59E882DCC66EE8F8B278738D78027062D1E05B23EA39BDF3F6
3,281,152 UART: [art] SIG.S = 8B9D2C6E976A119B281FACB5412E1136AE6C30644532FE6B7C34B7810F8761597CB299275A2F75B5690DD7924D87C4F8
3,305,261 UART: Caliptra RT
3,305,515 UART: [state] CFI Enabled
3,413,621 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,844 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,788 UART: [kat] SHA2-256
881,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,834 UART: [kat] ++
885,986 UART: [kat] sha1
890,170 UART: [kat] SHA2-256
892,108 UART: [kat] SHA2-384
894,765 UART: [kat] SHA2-512-ACC
896,666 UART: [kat] ECC-384
902,019 UART: [kat] HMAC-384Kdf
906,699 UART: [kat] LMS
1,474,895 UART: [kat] --
1,475,456 UART: [cold-reset] ++
1,475,904 UART: [fht] Storing FHT @ 0x50003400
1,478,763 UART: [idev] ++
1,478,931 UART: [idev] CDI.KEYID = 6
1,479,291 UART: [idev] SUBJECT.KEYID = 7
1,479,715 UART: [idev] UDS.KEYID = 0
1,480,060 ready_for_fw is high
1,480,060 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,487,877 UART: [idev] Erasing UDS.KEYID = 0
1,504,637 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,117 UART: [idev] --
1,514,186 UART: [ldev] ++
1,514,354 UART: [ldev] CDI.KEYID = 6
1,514,717 UART: [ldev] SUBJECT.KEYID = 5
1,515,143 UART: [ldev] AUTHORITY.KEYID = 7
1,515,606 UART: [ldev] FE.KEYID = 1
1,520,844 UART: [ldev] Erasing FE.KEYID = 1
1,546,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,601 UART: [ldev] --
1,585,972 UART: [fwproc] Waiting for Commands...
1,586,689 UART: [fwproc] Received command 0x46574c44
1,587,480 UART: [fwproc] Received Image of size 115224 bytes
2,896,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 90540
3,089,246 >>> mbox cmd response: success
3,089,246 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,090,428 UART: [afmc] ++
3,090,596 UART: [afmc] CDI.KEYID = 6
3,090,958 UART: [afmc] SUBJECT.KEYID = 7
3,091,383 UART: [afmc] AUTHORITY.KEYID = 5
3,126,806 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,244 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,024 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,752 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,637 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,327 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,028 UART: [afmc] --
3,170,008 UART: [cold-reset] --
3,170,966 UART: [state] Locking Datavault
3,172,081 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,685 UART: [state] Locking ICCM
3,173,183 UART: [exit] Launching FMC @ 0x40000130
3,178,512 UART:
3,178,528 UART: Running Caliptra FMC ...
3,178,936 UART:
3,179,079 UART: [state] CFI Enabled
3,189,478 UART: [fht] FMC Alias Private Key: 7
3,297,255 UART: [art] Extend RT PCRs Done
3,297,683 UART: [art] Lock RT PCRs Done
3,299,303 UART: [art] Populate DV Done
3,307,250 UART: [fht] FMC Alias Private Key: 7
3,308,366 UART: [art] Derive CDI
3,308,646 UART: [art] Store in in slot 0x4
3,394,533 UART: [art] Derive Key Pair
3,394,893 UART: [art] Store priv key in slot 0x5
3,408,083 UART: [art] Derive Key Pair - Done
3,423,043 UART: [art] Signing Cert with AUTHO
3,423,523 UART: RITY.KEYID = 7
3,438,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,578 UART: [art] PUB.X = 38D62B023DCF2D4C5290915FE1B27D7A2A51F3ABC7BEC65DDFE3BD9BD86FE6F9B4FDA8AF3E3673D04D690DAB112F0920
3,446,365 UART: [art] PUB.Y = 774F375D8D84C0E1E7E1575DA08F4E38A63E253F710AF6C4E9B3ED11518AF4DC31EF8F4002F258B8EFB4A47728BBA20C
3,453,320 UART: [art] SIG.R = 104422978C042F68D69051967A3FEC55AC0DB2AC352058A0456A1CE6343F652B21B796ADA5F5C7D3796AD6F299267147
3,460,080 UART: [art] SIG.S = A6707EE74548D9DC997B8136E1E75D10BF46DED954E3254A54FD71126F78F50F3F7F73939E7FF75D5AB5B9EC7CD53DB6
3,483,790 UART: Caliptra RT
3,484,136 UART: [state] CFI Enabled
3,593,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,685 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,678 ready_for_fw is high
1,362,678 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,939,494 >>> mbox cmd response: success
2,939,494 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,000,032 UART:
3,000,048 UART: Running Caliptra FMC ...
3,000,456 UART:
3,000,599 UART: [state] CFI Enabled
3,011,162 UART: [fht] FMC Alias Private Key: 7
3,119,243 UART: [art] Extend RT PCRs Done
3,119,671 UART: [art] Lock RT PCRs Done
3,121,299 UART: [art] Populate DV Done
3,129,372 UART: [fht] FMC Alias Private Key: 7
3,130,490 UART: [art] Derive CDI
3,130,770 UART: [art] Store in in slot 0x4
3,216,857 UART: [art] Derive Key Pair
3,217,217 UART: [art] Store priv key in slot 0x5
3,230,423 UART: [art] Derive Key Pair - Done
3,245,361 UART: [art] Signing Cert with AUTHO
3,245,841 UART: RITY.KEYID = 7
3,260,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,606 UART: [art] PUB.X = 2D0F144D52157F8A2BDD4A5454136D9A43F8870220851C7A109E0325DAFB402CA84213DCAE4DE6845D44A66F7479919F
3,268,367 UART: [art] PUB.Y = 0B92F9FE9A09B46DE735FD1BC071B168D8E577A196EFCBF41E19E7703666DD4859492D0D273BCD67A54189B0A6ADCBB6
3,275,322 UART: [art] SIG.R = 92C9302DE17D655D9269C391CF0B0580E3F3058241F8671E78B7D55850AE46DC605B595082C08795BFE87F12D99A978D
3,282,077 UART: [art] SIG.S = 6A52122FC228DE40EA614D2711919481A7F539519E6D6AE9B07E21315F4369287D65CFC4D1363002099D2732DFC77B03
3,305,901 UART: Caliptra RT
3,306,247 UART: [state] CFI Enabled
3,414,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,266 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Unprovisioned
86,269 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
893,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,865 UART: [kat] ++
898,017 UART: [kat] sha1
902,453 UART: [kat] SHA2-256
904,393 UART: [kat] SHA2-384
907,026 UART: [kat] SHA2-512-ACC
908,927 UART: [kat] ECC-384
918,028 UART: [kat] HMAC-384Kdf
922,560 UART: [kat] LMS
1,170,888 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,125 UART: [fht] FHT @ 0x50003400
1,174,768 UART: [idev] ++
1,174,936 UART: [idev] CDI.KEYID = 6
1,175,296 UART: [idev] SUBJECT.KEYID = 7
1,175,720 UART: [idev] UDS.KEYID = 0
1,176,065 ready_for_fw is high
1,176,065 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,183,464 UART: [idev] Erasing UDS.KEYID = 0
1,200,453 UART: [idev] Sha1 KeyId Algorithm
1,208,959 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,386 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 115224 bytes
2,590,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,213 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,334 >>> mbox cmd response: success
2,784,334 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,785,374 UART: [afmc] ++
2,785,542 UART: [afmc] CDI.KEYID = 6
2,785,904 UART: [afmc] SUBJECT.KEYID = 7
2,786,329 UART: [afmc] AUTHORITY.KEYID = 5
2,821,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,171 UART: [afmc] --
2,865,289 UART: [cold-reset] --
2,866,073 UART: [state] Locking Datavault
2,867,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,834 UART: [state] Locking ICCM
2,868,472 UART: [exit] Launching FMC @ 0x40000130
2,873,801 UART:
2,873,817 UART: Running Caliptra FMC ...
2,874,225 UART:
2,874,279 UART: [state] CFI Enabled
2,884,698 UART: [fht] FMC Alias Private Key: 7
2,992,933 UART: [art] Extend RT PCRs Done
2,993,361 UART: [art] Lock RT PCRs Done
2,994,951 UART: [art] Populate DV Done
3,003,078 UART: [fht] FMC Alias Private Key: 7
3,004,108 UART: [art] Derive CDI
3,004,388 UART: [art] Store in in slot 0x4
3,089,953 UART: [art] Derive Key Pair
3,090,313 UART: [art] Store priv key in slot 0x5
3,103,539 UART: [art] Derive Key Pair - Done
3,118,057 UART: [art] Signing Cert with AUTHO
3,118,537 UART: RITY.KEYID = 7
3,133,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,028 UART: [art] PUB.X = C0E50CEB8D2BC7573D2CA01EB34A9E3827E531095FD28F0B48A875BF671F193292E4156C9D6BEE7CF9040F733F813FB1
3,140,793 UART: [art] PUB.Y = 10A2B85AD22143EFCD8E114977430F131473A78B4DE6EC7FF94E15F52ABE2D83D1331A7EB443D9DC4400AA9B4A1ACFB6
3,147,734 UART: [art] SIG.R = 2CB3D7490056474E16EDA44E7EFF6B12FC4AEE94EB25AFD184B3A95E739D91F66EDFBEB98A6F7EFCE26723B388203659
3,154,500 UART: [art] SIG.S = B7A9CD2A6DCBC56A655DA9C476BC2FF7672227D01052661431B3293A93D9D7C0A4B74764CD1E8184F6FB97249C3D6247
3,177,873 UART: Caliptra RT
3,178,127 UART: [state] CFI Enabled
3,285,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,038 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 ready_for_fw is high
1,060,147 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,637,409 >>> mbox cmd response: success
2,637,409 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,699,259 UART:
2,699,275 UART: Running Caliptra FMC ...
2,699,683 UART:
2,699,737 UART: [state] CFI Enabled
2,710,538 UART: [fht] FMC Alias Private Key: 7
2,818,261 UART: [art] Extend RT PCRs Done
2,818,689 UART: [art] Lock RT PCRs Done
2,820,349 UART: [art] Populate DV Done
2,828,660 UART: [fht] FMC Alias Private Key: 7
2,829,646 UART: [art] Derive CDI
2,829,926 UART: [art] Store in in slot 0x4
2,915,535 UART: [art] Derive Key Pair
2,915,895 UART: [art] Store priv key in slot 0x5
2,928,933 UART: [art] Derive Key Pair - Done
2,943,975 UART: [art] Signing Cert with AUTHO
2,944,455 UART: RITY.KEYID = 7
2,959,839 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,604 UART: [art] PUB.X = D2797292C58E3FEC703725E5B33941EFEA49415937014FA2678BB6E29EBBDAD7F7DA1542F6F6C1526514F66D5FA1A2A7
2,967,379 UART: [art] PUB.Y = 6DFA69478C7BD0F672F320255069D8ADE4D7F5866CAA2F99A9BAEEDB0D829E95D1784663DBB037188A938DAD67836C51
2,974,336 UART: [art] SIG.R = 9547BE5E5BD662DBCAAF424584541D8FE422C95CE1486F7C20D08BDA5F32944AA5C0605E48C2885A77E8B64807483C04
2,981,104 UART: [art] SIG.S = ED03FEBECB1E3D56603544F0356BE2695E5E9668C2BA01D8EB4EA1DC6261206502D787BC0726C8E0D963C9B76E227F68
3,004,879 UART: Caliptra RT
3,005,133 UART: [state] CFI Enabled
3,112,240 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,309 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
893,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,644 UART: [kat] ++
897,796 UART: [kat] sha1
902,130 UART: [kat] SHA2-256
904,070 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,419 UART: [kat] LMS
1,171,747 UART: [kat] --
1,172,710 UART: [cold-reset] ++
1,173,126 UART: [fht] FHT @ 0x50003400
1,175,675 UART: [idev] ++
1,175,843 UART: [idev] CDI.KEYID = 6
1,176,203 UART: [idev] SUBJECT.KEYID = 7
1,176,627 UART: [idev] UDS.KEYID = 0
1,176,972 ready_for_fw is high
1,176,972 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,184,305 UART: [idev] Erasing UDS.KEYID = 0
1,201,884 UART: [idev] Sha1 KeyId Algorithm
1,210,488 UART: [idev] --
1,211,492 UART: [ldev] ++
1,211,660 UART: [ldev] CDI.KEYID = 6
1,212,023 UART: [ldev] SUBJECT.KEYID = 5
1,212,449 UART: [ldev] AUTHORITY.KEYID = 7
1,212,912 UART: [ldev] FE.KEYID = 1
1,218,212 UART: [ldev] Erasing FE.KEYID = 1
1,244,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,558 UART: [ldev] --
1,283,899 UART: [fwproc] Wait for Commands...
1,284,691 UART: [fwproc] Recv command 0x46574c44
1,285,419 UART: [fwproc] Recv'd Img size: 115224 bytes
2,593,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,902 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,787,135 >>> mbox cmd response: success
2,787,135 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,788,357 UART: [afmc] ++
2,788,525 UART: [afmc] CDI.KEYID = 6
2,788,887 UART: [afmc] SUBJECT.KEYID = 7
2,789,312 UART: [afmc] AUTHORITY.KEYID = 5
2,825,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,841,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,842,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,847,874 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,853,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,859,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,867,274 UART: [afmc] --
2,868,248 UART: [cold-reset] --
2,869,068 UART: [state] Locking Datavault
2,870,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,873 UART: [state] Locking ICCM
2,871,433 UART: [exit] Launching FMC @ 0x40000130
2,876,762 UART:
2,876,778 UART: Running Caliptra FMC ...
2,877,186 UART:
2,877,329 UART: [state] CFI Enabled
2,887,678 UART: [fht] FMC Alias Private Key: 7
2,995,721 UART: [art] Extend RT PCRs Done
2,996,149 UART: [art] Lock RT PCRs Done
2,997,473 UART: [art] Populate DV Done
3,005,564 UART: [fht] FMC Alias Private Key: 7
3,006,672 UART: [art] Derive CDI
3,006,952 UART: [art] Store in in slot 0x4
3,093,051 UART: [art] Derive Key Pair
3,093,411 UART: [art] Store priv key in slot 0x5
3,106,913 UART: [art] Derive Key Pair - Done
3,121,877 UART: [art] Signing Cert with AUTHO
3,122,357 UART: RITY.KEYID = 7
3,137,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,138,330 UART: [art] PUB.X = 89515E7CA84C86AC2DFD4BC4289AF16A98A5621DB4464D6AA24536F4473E4A1905DFD1A358F409E325BF3C6F07DABFE6
3,145,105 UART: [art] PUB.Y = 754832CCB82579D8266C908CD1A180131F09F9B3CB3BF4E23CD1B621EE146B640A1EFBF8A9737EE759253A18CE934C12
3,152,055 UART: [art] SIG.R = 6E9CEA40EA9EDC764CCDFA7119EA330367800693A4835F0624459A254A9C0CEC13B49CC694504656978824E4DDA73997
3,158,813 UART: [art] SIG.S = 739EE7EE3674ECFEEF818C7A63BA7243864318B71FB8ACF125BCEFEEBC93BABAD0D881F7DF32C53B54BFB360A82E9373
3,182,844 UART: Caliptra RT
3,183,190 UART: [state] CFI Enabled
3,290,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,925 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,094 ready_for_fw is high
1,061,094 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,638,584 >>> mbox cmd response: success
2,638,584 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,700,690 UART:
2,700,706 UART: Running Caliptra FMC ...
2,701,114 UART:
2,701,257 UART: [state] CFI Enabled
2,711,826 UART: [fht] FMC Alias Private Key: 7
2,819,733 UART: [art] Extend RT PCRs Done
2,820,161 UART: [art] Lock RT PCRs Done
2,821,903 UART: [art] Populate DV Done
2,829,958 UART: [fht] FMC Alias Private Key: 7
2,830,942 UART: [art] Derive CDI
2,831,222 UART: [art] Store in in slot 0x4
2,917,087 UART: [art] Derive Key Pair
2,917,447 UART: [art] Store priv key in slot 0x5
2,930,797 UART: [art] Derive Key Pair - Done
2,945,615 UART: [art] Signing Cert with AUTHO
2,946,095 UART: RITY.KEYID = 7
2,961,081 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,846 UART: [art] PUB.X = 6FB083C1442DCD1AA45D2A764B5CE7EB35E0E5ED673DD2C4CA15E1FC150C497D4C338BFCD070ED1379E5527111A76E09
2,968,626 UART: [art] PUB.Y = 038C8EA672613305293A35BC0E6CBA15DDE2AAE7D20DB41B0622C4FE41CFA65D0C902A274874C1CFA9FB8F30FC8D7B5A
2,975,578 UART: [art] SIG.R = F885ECBE49AC428A68C7F4A68AF44452154CF915156F36D1325C32E713FB964DBAC9559295E3F9E6854B40AA7B907D1A
2,982,354 UART: [art] SIG.S = 5E8DAECFDE0A56B3C3AADCF12CC3CF27F725A752BB50B67AB714F0DECE77EC63418DBE74E33FFF888877C0788561AE51
3,005,750 UART: Caliptra RT
3,006,096 UART: [state] CFI Enabled
3,114,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,619 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,776 UART: [state] LifecycleState = Unprovisioned
85,431 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,380 UART: [kat] LMS
1,168,692 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 ready_for_fw is high
1,173,987 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,181,701 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,214,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,388 UART: [fwproc] Wait for Commands...
1,281,119 UART: [fwproc] Recv command 0x46574c44
1,281,852 UART: [fwproc] Recv'd Img size: 115224 bytes
2,589,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,354 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,783,562 >>> mbox cmd response: success
2,783,562 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,784,689 UART: [afmc] ++
2,784,857 UART: [afmc] CDI.KEYID = 6
2,785,220 UART: [afmc] SUBJECT.KEYID = 7
2,785,646 UART: [afmc] AUTHORITY.KEYID = 5
2,821,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,646 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,738 UART: [afmc] --
2,864,818 UART: [cold-reset] --
2,865,636 UART: [state] Locking Datavault
2,867,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,641 UART: [state] Locking ICCM
2,868,093 UART: [exit] Launching FMC @ 0x40000130
2,873,422 UART:
2,873,438 UART: Running Caliptra FMC ...
2,873,846 UART:
2,873,900 UART: [state] CFI Enabled
2,884,187 UART: [fht] FMC Alias Private Key: 7
2,993,436 UART: [art] Extend RT PCRs Done
2,993,864 UART: [art] Lock RT PCRs Done
2,995,092 UART: [art] Populate DV Done
3,003,345 UART: [fht] FMC Alias Private Key: 7
3,004,413 UART: [art] Derive CDI
3,004,693 UART: [art] Store in in slot 0x4
3,089,994 UART: [art] Derive Key Pair
3,090,354 UART: [art] Store priv key in slot 0x5
3,103,378 UART: [art] Derive Key Pair - Done
3,117,990 UART: [art] Signing Cert with AUTHO
3,118,470 UART: RITY.KEYID = 7
3,133,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,595 UART: [art] PUB.X = 74EA9C0040A705857E14E40E60B40BD0E1BB849CF3A9C783BDFC027406086D7DB740B52AF825E96A53CF12BA6FD7DD2B
3,141,339 UART: [art] PUB.Y = A7E4B8AF00B0D60374D7AB611F245FB075CD7B7E88ED81C18A4C658B01FAF82EC2C7EFFA18A825DB55851B97648D005C
3,148,255 UART: [art] SIG.R = C1576A56A29E0CA178ED78DD5CD29E325F55B69A2C3BBBCED87547EDAB3DC437E89CD9EDA3299A02F17277FD33E4A0DF
3,155,043 UART: [art] SIG.S = 9D45B6D0085B4D06E5F0302A7984C36B697EDCADBC22C4E39757465B29D9FBC9B1AEF6C97062D06F67456DBD64F326FD
3,178,798 UART: Caliptra RT
3,179,052 UART: [state] CFI Enabled
3,286,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,152 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 ready_for_fw is high
1,055,964 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,634,106 >>> mbox cmd response: success
2,634,106 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,696,570 UART:
2,696,586 UART: Running Caliptra FMC ...
2,696,994 UART:
2,697,048 UART: [state] CFI Enabled
2,707,617 UART: [fht] FMC Alias Private Key: 7
2,815,456 UART: [art] Extend RT PCRs Done
2,815,884 UART: [art] Lock RT PCRs Done
2,817,692 UART: [art] Populate DV Done
2,825,837 UART: [fht] FMC Alias Private Key: 7
2,826,935 UART: [art] Derive CDI
2,827,215 UART: [art] Store in in slot 0x4
2,913,378 UART: [art] Derive Key Pair
2,913,738 UART: [art] Store priv key in slot 0x5
2,927,024 UART: [art] Derive Key Pair - Done
2,941,997 UART: [art] Signing Cert with AUTHO
2,942,477 UART: RITY.KEYID = 7
2,957,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,650 UART: [art] PUB.X = FEE61AA068370E709D35366EA2EEDE4D56C3AC86B1049C8CFC2990D22BEEAC9A1C57D6F38F8DD1F907936DBCECF8313D
2,965,435 UART: [art] PUB.Y = 637A7BA09DF839E1E0773801DF4D8771C988CA8AFF6B666AB6C1ADE496F00C547ADB8D9191717DFE9DF5ABFB216D4415
2,972,395 UART: [art] SIG.R = B0C40AD0BBFC0C6A29AD6C4601607F4E47CD0D840689271F57D8E098B81DAC178BB77F290E9ECB0344D043BFB35485B1
2,979,156 UART: [art] SIG.S = 1D646AA091A089D8329D62823BDEA1146A86673F52F5C70DC5AAF90C292DEAE190815A477173147643E6279447956499
3,003,185 UART: Caliptra RT
3,003,439 UART: [state] CFI Enabled
3,111,269 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,314 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Unprovisioned
85,572 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,326 UART: [cold-reset] ++
1,170,708 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,174,568 ready_for_fw is high
1,174,568 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,746 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,409 UART: [fwproc] Wait for Commands...
1,281,992 UART: [fwproc] Recv command 0x46574c44
1,282,725 UART: [fwproc] Recv'd Img size: 115224 bytes
2,591,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,857 UART: [fwproc] Load Runtime at address 0x40005000 len 90540
2,784,907 >>> mbox cmd response: success
2,784,907 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,786,108 UART: [afmc] ++
2,786,276 UART: [afmc] CDI.KEYID = 6
2,786,639 UART: [afmc] SUBJECT.KEYID = 7
2,787,065 UART: [afmc] AUTHORITY.KEYID = 5
2,822,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,172 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,017 UART: [afmc] --
2,865,947 UART: [cold-reset] --
2,866,837 UART: [state] Locking Datavault
2,868,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,678 UART: [state] Locking ICCM
2,869,344 UART: [exit] Launching FMC @ 0x40000130
2,874,673 UART:
2,874,689 UART: Running Caliptra FMC ...
2,875,097 UART:
2,875,240 UART: [state] CFI Enabled
2,886,055 UART: [fht] FMC Alias Private Key: 7
2,994,230 UART: [art] Extend RT PCRs Done
2,994,658 UART: [art] Lock RT PCRs Done
2,995,994 UART: [art] Populate DV Done
3,004,319 UART: [fht] FMC Alias Private Key: 7
3,005,313 UART: [art] Derive CDI
3,005,593 UART: [art] Store in in slot 0x4
3,091,004 UART: [art] Derive Key Pair
3,091,364 UART: [art] Store priv key in slot 0x5
3,104,660 UART: [art] Derive Key Pair - Done
3,119,423 UART: [art] Signing Cert with AUTHO
3,119,903 UART: RITY.KEYID = 7
3,135,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,084 UART: [art] PUB.X = C1977B780D9E00DE861715590FBB056F131971C3B4093295DE58A6D470BB9B89259F639F5DBBCCE0E1CB1E592A553204
3,142,819 UART: [art] PUB.Y = 75F53C2F3F456F3EF494354DA6E23DE90BA7891A1AA6CAEE92B655D1E9E388C765AA73D0E5BDBA9D13C28DA13BB27599
3,149,784 UART: [art] SIG.R = 4F4D1CF24E54BF76DE1B659F3BF3F6C99252CCC4FBBBB5C109A3FED7E981136EDC848DB7980A553DF9DB0DD203856F76
3,156,564 UART: [art] SIG.S = D8C09DC7F6225C463174B1B6E97D7E13469FBF5F0B8C133206612488780EC3552BD577DEB576E9B3C4D30533D2C5259C
3,180,365 UART: Caliptra RT
3,180,711 UART: [state] CFI Enabled
3,288,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,078 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,669 ready_for_fw is high
1,056,669 <<< Executing mbox cmd 0x46574c44 (115224 bytes) from SoC
2,636,087 >>> mbox cmd response: success
2,636,087 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,698,407 UART:
2,698,423 UART: Running Caliptra FMC ...
2,698,831 UART:
2,698,974 UART: [state] CFI Enabled
2,709,793 UART: [fht] FMC Alias Private Key: 7
2,817,718 UART: [art] Extend RT PCRs Done
2,818,146 UART: [art] Lock RT PCRs Done
2,819,516 UART: [art] Populate DV Done
2,827,529 UART: [fht] FMC Alias Private Key: 7
2,828,461 UART: [art] Derive CDI
2,828,741 UART: [art] Store in in slot 0x4
2,914,584 UART: [art] Derive Key Pair
2,914,944 UART: [art] Store priv key in slot 0x5
2,928,570 UART: [art] Derive Key Pair - Done
2,943,082 UART: [art] Signing Cert with AUTHO
2,943,562 UART: RITY.KEYID = 7
2,958,824 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,589 UART: [art] PUB.X = C98D4C1F88CEFDFB4B876B197F5CC1544BB02CE1DC4313D7C613F53AE9F56247289DE80F5DE175C2CAE46CA1D73CE9F2
2,966,378 UART: [art] PUB.Y = 5AA8C56994F0D4F8E57090F0C02815F1A24D8E0FBBA0F42622DDBDC48E2D1CA40C2BA474B7DAD9194E7D75159743BD19
2,973,336 UART: [art] SIG.R = 50BCB99F3DB337F917DF3EBB7758D444099EF326B94A4B7EC0FFBADF905E4EFEA2AB5B415C0A728381E59AA19971307C
2,980,118 UART: [art] SIG.S = 18CC8E64C49306F3DE43CB298B0BC4B44308B6705819E8E4E5D5BC75B53D21896A88B497B2702256054C78B050B5605E
3,003,581 UART: Caliptra RT
3,003,927 UART: [state] CFI Enabled
3,111,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,130 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,969 UART:
192,324 UART: Running Caliptra ROM ...
193,413 UART:
193,554 UART: [state] CFI Enabled
266,690 UART: [state] LifecycleState = Unprovisioned
268,591 UART: [state] DebugLocked = No
271,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,597 UART: [kat] SHA2-256
446,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,837 UART: [kat] ++
457,282 UART: [kat] sha1
467,677 UART: [kat] SHA2-256
470,433 UART: [kat] SHA2-384
476,281 UART: [kat] SHA2-512-ACC
478,657 UART: [kat] ECC-384
2,767,328 UART: [kat] HMAC-384Kdf
2,798,476 UART: [kat] LMS
3,988,766 UART: [kat] --
3,993,984 UART: [cold-reset] ++
3,996,130 UART: [fht] Storing FHT @ 0x50003400
4,008,752 UART: [idev] ++
4,009,327 UART: [idev] CDI.KEYID = 6
4,010,366 UART: [idev] SUBJECT.KEYID = 7
4,011,539 UART: [idev] UDS.KEYID = 0
4,012,612 ready_for_fw is high
4,012,815 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,033,201 UART: [idev] Erasing UDS.KEYID = 0
7,342,599 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,838 UART: [idev] --
7,369,471 UART: [ldev] ++
7,370,047 UART: [ldev] CDI.KEYID = 6
7,370,991 UART: [ldev] SUBJECT.KEYID = 5
7,372,264 UART: [ldev] AUTHORITY.KEYID = 7
7,373,504 UART: [ldev] FE.KEYID = 1
7,421,631 UART: [ldev] Erasing FE.KEYID = 1
10,755,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,721 UART: [ldev] --
13,136,717 UART: [fwproc] Waiting for Commands...
13,139,615 UART: [fwproc] Received command 0x46574c44
13,141,854 UART: [fwproc] Received Image of size 7036 bytes
15,886,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,964,665 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,967,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
15,975,961 >>> mbox cmd response: success
15,980,760 UART: [afmc] ++
15,981,337 UART: [afmc] CDI.KEYID = 6
15,982,356 UART: [afmc] SUBJECT.KEYID = 7
15,983,509 UART: [afmc] AUTHORITY.KEYID = 5
19,338,088 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,638,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,641,081 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,655,555 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,670,382 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,684,786 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,707,600 UART: [afmc] --
21,712,001 UART: [cold-reset] --
21,715,646 UART: [state] Locking Datavault
21,720,566 UART: [state] Locking PCR0, PCR1 and PCR31
21,722,322 UART: [state] Locking ICCM
21,724,355 UART: [exit] Launching FMC @ 0x40000000
21,732,745 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,738,012 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,783,570 ready_for_fw is high
3,784,004 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,676,785 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,512 UART:
192,901 UART: Running Caliptra ROM ...
194,096 UART:
603,929 UART: [state] CFI Enabled
619,294 UART: [state] LifecycleState = Unprovisioned
621,246 UART: [state] DebugLocked = No
623,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,843 UART: [kat] SHA2-256
797,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,116 UART: [kat] ++
808,566 UART: [kat] sha1
820,740 UART: [kat] SHA2-256
823,434 UART: [kat] SHA2-384
828,443 UART: [kat] SHA2-512-ACC
830,753 UART: [kat] ECC-384
3,114,839 UART: [kat] HMAC-384Kdf
3,126,289 UART: [kat] LMS
4,316,412 UART: [kat] --
4,322,553 UART: [cold-reset] ++
4,324,775 UART: [fht] Storing FHT @ 0x50003400
4,337,389 UART: [idev] ++
4,338,169 UART: [idev] CDI.KEYID = 6
4,339,066 UART: [idev] SUBJECT.KEYID = 7
4,340,176 UART: [idev] UDS.KEYID = 0
4,341,257 ready_for_fw is high
4,341,463 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,356,179 UART: [idev] Erasing UDS.KEYID = 0
7,633,477 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,261 UART: [idev] --
7,658,853 UART: [ldev] ++
7,659,424 UART: [ldev] CDI.KEYID = 6
7,660,443 UART: [ldev] SUBJECT.KEYID = 5
7,661,601 UART: [ldev] AUTHORITY.KEYID = 7
7,662,828 UART: [ldev] FE.KEYID = 1
7,673,582 UART: [ldev] Erasing FE.KEYID = 1
10,959,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,933 UART: [ldev] --
13,317,616 UART: [fwproc] Waiting for Commands...
13,320,471 UART: [fwproc] Received command 0x46574c44
13,322,653 UART: [fwproc] Received Image of size 7036 bytes
16,067,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,143,984 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,147,060 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
16,154,686 >>> mbox cmd response: success
16,158,925 UART: [afmc] ++
16,159,567 UART: [afmc] CDI.KEYID = 6
16,160,449 UART: [afmc] SUBJECT.KEYID = 7
16,161,724 UART: [afmc] AUTHORITY.KEYID = 5
19,472,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,766,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,769,045 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,783,584 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,798,346 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,812,744 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,833,595 UART: [afmc] --
21,837,888 UART: [cold-reset] --
21,842,882 UART: [state] Locking Datavault
21,849,272 UART: [state] Locking PCR0, PCR1 and PCR31
21,850,970 UART: [state] Locking ICCM
21,852,044 UART: [exit] Launching FMC @ 0x40000000
21,860,462 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,865,890 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,127,734 ready_for_fw is high
4,128,126 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,896,220 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,033 UART:
192,383 UART: Running Caliptra ROM ...
193,561 UART:
193,721 UART: [state] CFI Enabled
265,010 UART: [state] LifecycleState = Unprovisioned
266,890 UART: [state] DebugLocked = No
268,862 UART: [state] WD Timer not started. Device not locked for debugging
271,832 UART: [kat] SHA2-256
450,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,513 UART: [kat] ++
463,071 UART: [kat] sha1
475,029 UART: [kat] SHA2-256
478,054 UART: [kat] SHA2-384
483,621 UART: [kat] SHA2-512-ACC
486,557 UART: [kat] ECC-384
2,956,110 UART: [kat] HMAC-384Kdf
2,980,877 UART: [kat] LMS
3,510,342 UART: [kat] --
3,514,990 UART: [cold-reset] ++
3,517,215 UART: [fht] FHT @ 0x50003400
3,527,345 UART: [idev] ++
3,527,920 UART: [idev] CDI.KEYID = 6
3,528,833 UART: [idev] SUBJECT.KEYID = 7
3,530,008 UART: [idev] UDS.KEYID = 0
3,530,938 ready_for_fw is high
3,531,160 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,553,297 UART: [idev] Erasing UDS.KEYID = 0
6,034,189 UART: [idev] Sha1 KeyId Algorithm
6,057,941 UART: [idev] --
6,063,020 UART: [ldev] ++
6,063,647 UART: [ldev] CDI.KEYID = 6
6,064,541 UART: [ldev] SUBJECT.KEYID = 5
6,065,709 UART: [ldev] AUTHORITY.KEYID = 7
6,066,951 UART: [ldev] FE.KEYID = 1
6,109,310 UART: [ldev] Erasing FE.KEYID = 1
8,613,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,910 UART: [ldev] --
10,423,739 UART: [fwproc] Wait for Commands...
10,426,557 UART: [fwproc] Recv command 0x46574c44
10,428,661 UART: [fwproc] Recv'd Img size: 7036 bytes
12,516,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,589,274 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,592,330 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,599,976 >>> mbox cmd response: success
12,603,925 UART: [afmc] ++
12,604,506 UART: [afmc] CDI.KEYID = 6
12,605,426 UART: [afmc] SUBJECT.KEYID = 7
12,606,641 UART: [afmc] AUTHORITY.KEYID = 5
15,131,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,856,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,858,372 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,874,309 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,890,231 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,906,031 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,929,376 UART: [afmc] --
16,933,853 UART: [cold-reset] --
16,936,797 UART: [state] Locking Datavault
16,943,177 UART: [state] Locking PCR0, PCR1 and PCR31
16,944,873 UART: [state] Locking ICCM
16,946,104 UART: [exit] Launching FMC @ 0x40000000
16,954,554 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,959,935 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,259 UART:
192,598 UART: Running Caliptra ROM ...
193,777 UART:
193,931 UART: [state] CFI Enabled
265,635 UART: [state] LifecycleState = Unprovisioned
268,040 UART: [state] DebugLocked = No
270,499 UART: [state] WD Timer not started. Device not locked for debugging
275,662 UART: [kat] SHA2-256
465,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,316 UART: [kat] ++
476,850 UART: [kat] sha1
488,296 UART: [kat] SHA2-256
491,328 UART: [kat] SHA2-384
497,036 UART: [kat] SHA2-512-ACC
499,622 UART: [kat] ECC-384
2,948,872 UART: [kat] HMAC-384Kdf
2,977,012 UART: [kat] LMS
3,508,744 UART: [kat] --
3,513,465 UART: [cold-reset] ++
3,515,544 UART: [fht] FHT @ 0x50003400
3,527,940 UART: [idev] ++
3,528,648 UART: [idev] CDI.KEYID = 6
3,529,611 UART: [idev] SUBJECT.KEYID = 7
3,530,784 UART: [idev] UDS.KEYID = 0
3,531,760 ready_for_fw is high
3,531,948 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,548,385 UART: [idev] Erasing UDS.KEYID = 0
6,032,914 UART: [idev] Sha1 KeyId Algorithm
6,055,523 UART: [idev] --
6,059,529 UART: [ldev] ++
6,060,214 UART: [ldev] CDI.KEYID = 6
6,061,185 UART: [ldev] SUBJECT.KEYID = 5
6,062,298 UART: [ldev] AUTHORITY.KEYID = 7
6,063,532 UART: [ldev] FE.KEYID = 1
6,105,027 UART: [ldev] Erasing FE.KEYID = 1
8,612,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,869 UART: [ldev] --
10,417,077 UART: [fwproc] Wait for Commands...
10,419,450 UART: [fwproc] Recv command 0x46574c44
10,421,764 UART: [fwproc] Recv'd Img size: 7036 bytes
12,542,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,617,373 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,620,887 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,632,125 >>> mbox cmd response: success
12,636,919 UART: [afmc] ++
12,637,560 UART: [afmc] CDI.KEYID = 6
12,638,744 UART: [afmc] SUBJECT.KEYID = 7
12,640,233 UART: [afmc] AUTHORITY.KEYID = 5
15,180,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,903,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,905,476 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,920,488 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,935,700 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,950,779 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,974,402 UART: [afmc] --
16,977,464 UART: [cold-reset] --
16,979,567 UART: [state] Locking Datavault
16,985,468 UART: [state] Locking PCR0, PCR1 and PCR31
16,987,658 UART: [state] Locking ICCM
16,990,262 UART: [exit] Launching FMC @ 0x40000000
16,998,990 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,005,024 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,437,988 ready_for_fw is high
3,438,389 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,423,931 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,301 UART:
192,657 UART: Running Caliptra ROM ...
193,848 UART:
603,685 UART: [state] CFI Enabled
615,985 UART: [state] LifecycleState = Unprovisioned
618,368 UART: [state] DebugLocked = No
619,829 UART: [state] WD Timer not started. Device not locked for debugging
624,696 UART: [kat] SHA2-256
814,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,363 UART: [kat] ++
825,897 UART: [kat] sha1
838,258 UART: [kat] SHA2-256
841,267 UART: [kat] SHA2-384
847,183 UART: [kat] SHA2-512-ACC
849,760 UART: [kat] ECC-384
3,293,663 UART: [kat] HMAC-384Kdf
3,305,249 UART: [kat] LMS
3,837,118 UART: [kat] --
3,841,909 UART: [cold-reset] ++
3,843,270 UART: [fht] FHT @ 0x50003400
3,854,746 UART: [idev] ++
3,855,398 UART: [idev] CDI.KEYID = 6
3,856,433 UART: [idev] SUBJECT.KEYID = 7
3,857,607 UART: [idev] UDS.KEYID = 0
3,858,544 ready_for_fw is high
3,858,732 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,872,127 UART: [idev] Erasing UDS.KEYID = 0
6,334,800 UART: [idev] Sha1 KeyId Algorithm
6,356,532 UART: [idev] --
6,362,079 UART: [ldev] ++
6,362,758 UART: [ldev] CDI.KEYID = 6
6,363,720 UART: [ldev] SUBJECT.KEYID = 5
6,364,874 UART: [ldev] AUTHORITY.KEYID = 7
6,366,099 UART: [ldev] FE.KEYID = 1
6,379,068 UART: [ldev] Erasing FE.KEYID = 1
8,856,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,805 UART: [ldev] --
10,650,938 UART: [fwproc] Wait for Commands...
10,652,501 UART: [fwproc] Recv command 0x46574c44
10,654,811 UART: [fwproc] Recv'd Img size: 7036 bytes
12,781,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,857,520 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,861,061 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,871,906 >>> mbox cmd response: success
12,875,254 UART: [afmc] ++
12,875,839 UART: [afmc] CDI.KEYID = 6
12,877,082 UART: [afmc] SUBJECT.KEYID = 7
12,878,519 UART: [afmc] AUTHORITY.KEYID = 5
15,380,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,103,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,105,664 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,120,749 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,135,878 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,150,947 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,174,431 UART: [afmc] --
17,177,975 UART: [cold-reset] --
17,182,810 UART: [state] Locking Datavault
17,189,046 UART: [state] Locking PCR0, PCR1 and PCR31
17,191,182 UART: [state] Locking ICCM
17,192,848 UART: [exit] Launching FMC @ 0x40000000
17,201,523 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,207,536 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,752,669 ready_for_fw is high
3,753,225 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,661,691 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,402 UART: [kat] LMS
1,475,598 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,793 UART: [fht] Storing FHT @ 0x50003400
1,479,540 UART: [idev] ++
1,479,708 UART: [idev] CDI.KEYID = 6
1,480,068 UART: [idev] SUBJECT.KEYID = 7
1,480,492 UART: [idev] UDS.KEYID = 0
1,480,837 ready_for_fw is high
1,480,837 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,504,942 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,623 UART: [ldev] ++
1,514,791 UART: [ldev] CDI.KEYID = 6
1,515,154 UART: [ldev] SUBJECT.KEYID = 5
1,515,580 UART: [ldev] AUTHORITY.KEYID = 7
1,516,043 UART: [ldev] FE.KEYID = 1
1,521,237 UART: [ldev] Erasing FE.KEYID = 1
1,546,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,770 UART: [ldev] --
1,586,155 UART: [fwproc] Waiting for Commands...
1,586,936 UART: [fwproc] Received command 0x46574c44
1,587,727 UART: [fwproc] Received Image of size 7036 bytes
1,655,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,683,768 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,684,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,687,953 >>> mbox cmd response: success
1,689,165 UART: [afmc] ++
1,689,333 UART: [afmc] CDI.KEYID = 6
1,689,695 UART: [afmc] SUBJECT.KEYID = 7
1,690,120 UART: [afmc] AUTHORITY.KEYID = 5
1,724,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,741,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,832 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,747,553 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,753,448 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,759,160 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,766,945 UART: [afmc] --
1,768,005 UART: [cold-reset] --
1,769,071 UART: [state] Locking Datavault
1,770,406 UART: [state] Locking PCR0, PCR1 and PCR31
1,771,010 UART: [state] Locking ICCM
1,771,468 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,776,763 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,778,646 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,755 ready_for_fw is high
1,361,755 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,535,949 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,079 UART: [state] LifecycleState = Unprovisioned
86,734 UART: [state] DebugLocked = No
87,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,094 UART: [kat] SHA2-256
883,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,140 UART: [kat] ++
887,292 UART: [kat] sha1
891,660 UART: [kat] SHA2-256
893,598 UART: [kat] SHA2-384
896,337 UART: [kat] SHA2-512-ACC
898,238 UART: [kat] ECC-384
904,113 UART: [kat] HMAC-384Kdf
908,733 UART: [kat] LMS
1,476,929 UART: [kat] --
1,477,494 UART: [cold-reset] ++
1,477,822 UART: [fht] Storing FHT @ 0x50003400
1,480,787 UART: [idev] ++
1,480,955 UART: [idev] CDI.KEYID = 6
1,481,315 UART: [idev] SUBJECT.KEYID = 7
1,481,739 UART: [idev] UDS.KEYID = 0
1,482,084 ready_for_fw is high
1,482,084 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,505,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,527 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,386 UART: [ldev] Erasing FE.KEYID = 1
1,548,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,401 UART: [ldev] --
1,587,766 UART: [fwproc] Waiting for Commands...
1,588,441 UART: [fwproc] Received command 0x46574c44
1,589,232 UART: [fwproc] Received Image of size 7036 bytes
1,656,989 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,683,609 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,684,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,687,802 >>> mbox cmd response: success
1,689,010 UART: [afmc] ++
1,689,178 UART: [afmc] CDI.KEYID = 6
1,689,540 UART: [afmc] SUBJECT.KEYID = 7
1,689,965 UART: [afmc] AUTHORITY.KEYID = 5
1,724,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,741,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,999 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,747,720 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,753,615 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,759,327 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,767,238 UART: [afmc] --
1,768,234 UART: [cold-reset] --
1,768,926 UART: [state] Locking Datavault
1,770,249 UART: [state] Locking PCR0, PCR1 and PCR31
1,770,853 UART: [state] Locking ICCM
1,771,487 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,776,782 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,778,665 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,794 ready_for_fw is high
1,362,794 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,536,812 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,885 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
893,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,781 UART: [kat] ++
897,933 UART: [kat] sha1
902,159 UART: [kat] SHA2-256
904,099 UART: [kat] SHA2-384
906,850 UART: [kat] SHA2-512-ACC
908,751 UART: [kat] ECC-384
918,322 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,349 UART: [cold-reset] ++
1,172,879 UART: [fht] FHT @ 0x50003400
1,175,640 UART: [idev] ++
1,175,808 UART: [idev] CDI.KEYID = 6
1,176,168 UART: [idev] SUBJECT.KEYID = 7
1,176,592 UART: [idev] UDS.KEYID = 0
1,176,937 ready_for_fw is high
1,176,937 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,184,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,039 UART: [idev] Sha1 KeyId Algorithm
1,209,353 UART: [idev] --
1,210,335 UART: [ldev] ++
1,210,503 UART: [ldev] CDI.KEYID = 6
1,210,866 UART: [ldev] SUBJECT.KEYID = 5
1,211,292 UART: [ldev] AUTHORITY.KEYID = 7
1,211,755 UART: [ldev] FE.KEYID = 1
1,217,127 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,585 UART: [ldev] --
1,282,894 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 7036 bytes
1,352,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,701 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,817 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,810 >>> mbox cmd response: success
1,385,028 UART: [afmc] ++
1,385,196 UART: [afmc] CDI.KEYID = 6
1,385,558 UART: [afmc] SUBJECT.KEYID = 7
1,385,983 UART: [afmc] AUTHORITY.KEYID = 5
1,421,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,476 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,444,197 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,450,092 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,784 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,602 UART: [afmc] --
1,464,698 UART: [cold-reset] --
1,465,508 UART: [state] Locking Datavault
1,466,411 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,015 UART: [state] Locking ICCM
1,467,467 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,762 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,645 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,817 ready_for_fw is high
1,060,817 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,236,206 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,765 UART: [state] LifecycleState = Unprovisioned
85,420 UART: [state] DebugLocked = No
86,052 UART: [state] WD Timer not started. Device not locked for debugging
87,391 UART: [kat] SHA2-256
893,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,166 UART: [kat] ++
897,318 UART: [kat] sha1
901,328 UART: [kat] SHA2-256
903,268 UART: [kat] SHA2-384
906,051 UART: [kat] SHA2-512-ACC
907,952 UART: [kat] ECC-384
917,747 UART: [kat] HMAC-384Kdf
922,461 UART: [kat] LMS
1,170,789 UART: [kat] --
1,171,636 UART: [cold-reset] ++
1,172,164 UART: [fht] FHT @ 0x50003400
1,174,865 UART: [idev] ++
1,175,033 UART: [idev] CDI.KEYID = 6
1,175,393 UART: [idev] SUBJECT.KEYID = 7
1,175,817 UART: [idev] UDS.KEYID = 0
1,176,162 ready_for_fw is high
1,176,162 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,184,183 UART: [idev] Erasing UDS.KEYID = 0
1,200,808 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,004 UART: [ldev] ++
1,210,172 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,961 UART: [ldev] AUTHORITY.KEYID = 7
1,211,424 UART: [ldev] FE.KEYID = 1
1,216,708 UART: [ldev] Erasing FE.KEYID = 1
1,242,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,764 UART: [ldev] --
1,282,107 UART: [fwproc] Wait for Commands...
1,282,885 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,002 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,118 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,059 >>> mbox cmd response: success
1,384,087 UART: [afmc] ++
1,384,255 UART: [afmc] CDI.KEYID = 6
1,384,617 UART: [afmc] SUBJECT.KEYID = 7
1,385,042 UART: [afmc] AUTHORITY.KEYID = 5
1,420,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,823 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,544 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,439 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,131 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,761 UART: [afmc] --
1,463,775 UART: [cold-reset] --
1,464,761 UART: [state] Locking Datavault
1,465,722 UART: [state] Locking PCR0, PCR1 and PCR31
1,466,326 UART: [state] Locking ICCM
1,466,944 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,239 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,122 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,436 ready_for_fw is high
1,060,436 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,542 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,173,931 ready_for_fw is high
1,173,931 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,744 UART: [ldev] ++
1,208,912 UART: [ldev] CDI.KEYID = 6
1,209,276 UART: [ldev] SUBJECT.KEYID = 5
1,209,703 UART: [ldev] AUTHORITY.KEYID = 7
1,210,166 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,072 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,081 UART: [fwproc] Recv command 0x46574c44
1,281,814 UART: [fwproc] Recv'd Img size: 7036 bytes
1,349,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,377,073 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,378,194 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,381,160 >>> mbox cmd response: success
1,382,335 UART: [afmc] ++
1,382,503 UART: [afmc] CDI.KEYID = 6
1,382,866 UART: [afmc] SUBJECT.KEYID = 7
1,383,292 UART: [afmc] AUTHORITY.KEYID = 5
1,418,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,434,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,435,535 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,441,257 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,447,150 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,452,842 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,460,859 UART: [afmc] --
1,461,765 UART: [cold-reset] --
1,462,501 UART: [state] Locking Datavault
1,463,606 UART: [state] Locking PCR0, PCR1 and PCR31
1,464,210 UART: [state] Locking ICCM
1,464,658 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,469,953 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,471,836 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,644 ready_for_fw is high
1,055,644 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,229,264 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6f9275f4c1f8cbeab60e75961e97205f020dd5b75b17f15825b0483250df8b6d2631fb513fa082555d4ff7b56d22533c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,675 UART: [kat] LMS
1,168,987 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,174,754 ready_for_fw is high
1,174,754 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,199,778 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,999 UART: [ldev] --
1,282,351 UART: [fwproc] Wait for Commands...
1,282,924 UART: [fwproc] Recv command 0x46574c44
1,283,657 UART: [fwproc] Recv'd Img size: 7036 bytes
1,350,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,378,760 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,379,881 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,923 >>> mbox cmd response: success
1,384,190 UART: [afmc] ++
1,384,358 UART: [afmc] CDI.KEYID = 6
1,384,721 UART: [afmc] SUBJECT.KEYID = 7
1,385,147 UART: [afmc] AUTHORITY.KEYID = 5
1,420,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,784 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,506 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,399 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,091 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,898 UART: [afmc] --
1,463,982 UART: [cold-reset] --
1,464,814 UART: [state] Locking Datavault
1,465,897 UART: [state] Locking PCR0, PCR1 and PCR31
1,466,501 UART: [state] Locking ICCM
1,467,021 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,316 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,199 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3908d986412c6d0efd566bcfbccec2a946ba96ecaf4587c368ec51045433e9240784c67c5a1ebeebe66b5b6659d906c3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,129 ready_for_fw is high
1,057,129 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,232,481 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.61s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s